Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Changes applied to release candidate for 1.2.0 pulled into main #876

Merged
merged 1 commit into from
Oct 11, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
16 changes: 8 additions & 8 deletions src/keri/app/cli/commands/did/generate.py
Original file line number Diff line number Diff line change
Expand Up @@ -73,20 +73,20 @@ def generate(tymth, tock=0.0, **opts):
sys.exit(-1)

wit = random.choice(hab.kever.wits)
urls = hab.fetchUrls(eid=wit, scheme=kering.Schemes.http) or hab.fetchUrls(eid=wit, scheme=kering.Schemes.https)
urls = hab.fetchUrls(eid=wit, scheme=kering.Schemes.http) \
or hab.fetchUrls(eid=wit, scheme=kering.Schemes.https)
if not urls:
raise kering.ConfigurationError(f"unable to query witness {wit}, no http endpoint")

url = urls[kering.Schemes.http] if kering.Schemes.http in urls else urls[kering.Schemes.https]
up = urlparse(url)
enc = urllib.parse.quote_plus(f"{up.scheme}://{up.hostname}:{up.port}/oobi/{hab.pre}/witness")
url = urls[kering.Schemes.https] if kering.Schemes.https in urls else urls[kering.Schemes.http]
enc = urllib.parse.quote_plus(f"{url.rstrip("/")}/oobi/{hab.pre}/witness")
print(f"did:keri:{hab.pre}?oobi={enc}")
elif role in (kering.Roles.controller,):
urls = hab.fetchUrls(eid=hab.pre, scheme=kering.Schemes.http) or hab.fetchUrls(eid=hab.pre, scheme=kering.Schemes.https)
urls = hab.fetchUrls(eid=hab.pre, scheme=kering.Schemes.http) \
or hab.fetchUrls(eid=hab.pre, scheme=kering.Schemes.https)
if not urls:
print(f"{alias} identifier {hab.pre} does not have any controller endpoints")
return
url = urls[kering.Schemes.http] if kering.Schemes.http in urls else urls[kering.Schemes.https]
up = urlparse(url)
enc = urllib.parse.quote_plus(f"{up.scheme}://{up.hostname}:{up.port}/oobi/{hab.pre}/controller")
url = urls[kering.Schemes.https] if kering.Schemes.https in urls else urls[kering.Schemes.http]
enc = urllib.parse.quote_plus(f"{url.rstrip("/")}/oobi/{hab.pre}/controller")
print(f"did:keri:{hab.pre}?oobi={enc}")
4 changes: 2 additions & 2 deletions src/keri/app/cli/commands/ipex/grant.py
Original file line number Diff line number Diff line change
Expand Up @@ -111,8 +111,8 @@ def grantDo(self, tymth, tock=0.0):
iserder = serdering.SerderKERI(raw=bytes(iss))
seqner = coring.Seqner(sn=iserder.sn)

serder = self.hby.db.fetchAllSealingEventByEventSeal(creder.sad['i'],
seal=dict(i=iserder.pre, s=seqner.snh, d=iserder.said))
serder = self.hby.db.fetchLastSealingEventByEventSeal(creder.sad['i'],
seal=dict(i=iserder.pre, s=seqner.snh, d=iserder.said))
anc = self.hby.db.cloneEvtMsg(pre=serder.pre, fn=0, dig=serder.said)

exn, atc = protocoling.ipexGrantExn(hab=self.hab, recp=recp, message=self.message, acdc=acdc, iss=iss, anc=anc,
Expand Down
22 changes: 10 additions & 12 deletions src/keri/app/cli/commands/oobi/generate.py
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@

"""
import argparse
from urllib.parse import urlparse

import sys
from hio import help
Expand Down Expand Up @@ -66,21 +65,21 @@ def generate(tymth, tock=0.0, **opts):
sys.exit(-1)

for wit in hab.kever.wits:
urls = hab.fetchUrls(eid=wit, scheme=kering.Schemes.http) or hab.fetchUrls(eid=wit, scheme=kering.Schemes.https)
urls = hab.fetchUrls(eid=wit, scheme=kering.Schemes.http) \
or hab.fetchUrls(eid=wit, scheme=kering.Schemes.https)
if not urls:
raise kering.ConfigurationError(f"unable to query witness {wit}, no http endpoint")

url = urls[kering.Schemes.http] if kering.Schemes.http in urls else urls[kering.Schemes.https]
up = urlparse(url)
print(f"{up.scheme}://{up.hostname}:{up.port}/oobi/{hab.pre}/witness")
url = urls[kering.Schemes.https] if kering.Schemes.https in urls else urls[kering.Schemes.http]
print(f"{url.rstrip("/")}/oobi/{hab.pre}/witness")
elif role in (kering.Roles.controller,):
urls = hab.fetchUrls(eid=hab.pre, scheme=kering.Schemes.http) or hab.fetchUrls(eid=hab.pre, scheme=kering.Schemes.https)
urls = hab.fetchUrls(eid=hab.pre, scheme=kering.Schemes.http) \
or hab.fetchUrls(eid=hab.pre, scheme=kering.Schemes.https)
if not urls:
print(f"{alias} identifier {hab.pre} does not have any controller endpoints")
return
url = urls[kering.Schemes.http] if kering.Schemes.http in urls else urls[kering.Schemes.https]
up = urlparse(url)
print(f"{up.scheme}://{up.hostname}:{up.port}/oobi/{hab.pre}/controller")
url = urls[kering.Schemes.https] if kering.Schemes.https in urls else urls[kering.Schemes.http]
print(f"{url.rstrip("/")}/oobi/{hab.pre}/controller")
elif role in (kering.Roles.mailbox,):
for (_, _, eid), end in hab.db.ends.getItemIter(keys=(hab.pre, kering.Roles.mailbox, )):
if not (end.allowed and end.enabled is not False):
Expand All @@ -91,6 +90,5 @@ def generate(tymth, tock=0.0, **opts):
if not urls:
print(f"{alias} identifier {hab.pre} does not have any mailbox endpoints")
return
url = urls[kering.Schemes.http] if kering.Schemes.http in urls else urls[kering.Schemes.https]
up = urlparse(url)
print(f"{up.scheme}://{up.hostname}:{up.port}/oobi/{hab.pre}/mailbox/{eid}")
url = urls[kering.Schemes.https] if kering.Schemes.https in urls else urls[kering.Schemes.http]
print(f"{url.rstrip("/")}/oobi/{hab.pre}/mailbox/{eid}")
5 changes: 5 additions & 0 deletions src/keri/app/cli/commands/oobi/resolve.py
Original file line number Diff line number Diff line change
Expand Up @@ -107,6 +107,11 @@ def waitDo(self, tymth, tock=0.0):
yield 0.25

obr = self.obi.hby.db.roobi.get(keys=(self.oobi,))
if self.force:
while obr.cid not in self.hby.kevers:
self.hby.kvy.processEscrows()
yield 0.25

print(self.oobi, obr.state)

self.remove([self.hbyDoer, *self.obi.doers, *self.authn.doers])
4 changes: 3 additions & 1 deletion src/keri/app/cli/commands/witness/authenticate.py
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,7 @@
from keri.app import httping, connecting
from keri.app.agenting import httpClient
from keri.app.cli.common import existing
from keri.app.httping import CESR_DESTINATION_HEADER
from keri.core import coring

logger = help.ogler.getLogger()
Expand Down Expand Up @@ -107,7 +108,8 @@ def authDo(self, tymth, tock=0.0):
fargs['delkel'] = delkel.decode("utf-8")

headers = (Hict([
("Content-Type", "multipart/form-data")
("Content-Type", "multipart/form-data"),
(CESR_DESTINATION_HEADER, self.witness)
]))

client, clientDoer = httpClient(self.hab, self.witness)
Expand Down
2 changes: 1 addition & 1 deletion src/keri/app/delegating.py
Original file line number Diff line number Diff line change
Expand Up @@ -138,7 +138,7 @@ def processUnanchoredEscrow(self):
dkever = self.hby.kevers[kever.delpre]

seal = dict(i=serder.pre, s=serder.snh, d=serder.said)
if dserder := self.hby.db.fetchAllSealingEventByEventSeal(dkever.prefixer.qb64, seal=seal):
if dserder := self.hby.db.fetchLastSealingEventByEventSeal(dkever.prefixer.qb64, seal=seal):
seqner = coring.Seqner(sn=dserder.sn)
couple = seqner.qb64b + dserder.saidb
dgkey = dbing.dgKey(kever.prefixer.qb64b, kever.serder.saidb)
Expand Down
4 changes: 2 additions & 2 deletions src/keri/app/grouping.py
Original file line number Diff line number Diff line change
Expand Up @@ -171,8 +171,8 @@ def processDelegateEscrow(self):
self.hby.db.cgms.put(keys=(pre, seqner.qb64), val=saider)

else: # Not witnesser, we need to look for the anchor and then wait for receipts
if serder := self.hby.db.fetchAllSealingEventByEventSeal(kever.delpre,
seal=anchor):
if serder := self.hby.db.fetchLastSealingEventByEventSeal(kever.delpre,
seal=anchor):
aseq = coring.Seqner(sn=serder.sn)
couple = aseq.qb64b + serder.saidb
dgkey = dbing.dgKey(pre, saider.qb64b)
Expand Down
11 changes: 5 additions & 6 deletions src/keri/app/oobiing.py
Original file line number Diff line number Diff line change
Expand Up @@ -115,15 +115,15 @@ def on_get_alias(self, req, rep, alias=None):
if role in (kering.Roles.witness,): # Fetch URL OOBIs for all witnesses
oobis = []
for wit in hab.kever.wits:
urls = hab.fetchUrls(eid=wit, scheme=kering.Schemes.http) or hab.fetchUrls(eid=wit, scheme=kering.Schemes.https)
urls = hab.fetchUrls(eid=wit, scheme=kering.Schemes.http) \
or hab.fetchUrls(eid=wit, scheme=kering.Schemes.https)
if not urls:
rep.status = falcon.HTTP_404
rep.text = f"unable to query witness {wit}, no http endpoint"
return

url = urls[kering.Schemes.http] if kering.Schemes.http in urls else urls[kering.Schemes.https]
up = urlparse(url)
oobis.append(f"{up.scheme}://{up.hostname}:{up.port}/oobi/{hab.pre}/witness/{wit}")
url = urls[kering.Schemes.https] if kering.Schemes.https in urls else urls[kering.Schemes.http]
oobis.append(f"{url.rstrip("/")}/oobi/{hab.pre}/witness/{wit}")
res["oobis"] = oobis
elif role in (kering.Roles.controller,): # Fetch any controller URL OOBIs
oobis = []
Expand All @@ -134,8 +134,7 @@ def on_get_alias(self, req, rep, alias=None):
rep.text = f"unable to query controller {hab.pre}, no http endpoint"
return
url = urls[kering.Schemes.http] if kering.Schemes.http in urls else urls[kering.Schemes.https]
up = urlparse(url)
oobis.append(f"{up.scheme}://{up.hostname}:{up.port}/oobi/{hab.pre}/controller")
oobis.append(f"{url.rstrip("/")}/oobi/{hab.pre}/controller")
res["oobis"] = oobis
else:
rep.status = falcon.HTTP_404
Expand Down
3 changes: 1 addition & 2 deletions src/keri/app/querying.py
Original file line number Diff line number Diff line change
Expand Up @@ -140,8 +140,7 @@ def recur(self, tyme, deeds=None):
if self.pre not in self.hab.kevers:
return False

kever = self.hab.kevers[self.pre]
if self.hby.db.fetchAllSealingEventByEventSeal(self.pre, seal=self.anchor):
if self.hby.db.fetchLastSealingEventByEventSeal(self.pre, seal=self.anchor):
self.remove([self.witq])
return True

Expand Down
18 changes: 9 additions & 9 deletions src/keri/core/eventing.py
Original file line number Diff line number Diff line change
Expand Up @@ -3020,22 +3020,22 @@ def fetchDelegatingEvent(self, delpre, serder, *, original=True, eager=False):
dserder = serdering.SerderKERI(raw=bytes(raw))
return dserder

elif eager: #missing aes but try to find seal by walking delegator's KEL
elif eager: # missing aes but try to find seal by walking delegator's KEL
seal = SealEvent(i=serder.pre, s=serder.snh, d=serder.said)._asdict
if original: # search all events in delegator's kel not just last
if not (dserder:=self.db.fetchAllSealingEventByEventSeal(pre=delpre,
seal=seal)):
if not (dserder := self.db.fetchLastSealingEventByEventSeal(pre=delpre,
seal=seal)):
# database broken this should never happen so do not validate
# since original must have been validated so it must have
# all its delegation chain.
raise ValidationError(f"Missing delegation source seal for {serder.ked}")
else: # only search last events in delegator's kel
if not (dserder:=self.db.fetchLastSealingEventByEventSeal(pre=delpre,
seal=seal)):
else: # only search last events in delegator's kel
if not (dserder := self.db.fetchLastSealingEventByEventSeal(pre=delpre,
seal=seal)):
# superseding delegation may not have happened yet so escrow
# ToDo XXXX need to cue up to get latest events in
# delegator's kel.
#raise ValidationError(f"Missing delegation source seal for {serder.ked}")
# raise ValidationError(f"Missing delegation source seal for {serder.ked}")
return None

# Only repair .aess when found delegation is for delegated event that
Expand Down Expand Up @@ -3788,7 +3788,7 @@ def processEvent(self, serder, sigers, *, wigers=None,

else: # not inception so can't verify sigs etc, add to out-of-order escrow
self.escrowOOEvent(serder=serder, sigers=sigers,
seqner=delseqner, saider=delsaider, wigers=wigers)
seqner=delseqner, saider=delsaider, wigers=wigers, local=local)
raise OutOfOrderError("Out-of-order event={}.".format(ked))

else: # already accepted inception event for pre so already first seen
Expand Down Expand Up @@ -3829,7 +3829,7 @@ def processEvent(self, serder, sigers, *, wigers=None,
if sn > sno: # sn later than sno so out of order escrow
# escrow out-of-order event
self.escrowOOEvent(serder=serder, sigers=sigers,
seqner=delseqner, saider=delsaider, wigers=wigers)
seqner=delseqner, saider=delsaider, wigers=wigers, local=local)
raise OutOfOrderError("Out-of-order event={}.".format(ked))

elif ((sn == sno) or # inorder event (ixn, rot, drt) or
Expand Down
1 change: 0 additions & 1 deletion src/keri/db/basing.py
Original file line number Diff line number Diff line change
Expand Up @@ -1726,7 +1726,6 @@ def fetchAllSealingEventByEventSeal(self, pre, seal, sn=0):
# use alias here until can change everywhere for backwards compatibility
findAnchoringSealEvent = fetchAllSealingEventByEventSeal # alias


def fetchLastSealingEventByEventSeal(self, pre, seal, sn=0):
"""
Search through a KEL for the last event at any sn but that contains a
Expand Down
2 changes: 1 addition & 1 deletion src/keri/end/ending.py
Original file line number Diff line number Diff line change
Expand Up @@ -275,7 +275,7 @@ def siginput(name, method, path, headers, fields, hab=None, signers=None, expire
expires (str): iso8601 formated date string indicating exiration of header signature
signers (list): Optional signer objects used to sign the values
hab (Hab): Optional Hab used to sign the values. One of signers or Hab is required
fields (str): Fields in request to sign. Includes special fields as well as Header fields
fields (list): Fields in request to sign. Includes special fields as well as Header fields
headers (dict): HTTP request headers
path (str): HTTP request path
method (str): HTTP request method (POST, GET, PUT, etc)
Expand Down
Loading