@zkpassport/sdk 0.11.0-beta.2 → 0.11.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -29,7 +29,7 @@ __export(constants_exports, {
29
29
  ZKPASSPORT_IOS_APP_ID_HASH: () => ZKPASSPORT_IOS_APP_ID_HASH
30
30
  });
31
31
  module.exports = __toCommonJS(constants_exports);
32
- var VERSION = "0.10.0";
32
+ var VERSION = "0.11.0";
33
33
  var DEFAULT_VALIDITY = 7 * 24 * 60 * 60;
34
34
  var DEFAULT_DATE_VALUE = /* @__PURE__ */ new Date(0);
35
35
  var ZKPASSPORT_IOS_APP_ID_HASH = "0x1fa73686cf510f8f85757b0602de0dd72a13e68ae2092462be8b72662e7f179b";
@@ -1,4 +1,4 @@
1
- declare const VERSION = "0.10.0";
1
+ declare const VERSION = "0.11.0";
2
2
  declare const DEFAULT_VALIDITY: number;
3
3
  declare const DEFAULT_DATE_VALUE: Date;
4
4
  declare const ZKPASSPORT_IOS_APP_ID_HASH = "0x1fa73686cf510f8f85757b0602de0dd72a13e68ae2092462be8b72662e7f179b";
@@ -65,7 +65,7 @@ var import_utils = require("@zkpassport/utils");
65
65
  var import_registry = require("@zkpassport/registry");
66
66
 
67
67
  // src/constants.ts
68
- var VERSION = "0.10.0";
68
+ var VERSION = "0.11.0";
69
69
  var DEFAULT_VALIDITY = 7 * 24 * 60 * 60;
70
70
  var DEFAULT_DATE_VALUE = /* @__PURE__ */ new Date(0);
71
71
  var ZKPASSPORT_IOS_APP_ID_HASH = "0x1fa73686cf510f8f85757b0602de0dd72a13e68ae2092462be8b72662e7f179b";
@@ -924,23 +924,35 @@ var PublicInputChecker = class {
924
924
  }
925
925
  return { isCorrect, queryResultErrors };
926
926
  }
927
- static async checkSanctionsExclusionPublicInputs(queryResult, root, sanctionsBuilder) {
927
+ static async checkSanctionsExclusionPublicInputs(queryResult, sanctionsCommittedInputs, sanctionsBuilder) {
928
928
  const queryResultErrors = {};
929
929
  let isCorrect = true;
930
930
  if (queryResult.sanctions && queryResult.sanctions.passed) {
931
931
  const EXPECTED_ROOT = await sanctionsBuilder.getRoot();
932
- if (root !== EXPECTED_ROOT) {
932
+ if (sanctionsCommittedInputs.rootHash !== EXPECTED_ROOT) {
933
933
  console.warn("Invalid sanctions registry root");
934
934
  isCorrect = false;
935
935
  queryResultErrors.sanctions = {
936
936
  ...queryResultErrors.sanctions,
937
937
  eq: {
938
938
  expected: EXPECTED_ROOT,
939
- received: root,
939
+ received: sanctionsCommittedInputs.rootHash,
940
940
  message: "Invalid sanctions registry root"
941
941
  }
942
942
  };
943
943
  }
944
+ if (queryResult.sanctions.isStrict !== sanctionsCommittedInputs.isStrict) {
945
+ console.warn("Invalid sanctions strict mode");
946
+ isCorrect = false;
947
+ queryResultErrors.sanctions = {
948
+ ...queryResultErrors.sanctions,
949
+ eq: {
950
+ expected: queryResult.sanctions.isStrict.toString(),
951
+ received: sanctionsCommittedInputs.isStrict.toString(),
952
+ message: "Invalid sanctions strict mode"
953
+ }
954
+ };
955
+ }
944
956
  }
945
957
  return { isCorrect, queryResultErrors };
946
958
  }
@@ -1433,7 +1445,7 @@ var PublicInputChecker = class {
1433
1445
  queryResultErrors: queryResultErrorsSanctionsExclusion
1434
1446
  } = await this.checkSanctionsExclusionPublicInputs(
1435
1447
  queryResult,
1436
- exclusionCheckSanctionsCommittedInputs.rootHash,
1448
+ exclusionCheckSanctionsCommittedInputs,
1437
1449
  sanctionsBuilder
1438
1450
  );
1439
1451
  isCorrect = isCorrect && isCorrectSanctionsExclusion;
@@ -2106,7 +2118,7 @@ var PublicInputChecker = class {
2106
2118
  queryResultErrors: queryResultErrorsSanctionsExclusion
2107
2119
  } = await this.checkSanctionsExclusionPublicInputs(
2108
2120
  queryResult,
2109
- exclusionCheckSanctionsCommittedInputs.rootHash,
2121
+ exclusionCheckSanctionsCommittedInputs,
2110
2122
  sanctionsBuilder
2111
2123
  );
2112
2124
  isCorrect = isCorrect && isCorrectSanctionsExclusion;
@@ -4161,8 +4173,7 @@ var SolidityVerifier = class {
4161
4173
  publicInputs: proofData.publicInputs
4162
4174
  },
4163
4175
  commitments: {
4164
- committedInputs: `0x${compressedCommittedInputs}`,
4165
- committedInputCounts: committedInputCountsArray
4176
+ committedInputs: `0x${compressedCommittedInputs}`
4166
4177
  },
4167
4178
  serviceConfig: {
4168
4179
  validityPeriodInSeconds,
@@ -885,23 +885,35 @@ var PublicInputChecker = class {
885
885
  }
886
886
  return { isCorrect, queryResultErrors };
887
887
  }
888
- static async checkSanctionsExclusionPublicInputs(queryResult, root, sanctionsBuilder) {
888
+ static async checkSanctionsExclusionPublicInputs(queryResult, sanctionsCommittedInputs, sanctionsBuilder) {
889
889
  const queryResultErrors = {};
890
890
  let isCorrect = true;
891
891
  if (queryResult.sanctions && queryResult.sanctions.passed) {
892
892
  const EXPECTED_ROOT = await sanctionsBuilder.getRoot();
893
- if (root !== EXPECTED_ROOT) {
893
+ if (sanctionsCommittedInputs.rootHash !== EXPECTED_ROOT) {
894
894
  console.warn("Invalid sanctions registry root");
895
895
  isCorrect = false;
896
896
  queryResultErrors.sanctions = {
897
897
  ...queryResultErrors.sanctions,
898
898
  eq: {
899
899
  expected: EXPECTED_ROOT,
900
- received: root,
900
+ received: sanctionsCommittedInputs.rootHash,
901
901
  message: "Invalid sanctions registry root"
902
902
  }
903
903
  };
904
904
  }
905
+ if (queryResult.sanctions.isStrict !== sanctionsCommittedInputs.isStrict) {
906
+ console.warn("Invalid sanctions strict mode");
907
+ isCorrect = false;
908
+ queryResultErrors.sanctions = {
909
+ ...queryResultErrors.sanctions,
910
+ eq: {
911
+ expected: queryResult.sanctions.isStrict.toString(),
912
+ received: sanctionsCommittedInputs.isStrict.toString(),
913
+ message: "Invalid sanctions strict mode"
914
+ }
915
+ };
916
+ }
905
917
  }
906
918
  return { isCorrect, queryResultErrors };
907
919
  }
@@ -1394,7 +1406,7 @@ var PublicInputChecker = class {
1394
1406
  queryResultErrors: queryResultErrorsSanctionsExclusion
1395
1407
  } = await this.checkSanctionsExclusionPublicInputs(
1396
1408
  queryResult,
1397
- exclusionCheckSanctionsCommittedInputs.rootHash,
1409
+ exclusionCheckSanctionsCommittedInputs,
1398
1410
  sanctionsBuilder
1399
1411
  );
1400
1412
  isCorrect = isCorrect && isCorrectSanctionsExclusion;
@@ -2067,7 +2079,7 @@ var PublicInputChecker = class {
2067
2079
  queryResultErrors: queryResultErrorsSanctionsExclusion
2068
2080
  } = await this.checkSanctionsExclusionPublicInputs(
2069
2081
  queryResult,
2070
- exclusionCheckSanctionsCommittedInputs.rootHash,
2082
+ exclusionCheckSanctionsCommittedInputs,
2071
2083
  sanctionsBuilder
2072
2084
  );
2073
2085
  isCorrect = isCorrect && isCorrectSanctionsExclusion;
@@ -1,4 +1,4 @@
1
- import { ProofResult, QueryResult, ProofData, BoundData, SanctionsBuilder, FacematchCommittedInputs, NullifierType } from '@zkpassport/utils';
1
+ import { ProofResult, QueryResult, ProofData, BoundData, SanctionsCommittedInputs, SanctionsBuilder, FacematchCommittedInputs, NullifierType } from '@zkpassport/utils';
2
2
  import { QueryResultErrors } from './types.cjs';
3
3
 
4
4
  declare class PublicInputChecker {
@@ -50,7 +50,7 @@ declare class PublicInputChecker {
50
50
  isCorrect: boolean;
51
51
  queryResultErrors: Partial<QueryResultErrors>;
52
52
  };
53
- static checkSanctionsExclusionPublicInputs(queryResult: QueryResult, root: string, sanctionsBuilder: SanctionsBuilder): Promise<{
53
+ static checkSanctionsExclusionPublicInputs(queryResult: QueryResult, sanctionsCommittedInputs: SanctionsCommittedInputs, sanctionsBuilder: SanctionsBuilder): Promise<{
54
54
  isCorrect: boolean;
55
55
  queryResultErrors: Partial<QueryResultErrors>;
56
56
  }>;
@@ -2015,8 +2015,7 @@ var SolidityVerifier = class {
2015
2015
  publicInputs: proofData.publicInputs
2016
2016
  },
2017
2017
  commitments: {
2018
- committedInputs: `0x${compressedCommittedInputs}`,
2019
- committedInputCounts: committedInputCountsArray
2018
+ committedInputs: `0x${compressedCommittedInputs}`
2020
2019
  },
2021
2020
  serviceConfig: {
2022
2021
  validityPeriodInSeconds,
@@ -28,7 +28,6 @@ type SolidityProofVerificationData = {
28
28
  };
29
29
  type SolidityCommitments = {
30
30
  committedInputs: string;
31
- committedInputCounts: number[];
32
31
  };
33
32
  type SolidityServiceConfig = {
34
33
  validityPeriodInSeconds: number;
@@ -1,5 +1,5 @@
1
1
  // src/constants.ts
2
- var VERSION = "0.10.0";
2
+ var VERSION = "0.11.0";
3
3
  var DEFAULT_VALIDITY = 7 * 24 * 60 * 60;
4
4
  var DEFAULT_DATE_VALUE = /* @__PURE__ */ new Date(0);
5
5
  var ZKPASSPORT_IOS_APP_ID_HASH = "0x1fa73686cf510f8f85757b0602de0dd72a13e68ae2092462be8b72662e7f179b";
@@ -1,6 +1,6 @@
1
1
  import {
2
2
  DEFAULT_VALIDITY
3
- } from "./chunk-JG37KYXW.js";
3
+ } from "./chunk-B57NBZWJ.js";
4
4
 
5
5
  // src/solidity-verifier.ts
6
6
  import {
@@ -2000,8 +2000,7 @@ var SolidityVerifier = class {
2000
2000
  publicInputs: proofData.publicInputs
2001
2001
  },
2002
2002
  commitments: {
2003
- committedInputs: `0x${compressedCommittedInputs}`,
2004
- committedInputCounts: committedInputCountsArray
2003
+ committedInputs: `0x${compressedCommittedInputs}`
2005
2004
  },
2006
2005
  serviceConfig: {
2007
2006
  validityPeriodInSeconds,
@@ -5,7 +5,7 @@ import {
5
5
  GOOGLE_APP_ATTEST_RSA_ROOT_KEY_HASH,
6
6
  ZKPASSPORT_ANDROID_APP_ID_HASH,
7
7
  ZKPASSPORT_IOS_APP_ID_HASH
8
- } from "./chunk-JG37KYXW.js";
8
+ } from "./chunk-B57NBZWJ.js";
9
9
 
10
10
  // src/public-input-checker.ts
11
11
  import {
@@ -911,23 +911,35 @@ var PublicInputChecker = class {
911
911
  }
912
912
  return { isCorrect, queryResultErrors };
913
913
  }
914
- static async checkSanctionsExclusionPublicInputs(queryResult, root, sanctionsBuilder) {
914
+ static async checkSanctionsExclusionPublicInputs(queryResult, sanctionsCommittedInputs, sanctionsBuilder) {
915
915
  const queryResultErrors = {};
916
916
  let isCorrect = true;
917
917
  if (queryResult.sanctions && queryResult.sanctions.passed) {
918
918
  const EXPECTED_ROOT = await sanctionsBuilder.getRoot();
919
- if (root !== EXPECTED_ROOT) {
919
+ if (sanctionsCommittedInputs.rootHash !== EXPECTED_ROOT) {
920
920
  console.warn("Invalid sanctions registry root");
921
921
  isCorrect = false;
922
922
  queryResultErrors.sanctions = {
923
923
  ...queryResultErrors.sanctions,
924
924
  eq: {
925
925
  expected: EXPECTED_ROOT,
926
- received: root,
926
+ received: sanctionsCommittedInputs.rootHash,
927
927
  message: "Invalid sanctions registry root"
928
928
  }
929
929
  };
930
930
  }
931
+ if (queryResult.sanctions.isStrict !== sanctionsCommittedInputs.isStrict) {
932
+ console.warn("Invalid sanctions strict mode");
933
+ isCorrect = false;
934
+ queryResultErrors.sanctions = {
935
+ ...queryResultErrors.sanctions,
936
+ eq: {
937
+ expected: queryResult.sanctions.isStrict.toString(),
938
+ received: sanctionsCommittedInputs.isStrict.toString(),
939
+ message: "Invalid sanctions strict mode"
940
+ }
941
+ };
942
+ }
931
943
  }
932
944
  return { isCorrect, queryResultErrors };
933
945
  }
@@ -1420,7 +1432,7 @@ var PublicInputChecker = class {
1420
1432
  queryResultErrors: queryResultErrorsSanctionsExclusion
1421
1433
  } = await this.checkSanctionsExclusionPublicInputs(
1422
1434
  queryResult,
1423
- exclusionCheckSanctionsCommittedInputs.rootHash,
1435
+ exclusionCheckSanctionsCommittedInputs,
1424
1436
  sanctionsBuilder
1425
1437
  );
1426
1438
  isCorrect = isCorrect && isCorrectSanctionsExclusion;
@@ -2093,7 +2105,7 @@ var PublicInputChecker = class {
2093
2105
  queryResultErrors: queryResultErrorsSanctionsExclusion
2094
2106
  } = await this.checkSanctionsExclusionPublicInputs(
2095
2107
  queryResult,
2096
- exclusionCheckSanctionsCommittedInputs.rootHash,
2108
+ exclusionCheckSanctionsCommittedInputs,
2097
2109
  sanctionsBuilder
2098
2110
  );
2099
2111
  isCorrect = isCorrect && isCorrectSanctionsExclusion;
@@ -1,4 +1,4 @@
1
- declare const VERSION = "0.10.0";
1
+ declare const VERSION = "0.11.0";
2
2
  declare const DEFAULT_VALIDITY: number;
3
3
  declare const DEFAULT_DATE_VALUE: Date;
4
4
  declare const ZKPASSPORT_IOS_APP_ID_HASH = "0x1fa73686cf510f8f85757b0602de0dd72a13e68ae2092462be8b72662e7f179b";
@@ -6,7 +6,7 @@ import {
6
6
  VERSION,
7
7
  ZKPASSPORT_ANDROID_APP_ID_HASH,
8
8
  ZKPASSPORT_IOS_APP_ID_HASH
9
- } from "./chunk-JG37KYXW.js";
9
+ } from "./chunk-B57NBZWJ.js";
10
10
  export {
11
11
  APPLE_APP_ATTEST_ROOT_KEY_HASH,
12
12
  DEFAULT_DATE_VALUE,
package/dist/esm/index.js CHANGED
@@ -3,14 +3,14 @@ import {
3
3
  } from "./chunk-AFLQN3AC.js";
4
4
  import {
5
5
  PublicInputChecker
6
- } from "./chunk-6IK5VUOR.js";
6
+ } from "./chunk-N322IQZC.js";
7
7
  import {
8
8
  SolidityVerifier
9
- } from "./chunk-CFGZMKF7.js";
9
+ } from "./chunk-KUTKOI3P.js";
10
10
  import {
11
11
  DEFAULT_VALIDITY,
12
12
  VERSION
13
- } from "./chunk-JG37KYXW.js";
13
+ } from "./chunk-B57NBZWJ.js";
14
14
  import "./chunk-6F4PWJZI.js";
15
15
 
16
16
  // src/index.ts
@@ -1,4 +1,4 @@
1
- import { ProofResult, QueryResult, ProofData, BoundData, SanctionsBuilder, FacematchCommittedInputs, NullifierType } from '@zkpassport/utils';
1
+ import { ProofResult, QueryResult, ProofData, BoundData, SanctionsCommittedInputs, SanctionsBuilder, FacematchCommittedInputs, NullifierType } from '@zkpassport/utils';
2
2
  import { QueryResultErrors } from './types.js';
3
3
 
4
4
  declare class PublicInputChecker {
@@ -50,7 +50,7 @@ declare class PublicInputChecker {
50
50
  isCorrect: boolean;
51
51
  queryResultErrors: Partial<QueryResultErrors>;
52
52
  };
53
- static checkSanctionsExclusionPublicInputs(queryResult: QueryResult, root: string, sanctionsBuilder: SanctionsBuilder): Promise<{
53
+ static checkSanctionsExclusionPublicInputs(queryResult: QueryResult, sanctionsCommittedInputs: SanctionsCommittedInputs, sanctionsBuilder: SanctionsBuilder): Promise<{
54
54
  isCorrect: boolean;
55
55
  queryResultErrors: Partial<QueryResultErrors>;
56
56
  }>;
@@ -1,7 +1,7 @@
1
1
  import {
2
2
  PublicInputChecker
3
- } from "./chunk-6IK5VUOR.js";
4
- import "./chunk-JG37KYXW.js";
3
+ } from "./chunk-N322IQZC.js";
4
+ import "./chunk-B57NBZWJ.js";
5
5
  export {
6
6
  PublicInputChecker
7
7
  };
@@ -1,7 +1,7 @@
1
1
  import {
2
2
  SolidityVerifier
3
- } from "./chunk-CFGZMKF7.js";
4
- import "./chunk-JG37KYXW.js";
3
+ } from "./chunk-KUTKOI3P.js";
4
+ import "./chunk-B57NBZWJ.js";
5
5
  export {
6
6
  SolidityVerifier
7
7
  };
@@ -28,7 +28,6 @@ type SolidityProofVerificationData = {
28
28
  };
29
29
  type SolidityCommitments = {
30
30
  committedInputs: string;
31
- committedInputCounts: number[];
32
31
  };
33
32
  type SolidityServiceConfig = {
34
33
  validityPeriodInSeconds: number;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@zkpassport/sdk",
3
- "version": "0.11.0-beta.2",
3
+ "version": "0.11.0",
4
4
  "description": "Privacy-preserving identity verification using passports and ID cards",
5
5
  "author": "ZKPassport",
6
6
  "license": "Apache-2.0",
@@ -37,7 +37,7 @@
37
37
  "@noble/secp256k1": "^2.2.3",
38
38
  "@obsidion/bridge": "^0.11.1",
39
39
  "@zkpassport/registry": "0.11.1",
40
- "@zkpassport/utils": "0.29.2",
40
+ "@zkpassport/utils": "0.29.3",
41
41
  "buffer": "^6.0.3",
42
42
  "i18n-iso-countries": "^7.12.0",
43
43
  "pako": "^2.1.0",