-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ecosystem management #99
Comments
Working through Timo's endpoints, tests and create pubDID to see which ones are outstanding and which ones are not working. From there once we've got our ducks in a row, we'll be a lot quicker to move through this. |
Enforce the trust registry rulesNeed to enforce the trust registry rules in the Cloud API. Issuance
IssuerProcedure for issuer. For each step if the verification fails abort the issuance:
HolderProcedure for holder. For each step if the verification fails abort the issuance:
VerificationRequirements
VerifierProcedure for verifier. For each step if the verification fails abort the proving:
ProverProcedure for prover. For each step if the verification fails abort the proving:
|
Very good overview!
What does
I suppose we can right a validator for all of this that extracts the required params such as actor_id schema_id from cloudapi input and checks against the registry. Then just call that validator in the process.
Same here, cumbersome - I agree - but once written can be made available anywhere in the code.
Also corollary to the above suggestion. Another way is to extend the registry to not only provide a list of actors and then filter that etc. It could also have endpoints itself that answer these questions. So for given actor_id it returns is registered, is verifier...
I already added a did field (default None though).
This could also be a mechanism within the trustregistry instead of the cloudapi.
Not 100% sure here but I was under the impression that the agents will all have a public DID in the YOMA case at least? That would make this check superfluous.
Not sure I can fully follow here 🧐
Again 2. and 3. could be a generic validator (eg fucntion/class) within cloudapi. Or we extend the trust registry functionality to provide convenient answers.
Also question mark for me - not sure here.
I already put a did param (that defaults to None) into the actors model. Not sure hwo best to indicate when it is not a public DID. Any suggestions? I guess we could here as well do this in the trustregistry and automatically do the decoding of multiuse invitations and store the did in the did field?!?
Very thorough and thoughtful of you @TimoGlastra 👍. Let me know what you think and hope this helps already. Whatever you/we agree on doing here eventually, we can also split up and I could for instance do some additions to the trustregistry if required. |
Lol that's not english! I think some left over comment.
AFAIK we're not doing that because we then need to pay for a public DID for all verifiers which we don't want to do. @lohanspies any thoughts?
We need to check whether a verifier is registered in the trust regsitry. If we have the public did that's easy, but otherwise we need to extract it from the invitation. But as you said we should probably also set the DID in the registry for non public DIDs and somehow indicate whether it is public.
I think this has some limitations, or issues because the DID is not the same as the public key. And as the DID is not registered on the ledger we should be checking for the public key. So ideally we would use Thinking of it, we could just use |
If we can leverage ACA-Py as a dependency we can use the |
TODO
Requirements
Required from API to spin up ecosystem partners:
- When a partner onboards as an issuer, Yoma will automatically write a public DID for them.
- Provide schema list to ecosystem partners( as role of issuer). The endpoint exists and will call the schema list for partners to choose from.
- Once schema is chosen, allow ecosystem subwallets to write to ledger via transaction endorser protocol. (Only credential definitions)
The text was updated successfully, but these errors were encountered: