Skip to content

Latest commit

 

History

History
312 lines (234 loc) · 23.6 KB

CHANGELOG.md

File metadata and controls

312 lines (234 loc) · 23.6 KB

Changelog

v1.3.1 (2024-06-12)

Full Changelog

Patch

  • Pin and bump bls12_381_plus dependency #1378

Changelog

v1.3.0 (2024-05-28)

Full Changelog

Added

  • Add ZK BBS+-based selectively disclosable credentials (JPT) #1355
  • Add EcDSA verifier #1353

Patch

  • Support for specification-compliant verification method type JsonWebKey2020 #1367

v1.2.0 (2024-03-27)

Full Changelog

Added

  • Allow arbitrary verification methods #1334
  • use latest release of sd-jwt-payload #1333
  • Allow setting additional controllers for IotaDocument #1314
  • Add get_public_key for StrongholdStorage #1311
  • Support multiple IOTA networks in the Resolver #1304

Patch

  • Support %-encoded characters in DID method id #1303

v1.1.1 (2024-02-19)

Full Changelog

Patch

  • Fix compilation error caused by the roaring crate #1306

v1.1.0 (2024-02-07)

Full Changelog

Added

  • Update sd-jwt-payload dependency #1296
  • Add support for StatusList2021 #1273
  • Support Selective Disclosure SD-JWT #1268

Patch

  • Fix RevocationBitmap2022 encoding bug #1292
  • Credentials cannot be unrevoked with StatusList2021 #1284
  • Validate domain-linkage URL making sure they only include an origin #1267

v1.0.0 (2023-11-02)

Full Changelog

Changed

  • Add dedicated stronghold crate #1243
  • Allow custom kid to be set in JWS #1239
  • Add dedicated EdDSA verifier crate #1238
  • Remove vp and vc from JWT claims in JOSE #1233
  • Change verifiable_credential to type Vec<CRED> in Presentation #1231
  • Mark error enums as non-exhaustive #1227
  • Bring JwkDocumentExt names in line with Wasm #1223
  • Add lints for all crates #1222
  • Bump iota-sdk and other dependencies #1208
  • Polish identity_credential #1205
  • Polish identity_resolver and identity_storage #1204
  • Polish identity_iota_core #1203
  • Rename JwtPresentation to Presentation #1200
  • Polish identity_document #1198
  • Polish identity_did & identity_verification #1197
  • Polish identity_core #1196
  • Remove identity-diff remains #1195
  • Remove legacy signing and verification APIs #1194
  • Remove old Presentation type #1190
  • Remove reexported Resolver validation APIs #1183
  • Use JWT credentials for Domain Linkage #1180
  • Remove identity_agent & identity_comm #1168
  • Remove identity-diff crate #1167
  • JwkStorageDocument & JwtCredential validation #1152
  • Adapt StorageError to be more generic #1144
  • Add initial PublicKeyJwk support #1143
  • Split JWS Decoder functionality #1133
  • Refactor MethodType to make it extensible #1112
  • Remove generics in CoreDocument, VerificationMethod, Service, DIDUrl and LinkedDomainService #1110
  • CoreDocument & Service and VerificationMethod are now in the document and verification modules respectively #1104
  • Update to iota-client 2.0.1-rc.4 and iota-client-wasm 0.5.0-alpha.6 #1088
  • Fix clippy lints #1069
  • More identifier checks in CoreDocument #1067
  • Update iota client 2.0.1 rc.3 #1062
  • Use Bech32-encoded state controller and governor addresses #1044
  • Remove identity_agent reexport #1031
  • Rename MixedResolver to Resolver in Wasm #1026
  • Expose iteration over verification relationship fields #1024
  • Add length prefix to DID Document payloads #1010
  • Feature-gate Resolver #1007
  • Rename Stardust types to Iota #1000
  • Change Stardust DID method to IOTA #982
  • Add Wasm Stardust Client #975
  • Generalized Resolver #970
  • Change Storage to handle CoreDID #968
  • Feature-gate iota-client dependency, integrate StardustDID #958
  • Change Storage to store arbitrary blobs #953
  • Add StardustDocumentMetadata, implement StardustDocument methods #951
  • Fix stack overflow in CoreDID PartialEq impl #946
  • Change Service type field to allow sets #944
  • Generalise CredentialValidator, PresentationValidator to support arbitrary DID Documents #935

Added

  • Allow arbitrary JWS header parameters #1245
  • Allow custom JWT claims for presentations #1244
  • Allow custom JWT claims for credentials #1237
  • Use VC Data Model v1.1 JWT encoding instead of VC-JWT #1234
  • Improve Proof #1209
  • Polish identity_jose #1201
  • Add resolve_multiple to Resolver #1189
  • Make JWT presentations generic #1186
  • Support JWT Presentations #1175
  • Polish JWK thumbprint and document extension API #1173
  • Stronghold Storage Implementation #1157
  • Implement KeyIdStorage in Rust #1134
  • Introduce IToCoreDocument and document locks in the bindings #1120
  • Implement JwkStorage #1116
  • Add JSON Object Signing capabilities #1105
  • Add Support for Domain Linkage in Rust #1094
  • Make StateMetadataDocument public #1085
  • Add revocation examples #1076
  • Add v. credentials and presentations examples #1070
  • Expose Controller and Governor Addresses in metadata #1023
  • Add Stardust Client Extension Trait #963
  • Add StardustDID #949
  • State metadata serialization for the stardust DID method #947
  • Stardust DID Method Proof-of-Concept #940
  • Implement the Identity Agent #322

Patch

  • Fix holder claim check in VP #1236
  • Fix issuer claim check in VC #1235
  • Feature-gate Domain Linkage #1184
  • Replace iota-client with iota-sdk #1161
  • Pin form_urlencoded to 1.1.0 #1136
  • Remove legacy crates #1080
  • Recommend unique credentialStatus.id in RevocationBitmap2022 #1039
  • Pin agent dev-dependencies to crates versions #1029
  • Support case insensitive serialization of RentStructure #1012
  • Update stronghold to 0.6.4 #928

v0.6.0 (2022-06-15)

Full Changelog

The main feature of this release is the addition of the RevocationBitmap2022 specification, offering efficient credential revocation on-Tangle. This is the replacement for the MerkleKeyCollection removed in v0.5.0, which offered similar functionality but fundamentally failed to scale beyond a few thousand revocations.

Other changes include encryption support using Elliptic Curve Diffie-Hellman (ECDH) and quality of life improvements for verifiable credential and presentation types in the Wasm bindings.

DID Documents created with v0.5.0 remain compatible with v0.6.0. This will be the last major release prior to changes for the Stardust update.

Changed

  • Rename crates to use underscores #895
  • Change remove_service to return boolean #877
  • Change DIDUrl::join to borrow self #871
  • Add BaseEncoding to replace encode_b58, decode_b58, encode_multibase, decode_multibase #870
  • Add RevocationBitmap2022, bump MSRV to 1.60 #861
  • Add Wasm Credential and Presentation field getters and constructors #815
  • Add Diffie-Hellman key exchange for encryption to Account #809

Added

  • Implement ECDH-ES+A256KW for Storage encryption #867
  • Add Client option for retry publishing behaviour #820
  • Implement Storage test suite #791

Patch

  • Unpin iota-crypto version #834

Removed

  • Remove unused resolution code #862

v0.5.0 (2022-03-31)

Full Changelog

This release introduces multiple breaking changes to the structure of IOTA DID Documents and their Tangle messages, rendering any identity created with a prior version incompatible and unresolvable. A versioning system has been introduced so any new identities should hopefully be forward compatible with any future breaking changes to the message structure.

The main feature of this release is the introduction of WebAssembly (Wasm) bindings for the high-level Account API for Javascript/Typescript in both Node.js and the browser. This includes preliminary Stronghold storage bindings but only for Node.js, as it was determined that compiling Stronghold to Wasm for the browser would not be sufficiently secure. Stronghold offers best-effort secure software storage for cryptographic keys, written in Rust. To use the Stronghold storage package install @iota/identity-stronghold-nodejs and follow the instructions of the package README.

Note that all features related to diff chain updates are now marked as deprecated. Diff chains are a useful optimisation when publishing many updates to a DID Document. However, their design may be incompatible with upcoming changes to the IOTA network and should be considered unstable.

Another major change is the removal of the MerkleKeyCollection verification method type, which provided a compact representation for issuing and revoking Verifiable Credentials with multiple cryptographic keys. The MerkleKeyCollection suffered from disadvantages which limited scalability when managing more than a few thousand keys. While these disadvantages could be mitigated somewhat, the decision was made to replace it with one or more alternatives not affected by its fundamental limitations, upcoming in the next major release.

Changed

  • Add Wasm Proof, rename Signature structs to Proof #776
  • Replace MethodSecret with MethodContent enum #764
  • Change document metadata created, updated to be optional #753
  • Refactor Storage Signature #738
  • Add X25519 key and verification method support #735
  • Refactor KeyLocation #729
  • Move DID Document proof outside metadata #728
  • Combine resolve_method functions #709
  • Add separate identity-iota-core, identity-account-storage crates #693
  • Change IotaDocument::verify_document from a static function to a method #675
  • Make Wasm support dependent on target_arch rather than feature #666
  • Refactor CoreDocument, VerificationMethod, Service to use generic DID #655
  • Remove unused Account milestone option #645
  • Change document controller type to OneOrSet #638
  • Rename MethodQuery to DIDUrlQuery, move OrderedSet, KeyComparable #634
  • Change also_known_as type to OrderedSet #632
  • Move verification functionality from DocumentVerifier to CoreDocument #606
  • Fix dependent diff updates being rejected #605
  • Change Account::state visibility to pub(crate) #604
  • Overhaul CredentialValidator, add PresentationValidator #599
  • Remove JSON string escaping in diff messages #598
  • Replace ClientMap with new Resolver #594
  • Replace ClientMap with Client in Account #582
  • Add signature created, expires, challenge, domain, purpose #548
  • Refactor document metadata #540
  • Replace chrono with time #529
  • Enable access to the low-level API from the Account #522
  • Update to rsa 0.5 in libjose #517
  • Rename DocumentDiff to DiffMessage #511
  • Deterministic ordering of competing messages #506
  • Check for existence & duplication of methods in CoreDocument #504
  • Move dropsave from Account to Stronghold #500
  • Add ExplorerUrl to replace Network explorer methods #496
  • Update ServiceEndpoint to support sets and maps #485
  • Enable deep equality in OrderedSet #481
  • Add message compression and versioning #466
  • Update document signing key constraints and methods #458
  • Refactor the Account: internal state, one identity #453

Added

  • Expose Ed25519, X25519 length constants #772
  • Generify Account::client over Rc, Arc #707
  • Update Stronghold #691
  • Add Duration for Timestamp arithmetic #684
  • Add Client fallback to local PoW option #682
  • Set controller, alsoKnownAs fields from Account #658
  • Implement FromIterator for OneOrMany #602
  • Add account synchronization method #544
  • Filter out DiffMessages updating signing methods #519
  • Add publish with retry method #455

Patch

  • Fix panic when parsing an IotaDID with more than 2 method id segments #758
  • Update iota.rs to include timeout bugfix #712
  • Support verification methods with the same fragment #623
  • Fix diff properties (de)serialization #611
  • Enable local proof-of-work fallback #579
  • Add identity-diff derive feature gate #516
  • Improve client error messages #512
  • Make create_signature and sign async for RemoteEd25519 #491
  • Fix credential validation failing for documents with diff updates #490
  • Upgrade to the Rust 2021 edition #449

Deprecated

  • Deprecate diff chain features #759

Removed

  • Remove AccountStorage #774
  • Remove MerkleKeyCollection #755
  • Remove Storage::set_password #733
  • Remove publicKeyJwk #732
  • Remove DIDLease account feature #664

v0.4.0 (2021-11-01)

Full Changelog

v0.3.0 (2021-05-10)

Full Changelog

This release introduces the high-level Account API for creating and managing IOTA identities.

v0.2.0 (2021-02-18)

Full Changelog

v0.1.0 (2020-11-12)

Full Changelog

* This Changelog was automatically generated by github_changelog_generator