@twin.org/immutable-proof-service 0.0.2-next.3 → 0.0.3-next.10
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/es/entities/immutableProof.js +69 -0
- package/dist/es/entities/immutableProof.js.map +1 -0
- package/dist/es/immutableProofRoutes.js +294 -0
- package/dist/es/immutableProofRoutes.js.map +1 -0
- package/dist/es/immutableProofService.js +365 -0
- package/dist/es/immutableProofService.js.map +1 -0
- package/dist/es/index.js +10 -0
- package/dist/es/index.js.map +1 -0
- package/dist/es/models/IImmutableProofServiceConfig.js +4 -0
- package/dist/es/models/IImmutableProofServiceConfig.js.map +1 -0
- package/dist/es/models/IImmutableProofServiceConstructorOptions.js +2 -0
- package/dist/es/models/IImmutableProofServiceConstructorOptions.js.map +1 -0
- package/dist/es/restEntryPoints.js +10 -0
- package/dist/es/restEntryPoints.js.map +1 -0
- package/dist/es/schema.js +11 -0
- package/dist/es/schema.js.map +1 -0
- package/dist/types/entities/immutableProof.d.ts +9 -8
- package/dist/types/immutableProofService.d.ts +17 -8
- package/dist/types/index.d.ts +7 -7
- package/dist/types/models/IImmutableProofServiceConstructorOptions.d.ts +8 -3
- package/docs/changelog.md +162 -0
- package/docs/open-api/spec.json +590 -44
- package/docs/reference/classes/ImmutableProof.md +14 -14
- package/docs/reference/classes/ImmutableProofService.md +47 -21
- package/docs/reference/interfaces/IImmutableProofServiceConstructorOptions.md +17 -3
- package/locales/en.json +7 -1
- package/package.json +9 -9
- package/dist/cjs/index.cjs +0 -701
- package/dist/esm/index.mjs +0 -692
|
@@ -0,0 +1,365 @@
|
|
|
1
|
+
// Copyright 2024 IOTA Stiftung.
|
|
2
|
+
// SPDX-License-Identifier: Apache-2.0.
|
|
3
|
+
import { TaskStatus } from "@twin.org/background-task-models";
|
|
4
|
+
import { ContextIdHelper, ContextIdKeys, ContextIdStore } from "@twin.org/context";
|
|
5
|
+
import { BaseError, ComponentFactory, GeneralError, Guards, Is, JsonHelper, NotFoundError, ObjectHelper, RandomHelper, Urn, Validation } from "@twin.org/core";
|
|
6
|
+
import { IntegrityAlgorithm, IntegrityHelper } from "@twin.org/crypto";
|
|
7
|
+
import { JsonLdHelper, JsonLdProcessor } from "@twin.org/data-json-ld";
|
|
8
|
+
import { EntityStorageConnectorFactory } from "@twin.org/entity-storage-models";
|
|
9
|
+
import { IdentityConnectorFactory } from "@twin.org/identity-models";
|
|
10
|
+
import { ImmutableProofContexts, ImmutableProofFailure, ImmutableProofTopics, ImmutableProofTypes } from "@twin.org/immutable-proof-models";
|
|
11
|
+
import { DidContexts, DidTypes, VerifiableCredentialHelper } from "@twin.org/standards-w3c-did";
|
|
12
|
+
import { VerifiableStorageConnectorFactory } from "@twin.org/verifiable-storage-models";
|
|
13
|
+
/**
|
|
14
|
+
* Class for performing immutable proof operations.
|
|
15
|
+
*/
|
|
16
|
+
export class ImmutableProofService {
|
|
17
|
+
/**
|
|
18
|
+
* Runtime name for the class.
|
|
19
|
+
*/
|
|
20
|
+
static CLASS_NAME = "ImmutableProofService";
|
|
21
|
+
/**
|
|
22
|
+
* The namespace for the service.
|
|
23
|
+
* @internal
|
|
24
|
+
*/
|
|
25
|
+
static _NAMESPACE = "immutable-proof";
|
|
26
|
+
/**
|
|
27
|
+
* The configuration for the connector.
|
|
28
|
+
* @internal
|
|
29
|
+
*/
|
|
30
|
+
_config;
|
|
31
|
+
/**
|
|
32
|
+
* The logging component.
|
|
33
|
+
* @internal
|
|
34
|
+
*/
|
|
35
|
+
_logging;
|
|
36
|
+
/**
|
|
37
|
+
* The identity connector.
|
|
38
|
+
* @internal
|
|
39
|
+
*/
|
|
40
|
+
_identityConnector;
|
|
41
|
+
/**
|
|
42
|
+
* The entity storage for proofs.
|
|
43
|
+
* @internal
|
|
44
|
+
*/
|
|
45
|
+
_proofStorage;
|
|
46
|
+
/**
|
|
47
|
+
* The verifiable storage for the credentials.
|
|
48
|
+
* @internal
|
|
49
|
+
*/
|
|
50
|
+
_verifiableStorage;
|
|
51
|
+
/**
|
|
52
|
+
* The background task component.
|
|
53
|
+
* @internal
|
|
54
|
+
*/
|
|
55
|
+
_backgroundTaskComponent;
|
|
56
|
+
/**
|
|
57
|
+
* The event bus component.
|
|
58
|
+
* @internal
|
|
59
|
+
*/
|
|
60
|
+
_eventBusComponent;
|
|
61
|
+
/**
|
|
62
|
+
* The verification method id to use for the proofs.
|
|
63
|
+
* @internal
|
|
64
|
+
*/
|
|
65
|
+
_verificationMethodId;
|
|
66
|
+
/**
|
|
67
|
+
* The identity connector type.
|
|
68
|
+
* @internal
|
|
69
|
+
*/
|
|
70
|
+
_identityConnectorType;
|
|
71
|
+
/**
|
|
72
|
+
* Create a new instance of ImmutableProofService.
|
|
73
|
+
* @param options The dependencies for the immutable proof connector.
|
|
74
|
+
*/
|
|
75
|
+
constructor(options) {
|
|
76
|
+
this._proofStorage = EntityStorageConnectorFactory.get(options?.immutableProofEntityStorageType ?? "immutable-proof");
|
|
77
|
+
this._verifiableStorage = VerifiableStorageConnectorFactory.get(options?.verifiableStorageType ?? "verifiable-storage");
|
|
78
|
+
this._logging = ComponentFactory.getIfExists(options?.loggingComponentType ?? "logging");
|
|
79
|
+
this._identityConnectorType = options?.identityConnectorType ?? "identity";
|
|
80
|
+
this._identityConnector = IdentityConnectorFactory.get(this._identityConnectorType);
|
|
81
|
+
this._backgroundTaskComponent = ComponentFactory.get(options?.backgroundTaskComponentType ?? "background-task");
|
|
82
|
+
if (Is.stringValue(options?.eventBusComponentType)) {
|
|
83
|
+
this._eventBusComponent = ComponentFactory.get(options.eventBusComponentType);
|
|
84
|
+
}
|
|
85
|
+
this._config = options?.config ?? {};
|
|
86
|
+
this._verificationMethodId = this._config.verificationMethodId ?? "immutable-proof-assertion";
|
|
87
|
+
}
|
|
88
|
+
/**
|
|
89
|
+
* Returns the class name of the component.
|
|
90
|
+
* @returns The class name of the component.
|
|
91
|
+
*/
|
|
92
|
+
className() {
|
|
93
|
+
return ImmutableProofService.CLASS_NAME;
|
|
94
|
+
}
|
|
95
|
+
/**
|
|
96
|
+
* The component needs to be started when the node is initialized.
|
|
97
|
+
* @param nodeLoggingComponentType The node logging component type.
|
|
98
|
+
* @returns Nothing.
|
|
99
|
+
*/
|
|
100
|
+
async start(nodeLoggingComponentType) {
|
|
101
|
+
await this._backgroundTaskComponent.registerHandler("immutable-proof", "@twin.org/immutable-proof-task", "processProofTask", async (task) => {
|
|
102
|
+
await this.finaliseTask(task);
|
|
103
|
+
});
|
|
104
|
+
}
|
|
105
|
+
/**
|
|
106
|
+
* Create a new proof.
|
|
107
|
+
* @param document The document to create the proof for.
|
|
108
|
+
* @returns The id of the new proof.
|
|
109
|
+
*/
|
|
110
|
+
async create(document) {
|
|
111
|
+
Guards.object(ImmutableProofService.CLASS_NAME, "document", document);
|
|
112
|
+
const contextIds = await ContextIdStore.getContextIds();
|
|
113
|
+
ContextIdHelper.guard(contextIds, ContextIdKeys.Organization);
|
|
114
|
+
try {
|
|
115
|
+
const validationFailures = [];
|
|
116
|
+
await JsonLdHelper.validate(document, validationFailures);
|
|
117
|
+
Validation.asValidationError(ImmutableProofService.CLASS_NAME, "document", validationFailures);
|
|
118
|
+
const id = RandomHelper.generateUuidV7("compact");
|
|
119
|
+
const dateCreated = new Date(Date.now()).toISOString();
|
|
120
|
+
const proofObjectId = ObjectHelper.extractProperty(document, ["@id", "id"], false);
|
|
121
|
+
// We don't want to store the whole document in the immutable proof, as this could be large
|
|
122
|
+
// and also reveal information that should not be stored in the proof so we hash the document
|
|
123
|
+
// and store the hash
|
|
124
|
+
const proofObjectIntegrity = IntegrityHelper.generate(IntegrityAlgorithm.Sha256, ObjectHelper.toBytes(JsonHelper.canonicalize(document)));
|
|
125
|
+
const credentialSubject = {
|
|
126
|
+
"@context": [ImmutableProofContexts.Context, ImmutableProofContexts.ContextCommon],
|
|
127
|
+
type: ImmutableProofTypes.ImmutableProof,
|
|
128
|
+
id: proofObjectId,
|
|
129
|
+
proofIntegrity: proofObjectIntegrity
|
|
130
|
+
};
|
|
131
|
+
const proofEntity = {
|
|
132
|
+
id,
|
|
133
|
+
organizationId: contextIds[ContextIdKeys.Organization],
|
|
134
|
+
dateCreated,
|
|
135
|
+
proofObjectId,
|
|
136
|
+
proofObjectIntegrity
|
|
137
|
+
};
|
|
138
|
+
await this._proofStorage.set(proofEntity);
|
|
139
|
+
const fullId = new Urn(ImmutableProofService._NAMESPACE, id).toString();
|
|
140
|
+
const proofTaskPayload = {
|
|
141
|
+
proofId: fullId,
|
|
142
|
+
identity: contextIds[ContextIdKeys.Organization],
|
|
143
|
+
identityConnectorType: this._identityConnectorType,
|
|
144
|
+
verificationMethodId: this._verificationMethodId,
|
|
145
|
+
credentialSubject
|
|
146
|
+
};
|
|
147
|
+
await this._backgroundTaskComponent.create("immutable-proof", proofTaskPayload, {
|
|
148
|
+
retainFor: 5000
|
|
149
|
+
});
|
|
150
|
+
return fullId;
|
|
151
|
+
}
|
|
152
|
+
catch (error) {
|
|
153
|
+
throw new GeneralError(ImmutableProofService.CLASS_NAME, "createFailed", undefined, error);
|
|
154
|
+
}
|
|
155
|
+
}
|
|
156
|
+
/**
|
|
157
|
+
* Get a proof.
|
|
158
|
+
* @param id The id of the proof to get.
|
|
159
|
+
* @returns The proof.
|
|
160
|
+
* @throws NotFoundError if the proof is not found.
|
|
161
|
+
*/
|
|
162
|
+
async get(id) {
|
|
163
|
+
Guards.stringValue(ImmutableProofService.CLASS_NAME, "id", id);
|
|
164
|
+
const urnParsed = Urn.fromValidString(id);
|
|
165
|
+
if (urnParsed.namespaceIdentifier() !== ImmutableProofService._NAMESPACE) {
|
|
166
|
+
throw new GeneralError(ImmutableProofService.CLASS_NAME, "namespaceMismatch", {
|
|
167
|
+
namespace: ImmutableProofService._NAMESPACE,
|
|
168
|
+
id
|
|
169
|
+
});
|
|
170
|
+
}
|
|
171
|
+
try {
|
|
172
|
+
const { verifiableCredential } = await this.internalGet(id, false);
|
|
173
|
+
const result = await JsonLdProcessor.compact(verifiableCredential, verifiableCredential["@context"]);
|
|
174
|
+
return result;
|
|
175
|
+
}
|
|
176
|
+
catch (error) {
|
|
177
|
+
throw new GeneralError(ImmutableProofService.CLASS_NAME, "getFailed", undefined, error);
|
|
178
|
+
}
|
|
179
|
+
}
|
|
180
|
+
/**
|
|
181
|
+
* Verify a proof.
|
|
182
|
+
* @param id The id of the proof to verify.
|
|
183
|
+
* @returns The result of the verification and any failures.
|
|
184
|
+
* @throws NotFoundError if the proof is not found.
|
|
185
|
+
*/
|
|
186
|
+
async verify(id) {
|
|
187
|
+
Guards.stringValue(ImmutableProofService.CLASS_NAME, "id", id);
|
|
188
|
+
const urnParsed = Urn.fromValidString(id);
|
|
189
|
+
if (urnParsed.namespaceIdentifier() !== ImmutableProofService._NAMESPACE) {
|
|
190
|
+
throw new GeneralError(ImmutableProofService.CLASS_NAME, "namespaceMismatch", {
|
|
191
|
+
namespace: ImmutableProofService._NAMESPACE,
|
|
192
|
+
id
|
|
193
|
+
});
|
|
194
|
+
}
|
|
195
|
+
try {
|
|
196
|
+
const { verified, failure } = await this.internalGet(id, true);
|
|
197
|
+
return {
|
|
198
|
+
"@context": ImmutableProofContexts.Context,
|
|
199
|
+
type: ImmutableProofTypes.ImmutableProofVerification,
|
|
200
|
+
verified,
|
|
201
|
+
failure
|
|
202
|
+
};
|
|
203
|
+
}
|
|
204
|
+
catch (error) {
|
|
205
|
+
throw new GeneralError(ImmutableProofService.CLASS_NAME, "verifyFailed", undefined, error);
|
|
206
|
+
}
|
|
207
|
+
}
|
|
208
|
+
/**
|
|
209
|
+
* Remove the verifiable storage for the proof.
|
|
210
|
+
* @param id The id of the proof to remove the storage from.
|
|
211
|
+
* @returns Nothing.
|
|
212
|
+
* @throws NotFoundError if the proof is not found.
|
|
213
|
+
*/
|
|
214
|
+
async removeVerifiable(id) {
|
|
215
|
+
Guards.stringValue(ImmutableProofService.CLASS_NAME, "id", id);
|
|
216
|
+
const contextIds = await ContextIdStore.getContextIds();
|
|
217
|
+
ContextIdHelper.guard(contextIds, ContextIdKeys.Organization);
|
|
218
|
+
const urnParsed = Urn.fromValidString(id);
|
|
219
|
+
if (urnParsed.namespaceIdentifier() !== ImmutableProofService._NAMESPACE) {
|
|
220
|
+
throw new GeneralError(ImmutableProofService.CLASS_NAME, "namespaceMismatch", {
|
|
221
|
+
namespace: ImmutableProofService._NAMESPACE,
|
|
222
|
+
id
|
|
223
|
+
});
|
|
224
|
+
}
|
|
225
|
+
try {
|
|
226
|
+
const streamId = urnParsed.namespaceSpecific(0);
|
|
227
|
+
const streamEntity = await this._proofStorage.get(streamId);
|
|
228
|
+
if (Is.empty(streamEntity)) {
|
|
229
|
+
throw new NotFoundError(ImmutableProofService.CLASS_NAME, "proofNotFound", id);
|
|
230
|
+
}
|
|
231
|
+
if (Is.stringValue(streamEntity.verifiableStorageId)) {
|
|
232
|
+
await this._verifiableStorage.remove(contextIds[ContextIdKeys.Organization], streamEntity.verifiableStorageId);
|
|
233
|
+
delete streamEntity.verifiableStorageId;
|
|
234
|
+
await this._proofStorage.set(streamEntity);
|
|
235
|
+
}
|
|
236
|
+
}
|
|
237
|
+
catch (error) {
|
|
238
|
+
throw new GeneralError(ImmutableProofService.CLASS_NAME, "removeVerifiableFailed", undefined, error);
|
|
239
|
+
}
|
|
240
|
+
}
|
|
241
|
+
/**
|
|
242
|
+
* Process a proof.
|
|
243
|
+
* @param proofEntity The proof entity to process.
|
|
244
|
+
* @internal
|
|
245
|
+
*/
|
|
246
|
+
async finaliseTask(task) {
|
|
247
|
+
if (Is.object(task.payload)) {
|
|
248
|
+
if (task.status === TaskStatus.Success && Is.object(task.result)) {
|
|
249
|
+
const urnParsed = Urn.fromValidString(task.payload.proofId);
|
|
250
|
+
const proofId = urnParsed.namespaceSpecific(0);
|
|
251
|
+
const proofEntity = await this._proofStorage.get(proofId);
|
|
252
|
+
if (Is.object(proofEntity)) {
|
|
253
|
+
// Extract the proof from the task result vc
|
|
254
|
+
const proof = task.result.verifiableCredential.proof;
|
|
255
|
+
// The proof context is always the last one in the generated vc contexts
|
|
256
|
+
// as that was the last operation performed, so we can extract it and use it for the proof itself
|
|
257
|
+
proof["@context"] = task.result.verifiableCredential["@context"][task.result.verifiableCredential["@context"].length - 1];
|
|
258
|
+
// Remove the verification method so that we reduce the linkage between
|
|
259
|
+
// the proof and the identity that issued it, we will reinstate on verification
|
|
260
|
+
delete proof.verificationMethod;
|
|
261
|
+
// Store the proof in the verifiable storage and get the id of where it is stored so we can retrieve it later
|
|
262
|
+
const verifiableCreateResult = await this._verifiableStorage.create(task.payload.identity, ObjectHelper.toBytes(proof));
|
|
263
|
+
// Update the proof entity with the verifiable storage id so we can retrieve it later
|
|
264
|
+
proofEntity.verifiableStorageId = verifiableCreateResult.id;
|
|
265
|
+
// Update the date created if we can extract it from the VC
|
|
266
|
+
const validFrom = VerifiableCredentialHelper.getValidFrom(task.result.verifiableCredential);
|
|
267
|
+
if (Is.stringValue(validFrom)) {
|
|
268
|
+
proofEntity.dateCreated = validFrom;
|
|
269
|
+
}
|
|
270
|
+
proofEntity.vcContext = VerifiableCredentialHelper.getContext(task.result.verifiableCredential);
|
|
271
|
+
await this._proofStorage.set(proofEntity);
|
|
272
|
+
await this._logging?.log({
|
|
273
|
+
source: ImmutableProofService.CLASS_NAME,
|
|
274
|
+
level: "info",
|
|
275
|
+
ts: Date.now(),
|
|
276
|
+
message: "createdProof",
|
|
277
|
+
data: { proofId: task.payload.proofId }
|
|
278
|
+
});
|
|
279
|
+
await this._eventBusComponent?.publish(ImmutableProofTopics.ProofCreated, { id: new Urn(ImmutableProofService._NAMESPACE, task.payload.proofId).toString() });
|
|
280
|
+
}
|
|
281
|
+
}
|
|
282
|
+
else if (task.status === TaskStatus.Failed) {
|
|
283
|
+
await this._logging?.log({
|
|
284
|
+
source: ImmutableProofService.CLASS_NAME,
|
|
285
|
+
level: "error",
|
|
286
|
+
ts: Date.now(),
|
|
287
|
+
message: "createProofFailed",
|
|
288
|
+
error: BaseError.fromError(task.error)
|
|
289
|
+
});
|
|
290
|
+
}
|
|
291
|
+
}
|
|
292
|
+
}
|
|
293
|
+
/**
|
|
294
|
+
* Verify a proof.
|
|
295
|
+
* @param id The id of the proof to verify.
|
|
296
|
+
* @param verify Validate the proof.
|
|
297
|
+
* @returns The result of the verification and any failures.
|
|
298
|
+
* @throws NotFoundError if the proof is not found.
|
|
299
|
+
* @internal
|
|
300
|
+
*/
|
|
301
|
+
async internalGet(id, verify) {
|
|
302
|
+
const urnParsed = Urn.fromValidString(id);
|
|
303
|
+
const proofId = urnParsed.namespaceSpecific(0);
|
|
304
|
+
const proofEntity = await this._proofStorage.get(proofId);
|
|
305
|
+
if (Is.empty(proofEntity)) {
|
|
306
|
+
throw new NotFoundError(ImmutableProofService.CLASS_NAME, "proofNotFound", id);
|
|
307
|
+
}
|
|
308
|
+
const verifiableCredential = {
|
|
309
|
+
"@context": [
|
|
310
|
+
proofEntity.vcContext ?? DidContexts.ContextVCv1,
|
|
311
|
+
ImmutableProofContexts.Context,
|
|
312
|
+
ImmutableProofContexts.ContextCommon
|
|
313
|
+
],
|
|
314
|
+
type: [DidTypes.VerifiableCredential, ImmutableProofTypes.ImmutableProof],
|
|
315
|
+
id,
|
|
316
|
+
issuer: proofEntity.organizationId,
|
|
317
|
+
credentialSubject: {
|
|
318
|
+
id: proofEntity.proofObjectId,
|
|
319
|
+
proofIntegrity: proofEntity.proofObjectIntegrity
|
|
320
|
+
}
|
|
321
|
+
};
|
|
322
|
+
VerifiableCredentialHelper.setValidFrom(verifiableCredential, proofEntity.dateCreated);
|
|
323
|
+
let verified = false;
|
|
324
|
+
let failure = ImmutableProofFailure.NotIssued;
|
|
325
|
+
if (Is.stringValue(proofEntity.verifiableStorageId)) {
|
|
326
|
+
failure = ImmutableProofFailure.ProofMissing;
|
|
327
|
+
const immutableResult = await this._verifiableStorage.get(proofEntity.verifiableStorageId);
|
|
328
|
+
if (Is.uint8Array(immutableResult.data)) {
|
|
329
|
+
const proof = ObjectHelper.fromBytes(immutableResult.data);
|
|
330
|
+
const proofWithReceipt = {
|
|
331
|
+
...proof,
|
|
332
|
+
verificationMethod: `${proofEntity.organizationId}#${this._verificationMethodId}`,
|
|
333
|
+
verifiableStorageId: proofEntity.verifiableStorageId,
|
|
334
|
+
immutableReceipt: immutableResult.receipt
|
|
335
|
+
};
|
|
336
|
+
// Add the proof from the verifiable storage
|
|
337
|
+
// expand it with the verifiable storage id and receipt
|
|
338
|
+
verifiableCredential.proof = proofWithReceipt;
|
|
339
|
+
if (verify && Is.object(proof)) {
|
|
340
|
+
try {
|
|
341
|
+
const result = await this._identityConnector.checkVerifiableCredential(verifiableCredential);
|
|
342
|
+
if (result.revoked) {
|
|
343
|
+
verified = false;
|
|
344
|
+
failure = ImmutableProofFailure.Revoked;
|
|
345
|
+
}
|
|
346
|
+
else {
|
|
347
|
+
verified = true;
|
|
348
|
+
failure = undefined;
|
|
349
|
+
}
|
|
350
|
+
}
|
|
351
|
+
catch {
|
|
352
|
+
verified = false;
|
|
353
|
+
failure = ImmutableProofFailure.VerificationFailure;
|
|
354
|
+
}
|
|
355
|
+
}
|
|
356
|
+
}
|
|
357
|
+
}
|
|
358
|
+
return {
|
|
359
|
+
verifiableCredential: await JsonLdProcessor.compact(verifiableCredential, JsonLdProcessor.gatherContexts(verifiableCredential)),
|
|
360
|
+
verified,
|
|
361
|
+
failure
|
|
362
|
+
};
|
|
363
|
+
}
|
|
364
|
+
}
|
|
365
|
+
//# sourceMappingURL=immutableProofService.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"immutableProofService.js","sourceRoot":"","sources":["../../src/immutableProofService.ts"],"names":[],"mappings":"AAAA,gCAAgC;AAChC,uCAAuC;AACvC,OAAO,EACN,UAAU,EAGV,MAAM,kCAAkC,CAAC;AAC1C,OAAO,EAAE,eAAe,EAAE,aAAa,EAAE,cAAc,EAAE,MAAM,mBAAmB,CAAC;AACnF,OAAO,EACN,SAAS,EACT,gBAAgB,EAChB,YAAY,EACZ,MAAM,EACN,EAAE,EACF,UAAU,EACV,aAAa,EACb,YAAY,EACZ,YAAY,EACZ,GAAG,EACH,UAAU,EAEV,MAAM,gBAAgB,CAAC;AACxB,OAAO,EAAE,kBAAkB,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAC;AACvE,OAAO,EAAE,YAAY,EAAE,eAAe,EAA0B,MAAM,wBAAwB,CAAC;AAC/F,OAAO,EACN,6BAA6B,EAE7B,MAAM,iCAAiC,CAAC;AAEzC,OAAO,EAAE,wBAAwB,EAA2B,MAAM,2BAA2B,CAAC;AAC9F,OAAO,EACN,sBAAsB,EACtB,qBAAqB,EACrB,oBAAoB,EACpB,mBAAmB,EAKnB,MAAM,kCAAkC,CAAC;AAO1C,OAAO,EACN,WAAW,EACX,QAAQ,EACR,0BAA0B,EAG1B,MAAM,6BAA6B,CAAC;AACrC,OAAO,EACN,iCAAiC,EAEjC,MAAM,qCAAqC,CAAC;AAK7C;;GAEG;AACH,MAAM,OAAO,qBAAqB;IACjC;;OAEG;IACI,MAAM,CAAU,UAAU,2BAA2C;IAE5E;;;OAGG;IACK,MAAM,CAAU,UAAU,GAAW,iBAAiB,CAAC;IAE/D;;;OAGG;IACc,OAAO,CAA+B;IAEvD;;;OAGG;IACc,QAAQ,CAAqB;IAE9C;;;OAGG;IACc,kBAAkB,CAAqB;IAExD;;;OAGG;IACc,aAAa,CAA0C;IAExE;;;OAGG;IACc,kBAAkB,CAA8B;IAEjE;;;OAGG;IACc,wBAAwB,CAA2B;IAEpE;;;OAGG;IACc,kBAAkB,CAAsB;IAEzD;;;OAGG;IACc,qBAAqB,CAAS;IAE/C;;;OAGG;IACc,sBAAsB,CAAS;IAEhD;;;OAGG;IACH,YAAY,OAAkD;QAC7D,IAAI,CAAC,aAAa,GAAG,6BAA6B,CAAC,GAAG,CACrD,OAAO,EAAE,+BAA+B,qBAAqC,CAC7E,CAAC;QAEF,IAAI,CAAC,kBAAkB,GAAG,iCAAiC,CAAC,GAAG,CAC9D,OAAO,EAAE,qBAAqB,IAAI,oBAAoB,CACtD,CAAC;QAEF,IAAI,CAAC,QAAQ,GAAG,gBAAgB,CAAC,WAAW,CAC3C,OAAO,EAAE,oBAAoB,IAAI,SAAS,CAC1C,CAAC;QAEF,IAAI,CAAC,sBAAsB,GAAG,OAAO,EAAE,qBAAqB,IAAI,UAAU,CAAC;QAE3E,IAAI,CAAC,kBAAkB,GAAG,wBAAwB,CAAC,GAAG,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC;QAEpF,IAAI,CAAC,wBAAwB,GAAG,gBAAgB,CAAC,GAAG,CACnD,OAAO,EAAE,2BAA2B,IAAI,iBAAiB,CACzD,CAAC;QAEF,IAAI,EAAE,CAAC,WAAW,CAAC,OAAO,EAAE,qBAAqB,CAAC,EAAE,CAAC;YACpD,IAAI,CAAC,kBAAkB,GAAG,gBAAgB,CAAC,GAAG,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC;QAC/E,CAAC;QAED,IAAI,CAAC,OAAO,GAAG,OAAO,EAAE,MAAM,IAAI,EAAE,CAAC;QACrC,IAAI,CAAC,qBAAqB,GAAG,IAAI,CAAC,OAAO,CAAC,oBAAoB,IAAI,2BAA2B,CAAC;IAC/F,CAAC;IAED;;;OAGG;IACI,SAAS;QACf,OAAO,qBAAqB,CAAC,UAAU,CAAC;IACzC,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,KAAK,CAAC,wBAAiC;QACnD,MAAM,IAAI,CAAC,wBAAwB,CAAC,eAAe,CAGjD,iBAAiB,EAAE,gCAAgC,EAAE,kBAAkB,EAAE,KAAK,EAAC,IAAI,EAAC,EAAE;YACvF,MAAM,IAAI,CAAC,YAAY,CAAC,IAAI,CAAC,CAAC;QAC/B,CAAC,CAAC,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,MAAM,CAAC,QAA2B;QAC9C,MAAM,CAAC,MAAM,CAAoB,qBAAqB,CAAC,UAAU,cAAoB,QAAQ,CAAC,CAAC;QAE/F,MAAM,UAAU,GAAG,MAAM,cAAc,CAAC,aAAa,EAAE,CAAC;QACxD,eAAe,CAAC,KAAK,CAAC,UAAU,EAAE,aAAa,CAAC,YAAY,CAAC,CAAC;QAE9D,IAAI,CAAC;YACJ,MAAM,kBAAkB,GAAyB,EAAE,CAAC;YACpD,MAAM,YAAY,CAAC,QAAQ,CAAC,QAAQ,EAAE,kBAAkB,CAAC,CAAC;YAC1D,UAAU,CAAC,iBAAiB,CAC3B,qBAAqB,CAAC,UAAU,cAEhC,kBAAkB,CAClB,CAAC;YAEF,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;YAElD,MAAM,WAAW,GAAG,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC,CAAC,WAAW,EAAE,CAAC;YAEvD,MAAM,aAAa,GAAG,YAAY,CAAC,eAAe,CAAS,QAAQ,EAAE,CAAC,KAAK,EAAE,IAAI,CAAC,EAAE,KAAK,CAAC,CAAC;YAE3F,2FAA2F;YAC3F,6FAA6F;YAC7F,qBAAqB;YACrB,MAAM,oBAAoB,GAAG,eAAe,CAAC,QAAQ,CACpD,kBAAkB,CAAC,MAAM,EACzB,YAAY,CAAC,OAAO,CAAC,UAAU,CAAC,YAAY,CAAC,QAAQ,CAAC,CAAC,CACvD,CAAC;YAEF,MAAM,iBAAiB,GAAoB;gBAC1C,UAAU,EAAE,CAAC,sBAAsB,CAAC,OAAO,EAAE,sBAAsB,CAAC,aAAa,CAAC;gBAClF,IAAI,EAAE,mBAAmB,CAAC,cAAc;gBACxC,EAAE,EAAE,aAAa;gBACjB,cAAc,EAAE,oBAAoB;aACpC,CAAC;YAEF,MAAM,WAAW,GAAmB;gBACnC,EAAE;gBACF,cAAc,EAAE,UAAU,CAAC,aAAa,CAAC,YAAY,CAAC;gBACtD,WAAW;gBACX,aAAa;gBACb,oBAAoB;aACpB,CAAC;YACF,MAAM,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;YAE1C,MAAM,MAAM,GAAG,IAAI,GAAG,CAAC,qBAAqB,CAAC,UAAU,EAAE,EAAE,CAAC,CAAC,QAAQ,EAAE,CAAC;YAExE,MAAM,gBAAgB,GAA+B;gBACpD,OAAO,EAAE,MAAM;gBACf,QAAQ,EAAE,UAAU,CAAC,aAAa,CAAC,YAAY,CAAC;gBAChD,qBAAqB,EAAE,IAAI,CAAC,sBAAsB;gBAClD,oBAAoB,EAAE,IAAI,CAAC,qBAAqB;gBAChD,iBAAiB;aACjB,CAAC;YAEF,MAAM,IAAI,CAAC,wBAAwB,CAAC,MAAM,CAAC,iBAAiB,EAAE,gBAAgB,EAAE;gBAC/E,SAAS,EAAE,IAAI;aACf,CAAC,CAAC;YAEH,OAAO,MAAM,CAAC;QACf,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YAChB,MAAM,IAAI,YAAY,CAAC,qBAAqB,CAAC,UAAU,EAAE,cAAc,EAAE,SAAS,EAAE,KAAK,CAAC,CAAC;QAC5F,CAAC;IACF,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,GAAG,CAAC,EAAU;QAC1B,MAAM,CAAC,WAAW,CAAC,qBAAqB,CAAC,UAAU,QAAc,EAAE,CAAC,CAAC;QAErE,MAAM,SAAS,GAAG,GAAG,CAAC,eAAe,CAAC,EAAE,CAAC,CAAC;QAE1C,IAAI,SAAS,CAAC,mBAAmB,EAAE,KAAK,qBAAqB,CAAC,UAAU,EAAE,CAAC;YAC1E,MAAM,IAAI,YAAY,CAAC,qBAAqB,CAAC,UAAU,EAAE,mBAAmB,EAAE;gBAC7E,SAAS,EAAE,qBAAqB,CAAC,UAAU;gBAC3C,EAAE;aACF,CAAC,CAAC;QACJ,CAAC;QAED,IAAI,CAAC;YACJ,MAAM,EAAE,oBAAoB,EAAE,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,EAAE,EAAE,KAAK,CAAC,CAAC;YAEnE,MAAM,MAAM,GAAG,MAAM,eAAe,CAAC,OAAO,CAC3C,oBAAoB,EACpB,oBAAoB,CAAC,UAAU,CAAC,CAChC,CAAC;YACF,OAAO,MAAM,CAAC;QACf,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YAChB,MAAM,IAAI,YAAY,CAAC,qBAAqB,CAAC,UAAU,EAAE,WAAW,EAAE,SAAS,EAAE,KAAK,CAAC,CAAC;QACzF,CAAC;IACF,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,MAAM,CAAC,EAAU;QAC7B,MAAM,CAAC,WAAW,CAAC,qBAAqB,CAAC,UAAU,QAAc,EAAE,CAAC,CAAC;QAErE,MAAM,SAAS,GAAG,GAAG,CAAC,eAAe,CAAC,EAAE,CAAC,CAAC;QAE1C,IAAI,SAAS,CAAC,mBAAmB,EAAE,KAAK,qBAAqB,CAAC,UAAU,EAAE,CAAC;YAC1E,MAAM,IAAI,YAAY,CAAC,qBAAqB,CAAC,UAAU,EAAE,mBAAmB,EAAE;gBAC7E,SAAS,EAAE,qBAAqB,CAAC,UAAU;gBAC3C,EAAE;aACF,CAAC,CAAC;QACJ,CAAC;QAED,IAAI,CAAC;YACJ,MAAM,EAAE,QAAQ,EAAE,OAAO,EAAE,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,EAAE,EAAE,IAAI,CAAC,CAAC;YAE/D,OAAO;gBACN,UAAU,EAAE,sBAAsB,CAAC,OAAO;gBAC1C,IAAI,EAAE,mBAAmB,CAAC,0BAA0B;gBACpD,QAAQ;gBACR,OAAO;aACP,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YAChB,MAAM,IAAI,YAAY,CAAC,qBAAqB,CAAC,UAAU,EAAE,cAAc,EAAE,SAAS,EAAE,KAAK,CAAC,CAAC;QAC5F,CAAC;IACF,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,gBAAgB,CAAC,EAAU;QACvC,MAAM,CAAC,WAAW,CAAC,qBAAqB,CAAC,UAAU,QAAc,EAAE,CAAC,CAAC;QACrE,MAAM,UAAU,GAAG,MAAM,cAAc,CAAC,aAAa,EAAE,CAAC;QACxD,eAAe,CAAC,KAAK,CAAC,UAAU,EAAE,aAAa,CAAC,YAAY,CAAC,CAAC;QAE9D,MAAM,SAAS,GAAG,GAAG,CAAC,eAAe,CAAC,EAAE,CAAC,CAAC;QAE1C,IAAI,SAAS,CAAC,mBAAmB,EAAE,KAAK,qBAAqB,CAAC,UAAU,EAAE,CAAC;YAC1E,MAAM,IAAI,YAAY,CAAC,qBAAqB,CAAC,UAAU,EAAE,mBAAmB,EAAE;gBAC7E,SAAS,EAAE,qBAAqB,CAAC,UAAU;gBAC3C,EAAE;aACF,CAAC,CAAC;QACJ,CAAC;QAED,IAAI,CAAC;YACJ,MAAM,QAAQ,GAAG,SAAS,CAAC,iBAAiB,CAAC,CAAC,CAAC,CAAC;YAChD,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;YAE5D,IAAI,EAAE,CAAC,KAAK,CAAC,YAAY,CAAC,EAAE,CAAC;gBAC5B,MAAM,IAAI,aAAa,CAAC,qBAAqB,CAAC,UAAU,EAAE,eAAe,EAAE,EAAE,CAAC,CAAC;YAChF,CAAC;YAED,IAAI,EAAE,CAAC,WAAW,CAAC,YAAY,CAAC,mBAAmB,CAAC,EAAE,CAAC;gBACtD,MAAM,IAAI,CAAC,kBAAkB,CAAC,MAAM,CACnC,UAAU,CAAC,aAAa,CAAC,YAAY,CAAC,EACtC,YAAY,CAAC,mBAAmB,CAChC,CAAC;gBACF,OAAO,YAAY,CAAC,mBAAmB,CAAC;gBACxC,MAAM,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;YAC5C,CAAC;QACF,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YAChB,MAAM,IAAI,YAAY,CACrB,qBAAqB,CAAC,UAAU,EAChC,wBAAwB,EACxB,SAAS,EACT,KAAK,CACL,CAAC;QACH,CAAC;IACF,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,YAAY,CACzB,IAA4E;QAE5E,IAAI,EAAE,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,IAAI,IAAI,CAAC,MAAM,KAAK,UAAU,CAAC,OAAO,IAAI,EAAE,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC;gBAClE,MAAM,SAAS,GAAG,GAAG,CAAC,eAAe,CAAC,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;gBAC5D,MAAM,OAAO,GAAG,SAAS,CAAC,iBAAiB,CAAC,CAAC,CAAC,CAAC;gBAE/C,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;gBAE1D,IAAI,EAAE,CAAC,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC;oBAC5B,4CAA4C;oBAC5C,MAAM,KAAK,GAAW,IAAI,CAAC,MAAM,CAAC,oBAAoB,CAAC,KAAe,CAAC;oBAEvE,wEAAwE;oBACxE,iGAAiG;oBACjG,KAAK,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,MAAM,CAAC,oBAAoB,CAAC,UAAU,CAAC,CAC/D,IAAI,CAAC,MAAM,CAAC,oBAAoB,CAAC,UAAU,CAAC,CAAC,MAAM,GAAG,CAAC,CACjC,CAAC;oBAExB,uEAAuE;oBACvE,+EAA+E;oBAC/E,OAAO,KAAK,CAAC,kBAAkB,CAAC;oBAEhC,6GAA6G;oBAC7G,MAAM,sBAAsB,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAClE,IAAI,CAAC,OAAO,CAAC,QAAQ,EACrB,YAAY,CAAC,OAAO,CAAC,KAAK,CAAC,CAC3B,CAAC;oBAEF,qFAAqF;oBACrF,WAAW,CAAC,mBAAmB,GAAG,sBAAsB,CAAC,EAAE,CAAC;oBAE5D,2DAA2D;oBAC3D,MAAM,SAAS,GAAG,0BAA0B,CAAC,YAAY,CACxD,IAAI,CAAC,MAAM,CAAC,oBAAoB,CAChC,CAAC;oBACF,IAAI,EAAE,CAAC,WAAW,CAAC,SAAS,CAAC,EAAE,CAAC;wBAC/B,WAAW,CAAC,WAAW,GAAG,SAAS,CAAC;oBACrC,CAAC;oBACD,WAAW,CAAC,SAAS,GAAG,0BAA0B,CAAC,UAAU,CAC5D,IAAI,CAAC,MAAM,CAAC,oBAAoB,CAChC,CAAC;oBAEF,MAAM,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;oBAE1C,MAAM,IAAI,CAAC,QAAQ,EAAE,GAAG,CAAC;wBACxB,MAAM,EAAE,qBAAqB,CAAC,UAAU;wBACxC,KAAK,EAAE,MAAM;wBACb,EAAE,EAAE,IAAI,CAAC,GAAG,EAAE;wBACd,OAAO,EAAE,cAAc;wBACvB,IAAI,EAAE,EAAE,OAAO,EAAE,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE;qBACvC,CAAC,CAAC;oBAEH,MAAM,IAAI,CAAC,kBAAkB,EAAE,OAAO,CACrC,oBAAoB,CAAC,YAAY,EACjC,EAAE,EAAE,EAAE,IAAI,GAAG,CAAC,qBAAqB,CAAC,UAAU,EAAE,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,QAAQ,EAAE,EAAE,CAClF,CAAC;gBACH,CAAC;YACF,CAAC;iBAAM,IAAI,IAAI,CAAC,MAAM,KAAK,UAAU,CAAC,MAAM,EAAE,CAAC;gBAC9C,MAAM,IAAI,CAAC,QAAQ,EAAE,GAAG,CAAC;oBACxB,MAAM,EAAE,qBAAqB,CAAC,UAAU;oBACxC,KAAK,EAAE,OAAO;oBACd,EAAE,EAAE,IAAI,CAAC,GAAG,EAAE;oBACd,OAAO,EAAE,mBAAmB;oBAC5B,KAAK,EAAE,SAAS,CAAC,SAAS,CAAC,IAAI,CAAC,KAAK,CAAC;iBACtC,CAAC,CAAC;YACJ,CAAC;QACF,CAAC;IACF,CAAC;IAED;;;;;;;OAOG;IACK,KAAK,CAAC,WAAW,CACxB,EAAU,EACV,MAAe;QAMf,MAAM,SAAS,GAAG,GAAG,CAAC,eAAe,CAAC,EAAE,CAAC,CAAC;QAC1C,MAAM,OAAO,GAAG,SAAS,CAAC,iBAAiB,CAAC,CAAC,CAAC,CAAC;QAC/C,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;QAE1D,IAAI,EAAE,CAAC,KAAK,CAAC,WAAW,CAAC,EAAE,CAAC;YAC3B,MAAM,IAAI,aAAa,CAAC,qBAAqB,CAAC,UAAU,EAAE,eAAe,EAAE,EAAE,CAAC,CAAC;QAChF,CAAC;QAED,MAAM,oBAAoB,GAA6B;YACtD,UAAU,EAAE;gBACX,WAAW,CAAC,SAAS,IAAI,WAAW,CAAC,WAAW;gBAChD,sBAAsB,CAAC,OAAO;gBAC9B,sBAAsB,CAAC,aAAa;aACpC;YACD,IAAI,EAAE,CAAC,QAAQ,CAAC,oBAAoB,EAAE,mBAAmB,CAAC,cAAc,CAAC;YACzE,EAAE;YACF,MAAM,EAAE,WAAW,CAAC,cAAc;YAClC,iBAAiB,EAAE;gBAClB,EAAE,EAAE,WAAW,CAAC,aAAa;gBAC7B,cAAc,EAAE,WAAW,CAAC,oBAAoB;aAChD;SAC2B,CAAC;QAE9B,0BAA0B,CAAC,YAAY,CAAC,oBAAoB,EAAE,WAAW,CAAC,WAAW,CAAC,CAAC;QAEvF,IAAI,QAAQ,GAAG,KAAK,CAAC;QACrB,IAAI,OAAO,GAAsC,qBAAqB,CAAC,SAAS,CAAC;QAEjF,IAAI,EAAE,CAAC,WAAW,CAAC,WAAW,CAAC,mBAAmB,CAAC,EAAE,CAAC;YACrD,OAAO,GAAG,qBAAqB,CAAC,YAAY,CAAC;YAC7C,MAAM,eAAe,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,WAAW,CAAC,mBAAmB,CAAC,CAAC;YAE3F,IAAI,EAAE,CAAC,UAAU,CAAC,eAAe,CAAC,IAAI,CAAC,EAAE,CAAC;gBACzC,MAAM,KAAK,GAAG,YAAY,CAAC,SAAS,CAAS,eAAe,CAAC,IAAI,CAAC,CAAC;gBAEnE,MAAM,gBAAgB,GAAG;oBACxB,GAAG,KAAK;oBACR,kBAAkB,EAAE,GAAG,WAAW,CAAC,cAAc,IAAI,IAAI,CAAC,qBAAqB,EAAE;oBACjF,mBAAmB,EAAE,WAAW,CAAC,mBAAmB;oBACpD,gBAAgB,EAAE,eAAe,CAAC,OAAO;iBACzC,CAAC;gBAEF,4CAA4C;gBAC5C,uDAAuD;gBACvD,oBAAoB,CAAC,KAAK,GAAG,gBAAgB,CAAC;gBAE9C,IAAI,MAAM,IAAI,EAAE,CAAC,MAAM,CAAS,KAAK,CAAC,EAAE,CAAC;oBACxC,IAAI,CAAC;wBACJ,MAAM,MAAM,GACX,MAAM,IAAI,CAAC,kBAAkB,CAAC,yBAAyB,CAAC,oBAAoB,CAAC,CAAC;wBAC/E,IAAI,MAAM,CAAC,OAAO,EAAE,CAAC;4BACpB,QAAQ,GAAG,KAAK,CAAC;4BACjB,OAAO,GAAG,qBAAqB,CAAC,OAAO,CAAC;wBACzC,CAAC;6BAAM,CAAC;4BACP,QAAQ,GAAG,IAAI,CAAC;4BAChB,OAAO,GAAG,SAAS,CAAC;wBACrB,CAAC;oBACF,CAAC;oBAAC,MAAM,CAAC;wBACR,QAAQ,GAAG,KAAK,CAAC;wBACjB,OAAO,GAAG,qBAAqB,CAAC,mBAAmB,CAAC;oBACrD,CAAC;gBACF,CAAC;YACF,CAAC;QACF,CAAC;QAED,OAAO;YACN,oBAAoB,EAAE,MAAM,eAAe,CAAC,OAAO,CAClD,oBAAoB,EACpB,eAAe,CAAC,cAAc,CAAC,oBAAoB,CAAC,CACpD;YACD,QAAQ;YACR,OAAO;SACP,CAAC;IACH,CAAC","sourcesContent":["// Copyright 2024 IOTA Stiftung.\n// SPDX-License-Identifier: Apache-2.0.\nimport {\n\tTaskStatus,\n\ttype IBackgroundTask,\n\ttype IBackgroundTaskComponent\n} from \"@twin.org/background-task-models\";\nimport { ContextIdHelper, ContextIdKeys, ContextIdStore } from \"@twin.org/context\";\nimport {\n\tBaseError,\n\tComponentFactory,\n\tGeneralError,\n\tGuards,\n\tIs,\n\tJsonHelper,\n\tNotFoundError,\n\tObjectHelper,\n\tRandomHelper,\n\tUrn,\n\tValidation,\n\ttype IValidationFailure\n} from \"@twin.org/core\";\nimport { IntegrityAlgorithm, IntegrityHelper } from \"@twin.org/crypto\";\nimport { JsonLdHelper, JsonLdProcessor, type IJsonLdNodeObject } from \"@twin.org/data-json-ld\";\nimport {\n\tEntityStorageConnectorFactory,\n\ttype IEntityStorageConnector\n} from \"@twin.org/entity-storage-models\";\nimport type { IEventBusComponent } from \"@twin.org/event-bus-models\";\nimport { IdentityConnectorFactory, type IIdentityConnector } from \"@twin.org/identity-models\";\nimport {\n\tImmutableProofContexts,\n\tImmutableProofFailure,\n\tImmutableProofTopics,\n\tImmutableProofTypes,\n\ttype IImmutableProof,\n\ttype IImmutableProofComponent,\n\ttype IImmutableProofEventBusProofCreated,\n\ttype IImmutableProofVerification\n} from \"@twin.org/immutable-proof-models\";\nimport type {\n\tIImmutableProofTaskPayload,\n\tIImmutableProofTaskResult\n} from \"@twin.org/immutable-proof-task\";\nimport type { ILoggingComponent } from \"@twin.org/logging-models\";\nimport { nameof, nameofKebabCase } from \"@twin.org/nameof\";\nimport {\n\tDidContexts,\n\tDidTypes,\n\tVerifiableCredentialHelper,\n\ttype IDidVerifiableCredential,\n\ttype IProof\n} from \"@twin.org/standards-w3c-did\";\nimport {\n\tVerifiableStorageConnectorFactory,\n\ttype IVerifiableStorageConnector\n} from \"@twin.org/verifiable-storage-models\";\nimport type { ImmutableProof } from \"./entities/immutableProof.js\";\nimport type { IImmutableProofServiceConfig } from \"./models/IImmutableProofServiceConfig.js\";\nimport type { IImmutableProofServiceConstructorOptions } from \"./models/IImmutableProofServiceConstructorOptions.js\";\n\n/**\n * Class for performing immutable proof operations.\n */\nexport class ImmutableProofService implements IImmutableProofComponent {\n\t/**\n\t * Runtime name for the class.\n\t */\n\tpublic static readonly CLASS_NAME: string = nameof<ImmutableProofService>();\n\n\t/**\n\t * The namespace for the service.\n\t * @internal\n\t */\n\tprivate static readonly _NAMESPACE: string = \"immutable-proof\";\n\n\t/**\n\t * The configuration for the connector.\n\t * @internal\n\t */\n\tprivate readonly _config: IImmutableProofServiceConfig;\n\n\t/**\n\t * The logging component.\n\t * @internal\n\t */\n\tprivate readonly _logging?: ILoggingComponent;\n\n\t/**\n\t * The identity connector.\n\t * @internal\n\t */\n\tprivate readonly _identityConnector: IIdentityConnector;\n\n\t/**\n\t * The entity storage for proofs.\n\t * @internal\n\t */\n\tprivate readonly _proofStorage: IEntityStorageConnector<ImmutableProof>;\n\n\t/**\n\t * The verifiable storage for the credentials.\n\t * @internal\n\t */\n\tprivate readonly _verifiableStorage: IVerifiableStorageConnector;\n\n\t/**\n\t * The background task component.\n\t * @internal\n\t */\n\tprivate readonly _backgroundTaskComponent: IBackgroundTaskComponent;\n\n\t/**\n\t * The event bus component.\n\t * @internal\n\t */\n\tprivate readonly _eventBusComponent?: IEventBusComponent;\n\n\t/**\n\t * The verification method id to use for the proofs.\n\t * @internal\n\t */\n\tprivate readonly _verificationMethodId: string;\n\n\t/**\n\t * The identity connector type.\n\t * @internal\n\t */\n\tprivate readonly _identityConnectorType: string;\n\n\t/**\n\t * Create a new instance of ImmutableProofService.\n\t * @param options The dependencies for the immutable proof connector.\n\t */\n\tconstructor(options?: IImmutableProofServiceConstructorOptions) {\n\t\tthis._proofStorage = EntityStorageConnectorFactory.get(\n\t\t\toptions?.immutableProofEntityStorageType ?? nameofKebabCase<ImmutableProof>()\n\t\t);\n\n\t\tthis._verifiableStorage = VerifiableStorageConnectorFactory.get(\n\t\t\toptions?.verifiableStorageType ?? \"verifiable-storage\"\n\t\t);\n\n\t\tthis._logging = ComponentFactory.getIfExists<ILoggingComponent>(\n\t\t\toptions?.loggingComponentType ?? \"logging\"\n\t\t);\n\n\t\tthis._identityConnectorType = options?.identityConnectorType ?? \"identity\";\n\n\t\tthis._identityConnector = IdentityConnectorFactory.get(this._identityConnectorType);\n\n\t\tthis._backgroundTaskComponent = ComponentFactory.get(\n\t\t\toptions?.backgroundTaskComponentType ?? \"background-task\"\n\t\t);\n\n\t\tif (Is.stringValue(options?.eventBusComponentType)) {\n\t\t\tthis._eventBusComponent = ComponentFactory.get(options.eventBusComponentType);\n\t\t}\n\n\t\tthis._config = options?.config ?? {};\n\t\tthis._verificationMethodId = this._config.verificationMethodId ?? \"immutable-proof-assertion\";\n\t}\n\n\t/**\n\t * Returns the class name of the component.\n\t * @returns The class name of the component.\n\t */\n\tpublic className(): string {\n\t\treturn ImmutableProofService.CLASS_NAME;\n\t}\n\n\t/**\n\t * The component needs to be started when the node is initialized.\n\t * @param nodeLoggingComponentType The node logging component type.\n\t * @returns Nothing.\n\t */\n\tpublic async start(nodeLoggingComponentType?: string): Promise<void> {\n\t\tawait this._backgroundTaskComponent.registerHandler<\n\t\t\tIImmutableProofTaskPayload,\n\t\t\tIImmutableProofTaskResult\n\t\t>(\"immutable-proof\", \"@twin.org/immutable-proof-task\", \"processProofTask\", async task => {\n\t\t\tawait this.finaliseTask(task);\n\t\t});\n\t}\n\n\t/**\n\t * Create a new proof.\n\t * @param document The document to create the proof for.\n\t * @returns The id of the new proof.\n\t */\n\tpublic async create(document: IJsonLdNodeObject): Promise<string> {\n\t\tGuards.object<IJsonLdNodeObject>(ImmutableProofService.CLASS_NAME, nameof(document), document);\n\n\t\tconst contextIds = await ContextIdStore.getContextIds();\n\t\tContextIdHelper.guard(contextIds, ContextIdKeys.Organization);\n\n\t\ttry {\n\t\t\tconst validationFailures: IValidationFailure[] = [];\n\t\t\tawait JsonLdHelper.validate(document, validationFailures);\n\t\t\tValidation.asValidationError(\n\t\t\t\tImmutableProofService.CLASS_NAME,\n\t\t\t\tnameof(document),\n\t\t\t\tvalidationFailures\n\t\t\t);\n\n\t\t\tconst id = RandomHelper.generateUuidV7(\"compact\");\n\n\t\t\tconst dateCreated = new Date(Date.now()).toISOString();\n\n\t\t\tconst proofObjectId = ObjectHelper.extractProperty<string>(document, [\"@id\", \"id\"], false);\n\n\t\t\t// We don't want to store the whole document in the immutable proof, as this could be large\n\t\t\t// and also reveal information that should not be stored in the proof so we hash the document\n\t\t\t// and store the hash\n\t\t\tconst proofObjectIntegrity = IntegrityHelper.generate(\n\t\t\t\tIntegrityAlgorithm.Sha256,\n\t\t\t\tObjectHelper.toBytes(JsonHelper.canonicalize(document))\n\t\t\t);\n\n\t\t\tconst credentialSubject: IImmutableProof = {\n\t\t\t\t\"@context\": [ImmutableProofContexts.Context, ImmutableProofContexts.ContextCommon],\n\t\t\t\ttype: ImmutableProofTypes.ImmutableProof,\n\t\t\t\tid: proofObjectId,\n\t\t\t\tproofIntegrity: proofObjectIntegrity\n\t\t\t};\n\n\t\t\tconst proofEntity: ImmutableProof = {\n\t\t\t\tid,\n\t\t\t\torganizationId: contextIds[ContextIdKeys.Organization],\n\t\t\t\tdateCreated,\n\t\t\t\tproofObjectId,\n\t\t\t\tproofObjectIntegrity\n\t\t\t};\n\t\t\tawait this._proofStorage.set(proofEntity);\n\n\t\t\tconst fullId = new Urn(ImmutableProofService._NAMESPACE, id).toString();\n\n\t\t\tconst proofTaskPayload: IImmutableProofTaskPayload = {\n\t\t\t\tproofId: fullId,\n\t\t\t\tidentity: contextIds[ContextIdKeys.Organization],\n\t\t\t\tidentityConnectorType: this._identityConnectorType,\n\t\t\t\tverificationMethodId: this._verificationMethodId,\n\t\t\t\tcredentialSubject\n\t\t\t};\n\n\t\t\tawait this._backgroundTaskComponent.create(\"immutable-proof\", proofTaskPayload, {\n\t\t\t\tretainFor: 5000\n\t\t\t});\n\n\t\t\treturn fullId;\n\t\t} catch (error) {\n\t\t\tthrow new GeneralError(ImmutableProofService.CLASS_NAME, \"createFailed\", undefined, error);\n\t\t}\n\t}\n\n\t/**\n\t * Get a proof.\n\t * @param id The id of the proof to get.\n\t * @returns The proof.\n\t * @throws NotFoundError if the proof is not found.\n\t */\n\tpublic async get(id: string): Promise<IDidVerifiableCredential> {\n\t\tGuards.stringValue(ImmutableProofService.CLASS_NAME, nameof(id), id);\n\n\t\tconst urnParsed = Urn.fromValidString(id);\n\n\t\tif (urnParsed.namespaceIdentifier() !== ImmutableProofService._NAMESPACE) {\n\t\t\tthrow new GeneralError(ImmutableProofService.CLASS_NAME, \"namespaceMismatch\", {\n\t\t\t\tnamespace: ImmutableProofService._NAMESPACE,\n\t\t\t\tid\n\t\t\t});\n\t\t}\n\n\t\ttry {\n\t\t\tconst { verifiableCredential } = await this.internalGet(id, false);\n\n\t\t\tconst result = await JsonLdProcessor.compact(\n\t\t\t\tverifiableCredential,\n\t\t\t\tverifiableCredential[\"@context\"]\n\t\t\t);\n\t\t\treturn result;\n\t\t} catch (error) {\n\t\t\tthrow new GeneralError(ImmutableProofService.CLASS_NAME, \"getFailed\", undefined, error);\n\t\t}\n\t}\n\n\t/**\n\t * Verify a proof.\n\t * @param id The id of the proof to verify.\n\t * @returns The result of the verification and any failures.\n\t * @throws NotFoundError if the proof is not found.\n\t */\n\tpublic async verify(id: string): Promise<IImmutableProofVerification> {\n\t\tGuards.stringValue(ImmutableProofService.CLASS_NAME, nameof(id), id);\n\n\t\tconst urnParsed = Urn.fromValidString(id);\n\n\t\tif (urnParsed.namespaceIdentifier() !== ImmutableProofService._NAMESPACE) {\n\t\t\tthrow new GeneralError(ImmutableProofService.CLASS_NAME, \"namespaceMismatch\", {\n\t\t\t\tnamespace: ImmutableProofService._NAMESPACE,\n\t\t\t\tid\n\t\t\t});\n\t\t}\n\n\t\ttry {\n\t\t\tconst { verified, failure } = await this.internalGet(id, true);\n\n\t\t\treturn {\n\t\t\t\t\"@context\": ImmutableProofContexts.Context,\n\t\t\t\ttype: ImmutableProofTypes.ImmutableProofVerification,\n\t\t\t\tverified,\n\t\t\t\tfailure\n\t\t\t};\n\t\t} catch (error) {\n\t\t\tthrow new GeneralError(ImmutableProofService.CLASS_NAME, \"verifyFailed\", undefined, error);\n\t\t}\n\t}\n\n\t/**\n\t * Remove the verifiable storage for the proof.\n\t * @param id The id of the proof to remove the storage from.\n\t * @returns Nothing.\n\t * @throws NotFoundError if the proof is not found.\n\t */\n\tpublic async removeVerifiable(id: string): Promise<void> {\n\t\tGuards.stringValue(ImmutableProofService.CLASS_NAME, nameof(id), id);\n\t\tconst contextIds = await ContextIdStore.getContextIds();\n\t\tContextIdHelper.guard(contextIds, ContextIdKeys.Organization);\n\n\t\tconst urnParsed = Urn.fromValidString(id);\n\n\t\tif (urnParsed.namespaceIdentifier() !== ImmutableProofService._NAMESPACE) {\n\t\t\tthrow new GeneralError(ImmutableProofService.CLASS_NAME, \"namespaceMismatch\", {\n\t\t\t\tnamespace: ImmutableProofService._NAMESPACE,\n\t\t\t\tid\n\t\t\t});\n\t\t}\n\n\t\ttry {\n\t\t\tconst streamId = urnParsed.namespaceSpecific(0);\n\t\t\tconst streamEntity = await this._proofStorage.get(streamId);\n\n\t\t\tif (Is.empty(streamEntity)) {\n\t\t\t\tthrow new NotFoundError(ImmutableProofService.CLASS_NAME, \"proofNotFound\", id);\n\t\t\t}\n\n\t\t\tif (Is.stringValue(streamEntity.verifiableStorageId)) {\n\t\t\t\tawait this._verifiableStorage.remove(\n\t\t\t\t\tcontextIds[ContextIdKeys.Organization],\n\t\t\t\t\tstreamEntity.verifiableStorageId\n\t\t\t\t);\n\t\t\t\tdelete streamEntity.verifiableStorageId;\n\t\t\t\tawait this._proofStorage.set(streamEntity);\n\t\t\t}\n\t\t} catch (error) {\n\t\t\tthrow new GeneralError(\n\t\t\t\tImmutableProofService.CLASS_NAME,\n\t\t\t\t\"removeVerifiableFailed\",\n\t\t\t\tundefined,\n\t\t\t\terror\n\t\t\t);\n\t\t}\n\t}\n\n\t/**\n\t * Process a proof.\n\t * @param proofEntity The proof entity to process.\n\t * @internal\n\t */\n\tprivate async finaliseTask(\n\t\ttask: IBackgroundTask<IImmutableProofTaskPayload, IImmutableProofTaskResult>\n\t): Promise<void> {\n\t\tif (Is.object(task.payload)) {\n\t\t\tif (task.status === TaskStatus.Success && Is.object(task.result)) {\n\t\t\t\tconst urnParsed = Urn.fromValidString(task.payload.proofId);\n\t\t\t\tconst proofId = urnParsed.namespaceSpecific(0);\n\n\t\t\t\tconst proofEntity = await this._proofStorage.get(proofId);\n\n\t\t\t\tif (Is.object(proofEntity)) {\n\t\t\t\t\t// Extract the proof from the task result vc\n\t\t\t\t\tconst proof: IProof = task.result.verifiableCredential.proof as IProof;\n\n\t\t\t\t\t// The proof context is always the last one in the generated vc contexts\n\t\t\t\t\t// as that was the last operation performed, so we can extract it and use it for the proof itself\n\t\t\t\t\tproof[\"@context\"] = task.result.verifiableCredential[\"@context\"][\n\t\t\t\t\t\ttask.result.verifiableCredential[\"@context\"].length - 1\n\t\t\t\t\t] as IProof[\"@context\"];\n\n\t\t\t\t\t// Remove the verification method so that we reduce the linkage between\n\t\t\t\t\t// the proof and the identity that issued it, we will reinstate on verification\n\t\t\t\t\tdelete proof.verificationMethod;\n\n\t\t\t\t\t// Store the proof in the verifiable storage and get the id of where it is stored so we can retrieve it later\n\t\t\t\t\tconst verifiableCreateResult = await this._verifiableStorage.create(\n\t\t\t\t\t\ttask.payload.identity,\n\t\t\t\t\t\tObjectHelper.toBytes(proof)\n\t\t\t\t\t);\n\n\t\t\t\t\t// Update the proof entity with the verifiable storage id so we can retrieve it later\n\t\t\t\t\tproofEntity.verifiableStorageId = verifiableCreateResult.id;\n\n\t\t\t\t\t// Update the date created if we can extract it from the VC\n\t\t\t\t\tconst validFrom = VerifiableCredentialHelper.getValidFrom(\n\t\t\t\t\t\ttask.result.verifiableCredential\n\t\t\t\t\t);\n\t\t\t\t\tif (Is.stringValue(validFrom)) {\n\t\t\t\t\t\tproofEntity.dateCreated = validFrom;\n\t\t\t\t\t}\n\t\t\t\t\tproofEntity.vcContext = VerifiableCredentialHelper.getContext(\n\t\t\t\t\t\ttask.result.verifiableCredential\n\t\t\t\t\t);\n\n\t\t\t\t\tawait this._proofStorage.set(proofEntity);\n\n\t\t\t\t\tawait this._logging?.log({\n\t\t\t\t\t\tsource: ImmutableProofService.CLASS_NAME,\n\t\t\t\t\t\tlevel: \"info\",\n\t\t\t\t\t\tts: Date.now(),\n\t\t\t\t\t\tmessage: \"createdProof\",\n\t\t\t\t\t\tdata: { proofId: task.payload.proofId }\n\t\t\t\t\t});\n\n\t\t\t\t\tawait this._eventBusComponent?.publish<IImmutableProofEventBusProofCreated>(\n\t\t\t\t\t\tImmutableProofTopics.ProofCreated,\n\t\t\t\t\t\t{ id: new Urn(ImmutableProofService._NAMESPACE, task.payload.proofId).toString() }\n\t\t\t\t\t);\n\t\t\t\t}\n\t\t\t} else if (task.status === TaskStatus.Failed) {\n\t\t\t\tawait this._logging?.log({\n\t\t\t\t\tsource: ImmutableProofService.CLASS_NAME,\n\t\t\t\t\tlevel: \"error\",\n\t\t\t\t\tts: Date.now(),\n\t\t\t\t\tmessage: \"createProofFailed\",\n\t\t\t\t\terror: BaseError.fromError(task.error)\n\t\t\t\t});\n\t\t\t}\n\t\t}\n\t}\n\n\t/**\n\t * Verify a proof.\n\t * @param id The id of the proof to verify.\n\t * @param verify Validate the proof.\n\t * @returns The result of the verification and any failures.\n\t * @throws NotFoundError if the proof is not found.\n\t * @internal\n\t */\n\tprivate async internalGet(\n\t\tid: string,\n\t\tverify: boolean\n\t): Promise<{\n\t\tverified: boolean;\n\t\tfailure?: ImmutableProofFailure;\n\t\tverifiableCredential: IDidVerifiableCredential;\n\t}> {\n\t\tconst urnParsed = Urn.fromValidString(id);\n\t\tconst proofId = urnParsed.namespaceSpecific(0);\n\t\tconst proofEntity = await this._proofStorage.get(proofId);\n\n\t\tif (Is.empty(proofEntity)) {\n\t\t\tthrow new NotFoundError(ImmutableProofService.CLASS_NAME, \"proofNotFound\", id);\n\t\t}\n\n\t\tconst verifiableCredential: IDidVerifiableCredential = {\n\t\t\t\"@context\": [\n\t\t\t\tproofEntity.vcContext ?? DidContexts.ContextVCv1,\n\t\t\t\tImmutableProofContexts.Context,\n\t\t\t\tImmutableProofContexts.ContextCommon\n\t\t\t],\n\t\t\ttype: [DidTypes.VerifiableCredential, ImmutableProofTypes.ImmutableProof],\n\t\t\tid,\n\t\t\tissuer: proofEntity.organizationId,\n\t\t\tcredentialSubject: {\n\t\t\t\tid: proofEntity.proofObjectId,\n\t\t\t\tproofIntegrity: proofEntity.proofObjectIntegrity\n\t\t\t}\n\t\t} as IDidVerifiableCredential;\n\n\t\tVerifiableCredentialHelper.setValidFrom(verifiableCredential, proofEntity.dateCreated);\n\n\t\tlet verified = false;\n\t\tlet failure: ImmutableProofFailure | undefined = ImmutableProofFailure.NotIssued;\n\n\t\tif (Is.stringValue(proofEntity.verifiableStorageId)) {\n\t\t\tfailure = ImmutableProofFailure.ProofMissing;\n\t\t\tconst immutableResult = await this._verifiableStorage.get(proofEntity.verifiableStorageId);\n\n\t\t\tif (Is.uint8Array(immutableResult.data)) {\n\t\t\t\tconst proof = ObjectHelper.fromBytes<IProof>(immutableResult.data);\n\n\t\t\t\tconst proofWithReceipt = {\n\t\t\t\t\t...proof,\n\t\t\t\t\tverificationMethod: `${proofEntity.organizationId}#${this._verificationMethodId}`,\n\t\t\t\t\tverifiableStorageId: proofEntity.verifiableStorageId,\n\t\t\t\t\timmutableReceipt: immutableResult.receipt\n\t\t\t\t};\n\n\t\t\t\t// Add the proof from the verifiable storage\n\t\t\t\t// expand it with the verifiable storage id and receipt\n\t\t\t\tverifiableCredential.proof = proofWithReceipt;\n\n\t\t\t\tif (verify && Is.object<IProof>(proof)) {\n\t\t\t\t\ttry {\n\t\t\t\t\t\tconst result =\n\t\t\t\t\t\t\tawait this._identityConnector.checkVerifiableCredential(verifiableCredential);\n\t\t\t\t\t\tif (result.revoked) {\n\t\t\t\t\t\t\tverified = false;\n\t\t\t\t\t\t\tfailure = ImmutableProofFailure.Revoked;\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\tverified = true;\n\t\t\t\t\t\t\tfailure = undefined;\n\t\t\t\t\t\t}\n\t\t\t\t\t} catch {\n\t\t\t\t\t\tverified = false;\n\t\t\t\t\t\tfailure = ImmutableProofFailure.VerificationFailure;\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\treturn {\n\t\t\tverifiableCredential: await JsonLdProcessor.compact(\n\t\t\t\tverifiableCredential,\n\t\t\t\tJsonLdProcessor.gatherContexts(verifiableCredential)\n\t\t\t),\n\t\t\tverified,\n\t\t\tfailure\n\t\t};\n\t}\n}\n"]}
|
package/dist/es/index.js
ADDED
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
// Copyright 2024 IOTA Stiftung.
|
|
2
|
+
// SPDX-License-Identifier: Apache-2.0.
|
|
3
|
+
export * from "./entities/immutableProof.js";
|
|
4
|
+
export * from "./immutableProofRoutes.js";
|
|
5
|
+
export * from "./immutableProofService.js";
|
|
6
|
+
export * from "./models/IImmutableProofServiceConfig.js";
|
|
7
|
+
export * from "./models/IImmutableProofServiceConstructorOptions.js";
|
|
8
|
+
export * from "./restEntryPoints.js";
|
|
9
|
+
export * from "./schema.js";
|
|
10
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA,gCAAgC;AAChC,uCAAuC;AACvC,cAAc,8BAA8B,CAAC;AAC7C,cAAc,2BAA2B,CAAC;AAC1C,cAAc,4BAA4B,CAAC;AAC3C,cAAc,0CAA0C,CAAC;AACzD,cAAc,sDAAsD,CAAC;AACrE,cAAc,sBAAsB,CAAC;AACrC,cAAc,aAAa,CAAC","sourcesContent":["// Copyright 2024 IOTA Stiftung.\n// SPDX-License-Identifier: Apache-2.0.\nexport * from \"./entities/immutableProof.js\";\nexport * from \"./immutableProofRoutes.js\";\nexport * from \"./immutableProofService.js\";\nexport * from \"./models/IImmutableProofServiceConfig.js\";\nexport * from \"./models/IImmutableProofServiceConstructorOptions.js\";\nexport * from \"./restEntryPoints.js\";\nexport * from \"./schema.js\";\n"]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"IImmutableProofServiceConfig.js","sourceRoot":"","sources":["../../../src/models/IImmutableProofServiceConfig.ts"],"names":[],"mappings":"AAAA,gCAAgC;AAChC,uCAAuC","sourcesContent":["// Copyright 2024 IOTA Stiftung.\n// SPDX-License-Identifier: Apache-2.0.\n\n/**\n * Configuration for the immutable proof service.\n */\nexport interface IImmutableProofServiceConfig {\n\t/**\n\t * The verification method id to use for the proof.\n\t * @default immutable-proof-assertion\n\t */\n\tverificationMethodId?: string;\n}\n"]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"IImmutableProofServiceConstructorOptions.js","sourceRoot":"","sources":["../../../src/models/IImmutableProofServiceConstructorOptions.ts"],"names":[],"mappings":"","sourcesContent":["// Copyright 2024 IOTA Stiftung.\n// SPDX-License-Identifier: Apache-2.0.\nimport type { IImmutableProofServiceConfig } from \"./IImmutableProofServiceConfig.js\";\n\n/**\n * Options for the immutable proof service constructor.\n */\nexport interface IImmutableProofServiceConstructorOptions {\n\t/**\n\t * The entity storage for proofs.\n\t * @default immutable-proof\n\t */\n\timmutableProofEntityStorageType?: string;\n\n\t/**\n\t * The verifiable storage.\n\t * @default verifiable-storage\n\t */\n\tverifiableStorageType?: string;\n\n\t/**\n\t * The logging component type.\n\t * @default logging\n\t */\n\tloggingComponentType?: string;\n\n\t/**\n\t * The identity connector type.\n\t * @default identity\n\t */\n\tidentityConnectorType?: string;\n\n\t/**\n\t * The background task component type.\n\t * @default background-task\n\t */\n\tbackgroundTaskComponentType?: string;\n\n\t/**\n\t * The event bus component type, defaults to no event bus.\n\t */\n\teventBusComponentType?: string;\n\n\t/**\n\t * The configuration for the connector.\n\t */\n\tconfig?: IImmutableProofServiceConfig;\n}\n"]}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
import { generateRestRoutesImmutableProof, tagsImmutableProof } from "./immutableProofRoutes.js";
|
|
2
|
+
export const restEntryPoints = [
|
|
3
|
+
{
|
|
4
|
+
name: "immutable-proof",
|
|
5
|
+
defaultBaseRoute: "immutable-proof",
|
|
6
|
+
tags: tagsImmutableProof,
|
|
7
|
+
generateRoutes: generateRestRoutesImmutableProof
|
|
8
|
+
}
|
|
9
|
+
];
|
|
10
|
+
//# sourceMappingURL=restEntryPoints.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"restEntryPoints.js","sourceRoot":"","sources":["../../src/restEntryPoints.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,gCAAgC,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAC;AAEjG,MAAM,CAAC,MAAM,eAAe,GAA2B;IACtD;QACC,IAAI,EAAE,iBAAiB;QACvB,gBAAgB,EAAE,iBAAiB;QACnC,IAAI,EAAE,kBAAkB;QACxB,cAAc,EAAE,gCAAgC;KAChD;CACD,CAAC","sourcesContent":["// Copyright 2024 IOTA Stiftung.\n// SPDX-License-Identifier: Apache-2.0.\nimport type { IRestRouteEntryPoint } from \"@twin.org/api-models\";\nimport { generateRestRoutesImmutableProof, tagsImmutableProof } from \"./immutableProofRoutes.js\";\n\nexport const restEntryPoints: IRestRouteEntryPoint[] = [\n\t{\n\t\tname: \"immutable-proof\",\n\t\tdefaultBaseRoute: \"immutable-proof\",\n\t\ttags: tagsImmutableProof,\n\t\tgenerateRoutes: generateRestRoutesImmutableProof\n\t}\n];\n"]}
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
// Copyright 2024 IOTA Stiftung.
|
|
2
|
+
// SPDX-License-Identifier: Apache-2.0.
|
|
3
|
+
import { EntitySchemaFactory, EntitySchemaHelper } from "@twin.org/entity";
|
|
4
|
+
import { ImmutableProof } from "./entities/immutableProof.js";
|
|
5
|
+
/**
|
|
6
|
+
* Initialize the schema for the immutable proof entity storage connector.
|
|
7
|
+
*/
|
|
8
|
+
export function initSchema() {
|
|
9
|
+
EntitySchemaFactory.register("ImmutableProof", () => EntitySchemaHelper.getSchema(ImmutableProof));
|
|
10
|
+
}
|
|
11
|
+
//# sourceMappingURL=schema.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"schema.js","sourceRoot":"","sources":["../../src/schema.ts"],"names":[],"mappings":"AAAA,gCAAgC;AAChC,uCAAuC;AACvC,OAAO,EAAE,mBAAmB,EAAE,kBAAkB,EAAE,MAAM,kBAAkB,CAAC;AAE3E,OAAO,EAAE,cAAc,EAAE,MAAM,8BAA8B,CAAC;AAE9D;;GAEG;AACH,MAAM,UAAU,UAAU;IACzB,mBAAmB,CAAC,QAAQ,mBAA2B,GAAG,EAAE,CAC3D,kBAAkB,CAAC,SAAS,CAAC,cAAc,CAAC,CAC5C,CAAC;AACH,CAAC","sourcesContent":["// Copyright 2024 IOTA Stiftung.\n// SPDX-License-Identifier: Apache-2.0.\nimport { EntitySchemaFactory, EntitySchemaHelper } from \"@twin.org/entity\";\nimport { nameof } from \"@twin.org/nameof\";\nimport { ImmutableProof } from \"./entities/immutableProof.js\";\n\n/**\n * Initialize the schema for the immutable proof entity storage connector.\n */\nexport function initSchema(): void {\n\tEntitySchemaFactory.register(nameof<ImmutableProof>(), () =>\n\t\tEntitySchemaHelper.getSchema(ImmutableProof)\n\t);\n}\n"]}
|
|
@@ -1,3 +1,4 @@
|
|
|
1
|
+
import type { DidContexts } from "@twin.org/standards-w3c-did";
|
|
1
2
|
/**
|
|
2
3
|
* Class describing the immutable proof.
|
|
3
4
|
*/
|
|
@@ -7,13 +8,9 @@ export declare class ImmutableProof {
|
|
|
7
8
|
*/
|
|
8
9
|
id: string;
|
|
9
10
|
/**
|
|
10
|
-
* The
|
|
11
|
+
* The organization id.
|
|
11
12
|
*/
|
|
12
|
-
|
|
13
|
-
/**
|
|
14
|
-
* The identity of the user which created the proof.
|
|
15
|
-
*/
|
|
16
|
-
userIdentity: string;
|
|
13
|
+
organizationId: string;
|
|
17
14
|
/**
|
|
18
15
|
* The date/time of when the proof was created.
|
|
19
16
|
*/
|
|
@@ -23,11 +20,15 @@ export declare class ImmutableProof {
|
|
|
23
20
|
*/
|
|
24
21
|
proofObjectId?: string;
|
|
25
22
|
/**
|
|
26
|
-
* The associated
|
|
23
|
+
* The associated integrity for the item.
|
|
27
24
|
*/
|
|
28
|
-
|
|
25
|
+
proofObjectIntegrity: string;
|
|
29
26
|
/**
|
|
30
27
|
* The verifiable storage id.
|
|
31
28
|
*/
|
|
32
29
|
verifiableStorageId?: string;
|
|
30
|
+
/**
|
|
31
|
+
* The verifiable credential context.
|
|
32
|
+
*/
|
|
33
|
+
vcContext?: typeof DidContexts.ContextVCv1 | typeof DidContexts.ContextVCv2;
|
|
33
34
|
}
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
import { type IJsonLdNodeObject } from "@twin.org/data-json-ld";
|
|
2
|
-
import { type
|
|
3
|
-
import type
|
|
2
|
+
import { type IImmutableProofComponent, type IImmutableProofVerification } from "@twin.org/immutable-proof-models";
|
|
3
|
+
import { type IDidVerifiableCredential } from "@twin.org/standards-w3c-did";
|
|
4
|
+
import type { IImmutableProofServiceConstructorOptions } from "./models/IImmutableProofServiceConstructorOptions.js";
|
|
4
5
|
/**
|
|
5
6
|
* Class for performing immutable proof operations.
|
|
6
7
|
*/
|
|
@@ -14,21 +15,30 @@ export declare class ImmutableProofService implements IImmutableProofComponent {
|
|
|
14
15
|
* @param options The dependencies for the immutable proof connector.
|
|
15
16
|
*/
|
|
16
17
|
constructor(options?: IImmutableProofServiceConstructorOptions);
|
|
18
|
+
/**
|
|
19
|
+
* Returns the class name of the component.
|
|
20
|
+
* @returns The class name of the component.
|
|
21
|
+
*/
|
|
22
|
+
className(): string;
|
|
23
|
+
/**
|
|
24
|
+
* The component needs to be started when the node is initialized.
|
|
25
|
+
* @param nodeLoggingComponentType The node logging component type.
|
|
26
|
+
* @returns Nothing.
|
|
27
|
+
*/
|
|
28
|
+
start(nodeLoggingComponentType?: string): Promise<void>;
|
|
17
29
|
/**
|
|
18
30
|
* Create a new proof.
|
|
19
31
|
* @param document The document to create the proof for.
|
|
20
|
-
* @param userIdentity The identity to create the immutable proof operation with.
|
|
21
|
-
* @param nodeIdentity The node identity to use for vault operations.
|
|
22
32
|
* @returns The id of the new proof.
|
|
23
33
|
*/
|
|
24
|
-
create(document: IJsonLdNodeObject
|
|
34
|
+
create(document: IJsonLdNodeObject): Promise<string>;
|
|
25
35
|
/**
|
|
26
36
|
* Get a proof.
|
|
27
37
|
* @param id The id of the proof to get.
|
|
28
38
|
* @returns The proof.
|
|
29
39
|
* @throws NotFoundError if the proof is not found.
|
|
30
40
|
*/
|
|
31
|
-
get(id: string): Promise<
|
|
41
|
+
get(id: string): Promise<IDidVerifiableCredential>;
|
|
32
42
|
/**
|
|
33
43
|
* Verify a proof.
|
|
34
44
|
* @param id The id of the proof to verify.
|
|
@@ -39,9 +49,8 @@ export declare class ImmutableProofService implements IImmutableProofComponent {
|
|
|
39
49
|
/**
|
|
40
50
|
* Remove the verifiable storage for the proof.
|
|
41
51
|
* @param id The id of the proof to remove the storage from.
|
|
42
|
-
* @param nodeIdentity The node identity to use for vault operations.
|
|
43
52
|
* @returns Nothing.
|
|
44
53
|
* @throws NotFoundError if the proof is not found.
|
|
45
54
|
*/
|
|
46
|
-
removeVerifiable(id: string
|
|
55
|
+
removeVerifiable(id: string): Promise<void>;
|
|
47
56
|
}
|
package/dist/types/index.d.ts
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
export * from "./entities/immutableProof";
|
|
2
|
-
export * from "./immutableProofRoutes";
|
|
3
|
-
export * from "./immutableProofService";
|
|
4
|
-
export * from "./models/IImmutableProofServiceConfig";
|
|
5
|
-
export * from "./models/IImmutableProofServiceConstructorOptions";
|
|
6
|
-
export * from "./restEntryPoints";
|
|
7
|
-
export * from "./schema";
|
|
1
|
+
export * from "./entities/immutableProof.js";
|
|
2
|
+
export * from "./immutableProofRoutes.js";
|
|
3
|
+
export * from "./immutableProofService.js";
|
|
4
|
+
export * from "./models/IImmutableProofServiceConfig.js";
|
|
5
|
+
export * from "./models/IImmutableProofServiceConstructorOptions.js";
|
|
6
|
+
export * from "./restEntryPoints.js";
|
|
7
|
+
export * from "./schema.js";
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import type { IImmutableProofServiceConfig } from "./IImmutableProofServiceConfig";
|
|
1
|
+
import type { IImmutableProofServiceConfig } from "./IImmutableProofServiceConfig.js";
|
|
2
2
|
/**
|
|
3
3
|
* Options for the immutable proof service constructor.
|
|
4
4
|
*/
|
|
@@ -13,16 +13,21 @@ export interface IImmutableProofServiceConstructorOptions {
|
|
|
13
13
|
* @default verifiable-storage
|
|
14
14
|
*/
|
|
15
15
|
verifiableStorageType?: string;
|
|
16
|
+
/**
|
|
17
|
+
* The logging component type.
|
|
18
|
+
* @default logging
|
|
19
|
+
*/
|
|
20
|
+
loggingComponentType?: string;
|
|
16
21
|
/**
|
|
17
22
|
* The identity connector type.
|
|
18
23
|
* @default identity
|
|
19
24
|
*/
|
|
20
25
|
identityConnectorType?: string;
|
|
21
26
|
/**
|
|
22
|
-
* The background task
|
|
27
|
+
* The background task component type.
|
|
23
28
|
* @default background-task
|
|
24
29
|
*/
|
|
25
|
-
|
|
30
|
+
backgroundTaskComponentType?: string;
|
|
26
31
|
/**
|
|
27
32
|
* The event bus component type, defaults to no event bus.
|
|
28
33
|
*/
|