@cef-ebsi/cli 0.1.1 → 0.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (60) hide show
  1. package/LICENSE +189 -189
  2. package/README.md +55 -54
  3. package/bin/cli.js +13 -13
  4. package/dist/app.js +8 -4
  5. package/dist/app.js.map +1 -1
  6. package/dist/commands/compute.js +10 -9
  7. package/dist/commands/compute.js.map +1 -1
  8. package/dist/scripts/accreditAndAuthorize/conformance/step1 +34 -34
  9. package/dist/scripts/accreditAndAuthorize/conformance/step2 +17 -17
  10. package/dist/scripts/accreditAndAuthorize/conformance/step3 +8 -8
  11. package/dist/scripts/accreditAndAuthorize/conformance/step4 +26 -26
  12. package/dist/scripts/accreditAndAuthorize/conformance/step5 +12 -12
  13. package/dist/scripts/accreditAndAuthorize/conformance/step6 +13 -13
  14. package/dist/scripts/accreditAndAuthorize/conformance/step7 +6 -6
  15. package/dist/scripts/accreditAndAuthorize/test/step1 +34 -34
  16. package/dist/scripts/accreditAndAuthorize/test/step2 +17 -17
  17. package/dist/scripts/accreditAndAuthorize/test/step3 +8 -8
  18. package/dist/scripts/accreditAndAuthorize/test/step4 +26 -26
  19. package/dist/scripts/accreditAndAuthorize/test/step5 +12 -12
  20. package/dist/scripts/accreditAndAuthorize/test/step6 +13 -13
  21. package/dist/scripts/accreditAndAuthorize/test/step7 +6 -6
  22. package/dist/scripts/accreditTI +20 -20
  23. package/dist/scripts/assets/CTRevocableCredential.json +29 -29
  24. package/dist/scripts/assets/CredentialToAttestVerifiableAuthorisationForTrustChain.json +28 -28
  25. package/dist/scripts/assets/VerifiableAccreditationToAccredit.json +35 -35
  26. package/dist/scripts/assets/VerifiableAccreditationToAttest.json +32 -32
  27. package/dist/scripts/assets/VerifiableAuthorisationForTrustChain.json +21 -21
  28. package/dist/scripts/assets/VerifiableAuthorisationToOnboard.json +23 -23
  29. package/dist/scripts/bootstrap/0a-loadTPROperator +5 -5
  30. package/dist/scripts/bootstrap/0b-loadAdmin +8 -6
  31. package/dist/scripts/bootstrap/1-populateTPR +115 -115
  32. package/dist/scripts/bootstrap/2-populateDID +21 -21
  33. package/dist/scripts/bootstrap/3-populateTAR +72 -72
  34. package/dist/scripts/bootstrap/4-populateTimestamp +9 -9
  35. package/dist/scripts/bootstrap/5-populateTIR +9 -9
  36. package/dist/scripts/bootstrap/6-populateTSR +22 -22
  37. package/dist/scripts/bootstrap/7-setupConformanceIssuer +34 -34
  38. package/dist/scripts/initializeContracts +5 -5
  39. package/dist/scripts/issueVcOnboard +9 -0
  40. package/dist/scripts/issueVcRootTAO +11 -0
  41. package/dist/scripts/issueVcTAO +12 -0
  42. package/dist/scripts/issueVcTI +12 -0
  43. package/dist/scripts/issue_CTRevocableCredential +12 -12
  44. package/dist/scripts/issue_SelfAttestationSupportOffice +10 -10
  45. package/dist/scripts/issue_VerifiableAccreditationToAccredit +11 -11
  46. package/dist/scripts/issue_VerifiableAccreditationToAttest +11 -11
  47. package/dist/scripts/issue_VerifiableAuthorisationForTrustChain +10 -10
  48. package/dist/scripts/issue_VerifiableAuthorisationToOnboard +9 -9
  49. package/dist/scripts/preregisterIssuer +6 -0
  50. package/dist/scripts/registerDidDocument_ES256K_ES256 +13 -13
  51. package/dist/scripts/registerIssuer +6 -0
  52. package/dist/scripts/wctv3/accreditAndAuthorize +105 -105
  53. package/dist/scripts/wctv3/holderWallet +29 -29
  54. package/dist/scripts/wctv3/issueToHolder +26 -26
  55. package/dist/scripts/wctv3/pda1 +1 -1
  56. package/dist/scripts/wctv3/verifier +6 -6
  57. package/dist/tsconfig.tsbuildinfo +1 -1
  58. package/dist/utils/Client.js +2 -0
  59. package/dist/utils/Client.js.map +1 -1
  60. package/package.json +98 -98
@@ -1,35 +1,35 @@
1
- # create keys for conformance
2
- using user null
3
- using user ES256K did1
4
- using user ES256 did1 user.privateKeyHex
5
- set confIssuer user
6
-
7
- # register conformance in the DID Registry
8
- proxyledger did insertDidDocument
9
- proxyledger did addVerificationMethod user.did ES256
10
- proxyledger did addVerificationRelationship user.did authentication ES256
11
- proxyledger did addVerificationRelationship user.did assertionMethod ES256
12
-
13
- # conformance service can authorize Root TAOs then it needs to be registered in TPR
14
- run bootstrap/0a-loadTPROperator
15
- proxyledger tpr insertUserAttributes confIssuer.address ["TIR:setAttributeMetadata"]
16
- using user confIssuer
17
-
18
- # registration in the TIR
19
- reservedAttributeId: compute randomID
20
- vc: run issue_SelfAttestationSupportOffice user.did reservedAttributeId
21
- proxyledger tir setAttributeMetadata user.did reservedAttributeId roottao
22
- proxyledger tir setAttributeData user.did reservedAttributeId vc
23
-
24
- # register a proxy
25
- set proxyData {"prefix":"","headers":{},"testSuffix":"/credentials/status/1"}
26
- set proxyData.prefix SET_CONFORMANCE_DOMAIN /conformance/v4/issuer-mock
27
- proxyledger tir addIssuerProxy user.did proxyData
28
- proxyId: compute sha256 proxyData
29
-
30
- set user.accreditationUrl SET_DOMAIN /trusted-issuers-registry/v5/issuers/ user.did /attributes/ reservedAttributeId
31
- set proxyUrl SET_DOMAIN /trusted-issuers-registry/v5/issuers/ user.did /proxies/ proxyId
32
- set user.proxyId proxyId
33
-
34
- view user
1
+ # create keys for conformance
2
+ using user null
3
+ using user ES256K did1
4
+ using user ES256 did1 user.privateKeyHex
5
+ set confIssuer user
6
+
7
+ # register conformance in the DID Registry
8
+ proxyledger did insertDidDocument
9
+ proxyledger did addVerificationMethod user.did ES256
10
+ proxyledger did addVerificationRelationship user.did authentication ES256
11
+ proxyledger did addVerificationRelationship user.did assertionMethod ES256
12
+
13
+ # conformance service can authorize Root TAOs then it needs to be registered in TPR
14
+ run bootstrap/0a-loadTPROperator
15
+ proxyledger tpr insertUserAttributes confIssuer.address ["TIR:setAttributeMetadata"]
16
+ using user confIssuer
17
+
18
+ # registration in the TIR
19
+ reservedAttributeId: compute randomID
20
+ vc: run issue_SelfAttestationSupportOffice user.did reservedAttributeId
21
+ proxyledger tir setAttributeMetadata user.did reservedAttributeId roottao
22
+ proxyledger tir setAttributeData user.did reservedAttributeId vc
23
+
24
+ # register a proxy
25
+ set proxyData {"prefix":"","headers":{},"testSuffix":"/credentials/status/1"}
26
+ set proxyData.prefix SET_CONFORMANCE_DOMAIN /conformance/v4/issuer-mock
27
+ proxyledger tir addIssuerProxy user.did proxyData
28
+ proxyId: compute sha256 proxyData
29
+
30
+ set user.accreditationUrl SET_DOMAIN /trusted-issuers-registry/v5/issuers/ user.did /attributes/ reservedAttributeId
31
+ set proxyUrl SET_DOMAIN /trusted-issuers-registry/v5/issuers/ user.did /proxies/ proxyId
32
+ set user.proxyId proxyId
33
+
34
+ view user
35
35
  view proxyUrl
@@ -1,5 +1,5 @@
1
- proxyledger did setTrustedPoliciesRegistryAddress
2
- proxyledger tar setRegistryAddresses
3
- proxyledger timestamp setTrustedPoliciesRegistryAddress
4
- proxyledger tir setRegistryAddresses
5
- proxyledger tsr setTrustedPoliciesRegistryAddress
1
+ proxyledger did setTrustedPoliciesRegistryAddress
2
+ proxyledger tar setRegistryAddresses
3
+ proxyledger timestamp setTrustedPoliciesRegistryAddress
4
+ proxyledger tir setRegistryAddresses
5
+ proxyledger tsr setTrustedPoliciesRegistryAddress
@@ -0,0 +1,9 @@
1
+ # way of use:
2
+ # ==> run issueVcOnboard <didSubject>
3
+
4
+ payloadVcOnboard: load assets/VerifiableAuthorisationToOnboard.json
5
+ set payloadVcOnboard.issuer user.did
6
+ set payloadVcOnboard.credentialSubject.id $1
7
+ set payloadVcOnboard.termsOfUse.id user.accreditationUrl
8
+ set payloadVcOnboard.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
9
+ compute createVcJwt payloadVcOnboard {} ES256
@@ -0,0 +1,11 @@
1
+ # way of use:
2
+ # ==> run issueVcRootTAO <didSubject>
3
+
4
+ reservedAttributeId: compute randomID
5
+ payloadVcRootTAO: load assets/VerifiableAuthorisationForTrustChain.json
6
+ set payloadVcRootTAO.issuer user.did
7
+ set payloadVcRootTAO.credentialSubject.id $1
8
+ set payloadVcRootTAO.termsOfUse.id user.accreditationUrl
9
+ set payloadVcRootTAO.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
10
+ set payloadVcRootTAO.credentialSubject.reservedAttributeId reservedAttributeId
11
+ compute createVcJwt payloadVcRootTAO {} ES256
@@ -0,0 +1,12 @@
1
+ # way of use:
2
+ # ==> run issueVcTAO <didSubject>
3
+
4
+ reservedAttributeId: compute randomID
5
+ payloadVcTAO: load assets/VerifiableAccreditationToAccredit.json
6
+ set payloadVcTAO.issuer user.did
7
+ set payloadVcTAO.credentialSubject.id $1
8
+ set payloadVcTAO.credentialSubject.accreditedFor.0.schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
9
+ set payloadVcTAO.termsOfUse.0.id user.accreditationUrl
10
+ set payloadVcTAO.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
11
+ set payloadVcTAO.credentialSubject.reservedAttributeId reservedAttributeId
12
+ compute createVcJwt payloadVcTAO {} ES256
@@ -0,0 +1,12 @@
1
+ # way of use:
2
+ # ==> run issueVcTI <didSubject>
3
+
4
+ reservedAttributeId: compute randomID
5
+ payloadVcTI: load assets/VerifiableAccreditationToAttest.json
6
+ set payloadVcTI.issuer user.did
7
+ set payloadVcTI.credentialSubject.id $1
8
+ set payloadVcTI.credentialSubject.accreditedFor.0.schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
9
+ set payloadVcTI.termsOfUse.id user.accreditationUrl
10
+ set payloadVcTI.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
11
+ set payloadVcTI.credentialSubject.reservedAttributeId reservedAttributeId
12
+ compute createVcJwt payloadVcTI {} ES256
@@ -1,13 +1,13 @@
1
- # way of use:
2
- # ==> set domain https://api-test.ebsi.eu
3
- # ==> run issue_CTRevocableCredential <didIssuer> <didSubject> <issuerAttributeIdUrl> <issuerProxyId> <statusIndex> <statusListIndex>
4
-
5
- payloadCTRevocableCredential: load assets/CTRevocableCredential.json
6
- set payloadCTRevocableCredential.issuer $1
7
- set payloadCTRevocableCredential.credentialSubject.id $2
8
- set payloadCTRevocableCredential.termsOfUse.id $3
9
- set payloadCTRevocableCredential.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
10
- set payloadCTRevocableCredential.credentialStatus.id domain /trusted-issuers-registry/v4/issuers/ user.did /proxies/ $4 /credentials/status/ $5
11
- set payloadCTRevocableCredential.credentialStatus.statusListIndex $6
12
- set payloadCTRevocableCredential.credentialStatus.statusListCredential domain /trusted-issuers-registry/v4/issuers/ user.did /proxies/ $4 /credentials/status/ $5
1
+ # way of use:
2
+ # ==> set domain https://api-test.ebsi.eu
3
+ # ==> run issue_CTRevocableCredential <didIssuer> <didSubject> <issuerAttributeIdUrl> <issuerProxyId> <statusIndex> <statusListIndex>
4
+
5
+ payloadCTRevocableCredential: load assets/CTRevocableCredential.json
6
+ set payloadCTRevocableCredential.issuer $1
7
+ set payloadCTRevocableCredential.credentialSubject.id $2
8
+ set payloadCTRevocableCredential.termsOfUse.id $3
9
+ set payloadCTRevocableCredential.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
10
+ set payloadCTRevocableCredential.credentialStatus.id domain /trusted-issuers-registry/v4/issuers/ user.did /proxies/ $4 /credentials/status/ $5
11
+ set payloadCTRevocableCredential.credentialStatus.statusListIndex $6
12
+ set payloadCTRevocableCredential.credentialStatus.statusListCredential domain /trusted-issuers-registry/v4/issuers/ user.did /proxies/ $4 /credentials/status/ $5
13
13
  compute createVcJwt payloadCTRevocableCredential {} ES256
@@ -1,11 +1,11 @@
1
- # way of use:
2
- # ==> set domain https://api-test.ebsi.eu
3
- # ==> run issue_SelfAttestationSupportOffice <didIssuer> <reservedAttributeId>
4
-
5
- payloadVc: load assets/CredentialToAttestVerifiableAuthorisationForTrustChain.json
6
- set payloadVc.issuer $1
7
- set payloadVc.credentialSubject.id $1
8
- set payloadVc.credentialSubject.accreditedFor[0].schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
9
- set payloadVc.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/zjVFNvbEBPAr3a724DttioZpgZmNr75BBtRzZqk7pkDe
10
- set payloadVc.credentialSubject.reservedAttributeId $2
1
+ # way of use:
2
+ # ==> set domain https://api-test.ebsi.eu
3
+ # ==> run issue_SelfAttestationSupportOffice <didIssuer> <reservedAttributeId>
4
+
5
+ payloadVc: load assets/CredentialToAttestVerifiableAuthorisationForTrustChain.json
6
+ set payloadVc.issuer $1
7
+ set payloadVc.credentialSubject.id $1
8
+ set payloadVc.credentialSubject.accreditedFor[0].schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
9
+ set payloadVc.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/zjVFNvbEBPAr3a724DttioZpgZmNr75BBtRzZqk7pkDe
10
+ set payloadVc.credentialSubject.reservedAttributeId $2
11
11
  compute createVcJwt payloadVc {} ES256
@@ -1,12 +1,12 @@
1
- # way of use:
2
- # ==> set domain https://api-test.ebsi.eu
3
- # ==> run issue_VerifiableAccreditationToAccredit <didIssuer> <didSubject> <issuerAttributeIdUrl> <reservedAttributeId>
4
-
5
- payloadVcTAO: load assets/VerifiableAccreditationToAccredit.json
6
- set payloadVcTAO.issuer $1
7
- set payloadVcTAO.credentialSubject.id $2
8
- set payloadVcTAO.credentialSubject.accreditedFor.0.schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
9
- set payloadVcTAO.termsOfUse.0.id $3
10
- set payloadVcTAO.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
11
- set payloadVcTAO.credentialSubject.reservedAttributeId $4
1
+ # way of use:
2
+ # ==> set domain https://api-test.ebsi.eu
3
+ # ==> run issue_VerifiableAccreditationToAccredit <didIssuer> <didSubject> <issuerAttributeIdUrl> <reservedAttributeId>
4
+
5
+ payloadVcTAO: load assets/VerifiableAccreditationToAccredit.json
6
+ set payloadVcTAO.issuer $1
7
+ set payloadVcTAO.credentialSubject.id $2
8
+ set payloadVcTAO.credentialSubject.accreditedFor.0.schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
9
+ set payloadVcTAO.termsOfUse.0.id $3
10
+ set payloadVcTAO.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
11
+ set payloadVcTAO.credentialSubject.reservedAttributeId $4
12
12
  compute createVcJwt payloadVcTAO {} ES256
@@ -1,12 +1,12 @@
1
- # way of use:
2
- # ==> set domain https://api-test.ebsi.eu
3
- # ==> run issue_VerifiableAccreditationToAttest <didIssuer> <didSubject> <issuerAttributeIdUrl> <reservedAttributeId>
4
-
5
- payloadVcTI: load assets/VerifiableAccreditationToAttest.json
6
- set payloadVcTI.issuer $1
7
- set payloadVcTI.credentialSubject.id $2
8
- set payloadVcTI.credentialSubject.accreditedFor.0.schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
9
- set payloadVcTI.termsOfUse.id $3
10
- set payloadVcTI.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
11
- set payloadVcTI.credentialSubject.reservedAttributeId $4
1
+ # way of use:
2
+ # ==> set domain https://api-test.ebsi.eu
3
+ # ==> run issue_VerifiableAccreditationToAttest <didIssuer> <didSubject> <issuerAttributeIdUrl> <reservedAttributeId>
4
+
5
+ payloadVcTI: load assets/VerifiableAccreditationToAttest.json
6
+ set payloadVcTI.issuer $1
7
+ set payloadVcTI.credentialSubject.id $2
8
+ set payloadVcTI.credentialSubject.accreditedFor.0.schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
9
+ set payloadVcTI.termsOfUse.id $3
10
+ set payloadVcTI.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
11
+ set payloadVcTI.credentialSubject.reservedAttributeId $4
12
12
  compute createVcJwt payloadVcTI {} ES256
@@ -1,11 +1,11 @@
1
- # way of use:
2
- # ==> set domain https://api-test.ebsi.eu
3
- # ==> run issue_VerifiableAuthorisationForTrustChain <didIssuer> <didSubject> <issuerAttributeIdUrl> <reservedAttributeId>
4
-
5
- payloadVcRootTAO: load assets/VerifiableAuthorisationForTrustChain.json
6
- set payloadVcRootTAO.issuer $1
7
- set payloadVcRootTAO.credentialSubject.id $2
8
- set payloadVcRootTAO.termsOfUse.id $3
9
- set payloadVcRootTAO.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
10
- set payloadVcRootTAO.credentialSubject.reservedAttributeId $4
1
+ # way of use:
2
+ # ==> set domain https://api-test.ebsi.eu
3
+ # ==> run issue_VerifiableAuthorisationForTrustChain <didIssuer> <didSubject> <issuerAttributeIdUrl> <reservedAttributeId>
4
+
5
+ payloadVcRootTAO: load assets/VerifiableAuthorisationForTrustChain.json
6
+ set payloadVcRootTAO.issuer $1
7
+ set payloadVcRootTAO.credentialSubject.id $2
8
+ set payloadVcRootTAO.termsOfUse.id $3
9
+ set payloadVcRootTAO.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
10
+ set payloadVcRootTAO.credentialSubject.reservedAttributeId $4
11
11
  compute createVcJwt payloadVcRootTAO {} ES256
@@ -1,10 +1,10 @@
1
- # way of use:
2
- # ==> set domain https://api-test.ebsi.eu
3
- # ==> run issue_VerifiableAuthorisationToOnboard <didIssuer> <didSubject> <issuerAttributeIdUrl>
4
-
5
- payloadVcOnboard: load assets/VerifiableAuthorisationToOnboard.json
6
- set payloadVcOnboard.issuer $1
7
- set payloadVcOnboard.credentialSubject.id $2
8
- set payloadVcOnboard.termsOfUse.id $3
9
- set payloadVcOnboard.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
1
+ # way of use:
2
+ # ==> set domain https://api-test.ebsi.eu
3
+ # ==> run issue_VerifiableAuthorisationToOnboard <didIssuer> <didSubject> <issuerAttributeIdUrl>
4
+
5
+ payloadVcOnboard: load assets/VerifiableAuthorisationToOnboard.json
6
+ set payloadVcOnboard.issuer $1
7
+ set payloadVcOnboard.credentialSubject.id $2
8
+ set payloadVcOnboard.termsOfUse.id $3
9
+ set payloadVcOnboard.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
10
10
  compute createVcJwt payloadVcOnboard {} ES256
@@ -0,0 +1,6 @@
1
+ # ==> run preregisterIssuer <didSubject> <issuerType> <vc>
2
+ jwtDecoded: compute decodeJWT $3
3
+ set reservedAttributeId jwtDecoded.payload.vc.credentialSubject.reservedAttributeId
4
+ resAuthTIR: authorisation auth tir_write_presentation ES256
5
+ using token resAuthTIR.access_token
6
+ tir setAttributeMetadata $1 reservedAttributeId $2 user.did user.accreditationId
@@ -1,13 +1,13 @@
1
- # register first part of DID document
2
- resAuthDIDRInvite: authorisation auth didr_invite_presentation ES256 $1
3
- using token resAuthDIDRInvite.access_token
4
-
5
- did insertDidDocument
6
-
7
- # complete DID document
8
- resAuthDIDRWrite: authorisation auth didr_write_presentation ES256K
9
- using token resAuthDIDRWrite.access_token
10
-
11
- did addVerificationMethod user.did ES256
12
- did addVerificationRelationship user.did authentication ES256
13
- did addVerificationRelationship user.did assertionMethod ES256
1
+ # register first part of DID document
2
+ resAuthDIDRInvite: authorisation auth didr_invite_presentation ES256 $1
3
+ using token resAuthDIDRInvite.access_token
4
+
5
+ did insertDidDocument
6
+
7
+ # complete DID document
8
+ resAuthDIDRWrite: authorisation auth didr_write_presentation ES256K
9
+ using token resAuthDIDRWrite.access_token
10
+
11
+ did addVerificationMethod user.did ES256
12
+ did addVerificationRelationship user.did authentication ES256
13
+ did addVerificationRelationship user.did assertionMethod ES256
@@ -0,0 +1,6 @@
1
+ # ==> run registerIssuer <vc>
2
+ jwtDecoded: compute decodeJWT $1
3
+ set reservedAttributeId jwtDecoded.payload.vc.credentialSubject.reservedAttributeId
4
+ resAuthTIR: authorisation auth tir_invite_presentation ES256 $1
5
+ using token resAuthTIR.access_token
6
+ tir setAttributeData user.did reservedAttributeId $1
@@ -1,106 +1,106 @@
1
- env test
2
- set domain https://api-test.ebsi.eu
3
-
4
- # create new issuer
5
- using user null
6
- using user
7
- using user ES256
8
-
9
- # request credential to onboard
10
- vcOnboard: conformance getCredential onboard
11
- set myIssuer user
12
- conformance check ti_request_verifiable_authorisation_to_onboard
13
-
14
- # register did document
15
- run registerDidDocument_ES256K_ES256 vcOnboard.vc
16
- conformance check ti_register_did
17
-
18
- # request VerifiableAccreditationToAttest (TI)
19
- vcTI: conformance getCredential ti
20
- conformance check ti_request_verifiable_accreditation_to_attest
21
-
22
- # register the credential for TI
23
- t: authorisation auth tir_invite_presentation ES256 vcTI.vc
24
- using token t.access_token
25
- tir setAttributeData myIssuer.did vcTI.reservedAttributeId vcTI.vc
26
- set vcTI.url https://api-test.ebsi.eu/trusted-issuers-registry/v4/issuers/ myIssuer.did /attributes/ vcTI.reservedAttributeId
27
- conformance check ti_register_verifiable_accreditation_to_attest
28
-
29
- # create a proxy
30
- conformance clientMockUpdateList 1 0 0
31
- t: authorisation auth tir_write_presentation ES256
32
- using token t.access_token
33
- set proxyData {"prefix":"","headers":{},"testSuffix":"/credentials/status/1"}
34
- set proxyData.prefix myIssuer.clientId
35
- tir addIssuerProxy myIssuer.did proxyData
36
- proxies: tir get /issuers/ myIssuer.did /proxies
37
- set user.proxyId proxies.items.0.proxyId
38
- set user.accreditationUrl vcTI.url
39
- conformance clientMockInitiate
40
-
41
- # issue CTRevocable with credentialStatus StatusList2021
42
- conformance check ti_request_ctrevocable
43
-
44
- # Validate the issued credential details
45
- conformance check ti_validate_ctrevocable
46
-
47
- # revoke credential
48
- statusListIndex: compute statusListIndex did:ebsi:zy8jAhPDbhwKN74YFWAUzD5
49
- conformance clientMockUpdateList 1 statusListIndex 1
50
- conformance check ti_revoke_ctrevocable
51
-
52
- # request VerifiableAccreditationToAccredit (TAO)
53
- vcTAO: conformance getCredential tao
54
- conformance check tao_request_verifiable_accreditation_to_accredit
55
-
56
- # register the credential for TAO
57
- t: authorisation auth tir_write_presentation ES256
58
- using token t.access_token
59
- tir setAttributeData myIssuer.did vcTAO.reservedAttributeId vcTAO.vc
60
- set vcTAO.url https://api-test.ebsi.eu/trusted-issuers-registry/v4/issuers/ myIssuer.did /attributes/ vcTAO.reservedAttributeId
61
- set user.accreditationUrl vcTAO.url
62
- conformance clientMockInitiate
63
- conformance check tao_register_verifiable_accreditation_to_accredit
64
-
65
- # request credential to onboard sub-account
66
- conformance check tao_request_verifiable_authorisation_to_onboard_subaccount
67
-
68
- # validate credential and register sub-account
69
- conformance check tao_validate_verifiable_authorisation_to_onboard_subaccount
70
-
71
- # request VerifiableAccreditationToAttest for sub-account (TI)
72
- conformance check tao_request_verifiable_accreditation_to_attest_subaccount
73
-
74
- # validate and register credential for sub-account
75
- conformance check tao_validate_verifiable_accreditation_to_attest_subaccount
76
-
77
- # request VerifiableAccreditationToAccredit for sub-account (TAO)
78
- conformance check tao_request_verifiable_accreditation_to_accredit_subaccount
79
-
80
- # validate and register credential for sub-account
81
- conformance check tao_validate_verifiable_accreditation_to_accredit_subaccount
82
-
83
- # revoke credentials issued to subaccount
84
- subaccount: compute subaccountDid myIssuer.did
85
- attributes: tir get /issuers/ subaccount /attributes
86
- t: authorisation auth tir_write_presentation ES256
87
- using token t.access_token
88
- tir setAttributeMetadata subaccount attributes.items.0.id revoked myIssuer.did vcTAO.reservedAttributeId
89
- tir setAttributeMetadata subaccount attributes.items.1.id revoked myIssuer.did vcTAO.reservedAttributeId
90
- conformance check tao_revoke_rights_subaccount
91
-
92
- # request VerifiableAuthorisationForTrustChain (Root TAO)
93
- vcRootTAO: conformance getCredential roottao ES256 vcOnboard.vc
94
- conformance check rtao_request_verifiableauthorisationfortrustchain
95
-
96
- # register the credential for RootTAO
97
- t: authorisation auth tir_write_presentation ES256
98
- using token t.access_token
99
- tir setAttributeData myIssuer.did vcRootTAO.reservedAttributeId vcRootTAO.vc
100
- conformance check rtao_register_verifiableauthorisationfortrustchain
101
-
102
- # request CTAAQualificationCredential
103
- ctaaQualification: conformance getCredential qualification
104
- conformance check request_ctaaqualificationcredential
105
-
1
+ env test
2
+ set domain https://api-test.ebsi.eu
3
+
4
+ # create new issuer
5
+ using user null
6
+ using user
7
+ using user ES256
8
+
9
+ # request credential to onboard
10
+ vcOnboard: conformance getCredential onboard
11
+ set myIssuer user
12
+ conformance check ti_request_verifiable_authorisation_to_onboard
13
+
14
+ # register did document
15
+ run registerDidDocument_ES256K_ES256 vcOnboard.vc
16
+ conformance check ti_register_did
17
+
18
+ # request VerifiableAccreditationToAttest (TI)
19
+ vcTI: conformance getCredential ti
20
+ conformance check ti_request_verifiable_accreditation_to_attest
21
+
22
+ # register the credential for TI
23
+ t: authorisation auth tir_invite_presentation ES256 vcTI.vc
24
+ using token t.access_token
25
+ tir setAttributeData myIssuer.did vcTI.reservedAttributeId vcTI.vc
26
+ set vcTI.url https://api-test.ebsi.eu/trusted-issuers-registry/v4/issuers/ myIssuer.did /attributes/ vcTI.reservedAttributeId
27
+ conformance check ti_register_verifiable_accreditation_to_attest
28
+
29
+ # create a proxy
30
+ conformance clientMockUpdateList 1 0 0
31
+ t: authorisation auth tir_write_presentation ES256
32
+ using token t.access_token
33
+ set proxyData {"prefix":"","headers":{},"testSuffix":"/credentials/status/1"}
34
+ set proxyData.prefix myIssuer.clientId
35
+ tir addIssuerProxy myIssuer.did proxyData
36
+ proxies: tir get /issuers/ myIssuer.did /proxies
37
+ set user.proxyId proxies.items.0.proxyId
38
+ set user.accreditationUrl vcTI.url
39
+ conformance clientMockInitiate
40
+
41
+ # issue CTRevocable with credentialStatus StatusList2021
42
+ conformance check ti_request_ctrevocable
43
+
44
+ # Validate the issued credential details
45
+ conformance check ti_validate_ctrevocable
46
+
47
+ # revoke credential
48
+ statusListIndex: compute statusListIndex did:ebsi:zy8jAhPDbhwKN74YFWAUzD5
49
+ conformance clientMockUpdateList 1 statusListIndex 1
50
+ conformance check ti_revoke_ctrevocable
51
+
52
+ # request VerifiableAccreditationToAccredit (TAO)
53
+ vcTAO: conformance getCredential tao
54
+ conformance check tao_request_verifiable_accreditation_to_accredit
55
+
56
+ # register the credential for TAO
57
+ t: authorisation auth tir_write_presentation ES256
58
+ using token t.access_token
59
+ tir setAttributeData myIssuer.did vcTAO.reservedAttributeId vcTAO.vc
60
+ set vcTAO.url https://api-test.ebsi.eu/trusted-issuers-registry/v4/issuers/ myIssuer.did /attributes/ vcTAO.reservedAttributeId
61
+ set user.accreditationUrl vcTAO.url
62
+ conformance clientMockInitiate
63
+ conformance check tao_register_verifiable_accreditation_to_accredit
64
+
65
+ # request credential to onboard sub-account
66
+ conformance check tao_request_verifiable_authorisation_to_onboard_subaccount
67
+
68
+ # validate credential and register sub-account
69
+ conformance check tao_validate_verifiable_authorisation_to_onboard_subaccount
70
+
71
+ # request VerifiableAccreditationToAttest for sub-account (TI)
72
+ conformance check tao_request_verifiable_accreditation_to_attest_subaccount
73
+
74
+ # validate and register credential for sub-account
75
+ conformance check tao_validate_verifiable_accreditation_to_attest_subaccount
76
+
77
+ # request VerifiableAccreditationToAccredit for sub-account (TAO)
78
+ conformance check tao_request_verifiable_accreditation_to_accredit_subaccount
79
+
80
+ # validate and register credential for sub-account
81
+ conformance check tao_validate_verifiable_accreditation_to_accredit_subaccount
82
+
83
+ # revoke credentials issued to subaccount
84
+ subaccount: compute subaccountDid myIssuer.did
85
+ attributes: tir get /issuers/ subaccount /attributes
86
+ t: authorisation auth tir_write_presentation ES256
87
+ using token t.access_token
88
+ tir setAttributeMetadata subaccount attributes.items.0.id revoked myIssuer.did vcTAO.reservedAttributeId
89
+ tir setAttributeMetadata subaccount attributes.items.1.id revoked myIssuer.did vcTAO.reservedAttributeId
90
+ conformance check tao_revoke_rights_subaccount
91
+
92
+ # request VerifiableAuthorisationForTrustChain (Root TAO)
93
+ vcRootTAO: conformance getCredential roottao ES256 vcOnboard.vc
94
+ conformance check rtao_request_verifiableauthorisationfortrustchain
95
+
96
+ # register the credential for RootTAO
97
+ t: authorisation auth tir_write_presentation ES256
98
+ using token t.access_token
99
+ tir setAttributeData myIssuer.did vcRootTAO.reservedAttributeId vcRootTAO.vc
100
+ conformance check rtao_register_verifiableauthorisationfortrustchain
101
+
102
+ # request CTAAQualificationCredential
103
+ ctaaQualification: conformance getCredential qualification
104
+ conformance check request_ctaaqualificationcredential
105
+
106
106
  # ACCREDIT AND AUTHORIZE TESTS FINISHED!!
@@ -1,29 +1,29 @@
1
- using user ES256 did2
2
-
3
- c0: conformance holder CTWalletCrossInTime inTime
4
- conformance check ct_wallet_cross_in_time
5
-
6
- c1: conformance holder CTWalletCrossDeferred deferred
7
- conformance check ct_wallet_cross_deferred
8
-
9
- c2: conformance holder CTWalletCrossPreAuthorised preAuthorised
10
- conformance check ct_wallet_cross_pre_authorised
11
-
12
- c3: conformance holder CTWalletSameInTime inTime
13
- conformance check ct_wallet_same_in_time
14
-
15
- c4: conformance holder CTWalletSameDeferred deferred
16
- conformance check ct_wallet_same_deferred
17
-
18
- c5: conformance holder CTWalletSamePreAuthorised preAuthorised
19
- conformance check ct_wallet_same_pre_authorised
20
-
21
- set credentials []
22
- set credentials.0 c0
23
- set credentials.1 c1
24
- set credentials.2 c2
25
- set credentials.3 c3
26
- set credentials.4 c4
27
- set credentials.5 c5
28
- conformance holder CTWalletQualificationCredential inTime ES256 credentials
29
- conformance check request_ct_wallet_qualification_credential
1
+ using user ES256 did2
2
+
3
+ c0: conformance holder CTWalletCrossInTime inTime
4
+ conformance check ct_wallet_cross_in_time
5
+
6
+ c1: conformance holder CTWalletCrossDeferred deferred
7
+ conformance check ct_wallet_cross_deferred
8
+
9
+ c2: conformance holder CTWalletCrossPreAuthorised preAuthorised
10
+ conformance check ct_wallet_cross_pre_authorised
11
+
12
+ c3: conformance holder CTWalletSameInTime inTime
13
+ conformance check ct_wallet_same_in_time
14
+
15
+ c4: conformance holder CTWalletSameDeferred deferred
16
+ conformance check ct_wallet_same_deferred
17
+
18
+ c5: conformance holder CTWalletSamePreAuthorised preAuthorised
19
+ conformance check ct_wallet_same_pre_authorised
20
+
21
+ set credentials []
22
+ set credentials.0 c0
23
+ set credentials.1 c1
24
+ set credentials.2 c2
25
+ set credentials.3 c3
26
+ set credentials.4 c4
27
+ set credentials.5 c5
28
+ conformance holder CTWalletQualificationCredential inTime ES256 credentials
29
+ conformance check request_ct_wallet_qualification_credential