@zkpassport/sdk 0.11.0-beta.2 → 0.11.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/constants.cjs +1 -1
- package/dist/cjs/constants.d.cts +1 -1
- package/dist/cjs/index.cjs +19 -8
- package/dist/cjs/public-input-checker.cjs +17 -5
- package/dist/cjs/public-input-checker.d.cts +2 -2
- package/dist/cjs/solidity-verifier.cjs +1 -2
- package/dist/cjs/types.d.cts +0 -1
- package/dist/esm/{chunk-JG37KYXW.js → chunk-B57NBZWJ.js} +1 -1
- package/dist/esm/{chunk-CFGZMKF7.js → chunk-KUTKOI3P.js} +2 -3
- package/dist/esm/{chunk-6IK5VUOR.js → chunk-N322IQZC.js} +18 -6
- package/dist/esm/constants.d.ts +1 -1
- package/dist/esm/constants.js +1 -1
- package/dist/esm/index.js +3 -3
- package/dist/esm/public-input-checker.d.ts +2 -2
- package/dist/esm/public-input-checker.js +2 -2
- package/dist/esm/solidity-verifier.js +2 -2
- package/dist/esm/types.d.ts +0 -1
- package/package.json +2 -2
package/dist/cjs/constants.cjs
CHANGED
|
@@ -29,7 +29,7 @@ __export(constants_exports, {
|
|
|
29
29
|
ZKPASSPORT_IOS_APP_ID_HASH: () => ZKPASSPORT_IOS_APP_ID_HASH
|
|
30
30
|
});
|
|
31
31
|
module.exports = __toCommonJS(constants_exports);
|
|
32
|
-
var VERSION = "0.
|
|
32
|
+
var VERSION = "0.11.0";
|
|
33
33
|
var DEFAULT_VALIDITY = 7 * 24 * 60 * 60;
|
|
34
34
|
var DEFAULT_DATE_VALUE = /* @__PURE__ */ new Date(0);
|
|
35
35
|
var ZKPASSPORT_IOS_APP_ID_HASH = "0x1fa73686cf510f8f85757b0602de0dd72a13e68ae2092462be8b72662e7f179b";
|
package/dist/cjs/constants.d.cts
CHANGED
package/dist/cjs/index.cjs
CHANGED
|
@@ -65,7 +65,7 @@ var import_utils = require("@zkpassport/utils");
|
|
|
65
65
|
var import_registry = require("@zkpassport/registry");
|
|
66
66
|
|
|
67
67
|
// src/constants.ts
|
|
68
|
-
var VERSION = "0.
|
|
68
|
+
var VERSION = "0.11.0";
|
|
69
69
|
var DEFAULT_VALIDITY = 7 * 24 * 60 * 60;
|
|
70
70
|
var DEFAULT_DATE_VALUE = /* @__PURE__ */ new Date(0);
|
|
71
71
|
var ZKPASSPORT_IOS_APP_ID_HASH = "0x1fa73686cf510f8f85757b0602de0dd72a13e68ae2092462be8b72662e7f179b";
|
|
@@ -924,23 +924,35 @@ var PublicInputChecker = class {
|
|
|
924
924
|
}
|
|
925
925
|
return { isCorrect, queryResultErrors };
|
|
926
926
|
}
|
|
927
|
-
static async checkSanctionsExclusionPublicInputs(queryResult,
|
|
927
|
+
static async checkSanctionsExclusionPublicInputs(queryResult, sanctionsCommittedInputs, sanctionsBuilder) {
|
|
928
928
|
const queryResultErrors = {};
|
|
929
929
|
let isCorrect = true;
|
|
930
930
|
if (queryResult.sanctions && queryResult.sanctions.passed) {
|
|
931
931
|
const EXPECTED_ROOT = await sanctionsBuilder.getRoot();
|
|
932
|
-
if (
|
|
932
|
+
if (sanctionsCommittedInputs.rootHash !== EXPECTED_ROOT) {
|
|
933
933
|
console.warn("Invalid sanctions registry root");
|
|
934
934
|
isCorrect = false;
|
|
935
935
|
queryResultErrors.sanctions = {
|
|
936
936
|
...queryResultErrors.sanctions,
|
|
937
937
|
eq: {
|
|
938
938
|
expected: EXPECTED_ROOT,
|
|
939
|
-
received:
|
|
939
|
+
received: sanctionsCommittedInputs.rootHash,
|
|
940
940
|
message: "Invalid sanctions registry root"
|
|
941
941
|
}
|
|
942
942
|
};
|
|
943
943
|
}
|
|
944
|
+
if (queryResult.sanctions.isStrict !== sanctionsCommittedInputs.isStrict) {
|
|
945
|
+
console.warn("Invalid sanctions strict mode");
|
|
946
|
+
isCorrect = false;
|
|
947
|
+
queryResultErrors.sanctions = {
|
|
948
|
+
...queryResultErrors.sanctions,
|
|
949
|
+
eq: {
|
|
950
|
+
expected: queryResult.sanctions.isStrict.toString(),
|
|
951
|
+
received: sanctionsCommittedInputs.isStrict.toString(),
|
|
952
|
+
message: "Invalid sanctions strict mode"
|
|
953
|
+
}
|
|
954
|
+
};
|
|
955
|
+
}
|
|
944
956
|
}
|
|
945
957
|
return { isCorrect, queryResultErrors };
|
|
946
958
|
}
|
|
@@ -1433,7 +1445,7 @@ var PublicInputChecker = class {
|
|
|
1433
1445
|
queryResultErrors: queryResultErrorsSanctionsExclusion
|
|
1434
1446
|
} = await this.checkSanctionsExclusionPublicInputs(
|
|
1435
1447
|
queryResult,
|
|
1436
|
-
exclusionCheckSanctionsCommittedInputs
|
|
1448
|
+
exclusionCheckSanctionsCommittedInputs,
|
|
1437
1449
|
sanctionsBuilder
|
|
1438
1450
|
);
|
|
1439
1451
|
isCorrect = isCorrect && isCorrectSanctionsExclusion;
|
|
@@ -2106,7 +2118,7 @@ var PublicInputChecker = class {
|
|
|
2106
2118
|
queryResultErrors: queryResultErrorsSanctionsExclusion
|
|
2107
2119
|
} = await this.checkSanctionsExclusionPublicInputs(
|
|
2108
2120
|
queryResult,
|
|
2109
|
-
exclusionCheckSanctionsCommittedInputs
|
|
2121
|
+
exclusionCheckSanctionsCommittedInputs,
|
|
2110
2122
|
sanctionsBuilder
|
|
2111
2123
|
);
|
|
2112
2124
|
isCorrect = isCorrect && isCorrectSanctionsExclusion;
|
|
@@ -4161,8 +4173,7 @@ var SolidityVerifier = class {
|
|
|
4161
4173
|
publicInputs: proofData.publicInputs
|
|
4162
4174
|
},
|
|
4163
4175
|
commitments: {
|
|
4164
|
-
committedInputs: `0x${compressedCommittedInputs}
|
|
4165
|
-
committedInputCounts: committedInputCountsArray
|
|
4176
|
+
committedInputs: `0x${compressedCommittedInputs}`
|
|
4166
4177
|
},
|
|
4167
4178
|
serviceConfig: {
|
|
4168
4179
|
validityPeriodInSeconds,
|
|
@@ -885,23 +885,35 @@ var PublicInputChecker = class {
|
|
|
885
885
|
}
|
|
886
886
|
return { isCorrect, queryResultErrors };
|
|
887
887
|
}
|
|
888
|
-
static async checkSanctionsExclusionPublicInputs(queryResult,
|
|
888
|
+
static async checkSanctionsExclusionPublicInputs(queryResult, sanctionsCommittedInputs, sanctionsBuilder) {
|
|
889
889
|
const queryResultErrors = {};
|
|
890
890
|
let isCorrect = true;
|
|
891
891
|
if (queryResult.sanctions && queryResult.sanctions.passed) {
|
|
892
892
|
const EXPECTED_ROOT = await sanctionsBuilder.getRoot();
|
|
893
|
-
if (
|
|
893
|
+
if (sanctionsCommittedInputs.rootHash !== EXPECTED_ROOT) {
|
|
894
894
|
console.warn("Invalid sanctions registry root");
|
|
895
895
|
isCorrect = false;
|
|
896
896
|
queryResultErrors.sanctions = {
|
|
897
897
|
...queryResultErrors.sanctions,
|
|
898
898
|
eq: {
|
|
899
899
|
expected: EXPECTED_ROOT,
|
|
900
|
-
received:
|
|
900
|
+
received: sanctionsCommittedInputs.rootHash,
|
|
901
901
|
message: "Invalid sanctions registry root"
|
|
902
902
|
}
|
|
903
903
|
};
|
|
904
904
|
}
|
|
905
|
+
if (queryResult.sanctions.isStrict !== sanctionsCommittedInputs.isStrict) {
|
|
906
|
+
console.warn("Invalid sanctions strict mode");
|
|
907
|
+
isCorrect = false;
|
|
908
|
+
queryResultErrors.sanctions = {
|
|
909
|
+
...queryResultErrors.sanctions,
|
|
910
|
+
eq: {
|
|
911
|
+
expected: queryResult.sanctions.isStrict.toString(),
|
|
912
|
+
received: sanctionsCommittedInputs.isStrict.toString(),
|
|
913
|
+
message: "Invalid sanctions strict mode"
|
|
914
|
+
}
|
|
915
|
+
};
|
|
916
|
+
}
|
|
905
917
|
}
|
|
906
918
|
return { isCorrect, queryResultErrors };
|
|
907
919
|
}
|
|
@@ -1394,7 +1406,7 @@ var PublicInputChecker = class {
|
|
|
1394
1406
|
queryResultErrors: queryResultErrorsSanctionsExclusion
|
|
1395
1407
|
} = await this.checkSanctionsExclusionPublicInputs(
|
|
1396
1408
|
queryResult,
|
|
1397
|
-
exclusionCheckSanctionsCommittedInputs
|
|
1409
|
+
exclusionCheckSanctionsCommittedInputs,
|
|
1398
1410
|
sanctionsBuilder
|
|
1399
1411
|
);
|
|
1400
1412
|
isCorrect = isCorrect && isCorrectSanctionsExclusion;
|
|
@@ -2067,7 +2079,7 @@ var PublicInputChecker = class {
|
|
|
2067
2079
|
queryResultErrors: queryResultErrorsSanctionsExclusion
|
|
2068
2080
|
} = await this.checkSanctionsExclusionPublicInputs(
|
|
2069
2081
|
queryResult,
|
|
2070
|
-
exclusionCheckSanctionsCommittedInputs
|
|
2082
|
+
exclusionCheckSanctionsCommittedInputs,
|
|
2071
2083
|
sanctionsBuilder
|
|
2072
2084
|
);
|
|
2073
2085
|
isCorrect = isCorrect && isCorrectSanctionsExclusion;
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import { ProofResult, QueryResult, ProofData, BoundData, SanctionsBuilder, FacematchCommittedInputs, NullifierType } from '@zkpassport/utils';
|
|
1
|
+
import { ProofResult, QueryResult, ProofData, BoundData, SanctionsCommittedInputs, SanctionsBuilder, FacematchCommittedInputs, NullifierType } from '@zkpassport/utils';
|
|
2
2
|
import { QueryResultErrors } from './types.cjs';
|
|
3
3
|
|
|
4
4
|
declare class PublicInputChecker {
|
|
@@ -50,7 +50,7 @@ declare class PublicInputChecker {
|
|
|
50
50
|
isCorrect: boolean;
|
|
51
51
|
queryResultErrors: Partial<QueryResultErrors>;
|
|
52
52
|
};
|
|
53
|
-
static checkSanctionsExclusionPublicInputs(queryResult: QueryResult,
|
|
53
|
+
static checkSanctionsExclusionPublicInputs(queryResult: QueryResult, sanctionsCommittedInputs: SanctionsCommittedInputs, sanctionsBuilder: SanctionsBuilder): Promise<{
|
|
54
54
|
isCorrect: boolean;
|
|
55
55
|
queryResultErrors: Partial<QueryResultErrors>;
|
|
56
56
|
}>;
|
|
@@ -2015,8 +2015,7 @@ var SolidityVerifier = class {
|
|
|
2015
2015
|
publicInputs: proofData.publicInputs
|
|
2016
2016
|
},
|
|
2017
2017
|
commitments: {
|
|
2018
|
-
committedInputs: `0x${compressedCommittedInputs}
|
|
2019
|
-
committedInputCounts: committedInputCountsArray
|
|
2018
|
+
committedInputs: `0x${compressedCommittedInputs}`
|
|
2020
2019
|
},
|
|
2021
2020
|
serviceConfig: {
|
|
2022
2021
|
validityPeriodInSeconds,
|
package/dist/cjs/types.d.cts
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
// src/constants.ts
|
|
2
|
-
var VERSION = "0.
|
|
2
|
+
var VERSION = "0.11.0";
|
|
3
3
|
var DEFAULT_VALIDITY = 7 * 24 * 60 * 60;
|
|
4
4
|
var DEFAULT_DATE_VALUE = /* @__PURE__ */ new Date(0);
|
|
5
5
|
var ZKPASSPORT_IOS_APP_ID_HASH = "0x1fa73686cf510f8f85757b0602de0dd72a13e68ae2092462be8b72662e7f179b";
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import {
|
|
2
2
|
DEFAULT_VALIDITY
|
|
3
|
-
} from "./chunk-
|
|
3
|
+
} from "./chunk-B57NBZWJ.js";
|
|
4
4
|
|
|
5
5
|
// src/solidity-verifier.ts
|
|
6
6
|
import {
|
|
@@ -2000,8 +2000,7 @@ var SolidityVerifier = class {
|
|
|
2000
2000
|
publicInputs: proofData.publicInputs
|
|
2001
2001
|
},
|
|
2002
2002
|
commitments: {
|
|
2003
|
-
committedInputs: `0x${compressedCommittedInputs}
|
|
2004
|
-
committedInputCounts: committedInputCountsArray
|
|
2003
|
+
committedInputs: `0x${compressedCommittedInputs}`
|
|
2005
2004
|
},
|
|
2006
2005
|
serviceConfig: {
|
|
2007
2006
|
validityPeriodInSeconds,
|
|
@@ -5,7 +5,7 @@ import {
|
|
|
5
5
|
GOOGLE_APP_ATTEST_RSA_ROOT_KEY_HASH,
|
|
6
6
|
ZKPASSPORT_ANDROID_APP_ID_HASH,
|
|
7
7
|
ZKPASSPORT_IOS_APP_ID_HASH
|
|
8
|
-
} from "./chunk-
|
|
8
|
+
} from "./chunk-B57NBZWJ.js";
|
|
9
9
|
|
|
10
10
|
// src/public-input-checker.ts
|
|
11
11
|
import {
|
|
@@ -911,23 +911,35 @@ var PublicInputChecker = class {
|
|
|
911
911
|
}
|
|
912
912
|
return { isCorrect, queryResultErrors };
|
|
913
913
|
}
|
|
914
|
-
static async checkSanctionsExclusionPublicInputs(queryResult,
|
|
914
|
+
static async checkSanctionsExclusionPublicInputs(queryResult, sanctionsCommittedInputs, sanctionsBuilder) {
|
|
915
915
|
const queryResultErrors = {};
|
|
916
916
|
let isCorrect = true;
|
|
917
917
|
if (queryResult.sanctions && queryResult.sanctions.passed) {
|
|
918
918
|
const EXPECTED_ROOT = await sanctionsBuilder.getRoot();
|
|
919
|
-
if (
|
|
919
|
+
if (sanctionsCommittedInputs.rootHash !== EXPECTED_ROOT) {
|
|
920
920
|
console.warn("Invalid sanctions registry root");
|
|
921
921
|
isCorrect = false;
|
|
922
922
|
queryResultErrors.sanctions = {
|
|
923
923
|
...queryResultErrors.sanctions,
|
|
924
924
|
eq: {
|
|
925
925
|
expected: EXPECTED_ROOT,
|
|
926
|
-
received:
|
|
926
|
+
received: sanctionsCommittedInputs.rootHash,
|
|
927
927
|
message: "Invalid sanctions registry root"
|
|
928
928
|
}
|
|
929
929
|
};
|
|
930
930
|
}
|
|
931
|
+
if (queryResult.sanctions.isStrict !== sanctionsCommittedInputs.isStrict) {
|
|
932
|
+
console.warn("Invalid sanctions strict mode");
|
|
933
|
+
isCorrect = false;
|
|
934
|
+
queryResultErrors.sanctions = {
|
|
935
|
+
...queryResultErrors.sanctions,
|
|
936
|
+
eq: {
|
|
937
|
+
expected: queryResult.sanctions.isStrict.toString(),
|
|
938
|
+
received: sanctionsCommittedInputs.isStrict.toString(),
|
|
939
|
+
message: "Invalid sanctions strict mode"
|
|
940
|
+
}
|
|
941
|
+
};
|
|
942
|
+
}
|
|
931
943
|
}
|
|
932
944
|
return { isCorrect, queryResultErrors };
|
|
933
945
|
}
|
|
@@ -1420,7 +1432,7 @@ var PublicInputChecker = class {
|
|
|
1420
1432
|
queryResultErrors: queryResultErrorsSanctionsExclusion
|
|
1421
1433
|
} = await this.checkSanctionsExclusionPublicInputs(
|
|
1422
1434
|
queryResult,
|
|
1423
|
-
exclusionCheckSanctionsCommittedInputs
|
|
1435
|
+
exclusionCheckSanctionsCommittedInputs,
|
|
1424
1436
|
sanctionsBuilder
|
|
1425
1437
|
);
|
|
1426
1438
|
isCorrect = isCorrect && isCorrectSanctionsExclusion;
|
|
@@ -2093,7 +2105,7 @@ var PublicInputChecker = class {
|
|
|
2093
2105
|
queryResultErrors: queryResultErrorsSanctionsExclusion
|
|
2094
2106
|
} = await this.checkSanctionsExclusionPublicInputs(
|
|
2095
2107
|
queryResult,
|
|
2096
|
-
exclusionCheckSanctionsCommittedInputs
|
|
2108
|
+
exclusionCheckSanctionsCommittedInputs,
|
|
2097
2109
|
sanctionsBuilder
|
|
2098
2110
|
);
|
|
2099
2111
|
isCorrect = isCorrect && isCorrectSanctionsExclusion;
|
package/dist/esm/constants.d.ts
CHANGED
package/dist/esm/constants.js
CHANGED
package/dist/esm/index.js
CHANGED
|
@@ -3,14 +3,14 @@ import {
|
|
|
3
3
|
} from "./chunk-AFLQN3AC.js";
|
|
4
4
|
import {
|
|
5
5
|
PublicInputChecker
|
|
6
|
-
} from "./chunk-
|
|
6
|
+
} from "./chunk-N322IQZC.js";
|
|
7
7
|
import {
|
|
8
8
|
SolidityVerifier
|
|
9
|
-
} from "./chunk-
|
|
9
|
+
} from "./chunk-KUTKOI3P.js";
|
|
10
10
|
import {
|
|
11
11
|
DEFAULT_VALIDITY,
|
|
12
12
|
VERSION
|
|
13
|
-
} from "./chunk-
|
|
13
|
+
} from "./chunk-B57NBZWJ.js";
|
|
14
14
|
import "./chunk-6F4PWJZI.js";
|
|
15
15
|
|
|
16
16
|
// src/index.ts
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import { ProofResult, QueryResult, ProofData, BoundData, SanctionsBuilder, FacematchCommittedInputs, NullifierType } from '@zkpassport/utils';
|
|
1
|
+
import { ProofResult, QueryResult, ProofData, BoundData, SanctionsCommittedInputs, SanctionsBuilder, FacematchCommittedInputs, NullifierType } from '@zkpassport/utils';
|
|
2
2
|
import { QueryResultErrors } from './types.js';
|
|
3
3
|
|
|
4
4
|
declare class PublicInputChecker {
|
|
@@ -50,7 +50,7 @@ declare class PublicInputChecker {
|
|
|
50
50
|
isCorrect: boolean;
|
|
51
51
|
queryResultErrors: Partial<QueryResultErrors>;
|
|
52
52
|
};
|
|
53
|
-
static checkSanctionsExclusionPublicInputs(queryResult: QueryResult,
|
|
53
|
+
static checkSanctionsExclusionPublicInputs(queryResult: QueryResult, sanctionsCommittedInputs: SanctionsCommittedInputs, sanctionsBuilder: SanctionsBuilder): Promise<{
|
|
54
54
|
isCorrect: boolean;
|
|
55
55
|
queryResultErrors: Partial<QueryResultErrors>;
|
|
56
56
|
}>;
|
package/dist/esm/types.d.ts
CHANGED
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@zkpassport/sdk",
|
|
3
|
-
"version": "0.11.0
|
|
3
|
+
"version": "0.11.0",
|
|
4
4
|
"description": "Privacy-preserving identity verification using passports and ID cards",
|
|
5
5
|
"author": "ZKPassport",
|
|
6
6
|
"license": "Apache-2.0",
|
|
@@ -37,7 +37,7 @@
|
|
|
37
37
|
"@noble/secp256k1": "^2.2.3",
|
|
38
38
|
"@obsidion/bridge": "^0.11.1",
|
|
39
39
|
"@zkpassport/registry": "0.11.1",
|
|
40
|
-
"@zkpassport/utils": "0.29.
|
|
40
|
+
"@zkpassport/utils": "0.29.3",
|
|
41
41
|
"buffer": "^6.0.3",
|
|
42
42
|
"i18n-iso-countries": "^7.12.0",
|
|
43
43
|
"pako": "^2.1.0",
|