@originals/sdk 1.4.2 → 1.4.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (212) hide show
  1. package/package.json +4 -1
  2. package/.eslintrc.json +0 -33
  3. package/src/adapters/FeeOracleMock.ts +0 -9
  4. package/src/adapters/index.ts +0 -5
  5. package/src/adapters/providers/OrdHttpProvider.ts +0 -126
  6. package/src/adapters/providers/OrdMockProvider.ts +0 -101
  7. package/src/adapters/types.ts +0 -66
  8. package/src/bitcoin/BitcoinManager.ts +0 -330
  9. package/src/bitcoin/BroadcastClient.ts +0 -54
  10. package/src/bitcoin/OrdinalsClient.ts +0 -119
  11. package/src/bitcoin/PSBTBuilder.ts +0 -106
  12. package/src/bitcoin/fee-calculation.ts +0 -38
  13. package/src/bitcoin/providers/OrdNodeProvider.ts +0 -92
  14. package/src/bitcoin/providers/OrdinalsProvider.ts +0 -56
  15. package/src/bitcoin/providers/types.ts +0 -59
  16. package/src/bitcoin/transactions/commit.ts +0 -465
  17. package/src/bitcoin/transactions/index.ts +0 -13
  18. package/src/bitcoin/transfer.ts +0 -43
  19. package/src/bitcoin/utxo-selection.ts +0 -322
  20. package/src/bitcoin/utxo.ts +0 -113
  21. package/src/contexts/credentials-v1.json +0 -237
  22. package/src/contexts/credentials-v2-examples.json +0 -5
  23. package/src/contexts/credentials-v2.json +0 -340
  24. package/src/contexts/credentials.json +0 -237
  25. package/src/contexts/data-integrity-v2.json +0 -81
  26. package/src/contexts/dids.json +0 -58
  27. package/src/contexts/ed255192020.json +0 -93
  28. package/src/contexts/ordinals-plus.json +0 -23
  29. package/src/contexts/originals.json +0 -22
  30. package/src/core/OriginalsSDK.ts +0 -416
  31. package/src/crypto/Multikey.ts +0 -194
  32. package/src/crypto/Signer.ts +0 -254
  33. package/src/crypto/noble-init.ts +0 -121
  34. package/src/did/BtcoDidResolver.ts +0 -227
  35. package/src/did/DIDManager.ts +0 -694
  36. package/src/did/Ed25519Verifier.ts +0 -68
  37. package/src/did/KeyManager.ts +0 -236
  38. package/src/did/WebVHManager.ts +0 -498
  39. package/src/did/createBtcoDidDocument.ts +0 -59
  40. package/src/did/providers/OrdinalsClientProviderAdapter.ts +0 -68
  41. package/src/events/EventEmitter.ts +0 -222
  42. package/src/events/index.ts +0 -19
  43. package/src/events/types.ts +0 -331
  44. package/src/examples/basic-usage.ts +0 -78
  45. package/src/examples/create-module-original.ts +0 -435
  46. package/src/examples/full-lifecycle-flow.ts +0 -514
  47. package/src/examples/run.ts +0 -60
  48. package/src/index.ts +0 -150
  49. package/src/kinds/KindRegistry.ts +0 -290
  50. package/src/kinds/index.ts +0 -74
  51. package/src/kinds/types.ts +0 -470
  52. package/src/kinds/validators/AgentValidator.ts +0 -257
  53. package/src/kinds/validators/AppValidator.ts +0 -211
  54. package/src/kinds/validators/DatasetValidator.ts +0 -242
  55. package/src/kinds/validators/DocumentValidator.ts +0 -311
  56. package/src/kinds/validators/MediaValidator.ts +0 -269
  57. package/src/kinds/validators/ModuleValidator.ts +0 -225
  58. package/src/kinds/validators/base.ts +0 -276
  59. package/src/kinds/validators/index.ts +0 -12
  60. package/src/lifecycle/BatchOperations.ts +0 -373
  61. package/src/lifecycle/LifecycleManager.ts +0 -2126
  62. package/src/lifecycle/OriginalsAsset.ts +0 -524
  63. package/src/lifecycle/ProvenanceQuery.ts +0 -280
  64. package/src/lifecycle/ResourceVersioning.ts +0 -163
  65. package/src/migration/MigrationManager.ts +0 -527
  66. package/src/migration/audit/AuditLogger.ts +0 -176
  67. package/src/migration/checkpoint/CheckpointManager.ts +0 -112
  68. package/src/migration/checkpoint/CheckpointStorage.ts +0 -101
  69. package/src/migration/index.ts +0 -33
  70. package/src/migration/operations/BaseMigration.ts +0 -126
  71. package/src/migration/operations/PeerToBtcoMigration.ts +0 -105
  72. package/src/migration/operations/PeerToWebvhMigration.ts +0 -62
  73. package/src/migration/operations/WebvhToBtcoMigration.ts +0 -105
  74. package/src/migration/rollback/RollbackManager.ts +0 -170
  75. package/src/migration/state/StateMachine.ts +0 -92
  76. package/src/migration/state/StateTracker.ts +0 -156
  77. package/src/migration/types.ts +0 -344
  78. package/src/migration/validation/BitcoinValidator.ts +0 -107
  79. package/src/migration/validation/CredentialValidator.ts +0 -62
  80. package/src/migration/validation/DIDCompatibilityValidator.ts +0 -151
  81. package/src/migration/validation/LifecycleValidator.ts +0 -64
  82. package/src/migration/validation/StorageValidator.ts +0 -79
  83. package/src/migration/validation/ValidationPipeline.ts +0 -213
  84. package/src/resources/ResourceManager.ts +0 -655
  85. package/src/resources/index.ts +0 -21
  86. package/src/resources/types.ts +0 -202
  87. package/src/storage/LocalStorageAdapter.ts +0 -61
  88. package/src/storage/MemoryStorageAdapter.ts +0 -29
  89. package/src/storage/StorageAdapter.ts +0 -25
  90. package/src/storage/index.ts +0 -3
  91. package/src/types/bitcoin.ts +0 -98
  92. package/src/types/common.ts +0 -92
  93. package/src/types/credentials.ts +0 -88
  94. package/src/types/did.ts +0 -31
  95. package/src/types/external-shims.d.ts +0 -53
  96. package/src/types/index.ts +0 -7
  97. package/src/types/network.ts +0 -175
  98. package/src/utils/EventLogger.ts +0 -298
  99. package/src/utils/Logger.ts +0 -322
  100. package/src/utils/MetricsCollector.ts +0 -358
  101. package/src/utils/bitcoin-address.ts +0 -130
  102. package/src/utils/cbor.ts +0 -12
  103. package/src/utils/encoding.ts +0 -127
  104. package/src/utils/hash.ts +0 -6
  105. package/src/utils/retry.ts +0 -46
  106. package/src/utils/satoshi-validation.ts +0 -196
  107. package/src/utils/serialization.ts +0 -96
  108. package/src/utils/telemetry.ts +0 -40
  109. package/src/utils/validation.ts +0 -119
  110. package/src/vc/CredentialManager.ts +0 -918
  111. package/src/vc/Issuer.ts +0 -100
  112. package/src/vc/Verifier.ts +0 -47
  113. package/src/vc/cryptosuites/bbs.ts +0 -253
  114. package/src/vc/cryptosuites/bbsSimple.ts +0 -21
  115. package/src/vc/cryptosuites/eddsa.ts +0 -99
  116. package/src/vc/documentLoader.ts +0 -67
  117. package/src/vc/proofs/data-integrity.ts +0 -33
  118. package/src/vc/utils/jsonld.ts +0 -18
  119. package/tests/__mocks__/bbs-signatures.js +0 -17
  120. package/tests/__mocks__/mf-base58.js +0 -24
  121. package/tests/fixtures/did-documents.ts +0 -247
  122. package/tests/index.test.ts +0 -21
  123. package/tests/integration/BatchOperations.test.ts +0 -531
  124. package/tests/integration/CompleteLifecycle.e2e.test.ts +0 -735
  125. package/tests/integration/CredentialManager.test.ts +0 -42
  126. package/tests/integration/DIDManager.test.ts +0 -41
  127. package/tests/integration/DidPeerToWebVhFlow.test.ts +0 -351
  128. package/tests/integration/Events.test.ts +0 -435
  129. package/tests/integration/Lifecycle.transfer.btco.integration.test.ts +0 -25
  130. package/tests/integration/LifecycleManager.test.ts +0 -21
  131. package/tests/integration/MultikeyFlow.test.ts +0 -52
  132. package/tests/integration/TelemetryIntegration.test.ts +0 -395
  133. package/tests/integration/WebVhPublish.test.ts +0 -48
  134. package/tests/integration/createTypedOriginal.test.ts +0 -379
  135. package/tests/integration/migration/peer-to-webvh.test.ts +0 -172
  136. package/tests/manual/test-commit-creation.ts +0 -323
  137. package/tests/mocks/MockKeyStore.ts +0 -38
  138. package/tests/mocks/adapters/MemoryStorageAdapter.ts +0 -24
  139. package/tests/mocks/adapters/MockFeeOracle.ts +0 -11
  140. package/tests/mocks/adapters/MockOrdinalsProvider.ts +0 -76
  141. package/tests/mocks/adapters/OrdMockProvider.test.ts +0 -176
  142. package/tests/mocks/adapters/index.ts +0 -6
  143. package/tests/performance/BatchOperations.perf.test.ts +0 -403
  144. package/tests/performance/logging.perf.test.ts +0 -336
  145. package/tests/sdk.test.ts +0 -43
  146. package/tests/security/bitcoin-penetration-tests.test.ts +0 -622
  147. package/tests/setup.bun.ts +0 -69
  148. package/tests/setup.jest.ts +0 -23
  149. package/tests/stress/batch-operations-stress.test.ts +0 -571
  150. package/tests/unit/adapters/FeeOracleMock.test.ts +0 -40
  151. package/tests/unit/bitcoin/BitcoinManager.test.ts +0 -293
  152. package/tests/unit/bitcoin/BroadcastClient.test.ts +0 -52
  153. package/tests/unit/bitcoin/OrdNodeProvider.test.ts +0 -53
  154. package/tests/unit/bitcoin/OrdinalsClient.test.ts +0 -381
  155. package/tests/unit/bitcoin/OrdinalsClientProvider.test.ts +0 -102
  156. package/tests/unit/bitcoin/PSBTBuilder.test.ts +0 -84
  157. package/tests/unit/bitcoin/fee-calculation.test.ts +0 -261
  158. package/tests/unit/bitcoin/transactions/commit.test.ts +0 -649
  159. package/tests/unit/bitcoin/transfer.test.ts +0 -31
  160. package/tests/unit/bitcoin/utxo-selection-new.test.ts +0 -502
  161. package/tests/unit/bitcoin/utxo.more.test.ts +0 -39
  162. package/tests/unit/bitcoin/utxo.selection.test.ts +0 -38
  163. package/tests/unit/core/OriginalsSDK.test.ts +0 -152
  164. package/tests/unit/crypto/Multikey.test.ts +0 -206
  165. package/tests/unit/crypto/Signer.test.ts +0 -408
  166. package/tests/unit/did/BtcoDidResolver.test.ts +0 -611
  167. package/tests/unit/did/DIDManager.more.test.ts +0 -43
  168. package/tests/unit/did/DIDManager.test.ts +0 -185
  169. package/tests/unit/did/Ed25519Verifier.test.ts +0 -160
  170. package/tests/unit/did/KeyManager.test.ts +0 -452
  171. package/tests/unit/did/OrdinalsClientProviderAdapter.test.ts +0 -45
  172. package/tests/unit/did/WebVHManager.test.ts +0 -435
  173. package/tests/unit/did/createBtcoDidDocument.test.ts +0 -67
  174. package/tests/unit/did/providers/OrdinalsClientProviderAdapter.test.ts +0 -159
  175. package/tests/unit/events/EventEmitter.test.ts +0 -407
  176. package/tests/unit/kinds/KindRegistry.test.ts +0 -329
  177. package/tests/unit/kinds/types.test.ts +0 -409
  178. package/tests/unit/kinds/validators.test.ts +0 -651
  179. package/tests/unit/lifecycle/BatchOperations.test.ts +0 -527
  180. package/tests/unit/lifecycle/LifecycleManager.cleanapi.test.ts +0 -441
  181. package/tests/unit/lifecycle/LifecycleManager.keymanagement.test.ts +0 -312
  182. package/tests/unit/lifecycle/LifecycleManager.prov.test.ts +0 -18
  183. package/tests/unit/lifecycle/LifecycleManager.test.ts +0 -213
  184. package/tests/unit/lifecycle/LifecycleManager.transfer.unit.test.ts +0 -30
  185. package/tests/unit/lifecycle/OriginalsAsset.test.ts +0 -176
  186. package/tests/unit/lifecycle/ProvenanceQuery.test.ts +0 -577
  187. package/tests/unit/lifecycle/ResourceVersioning.test.ts +0 -651
  188. package/tests/unit/resources/ResourceManager.test.ts +0 -740
  189. package/tests/unit/storage/MemoryStorageAdapter.test.ts +0 -93
  190. package/tests/unit/types/network.test.ts +0 -255
  191. package/tests/unit/utils/EventIntegration.test.ts +0 -384
  192. package/tests/unit/utils/Logger.test.ts +0 -473
  193. package/tests/unit/utils/MetricsCollector.test.ts +0 -358
  194. package/tests/unit/utils/bitcoin-address.test.ts +0 -250
  195. package/tests/unit/utils/cbor.test.ts +0 -35
  196. package/tests/unit/utils/encoding.test.ts +0 -318
  197. package/tests/unit/utils/hash.test.ts +0 -12
  198. package/tests/unit/utils/retry.test.ts +0 -100
  199. package/tests/unit/utils/satoshi-validation.test.ts +0 -354
  200. package/tests/unit/utils/serialization.test.ts +0 -124
  201. package/tests/unit/utils/telemetry.test.ts +0 -52
  202. package/tests/unit/utils/validation.test.ts +0 -141
  203. package/tests/unit/vc/CredentialManager.helpers.test.ts +0 -527
  204. package/tests/unit/vc/CredentialManager.test.ts +0 -487
  205. package/tests/unit/vc/Issuer.test.ts +0 -107
  206. package/tests/unit/vc/Verifier.test.ts +0 -525
  207. package/tests/unit/vc/bbs.test.ts +0 -282
  208. package/tests/unit/vc/cryptosuites/eddsa.test.ts +0 -398
  209. package/tests/unit/vc/documentLoader.test.ts +0 -121
  210. package/tests/unit/vc/proofs/data-integrity.test.ts +0 -24
  211. package/tsconfig.json +0 -31
  212. package/tsconfig.test.json +0 -15
@@ -1,194 +0,0 @@
1
- import { base58 } from '@scure/base';
2
-
3
- // Multicodec headers (varints) for supported key types
4
- export const MULTICODEC_ED25519_PUB_HEADER = new Uint8Array([0xed, 0x01]);
5
- export const MULTICODEC_ED25519_PRIV_HEADER = new Uint8Array([0x80, 0x26]);
6
- export const MULTICODEC_SECP256K1_PUB_HEADER = new Uint8Array([0xe7, 0x01]);
7
- export const MULTICODEC_SECP256K1_PRIV_HEADER = new Uint8Array([0x13, 0x01]);
8
- export const MULTICODEC_BLS12381_G2_PUB_HEADER = new Uint8Array([0xeb, 0x01]);
9
- export const MULTICODEC_BLS12381_G2_PRIV_HEADER = new Uint8Array([0x82, 0x26]);
10
- export const MULTICODEC_P256_PUB_HEADER = new Uint8Array([0x80, 0x24]);
11
- export const MULTICODEC_P256_PRIV_HEADER = new Uint8Array([0x81, 0x26]);
12
-
13
- export type MultikeyType = 'Ed25519' | 'Secp256k1' | 'Bls12381G2' | 'P256';
14
-
15
- function concatBytes(a: Uint8Array, b: Uint8Array): Uint8Array {
16
- const out = new Uint8Array(a.length + b.length);
17
- out.set(a, 0);
18
- out.set(b, a.length);
19
- return out;
20
- }
21
-
22
- /**
23
- * Validates that a key string uses proper multikey format.
24
- * @param key - The multibase-encoded key string to validate
25
- * @param expectedType - The expected key type (e.g., 'Ed25519', 'Secp256k1')
26
- * @param isPrivate - Whether this is a private key (true) or public key (false)
27
- * @throws Error with descriptive message if validation fails
28
- */
29
- export function validateMultikeyFormat(
30
- key: string,
31
- expectedType: MultikeyType,
32
- isPrivate: boolean
33
- ): void {
34
- // Validate multibase prefix
35
- if (!key || typeof key !== 'string') {
36
- throw new Error('Invalid multibase key format. Key must be a non-empty string.');
37
- }
38
-
39
- if (key[0] !== 'z') {
40
- throw new Error(
41
- 'Invalid multibase key format. Keys must use z-base58btc encoding (prefix "z").'
42
- );
43
- }
44
-
45
- // Attempt to decode and validate multicodec header
46
- try {
47
- const mc = base58.decode(key.slice(1));
48
-
49
- if (mc.length < 2) {
50
- throw new Error(
51
- 'Invalid multibase key format. Keys must use multicodec headers.'
52
- );
53
- }
54
-
55
- // Validate header matches expected type
56
- const header = mc.slice(0, 2);
57
- const expectedHeaders = isPrivate
58
- ? {
59
- Ed25519: MULTICODEC_ED25519_PRIV_HEADER,
60
- Secp256k1: MULTICODEC_SECP256K1_PRIV_HEADER,
61
- Bls12381G2: MULTICODEC_BLS12381_G2_PRIV_HEADER,
62
- P256: MULTICODEC_P256_PRIV_HEADER
63
- }
64
- : {
65
- Ed25519: MULTICODEC_ED25519_PUB_HEADER,
66
- Secp256k1: MULTICODEC_SECP256K1_PUB_HEADER,
67
- Bls12381G2: MULTICODEC_BLS12381_G2_PUB_HEADER,
68
- P256: MULTICODEC_P256_PUB_HEADER
69
- };
70
-
71
- const expectedHeader = expectedHeaders[expectedType];
72
-
73
- if (header[0] !== expectedHeader[0] || header[1] !== expectedHeader[1]) {
74
- throw new Error(
75
- `Invalid multibase key format. Expected ${expectedType} ${
76
- isPrivate ? 'private' : 'public'
77
- } key with multicodec header [0x${expectedHeader[0].toString(
78
- 16
79
- )}, 0x${expectedHeader[1].toString(16)}], but found [0x${header[0].toString(
80
- 16
81
- )}, 0x${header[1].toString(16)}].`
82
- );
83
- }
84
-
85
- // Validate key length (basic sanity check)
86
- const keyBytes = mc.slice(2);
87
- const expectedLengths: Record<MultikeyType, { private: number; public: number }> = {
88
- Ed25519: { private: 32, public: 32 },
89
- Secp256k1: { private: 32, public: 33 },
90
- P256: { private: 32, public: 33 },
91
- Bls12381G2: { private: 32, public: 96 }
92
- };
93
-
94
- const expectedLength = isPrivate
95
- ? expectedLengths[expectedType].private
96
- : expectedLengths[expectedType].public;
97
-
98
- if (keyBytes.length !== expectedLength) {
99
- throw new Error(
100
- `Invalid multibase key format. Expected ${expectedType} ${
101
- isPrivate ? 'private' : 'public'
102
- } key to be ${expectedLength} bytes, but found ${keyBytes.length} bytes.`
103
- );
104
- }
105
- } catch (error) {
106
- // Re-throw our own errors as-is
107
- if (error instanceof Error && error.message.startsWith('Invalid multibase key format')) {
108
- throw error;
109
- }
110
- // Base58 decode errors or other unexpected errors
111
- throw new Error(
112
- `Invalid multibase key format. Keys must use multicodec headers. Decode error: ${
113
- error instanceof Error ? error.message : String(error)
114
- }`
115
- );
116
- }
117
- }
118
-
119
- export const multikey = {
120
- encodePublicKey: (publicKey: Uint8Array, type: MultikeyType): string => {
121
- const header =
122
- type === 'Ed25519'
123
- ? MULTICODEC_ED25519_PUB_HEADER
124
- : type === 'Secp256k1'
125
- ? MULTICODEC_SECP256K1_PUB_HEADER
126
- : type === 'Bls12381G2'
127
- ? MULTICODEC_BLS12381_G2_PUB_HEADER
128
- : MULTICODEC_P256_PUB_HEADER;
129
- const mcBytes = concatBytes(header, publicKey);
130
- return 'z' + base58.encode(mcBytes);
131
- },
132
-
133
- encodePrivateKey: (privateKey: Uint8Array, type: MultikeyType): string => {
134
- const header =
135
- type === 'Ed25519'
136
- ? MULTICODEC_ED25519_PRIV_HEADER
137
- : type === 'Secp256k1'
138
- ? MULTICODEC_SECP256K1_PRIV_HEADER
139
- : type === 'Bls12381G2'
140
- ? MULTICODEC_BLS12381_G2_PRIV_HEADER
141
- : MULTICODEC_P256_PRIV_HEADER;
142
- const mcBytes = concatBytes(header, privateKey);
143
- return 'z' + base58.encode(mcBytes);
144
- },
145
-
146
- encodeMultibase: (data: Uint8Array | Buffer): string => {
147
- return 'z' + base58.encode(data instanceof Buffer ? new Uint8Array(data) : data);
148
- },
149
-
150
- decodePublicKey: (publicKeyMultibase: string): { key: Uint8Array; type: MultikeyType } => {
151
- if (!publicKeyMultibase || publicKeyMultibase[0] !== 'z') {
152
- throw new Error('Invalid Multibase encoding');
153
- }
154
- const mc = base58.decode(publicKeyMultibase.slice(1));
155
- const header = mc.slice(0, 2);
156
- const key = mc.slice(2);
157
- if (header[0] === MULTICODEC_ED25519_PUB_HEADER[0] && header[1] === MULTICODEC_ED25519_PUB_HEADER[1]) {
158
- return { key, type: 'Ed25519' };
159
- }
160
- if (header[0] === MULTICODEC_SECP256K1_PUB_HEADER[0] && header[1] === MULTICODEC_SECP256K1_PUB_HEADER[1]) {
161
- return { key, type: 'Secp256k1' };
162
- }
163
- if (header[0] === MULTICODEC_BLS12381_G2_PUB_HEADER[0] && header[1] === MULTICODEC_BLS12381_G2_PUB_HEADER[1]) {
164
- return { key, type: 'Bls12381G2' };
165
- }
166
- if (header[0] === MULTICODEC_P256_PUB_HEADER[0] && header[1] === MULTICODEC_P256_PUB_HEADER[1]) {
167
- return { key, type: 'P256' };
168
- }
169
- throw new Error('Unsupported key type');
170
- },
171
-
172
- decodePrivateKey: (privateKeyMultibase: string): { key: Uint8Array; type: MultikeyType } => {
173
- if (!privateKeyMultibase || privateKeyMultibase[0] !== 'z') {
174
- throw new Error('Invalid Multibase encoding');
175
- }
176
- const mc = base58.decode(privateKeyMultibase.slice(1));
177
- const header = mc.slice(0, 2);
178
- const key = mc.slice(2);
179
- if (header[0] === MULTICODEC_ED25519_PRIV_HEADER[0] && header[1] === MULTICODEC_ED25519_PRIV_HEADER[1]) {
180
- return { key, type: 'Ed25519' };
181
- }
182
- if (header[0] === MULTICODEC_SECP256K1_PRIV_HEADER[0] && header[1] === MULTICODEC_SECP256K1_PRIV_HEADER[1]) {
183
- return { key, type: 'Secp256k1' };
184
- }
185
- if (header[0] === MULTICODEC_BLS12381_G2_PRIV_HEADER[0] && header[1] === MULTICODEC_BLS12381_G2_PRIV_HEADER[1]) {
186
- return { key, type: 'Bls12381G2' };
187
- }
188
- if (header[0] === MULTICODEC_P256_PRIV_HEADER[0] && header[1] === MULTICODEC_P256_PRIV_HEADER[1]) {
189
- return { key, type: 'P256' };
190
- }
191
- throw new Error('Unsupported key type');
192
- }
193
- };
194
-
@@ -1,254 +0,0 @@
1
- // Initialize noble crypto libraries first (idempotent - safe to import multiple times)
2
- import './noble-init.js';
3
-
4
- export abstract class Signer {
5
- abstract sign(data: Buffer, privateKeyMultibase: string): Promise<Buffer>;
6
- abstract verify(data: Buffer, signature: Buffer, publicKeyMultibase: string): Promise<boolean>;
7
- }
8
-
9
- import { bls12_381 as bls } from '@noble/curves/bls12-381';
10
- import { p256 } from '@noble/curves/p256';
11
- import { sha256 } from '@noble/hashes/sha2.js';
12
- import * as secp256k1 from '@noble/secp256k1';
13
- import * as ed25519 from '@noble/ed25519';
14
- import { multikey } from './Multikey';
15
-
16
- export class ES256KSigner extends Signer {
17
- async sign(data: Buffer, privateKeyMultibase: string): Promise<Buffer> {
18
- if (!privateKeyMultibase || privateKeyMultibase[0] !== 'z') {
19
- throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
20
- }
21
-
22
- let decoded;
23
- try {
24
- decoded = multikey.decodePrivateKey(privateKeyMultibase);
25
- } catch (error) {
26
- throw new Error(
27
- `Invalid multibase key format. Keys must use multicodec headers. ${
28
- error instanceof Error ? error.message : String(error)
29
- }`
30
- );
31
- }
32
-
33
- if (decoded.type !== 'Secp256k1') {
34
- throw new Error('Invalid key type for ES256K');
35
- }
36
-
37
- const privateKey = decoded.key;
38
- const hash = sha256(data);
39
- const sigAny: any = await (secp256k1 as any).signAsync(hash, privateKey);
40
- const sigBytes: Uint8Array = sigAny instanceof Uint8Array
41
- ? sigAny
42
- : typeof sigAny?.toCompactRawBytes === 'function'
43
- ? sigAny.toCompactRawBytes()
44
- : typeof sigAny?.toRawBytes === 'function'
45
- ? sigAny.toRawBytes()
46
- : new Uint8Array(sigAny);
47
- return Buffer.from(sigBytes);
48
- }
49
-
50
- async verify(data: Buffer, signature: Buffer, publicKeyMultibase: string): Promise<boolean> {
51
- if (!publicKeyMultibase || publicKeyMultibase[0] !== 'z') {
52
- throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
53
- }
54
-
55
- let decoded;
56
- try {
57
- decoded = multikey.decodePublicKey(publicKeyMultibase);
58
- } catch (error) {
59
- throw new Error(
60
- `Invalid multibase key format. Keys must use multicodec headers. ${
61
- error instanceof Error ? error.message : String(error)
62
- }`
63
- );
64
- }
65
-
66
- if (decoded.type !== 'Secp256k1') {
67
- throw new Error('Invalid key type for ES256K');
68
- }
69
-
70
- const publicKey = decoded.key;
71
- const hash = sha256(data);
72
- try {
73
- return secp256k1.verify(signature, hash, publicKey);
74
- } catch {
75
- return false;
76
- }
77
- }
78
- }
79
-
80
- export class Ed25519Signer extends Signer {
81
- async sign(data: Buffer, privateKeyMultibase: string): Promise<Buffer> {
82
- if (!privateKeyMultibase || privateKeyMultibase[0] !== 'z') {
83
- throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
84
- }
85
-
86
- let decoded;
87
- try {
88
- decoded = multikey.decodePrivateKey(privateKeyMultibase);
89
- } catch (error) {
90
- throw new Error(
91
- `Invalid multibase key format. Keys must use multicodec headers. ${
92
- error instanceof Error ? error.message : String(error)
93
- }`
94
- );
95
- }
96
-
97
- if (decoded.type !== 'Ed25519') {
98
- throw new Error('Invalid key type for Ed25519');
99
- }
100
-
101
- const privateKey = decoded.key;
102
- const signature = await (ed25519 as any).signAsync(data, privateKey);
103
- return Buffer.from(signature);
104
- }
105
-
106
- async verify(data: Buffer, signature: Buffer, publicKeyMultibase: string): Promise<boolean> {
107
- if (!publicKeyMultibase || publicKeyMultibase[0] !== 'z') {
108
- throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
109
- }
110
-
111
- let decoded;
112
- try {
113
- decoded = multikey.decodePublicKey(publicKeyMultibase);
114
- } catch (error) {
115
- throw new Error(
116
- `Invalid multibase key format. Keys must use multicodec headers. ${
117
- error instanceof Error ? error.message : String(error)
118
- }`
119
- );
120
- }
121
-
122
- if (decoded.type !== 'Ed25519') {
123
- throw new Error('Invalid key type for Ed25519');
124
- }
125
-
126
- const publicKey = decoded.key;
127
- try {
128
- return await (ed25519 as any).verifyAsync(signature, data, publicKey);
129
- } catch {
130
- return false;
131
- }
132
- }
133
- }
134
-
135
- export class ES256Signer extends Signer {
136
- async sign(data: Buffer, privateKeyMultibase: string): Promise<Buffer> {
137
- if (!privateKeyMultibase || privateKeyMultibase[0] !== 'z') {
138
- throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
139
- }
140
-
141
- let decoded;
142
- try {
143
- decoded = multikey.decodePrivateKey(privateKeyMultibase);
144
- } catch (error) {
145
- throw new Error(
146
- `Invalid multibase key format. Keys must use multicodec headers. ${
147
- error instanceof Error ? error.message : String(error)
148
- }`
149
- );
150
- }
151
-
152
- if (decoded.type !== 'P256') {
153
- throw new Error('Invalid key type for ES256');
154
- }
155
-
156
- const privateKey = decoded.key;
157
- const hash = sha256(data);
158
- const sigAny: any = p256.sign(hash, privateKey);
159
- const sigBytes: Uint8Array = sigAny instanceof Uint8Array
160
- ? sigAny
161
- : typeof sigAny?.toCompactRawBytes === 'function'
162
- ? sigAny.toCompactRawBytes()
163
- : typeof sigAny?.toRawBytes === 'function'
164
- ? sigAny.toRawBytes()
165
- : new Uint8Array(sigAny);
166
- return Buffer.from(sigBytes);
167
- }
168
-
169
- async verify(data: Buffer, signature: Buffer, publicKeyMultibase: string): Promise<boolean> {
170
- if (!publicKeyMultibase || publicKeyMultibase[0] !== 'z') {
171
- throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
172
- }
173
-
174
- let decoded;
175
- try {
176
- decoded = multikey.decodePublicKey(publicKeyMultibase);
177
- } catch (error) {
178
- throw new Error(
179
- `Invalid multibase key format. Keys must use multicodec headers. ${
180
- error instanceof Error ? error.message : String(error)
181
- }`
182
- );
183
- }
184
-
185
- if (decoded.type !== 'P256') {
186
- throw new Error('Invalid key type for ES256');
187
- }
188
-
189
- const publicKey = decoded.key;
190
- const hash = sha256(data);
191
- try {
192
- return p256.verify(signature, hash, publicKey);
193
- } catch {
194
- return false;
195
- }
196
- }
197
- }
198
-
199
- export class Bls12381G2Signer extends Signer {
200
- async sign(data: Buffer, privateKeyMultibase: string): Promise<Buffer> {
201
- if (!privateKeyMultibase || privateKeyMultibase[0] !== 'z') {
202
- throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
203
- }
204
-
205
- let decoded;
206
- try {
207
- decoded = multikey.decodePrivateKey(privateKeyMultibase);
208
- } catch (error) {
209
- throw new Error(
210
- `Invalid multibase key format. Keys must use multicodec headers. ${
211
- error instanceof Error ? error.message : String(error)
212
- }`
213
- );
214
- }
215
-
216
- if (decoded.type !== 'Bls12381G2') {
217
- throw new Error('Invalid key type for Bls12381G2');
218
- }
219
-
220
- const sk = decoded.key;
221
- const sig = await bls.sign(data, sk);
222
- return Buffer.from(sig);
223
- }
224
-
225
- async verify(data: Buffer, signature: Buffer, publicKeyMultibase: string): Promise<boolean> {
226
- if (!publicKeyMultibase || publicKeyMultibase[0] !== 'z') {
227
- throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
228
- }
229
-
230
- let decoded;
231
- try {
232
- decoded = multikey.decodePublicKey(publicKeyMultibase);
233
- } catch (error) {
234
- throw new Error(
235
- `Invalid multibase key format. Keys must use multicodec headers. ${
236
- error instanceof Error ? error.message : String(error)
237
- }`
238
- );
239
- }
240
-
241
- if (decoded.type !== 'Bls12381G2') {
242
- throw new Error('Invalid key type for Bls12381G2');
243
- }
244
-
245
- const pk = decoded.key;
246
- try {
247
- return await bls.verify(signature, data, pk);
248
- } catch {
249
- return false;
250
- }
251
- }
252
- }
253
-
254
-
@@ -1,121 +0,0 @@
1
- /**
2
- * Noble Crypto Library Initialization
3
- *
4
- * @noble/ed25519 v2.x and @noble/secp256k1 require manual configuration of hash functions.
5
- * This is by design - they don't bundle hash implementations to allow flexibility.
6
- *
7
- * This module centralizes the initialization to ensure:
8
- * 1. Libraries are configured before any crypto operations
9
- * 2. Configuration is consistent across the SDK
10
- * 3. Readonly property issues (Bun) are handled gracefully
11
- *
12
- * This should be imported at the SDK entry point (index.ts) to ensure it runs first.
13
- */
14
-
15
- import * as secp256k1 from '@noble/secp256k1';
16
- import * as ed25519 from '@noble/ed25519';
17
- import { sha256, sha512 } from '@noble/hashes/sha2.js';
18
- import { hmac } from '@noble/hashes/hmac.js';
19
- import { concatBytes } from '@noble/hashes/utils.js';
20
-
21
- // Implementation functions
22
- const sha512Impl = (...msgs: Uint8Array[]) => sha512(concatBytes(...msgs));
23
- const hmacSha256Impl = (key: Uint8Array, ...msgs: Uint8Array[]) =>
24
- hmac(sha256, key, concatBytes(...msgs));
25
-
26
- /**
27
- * Safely set a property on an object, handling readonly properties
28
- */
29
- function safeSetProperty(
30
- obj: any,
31
- prop: string,
32
- value: any,
33
- options?: { writable?: boolean; configurable?: boolean }
34
- ): boolean {
35
- try {
36
- obj[prop] = value;
37
- return true;
38
- } catch {
39
- // Property might be readonly, try defineProperty
40
- try {
41
- Object.defineProperty(obj, prop, {
42
- value,
43
- writable: options?.writable ?? true,
44
- configurable: options?.configurable ?? true,
45
- });
46
- return true;
47
- } catch {
48
- // If both fail, property might already be set or truly readonly
49
- return false;
50
- }
51
- }
52
- }
53
-
54
- /**
55
- * Initialize @noble/secp256k1 with hmacSha256Sync utility
56
- */
57
- function initSecp256k1(): void {
58
- const sAny: any = secp256k1 as any;
59
-
60
- if (!sAny?.utils) {
61
- // Try to create utils object if it doesn't exist
62
- try {
63
- sAny.utils = {};
64
- } catch {
65
- // If we can't create it, try defineProperty
66
- Object.defineProperty(sAny, 'utils', {
67
- value: {},
68
- writable: true,
69
- configurable: true,
70
- });
71
- }
72
- }
73
-
74
- // Set hmacSha256Sync if not already set
75
- if (typeof sAny.utils.hmacSha256Sync !== 'function') {
76
- safeSetProperty(sAny.utils, 'hmacSha256Sync', hmacSha256Impl);
77
- }
78
- }
79
-
80
- /**
81
- * Initialize @noble/ed25519 with sha512Sync utility
82
- * Handles both etc.sha512Sync (v2.x) and utils.sha512Sync (backward compat)
83
- */
84
- function initEd25519(): void {
85
- const eAny: any = ed25519 as any;
86
-
87
- // Set etc.sha512Sync for @noble/ed25519 v2.x (required)
88
- if (eAny?.etc && typeof eAny.etc.sha512Sync !== 'function') {
89
- safeSetProperty(eAny.etc, 'sha512Sync', sha512Impl);
90
- }
91
-
92
- // Set utils.sha512Sync for backward compatibility
93
- if (!eAny?.utils) {
94
- try {
95
- eAny.utils = {};
96
- } catch {
97
- Object.defineProperty(eAny, 'utils', {
98
- value: {},
99
- writable: true,
100
- configurable: true,
101
- });
102
- }
103
- }
104
-
105
- if (typeof eAny.utils.sha512Sync !== 'function') {
106
- safeSetProperty(eAny.utils, 'sha512Sync', sha512Impl);
107
- }
108
- }
109
-
110
- /**
111
- * Initialize all noble crypto libraries
112
- * This should be called once at SDK startup
113
- */
114
- export function initNobleCrypto(): void {
115
- initSecp256k1();
116
- initEd25519();
117
- }
118
-
119
- // Auto-initialize when this module is imported
120
- initNobleCrypto();
121
-