Skip to content

feat: merge main into test/oid4vp-mdoc for OID4VP mDOC review#27

Open
burdettadam wants to merge 11 commits intomainfrom
test/oid4vp-mdoc
Open

feat: merge main into test/oid4vp-mdoc for OID4VP mDOC review#27
burdettadam wants to merge 11 commits intomainfrom
test/oid4vp-mdoc

Conversation

@burdettadam
Copy link
Collaborator

Merges main into the test/oid4vp-mdoc branch so we can view a rich diff of changes Patrick made for getting mDOC working against the SDK.

This PR is for review purposes — the single unique commit (e52e6b5) adds:

  • Demo scripts for mDOC offer/request (create-mdoc-offer.sh/ts, create-mdoc-request.sh/ts)
  • Changes to mso_mdoc/cred_processor.py
  • Token endpoint changes for mDOC VP flows
  • Verification route additions
  • Demo setup/config tweaks

TheTreek and others added 11 commits March 15, 2026 22:59
Signed-off-by: Patrick Kenyon <treek.kenyon@gmail.com>
Signed-off-by: Adam Burdett <burdettadam@gmail.com>

# Conflicts:
#	oid4vc/demo/README.md
#	oid4vc/mso_mdoc/cred_processor.py
#	oid4vc/oid4vc/public_routes/token.py
#	oid4vc/oid4vc/tests/test_token.py
Signed-off-by: Adam Burdett <burdettadam@gmail.com>
Signed-off-by: Adam Burdett <burdettadam@gmail.com>
…nd_sign_mdl

isomdl-uniffi's create_and_sign_mdl requires the driving_privileges field to
be present even when no driving privileges exist. Without it the library raises
MdocInitError.GeneralConstructionError. Default to an empty array so callers
that omit the field (e.g. non-driver credentials) still produce a valid mDL.

Signed-off-by: Adam Burdett <burdettadam@gmail.com>
Signed-off-by: Adam Burdett <burdettadam@gmail.com>
Signed-off-by: Adam Burdett <burdettadam@gmail.com>
- Add 'request' npm script pointing to create-mdoc-request.ts
- setup.sh Step 4: fetch issuer mDOC certificate from
  GET /mso_mdoc/certificates/default and register it as a trust anchor
  on the verifier via POST /mso_mdoc/trust-anchors so that OID4VP
  presentations verify successfully out of the box

Signed-off-by: Adam Burdett <burdettadam@gmail.com>
…uth-server case

Some wallets (e.g. waltid) read token_endpoint directly from
resolveCIProviderMetadata() and NPE if absent, rather than performing
AS discovery via /.well-known/oauth-authorization-server.

Signed-off-by: Adam Burdett <burdettadam@gmail.com>
…server

- Remove unused Settings and Config imports (F401)
- Add missing SdJwtCredIssueProcessor import (F821)
- Move wallet_id assignment before first use (F821)

Signed-off-by: Adam Burdett <burdettadam@gmail.com>
Signed-off-by: Adam Burdett <burdettadam@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants