Skip to content
This repository has been archived by the owner on May 15, 2021. It is now read-only.

hellobloom/verify-kit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

⚠️ Notice ⚠️

This library is no longer maintained, please use ssi-sdk instead.

Verify Kit

Easily verify BloomID data your users shared with your application.

Installation

npm install --save @bloomprotocol/verify-kit

Usage

When the user allows access you get a response back.

Types

ResponseData

The payload is formatted as specified by Bloom's interpretation of the W3C Verifiable Presentation Data Model. The payload differs depending on whether or not the verification is for purposes of sharing Verifiable Credential(s), or Verifiable Authentication.

Format of the HTTP POST request (Verifiable Credential):

Name Description Type
context URLs linking to machine readable documents describing how to interpet the data `string[]`
type Standard type string specifying the document ('VerifiablePresentation') `string`
verifiableCredential Array of credentials being presented in this document `VerifiableCredential[]`
proof Presentation proof showing the sender's authority over the shared data `PresentationProof`
packedData Hex string representation of the hashed proof `string`
signature Signature of `packedData` by the user with their mnemonic. `string`
token Unique string to identify this data request `string`

Format of the HTTP POST request (Verifiable Authentication):

Name Description Type
context URLs linking to machine readable documents describing how to interpet the data `string[]`
type Standard type string specifying the document ('VerifiableAuth') `string`
proof Presentation proof showing the sender's authority over the shared data `AuthenticationProof`
signature Signature of `packedData` by the user with their mnemonic. `string`

Verifiable Credential

Format of a users verified credential

Name Description Type
id Identifier for this credential `string`
type Type name of the credential `string`
issuer Identifier of the entity that issued the credential `string`
issuanceDate RFC3339 Datetime of when the credential was issued `string`
credentialSubject Information about the subject of the credential and the verified data `CredentialSubject`
proof Credential proof showing the issuer signed the credential being shared `CredentialProof`

Credential Subject

Information identifying the subject and data of the credential

Name Description Type
subject Identifier of original subject of the attestation (Eth Address/ DID) `string`
data Stringified data containing what was verified and approved for sharing `string`
authorization Optional array of signatures showing chain of custody between original credential subject and current holder `Authorization[]`

Authorization

Optional array of signatures showing chain of custody between original credential subject and current holder

Name Description Type
subject Address of keypair granting authorization `string`
recipient Address of keypair receiving authorization `string`
revocation Hex string to identify this authorization in event of revocation `string`
signature Hash of subject, recipient, revocation signed by subject pk `string`

Credential Proof

Information identifying the subject and data of the credential

Name Description Type
type Identifier of this proof type `string`
created RFC3339 Datetime of when this proof was created. Usually same as issuance date `string`
creator Identifier of attester. Eth address or DID `string`
data Proof object containing all data necessary to validate original attestation `VerifiedData`

Verified Data

Proof defined by the Selective Disclosure Merkle Tree Spec

There are three types of Verified Data proofs in the spec

Name Description
Batch Proof Proof structure which enables submitting batches of attestations at the same time in a single transaction
On Chain Proof Proof structure intended for use with the AttestationLogic smart contract
Legacy Proof Legacy proof structure similar to On Chain proof. Used with Attestation Logic smart contract

This linked diagram shows how the proof data structures are formed

Batch Proof

Name Description Type
version Identifier of this proof type `string`
batchLayer2Hash Attestation hash formed by hashing subject sig with attester sig `string`
batchAttesterSig Attester's signature of layer2Hash and subject address `string`
subjectSig Subject signature of attestation agreement `string`
requestNonce Nonce used in subjectSig `string`
layer2Hash Hash of rootHash and rootHashNonce `string`
rootHash Merkle tree root hash `string`
rootHashNonce Nonce used with rootHash to create layer2Hash `string`
proof Array of merkle proof objects `MerkleProof`
stage mainnet, rinkeby, local, etc `string`
target Node of the merkle tree being shared `SignedClaimNode`
attester Attester Eth address `string`
subject Subject Eth address `string`

On Chain Proof

Name Description Type
version Identifier of this proof type `string`
tx Ethereum transaction which refrences this attestation `string`
layer2Hash Hash of rootHash and rootHashNonce `string`
rootHash Merkle tree root hash `string`
rootHashNonce Nonce used with rootHash to create layer2Hash `string`
proof Array of merkle proof objects `MerkleProof`
stage mainnet, rinkeby, local, etc `string`
target Node of the merkle tree being shared `SignedClaimNode`
attester Attester Eth address `string`

Legacy Proof

Name Description Type
version Identifier of this proof type `string`
tx Ethereum transaction which refrences this attestation `string`
layer2Hash Hash of rootHash and rootHashNonce `string`
rootHash Merkle tree root hash `string`
rootHashNonce Nonce used with rootHash to create layer2Hash `string`
proof Array of merkle proof objects `MerkleProof`
stage mainnet, rinkeby, local, etc `string`
target Node of the merkle tree being shared `LegacyDataNode`
attester Attester Eth address `string`

Signed Claim Node

Format of target attestation data

Name Description Type
claimNode Object representing the attestation data, type, and revocation links `IssuedClaimNode`
attester Attester Eth address `string`
attesterSig Root hash of claim node tree signed by attester `string`

Issued Claim Node

Format of attestation node

Name Description Type
data Object containing the data, nonce, and version of the attestation `AttestationData`
type Object containing he type, nonce, and optionally a provider of the attestation `AttestationType`
aux String containing a hash of an `IAuxSig` object or just a padding node hash `string`
issuance Object containing issuance and revocation metadata `IssuanceNode`

Issuance Node

Name Description Type
localRevocationToken Hex string to be used in public revocation registry to revoke this data node `string`
globalRevocationToken Hex string to be used in public revocation registry to revoke this entire attestation `string`
dataHash Hash of claim tree `string`
typeHash Hash of type object `string`
issuanceDate RFC3339 datetime of when this claim was issued `string`
expirationDate RFC3339 datetime of when this claim should be considered expired `string`

Legacy Data Node

Format of legacy attestation data

Name Description Type
attestationNode Object representing the attestation data, type, and revocation links `LegacyAttestationNode`
signedAttestation Root hash of attestation tree signed by attester `string`

Legacy Attestation Node

Name Description Type
data Object containing the data, nonce, and version of the attestation `AttestationData`
type Object containing he type, nonce, and optionally a provider of the attestation `AttestationType`
aux String containing a hash of an `IAuxSig` object or just a padding node hash `string`
link Object containing the information used in the event of an attestation revocation `RevocationLinks`

Merkle Proof

Format of proof object used to perform merkle proof

Name Description Type
position `left` or `right` indicating position of hash in merkle tree `string`
data Hex string of node hash `string`

Presentation Proof

Format of a users verified data

Name Description Type
type Identifier of this type of presentation proof `string`
created RFC3339 datetime of when this proof was generated and signed `string`
creator Identifier of holder sharing the credential. Eth address or DID `string`
nonce Token used to make this request unique `string`
domain Website of recipient where user intends to share the data `string`
credentialHash Hash of array of layer2Hashes being shared `string`

Authentication Proof

Format of a users verified data

Name Description Type
type Identifier of this type of presentation proof `string`
created RFC3339 datetime of when this proof was generated and signed `string`
creator Identifier of holder sharing the credential. Eth address or DID `string`
nonce Token used to make this request unique `string`
domain Website of recipient where user intends to share the data `string`

`

Example

{
  "signature": "0x1b6dfeb3608e5793bf7cfdbeedbb84bd06bc769f9c4450e1253e424b69bc451679007ddcab8a85bf6562c8551e99a3a07159c1dcbe1dd866e889e524846241e71c",
  "type": "VerifiablePresentation",
  "token": "78c7f905-6091-4c7f-a63f-f8590242502f",
  "verifiableCredential": [
    {
      "credentialSubject": {
        "subject": "0x1cc73a01dab0d88060d86033d21c9068e601b84c",
        "data": "ipatka@gmail.com",
        "authorization": []
      },
      "id": "placeholder",
      "proof": {
        "created": "2019-05-15T01:38:02.502Z",
        "data": {
          "subject": "0x1cc73a01dab0d88060d86033d21c9068e601b84c",
          "version": "batch",
          "batchAttesterSig": "0xffcf3b824f4beffa50c250308f54f6367444d86af8196ca452c71a7eefceec473baf33b4d87279ea527222eb7b055fc7b9c93846d78593fbaa2852009e92e1351c",
          "rootHashNonce": "0xd19abeca6dd0e7daa486d9e596d9dca96728c568751918dc99e1aaca3ab445be",
          "layer2Hash": "0x36e952d746dbaa6c8b3e2451145198de8945094db39f52a4c9497d61241dea16",
          "rootHash": "0x2223208a5a1927fed62f95c1be879b1831b556300a87ba41fa931f0968ad7f23",
          "stage": "mainnet",
          "proof": [
            {
              "position": "left",
              "data": "0x7079ce5b946f0fbc0b160c8aee7a7db02c92f5f6a9cb42408cd60adc72a17823"
            },
            {
              "position": "left",
              "data": "0x8fc45a1e10df267e5e127286b9913fdb22fe27cd99196491f9aa9af80f5ca342"
            },
            {
              "position": "right",
              "data": "0x3e2466500850683f4c32605fb9fca000e44c463fc4b9557cbfba0ce54589d8a7"
            },
            {
              "position": "left",
              "data": "0xa2920d7b3306ae8397715ff574ce183a7678a5ffa58648ab088766a279c310d5"
            }
          ],
          "requestNonce": "0xc995c3badcbb87a59bade5559e43630a07fb793c2ae4808fbc81263360008607",
          "target": {
            "claimNode": {
              "data": {
                "nonce": "a92c0e08bd7ade12c92424c7d4861236c26b831c1423f3ab54e4bb5b51df6679",
                "data": "ipatka@gmail.com",
                "version": "2.0.0"
              },
              "issuance": {
                "typeHash": "0x2b8f752a33ec25cd6aef2cb067477b64a4fe727238f4a31807ff4c2ec45c6a0b",
                "expirationDate": "2024-05-15T01:38:02.502Z",
                "dataHash": "0xecde0370b2a4cacefbbc13c0a63d451857be256ca69150bb960b48822522c8d6",
                "localRevocationToken": "0xe84ab3e2c99464702260749716d65b9b184c8ddf14d1db0f3a7a111164d1f2b2",
                "issuanceDate": "2019-05-15T01:38:02.502Z",
                "globalRevocationToken": "0xddd4dd3dd27861da7627fa4d48916fb4a681498ff6914ddfa815c5d6eba2fab1"
              },
              "aux": "0x2d42ba0a6212914179d480f3b4c35238da98f9af75b117986d58252c21388fc8",
              "type": {
                "type": "email",
                "nonce": "ebb6668e467df4f591647dd5b5b7c7dc1b7ca06f6f52f705ea4e1fb5c784e00b",
                "provider": "Bloom"
              }
            },
            "attesterSig": "0xad9ba60d018bbc1a9b2ad69f9f415779394b69e89284348f681a7d181ec95bd05230b793ca1286f6d960fec9a117d8d6860e87df8054c1baf4d76f589baf95661b",
            "attester": "0x156ba3f2af07d24cfd5dd8ec0fe2b17c6131d7fb"
          },
          "subjectSig": "0x3c142cf48a169616cc3c1665df1721f1fee3d4f96f9936e82ee39f01946b082461ccfe71e86912deb3c9343ae60ddda59b1b5f5a2a889109a507422ca036a3931b",
          "attester": "0x156ba3f2af07d24cfd5dd8ec0fe2b17c6131d7fb",
          "batchLayer2Hash": "0x01f575b3beb4ac1706494c756fb19632a2fa494bd6c171522132ba4f3b48770f"
        },
        "type": "Bloom-Batch-Proof-1.0.0",
        "creator": "0x156ba3f2af07d24cfd5dd8ec0fe2b17c6131d7fb"
      },
      "type": "email",
      "issuer": "0x156ba3f2af07d24cfd5dd8ec0fe2b17c6131d7fb",
      "issuanceDate": "2019-05-15T01:38:02.502Z"
    }
  ],
  "packedData": "0xae69844748a07e06d259aa697a3e1867bd84749a53bded6d4a4cf9cc7b97bbab",
  "context": ["placeholder"],
  "proof": {
    "credentialHash": "0x0d0f48792f41e35fd83f70c2ac5694eaf08291cdd7530a331715db34a688409e",
    "created": "2019-05-15T23:53:36.808Z",
    "nonce": "78c7f905-6091-4c7f-a63f-f8590242502f",
    "type": "Bloom-Presentation-1.0.0",
    "creator": "0x1cc73a01dab0d88060d86033d21c9068e601b84c",
    "domain": "placeholder"
  }
}

Receive

The endpoint specified in the QR code should be configured to accept data in the format shown in ResponseData.

import {validateUntypedResponseData} from '@bloomprotocol/verify-kit'

app.post('/scan', async (req, res) => {
  try {
    const verifiedData = await validateUntypedResponseData(req.body, {
      validateOnChain: env.validateOnChain,
      web3Provider: env.web3Provider,
    })
    if (verifiedData.kind === 'invalid') {
      res.status(400).json({
        success: false,
        message: 'Shared data is not valid',
        verifiedData,
      })
      return
    }
    const consumableData = verifiedData.data.verifiableCredential.map(v => v.credentialSubject.data)

    res.status(200).json({success: true, message: 'Data Received'})
  } catch (err) {
    res.status(400).json({
      success: false,
      message: 'Something went wrong',
    })
  }
})

Using Verify Kit for BloomID Sign-In

In conjuction with this libary you will use Share Kit to render an element to request users share their data with you.

Complete examples are available at Bloom Starter.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published