Rust implementation of DIDComm v2 spec
``rust
// Message construction
let m = Message::new()
// setting
fromheader (sender) - Optional
.from("did:xyz:ulapcuhsatnpuhza930hpu34n_")
// setting
toheader (recipients) - Optional
.to(&[
"did::xyz:34r3cu403hnth03r49g03",
"did:xyz:30489jnutnjqhiu0uh540u8hunoe",
])
// populating body with some data -
Vec
// Serialize message into JWM json (SENDER action) let readytosend = m.clone().asrawjson().unwrap();
// ... transport is happening here ...
// On receival deserialize from json into Message (RECEIVER action) // Error handling recommended here
let received = Message::receive(&readytosend, None, None, None); ```
```rust // sender key as bytes let ek = [130, 110, 93, 113, 105, 127, 4, 210, 65, 234, 112, 90, 150, 120, 189, 252, 212, 165, 30, 209, 194, 213, 81, 38, 250, 187, 216, 14, 246, 250, 166, 92];
// Message construction
let message = Message::new()
.from("did:key:z6MkiTBz1ymuepAQ4HEHYSF1H8quG5GLVVQR3djdX3mDooWp")
.to(&[
"did:key:z6MkiTBz1ymuepAQ4HEHYSF1H8quG5GLVVQR3djdX3mDooWp",
"did:key:z6MkjchhfUsD6mmvni8mCdXHw216Xrm9bQe2mBH1P5RDjVJG",
])
// packing in some payload (can be anything really)
.body(TESTDID)
// decide which Algorithm is used (based on key)
.asjwe(
&CryptoAlgorithm::XC20P,
Some(&bobspublic),
)
// add some custom app/protocol related headers to didcomm header portion
// these are not included into JOSE header
.addheaderfield("mycustomkey".into(), "mycustomvalue".into())
.addheaderfield("anotherkey".into(), "another_value".into())
// set kid
property
.kid(r#"#z6LShs9GGnqk85isEBzzshkuVWrVKsRp24GnDuHk8QWkARMW"#);
// recipient public key is automatically resolved let readytosend = message.seal( &ek, Some(vec![Some(&bobspublic), Some(&carolpublic)]), ).unwrap();
//... transport is happening here ... ```
Message
is signed but not encrypted..sign(...)
and Message::verify(...)
required.```rust // Message construction an JWS wrapping let message = Message::new() // creating message .from("did:xyz:ulapcuhsatnpuhza930hpu34n") // setting from .to(&["did::xyz:34r3cu403hnth03r49g03", "did:xyz:30489jnutnjqhiu0uh540u8hunoe"]) // setting to .body(TESTDID) // packing in some payload .asjws(&SignatureAlgorithm::EdDsa) .sign(SignatureAlgorithm::EdDsa.signer(), &signkeypair.to_bytes()).unwrap();
//... transport is happening here ...
// Receiving JWS let received = Message::verify(&message.asbytes(), &signkeypair.public.to_bytes()); ```
.routed_by()
method call using key for the recipient..seal()
method call - this can be done multiple times - once for each mediator in chain but should be strictly sequential to match mediators sequence in the chain..seal()
MUST be preceded by .as_jwe(CryptoAlgorithm)
as mediators may use different algorithms and key types than destination and this is not automatically predicted or populated.``rust
let mediated = Message::new()
// setting from
.from("did:key:z6MkiTBz1ymuepAQ4HEHYSF1H8quG5GLVVQR3djdX3mDooWp")
// setting to
.to(&["did:key:z6MkjchhfUsD6mmvni8mCdXHw216Xrm9bQe2mBH1P5RDjVJG"])
// packing in some payload
.body(r#"{"foo":"bar"}"#)
// set JOSE header for XC20P algorithm
.as_jwe(&CryptoAlgorithm::XC20P, Some(&bobs_public))
// custom header
.add_header_field("my_custom_key".into(), "my_custom_value".into())
// another custom header
.add_header_field("another_key".into(), "another_value".into())
// set kid header
.kid(&"Ef1sFuyOozYm3CEY4iCdwqxiSyXZ5Br-eUDdQXk6jaQ")
// here we use destination key to bob and
toheader of mediator -
//**THIS MUST BE LAST IN THE CHAIN** - after this call you'll get new instance of envelope
Message` destined to the mediator.
.routedby(
&aliceprivate,
Some(vec![Some(&bobspublic)]),
"did:key:z6MknGc3ocHs3zdPiJbnaaqDi58NGb4pk1Sp9WxWufuXSdxf",
Some(&mediatorspublic),
);
assert!(mediated.is_ok());
//... transport to mediator is happening here ...
// Received by mediator let mediatorreceived = Message::receive( &mediated.unwrap(), Some(&mediatorsprivate), Some(&alicepublic), None, ); assert!(mediatorreceived.is_ok());
// Get inner JWE as string from message
let mediatorreceivedunwrapped = mediatorreceived.unwrap().getbody().unwrap();
let plstring = String::fromutf8lossy(mediatorreceivedunwrapped.asref());
let messagetoforward: Mediated = serdejson::fromstr(&plstring).unwrap();
let attachedjwe = serdejson::fromslice::
//... transport to destination is happening here ...
// Received by Bob let bobreceived = Message::receive( &String::fromutf8lossy(&messagetoforward.payload), Some(&bobsprivate), Some(&alicepublic), None, ); assert!(bobreceived.is_ok()); ```
```rust let KeyPairSet { alicepublic, aliceprivate, bobsprivate, bobspublic, .. } = getkeypairset(); // Message construction let message = Message::new() // creating message .from("did:xyz:ulapcuhsatnpuhza930hpu34n") // setting from .to(&["did::xyz:34r3cu403hnth03r49g03"]) // setting to .body(TESTDID) // packing in some payload .asjwe(&CryptoAlgorithm::XC20P, Some(&bobspublic)) // set JOSE header for XC20P algorithm .addheaderfield("mycustomkey".into(), "mycustomvalue".into()) // custom header .addheaderfield("anotherkey".into(), "anothervalue".into()) // another custom header .kid(r#"Ef1sFuyOozYm3CEY4iCdwqxiSyXZ5Br-eUDdQXk6jaQ"#); // set kid header
// Send as signed and encrypted JWS wrapped into JWE let readytosend = message.sealsigned( &aliceprivate, Some(vec![Some(&bobspublic)]), SignatureAlgorithm::EdDsa, &signkeypair.to_bytes(), ).unwrap();
//... transport to destination is happening here ...
// Receive - same method to receive for JWE or JWS wrapped into JWE but with pub verifying key let received = Message::receive( &readytosend, Some(&bobsprivate), Some(&alicepublic), None, ); // and now we parse received ```
resolve
feature only - requires resolution of public keys for each recipient for shared secret generation.to
field has >1 recipient).```rust // Creating message with multiple recipients. let m = Message::new() .from("did:key:z6MkiTBz1ymuepAQ4HEHYSF1H8quG5GLVVQR3djdX3mDooWp") .to(&[ "did:key:z6MkjchhfUsD6mmvni8mCdXHw216Xrm9bQe2mBH1P5RDjVJG", "did:key:z6MknGc3ocHs3zdPiJbnaaqDi58NGb4pk1Sp9WxWufuXSdxf", ]) .as_jwe(&CryptoAlgorithm::XC20P, None);
let jwe = m.seal(&aliceprivate, None); // Packing was ok? assert!(jwe.isok());
let jwe = jwe.unwrap();
// Each of the recipients receive it in same way as before (direct with single recipient) let receivedfirst = Message::receive(&jwe, Some(&bobsprivate), None, None); let receivedsecond = Message::receive(&jwe, Some(&carolprivate), None, None);
// All good without any extra inputs assert!(receivedfirst.isok()); assert!(receivedsecond.isok()); ```
attachments
Attachment
```rust use didcomm_rs::{Message, AttachmentBuilder, AttachmentDataBuilder};
let payload = b"some usefull data"; let mut m = Message:new(); m.appendattachment( AttachmentBuilder::new(true) .withid("best attachment") .withdata( AttachmentDataBuilder::new() .withraw_payload(payload) ) ); ```
or
```rust use didcomm_rs::{Message, AttachmentBuilder, AttachmentDataBuilder};
let attachments: Vec
let mut m = Message:new();
for attachment in attachments { m.append_attachment(attachment); } ```
Attachment
's``rust
//
mis
receive()'d instance of a
Message`
let somethingimlookingfor = m.getattachments().filter(|single| single.id == "id I'm looking for"); assert!(somethingimlookingfor.next().issome());
for found in somethingimlooking_for { // process attachments }
```
By default all new messages are created with random UUID as thid
header value and with empty pthid
value.
To reply to a message in thread with both thid
and pthid
copied use reply_to
method:
```rust
let m = Message::new() .reply_to(&received) // - other methods to form a message ; ```
To set parent thread id (or pthid
header), use with_parent
method:
```rust
let m = Message::new() .with_parent(&receievd) // - other methods to form a message ; ```
In order to satisfy any other header values universal method is present: Message::add_header_field'
This method is backed up by a
HashMap` of
```rust
let m = Message::new() .addheaderfield("key", "value") .addheaderfield("~decorator", "value") // - other methods to form a message ; ```
To find if specific application level header is present and get it's value get_application_params
method should be used.
```rust
let m: Message; // proprely instantiated received message
if let Some((mykey, myvalue)) = m.getapplicationparams().filter(|(key, )| key == "mykey").first(); ```
In order to use your own implementation(s) of message crypto and/or signature algorithms implement these trait(s):
Don't use default
feature - might change in future.
When implemented - use them instead of CryptoAlgorithm
and SignatureAlgorithm
from examples above.
In most cases application implementation would prefer to have strongly typed body of the message instead of raw Vec<u8>
.
For this scenario Shape
trait should be implemented for target type.
```rust
struct DesiredShape { numfield: usize, stringfield: String, } ```
Shape
trait for itrust
impl Shape for DesiredShape {
type Err = Error;
fn shape(m: &Message) -> Result<DesiredShape, Error> {
serde_json::from_str(&m.get_body().unwrap())
.map_err(|e| Error::SerdeError(e))
}
}
shape()
on our Message
and shape in in.rust
let body = r#"{"num_field":123,"string_field":"foobar"}"#.to_string();
let message = Message::new() // creating message
.from("did:xyz:ulapcuhsatnpuhza930hpu34n_") // setting from
.to(&["did::xyz:34r3cu403hnth03r49g03"]) // setting to
.body(&body); // packing in some payload
let received_typed_body = DesiredShape::shape(&message).unwrap(); // Where m = Message
This is a sample implementation of the DIDComm V2 spec. The DIDComm V2 spec is still actively being developed by the DIDComm WG in the DIF and therefore subject to change.