Skip to content

Commit d4323b3

Browse files
authored
Merge pull request #224 from youwenbusi/develop
fix bug of developEvidence and registerPolicy
2 parents eecf62b + 7ffa2e5 commit d4323b3

File tree

7 files changed

+62
-94
lines changed

7 files changed

+62
-94
lines changed

VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.3.1-rc1
1+
1.3.1-rc2-SNAPSHOT

build.gradle

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@ sourceCompatibility = 1.8
3636
targetCompatibility = 1.8
3737

3838
[compileJava, compileTestJava, javadoc]*.options*.encoding = 'UTF-8'
39+
3940
// In this section you declare where to find the dependencies of your project
4041
repositories {
4142
if (gradle.startParameter.isOffline()) {
@@ -186,7 +187,7 @@ task javadocJar(type: Jar, dependsOn: javadoc) {
186187
artifacts {
187188
archives jar
188189
archives sourcesJar
189-
archives javadocJar
190+
//archives javadocJar
190191
}
191192

192193

common/script/tpl/fisco.properties.tpl

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ group.id=${MASTER_GROUP_ID}
5353
# fisco bcos node cert related config #
5454
# #
5555
#######################################################################################################
56-
# Fisco-Bcos sdk SSL encrypt type, false:ECDSA, true:SaM2
56+
# Fisco-Bcos sdk SSL encrypt type, 0:ECDSA, 1:SaM2
5757
sdk.sm-crypto=${SDK_SM_CRYPTO}
5858
# fisco-bcos sdk cert path contains[ca.crt,sdk.crt,sdk.key]
5959
# if sdk.sm-crypto is true, contains [gm] directory, and gm dir contains [gmca.crt,gmsdk.crt,gmsdk.key,gmensdk.crt,gmensdk.key]

common/script/tpl/weidentity.properties.tpl

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,15 @@
66
# The organization ID for AMOP communication.
77
blockchain.orgid=${ORG_ID}
88

9+
# The Chain Id
10+
chain.id=${CHAIN_ID}
11+
912
# AMOP Config
1013
# Timeout for amop request, default: 5000ms
1114
amop.request.timeout=5000
12-
# The Communication ID for AMOP
15+
1316
amop.id=${AMOP_ID}
17+
amop.privateKey="xeewrwervvwv"
1418

1519
# Blockchain node info.
1620
nodes=${BLOCKCHIAN_NODE_INFO}
@@ -43,7 +47,7 @@ datasource1.jdbc.timeBetweenEvictionRunsMillis=600000
4347
datasource1.jdbc.numTestsPerEvictionRun=5
4448
datasource1.jdbc.minEvictableIdleTimeMillis=1800000
4549

46-
# Redisson config
50+
# Redis config
4751
# If you want to configure redis in cluster mode, enter multiple node addresses separated by commas.
4852
redis.url=${REDIS_ADDRESS}
4953
redis.password=${REDIS_PASSWORD}
@@ -66,9 +70,9 @@ redis_cluster.master_connection_pool_size=64
6670
# the second segment is the name of the table, and if not, the default is the first data source and the default table `sdk_all_data`,
6771
# Multiple domains can be configured at the same time.
6872
# example:
69-
# domain.credential=datasource1:credential_data
73+
# domain.credential=datasource1:credential_info
7074
# domain.credential.timeout=86400000
71-
# domain.weidDocument=datasource1:weid_document_data
75+
# domain.weIdDocument=datasource1:weid_document_info
7276
# domain.credential.timeout=86400000
7377

7478
# the default domain
@@ -79,14 +83,14 @@ domain.defaultInfo.timeout=31556908799941
7983
domain.encryptKey=datasource1:encrypt_key_info
8084
domain.encryptKey.timeout=31556908799941
8185

82-
#
86+
# zkp credential template secret
8387
domain.templateSecret=***REMOVED***
8488
domain.templateSecret.timeout=31556908799941
8589

86-
#
90+
# zkp credential master secret
8791
domain.masterKey=***REMOVED***
8892

89-
#
93+
# zkp credential signature
9094
domain.credentialSignature=datasource1:credential_signature
9195

9296
# weid auth info
@@ -119,7 +123,7 @@ zkp.cpt.array.length=5
119123
#######################################################################################################
120124
# Endpoint Service Integration-side parameters
121125
# Listener port required to be opened for RPC Server, default: 6010
122-
rpc.listener.port=6010
126+
endpoint.listener.port=6010
123127

124128

125129
#######################################################################################################
@@ -132,4 +136,4 @@ wesign.accessTokenUrl=
132136
wesign.signTicketUrl=
133137
wesign.timestampUrl=
134138
wesign.appId=
135-
wesign.secret=
139+
wesign.secret=

gradle.properties

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
org.gradle.jvmargs='-Dfile.encoding=UTF-8'
2-
weidSdkVersion=1.8.6-rc1
2+
weidSdkVersion=1.8.6-rc.3-SNAPSHOT
33
repoType=zn
44
jdkTlsNamedGroups=secp256r1,secp256k1
55
signing.keyId=

src/main/java/com/webank/weid/service/ContractService.java

Lines changed: 25 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -3,50 +3,33 @@
33
package com.webank.weid.service;
44

55
import com.webank.weid.config.FiscoConfig;
6-
import com.webank.weid.constant.BuildToolsConstant;
7-
import com.webank.weid.constant.CnsType;
8-
import com.webank.weid.constant.DataFrom;
9-
import com.webank.weid.constant.ErrorCode;
10-
import com.webank.weid.constant.FileOperator;
11-
import com.webank.weid.constant.WeIdConstant;
12-
import com.webank.weid.contract.deploy.DeployEvidence;
6+
import com.webank.weid.constant.*;
137
import com.webank.weid.contract.deploy.v2.DeployContractV2;
8+
import com.webank.weid.contract.deploy.v2.DeployEvidenceV2;
149
import com.webank.weid.contract.deploy.v3.DeployContractV3;
10+
import com.webank.weid.contract.deploy.v3.DeployEvidenceV3;
1511
import com.webank.weid.contract.v2.WeIdContract;
1612
import com.webank.weid.dto.CnsInfo;
1713
import com.webank.weid.dto.DeployInfo;
1814
import com.webank.weid.dto.ShareInfo;
19-
import com.webank.weid.protocol.base.AuthorityIssuer;
20-
import com.webank.weid.protocol.base.CptBaseInfo;
21-
import com.webank.weid.protocol.base.HashContract;
22-
import com.webank.weid.protocol.base.WeIdAuthentication;
23-
import com.webank.weid.protocol.base.WeIdPrivateKey;
15+
import com.webank.weid.protocol.base.*;
2416
import com.webank.weid.protocol.request.CptStringArgs;
2517
import com.webank.weid.protocol.request.CreateWeIdArgs;
2618
import com.webank.weid.protocol.response.ResponseData;
2719
import com.webank.weid.service.impl.CptServiceImpl;
2820
import com.webank.weid.service.impl.WeIdServiceImpl;
2921
import com.webank.weid.service.impl.engine.DataBucketServiceEngine;
30-
import com.webank.weid.util.ClassUtils;
31-
import com.webank.weid.util.ConfigUtils;
32-
import com.webank.weid.util.DataToolUtils;
33-
import com.webank.weid.util.FileUtils;
34-
import com.webank.weid.util.WeIdSdkUtils;
35-
import com.webank.weid.util.WeIdUtils;
36-
import java.io.File;
37-
import java.math.BigInteger;
38-
import java.util.ArrayList;
39-
import java.util.Collections;
40-
import java.util.HashMap;
41-
import java.util.LinkedList;
42-
import java.util.List;
43-
import java.util.Map;
22+
import com.webank.weid.util.*;
4423
import lombok.extern.slf4j.Slf4j;
4524
import org.apache.commons.collections4.CollectionUtils;
4625
import org.apache.commons.lang.StringEscapeUtils;
4726
import org.apache.commons.lang3.StringUtils;
4827
import org.springframework.stereotype.Service;
4928

29+
import java.io.File;
30+
import java.math.BigInteger;
31+
import java.util.*;
32+
5033
import static com.webank.weid.constant.ChainVersion.FISCO_V2;
5134

5235
@Service
@@ -462,11 +445,22 @@ public String deployEvidence(FiscoConfig fiscoConfig, String groupId, DataFrom f
462445
try {
463446
// 获取私钥
464447
WeIdPrivateKey currentPrivateKey = WeIdSdkUtils.getCurrentPrivateKey();
465-
String hash = DeployEvidence.deployContract(
466-
currentPrivateKey.getPrivateKey(),
467-
groupId,
468-
false
469-
);
448+
String hash = null;
449+
if (FISCO_V2.getVersion() == Integer.parseInt(fiscoConfig.getVersion())) {
450+
hash = DeployEvidenceV2.deployContract(
451+
fiscoConfig,
452+
currentPrivateKey.getPrivateKey(),
453+
groupId,
454+
false
455+
);
456+
} else {
457+
hash = DeployEvidenceV3.deployContract(
458+
fiscoConfig,
459+
currentPrivateKey.getPrivateKey(),
460+
groupId,
461+
false
462+
);
463+
}
470464
if (StringUtils.isBlank(hash)) {
471465
log.error("[deployEvidence] deploy the evidence fail, please check the log.");
472466
return StringUtils.EMPTY;

src/main/java/com/webank/weid/service/WeIdSdkService.java

Lines changed: 19 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -2,29 +2,9 @@
22

33
import com.fasterxml.jackson.databind.JsonNode;
44
import com.sun.codemodel.JCodeModel;
5-
import com.webank.weid.constant.BuildToolsConstant;
6-
import com.webank.weid.constant.CnsType;
7-
import com.webank.weid.constant.DataFrom;
8-
import com.webank.weid.constant.ErrorCode;
9-
import com.webank.weid.constant.FileOperator;
10-
import com.webank.weid.dto.CptFile;
11-
import com.webank.weid.dto.CptInfo;
12-
import com.webank.weid.dto.DataPanel;
13-
import com.webank.weid.dto.Issuer;
14-
import com.webank.weid.dto.PageDto;
15-
import com.webank.weid.dto.PojoInfo;
16-
import com.webank.weid.dto.PolicyInfo;
17-
import com.webank.weid.dto.WeIdInfo;
18-
import com.webank.weid.protocol.base.AuthorityIssuer;
19-
import com.webank.weid.protocol.base.ClaimPolicy;
20-
import com.webank.weid.protocol.base.Cpt;
21-
import com.webank.weid.protocol.base.CptBaseInfo;
22-
import com.webank.weid.protocol.base.HashContract;
23-
import com.webank.weid.protocol.base.IssuerType;
24-
import com.webank.weid.protocol.base.PresentationPolicyE;
25-
import com.webank.weid.protocol.base.WeIdAuthentication;
26-
import com.webank.weid.protocol.base.WeIdPrivateKey;
27-
import com.webank.weid.protocol.base.WeIdPublicKey;
5+
import com.webank.weid.constant.*;
6+
import com.webank.weid.dto.*;
7+
import com.webank.weid.protocol.base.*;
288
import com.webank.weid.protocol.request.CptStringArgs;
299
import com.webank.weid.protocol.request.CreateWeIdArgs;
3010
import com.webank.weid.protocol.request.RegisterAuthorityIssuerArgs;
@@ -40,40 +20,26 @@
4020
import com.webank.weid.service.impl.CptServiceImpl;
4121
import com.webank.weid.service.impl.PolicyServiceImpl;
4222
import com.webank.weid.service.impl.WeIdServiceImpl;
43-
import com.webank.weid.util.ConfigUtils;
44-
import com.webank.weid.util.DataToolUtils;
45-
import com.webank.weid.util.FileUtils;
46-
import com.webank.weid.util.WeIdSdkUtils;
47-
import com.webank.weid.util.WeIdUtils;
48-
import java.io.File;
49-
import java.io.IOException;
50-
import java.math.BigInteger;
51-
import java.net.URL;
52-
import java.nio.charset.StandardCharsets;
53-
import java.util.ArrayList;
54-
import java.util.Collections;
55-
import java.util.HashMap;
56-
import java.util.List;
57-
import java.util.Map;
58-
import java.util.Set;
59-
import java.util.stream.Collectors;
60-
import javax.servlet.http.HttpServletRequest;
23+
import com.webank.weid.util.*;
6124
import lombok.extern.slf4j.Slf4j;
6225
import org.apache.commons.collections4.CollectionUtils;
6326
import org.apache.commons.lang.StringEscapeUtils;
6427
import org.apache.commons.lang3.StringUtils;
65-
import org.fisco.bcos.sdk.client.Client;
66-
import org.jsonschema2pojo.DefaultGenerationConfig;
67-
import org.jsonschema2pojo.GenerationConfig;
68-
import org.jsonschema2pojo.NoopAnnotator;
69-
import org.jsonschema2pojo.SchemaGenerator;
70-
import org.jsonschema2pojo.SchemaMapper;
71-
import org.jsonschema2pojo.SchemaStore;
28+
import org.jsonschema2pojo.*;
7229
import org.jsonschema2pojo.rules.RuleFactory;
7330
import org.springframework.stereotype.Service;
7431
import org.springframework.web.multipart.MultipartFile;
7532
import org.springframework.web.multipart.MultipartHttpServletRequest;
7633

34+
import javax.servlet.http.HttpServletRequest;
35+
import java.io.File;
36+
import java.io.IOException;
37+
import java.math.BigInteger;
38+
import java.net.URL;
39+
import java.nio.charset.StandardCharsets;
40+
import java.util.*;
41+
import java.util.stream.Collectors;
42+
7743
@Service
7844
@Slf4j
7945
public class WeIdSdkService {
@@ -486,8 +452,11 @@ private WeIdAuthentication getCurrentWeIdAuth() {
486452
WeIdPrivateKey weIdPrivateKey = WeIdSdkUtils.getWeIdPrivateKey(hash);
487453
WeIdAuthentication callerAuth = new WeIdAuthentication();
488454
callerAuth.setWeIdPrivateKey(weIdPrivateKey);
489-
callerAuth.setWeId(WeIdUtils.convertPublicKeyToWeId(
490-
DataToolUtils.publicKeyFromPrivate(new BigInteger(weIdPrivateKey.getPrivateKey())).toString()));
455+
String weid = WeIdUtils.convertPublicKeyToWeId(
456+
DataToolUtils.publicKeyFromPrivate(new BigInteger(weIdPrivateKey.getPrivateKey())).toString());
457+
callerAuth.setWeId(weid);
458+
WeIdDocument weIdDocument = getWeIdService().getWeIdDocument(weid).getResult();
459+
callerAuth.setAuthenticationMethodId(weIdDocument.getAuthentication().get(0).getId());
491460
return callerAuth;
492461
}
493462

0 commit comments

Comments
 (0)