@sphereon/ssi-sdk-ext.did-provider-key 0.28.1-feature.esm.cjs.9 → 0.28.1-feature.jose.vcdm.19
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs +61 -30
- package/dist/index.cjs.map +1 -1
- package/dist/index.js +2 -2
- package/dist/index.js.map +1 -1
- package/package.json +8 -7
- package/src/SphereonKeyDidProvider.ts +2 -3
package/dist/index.cjs
CHANGED
|
@@ -1,15 +1,50 @@
|
|
|
1
|
-
"use strict";
|
|
1
|
+
"use strict";
|
|
2
|
+
var __create = Object.create;
|
|
3
|
+
var __defProp = Object.defineProperty;
|
|
4
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
5
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
6
|
+
var __getProtoOf = Object.getPrototypeOf;
|
|
7
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
2
8
|
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
|
9
|
+
var __export = (target, all) => {
|
|
10
|
+
for (var name in all)
|
|
11
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
12
|
+
};
|
|
13
|
+
var __copyProps = (to, from, except, desc) => {
|
|
14
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
15
|
+
for (let key of __getOwnPropNames(from))
|
|
16
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
17
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
18
|
+
}
|
|
19
|
+
return to;
|
|
20
|
+
};
|
|
21
|
+
var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
|
|
22
|
+
// If the importer is in node compatibility mode or this is not an ESM
|
|
23
|
+
// file that has been converted to a CommonJS file using a Babel-
|
|
24
|
+
// compatible transform (i.e. "__esModule" has not been set), then set
|
|
25
|
+
// "default" to the CommonJS "module.exports" for node compatibility.
|
|
26
|
+
isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
|
|
27
|
+
mod
|
|
28
|
+
));
|
|
29
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
30
|
+
|
|
31
|
+
// src/index.ts
|
|
32
|
+
var index_exports = {};
|
|
33
|
+
__export(index_exports, {
|
|
34
|
+
SphereonKeyDidProvider: () => SphereonKeyDidProvider,
|
|
35
|
+
getDidKeyResolver: () => getDidKeyResolver
|
|
36
|
+
});
|
|
37
|
+
module.exports = __toCommonJS(index_exports);
|
|
3
38
|
|
|
4
39
|
// src/SphereonKeyDidProvider.ts
|
|
5
|
-
var
|
|
6
|
-
var
|
|
7
|
-
var
|
|
8
|
-
var
|
|
9
|
-
var
|
|
10
|
-
var
|
|
11
|
-
var
|
|
12
|
-
var debug =
|
|
40
|
+
var import_ssi_sdk_ext = require("@sphereon/ssi-sdk-ext.key-utils");
|
|
41
|
+
var import_did_manager = require("@veramo/did-manager");
|
|
42
|
+
var import_debug = __toESM(require("debug"), 1);
|
|
43
|
+
var import_multibase = __toESM(require("multibase"), 1);
|
|
44
|
+
var import_multicodec = __toESM(require("multicodec"), 1);
|
|
45
|
+
var u8a = __toESM(require("uint8arrays"), 1);
|
|
46
|
+
var { fromString, toString } = u8a;
|
|
47
|
+
var debug = (0, import_debug.default)("did-provider-key");
|
|
13
48
|
var keyCodecs = {
|
|
14
49
|
RSA: "rsa-pub",
|
|
15
50
|
Ed25519: "ed25519-pub",
|
|
@@ -19,21 +54,21 @@ var keyCodecs = {
|
|
|
19
54
|
Bls12381G1: "bls12_381-g1-pub",
|
|
20
55
|
Bls12381G2: "bls12_381-g2-pub"
|
|
21
56
|
};
|
|
22
|
-
var SphereonKeyDidProvider = class extends
|
|
57
|
+
var SphereonKeyDidProvider = class extends import_did_manager.AbstractIdentifierProvider {
|
|
23
58
|
static {
|
|
24
59
|
__name(this, "SphereonKeyDidProvider");
|
|
25
60
|
}
|
|
26
|
-
|
|
61
|
+
kms;
|
|
27
62
|
constructor(options) {
|
|
28
63
|
super();
|
|
29
64
|
this.kms = options.defaultKms;
|
|
30
65
|
}
|
|
31
66
|
async createIdentifier({ kms, alias, options }, context) {
|
|
32
|
-
let codecName =
|
|
33
|
-
const keyType =
|
|
34
|
-
const key = await
|
|
67
|
+
let codecName = options?.codecName?.toUpperCase() === "EBSI" ? import_ssi_sdk_ext.JWK_JCS_PUB_NAME : options?.codecName;
|
|
68
|
+
const keyType = options?.type ?? options?.key?.type ?? (codecName === import_ssi_sdk_ext.JWK_JCS_PUB_NAME ? "Secp256r1" : "Secp256k1");
|
|
69
|
+
const key = await (0, import_ssi_sdk_ext.importProvidedOrGeneratedKey)({
|
|
35
70
|
// @ts-ignore
|
|
36
|
-
kms:
|
|
71
|
+
kms: kms ?? this.kms,
|
|
37
72
|
alias,
|
|
38
73
|
options: {
|
|
39
74
|
...options,
|
|
@@ -41,20 +76,20 @@ var SphereonKeyDidProvider = class extends _didmanager.AbstractIdentifierProvide
|
|
|
41
76
|
}
|
|
42
77
|
}, context);
|
|
43
78
|
let methodSpecificId;
|
|
44
|
-
const compressedPublicKeyHex =
|
|
45
|
-
if (codecName ===
|
|
46
|
-
const jwk =
|
|
47
|
-
use:
|
|
79
|
+
const compressedPublicKeyHex = (0, import_ssi_sdk_ext.toRawCompressedHexPublicKey)(fromString(key.publicKeyHex, "hex"), key.type);
|
|
80
|
+
if (codecName === import_ssi_sdk_ext.JWK_JCS_PUB_NAME) {
|
|
81
|
+
const jwk = (0, import_ssi_sdk_ext.toJwk)(key.publicKeyHex, keyType, {
|
|
82
|
+
use: import_ssi_sdk_ext.JwkKeyUse.Signature,
|
|
48
83
|
key,
|
|
49
84
|
noKidThumbprint: true
|
|
50
85
|
});
|
|
51
|
-
methodSpecificId =
|
|
86
|
+
methodSpecificId = toString(import_multibase.default.encode("base58btc", import_multicodec.default.addPrefix(fromString(import_ssi_sdk_ext.JWK_JCS_PUB_PREFIX.valueOf().toString(16), "hex"), (0, import_ssi_sdk_ext.jwkJcsEncode)(jwk))));
|
|
52
87
|
} else if (codecName) {
|
|
53
|
-
methodSpecificId =
|
|
88
|
+
methodSpecificId = toString(import_multibase.default.encode("base58btc", import_multicodec.default.addPrefix(codecName, fromString(compressedPublicKeyHex, "hex"))));
|
|
54
89
|
} else {
|
|
55
90
|
codecName = keyCodecs[keyType];
|
|
56
91
|
if (codecName) {
|
|
57
|
-
methodSpecificId =
|
|
92
|
+
methodSpecificId = toString(import_multibase.default.encode("base58btc", import_multicodec.default.addPrefix(codecName, fromString(compressedPublicKeyHex, "hex")))).toString();
|
|
58
93
|
}
|
|
59
94
|
}
|
|
60
95
|
if (!methodSpecificId) {
|
|
@@ -97,11 +132,11 @@ var SphereonKeyDidProvider = class extends _didmanager.AbstractIdentifierProvide
|
|
|
97
132
|
};
|
|
98
133
|
|
|
99
134
|
// src/KeyDidResolver.ts
|
|
100
|
-
var
|
|
101
|
-
var
|
|
135
|
+
var import_did_resolver = require("did-resolver");
|
|
136
|
+
var import_ssi_sdk_ext2 = require("@sphereon/ssi-sdk-ext.did-resolver-key");
|
|
102
137
|
var resolveDidKey = /* @__PURE__ */ __name(async (didUrl, _parsed, _resolver, options) => {
|
|
103
|
-
const resolver = new
|
|
104
|
-
...
|
|
138
|
+
const resolver = new import_did_resolver.Resolver({
|
|
139
|
+
...(0, import_ssi_sdk_ext2.getResolver)()
|
|
105
140
|
});
|
|
106
141
|
return resolver.resolve(didUrl, options);
|
|
107
142
|
}, "resolveDidKey");
|
|
@@ -111,8 +146,4 @@ function getDidKeyResolver() {
|
|
|
111
146
|
};
|
|
112
147
|
}
|
|
113
148
|
__name(getDidKeyResolver, "getDidKeyResolver");
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
exports.SphereonKeyDidProvider = SphereonKeyDidProvider; exports.getDidKeyResolver = getDidKeyResolver;
|
|
118
149
|
//# sourceMappingURL=index.cjs.map
|
package/dist/index.cjs.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["/home/runner/work/SSI-SDK-crypto-extensions/SSI-SDK-crypto-extensions/packages/did-provider-key/dist/index.cjs","../src/SphereonKeyDidProvider.ts","../src/KeyDidResolver.ts"],"names":["debug","Debug","keyCodecs","RSA","Ed25519","X25519","Secp256k1","Secp256r1","Bls12381G1","Bls12381G2","SphereonKeyDidProvider","AbstractIdentifierProvider","kms","constructor","options","defaultKms","createIdentifier","alias","context","codecName","toUpperCase","JWK_JCS_PUB_NAME","keyType","type","key","importProvidedOrGeneratedKey","methodSpecificId","compressedPublicKeyHex","toRawCompressedHexPublicKey","fromString","publicKeyHex","jwk","toJwk","use","JwkKeyUse","Signature","noKidThumbprint","toString","Multibase","encode","Multicodec","addPrefix","JWK_JCS_PUB_PREFIX","valueOf","jwkJcsEncode","Error","identifier","did","kid","keys","keyManagerDelete","service","getResolver","getDidKeyResolver","resolveDidKey"],"mappings":"AAAA,qxBAAI,UAAU,EAAE,MAAM,CAAC,cAAc;AACrC,IAAI,OAAO,EAAE,CAAC,MAAM,EAAE,KAAK,EAAE,GAAG,SAAS,CAAC,MAAM,EAAE,MAAM,EAAE,EAAE,KAAK,EAAE,YAAY,EAAE,KAAK,CAAC,CAAC;AACxF;AACA;ACHA,oEASO;AAEP,iDAA2C;AAC3C,4EAAkB;AAClB,4FAAsB;AACtB,gGAAuB;AAEvB,qDAA2B;AAE3B,iDAAyB;AAEzB,IAAMA,MAAAA,EAAQC,6BAAAA,kBAAM,CAAA;AAIpB,IAAMC,UAAAA,EAAY;ADXlB,ECYEC,GAAAA,EAAK,SAAA;ADXP,ECYEC,OAAAA,EAAS,aAAA;ADXX,ECYEC,MAAAA,EAAQ,YAAA;ADXV,ECYEC,SAAAA,EAAW,eAAA;ADXb,ECYEC,SAAAA,EAAW,UAAA;ADXb,ECYEC,UAAAA,EAAY,kBAAA;ADXd,ECYEC,UAAAA,EAAY;AACd,CAAA;AAEO,IAAMC,uBAAAA,EAAN,MAAA,QAAqCC,uCAAAA;ADZ5C,ECtBA,OAkC4CA;ADX5C,IAAI,MAAM,CAAC,IAAI,EAAE,wBAAwB,CAAC;AAC1C,EAAE;AACF,ECUmBC;ADTnB,ECWEC,WAAAA,CAAYC,OAAAA,EAAkC;AAC5C,IAAA,KAAA,CAAK,CAAA;AACL,IAAA,IAAA,CAAKF,IAAAA,EAAME,OAAAA,CAAQC,UAAAA;ADVvB,ECWE;ADVF,ECYE,MAAMC,gBAAAA,CACJ,EACEJ,GAAAA,EACAK,KAAAA,EACAH,QAAO,CAAA,EAaTI,OAAAA,EACwC;AACxC,IAAA,IAAIC,UAAAA,kBAAaL,OAAAA,2BAASK,SAAAA,6BAAWC,WAAAA,mBAAAA,IAAAA,IAAkB,OAAA,EAAUC,oCAAAA,kBAA4CP,OAAAA,6BAASK,WAAAA;AAGtH,IAAA,MAAMG,QAAAA,oDAAWR,OAAAA,6BAASS,MAAAA,0BAAQT,OAAAA,6BAASU,GAAAA,6BAAKD,QAAAA,UAAAA,CAASJ,UAAAA,IAAcE,oCAAAA,EAAmB,YAAA,EAAc,WAAA,GAAA;AAMxG,IAAA,MAAMG,IAAAA,EAAM,MAAMC,6DAAAA;ADpCtB;AACA,MCsCQb,GAAAA,mBAAKA,GAAAA,UAAO,IAAA,CAAKA,KAAAA;ADrCzB,MCsCQK,KAAAA;ADrCR,MCsCQH,OAAAA,EAAS;ADrCjB,QCqCmB,GAAGA,OAAAA;ADpCtB,QCoC+BS,IAAAA,EAAMD;ADnCrC,MCmC6C;ADlC7C,ICmCM,CAAA,EACAJ,OAAAA,CAAAA;AAGF,IAAA,IAAIQ,gBAAAA;AAGJ,IAAA,MAAMC,uBAAAA,EAAyBC,4DAAAA,oCAA4BC,GAAWL,CAAIM,YAAAA,EAAc,KAAA,CAAA,EAAQN,GAAAA,CAAID,IAAI,CAAA;AACxG,IAAA,GAAA,CAAIJ,UAAAA,IAAcE,mCAAAA,EAAkB;AAClC,MAAA,MAAMU,IAAAA,EAAMC,sCAAAA,GAAMR,CAAIM,YAAAA,EAAcR,OAAAA,EAAS;ADvCnD,QCuCqDW,GAAAA,EAAKC,4BAAAA,CAAUC,SAAAA;ADtCpE,QCsC+EX,GAAAA;ADrC/E,QCqCoFY,eAAAA,EAAiB;ADpCrG,MCoC0G,CAAA,CAAA;AAEpGV,MAAAA,iBAAAA,EAAmBW,gCAAAA,mBACjBC,CAAUC,MAAAA,CAAO,WAAA,EAAaC,oBAAAA,CAAWC,SAAAA,CAAUZ,oCAAAA,qCAAWa,CAAmBC,OAAAA,CAAO,CAAA,CAAGN,QAAAA,CAAS,EAAA,CAAA,EAAK,KAAA,CAAA,EAAQO,6CAAAA,GAAab,CAAAA,CAAAA,CAAAA,CAAAA;ADrCtI,ICuCI,EAAA,KAAA,GAAA,CAAWZ,SAAAA,EAAW;AACpBO,MAAAA,iBAAAA,EAAmBW,gCAAAA,mBACjBC,CAAUC,MAAAA,CAAO,WAAA,EAAaC,oBAAAA,CAAWC,SAAAA,CAAUtB,SAAAA,EAAmCU,oCAAAA,sBAAWF,EAAwB,KAAA,CAAA,CAAA,CAAA,CAAA;ADvCjI,ICyCI,EAAA,KAAO;AACLR,MAAAA,UAAAA,EAAYjB,SAAAA,CAAUoB,OAAAA,CAAAA;AAEtB,MAAA,GAAA,CAAIH,SAAAA,EAAW;AAEbO,QAAAA,iBAAAA,EAAmBW,gCAAAA,mBACjBC,CAAUC,MAAAA,CAAO,WAAA,EAAaC,oBAAAA,CAAWC,SAAAA,CAAUtB,SAAAA,EAAmCU,oCAAAA,sBAAWF,EAAwB,KAAA,CAAA,CAAA,CAAA,CAAA,CACzHU,QAAAA,CAAQ,CAAA;AD5ClB,MC6CM;AD5CN,IC6CI;AACA,IAAA,GAAA,CAAI,CAACX,gBAAAA,EAAkB;AACrB,MAAA,MAAMmB,KAAAA,CAAM,CAAA,SAAA,EAAYvB,OAAAA,CAAAA,QAAAA,EAAkBH,SAAAA,CAAAA,uCAAAA,CAAkD,CAAA;AD5ClG,IC6CI;AACA,IAAA,MAAM2B,WAAAA,EAA4C;AD5CtD,MC6CMC,GAAAA,EAAK,CAAA,QAAA,EAAWrB,gBAAAA,CAAAA,CAAAA;AACKsB,MAAAA;AACf,MAAA;AAACxB,QAAAA;AD3C0B,MAAA;AC4CvB,MAAA;AACZ,IAAA;AAC+B,IAAA;AACxBsB,IAAAA;AACT,EAAA;AAIE5B,EAAAA;AAEgB,IAAA;AAClB,EAAA;AAEgDA,EAAAA;AACb+B,IAAAA;AACXC,MAAAA;AAAmBF,QAAAA;AAAI,MAAA;AAC7C,IAAA;AACO,IAAA;AACT,EAAA;AAEgClC,EAAAA;AAClB,IAAA;AACd,EAAA;AAE+BqC,EAAAA;AACjB,IAAA;AACd,EAAA;AAEgH,EAAA;AAClG,IAAA;AACd,EAAA;AAEmH,EAAA;AACrG,IAAA;AACd,EAAA;AACF;ADjDuC;AACA;AElGiE;AAC5E;AAEO;AAMH,EAAA;AAAKC,IAAAA;AAAc,EAAA;AACjBtC,EAAAA;AAPC;AAUnBuC;AACP,EAAA;AAAOC,IAAAA;AAAc,EAAA;AAC9B;AAFgBD;AFoGuB;AACA;AACA;AACA","file":"/home/runner/work/SSI-SDK-crypto-extensions/SSI-SDK-crypto-extensions/packages/did-provider-key/dist/index.cjs","sourcesContent":[null,"import {\n importProvidedOrGeneratedKey,\n JWK_JCS_PUB_NAME,\n JWK_JCS_PUB_PREFIX,\n jwkJcsEncode,\n JwkKeyUse,\n TKeyType,\n toJwk,\n toRawCompressedHexPublicKey,\n} from '@sphereon/ssi-sdk-ext.key-utils'\nimport { IAgentContext, IIdentifier, IKey, IKeyManager, IService } from '@veramo/core'\nimport { AbstractIdentifierProvider } from '@veramo/did-manager'\nimport Debug from 'debug'\nimport Multibase from 'multibase'\nimport Multicodec from 'multicodec'\n// @ts-ignore\nimport { fromString } from 'uint8arrays/from-string'\n// @ts-ignore\nimport { toString } from 'uint8arrays/to-string'\n\nconst debug = Debug('did-provider-key')\n\ntype IContext = IAgentContext<IKeyManager>\n\nconst keyCodecs = {\n RSA: 'rsa-pub',\n Ed25519: 'ed25519-pub',\n X25519: 'x25519-pub',\n Secp256k1: 'secp256k1-pub',\n Secp256r1: 'p256-pub',\n Bls12381G1: 'bls12_381-g1-pub',\n Bls12381G2: 'bls12_381-g2-pub',\n} as const\n\nexport class SphereonKeyDidProvider extends AbstractIdentifierProvider {\n private readonly kms?: string\n\n constructor(options: { defaultKms?: string }) {\n super()\n this.kms = options.defaultKms\n }\n\n async createIdentifier(\n {\n kms,\n alias,\n options,\n }: {\n kms?: string\n alias?: string\n options?: {\n type?: TKeyType\n codecName?: 'EBSI' | 'jwk_jcs-pub' | Multicodec.CodecName\n key?: {\n type?: Exclude<TKeyType, 'Secp384r1' | 'Secp521r1'>\n privateKeyHex: string\n }\n }\n },\n context: IContext\n ): Promise<Omit<IIdentifier, 'provider'>> {\n let codecName = (options?.codecName?.toUpperCase() === 'EBSI' ? (JWK_JCS_PUB_NAME as Multicodec.CodecName) : options?.codecName) as\n | CodeNameType\n | undefined\n const keyType = (options?.type ?? options?.key?.type ?? (codecName === JWK_JCS_PUB_NAME ? 'Secp256r1' : 'Secp256k1')) as Exclude<\n TKeyType,\n 'Secp384r1' | 'Secp521r1'\n >\n // console.log(`keytype: ${keyType}, codecName: ${codecName}`)\n\n const key = await importProvidedOrGeneratedKey(\n {\n // @ts-ignore\n kms: kms ?? this.kms,\n alias: alias,\n options: { ...options, type: keyType },\n },\n context\n )\n\n let methodSpecificId: string | undefined\n\n // did:key uses compressed pub keys\n const compressedPublicKeyHex = toRawCompressedHexPublicKey(fromString(key.publicKeyHex, 'hex'), key.type)\n if (codecName === JWK_JCS_PUB_NAME) {\n const jwk = toJwk(key.publicKeyHex, keyType, { use: JwkKeyUse.Signature, key, noKidThumbprint: true })\n // console.log(`FIXME JWK: ${JSON.stringify(toJwk(privateKeyHex, keyType, { use: JwkKeyUse.Signature, key, isPrivateKey: true }), null, 2)}`)\n methodSpecificId = toString(\n Multibase.encode('base58btc', Multicodec.addPrefix(fromString(JWK_JCS_PUB_PREFIX.valueOf().toString(16), 'hex'), jwkJcsEncode(jwk)))\n )\n } else if (codecName) {\n methodSpecificId = toString(\n Multibase.encode('base58btc', Multicodec.addPrefix(codecName as Multicodec.CodecName, fromString(compressedPublicKeyHex, 'hex')))\n )\n } else {\n codecName = keyCodecs[keyType]\n\n if (codecName) {\n // methodSpecificId = bytesToMultibase({bytes: u8a.fromString(key.publicKeyHex, 'hex'), codecName})\n methodSpecificId = toString(\n Multibase.encode('base58btc', Multicodec.addPrefix(codecName as Multicodec.CodecName, fromString(compressedPublicKeyHex, 'hex')))\n ).toString()\n }\n }\n if (!methodSpecificId) {\n throw Error(`Key type ${keyType}, codec ${codecName} is not supported currently for did:key`)\n }\n const identifier: Omit<IIdentifier, 'provider'> = {\n did: `did:key:${methodSpecificId}`,\n controllerKeyId: key.kid,\n keys: [key],\n services: [],\n }\n debug('Created', identifier.did)\n return identifier\n }\n\n async updateIdentifier(\n args: { did: string; kms?: string | undefined; alias?: string | undefined; options?: any },\n context: IAgentContext<IKeyManager>\n ): Promise<IIdentifier> {\n throw new Error('KeyDIDProvider updateIdentifier not supported yet.')\n }\n\n async deleteIdentifier(identifier: IIdentifier, context: IContext): Promise<boolean> {\n for (const { kid } of identifier.keys) {\n await context.agent.keyManagerDelete({ kid })\n }\n return true\n }\n\n async addKey({ identifier, key, options }: { identifier: IIdentifier; key: IKey; options?: any }, context: IContext): Promise<any> {\n throw Error('KeyDIDProvider addKey not supported')\n }\n\n async addService({ identifier, service, options }: { identifier: IIdentifier; service: IService; options?: any }, context: IContext): Promise<any> {\n throw Error('KeyDIDProvider addService not supported')\n }\n\n async removeKey(args: { identifier: IIdentifier; kid: string; options?: any }, context: IContext): Promise<any> {\n throw Error('KeyDIDProvider removeKey not supported')\n }\n\n async removeService(args: { identifier: IIdentifier; id: string; options?: any }, context: IContext): Promise<any> {\n throw Error('KeyDIDProvider removeService not supported')\n }\n}\n\ntype CodeNameType = Multicodec.CodecName | 'rsa-pub' | 'jwk_jcs-pub'\n","import { DIDResolutionOptions, DIDResolutionResult, DIDResolver, ParsedDID, Resolvable, Resolver } from 'did-resolver'\nimport { getResolver } from '@sphereon/ssi-sdk-ext.did-resolver-key'\n\nconst resolveDidKey: DIDResolver = async (\n didUrl: string,\n _parsed: ParsedDID,\n _resolver: Resolvable,\n options: DIDResolutionOptions\n): Promise<DIDResolutionResult> => {\n const resolver = new Resolver({ ...getResolver() })\n return resolver.resolve(didUrl, options)\n}\n\nexport function getDidKeyResolver() {\n return { key: resolveDidKey }\n}\n"]}
|
|
1
|
+
{"version":3,"sources":["../src/index.ts","../src/SphereonKeyDidProvider.ts","../src/KeyDidResolver.ts"],"sourcesContent":["export { SphereonKeyDidProvider } from './SphereonKeyDidProvider'\nexport { getDidKeyResolver } from './KeyDidResolver'\n","import {\n importProvidedOrGeneratedKey,\n JWK_JCS_PUB_NAME,\n JWK_JCS_PUB_PREFIX,\n jwkJcsEncode,\n JwkKeyUse,\n TKeyType,\n toJwk,\n toRawCompressedHexPublicKey,\n} from '@sphereon/ssi-sdk-ext.key-utils'\nimport { IAgentContext, IIdentifier, IKey, IKeyManager, IService } from '@veramo/core'\nimport { AbstractIdentifierProvider } from '@veramo/did-manager'\nimport Debug from 'debug'\nimport Multibase from 'multibase'\nimport Multicodec from 'multicodec'\n// @ts-ignore\nimport * as u8a from 'uint8arrays'\nconst { fromString, toString } = u8a\n\nconst debug = Debug('did-provider-key')\n\ntype IContext = IAgentContext<IKeyManager>\n\nconst keyCodecs = {\n RSA: 'rsa-pub',\n Ed25519: 'ed25519-pub',\n X25519: 'x25519-pub',\n Secp256k1: 'secp256k1-pub',\n Secp256r1: 'p256-pub',\n Bls12381G1: 'bls12_381-g1-pub',\n Bls12381G2: 'bls12_381-g2-pub',\n} as const\n\nexport class SphereonKeyDidProvider extends AbstractIdentifierProvider {\n private readonly kms?: string\n\n constructor(options: { defaultKms?: string }) {\n super()\n this.kms = options.defaultKms\n }\n\n async createIdentifier(\n {\n kms,\n alias,\n options,\n }: {\n kms?: string\n alias?: string\n options?: {\n type?: TKeyType\n codecName?: 'EBSI' | 'jwk_jcs-pub' | Multicodec.CodecName\n key?: {\n type?: Exclude<TKeyType, 'Secp384r1' | 'Secp521r1'>\n privateKeyHex: string\n }\n }\n },\n context: IContext\n ): Promise<Omit<IIdentifier, 'provider'>> {\n let codecName = (options?.codecName?.toUpperCase() === 'EBSI' ? (JWK_JCS_PUB_NAME as Multicodec.CodecName) : options?.codecName) as\n | CodeNameType\n | undefined\n const keyType = (options?.type ?? options?.key?.type ?? (codecName === JWK_JCS_PUB_NAME ? 'Secp256r1' : 'Secp256k1')) as Exclude<\n TKeyType,\n 'Secp384r1' | 'Secp521r1'\n >\n // console.log(`keytype: ${keyType}, codecName: ${codecName}`)\n\n const key = await importProvidedOrGeneratedKey(\n {\n // @ts-ignore\n kms: kms ?? this.kms,\n alias: alias,\n options: { ...options, type: keyType },\n },\n context\n )\n\n let methodSpecificId: string | undefined\n\n // did:key uses compressed pub keys\n const compressedPublicKeyHex = toRawCompressedHexPublicKey(fromString(key.publicKeyHex, 'hex'), key.type)\n if (codecName === JWK_JCS_PUB_NAME) {\n const jwk = toJwk(key.publicKeyHex, keyType, { use: JwkKeyUse.Signature, key, noKidThumbprint: true })\n // console.log(`FIXME JWK: ${JSON.stringify(toJwk(privateKeyHex, keyType, { use: JwkKeyUse.Signature, key, isPrivateKey: true }), null, 2)}`)\n methodSpecificId = toString(\n Multibase.encode('base58btc', Multicodec.addPrefix(fromString(JWK_JCS_PUB_PREFIX.valueOf().toString(16), 'hex'), jwkJcsEncode(jwk)))\n )\n } else if (codecName) {\n methodSpecificId = toString(\n Multibase.encode('base58btc', Multicodec.addPrefix(codecName as Multicodec.CodecName, fromString(compressedPublicKeyHex, 'hex')))\n )\n } else {\n codecName = keyCodecs[keyType]\n\n if (codecName) {\n // methodSpecificId = bytesToMultibase({bytes: u8a.fromString(key.publicKeyHex, 'hex'), codecName})\n methodSpecificId = toString(\n Multibase.encode('base58btc', Multicodec.addPrefix(codecName as Multicodec.CodecName, fromString(compressedPublicKeyHex, 'hex')))\n ).toString()\n }\n }\n if (!methodSpecificId) {\n throw Error(`Key type ${keyType}, codec ${codecName} is not supported currently for did:key`)\n }\n const identifier: Omit<IIdentifier, 'provider'> = {\n did: `did:key:${methodSpecificId}`,\n controllerKeyId: key.kid,\n keys: [key],\n services: [],\n }\n debug('Created', identifier.did)\n return identifier\n }\n\n async updateIdentifier(\n args: { did: string; kms?: string | undefined; alias?: string | undefined; options?: any },\n context: IAgentContext<IKeyManager>\n ): Promise<IIdentifier> {\n throw new Error('KeyDIDProvider updateIdentifier not supported yet.')\n }\n\n async deleteIdentifier(identifier: IIdentifier, context: IContext): Promise<boolean> {\n for (const { kid } of identifier.keys) {\n await context.agent.keyManagerDelete({ kid })\n }\n return true\n }\n\n async addKey({ identifier, key, options }: { identifier: IIdentifier; key: IKey; options?: any }, context: IContext): Promise<any> {\n throw Error('KeyDIDProvider addKey not supported')\n }\n\n async addService({ identifier, service, options }: { identifier: IIdentifier; service: IService; options?: any }, context: IContext): Promise<any> {\n throw Error('KeyDIDProvider addService not supported')\n }\n\n async removeKey(args: { identifier: IIdentifier; kid: string; options?: any }, context: IContext): Promise<any> {\n throw Error('KeyDIDProvider removeKey not supported')\n }\n\n async removeService(args: { identifier: IIdentifier; id: string; options?: any }, context: IContext): Promise<any> {\n throw Error('KeyDIDProvider removeService not supported')\n }\n}\n\ntype CodeNameType = Multicodec.CodecName | 'rsa-pub' | 'jwk_jcs-pub'\n","import { DIDResolutionOptions, DIDResolutionResult, DIDResolver, ParsedDID, Resolvable, Resolver } from 'did-resolver'\nimport { getResolver } from '@sphereon/ssi-sdk-ext.did-resolver-key'\n\nconst resolveDidKey: DIDResolver = async (\n didUrl: string,\n _parsed: ParsedDID,\n _resolver: Resolvable,\n options: DIDResolutionOptions\n): Promise<DIDResolutionResult> => {\n const resolver = new Resolver({ ...getResolver() })\n return resolver.resolve(didUrl, options)\n}\n\nexport function getDidKeyResolver() {\n return { key: resolveDidKey }\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;;;;;;;;ACAA,yBASO;AAEP,yBAA2C;AAC3C,mBAAkB;AAClB,uBAAsB;AACtB,wBAAuB;AAEvB,UAAqB;AACrB,IAAM,EAAEA,YAAYC,SAAQ,IAAKC;AAEjC,IAAMC,YAAQC,aAAAA,SAAM,kBAAA;AAIpB,IAAMC,YAAY;EAChBC,KAAK;EACLC,SAAS;EACTC,QAAQ;EACRC,WAAW;EACXC,WAAW;EACXC,YAAY;EACZC,YAAY;AACd;AAEO,IAAMC,yBAAN,cAAqCC,8CAAAA;EAjC5C,OAiC4CA;;;EACzBC;EAEjBC,YAAYC,SAAkC;AAC5C,UAAK;AACL,SAAKF,MAAME,QAAQC;EACrB;EAEA,MAAMC,iBACJ,EACEJ,KACAK,OACAH,QAAO,GAaTI,SACwC;AACxC,QAAIC,YAAaL,SAASK,WAAWC,YAAAA,MAAkB,SAAUC,sCAA4CP,SAASK;AAGtH,UAAMG,UAAWR,SAASS,QAAQT,SAASU,KAAKD,SAASJ,cAAcE,sCAAmB,cAAc;AAMxG,UAAMG,MAAM,UAAMC,iDAChB;;MAEEb,KAAKA,OAAO,KAAKA;MACjBK;MACAH,SAAS;QAAE,GAAGA;QAASS,MAAMD;MAAQ;IACvC,GACAJ,OAAAA;AAGF,QAAIQ;AAGJ,UAAMC,6BAAyBC,gDAA4B/B,WAAW2B,IAAIK,cAAc,KAAA,GAAQL,IAAID,IAAI;AACxG,QAAIJ,cAAcE,qCAAkB;AAClC,YAAMS,UAAMC,0BAAMP,IAAIK,cAAcP,SAAS;QAAEU,KAAKC,6BAAUC;QAAWV;QAAKW,iBAAiB;MAAK,CAAA;AAEpGT,yBAAmB5B,SACjBsC,iBAAAA,QAAUC,OAAO,aAAaC,kBAAAA,QAAWC,UAAU1C,WAAW2C,sCAAmBC,QAAO,EAAG3C,SAAS,EAAA,GAAK,KAAA,OAAQ4C,iCAAaZ,GAAAA,CAAAA,CAAAA,CAAAA;IAElI,WAAWX,WAAW;AACpBO,yBAAmB5B,SACjBsC,iBAAAA,QAAUC,OAAO,aAAaC,kBAAAA,QAAWC,UAAUpB,WAAmCtB,WAAW8B,wBAAwB,KAAA,CAAA,CAAA,CAAA;IAE7H,OAAO;AACLR,kBAAYjB,UAAUoB,OAAAA;AAEtB,UAAIH,WAAW;AAEbO,2BAAmB5B,SACjBsC,iBAAAA,QAAUC,OAAO,aAAaC,kBAAAA,QAAWC,UAAUpB,WAAmCtB,WAAW8B,wBAAwB,KAAA,CAAA,CAAA,CAAA,EACzH7B,SAAQ;MACZ;IACF;AACA,QAAI,CAAC4B,kBAAkB;AACrB,YAAMiB,MAAM,YAAYrB,OAAAA,WAAkBH,SAAAA,yCAAkD;IAC9F;AACA,UAAMyB,aAA4C;MAChDC,KAAK,WAAWnB,gBAAAA;MAChBoB,iBAAiBtB,IAAIuB;MACrBC,MAAM;QAACxB;;MACPyB,UAAU,CAAA;IACZ;AACAjD,UAAM,WAAW4C,WAAWC,GAAG;AAC/B,WAAOD;EACT;EAEA,MAAMM,iBACJC,MACAjC,SACsB;AACtB,UAAM,IAAIyB,MAAM,oDAAA;EAClB;EAEA,MAAMS,iBAAiBR,YAAyB1B,SAAqC;AACnF,eAAW,EAAE6B,IAAG,KAAMH,WAAWI,MAAM;AACrC,YAAM9B,QAAQmC,MAAMC,iBAAiB;QAAEP;MAAI,CAAA;IAC7C;AACA,WAAO;EACT;EAEA,MAAMQ,OAAO,EAAEX,YAAYpB,KAAKV,QAAO,GAA2DI,SAAiC;AACjI,UAAMyB,MAAM,qCAAA;EACd;EAEA,MAAMa,WAAW,EAAEZ,YAAYa,SAAS3C,QAAO,GAAmEI,SAAiC;AACjJ,UAAMyB,MAAM,yCAAA;EACd;EAEA,MAAMe,UAAUP,MAA+DjC,SAAiC;AAC9G,UAAMyB,MAAM,wCAAA;EACd;EAEA,MAAMgB,cAAcR,MAA8DjC,SAAiC;AACjH,UAAMyB,MAAM,4CAAA;EACd;AACF;;;ACjJA,0BAAwG;AACxG,IAAAiB,sBAA4B;AAE5B,IAAMC,gBAA6B,8BACjCC,QACAC,SACAC,WACAC,YAAAA;AAEA,QAAMC,WAAW,IAAIC,6BAAS;IAAE,OAAGC,iCAAAA;EAAc,CAAA;AACjD,SAAOF,SAASG,QAAQP,QAAQG,OAAAA;AAClC,GARmC;AAU5B,SAASK,oBAAAA;AACd,SAAO;IAAEC,KAAKV;EAAc;AAC9B;AAFgBS;","names":["fromString","toString","u8a","debug","Debug","keyCodecs","RSA","Ed25519","X25519","Secp256k1","Secp256r1","Bls12381G1","Bls12381G2","SphereonKeyDidProvider","AbstractIdentifierProvider","kms","constructor","options","defaultKms","createIdentifier","alias","context","codecName","toUpperCase","JWK_JCS_PUB_NAME","keyType","type","key","importProvidedOrGeneratedKey","methodSpecificId","compressedPublicKeyHex","toRawCompressedHexPublicKey","publicKeyHex","jwk","toJwk","use","JwkKeyUse","Signature","noKidThumbprint","Multibase","encode","Multicodec","addPrefix","JWK_JCS_PUB_PREFIX","valueOf","jwkJcsEncode","Error","identifier","did","controllerKeyId","kid","keys","services","updateIdentifier","args","deleteIdentifier","agent","keyManagerDelete","addKey","addService","service","removeKey","removeService","import_ssi_sdk_ext","resolveDidKey","didUrl","_parsed","_resolver","options","resolver","Resolver","getResolver","resolve","getDidKeyResolver","key"]}
|
package/dist/index.js
CHANGED
|
@@ -7,8 +7,8 @@ import { AbstractIdentifierProvider } from "@veramo/did-manager";
|
|
|
7
7
|
import Debug from "debug";
|
|
8
8
|
import Multibase from "multibase";
|
|
9
9
|
import Multicodec from "multicodec";
|
|
10
|
-
import
|
|
11
|
-
|
|
10
|
+
import * as u8a from "uint8arrays";
|
|
11
|
+
var { fromString, toString } = u8a;
|
|
12
12
|
var debug = Debug("did-provider-key");
|
|
13
13
|
var keyCodecs = {
|
|
14
14
|
RSA: "rsa-pub",
|
package/dist/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/SphereonKeyDidProvider.ts","../src/KeyDidResolver.ts"],"sourcesContent":["import {\n importProvidedOrGeneratedKey,\n JWK_JCS_PUB_NAME,\n JWK_JCS_PUB_PREFIX,\n jwkJcsEncode,\n JwkKeyUse,\n TKeyType,\n toJwk,\n toRawCompressedHexPublicKey,\n} from '@sphereon/ssi-sdk-ext.key-utils'\nimport { IAgentContext, IIdentifier, IKey, IKeyManager, IService } from '@veramo/core'\nimport { AbstractIdentifierProvider } from '@veramo/did-manager'\nimport Debug from 'debug'\nimport Multibase from 'multibase'\nimport Multicodec from 'multicodec'\n// @ts-ignore\nimport
|
|
1
|
+
{"version":3,"sources":["../src/SphereonKeyDidProvider.ts","../src/KeyDidResolver.ts"],"sourcesContent":["import {\n importProvidedOrGeneratedKey,\n JWK_JCS_PUB_NAME,\n JWK_JCS_PUB_PREFIX,\n jwkJcsEncode,\n JwkKeyUse,\n TKeyType,\n toJwk,\n toRawCompressedHexPublicKey,\n} from '@sphereon/ssi-sdk-ext.key-utils'\nimport { IAgentContext, IIdentifier, IKey, IKeyManager, IService } from '@veramo/core'\nimport { AbstractIdentifierProvider } from '@veramo/did-manager'\nimport Debug from 'debug'\nimport Multibase from 'multibase'\nimport Multicodec from 'multicodec'\n// @ts-ignore\nimport * as u8a from 'uint8arrays'\nconst { fromString, toString } = u8a\n\nconst debug = Debug('did-provider-key')\n\ntype IContext = IAgentContext<IKeyManager>\n\nconst keyCodecs = {\n RSA: 'rsa-pub',\n Ed25519: 'ed25519-pub',\n X25519: 'x25519-pub',\n Secp256k1: 'secp256k1-pub',\n Secp256r1: 'p256-pub',\n Bls12381G1: 'bls12_381-g1-pub',\n Bls12381G2: 'bls12_381-g2-pub',\n} as const\n\nexport class SphereonKeyDidProvider extends AbstractIdentifierProvider {\n private readonly kms?: string\n\n constructor(options: { defaultKms?: string }) {\n super()\n this.kms = options.defaultKms\n }\n\n async createIdentifier(\n {\n kms,\n alias,\n options,\n }: {\n kms?: string\n alias?: string\n options?: {\n type?: TKeyType\n codecName?: 'EBSI' | 'jwk_jcs-pub' | Multicodec.CodecName\n key?: {\n type?: Exclude<TKeyType, 'Secp384r1' | 'Secp521r1'>\n privateKeyHex: string\n }\n }\n },\n context: IContext\n ): Promise<Omit<IIdentifier, 'provider'>> {\n let codecName = (options?.codecName?.toUpperCase() === 'EBSI' ? (JWK_JCS_PUB_NAME as Multicodec.CodecName) : options?.codecName) as\n | CodeNameType\n | undefined\n const keyType = (options?.type ?? options?.key?.type ?? (codecName === JWK_JCS_PUB_NAME ? 'Secp256r1' : 'Secp256k1')) as Exclude<\n TKeyType,\n 'Secp384r1' | 'Secp521r1'\n >\n // console.log(`keytype: ${keyType}, codecName: ${codecName}`)\n\n const key = await importProvidedOrGeneratedKey(\n {\n // @ts-ignore\n kms: kms ?? this.kms,\n alias: alias,\n options: { ...options, type: keyType },\n },\n context\n )\n\n let methodSpecificId: string | undefined\n\n // did:key uses compressed pub keys\n const compressedPublicKeyHex = toRawCompressedHexPublicKey(fromString(key.publicKeyHex, 'hex'), key.type)\n if (codecName === JWK_JCS_PUB_NAME) {\n const jwk = toJwk(key.publicKeyHex, keyType, { use: JwkKeyUse.Signature, key, noKidThumbprint: true })\n // console.log(`FIXME JWK: ${JSON.stringify(toJwk(privateKeyHex, keyType, { use: JwkKeyUse.Signature, key, isPrivateKey: true }), null, 2)}`)\n methodSpecificId = toString(\n Multibase.encode('base58btc', Multicodec.addPrefix(fromString(JWK_JCS_PUB_PREFIX.valueOf().toString(16), 'hex'), jwkJcsEncode(jwk)))\n )\n } else if (codecName) {\n methodSpecificId = toString(\n Multibase.encode('base58btc', Multicodec.addPrefix(codecName as Multicodec.CodecName, fromString(compressedPublicKeyHex, 'hex')))\n )\n } else {\n codecName = keyCodecs[keyType]\n\n if (codecName) {\n // methodSpecificId = bytesToMultibase({bytes: u8a.fromString(key.publicKeyHex, 'hex'), codecName})\n methodSpecificId = toString(\n Multibase.encode('base58btc', Multicodec.addPrefix(codecName as Multicodec.CodecName, fromString(compressedPublicKeyHex, 'hex')))\n ).toString()\n }\n }\n if (!methodSpecificId) {\n throw Error(`Key type ${keyType}, codec ${codecName} is not supported currently for did:key`)\n }\n const identifier: Omit<IIdentifier, 'provider'> = {\n did: `did:key:${methodSpecificId}`,\n controllerKeyId: key.kid,\n keys: [key],\n services: [],\n }\n debug('Created', identifier.did)\n return identifier\n }\n\n async updateIdentifier(\n args: { did: string; kms?: string | undefined; alias?: string | undefined; options?: any },\n context: IAgentContext<IKeyManager>\n ): Promise<IIdentifier> {\n throw new Error('KeyDIDProvider updateIdentifier not supported yet.')\n }\n\n async deleteIdentifier(identifier: IIdentifier, context: IContext): Promise<boolean> {\n for (const { kid } of identifier.keys) {\n await context.agent.keyManagerDelete({ kid })\n }\n return true\n }\n\n async addKey({ identifier, key, options }: { identifier: IIdentifier; key: IKey; options?: any }, context: IContext): Promise<any> {\n throw Error('KeyDIDProvider addKey not supported')\n }\n\n async addService({ identifier, service, options }: { identifier: IIdentifier; service: IService; options?: any }, context: IContext): Promise<any> {\n throw Error('KeyDIDProvider addService not supported')\n }\n\n async removeKey(args: { identifier: IIdentifier; kid: string; options?: any }, context: IContext): Promise<any> {\n throw Error('KeyDIDProvider removeKey not supported')\n }\n\n async removeService(args: { identifier: IIdentifier; id: string; options?: any }, context: IContext): Promise<any> {\n throw Error('KeyDIDProvider removeService not supported')\n }\n}\n\ntype CodeNameType = Multicodec.CodecName | 'rsa-pub' | 'jwk_jcs-pub'\n","import { DIDResolutionOptions, DIDResolutionResult, DIDResolver, ParsedDID, Resolvable, Resolver } from 'did-resolver'\nimport { getResolver } from '@sphereon/ssi-sdk-ext.did-resolver-key'\n\nconst resolveDidKey: DIDResolver = async (\n didUrl: string,\n _parsed: ParsedDID,\n _resolver: Resolvable,\n options: DIDResolutionOptions\n): Promise<DIDResolutionResult> => {\n const resolver = new Resolver({ ...getResolver() })\n return resolver.resolve(didUrl, options)\n}\n\nexport function getDidKeyResolver() {\n return { key: resolveDidKey }\n}\n"],"mappings":";;;;AAAA,SACEA,8BACAC,kBACAC,oBACAC,cACAC,WAEAC,OACAC,mCACK;AAEP,SAASC,kCAAkC;AAC3C,OAAOC,WAAW;AAClB,OAAOC,eAAe;AACtB,OAAOC,gBAAgB;AAEvB,YAAYC,SAAS;AACrB,IAAM,EAAEC,YAAYC,SAAQ,IAAKC;AAEjC,IAAMC,QAAQC,MAAM,kBAAA;AAIpB,IAAMC,YAAY;EAChBC,KAAK;EACLC,SAAS;EACTC,QAAQ;EACRC,WAAW;EACXC,WAAW;EACXC,YAAY;EACZC,YAAY;AACd;AAEO,IAAMC,yBAAN,cAAqCC,2BAAAA;EAjC5C,OAiC4CA;;;EACzBC;EAEjBC,YAAYC,SAAkC;AAC5C,UAAK;AACL,SAAKF,MAAME,QAAQC;EACrB;EAEA,MAAMC,iBACJ,EACEJ,KACAK,OACAH,QAAO,GAaTI,SACwC;AACxC,QAAIC,YAAaL,SAASK,WAAWC,YAAAA,MAAkB,SAAUC,mBAA4CP,SAASK;AAGtH,UAAMG,UAAWR,SAASS,QAAQT,SAASU,KAAKD,SAASJ,cAAcE,mBAAmB,cAAc;AAMxG,UAAMG,MAAM,MAAMC,6BAChB;;MAEEb,KAAKA,OAAO,KAAKA;MACjBK;MACAH,SAAS;QAAE,GAAGA;QAASS,MAAMD;MAAQ;IACvC,GACAJ,OAAAA;AAGF,QAAIQ;AAGJ,UAAMC,yBAAyBC,4BAA4B/B,WAAW2B,IAAIK,cAAc,KAAA,GAAQL,IAAID,IAAI;AACxG,QAAIJ,cAAcE,kBAAkB;AAClC,YAAMS,MAAMC,MAAMP,IAAIK,cAAcP,SAAS;QAAEU,KAAKC,UAAUC;QAAWV;QAAKW,iBAAiB;MAAK,CAAA;AAEpGT,yBAAmB5B,SACjBsC,UAAUC,OAAO,aAAaC,WAAWC,UAAU1C,WAAW2C,mBAAmBC,QAAO,EAAG3C,SAAS,EAAA,GAAK,KAAA,GAAQ4C,aAAaZ,GAAAA,CAAAA,CAAAA,CAAAA;IAElI,WAAWX,WAAW;AACpBO,yBAAmB5B,SACjBsC,UAAUC,OAAO,aAAaC,WAAWC,UAAUpB,WAAmCtB,WAAW8B,wBAAwB,KAAA,CAAA,CAAA,CAAA;IAE7H,OAAO;AACLR,kBAAYjB,UAAUoB,OAAAA;AAEtB,UAAIH,WAAW;AAEbO,2BAAmB5B,SACjBsC,UAAUC,OAAO,aAAaC,WAAWC,UAAUpB,WAAmCtB,WAAW8B,wBAAwB,KAAA,CAAA,CAAA,CAAA,EACzH7B,SAAQ;MACZ;IACF;AACA,QAAI,CAAC4B,kBAAkB;AACrB,YAAMiB,MAAM,YAAYrB,OAAAA,WAAkBH,SAAAA,yCAAkD;IAC9F;AACA,UAAMyB,aAA4C;MAChDC,KAAK,WAAWnB,gBAAAA;MAChBoB,iBAAiBtB,IAAIuB;MACrBC,MAAM;QAACxB;;MACPyB,UAAU,CAAA;IACZ;AACAjD,UAAM,WAAW4C,WAAWC,GAAG;AAC/B,WAAOD;EACT;EAEA,MAAMM,iBACJC,MACAjC,SACsB;AACtB,UAAM,IAAIyB,MAAM,oDAAA;EAClB;EAEA,MAAMS,iBAAiBR,YAAyB1B,SAAqC;AACnF,eAAW,EAAE6B,IAAG,KAAMH,WAAWI,MAAM;AACrC,YAAM9B,QAAQmC,MAAMC,iBAAiB;QAAEP;MAAI,CAAA;IAC7C;AACA,WAAO;EACT;EAEA,MAAMQ,OAAO,EAAEX,YAAYpB,KAAKV,QAAO,GAA2DI,SAAiC;AACjI,UAAMyB,MAAM,qCAAA;EACd;EAEA,MAAMa,WAAW,EAAEZ,YAAYa,SAAS3C,QAAO,GAAmEI,SAAiC;AACjJ,UAAMyB,MAAM,yCAAA;EACd;EAEA,MAAMe,UAAUP,MAA+DjC,SAAiC;AAC9G,UAAMyB,MAAM,wCAAA;EACd;EAEA,MAAMgB,cAAcR,MAA8DjC,SAAiC;AACjH,UAAMyB,MAAM,4CAAA;EACd;AACF;;;ACjJA,SAAwFiB,gBAAgB;AACxG,SAASC,mBAAmB;AAE5B,IAAMC,gBAA6B,8BACjCC,QACAC,SACAC,WACAC,YAAAA;AAEA,QAAMC,WAAW,IAAIC,SAAS;IAAE,GAAGC,YAAAA;EAAc,CAAA;AACjD,SAAOF,SAASG,QAAQP,QAAQG,OAAAA;AAClC,GARmC;AAU5B,SAASK,oBAAAA;AACd,SAAO;IAAEC,KAAKV;EAAc;AAC9B;AAFgBS;","names":["importProvidedOrGeneratedKey","JWK_JCS_PUB_NAME","JWK_JCS_PUB_PREFIX","jwkJcsEncode","JwkKeyUse","toJwk","toRawCompressedHexPublicKey","AbstractIdentifierProvider","Debug","Multibase","Multicodec","u8a","fromString","toString","u8a","debug","Debug","keyCodecs","RSA","Ed25519","X25519","Secp256k1","Secp256r1","Bls12381G1","Bls12381G2","SphereonKeyDidProvider","AbstractIdentifierProvider","kms","constructor","options","defaultKms","createIdentifier","alias","context","codecName","toUpperCase","JWK_JCS_PUB_NAME","keyType","type","key","importProvidedOrGeneratedKey","methodSpecificId","compressedPublicKeyHex","toRawCompressedHexPublicKey","publicKeyHex","jwk","toJwk","use","JwkKeyUse","Signature","noKidThumbprint","Multibase","encode","Multicodec","addPrefix","JWK_JCS_PUB_PREFIX","valueOf","jwkJcsEncode","Error","identifier","did","controllerKeyId","kid","keys","services","updateIdentifier","args","deleteIdentifier","agent","keyManagerDelete","addKey","addService","service","removeKey","removeService","Resolver","getResolver","resolveDidKey","didUrl","_parsed","_resolver","options","resolver","Resolver","getResolver","resolve","getDidKeyResolver","key"]}
|
package/package.json
CHANGED
|
@@ -1,13 +1,14 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@sphereon/ssi-sdk-ext.did-provider-key",
|
|
3
3
|
"description": "Sphereon SSI-SDK plugin for management of did:key identifiers.",
|
|
4
|
-
"version": "0.28.1-feature.
|
|
4
|
+
"version": "0.28.1-feature.jose.vcdm.19+2c20244",
|
|
5
5
|
"source": "./src/index.ts",
|
|
6
6
|
"type": "module",
|
|
7
7
|
"main": "./dist/index.cjs",
|
|
8
8
|
"module": "./dist/index.js",
|
|
9
9
|
"types": "./dist/index.d.ts",
|
|
10
10
|
"exports": {
|
|
11
|
+
"react-native": "./dist/index.js",
|
|
11
12
|
"import": {
|
|
12
13
|
"types": "./dist/index.d.ts",
|
|
13
14
|
"import": "./dist/index.js"
|
|
@@ -22,8 +23,8 @@
|
|
|
22
23
|
"extract-api": "sphereon dev extract-api"
|
|
23
24
|
},
|
|
24
25
|
"dependencies": {
|
|
25
|
-
"@sphereon/ssi-sdk-ext.did-resolver-key": "
|
|
26
|
-
"@sphereon/ssi-sdk-ext.key-utils": "
|
|
26
|
+
"@sphereon/ssi-sdk-ext.did-resolver-key": "0.28.1-feature.jose.vcdm.19+2c20244",
|
|
27
|
+
"@sphereon/ssi-sdk-ext.key-utils": "0.28.1-feature.jose.vcdm.19+2c20244",
|
|
27
28
|
"@transmute/did-key-bls12381": "0.3.0-unstable.10",
|
|
28
29
|
"@veramo/core": "4.2.0",
|
|
29
30
|
"@veramo/did-manager": "4.2.0",
|
|
@@ -35,9 +36,9 @@
|
|
|
35
36
|
"uint8arrays": " 3.1.1"
|
|
36
37
|
},
|
|
37
38
|
"devDependencies": {
|
|
38
|
-
"@sphereon/ssi-sdk-ext.key-manager": "
|
|
39
|
-
"@sphereon/ssi-sdk-ext.kms-local": "
|
|
40
|
-
"@sphereon/ssi-sdk.dev": "
|
|
39
|
+
"@sphereon/ssi-sdk-ext.key-manager": "0.28.1-feature.jose.vcdm.19+2c20244",
|
|
40
|
+
"@sphereon/ssi-sdk-ext.kms-local": "0.28.1-feature.jose.vcdm.19+2c20244",
|
|
41
|
+
"@sphereon/ssi-sdk.dev": "0.33.1-feature.jose.vcdm.56",
|
|
41
42
|
"@veramo/did-resolver": "4.2.0",
|
|
42
43
|
"@veramo/key-manager": "4.2.0"
|
|
43
44
|
},
|
|
@@ -71,5 +72,5 @@
|
|
|
71
72
|
"secp256r1",
|
|
72
73
|
"RSA"
|
|
73
74
|
],
|
|
74
|
-
"gitHead": "
|
|
75
|
+
"gitHead": "2c2024461b7732a2b9c6e6940cc399d5ca4626ac"
|
|
75
76
|
}
|
|
@@ -14,9 +14,8 @@ import Debug from 'debug'
|
|
|
14
14
|
import Multibase from 'multibase'
|
|
15
15
|
import Multicodec from 'multicodec'
|
|
16
16
|
// @ts-ignore
|
|
17
|
-
import
|
|
18
|
-
|
|
19
|
-
import { toString } from 'uint8arrays/to-string'
|
|
17
|
+
import * as u8a from 'uint8arrays'
|
|
18
|
+
const { fromString, toString } = u8a
|
|
20
19
|
|
|
21
20
|
const debug = Debug('did-provider-key')
|
|
22
21
|
|