Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AnonCreds Credentials using the W3C Standard - proof value encoding #276

Merged
merged 19 commits into from
Jan 12, 2024

Conversation

Artemkaaas
Copy link
Contributor

@Artemkaaas Artemkaaas commented Nov 22, 2023

Use message pack for encoding proof values of w3c credentials and presentation.
Results of proof value string length on example of credentials signature:

  • base64(JSON) previously used - 3821
  • base64(MessagePack) will be used - 2541
  • base64(CBOR) - 3041

@Artemkaaas Artemkaaas marked this pull request as ready for review November 22, 2023 07:02
@Artemkaaas Artemkaaas force-pushed the anoncreds-w3c-encoding branch 3 times, most recently from ad534b8 to 9b2bffe Compare December 2, 2023 08:55
Signed-off-by: artem.ivanov <artem.ivanov@dsr-corporation.com>
Signed-off-by: artem.ivanov <artem.ivanov@dsr-corporation.com>
Signed-off-by: artem.ivanov <artem.ivanov@dsr-corporation.com>
Signed-off-by: artem.ivanov <artem.ivanov@dsr-corporation.com>
Signed-off-by: artem.ivanov <artem.ivanov@dsr-corporation.com>
Signed-off-by: artem.ivanov <artem.ivanov@dsr-corporation.com>
Signed-off-by: artem.ivanov <artem.ivanov@dsr-corporation.com>
Signed-off-by: artem.ivanov <artem.ivanov@dsr-corporation.com>
# Conflicts:
#	src/data_types/w3c/credential_proof.rs
#	src/data_types/w3c/mod.rs
#	src/data_types/w3c/presentation_proof.rs
#	src/services/w3c/credential_conversion.rs
#	src/services/w3c/issuer.rs
#	src/services/w3c/prover.rs
#	tests/anoncreds_demos.rs
Signed-off-by: artem.ivanov <artem.ivanov@dsr-corporation.com>
…anoncreds-w3c-encoding

# Conflicts:
#	src/data_types/w3c/proof.rs
#	src/services/w3c/verifier.rs
Signed-off-by: artem.ivanov <artem.ivanov@dsr-corporation.com>
Signed-off-by: artem.ivanov <artem.ivanov@dsr-corporation.com>
…anoncreds-w3c-encoding

# Conflicts:
#	src/data_types/w3c/proof.rs
#	src/services/w3c/credential_conversion.rs
#	src/services/w3c/prover.rs
Signed-off-by: artem.ivanov <artem.ivanov@dsr-corporation.com>
Signed-off-by: artem.ivanov <artem.ivanov@dsr-corporation.com>
@andrewwhitehead
Copy link
Member

Tests are failing because a Rust dependency now requires 1.66 or higher. We can either update the CI rust version or add a lockfile in another PR.

@swcurran
Copy link
Member

swcurran commented Jan 9, 2024

Seems like updating would be the prudent thing? What is typically done in this situation? How much risk is bumping the rust version? As I recall — the. #295 is failing one test (Android) because it needs 1.70. Should we bump to that?

@andrewwhitehead
Copy link
Member

There's no real risk in bumping the Rust version used, it just means that we can't guarantee compatibility with older versions. I think the Android failure is different (one of cross's dependencies), and partly fixed by this PR, but it would eventually need a lockfile to maintain its platform support.

@swcurran
Copy link
Member

swcurran commented Jan 9, 2024

OK — just trying to figure out how we get to a decision/action on this. Who makes the call?

@TimoGlastra
Copy link
Member

@berendsliedrecht just checking if this can impose a problem for the supported versions of the RN wrapper if the version is bumped?

…anoncreds-w3c-encoding

Signed-off-by: artem.ivanov <artem.ivanov@dsr-corporation.com>

# Conflicts:
#	src/data_types/w3c/proof.rs
#	src/services/w3c/credential_conversion.rs
#	src/services/w3c/issuer.rs
#	src/services/w3c/prover.rs
#	src/services/w3c/verifier.rs
@swcurran
Copy link
Member

@Artemkaaas --- sorry to be a pain. Looks like we have one unit test failing. Could you please take a look?

test data_types::w3c::proof::tests::encoded_object_encode_decode_works ... FAILED

Fails on both Ubuntu and Windows.

@swcurran swcurran merged commit 6d843c9 into hyperledger:main Jan 12, 2024
26 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants