-
Notifications
You must be signed in to change notification settings - Fork 516
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
BREAKING: Allow multi-use public invites and public invites with metadata #2034
BREAKING: Allow multi-use public invites and public invites with metadata #2034
Conversation
Signed-off-by: Micah Peltier <[email protected]>
Signed-off-by: Micah Peltier <[email protected]>
Signed-off-by: Micah Peltier <[email protected]>
Signed-off-by: Micah Peltier <[email protected]>
Signed-off-by: Micah Peltier <[email protected]>
Signed-off-by: Micah Peltier <[email protected]>
Signed-off-by: Micah Peltier <[email protected]>
Signed-off-by: Micah Peltier <[email protected]>
Signed-off-by: Micah Peltier <[email protected]>
Signed-off-by: Micah Peltier <[email protected]>
This is a breaking change, right? We currently have some implementations that accept unsolicited connection requests using the public did (however not with |
@ianco I think it is unfortunately a bit of a grey area; the original We could invert the flag for backwards compatibility (a flag that disables accepting requests through a DID without an invite). However, I am in favor of keeping this a breaking change. I think this will either cause deployments to work the way the Thoughts? |
@dbluhm I think this PR is ok as is we just need to make sure we include it in the release notes as a breaking change. (I don't think it will affect very many deployments, but folks need to be aware to add the |
Breaking changes are tracked in the PR -- such as by changing the name of the PR as I just did -- and then describing the breaking change in a "Breaking Changes" section of the changelog, based on the details about what is broken in the PR notes. |
Kudos, SonarCloud Quality Gate passed! |
- Related to openwallet-foundation/acapy#2034 Signed-off-by: Wade Barnes <[email protected]>
- Related to openwallet-foundation/acapy#2034 Signed-off-by: Wade Barnes <[email protected]>
Adds a setting for the Endorser to allow it to accept "implicit invitation" connection requests -- another agent requesting a connection by looking up the Endorser agent's public DID. This was a breaking change in ACA-Py as per -- openwallet-foundation/acapy#2034 Signed-off-by: Stephen Curran <[email protected]> Signed-off-by: Stephen Curran <[email protected]>
This PR adjusts the functionality of invitations created with Public DIDs.
Specifically, it does the following:
--requests-through-public-did
--public-invites
and--auto-accept
, Bob could make an unsolicited connection request against Alice’s Public DId, which is to say, Bob is not responding to an explicit invitation that Alice has created. In that scenario, Alice would automatically accept that request.—public-invites
flag.--public-invites
still allows for invitations to be created with a Public DID, but unless--requests-through-public-did
is set, those unsolicited connection requests will be ignored.Thanks to @dbluhm for additional conceptual design and help debugging :)