settld 0.1.2 → 0.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +93 -3
- package/SETTLD_VERSION +1 -1
- package/bin/settld-mcp +2 -0
- package/bin/settld.js +71 -0
- package/conformance/kernel-v0/README.md +7 -0
- package/conformance/kernel-v0/run.mjs +292 -4
- package/docs/ACCESS.md +57 -0
- package/docs/ADOPTION_CHECKLIST.md +44 -0
- package/docs/ALERTS.md +198 -0
- package/docs/ARCHITECTURE.md +69 -0
- package/docs/ARCHITECTURE_FOUNDER_GUIDE.md +284 -0
- package/docs/ARTIFACTS.md +60 -0
- package/docs/CERTIFICATION_CHECKLIST.md +33 -0
- package/docs/CIRCLE_SANDBOX_E2E.md +152 -0
- package/docs/CONFIG.md +297 -0
- package/docs/CONTRACTS_APIS.md +23 -0
- package/docs/DEPRECATION.md +31 -0
- package/docs/DOMAIN_MODEL.md +92 -0
- package/docs/EVENT_ENVELOPE.md +53 -0
- package/docs/FINANCE_PACK_FORMAT.md +53 -0
- package/docs/INCIDENT_TAXONOMY.md +30 -0
- package/docs/JOB_STATE_MACHINE.md +66 -0
- package/docs/KERNEL_COMPATIBLE.md +60 -0
- package/docs/KERNEL_V0.md +40 -0
- package/docs/KEY_ROTATION.md +80 -0
- package/docs/LEDGER.md +82 -0
- package/docs/LIVENESS.md +76 -0
- package/docs/MVP_BUILD_ORDER.md +36 -0
- package/docs/ONCALL_PLAYBOOK.md +39 -0
- package/docs/OPERATIONS_SIGNING.md +20 -0
- package/docs/OVERVIEW.md +190 -0
- package/docs/PERF_BASELINE.md +85 -0
- package/docs/PRD.md +77 -0
- package/docs/QUICKSTART_KERNEL_V0.md +96 -0
- package/docs/QUICKSTART_MCP.md +377 -0
- package/docs/QUICKSTART_MCP_HOSTS.md +210 -0
- package/docs/QUICKSTART_POLICY_PACKS.md +65 -0
- package/docs/QUICKSTART_PRODUCE.md +61 -0
- package/docs/QUICKSTART_PROFILES.md +198 -0
- package/docs/QUICKSTART_RELEASE_VERIFY.md +39 -0
- package/docs/QUICKSTART_SDK.md +125 -0
- package/docs/QUICKSTART_SDK_PYTHON.md +111 -0
- package/docs/QUICKSTART_VERIFY.md +54 -0
- package/docs/QUICKSTART_X402_GATEWAY.md +317 -0
- package/docs/README.md +33 -0
- package/docs/RELEASE_CHECKLIST.md +182 -0
- package/docs/RELEASING.md +82 -0
- package/docs/REPO_SETTINGS.md +37 -0
- package/docs/RUNBOOK.md +86 -0
- package/docs/SKILLS.md +42 -0
- package/docs/SKILL_BUNDLE_FORMAT.md +48 -0
- package/docs/SLO.md +131 -0
- package/docs/SUMMARY.md +17 -0
- package/docs/SUPPORT.md +31 -0
- package/docs/THREAT_MODEL.md +36 -0
- package/docs/TRUST.md +59 -0
- package/docs/WORKFLOW.md +35 -0
- package/docs/X402_BATCH_SETTLEMENT.md +126 -0
- package/docs/blog/2026-02-14-your-ai-agent-just-spent-500-where-is-the-receipt.md +73 -0
- package/docs/examples/x402-provider-payout-registry.example.json +14 -0
- package/docs/gitbook/README.md +64 -0
- package/docs/gitbook/SETUP.md +25 -0
- package/docs/gitbook/SUMMARY.md +15 -0
- package/docs/gitbook/api-reference.md +73 -0
- package/docs/gitbook/closepacks.md +55 -0
- package/docs/gitbook/conformance.md +59 -0
- package/docs/gitbook/core-primitives.md +85 -0
- package/docs/gitbook/dispute-lifecycle.md +33 -0
- package/docs/gitbook/faq.md +21 -0
- package/docs/gitbook/guides.md +49 -0
- package/docs/gitbook/operations-runbook.md +36 -0
- package/docs/gitbook/quickstart.md +103 -0
- package/docs/gitbook/replay-and-audit.md +30 -0
- package/docs/gitbook/sdk-reference.md +35 -0
- package/docs/gitbook/security-model.md +58 -0
- package/docs/integrations/README.md +15 -0
- package/docs/integrations/github-actions-verify.yml +31 -0
- package/docs/integrations/github-actions.md +34 -0
- package/docs/integrations/openclaw/CLAWHUB_PUBLISH_CHECKLIST.md +65 -0
- package/docs/integrations/openclaw/PUBLIC_QUICKSTART.md +95 -0
- package/docs/integrations/openclaw/settld-mcp-skill/SKILL.md +69 -0
- package/docs/integrations/openclaw/settld-mcp-skill/mcp-server.example.json +12 -0
- package/docs/kernel-compatible/capabilities.json +36 -0
- package/docs/marketing/agent-commerce-substrate.md +78 -0
- package/docs/marketing/hn-repost-2026-02-17.md +102 -0
- package/docs/marketing/show-hn-post.md +45 -0
- package/docs/ops/ARTIFACT_VERIFICATION_STATUS.md +43 -0
- package/docs/ops/BILLING_WEBHOOK_REPLAY.md +105 -0
- package/docs/ops/CI_FLAKE_BUDGET.md +31 -0
- package/docs/ops/DISPUTE_FINANCE_RECONCILIATION_PACKET.md +56 -0
- package/docs/ops/GO_LIVE_GATE_S13.md +27 -0
- package/docs/ops/HOSTED_BASELINE_R2.md +129 -0
- package/docs/ops/KERNEL_V0_SHIP_GATE.md +69 -0
- package/docs/ops/LIGHTHOUSE_PRODUCTION_CLOSE.md +51 -0
- package/docs/ops/MCP_COMPATIBILITY_MATRIX.md +30 -0
- package/docs/ops/MINIMUM_PRODUCTION_TOPOLOGY.md +89 -0
- package/docs/ops/P0_BACKEND_PROGRESS.md +150 -0
- package/docs/ops/PAYMENTS_ALPHA_R5.md +105 -0
- package/docs/ops/PILOT_ONBOARDING_RUNBOOK.md +112 -0
- package/docs/ops/PRODUCTION_DEPLOYMENT_CHECKLIST.md +140 -0
- package/docs/ops/R1_SLOS.md +66 -0
- package/docs/ops/RELEASE_SIGNING_INCIDENT.md +58 -0
- package/docs/ops/SELF_SERVE_LAUNCH_AUTOMATION.md +89 -0
- package/docs/ops/THROUGHPUT_DRILL_10X.md +48 -0
- package/docs/ops/TRUST_CONFIG_WIZARD.md +60 -0
- package/docs/ops/X402_PILOT_WEEKLY_METRICS.md +76 -0
- package/docs/ops/tool-call-disputes-holdback.md +52 -0
- package/docs/pilot-kit/PILOT_PACKAGE_SCORECARD_X402.md +46 -0
- package/docs/pilot-kit/README.md +29 -0
- package/docs/pilot-kit/architecture-one-pager.md +48 -0
- package/docs/pilot-kit/buyer-email.txt +19 -0
- package/docs/pilot-kit/buyer-one-pager.md +31 -0
- package/docs/pilot-kit/gtm-pilot-playbook.md +182 -0
- package/docs/pilot-kit/offline-verify.md +33 -0
- package/docs/pilot-kit/procurement-one-pager.md +50 -0
- package/docs/pilot-kit/rfp-clause.md +46 -0
- package/docs/pilot-kit/roi-calculator-template.csv +2 -0
- package/docs/pilot-kit/security-qa.md +153 -0
- package/docs/pilot-kit/security-summary.md +35 -0
- package/docs/plans/2026-02-13-mcp-spike-design.md +113 -0
- package/docs/plans/2026-02-20-trust-os-v1-jira-backlog.md +348 -0
- package/docs/plans/2026-02-21-agent-economic-actor-operating-model.md +169 -0
- package/docs/plans/2026-02-21-trust-os-v1-strategy.md +241 -0
- package/docs/research/2026-02-21-agent-spend-host-landscape.md +57 -0
- package/docs/spec/AcceptanceCriteria.v1.md +17 -0
- package/docs/spec/AcceptanceEvaluation.v1.md +10 -0
- package/docs/spec/AgentEvent.v1.md +47 -0
- package/docs/spec/AgentIdentity.v1.md +62 -0
- package/docs/spec/AgentPassport.v1.md +95 -0
- package/docs/spec/AgentReputation.v1.md +59 -0
- package/docs/spec/AgentReputation.v2.md +52 -0
- package/docs/spec/AgentRun.v1.md +47 -0
- package/docs/spec/AgentRunSettlement.v1.md +52 -0
- package/docs/spec/AgentWallet.v1.md +43 -0
- package/docs/spec/AgreementDelegation.v1.md +109 -0
- package/docs/spec/ArbitrationCase.v1.md +67 -0
- package/docs/spec/ArbitrationOutcomeMapping.v1.md +62 -0
- package/docs/spec/ArbitrationVerdict.v1.md +60 -0
- package/docs/spec/BundleHeadAttestation.v1.md +32 -0
- package/docs/spec/CANONICAL_JSON.md +31 -0
- package/docs/spec/CRYPTOGRAPHY.md +61 -0
- package/docs/spec/ClosePack.v1.md +49 -0
- package/docs/spec/ClosePackManifest.v1.md +24 -0
- package/docs/spec/DelegationGrant.v1.md +90 -0
- package/docs/spec/DisputeCaseLifecycle.v1.md +51 -0
- package/docs/spec/DisputeOpenEnvelope.v1.md +43 -0
- package/docs/spec/ERRORS.md +76 -0
- package/docs/spec/ESCROW_NETTING_INVARIANTS.md +71 -0
- package/docs/spec/EvidenceIndex.v1.md +20 -0
- package/docs/spec/ExecutionIntent.v1.md +90 -0
- package/docs/spec/FinancePackBundleManifest.v1.md +24 -0
- package/docs/spec/FundingHold.v1.md +60 -0
- package/docs/spec/GovernancePolicy.v1.md +34 -0
- package/docs/spec/GovernancePolicy.v2.md +30 -0
- package/docs/spec/INVARIANTS.md +389 -0
- package/docs/spec/InteractionDirectionMatrix.v1.md +30 -0
- package/docs/spec/InvoiceBundleManifest.v1.md +24 -0
- package/docs/spec/InvoiceClaim.v1.md +11 -0
- package/docs/spec/MONEY_RAIL_STATE_MACHINE.md +58 -0
- package/docs/spec/MarketplaceAcceptance.v2.md +46 -0
- package/docs/spec/MarketplaceOffer.v2.md +54 -0
- package/docs/spec/MeteringReport.v1.md +18 -0
- package/docs/spec/OperatorAction.v1.md +90 -0
- package/docs/spec/PRODUCER_ERRORS.md +42 -0
- package/docs/spec/PolicyDecision.v1.md +83 -0
- package/docs/spec/PricingMatrix.v1.md +20 -0
- package/docs/spec/PricingMatrixSignatures.v1.md +30 -0
- package/docs/spec/PricingMatrixSignatures.v2.md +29 -0
- package/docs/spec/ProduceCliOutput.v1.md +46 -0
- package/docs/spec/ProofBundleManifest.v1.md +24 -0
- package/docs/spec/README.md +109 -0
- package/docs/spec/REFERENCE_IMPLEMENTATIONS.md +29 -0
- package/docs/spec/REFERENCE_VERIFIER_BEHAVIOR.md +68 -0
- package/docs/spec/REMOTE_SIGNER.md +66 -0
- package/docs/spec/ReleaseIndex.v1.md +32 -0
- package/docs/spec/ReleaseIndexSignatures.v1.md +17 -0
- package/docs/spec/ReleaseTrust.v1.md +13 -0
- package/docs/spec/ReleaseTrust.v2.md +26 -0
- package/docs/spec/RemoteSignerRequest.v1.md +21 -0
- package/docs/spec/RemoteSignerResponse.v1.md +16 -0
- package/docs/spec/ReputationEvent.v1.md +63 -0
- package/docs/spec/RevocationList.v1.md +28 -0
- package/docs/spec/SIGNER_PROVIDER_PLUGIN.md +32 -0
- package/docs/spec/STRICTNESS.md +68 -0
- package/docs/spec/SUPPLY_CHAIN.md +33 -0
- package/docs/spec/SettlementAdjustment.v1.md +45 -0
- package/docs/spec/SettlementDecisionRecord.v1.md +48 -0
- package/docs/spec/SettlementDecisionRecord.v2.md +53 -0
- package/docs/spec/SettlementDecisionReport.v1.md +44 -0
- package/docs/spec/SettlementKernel.v1.md +59 -0
- package/docs/spec/SettlementReceipt.v1.md +63 -0
- package/docs/spec/SlaDefinition.v1.md +24 -0
- package/docs/spec/SlaEvaluation.v1.md +12 -0
- package/docs/spec/THREAT_MODEL.md +113 -0
- package/docs/spec/TOOL_PROVENANCE.md +30 -0
- package/docs/spec/TRUST_ANCHORS.md +84 -0
- package/docs/spec/TenantSettings.v1.md +90 -0
- package/docs/spec/TenantSettings.v2.md +99 -0
- package/docs/spec/TimestampProof.v1.md +25 -0
- package/docs/spec/ToolCallAgreement.v1.md +34 -0
- package/docs/spec/ToolCallEvidence.v1.md +47 -0
- package/docs/spec/ToolManifest.v1.md +47 -0
- package/docs/spec/VERIFIER_ENVIRONMENT.md +38 -0
- package/docs/spec/VERSIONING.md +107 -0
- package/docs/spec/VerificationReport.v1.md +50 -0
- package/docs/spec/VerifyAboutOutput.v1.md +10 -0
- package/docs/spec/VerifyCliOutput.v1.md +28 -0
- package/docs/spec/WARNINGS.md +83 -0
- package/docs/spec/error-codes.v1.txt +285 -0
- package/docs/spec/examples/agreement_delegation_v1.example.json +21 -0
- package/docs/spec/examples/arbitration_case_v1.example.json +26 -0
- package/docs/spec/examples/arbitration_verdict_v1.example.json +32 -0
- package/docs/spec/examples/dispute_open_envelope_v1.example.json +18 -0
- package/docs/spec/examples/produce_cli_output_v1.example.json +32 -0
- package/docs/spec/examples/release_index_signature_v1.example.json +9 -0
- package/docs/spec/examples/release_index_signatures_v1.example.json +14 -0
- package/docs/spec/examples/release_index_v1.example.json +15 -0
- package/docs/spec/examples/release_trust_v1.example.json +7 -0
- package/docs/spec/examples/release_trust_v2.example.json +22 -0
- package/docs/spec/examples/remote_signer_request_v1.example.json +18 -0
- package/docs/spec/examples/remote_signer_response_v1.example.json +8 -0
- package/docs/spec/examples/reputation_event_v1.example.json +29 -0
- package/docs/spec/examples/verification_report_v1.example.json +24 -0
- package/docs/spec/examples/verify_about_output_v1.example.json +29 -0
- package/docs/spec/examples/verify_cli_output_v1.example.json +13 -0
- package/docs/spec/legacy/MarketplaceAcceptance.v1.md +48 -0
- package/docs/spec/legacy/MarketplaceOffer.v1.md +56 -0
- package/docs/spec/legacy/schemas/MarketplaceAcceptance.v1.schema.json +53 -0
- package/docs/spec/legacy/schemas/MarketplaceOffer.v1.schema.json +61 -0
- package/docs/spec/producer-error-codes.v1.txt +14 -0
- package/docs/spec/schemas/AcceptanceCriteria.v1.schema.json +24 -0
- package/docs/spec/schemas/AcceptanceEvaluation.v1.schema.json +26 -0
- package/docs/spec/schemas/AgentEvent.v1.schema.json +49 -0
- package/docs/spec/schemas/AgentIdentity.v1.schema.json +129 -0
- package/docs/spec/schemas/AgentPassport.v1.schema.json +112 -0
- package/docs/spec/schemas/AgentReputation.v1.schema.json +151 -0
- package/docs/spec/schemas/AgentReputation.v2.schema.json +120 -0
- package/docs/spec/schemas/AgentRun.v1.schema.json +71 -0
- package/docs/spec/schemas/AgentRunSettlement.v1.schema.json +75 -0
- package/docs/spec/schemas/AgentWallet.v1.schema.json +54 -0
- package/docs/spec/schemas/AgreementDelegation.v1.schema.json +50 -0
- package/docs/spec/schemas/ArbitrationCase.v1.schema.json +133 -0
- package/docs/spec/schemas/ArbitrationVerdict.v1.schema.json +149 -0
- package/docs/spec/schemas/BundleHeadAttestation.v1.schema.json +21 -0
- package/docs/spec/schemas/ClosePackManifest.v1.schema.json +38 -0
- package/docs/spec/schemas/DelegationGrant.v1.schema.json +102 -0
- package/docs/spec/schemas/DisputeOpenEnvelope.v1.schema.json +78 -0
- package/docs/spec/schemas/EvidenceIndex.v1.schema.json +41 -0
- package/docs/spec/schemas/ExecutionIntent.v1.schema.json +85 -0
- package/docs/spec/schemas/FinancePackBundleManifest.v1.schema.json +38 -0
- package/docs/spec/schemas/FundingHold.v1.schema.json +46 -0
- package/docs/spec/schemas/GovernancePolicy.v1.schema.json +45 -0
- package/docs/spec/schemas/GovernancePolicy.v2.schema.json +70 -0
- package/docs/spec/schemas/InteractionDirectionMatrix.v1.schema.json +43 -0
- package/docs/spec/schemas/InvoiceBundleManifest.v1.schema.json +38 -0
- package/docs/spec/schemas/InvoiceClaim.v1.schema.json +39 -0
- package/docs/spec/schemas/MarketplaceAcceptance.v2.schema.json +53 -0
- package/docs/spec/schemas/MarketplaceOffer.v2.schema.json +61 -0
- package/docs/spec/schemas/MeteringReport.v1.schema.json +45 -0
- package/docs/spec/schemas/OperatorAction.v1.schema.json +113 -0
- package/docs/spec/schemas/PolicyDecision.v1.schema.json +74 -0
- package/docs/spec/schemas/PricingMatrix.v1.schema.json +24 -0
- package/docs/spec/schemas/PricingMatrixSignatures.v1.schema.json +24 -0
- package/docs/spec/schemas/PricingMatrixSignatures.v2.schema.json +24 -0
- package/docs/spec/schemas/ProduceCliOutput.v1.schema.json +107 -0
- package/docs/spec/schemas/ProofBundleManifest.v1.schema.json +37 -0
- package/docs/spec/schemas/PublicKeys.v1.schema.json +33 -0
- package/docs/spec/schemas/ReleaseIndex.v1.schema.json +45 -0
- package/docs/spec/schemas/ReleaseIndexSignature.v1.schema.json +16 -0
- package/docs/spec/schemas/ReleaseIndexSignatures.v1.schema.json +16 -0
- package/docs/spec/schemas/ReleaseTrust.v1.schema.json +15 -0
- package/docs/spec/schemas/ReleaseTrust.v2.schema.json +37 -0
- package/docs/spec/schemas/RemoteSignerPublicKeyResponse.v1.schema.json +14 -0
- package/docs/spec/schemas/RemoteSignerRequest.v1.schema.json +24 -0
- package/docs/spec/schemas/RemoteSignerResponse.v1.schema.json +10 -0
- package/docs/spec/schemas/RemoteSignerSignRequest.v1.schema.json +27 -0
- package/docs/spec/schemas/RemoteSignerSignResponse.v1.schema.json +16 -0
- package/docs/spec/schemas/ReputationEvent.v1.schema.json +164 -0
- package/docs/spec/schemas/RevocationList.v1.schema.json +51 -0
- package/docs/spec/schemas/SettlementAdjustment.v1.schema.json +44 -0
- package/docs/spec/schemas/SettlementDecisionRecord.v1.schema.json +66 -0
- package/docs/spec/schemas/SettlementDecisionRecord.v2.schema.json +149 -0
- package/docs/spec/schemas/SettlementDecisionReport.v1.schema.json +61 -0
- package/docs/spec/schemas/SettlementReceipt.v1.schema.json +135 -0
- package/docs/spec/schemas/SlaDefinition.v1.schema.json +33 -0
- package/docs/spec/schemas/SlaEvaluation.v1.schema.json +26 -0
- package/docs/spec/schemas/TenantSettings.v1.schema.json +90 -0
- package/docs/spec/schemas/TenantSettings.v2.schema.json +161 -0
- package/docs/spec/schemas/TimestampProof.v1.schema.json +17 -0
- package/docs/spec/schemas/ToolCallAgreement.v1.schema.json +34 -0
- package/docs/spec/schemas/ToolCallEvidence.v1.schema.json +45 -0
- package/docs/spec/schemas/ToolManifest.v1.schema.json +54 -0
- package/docs/spec/schemas/VerificationReport.v1.schema.json +83 -0
- package/docs/spec/schemas/VerifyAboutOutput.v1.schema.json +54 -0
- package/docs/spec/schemas/VerifyCliOutput.v1.schema.json +75 -0
- package/docs/spec/schemas/VerifyReleaseOutput.v1.schema.json +47 -0
- package/docs/spec/x402-error-codes.v1.txt +35 -0
- package/docs/templates/buyer-email.txt +18 -0
- package/docs/templates/buyer-one-pager.md +24 -0
- package/package.json +53 -6
- package/scripts/acceptance/full-stack.mjs +734 -0
- package/scripts/acceptance/full-stack.sh +99 -0
- package/scripts/audit/build-audit-packet.mjs +242 -0
- package/scripts/backup-pg.sh +45 -0
- package/scripts/backup-restore/README.md +18 -0
- package/scripts/backup-restore/capture-state.mjs +130 -0
- package/scripts/backup-restore/client.mjs +97 -0
- package/scripts/backup-restore/seed-workload.mjs +235 -0
- package/scripts/backup-restore/verify-state.mjs +139 -0
- package/scripts/backup-restore-test.sh +217 -0
- package/scripts/chaos.js +221 -0
- package/scripts/ci/build-launch-cutover-packet.mjs +304 -0
- package/scripts/ci/build-self-serve-benchmark-report.mjs +122 -0
- package/scripts/ci/changelog-guard.mjs +145 -0
- package/scripts/ci/check-kernel-v0-launch-gate.mjs +233 -0
- package/scripts/ci/check-secret-hygiene.mjs +78 -0
- package/scripts/ci/check-version-consistency.mjs +42 -0
- package/scripts/ci/cli-pack-smoke.mjs +160 -0
- package/scripts/ci/flake-budget-guard.mjs +68 -0
- package/scripts/ci/generate-error-codes.mjs +54 -0
- package/scripts/ci/lib/lighthouse-tracker.mjs +90 -0
- package/scripts/ci/lib/self-serve-launch-gate.mjs +89 -0
- package/scripts/ci/npm-pack-smoke.mjs +454 -0
- package/scripts/ci/run-10x-throughput-drill.mjs +318 -0
- package/scripts/ci/run-10x-throughput-incident-rehearsal.mjs +368 -0
- package/scripts/ci/run-arbitration-workspace-browser-e2e.sh +22 -0
- package/scripts/ci/run-circle-sandbox-smoke.mjs +237 -0
- package/scripts/ci/run-go-live-gate.mjs +150 -0
- package/scripts/ci/run-kernel-v0-ship-gate.mjs +97 -0
- package/scripts/ci/run-mcp-host-cert-matrix.mjs +201 -0
- package/scripts/ci/run-mcp-host-smoke.mjs +473 -0
- package/scripts/ci/run-offline-verification-parity-gate.mjs +762 -0
- package/scripts/ci/run-onboarding-host-success-gate.mjs +516 -0
- package/scripts/ci/run-onboarding-policy-slo-gate.mjs +537 -0
- package/scripts/ci/run-production-cutover-gate.mjs +540 -0
- package/scripts/ci/run-public-openclaw-npx-smoke.mjs +148 -0
- package/scripts/ci/run-release-promotion-guard.mjs +756 -0
- package/scripts/ci/run-self-serve-launch-gate.mjs +56 -0
- package/scripts/ci/runtime-import-smoke.mjs +58 -0
- package/scripts/ci/update-lighthouse-tracker.mjs +112 -0
- package/scripts/closepack/lib.mjs +286 -0
- package/scripts/collect-debug.sh +263 -0
- package/scripts/demo/compositional-settlement-3hop.mjs +237 -0
- package/scripts/demo/delivery-robot/export-ui-fixture.mjs +188 -0
- package/scripts/demo/delivery-robot/generate.mjs +377 -0
- package/scripts/demo/kernel-agent-goes-shopping.mjs +202 -0
- package/scripts/demo/magic-link-first-green.mjs +118 -0
- package/scripts/demo/magic-link-kind-smoke.mjs +577 -0
- package/scripts/demo/mcp-paid-exa.mjs +1110 -0
- package/scripts/dev/billing-doctor.sh +145 -0
- package/scripts/dev/billing-smoke-prod.sh +219 -0
- package/scripts/dev/billing-webhook-replay.sh +161 -0
- package/scripts/dev/env.dev.example +29 -0
- package/scripts/dev/env.sh +37 -0
- package/scripts/dev/new-sdk-key.sh +81 -0
- package/scripts/dev/sdk-first-run.sh +21 -0
- package/scripts/dev/smoke-x402-gateway.sh +115 -0
- package/scripts/dev/start-api.sh +24 -0
- package/scripts/doctor/mcp-host.mjs +120 -0
- package/scripts/examples/produce-and-verify-jobproof.mjs +191 -0
- package/scripts/examples/sdk-first-paid-rfq.py +105 -0
- package/scripts/examples/sdk-first-verified-run.mjs +85 -0
- package/scripts/examples/sdk-first-verified-run.py +99 -0
- package/scripts/examples/sdk-tenant-analytics.mjs +103 -0
- package/scripts/examples/sdk-tenant-analytics.py +118 -0
- package/scripts/finance-pack/bundle.mjs +284 -0
- package/scripts/fixtures/generate-bundle-fixtures.mjs +877 -0
- package/scripts/governance/export.mjs +169 -0
- package/scripts/load/delivery-stress.k6.js +183 -0
- package/scripts/load/ingest-burst.k6.js +236 -0
- package/scripts/load/run-delivery-load.js +66 -0
- package/scripts/load/webhook-receiver.js +131 -0
- package/scripts/magic-link/migrate-run-records-to-db.mjs +35 -0
- package/scripts/mcp/probe.mjs +238 -0
- package/scripts/mcp/settld-mcp-http-gateway.mjs +178 -0
- package/scripts/mcp/settld-mcp-server.mjs +1511 -0
- package/scripts/openapi/write.mjs +13 -0
- package/scripts/ops/bootstrap-tenant-conformance.mjs +185 -0
- package/scripts/ops/build-x402-pilot-reliability-report.mjs +489 -0
- package/scripts/ops/check-x402-receipt-sample.mjs +181 -0
- package/scripts/ops/design-partner-run-packet.mjs +466 -0
- package/scripts/ops/dispute-finance-reconciliation-packet.mjs +313 -0
- package/scripts/ops/hosted-baseline-evidence.mjs +890 -0
- package/scripts/ops/money-rails-chargeback-evidence.mjs +509 -0
- package/scripts/ops/money-rails-reconcile-evidence.mjs +180 -0
- package/scripts/ops/p0-seed-money-rail-operation.mjs +432 -0
- package/scripts/ops/run-x402-hitl-smoke.mjs +607 -0
- package/scripts/pilot/finance-pack.mjs +495 -0
- package/scripts/pilot/fixtures/robot-keypair.json +4 -0
- package/scripts/pilot/fixtures/server-signer.json +4 -0
- package/scripts/policy/cli.mjs +600 -0
- package/scripts/profile/cli.mjs +1324 -0
- package/scripts/proof-bundle/job.mjs +109 -0
- package/scripts/proof-bundle/lib.mjs +92 -0
- package/scripts/proof-bundle/month.mjs +103 -0
- package/scripts/provider/conformance-run.mjs +159 -0
- package/scripts/provider/keys-generate.mjs +135 -0
- package/scripts/provider/publish.mjs +420 -0
- package/scripts/quickstart/x402.mjs +334 -0
- package/scripts/register-entity-secret.mjs +102 -0
- package/scripts/release/build-artifacts.mjs +181 -0
- package/scripts/release/generate-release-index.mjs +112 -0
- package/scripts/release/release-index-lib.mjs +232 -0
- package/scripts/release/sign-release-index.mjs +85 -0
- package/scripts/release/validate-release-assets.mjs +170 -0
- package/scripts/release/verify-release.mjs +261 -0
- package/scripts/restore-pg.sh +34 -0
- package/scripts/scaffold/create-settld-paid-tool.mjs +19 -0
- package/scripts/sdk/smoke-python.py +30 -0
- package/scripts/sdk/smoke.mjs +16 -0
- package/scripts/settlement/x402-batch-worker.mjs +1091 -0
- package/scripts/setup/circle-bootstrap.mjs +310 -0
- package/scripts/setup/host-config.mjs +617 -0
- package/scripts/setup/onboard.mjs +1337 -0
- package/scripts/setup/openclaw-onboard.mjs +423 -0
- package/scripts/setup/wizard.mjs +986 -0
- package/scripts/slo/check.mjs +239 -0
- package/scripts/smoke/k8s-smoke.mjs +214 -0
- package/scripts/spec/generate-protocol-vectors.mjs +1019 -0
- package/scripts/test/check-no-generated-artifacts.sh +12 -0
- package/scripts/test/run.sh +59 -0
- package/scripts/trust/validate-trust-file.mjs +57 -0
- package/scripts/trust-config/rotate-settld-pay.mjs +277 -0
- package/scripts/trust-config/wizard.mjs +161 -0
- package/scripts/vendor-contract-test-lib.mjs +182 -0
- package/scripts/vendor-contract-test.mjs +55 -0
- package/scripts/vercel/build-mkdocs.sh +9 -0
- package/scripts/vercel/ignore-mkdocs.sh +25 -0
- package/scripts/vercel/install-mkdocs.sh +6 -0
- package/scripts/verify-pg.js +217 -0
- package/scripts/x402/receipt-verify.mjs +289 -0
- package/services/finance-sink/src/dedupe-store.js +29 -6
- package/services/receiver/src/dedupe-store.js +29 -5
- package/services/x402-gateway/Dockerfile +13 -0
- package/services/x402-gateway/README.md +58 -0
- package/services/x402-gateway/examples/upstream-mock.js +337 -0
- package/services/x402-gateway/src/server.js +1058 -0
- package/src/api/app.js +34658 -16940
- package/src/api/maintenance.js +70 -0
- package/src/api/middleware/trust-kernel.js +114 -0
- package/src/api/openapi.js +1778 -70
- package/src/api/persistence.js +456 -0
- package/src/api/server.js +81 -5
- package/src/api/store.js +1581 -62
- package/src/api/workers/deliveries.js +99 -4
- package/src/api/workers/insolvency-sweep.js +159 -0
- package/src/core/agent-card.js +69 -0
- package/src/core/agent-wallets.js +231 -0
- package/src/core/agreement-delegation.js +549 -0
- package/src/core/billing-plans.js +40 -6
- package/src/core/circle-reserve-adapter.js +845 -0
- package/src/core/event-policy.js +21 -2
- package/src/core/maintenance-locks.js +1 -0
- package/src/core/operator-action.js +303 -0
- package/src/core/paid-tool-manifest.js +318 -0
- package/src/core/policy-decision.js +322 -0
- package/src/core/policy-packs.js +207 -0
- package/src/core/profile-fingerprint.js +27 -0
- package/src/core/profile-simulation-reasons.js +84 -0
- package/src/core/profile-templates.js +242 -0
- package/src/core/provider-publish-conformance.js +525 -0
- package/src/core/provider-publish-proof.js +396 -0
- package/src/core/provider-quote-signature.js +170 -0
- package/src/core/settld-keys.js +112 -0
- package/src/core/settld-pay-token.js +344 -0
- package/src/core/settlement-kernel.js +239 -2
- package/src/core/settlement-verifier.js +335 -0
- package/src/core/tool-call-agreement.js +112 -0
- package/src/core/tool-call-evidence.js +144 -0
- package/src/core/tool-provider-signature.js +98 -0
- package/src/core/wallet-assignment-resolver.js +129 -0
- package/src/core/wallet-provider-bootstrap.js +365 -0
- package/src/core/x402-escalation-override.js +258 -0
- package/src/core/x402-gate.js +118 -0
- package/src/core/x402-provider-refund-decision.js +220 -0
- package/src/core/x402-receipt-verifier.js +708 -0
- package/src/core/x402-reversal-command.js +251 -0
- package/src/core/x402-wallet-issuer-decision.js +252 -0
- package/src/core/zk-verifier.js +300 -0
- package/src/db/migrations/029_reputation_event_index.sql +54 -0
- package/src/db/migrations/030_artifacts_source_event_unique_job_only.sql +15 -0
- package/src/db/pg.js +18 -7
- package/src/db/store-pg.js +1508 -111
|
@@ -0,0 +1,708 @@
|
|
|
1
|
+
import { canonicalJsonStringify, normalizeForCanonicalJson } from "./canonical-json.js";
|
|
2
|
+
import { sha256Hex } from "./crypto.js";
|
|
3
|
+
import { verifyToolProviderQuoteSignatureV1 } from "./provider-quote-signature.js";
|
|
4
|
+
import { verifySettlementKernelArtifacts } from "./settlement-kernel.js";
|
|
5
|
+
import { verifyToolProviderSignatureV1 } from "./tool-provider-signature.js";
|
|
6
|
+
import { verifyX402ProviderRefundDecisionV1 } from "./x402-provider-refund-decision.js";
|
|
7
|
+
import { verifyX402ReversalCommandV1 } from "./x402-reversal-command.js";
|
|
8
|
+
|
|
9
|
+
export const X402_RECEIPT_VERIFICATION_REPORT_SCHEMA_VERSION = "X402ReceiptVerificationReport.v1";
|
|
10
|
+
|
|
11
|
+
function isPlainObject(value) {
|
|
12
|
+
return Boolean(value) && typeof value === "object" && !Array.isArray(value);
|
|
13
|
+
}
|
|
14
|
+
|
|
15
|
+
function normalizeSha256OrNull(value) {
|
|
16
|
+
if (value === null || value === undefined) return null;
|
|
17
|
+
const text = String(value).trim().toLowerCase();
|
|
18
|
+
if (!/^[0-9a-f]{64}$/.test(text)) return null;
|
|
19
|
+
return text;
|
|
20
|
+
}
|
|
21
|
+
|
|
22
|
+
function normalizeIsoDateTimeOrNull(value) {
|
|
23
|
+
if (value === null || value === undefined) return null;
|
|
24
|
+
const text = String(value).trim();
|
|
25
|
+
if (!text) return null;
|
|
26
|
+
const ms = Date.parse(text);
|
|
27
|
+
if (!Number.isFinite(ms)) return null;
|
|
28
|
+
return new Date(ms).toISOString();
|
|
29
|
+
}
|
|
30
|
+
|
|
31
|
+
function parseEvidenceRefMap(evidenceRefs) {
|
|
32
|
+
const out = {
|
|
33
|
+
requestSha256: null,
|
|
34
|
+
responseSha256: null,
|
|
35
|
+
providerKeyId: null,
|
|
36
|
+
providerSignedAt: null,
|
|
37
|
+
providerNonce: null,
|
|
38
|
+
providerPayloadSha256: null,
|
|
39
|
+
providerSignatureBase64: null,
|
|
40
|
+
providerQuoteId: null,
|
|
41
|
+
providerQuotePayloadSha256: null
|
|
42
|
+
};
|
|
43
|
+
if (!Array.isArray(evidenceRefs)) return out;
|
|
44
|
+
for (const row of evidenceRefs) {
|
|
45
|
+
const ref = typeof row === "string" ? row.trim() : "";
|
|
46
|
+
if (!ref) continue;
|
|
47
|
+
if (ref.startsWith("http:request_sha256:")) {
|
|
48
|
+
out.requestSha256 = normalizeSha256OrNull(ref.slice("http:request_sha256:".length)) ?? out.requestSha256;
|
|
49
|
+
continue;
|
|
50
|
+
}
|
|
51
|
+
if (ref.startsWith("http:response_sha256:")) {
|
|
52
|
+
out.responseSha256 = normalizeSha256OrNull(ref.slice("http:response_sha256:".length)) ?? out.responseSha256;
|
|
53
|
+
continue;
|
|
54
|
+
}
|
|
55
|
+
if (ref.startsWith("provider:key_id:")) {
|
|
56
|
+
const value = ref.slice("provider:key_id:".length).trim();
|
|
57
|
+
if (value) out.providerKeyId = value;
|
|
58
|
+
continue;
|
|
59
|
+
}
|
|
60
|
+
if (ref.startsWith("provider:signed_at:")) {
|
|
61
|
+
const value = ref.slice("provider:signed_at:".length).trim();
|
|
62
|
+
if (value) out.providerSignedAt = value;
|
|
63
|
+
continue;
|
|
64
|
+
}
|
|
65
|
+
if (ref.startsWith("provider:nonce:")) {
|
|
66
|
+
const value = ref.slice("provider:nonce:".length).trim();
|
|
67
|
+
if (value) out.providerNonce = value;
|
|
68
|
+
continue;
|
|
69
|
+
}
|
|
70
|
+
if (ref.startsWith("provider:payload_sha256:")) {
|
|
71
|
+
out.providerPayloadSha256 =
|
|
72
|
+
normalizeSha256OrNull(ref.slice("provider:payload_sha256:".length)) ?? out.providerPayloadSha256;
|
|
73
|
+
continue;
|
|
74
|
+
}
|
|
75
|
+
if (ref.startsWith("provider:sig_b64:")) {
|
|
76
|
+
const value = ref.slice("provider:sig_b64:".length).trim();
|
|
77
|
+
if (value) out.providerSignatureBase64 = value;
|
|
78
|
+
continue;
|
|
79
|
+
}
|
|
80
|
+
if (ref.startsWith("provider_quote:quote_id:")) {
|
|
81
|
+
const value = ref.slice("provider_quote:quote_id:".length).trim();
|
|
82
|
+
if (value) out.providerQuoteId = value;
|
|
83
|
+
continue;
|
|
84
|
+
}
|
|
85
|
+
if (ref.startsWith("provider_quote:payload_sha256:")) {
|
|
86
|
+
out.providerQuotePayloadSha256 =
|
|
87
|
+
normalizeSha256OrNull(ref.slice("provider_quote:payload_sha256:".length)) ?? out.providerQuotePayloadSha256;
|
|
88
|
+
continue;
|
|
89
|
+
}
|
|
90
|
+
}
|
|
91
|
+
return out;
|
|
92
|
+
}
|
|
93
|
+
|
|
94
|
+
function pushIssue(target, { code, message, detail = null }) {
|
|
95
|
+
target.push(
|
|
96
|
+
normalizeForCanonicalJson(
|
|
97
|
+
{
|
|
98
|
+
code: String(code),
|
|
99
|
+
message: String(message),
|
|
100
|
+
...(detail === null || detail === undefined ? {} : { detail })
|
|
101
|
+
},
|
|
102
|
+
{ path: "$" }
|
|
103
|
+
)
|
|
104
|
+
);
|
|
105
|
+
}
|
|
106
|
+
|
|
107
|
+
function pushCheck(checks, { id, ok, detail = null }) {
|
|
108
|
+
checks.push(
|
|
109
|
+
normalizeForCanonicalJson(
|
|
110
|
+
{
|
|
111
|
+
id: String(id),
|
|
112
|
+
ok: ok === true,
|
|
113
|
+
...(detail === null || detail === undefined ? {} : { detail })
|
|
114
|
+
},
|
|
115
|
+
{ path: "$" }
|
|
116
|
+
)
|
|
117
|
+
);
|
|
118
|
+
}
|
|
119
|
+
|
|
120
|
+
function verifyProviderOutputSignature({ receipt, bindings, verificationContext, evidence, checks, warnings, errors }) {
|
|
121
|
+
const status = isPlainObject(bindings?.providerSig) ? bindings.providerSig : null;
|
|
122
|
+
const required = status?.required === true;
|
|
123
|
+
const expectedVerified = status?.verified === true;
|
|
124
|
+
const expectedResponseSha = normalizeSha256OrNull(bindings?.response?.sha256);
|
|
125
|
+
const contextKey = isPlainObject(verificationContext?.providerSigningKey) ? verificationContext.providerSigningKey : null;
|
|
126
|
+
const publicKeyPem =
|
|
127
|
+
typeof contextKey?.publicKeyPem === "string" && contextKey.publicKeyPem.trim() !== "" ? contextKey.publicKeyPem.trim() : null;
|
|
128
|
+
|
|
129
|
+
const fromReceipt = isPlainObject(receipt?.providerSignature) ? { ...receipt.providerSignature } : null;
|
|
130
|
+
const fromEvidence =
|
|
131
|
+
evidence.providerKeyId && evidence.providerSignedAt && evidence.providerNonce && evidence.providerSignatureBase64 && expectedResponseSha
|
|
132
|
+
? {
|
|
133
|
+
schemaVersion: "ToolProviderSignature.v1",
|
|
134
|
+
algorithm: "ed25519",
|
|
135
|
+
keyId: evidence.providerKeyId,
|
|
136
|
+
signedAt: evidence.providerSignedAt,
|
|
137
|
+
nonce: evidence.providerNonce,
|
|
138
|
+
responseHash: expectedResponseSha,
|
|
139
|
+
payloadHash: evidence.providerPayloadSha256,
|
|
140
|
+
signatureBase64: evidence.providerSignatureBase64
|
|
141
|
+
}
|
|
142
|
+
: null;
|
|
143
|
+
const candidate = fromReceipt ?? fromEvidence;
|
|
144
|
+
|
|
145
|
+
if (!candidate) {
|
|
146
|
+
if (required || expectedVerified) {
|
|
147
|
+
const issue = {
|
|
148
|
+
code: "provider_signature_material_missing",
|
|
149
|
+
message: "provider signature bytes are missing from receipt/evidence"
|
|
150
|
+
};
|
|
151
|
+
pushIssue(errors, issue);
|
|
152
|
+
} else {
|
|
153
|
+
const issue = {
|
|
154
|
+
code: "provider_signature_not_available",
|
|
155
|
+
message: "provider signature bytes are not present; skipped crypto verification"
|
|
156
|
+
};
|
|
157
|
+
pushIssue(warnings, issue);
|
|
158
|
+
}
|
|
159
|
+
pushCheck(checks, { id: "provider_output_signature_crypto", ok: !required && !expectedVerified, detail: { skipped: true } });
|
|
160
|
+
return;
|
|
161
|
+
}
|
|
162
|
+
|
|
163
|
+
if (!publicKeyPem) {
|
|
164
|
+
pushIssue(errors, {
|
|
165
|
+
code: "provider_signature_key_missing",
|
|
166
|
+
message: "verificationContext.providerSigningKey.publicKeyPem is required for signature verification"
|
|
167
|
+
});
|
|
168
|
+
pushCheck(checks, { id: "provider_output_signature_crypto", ok: false, detail: { reason: "missing_public_key" } });
|
|
169
|
+
return;
|
|
170
|
+
}
|
|
171
|
+
|
|
172
|
+
if (expectedResponseSha && normalizeSha256OrNull(candidate.responseHash) !== expectedResponseSha) {
|
|
173
|
+
pushIssue(errors, {
|
|
174
|
+
code: "provider_signature_response_hash_mismatch",
|
|
175
|
+
message: "provider signature responseHash does not match receipt binding",
|
|
176
|
+
detail: {
|
|
177
|
+
expected: expectedResponseSha,
|
|
178
|
+
actual: normalizeSha256OrNull(candidate.responseHash)
|
|
179
|
+
}
|
|
180
|
+
});
|
|
181
|
+
}
|
|
182
|
+
|
|
183
|
+
if (
|
|
184
|
+
status?.providerKeyId &&
|
|
185
|
+
typeof candidate.keyId === "string" &&
|
|
186
|
+
candidate.keyId.trim() !== "" &&
|
|
187
|
+
String(status.providerKeyId) !== String(candidate.keyId)
|
|
188
|
+
) {
|
|
189
|
+
pushIssue(errors, {
|
|
190
|
+
code: "provider_signature_key_id_mismatch",
|
|
191
|
+
message: "provider signature keyId does not match bindings.providerSig.providerKeyId",
|
|
192
|
+
detail: {
|
|
193
|
+
expected: status.providerKeyId,
|
|
194
|
+
actual: candidate.keyId
|
|
195
|
+
}
|
|
196
|
+
});
|
|
197
|
+
}
|
|
198
|
+
|
|
199
|
+
let ok = false;
|
|
200
|
+
try {
|
|
201
|
+
ok = verifyToolProviderSignatureV1({ signature: candidate, publicKeyPem });
|
|
202
|
+
} catch (err) {
|
|
203
|
+
pushIssue(errors, {
|
|
204
|
+
code: "provider_signature_parse_failed",
|
|
205
|
+
message: "provider signature object is malformed",
|
|
206
|
+
detail: { message: err?.message ?? String(err ?? "") }
|
|
207
|
+
});
|
|
208
|
+
ok = false;
|
|
209
|
+
}
|
|
210
|
+
if (!ok) {
|
|
211
|
+
pushIssue(errors, {
|
|
212
|
+
code: "provider_signature_crypto_invalid",
|
|
213
|
+
message: "provider output signature verification failed"
|
|
214
|
+
});
|
|
215
|
+
}
|
|
216
|
+
pushCheck(checks, { id: "provider_output_signature_crypto", ok });
|
|
217
|
+
}
|
|
218
|
+
|
|
219
|
+
function verifyProviderQuoteSignature({ receipt, bindings, verificationContext, evidence, checks, warnings, errors }) {
|
|
220
|
+
const status = isPlainObject(bindings?.providerQuoteSig) ? bindings.providerQuoteSig : null;
|
|
221
|
+
const required = status?.required === true;
|
|
222
|
+
const expectedVerified = status?.verified === true;
|
|
223
|
+
const payload = isPlainObject(receipt?.providerQuotePayload) ? receipt.providerQuotePayload : null;
|
|
224
|
+
const signature = isPlainObject(receipt?.providerQuoteSignature) ? receipt.providerQuoteSignature : null;
|
|
225
|
+
const contextKey = isPlainObject(verificationContext?.providerQuoteSigningKey) ? verificationContext.providerQuoteSigningKey : null;
|
|
226
|
+
const publicKeyPem =
|
|
227
|
+
typeof contextKey?.publicKeyPem === "string" && contextKey.publicKeyPem.trim() !== "" ? contextKey.publicKeyPem.trim() : null;
|
|
228
|
+
|
|
229
|
+
if (!payload || !signature || !publicKeyPem) {
|
|
230
|
+
if (required || expectedVerified) {
|
|
231
|
+
const issue = {
|
|
232
|
+
code: "provider_quote_signature_material_missing",
|
|
233
|
+
message: "quote payload/signature/public key missing; quote signature cannot be re-verified offline",
|
|
234
|
+
detail: {
|
|
235
|
+
hasPayload: Boolean(payload),
|
|
236
|
+
hasSignature: Boolean(signature),
|
|
237
|
+
hasPublicKey: Boolean(publicKeyPem)
|
|
238
|
+
}
|
|
239
|
+
};
|
|
240
|
+
pushIssue(warnings, issue);
|
|
241
|
+
}
|
|
242
|
+
pushCheck(checks, {
|
|
243
|
+
id: "provider_quote_signature_crypto",
|
|
244
|
+
ok: !required && !expectedVerified,
|
|
245
|
+
detail: { skipped: true, hasPayload: Boolean(payload), hasSignature: Boolean(signature), hasPublicKey: Boolean(publicKeyPem) }
|
|
246
|
+
});
|
|
247
|
+
return;
|
|
248
|
+
}
|
|
249
|
+
|
|
250
|
+
let ok = false;
|
|
251
|
+
try {
|
|
252
|
+
ok = verifyToolProviderQuoteSignatureV1({ quote: payload, signature, publicKeyPem });
|
|
253
|
+
} catch (err) {
|
|
254
|
+
pushIssue(errors, {
|
|
255
|
+
code: "provider_quote_signature_parse_failed",
|
|
256
|
+
message: "provider quote signature object is malformed",
|
|
257
|
+
detail: { message: err?.message ?? String(err ?? "") }
|
|
258
|
+
});
|
|
259
|
+
ok = false;
|
|
260
|
+
}
|
|
261
|
+
if (!ok) {
|
|
262
|
+
pushIssue(errors, {
|
|
263
|
+
code: "provider_quote_signature_crypto_invalid",
|
|
264
|
+
message: "provider quote signature verification failed"
|
|
265
|
+
});
|
|
266
|
+
}
|
|
267
|
+
const payloadSha256 = sha256Hex(canonicalJsonStringify(normalizeForCanonicalJson(payload, { path: "$" })));
|
|
268
|
+
if (status?.quoteSha256 && normalizeSha256OrNull(status.quoteSha256) !== payloadSha256) {
|
|
269
|
+
pushIssue(errors, {
|
|
270
|
+
code: "provider_quote_signature_hash_mismatch",
|
|
271
|
+
message: "bindings.providerQuoteSig.quoteSha256 does not match quote payload hash",
|
|
272
|
+
detail: {
|
|
273
|
+
expected: normalizeSha256OrNull(status.quoteSha256),
|
|
274
|
+
actual: payloadSha256
|
|
275
|
+
}
|
|
276
|
+
});
|
|
277
|
+
}
|
|
278
|
+
if (evidence.providerQuotePayloadSha256 && evidence.providerQuotePayloadSha256 !== payloadSha256) {
|
|
279
|
+
pushIssue(errors, {
|
|
280
|
+
code: "provider_quote_evidence_hash_mismatch",
|
|
281
|
+
message: "provider quote evidence payload hash does not match quote payload hash",
|
|
282
|
+
detail: {
|
|
283
|
+
expected: evidence.providerQuotePayloadSha256,
|
|
284
|
+
actual: payloadSha256
|
|
285
|
+
}
|
|
286
|
+
});
|
|
287
|
+
}
|
|
288
|
+
if (status?.quoteId && payload?.quoteId && String(status.quoteId) !== String(payload.quoteId)) {
|
|
289
|
+
pushIssue(errors, {
|
|
290
|
+
code: "provider_quote_id_mismatch",
|
|
291
|
+
message: "bindings.providerQuoteSig.quoteId does not match quote payload quoteId",
|
|
292
|
+
detail: {
|
|
293
|
+
expected: status.quoteId,
|
|
294
|
+
actual: payload.quoteId
|
|
295
|
+
}
|
|
296
|
+
});
|
|
297
|
+
}
|
|
298
|
+
if (evidence.providerQuoteId && payload?.quoteId && String(evidence.providerQuoteId) !== String(payload.quoteId)) {
|
|
299
|
+
pushIssue(errors, {
|
|
300
|
+
code: "provider_quote_evidence_id_mismatch",
|
|
301
|
+
message: "provider quote evidence quoteId does not match quote payload quoteId",
|
|
302
|
+
detail: {
|
|
303
|
+
expected: evidence.providerQuoteId,
|
|
304
|
+
actual: payload.quoteId
|
|
305
|
+
}
|
|
306
|
+
});
|
|
307
|
+
}
|
|
308
|
+
pushCheck(checks, { id: "provider_quote_signature_crypto", ok });
|
|
309
|
+
}
|
|
310
|
+
|
|
311
|
+
function verifyReversalEvents({ receipt, checks, errors }) {
|
|
312
|
+
const events = Array.isArray(receipt?.reversalEvents) ? receipt.reversalEvents : [];
|
|
313
|
+
if (!events.length) {
|
|
314
|
+
pushCheck(checks, { id: "reversal_event_chain", ok: true, detail: { skipped: true } });
|
|
315
|
+
return;
|
|
316
|
+
}
|
|
317
|
+
const expectedGateId = typeof receipt?.gateId === "string" && receipt.gateId.trim() !== "" ? receipt.gateId.trim() : null;
|
|
318
|
+
const expectedReceiptId = typeof receipt?.receiptId === "string" && receipt.receiptId.trim() !== "" ? receipt.receiptId.trim() : null;
|
|
319
|
+
let ok = true;
|
|
320
|
+
let previousEventHash = null;
|
|
321
|
+
for (let index = 0; index < events.length; index += 1) {
|
|
322
|
+
const event = events[index];
|
|
323
|
+
if (!isPlainObject(event)) {
|
|
324
|
+
ok = false;
|
|
325
|
+
pushIssue(errors, {
|
|
326
|
+
code: "reversal_event_invalid",
|
|
327
|
+
message: "reversal event must be an object",
|
|
328
|
+
detail: { index }
|
|
329
|
+
});
|
|
330
|
+
continue;
|
|
331
|
+
}
|
|
332
|
+
const eventId = typeof event.eventId === "string" && event.eventId.trim() !== "" ? event.eventId.trim() : `index_${index}`;
|
|
333
|
+
const eventHash = normalizeSha256OrNull(event.eventHash);
|
|
334
|
+
if (!eventHash) {
|
|
335
|
+
ok = false;
|
|
336
|
+
pushIssue(errors, {
|
|
337
|
+
code: "reversal_event_hash_missing",
|
|
338
|
+
message: "reversal event hash is missing or invalid",
|
|
339
|
+
detail: { eventId, index }
|
|
340
|
+
});
|
|
341
|
+
} else {
|
|
342
|
+
const normalizedWithoutHash = normalizeForCanonicalJson(
|
|
343
|
+
Object.fromEntries(Object.entries(event).filter(([key]) => key !== "eventHash")),
|
|
344
|
+
{ path: "$" }
|
|
345
|
+
);
|
|
346
|
+
const computedHash = sha256Hex(canonicalJsonStringify(normalizedWithoutHash));
|
|
347
|
+
if (computedHash !== eventHash) {
|
|
348
|
+
ok = false;
|
|
349
|
+
pushIssue(errors, {
|
|
350
|
+
code: "reversal_event_hash_mismatch",
|
|
351
|
+
message: "reversal event hash does not match canonical event payload",
|
|
352
|
+
detail: { eventId, index, expected: computedHash, actual: eventHash }
|
|
353
|
+
});
|
|
354
|
+
}
|
|
355
|
+
}
|
|
356
|
+
const prevEventHash = normalizeSha256OrNull(event.prevEventHash);
|
|
357
|
+
if ((previousEventHash ?? null) !== (prevEventHash ?? null)) {
|
|
358
|
+
ok = false;
|
|
359
|
+
pushIssue(errors, {
|
|
360
|
+
code: "reversal_event_chain_mismatch",
|
|
361
|
+
message: "reversal event prevEventHash does not match previous event hash",
|
|
362
|
+
detail: { eventId, index, expected: previousEventHash, actual: prevEventHash }
|
|
363
|
+
});
|
|
364
|
+
}
|
|
365
|
+
if (expectedGateId && String(event.gateId ?? "") && String(event.gateId) !== expectedGateId) {
|
|
366
|
+
ok = false;
|
|
367
|
+
pushIssue(errors, {
|
|
368
|
+
code: "reversal_event_gate_mismatch",
|
|
369
|
+
message: "reversal event gateId does not match receipt gateId",
|
|
370
|
+
detail: { eventId, expected: expectedGateId, actual: event.gateId }
|
|
371
|
+
});
|
|
372
|
+
}
|
|
373
|
+
if (expectedReceiptId && String(event.receiptId ?? "") && String(event.receiptId) !== expectedReceiptId) {
|
|
374
|
+
ok = false;
|
|
375
|
+
pushIssue(errors, {
|
|
376
|
+
code: "reversal_event_receipt_mismatch",
|
|
377
|
+
message: "reversal event receiptId does not match receipt receiptId",
|
|
378
|
+
detail: { eventId, expected: expectedReceiptId, actual: event.receiptId }
|
|
379
|
+
});
|
|
380
|
+
}
|
|
381
|
+
|
|
382
|
+
const action = typeof event.action === "string" ? event.action.trim().toLowerCase() : null;
|
|
383
|
+
const command = isPlainObject(event.command) ? event.command : null;
|
|
384
|
+
const commandVerification = isPlainObject(event.commandVerification) ? event.commandVerification : null;
|
|
385
|
+
if (action || command || commandVerification) {
|
|
386
|
+
if (!command || !commandVerification) {
|
|
387
|
+
ok = false;
|
|
388
|
+
pushIssue(errors, {
|
|
389
|
+
code: "reversal_command_material_missing",
|
|
390
|
+
message: "reversal command and verification material are required for reversal event",
|
|
391
|
+
detail: { eventId, hasCommand: Boolean(command), hasCommandVerification: Boolean(commandVerification) }
|
|
392
|
+
});
|
|
393
|
+
} else {
|
|
394
|
+
const commandPublicKeyPem =
|
|
395
|
+
typeof commandVerification.publicKeyPem === "string" && commandVerification.publicKeyPem.trim() !== ""
|
|
396
|
+
? commandVerification.publicKeyPem
|
|
397
|
+
: null;
|
|
398
|
+
if (!commandPublicKeyPem) {
|
|
399
|
+
ok = false;
|
|
400
|
+
pushIssue(errors, {
|
|
401
|
+
code: "reversal_command_key_missing",
|
|
402
|
+
message: "reversal command verification key is missing",
|
|
403
|
+
detail: { eventId }
|
|
404
|
+
});
|
|
405
|
+
} else {
|
|
406
|
+
const commandVerificationResult = verifyX402ReversalCommandV1({
|
|
407
|
+
command,
|
|
408
|
+
publicKeyPem: commandPublicKeyPem,
|
|
409
|
+
nowAt:
|
|
410
|
+
normalizeIsoDateTimeOrNull(event.occurredAt) ??
|
|
411
|
+
normalizeIsoDateTimeOrNull(receipt.updatedAt) ??
|
|
412
|
+
new Date().toISOString(),
|
|
413
|
+
expectedAction: action,
|
|
414
|
+
expectedGateId:
|
|
415
|
+
typeof event.gateId === "string" && event.gateId.trim() !== "" ? event.gateId.trim() : expectedGateId,
|
|
416
|
+
expectedReceiptId:
|
|
417
|
+
typeof event.receiptId === "string" && event.receiptId.trim() !== "" ? event.receiptId.trim() : expectedReceiptId,
|
|
418
|
+
expectedQuoteId: command?.target?.quoteId ?? null,
|
|
419
|
+
expectedRequestSha256: command?.target?.requestSha256 ?? null
|
|
420
|
+
});
|
|
421
|
+
if (!commandVerificationResult.ok) {
|
|
422
|
+
ok = false;
|
|
423
|
+
pushIssue(errors, {
|
|
424
|
+
code: "reversal_command_invalid",
|
|
425
|
+
message: "reversal command verification failed",
|
|
426
|
+
detail: { eventId, code: commandVerificationResult.code, error: commandVerificationResult.error ?? null }
|
|
427
|
+
});
|
|
428
|
+
}
|
|
429
|
+
if (commandVerification?.verified !== true) {
|
|
430
|
+
ok = false;
|
|
431
|
+
pushIssue(errors, {
|
|
432
|
+
code: "reversal_command_verification_status_invalid",
|
|
433
|
+
message: "reversal command verification record must indicate verified=true",
|
|
434
|
+
detail: { eventId, verified: commandVerification?.verified ?? null }
|
|
435
|
+
});
|
|
436
|
+
}
|
|
437
|
+
const recordedPayloadHash = normalizeSha256OrNull(commandVerification?.payloadHash);
|
|
438
|
+
if (
|
|
439
|
+
recordedPayloadHash &&
|
|
440
|
+
commandVerificationResult.ok &&
|
|
441
|
+
normalizeSha256OrNull(commandVerificationResult.payloadHash) !== recordedPayloadHash
|
|
442
|
+
) {
|
|
443
|
+
ok = false;
|
|
444
|
+
pushIssue(errors, {
|
|
445
|
+
code: "reversal_command_payload_hash_mismatch",
|
|
446
|
+
message: "reversal command verification payload hash does not match cryptographic payload hash",
|
|
447
|
+
detail: {
|
|
448
|
+
eventId,
|
|
449
|
+
expected: commandVerificationResult.payloadHash,
|
|
450
|
+
actual: recordedPayloadHash
|
|
451
|
+
}
|
|
452
|
+
});
|
|
453
|
+
}
|
|
454
|
+
}
|
|
455
|
+
}
|
|
456
|
+
}
|
|
457
|
+
|
|
458
|
+
const providerDecision = typeof event.providerDecision === "string" ? event.providerDecision.trim().toLowerCase() : null;
|
|
459
|
+
const requiresProviderDecisionVerification = action === "resolve_refund" || providerDecision === "accepted" || providerDecision === "denied";
|
|
460
|
+
if (requiresProviderDecisionVerification) {
|
|
461
|
+
const providerDecisionArtifact = isPlainObject(event.providerDecisionArtifact) ? event.providerDecisionArtifact : null;
|
|
462
|
+
const providerDecisionVerification = isPlainObject(event.providerDecisionVerification) ? event.providerDecisionVerification : null;
|
|
463
|
+
if (!providerDecisionArtifact || !providerDecisionVerification) {
|
|
464
|
+
ok = false;
|
|
465
|
+
pushIssue(errors, {
|
|
466
|
+
code: "reversal_provider_decision_material_missing",
|
|
467
|
+
message: "provider refund decision artifact and verification are required for resolve_refund events",
|
|
468
|
+
detail: {
|
|
469
|
+
eventId,
|
|
470
|
+
hasProviderDecisionArtifact: Boolean(providerDecisionArtifact),
|
|
471
|
+
hasProviderDecisionVerification: Boolean(providerDecisionVerification)
|
|
472
|
+
}
|
|
473
|
+
});
|
|
474
|
+
} else {
|
|
475
|
+
const providerPublicKeyPem =
|
|
476
|
+
typeof providerDecisionVerification.publicKeyPem === "string" && providerDecisionVerification.publicKeyPem.trim() !== ""
|
|
477
|
+
? providerDecisionVerification.publicKeyPem
|
|
478
|
+
: null;
|
|
479
|
+
if (!providerPublicKeyPem) {
|
|
480
|
+
ok = false;
|
|
481
|
+
pushIssue(errors, {
|
|
482
|
+
code: "reversal_provider_decision_key_missing",
|
|
483
|
+
message: "provider refund decision verification key is missing",
|
|
484
|
+
detail: { eventId }
|
|
485
|
+
});
|
|
486
|
+
} else {
|
|
487
|
+
const providerDecisionResult = verifyX402ProviderRefundDecisionV1({
|
|
488
|
+
decision: providerDecisionArtifact,
|
|
489
|
+
publicKeyPem: providerPublicKeyPem,
|
|
490
|
+
expectedReceiptId:
|
|
491
|
+
typeof event.receiptId === "string" && event.receiptId.trim() !== "" ? event.receiptId.trim() : expectedReceiptId,
|
|
492
|
+
expectedGateId:
|
|
493
|
+
typeof event.gateId === "string" && event.gateId.trim() !== "" ? event.gateId.trim() : expectedGateId,
|
|
494
|
+
expectedQuoteId: providerDecisionArtifact?.quoteId ?? null,
|
|
495
|
+
expectedRequestSha256: providerDecisionArtifact?.requestSha256 ?? null,
|
|
496
|
+
expectedDecision: providerDecision
|
|
497
|
+
});
|
|
498
|
+
if (!providerDecisionResult.ok) {
|
|
499
|
+
ok = false;
|
|
500
|
+
pushIssue(errors, {
|
|
501
|
+
code: "reversal_provider_decision_invalid",
|
|
502
|
+
message: "provider refund decision verification failed",
|
|
503
|
+
detail: { eventId, code: providerDecisionResult.code, error: providerDecisionResult.error ?? null }
|
|
504
|
+
});
|
|
505
|
+
}
|
|
506
|
+
if (providerDecisionVerification?.verified !== true) {
|
|
507
|
+
ok = false;
|
|
508
|
+
pushIssue(errors, {
|
|
509
|
+
code: "reversal_provider_decision_verification_status_invalid",
|
|
510
|
+
message: "provider refund decision verification record must indicate verified=true",
|
|
511
|
+
detail: { eventId, verified: providerDecisionVerification?.verified ?? null }
|
|
512
|
+
});
|
|
513
|
+
}
|
|
514
|
+
const recordedPayloadHash = normalizeSha256OrNull(providerDecisionVerification?.payloadHash);
|
|
515
|
+
if (recordedPayloadHash && providerDecisionResult.ok && normalizeSha256OrNull(providerDecisionResult.payloadHash) !== recordedPayloadHash) {
|
|
516
|
+
ok = false;
|
|
517
|
+
pushIssue(errors, {
|
|
518
|
+
code: "reversal_provider_decision_payload_hash_mismatch",
|
|
519
|
+
message: "provider refund decision verification payload hash does not match cryptographic payload hash",
|
|
520
|
+
detail: {
|
|
521
|
+
eventId,
|
|
522
|
+
expected: providerDecisionResult.payloadHash,
|
|
523
|
+
actual: recordedPayloadHash
|
|
524
|
+
}
|
|
525
|
+
});
|
|
526
|
+
}
|
|
527
|
+
}
|
|
528
|
+
}
|
|
529
|
+
}
|
|
530
|
+
|
|
531
|
+
previousEventHash = eventHash ?? previousEventHash;
|
|
532
|
+
}
|
|
533
|
+
pushCheck(checks, { id: "reversal_event_chain", ok, detail: { eventCount: events.length } });
|
|
534
|
+
}
|
|
535
|
+
|
|
536
|
+
export function verifyX402ReceiptRecord({ receipt, strict = false } = {}) {
|
|
537
|
+
if (!isPlainObject(receipt)) throw new TypeError("receipt must be an object");
|
|
538
|
+
if (String(receipt.schemaVersion ?? "") !== "X402ReceiptRecord.v1") {
|
|
539
|
+
throw new TypeError("receipt.schemaVersion must be X402ReceiptRecord.v1");
|
|
540
|
+
}
|
|
541
|
+
const checks = [];
|
|
542
|
+
const warnings = [];
|
|
543
|
+
const errors = [];
|
|
544
|
+
|
|
545
|
+
const bindings = isPlainObject(receipt.bindings) ? receipt.bindings : {};
|
|
546
|
+
const verificationContext = isPlainObject(receipt.verificationContext) ? receipt.verificationContext : {};
|
|
547
|
+
const evidence = parseEvidenceRefMap(receipt.evidenceRefs);
|
|
548
|
+
|
|
549
|
+
const runId = typeof receipt.runId === "string" && receipt.runId.trim() !== "" ? receipt.runId.trim() : null;
|
|
550
|
+
const kernelVerification = verifySettlementKernelArtifacts({
|
|
551
|
+
runId,
|
|
552
|
+
settlement: {
|
|
553
|
+
runId,
|
|
554
|
+
decisionTrace: {
|
|
555
|
+
decisionRecord: isPlainObject(receipt.decisionRecord) ? receipt.decisionRecord : null,
|
|
556
|
+
settlementReceipt: isPlainObject(receipt.settlementReceipt) ? receipt.settlementReceipt : null
|
|
557
|
+
}
|
|
558
|
+
}
|
|
559
|
+
});
|
|
560
|
+
if (!kernelVerification.valid) {
|
|
561
|
+
pushIssue(errors, {
|
|
562
|
+
code: "settlement_kernel_invalid",
|
|
563
|
+
message: "settlement kernel artifacts are invalid",
|
|
564
|
+
detail: { errors: kernelVerification.errors ?? [] }
|
|
565
|
+
});
|
|
566
|
+
}
|
|
567
|
+
pushCheck(checks, { id: "settlement_kernel_artifacts", ok: kernelVerification.valid, detail: { errors: kernelVerification.errors ?? [] } });
|
|
568
|
+
|
|
569
|
+
const settlementReceiptId =
|
|
570
|
+
typeof receipt?.settlementReceipt?.receiptId === "string" && receipt.settlementReceipt.receiptId.trim() !== ""
|
|
571
|
+
? receipt.settlementReceipt.receiptId.trim()
|
|
572
|
+
: null;
|
|
573
|
+
const receiptIdMatches = settlementReceiptId ? settlementReceiptId === String(receipt.receiptId ?? "") : false;
|
|
574
|
+
if (!receiptIdMatches) {
|
|
575
|
+
pushIssue(errors, {
|
|
576
|
+
code: "receipt_id_mismatch",
|
|
577
|
+
message: "top-level receiptId does not match settlementReceipt.receiptId",
|
|
578
|
+
detail: {
|
|
579
|
+
receiptId: receipt.receiptId ?? null,
|
|
580
|
+
settlementReceiptId
|
|
581
|
+
}
|
|
582
|
+
});
|
|
583
|
+
}
|
|
584
|
+
pushCheck(checks, { id: "receipt_id_binding", ok: receiptIdMatches });
|
|
585
|
+
|
|
586
|
+
const bindingRequestSha = normalizeSha256OrNull(bindings?.request?.sha256);
|
|
587
|
+
const bindingResponseSha = normalizeSha256OrNull(bindings?.response?.sha256);
|
|
588
|
+
const requestEvidenceOk = !bindingRequestSha || !evidence.requestSha256 || evidence.requestSha256 === bindingRequestSha;
|
|
589
|
+
const responseEvidenceOk = !bindingResponseSha || !evidence.responseSha256 || evidence.responseSha256 === bindingResponseSha;
|
|
590
|
+
if (!requestEvidenceOk) {
|
|
591
|
+
pushIssue(errors, {
|
|
592
|
+
code: "request_hash_binding_mismatch",
|
|
593
|
+
message: "bindings.request.sha256 does not match evidence reference",
|
|
594
|
+
detail: { expected: bindingRequestSha, actual: evidence.requestSha256 }
|
|
595
|
+
});
|
|
596
|
+
}
|
|
597
|
+
if (!responseEvidenceOk) {
|
|
598
|
+
pushIssue(errors, {
|
|
599
|
+
code: "response_hash_binding_mismatch",
|
|
600
|
+
message: "bindings.response.sha256 does not match evidence reference",
|
|
601
|
+
detail: { expected: bindingResponseSha, actual: evidence.responseSha256 }
|
|
602
|
+
});
|
|
603
|
+
}
|
|
604
|
+
pushCheck(checks, { id: "request_hash_binding", ok: requestEvidenceOk, detail: { binding: bindingRequestSha, evidence: evidence.requestSha256 } });
|
|
605
|
+
pushCheck(checks, {
|
|
606
|
+
id: "response_hash_binding",
|
|
607
|
+
ok: responseEvidenceOk,
|
|
608
|
+
detail: { binding: bindingResponseSha, evidence: evidence.responseSha256 }
|
|
609
|
+
});
|
|
610
|
+
|
|
611
|
+
const providerSigThumbprintBinding = normalizeSha256OrNull(bindings?.providerSig?.keyJwkThumbprintSha256);
|
|
612
|
+
const providerSigThumbprintContext = normalizeSha256OrNull(verificationContext?.providerSigningKey?.jwkThumbprintSha256);
|
|
613
|
+
const providerSigThumbprintOk =
|
|
614
|
+
!providerSigThumbprintBinding || !providerSigThumbprintContext || providerSigThumbprintBinding === providerSigThumbprintContext;
|
|
615
|
+
if (!providerSigThumbprintOk) {
|
|
616
|
+
pushIssue(errors, {
|
|
617
|
+
code: "provider_sig_thumbprint_mismatch",
|
|
618
|
+
message: "bindings.providerSig key thumbprint does not match verificationContext provider key",
|
|
619
|
+
detail: {
|
|
620
|
+
expected: providerSigThumbprintBinding,
|
|
621
|
+
actual: providerSigThumbprintContext
|
|
622
|
+
}
|
|
623
|
+
});
|
|
624
|
+
}
|
|
625
|
+
pushCheck(checks, {
|
|
626
|
+
id: "provider_sig_thumbprint_binding",
|
|
627
|
+
ok: providerSigThumbprintOk,
|
|
628
|
+
detail: { binding: providerSigThumbprintBinding, context: providerSigThumbprintContext }
|
|
629
|
+
});
|
|
630
|
+
|
|
631
|
+
const providerQuoteThumbprintBinding = normalizeSha256OrNull(bindings?.providerQuoteSig?.keyJwkThumbprintSha256);
|
|
632
|
+
const providerQuoteThumbprintContext = normalizeSha256OrNull(verificationContext?.providerQuoteSigningKey?.jwkThumbprintSha256);
|
|
633
|
+
const providerQuoteThumbprintOk =
|
|
634
|
+
!providerQuoteThumbprintBinding || !providerQuoteThumbprintContext || providerQuoteThumbprintBinding === providerQuoteThumbprintContext;
|
|
635
|
+
if (!providerQuoteThumbprintOk) {
|
|
636
|
+
pushIssue(errors, {
|
|
637
|
+
code: "provider_quote_sig_thumbprint_mismatch",
|
|
638
|
+
message: "bindings.providerQuoteSig key thumbprint does not match verificationContext provider quote key",
|
|
639
|
+
detail: {
|
|
640
|
+
expected: providerQuoteThumbprintBinding,
|
|
641
|
+
actual: providerQuoteThumbprintContext
|
|
642
|
+
}
|
|
643
|
+
});
|
|
644
|
+
}
|
|
645
|
+
pushCheck(checks, {
|
|
646
|
+
id: "provider_quote_sig_thumbprint_binding",
|
|
647
|
+
ok: providerQuoteThumbprintOk,
|
|
648
|
+
detail: { binding: providerQuoteThumbprintBinding, context: providerQuoteThumbprintContext }
|
|
649
|
+
});
|
|
650
|
+
|
|
651
|
+
verifyProviderOutputSignature({ receipt, bindings, verificationContext, evidence, checks, warnings, errors });
|
|
652
|
+
verifyProviderQuoteSignature({ receipt, bindings, verificationContext, evidence, checks, warnings, errors });
|
|
653
|
+
verifyReversalEvents({ receipt, checks, errors });
|
|
654
|
+
|
|
655
|
+
const strictMode = strict === true;
|
|
656
|
+
if (strictMode) {
|
|
657
|
+
for (const warning of warnings) {
|
|
658
|
+
pushIssue(errors, {
|
|
659
|
+
code: `strict_${warning.code}`,
|
|
660
|
+
message: warning.message,
|
|
661
|
+
detail: warning.detail ?? null
|
|
662
|
+
});
|
|
663
|
+
}
|
|
664
|
+
}
|
|
665
|
+
|
|
666
|
+
const ok = errors.length === 0;
|
|
667
|
+
const failedChecks = checks.filter((check) => check.ok !== true).length;
|
|
668
|
+
const report = normalizeForCanonicalJson(
|
|
669
|
+
{
|
|
670
|
+
schemaVersion: X402_RECEIPT_VERIFICATION_REPORT_SCHEMA_VERSION,
|
|
671
|
+
ok,
|
|
672
|
+
strict: strictMode,
|
|
673
|
+
receiptId: typeof receipt.receiptId === "string" ? receipt.receiptId : null,
|
|
674
|
+
checks,
|
|
675
|
+
warnings,
|
|
676
|
+
errors,
|
|
677
|
+
summary: {
|
|
678
|
+
totalChecks: checks.length,
|
|
679
|
+
failedChecks,
|
|
680
|
+
warningCount: warnings.length,
|
|
681
|
+
errorCount: errors.length
|
|
682
|
+
}
|
|
683
|
+
},
|
|
684
|
+
{ path: "$" }
|
|
685
|
+
);
|
|
686
|
+
return report;
|
|
687
|
+
}
|
|
688
|
+
|
|
689
|
+
export function formatX402ReceiptVerificationReportText(report) {
|
|
690
|
+
if (!isPlainObject(report)) throw new TypeError("report must be an object");
|
|
691
|
+
const lines = [];
|
|
692
|
+
lines.push(`receiptId: ${report.receiptId ?? "unknown"}`);
|
|
693
|
+
lines.push(`ok: ${report.ok === true ? "true" : "false"}`);
|
|
694
|
+
lines.push(`checks: ${Number(report?.summary?.totalChecks ?? 0) - Number(report?.summary?.failedChecks ?? 0)}/${report?.summary?.totalChecks ?? 0}`);
|
|
695
|
+
if (Array.isArray(report.errors) && report.errors.length > 0) {
|
|
696
|
+
lines.push("errors:");
|
|
697
|
+
for (const issue of report.errors) {
|
|
698
|
+
lines.push(` - ${issue.code}: ${issue.message}`);
|
|
699
|
+
}
|
|
700
|
+
}
|
|
701
|
+
if (Array.isArray(report.warnings) && report.warnings.length > 0) {
|
|
702
|
+
lines.push("warnings:");
|
|
703
|
+
for (const issue of report.warnings) {
|
|
704
|
+
lines.push(` - ${issue.code}: ${issue.message}`);
|
|
705
|
+
}
|
|
706
|
+
}
|
|
707
|
+
return `${lines.join("\n")}\n`;
|
|
708
|
+
}
|