@originals/sdk 1.4.2 → 1.4.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +4 -1
- package/.eslintrc.json +0 -33
- package/src/adapters/FeeOracleMock.ts +0 -9
- package/src/adapters/index.ts +0 -5
- package/src/adapters/providers/OrdHttpProvider.ts +0 -126
- package/src/adapters/providers/OrdMockProvider.ts +0 -101
- package/src/adapters/types.ts +0 -66
- package/src/bitcoin/BitcoinManager.ts +0 -330
- package/src/bitcoin/BroadcastClient.ts +0 -54
- package/src/bitcoin/OrdinalsClient.ts +0 -119
- package/src/bitcoin/PSBTBuilder.ts +0 -106
- package/src/bitcoin/fee-calculation.ts +0 -38
- package/src/bitcoin/providers/OrdNodeProvider.ts +0 -92
- package/src/bitcoin/providers/OrdinalsProvider.ts +0 -56
- package/src/bitcoin/providers/types.ts +0 -59
- package/src/bitcoin/transactions/commit.ts +0 -465
- package/src/bitcoin/transactions/index.ts +0 -13
- package/src/bitcoin/transfer.ts +0 -43
- package/src/bitcoin/utxo-selection.ts +0 -322
- package/src/bitcoin/utxo.ts +0 -113
- package/src/contexts/credentials-v1.json +0 -237
- package/src/contexts/credentials-v2-examples.json +0 -5
- package/src/contexts/credentials-v2.json +0 -340
- package/src/contexts/credentials.json +0 -237
- package/src/contexts/data-integrity-v2.json +0 -81
- package/src/contexts/dids.json +0 -58
- package/src/contexts/ed255192020.json +0 -93
- package/src/contexts/ordinals-plus.json +0 -23
- package/src/contexts/originals.json +0 -22
- package/src/core/OriginalsSDK.ts +0 -416
- package/src/crypto/Multikey.ts +0 -194
- package/src/crypto/Signer.ts +0 -254
- package/src/crypto/noble-init.ts +0 -121
- package/src/did/BtcoDidResolver.ts +0 -227
- package/src/did/DIDManager.ts +0 -694
- package/src/did/Ed25519Verifier.ts +0 -68
- package/src/did/KeyManager.ts +0 -236
- package/src/did/WebVHManager.ts +0 -498
- package/src/did/createBtcoDidDocument.ts +0 -59
- package/src/did/providers/OrdinalsClientProviderAdapter.ts +0 -68
- package/src/events/EventEmitter.ts +0 -222
- package/src/events/index.ts +0 -19
- package/src/events/types.ts +0 -331
- package/src/examples/basic-usage.ts +0 -78
- package/src/examples/create-module-original.ts +0 -435
- package/src/examples/full-lifecycle-flow.ts +0 -514
- package/src/examples/run.ts +0 -60
- package/src/index.ts +0 -150
- package/src/kinds/KindRegistry.ts +0 -290
- package/src/kinds/index.ts +0 -74
- package/src/kinds/types.ts +0 -470
- package/src/kinds/validators/AgentValidator.ts +0 -257
- package/src/kinds/validators/AppValidator.ts +0 -211
- package/src/kinds/validators/DatasetValidator.ts +0 -242
- package/src/kinds/validators/DocumentValidator.ts +0 -311
- package/src/kinds/validators/MediaValidator.ts +0 -269
- package/src/kinds/validators/ModuleValidator.ts +0 -225
- package/src/kinds/validators/base.ts +0 -276
- package/src/kinds/validators/index.ts +0 -12
- package/src/lifecycle/BatchOperations.ts +0 -373
- package/src/lifecycle/LifecycleManager.ts +0 -2126
- package/src/lifecycle/OriginalsAsset.ts +0 -524
- package/src/lifecycle/ProvenanceQuery.ts +0 -280
- package/src/lifecycle/ResourceVersioning.ts +0 -163
- package/src/migration/MigrationManager.ts +0 -527
- package/src/migration/audit/AuditLogger.ts +0 -176
- package/src/migration/checkpoint/CheckpointManager.ts +0 -112
- package/src/migration/checkpoint/CheckpointStorage.ts +0 -101
- package/src/migration/index.ts +0 -33
- package/src/migration/operations/BaseMigration.ts +0 -126
- package/src/migration/operations/PeerToBtcoMigration.ts +0 -105
- package/src/migration/operations/PeerToWebvhMigration.ts +0 -62
- package/src/migration/operations/WebvhToBtcoMigration.ts +0 -105
- package/src/migration/rollback/RollbackManager.ts +0 -170
- package/src/migration/state/StateMachine.ts +0 -92
- package/src/migration/state/StateTracker.ts +0 -156
- package/src/migration/types.ts +0 -344
- package/src/migration/validation/BitcoinValidator.ts +0 -107
- package/src/migration/validation/CredentialValidator.ts +0 -62
- package/src/migration/validation/DIDCompatibilityValidator.ts +0 -151
- package/src/migration/validation/LifecycleValidator.ts +0 -64
- package/src/migration/validation/StorageValidator.ts +0 -79
- package/src/migration/validation/ValidationPipeline.ts +0 -213
- package/src/resources/ResourceManager.ts +0 -655
- package/src/resources/index.ts +0 -21
- package/src/resources/types.ts +0 -202
- package/src/storage/LocalStorageAdapter.ts +0 -61
- package/src/storage/MemoryStorageAdapter.ts +0 -29
- package/src/storage/StorageAdapter.ts +0 -25
- package/src/storage/index.ts +0 -3
- package/src/types/bitcoin.ts +0 -98
- package/src/types/common.ts +0 -92
- package/src/types/credentials.ts +0 -88
- package/src/types/did.ts +0 -31
- package/src/types/external-shims.d.ts +0 -53
- package/src/types/index.ts +0 -7
- package/src/types/network.ts +0 -175
- package/src/utils/EventLogger.ts +0 -298
- package/src/utils/Logger.ts +0 -322
- package/src/utils/MetricsCollector.ts +0 -358
- package/src/utils/bitcoin-address.ts +0 -130
- package/src/utils/cbor.ts +0 -12
- package/src/utils/encoding.ts +0 -127
- package/src/utils/hash.ts +0 -6
- package/src/utils/retry.ts +0 -46
- package/src/utils/satoshi-validation.ts +0 -196
- package/src/utils/serialization.ts +0 -96
- package/src/utils/telemetry.ts +0 -40
- package/src/utils/validation.ts +0 -119
- package/src/vc/CredentialManager.ts +0 -918
- package/src/vc/Issuer.ts +0 -100
- package/src/vc/Verifier.ts +0 -47
- package/src/vc/cryptosuites/bbs.ts +0 -253
- package/src/vc/cryptosuites/bbsSimple.ts +0 -21
- package/src/vc/cryptosuites/eddsa.ts +0 -99
- package/src/vc/documentLoader.ts +0 -67
- package/src/vc/proofs/data-integrity.ts +0 -33
- package/src/vc/utils/jsonld.ts +0 -18
- package/tests/__mocks__/bbs-signatures.js +0 -17
- package/tests/__mocks__/mf-base58.js +0 -24
- package/tests/fixtures/did-documents.ts +0 -247
- package/tests/index.test.ts +0 -21
- package/tests/integration/BatchOperations.test.ts +0 -531
- package/tests/integration/CompleteLifecycle.e2e.test.ts +0 -735
- package/tests/integration/CredentialManager.test.ts +0 -42
- package/tests/integration/DIDManager.test.ts +0 -41
- package/tests/integration/DidPeerToWebVhFlow.test.ts +0 -351
- package/tests/integration/Events.test.ts +0 -435
- package/tests/integration/Lifecycle.transfer.btco.integration.test.ts +0 -25
- package/tests/integration/LifecycleManager.test.ts +0 -21
- package/tests/integration/MultikeyFlow.test.ts +0 -52
- package/tests/integration/TelemetryIntegration.test.ts +0 -395
- package/tests/integration/WebVhPublish.test.ts +0 -48
- package/tests/integration/createTypedOriginal.test.ts +0 -379
- package/tests/integration/migration/peer-to-webvh.test.ts +0 -172
- package/tests/manual/test-commit-creation.ts +0 -323
- package/tests/mocks/MockKeyStore.ts +0 -38
- package/tests/mocks/adapters/MemoryStorageAdapter.ts +0 -24
- package/tests/mocks/adapters/MockFeeOracle.ts +0 -11
- package/tests/mocks/adapters/MockOrdinalsProvider.ts +0 -76
- package/tests/mocks/adapters/OrdMockProvider.test.ts +0 -176
- package/tests/mocks/adapters/index.ts +0 -6
- package/tests/performance/BatchOperations.perf.test.ts +0 -403
- package/tests/performance/logging.perf.test.ts +0 -336
- package/tests/sdk.test.ts +0 -43
- package/tests/security/bitcoin-penetration-tests.test.ts +0 -622
- package/tests/setup.bun.ts +0 -69
- package/tests/setup.jest.ts +0 -23
- package/tests/stress/batch-operations-stress.test.ts +0 -571
- package/tests/unit/adapters/FeeOracleMock.test.ts +0 -40
- package/tests/unit/bitcoin/BitcoinManager.test.ts +0 -293
- package/tests/unit/bitcoin/BroadcastClient.test.ts +0 -52
- package/tests/unit/bitcoin/OrdNodeProvider.test.ts +0 -53
- package/tests/unit/bitcoin/OrdinalsClient.test.ts +0 -381
- package/tests/unit/bitcoin/OrdinalsClientProvider.test.ts +0 -102
- package/tests/unit/bitcoin/PSBTBuilder.test.ts +0 -84
- package/tests/unit/bitcoin/fee-calculation.test.ts +0 -261
- package/tests/unit/bitcoin/transactions/commit.test.ts +0 -649
- package/tests/unit/bitcoin/transfer.test.ts +0 -31
- package/tests/unit/bitcoin/utxo-selection-new.test.ts +0 -502
- package/tests/unit/bitcoin/utxo.more.test.ts +0 -39
- package/tests/unit/bitcoin/utxo.selection.test.ts +0 -38
- package/tests/unit/core/OriginalsSDK.test.ts +0 -152
- package/tests/unit/crypto/Multikey.test.ts +0 -206
- package/tests/unit/crypto/Signer.test.ts +0 -408
- package/tests/unit/did/BtcoDidResolver.test.ts +0 -611
- package/tests/unit/did/DIDManager.more.test.ts +0 -43
- package/tests/unit/did/DIDManager.test.ts +0 -185
- package/tests/unit/did/Ed25519Verifier.test.ts +0 -160
- package/tests/unit/did/KeyManager.test.ts +0 -452
- package/tests/unit/did/OrdinalsClientProviderAdapter.test.ts +0 -45
- package/tests/unit/did/WebVHManager.test.ts +0 -435
- package/tests/unit/did/createBtcoDidDocument.test.ts +0 -67
- package/tests/unit/did/providers/OrdinalsClientProviderAdapter.test.ts +0 -159
- package/tests/unit/events/EventEmitter.test.ts +0 -407
- package/tests/unit/kinds/KindRegistry.test.ts +0 -329
- package/tests/unit/kinds/types.test.ts +0 -409
- package/tests/unit/kinds/validators.test.ts +0 -651
- package/tests/unit/lifecycle/BatchOperations.test.ts +0 -527
- package/tests/unit/lifecycle/LifecycleManager.cleanapi.test.ts +0 -441
- package/tests/unit/lifecycle/LifecycleManager.keymanagement.test.ts +0 -312
- package/tests/unit/lifecycle/LifecycleManager.prov.test.ts +0 -18
- package/tests/unit/lifecycle/LifecycleManager.test.ts +0 -213
- package/tests/unit/lifecycle/LifecycleManager.transfer.unit.test.ts +0 -30
- package/tests/unit/lifecycle/OriginalsAsset.test.ts +0 -176
- package/tests/unit/lifecycle/ProvenanceQuery.test.ts +0 -577
- package/tests/unit/lifecycle/ResourceVersioning.test.ts +0 -651
- package/tests/unit/resources/ResourceManager.test.ts +0 -740
- package/tests/unit/storage/MemoryStorageAdapter.test.ts +0 -93
- package/tests/unit/types/network.test.ts +0 -255
- package/tests/unit/utils/EventIntegration.test.ts +0 -384
- package/tests/unit/utils/Logger.test.ts +0 -473
- package/tests/unit/utils/MetricsCollector.test.ts +0 -358
- package/tests/unit/utils/bitcoin-address.test.ts +0 -250
- package/tests/unit/utils/cbor.test.ts +0 -35
- package/tests/unit/utils/encoding.test.ts +0 -318
- package/tests/unit/utils/hash.test.ts +0 -12
- package/tests/unit/utils/retry.test.ts +0 -100
- package/tests/unit/utils/satoshi-validation.test.ts +0 -354
- package/tests/unit/utils/serialization.test.ts +0 -124
- package/tests/unit/utils/telemetry.test.ts +0 -52
- package/tests/unit/utils/validation.test.ts +0 -141
- package/tests/unit/vc/CredentialManager.helpers.test.ts +0 -527
- package/tests/unit/vc/CredentialManager.test.ts +0 -487
- package/tests/unit/vc/Issuer.test.ts +0 -107
- package/tests/unit/vc/Verifier.test.ts +0 -525
- package/tests/unit/vc/bbs.test.ts +0 -282
- package/tests/unit/vc/cryptosuites/eddsa.test.ts +0 -398
- package/tests/unit/vc/documentLoader.test.ts +0 -121
- package/tests/unit/vc/proofs/data-integrity.test.ts +0 -24
- package/tsconfig.json +0 -31
- package/tsconfig.test.json +0 -15
|
@@ -1,435 +0,0 @@
|
|
|
1
|
-
import { describe, test, expect, beforeEach, afterEach } from 'bun:test';
|
|
2
|
-
import { WebVHManager } from '../../../src/did/WebVHManager';
|
|
3
|
-
import * as fs from 'fs';
|
|
4
|
-
import * as path from 'path';
|
|
5
|
-
import * as os from 'os';
|
|
6
|
-
|
|
7
|
-
describe('WebVHManager', () => {
|
|
8
|
-
let manager: WebVHManager;
|
|
9
|
-
let tempDir: string;
|
|
10
|
-
|
|
11
|
-
beforeEach(async () => {
|
|
12
|
-
manager = new WebVHManager();
|
|
13
|
-
// Create a temporary directory for test outputs
|
|
14
|
-
tempDir = await fs.promises.mkdtemp(path.join(os.tmpdir(), 'webvh-test-'));
|
|
15
|
-
});
|
|
16
|
-
|
|
17
|
-
afterEach(async () => {
|
|
18
|
-
// Clean up temporary directory
|
|
19
|
-
try {
|
|
20
|
-
await fs.promises.rm(tempDir, { recursive: true, force: true });
|
|
21
|
-
} catch (err) {
|
|
22
|
-
// Ignore cleanup errors
|
|
23
|
-
}
|
|
24
|
-
});
|
|
25
|
-
|
|
26
|
-
describe('createDIDWebVH', () => {
|
|
27
|
-
test('creates a valid did:webvh DID with document and log', async () => {
|
|
28
|
-
const result = await manager.createDIDWebVH({
|
|
29
|
-
domain: 'example.com',
|
|
30
|
-
outputDir: tempDir,
|
|
31
|
-
});
|
|
32
|
-
|
|
33
|
-
// Verify DID format (includes SCID hash before domain)
|
|
34
|
-
expect(result.did).toMatch(/^did:webvh:[A-Za-z0-9]+:example\.com$/);
|
|
35
|
-
|
|
36
|
-
// Verify DID document structure
|
|
37
|
-
expect(result.didDocument).toBeDefined();
|
|
38
|
-
expect(result.didDocument.id).toBe(result.did);
|
|
39
|
-
expect(result.didDocument['@context']).toContain('https://www.w3.org/ns/did/v1');
|
|
40
|
-
expect(result.didDocument['@context']).toContain('https://w3id.org/security/multikey/v1');
|
|
41
|
-
|
|
42
|
-
// Verify verification methods
|
|
43
|
-
expect(result.didDocument.verificationMethod).toBeDefined();
|
|
44
|
-
expect(Array.isArray(result.didDocument.verificationMethod)).toBe(true);
|
|
45
|
-
expect(result.didDocument.verificationMethod!.length).toBeGreaterThan(0);
|
|
46
|
-
|
|
47
|
-
// Verify authentication and assertion methods
|
|
48
|
-
expect(result.didDocument.authentication).toBeDefined();
|
|
49
|
-
expect(result.didDocument.assertionMethod).toBeDefined();
|
|
50
|
-
|
|
51
|
-
// Verify key pair
|
|
52
|
-
expect(result.keyPair).toBeDefined();
|
|
53
|
-
expect(result.keyPair.publicKey).toMatch(/^z/);
|
|
54
|
-
expect(result.keyPair.privateKey).toMatch(/^z/);
|
|
55
|
-
|
|
56
|
-
// Verify log
|
|
57
|
-
expect(result.log).toBeDefined();
|
|
58
|
-
expect(Array.isArray(result.log)).toBe(true);
|
|
59
|
-
expect(result.log.length).toBeGreaterThan(0);
|
|
60
|
-
|
|
61
|
-
// Verify first log entry
|
|
62
|
-
const firstEntry = result.log[0];
|
|
63
|
-
expect(firstEntry.versionId).toBeDefined();
|
|
64
|
-
expect(firstEntry.versionTime).toBeDefined();
|
|
65
|
-
expect(firstEntry.state).toBeDefined();
|
|
66
|
-
expect(firstEntry.proof).toBeDefined();
|
|
67
|
-
|
|
68
|
-
// Verify log path
|
|
69
|
-
expect(result.logPath).toBeDefined();
|
|
70
|
-
expect(result.logPath).toContain('did.jsonl');
|
|
71
|
-
}, 10000);
|
|
72
|
-
|
|
73
|
-
test('creates DID with custom paths', async () => {
|
|
74
|
-
const result = await manager.createDIDWebVH({
|
|
75
|
-
domain: 'example.com',
|
|
76
|
-
paths: ['users', 'alice'],
|
|
77
|
-
outputDir: tempDir,
|
|
78
|
-
});
|
|
79
|
-
|
|
80
|
-
expect(result.did).toMatch(/^did:webvh:[A-Za-z0-9]+:example\.com:users:alice$/);
|
|
81
|
-
}, 10000);
|
|
82
|
-
|
|
83
|
-
test('creates portable DID when specified', async () => {
|
|
84
|
-
const result = await manager.createDIDWebVH({
|
|
85
|
-
domain: 'example.com',
|
|
86
|
-
portable: true,
|
|
87
|
-
outputDir: tempDir,
|
|
88
|
-
});
|
|
89
|
-
|
|
90
|
-
expect(result.didDocument).toBeDefined();
|
|
91
|
-
expect(result.log).toBeDefined();
|
|
92
|
-
// Verify portable flag in log metadata
|
|
93
|
-
const firstEntry = result.log[0];
|
|
94
|
-
expect(firstEntry.parameters).toBeDefined();
|
|
95
|
-
}, 10000);
|
|
96
|
-
|
|
97
|
-
test('uses provided key pair when given', async () => {
|
|
98
|
-
// First, generate a key pair
|
|
99
|
-
const keyManager = new (await import('../../../src/did/KeyManager')).KeyManager();
|
|
100
|
-
const customKeyPair = await keyManager.generateKeyPair('Ed25519');
|
|
101
|
-
|
|
102
|
-
const result = await manager.createDIDWebVH({
|
|
103
|
-
domain: 'example.com',
|
|
104
|
-
keyPair: customKeyPair,
|
|
105
|
-
outputDir: tempDir,
|
|
106
|
-
});
|
|
107
|
-
|
|
108
|
-
// Verify the same key pair is used
|
|
109
|
-
expect(result.keyPair.publicKey).toBe(customKeyPair.publicKey);
|
|
110
|
-
expect(result.keyPair.privateKey).toBe(customKeyPair.privateKey);
|
|
111
|
-
}, 10000);
|
|
112
|
-
|
|
113
|
-
test('creates DID without saving log when outputDir is not provided', async () => {
|
|
114
|
-
const result = await manager.createDIDWebVH({
|
|
115
|
-
domain: 'example.com',
|
|
116
|
-
});
|
|
117
|
-
|
|
118
|
-
expect(result.did).toBeDefined();
|
|
119
|
-
expect(result.didDocument).toBeDefined();
|
|
120
|
-
expect(result.log).toBeDefined();
|
|
121
|
-
expect(result.logPath).toBeUndefined();
|
|
122
|
-
}, 10000);
|
|
123
|
-
});
|
|
124
|
-
|
|
125
|
-
describe('saveDIDLog', () => {
|
|
126
|
-
test('saves log to correct path for simple DID', async () => {
|
|
127
|
-
const result = await manager.createDIDWebVH({
|
|
128
|
-
domain: 'example.com',
|
|
129
|
-
outputDir: tempDir,
|
|
130
|
-
});
|
|
131
|
-
|
|
132
|
-
expect(result.logPath).toBeDefined();
|
|
133
|
-
|
|
134
|
-
// Verify file exists
|
|
135
|
-
const fileExists = await fs.promises.access(result.logPath!)
|
|
136
|
-
.then(() => true)
|
|
137
|
-
.catch(() => false);
|
|
138
|
-
expect(fileExists).toBe(true);
|
|
139
|
-
|
|
140
|
-
// Verify file content
|
|
141
|
-
const content = await fs.promises.readFile(result.logPath!, 'utf8');
|
|
142
|
-
const lines = content.trim().split('\n');
|
|
143
|
-
expect(lines.length).toBe(result.log.length);
|
|
144
|
-
|
|
145
|
-
// Verify each line is valid JSON
|
|
146
|
-
lines.forEach(line => {
|
|
147
|
-
expect(() => JSON.parse(line)).not.toThrow();
|
|
148
|
-
});
|
|
149
|
-
}, 10000);
|
|
150
|
-
|
|
151
|
-
test('saves log to correct path with nested paths', async () => {
|
|
152
|
-
const result = await manager.createDIDWebVH({
|
|
153
|
-
domain: 'example.com',
|
|
154
|
-
paths: ['users', 'alice'],
|
|
155
|
-
outputDir: tempDir,
|
|
156
|
-
});
|
|
157
|
-
|
|
158
|
-
expect(result.logPath).toBeDefined();
|
|
159
|
-
expect(result.logPath).toContain(path.join('users', 'alice'));
|
|
160
|
-
|
|
161
|
-
// Verify file exists
|
|
162
|
-
const fileExists = await fs.promises.access(result.logPath!)
|
|
163
|
-
.then(() => true)
|
|
164
|
-
.catch(() => false);
|
|
165
|
-
expect(fileExists).toBe(true);
|
|
166
|
-
}, 10000);
|
|
167
|
-
|
|
168
|
-
test('creates nested directories as needed', async () => {
|
|
169
|
-
const deepPath = path.join(tempDir, 'deep', 'nested', 'structure');
|
|
170
|
-
|
|
171
|
-
const result = await manager.createDIDWebVH({
|
|
172
|
-
domain: 'example.com',
|
|
173
|
-
paths: ['level1', 'level2'],
|
|
174
|
-
outputDir: deepPath,
|
|
175
|
-
});
|
|
176
|
-
|
|
177
|
-
expect(result.logPath).toBeDefined();
|
|
178
|
-
|
|
179
|
-
// Verify file exists in nested structure
|
|
180
|
-
const fileExists = await fs.promises.access(result.logPath!)
|
|
181
|
-
.then(() => true)
|
|
182
|
-
.catch(() => false);
|
|
183
|
-
expect(fileExists).toBe(true);
|
|
184
|
-
}, 10000);
|
|
185
|
-
});
|
|
186
|
-
|
|
187
|
-
describe('loadDIDLog', () => {
|
|
188
|
-
test('loads saved DID log correctly', async () => {
|
|
189
|
-
// First create and save a DID
|
|
190
|
-
const createResult = await manager.createDIDWebVH({
|
|
191
|
-
domain: 'example.com',
|
|
192
|
-
outputDir: tempDir,
|
|
193
|
-
});
|
|
194
|
-
|
|
195
|
-
expect(createResult.logPath).toBeDefined();
|
|
196
|
-
|
|
197
|
-
// Load the log
|
|
198
|
-
const loadedLog = await manager.loadDIDLog(createResult.logPath!);
|
|
199
|
-
|
|
200
|
-
// Verify loaded log matches original
|
|
201
|
-
expect(loadedLog.length).toBe(createResult.log.length);
|
|
202
|
-
expect(loadedLog[0].versionId).toBe(createResult.log[0].versionId);
|
|
203
|
-
expect(loadedLog[0].versionTime).toBe(createResult.log[0].versionTime);
|
|
204
|
-
}, 10000);
|
|
205
|
-
});
|
|
206
|
-
|
|
207
|
-
describe('saveDIDLog error handling', () => {
|
|
208
|
-
test('throws error for invalid DID format (missing parts)', async () => {
|
|
209
|
-
const validLog = [{
|
|
210
|
-
versionId: '1',
|
|
211
|
-
versionTime: new Date().toISOString(),
|
|
212
|
-
parameters: {},
|
|
213
|
-
state: {}
|
|
214
|
-
}];
|
|
215
|
-
|
|
216
|
-
await expect(
|
|
217
|
-
manager.saveDIDLog('invalid:did', validLog, tempDir)
|
|
218
|
-
).rejects.toThrow('Invalid did:webvh format');
|
|
219
|
-
}, 10000);
|
|
220
|
-
|
|
221
|
-
test('throws error for non-webvh DID', async () => {
|
|
222
|
-
const validLog = [{
|
|
223
|
-
versionId: '1',
|
|
224
|
-
versionTime: new Date().toISOString(),
|
|
225
|
-
parameters: {},
|
|
226
|
-
state: {}
|
|
227
|
-
}];
|
|
228
|
-
|
|
229
|
-
await expect(
|
|
230
|
-
manager.saveDIDLog('did:key:abc123', validLog, tempDir)
|
|
231
|
-
).rejects.toThrow('Invalid did:webvh format');
|
|
232
|
-
}, 10000);
|
|
233
|
-
|
|
234
|
-
test('saves DID without path parts correctly', async () => {
|
|
235
|
-
const validLog = [{
|
|
236
|
-
versionId: '1',
|
|
237
|
-
versionTime: new Date().toISOString(),
|
|
238
|
-
parameters: {},
|
|
239
|
-
state: {}
|
|
240
|
-
}];
|
|
241
|
-
|
|
242
|
-
const logPath = await manager.saveDIDLog('did:webvh:example.com', validLog, tempDir);
|
|
243
|
-
|
|
244
|
-
expect(logPath).toContain('did.jsonl');
|
|
245
|
-
expect(logPath.startsWith(tempDir)).toBe(true);
|
|
246
|
-
|
|
247
|
-
// Verify file exists
|
|
248
|
-
const fileExists = await fs.promises.access(logPath)
|
|
249
|
-
.then(() => true)
|
|
250
|
-
.catch(() => false);
|
|
251
|
-
expect(fileExists).toBe(true);
|
|
252
|
-
}, 10000);
|
|
253
|
-
|
|
254
|
-
test('handles URL-encoded domain correctly', async () => {
|
|
255
|
-
const validLog = [{
|
|
256
|
-
versionId: '1',
|
|
257
|
-
versionTime: new Date().toISOString(),
|
|
258
|
-
parameters: {},
|
|
259
|
-
state: {}
|
|
260
|
-
}];
|
|
261
|
-
|
|
262
|
-
const logPath = await manager.saveDIDLog('did:webvh:localhost%3A5000:test', validLog, tempDir);
|
|
263
|
-
|
|
264
|
-
expect(logPath).toBeDefined();
|
|
265
|
-
expect(logPath.startsWith(tempDir)).toBe(true);
|
|
266
|
-
}, 10000);
|
|
267
|
-
|
|
268
|
-
test('rejects empty path segments', async () => {
|
|
269
|
-
const validLog = [{
|
|
270
|
-
versionId: '1',
|
|
271
|
-
versionTime: new Date().toISOString(),
|
|
272
|
-
parameters: {},
|
|
273
|
-
state: {}
|
|
274
|
-
}];
|
|
275
|
-
|
|
276
|
-
await expect(
|
|
277
|
-
manager.saveDIDLog('did:webvh:example.com::test', validLog, tempDir)
|
|
278
|
-
).rejects.toThrow('Invalid path segment in DID');
|
|
279
|
-
}, 10000);
|
|
280
|
-
|
|
281
|
-
test('throws error when resolved path escapes base directory', async () => {
|
|
282
|
-
const validLog = [{
|
|
283
|
-
versionId: '1',
|
|
284
|
-
versionTime: new Date().toISOString(),
|
|
285
|
-
parameters: {},
|
|
286
|
-
state: {}
|
|
287
|
-
}];
|
|
288
|
-
|
|
289
|
-
// This should be caught by the validation, but testing defense in depth
|
|
290
|
-
// Create a mock DID that would try to escape (though validation prevents it)
|
|
291
|
-
await expect(
|
|
292
|
-
manager.saveDIDLog('did:webvh:example.com:..', validLog, tempDir)
|
|
293
|
-
).rejects.toThrow();
|
|
294
|
-
}, 10000);
|
|
295
|
-
});
|
|
296
|
-
|
|
297
|
-
describe('security: path traversal prevention', () => {
|
|
298
|
-
test('rejects DIDs with ".." in path segments', async () => {
|
|
299
|
-
await expect(
|
|
300
|
-
manager.createDIDWebVH({
|
|
301
|
-
domain: 'example.com',
|
|
302
|
-
paths: ['..', 'etc', 'passwd'],
|
|
303
|
-
outputDir: tempDir,
|
|
304
|
-
})
|
|
305
|
-
).rejects.toThrow('Invalid path segment in DID');
|
|
306
|
-
}, 10000);
|
|
307
|
-
|
|
308
|
-
test('rejects DIDs with "." in path segments', async () => {
|
|
309
|
-
await expect(
|
|
310
|
-
manager.createDIDWebVH({
|
|
311
|
-
domain: 'example.com',
|
|
312
|
-
paths: ['.', 'secret'],
|
|
313
|
-
outputDir: tempDir,
|
|
314
|
-
})
|
|
315
|
-
).rejects.toThrow('Invalid path segment in DID');
|
|
316
|
-
}, 10000);
|
|
317
|
-
|
|
318
|
-
test('rejects DIDs with path separators in segments', async () => {
|
|
319
|
-
await expect(
|
|
320
|
-
manager.createDIDWebVH({
|
|
321
|
-
domain: 'example.com',
|
|
322
|
-
paths: ['users/../../etc', 'passwd'],
|
|
323
|
-
outputDir: tempDir,
|
|
324
|
-
})
|
|
325
|
-
).rejects.toThrow('Invalid path segment in DID');
|
|
326
|
-
}, 10000);
|
|
327
|
-
|
|
328
|
-
test('rejects DIDs with backslashes in path segments', async () => {
|
|
329
|
-
await expect(
|
|
330
|
-
manager.createDIDWebVH({
|
|
331
|
-
domain: 'example.com',
|
|
332
|
-
paths: ['users\\..\\..\\etc', 'passwd'],
|
|
333
|
-
outputDir: tempDir,
|
|
334
|
-
})
|
|
335
|
-
).rejects.toThrow('Invalid path segment in DID');
|
|
336
|
-
}, 10000);
|
|
337
|
-
|
|
338
|
-
test('rejects DIDs with null bytes in path segments', async () => {
|
|
339
|
-
await expect(
|
|
340
|
-
manager.createDIDWebVH({
|
|
341
|
-
domain: 'example.com',
|
|
342
|
-
paths: ['users\0etc', 'passwd'],
|
|
343
|
-
outputDir: tempDir,
|
|
344
|
-
})
|
|
345
|
-
).rejects.toThrow('Invalid path segment in DID');
|
|
346
|
-
}, 10000);
|
|
347
|
-
|
|
348
|
-
test('rejects DIDs with absolute paths (Unix)', async () => {
|
|
349
|
-
await expect(
|
|
350
|
-
manager.createDIDWebVH({
|
|
351
|
-
domain: 'example.com',
|
|
352
|
-
paths: ['/etc/passwd'],
|
|
353
|
-
outputDir: tempDir,
|
|
354
|
-
})
|
|
355
|
-
).rejects.toThrow('Invalid path segment in DID');
|
|
356
|
-
}, 10000);
|
|
357
|
-
|
|
358
|
-
test('rejects DIDs with absolute paths (Windows)', async () => {
|
|
359
|
-
await expect(
|
|
360
|
-
manager.createDIDWebVH({
|
|
361
|
-
domain: 'example.com',
|
|
362
|
-
paths: ['C:\\Windows\\System32'],
|
|
363
|
-
outputDir: tempDir,
|
|
364
|
-
})
|
|
365
|
-
).rejects.toThrow('Invalid path segment in DID');
|
|
366
|
-
}, 10000);
|
|
367
|
-
|
|
368
|
-
test('accepts valid alphanumeric path segments', async () => {
|
|
369
|
-
const result = await manager.createDIDWebVH({
|
|
370
|
-
domain: 'example.com',
|
|
371
|
-
paths: ['users', 'alice123', 'profile'],
|
|
372
|
-
outputDir: tempDir,
|
|
373
|
-
});
|
|
374
|
-
|
|
375
|
-
expect(result.did).toBeDefined();
|
|
376
|
-
expect(result.logPath).toBeDefined();
|
|
377
|
-
|
|
378
|
-
// Verify file was created in the correct location
|
|
379
|
-
const fileExists = await fs.promises.access(result.logPath!)
|
|
380
|
-
.then(() => true)
|
|
381
|
-
.catch(() => false);
|
|
382
|
-
expect(fileExists).toBe(true);
|
|
383
|
-
|
|
384
|
-
// Verify path is within temp directory
|
|
385
|
-
expect(result.logPath!.startsWith(tempDir)).toBe(true);
|
|
386
|
-
}, 10000);
|
|
387
|
-
|
|
388
|
-
test('accepts valid path segments with hyphens and underscores', async () => {
|
|
389
|
-
const result = await manager.createDIDWebVH({
|
|
390
|
-
domain: 'example.com',
|
|
391
|
-
paths: ['my-org', 'user_name', 'test-123'],
|
|
392
|
-
outputDir: tempDir,
|
|
393
|
-
});
|
|
394
|
-
|
|
395
|
-
expect(result.did).toBeDefined();
|
|
396
|
-
expect(result.logPath).toBeDefined();
|
|
397
|
-
expect(result.logPath!.startsWith(tempDir)).toBe(true);
|
|
398
|
-
}, 10000);
|
|
399
|
-
});
|
|
400
|
-
|
|
401
|
-
describe('integration with didwebvh-ts', () => {
|
|
402
|
-
test('creates cryptographically valid DID with proper proofs', async () => {
|
|
403
|
-
const result = await manager.createDIDWebVH({
|
|
404
|
-
domain: 'example.com',
|
|
405
|
-
outputDir: tempDir,
|
|
406
|
-
});
|
|
407
|
-
|
|
408
|
-
// Verify proof exists and has required fields
|
|
409
|
-
const firstEntry = result.log[0];
|
|
410
|
-
expect(firstEntry.proof).toBeDefined();
|
|
411
|
-
expect(Array.isArray(firstEntry.proof)).toBe(true);
|
|
412
|
-
expect(firstEntry.proof!.length).toBeGreaterThan(0);
|
|
413
|
-
|
|
414
|
-
const proof = firstEntry.proof![0];
|
|
415
|
-
expect(proof.type).toBeDefined();
|
|
416
|
-
expect(proof.cryptosuite).toBeDefined();
|
|
417
|
-
expect(proof.verificationMethod).toBeDefined();
|
|
418
|
-
expect(proof.created).toBeDefined();
|
|
419
|
-
expect(proof.proofValue).toBeDefined();
|
|
420
|
-
expect(proof.proofPurpose).toBeDefined();
|
|
421
|
-
}, 10000);
|
|
422
|
-
|
|
423
|
-
test('creates DID with proper SCID', async () => {
|
|
424
|
-
const result = await manager.createDIDWebVH({
|
|
425
|
-
domain: 'example.com',
|
|
426
|
-
outputDir: tempDir,
|
|
427
|
-
});
|
|
428
|
-
|
|
429
|
-
const firstEntry = result.log[0];
|
|
430
|
-
expect(firstEntry.parameters).toBeDefined();
|
|
431
|
-
expect(firstEntry.parameters.scid).toBeDefined();
|
|
432
|
-
expect(typeof firstEntry.parameters.scid).toBe('string');
|
|
433
|
-
}, 10000);
|
|
434
|
-
});
|
|
435
|
-
});
|
|
@@ -1,67 +0,0 @@
|
|
|
1
|
-
import { describe, test, expect, it } from 'bun:test';
|
|
2
|
-
import { createBtcoDidDocument } from '../../../src/did/createBtcoDidDocument';
|
|
3
|
-
import { multikey } from '../../../src/crypto/Multikey';
|
|
4
|
-
|
|
5
|
-
function rangeBytes(len: number, start: number): Uint8Array {
|
|
6
|
-
return new Uint8Array(len).map((_, i) => (start + i) & 0xff);
|
|
7
|
-
}
|
|
8
|
-
|
|
9
|
-
describe('createBtcoDidDocument', () => {
|
|
10
|
-
it('creates document for mainnet with deterministic fragment and relationships', () => {
|
|
11
|
-
const pub = rangeBytes(32, 1);
|
|
12
|
-
const doc = createBtcoDidDocument('1066296127976657', 'mainnet', { publicKey: pub, keyType: 'Ed25519' });
|
|
13
|
-
expect(doc['@context']).toEqual([
|
|
14
|
-
'https://www.w3.org/ns/did/v1',
|
|
15
|
-
'https://w3id.org/security/multikey/v1'
|
|
16
|
-
]);
|
|
17
|
-
expect(doc.id).toBe('did:btco:1066296127976657');
|
|
18
|
-
expect(doc.verificationMethod?.length).toBe(1);
|
|
19
|
-
const vm = doc.verificationMethod![0];
|
|
20
|
-
expect(vm.id).toBe('did:btco:1066296127976657#0');
|
|
21
|
-
expect(vm.type).toBe('Multikey');
|
|
22
|
-
expect(vm.controller).toBe(doc.id);
|
|
23
|
-
expect(doc.authentication).toEqual([vm.id]);
|
|
24
|
-
expect(doc.assertionMethod).toEqual([vm.id]);
|
|
25
|
-
const decoded = multikey.decodePublicKey(vm.publicKeyMultibase);
|
|
26
|
-
expect(decoded.type).toBe('Ed25519');
|
|
27
|
-
expect(Array.from(decoded.key)).toEqual(Array.from(pub));
|
|
28
|
-
});
|
|
29
|
-
|
|
30
|
-
it('creates document for regtest with proper prefix', () => {
|
|
31
|
-
const pub = rangeBytes(33, 3);
|
|
32
|
-
const doc = createBtcoDidDocument(123456, 'regtest', { publicKey: pub, keyType: 'Secp256k1' });
|
|
33
|
-
expect(doc.id).toBe('did:btco:reg:123456');
|
|
34
|
-
const vm = doc.verificationMethod![0];
|
|
35
|
-
expect(vm.id).toBe('did:btco:reg:123456#0');
|
|
36
|
-
const decoded = multikey.decodePublicKey(vm.publicKeyMultibase);
|
|
37
|
-
expect(decoded.type).toBe('Secp256k1');
|
|
38
|
-
expect(Array.from(decoded.key)).toEqual(Array.from(pub));
|
|
39
|
-
});
|
|
40
|
-
|
|
41
|
-
it('creates document for signet with proper prefix', () => {
|
|
42
|
-
const pub = rangeBytes(96, 5);
|
|
43
|
-
const doc = createBtcoDidDocument(999, 'signet', { publicKey: pub, keyType: 'Bls12381G2' });
|
|
44
|
-
expect(doc.id).toBe('did:btco:sig:999');
|
|
45
|
-
const vm = doc.verificationMethod![0];
|
|
46
|
-
expect(vm.id).toBe('did:btco:sig:999#0');
|
|
47
|
-
const decoded = multikey.decodePublicKey(vm.publicKeyMultibase);
|
|
48
|
-
expect(decoded.type).toBe('Bls12381G2');
|
|
49
|
-
expect(Array.from(decoded.key)).toEqual(Array.from(pub));
|
|
50
|
-
});
|
|
51
|
-
|
|
52
|
-
it('supports overriding controller', () => {
|
|
53
|
-
const pub = rangeBytes(32, 7);
|
|
54
|
-
const controller = 'did:example:controller';
|
|
55
|
-
const doc = createBtcoDidDocument('42', 'mainnet', { publicKey: pub, keyType: 'Ed25519', controller });
|
|
56
|
-
expect(doc.verificationMethod![0].controller).toBe(controller);
|
|
57
|
-
});
|
|
58
|
-
|
|
59
|
-
it('throws on unsupported network', () => {
|
|
60
|
-
const pub = rangeBytes(32, 9);
|
|
61
|
-
expect(() =>
|
|
62
|
-
// @ts-expect-error testing invalid network
|
|
63
|
-
createBtcoDidDocument('1', 'testnet', { publicKey: pub, keyType: 'Ed25519' })
|
|
64
|
-
).toThrow('Unsupported Bitcoin network: testnet');
|
|
65
|
-
});
|
|
66
|
-
});
|
|
67
|
-
|
|
@@ -1,159 +0,0 @@
|
|
|
1
|
-
import { describe, test, expect, beforeEach, afterEach, mock } from 'bun:test';
|
|
2
|
-
import { OrdinalsClient } from '../../../../src/bitcoin/OrdinalsClient';
|
|
3
|
-
import { OrdinalsClientProviderAdapter } from '../../../../src/did/providers/OrdinalsClientProviderAdapter';
|
|
4
|
-
|
|
5
|
-
describe('OrdinalsClientProviderAdapter.resolveInscription', () => {
|
|
6
|
-
const inscriptionId = 'insc123';
|
|
7
|
-
const originalFetch = global.fetch as any;
|
|
8
|
-
|
|
9
|
-
beforeEach(() => {
|
|
10
|
-
// Bun doesn't require resetAllMocks
|
|
11
|
-
});
|
|
12
|
-
|
|
13
|
-
afterEach(() => {
|
|
14
|
-
(global as any).fetch = originalFetch;
|
|
15
|
-
});
|
|
16
|
-
|
|
17
|
-
test('throws when baseUrl is missing/empty', async () => {
|
|
18
|
-
const client = new OrdinalsClient('http://rpc', 'mainnet');
|
|
19
|
-
const adapter = new OrdinalsClientProviderAdapter(client, '');
|
|
20
|
-
await expect(adapter.resolveInscription(inscriptionId)).rejects.toThrow('OrdinalsClientProviderAdapter requires a baseUrl');
|
|
21
|
-
});
|
|
22
|
-
|
|
23
|
-
test('throws when inscription endpoint returns non-OK', async () => {
|
|
24
|
-
const client = new OrdinalsClient('http://rpc', 'mainnet');
|
|
25
|
-
const adapter = new OrdinalsClientProviderAdapter(client, 'https://api.example.com/');
|
|
26
|
-
|
|
27
|
-
const fetchMock = mock(() => Promise.resolve({ ok: false, status: 500, json: async () => ({}) }));
|
|
28
|
-
(globalThis as any).fetch = fetchMock;
|
|
29
|
-
|
|
30
|
-
await expect(adapter.resolveInscription(inscriptionId)).rejects.toThrow(`Failed to resolve inscription: ${inscriptionId}`);
|
|
31
|
-
|
|
32
|
-
expect(fetchMock).toHaveBeenCalledTimes(1);
|
|
33
|
-
expect(fetchMock).toHaveBeenCalledWith(
|
|
34
|
-
'https://api.example.com/inscription/insc123',
|
|
35
|
-
expect.objectContaining({
|
|
36
|
-
headers: { Accept: 'application/json' },
|
|
37
|
-
signal: expect.any(AbortSignal)
|
|
38
|
-
})
|
|
39
|
-
);
|
|
40
|
-
});
|
|
41
|
-
|
|
42
|
-
test('maps fields correctly when JSON has explicit values and numeric sat', async () => {
|
|
43
|
-
const client = new OrdinalsClient('http://rpc', 'mainnet');
|
|
44
|
-
const adapter = new OrdinalsClientProviderAdapter(client, 'https://ord.example');
|
|
45
|
-
|
|
46
|
-
const apiResponse = {
|
|
47
|
-
inscription_id: 'abc123',
|
|
48
|
-
sat: 42,
|
|
49
|
-
content_type: 'image/png',
|
|
50
|
-
content_url: 'https://cdn.example/abc123.png'
|
|
51
|
-
};
|
|
52
|
-
|
|
53
|
-
const fetchMock = mock(() => Promise.resolve({ ok: true, json: async () => apiResponse }));
|
|
54
|
-
(globalThis as any).fetch = fetchMock;
|
|
55
|
-
|
|
56
|
-
const result = await adapter.resolveInscription(inscriptionId);
|
|
57
|
-
|
|
58
|
-
expect(result).toEqual({
|
|
59
|
-
id: 'abc123',
|
|
60
|
-
sat: 42,
|
|
61
|
-
content_type: 'image/png',
|
|
62
|
-
content_url: 'https://cdn.example/abc123.png'
|
|
63
|
-
});
|
|
64
|
-
|
|
65
|
-
expect(fetchMock).toHaveBeenCalledTimes(1);
|
|
66
|
-
expect(fetchMock).toHaveBeenCalledWith(
|
|
67
|
-
'https://ord.example/inscription/insc123',
|
|
68
|
-
expect.objectContaining({
|
|
69
|
-
headers: { Accept: 'application/json' },
|
|
70
|
-
signal: expect.any(AbortSignal)
|
|
71
|
-
})
|
|
72
|
-
);
|
|
73
|
-
});
|
|
74
|
-
|
|
75
|
-
test('applies fallbacks and coerces string sat to number', async () => {
|
|
76
|
-
const client = new OrdinalsClient('http://rpc', 'mainnet');
|
|
77
|
-
const adapter = new OrdinalsClientProviderAdapter(client, 'https://api.example.com/');
|
|
78
|
-
|
|
79
|
-
const apiResponse = {
|
|
80
|
-
sat: '007'
|
|
81
|
-
// missing inscription_id, content_type, content_url
|
|
82
|
-
} as any;
|
|
83
|
-
|
|
84
|
-
const fetchMock = mock(() => Promise.resolve({ ok: true, json: async () => apiResponse }));
|
|
85
|
-
(globalThis as any).fetch = fetchMock;
|
|
86
|
-
|
|
87
|
-
const result = await adapter.resolveInscription(inscriptionId);
|
|
88
|
-
|
|
89
|
-
expect(result).toEqual({
|
|
90
|
-
id: 'insc123',
|
|
91
|
-
sat: 7,
|
|
92
|
-
content_type: 'text/plain',
|
|
93
|
-
content_url: 'https://api.example.com/content/insc123'
|
|
94
|
-
});
|
|
95
|
-
|
|
96
|
-
expect(fetchMock).toHaveBeenCalledTimes(1);
|
|
97
|
-
expect(fetchMock).toHaveBeenCalledWith(
|
|
98
|
-
'https://api.example.com/inscription/insc123',
|
|
99
|
-
expect.objectContaining({
|
|
100
|
-
headers: { Accept: 'application/json' },
|
|
101
|
-
signal: expect.any(AbortSignal)
|
|
102
|
-
})
|
|
103
|
-
);
|
|
104
|
-
});
|
|
105
|
-
|
|
106
|
-
test('applies default sat=0 when sat is missing', async () => {
|
|
107
|
-
const client = new OrdinalsClient('http://rpc', 'mainnet');
|
|
108
|
-
const adapter = new OrdinalsClientProviderAdapter(client, 'https://api.example.com/');
|
|
109
|
-
|
|
110
|
-
const apiResponse = { } as any;
|
|
111
|
-
|
|
112
|
-
const fetchMock = mock(() => Promise.resolve({ ok: true, json: async () => apiResponse }));
|
|
113
|
-
(globalThis as any).fetch = fetchMock;
|
|
114
|
-
|
|
115
|
-
const result = await adapter.resolveInscription(inscriptionId);
|
|
116
|
-
|
|
117
|
-
expect(result).toEqual({
|
|
118
|
-
id: 'insc123',
|
|
119
|
-
sat: 0,
|
|
120
|
-
content_type: 'text/plain',
|
|
121
|
-
content_url: 'https://api.example.com/content/insc123'
|
|
122
|
-
});
|
|
123
|
-
|
|
124
|
-
expect(fetchMock).toHaveBeenCalledTimes(1);
|
|
125
|
-
expect(fetchMock).toHaveBeenCalledWith(
|
|
126
|
-
'https://api.example.com/inscription/insc123',
|
|
127
|
-
expect.objectContaining({
|
|
128
|
-
headers: { Accept: 'application/json' },
|
|
129
|
-
signal: expect.any(AbortSignal)
|
|
130
|
-
})
|
|
131
|
-
);
|
|
132
|
-
});
|
|
133
|
-
|
|
134
|
-
test('getSatInfo proxies to client.getSatInfo', async () => {
|
|
135
|
-
const mockClient = {
|
|
136
|
-
getSatInfo: mock(async (n: string) => ({ inscription_ids: ['a', 'b'] })),
|
|
137
|
-
getMetadata: mock()
|
|
138
|
-
} as unknown as OrdinalsClient;
|
|
139
|
-
|
|
140
|
-
const adapter = new OrdinalsClientProviderAdapter(mockClient, 'https://x');
|
|
141
|
-
const result = await adapter.getSatInfo('12345');
|
|
142
|
-
expect(result).toEqual({ inscription_ids: ['a', 'b'] });
|
|
143
|
-
expect((mockClient as any).getSatInfo).toHaveBeenCalledWith('12345');
|
|
144
|
-
});
|
|
145
|
-
|
|
146
|
-
test('getMetadata proxies to client.getMetadata', async () => {
|
|
147
|
-
const expected = { hello: 'world' };
|
|
148
|
-
const mockClient = {
|
|
149
|
-
getSatInfo: mock(),
|
|
150
|
-
getMetadata: mock(async (id: string) => expected)
|
|
151
|
-
} as unknown as OrdinalsClient;
|
|
152
|
-
|
|
153
|
-
const adapter = new OrdinalsClientProviderAdapter(mockClient, 'https://x');
|
|
154
|
-
const result = await adapter.getMetadata('iid');
|
|
155
|
-
expect(result).toBe(expected);
|
|
156
|
-
expect((mockClient as any).getMetadata).toHaveBeenCalledWith('iid');
|
|
157
|
-
});
|
|
158
|
-
});
|
|
159
|
-
|