@originals/sdk 1.4.2 → 1.4.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +4 -1
- package/.eslintrc.json +0 -33
- package/src/adapters/FeeOracleMock.ts +0 -9
- package/src/adapters/index.ts +0 -5
- package/src/adapters/providers/OrdHttpProvider.ts +0 -126
- package/src/adapters/providers/OrdMockProvider.ts +0 -101
- package/src/adapters/types.ts +0 -66
- package/src/bitcoin/BitcoinManager.ts +0 -330
- package/src/bitcoin/BroadcastClient.ts +0 -54
- package/src/bitcoin/OrdinalsClient.ts +0 -119
- package/src/bitcoin/PSBTBuilder.ts +0 -106
- package/src/bitcoin/fee-calculation.ts +0 -38
- package/src/bitcoin/providers/OrdNodeProvider.ts +0 -92
- package/src/bitcoin/providers/OrdinalsProvider.ts +0 -56
- package/src/bitcoin/providers/types.ts +0 -59
- package/src/bitcoin/transactions/commit.ts +0 -465
- package/src/bitcoin/transactions/index.ts +0 -13
- package/src/bitcoin/transfer.ts +0 -43
- package/src/bitcoin/utxo-selection.ts +0 -322
- package/src/bitcoin/utxo.ts +0 -113
- package/src/contexts/credentials-v1.json +0 -237
- package/src/contexts/credentials-v2-examples.json +0 -5
- package/src/contexts/credentials-v2.json +0 -340
- package/src/contexts/credentials.json +0 -237
- package/src/contexts/data-integrity-v2.json +0 -81
- package/src/contexts/dids.json +0 -58
- package/src/contexts/ed255192020.json +0 -93
- package/src/contexts/ordinals-plus.json +0 -23
- package/src/contexts/originals.json +0 -22
- package/src/core/OriginalsSDK.ts +0 -416
- package/src/crypto/Multikey.ts +0 -194
- package/src/crypto/Signer.ts +0 -254
- package/src/crypto/noble-init.ts +0 -121
- package/src/did/BtcoDidResolver.ts +0 -227
- package/src/did/DIDManager.ts +0 -694
- package/src/did/Ed25519Verifier.ts +0 -68
- package/src/did/KeyManager.ts +0 -236
- package/src/did/WebVHManager.ts +0 -498
- package/src/did/createBtcoDidDocument.ts +0 -59
- package/src/did/providers/OrdinalsClientProviderAdapter.ts +0 -68
- package/src/events/EventEmitter.ts +0 -222
- package/src/events/index.ts +0 -19
- package/src/events/types.ts +0 -331
- package/src/examples/basic-usage.ts +0 -78
- package/src/examples/create-module-original.ts +0 -435
- package/src/examples/full-lifecycle-flow.ts +0 -514
- package/src/examples/run.ts +0 -60
- package/src/index.ts +0 -150
- package/src/kinds/KindRegistry.ts +0 -290
- package/src/kinds/index.ts +0 -74
- package/src/kinds/types.ts +0 -470
- package/src/kinds/validators/AgentValidator.ts +0 -257
- package/src/kinds/validators/AppValidator.ts +0 -211
- package/src/kinds/validators/DatasetValidator.ts +0 -242
- package/src/kinds/validators/DocumentValidator.ts +0 -311
- package/src/kinds/validators/MediaValidator.ts +0 -269
- package/src/kinds/validators/ModuleValidator.ts +0 -225
- package/src/kinds/validators/base.ts +0 -276
- package/src/kinds/validators/index.ts +0 -12
- package/src/lifecycle/BatchOperations.ts +0 -373
- package/src/lifecycle/LifecycleManager.ts +0 -2126
- package/src/lifecycle/OriginalsAsset.ts +0 -524
- package/src/lifecycle/ProvenanceQuery.ts +0 -280
- package/src/lifecycle/ResourceVersioning.ts +0 -163
- package/src/migration/MigrationManager.ts +0 -527
- package/src/migration/audit/AuditLogger.ts +0 -176
- package/src/migration/checkpoint/CheckpointManager.ts +0 -112
- package/src/migration/checkpoint/CheckpointStorage.ts +0 -101
- package/src/migration/index.ts +0 -33
- package/src/migration/operations/BaseMigration.ts +0 -126
- package/src/migration/operations/PeerToBtcoMigration.ts +0 -105
- package/src/migration/operations/PeerToWebvhMigration.ts +0 -62
- package/src/migration/operations/WebvhToBtcoMigration.ts +0 -105
- package/src/migration/rollback/RollbackManager.ts +0 -170
- package/src/migration/state/StateMachine.ts +0 -92
- package/src/migration/state/StateTracker.ts +0 -156
- package/src/migration/types.ts +0 -344
- package/src/migration/validation/BitcoinValidator.ts +0 -107
- package/src/migration/validation/CredentialValidator.ts +0 -62
- package/src/migration/validation/DIDCompatibilityValidator.ts +0 -151
- package/src/migration/validation/LifecycleValidator.ts +0 -64
- package/src/migration/validation/StorageValidator.ts +0 -79
- package/src/migration/validation/ValidationPipeline.ts +0 -213
- package/src/resources/ResourceManager.ts +0 -655
- package/src/resources/index.ts +0 -21
- package/src/resources/types.ts +0 -202
- package/src/storage/LocalStorageAdapter.ts +0 -61
- package/src/storage/MemoryStorageAdapter.ts +0 -29
- package/src/storage/StorageAdapter.ts +0 -25
- package/src/storage/index.ts +0 -3
- package/src/types/bitcoin.ts +0 -98
- package/src/types/common.ts +0 -92
- package/src/types/credentials.ts +0 -88
- package/src/types/did.ts +0 -31
- package/src/types/external-shims.d.ts +0 -53
- package/src/types/index.ts +0 -7
- package/src/types/network.ts +0 -175
- package/src/utils/EventLogger.ts +0 -298
- package/src/utils/Logger.ts +0 -322
- package/src/utils/MetricsCollector.ts +0 -358
- package/src/utils/bitcoin-address.ts +0 -130
- package/src/utils/cbor.ts +0 -12
- package/src/utils/encoding.ts +0 -127
- package/src/utils/hash.ts +0 -6
- package/src/utils/retry.ts +0 -46
- package/src/utils/satoshi-validation.ts +0 -196
- package/src/utils/serialization.ts +0 -96
- package/src/utils/telemetry.ts +0 -40
- package/src/utils/validation.ts +0 -119
- package/src/vc/CredentialManager.ts +0 -918
- package/src/vc/Issuer.ts +0 -100
- package/src/vc/Verifier.ts +0 -47
- package/src/vc/cryptosuites/bbs.ts +0 -253
- package/src/vc/cryptosuites/bbsSimple.ts +0 -21
- package/src/vc/cryptosuites/eddsa.ts +0 -99
- package/src/vc/documentLoader.ts +0 -67
- package/src/vc/proofs/data-integrity.ts +0 -33
- package/src/vc/utils/jsonld.ts +0 -18
- package/tests/__mocks__/bbs-signatures.js +0 -17
- package/tests/__mocks__/mf-base58.js +0 -24
- package/tests/fixtures/did-documents.ts +0 -247
- package/tests/index.test.ts +0 -21
- package/tests/integration/BatchOperations.test.ts +0 -531
- package/tests/integration/CompleteLifecycle.e2e.test.ts +0 -735
- package/tests/integration/CredentialManager.test.ts +0 -42
- package/tests/integration/DIDManager.test.ts +0 -41
- package/tests/integration/DidPeerToWebVhFlow.test.ts +0 -351
- package/tests/integration/Events.test.ts +0 -435
- package/tests/integration/Lifecycle.transfer.btco.integration.test.ts +0 -25
- package/tests/integration/LifecycleManager.test.ts +0 -21
- package/tests/integration/MultikeyFlow.test.ts +0 -52
- package/tests/integration/TelemetryIntegration.test.ts +0 -395
- package/tests/integration/WebVhPublish.test.ts +0 -48
- package/tests/integration/createTypedOriginal.test.ts +0 -379
- package/tests/integration/migration/peer-to-webvh.test.ts +0 -172
- package/tests/manual/test-commit-creation.ts +0 -323
- package/tests/mocks/MockKeyStore.ts +0 -38
- package/tests/mocks/adapters/MemoryStorageAdapter.ts +0 -24
- package/tests/mocks/adapters/MockFeeOracle.ts +0 -11
- package/tests/mocks/adapters/MockOrdinalsProvider.ts +0 -76
- package/tests/mocks/adapters/OrdMockProvider.test.ts +0 -176
- package/tests/mocks/adapters/index.ts +0 -6
- package/tests/performance/BatchOperations.perf.test.ts +0 -403
- package/tests/performance/logging.perf.test.ts +0 -336
- package/tests/sdk.test.ts +0 -43
- package/tests/security/bitcoin-penetration-tests.test.ts +0 -622
- package/tests/setup.bun.ts +0 -69
- package/tests/setup.jest.ts +0 -23
- package/tests/stress/batch-operations-stress.test.ts +0 -571
- package/tests/unit/adapters/FeeOracleMock.test.ts +0 -40
- package/tests/unit/bitcoin/BitcoinManager.test.ts +0 -293
- package/tests/unit/bitcoin/BroadcastClient.test.ts +0 -52
- package/tests/unit/bitcoin/OrdNodeProvider.test.ts +0 -53
- package/tests/unit/bitcoin/OrdinalsClient.test.ts +0 -381
- package/tests/unit/bitcoin/OrdinalsClientProvider.test.ts +0 -102
- package/tests/unit/bitcoin/PSBTBuilder.test.ts +0 -84
- package/tests/unit/bitcoin/fee-calculation.test.ts +0 -261
- package/tests/unit/bitcoin/transactions/commit.test.ts +0 -649
- package/tests/unit/bitcoin/transfer.test.ts +0 -31
- package/tests/unit/bitcoin/utxo-selection-new.test.ts +0 -502
- package/tests/unit/bitcoin/utxo.more.test.ts +0 -39
- package/tests/unit/bitcoin/utxo.selection.test.ts +0 -38
- package/tests/unit/core/OriginalsSDK.test.ts +0 -152
- package/tests/unit/crypto/Multikey.test.ts +0 -206
- package/tests/unit/crypto/Signer.test.ts +0 -408
- package/tests/unit/did/BtcoDidResolver.test.ts +0 -611
- package/tests/unit/did/DIDManager.more.test.ts +0 -43
- package/tests/unit/did/DIDManager.test.ts +0 -185
- package/tests/unit/did/Ed25519Verifier.test.ts +0 -160
- package/tests/unit/did/KeyManager.test.ts +0 -452
- package/tests/unit/did/OrdinalsClientProviderAdapter.test.ts +0 -45
- package/tests/unit/did/WebVHManager.test.ts +0 -435
- package/tests/unit/did/createBtcoDidDocument.test.ts +0 -67
- package/tests/unit/did/providers/OrdinalsClientProviderAdapter.test.ts +0 -159
- package/tests/unit/events/EventEmitter.test.ts +0 -407
- package/tests/unit/kinds/KindRegistry.test.ts +0 -329
- package/tests/unit/kinds/types.test.ts +0 -409
- package/tests/unit/kinds/validators.test.ts +0 -651
- package/tests/unit/lifecycle/BatchOperations.test.ts +0 -527
- package/tests/unit/lifecycle/LifecycleManager.cleanapi.test.ts +0 -441
- package/tests/unit/lifecycle/LifecycleManager.keymanagement.test.ts +0 -312
- package/tests/unit/lifecycle/LifecycleManager.prov.test.ts +0 -18
- package/tests/unit/lifecycle/LifecycleManager.test.ts +0 -213
- package/tests/unit/lifecycle/LifecycleManager.transfer.unit.test.ts +0 -30
- package/tests/unit/lifecycle/OriginalsAsset.test.ts +0 -176
- package/tests/unit/lifecycle/ProvenanceQuery.test.ts +0 -577
- package/tests/unit/lifecycle/ResourceVersioning.test.ts +0 -651
- package/tests/unit/resources/ResourceManager.test.ts +0 -740
- package/tests/unit/storage/MemoryStorageAdapter.test.ts +0 -93
- package/tests/unit/types/network.test.ts +0 -255
- package/tests/unit/utils/EventIntegration.test.ts +0 -384
- package/tests/unit/utils/Logger.test.ts +0 -473
- package/tests/unit/utils/MetricsCollector.test.ts +0 -358
- package/tests/unit/utils/bitcoin-address.test.ts +0 -250
- package/tests/unit/utils/cbor.test.ts +0 -35
- package/tests/unit/utils/encoding.test.ts +0 -318
- package/tests/unit/utils/hash.test.ts +0 -12
- package/tests/unit/utils/retry.test.ts +0 -100
- package/tests/unit/utils/satoshi-validation.test.ts +0 -354
- package/tests/unit/utils/serialization.test.ts +0 -124
- package/tests/unit/utils/telemetry.test.ts +0 -52
- package/tests/unit/utils/validation.test.ts +0 -141
- package/tests/unit/vc/CredentialManager.helpers.test.ts +0 -527
- package/tests/unit/vc/CredentialManager.test.ts +0 -487
- package/tests/unit/vc/Issuer.test.ts +0 -107
- package/tests/unit/vc/Verifier.test.ts +0 -525
- package/tests/unit/vc/bbs.test.ts +0 -282
- package/tests/unit/vc/cryptosuites/eddsa.test.ts +0 -398
- package/tests/unit/vc/documentLoader.test.ts +0 -121
- package/tests/unit/vc/proofs/data-integrity.test.ts +0 -24
- package/tsconfig.json +0 -31
- package/tsconfig.test.json +0 -15
|
@@ -1,452 +0,0 @@
|
|
|
1
|
-
import { describe, test, expect } from 'bun:test';
|
|
2
|
-
import { KeyManager } from '../../../src/did/KeyManager';
|
|
3
|
-
import { DIDDocument, KeyPair, KeyType } from '../../../src/types';
|
|
4
|
-
|
|
5
|
-
describe('KeyManager', () => {
|
|
6
|
-
const km = new KeyManager();
|
|
7
|
-
|
|
8
|
-
test('generateKeyPair ES256K works', async () => {
|
|
9
|
-
const kp = await km.generateKeyPair('ES256K');
|
|
10
|
-
expect(kp.privateKey.startsWith('z')).toBe(true);
|
|
11
|
-
expect(kp.publicKey.startsWith('z')).toBe(true);
|
|
12
|
-
});
|
|
13
|
-
|
|
14
|
-
test('generateKeyPair Ed25519 works', async () => {
|
|
15
|
-
const kp = await km.generateKeyPair('Ed25519');
|
|
16
|
-
expect(kp.privateKey.startsWith('z')).toBe(true);
|
|
17
|
-
expect(kp.publicKey.startsWith('z')).toBe(true);
|
|
18
|
-
});
|
|
19
|
-
|
|
20
|
-
test('decodePublicKeyMultibase invalid input throws', () => {
|
|
21
|
-
expect(() => km.decodePublicKeyMultibase('abc')).toThrow('Invalid multibase string');
|
|
22
|
-
});
|
|
23
|
-
|
|
24
|
-
test('encode/decode multibase roundtrip', () => {
|
|
25
|
-
const pub = Buffer.from('hello');
|
|
26
|
-
const encoded = km.encodePublicKeyMultibase(pub, 'ES256K' as KeyType);
|
|
27
|
-
const decoded = km.decodePublicKeyMultibase(encoded);
|
|
28
|
-
expect(Buffer.from(decoded.key)).toEqual(Buffer.from(pub));
|
|
29
|
-
expect(decoded.type).toBe('ES256K');
|
|
30
|
-
});
|
|
31
|
-
|
|
32
|
-
test('decodePublicKeyMultibase handles Ed25519 multikey values', () => {
|
|
33
|
-
const pub = Buffer.from([0, 255, 1, 2, 3, 4, 5]);
|
|
34
|
-
const encoded = km.encodePublicKeyMultibase(pub, 'Ed25519' as KeyType);
|
|
35
|
-
const decoded = km.decodePublicKeyMultibase(encoded);
|
|
36
|
-
expect(Buffer.from(decoded.key)).toEqual(Buffer.from(pub));
|
|
37
|
-
expect(decoded.type).toBe('Ed25519');
|
|
38
|
-
});
|
|
39
|
-
|
|
40
|
-
test('rotateKeys updates DID document keys', async () => {
|
|
41
|
-
const didDoc: DIDDocument = { '@context': ['https://www.w3.org/ns/did/v1'], id: 'did:peer:xyz' };
|
|
42
|
-
const pair: KeyPair = await km.generateKeyPair('ES256K' as KeyType);
|
|
43
|
-
const rotated = await km.rotateKeys(didDoc, pair);
|
|
44
|
-
expect(rotated.verificationMethod?.[0].publicKeyMultibase).toBe(pair.publicKey);
|
|
45
|
-
// Verify that multikey context is added when using Multikey verification method
|
|
46
|
-
expect(rotated['@context']).toContain('https://w3id.org/security/multikey/v1');
|
|
47
|
-
expect(rotated.verificationMethod?.[0].type).toBe('Multikey');
|
|
48
|
-
});
|
|
49
|
-
|
|
50
|
-
test('rotateKeys marks old keys as revoked', async () => {
|
|
51
|
-
// Start with a DID document that has an existing verification method
|
|
52
|
-
const initialPair: KeyPair = await km.generateKeyPair('Ed25519' as KeyType);
|
|
53
|
-
const didDoc: DIDDocument = {
|
|
54
|
-
'@context': ['https://www.w3.org/ns/did/v1'],
|
|
55
|
-
id: 'did:peer:test123',
|
|
56
|
-
verificationMethod: [{
|
|
57
|
-
id: 'did:peer:test123#keys-0',
|
|
58
|
-
type: 'Multikey',
|
|
59
|
-
controller: 'did:peer:test123',
|
|
60
|
-
publicKeyMultibase: initialPair.publicKey
|
|
61
|
-
}],
|
|
62
|
-
authentication: ['did:peer:test123#keys-0']
|
|
63
|
-
};
|
|
64
|
-
|
|
65
|
-
// Rotate to new key
|
|
66
|
-
const newPair: KeyPair = await km.generateKeyPair('Ed25519' as KeyType);
|
|
67
|
-
const rotated = await km.rotateKeys(didDoc, newPair);
|
|
68
|
-
|
|
69
|
-
// Verify old key is revoked
|
|
70
|
-
expect(rotated.verificationMethod).toHaveLength(2);
|
|
71
|
-
expect(rotated.verificationMethod?.[0].revoked).toBeDefined();
|
|
72
|
-
expect(rotated.verificationMethod?.[0].revoked).toMatch(/^\d{4}-\d{2}-\d{2}T/); // ISO 8601 format
|
|
73
|
-
|
|
74
|
-
// Verify new key is not revoked
|
|
75
|
-
expect(rotated.verificationMethod?.[1].revoked).toBeUndefined();
|
|
76
|
-
expect(rotated.verificationMethod?.[1].publicKeyMultibase).toBe(newPair.publicKey);
|
|
77
|
-
});
|
|
78
|
-
|
|
79
|
-
test('rotateKeys updates authentication and assertionMethod arrays', async () => {
|
|
80
|
-
const initialPair: KeyPair = await km.generateKeyPair('ES256K' as KeyType);
|
|
81
|
-
const didDoc: DIDDocument = {
|
|
82
|
-
'@context': ['https://www.w3.org/ns/did/v1'],
|
|
83
|
-
id: 'did:peer:abc',
|
|
84
|
-
verificationMethod: [{
|
|
85
|
-
id: 'did:peer:abc#keys-0',
|
|
86
|
-
type: 'Multikey',
|
|
87
|
-
controller: 'did:peer:abc',
|
|
88
|
-
publicKeyMultibase: initialPair.publicKey
|
|
89
|
-
}],
|
|
90
|
-
authentication: ['did:peer:abc#keys-0'],
|
|
91
|
-
assertionMethod: ['did:peer:abc#keys-0']
|
|
92
|
-
};
|
|
93
|
-
|
|
94
|
-
const newPair: KeyPair = await km.generateKeyPair('ES256K' as KeyType);
|
|
95
|
-
const rotated = await km.rotateKeys(didDoc, newPair);
|
|
96
|
-
|
|
97
|
-
// Verify authentication and assertionMethod reference only new key
|
|
98
|
-
expect(rotated.authentication).toEqual(['did:peer:abc#keys-1']);
|
|
99
|
-
expect(rotated.assertionMethod).toEqual(['did:peer:abc#keys-1']);
|
|
100
|
-
});
|
|
101
|
-
|
|
102
|
-
test('rotateKeys preserves service endpoints and other properties', async () => {
|
|
103
|
-
const initialPair: KeyPair = await km.generateKeyPair('ES256' as KeyType);
|
|
104
|
-
const didDoc: DIDDocument = {
|
|
105
|
-
'@context': ['https://www.w3.org/ns/did/v1'],
|
|
106
|
-
id: 'did:peer:xyz',
|
|
107
|
-
verificationMethod: [{
|
|
108
|
-
id: 'did:peer:xyz#keys-0',
|
|
109
|
-
type: 'Multikey',
|
|
110
|
-
controller: 'did:peer:xyz',
|
|
111
|
-
publicKeyMultibase: initialPair.publicKey
|
|
112
|
-
}],
|
|
113
|
-
authentication: ['did:peer:xyz#keys-0'],
|
|
114
|
-
service: [{
|
|
115
|
-
id: 'did:peer:xyz#service-1',
|
|
116
|
-
type: 'MessagingService',
|
|
117
|
-
serviceEndpoint: 'https://example.com/endpoint'
|
|
118
|
-
}],
|
|
119
|
-
keyAgreement: ['did:peer:xyz#key-agreement-1']
|
|
120
|
-
};
|
|
121
|
-
|
|
122
|
-
const newPair: KeyPair = await km.generateKeyPair('ES256' as KeyType);
|
|
123
|
-
const rotated = await km.rotateKeys(didDoc, newPair);
|
|
124
|
-
|
|
125
|
-
// Verify service endpoints are preserved
|
|
126
|
-
expect(rotated.service).toEqual(didDoc.service);
|
|
127
|
-
expect(rotated.keyAgreement).toEqual(didDoc.keyAgreement);
|
|
128
|
-
});
|
|
129
|
-
|
|
130
|
-
test('rotateKeys maintains DID document validity with proper context', async () => {
|
|
131
|
-
const didDoc: DIDDocument = {
|
|
132
|
-
'@context': ['https://www.w3.org/ns/did/v1'],
|
|
133
|
-
id: 'did:peer:validity-test'
|
|
134
|
-
};
|
|
135
|
-
|
|
136
|
-
const newPair: KeyPair = await km.generateKeyPair('Ed25519' as KeyType);
|
|
137
|
-
const rotated = await km.rotateKeys(didDoc, newPair);
|
|
138
|
-
|
|
139
|
-
// Verify proper context is included
|
|
140
|
-
expect(rotated['@context']).toContain('https://www.w3.org/ns/did/v1');
|
|
141
|
-
expect(rotated['@context']).toContain('https://w3id.org/security/multikey/v1');
|
|
142
|
-
expect(rotated['@context']).toContain('https://w3id.org/security/v1');
|
|
143
|
-
|
|
144
|
-
// Verify structure is valid
|
|
145
|
-
expect(rotated.id).toBe('did:peer:validity-test');
|
|
146
|
-
expect(rotated.verificationMethod).toBeDefined();
|
|
147
|
-
expect(rotated.authentication).toBeDefined();
|
|
148
|
-
});
|
|
149
|
-
|
|
150
|
-
test('rotateKeys does not duplicate multikey context if already present', async () => {
|
|
151
|
-
const didDoc: DIDDocument = {
|
|
152
|
-
'@context': ['https://www.w3.org/ns/did/v1', 'https://w3id.org/security/multikey/v1'],
|
|
153
|
-
id: 'did:peer:abc'
|
|
154
|
-
};
|
|
155
|
-
const pair: KeyPair = await km.generateKeyPair('ES256K' as KeyType);
|
|
156
|
-
const rotated = await km.rotateKeys(didDoc, pair);
|
|
157
|
-
|
|
158
|
-
// Count occurrences of multikey context
|
|
159
|
-
const contextCount = rotated['@context'].filter(c => c === 'https://w3id.org/security/multikey/v1').length;
|
|
160
|
-
expect(contextCount).toBe(1);
|
|
161
|
-
expect(rotated['@context']).toContain('https://w3id.org/security/multikey/v1');
|
|
162
|
-
});
|
|
163
|
-
|
|
164
|
-
test('recoverFromCompromise generates new keys correctly', async () => {
|
|
165
|
-
const initialPair: KeyPair = await km.generateKeyPair('ES256K' as KeyType);
|
|
166
|
-
const didDoc: DIDDocument = {
|
|
167
|
-
'@context': ['https://www.w3.org/ns/did/v1'],
|
|
168
|
-
id: 'did:peer:compromised123',
|
|
169
|
-
verificationMethod: [{
|
|
170
|
-
id: 'did:peer:compromised123#keys-0',
|
|
171
|
-
type: 'Multikey',
|
|
172
|
-
controller: 'did:peer:compromised123',
|
|
173
|
-
publicKeyMultibase: initialPair.publicKey
|
|
174
|
-
}],
|
|
175
|
-
authentication: ['did:peer:compromised123#keys-0']
|
|
176
|
-
};
|
|
177
|
-
|
|
178
|
-
const result = await km.recoverFromCompromise(didDoc);
|
|
179
|
-
|
|
180
|
-
// Verify result structure
|
|
181
|
-
expect(result).toHaveProperty('didDocument');
|
|
182
|
-
expect(result).toHaveProperty('recoveryCredential');
|
|
183
|
-
expect(result).toHaveProperty('newKeyPair');
|
|
184
|
-
|
|
185
|
-
// Verify new key was generated
|
|
186
|
-
expect(result.didDocument.verificationMethod).toHaveLength(2);
|
|
187
|
-
const newKey = result.didDocument.verificationMethod?.[1];
|
|
188
|
-
expect(newKey?.publicKeyMultibase).toBeDefined();
|
|
189
|
-
expect(newKey?.publicKeyMultibase).not.toBe(initialPair.publicKey);
|
|
190
|
-
|
|
191
|
-
// Verify new key pair is returned and matches the verification method
|
|
192
|
-
expect(result.newKeyPair).toBeDefined();
|
|
193
|
-
expect(result.newKeyPair.publicKey).toBe(newKey?.publicKeyMultibase);
|
|
194
|
-
expect(result.newKeyPair.privateKey).toBeDefined();
|
|
195
|
-
});
|
|
196
|
-
|
|
197
|
-
test('recoverFromCompromise marks all existing keys as compromised', async () => {
|
|
198
|
-
const pair1: KeyPair = await km.generateKeyPair('Ed25519' as KeyType);
|
|
199
|
-
const pair2: KeyPair = await km.generateKeyPair('Ed25519' as KeyType);
|
|
200
|
-
const didDoc: DIDDocument = {
|
|
201
|
-
'@context': ['https://www.w3.org/ns/did/v1'],
|
|
202
|
-
id: 'did:peer:multi-key',
|
|
203
|
-
verificationMethod: [
|
|
204
|
-
{
|
|
205
|
-
id: 'did:peer:multi-key#keys-0',
|
|
206
|
-
type: 'Multikey',
|
|
207
|
-
controller: 'did:peer:multi-key',
|
|
208
|
-
publicKeyMultibase: pair1.publicKey
|
|
209
|
-
},
|
|
210
|
-
{
|
|
211
|
-
id: 'did:peer:multi-key#keys-1',
|
|
212
|
-
type: 'Multikey',
|
|
213
|
-
controller: 'did:peer:multi-key',
|
|
214
|
-
publicKeyMultibase: pair2.publicKey
|
|
215
|
-
}
|
|
216
|
-
],
|
|
217
|
-
authentication: ['did:peer:multi-key#keys-0']
|
|
218
|
-
};
|
|
219
|
-
|
|
220
|
-
const result = await km.recoverFromCompromise(didDoc);
|
|
221
|
-
|
|
222
|
-
// Verify all old keys are marked as compromised
|
|
223
|
-
expect(result.didDocument.verificationMethod).toHaveLength(3);
|
|
224
|
-
expect(result.didDocument.verificationMethod?.[0].compromised).toBeDefined();
|
|
225
|
-
expect(result.didDocument.verificationMethod?.[0].compromised).toMatch(/^\d{4}-\d{2}-\d{2}T/);
|
|
226
|
-
expect(result.didDocument.verificationMethod?.[1].compromised).toBeDefined();
|
|
227
|
-
expect(result.didDocument.verificationMethod?.[1].compromised).toMatch(/^\d{4}-\d{2}-\d{2}T/);
|
|
228
|
-
|
|
229
|
-
// Verify new key is not compromised
|
|
230
|
-
expect(result.didDocument.verificationMethod?.[2].compromised).toBeUndefined();
|
|
231
|
-
});
|
|
232
|
-
|
|
233
|
-
test('recoverFromCompromise creates properly formatted recovery credential', async () => {
|
|
234
|
-
const initialPair: KeyPair = await km.generateKeyPair('Ed25519' as KeyType);
|
|
235
|
-
const didDoc: DIDDocument = {
|
|
236
|
-
'@context': ['https://www.w3.org/ns/did/v1'],
|
|
237
|
-
id: 'did:peer:recovery-test',
|
|
238
|
-
verificationMethod: [{
|
|
239
|
-
id: 'did:peer:recovery-test#keys-0',
|
|
240
|
-
type: 'Multikey',
|
|
241
|
-
controller: 'did:peer:recovery-test',
|
|
242
|
-
publicKeyMultibase: initialPair.publicKey
|
|
243
|
-
}],
|
|
244
|
-
authentication: ['did:peer:recovery-test#keys-0']
|
|
245
|
-
};
|
|
246
|
-
|
|
247
|
-
const result = await km.recoverFromCompromise(didDoc);
|
|
248
|
-
const credential = result.recoveryCredential;
|
|
249
|
-
|
|
250
|
-
// Verify credential structure
|
|
251
|
-
expect(credential['@context']).toContain('https://www.w3.org/2018/credentials/v1');
|
|
252
|
-
expect(credential['@context']).toContain('https://w3id.org/security/v1');
|
|
253
|
-
expect(credential.type).toContain('VerifiableCredential');
|
|
254
|
-
expect(credential.type).toContain('KeyRecoveryCredential');
|
|
255
|
-
expect(credential.issuer).toBe('did:peer:recovery-test');
|
|
256
|
-
expect(credential.issuanceDate).toMatch(/^\d{4}-\d{2}-\d{2}T/);
|
|
257
|
-
|
|
258
|
-
// Verify credential subject
|
|
259
|
-
expect(credential.credentialSubject.id).toBe('did:peer:recovery-test');
|
|
260
|
-
expect(credential.credentialSubject.recoveryReason).toBe('key_compromise');
|
|
261
|
-
expect(credential.credentialSubject.previousVerificationMethods).toEqual(['did:peer:recovery-test#keys-0']);
|
|
262
|
-
expect(credential.credentialSubject.newVerificationMethod).toBe('did:peer:recovery-test#keys-1');
|
|
263
|
-
});
|
|
264
|
-
|
|
265
|
-
test('recoverFromCompromise updates authentication to use new key', async () => {
|
|
266
|
-
const initialPair: KeyPair = await km.generateKeyPair('ES256' as KeyType);
|
|
267
|
-
const didDoc: DIDDocument = {
|
|
268
|
-
'@context': ['https://www.w3.org/ns/did/v1'],
|
|
269
|
-
id: 'did:peer:auth-update',
|
|
270
|
-
verificationMethod: [{
|
|
271
|
-
id: 'did:peer:auth-update#keys-0',
|
|
272
|
-
type: 'Multikey',
|
|
273
|
-
controller: 'did:peer:auth-update',
|
|
274
|
-
publicKeyMultibase: initialPair.publicKey
|
|
275
|
-
}],
|
|
276
|
-
authentication: ['did:peer:auth-update#keys-0'],
|
|
277
|
-
assertionMethod: ['did:peer:auth-update#keys-0']
|
|
278
|
-
};
|
|
279
|
-
|
|
280
|
-
const result = await km.recoverFromCompromise(didDoc);
|
|
281
|
-
|
|
282
|
-
// Verify authentication and assertionMethod reference new key
|
|
283
|
-
expect(result.didDocument.authentication).toEqual(['did:peer:auth-update#keys-1']);
|
|
284
|
-
expect(result.didDocument.assertionMethod).toEqual(['did:peer:auth-update#keys-1']);
|
|
285
|
-
});
|
|
286
|
-
|
|
287
|
-
test('recoverFromCompromise preserves service endpoints', async () => {
|
|
288
|
-
const initialPair: KeyPair = await km.generateKeyPair('Ed25519' as KeyType);
|
|
289
|
-
const didDoc: DIDDocument = {
|
|
290
|
-
'@context': ['https://www.w3.org/ns/did/v1'],
|
|
291
|
-
id: 'did:peer:service-test',
|
|
292
|
-
verificationMethod: [{
|
|
293
|
-
id: 'did:peer:service-test#keys-0',
|
|
294
|
-
type: 'Multikey',
|
|
295
|
-
controller: 'did:peer:service-test',
|
|
296
|
-
publicKeyMultibase: initialPair.publicKey
|
|
297
|
-
}],
|
|
298
|
-
authentication: ['did:peer:service-test#keys-0'],
|
|
299
|
-
service: [{
|
|
300
|
-
id: 'did:peer:service-test#endpoint-1',
|
|
301
|
-
type: 'LinkedDomains',
|
|
302
|
-
serviceEndpoint: 'https://example.com'
|
|
303
|
-
}]
|
|
304
|
-
};
|
|
305
|
-
|
|
306
|
-
const result = await km.recoverFromCompromise(didDoc);
|
|
307
|
-
|
|
308
|
-
// Verify service endpoints are preserved
|
|
309
|
-
expect(result.didDocument.service).toEqual(didDoc.service);
|
|
310
|
-
});
|
|
311
|
-
|
|
312
|
-
test('recoverFromCompromise uses same key type as original', async () => {
|
|
313
|
-
// Test with ES256K
|
|
314
|
-
const es256kPair: KeyPair = await km.generateKeyPair('ES256K' as KeyType);
|
|
315
|
-
const didDocES256K: DIDDocument = {
|
|
316
|
-
'@context': ['https://www.w3.org/ns/did/v1'],
|
|
317
|
-
id: 'did:peer:keytype-test',
|
|
318
|
-
verificationMethod: [{
|
|
319
|
-
id: 'did:peer:keytype-test#keys-0',
|
|
320
|
-
type: 'Multikey',
|
|
321
|
-
controller: 'did:peer:keytype-test',
|
|
322
|
-
publicKeyMultibase: es256kPair.publicKey
|
|
323
|
-
}]
|
|
324
|
-
};
|
|
325
|
-
|
|
326
|
-
const resultES256K = await km.recoverFromCompromise(didDocES256K);
|
|
327
|
-
const newKeyMultibase = resultES256K.didDocument.verificationMethod?.[1].publicKeyMultibase;
|
|
328
|
-
|
|
329
|
-
// Decode to verify key type
|
|
330
|
-
expect(newKeyMultibase).toBeDefined();
|
|
331
|
-
const decoded = km.decodePublicKeyMultibase(newKeyMultibase!);
|
|
332
|
-
expect(decoded.type).toBe('ES256K');
|
|
333
|
-
});
|
|
334
|
-
|
|
335
|
-
test('recoverFromCompromise handles DID document with no existing keys', async () => {
|
|
336
|
-
const didDoc: DIDDocument = {
|
|
337
|
-
'@context': ['https://www.w3.org/ns/did/v1'],
|
|
338
|
-
id: 'did:peer:no-keys'
|
|
339
|
-
};
|
|
340
|
-
|
|
341
|
-
const result = await km.recoverFromCompromise(didDoc);
|
|
342
|
-
|
|
343
|
-
// Verify new key was generated with default type (Ed25519)
|
|
344
|
-
expect(result.didDocument.verificationMethod).toHaveLength(1);
|
|
345
|
-
expect(result.didDocument.verificationMethod?.[0].id).toBe('did:peer:no-keys#keys-0');
|
|
346
|
-
|
|
347
|
-
// Verify recovery credential lists no previous keys
|
|
348
|
-
expect(result.recoveryCredential.credentialSubject.previousVerificationMethods).toEqual([]);
|
|
349
|
-
});
|
|
350
|
-
|
|
351
|
-
test('rotateKeys preserves all optional DID document properties', async () => {
|
|
352
|
-
const initialPair: KeyPair = await km.generateKeyPair('ES256K' as KeyType);
|
|
353
|
-
const didDoc: DIDDocument = {
|
|
354
|
-
'@context': ['https://www.w3.org/ns/did/v1'],
|
|
355
|
-
id: 'did:peer:full-props',
|
|
356
|
-
verificationMethod: [{
|
|
357
|
-
id: 'did:peer:full-props#keys-0',
|
|
358
|
-
type: 'Multikey',
|
|
359
|
-
controller: 'did:peer:full-props',
|
|
360
|
-
publicKeyMultibase: initialPair.publicKey
|
|
361
|
-
}],
|
|
362
|
-
authentication: ['did:peer:full-props#keys-0'],
|
|
363
|
-
keyAgreement: ['did:peer:full-props#key-agreement-1'],
|
|
364
|
-
capabilityInvocation: ['did:peer:full-props#capability-1'],
|
|
365
|
-
capabilityDelegation: ['did:peer:full-props#delegation-1'],
|
|
366
|
-
service: [{
|
|
367
|
-
id: 'did:peer:full-props#service-1',
|
|
368
|
-
type: 'MessagingService',
|
|
369
|
-
serviceEndpoint: 'https://example.com'
|
|
370
|
-
}]
|
|
371
|
-
};
|
|
372
|
-
|
|
373
|
-
const newPair: KeyPair = await km.generateKeyPair('ES256K' as KeyType);
|
|
374
|
-
const rotated = await km.rotateKeys(didDoc, newPair);
|
|
375
|
-
|
|
376
|
-
// Verify all properties are preserved
|
|
377
|
-
expect(rotated.keyAgreement).toEqual(didDoc.keyAgreement);
|
|
378
|
-
expect(rotated.capabilityInvocation).toEqual(didDoc.capabilityInvocation);
|
|
379
|
-
expect(rotated.capabilityDelegation).toEqual(didDoc.capabilityDelegation);
|
|
380
|
-
expect(rotated.service).toEqual(didDoc.service);
|
|
381
|
-
});
|
|
382
|
-
|
|
383
|
-
test('recoverFromCompromise preserves all optional DID document properties', async () => {
|
|
384
|
-
const initialPair: KeyPair = await km.generateKeyPair('Ed25519' as KeyType);
|
|
385
|
-
const didDoc: DIDDocument = {
|
|
386
|
-
'@context': ['https://www.w3.org/ns/did/v1'],
|
|
387
|
-
id: 'did:peer:full-recovery',
|
|
388
|
-
verificationMethod: [{
|
|
389
|
-
id: 'did:peer:full-recovery#keys-0',
|
|
390
|
-
type: 'Multikey',
|
|
391
|
-
controller: 'did:peer:full-recovery',
|
|
392
|
-
publicKeyMultibase: initialPair.publicKey
|
|
393
|
-
}],
|
|
394
|
-
authentication: ['did:peer:full-recovery#keys-0'],
|
|
395
|
-
keyAgreement: ['did:peer:full-recovery#key-agreement-1'],
|
|
396
|
-
capabilityInvocation: ['did:peer:full-recovery#capability-1'],
|
|
397
|
-
capabilityDelegation: ['did:peer:full-recovery#delegation-1'],
|
|
398
|
-
service: [{
|
|
399
|
-
id: 'did:peer:full-recovery#service-1',
|
|
400
|
-
type: 'LinkedDomains',
|
|
401
|
-
serviceEndpoint: 'https://example.com'
|
|
402
|
-
}]
|
|
403
|
-
};
|
|
404
|
-
|
|
405
|
-
const result = await km.recoverFromCompromise(didDoc);
|
|
406
|
-
|
|
407
|
-
// Verify all properties are preserved
|
|
408
|
-
expect(result.didDocument.keyAgreement).toEqual(didDoc.keyAgreement);
|
|
409
|
-
expect(result.didDocument.capabilityInvocation).toEqual(didDoc.capabilityInvocation);
|
|
410
|
-
expect(result.didDocument.capabilityDelegation).toEqual(didDoc.capabilityDelegation);
|
|
411
|
-
expect(result.didDocument.service).toEqual(didDoc.service);
|
|
412
|
-
});
|
|
413
|
-
|
|
414
|
-
test('decodePublicKeyMultibase validates input', () => {
|
|
415
|
-
expect(() => km.decodePublicKeyMultibase('bad')).toThrow('Invalid multibase string');
|
|
416
|
-
});
|
|
417
|
-
|
|
418
|
-
test('generateKeyPair supports ES256 (P-256)', async () => {
|
|
419
|
-
const kp = await km.generateKeyPair('ES256' as KeyType);
|
|
420
|
-
expect(kp).toHaveProperty('privateKey');
|
|
421
|
-
expect(kp).toHaveProperty('publicKey');
|
|
422
|
-
expect(kp.privateKey).toMatch(/^z/);
|
|
423
|
-
expect(kp.publicKey).toMatch(/^z/);
|
|
424
|
-
});
|
|
425
|
-
|
|
426
|
-
test('generateKeyPair throws on unsupported type', async () => {
|
|
427
|
-
await expect(km.generateKeyPair('UNSUPPORTED' as KeyType)).rejects.toThrow('Unsupported key type');
|
|
428
|
-
});
|
|
429
|
-
|
|
430
|
-
test('constructor initializes utils helpers without throwing', () => {
|
|
431
|
-
const instance = new KeyManager();
|
|
432
|
-
expect(instance).toBeInstanceOf(KeyManager);
|
|
433
|
-
// call utils to cover helper branches
|
|
434
|
-
const secp = require('@noble/secp256k1');
|
|
435
|
-
const ed = require('@noble/ed25519');
|
|
436
|
-
if (secp.utils && typeof secp.utils.hmacSha256Sync === 'function') {
|
|
437
|
-
secp.utils.hmacSha256Sync(new Uint8Array([1]), new Uint8Array([2]));
|
|
438
|
-
}
|
|
439
|
-
if (ed.utils && typeof ed.utils.sha512Sync === 'function') {
|
|
440
|
-
ed.utils.sha512Sync(new Uint8Array([3]));
|
|
441
|
-
}
|
|
442
|
-
});
|
|
443
|
-
|
|
444
|
-
test('constructor covers utils undefined branch (creates helpers when missing)', () => {
|
|
445
|
-
// In Bun, the utils property is readonly, so we skip this test
|
|
446
|
-
// The KeyManager constructor now handles readonly utils gracefully
|
|
447
|
-
const km2 = new KeyManager();
|
|
448
|
-
expect(km2).toBeInstanceOf(KeyManager);
|
|
449
|
-
});
|
|
450
|
-
});
|
|
451
|
-
|
|
452
|
-
|
|
@@ -1,45 +0,0 @@
|
|
|
1
|
-
/** Canonical test aggregator created by combine-tests script. */
|
|
2
|
-
|
|
3
|
-
/** Inlined from OrdinalsClientProviderAdapter.branches.part.ts */
|
|
4
|
-
import { describe, test, expect } from 'bun:test';
|
|
5
|
-
import { OrdinalsClient } from '../../../src/bitcoin/OrdinalsClient';
|
|
6
|
-
import { OrdinalsClientProviderAdapter } from '../../../src/did/providers/OrdinalsClientProviderAdapter';
|
|
7
|
-
|
|
8
|
-
describe('OrdinalsClientProviderAdapter branches', () => {
|
|
9
|
-
test('throws when baseUrl is empty in resolveInscription', async () => {
|
|
10
|
-
const client = new OrdinalsClient('http://example.com', 'mainnet');
|
|
11
|
-
const adapter = new OrdinalsClientProviderAdapter(client as any, '');
|
|
12
|
-
await expect(adapter.resolveInscription('abc')).rejects.toThrow('requires a baseUrl');
|
|
13
|
-
});
|
|
14
|
-
|
|
15
|
-
test('handles non-ok response from fetch', async () => {
|
|
16
|
-
const client = new OrdinalsClient('http://example.com', 'mainnet');
|
|
17
|
-
const adapter = new OrdinalsClientProviderAdapter(client as any, 'http://api');
|
|
18
|
-
const originalFetch = global.fetch as any;
|
|
19
|
-
(global as any).fetch = async () => ({ ok: false, status: 404, statusText: 'Not Found' });
|
|
20
|
-
await expect(adapter.resolveInscription('abc')).rejects.toThrow('Failed to resolve inscription');
|
|
21
|
-
(global as any).fetch = originalFetch;
|
|
22
|
-
});
|
|
23
|
-
|
|
24
|
-
test('maps missing fields from JSON with fallbacks', async () => {
|
|
25
|
-
const client = new OrdinalsClient('http://example.com', 'mainnet');
|
|
26
|
-
const adapter = new OrdinalsClientProviderAdapter(client as any, 'http://api/');
|
|
27
|
-
const originalFetch = global.fetch as any;
|
|
28
|
-
(global as any).fetch = async () => ({ ok: true, json: async () => ({}) });
|
|
29
|
-
const info = await adapter.resolveInscription('abc');
|
|
30
|
-
expect(info.content_type).toBe('text/plain');
|
|
31
|
-
expect(info.content_url).toBe('http://api/content/abc');
|
|
32
|
-
expect(typeof info.sat).toBe('number');
|
|
33
|
-
(global as any).fetch = originalFetch;
|
|
34
|
-
});
|
|
35
|
-
|
|
36
|
-
test('maps sat number without coercion path', async () => {
|
|
37
|
-
const client = new OrdinalsClient('http://example.com', 'mainnet');
|
|
38
|
-
const adapter = new OrdinalsClientProviderAdapter(client as any, 'http://api');
|
|
39
|
-
const originalFetch = global.fetch as any;
|
|
40
|
-
(global as any).fetch = async () => ({ ok: true, json: async () => ({ inscription_id: 'abc', sat: 42, content_type: 'text/plain', content_url: 'http://api/content/abc' }) });
|
|
41
|
-
const info = await adapter.resolveInscription('abc');
|
|
42
|
-
expect(info.sat).toBe(42);
|
|
43
|
-
(global as any).fetch = originalFetch;
|
|
44
|
-
});
|
|
45
|
-
});
|