Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

return application json encoded authorization response #39

Conversation

Ryanmtate
Copy link
Contributor

No description provided.

@Ryanmtate Ryanmtate force-pushed the fix/update-authorization-response-encoding branch 2 times, most recently from 2509f66 to f4c18a0 Compare October 31, 2024 20:03
@Ryanmtate Ryanmtate force-pushed the fix/update-authorization-response-encoding branch from f4c18a0 to cf66d93 Compare October 31, 2024 20:04
"failed to encode presentation_submission as 'application/x-www-form-urlencoded'",
)?;

Ok(encoded)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It works so I'm not going to block it but:

  • there is no reason for the serialization to fail, so you can safely unwrap instead of returning a Result
  • you could use a custom struct instead of a HashMap to avoid memory allocations.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

commit ad3974c removes the hash map and uses a custom struct here instead.

@Ryanmtate Ryanmtate merged commit d4834ac into feat/add-req-obj-signing-alg-setter-wallet-metadata Nov 4, 2024
2 checks passed
@Ryanmtate Ryanmtate deleted the fix/update-authorization-response-encoding branch November 4, 2024 17:40
Ryanmtate added a commit that referenced this pull request Nov 21, 2024
* use serde deserialize serialize derive for authorization response

Signed-off-by: Ryan Tate <[email protected]>

* update url encoding for auth response

Signed-off-by: Ryan Tate <[email protected]>

* fix unit tests

Signed-off-by: Ryan Tate <[email protected]>

* use custom struct for json string encoded authorization response inner values

Signed-off-by: Ryan Tate <[email protected]>

---------

Signed-off-by: Ryan Tate <[email protected]>
Ryanmtate added a commit that referenced this pull request Nov 27, 2024
* add request object signing algorithm setter method

Signed-off-by: Ryan Tate <[email protected]>

* return application json encoded authorization response (#39)

* use serde deserialize serialize derive for authorization response

Signed-off-by: Ryan Tate <[email protected]>

* update url encoding for auth response

Signed-off-by: Ryan Tate <[email protected]>

* fix unit tests

Signed-off-by: Ryan Tate <[email protected]>

* use custom struct for json string encoded authorization response inner values

Signed-off-by: Ryan Tate <[email protected]>

---------

Signed-off-by: Ryan Tate <[email protected]>

* bump serde_json_path version

Signed-off-by: Ryan Tate <[email protected]>

---------

Signed-off-by: Ryan Tate <[email protected]>
Ryanmtate added a commit that referenced this pull request Dec 1, 2024
* add request object signing algorithm setter method

Signed-off-by: Ryan Tate <[email protected]>

* return application json encoded authorization response (#39)

* use serde deserialize serialize derive for authorization response

Signed-off-by: Ryan Tate <[email protected]>

* update url encoding for auth response

Signed-off-by: Ryan Tate <[email protected]>

* fix unit tests

Signed-off-by: Ryan Tate <[email protected]>

* use custom struct for json string encoded authorization response inner values

Signed-off-by: Ryan Tate <[email protected]>

---------

Signed-off-by: Ryan Tate <[email protected]>

* bump serde_json_path version

Signed-off-by: Ryan Tate <[email protected]>

* Add temporary support for unencoded JWT authorization requests

* Remove unnecessary comment

* Start implementation for VpTokenItem From method for specific JsonPresentation

Signed-off-by: Ryan Tate <[email protected]>
Co-Authored-By: Joey Silberman <[email protected]>

* use ssi 0.10.1 release

Signed-off-by: Ryan Tate <[email protected]>

* add data integrity conversion for vp token

Additionally adds a check for authorization request
vp formats supported to check cryptosuite against
expected response formats.

Signed-off-by: Ryan Tate <[email protected]>

* update data integrity vp token from conversion

Signed-off-by: Ryan Tate <[email protected]>

* Feat/support unencoded jwt authorization requests (#40)

* Add temporary support for unencoded JWT authorization requests

* Remove unnecessary comment

* use serde deserialize serialize derive for authorization response

Signed-off-by: Ryan Tate <[email protected]>

* update url encoding for auth response

Signed-off-by: Ryan Tate <[email protected]>

* fix unit tests

Signed-off-by: Ryan Tate <[email protected]>

* use custom struct for json string encoded authorization response inner values

Signed-off-by: Ryan Tate <[email protected]>

* allow unencoded authorization request

Signed-off-by: Ryan Tate <[email protected]>

---------

Signed-off-by: Ryan Tate <[email protected]>
Co-authored-by: Joey Silberman <[email protected]>
Co-authored-by: Ryan Tate <[email protected]>

* Update src/core/metadata/parameters/verifier.rs

Co-authored-by: Jacob <[email protected]>
Signed-off-by: Ryan Tate <[email protected]>

---------

Signed-off-by: Ryan Tate <[email protected]>
Co-authored-by: Joey Silberman <[email protected]>
Co-authored-by: Joey Silberman <[email protected]>
Co-authored-by: Jacob <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants