Skip to content

Conversation

@paulbastian
Copy link
Contributor

@paulbastian paulbastian commented Apr 15, 2024

Closes #93

  • discuss whether proofs array should only contain the key values with the same key type instead of each object containing proof_type
  • add issuer metadata for support of proofs in credential endpoint
  • agree whether to keep or scrap batch credential endpoint or postpone the discussion

@paulbastian paulbastian linked an issue Apr 15, 2024 that may be closed by this pull request
@manecke
Copy link

manecke commented Apr 17, 2024

The example in the "Batch Credential Request" section seems to be broken (in the proofs array). There are too many curly braces. The indentation does not seem to be correct either.

@manecke
Copy link

manecke commented Apr 17, 2024

The square brackets are also not set correctly. The closing brackets are missing several times.

@manecke
Copy link

manecke commented Apr 17, 2024

POST /batch_credential HTTP/1.1
Host: [server.example.com](http://server.example.com/)
Content-Type: application/json
Authorization: BEARER czZCaGRSa3F0MzpnWDFmQmF0M2JW
{
   "credential_requests":[
      {
         "format":"jwt_vc_json",
         "credential_definition":{
            "type":[
               "VerifiableCredential",
               "UniversityDegreeCredential"
            ]
         },
         "proofs":[
            {
               "credential_identifier":"BiologyEngineeringDegree-2023",
               "keys":[
                  {
                     "proof_type":"jwt",
                     "jwt":"eyJ0eXAiOiJvcGVuaWQ0dmNpL...Lb9zioZoipdP-jvh1WlA"
                  },
                  {
                     "proof_type":"jwt",
                     "jwt":"eyJraWQiOiJkaWQ6ZXhhbXBsZ...KPxgihac0aW9EkL1nOzM"
                  }
               ]
            },
            {
               "credential_identifier":"CivilEngineeringDegree-2023",
               "keys":[
                  {
                     "proof_type":"jwt",
                     "jwt":"eyJraWQiOiJkaWQ6ZXhhbXBsZ...KPxgihac0aW9EkL1nOzM"
                  }
               ]
            },
            {
               "credential_identifier":"ElectricalEngineeringDegree-2023",
               "keys":[
                  {
                     "proof_type":"jwt",
                     "jwt":"eyJraWQiOiJkaWQ6ZXhhbXBsZ...KPxgihac0aW9EkL1nOzM"
                  }
               ]
            }
         ]
      }
   ]
}

@paulbastian
Copy link
Contributor Author

I've corrected the JSON structure.

The example that you posted is substantially different though.

@Sakurann
Copy link
Collaborator

if a mechanism to better issue multiple copies of the same credential dataset is added to credential endpoint in a backward compatible manner, I am ok having only one endpoint doing it. though we do need to discuss what it means on the mandatory to implement requirements - 1) we can scrap anything around MTI requirements, 2) say particular request (one credential or copies of the credential or multiple credential) is mandatory, 3) everything in credential endpoint is mandatory.

@paulbastian
Copy link
Contributor Author

paulbastian commented Apr 19, 2024

Following up the discussions from DCP Workshop on 19th of April, there are different options how to continue, so therefore please provide feedback/preferences. Please use emoji reaction of your choice to communicate your preferences.

@paulbastian
Copy link
Contributor Author

A - make a breaking change to the Batch Credential Endpoint (current proposal - only proof[])

@paulbastian
Copy link
Contributor Author

B - make the Batch Credential Request polymorphic (backwards compatible - proof and proofs[] are allowed)

@paulbastian
Copy link
Contributor Author

C - make the Credential and Batch Credential Endpoint polymorphic (backwards compatible - proof and proofs[] are allowed)

@Sakurann
Copy link
Collaborator

We should add in this PR, credential issuer metadata parameter that the issuer uses to indicate how many credential copies it expects.

@bc-pi
Copy link
Member

bc-pi commented Apr 23, 2024

FWIW I would be in favor of the credential endpoint having a mechanism to issue multiple copies of the same credential dataset (and would be fine with the batch endpoint going away).

@paulbastian paulbastian changed the title rework batch credential endpoint rework credential and batch credential endpoint Apr 25, 2024
@paulbastian
Copy link
Contributor Author

credential endpoint with proofs[] issuance of multiple credential istances has been tested successfully at IDunion hackathon at 23/24 of April between 4 participants!

@Sakurann
Copy link
Collaborator

WG call: tobias, Giuseppe, Christian (maybe Brian) to re-review. will merge once there are 4 approvals - hopefully within the next 1-2 days.

@Sakurann
Copy link
Collaborator

will continue the discussion on merging batch/credential endpoints in this issue: #18

@tplooker
Copy link
Contributor

Approved on the proviso that my above minor suggestions are incorperated.

Co-authored-by: Tobias Looker <tobias.looker@mattr.global>
Copy link
Member

@peppelinux peppelinux left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I can say that I can approve it to not block the world.
I would say that this specification is getting too much complex with mixed conditions. Something I would avoid.

@Sakurann
Copy link
Collaborator

@peppelinux the plan is to merge batch credential endpoint and credential endpoint once we merge this PR, but we need to merge this PR to start simplifying things.

Co-authored-by: Giuseppe De Marco <demarcog83@gmail.com>
@paulbastian
Copy link
Contributor Author

@peppelinux changes applied
@Sakurann ready to merge

@peppelinux
Copy link
Member

Go!

Copy link
Member

@c2bo c2bo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

looks good apart from the very minor json error 👍

Co-authored-by: Christian Bormann <8774236+c2bo@users.noreply.github.com>
@Sakurann Sakurann dismissed tlodderstedt’s stale review June 12, 2024 15:04

torsten confirmed he is ok with the current PR

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

How are credential copies issued?