@originals/sdk 1.4.2 → 1.4.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (424) hide show
  1. package/dist/adapters/FeeOracleMock.d.ts +6 -0
  2. package/dist/adapters/FeeOracleMock.js +8 -0
  3. package/{src/adapters/index.ts → dist/adapters/index.d.ts} +0 -1
  4. package/dist/adapters/index.js +4 -0
  5. package/dist/adapters/providers/OrdHttpProvider.d.ts +56 -0
  6. package/dist/adapters/providers/OrdHttpProvider.js +110 -0
  7. package/dist/adapters/providers/OrdMockProvider.d.ts +70 -0
  8. package/dist/adapters/providers/OrdMockProvider.js +75 -0
  9. package/dist/adapters/types.d.ts +71 -0
  10. package/dist/adapters/types.js +1 -0
  11. package/dist/bitcoin/BitcoinManager.d.ts +15 -0
  12. package/dist/bitcoin/BitcoinManager.js +262 -0
  13. package/dist/bitcoin/BroadcastClient.d.ts +30 -0
  14. package/dist/bitcoin/BroadcastClient.js +35 -0
  15. package/dist/bitcoin/OrdinalsClient.d.ts +21 -0
  16. package/dist/bitcoin/OrdinalsClient.js +105 -0
  17. package/dist/bitcoin/PSBTBuilder.d.ts +24 -0
  18. package/dist/bitcoin/PSBTBuilder.js +80 -0
  19. package/dist/bitcoin/fee-calculation.d.ts +14 -0
  20. package/{src/bitcoin/fee-calculation.ts → dist/bitcoin/fee-calculation.js} +5 -12
  21. package/dist/bitcoin/providers/OrdNodeProvider.d.ts +38 -0
  22. package/dist/bitcoin/providers/OrdNodeProvider.js +67 -0
  23. package/dist/bitcoin/providers/OrdinalsProvider.d.ts +33 -0
  24. package/dist/bitcoin/providers/OrdinalsProvider.js +50 -0
  25. package/dist/bitcoin/providers/types.d.ts +63 -0
  26. package/dist/bitcoin/providers/types.js +1 -0
  27. package/dist/bitcoin/transactions/commit.d.ts +89 -0
  28. package/dist/bitcoin/transactions/commit.js +311 -0
  29. package/dist/bitcoin/transactions/index.d.ts +7 -0
  30. package/{src/bitcoin/transactions/index.ts → dist/bitcoin/transactions/index.js} +1 -6
  31. package/dist/bitcoin/transfer.d.ts +9 -0
  32. package/dist/bitcoin/transfer.js +26 -0
  33. package/dist/bitcoin/utxo-selection.d.ts +78 -0
  34. package/dist/bitcoin/utxo-selection.js +237 -0
  35. package/dist/bitcoin/utxo.d.ts +26 -0
  36. package/dist/bitcoin/utxo.js +78 -0
  37. package/dist/contexts/credentials-v1.json +195 -0
  38. package/dist/contexts/credentials-v2-examples.json +5 -0
  39. package/dist/contexts/credentials-v2.json +301 -0
  40. package/dist/contexts/credentials.json +195 -0
  41. package/dist/contexts/data-integrity-v2.json +81 -0
  42. package/dist/contexts/dids.json +57 -0
  43. package/dist/contexts/ed255192020.json +93 -0
  44. package/dist/contexts/ordinals-plus.json +23 -0
  45. package/dist/contexts/originals.json +22 -0
  46. package/dist/core/OriginalsSDK.d.ts +158 -0
  47. package/dist/core/OriginalsSDK.js +274 -0
  48. package/dist/crypto/Multikey.d.ts +30 -0
  49. package/dist/crypto/Multikey.js +149 -0
  50. package/dist/crypto/Signer.d.ts +21 -0
  51. package/dist/crypto/Signer.js +196 -0
  52. package/dist/crypto/noble-init.d.ts +18 -0
  53. package/dist/crypto/noble-init.js +106 -0
  54. package/dist/did/BtcoDidResolver.d.ts +57 -0
  55. package/dist/did/BtcoDidResolver.js +166 -0
  56. package/dist/did/DIDManager.d.ts +101 -0
  57. package/dist/did/DIDManager.js +493 -0
  58. package/dist/did/Ed25519Verifier.d.ts +30 -0
  59. package/dist/did/Ed25519Verifier.js +59 -0
  60. package/dist/did/KeyManager.d.ts +17 -0
  61. package/dist/did/KeyManager.js +207 -0
  62. package/dist/did/WebVHManager.d.ts +100 -0
  63. package/dist/did/WebVHManager.js +312 -0
  64. package/dist/did/createBtcoDidDocument.d.ts +10 -0
  65. package/dist/did/createBtcoDidDocument.js +42 -0
  66. package/dist/did/providers/OrdinalsClientProviderAdapter.d.ts +23 -0
  67. package/dist/did/providers/OrdinalsClientProviderAdapter.js +51 -0
  68. package/dist/events/EventEmitter.d.ts +115 -0
  69. package/dist/events/EventEmitter.js +198 -0
  70. package/dist/events/index.d.ts +7 -0
  71. package/dist/events/index.js +6 -0
  72. package/dist/events/types.d.ts +286 -0
  73. package/dist/events/types.js +9 -0
  74. package/dist/examples/basic-usage.d.ts +3 -0
  75. package/dist/examples/basic-usage.js +62 -0
  76. package/dist/examples/create-module-original.d.ts +32 -0
  77. package/dist/examples/create-module-original.js +376 -0
  78. package/dist/examples/full-lifecycle-flow.d.ts +56 -0
  79. package/dist/examples/full-lifecycle-flow.js +419 -0
  80. package/dist/examples/run.d.ts +12 -0
  81. package/dist/examples/run.js +51 -0
  82. package/dist/index.d.ts +43 -0
  83. package/dist/index.js +52 -0
  84. package/dist/kinds/KindRegistry.d.ts +76 -0
  85. package/dist/kinds/KindRegistry.js +216 -0
  86. package/dist/kinds/index.d.ts +33 -0
  87. package/{src/kinds/index.ts → dist/kinds/index.js} +6 -44
  88. package/dist/kinds/types.d.ts +363 -0
  89. package/dist/kinds/types.js +25 -0
  90. package/dist/kinds/validators/AgentValidator.d.ts +14 -0
  91. package/dist/kinds/validators/AgentValidator.js +155 -0
  92. package/dist/kinds/validators/AppValidator.d.ts +14 -0
  93. package/dist/kinds/validators/AppValidator.js +135 -0
  94. package/dist/kinds/validators/DatasetValidator.d.ts +14 -0
  95. package/dist/kinds/validators/DatasetValidator.js +148 -0
  96. package/dist/kinds/validators/DocumentValidator.d.ts +14 -0
  97. package/dist/kinds/validators/DocumentValidator.js +180 -0
  98. package/dist/kinds/validators/MediaValidator.d.ts +14 -0
  99. package/dist/kinds/validators/MediaValidator.js +172 -0
  100. package/dist/kinds/validators/ModuleValidator.d.ts +14 -0
  101. package/dist/kinds/validators/ModuleValidator.js +140 -0
  102. package/dist/kinds/validators/base.d.ts +96 -0
  103. package/dist/kinds/validators/base.js +218 -0
  104. package/{src/kinds/validators/index.ts → dist/kinds/validators/index.d.ts} +0 -2
  105. package/dist/kinds/validators/index.js +10 -0
  106. package/dist/lifecycle/BatchOperations.d.ts +147 -0
  107. package/dist/lifecycle/BatchOperations.js +251 -0
  108. package/dist/lifecycle/LifecycleManager.d.ts +362 -0
  109. package/dist/lifecycle/LifecycleManager.js +1692 -0
  110. package/dist/lifecycle/OriginalsAsset.d.ts +164 -0
  111. package/dist/lifecycle/OriginalsAsset.js +380 -0
  112. package/dist/lifecycle/ProvenanceQuery.d.ts +126 -0
  113. package/dist/lifecycle/ProvenanceQuery.js +220 -0
  114. package/dist/lifecycle/ResourceVersioning.d.ts +73 -0
  115. package/dist/lifecycle/ResourceVersioning.js +127 -0
  116. package/dist/migration/MigrationManager.d.ts +86 -0
  117. package/dist/migration/MigrationManager.js +412 -0
  118. package/dist/migration/audit/AuditLogger.d.ts +51 -0
  119. package/dist/migration/audit/AuditLogger.js +156 -0
  120. package/dist/migration/checkpoint/CheckpointManager.d.ts +31 -0
  121. package/dist/migration/checkpoint/CheckpointManager.js +96 -0
  122. package/dist/migration/checkpoint/CheckpointStorage.d.ts +26 -0
  123. package/dist/migration/checkpoint/CheckpointStorage.js +89 -0
  124. package/dist/migration/index.d.ts +22 -0
  125. package/{src/migration/index.ts → dist/migration/index.js} +0 -6
  126. package/dist/migration/operations/BaseMigration.d.ts +48 -0
  127. package/dist/migration/operations/BaseMigration.js +83 -0
  128. package/dist/migration/operations/PeerToBtcoMigration.d.ts +25 -0
  129. package/dist/migration/operations/PeerToBtcoMigration.js +67 -0
  130. package/dist/migration/operations/PeerToWebvhMigration.d.ts +19 -0
  131. package/dist/migration/operations/PeerToWebvhMigration.js +46 -0
  132. package/dist/migration/operations/WebvhToBtcoMigration.d.ts +25 -0
  133. package/dist/migration/operations/WebvhToBtcoMigration.js +67 -0
  134. package/dist/migration/rollback/RollbackManager.d.ts +29 -0
  135. package/dist/migration/rollback/RollbackManager.js +146 -0
  136. package/dist/migration/state/StateMachine.d.ts +25 -0
  137. package/dist/migration/state/StateMachine.js +76 -0
  138. package/dist/migration/state/StateTracker.d.ts +36 -0
  139. package/dist/migration/state/StateTracker.js +123 -0
  140. package/dist/migration/types.d.ts +306 -0
  141. package/dist/migration/types.js +33 -0
  142. package/dist/migration/validation/BitcoinValidator.d.ts +13 -0
  143. package/dist/migration/validation/BitcoinValidator.js +83 -0
  144. package/dist/migration/validation/CredentialValidator.d.ts +13 -0
  145. package/dist/migration/validation/CredentialValidator.js +46 -0
  146. package/dist/migration/validation/DIDCompatibilityValidator.d.ts +16 -0
  147. package/dist/migration/validation/DIDCompatibilityValidator.js +127 -0
  148. package/dist/migration/validation/LifecycleValidator.d.ts +10 -0
  149. package/dist/migration/validation/LifecycleValidator.js +52 -0
  150. package/dist/migration/validation/StorageValidator.d.ts +10 -0
  151. package/dist/migration/validation/StorageValidator.js +65 -0
  152. package/dist/migration/validation/ValidationPipeline.d.ts +29 -0
  153. package/dist/migration/validation/ValidationPipeline.js +180 -0
  154. package/dist/resources/ResourceManager.d.ts +231 -0
  155. package/dist/resources/ResourceManager.js +573 -0
  156. package/{src/resources/index.ts → dist/resources/index.d.ts} +3 -13
  157. package/dist/resources/index.js +10 -0
  158. package/dist/resources/types.d.ts +93 -0
  159. package/dist/resources/types.js +80 -0
  160. package/dist/storage/LocalStorageAdapter.d.ts +11 -0
  161. package/dist/storage/LocalStorageAdapter.js +53 -0
  162. package/dist/storage/MemoryStorageAdapter.d.ts +6 -0
  163. package/dist/storage/MemoryStorageAdapter.js +21 -0
  164. package/dist/storage/StorageAdapter.d.ts +16 -0
  165. package/dist/storage/StorageAdapter.js +1 -0
  166. package/{src/storage/index.ts → dist/storage/index.d.ts} +0 -1
  167. package/dist/storage/index.js +2 -0
  168. package/dist/types/bitcoin.d.ts +84 -0
  169. package/dist/types/bitcoin.js +1 -0
  170. package/dist/types/common.d.ts +82 -0
  171. package/dist/types/common.js +1 -0
  172. package/dist/types/credentials.d.ts +75 -0
  173. package/dist/types/credentials.js +1 -0
  174. package/dist/types/did.d.ts +26 -0
  175. package/dist/types/did.js +1 -0
  176. package/{src/types/index.ts → dist/types/index.d.ts} +0 -2
  177. package/dist/types/index.js +5 -0
  178. package/dist/types/network.d.ts +78 -0
  179. package/dist/types/network.js +145 -0
  180. package/dist/utils/EventLogger.d.ts +71 -0
  181. package/dist/utils/EventLogger.js +232 -0
  182. package/dist/utils/Logger.d.ts +106 -0
  183. package/dist/utils/Logger.js +257 -0
  184. package/dist/utils/MetricsCollector.d.ts +110 -0
  185. package/dist/utils/MetricsCollector.js +264 -0
  186. package/dist/utils/bitcoin-address.d.ts +38 -0
  187. package/dist/utils/bitcoin-address.js +113 -0
  188. package/dist/utils/cbor.d.ts +2 -0
  189. package/dist/utils/cbor.js +9 -0
  190. package/dist/utils/encoding.d.ts +37 -0
  191. package/dist/utils/encoding.js +120 -0
  192. package/dist/utils/hash.d.ts +1 -0
  193. package/dist/utils/hash.js +5 -0
  194. package/dist/utils/retry.d.ts +10 -0
  195. package/dist/utils/retry.js +35 -0
  196. package/dist/utils/satoshi-validation.d.ts +60 -0
  197. package/dist/utils/satoshi-validation.js +156 -0
  198. package/dist/utils/serialization.d.ts +14 -0
  199. package/dist/utils/serialization.js +76 -0
  200. package/dist/utils/telemetry.d.ts +17 -0
  201. package/dist/utils/telemetry.js +24 -0
  202. package/dist/utils/validation.d.ts +5 -0
  203. package/dist/utils/validation.js +98 -0
  204. package/dist/vc/CredentialManager.d.ts +329 -0
  205. package/dist/vc/CredentialManager.js +615 -0
  206. package/dist/vc/Issuer.d.ts +27 -0
  207. package/dist/vc/Issuer.js +70 -0
  208. package/dist/vc/Verifier.d.ts +16 -0
  209. package/dist/vc/Verifier.js +50 -0
  210. package/dist/vc/cryptosuites/bbs.d.ts +44 -0
  211. package/dist/vc/cryptosuites/bbs.js +213 -0
  212. package/dist/vc/cryptosuites/bbsSimple.d.ts +9 -0
  213. package/dist/vc/cryptosuites/bbsSimple.js +12 -0
  214. package/dist/vc/cryptosuites/eddsa.d.ts +30 -0
  215. package/dist/vc/cryptosuites/eddsa.js +81 -0
  216. package/dist/vc/documentLoader.d.ts +16 -0
  217. package/dist/vc/documentLoader.js +59 -0
  218. package/dist/vc/proofs/data-integrity.d.ts +21 -0
  219. package/dist/vc/proofs/data-integrity.js +15 -0
  220. package/dist/vc/utils/jsonld.d.ts +2 -0
  221. package/dist/vc/utils/jsonld.js +15 -0
  222. package/package.json +5 -1
  223. package/.eslintrc.json +0 -33
  224. package/src/adapters/FeeOracleMock.ts +0 -9
  225. package/src/adapters/providers/OrdHttpProvider.ts +0 -126
  226. package/src/adapters/providers/OrdMockProvider.ts +0 -101
  227. package/src/adapters/types.ts +0 -66
  228. package/src/bitcoin/BitcoinManager.ts +0 -330
  229. package/src/bitcoin/BroadcastClient.ts +0 -54
  230. package/src/bitcoin/OrdinalsClient.ts +0 -119
  231. package/src/bitcoin/PSBTBuilder.ts +0 -106
  232. package/src/bitcoin/providers/OrdNodeProvider.ts +0 -92
  233. package/src/bitcoin/providers/OrdinalsProvider.ts +0 -56
  234. package/src/bitcoin/providers/types.ts +0 -59
  235. package/src/bitcoin/transactions/commit.ts +0 -465
  236. package/src/bitcoin/transfer.ts +0 -43
  237. package/src/bitcoin/utxo-selection.ts +0 -322
  238. package/src/bitcoin/utxo.ts +0 -113
  239. package/src/contexts/credentials-v1.json +0 -237
  240. package/src/contexts/credentials-v2-examples.json +0 -5
  241. package/src/contexts/credentials-v2.json +0 -340
  242. package/src/contexts/credentials.json +0 -237
  243. package/src/contexts/data-integrity-v2.json +0 -81
  244. package/src/contexts/dids.json +0 -58
  245. package/src/contexts/ed255192020.json +0 -93
  246. package/src/contexts/ordinals-plus.json +0 -23
  247. package/src/contexts/originals.json +0 -22
  248. package/src/core/OriginalsSDK.ts +0 -416
  249. package/src/crypto/Multikey.ts +0 -194
  250. package/src/crypto/Signer.ts +0 -254
  251. package/src/crypto/noble-init.ts +0 -121
  252. package/src/did/BtcoDidResolver.ts +0 -227
  253. package/src/did/DIDManager.ts +0 -694
  254. package/src/did/Ed25519Verifier.ts +0 -68
  255. package/src/did/KeyManager.ts +0 -236
  256. package/src/did/WebVHManager.ts +0 -498
  257. package/src/did/createBtcoDidDocument.ts +0 -59
  258. package/src/did/providers/OrdinalsClientProviderAdapter.ts +0 -68
  259. package/src/events/EventEmitter.ts +0 -222
  260. package/src/events/index.ts +0 -19
  261. package/src/events/types.ts +0 -331
  262. package/src/examples/basic-usage.ts +0 -78
  263. package/src/examples/create-module-original.ts +0 -435
  264. package/src/examples/full-lifecycle-flow.ts +0 -514
  265. package/src/examples/run.ts +0 -60
  266. package/src/index.ts +0 -150
  267. package/src/kinds/KindRegistry.ts +0 -290
  268. package/src/kinds/types.ts +0 -470
  269. package/src/kinds/validators/AgentValidator.ts +0 -257
  270. package/src/kinds/validators/AppValidator.ts +0 -211
  271. package/src/kinds/validators/DatasetValidator.ts +0 -242
  272. package/src/kinds/validators/DocumentValidator.ts +0 -311
  273. package/src/kinds/validators/MediaValidator.ts +0 -269
  274. package/src/kinds/validators/ModuleValidator.ts +0 -225
  275. package/src/kinds/validators/base.ts +0 -276
  276. package/src/lifecycle/BatchOperations.ts +0 -373
  277. package/src/lifecycle/LifecycleManager.ts +0 -2126
  278. package/src/lifecycle/OriginalsAsset.ts +0 -524
  279. package/src/lifecycle/ProvenanceQuery.ts +0 -280
  280. package/src/lifecycle/ResourceVersioning.ts +0 -163
  281. package/src/migration/MigrationManager.ts +0 -527
  282. package/src/migration/audit/AuditLogger.ts +0 -176
  283. package/src/migration/checkpoint/CheckpointManager.ts +0 -112
  284. package/src/migration/checkpoint/CheckpointStorage.ts +0 -101
  285. package/src/migration/operations/BaseMigration.ts +0 -126
  286. package/src/migration/operations/PeerToBtcoMigration.ts +0 -105
  287. package/src/migration/operations/PeerToWebvhMigration.ts +0 -62
  288. package/src/migration/operations/WebvhToBtcoMigration.ts +0 -105
  289. package/src/migration/rollback/RollbackManager.ts +0 -170
  290. package/src/migration/state/StateMachine.ts +0 -92
  291. package/src/migration/state/StateTracker.ts +0 -156
  292. package/src/migration/types.ts +0 -344
  293. package/src/migration/validation/BitcoinValidator.ts +0 -107
  294. package/src/migration/validation/CredentialValidator.ts +0 -62
  295. package/src/migration/validation/DIDCompatibilityValidator.ts +0 -151
  296. package/src/migration/validation/LifecycleValidator.ts +0 -64
  297. package/src/migration/validation/StorageValidator.ts +0 -79
  298. package/src/migration/validation/ValidationPipeline.ts +0 -213
  299. package/src/resources/ResourceManager.ts +0 -655
  300. package/src/resources/types.ts +0 -202
  301. package/src/storage/LocalStorageAdapter.ts +0 -61
  302. package/src/storage/MemoryStorageAdapter.ts +0 -29
  303. package/src/storage/StorageAdapter.ts +0 -25
  304. package/src/types/bitcoin.ts +0 -98
  305. package/src/types/common.ts +0 -92
  306. package/src/types/credentials.ts +0 -88
  307. package/src/types/did.ts +0 -31
  308. package/src/types/external-shims.d.ts +0 -53
  309. package/src/types/network.ts +0 -175
  310. package/src/utils/EventLogger.ts +0 -298
  311. package/src/utils/Logger.ts +0 -322
  312. package/src/utils/MetricsCollector.ts +0 -358
  313. package/src/utils/bitcoin-address.ts +0 -130
  314. package/src/utils/cbor.ts +0 -12
  315. package/src/utils/encoding.ts +0 -127
  316. package/src/utils/hash.ts +0 -6
  317. package/src/utils/retry.ts +0 -46
  318. package/src/utils/satoshi-validation.ts +0 -196
  319. package/src/utils/serialization.ts +0 -96
  320. package/src/utils/telemetry.ts +0 -40
  321. package/src/utils/validation.ts +0 -119
  322. package/src/vc/CredentialManager.ts +0 -918
  323. package/src/vc/Issuer.ts +0 -100
  324. package/src/vc/Verifier.ts +0 -47
  325. package/src/vc/cryptosuites/bbs.ts +0 -253
  326. package/src/vc/cryptosuites/bbsSimple.ts +0 -21
  327. package/src/vc/cryptosuites/eddsa.ts +0 -99
  328. package/src/vc/documentLoader.ts +0 -67
  329. package/src/vc/proofs/data-integrity.ts +0 -33
  330. package/src/vc/utils/jsonld.ts +0 -18
  331. package/tests/__mocks__/bbs-signatures.js +0 -17
  332. package/tests/__mocks__/mf-base58.js +0 -24
  333. package/tests/fixtures/did-documents.ts +0 -247
  334. package/tests/index.test.ts +0 -21
  335. package/tests/integration/BatchOperations.test.ts +0 -531
  336. package/tests/integration/CompleteLifecycle.e2e.test.ts +0 -735
  337. package/tests/integration/CredentialManager.test.ts +0 -42
  338. package/tests/integration/DIDManager.test.ts +0 -41
  339. package/tests/integration/DidPeerToWebVhFlow.test.ts +0 -351
  340. package/tests/integration/Events.test.ts +0 -435
  341. package/tests/integration/Lifecycle.transfer.btco.integration.test.ts +0 -25
  342. package/tests/integration/LifecycleManager.test.ts +0 -21
  343. package/tests/integration/MultikeyFlow.test.ts +0 -52
  344. package/tests/integration/TelemetryIntegration.test.ts +0 -395
  345. package/tests/integration/WebVhPublish.test.ts +0 -48
  346. package/tests/integration/createTypedOriginal.test.ts +0 -379
  347. package/tests/integration/migration/peer-to-webvh.test.ts +0 -172
  348. package/tests/manual/test-commit-creation.ts +0 -323
  349. package/tests/mocks/MockKeyStore.ts +0 -38
  350. package/tests/mocks/adapters/MemoryStorageAdapter.ts +0 -24
  351. package/tests/mocks/adapters/MockFeeOracle.ts +0 -11
  352. package/tests/mocks/adapters/MockOrdinalsProvider.ts +0 -76
  353. package/tests/mocks/adapters/OrdMockProvider.test.ts +0 -176
  354. package/tests/mocks/adapters/index.ts +0 -6
  355. package/tests/performance/BatchOperations.perf.test.ts +0 -403
  356. package/tests/performance/logging.perf.test.ts +0 -336
  357. package/tests/sdk.test.ts +0 -43
  358. package/tests/security/bitcoin-penetration-tests.test.ts +0 -622
  359. package/tests/setup.bun.ts +0 -69
  360. package/tests/setup.jest.ts +0 -23
  361. package/tests/stress/batch-operations-stress.test.ts +0 -571
  362. package/tests/unit/adapters/FeeOracleMock.test.ts +0 -40
  363. package/tests/unit/bitcoin/BitcoinManager.test.ts +0 -293
  364. package/tests/unit/bitcoin/BroadcastClient.test.ts +0 -52
  365. package/tests/unit/bitcoin/OrdNodeProvider.test.ts +0 -53
  366. package/tests/unit/bitcoin/OrdinalsClient.test.ts +0 -381
  367. package/tests/unit/bitcoin/OrdinalsClientProvider.test.ts +0 -102
  368. package/tests/unit/bitcoin/PSBTBuilder.test.ts +0 -84
  369. package/tests/unit/bitcoin/fee-calculation.test.ts +0 -261
  370. package/tests/unit/bitcoin/transactions/commit.test.ts +0 -649
  371. package/tests/unit/bitcoin/transfer.test.ts +0 -31
  372. package/tests/unit/bitcoin/utxo-selection-new.test.ts +0 -502
  373. package/tests/unit/bitcoin/utxo.more.test.ts +0 -39
  374. package/tests/unit/bitcoin/utxo.selection.test.ts +0 -38
  375. package/tests/unit/core/OriginalsSDK.test.ts +0 -152
  376. package/tests/unit/crypto/Multikey.test.ts +0 -206
  377. package/tests/unit/crypto/Signer.test.ts +0 -408
  378. package/tests/unit/did/BtcoDidResolver.test.ts +0 -611
  379. package/tests/unit/did/DIDManager.more.test.ts +0 -43
  380. package/tests/unit/did/DIDManager.test.ts +0 -185
  381. package/tests/unit/did/Ed25519Verifier.test.ts +0 -160
  382. package/tests/unit/did/KeyManager.test.ts +0 -452
  383. package/tests/unit/did/OrdinalsClientProviderAdapter.test.ts +0 -45
  384. package/tests/unit/did/WebVHManager.test.ts +0 -435
  385. package/tests/unit/did/createBtcoDidDocument.test.ts +0 -67
  386. package/tests/unit/did/providers/OrdinalsClientProviderAdapter.test.ts +0 -159
  387. package/tests/unit/events/EventEmitter.test.ts +0 -407
  388. package/tests/unit/kinds/KindRegistry.test.ts +0 -329
  389. package/tests/unit/kinds/types.test.ts +0 -409
  390. package/tests/unit/kinds/validators.test.ts +0 -651
  391. package/tests/unit/lifecycle/BatchOperations.test.ts +0 -527
  392. package/tests/unit/lifecycle/LifecycleManager.cleanapi.test.ts +0 -441
  393. package/tests/unit/lifecycle/LifecycleManager.keymanagement.test.ts +0 -312
  394. package/tests/unit/lifecycle/LifecycleManager.prov.test.ts +0 -18
  395. package/tests/unit/lifecycle/LifecycleManager.test.ts +0 -213
  396. package/tests/unit/lifecycle/LifecycleManager.transfer.unit.test.ts +0 -30
  397. package/tests/unit/lifecycle/OriginalsAsset.test.ts +0 -176
  398. package/tests/unit/lifecycle/ProvenanceQuery.test.ts +0 -577
  399. package/tests/unit/lifecycle/ResourceVersioning.test.ts +0 -651
  400. package/tests/unit/resources/ResourceManager.test.ts +0 -740
  401. package/tests/unit/storage/MemoryStorageAdapter.test.ts +0 -93
  402. package/tests/unit/types/network.test.ts +0 -255
  403. package/tests/unit/utils/EventIntegration.test.ts +0 -384
  404. package/tests/unit/utils/Logger.test.ts +0 -473
  405. package/tests/unit/utils/MetricsCollector.test.ts +0 -358
  406. package/tests/unit/utils/bitcoin-address.test.ts +0 -250
  407. package/tests/unit/utils/cbor.test.ts +0 -35
  408. package/tests/unit/utils/encoding.test.ts +0 -318
  409. package/tests/unit/utils/hash.test.ts +0 -12
  410. package/tests/unit/utils/retry.test.ts +0 -100
  411. package/tests/unit/utils/satoshi-validation.test.ts +0 -354
  412. package/tests/unit/utils/serialization.test.ts +0 -124
  413. package/tests/unit/utils/telemetry.test.ts +0 -52
  414. package/tests/unit/utils/validation.test.ts +0 -141
  415. package/tests/unit/vc/CredentialManager.helpers.test.ts +0 -527
  416. package/tests/unit/vc/CredentialManager.test.ts +0 -487
  417. package/tests/unit/vc/Issuer.test.ts +0 -107
  418. package/tests/unit/vc/Verifier.test.ts +0 -525
  419. package/tests/unit/vc/bbs.test.ts +0 -282
  420. package/tests/unit/vc/cryptosuites/eddsa.test.ts +0 -398
  421. package/tests/unit/vc/documentLoader.test.ts +0 -121
  422. package/tests/unit/vc/proofs/data-integrity.test.ts +0 -24
  423. package/tsconfig.json +0 -31
  424. package/tsconfig.test.json +0 -15
@@ -1,282 +0,0 @@
1
- /** Canonical test aggregator created by combine-tests script. */
2
-
3
- /** Inlined from bbs.simple.part.ts */
4
- import { describe, test, expect } from 'bun:test';
5
- import { BbsSimple } from '../../../src';
6
- import { bls12_381 as bls } from '@noble/curves/bls12-381';
7
-
8
- describe('BbsSimple e2e', () => {
9
- test('sign/verify not implemented with header', async () => {
10
- const sk = bls.utils.randomPrivateKey();
11
- const pk = bls.getPublicKey(sk);
12
- const keypair = { privateKey: sk, publicKey: pk };
13
- const header = new Uint8Array([1, 2, 3]);
14
- const messages = [
15
- new TextEncoder().encode('msg1'),
16
- new TextEncoder().encode('msg2'),
17
- new TextEncoder().encode('msg3')
18
- ];
19
-
20
- await expect(BbsSimple.sign(messages, keypair, header)).rejects.toThrow(/not implemented/i);
21
- await expect(BbsSimple.verify(messages, new Uint8Array([0]), pk, header)).rejects.toThrow(/not implemented/i);
22
- });
23
-
24
- test('sign/verify not implemented with default header', async () => {
25
- const sk = bls.utils.randomPrivateKey();
26
- const pk = bls.getPublicKey(sk);
27
- const keypair = { privateKey: sk, publicKey: pk };
28
- const messages = [
29
- new TextEncoder().encode('a'),
30
- new TextEncoder().encode('b')
31
- ];
32
- await expect(BbsSimple.sign(messages, keypair)).rejects.toThrow(/not implemented/i);
33
- await expect(BbsSimple.verify(messages, new Uint8Array([1, 2]), pk)).rejects.toThrow(/not implemented/i);
34
- });
35
- });
36
-
37
-
38
-
39
-
40
- /** Inlined from bbs.utils.part.ts */
41
- import { BBSCryptosuiteUtils } from '../../../src';
42
- import * as cbor from 'cbor-js';
43
-
44
- function u8(len: number, start: number = 0): Uint8Array {
45
- const a = new Uint8Array(len);
46
- for (let i = 0; i < len; i++) a[i] = (start + i) & 0xff;
47
- return a;
48
- }
49
-
50
- describe('BBSCryptosuiteUtils', () => {
51
- const bbsSignature = u8(96, 1);
52
- const bbsHeader = u8(64, 2);
53
- const publicKey = u8(96, 3);
54
- const hmacKey = u8(32, 4);
55
- const mandatoryPointers = ['/id', '/credentialSubject/id'];
56
-
57
- test('rejects non-u prefix for base/derived parsing', () => {
58
- expect(() => (BBSCryptosuiteUtils as any).parseBaseProofValue('xabc')).toThrow('multibase');
59
- expect(() => (BBSCryptosuiteUtils as any).parseDerivedProofValue('xabc')).toThrow('multibase');
60
- });
61
-
62
- test('serialize/parse base proof (baseline)', () => {
63
- const s = BBSCryptosuiteUtils.serializeBaseProofValue(
64
- bbsSignature,
65
- bbsHeader,
66
- publicKey,
67
- hmacKey,
68
- mandatoryPointers,
69
- 'baseline'
70
- );
71
- expect(s.startsWith('u')).toBe(true);
72
- const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
73
- expect(Array.from(p.bbsSignature)).toEqual(Array.from(bbsSignature));
74
- expect(Array.from(p.bbsHeader)).toEqual(Array.from(bbsHeader));
75
- expect(Array.from(p.publicKey)).toEqual(Array.from(publicKey));
76
- expect(Array.from(p.hmacKey)).toEqual(Array.from(hmacKey));
77
- expect(p.mandatoryPointers).toEqual(mandatoryPointers);
78
- expect(p.featureOption).toBe('baseline');
79
- });
80
-
81
- test('serialize/parse base proof (anonymous_holder_binding)', () => {
82
- const signerBlind = u8(32, 7);
83
- const s = BBSCryptosuiteUtils.serializeBaseProofValue(
84
- bbsSignature,
85
- bbsHeader,
86
- publicKey,
87
- hmacKey,
88
- mandatoryPointers,
89
- 'anonymous_holder_binding',
90
- undefined,
91
- signerBlind
92
- );
93
- const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
94
- expect(p.featureOption).toBe('anonymous_holder_binding');
95
- expect(Array.from(p.signerBlind)).toEqual(Array.from(signerBlind));
96
- });
97
-
98
- test('serialize/parse base proof (pseudonym_issuer_pid)', () => {
99
- const pid = u8(32, 9);
100
- const s = BBSCryptosuiteUtils.serializeBaseProofValue(
101
- bbsSignature,
102
- bbsHeader,
103
- publicKey,
104
- hmacKey,
105
- mandatoryPointers,
106
- 'pseudonym_issuer_pid',
107
- pid
108
- );
109
- const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
110
- expect(p.featureOption).toBe('pseudonym_issuer_pid');
111
- expect(Array.from(p.pid)).toEqual(Array.from(pid));
112
- });
113
-
114
- test('serialize/parse base proof (pseudonym_hidden_pid)', () => {
115
- const signerBlind = u8(32, 11);
116
- const s = BBSCryptosuiteUtils.serializeBaseProofValue(
117
- bbsSignature,
118
- bbsHeader,
119
- publicKey,
120
- hmacKey,
121
- mandatoryPointers,
122
- 'pseudonym_hidden_pid',
123
- undefined,
124
- signerBlind
125
- );
126
- const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
127
- expect(p.featureOption).toBe('pseudonym_hidden_pid');
128
- expect(Array.from(p.signerBlind)).toEqual(Array.from(signerBlind));
129
- });
130
-
131
- test('serialize/parse derived proof (baseline)', () => {
132
- const labelMap = { c14n1: 'b3', c14n10: 'b7' };
133
- const mandatoryIndexes = [0, 2, 5];
134
- const selectiveIndexes = [1, 4];
135
- const presentationHeader = u8(16, 33);
136
- const bbsProof = u8(80, 55);
137
- const s = BBSCryptosuiteUtils.serializeDerivedProofValue(
138
- bbsProof,
139
- labelMap,
140
- mandatoryIndexes,
141
- selectiveIndexes,
142
- presentationHeader,
143
- 'baseline'
144
- );
145
- const p = (BBSCryptosuiteUtils as any).parseDerivedProofValue(s);
146
- expect(Array.from(p.bbsProof)).toEqual(Array.from(bbsProof));
147
- expect(p.labelMap).toEqual(labelMap);
148
- expect(p.mandatoryIndexes).toEqual(mandatoryIndexes);
149
- expect(p.selectiveIndexes).toEqual(selectiveIndexes);
150
- expect(Array.from(p.presentationHeader)).toEqual(Array.from(presentationHeader));
151
- expect(p.featureOption).toBe('baseline');
152
- });
153
-
154
- test('serialize/parse derived proof (anonymous_holder_binding)', () => {
155
- const labelMap = { c14n2: 'b5' };
156
- const presentationHeader = u8(8, 7);
157
- const bbsProof = u8(64, 8);
158
- const s = BBSCryptosuiteUtils.serializeDerivedProofValue(
159
- bbsProof,
160
- labelMap,
161
- [0],
162
- [1],
163
- presentationHeader,
164
- 'anonymous_holder_binding',
165
- undefined,
166
- 4
167
- );
168
- const p = (BBSCryptosuiteUtils as any).parseDerivedProofValue(s);
169
- expect(p.featureOption).toBe('anonymous_holder_binding');
170
- expect(p.lengthBBSMessages).toBe(4);
171
- });
172
-
173
- test('serialize/parse derived proof (pseudonym)', () => {
174
- const labelMap = { c14n3: 'b7' };
175
- const presentationHeader = u8(4, 90);
176
- const bbsProof = u8(64, 90);
177
- const s = BBSCryptosuiteUtils.serializeDerivedProofValue(
178
- bbsProof,
179
- labelMap,
180
- [0, 1],
181
- [1],
182
- presentationHeader,
183
- 'pseudonym',
184
- 'alice',
185
- 5
186
- );
187
- const p = (BBSCryptosuiteUtils as any).parseDerivedProofValue(s);
188
- expect(p.featureOption).toBe('pseudonym');
189
- expect(p.pseudonym).toBe('alice');
190
- expect(p.lengthBBSMessages).toBe(5);
191
- });
192
-
193
- test('parse base proof with base_proof header', () => {
194
- const components = [bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers];
195
- const encoded = (cbor as any).encode(components) as Uint8Array | ArrayBuffer;
196
- const encBytes = encoded instanceof Uint8Array ? encoded : new Uint8Array(encoded as ArrayBuffer);
197
- const header = new Uint8Array([0xd9, 0x5d, 0x03]);
198
- const bytes = new Uint8Array(header.length + encBytes.length);
199
- bytes.set(header, 0);
200
- bytes.set(encBytes, header.length);
201
- const s = 'u' + Buffer.from(bytes).toString('base64').replace(/\+/g, '-').replace(/\//g, '_').replace(/=+$/g, '');
202
- const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
203
- expect(p.featureOption).toBe('base_proof');
204
- });
205
-
206
- test('serializeDerivedProofValue throws on missing length for anonymous_holder_binding', () => {
207
- expect(() => BBSCryptosuiteUtils.serializeDerivedProofValue(
208
- u8(8),
209
- { c14n1: 'b1' },
210
- [0],
211
- [0],
212
- u8(4),
213
- 'anonymous_holder_binding'
214
- )).toThrow('lengthBBSMessages is required');
215
- });
216
-
217
- test('serializeDerivedProofValue throws on missing pseudonym/length for pseudonym', () => {
218
- expect(() => BBSCryptosuiteUtils.serializeDerivedProofValue(
219
- u8(8),
220
- { c14n1: 'b1' },
221
- [0],
222
- [0],
223
- u8(4),
224
- 'pseudonym'
225
- )).toThrow('pseudonym and lengthBBSMessages');
226
- });
227
-
228
- test('serializeDerivedProofValue throws on unsupported feature', () => {
229
- expect(() => (BBSCryptosuiteUtils as any).serializeDerivedProofValue(
230
- u8(8),
231
- { c14n1: 'b1' },
232
- [0],
233
- [0],
234
- u8(4),
235
- 'unsupported'
236
- )).toThrow('Unsupported feature option');
237
- });
238
-
239
- test('serializeBaseProofValue throws for missing signerBlind/pid and unsupported feature', () => {
240
- expect(() => BBSCryptosuiteUtils.serializeBaseProofValue(
241
- u8(8), u8(4), u8(8), u8(4), mandatoryPointers, 'anonymous_holder_binding'
242
- )).toThrow('signerBlind is required');
243
- expect(() => BBSCryptosuiteUtils.serializeBaseProofValue(
244
- u8(8), u8(4), u8(8), u8(4), mandatoryPointers, 'pseudonym_issuer_pid'
245
- )).toThrow('pid is required');
246
- expect(() => (BBSCryptosuiteUtils as any).serializeBaseProofValue(
247
- u8(8), u8(4), u8(8), u8(4), mandatoryPointers, 'unsupported'
248
- )).toThrow('Unsupported feature option');
249
- });
250
-
251
- test('serializeBaseProofValue throws when signerBlind missing for pseudonym_hidden_pid', () => {
252
- expect(() => BBSCryptosuiteUtils.serializeBaseProofValue(
253
- u8(8), u8(4), u8(8), u8(4), mandatoryPointers, 'pseudonym_hidden_pid'
254
- )).toThrow('signerBlind is required');
255
- });
256
-
257
- test('compareBytes length mismatch branch', () => {
258
- expect((BBSCryptosuiteUtils as any).compareBytes(new Uint8Array([1, 2]), [1, 2, 3])).toBe(false);
259
- });
260
-
261
- test('serializeDerivedProofValue throws on invalid labelMap entries', () => {
262
- expect(() => BBSCryptosuiteUtils.serializeDerivedProofValue(
263
- u8(4),
264
- { notC14n: 'b1' } as any,
265
- [0],
266
- [0],
267
- u8(2),
268
- 'baseline'
269
- )).toThrow('Invalid label map entry');
270
- });
271
-
272
- test('parse errors on invalid base header', () => {
273
- // Construct invalid header 'u' + cbor of empty
274
- const bad = 'u' + 'AAAA';
275
- expect(() => (BBSCryptosuiteUtils as any).parseBaseProofValue(bad)).toThrow();
276
- });
277
-
278
- test('parse errors on invalid derived header', () => {
279
- const bad = 'u' + 'AAAA';
280
- expect(() => (BBSCryptosuiteUtils as any).parseDerivedProofValue(bad)).toThrow();
281
- });
282
- });
@@ -1,398 +0,0 @@
1
- /** Canonical test aggregator created by combine-tests script. */
2
-
3
- /** Inlined from eddsa.branch-more.part.ts */
4
- import { describe, test, expect } from 'bun:test';
5
- import { EdDSACryptosuiteManager } from '../../../../src/vc/cryptosuites/eddsa';
6
- import { multikey } from '../../../../src/crypto/Multikey';
7
-
8
- describe('EdDSA additional branches', () => {
9
- test('createProof throws on invalid private key format', async () => {
10
- await expect(EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
11
- verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', cryptosuite: 'eddsa-rdfc-2022', privateKey: 123 as any,
12
- documentLoader: async () => ({ document: { '@context': { '@version': 1.1 } }, documentUrl: '', contextUrl: null })
13
- } as any)).rejects.toThrow('Invalid private key format');
14
- });
15
-
16
- test('verifyProof returns error for non-Ed25519 VM', async () => {
17
- const pkMb = multikey.encodePublicKey(new Uint8Array(33).fill(1), 'Secp256k1');
18
- const res = await EdDSACryptosuiteManager.verifyProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
19
- type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'z1L'
20
- } as any, { documentLoader: async () => ({ document: { '@context': ['https://www.w3.org/ns/did/v1'], id: 'did:ex#k', publicKeyMultibase: pkMb }, documentUrl: '', contextUrl: null }) });
21
- expect(res.verified).toBe(false);
22
- expect(typeof res.errors?.[0]).toBe('string');
23
- });
24
- });
25
-
26
-
27
-
28
-
29
- /** Inlined from eddsa.coverage-extra.part.ts */
30
-
31
- describe('EdDSA coverage extras', () => {
32
- const goodContext = ['https://www.w3.org/ns/credentials/v2'];
33
-
34
- test('createProofConfiguration defaults proofPurpose to assertionMethod', async () => {
35
- const sk = new Uint8Array(32).fill(1);
36
- const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(2), 'Ed25519');
37
- const vm = 'did:ex#vm';
38
- const loader = async (iri: string) => {
39
- if (iri.includes('#')) {
40
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
41
- }
42
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
43
- };
44
- const doc: any = { '@context': goodContext, id: 'urn:doc-default-purpose' };
45
- const proof = await EdDSACryptosuiteManager.createProof(doc, { verificationMethod: vm, privateKey: sk, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader });
46
- // The method deletes @context before returning, so we assert the purpose value
47
- expect(proof.proofPurpose).toBe('assertionMethod');
48
- });
49
-
50
- test('createProof includes only challenge when provided', async () => {
51
- const sk = new Uint8Array(32).fill(7);
52
- const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(6), 'Ed25519');
53
- const vm = 'did:ex#vm-chal';
54
- const loader = async (iri: string) => {
55
- if (iri.includes('#')) {
56
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
57
- }
58
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
59
- };
60
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:chal' }, { verificationMethod: vm, privateKey: sk, cryptosuite: 'eddsa-rdfc-2022', challenge: '123', documentLoader: loader });
61
- expect((proof as any).challenge).toBe('123');
62
- expect((proof as any).domain).toBeUndefined();
63
- });
64
-
65
- test('createProof includes only domain when provided', async () => {
66
- const sk = new Uint8Array(32).fill(9);
67
- const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(8), 'Ed25519');
68
- const vm = 'did:ex#vm-domain';
69
- const loader = async (iri: string) => {
70
- if (iri.includes('#')) {
71
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
72
- }
73
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
74
- };
75
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:domain' }, { verificationMethod: vm, privateKey: sk, cryptosuite: 'eddsa-rdfc-2022', domain: 'ex.org', documentLoader: loader });
76
- expect((proof as any).domain).toBe('ex.org');
77
- expect((proof as any).challenge).toBeUndefined();
78
- });
79
-
80
- test('verifyProof returns error message on thrown exception path', async () => {
81
- const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(3), 'Ed25519');
82
- const loader = async (iri: string) => {
83
- if (iri.includes('#')) {
84
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
85
- }
86
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
87
- };
88
- const doc: any = { '@context': goodContext, id: 'urn:doc' };
89
- const badProof: any = { type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'not-multibase' };
90
- const res = await EdDSACryptosuiteManager.verifyProof(doc, badProof, { documentLoader: loader });
91
- expect(res.verified).toBe(false);
92
- expect(Array.isArray(res.errors)).toBe(true);
93
- expect(typeof res.errors![0]).toBe('string');
94
- });
95
-
96
- test('verifyProof uses Unknown verification error when thrown value lacks message', async () => {
97
- const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(4), 'Ed25519');
98
- const doc: any = { '@context': goodContext, id: 'urn:doc-unknown' };
99
- const proof: any = { type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#vm-unknown', proofPurpose: 'assertionMethod', proofValue: 'z1L' };
100
- const loader = async (iri: string) => {
101
- if (iri.includes('#')) {
102
- // Throw a primitive string (no message property) only on VM fetch, after transform/hash succeeded
103
- throw '';
104
- }
105
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
106
- };
107
- const res = await EdDSACryptosuiteManager.verifyProof(doc, proof, { documentLoader: loader });
108
- expect(res.verified).toBe(false);
109
- expect(res.errors?.[0]).toBe('Unknown verification error');
110
- });
111
- });
112
-
113
-
114
-
115
-
116
- /** Inlined from eddsa.edgecases.part.ts */
117
-
118
- describe('EdDSA cryptosuite edge cases', () => {
119
- const goodContext = ['https://www.w3.org/ns/credentials/v2'];
120
-
121
- const pk32 = new Uint8Array(32).fill(7);
122
- const pk32b = new Uint8Array(32).fill(8);
123
- const pkMb = multikey.encodePublicKey(pk32b, 'Ed25519');
124
-
125
- const okLoader = async (iri: string) => {
126
- if (iri.includes('#')) {
127
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
128
- }
129
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
130
- };
131
-
132
- test('createProof signs with raw Uint8Array 32-byte private key', async () => {
133
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:raw32' }, {
134
- verificationMethod: 'did:ex#key-raw', proofPurpose: 'assertionMethod', privateKey: pk32,
135
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: okLoader
136
- });
137
- expect(proof.type).toBe('DataIntegrityProof');
138
- expect(typeof proof.proofValue).toBe('string');
139
- });
140
-
141
- test('createProof includes challenge and domain options', async () => {
142
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:opts' }, {
143
- verificationMethod: 'did:ex#key-opts', proofPurpose: 'assertionMethod', privateKey: pk32,
144
- cryptosuite: 'eddsa-rdfc-2022', challenge: 'abc', domain: 'example.org', documentLoader: okLoader
145
- });
146
- expect((proof as any).challenge).toBe('abc');
147
- expect((proof as any).domain).toBe('example.org');
148
- });
149
-
150
- test('createProof invalid private key length 33 throws', async () => {
151
- const bad33 = new Uint8Array(33);
152
- await expect(EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:bad33' }, {
153
- verificationMethod: 'did:ex#key-bad33', proofPurpose: 'assertionMethod', privateKey: bad33,
154
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: okLoader
155
- })).rejects.toThrow('Invalid private key length');
156
- });
157
-
158
- test('createProof invalid private key length 63 throws', async () => {
159
- const bad63 = new Uint8Array(63);
160
- await expect(EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:bad63' }, {
161
- verificationMethod: 'did:ex#key-bad63', proofPurpose: 'assertionMethod', privateKey: bad63,
162
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: okLoader
163
- })).rejects.toThrow('Invalid private key length');
164
- });
165
-
166
- test('createProof with non-Ed25519 multikey string errors', async () => {
167
- const secpSk = new Uint8Array(32).fill(5);
168
- const secpSkMb = multikey.encodePrivateKey(secpSk, 'Secp256k1');
169
- await expect(EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:secpSk' }, {
170
- verificationMethod: 'did:ex#key-non-ed', proofPurpose: 'assertionMethod', privateKey: secpSkMb,
171
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: okLoader
172
- })).rejects.toThrow('Invalid key type for EdDSA');
173
- });
174
-
175
- test('verifyProof returns false with wrong public key', async () => {
176
- // Sign with one keypair
177
- const signingSk = new Uint8Array(32).fill(9);
178
- const signingPk = new Uint8Array(32).fill(1);
179
- const signingPkMb = multikey.encodePublicKey(signingPk, 'Ed25519');
180
- const vmId = 'did:ex#vm-1';
181
- const signingLoader = async (iri: string) => {
182
- if (iri.includes('#')) {
183
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: signingPkMb }, documentUrl: iri, contextUrl: null };
184
- }
185
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
186
- };
187
- const doc = { '@context': goodContext, id: 'urn:test:verify-wrong-pk' };
188
- const proof = await EdDSACryptosuiteManager.createProof(doc, {
189
- verificationMethod: vmId, proofPurpose: 'assertionMethod', privateKey: signingSk,
190
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: signingLoader
191
- });
192
-
193
- // Verify with different public key
194
- const wrongPkMb = multikey.encodePublicKey(new Uint8Array(32).fill(2), 'Ed25519');
195
- const wrongLoader = async (iri: string) => {
196
- if (iri.includes('#')) {
197
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: wrongPkMb }, documentUrl: iri, contextUrl: null };
198
- }
199
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
200
- };
201
- const res = await EdDSACryptosuiteManager.verifyProof(doc, proof as any, { documentLoader: wrongLoader });
202
- expect(res.verified).toBe(false);
203
- });
204
-
205
- test('verifyProof succeeds with matching verificationMethod', async () => {
206
- const ed = await import('@noble/ed25519');
207
- const sk = new Uint8Array(32).fill(11);
208
- const pk = await ed.getPublicKeyAsync(sk);
209
- const pkMbLocal = multikey.encodePublicKey(new Uint8Array(pk), 'Ed25519');
210
- const vm = 'did:ex#vm-ok';
211
- const loader = async (iri: string) => {
212
- if (iri.includes('#')) {
213
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMbLocal }, documentUrl: iri, contextUrl: null };
214
- }
215
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
216
- };
217
- const doc = { '@context': goodContext, id: 'urn:test:verify-ok' };
218
- const proof = await EdDSACryptosuiteManager.createProof(doc, {
219
- verificationMethod: vm, proofPurpose: 'assertionMethod', privateKey: sk, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
220
- });
221
- const res = await EdDSACryptosuiteManager.verifyProof(doc, proof as any, { documentLoader: loader });
222
- expect(res.verified).toBe(true);
223
- });
224
-
225
- test('createProof propagates canonizeProof/hash-stage exception via loader', async () => {
226
- // Fail only during proof canonization stage (hash path), not during transform
227
- const loader = async (iri: string) => {
228
- if (iri.includes('w3id.org/security/data-integrity')) {
229
- throw new Error('hash-stage canonize fail');
230
- }
231
- if (iri.includes('#')) {
232
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
233
- }
234
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
235
- };
236
- await expect(EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:hash-fail' }, {
237
- verificationMethod: 'did:ex#key-hash', proofPurpose: 'assertionMethod', privateKey: pk32,
238
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
239
- } as any)).rejects.toThrow();
240
- });
241
- });
242
-
243
-
244
-
245
-
246
- /** Inlined from eddsa.errors.part.ts */
247
-
248
- describe('EdDSA error branches', () => {
249
- test('createProof throws on non-Ed25519 multikey private key', async () => {
250
- const sk = new Uint8Array(32).fill(7);
251
- const skMbSecp = multikey.encodePrivateKey(sk, 'Secp256k1');
252
- const loader = async (iri: string) => {
253
- if (iri.includes('#')) return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri }, documentUrl: iri, contextUrl: null } as any;
254
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
255
- };
256
- await expect(EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'urn:x' }, {
257
- verificationMethod: 'did:ex#key-1', proofPurpose: 'assertionMethod', privateKey: skMbSecp, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
258
- })).rejects.toThrow('Invalid key type for EdDSA');
259
- });
260
-
261
- test('verifyProof returns error for non-Ed25519 publicKeyMultibase', async () => {
262
- const pkSecp = new Uint8Array(33).fill(8);
263
- const pkMbSecp = multikey.encodePublicKey(pkSecp, 'Secp256k1');
264
- const loader = async (iri: string) => {
265
- if (iri.includes('#')) return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pkMbSecp }, documentUrl: iri, contextUrl: null } as any;
266
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
267
- };
268
- const proof = {
269
- type: 'DataIntegrityProof',
270
- cryptosuite: 'eddsa-rdfc-2022',
271
- verificationMethod: 'did:ex#key-1',
272
- proofPurpose: 'assertionMethod',
273
- proofValue: 'z1L'
274
- } as any;
275
- const res = await EdDSACryptosuiteManager.verifyProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'urn:x' }, proof, { documentLoader: loader });
276
- expect(res.verified).toBe(false);
277
- expect(res.errors?.[0]).toBe('Invalid key type for EdDSA');
278
- });
279
- test('createProof propagates transform error (canonize)', async () => {
280
- await expect(EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'] }, {
281
- verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', cryptosuite: 'eddsa-rdfc-2022', privateKey: new Uint8Array(32),
282
- documentLoader: async () => { throw new Error('canonize fail'); }
283
- } as any)).rejects.toThrow();
284
- });
285
-
286
- test('verifyProof returns error on loader failure', async () => {
287
- const res = await EdDSACryptosuiteManager.verifyProof({ '@context': ['https://www.w3.org/ns/credentials/v2'] }, {
288
- type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'z1L'
289
- } as any, { documentLoader: async () => { throw new Error('load fail'); } });
290
- expect(res.verified).toBe(false);
291
- expect(typeof res.errors?.[0]).toBe('string');
292
- });
293
- });
294
-
295
-
296
-
297
-
298
- /** Inlined from eddsa.more.part.ts */
299
-
300
- describe('EdDSACryptosuiteManager extra branches', () => {
301
- const pkRaw = new Uint8Array(32).fill(7);
302
- const skMb = multikey.encodePrivateKey(pkRaw, 'Ed25519');
303
- const pubMb = multikey.encodePublicKey(new Uint8Array(32).fill(8), 'Ed25519');
304
-
305
- const loader = async (iri: string) => {
306
- if (iri.includes('#')) {
307
- return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pubMb }, documentUrl: iri, contextUrl: null };
308
- }
309
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
310
- };
311
-
312
- test('sign with 64-byte private key slices to 32', async () => {
313
- const sixtyFour = new Uint8Array(64);
314
- sixtyFour.set(pkRaw);
315
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
316
- verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', privateKey: sixtyFour, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
317
- });
318
- expect(proof.proofValue).toBeTruthy();
319
- });
320
-
321
- test('invalid private key length throws', async () => {
322
- await expect(EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
323
- verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', privateKey: new Uint8Array(31), cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
324
- })).rejects.toThrow('Invalid private key length');
325
- });
326
-
327
- test('verify returns false on signature mismatch', async () => {
328
- const res = await EdDSACryptosuiteManager.verifyProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
329
- type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'z1L' // invalid base58btc
330
- } as any, { documentLoader: loader });
331
- expect(res.verified).toBe(false);
332
- });
333
-
334
- test('verifyProof returns error on canonizeProof failure path', async () => {
335
- const badLoader = async (iri: string) => {
336
- if (iri.includes('#')) {
337
- return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pubMb }, documentUrl: iri, contextUrl: null };
338
- }
339
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
340
- };
341
- const proof: any = { type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'z1L' };
342
- const doc: any = { '@context': ['https://www.w3.org/ns/credentials/v2'] };
343
- doc.self = doc;
344
- const res = await EdDSACryptosuiteManager.verifyProof(doc, proof, { documentLoader: badLoader });
345
- expect(res.verified).toBe(false);
346
- });
347
- });
348
-
349
-
350
-
351
-
352
- /** Inlined from eddsa.privatekey-string.part.ts */
353
-
354
- describe('EdDSA createProof with multikey string', () => {
355
- test('signs using multibase multicodec private key', async () => {
356
- const sk = new Uint8Array(32).fill(9);
357
- const pk = new Uint8Array(32).fill(8);
358
- const skMb = multikey.encodePrivateKey(sk, 'Ed25519');
359
- const pkMb = multikey.encodePublicKey(pk, 'Ed25519');
360
- const loader = async (iri: string) => {
361
- if (iri.includes('#')) return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
362
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
363
- };
364
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'urn:x' }, {
365
- verificationMethod: 'did:ex#key-1', proofPurpose: 'assertionMethod', privateKey: skMb, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
366
- });
367
- expect(proof.type).toBe('DataIntegrityProof');
368
- });
369
- });
370
-
371
-
372
-
373
-
374
- /** Inlined from eddsa.success.part.ts */
375
- // Initialize noble crypto libraries (uses shared initialization module)
376
- import '../../../../src/crypto/noble-init.js';
377
-
378
- import * as ed25519 from '@noble/ed25519';
379
-
380
- describe('EdDSA verifyProof success path', () => {
381
- test('createProof then verifyProof returns verified=true', async () => {
382
- const sk = ed25519.utils.randomPrivateKey();
383
- const pk = ed25519.getPublicKey(sk);
384
- const skMb = multikey.encodePrivateKey(sk, 'Ed25519');
385
- const pkMb = multikey.encodePublicKey(pk, 'Ed25519');
386
- const vmId = 'did:ex:succ#k';
387
- const loader = async (iri: string) => {
388
- if (iri.includes('#')) {
389
- return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
390
- }
391
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
392
- };
393
- const doc: any = { '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'urn:doc' };
394
- const proof = await EdDSACryptosuiteManager.createProof(doc, { verificationMethod: vmId, proofPurpose: 'assertionMethod', privateKey: skMb, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader });
395
- const res = await EdDSACryptosuiteManager.verifyProof({ ...doc, proof }, proof as any, { documentLoader: loader });
396
- expect(res.verified).toBe(true);
397
- });
398
- });