-
Notifications
You must be signed in to change notification settings - Fork 26
demo creds #1324
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
iFergal
wants to merge
34
commits into
main
Choose a base branch
from
feat/birth-fishing-cred
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
demo creds #1324
Changes from 15 commits
Commits
Show all changes
34 commits
Select commit
Hold shift + click to select a range
d8b893b
feat: added birth & hunt schemas
jorgenavben 1718234
feat: added rome cred & improved birth certificate
jorgenavben eb1161c
feat: added "u" field to schemas
jorgenavben 2153b2d
fix(cred-serv): private issuance
iFergal ded1d02
fix(cred-ui): issue UI for schema with lots of attributes
iFergal 41a5827
build: old signify
iFergal 0861c51
chore: commit lock file
iFergal 2a71e7c
fix: request presentation bugs
iFergal bf09125
fix(ui): Credential UI not passing presentation attributes to server …
Sotatek-DukeVu b0d1467
feat(cred-serv): reeve credential
iFergal 1e53859
fix(cred-serv): include new schema in const files mapper
iFergal 635a9ff
chore(gha): replace pull_request_target with pull_request
rcmorano 4530852
feat(cred-serv): OOR credential issuance
iFergal 00f262d
fix(core): recursively resolve schemas
iFergal 2b5f366
chore(gha): align with main branch
rcmorano ece7042
chore(package-lock): bump sha.js depend to fix a critical sec issue
rcmorano 73abd1a
chore(gha): trigger build
rcmorano 5f119cd
feat: implement presentation verification and request handling (#1367)
Sotatek-DucPhung f9ae79d
fix(cred-serv): post merge fix rename of signifyclient var in express
iFergal 262bde4
fix(cred-serv): skip presentation requests for deleted connections
iFergal 88faca1
feat(cred-ui): credential presentation details (request and response)…
Sotatek-DucPhung 1ec0a49
Merge remote-tracking branch 'origin/main' into feat/birth-fishing-cred
iFergal 7e072af
chore: trigger builds
iFergal 3343f31
fix(core): recursive schema resolve should return correctly with no e…
iFergal 9410ef0
fix(cred-serv): properly fail on OOBI errors
iFergal d52ae2f
debug logs
iFergal a23a2b0
more debug logs
iFergal 565486c
fix(cred-serv): ensure OOR-AUTH issuance completes, and remove flakey…
iFergal 32d25a7
fix(cred-ui): presentation request modal text
iFergal 8354d8f
feat(cred-serv): add cardano-metadata signer
iFergal cc68ed1
Revert "feat(cred-serv): add cardano-metadata signer"
iFergal 9bbe6e4
Revert "Revert "feat(cred-serv): add cardano-metadata signer""
iFergal 280d51d
fix(cred-serv): cardano-metadata signer schema shouldnt have required…
iFergal 7b34a77
correct schema
iFergal File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,41 @@ | ||
| name: build-test | ||
|
|
||
| on: | ||
| pull_request: | ||
| types: [ opened, synchronize ] | ||
| push: | ||
| branches: | ||
| - main | ||
| - develop | ||
| - release/** | ||
|
|
||
| env: | ||
| NODE_OPTIONS: "--max_old_space_size=8192" | ||
|
|
||
| jobs: | ||
| build-test: | ||
| runs-on: ubuntu-latest | ||
|
|
||
| steps: | ||
| - name: Checkout | ||
| uses: actions/checkout@v5 | ||
| with: | ||
| submodules: recursive | ||
|
||
|
|
||
| - name: Setup Node | ||
| uses: actions/setup-node@v4 | ||
|
||
| with: | ||
| node-version-file: "package.json" | ||
|
|
||
| - name: Install dependencies | ||
| run: npm ci | ||
|
|
||
| - name: Run ESLint (Core Only) | ||
| run: npx eslint src/core --ext .ts,.tsx | ||
|
|
||
| - name: Run unit tests | ||
|
|
||
| run: npm run test | ||
|
|
||
| - name: 🔨 Build project | ||
| run: npm run build | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,54 @@ | ||
| name: dependency-check-google-osv | ||
|
|
||
| on: | ||
| push: | ||
| paths: &shared-trigger-paths | ||
| - 'package.json' | ||
| - 'package-lock.json' | ||
| - 'ios/**' | ||
| - 'android/**' | ||
| - '**/*.gradle' | ||
| - '**/Podfile*' | ||
| - '**/Package*.swift' | ||
| - '.github/dependency-check-google-osv.yaml' | ||
| branches: | ||
| - main | ||
| - develop | ||
| - 'releases/**' | ||
| pull_request: | ||
| types: [ opened, synchronize ] | ||
| paths: *shared-trigger-paths | ||
| workflow_dispatch: | ||
|
|
||
| jobs: | ||
| set-gitignore-artifact: | ||
| runs-on: ubuntu-latest | ||
| steps: | ||
| - name: Checkout | ||
| uses: actions/checkout@v5 | ||
| with: | ||
| submodules: recursive | ||
|
||
|
|
||
| - name: Ignore services folder | ||
| run: | | ||
| echo 'services/*' >> .gitignore | ||
|
|
||
| - name: Upload .gitignore artifact | ||
| uses: actions/upload-artifact@v4 | ||
| with: | ||
| name: gitignore-artifact | ||
| include-hidden-files: true | ||
| path: .gitignore | ||
|
||
|
|
||
| depcheck: | ||
| permissions: | ||
| actions: read | ||
| security-events: write | ||
| contents: read | ||
| needs: set-gitignore-artifact | ||
| uses: "google/osv-scanner-action/.github/workflows/[email protected]" | ||
| with: | ||
| download-artifact: gitignore-artifact | ||
| scan-args: |- | ||
| --recursive | ||
| ./ | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,56 @@ | ||
| name: dependency-check-npm-audit | ||
|
|
||
| on: | ||
| pull_request: | ||
| paths: &shared-trigger-paths | ||
| - 'package.json' | ||
| - 'package-lock.json' | ||
| - '.github/workflows/dependency-check-npm-audit.yaml' | ||
| types: [ opened, synchronize ] | ||
| push: | ||
| paths: *shared-trigger-paths | ||
| branches: | ||
| - main | ||
| - develop | ||
| - release/** | ||
|
|
||
| env: | ||
| NODE_OPTIONS: "--max_old_space_size=8192" | ||
|
|
||
| jobs: | ||
| depcheck: | ||
| runs-on: ubuntu-latest | ||
|
|
||
| steps: | ||
| - name: Checkout | ||
| uses: actions/checkout@v5 | ||
| with: | ||
| submodules: recursive | ||
|
||
|
|
||
| - name: Setup Node | ||
| uses: actions/setup-node@v4 | ||
|
||
| with: | ||
| node-version-file: "package.json" | ||
|
|
||
| - name: Run npm audit | ||
| env: | ||
| AUDIT_CI_VERSION: latest | ||
| run: | | ||
| # We always save the report so it's uploaded to the Security tab | ||
| npx -y audit-ci@${AUDIT_CI_VERSION} --report --report-type full --config audit-ci.jsonc -o json > audit.json || true | ||
| # We run it again in text mode to have a better output in the logs and let it fail if there are vulnerabilities (criticity set in audit-ci.jsonc) | ||
| npx -y audit-ci@${AUDIT_CI_VERSION} --report --report-type full --config audit-ci.jsonc | ||
|
|
||
| - name: Convert npm audit results to SARIF | ||
| if: always() | ||
| run: | | ||
| npx npm-audit-sarif audit.json > audit.sarif.json | ||
| # potentially fix levels that are not recognized by GitHub | ||
| jq '(.runs[].results[] | select(.level != "none" and .level != "note" and .level != "warning" and .level != "error") | .level) |= "warning"' audit.sarif.json > fixed-audit.sarif.json | ||
| mv fixed-audit.sarif.json audit.sarif.json | ||
|
|
||
| - name: Upload SARIF file to GitHub Security tab | ||
| if: always() | ||
| uses: github/codeql-action/upload-sarif@v3 | ||
| with: | ||
| sarif_file: audit.sarif.json | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,54 @@ | ||
| name: dependency-check-owasp-android | ||
|
|
||
| on: | ||
| push: | ||
| paths: &shared-trigger-paths | ||
| - "android/**" | ||
| - "**/*.gradle" | ||
| - "**/gradle*.properties" | ||
| - ".github/workflows/dependency-check-owasp-android.yml" | ||
| branches: | ||
| - main | ||
| - develop | ||
| - 'releases/**' | ||
| pull_request: | ||
| paths: *shared-trigger-paths | ||
| types: [ opened, synchronize ] | ||
|
|
||
| jobs: | ||
| depcheck: | ||
| runs-on: ubuntu-latest | ||
|
|
||
| permissions: | ||
| contents: read | ||
| security-events: write | ||
|
|
||
| env: | ||
| NVD_API_KEY: ${{ secrets.NVD_API_KEY }} | ||
|
|
||
| steps: | ||
| - uses: actions/checkout@v5 | ||
| with: | ||
| submodules: recursive | ||
|
|
||
| # Run OWASP Dependency-Check via the official Action | ||
|
||
| - name: Run Dependency-Check | ||
| uses: dependency-check/Dependency-Check_Action@main | ||
|
||
| with: | ||
| project: "veridian-wallet-android" | ||
| path: "android" | ||
| format: "ALL" | ||
| out: "reports" | ||
| args: "--failOnCVSS 7 --nvdApiKey ${{ env.NVD_API_KEY }} --disableCentral" | ||
| continue-on-error: false | ||
|
|
||
| - name: Upload HTML report | ||
| uses: actions/upload-artifact@v4 | ||
| with: | ||
| name: depcheck-android-report | ||
| path: "reports/dependency-check-report.html" | ||
|
|
||
| - name: Upload SARIF to code scanning | ||
| uses: github/codeql-action/upload-sarif@v3 | ||
| with: | ||
| sarif_file: "reports/dependency-check-report.sarif" | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,54 @@ | ||
| name: dependency-check-owasp-ios | ||
|
|
||
| on: | ||
| push: | ||
| paths: &shared-trigger-paths | ||
| - "ios/**" | ||
| - "**/Podfile*" | ||
| - "**/Package*.swift" | ||
| - ".github/workflows/dependency-check-owasp-ios.yml" | ||
| branches: | ||
| - main | ||
| - develop | ||
| - 'releases/**' | ||
| pull_request: | ||
| paths: *shared-trigger-paths | ||
| types: [ opened, synchronize ] | ||
|
|
||
| jobs: | ||
| depcheck: | ||
| runs-on: ubuntu-latest | ||
|
|
||
| permissions: | ||
| contents: read | ||
| security-events: write | ||
|
|
||
| env: | ||
| NVD_API_KEY: ${{ secrets.NVD_API_KEY }} | ||
|
|
||
| steps: | ||
| - uses: actions/checkout@v5 | ||
| with: | ||
| submodules: recursive | ||
|
|
||
| # Run OWASP Dependency-Check via the official Action | ||
|
||
| - name: Run Dependency-Check | ||
| uses: dependency-check/Dependency-Check_Action@main | ||
|
||
| with: | ||
| project: "veridian-wallet-ios" | ||
| path: "ios" | ||
| format: "ALL" | ||
| out: "reports" | ||
| args: "--failOnCVSS 7 --nvdApiKey ${{ env.NVD_API_KEY }}" | ||
| continue-on-error: false | ||
|
|
||
| - name: Upload HTML report | ||
| uses: actions/upload-artifact@v4 | ||
| with: | ||
| name: depcheck-ios-report | ||
| path: "reports/dependency-check-report.html" | ||
|
|
||
| - name: Upload SARIF to code scanning | ||
| uses: github/codeql-action/upload-sarif@v3 | ||
| with: | ||
| sarif_file: "reports/dependency-check-report.sarif" | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
Oops, something went wrong.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.