@peac/schema 0.11.2 → 0.12.0-preview.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (49) hide show
  1. package/README.md +64 -3
  2. package/dist/actor-binding.d.ts +148 -0
  3. package/dist/actor-binding.d.ts.map +1 -0
  4. package/dist/dispute.d.ts +4 -4
  5. package/dist/errors.d.ts +2 -1
  6. package/dist/errors.d.ts.map +1 -1
  7. package/dist/extensions/control-action.d.ts +68 -0
  8. package/dist/extensions/control-action.d.ts.map +1 -0
  9. package/dist/extensions/credential-event.d.ts +53 -0
  10. package/dist/extensions/credential-event.d.ts.map +1 -0
  11. package/dist/extensions/fingerprint-ref.d.ts +50 -0
  12. package/dist/extensions/fingerprint-ref.d.ts.map +1 -0
  13. package/dist/extensions/index.d.ts +16 -0
  14. package/dist/extensions/index.d.ts.map +1 -0
  15. package/dist/extensions/tool-registry.d.ts +32 -0
  16. package/dist/extensions/tool-registry.d.ts.map +1 -0
  17. package/dist/extensions/treaty.d.ts +55 -0
  18. package/dist/extensions/treaty.d.ts.map +1 -0
  19. package/dist/index.cjs +883 -5
  20. package/dist/index.cjs.map +1 -1
  21. package/dist/index.d.ts +24 -3
  22. package/dist/index.d.ts.map +1 -1
  23. package/dist/index.mjs +803 -7
  24. package/dist/index.mjs.map +1 -1
  25. package/dist/issuer-config.d.ts +61 -0
  26. package/dist/issuer-config.d.ts.map +1 -0
  27. package/dist/policy-binding.d.ts +24 -0
  28. package/dist/policy-binding.d.ts.map +1 -0
  29. package/dist/receipt-parser.cjs +492 -3
  30. package/dist/receipt-parser.cjs.map +1 -1
  31. package/dist/receipt-parser.d.ts +36 -14
  32. package/dist/receipt-parser.d.ts.map +1 -1
  33. package/dist/receipt-parser.mjs +493 -5
  34. package/dist/receipt-parser.mjs.map +1 -1
  35. package/dist/types.d.ts +17 -0
  36. package/dist/types.d.ts.map +1 -1
  37. package/dist/validators.d.ts +16 -0
  38. package/dist/validators.d.ts.map +1 -1
  39. package/dist/wire-02-envelope.d.ts +152 -0
  40. package/dist/wire-02-envelope.d.ts.map +1 -0
  41. package/dist/wire-02-extensions.d.ts +216 -0
  42. package/dist/wire-02-extensions.d.ts.map +1 -0
  43. package/dist/wire-02-registries.d.ts +21 -0
  44. package/dist/wire-02-registries.d.ts.map +1 -0
  45. package/dist/wire-02-representation.d.ts +49 -0
  46. package/dist/wire-02-representation.d.ts.map +1 -0
  47. package/dist/wire-02-warnings.d.ts +29 -0
  48. package/dist/wire-02-warnings.d.ts.map +1 -0
  49. package/package.json +2 -2
package/dist/index.mjs CHANGED
@@ -1,5 +1,5 @@
1
1
  import * as kernel from '@peac/kernel';
2
- import { ALGORITHMS, HEADERS, POLICY, ISSUER_CONFIG, DISCOVERY, WIRE_TYPE } from '@peac/kernel';
2
+ import { ALGORITHMS, HEADERS, POLICY, ISSUER_CONFIG, DISCOVERY, WIRE_TYPE, TYPE_GRAMMAR, ISS_CANONICAL, POLICY_BLOCK, HASH, OCCURRED_AT_TOLERANCE_SECONDS } from '@peac/kernel';
3
3
  import { z } from 'zod';
4
4
 
5
5
  // src/errors.ts
@@ -34,7 +34,9 @@ var ERROR_CODES = {
34
34
  E_WORKFLOW_SUMMARY_INVALID: "E_WORKFLOW_SUMMARY_INVALID",
35
35
  E_WORKFLOW_CYCLE_DETECTED: "E_WORKFLOW_CYCLE_DETECTED",
36
36
  // Constraint errors (400, DD-121)
37
- E_CONSTRAINT_VIOLATION: "E_CONSTRAINT_VIOLATION"
37
+ E_CONSTRAINT_VIOLATION: "E_CONSTRAINT_VIOLATION",
38
+ // Wire 0.2 extension errors (400, DD-153/DD-156)
39
+ E_INVALID_EXTENSION_KEY: "E_INVALID_EXTENSION_KEY"
38
40
  };
39
41
  function createPEACError(code, category, severity, retryable, options) {
40
42
  return {
@@ -943,11 +945,12 @@ var Extensions = z.object({
943
945
  aipref_snapshot: AIPREFSnapshot.optional()
944
946
  // control block validated via ControlBlockSchema when present
945
947
  }).catchall(z.unknown());
946
- var JWSHeader = z.object({
948
+ var Wire01JWSHeaderSchema = z.object({
947
949
  typ: z.literal(PEAC_WIRE_TYP),
948
950
  alg: z.literal(PEAC_ALG),
949
951
  kid: z.string().min(8)
950
952
  }).strict();
953
+ var JWSHeader = Wire01JWSHeaderSchema;
951
954
  var CanonicalPurposeValues = ["train", "search", "user_action", "inference", "index"];
952
955
  var PurposeReasonValues = [
953
956
  "allowed",
@@ -1135,6 +1138,306 @@ function validateEvidence(evidence, limits) {
1135
1138
  }
1136
1139
  return { ok: true, value: evidence };
1137
1140
  }
1141
+ var PROOF_TYPES = [
1142
+ "ed25519-cert-chain",
1143
+ "eat-passport",
1144
+ "eat-background-check",
1145
+ "sigstore-oidc",
1146
+ "did",
1147
+ "spiffe",
1148
+ "x509-pki",
1149
+ "custom"
1150
+ ];
1151
+ var ProofTypeSchema = z.enum(PROOF_TYPES);
1152
+ function isOriginOnly(value) {
1153
+ try {
1154
+ const url = new URL(value);
1155
+ if (url.protocol !== "https:" && url.protocol !== "http:") {
1156
+ return false;
1157
+ }
1158
+ if (url.pathname !== "/") {
1159
+ return false;
1160
+ }
1161
+ if (url.search !== "") {
1162
+ return false;
1163
+ }
1164
+ if (url.hash !== "" || value.includes("#")) {
1165
+ return false;
1166
+ }
1167
+ if (url.username !== "" || url.password !== "") {
1168
+ return false;
1169
+ }
1170
+ if (url.hostname.endsWith(".")) {
1171
+ return false;
1172
+ }
1173
+ const hostPart = value.replace(/^https?:\/\//, "").split(/[/:]/)[0];
1174
+ if (hostPart.endsWith(".")) {
1175
+ return false;
1176
+ }
1177
+ if (url.hostname.includes("%")) {
1178
+ return false;
1179
+ }
1180
+ return true;
1181
+ } catch {
1182
+ return false;
1183
+ }
1184
+ }
1185
+ var ACTOR_BINDING_EXTENSION_KEY = "org.peacprotocol/actor_binding";
1186
+ var ActorBindingSchema = z.object({
1187
+ /** Stable actor identifier (opaque, no PII) */
1188
+ id: z.string().min(1).max(256),
1189
+ /** Proof type from DD-143 multi-root vocabulary */
1190
+ proof_type: ProofTypeSchema,
1191
+ /** URI or hash of external proof artifact */
1192
+ proof_ref: z.string().max(2048).optional(),
1193
+ /** Origin-only URL: scheme + host + optional port; NO path, query, or fragment */
1194
+ origin: z.string().max(2048).refine(isOriginOnly, {
1195
+ message: "origin must be an origin-only URL (scheme + host + optional port; no path, query, or fragment)"
1196
+ }),
1197
+ /** SHA-256 hash of the intent (hash-first per DD-138) */
1198
+ intent_hash: z.string().regex(/^sha256:[a-f0-9]{64}$/, {
1199
+ message: "intent_hash must match sha256:<64 hex chars>"
1200
+ }).optional()
1201
+ }).strict();
1202
+ var MVISTimeBoundsSchema = z.object({
1203
+ /** Earliest valid time (RFC 3339) */
1204
+ not_before: z.string().datetime(),
1205
+ /** Latest valid time (RFC 3339) */
1206
+ not_after: z.string().datetime()
1207
+ }).strict();
1208
+ var MVISReplayProtectionSchema = z.object({
1209
+ /** Unique token identifier (jti from JWT or equivalent) */
1210
+ jti: z.string().min(1).max(256),
1211
+ /** Optional nonce for additional replay protection */
1212
+ nonce: z.string().max(256).optional()
1213
+ }).strict();
1214
+ var MVISFieldsSchema = z.object({
1215
+ /** Who issued the identity assertion */
1216
+ issuer: z.string().min(1).max(2048),
1217
+ /** Who the identity is about (opaque identifier, no PII) */
1218
+ subject: z.string().min(1).max(256),
1219
+ /** Cryptographic binding: kid or JWK thumbprint */
1220
+ key_binding: z.string().min(1).max(256),
1221
+ /** Validity period */
1222
+ time_bounds: MVISTimeBoundsSchema,
1223
+ /** Replay protection */
1224
+ replay_protection: MVISReplayProtectionSchema
1225
+ }).strict();
1226
+ function validateActorBinding(data) {
1227
+ const result = ActorBindingSchema.safeParse(data);
1228
+ if (result.success) {
1229
+ return { ok: true, value: result.data };
1230
+ }
1231
+ return { ok: false, error: result.error.message };
1232
+ }
1233
+ function validateMVIS(data) {
1234
+ const result = MVISFieldsSchema.safeParse(data);
1235
+ if (!result.success) {
1236
+ return { ok: false, error: result.error.message };
1237
+ }
1238
+ const notBefore = new Date(result.data.time_bounds.not_before).getTime();
1239
+ const notAfter = new Date(result.data.time_bounds.not_after).getTime();
1240
+ if (notBefore >= notAfter) {
1241
+ return { ok: false, error: "not_before must be before not_after" };
1242
+ }
1243
+ const MAX_DURATION_MS = 100 * 365.25 * 24 * 60 * 60 * 1e3;
1244
+ if (notAfter - notBefore > MAX_DURATION_MS) {
1245
+ return { ok: false, error: "time_bounds duration must not exceed 100 years" };
1246
+ }
1247
+ return { ok: true, value: result.data };
1248
+ }
1249
+ var CREDENTIAL_EVENT_EXTENSION_KEY = "org.peacprotocol/credential_event";
1250
+ var CREDENTIAL_EVENTS = ["issued", "leased", "rotated", "revoked", "expired"];
1251
+ var CredentialEventTypeSchema = z.enum(CREDENTIAL_EVENTS);
1252
+ var FINGERPRINT_REF_PATTERN = /^(sha256|hmac-sha256):[a-f0-9]{64}$/;
1253
+ var CredentialRefSchema = z.string().max(256).regex(FINGERPRINT_REF_PATTERN, {
1254
+ message: "credential_ref must be an opaque fingerprint reference: (sha256|hmac-sha256):<64 hex chars>"
1255
+ });
1256
+ var CredentialEventSchema = z.object({
1257
+ /** Lifecycle event type */
1258
+ event: CredentialEventTypeSchema,
1259
+ /** Opaque fingerprint reference of the credential (format validation only) */
1260
+ credential_ref: CredentialRefSchema,
1261
+ /** Authority that performed the action (HTTPS URL) */
1262
+ authority: z.string().url().max(2048).refine((v) => v.startsWith("https://"), {
1263
+ message: "authority must be an HTTPS URL"
1264
+ }),
1265
+ /** When the credential expires (RFC 3339, optional) */
1266
+ expires_at: z.string().datetime().optional(),
1267
+ /** Previous credential reference for rotation chains (optional) */
1268
+ previous_ref: CredentialRefSchema.optional()
1269
+ }).strict();
1270
+ function validateCredentialEvent(data) {
1271
+ const result = CredentialEventSchema.safeParse(data);
1272
+ if (result.success) {
1273
+ return { ok: true, value: result.data };
1274
+ }
1275
+ return { ok: false, error: result.error.message };
1276
+ }
1277
+ var TOOL_REGISTRY_EXTENSION_KEY = "org.peacprotocol/tool_registry";
1278
+ function isAllowedRegistryUri(value) {
1279
+ if (value.startsWith("urn:")) {
1280
+ return true;
1281
+ }
1282
+ try {
1283
+ const url = new URL(value);
1284
+ return url.protocol === "https:";
1285
+ } catch {
1286
+ return false;
1287
+ }
1288
+ }
1289
+ var ToolRegistrySchema = z.object({
1290
+ /** Tool identifier */
1291
+ tool_id: z.string().min(1).max(256),
1292
+ /** Registry URI (HTTPS or URN only; no file:// or data:// for SSRF prevention) */
1293
+ registry_uri: z.string().max(2048).refine(isAllowedRegistryUri, {
1294
+ message: "registry_uri must be an HTTPS URL or URN (file:// and data:// are prohibited)"
1295
+ }),
1296
+ /** Tool version (optional, semver-like) */
1297
+ version: z.string().max(64).optional(),
1298
+ /** Tool capabilities (optional) */
1299
+ capabilities: z.array(z.string().max(64)).max(32).optional()
1300
+ }).strict();
1301
+ function validateToolRegistry(data) {
1302
+ const result = ToolRegistrySchema.safeParse(data);
1303
+ if (result.success) {
1304
+ return { ok: true, value: result.data };
1305
+ }
1306
+ return { ok: false, error: result.error.message };
1307
+ }
1308
+ var CONTROL_ACTION_EXTENSION_KEY = "org.peacprotocol/control_action";
1309
+ var CONTROL_ACTIONS = ["grant", "deny", "escalate", "delegate", "audit"];
1310
+ var ControlActionTypeSchema = z.enum(CONTROL_ACTIONS);
1311
+ var CONTROL_TRIGGERS = [
1312
+ "policy_evaluation",
1313
+ "manual_review",
1314
+ "anomaly_detection",
1315
+ "scheduled",
1316
+ "event_driven"
1317
+ ];
1318
+ var ControlTriggerSchema = z.enum(CONTROL_TRIGGERS);
1319
+ var ControlActionSchema = z.object({
1320
+ /** Action taken */
1321
+ action: ControlActionTypeSchema,
1322
+ /** What triggered the action */
1323
+ trigger: ControlTriggerSchema,
1324
+ /** Resource or scope the action applies to (optional) */
1325
+ resource: z.string().max(2048).optional(),
1326
+ /** Reason for the action (optional, human-readable) */
1327
+ reason: z.string().max(1024).optional(),
1328
+ /** Policy identifier that was evaluated (optional) */
1329
+ policy_ref: z.string().max(2048).optional(),
1330
+ /** When the action was taken (RFC 3339, optional; defaults to receipt iat) */
1331
+ action_at: z.string().datetime().optional()
1332
+ }).strict();
1333
+ function validateControlAction(data) {
1334
+ const result = ControlActionSchema.safeParse(data);
1335
+ if (result.success) {
1336
+ return { ok: true, value: result.data };
1337
+ }
1338
+ return { ok: false, error: result.error.message };
1339
+ }
1340
+ var TREATY_EXTENSION_KEY = "org.peacprotocol/treaty";
1341
+ var COMMITMENT_CLASSES = ["informational", "operational", "financial", "legal"];
1342
+ var CommitmentClassSchema = z.enum(COMMITMENT_CLASSES);
1343
+ var TreatySchema = z.object({
1344
+ /** Commitment level */
1345
+ commitment_class: CommitmentClassSchema,
1346
+ /** URL to full terms document (optional) */
1347
+ terms_ref: z.string().url().max(2048).optional(),
1348
+ /** SHA-256 hash of terms document for integrity verification (optional) */
1349
+ terms_hash: z.string().regex(/^sha256:[a-f0-9]{64}$/, {
1350
+ message: "terms_hash must match sha256:<64 hex chars>"
1351
+ }).optional(),
1352
+ /** Counterparty identifier (optional) */
1353
+ counterparty: z.string().max(256).optional(),
1354
+ /** When the treaty becomes effective (RFC 3339, optional) */
1355
+ effective_at: z.string().datetime().optional(),
1356
+ /** When the treaty expires (RFC 3339, optional) */
1357
+ expires_at: z.string().datetime().optional()
1358
+ }).strict();
1359
+ function validateTreaty(data) {
1360
+ const result = TreatySchema.safeParse(data);
1361
+ if (!result.success) {
1362
+ return { ok: false, error: result.error.message };
1363
+ }
1364
+ if (result.data.effective_at && result.data.expires_at) {
1365
+ const effectiveMs = new Date(result.data.effective_at).getTime();
1366
+ const expiresMs = new Date(result.data.expires_at).getTime();
1367
+ if (effectiveMs > expiresMs) {
1368
+ return { ok: false, error: "effective_at must not be after expires_at" };
1369
+ }
1370
+ }
1371
+ return { ok: true, value: result.data };
1372
+ }
1373
+
1374
+ // src/extensions/fingerprint-ref.ts
1375
+ function hexToBase64url(hex) {
1376
+ const bytes = new Uint8Array(hex.length / 2);
1377
+ for (let i = 0; i < hex.length; i += 2) {
1378
+ bytes[i / 2] = parseInt(hex.substring(i, i + 2), 16);
1379
+ }
1380
+ let base64;
1381
+ if (typeof Buffer !== "undefined") {
1382
+ base64 = Buffer.from(bytes).toString("base64");
1383
+ } else {
1384
+ base64 = btoa(String.fromCharCode(...bytes));
1385
+ }
1386
+ return base64.replace(/\+/g, "-").replace(/\//g, "_").replace(/=+$/, "");
1387
+ }
1388
+ function base64urlToHex(b64url) {
1389
+ let base64 = b64url.replace(/-/g, "+").replace(/_/g, "/");
1390
+ while (base64.length % 4 !== 0) {
1391
+ base64 += "=";
1392
+ }
1393
+ let bytes;
1394
+ if (typeof Buffer !== "undefined") {
1395
+ bytes = Buffer.from(base64, "base64");
1396
+ } else {
1397
+ const binary = atob(base64);
1398
+ bytes = new Uint8Array(binary.length);
1399
+ for (let i = 0; i < binary.length; i++) {
1400
+ bytes[i] = binary.charCodeAt(i);
1401
+ }
1402
+ }
1403
+ return Array.from(bytes).map((b) => b.toString(16).padStart(2, "0")).join("");
1404
+ }
1405
+ var VALID_ALGS = ["sha256", "hmac-sha256"];
1406
+ var STRING_FORM_PATTERN = /^(sha256|hmac-sha256):([a-f0-9]{64})$/;
1407
+ var MAX_FINGERPRINT_REF_LENGTH = 76;
1408
+ var BASE64URL_PATTERN = /^[A-Za-z0-9_-]+$/;
1409
+ function stringToFingerprintRef(s) {
1410
+ if (s.length > MAX_FINGERPRINT_REF_LENGTH) {
1411
+ return null;
1412
+ }
1413
+ const match = STRING_FORM_PATTERN.exec(s);
1414
+ if (!match) {
1415
+ return null;
1416
+ }
1417
+ const alg = match[1];
1418
+ const hex = match[2];
1419
+ return {
1420
+ alg,
1421
+ value: hexToBase64url(hex)
1422
+ };
1423
+ }
1424
+ function fingerprintRefToString(obj) {
1425
+ if (!VALID_ALGS.includes(obj.alg)) {
1426
+ return null;
1427
+ }
1428
+ if (!BASE64URL_PATTERN.test(obj.value)) {
1429
+ return null;
1430
+ }
1431
+ try {
1432
+ const hex = base64urlToHex(obj.value);
1433
+ if (hex.length !== 64) {
1434
+ return null;
1435
+ }
1436
+ return `${obj.alg}:${hex}`;
1437
+ } catch {
1438
+ return null;
1439
+ }
1440
+ }
1138
1441
  var DISPUTE_LIMITS = {
1139
1442
  /** Maximum grounds per dispute */
1140
1443
  maxGrounds: 10,
@@ -2751,15 +3054,404 @@ async function verifyReceiptRefConsistency(carrier) {
2751
3054
  }
2752
3055
  return null;
2753
3056
  }
3057
+ function isValidContentHash(s) {
3058
+ const ref = stringToFingerprintRef(s);
3059
+ if (ref === null) return false;
3060
+ return ref.alg === "sha256";
3061
+ }
3062
+ var MIME_PATTERN = /^[a-zA-Z0-9][a-zA-Z0-9!#$&\-^_.+]*\/[a-zA-Z0-9][a-zA-Z0-9!#$&\-^_.+]*(;\s*[a-zA-Z0-9][a-zA-Z0-9!#$&\-^_.+]*=[^\s;]+)*$/;
3063
+ function isValidMimeType(s) {
3064
+ return MIME_PATTERN.test(s);
3065
+ }
3066
+ var REPRESENTATION_LIMITS = {
3067
+ /** Max content_hash string length (sha256:<64 hex> = 71 chars, capped at FingerprintRef max) */
3068
+ maxContentHashLength: MAX_FINGERPRINT_REF_LENGTH,
3069
+ /** Max content_type string length */
3070
+ maxContentTypeLength: 256
3071
+ };
3072
+ var Wire02RepresentationFieldsSchema = z.object({
3073
+ /**
3074
+ * FingerprintRef of the served content body.
3075
+ * Format: sha256:<64 lowercase hex>
3076
+ * hmac-sha256 is NOT permitted for representation hashes.
3077
+ */
3078
+ content_hash: z.string().max(REPRESENTATION_LIMITS.maxContentHashLength).refine(isValidContentHash, {
3079
+ message: "content_hash must be a valid sha256 FingerprintRef (sha256:<64 lowercase hex>)"
3080
+ }).optional(),
3081
+ /**
3082
+ * MIME type of the served content (e.g., 'text/plain', 'application/json').
3083
+ * Conservative pattern validation: type/subtype with optional parameters.
3084
+ */
3085
+ content_type: z.string().max(REPRESENTATION_LIMITS.maxContentTypeLength).refine(isValidMimeType, {
3086
+ message: "content_type must be a valid MIME type (type/subtype with optional parameters)"
3087
+ }).optional(),
3088
+ /**
3089
+ * Size of the served content in bytes.
3090
+ * Non-negative integer, bounded by Number.MAX_SAFE_INTEGER.
3091
+ */
3092
+ content_length: z.number().int().finite().nonnegative().max(Number.MAX_SAFE_INTEGER).optional()
3093
+ }).strict();
3094
+ var EXTENSION_LIMITS = {
3095
+ // Extension key grammar
3096
+ maxExtensionKeyLength: 512,
3097
+ maxDnsLabelLength: 63,
3098
+ maxDnsDomainLength: 253,
3099
+ // Commerce
3100
+ maxPaymentRailLength: 128,
3101
+ maxCurrencyLength: 16,
3102
+ maxAmountMinorLength: 64,
3103
+ maxReferenceLength: 256,
3104
+ maxAssetLength: 256,
3105
+ // Access
3106
+ maxResourceLength: 2048,
3107
+ maxActionLength: 256,
3108
+ // Challenge
3109
+ maxProblemTypeLength: 2048,
3110
+ maxProblemTitleLength: 256,
3111
+ maxProblemDetailLength: 4096,
3112
+ maxProblemInstanceLength: 2048,
3113
+ // Identity
3114
+ maxProofRefLength: 256,
3115
+ // Correlation
3116
+ maxTraceIdLength: 32,
3117
+ maxSpanIdLength: 16,
3118
+ maxWorkflowIdLength: 256,
3119
+ maxParentJtiLength: 256,
3120
+ maxDependsOnLength: 64
3121
+ };
3122
+ var DNS_LABEL = /^[a-z0-9](?:[a-z0-9-]*[a-z0-9])?$/;
3123
+ var SEGMENT_PATTERN = /^[a-z0-9][a-z0-9_-]*$/;
3124
+ function isValidExtensionKey(key) {
3125
+ if (key.length === 0 || key.length > EXTENSION_LIMITS.maxExtensionKeyLength) return false;
3126
+ const slashIdx = key.indexOf("/");
3127
+ if (slashIdx <= 0) return false;
3128
+ const domain = key.slice(0, slashIdx);
3129
+ const segment = key.slice(slashIdx + 1);
3130
+ if (!domain.includes(".")) return false;
3131
+ if (domain.length > EXTENSION_LIMITS.maxDnsDomainLength) return false;
3132
+ if (segment.length === 0) return false;
3133
+ if (!SEGMENT_PATTERN.test(segment)) return false;
3134
+ const labels = domain.split(".");
3135
+ for (const label of labels) {
3136
+ if (label.length === 0 || label.length > EXTENSION_LIMITS.maxDnsLabelLength) return false;
3137
+ if (!DNS_LABEL.test(label)) return false;
3138
+ }
3139
+ return true;
3140
+ }
3141
+ var COMMERCE_EXTENSION_KEY = "org.peacprotocol/commerce";
3142
+ var ACCESS_EXTENSION_KEY = "org.peacprotocol/access";
3143
+ var CHALLENGE_EXTENSION_KEY = "org.peacprotocol/challenge";
3144
+ var IDENTITY_EXTENSION_KEY = "org.peacprotocol/identity";
3145
+ var CORRELATION_EXTENSION_KEY = "org.peacprotocol/correlation";
3146
+ function escapePointerSegment(s) {
3147
+ return s.replace(/~/g, "~0").replace(/\//g, "~1");
3148
+ }
3149
+ function zodPathToPointer(groupKey, zodPath) {
3150
+ const escaped = escapePointerSegment(groupKey);
3151
+ const segments = zodPath.map((s) => escapePointerSegment(String(s)));
3152
+ return `/extensions/${escaped}` + (segments.length > 0 ? "/" + segments.join("/") : "");
3153
+ }
3154
+ var AMOUNT_MINOR_PATTERN = /^-?[0-9]+$/;
3155
+ var CommerceExtensionSchema = z.object({
3156
+ /** Payment rail identifier (e.g., 'stripe', 'x402', 'lightning') */
3157
+ payment_rail: z.string().min(1).max(EXTENSION_LIMITS.maxPaymentRailLength),
3158
+ /**
3159
+ * Amount in smallest currency unit as a string for arbitrary precision.
3160
+ * Base-10 integer: optional leading minus, one or more digits.
3161
+ * Decimals and empty strings are rejected.
3162
+ */
3163
+ amount_minor: z.string().min(1).max(EXTENSION_LIMITS.maxAmountMinorLength).regex(
3164
+ AMOUNT_MINOR_PATTERN,
3165
+ 'amount_minor must be a base-10 integer string (e.g., "1000", "-50")'
3166
+ ),
3167
+ /** ISO 4217 currency code or asset identifier */
3168
+ currency: z.string().min(1).max(EXTENSION_LIMITS.maxCurrencyLength),
3169
+ /** Caller-assigned payment reference */
3170
+ reference: z.string().max(EXTENSION_LIMITS.maxReferenceLength).optional(),
3171
+ /** Asset identifier for non-fiat (e.g., token address) */
3172
+ asset: z.string().max(EXTENSION_LIMITS.maxAssetLength).optional(),
3173
+ /** Environment discriminant */
3174
+ env: z.enum(["live", "test"]).optional()
3175
+ }).strict();
3176
+ var AccessExtensionSchema = z.object({
3177
+ /** Resource being accessed (URI or identifier) */
3178
+ resource: z.string().min(1).max(EXTENSION_LIMITS.maxResourceLength),
3179
+ /** Action performed on the resource */
3180
+ action: z.string().min(1).max(EXTENSION_LIMITS.maxActionLength),
3181
+ /** Access decision */
3182
+ decision: z.enum(["allow", "deny", "review"])
3183
+ }).strict();
3184
+ var CHALLENGE_TYPES = [
3185
+ "payment_required",
3186
+ "identity_required",
3187
+ "consent_required",
3188
+ "attestation_required",
3189
+ "rate_limited",
3190
+ "purpose_disallowed",
3191
+ "custom"
3192
+ ];
3193
+ var ChallengeTypeSchema = z.enum(CHALLENGE_TYPES);
3194
+ var ProblemDetailsSchema = z.object({
3195
+ /** HTTP status code (100-599) */
3196
+ status: z.number().int().min(100).max(599),
3197
+ /** Problem type URI */
3198
+ type: z.string().min(1).max(EXTENSION_LIMITS.maxProblemTypeLength).url(),
3199
+ /** Short human-readable summary */
3200
+ title: z.string().max(EXTENSION_LIMITS.maxProblemTitleLength).optional(),
3201
+ /** Human-readable explanation specific to this occurrence */
3202
+ detail: z.string().max(EXTENSION_LIMITS.maxProblemDetailLength).optional(),
3203
+ /** URI reference identifying the specific occurrence */
3204
+ instance: z.string().max(EXTENSION_LIMITS.maxProblemInstanceLength).optional()
3205
+ }).passthrough();
3206
+ var ChallengeExtensionSchema = z.object({
3207
+ /** Challenge type (7 values) */
3208
+ challenge_type: ChallengeTypeSchema,
3209
+ /** RFC 9457 Problem Details */
3210
+ problem: ProblemDetailsSchema,
3211
+ /** Resource that triggered the challenge */
3212
+ resource: z.string().max(EXTENSION_LIMITS.maxResourceLength).optional(),
3213
+ /** Action that triggered the challenge */
3214
+ action: z.string().max(EXTENSION_LIMITS.maxActionLength).optional(),
3215
+ /** Caller-defined requirements for resolving the challenge */
3216
+ requirements: z.record(z.string(), z.unknown()).optional()
3217
+ }).strict();
3218
+ var IdentityExtensionSchema = z.object({
3219
+ /** Proof reference (opaque string; no actor_binding: top-level actor is sole location) */
3220
+ proof_ref: z.string().max(EXTENSION_LIMITS.maxProofRefLength).optional()
3221
+ }).strict();
3222
+ var TRACE_ID_PATTERN = /^[0-9a-f]{32}$/;
3223
+ var SPAN_ID_PATTERN = /^[0-9a-f]{16}$/;
3224
+ var CorrelationExtensionSchema = z.object({
3225
+ /** OpenTelemetry-compatible trace ID (32 lowercase hex chars) */
3226
+ trace_id: z.string().length(EXTENSION_LIMITS.maxTraceIdLength).regex(TRACE_ID_PATTERN, "trace_id must be 32 lowercase hex characters").optional(),
3227
+ /** OpenTelemetry-compatible span ID (16 lowercase hex chars) */
3228
+ span_id: z.string().length(EXTENSION_LIMITS.maxSpanIdLength).regex(SPAN_ID_PATTERN, "span_id must be 16 lowercase hex characters").optional(),
3229
+ /** Workflow identifier */
3230
+ workflow_id: z.string().min(1).max(EXTENSION_LIMITS.maxWorkflowIdLength).optional(),
3231
+ /** Parent receipt JTI for causal chains */
3232
+ parent_jti: z.string().min(1).max(EXTENSION_LIMITS.maxParentJtiLength).optional(),
3233
+ /** JTIs this receipt depends on */
3234
+ depends_on: z.array(z.string().min(1).max(EXTENSION_LIMITS.maxParentJtiLength)).max(EXTENSION_LIMITS.maxDependsOnLength).optional()
3235
+ }).strict();
3236
+ var EXTENSION_SCHEMA_MAP = /* @__PURE__ */ new Map();
3237
+ EXTENSION_SCHEMA_MAP.set(COMMERCE_EXTENSION_KEY, CommerceExtensionSchema);
3238
+ EXTENSION_SCHEMA_MAP.set(ACCESS_EXTENSION_KEY, AccessExtensionSchema);
3239
+ EXTENSION_SCHEMA_MAP.set(CHALLENGE_EXTENSION_KEY, ChallengeExtensionSchema);
3240
+ EXTENSION_SCHEMA_MAP.set(IDENTITY_EXTENSION_KEY, IdentityExtensionSchema);
3241
+ EXTENSION_SCHEMA_MAP.set(CORRELATION_EXTENSION_KEY, CorrelationExtensionSchema);
3242
+ function getExtension(extensions, key, schema) {
3243
+ if (extensions === void 0) return void 0;
3244
+ if (!Object.prototype.hasOwnProperty.call(extensions, key)) return void 0;
3245
+ const value = extensions[key];
3246
+ const result = schema.safeParse(value);
3247
+ if (result.success) {
3248
+ return result.data;
3249
+ }
3250
+ const firstIssue = result.error.issues[0];
3251
+ const pointer = zodPathToPointer(key, firstIssue?.path ?? []);
3252
+ throw createPEACError(ERROR_CODES.E_INVALID_ENVELOPE, "validation", "error", false, {
3253
+ http_status: 400,
3254
+ pointer,
3255
+ remediation: `Fix the ${key} extension group value`,
3256
+ details: {
3257
+ message: firstIssue?.message ?? "Invalid extension value",
3258
+ issues: result.error.issues
3259
+ }
3260
+ });
3261
+ }
3262
+ function getCommerceExtension(extensions) {
3263
+ return getExtension(extensions, COMMERCE_EXTENSION_KEY, CommerceExtensionSchema);
3264
+ }
3265
+ function getAccessExtension(extensions) {
3266
+ return getExtension(extensions, ACCESS_EXTENSION_KEY, AccessExtensionSchema);
3267
+ }
3268
+ function getChallengeExtension(extensions) {
3269
+ return getExtension(extensions, CHALLENGE_EXTENSION_KEY, ChallengeExtensionSchema);
3270
+ }
3271
+ function getIdentityExtension(extensions) {
3272
+ return getExtension(extensions, IDENTITY_EXTENSION_KEY, IdentityExtensionSchema);
3273
+ }
3274
+ function getCorrelationExtension(extensions) {
3275
+ return getExtension(extensions, CORRELATION_EXTENSION_KEY, CorrelationExtensionSchema);
3276
+ }
3277
+ function validateKnownExtensions(extensions, ctx) {
3278
+ if (extensions === void 0) return;
3279
+ for (const key of Object.keys(extensions)) {
3280
+ if (!isValidExtensionKey(key)) {
3281
+ ctx.addIssue({
3282
+ code: "custom",
3283
+ message: ERROR_CODES.E_INVALID_EXTENSION_KEY,
3284
+ path: ["extensions", key]
3285
+ });
3286
+ continue;
3287
+ }
3288
+ const schema = EXTENSION_SCHEMA_MAP.get(key);
3289
+ if (schema !== void 0) {
3290
+ const result = schema.safeParse(extensions[key]);
3291
+ if (!result.success) {
3292
+ const firstIssue = result.error.issues[0];
3293
+ const issuePath = firstIssue?.path ?? [];
3294
+ ctx.addIssue({
3295
+ code: "custom",
3296
+ message: firstIssue?.message ?? "Invalid extension value",
3297
+ path: ["extensions", key, ...issuePath]
3298
+ });
3299
+ }
3300
+ }
3301
+ }
3302
+ }
3303
+
3304
+ // src/wire-02-envelope.ts
3305
+ function isSortedAndUnique(arr) {
3306
+ for (let i = 1; i < arr.length; i++) {
3307
+ if (arr[i] <= arr[i - 1]) return false;
3308
+ }
3309
+ return true;
3310
+ }
3311
+ function isCanonicalIss(iss) {
3312
+ if (typeof iss !== "string" || iss.length === 0 || iss.length > ISS_CANONICAL.maxLength) {
3313
+ return false;
3314
+ }
3315
+ if (iss.startsWith("did:")) {
3316
+ return /^did:[a-z0-9]+:[^#?/]+$/.test(iss);
3317
+ }
3318
+ try {
3319
+ const url = new URL(iss);
3320
+ if (url.protocol !== "https:") return false;
3321
+ if (!url.hostname) return false;
3322
+ if (url.username !== "" || url.password !== "") return false;
3323
+ const origin = `${url.protocol}//${url.host}`;
3324
+ return iss === origin;
3325
+ } catch {
3326
+ return false;
3327
+ }
3328
+ }
3329
+ var ABS_URI_PATTERN = /^[a-z][a-z0-9+.-]*:\/\//;
3330
+ function isValidReceiptType(value) {
3331
+ if (value.length === 0 || value.length > TYPE_GRAMMAR.maxLength) return false;
3332
+ if (ABS_URI_PATTERN.test(value)) return true;
3333
+ const slashIdx = value.indexOf("/");
3334
+ if (slashIdx <= 0) return false;
3335
+ const domain = value.slice(0, slashIdx);
3336
+ const segment = value.slice(slashIdx + 1);
3337
+ if (!domain.includes(".")) return false;
3338
+ if (segment.length === 0) return false;
3339
+ if (!/^[a-zA-Z0-9][a-zA-Z0-9.-]*$/.test(domain)) return false;
3340
+ if (!/^[a-zA-Z0-9][a-zA-Z0-9._-]*$/.test(segment)) return false;
3341
+ return true;
3342
+ }
3343
+ var EVIDENCE_PILLARS = [
3344
+ "access",
3345
+ "attribution",
3346
+ "commerce",
3347
+ "compliance",
3348
+ "consent",
3349
+ "identity",
3350
+ "privacy",
3351
+ "provenance",
3352
+ "purpose",
3353
+ "safety"
3354
+ ];
3355
+ var EvidencePillarSchema = z.enum(
3356
+ EVIDENCE_PILLARS
3357
+ );
3358
+ var PillarsSchema = z.array(EvidencePillarSchema).min(1).superRefine((arr, ctx) => {
3359
+ if (!isSortedAndUnique(arr)) {
3360
+ ctx.addIssue({
3361
+ code: "custom",
3362
+ message: "E_PILLARS_NOT_SORTED"
3363
+ });
3364
+ }
3365
+ });
3366
+ var Wire02KindSchema = z.enum(["evidence", "challenge"]);
3367
+ var ReceiptTypeSchema = z.string().max(TYPE_GRAMMAR.maxLength).refine(isValidReceiptType, {
3368
+ message: "type must be reverse-DNS notation (e.g., org.example/flow) or an absolute URI"
3369
+ });
3370
+ var CanonicalIssSchema = z.string().max(ISS_CANONICAL.maxLength).refine(isCanonicalIss, {
3371
+ message: "E_ISS_NOT_CANONICAL"
3372
+ });
3373
+ var PolicyBlockSchema = z.object({
3374
+ /** JCS+SHA-256 digest: 'sha256:<64 lowercase hex>' */
3375
+ digest: z.string().regex(HASH.pattern, "digest must be sha256:<64 lowercase hex>"),
3376
+ /**
3377
+ * HTTPS locator hint for the policy document.
3378
+ * MUST be an https:// URL (max 2048 chars).
3379
+ * MUST NOT trigger auto-fetch; callers use this as a hint only (DD-55).
3380
+ */
3381
+ uri: z.string().max(POLICY_BLOCK.uriMaxLength).url().refine((u) => u.startsWith("https://"), "policy.uri must be an https:// URL").optional(),
3382
+ /** Caller-assigned version label (max 256 chars) */
3383
+ version: z.string().max(POLICY_BLOCK.versionMaxLength).optional()
3384
+ });
3385
+ var Wire02ClaimsSchema = z.object({
3386
+ /** Wire format version discriminant; always '0.2' for Wire 0.2 */
3387
+ peac_version: z.literal("0.2"),
3388
+ /** Structural kind: 'evidence' or 'challenge' */
3389
+ kind: Wire02KindSchema,
3390
+ /** Open semantic type (reverse-DNS or absolute URI) */
3391
+ type: ReceiptTypeSchema,
3392
+ /** Canonical issuer (https:// ASCII origin or did: identifier) */
3393
+ iss: CanonicalIssSchema,
3394
+ /** Issued-at time (Unix seconds). REQUIRED. */
3395
+ iat: z.number().int(),
3396
+ /** Unique receipt identifier; 1 to 256 chars */
3397
+ jti: z.string().min(1).max(256),
3398
+ /** Subject identifier; max 2048 chars */
3399
+ sub: z.string().max(2048).optional(),
3400
+ /** Evidence pillars (closed 10-value taxonomy); sorted ascending, unique */
3401
+ pillars: PillarsSchema.optional(),
3402
+ /** Top-level actor binding (sole location for ActorBinding in Wire 0.2) */
3403
+ actor: ActorBindingSchema.optional(),
3404
+ /** Policy binding block (DD-151) */
3405
+ policy: PolicyBlockSchema.optional(),
3406
+ /** Representation fields (DD-152): FingerprintRef validation, sha256-only, strict */
3407
+ representation: Wire02RepresentationFieldsSchema.optional(),
3408
+ /** ISO 8601 / RFC 3339 timestamp when the interaction occurred; evidence kind only */
3409
+ occurred_at: z.string().datetime({ offset: true }).optional(),
3410
+ /** Declared purpose string; max 256 chars */
3411
+ purpose_declared: z.string().max(256).optional(),
3412
+ /** Extension groups (open; known group keys validated by group schema) */
3413
+ extensions: z.record(z.string(), z.unknown()).optional()
3414
+ }).superRefine((data, ctx) => {
3415
+ if (data.kind === "challenge" && data.occurred_at !== void 0) {
3416
+ ctx.addIssue({
3417
+ code: "custom",
3418
+ message: "E_OCCURRED_AT_ON_CHALLENGE"
3419
+ });
3420
+ }
3421
+ validateKnownExtensions(data.extensions, ctx);
3422
+ }).strict();
3423
+ function checkOccurredAtSkew(occurredAt, iat, now, tolerance = OCCURRED_AT_TOLERANCE_SECONDS) {
3424
+ if (occurredAt === void 0) return null;
3425
+ const ts = Date.parse(occurredAt) / 1e3;
3426
+ if (isNaN(ts)) return null;
3427
+ if (ts > now + tolerance) return "future_error";
3428
+ if (ts > iat) {
3429
+ return {
3430
+ code: "occurred_at_skew",
3431
+ message: "occurred_at is after iat",
3432
+ pointer: "/occurred_at"
3433
+ };
3434
+ }
3435
+ return null;
3436
+ }
2754
3437
 
2755
3438
  // src/receipt-parser.ts
2756
- function classifyReceipt(obj) {
3439
+ function detectWireVersion(obj) {
3440
+ if (obj === null || obj === void 0 || typeof obj !== "object" || Array.isArray(obj)) {
3441
+ return null;
3442
+ }
3443
+ const record = obj;
3444
+ if (record.peac_version === "0.2") return "0.2";
3445
+ if ("peac_version" in record) return null;
3446
+ return "0.1";
3447
+ }
3448
+ function classifyWire01Receipt(obj) {
2757
3449
  if ("amt" in obj || "cur" in obj || "payment" in obj) {
2758
3450
  return "commerce";
2759
3451
  }
2760
3452
  return "attestation";
2761
3453
  }
2762
- function parseReceiptClaims(input, _opts) {
3454
+ function parseReceiptClaims(input, opts) {
2763
3455
  if (input === null || input === void 0 || typeof input !== "object" || Array.isArray(input)) {
2764
3456
  return {
2765
3457
  ok: false,
@@ -2770,7 +3462,37 @@ function parseReceiptClaims(input, _opts) {
2770
3462
  };
2771
3463
  }
2772
3464
  const obj = input;
2773
- const variant = classifyReceipt(obj);
3465
+ const wireVersion = opts?.wireVersion === "0.2" || opts?.wireVersion === "0.1" ? opts.wireVersion : detectWireVersion(obj);
3466
+ if (wireVersion === null) {
3467
+ return {
3468
+ ok: false,
3469
+ error: {
3470
+ code: "E_UNSUPPORTED_WIRE_VERSION",
3471
+ message: `Unsupported or unrecognized peac_version: ${JSON.stringify(obj["peac_version"])}`
3472
+ }
3473
+ };
3474
+ }
3475
+ if (wireVersion === "0.2") {
3476
+ const result2 = Wire02ClaimsSchema.safeParse(obj);
3477
+ if (!result2.success) {
3478
+ return {
3479
+ ok: false,
3480
+ error: {
3481
+ code: "E_INVALID_FORMAT",
3482
+ message: `Wire 0.2 receipt validation failed: ${result2.error.issues.map((i) => i.message).join("; ")}`,
3483
+ issues: result2.error.issues
3484
+ }
3485
+ };
3486
+ }
3487
+ return {
3488
+ ok: true,
3489
+ variant: "wire-02",
3490
+ wireVersion: "0.2",
3491
+ warnings: [],
3492
+ claims: result2.data
3493
+ };
3494
+ }
3495
+ const variant = classifyWire01Receipt(obj);
2774
3496
  if (variant === "commerce") {
2775
3497
  const result2 = ReceiptClaimsSchema.safeParse(obj);
2776
3498
  if (!result2.success) {
@@ -2786,6 +3508,8 @@ function parseReceiptClaims(input, _opts) {
2786
3508
  return {
2787
3509
  ok: true,
2788
3510
  variant: "commerce",
3511
+ wireVersion: "0.1",
3512
+ warnings: [],
2789
3513
  claims: result2.data
2790
3514
  };
2791
3515
  }
@@ -2803,10 +3527,82 @@ function parseReceiptClaims(input, _opts) {
2803
3527
  return {
2804
3528
  ok: true,
2805
3529
  variant: "attestation",
3530
+ wireVersion: "0.1",
3531
+ warnings: [],
2806
3532
  claims: result.data
2807
3533
  };
2808
3534
  }
2809
3535
 
2810
- export { AGENT_IDENTITY_TYPE, AIPREFSnapshot as AIPREFSnapshotSchema, ATTESTATION_LIMITS, ATTESTATION_RECEIPT_TYPE, ATTRIBUTION_LIMITS, ATTRIBUTION_TYPE, ATTRIBUTION_USAGES, AgentIdentityAttestationSchema, AgentIdentityEvidenceSchema, AgentIdentityVerifiedSchema, AgentProofSchema, AttestationExtensionsSchema, AttestationReceiptClaimsSchema, AttestationSchema, AttributionAttestationSchema, AttributionEvidenceSchema, AttributionSourceSchema, AttributionUsageSchema, BindingDetailsSchema, CANONICAL_DIGEST_ALGS, CANONICAL_PURPOSES, CARRIER_TRANSPORT_LIMITS, CONTRIBUTION_TYPES, CONTROL_TYPES, CREDIT_METHODS, CanonicalPurposeSchema, CarrierFormatSchema, CarrierMetaSchema, CompactJwsSchema, ContactMethodSchema, ContentHashSchema, ContributionObligationSchema, ContributionTypeSchema, ControlBlockSchema, ControlDecisionSchema, ControlLicensingModeSchema, ControlPurposeSchema, ControlStepSchema, ControlTypeSchema, CreditMethodSchema, CreditObligationSchema, DERIVATION_TYPES, DIGEST_SIZE_CONSTANTS, DIGEST_VALUE_PATTERN, DISPUTE_GROUNDS_CODES, DISPUTE_LIMITS, DISPUTE_OUTCOMES, DISPUTE_STATES, DISPUTE_TARGET_TYPES, DISPUTE_TRANSITIONS, DISPUTE_TYPE, DISPUTE_TYPES, DerivationTypeSchema, DigestAlgSchema, DigestSchema, DisputeAttestationSchema, DisputeContactSchema, DisputeEvidenceSchema, DisputeGroundsCodeSchema, DisputeGroundsSchema, DisputeIdSchema, DisputeOutcomeSchema, DisputeResolutionSchema, DisputeStateSchema, DisputeTargetTypeSchema, DisputeTypeSchema, DocumentRefSchema, ERROR_CATEGORIES_CANONICAL, ERROR_CODES, EXTENSION_KEY_PATTERN, ExecutorSchema, Extensions, ExtensionsSchema, HashAlgorithmSchema, HashEncodingSchema, INTERACTION_EXTENSION_KEY, INTERACTION_LIMITS, INTERNAL_PURPOSE_UNDECLARED, IdentityBindingSchema, InteractionEvidenceV01Schema, JSON_EVIDENCE_LIMITS, JWSHeader, JsonArraySchema, JsonObjectSchema, JsonPrimitiveSchema, JsonValueSchema, KERNEL_CONSTRAINTS, KIND_FORMAT_PATTERN, KindSchema, MAX_PURPOSE_TOKENS_PER_REQUEST, MAX_PURPOSE_TOKEN_LENGTH, MIDDLEWARE_INTERACTION_KEY, MinimalInteractionBindingSchema, NormalizedPayment, OBLIGATIONS_EXTENSION_KEY, ORCHESTRATION_FRAMEWORKS, ObligationsExtensionSchema, OrchestrationFrameworkSchema, PEAC_ALG, PEAC_DISCOVERY_MAX_BYTES, PEAC_DISCOVERY_PATH, PEAC_ISSUER_CONFIG_MAX_BYTES, PEAC_ISSUER_CONFIG_PATH, PEAC_ISSUER_CONFIG_VERSION, PEAC_POLICY_FALLBACK_PATH, PEAC_POLICY_MAX_BYTES, PEAC_POLICY_PATH, PEAC_PURPOSE_APPLIED_HEADER, PEAC_PURPOSE_HEADER, PEAC_PURPOSE_REASON_HEADER, PEAC_RECEIPT_HEADER, PEAC_RECEIPT_SCHEMA_URL, PEAC_WIRE_TYP, POLICY_DECISIONS, PROOF_METHODS, PURPOSE_REASONS, PURPOSE_TOKEN_REGEX, PayloadRefSchema, PaymentEvidenceSchema, PaymentRoutingSchema, PaymentSplitSchema, PeacEvidenceCarrierSchema, PolicyContextSchema, ProofMethodSchema, PurposeReasonSchema, PurposeTokenSchema, REDACTION_MODES, REMEDIATION_TYPES, RESERVED_KIND_PREFIXES, RESULT_STATUSES, ReceiptClaims, ReceiptClaimsSchema, ReceiptRefSchema2 as ReceiptRefSchema, ReceiptUrlSchema, RefsSchema, RemediationSchema, RemediationTypeSchema, ResourceTargetSchema, ResultSchema, STEP_ID_PATTERN, StepIdSchema, SubjectProfileSchema, SubjectProfileSnapshotSchema, Subject as SubjectSchema, SubjectTypeSchema, TERMINAL_STATES, ToolTargetSchema, VerifyRequest as VerifyRequestSchema, WELL_KNOWN_KINDS, WORKFLOW_EXTENSION_KEY, WORKFLOW_ID_PATTERN, WORKFLOW_LIMITS, WORKFLOW_STATUSES, WORKFLOW_SUMMARY_TYPE, WorkflowContextSchema, WorkflowErrorContextSchema, WorkflowIdSchema, WorkflowStatusSchema, WorkflowSummaryAttestationSchema, WorkflowSummaryEvidenceSchema, assertJsonSafeIterative, canTransitionTo, computeReceiptRef, computeTotalWeight, createAgentIdentityAttestation, createAttestationReceiptClaims, createAttributionAttestation, createConstraintViolationError, createContributionObligation, createCreditObligation, createDisputeAttestation, createEvidenceNotJsonError, createInteractionEvidence, createObligationsExtension, createPEACError, createReceiptView, createStepId, createWorkflowContext, createWorkflowContextInvalidError, createWorkflowDagInvalidError, createWorkflowId, createWorkflowSummaryAttestation, deriveKnownPurposes, detectCycleInSources, determinePurposeReason, extractObligationsExtension, getInteraction, getValidTransitions, hasInteraction, hasUnknownPurposeTokens, hasValidDagSemantics, isAgentIdentityAttestation, isAttestationExpired, isAttestationNotYetValid, isAttestationOnly, isAttestationReceiptClaims, isAttributionAttestation, isAttributionExpired, isAttributionNotYetValid, isCanonicalPurpose, isContributionRequired, isCreditRequired, isDigestTruncated, isDisputeAttestation, isDisputeExpired, isDisputeNotYetValid, isLegacyPurpose, isMinimalInteractionBinding, isPaymentReceipt, isReservedKindPrefix, isTerminalState, isTerminalWorkflowStatus, isUndeclaredPurpose, isValidDisputeAttestation, isValidInteractionEvidence, isValidPurposeReason, isValidPurposeToken, isValidWorkflowContext, isWellKnownKind, isWorkflowSummaryAttestation, mapLegacyToCanonical, normalizePurposeToken, normalizeToCanonicalOrPreserve, parsePurposeHeader, parseReceiptClaims, setInteraction, toCoreClaims, transitionDisputeState, validateAgentIdentityAttestation, validateAttestationReceiptClaims, validateAttributionAttestation, validateAttributionSource, validateCarrierConstraints, validateContentHash, validateContributionObligation, validateCreditObligation, validateDisputeAttestation, validateDisputeContact, validateDisputeResolution, validateEvidence, validateIdentityBinding, validateInteraction, validateInteractionEvidence, validateInteractionOrdered, validateKernelConstraints, validateMinimalInteractionBinding, validateObligationsExtension, validatePurposeTokens, validateSubjectSnapshot, validateWorkflowContext, validateWorkflowContextOrdered, validateWorkflowSummaryAttestation, verifyReceiptRefConsistency };
3536
+ // src/wire-02-warnings.ts
3537
+ var WARNING_TYPE_UNREGISTERED = "type_unregistered";
3538
+ var WARNING_UNKNOWN_EXTENSION = "unknown_extension_preserved";
3539
+ var WARNING_OCCURRED_AT_SKEW = "occurred_at_skew";
3540
+ var WARNING_TYP_MISSING = "typ_missing";
3541
+ function sortWarnings(warnings) {
3542
+ return [...warnings].sort((a, b) => {
3543
+ const aHasPtr = a.pointer !== void 0;
3544
+ const bHasPtr = b.pointer !== void 0;
3545
+ if (!aHasPtr && bHasPtr) return -1;
3546
+ if (aHasPtr && !bHasPtr) return 1;
3547
+ if (aHasPtr && bHasPtr) {
3548
+ const cmp = a.pointer.localeCompare(b.pointer);
3549
+ if (cmp !== 0) return cmp;
3550
+ }
3551
+ return a.code.localeCompare(b.code);
3552
+ });
3553
+ }
3554
+
3555
+ // src/wire-02-registries.ts
3556
+ var REGISTERED_RECEIPT_TYPES = /* @__PURE__ */ new Set([
3557
+ "org.peacprotocol/payment",
3558
+ "org.peacprotocol/access-decision",
3559
+ "org.peacprotocol/identity-attestation",
3560
+ "org.peacprotocol/consent-record",
3561
+ "org.peacprotocol/compliance-check",
3562
+ "org.peacprotocol/privacy-signal",
3563
+ "org.peacprotocol/safety-review",
3564
+ "org.peacprotocol/provenance-record",
3565
+ "org.peacprotocol/attribution-event",
3566
+ "org.peacprotocol/purpose-declaration"
3567
+ ]);
3568
+ var REGISTERED_EXTENSION_GROUP_KEYS = /* @__PURE__ */ new Set([
3569
+ "org.peacprotocol/commerce",
3570
+ "org.peacprotocol/access",
3571
+ "org.peacprotocol/challenge",
3572
+ "org.peacprotocol/identity",
3573
+ "org.peacprotocol/correlation"
3574
+ ]);
3575
+
3576
+ // src/policy-binding.ts
3577
+ function verifyPolicyBinding(receiptDigest, localDigest) {
3578
+ return receiptDigest === localDigest ? "verified" : "failed";
3579
+ }
3580
+ var REVOCATION_REASONS = [
3581
+ "key_compromise",
3582
+ "superseded",
3583
+ "cessation_of_operation",
3584
+ "privilege_withdrawn"
3585
+ ];
3586
+ var RevokedKeyEntrySchema = z.object({
3587
+ /** Key ID that was revoked */
3588
+ kid: z.string().min(1).max(256),
3589
+ /** ISO 8601 timestamp of revocation */
3590
+ revoked_at: z.string().datetime(),
3591
+ /** Revocation reason (optional, RFC 5280 CRLReason subset) */
3592
+ reason: z.enum(REVOCATION_REASONS).optional()
3593
+ }).strict();
3594
+ var RevokedKeysArraySchema = z.array(RevokedKeyEntrySchema).max(100);
3595
+ function validateRevokedKeys(data) {
3596
+ const result = RevokedKeysArraySchema.safeParse(data);
3597
+ if (result.success) {
3598
+ return { ok: true, value: result.data };
3599
+ }
3600
+ return { ok: false, error: result.error.issues.map((i) => i.message).join("; ") };
3601
+ }
3602
+ function findRevokedKey(revokedKeys, kid) {
3603
+ return revokedKeys.find((entry) => entry.kid === kid) ?? null;
3604
+ }
3605
+
3606
+ export { ACCESS_EXTENSION_KEY, ACTOR_BINDING_EXTENSION_KEY, AGENT_IDENTITY_TYPE, AIPREFSnapshot as AIPREFSnapshotSchema, ATTESTATION_LIMITS, ATTESTATION_RECEIPT_TYPE, ATTRIBUTION_LIMITS, ATTRIBUTION_TYPE, ATTRIBUTION_USAGES, AccessExtensionSchema, ActorBindingSchema, AgentIdentityAttestationSchema, AgentIdentityEvidenceSchema, AgentIdentityVerifiedSchema, AgentProofSchema, AttestationExtensionsSchema, AttestationReceiptClaimsSchema, AttestationSchema, AttributionAttestationSchema, AttributionEvidenceSchema, AttributionSourceSchema, AttributionUsageSchema, BindingDetailsSchema, CANONICAL_DIGEST_ALGS, CANONICAL_PURPOSES, CARRIER_TRANSPORT_LIMITS, CHALLENGE_EXTENSION_KEY, CHALLENGE_TYPES, COMMERCE_EXTENSION_KEY, COMMITMENT_CLASSES, CONTRIBUTION_TYPES, CONTROL_ACTIONS, CONTROL_ACTION_EXTENSION_KEY, CONTROL_TRIGGERS, CONTROL_TYPES, CORRELATION_EXTENSION_KEY, CREDENTIAL_EVENTS, CREDENTIAL_EVENT_EXTENSION_KEY, CREDIT_METHODS, CanonicalIssSchema, CanonicalPurposeSchema, CarrierFormatSchema, CarrierMetaSchema, ChallengeExtensionSchema, ChallengeTypeSchema, CommerceExtensionSchema, CommitmentClassSchema, CompactJwsSchema, ContactMethodSchema, ContentHashSchema, ContributionObligationSchema, ContributionTypeSchema, ControlActionSchema, ControlActionTypeSchema, ControlBlockSchema, ControlDecisionSchema, ControlLicensingModeSchema, ControlPurposeSchema, ControlStepSchema, ControlTriggerSchema, ControlTypeSchema, CorrelationExtensionSchema, CredentialEventSchema, CredentialEventTypeSchema, CredentialRefSchema, CreditMethodSchema, CreditObligationSchema, DERIVATION_TYPES, DIGEST_SIZE_CONSTANTS, DIGEST_VALUE_PATTERN, DISPUTE_GROUNDS_CODES, DISPUTE_LIMITS, DISPUTE_OUTCOMES, DISPUTE_STATES, DISPUTE_TARGET_TYPES, DISPUTE_TRANSITIONS, DISPUTE_TYPE, DISPUTE_TYPES, DerivationTypeSchema, DigestAlgSchema, DigestSchema, DisputeAttestationSchema, DisputeContactSchema, DisputeEvidenceSchema, DisputeGroundsCodeSchema, DisputeGroundsSchema, DisputeIdSchema, DisputeOutcomeSchema, DisputeResolutionSchema, DisputeStateSchema, DisputeTargetTypeSchema, DisputeTypeSchema, DocumentRefSchema, ERROR_CATEGORIES_CANONICAL, ERROR_CODES, EXTENSION_KEY_PATTERN, EXTENSION_LIMITS, EvidencePillarSchema, ExecutorSchema, Extensions, ExtensionsSchema, HashAlgorithmSchema, HashEncodingSchema, IDENTITY_EXTENSION_KEY, INTERACTION_EXTENSION_KEY, INTERACTION_LIMITS, INTERNAL_PURPOSE_UNDECLARED, IdentityBindingSchema, IdentityExtensionSchema, InteractionEvidenceV01Schema, JSON_EVIDENCE_LIMITS, JWSHeader, JsonArraySchema, JsonObjectSchema, JsonPrimitiveSchema, JsonValueSchema, KERNEL_CONSTRAINTS, KIND_FORMAT_PATTERN, KindSchema, MAX_PURPOSE_TOKENS_PER_REQUEST, MAX_PURPOSE_TOKEN_LENGTH, MIDDLEWARE_INTERACTION_KEY, MVISFieldsSchema, MVISReplayProtectionSchema, MVISTimeBoundsSchema, MinimalInteractionBindingSchema, NormalizedPayment, OBLIGATIONS_EXTENSION_KEY, ORCHESTRATION_FRAMEWORKS, ObligationsExtensionSchema, OrchestrationFrameworkSchema, PEAC_ALG, PEAC_DISCOVERY_MAX_BYTES, PEAC_DISCOVERY_PATH, PEAC_ISSUER_CONFIG_MAX_BYTES, PEAC_ISSUER_CONFIG_PATH, PEAC_ISSUER_CONFIG_VERSION, PEAC_POLICY_FALLBACK_PATH, PEAC_POLICY_MAX_BYTES, PEAC_POLICY_PATH, PEAC_PURPOSE_APPLIED_HEADER, PEAC_PURPOSE_HEADER, PEAC_PURPOSE_REASON_HEADER, PEAC_RECEIPT_HEADER, PEAC_RECEIPT_SCHEMA_URL, PEAC_WIRE_TYP, POLICY_DECISIONS, PROOF_METHODS, PROOF_TYPES, PURPOSE_REASONS, PURPOSE_TOKEN_REGEX, PayloadRefSchema, PaymentEvidenceSchema, PaymentRoutingSchema, PaymentSplitSchema, PeacEvidenceCarrierSchema, PillarsSchema, PolicyBlockSchema, PolicyContextSchema, ProblemDetailsSchema, ProofMethodSchema, ProofTypeSchema, PurposeReasonSchema, PurposeTokenSchema, REDACTION_MODES, REGISTERED_EXTENSION_GROUP_KEYS, REGISTERED_RECEIPT_TYPES, REMEDIATION_TYPES, REPRESENTATION_LIMITS, RESERVED_KIND_PREFIXES, RESULT_STATUSES, REVOCATION_REASONS, ReceiptClaims, ReceiptClaimsSchema, ReceiptRefSchema2 as ReceiptRefSchema, ReceiptTypeSchema, ReceiptUrlSchema, RefsSchema, RemediationSchema, RemediationTypeSchema, Wire02RepresentationFieldsSchema as RepresentationFieldsSchema, ResourceTargetSchema, ResultSchema, RevokedKeyEntrySchema, RevokedKeysArraySchema, STEP_ID_PATTERN, StepIdSchema, SubjectProfileSchema, SubjectProfileSnapshotSchema, Subject as SubjectSchema, SubjectTypeSchema, TERMINAL_STATES, TOOL_REGISTRY_EXTENSION_KEY, TREATY_EXTENSION_KEY, ToolRegistrySchema, ToolTargetSchema, TreatySchema, VerifyRequest as VerifyRequestSchema, WARNING_OCCURRED_AT_SKEW, WARNING_TYPE_UNREGISTERED, WARNING_TYP_MISSING, WARNING_UNKNOWN_EXTENSION, WELL_KNOWN_KINDS, WORKFLOW_EXTENSION_KEY, WORKFLOW_ID_PATTERN, WORKFLOW_LIMITS, WORKFLOW_STATUSES, WORKFLOW_SUMMARY_TYPE, Wire01JWSHeaderSchema, Wire02ClaimsSchema, Wire02KindSchema, Wire02RepresentationFieldsSchema, WorkflowContextSchema, WorkflowErrorContextSchema, WorkflowIdSchema, WorkflowStatusSchema, WorkflowSummaryAttestationSchema, WorkflowSummaryEvidenceSchema, assertJsonSafeIterative, canTransitionTo, checkOccurredAtSkew, computeReceiptRef, computeTotalWeight, createAgentIdentityAttestation, createAttestationReceiptClaims, createAttributionAttestation, createConstraintViolationError, createContributionObligation, createCreditObligation, createDisputeAttestation, createEvidenceNotJsonError, createInteractionEvidence, createObligationsExtension, createPEACError, createReceiptView, createStepId, createWorkflowContext, createWorkflowContextInvalidError, createWorkflowDagInvalidError, createWorkflowId, createWorkflowSummaryAttestation, deriveKnownPurposes, detectCycleInSources, detectWireVersion, determinePurposeReason, extractObligationsExtension, findRevokedKey, fingerprintRefToString, getAccessExtension, getChallengeExtension, getCommerceExtension, getCorrelationExtension, getIdentityExtension, getInteraction, getValidTransitions, hasInteraction, hasUnknownPurposeTokens, hasValidDagSemantics, isAgentIdentityAttestation, isAttestationExpired, isAttestationNotYetValid, isAttestationOnly, isAttestationReceiptClaims, isAttributionAttestation, isAttributionExpired, isAttributionNotYetValid, isCanonicalIss, isCanonicalPurpose, isContributionRequired, isCreditRequired, isDigestTruncated, isDisputeAttestation, isDisputeExpired, isDisputeNotYetValid, isLegacyPurpose, isMinimalInteractionBinding, isOriginOnly, isPaymentReceipt, isReservedKindPrefix, isTerminalState, isTerminalWorkflowStatus, isUndeclaredPurpose, isValidDisputeAttestation, isValidExtensionKey, isValidInteractionEvidence, isValidPurposeReason, isValidPurposeToken, isValidReceiptType, isValidWorkflowContext, isWellKnownKind, isWorkflowSummaryAttestation, mapLegacyToCanonical, normalizePurposeToken, normalizeToCanonicalOrPreserve, parsePurposeHeader, parseReceiptClaims, setInteraction, sortWarnings, stringToFingerprintRef, toCoreClaims, transitionDisputeState, validateActorBinding, validateAgentIdentityAttestation, validateAttestationReceiptClaims, validateAttributionAttestation, validateAttributionSource, validateCarrierConstraints, validateContentHash, validateContributionObligation, validateControlAction, validateCredentialEvent, validateCreditObligation, validateDisputeAttestation, validateDisputeContact, validateDisputeResolution, validateEvidence, validateIdentityBinding, validateInteraction, validateInteractionEvidence, validateInteractionOrdered, validateKernelConstraints, validateKnownExtensions, validateMVIS, validateMinimalInteractionBinding, validateObligationsExtension, validatePurposeTokens, validateRevokedKeys, validateSubjectSnapshot, validateToolRegistry, validateTreaty, validateWorkflowContext, validateWorkflowContextOrdered, validateWorkflowSummaryAttestation, verifyPolicyBinding, verifyReceiptRefConsistency };
2811
3607
  //# sourceMappingURL=index.mjs.map
2812
3608
  //# sourceMappingURL=index.mjs.map