-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Something to hack on: vc-js-cli #1
Comments
I've have your cli tool running now. The trick is to not The instructions are The problem I'm running into now is that I can't find any convenient tools to convert testnet WIF (the standard for P2PKH private key) to your base58 format, or visa versa. All of my example transactions I have tesnet WIF keys for, but I can't use them for claims, and I can't use the keys you generate with your tools to generate testnet transactions as I need a testnet WIF. I have found some online WIF tools but they only work with mainnet WIFs. The reason why WIF was defined was to a) have a checksum, as private keys are lossy, and b) make sure people didn't reuse keys on different networks like mainnet and testnet. I note that the JSON-LD playground has javascript support for both mainnet and testnet WIF keys in its JSON-LD signing tool. As soon as I've got this annoying thing worked out, I want to issue some real BTCR DID based credentials with my test DIDs. -- Christopher Allen |
A bug in your implementation. It does create the gists in https://gist.github.com/christophera however, executing the issuance example in the README issues a verifiable claim has your info as issuer in it. I shouldn't have to change the templates, the tool should automatically substitute to the issuer in the my-key.json. https://gist.githubusercontent.com/ChristopherA/da71b16b6806b7d903cbd12e49dfe0dd/raw
resulting alumni-signed.jsonld:
|
@ChristopherA I wonder if you may have an older version of the docker image. can you try the following command and see if it downloads an update?
|
No, the document still has you as issuer after -- Christopher Allen |
@ChristopherA that was a fun bug. Thanks for testing! Please do:
And give it another go. I've updated the alias command here as well: https://github.com/digitalbazaar/vc-demo#create-an-alias |
The latest results in another bug. I don't have a ed25519 key, only a Ecdsa key in
-- Christopher Allen |
@ChristopherA I see the latest signed VC example you gave is still referencing my Another thing you can try is renaming your key file to The issue from earlier is that there was a key |
I refreshed the image again, and renamed my key file, and that seems to have done the trick.
|
I'm still stumbling trying to find a testnet WIF private key to base58 and back conversion function that is keeping me from testing some real BTCR Verifiable Credentials. https://en.bitcoinwiki.org/wiki/Wallet_import_format -- Christopher Allen |
Cool @mattcollier, got it working for me too. @ChristopherA, would bitcoinjs-lib work for you? Using fromPrivateKey and then toWIF It looks like it supports the network command. |
@AnthonyRonning I've really no experience myself with javascript tooling (more a C/C++ guy). I'm fine if there is a web page out there that does the conversion so I can hack in the value into the template. The cli tool wants base58 because there is a schema for that, but that is non-standard in the bitcoin world doesn't use base58 for private keys. |
Related issue about encoding of keys: w3c-ccg/didm-btcr#19 Also related: digitalbazaar/jsonld-signatures#74 |
@mattcollier and I were able to get a little project going for signing/verifying btcr based vc's. https://github.com/AnthonyRonning/vc-testing Right now just hardcoded values, keydocs, and test credentials, but this is one of the signed vc's we have so far:
Just a little note that it's resolving with this branch of btcr-did-js (https://github.com/WebOfTrustInfo/btcr-did-tools-js/tree/vc-capable), and I had to change the resolved context url from |
@mattcollier is this demo still available and running? How out of date is it with current JSON-LD signing schemes from Digital Bazaar. Also, how to I succinctly explain to someone that the JWS value doesn't make this JWS? I'm confused, and people wanting JSON-LD signing are confused to. |
Hello Christopher, @dmitrizagidulin should be able to assist you with this. |
@mattcollier thanks! @dmitrizagidulin — @rxgrant and @danpape need some examples of bitcoin signed documents to test their C++ library against. We are trying to get BTCR working, so we initially need to sign some DID extension documents, and then some VCs. |
@ChristopherA got it, let me see if I can find / write up some examples for you. As far as your earlier question, about JWS - so, that field contains a valid detached payload JWS string, as per RFC https://tools.ietf.org/html/rfc7797. Does that help? |
@dmitrizagidulin but is that an example of the current thoughts on JSON-LD signatures, or is it the JWS compromise? |
@ChristopherA That is an example of current thoughts on JSON-LD signatures, yes. (There were compromises involved in arriving there, but that's the current state.) |
Hello All,
I see that verifiable credentials are a topic of interest for this hackathon. This CLI tool described in this demo may be of interest: https://github.com/digitalbazaar/vc-demo
It is currently possible to:
Possible hackathon projects:
Node.js Source Code
A sample signed VC looks like this. You should be able to verify this credential yourself using the vc-js-cli tool.
The text was updated successfully, but these errors were encountered: