Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(ParticipantIdentity): implements the ID extractor #504

Conversation

wolf4ood
Copy link
Contributor

@wolf4ood wolf4ood commented Jun 19, 2023

WHAT

Implements the ID extractor for Summary credential + E2E test

WHY

When receiving a JWT token with the VP(verifiable presentation) inside the participant need to extract
the counter party ID from the SummaryCredential

FURTHER NOTES

  • Adds E2E test on HttpPull scenario with new VC(verifiable credential) policies
  • Adds E2E test (disabled) for Contract negotiation failure due policy not fulfilled
  • Moves JSON ld utility functions and namespace constant into ssi-spi
  • Adds Audience validation rule

Closes #467

@wolf4ood wolf4ood force-pushed the feat/467_participant_id_extractor branch 4 times, most recently from 6a4e72b to 7c0ae78 Compare June 19, 2023 14:55
@paullatzelsperger paullatzelsperger force-pushed the previews/preview_0_1_1_snapshot branch from cf97446 to 0b953b1 Compare June 19, 2023 15:02
@wolf4ood wolf4ood force-pushed the feat/467_participant_id_extractor branch 5 times, most recently from 4a7d483 to 04e6f04 Compare June 19, 2023 16:32
@wolf4ood wolf4ood force-pushed the feat/467_participant_id_extractor branch from 04e6f04 to d21d0f8 Compare June 19, 2023 16:46
@wolf4ood wolf4ood force-pushed the feat/467_participant_id_extractor branch 3 times, most recently from a250f75 to e3724fd Compare June 20, 2023 10:53
@wolf4ood wolf4ood marked this pull request as ready for review June 20, 2023 11:05
@wolf4ood wolf4ood force-pushed the feat/467_participant_id_extractor branch from e3724fd to dd3a6e5 Compare June 20, 2023 12:03
@wolf4ood wolf4ood force-pushed the feat/467_participant_id_extractor branch 2 times, most recently from 256c15b to 73e0c79 Compare June 20, 2023 12:16
@wolf4ood wolf4ood force-pushed the feat/467_participant_id_extractor branch from 73e0c79 to 3afe05c Compare June 20, 2023 12:22
@sonarqubecloud
Copy link

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 2 Code Smells

No Coverage information No Coverage information
0.0% 0.0% Duplication

@paullatzelsperger paullatzelsperger merged commit eedcef2 into eclipse-tractusx:previews/preview_0_1_1_snapshot Jun 20, 2023
paullatzelsperger added a commit that referenced this pull request Jun 21, 2023
* feat: upgrade to 0.1.1-SNAPSHOT, fix resulting compile errors

* chore: fix tests (#479)

* feat: Initial implementation of Catena-X policies (#477)

* Initial implementation of Catena-X policies

* Add header

* Fix checkstyle

* Fix typo

* Fix typo

* Add javadoc

* Add javadoc

* Switch token eval to a policy validator function

* chore: fix tests (#481)

* feat(policy):  (#487)

* Cleanup namespaces, add extension class, implement summary constraint

* Update credential names; add rule bindings

* feat(SSI): implements the MIW client with Oauth2 as token provider for using the MIW APIs (#489)

* fix: version catalog

* feat(ParticipantIdentity): implements the ID extractor  (#504)

* feat(ParticipantIdentity): implements the ID extractor for the summary credential + E2E test

* feat(ParticipantIdentity): more tests and ID extractor exception if identity not extracted

* feat(ParticipantIdentity): add audience validation + tests

* fix after review

* remove short-term cache invalidation

---------

Co-authored-by: Enrico Risa <[email protected]>
Co-authored-by: Jim Marino <[email protected]>
@wolf4ood wolf4ood deleted the feat/467_participant_id_extractor branch July 17, 2023 11:54
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Merged
Development

Successfully merging this pull request may close these issues.

3 participants