identity_credential/sd_jwt_vc/
builder.rs#![allow(clippy::vec_init_then_push)]
use std::sync::LazyLock;
use identity_core::common::StringOrUrl;
use identity_core::common::Timestamp;
use identity_core::common::Url;
use identity_core::convert::ToJson;
use sd_jwt_payload_rework::Hasher;
use sd_jwt_payload_rework::JsonObject;
use sd_jwt_payload_rework::JwsSigner;
use sd_jwt_payload_rework::RequiredKeyBinding;
use sd_jwt_payload_rework::SdJwtBuilder;
use sd_jwt_payload_rework::Sha256Hasher;
use serde::Serialize;
use serde_json::json;
use serde_json::Value;
use crate::credential::Credential;
use crate::credential::CredentialJwtClaims;
use super::Error;
use super::Result;
use super::SdJwtVc;
use super::Status;
use super::SD_JWT_VC_TYP;
static DEFAULT_HEADER: LazyLock<JsonObject> = LazyLock::new(|| {
let mut object = JsonObject::default();
object.insert("typ".to_string(), SD_JWT_VC_TYP.into());
object
});
macro_rules! claim_to_key_value_pair {
( $( $claim:ident ),+ ) => {
{
let mut claim_list = Vec::<(&'static str, serde_json::Value)>::new();
$(
claim_list.push((stringify!($claim), serde_json::to_value($claim).unwrap()));
)*
claim_list
}
};
}
#[derive(Debug)]
pub struct SdJwtVcBuilder<H = Sha256Hasher> {
inner_builder: SdJwtBuilder<H>,
header: JsonObject,
iss: Option<Url>,
nbf: Option<i64>,
exp: Option<i64>,
iat: Option<i64>,
vct: Option<StringOrUrl>,
sub: Option<StringOrUrl>,
status: Option<Status>,
}
impl Default for SdJwtVcBuilder {
fn default() -> Self {
Self {
inner_builder: SdJwtBuilder::<Sha256Hasher>::new(json!({})).unwrap(),
header: DEFAULT_HEADER.clone(),
iss: None,
nbf: None,
exp: None,
iat: None,
vct: None,
sub: None,
status: None,
}
}
}
impl SdJwtVcBuilder {
pub fn new<T: Serialize>(object: T) -> Result<Self> {
let inner_builder = SdJwtBuilder::<Sha256Hasher>::new(object)?;
Ok(Self {
header: DEFAULT_HEADER.clone(),
inner_builder,
..Default::default()
})
}
}
impl<H: Hasher> SdJwtVcBuilder<H> {
pub fn new_with_hasher<T: Serialize>(object: T, hasher: H) -> Result<Self> {
let inner_builder = SdJwtBuilder::new_with_hasher(object, hasher)?;
Ok(Self {
inner_builder,
header: DEFAULT_HEADER.clone(),
iss: None,
nbf: None,
exp: None,
iat: None,
vct: None,
sub: None,
status: None,
})
}
pub fn new_from_credential(credential: Credential, hasher: H) -> std::result::Result<Self, crate::Error> {
let mut vc_jwt_claims = CredentialJwtClaims::new(&credential, None)?
.to_json_value()
.map_err(|e| crate::Error::JwtClaimsSetSerializationError(Box::new(e)))?;
{
let claims = vc_jwt_claims.as_object_mut().expect("serialized VC is a JSON object");
let Value::Object(vc_properties) = claims.remove("vc").expect("serialized VC has `vc` property") else {
unreachable!("`vc` property's value is a JSON object");
};
for (key, value) in vc_properties {
claims.insert(key, value);
}
}
Ok(Self::new_with_hasher(vc_jwt_claims, hasher)?)
}
pub fn make_concealable(mut self, path: &str) -> Result<Self> {
self.inner_builder = self.inner_builder.make_concealable(path)?;
Ok(self)
}
pub fn header(mut self, header: JsonObject) -> Self {
self.header = header;
self
}
pub fn add_decoys(mut self, path: &str, number_of_decoys: usize) -> Result<Self> {
self.inner_builder = self.inner_builder.add_decoys(path, number_of_decoys)?;
Ok(self)
}
pub fn require_key_binding(mut self, key_bind: RequiredKeyBinding) -> Self {
self.inner_builder = self.inner_builder.require_key_binding(key_bind);
self
}
pub fn iss(mut self, issuer: Url) -> Self {
self.iss = Some(issuer);
self
}
pub fn nbf(mut self, nbf: Timestamp) -> Self {
self.nbf = Some(nbf.to_unix());
self
}
pub fn exp(mut self, exp: Timestamp) -> Self {
self.exp = Some(exp.to_unix());
self
}
pub fn iat(mut self, iat: Timestamp) -> Self {
self.iat = Some(iat.to_unix());
self
}
pub fn vct(mut self, vct: impl Into<StringOrUrl>) -> Self {
self.vct = Some(vct.into());
self
}
#[allow(clippy::should_implement_trait)]
pub fn sub(mut self, sub: impl Into<StringOrUrl>) -> Self {
self.sub = Some(sub.into());
self
}
pub fn status(mut self, status: Status) -> Self {
self.status = Some(status);
self
}
pub async fn finish<S>(self, signer: &S, alg: &str) -> Result<SdJwtVc>
where
S: JwsSigner,
{
let Self {
inner_builder,
mut header,
iss,
nbf,
exp,
iat,
vct,
sub,
status,
} = self;
header
.entry("typ")
.or_insert_with(|| SD_JWT_VC_TYP.to_owned().into())
.as_str()
.filter(|typ| typ.contains(SD_JWT_VC_TYP))
.ok_or_else(|| Error::InvalidJoseType(String::default()))?;
let builder = inner_builder.header(header);
let builder = claim_to_key_value_pair![iss, nbf, exp, iat, vct, sub, status]
.into_iter()
.filter(|(_, value)| !value.is_null())
.fold(builder, |builder, (key, value)| {
builder.insert_claim(key, value).expect("value is a JSON Value")
});
let sd_jwt = builder.finish(signer, alg).await?;
SdJwtVc::try_from(sd_jwt)
}
}
#[cfg(test)]
mod tests {
use super::*;
use crate::credential::CredentialBuilder;
use crate::credential::Subject;
use crate::sd_jwt_vc::tests::TestSigner;
#[tokio::test]
async fn building_valid_vc_works() -> anyhow::Result<()> {
let credential = json!({
"name": "John Doe",
"birthdate": "1970-01-01"
});
SdJwtVcBuilder::new(credential)?
.vct("https://bmi.bund.example/credential/pid/1.0".parse::<Url>()?)
.iat(Timestamp::now_utc())
.iss("https://example.com/".parse()?)
.make_concealable("/birthdate")?
.finish(&TestSigner, "HS256")
.await?;
Ok(())
}
#[tokio::test]
async fn building_vc_with_missing_mandatory_claims_fails() -> anyhow::Result<()> {
let credential = json!({
"name": "John Doe",
"birthdate": "1970-01-01"
});
let err = SdJwtVcBuilder::new(credential)?
.vct("https://bmi.bund.example/credential/pid/1.0".parse::<Url>()?)
.iat(Timestamp::now_utc())
.make_concealable("/birthdate")?
.finish(&TestSigner, "HS256")
.await
.unwrap_err();
assert!(matches!(err, Error::MissingClaim("iss")));
Ok(())
}
#[tokio::test]
async fn building_vc_with_invalid_mandatory_claims_fails() -> anyhow::Result<()> {
let credential = json!({
"name": "John Doe",
"birthdate": "1970-01-01",
"vct": { "id": 1234567890 }
});
let err = SdJwtVcBuilder::new(credential)?
.iat(Timestamp::now_utc())
.iss("https://example.com".parse()?)
.make_concealable("/birthdate")?
.finish(&TestSigner, "HS256")
.await
.unwrap_err();
assert!(matches!(err, Error::InvalidClaimValue { name: "vct", .. }));
Ok(())
}
#[tokio::test]
async fn building_vc_with_disclosed_mandatory_claim_fails() -> anyhow::Result<()> {
let credential = json!({
"name": "John Doe",
"birthdate": "1970-01-01",
"vct": { "id": 1234567890 }
});
let err = SdJwtVcBuilder::new(credential)?
.iat(Timestamp::now_utc())
.iss("https://example.com".parse()?)
.make_concealable("/birthdate")?
.make_concealable("/vct")?
.finish(&TestSigner, "HS256")
.await
.unwrap_err();
assert!(matches!(err, Error::DisclosedClaim("vct")));
Ok(())
}
#[tokio::test]
async fn building_sd_jwt_vc_from_credential_works() -> anyhow::Result<()> {
let credential = CredentialBuilder::default()
.id(Url::parse("https://example.com/credentials/42")?)
.issuance_date(Timestamp::now_utc())
.issuer(Url::parse("https://example.com/issuers/42")?)
.subject(Subject::with_id(Url::parse("https://example.com/subjects/42")?))
.build()?;
let sd_jwt_vc = SdJwtVcBuilder::new_from_credential(credential.clone(), Sha256Hasher)?
.vct(Url::parse("https://example.com/types/0")?)
.finish(&TestSigner, "HS256")
.await?;
assert_eq!(sd_jwt_vc.claims().nbf.as_ref().unwrap(), &credential.issuance_date);
assert_eq!(&sd_jwt_vc.claims().iss, credential.issuer.url());
assert_eq!(
sd_jwt_vc.claims().sub.as_ref().unwrap().as_url(),
credential.credential_subject.first().unwrap().id.as_ref()
);
assert_eq!(
sd_jwt_vc.claims().get("jti"),
Some(&json!(credential.id.as_ref().unwrap()))
);
assert_eq!(sd_jwt_vc.claims().get("type"), Some(&json!("VerifiableCredential")));
Ok(())
}
}