Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

exn Message Upgrades. #559

Merged
merged 5 commits into from
Aug 20, 2023

Conversation

pfeairheller
Copy link
Member

This PR includes:

  • Update to sign exn messages with full Seal to allow for long living exn messages.  Add sender, recipient and embeds to exn messages to support attaching signed event messages that don't get processed automatically.
  • All multisig exn messages (icp, rot, ixn, vcp, iss, rvk) now contain embedded events with persistent exn messages.  Support for loading and verify persisted exn messages.
  • Credential issuance now sends the credential embedded in the /credential/issue exn message with transposed signatures instead of streamed over.  There is also now a kli vc accept command to allow the issuee of a credential to accept or reject an issue credential.

… exn messages. Add sender, recipient and embeds to exn messages to support attaching signed event messages that don't get processed automatically.
…embedded events with persistent exn messages. Support for loading and verify persisted exn messages.
…ial/issue exn message with transposed signatures instead of streamed over. There is also now a `kli vc accept` command to allow the issuee of a credential to accept or reject an issue credential.
@pfeairheller pfeairheller merged commit 41d842d into WebOfTrust:development Aug 20, 2023
6 checks passed
@pfeairheller pfeairheller deleted the feat-exn-convos branch August 20, 2023 22:17
@SmithSamuelM
Copy link
Collaborator

SmithSamuelM commented Aug 20, 2023

@pfeairheller

credential embedded in the /credential/issue exn message with transposed signatures instead of streamed over.

Am I missing something. Because the credential issuance is anchored in a KEL which is signed, the credential itself does not need to be signed agains and signature attached, so there is no need for the transposed signatures of the embedded credential in this case?

@pfeairheller
Copy link
Member Author

You are not missing anything, we have not removed the signatures from the credential, that is still an open issue. I didn't want to tackle that issue with this PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants