-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feat/support unencoded jwt authorization requests #40
Feat/support unencoded jwt authorization requests #40
Conversation
Signed-off-by: Ryan Tate <[email protected]>
Signed-off-by: Ryan Tate <[email protected]>
Signed-off-by: Ryan Tate <[email protected]>
…r values Signed-off-by: Ryan Tate <[email protected]>
c589019
to
24607cc
Compare
Changes in SSI have resolved this. |
This short circuit for avoiding the check whether the client id of the verifier (DID) in relation to the key ID in the header may still be helpful. However, this may not be the correct way to handle whether or not a |
12ba6e9
to
349cb7d
Compare
Signed-off-by: Ryan Tate <[email protected]>
349cb7d
to
f1ecd8b
Compare
55b36f9
into
feat/vp-data-integrity-cryptosuite
* Add temporary support for unencoded JWT authorization requests * Remove unnecessary comment * use serde deserialize serialize derive for authorization response Signed-off-by: Ryan Tate <[email protected]> * update url encoding for auth response Signed-off-by: Ryan Tate <[email protected]> * fix unit tests Signed-off-by: Ryan Tate <[email protected]> * use custom struct for json string encoded authorization response inner values Signed-off-by: Ryan Tate <[email protected]> * allow unencoded authorization request Signed-off-by: Ryan Tate <[email protected]> --------- Signed-off-by: Ryan Tate <[email protected]> Co-authored-by: Joey Silberman <[email protected]> Co-authored-by: Ryan Tate <[email protected]>
* add request object signing algorithm setter method Signed-off-by: Ryan Tate <[email protected]> * return application json encoded authorization response (#39) * use serde deserialize serialize derive for authorization response Signed-off-by: Ryan Tate <[email protected]> * update url encoding for auth response Signed-off-by: Ryan Tate <[email protected]> * fix unit tests Signed-off-by: Ryan Tate <[email protected]> * use custom struct for json string encoded authorization response inner values Signed-off-by: Ryan Tate <[email protected]> --------- Signed-off-by: Ryan Tate <[email protected]> * bump serde_json_path version Signed-off-by: Ryan Tate <[email protected]> * Add temporary support for unencoded JWT authorization requests * Remove unnecessary comment * Start implementation for VpTokenItem From method for specific JsonPresentation Signed-off-by: Ryan Tate <[email protected]> Co-Authored-By: Joey Silberman <[email protected]> * use ssi 0.10.1 release Signed-off-by: Ryan Tate <[email protected]> * add data integrity conversion for vp token Additionally adds a check for authorization request vp formats supported to check cryptosuite against expected response formats. Signed-off-by: Ryan Tate <[email protected]> * update data integrity vp token from conversion Signed-off-by: Ryan Tate <[email protected]> * Feat/support unencoded jwt authorization requests (#40) * Add temporary support for unencoded JWT authorization requests * Remove unnecessary comment * use serde deserialize serialize derive for authorization response Signed-off-by: Ryan Tate <[email protected]> * update url encoding for auth response Signed-off-by: Ryan Tate <[email protected]> * fix unit tests Signed-off-by: Ryan Tate <[email protected]> * use custom struct for json string encoded authorization response inner values Signed-off-by: Ryan Tate <[email protected]> * allow unencoded authorization request Signed-off-by: Ryan Tate <[email protected]> --------- Signed-off-by: Ryan Tate <[email protected]> Co-authored-by: Joey Silberman <[email protected]> Co-authored-by: Ryan Tate <[email protected]> * Update src/core/metadata/parameters/verifier.rs Co-authored-by: Jacob <[email protected]> Signed-off-by: Ryan Tate <[email protected]> --------- Signed-off-by: Ryan Tate <[email protected]> Co-authored-by: Joey Silberman <[email protected]> Co-authored-by: Joey Silberman <[email protected]> Co-authored-by: Jacob <[email protected]>
This PR adds support for unencoded/unsigned jwt authorization requests to bypass KID and signature checks in request validation for when
client_id_scheme
isdid
. This is necessary for using VC playground verifier QRs because theirrequest_jwt
is unsigned and thus doesn't have a KID.