@originals/sdk 1.4.3 → 1.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapters/FeeOracleMock.d.ts +6 -0
- package/dist/adapters/FeeOracleMock.js +8 -0
- package/dist/adapters/index.d.ts +4 -0
- package/dist/adapters/index.js +4 -0
- package/dist/adapters/providers/OrdHttpProvider.d.ts +56 -0
- package/dist/adapters/providers/OrdHttpProvider.js +110 -0
- package/dist/adapters/providers/OrdMockProvider.d.ts +70 -0
- package/dist/adapters/providers/OrdMockProvider.js +75 -0
- package/dist/adapters/types.d.ts +71 -0
- package/dist/adapters/types.js +1 -0
- package/dist/bitcoin/BitcoinManager.d.ts +15 -0
- package/dist/bitcoin/BitcoinManager.js +262 -0
- package/dist/bitcoin/BroadcastClient.d.ts +30 -0
- package/dist/bitcoin/BroadcastClient.js +35 -0
- package/dist/bitcoin/OrdinalsClient.d.ts +21 -0
- package/dist/bitcoin/OrdinalsClient.js +105 -0
- package/dist/bitcoin/PSBTBuilder.d.ts +24 -0
- package/dist/bitcoin/PSBTBuilder.js +80 -0
- package/dist/bitcoin/fee-calculation.d.ts +14 -0
- package/dist/bitcoin/fee-calculation.js +31 -0
- package/dist/bitcoin/providers/OrdNodeProvider.d.ts +38 -0
- package/dist/bitcoin/providers/OrdNodeProvider.js +67 -0
- package/dist/bitcoin/providers/OrdinalsProvider.d.ts +33 -0
- package/dist/bitcoin/providers/OrdinalsProvider.js +50 -0
- package/dist/bitcoin/providers/types.d.ts +63 -0
- package/dist/bitcoin/providers/types.js +1 -0
- package/dist/bitcoin/transactions/commit.d.ts +89 -0
- package/dist/bitcoin/transactions/commit.js +311 -0
- package/dist/bitcoin/transactions/index.d.ts +7 -0
- package/dist/bitcoin/transactions/index.js +8 -0
- package/dist/bitcoin/transfer.d.ts +9 -0
- package/dist/bitcoin/transfer.js +26 -0
- package/dist/bitcoin/utxo-selection.d.ts +78 -0
- package/dist/bitcoin/utxo-selection.js +237 -0
- package/dist/bitcoin/utxo.d.ts +26 -0
- package/dist/bitcoin/utxo.js +78 -0
- package/dist/contexts/credentials-v1.json +195 -0
- package/dist/contexts/credentials-v2-examples.json +5 -0
- package/dist/contexts/credentials-v2.json +301 -0
- package/dist/contexts/credentials.json +195 -0
- package/dist/contexts/data-integrity-v2.json +81 -0
- package/dist/contexts/dids.json +57 -0
- package/dist/contexts/ed255192020.json +93 -0
- package/dist/contexts/ordinals-plus.json +23 -0
- package/dist/contexts/originals.json +22 -0
- package/dist/core/OriginalsSDK.d.ts +158 -0
- package/dist/core/OriginalsSDK.js +274 -0
- package/dist/crypto/Multikey.d.ts +30 -0
- package/dist/crypto/Multikey.js +149 -0
- package/dist/crypto/Signer.d.ts +21 -0
- package/dist/crypto/Signer.js +196 -0
- package/dist/crypto/noble-init.d.ts +18 -0
- package/dist/crypto/noble-init.js +106 -0
- package/dist/did/BtcoDidResolver.d.ts +57 -0
- package/dist/did/BtcoDidResolver.js +166 -0
- package/dist/did/DIDManager.d.ts +101 -0
- package/dist/did/DIDManager.js +493 -0
- package/dist/did/Ed25519Verifier.d.ts +30 -0
- package/dist/did/Ed25519Verifier.js +59 -0
- package/dist/did/KeyManager.d.ts +17 -0
- package/dist/did/KeyManager.js +207 -0
- package/dist/did/WebVHManager.d.ts +100 -0
- package/dist/did/WebVHManager.js +312 -0
- package/dist/did/createBtcoDidDocument.d.ts +10 -0
- package/dist/did/createBtcoDidDocument.js +42 -0
- package/dist/did/providers/OrdinalsClientProviderAdapter.d.ts +23 -0
- package/dist/did/providers/OrdinalsClientProviderAdapter.js +51 -0
- package/dist/events/EventEmitter.d.ts +115 -0
- package/dist/events/EventEmitter.js +198 -0
- package/dist/events/index.d.ts +7 -0
- package/dist/events/index.js +6 -0
- package/dist/events/types.d.ts +286 -0
- package/dist/events/types.js +9 -0
- package/dist/examples/basic-usage.d.ts +3 -0
- package/dist/examples/basic-usage.js +62 -0
- package/dist/examples/create-module-original.d.ts +32 -0
- package/dist/examples/create-module-original.js +376 -0
- package/dist/examples/full-lifecycle-flow.d.ts +56 -0
- package/dist/examples/full-lifecycle-flow.js +419 -0
- package/dist/examples/run.d.ts +12 -0
- package/dist/examples/run.js +51 -0
- package/dist/index.d.ts +43 -0
- package/dist/index.js +52 -0
- package/dist/kinds/KindRegistry.d.ts +76 -0
- package/dist/kinds/KindRegistry.js +216 -0
- package/dist/kinds/index.d.ts +33 -0
- package/dist/kinds/index.js +36 -0
- package/dist/kinds/types.d.ts +363 -0
- package/dist/kinds/types.js +25 -0
- package/dist/kinds/validators/AgentValidator.d.ts +14 -0
- package/dist/kinds/validators/AgentValidator.js +155 -0
- package/dist/kinds/validators/AppValidator.d.ts +14 -0
- package/dist/kinds/validators/AppValidator.js +135 -0
- package/dist/kinds/validators/DatasetValidator.d.ts +14 -0
- package/dist/kinds/validators/DatasetValidator.js +148 -0
- package/dist/kinds/validators/DocumentValidator.d.ts +14 -0
- package/dist/kinds/validators/DocumentValidator.js +180 -0
- package/dist/kinds/validators/MediaValidator.d.ts +14 -0
- package/dist/kinds/validators/MediaValidator.js +172 -0
- package/dist/kinds/validators/ModuleValidator.d.ts +14 -0
- package/dist/kinds/validators/ModuleValidator.js +140 -0
- package/dist/kinds/validators/base.d.ts +96 -0
- package/dist/kinds/validators/base.js +218 -0
- package/dist/kinds/validators/index.d.ts +10 -0
- package/dist/kinds/validators/index.js +10 -0
- package/dist/lifecycle/BatchOperations.d.ts +147 -0
- package/dist/lifecycle/BatchOperations.js +251 -0
- package/dist/lifecycle/LifecycleManager.d.ts +362 -0
- package/dist/lifecycle/LifecycleManager.js +1692 -0
- package/dist/lifecycle/OriginalsAsset.d.ts +164 -0
- package/dist/lifecycle/OriginalsAsset.js +380 -0
- package/dist/lifecycle/ProvenanceQuery.d.ts +126 -0
- package/dist/lifecycle/ProvenanceQuery.js +220 -0
- package/dist/lifecycle/ResourceVersioning.d.ts +73 -0
- package/dist/lifecycle/ResourceVersioning.js +127 -0
- package/dist/migration/MigrationManager.d.ts +86 -0
- package/dist/migration/MigrationManager.js +412 -0
- package/dist/migration/audit/AuditLogger.d.ts +51 -0
- package/dist/migration/audit/AuditLogger.js +156 -0
- package/dist/migration/checkpoint/CheckpointManager.d.ts +31 -0
- package/dist/migration/checkpoint/CheckpointManager.js +96 -0
- package/dist/migration/checkpoint/CheckpointStorage.d.ts +26 -0
- package/dist/migration/checkpoint/CheckpointStorage.js +89 -0
- package/dist/migration/index.d.ts +22 -0
- package/dist/migration/index.js +27 -0
- package/dist/migration/operations/BaseMigration.d.ts +48 -0
- package/dist/migration/operations/BaseMigration.js +83 -0
- package/dist/migration/operations/PeerToBtcoMigration.d.ts +25 -0
- package/dist/migration/operations/PeerToBtcoMigration.js +67 -0
- package/dist/migration/operations/PeerToWebvhMigration.d.ts +19 -0
- package/dist/migration/operations/PeerToWebvhMigration.js +46 -0
- package/dist/migration/operations/WebvhToBtcoMigration.d.ts +25 -0
- package/dist/migration/operations/WebvhToBtcoMigration.js +67 -0
- package/dist/migration/rollback/RollbackManager.d.ts +29 -0
- package/dist/migration/rollback/RollbackManager.js +146 -0
- package/dist/migration/state/StateMachine.d.ts +25 -0
- package/dist/migration/state/StateMachine.js +76 -0
- package/dist/migration/state/StateTracker.d.ts +36 -0
- package/dist/migration/state/StateTracker.js +123 -0
- package/dist/migration/types.d.ts +306 -0
- package/dist/migration/types.js +33 -0
- package/dist/migration/validation/BitcoinValidator.d.ts +13 -0
- package/dist/migration/validation/BitcoinValidator.js +83 -0
- package/dist/migration/validation/CredentialValidator.d.ts +13 -0
- package/dist/migration/validation/CredentialValidator.js +46 -0
- package/dist/migration/validation/DIDCompatibilityValidator.d.ts +16 -0
- package/dist/migration/validation/DIDCompatibilityValidator.js +127 -0
- package/dist/migration/validation/LifecycleValidator.d.ts +10 -0
- package/dist/migration/validation/LifecycleValidator.js +52 -0
- package/dist/migration/validation/StorageValidator.d.ts +10 -0
- package/dist/migration/validation/StorageValidator.js +65 -0
- package/dist/migration/validation/ValidationPipeline.d.ts +29 -0
- package/dist/migration/validation/ValidationPipeline.js +180 -0
- package/dist/resources/ResourceManager.d.ts +231 -0
- package/dist/resources/ResourceManager.js +573 -0
- package/dist/resources/index.d.ts +11 -0
- package/dist/resources/index.js +10 -0
- package/dist/resources/types.d.ts +93 -0
- package/dist/resources/types.js +80 -0
- package/dist/storage/LocalStorageAdapter.d.ts +11 -0
- package/dist/storage/LocalStorageAdapter.js +53 -0
- package/dist/storage/MemoryStorageAdapter.d.ts +6 -0
- package/dist/storage/MemoryStorageAdapter.js +21 -0
- package/dist/storage/StorageAdapter.d.ts +16 -0
- package/dist/storage/StorageAdapter.js +1 -0
- package/dist/storage/index.d.ts +2 -0
- package/dist/storage/index.js +2 -0
- package/dist/types/bitcoin.d.ts +84 -0
- package/dist/types/bitcoin.js +1 -0
- package/dist/types/common.d.ts +82 -0
- package/dist/types/common.js +1 -0
- package/dist/types/credentials.d.ts +75 -0
- package/dist/types/credentials.js +1 -0
- package/dist/types/did.d.ts +26 -0
- package/dist/types/did.js +1 -0
- package/dist/types/index.d.ts +5 -0
- package/dist/types/index.js +5 -0
- package/dist/types/network.d.ts +78 -0
- package/dist/types/network.js +145 -0
- package/dist/utils/EventLogger.d.ts +71 -0
- package/dist/utils/EventLogger.js +232 -0
- package/dist/utils/Logger.d.ts +106 -0
- package/dist/utils/Logger.js +257 -0
- package/dist/utils/MetricsCollector.d.ts +110 -0
- package/dist/utils/MetricsCollector.js +264 -0
- package/dist/utils/bitcoin-address.d.ts +38 -0
- package/dist/utils/bitcoin-address.js +113 -0
- package/dist/utils/cbor.d.ts +2 -0
- package/dist/utils/cbor.js +9 -0
- package/dist/utils/encoding.d.ts +37 -0
- package/dist/utils/encoding.js +120 -0
- package/dist/utils/hash.d.ts +1 -0
- package/dist/utils/hash.js +5 -0
- package/dist/utils/retry.d.ts +10 -0
- package/dist/utils/retry.js +35 -0
- package/dist/utils/satoshi-validation.d.ts +60 -0
- package/dist/utils/satoshi-validation.js +156 -0
- package/dist/utils/serialization.d.ts +14 -0
- package/dist/utils/serialization.js +76 -0
- package/dist/utils/telemetry.d.ts +17 -0
- package/dist/utils/telemetry.js +24 -0
- package/dist/utils/validation.d.ts +5 -0
- package/dist/utils/validation.js +98 -0
- package/dist/vc/CredentialManager.d.ts +329 -0
- package/dist/vc/CredentialManager.js +615 -0
- package/dist/vc/Issuer.d.ts +27 -0
- package/dist/vc/Issuer.js +70 -0
- package/dist/vc/Verifier.d.ts +16 -0
- package/dist/vc/Verifier.js +50 -0
- package/dist/vc/cryptosuites/bbs.d.ts +44 -0
- package/dist/vc/cryptosuites/bbs.js +213 -0
- package/dist/vc/cryptosuites/bbsSimple.d.ts +9 -0
- package/dist/vc/cryptosuites/bbsSimple.js +12 -0
- package/dist/vc/cryptosuites/eddsa.d.ts +30 -0
- package/dist/vc/cryptosuites/eddsa.js +81 -0
- package/dist/vc/documentLoader.d.ts +16 -0
- package/dist/vc/documentLoader.js +59 -0
- package/dist/vc/proofs/data-integrity.d.ts +21 -0
- package/dist/vc/proofs/data-integrity.js +15 -0
- package/dist/vc/utils/jsonld.d.ts +2 -0
- package/dist/vc/utils/jsonld.js +15 -0
- package/package.json +2 -1
|
@@ -0,0 +1,615 @@
|
|
|
1
|
+
import { canonicalizeDocument } from '../utils/serialization';
|
|
2
|
+
import { encodeBase64UrlMultibase, decodeBase64UrlMultibase } from '../utils/encoding';
|
|
3
|
+
import { sha256 } from '@noble/hashes/sha2.js';
|
|
4
|
+
import { bytesToHex } from '@noble/hashes/utils.js';
|
|
5
|
+
import { ES256KSigner, Ed25519Signer, ES256Signer } from '../crypto/Signer';
|
|
6
|
+
import { Issuer } from './Issuer';
|
|
7
|
+
import { createDocumentLoader } from './documentLoader';
|
|
8
|
+
import { Verifier } from './Verifier';
|
|
9
|
+
export class CredentialManager {
|
|
10
|
+
constructor(config, didManager) {
|
|
11
|
+
this.config = config;
|
|
12
|
+
this.didManager = didManager;
|
|
13
|
+
}
|
|
14
|
+
async createResourceCredential(type, subject, issuer) {
|
|
15
|
+
return {
|
|
16
|
+
'@context': ['https://www.w3.org/2018/credentials/v1'],
|
|
17
|
+
type: ['VerifiableCredential', type],
|
|
18
|
+
issuer,
|
|
19
|
+
issuanceDate: new Date().toISOString(),
|
|
20
|
+
credentialSubject: subject
|
|
21
|
+
};
|
|
22
|
+
}
|
|
23
|
+
async signCredential(credential, privateKeyMultibase, verificationMethod) {
|
|
24
|
+
if (this.didManager && typeof verificationMethod === 'string' && verificationMethod.startsWith('did:')) {
|
|
25
|
+
try {
|
|
26
|
+
const loader = createDocumentLoader(this.didManager);
|
|
27
|
+
const { document } = await loader(verificationMethod);
|
|
28
|
+
if (document && document.publicKeyMultibase) {
|
|
29
|
+
const vm = {
|
|
30
|
+
id: verificationMethod,
|
|
31
|
+
controller: typeof credential.issuer === 'string' ? credential.issuer : credential.issuer?.id,
|
|
32
|
+
publicKeyMultibase: document.publicKeyMultibase,
|
|
33
|
+
secretKeyMultibase: privateKeyMultibase,
|
|
34
|
+
type: document.type || 'Multikey'
|
|
35
|
+
};
|
|
36
|
+
const issuer = new Issuer(this.didManager, vm);
|
|
37
|
+
const unsigned = { ...credential };
|
|
38
|
+
delete unsigned['@context'];
|
|
39
|
+
delete unsigned.proof;
|
|
40
|
+
return issuer.issueCredential(unsigned, { proofPurpose: 'assertionMethod' });
|
|
41
|
+
}
|
|
42
|
+
}
|
|
43
|
+
catch {
|
|
44
|
+
// fall through to legacy signing
|
|
45
|
+
}
|
|
46
|
+
}
|
|
47
|
+
// fallback to legacy local signer
|
|
48
|
+
const proofBase = {
|
|
49
|
+
type: 'DataIntegrityProof',
|
|
50
|
+
created: new Date().toISOString(),
|
|
51
|
+
verificationMethod,
|
|
52
|
+
proofPurpose: 'assertionMethod',
|
|
53
|
+
proofValue: ''
|
|
54
|
+
};
|
|
55
|
+
const proofValue = await this.generateProofValue(credential, privateKeyMultibase, proofBase);
|
|
56
|
+
const proof = { ...proofBase, proofValue };
|
|
57
|
+
return { ...credential, proof };
|
|
58
|
+
}
|
|
59
|
+
/**
|
|
60
|
+
* Sign a credential using an external signer (e.g., hardware wallet, Turnkey)
|
|
61
|
+
* @param credential - The unsigned credential
|
|
62
|
+
* @param signer - External signer implementation
|
|
63
|
+
* @returns Signed verifiable credential
|
|
64
|
+
*/
|
|
65
|
+
async signCredentialWithExternalSigner(credential, signer) {
|
|
66
|
+
const verificationMethodId = await signer.getVerificationMethodId();
|
|
67
|
+
// Create proof structure
|
|
68
|
+
const proofBase = {
|
|
69
|
+
type: 'DataIntegrityProof',
|
|
70
|
+
cryptosuite: 'eddsa-rdfc-2022', // Or derive from signer type
|
|
71
|
+
created: new Date().toISOString(),
|
|
72
|
+
verificationMethod: verificationMethodId,
|
|
73
|
+
proofPurpose: 'assertionMethod'
|
|
74
|
+
};
|
|
75
|
+
// Prepare unsigned credential
|
|
76
|
+
const unsignedCredential = { ...credential };
|
|
77
|
+
delete unsignedCredential.proof;
|
|
78
|
+
// Use external signer to sign
|
|
79
|
+
const { proofValue } = await signer.sign({
|
|
80
|
+
document: unsignedCredential,
|
|
81
|
+
proof: proofBase
|
|
82
|
+
});
|
|
83
|
+
// Return signed credential
|
|
84
|
+
return {
|
|
85
|
+
...credential,
|
|
86
|
+
proof: {
|
|
87
|
+
...proofBase,
|
|
88
|
+
proofValue
|
|
89
|
+
}
|
|
90
|
+
};
|
|
91
|
+
}
|
|
92
|
+
async verifyCredential(credential) {
|
|
93
|
+
if (this.didManager) {
|
|
94
|
+
const proofAny = credential.proof;
|
|
95
|
+
if (proofAny && (proofAny.cryptosuite || (Array.isArray(proofAny) && proofAny[0]?.cryptosuite))) {
|
|
96
|
+
const verifier = new Verifier(this.didManager);
|
|
97
|
+
const res = await verifier.verifyCredential(credential);
|
|
98
|
+
return res.verified;
|
|
99
|
+
}
|
|
100
|
+
}
|
|
101
|
+
const proof = credential.proof;
|
|
102
|
+
if (!proof) {
|
|
103
|
+
return false;
|
|
104
|
+
}
|
|
105
|
+
const { proofValue, verificationMethod } = proof;
|
|
106
|
+
if (!proofValue || !verificationMethod)
|
|
107
|
+
return false;
|
|
108
|
+
const signature = this.decodeMultibase(proofValue);
|
|
109
|
+
if (!signature)
|
|
110
|
+
return false;
|
|
111
|
+
const proofSansValue = { ...proof };
|
|
112
|
+
delete proofSansValue.proofValue;
|
|
113
|
+
const proofInput = { ...proofSansValue };
|
|
114
|
+
const credentialContext = credential['@context'];
|
|
115
|
+
if (credentialContext && !proofInput['@context']) {
|
|
116
|
+
proofInput['@context'] = credentialContext;
|
|
117
|
+
}
|
|
118
|
+
const unsignedCredential = { ...credential };
|
|
119
|
+
delete unsignedCredential.proof;
|
|
120
|
+
const c14nProof = await canonicalizeDocument(proofInput);
|
|
121
|
+
const c14nCred = await canonicalizeDocument(unsignedCredential);
|
|
122
|
+
const hProof = Buffer.from(sha256(Buffer.from(c14nProof, 'utf8')));
|
|
123
|
+
const hCred = Buffer.from(sha256(Buffer.from(c14nCred, 'utf8')));
|
|
124
|
+
const digest = Buffer.concat([hProof, hCred]);
|
|
125
|
+
const signer = this.getSigner();
|
|
126
|
+
try {
|
|
127
|
+
const resolvedKey = proof.publicKeyMultibase
|
|
128
|
+
|| await this.resolveVerificationMethodMultibase(verificationMethod);
|
|
129
|
+
if (!resolvedKey) {
|
|
130
|
+
return false;
|
|
131
|
+
}
|
|
132
|
+
return await signer.verify(Buffer.from(digest), Buffer.from(signature), resolvedKey);
|
|
133
|
+
}
|
|
134
|
+
catch {
|
|
135
|
+
return false;
|
|
136
|
+
}
|
|
137
|
+
}
|
|
138
|
+
async createPresentation(credentials, holder) {
|
|
139
|
+
return {
|
|
140
|
+
'@context': ['https://www.w3.org/2018/credentials/v1'],
|
|
141
|
+
type: ['VerifiablePresentation'],
|
|
142
|
+
holder,
|
|
143
|
+
verifiableCredential: credentials
|
|
144
|
+
};
|
|
145
|
+
}
|
|
146
|
+
async generateProofValue(credential, privateKeyMultibase, proofBase) {
|
|
147
|
+
// Construct canonical digest including provided proof sans proofValue
|
|
148
|
+
const proofSansValue = { ...proofBase };
|
|
149
|
+
delete proofSansValue.proofValue;
|
|
150
|
+
const proofInput = { ...proofSansValue };
|
|
151
|
+
const credentialContext = credential['@context'];
|
|
152
|
+
if (credentialContext && !proofInput['@context']) {
|
|
153
|
+
proofInput['@context'] = credentialContext;
|
|
154
|
+
}
|
|
155
|
+
const unsignedCredential = { ...credential };
|
|
156
|
+
delete unsignedCredential.proof;
|
|
157
|
+
const c14nProof = await canonicalizeDocument(proofInput);
|
|
158
|
+
const c14nCred = await canonicalizeDocument(unsignedCredential);
|
|
159
|
+
const hProof = Buffer.from(sha256(Buffer.from(c14nProof, 'utf8')));
|
|
160
|
+
const hCred = Buffer.from(sha256(Buffer.from(c14nCred, 'utf8')));
|
|
161
|
+
const digest = Buffer.concat([hProof, hCred]);
|
|
162
|
+
const signer = this.getSigner();
|
|
163
|
+
const sig = await signer.sign(Buffer.from(digest), privateKeyMultibase);
|
|
164
|
+
return encodeBase64UrlMultibase(sig);
|
|
165
|
+
}
|
|
166
|
+
getSigner() {
|
|
167
|
+
switch (this.config.defaultKeyType) {
|
|
168
|
+
case 'ES256K':
|
|
169
|
+
return new ES256KSigner();
|
|
170
|
+
case 'Ed25519':
|
|
171
|
+
return new Ed25519Signer();
|
|
172
|
+
case 'ES256':
|
|
173
|
+
return new ES256Signer();
|
|
174
|
+
default:
|
|
175
|
+
return new ES256KSigner();
|
|
176
|
+
}
|
|
177
|
+
}
|
|
178
|
+
async resolveVerificationMethodMultibase(verificationMethod) {
|
|
179
|
+
if (typeof verificationMethod === 'string' && verificationMethod.startsWith('z')) {
|
|
180
|
+
return verificationMethod;
|
|
181
|
+
}
|
|
182
|
+
if (!this.didManager || typeof verificationMethod !== 'string' || !verificationMethod.startsWith('did:')) {
|
|
183
|
+
return null;
|
|
184
|
+
}
|
|
185
|
+
const loader = createDocumentLoader(this.didManager);
|
|
186
|
+
try {
|
|
187
|
+
const { document } = await loader(verificationMethod);
|
|
188
|
+
if (document && typeof document.publicKeyMultibase === 'string') {
|
|
189
|
+
return document.publicKeyMultibase;
|
|
190
|
+
}
|
|
191
|
+
}
|
|
192
|
+
catch (err) {
|
|
193
|
+
// Document loader failed; will try alternative resolution method
|
|
194
|
+
if (this.config.enableLogging) {
|
|
195
|
+
console.warn('Failed to load verification method via document loader:', err);
|
|
196
|
+
}
|
|
197
|
+
}
|
|
198
|
+
try {
|
|
199
|
+
const did = verificationMethod.split('#')[0];
|
|
200
|
+
if (!did) {
|
|
201
|
+
return null;
|
|
202
|
+
}
|
|
203
|
+
const didDoc = await this.didManager.resolveDID(did);
|
|
204
|
+
const vms = didDoc?.verificationMethod;
|
|
205
|
+
if (Array.isArray(vms)) {
|
|
206
|
+
const vm = vms.find((m) => m?.id === verificationMethod);
|
|
207
|
+
if (vm && typeof vm.publicKeyMultibase === 'string') {
|
|
208
|
+
return vm.publicKeyMultibase;
|
|
209
|
+
}
|
|
210
|
+
}
|
|
211
|
+
}
|
|
212
|
+
catch (err) {
|
|
213
|
+
// Failed to resolve DID document
|
|
214
|
+
if (this.config.enableLogging) {
|
|
215
|
+
console.warn('Failed to resolve DID for verification method:', err);
|
|
216
|
+
}
|
|
217
|
+
}
|
|
218
|
+
return null;
|
|
219
|
+
}
|
|
220
|
+
decodeMultibase(s) {
|
|
221
|
+
try {
|
|
222
|
+
return decodeBase64UrlMultibase(s);
|
|
223
|
+
}
|
|
224
|
+
catch {
|
|
225
|
+
return null;
|
|
226
|
+
}
|
|
227
|
+
}
|
|
228
|
+
// ===== Credential Factory Methods =====
|
|
229
|
+
/**
|
|
230
|
+
* Issue a ResourceCreated credential for a newly created resource
|
|
231
|
+
*
|
|
232
|
+
* @param resource - The created resource
|
|
233
|
+
* @param assetDid - The DID of the asset containing the resource
|
|
234
|
+
* @param creatorDid - The DID of the creator
|
|
235
|
+
* @param chainOptions - Optional chaining options for linking to previous credentials
|
|
236
|
+
* @returns Unsigned verifiable credential
|
|
237
|
+
*
|
|
238
|
+
* @example
|
|
239
|
+
* ```typescript
|
|
240
|
+
* const credential = await credentialManager.issueResourceCredential(
|
|
241
|
+
* resource,
|
|
242
|
+
* 'did:peer:abc...',
|
|
243
|
+
* 'did:peer:creator...'
|
|
244
|
+
* );
|
|
245
|
+
* // Sign the credential with your key
|
|
246
|
+
* const signed = await credentialManager.signCredential(credential, privateKey, vmId);
|
|
247
|
+
* ```
|
|
248
|
+
*/
|
|
249
|
+
async issueResourceCredential(resource, assetDid, creatorDid, chainOptions) {
|
|
250
|
+
const subject = {
|
|
251
|
+
id: assetDid,
|
|
252
|
+
resourceId: resource.id,
|
|
253
|
+
resourceType: resource.type,
|
|
254
|
+
contentHash: resource.hash,
|
|
255
|
+
contentType: resource.contentType,
|
|
256
|
+
creator: creatorDid,
|
|
257
|
+
createdAt: resource.createdAt || new Date().toISOString()
|
|
258
|
+
};
|
|
259
|
+
const credential = await this.createCredentialWithChain('ResourceCreated', subject, creatorDid, chainOptions);
|
|
260
|
+
return credential;
|
|
261
|
+
}
|
|
262
|
+
/**
|
|
263
|
+
* Issue a ResourceUpdated credential for a resource version update
|
|
264
|
+
*
|
|
265
|
+
* @param resourceId - The logical resource ID
|
|
266
|
+
* @param assetDid - The DID of the asset
|
|
267
|
+
* @param previousHash - Hash of the previous version
|
|
268
|
+
* @param newHash - Hash of the new version
|
|
269
|
+
* @param fromVersion - Previous version number
|
|
270
|
+
* @param toVersion - New version number
|
|
271
|
+
* @param updaterDid - DID of the entity performing the update
|
|
272
|
+
* @param updateReason - Optional reason for the update
|
|
273
|
+
* @param chainOptions - Optional chaining options
|
|
274
|
+
* @returns Unsigned verifiable credential
|
|
275
|
+
*
|
|
276
|
+
* @example
|
|
277
|
+
* ```typescript
|
|
278
|
+
* const credential = await credentialManager.issueResourceUpdateCredential(
|
|
279
|
+
* 'main.js',
|
|
280
|
+
* 'did:webvh:example.com:asset',
|
|
281
|
+
* 'abc123...',
|
|
282
|
+
* 'def456...',
|
|
283
|
+
* 1,
|
|
284
|
+
* 2,
|
|
285
|
+
* 'did:webvh:example.com:user',
|
|
286
|
+
* 'Bug fix'
|
|
287
|
+
* );
|
|
288
|
+
* ```
|
|
289
|
+
*/
|
|
290
|
+
async issueResourceUpdateCredential(resourceId, assetDid, previousHash, newHash, fromVersion, toVersion, updaterDid, updateReason, chainOptions) {
|
|
291
|
+
const subject = {
|
|
292
|
+
id: assetDid,
|
|
293
|
+
resourceId,
|
|
294
|
+
previousHash,
|
|
295
|
+
newHash,
|
|
296
|
+
fromVersion,
|
|
297
|
+
toVersion,
|
|
298
|
+
updatedAt: new Date().toISOString(),
|
|
299
|
+
...(updateReason && { updateReason })
|
|
300
|
+
};
|
|
301
|
+
const credential = await this.createCredentialWithChain('ResourceUpdated', subject, updaterDid, chainOptions);
|
|
302
|
+
return credential;
|
|
303
|
+
}
|
|
304
|
+
/**
|
|
305
|
+
* Issue a MigrationCompleted credential for layer migrations
|
|
306
|
+
*
|
|
307
|
+
* Records the migration of an asset between Originals layers (peer -> webvh -> btco).
|
|
308
|
+
*
|
|
309
|
+
* @param sourceDid - The source DID (before migration)
|
|
310
|
+
* @param targetDid - The target DID (after migration, if different)
|
|
311
|
+
* @param fromLayer - The source layer
|
|
312
|
+
* @param toLayer - The target layer
|
|
313
|
+
* @param issuerDid - The DID issuing this credential
|
|
314
|
+
* @param details - Optional migration details (transactionId, inscriptionId, satoshi)
|
|
315
|
+
* @param chainOptions - Optional chaining options
|
|
316
|
+
* @returns Unsigned verifiable credential
|
|
317
|
+
*
|
|
318
|
+
* @example
|
|
319
|
+
* ```typescript
|
|
320
|
+
* const credential = await credentialManager.issueMigrationCredential(
|
|
321
|
+
* 'did:peer:abc...',
|
|
322
|
+
* 'did:webvh:example.com:asset',
|
|
323
|
+
* 'did:peer',
|
|
324
|
+
* 'did:webvh',
|
|
325
|
+
* 'did:webvh:example.com:publisher'
|
|
326
|
+
* );
|
|
327
|
+
* ```
|
|
328
|
+
*/
|
|
329
|
+
async issueMigrationCredential(sourceDid, targetDid, fromLayer, toLayer, issuerDid, details, chainOptions) {
|
|
330
|
+
const subject = {
|
|
331
|
+
id: targetDid || sourceDid,
|
|
332
|
+
sourceDid,
|
|
333
|
+
...(targetDid && { targetDid }),
|
|
334
|
+
fromLayer,
|
|
335
|
+
toLayer,
|
|
336
|
+
migratedAt: new Date().toISOString(),
|
|
337
|
+
...(details?.transactionId && { transactionId: details.transactionId }),
|
|
338
|
+
...(details?.inscriptionId && { inscriptionId: details.inscriptionId }),
|
|
339
|
+
...(details?.satoshi && { satoshi: details.satoshi }),
|
|
340
|
+
...(details?.migrationReason && { migrationReason: details.migrationReason })
|
|
341
|
+
};
|
|
342
|
+
const credential = await this.createCredentialWithChain('MigrationCompleted', subject, issuerDid, chainOptions);
|
|
343
|
+
return credential;
|
|
344
|
+
}
|
|
345
|
+
/**
|
|
346
|
+
* Issue an OwnershipTransferred credential for Bitcoin-anchored asset transfers
|
|
347
|
+
*
|
|
348
|
+
* Records the transfer of ownership of a did:btco asset to a new owner.
|
|
349
|
+
*
|
|
350
|
+
* @param assetDid - The DID of the asset being transferred
|
|
351
|
+
* @param previousOwner - The previous owner (DID or Bitcoin address)
|
|
352
|
+
* @param newOwner - The new owner (Bitcoin address)
|
|
353
|
+
* @param transactionId - The Bitcoin transaction ID
|
|
354
|
+
* @param issuerDid - The DID issuing this credential
|
|
355
|
+
* @param details - Optional additional details
|
|
356
|
+
* @param chainOptions - Optional chaining options
|
|
357
|
+
* @returns Unsigned verifiable credential
|
|
358
|
+
*
|
|
359
|
+
* @example
|
|
360
|
+
* ```typescript
|
|
361
|
+
* const credential = await credentialManager.issueOwnershipCredential(
|
|
362
|
+
* 'did:btco:12345',
|
|
363
|
+
* 'bc1q...oldowner',
|
|
364
|
+
* 'bc1q...newowner',
|
|
365
|
+
* 'abc123...txid',
|
|
366
|
+
* 'did:btco:12345'
|
|
367
|
+
* );
|
|
368
|
+
* ```
|
|
369
|
+
*/
|
|
370
|
+
async issueOwnershipCredential(assetDid, previousOwner, newOwner, transactionId, issuerDid, details, chainOptions) {
|
|
371
|
+
const subject = {
|
|
372
|
+
id: assetDid,
|
|
373
|
+
previousOwner,
|
|
374
|
+
newOwner,
|
|
375
|
+
transferredAt: new Date().toISOString(),
|
|
376
|
+
transactionId,
|
|
377
|
+
...(details?.satoshi && { satoshi: details.satoshi }),
|
|
378
|
+
...(details?.transferReason && { transferReason: details.transferReason })
|
|
379
|
+
};
|
|
380
|
+
const credential = await this.createCredentialWithChain('OwnershipTransferred', subject, issuerDid, chainOptions);
|
|
381
|
+
return credential;
|
|
382
|
+
}
|
|
383
|
+
/**
|
|
384
|
+
* Create a credential with optional chaining to a previous credential
|
|
385
|
+
*
|
|
386
|
+
* Credential chaining creates a verifiable provenance chain by linking
|
|
387
|
+
* credentials together through their IDs and hashes.
|
|
388
|
+
*
|
|
389
|
+
* @param type - The credential type
|
|
390
|
+
* @param subject - The credential subject
|
|
391
|
+
* @param issuer - The issuer DID
|
|
392
|
+
* @param chainOptions - Optional chaining options
|
|
393
|
+
* @returns Unsigned verifiable credential with chain metadata
|
|
394
|
+
*/
|
|
395
|
+
async createCredentialWithChain(type, subject, issuer, chainOptions) {
|
|
396
|
+
const credential = {
|
|
397
|
+
'@context': [
|
|
398
|
+
'https://www.w3.org/2018/credentials/v1',
|
|
399
|
+
'https://w3id.org/security/data-integrity/v2'
|
|
400
|
+
],
|
|
401
|
+
type: ['VerifiableCredential', type],
|
|
402
|
+
id: this.generateCredentialId(),
|
|
403
|
+
issuer,
|
|
404
|
+
issuanceDate: new Date().toISOString(),
|
|
405
|
+
credentialSubject: subject
|
|
406
|
+
};
|
|
407
|
+
// Add expiration if specified
|
|
408
|
+
if (chainOptions?.expirationDate) {
|
|
409
|
+
credential.expirationDate = chainOptions.expirationDate;
|
|
410
|
+
}
|
|
411
|
+
// Add credential status if specified
|
|
412
|
+
if (chainOptions?.credentialStatus) {
|
|
413
|
+
credential.credentialStatus = chainOptions.credentialStatus;
|
|
414
|
+
}
|
|
415
|
+
// Add chaining metadata if provided
|
|
416
|
+
if (chainOptions?.previousCredentialId || chainOptions?.previousCredentialHash) {
|
|
417
|
+
credential.credentialSubject.previousCredential = {
|
|
418
|
+
...(chainOptions.previousCredentialId && { id: chainOptions.previousCredentialId }),
|
|
419
|
+
...(chainOptions.previousCredentialHash && { hash: chainOptions.previousCredentialHash })
|
|
420
|
+
};
|
|
421
|
+
}
|
|
422
|
+
return credential;
|
|
423
|
+
}
|
|
424
|
+
/**
|
|
425
|
+
* Generate a unique credential ID
|
|
426
|
+
*/
|
|
427
|
+
generateCredentialId() {
|
|
428
|
+
const timestamp = Date.now();
|
|
429
|
+
const randomBytes = new Uint8Array(16);
|
|
430
|
+
if (typeof globalThis.crypto?.getRandomValues === 'function') {
|
|
431
|
+
globalThis.crypto.getRandomValues(randomBytes);
|
|
432
|
+
}
|
|
433
|
+
else {
|
|
434
|
+
// Fallback for environments without crypto.getRandomValues
|
|
435
|
+
for (let i = 0; i < 16; i++) {
|
|
436
|
+
randomBytes[i] = Math.floor(Math.random() * 256);
|
|
437
|
+
}
|
|
438
|
+
}
|
|
439
|
+
const randomHex = bytesToHex(randomBytes);
|
|
440
|
+
return `urn:uuid:${timestamp}-${randomHex.substring(0, 8)}-${randomHex.substring(8, 16)}`;
|
|
441
|
+
}
|
|
442
|
+
/**
|
|
443
|
+
* Compute the hash of a credential for chaining purposes
|
|
444
|
+
*
|
|
445
|
+
* @param credential - The credential to hash
|
|
446
|
+
* @returns SHA-256 hash of the canonicalized credential
|
|
447
|
+
*/
|
|
448
|
+
async computeCredentialHash(credential) {
|
|
449
|
+
const canonicalized = await canonicalizeDocument(credential);
|
|
450
|
+
const hash = sha256(Buffer.from(canonicalized, 'utf8'));
|
|
451
|
+
return bytesToHex(hash);
|
|
452
|
+
}
|
|
453
|
+
/**
|
|
454
|
+
* Verify a credential chain by checking all previous credential links
|
|
455
|
+
*
|
|
456
|
+
* @param credentials - Array of credentials in chain order (oldest first)
|
|
457
|
+
* @returns Verification result with chain integrity status
|
|
458
|
+
*/
|
|
459
|
+
async verifyCredentialChain(credentials) {
|
|
460
|
+
const errors = [];
|
|
461
|
+
if (credentials.length === 0) {
|
|
462
|
+
return { valid: true, errors: [], chainLength: 0 };
|
|
463
|
+
}
|
|
464
|
+
// Verify each credential individually
|
|
465
|
+
for (let i = 0; i < credentials.length; i++) {
|
|
466
|
+
const isValid = await this.verifyCredential(credentials[i]);
|
|
467
|
+
if (!isValid) {
|
|
468
|
+
errors.push(`Credential at index ${i} failed verification`);
|
|
469
|
+
}
|
|
470
|
+
}
|
|
471
|
+
// Verify chain links
|
|
472
|
+
for (let i = 1; i < credentials.length; i++) {
|
|
473
|
+
const current = credentials[i];
|
|
474
|
+
const previous = credentials[i - 1];
|
|
475
|
+
const previousCredRef = current.credentialSubject?.previousCredential;
|
|
476
|
+
if (previousCredRef) {
|
|
477
|
+
// Verify ID link
|
|
478
|
+
if (previousCredRef.id && previousCredRef.id !== previous.id) {
|
|
479
|
+
errors.push(`Chain broken at index ${i}: previousCredential.id doesn't match`);
|
|
480
|
+
}
|
|
481
|
+
// Verify hash link
|
|
482
|
+
if (previousCredRef.hash) {
|
|
483
|
+
const expectedHash = await this.computeCredentialHash(previous);
|
|
484
|
+
if (previousCredRef.hash !== expectedHash) {
|
|
485
|
+
errors.push(`Chain broken at index ${i}: previousCredential.hash doesn't match`);
|
|
486
|
+
}
|
|
487
|
+
}
|
|
488
|
+
}
|
|
489
|
+
}
|
|
490
|
+
return {
|
|
491
|
+
valid: errors.length === 0,
|
|
492
|
+
errors,
|
|
493
|
+
chainLength: credentials.length
|
|
494
|
+
};
|
|
495
|
+
}
|
|
496
|
+
// ===== BBS+ Selective Disclosure =====
|
|
497
|
+
/**
|
|
498
|
+
* Prepare a credential for BBS+ selective disclosure
|
|
499
|
+
*
|
|
500
|
+
* This creates a base proof that can later be derived into a proof
|
|
501
|
+
* that selectively discloses only certain fields.
|
|
502
|
+
*
|
|
503
|
+
* Note: This requires BBS+ keys and is primarily used for privacy-preserving
|
|
504
|
+
* credential presentations.
|
|
505
|
+
*
|
|
506
|
+
* @param credential - The credential to prepare
|
|
507
|
+
* @param options - Selective disclosure options
|
|
508
|
+
* @returns The credential with BBS+ base proof metadata
|
|
509
|
+
*/
|
|
510
|
+
async prepareSelectiveDisclosure(credential, options) {
|
|
511
|
+
// Validate mandatory pointers
|
|
512
|
+
if (!options.mandatoryPointers || options.mandatoryPointers.length === 0) {
|
|
513
|
+
throw new Error('At least one mandatory pointer is required for selective disclosure');
|
|
514
|
+
}
|
|
515
|
+
// Validate pointer format (JSON Pointers must start with /)
|
|
516
|
+
for (const pointer of options.mandatoryPointers) {
|
|
517
|
+
if (!pointer.startsWith('/')) {
|
|
518
|
+
throw new Error(`Invalid JSON Pointer: ${pointer} (must start with /)`);
|
|
519
|
+
}
|
|
520
|
+
}
|
|
521
|
+
const selectivePointers = options.selectivePointers || [];
|
|
522
|
+
for (const pointer of selectivePointers) {
|
|
523
|
+
if (!pointer.startsWith('/')) {
|
|
524
|
+
throw new Error(`Invalid JSON Pointer: ${pointer} (must start with /)`);
|
|
525
|
+
}
|
|
526
|
+
}
|
|
527
|
+
// Add selective disclosure metadata to credential
|
|
528
|
+
const enhancedCredential = {
|
|
529
|
+
...credential,
|
|
530
|
+
// Store pointers in credential for later derivation
|
|
531
|
+
// In a full implementation, this would involve creating a BBS+ base proof
|
|
532
|
+
};
|
|
533
|
+
return {
|
|
534
|
+
credential: enhancedCredential,
|
|
535
|
+
mandatoryPointers: options.mandatoryPointers,
|
|
536
|
+
selectivePointers
|
|
537
|
+
};
|
|
538
|
+
}
|
|
539
|
+
/**
|
|
540
|
+
* Create a derived proof with selective disclosure
|
|
541
|
+
*
|
|
542
|
+
* Given a credential with a BBS+ base proof, creates a derived proof
|
|
543
|
+
* that only reveals the specified fields.
|
|
544
|
+
*
|
|
545
|
+
* @param credential - The credential with BBS+ base proof
|
|
546
|
+
* @param fieldsToDisclose - JSON Pointer paths to disclose
|
|
547
|
+
* @param presentationHeader - Optional presentation-specific data
|
|
548
|
+
* @returns The credential with derived proof
|
|
549
|
+
*/
|
|
550
|
+
async deriveSelectiveProof(credential, fieldsToDisclose, presentationHeader) {
|
|
551
|
+
// Validate that all disclosed fields are valid JSON pointers
|
|
552
|
+
for (const field of fieldsToDisclose) {
|
|
553
|
+
if (!field.startsWith('/')) {
|
|
554
|
+
throw new Error(`Invalid JSON Pointer for disclosure: ${field}`);
|
|
555
|
+
}
|
|
556
|
+
}
|
|
557
|
+
// Determine which fields will be hidden
|
|
558
|
+
const allFields = this.extractFieldPaths(credential);
|
|
559
|
+
const disclosedSet = new Set(fieldsToDisclose);
|
|
560
|
+
const hiddenFields = allFields.filter(f => !disclosedSet.has(f));
|
|
561
|
+
// In a full implementation, this would:
|
|
562
|
+
// 1. Parse the base proof
|
|
563
|
+
// 2. Create selective indexes from fieldsToDisclose
|
|
564
|
+
// 3. Generate the derived BBS+ proof
|
|
565
|
+
// For now, we return a structure showing what would be disclosed
|
|
566
|
+
return {
|
|
567
|
+
credential: {
|
|
568
|
+
...credential,
|
|
569
|
+
// A real implementation would have a derived proof here
|
|
570
|
+
},
|
|
571
|
+
disclosedFields: fieldsToDisclose,
|
|
572
|
+
hiddenFields
|
|
573
|
+
};
|
|
574
|
+
}
|
|
575
|
+
/**
|
|
576
|
+
* Extract all field paths from a credential as JSON Pointers
|
|
577
|
+
*/
|
|
578
|
+
extractFieldPaths(obj, prefix = '') {
|
|
579
|
+
const paths = [];
|
|
580
|
+
if (typeof obj !== 'object' || obj === null) {
|
|
581
|
+
return paths;
|
|
582
|
+
}
|
|
583
|
+
for (const [key, value] of Object.entries(obj)) {
|
|
584
|
+
const path = `${prefix}/${key}`;
|
|
585
|
+
paths.push(path);
|
|
586
|
+
if (typeof value === 'object' && value !== null && !Array.isArray(value)) {
|
|
587
|
+
paths.push(...this.extractFieldPaths(value, path));
|
|
588
|
+
}
|
|
589
|
+
}
|
|
590
|
+
return paths;
|
|
591
|
+
}
|
|
592
|
+
/**
|
|
593
|
+
* Get field value from credential using JSON Pointer
|
|
594
|
+
*
|
|
595
|
+
* @param credential - The credential to read from
|
|
596
|
+
* @param pointer - JSON Pointer path (e.g., /credentialSubject/name)
|
|
597
|
+
* @returns The value at the pointer path, or undefined if not found
|
|
598
|
+
*/
|
|
599
|
+
getFieldByPointer(credential, pointer) {
|
|
600
|
+
if (!pointer.startsWith('/')) {
|
|
601
|
+
throw new Error('JSON Pointer must start with /');
|
|
602
|
+
}
|
|
603
|
+
const parts = pointer.slice(1).split('/');
|
|
604
|
+
let current = credential;
|
|
605
|
+
for (const part of parts) {
|
|
606
|
+
if (current === null || current === undefined) {
|
|
607
|
+
return undefined;
|
|
608
|
+
}
|
|
609
|
+
// Handle escaped characters in JSON Pointer
|
|
610
|
+
const unescaped = part.replace(/~1/g, '/').replace(/~0/g, '~');
|
|
611
|
+
current = current[unescaped];
|
|
612
|
+
}
|
|
613
|
+
return current;
|
|
614
|
+
}
|
|
615
|
+
}
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
import { VerifiableCredential, VerifiablePresentation } from '../types';
|
|
2
|
+
import { DIDManager } from '../did/DIDManager';
|
|
3
|
+
export interface IssueOptions {
|
|
4
|
+
proofPurpose: 'assertionMethod' | 'authentication';
|
|
5
|
+
documentLoader?: (iri: string) => Promise<{
|
|
6
|
+
document: any;
|
|
7
|
+
documentUrl: string;
|
|
8
|
+
contextUrl: string | null;
|
|
9
|
+
}>;
|
|
10
|
+
challenge?: string;
|
|
11
|
+
domain?: string;
|
|
12
|
+
}
|
|
13
|
+
export type VerificationMethodLike = {
|
|
14
|
+
id: string;
|
|
15
|
+
controller: string;
|
|
16
|
+
publicKeyMultibase: string;
|
|
17
|
+
secretKeyMultibase?: string;
|
|
18
|
+
type?: 'Multikey' | string;
|
|
19
|
+
};
|
|
20
|
+
export declare class Issuer {
|
|
21
|
+
private didManager;
|
|
22
|
+
private verificationMethod;
|
|
23
|
+
constructor(didManager: DIDManager, verificationMethod: VerificationMethodLike);
|
|
24
|
+
private inferKeyType;
|
|
25
|
+
issueCredential(unsigned: Omit<VerifiableCredential, '@context' | 'proof'>, options: IssueOptions): Promise<VerifiableCredential>;
|
|
26
|
+
issuePresentation(presentation: Omit<VerifiablePresentation, '@context' | 'proof'>, options: IssueOptions): Promise<VerifiablePresentation>;
|
|
27
|
+
}
|