atproto-record#
A Rust library for AT Protocol record signature operations, providing cryptographic signing and verification capabilities for AT Protocol records.
Overview#
This crate provides functionality for:
- Record Signing: Create cryptographic signatures for AT Protocol records
- Signature Verification: Verify existing signatures against records and public keys
- Error Handling: Structured error types for signature operations
- Multi-curve Support: Support for P-256 and K-256 elliptic curves via
atproto-identity
Features#
- Create signatures for AT Protocol records with proper
$sigobject handling - Required signature object validation (must include
issuerandissued_atfields) - Verify record signatures against issuer public keys
- IPLD DAG-CBOR serialization for consistent signature generation
- Multibase encoding for signature representation
- Integration with
atproto-identityfor cryptographic key operations - Repository and collection context support in signature objects
- Comprehensive error handling with structured error types including creation and verification errors
Usage#
Creating Signatures#
use atproto_record::signature;
use atproto_identity::key::{identify_key, KeyType};
use serde_json::json;
use atproto_record::errors::VerificationError;
# async fn example() -> Result<(), VerificationError> {
// Prepare key data
let key_data = identify_key("did:key:example...").map_err(|e| {
VerificationError::KeyOperationFailed(e)
})?;
// Create a record to sign
let record = json!({
"$type": "app.bsky.feed.post",
"text": "Hello AT Protocol!",
"createdAt": "2024-01-01T00:00:00Z"
});
// Create signature object with required fields
let signature_object = json!({
"issuer": "did:plc:signer123",
"issued_at": "2024-01-01T00:00:00Z"
});
// Create signature
let signed_record = signature::create(
&key_data,
&record,
"did:plc:user123",
"app.bsky.feed.post",
signature_object
).await?;
# Ok(())
# }
Verifying Signatures#
use atproto_record::signature;
use atproto_identity::key::identify_key;
use atproto_record::errors::VerificationError;
# async fn example() -> Result<(), VerificationError> {
// Get the issuer's public key
let issuer_key = identify_key("did:key:issuer...").map_err(|e| {
VerificationError::KeyOperationFailed(e)
})?;
// Verify the signature
signature::verify(
"did:plc:issuer123",
&issuer_key,
signed_record,
"did:plc:user123",
"app.bsky.feed.post"
).await?;
# Ok(())
# }
Command Line Tools#
The crate includes two command-line tools for AT Protocol record signature operations:
atproto-record-sign#
Creates cryptographic signatures for AT Protocol records with proper $sig object handling and embedded signature metadata. This tool reads JSON records, applies cryptographic signatures using DID keys, and outputs signed records ready for AT Protocol repository storage.
Features:
- Flexible Input: Reads records from files or stdin
- DID Key Support: Works with both P-256 and K-256 cryptographic keys
- Signature Object Creation: Automatically creates required signature metadata with issuer and timestamp
- Repository Context: Includes repository and collection context in signatures
- IPLD Serialization: Uses DAG-CBOR serialization for consistent signature generation
- Multibase Encoding: Outputs signatures in multibase format for AT Protocol compatibility
# Sign a record from a file with all required parameters
cargo run --bin atproto-record-sign did:key:zQ3sh... did:plc:issuer123 record.json repository=did:plc:user123 collection=app.bsky.feed.post
# Sign a record from stdin
echo '{"$type":"app.bsky.feed.post","text":"Hello AT Protocol!"}' | \
cargo run --bin atproto-record-sign did:key:zQ3sh... did:plc:issuer123 -- \
repository=did:plc:user123 collection=app.bsky.feed.post
# Example output: JSON record with embedded signatures array
Arguments:
<signing_key>- DID key string for signing (did🔑...)<issuer_did>- DID of the signing entity<record_file>- JSON file containing the record (optional, uses stdin if omitted)repository=<did>- Repository DID where record will be storedcollection=<nsid>- Collection NSID (e.g., app.bsky.feed.post)
atproto-record-verify#
Verifies cryptographic signatures of AT Protocol records using embedded signature metadata. This tool validates that signed records contain authentic signatures from specified issuers, ensuring record integrity and authenticity.
Features:
- Signature Validation: Verifies embedded signatures against public keys
- Issuer Authentication: Confirms signatures are from specified DID issuers
- Context Verification: Validates repository and collection context in signatures
- Multi-Signature Support: Handles records with multiple signatures
- IPLD Deserialization: Uses DAG-CBOR for signature verification consistency
- Detailed Error Reporting: Provides specific feedback on verification failures
# Verify a signed record from a file
cargo run --bin atproto-record-verify did:plc:issuer123 did:key:zQ3sh... signed_record.json \
repository=did:plc:user123 collection=app.bsky.feed.post
# Verify a signed record from stdin
echo '{"signatures":[{"issuer":"did:plc:issuer123","signature":"u..."}],"$type":"app.bsky.feed.post","text":"Hello"}' | \
cargo run --bin atproto-record-verify did:plc:issuer123 did:key:zQ3sh... -- \
repository=did:plc:user123 collection=app.bsky.feed.post
# Successful verification returns exit code 0
# Failed verification returns exit code 1 with error details
Arguments:
<issuer_did>- DID of the expected signature issuer<public_key>- DID key string for verification (did🔑...)<record_file>- JSON file containing the signed record (optional, uses stdin if omitted)repository=<did>- Repository DID context for verificationcollection=<nsid>- Collection NSID context for verification
Exit Codes:
0- Signature verification successful1- Signature verification failed or invalid arguments2- File I/O or parsing errors
Modules#
- [
signature] - Core signature creation and verification functions - [
errors] - Structured error types for signature operations
Error Handling#
The crate uses structured error types defined in the errors module:
use atproto_record::errors::VerificationError;
use serde_json::json;
// Example error handling for signature creation
let signature_object = json!({ "missing": "required_fields" });
match signature::create(&key_data, &record, "repo", "collection", signature_object).await {
Ok(signed_record) => println!("Signature created successfully!"),
Err(VerificationError::SignatureObjectMissingField { field }) => {
println!("Missing required field in signature object: {}", field);
}
Err(VerificationError::InvalidSignatureObjectType) => {
println!("Signature object must be a JSON object");
}
Err(VerificationError::KeyOperationFailed(e)) => {
println!("Cryptographic operation failed: {}", e);
}
Err(e) => println!("Other error: {}", e),
}
// Example error handling for signature verification
match signature::verify("did:plc:issuer", &key_data, record, "repo", "collection").await {
Ok(()) => println!("Signature valid!"),
Err(VerificationError::NoValidSignatureForIssuer { issuer }) => {
println!("No valid signature found for issuer: {}", issuer);
}
Err(VerificationError::NoSignaturesField) => {
println!("Record contains no signatures field");
}
Err(e) => println!("Verification failed: {}", e),
}
Dependencies#
This crate builds on:
atproto-identity- Cryptographic key operations and DID resolutionserde_ipld_dagcbor- IPLD DAG-CBOR serialization for signature contentmultibase- Base encoding for signature representationserde_json- JSON handling for AT Protocol recordsanyhow- Error handling utilitiesthiserror- Structured error type derivation
License#
Licensed under the MIT License.