@originals/sdk 1.4.3 → 1.4.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (222) hide show
  1. package/dist/adapters/FeeOracleMock.d.ts +6 -0
  2. package/dist/adapters/FeeOracleMock.js +8 -0
  3. package/dist/adapters/index.d.ts +4 -0
  4. package/dist/adapters/index.js +4 -0
  5. package/dist/adapters/providers/OrdHttpProvider.d.ts +56 -0
  6. package/dist/adapters/providers/OrdHttpProvider.js +110 -0
  7. package/dist/adapters/providers/OrdMockProvider.d.ts +70 -0
  8. package/dist/adapters/providers/OrdMockProvider.js +75 -0
  9. package/dist/adapters/types.d.ts +71 -0
  10. package/dist/adapters/types.js +1 -0
  11. package/dist/bitcoin/BitcoinManager.d.ts +15 -0
  12. package/dist/bitcoin/BitcoinManager.js +262 -0
  13. package/dist/bitcoin/BroadcastClient.d.ts +30 -0
  14. package/dist/bitcoin/BroadcastClient.js +35 -0
  15. package/dist/bitcoin/OrdinalsClient.d.ts +21 -0
  16. package/dist/bitcoin/OrdinalsClient.js +105 -0
  17. package/dist/bitcoin/PSBTBuilder.d.ts +24 -0
  18. package/dist/bitcoin/PSBTBuilder.js +80 -0
  19. package/dist/bitcoin/fee-calculation.d.ts +14 -0
  20. package/dist/bitcoin/fee-calculation.js +31 -0
  21. package/dist/bitcoin/providers/OrdNodeProvider.d.ts +38 -0
  22. package/dist/bitcoin/providers/OrdNodeProvider.js +67 -0
  23. package/dist/bitcoin/providers/OrdinalsProvider.d.ts +33 -0
  24. package/dist/bitcoin/providers/OrdinalsProvider.js +50 -0
  25. package/dist/bitcoin/providers/types.d.ts +63 -0
  26. package/dist/bitcoin/providers/types.js +1 -0
  27. package/dist/bitcoin/transactions/commit.d.ts +89 -0
  28. package/dist/bitcoin/transactions/commit.js +311 -0
  29. package/dist/bitcoin/transactions/index.d.ts +7 -0
  30. package/dist/bitcoin/transactions/index.js +8 -0
  31. package/dist/bitcoin/transfer.d.ts +9 -0
  32. package/dist/bitcoin/transfer.js +26 -0
  33. package/dist/bitcoin/utxo-selection.d.ts +78 -0
  34. package/dist/bitcoin/utxo-selection.js +237 -0
  35. package/dist/bitcoin/utxo.d.ts +26 -0
  36. package/dist/bitcoin/utxo.js +78 -0
  37. package/dist/contexts/credentials-v1.json +195 -0
  38. package/dist/contexts/credentials-v2-examples.json +5 -0
  39. package/dist/contexts/credentials-v2.json +301 -0
  40. package/dist/contexts/credentials.json +195 -0
  41. package/dist/contexts/data-integrity-v2.json +81 -0
  42. package/dist/contexts/dids.json +57 -0
  43. package/dist/contexts/ed255192020.json +93 -0
  44. package/dist/contexts/ordinals-plus.json +23 -0
  45. package/dist/contexts/originals.json +22 -0
  46. package/dist/core/OriginalsSDK.d.ts +158 -0
  47. package/dist/core/OriginalsSDK.js +274 -0
  48. package/dist/crypto/Multikey.d.ts +30 -0
  49. package/dist/crypto/Multikey.js +149 -0
  50. package/dist/crypto/Signer.d.ts +21 -0
  51. package/dist/crypto/Signer.js +196 -0
  52. package/dist/crypto/noble-init.d.ts +18 -0
  53. package/dist/crypto/noble-init.js +106 -0
  54. package/dist/did/BtcoDidResolver.d.ts +57 -0
  55. package/dist/did/BtcoDidResolver.js +166 -0
  56. package/dist/did/DIDManager.d.ts +101 -0
  57. package/dist/did/DIDManager.js +493 -0
  58. package/dist/did/Ed25519Verifier.d.ts +30 -0
  59. package/dist/did/Ed25519Verifier.js +59 -0
  60. package/dist/did/KeyManager.d.ts +17 -0
  61. package/dist/did/KeyManager.js +207 -0
  62. package/dist/did/WebVHManager.d.ts +100 -0
  63. package/dist/did/WebVHManager.js +312 -0
  64. package/dist/did/createBtcoDidDocument.d.ts +10 -0
  65. package/dist/did/createBtcoDidDocument.js +42 -0
  66. package/dist/did/providers/OrdinalsClientProviderAdapter.d.ts +23 -0
  67. package/dist/did/providers/OrdinalsClientProviderAdapter.js +51 -0
  68. package/dist/events/EventEmitter.d.ts +115 -0
  69. package/dist/events/EventEmitter.js +198 -0
  70. package/dist/events/index.d.ts +7 -0
  71. package/dist/events/index.js +6 -0
  72. package/dist/events/types.d.ts +286 -0
  73. package/dist/events/types.js +9 -0
  74. package/dist/examples/basic-usage.d.ts +3 -0
  75. package/dist/examples/basic-usage.js +62 -0
  76. package/dist/examples/create-module-original.d.ts +32 -0
  77. package/dist/examples/create-module-original.js +376 -0
  78. package/dist/examples/full-lifecycle-flow.d.ts +56 -0
  79. package/dist/examples/full-lifecycle-flow.js +419 -0
  80. package/dist/examples/run.d.ts +12 -0
  81. package/dist/examples/run.js +51 -0
  82. package/dist/index.d.ts +43 -0
  83. package/dist/index.js +52 -0
  84. package/dist/kinds/KindRegistry.d.ts +76 -0
  85. package/dist/kinds/KindRegistry.js +216 -0
  86. package/dist/kinds/index.d.ts +33 -0
  87. package/dist/kinds/index.js +36 -0
  88. package/dist/kinds/types.d.ts +363 -0
  89. package/dist/kinds/types.js +25 -0
  90. package/dist/kinds/validators/AgentValidator.d.ts +14 -0
  91. package/dist/kinds/validators/AgentValidator.js +155 -0
  92. package/dist/kinds/validators/AppValidator.d.ts +14 -0
  93. package/dist/kinds/validators/AppValidator.js +135 -0
  94. package/dist/kinds/validators/DatasetValidator.d.ts +14 -0
  95. package/dist/kinds/validators/DatasetValidator.js +148 -0
  96. package/dist/kinds/validators/DocumentValidator.d.ts +14 -0
  97. package/dist/kinds/validators/DocumentValidator.js +180 -0
  98. package/dist/kinds/validators/MediaValidator.d.ts +14 -0
  99. package/dist/kinds/validators/MediaValidator.js +172 -0
  100. package/dist/kinds/validators/ModuleValidator.d.ts +14 -0
  101. package/dist/kinds/validators/ModuleValidator.js +140 -0
  102. package/dist/kinds/validators/base.d.ts +96 -0
  103. package/dist/kinds/validators/base.js +218 -0
  104. package/dist/kinds/validators/index.d.ts +10 -0
  105. package/dist/kinds/validators/index.js +10 -0
  106. package/dist/lifecycle/BatchOperations.d.ts +147 -0
  107. package/dist/lifecycle/BatchOperations.js +251 -0
  108. package/dist/lifecycle/LifecycleManager.d.ts +362 -0
  109. package/dist/lifecycle/LifecycleManager.js +1692 -0
  110. package/dist/lifecycle/OriginalsAsset.d.ts +164 -0
  111. package/dist/lifecycle/OriginalsAsset.js +380 -0
  112. package/dist/lifecycle/ProvenanceQuery.d.ts +126 -0
  113. package/dist/lifecycle/ProvenanceQuery.js +220 -0
  114. package/dist/lifecycle/ResourceVersioning.d.ts +73 -0
  115. package/dist/lifecycle/ResourceVersioning.js +127 -0
  116. package/dist/migration/MigrationManager.d.ts +86 -0
  117. package/dist/migration/MigrationManager.js +412 -0
  118. package/dist/migration/audit/AuditLogger.d.ts +51 -0
  119. package/dist/migration/audit/AuditLogger.js +156 -0
  120. package/dist/migration/checkpoint/CheckpointManager.d.ts +31 -0
  121. package/dist/migration/checkpoint/CheckpointManager.js +96 -0
  122. package/dist/migration/checkpoint/CheckpointStorage.d.ts +26 -0
  123. package/dist/migration/checkpoint/CheckpointStorage.js +89 -0
  124. package/dist/migration/index.d.ts +22 -0
  125. package/dist/migration/index.js +27 -0
  126. package/dist/migration/operations/BaseMigration.d.ts +48 -0
  127. package/dist/migration/operations/BaseMigration.js +83 -0
  128. package/dist/migration/operations/PeerToBtcoMigration.d.ts +25 -0
  129. package/dist/migration/operations/PeerToBtcoMigration.js +67 -0
  130. package/dist/migration/operations/PeerToWebvhMigration.d.ts +19 -0
  131. package/dist/migration/operations/PeerToWebvhMigration.js +46 -0
  132. package/dist/migration/operations/WebvhToBtcoMigration.d.ts +25 -0
  133. package/dist/migration/operations/WebvhToBtcoMigration.js +67 -0
  134. package/dist/migration/rollback/RollbackManager.d.ts +29 -0
  135. package/dist/migration/rollback/RollbackManager.js +146 -0
  136. package/dist/migration/state/StateMachine.d.ts +25 -0
  137. package/dist/migration/state/StateMachine.js +76 -0
  138. package/dist/migration/state/StateTracker.d.ts +36 -0
  139. package/dist/migration/state/StateTracker.js +123 -0
  140. package/dist/migration/types.d.ts +306 -0
  141. package/dist/migration/types.js +33 -0
  142. package/dist/migration/validation/BitcoinValidator.d.ts +13 -0
  143. package/dist/migration/validation/BitcoinValidator.js +83 -0
  144. package/dist/migration/validation/CredentialValidator.d.ts +13 -0
  145. package/dist/migration/validation/CredentialValidator.js +46 -0
  146. package/dist/migration/validation/DIDCompatibilityValidator.d.ts +16 -0
  147. package/dist/migration/validation/DIDCompatibilityValidator.js +127 -0
  148. package/dist/migration/validation/LifecycleValidator.d.ts +10 -0
  149. package/dist/migration/validation/LifecycleValidator.js +52 -0
  150. package/dist/migration/validation/StorageValidator.d.ts +10 -0
  151. package/dist/migration/validation/StorageValidator.js +65 -0
  152. package/dist/migration/validation/ValidationPipeline.d.ts +29 -0
  153. package/dist/migration/validation/ValidationPipeline.js +180 -0
  154. package/dist/resources/ResourceManager.d.ts +231 -0
  155. package/dist/resources/ResourceManager.js +573 -0
  156. package/dist/resources/index.d.ts +11 -0
  157. package/dist/resources/index.js +10 -0
  158. package/dist/resources/types.d.ts +93 -0
  159. package/dist/resources/types.js +80 -0
  160. package/dist/storage/LocalStorageAdapter.d.ts +11 -0
  161. package/dist/storage/LocalStorageAdapter.js +53 -0
  162. package/dist/storage/MemoryStorageAdapter.d.ts +6 -0
  163. package/dist/storage/MemoryStorageAdapter.js +21 -0
  164. package/dist/storage/StorageAdapter.d.ts +16 -0
  165. package/dist/storage/StorageAdapter.js +1 -0
  166. package/dist/storage/index.d.ts +2 -0
  167. package/dist/storage/index.js +2 -0
  168. package/dist/types/bitcoin.d.ts +84 -0
  169. package/dist/types/bitcoin.js +1 -0
  170. package/dist/types/common.d.ts +82 -0
  171. package/dist/types/common.js +1 -0
  172. package/dist/types/credentials.d.ts +75 -0
  173. package/dist/types/credentials.js +1 -0
  174. package/dist/types/did.d.ts +26 -0
  175. package/dist/types/did.js +1 -0
  176. package/dist/types/index.d.ts +5 -0
  177. package/dist/types/index.js +5 -0
  178. package/dist/types/network.d.ts +78 -0
  179. package/dist/types/network.js +145 -0
  180. package/dist/utils/EventLogger.d.ts +71 -0
  181. package/dist/utils/EventLogger.js +232 -0
  182. package/dist/utils/Logger.d.ts +106 -0
  183. package/dist/utils/Logger.js +257 -0
  184. package/dist/utils/MetricsCollector.d.ts +110 -0
  185. package/dist/utils/MetricsCollector.js +264 -0
  186. package/dist/utils/bitcoin-address.d.ts +38 -0
  187. package/dist/utils/bitcoin-address.js +113 -0
  188. package/dist/utils/cbor.d.ts +2 -0
  189. package/dist/utils/cbor.js +9 -0
  190. package/dist/utils/encoding.d.ts +37 -0
  191. package/dist/utils/encoding.js +120 -0
  192. package/dist/utils/hash.d.ts +1 -0
  193. package/dist/utils/hash.js +5 -0
  194. package/dist/utils/retry.d.ts +10 -0
  195. package/dist/utils/retry.js +35 -0
  196. package/dist/utils/satoshi-validation.d.ts +60 -0
  197. package/dist/utils/satoshi-validation.js +156 -0
  198. package/dist/utils/serialization.d.ts +14 -0
  199. package/dist/utils/serialization.js +76 -0
  200. package/dist/utils/telemetry.d.ts +17 -0
  201. package/dist/utils/telemetry.js +24 -0
  202. package/dist/utils/validation.d.ts +5 -0
  203. package/dist/utils/validation.js +98 -0
  204. package/dist/vc/CredentialManager.d.ts +329 -0
  205. package/dist/vc/CredentialManager.js +615 -0
  206. package/dist/vc/Issuer.d.ts +27 -0
  207. package/dist/vc/Issuer.js +70 -0
  208. package/dist/vc/Verifier.d.ts +16 -0
  209. package/dist/vc/Verifier.js +50 -0
  210. package/dist/vc/cryptosuites/bbs.d.ts +44 -0
  211. package/dist/vc/cryptosuites/bbs.js +213 -0
  212. package/dist/vc/cryptosuites/bbsSimple.d.ts +9 -0
  213. package/dist/vc/cryptosuites/bbsSimple.js +12 -0
  214. package/dist/vc/cryptosuites/eddsa.d.ts +30 -0
  215. package/dist/vc/cryptosuites/eddsa.js +81 -0
  216. package/dist/vc/documentLoader.d.ts +16 -0
  217. package/dist/vc/documentLoader.js +59 -0
  218. package/dist/vc/proofs/data-integrity.d.ts +21 -0
  219. package/dist/vc/proofs/data-integrity.js +15 -0
  220. package/dist/vc/utils/jsonld.d.ts +2 -0
  221. package/dist/vc/utils/jsonld.js +15 -0
  222. package/package.json +2 -1
@@ -0,0 +1,149 @@
1
+ import { base58 } from '@scure/base';
2
+ // Multicodec headers (varints) for supported key types
3
+ export const MULTICODEC_ED25519_PUB_HEADER = new Uint8Array([0xed, 0x01]);
4
+ export const MULTICODEC_ED25519_PRIV_HEADER = new Uint8Array([0x80, 0x26]);
5
+ export const MULTICODEC_SECP256K1_PUB_HEADER = new Uint8Array([0xe7, 0x01]);
6
+ export const MULTICODEC_SECP256K1_PRIV_HEADER = new Uint8Array([0x13, 0x01]);
7
+ export const MULTICODEC_BLS12381_G2_PUB_HEADER = new Uint8Array([0xeb, 0x01]);
8
+ export const MULTICODEC_BLS12381_G2_PRIV_HEADER = new Uint8Array([0x82, 0x26]);
9
+ export const MULTICODEC_P256_PUB_HEADER = new Uint8Array([0x80, 0x24]);
10
+ export const MULTICODEC_P256_PRIV_HEADER = new Uint8Array([0x81, 0x26]);
11
+ function concatBytes(a, b) {
12
+ const out = new Uint8Array(a.length + b.length);
13
+ out.set(a, 0);
14
+ out.set(b, a.length);
15
+ return out;
16
+ }
17
+ /**
18
+ * Validates that a key string uses proper multikey format.
19
+ * @param key - The multibase-encoded key string to validate
20
+ * @param expectedType - The expected key type (e.g., 'Ed25519', 'Secp256k1')
21
+ * @param isPrivate - Whether this is a private key (true) or public key (false)
22
+ * @throws Error with descriptive message if validation fails
23
+ */
24
+ export function validateMultikeyFormat(key, expectedType, isPrivate) {
25
+ // Validate multibase prefix
26
+ if (!key || typeof key !== 'string') {
27
+ throw new Error('Invalid multibase key format. Key must be a non-empty string.');
28
+ }
29
+ if (key[0] !== 'z') {
30
+ throw new Error('Invalid multibase key format. Keys must use z-base58btc encoding (prefix "z").');
31
+ }
32
+ // Attempt to decode and validate multicodec header
33
+ try {
34
+ const mc = base58.decode(key.slice(1));
35
+ if (mc.length < 2) {
36
+ throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
37
+ }
38
+ // Validate header matches expected type
39
+ const header = mc.slice(0, 2);
40
+ const expectedHeaders = isPrivate
41
+ ? {
42
+ Ed25519: MULTICODEC_ED25519_PRIV_HEADER,
43
+ Secp256k1: MULTICODEC_SECP256K1_PRIV_HEADER,
44
+ Bls12381G2: MULTICODEC_BLS12381_G2_PRIV_HEADER,
45
+ P256: MULTICODEC_P256_PRIV_HEADER
46
+ }
47
+ : {
48
+ Ed25519: MULTICODEC_ED25519_PUB_HEADER,
49
+ Secp256k1: MULTICODEC_SECP256K1_PUB_HEADER,
50
+ Bls12381G2: MULTICODEC_BLS12381_G2_PUB_HEADER,
51
+ P256: MULTICODEC_P256_PUB_HEADER
52
+ };
53
+ const expectedHeader = expectedHeaders[expectedType];
54
+ if (header[0] !== expectedHeader[0] || header[1] !== expectedHeader[1]) {
55
+ throw new Error(`Invalid multibase key format. Expected ${expectedType} ${isPrivate ? 'private' : 'public'} key with multicodec header [0x${expectedHeader[0].toString(16)}, 0x${expectedHeader[1].toString(16)}], but found [0x${header[0].toString(16)}, 0x${header[1].toString(16)}].`);
56
+ }
57
+ // Validate key length (basic sanity check)
58
+ const keyBytes = mc.slice(2);
59
+ const expectedLengths = {
60
+ Ed25519: { private: 32, public: 32 },
61
+ Secp256k1: { private: 32, public: 33 },
62
+ P256: { private: 32, public: 33 },
63
+ Bls12381G2: { private: 32, public: 96 }
64
+ };
65
+ const expectedLength = isPrivate
66
+ ? expectedLengths[expectedType].private
67
+ : expectedLengths[expectedType].public;
68
+ if (keyBytes.length !== expectedLength) {
69
+ throw new Error(`Invalid multibase key format. Expected ${expectedType} ${isPrivate ? 'private' : 'public'} key to be ${expectedLength} bytes, but found ${keyBytes.length} bytes.`);
70
+ }
71
+ }
72
+ catch (error) {
73
+ // Re-throw our own errors as-is
74
+ if (error instanceof Error && error.message.startsWith('Invalid multibase key format')) {
75
+ throw error;
76
+ }
77
+ // Base58 decode errors or other unexpected errors
78
+ throw new Error(`Invalid multibase key format. Keys must use multicodec headers. Decode error: ${error instanceof Error ? error.message : String(error)}`);
79
+ }
80
+ }
81
+ export const multikey = {
82
+ encodePublicKey: (publicKey, type) => {
83
+ const header = type === 'Ed25519'
84
+ ? MULTICODEC_ED25519_PUB_HEADER
85
+ : type === 'Secp256k1'
86
+ ? MULTICODEC_SECP256K1_PUB_HEADER
87
+ : type === 'Bls12381G2'
88
+ ? MULTICODEC_BLS12381_G2_PUB_HEADER
89
+ : MULTICODEC_P256_PUB_HEADER;
90
+ const mcBytes = concatBytes(header, publicKey);
91
+ return 'z' + base58.encode(mcBytes);
92
+ },
93
+ encodePrivateKey: (privateKey, type) => {
94
+ const header = type === 'Ed25519'
95
+ ? MULTICODEC_ED25519_PRIV_HEADER
96
+ : type === 'Secp256k1'
97
+ ? MULTICODEC_SECP256K1_PRIV_HEADER
98
+ : type === 'Bls12381G2'
99
+ ? MULTICODEC_BLS12381_G2_PRIV_HEADER
100
+ : MULTICODEC_P256_PRIV_HEADER;
101
+ const mcBytes = concatBytes(header, privateKey);
102
+ return 'z' + base58.encode(mcBytes);
103
+ },
104
+ encodeMultibase: (data) => {
105
+ return 'z' + base58.encode(data instanceof Buffer ? new Uint8Array(data) : data);
106
+ },
107
+ decodePublicKey: (publicKeyMultibase) => {
108
+ if (!publicKeyMultibase || publicKeyMultibase[0] !== 'z') {
109
+ throw new Error('Invalid Multibase encoding');
110
+ }
111
+ const mc = base58.decode(publicKeyMultibase.slice(1));
112
+ const header = mc.slice(0, 2);
113
+ const key = mc.slice(2);
114
+ if (header[0] === MULTICODEC_ED25519_PUB_HEADER[0] && header[1] === MULTICODEC_ED25519_PUB_HEADER[1]) {
115
+ return { key, type: 'Ed25519' };
116
+ }
117
+ if (header[0] === MULTICODEC_SECP256K1_PUB_HEADER[0] && header[1] === MULTICODEC_SECP256K1_PUB_HEADER[1]) {
118
+ return { key, type: 'Secp256k1' };
119
+ }
120
+ if (header[0] === MULTICODEC_BLS12381_G2_PUB_HEADER[0] && header[1] === MULTICODEC_BLS12381_G2_PUB_HEADER[1]) {
121
+ return { key, type: 'Bls12381G2' };
122
+ }
123
+ if (header[0] === MULTICODEC_P256_PUB_HEADER[0] && header[1] === MULTICODEC_P256_PUB_HEADER[1]) {
124
+ return { key, type: 'P256' };
125
+ }
126
+ throw new Error('Unsupported key type');
127
+ },
128
+ decodePrivateKey: (privateKeyMultibase) => {
129
+ if (!privateKeyMultibase || privateKeyMultibase[0] !== 'z') {
130
+ throw new Error('Invalid Multibase encoding');
131
+ }
132
+ const mc = base58.decode(privateKeyMultibase.slice(1));
133
+ const header = mc.slice(0, 2);
134
+ const key = mc.slice(2);
135
+ if (header[0] === MULTICODEC_ED25519_PRIV_HEADER[0] && header[1] === MULTICODEC_ED25519_PRIV_HEADER[1]) {
136
+ return { key, type: 'Ed25519' };
137
+ }
138
+ if (header[0] === MULTICODEC_SECP256K1_PRIV_HEADER[0] && header[1] === MULTICODEC_SECP256K1_PRIV_HEADER[1]) {
139
+ return { key, type: 'Secp256k1' };
140
+ }
141
+ if (header[0] === MULTICODEC_BLS12381_G2_PRIV_HEADER[0] && header[1] === MULTICODEC_BLS12381_G2_PRIV_HEADER[1]) {
142
+ return { key, type: 'Bls12381G2' };
143
+ }
144
+ if (header[0] === MULTICODEC_P256_PRIV_HEADER[0] && header[1] === MULTICODEC_P256_PRIV_HEADER[1]) {
145
+ return { key, type: 'P256' };
146
+ }
147
+ throw new Error('Unsupported key type');
148
+ }
149
+ };
@@ -0,0 +1,21 @@
1
+ import './noble-init.js';
2
+ export declare abstract class Signer {
3
+ abstract sign(data: Buffer, privateKeyMultibase: string): Promise<Buffer>;
4
+ abstract verify(data: Buffer, signature: Buffer, publicKeyMultibase: string): Promise<boolean>;
5
+ }
6
+ export declare class ES256KSigner extends Signer {
7
+ sign(data: Buffer, privateKeyMultibase: string): Promise<Buffer>;
8
+ verify(data: Buffer, signature: Buffer, publicKeyMultibase: string): Promise<boolean>;
9
+ }
10
+ export declare class Ed25519Signer extends Signer {
11
+ sign(data: Buffer, privateKeyMultibase: string): Promise<Buffer>;
12
+ verify(data: Buffer, signature: Buffer, publicKeyMultibase: string): Promise<boolean>;
13
+ }
14
+ export declare class ES256Signer extends Signer {
15
+ sign(data: Buffer, privateKeyMultibase: string): Promise<Buffer>;
16
+ verify(data: Buffer, signature: Buffer, publicKeyMultibase: string): Promise<boolean>;
17
+ }
18
+ export declare class Bls12381G2Signer extends Signer {
19
+ sign(data: Buffer, privateKeyMultibase: string): Promise<Buffer>;
20
+ verify(data: Buffer, signature: Buffer, publicKeyMultibase: string): Promise<boolean>;
21
+ }
@@ -0,0 +1,196 @@
1
+ // Initialize noble crypto libraries first (idempotent - safe to import multiple times)
2
+ import './noble-init.js';
3
+ export class Signer {
4
+ }
5
+ import { bls12_381 as bls } from '@noble/curves/bls12-381';
6
+ import { p256 } from '@noble/curves/p256';
7
+ import { sha256 } from '@noble/hashes/sha2.js';
8
+ import * as secp256k1 from '@noble/secp256k1';
9
+ import * as ed25519 from '@noble/ed25519';
10
+ import { multikey } from './Multikey';
11
+ export class ES256KSigner extends Signer {
12
+ async sign(data, privateKeyMultibase) {
13
+ if (!privateKeyMultibase || privateKeyMultibase[0] !== 'z') {
14
+ throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
15
+ }
16
+ let decoded;
17
+ try {
18
+ decoded = multikey.decodePrivateKey(privateKeyMultibase);
19
+ }
20
+ catch (error) {
21
+ throw new Error(`Invalid multibase key format. Keys must use multicodec headers. ${error instanceof Error ? error.message : String(error)}`);
22
+ }
23
+ if (decoded.type !== 'Secp256k1') {
24
+ throw new Error('Invalid key type for ES256K');
25
+ }
26
+ const privateKey = decoded.key;
27
+ const hash = sha256(data);
28
+ const sigAny = await secp256k1.signAsync(hash, privateKey);
29
+ const sigBytes = sigAny instanceof Uint8Array
30
+ ? sigAny
31
+ : typeof sigAny?.toCompactRawBytes === 'function'
32
+ ? sigAny.toCompactRawBytes()
33
+ : typeof sigAny?.toRawBytes === 'function'
34
+ ? sigAny.toRawBytes()
35
+ : new Uint8Array(sigAny);
36
+ return Buffer.from(sigBytes);
37
+ }
38
+ async verify(data, signature, publicKeyMultibase) {
39
+ if (!publicKeyMultibase || publicKeyMultibase[0] !== 'z') {
40
+ throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
41
+ }
42
+ let decoded;
43
+ try {
44
+ decoded = multikey.decodePublicKey(publicKeyMultibase);
45
+ }
46
+ catch (error) {
47
+ throw new Error(`Invalid multibase key format. Keys must use multicodec headers. ${error instanceof Error ? error.message : String(error)}`);
48
+ }
49
+ if (decoded.type !== 'Secp256k1') {
50
+ throw new Error('Invalid key type for ES256K');
51
+ }
52
+ const publicKey = decoded.key;
53
+ const hash = sha256(data);
54
+ try {
55
+ return secp256k1.verify(signature, hash, publicKey);
56
+ }
57
+ catch {
58
+ return false;
59
+ }
60
+ }
61
+ }
62
+ export class Ed25519Signer extends Signer {
63
+ async sign(data, privateKeyMultibase) {
64
+ if (!privateKeyMultibase || privateKeyMultibase[0] !== 'z') {
65
+ throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
66
+ }
67
+ let decoded;
68
+ try {
69
+ decoded = multikey.decodePrivateKey(privateKeyMultibase);
70
+ }
71
+ catch (error) {
72
+ throw new Error(`Invalid multibase key format. Keys must use multicodec headers. ${error instanceof Error ? error.message : String(error)}`);
73
+ }
74
+ if (decoded.type !== 'Ed25519') {
75
+ throw new Error('Invalid key type for Ed25519');
76
+ }
77
+ const privateKey = decoded.key;
78
+ const signature = await ed25519.signAsync(data, privateKey);
79
+ return Buffer.from(signature);
80
+ }
81
+ async verify(data, signature, publicKeyMultibase) {
82
+ if (!publicKeyMultibase || publicKeyMultibase[0] !== 'z') {
83
+ throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
84
+ }
85
+ let decoded;
86
+ try {
87
+ decoded = multikey.decodePublicKey(publicKeyMultibase);
88
+ }
89
+ catch (error) {
90
+ throw new Error(`Invalid multibase key format. Keys must use multicodec headers. ${error instanceof Error ? error.message : String(error)}`);
91
+ }
92
+ if (decoded.type !== 'Ed25519') {
93
+ throw new Error('Invalid key type for Ed25519');
94
+ }
95
+ const publicKey = decoded.key;
96
+ try {
97
+ return await ed25519.verifyAsync(signature, data, publicKey);
98
+ }
99
+ catch {
100
+ return false;
101
+ }
102
+ }
103
+ }
104
+ export class ES256Signer extends Signer {
105
+ async sign(data, privateKeyMultibase) {
106
+ if (!privateKeyMultibase || privateKeyMultibase[0] !== 'z') {
107
+ throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
108
+ }
109
+ let decoded;
110
+ try {
111
+ decoded = multikey.decodePrivateKey(privateKeyMultibase);
112
+ }
113
+ catch (error) {
114
+ throw new Error(`Invalid multibase key format. Keys must use multicodec headers. ${error instanceof Error ? error.message : String(error)}`);
115
+ }
116
+ if (decoded.type !== 'P256') {
117
+ throw new Error('Invalid key type for ES256');
118
+ }
119
+ const privateKey = decoded.key;
120
+ const hash = sha256(data);
121
+ const sigAny = p256.sign(hash, privateKey);
122
+ const sigBytes = sigAny instanceof Uint8Array
123
+ ? sigAny
124
+ : typeof sigAny?.toCompactRawBytes === 'function'
125
+ ? sigAny.toCompactRawBytes()
126
+ : typeof sigAny?.toRawBytes === 'function'
127
+ ? sigAny.toRawBytes()
128
+ : new Uint8Array(sigAny);
129
+ return Buffer.from(sigBytes);
130
+ }
131
+ async verify(data, signature, publicKeyMultibase) {
132
+ if (!publicKeyMultibase || publicKeyMultibase[0] !== 'z') {
133
+ throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
134
+ }
135
+ let decoded;
136
+ try {
137
+ decoded = multikey.decodePublicKey(publicKeyMultibase);
138
+ }
139
+ catch (error) {
140
+ throw new Error(`Invalid multibase key format. Keys must use multicodec headers. ${error instanceof Error ? error.message : String(error)}`);
141
+ }
142
+ if (decoded.type !== 'P256') {
143
+ throw new Error('Invalid key type for ES256');
144
+ }
145
+ const publicKey = decoded.key;
146
+ const hash = sha256(data);
147
+ try {
148
+ return p256.verify(signature, hash, publicKey);
149
+ }
150
+ catch {
151
+ return false;
152
+ }
153
+ }
154
+ }
155
+ export class Bls12381G2Signer extends Signer {
156
+ async sign(data, privateKeyMultibase) {
157
+ if (!privateKeyMultibase || privateKeyMultibase[0] !== 'z') {
158
+ throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
159
+ }
160
+ let decoded;
161
+ try {
162
+ decoded = multikey.decodePrivateKey(privateKeyMultibase);
163
+ }
164
+ catch (error) {
165
+ throw new Error(`Invalid multibase key format. Keys must use multicodec headers. ${error instanceof Error ? error.message : String(error)}`);
166
+ }
167
+ if (decoded.type !== 'Bls12381G2') {
168
+ throw new Error('Invalid key type for Bls12381G2');
169
+ }
170
+ const sk = decoded.key;
171
+ const sig = await bls.sign(data, sk);
172
+ return Buffer.from(sig);
173
+ }
174
+ async verify(data, signature, publicKeyMultibase) {
175
+ if (!publicKeyMultibase || publicKeyMultibase[0] !== 'z') {
176
+ throw new Error('Invalid multibase key format. Keys must use multicodec headers.');
177
+ }
178
+ let decoded;
179
+ try {
180
+ decoded = multikey.decodePublicKey(publicKeyMultibase);
181
+ }
182
+ catch (error) {
183
+ throw new Error(`Invalid multibase key format. Keys must use multicodec headers. ${error instanceof Error ? error.message : String(error)}`);
184
+ }
185
+ if (decoded.type !== 'Bls12381G2') {
186
+ throw new Error('Invalid key type for Bls12381G2');
187
+ }
188
+ const pk = decoded.key;
189
+ try {
190
+ return await bls.verify(signature, data, pk);
191
+ }
192
+ catch {
193
+ return false;
194
+ }
195
+ }
196
+ }
@@ -0,0 +1,18 @@
1
+ /**
2
+ * Noble Crypto Library Initialization
3
+ *
4
+ * @noble/ed25519 v2.x and @noble/secp256k1 require manual configuration of hash functions.
5
+ * This is by design - they don't bundle hash implementations to allow flexibility.
6
+ *
7
+ * This module centralizes the initialization to ensure:
8
+ * 1. Libraries are configured before any crypto operations
9
+ * 2. Configuration is consistent across the SDK
10
+ * 3. Readonly property issues (Bun) are handled gracefully
11
+ *
12
+ * This should be imported at the SDK entry point (index.ts) to ensure it runs first.
13
+ */
14
+ /**
15
+ * Initialize all noble crypto libraries
16
+ * This should be called once at SDK startup
17
+ */
18
+ export declare function initNobleCrypto(): void;
@@ -0,0 +1,106 @@
1
+ /**
2
+ * Noble Crypto Library Initialization
3
+ *
4
+ * @noble/ed25519 v2.x and @noble/secp256k1 require manual configuration of hash functions.
5
+ * This is by design - they don't bundle hash implementations to allow flexibility.
6
+ *
7
+ * This module centralizes the initialization to ensure:
8
+ * 1. Libraries are configured before any crypto operations
9
+ * 2. Configuration is consistent across the SDK
10
+ * 3. Readonly property issues (Bun) are handled gracefully
11
+ *
12
+ * This should be imported at the SDK entry point (index.ts) to ensure it runs first.
13
+ */
14
+ import * as secp256k1 from '@noble/secp256k1';
15
+ import * as ed25519 from '@noble/ed25519';
16
+ import { sha256, sha512 } from '@noble/hashes/sha2.js';
17
+ import { hmac } from '@noble/hashes/hmac.js';
18
+ import { concatBytes } from '@noble/hashes/utils.js';
19
+ // Implementation functions
20
+ const sha512Impl = (...msgs) => sha512(concatBytes(...msgs));
21
+ const hmacSha256Impl = (key, ...msgs) => hmac(sha256, key, concatBytes(...msgs));
22
+ /**
23
+ * Safely set a property on an object, handling readonly properties
24
+ */
25
+ function safeSetProperty(obj, prop, value, options) {
26
+ try {
27
+ obj[prop] = value;
28
+ return true;
29
+ }
30
+ catch {
31
+ // Property might be readonly, try defineProperty
32
+ try {
33
+ Object.defineProperty(obj, prop, {
34
+ value,
35
+ writable: options?.writable ?? true,
36
+ configurable: options?.configurable ?? true,
37
+ });
38
+ return true;
39
+ }
40
+ catch {
41
+ // If both fail, property might already be set or truly readonly
42
+ return false;
43
+ }
44
+ }
45
+ }
46
+ /**
47
+ * Initialize @noble/secp256k1 with hmacSha256Sync utility
48
+ */
49
+ function initSecp256k1() {
50
+ const sAny = secp256k1;
51
+ if (!sAny?.utils) {
52
+ // Try to create utils object if it doesn't exist
53
+ try {
54
+ sAny.utils = {};
55
+ }
56
+ catch {
57
+ // If we can't create it, try defineProperty
58
+ Object.defineProperty(sAny, 'utils', {
59
+ value: {},
60
+ writable: true,
61
+ configurable: true,
62
+ });
63
+ }
64
+ }
65
+ // Set hmacSha256Sync if not already set
66
+ if (typeof sAny.utils.hmacSha256Sync !== 'function') {
67
+ safeSetProperty(sAny.utils, 'hmacSha256Sync', hmacSha256Impl);
68
+ }
69
+ }
70
+ /**
71
+ * Initialize @noble/ed25519 with sha512Sync utility
72
+ * Handles both etc.sha512Sync (v2.x) and utils.sha512Sync (backward compat)
73
+ */
74
+ function initEd25519() {
75
+ const eAny = ed25519;
76
+ // Set etc.sha512Sync for @noble/ed25519 v2.x (required)
77
+ if (eAny?.etc && typeof eAny.etc.sha512Sync !== 'function') {
78
+ safeSetProperty(eAny.etc, 'sha512Sync', sha512Impl);
79
+ }
80
+ // Set utils.sha512Sync for backward compatibility
81
+ if (!eAny?.utils) {
82
+ try {
83
+ eAny.utils = {};
84
+ }
85
+ catch {
86
+ Object.defineProperty(eAny, 'utils', {
87
+ value: {},
88
+ writable: true,
89
+ configurable: true,
90
+ });
91
+ }
92
+ }
93
+ if (typeof eAny.utils.sha512Sync !== 'function') {
94
+ safeSetProperty(eAny.utils, 'sha512Sync', sha512Impl);
95
+ }
96
+ }
97
+ /**
98
+ * Initialize all noble crypto libraries
99
+ * This should be called once at SDK startup
100
+ */
101
+ export function initNobleCrypto() {
102
+ initSecp256k1();
103
+ initEd25519();
104
+ }
105
+ // Auto-initialize when this module is imported
106
+ initNobleCrypto();
@@ -0,0 +1,57 @@
1
+ import type { DIDDocument } from '../types/did';
2
+ export interface BtcoInscriptionData {
3
+ inscriptionId: string;
4
+ content: string;
5
+ metadata: any;
6
+ contentUrl?: string;
7
+ contentType?: string;
8
+ isValidDid?: boolean;
9
+ didDocument?: DIDDocument | null;
10
+ error?: string;
11
+ }
12
+ export interface BtcoDidResolutionResult {
13
+ didDocument: DIDDocument | null;
14
+ inscriptions?: BtcoInscriptionData[];
15
+ resolutionMetadata: {
16
+ contentType?: string;
17
+ error?: string;
18
+ message?: string;
19
+ inscriptionId?: string;
20
+ satNumber?: string;
21
+ network?: string;
22
+ totalInscriptions?: number;
23
+ };
24
+ didDocumentMetadata: {
25
+ created?: string;
26
+ updated?: string;
27
+ deactivated?: boolean;
28
+ inscriptionId?: string;
29
+ network?: string;
30
+ };
31
+ }
32
+ export interface ResourceProviderLike {
33
+ getSatInfo(satNumber: string): Promise<{
34
+ inscription_ids: string[];
35
+ }>;
36
+ resolveInscription(inscriptionId: string): Promise<{
37
+ id: string;
38
+ sat: number;
39
+ content_type: string;
40
+ content_url: string;
41
+ }>;
42
+ getMetadata(inscriptionId: string): Promise<any>;
43
+ }
44
+ export interface BtcoDidResolutionOptions {
45
+ provider?: ResourceProviderLike;
46
+ fetchFn?: (url: string) => Promise<Response>;
47
+ timeout?: number;
48
+ }
49
+ export declare class BtcoDidResolver {
50
+ private readonly options;
51
+ constructor(options?: BtcoDidResolutionOptions);
52
+ private parseBtcoDid;
53
+ private getDidPrefix;
54
+ resolve(did: string, options?: BtcoDidResolutionOptions): Promise<BtcoDidResolutionResult>;
55
+ private isValidDidDocument;
56
+ private createErrorResult;
57
+ }