use core::convert::TryInto as _;
use core::fmt::Display;
use core::fmt::Formatter;
use std::collections::HashMap;
use std::convert::Infallible;
use identity_did::DIDJwk;
use identity_verification::jose::jwk::Jwk;
use identity_verification::jose::jws::DecodedJws;
use identity_verification::jose::jws::Decoder;
use identity_verification::jose::jws::JwsVerifier;
use serde::Serialize;
use identity_core::common::Object;
use identity_core::common::OneOrSet;
use identity_core::common::OrderedSet;
use identity_core::common::Url;
use identity_core::convert::FmtJson;
use serde::Serializer;
use crate::document::DocumentBuilder;
use crate::error::Error;
use crate::error::Result;
use crate::service::Service;
use crate::utils::DIDUrlQuery;
use crate::utils::Queryable;
use crate::verifiable::JwsVerificationOptions;
use identity_did::CoreDID;
use identity_did::DIDUrl;
use identity_verification::MethodRef;
use identity_verification::MethodRelationship;
use identity_verification::MethodScope;
use identity_verification::VerificationMethod;
#[derive(Clone, Debug, PartialEq, Eq, Deserialize, Serialize)]
#[rustfmt::skip]
pub(crate) struct CoreDocumentData
{
pub(crate) id: CoreDID,
#[serde(skip_serializing_if = "Option::is_none")]
pub(crate) controller: Option<OneOrSet<CoreDID>>,
#[serde(default = "Default::default", rename = "alsoKnownAs", skip_serializing_if = "OrderedSet::is_empty")]
pub(crate) also_known_as: OrderedSet<Url>,
#[serde(default = "Default::default", rename = "verificationMethod", skip_serializing_if = "OrderedSet::is_empty")]
pub(crate) verification_method: OrderedSet<VerificationMethod>,
#[serde(default = "Default::default", skip_serializing_if = "OrderedSet::is_empty")]
pub(crate) authentication: OrderedSet<MethodRef>,
#[serde(default = "Default::default", rename = "assertionMethod", skip_serializing_if = "OrderedSet::is_empty")]
pub(crate) assertion_method: OrderedSet<MethodRef>,
#[serde(default = "Default::default", rename = "keyAgreement", skip_serializing_if = "OrderedSet::is_empty")]
pub(crate) key_agreement: OrderedSet<MethodRef>,
#[serde(default = "Default::default", rename = "capabilityDelegation", skip_serializing_if = "OrderedSet::is_empty")]
pub(crate) capability_delegation: OrderedSet<MethodRef>,
#[serde(default = "Default::default", rename = "capabilityInvocation", skip_serializing_if = "OrderedSet::is_empty")]
pub(crate) capability_invocation: OrderedSet<MethodRef>,
#[serde(default = "Default::default", skip_serializing_if = "OrderedSet::is_empty")]
pub(crate) service: OrderedSet<Service>,
#[serde(flatten)]
pub(crate) properties: Object,
}
impl CoreDocumentData {
fn check_id_constraints(&self) -> Result<()> {
let max_unique_method_ids = self.verification_method.len()
+ self.authentication.len()
+ self.assertion_method.len()
+ self.key_agreement.len()
+ self.capability_delegation.len()
+ self.capability_invocation.len();
let mut method_identifiers: HashMap<&DIDUrl, bool> = HashMap::with_capacity(max_unique_method_ids);
for (id, is_embedded) in self
.authentication
.iter()
.chain(self.assertion_method.iter())
.chain(self.key_agreement.iter())
.chain(self.capability_delegation.iter())
.chain(self.capability_invocation.iter())
.map(|method_ref| match method_ref {
MethodRef::Embed(_) => (method_ref.id(), true),
MethodRef::Refer(_) => (method_ref.id(), false),
})
{
if let Some(previous) = method_identifiers.insert(id, is_embedded) {
match previous {
true => {
return Err(Error::InvalidDocument(
"attempted to construct document with a duplicated or aliased embedded method",
None,
));
}
false => {
if is_embedded {
return Err(Error::InvalidDocument(
"attempted to construct document with an aliased embedded method",
None,
));
}
}
}
}
}
for method_id in self.verification_method.iter().map(|method| method.id()) {
if method_identifiers
.insert(method_id, false)
.filter(|value| *value)
.is_some()
{
return Err(Error::InvalidDocument(
"attempted to construct document with a duplicated embedded method",
None,
));
}
}
for service_id in self.service.iter().map(|service| service.id()) {
if method_identifiers.contains_key(service_id) {
return Err(Error::InvalidDocument(
"attempted to construct document with a service identifier shared with a verification method",
None,
));
}
}
Ok(())
}
fn try_map<F, G, H, L, E>(
self,
id_map: F,
mut controller_map: G,
mut method_map: H,
mut services_map: L,
) -> Result<Self, E>
where
F: FnOnce(CoreDID) -> std::result::Result<CoreDID, E>,
G: FnMut(CoreDID) -> std::result::Result<CoreDID, E>,
H: FnMut(CoreDID) -> std::result::Result<CoreDID, E>,
L: FnMut(CoreDID) -> std::result::Result<CoreDID, E>,
{
let current_data = self;
let id = id_map(current_data.id)?;
let controller = if let Some(controllers) = current_data.controller {
Some(controllers.try_map(&mut controller_map)?)
} else {
None
};
let verification_method = current_data
.verification_method
.into_iter()
.map(|method| method.try_map(&mut method_map))
.collect::<Result<_, E>>()?;
let authentication = current_data
.authentication
.into_iter()
.map(|method_ref| method_ref.try_map(&mut method_map))
.collect::<Result<_, E>>()?;
let assertion_method = current_data
.assertion_method
.into_iter()
.map(|method_ref| method_ref.try_map(&mut method_map))
.collect::<Result<_, E>>()?;
let key_agreement = current_data
.key_agreement
.into_iter()
.map(|method_ref| method_ref.try_map(&mut method_map))
.collect::<Result<_, E>>()?;
let capability_delegation = current_data
.capability_delegation
.into_iter()
.map(|method_ref| method_ref.try_map(&mut method_map))
.collect::<Result<_, E>>()?;
let capability_invocation = current_data
.capability_invocation
.into_iter()
.map(|method_ref| method_ref.try_map(&mut method_map))
.collect::<Result<_, E>>()?;
let service = current_data
.service
.into_iter()
.map(|service| service.try_map(&mut services_map))
.collect::<Result<_, E>>()?;
Ok(CoreDocumentData {
id,
controller,
also_known_as: current_data.also_known_as,
verification_method,
authentication,
assertion_method,
key_agreement,
capability_delegation,
capability_invocation,
service,
properties: current_data.properties,
})
}
}
#[derive(Clone, Debug, PartialEq, Eq, Deserialize)]
#[rustfmt::skip]
#[serde(try_from = "CoreDocumentData")]
pub struct CoreDocument
{
pub(crate) data: CoreDocumentData,
}
impl Serialize for CoreDocument {
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
where
S: Serializer,
{
self.data.serialize(serializer)
}
}
macro_rules! method_ref_mut_helper {
($doc:ident, $method: ident, $query: ident) => {
match $doc.data.$method.query_mut($query.into())? {
MethodRef::Embed(method) => Some(method),
MethodRef::Refer(ref did) => $doc.data.verification_method.query_mut(did),
}
};
}
impl CoreDocument {
pub fn builder(properties: Object) -> DocumentBuilder {
DocumentBuilder::new(properties)
}
pub fn from_builder(builder: DocumentBuilder) -> Result<Self> {
Self::try_from(CoreDocumentData {
id: builder.id.ok_or(Error::InvalidDocument("missing id", None))?,
controller: Some(builder.controller)
.filter(|controllers| !controllers.is_empty())
.map(TryFrom::try_from)
.transpose()
.map_err(|err| Error::InvalidDocument("controller", Some(err)))?,
also_known_as: builder
.also_known_as
.try_into()
.map_err(|err| Error::InvalidDocument("also_known_as", Some(err)))?,
verification_method: builder
.verification_method
.try_into()
.map_err(|err| Error::InvalidDocument("verification_method", Some(err)))?,
authentication: builder
.authentication
.try_into()
.map_err(|err| Error::InvalidDocument("authentication", Some(err)))?,
assertion_method: builder
.assertion_method
.try_into()
.map_err(|err| Error::InvalidDocument("assertion_method", Some(err)))?,
key_agreement: builder
.key_agreement
.try_into()
.map_err(|err| Error::InvalidDocument("key_agreement", Some(err)))?,
capability_delegation: builder
.capability_delegation
.try_into()
.map_err(|err| Error::InvalidDocument("capability_delegation", Some(err)))?,
capability_invocation: builder
.capability_invocation
.try_into()
.map_err(|err| Error::InvalidDocument("capability_invocation", Some(err)))?,
service: builder
.service
.try_into()
.map_err(|err| Error::InvalidDocument("service", Some(err)))?,
properties: builder.properties,
})
}
pub fn id(&self) -> &CoreDID {
&self.data.id
}
pub fn id_mut_unchecked(&mut self) -> &mut CoreDID {
&mut self.data.id
}
pub fn controller(&self) -> Option<&OneOrSet<CoreDID>> {
self.data.controller.as_ref()
}
pub fn controller_mut(&mut self) -> &mut Option<OneOrSet<CoreDID>> {
&mut self.data.controller
}
pub fn also_known_as(&self) -> &OrderedSet<Url> {
&self.data.also_known_as
}
pub fn also_known_as_mut(&mut self) -> &mut OrderedSet<Url> {
&mut self.data.also_known_as
}
pub fn verification_method(&self) -> &OrderedSet<VerificationMethod> {
&self.data.verification_method
}
pub fn authentication(&self) -> &OrderedSet<MethodRef> {
&self.data.authentication
}
pub fn assertion_method(&self) -> &OrderedSet<MethodRef> {
&self.data.assertion_method
}
pub fn key_agreement(&self) -> &OrderedSet<MethodRef> {
&self.data.key_agreement
}
pub fn capability_delegation(&self) -> &OrderedSet<MethodRef> {
&self.data.capability_delegation
}
pub fn capability_invocation(&self) -> &OrderedSet<MethodRef> {
&self.data.capability_invocation
}
pub fn service(&self) -> &OrderedSet<Service> {
&self.data.service
}
pub fn service_mut_unchecked(&mut self) -> &mut OrderedSet<Service> {
&mut self.data.service
}
pub fn properties(&self) -> &Object {
&self.data.properties
}
pub fn properties_mut_unchecked(&mut self) -> &mut Object {
&mut self.data.properties
}
pub fn insert_method(&mut self, method: VerificationMethod, scope: MethodScope) -> Result<()> {
if self.resolve_method(method.id(), None).is_some() || self.service().query(method.id()).is_some() {
return Err(Error::MethodInsertionError);
}
match scope {
MethodScope::VerificationMethod => self.data.verification_method.append(method),
MethodScope::VerificationRelationship(MethodRelationship::Authentication) => {
self.data.authentication.append(MethodRef::Embed(method))
}
MethodScope::VerificationRelationship(MethodRelationship::AssertionMethod) => {
self.data.assertion_method.append(MethodRef::Embed(method))
}
MethodScope::VerificationRelationship(MethodRelationship::KeyAgreement) => {
self.data.key_agreement.append(MethodRef::Embed(method))
}
MethodScope::VerificationRelationship(MethodRelationship::CapabilityDelegation) => {
self.data.capability_delegation.append(MethodRef::Embed(method))
}
MethodScope::VerificationRelationship(MethodRelationship::CapabilityInvocation) => {
self.data.capability_invocation.append(MethodRef::Embed(method))
}
};
Ok(())
}
pub fn remove_method(&mut self, did_url: &DIDUrl) -> Option<VerificationMethod> {
self.remove_method_and_scope(did_url).map(|(method, _scope)| method)
}
pub fn remove_method_and_scope(&mut self, did_url: &DIDUrl) -> Option<(VerificationMethod, MethodScope)> {
for (method_ref, scope) in [
self.data.authentication.remove(did_url).map(|method_ref| {
(
method_ref,
MethodScope::VerificationRelationship(MethodRelationship::Authentication),
)
}),
self.data.assertion_method.remove(did_url).map(|method_ref| {
(
method_ref,
MethodScope::VerificationRelationship(MethodRelationship::AssertionMethod),
)
}),
self.data.key_agreement.remove(did_url).map(|method_ref| {
(
method_ref,
MethodScope::VerificationRelationship(MethodRelationship::KeyAgreement),
)
}),
self.data.capability_delegation.remove(did_url).map(|method_ref| {
(
method_ref,
MethodScope::VerificationRelationship(MethodRelationship::CapabilityDelegation),
)
}),
self.data.capability_invocation.remove(did_url).map(|method_ref| {
(
method_ref,
MethodScope::VerificationRelationship(MethodRelationship::CapabilityInvocation),
)
}),
]
.into_iter()
.flatten()
{
if let (MethodRef::Embed(embedded_method), scope) = (method_ref, scope) {
return Some((embedded_method, scope));
}
}
self
.data
.verification_method
.remove(did_url)
.map(|method| (method, MethodScope::VerificationMethod))
}
pub fn insert_service(&mut self, service: Service) -> Result<()> {
let service_id = service.id();
let id_exists = self
.verification_relationships()
.map(|method_ref| method_ref.id())
.chain(self.verification_method().iter().map(|method| method.id()))
.any(|id| id == service_id);
((!id_exists) && self.data.service.append(service))
.then_some(())
.ok_or(Error::InvalidServiceInsertion)
}
pub fn remove_service(&mut self, id: &DIDUrl) -> Option<Service> {
self.data.service.remove(id)
}
pub fn attach_method_relationship<'query, Q>(
&mut self,
method_query: Q,
relationship: MethodRelationship,
) -> Result<bool>
where
Q: Into<DIDUrlQuery<'query>>,
{
let method_query: DIDUrlQuery<'query> = method_query.into();
match self.resolve_method(method_query.clone(), Some(MethodScope::VerificationMethod)) {
None => match self.resolve_method(method_query, None) {
Some(_) => Err(Error::InvalidMethodEmbedded),
None => Err(Error::MethodNotFound),
},
Some(method) => {
let method_ref = MethodRef::Refer(method.id().clone());
let was_attached = match relationship {
MethodRelationship::Authentication => self.data.authentication.append(method_ref),
MethodRelationship::AssertionMethod => self.data.assertion_method.append(method_ref),
MethodRelationship::KeyAgreement => self.data.key_agreement.append(method_ref),
MethodRelationship::CapabilityDelegation => self.data.capability_delegation.append(method_ref),
MethodRelationship::CapabilityInvocation => self.data.capability_invocation.append(method_ref),
};
Ok(was_attached)
}
}
}
pub fn detach_method_relationship<'query, Q>(
&mut self,
method_query: Q,
relationship: MethodRelationship,
) -> Result<bool>
where
Q: Into<DIDUrlQuery<'query>>,
{
let method_query: DIDUrlQuery<'query> = method_query.into();
match self.resolve_method(method_query.clone(), Some(MethodScope::VerificationMethod)) {
None => match self.resolve_method(method_query, None) {
Some(_) => Err(Error::InvalidMethodEmbedded),
None => Err(Error::MethodNotFound),
},
Some(method) => {
let did_url: DIDUrl = method.id().clone();
let was_detached = match relationship {
MethodRelationship::Authentication => self.data.authentication.remove(&did_url),
MethodRelationship::AssertionMethod => self.data.assertion_method.remove(&did_url),
MethodRelationship::KeyAgreement => self.data.key_agreement.remove(&did_url),
MethodRelationship::CapabilityDelegation => self.data.capability_delegation.remove(&did_url),
MethodRelationship::CapabilityInvocation => self.data.capability_invocation.remove(&did_url),
};
Ok(was_detached.is_some())
}
}
}
pub fn methods(&self, scope: Option<MethodScope>) -> Vec<&VerificationMethod> {
if let Some(scope) = scope {
match scope {
MethodScope::VerificationMethod => self.verification_method().iter().collect(),
MethodScope::VerificationRelationship(MethodRelationship::AssertionMethod) => self
.assertion_method()
.iter()
.filter_map(|method_ref| self.resolve_method_ref(method_ref))
.collect(),
MethodScope::VerificationRelationship(MethodRelationship::Authentication) => self
.authentication()
.iter()
.filter_map(|method_ref| self.resolve_method_ref(method_ref))
.collect(),
MethodScope::VerificationRelationship(MethodRelationship::CapabilityDelegation) => self
.capability_delegation()
.iter()
.filter_map(|method_ref| self.resolve_method_ref(method_ref))
.collect(),
MethodScope::VerificationRelationship(MethodRelationship::CapabilityInvocation) => self
.capability_invocation()
.iter()
.filter_map(|method_ref| self.resolve_method_ref(method_ref))
.collect(),
MethodScope::VerificationRelationship(MethodRelationship::KeyAgreement) => self
.key_agreement()
.iter()
.filter_map(|method_ref| self.resolve_method_ref(method_ref))
.collect(),
}
} else {
self.all_methods().collect()
}
}
fn all_methods(&self) -> impl Iterator<Item = &VerificationMethod> {
fn __filter_ref(method: &MethodRef) -> Option<&VerificationMethod> {
match method {
MethodRef::Embed(method) => Some(method),
MethodRef::Refer(_) => None,
}
}
self
.data
.verification_method
.iter()
.chain(self.data.authentication.iter().filter_map(__filter_ref))
.chain(self.data.assertion_method.iter().filter_map(__filter_ref))
.chain(self.data.key_agreement.iter().filter_map(__filter_ref))
.chain(self.data.capability_delegation.iter().filter_map(__filter_ref))
.chain(self.data.capability_invocation.iter().filter_map(__filter_ref))
}
pub fn verification_relationships(&self) -> impl Iterator<Item = &MethodRef> {
self
.data
.authentication
.iter()
.chain(self.data.assertion_method.iter())
.chain(self.data.key_agreement.iter())
.chain(self.data.capability_delegation.iter())
.chain(self.data.capability_invocation.iter())
}
pub fn resolve_method<'query, 'me, Q>(
&'me self,
method_query: Q,
scope: Option<MethodScope>,
) -> Option<&'me VerificationMethod>
where
Q: Into<DIDUrlQuery<'query>>,
{
match scope {
Some(scope) => {
let resolve_ref_helper = |method_ref: &'me MethodRef| self.resolve_method_ref(method_ref);
match scope {
MethodScope::VerificationMethod => self.data.verification_method.query(method_query.into()),
MethodScope::VerificationRelationship(MethodRelationship::Authentication) => self
.data
.authentication
.query(method_query.into())
.and_then(resolve_ref_helper),
MethodScope::VerificationRelationship(MethodRelationship::AssertionMethod) => self
.data
.assertion_method
.query(method_query.into())
.and_then(resolve_ref_helper),
MethodScope::VerificationRelationship(MethodRelationship::KeyAgreement) => self
.data
.key_agreement
.query(method_query.into())
.and_then(resolve_ref_helper),
MethodScope::VerificationRelationship(MethodRelationship::CapabilityDelegation) => self
.data
.capability_delegation
.query(method_query.into())
.and_then(resolve_ref_helper),
MethodScope::VerificationRelationship(MethodRelationship::CapabilityInvocation) => self
.data
.capability_invocation
.query(method_query.into())
.and_then(resolve_ref_helper),
}
}
None => self.resolve_method_inner(method_query.into()),
}
}
pub fn resolve_method_mut<'query, 'me, Q>(
&'me mut self,
method_query: Q,
scope: Option<MethodScope>,
) -> Option<&'me mut VerificationMethod>
where
Q: Into<DIDUrlQuery<'query>>,
{
match scope {
Some(scope) => match scope {
MethodScope::VerificationMethod => self.data.verification_method.query_mut(method_query.into()),
MethodScope::VerificationRelationship(MethodRelationship::Authentication) => {
method_ref_mut_helper!(self, authentication, method_query)
}
MethodScope::VerificationRelationship(MethodRelationship::AssertionMethod) => {
method_ref_mut_helper!(self, assertion_method, method_query)
}
MethodScope::VerificationRelationship(MethodRelationship::KeyAgreement) => {
method_ref_mut_helper!(self, key_agreement, method_query)
}
MethodScope::VerificationRelationship(MethodRelationship::CapabilityDelegation) => {
method_ref_mut_helper!(self, capability_delegation, method_query)
}
MethodScope::VerificationRelationship(MethodRelationship::CapabilityInvocation) => {
method_ref_mut_helper!(self, capability_invocation, method_query)
}
},
None => self.resolve_method_mut_inner(method_query.into()),
}
}
pub fn resolve_service<'query, 'me, Q>(&'me self, service_query: Q) -> Option<&'me Service>
where
Q: Into<DIDUrlQuery<'query>>,
{
self.service().query(service_query.into())
}
#[doc(hidden)]
pub fn resolve_method_ref<'a>(&'a self, method_ref: &'a MethodRef) -> Option<&'a VerificationMethod> {
match method_ref {
MethodRef::Embed(method) => Some(method),
MethodRef::Refer(did) => self.data.verification_method.query(did),
}
}
fn resolve_method_inner(&self, query: DIDUrlQuery<'_>) -> Option<&VerificationMethod> {
let mut method: Option<&MethodRef> = None;
if method.is_none() {
method = self.data.authentication.query(query.clone());
}
if method.is_none() {
method = self.data.assertion_method.query(query.clone());
}
if method.is_none() {
method = self.data.key_agreement.query(query.clone());
}
if method.is_none() {
method = self.data.capability_delegation.query(query.clone());
}
if method.is_none() {
method = self.data.capability_invocation.query(query.clone());
}
match method {
Some(MethodRef::Embed(method)) => Some(method),
Some(MethodRef::Refer(did)) => self.data.verification_method.query(&did.to_string()),
None => self.data.verification_method.query(query),
}
}
fn resolve_method_mut_inner(&mut self, query: DIDUrlQuery<'_>) -> Option<&mut VerificationMethod> {
let mut method: Option<&mut MethodRef> = None;
if method.is_none() {
method = self.data.authentication.query_mut(query.clone());
}
if method.is_none() {
method = self.data.assertion_method.query_mut(query.clone());
}
if method.is_none() {
method = self.data.key_agreement.query_mut(query.clone());
}
if method.is_none() {
method = self.data.capability_delegation.query_mut(query.clone());
}
if method.is_none() {
method = self.data.capability_invocation.query_mut(query.clone());
}
match method {
Some(MethodRef::Embed(method)) => Some(method),
Some(MethodRef::Refer(did)) => self.data.verification_method.query_mut(&did.to_string()),
None => self.data.verification_method.query_mut(query),
}
}
pub fn try_map<F, G, H, L, M, E>(
self,
id_update: F,
controller_update: G,
methods_update: H,
service_update: L,
error_cast: M,
) -> Result<Self, E>
where
F: FnOnce(CoreDID) -> std::result::Result<CoreDID, E>,
G: FnMut(CoreDID) -> std::result::Result<CoreDID, E>,
H: FnMut(CoreDID) -> std::result::Result<CoreDID, E>,
L: FnMut(CoreDID) -> std::result::Result<CoreDID, E>,
M: FnOnce(crate::Error) -> E,
{
let data = self
.data
.try_map(id_update, controller_update, methods_update, service_update)?;
CoreDocument::try_from(data).map_err(error_cast)
}
pub fn map_unchecked<F, G, H, L>(
self,
id_update: F,
mut controller_update: G,
mut methods_update: H,
mut service_update: L,
) -> Self
where
F: FnOnce(CoreDID) -> CoreDID,
G: FnMut(CoreDID) -> CoreDID,
H: FnMut(CoreDID) -> CoreDID,
L: FnMut(CoreDID) -> CoreDID,
{
type InfallibleCoreDIDResult = std::result::Result<CoreDID, Infallible>;
let id_map = |did: CoreDID| -> InfallibleCoreDIDResult { Ok(id_update(did)) };
let controller_map = |did: CoreDID| -> InfallibleCoreDIDResult { Ok(controller_update(did)) };
let method_map = |did: CoreDID| -> InfallibleCoreDIDResult { Ok(methods_update(did)) };
let services_map = |did: CoreDID| -> InfallibleCoreDIDResult { Ok(service_update(did)) };
let data = self
.data
.try_map(id_map, controller_map, method_map, services_map)
.expect("unwrapping infallible should be fine");
CoreDocument { data }
}
}
impl AsRef<CoreDocument> for CoreDocument {
fn as_ref(&self) -> &CoreDocument {
self
}
}
impl TryFrom<CoreDocumentData> for CoreDocument {
type Error = crate::error::Error;
fn try_from(value: CoreDocumentData) -> Result<Self, Self::Error> {
match value.check_id_constraints() {
Ok(_) => Ok(Self { data: value }),
Err(err) => Err(err),
}
}
}
impl Display for CoreDocument {
fn fmt(&self, f: &mut Formatter<'_>) -> core::fmt::Result {
self.fmt_json(f)
}
}
impl CoreDocument {
pub fn verify_jws<'jws, T: JwsVerifier>(
&self,
jws: &'jws str,
detached_payload: Option<&'jws [u8]>,
signature_verifier: &T,
options: &JwsVerificationOptions,
) -> Result<DecodedJws<'jws>> {
let validation_item = Decoder::new()
.decode_compact_serialization(jws.as_bytes(), detached_payload)
.map_err(Error::JwsVerificationError)?;
let nonce: Option<&str> = options.nonce.as_deref();
if validation_item.nonce() != nonce {
return Err(Error::JwsVerificationError(
identity_verification::jose::error::Error::InvalidParam("invalid nonce value"),
));
}
let method_url_query: DIDUrlQuery<'_> = match &options.method_id {
Some(method_id) => method_id.into(),
None => validation_item
.kid()
.ok_or(Error::JwsVerificationError(
identity_verification::jose::error::Error::InvalidParam("missing kid value"),
))?
.into(),
};
let public_key: &Jwk = self
.resolve_method(method_url_query, options.method_scope)
.ok_or(Error::MethodNotFound)?
.data()
.try_public_key_jwk()
.map_err(Error::InvalidKeyMaterial)?;
validation_item
.verify(signature_verifier, public_key)
.map_err(Error::JwsVerificationError)
}
}
impl CoreDocument {
pub fn expand_did_jwk(did_jwk: DIDJwk) -> Result<Self, Error> {
let verification_method = VerificationMethod::try_from(did_jwk.clone()).map_err(Error::InvalidKeyMaterial)?;
let verification_method_id = verification_method.id().clone();
DocumentBuilder::default()
.id(did_jwk.into())
.verification_method(verification_method)
.assertion_method(verification_method_id.clone())
.authentication(verification_method_id.clone())
.capability_invocation(verification_method_id.clone())
.capability_delegation(verification_method_id.clone())
.build()
}
}
#[cfg(test)]
mod tests {
use identity_core::convert::FromJson;
use identity_core::convert::ToJson;
use identity_did::DID;
use identity_verification::MethodType;
use crate::service::ServiceBuilder;
use identity_verification::MethodBuilder;
use identity_verification::MethodData;
use super::*;
fn controller() -> CoreDID {
"did:example:1234".parse().unwrap()
}
fn method(controller: &CoreDID, fragment: &str) -> VerificationMethod {
VerificationMethod::builder(Default::default())
.id(controller.to_url().join(fragment).unwrap())
.controller(controller.clone())
.type_(MethodType::ED25519_VERIFICATION_KEY_2018)
.data(MethodData::new_multibase(fragment.as_bytes()))
.build()
.unwrap()
}
fn document() -> CoreDocument {
let controller: CoreDID = controller();
CoreDocument::builder(Default::default())
.id(controller.clone())
.verification_method(method(&controller, "#key-1"))
.verification_method(method(&controller, "#key-2"))
.verification_method(method(&controller, "#key-3"))
.authentication(method(&controller, "#auth-key"))
.authentication(controller.to_url().join("#key-3").unwrap())
.key_agreement(controller.to_url().join("#key-4").unwrap())
.build()
.unwrap()
}
#[test]
fn test_controller() {
{
let mut document: CoreDocument = document();
let expected: CoreDID = CoreDID::parse("did:example:one1234").unwrap();
*document.controller_mut() = Some(OneOrSet::new_one(expected.clone()));
assert_eq!(document.controller().unwrap().as_slice(), &[expected]);
*document.controller_mut() = None;
assert!(document.controller().is_none());
}
{
let mut document: CoreDocument = document();
let expected_controllers: Vec<CoreDID> = vec![
CoreDID::parse("did:example:many1234").unwrap(),
CoreDID::parse("did:example:many4567").unwrap(),
CoreDID::parse("did:example:many8910").unwrap(),
];
*document.controller_mut() = Some(expected_controllers.clone().try_into().unwrap());
assert_eq!(document.controller().unwrap().as_slice(), &expected_controllers);
*document.controller_mut() = None;
assert!(document.controller().is_none());
}
}
#[rustfmt::skip]
#[test]
fn test_resolve_method() {
let document: CoreDocument = document();
assert_eq!(document.resolve_method("#key-1", None).unwrap().id().to_string(), "did:example:1234#key-1");
assert_eq!(document.resolve_method("#key-2", None).unwrap().id().to_string(), "did:example:1234#key-2");
assert_eq!(document.resolve_method("#key-3", None).unwrap().id().to_string(), "did:example:1234#key-3");
assert_eq!(document.resolve_method("key-1", None).unwrap().id().to_string(), "did:example:1234#key-1");
assert_eq!(document.resolve_method("key-2", None).unwrap().id().to_string(), "did:example:1234#key-2");
assert_eq!(document.resolve_method("key-3", None).unwrap().id().to_string(), "did:example:1234#key-3");
assert_eq!(document.resolve_method("did:example:1234#key-1", None).unwrap().id().to_string(), "did:example:1234#key-1");
assert_eq!(document.resolve_method("did:example:1234#key-2", None).unwrap().id().to_string(), "did:example:1234#key-2");
assert_eq!(document.resolve_method("did:example:1234#key-3", None).unwrap().id().to_string(), "did:example:1234#key-3");
assert_eq!(
document.resolve_method("#key-1", Some(MethodScope::VerificationMethod)).unwrap().id().to_string(), "did:example:1234#key-1"
);
}
#[rustfmt::skip]
#[test]
fn test_resolve_method_mut() {
let mut document: CoreDocument = document();
assert_eq!(document.resolve_method_mut("#key-1", None).unwrap().id().to_string(), "did:example:1234#key-1");
assert_eq!(document.resolve_method_mut("#key-3", None).unwrap().id().to_string(), "did:example:1234#key-3");
assert_eq!(document.resolve_method_mut("#key-2", None).unwrap().id().to_string(), "did:example:1234#key-2");
assert_eq!(document.resolve_method_mut("key-1", None).unwrap().id().to_string(), "did:example:1234#key-1");
assert_eq!(document.resolve_method_mut("key-2", None).unwrap().id().to_string(), "did:example:1234#key-2");
assert_eq!(document.resolve_method_mut("key-3", None).unwrap().id().to_string(), "did:example:1234#key-3");
assert_eq!(document.resolve_method_mut("did:example:1234#key-1", None).unwrap().id().to_string(), "did:example:1234#key-1");
assert_eq!(document.resolve_method_mut("did:example:1234#key-2", None).unwrap().id().to_string(), "did:example:1234#key-2");
assert_eq!(document.resolve_method_mut("did:example:1234#key-3", None).unwrap().id().to_string(), "did:example:1234#key-3");
assert_eq!(
document.resolve_method_mut("#key-1", Some(MethodScope::VerificationMethod)).unwrap().id().to_string(), "did:example:1234#key-1"
);
}
#[test]
fn test_resolve_method_fails() {
let document: CoreDocument = document();
assert_eq!(document.resolve_method("#key-4", None), None);
assert_eq!(document.resolve_method("did:example:1234", None), None);
assert_eq!(document.resolve_method("", None), None);
assert_eq!(
document.resolve_method("#key-1", Some(MethodScope::key_agreement())),
None
);
}
#[test]
fn test_resolve_method_mut_fails() {
let mut document: CoreDocument = document();
assert_eq!(document.resolve_method_mut("#key-4", None), None);
assert_eq!(document.resolve_method_mut("did:example:1234", None), None);
assert_eq!(document.resolve_method_mut("", None), None);
assert_eq!(
document.resolve_method_mut("#key-1", Some(MethodScope::key_agreement())),
None
);
}
#[rustfmt::skip]
#[test]
fn test_methods_index() {
let document: CoreDocument = document();
assert_eq!(document.methods(None).first().unwrap().id().to_string(), "did:example:1234#key-1");
assert_eq!(document.methods(None).get(2).unwrap().id().to_string(), "did:example:1234#key-3");
}
#[test]
fn test_methods_scope() {
let document: CoreDocument = document();
let verification_methods: Vec<&VerificationMethod> = document.methods(Some(MethodScope::VerificationMethod));
assert_eq!(
verification_methods.first().unwrap().id().to_string(),
"did:example:1234#key-1"
);
assert_eq!(
verification_methods.get(1).unwrap().id().to_string(),
"did:example:1234#key-2"
);
assert_eq!(
verification_methods.get(2).unwrap().id().to_string(),
"did:example:1234#key-3"
);
assert_eq!(verification_methods.len(), 3);
let authentication: Vec<&VerificationMethod> = document.methods(Some(MethodScope::authentication()));
assert_eq!(
authentication.first().unwrap().id().to_string(),
"did:example:1234#auth-key"
);
assert_eq!(
authentication.get(1).unwrap().id().to_string(),
"did:example:1234#key-3"
);
assert_eq!(authentication.len(), 2);
}
#[test]
fn test_attach_verification_relationships() {
let mut document: CoreDocument = document();
let fragment = "#attach-test";
let method = method(document.id(), fragment);
document.insert_method(method, MethodScope::VerificationMethod).unwrap();
assert!(document
.attach_method_relationship(
document.id().to_url().join(fragment).unwrap(),
MethodRelationship::CapabilityDelegation,
)
.unwrap());
assert_eq!(document.verification_relationships().count(), 4);
assert!(!document
.attach_method_relationship(
document.id().to_url().join(fragment).unwrap(),
MethodRelationship::CapabilityDelegation,
)
.unwrap());
assert_eq!(document.verification_relationships().count(), 4);
assert!(document
.attach_method_relationship(
document.id().to_url().join("#doesNotExist").unwrap(),
MethodRelationship::CapabilityDelegation,
)
.is_err());
assert!(document
.attach_method_relationship(
document.id().to_url().join("#auth-key").unwrap(),
MethodRelationship::CapabilityDelegation,
)
.is_err());
}
#[test]
fn test_detach_verification_relationships() {
let mut document: CoreDocument = document();
let fragment = "#detach-test";
let method = method(document.id(), fragment);
document.insert_method(method, MethodScope::VerificationMethod).unwrap();
assert!(document
.attach_method_relationship(
document.id().to_url().join(fragment).unwrap(),
MethodRelationship::AssertionMethod,
)
.is_ok());
assert!(document
.detach_method_relationship(
document.id().to_url().join(fragment).unwrap(),
MethodRelationship::AssertionMethod,
)
.unwrap());
assert_eq!(document.verification_relationships().count(), 3);
assert!(!document
.detach_method_relationship(
document.id().to_url().join(fragment).unwrap(),
MethodRelationship::AssertionMethod,
)
.unwrap());
assert_eq!(document.verification_relationships().count(), 3);
assert!(document
.detach_method_relationship(
document.id().to_url().join("#doesNotExist").unwrap(),
MethodRelationship::AssertionMethod,
)
.is_err());
}
#[test]
fn test_method_insert_duplication() {
let mut document: CoreDocument = document();
let fragment = "#duplication-test";
let method1 = method(document.id(), fragment);
assert!(document
.insert_method(method1.clone(), MethodScope::VerificationMethod)
.is_ok());
assert!(document
.insert_method(method1.clone(), MethodScope::VerificationMethod)
.is_err());
assert!(document
.insert_method(method1.clone(), MethodScope::authentication())
.is_err());
let fragment = "#duplication-test-2";
let method2 = method(document.id(), fragment);
assert!(document.insert_method(method2, MethodScope::assertion_method()).is_ok());
assert!(document
.insert_method(method1.clone(), MethodScope::VerificationMethod)
.is_err());
assert!(document
.insert_method(method1, MethodScope::capability_delegation())
.is_err());
}
#[test]
fn test_method_remove_existence() {
let mut document: CoreDocument = document();
let fragment = "#existence-test";
let method1 = method(document.id(), fragment);
assert!(document
.insert_method(method1.clone(), MethodScope::VerificationMethod)
.is_ok());
assert_eq!(method1, document.remove_method(method1.id()).unwrap());
assert!(document.remove_method(method1.id()).is_none());
let fragment = "#existence-test-2";
let method2 = method(document.id(), fragment);
assert!(document.insert_method(method2, MethodScope::assertion_method()).is_ok());
assert!(document.remove_method(method1.id()).is_none());
assert!(document.remove_method(method1.id()).is_none());
let fragment = "#removal-test-3";
let method3 = method(document.id(), fragment);
assert!(document
.insert_method(method3.clone(), MethodScope::VerificationMethod)
.is_ok());
assert!(document
.attach_method_relationship(fragment, MethodRelationship::CapabilityDelegation)
.is_ok());
assert_eq!(method3, document.remove_method(method3.id()).unwrap());
assert!(document.capability_delegation().query(method3.id()).is_none());
assert!(document.verification_method().query(method3.id()).is_none());
}
#[test]
fn test_service_updates() {
let mut document = document();
let service_id = document.id().to_url().join("#service-update-test").unwrap();
let service_type = "test";
let service_endpoint = Url::parse("https://example.com").unwrap();
let service: Service = ServiceBuilder::default()
.id(service_id)
.type_(service_type)
.service_endpoint(service_endpoint)
.build()
.unwrap();
assert!(document.insert_service(service.clone()).is_ok());
let mut service_clone = service.clone();
*service_clone.service_endpoint_mut() = Url::parse("https://other-example.com").unwrap().into();
assert!(document.insert_service(service_clone).is_err());
assert_eq!(service, document.remove_service(service.id()).unwrap());
assert!(document.insert_service(service.clone()).is_ok());
let method: VerificationMethod = MethodBuilder::default()
.type_(MethodType::ED25519_VERIFICATION_KEY_2018)
.data(MethodData::PublicKeyBase58(
"3M5RCDjPTWPkKSN3sxUmmMqHbmRPegYP1tjcKyrDbt9J".into(),
))
.id(service.id().clone())
.controller(document.id().clone())
.build()
.unwrap();
let method_scopes = [
MethodScope::VerificationMethod,
MethodScope::assertion_method(),
MethodScope::authentication(),
MethodScope::key_agreement(),
MethodScope::capability_delegation(),
MethodScope::capability_invocation(),
];
for scope in method_scopes {
let mut document_clone = document.clone();
assert!(document_clone.insert_method(method.clone(), scope).is_err());
assert!(document_clone.remove_service(service.id()).is_some());
assert!(document_clone.insert_method(method.clone(), scope).is_ok());
}
for scope in method_scopes {
let mut doc_clone = document.clone();
let valid_method_id = document.id().to_url().join("#valid-method-identifier").unwrap();
let mut valid_method = method.clone();
valid_method.set_id(valid_method_id.clone()).unwrap();
assert!(doc_clone.insert_method(valid_method.clone(), scope).is_ok());
let mut service_clone = service.clone();
service_clone.set_id(valid_method_id).unwrap();
assert!(doc_clone.insert_service(service_clone.clone()).is_err());
assert!(doc_clone.remove_method(valid_method.id()).is_some());
assert!(doc_clone.insert_service(service_clone).is_ok());
}
assert!(document
.remove_service(&service.id().join("#service-does-not-exist").unwrap())
.is_none());
}
#[test]
fn serialize_deserialize_roundtrip() {
let document: CoreDocument = document();
let doc_json: String = document.to_json().unwrap();
let doc_json_value: serde_json::Value = document.to_json_value().unwrap();
let doc_json_vec: Vec<u8> = document.to_json_vec().unwrap();
assert_eq!(document, CoreDocument::from_json(&doc_json).unwrap());
assert_eq!(document, CoreDocument::from_json_value(doc_json_value).unwrap());
assert_eq!(document, CoreDocument::from_json_slice(&doc_json_vec).unwrap());
}
#[test]
fn deserialize_valid() {
const JSON_DOCUMENT: &str = r#"{
"@context": [
"https://www.w3.org/ns/did/v1",
"https://w3id.org/security/suites/ed25519-2020/v1"
],
"id": "did:example:123",
"authentication": [
{
"id": "did:example:123#z6MkecaLyHuYWkayBDLw5ihndj3T1m6zKTGqau3A51G7RBf3",
"type": "Ed25519VerificationKey2018",
"controller": "did:example:123",
"publicKeyMultibase": "zAKJP3f7BD6W4iWEQ9jwndVTCBq8ua2Utt8EEjJ6Vxsf"
}
],
"capabilityInvocation": [
{
"id": "did:example:123#z6MkhdmzFu659ZJ4XKj31vtEDmjvsi5yDZG5L7Caz63oP39k",
"type": "Ed25519VerificationKey2018",
"controller": "did:example:123",
"publicKeyMultibase": "z4BWwfeqdp1obQptLLMvPNgBw48p7og1ie6Hf9p5nTpNN"
}
],
"capabilityDelegation": [
{
"id": "did:example:123#z6Mkw94ByR26zMSkNdCUi6FNRsWnc2DFEeDXyBGJ5KTzSWyi",
"type": "Ed25519VerificationKey2018",
"controller": "did:example:123",
"publicKeyMultibase": "zHgo9PAmfeoxHG8Mn2XHXamxnnSwPpkyBHAMNF3VyXJCL"
}
],
"assertionMethod": [
{
"id": "did:example:123#z6MkiukuAuQAE8ozxvmahnQGzApvtW7KT5XXKfojjwbdEomY",
"type": "Ed25519VerificationKey2018",
"controller": "did:example:123",
"publicKeyMultibase": "z5TVraf9itbKXrRvt2DSS95Gw4vqU3CHAdetoufdcKazA"
}
]
}"#;
let doc: std::result::Result<CoreDocument, Box<dyn std::error::Error>> =
CoreDocument::from_json(JSON_DOCUMENT).map_err(Into::into);
dbg!(&doc);
assert!(doc.is_ok());
}
#[test]
fn deserialize_duplicate_method_different_scopes() {
const JSON_VERIFICATION_METHOD_KEY_AGREEMENT: &str = r#"{
"id": "did:example:1234",
"verificationMethod": [
{
"id": "did:example:1234#key1",
"controller": "did:example:1234",
"type": "Ed25519VerificationKey2018",
"publicKeyBase58": "3M5RCDjPTWPkKSN3sxUmmMqHbmRPegYP1tjcKyrDbt9J"
}
],
"keyAgreement": [
{
"id": "did:example:1234#key1",
"controller": "did:example:1234",
"type": "X25519KeyAgreementKey2019",
"publicKeyBase58": "FbQWLPRhTH95MCkQUeFYdiSoQt8zMwetqfWoxqPgaq7x"
}
]
}"#;
const JSON_KEY_AGREEMENT_CAPABILITY_INVOCATION: &str = r#"{
"id": "did:example:1234",
"capabilityInvocation": [
{
"id": "did:example:1234#key1",
"controller": "did:example:1234",
"type": "Ed25519VerificationKey2018",
"publicKeyBase58": "3M5RCDjPTWPkKSN3sxUmmMqHbmRPegYP1tjcKyrDbt9J"
}
],
"keyAgreement": [
{
"id": "did:example:1234#key1",
"controller": "did:example:1234",
"type": "X25519KeyAgreementKey2019",
"publicKeyBase58": "FbQWLPRhTH95MCkQUeFYdiSoQt8zMwetqfWoxqPgaq7x"
}
]
}"#;
const JSON_ASSERTION_METHOD_CAPABILITY_INVOCATION: &str = r#"{
"id": "did:example:1234",
"assertionMethod": [
{
"id": "did:example:1234#key1",
"controller": "did:example:1234",
"type": "Ed25519VerificationKey2018",
"publicKeyBase58": "H3C2AVvLMv6gmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV"
}
],
"capabilityInvocation": [
{
"id": "did:example:1234#key1",
"controller": "did:example:1234",
"type": "Ed25519VerificationKey2018",
"publicKeyBase58": "3M5RCDjPTWPkKSN3sxUmmMqHbmRPegYP1tjcKyrDbt9J"
}
]
}"#;
const JSON_VERIFICATION_METHOD_AUTHENTICATION: &str = r#"{
"id": "did:example:1234",
"verificationMethod": [
{
"id": "did:example:1234#key1",
"controller": "did:example:1234",
"type": "Ed25519VerificationKey2018",
"publicKeyBase58": "3M5RCDjPTWPkKSN3sxUmmMqHbmRPegYP1tjcKyrDbt9J"
}
],
"authentication": [
{
"id": "did:example:1234#key1",
"controller": "did:example:1234",
"type": "Ed25519VerificationKey2018",
"publicKeyBase58": "H3C2AVvLMv6gmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV"
}
]
}"#;
const JSON_CAPABILITY_DELEGATION_ASSERTION_METHOD: &str = r#"{
"id": "did:example:1234",
"capabilityDelegation": [
{
"id": "did:example:1234#key1",
"controller": "did:example:1234",
"type": "Ed25519VerificationKey2018",
"publicKeyBase58": "3M5RCDjPTWPkKSN3sxUmmMqHbmRPegYP1tjcKyrDbt9J"
}
],
"assertionMethod": [
{
"id": "did:example:1234#key1",
"controller": "did:example:1234",
"type": "Ed25519VerificationKey2018",
"publicKeyBase58": "H3C2AVvLMv6gmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV"
}
]
}"#;
let verifier = |json: &str| {
let result: std::result::Result<CoreDocument, Box<dyn std::error::Error>> =
CoreDocument::from_json(json).map_err(Into::into);
println!("the following non-spec compliant document was deserialized: \n {json}");
assert!(result.is_err());
};
for json in [
JSON_VERIFICATION_METHOD_KEY_AGREEMENT,
JSON_KEY_AGREEMENT_CAPABILITY_INVOCATION,
JSON_ASSERTION_METHOD_CAPABILITY_INVOCATION,
JSON_VERIFICATION_METHOD_AUTHENTICATION,
JSON_CAPABILITY_DELEGATION_ASSERTION_METHOD,
] {
verifier(json);
}
}
#[test]
fn deserialize_invalid_id_references() {
const JSON_KEY_AGREEMENT_CAPABILITY_INVOCATION: &str = r#"{
"id": "did:example:1234",
"capabilityInvocation": [
"did:example:1234#key1"
],
"keyAgreement": [
{
"id": "did:example:1234#key1",
"controller": "did:example:1234",
"type": "X25519KeyAgreementKey2019",
"publicKeyBase58": "FbQWLPRhTH95MCkQUeFYdiSoQt8zMwetqfWoxqPgaq7x"
}
]
}"#;
const JSON_ASSERTION_METHOD_CAPABILITY_INVOCATION: &str = r#"{
"id": "did:example:1234",
"assertionMethod": [
"did:example:1234#key1",
{
"id": "did:example:1234#key2",
"controller": "did:example:1234",
"type": "Ed25519VerificationKey2018",
"publicKeyBase58": "H3C2AVvLMv6gmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV"
}
],
"capabilityInvocation": [
{
"id": "did:example:1234#key1",
"controller": "did:example:1234",
"type": "Ed25519VerificationKey2018",
"publicKeyBase58": "3M5RCDjPTWPkKSN3sxUmmMqHbmRPegYP1tjcKyrDbt9J"
}
]
}"#;
const JSON_AUTHENTICATION_KEY_AGREEMENT: &str = r#"{
"id": "did:example:1234",
"keyAgreement": [
"did:example:1234#key1"
],
"authentication": [
{
"id": "did:example:1234#key1",
"controller": "did:example:1234",
"type": "Ed25519VerificationKey2018",
"publicKeyMultibase": "zH3C2AVvLMv6gmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV"
}
]
}"#;
const JSON_CAPABILITY_DELEGATION_ASSERTION_METHOD: &str = r#"{
"id": "did:example:1234",
"capabilityDelegation": [
"did:example:1234#key1"
],
"assertionMethod": [
{
"id": "did:example:1234#key1",
"controller": "did:example:1234",
"type": "X25519KeyAgreementKey2019",
"publicKeyBase58": "FbQWLPRhTH95MCkQUeFYdiSoQt8zMwetqfWoxqPgaq7x"
}
]
}"#;
let verifier = |json: &str| {
let result: std::result::Result<CoreDocument, Box<dyn std::error::Error>> =
CoreDocument::from_json(json).map_err(Into::into);
println!("the following non-spec compliant document was deserialized: \n {json}");
assert!(result.is_err());
};
for json in [
JSON_KEY_AGREEMENT_CAPABILITY_INVOCATION,
JSON_ASSERTION_METHOD_CAPABILITY_INVOCATION,
JSON_AUTHENTICATION_KEY_AGREEMENT,
JSON_CAPABILITY_DELEGATION_ASSERTION_METHOD,
] {
verifier(json);
}
}
#[test]
fn test_did_jwk_expansion() {
let did_jwk = "did:jwk:eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ1c2UiOiJlbmMiLCJ4IjoiM3A3YmZYdDl3YlRUVzJIQzdPUTFOei1EUThoYmVHZE5yZngtRkctSUswOCJ9"
.parse::<DIDJwk>()
.unwrap();
let target_doc = serde_json::from_value(serde_json::json!({
"id": "did:jwk:eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ1c2UiOiJlbmMiLCJ4IjoiM3A3YmZYdDl3YlRUVzJIQzdPUTFOei1EUThoYmVHZE5yZngtRkctSUswOCJ9",
"verificationMethod": [
{
"id": "did:jwk:eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ1c2UiOiJlbmMiLCJ4IjoiM3A3YmZYdDl3YlRUVzJIQzdPUTFOei1EUThoYmVHZE5yZngtRkctSUswOCJ9#0",
"type": "JsonWebKey2020",
"controller": "did:jwk:eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ1c2UiOiJlbmMiLCJ4IjoiM3A3YmZYdDl3YlRUVzJIQzdPUTFOei1EUThoYmVHZE5yZngtRkctSUswOCJ9",
"publicKeyJwk": {
"kty":"OKP",
"crv":"X25519",
"use":"enc",
"x":"3p7bfXt9wbTTW2HC7OQ1Nz-DQ8hbeGdNrfx-FG-IK08"
}
}
],
"assertionMethod": ["did:jwk:eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ1c2UiOiJlbmMiLCJ4IjoiM3A3YmZYdDl3YlRUVzJIQzdPUTFOei1EUThoYmVHZE5yZngtRkctSUswOCJ9#0"],
"authentication": ["did:jwk:eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ1c2UiOiJlbmMiLCJ4IjoiM3A3YmZYdDl3YlRUVzJIQzdPUTFOei1EUThoYmVHZE5yZngtRkctSUswOCJ9#0"],
"capabilityInvocation": ["did:jwk:eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ1c2UiOiJlbmMiLCJ4IjoiM3A3YmZYdDl3YlRUVzJIQzdPUTFOei1EUThoYmVHZE5yZngtRkctSUswOCJ9#0"],
"capabilityDelegation": ["did:jwk:eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ1c2UiOiJlbmMiLCJ4IjoiM3A3YmZYdDl3YlRUVzJIQzdPUTFOei1EUThoYmVHZE5yZngtRkctSUswOCJ9#0"]
})).unwrap();
assert_eq!(CoreDocument::expand_did_jwk(did_jwk).unwrap(), target_doc);
}
}