@cef-ebsi/cli 1.5.0 → 1.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/app.js +32 -6
- package/dist/app.js.map +1 -1
- package/dist/buildParam/didr.js +1 -2
- package/dist/buildParam/didr.js.map +1 -1
- package/dist/buildParam/index.js.map +1 -1
- package/dist/buildParam/ptr.js +1 -1
- package/dist/buildParam/ptr.js.map +1 -1
- package/dist/buildParam/tcr.js.map +1 -1
- package/dist/buildParam/timestamp.js +6 -15
- package/dist/buildParam/timestamp.js.map +1 -1
- package/dist/buildParam/tir.js.map +1 -1
- package/dist/buildParam/tnt.js.map +1 -1
- package/dist/buildParam/tpr.js +0 -2
- package/dist/buildParam/tpr.js.map +1 -1
- package/dist/buildParam/tsr.js.map +1 -1
- package/dist/commands/authorisation.js +3 -3
- package/dist/commands/authorisation.js.map +1 -1
- package/dist/commands/compute.js +109 -38
- package/dist/commands/compute.js.map +1 -1
- package/dist/commands/conformance.js +8 -8
- package/dist/commands/conformance.js.map +1 -1
- package/dist/commands/ledger.js +40 -7
- package/dist/commands/ledger.js.map +1 -1
- package/dist/commands/ptr.js +3 -4
- package/dist/commands/ptr.js.map +1 -1
- package/dist/commands/tcr.js +4 -4
- package/dist/commands/tcr.js.map +1 -1
- package/dist/commands/tir.js +62 -0
- package/dist/commands/tir.js.map +1 -0
- package/dist/commands/tnl.js +1 -3
- package/dist/commands/tnl.js.map +1 -1
- package/dist/commands/tsr.js +4 -4
- package/dist/commands/tsr.js.map +1 -1
- package/dist/commands/view.js +1 -1
- package/dist/commands/view.js.map +1 -1
- package/dist/config.js.map +1 -1
- package/dist/interfaces/contracts/ProxyFactory.js +2 -0
- package/dist/interfaces/contracts/ProxyFactory.js.map +1 -0
- package/dist/interfaces/contracts/ProxyTemplateRegistry.js +2 -0
- package/dist/interfaces/contracts/ProxyTemplateRegistry.js.map +1 -0
- package/dist/interfaces/contracts/SchemaSCRegistry.js +2 -0
- package/dist/interfaces/contracts/SchemaSCRegistry.js.map +1 -0
- package/dist/interfaces/contracts/common.js +2 -0
- package/dist/interfaces/contracts/common.js.map +1 -0
- package/dist/scripts/accreditAndAuthorize/conformance/step1 +1 -1
- package/dist/scripts/accreditAndAuthorize/test/step1 +1 -1
- package/dist/scripts/accreditTI +3 -3
- package/dist/scripts/assets/vcdm1.1/Nodes.json +27 -0
- package/dist/scripts/assets/vcdm2.0/CredentialToAttestVerifiableAuthorisationForTrustChain.json +29 -0
- package/dist/scripts/assets/vcdm2.0/TrustedNodesList.json +36 -0
- package/dist/scripts/assets/vcdm2.0/VerifiableAccreditationToAccredit.json +40 -0
- package/dist/scripts/assets/vcdm2.0/VerifiableAccreditationToAttest.json +38 -0
- package/dist/scripts/assets/vcdm2.0/VerifiableAuthorisationForTrustChain.json +30 -0
- package/dist/scripts/assets/vcdm2.0/VerifiableAuthorisationToInvoke.json +24 -0
- package/dist/scripts/assets/vcdm2.0/VerifiableAuthorisationToOnboard.json +23 -0
- package/dist/scripts/bootstrap/0b-loadAdmin +2 -1
- package/dist/scripts/issueVcInvoke +2 -2
- package/dist/scripts/issueVcOnboard +2 -2
- package/dist/scripts/issueVcRootTAO +2 -2
- package/dist/scripts/issueVcTAO +2 -2
- package/dist/scripts/issueVcTI +2 -2
- package/dist/scripts/issueVcTnl +2 -2
- package/dist/scripts/issue_CTRevocableCredential +2 -2
- package/dist/scripts/issue_SelfAttestationSupportOffice +2 -2
- package/dist/scripts/issue_VerifiableAccreditationToAccredit +2 -2
- package/dist/scripts/issue_VerifiableAccreditationToAttest +2 -2
- package/dist/scripts/issue_VerifiableAuthorisationForTrustChain +2 -2
- package/dist/scripts/issue_VerifiableAuthorisationToOnboard +2 -2
- package/dist/scripts/preregisterIssuer +1 -1
- package/dist/scripts/{registerDidDocument_ES256K_ES256 → registerDidDocument} +2 -2
- package/dist/scripts/registerIssuer +1 -1
- package/dist/scripts/updateVcRootTAO +2 -2
- package/dist/scripts/updateVcTAO +2 -2
- package/dist/scripts/updateVcTI +2 -2
- package/dist/scripts/vcdm2.0/issueSelfAttestationSupportOffice +10 -0
- package/dist/scripts/vcdm2.0/issueVcInvoke +12 -0
- package/dist/scripts/vcdm2.0/issueVcOnboard +11 -0
- package/dist/scripts/vcdm2.0/issueVcRootTAO +14 -0
- package/dist/scripts/vcdm2.0/issueVcTAO +15 -0
- package/dist/scripts/vcdm2.0/issueVcTI +15 -0
- package/dist/scripts/vcdm2.0/issueVcTnl +34 -0
- package/dist/scripts/vcdm2.0/registerDidDocument +13 -0
- package/dist/scripts/vcdm2.0/updateVcRootTAO +13 -0
- package/dist/scripts/vcdm2.0/updateVcTAO +14 -0
- package/dist/scripts/vcdm2.0/updateVcTI +14 -0
- package/dist/scripts/vcdm2.0/verifyVcTnl +10 -0
- package/dist/scripts/verifyVcTnl +1 -1
- package/dist/scripts/wct/accreditAndAuthorize +3 -3
- package/dist/scripts/wct/holderWallet +1 -1
- package/dist/tsconfig.build.tsbuildinfo +1 -1
- package/dist/utils/Client.js +11 -2
- package/dist/utils/Client.js.map +1 -1
- package/dist/utils/http.js +1 -1
- package/dist/utils/http.js.map +1 -1
- package/dist/utils/jsonrpc.js +10 -5
- package/dist/utils/jsonrpc.js.map +1 -1
- package/dist/utils/print.js +3 -0
- package/dist/utils/print.js.map +1 -1
- package/dist/utils/utils.js +78 -21
- package/dist/utils/utils.js.map +1 -1
- package/package.json +23 -23
- package/dist/scripts/registerDidDocument_ES256K +0 -5
- /package/dist/scripts/assets/{CTRevocableCredential.json → vcdm1.1/CTRevocableCredential.json} +0 -0
- /package/dist/scripts/assets/{CredentialToAttestVerifiableAuthorisationForTrustChain.json → vcdm1.1/CredentialToAttestVerifiableAuthorisationForTrustChain.json} +0 -0
- /package/dist/scripts/assets/{TrustedNodesList.json → vcdm1.1/TrustedNodesList.json} +0 -0
- /package/dist/scripts/assets/{VerifiableAccreditationToAccredit.json → vcdm1.1/VerifiableAccreditationToAccredit.json} +0 -0
- /package/dist/scripts/assets/{VerifiableAccreditationToAttest.json → vcdm1.1/VerifiableAccreditationToAttest.json} +0 -0
- /package/dist/scripts/assets/{VerifiableAuthorisationForTrustChain.json → vcdm1.1/VerifiableAuthorisationForTrustChain.json} +0 -0
- /package/dist/scripts/assets/{VerifiableAuthorisationToInvoke.json → vcdm1.1/VerifiableAuthorisationToInvoke.json} +0 -0
- /package/dist/scripts/assets/{VerifiableAuthorisationToOnboard.json → vcdm1.1/VerifiableAuthorisationToOnboard.json} +0 -0
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
{
|
|
2
|
+
"@context": ["https://www.w3.org/ns/credentials/v2"],
|
|
3
|
+
"type": [
|
|
4
|
+
"VerifiableCredential",
|
|
5
|
+
"VerifiableAttestation",
|
|
6
|
+
"VerifiableTrustModel",
|
|
7
|
+
"VerifiableAccreditationToAttest"
|
|
8
|
+
],
|
|
9
|
+
"issuer": "",
|
|
10
|
+
"credentialSchema": {
|
|
11
|
+
"id": "ebsi:pilot:trusted-schemas-registry:/schemas/z2DzoeZrgduRwk3y4RAetwSHRZAHAqNF6fWWMaEcZUdAY",
|
|
12
|
+
"type": "FullJsonSchemaValidator2021"
|
|
13
|
+
},
|
|
14
|
+
"credentialStatus": {
|
|
15
|
+
"id": "",
|
|
16
|
+
"type": "EbsiAccreditationEntry"
|
|
17
|
+
},
|
|
18
|
+
"credentialSubject": {
|
|
19
|
+
"id": "",
|
|
20
|
+
"permissionFor": [
|
|
21
|
+
{
|
|
22
|
+
"schemaId": "ebsi:pilot:trusted-schemas-registry:/schemas/zB5yLy7GXdZs1iaJ7wN2K5mhwZDTxjECM2fELYE73mu3E",
|
|
23
|
+
"types": [
|
|
24
|
+
"VerifiableCredential",
|
|
25
|
+
"VerifiableAttestation",
|
|
26
|
+
"CTRevocable"
|
|
27
|
+
],
|
|
28
|
+
"jurisdiction":
|
|
29
|
+
"https://publications.europa.eu/resource/authority/atu/EUR"
|
|
30
|
+
}
|
|
31
|
+
]
|
|
32
|
+
},
|
|
33
|
+
"termsOfUse": {
|
|
34
|
+
"parentAccreditation": "",
|
|
35
|
+
"rootAuthorisation": "",
|
|
36
|
+
"type": "AccreditationPolicy"
|
|
37
|
+
}
|
|
38
|
+
}
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
{
|
|
2
|
+
"@context": [
|
|
3
|
+
"https://www.w3.org/ns/credentials/v2"
|
|
4
|
+
],
|
|
5
|
+
"type": [
|
|
6
|
+
"VerifiableCredential",
|
|
7
|
+
"VerifiableAttestation",
|
|
8
|
+
"VerifiableTrustModel",
|
|
9
|
+
"VerifiableAuthorisationForTrustChain"
|
|
10
|
+
],
|
|
11
|
+
"issuer": "",
|
|
12
|
+
"credentialSchema": {
|
|
13
|
+
"id": "ebsi:pilot:trusted-schemas-registry:/schemas/z2DzoeZrgduRwk3y4RAetwSHRZAHAqNF6fWWMaEcZUdAY",
|
|
14
|
+
"type": "FullJsonSchemaValidator2021"
|
|
15
|
+
},
|
|
16
|
+
"credentialStatus": {
|
|
17
|
+
"id": "",
|
|
18
|
+
"type": "EbsiAccreditationEntry"
|
|
19
|
+
},
|
|
20
|
+
"credentialSubject": {
|
|
21
|
+
"id": "",
|
|
22
|
+
"reservedAttributeId": ""
|
|
23
|
+
},
|
|
24
|
+
"termsOfUse": {
|
|
25
|
+
"type": "TrustFrameworkPolicy",
|
|
26
|
+
"trustFramework": "",
|
|
27
|
+
"policyId": "",
|
|
28
|
+
"legalBasis": ""
|
|
29
|
+
}
|
|
30
|
+
}
|
|
@@ -0,0 +1,24 @@
|
|
|
1
|
+
{
|
|
2
|
+
"@context": [
|
|
3
|
+
"https://www.w3.org/ns/credentials/v2"
|
|
4
|
+
],
|
|
5
|
+
"type": [
|
|
6
|
+
"VerifiableCredential",
|
|
7
|
+
"VerifiableAttestation",
|
|
8
|
+
"VerifiableAuthorisationToInvoke"
|
|
9
|
+
],
|
|
10
|
+
"issuer": "",
|
|
11
|
+
"credentialSubject": {
|
|
12
|
+
"id": "",
|
|
13
|
+
"contractAddress": ""
|
|
14
|
+
},
|
|
15
|
+
"termsOfUse": {
|
|
16
|
+
"parentAccreditation": "",
|
|
17
|
+
"rootAuthorisation": "",
|
|
18
|
+
"type": "AttestationPolicy"
|
|
19
|
+
},
|
|
20
|
+
"credentialSchema": {
|
|
21
|
+
"id": "ebsi:pilot:trusted-schemas-registry:/schemas/zB5yLy7GXdZs1iaJ7wN2K5mhwZDTxjECM2fELYE73mu3E",
|
|
22
|
+
"type": "FullJsonSchemaValidator2021"
|
|
23
|
+
}
|
|
24
|
+
}
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
{
|
|
2
|
+
"@context": [
|
|
3
|
+
"https://www.w3.org/ns/credentials/v2"
|
|
4
|
+
],
|
|
5
|
+
"type": [
|
|
6
|
+
"VerifiableCredential",
|
|
7
|
+
"VerifiableAttestation",
|
|
8
|
+
"VerifiableAuthorisationToOnboard"
|
|
9
|
+
],
|
|
10
|
+
"issuer": "",
|
|
11
|
+
"credentialSubject": {
|
|
12
|
+
"id": ""
|
|
13
|
+
},
|
|
14
|
+
"termsOfUse": {
|
|
15
|
+
"parentAccreditation": "",
|
|
16
|
+
"rootAuthorisation": "",
|
|
17
|
+
"type": "AttestationPolicy"
|
|
18
|
+
},
|
|
19
|
+
"credentialSchema": {
|
|
20
|
+
"id": "ebsi:pilot:trusted-schemas-registry:/schemas/zB5yLy7GXdZs1iaJ7wN2K5mhwZDTxjECM2fELYE73mu3E",
|
|
21
|
+
"type": "FullJsonSchemaValidator2021"
|
|
22
|
+
}
|
|
23
|
+
}
|
|
@@ -4,4 +4,5 @@ env SET_ENV
|
|
|
4
4
|
using user null
|
|
5
5
|
using user ES256K did1 PRIVATE_KEY_ES256K_SUPPORT_OFFICE DID_SUPPORT_OFFICE
|
|
6
6
|
using user ES256 did1 PRIVATE_KEY_ES256_SUPPORT_OFFICE DID_SUPPORT_OFFICE
|
|
7
|
-
set user.
|
|
7
|
+
set user.supportOfficeAccreditationUrl ACCREDITATION_URL_SUPPORT_OFFICE
|
|
8
|
+
set user.accreditationUrl ACCREDITATION_URL_ROOT_TAO
|
|
@@ -1,10 +1,10 @@
|
|
|
1
1
|
# way of use:
|
|
2
2
|
# ==> run issueVcInvoke <didSubject> <address>
|
|
3
3
|
|
|
4
|
-
payloadVcInvoke: load assets/VerifiableAuthorisationToInvoke.json
|
|
4
|
+
payloadVcInvoke: load assets/vcdm1.1/VerifiableAuthorisationToInvoke.json
|
|
5
5
|
set payloadVcInvoke.issuer user.did
|
|
6
6
|
set payloadVcInvoke.credentialSubject.id $1
|
|
7
7
|
set payloadVcInvoke.credentialSubject.contractAddress $2
|
|
8
8
|
set payloadVcInvoke.termsOfUse.id user.accreditationUrl
|
|
9
9
|
set payloadVcInvoke.credentialSchema.id tsrUrl /schemas/zH74MKkYTbQ6ZfTxufi6A3Aw8giS4piGm8dpgxFmkJjmu
|
|
10
|
-
compute createVcJwt payloadVcInvoke {} ES256
|
|
10
|
+
compute createVcJwt payloadVcInvoke {} ES256 1.1
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
# way of use:
|
|
2
2
|
# ==> run issueVcOnboard <didSubject>
|
|
3
3
|
|
|
4
|
-
payloadVcOnboard: load assets/VerifiableAuthorisationToOnboard.json
|
|
4
|
+
payloadVcOnboard: load assets/vcdm1.1/VerifiableAuthorisationToOnboard.json
|
|
5
5
|
set payloadVcOnboard.issuer user.did
|
|
6
6
|
set payloadVcOnboard.credentialSubject.id $1
|
|
7
7
|
set payloadVcOnboard.termsOfUse.id user.accreditationUrl
|
|
8
8
|
set payloadVcOnboard.credentialSchema.id tsrUrl /schemas/zH74MKkYTbQ6ZfTxufi6A3Aw8giS4piGm8dpgxFmkJjmu
|
|
9
|
-
compute createVcJwt payloadVcOnboard {} ES256
|
|
9
|
+
compute createVcJwt payloadVcOnboard {} ES256 1.1
|
|
@@ -2,10 +2,10 @@
|
|
|
2
2
|
# ==> run issueVcRootTAO <didSubject>
|
|
3
3
|
|
|
4
4
|
reservedAttributeId: compute randomID
|
|
5
|
-
payloadVcRootTAO: load assets/VerifiableAuthorisationForTrustChain.json
|
|
5
|
+
payloadVcRootTAO: load assets/vcdm1.1/VerifiableAuthorisationForTrustChain.json
|
|
6
6
|
set payloadVcRootTAO.issuer user.did
|
|
7
7
|
set payloadVcRootTAO.credentialSubject.id $1
|
|
8
8
|
set payloadVcRootTAO.termsOfUse.id user.accreditationUrl
|
|
9
9
|
set payloadVcRootTAO.credentialSchema.id tsrUrl /schemas/zH74MKkYTbQ6ZfTxufi6A3Aw8giS4piGm8dpgxFmkJjmu
|
|
10
10
|
set payloadVcRootTAO.credentialSubject.reservedAttributeId reservedAttributeId
|
|
11
|
-
compute createVcJwt payloadVcRootTAO {} ES256
|
|
11
|
+
compute createVcJwt payloadVcRootTAO {} ES256 1.1
|
package/dist/scripts/issueVcTAO
CHANGED
|
@@ -2,11 +2,11 @@
|
|
|
2
2
|
# ==> run issueVcTAO <didSubject>
|
|
3
3
|
|
|
4
4
|
reservedAttributeId: compute randomID
|
|
5
|
-
payloadVcTAO: load assets/VerifiableAccreditationToAccredit.json
|
|
5
|
+
payloadVcTAO: load assets/vcdm1.1/VerifiableAccreditationToAccredit.json
|
|
6
6
|
set payloadVcTAO.issuer user.did
|
|
7
7
|
set payloadVcTAO.credentialSubject.id $1
|
|
8
8
|
set payloadVcTAO.credentialSubject.accreditedFor.0.schemaId tsrUrl /schemas/zH74MKkYTbQ6ZfTxufi6A3Aw8giS4piGm8dpgxFmkJjmu
|
|
9
9
|
set payloadVcTAO.termsOfUse.0.id user.accreditationUrl
|
|
10
10
|
set payloadVcTAO.credentialSchema.id tsrUrl /schemas/zHXHLkJpZg4w9nt2GbEBbyE8uhkfirbmT3nF7mJ9kFnjv
|
|
11
11
|
set payloadVcTAO.credentialSubject.reservedAttributeId reservedAttributeId
|
|
12
|
-
compute createVcJwt payloadVcTAO {} ES256
|
|
12
|
+
compute createVcJwt payloadVcTAO {} ES256 1.1
|
package/dist/scripts/issueVcTI
CHANGED
|
@@ -2,11 +2,11 @@
|
|
|
2
2
|
# ==> run issueVcTI <didSubject>
|
|
3
3
|
|
|
4
4
|
reservedAttributeId: compute randomID
|
|
5
|
-
payloadVcTI: load assets/VerifiableAccreditationToAttest.json
|
|
5
|
+
payloadVcTI: load assets/vcdm1.1/VerifiableAccreditationToAttest.json
|
|
6
6
|
set payloadVcTI.issuer user.did
|
|
7
7
|
set payloadVcTI.credentialSubject.id $1
|
|
8
8
|
set payloadVcTI.credentialSubject.accreditedFor.0.schemaId tsrUrl /schemas/zH74MKkYTbQ6ZfTxufi6A3Aw8giS4piGm8dpgxFmkJjmu
|
|
9
9
|
set payloadVcTI.termsOfUse.id user.accreditationUrl
|
|
10
10
|
set payloadVcTI.credentialSchema.id tsrUrl /schemas/zHXHLkJpZg4w9nt2GbEBbyE8uhkfirbmT3nF7mJ9kFnjv
|
|
11
11
|
set payloadVcTI.credentialSubject.reservedAttributeId reservedAttributeId
|
|
12
|
-
compute createVcJwt payloadVcTI {} ES256
|
|
12
|
+
compute createVcJwt payloadVcTI {} ES256 1.1
|
package/dist/scripts/issueVcTnl
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
payloadVcTnl: load assets/TrustedNodesList.json
|
|
1
|
+
payloadVcTnl: load assets/vcdm1.1/TrustedNodesList.json
|
|
2
2
|
set payloadVcTnl.credentialSubject.id SET_SERVICE_OPS_MANAGER
|
|
3
3
|
|
|
4
4
|
# environment: test, pilot, preprod, or prod
|
|
@@ -26,7 +26,7 @@ set payloadVcTnl.termsOfUse.id user.accreditationUrl
|
|
|
26
26
|
set payloadVcTnl.credentialSchema.id ebsi: payloadVcTnl.credentialSubject.environment :trusted-schemas-registry:/schemas/zH74MKkYTbQ6ZfTxufi6A3Aw8giS4piGm8dpgxFmkJjmu
|
|
27
27
|
|
|
28
28
|
# Issue the credential
|
|
29
|
-
vcTnl: compute createVcJwt payloadVcTnl {} ES256
|
|
29
|
+
vcTnl: compute createVcJwt payloadVcTnl {} ES256 1.1
|
|
30
30
|
|
|
31
31
|
view resultHealth
|
|
32
32
|
# pass the VC to the Service Ops Manager (see verifyVcTnl)
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
# way of use:
|
|
2
2
|
# ==> run issue_CTRevocableCredential <didIssuer> <didSubject> <issuerAttributeIdUrl> <issuerProxyId> <statusIndex> <statusListIndex>
|
|
3
3
|
|
|
4
|
-
payloadCTRevocableCredential: load assets/CTRevocableCredential.json
|
|
4
|
+
payloadCTRevocableCredential: load assets/vcdm1.1/CTRevocableCredential.json
|
|
5
5
|
set payloadCTRevocableCredential.issuer $1
|
|
6
6
|
set payloadCTRevocableCredential.credentialSubject.id $2
|
|
7
7
|
set payloadCTRevocableCredential.termsOfUse.id $3
|
|
@@ -9,4 +9,4 @@ set payloadCTRevocableCredential.credentialSchema.id tsrUrl /schemas/zH74MKkYTbQ
|
|
|
9
9
|
set payloadCTRevocableCredential.credentialStatus.id tirUrl /issuers/ user.did /proxies/ $4 /credentials/status/ $5
|
|
10
10
|
set payloadCTRevocableCredential.credentialStatus.statusListIndex $6
|
|
11
11
|
set payloadCTRevocableCredential.credentialStatus.statusListCredential tirUrl /issuers/ user.did /proxies/ $4 /credentials/status/ $5
|
|
12
|
-
compute createVcJwt payloadCTRevocableCredential {} ES256
|
|
12
|
+
compute createVcJwt payloadCTRevocableCredential {} ES256 1.1
|
|
@@ -1,10 +1,10 @@
|
|
|
1
1
|
# way of use:
|
|
2
2
|
# ==> run issue_SelfAttestationSupportOffice <didIssuer> <reservedAttributeId>
|
|
3
3
|
|
|
4
|
-
payloadVc: load assets/CredentialToAttestVerifiableAuthorisationForTrustChain.json
|
|
4
|
+
payloadVc: load assets/vcdm1.1/CredentialToAttestVerifiableAuthorisationForTrustChain.json
|
|
5
5
|
set payloadVc.issuer $1
|
|
6
6
|
set payloadVc.credentialSubject.id $1
|
|
7
7
|
set payloadVc.credentialSubject.accreditedFor[0].schemaId tsrUrl /schemas/zH74MKkYTbQ6ZfTxufi6A3Aw8giS4piGm8dpgxFmkJjmu
|
|
8
8
|
set payloadVc.credentialSchema.id tsrUrl /schemas/zH74MKkYTbQ6ZfTxufi6A3Aw8giS4piGm8dpgxFmkJjmu
|
|
9
9
|
set payloadVc.credentialSubject.reservedAttributeId $2
|
|
10
|
-
compute createVcJwt payloadVc {} ES256
|
|
10
|
+
compute createVcJwt payloadVc {} ES256 1.1
|
|
@@ -1,11 +1,11 @@
|
|
|
1
1
|
# way of use:
|
|
2
2
|
# ==> run issue_VerifiableAccreditationToAccredit <didIssuer> <didSubject> <issuerAttributeIdUrl> <reservedAttributeId>
|
|
3
3
|
|
|
4
|
-
payloadVcTAO: load assets/VerifiableAccreditationToAccredit.json
|
|
4
|
+
payloadVcTAO: load assets/vcdm1.1/VerifiableAccreditationToAccredit.json
|
|
5
5
|
set payloadVcTAO.issuer $1
|
|
6
6
|
set payloadVcTAO.credentialSubject.id $2
|
|
7
7
|
set payloadVcTAO.credentialSubject.accreditedFor.0.schemaId tsrUrl /schemas/zH74MKkYTbQ6ZfTxufi6A3Aw8giS4piGm8dpgxFmkJjmu
|
|
8
8
|
set payloadVcTAO.termsOfUse.0.id $3
|
|
9
9
|
set payloadVcTAO.credentialSchema.id tsrUrl /schemas/zHXHLkJpZg4w9nt2GbEBbyE8uhkfirbmT3nF7mJ9kFnjv
|
|
10
10
|
set payloadVcTAO.credentialSubject.reservedAttributeId $4
|
|
11
|
-
compute createVcJwt payloadVcTAO {} ES256
|
|
11
|
+
compute createVcJwt payloadVcTAO {} ES256 1.1
|
|
@@ -1,11 +1,11 @@
|
|
|
1
1
|
# way of use:
|
|
2
2
|
# ==> run issue_VerifiableAccreditationToAttest <didIssuer> <didSubject> <issuerAttributeIdUrl> <reservedAttributeId>
|
|
3
3
|
|
|
4
|
-
payloadVcTI: load assets/VerifiableAccreditationToAttest.json
|
|
4
|
+
payloadVcTI: load assets/vcdm1.1/VerifiableAccreditationToAttest.json
|
|
5
5
|
set payloadVcTI.issuer $1
|
|
6
6
|
set payloadVcTI.credentialSubject.id $2
|
|
7
7
|
set payloadVcTI.credentialSubject.accreditedFor.0.schemaId tsrUrl /schemas/zH74MKkYTbQ6ZfTxufi6A3Aw8giS4piGm8dpgxFmkJjmu
|
|
8
8
|
set payloadVcTI.termsOfUse.id $3
|
|
9
9
|
set payloadVcTI.credentialSchema.id tsrUrl /schemas/zHXHLkJpZg4w9nt2GbEBbyE8uhkfirbmT3nF7mJ9kFnjv
|
|
10
10
|
set payloadVcTI.credentialSubject.reservedAttributeId $4
|
|
11
|
-
compute createVcJwt payloadVcTI {} ES256
|
|
11
|
+
compute createVcJwt payloadVcTI {} ES256 1.1
|
|
@@ -1,10 +1,10 @@
|
|
|
1
1
|
# way of use:
|
|
2
2
|
# ==> run issue_VerifiableAuthorisationForTrustChain <didIssuer> <didSubject> <issuerAttributeIdUrl> <reservedAttributeId>
|
|
3
3
|
|
|
4
|
-
payloadVcRootTAO: load assets/VerifiableAuthorisationForTrustChain.json
|
|
4
|
+
payloadVcRootTAO: load assets/vcdm1.1/VerifiableAuthorisationForTrustChain.json
|
|
5
5
|
set payloadVcRootTAO.issuer $1
|
|
6
6
|
set payloadVcRootTAO.credentialSubject.id $2
|
|
7
7
|
set payloadVcRootTAO.termsOfUse.id $3
|
|
8
8
|
set payloadVcRootTAO.credentialSchema.id tsrUrl /schemas/zH74MKkYTbQ6ZfTxufi6A3Aw8giS4piGm8dpgxFmkJjmu
|
|
9
9
|
set payloadVcRootTAO.credentialSubject.reservedAttributeId $4
|
|
10
|
-
compute createVcJwt payloadVcRootTAO {} ES256
|
|
10
|
+
compute createVcJwt payloadVcRootTAO {} ES256 1.1
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
# way of use:
|
|
2
2
|
# ==> run issue_VerifiableAuthorisationToOnboard <didIssuer> <didSubject> <issuerAttributeIdUrl>
|
|
3
3
|
|
|
4
|
-
payloadVcOnboard: load assets/VerifiableAuthorisationToOnboard.json
|
|
4
|
+
payloadVcOnboard: load assets/vcdm1.1/VerifiableAuthorisationToOnboard.json
|
|
5
5
|
set payloadVcOnboard.issuer $1
|
|
6
6
|
set payloadVcOnboard.credentialSubject.id $2
|
|
7
7
|
set payloadVcOnboard.termsOfUse.id $3
|
|
8
8
|
set payloadVcOnboard.credentialSchema.id tsrUrl /schemas/zH74MKkYTbQ6ZfTxufi6A3Aw8giS4piGm8dpgxFmkJjmu
|
|
9
|
-
compute createVcJwt payloadVcOnboard {} ES256
|
|
9
|
+
compute createVcJwt payloadVcOnboard {} ES256 1.1
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
# ==> run preregisterIssuer <didSubject> <issuerType> <vc>
|
|
2
2
|
jwtDecoded: compute decodeJWT $3
|
|
3
3
|
set reservedAttributeId jwtDecoded.payload.vc.credentialSubject.reservedAttributeId
|
|
4
|
-
resAuthTIR: authorisation auth tir_write_presentation ES256
|
|
4
|
+
resAuthTIR: authorisation auth tir_write_presentation ES256 [] 1.1
|
|
5
5
|
using token resAuthTIR.access_token
|
|
6
6
|
tir setAttributeMetadata $1 reservedAttributeId $2 user.did user.accreditationId
|
|
@@ -1,11 +1,11 @@
|
|
|
1
1
|
# register first part of DID document
|
|
2
|
-
resAuthDIDRInvite: authorisation auth didr_invite_presentation ES256 $1
|
|
2
|
+
resAuthDIDRInvite: authorisation auth didr_invite_presentation ES256 $1 1.1
|
|
3
3
|
using token resAuthDIDRInvite.access_token
|
|
4
4
|
|
|
5
5
|
did insertDidDocument
|
|
6
6
|
|
|
7
7
|
# complete DID document
|
|
8
|
-
resAuthDIDRWrite: authorisation auth didr_write_presentation ES256K
|
|
8
|
+
resAuthDIDRWrite: authorisation auth didr_write_presentation ES256K [] 1.1
|
|
9
9
|
using token resAuthDIDRWrite.access_token
|
|
10
10
|
|
|
11
11
|
did addVerificationMethod user.did ES256
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
# ==> run registerIssuer <vc>
|
|
2
2
|
jwtDecoded: compute decodeJWT $1
|
|
3
3
|
set reservedAttributeId jwtDecoded.payload.vc.credentialSubject.reservedAttributeId
|
|
4
|
-
resAuthTIR: authorisation auth tir_invite_presentation ES256 $1
|
|
4
|
+
resAuthTIR: authorisation auth tir_invite_presentation ES256 $1 1.1
|
|
5
5
|
using token resAuthTIR.access_token
|
|
6
6
|
tir setAttributeData user.did reservedAttributeId $1
|
|
@@ -1,10 +1,10 @@
|
|
|
1
1
|
# way of use:
|
|
2
2
|
# ==> run issueVcRootTAO <didSubject> <reservedAttributeId>
|
|
3
3
|
|
|
4
|
-
payloadVcRootTAO: load assets/VerifiableAuthorisationForTrustChain.json
|
|
4
|
+
payloadVcRootTAO: load assets/vcdm1.1/VerifiableAuthorisationForTrustChain.json
|
|
5
5
|
set payloadVcRootTAO.issuer user.did
|
|
6
6
|
set payloadVcRootTAO.credentialSubject.id $1
|
|
7
7
|
set payloadVcRootTAO.termsOfUse.id user.accreditationUrl
|
|
8
8
|
set payloadVcRootTAO.credentialSchema.id tsrUrl /schemas/zH74MKkYTbQ6ZfTxufi6A3Aw8giS4piGm8dpgxFmkJjmu
|
|
9
9
|
set payloadVcRootTAO.credentialSubject.reservedAttributeId $2
|
|
10
|
-
compute createVcJwt payloadVcRootTAO {} ES256
|
|
10
|
+
compute createVcJwt payloadVcRootTAO {} ES256 1.1
|
package/dist/scripts/updateVcTAO
CHANGED
|
@@ -1,11 +1,11 @@
|
|
|
1
1
|
# way of use:
|
|
2
2
|
# ==> run issueVcTAO <didSubject> <reservedAttributeId>
|
|
3
3
|
|
|
4
|
-
payloadVcTAO: load assets/VerifiableAccreditationToAccredit.json
|
|
4
|
+
payloadVcTAO: load assets/vcdm1.1/VerifiableAccreditationToAccredit.json
|
|
5
5
|
set payloadVcTAO.issuer user.did
|
|
6
6
|
set payloadVcTAO.credentialSubject.id $1
|
|
7
7
|
set payloadVcTAO.credentialSubject.accreditedFor.0.schemaId tsrUrl /schemas/zH74MKkYTbQ6ZfTxufi6A3Aw8giS4piGm8dpgxFmkJjmu
|
|
8
8
|
set payloadVcTAO.termsOfUse.0.id user.accreditationUrl
|
|
9
9
|
set payloadVcTAO.credentialSchema.id tsrUrl /schemas/zHXHLkJpZg4w9nt2GbEBbyE8uhkfirbmT3nF7mJ9kFnjv
|
|
10
10
|
set payloadVcTAO.credentialSubject.reservedAttributeId $2
|
|
11
|
-
compute createVcJwt payloadVcTAO {} ES256
|
|
11
|
+
compute createVcJwt payloadVcTAO {} ES256 1.1
|
package/dist/scripts/updateVcTI
CHANGED
|
@@ -1,11 +1,11 @@
|
|
|
1
1
|
# way of use:
|
|
2
2
|
# ==> run issueVcTI <didSubject> <reservedAttributeId>
|
|
3
3
|
|
|
4
|
-
payloadVcTI: load assets/VerifiableAccreditationToAttest.json
|
|
4
|
+
payloadVcTI: load assets/vcdm1.1/VerifiableAccreditationToAttest.json
|
|
5
5
|
set payloadVcTI.issuer user.did
|
|
6
6
|
set payloadVcTI.credentialSubject.id $1
|
|
7
7
|
set payloadVcTI.credentialSubject.accreditedFor.0.schemaId tsrUrl /schemas/zH74MKkYTbQ6ZfTxufi6A3Aw8giS4piGm8dpgxFmkJjmu
|
|
8
8
|
set payloadVcTI.termsOfUse.id user.accreditationUrl
|
|
9
9
|
set payloadVcTI.credentialSchema.id tsrUrl /schemas/zHXHLkJpZg4w9nt2GbEBbyE8uhkfirbmT3nF7mJ9kFnjv
|
|
10
10
|
set payloadVcTI.credentialSubject.reservedAttributeId $2
|
|
11
|
-
compute createVcJwt payloadVcTI {} ES256
|
|
11
|
+
compute createVcJwt payloadVcTI {} ES256 1.1
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> run issue_SelfAttestationSupportOffice <didIssuer> <reservedAttributeId>
|
|
3
|
+
|
|
4
|
+
payloadVc: load assets/vcdm2.0/CredentialToAttestVerifiableAuthorisationForTrustChain.json
|
|
5
|
+
set payloadVc.issuer $1
|
|
6
|
+
set payloadVc.credentialSubject.id $1
|
|
7
|
+
set payloadVc.credentialSubject.permissionFor[0].schemaId tsrUrl /schemas/zB5yLy7GXdZs1iaJ7wN2K5mhwZDTxjECM2fELYE73mu3E
|
|
8
|
+
set payloadVc.credentialSchema.id tsrUrl /schemas/zB5yLy7GXdZs1iaJ7wN2K5mhwZDTxjECM2fELYE73mu3E
|
|
9
|
+
set payloadVc.credentialSubject.reservedAttributeId $2
|
|
10
|
+
compute createVcJwt payloadVc {} ES256 2.0
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> run issueVcInvoke <didSubject> <address>
|
|
3
|
+
|
|
4
|
+
rootAuthorisationFromAccreditation: tir getRootAuthorisation user.accreditationUrl
|
|
5
|
+
payloadVcInvoke: load assets/vcdm2.0/VerifiableAuthorisationToInvoke.json
|
|
6
|
+
set payloadVcInvoke.issuer user.did
|
|
7
|
+
set payloadVcInvoke.credentialSubject.id $1
|
|
8
|
+
set payloadVcInvoke.credentialSubject.contractAddress $2
|
|
9
|
+
set payloadVcInvoke.termsOfUse.parentAccreditation user.accreditationUrl
|
|
10
|
+
set payloadVcInvoke.termsOfUse.rootAuthorisation rootAuthorisationFromAccreditation
|
|
11
|
+
set payloadVcInvoke.credentialSchema.id tsrUrl /schemas/zB5yLy7GXdZs1iaJ7wN2K5mhwZDTxjECM2fELYE73mu3E
|
|
12
|
+
compute createVcJwt payloadVcInvoke {} ES256 2.0
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> run issueVcOnboard <didSubject>
|
|
3
|
+
|
|
4
|
+
rootAuthorisationFromAccreditation: tir getRootAuthorisation user.accreditationUrl
|
|
5
|
+
payloadVcOnboard: load assets/vcdm2.0/VerifiableAuthorisationToOnboard.json
|
|
6
|
+
set payloadVcOnboard.issuer user.did
|
|
7
|
+
set payloadVcOnboard.credentialSubject.id $1
|
|
8
|
+
set payloadVcOnboard.termsOfUse.parentAccreditation user.accreditationUrl
|
|
9
|
+
set payloadVcOnboard.termsOfUse.rootAuthorisation rootAuthorisationFromAccreditation
|
|
10
|
+
set payloadVcOnboard.credentialSchema.id tsrUrl /schemas/zB5yLy7GXdZs1iaJ7wN2K5mhwZDTxjECM2fELYE73mu3E
|
|
11
|
+
compute createVcJwt payloadVcOnboard {} ES256 2.0
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> run issueVcRootTAO <didSubject> <trustFramework> <policyId> <legalBasis>
|
|
3
|
+
|
|
4
|
+
reservedAttributeId: compute randomID
|
|
5
|
+
payloadVcRootTAO: load assets/vcdm2.0/VerifiableAuthorisationForTrustChain.json
|
|
6
|
+
set payloadVcRootTAO.issuer user.did
|
|
7
|
+
set payloadVcRootTAO.credentialSubject.id $1
|
|
8
|
+
set payloadVcRootTAO.termsOfUse.trustFramework $2
|
|
9
|
+
set payloadVcRootTAO.termsOfUse.policyId $3
|
|
10
|
+
set payloadVcRootTAO.termsOfUse.legalBasis $4
|
|
11
|
+
set payloadVcRootTAO.credentialSchema.id tsrUrl /schemas/zB5yLy7GXdZs1iaJ7wN2K5mhwZDTxjECM2fELYE73mu3E
|
|
12
|
+
set payloadVcRootTAO.credentialStatus.id tirUrl /issuers/ $1 /attributes/ reservedAttributeId
|
|
13
|
+
set payloadVcRootTAO.credentialSubject.reservedAttributeId reservedAttributeId
|
|
14
|
+
compute createVcJwt payloadVcRootTAO {} ES256 2.0
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> run issueVcTAO <didSubject>
|
|
3
|
+
|
|
4
|
+
rootAuthorisationFromAccreditation: tir getRootAuthorisation user.accreditationUrl
|
|
5
|
+
reservedAttributeId: compute randomID
|
|
6
|
+
payloadVcTAO: load assets/vcdm2.0/VerifiableAccreditationToAccredit.json
|
|
7
|
+
set payloadVcTAO.issuer user.did
|
|
8
|
+
set payloadVcTAO.credentialSubject.id $1
|
|
9
|
+
set payloadVcTAO.credentialSubject.permissionFor.0.schemaId tsrUrl /schemas/zB5yLy7GXdZs1iaJ7wN2K5mhwZDTxjECM2fELYE73mu3E
|
|
10
|
+
set payloadVcTAO.termsOfUse.0.parentAccreditation user.accreditationUrl
|
|
11
|
+
set payloadVcTAO.termsOfUse.0.rootAuthorisation rootAuthorisationFromAccreditation
|
|
12
|
+
set payloadVcTAO.credentialSchema.id tsrUrl /schemas/z2DzoeZrgduRwk3y4RAetwSHRZAHAqNF6fWWMaEcZUdAY
|
|
13
|
+
set payloadVcTAO.credentialStatus.id tirUrl /issuers/ $1 /attributes/ reservedAttributeId
|
|
14
|
+
set payloadVcTAO.credentialSubject.reservedAttributeId reservedAttributeId
|
|
15
|
+
compute createVcJwt payloadVcTAO {} ES256 2.0
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> run issueVcTI <didSubject>
|
|
3
|
+
|
|
4
|
+
rootAuthorisationFromAccreditation: tir getRootAuthorisation user.accreditationUrl
|
|
5
|
+
reservedAttributeId: compute randomID
|
|
6
|
+
payloadVcTI: load assets/vcdm2.0/VerifiableAccreditationToAttest.json
|
|
7
|
+
set payloadVcTI.issuer user.did
|
|
8
|
+
set payloadVcTI.credentialSubject.id $1
|
|
9
|
+
set payloadVcTI.credentialSubject.permissionFor.0.schemaId tsrUrl /schemas/zB5yLy7GXdZs1iaJ7wN2K5mhwZDTxjECM2fELYE73mu3E
|
|
10
|
+
set payloadVcTI.termsOfUse.parentAccreditation user.accreditationUrl
|
|
11
|
+
set payloadVcTI.termsOfUse.rootAuthorisation rootAuthorisationFromAccreditation
|
|
12
|
+
set payloadVcTI.credentialSchema.id tsrUrl /schemas/z2DzoeZrgduRwk3y4RAetwSHRZAHAqNF6fWWMaEcZUdAY
|
|
13
|
+
set payloadVcTI.credentialStatus.id tirUrl /issuers/ $1 /attributes/ reservedAttributeId
|
|
14
|
+
set payloadVcTI.credentialSubject.reservedAttributeId reservedAttributeId
|
|
15
|
+
compute createVcJwt payloadVcTI {} ES256 2.0
|
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
payloadVcTnl: load assets/vcdm2.0/TrustedNodesList.json
|
|
2
|
+
set payloadVcTnl.credentialSubject.id SET_SERVICE_OPS_MANAGER
|
|
3
|
+
|
|
4
|
+
# environment: test, pilot, preprod, or prod
|
|
5
|
+
set payloadVcTnl.credentialSubject.environment SET_ENV
|
|
6
|
+
|
|
7
|
+
# chainId
|
|
8
|
+
# test: 6175
|
|
9
|
+
# pilot: 6179
|
|
10
|
+
set payloadVcTnl.credentialSubject.chainId SET_CHAIN_ID
|
|
11
|
+
|
|
12
|
+
# version
|
|
13
|
+
set payloadVcTnl.credentialSubject.version SET_TNL_VERSION
|
|
14
|
+
|
|
15
|
+
# Load nodes
|
|
16
|
+
nodes: load assets/Nodes.json
|
|
17
|
+
|
|
18
|
+
# Check the status
|
|
19
|
+
resultHealth: tnl healthNodes nodes
|
|
20
|
+
nodesTotal: compute length resultHealth.nodesOk
|
|
21
|
+
set payloadVcTnl.credentialSubject.nodesTotal nodesTotal
|
|
22
|
+
set payloadVcTnl.credentialSubject.nodes resultHealth.nodesOk
|
|
23
|
+
|
|
24
|
+
# Other updates
|
|
25
|
+
rootAuthorisationFromAccreditation: tir getRootAuthorisation user.accreditationUrl
|
|
26
|
+
set payloadVcTnl.termsOfUse.parentAccreditation user.accreditationUrl
|
|
27
|
+
set payloadVcTnl.termsOfUse.rootAuthorisation rootAuthorisationFromAccreditation
|
|
28
|
+
set payloadVcTnl.credentialSchema.id ebsi: payloadVcTnl.credentialSubject.environment :trusted-schemas-registry:/schemas/zB5yLy7GXdZs1iaJ7wN2K5mhwZDTxjECM2fELYE73mu3E
|
|
29
|
+
|
|
30
|
+
# Issue the credential
|
|
31
|
+
vcTnl: compute createVcJwt payloadVcTnl {} ES256 2.0
|
|
32
|
+
|
|
33
|
+
view resultHealth
|
|
34
|
+
# pass the VC to the Service Ops Manager (see verifyVcTnl)
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
# register first part of DID document
|
|
2
|
+
resAuthDIDRInvite: authorisation auth didr_invite_presentation ES256 $1 2.0
|
|
3
|
+
using token resAuthDIDRInvite.access_token
|
|
4
|
+
|
|
5
|
+
did insertDidDocument
|
|
6
|
+
|
|
7
|
+
# complete DID document
|
|
8
|
+
resAuthDIDRWrite: authorisation auth didr_write_presentation ES256K [] 2.0
|
|
9
|
+
using token resAuthDIDRWrite.access_token
|
|
10
|
+
|
|
11
|
+
did addVerificationMethod user.did ES256
|
|
12
|
+
did addVerificationRelationship user.did authentication ES256
|
|
13
|
+
did addVerificationRelationship user.did assertionMethod ES256
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> run issueVcRootTAO <didSubject> <trustFramework> <policyId> <legalBasis> <reservedAttributeId>
|
|
3
|
+
|
|
4
|
+
payloadVcRootTAO: load assets/vcdm2.0/VerifiableAuthorisationForTrustChain.json
|
|
5
|
+
set payloadVcRootTAO.issuer user.did
|
|
6
|
+
set payloadVcRootTAO.credentialSubject.id $1
|
|
7
|
+
set payloadVcRootTAO.termsOfUse.trustFramework $2
|
|
8
|
+
set payloadVcRootTAO.termsOfUse.policyId $3
|
|
9
|
+
set payloadVcRootTAO.termsOfUse.legalBasis $4
|
|
10
|
+
set payloadVcRootTAO.credentialSchema.id tsrUrl /schemas/zB5yLy7GXdZs1iaJ7wN2K5mhwZDTxjECM2fELYE73mu3E
|
|
11
|
+
set payloadVcRootTAO.credentialStatus.id tirUrl /issuers/ $1 /attributes/ $5
|
|
12
|
+
set payloadVcRootTAO.credentialSubject.reservedAttributeId $5
|
|
13
|
+
compute createVcJwt payloadVcRootTAO {} ES256 2.0
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> run issueVcTAO <didSubject> <reservedAttributeId>
|
|
3
|
+
|
|
4
|
+
rootAuthorisationFromAccreditation: tir getRootAuthorisation user.accreditationUrl
|
|
5
|
+
payloadVcTAO: load assets/vcdm2.0/VerifiableAccreditationToAccredit.json
|
|
6
|
+
set payloadVcTAO.issuer user.did
|
|
7
|
+
set payloadVcTAO.credentialSubject.id $1
|
|
8
|
+
set payloadVcTAO.credentialSubject.permissionFor.0.schemaId tsrUrl /schemas/zB5yLy7GXdZs1iaJ7wN2K5mhwZDTxjECM2fELYE73mu3E
|
|
9
|
+
set payloadVcTAO.termsOfUse.0.parentAccreditation user.accreditationUrl
|
|
10
|
+
set payloadVcTAO.termsOfUse.0.rootAuthorisation rootAuthorisationFromAccreditation
|
|
11
|
+
set payloadVcTAO.credentialSchema.id tsrUrl /schemas/z2DzoeZrgduRwk3y4RAetwSHRZAHAqNF6fWWMaEcZUdAY
|
|
12
|
+
set payloadVcTAO.credentialStatus.id tirUrl /issuers/ $1 /attributes/ $2
|
|
13
|
+
set payloadVcTAO.credentialSubject.reservedAttributeId $2
|
|
14
|
+
compute createVcJwt payloadVcTAO {} ES256 2.0
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
# way of use:
|
|
2
|
+
# ==> run issueVcTI <didSubject> <reservedAttributeId>
|
|
3
|
+
|
|
4
|
+
rootAuthorisationFromAccreditation: tir getRootAuthorisation user.accreditationUrl
|
|
5
|
+
payloadVcTI: load assets/vcdm2.0/VerifiableAccreditationToAttest.json
|
|
6
|
+
set payloadVcTI.issuer user.did
|
|
7
|
+
set payloadVcTI.credentialSubject.id $1
|
|
8
|
+
set payloadVcTI.credentialSubject.permissionFor.0.schemaId tsrUrl /schemas/zB5yLy7GXdZs1iaJ7wN2K5mhwZDTxjECM2fELYE73mu3E
|
|
9
|
+
set payloadVcTI.termsOfUse.parentAccreditation user.accreditationUrl
|
|
10
|
+
set payloadVcTI.termsOfUse.rootAuthorisation rootAuthorisationFromAccreditation
|
|
11
|
+
set payloadVcTI.credentialSchema.id tsrUrl /schemas/z2DzoeZrgduRwk3y4RAetwSHRZAHAqNF6fWWMaEcZUdAY
|
|
12
|
+
set payloadVcTI.credentialStatus.id tirUrl /issuers/ $1 /attributes/ $2
|
|
13
|
+
set payloadVcTI.credentialSubject.reservedAttributeId $2
|
|
14
|
+
compute createVcJwt payloadVcTI {} ES256 2.0
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
# the Service Ops Manager loads his user, verifies the
|
|
2
|
+
# credential and creates a VP with a generic audience
|
|
3
|
+
|
|
4
|
+
set jwtPayload {"aud":"any"}
|
|
5
|
+
set jwtPayload.exp # undefined: no expiration
|
|
6
|
+
vpTnl: compute createVpJwt vcTnl {} jwtPayload ES256 2.0
|
|
7
|
+
|
|
8
|
+
# verify VC and VP
|
|
9
|
+
compute verifyVcJwt vcTnl
|
|
10
|
+
compute verifyVpJwt vpTnl any
|
package/dist/scripts/verifyVcTnl
CHANGED
|
@@ -11,7 +11,7 @@ set myIssuer user
|
|
|
11
11
|
conformance check ti_request_verifiable_authorisation_to_onboard
|
|
12
12
|
|
|
13
13
|
# register did document
|
|
14
|
-
run
|
|
14
|
+
run registerDidDocument vcOnboard.vc
|
|
15
15
|
conformance check ti_register_did
|
|
16
16
|
|
|
17
17
|
# request VerifiableAccreditationToAttest (TI)
|
|
@@ -19,7 +19,7 @@ vcTI: conformance getCredential ti
|
|
|
19
19
|
conformance check ti_request_verifiable_accreditation_to_attest
|
|
20
20
|
|
|
21
21
|
# register the credential for TI
|
|
22
|
-
t: authorisation auth tir_invite_presentation ES256 vcTI.vc
|
|
22
|
+
t: authorisation auth tir_invite_presentation ES256 vcTI.vc 1.1
|
|
23
23
|
using token t.access_token
|
|
24
24
|
tir setAttributeData myIssuer.did vcTI.reservedAttributeId vcTI.vc
|
|
25
25
|
set vcTI.url tirUrl /issuers/ myIssuer.did /attributes/ vcTI.reservedAttributeId
|
|
@@ -89,7 +89,7 @@ tir setAttributeMetadata subaccount attributes.items.1.id revoked myIssuer.did v
|
|
|
89
89
|
conformance check tao_revoke_rights_subaccount
|
|
90
90
|
|
|
91
91
|
# request VerifiableAuthorisationForTrustChain (Root TAO)
|
|
92
|
-
vcRootTAO: conformance getCredential roottao ES256 vcOnboard.vc
|
|
92
|
+
vcRootTAO: conformance getCredential roottao ES256 vcOnboard.vc "" 1.1
|
|
93
93
|
conformance check rtao_request_verifiableauthorisationfortrustchain
|
|
94
94
|
|
|
95
95
|
# register the credential for RootTAO
|
|
@@ -35,5 +35,5 @@ set credentials.5 c5
|
|
|
35
35
|
set credentials.6 c6
|
|
36
36
|
set credentials.7 c7
|
|
37
37
|
|
|
38
|
-
conformance holder CTWalletQualificationCredential authorisedInTime ES256 credentials
|
|
38
|
+
conformance holder CTWalletQualificationCredential authorisedInTime ES256 credentials "" "" 1.1
|
|
39
39
|
conformance check request_ct_wallet_qualification_credential
|