Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: store recipient keys by default #1847

Conversation

TimoGlastra
Copy link
Contributor

When integrating the new invitationDid with a did:cheqd DID, I noticed that DIDComm wouldn't work because the recipientKeyFingerprints weren't added.

To make it easier, it is now calculated in the did record if the did document is provided, and I've also updated the did:indy registrar to store the did document. It's very expensive to resolve these documents, and this will allow us in a future update to shortcut did docs created by us to first look for the local record.

But for now, it makes it easy to use any kind of did with DIDComm.

Signed-off-by: Timo Glastra <timo@animo.id>
Copy link
Contributor

@genaris genaris left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice optimization!

@@ -75,6 +80,11 @@ export class DidRecord extends BaseRecord<DefaultDidTags, CustomDidTags, DidReco
legacyUnqualifiedDid: legacyDid?.unqualifiedDid,
did: this.did,
methodSpecificIdentifier: did.id,

// Calucate if we have a did document, otherwise use the already present recipient keys
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// Calucate if we have a did document, otherwise use the already present recipient keys
// Calculate if we have a did document, otherwise use the already present recipient keys

Signed-off-by: Timo Glastra <timo@animo.id>
@TimoGlastra TimoGlastra merged commit e9238cf into openwallet-foundation:main Apr 30, 2024
12 checks passed
@TimoGlastra TimoGlastra deleted the fix/store-recipient-keys-by-default branch April 30, 2024 12:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants