Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Issue regarding verification #662

Open
Dreix0 opened this issue May 10, 2024 · 25 comments
Open

Issue regarding verification #662

Dreix0 opened this issue May 10, 2024 · 25 comments

Comments

@Dreix0
Copy link

Dreix0 commented May 10, 2024

I get this error when I try to verify a credential

Screenshot_20240429-105326_Polygon ID

I am able to generate the request, but the callback function is never called

image

Here's the object obtained for the request

{
"id": "7f38a193-0918-4a48-9fac-36adfdb8b542",
"thid": "7f38a193-0918-4a48-9fac-36adfdb8b542",
"from": "did:polygonid:polygon:amoy:2qQ68JkRcf3xrHPQPWZei3YeVzHPP58wYNxx2mEouR",
"typ": "application/iden3comm-plain-json",
"type": "https://iden3-communication.io/authorization/1.0/request",
"body": {
"reason": "test flow",
"message": "",
"callbackUrl": "https://5sgh2r57-8080.uks1.devtunnels.ms/api/callback?sessionId=1715347714134",
"scope": [
{
"id": 1,
"circuitId": "credentialAtomicQuerySigV2",
"query": {
"allowedIssuers": [
"*"
],
"type": "KYCAgeCredential",
"context": "https://raw.githubusercontent.com/iden3/claim-schema-vocab/main/schemas/json-ld/kyc-v3.json-ld",
"credentialSubject": {
"birthday": {
"$lt": 20000101
}
}
}
}
]
}
}

@martinsaporiti
Copy link
Contributor

Hi @Dreix0 the verification process will check first the auth core claim revocation status. Some auth core claim is included inside the issued credentials. So my question is... have you created the DID with this ttps://5sgh2r57-8080.uks1.devtunnels.ms configured? I mean, at the moment you have created the issuer DID what URL was configured in the issuer node env var?.

@Dreix0
Copy link
Author

Dreix0 commented May 10, 2024

Hello, the link https://5sgh2r57-8080.uks1.devtunnels.ms points to the server side of my site (where I do the verification).

The URL that was configured in the issuer node env var when I created the DID was : https://poly-api-ui.wl.tc
image

Do the verifier and issuer have to be on the same server?

@martinsaporiti
Copy link
Contributor

Hi @Dreix0 verifier and issuer don't need to be running on the same server, but if have configured your issuer to run with ISSUER_CREDENTIAL_STATUS_RHS_MODE=None (in the .env-issuer file) the issuer node has to be running when you execute the verifications because that process will check the DID revocation status and the credential revocation status against the issuer node. Having said that, it seems you have configured the issuer node correctly and the verifier. Could you send the logs from the mobile app?

@nk2103
Copy link

nk2103 commented May 14, 2024

Hi everyone, i have the same problem here are my logs from the mobile app:

[GetProofQueryContextUseCase] schemaUrl: ipfs://QmRQeGrQSRUsN7WP8kJYwUfgLZhhAVnnjM1e3R24sfNBHh


***[RemoteIden3commDataSource] fetchSchema original url: ipfs://QmRQeGrQSRUsN7WP8kJYwUfgLZhhAVnnjM1e3R24sfNBHh


***[RemoteIden3commDataSource] fetchSchema: 200 {@context: [{@Protected: true, @Version: 1.1, id: @id, type: @type, CoffeePass: {@context: {@propagate: true, @Protected: true, polygon-vocab: urn:uuid:f49d6e62-525f-4531-9083-0c8dc520caa7#, xsd: http://www.w3.org/2001/XMLSchema#, Mitarbeiter: {@id: polygon-vocab:Mitarbeiter, @type: xsd:integer}}, @id: urn:uuid:b452515a-3de4-4e75-a5c3-6855661e8eb9}}]}


***[GetProofRequestsUseCase] _getProofQueryContextUseCase: {"@context":[{"@Protected":true,"@Version":1.1,"id":"@id","type":"@type","CoffeePass":{"@context":{"@propagate":true,"@Protected":true,"polygon-vocab":"urn:uuid:f49d6e62-525f-4531-9083-0c8dc520caa7#","xsd":"http://www.w3.org/2001/XMLSchema#","Mitarbeiter":{"@id":"polygon-vocab:Mitarbeiter","@type":"xsd:integer"}},"@id":"urn:uuid:b452515a-3de4-4e75-a5c3-6855661e8eb9"}}]}


***[GetProofRequestsUseCase] _getProofQueryUseCase: {"field":"Mitarbeiter","values":[0],"operator":3}


***[GetClaimsUseCase] Claims length: 1


***PolygonIdSdk.Identity.getIdentity called


***[GetGenesisStateUseCase] State


***[GetIdentityUseCase] Identity DID: did:polygonid:polygon:amoy:2qYtY8fpR524eHKhp3YNZsYrnitE4LsNdhTTtFBQ5U, public key: [20753845548420830195942778240794116037225066512865926701679549119416372402648, 19485120423329784370456827780644484395175105101325465907944423243114957565894], profiles: {0: did:polygonid:polygon:amoy:2qYtY8fpR524eHKhp3YNZsYrnitE4LsNdhTTtFBQ5U, 414047686782563664919042896540383710277610245113691481250900244004220829398: did:polygonid:polygon:amoy:2qXoXodcmNYfMgnjKfqxExXqvPtZRoZdgjCsKyPFDk, 285286441709312773248835885277213160300621180068466547397972791229576038126: did:polygonid:polygon:amoy:2qTjbfYaozCtR1fi2XPyQWVfX8BKLUvn94N1FrTdf2, 405083528824397092603133905885719990946558288684688904527260559609343786124: did:polygonid:polygon:amoy:2qVZzYEeN33B5zzwmh58JnR9PgcnkLqJRP5c6mFZSL, 268650788078643164380318396361476219463846932801611510338714509230143512095: did:polygonid:polygon:amoy:2qZKx6cu5GWAb9n6nkahMzinK3oLfGtA2e4asfudGR}


***[Authenticate] Chain: polygon amoy


***[GetGenesisStateUseCase] State


***getProofInputs id: 2qYtY8fpR524eHKhp3YNZsYrnitE4LsNdhTTtFBQ5U


***getProofInputs profileNonce: 285286441709312773248835885277213160300621180068466547397972791229576038126


***getProofInputs claimSubjectProfileNonce: 268650788078643164380318396361476219463846932801611510338714509230143512095


***getProofInputs authClaim: [80551937543569765027552589160822318028, 0, 20753845548420830195942778240794116037225066512865926701679549119416372402648, 19485120423329784370456827780644484395175105101325465907944423243114957565894, 15930428023331155902, 0, 0, 0]


***getProofInputs incProof: {existence: true, siblings: []}


***getProofInputs nonRevProof: {existence: false, siblings: []}


***getProofInputs gistProof: {root: 13457678479609719886544364049376789536379660319227139892760614967414911933774, proof: {existence: false, siblings: [15793023716144349039468361583792085738133908948648326045331530971269923973517, 9465140022075266245818308584415024259632569930252876729157552059906644172647, 3443920226182615781286122903763532917198721020283183652021644149853982917595, 8101308940029950272658506914340269605225520471090978907858156348695539260783, 11401560464532099308094031888358729096367178043819950645859597832185703543705, 18504601556441794392582063873464588302328423224718677695082550443001982455283, 15681315310422501501187056738889905833739475230951182488742110164306257908993, 12129714003217403315911226417256753089124163514912083948665192454941757213190], node_aux: {key: 15827182460736579679146896621878847705611936955795741573051094984243159909156, value: 8645254581422640153022335195293185925284406096398633740062026444936429901467}}}


***getProofInputs treeState: {state: 162564156159685493247876768529544447356951386810660290006530370194266170293, claimsRoot: 4997998733631003204435886186229108076619218006172250708711292396834928224175, revocationRoot: 0, rootOfRoots: 0}


***getProofInputs challenge: null


***getProofInputs signature: null


***getProofInputs credential: ClaimInfoDTO


**getProofInputs request: {id: 1698672739, circuitId: credentialAtomicQuerySigV2, query: {allowedIssuers: [], context: ipfs://QmRQeGrQSRUsN7WP8kJYwUfgLZhhAVnnjM1e3R24sfNBHh, type: CoffeePass, credentialSubject: {Mitarbeiter: {$gt: 0}}}}


***getProofInputs circuitId: credentialAtomicQuerySigV2


***[LibPolygonIdCoreProofDataSource][MainFlow]getProofInputs input param: {"id":"2qYtY8fpR524eHKhp3YNZsYrnitE4LsNdhTTtFBQ5U","profileNonce":"285286441709312773248835885277213160300621180068466547397972791229576038126","claimSubjectProfileNonce":"268650788078643164380318396361476219463846932801611510338714509230143512095","authClaim":["80551937543569765027552589160822318028","0","20753845548420830195942778240794116037225066512865926701679549119416372402648","19485120423329784370456827780644484395175105101325465907944423243114957565894","15930428023331155902","0","0","0"],"authClaimIncMtp":{"existence":true,"siblings":[]},"authClaimNonRevMtp":{"existence":false,"siblings":[]},"gistProof":{"root":"13457678479609719886544364049376789536379660319227139892760614967414911933774","proof":{"existence":false,"siblings":["15793023716144349039468361583792085738133908948648326045331530971269923973517","9465140022075266245818308584415024259632569930252876729157552059906644172647","3443920226182615781286122903763532917198721020283183652021644149853982917595","8101308940029950272658506914340269605225520471090978907858156348695539260783","11401560464532099308094031888358729096367178043819950645859597832185703543705","18504601556441794392582063873464588302328423224718677695082550443001982455283","15681315310422501501187056738889905833739475230951182488742110164306257908993","12129714003217403315911226417256753089124163514912083948665192454941757213190"],"node_aux":{"key":"15827182460736579679146896621878847705611936955795741573051094984243159909156","value":"8645254581422640153022335195293185925284406096398633740062026444936429901467"}}},"treeState":{"state":"162564156159685493247876768529544447356951386810660290006530370194266170293","claimsRoot":"4997998733631003204435886186229108076619218006172250708711292396834928224175","revocationRoot":"0","rootOfRoots":"0"},"verifiableCredentials":{"id":"https://polygon.***.de/api-ui/v1/credentials/7e2b2c2b-11f5-11ef-9afd-0242ac120009","@context":["https://www.w3.org/2018/credentials/v1","https://schema.iden3.io/core/jsonld/iden3proofs.jsonld","ipfs://QmRQeGrQSRUsN7WP8kJYwUfgLZhhAVnnjM1e3R24sfNBHh"],"type":["VerifiableCredential","CoffeePass"],"issuanceDate":"2024-05-14T13:25:55.323392967Z","credentialSubject":{"id":"did:polygonid:polygon:amoy:2qZKx6cu5GWAb9n6nkahMzinK3oLfGtA2e4asfudGR","type":"CoffeePass","Mitarbeiter":88881},"credentialStatus":{"id":"https://polygon.***.de/api-ui/v1/credentials/revocation/status/3654347775","revocationNonce":3654347775,"type":"SparseMerkleTreeProof"},"issuer":"did:polygonid:polygon:amoy:2qXBF4XzwVwKU3JQ9wvox4KAbfKDsB71MKkt9rNzie","credentialSchema":{"id":"ipfs://Qmc7Mo824GYfDce3yehu494yWsYqVa96o1ZZAjMH9rKRBx","type":"JsonSchema2023"},"proof":[{"type":"BJJSignature2021","issuerData":{"id":"did:polygonid:polygon:amoy:2qXBF4XzwVwKU3JQ9wvox4KAbfKDsB71MKkt9rNzie","state":{"claimsTreeRoot":"0bec19b9b9f2f1cfd006eb233f737386c60d5352e91edba9466ba3045170ce03","value":"07ba06f6cc9c236b2812183853d60642832181c36a9ca72decf3893b73f60528"},"authCoreClaim":"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","mtp":{"existence":true,"siblings":[]},"credentialStatus":{"id":"https://polygon.***.de/api/v1/did%3Apolygonid%3Apolygon%3Aamoy%3A2qXBF4XzwVwKU3JQ9wvox4KAbfKDsB71MKkt9rNzie/claims/revocation/status/0","revocationNonce":0,"type":"SparseMerkleTreeProof","statusIssuer":null}},"coreClaim":"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","signature":"a9b8172ba19a849a272cd45055a835417b646a152b26123ea22c3d88e95a9114400b968f03f4e7a6c5a360ec699f887eea5d838f7db58ede325f7cc26dee9400"}]},"request":{"id":1698672739,"circuitId":"credentialAtomicQuerySigV2","query":{"allowedIssuers":["*"],"context":"ipfs://QmRQeGrQSRUsN7WP8kJYwUfgLZhhAVnnjM1e3R24sfNBHh","type":"CoffeePass","credentialSubject":{"Mitarbeiter":{"$gt":0}}}},"verifierId":"did:polygonid:polygon:amoy:2qQ68JkRcf3xrHPQPWZei3YeVzHPP58wYNxx2mEouR","linkNonce":"0"}


***[LibPolygonIdCoreProofDataSource][MainFlow]getProofInputs config param: {"id":"2qYtY8fpR524eHKhp3YNZsYrnitE4LsNdhTTtFBQ5U","profileNonce":"285286441709312773248835885277213160300621180068466547397972791229576038126","claimSubjectProfileNonce":"268650788078643164380318396361476219463846932801611510338714509230143512095","authClaim":["80551937543569765027552589160822318028","0","20753845548420830195942778240794116037225066512865926701679549119416372402648","19485120423329784370456827780644484395175105101325465907944423243114957565894","15930428023331155902","0","0","0"],"authClaimIncMtp":{"existence":true,"siblings":[]},"authClaimNonRevMtp":{"existence":false,"siblings":[]},"gistProof":{"root":"13457678479609719886544364049376789536379660319227139892760614967414911933774","proof":{"existence":false,"siblings":["15793023716144349039468361583792085738133908948648326045331530971269923973517","9465140022075266245818308584415024259632569930252876729157552059906644172647","3443920226182615781286122903763532917198721020283183652021644149853982917595","8101308940029950272658506914340269605225520471090978907858156348695539260783","11401560464532099308094031888358729096367178043819950645859597832185703543705","18504601556441794392582063873464588302328423224718677695082550443001982455283","15681315310422501501187056738889905833739475230951182488742110164306257908993","12129714003217403315911226417256753089124163514912083948665192454941757213190"],"node_aux":{"key":"15827182460736579679146896621878847705611936955795741573051094984243159909156","value":"8645254581422640153022335195293185925284406096398633740062026444936429901467"}}},"treeState":{"state":"162564156159685493247876768529544447356951386810660290006530370194266170293","claimsRoot":"4997998733631003204435886186229108076619218006172250708711292396834928224175","revocationRoot":"0","rootOfRoots":"0"},"verifiableCredentials":{"id":"https://polygon.***.de/api-ui/v1/credentials/7e2b2c2b-11f5-11ef-9afd-0242ac120009","@context":["https://www.w3.org/2018/credentials/v1","https://schema.iden3.io/core/jsonld/iden3proofs.jsonld","ipfs://QmRQeGrQSRUsN7WP8kJYwUfgLZhhAVnnjM1e3R24sfNBHh"],"type":["VerifiableCredential","CoffeePass"],"issuanceDate":"2024-05-14T13:25:55.323392967Z","credentialSubject":{"id":"did:polygonid:polygon:amoy:2qZKx6cu5GWAb9n6nkahMzinK3oLfGtA2e4asfudGR","type":"CoffeePass","Mitarbeiter":88881},"credentialStatus":{"id":"https://polygon.***.de/api-ui/v1/credentials/revocation/status/3654347775","revocationNonce":3654347775,"type":"SparseMerkleTreeProof"},"issuer":"did:polygonid:polygon:amoy:2qXBF4XzwVwKU3JQ9wvox4KAbfKDsB71MKkt9rNzie","credentialSchema":{"id":"ipfs://Qmc7Mo824GYfDce3yehu494yWsYqVa96o1ZZAjMH9rKRBx","type":"JsonSchema2023"},"proof":[{"type":"BJJSignature2021","issuerData":{"id":"did:polygonid:polygon:amoy:2qXBF4XzwVwKU3JQ9wvox4KAbfKDsB71MKkt9rNzie","state":{"claimsTreeRoot":"0bec19b9b9f2f1cfd006eb233f737386c60d5352e91edba9466ba3045170ce03","value":"07ba06f6cc9c236b2812183853d60642832181c36a9ca72decf3893b73f60528"},"authCoreClaim":"cca3371a6cb1b715004407e325bd993c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6f0b760033101436f62c7e3c393d5deffd98299a5f32213411da75b4feb260f4f69863aafc6dff98ffd52ad3698223c3815d72c06d92a71d2c86dba65c3cb1a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000","mtp":{"existence":true,"siblings":[]},"credentialStatus":{"id":"https://polygon.***.de/api/v1/did%3Apolygonid%3Apolygon%3Aamoy%3A2qXBF4XzwVwKU3JQ9wvox4KAbfKDsB71MKkt9rNzie/claims/revocation/status/0","revocationNonce":0,"type":"SparseMerkleTreeProof","statusIssuer":null}},"coreClaim":"336bb53fa278c839c4470b5778fcaea8220000000000000000000000000000000213cb804b8624fe9565e8d7d75cc63b727ae52ecabb3a01df787fa436af0e00d6108ed8408fb56c4ce6d9bb5daf62f2f76b55393ed2ad76e031ce1545fae10d0000000000000000000000000000000000000000000000000000000000000000ffebd0d900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000","signature":"a9b8172ba19a849a272cd45055a835417b646a152b26123ea22c3d88e95a9114400b968f03f4e7a6c5a360ec699f887eea5d838f7db58ede325f7cc26dee9400"}]},"request":{"id":1698672739,"circuitId":"credentialAtomicQuerySigV2","query":{"allowedIssuers":["*"],"context":"ipfs://QmRQeGrQSRUsN7WP8kJYwUfgLZhhAVnnjM1e3R24sfNBHh","type":"CoffeePass","credentialSubject":{"Mitarbeiter":{"$gt":0}}}},"verifierId":"did:polygonid:polygon:amoy:2qQ68JkRcf3xrHPQPWZei3YeVzHPP58wYNxx2mEouR","linkNonce":"0"}


***[calculateAtomicQueryInputs/libPolygonIdCoreProof] exception Instance of 'NullAtomicQueryInputsException'


***[authenticateV2] Error: Instance of 'NullAtomicQueryInputsException'



@martinsaporiti
Copy link
Contributor

hi, the URL for checking the auth core claim is not correct:

[{"id":"https://polygon.***.de/api/v1/did%3Apolygonid%3Apolygon%3Aamoy%3A2qXBF4XzwVwKU3JQ9wvox4KAbfKDsB71MKkt9rNzie/claims/revocation/status/0","]

What is the value of ISSUER_CREDENTIAL_STATUS_RHS_MODE ?
The mobile app can't access the auth core claim revocation status. The auth core claim is created when the did of the issuer is created.

Take a look to the ISSUER_API_UI_SERVER_URL var when the did is created.

@nk2103
Copy link

nk2103 commented May 14, 2024

When did is created this is my var: ISSUER_API_UI_SERVER_URL=https://polygon.***.de/api-ui and ISSUER_CREDENTIAL_STATUS_RHS_MODE=None. What would be the correct url?

(FYI i replaced a part of the Url with "***", it is always the same)

@plusema86
Copy link

Hi @nk2103 this url https://polygon.***.de/api-ui is reachable from the outside? can you share it with me? (if you don't want to share publicly could you share it in pvt? so I can test it)

@nk2103
Copy link

nk2103 commented May 15, 2024

Hi @plusema86 yes it is reachable from outside

@vgrabovski-lacero-platform
Copy link

I have the same issue using a local instance of the issuer node + the polygon ID wallet. I also use localtunnel software to make the localhost:3002 endpoint publicly available.
The network is polygon Amoy.

Credentials issuance goes well, but verification through define query throws an error similar to @Dreix0 faced.

Basically I followed these two guides issuer node readme from main + quick start demo.

@vgrabovski-lacero-platform
Copy link

Still has the issue.
What I tried to solve it:

  • run localtunnel to bind public endpoint on localhost:3002
  • then I set ISSUER_API_UI_SERVER_URL=https://<my public subdomain>.loca.lt
  • make up && make run && make run-ui
  • vault kv delete kv/did to delete old issuer node did
  • make generate-issuer-did
  • then I stopped all: make stop
  • then started all: make up && make run && make run-ui
  • then I imported schema and issued credentials via UI of the locally deployed issuer. this step sucessfully executed
  • went to verification, yet verification through define query threw (stacktrace is attached)

Stacktrace:

[GetProofQueryContextUseCase] schemaUrl: ipfs://QmbpbVDXnLipQRNBUnxUML9ovYMSPYJExjZ3gUmbFetvZo


***[RemoteIden3commDataSource] fetchSchema original url: ipfs://QmbpbVDXnLipQRNBUnxUML9ovYMSPYJExjZ3gUmbFetvZo


***[RemoteIden3commDataSource] fetchSchema: 200 {@context: [{@Protected: true, @Version: 1.1, id: @id, type: @type, AgeCredential: {@context: {@propagate: true, @Protected: true, polygon-vocab: urn:uuid:38bb2b42-6e7b-4e70-a519-3ab638a78a97#, xsd: http://www.w3.org/2001/XMLSchema#, Age: {@id: polygon-vocab:Age, @type: xsd:double}}, @id: urn:uuid:9e4ef4cd-2474-4c2c-8bcc-e7aacfed0f30}}]}


***[GetProofRequestsUseCase] _getProofQueryContextUseCase: {"@context":[{"@Protected":true,"@Version":1.1,"id":"@id","type":"@type","AgeCredential":{"@context":{"@propagate":true,"@Protected":true,"polygon-vocab":"urn:uuid:38bb2b42-6e7b-4e70-a519-3ab638a78a97#","xsd":"http://www.w3.org/2001/XMLSchema#","Age":{"@id":"polygon-vocab:Age","@type":"xsd:double"}},"@id":"urn:uuid:9e4ef4cd-2474-4c2c-8bcc-e7aacfed0f30"}}]}


***[GetProofRequestsUseCase] _getProofQueryUseCase: {"field":"Age","values":[29],"operator":1}


***[GetClaimsUseCase] Claims length: 1


***PolygonIdSdk.Identity.getIdentity called


***[GetGenesisStateUseCase] State


***[GetIdentityUseCase] Identity DID: did:polygonid:polygon:amoy:2qYQzTS85CsZ8bRDeYu8YEkFmKtVWzJun4q6NTuRob, public key: [17972377609914679415821660165415381768735375427626253169615341567876430181383, 19972886280263020429765524151106291203097086193264407994870951486560965888517], profiles: {0: did:polygonid:polygon:amoy:2qYQzTS85CsZ8bRDeYu8YEkFmKtVWzJun4q6NTuRob, 341270423190837698251992242673968543223672303118806041652656850324951123004: did:polygonid:polygon:amoy:2qRtdqhRouE44LvCkNPNN67RQY4pFCKmQqNXxVULTe, 400042326987623618197737832286425156131541936372496099298387509243141322692: did:polygonid:polygon:amoy:2qSqkEujh1JZ9NUjFF7xwFnekg2QDK2GzayeUPkbqn, 230392580602616987775406104160512061063054321156985333779409448127930013492: did:polygonid:polygon:amoy:2qUwfz8wPdg9mtNDYLMLfToJ1jsZNj9Y8ZHFATYreo, 314192550348016601571301415017954653211944749430085625472654481581110353682: did:polygonid:polygon:amoy:2qUyjRUkFoa1xuntSTWcjMQXRYSZPENDEPzef32b7Z, 420812759541583527841502457005097387599718968496391122462049946983159742289: did:polygonid:polygon:amoy:2qV9hLm5fxXdNQDCfGRJpwWG7Atd4omVd1yBerxFX1, 388075093985384678018534067019582868592163575054847455006412115443201996774: did:polygonid:polygon:amoy:2qUs5NHVpBGXpmJZuBMcdQ1AK3wLGAaRcjvRqFs6UB, 257797867664327835471619230830177541840240042384165863725698305081663775020: did:polygonid:polygon:amoy:2qWniKS1UHcsV5UZdEESiSa6PbjX6xZcHTvhwioYWa}


***[Authenticate] Chain: polygon amoy


***[GetGenesisStateUseCase] State


***getProofInputs id: 2qYQzTS85CsZ8bRDeYu8YEkFmKtVWzJun4q6NTuRob


***getProofInputs profileNonce: 0


***getProofInputs claimSubjectProfileNonce: 0


***getProofInputs authClaim: [80551937543569765027552589160822318028, 0, 17972377609914679415821660165415381768735375427626253169615341567876430181383, 19972886280263020429765524151106291203097086193264407994870951486560965888517, 15930428023331155902, 0, 0, 0]


***getProofInputs incProof: {existence: true, siblings: []}


***getProofInputs nonRevProof: {existence: false, siblings: []}


***getProofInputs gistProof: {root: 18951055909527155800929776983855269557718065981521295045899753983832049904898, proof: {existence: false, siblings: [7126302312969412224776393659735999325294081973957269001000498884870257830880, 19376781319949102787427406605768790645765420359006807364644708990405395958172, 12799978991407341001482469758703521500114451528485944385505755768457341448362, 6075437541867042168747331580173889829298203427146650216701918627725483063222, 7907911339753820727474490238163458249006783558163707705219065469862558671926, 10812872638543008542250973259097762701221822589175986697150858494029267262440, 9121922547609785160132617693725977932964455411010182372073236904380034734562, 0, 5723768794517210197145960996630307363747990043618743035755492680549531121979]}}


***getProof

/ERROR LOGS CONTINUE (can not paste as single text)

Inputs treeState: {state: 21231954080131282506562708068986090969503882965570560236519347472475867395734, claimsRoot: 6587056314438662589535461057006333672424152586175078376386727334824885742332, revocationRoot: 0, rootOfRoots: 0}


***getProofInputs challenge: null


***getProofInputs signature: null


***getProofInputs credential: ClaimInfoDTO


**getProofInputs request: {id: 1716162409, circuitId: credentialAtomicQuerySigV2, query: {allowedIssuers: [], context: ipfs://QmbpbVDXnLipQRNBUnxUML9ovYMSPYJExjZ3gUmbFetvZo, type: AgeCredential, credentialSubject: {Age: {$eq: 29}}}}


***getProofInputs circuitId: credentialAtomicQuerySigV2


***[LibPolygonIdCoreProofDataSource][MainFlow]getProofInputs input param: {"id":"2qYQzTS85CsZ8bRDeYu8YEkFmKtVWzJun4q6NTuRob","profileNonce":"0","claimSubjectProfileNonce":"0","authClaim":["80551937543569765027552589160822318028","0","17972377609914679415821660165415381768735375427626253169615341567876430181383","19972886280263020429765524151106291203097086193264407994870951486560965888517","15930428023331155902","0","0","0"],"authClaimIncMtp":{"existence":true,"siblings":[]},"authClaimNonRevMtp":{"existence":false,"siblings":[]},"gistProof":{"root":"18951055909527155800929776983855269557718065981521295045899753983832049904898","proof":{"existence":false,"siblings":["7126302312969412224776393659735999325294081973957269001000498884870257830880","19376781319949102787427406605768790645765420359006807364644708990405395958172","12799978991407341001482469758703521500114451528485944385505755768457341448362","6075437541867042168747331580173889829298203427146650216701918627725483063222","7907911339753820727474490238163458249006783558163707705219065469862558671926","10812872638543008542250973259097762701221822589175986697150858494029267262440","9121922547609785160132617693725977932964455411010182372073236904380034734562","0","5723768794517210197145960996630307363747990043618743035755492680549531121979"]}},"treeState":{"state":"21231954080131282506562708068986090969503882965570560236519347472475867395734","claimsRoot":"6587056314438662589535461057006333672424152586175078376386727334824885742332","revocationRoot":"0","rootOfRoots":"0"},"verifiableCredentials":{"id":"https://sugar.loca.lt/v1/credentials/d631866b-1639-11ef-aa5d-0242ac1a0008","@context":["https://www.w3.org/2018/credentials/v1","https://schema.iden3.io/core/jsonld/iden3proofs.jsonld","ipfs://QmbpbVDXnLipQRNBUnxUML9ovYMSPYJExjZ3gUmbFetvZo"],"type":["VerifiableCredential","AgeCredential"],"expirationDate":"2024-05-31T20:59:59.451Z","issuanceDate":"2024-05-19T23:45:13.429935555Z","credentialSubject":{"id":"did:polygonid:polygon:amoy:2qYQzTS85CsZ8bRDeYu8YEkFmKtVWzJun4q6NTuRob","type":"AgeCredential","Age":29},"credentialStatus":{"id":"https://sugar.loca.lt/v1/credentials/revocation/status/2195888651","revocationNonce":2195888651,"type":"SparseMerkleTreeProof"},"issuer":"did:polygonid:polygon:amoy:2qbTkaXkJtmEqguPZkYfYMsXt8w5SKfuHkUuaaaqE3","credentialSchema":{"id":"ipfs://QmSsCwiTAre7vjGan7xuPN5fWgpH6rVW6f3KxUxW6F8Be9","type":"JsonSchema2023"},"proof":[{"type":"BJJSignature2021","issuerData":{"id":"did:polygonid:polygon:amoy:2qbTkaXkJtmEqguPZkYfYMsXt8w5SKfuHkUuaaaqE3","state":{"claimsTreeRoot":"c9a5564ddec7ac38d5d5402ade2715940098045c9b44a9c5e0a776411bf8202f","value":"5a432ba64bfa8512af05e2b19a0ede32ed6c006b062275e620c432b4e907a611"},"authCoreClaim":"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","mtp":{"existence":true,"siblings":[]},"credentialStatus":{"id":"http://localhost:3001/v1/did%3Apolygonid%3Apolygon%3Aamoy%3A2qbTkaXkJtmEqguPZkYfYMsXt8w5SKfuHkUuaaaqE3/claims/revo

/ERROR LOGS CONTINUE (can not paste as single text)

cation/status/0","revocationNonce":0,"type":"SparseMerkleTreeProof","statusIssuer":null}},"coreClaim":"210410b5e6a38bad8315945f44f61a402a0000000000000000000000000000000213b7633e8774ef43fb081df577f81b93b39c704b706dbfa632dcf02e440e00393ae4e1a6b280d83288e298ad9a9202c7ee6bed47676bbb43a87a3931d7590600000000000000000000000000000000000000000000000000000000000000000b9ae282000000004f3a5a660000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000","signature":"15b9cf64ee66df4d848dabb85a3edfda4c0054c20ec3e1e28c18b3cef21e8d88d0c23e00f3023a9869662665fb3e34246b568f5bb04acea0d9d44e17a6fdb603"}]},"request":{"id":1716162409,"circuitId":"credentialAtomicQuerySigV2","query":{"allowedIssuers":["*"],"context":"ipfs://QmbpbVDXnLipQRNBUnxUML9ovYMSPYJExjZ3gUmbFetvZo","type":"AgeCredential","credentialSubject":{"Age":{"$eq":29}}}},"verifierId":"did:polygonid:polygon:amoy:2qV9QXdhXXmN5sKjN1YueMjxgRbnJcEGK2kGpvk3cq","linkNonce":"0"}


***[LibPolygonIdCoreProofDataSource][MainFlow]getProofInputs config param: {"id":"2qYQzTS85CsZ8bRDeYu8YEkFmKtVWzJun4q6NTuRob","profileNonce":"0","claimSubjectProfileNonce":"0","authClaim":["80551937543569765027552589160822318028","0","17972377609914679415821660165415381768735375427626253169615341567876430181383","19972886280263020429765524151106291203097086193264407994870951486560965888517","15930428023331155902","0","0","0"],"authClaimIncMtp":{"existence":true,"siblings":[]},"authClaimNonRevMtp":{"existence":false,"siblings":[]},"gistProof":{"root":"18951055909527155800929776983855269557718065981521295045899753983832049904898","proof":{"existence":false,"siblings":["7126302312969412224776393659735999325294081973957269001000498884870257830880","19376781319949102787427406605768790645765420359006807364644708990405395958172","12799978991407341001482469758703521500114451528485944385505755768457341448362","6075437541867042168747331580173889829298203427146650216701918627725483063222","7907911339753820727474490238163458249006783558163707705219065469862558671926","10812872638543008542250973259097762701221822589175986697150858494029267262440","9121922547609785160132617693725977932964455411010182372073236904380034734562","0","5723768794517210197145960996630307363747990043618743035755492680549531121979"]}},"treeState":{"state":"21231954080131282506562708068986090969503882965570560236519347472475867395734","claimsRoot":"6587056314438662589535461057006333672424152586175078376386727334824885742332","revocationRoot":"0","rootOfRoots":"0"},"verifiableCredentials":{"id":"https://sugar.loca.lt/v1/credentials/d631866b-1639-11ef-aa5d-0242ac1a0008","@context":["https://www.w3.org/2018/credentials/v1","https://schema.iden3.io/core/jsonld/iden3proofs.jsonld","ipfs://QmbpbVDXnLipQRNBUnxUML9ovYMSPYJExjZ3gUmbFetvZo"],"type":["VerifiableCredential","AgeCredential"],"expirationDate":"2024-05-31T20:59:59.451Z","issuanceDate":"2024-05-19T23:45:13.429935555Z","credentialSubject":{"id":"did:polygonid:polygon:amoy:2qYQzTS85CsZ8bRDeYu8YEkFmKtVWzJun4q6NTuRob","type":"AgeCredential","Age":29},"credentialStatus":{"id":"https://sugar.loca.lt/v1/credentials/revocation/status/2195888651","revocationNonce":2195888651,"type":"SparseMerkleTreeProof"},"issuer":"did:polygonid:polygon:amoy:2qbTkaXkJtmEqguPZkYfYMsXt8w5SKfuHkUuaaaqE3","credentialSchema":{"id":"ipfs://QmSsCwiTAre7vjGan7xuPN5fWgpH6rVW6f3KxUxW6F8Be9","type":"JsonSchema2023"},"proof":[{"type":"BJJSignature2021","issuerData":{"id":"did:polygonid:polygon:amoy:2qbTkaXkJtmEqguPZkYfYMsXt8w5SKfuHkUuaaaqE3","state":{"claimsTreeRoot":"c9a5564ddec7ac38d5d5402ade2715940098045c9b44a9c5e0a776411bf8202f","value":"5a432ba64bfa8512af05e2b19a0ede32ed6c006b062275e620c432b4e907a611"},"authCoreClaim":"cca3371a6cb1b715004407e325bd993c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ab92cf06a94fe049ea041c3b9549777f959b93349509de6eae91d46065784f250154580209b4c28e4250435b8fed81c765881b8b9565f32a672cbb592

/ERROR LOGS CONTINUE (can not paste as single text)

3b5fb180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000","mtp":{"existence":true,"siblings":[]},"credentialStatus":{"id":"http://localhost:3001/v1/did%3Apolygonid%3Apolygon%3Aamoy%3A2qbTkaXkJtmEqguPZkYfYMsXt8w5SKfuHkUuaaaqE3/claims/revocation/status/0","revocationNonce":0,"type":"SparseMerkleTreeProof","statusIssuer":null}},"coreClaim":"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","signature":"15b9cf64ee66df4d848dabb85a3edfda4c0054c20ec3e1e28c18b3cef21e8d88d0c23e00f3023a9869662665fb3e34246b568f5bb04acea0d9d44e17a6fdb603"}]},"request":{"id":1716162409,"circuitId":"credentialAtomicQuerySigV2","query":{"allowedIssuers":["*"],"context":"ipfs://QmbpbVDXnLipQRNBUnxUML9ovYMSPYJExjZ3gUmbFetvZo","type":"AgeCredential","credentialSubject":{"Age":{"$eq":29}}}},"verifierId":"did:polygonid:polygon:amoy:2qV9QXdhXXmN5sKjN1YueMjxgRbnJcEGK2kGpvk3cq","linkNonce":"0"}


***[calculateAtomicQueryInputs/libPolygonIdCoreProof] exception Instance of 'NullAtomicQueryInputsException'


***[authenticateV2] Error: Instance of 'NullAtomicQueryInputsException'



@martinsaporiti
Copy link
Contributor

Hi @vgrabovski-lacero-platform it seems the auth core claim revocation status endpoint (created when the issuer DID is created) is pointing to http://localhost:3001

[...]
http://localhost:3001/v1/did%3Apolygonid%3Apolygon%3Aamoy%3A2qbTkaXkJtmEqguPZkYfYMsXt8w5SKfuHkUuaaaqE3/claims/revocation/status/0
[...]

So when you try to run a verification the mobile app is trying to fetch the revocation status from that URL which is not reachable. I found the problem and we will fix it soon. A workaround, for now, is to set up the env var ISSUER_SERVER_URL in the .env-issuer file with the same value you already have in the ISSUER_API_UI_SERVER_URL var in the .env-api file. This must be set before running make generate-issuer-did.
If you plan to run the core-api then after
running make generate-issuer-did you have to set a public IP in ISSUER_SERVER_URL for the core API (a different one)

Thanks!

@vgrabovski-lacero-platform
Copy link

Thanks for the suggestions @martinsaporiti
It not worked though and failed with the same error.

Here is .env-api:

ISSUER_API_UI_SERVER_URL=https://sugarrrr.loca.lt
ISSUER_API_UI_SERVER_PORT=3002
ISSUER_API_UI_AUTH_USER=user-api
ISSUER_API_UI_AUTH_PASSWORD=password-api
...
rest configs

and .env-issuer:

ISSUER_SERVER_URL=https://sugarrrr.loca.lt
ISSUER_SERVER_PORT=3001
ISSUER_NATIVE_PROOF_GENERATION_ENABLED=true
ISSUER_PUBLISH_KEY_PATH=pbkey
ISSUER_ONCHAIN_PUBLISH_STATE_FREQUENCY=1m
...
rest configurations

@martinsaporiti
Copy link
Contributor

Hi, @vgrabovski-lacero-platform could you share the mobile app logs after issuing the credentials with the latest changes, please?

@vgrabovski-lacero-platform
Copy link

UPDATE: it is working! Thanks a lot, @martinsaporiti.

The reason was that I did not follow your suggestions in an exact way. In particular, I had to execute this command first make generated-issuer-did


Sure @martinsaporiti

.env-issuer:

ISSUER_SERVER_URL=https://sugarrrr.loca.lt
ISSUER_SERVER_PORT=3001
ISSUER_NATIVE_PROOF_GENERATION_ENABLED=true
ISSUER_PUBLISH_KEY_PATH=pbkey
ISSUER_ONCHAIN_PUBLISH_STATE_FREQUENCY=1m
ISSUER_ONCHAIN_CHECK_STATUS_FREQUENCY=1m
ISSUER_DATABASE_URL=postgres://polygonid:polygonid@postgres:5432/platformid?sslmode=disable
ISSUER_IPFS_GATEWAY_URL=https://ipfs.io
ISSUER_LOG_LEVEL=-4
ISSUER_LOG_MODE=2
ISSUER_API_AUTH_USER=hidden
ISSUER_API_AUTH_PASSWORD=hidden-password
ISSUER_KEY_STORE_ADDRESS=http://vault:8200
ISSUER_KEY_STORE_PLUGIN_IDEN3_MOUNT_PATH=iden3

ISSUER_ETHEREUM_URL=https://polygon-amoy.g.alchemy.com/v2/RY_W1R6OUKZCwqDktsvz8U412GacM0Zo
ISSUER_ETHEREUM_CONTRACT_ADDRESS=0x1a4cC30f2aA0377b0c3bc9848766D90cb4404124
ISSUER_ETHEREUM_DEFAULT_GAS_LIMIT=600000
ISSUER_ETHEREUM_CONFIRMATION_TIME_OUT=600s
ISSUER_ETHEREUM_CONFIRMATION_BLOCK_COUNT=5
ISSUER_ETHEREUM_RECEIPT_TIMEOUT=600s
ISSUER_ETHEREUM_MIN_GAS_PRICE=0
ISSUER_ETHEREUM_MAX_GAS_PRICE=2500000
ISSUER_ETHEREUM_RPC_RESPONSE_TIMEOUT=5s
ISSUER_ETHEREUM_WAIT_RECEIPT_CYCLE_TIME=30s
ISSUER_ETHEREUM_WAIT_BLOCK_CYCLE_TIME=30s
ISSUER_ETHEREUM_RESOLVER_PREFIX=polygon:amoy
ISSUER_ETHEREUM_TRANSFER_ACCOUNT_KEY_PATH=pbkey

ISSUER_PROVER_SERVER_URL=http://localhost:8002
ISSUER_PROVER_TIMEOUT=600s
ISSUER_CIRCUIT_PATH=./pkg/credentials/circuits
ISSUER_REDIS_URL=redis://@redis:6379/1
ISSUER_SCHEMA_CACHE=false

ISSUER_VAULT_USERPASS_AUTH_ENABLED=false
ISSUER_VAULT_USERPASS_AUTH_PASSWORD=password

ISSUER_CREDENTIAL_STATUS_ONCHAIN_TREE_STORE_SUPPORTED_CONTRACT=0x3d3763eC0a50CE1AdF83d0b5D99FBE0e3fEB43fb
ISSUER_CREDENTIAL_STATUS_RHS_URL=http://localhost:3001
ISSUER_CREDENTIAL_STATUS_PUBLISHING_KEY_PATH=pbkey
ISSUER_CREDENTIAL_STATUS_RHS_MODE=OnChain
ISSUER_CREDENTIAL_STATUS_RHS_CHAIN_ID=80002
ISSUER_KEY_STORE_TOKEN=hvs.8yIP8wB4WCeUkOEuyZdNsHRl

Thanks for helping to figure it out.

It seems that it ignores configuration files and still uses http://localhost:3001 to check the revocation status. I tried to remove then restart all containters except vault, redis, and postgre, but the result was similar.

Also when I execute make stop, I see the following (I hope this may help in some way) logs in terminal:

docker compose -p issuer -f /Users/mac/projects1/issuer-node1/infrastructure/local/docker-compose-infra.yml stop
WARN[0000] /Users/mac/projects1/issuer-node1/infrastructure/local/docker-compose-infra.yml: `version` is obsolete 
[+] Stopping 3/3
 ✔ Container issuer-postgres-1  Stopped                                                                                             0.2s 
 ✔ Container issuer-redis-1     Stopped                                                                                             0.2s 
 ✔ Container issuer-vault-1     Stopped                                                                                             0.1s 
docker compose -p issuer -f /Users/mac/projects1/issuer-node1/infrastructure/local/docker-compose.yml stop
WARN[0000] The "DOCKER_FILE" variable is not set. Defaulting to a blank string. 
WARN[0000] The "DOCKER_FILE" variable is not set. Defaulting to a blank string. 
WARN[0000] The "DOCKER_FILE" variable is not set. Defaulting to a blank string. 
WARN[0000] The "DOCKER_FILE" variable is not set. Defaulting to a blank string. 
WARN[0000] The "DOCKER_FILE" variable is not set. Defaulting to a blank string. 
WARN[0000] /Users/mac/projects1/issuer-node1/infrastructure/local/docker-compose.yml: `version` is obsolete 
[+] Stopping 5/5
 ✔ Container issuer-api-1                Stopped                                                                                    3.4s 
 ✔ Container issuer-notifications-1      Stopped                                                                                    0.0s 
 ✔ Container issuer-pending_publisher-1  Stopped                                                                                    2.1s 
 ✔ Container issuer-ui-1                 Stopped                                                                                    0.0s 
 ✔ Container issuer-api-ui-1             Stopped   

Mobile stacktrace is attached in following publication as separate message for the sake of readability

@martinsaporiti
Copy link
Contributor

glad to hear that @vgrabovski-lacero-platform

Regarding revocation status I saw you are using On Chain mode:

ISSUER_CREDENTIAL_STATUS_RHS_MODE=OnChain

In this case, when the mobile app tries to execute the ZKP it checks the revocation status against the smart contract so the issue I mentioned before is not important for you.

@vgrabovski-lacero-platform
Copy link

This is interesting @martinsaporiti

If I'm understanding correctly, you're suggesting that ISSUER_CREDENTIAL_STATUS_RHS_MODE=OnChain doesn't necessarily require an endpoint with Reverse Hash Service deployed, running, and publicly available.
I had the same expectations, so I set it to OnChain to avoid revocation status errors.

Yet, in my case, it did not help. Yesterday, I still got the same error, with the same reason (localhost:3001).

I should admit that the issuer node did was the previous one, but I thought it was okay when switching for onchain verification in the config.

So, considering all the above, can you shed light on why it still requires the value ISSUER_SERVER_URL to be reachable publicly when ISSUER_CREDENTIAL_STATUS_RHS_MODE set this way ISSUER_CREDENTIAL_STATUS_RHS_MODE=OnChain?

@martinsaporiti
Copy link
Contributor

Yes, exactly. If you are using OnChain you won't need the endpoint for checking revocation status but you will need it to fetch the credentials, right ? but you don't need the ISSUER_SERVER_URL with a public IP you just need the ISSUER_API_UI_SERVER_URL with a public IP (if you are using the UI and its API).

When the issuer DID is created some information regarding the DID (like the rev status approach) is saved in the database. When you issue credentials those credentials have that information, so changing the env vars values and using the same DID is not a good idea, I think.

@vgrabovski-lacero-platform
Copy link

So, I had to generate a new did for the issuer node to make it working when OnChain is set. Will notice it. Thank you @martinsaporiti

@martinsaporiti
Copy link
Contributor

you're welcome @vgrabovski-lacero-platform

@nk2103
Copy link

nk2103 commented May 23, 2024

@martinsaporiti I still have the same problem. I followed your workaround, where you suggested setting the environment variable ISSUER_SERVER_URL in the .env-issuer file to the same value as ISSUER_API_UI_SERVER_URL in the .env-api file. How should I proceed?

[GetProofQueryContextUseCase] schemaUrl: ipfs://QmRQeGrQSRUsN7WP8kJYwUfgLZhhAVnnjM1e3R24sfNBHh


***[RemoteIden3commDataSource] fetchSchema original url: ipfs://QmRQeGrQSRUsN7WP8kJYwUfgLZhhAVnnjM1e3R24sfNBHh


***[RemoteIden3commDataSource] fetchSchema: 200 {@context: [{@Protected: true, @Version: 1.1, id: @id, type: @type, CoffeePass: {@context: {@propagate: true, @Protected: true, polygon-vocab: urn:uuid:f49d6e62-525f-4531-9083-0c8dc520caa7#, xsd: http://www.w3.org/2001/XMLSchema#, Mitarbeiter: {@id: polygon-vocab:Mitarbeiter, @type: xsd:integer}}, @id: urn:uuid:b452515a-3de4-4e75-a5c3-6855661e8eb9}}]}


***[GetProofRequestsUseCase] _getProofQueryContextUseCase: {"@context":[{"@Protected":true,"@Version":1.1,"id":"@id","type":"@type","CoffeePass":{"@context":{"@propagate":true,"@Protected":true,"polygon-vocab":"urn:uuid:f49d6e62-525f-4531-9083-0c8dc520caa7#","xsd":"http://www.w3.org/2001/XMLSchema#","Mitarbeiter":{"@id":"polygon-vocab:Mitarbeiter","@type":"xsd:integer"}},"@id":"urn:uuid:b452515a-3de4-4e75-a5c3-6855661e8eb9"}}]}


***[GetProofRequestsUseCase] _getProofQueryUseCase: {"field":"Mitarbeiter","values":[0],"operator":3}


***[GetClaimsUseCase] Claims length: 1


***PolygonIdSdk.Identity.getIdentity called


***[GetGenesisStateUseCase] State


***[GetIdentityUseCase] Identity DID: did:polygonid:polygon:amoy:2qSWt96m5y2Szeh2tmQ831NeQAKfGyBBtjkidDy3Y1, public key: [13530263482613863208747247204521514810087293936518426048693004192093691725603, 15383949351443524586040971336212630131819694499306572046416286692457445417038], profiles: {0: did:polygonid:polygon:amoy:2qSWt96m5y2Szeh2tmQ831NeQAKfGyBBtjkidDy3Y1, 234101995721426472624480153439958928786053969599841908138499778702748414281: did:polygonid:polygon:amoy:2qYpgjXkZqcfqFVkBZds1asiQtQi9fxJTpbYh2B4Z1, 317259953187932414685415879957734517946121556699574088280147554243892997904: did:polygonid:polygon:amoy:2qYCgkHdZZ4K7XcdLqV4wyFuJvuPwLievvu8XwqQBp}


***[Authenticate] Chain: polygon amoy


***[GetGenesisStateUseCase] State


***getProofInputs id: 2qSWt96m5y2Szeh2tmQ831NeQAKfGyBBtjkidDy3Y1


***getProofInputs profileNonce: 317259953187932414685415879957734517946121556699574088280147554243892997904


***getProofInputs claimSubjectProfileNonce: 234101995721426472624480153439958928786053969599841908138499778702748414281


***getProofInputs authClaim: [80551937543569765027552589160822318028, 0, 13530263482613863208747247204521514810087293936518426048693004192093691725603, 15383949351443524586040971336212630131819694499306572046416286692457445417038, 15930428023331155902, 0, 0, 0]


***getProofInputs incProof: {existence: true, siblings: []}


***getProofInputs nonRevProof: {existence: false, siblings: []}


***getProofInputs gistProof: {root: 11191653654559293472350790755258314492306342628450134758894175521642966602033, proof: {existence: false, siblings: [19442119410559543965431716345044846714029806629652811774202410497162437108773, 8710097708803993370836265292138672396845848524673660736680122579408985034784, 9734641407564921151176740960573319910635423883974214389975487710855620485451, 16500608194916105916901553166055679639576369968104574594619465580143002944095, 4704373348274307426003199510978517691597759769613917447127954583992957057417, 20030529092363832390554303977743805129420643871008729871676376540073747193608, 2251047056866896077989753708353949139682820549532484934224652944097274587800, 15451048450163706345251747872821001294745331083890584021649870855318895787543], node_aux: {key: 14416026034464757819495576908079475267633753170468642494726654464434854342093, value: 1885386089965506564449624591296298515955725277385811992525882009595397977570}}}


***getProofInputs treeState: {state: 14446780852348442496124633889509663206999824313504973815700212852690868836075, claimsRoot: 12683583707795850040820669670290074858310979214458660111804089047242965187120, revocationRoot: 0, rootOfRoots: 0}


***getProofInputs challenge: null


***getProofInputs signature: null


***getProofInputs credential: ClaimInfoDTO


**getProofInputs request: {id: 1698672739, circuitId: credentialAtomicQuerySigV2, query: {allowedIssuers: [], context: ipfs://QmRQeGrQSRUsN7WP8kJYwUfgLZhhAVnnjM1e3R24sfNBHh, type: CoffeePass, credentialSubject: {Mitarbeiter: {$gt: 0}}}}


***getProofInputs circuitId: credentialAtomicQuerySigV2


***[LibPolygonIdCoreProofDataSource][MainFlow]getProofInputs input param: {"id":"2qSWt96m5y2Szeh2tmQ831NeQAKfGyBBtjkidDy3Y1","profileNonce":"317259953187932414685415879957734517946121556699574088280147554243892997904","claimSubjectProfileNonce":"234101995721426472624480153439958928786053969599841908138499778702748414281","authClaim":["80551937543569765027552589160822318028","0","13530263482613863208747247204521514810087293936518426048693004192093691725603","15383949351443524586040971336212630131819694499306572046416286692457445417038","15930428023331155902","0","0","0"],"authClaimIncMtp":{"existence":true,"siblings":[]},"authClaimNonRevMtp":{"existence":false,"siblings":[]},"gistProof":{"root":"11191653654559293472350790755258314492306342628450134758894175521642966602033","proof":{"existence":false,"siblings":["19442119410559543965431716345044846714029806629652811774202410497162437108773","8710097708803993370836265292138672396845848524673660736680122579408985034784","9734641407564921151176740960573319910635423883974214389975487710855620485451","16500608194916105916901553166055679639576369968104574594619465580143002944095","4704373348274307426003199510978517691597759769613917447127954583992957057417","20030529092363832390554303977743805129420643871008729871676376540073747193608","2251047056866896077989753708353949139682820549532484934224652944097274587800","15451048450163706345251747872821001294745331083890584021649870855318895787543"],"node_aux":{"key":"14416026034464757819495576908079475267633753170468642494726654464434854342093","value":"1885386089965506564449624591296298515955725277385811992525882009595397977570"}}},"treeState":{"state":"14446780852348442496124633889509663206999824313504973815700212852690868836075","claimsRoot":"12683583707795850040820669670290074858310979214458660111804089047242965187120","revocationRoot":"0","rootOfRoots":"0"},"verifiableCredentials":{"id":"https://polygon.hiqs.de/api-ui/v1/credentials/d87c0534-18f5-11ef-8a89-0242ac12000a","@context":["https://www.w3.org/2018/credentials/v1","https://schema.iden3.io/core/jsonld/iden3proofs.jsonld","ipfs://QmRQeGrQSRUsN7WP8kJYwUfgLZhhAVnnjM1e3R24sfNBHh"],"type":["VerifiableCredential","CoffeePass"],"issuanceDate":"2024-05-23T11:16:04.98572806Z","credentialSubject":{"id":"did:polygonid:polygon:amoy:2qYpgjXkZqcfqFVkBZds1asiQtQi9fxJTpbYh2B4Z1","type":"CoffeePass","Mitarbeiter":54546},"credentialStatus":{"id":"https://polygon.hiqs.de/api-ui/v1/credentials/revocation/status/2050771985","revocationNonce":2050771985,"type":"SparseMerkleTreeProof"},"issuer":"did:polygonid:polygon:amoy:2qRvtUgtyi52thWR872CrmWwz8nZMDGphkbyzqxbmN","credentialSchema":{"id":"ipfs://Qmc7Mo824GYfDce3yehu494yWsYqVa96o1ZZAjMH9rKRBx","type":"JsonSchema2023"},"proof":[{"type":"BJJSignature2021","issuerData":{"id":"did:polygonid:polygon:amoy:2qRvtUgtyi52thWR872CrmWwz8nZMDGphkbyzqxbmN","state":{"claimsTreeRoot":"e00ae78b1dfae5babc4c9d828b10b0eb0fa56b25168db86f33b31aed0d2cc02b","value":"4d7cadecb4288c0e24d213ee4f18dffdcbe9e1e32a45760a2db8c9a4ab556211"},"authCoreClaim":"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","mtp":{"existence":true,"siblings":[]},"credentialStatus":{"id":"https://polygon.hiqs.de/api-ui/v1/did%3Apolygonid%3Apolygon%3Aamoy%3A2qRvtUgtyi52thWR872CrmWwz8nZMDGphkbyzqxbmN/claims/revocation/status/0","revocationNonce":0,"type":"SparseMerkleTreeProof","statusIssuer":null}},"coreClaim":"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","signature":"20b10ab520e3717d05e549c91e55b61b13719bee8931b5e039f9f53fcdf9b203c5cf75ae1b326eb056b3bd9a4c5c6abb1a3feb265fef8f891ba78a4e5c708201"}]},"request":{"id":1698672739,"circuitId":"credentialAtomicQuerySigV2","query":{"allowedIssuers":["*"],"context":"ipfs://QmRQeGrQSRUsN7WP8kJYwUfgLZhhAVnnjM1e3R24sfNBHh","type":"CoffeePass","credentialSubject":{"Mitarbeiter":{"$gt":0}}}},"verifierId":"did:polygonid:polygon:amoy:2qQ68JkRcf3xrHPQPWZei3YeVzHPP58wYNxx2mEouR","linkNonce":"0"}


***[LibPolygonIdCoreProofDataSource][MainFlow]getProofInputs config param: {"id":"2qSWt96m5y2Szeh2tmQ831NeQAKfGyBBtjkidDy3Y1","profileNonce":"317259953187932414685415879957734517946121556699574088280147554243892997904","claimSubjectProfileNonce":"234101995721426472624480153439958928786053969599841908138499778702748414281","authClaim":["80551937543569765027552589160822318028","0","13530263482613863208747247204521514810087293936518426048693004192093691725603","15383949351443524586040971336212630131819694499306572046416286692457445417038","15930428023331155902","0","0","0"],"authClaimIncMtp":{"existence":true,"siblings":[]},"authClaimNonRevMtp":{"existence":false,"siblings":[]},"gistProof":{"root":"11191653654559293472350790755258314492306342628450134758894175521642966602033","proof":{"existence":false,"siblings":["19442119410559543965431716345044846714029806629652811774202410497162437108773","8710097708803993370836265292138672396845848524673660736680122579408985034784","9734641407564921151176740960573319910635423883974214389975487710855620485451","16500608194916105916901553166055679639576369968104574594619465580143002944095","4704373348274307426003199510978517691597759769613917447127954583992957057417","20030529092363832390554303977743805129420643871008729871676376540073747193608","2251047056866896077989753708353949139682820549532484934224652944097274587800","15451048450163706345251747872821001294745331083890584021649870855318895787543"],"node_aux":{"key":"14416026034464757819495576908079475267633753170468642494726654464434854342093","value":"1885386089965506564449624591296298515955725277385811992525882009595397977570"}}},"treeState":{"state":"14446780852348442496124633889509663206999824313504973815700212852690868836075","claimsRoot":"12683583707795850040820669670290074858310979214458660111804089047242965187120","revocationRoot":"0","rootOfRoots":"0"},"verifiableCredentials":{"id":"https://polygon.hiqs.de/api-ui/v1/credentials/d87c0534-18f5-11ef-8a89-0242ac12000a","@context":["https://www.w3.org/2018/credentials/v1","https://schema.iden3.io/core/jsonld/iden3proofs.jsonld","ipfs://QmRQeGrQSRUsN7WP8kJYwUfgLZhhAVnnjM1e3R24sfNBHh"],"type":["VerifiableCredential","CoffeePass"],"issuanceDate":"2024-05-23T11:16:04.98572806Z","credentialSubject":{"id":"did:polygonid:polygon:amoy:2qYpgjXkZqcfqFVkBZds1asiQtQi9fxJTpbYh2B4Z1","type":"CoffeePass","Mitarbeiter":54546},"credentialStatus":{"id":"https://polygon.hiqs.de/api-ui/v1/credentials/revocation/status/2050771985","revocationNonce":2050771985,"type":"SparseMerkleTreeProof"},"issuer":"did:polygonid:polygon:amoy:2qRvtUgtyi52thWR872CrmWwz8nZMDGphkbyzqxbmN","credentialSchema":{"id":"ipfs://Qmc7Mo824GYfDce3yehu494yWsYqVa96o1ZZAjMH9rKRBx","type":"JsonSchema2023"},"proof":[{"type":"BJJSignature2021","issuerData":{"id":"did:polygonid:polygon:amoy:2qRvtUgtyi52thWR872CrmWwz8nZMDGphkbyzqxbmN","state":{"claimsTreeRoot":"e00ae78b1dfae5babc4c9d828b10b0eb0fa56b25168db86f33b31aed0d2cc02b","value":"4d7cadecb4288c0e24d213ee4f18dffdcbe9e1e32a45760a2db8c9a4ab556211"},"authCoreClaim":"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","mtp":{"existence":true,"siblings":[]},"credentialStatus":{"id":"https://polygon.hiqs.de/api-ui/v1/did%3Apolygonid%3Apolygon%3Aamoy%3A2qRvtUgtyi52thWR872CrmWwz8nZMDGphkbyzqxbmN/claims/revocation/status/0","revocationNonce":0,"type":"SparseMerkleTreeProof","statusIssuer":null}},"coreClaim":"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","signature":"20b10ab520e3717d05e549c91e55b61b13719bee8931b5e039f9f53fcdf9b203c5cf75ae1b326eb056b3bd9a4c5c6abb1a3feb265fef8f891ba78a4e5c708201"}]},"request":{"id":1698672739,"circuitId":"credentialAtomicQuerySigV2","query":{"allowedIssuers":["*"],"context":"ipfs://QmRQeGrQSRUsN7WP8kJYwUfgLZhhAVnnjM1e3R24sfNBHh","type":"CoffeePass","credentialSubject":{"Mitarbeiter":{"$gt":0}}}},"verifierId":"did:polygonid:polygon:amoy:2qQ68JkRcf3xrHPQPWZei3YeVzHPP58wYNxx2mEouR","linkNonce":"0"}


***[calculateAtomicQueryInputs/libPolygonIdCoreProof] exception Instance of 'NullAtomicQueryInputsException'


***[authenticateV2] Error: Instance of 'NullAtomicQueryInputsException'



@nk2103
Copy link

nk2103 commented May 23, 2024

Hi @nk2103 this url https://polygon.***.de/api-ui is reachable from the outside? can you share it with me? (if you don't want to share publicly could you share it in pvt? so I can test it)

@plusema86 i am sorry for late response the url is https://polygon.hiqs.de/api-ui as well as https://polygon.hiqs.de/api and https://polygon.hiqs.de (for issuer ui)

@plusema86
Copy link

Hi @nk2103 this url https://polygon.***.de/api-ui is reachable from the outside? can you share it with me? (if you don't want to share publicly could you share it in pvt? so I can test it)

@plusema86 i am sorry for late response the url is https://polygon.hiqs.de/api-ui as well as https://polygon.hiqs.de/api and https://polygon.hiqs.de (for issuer ui)

@nk2103 could you send me username and password of the issuer ui? if you prefer you can send it to me privately

@nk2103
Copy link

nk2103 commented Jun 5, 2024

@plusema86 i wrote you a Mail with the credentials for log in, did you get it? Or is there a other way to contact you?

@plusema86
Copy link

Hey @nk2103 I missed the email, but I tried on the fly, so I get an error on app side:
error resolving revocation status: unexpected status code: 404
so I guess that your revocation status service is not working as expected, @martinsaporiti do you have any suggestions on configuration side?

@nk2103
Copy link

nk2103 commented Jun 5, 2024

How can you check revocation status on app side? I know there was a option to check it. But after update of polygonid app i cant find it anymore. If i check the revocation status with the API("Get Revocation Status") at https://polygon.hiqs.de/api-ui i get a response:

{ "issuer": { "claimsTreeRoot": "0d5784e4a5f069bf93e46078c2b750d7ed40dc78b8fd7c133e05cd1706c5f700", "state": "7860752239c8d0ee7c3ac681e4e3546525d6baab35a524083002004b4e727302" }, "mtp": { "existence": false, "siblings": [] } }

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants