Skip to content
This repository has been archived by the owner on Dec 12, 2024. It is now read-only.

Commit

Permalink
renames
Browse files Browse the repository at this point in the history
  • Loading branch information
gabe committed Aug 3, 2023
1 parent 843389f commit 2b37494
Show file tree
Hide file tree
Showing 2 changed files with 8 additions and 8 deletions.
10 changes: 5 additions & 5 deletions pkg/service/presentation/service.go
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,7 @@ func NewPresentationService(s storage.ServiceStorage,
if err != nil {
return nil, sdkutil.LoggingErrorMsg(err, "could not instantiate storage for the operations")
}
validator, err := verification.NewVerifiableDataVerifier(resolver, schema)
verifier, err := verification.NewVerifiableDataVerifier(resolver, schema)
if err != nil {
return nil, sdkutil.LoggingErrorMsg(err, "could not instantiate verifier")
}
Expand All @@ -78,7 +78,7 @@ func NewPresentationService(s storage.ServiceStorage,
opsStorage: opsStorage,
resolver: resolver,
schema: schema,
verifier: validator,
verifier: verifier,
reqStorage: requestStorage,
}
if !service.Status().IsReady() {
Expand Down Expand Up @@ -230,16 +230,16 @@ func (s Service) CreateSubmission(ctx context.Context, request model.CreateSubmi

for _, cred := range request.Credentials {
if !cred.IsValid() {
return nil, errors.Errorf("invalid verification %+v", cred)
return nil, errors.Errorf("invalid credential %+v", cred)
}
if cred.CredentialJWT != nil {
if err = s.verifier.VerifyJWTCredential(ctx, *cred.CredentialJWT); err != nil {
return nil, errors.Wrapf(err, "verifying jwt verification %s", cred.CredentialJWT)
return nil, errors.Wrapf(err, "verifying jwt credential %s", cred.CredentialJWT)
}
} else {
if cred.HasDataIntegrityCredential() {
if err = s.verifier.VerifyDataIntegrityCredential(ctx, *cred.Credential); err != nil {
return nil, errors.Wrapf(err, "verifying data integrity verification %+v", cred.Credential)
return nil, errors.Wrapf(err, "verifying data integrity credential %+v", cred.Credential)
}
}
}
Expand Down
6 changes: 3 additions & 3 deletions pkg/service/well-known/did_configuration.go
Original file line number Diff line number Diff line change
Expand Up @@ -34,14 +34,14 @@ type DIDConfigurationService struct {

func NewDIDConfigurationService(keyStoreService *keystore.Service, didResolver resolution.Resolver, schema *schema.Service) (*DIDConfigurationService, error) {
client := &http.Client{Transport: otelhttp.NewTransport(http.DefaultTransport)}
validator, err := verification.NewVerifiableDataVerifier(didResolver, schema)
verifier, err := verification.NewVerifiableDataVerifier(didResolver, schema)
if err != nil {
return nil, errors.Wrap(err, "could not instantiate validator for the credential service")
return nil, errors.Wrap(err, "could not instantiate verifier for the credential service")
}

return &DIDConfigurationService{
keyStoreService: keyStoreService,
validator: validator,
validator: verifier,
HTTPClient: client,
}, nil
}
Expand Down

0 comments on commit 2b37494

Please sign in to comment.