Skip to content

Commit a7ce8cd

Browse files
authored
Merge pull request wwWallet#67 from wwWallet/delete-createIdToken
Delete createIdToken and other unused code
2 parents 1012df6 + add1044 commit a7ce8cd

8 files changed

+2
-386
lines changed

src/routers/communicationHandler.router.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ import express, { Router } from 'express';
33
import { AuthMiddleware } from '../middlewares/auth.middleware';
44
import _ from 'lodash';
55
import { appContainer } from '../services/inversify.config';
6-
import { HandleOutboundRequestError, IssuanceErr, OpenidCredentialReceiving, OutboundCommunication, SendResponseError } from '../services/interfaces';
6+
import { HandleOutboundRequestError, OpenidCredentialReceiving, OutboundCommunication, SendResponseError } from '../services/interfaces';
77
import { TYPES } from '../services/types';
88
import * as z from 'zod';
99

src/services/ClientKeystoreService.ts

Lines changed: 0 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -23,29 +23,6 @@ export class ClientKeystoreService implements WalletKeystore {
2323
) { }
2424

2525

26-
async createIdToken(userId: UserId, nonce: string, audience: string, additionalParameters: AdditionalKeystoreParameters): Promise<Result<{ id_token: string; }, WalletKeystoreErr>> {
27-
let message_id_sent = randomUUID();
28-
const msg = {
29-
message_id: message_id_sent,
30-
request: {
31-
action: SignatureAction.createIdToken,
32-
nonce: nonce,
33-
audience: audience
34-
}
35-
}
36-
await this.socketManagerService.send(userId, msg as ServerSocketMessage)
37-
38-
const result = await this.socketManagerService.expect(userId, message_id_sent, SignatureAction.createIdToken);
39-
if (result.err) {
40-
return Err(WalletKeystoreErr.REMOTE_SIGNING_FAILED);
41-
}
42-
const { message: { message_id, response } } = result.unwrap();
43-
if (response.action == SignatureAction.createIdToken) {
44-
return Ok({ id_token: response.id_token });
45-
}
46-
return Err(WalletKeystoreErr.REMOTE_SIGNING_FAILED);
47-
}
48-
4926
async signJwtPresentation(userId: UserId, nonce: string, audience: string, verifiableCredentials: any[], additionalParameters: AdditionalKeystoreParameters): Promise<Result<{ vpjwt: string }, WalletKeystoreErr>> {
5027
let message_id_sent = randomUUID();
5128
const msg = {

src/services/DatabaseKeystoreService.ts

Lines changed: 0 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -33,31 +33,6 @@ export class DatabaseKeystoreService implements WalletKeystore {
3333
}
3434

3535

36-
async createIdToken(userId: UserId, nonce: string, audience: string, additionalParameters: AdditionalKeystoreParameters): Promise<Result<{ id_token: string; }, WalletKeystoreErr>> {
37-
const user = (await getUser(userId)).unwrap();
38-
const keys = JSON.parse(user.keys.toString()) as WalletKey;
39-
40-
if (!keys.privateKey) {
41-
return Err(WalletKeystoreErr.KEYS_UNAVAILABLE);
42-
}
43-
44-
const privateKey = await importJWK(keys.privateKey, keys.alg);
45-
const jws = await new SignJWT({ nonce: nonce })
46-
.setProtectedHeader({
47-
alg: this.algorithm,
48-
typ: "JWT",
49-
kid: keys.verificationMethod,
50-
})
51-
.setSubject(user.did)
52-
.setIssuer(user.did)
53-
.setExpirationTime('1m')
54-
.setAudience(audience)
55-
.setIssuedAt()
56-
.sign(privateKey);
57-
58-
return Ok({ id_token: jws });
59-
}
60-
6136
async signJwtPresentation(userId: UserId, nonce: string, audience: string, verifiableCredentials: any[], additionalParameters: AdditionalKeystoreParameters): Promise<Result<{ vpjwt: string }, WalletKeystoreErr>> {
6237
const user = (await getUser(userId)).unwrap();
6338
const keys = JSON.parse(user.keys.toString()) as WalletKey;

src/services/OpenidForCredentialIssuanceService.ts

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -46,18 +46,6 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei
4646
) { }
4747

4848

49-
async getIssuerState(userId: UserId): Promise<{ issuer_state?: string, error?: Error; }> {
50-
const state = this.states.get(userId.id);
51-
if (!state) {
52-
return { issuer_state: null, error: new Error("No state found") };
53-
}
54-
if (!state.issuer_state) {
55-
return { issuer_state: null, error: new Error("No issuer_state found in state") };
56-
}
57-
58-
return { issuer_state: state.issuer_state, error: null };
59-
}
60-
6149
async generateAuthorizationRequestURL(userId: UserId, credentialOfferURL?: string, legalPersonDID?: string): Promise<{ redirect_to?: string, preauth?: boolean, ask_for_pin?: boolean }> {
6250
console.log("generateAuthorizationRequestURL userId = ", userId);
6351
console.log("LP = ", legalPersonDID);

0 commit comments

Comments
 (0)