@sphereon/did-provider-oyd 0.28.1-feature.oyd.cmsm.improv.21 → 0.28.1-next.53
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +10 -10
- package/dist/index.cjs +356 -0
- package/dist/index.cjs.map +1 -0
- package/dist/index.d.cts +111 -0
- package/dist/index.d.ts +108 -7
- package/dist/index.js +323 -27
- package/dist/index.js.map +1 -1
- package/package.json +26 -18
- package/src/index.ts +2 -2
- package/src/oyd-did-provider.ts +14 -7
- package/src/types/oyd-provider-types.ts +17 -18
- package/dist/index.d.ts.map +0 -1
- package/dist/oyd-did-provider.d.ts +0 -61
- package/dist/oyd-did-provider.d.ts.map +0 -1
- package/dist/oyd-did-provider.js +0 -313
- package/dist/oyd-did-provider.js.map +0 -1
- package/dist/resolver.d.ts +0 -10
- package/dist/resolver.d.ts.map +0 -1
- package/dist/resolver.js +0 -44
- package/dist/resolver.js.map +0 -1
- package/dist/tsdoc-metadata.json +0 -11
- package/dist/types/oyd-provider-types.d.ts +0 -42
- package/dist/types/oyd-provider-types.d.ts.map +0 -1
- package/dist/types/oyd-provider-types.js +0 -11
- package/dist/types/oyd-provider-types.js.map +0 -1
package/README.md
CHANGED
|
@@ -24,17 +24,17 @@ const DID_METHOD = 'did:oyd'
|
|
|
24
24
|
const oydDIDProvider = new OydDIDProvider({
|
|
25
25
|
defaultKms: 'mem',
|
|
26
26
|
clientManagedSecretMode: {
|
|
27
|
-
publicKeyCallback: some_function,
|
|
28
|
-
signCallback: some_function
|
|
29
|
-
}
|
|
30
|
-
})
|
|
27
|
+
publicKeyCallback: some_function, // callback to provide public Key
|
|
28
|
+
signCallback: some_function, // callback for signing payload
|
|
29
|
+
},
|
|
30
|
+
})
|
|
31
31
|
|
|
32
32
|
const agent = createAgent<IKeyManager, DIDManager>({
|
|
33
33
|
plugins: [
|
|
34
34
|
new SphereonKeyManager({
|
|
35
35
|
store: new MemoryKeyStore(),
|
|
36
36
|
kms: {
|
|
37
|
-
mem: new SphereonKeyManagementSystem(new MemoryPrivateKeyStore())
|
|
37
|
+
mem: new SphereonKeyManagementSystem(new MemoryPrivateKeyStore()),
|
|
38
38
|
},
|
|
39
39
|
}),
|
|
40
40
|
new DIDManager({
|
|
@@ -42,15 +42,14 @@ const agent = createAgent<IKeyManager, DIDManager>({
|
|
|
42
42
|
[DID_METHOD]: oydDIDProvider,
|
|
43
43
|
},
|
|
44
44
|
defaultProvider: DID_METHOD,
|
|
45
|
-
store: new MemoryDIDStore()
|
|
45
|
+
store: new MemoryDIDStore(),
|
|
46
46
|
}),
|
|
47
47
|
],
|
|
48
|
-
})
|
|
48
|
+
})
|
|
49
49
|
|
|
50
|
-
const identifier: IIdentifier = await agent.didManagerCreate()
|
|
50
|
+
const identifier: IIdentifier = await agent.didManagerCreate()
|
|
51
51
|
```
|
|
52
52
|
|
|
53
|
-
|
|
54
53
|
### Resolving a DID
|
|
55
54
|
|
|
56
55
|
The example below resolves a did:oyd to DIDResolutionResult.
|
|
@@ -72,4 +71,5 @@ yarn build
|
|
|
72
71
|
```
|
|
73
72
|
|
|
74
73
|
## REST API Endpoints for `did:oyd`
|
|
75
|
-
|
|
74
|
+
|
|
75
|
+
For managing did:oyd DIDs (create, update, delete), refer to the following page, which provides detailed information on the available REST API endpoints: https://github.com/OwnYourData/oydid/tree/main/uni-registrar-driver-did-oyd
|
package/dist/index.cjs
ADDED
|
@@ -0,0 +1,356 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __create = Object.create;
|
|
3
|
+
var __defProp = Object.defineProperty;
|
|
4
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
5
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
6
|
+
var __getProtoOf = Object.getPrototypeOf;
|
|
7
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
8
|
+
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
|
9
|
+
var __export = (target, all) => {
|
|
10
|
+
for (var name in all)
|
|
11
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
12
|
+
};
|
|
13
|
+
var __copyProps = (to, from, except, desc) => {
|
|
14
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
15
|
+
for (let key of __getOwnPropNames(from))
|
|
16
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
17
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
18
|
+
}
|
|
19
|
+
return to;
|
|
20
|
+
};
|
|
21
|
+
var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
|
|
22
|
+
// If the importer is in node compatibility mode or this is not an ESM
|
|
23
|
+
// file that has been converted to a CommonJS file using a Babel-
|
|
24
|
+
// compatible transform (i.e. "__esModule" has not been set), then set
|
|
25
|
+
// "default" to the CommonJS "module.exports" for node compatibility.
|
|
26
|
+
isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
|
|
27
|
+
mod
|
|
28
|
+
));
|
|
29
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
30
|
+
|
|
31
|
+
// src/index.ts
|
|
32
|
+
var index_exports = {};
|
|
33
|
+
__export(index_exports, {
|
|
34
|
+
DefaultOydCmsmCallbacks: () => DefaultOydCmsmCallbacks,
|
|
35
|
+
OydDIDProvider: () => OydDIDProvider,
|
|
36
|
+
defaultOydCmsmPublicKeyCallback: () => defaultOydCmsmPublicKeyCallback,
|
|
37
|
+
defaultOydCmsmSignCallback: () => defaultOydCmsmSignCallback,
|
|
38
|
+
getDidOydResolver: () => getDidOydResolver
|
|
39
|
+
});
|
|
40
|
+
module.exports = __toCommonJS(index_exports);
|
|
41
|
+
|
|
42
|
+
// src/oyd-did-provider.ts
|
|
43
|
+
var import_ssi_sdk_ext = require("@sphereon/ssi-sdk-ext.key-utils");
|
|
44
|
+
var import_did_manager = require("@veramo/did-manager");
|
|
45
|
+
var import_cross_fetch = __toESM(require("cross-fetch"), 1);
|
|
46
|
+
var import_multibase = __toESM(require("multibase"), 1);
|
|
47
|
+
var import_multicodec = __toESM(require("multicodec"), 1);
|
|
48
|
+
var u8a = __toESM(require("uint8arrays"), 1);
|
|
49
|
+
var import_debug = __toESM(require("debug"), 1);
|
|
50
|
+
var debug = (0, import_debug.default)("veramo:oyd-did:identifier-provider");
|
|
51
|
+
var OYDID_REGISTRAR_URL = "https://oydid-registrar.data-container.net/1.0/createIdentifier";
|
|
52
|
+
var OydDIDProvider = class extends import_did_manager.AbstractIdentifierProvider {
|
|
53
|
+
static {
|
|
54
|
+
__name(this, "OydDIDProvider");
|
|
55
|
+
}
|
|
56
|
+
defaultKms;
|
|
57
|
+
cmsmCallbackOpts;
|
|
58
|
+
constructor(options) {
|
|
59
|
+
super();
|
|
60
|
+
this.defaultKms = options?.defaultKms;
|
|
61
|
+
this.cmsmCallbackOpts = options?.clientManagedSecretMode;
|
|
62
|
+
}
|
|
63
|
+
async assertedKms(...kms) {
|
|
64
|
+
if (!kms || kms.length === 0) {
|
|
65
|
+
return Promise.reject(Error("KMS must be provided either as a parameter or via defaultKms."));
|
|
66
|
+
}
|
|
67
|
+
const result = kms.find((k) => !!k);
|
|
68
|
+
if (!result) {
|
|
69
|
+
return Promise.reject(Error("KMS must be provided either as a parameter or via defaultKms."));
|
|
70
|
+
}
|
|
71
|
+
return result;
|
|
72
|
+
}
|
|
73
|
+
async createIdentifier({ kms, alias, options }, context) {
|
|
74
|
+
const resolvedKms = await this.assertedKms(kms, this.defaultKms);
|
|
75
|
+
if (this.cmsmCallbackOpts && !options.cmsm || options.cmsm && options.cmsm.enabled !== false) {
|
|
76
|
+
if (!this.cmsmCallbackOpts) {
|
|
77
|
+
return Promise.reject(Error("did:oyd: no cmsm options defined on oyd did provider, but cmsm was enabled on the call!"));
|
|
78
|
+
}
|
|
79
|
+
return await this.createIdentifierWithCMSM({
|
|
80
|
+
kms: resolvedKms,
|
|
81
|
+
options
|
|
82
|
+
}, context);
|
|
83
|
+
}
|
|
84
|
+
const body = {
|
|
85
|
+
options: {
|
|
86
|
+
cmsm: false,
|
|
87
|
+
key_type: options.type ?? "Secp256r1"
|
|
88
|
+
}
|
|
89
|
+
};
|
|
90
|
+
let didDoc;
|
|
91
|
+
try {
|
|
92
|
+
const response = await (0, import_cross_fetch.default)(OYDID_REGISTRAR_URL, {
|
|
93
|
+
method: "POST",
|
|
94
|
+
headers: {
|
|
95
|
+
"Content-Type": "application/json"
|
|
96
|
+
},
|
|
97
|
+
body: JSON.stringify(body)
|
|
98
|
+
});
|
|
99
|
+
if (!response.ok) {
|
|
100
|
+
debug("Error response from OydDID Registrar: ", response);
|
|
101
|
+
return Promise.reject(Error("Network response was not ok: " + response.statusText));
|
|
102
|
+
}
|
|
103
|
+
didDoc = await response.json();
|
|
104
|
+
} catch (error) {
|
|
105
|
+
debug("Unexpected error from OydDID Registrar: ", error);
|
|
106
|
+
return Promise.reject(Error("There has been a problem with the fetch operation: " + error.toString()));
|
|
107
|
+
}
|
|
108
|
+
const keyType = options?.type ?? "Secp256r1";
|
|
109
|
+
const key = await (0, import_ssi_sdk_ext.importProvidedOrGeneratedKey)({
|
|
110
|
+
kms: resolvedKms,
|
|
111
|
+
alias: alias ?? options.alias ?? options.kid ?? `${didDoc.did}#key-doc`,
|
|
112
|
+
options: {
|
|
113
|
+
key: {
|
|
114
|
+
kid: `${didDoc.did}#key-doc`,
|
|
115
|
+
type: keyType,
|
|
116
|
+
publicKeyHex: didDoc.keys[0].publicKeyHex,
|
|
117
|
+
privateKeyHex: didDoc.keys[0].privateKeyHex
|
|
118
|
+
}
|
|
119
|
+
}
|
|
120
|
+
}, context);
|
|
121
|
+
const identifier = {
|
|
122
|
+
did: didDoc.did,
|
|
123
|
+
controllerKeyId: key.kid,
|
|
124
|
+
keys: [
|
|
125
|
+
key
|
|
126
|
+
],
|
|
127
|
+
services: []
|
|
128
|
+
};
|
|
129
|
+
debug("Created", identifier.did);
|
|
130
|
+
return identifier;
|
|
131
|
+
}
|
|
132
|
+
async createIdentifierWithCMSM({ kms, options }, context) {
|
|
133
|
+
const cmsmCallbackOpts = this.cmsmCallbackOpts;
|
|
134
|
+
if (!cmsmCallbackOpts) {
|
|
135
|
+
return Promise.reject(Error("did:oyd: no cmsm options defined!"));
|
|
136
|
+
}
|
|
137
|
+
const assertedKms = await this.assertedKms(kms, this.defaultKms);
|
|
138
|
+
const pubKey = options.key ?? await cmsmCallbackOpts.publicKeyCallback(options.kid ?? "default", assertedKms, options.cmsm?.create !== false, options.type);
|
|
139
|
+
const kid = pubKey.kid;
|
|
140
|
+
const keyType = pubKey.type;
|
|
141
|
+
const key = base58btc({
|
|
142
|
+
publicKeyHex: pubKey.publicKeyHex,
|
|
143
|
+
keyType
|
|
144
|
+
});
|
|
145
|
+
console.log(`Bae58 pubkey key: ${key}`);
|
|
146
|
+
let signValue;
|
|
147
|
+
try {
|
|
148
|
+
const body_create = {
|
|
149
|
+
// specify the Identifier options for the registrar
|
|
150
|
+
key,
|
|
151
|
+
options: {
|
|
152
|
+
cmsm: true,
|
|
153
|
+
key_type: keyType
|
|
154
|
+
}
|
|
155
|
+
};
|
|
156
|
+
console.log(`Create request:
|
|
157
|
+
${JSON.stringify(body_create, null, 2)}
|
|
158
|
+
`);
|
|
159
|
+
const response = await (0, import_cross_fetch.default)(OYDID_REGISTRAR_URL, {
|
|
160
|
+
method: "POST",
|
|
161
|
+
headers: {
|
|
162
|
+
"Content-Type": "application/json"
|
|
163
|
+
},
|
|
164
|
+
body: JSON.stringify(body_create)
|
|
165
|
+
});
|
|
166
|
+
if (!response.ok) {
|
|
167
|
+
debug("Error response from OydDID Registrar: ", body_create, response);
|
|
168
|
+
return Promise.reject(Error("Network response was not ok: " + response.statusText));
|
|
169
|
+
}
|
|
170
|
+
signValue = await response.json();
|
|
171
|
+
console.log(`Create response:
|
|
172
|
+
${JSON.stringify(signValue, null, 2)}
|
|
173
|
+
`);
|
|
174
|
+
} catch (error) {
|
|
175
|
+
console.log("Unexpected error from OydDID Registrar: ", error);
|
|
176
|
+
return Promise.reject(Error("There has been a problem with the fetch operation: " + error.toString()));
|
|
177
|
+
}
|
|
178
|
+
const { sign } = signValue;
|
|
179
|
+
const signature = await cmsmCallbackOpts.signCallback(kid, sign);
|
|
180
|
+
console.log(`Signature: ${signature}`);
|
|
181
|
+
const body_signed = {
|
|
182
|
+
key,
|
|
183
|
+
options: {
|
|
184
|
+
cmsm: true,
|
|
185
|
+
key_type: keyType,
|
|
186
|
+
sig: signature
|
|
187
|
+
}
|
|
188
|
+
};
|
|
189
|
+
console.log(`Signed request:
|
|
190
|
+
${JSON.stringify(body_signed, null, 2)}
|
|
191
|
+
`);
|
|
192
|
+
let didDoc;
|
|
193
|
+
try {
|
|
194
|
+
const response = await (0, import_cross_fetch.default)(OYDID_REGISTRAR_URL, {
|
|
195
|
+
method: "POST",
|
|
196
|
+
headers: {
|
|
197
|
+
"Content-Type": "application/json"
|
|
198
|
+
},
|
|
199
|
+
body: JSON.stringify(body_signed)
|
|
200
|
+
});
|
|
201
|
+
if (!response.ok) {
|
|
202
|
+
console.log(`Error response from OydDID Registrar: ${JSON.stringify(response.text)}${response.statusText}`, response);
|
|
203
|
+
debug("Error response from OydDID Registrar: ", response);
|
|
204
|
+
return Promise.reject(Error("Network response was not ok: " + response.statusText));
|
|
205
|
+
}
|
|
206
|
+
didDoc = await response.json();
|
|
207
|
+
} catch (error) {
|
|
208
|
+
debug("Unexpected error from OydDID Registrar: ", error);
|
|
209
|
+
return Promise.reject(Error("There has been a problem with the fetch operation: " + error.toString()));
|
|
210
|
+
}
|
|
211
|
+
const identifier = {
|
|
212
|
+
did: didDoc.did,
|
|
213
|
+
controllerKeyId: pubKey.kid,
|
|
214
|
+
keys: [
|
|
215
|
+
pubKey
|
|
216
|
+
],
|
|
217
|
+
services: []
|
|
218
|
+
};
|
|
219
|
+
debug("Created", identifier.did);
|
|
220
|
+
return identifier;
|
|
221
|
+
}
|
|
222
|
+
async updateIdentifier(args, context) {
|
|
223
|
+
throw new Error("OydDIDProvider updateIdentifier not supported yet.");
|
|
224
|
+
}
|
|
225
|
+
async deleteIdentifier(identifier, context) {
|
|
226
|
+
for (const { kid } of identifier.keys) {
|
|
227
|
+
await context.agent.keyManagerDelete({
|
|
228
|
+
kid
|
|
229
|
+
});
|
|
230
|
+
}
|
|
231
|
+
return true;
|
|
232
|
+
}
|
|
233
|
+
async addKey({ identifier, key, options }, context) {
|
|
234
|
+
return {
|
|
235
|
+
success: true
|
|
236
|
+
};
|
|
237
|
+
}
|
|
238
|
+
async addService({ identifier, service, options }, context) {
|
|
239
|
+
return {
|
|
240
|
+
success: true
|
|
241
|
+
};
|
|
242
|
+
}
|
|
243
|
+
async removeKey(args, context) {
|
|
244
|
+
return {
|
|
245
|
+
success: true
|
|
246
|
+
};
|
|
247
|
+
}
|
|
248
|
+
async removeService(args, context) {
|
|
249
|
+
return {
|
|
250
|
+
success: true
|
|
251
|
+
};
|
|
252
|
+
}
|
|
253
|
+
};
|
|
254
|
+
var keyCodecs = {
|
|
255
|
+
RSA: "rsa-pub",
|
|
256
|
+
Ed25519: "ed25519-pub",
|
|
257
|
+
X25519: "x25519-pub",
|
|
258
|
+
Secp256k1: "secp256k1-pub",
|
|
259
|
+
Secp256r1: "p256-pub",
|
|
260
|
+
Bls12381G1: "bls12_381-g1-pub",
|
|
261
|
+
Bls12381G2: "bls12_381-g2-pub"
|
|
262
|
+
};
|
|
263
|
+
var base58btc = /* @__PURE__ */ __name(({ publicKeyHex, keyType = "Secp256r1" }) => {
|
|
264
|
+
const codecName = keyCodecs[keyType];
|
|
265
|
+
return u8a.toString(import_multibase.default.encode("base58btc", import_multicodec.default.addPrefix(codecName, u8a.fromString(publicKeyHex, "hex")))).toString();
|
|
266
|
+
}, "base58btc");
|
|
267
|
+
function defaultOydCmsmPublicKeyCallback(keyManager) {
|
|
268
|
+
return async (kid, kms, create, createKeyType) => {
|
|
269
|
+
try {
|
|
270
|
+
const existing = await keyManager.keyManagerGet({
|
|
271
|
+
kid
|
|
272
|
+
});
|
|
273
|
+
if (existing) {
|
|
274
|
+
return existing;
|
|
275
|
+
}
|
|
276
|
+
} catch (error) {
|
|
277
|
+
}
|
|
278
|
+
if (create) {
|
|
279
|
+
if (!kms) {
|
|
280
|
+
return Promise.reject(Error("No KMS provided, whilst creating a new key!"));
|
|
281
|
+
}
|
|
282
|
+
const alias = kid ?? `oyd-${(/* @__PURE__ */ new Date()).toISOString()}`;
|
|
283
|
+
const agent = keyManager;
|
|
284
|
+
const key = await (0, import_ssi_sdk_ext.importProvidedOrGeneratedKey)({
|
|
285
|
+
kms,
|
|
286
|
+
alias,
|
|
287
|
+
options: {
|
|
288
|
+
key: {
|
|
289
|
+
type: createKeyType ?? "Secp256r1"
|
|
290
|
+
}
|
|
291
|
+
}
|
|
292
|
+
}, {
|
|
293
|
+
//@ts-ignore
|
|
294
|
+
agent
|
|
295
|
+
});
|
|
296
|
+
return key;
|
|
297
|
+
}
|
|
298
|
+
return Promise.reject(Error("No existing key found, and create is false!"));
|
|
299
|
+
};
|
|
300
|
+
}
|
|
301
|
+
__name(defaultOydCmsmPublicKeyCallback, "defaultOydCmsmPublicKeyCallback");
|
|
302
|
+
function defaultOydCmsmSignCallback(keyManager) {
|
|
303
|
+
return async (kid, data) => {
|
|
304
|
+
return keyManager.keyManagerSign({
|
|
305
|
+
keyRef: kid,
|
|
306
|
+
data,
|
|
307
|
+
encoding: "utf-8"
|
|
308
|
+
});
|
|
309
|
+
};
|
|
310
|
+
}
|
|
311
|
+
__name(defaultOydCmsmSignCallback, "defaultOydCmsmSignCallback");
|
|
312
|
+
var DefaultOydCmsmCallbacks = class {
|
|
313
|
+
static {
|
|
314
|
+
__name(this, "DefaultOydCmsmCallbacks");
|
|
315
|
+
}
|
|
316
|
+
keyManager;
|
|
317
|
+
constructor(keyManager) {
|
|
318
|
+
this.keyManager = keyManager;
|
|
319
|
+
}
|
|
320
|
+
publicKeyCallback(kid, kms, create, createKeyType) {
|
|
321
|
+
return defaultOydCmsmPublicKeyCallback(this.keyManager)(kid, kms, create, createKeyType);
|
|
322
|
+
}
|
|
323
|
+
signCallback(kid, value) {
|
|
324
|
+
return defaultOydCmsmSignCallback(this.keyManager)(kid, value);
|
|
325
|
+
}
|
|
326
|
+
};
|
|
327
|
+
|
|
328
|
+
// src/resolver.ts
|
|
329
|
+
var import_cross_fetch2 = __toESM(require("cross-fetch"), 1);
|
|
330
|
+
var resolveDidOyd = /* @__PURE__ */ __name(async (didUrl, _parsed, _resolver, options) => {
|
|
331
|
+
try {
|
|
332
|
+
const baseUrl = "https://oydid-resolver.data-container.net";
|
|
333
|
+
const response = await (0, import_cross_fetch2.default)(`${baseUrl}/1.0/identifiers/${didUrl}`);
|
|
334
|
+
if (!response.ok) {
|
|
335
|
+
throw new Error("Network response was not ok: " + response.statusText);
|
|
336
|
+
}
|
|
337
|
+
const didDoc = await response.json();
|
|
338
|
+
return didDoc;
|
|
339
|
+
} catch (err) {
|
|
340
|
+
return {
|
|
341
|
+
didDocumentMetadata: {},
|
|
342
|
+
didResolutionMetadata: {
|
|
343
|
+
error: "invalidDid",
|
|
344
|
+
message: err.toString()
|
|
345
|
+
},
|
|
346
|
+
didDocument: null
|
|
347
|
+
};
|
|
348
|
+
}
|
|
349
|
+
}, "resolveDidOyd");
|
|
350
|
+
function getDidOydResolver() {
|
|
351
|
+
return {
|
|
352
|
+
oyd: resolveDidOyd
|
|
353
|
+
};
|
|
354
|
+
}
|
|
355
|
+
__name(getDidOydResolver, "getDidOydResolver");
|
|
356
|
+
//# sourceMappingURL=index.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/index.ts","../src/oyd-did-provider.ts","../src/resolver.ts"],"sourcesContent":["/**\n * Provides `did:oyd` {@link @ownyourdata/did-provider-oyd#OydDIDProvider | identifier provider } for the\n * {@link @veramo/did-manager#DIDManager}\n *\n * @packageDocumentation\n */\nexport { OydDIDProvider, DefaultOydCmsmCallbacks, defaultOydCmsmSignCallback, defaultOydCmsmPublicKeyCallback } from './oyd-did-provider'\nexport { getDidOydResolver } from './resolver'\nexport type * from './types/oyd-provider-types'\n","import { importProvidedOrGeneratedKey } from '@sphereon/ssi-sdk-ext.key-utils'\nimport { IAgentContext, IIdentifier, IKey, IKeyManager, IService, TKeyType } from '@veramo/core'\nimport { AbstractIdentifierProvider } from '@veramo/did-manager'\nimport { KeyManager } from '@veramo/key-manager'\nimport fetch from 'cross-fetch'\nimport Multibase from 'multibase'\nimport Multicodec from 'multicodec'\n\n// @ts-ignore\nimport * as u8a from 'uint8arrays'\n\nimport Debug from 'debug'\nimport type {\n CMSMCallbackOpts,\n OydConstructorOptions,\n OydCreateIdentifierOptions,\n // OydDidHoldKeysArgs,\n OydDidSupportedKeyTypes,\n} from './types/oyd-provider-types'\n\nconst debug = Debug('veramo:oyd-did:identifier-provider')\nconst OYDID_REGISTRAR_URL = 'https://oydid-registrar.data-container.net/1.0/createIdentifier'\n\ntype IContext = IAgentContext<IKeyManager>\n\n/**\n * {@link @veramo/did-manager#DIDManager} identifier provider for `did:oyd` identifiers\n * @public\n */\nexport class OydDIDProvider extends AbstractIdentifierProvider {\n private readonly defaultKms?: string\n private readonly cmsmCallbackOpts?: CMSMCallbackOpts\n\n constructor(options?: OydConstructorOptions) {\n super()\n this.defaultKms = options?.defaultKms\n this.cmsmCallbackOpts = options?.clientManagedSecretMode\n }\n\n private async assertedKms(...kms: (string | undefined)[]): Promise<string> {\n if (!kms || kms.length === 0) {\n return Promise.reject(Error('KMS must be provided either as a parameter or via defaultKms.'))\n }\n const result = kms.find((k) => !!k)\n if (!result) {\n return Promise.reject(Error('KMS must be provided either as a parameter or via defaultKms.'))\n }\n return result\n }\n\n async createIdentifier(\n { kms, alias, options }: { kms?: string; alias?: string; options: OydCreateIdentifierOptions },\n context: IContext\n ): Promise<Omit<IIdentifier, 'provider'>> {\n const resolvedKms = await this.assertedKms(kms, this.defaultKms)\n\n if ((this.cmsmCallbackOpts && !options.cmsm) || (options.cmsm && options.cmsm.enabled !== false)) {\n if (!this.cmsmCallbackOpts) {\n return Promise.reject(Error('did:oyd: no cmsm options defined on oyd did provider, but cmsm was enabled on the call!'))\n }\n return await this.createIdentifierWithCMSM({ kms: resolvedKms, options }, context)\n }\n\n const body = {\n options: {\n cmsm: false,\n key_type: options.type ?? 'Secp256r1',\n },\n }\n let didDoc: any | undefined\n try {\n const response = await fetch(OYDID_REGISTRAR_URL, {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n },\n body: JSON.stringify(body),\n })\n if (!response.ok) {\n debug('Error response from OydDID Registrar: ', response)\n return Promise.reject(Error('Network response was not ok: ' + response.statusText))\n }\n didDoc = await response.json()\n } catch (error: any) {\n debug('Unexpected error from OydDID Registrar: ', error)\n return Promise.reject(Error('There has been a problem with the fetch operation: ' + error.toString()))\n }\n\n const keyType: OydDidSupportedKeyTypes = options?.type ?? 'Secp256r1'\n const key = await importProvidedOrGeneratedKey(\n {\n kms: resolvedKms,\n alias: alias ?? options.alias ?? options.kid ?? `${didDoc.did}#key-doc`,\n options: {\n key: {\n kid: `${didDoc.did}#key-doc`,\n type: keyType,\n publicKeyHex: didDoc.keys[0].publicKeyHex,\n privateKeyHex: didDoc.keys[0].privateKeyHex,\n },\n },\n },\n context\n )\n\n const identifier: Omit<IIdentifier, 'provider'> = {\n did: didDoc.did,\n controllerKeyId: key.kid,\n keys: [key],\n services: [],\n }\n debug('Created', identifier.did)\n return identifier\n }\n\n async createIdentifierWithCMSM(\n { kms, options }: { kms?: string; options: OydCreateIdentifierOptions },\n context: IContext\n ): Promise<Omit<IIdentifier, 'provider'>> {\n const cmsmCallbackOpts = this.cmsmCallbackOpts\n if (!cmsmCallbackOpts) {\n return Promise.reject(Error('did:oyd: no cmsm options defined!'))\n }\n\n const assertedKms = await this.assertedKms(kms, this.defaultKms)\n const pubKey =\n options.key ?? (await cmsmCallbackOpts.publicKeyCallback(options.kid ?? 'default', assertedKms, options.cmsm?.create !== false, options.type)) // \"default\" is probably not right, TODO!!\n const kid = pubKey.kid\n const keyType = pubKey.type\n const key = base58btc({ publicKeyHex: pubKey.publicKeyHex, keyType })\n\n console.log(`Bae58 pubkey key: ${key}`)\n let signValue: any | undefined // do the request\n try {\n const body_create = {\n // specify the Identifier options for the registrar\n key: key,\n options: {\n cmsm: true,\n key_type: keyType,\n },\n }\n console.log(`Create request:\\n${JSON.stringify(body_create, null, 2)}\\n`)\n const response = await fetch(OYDID_REGISTRAR_URL, {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n },\n body: JSON.stringify(body_create),\n })\n if (!response.ok) {\n debug('Error response from OydDID Registrar: ', body_create, response)\n return Promise.reject(Error('Network response was not ok: ' + response.statusText))\n }\n signValue = await response.json()\n console.log(`Create response:\\n${JSON.stringify(signValue, null, 2)}\\n`)\n } catch (error: any) {\n console.log('Unexpected error from OydDID Registrar: ', error)\n return Promise.reject(Error('There has been a problem with the fetch operation: ' + error.toString()))\n }\n\n // we received our value to sign, now we sign it!\n const { sign } = signValue\n const signature = await cmsmCallbackOpts.signCallback(kid, sign)\n\n console.log(`Signature: ${signature}`)\n\n const body_signed = {\n key,\n options: {\n cmsm: true,\n key_type: keyType,\n sig: signature,\n },\n }\n console.log(`Signed request:\\n${JSON.stringify(body_signed, null, 2)}\\n`)\n\n // Object.assign(body_signed.options, options)\n\n let didDoc: any | undefined // do the request\n try {\n const response = await fetch(OYDID_REGISTRAR_URL, {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n },\n body: JSON.stringify(body_signed),\n })\n if (!response.ok) {\n console.log(`Error response from OydDID Registrar: ${JSON.stringify(response.text)}${response.statusText}`, response)\n debug('Error response from OydDID Registrar: ', response)\n return Promise.reject(Error('Network response was not ok: ' + response.statusText))\n }\n didDoc = await response.json()\n } catch (error: any) {\n debug('Unexpected error from OydDID Registrar: ', error)\n return Promise.reject(Error('There has been a problem with the fetch operation: ' + error.toString()))\n }\n\n const identifier: Omit<IIdentifier, 'provider'> = {\n did: didDoc.did,\n controllerKeyId: pubKey.kid,\n keys: [pubKey],\n services: [],\n }\n debug('Created', identifier.did)\n return identifier\n }\n\n async updateIdentifier(\n args: { did: string; kms?: string | undefined; alias?: string | undefined; options?: any },\n context: IAgentContext<IKeyManager>\n ): Promise<IIdentifier> {\n throw new Error('OydDIDProvider updateIdentifier not supported yet.')\n }\n\n async deleteIdentifier(identifier: IIdentifier, context: IContext): Promise<boolean> {\n for (const { kid } of identifier.keys) {\n await context.agent.keyManagerDelete({ kid })\n }\n return true\n }\n\n async addKey({ identifier, key, options }: { identifier: IIdentifier; key: IKey; options?: any }, context: IContext): Promise<any> {\n return { success: true }\n }\n\n async addService({ identifier, service, options }: { identifier: IIdentifier; service: IService; options?: any }, context: IContext): Promise<any> {\n return { success: true }\n }\n\n async removeKey(args: { identifier: IIdentifier; kid: string; options?: any }, context: IContext): Promise<any> {\n return { success: true }\n }\n\n async removeService(args: { identifier: IIdentifier; id: string; options?: any }, context: IContext): Promise<any> {\n return { success: true }\n }\n}\n\nconst keyCodecs = {\n RSA: 'rsa-pub',\n Ed25519: 'ed25519-pub',\n X25519: 'x25519-pub',\n Secp256k1: 'secp256k1-pub',\n Secp256r1: 'p256-pub',\n Bls12381G1: 'bls12_381-g1-pub',\n Bls12381G2: 'bls12_381-g2-pub',\n} as const\n\nconst base58btc = ({ publicKeyHex, keyType = 'Secp256r1' }: { publicKeyHex: string; keyType?: TKeyType }): string => {\n const codecName = keyCodecs[keyType]\n\n // methodSpecificId = bytesToMultibase({bytes: u8a.fromString(key.publicKeyHex, 'hex'), codecName})\n return u8a\n .toString(Multibase.encode('base58btc', Multicodec.addPrefix(codecName as Multicodec.CodecName, u8a.fromString(publicKeyHex, 'hex'))))\n .toString()\n}\n\nexport function defaultOydCmsmPublicKeyCallback(\n keyManager: KeyManager\n): (kid: string, kms?: string, create?: boolean, createKeyType?: TKeyType) => Promise<IKey> {\n return async (kid: string, kms?: string, create?: boolean, createKeyType?: TKeyType): Promise<IKey> => {\n try {\n const existing = await keyManager.keyManagerGet({ kid })\n if (existing) {\n return existing\n }\n } catch (error: any) {}\n if (create) {\n if (!kms) {\n return Promise.reject(Error('No KMS provided, whilst creating a new key!'))\n }\n const alias = kid ?? `oyd-${new Date().toISOString()}`\n\n const agent = keyManager\n const key = await importProvidedOrGeneratedKey(\n {\n kms,\n alias,\n options: {\n key: {\n type: createKeyType ?? 'Secp256r1',\n },\n },\n },\n {\n //@ts-ignore\n agent,\n }\n )\n return key\n\n // return await keyManager.keyManagerCreate({ kms, type: createKeyType ?? 'Secp256r1' })\n }\n return Promise.reject(Error('No existing key found, and create is false!'))\n }\n}\n\nexport function defaultOydCmsmSignCallback(keyManager: KeyManager): (kid: string, data: string) => Promise<string> {\n return async (kid: string, data: string): Promise<string> => {\n return keyManager.keyManagerSign({ keyRef: kid, data, encoding: 'utf-8' })\n }\n}\n\nexport class DefaultOydCmsmCallbacks implements CMSMCallbackOpts {\n private readonly keyManager: KeyManager\n\n constructor(keyManager: KeyManager) {\n this.keyManager = keyManager\n }\n\n publicKeyCallback(kid: string, kms?: string, create?: boolean, createKeyType?: TKeyType): Promise<IKey> {\n return defaultOydCmsmPublicKeyCallback(this.keyManager)(kid, kms, create, createKeyType)\n }\n\n signCallback(kid: string, value: string): Promise<string> {\n return defaultOydCmsmSignCallback(this.keyManager)(kid, value)\n }\n}\n","import { DIDResolutionOptions, DIDResolutionResult, DIDResolver, ParsedDID, Resolvable } from 'did-resolver'\nimport fetch from 'cross-fetch'\n\nconst resolveDidOyd: DIDResolver = async (\n didUrl: string,\n _parsed: ParsedDID,\n _resolver: Resolvable,\n options: DIDResolutionOptions\n): Promise<DIDResolutionResult> => {\n try {\n const baseUrl: string = 'https://oydid-resolver.data-container.net'\n // const didDoc = await axios.get(`${baseUrl}/1.0/identifiers/${didUrl}`);\n const response = await fetch(`${baseUrl}/1.0/identifiers/${didUrl}`)\n if (!response.ok) {\n throw new Error('Network response was not ok: ' + response.statusText)\n }\n const didDoc = await response.json()\n return didDoc as DIDResolutionResult\n } catch (err: any) {\n return {\n didDocumentMetadata: {},\n didResolutionMetadata: { error: 'invalidDid', message: err.toString() },\n didDocument: null,\n }\n }\n}\n\n/**\n * Provides a mapping to a did:oyd resolver, usable by {@link did-resolver#Resolver}.\n *\n * @public\n */\nexport function getDidOydResolver() {\n return { oyd: resolveDidOyd }\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;;;;;;;;;;;ACAA,yBAA6C;AAE7C,yBAA2C;AAE3C,yBAAkB;AAClB,uBAAsB;AACtB,wBAAuB;AAGvB,UAAqB;AAErB,mBAAkB;AASlB,IAAMA,YAAQC,aAAAA,SAAM,oCAAA;AACpB,IAAMC,sBAAsB;AAQrB,IAAMC,iBAAN,cAA6BC,8CAAAA;EA7BpC,OA6BoCA;;;EACjBC;EACAC;EAEjBC,YAAYC,SAAiC;AAC3C,UAAK;AACL,SAAKH,aAAaG,SAASH;AAC3B,SAAKC,mBAAmBE,SAASC;EACnC;EAEA,MAAcC,eAAeC,KAA8C;AACzE,QAAI,CAACA,OAAOA,IAAIC,WAAW,GAAG;AAC5B,aAAOC,QAAQC,OAAOC,MAAM,+DAAA,CAAA;IAC9B;AACA,UAAMC,SAASL,IAAIM,KAAK,CAACC,MAAM,CAAC,CAACA,CAAAA;AACjC,QAAI,CAACF,QAAQ;AACX,aAAOH,QAAQC,OAAOC,MAAM,+DAAA,CAAA;IAC9B;AACA,WAAOC;EACT;EAEA,MAAMG,iBACJ,EAAER,KAAKS,OAAOZ,QAAO,GACrBa,SACwC;AACxC,UAAMC,cAAc,MAAM,KAAKZ,YAAYC,KAAK,KAAKN,UAAU;AAE/D,QAAK,KAAKC,oBAAoB,CAACE,QAAQe,QAAUf,QAAQe,QAAQf,QAAQe,KAAKC,YAAY,OAAQ;AAChG,UAAI,CAAC,KAAKlB,kBAAkB;AAC1B,eAAOO,QAAQC,OAAOC,MAAM,yFAAA,CAAA;MAC9B;AACA,aAAO,MAAM,KAAKU,yBAAyB;QAAEd,KAAKW;QAAad;MAAQ,GAAGa,OAAAA;IAC5E;AAEA,UAAMK,OAAO;MACXlB,SAAS;QACPe,MAAM;QACNI,UAAUnB,QAAQoB,QAAQ;MAC5B;IACF;AACA,QAAIC;AACJ,QAAI;AACF,YAAMC,WAAW,UAAMC,mBAAAA,SAAM7B,qBAAqB;QAChD8B,QAAQ;QACRC,SAAS;UACP,gBAAgB;QAClB;QACAP,MAAMQ,KAAKC,UAAUT,IAAAA;MACvB,CAAA;AACA,UAAI,CAACI,SAASM,IAAI;AAChBpC,cAAM,0CAA0C8B,QAAAA;AAChD,eAAOjB,QAAQC,OAAOC,MAAM,kCAAkCe,SAASO,UAAU,CAAA;MACnF;AACAR,eAAS,MAAMC,SAASQ,KAAI;IAC9B,SAASC,OAAY;AACnBvC,YAAM,4CAA4CuC,KAAAA;AAClD,aAAO1B,QAAQC,OAAOC,MAAM,wDAAwDwB,MAAMC,SAAQ,CAAA,CAAA;IACpG;AAEA,UAAMC,UAAmCjC,SAASoB,QAAQ;AAC1D,UAAMc,MAAM,UAAMC,iDAChB;MACEhC,KAAKW;MACLF,OAAOA,SAASZ,QAAQY,SAASZ,QAAQoC,OAAO,GAAGf,OAAOgB,GAAG;MAC7DrC,SAAS;QACPkC,KAAK;UACHE,KAAK,GAAGf,OAAOgB,GAAG;UAClBjB,MAAMa;UACNK,cAAcjB,OAAOkB,KAAK,CAAA,EAAGD;UAC7BE,eAAenB,OAAOkB,KAAK,CAAA,EAAGC;QAChC;MACF;IACF,GACA3B,OAAAA;AAGF,UAAM4B,aAA4C;MAChDJ,KAAKhB,OAAOgB;MACZK,iBAAiBR,IAAIE;MACrBG,MAAM;QAACL;;MACPS,UAAU,CAAA;IACZ;AACAnD,UAAM,WAAWiD,WAAWJ,GAAG;AAC/B,WAAOI;EACT;EAEA,MAAMxB,yBACJ,EAAEd,KAAKH,QAAO,GACda,SACwC;AACxC,UAAMf,mBAAmB,KAAKA;AAC9B,QAAI,CAACA,kBAAkB;AACrB,aAAOO,QAAQC,OAAOC,MAAM,mCAAA,CAAA;IAC9B;AAEA,UAAML,cAAc,MAAM,KAAKA,YAAYC,KAAK,KAAKN,UAAU;AAC/D,UAAM+C,SACJ5C,QAAQkC,OAAQ,MAAMpC,iBAAiB+C,kBAAkB7C,QAAQoC,OAAO,WAAWlC,aAAaF,QAAQe,MAAM+B,WAAW,OAAO9C,QAAQoB,IAAI;AAC9I,UAAMgB,MAAMQ,OAAOR;AACnB,UAAMH,UAAUW,OAAOxB;AACvB,UAAMc,MAAMa,UAAU;MAAET,cAAcM,OAAON;MAAcL;IAAQ,CAAA;AAEnEe,YAAQC,IAAI,qBAAqBf,GAAAA,EAAK;AACtC,QAAIgB;AACJ,QAAI;AACF,YAAMC,cAAc;;QAElBjB;QACAlC,SAAS;UACPe,MAAM;UACNI,UAAUc;QACZ;MACF;AACAe,cAAQC,IAAI;EAAoBvB,KAAKC,UAAUwB,aAAa,MAAM,CAAA,CAAA;CAAM;AACxE,YAAM7B,WAAW,UAAMC,mBAAAA,SAAM7B,qBAAqB;QAChD8B,QAAQ;QACRC,SAAS;UACP,gBAAgB;QAClB;QACAP,MAAMQ,KAAKC,UAAUwB,WAAAA;MACvB,CAAA;AACA,UAAI,CAAC7B,SAASM,IAAI;AAChBpC,cAAM,0CAA0C2D,aAAa7B,QAAAA;AAC7D,eAAOjB,QAAQC,OAAOC,MAAM,kCAAkCe,SAASO,UAAU,CAAA;MACnF;AACAqB,kBAAY,MAAM5B,SAASQ,KAAI;AAC/BkB,cAAQC,IAAI;EAAqBvB,KAAKC,UAAUuB,WAAW,MAAM,CAAA,CAAA;CAAM;IACzE,SAASnB,OAAY;AACnBiB,cAAQC,IAAI,4CAA4ClB,KAAAA;AACxD,aAAO1B,QAAQC,OAAOC,MAAM,wDAAwDwB,MAAMC,SAAQ,CAAA,CAAA;IACpG;AAGA,UAAM,EAAEoB,KAAI,IAAKF;AACjB,UAAMG,YAAY,MAAMvD,iBAAiBwD,aAAalB,KAAKgB,IAAAA;AAE3DJ,YAAQC,IAAI,cAAcI,SAAAA,EAAW;AAErC,UAAME,cAAc;MAClBrB;MACAlC,SAAS;QACPe,MAAM;QACNI,UAAUc;QACVuB,KAAKH;MACP;IACF;AACAL,YAAQC,IAAI;EAAoBvB,KAAKC,UAAU4B,aAAa,MAAM,CAAA,CAAA;CAAM;AAIxE,QAAIlC;AACJ,QAAI;AACF,YAAMC,WAAW,UAAMC,mBAAAA,SAAM7B,qBAAqB;QAChD8B,QAAQ;QACRC,SAAS;UACP,gBAAgB;QAClB;QACAP,MAAMQ,KAAKC,UAAU4B,WAAAA;MACvB,CAAA;AACA,UAAI,CAACjC,SAASM,IAAI;AAChBoB,gBAAQC,IAAI,yCAAyCvB,KAAKC,UAAUL,SAASmC,IAAI,CAAA,GAAInC,SAASO,UAAU,IAAIP,QAAAA;AAC5G9B,cAAM,0CAA0C8B,QAAAA;AAChD,eAAOjB,QAAQC,OAAOC,MAAM,kCAAkCe,SAASO,UAAU,CAAA;MACnF;AACAR,eAAS,MAAMC,SAASQ,KAAI;IAC9B,SAASC,OAAY;AACnBvC,YAAM,4CAA4CuC,KAAAA;AAClD,aAAO1B,QAAQC,OAAOC,MAAM,wDAAwDwB,MAAMC,SAAQ,CAAA,CAAA;IACpG;AAEA,UAAMS,aAA4C;MAChDJ,KAAKhB,OAAOgB;MACZK,iBAAiBE,OAAOR;MACxBG,MAAM;QAACK;;MACPD,UAAU,CAAA;IACZ;AACAnD,UAAM,WAAWiD,WAAWJ,GAAG;AAC/B,WAAOI;EACT;EAEA,MAAMiB,iBACJC,MACA9C,SACsB;AACtB,UAAM,IAAIN,MAAM,oDAAA;EAClB;EAEA,MAAMqD,iBAAiBnB,YAAyB5B,SAAqC;AACnF,eAAW,EAAEuB,IAAG,KAAMK,WAAWF,MAAM;AACrC,YAAM1B,QAAQgD,MAAMC,iBAAiB;QAAE1B;MAAI,CAAA;IAC7C;AACA,WAAO;EACT;EAEA,MAAM2B,OAAO,EAAEtB,YAAYP,KAAKlC,QAAO,GAA2Da,SAAiC;AACjI,WAAO;MAAEmD,SAAS;IAAK;EACzB;EAEA,MAAMC,WAAW,EAAExB,YAAYyB,SAASlE,QAAO,GAAmEa,SAAiC;AACjJ,WAAO;MAAEmD,SAAS;IAAK;EACzB;EAEA,MAAMG,UAAUR,MAA+D9C,SAAiC;AAC9G,WAAO;MAAEmD,SAAS;IAAK;EACzB;EAEA,MAAMI,cAAcT,MAA8D9C,SAAiC;AACjH,WAAO;MAAEmD,SAAS;IAAK;EACzB;AACF;AAEA,IAAMK,YAAY;EAChBC,KAAK;EACLC,SAAS;EACTC,QAAQ;EACRC,WAAW;EACXC,WAAW;EACXC,YAAY;EACZC,YAAY;AACd;AAEA,IAAM7B,YAAY,wBAAC,EAAET,cAAcL,UAAU,YAAW,MAAgD;AACtG,QAAM4C,YAAYR,UAAUpC,OAAAA;AAG5B,SACGD,aAAS8C,iBAAAA,QAAUC,OAAO,aAAaC,kBAAAA,QAAWC,UAAUJ,WAAuCK,eAAW5C,cAAc,KAAA,CAAA,CAAA,CAAA,EAC5HN,SAAQ;AACb,GAPkB;AASX,SAASmD,gCACdC,YAAsB;AAEtB,SAAO,OAAOhD,KAAajC,KAAc2C,QAAkBuC,kBAAAA;AACzD,QAAI;AACF,YAAMC,WAAW,MAAMF,WAAWG,cAAc;QAAEnD;MAAI,CAAA;AACtD,UAAIkD,UAAU;AACZ,eAAOA;MACT;IACF,SAASvD,OAAY;IAAC;AACtB,QAAIe,QAAQ;AACV,UAAI,CAAC3C,KAAK;AACR,eAAOE,QAAQC,OAAOC,MAAM,6CAAA,CAAA;MAC9B;AACA,YAAMK,QAAQwB,OAAO,QAAO,oBAAIoD,KAAAA,GAAOC,YAAW,CAAA;AAElD,YAAM5B,QAAQuB;AACd,YAAMlD,MAAM,UAAMC,iDAChB;QACEhC;QACAS;QACAZ,SAAS;UACPkC,KAAK;YACHd,MAAMiE,iBAAiB;UACzB;QACF;MACF,GACA;;QAEExB;MACF,CAAA;AAEF,aAAO3B;IAGT;AACA,WAAO7B,QAAQC,OAAOC,MAAM,6CAAA,CAAA;EAC9B;AACF;AAtCgB4E;AAwCT,SAASO,2BAA2BN,YAAsB;AAC/D,SAAO,OAAOhD,KAAauD,SAAAA;AACzB,WAAOP,WAAWQ,eAAe;MAAEC,QAAQzD;MAAKuD;MAAMG,UAAU;IAAQ,CAAA;EAC1E;AACF;AAJgBJ;AAMT,IAAMK,0BAAN,MAAMA;EAjTb,OAiTaA;;;EACMX;EAEjBrF,YAAYqF,YAAwB;AAClC,SAAKA,aAAaA;EACpB;EAEAvC,kBAAkBT,KAAajC,KAAc2C,QAAkBuC,eAAyC;AACtG,WAAOF,gCAAgC,KAAKC,UAAU,EAAEhD,KAAKjC,KAAK2C,QAAQuC,aAAAA;EAC5E;EAEA/B,aAAalB,KAAa4D,OAAgC;AACxD,WAAON,2BAA2B,KAAKN,UAAU,EAAEhD,KAAK4D,KAAAA;EAC1D;AACF;;;AC9TA,IAAAC,sBAAkB;AAElB,IAAMC,gBAA6B,8BACjCC,QACAC,SACAC,WACAC,YAAAA;AAEA,MAAI;AACF,UAAMC,UAAkB;AAExB,UAAMC,WAAW,UAAMC,oBAAAA,SAAM,GAAGF,OAAAA,oBAA2BJ,MAAAA,EAAQ;AACnE,QAAI,CAACK,SAASE,IAAI;AAChB,YAAM,IAAIC,MAAM,kCAAkCH,SAASI,UAAU;IACvE;AACA,UAAMC,SAAS,MAAML,SAASM,KAAI;AAClC,WAAOD;EACT,SAASE,KAAU;AACjB,WAAO;MACLC,qBAAqB,CAAC;MACtBC,uBAAuB;QAAEC,OAAO;QAAcC,SAASJ,IAAIK,SAAQ;MAAG;MACtEC,aAAa;IACf;EACF;AACF,GAtBmC;AA6B5B,SAASC,oBAAAA;AACd,SAAO;IAAEC,KAAKrB;EAAc;AAC9B;AAFgBoB;","names":["debug","Debug","OYDID_REGISTRAR_URL","OydDIDProvider","AbstractIdentifierProvider","defaultKms","cmsmCallbackOpts","constructor","options","clientManagedSecretMode","assertedKms","kms","length","Promise","reject","Error","result","find","k","createIdentifier","alias","context","resolvedKms","cmsm","enabled","createIdentifierWithCMSM","body","key_type","type","didDoc","response","fetch","method","headers","JSON","stringify","ok","statusText","json","error","toString","keyType","key","importProvidedOrGeneratedKey","kid","did","publicKeyHex","keys","privateKeyHex","identifier","controllerKeyId","services","pubKey","publicKeyCallback","create","base58btc","console","log","signValue","body_create","sign","signature","signCallback","body_signed","sig","text","updateIdentifier","args","deleteIdentifier","agent","keyManagerDelete","addKey","success","addService","service","removeKey","removeService","keyCodecs","RSA","Ed25519","X25519","Secp256k1","Secp256r1","Bls12381G1","Bls12381G2","codecName","Multibase","encode","Multicodec","addPrefix","fromString","defaultOydCmsmPublicKeyCallback","keyManager","createKeyType","existing","keyManagerGet","Date","toISOString","defaultOydCmsmSignCallback","data","keyManagerSign","keyRef","encoding","DefaultOydCmsmCallbacks","value","import_cross_fetch","resolveDidOyd","didUrl","_parsed","_resolver","options","baseUrl","response","fetch","ok","Error","statusText","didDoc","json","err","didDocumentMetadata","didResolutionMetadata","error","message","toString","didDocument","getDidOydResolver","oyd"]}
|
package/dist/index.d.cts
ADDED
|
@@ -0,0 +1,111 @@
|
|
|
1
|
+
import { TKeyType, IKey, IAgentContext, IKeyManager, IIdentifier, IService } from '@veramo/core';
|
|
2
|
+
import { AbstractIdentifierProvider } from '@veramo/did-manager';
|
|
3
|
+
import { KeyManager } from '@veramo/key-manager';
|
|
4
|
+
import { DIDResolver } from 'did-resolver';
|
|
5
|
+
|
|
6
|
+
type OydConstructorOptions = {
|
|
7
|
+
defaultKms?: string;
|
|
8
|
+
clientManagedSecretMode?: CMSMCallbackOpts;
|
|
9
|
+
};
|
|
10
|
+
type OydCreateIdentifierOptions = {
|
|
11
|
+
type?: OydDidSupportedKeyTypes;
|
|
12
|
+
privateKeyHex?: string;
|
|
13
|
+
kid?: string;
|
|
14
|
+
alias?: string;
|
|
15
|
+
keyUse?: KeyUse;
|
|
16
|
+
cmsm?: CmsmOptions;
|
|
17
|
+
key?: IKey;
|
|
18
|
+
};
|
|
19
|
+
type CmsmOptions = {
|
|
20
|
+
enabled: boolean;
|
|
21
|
+
create?: boolean;
|
|
22
|
+
};
|
|
23
|
+
type OydDidHoldKeysArgs = {
|
|
24
|
+
kms?: string;
|
|
25
|
+
options: HoldKeysOpts;
|
|
26
|
+
};
|
|
27
|
+
type HoldKeysOpts = {
|
|
28
|
+
keyType: OydDidSupportedKeyTypes;
|
|
29
|
+
kid: string;
|
|
30
|
+
publicKeyHex?: string;
|
|
31
|
+
privateKeyHex?: string;
|
|
32
|
+
};
|
|
33
|
+
type CMSMCallbackOpts = {
|
|
34
|
+
publicKeyCallback: (kid: string, kms?: string, create?: boolean, createKeyType?: TKeyType) => Promise<IKey>;
|
|
35
|
+
signCallback: (kid: string, value: string) => Promise<string>;
|
|
36
|
+
};
|
|
37
|
+
declare enum SupportedKeyTypes {
|
|
38
|
+
Secp256r1 = "Secp256r1",
|
|
39
|
+
Secp256k1 = "Secp256k1",
|
|
40
|
+
Ed25519 = "Ed25519",
|
|
41
|
+
X25519 = "X25519"
|
|
42
|
+
}
|
|
43
|
+
type OydDidSupportedKeyTypes = keyof typeof SupportedKeyTypes;
|
|
44
|
+
type KeyUse = 'sig' | 'enc';
|
|
45
|
+
|
|
46
|
+
type IContext = IAgentContext<IKeyManager>;
|
|
47
|
+
/**
|
|
48
|
+
* {@link @veramo/did-manager#DIDManager} identifier provider for `did:oyd` identifiers
|
|
49
|
+
* @public
|
|
50
|
+
*/
|
|
51
|
+
declare class OydDIDProvider extends AbstractIdentifierProvider {
|
|
52
|
+
private readonly defaultKms?;
|
|
53
|
+
private readonly cmsmCallbackOpts?;
|
|
54
|
+
constructor(options?: OydConstructorOptions);
|
|
55
|
+
private assertedKms;
|
|
56
|
+
createIdentifier({ kms, alias, options }: {
|
|
57
|
+
kms?: string;
|
|
58
|
+
alias?: string;
|
|
59
|
+
options: OydCreateIdentifierOptions;
|
|
60
|
+
}, context: IContext): Promise<Omit<IIdentifier, 'provider'>>;
|
|
61
|
+
createIdentifierWithCMSM({ kms, options }: {
|
|
62
|
+
kms?: string;
|
|
63
|
+
options: OydCreateIdentifierOptions;
|
|
64
|
+
}, context: IContext): Promise<Omit<IIdentifier, 'provider'>>;
|
|
65
|
+
updateIdentifier(args: {
|
|
66
|
+
did: string;
|
|
67
|
+
kms?: string | undefined;
|
|
68
|
+
alias?: string | undefined;
|
|
69
|
+
options?: any;
|
|
70
|
+
}, context: IAgentContext<IKeyManager>): Promise<IIdentifier>;
|
|
71
|
+
deleteIdentifier(identifier: IIdentifier, context: IContext): Promise<boolean>;
|
|
72
|
+
addKey({ identifier, key, options }: {
|
|
73
|
+
identifier: IIdentifier;
|
|
74
|
+
key: IKey;
|
|
75
|
+
options?: any;
|
|
76
|
+
}, context: IContext): Promise<any>;
|
|
77
|
+
addService({ identifier, service, options }: {
|
|
78
|
+
identifier: IIdentifier;
|
|
79
|
+
service: IService;
|
|
80
|
+
options?: any;
|
|
81
|
+
}, context: IContext): Promise<any>;
|
|
82
|
+
removeKey(args: {
|
|
83
|
+
identifier: IIdentifier;
|
|
84
|
+
kid: string;
|
|
85
|
+
options?: any;
|
|
86
|
+
}, context: IContext): Promise<any>;
|
|
87
|
+
removeService(args: {
|
|
88
|
+
identifier: IIdentifier;
|
|
89
|
+
id: string;
|
|
90
|
+
options?: any;
|
|
91
|
+
}, context: IContext): Promise<any>;
|
|
92
|
+
}
|
|
93
|
+
declare function defaultOydCmsmPublicKeyCallback(keyManager: KeyManager): (kid: string, kms?: string, create?: boolean, createKeyType?: TKeyType) => Promise<IKey>;
|
|
94
|
+
declare function defaultOydCmsmSignCallback(keyManager: KeyManager): (kid: string, data: string) => Promise<string>;
|
|
95
|
+
declare class DefaultOydCmsmCallbacks implements CMSMCallbackOpts {
|
|
96
|
+
private readonly keyManager;
|
|
97
|
+
constructor(keyManager: KeyManager);
|
|
98
|
+
publicKeyCallback(kid: string, kms?: string, create?: boolean, createKeyType?: TKeyType): Promise<IKey>;
|
|
99
|
+
signCallback(kid: string, value: string): Promise<string>;
|
|
100
|
+
}
|
|
101
|
+
|
|
102
|
+
/**
|
|
103
|
+
* Provides a mapping to a did:oyd resolver, usable by {@link did-resolver#Resolver}.
|
|
104
|
+
*
|
|
105
|
+
* @public
|
|
106
|
+
*/
|
|
107
|
+
declare function getDidOydResolver(): {
|
|
108
|
+
oyd: DIDResolver;
|
|
109
|
+
};
|
|
110
|
+
|
|
111
|
+
export { type CMSMCallbackOpts, type CmsmOptions, DefaultOydCmsmCallbacks, type KeyUse, type OydConstructorOptions, type OydCreateIdentifierOptions, OydDIDProvider, type OydDidHoldKeysArgs, type OydDidSupportedKeyTypes, defaultOydCmsmPublicKeyCallback, defaultOydCmsmSignCallback, getDidOydResolver };
|
package/dist/index.d.ts
CHANGED
|
@@ -1,10 +1,111 @@
|
|
|
1
|
+
import { TKeyType, IKey, IAgentContext, IKeyManager, IIdentifier, IService } from '@veramo/core';
|
|
2
|
+
import { AbstractIdentifierProvider } from '@veramo/did-manager';
|
|
3
|
+
import { KeyManager } from '@veramo/key-manager';
|
|
4
|
+
import { DIDResolver } from 'did-resolver';
|
|
5
|
+
|
|
6
|
+
type OydConstructorOptions = {
|
|
7
|
+
defaultKms?: string;
|
|
8
|
+
clientManagedSecretMode?: CMSMCallbackOpts;
|
|
9
|
+
};
|
|
10
|
+
type OydCreateIdentifierOptions = {
|
|
11
|
+
type?: OydDidSupportedKeyTypes;
|
|
12
|
+
privateKeyHex?: string;
|
|
13
|
+
kid?: string;
|
|
14
|
+
alias?: string;
|
|
15
|
+
keyUse?: KeyUse;
|
|
16
|
+
cmsm?: CmsmOptions;
|
|
17
|
+
key?: IKey;
|
|
18
|
+
};
|
|
19
|
+
type CmsmOptions = {
|
|
20
|
+
enabled: boolean;
|
|
21
|
+
create?: boolean;
|
|
22
|
+
};
|
|
23
|
+
type OydDidHoldKeysArgs = {
|
|
24
|
+
kms?: string;
|
|
25
|
+
options: HoldKeysOpts;
|
|
26
|
+
};
|
|
27
|
+
type HoldKeysOpts = {
|
|
28
|
+
keyType: OydDidSupportedKeyTypes;
|
|
29
|
+
kid: string;
|
|
30
|
+
publicKeyHex?: string;
|
|
31
|
+
privateKeyHex?: string;
|
|
32
|
+
};
|
|
33
|
+
type CMSMCallbackOpts = {
|
|
34
|
+
publicKeyCallback: (kid: string, kms?: string, create?: boolean, createKeyType?: TKeyType) => Promise<IKey>;
|
|
35
|
+
signCallback: (kid: string, value: string) => Promise<string>;
|
|
36
|
+
};
|
|
37
|
+
declare enum SupportedKeyTypes {
|
|
38
|
+
Secp256r1 = "Secp256r1",
|
|
39
|
+
Secp256k1 = "Secp256k1",
|
|
40
|
+
Ed25519 = "Ed25519",
|
|
41
|
+
X25519 = "X25519"
|
|
42
|
+
}
|
|
43
|
+
type OydDidSupportedKeyTypes = keyof typeof SupportedKeyTypes;
|
|
44
|
+
type KeyUse = 'sig' | 'enc';
|
|
45
|
+
|
|
46
|
+
type IContext = IAgentContext<IKeyManager>;
|
|
1
47
|
/**
|
|
2
|
-
*
|
|
3
|
-
*
|
|
48
|
+
* {@link @veramo/did-manager#DIDManager} identifier provider for `did:oyd` identifiers
|
|
49
|
+
* @public
|
|
50
|
+
*/
|
|
51
|
+
declare class OydDIDProvider extends AbstractIdentifierProvider {
|
|
52
|
+
private readonly defaultKms?;
|
|
53
|
+
private readonly cmsmCallbackOpts?;
|
|
54
|
+
constructor(options?: OydConstructorOptions);
|
|
55
|
+
private assertedKms;
|
|
56
|
+
createIdentifier({ kms, alias, options }: {
|
|
57
|
+
kms?: string;
|
|
58
|
+
alias?: string;
|
|
59
|
+
options: OydCreateIdentifierOptions;
|
|
60
|
+
}, context: IContext): Promise<Omit<IIdentifier, 'provider'>>;
|
|
61
|
+
createIdentifierWithCMSM({ kms, options }: {
|
|
62
|
+
kms?: string;
|
|
63
|
+
options: OydCreateIdentifierOptions;
|
|
64
|
+
}, context: IContext): Promise<Omit<IIdentifier, 'provider'>>;
|
|
65
|
+
updateIdentifier(args: {
|
|
66
|
+
did: string;
|
|
67
|
+
kms?: string | undefined;
|
|
68
|
+
alias?: string | undefined;
|
|
69
|
+
options?: any;
|
|
70
|
+
}, context: IAgentContext<IKeyManager>): Promise<IIdentifier>;
|
|
71
|
+
deleteIdentifier(identifier: IIdentifier, context: IContext): Promise<boolean>;
|
|
72
|
+
addKey({ identifier, key, options }: {
|
|
73
|
+
identifier: IIdentifier;
|
|
74
|
+
key: IKey;
|
|
75
|
+
options?: any;
|
|
76
|
+
}, context: IContext): Promise<any>;
|
|
77
|
+
addService({ identifier, service, options }: {
|
|
78
|
+
identifier: IIdentifier;
|
|
79
|
+
service: IService;
|
|
80
|
+
options?: any;
|
|
81
|
+
}, context: IContext): Promise<any>;
|
|
82
|
+
removeKey(args: {
|
|
83
|
+
identifier: IIdentifier;
|
|
84
|
+
kid: string;
|
|
85
|
+
options?: any;
|
|
86
|
+
}, context: IContext): Promise<any>;
|
|
87
|
+
removeService(args: {
|
|
88
|
+
identifier: IIdentifier;
|
|
89
|
+
id: string;
|
|
90
|
+
options?: any;
|
|
91
|
+
}, context: IContext): Promise<any>;
|
|
92
|
+
}
|
|
93
|
+
declare function defaultOydCmsmPublicKeyCallback(keyManager: KeyManager): (kid: string, kms?: string, create?: boolean, createKeyType?: TKeyType) => Promise<IKey>;
|
|
94
|
+
declare function defaultOydCmsmSignCallback(keyManager: KeyManager): (kid: string, data: string) => Promise<string>;
|
|
95
|
+
declare class DefaultOydCmsmCallbacks implements CMSMCallbackOpts {
|
|
96
|
+
private readonly keyManager;
|
|
97
|
+
constructor(keyManager: KeyManager);
|
|
98
|
+
publicKeyCallback(kid: string, kms?: string, create?: boolean, createKeyType?: TKeyType): Promise<IKey>;
|
|
99
|
+
signCallback(kid: string, value: string): Promise<string>;
|
|
100
|
+
}
|
|
101
|
+
|
|
102
|
+
/**
|
|
103
|
+
* Provides a mapping to a did:oyd resolver, usable by {@link did-resolver#Resolver}.
|
|
4
104
|
*
|
|
5
|
-
* @
|
|
105
|
+
* @public
|
|
6
106
|
*/
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
107
|
+
declare function getDidOydResolver(): {
|
|
108
|
+
oyd: DIDResolver;
|
|
109
|
+
};
|
|
110
|
+
|
|
111
|
+
export { type CMSMCallbackOpts, type CmsmOptions, DefaultOydCmsmCallbacks, type KeyUse, type OydConstructorOptions, type OydCreateIdentifierOptions, OydDIDProvider, type OydDidHoldKeysArgs, type OydDidSupportedKeyTypes, defaultOydCmsmPublicKeyCallback, defaultOydCmsmSignCallback, getDidOydResolver };
|