-
Notifications
You must be signed in to change notification settings - Fork 515
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support EcdsaSecp256r1Signature2019 linked data proof #3443
Support EcdsaSecp256r1Signature2019 linked data proof #3443
Conversation
Signed-off-by: George Mulhearn <gmulhearn@anonyome.com>
update: If this is right, then I suppose an open question is whether An argument to not include |
The original intent of the That being said, I am in favor of enabling ACA-Py to handle Any thoughts on VCDM 2.0 and DI, @PatStLouis? |
Signed-off-by: George Mulhearn <gmulhearn@anonyome.com>
Signed-off-by: George Mulhearn <gmulhearn@anonyome.com>
Signed-off-by: George Mulhearn <gmulhearn@anonyome.com>
The "security hotspots" reported by SonarCloud are not really an issue but it does bring up the question: should those urls be HTTPS? |
Signed-off-by: George Mulhearn <gmulhearn@anonyome.com>
@dbluhm hmmm yea it is interesting. ofcourse i've just copy pasted the contents from the context URL: https://w3id.org/security/multikey/v1 , which has them in http. the links in question auto redirect to https, so in theory i could change them to https. however it feels dishonest to have a context which doesn't match the real source. but yea, definitely a question for upstream (i.e. in w3c). Also on the sonarqube condition about duplicate code, should i try solve this? it's mostly duplicate code of |
Signed-off-by: George Mulhearn <gmulhearn@anonyome.com>
Signed-off-by: George Mulhearn <gmulhearn@anonyome.com>
Signed-off-by: George Mulhearn <gmulhearn@anonyome.com>
@gmulhearn Don't worry about the duplicated code. Sometimes it's a good indicator for a refactor but it's small enough here we can ignore it. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me.
Will wait to approve to give others a chance to review.
acapy_agent/vc/ld_proofs/suites/tests/test_ecdsa_secp256r1_signature_2019.py
Outdated
Show resolved
Hide resolved
acapy_agent/vc/ld_proofs/suites/tests/test_ecdsa_secp256r1_signature_2019.py
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me!
Didn't really review the tests, so that's the main thing I'd ask someone else to double check, that they are indeed meaningful for this feature. I'm kind of out of the loop with this new signature type.
I just left a comment about the maintainability / readability of the present_proof dif handler ... wanted to ask for some minor refactoring, but I realise it's best left for a major rework! And I'll be happy to give that a shot sometime.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
To complement @ff137's review, I focused on reviewing tests and am happy with them. Nice work!
@gmulhearn Can you merge with main one more time? Doesn't allow me to do it. |
@jamshale moving target! re-merged main 👍 |
Quality Gate failedFailed conditions |
NOTE: branched from #3442 (must merge first)
easier diff view: anonyome#4