-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSI DIM Wallet Stub can't create Industry Core Policy #174
Comments
@matbmoser @ds-jhartmann Once the description is ready. Please add Nitin, maybe also discuss in the Umbrella Matrix Chat. Should not be a blocker for the community. Just use empty policies for now. |
This is related with the policy, because the access policies will be checked against the wallet, and we usually configure the same policy for access and usage. Why is the stub not accepting things by default??? |
@evegufy I added more details regarding policies. |
@ds-jhartmann the following error you sent via mail:
Is it related to this issue? |
@evegufy no, this is not related to the policies |
@nitin-vavdiya could you please give your option on this topic? |
Do we have an error log from the SSI stub application? Do we have what request body is being sent to stub application in the query presentation API call? We are printing the request body in the logs in SSI stub application. At the current stage, SSI stub application supports only three types of credentials:
If the requested type does not exist in this list, then it will give an error. For ref: |
@nitin-vavdiya thanks for the quick response! |
@nitin-vavdiya why the usage purpose are not allowed? |
Please support this ones |
Thanks @matbmoser Can you please provide a schema/example for these credentials? We need this to prepare credential subject. We need Catena-X standards references like we have it for framework credentials as mentioned here |
I have already cleared with the data sov expert group. There is no credential for the usage purpose. It is clear written that "any POLICY" the includes Usage Purpose or ContractReference are allowed. There is not a "credential" to check against, you just just allow it. The rule is that any data consumer and any data provider can specify any data usage purpose constraints. If Catena-X components and data models are used it is required to follow the profile from Catena-X: https://github.com/catenax-eV/cx-odrl-profile/blob/c96b426ded7922f44bdc33bfc5e0bf754031b5e8/profile.md#usagepurpose Also contract reference shall allow any string. |
@nitin-vavdiya please enable this two constraints in the policy definition, so that the wallet does not gives an error for them. |
Thanks for replay. |
Is there any more log information on what is happening. Actually, @nitin-vavdiya is right, if it fails due to the UsagePurpose, the wallet is not involved. What happens, if the policy only contains one of the two elements, is it accepted? |
Current Behavior
When EDC contract offers are published with a policy like this, contract negotiation is terminated:
Expected Behavior
Contracts can be negotiated with any usage policy.
Steps To Reproduce
The text was updated successfully, but these errors were encountered: