Rust implementation of DIDComm v2 spec
``rust
// Message construction
let m = Message::new()
// setting
fromheader (sender) - Optional
.from("did:xyz:ulapcuhsatnpuhza930hpu34n_")
// setting
toheader (recepients) - Optional
.to(&["did::xyz:34r3cu403hnth03r49g03", "did:xyz:30489jnutnjqhiu0uh540u8hunoe"])
// populating body with some data -
Vec
// Serialize message into JWM json (SENDER action)
let ready_to_send = m.as_raw_json().unwrap();
//... transport is happening here ...
// On receival deserialize from json into Message (RECEIVER action)
// Error handling recommended here
let received = Message::receive(&ready_to_send, None).unwrap();
```
``rust
// decide which [Algorithm](crypto::encryptor::CryptoAlgorithm) is used (based on key)
let alg = CryptoAlgorithm::XC20P;
// key as bytes
let ek = [130, 110, 93, 113, 105, 127, 4, 210, 65, 234, 112, 90, 150, 120, 189, 252, 212, 165, 30, 209, 194, 213, 81, 38, 250, 187, 216, 14, 246, 250, 166, 92]
// creating message
let mut message = Message::new();
// packing in some payload (can be anything really)
message.body = br#"{'key':'value','key2':'value2'}"#;
// set JOSE header for XC20P algorithm
message.as_jwe(alg);
// add some custom app/protocol related headers to didcomm header portion
// these are not included into JOSE header
message = message // shadowing here is required to provide option of chainig calls
.add_header_field("my_custom_key".into(), "my_custom_value".into())
.add_header_field("another_key".into(), "another_value".into());
// set
kidproperty
message.jwm_header.kid =
Some(String::from(r#"Ef1sFuyOozYm3CEY4iCdwqxiSyXZ5Br-eUDdQXk6jaQ"#));
// encrypt and serialize message with JOSE header included
let ready_to_send = message.seal(ek.as_bytes())?;
// alternatively use compact JWE format
let ready_to_send = message.seal_compact(ek.as_bytes())?;
// use transport of choice to send
readytosend` data to the receiver!
//... transport is happening here ...
```
Message
is signed but not encrypted..sign(...)
and Message::verify(...)
required.```rust // Message construction an JWS wrapping let message = Message::new() // creating message .from("did:xyz:ulapcuhsatnpuhza930hpu34n") // setting from .to(&["did::xyz:34r3cu403hnth03r49g03", "did:xyz:30489jnutnjqhiu0uh540u8hunoe"]) // setting to .body(sampledids::TESTDIDSIGN1.asbytes()) // packing in some payload .asjws(&SignatureAlgorithm::EdDsa) .sign(SignatureAlgorithm::EdDsa.signer(), &signkeypair.to_bytes()).unwrap();
//... transport is happening here ...
// Receiving JWS
let received = Message::verify(&message.unwrap().as_bytes(), &sign_keypair.public.to_bytes());
```
.routed_by()
method call using key for the recepient..seal()
method call - this can be done multiple times - once for each mediator in chain but should be strictly sequentual to match mediators sequence in the chain..seal()
MUST be preceeded by .as_jwe(CryptoAlgorithm)
as mediators may use different algorithms and key types than destination and this is not automatically predicted or populated.``rust
// Message construction
let message = Message::new()
// setting from
.from("did:xyz:ulapcuhsatnpuhza930hpu34n_")
// setting to
.to(&["did:xyz:34r3cu403hnth03r49g03", "did:xyz:30489jnutnjqhiu0uh540u8hunoe"])
// packing in some payload
.body(some_payload.as_bytes())
// set JOSE header for XC20P algorithm
.as_jwe(CryptoAlgorithm::XC20P)
// custom header
.add_header_field("my_custom_key".into(), "my_custom_value".into())
// another coustom header
.add_header_field("another_key".into(), "another_value".into())
// set kid header
.kid(String::from(r#"Ef1sFuyOozYm3CEY4iCdwqxiSyXZ5Br-eUDdQXk6jaQ"#))
// here we use destination key to bob and
toheader of mediator -
//**THISH MUST BE LAST IN THE CHAIN** - after this call you'll get new instance of envelope
Messagedestined to the mediator.
//
ektobob` - destination targeted encryption key
.routedby(ektobob.asbytes(), vec!("did:mediator:suetcpl23pt23rp2teu995t98u"));
// Message envelope to mediator
let ready_to_send = message
.unwrap() // **ERROR HANDLE** here is recommended
.as_jwe(CryptoAlgorithm::XC20P) // here this method call is crucial as mediator and end receiver may use different algorithms.
// `ek_to_mediator` - mediator targeted encryption key
.seal(ek_to_mediator.as_bytes()); // this would've failed without previous method call.
//... transport to mediator is happening here ...
// Received by mediator
// `rk_mediator` - key to decrypt mediated message
let received_mediated = Message::receive(&ready_to_send.unwrap(), Some(rk_mediator.as_bytes()));
//... transport to destination is happening here ...
// Received by Bob
// `rk_bob` - key to decrypt final message
let received_bob = Message::receive(&String::from_utf8_lossy(&received_mediated.unwrap().body), Some(rk_bob.as_bytes()));
```
```rust // Message construction let message = Message::new() // creating message .from("did:xyz:ulapcuhsatnpuhza930hpu34n") // setting from .to(&["did::xyz:34r3cu403hnth03r49g03", "did:xyz:30489jnutnjqhiu0uh540u8hunoe"]) // setting to .body(sampledids::TESTDIDSIGN1.asbytes()) // packing in some payload .asjwe(CryptoAlgorithm::XC20P) // set JOSE header for XC20P algorithm .addheaderfield("mycustomkey".into(), "mycustomvalue".into()) // custom header .addheaderfield("anotherkey".into(), "another_value".into()) // another coustom header .kid(String::from(r#"Ef1sFuyOozYm3CEY4iCdwqxiSyXZ5Br-eUDdQXk6jaQ"#)); // set kid header
// Send as signed and encrypted JWS wrapped into JWE
let ready_to_send = message.seal_signed(
encryption_key.as_bytes(),
&sign_keypair.to_bytes(),
SignatureAlgorithm::EdDsa)
.unwrap();
//... transport to destination is happening here ...
//Receive - same method to receive for JWE or JWS wrapped into JWE but with pub verifying key
let received = Message::receive(
&ready_to_send,
Some(decryption_key.as_bytes()),
Some(&pub_sign_verify_key.to_bytes())); // and now we parse received
```
In order to use your own implementation[s] of message crypto and/or signature algorythms implement these trait[s]:
Dont use default
feature - might change in future.
When implemented - use them instead of CrptoAlgorithm
and SignatureAlgorithm
from examples above.
In most cases apllication implementation would prefer to have strongly typed body of the message instead of raw Vec<u8>
.
For this scenario Shape
trait should be implemented for target type.
struct DesiredShape { numfield: usize, stringfield: String, } ```
Next, implement Shape
trait for it
rust
impl Shape for DesiredShape {
type Err = Error;
fn get_body(m: &Message) -> Result<DesiredShape, Error> {
serde_json::from_slice(&m.body)
.map_err(|e| Error::SerdeError(e))
}
}
Now we can call shape()
on our Message
and shape in in.
rust
let received_typed_body = DesiredShape::shape(&m).unwrap(); // Where m = Message
This is a sample implementation of the DIDComm V2 spec. The DIDComm V2 spec is still actively being developed by the DIDComm WG in the DIF and therefore subject to change.