Aries Cloudagent Python recently introduced the ability for non-privileged agents (from here on: author) to request endorsement of transactions that need to be written to the ledger by an agent (from here on: endorser) with ledger write privileges.
A common use case for this functionality is for an organization running an agency of authors (that can be created/destroyed without needing any write interaction with the ledger) and a single instance of an endorser agent that acts as a gateway for all write needs:
While there may be scenarios that require the controller(s) to orchestrate the endorsing protocol on both the author and endorser end, it is much simpler (and therefore more likely to be adopted by users) to allow authors and endorser to be setup to complete the endorsement protocol steps transparently, just by setting up appropriate configuration when starting the agents.
An example of how complex/involved endorsing can become can be seen in this "credential revocation with endorsement" BDD integration test for ACA-Py.
Similarly to other settings in ACA-Py, there should be a few new global settings/startup parameters.
For the endorser protocol:
--auto-endorse-transactions
(defaults to false
): this setting would be used on the endorser agent, and would force every endorsement request to be automatically endorsed, without emitting a webhook and having to manage state on a controller.--endorser-public-did
or --endorser-alias
: these settings would be mutually exclusive, and would be used by the agent to identify which connection to use when requesting endorsement for transactions. While alias
is more human-readable, if the connection with the endorser was established using its public did specifying its public did as startup parameter would allow the agent to NOT be restarted to apply the changes.--endorser-protocol-role
: either endorser
or author
, it would define the role of the agent when requesting endorsement or endorsing transactions .When using the above settings, the REST APIs exposing endorsement functionality should be turned to read-only mode to avoid unintentionally altering the globally defined settings. In case of catastrophic failures, the agent(s) would need to be manually restarted, in which case the startup parameters could be temporarily altered to allow for manual intervention - if necessary.
For revocation:
--explicit-revocation-registry-handling
(defaults to false
): similarly to what described above, handling of revocation should be transparent to admin API consumers unless explicitly requested.Similarly to endorsement, the purpose of this flag is to prevent unintentional modification of globally defined settings, and could be used to turn those endpoints to "write" mode in scenarios where manual intervention is required.
The endorser protocol requires some additional metadata on the connection record used by the endorser and the author:
--endorser-protocol-role
startup parameter and it will be applied to all connections (this makes the reasonable assumption that an agent will always be an author OR an endorser).--endorser-public-did
or --endorser-alias
. Note: since a connection will NOT exist the first time the author agent starts up, the connection lookup should be performed every time a request that requires endorsing is initiated.--auto-endorse-transactions
Unless specified by setting the --explicit-revocation-registry-handling
to true, handling of the revocation registry should be transparent to the admin API consumers. When using an unprivileged author agent, this means that every transaction requiring a ledger write will need to go through an endorser. For the next points the assumption that the changes to the endorser protocol described above have been implemented is being made.
This means that:
publish: true
in the payload, or it will be enforced to call the publish endpoint every time insteadChanges are required in several areas of ACA-Py and the current underlying implementation patterns may be different from case to case.
Rather than focusing on implementation details, the following common sense recommendations should be considered:
Implementation will use the aca-py event bus.
When a transaction is created, it will contain meta-data
about what to do after the transaction is endorsed and completed (i.e. written to the ledger).
For example:
{
"state": "transaction_created",
"messages_attach": [ ... ],
"formats": [ ... ],
"thread_id": "f601f40f-c7e6-4a17-8888-643c1718427a",
"transaction_id": "a721ddc1-0f42-45ac-9899-abea30f587d7",
"meta_data": {
"params": { ... },
"events": [
{
"topic": " ... ",
"payload": ...
}
]
}
}
This meta-data
will:
revocation_registry_size
, specified when creating a cred def, to the revocation registry code).Once the transaction is completed, the TransactionManager
will use the transaction meta-data to emit any events if necessary. The respective managers (SchemaManager
, CredDefManager
, RevocationManager
, etc) must subscribe to the appropriate events on startup, and provide functions to handle each type of event.
For example, for creating a new Schema the flow would look as follows:
The "non-endorser" scenario would be re-factored as follows to use the events: