Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Go metadata sending #861

Merged
merged 1 commit into from
Jul 11, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
78 changes: 37 additions & 41 deletions go/services/account_service.go
Original file line number Diff line number Diff line change
Expand Up @@ -53,19 +53,19 @@ type AccountService interface {
// GetInfo returns details about the wallet associated with the account token
GetInfo(userContext context.Context) (*account.AccountInfoResponse, error)

// BEGIN Interface Code generated by protoc-gen-trinsic. DO NOT EDIT.
// target: ..\sdk\go\services\account_service.go

// Info Get account information
Info(userContext context.Context, request *account.AccountInfoRequest) (*account.AccountInfoResponse, error)
// ListDevices List all connected devices
ListDevices(userContext context.Context, request *account.ListDevicesRequest) (*account.ListDevicesResponse, error)
// RevokeDevice Revoke device access to the account's cloud wallet
RevokeDevice(userContext context.Context, request *account.RevokeDeviceRequest) (*account.RevokeDeviceResponse, error)
// AuthorizeWebhook Authorize Ecosystem to receive webhook events
AuthorizeWebhook(userContext context.Context, request *account.AuthorizeWebhookRequest) (*account.AuthorizeWebhookResponse, error)

// END Interface Code generated by protoc-gen-trinsic. DO NOT EDIT.
// BEGIN Interface Code generated by protoc-gen-trinsic. DO NOT EDIT.
// target: ..\sdk\go\services\account_service.go

// Info Get account information
Info(userContext context.Context, request *account.AccountInfoRequest) (*account.AccountInfoResponse, error)
// ListDevices List all connected devices
ListDevices(userContext context.Context, request *account.ListDevicesRequest) (*account.ListDevicesResponse, error)
// RevokeDevice Revoke device access to the account's cloud wallet
RevokeDevice(userContext context.Context, request *account.RevokeDeviceRequest) (*account.RevokeDeviceResponse, error)
// AuthorizeWebhook Authorize Ecosystem to receive webhook events
AuthorizeWebhook(userContext context.Context, request *account.AuthorizeWebhookRequest) (*account.AuthorizeWebhookResponse, error)

// END Interface Code generated by protoc-gen-trinsic. DO NOT EDIT.
}

type accountBase struct {
Expand Down Expand Up @@ -279,58 +279,54 @@ func ProfileFromToken(token string) (*account.AccountProfile, error) {

// Info Get account information
func (a *accountBase) Info(userContext context.Context, request *account.AccountInfoRequest) (*account.AccountInfoResponse, error) {
// TODO - Handle a flag for the metadata context
// TODO - Handle a flag for the metadata context
md, err := a.GetMetadataContext(userContext, request)
if err != nil {
return nil, err
}
response, err := a.client.Info(md, request)
if err != nil {
if err != nil {
return nil, err
}
response, err := a.client.Info(md, request)
if err != nil {
return nil, err
}
return response, nil
}

// ListDevices List all connected devices
func (a *accountBase) ListDevices(userContext context.Context, request *account.ListDevicesRequest) (*account.ListDevicesResponse, error) {
// TODO - Handle a flag for the metadata context
// TODO - Handle a flag for the metadata context
md, err := a.GetMetadataContext(userContext, request)
if err != nil {
return nil, err
}
response, err := a.client.ListDevices(md, request)
if err != nil {
if err != nil {
return nil, err
}
response, err := a.client.ListDevices(md, request)
if err != nil {
return nil, err
}
return response, nil
}

// RevokeDevice Revoke device access to the account's cloud wallet
func (a *accountBase) RevokeDevice(userContext context.Context, request *account.RevokeDeviceRequest) (*account.RevokeDeviceResponse, error) {
// TODO - Handle a flag for the metadata context
// TODO - Handle a flag for the metadata context
md, err := a.GetMetadataContext(userContext, request)
if err != nil {
return nil, err
}
response, err := a.client.RevokeDevice(md, request)
if err != nil {
if err != nil {
return nil, err
}
response, err := a.client.RevokeDevice(md, request)
if err != nil {
return nil, err
}
return response, nil
}

// AuthorizeWebhook Authorize Ecosystem to receive webhook events
func (a *accountBase) AuthorizeWebhook(userContext context.Context, request *account.AuthorizeWebhookRequest) (*account.AuthorizeWebhookResponse, error) {
// TODO - Handle a flag for the metadata context
// TODO - Handle a flag for the metadata context
md, err := a.GetMetadataContext(userContext, request)
if err != nil {
return nil, err
}
response, err := a.client.AuthorizeWebhook(md, request)
if err != nil {
if err != nil {
return nil, err
}
response, err := a.client.AuthorizeWebhook(md, request)
if err != nil {
return nil, err
}
return response, nil
}

// END Implementation Code generated by protoc-gen-trinsic. DO NOT EDIT.
141 changes: 67 additions & 74 deletions go/services/credential_service.go
Original file line number Diff line number Diff line change
Expand Up @@ -24,30 +24,30 @@ func NewCredentialService(options *Options) (CredentialService, error) {
// CredentialService defines the interface for interacting with credentials
type CredentialService interface {
Service
// BEGIN Interface Code generated by protoc-gen-trinsic. DO NOT EDIT.
// target: ..\sdk\go\services\credential_service.go

// Issue Sign and issue a verifiable credential from a submitted document.
// The document must be a valid JSON-LD document.
Issue(userContext context.Context, request *credential.IssueRequest) (*credential.IssueResponse, error)
// IssueFromTemplate Sign and issue a verifiable credential from a pre-defined template.
// This process will also add schema validation and
// revocation registry entry in the credential.
IssueFromTemplate(userContext context.Context, request *credential.IssueFromTemplateRequest) (*credential.IssueFromTemplateResponse, error)
// CheckStatus Check credential status in the revocation registry
CheckStatus(userContext context.Context, request *credential.CheckStatusRequest) (*credential.CheckStatusResponse, error)
// UpdateStatus Update credential status by setting the revocation value
UpdateStatus(userContext context.Context, request *credential.UpdateStatusRequest) (*credential.UpdateStatusResponse, error)
// CreateProof Create a proof from a signed document that is a valid
// verifiable credential and contains a signature from which a proof can be derived.
CreateProof(userContext context.Context, request *credential.CreateProofRequest) (*credential.CreateProofResponse, error)
// VerifyProof Verifies a proof by checking the signature value, and if possible schema validation,
// revocation status, and issuer status against a trust registry
VerifyProof(userContext context.Context, request *credential.VerifyProofRequest) (*credential.VerifyProofResponse, error)
// Send Sends a document directly to a user's email within the given ecosystem
Send(userContext context.Context, request *credential.SendRequest) (*credential.SendResponse, error)
// BEGIN Interface Code generated by protoc-gen-trinsic. DO NOT EDIT.
// target: ..\sdk\go\services\credential_service.go

// END Interface Code generated by protoc-gen-trinsic. DO NOT EDIT.
// Issue Sign and issue a verifiable credential from a submitted document.
// The document must be a valid JSON-LD document.
Issue(userContext context.Context, request *credential.IssueRequest) (*credential.IssueResponse, error)
// IssueFromTemplate Sign and issue a verifiable credential from a pre-defined template.
// This process will also add schema validation and
// revocation registry values to the credential.
IssueFromTemplate(userContext context.Context, request *credential.IssueFromTemplateRequest) (*credential.IssueFromTemplateResponse, error)
// CheckStatus Check credential status in the revocation registry
CheckStatus(userContext context.Context, request *credential.CheckStatusRequest) (*credential.CheckStatusResponse, error)
// UpdateStatus Update credential status by setting the revocation value
UpdateStatus(userContext context.Context, request *credential.UpdateStatusRequest) (*credential.UpdateStatusResponse, error)
// CreateProof Create a proof from a signed document that is a valid
// verifiable credential and contains a signature from which a proof can be derived.
CreateProof(userContext context.Context, request *credential.CreateProofRequest) (*credential.CreateProofResponse, error)
// VerifyProof Verifies a proof by checking the signature value, and if possible schema validation,
// revocation status, and issuer status against a trust registry
VerifyProof(userContext context.Context, request *credential.VerifyProofRequest) (*credential.VerifyProofResponse, error)
// Send Sends a document directly to a user's email within the given ecosystem
Send(userContext context.Context, request *credential.SendRequest) (*credential.SendResponse, error)

// END Interface Code generated by protoc-gen-trinsic. DO NOT EDIT.
}

type credentialBase struct {
Expand All @@ -61,104 +61,97 @@ type credentialBase struct {
// Issue Sign and issue a verifiable credential from a submitted document.
// The document must be a valid JSON-LD document.
func (c *credentialBase) Issue(userContext context.Context, request *credential.IssueRequest) (*credential.IssueResponse, error) {
// TODO - Handle a flag for the metadata context
// TODO - Handle a flag for the metadata context
md, err := c.GetMetadataContext(userContext, request)
if err != nil {
return nil, err
}
response, err := c.client.Issue(md, request)
if err != nil {
if err != nil {
return nil, err
}
response, err := c.client.Issue(md, request)
if err != nil {
return nil, err
}
return response, nil
}

// IssueFromTemplate Sign and issue a verifiable credential from a pre-defined template.
// This process will also add schema validation and
// revocation registry entry in the credential.
// This process will also add schema validation and
// revocation registry values to the credential.
func (c *credentialBase) IssueFromTemplate(userContext context.Context, request *credential.IssueFromTemplateRequest) (*credential.IssueFromTemplateResponse, error) {
// TODO - Handle a flag for the metadata context
// TODO - Handle a flag for the metadata context
md, err := c.GetMetadataContext(userContext, request)
if err != nil {
return nil, err
}
response, err := c.client.IssueFromTemplate(md, request)
if err != nil {
if err != nil {
return nil, err
}
response, err := c.client.IssueFromTemplate(md, request)
if err != nil {
return nil, err
}
return response, nil
}

// CheckStatus Check credential status in the revocation registry
func (c *credentialBase) CheckStatus(userContext context.Context, request *credential.CheckStatusRequest) (*credential.CheckStatusResponse, error) {
// TODO - Handle a flag for the metadata context
// TODO - Handle a flag for the metadata context
md, err := c.GetMetadataContext(userContext, request)
if err != nil {
return nil, err
}
response, err := c.client.CheckStatus(md, request)
if err != nil {
if err != nil {
return nil, err
}
response, err := c.client.CheckStatus(md, request)
if err != nil {
return nil, err
}
return response, nil
}

// UpdateStatus Update credential status by setting the revocation value
func (c *credentialBase) UpdateStatus(userContext context.Context, request *credential.UpdateStatusRequest) (*credential.UpdateStatusResponse, error) {
// TODO - Handle a flag for the metadata context
// TODO - Handle a flag for the metadata context
md, err := c.GetMetadataContext(userContext, request)
if err != nil {
return nil, err
}
response, err := c.client.UpdateStatus(md, request)
if err != nil {
if err != nil {
return nil, err
}
response, err := c.client.UpdateStatus(md, request)
if err != nil {
return nil, err
}
return response, nil
}

// CreateProof Create a proof from a signed document that is a valid
// verifiable credential and contains a signature from which a proof can be derived.
func (c *credentialBase) CreateProof(userContext context.Context, request *credential.CreateProofRequest) (*credential.CreateProofResponse, error) {
// TODO - Handle a flag for the metadata context
// TODO - Handle a flag for the metadata context
md, err := c.GetMetadataContext(userContext, request)
if err != nil {
return nil, err
}
response, err := c.client.CreateProof(md, request)
if err != nil {
if err != nil {
return nil, err
}
response, err := c.client.CreateProof(md, request)
if err != nil {
return nil, err
}
return response, nil
}

// VerifyProof Verifies a proof by checking the signature value, and if possible schema validation,
// revocation status, and issuer status against a trust registry
func (c *credentialBase) VerifyProof(userContext context.Context, request *credential.VerifyProofRequest) (*credential.VerifyProofResponse, error) {
// TODO - Handle a flag for the metadata context
// TODO - Handle a flag for the metadata context
md, err := c.GetMetadataContext(userContext, request)
if err != nil {
return nil, err
}
response, err := c.client.VerifyProof(md, request)
if err != nil {
if err != nil {
return nil, err
}
response, err := c.client.VerifyProof(md, request)
if err != nil {
return nil, err
}
return response, nil
}

// Send Sends a document directly to a user's email within the given ecosystem
func (c *credentialBase) Send(userContext context.Context, request *credential.SendRequest) (*credential.SendResponse, error) {
// TODO - Handle a flag for the metadata context
// TODO - Handle a flag for the metadata context
md, err := c.GetMetadataContext(userContext, request)
if err != nil {
return nil, err
}
response, err := c.client.Send(md, request)
if err != nil {
if err != nil {
return nil, err
}
response, err := c.client.Send(md, request)
if err != nil {
return nil, err
}
return response, nil
}

// END Implementation Code generated by protoc-gen-trinsic. DO NOT EDIT.