Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat!: allow to import created dids (and remove legacy publicDidSeed) #1325

Conversation

TimoGlastra
Copy link
Contributor

Dependant on #1286.

This removes the publicDidSeed and publicDid properties from the wallet / agent config and instead require you to import the key / did document into the agent yourself. This is useful if you e.g. have an existing endorser did and want to start using it in AFJ.

If you've previously used the publicDidSeed property you would only need to call the storeCreatedDid property, as the key will already be in the wallet.

I had to find a workaround for indy-sdk that only allows signing ledger requests if you created it using an indy did, not using a key created using createKey. This limits how we only manage keys using the wallet and dids are managed on a higher leverl. To get around this I copied the serialization logic from indy to get the input for a ledger request signature and have implemented it in AFJ. This way we can just call the sign method from indy-sdk instead of the signRequest method and get around this limitation. This means we are not using the dids from indy-sdk at all anymore, but just the lower level key/crypt functionality. I'm quite happy with this change, as it removes one of the last indy-baked-into-core functionalities we have together with #1286 and #1320

BREAKING CHANGE: this PR removes the publicDidSeed and publicDid from the wallet and agent config. These properties were very focused on indy dids, and should now be managed through the DidsApi. If you want to import an existing (endorser) did into the wallet you can do so now using DidsApi.sotreCreatedDid and agent.wallet.createKey.

An example script to import a key and fetch + store the did document (determine for yourself whether this is 'safe'). Make sure to replace <namespace> with the core indyNamespace that you also use for your pool config.

  const key = await agent.wallet.createKey({
    keyType: KeyType.Ed25519,
    privateKey: TypedArrayEncoder.fromString('yourverysecureseed'),
  })

  // did is first 16 bytes of public key encoded as base58
  // if you already know the did, you can hardcode it here as well
  const unqualifiedIndyDid = TypedArrayEncoder.toBase58(key.publicKey.slice(0, 16))

  // resolve and store the did document in the wallet so it can be used
  const didDocument = await agent.dids.resolveDidDocument(`did:indy:<namespace>:${unqualifiedIndyDid}`)
  await agent.dids.storeCreatedDid({ didDocument })

  return unqualifiedIndyDid

@TimoGlastra TimoGlastra requested a review from a team as a code owner February 19, 2023 21:40
@TimoGlastra TimoGlastra changed the title Feat/indy did registration improvements feat!: allow to import created dids (and remove legacy publicDidSeed) Feb 19, 2023
@TimoGlastra TimoGlastra force-pushed the feat/indy-did-registration-improvements branch from b1207b9 to c00fed3 Compare February 19, 2023 21:45
@codecov-commenter
Copy link

codecov-commenter commented Feb 19, 2023

Codecov Report

❗ No coverage uploaded for pull request base (main@dc60acb). Click here to learn what that means.
The diff coverage is 61.76%.

@@           Coverage Diff           @@
##             main    #1325   +/-   ##
=======================================
  Coverage        ?   75.93%           
=======================================
  Files           ?      692           
  Lines           ?    16569           
  Branches        ?     2818           
=======================================
  Hits            ?    12581           
  Misses          ?     3984           
  Partials        ?        4           
Impacted Files Coverage Δ
packages/core/src/agent/AgentConfig.ts 86.36% <ø> (ø)
...ages/core/src/modules/dids/repository/DidRecord.ts 100.00% <ø> (ø)
packages/core/src/types.ts 100.00% <ø> (ø)
...ckages/indy-sdk/src/dids/IndySdkSovDidRegistrar.ts 12.50% <9.52%> (ø)
packages/core/src/modules/dids/DidsApi.ts 59.61% <45.83%> (ø)
packages/indy-sdk/src/wallet/IndySdkWallet.ts 30.41% <46.15%> (ø)
.../core/src/modules/dids/repository/DidRepository.ts 69.69% <50.00%> (ø)
...ages/core/src/wallet/error/WalletKeyExistsError.ts 50.00% <50.00%> (ø)
...ndy-sdk/src/ledger/serializeRequestForSignature.ts 83.33% <83.33%> (ø)
...src/anoncreds/services/IndySdkAnonCredsRegistry.ts 61.37% <88.23%> (ø)
... and 8 more

Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here.

@TimoGlastra TimoGlastra linked an issue Feb 20, 2023 that may be closed by this pull request
Signed-off-by: Timo Glastra <timo@animo.id>
Signed-off-by: Timo Glastra <timo@animo.id>
Signed-off-by: Timo Glastra <timo@animo.id>
@TimoGlastra TimoGlastra force-pushed the feat/indy-did-registration-improvements branch from 78bae4e to c2be477 Compare February 20, 2023 14:57
Copy link
Contributor

@genaris genaris left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Super! Really liked the import function in DidsApi.

// Loop over all private keys and store them in the wallet. We don't check whether the keys are actually associated
// with the did document, this is up to the user.
for (const key of privateKeys) {
// TODO: Should we check if the keys are already in the wallet?
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If a key is already in the wallet, Wallet object is supposed to make us know about it by throwing an Error. The problem is: what's the resulting wallet state if only some of the provided keys are already present? If we got an error when calling this method because of this, we cannot tell afterwards which ones were actually saved, so it could be confusing.

It could be also confusing the fact that probably we set the overwrite flag and we could expect not only the DidRecord to be overwritten if already existing (because we are an average developer that does not read the JSDoc 😛 ).

I think it will be safer to check all provided keys for presence before doing anything that can modify wallet state. But of course this could be part of another PR, once we update Wallet API appropiately.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good points. Let me see how easy it is to check if a key exists. I think I'll have to do some updates to the indy-sdk-react-native for this. Oh well 🤷

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ok, so there's no way to check if a key exists in indy-sdk. You can get metadata, but this will only return something if there's actual metadta for that key.

It does throw WalletItemAlreadyExists error, which we could check if a key already exists by actually thying to create it. But yeah, then you would have the key in the wallet.

So what I'm going to pursue now (please mention if you have a better approach), is the following: loop through all private keys and call createKey. If an error is thrown that the key already exists we just continue as the intended outcome is the same: all private keys are in the wallet.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Agree, I think that's the best we can do for the time being. Would be nice to quickly explain in a comment or add a TODO to remember about it and improve when indy-sdk finally go to a better life ;-).

Signed-off-by: Ariel Gentile <gentilester@gmail.com>
@TimoGlastra
Copy link
Contributor Author

Something wrong the CI.... Looking into it

@TimoGlastra
Copy link
Contributor Author

Would really like to get this one merged today... 👀

@genaris
Copy link
Contributor

genaris commented Feb 24, 2023

Would really like to get this one merged today... 👀

CI is on fire today. We'll make it!

@genaris genaris enabled auto-merge (squash) February 24, 2023 20:07
@genaris genaris merged commit 21d4bf7 into openwallet-foundation:main Feb 24, 2023
karimStekelenburg added a commit to karimStekelenburg/aries-framework-javascript that referenced this pull request Mar 17, 2023
commit 0351eec
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Wed Mar 15 12:02:50 2023 -0300

    fix: connection id in sessions for new connections (openwallet-foundation#1383)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit f27fb99
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Wed Mar 15 09:23:10 2023 -0300

    feat: basic message pthid/thid support (openwallet-foundation#1381)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit d59366a
Author: Jim Ezesinachi <ezesinachijim@gmail.com>
Date:   Wed Mar 15 11:04:52 2023 +0100

    docs: fix example usage of indy-sdk-react-native package (openwallet-foundation#1382)

    Signed-off-by: Jim Ezesinachi <jim@animo.id>

commit a4204ef
Author: Timo Glastra <timo@animo.id>
Date:   Sat Mar 11 16:31:09 2023 +0100

    fix: remove named capture groups (openwallet-foundation#1378)

    named capture groups are only supported in more recent versions of hermes

    Signed-off-by: Timo Glastra <timo@animo.id>

commit dd6c020
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Sat Mar 11 11:57:37 2023 -0300

    feat(anoncreds-rs): use new API methods for json conversion (openwallet-foundation#1373)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit 122cdde
Author: Timo Glastra <timo@animo.id>
Date:   Sat Mar 11 13:31:09 2023 +0100

    fix: return HTTP 415 if unsupported content type (openwallet-foundation#1313)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit 582c711
Author: Mo <10432473+morrieinmaas@users.noreply.github.com>
Date:   Sat Mar 11 12:08:02 2023 +0100

    feat: outbound message send via session (openwallet-foundation#1335)

    Co-authored-by: Jim Ezesinachi <ezesinachijim@gmail.com>
    Co-authored-by: Timo Glastra <timo@animo.id>
    Signed-off-by: Moriarty <moritz@animo.id>

commit 19cefa5
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Sat Mar 11 07:20:49 2023 -0300

    feat(askar): import/export wallet support for SQLite (openwallet-foundation#1377)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit c72ba14
Author: Timo Glastra <timo@animo.id>
Date:   Wed Mar 8 17:40:03 2023 +0100

    fix(askar): custom error handling (openwallet-foundation#1372)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit 39c4ed0
Author: Timo Glastra <timo@animo.id>
Date:   Wed Mar 8 16:52:12 2023 +0100

    feat(indy-vdr)!: extend did:indy support (openwallet-foundation#1362)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit 01669a7
Author: Timo Glastra <timo@animo.id>
Date:   Wed Mar 8 14:48:34 2023 +0100

    test: increase timeout to 120 seconds (openwallet-foundation#1375)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit 953069a
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Mon Mar 6 10:28:30 2023 -0300

    fix(core): repository event when calling deleteById (openwallet-foundation#1356)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit c133538
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Mon Mar 6 08:26:42 2023 -0300

    fix(anoncreds): Buffer not imported from core (openwallet-foundation#1367)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit 8f6b344
Author: Timo Glastra <timo@animo.id>
Date:   Fri Mar 3 12:15:58 2023 +0100

    feat(indy-sdk)!: move to did:indy with limited support (openwallet-foundation#1347)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit 7795975
Author: Martin Auer <martin.auer97@gmail.com>
Date:   Fri Mar 3 11:07:43 2023 +0100

    fix(tenant): Correctly configure storage for multi tenant agents (openwallet-foundation#1359)

    Fixes hyperledger#1353

    Signed-off-by: martin auer <martin.auer97@gmail.com>

commit cb4e469
Author: Timo Glastra <timo@animo.id>
Date:   Thu Mar 2 22:38:14 2023 +0100

    test: various improvements (openwallet-foundation#1361)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit fd13bb8
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Thu Mar 2 17:00:57 2023 -0300

    feat(oob): implicit invitations (openwallet-foundation#1348)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit 18abb18
Author: Pritam Singh <43764373+Zzocker@users.noreply.github.com>
Date:   Thu Mar 2 22:11:20 2023 +0530

    fix: isNewSocket logic (openwallet-foundation#1355)

    Signed-off-by: Pritam Singh <pkspritam16@gmail.com>

commit 2c792fe
Author: Martin Auer <martin.auer97@gmail.com>
Date:   Thu Mar 2 14:29:05 2023 +0100

    refactor!: remove getKeyDidMappingByVerificationMethod (openwallet-foundation#1350)

    Signed-off-by: martin auer <martin.auer97@gmail.com>

commit 78ecf1e
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Wed Mar 1 18:44:26 2023 -0300

    refactor!: remove Dispatcher.registerMessageHandler (openwallet-foundation#1354)

    BREAKING CHANGE:

    `Dispatcher.registerMessageHandler` has been removed in favour of `MessageHandlerRegistry.registerMessageHandler`. If you want to register message handlers in an extension module, you can use directly `agentContext.dependencyManager.registerMessageHandlers`.

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit 1bda3f0
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Mon Feb 27 15:35:16 2023 -0300

    fix(anoncreds-rs): save revocation registry index (openwallet-foundation#1351)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit 4ab3b54
Author: Timo Glastra <timo@animo.id>
Date:   Mon Feb 27 13:23:47 2023 +0100

    refactor!: set default outbound content type to didcomm v1 (openwallet-foundation#1314)

    Signed-off-by: Timo Glastra <timo@animo.id>

    BREAKING CHANGE:

    Agent default outbound content type has been changed to DIDComm V1. If you want to use former behaviour, you can do it so by manually setting `didcommMimeType` in `Agent`'s init config:

    ```
      const agent = new Agent({ config: {
         ...
         didCommMimeType: DidCommMimeType.V0
      }, ...  })
    ```

commit 254f661
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Sat Feb 25 11:49:36 2023 -0300

    fix(indy-sdk): import from core (openwallet-foundation#1346)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit 21d4bf7
Author: Timo Glastra <timo@animo.id>
Date:   Fri Feb 24 22:20:54 2023 +0100

    feat!: allow to import created dids (and remove legacy `publicDidSeed`) (openwallet-foundation#1325)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit dc60acb
Author: Timo Glastra <timo@animo.id>
Date:   Fri Feb 24 20:50:28 2023 +0100

    build(anoncreds): remove node package from deps (openwallet-foundation#1339)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit e14d853
Author: Timo Glastra <timo@animo.id>
Date:   Fri Feb 24 17:59:30 2023 +0100

    test: increase indy-sdk timeout (openwallet-foundation#1345)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit d38ecb1
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Fri Feb 24 09:12:40 2023 -0300

    fix(anoncreds): include prover_did for legacy indy (openwallet-foundation#1342)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit da8f2ad
Author: Niall Shaw <100220424+niall-shaw@users.noreply.github.com>
Date:   Fri Feb 24 13:01:47 2023 +0200

    fix: create new socket if socket state is 'closing' (openwallet-foundation#1337)

    Signed-off-by: Niall Shaw <niall.shaw@absa.africa>

commit cac2ec3
Author: Martin Auer <martin.auer97@gmail.com>
Date:   Fri Feb 24 11:11:28 2023 +0100

    refactor(core)!: remove deprecated injectionContainer prop (openwallet-foundation#1344)

    Signed-off-by: martin auer <martin.auer97@gmail.com>

commit d5e34ff
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Fri Feb 24 06:19:32 2023 -0300

    test(indy-sdk): wait before resolving ledger objects (openwallet-foundation#1340)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit 518e5e4
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Wed Feb 22 04:36:33 2023 -0300

    fix: expose indy pool configs and action menu messages (openwallet-foundation#1333)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit 1c6aeae
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Tue Feb 21 19:18:19 2023 -0300

    fix(askar): anoncrypt messages unpacking (openwallet-foundation#1332)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit fb7ee50
Author: Victor Anene <62852943+Vickysomtee@users.noreply.github.com>
Date:   Tue Feb 21 15:39:14 2023 +0100

    feat: IndyVdrAnonCredsRegistry revocation methods (openwallet-foundation#1328)

    Signed-off-by: Victor Anene <victor@animo.id>

commit 64e20f1
Author: Timo Glastra <timo@animo.id>
Date:   Mon Feb 20 17:07:30 2023 +0100

    fix!: don't emit legacy did:sov prefix for new protocols (openwallet-foundation#1245)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit c0e5339
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Mon Feb 20 09:04:20 2023 -0300

    fix: seed and private key validation and return type in registrars (openwallet-foundation#1324)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit edf392f
Author: Timo Glastra <timo@animo.id>
Date:   Mon Feb 20 12:14:21 2023 +0100

    refactor: remove master secret id from wallet (openwallet-foundation#1320)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit b6d66b1
Author: Timo Glastra <timo@animo.id>
Date:   Mon Feb 20 00:59:42 2023 +0100

    refactor!: remove indy from core (openwallet-foundation#1286)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit 616b908
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Sun Feb 19 13:27:16 2023 -0300

    feat(wallet)!: createKey from private key (openwallet-foundation#1301)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit 64a5da9
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Sat Feb 18 16:54:25 2023 -0300

    fix(samples): dummy module response message type (openwallet-foundation#1321)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit ff5596d
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Fri Feb 17 23:10:09 2023 -0300

    feat!: add data, cache and temp dirs to FileSystem (openwallet-foundation#1306)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

    BREAKING CHANGE:

    Agent-produced files will now be divided in different system paths depending on their nature: data, temp and cache. Previously, they were located at a single location, defaulting to a temporary directory.

    If you specified a custom path in `FileSystem` object constructor, you now must provide an object containing `baseDataPath`, `baseTempPath` and `baseCachePath`. They can point to the same path, although it's recommended to specify different path to avoid future file clashes.

commit af384e8
Author: Timo Glastra <timo@animo.id>
Date:   Sat Feb 18 01:32:45 2023 +0100

    fix: loosen base64 validation (openwallet-foundation#1312)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit 229ed1b
Author: Timo Glastra <timo@animo.id>
Date:   Fri Feb 17 21:31:47 2023 +0100

    fix: thread id improvements (openwallet-foundation#1311)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit 1d782f5
Author: Victor Anene <62852943+Vickysomtee@users.noreply.github.com>
Date:   Fri Feb 17 20:01:35 2023 +0100

    feat: add fetch indy schema method (openwallet-foundation#1290)

    Signed-off-by: Victor Anene <victor@animo.id>

commit 3e02227
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Wed Feb 15 20:14:47 2023 -0300

    fix: imports from core (openwallet-foundation#1303)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit 4ac5332
Author: Jason C. Leach <jason.leach@fullboar.ca>
Date:   Wed Feb 15 14:11:41 2023 -0800

    feat: add devcontainer support (openwallet-foundation#1282)

    Signed-off-by: Jason C. Leach <jason.leach@fullboar.ca>

commit efab8dd
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Tue Feb 14 19:49:59 2023 -0300

    feat(indy-vdr): resolver and registrar for did:indy (openwallet-foundation#1253)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit a487705
Author: Timo Glastra <timo@animo.id>
Date:   Tue Feb 14 10:57:22 2023 +0100

    docs: update readme (openwallet-foundation#1298)

    docs: update reaadme

    Signed-off-by: Timo Glastra <timo@animo.id>

commit ecce0a7
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Mon Feb 13 19:01:39 2023 -0300

    fix(askar): generate nonce suitable for anoncreds (openwallet-foundation#1295)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit c63350c
Author: Timo Glastra <timo@animo.id>
Date:   Mon Feb 13 20:58:46 2023 +0100

    test: add anoncreds restriction test (openwallet-foundation#1294)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit b570e0f
Author: Karim Stekelenburg <karim@animo.id>
Date:   Mon Feb 13 19:49:21 2023 +0100

    fix(indy-vdr): export relevant packages from root (openwallet-foundation#1291)

    Signed-off-by: Karim Stekelenburg <karim@animo.id>

commit c72fd74
Author: Timo Glastra <timo@animo.id>
Date:   Mon Feb 13 18:40:44 2023 +0100

    feat(anoncreds): legacy indy proof format service (openwallet-foundation#1283)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit dfb3eaf
Author: Karim Stekelenburg <karim@animo.id>
Date:   Mon Feb 13 16:23:41 2023 +0100

    build(indy-sdk): set private to false (openwallet-foundation#1293)

    Signed-off-by: Karim Stekelenburg <karim@animo.id>

commit 231145f
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Mon Feb 13 10:22:44 2023 -0300

    chore: make askar, anoncreds(-rs), indy-vdr packages public (openwallet-foundation#1292)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit fb8d58b
Author: Timo Glastra <timo@animo.id>
Date:   Mon Feb 13 12:57:35 2023 +0100

    refactor(proofs)!: generalize proofs api and improve consistency with credentials module (openwallet-foundation#1279)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit 51030d4
Author: Karim Stekelenburg <karim@animo.id>
Date:   Mon Feb 13 11:43:02 2023 +0100

    feat(indy-vdr): module registration (openwallet-foundation#1285)

    Signed-off-by: Karim Stekelenburg <karim@animo.id>

commit d61f6ed
Author: Berend Sliedrecht <61358536+blu3beri@users.noreply.github.com>
Date:   Mon Feb 13 09:23:17 2023 +0100

    chore(core): remove useless file (openwallet-foundation#1288)

commit 30857b9
Author: Berend Sliedrecht <61358536+blu3beri@users.noreply.github.com>
Date:   Sat Feb 11 22:50:10 2023 +0100

    fix(transport)!: added docs moved connection to connectionId (openwallet-foundation#1222)

    Signed-off-by: blu3beri <blu3beri@proton.me>

commit efe0271
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Fri Feb 10 19:15:36 2023 -0300

    feat: add anoncreds-rs package (openwallet-foundation#1275)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit 2669d7d
Author: KolbyRKunz <KolbyKunz@yahoo.com>
Date:   Fri Feb 10 14:14:59 2023 -0700

    fix: set updateAt on records when updating a record (openwallet-foundation#1272)

    Signed-off-by: KolbyRKunz <kolbykunz@yahoo.com>

commit 1d487b1
Author: Jim Ezesinachi <jim@animo.id>
Date:   Fri Feb 10 20:21:20 2023 +0100

    feat: added endpoint setter to agent InitConfig (openwallet-foundation#1278)

    Signed-off-by: Jim Ezesinachi <jim@animo.id>

commit 86cb9d0
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Fri Feb 10 11:13:44 2023 -0300

    ci: increase maximum heap memory for node (openwallet-foundation#1280)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit d056316
Author: Victor Anene <62852943+Vickysomtee@users.noreply.github.com>
Date:   Fri Feb 10 01:31:43 2023 +0100

    feat(indy-vdr): add IndyVdrAnonCredsRegistry (openwallet-foundation#1270)

    Signed-off-by: Timo Glastra <timo@animo.id>

commit f18d189
Author: Ariel Gentile <gentilester@gmail.com>
Date:   Mon Feb 6 23:34:21 2023 -0300

    feat: add initial askar package (openwallet-foundation#1211)

    Signed-off-by: Ariel Gentile <gentilester@gmail.com>

commit 115d897
Author: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Date:   Mon Feb 6 23:45:01 2023 +0000

    build(deps): bump http-cache-semantics from 4.1.0 to 4.1.1 (openwallet-foundation#1258)

commit 3d86e78
Author: Karim Stekelenburg <karim@animo.id>
Date:   Tue Feb 7 00:09:24 2023 +0100

    feat(openid4vc-client): pre-authorized (openwallet-foundation#1243)

    This PR adds support for the `pre-authorized` OpenID for Verifiable Credentials issuance flow to the new `openid4vc-client` module.

    Here are some highlights of the work:
    - Allows the user to execute the entire `pre-authorized` flow by calling a single method.
    - Adds a happy-flow test
        - HTTP(S) requests and responses are mocked using a network mocking library called [nock](https://github.com/nock/nock)
        - Because the JSON-LD credential that is received is expanded by the `W3cCredentialService`, I've added a few new contexts to our test document loader.
        - Not-so-happy-flow tests will be added later on. If you have any suggestions for edge cases that deserve testing, feel free to drop a comment.
    - Modifies the `JwsService`
        - The `JwsService` was geared towards a very specific use case. I've generalized its API so it's usable for a wider range of applications.
        - All pre-existing tests and calls to the `JwsService` have been updated.

    It's worth noting that I have had to add some `@ts-ignore` statements here and there to get around some incomplete types in the `OpenID4VCI-Client` library we're using. Once these issues have been resolved in the client library, they will be removed.

    **Work funded by the government of Ontario**

    ---------

    Signed-off-by: Karim Stekelenburg <karim@animo.id>
    Co-authored-by: Timo Glastra <timo@animo.id>

commit 7f65ba9
Author: Jim Ezesinachi <jim@animo.id>
Date:   Mon Feb 6 22:27:03 2023 +0100

    feat: optional routing for legacy connectionless invitation (openwallet-foundation#1271)

    Signed-off-by: Jim Ezesinachi <jim@animo.id>

commit 3a4c5ec
Author: Timo Glastra <timo@animo.id>
Date:   Mon Feb 6 21:49:12 2023 +0100

    feat(anoncreds): add anoncreds API (openwallet-foundation#1232)

    Signed-off-by: Timo Glastra <timo@animo.id>
karimStekelenburg pushed a commit to karimStekelenburg/aries-framework-javascript that referenced this pull request Mar 17, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Remove publicDid property from the agent and wallet
3 participants