@originals/sdk 1.4.2 → 1.4.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +4 -1
- package/.eslintrc.json +0 -33
- package/src/adapters/FeeOracleMock.ts +0 -9
- package/src/adapters/index.ts +0 -5
- package/src/adapters/providers/OrdHttpProvider.ts +0 -126
- package/src/adapters/providers/OrdMockProvider.ts +0 -101
- package/src/adapters/types.ts +0 -66
- package/src/bitcoin/BitcoinManager.ts +0 -330
- package/src/bitcoin/BroadcastClient.ts +0 -54
- package/src/bitcoin/OrdinalsClient.ts +0 -119
- package/src/bitcoin/PSBTBuilder.ts +0 -106
- package/src/bitcoin/fee-calculation.ts +0 -38
- package/src/bitcoin/providers/OrdNodeProvider.ts +0 -92
- package/src/bitcoin/providers/OrdinalsProvider.ts +0 -56
- package/src/bitcoin/providers/types.ts +0 -59
- package/src/bitcoin/transactions/commit.ts +0 -465
- package/src/bitcoin/transactions/index.ts +0 -13
- package/src/bitcoin/transfer.ts +0 -43
- package/src/bitcoin/utxo-selection.ts +0 -322
- package/src/bitcoin/utxo.ts +0 -113
- package/src/contexts/credentials-v1.json +0 -237
- package/src/contexts/credentials-v2-examples.json +0 -5
- package/src/contexts/credentials-v2.json +0 -340
- package/src/contexts/credentials.json +0 -237
- package/src/contexts/data-integrity-v2.json +0 -81
- package/src/contexts/dids.json +0 -58
- package/src/contexts/ed255192020.json +0 -93
- package/src/contexts/ordinals-plus.json +0 -23
- package/src/contexts/originals.json +0 -22
- package/src/core/OriginalsSDK.ts +0 -416
- package/src/crypto/Multikey.ts +0 -194
- package/src/crypto/Signer.ts +0 -254
- package/src/crypto/noble-init.ts +0 -121
- package/src/did/BtcoDidResolver.ts +0 -227
- package/src/did/DIDManager.ts +0 -694
- package/src/did/Ed25519Verifier.ts +0 -68
- package/src/did/KeyManager.ts +0 -236
- package/src/did/WebVHManager.ts +0 -498
- package/src/did/createBtcoDidDocument.ts +0 -59
- package/src/did/providers/OrdinalsClientProviderAdapter.ts +0 -68
- package/src/events/EventEmitter.ts +0 -222
- package/src/events/index.ts +0 -19
- package/src/events/types.ts +0 -331
- package/src/examples/basic-usage.ts +0 -78
- package/src/examples/create-module-original.ts +0 -435
- package/src/examples/full-lifecycle-flow.ts +0 -514
- package/src/examples/run.ts +0 -60
- package/src/index.ts +0 -150
- package/src/kinds/KindRegistry.ts +0 -290
- package/src/kinds/index.ts +0 -74
- package/src/kinds/types.ts +0 -470
- package/src/kinds/validators/AgentValidator.ts +0 -257
- package/src/kinds/validators/AppValidator.ts +0 -211
- package/src/kinds/validators/DatasetValidator.ts +0 -242
- package/src/kinds/validators/DocumentValidator.ts +0 -311
- package/src/kinds/validators/MediaValidator.ts +0 -269
- package/src/kinds/validators/ModuleValidator.ts +0 -225
- package/src/kinds/validators/base.ts +0 -276
- package/src/kinds/validators/index.ts +0 -12
- package/src/lifecycle/BatchOperations.ts +0 -373
- package/src/lifecycle/LifecycleManager.ts +0 -2126
- package/src/lifecycle/OriginalsAsset.ts +0 -524
- package/src/lifecycle/ProvenanceQuery.ts +0 -280
- package/src/lifecycle/ResourceVersioning.ts +0 -163
- package/src/migration/MigrationManager.ts +0 -527
- package/src/migration/audit/AuditLogger.ts +0 -176
- package/src/migration/checkpoint/CheckpointManager.ts +0 -112
- package/src/migration/checkpoint/CheckpointStorage.ts +0 -101
- package/src/migration/index.ts +0 -33
- package/src/migration/operations/BaseMigration.ts +0 -126
- package/src/migration/operations/PeerToBtcoMigration.ts +0 -105
- package/src/migration/operations/PeerToWebvhMigration.ts +0 -62
- package/src/migration/operations/WebvhToBtcoMigration.ts +0 -105
- package/src/migration/rollback/RollbackManager.ts +0 -170
- package/src/migration/state/StateMachine.ts +0 -92
- package/src/migration/state/StateTracker.ts +0 -156
- package/src/migration/types.ts +0 -344
- package/src/migration/validation/BitcoinValidator.ts +0 -107
- package/src/migration/validation/CredentialValidator.ts +0 -62
- package/src/migration/validation/DIDCompatibilityValidator.ts +0 -151
- package/src/migration/validation/LifecycleValidator.ts +0 -64
- package/src/migration/validation/StorageValidator.ts +0 -79
- package/src/migration/validation/ValidationPipeline.ts +0 -213
- package/src/resources/ResourceManager.ts +0 -655
- package/src/resources/index.ts +0 -21
- package/src/resources/types.ts +0 -202
- package/src/storage/LocalStorageAdapter.ts +0 -61
- package/src/storage/MemoryStorageAdapter.ts +0 -29
- package/src/storage/StorageAdapter.ts +0 -25
- package/src/storage/index.ts +0 -3
- package/src/types/bitcoin.ts +0 -98
- package/src/types/common.ts +0 -92
- package/src/types/credentials.ts +0 -88
- package/src/types/did.ts +0 -31
- package/src/types/external-shims.d.ts +0 -53
- package/src/types/index.ts +0 -7
- package/src/types/network.ts +0 -175
- package/src/utils/EventLogger.ts +0 -298
- package/src/utils/Logger.ts +0 -322
- package/src/utils/MetricsCollector.ts +0 -358
- package/src/utils/bitcoin-address.ts +0 -130
- package/src/utils/cbor.ts +0 -12
- package/src/utils/encoding.ts +0 -127
- package/src/utils/hash.ts +0 -6
- package/src/utils/retry.ts +0 -46
- package/src/utils/satoshi-validation.ts +0 -196
- package/src/utils/serialization.ts +0 -96
- package/src/utils/telemetry.ts +0 -40
- package/src/utils/validation.ts +0 -119
- package/src/vc/CredentialManager.ts +0 -918
- package/src/vc/Issuer.ts +0 -100
- package/src/vc/Verifier.ts +0 -47
- package/src/vc/cryptosuites/bbs.ts +0 -253
- package/src/vc/cryptosuites/bbsSimple.ts +0 -21
- package/src/vc/cryptosuites/eddsa.ts +0 -99
- package/src/vc/documentLoader.ts +0 -67
- package/src/vc/proofs/data-integrity.ts +0 -33
- package/src/vc/utils/jsonld.ts +0 -18
- package/tests/__mocks__/bbs-signatures.js +0 -17
- package/tests/__mocks__/mf-base58.js +0 -24
- package/tests/fixtures/did-documents.ts +0 -247
- package/tests/index.test.ts +0 -21
- package/tests/integration/BatchOperations.test.ts +0 -531
- package/tests/integration/CompleteLifecycle.e2e.test.ts +0 -735
- package/tests/integration/CredentialManager.test.ts +0 -42
- package/tests/integration/DIDManager.test.ts +0 -41
- package/tests/integration/DidPeerToWebVhFlow.test.ts +0 -351
- package/tests/integration/Events.test.ts +0 -435
- package/tests/integration/Lifecycle.transfer.btco.integration.test.ts +0 -25
- package/tests/integration/LifecycleManager.test.ts +0 -21
- package/tests/integration/MultikeyFlow.test.ts +0 -52
- package/tests/integration/TelemetryIntegration.test.ts +0 -395
- package/tests/integration/WebVhPublish.test.ts +0 -48
- package/tests/integration/createTypedOriginal.test.ts +0 -379
- package/tests/integration/migration/peer-to-webvh.test.ts +0 -172
- package/tests/manual/test-commit-creation.ts +0 -323
- package/tests/mocks/MockKeyStore.ts +0 -38
- package/tests/mocks/adapters/MemoryStorageAdapter.ts +0 -24
- package/tests/mocks/adapters/MockFeeOracle.ts +0 -11
- package/tests/mocks/adapters/MockOrdinalsProvider.ts +0 -76
- package/tests/mocks/adapters/OrdMockProvider.test.ts +0 -176
- package/tests/mocks/adapters/index.ts +0 -6
- package/tests/performance/BatchOperations.perf.test.ts +0 -403
- package/tests/performance/logging.perf.test.ts +0 -336
- package/tests/sdk.test.ts +0 -43
- package/tests/security/bitcoin-penetration-tests.test.ts +0 -622
- package/tests/setup.bun.ts +0 -69
- package/tests/setup.jest.ts +0 -23
- package/tests/stress/batch-operations-stress.test.ts +0 -571
- package/tests/unit/adapters/FeeOracleMock.test.ts +0 -40
- package/tests/unit/bitcoin/BitcoinManager.test.ts +0 -293
- package/tests/unit/bitcoin/BroadcastClient.test.ts +0 -52
- package/tests/unit/bitcoin/OrdNodeProvider.test.ts +0 -53
- package/tests/unit/bitcoin/OrdinalsClient.test.ts +0 -381
- package/tests/unit/bitcoin/OrdinalsClientProvider.test.ts +0 -102
- package/tests/unit/bitcoin/PSBTBuilder.test.ts +0 -84
- package/tests/unit/bitcoin/fee-calculation.test.ts +0 -261
- package/tests/unit/bitcoin/transactions/commit.test.ts +0 -649
- package/tests/unit/bitcoin/transfer.test.ts +0 -31
- package/tests/unit/bitcoin/utxo-selection-new.test.ts +0 -502
- package/tests/unit/bitcoin/utxo.more.test.ts +0 -39
- package/tests/unit/bitcoin/utxo.selection.test.ts +0 -38
- package/tests/unit/core/OriginalsSDK.test.ts +0 -152
- package/tests/unit/crypto/Multikey.test.ts +0 -206
- package/tests/unit/crypto/Signer.test.ts +0 -408
- package/tests/unit/did/BtcoDidResolver.test.ts +0 -611
- package/tests/unit/did/DIDManager.more.test.ts +0 -43
- package/tests/unit/did/DIDManager.test.ts +0 -185
- package/tests/unit/did/Ed25519Verifier.test.ts +0 -160
- package/tests/unit/did/KeyManager.test.ts +0 -452
- package/tests/unit/did/OrdinalsClientProviderAdapter.test.ts +0 -45
- package/tests/unit/did/WebVHManager.test.ts +0 -435
- package/tests/unit/did/createBtcoDidDocument.test.ts +0 -67
- package/tests/unit/did/providers/OrdinalsClientProviderAdapter.test.ts +0 -159
- package/tests/unit/events/EventEmitter.test.ts +0 -407
- package/tests/unit/kinds/KindRegistry.test.ts +0 -329
- package/tests/unit/kinds/types.test.ts +0 -409
- package/tests/unit/kinds/validators.test.ts +0 -651
- package/tests/unit/lifecycle/BatchOperations.test.ts +0 -527
- package/tests/unit/lifecycle/LifecycleManager.cleanapi.test.ts +0 -441
- package/tests/unit/lifecycle/LifecycleManager.keymanagement.test.ts +0 -312
- package/tests/unit/lifecycle/LifecycleManager.prov.test.ts +0 -18
- package/tests/unit/lifecycle/LifecycleManager.test.ts +0 -213
- package/tests/unit/lifecycle/LifecycleManager.transfer.unit.test.ts +0 -30
- package/tests/unit/lifecycle/OriginalsAsset.test.ts +0 -176
- package/tests/unit/lifecycle/ProvenanceQuery.test.ts +0 -577
- package/tests/unit/lifecycle/ResourceVersioning.test.ts +0 -651
- package/tests/unit/resources/ResourceManager.test.ts +0 -740
- package/tests/unit/storage/MemoryStorageAdapter.test.ts +0 -93
- package/tests/unit/types/network.test.ts +0 -255
- package/tests/unit/utils/EventIntegration.test.ts +0 -384
- package/tests/unit/utils/Logger.test.ts +0 -473
- package/tests/unit/utils/MetricsCollector.test.ts +0 -358
- package/tests/unit/utils/bitcoin-address.test.ts +0 -250
- package/tests/unit/utils/cbor.test.ts +0 -35
- package/tests/unit/utils/encoding.test.ts +0 -318
- package/tests/unit/utils/hash.test.ts +0 -12
- package/tests/unit/utils/retry.test.ts +0 -100
- package/tests/unit/utils/satoshi-validation.test.ts +0 -354
- package/tests/unit/utils/serialization.test.ts +0 -124
- package/tests/unit/utils/telemetry.test.ts +0 -52
- package/tests/unit/utils/validation.test.ts +0 -141
- package/tests/unit/vc/CredentialManager.helpers.test.ts +0 -527
- package/tests/unit/vc/CredentialManager.test.ts +0 -487
- package/tests/unit/vc/Issuer.test.ts +0 -107
- package/tests/unit/vc/Verifier.test.ts +0 -525
- package/tests/unit/vc/bbs.test.ts +0 -282
- package/tests/unit/vc/cryptosuites/eddsa.test.ts +0 -398
- package/tests/unit/vc/documentLoader.test.ts +0 -121
- package/tests/unit/vc/proofs/data-integrity.test.ts +0 -24
- package/tsconfig.json +0 -31
- package/tsconfig.test.json +0 -15
|
@@ -1,487 +0,0 @@
|
|
|
1
|
-
import { describe, test, expect, afterEach, spyOn } from 'bun:test';
|
|
2
|
-
import { OriginalsSDK } from '../../../src';
|
|
3
|
-
import { VerifiableCredential, CredentialSubject, Proof } from '../../../src/types';
|
|
4
|
-
import * as secp256k1 from '@noble/secp256k1';
|
|
5
|
-
import * as ed25519 from '@noble/ed25519';
|
|
6
|
-
import { p256 } from '@noble/curves/p256';
|
|
7
|
-
import { multikey } from '../../../src/crypto/Multikey';
|
|
8
|
-
|
|
9
|
-
describe('CredentialManager', () => {
|
|
10
|
-
const sdk = OriginalsSDK.create();
|
|
11
|
-
|
|
12
|
-
const subject: CredentialSubject = {
|
|
13
|
-
id: 'did:peer:subject',
|
|
14
|
-
resourceId: 'res1',
|
|
15
|
-
resourceType: 'text',
|
|
16
|
-
createdAt: new Date().toISOString(),
|
|
17
|
-
creator: 'did:peer:issuer'
|
|
18
|
-
} as any;
|
|
19
|
-
|
|
20
|
-
const baseVC: VerifiableCredential = {
|
|
21
|
-
'@context': ['https://www.w3.org/2018/credentials/v1'],
|
|
22
|
-
type: ['VerifiableCredential', 'ResourceCreated'],
|
|
23
|
-
issuer: 'did:peer:issuer',
|
|
24
|
-
issuanceDate: new Date().toISOString(),
|
|
25
|
-
credentialSubject: subject
|
|
26
|
-
};
|
|
27
|
-
|
|
28
|
-
test('createResourceCredential builds VC for each type (expected to fail until implemented)', async () => {
|
|
29
|
-
const created = await sdk.credentials.createResourceCredential('ResourceCreated', subject, 'did:peer:issuer');
|
|
30
|
-
expect(created.type).toContain('ResourceCreated');
|
|
31
|
-
|
|
32
|
-
const updated = await sdk.credentials.createResourceCredential('ResourceUpdated', subject, 'did:peer:issuer');
|
|
33
|
-
expect(updated.type).toContain('ResourceUpdated');
|
|
34
|
-
|
|
35
|
-
const migrated = await sdk.credentials.createResourceCredential('ResourceMigrated', subject, 'did:peer:issuer');
|
|
36
|
-
expect(migrated.type).toContain('ResourceMigrated');
|
|
37
|
-
});
|
|
38
|
-
|
|
39
|
-
test('signCredential/verifyCredential works for ES256K', async () => {
|
|
40
|
-
const sdkES256K = OriginalsSDK.create({ defaultKeyType: 'ES256K' });
|
|
41
|
-
const sk = secp256k1.utils.randomPrivateKey();
|
|
42
|
-
const pk = secp256k1.getPublicKey(sk, true);
|
|
43
|
-
const skMb = multikey.encodePrivateKey(sk, 'Secp256k1');
|
|
44
|
-
const pkMb = multikey.encodePublicKey(pk, 'Secp256k1');
|
|
45
|
-
const signed = await sdkES256K.credentials.signCredential(baseVC, skMb, pkMb);
|
|
46
|
-
expect(signed.proof).toBeDefined();
|
|
47
|
-
await expect(sdkES256K.credentials.verifyCredential(signed)).resolves.toBe(true);
|
|
48
|
-
});
|
|
49
|
-
|
|
50
|
-
test('verifyCredential returns false when no proof present (expected to pass)', async () => {
|
|
51
|
-
await expect(sdk.credentials.verifyCredential(baseVC)).resolves.toBe(false);
|
|
52
|
-
});
|
|
53
|
-
|
|
54
|
-
test('createPresentation bundles VCs (expected to fail until implemented)', async () => {
|
|
55
|
-
const pres = await sdk.credentials.createPresentation([baseVC], 'did:peer:holder');
|
|
56
|
-
expect(pres.verifiableCredential.length).toBeGreaterThan(0);
|
|
57
|
-
});
|
|
58
|
-
|
|
59
|
-
test('verifyCredential returns false when proof missing fields', async () => {
|
|
60
|
-
const vc: VerifiableCredential = { ...baseVC, proof: {
|
|
61
|
-
type: 'DataIntegrityProof',
|
|
62
|
-
created: new Date().toISOString(),
|
|
63
|
-
verificationMethod: '',
|
|
64
|
-
proofPurpose: 'assertionMethod',
|
|
65
|
-
proofValue: ''
|
|
66
|
-
} as any };
|
|
67
|
-
await expect(sdk.credentials.verifyCredential(vc)).resolves.toBe(false);
|
|
68
|
-
});
|
|
69
|
-
|
|
70
|
-
test('verifyCredential uses data-integrity verifier path when cryptosuite present', async () => {
|
|
71
|
-
const sdkEd = OriginalsSDK.create({ defaultKeyType: 'Ed25519' });
|
|
72
|
-
const edSk = new Uint8Array(32).fill(1);
|
|
73
|
-
const signed = await sdkEd.credentials.signCredential(baseVC, multikey.encodePrivateKey(edSk, 'Ed25519'), 'did:ex#key');
|
|
74
|
-
(signed as any).proof.cryptosuite = 'eddsa-rdfc-2022';
|
|
75
|
-
const res = await sdkEd.credentials.verifyCredential(signed);
|
|
76
|
-
expect(typeof res).toBe('boolean');
|
|
77
|
-
});
|
|
78
|
-
|
|
79
|
-
test('verifyCredential returns false on invalid multibase proofValue', async () => {
|
|
80
|
-
const vc: VerifiableCredential = { ...baseVC, proof: {
|
|
81
|
-
type: 'DataIntegrityProof',
|
|
82
|
-
created: new Date().toISOString(),
|
|
83
|
-
verificationMethod: multikey.encodePublicKey(new Uint8Array(33).fill(3), 'Secp256k1'),
|
|
84
|
-
proofPurpose: 'assertionMethod',
|
|
85
|
-
proofValue: 'xnot-multibase'
|
|
86
|
-
} } as any;
|
|
87
|
-
await expect(sdk.credentials.verifyCredential(vc)).resolves.toBe(false);
|
|
88
|
-
});
|
|
89
|
-
|
|
90
|
-
test('verifyCredential returns false when signer throws (catch path)', async () => {
|
|
91
|
-
const vc: VerifiableCredential = { ...baseVC, proof: {
|
|
92
|
-
type: 'DataIntegrityProof',
|
|
93
|
-
created: new Date().toISOString(),
|
|
94
|
-
verificationMethod: multikey.encodePublicKey(new Uint8Array(33).fill(4), 'Secp256k1'),
|
|
95
|
-
proofPurpose: 'assertionMethod',
|
|
96
|
-
proofValue: 'z' + Buffer.from('sig').toString('base64url')
|
|
97
|
-
} } as any;
|
|
98
|
-
const cm: any = sdk.credentials as any;
|
|
99
|
-
const original = cm.getSigner;
|
|
100
|
-
cm.getSigner = () => ({
|
|
101
|
-
verify: () => { throw new Error('boom'); },
|
|
102
|
-
sign: async () => Buffer.from('')
|
|
103
|
-
});
|
|
104
|
-
await expect(sdk.credentials.verifyCredential(vc)).resolves.toBe(false);
|
|
105
|
-
cm.getSigner = original;
|
|
106
|
-
});
|
|
107
|
-
|
|
108
|
-
test('signCredential/verifyCredential works for Ed25519', async () => {
|
|
109
|
-
const sdkEd = OriginalsSDK.create({ defaultKeyType: 'Ed25519' });
|
|
110
|
-
const sk = ed25519.utils.randomPrivateKey();
|
|
111
|
-
const pk = await (ed25519 as any).getPublicKeyAsync(sk);
|
|
112
|
-
const skMb = multikey.encodePrivateKey(sk, 'Ed25519');
|
|
113
|
-
const pkMb = multikey.encodePublicKey(pk, 'Ed25519');
|
|
114
|
-
const signed = await sdkEd.credentials.signCredential(baseVC, skMb, pkMb);
|
|
115
|
-
expect(signed.proof).toBeDefined();
|
|
116
|
-
await expect(sdkEd.credentials.verifyCredential(signed)).resolves.toBe(true);
|
|
117
|
-
});
|
|
118
|
-
|
|
119
|
-
test('signCredential/verifyCredential works for ES256', async () => {
|
|
120
|
-
const sdkES256 = OriginalsSDK.create({ defaultKeyType: 'ES256' });
|
|
121
|
-
const sk = p256.utils.randomPrivateKey();
|
|
122
|
-
const pk = p256.getPublicKey(sk, true);
|
|
123
|
-
const skMb = multikey.encodePrivateKey(sk, 'P256');
|
|
124
|
-
const pkMb = multikey.encodePublicKey(pk, 'P256');
|
|
125
|
-
const signed = await sdkES256.credentials.signCredential(baseVC, skMb, pkMb);
|
|
126
|
-
expect(signed.proof).toBeDefined();
|
|
127
|
-
await expect(sdkES256.credentials.verifyCredential(signed)).resolves.toBe(true);
|
|
128
|
-
});
|
|
129
|
-
});
|
|
130
|
-
|
|
131
|
-
/** Inlined from CredentialManager.did-fallback-present.part.ts */
|
|
132
|
-
import { CredentialManager } from '../../../src/vc/CredentialManager';
|
|
133
|
-
import { DIDManager } from '../../../src/did/DIDManager';
|
|
134
|
-
|
|
135
|
-
describe('CredentialManager verification method resolution', () => {
|
|
136
|
-
const baseConfig = { network: 'mainnet', defaultKeyType: 'ES256K' } as any;
|
|
137
|
-
const credentialTemplate: VerifiableCredential = {
|
|
138
|
-
'@context': ['https://www.w3.org/2018/credentials/v1'],
|
|
139
|
-
type: ['VerifiableCredential', 'ResourceCreated'],
|
|
140
|
-
issuer: 'did:example:issuer',
|
|
141
|
-
issuanceDate: new Date().toISOString(),
|
|
142
|
-
credentialSubject: { id: 'did:example:subject' }
|
|
143
|
-
} as any;
|
|
144
|
-
|
|
145
|
-
test('resolves DID verificationMethod to multibase key material', async () => {
|
|
146
|
-
const signingManager = new CredentialManager(baseConfig);
|
|
147
|
-
const sk = secp256k1.utils.randomPrivateKey();
|
|
148
|
-
const pk = secp256k1.getPublicKey(sk, true);
|
|
149
|
-
const skMb = multikey.encodePrivateKey(sk, 'Secp256k1');
|
|
150
|
-
const pkMb = multikey.encodePublicKey(pk, 'Secp256k1');
|
|
151
|
-
const verificationMethod = 'did:example:123#key-1';
|
|
152
|
-
|
|
153
|
-
const signed = await signingManager.signCredential(credentialTemplate, skMb, verificationMethod);
|
|
154
|
-
|
|
155
|
-
const dm = new DIDManager(baseConfig);
|
|
156
|
-
spyOn(dm, 'resolveDID').mockResolvedValue({
|
|
157
|
-
'@context': ['https://www.w3.org/ns/did/v1'],
|
|
158
|
-
id: 'did:example:123',
|
|
159
|
-
verificationMethod: [
|
|
160
|
-
{
|
|
161
|
-
id: verificationMethod,
|
|
162
|
-
type: 'Multikey',
|
|
163
|
-
controller: 'did:example:123',
|
|
164
|
-
publicKeyMultibase: pkMb
|
|
165
|
-
}
|
|
166
|
-
]
|
|
167
|
-
} as any);
|
|
168
|
-
|
|
169
|
-
const verifyingManager = new CredentialManager(baseConfig, dm);
|
|
170
|
-
await expect(verifyingManager.verifyCredential(signed)).resolves.toBe(true);
|
|
171
|
-
});
|
|
172
|
-
|
|
173
|
-
test('falls back to proof.publicKeyMultibase when DID resolution lacks key material', async () => {
|
|
174
|
-
const signingManager = new CredentialManager(baseConfig);
|
|
175
|
-
const sk = secp256k1.utils.randomPrivateKey();
|
|
176
|
-
const pk = secp256k1.getPublicKey(sk, true);
|
|
177
|
-
const skMb = multikey.encodePrivateKey(sk, 'Secp256k1');
|
|
178
|
-
const pkMb = multikey.encodePublicKey(pk, 'Secp256k1');
|
|
179
|
-
const verificationMethod = 'did:example:456#key-1';
|
|
180
|
-
|
|
181
|
-
const signed = await signingManager.signCredential(credentialTemplate, skMb, verificationMethod);
|
|
182
|
-
(signed.proof as any).publicKeyMultibase = pkMb;
|
|
183
|
-
|
|
184
|
-
const dm = new DIDManager(baseConfig);
|
|
185
|
-
spyOn(dm, 'resolveDID').mockResolvedValue({
|
|
186
|
-
'@context': ['https://www.w3.org/ns/did/v1'],
|
|
187
|
-
id: 'did:example:456'
|
|
188
|
-
} as any);
|
|
189
|
-
|
|
190
|
-
const verifyingManager = new CredentialManager(baseConfig, dm);
|
|
191
|
-
await expect(verifyingManager.verifyCredential(signed)).resolves.toBe(true);
|
|
192
|
-
});
|
|
193
|
-
});
|
|
194
|
-
|
|
195
|
-
describe('CredentialManager verify with didManager present but legacy path', () => {
|
|
196
|
-
test('verifyCredential returns false when legacy proof invalid and didManager present', async () => {
|
|
197
|
-
const dm = new DIDManager({ network: 'mainnet', defaultKeyType: 'ES256K' } as any);
|
|
198
|
-
const cm = new CredentialManager({ network: 'mainnet', defaultKeyType: 'ES256K' } as any, dm);
|
|
199
|
-
const vc: any = {
|
|
200
|
-
'@context': ['https://www.w3.org/2018/credentials/v1'],
|
|
201
|
-
type: ['VerifiableCredential'],
|
|
202
|
-
issuer: 'did:ex',
|
|
203
|
-
issuanceDate: new Date().toISOString(),
|
|
204
|
-
credentialSubject: {},
|
|
205
|
-
proof: { type: 'DataIntegrityProof', created: new Date().toISOString(), verificationMethod: multikey.encodePublicKey(new Uint8Array(33).fill(5), 'Secp256k1'), proofPurpose: 'assertionMethod', proofValue: 'z' + Buffer.from('bad').toString('base64url') }
|
|
206
|
-
};
|
|
207
|
-
const ok = await cm.verifyCredential(vc);
|
|
208
|
-
expect(ok).toBe(false);
|
|
209
|
-
});
|
|
210
|
-
});
|
|
211
|
-
|
|
212
|
-
|
|
213
|
-
|
|
214
|
-
|
|
215
|
-
/** Inlined from CredentialManager.did-fallback-with-didmgr.part.ts */
|
|
216
|
-
import { registerVerificationMethod, verificationMethodRegistry } from '../../../src/vc/documentLoader';
|
|
217
|
-
|
|
218
|
-
describe('CredentialManager with didManager provided falls back to local signer when VM incomplete', () => {
|
|
219
|
-
afterEach(() => {
|
|
220
|
-
verificationMethodRegistry.clear();
|
|
221
|
-
});
|
|
222
|
-
test('covers didManager gate with fallback path', async () => {
|
|
223
|
-
const dm = new DIDManager({ network: 'mainnet', defaultKeyType: 'ES256K' } as any);
|
|
224
|
-
const cm = new CredentialManager({ network: 'mainnet', defaultKeyType: 'ES256K' } as any, dm);
|
|
225
|
-
// Register VM without publicKeyMultibase so DID path cannot proceed and will fall back
|
|
226
|
-
registerVerificationMethod({ id: 'did:ex:vm#fallback', controller: 'did:ex' } as any);
|
|
227
|
-
|
|
228
|
-
const sk = secp256k1.utils.randomPrivateKey();
|
|
229
|
-
const skMb = multikey.encodePrivateKey(sk, 'Secp256k1');
|
|
230
|
-
|
|
231
|
-
const vc: any = {
|
|
232
|
-
'@context': ['https://www.w3.org/2018/credentials/v1'],
|
|
233
|
-
type: ['VerifiableCredential'],
|
|
234
|
-
issuer: 'did:ex',
|
|
235
|
-
issuanceDate: new Date().toISOString(),
|
|
236
|
-
credentialSubject: {}
|
|
237
|
-
};
|
|
238
|
-
|
|
239
|
-
const signed = await cm.signCredential(vc, skMb, 'did:ex:vm#fallback');
|
|
240
|
-
expect(signed.proof).toBeDefined();
|
|
241
|
-
});
|
|
242
|
-
});
|
|
243
|
-
|
|
244
|
-
|
|
245
|
-
/** Inlined from CredentialManager.fallback-branch.part.ts */
|
|
246
|
-
|
|
247
|
-
describe('CredentialManager DID path fallback when VM doc lacks type', () => {
|
|
248
|
-
afterEach(() => {
|
|
249
|
-
verificationMethodRegistry.clear();
|
|
250
|
-
});
|
|
251
|
-
test('falls back to legacy signing if DID loader returns VM missing fields', async () => {
|
|
252
|
-
const dm = new DIDManager({ network: 'mainnet', defaultKeyType: 'ES256K' } as any);
|
|
253
|
-
const cm = new CredentialManager({ network: 'mainnet', defaultKeyType: 'ES256K' } as any, dm);
|
|
254
|
-
// Register minimal VM without type/publicKeyMultibase so DID path cannot proceed to Issuer
|
|
255
|
-
registerVerificationMethod({ id: 'did:ex:vm#x', controller: 'did:ex' } as any);
|
|
256
|
-
const sk = new Uint8Array(32).fill(1);
|
|
257
|
-
const pk = new Uint8Array(33).fill(2);
|
|
258
|
-
const vc: any = { '@context': ['https://www.w3.org/2018/credentials/v1'], type: ['VerifiableCredential'], issuer: 'did:ex', issuanceDate: new Date().toISOString(), credentialSubject: {} };
|
|
259
|
-
const signed = await cm.signCredential(vc, multikey.encodePrivateKey(sk, 'Secp256k1'), 'did:ex:vm#x');
|
|
260
|
-
expect(signed.proof).toBeDefined();
|
|
261
|
-
});
|
|
262
|
-
});
|
|
263
|
-
|
|
264
|
-
|
|
265
|
-
|
|
266
|
-
|
|
267
|
-
/** Inlined from CredentialManager.local-verify.no-did.part.ts */
|
|
268
|
-
|
|
269
|
-
describe('CredentialManager local verify path without didManager', () => {
|
|
270
|
-
test('signs and verifies locally when didManager is undefined', async () => {
|
|
271
|
-
const cm = new CredentialManager({ network: 'mainnet', defaultKeyType: 'ES256K' } as any);
|
|
272
|
-
const baseVC: VerifiableCredential = {
|
|
273
|
-
'@context': ['https://www.w3.org/2018/credentials/v1'],
|
|
274
|
-
type: ['VerifiableCredential'],
|
|
275
|
-
issuer: 'did:ex',
|
|
276
|
-
issuanceDate: new Date().toISOString(),
|
|
277
|
-
credentialSubject: {}
|
|
278
|
-
} as any;
|
|
279
|
-
const sk = secp256k1.utils.randomPrivateKey();
|
|
280
|
-
const pk = secp256k1.getPublicKey(sk, true);
|
|
281
|
-
const skMb = multikey.encodePrivateKey(sk, 'Secp256k1');
|
|
282
|
-
const pkMb = multikey.encodePublicKey(pk, 'Secp256k1');
|
|
283
|
-
const signed = await cm.signCredential(baseVC, skMb, pkMb);
|
|
284
|
-
const ok = await cm.verifyCredential(signed);
|
|
285
|
-
expect(ok).toBe(true);
|
|
286
|
-
});
|
|
287
|
-
|
|
288
|
-
test('signCredential is deterministic for reordered credentialSubject properties', async () => {
|
|
289
|
-
const cm = new CredentialManager({ network: 'mainnet', defaultKeyType: 'Ed25519' } as any);
|
|
290
|
-
const seed = new Uint8Array(32).fill(11);
|
|
291
|
-
const skMb = multikey.encodePrivateKey(seed, 'Ed25519');
|
|
292
|
-
const pk = await (ed25519 as any).getPublicKeyAsync(seed);
|
|
293
|
-
const pkMb = multikey.encodePublicKey(pk, 'Ed25519');
|
|
294
|
-
const issuanceDate = '2024-01-01T00:00:00Z';
|
|
295
|
-
|
|
296
|
-
const credentialA: VerifiableCredential = {
|
|
297
|
-
'@context': ['https://www.w3.org/2018/credentials/v1'],
|
|
298
|
-
type: ['VerifiableCredential'],
|
|
299
|
-
issuer: 'did:ex',
|
|
300
|
-
issuanceDate,
|
|
301
|
-
credentialSubject: {
|
|
302
|
-
id: 'did:ex:subject',
|
|
303
|
-
role: 'member',
|
|
304
|
-
profile: {
|
|
305
|
-
nickname: 'alice',
|
|
306
|
-
stats: {
|
|
307
|
-
followers: 10,
|
|
308
|
-
posts: 3
|
|
309
|
-
}
|
|
310
|
-
}
|
|
311
|
-
}
|
|
312
|
-
} as any;
|
|
313
|
-
|
|
314
|
-
const credentialB: VerifiableCredential = {
|
|
315
|
-
'@context': ['https://www.w3.org/2018/credentials/v1'],
|
|
316
|
-
type: ['VerifiableCredential'],
|
|
317
|
-
issuer: 'did:ex',
|
|
318
|
-
issuanceDate,
|
|
319
|
-
credentialSubject: {
|
|
320
|
-
profile: {
|
|
321
|
-
stats: {
|
|
322
|
-
posts: 3,
|
|
323
|
-
followers: 10
|
|
324
|
-
},
|
|
325
|
-
nickname: 'alice'
|
|
326
|
-
},
|
|
327
|
-
role: 'member',
|
|
328
|
-
id: 'did:ex:subject'
|
|
329
|
-
}
|
|
330
|
-
} as any;
|
|
331
|
-
|
|
332
|
-
const signedA = await cm.signCredential(credentialA, skMb, pkMb);
|
|
333
|
-
const signedB = await cm.signCredential(credentialB, skMb, pkMb);
|
|
334
|
-
|
|
335
|
-
// Handle both single proof and proof array cases
|
|
336
|
-
const proofA = Array.isArray(signedA.proof) ? signedA.proof[0] : signedA.proof;
|
|
337
|
-
const proofB = Array.isArray(signedB.proof) ? signedB.proof[0] : signedB.proof;
|
|
338
|
-
expect(proofA?.proofValue).toEqual(proofB?.proofValue);
|
|
339
|
-
await expect(cm.verifyCredential(signedA)).resolves.toBe(true);
|
|
340
|
-
await expect(cm.verifyCredential(signedB)).resolves.toBe(true);
|
|
341
|
-
});
|
|
342
|
-
|
|
343
|
-
test('verifyCredential succeeds when proof fields are reordered', async () => {
|
|
344
|
-
const cm = new CredentialManager({ network: 'mainnet', defaultKeyType: 'Ed25519' } as any);
|
|
345
|
-
const seed = new Uint8Array(32).fill(13);
|
|
346
|
-
const skMb = multikey.encodePrivateKey(seed, 'Ed25519');
|
|
347
|
-
const pk = await (ed25519 as any).getPublicKeyAsync(seed);
|
|
348
|
-
const pkMb = multikey.encodePublicKey(pk, 'Ed25519');
|
|
349
|
-
|
|
350
|
-
const credential: VerifiableCredential = {
|
|
351
|
-
'@context': ['https://www.w3.org/2018/credentials/v1'],
|
|
352
|
-
type: ['VerifiableCredential'],
|
|
353
|
-
issuer: 'did:ex',
|
|
354
|
-
issuanceDate: '2024-01-01T00:00:00Z',
|
|
355
|
-
credentialSubject: {
|
|
356
|
-
id: 'did:ex:subject',
|
|
357
|
-
role: 'member'
|
|
358
|
-
}
|
|
359
|
-
} as any;
|
|
360
|
-
|
|
361
|
-
const signed = await cm.signCredential(credential, skMb, pkMb);
|
|
362
|
-
const proof = signed.proof as Proof;
|
|
363
|
-
const reorderedProof: Proof = {
|
|
364
|
-
proofValue: proof.proofValue,
|
|
365
|
-
verificationMethod: proof.verificationMethod!,
|
|
366
|
-
proofPurpose: proof.proofPurpose,
|
|
367
|
-
created: proof.created,
|
|
368
|
-
type: proof.type
|
|
369
|
-
};
|
|
370
|
-
|
|
371
|
-
const mutatedCredential: VerifiableCredential = {
|
|
372
|
-
...signed,
|
|
373
|
-
proof: reorderedProof
|
|
374
|
-
} as any;
|
|
375
|
-
|
|
376
|
-
await expect(cm.verifyCredential(mutatedCredential)).resolves.toBe(true);
|
|
377
|
-
});
|
|
378
|
-
});
|
|
379
|
-
|
|
380
|
-
|
|
381
|
-
|
|
382
|
-
|
|
383
|
-
/** Inlined from CredentialManager.missing-type-default.part.ts */
|
|
384
|
-
describe('CredentialManager DID path with VM missing type defaults to Multikey', () => {
|
|
385
|
-
afterEach(() => {
|
|
386
|
-
verificationMethodRegistry.clear();
|
|
387
|
-
});
|
|
388
|
-
test('uses default type when document.type is absent', async () => {
|
|
389
|
-
const dm = new DIDManager({ network: 'mainnet', defaultKeyType: 'Ed25519' } as any);
|
|
390
|
-
const cm = new CredentialManager({ network: 'mainnet', defaultKeyType: 'Ed25519' } as any, dm);
|
|
391
|
-
const sk = new Uint8Array(32).fill(5);
|
|
392
|
-
const pk = new Uint8Array(32).fill(7);
|
|
393
|
-
const pkMb = multikey.encodePublicKey(pk, 'Ed25519');
|
|
394
|
-
const skMb = multikey.encodePrivateKey(sk, 'Ed25519');
|
|
395
|
-
// Register VM without type so code path uses document.type || 'Multikey'
|
|
396
|
-
registerVerificationMethod({ id: 'did:ex:vm#3', controller: 'did:ex', publicKeyMultibase: pkMb } as any);
|
|
397
|
-
const vc: any = { '@context': ['https://www.w3.org/2018/credentials/v1'], type: ['VerifiableCredential'], issuer: 'did:ex', issuanceDate: new Date().toISOString(), credentialSubject: {} };
|
|
398
|
-
const signed = await cm.signCredential(vc, skMb, 'did:ex:vm#3');
|
|
399
|
-
expect(signed.proof).toBeDefined();
|
|
400
|
-
});
|
|
401
|
-
});
|
|
402
|
-
|
|
403
|
-
|
|
404
|
-
|
|
405
|
-
|
|
406
|
-
/** Inlined from CredentialManager.more.part.ts */
|
|
407
|
-
|
|
408
|
-
describe('CredentialManager additional branches', () => {
|
|
409
|
-
afterEach(() => {
|
|
410
|
-
verificationMethodRegistry.clear();
|
|
411
|
-
});
|
|
412
|
-
test('getSigner default case used for unknown key type', async () => {
|
|
413
|
-
const cm = new CredentialManager({ network: 'mainnet', defaultKeyType: 'Unknown' as any });
|
|
414
|
-
const vc: any = { '@context': ['https://www.w3.org/2018/credentials/v1'], type: ['VerifiableCredential'], issuer: 'did:ex', issuanceDate: new Date().toISOString(), credentialSubject: {} };
|
|
415
|
-
const sk = new Uint8Array(32).fill(1);
|
|
416
|
-
const pk = new Uint8Array(33).fill(2);
|
|
417
|
-
const signed = await cm.signCredential(vc, multikey.encodePrivateKey(sk, 'Secp256k1'), multikey.encodePublicKey(pk, 'Secp256k1'));
|
|
418
|
-
expect(signed.proof).toBeDefined();
|
|
419
|
-
});
|
|
420
|
-
|
|
421
|
-
test('signCredential uses DID-based path with documentLoader', async () => {
|
|
422
|
-
const dm = new DIDManager({ network: 'mainnet', defaultKeyType: 'Ed25519' } as any);
|
|
423
|
-
const cm = new CredentialManager({ network: 'mainnet', defaultKeyType: 'Ed25519' } as any, dm);
|
|
424
|
-
const sk = new Uint8Array(32).fill(9);
|
|
425
|
-
const pk = new Uint8Array(32).fill(7);
|
|
426
|
-
const vm = { id: 'did:ex:vm#1', controller: 'did:ex', publicKeyMultibase: (await import('../../../src/crypto/Multikey')).multikey.encodePublicKey(pk, 'Ed25519'), type: 'Multikey' } as any;
|
|
427
|
-
registerVerificationMethod(vm as any);
|
|
428
|
-
const vc: any = { '@context': ['https://www.w3.org/2018/credentials/v1'], type: ['VerifiableCredential'], issuer: 'did:ex', issuanceDate: new Date().toISOString(), credentialSubject: {} };
|
|
429
|
-
const skMb = (await import('../../../src/crypto/Multikey')).multikey.encodePrivateKey(sk, 'Ed25519');
|
|
430
|
-
const signed = await cm.signCredential(vc, skMb, 'did:ex:vm#1');
|
|
431
|
-
expect(signed.proof).toBeDefined();
|
|
432
|
-
});
|
|
433
|
-
|
|
434
|
-
test('signCredential uses issuer object.id when issuer is object', async () => {
|
|
435
|
-
const dm = new DIDManager({ network: 'mainnet', defaultKeyType: 'Ed25519' } as any);
|
|
436
|
-
const cm = new CredentialManager({ network: 'mainnet', defaultKeyType: 'Ed25519' } as any, dm);
|
|
437
|
-
const sk = new Uint8Array(32).fill(4);
|
|
438
|
-
const pk = new Uint8Array(32).fill(6);
|
|
439
|
-
const { multikey } = await import('../../../src/crypto/Multikey');
|
|
440
|
-
const vm = { id: 'did:ex:vm#2', controller: 'did:ex', publicKeyMultibase: multikey.encodePublicKey(pk, 'Ed25519'), type: 'Multikey' } as any;
|
|
441
|
-
registerVerificationMethod(vm as any);
|
|
442
|
-
const vc: any = { '@context': ['https://www.w3.org/2018/credentials/v1'], type: ['VerifiableCredential'], issuer: { id: 'did:ex' }, issuanceDate: new Date().toISOString(), credentialSubject: {} };
|
|
443
|
-
const skMb = multikey.encodePrivateKey(sk, 'Ed25519');
|
|
444
|
-
const signed = await cm.signCredential(vc, skMb, 'did:ex:vm#2');
|
|
445
|
-
expect(signed.proof).toBeDefined();
|
|
446
|
-
});
|
|
447
|
-
|
|
448
|
-
test('verifyCredential takes cryptosuite from proof array first element', async () => {
|
|
449
|
-
const dm = new DIDManager({ network: 'mainnet', defaultKeyType: 'Ed25519' } as any);
|
|
450
|
-
const cm = new CredentialManager({ network: 'mainnet', defaultKeyType: 'Ed25519' } as any, dm);
|
|
451
|
-
const { multikey } = await import('../../../src/crypto/Multikey');
|
|
452
|
-
const sk = new Uint8Array(32).fill(11);
|
|
453
|
-
const pk = new Uint8Array(32).fill(12);
|
|
454
|
-
const skMb = multikey.encodePrivateKey(sk, 'Ed25519');
|
|
455
|
-
const pkMb = multikey.encodePublicKey(pk, 'Ed25519');
|
|
456
|
-
const loader = async (iri: string) => {
|
|
457
|
-
if (iri.includes('#')) return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
|
|
458
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
459
|
-
};
|
|
460
|
-
const issuer = new (await import('../../../src/vc/Issuer')).Issuer(dm, { id: 'did:ex#k', controller: 'did:ex', publicKeyMultibase: pkMb, secretKeyMultibase: skMb } as any);
|
|
461
|
-
// Register VM so verifier documentLoader can resolve the key by fragment
|
|
462
|
-
registerVerificationMethod({ id: 'did:ex#k', type: 'Multikey', controller: 'did:ex', publicKeyMultibase: pkMb } as any);
|
|
463
|
-
const unsigned: any = { id: 'urn:cred:x', type: ['VerifiableCredential'], issuer: 'did:ex', issuanceDate: new Date().toISOString(), credentialSubject: {} };
|
|
464
|
-
const vc = await issuer.issueCredential(unsigned, { proofPurpose: 'assertionMethod', documentLoader: loader as any });
|
|
465
|
-
(vc as any).proof = [ (vc as any).proof ];
|
|
466
|
-
// In some environments verifyCredential may return false due to signature differences,
|
|
467
|
-
// but we still exercise the branch; assert boolean return rather than strict true.
|
|
468
|
-
const verified = await cm.verifyCredential(vc);
|
|
469
|
-
expect(typeof verified).toBe('boolean');
|
|
470
|
-
});
|
|
471
|
-
});
|
|
472
|
-
|
|
473
|
-
|
|
474
|
-
|
|
475
|
-
|
|
476
|
-
/** Inlined from CredentialManager.type-fallback.part.ts */
|
|
477
|
-
|
|
478
|
-
describe('CredentialManager.getSigner default case when config keyType undefined', () => {
|
|
479
|
-
test('defaults to ES256K', async () => {
|
|
480
|
-
const cm = new CredentialManager({ network: 'mainnet' } as any);
|
|
481
|
-
const vc: any = { '@context': ['https://www.w3.org/2018/credentials/v1'], type: ['VerifiableCredential'], issuer: 'did:ex', issuanceDate: new Date().toISOString(), credentialSubject: {} };
|
|
482
|
-
const sk = new Uint8Array(32).fill(3);
|
|
483
|
-
const pk = new Uint8Array(33).fill(2);
|
|
484
|
-
const signed = await cm.signCredential(vc, multikey.encodePrivateKey(sk, 'Secp256k1'), multikey.encodePublicKey(pk, 'Secp256k1'));
|
|
485
|
-
expect(signed.proof).toBeDefined();
|
|
486
|
-
});
|
|
487
|
-
});
|
|
@@ -1,107 +0,0 @@
|
|
|
1
|
-
import { describe, test, expect } from 'bun:test';
|
|
2
|
-
import { Issuer } from '../../../src/vc/Issuer';
|
|
3
|
-
import * as ed25519 from '@noble/ed25519';
|
|
4
|
-
import { multikey } from '../../../src/crypto/Multikey';
|
|
5
|
-
import { DIDManager } from '../../../src/did/DIDManager';
|
|
6
|
-
|
|
7
|
-
describe('diwings Issuer', () => {
|
|
8
|
-
const didManager = new DIDManager({} as any);
|
|
9
|
-
const did = 'did:peer:issuer1';
|
|
10
|
-
const sk = new Uint8Array(32).map((_, i) => (i + 1) & 0xff);
|
|
11
|
-
const pk = ed25519.getPublicKey(sk);
|
|
12
|
-
const vm = {
|
|
13
|
-
id: `${did}#keys-1`,
|
|
14
|
-
controller: did,
|
|
15
|
-
type: 'Multikey',
|
|
16
|
-
publicKeyMultibase: multikey.encodePublicKey(pk, 'Ed25519'),
|
|
17
|
-
secretKeyMultibase: multikey.encodePrivateKey(sk, 'Ed25519')
|
|
18
|
-
};
|
|
19
|
-
|
|
20
|
-
const baseCredential = {
|
|
21
|
-
type: ['VerifiableCredential', 'Test'],
|
|
22
|
-
issuer: did,
|
|
23
|
-
issuanceDate: new Date().toISOString(),
|
|
24
|
-
credentialSubject: { id: 'did:peer:subject1' }
|
|
25
|
-
} as any;
|
|
26
|
-
|
|
27
|
-
test('issues v2 presentation and produces proof referencing challenge/domain', async () => {
|
|
28
|
-
const issuer = new Issuer(didManager, vm);
|
|
29
|
-
const vp = await issuer.issuePresentation(
|
|
30
|
-
{
|
|
31
|
-
type: ['VerifiablePresentation'],
|
|
32
|
-
holder: did,
|
|
33
|
-
verifiableCredential: []
|
|
34
|
-
} as any,
|
|
35
|
-
{ proofPurpose: 'authentication', challenge: 'abc', domain: 'example.org' }
|
|
36
|
-
);
|
|
37
|
-
expect(vp['@context'][0]).toContain('/ns/credentials/v2');
|
|
38
|
-
expect(vp.proof).toBeDefined();
|
|
39
|
-
});
|
|
40
|
-
|
|
41
|
-
test('throws if missing secret key', async () => {
|
|
42
|
-
const issuer = new Issuer(didManager, { ...vm, secretKeyMultibase: undefined });
|
|
43
|
-
await expect(issuer.issueCredential(baseCredential, { proofPurpose: 'assertionMethod' })).rejects.toThrow('Missing secretKeyMultibase');
|
|
44
|
-
});
|
|
45
|
-
|
|
46
|
-
test('issues v2 credential and produces proof', async () => {
|
|
47
|
-
const issuer = new Issuer(didManager, vm);
|
|
48
|
-
const vc = await issuer.issueCredential(baseCredential, { proofPurpose: 'assertionMethod' });
|
|
49
|
-
expect(vc['@context'][0]).toContain('/ns/credentials/v2');
|
|
50
|
-
expect(vc.proof).toBeDefined();
|
|
51
|
-
});
|
|
52
|
-
});
|
|
53
|
-
|
|
54
|
-
/** Inlined from Issuer.more.part.ts */
|
|
55
|
-
|
|
56
|
-
describe('Issuer branches', () => {
|
|
57
|
-
const dm = new DIDManager({} as any);
|
|
58
|
-
const vm = {
|
|
59
|
-
id: 'did:ex:1#key-1',
|
|
60
|
-
controller: 'did:ex:1',
|
|
61
|
-
publicKeyMultibase: 'z', // force decode failure -> default Ed25519 path
|
|
62
|
-
secretKeyMultibase: 'z7' // invalid but never used due to loader use only
|
|
63
|
-
} as any;
|
|
64
|
-
|
|
65
|
-
test('throws when missing secretKeyMultibase', async () => {
|
|
66
|
-
const issuer = new Issuer(dm, { ...vm, secretKeyMultibase: undefined });
|
|
67
|
-
await expect(issuer.issueCredential({ id: 'urn:cred:1', type: ['VerifiableCredential'], issuer: 'did:ex:1', issuanceDate: new Date().toISOString(), credentialSubject: {} } as any, { proofPurpose: 'assertionMethod' })).rejects.toThrow('Missing secretKeyMultibase');
|
|
68
|
-
});
|
|
69
|
-
|
|
70
|
-
test('issuePresentation throws when secretKeyMultibase missing', async () => {
|
|
71
|
-
const issuer = new Issuer(dm, { ...vm, secretKeyMultibase: undefined });
|
|
72
|
-
await expect(issuer.issuePresentation({ holder: 'did:ex:1' } as any, { proofPurpose: 'authentication' })).rejects.toThrow('Missing secretKeyMultibase');
|
|
73
|
-
});
|
|
74
|
-
|
|
75
|
-
test('issueCredential uses issuer object id when provided', async () => {
|
|
76
|
-
const issuer = new Issuer(dm, { ...vm, secretKeyMultibase: 'z7' });
|
|
77
|
-
await expect(issuer.issueCredential({ id: 'urn:cred:2', type: ['VerifiableCredential'], issuer: { id: 'did:ex:1' } as any, issuanceDate: new Date().toISOString(), credentialSubject: {} } as any, { proofPurpose: 'assertionMethod' })).rejects.toThrow();
|
|
78
|
-
});
|
|
79
|
-
|
|
80
|
-
test('issueCredential falls back to controller when issuer missing', async () => {
|
|
81
|
-
const issuer = new Issuer(dm, { ...vm, secretKeyMultibase: 'z7' });
|
|
82
|
-
await expect(issuer.issueCredential({ id: 'urn:cred:3', type: ['VerifiableCredential'], issuanceDate: new Date().toISOString(), credentialSubject: {} } as any, { proofPurpose: 'assertionMethod' })).rejects.toThrow();
|
|
83
|
-
});
|
|
84
|
-
});
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
88
|
-
|
|
89
|
-
/** Inlined from Issuer.unsupported.part.ts */
|
|
90
|
-
|
|
91
|
-
describe('Issuer unsupported key types', () => {
|
|
92
|
-
const dm = new DIDManager({} as any);
|
|
93
|
-
|
|
94
|
-
test('issueCredential throws for non-Ed25519', async () => {
|
|
95
|
-
const pubMb = multikey.encodePublicKey(new Uint8Array(33).fill(1), 'Secp256k1');
|
|
96
|
-
const secMb = multikey.encodePrivateKey(new Uint8Array(32).fill(2), 'Secp256k1');
|
|
97
|
-
const issuer = new Issuer(dm, { id: 'did:ex:3#k', controller: 'did:ex:3', publicKeyMultibase: pubMb, secretKeyMultibase: secMb });
|
|
98
|
-
await expect(issuer.issueCredential({ id: 'urn:cred:2', type: ['VerifiableCredential'], issuer: 'did:ex:3', issuanceDate: new Date().toISOString(), credentialSubject: {} } as any, { proofPurpose: 'assertionMethod' })).rejects.toThrow('Only Ed25519 supported');
|
|
99
|
-
});
|
|
100
|
-
|
|
101
|
-
test('issuePresentation throws for non-Ed25519', async () => {
|
|
102
|
-
const pubMb = multikey.encodePublicKey(new Uint8Array(33).fill(1), 'Secp256k1');
|
|
103
|
-
const secMb = multikey.encodePrivateKey(new Uint8Array(32).fill(2), 'Secp256k1');
|
|
104
|
-
const issuer = new Issuer(dm, { id: 'did:ex:3#k', controller: 'did:ex:3', publicKeyMultibase: pubMb, secretKeyMultibase: secMb });
|
|
105
|
-
await expect(issuer.issuePresentation({ holder: 'did:ex:3' } as any, { proofPurpose: 'authentication' })).rejects.toThrow('Only Ed25519 supported');
|
|
106
|
-
});
|
|
107
|
-
});
|