2020-04-06 Indy Contributors Call
Summary
Work updates:
Indy VDR
Indy Credx / Aries Credx
The future of this meeting
We intend to record this call.
Remember the Hyperledger Code of Conduct
Anti-Trust Policy
Linux Foundation meetings involve participation by industry competitors, and it is the intention of the Linux Foundation to conduct all of its activities in accordance with applicable antitrust and competition laws. It is therefore extremely important that attendees adhere to meeting agendas, and be aware of, and not participate in any activities that are prohibited under applicable US state, federal or foreign antitrust and competition laws.
Examples of types of actions that are prohibited at Linux Foundation meetings and in connection with Linux Foundation activities are described in the Linux Foundation Antitrust Policy available at http://www.linuxfoundation.org/antitrust-policy. If you have questions about these matters, please contact your company counsel, or if you are a member of the Linux Foundation, feel free to contact Andrew Updegrove of the firm of Gesmer Updegrove LLP, which provides legal counsel to the Linux Foundation.
Introductions
Attendees
Name (Organization) <email>
Richard Esplin (Evernym) <richard.esplin@evernym.com>
Stephen Curran (Cloud Compass Computing Inc.) <swcurran@cloudcompass.ca>
Kumaravel N (Ford) <nkumara2@ford.com>
Related Calls and Announcements
Identity Implementors Working Group call
Main place to get project updates, release status, and announcements.
Results from call to discuss techniques for supporting an Indy Network
Release Status and Work Updates
Move from Sovrin Foundation infrastructure
Move from Jenkins to GitHub actions
Jenkins machines are going away
#cicd discussion "Indy CI / CD Migration" (in #cicd use menu item "Discussions" to see/get to the discussion)
repo.sovrin.org → Hyperledger Artifactory
Indy Node
April: no release
May:
Replacing Indy Crypto with Ursa (Kiva)
More "rich schema" objects
Ubuntu 20.04 (Kiva)
Need to check additional dependencies:
Error rendering macro 'jira' : null
Indy SDK
March:
1.15.0:
LibVCX improvements to reject proof and connection redirect
Bug fixes
April: no release
May:
Indy VDR into LibIndy
Indy Credx into LibIndy
Aries Verifiable Credentials Registry (VCR)
Working on transitioning to Hyperledger - rename, required files, documentation
Being deployed at Government of Canada
Anoncreds 2.0
Mike: Creating a development plan in the Indy section of the wiki
Mike: Aries-Credx
Andrew: indy-credx
Aries Shared Libraries
Aries Shared:
indy-vdr (Andrew Whitehead) https://github.com/hyperledger/indy-vdr
Remaining work: Design doc, FFI, testing, CI / CD
As an Aries interface becomes standardized, will add that API layer
Split out an Indy-Util to contain common components between Indy-VDR and Indy-Credx
Need to check that duplicate copies of the util library doesn't cause trouble.
GitHub actions runs unit tests and basic integration tests
VON Network browser moved to Indy-VDR instead of LibIndy (no wallet needed because it is stateless)
Andrew working a large refactor in a PR
Put rich shemas behind a feature flag?
indy-credx / aries-credx
https://github.com/sovrin-foundation/aries-credx-framework-rs
6 most common attribute encodings
Does not yet have anoncreds 1 attribute encoding.
https://github.com/andrewwhitehead/indy-credx
Can make a non-revocable credential and create proofs.
Tagging will be moved to the KMS.
Mike will be working on revocation registry 2.0
Integrating upgraded PyO3 library
Create an Indy-Util for API types and other utility functions?
Aries-Util
Pack / Unpack
Not started yet
Aries-KMS
Mike working on documentation and architecture as an Aries RFC (KMS architecture) and Ursa RFC (API)
PR is submitted: https://github.com/hyperledger/aries-rfcs/pull/440
Mike and Cam's aries-core-rs → aries-kms-mayaguez
https://github.com/sovrin-foundation/aries-kms-rsPersistence work allows plugging in any database engine.
Focus is using an external enclave.
Indy wallet crate might move to start another aries-kms implementation → aries-kms-vostok
Aries-Storage
Non-KMS entities
Ursa 0.3.2
To replace libsodium, need to have a replacement for the anoncrypt / authcrypt sealed box for pack / unpack.
Can be done in Ursa with two steps, but might add as a single function call.
Other Business
Future of this meeting (and Indy collaboration generally)
We recognize as a community that each of us needs to adapt to current global events: improving the upstream open source libraries is likely to be slower.
Note from Aries calls: no apology is needed if people take longer to respond to things.
Evernym focused on a COVID19 response project through end of May
Richard's role changed, so we need a change in host for this meeting
Stephen Curran will host
More async collaboration
Future Calls
Next call:
Future:
Requirements questions:
IS-1099: anoncreds.prover_get_credentials_for_proof_req should return per-credential timestamp
Should we allow duplicate credentials from the same issuer?
Action items
HIPE #138, Issue #144 (Ken and Brent)
Call Recording