Skip to content

smart-on-fhir/health-cards-dev-tools

Repository files navigation

Node.js CI

SMART Health Cards Dev Tools

This project provides tools to help implementers of the SMART Health Card Framework and SMART Health Card Links validate the artifacts they produce. The package's version number, currently 1.3.0-2, matches the specification version the tool validates.

NOTE: The goal of the project is to help implementers verify that their implementations conform to the specification. It optimistically tries to validate as much of the input artifacts as it can, continuing validation after encountering errors in order to give a complete validation report. It is therefore not meant to robustly validate actual SMART Health Cards; applications validating such cards must be thoroughly tested using an adversarial threat model.

Setup

The developer tools can be installed directly from github, or built from source.

Prerequisites

Make sure node.js and npm are installed on your system; the latest Long-Term Support (LTS) version is recommended for both (note that node v16 is not currently supported). OpenSSL 1.1.1 is also needed to validate certificate chains which could be present in issuer JSON Web Keys (x5c value); if absent, chain validation is skipped.

Install via Github

Install the latest version using:

npm install github:smart-on-fhir/health-cards-dev-tools

Install a specific version by specifying it as a parameter; for example, to obtain v1.3.0-2:

npm install github:smart-on-fhir/health-cards-dev-tools#v1.3.0-2

Note : Performing an npm global install from GitHub npm install -g github:smart-on-fhir/health-cards-dev-tools does not currently work correctly with the latest version of npm (version 7.x).
The combination of using both the bin and prepare properties in package.json is resulting in a failed install (It works correctly with npm 6.x).

Build from source

Alternatively, the package can be built from source following these steps.

  1. Get the source, for example using git:

    git clone -b main https://github.com/smart-on-fhir/health-cards-dev-tools.git
    cd health-cards-dev-tools
  2. Build the npm package:

    npm install
    npm run build
  3. Optionally, run the tests:

    npm test

Run in Docker

Once obtained, the tools can be run in Docker following these steps:

docker build -t health-cards-dev-tools .

docker run --rm -it \
  -v /path/to/inputs:/inputs health-cards-dev-tools /bin/bash

Setup notes

The tests download and validate, among other things, the spec examples. A breaking spec change might invalidate the downloaded examples, which can be refreshed using:

npm run fetch-examples -- --force

The tool can be updated to the latest version by running (assuming you obtained it with git):

npm run update-validator

The tool can be packaged (and later installed into another npm project with npm install <path to .tgz>) using:

npm pack

Using the tool

To validate health card artifacts, use the shc-validator.ts script, or simply call node . from the package root directory, using the desired options:

Usage: shc-validator [options]
  Options:
    -v, --version                display specification and tool version
    -p, --path <path>            path of the file(s) to validate. Can be repeated for the qr and qrnumeric types, to provide multiple file chunks (default: [])
    -t, --type <type>            type of file to validate
                                 (choices: "fhirbundle", "jwspayload", "jws", "healthcard", "fhirhealthcard", "qrnumeric", "qr", "jwkset", 'shlink', 'shlpayload', 'shlmanifest', 'shlfile')
    -l, --loglevel <loglevel>    set the minimum log level (choices: "debug", "info", "warning", "error", "fatal", default: "warning")
    -P, --profile <profile>      vaccination profile to validate (choices: "any", "usa-covid19-immunization", default: "any")
    -d, --directory <directory>  trusted issuer directory to validate against
    -o, --logout <path>          output path for log (if not specified log will be printed on console)
    -f, --fhirout <path>         output path for the extracted FHIR bundle
    -k, --jwkset <key>           path to trusted issuer key set
    -e, --exclude <error>        error to exclude, can be repeated, can use a * wildcard. Valid options: "openssl-not-available", "invalid-issuer-url",
                                 "invalid-key-x5c", "invalid-key-wrong-kty", "invalid-key-wrong-alg", "invalid-key-wrong-use", "invalid-key-wrong-kid", "invalid-key-wrong-crv", "invalid-key-schema", "not-yet-valid", "fhir-schema-error", "issuer-key-download-error",
                                 "unbalanced-qr-chunks", "jws-too-long", "invalid-file-extension", "trailing-characters", "issuer-wellknown-endpoint-cors" (default: [])
    -V, --validator <validator>  the choice of FHIR validator to use (cannot be used with non-default --profile) (choices: "default", "fhirvalidator")
    -T, --valTime <valtime>      validation time for SHC and certificates (in seconds from UNIX epoch)
    -c, --passcode <code>        passcode for shlink
    -K, --key <key>              key for shlink decryption as a base64urlencoded string
    -h, --help                   display help for command

Examples

To validate a SMART Health Card data.smart-health-card file, call:

node . --path data.smart-health-card --type healthcard

To validate a QR image QR.png file, call:

node . --path QR.png --type qr

Option details

  • Multiple path options can be provided for QR artifacts (qrnumeric and qr types) split in multiple files, one for each chunk. For example, to validate a numeric QR code split in three chunks QR1.txt, QR2.txt, QR3.txt, call:

    node . --path QR1.txt --path QR2.txt --path QR3.txt --type qrnumeric
    
  • Specific FHIR profiles can be validated by using the --profile option; valid options are:

    • usa-covid19-immunization, checking for vaccine products approved in the USA.
  • A trusted issuers directory can be used by using the --directory option; by passing either a known directory name or by passing a URL pointing to a directory using the same format as the VCI directory. The known directory names are:

    • VCI, corresponding to the VCI directory, and
    • test, a directory containing test issuers, including the one for the SMART Health Card specification examples.
  • The log output can be stored into a file using the --logout option. The extracted FHIR bundle can be stored into a file using the --fhirout option.

  • The supported file types, as expressed with the --type option, are:

    • fhirbundle: a JSON-encoded FHIR bundle
    • jwspayload: a JSON Web Signature (JWS) payload, encoding a health card
    • jws: a (signed) JSON Web Signature (JWS), encoding a health card
    • healthcard: a health card file
    • fhirhealthcard: response payload returned from a FHIR $health-cards-issue operation
    • qrnumeric: a numeric QR code encoding a health card
    • qr: a QR code image encoding a health card or a SMART Health Link
    • jwkset: a JSON Web Key (JWK) Set, encoding the issuer public signing key. This supersedes downloading the key from the well-known location.
    • shlink: a SMART Health Link
    • shlpayload: a JSON-encoded a SMART Health Link payload
    • shlmanifest: a JSON-encoded collection of SMART Health Link manifest files
    • shlfile: a JSON-encoded collection of SMART Health Link file

  • The tool outputs validation information, depending on the verbosity level, in particular, the parsed FHIR bundle is printed at the info verbosity log level. The tool tries to continue parsing the artefact even if a warning or error occurred. Certain errors can be suppressed from the output using the --exclude option (using the full error name or a * wildcard character).

  • Issuer signing public keys (encoded in a JSON Web Key Set) can be validated before being uploaded to their well-known URL. To validate a issuerPublicKeys.json JSON Web Key Set (JWK), call:

    node . --path issuerPublicKeys.json --type jwkset
    


Programmatic API

The tool can be invoked programmatically from a Node.js app (note: browser-based environments are not currently supported). First, install the tool in your own project, either from GitHub via npm install smart-on-fhir/health-cards-dev-tools, or from a local .tgz file resulting from npm pack as described above. Then import src/api.js and call the right validate.<artifact-type> method, where <artifact-type> can be one of qrnumeric, healthcard, fhirhealthcard, jws, jwspayload, fhirbundle, or keyset. The validation results, if any, are returned in Promise-wrapped array. For example you could check a JWS via:

import { validate } from 'health-cards-dev-tools/js/src/api.js'
const jwsString = 'eyJ6aXAiOiJ...';
const results = validate.jws(jwsString);
results.then(console.log)

The validation methods will take an optional options object to pass additional parameters mirroring the command line options:

const results = validate.jws(jwsString, {logOutputPath: '/mypath/mylogfile.json' /*write log to this file*/});
option example
logLevel: LogLevel.Debug set the minimum log level to Debug
profile: ValidationProfiles['usa-covid19-immunization'] vaccination profile to validate
issuerDirectory: issuerDirectory: 'VCI' trusted issuer directory to validate against
clearKeyStore: true clears the keystore of keys from previous API calls
cascade: false stops validating child artifacts (e.g. validating a 'jwspayload' will not also validate the contained FHIR bundle)
logOutputPath: '/somepath/mylog.json' where to output the logfile
skipJwksDownload: false prevents JWK key download from the issuer
jwkset: '/somepath/mykeys.json' path to import a JWK keyset
validator: Validators.fhirvalidator optionally validate the fhirbundle with the HL7 FHIR Validator
passCode: '1234' set the SMART Health Link passcode
decryptionKey: 'Es8Gv3aHMGeyuLW8PGdE-mlv-qOx_EuVc1qhN2AoSvs' key to decrypt a SMART Health Link file


HL7 FHIR Validation (experimental)

Validation of the FHIR bundle is currently not comprehensive. The tool validates a subset of the full FHIR schema; the behavior can be scoped by using the --profile option, or changed by modifying the src/prune-fhir-schema.ts script. Extensive tests and conformance to the Vaccination & Testing Implementation Guide can be performed using the FHIR validator tool.

This tool can now apply the HL7 FHIR Validator, in place of the limited default validator, with the use of the --validator fhirvalidator option. The HL7 FHIR Validator is a Java application and so requires a Java runtime (JRE), or alternatively, Docker to be installed on your system. This tool will attempt to run it with an installed JRE first, if available. If not, it will attempt to instantiate a Docker image (with a JRE). If neither method succeeds, an error will be returned.

Note: The HL7 FHIR Validator runs in another process, using the installed Java runtime, and downloads several files while initializing. These operations may not succeed on all platforms and configurations. So for now, this feature is considered experimental.

Note: The HL7 FHIR Validator can take up to 30-seconds to complete its analysis.

Note: Docker may require elevated permissions to execute docker commands, requiring this tool to also run with elevated permissions when attempting to use a Docker image. For example:

# Run shc-validator as sudo ('-E env "PATH=$PATH"' preserves the environment of the current user)
sudo -E env "PATH=$PATH" shc-validator --path myfhirbundle.json --type fhirbundle --validator fhirvalidator