You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

Projects

Distributed Ledger
Client Tools
Shared Components

Project Health

The contributors to Hyperledger Indy spent this past quarter working on three key initiatives:

  1. Hardening the ledger and adding ledger monitoring to continue preparation for widespread usage.

  2. Maturing agent standards to build ecosystem compatibility and develop reference agents so that they are usable by new participants in the ecosystem.

  3. Documentation improvements to enhance ease of use and encourage new contributors.

These three efforts have yielded significant results.

  1. Ledger monitoring scripts have been implemented and real time notifications are in place and operational on some ledgers.

  2. Work has accelerated significantly on agent standardization. Multiple implementations of agents are nearing the ability to connect to each other thanks to efforts from members of the community from many different organizations. An Agent “Connect-a-thon” is scheduled for this month (February) to demonstrate the ability to connect different agents, resolve any remaining issues, and determine next steps as a community. See Agent Connectathon Agenda.

  3. Superb effort has been put in to consolidate the Hyperledger-Indy documentation for ease of use. See hyperledger-indy.readthedocs.io and doc.sovrin.org.

Other important outcomes this quarter:

  • Several stability fixes have been implemented and ledgers are running better than ever.

  • Indy’s codebase has surpassed 17,000 commits from 143 unique contributors.

  • The Indy team continues to work with other Hyperledger teams to transition from the indy-crypto component to Hyperledger Ursa.

  • An audit ledger was added.

  • Graduation from incubation status only requires 3 more action items:

  • An Indy use cases document (a community effort just started with this doc)

  • Confirmation that indy projects implement perfect forward secrecy

  • Automated code coverage collection (This is very difficult considering our tech stack. There is active development on this front and it will hopefully be implemented soon)

Some new and exciting things that are in the works:

Schema improvements! In the Schemas area we are currently working on enhanced schemas that will be compatible with the W3C Verifiable Credentials standards. This will allow complex data structures such as those defined in schemas like those available from schema.org to be used with Hyperledger Indy Verifiable Credentials. This will be a substantial improvement over our current credentials, which use schemas that are simple flat lists of untyped strings. New encoding methods (to convert properties to signature values) and presentation (proof) requests will be able to preserve privacy and security through zero-knowledge proofs (ZKP) while maintaining the cryptographic assurances that the credential values have not been modified. The new encoding methods will expand the number of credential values that can be used in predicate proofs, such as "greater than", "less-than-or-equal", etc. Schema re-use between Verifiable Credential issuers will promote interoperability.

Issues

Ensure quality releases for downstream users

Improvements over last quarter have been made for this issue. Releases and deployment have been consistent and timely as improvements to the ledger have been tested and delivered.

Progress made:

  • Continued improvements in the CI / CD pipeline have provided more reliable releases with consistent versions of components.

Further remediation planned:

  • The Indy team will continue to focus on providing releases that can be immediately deployed downstream.

  • The team is being more deliberate about preserving backwards compatibility. (More work is still needed here)

  • The “ledger 2.0” design project is under way and includes representatives from many organizations within our community.

Inconsistent documentation

Documentation quality and consolidation remains an important issue, but significant progress has been made to improve.

Progress made:

Further remediation planned:

  • Publish the getting started resources somewhere that is public and likely to be found.

  • Continue to consolidate redundant documentation and reworking it for different user levels.

Incompatible agent implementations

Efforts are ongoing to increase interoperability between existing agent implementations and future implementations.

Progress made:

  • Wire level message formatting has been established and merged into the Indy-SDK.

  • An Agent “Connect-a-thon” will be held this month (February 19-22) demonstrating the ability of different agent implementations to connect and communicate over accepted protocols.

  • Preliminary tests for connection protocol are implemented in the agent test suite and are ready for testing.

  • Maintainers of libVCX have committed to implement the community approved protocols outlined in HIPEs.

Further remediation planned:

  • Continue standardizing agent communication protocols, including credential exchange.

  • Mature the agent test suite.

Measuring the size and make-up of our user community

We began making progress on this issue by measuring the number of developers creating solutions by contributing to indy github projects.

Progress made:

  • We are measuring GitHub contributors and can produce a week-by-week graph of contributors added over the last year.

Further remediation planned:

  • Work with Hyperledger to get analytics about web sites, and Rocket Chat usage.


  • Begin measuring usage of the Sovrin forums: new contributors, questions asked, and questions answered

Build Issues

Progress made:

  • Significant effort has been made to move the building of client libraries and reference agents to the Sovrin Foundation and this work is nearing completion.

Further remediation planned:

  • CI/CD pipelines will target prebuilt dependencies instead of building them from source.

  • CI/CD pipelines will be put in place first before additional code changes are made.

Releases

November 2018:

Indy SDK 1.6.8
  • Fix State Proof verification for some types of GET requests to the ledger

  • Additional clean-up for secrets in logs

  • Update CLI help

December 2018:

Indy SDK 1.7.0
  • Added VCX - a library built over libindy for Verifiable Credentials eXchange. API is EXPERIMENTAL.

    • At the current moment mobile builds are not available - they should be added in future releases.

  • Added Logging API

    • Added function indy_get_logger for plugins to give their logging to libindy

    • Added function indy_set_logger for client apps and wrappers to receive logs from libindy

    • Integrated libindy logging into Slf4j for Java wrapper and into python logging facade

  • Updated API of Rust wrapper. Now there is no three methods for each API call, there is only one that returns Future.

  • Introduced multithreading for Wallet API and CRED_DEF generation

  • Bug fixes

Indy Node 1.6.79
  • Fixes to improve stability.

  • Output of validator-info changed and enhanced to meet growing need

  • Bug fixes

Indy Node 1.6.80
  • Initial hotfixes for network stability issues.

  • Pool restart will now work regardless of whether there is consensus on the ledger.

Indy Node 1.6.82
  • Additional hotfixes for improved stability.

January 2019:   No new Releases

Overall Activity in the Past Quarter

General

  • See the notes above regarding progress made on key issues.

Indy Node

  • Significant focus on performance and stability.

  • Continued research into a future ledger architecture.

Indy SDK


Indy Agent
  • Many HIPEs moved to accepted status

  • Significant iterations on and discussion surrounding several HIPEs

  • Increased collaboration with new contributors in the community

Current Plans

Additional organizations are making ongoing contributions. This is shown by the shared Running Roadmap for Hyperledger Indy.

General
  • Incubation status graduation

    • Complete the three items mentioned earlier in this document and apply for graduation.

  • Continue to refine documentation

    • Consolidate documentation for onboarding contributors

  • Network stability of the first production deployment (Sovrin)

Indy Node
  • Consume official builds of Hyperledger Ursa (the shared crypto-lib), as they are approved.

  • Further improvements to automated testing.

  • Research into Ledger 2.0

    • Improve the stability and performance of View Change, Catch-up, and Replication

    • Establish a cache for reads, such as observer nodes

  • Broader OS support

Indy SDK

  • Consume official builds of Hyperledger Ursa (the shared crypto-lib), as they are approved.

  • Broader OS support

Indy Agent

  • Standardizing agent-to-agent protocol through agent test suite

  • Tests associated with each major aspect of the protocol

  • Multiple interoperable agents in the community

  • Addition of a reference cloud agent.

  • Contributing a reference mobile agent to the Sovrin Foundation.

Maintainer Diversity

Indy maintainers remain active in developing and contributing to working group calls and public discussions. The bi-weekly Indy Maintainers Circle call has consistently been the medium by which maintainers coordinate work, discuss critical issues to the Indy codebase, and resolve HIPEs. The Indy Agent call continues to be the focus of much attention, and the Overlays Working Group also continues to receive a lot of interest.

Contributor Diversity

Hyperledger Indy continues to see contributions from developers and organizations around the world. Our weekly Working Group call is normally attended by two dozen people representing nearly a dozen organizations. Not the number of contributors and contributions listed in the Project Health Section above.

POCs, Pilots, Projects

Sovrin

http://www.sovrin.org

Sovrin is the first instantiation of the Indy codebase and is currently moving from the provisional network phase of development to production usage.

Verifiable Organizations Network

https://von.pathfinder.gov.bc.ca

The Province of British Columbia, the Government of Ontario, and Public Services and Procurement Canada are ready to launch their trusted digital network of verifiable data about organizations.

Brigham Young University

https://www.byu.edu/

The University is building an agent to manage student credentials throughout their experience at the university.

Evernym

https://www.evernym.com/

Evernym is creating applications that will make it easy for organizations and users to issue, hold, and verify credentials through the Sovrin network.

Additional Information

  • Join the Indy Working Group Calls: every Thursday 8am PT, 9am MT, 11am ET, 4pm BST (Join from PC, Mac, Linux, iOS or Android: https://zoom.us/j/232861185)


  • No labels