Skip to content
This repository has been archived by the owner on Oct 2, 2024. It is now read-only.

Updating to OID4VP_1_0_20 #78

Draft
wants to merge 4 commits into
base: develop
Choose a base branch
from

Conversation

sksadjad
Copy link
Contributor

updated in this pr:

  • added three new client id scheme:
    • verifier_attestation
    • x509_san_dns
    • x509_san_uri
      implemented the checks for verifier_attestation and san_dns

// outputConstName: 'AuthorizationRequestPayloadSchemaVD11',
skipTypeCheck: true
};

let schemas: Schema[] = [
writeSchema(authorizationRequestPayloadVID1),
writeSchema(authorizationRequestPayloadVD11),
writeSchema(authorizationRequestPayloadVD12OID4VPD18),
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why are we removing v18?

@@ -1,4 +1,7 @@
import { JWTVerifyOptions } from 'did-jwt';
import { decodeJWT } from 'did-jwt';
import { JWTDecoded } from 'did-jwt/lib/JWT';
import forge from 'node-forge';
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This cannot work. This library is used in browser, RN and Node. The lib is node only

@@ -34,15 +34,15 @@ export const authorizationRequestVersionDiscovery = (authorizationRequest: Autho
const versions = [];
const authorizationRequestCopy: AuthorizationRequestPayload = JSON.parse(JSON.stringify(authorizationRequest));
// todo: We could use v11 validation for v12 for now, as we do not differentiate in the schema at this point\
const vd12Validation = AuthorizationRequestPayloadVD12OID4VPD18Schema(authorizationRequestCopy);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Don't remove older versions

@TimoGlastra
Copy link
Contributor

It seems there's some overlap with this PR and #82 with the new client_id_schemes. However in #82 the x509 certificate needs to be verified by the JWT verifier callback. We thought this helps in keeping this library a bit more lightweight (and we don't have to import a x509 library)

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants