Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add DID Exchange specific problem reports and reject endpoint #2394

Merged
merged 14 commits into from
Aug 9, 2023

Conversation

dbluhm
Copy link
Contributor

@dbluhm dbluhm commented Aug 2, 2023

This PR makes problem reports sent during the DID Exchange protocol have the DID Exchange protocol adopted problem report rather than the generic problem report. This is defined in RFC 23 but has not been implemented by ACA-Py to this point. In other words, this is a correction to bring ACA-Py more in line with the RFC. These problem reports were automatically sent if there was an issue in processing the DID Exchange messages.

In addition to the above changes, this PR also introduces a POST /didexchange/{conn-id}/reject endpoint, enabling the controller to explicitly reject an OOB invitation that specifies DID Exchange as the handshake protocol or a DID Exchange request. Rejecting a response is not supported; don't send a request if you're going to reject the response. This will send a problem report to the originator of the invitation/request and will mark the (local) connection record as abandoned. It won't delete the record though (maybe it should)?

This at least partially supersedes #2350, covering the rejection of invitations to exchange DIDs. However, it does not introduce automatic handling of timeouts for invitations, as was discussed in the comments.

@dbluhm
Copy link
Contributor Author

dbluhm commented Aug 2, 2023

Adding more tests; I'll keep this in draft until I get those in.

@dbluhm
Copy link
Contributor Author

dbluhm commented Aug 2, 2023

Oh, also need to add a DIDX Problem Report handler to mark the connection as abandoned if we receive a request_not_accepted, etc.

@dbluhm dbluhm force-pushed the feature/didx-reject branch from 7483796 to ca3eb3e Compare August 2, 2023 17:04
@swcurran
Copy link
Contributor

swcurran commented Aug 2, 2023

FYI @tbloomfi — will this address your team’s needs?

@dbluhm dbluhm marked this pull request as ready for review August 2, 2023 19:44
@dbluhm dbluhm force-pushed the feature/didx-reject branch from 433e536 to c5d8c17 Compare August 7, 2023 16:55
@sonarqubecloud
Copy link

sonarqubecloud bot commented Aug 7, 2023

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
No Duplication information No Duplication information

@dbluhm
Copy link
Contributor Author

dbluhm commented Aug 9, 2023

Calling attention to this again. This PR is ready to go, just needs review @usingtechnology @swcurran @shaangill025

@dbluhm dbluhm merged commit ffe4502 into openwallet-foundation:main Aug 9, 2023
@dbluhm dbluhm mentioned this pull request Aug 14, 2023
@dbluhm dbluhm deleted the feature/didx-reject branch January 30, 2024 21:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants