Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature/from funke #241

Merged
merged 79 commits into from
Oct 1, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
79 commits
Select commit Hold shift + click to select a range
c43997f
feat: New status list plugin. Mainly using existing support
nklomp Sep 12, 2024
b5024e0
chore: Latest crypto-ext
sanderPostma Sep 13, 2024
4a29446
chore: Latest pex
sanderPostma Sep 13, 2024
0ad0dcb
chore: SL fixes
nklomp Sep 15, 2024
9f5ffdc
chore: add get status list function
nklomp Sep 15, 2024
29befe9
chore: auto create sl from instance
nklomp Sep 15, 2024
c1cbe8f
chore: small cleanups
nklomp Sep 15, 2024
6dfcb11
chore: fix test
nklomp Sep 15, 2024
db25837
chore: integration from Funke branch
sanderPostma Sep 16, 2024
dee4928
chore: credential hash unique per role
sanderPostma Sep 16, 2024
f02e47f
chore: missing examples
sanderPostma Sep 16, 2024
3b0cd56
chore: increase CI heap to 4g
sanderPostma Sep 16, 2024
7aaefe9
chore: DC delete fix
sanderPostma Sep 16, 2024
f6f9cac
chore: oid4vciHolderStoreCredentials fix
sanderPostma Sep 17, 2024
e2ad2de
chore: added header to kbJwt
sanderPostma Sep 17, 2024
01a5bca
chore: added header to kbJwt
sanderPostma Sep 17, 2024
1e6f9b9
chore: fix sdjwt test
sanderPostma Sep 17, 2024
0593283
chore: export interface SdJwtVcKbJwtPayload
sanderPostma Sep 17, 2024
4100d76
chore: export JWTHeader from 'did-jwt'
sanderPostma Sep 17, 2024
8544d92
chore: fixed sdjwt test
sanderPostma Sep 17, 2024
accc7af
chore: fixed sdjwt SdJwtVcKbJwtHeader
sanderPostma Sep 17, 2024
c5f419c
chore: ignore unused opts
sanderPostma Sep 17, 2024
7771d25
chore: wip
Brummos Sep 18, 2024
f82321d
chore: new pex
sanderPostma Sep 18, 2024
b75c78e
Merge remote-tracking branch 'origin/feat/statuslist_plugin' into fea…
sanderPostma Sep 18, 2024
a52374b
chore: lockfile
sanderPostma Sep 18, 2024
51f8aab
chore: merge fix
sanderPostma Sep 18, 2024
51f0567
chore: switch to 0.30.0
sanderPostma Sep 18, 2024
506d64e
chore: force 0.30.0-unstable
sanderPostma Sep 18, 2024
cb41e13
chore: force 0.30.0-unstable
sanderPostma Sep 18, 2024
dd02191
chore: force 0.30.0-unstable
sanderPostma Sep 18, 2024
df34341
chore: force 0.30.0-unstable
sanderPostma Sep 18, 2024
a3f6320
chore: force 0.30.0-unstable
sanderPostma Sep 18, 2024
36efcc4
chore: compile errors statuslist
sanderPostma Sep 18, 2024
befcded
chore: sd-jwt verification fix
sanderPostma Sep 18, 2024
6762673
chore: version 0.30.0
sanderPostma Sep 19, 2024
7361edc
chore: BREAKING CHANGE force version 0.30.0
sanderPostma Sep 19, 2024
fa772d1
chore: added fixme
sanderPostma Sep 19, 2024
c1a39e2
chore: 0.30.0 try without canary
sanderPostma Sep 19, 2024
2c333b0
chore: temporary allow feature/from-funke to bump version
sanderPostma Sep 19, 2024
60e3fae
chore: fixed ita, fixed EBSI import, workarounds EBSI identifier reso…
sanderPostma Sep 19, 2024
95b39d9
chore: revert canary flag
sanderPostma Sep 19, 2024
186c04c
chore: @sphereon/ssi-sdk-ext.key-manager version bumb
sanderPostma Sep 19, 2024
5a08a74
chore: @sphereon/ssi-sdk-ext.key-manager version bumb
sanderPostma Sep 19, 2024
a24165b
chore: fixed publish:unstable
sanderPostma Sep 19, 2024
d102565
chore: fixed subjectCorrelationType
sanderPostma Sep 20, 2024
0b4b9a9
chore: debug fixes
sanderPostma Sep 20, 2024
12504cf
chore: revert borked changelogs
sanderPostma Sep 20, 2024
0b0a607
chore: fixed rogue keypress
sanderPostma Sep 20, 2024
cc6ac13
chore: updated OID4VCI
sanderPostma Sep 23, 2024
699b387
chore: sd-jwt kid header fix
sanderPostma Sep 23, 2024
77fc458
chore: determineSubjectCorrelation function
sanderPostma Sep 24, 2024
ef503a3
chore: reverted changelogs
sanderPostma Sep 24, 2024
b911ff5
chore: fixed kb.aud
sanderPostma Sep 24, 2024
a60f001
chore: new crypto-ext & allow passing in eventEmitter to DidAuthSiopO…
sanderPostma Sep 25, 2024
3df48b8
chore: new crypto-ext & allow passing in eventEmitter to DidAuthSiopO…
sanderPostma Sep 25, 2024
bcf36bf
chore: lerna config version
sanderPostma Sep 26, 2024
3c671e7
chore: fix in crypto-ext
sanderPostma Sep 26, 2024
2a429b6
chore: temp forced publishing
sanderPostma Sep 26, 2024
44dabf4
fix: fixes issuer signed flow
Brummos Sep 27, 2024
4f88127
Merge branch 'feature/from-funke' into fix/SPRIND-60
Brummos Sep 27, 2024
49e6a66
chore: merge fix
Brummos Sep 27, 2024
44c989f
chore: merge fix
Brummos Sep 27, 2024
d54fb1a
chore: package fixes
Brummos Sep 27, 2024
3d582d9
chore: lockfile update
Brummos Sep 27, 2024
b2695ee
chore: version fixes
Brummos Sep 27, 2024
f55d85c
chore: version fixes
Brummos Sep 27, 2024
fdd05c0
chore: fixes
Brummos Sep 27, 2024
23559a3
chore: fixes
Brummos Sep 27, 2024
368fea1
chore: fixes
Brummos Sep 27, 2024
3326840
chore: fixes
Brummos Sep 27, 2024
f64b8d0
chore: addressing comments
Brummos Sep 27, 2024
9a534b0
Merge pull request #242 from Sphereon-Opensource/fix/SPRIND-60
BtencateSphereon Sep 27, 2024
ff3b48e
bump oid4vc versions
sanderPostma Sep 27, 2024
f17371d
Merge branch 'feature/from-funke' of https://github.com/Sphereon-Open…
sanderPostma Sep 27, 2024
43fa76f
chore: lockfile
sanderPostma Sep 27, 2024
321871d
chore: pex update
sanderPostma Sep 27, 2024
bc65177
fix: codecov
nklomp Oct 1, 2024
e5a7eb7
fix: codecov
nklomp Oct 1, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 10 additions & 1 deletion .github/workflows/build-test-on-pr.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@ jobs:
runs-on: ubuntu-latest
env:
VC_HTTP_API_AUTH_TOKEN: ${{secrets.VC_HTTP_API_AUTH_TOKEN}}
NODE_OPTIONS: --max_old_space_size=4096
services:
postgres:
image: postgres:10.10
Expand Down Expand Up @@ -47,4 +48,12 @@ jobs:
SPHEREON_SSI_MSAL_USERNAME: ${{ secrets.SPHEREON_SSI_MSAL_USERNAME }}
SPHEREON_SSI_MSAL_PASSWORD: ${{ secrets.SPHEREON_SSI_MSAL_PASSWORD }}
run: pnpm test:ci
- run: npx codecov
- uses: codecov/codecov-action@v4
with:
fail_ci_if_error: false # optional (default = false)
files: ./coverage1.xml,./coverage2.xml # optional
flags: unittests # optional
name: codecov-umbrella # optional
token: ${{ secrets.CODECOV_TOKEN }} # required
verbose: true # optional (default = false)

3 changes: 1 addition & 2 deletions .github/workflows/build-test-publish-on-push.yml
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ jobs:
GH_USER: ${{secrets.GH_USER}}
GH_EMAIL: ${{secrets.GH_EMAIL}}
VC_HTTP_API_AUTH_TOKEN: ${{secrets.VC_HTTP_API_AUTH_TOKEN}}
NODE_OPTIONS: --max_old_space_size=4096
runs-on: ubuntu-latest
services:
postgres:
Expand Down Expand Up @@ -71,8 +72,6 @@ jobs:
echo "link-workspace-packages=deep" >> .npmrc
echo "prefer-workspace-packages=true" >> .npmrc

# npm whoami

- name: show diff to track issues with lock file
run: git diff -u

Expand Down
8 changes: 6 additions & 2 deletions lerna.json
Original file line number Diff line number Diff line change
@@ -1,12 +1,16 @@
{
"version": "0.29.0",
"version": "0.30",
"npmClient": "pnpm",
"command": {
"version": {
"forcePublish": true
},
"publish": {
"allowBranch": ["main", "master"],
"allowBranch": [
"main",
"master",
"feature/from-funke"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please revert

],
"conventionalCommits": true,
"gitRemote": "origin",
"message": "chore(release): %s"
Expand Down
5 changes: 3 additions & 2 deletions package.json
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"name": "@sphereon/sphereon-sdk.workspace",
"private": true,
"version": "0.28.0",
"version": "0.30.0",
"description": "Sphereon SSI SDK (Workspace)",
"repository": "[email protected]:Sphereon-Opensource/SSI-SDK.git",
"author": "Sphereon <[email protected]>",
Expand Down Expand Up @@ -113,7 +113,8 @@
"@veramo/url-handler": "4.2.0",
"@sphereon/ssi-types": "workspace:*",
"@sphereon/ssi-sdk.core": "workspace:*",
"@sphereon/pex": "^4.0.1",
"@sphereon/pex": "5.0.0-unstable.8",
"@sphereon/pex-models": "^2.3.1",
"@noble/hashes": "1.2.0",
"debug": "^4.3.5",
"did-jwt": "6.11.6",
Expand Down
2 changes: 1 addition & 1 deletion packages/agent-config/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@sphereon/ssi-sdk.agent-config",
"version": "0.29.0",
"version": "0.30.0",
"source": "src/index.ts",
"main": "dist/index.js",
"types": "dist/index.d.ts",
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
import { DataStoreContactEntities } from '@sphereon/ssi-sdk.data-store'
import { SqliteConnectionOptions } from 'typeorm/driver/sqlite/SqliteConnectionOptions'
import { DataStoreContactMigrations } from '@sphereon/ssi-sdk.data-store/dist/migrations/generic'
import { DataStoreContactMigrations } from '@sphereon/ssi-sdk.data-store'
import { Entities as VeramoDataStoreEntities } from '@veramo/data-store'
import { migrations as VeramoDataStoreMigrations } from '@veramo/data-store/build/migrations'

Expand Down
6 changes: 3 additions & 3 deletions packages/contact-manager-rest-api/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@sphereon/ssi-sdk.contact-manager-rest-api",
"version": "0.29.0",
"version": "0.30.0",
"source": "src/index.ts",
"main": "dist/index.js",
"types": "dist/index.d.ts",
Expand All @@ -12,8 +12,8 @@
},
"dependencies": {
"@sphereon/ssi-express-support": "workspace:*",
"@sphereon/ssi-sdk-ext.key-manager": "0.24.1-next.96",
"@sphereon/ssi-sdk-ext.key-utils": "0.24.1-next.96",
"@sphereon/ssi-sdk-ext.key-manager": "0.24.1-unstable.130",
"@sphereon/ssi-sdk-ext.key-utils": "0.24.1-unstable.130",
"@sphereon/ssi-sdk.contact-manager": "workspace:*",
"@sphereon/ssi-sdk.core": "workspace:*",
"@sphereon/ssi-sdk.data-store": "workspace:*",
Expand Down
2 changes: 1 addition & 1 deletion packages/contact-manager/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@sphereon/ssi-sdk.contact-manager",
"version": "0.29.0",
"version": "0.30.0",
"source": "src/index.ts",
"main": "dist/index.js",
"types": "dist/index.d.ts",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,8 @@ export default (testContext: { getAgent: () => ConfiguredAgent; setup: () => Pro
const digitalCredential: AddDigitalCredential = {
credentialRole: CredentialRole.HOLDER,
tenantId: 'test-tenant',
kmsKeyRef: 'testKeyRef',
identifierMethod: 'did',
issuerCorrelationId: 'did:example:the-issuer',
issuerCorrelationType: CredentialCorrelationType.DID,
rawDocument: JSON.stringify(exampleVC),
Expand All @@ -46,8 +48,10 @@ export default (testContext: { getAgent: () => ConfiguredAgent; setup: () => Pro
const sdJwtAdd: AddDigitalCredential = {
credentialRole: CredentialRole.HOLDER,
tenantId: 'test-tenant',
kmsKeyRef: 'testKeyRef',
identifierMethod: 'did',
issuerCorrelationId: 'CN="test"',
issuerCorrelationType: CredentialCorrelationType.X509_CN,
issuerCorrelationType: CredentialCorrelationType.X509_SAN,
rawDocument: examplePid,
}
pidSdJwtCredential = await agent.crsAddCredential({ credential: sdJwtAdd })
Expand Down Expand Up @@ -205,6 +209,8 @@ export default (testContext: { getAgent: () => ConfiguredAgent; setup: () => Pro
const digitalCredential1: AddDigitalCredential = {
credentialRole: CredentialRole.VERIFIER,
tenantId: 'test-tenant',
kmsKeyRef: 'testKeyRef',
identifierMethod: 'did',
issuerCorrelationId: 'did:example:item1',
issuerCorrelationType: CredentialCorrelationType.DID,
rawDocument: JSON.stringify(exampleVC),
Expand All @@ -216,6 +222,8 @@ export default (testContext: { getAgent: () => ConfiguredAgent; setup: () => Pro
const digitalCredential2: AddDigitalCredential = {
credentialRole: CredentialRole.VERIFIER,
tenantId: 'test-tenant',
kmsKeyRef: 'testKeyRef',
identifierMethod: 'did',
issuerCorrelationId: 'did:example:item2',
issuerCorrelationType: CredentialCorrelationType.DID,
rawDocument: JSON.stringify(exampleVC2),
Expand Down
6 changes: 3 additions & 3 deletions packages/credential-store/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@sphereon/ssi-sdk.credential-store",
"version": "0.29.0",
"version": "0.30.0",
"source": "src/index.ts",
"main": "dist/index.js",
"types": "dist/index.d.ts",
Expand All @@ -15,8 +15,8 @@
"generate-plugin-schema": "ts-node ../../packages/dev/bin/sphereon.js dev generate-plugin-schema"
},
"dependencies": {
"@sphereon/pex": "^4.0.1",
"@sphereon/pex-models": "^2.2.4",
"@sphereon/pex": "5.0.0-unstable.8",
"@sphereon/pex-models": "^2.3.1",
"@sphereon/ssi-sdk.data-store": "workspace:*",
"cross-fetch": "^3.1.8",
"debug": "^4.3.4",
Expand Down
19 changes: 6 additions & 13 deletions packages/credential-store/src/agent/CredentialStore.ts
Original file line number Diff line number Diff line change
@@ -1,5 +1,4 @@
import { IAgentPlugin } from '@veramo/core'
import crypto from 'crypto'
import {
AddCredentialArgs,
credentialIdOrHashFilter,
Expand All @@ -17,8 +16,10 @@ import {
TClaimsColumns,
UniqueDigitalCredential,
} from '../index'
import { AbstractDigitalCredentialStore, DigitalCredential, UpdateCredentialStateArgs } from '@sphereon/ssi-sdk.data-store'
import { AbstractDigitalCredentialStore, DigitalCredential, parseRawDocument, UpdateCredentialStateArgs } from '@sphereon/ssi-sdk.data-store'
import { IVerifiableCredential } from '@sphereon/ssi-types'
import { defaultHasher } from '@sphereon/ssi-sdk.data-store'

// Exposing the methods here for any REST implementation
export const credentialStoreMethods: Array<string> = [
'crsAddCredential',
Expand Down Expand Up @@ -59,7 +60,7 @@ export class CredentialStore implements IAgentPlugin {

/** {@inheritDoc ICRManager.crmAddCredential} */
private async crsAddCredential(args: AddCredentialArgs): Promise<DigitalCredential> {
return await this.store.addCredential({ ...args.credential, opts: { ...args.opts, hasher: args.opts?.hasher ?? this.generateDigest } })
return await this.store.addCredential({ ...args.credential, opts: { ...args.opts, hasher: args.opts?.hasher ?? defaultHasher } })
}

/** {@inheritDoc ICRManager.updateCredentialState} */
Expand All @@ -70,8 +71,7 @@ export class CredentialStore implements IAgentPlugin {
/** {@inheritDoc ICRManager.crmGetCredential} */
private async crsGetCredential(args: GetCredentialArgs): Promise<DigitalCredential> {
const { id } = args
const credential = await this.store.getCredential({ id })
return credential
return await this.store.getCredential({ id })
}

/** {@inheritDoc ICRManager.crmGetCredentials} */
Expand Down Expand Up @@ -219,10 +219,7 @@ export class CredentialStore implements IAgentPlugin {
}

private secureParse<Type>(original: string): Type {
if (original.includes('~')) {
return original as Type
}
return JSON.parse(original)
return parseRawDocument(original) as Type
}

private toUniqueCredentials(credentials: Array<DigitalCredential>): Array<UniqueDigitalCredential> {
Expand Down Expand Up @@ -261,8 +258,4 @@ export class CredentialStore implements IAgentPlugin {
),
)
}

private generateDigest = (data: string, algorithm: string): Uint8Array => {
return new Uint8Array(crypto.createHash(algorithm).update(data).digest())
}
}
3 changes: 2 additions & 1 deletion packages/credential-store/src/types/ICredentialStore.ts
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ import {
ICredential,
IPresentation,
IVerifiableCredential,
IVerifiablePresentation,
OriginalVerifiableCredential,
OriginalVerifiablePresentation,
} from '@sphereon/ssi-types'
Expand Down Expand Up @@ -133,7 +134,7 @@ export interface UniqueDigitalCredential {
originalCredential?: ICredential
originalPresentation?: IPresentation
uniformVerifiableCredential?: IVerifiableCredential
uniformVerifiablePresentation?: IVerifiableCredential
uniformVerifiablePresentation?: IVerifiablePresentation
}

export type OptionalUniqueDigitalCredential = UniqueDigitalCredential | undefined
Expand Down
11 changes: 7 additions & 4 deletions packages/data-store/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@sphereon/ssi-sdk.data-store",
"version": "0.29.0",
"version": "0.30.0",
"source": "src/index.ts",
"main": "dist/index.js",
"types": "dist/index.d.ts",
Expand All @@ -14,21 +14,24 @@
"typeorm-postgres:migration:run": "pnpm run typeorm -- migration:run -c migration-postgres"
},
"dependencies": {
"@sphereon/pex": "^4.0.1",
"@sphereon/ssi-sdk-ext.did-utils": "0.24.1-next.96",
"@sphereon/ssi-sdk-ext.identifier-resolution": "0.24.1-next.96",
"@sphereon/pex": "5.0.0-unstable.8",
"@sphereon/ssi-sdk-ext.did-utils": "0.24.1-unstable.130",
"@sphereon/ssi-sdk-ext.identifier-resolution": "0.24.1-unstable.130",
"@sphereon/ssi-sdk.agent-config": "workspace:*",
"@sphereon/kmp-mdl-mdoc": "0.2.0-SNAPSHOT.22",
"@sphereon/ssi-sdk.core": "workspace:*",
"@sphereon/ssi-types": "workspace:*",
"@veramo/core": "4.2.0",
"@veramo/utils": "4.2.0",
"blakejs": "^1.2.1",
"sha.js": "^2.4.11",
"class-validator": "^0.14.1",
"debug": "^4.3.5",
"typeorm": "^0.3.20"
},
"devDependencies": {
"pg": "^8.12.0",
"@types/sha.js": "^2.4.4",
"sqlite3": "^5.1.7"
},
"files": [
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -41,6 +41,8 @@ describe('Database entities tests', (): void => {
'eyJraWQiOiJkaWQ6a2V5Ono2TWtyaGt5M3B1c20yNk1laUZhWFUzbjJuZWtyYW13RlVtZ0dyZUdHa0RWNnpRaiN6Nk1rcmhreTNwdXNtMjZNZWlGYVhVM24ybmVrcmFtd0ZVbWdHcmVHR2tEVjZ6UWoiLCJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.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.G0M84XVAxSmzGY-NQuB9NBofNrINSn6lvxW6761Vlq6ypvYgtc2xNdpiRmw8ryVNfnpzrr4Z5cB1RlrC05rJAw'
const digitalCredential: AddCredentialArgs = {
rawDocument: rawCredential,
kmsKeyRef: 'testRef',
identifierMethod: 'did',
issuerCorrelationType: CredentialCorrelationType.DID,
subjectCorrelationType: CredentialCorrelationType.DID,
issuerCorrelationId: 'did:key:z6Mkrhky3pusm26MeiFaXU3n2nekramwFUmgGreGGkDV6zQj',
Expand Down Expand Up @@ -68,6 +70,8 @@ describe('Database entities tests', (): void => {
const digitalCredential: NonPersistedDigitalCredential = nonPersistedDigitalCredentialEntityFromAddArgs({
rawDocument:
'eyJraWQiOiJkaWQ6a2V5Ono2TWtyaGt5M3B1c20yNk1laUZhWFUzbjJuZWtyYW13RlVtZ0dyZUdHa0RWNnpRaiN6Nk1rcmhreTNwdXNtMjZNZWlGYVhVM24ybmVrcmFtd0ZVbWdHcmVHR2tEVjZ6UWoiLCJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJ2YyI6eyJAY29udGV4dCI6WyJodHRwczovL3d3dy53My5vcmcvMjAxOC9jcmVkZW50aWFscy92MSIsImh0dHBzOi8vc3BoZXJlb24tb3BlbnNvdXJjZS5naXRodWIuaW8vc3NpLW1vYmlsZS13YWxsZXQvY29udGV4dC9zcGhlcmVvbi13YWxsZXQtaWRlbnRpdHktdjEuanNvbmxkIl0sInR5cGUiOlsiVmVyaWZpYWJsZUNyZWRlbnRpYWwiLCJTcGhlcmVvbldhbGxldElkZW50aXR5Q3JlZGVudGlhbCJdLCJjcmVkZW50aWFsU3ViamVjdCI6eyJmaXJzdE5hbWUiOiJTIiwibGFzdE5hbWUiOiJLIiwiZW1haWxBZGRyZXNzIjoic0BrIn19LCJzdWIiOiJ1cm46dXVpZDpkZGE3YmYyNC04ZTdhLTQxZjgtYjY2Yy1hNDhkYmM1YjEwZmEiLCJqdGkiOiJ1cm46dXVpZDpkZGE3YmYyNC04ZTdhLTQxZjgtYjY2Yy1hNDhkYmM1YjEwZmEiLCJuYmYiOjE3MDg0NDA4MDgsImlzcyI6ImRpZDprZXk6ejZNa3Joa3kzcHVzbTI2TWVpRmFYVTNuMm5la3JhbXdGVW1nR3JlR0drRFY2elFqIn0.G0M84XVAxSmzGY-NQuB9NBofNrINSn6lvxW6761Vlq6ypvYgtc2xNdpiRmw8ryVNfnpzrr4Z5cB1RlrC05rJAw',
kmsKeyRef: 'testRef',
identifierMethod: 'did',
issuerCorrelationType: CredentialCorrelationType.DID,
subjectCorrelationType: CredentialCorrelationType.DID,
issuerCorrelationId: 'did:key:z6Mkrhky3pusm26MeiFaXU3n2nekramwFUmgGreGGkDV6zQj',
Expand All @@ -85,6 +89,8 @@ describe('Database entities tests', (): void => {
const digitalCredential: NonPersistedDigitalCredential = nonPersistedDigitalCredentialEntityFromAddArgs({
rawDocument:
'eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImRpZDpleGFtcGxlOmFiZmUxM2Y3MTIxMjA0MzFjMjc2ZTEyZWNhYiNrZXlzLTEifQ.eyJzdWIiOiJkaWQ6ZXhhbXBsZTplYmZlYjFmNzEyZWJjNmYxYzI3NmUxMmVjMjEiLCJqdGkiOiJodHRwOi8vZXhhbXBsZS5lZHUvY3JlZGVudGlhbHMvMzczMiIsImlzcyI6Imh0dHBzOi8vZXhhbXBsZS5jb20va2V5cy9mb28uandrIiwibmJmIjoxNTQxNDkzNzI0LCJpYXQiOjE1NDE0OTM3MjQsImV4cCI6MTU3MzAyOTcyMywibm9uY2UiOiI2NjAhNjM0NUZTZXIiLCJ2YyI6eyJAY29udGV4dCI6WyJodHRwczovL3d3dy53My5vcmcvMjAxOC9jcmVkZW50aWFscy92MSIsImh0dHBzOi8vd3d3LnczLm9yZy8yMDE4L2NyZWRlbnRpYWxzL2V4YW1wbGVzL3YxIl0sInR5cGUiOlsiVmVyaWZpYWJsZUNyZWRlbnRpYWwiLCJVbml2ZXJzaXR5RGVncmVlQ3JlZGVudGlhbCJdLCJjcmVkZW50aWFsU3ViamVjdCI6eyJkZWdyZWUiOnsidHlwZSI6IkJhY2hlbG9yRGVncmVlIiwibmFtZSI6IjxzcGFuIGxhbmc9J2ZyLUNBJz5CYWNjYWxhdXLDqWF0IGVuIG11c2lxdWVzIG51bcOpcmlxdWVzPC9zcGFuPiJ9fX19.KLJo5GAyBND3LDTn9H7FQokEsUEi8jKwXhGvoN3JtRa51xrNDgXDb0cq1UTYB-rK4Ft9YVmR1NI_ZOF8oGc_7wAp8PHbF2HaWodQIoOBxxT-4WNqAxft7ET6lkH-4S6Ux3rSGAmczMohEEf8eCeN-jC8WekdPl6zKZQj0YPB1rx6X0-xlFBs7cl6Wt8rfBP_tZ9YgVWrQmUWypSioc0MUyiphmyEbLZagTyPlUyflGlEdqrZAv6eSe6RtxJy6M1-lD7a5HTzanYTWBPAUHDZGyGKXdJw-W_x0IWChBzI8t3kpG253fg6V3tPgHeKXE94fz_QpYfg--7kLsyBAfQGbg',
kmsKeyRef: 'testRef',
identifierMethod: 'did',
issuerCorrelationType: CredentialCorrelationType.DID,
subjectCorrelationType: CredentialCorrelationType.DID,
issuerCorrelationId: 'did:key:z6Mkrhky3pusm26MeiFaXU3n2nekramwFUmgGreGGkDV6zQj',
Expand Down Expand Up @@ -128,6 +134,8 @@ describe('Database entities tests', (): void => {
},
],
}),
kmsKeyRef: 'testRef',
identifierMethod: 'did',
issuerCorrelationType: CredentialCorrelationType.DID,
subjectCorrelationType: CredentialCorrelationType.DID,
issuerCorrelationId: 'did:key:z6Mkrhky3pusm26MeiFaXU3n2nekramwFUmgGreGGkDV6zQj',
Expand Down Expand Up @@ -227,6 +235,8 @@ describe('Database entities tests', (): void => {
jws: '...',
},
}),
kmsKeyRef: 'testRef',
identifierMethod: 'did',
issuerCorrelationType: CredentialCorrelationType.DID,
subjectCorrelationType: CredentialCorrelationType.DID,
issuerCorrelationId: 'did:key:z6Mkrhky3pusm26MeiFaXU3n2nekramwFUmgGreGGkDV6zQj',
Expand All @@ -244,6 +254,8 @@ describe('Database entities tests', (): void => {
const digitalCredential: NonPersistedDigitalCredential = nonPersistedDigitalCredentialEntityFromAddArgs({
rawDocument:
'eyJhbGciOiJFZERTQSIsInR5cCI6InZjK3NkLWp3dCIsImtpZCI6IiN6Nk1rdHF0WE5HOENEVVk5UHJydG9TdEZ6ZUNuaHBNbWd4WUwxZ2lrY1czQnp2TlcifQ.eyJ2Y3QiOiJJZGVudGl0eUNyZWRlbnRpYWwiLCJmYW1pbHlfbmFtZSI6IkRvZSIsInBob25lX251bWJlciI6IisxLTIwMi01NTUtMDEwMSIsImFkZHJlc3MiOnsic3RyZWV0X2FkZHJlc3MiOiIxMjMgTWFpbiBTdCIsImxvY2FsaXR5IjoiQW55dG93biIsIl9zZCI6WyJOSm5tY3QwQnFCTUUxSmZCbEM2alJRVlJ1ZXZwRU9OaVl3N0E3TUh1SnlRIiwib201Wnp0WkhCLUdkMDBMRzIxQ1ZfeE00RmFFTlNvaWFPWG5UQUpOY3pCNCJdfSwiY25mIjp7Imp3ayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJFZDI1NTE5IiwieCI6Im9FTlZzeE9VaUg1NFg4d0pMYVZraWNDUmswMHdCSVE0c1JnYms1NE44TW8ifX0sImlzcyI6ImRpZDprZXk6ejZNa3RxdFhORzhDRFVZOVBycnRvU3RGemVDbmhwTW1neFlMMWdpa2NXM0J6dk5XIiwiaWF0IjoxNjk4MTUxNTMyLCJfc2RfYWxnIjoic2hhLTI1NiIsIl9zZCI6WyIxQ3VyMmsyQTJvSUI1Q3NoU0lmX0FfS2ctbDI2dV9xS3VXUTc5UDBWZGFzIiwiUjF6VFV2T1lIZ2NlcGowakh5cEdIejlFSHR0VktmdDB5c3diYzlFVFBiVSIsImVEcVFwZFRYSlhiV2hmLUVzSTd6dzVYNk92WW1GTi1VWlFRTWVzWHdLUHciLCJwZERrMl9YQUtIbzdnT0Fmd0YxYjdPZENVVlRpdDJrSkhheFNFQ1E5eGZjIiwicHNhdUtVTldFaTA5bnUzQ2w4OXhLWGdtcFdFTlpsNXV5MU4xbnluX2pNayIsInNOX2dlMHBIWEY2cW1zWW5YMUE5U2R3SjhjaDhhRU5reGJPRHNUNzRZd0kiXX0.coOK8NzJmEWz4qx-qRhjo-RK7aejrSkQM9La9Cw3eWmzcja9DXrkBoQZKbIJtNoSzSPLjwK2V71W78z0miZsDQ~WyJzYWx0IiwiaXNfb3Zlcl82NSIsdHJ1ZV0~WyJzYWx0IiwiaXNfb3Zlcl8yMSIsdHJ1ZV0~WyJzYWx0IiwiZW1haWwiLCJqb2huZG9lQGV4YW1wbGUuY29tIl0~WyJzYWx0IiwiY291bnRyeSIsIlVTIl0~WyJzYWx0IiwiZ2l2ZW5fbmFtZSIsIkpvaG4iXQ~eyJhbGciOiJFZERTQSIsInR5cCI6ImtiK2p3dCJ9.eyJpYXQiOjE2OTgxNTE1MzIsIm5vbmNlIjoic2FsdCIsImF1ZCI6ImRpZDprZXk6elVDNzRWRXFxaEVIUWNndjR6YWdTUGtxRkp4dU5XdW9CUEtqSnVIRVRFVWVITG9TcVd0OTJ2aVNzbWFXank4MnkiLCJfc2RfaGFzaCI6Ii1kTUd4OGZhUnpOQm91a2EwU0R6V2JkS3JYckw1TFVmUlNQTHN2Q2xPMFkifQ.TQQLqc4ZzoKjQfAghAzC_4aaU3KCS8YqzxAJtzT124guzkv9XSHtPN8d3z181_v-ca2ATXjTRoRciozitE6wBA',
kmsKeyRef: 'testRef',
identifierMethod: 'did',
issuerCorrelationType: CredentialCorrelationType.DID,
subjectCorrelationType: CredentialCorrelationType.DID,
issuerCorrelationId: 'did:key:z6Mkrhky3pusm26MeiFaXU3n2nekramwFUmgGreGGkDV6zQj',
Expand Down
Loading