agent-passport-system 1.31.0 → 1.32.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -2,19 +2,36 @@
2
2
 
3
3
  [![npm version](https://img.shields.io/npm/v/agent-passport-system)](https://www.npmjs.com/package/agent-passport-system)
4
4
  [![license](https://img.shields.io/npm/l/agent-passport-system)](https://github.com/aeoess/agent-passport-system/blob/main/LICENSE)
5
- [![tests](https://img.shields.io/badge/tests-1399%20passing-brightgreen)](https://github.com/aeoess/agent-passport-system)
5
+ [![tests](https://img.shields.io/badge/tests-2180%20passing-brightgreen)](https://github.com/aeoess/agent-passport-system)
6
6
  [![DOI](https://zenodo.org/badge/DOI/10.5281/zenodo.18749779.svg)](https://doi.org/10.5281/zenodo.18749779)
7
7
 
8
8
  > **For AI agents:** visit [aeoess.com/llms.txt](https://aeoess.com/llms.txt) for machine-readable docs or [llms-full.txt](https://aeoess.com/llms-full.txt) for the complete reference.
9
9
 
10
- **Governance, trust, and enforcement for AI agents. Not just identity.**
10
+ **The enforcement and accountability layer for AI agents. Bring your own identity.**
11
11
 
12
- When an AI agent acts on your behalf, APS answers: what is it allowed to do? How much can it spend? Is it trustworthy? What happens when it violates a constraint? And can you prove all of this cryptographically?
12
+ APS is not an identity system. It's the governance layer that sits on top of whatever identity the agent already has. Accepts did:key, did:web, SPIFFE SVIDs, OAuth tokens, and native did:aps. Identity is the input. Enforcement is the product.
13
+
14
+ The gateway is both judge and executor. Authority can only decrease at each transfer point. Cascade revocation propagates through delegation chains. Every action produces a signed receipt. Every constraint is checked in under 2ms.
15
+
16
+ Seven independent projects have cross-tested against these primitives. AgentID: 7/7. MolTrust: 5/5. Kanoniv delegation chains: verified. Three languages, three codebases, identical results.
13
17
 
14
18
  ```bash
15
19
  npm install agent-passport-system
16
20
  ```
17
21
 
22
+ ## Who's Building on APS
23
+
24
+ | Project | What they do | What APS provides |
25
+ |---------|-------------|-------------------|
26
+ | [AgentID](https://github.com/haroldmalikfrimpong-ops/getagentid) | CA-issued identity, trust scoring | Self-sovereign identity, delegation chains |
27
+ | [MolTrust](https://moltrust.ch) | On-chain constraint envelopes | Scope narrowing, spend limits, expiry |
28
+ | [qntm](https://github.com/corpollc/qntm) | Encrypted relay transport | Identity keys, signed envelopes |
29
+ | [Signet](https://github.com/Prismer-AI/signet) | MCP transport signing | Policy gate, execution attestation |
30
+ | [ArkForge](https://arkforge.tech) | External proof anchoring | Receipts to anchor |
31
+ | [Microsoft AGT](https://github.com/microsoft/agent-governance-toolkit) | Enterprise policy engine | Trust signals, scope verification |
32
+
33
+ See [INTEGRATION.md](INTEGRATION.md) for how to compose your project with APS.
34
+
18
35
  ## What It Does
19
36
 
20
37
  **Enforce constraints on agent actions** — the ProxyGateway is an enforcement boundary that sits between the agent and any tool. Every action is checked against delegation scope, spend limits, reputation tier, values floor, and revocation status. The gateway executes the action, not the agent. The gateway generates the receipt, not the agent. Agents cannot bypass, forge, or skip enforcement.
@@ -90,7 +107,7 @@ const agent = joinSocialContract({ name: 'my-agent', owner: 'alice', floor: floo
90
107
 
91
108
  ## The Stack
92
109
 
93
- 42 core modules + 32 v2 constitutional modules. 1399 tests. Zero heavy dependencies.
110
+ 71 core modules + 32 v2 constitutional modules. 2,180 tests. Zero heavy dependencies.
94
111
 
95
112
  | Layer | What it does | Key primitive |
96
113
  |-------|-------------|---------------|
@@ -101,15 +118,15 @@ const agent = joinSocialContract({ name: 'my-agent', owner: 'alice', floor: floo
101
118
  | **Intent & Policy** | Roles, tradeoff rules, deliberative consensus, 3-signature policy chain. | `ActionIntent` → `PolicyDecision` → `ActionReceipt` |
102
119
  | **Values Floor** | 8 principles (5 enforced, 3 attested). Graduated enforcement: inline/audit/warn. | `FloorAttestation`, compliance verification |
103
120
  | **Communication** | Ed25519-signed messages, registry, threading, topic filtering. | `SignedAgoraMessage`, tamper detection |
104
- | **Identity** | Ed25519 keypairs, scoped delegation, cascade revocation, key rotation. | `SignedPassport`, `Delegation`, `RevocationRecord` |
121
+ | **Identity** | Bring your own: did:key, did:web, SPIFFE, OAuth, native did:aps. Ed25519 keypairs, scoped delegation, cascade revocation. | `toDIDKey`, `importSPIFFESVID`, `importOAuthToken`, `SignedPassport` |
105
122
 
106
- **Extended modules (9-42):** W3C DID (`did:aps`), Verifiable Credentials, A2A Bridge, EU AI Act Compliance, Agent Context, Task Routing, Cross-Chain Data Flow (taint tracking, confused deputy prevention), E2E Encrypted Messaging (X25519 + XSalsa20), Obligations, Governance Provenance, Identity Continuity & Key Rotation, Receipt Ledger (Merkle-committed audit batches), Feasibility Linting, Precedent Control, Re-anchoring, Bounded Escalation, Oracle Witness Diversity, Messaging Audit Bridge, Policy Conflict Detection, Data Source Registration, Decision Semantics, ProxyGateway.
123
+ **Extended modules (9-71):** W3C DID (`did:aps`), DID Interop (`did:key`, `did:web`), Identity Bridge (SPIFFE SVID, OAuth tokens), VC Wrapper (W3C Verifiable Credentials with did:key + SPIFFE evidence), Credential Request Protocol (selective disclosure), Verifiable Credentials, A2A Bridge, EU AI Act Compliance, Agent Context, Task Routing, Cross-Chain Data Flow (taint tracking, confused deputy prevention), E2E Encrypted Messaging (X25519 + XSalsa20), Obligations, Governance Provenance, Identity Continuity & Key Rotation, Receipt Ledger (Merkle-committed audit batches), Feasibility Linting, Precedent Control, Re-anchoring, Bounded Escalation, Oracle Witness Diversity, Messaging Audit Bridge, Policy Conflict Detection, Data Source Registration, Decision Semantics, Decision Equivalence, Execution Attestation, Bilateral Receipts, Governance Blocks, aps.txt, Governance 360, Data Lifecycle, Persistent Passports, ProxyGateway.
107
124
 
108
125
  **V2 Constitutional Framework (32 modules):** Designed through cross-model adversarial review. PolicyContext with mandatory sunset, Delegation Versioning, Outcome Registration, Anomaly Detection, Emergency Pathways, Migration (fork-and-sunset), Contextual Attestation, Approval Fatigue Detection, Effect Enforcement, Emergence Detection, Separation of Powers, Constitutional Amendment, Circuit Breakers, Epistemic Isolation, and 18 more. Source: [`src/v2/`](src/v2/).
109
126
 
110
127
  ## MCP Server
111
128
 
112
- 108 tools across all modules. Any MCP client connects agents directly.
129
+ 125 tools across all modules. Any MCP client connects agents directly.
113
130
 
114
131
  ```bash
115
132
  npm install -g agent-passport-system-mcp
@@ -144,7 +161,7 @@ npx agent-passport audit --floor values/floor.yaml
144
161
 
145
162
  ```bash
146
163
  npm test
147
- # 1399 tests across 71 files, 370 suites, 0 failures
164
+ # 2,180 tests, 0 failures
148
165
  ```
149
166
 
150
167
  50 adversarial tests: Merkle tampering, attribution gaming, compliance violations, floor negotiation attacks, cross-chain confused deputy, taint laundering, authority probing.
@@ -162,16 +179,17 @@ npm test
162
179
  | Signed receipts | 3-sig chain | Proposed | Logs | General | — |
163
180
  | Values enforcement | 8 principles, graduated | — | Rules | — | — |
164
181
  | Coordination | Task lifecycle + MCP | — | — | — | — |
165
- | Tests | 1399 (50 adversarial) | None | Limited | None | None |
182
+ | Tests | 2,180 (50 adversarial) | None | Limited | None | None |
166
183
 
167
184
  ## Recognition
168
185
 
169
- - Integrated into [Microsoft agent-governance-toolkit](https://github.com/microsoft/agent-governance-toolkit) (PR #274)
170
- - Public comment submitted to NIST NCCoE on AI Agent Identity and Authorization standards
171
- - Collaboration with IETF DAAP draft author (draft-mishra-oauth-agent-grants-01) on delegation spec
172
- - Listed on [MCP Registry](https://registry.modelcontextprotocol.io)
186
+ - **Working Group** with 4 founding members: APS, AgentID, qntm, OATR. Cross-protocol interop proven across three languages.
187
+ - Integrated into [Microsoft agent-governance-toolkit](https://github.com/microsoft/agent-governance-toolkit) (PR #598)
188
+ - Referenced in [MITRE ATLAS](https://github.com/mitre-atlas/atlas-data/issues/11) agent security techniques
189
+ - Referenced in [MCP SEP-1763](https://github.com/modelcontextprotocol/modelcontextprotocol/issues/1763) interceptor framework
190
+ - NIST NCCoE public comment on AI Agent Identity and Authorization
191
+ - Collaboration with IETF DAAP draft author on delegation spec
173
192
  - Endorsed by Garry Tan (CEO, Y Combinator)
174
- - [AMCS — AI-Native Media Credentialing Standard](https://aeoess.com/amcs.html) published
175
193
 
176
194
  ## Paper
177
195
 
@@ -179,9 +197,9 @@ npm test
179
197
 
180
198
  ## Authorship
181
199
 
182
- Designed and built by **Tymofii Pidlisnyi** with AI assistance from **Claude** (Anthropic).
200
+ Built by **Tymofii Pidlisnyi** ([@tima](https://github.com/aeoess)). Protocol designed with AI assistance from Claude (Anthropic), GPT (OpenAI), and Gemini (Google) through adversarial cross-model review.
183
201
 
184
- Protocol: [aeoess.com/protocol.html](https://aeoess.com/protocol.html) · Agora: [aeoess.com/agora.html](https://aeoess.com/agora.html) · npm: [agent-passport-system](https://www.npmjs.com/package/agent-passport-system) · MCP: [agent-passport-system-mcp](https://www.npmjs.com/package/agent-passport-system-mcp)
202
+ Website: [aeoess.com](https://aeoess.com) · npm: [agent-passport-system](https://www.npmjs.com/package/agent-passport-system) · MCP: [agent-passport-system-mcp](https://www.npmjs.com/package/agent-passport-system-mcp)
185
203
 
186
204
  ## LLM Documentation
187
205
 
@@ -0,0 +1,62 @@
1
+ import type { VerifiablePresentation } from '../types/did.js';
2
+ import type { ProviderAttestation } from '../types/attestation.js';
3
+ export interface CredentialRequest {
4
+ /** Unique request ID */
5
+ id: string;
6
+ /** Claims the verifier wants (e.g., ["grade", "capabilities", "delegationScope"]) */
7
+ requestedClaims: string[];
8
+ /** DID of the verifier making the request */
9
+ verifierDID: string;
10
+ /** Challenge nonce for replay protection */
11
+ challenge: string;
12
+ /** When this request was created */
13
+ createdAt: string;
14
+ }
15
+ export interface CredentialResponseResult {
16
+ valid: boolean;
17
+ /** Extracted claims that the verifier requested */
18
+ claims: Record<string, unknown>;
19
+ /** Detailed checks */
20
+ checks: string[];
21
+ }
22
+ export interface SelectivePassport {
23
+ agentId: string;
24
+ publicKey: string;
25
+ agentName?: string;
26
+ mission?: string;
27
+ capabilities?: string[];
28
+ grade?: number;
29
+ delegationScope?: string[];
30
+ createdAt?: string;
31
+ expiresAt?: string;
32
+ evidence?: ProviderAttestation[];
33
+ }
34
+ /**
35
+ * Create a credential request specifying which claims the verifier needs.
36
+ * The challenge provides replay protection: the agent must bind the VP
37
+ * to this specific challenge.
38
+ */
39
+ export declare function createCredentialRequest(claims: string[], verifierDID: string, challenge?: string): CredentialRequest;
40
+ /**
41
+ * Fulfill a credential request by creating a VP that contains only
42
+ * the requested claims. This is selective disclosure: the agent
43
+ * reveals only what the verifier asked for.
44
+ *
45
+ * The VC's credentialSubject will contain:
46
+ * - id (always included, the agent's did:key)
47
+ * - agentId (always included for APS correlation)
48
+ * - only the fields listed in request.requestedClaims
49
+ */
50
+ export declare function fulfillCredentialRequest(request: CredentialRequest, passport: SelectivePassport, privateKey: string): Promise<VerifiablePresentation>;
51
+ /**
52
+ * Verify a credential response VP and extract the requested claims.
53
+ *
54
+ * Checks:
55
+ * 1. VP proof is valid
56
+ * 2. Challenge matches (replay protection)
57
+ * 3. Each contained VC proof is valid
58
+ * 4. Credential is not expired
59
+ * 5. Extracts claims from credentialSubject
60
+ */
61
+ export declare function verifyCredentialResponse(vp: VerifiablePresentation, expectedChallenge?: string): Promise<CredentialResponseResult>;
62
+ //# sourceMappingURL=credential-request.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"credential-request.d.ts","sourceRoot":"","sources":["../../../src/core/credential-request.ts"],"names":[],"mappings":"AAQA,OAAO,KAAK,EAAwB,sBAAsB,EAAmB,MAAM,iBAAiB,CAAA;AACpG,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,yBAAyB,CAAA;AAIlE,MAAM,WAAW,iBAAiB;IAChC,wBAAwB;IACxB,EAAE,EAAE,MAAM,CAAA;IACV,qFAAqF;IACrF,eAAe,EAAE,MAAM,EAAE,CAAA;IACzB,6CAA6C;IAC7C,WAAW,EAAE,MAAM,CAAA;IACnB,4CAA4C;IAC5C,SAAS,EAAE,MAAM,CAAA;IACjB,oCAAoC;IACpC,SAAS,EAAE,MAAM,CAAA;CAClB;AAED,MAAM,WAAW,wBAAwB;IACvC,KAAK,EAAE,OAAO,CAAA;IACd,mDAAmD;IACnD,MAAM,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IAC/B,sBAAsB;IACtB,MAAM,EAAE,MAAM,EAAE,CAAA;CACjB;AAED,MAAM,WAAW,iBAAiB;IAChC,OAAO,EAAE,MAAM,CAAA;IACf,SAAS,EAAE,MAAM,CAAA;IACjB,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,OAAO,CAAC,EAAE,MAAM,CAAA;IAChB,YAAY,CAAC,EAAE,MAAM,EAAE,CAAA;IACvB,KAAK,CAAC,EAAE,MAAM,CAAA;IACd,eAAe,CAAC,EAAE,MAAM,EAAE,CAAA;IAC1B,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,QAAQ,CAAC,EAAE,mBAAmB,EAAE,CAAA;CACjC;AAYD;;;;GAIG;AACH,wBAAgB,uBAAuB,CACrC,MAAM,EAAE,MAAM,EAAE,EAChB,WAAW,EAAE,MAAM,EACnB,SAAS,CAAC,EAAE,MAAM,GACjB,iBAAiB,CAenB;AAED;;;;;;;;;GASG;AACH,wBAAsB,wBAAwB,CAC5C,OAAO,EAAE,iBAAiB,EAC1B,QAAQ,EAAE,iBAAiB,EAC3B,UAAU,EAAE,MAAM,GACjB,OAAO,CAAC,sBAAsB,CAAC,CA8EjC;AAED;;;;;;;;;GASG;AACH,wBAAsB,wBAAwB,CAC5C,EAAE,EAAE,sBAAsB,EAC1B,iBAAiB,CAAC,EAAE,MAAM,GACzB,OAAO,CAAC,wBAAwB,CAAC,CA0FnC"}
@@ -0,0 +1,243 @@
1
+ // Agent Passport System — Credential Request Protocol
2
+ // Selective disclosure: verifier requests specific claims,
3
+ // agent presents a VC containing only those claims.
4
+ import { canonicalize } from './canonical.js';
5
+ import { sign, verify, publicKeyFromPrivate } from '../crypto/keys.js';
6
+ import { toDIDKey, fromDIDKey } from './did-interop.js';
7
+ import { hexToMultibase } from './did.js';
8
+ // ── Constants ──
9
+ const VC_CONTEXT = [
10
+ 'https://www.w3.org/ns/credentials/v2',
11
+ 'https://w3id.org/security/suites/ed25519-2020/v1',
12
+ ];
13
+ const APS_CONTEXT = 'https://aeoess.com/ns/agent-passport/v1';
14
+ // ── Credential Request Protocol ──
15
+ /**
16
+ * Create a credential request specifying which claims the verifier needs.
17
+ * The challenge provides replay protection: the agent must bind the VP
18
+ * to this specific challenge.
19
+ */
20
+ export function createCredentialRequest(claims, verifierDID, challenge) {
21
+ if (!claims || claims.length === 0) {
22
+ throw new Error('Credential request must specify at least one claim');
23
+ }
24
+ if (!verifierDID) {
25
+ throw new Error('Verifier DID is required');
26
+ }
27
+ return {
28
+ id: `creq_${Date.now()}_${Math.random().toString(36).slice(2, 8)}`,
29
+ requestedClaims: claims,
30
+ verifierDID,
31
+ challenge: challenge || crypto.randomUUID(),
32
+ createdAt: new Date().toISOString(),
33
+ };
34
+ }
35
+ /**
36
+ * Fulfill a credential request by creating a VP that contains only
37
+ * the requested claims. This is selective disclosure: the agent
38
+ * reveals only what the verifier asked for.
39
+ *
40
+ * The VC's credentialSubject will contain:
41
+ * - id (always included, the agent's did:key)
42
+ * - agentId (always included for APS correlation)
43
+ * - only the fields listed in request.requestedClaims
44
+ */
45
+ export async function fulfillCredentialRequest(request, passport, privateKey) {
46
+ const publicKey = publicKeyFromPrivate(privateKey);
47
+ const subjectDIDKey = toDIDKey(passport.publicKey);
48
+ const issuerDIDKey = toDIDKey(publicKey);
49
+ const now = new Date().toISOString();
50
+ // Build selective credentialSubject
51
+ const fullSubject = {
52
+ id: subjectDIDKey,
53
+ agentId: passport.agentId,
54
+ publicKey: subjectDIDKey,
55
+ publicKeyMultibase: hexToMultibase(passport.publicKey),
56
+ agentName: passport.agentName,
57
+ mission: passport.mission,
58
+ capabilities: passport.capabilities,
59
+ grade: passport.grade,
60
+ delegationScope: passport.delegationScope,
61
+ };
62
+ // Filter to only requested claims + mandatory fields
63
+ const selective = {
64
+ id: fullSubject.id,
65
+ agentId: fullSubject.agentId,
66
+ };
67
+ for (const claim of request.requestedClaims) {
68
+ if (claim in fullSubject && fullSubject[claim] !== undefined) {
69
+ selective[claim] = fullSubject[claim];
70
+ }
71
+ }
72
+ // Build the VC
73
+ const credential = {
74
+ '@context': [...VC_CONTEXT, APS_CONTEXT],
75
+ id: `urn:aps:credential:selective:${passport.agentId}:${request.id}`,
76
+ type: ['VerifiableCredential', 'AgentPassportCredential'],
77
+ issuer: issuerDIDKey,
78
+ issuanceDate: passport.createdAt || now,
79
+ credentialSubject: selective,
80
+ };
81
+ if (passport.expiresAt) {
82
+ credential.expirationDate = passport.expiresAt;
83
+ }
84
+ if (passport.evidence && passport.evidence.length > 0) {
85
+ credential.evidence = passport.evidence.map(att => ({
86
+ type: 'InfrastructureAttestation',
87
+ provider: att.provider,
88
+ subjectClass: att.subjectClass,
89
+ verificationMethod: att.verificationMethod,
90
+ issuedAt: att.issuedAt,
91
+ expiresAt: att.expiresAt,
92
+ }));
93
+ }
94
+ const vcProof = await createProof(credential, privateKey, issuerDIDKey, 'assertionMethod');
95
+ const vc = { ...credential, proof: vcProof };
96
+ // Wrap in VP with the request's challenge
97
+ const holderDIDKey = toDIDKey(passport.publicKey);
98
+ const presentation = {
99
+ '@context': VC_CONTEXT,
100
+ id: `urn:aps:presentation:${request.id}`,
101
+ type: ['VerifiablePresentation'],
102
+ holder: holderDIDKey,
103
+ verifiableCredential: [vc],
104
+ };
105
+ const vpProof = await createProof(presentation, privateKey, holderDIDKey, 'authentication', { challenge: request.challenge, domain: request.verifierDID });
106
+ return { ...presentation, proof: vpProof };
107
+ }
108
+ /**
109
+ * Verify a credential response VP and extract the requested claims.
110
+ *
111
+ * Checks:
112
+ * 1. VP proof is valid
113
+ * 2. Challenge matches (replay protection)
114
+ * 3. Each contained VC proof is valid
115
+ * 4. Credential is not expired
116
+ * 5. Extracts claims from credentialSubject
117
+ */
118
+ export async function verifyCredentialResponse(vp, expectedChallenge) {
119
+ const checks = [];
120
+ let valid = true;
121
+ // Check required fields
122
+ if (!vp.holder || !vp.proof || !vp.verifiableCredential) {
123
+ checks.push('FAIL: missing required VP fields');
124
+ return { valid: false, claims: {}, checks };
125
+ }
126
+ checks.push('PASS: required VP fields present');
127
+ // Verify challenge if expected
128
+ const proof = vp.proof;
129
+ if (expectedChallenge) {
130
+ if (proof.challenge === expectedChallenge) {
131
+ checks.push('PASS: challenge matches');
132
+ }
133
+ else {
134
+ checks.push(`FAIL: challenge mismatch — expected "${expectedChallenge}", got "${proof.challenge}"`);
135
+ valid = false;
136
+ }
137
+ }
138
+ // Verify VP proof
139
+ try {
140
+ const vmDID = vp.proof.verificationMethod.split('#')[0];
141
+ const publicKey = vmDID.startsWith('did:key:') ? fromDIDKey(vmDID) : vmDID.split(':').pop();
142
+ const { proof: vpProof, ...vpWithoutProof } = vp;
143
+ const canonical = canonicalize(vpWithoutProof);
144
+ const sigHex = base64urlToHex(vpProof.proofValue);
145
+ const sigValid = verify(canonical, sigHex, publicKey);
146
+ if (sigValid) {
147
+ checks.push('PASS: presentation signature valid');
148
+ }
149
+ else {
150
+ checks.push('FAIL: presentation signature invalid');
151
+ valid = false;
152
+ }
153
+ }
154
+ catch (err) {
155
+ checks.push(`FAIL: presentation signature error — ${err instanceof Error ? err.message : String(err)}`);
156
+ valid = false;
157
+ }
158
+ // Verify each credential and extract claims
159
+ const claims = {};
160
+ for (let i = 0; i < vp.verifiableCredential.length; i++) {
161
+ const vc = vp.verifiableCredential[i];
162
+ // Verify VC proof
163
+ try {
164
+ const vmDID = vc.proof.verificationMethod.split('#')[0];
165
+ const publicKey = vmDID.startsWith('did:key:') ? fromDIDKey(vmDID) : vmDID.split(':').pop();
166
+ const { proof: vcProof, ...vcWithoutProof } = vc;
167
+ const canonical = canonicalize(vcWithoutProof);
168
+ const sigHex = base64urlToHex(vcProof.proofValue);
169
+ const sigValid = verify(canonical, sigHex, publicKey);
170
+ if (sigValid) {
171
+ checks.push(`PASS: credential[${i}] signature valid`);
172
+ }
173
+ else {
174
+ checks.push(`FAIL: credential[${i}] signature invalid`);
175
+ valid = false;
176
+ continue;
177
+ }
178
+ }
179
+ catch (err) {
180
+ checks.push(`FAIL: credential[${i}] signature error — ${err instanceof Error ? err.message : String(err)}`);
181
+ valid = false;
182
+ continue;
183
+ }
184
+ // Check expiration
185
+ if (vc.expirationDate) {
186
+ if (new Date(vc.expirationDate) < new Date()) {
187
+ checks.push(`FAIL: credential[${i}] expired`);
188
+ valid = false;
189
+ }
190
+ else {
191
+ checks.push(`PASS: credential[${i}] not expired`);
192
+ }
193
+ }
194
+ // Extract claims
195
+ const subject = vc.credentialSubject;
196
+ for (const [key, value] of Object.entries(subject)) {
197
+ if (key !== 'id' && value !== undefined) {
198
+ claims[key] = value;
199
+ }
200
+ }
201
+ }
202
+ return { valid, claims, checks };
203
+ }
204
+ // ── Proof Helpers ──
205
+ import crypto from 'node:crypto';
206
+ async function createProof(data, privateKey, did, purpose, options) {
207
+ const canonical = canonicalize(data);
208
+ const sig = sign(canonical, privateKey);
209
+ const proof = {
210
+ type: 'Ed25519Signature2020',
211
+ created: new Date().toISOString(),
212
+ verificationMethod: `${did}#key-1`,
213
+ proofPurpose: purpose,
214
+ proofValue: hexToBase64url(sig),
215
+ };
216
+ if (options?.challenge)
217
+ proof.challenge = options.challenge;
218
+ if (options?.domain)
219
+ proof.domain = options.domain;
220
+ return proof;
221
+ }
222
+ // ── Encoding ──
223
+ function hexToBytes(hex) {
224
+ const bytes = new Uint8Array(hex.length / 2);
225
+ for (let i = 0; i < hex.length; i += 2) {
226
+ bytes[i / 2] = parseInt(hex.substring(i, i + 2), 16);
227
+ }
228
+ return bytes;
229
+ }
230
+ function bytesToHex(bytes) {
231
+ return Array.from(bytes).map(b => b.toString(16).padStart(2, '0')).join('');
232
+ }
233
+ function hexToBase64url(hex) {
234
+ const bytes = hexToBytes(hex);
235
+ const base64 = Buffer.from(bytes).toString('base64');
236
+ return base64.replace(/\+/g, '-').replace(/\//g, '_').replace(/=+$/, '');
237
+ }
238
+ function base64urlToHex(b64url) {
239
+ const base64 = b64url.replace(/-/g, '+').replace(/_/g, '/');
240
+ const buf = Buffer.from(base64, 'base64');
241
+ return bytesToHex(new Uint8Array(buf));
242
+ }
243
+ //# sourceMappingURL=credential-request.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"credential-request.js","sourceRoot":"","sources":["../../../src/core/credential-request.ts"],"names":[],"mappings":"AAAA,sDAAsD;AACtD,2DAA2D;AAC3D,oDAAoD;AAEpD,OAAO,EAAE,YAAY,EAAE,MAAM,gBAAgB,CAAA;AAC7C,OAAO,EAAE,IAAI,EAAE,MAAM,EAAE,oBAAoB,EAAE,MAAM,mBAAmB,CAAA;AACtE,OAAO,EAAE,QAAQ,EAAE,UAAU,EAAE,MAAM,kBAAkB,CAAA;AACvD,OAAO,EAAE,cAAc,EAAE,MAAM,UAAU,CAAA;AAwCzC,kBAAkB;AAElB,MAAM,UAAU,GAAG;IACjB,sCAAsC;IACtC,kDAAkD;CACnD,CAAA;AACD,MAAM,WAAW,GAAG,yCAAyC,CAAA;AAE7D,oCAAoC;AAEpC;;;;GAIG;AACH,MAAM,UAAU,uBAAuB,CACrC,MAAgB,EAChB,WAAmB,EACnB,SAAkB;IAElB,IAAI,CAAC,MAAM,IAAI,MAAM,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QACnC,MAAM,IAAI,KAAK,CAAC,oDAAoD,CAAC,CAAA;IACvE,CAAC;IACD,IAAI,CAAC,WAAW,EAAE,CAAC;QACjB,MAAM,IAAI,KAAK,CAAC,0BAA0B,CAAC,CAAA;IAC7C,CAAC;IAED,OAAO;QACL,EAAE,EAAE,QAAQ,IAAI,CAAC,GAAG,EAAE,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE;QAClE,eAAe,EAAE,MAAM;QACvB,WAAW;QACX,SAAS,EAAE,SAAS,IAAI,MAAM,CAAC,UAAU,EAAE;QAC3C,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;KACpC,CAAA;AACH,CAAC;AAED;;;;;;;;;GASG;AACH,MAAM,CAAC,KAAK,UAAU,wBAAwB,CAC5C,OAA0B,EAC1B,QAA2B,EAC3B,UAAkB;IAElB,MAAM,SAAS,GAAG,oBAAoB,CAAC,UAAU,CAAC,CAAA;IAClD,MAAM,aAAa,GAAG,QAAQ,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAA;IAClD,MAAM,YAAY,GAAG,QAAQ,CAAC,SAAS,CAAC,CAAA;IACxC,MAAM,GAAG,GAAG,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE,CAAA;IAEpC,oCAAoC;IACpC,MAAM,WAAW,GAA4B;QAC3C,EAAE,EAAE,aAAa;QACjB,OAAO,EAAE,QAAQ,CAAC,OAAO;QACzB,SAAS,EAAE,aAAa;QACxB,kBAAkB,EAAE,cAAc,CAAC,QAAQ,CAAC,SAAS,CAAC;QACtD,SAAS,EAAE,QAAQ,CAAC,SAAS;QAC7B,OAAO,EAAE,QAAQ,CAAC,OAAO;QACzB,YAAY,EAAE,QAAQ,CAAC,YAAY;QACnC,KAAK,EAAE,QAAQ,CAAC,KAAK;QACrB,eAAe,EAAE,QAAQ,CAAC,eAAe;KAC1C,CAAA;IAED,qDAAqD;IACrD,MAAM,SAAS,GAA4B;QACzC,EAAE,EAAE,WAAW,CAAC,EAAE;QAClB,OAAO,EAAE,WAAW,CAAC,OAAO;KAC7B,CAAA;IACD,KAAK,MAAM,KAAK,IAAI,OAAO,CAAC,eAAe,EAAE,CAAC;QAC5C,IAAI,KAAK,IAAI,WAAW,IAAI,WAAW,CAAC,KAAK,CAAC,KAAK,SAAS,EAAE,CAAC;YAC7D,SAAS,CAAC,KAAK,CAAC,GAAG,WAAW,CAAC,KAAK,CAAC,CAAA;QACvC,CAAC;IACH,CAAC;IAED,eAAe;IACf,MAAM,UAAU,GAA4B;QAC1C,UAAU,EAAE,CAAC,GAAG,UAAU,EAAE,WAAW,CAAC;QACxC,EAAE,EAAE,gCAAgC,QAAQ,CAAC,OAAO,IAAI,OAAO,CAAC,EAAE,EAAE;QACpE,IAAI,EAAE,CAAC,sBAAsB,EAAE,yBAAyB,CAAC;QACzD,MAAM,EAAE,YAAY;QACpB,YAAY,EAAE,QAAQ,CAAC,SAAS,IAAI,GAAG;QACvC,iBAAiB,EAAE,SAAS;KAC7B,CAAA;IAED,IAAI,QAAQ,CAAC,SAAS,EAAE,CAAC;QACvB,UAAU,CAAC,cAAc,GAAG,QAAQ,CAAC,SAAS,CAAA;IAChD,CAAC;IAED,IAAI,QAAQ,CAAC,QAAQ,IAAI,QAAQ,CAAC,QAAQ,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;QACtD,UAAU,CAAC,QAAQ,GAAG,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;YAClD,IAAI,EAAE,2BAA2B;YACjC,QAAQ,EAAE,GAAG,CAAC,QAAQ;YACtB,YAAY,EAAE,GAAG,CAAC,YAAY;YAC9B,kBAAkB,EAAE,GAAG,CAAC,kBAAkB;YAC1C,QAAQ,EAAE,GAAG,CAAC,QAAQ;YACtB,SAAS,EAAE,GAAG,CAAC,SAAS;SACzB,CAAC,CAAC,CAAA;IACL,CAAC;IAED,MAAM,OAAO,GAAG,MAAM,WAAW,CAAC,UAAU,EAAE,UAAU,EAAE,YAAY,EAAE,iBAAiB,CAAC,CAAA;IAC1F,MAAM,EAAE,GAAG,EAAE,GAAG,UAAU,EAAE,KAAK,EAAE,OAAO,EAA0B,CAAA;IAEpE,0CAA0C;IAC1C,MAAM,YAAY,GAAG,QAAQ,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAA;IAEjD,MAAM,YAAY,GAA4B;QAC5C,UAAU,EAAE,UAAU;QACtB,EAAE,EAAE,wBAAwB,OAAO,CAAC,EAAE,EAAE;QACxC,IAAI,EAAE,CAAC,wBAAwB,CAAC;QAChC,MAAM,EAAE,YAAY;QACpB,oBAAoB,EAAE,CAAC,EAAE,CAAC;KAC3B,CAAA;IAED,MAAM,OAAO,GAAG,MAAM,WAAW,CAC/B,YAAY,EACZ,UAAU,EACV,YAAY,EACZ,gBAAgB,EAChB,EAAE,SAAS,EAAE,OAAO,CAAC,SAAS,EAAE,MAAM,EAAE,OAAO,CAAC,WAAW,EAAE,CAC9D,CAAA;IAED,OAAO,EAAE,GAAG,YAAY,EAAE,KAAK,EAAE,OAAO,EAAuC,CAAA;AACjF,CAAC;AAED;;;;;;;;;GASG;AACH,MAAM,CAAC,KAAK,UAAU,wBAAwB,CAC5C,EAA0B,EAC1B,iBAA0B;IAE1B,MAAM,MAAM,GAAa,EAAE,CAAA;IAC3B,IAAI,KAAK,GAAG,IAAI,CAAA;IAEhB,wBAAwB;IACxB,IAAI,CAAC,EAAE,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC,KAAK,IAAI,CAAC,EAAE,CAAC,oBAAoB,EAAE,CAAC;QACxD,MAAM,CAAC,IAAI,CAAC,kCAAkC,CAAC,CAAA;QAC/C,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,MAAM,EAAE,EAAE,EAAE,MAAM,EAAE,CAAA;IAC7C,CAAC;IACD,MAAM,CAAC,IAAI,CAAC,kCAAkC,CAAC,CAAA;IAE/C,+BAA+B;IAC/B,MAAM,KAAK,GAAG,EAAE,CAAC,KAAkE,CAAA;IACnF,IAAI,iBAAiB,EAAE,CAAC;QACtB,IAAI,KAAK,CAAC,SAAS,KAAK,iBAAiB,EAAE,CAAC;YAC1C,MAAM,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAA;QACxC,CAAC;aAAM,CAAC;YACN,MAAM,CAAC,IAAI,CAAC,wCAAwC,iBAAiB,WAAW,KAAK,CAAC,SAAS,GAAG,CAAC,CAAA;YACnG,KAAK,GAAG,KAAK,CAAA;QACf,CAAC;IACH,CAAC;IAED,kBAAkB;IAClB,IAAI,CAAC;QACH,MAAM,KAAK,GAAG,EAAE,CAAC,KAAK,CAAC,kBAAkB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAA;QACvD,MAAM,SAAS,GAAG,KAAK,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,EAAG,CAAA;QAC5F,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,GAAG,cAAc,EAAE,GAAG,EAAE,CAAA;QAChD,MAAM,SAAS,GAAG,YAAY,CAAC,cAAoD,CAAC,CAAA;QACpF,MAAM,MAAM,GAAG,cAAc,CAAC,OAAO,CAAC,UAAU,CAAC,CAAA;QACjD,MAAM,QAAQ,GAAG,MAAM,CAAC,SAAS,EAAE,MAAM,EAAE,SAAS,CAAC,CAAA;QAErD,IAAI,QAAQ,EAAE,CAAC;YACb,MAAM,CAAC,IAAI,CAAC,oCAAoC,CAAC,CAAA;QACnD,CAAC;aAAM,CAAC;YACN,MAAM,CAAC,IAAI,CAAC,sCAAsC,CAAC,CAAA;YACnD,KAAK,GAAG,KAAK,CAAA;QACf,CAAC;IACH,CAAC;IAAC,OAAO,GAAG,EAAE,CAAC;QACb,MAAM,CAAC,IAAI,CAAC,wCAAwC,GAAG,YAAY,KAAK,CAAC,CAAC,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC,CAAA;QACvG,KAAK,GAAG,KAAK,CAAA;IACf,CAAC;IAED,4CAA4C;IAC5C,MAAM,MAAM,GAA4B,EAAE,CAAA;IAE1C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,EAAE,CAAC,oBAAoB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;QACxD,MAAM,EAAE,GAAG,EAAE,CAAC,oBAAoB,CAAC,CAAC,CAAC,CAAA;QAErC,kBAAkB;QAClB,IAAI,CAAC;YACH,MAAM,KAAK,GAAG,EAAE,CAAC,KAAK,CAAC,kBAAkB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAA;YACvD,MAAM,SAAS,GAAG,KAAK,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,EAAG,CAAA;YAC5F,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,GAAG,cAAc,EAAE,GAAG,EAAE,CAAA;YAChD,MAAM,SAAS,GAAG,YAAY,CAAC,cAAoD,CAAC,CAAA;YACpF,MAAM,MAAM,GAAG,cAAc,CAAC,OAAO,CAAC,UAAU,CAAC,CAAA;YACjD,MAAM,QAAQ,GAAG,MAAM,CAAC,SAAS,EAAE,MAAM,EAAE,SAAS,CAAC,CAAA;YAErD,IAAI,QAAQ,EAAE,CAAC;gBACb,MAAM,CAAC,IAAI,CAAC,oBAAoB,CAAC,mBAAmB,CAAC,CAAA;YACvD,CAAC;iBAAM,CAAC;gBACN,MAAM,CAAC,IAAI,CAAC,oBAAoB,CAAC,qBAAqB,CAAC,CAAA;gBACvD,KAAK,GAAG,KAAK,CAAA;gBACb,SAAQ;YACV,CAAC;QACH,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,MAAM,CAAC,IAAI,CAAC,oBAAoB,CAAC,uBAAuB,GAAG,YAAY,KAAK,CAAC,CAAC,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC,CAAA;YAC3G,KAAK,GAAG,KAAK,CAAA;YACb,SAAQ;QACV,CAAC;QAED,mBAAmB;QACnB,IAAI,EAAE,CAAC,cAAc,EAAE,CAAC;YACtB,IAAI,IAAI,IAAI,CAAC,EAAE,CAAC,cAAc,CAAC,GAAG,IAAI,IAAI,EAAE,EAAE,CAAC;gBAC7C,MAAM,CAAC,IAAI,CAAC,oBAAoB,CAAC,WAAW,CAAC,CAAA;gBAC7C,KAAK,GAAG,KAAK,CAAA;YACf,CAAC;iBAAM,CAAC;gBACN,MAAM,CAAC,IAAI,CAAC,oBAAoB,CAAC,eAAe,CAAC,CAAA;YACnD,CAAC;QACH,CAAC;QAED,iBAAiB;QACjB,MAAM,OAAO,GAAG,EAAE,CAAC,iBAA4C,CAAA;QAC/D,KAAK,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,OAAO,CAAC,EAAE,CAAC;YACnD,IAAI,GAAG,KAAK,IAAI,IAAI,KAAK,KAAK,SAAS,EAAE,CAAC;gBACxC,MAAM,CAAC,GAAG,CAAC,GAAG,KAAK,CAAA;YACrB,CAAC;QACH,CAAC;IACH,CAAC;IAED,OAAO,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,CAAA;AAClC,CAAC;AAED,sBAAsB;AAEtB,OAAO,MAAM,MAAM,aAAa,CAAA;AAEhC,KAAK,UAAU,WAAW,CACxB,IAA6B,EAC7B,UAAkB,EAClB,GAAW,EACX,OAAwC,EACxC,OAAiD;IAEjD,MAAM,SAAS,GAAG,YAAY,CAAC,IAA+B,CAAC,CAAA;IAC/D,MAAM,GAAG,GAAG,IAAI,CAAC,SAAS,EAAE,UAAU,CAAC,CAAA;IAEvC,MAAM,KAAK,GAA8D;QACvE,IAAI,EAAE,sBAAsB;QAC5B,OAAO,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;QACjC,kBAAkB,EAAE,GAAG,GAAG,QAAQ;QAClC,YAAY,EAAE,OAAO;QACrB,UAAU,EAAE,cAAc,CAAC,GAAG,CAAC;KAChC,CAAA;IAED,IAAI,OAAO,EAAE,SAAS;QAAE,KAAK,CAAC,SAAS,GAAG,OAAO,CAAC,SAAS,CAAA;IAC3D,IAAI,OAAO,EAAE,MAAM;QAAE,KAAK,CAAC,MAAM,GAAG,OAAO,CAAC,MAAM,CAAA;IAElD,OAAO,KAAK,CAAA;AACd,CAAC;AAED,iBAAiB;AAEjB,SAAS,UAAU,CAAC,GAAW;IAC7B,MAAM,KAAK,GAAG,IAAI,UAAU,CAAC,GAAG,CAAC,MAAM,GAAG,CAAC,CAAC,CAAA;IAC5C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,GAAG,CAAC,MAAM,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC;QACvC,KAAK,CAAC,CAAC,GAAG,CAAC,CAAC,GAAG,QAAQ,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC,EAAE,CAAC,GAAG,CAAC,CAAC,EAAE,EAAE,CAAC,CAAA;IACtD,CAAC;IACD,OAAO,KAAK,CAAA;AACd,CAAC;AAED,SAAS,UAAU,CAAC,KAAiB;IACnC,OAAO,KAAK,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,CAAC,CAAA;AAC7E,CAAC;AAED,SAAS,cAAc,CAAC,GAAW;IACjC,MAAM,KAAK,GAAG,UAAU,CAAC,GAAG,CAAC,CAAA;IAC7B,MAAM,MAAM,GAAG,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAA;IACpD,OAAO,MAAM,CAAC,OAAO,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC,OAAO,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC,OAAO,CAAC,KAAK,EAAE,EAAE,CAAC,CAAA;AAC1E,CAAC;AAED,SAAS,cAAc,CAAC,MAAc;IACpC,MAAM,MAAM,GAAG,MAAM,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAA;IAC3D,MAAM,GAAG,GAAG,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAA;IACzC,OAAO,UAAU,CAAC,IAAI,UAAU,CAAC,GAAG,CAAC,CAAC,CAAA;AACxC,CAAC"}
@@ -0,0 +1,43 @@
1
+ /**
2
+ * Convert an Ed25519 public key (hex) to did:key format.
3
+ * Format: did:key:z6Mk... (multicodec 0xed01 + base58btc)
4
+ *
5
+ * The multibase value is the same encoding used in did:aps multibase
6
+ * identifiers — Ed25519 multicodec prefix (0xed, 0x01) + raw key bytes,
7
+ * base58btc encoded with z-prefix.
8
+ */
9
+ export declare function toDIDKey(ed25519PublicKeyHex: string): string;
10
+ /**
11
+ * Parse a did:key back to a raw Ed25519 public key (hex).
12
+ * Validates the did:key prefix and multicodec bytes.
13
+ */
14
+ export declare function fromDIDKey(didKey: string): string;
15
+ /**
16
+ * Construct the HTTPS URL for a did:web DID document.
17
+ *
18
+ * did:web:example.com → https://example.com/.well-known/did.json
19
+ * did:web:example.com:users:1 → https://example.com/users/1/did.json
20
+ * did:web:example.com%3A8443 → https://example.com:8443/.well-known/did.json
21
+ */
22
+ export declare function didWebToUrl(didWeb: string): string;
23
+ /**
24
+ * Resolve a did:web DID by fetching the DID document over HTTPS.
25
+ * Returns the parsed DID Document object.
26
+ *
27
+ * Throws on network errors, non-200 responses, and invalid JSON.
28
+ */
29
+ export declare function resolveDIDWeb(didWeb: string): Promise<object>;
30
+ /**
31
+ * Convert an APS passport to a W3C DID Document.
32
+ * Produces a document with did:key as the subject identifier
33
+ * and a single Ed25519VerificationKey2020 verification method.
34
+ *
35
+ * Accepts a minimal passport shape: { agent_id, public_key }.
36
+ * Optionally accepts created_at for the document timestamps.
37
+ */
38
+ export declare function passportToDIDDocument(passport: {
39
+ agent_id: string;
40
+ public_key: string;
41
+ created_at?: string;
42
+ }): object;
43
+ //# sourceMappingURL=did-interop.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"did-interop.d.ts","sourceRoot":"","sources":["../../../src/core/did-interop.ts"],"names":[],"mappings":"AAQA;;;;;;;GAOG;AACH,wBAAgB,QAAQ,CAAC,mBAAmB,EAAE,MAAM,GAAG,MAAM,CAM5D;AAED;;;GAGG;AACH,wBAAgB,UAAU,CAAC,MAAM,EAAE,MAAM,GAAG,MAAM,CAajD;AAID;;;;;;GAMG;AACH,wBAAgB,WAAW,CAAC,MAAM,EAAE,MAAM,GAAG,MAAM,CAmBlD;AAED;;;;;GAKG;AACH,wBAAsB,aAAa,CAAC,MAAM,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAcnE;AASD;;;;;;;GAOG;AACH,wBAAgB,qBAAqB,CAAC,QAAQ,EAAE;IAC9C,QAAQ,EAAE,MAAM,CAAA;IAChB,UAAU,EAAE,MAAM,CAAA;IAClB,UAAU,CAAC,EAAE,MAAM,CAAA;CACpB,GAAG,MAAM,CAuCT"}
@@ -0,0 +1,139 @@
1
+ // Agent Passport System — DID Interop (did:key + did:web)
2
+ // Translation layer between APS passports and W3C DID methods.
3
+ // did:key for self-certifying identifiers, did:web for domain-linked.
4
+ import { hexToMultibase, multibaseToHex } from './did.js';
5
+ // ── did:key ──
6
+ /**
7
+ * Convert an Ed25519 public key (hex) to did:key format.
8
+ * Format: did:key:z6Mk... (multicodec 0xed01 + base58btc)
9
+ *
10
+ * The multibase value is the same encoding used in did:aps multibase
11
+ * identifiers — Ed25519 multicodec prefix (0xed, 0x01) + raw key bytes,
12
+ * base58btc encoded with z-prefix.
13
+ */
14
+ export function toDIDKey(ed25519PublicKeyHex) {
15
+ if (!ed25519PublicKeyHex || !/^[0-9a-f]{64}$/i.test(ed25519PublicKeyHex)) {
16
+ throw new Error('Invalid Ed25519 public key: expected 64-char hex string');
17
+ }
18
+ const multibase = hexToMultibase(ed25519PublicKeyHex);
19
+ return `did:key:${multibase}`;
20
+ }
21
+ /**
22
+ * Parse a did:key back to a raw Ed25519 public key (hex).
23
+ * Validates the did:key prefix and multicodec bytes.
24
+ */
25
+ export function fromDIDKey(didKey) {
26
+ if (typeof didKey !== 'string') {
27
+ throw new Error('did:key must be a string');
28
+ }
29
+ const parts = didKey.split(':');
30
+ if (parts.length !== 3 || parts[0] !== 'did' || parts[1] !== 'key') {
31
+ throw new Error(`Invalid did:key format: ${didKey}`);
32
+ }
33
+ const multibase = parts[2];
34
+ if (!multibase.startsWith('z')) {
35
+ throw new Error('did:key identifier must use z-prefix (base58btc) multibase');
36
+ }
37
+ return multibaseToHex(multibase);
38
+ }
39
+ // ── did:web ──
40
+ /**
41
+ * Construct the HTTPS URL for a did:web DID document.
42
+ *
43
+ * did:web:example.com → https://example.com/.well-known/did.json
44
+ * did:web:example.com:users:1 → https://example.com/users/1/did.json
45
+ * did:web:example.com%3A8443 → https://example.com:8443/.well-known/did.json
46
+ */
47
+ export function didWebToUrl(didWeb) {
48
+ if (typeof didWeb !== 'string') {
49
+ throw new Error('did:web must be a string');
50
+ }
51
+ const parts = didWeb.split(':');
52
+ if (parts.length < 3 || parts[0] !== 'did' || parts[1] !== 'web') {
53
+ throw new Error(`Invalid did:web format: ${didWeb}`);
54
+ }
55
+ // Everything after "did:web:" is the domain-and-path, colon-separated
56
+ const segments = parts.slice(2).map(s => decodeURIComponent(s));
57
+ const domain = segments[0];
58
+ if (!domain) {
59
+ throw new Error('did:web must include a domain');
60
+ }
61
+ if (segments.length === 1) {
62
+ return `https://${domain}/.well-known/did.json`;
63
+ }
64
+ const path = segments.slice(1).join('/');
65
+ return `https://${domain}/${path}/did.json`;
66
+ }
67
+ /**
68
+ * Resolve a did:web DID by fetching the DID document over HTTPS.
69
+ * Returns the parsed DID Document object.
70
+ *
71
+ * Throws on network errors, non-200 responses, and invalid JSON.
72
+ */
73
+ export async function resolveDIDWeb(didWeb) {
74
+ const url = didWebToUrl(didWeb);
75
+ const response = await fetch(url, {
76
+ headers: { 'Accept': 'application/did+ld+json, application/json' },
77
+ signal: AbortSignal.timeout(10_000),
78
+ });
79
+ if (!response.ok) {
80
+ throw new Error(`did:web resolution failed: HTTP ${response.status} from ${url}`);
81
+ }
82
+ const doc = await response.json();
83
+ if (!doc || typeof doc !== 'object' || !('id' in doc)) {
84
+ throw new Error(`did:web resolution returned invalid DID Document from ${url}`);
85
+ }
86
+ return doc;
87
+ }
88
+ // ── Passport ↔ DID Document ──
89
+ const DID_CONTEXT = [
90
+ 'https://www.w3.org/ns/did/v1',
91
+ 'https://w3id.org/security/suites/ed25519-2020/v1',
92
+ ];
93
+ /**
94
+ * Convert an APS passport to a W3C DID Document.
95
+ * Produces a document with did:key as the subject identifier
96
+ * and a single Ed25519VerificationKey2020 verification method.
97
+ *
98
+ * Accepts a minimal passport shape: { agent_id, public_key }.
99
+ * Optionally accepts created_at for the document timestamps.
100
+ */
101
+ export function passportToDIDDocument(passport) {
102
+ if (!passport.public_key || !/^[0-9a-f]{64}$/i.test(passport.public_key)) {
103
+ throw new Error('Invalid passport: public_key must be 64-char hex');
104
+ }
105
+ if (!passport.agent_id) {
106
+ throw new Error('Invalid passport: agent_id is required');
107
+ }
108
+ const did = toDIDKey(passport.public_key);
109
+ const keyId = `${did}#key-1`;
110
+ const publicKeyMultibase = hexToMultibase(passport.public_key);
111
+ const now = passport.created_at || new Date().toISOString();
112
+ return {
113
+ '@context': DID_CONTEXT,
114
+ id: did,
115
+ controller: did,
116
+ alsoKnownAs: [`did:aps:${publicKeyMultibase}`],
117
+ verificationMethod: [{
118
+ id: keyId,
119
+ type: 'Ed25519VerificationKey2020',
120
+ controller: did,
121
+ publicKeyMultibase,
122
+ }],
123
+ authentication: [keyId],
124
+ assertionMethod: [keyId],
125
+ capabilityDelegation: [keyId],
126
+ service: [{
127
+ id: `${did}#aps`,
128
+ type: 'AgentPassportService',
129
+ serviceEndpoint: {
130
+ agentId: passport.agent_id,
131
+ protocol: 'aps',
132
+ version: '1.0.0',
133
+ },
134
+ }],
135
+ created: now,
136
+ updated: now,
137
+ };
138
+ }
139
+ //# sourceMappingURL=did-interop.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"did-interop.js","sourceRoot":"","sources":["../../../src/core/did-interop.ts"],"names":[],"mappings":"AAAA,0DAA0D;AAC1D,+DAA+D;AAC/D,sEAAsE;AAEtE,OAAO,EAAE,cAAc,EAAE,cAAc,EAAE,MAAM,UAAU,CAAA;AAEzD,gBAAgB;AAEhB;;;;;;;GAOG;AACH,MAAM,UAAU,QAAQ,CAAC,mBAA2B;IAClD,IAAI,CAAC,mBAAmB,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,mBAAmB,CAAC,EAAE,CAAC;QACzE,MAAM,IAAI,KAAK,CAAC,yDAAyD,CAAC,CAAA;IAC5E,CAAC;IACD,MAAM,SAAS,GAAG,cAAc,CAAC,mBAAmB,CAAC,CAAA;IACrD,OAAO,WAAW,SAAS,EAAE,CAAA;AAC/B,CAAC;AAED;;;GAGG;AACH,MAAM,UAAU,UAAU,CAAC,MAAc;IACvC,IAAI,OAAO,MAAM,KAAK,QAAQ,EAAE,CAAC;QAC/B,MAAM,IAAI,KAAK,CAAC,0BAA0B,CAAC,CAAA;IAC7C,CAAC;IACD,MAAM,KAAK,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAA;IAC/B,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,KAAK,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,KAAK,EAAE,CAAC;QACnE,MAAM,IAAI,KAAK,CAAC,2BAA2B,MAAM,EAAE,CAAC,CAAA;IACtD,CAAC;IACD,MAAM,SAAS,GAAG,KAAK,CAAC,CAAC,CAAC,CAAA;IAC1B,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,GAAG,CAAC,EAAE,CAAC;QAC/B,MAAM,IAAI,KAAK,CAAC,4DAA4D,CAAC,CAAA;IAC/E,CAAC;IACD,OAAO,cAAc,CAAC,SAAS,CAAC,CAAA;AAClC,CAAC;AAED,gBAAgB;AAEhB;;;;;;GAMG;AACH,MAAM,UAAU,WAAW,CAAC,MAAc;IACxC,IAAI,OAAO,MAAM,KAAK,QAAQ,EAAE,CAAC;QAC/B,MAAM,IAAI,KAAK,CAAC,0BAA0B,CAAC,CAAA;IAC7C,CAAC;IACD,MAAM,KAAK,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAA;IAC/B,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,KAAK,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,KAAK,EAAE,CAAC;QACjE,MAAM,IAAI,KAAK,CAAC,2BAA2B,MAAM,EAAE,CAAC,CAAA;IACtD,CAAC;IACD,sEAAsE;IACtE,MAAM,QAAQ,GAAG,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAA;IAC/D,MAAM,MAAM,GAAG,QAAQ,CAAC,CAAC,CAAC,CAAA;IAC1B,IAAI,CAAC,MAAM,EAAE,CAAC;QACZ,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAA;IAClD,CAAC;IACD,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QAC1B,OAAO,WAAW,MAAM,uBAAuB,CAAA;IACjD,CAAC;IACD,MAAM,IAAI,GAAG,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;IACxC,OAAO,WAAW,MAAM,IAAI,IAAI,WAAW,CAAA;AAC7C,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,aAAa,CAAC,MAAc;IAChD,MAAM,GAAG,GAAG,WAAW,CAAC,MAAM,CAAC,CAAA;IAC/B,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,EAAE;QAChC,OAAO,EAAE,EAAE,QAAQ,EAAE,2CAA2C,EAAE;QAClE,MAAM,EAAE,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC;KACpC,CAAC,CAAA;IACF,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE,CAAC;QACjB,MAAM,IAAI,KAAK,CAAC,mCAAmC,QAAQ,CAAC,MAAM,SAAS,GAAG,EAAE,CAAC,CAAA;IACnF,CAAC;IACD,MAAM,GAAG,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;IACjC,IAAI,CAAC,GAAG,IAAI,OAAO,GAAG,KAAK,QAAQ,IAAI,CAAC,CAAC,IAAI,IAAI,GAAG,CAAC,EAAE,CAAC;QACtD,MAAM,IAAI,KAAK,CAAC,yDAAyD,GAAG,EAAE,CAAC,CAAA;IACjF,CAAC;IACD,OAAO,GAAa,CAAA;AACtB,CAAC;AAED,gCAAgC;AAEhC,MAAM,WAAW,GAAG;IAClB,8BAA8B;IAC9B,kDAAkD;CACnD,CAAA;AAED;;;;;;;GAOG;AACH,MAAM,UAAU,qBAAqB,CAAC,QAIrC;IACC,IAAI,CAAC,QAAQ,CAAC,UAAU,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,UAAU,CAAC,EAAE,CAAC;QACzE,MAAM,IAAI,KAAK,CAAC,kDAAkD,CAAC,CAAA;IACrE,CAAC;IACD,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,CAAC;QACvB,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAA;IAC3D,CAAC;IAED,MAAM,GAAG,GAAG,QAAQ,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAA;IACzC,MAAM,KAAK,GAAG,GAAG,GAAG,QAAQ,CAAA;IAC5B,MAAM,kBAAkB,GAAG,cAAc,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAA;IAC9D,MAAM,GAAG,GAAG,QAAQ,CAAC,UAAU,IAAI,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE,CAAA;IAE3D,OAAO;QACL,UAAU,EAAE,WAAW;QACvB,EAAE,EAAE,GAAG;QACP,UAAU,EAAE,GAAG;QACf,WAAW,EAAE,CAAC,WAAW,kBAAkB,EAAE,CAAC;QAC9C,kBAAkB,EAAE,CAAC;gBACnB,EAAE,EAAE,KAAK;gBACT,IAAI,EAAE,4BAA4B;gBAClC,UAAU,EAAE,GAAG;gBACf,kBAAkB;aACnB,CAAC;QACF,cAAc,EAAE,CAAC,KAAK,CAAC;QACvB,eAAe,EAAE,CAAC,KAAK,CAAC;QACxB,oBAAoB,EAAE,CAAC,KAAK,CAAC;QAC7B,OAAO,EAAE,CAAC;gBACR,EAAE,EAAE,GAAG,GAAG,MAAM;gBAChB,IAAI,EAAE,sBAAsB;gBAC5B,eAAe,EAAE;oBACf,OAAO,EAAE,QAAQ,CAAC,QAAQ;oBAC1B,QAAQ,EAAE,KAAK;oBACf,OAAO,EAAE,OAAO;iBACjB;aACF,CAAC;QACF,OAAO,EAAE,GAAG;QACZ,OAAO,EAAE,GAAG;KACb,CAAA;AACH,CAAC"}