Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove crypto and did resolver related functionality #55

Open
TimoGlastra opened this issue Jun 3, 2023 · 5 comments
Open

Remove crypto and did resolver related functionality #55

TimoGlastra opened this issue Jun 3, 2023 · 5 comments

Comments

@TimoGlastra
Copy link
Contributor

I think we've sort of discussed this before, but just wanted to open an issue to continue the discussion.

We're currently integrating this library into Aries Framework JavaScript (AFJ), and one of the things that was really nice about the OID4VCI and PEX libraries is that they're really lightweight and don't pull in any crypto or did related libraries.

In AFJ we have a did resolver, JWT signer/verifier, and support for several crypto suites. That way we don't have to pull in all the dependencies for this. (I think especially did-jwt pulls in a lot of crypto related dependencies).

@nklomp
Copy link
Contributor

nklomp commented Jun 3, 2023

Yeah we discussed this before. A lot of deps have already been removed and we are planning to split the current lib into 2 versions. One more or less current functionality which then is extending the second, providing some callbacks and interfaces for the functionality mentioned, thus removing more deps.

In all honesty I am not sure we will be able to do that inbthe next 2 weeks though. Probably gonna be roughly at the end of the month.

@TimoGlastra
Copy link
Contributor Author

Splitting in two packages sounds good to me!

In all honesty I am not sure we will be able to do that in the next 2 weeks though. Probably gonna be roughly at the end of the month.

Yeah that makes sense, no rush in doing this. My understanding of the library now is that you can use your own did resolvers, crypto, JWT signing/verification. If that's the case we're good 👍

@nklomp
Copy link
Contributor

nklomp commented Jun 3, 2023

Yes that is indeed correct.

@TimoGlastra
Copy link
Contributor Author

It seems that for verification of the Authorization Request JWT, you can't provide a custom verification callback. Is that correct?

Here's the call:

    const verifiedAuthorizationRequest = await op.verifyAuthorizationRequest(
      options.authorizationRequest,
      {
        verification: {
          mode: VerificationMode.EXTERNAL,
          revocationOpts: {
            revocationVerification: RevocationVerification.NEVER,
          },
          resolveOpts: {
            resolver: this.getResolver(agentContext),
            noUniversalResolverFallback: true,
            // TODO: do we need to add all supported did methods here?
            // subjectSyntaxTypesSupported: []
            // TODO: do we need any?
            // jwtVerifyOpts: {}
          },
        },
      }
    )

The README shows an verifyCallback in the interface, but this doesn't seem present in the code of the library.

Is VerificationMethod.External related to verifying the JWT yourself, or is that currently not supported by the library?

@nklomp
Copy link
Contributor

nklomp commented Jun 3, 2023

Hmzz, it seems that in my head we had more options than we actually do have. External is meant for cloud based integrations, to offload it. But that is not really implemented anyway.

Looking at the code, the path relies on verifyDidJWT which then unconditionally delegates to the did-jwt library.

You could extend the enum, with a 'PROVIDED' and then add a callback interface. It would be relatively easy to pass that on to the AuthorizationRequest verify method and then in the verifyDidJWT not delegate to did-jwt if the Mode is PROVIDED and instead execute the callback

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants