-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix test delegation approval #248
Conversation
…pproval. Also switched the agent parser to local=True
…Kevery.processEscrowDelegables() during escrow processing. Signed-off-by: pfeairheller <pfeairheller@gmail.com>
Signed-off-by: 2byrds <2byrds@gmail.com>
Signed-off-by: 2byrds <2byrds@gmail.com>
…is processed Signed-off-by: 2byrds <2byrds@gmail.com>
Signed-off-by: 2byrds <2byrds@gmail.com>
Signed-off-by: 2byrds <2byrds@gmail.com>
Signed-off-by: 2byrds <2byrds@gmail.com>
Per the discussion on #247 I'm going to adjust the endpoint for the approval on this PR. |
Signed-off-by: 2byrds <2byrds@gmail.com>
Updated per @lenkan suggestion to use a separate endpoint and a PUT instead of POST |
pointing to keripy branch for testing purposes. will change the version on a new tag.
Signed-off-by: 2byrds <2byrds@gmail.com>
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #248 +/- ##
==========================================
- Coverage 92.82% 92.71% -0.12%
==========================================
Files 37 36 -1
Lines 6982 7093 +111
==========================================
+ Hits 6481 6576 +95
- Misses 501 517 +16 ☔ View full report in Codecov by Sentry. |
Cross posting my comment on #247 for visibility
I think from the dev meeting today it is clear that the desired approach is to not have to do step 4 as a separate API call, but rather as a part of the call that posts the interaction event. |
I agree, let's hear from @pfeairheller and I'll adjust the PR accordingly |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A few concerns here...
First, the history on this PR seems odd as it is bringing in some of my commits from 9 days ago.
Second, I don't think REST likes a PUT on a plural endpoint, PUTs require a resource afaik.
Third, I'm not sure why there is the waterfall of excepts at the bottom of the on_put, none of those exceptions can happen in that try block.
Fourth, we have a "delegating.py" file where this code should belong and the endpoint should be "delegation" specific, not "approvals"
Finally (and most importantly) I don't think this is the right approach. If you look at credentialing.py, there are endpoints that do credential specific things that ALSO require an anchoring event. That is the pattern that should be followed for this. A delegation endpoint that accepts either an IXN or ROT that is processed by the IdentifierResource, then a long running operation is returned. A new cue can be submitted to a Doer that then checks the delegables escrow, creates the anchor seal attachment and parses the event and when it is actually committed then declares the operation "done". So you'll need a new long running operation type with code in the Monitor to check for this to be "done" by looking for the successful completion of the delegated event.
My suggestion is to close this PR and open a new one that takes another approach.
Closing now that review comments addressed in new PR #250 |
Delegation Approval enpoint added.
The formatting for test_aiding was updated but the only significant change is the test_identifier_delegation_end test.