demand authorization get to verifier
This commit is contained in:
parent
cfbbaf491e
commit
5e95d6b15c
|
@ -2,7 +2,7 @@ import json
|
|||
|
||||
from django.views.generic.edit import View
|
||||
|
||||
from oidc4vp.models import Authorization
|
||||
from oidc4vp.models import Authorization, Organization
|
||||
from django.http import HttpResponse
|
||||
|
||||
|
||||
|
@ -11,69 +11,56 @@ from django.http import HttpResponse
|
|||
|
||||
# from utils.idhub_ssikit import verify_presentation
|
||||
# from oidc4vp.models import VPVerifyRequest
|
||||
# from django.shortcuts import get_object_or_404
|
||||
from django.shortcuts import get_object_or_404
|
||||
# from more_itertools import flatten, unique_everseen
|
||||
|
||||
|
||||
class VerifyView(View):
|
||||
def get(self, request, *args, **kwargs):
|
||||
import pdb; pdb.set_trace()
|
||||
res = json.dumps({"uri": "http://localhost:10000"})
|
||||
return HttpResponse(res)
|
||||
|
||||
|
||||
def DemandAuthorizationView(request):
|
||||
assert request.method == "GET"
|
||||
import pdb; pdb.set_trace()
|
||||
params = request.GET.params
|
||||
org = Organization.objects.filter(
|
||||
url=params.get('redirect_uri')
|
||||
)
|
||||
org_url = request.GET.get('demand_uri')
|
||||
org = get_object_or_404(Organization, response_uri=org_url)
|
||||
authorization = Authorization(
|
||||
organization=org,
|
||||
presentation_definition="MemberCredential"
|
||||
)
|
||||
# authorization.save()
|
||||
res = json.dumps({"uri": authorization.authorize()})
|
||||
import pdb; pdb.set_trace()
|
||||
res = json.dumps({"redirect_uri": authorization.authorize()})
|
||||
return HttpResponse(res)
|
||||
|
||||
|
||||
def verify(request):
|
||||
def post(self, request, *args, **kwargs):
|
||||
import pdb; pdb.set_trace()
|
||||
# assert request.method == "POST"
|
||||
# # TODO: incorporate request.POST["presentation_submission"] as schema definition
|
||||
# (presentation_valid, _) = verify_presentation(request.POST["vp_token"])
|
||||
# if not presentation_valid:
|
||||
# raise Exception("Failed to verify signature on the given Verifiable Presentation.")
|
||||
# vp = json.loads(request.POST["vp_token"])
|
||||
# nonce = vp["nonce"]
|
||||
# # "vr" = verification_request
|
||||
# vr = get_object_or_404(VPVerifyRequest, nonce=nonce) # TODO: return meaningful error, not 404
|
||||
# # Get a list of all included verifiable credential types
|
||||
# included_credential_types = unique_everseen(flatten([
|
||||
# vc["type"] for vc in vp["verifiableCredential"]
|
||||
# ]))
|
||||
# # Check that it matches what we requested
|
||||
# for requested_vc_type in json.loads(vr.expected_credentials):
|
||||
# if requested_vc_type not in included_credential_types:
|
||||
# raise Exception("You're missing some credentials we requested!") # TODO: return meaningful error
|
||||
# # Perform whatever action we have to do
|
||||
# action = json.loads(vr.action)
|
||||
# if action["action"] == "send_mail":
|
||||
# subject = action["params"]["subject"]
|
||||
# to_email = action["params"]["to"]
|
||||
# from_email = "noreply@verifier-portal"
|
||||
# body = request.POST["vp-token"]
|
||||
# send_mail(
|
||||
# subject,
|
||||
# body,
|
||||
# from_email,
|
||||
# [to_email]
|
||||
# )
|
||||
# elif action["action"] == "something-else":
|
||||
# pass
|
||||
# else:
|
||||
# raise Exception("Unknown action!")
|
||||
# # OK! Your verifiable presentation was successfully presented.
|
||||
# return HttpResponseRedirect(vr.response_or_redirect)
|
||||
|
||||
# # TODO: incorporate request.POST["presentation_submission"] as schema definition
|
||||
# (presentation_valid, _) = verify_presentation(request.POST["vp_token"])
|
||||
# if not presentation_valid:
|
||||
# raise Exception("Failed to verify signature on the given Verifiable Presentation.")
|
||||
# vp = json.loads(request.POST["vp_token"])
|
||||
# nonce = vp["nonce"]
|
||||
# # "vr" = verification_request
|
||||
# vr = get_object_or_404(VPVerifyRequest, nonce=nonce) # TODO: return meaningful error, not 404
|
||||
# # Get a list of all included verifiable credential types
|
||||
# included_credential_types = unique_everseen(flatten([
|
||||
# vc["type"] for vc in vp["verifiableCredential"]
|
||||
# ]))
|
||||
# # Check that it matches what we requested
|
||||
# for requested_vc_type in json.loads(vr.expected_credentials):
|
||||
# if requested_vc_type not in included_credential_types:
|
||||
# raise Exception("You're missing some credentials we requested!") # TODO: return meaningful error
|
||||
# # Perform whatever action we have to do
|
||||
# action = json.loads(vr.action)
|
||||
# if action["action"] == "send_mail":
|
||||
# subject = action["params"]["subject"]
|
||||
# to_email = action["params"]["to"]
|
||||
# from_email = "noreply@verifier-portal"
|
||||
# body = request.POST["vp-token"]
|
||||
# send_mail(
|
||||
# subject,
|
||||
# body,
|
||||
# from_email,
|
||||
# [to_email]
|
||||
# )
|
||||
# elif action["action"] == "something-else":
|
||||
# pass
|
||||
# else:
|
||||
# raise Exception("Unknown action!")
|
||||
# # OK! Your verifiable presentation was successfully presented.
|
||||
# return HttpResponseRedirect(vr.response_or_redirect)
|
||||
|
|
Loading…
Reference in New Issue