@originals/sdk 1.4.2 → 1.4.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (212) hide show
  1. package/package.json +4 -1
  2. package/.eslintrc.json +0 -33
  3. package/src/adapters/FeeOracleMock.ts +0 -9
  4. package/src/adapters/index.ts +0 -5
  5. package/src/adapters/providers/OrdHttpProvider.ts +0 -126
  6. package/src/adapters/providers/OrdMockProvider.ts +0 -101
  7. package/src/adapters/types.ts +0 -66
  8. package/src/bitcoin/BitcoinManager.ts +0 -330
  9. package/src/bitcoin/BroadcastClient.ts +0 -54
  10. package/src/bitcoin/OrdinalsClient.ts +0 -119
  11. package/src/bitcoin/PSBTBuilder.ts +0 -106
  12. package/src/bitcoin/fee-calculation.ts +0 -38
  13. package/src/bitcoin/providers/OrdNodeProvider.ts +0 -92
  14. package/src/bitcoin/providers/OrdinalsProvider.ts +0 -56
  15. package/src/bitcoin/providers/types.ts +0 -59
  16. package/src/bitcoin/transactions/commit.ts +0 -465
  17. package/src/bitcoin/transactions/index.ts +0 -13
  18. package/src/bitcoin/transfer.ts +0 -43
  19. package/src/bitcoin/utxo-selection.ts +0 -322
  20. package/src/bitcoin/utxo.ts +0 -113
  21. package/src/contexts/credentials-v1.json +0 -237
  22. package/src/contexts/credentials-v2-examples.json +0 -5
  23. package/src/contexts/credentials-v2.json +0 -340
  24. package/src/contexts/credentials.json +0 -237
  25. package/src/contexts/data-integrity-v2.json +0 -81
  26. package/src/contexts/dids.json +0 -58
  27. package/src/contexts/ed255192020.json +0 -93
  28. package/src/contexts/ordinals-plus.json +0 -23
  29. package/src/contexts/originals.json +0 -22
  30. package/src/core/OriginalsSDK.ts +0 -416
  31. package/src/crypto/Multikey.ts +0 -194
  32. package/src/crypto/Signer.ts +0 -254
  33. package/src/crypto/noble-init.ts +0 -121
  34. package/src/did/BtcoDidResolver.ts +0 -227
  35. package/src/did/DIDManager.ts +0 -694
  36. package/src/did/Ed25519Verifier.ts +0 -68
  37. package/src/did/KeyManager.ts +0 -236
  38. package/src/did/WebVHManager.ts +0 -498
  39. package/src/did/createBtcoDidDocument.ts +0 -59
  40. package/src/did/providers/OrdinalsClientProviderAdapter.ts +0 -68
  41. package/src/events/EventEmitter.ts +0 -222
  42. package/src/events/index.ts +0 -19
  43. package/src/events/types.ts +0 -331
  44. package/src/examples/basic-usage.ts +0 -78
  45. package/src/examples/create-module-original.ts +0 -435
  46. package/src/examples/full-lifecycle-flow.ts +0 -514
  47. package/src/examples/run.ts +0 -60
  48. package/src/index.ts +0 -150
  49. package/src/kinds/KindRegistry.ts +0 -290
  50. package/src/kinds/index.ts +0 -74
  51. package/src/kinds/types.ts +0 -470
  52. package/src/kinds/validators/AgentValidator.ts +0 -257
  53. package/src/kinds/validators/AppValidator.ts +0 -211
  54. package/src/kinds/validators/DatasetValidator.ts +0 -242
  55. package/src/kinds/validators/DocumentValidator.ts +0 -311
  56. package/src/kinds/validators/MediaValidator.ts +0 -269
  57. package/src/kinds/validators/ModuleValidator.ts +0 -225
  58. package/src/kinds/validators/base.ts +0 -276
  59. package/src/kinds/validators/index.ts +0 -12
  60. package/src/lifecycle/BatchOperations.ts +0 -373
  61. package/src/lifecycle/LifecycleManager.ts +0 -2126
  62. package/src/lifecycle/OriginalsAsset.ts +0 -524
  63. package/src/lifecycle/ProvenanceQuery.ts +0 -280
  64. package/src/lifecycle/ResourceVersioning.ts +0 -163
  65. package/src/migration/MigrationManager.ts +0 -527
  66. package/src/migration/audit/AuditLogger.ts +0 -176
  67. package/src/migration/checkpoint/CheckpointManager.ts +0 -112
  68. package/src/migration/checkpoint/CheckpointStorage.ts +0 -101
  69. package/src/migration/index.ts +0 -33
  70. package/src/migration/operations/BaseMigration.ts +0 -126
  71. package/src/migration/operations/PeerToBtcoMigration.ts +0 -105
  72. package/src/migration/operations/PeerToWebvhMigration.ts +0 -62
  73. package/src/migration/operations/WebvhToBtcoMigration.ts +0 -105
  74. package/src/migration/rollback/RollbackManager.ts +0 -170
  75. package/src/migration/state/StateMachine.ts +0 -92
  76. package/src/migration/state/StateTracker.ts +0 -156
  77. package/src/migration/types.ts +0 -344
  78. package/src/migration/validation/BitcoinValidator.ts +0 -107
  79. package/src/migration/validation/CredentialValidator.ts +0 -62
  80. package/src/migration/validation/DIDCompatibilityValidator.ts +0 -151
  81. package/src/migration/validation/LifecycleValidator.ts +0 -64
  82. package/src/migration/validation/StorageValidator.ts +0 -79
  83. package/src/migration/validation/ValidationPipeline.ts +0 -213
  84. package/src/resources/ResourceManager.ts +0 -655
  85. package/src/resources/index.ts +0 -21
  86. package/src/resources/types.ts +0 -202
  87. package/src/storage/LocalStorageAdapter.ts +0 -61
  88. package/src/storage/MemoryStorageAdapter.ts +0 -29
  89. package/src/storage/StorageAdapter.ts +0 -25
  90. package/src/storage/index.ts +0 -3
  91. package/src/types/bitcoin.ts +0 -98
  92. package/src/types/common.ts +0 -92
  93. package/src/types/credentials.ts +0 -88
  94. package/src/types/did.ts +0 -31
  95. package/src/types/external-shims.d.ts +0 -53
  96. package/src/types/index.ts +0 -7
  97. package/src/types/network.ts +0 -175
  98. package/src/utils/EventLogger.ts +0 -298
  99. package/src/utils/Logger.ts +0 -322
  100. package/src/utils/MetricsCollector.ts +0 -358
  101. package/src/utils/bitcoin-address.ts +0 -130
  102. package/src/utils/cbor.ts +0 -12
  103. package/src/utils/encoding.ts +0 -127
  104. package/src/utils/hash.ts +0 -6
  105. package/src/utils/retry.ts +0 -46
  106. package/src/utils/satoshi-validation.ts +0 -196
  107. package/src/utils/serialization.ts +0 -96
  108. package/src/utils/telemetry.ts +0 -40
  109. package/src/utils/validation.ts +0 -119
  110. package/src/vc/CredentialManager.ts +0 -918
  111. package/src/vc/Issuer.ts +0 -100
  112. package/src/vc/Verifier.ts +0 -47
  113. package/src/vc/cryptosuites/bbs.ts +0 -253
  114. package/src/vc/cryptosuites/bbsSimple.ts +0 -21
  115. package/src/vc/cryptosuites/eddsa.ts +0 -99
  116. package/src/vc/documentLoader.ts +0 -67
  117. package/src/vc/proofs/data-integrity.ts +0 -33
  118. package/src/vc/utils/jsonld.ts +0 -18
  119. package/tests/__mocks__/bbs-signatures.js +0 -17
  120. package/tests/__mocks__/mf-base58.js +0 -24
  121. package/tests/fixtures/did-documents.ts +0 -247
  122. package/tests/index.test.ts +0 -21
  123. package/tests/integration/BatchOperations.test.ts +0 -531
  124. package/tests/integration/CompleteLifecycle.e2e.test.ts +0 -735
  125. package/tests/integration/CredentialManager.test.ts +0 -42
  126. package/tests/integration/DIDManager.test.ts +0 -41
  127. package/tests/integration/DidPeerToWebVhFlow.test.ts +0 -351
  128. package/tests/integration/Events.test.ts +0 -435
  129. package/tests/integration/Lifecycle.transfer.btco.integration.test.ts +0 -25
  130. package/tests/integration/LifecycleManager.test.ts +0 -21
  131. package/tests/integration/MultikeyFlow.test.ts +0 -52
  132. package/tests/integration/TelemetryIntegration.test.ts +0 -395
  133. package/tests/integration/WebVhPublish.test.ts +0 -48
  134. package/tests/integration/createTypedOriginal.test.ts +0 -379
  135. package/tests/integration/migration/peer-to-webvh.test.ts +0 -172
  136. package/tests/manual/test-commit-creation.ts +0 -323
  137. package/tests/mocks/MockKeyStore.ts +0 -38
  138. package/tests/mocks/adapters/MemoryStorageAdapter.ts +0 -24
  139. package/tests/mocks/adapters/MockFeeOracle.ts +0 -11
  140. package/tests/mocks/adapters/MockOrdinalsProvider.ts +0 -76
  141. package/tests/mocks/adapters/OrdMockProvider.test.ts +0 -176
  142. package/tests/mocks/adapters/index.ts +0 -6
  143. package/tests/performance/BatchOperations.perf.test.ts +0 -403
  144. package/tests/performance/logging.perf.test.ts +0 -336
  145. package/tests/sdk.test.ts +0 -43
  146. package/tests/security/bitcoin-penetration-tests.test.ts +0 -622
  147. package/tests/setup.bun.ts +0 -69
  148. package/tests/setup.jest.ts +0 -23
  149. package/tests/stress/batch-operations-stress.test.ts +0 -571
  150. package/tests/unit/adapters/FeeOracleMock.test.ts +0 -40
  151. package/tests/unit/bitcoin/BitcoinManager.test.ts +0 -293
  152. package/tests/unit/bitcoin/BroadcastClient.test.ts +0 -52
  153. package/tests/unit/bitcoin/OrdNodeProvider.test.ts +0 -53
  154. package/tests/unit/bitcoin/OrdinalsClient.test.ts +0 -381
  155. package/tests/unit/bitcoin/OrdinalsClientProvider.test.ts +0 -102
  156. package/tests/unit/bitcoin/PSBTBuilder.test.ts +0 -84
  157. package/tests/unit/bitcoin/fee-calculation.test.ts +0 -261
  158. package/tests/unit/bitcoin/transactions/commit.test.ts +0 -649
  159. package/tests/unit/bitcoin/transfer.test.ts +0 -31
  160. package/tests/unit/bitcoin/utxo-selection-new.test.ts +0 -502
  161. package/tests/unit/bitcoin/utxo.more.test.ts +0 -39
  162. package/tests/unit/bitcoin/utxo.selection.test.ts +0 -38
  163. package/tests/unit/core/OriginalsSDK.test.ts +0 -152
  164. package/tests/unit/crypto/Multikey.test.ts +0 -206
  165. package/tests/unit/crypto/Signer.test.ts +0 -408
  166. package/tests/unit/did/BtcoDidResolver.test.ts +0 -611
  167. package/tests/unit/did/DIDManager.more.test.ts +0 -43
  168. package/tests/unit/did/DIDManager.test.ts +0 -185
  169. package/tests/unit/did/Ed25519Verifier.test.ts +0 -160
  170. package/tests/unit/did/KeyManager.test.ts +0 -452
  171. package/tests/unit/did/OrdinalsClientProviderAdapter.test.ts +0 -45
  172. package/tests/unit/did/WebVHManager.test.ts +0 -435
  173. package/tests/unit/did/createBtcoDidDocument.test.ts +0 -67
  174. package/tests/unit/did/providers/OrdinalsClientProviderAdapter.test.ts +0 -159
  175. package/tests/unit/events/EventEmitter.test.ts +0 -407
  176. package/tests/unit/kinds/KindRegistry.test.ts +0 -329
  177. package/tests/unit/kinds/types.test.ts +0 -409
  178. package/tests/unit/kinds/validators.test.ts +0 -651
  179. package/tests/unit/lifecycle/BatchOperations.test.ts +0 -527
  180. package/tests/unit/lifecycle/LifecycleManager.cleanapi.test.ts +0 -441
  181. package/tests/unit/lifecycle/LifecycleManager.keymanagement.test.ts +0 -312
  182. package/tests/unit/lifecycle/LifecycleManager.prov.test.ts +0 -18
  183. package/tests/unit/lifecycle/LifecycleManager.test.ts +0 -213
  184. package/tests/unit/lifecycle/LifecycleManager.transfer.unit.test.ts +0 -30
  185. package/tests/unit/lifecycle/OriginalsAsset.test.ts +0 -176
  186. package/tests/unit/lifecycle/ProvenanceQuery.test.ts +0 -577
  187. package/tests/unit/lifecycle/ResourceVersioning.test.ts +0 -651
  188. package/tests/unit/resources/ResourceManager.test.ts +0 -740
  189. package/tests/unit/storage/MemoryStorageAdapter.test.ts +0 -93
  190. package/tests/unit/types/network.test.ts +0 -255
  191. package/tests/unit/utils/EventIntegration.test.ts +0 -384
  192. package/tests/unit/utils/Logger.test.ts +0 -473
  193. package/tests/unit/utils/MetricsCollector.test.ts +0 -358
  194. package/tests/unit/utils/bitcoin-address.test.ts +0 -250
  195. package/tests/unit/utils/cbor.test.ts +0 -35
  196. package/tests/unit/utils/encoding.test.ts +0 -318
  197. package/tests/unit/utils/hash.test.ts +0 -12
  198. package/tests/unit/utils/retry.test.ts +0 -100
  199. package/tests/unit/utils/satoshi-validation.test.ts +0 -354
  200. package/tests/unit/utils/serialization.test.ts +0 -124
  201. package/tests/unit/utils/telemetry.test.ts +0 -52
  202. package/tests/unit/utils/validation.test.ts +0 -141
  203. package/tests/unit/vc/CredentialManager.helpers.test.ts +0 -527
  204. package/tests/unit/vc/CredentialManager.test.ts +0 -487
  205. package/tests/unit/vc/Issuer.test.ts +0 -107
  206. package/tests/unit/vc/Verifier.test.ts +0 -525
  207. package/tests/unit/vc/bbs.test.ts +0 -282
  208. package/tests/unit/vc/cryptosuites/eddsa.test.ts +0 -398
  209. package/tests/unit/vc/documentLoader.test.ts +0 -121
  210. package/tests/unit/vc/proofs/data-integrity.test.ts +0 -24
  211. package/tsconfig.json +0 -31
  212. package/tsconfig.test.json +0 -15
@@ -1,435 +0,0 @@
1
- import { describe, test, expect, beforeEach, afterEach } from 'bun:test';
2
- import { WebVHManager } from '../../../src/did/WebVHManager';
3
- import * as fs from 'fs';
4
- import * as path from 'path';
5
- import * as os from 'os';
6
-
7
- describe('WebVHManager', () => {
8
- let manager: WebVHManager;
9
- let tempDir: string;
10
-
11
- beforeEach(async () => {
12
- manager = new WebVHManager();
13
- // Create a temporary directory for test outputs
14
- tempDir = await fs.promises.mkdtemp(path.join(os.tmpdir(), 'webvh-test-'));
15
- });
16
-
17
- afterEach(async () => {
18
- // Clean up temporary directory
19
- try {
20
- await fs.promises.rm(tempDir, { recursive: true, force: true });
21
- } catch (err) {
22
- // Ignore cleanup errors
23
- }
24
- });
25
-
26
- describe('createDIDWebVH', () => {
27
- test('creates a valid did:webvh DID with document and log', async () => {
28
- const result = await manager.createDIDWebVH({
29
- domain: 'example.com',
30
- outputDir: tempDir,
31
- });
32
-
33
- // Verify DID format (includes SCID hash before domain)
34
- expect(result.did).toMatch(/^did:webvh:[A-Za-z0-9]+:example\.com$/);
35
-
36
- // Verify DID document structure
37
- expect(result.didDocument).toBeDefined();
38
- expect(result.didDocument.id).toBe(result.did);
39
- expect(result.didDocument['@context']).toContain('https://www.w3.org/ns/did/v1');
40
- expect(result.didDocument['@context']).toContain('https://w3id.org/security/multikey/v1');
41
-
42
- // Verify verification methods
43
- expect(result.didDocument.verificationMethod).toBeDefined();
44
- expect(Array.isArray(result.didDocument.verificationMethod)).toBe(true);
45
- expect(result.didDocument.verificationMethod!.length).toBeGreaterThan(0);
46
-
47
- // Verify authentication and assertion methods
48
- expect(result.didDocument.authentication).toBeDefined();
49
- expect(result.didDocument.assertionMethod).toBeDefined();
50
-
51
- // Verify key pair
52
- expect(result.keyPair).toBeDefined();
53
- expect(result.keyPair.publicKey).toMatch(/^z/);
54
- expect(result.keyPair.privateKey).toMatch(/^z/);
55
-
56
- // Verify log
57
- expect(result.log).toBeDefined();
58
- expect(Array.isArray(result.log)).toBe(true);
59
- expect(result.log.length).toBeGreaterThan(0);
60
-
61
- // Verify first log entry
62
- const firstEntry = result.log[0];
63
- expect(firstEntry.versionId).toBeDefined();
64
- expect(firstEntry.versionTime).toBeDefined();
65
- expect(firstEntry.state).toBeDefined();
66
- expect(firstEntry.proof).toBeDefined();
67
-
68
- // Verify log path
69
- expect(result.logPath).toBeDefined();
70
- expect(result.logPath).toContain('did.jsonl');
71
- }, 10000);
72
-
73
- test('creates DID with custom paths', async () => {
74
- const result = await manager.createDIDWebVH({
75
- domain: 'example.com',
76
- paths: ['users', 'alice'],
77
- outputDir: tempDir,
78
- });
79
-
80
- expect(result.did).toMatch(/^did:webvh:[A-Za-z0-9]+:example\.com:users:alice$/);
81
- }, 10000);
82
-
83
- test('creates portable DID when specified', async () => {
84
- const result = await manager.createDIDWebVH({
85
- domain: 'example.com',
86
- portable: true,
87
- outputDir: tempDir,
88
- });
89
-
90
- expect(result.didDocument).toBeDefined();
91
- expect(result.log).toBeDefined();
92
- // Verify portable flag in log metadata
93
- const firstEntry = result.log[0];
94
- expect(firstEntry.parameters).toBeDefined();
95
- }, 10000);
96
-
97
- test('uses provided key pair when given', async () => {
98
- // First, generate a key pair
99
- const keyManager = new (await import('../../../src/did/KeyManager')).KeyManager();
100
- const customKeyPair = await keyManager.generateKeyPair('Ed25519');
101
-
102
- const result = await manager.createDIDWebVH({
103
- domain: 'example.com',
104
- keyPair: customKeyPair,
105
- outputDir: tempDir,
106
- });
107
-
108
- // Verify the same key pair is used
109
- expect(result.keyPair.publicKey).toBe(customKeyPair.publicKey);
110
- expect(result.keyPair.privateKey).toBe(customKeyPair.privateKey);
111
- }, 10000);
112
-
113
- test('creates DID without saving log when outputDir is not provided', async () => {
114
- const result = await manager.createDIDWebVH({
115
- domain: 'example.com',
116
- });
117
-
118
- expect(result.did).toBeDefined();
119
- expect(result.didDocument).toBeDefined();
120
- expect(result.log).toBeDefined();
121
- expect(result.logPath).toBeUndefined();
122
- }, 10000);
123
- });
124
-
125
- describe('saveDIDLog', () => {
126
- test('saves log to correct path for simple DID', async () => {
127
- const result = await manager.createDIDWebVH({
128
- domain: 'example.com',
129
- outputDir: tempDir,
130
- });
131
-
132
- expect(result.logPath).toBeDefined();
133
-
134
- // Verify file exists
135
- const fileExists = await fs.promises.access(result.logPath!)
136
- .then(() => true)
137
- .catch(() => false);
138
- expect(fileExists).toBe(true);
139
-
140
- // Verify file content
141
- const content = await fs.promises.readFile(result.logPath!, 'utf8');
142
- const lines = content.trim().split('\n');
143
- expect(lines.length).toBe(result.log.length);
144
-
145
- // Verify each line is valid JSON
146
- lines.forEach(line => {
147
- expect(() => JSON.parse(line)).not.toThrow();
148
- });
149
- }, 10000);
150
-
151
- test('saves log to correct path with nested paths', async () => {
152
- const result = await manager.createDIDWebVH({
153
- domain: 'example.com',
154
- paths: ['users', 'alice'],
155
- outputDir: tempDir,
156
- });
157
-
158
- expect(result.logPath).toBeDefined();
159
- expect(result.logPath).toContain(path.join('users', 'alice'));
160
-
161
- // Verify file exists
162
- const fileExists = await fs.promises.access(result.logPath!)
163
- .then(() => true)
164
- .catch(() => false);
165
- expect(fileExists).toBe(true);
166
- }, 10000);
167
-
168
- test('creates nested directories as needed', async () => {
169
- const deepPath = path.join(tempDir, 'deep', 'nested', 'structure');
170
-
171
- const result = await manager.createDIDWebVH({
172
- domain: 'example.com',
173
- paths: ['level1', 'level2'],
174
- outputDir: deepPath,
175
- });
176
-
177
- expect(result.logPath).toBeDefined();
178
-
179
- // Verify file exists in nested structure
180
- const fileExists = await fs.promises.access(result.logPath!)
181
- .then(() => true)
182
- .catch(() => false);
183
- expect(fileExists).toBe(true);
184
- }, 10000);
185
- });
186
-
187
- describe('loadDIDLog', () => {
188
- test('loads saved DID log correctly', async () => {
189
- // First create and save a DID
190
- const createResult = await manager.createDIDWebVH({
191
- domain: 'example.com',
192
- outputDir: tempDir,
193
- });
194
-
195
- expect(createResult.logPath).toBeDefined();
196
-
197
- // Load the log
198
- const loadedLog = await manager.loadDIDLog(createResult.logPath!);
199
-
200
- // Verify loaded log matches original
201
- expect(loadedLog.length).toBe(createResult.log.length);
202
- expect(loadedLog[0].versionId).toBe(createResult.log[0].versionId);
203
- expect(loadedLog[0].versionTime).toBe(createResult.log[0].versionTime);
204
- }, 10000);
205
- });
206
-
207
- describe('saveDIDLog error handling', () => {
208
- test('throws error for invalid DID format (missing parts)', async () => {
209
- const validLog = [{
210
- versionId: '1',
211
- versionTime: new Date().toISOString(),
212
- parameters: {},
213
- state: {}
214
- }];
215
-
216
- await expect(
217
- manager.saveDIDLog('invalid:did', validLog, tempDir)
218
- ).rejects.toThrow('Invalid did:webvh format');
219
- }, 10000);
220
-
221
- test('throws error for non-webvh DID', async () => {
222
- const validLog = [{
223
- versionId: '1',
224
- versionTime: new Date().toISOString(),
225
- parameters: {},
226
- state: {}
227
- }];
228
-
229
- await expect(
230
- manager.saveDIDLog('did:key:abc123', validLog, tempDir)
231
- ).rejects.toThrow('Invalid did:webvh format');
232
- }, 10000);
233
-
234
- test('saves DID without path parts correctly', async () => {
235
- const validLog = [{
236
- versionId: '1',
237
- versionTime: new Date().toISOString(),
238
- parameters: {},
239
- state: {}
240
- }];
241
-
242
- const logPath = await manager.saveDIDLog('did:webvh:example.com', validLog, tempDir);
243
-
244
- expect(logPath).toContain('did.jsonl');
245
- expect(logPath.startsWith(tempDir)).toBe(true);
246
-
247
- // Verify file exists
248
- const fileExists = await fs.promises.access(logPath)
249
- .then(() => true)
250
- .catch(() => false);
251
- expect(fileExists).toBe(true);
252
- }, 10000);
253
-
254
- test('handles URL-encoded domain correctly', async () => {
255
- const validLog = [{
256
- versionId: '1',
257
- versionTime: new Date().toISOString(),
258
- parameters: {},
259
- state: {}
260
- }];
261
-
262
- const logPath = await manager.saveDIDLog('did:webvh:localhost%3A5000:test', validLog, tempDir);
263
-
264
- expect(logPath).toBeDefined();
265
- expect(logPath.startsWith(tempDir)).toBe(true);
266
- }, 10000);
267
-
268
- test('rejects empty path segments', async () => {
269
- const validLog = [{
270
- versionId: '1',
271
- versionTime: new Date().toISOString(),
272
- parameters: {},
273
- state: {}
274
- }];
275
-
276
- await expect(
277
- manager.saveDIDLog('did:webvh:example.com::test', validLog, tempDir)
278
- ).rejects.toThrow('Invalid path segment in DID');
279
- }, 10000);
280
-
281
- test('throws error when resolved path escapes base directory', async () => {
282
- const validLog = [{
283
- versionId: '1',
284
- versionTime: new Date().toISOString(),
285
- parameters: {},
286
- state: {}
287
- }];
288
-
289
- // This should be caught by the validation, but testing defense in depth
290
- // Create a mock DID that would try to escape (though validation prevents it)
291
- await expect(
292
- manager.saveDIDLog('did:webvh:example.com:..', validLog, tempDir)
293
- ).rejects.toThrow();
294
- }, 10000);
295
- });
296
-
297
- describe('security: path traversal prevention', () => {
298
- test('rejects DIDs with ".." in path segments', async () => {
299
- await expect(
300
- manager.createDIDWebVH({
301
- domain: 'example.com',
302
- paths: ['..', 'etc', 'passwd'],
303
- outputDir: tempDir,
304
- })
305
- ).rejects.toThrow('Invalid path segment in DID');
306
- }, 10000);
307
-
308
- test('rejects DIDs with "." in path segments', async () => {
309
- await expect(
310
- manager.createDIDWebVH({
311
- domain: 'example.com',
312
- paths: ['.', 'secret'],
313
- outputDir: tempDir,
314
- })
315
- ).rejects.toThrow('Invalid path segment in DID');
316
- }, 10000);
317
-
318
- test('rejects DIDs with path separators in segments', async () => {
319
- await expect(
320
- manager.createDIDWebVH({
321
- domain: 'example.com',
322
- paths: ['users/../../etc', 'passwd'],
323
- outputDir: tempDir,
324
- })
325
- ).rejects.toThrow('Invalid path segment in DID');
326
- }, 10000);
327
-
328
- test('rejects DIDs with backslashes in path segments', async () => {
329
- await expect(
330
- manager.createDIDWebVH({
331
- domain: 'example.com',
332
- paths: ['users\\..\\..\\etc', 'passwd'],
333
- outputDir: tempDir,
334
- })
335
- ).rejects.toThrow('Invalid path segment in DID');
336
- }, 10000);
337
-
338
- test('rejects DIDs with null bytes in path segments', async () => {
339
- await expect(
340
- manager.createDIDWebVH({
341
- domain: 'example.com',
342
- paths: ['users\0etc', 'passwd'],
343
- outputDir: tempDir,
344
- })
345
- ).rejects.toThrow('Invalid path segment in DID');
346
- }, 10000);
347
-
348
- test('rejects DIDs with absolute paths (Unix)', async () => {
349
- await expect(
350
- manager.createDIDWebVH({
351
- domain: 'example.com',
352
- paths: ['/etc/passwd'],
353
- outputDir: tempDir,
354
- })
355
- ).rejects.toThrow('Invalid path segment in DID');
356
- }, 10000);
357
-
358
- test('rejects DIDs with absolute paths (Windows)', async () => {
359
- await expect(
360
- manager.createDIDWebVH({
361
- domain: 'example.com',
362
- paths: ['C:\\Windows\\System32'],
363
- outputDir: tempDir,
364
- })
365
- ).rejects.toThrow('Invalid path segment in DID');
366
- }, 10000);
367
-
368
- test('accepts valid alphanumeric path segments', async () => {
369
- const result = await manager.createDIDWebVH({
370
- domain: 'example.com',
371
- paths: ['users', 'alice123', 'profile'],
372
- outputDir: tempDir,
373
- });
374
-
375
- expect(result.did).toBeDefined();
376
- expect(result.logPath).toBeDefined();
377
-
378
- // Verify file was created in the correct location
379
- const fileExists = await fs.promises.access(result.logPath!)
380
- .then(() => true)
381
- .catch(() => false);
382
- expect(fileExists).toBe(true);
383
-
384
- // Verify path is within temp directory
385
- expect(result.logPath!.startsWith(tempDir)).toBe(true);
386
- }, 10000);
387
-
388
- test('accepts valid path segments with hyphens and underscores', async () => {
389
- const result = await manager.createDIDWebVH({
390
- domain: 'example.com',
391
- paths: ['my-org', 'user_name', 'test-123'],
392
- outputDir: tempDir,
393
- });
394
-
395
- expect(result.did).toBeDefined();
396
- expect(result.logPath).toBeDefined();
397
- expect(result.logPath!.startsWith(tempDir)).toBe(true);
398
- }, 10000);
399
- });
400
-
401
- describe('integration with didwebvh-ts', () => {
402
- test('creates cryptographically valid DID with proper proofs', async () => {
403
- const result = await manager.createDIDWebVH({
404
- domain: 'example.com',
405
- outputDir: tempDir,
406
- });
407
-
408
- // Verify proof exists and has required fields
409
- const firstEntry = result.log[0];
410
- expect(firstEntry.proof).toBeDefined();
411
- expect(Array.isArray(firstEntry.proof)).toBe(true);
412
- expect(firstEntry.proof!.length).toBeGreaterThan(0);
413
-
414
- const proof = firstEntry.proof![0];
415
- expect(proof.type).toBeDefined();
416
- expect(proof.cryptosuite).toBeDefined();
417
- expect(proof.verificationMethod).toBeDefined();
418
- expect(proof.created).toBeDefined();
419
- expect(proof.proofValue).toBeDefined();
420
- expect(proof.proofPurpose).toBeDefined();
421
- }, 10000);
422
-
423
- test('creates DID with proper SCID', async () => {
424
- const result = await manager.createDIDWebVH({
425
- domain: 'example.com',
426
- outputDir: tempDir,
427
- });
428
-
429
- const firstEntry = result.log[0];
430
- expect(firstEntry.parameters).toBeDefined();
431
- expect(firstEntry.parameters.scid).toBeDefined();
432
- expect(typeof firstEntry.parameters.scid).toBe('string');
433
- }, 10000);
434
- });
435
- });
@@ -1,67 +0,0 @@
1
- import { describe, test, expect, it } from 'bun:test';
2
- import { createBtcoDidDocument } from '../../../src/did/createBtcoDidDocument';
3
- import { multikey } from '../../../src/crypto/Multikey';
4
-
5
- function rangeBytes(len: number, start: number): Uint8Array {
6
- return new Uint8Array(len).map((_, i) => (start + i) & 0xff);
7
- }
8
-
9
- describe('createBtcoDidDocument', () => {
10
- it('creates document for mainnet with deterministic fragment and relationships', () => {
11
- const pub = rangeBytes(32, 1);
12
- const doc = createBtcoDidDocument('1066296127976657', 'mainnet', { publicKey: pub, keyType: 'Ed25519' });
13
- expect(doc['@context']).toEqual([
14
- 'https://www.w3.org/ns/did/v1',
15
- 'https://w3id.org/security/multikey/v1'
16
- ]);
17
- expect(doc.id).toBe('did:btco:1066296127976657');
18
- expect(doc.verificationMethod?.length).toBe(1);
19
- const vm = doc.verificationMethod![0];
20
- expect(vm.id).toBe('did:btco:1066296127976657#0');
21
- expect(vm.type).toBe('Multikey');
22
- expect(vm.controller).toBe(doc.id);
23
- expect(doc.authentication).toEqual([vm.id]);
24
- expect(doc.assertionMethod).toEqual([vm.id]);
25
- const decoded = multikey.decodePublicKey(vm.publicKeyMultibase);
26
- expect(decoded.type).toBe('Ed25519');
27
- expect(Array.from(decoded.key)).toEqual(Array.from(pub));
28
- });
29
-
30
- it('creates document for regtest with proper prefix', () => {
31
- const pub = rangeBytes(33, 3);
32
- const doc = createBtcoDidDocument(123456, 'regtest', { publicKey: pub, keyType: 'Secp256k1' });
33
- expect(doc.id).toBe('did:btco:reg:123456');
34
- const vm = doc.verificationMethod![0];
35
- expect(vm.id).toBe('did:btco:reg:123456#0');
36
- const decoded = multikey.decodePublicKey(vm.publicKeyMultibase);
37
- expect(decoded.type).toBe('Secp256k1');
38
- expect(Array.from(decoded.key)).toEqual(Array.from(pub));
39
- });
40
-
41
- it('creates document for signet with proper prefix', () => {
42
- const pub = rangeBytes(96, 5);
43
- const doc = createBtcoDidDocument(999, 'signet', { publicKey: pub, keyType: 'Bls12381G2' });
44
- expect(doc.id).toBe('did:btco:sig:999');
45
- const vm = doc.verificationMethod![0];
46
- expect(vm.id).toBe('did:btco:sig:999#0');
47
- const decoded = multikey.decodePublicKey(vm.publicKeyMultibase);
48
- expect(decoded.type).toBe('Bls12381G2');
49
- expect(Array.from(decoded.key)).toEqual(Array.from(pub));
50
- });
51
-
52
- it('supports overriding controller', () => {
53
- const pub = rangeBytes(32, 7);
54
- const controller = 'did:example:controller';
55
- const doc = createBtcoDidDocument('42', 'mainnet', { publicKey: pub, keyType: 'Ed25519', controller });
56
- expect(doc.verificationMethod![0].controller).toBe(controller);
57
- });
58
-
59
- it('throws on unsupported network', () => {
60
- const pub = rangeBytes(32, 9);
61
- expect(() =>
62
- // @ts-expect-error testing invalid network
63
- createBtcoDidDocument('1', 'testnet', { publicKey: pub, keyType: 'Ed25519' })
64
- ).toThrow('Unsupported Bitcoin network: testnet');
65
- });
66
- });
67
-
@@ -1,159 +0,0 @@
1
- import { describe, test, expect, beforeEach, afterEach, mock } from 'bun:test';
2
- import { OrdinalsClient } from '../../../../src/bitcoin/OrdinalsClient';
3
- import { OrdinalsClientProviderAdapter } from '../../../../src/did/providers/OrdinalsClientProviderAdapter';
4
-
5
- describe('OrdinalsClientProviderAdapter.resolveInscription', () => {
6
- const inscriptionId = 'insc123';
7
- const originalFetch = global.fetch as any;
8
-
9
- beforeEach(() => {
10
- // Bun doesn't require resetAllMocks
11
- });
12
-
13
- afterEach(() => {
14
- (global as any).fetch = originalFetch;
15
- });
16
-
17
- test('throws when baseUrl is missing/empty', async () => {
18
- const client = new OrdinalsClient('http://rpc', 'mainnet');
19
- const adapter = new OrdinalsClientProviderAdapter(client, '');
20
- await expect(adapter.resolveInscription(inscriptionId)).rejects.toThrow('OrdinalsClientProviderAdapter requires a baseUrl');
21
- });
22
-
23
- test('throws when inscription endpoint returns non-OK', async () => {
24
- const client = new OrdinalsClient('http://rpc', 'mainnet');
25
- const adapter = new OrdinalsClientProviderAdapter(client, 'https://api.example.com/');
26
-
27
- const fetchMock = mock(() => Promise.resolve({ ok: false, status: 500, json: async () => ({}) }));
28
- (globalThis as any).fetch = fetchMock;
29
-
30
- await expect(adapter.resolveInscription(inscriptionId)).rejects.toThrow(`Failed to resolve inscription: ${inscriptionId}`);
31
-
32
- expect(fetchMock).toHaveBeenCalledTimes(1);
33
- expect(fetchMock).toHaveBeenCalledWith(
34
- 'https://api.example.com/inscription/insc123',
35
- expect.objectContaining({
36
- headers: { Accept: 'application/json' },
37
- signal: expect.any(AbortSignal)
38
- })
39
- );
40
- });
41
-
42
- test('maps fields correctly when JSON has explicit values and numeric sat', async () => {
43
- const client = new OrdinalsClient('http://rpc', 'mainnet');
44
- const adapter = new OrdinalsClientProviderAdapter(client, 'https://ord.example');
45
-
46
- const apiResponse = {
47
- inscription_id: 'abc123',
48
- sat: 42,
49
- content_type: 'image/png',
50
- content_url: 'https://cdn.example/abc123.png'
51
- };
52
-
53
- const fetchMock = mock(() => Promise.resolve({ ok: true, json: async () => apiResponse }));
54
- (globalThis as any).fetch = fetchMock;
55
-
56
- const result = await adapter.resolveInscription(inscriptionId);
57
-
58
- expect(result).toEqual({
59
- id: 'abc123',
60
- sat: 42,
61
- content_type: 'image/png',
62
- content_url: 'https://cdn.example/abc123.png'
63
- });
64
-
65
- expect(fetchMock).toHaveBeenCalledTimes(1);
66
- expect(fetchMock).toHaveBeenCalledWith(
67
- 'https://ord.example/inscription/insc123',
68
- expect.objectContaining({
69
- headers: { Accept: 'application/json' },
70
- signal: expect.any(AbortSignal)
71
- })
72
- );
73
- });
74
-
75
- test('applies fallbacks and coerces string sat to number', async () => {
76
- const client = new OrdinalsClient('http://rpc', 'mainnet');
77
- const adapter = new OrdinalsClientProviderAdapter(client, 'https://api.example.com/');
78
-
79
- const apiResponse = {
80
- sat: '007'
81
- // missing inscription_id, content_type, content_url
82
- } as any;
83
-
84
- const fetchMock = mock(() => Promise.resolve({ ok: true, json: async () => apiResponse }));
85
- (globalThis as any).fetch = fetchMock;
86
-
87
- const result = await adapter.resolveInscription(inscriptionId);
88
-
89
- expect(result).toEqual({
90
- id: 'insc123',
91
- sat: 7,
92
- content_type: 'text/plain',
93
- content_url: 'https://api.example.com/content/insc123'
94
- });
95
-
96
- expect(fetchMock).toHaveBeenCalledTimes(1);
97
- expect(fetchMock).toHaveBeenCalledWith(
98
- 'https://api.example.com/inscription/insc123',
99
- expect.objectContaining({
100
- headers: { Accept: 'application/json' },
101
- signal: expect.any(AbortSignal)
102
- })
103
- );
104
- });
105
-
106
- test('applies default sat=0 when sat is missing', async () => {
107
- const client = new OrdinalsClient('http://rpc', 'mainnet');
108
- const adapter = new OrdinalsClientProviderAdapter(client, 'https://api.example.com/');
109
-
110
- const apiResponse = { } as any;
111
-
112
- const fetchMock = mock(() => Promise.resolve({ ok: true, json: async () => apiResponse }));
113
- (globalThis as any).fetch = fetchMock;
114
-
115
- const result = await adapter.resolveInscription(inscriptionId);
116
-
117
- expect(result).toEqual({
118
- id: 'insc123',
119
- sat: 0,
120
- content_type: 'text/plain',
121
- content_url: 'https://api.example.com/content/insc123'
122
- });
123
-
124
- expect(fetchMock).toHaveBeenCalledTimes(1);
125
- expect(fetchMock).toHaveBeenCalledWith(
126
- 'https://api.example.com/inscription/insc123',
127
- expect.objectContaining({
128
- headers: { Accept: 'application/json' },
129
- signal: expect.any(AbortSignal)
130
- })
131
- );
132
- });
133
-
134
- test('getSatInfo proxies to client.getSatInfo', async () => {
135
- const mockClient = {
136
- getSatInfo: mock(async (n: string) => ({ inscription_ids: ['a', 'b'] })),
137
- getMetadata: mock()
138
- } as unknown as OrdinalsClient;
139
-
140
- const adapter = new OrdinalsClientProviderAdapter(mockClient, 'https://x');
141
- const result = await adapter.getSatInfo('12345');
142
- expect(result).toEqual({ inscription_ids: ['a', 'b'] });
143
- expect((mockClient as any).getSatInfo).toHaveBeenCalledWith('12345');
144
- });
145
-
146
- test('getMetadata proxies to client.getMetadata', async () => {
147
- const expected = { hello: 'world' };
148
- const mockClient = {
149
- getSatInfo: mock(),
150
- getMetadata: mock(async (id: string) => expected)
151
- } as unknown as OrdinalsClient;
152
-
153
- const adapter = new OrdinalsClientProviderAdapter(mockClient, 'https://x');
154
- const result = await adapter.getMetadata('iid');
155
- expect(result).toBe(expected);
156
- expect((mockClient as any).getMetadata).toHaveBeenCalledWith('iid');
157
- });
158
- });
159
-