Skip to content

Commit

Permalink
Merge pull request #241 from Sphereon-Opensource/feature/from-funke
Browse files Browse the repository at this point in the history
Feature/from funke
  • Loading branch information
nklomp authored Oct 1, 2024
2 parents 030d323 + e5a7eb7 commit 8dd0616
Show file tree
Hide file tree
Showing 171 changed files with 5,495 additions and 1,615 deletions.
11 changes: 10 additions & 1 deletion .github/workflows/build-test-on-pr.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@ jobs:
runs-on: ubuntu-latest
env:
VC_HTTP_API_AUTH_TOKEN: ${{secrets.VC_HTTP_API_AUTH_TOKEN}}
NODE_OPTIONS: --max_old_space_size=4096
services:
postgres:
image: postgres:10.10
Expand Down Expand Up @@ -47,4 +48,12 @@ jobs:
SPHEREON_SSI_MSAL_USERNAME: ${{ secrets.SPHEREON_SSI_MSAL_USERNAME }}
SPHEREON_SSI_MSAL_PASSWORD: ${{ secrets.SPHEREON_SSI_MSAL_PASSWORD }}
run: pnpm test:ci
- run: npx codecov
- uses: codecov/codecov-action@v4
with:
fail_ci_if_error: false # optional (default = false)
files: ./coverage1.xml,./coverage2.xml # optional
flags: unittests # optional
name: codecov-umbrella # optional
token: ${{ secrets.CODECOV_TOKEN }} # required
verbose: true # optional (default = false)

3 changes: 1 addition & 2 deletions .github/workflows/build-test-publish-on-push.yml
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ jobs:
GH_USER: ${{secrets.GH_USER}}
GH_EMAIL: ${{secrets.GH_EMAIL}}
VC_HTTP_API_AUTH_TOKEN: ${{secrets.VC_HTTP_API_AUTH_TOKEN}}
NODE_OPTIONS: --max_old_space_size=4096
runs-on: ubuntu-latest
services:
postgres:
Expand Down Expand Up @@ -71,8 +72,6 @@ jobs:
echo "link-workspace-packages=deep" >> .npmrc
echo "prefer-workspace-packages=true" >> .npmrc
# npm whoami

- name: show diff to track issues with lock file
run: git diff -u

Expand Down
8 changes: 6 additions & 2 deletions lerna.json
Original file line number Diff line number Diff line change
@@ -1,12 +1,16 @@
{
"version": "0.29.0",
"version": "0.30",
"npmClient": "pnpm",
"command": {
"version": {
"forcePublish": true
},
"publish": {
"allowBranch": ["main", "master"],
"allowBranch": [
"main",
"master",
"feature/from-funke"
],
"conventionalCommits": true,
"gitRemote": "origin",
"message": "chore(release): %s"
Expand Down
5 changes: 3 additions & 2 deletions package.json
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"name": "@sphereon/sphereon-sdk.workspace",
"private": true,
"version": "0.28.0",
"version": "0.30.0",
"description": "Sphereon SSI SDK (Workspace)",
"repository": "[email protected]:Sphereon-Opensource/SSI-SDK.git",
"author": "Sphereon <[email protected]>",
Expand Down Expand Up @@ -113,7 +113,8 @@
"@veramo/url-handler": "4.2.0",
"@sphereon/ssi-types": "workspace:*",
"@sphereon/ssi-sdk.core": "workspace:*",
"@sphereon/pex": "^4.0.1",
"@sphereon/pex": "5.0.0-unstable.8",
"@sphereon/pex-models": "^2.3.1",
"@noble/hashes": "1.2.0",
"debug": "^4.3.5",
"did-jwt": "6.11.6",
Expand Down
2 changes: 1 addition & 1 deletion packages/agent-config/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@sphereon/ssi-sdk.agent-config",
"version": "0.29.0",
"version": "0.30.0",
"source": "src/index.ts",
"main": "dist/index.js",
"types": "dist/index.d.ts",
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
import { DataStoreContactEntities } from '@sphereon/ssi-sdk.data-store'
import { SqliteConnectionOptions } from 'typeorm/driver/sqlite/SqliteConnectionOptions'
import { DataStoreContactMigrations } from '@sphereon/ssi-sdk.data-store/dist/migrations/generic'
import { DataStoreContactMigrations } from '@sphereon/ssi-sdk.data-store'
import { Entities as VeramoDataStoreEntities } from '@veramo/data-store'
import { migrations as VeramoDataStoreMigrations } from '@veramo/data-store/build/migrations'

Expand Down
6 changes: 3 additions & 3 deletions packages/contact-manager-rest-api/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@sphereon/ssi-sdk.contact-manager-rest-api",
"version": "0.29.0",
"version": "0.30.0",
"source": "src/index.ts",
"main": "dist/index.js",
"types": "dist/index.d.ts",
Expand All @@ -12,8 +12,8 @@
},
"dependencies": {
"@sphereon/ssi-express-support": "workspace:*",
"@sphereon/ssi-sdk-ext.key-manager": "0.24.1-next.96",
"@sphereon/ssi-sdk-ext.key-utils": "0.24.1-next.96",
"@sphereon/ssi-sdk-ext.key-manager": "0.24.1-unstable.130",
"@sphereon/ssi-sdk-ext.key-utils": "0.24.1-unstable.130",
"@sphereon/ssi-sdk.contact-manager": "workspace:*",
"@sphereon/ssi-sdk.core": "workspace:*",
"@sphereon/ssi-sdk.data-store": "workspace:*",
Expand Down
2 changes: 1 addition & 1 deletion packages/contact-manager/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@sphereon/ssi-sdk.contact-manager",
"version": "0.29.0",
"version": "0.30.0",
"source": "src/index.ts",
"main": "dist/index.js",
"types": "dist/index.d.ts",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,8 @@ export default (testContext: { getAgent: () => ConfiguredAgent; setup: () => Pro
const digitalCredential: AddDigitalCredential = {
credentialRole: CredentialRole.HOLDER,
tenantId: 'test-tenant',
kmsKeyRef: 'testKeyRef',
identifierMethod: 'did',
issuerCorrelationId: 'did:example:the-issuer',
issuerCorrelationType: CredentialCorrelationType.DID,
rawDocument: JSON.stringify(exampleVC),
Expand All @@ -46,8 +48,10 @@ export default (testContext: { getAgent: () => ConfiguredAgent; setup: () => Pro
const sdJwtAdd: AddDigitalCredential = {
credentialRole: CredentialRole.HOLDER,
tenantId: 'test-tenant',
kmsKeyRef: 'testKeyRef',
identifierMethod: 'did',
issuerCorrelationId: 'CN="test"',
issuerCorrelationType: CredentialCorrelationType.X509_CN,
issuerCorrelationType: CredentialCorrelationType.X509_SAN,
rawDocument: examplePid,
}
pidSdJwtCredential = await agent.crsAddCredential({ credential: sdJwtAdd })
Expand Down Expand Up @@ -205,6 +209,8 @@ export default (testContext: { getAgent: () => ConfiguredAgent; setup: () => Pro
const digitalCredential1: AddDigitalCredential = {
credentialRole: CredentialRole.VERIFIER,
tenantId: 'test-tenant',
kmsKeyRef: 'testKeyRef',
identifierMethod: 'did',
issuerCorrelationId: 'did:example:item1',
issuerCorrelationType: CredentialCorrelationType.DID,
rawDocument: JSON.stringify(exampleVC),
Expand All @@ -216,6 +222,8 @@ export default (testContext: { getAgent: () => ConfiguredAgent; setup: () => Pro
const digitalCredential2: AddDigitalCredential = {
credentialRole: CredentialRole.VERIFIER,
tenantId: 'test-tenant',
kmsKeyRef: 'testKeyRef',
identifierMethod: 'did',
issuerCorrelationId: 'did:example:item2',
issuerCorrelationType: CredentialCorrelationType.DID,
rawDocument: JSON.stringify(exampleVC2),
Expand Down
6 changes: 3 additions & 3 deletions packages/credential-store/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@sphereon/ssi-sdk.credential-store",
"version": "0.29.0",
"version": "0.30.0",
"source": "src/index.ts",
"main": "dist/index.js",
"types": "dist/index.d.ts",
Expand All @@ -15,8 +15,8 @@
"generate-plugin-schema": "ts-node ../../packages/dev/bin/sphereon.js dev generate-plugin-schema"
},
"dependencies": {
"@sphereon/pex": "^4.0.1",
"@sphereon/pex-models": "^2.2.4",
"@sphereon/pex": "5.0.0-unstable.8",
"@sphereon/pex-models": "^2.3.1",
"@sphereon/ssi-sdk.data-store": "workspace:*",
"cross-fetch": "^3.1.8",
"debug": "^4.3.4",
Expand Down
19 changes: 6 additions & 13 deletions packages/credential-store/src/agent/CredentialStore.ts
Original file line number Diff line number Diff line change
@@ -1,5 +1,4 @@
import { IAgentPlugin } from '@veramo/core'
import crypto from 'crypto'
import {
AddCredentialArgs,
credentialIdOrHashFilter,
Expand All @@ -17,8 +16,10 @@ import {
TClaimsColumns,
UniqueDigitalCredential,
} from '../index'
import { AbstractDigitalCredentialStore, DigitalCredential, UpdateCredentialStateArgs } from '@sphereon/ssi-sdk.data-store'
import { AbstractDigitalCredentialStore, DigitalCredential, parseRawDocument, UpdateCredentialStateArgs } from '@sphereon/ssi-sdk.data-store'
import { IVerifiableCredential } from '@sphereon/ssi-types'
import { defaultHasher } from '@sphereon/ssi-sdk.data-store'

// Exposing the methods here for any REST implementation
export const credentialStoreMethods: Array<string> = [
'crsAddCredential',
Expand Down Expand Up @@ -59,7 +60,7 @@ export class CredentialStore implements IAgentPlugin {

/** {@inheritDoc ICRManager.crmAddCredential} */
private async crsAddCredential(args: AddCredentialArgs): Promise<DigitalCredential> {
return await this.store.addCredential({ ...args.credential, opts: { ...args.opts, hasher: args.opts?.hasher ?? this.generateDigest } })
return await this.store.addCredential({ ...args.credential, opts: { ...args.opts, hasher: args.opts?.hasher ?? defaultHasher } })
}

/** {@inheritDoc ICRManager.updateCredentialState} */
Expand All @@ -70,8 +71,7 @@ export class CredentialStore implements IAgentPlugin {
/** {@inheritDoc ICRManager.crmGetCredential} */
private async crsGetCredential(args: GetCredentialArgs): Promise<DigitalCredential> {
const { id } = args
const credential = await this.store.getCredential({ id })
return credential
return await this.store.getCredential({ id })
}

/** {@inheritDoc ICRManager.crmGetCredentials} */
Expand Down Expand Up @@ -219,10 +219,7 @@ export class CredentialStore implements IAgentPlugin {
}

private secureParse<Type>(original: string): Type {
if (original.includes('~')) {
return original as Type
}
return JSON.parse(original)
return parseRawDocument(original) as Type
}

private toUniqueCredentials(credentials: Array<DigitalCredential>): Array<UniqueDigitalCredential> {
Expand Down Expand Up @@ -261,8 +258,4 @@ export class CredentialStore implements IAgentPlugin {
),
)
}

private generateDigest = (data: string, algorithm: string): Uint8Array => {
return new Uint8Array(crypto.createHash(algorithm).update(data).digest())
}
}
3 changes: 2 additions & 1 deletion packages/credential-store/src/types/ICredentialStore.ts
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ import {
ICredential,
IPresentation,
IVerifiableCredential,
IVerifiablePresentation,
OriginalVerifiableCredential,
OriginalVerifiablePresentation,
} from '@sphereon/ssi-types'
Expand Down Expand Up @@ -133,7 +134,7 @@ export interface UniqueDigitalCredential {
originalCredential?: ICredential
originalPresentation?: IPresentation
uniformVerifiableCredential?: IVerifiableCredential
uniformVerifiablePresentation?: IVerifiableCredential
uniformVerifiablePresentation?: IVerifiablePresentation
}

export type OptionalUniqueDigitalCredential = UniqueDigitalCredential | undefined
Expand Down
11 changes: 7 additions & 4 deletions packages/data-store/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@sphereon/ssi-sdk.data-store",
"version": "0.29.0",
"version": "0.30.0",
"source": "src/index.ts",
"main": "dist/index.js",
"types": "dist/index.d.ts",
Expand All @@ -14,21 +14,24 @@
"typeorm-postgres:migration:run": "pnpm run typeorm -- migration:run -c migration-postgres"
},
"dependencies": {
"@sphereon/pex": "^4.0.1",
"@sphereon/ssi-sdk-ext.did-utils": "0.24.1-next.96",
"@sphereon/ssi-sdk-ext.identifier-resolution": "0.24.1-next.96",
"@sphereon/pex": "5.0.0-unstable.8",
"@sphereon/ssi-sdk-ext.did-utils": "0.24.1-unstable.130",
"@sphereon/ssi-sdk-ext.identifier-resolution": "0.24.1-unstable.130",
"@sphereon/ssi-sdk.agent-config": "workspace:*",
"@sphereon/kmp-mdl-mdoc": "0.2.0-SNAPSHOT.22",
"@sphereon/ssi-sdk.core": "workspace:*",
"@sphereon/ssi-types": "workspace:*",
"@veramo/core": "4.2.0",
"@veramo/utils": "4.2.0",
"blakejs": "^1.2.1",
"sha.js": "^2.4.11",
"class-validator": "^0.14.1",
"debug": "^4.3.5",
"typeorm": "^0.3.20"
},
"devDependencies": {
"pg": "^8.12.0",
"@types/sha.js": "^2.4.4",
"sqlite3": "^5.1.7"
},
"files": [
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -41,6 +41,8 @@ describe('Database entities tests', (): void => {
'eyJraWQiOiJkaWQ6a2V5Ono2TWtyaGt5M3B1c20yNk1laUZhWFUzbjJuZWtyYW13RlVtZ0dyZUdHa0RWNnpRaiN6Nk1rcmhreTNwdXNtMjZNZWlGYVhVM24ybmVrcmFtd0ZVbWdHcmVHR2tEVjZ6UWoiLCJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.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.G0M84XVAxSmzGY-NQuB9NBofNrINSn6lvxW6761Vlq6ypvYgtc2xNdpiRmw8ryVNfnpzrr4Z5cB1RlrC05rJAw'
const digitalCredential: AddCredentialArgs = {
rawDocument: rawCredential,
kmsKeyRef: 'testRef',
identifierMethod: 'did',
issuerCorrelationType: CredentialCorrelationType.DID,
subjectCorrelationType: CredentialCorrelationType.DID,
issuerCorrelationId: 'did:key:z6Mkrhky3pusm26MeiFaXU3n2nekramwFUmgGreGGkDV6zQj',
Expand Down Expand Up @@ -68,6 +70,8 @@ describe('Database entities tests', (): void => {
const digitalCredential: NonPersistedDigitalCredential = nonPersistedDigitalCredentialEntityFromAddArgs({
rawDocument:
'eyJraWQiOiJkaWQ6a2V5Ono2TWtyaGt5M3B1c20yNk1laUZhWFUzbjJuZWtyYW13RlVtZ0dyZUdHa0RWNnpRaiN6Nk1rcmhreTNwdXNtMjZNZWlGYVhVM24ybmVrcmFtd0ZVbWdHcmVHR2tEVjZ6UWoiLCJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.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.G0M84XVAxSmzGY-NQuB9NBofNrINSn6lvxW6761Vlq6ypvYgtc2xNdpiRmw8ryVNfnpzrr4Z5cB1RlrC05rJAw',
kmsKeyRef: 'testRef',
identifierMethod: 'did',
issuerCorrelationType: CredentialCorrelationType.DID,
subjectCorrelationType: CredentialCorrelationType.DID,
issuerCorrelationId: 'did:key:z6Mkrhky3pusm26MeiFaXU3n2nekramwFUmgGreGGkDV6zQj',
Expand All @@ -85,6 +89,8 @@ describe('Database entities tests', (): void => {
const digitalCredential: NonPersistedDigitalCredential = nonPersistedDigitalCredentialEntityFromAddArgs({
rawDocument:
'eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImRpZDpleGFtcGxlOmFiZmUxM2Y3MTIxMjA0MzFjMjc2ZTEyZWNhYiNrZXlzLTEifQ.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.KLJo5GAyBND3LDTn9H7FQokEsUEi8jKwXhGvoN3JtRa51xrNDgXDb0cq1UTYB-rK4Ft9YVmR1NI_ZOF8oGc_7wAp8PHbF2HaWodQIoOBxxT-4WNqAxft7ET6lkH-4S6Ux3rSGAmczMohEEf8eCeN-jC8WekdPl6zKZQj0YPB1rx6X0-xlFBs7cl6Wt8rfBP_tZ9YgVWrQmUWypSioc0MUyiphmyEbLZagTyPlUyflGlEdqrZAv6eSe6RtxJy6M1-lD7a5HTzanYTWBPAUHDZGyGKXdJw-W_x0IWChBzI8t3kpG253fg6V3tPgHeKXE94fz_QpYfg--7kLsyBAfQGbg',
kmsKeyRef: 'testRef',
identifierMethod: 'did',
issuerCorrelationType: CredentialCorrelationType.DID,
subjectCorrelationType: CredentialCorrelationType.DID,
issuerCorrelationId: 'did:key:z6Mkrhky3pusm26MeiFaXU3n2nekramwFUmgGreGGkDV6zQj',
Expand Down Expand Up @@ -128,6 +134,8 @@ describe('Database entities tests', (): void => {
},
],
}),
kmsKeyRef: 'testRef',
identifierMethod: 'did',
issuerCorrelationType: CredentialCorrelationType.DID,
subjectCorrelationType: CredentialCorrelationType.DID,
issuerCorrelationId: 'did:key:z6Mkrhky3pusm26MeiFaXU3n2nekramwFUmgGreGGkDV6zQj',
Expand Down Expand Up @@ -227,6 +235,8 @@ describe('Database entities tests', (): void => {
jws: '...',
},
}),
kmsKeyRef: 'testRef',
identifierMethod: 'did',
issuerCorrelationType: CredentialCorrelationType.DID,
subjectCorrelationType: CredentialCorrelationType.DID,
issuerCorrelationId: 'did:key:z6Mkrhky3pusm26MeiFaXU3n2nekramwFUmgGreGGkDV6zQj',
Expand All @@ -244,6 +254,8 @@ describe('Database entities tests', (): void => {
const digitalCredential: NonPersistedDigitalCredential = nonPersistedDigitalCredentialEntityFromAddArgs({
rawDocument:
'eyJhbGciOiJFZERTQSIsInR5cCI6InZjK3NkLWp3dCIsImtpZCI6IiN6Nk1rdHF0WE5HOENEVVk5UHJydG9TdEZ6ZUNuaHBNbWd4WUwxZ2lrY1czQnp2TlcifQ.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.coOK8NzJmEWz4qx-qRhjo-RK7aejrSkQM9La9Cw3eWmzcja9DXrkBoQZKbIJtNoSzSPLjwK2V71W78z0miZsDQ~WyJzYWx0IiwiaXNfb3Zlcl82NSIsdHJ1ZV0~WyJzYWx0IiwiaXNfb3Zlcl8yMSIsdHJ1ZV0~WyJzYWx0IiwiZW1haWwiLCJqb2huZG9lQGV4YW1wbGUuY29tIl0~WyJzYWx0IiwiY291bnRyeSIsIlVTIl0~WyJzYWx0IiwiZ2l2ZW5fbmFtZSIsIkpvaG4iXQ~eyJhbGciOiJFZERTQSIsInR5cCI6ImtiK2p3dCJ9.eyJpYXQiOjE2OTgxNTE1MzIsIm5vbmNlIjoic2FsdCIsImF1ZCI6ImRpZDprZXk6elVDNzRWRXFxaEVIUWNndjR6YWdTUGtxRkp4dU5XdW9CUEtqSnVIRVRFVWVITG9TcVd0OTJ2aVNzbWFXank4MnkiLCJfc2RfaGFzaCI6Ii1kTUd4OGZhUnpOQm91a2EwU0R6V2JkS3JYckw1TFVmUlNQTHN2Q2xPMFkifQ.TQQLqc4ZzoKjQfAghAzC_4aaU3KCS8YqzxAJtzT124guzkv9XSHtPN8d3z181_v-ca2ATXjTRoRciozitE6wBA',
kmsKeyRef: 'testRef',
identifierMethod: 'did',
issuerCorrelationType: CredentialCorrelationType.DID,
subjectCorrelationType: CredentialCorrelationType.DID,
issuerCorrelationId: 'did:key:z6Mkrhky3pusm26MeiFaXU3n2nekramwFUmgGreGGkDV6zQj',
Expand Down
Loading

0 comments on commit 8dd0616

Please sign in to comment.