Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Default Backend API to Array Of Credential Schema #1366

Merged
merged 3 commits into from
Sep 26, 2024
Merged

Conversation

CryptoKnightIOG
Copy link
Contributor

Copy link
Contributor

github-actions bot commented Sep 18, 2024

Unit Test Results

101 files  ±0  101 suites  ±0   20m 16s ⏱️ +43s
869 tests ±0  861 ✅ ±0  8 💤 ±0  0 ❌ ±0 
876 runs  ±0  868 ✅ ±0  8 💤 ±0  0 ❌ ±0 

Results for commit 15c9f33. ± Comparison against base commit e532ba6.

♻️ This comment has been updated with latest results.

@coveralls
Copy link

coveralls commented Sep 18, 2024

Coverage Status

coverage: 48.532% (-0.03%) from 48.558%
when pulling 15c9f33 on ATL-7775
into e532ba6 on main.

@@ -69,7 +65,7 @@ class IssueControllerImpl(
pairwiseHolderDID = offerContext.pairwiseHolderDID,
kidIssuer = request.issuingKid,
thid = DidCommID(),
maybeSchemaId = request.schemaId,
maybeSchemaIds = Applicative[Option].map2(request.schemaIds, request.schemaId.map(List(_)))(_ ++ _),
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@CryptoKnightIOG, two fields might contain schemaId: schemaId and schemaIds.
Remember, I recommended splitting VCDM 1.1 and 2.0 at the domain level, but I see that the API also should be segregated.
Otherwise, the result API is going to be overloaded and slightly weird.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If you are still going to go this way, use the same REST API for both models. I recommend deleting schemaIds and allowing schemaId to be either String or List[String].

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I fixed it this PR #1368

@CryptoKnightIOG CryptoKnightIOG force-pushed the ATL-7775 branch 2 times, most recently from 2fc12f6 to 00d9698 Compare September 24, 2024 14:57
@CryptoKnightIOG CryptoKnightIOG enabled auto-merge (squash) September 26, 2024 17:02
Copy link
Contributor

Integration Test Results

20 files  ±0  20 suites  ±0   2s ⏱️ ±0s
45 tests ±0  45 ✅ ±0  0 💤 ±0  0 ❌ ±0 
71 runs  ±0  71 ✅ ±0  0 💤 ±0  0 ❌ ±0 

Results for commit 15c9f33. ± Comparison against base commit e532ba6.

@CryptoKnightIOG CryptoKnightIOG merged commit 693dcc4 into main Sep 26, 2024
13 checks passed
@CryptoKnightIOG CryptoKnightIOG deleted the ATL-7775 branch September 26, 2024 17:07
bytewizard42i pushed a commit to bytewizard42i/identus-cloud-agent that referenced this pull request Nov 13, 2024
# [1.40.0](hyperledger-identus/cloud-agent@cloud-agent-v1.39.0...cloud-agent-v1.40.0) (2024-11-05)

### Bug Fixes

* Add key_id missing field ([hyperledger-identus#1403](hyperledger-identus#1403)) ([cbd1a03](hyperledger-identus@cbd1a03))
* adjust Kotlin and TypeScript HTTP client to use the `schemaId` f… ([hyperledger-identus#1388](hyperledger-identus#1388)) ([c2da492](hyperledger-identus@c2da492))
* cannot reuse the same credential-offer in oid4vci ([hyperledger-identus#1361](hyperledger-identus#1361)) ([6a0a3ea](hyperledger-identus@6a0a3ea))
* handle unsupported PIURI found in DIDComm messages accordingly ([hyperledger-identus#1399](hyperledger-identus#1399)) ([9b64793](hyperledger-identus@9b64793))
* key id for jwt and sdjwt ([hyperledger-identus#1420](hyperledger-identus#1420)) ([5830a7e](hyperledger-identus@5830a7e))
* oas to use any schema for json ast node ([hyperledger-identus#1372](hyperledger-identus#1372)) ([95d328e](hyperledger-identus@95d328e))
* oid4vci endpoints error statuses and negative input validation ([hyperledger-identus#1384](hyperledger-identus#1384)) ([65cc9a7](hyperledger-identus@65cc9a7))
* Preserve Presentation Format ([hyperledger-identus#1363](hyperledger-identus#1363)) ([c18385c](hyperledger-identus@c18385c))
* return 404 when create credConfig on non-existing issuer ([hyperledger-identus#1379](hyperledger-identus#1379)) ([e532ba6](hyperledger-identus@e532ba6))

### Features

* Add KID to the credential-offers API - ATL-7704 ([hyperledger-identus#1320](hyperledger-identus#1320)) ([56200cf](hyperledger-identus@56200cf))
* add presentation-exchange endpoints ([hyperledger-identus#1365](hyperledger-identus#1365)) ([49f7ab3](hyperledger-identus@49f7ab3))
* ATL-6983 ZIO Stream Kafka PoC in background jobs ([hyperledger-identus#1339](hyperledger-identus#1339)) ([19ab426](hyperledger-identus@19ab426))
* Default Backend API to Array Of Credential Schema ([hyperledger-identus#1366](hyperledger-identus#1366)) ([693dcc4](hyperledger-identus@693dcc4))
* Default Object As Issuer ([hyperledger-identus#1349](hyperledger-identus#1349)) ([d29eebb](hyperledger-identus@d29eebb))
* Implement prism anoncreds method for schemas and credential definitions ([hyperledger-identus#1385](hyperledger-identus#1385)) ([fbee055](hyperledger-identus@fbee055))
* Issuer Replace Either By Union Type ([hyperledger-identus#1374](hyperledger-identus#1374)) ([8fc2fe3](hyperledger-identus@8fc2fe3))
* presentation_submission validation logic ([hyperledger-identus#1332](hyperledger-identus#1332)) ([f80b3c3](hyperledger-identus@f80b3c3))
* Support Array Of Credential Schema ([hyperledger-identus#1351](hyperledger-identus#1351)) ([948e314](hyperledger-identus@948e314))
* Test JWT OBJECT as Issuer ([hyperledger-identus#1343](hyperledger-identus#1343)) ([7208d95](hyperledger-identus@7208d95))
* VC support for Array of credential Status ([hyperledger-identus#1383](hyperledger-identus#1383)) ([ad946cf](hyperledger-identus@ad946cf))
* VCVerification API support ARRAY or OBJECT as Credential Sc… ([hyperledger-identus#1355](hyperledger-identus#1355)) ([91cb4e7](hyperledger-identus@91cb4e7))

 [skip ci]

Signed-off-by: Hyperledger Bot <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants