@cef-ebsi/cli 0.2.0 → 0.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +189 -189
- package/README.md +55 -54
- package/bin/cli.js +13 -13
- package/dist/commands/compute.js +10 -9
- package/dist/commands/compute.js.map +1 -1
- package/dist/scripts/accreditAndAuthorize/conformance/step1 +34 -34
- package/dist/scripts/accreditAndAuthorize/conformance/step2 +17 -17
- package/dist/scripts/accreditAndAuthorize/conformance/step3 +8 -8
- package/dist/scripts/accreditAndAuthorize/conformance/step4 +26 -26
- package/dist/scripts/accreditAndAuthorize/conformance/step5 +12 -12
- package/dist/scripts/accreditAndAuthorize/conformance/step6 +13 -13
- package/dist/scripts/accreditAndAuthorize/conformance/step7 +6 -6
- package/dist/scripts/accreditAndAuthorize/test/step1 +34 -34
- package/dist/scripts/accreditAndAuthorize/test/step2 +17 -17
- package/dist/scripts/accreditAndAuthorize/test/step3 +8 -8
- package/dist/scripts/accreditAndAuthorize/test/step4 +26 -26
- package/dist/scripts/accreditAndAuthorize/test/step5 +12 -12
- package/dist/scripts/accreditAndAuthorize/test/step6 +13 -13
- package/dist/scripts/accreditAndAuthorize/test/step7 +6 -6
- package/dist/scripts/accreditTI +20 -20
- package/dist/scripts/assets/CTRevocableCredential.json +29 -29
- package/dist/scripts/assets/CredentialToAttestVerifiableAuthorisationForTrustChain.json +28 -28
- package/dist/scripts/assets/VerifiableAccreditationToAccredit.json +35 -35
- package/dist/scripts/assets/VerifiableAccreditationToAttest.json +32 -32
- package/dist/scripts/assets/VerifiableAuthorisationForTrustChain.json +21 -21
- package/dist/scripts/assets/VerifiableAuthorisationToOnboard.json +23 -23
- package/dist/scripts/bootstrap/0a-loadTPROperator +5 -5
- package/dist/scripts/bootstrap/0b-loadAdmin +7 -7
- package/dist/scripts/bootstrap/1-populateTPR +115 -115
- package/dist/scripts/bootstrap/2-populateDID +21 -21
- package/dist/scripts/bootstrap/3-populateTAR +72 -72
- package/dist/scripts/bootstrap/4-populateTimestamp +9 -9
- package/dist/scripts/bootstrap/5-populateTIR +9 -9
- package/dist/scripts/bootstrap/6-populateTSR +22 -22
- package/dist/scripts/bootstrap/7-setupConformanceIssuer +34 -34
- package/dist/scripts/initializeContracts +5 -5
- package/dist/scripts/issueVcOnboard +8 -8
- package/dist/scripts/issueVcRootTAO +10 -10
- package/dist/scripts/issueVcTAO +11 -11
- package/dist/scripts/issueVcTI +11 -11
- package/dist/scripts/issue_CTRevocableCredential +12 -12
- package/dist/scripts/issue_SelfAttestationSupportOffice +10 -10
- package/dist/scripts/issue_VerifiableAccreditationToAccredit +11 -11
- package/dist/scripts/issue_VerifiableAccreditationToAttest +11 -11
- package/dist/scripts/issue_VerifiableAuthorisationForTrustChain +10 -10
- package/dist/scripts/issue_VerifiableAuthorisationToOnboard +9 -9
- package/dist/scripts/preregisterIssuer +5 -5
- package/dist/scripts/registerDidDocument_ES256K_ES256 +13 -13
- package/dist/scripts/registerIssuer +5 -5
- package/dist/scripts/wctv3/accreditAndAuthorize +105 -105
- package/dist/scripts/wctv3/holderWallet +29 -29
- package/dist/scripts/wctv3/issueToHolder +26 -26
- package/dist/scripts/wctv3/pda1 +1 -1
- package/dist/scripts/wctv3/verifier +6 -6
- package/dist/tsconfig.tsbuildinfo +1 -1
- package/package.json +98 -98
|
@@ -1,21 +1,21 @@
|
|
|
1
|
-
# DID of TPR Role Operator
|
|
2
|
-
run bootstrap/0a-loadTPROperator
|
|
3
|
-
proxyledger did insertDidDocument
|
|
4
|
-
proxyledger did addVerificationMethod user.did ES256
|
|
5
|
-
proxyledger did addVerificationRelationship user.did authentication ES256
|
|
6
|
-
proxyledger did addVerificationRelationship user.did assertionMethod ES256
|
|
7
|
-
|
|
8
|
-
# DID admin
|
|
9
|
-
run bootstrap/0b-loadAdmin
|
|
10
|
-
proxyledger did insertDidDocument
|
|
11
|
-
proxyledger did addVerificationMethod user.did ES256
|
|
12
|
-
proxyledger did addVerificationRelationship user.did authentication ES256
|
|
13
|
-
proxyledger did addVerificationRelationship user.did assertionMethod ES256
|
|
14
|
-
|
|
15
|
-
# DID users-onboarding-api_pilot-temp-01
|
|
16
|
-
using user null
|
|
17
|
-
using user ES256K did1 <PRIVATE-KEY> <DID>
|
|
18
|
-
proxyledger did insertDidDocument
|
|
19
|
-
proxyledger did addVerificationMethod user.did ES256
|
|
20
|
-
proxyledger did addVerificationRelationship user.did authentication ES256
|
|
21
|
-
proxyledger did addVerificationRelationship user.did assertionMethod ES256
|
|
1
|
+
# DID of TPR Role Operator
|
|
2
|
+
run bootstrap/0a-loadTPROperator
|
|
3
|
+
proxyledger did insertDidDocument
|
|
4
|
+
proxyledger did addVerificationMethod user.did ES256
|
|
5
|
+
proxyledger did addVerificationRelationship user.did authentication ES256
|
|
6
|
+
proxyledger did addVerificationRelationship user.did assertionMethod ES256
|
|
7
|
+
|
|
8
|
+
# DID admin
|
|
9
|
+
run bootstrap/0b-loadAdmin
|
|
10
|
+
proxyledger did insertDidDocument
|
|
11
|
+
proxyledger did addVerificationMethod user.did ES256
|
|
12
|
+
proxyledger did addVerificationRelationship user.did authentication ES256
|
|
13
|
+
proxyledger did addVerificationRelationship user.did assertionMethod ES256
|
|
14
|
+
|
|
15
|
+
# DID users-onboarding-api_pilot-temp-01
|
|
16
|
+
using user null
|
|
17
|
+
using user ES256K did1 <PRIVATE-KEY> <DID>
|
|
18
|
+
proxyledger did insertDidDocument
|
|
19
|
+
proxyledger did addVerificationMethod user.did ES256
|
|
20
|
+
proxyledger did addVerificationRelationship user.did authentication ES256
|
|
21
|
+
proxyledger did addVerificationRelationship user.did assertionMethod ES256
|
|
@@ -1,72 +1,72 @@
|
|
|
1
|
-
run bootstrap/0b-loadAdmin
|
|
2
|
-
|
|
3
|
-
## Insert generic apps
|
|
4
|
-
proxyledger tar insertApp ledger-api
|
|
5
|
-
proxyledger tar insertApp did-registry-api
|
|
6
|
-
proxyledger tar insertApp timestamp-api
|
|
7
|
-
proxyledger tar insertApp trusted-issuers-registry-api
|
|
8
|
-
proxyledger tar insertApp trusted-policies-registry-api
|
|
9
|
-
proxyledger tar insertApp trusted-schemas-registry-api
|
|
10
|
-
proxyledger tar insertApp ebsi-core-services
|
|
11
|
-
proxyledger tar insertApp authorisation-api
|
|
12
|
-
|
|
13
|
-
## Insert specific apps
|
|
14
|
-
proxyledger tar insertApp did-registry-api_pilot-temp-01
|
|
15
|
-
proxyledger tar insertApp timestamp-api_pilot-temp-01
|
|
16
|
-
proxyledger tar insertApp trusted-issuers-registry-api_pilot-temp-01
|
|
17
|
-
proxyledger tar insertApp trusted-policies-registry-api_pilot-temp-01
|
|
18
|
-
proxyledger tar insertApp trusted-schemas-registry-api_pilot-temp-01
|
|
19
|
-
proxyledger tar insertApp authorisation-api_pilot-temp-01
|
|
20
|
-
proxyledger tar insertApp test-app-pilot1
|
|
21
|
-
proxyledger tar insertApp test-app-pilot2
|
|
22
|
-
|
|
23
|
-
## Insert apps for e2e tests
|
|
24
|
-
proxyledger tar insertApp did-registry-api_pilot-test-01
|
|
25
|
-
proxyledger tar insertApp timestamp-api_pilot-test-01
|
|
26
|
-
proxyledger tar insertApp trusted-issuers-registry-api_pilot-test-01
|
|
27
|
-
proxyledger tar insertApp trusted-policies-registry-api_pilot-test-01
|
|
28
|
-
proxyledger tar insertApp trusted-schemas-registry-api_pilot-test-01
|
|
29
|
-
|
|
30
|
-
## Authorizations between apps
|
|
31
|
-
|
|
32
|
-
# APIs that need to access the blockchain through ledger-api
|
|
33
|
-
# Note: trusted-apps-registry-api doesn't require
|
|
34
|
-
# authorization because it connects directly to besu
|
|
35
|
-
proxyledger tar insertAuthorization ledger-api did-registry-api
|
|
36
|
-
proxyledger tar insertAuthorization ledger-api timestamp-api
|
|
37
|
-
proxyledger tar insertAuthorization ledger-api trusted-issuers-registry-api
|
|
38
|
-
proxyledger tar insertAuthorization ledger-api trusted-policies-registry-api
|
|
39
|
-
proxyledger tar insertAuthorization ledger-api trusted-schemas-registry-api
|
|
40
|
-
|
|
41
|
-
# With regarding users, each API will authorize tokens issued by
|
|
42
|
-
# authorisation-api, and the set of API is defined as ebsi-core-services
|
|
43
|
-
proxyledger tar insertAuthorization ebsi-core-services authorisation-api
|
|
44
|
-
|
|
45
|
-
# Authorisations for testing purposes
|
|
46
|
-
proxyledger tar insertAuthorization test-app-pilot1 test-app-pilot2
|
|
47
|
-
proxyledger tar insertAuthorization ledger-api test-app-pilot2
|
|
48
|
-
|
|
49
|
-
## Define public keys for APIs using the old version (generic apps)
|
|
50
|
-
proxyledger tar insertAppPublicKey 0x8d508a564259616f0f035a5ac6b5f8c3f4223163261b2b3a07c8f3df9b08cbdd <PRIVATE-KEY> # did-registry-api
|
|
51
|
-
proxyledger tar insertAppPublicKey 0xee52082af8acb4a3d78b668bb6ec2809e58e2b5c0c6612c92d872e18289951fc <PRIVATE-KEY> # timestamp-api
|
|
52
|
-
proxyledger tar insertAppPublicKey 0x1795ede2b64392744b86bcf7d5af61aa783def0dbab758ed3b2670d6be130268 <PRIVATE-KEY> # trusted-issuers-registry-api
|
|
53
|
-
proxyledger tar insertAppPublicKey 0xbeed83fa6ecc88546cb8cba6c370ad12b1136fc54cb347b583adf8446594d33f <PRIVATE-KEY> # trusted-policies-registry-api
|
|
54
|
-
proxyledger tar insertAppPublicKey 0x462230ee44ba7f75752d829e359f7fc6dc495038440a0767e62d93dc30c98c47 <PRIVATE-KEY> # trusted-schemas-registry-api
|
|
55
|
-
proxyledger tar insertAppPublicKey 0x559c4f32dc35566e4b92b697499c38f3847a6c53f8344821c24354ead1f2ab1e <PRIVATE-KEY> # authorisation-api
|
|
56
|
-
|
|
57
|
-
## Define public keys for APIs using the latest version
|
|
58
|
-
proxyledger tar insertAppPublicKey 0xf8e19211b5255735c5264eda71b3fb52586503c4a48b0a727745fc618682043b <PRIVATE-KEY> # did-registry-api_pilot-temp-01
|
|
59
|
-
proxyledger tar insertAppPublicKey 0x270321e53c610ec9a13e2fd823c393820960cf32a37309ec98808bffa69c7147 <PRIVATE-KEY> # timestamp-api_pilot-temp-01
|
|
60
|
-
proxyledger tar insertAppPublicKey 0xe385c4eb306b7a46798638cf63bd6ceceee470861d1d74490b0e624e93000756 <PRIVATE-KEY> # trusted-issuers-registry-api_pilot-temp-01
|
|
61
|
-
proxyledger tar insertAppPublicKey 0xa5bbd1dee2410ac8da4a998aec3ee0226ede6a0ad5b62207e053e7e4567e6a12 <PRIVATE-KEY> # trusted-policies-registry-api_pilot-temp-01
|
|
62
|
-
proxyledger tar insertAppPublicKey 0xdb53a0e9d547bb4ce64099d755a75bd2f0f07462c7b56e9dcc8c4710766cd2cb <PRIVATE-KEY> # trusted-schemas-registry-api_pilot-temp-01
|
|
63
|
-
proxyledger tar insertAppPublicKey 0x6295c85baca8d6957cc975c100535eeae0086f768e79829f548ce981393557c8 <PRIVATE-KEY> # authorisation-api_pilot-temp-01
|
|
64
|
-
proxyledger tar insertAppPublicKey 0x6e59a3303d47da29eac1ab6bd90244845fe8dbb8b82ab95baaee30f0a6d2b045 <PRIVATE-KEY> # test-app-pilot1
|
|
65
|
-
proxyledger tar insertAppPublicKey 0x7b2506e8d27a8b26566e25b109302ffafc5c1972e484d568906b74eff606f275 <PRIVATE-KEY> # test-app-pilot2
|
|
66
|
-
|
|
67
|
-
## Define public keys for APIs used in e2e tests
|
|
68
|
-
proxyledger tar insertAppPublicKey 0xde146ccd61b7f99abd9b7da87df81f03cb2ff313a43d29c68262e0862c4ba7ba <PRIVATE-KEY> # did-registry-api_pilot-test-01
|
|
69
|
-
proxyledger tar insertAppPublicKey 0x38c974c33a877f2725046b05ff9d762809d3f8c0392bd3be31803ca2ddecf86b <PRIVATE-KEY> # timestamp-api_pilot-test-01
|
|
70
|
-
proxyledger tar insertAppPublicKey 0x62c2b561c7f8c98795b8db9dff1c304c83ba5988664a40c561d92fe146009848 <PRIVATE-KEY> # trusted-issuers-registry-api_pilot-test-01
|
|
71
|
-
proxyledger tar insertAppPublicKey 0xdf1f9efa300761aae5b586c6e8775ff3413cab87caf412e9e0876e84371d68cf <PRIVATE-KEY> # trusted-policies-registry-api_pilot-test-01
|
|
72
|
-
proxyledger tar insertAppPublicKey 0x16b7cf8141898ad870d8342c5b79e46bb550f139462dda6da99742b63032ba22 <PRIVATE-KEY> # trusted-schemas-registry-api_pilot-test-01
|
|
1
|
+
run bootstrap/0b-loadAdmin
|
|
2
|
+
|
|
3
|
+
## Insert generic apps
|
|
4
|
+
proxyledger tar insertApp ledger-api
|
|
5
|
+
proxyledger tar insertApp did-registry-api
|
|
6
|
+
proxyledger tar insertApp timestamp-api
|
|
7
|
+
proxyledger tar insertApp trusted-issuers-registry-api
|
|
8
|
+
proxyledger tar insertApp trusted-policies-registry-api
|
|
9
|
+
proxyledger tar insertApp trusted-schemas-registry-api
|
|
10
|
+
proxyledger tar insertApp ebsi-core-services
|
|
11
|
+
proxyledger tar insertApp authorisation-api
|
|
12
|
+
|
|
13
|
+
## Insert specific apps
|
|
14
|
+
proxyledger tar insertApp did-registry-api_pilot-temp-01
|
|
15
|
+
proxyledger tar insertApp timestamp-api_pilot-temp-01
|
|
16
|
+
proxyledger tar insertApp trusted-issuers-registry-api_pilot-temp-01
|
|
17
|
+
proxyledger tar insertApp trusted-policies-registry-api_pilot-temp-01
|
|
18
|
+
proxyledger tar insertApp trusted-schemas-registry-api_pilot-temp-01
|
|
19
|
+
proxyledger tar insertApp authorisation-api_pilot-temp-01
|
|
20
|
+
proxyledger tar insertApp test-app-pilot1
|
|
21
|
+
proxyledger tar insertApp test-app-pilot2
|
|
22
|
+
|
|
23
|
+
## Insert apps for e2e tests
|
|
24
|
+
proxyledger tar insertApp did-registry-api_pilot-test-01
|
|
25
|
+
proxyledger tar insertApp timestamp-api_pilot-test-01
|
|
26
|
+
proxyledger tar insertApp trusted-issuers-registry-api_pilot-test-01
|
|
27
|
+
proxyledger tar insertApp trusted-policies-registry-api_pilot-test-01
|
|
28
|
+
proxyledger tar insertApp trusted-schemas-registry-api_pilot-test-01
|
|
29
|
+
|
|
30
|
+
## Authorizations between apps
|
|
31
|
+
|
|
32
|
+
# APIs that need to access the blockchain through ledger-api
|
|
33
|
+
# Note: trusted-apps-registry-api doesn't require
|
|
34
|
+
# authorization because it connects directly to besu
|
|
35
|
+
proxyledger tar insertAuthorization ledger-api did-registry-api
|
|
36
|
+
proxyledger tar insertAuthorization ledger-api timestamp-api
|
|
37
|
+
proxyledger tar insertAuthorization ledger-api trusted-issuers-registry-api
|
|
38
|
+
proxyledger tar insertAuthorization ledger-api trusted-policies-registry-api
|
|
39
|
+
proxyledger tar insertAuthorization ledger-api trusted-schemas-registry-api
|
|
40
|
+
|
|
41
|
+
# With regarding users, each API will authorize tokens issued by
|
|
42
|
+
# authorisation-api, and the set of API is defined as ebsi-core-services
|
|
43
|
+
proxyledger tar insertAuthorization ebsi-core-services authorisation-api
|
|
44
|
+
|
|
45
|
+
# Authorisations for testing purposes
|
|
46
|
+
proxyledger tar insertAuthorization test-app-pilot1 test-app-pilot2
|
|
47
|
+
proxyledger tar insertAuthorization ledger-api test-app-pilot2
|
|
48
|
+
|
|
49
|
+
## Define public keys for APIs using the old version (generic apps)
|
|
50
|
+
proxyledger tar insertAppPublicKey 0x8d508a564259616f0f035a5ac6b5f8c3f4223163261b2b3a07c8f3df9b08cbdd <PRIVATE-KEY> # did-registry-api
|
|
51
|
+
proxyledger tar insertAppPublicKey 0xee52082af8acb4a3d78b668bb6ec2809e58e2b5c0c6612c92d872e18289951fc <PRIVATE-KEY> # timestamp-api
|
|
52
|
+
proxyledger tar insertAppPublicKey 0x1795ede2b64392744b86bcf7d5af61aa783def0dbab758ed3b2670d6be130268 <PRIVATE-KEY> # trusted-issuers-registry-api
|
|
53
|
+
proxyledger tar insertAppPublicKey 0xbeed83fa6ecc88546cb8cba6c370ad12b1136fc54cb347b583adf8446594d33f <PRIVATE-KEY> # trusted-policies-registry-api
|
|
54
|
+
proxyledger tar insertAppPublicKey 0x462230ee44ba7f75752d829e359f7fc6dc495038440a0767e62d93dc30c98c47 <PRIVATE-KEY> # trusted-schemas-registry-api
|
|
55
|
+
proxyledger tar insertAppPublicKey 0x559c4f32dc35566e4b92b697499c38f3847a6c53f8344821c24354ead1f2ab1e <PRIVATE-KEY> # authorisation-api
|
|
56
|
+
|
|
57
|
+
## Define public keys for APIs using the latest version
|
|
58
|
+
proxyledger tar insertAppPublicKey 0xf8e19211b5255735c5264eda71b3fb52586503c4a48b0a727745fc618682043b <PRIVATE-KEY> # did-registry-api_pilot-temp-01
|
|
59
|
+
proxyledger tar insertAppPublicKey 0x270321e53c610ec9a13e2fd823c393820960cf32a37309ec98808bffa69c7147 <PRIVATE-KEY> # timestamp-api_pilot-temp-01
|
|
60
|
+
proxyledger tar insertAppPublicKey 0xe385c4eb306b7a46798638cf63bd6ceceee470861d1d74490b0e624e93000756 <PRIVATE-KEY> # trusted-issuers-registry-api_pilot-temp-01
|
|
61
|
+
proxyledger tar insertAppPublicKey 0xa5bbd1dee2410ac8da4a998aec3ee0226ede6a0ad5b62207e053e7e4567e6a12 <PRIVATE-KEY> # trusted-policies-registry-api_pilot-temp-01
|
|
62
|
+
proxyledger tar insertAppPublicKey 0xdb53a0e9d547bb4ce64099d755a75bd2f0f07462c7b56e9dcc8c4710766cd2cb <PRIVATE-KEY> # trusted-schemas-registry-api_pilot-temp-01
|
|
63
|
+
proxyledger tar insertAppPublicKey 0x6295c85baca8d6957cc975c100535eeae0086f768e79829f548ce981393557c8 <PRIVATE-KEY> # authorisation-api_pilot-temp-01
|
|
64
|
+
proxyledger tar insertAppPublicKey 0x6e59a3303d47da29eac1ab6bd90244845fe8dbb8b82ab95baaee30f0a6d2b045 <PRIVATE-KEY> # test-app-pilot1
|
|
65
|
+
proxyledger tar insertAppPublicKey 0x7b2506e8d27a8b26566e25b109302ffafc5c1972e484d568906b74eff606f275 <PRIVATE-KEY> # test-app-pilot2
|
|
66
|
+
|
|
67
|
+
## Define public keys for APIs used in e2e tests
|
|
68
|
+
proxyledger tar insertAppPublicKey 0xde146ccd61b7f99abd9b7da87df81f03cb2ff313a43d29c68262e0862c4ba7ba <PRIVATE-KEY> # did-registry-api_pilot-test-01
|
|
69
|
+
proxyledger tar insertAppPublicKey 0x38c974c33a877f2725046b05ff9d762809d3f8c0392bd3be31803ca2ddecf86b <PRIVATE-KEY> # timestamp-api_pilot-test-01
|
|
70
|
+
proxyledger tar insertAppPublicKey 0x62c2b561c7f8c98795b8db9dff1c304c83ba5988664a40c561d92fe146009848 <PRIVATE-KEY> # trusted-issuers-registry-api_pilot-test-01
|
|
71
|
+
proxyledger tar insertAppPublicKey 0xdf1f9efa300761aae5b586c6e8775ff3413cab87caf412e9e0876e84371d68cf <PRIVATE-KEY> # trusted-policies-registry-api_pilot-test-01
|
|
72
|
+
proxyledger tar insertAppPublicKey 0x16b7cf8141898ad870d8342c5b79e46bb550f139462dda6da99742b63032ba22 <PRIVATE-KEY> # trusted-schemas-registry-api_pilot-test-01
|
|
@@ -1,10 +1,10 @@
|
|
|
1
|
-
run bootstrap/0b-loadAdmin
|
|
2
|
-
|
|
3
|
-
proxyledger timestamp insertHashAlgorithm 256 sha-256 2.16.840.1.101.3.4.2.1 1 sha2-256
|
|
4
|
-
proxyledger timestamp insertHashAlgorithm 256 sha-256 2.16.840.1.101.3.4.2.1 1 sha2-256
|
|
5
|
-
proxyledger timestamp insertHashAlgorithm 384 sha-384 2.16.840.1.101.3.4.2.2 1 sha2-384
|
|
6
|
-
proxyledger timestamp insertHashAlgorithm 512 sha-512 2.16.840.1.101.3.4.2.3 1 sha2-512
|
|
7
|
-
proxyledger timestamp insertHashAlgorithm 224 sha3-224 2.16.840.1.101.3.4.2.7 1 sha3-224
|
|
8
|
-
proxyledger timestamp insertHashAlgorithm 256 sha3-256 2.16.840.1.101.3.4.2.8 1 sha3-256
|
|
9
|
-
proxyledger timestamp insertHashAlgorithm 384 sha3-384 2.16.840.1.101.3.4.2.9 1 sha3-384
|
|
1
|
+
run bootstrap/0b-loadAdmin
|
|
2
|
+
|
|
3
|
+
proxyledger timestamp insertHashAlgorithm 256 sha-256 2.16.840.1.101.3.4.2.1 1 sha2-256
|
|
4
|
+
proxyledger timestamp insertHashAlgorithm 256 sha-256 2.16.840.1.101.3.4.2.1 1 sha2-256
|
|
5
|
+
proxyledger timestamp insertHashAlgorithm 384 sha-384 2.16.840.1.101.3.4.2.2 1 sha2-384
|
|
6
|
+
proxyledger timestamp insertHashAlgorithm 512 sha-512 2.16.840.1.101.3.4.2.3 1 sha2-512
|
|
7
|
+
proxyledger timestamp insertHashAlgorithm 224 sha3-224 2.16.840.1.101.3.4.2.7 1 sha3-224
|
|
8
|
+
proxyledger timestamp insertHashAlgorithm 256 sha3-256 2.16.840.1.101.3.4.2.8 1 sha3-256
|
|
9
|
+
proxyledger timestamp insertHashAlgorithm 384 sha3-384 2.16.840.1.101.3.4.2.9 1 sha3-384
|
|
10
10
|
proxyledger timestamp insertHashAlgorithm 512 sha3-512 2.16.840.1.101.3.4.2.10 1 sha3-512
|
|
@@ -1,9 +1,9 @@
|
|
|
1
|
-
run bootstrap/0b-loadAdmin
|
|
2
|
-
|
|
3
|
-
# support office
|
|
4
|
-
set domain SET_DOMAIN
|
|
5
|
-
reservedAttributeId: compute randomID
|
|
6
|
-
vc: run issue_SelfAttestationSupportOffice user.did reservedAttributeId
|
|
7
|
-
proxyledger tir setAttributeMetadata user.did reservedAttributeId roottao
|
|
8
|
-
proxyledger tir setAttributeData user.did reservedAttributeId vc
|
|
9
|
-
|
|
1
|
+
run bootstrap/0b-loadAdmin
|
|
2
|
+
|
|
3
|
+
# support office
|
|
4
|
+
set domain SET_DOMAIN
|
|
5
|
+
reservedAttributeId: compute randomID
|
|
6
|
+
vc: run issue_SelfAttestationSupportOffice user.did reservedAttributeId
|
|
7
|
+
proxyledger tir setAttributeMetadata user.did reservedAttributeId roottao
|
|
8
|
+
proxyledger tir setAttributeData user.did reservedAttributeId vc
|
|
9
|
+
|
|
@@ -1,22 +1,22 @@
|
|
|
1
|
-
# before running the script download the schemas and put them in scripts/local/schemas
|
|
2
|
-
run bootstrap/0b-loadAdmin
|
|
3
|
-
|
|
4
|
-
attestation_2022-11: load local/schemas/ebsi-attestation/2022-11/schema.json
|
|
5
|
-
attestation_2022-11_01: load local/schemas/ebsi-attestation/2022-11_01/schema.json
|
|
6
|
-
id_attestation_2022-11_01: compute schemaId attestation_2022-11_01
|
|
7
|
-
presentation_2022-11: load local/schemas/ebsi-presentation/2022-11/schema.json
|
|
8
|
-
|
|
9
|
-
accreditation_2022-11_01: load local/schemas/ebsi-accreditation/2022-11_01/schema.json
|
|
10
|
-
set accreditation_2022-11_01.allOf.0.$ref SET_DOMAIN /trusted-schemas-registry/v3/schemas/ id_attestation_2022-11_01
|
|
11
|
-
|
|
12
|
-
accreditation_2023-04: load local/schemas/ebsi-accreditation/2023-04-11/schema.json
|
|
13
|
-
set accreditation_2023-04.allOf.0.$ref SET_DOMAIN /trusted-schemas-registry/v3/schemas/ id_attestation_2022-11_01
|
|
14
|
-
|
|
15
|
-
proxyledger tsr insertSchema attestation_2022-11 {}
|
|
16
|
-
proxyledger tsr insertSchema attestation_2022-11_01 {}
|
|
17
|
-
|
|
18
|
-
# skip these commands for later if TSR API v3 is not ready
|
|
19
|
-
proxyledger tsr insertSchema accreditation_2022-11_01 {}
|
|
20
|
-
proxyledger tsr insertSchema accreditation_2023-04 {}
|
|
21
|
-
|
|
22
|
-
# the rest of the schemas can be inserted from the json-schema repository
|
|
1
|
+
# before running the script download the schemas and put them in scripts/local/schemas
|
|
2
|
+
run bootstrap/0b-loadAdmin
|
|
3
|
+
|
|
4
|
+
attestation_2022-11: load local/schemas/ebsi-attestation/2022-11/schema.json
|
|
5
|
+
attestation_2022-11_01: load local/schemas/ebsi-attestation/2022-11_01/schema.json
|
|
6
|
+
id_attestation_2022-11_01: compute schemaId attestation_2022-11_01
|
|
7
|
+
presentation_2022-11: load local/schemas/ebsi-presentation/2022-11/schema.json
|
|
8
|
+
|
|
9
|
+
accreditation_2022-11_01: load local/schemas/ebsi-accreditation/2022-11_01/schema.json
|
|
10
|
+
set accreditation_2022-11_01.allOf.0.$ref SET_DOMAIN /trusted-schemas-registry/v3/schemas/ id_attestation_2022-11_01
|
|
11
|
+
|
|
12
|
+
accreditation_2023-04: load local/schemas/ebsi-accreditation/2023-04-11/schema.json
|
|
13
|
+
set accreditation_2023-04.allOf.0.$ref SET_DOMAIN /trusted-schemas-registry/v3/schemas/ id_attestation_2022-11_01
|
|
14
|
+
|
|
15
|
+
proxyledger tsr insertSchema attestation_2022-11 {}
|
|
16
|
+
proxyledger tsr insertSchema attestation_2022-11_01 {}
|
|
17
|
+
|
|
18
|
+
# skip these commands for later if TSR API v3 is not ready
|
|
19
|
+
proxyledger tsr insertSchema accreditation_2022-11_01 {}
|
|
20
|
+
proxyledger tsr insertSchema accreditation_2023-04 {}
|
|
21
|
+
|
|
22
|
+
# the rest of the schemas can be inserted from the json-schema repository
|
|
@@ -1,35 +1,35 @@
|
|
|
1
|
-
# create keys for conformance
|
|
2
|
-
using user null
|
|
3
|
-
using user ES256K did1
|
|
4
|
-
using user ES256 did1 user.privateKeyHex
|
|
5
|
-
set confIssuer user
|
|
6
|
-
|
|
7
|
-
# register conformance in the DID Registry
|
|
8
|
-
proxyledger did insertDidDocument
|
|
9
|
-
proxyledger did addVerificationMethod user.did ES256
|
|
10
|
-
proxyledger did addVerificationRelationship user.did authentication ES256
|
|
11
|
-
proxyledger did addVerificationRelationship user.did assertionMethod ES256
|
|
12
|
-
|
|
13
|
-
# conformance service can authorize Root TAOs then it needs to be registered in TPR
|
|
14
|
-
run bootstrap/0a-loadTPROperator
|
|
15
|
-
proxyledger tpr insertUserAttributes confIssuer.address ["TIR:setAttributeMetadata"]
|
|
16
|
-
using user confIssuer
|
|
17
|
-
|
|
18
|
-
# registration in the TIR
|
|
19
|
-
reservedAttributeId: compute randomID
|
|
20
|
-
vc: run issue_SelfAttestationSupportOffice user.did reservedAttributeId
|
|
21
|
-
proxyledger tir setAttributeMetadata user.did reservedAttributeId roottao
|
|
22
|
-
proxyledger tir setAttributeData user.did reservedAttributeId vc
|
|
23
|
-
|
|
24
|
-
# register a proxy
|
|
25
|
-
set proxyData {"prefix":"","headers":{},"testSuffix":"/credentials/status/1"}
|
|
26
|
-
set proxyData.prefix SET_CONFORMANCE_DOMAIN /conformance/v4/issuer-mock
|
|
27
|
-
proxyledger tir addIssuerProxy user.did proxyData
|
|
28
|
-
proxyId: compute sha256 proxyData
|
|
29
|
-
|
|
30
|
-
set user.accreditationUrl SET_DOMAIN /trusted-issuers-registry/v5/issuers/ user.did /attributes/ reservedAttributeId
|
|
31
|
-
set proxyUrl SET_DOMAIN /trusted-issuers-registry/v5/issuers/ user.did /proxies/ proxyId
|
|
32
|
-
set user.proxyId proxyId
|
|
33
|
-
|
|
34
|
-
view user
|
|
1
|
+
# create keys for conformance
|
|
2
|
+
using user null
|
|
3
|
+
using user ES256K did1
|
|
4
|
+
using user ES256 did1 user.privateKeyHex
|
|
5
|
+
set confIssuer user
|
|
6
|
+
|
|
7
|
+
# register conformance in the DID Registry
|
|
8
|
+
proxyledger did insertDidDocument
|
|
9
|
+
proxyledger did addVerificationMethod user.did ES256
|
|
10
|
+
proxyledger did addVerificationRelationship user.did authentication ES256
|
|
11
|
+
proxyledger did addVerificationRelationship user.did assertionMethod ES256
|
|
12
|
+
|
|
13
|
+
# conformance service can authorize Root TAOs then it needs to be registered in TPR
|
|
14
|
+
run bootstrap/0a-loadTPROperator
|
|
15
|
+
proxyledger tpr insertUserAttributes confIssuer.address ["TIR:setAttributeMetadata"]
|
|
16
|
+
using user confIssuer
|
|
17
|
+
|
|
18
|
+
# registration in the TIR
|
|
19
|
+
reservedAttributeId: compute randomID
|
|
20
|
+
vc: run issue_SelfAttestationSupportOffice user.did reservedAttributeId
|
|
21
|
+
proxyledger tir setAttributeMetadata user.did reservedAttributeId roottao
|
|
22
|
+
proxyledger tir setAttributeData user.did reservedAttributeId vc
|
|
23
|
+
|
|
24
|
+
# register a proxy
|
|
25
|
+
set proxyData {"prefix":"","headers":{},"testSuffix":"/credentials/status/1"}
|
|
26
|
+
set proxyData.prefix SET_CONFORMANCE_DOMAIN /conformance/v4/issuer-mock
|
|
27
|
+
proxyledger tir addIssuerProxy user.did proxyData
|
|
28
|
+
proxyId: compute sha256 proxyData
|
|
29
|
+
|
|
30
|
+
set user.accreditationUrl SET_DOMAIN /trusted-issuers-registry/v5/issuers/ user.did /attributes/ reservedAttributeId
|
|
31
|
+
set proxyUrl SET_DOMAIN /trusted-issuers-registry/v5/issuers/ user.did /proxies/ proxyId
|
|
32
|
+
set user.proxyId proxyId
|
|
33
|
+
|
|
34
|
+
view user
|
|
35
35
|
view proxyUrl
|
|
@@ -1,5 +1,5 @@
|
|
|
1
|
-
proxyledger did setTrustedPoliciesRegistryAddress
|
|
2
|
-
proxyledger tar setRegistryAddresses
|
|
3
|
-
proxyledger timestamp setTrustedPoliciesRegistryAddress
|
|
4
|
-
proxyledger tir setRegistryAddresses
|
|
5
|
-
proxyledger tsr setTrustedPoliciesRegistryAddress
|
|
1
|
+
proxyledger did setTrustedPoliciesRegistryAddress
|
|
2
|
+
proxyledger tar setRegistryAddresses
|
|
3
|
+
proxyledger timestamp setTrustedPoliciesRegistryAddress
|
|
4
|
+
proxyledger tir setRegistryAddresses
|
|
5
|
+
proxyledger tsr setTrustedPoliciesRegistryAddress
|
|
@@ -1,9 +1,9 @@
|
|
|
1
|
-
# way of use:
|
|
2
|
-
# ==> run issueVcOnboard <didSubject>
|
|
3
|
-
|
|
4
|
-
payloadVcOnboard: load assets/VerifiableAuthorisationToOnboard.json
|
|
5
|
-
set payloadVcOnboard.issuer user.did
|
|
6
|
-
set payloadVcOnboard.credentialSubject.id $1
|
|
7
|
-
set payloadVcOnboard.termsOfUse.id user.accreditationUrl
|
|
8
|
-
set payloadVcOnboard.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> run issueVcOnboard <didSubject>
|
|
3
|
+
|
|
4
|
+
payloadVcOnboard: load assets/VerifiableAuthorisationToOnboard.json
|
|
5
|
+
set payloadVcOnboard.issuer user.did
|
|
6
|
+
set payloadVcOnboard.credentialSubject.id $1
|
|
7
|
+
set payloadVcOnboard.termsOfUse.id user.accreditationUrl
|
|
8
|
+
set payloadVcOnboard.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
9
9
|
compute createVcJwt payloadVcOnboard {} ES256
|
|
@@ -1,11 +1,11 @@
|
|
|
1
|
-
# way of use:
|
|
2
|
-
# ==> run issueVcRootTAO <didSubject>
|
|
3
|
-
|
|
4
|
-
reservedAttributeId: compute randomID
|
|
5
|
-
payloadVcRootTAO: load assets/VerifiableAuthorisationForTrustChain.json
|
|
6
|
-
set payloadVcRootTAO.issuer user.did
|
|
7
|
-
set payloadVcRootTAO.credentialSubject.id $1
|
|
8
|
-
set payloadVcRootTAO.termsOfUse.id user.accreditationUrl
|
|
9
|
-
set payloadVcRootTAO.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
10
|
-
set payloadVcRootTAO.credentialSubject.reservedAttributeId reservedAttributeId
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> run issueVcRootTAO <didSubject>
|
|
3
|
+
|
|
4
|
+
reservedAttributeId: compute randomID
|
|
5
|
+
payloadVcRootTAO: load assets/VerifiableAuthorisationForTrustChain.json
|
|
6
|
+
set payloadVcRootTAO.issuer user.did
|
|
7
|
+
set payloadVcRootTAO.credentialSubject.id $1
|
|
8
|
+
set payloadVcRootTAO.termsOfUse.id user.accreditationUrl
|
|
9
|
+
set payloadVcRootTAO.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
10
|
+
set payloadVcRootTAO.credentialSubject.reservedAttributeId reservedAttributeId
|
|
11
11
|
compute createVcJwt payloadVcRootTAO {} ES256
|
package/dist/scripts/issueVcTAO
CHANGED
|
@@ -1,12 +1,12 @@
|
|
|
1
|
-
# way of use:
|
|
2
|
-
# ==> run issueVcTAO <didSubject>
|
|
3
|
-
|
|
4
|
-
reservedAttributeId: compute randomID
|
|
5
|
-
payloadVcTAO: load assets/VerifiableAccreditationToAccredit.json
|
|
6
|
-
set payloadVcTAO.issuer user.did
|
|
7
|
-
set payloadVcTAO.credentialSubject.id $1
|
|
8
|
-
set payloadVcTAO.credentialSubject.accreditedFor.0.schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
9
|
-
set payloadVcTAO.termsOfUse.0.id user.accreditationUrl
|
|
10
|
-
set payloadVcTAO.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
11
|
-
set payloadVcTAO.credentialSubject.reservedAttributeId reservedAttributeId
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> run issueVcTAO <didSubject>
|
|
3
|
+
|
|
4
|
+
reservedAttributeId: compute randomID
|
|
5
|
+
payloadVcTAO: load assets/VerifiableAccreditationToAccredit.json
|
|
6
|
+
set payloadVcTAO.issuer user.did
|
|
7
|
+
set payloadVcTAO.credentialSubject.id $1
|
|
8
|
+
set payloadVcTAO.credentialSubject.accreditedFor.0.schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
9
|
+
set payloadVcTAO.termsOfUse.0.id user.accreditationUrl
|
|
10
|
+
set payloadVcTAO.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
11
|
+
set payloadVcTAO.credentialSubject.reservedAttributeId reservedAttributeId
|
|
12
12
|
compute createVcJwt payloadVcTAO {} ES256
|
package/dist/scripts/issueVcTI
CHANGED
|
@@ -1,12 +1,12 @@
|
|
|
1
|
-
# way of use:
|
|
2
|
-
# ==> run issueVcTI <didSubject>
|
|
3
|
-
|
|
4
|
-
reservedAttributeId: compute randomID
|
|
5
|
-
payloadVcTI: load assets/VerifiableAccreditationToAttest.json
|
|
6
|
-
set payloadVcTI.issuer user.did
|
|
7
|
-
set payloadVcTI.credentialSubject.id $1
|
|
8
|
-
set payloadVcTI.credentialSubject.accreditedFor.0.schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
9
|
-
set payloadVcTI.termsOfUse.id user.accreditationUrl
|
|
10
|
-
set payloadVcTI.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
11
|
-
set payloadVcTI.credentialSubject.reservedAttributeId reservedAttributeId
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> run issueVcTI <didSubject>
|
|
3
|
+
|
|
4
|
+
reservedAttributeId: compute randomID
|
|
5
|
+
payloadVcTI: load assets/VerifiableAccreditationToAttest.json
|
|
6
|
+
set payloadVcTI.issuer user.did
|
|
7
|
+
set payloadVcTI.credentialSubject.id $1
|
|
8
|
+
set payloadVcTI.credentialSubject.accreditedFor.0.schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
9
|
+
set payloadVcTI.termsOfUse.id user.accreditationUrl
|
|
10
|
+
set payloadVcTI.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
11
|
+
set payloadVcTI.credentialSubject.reservedAttributeId reservedAttributeId
|
|
12
12
|
compute createVcJwt payloadVcTI {} ES256
|
|
@@ -1,13 +1,13 @@
|
|
|
1
|
-
# way of use:
|
|
2
|
-
# ==> set domain https://api-test.ebsi.eu
|
|
3
|
-
# ==> run issue_CTRevocableCredential <didIssuer> <didSubject> <issuerAttributeIdUrl> <issuerProxyId> <statusIndex> <statusListIndex>
|
|
4
|
-
|
|
5
|
-
payloadCTRevocableCredential: load assets/CTRevocableCredential.json
|
|
6
|
-
set payloadCTRevocableCredential.issuer $1
|
|
7
|
-
set payloadCTRevocableCredential.credentialSubject.id $2
|
|
8
|
-
set payloadCTRevocableCredential.termsOfUse.id $3
|
|
9
|
-
set payloadCTRevocableCredential.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
10
|
-
set payloadCTRevocableCredential.credentialStatus.id domain /trusted-issuers-registry/v4/issuers/ user.did /proxies/ $4 /credentials/status/ $5
|
|
11
|
-
set payloadCTRevocableCredential.credentialStatus.statusListIndex $6
|
|
12
|
-
set payloadCTRevocableCredential.credentialStatus.statusListCredential domain /trusted-issuers-registry/v4/issuers/ user.did /proxies/ $4 /credentials/status/ $5
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> set domain https://api-test.ebsi.eu
|
|
3
|
+
# ==> run issue_CTRevocableCredential <didIssuer> <didSubject> <issuerAttributeIdUrl> <issuerProxyId> <statusIndex> <statusListIndex>
|
|
4
|
+
|
|
5
|
+
payloadCTRevocableCredential: load assets/CTRevocableCredential.json
|
|
6
|
+
set payloadCTRevocableCredential.issuer $1
|
|
7
|
+
set payloadCTRevocableCredential.credentialSubject.id $2
|
|
8
|
+
set payloadCTRevocableCredential.termsOfUse.id $3
|
|
9
|
+
set payloadCTRevocableCredential.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
10
|
+
set payloadCTRevocableCredential.credentialStatus.id domain /trusted-issuers-registry/v4/issuers/ user.did /proxies/ $4 /credentials/status/ $5
|
|
11
|
+
set payloadCTRevocableCredential.credentialStatus.statusListIndex $6
|
|
12
|
+
set payloadCTRevocableCredential.credentialStatus.statusListCredential domain /trusted-issuers-registry/v4/issuers/ user.did /proxies/ $4 /credentials/status/ $5
|
|
13
13
|
compute createVcJwt payloadCTRevocableCredential {} ES256
|
|
@@ -1,11 +1,11 @@
|
|
|
1
|
-
# way of use:
|
|
2
|
-
# ==> set domain https://api-test.ebsi.eu
|
|
3
|
-
# ==> run issue_SelfAttestationSupportOffice <didIssuer> <reservedAttributeId>
|
|
4
|
-
|
|
5
|
-
payloadVc: load assets/CredentialToAttestVerifiableAuthorisationForTrustChain.json
|
|
6
|
-
set payloadVc.issuer $1
|
|
7
|
-
set payloadVc.credentialSubject.id $1
|
|
8
|
-
set payloadVc.credentialSubject.accreditedFor[0].schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
9
|
-
set payloadVc.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/zjVFNvbEBPAr3a724DttioZpgZmNr75BBtRzZqk7pkDe
|
|
10
|
-
set payloadVc.credentialSubject.reservedAttributeId $2
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> set domain https://api-test.ebsi.eu
|
|
3
|
+
# ==> run issue_SelfAttestationSupportOffice <didIssuer> <reservedAttributeId>
|
|
4
|
+
|
|
5
|
+
payloadVc: load assets/CredentialToAttestVerifiableAuthorisationForTrustChain.json
|
|
6
|
+
set payloadVc.issuer $1
|
|
7
|
+
set payloadVc.credentialSubject.id $1
|
|
8
|
+
set payloadVc.credentialSubject.accreditedFor[0].schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
9
|
+
set payloadVc.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/zjVFNvbEBPAr3a724DttioZpgZmNr75BBtRzZqk7pkDe
|
|
10
|
+
set payloadVc.credentialSubject.reservedAttributeId $2
|
|
11
11
|
compute createVcJwt payloadVc {} ES256
|
|
@@ -1,12 +1,12 @@
|
|
|
1
|
-
# way of use:
|
|
2
|
-
# ==> set domain https://api-test.ebsi.eu
|
|
3
|
-
# ==> run issue_VerifiableAccreditationToAccredit <didIssuer> <didSubject> <issuerAttributeIdUrl> <reservedAttributeId>
|
|
4
|
-
|
|
5
|
-
payloadVcTAO: load assets/VerifiableAccreditationToAccredit.json
|
|
6
|
-
set payloadVcTAO.issuer $1
|
|
7
|
-
set payloadVcTAO.credentialSubject.id $2
|
|
8
|
-
set payloadVcTAO.credentialSubject.accreditedFor.0.schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
9
|
-
set payloadVcTAO.termsOfUse.0.id $3
|
|
10
|
-
set payloadVcTAO.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
11
|
-
set payloadVcTAO.credentialSubject.reservedAttributeId $4
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> set domain https://api-test.ebsi.eu
|
|
3
|
+
# ==> run issue_VerifiableAccreditationToAccredit <didIssuer> <didSubject> <issuerAttributeIdUrl> <reservedAttributeId>
|
|
4
|
+
|
|
5
|
+
payloadVcTAO: load assets/VerifiableAccreditationToAccredit.json
|
|
6
|
+
set payloadVcTAO.issuer $1
|
|
7
|
+
set payloadVcTAO.credentialSubject.id $2
|
|
8
|
+
set payloadVcTAO.credentialSubject.accreditedFor.0.schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
9
|
+
set payloadVcTAO.termsOfUse.0.id $3
|
|
10
|
+
set payloadVcTAO.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
11
|
+
set payloadVcTAO.credentialSubject.reservedAttributeId $4
|
|
12
12
|
compute createVcJwt payloadVcTAO {} ES256
|
|
@@ -1,12 +1,12 @@
|
|
|
1
|
-
# way of use:
|
|
2
|
-
# ==> set domain https://api-test.ebsi.eu
|
|
3
|
-
# ==> run issue_VerifiableAccreditationToAttest <didIssuer> <didSubject> <issuerAttributeIdUrl> <reservedAttributeId>
|
|
4
|
-
|
|
5
|
-
payloadVcTI: load assets/VerifiableAccreditationToAttest.json
|
|
6
|
-
set payloadVcTI.issuer $1
|
|
7
|
-
set payloadVcTI.credentialSubject.id $2
|
|
8
|
-
set payloadVcTI.credentialSubject.accreditedFor.0.schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
9
|
-
set payloadVcTI.termsOfUse.id $3
|
|
10
|
-
set payloadVcTI.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
11
|
-
set payloadVcTI.credentialSubject.reservedAttributeId $4
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> set domain https://api-test.ebsi.eu
|
|
3
|
+
# ==> run issue_VerifiableAccreditationToAttest <didIssuer> <didSubject> <issuerAttributeIdUrl> <reservedAttributeId>
|
|
4
|
+
|
|
5
|
+
payloadVcTI: load assets/VerifiableAccreditationToAttest.json
|
|
6
|
+
set payloadVcTI.issuer $1
|
|
7
|
+
set payloadVcTI.credentialSubject.id $2
|
|
8
|
+
set payloadVcTI.credentialSubject.accreditedFor.0.schemaId domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
9
|
+
set payloadVcTI.termsOfUse.id $3
|
|
10
|
+
set payloadVcTI.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
11
|
+
set payloadVcTI.credentialSubject.reservedAttributeId $4
|
|
12
12
|
compute createVcJwt payloadVcTI {} ES256
|
|
@@ -1,11 +1,11 @@
|
|
|
1
|
-
# way of use:
|
|
2
|
-
# ==> set domain https://api-test.ebsi.eu
|
|
3
|
-
# ==> run issue_VerifiableAuthorisationForTrustChain <didIssuer> <didSubject> <issuerAttributeIdUrl> <reservedAttributeId>
|
|
4
|
-
|
|
5
|
-
payloadVcRootTAO: load assets/VerifiableAuthorisationForTrustChain.json
|
|
6
|
-
set payloadVcRootTAO.issuer $1
|
|
7
|
-
set payloadVcRootTAO.credentialSubject.id $2
|
|
8
|
-
set payloadVcRootTAO.termsOfUse.id $3
|
|
9
|
-
set payloadVcRootTAO.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
10
|
-
set payloadVcRootTAO.credentialSubject.reservedAttributeId $4
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> set domain https://api-test.ebsi.eu
|
|
3
|
+
# ==> run issue_VerifiableAuthorisationForTrustChain <didIssuer> <didSubject> <issuerAttributeIdUrl> <reservedAttributeId>
|
|
4
|
+
|
|
5
|
+
payloadVcRootTAO: load assets/VerifiableAuthorisationForTrustChain.json
|
|
6
|
+
set payloadVcRootTAO.issuer $1
|
|
7
|
+
set payloadVcRootTAO.credentialSubject.id $2
|
|
8
|
+
set payloadVcRootTAO.termsOfUse.id $3
|
|
9
|
+
set payloadVcRootTAO.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
10
|
+
set payloadVcRootTAO.credentialSubject.reservedAttributeId $4
|
|
11
11
|
compute createVcJwt payloadVcRootTAO {} ES256
|
|
@@ -1,10 +1,10 @@
|
|
|
1
|
-
# way of use:
|
|
2
|
-
# ==> set domain https://api-test.ebsi.eu
|
|
3
|
-
# ==> run issue_VerifiableAuthorisationToOnboard <didIssuer> <didSubject> <issuerAttributeIdUrl>
|
|
4
|
-
|
|
5
|
-
payloadVcOnboard: load assets/VerifiableAuthorisationToOnboard.json
|
|
6
|
-
set payloadVcOnboard.issuer $1
|
|
7
|
-
set payloadVcOnboard.credentialSubject.id $2
|
|
8
|
-
set payloadVcOnboard.termsOfUse.id $3
|
|
9
|
-
set payloadVcOnboard.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> set domain https://api-test.ebsi.eu
|
|
3
|
+
# ==> run issue_VerifiableAuthorisationToOnboard <didIssuer> <didSubject> <issuerAttributeIdUrl>
|
|
4
|
+
|
|
5
|
+
payloadVcOnboard: load assets/VerifiableAuthorisationToOnboard.json
|
|
6
|
+
set payloadVcOnboard.issuer $1
|
|
7
|
+
set payloadVcOnboard.credentialSubject.id $2
|
|
8
|
+
set payloadVcOnboard.termsOfUse.id $3
|
|
9
|
+
set payloadVcOnboard.credentialSchema.id domain /trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM
|
|
10
10
|
compute createVcJwt payloadVcOnboard {} ES256
|
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
# ==> run preregisterIssuer <didSubject> <issuerType> <vc>
|
|
2
|
-
jwtDecoded: compute decodeJWT $3
|
|
3
|
-
set reservedAttributeId jwtDecoded.payload.vc.credentialSubject.reservedAttributeId
|
|
4
|
-
resAuthTIR: authorisation auth tir_write_presentation ES256
|
|
5
|
-
using token resAuthTIR.access_token
|
|
1
|
+
# ==> run preregisterIssuer <didSubject> <issuerType> <vc>
|
|
2
|
+
jwtDecoded: compute decodeJWT $3
|
|
3
|
+
set reservedAttributeId jwtDecoded.payload.vc.credentialSubject.reservedAttributeId
|
|
4
|
+
resAuthTIR: authorisation auth tir_write_presentation ES256
|
|
5
|
+
using token resAuthTIR.access_token
|
|
6
6
|
tir setAttributeMetadata $1 reservedAttributeId $2 user.did user.accreditationId
|