Crates.io | sol-did |
lib.rs | sol-did |
version | 3.3.0 |
source | src |
created_at | 2021-05-01 06:23:33.591962 |
updated_at | 2023-01-05 04:48:49.290375 |
description | Martin Riedel |
homepage | https://www.identity.com/ |
repository | https://github.com/identity-com/sol-did |
max_upload_size | |
id | 391804 |
size | 72,737 |
did:sol
ProgramThe anchor-based program of did:sol
on Solana.
Any Solana public key can be a DID. This means that if you have a public key abc
, then that key
corresponds to the decentralized identifier did:sol:abc
.
This DID is called a generative
DID, because it is generated from a public key, and has no other information associated with it.
Generative DIDs have one authority, which is the public key itself (abc
in this case).
In order to add more authorities, or any other information to the DID, it must be initialised on chain,
using the initialize
instruction.
Once a DID is initialized, other keys can be added to it using the add_verification_method
instruction.
The information for a DID is stored on a DID Account
, a PDA that is derived from the DID identifier.
In order to derive the PDA for any DID, the following function is used:
use sol_did::integrations::derive_did_account;
let (did_account, bump) = derive_did_account(key.to_bytes())
Where key
is the identifier of the DID (abc
in the above case)
In order to reduce the amount of calculations that are needed to derive the DID account,
you can pass the bump
value as a parameter:
use sol_did::integrations::derive_did_account_with_bump;
let did_account = derive_did_account_with_bump(key.to_bytes(), bump)?;
Note, in this case, the function returns a Result, in case the bump value is incorrect.
In order to use DIDs in your program, add the DID account to your instruction accounts list.
The DID account is the that stores the DID information. Note: this can be generative
(see above).
To check if a key is an authority of a DID, use the is_authority
instruction.
use sol_did::integrations::is_authority;
let signer_owns_did = is_authority(
&did_account,
None,
&[],
&signer.to_bytes(),
None,
None
);
This function works in the generative and non-generative case. In the generative case, the did_account must be owned by the system program.
One DID can be a controller
of another DID.
If a key a
is an authority on did:sol:abc
, and did:sol:abc
is a controller of did:sol:def
then the following is_authority
relationship is true:
use sol_did::integrations::is_authority;
let signer_owns_did = is_authority(
&abc_account,
None,
&[(def_account_info, def)],
&abc.to_bytes(),
None,
None
);
initialize
Arguments:
u32
Accounts:
isMut
isSigner
, isMut
isSigner
, isMut
resize
Arguments:
u32
Option<Secp256k1RawSignature>
Accounts:
isMut
isSigner
isSigner
, isMut
close
Arguments:
Option<Secp256k1RawSignature>
Accounts:
isMut
isSigner
isMut
add_verification_method
Arguments:
VerificationMethod
Option<Secp256k1RawSignature>
Accounts:
isMut
isSigner
remove_verification_method
Arguments:
string
Option<Secp256k1RawSignature>
Accounts:
isMut
isSigner
add_service
Arguments:
Service
bool
Option<Secp256k1RawSignature>
Accounts:
isMut
isSigner
remove_service
Arguments:
string
Option<Secp256k1RawSignature>
Accounts:
isMut
isSigner
set_vm_flags
Arguments:
UpdateFlagsVerificationMethod
Option<Secp256k1RawSignature>
Accounts:
isMut
isSigner
set_controllers
Arguments:
SetControllersArg
Option<Secp256k1RawSignature>
Accounts:
isMut
isSigner
update
Arguments:
UpdateArg
Option<Secp256k1RawSignature>
Accounts:
isMut
isSigner
migrate
Arguments:
Accounts:
isMut
isSigner
, isMut
did:sol
program on APR