DgcReader.TrustListProviders.Abstractions
1.3.0
See the version list below for details.
dotnet add package DgcReader.TrustListProviders.Abstractions --version 1.3.0
NuGet\Install-Package DgcReader.TrustListProviders.Abstractions -Version 1.3.0
<PackageReference Include="DgcReader.TrustListProviders.Abstractions" Version="1.3.0" />
paket add DgcReader.TrustListProviders.Abstractions --version 1.3.0
#r "nuget: DgcReader.TrustListProviders.Abstractions, 1.3.0"
// Install DgcReader.TrustListProviders.Abstractions as a Cake Addin #addin nuget:?package=DgcReader.TrustListProviders.Abstractions&version=1.3.0 // Install DgcReader.TrustListProviders.Abstractions as a Cake Tool #tool nuget:?package=DgcReader.TrustListProviders.Abstractions&version=1.3.0
DgcReader
An extensible, unofficial library for decoding and validate the European Digital Green Certificate
Summary
The library allows to decode and validate any EU Digital Green Certificate, providing some abstractions to easily implement specific providers for every country's backend.
It supports any kind of project compatible with .NET Standard 2.0 and also legacy applications from .NET Framework 4.5.2 onwards.
Usage
The main entry point of the library is the DgcReaderService
class.
You can simply register it as a service:
public void ConfigureServices(IServiceCollection services)
{
...
services.AddDgcReader() // Add the DgcReaderService as singleton
.AddItalianTrustListProvider(o => // Register the ItalianTrustListProvider service (or any other provider type)
{
// Optionally, configure the provider with custom options
o.RefreshInterval = TimeSpan.FromHours(24);
o.MinRefreshInterval = TimeSpan.FromHours(1);
o.SaveCertificate = true;
...
})
.AddItalianBlacklistProvider() // The blacklist provider service
.AddItalianRulesValidator(); // Finally, the rules validator
}
then getting it from the DI ServiceCollection:
...
// Getting an instance by dependency injection (from .NET standard 2.0 onward)
var dgcReader = ServiceCollection.GetService<DgcReaderService>();
If you don't use the dependency injection, you can instantiate it directly:
a) Use a TrustListProvider
and RulesValidator
:
// Create an instance of the TrustListProvider (eg. ItalianTrustListProvider) and the other required services
var httpClient = new HttpClient();
var trustListProvider = new ItalianTrustListProvider(httpClient);
var rulesValidator = new DgcItalianRulesValidator(httpClient); // Note: this implementation is both a IRulesValidator and a IBlacklistProvider
// Create an instance of the DgcReaderService
var dgcReader = new DgcReaderService(trustListProvider, rulesValidator, rulesValidator);
Once instantiated and configured with at least the ITrustListProvider
service, you can simply call one of methods shown in c)
b) Use the DgcReaderService
without arguments (i.e. no TrustListProvider
and RulesValidator
):
This lets you decode all the QR code data without verification, but still gives you a quick idea about how the library works. You can use the open source EU Digital Green Test Certifactes or your personal certificate.
// Create the default instance of the `DgcReaderService` with an empty constructor
var dgcReader = new DgcReaderService();
c) Run the validation
...
string qrCodeData = "Raw qr code data staring with HC1:";
// Decode and validate the qr code data.
// The result will contain all the details of the validated object
var result = await dgcReader.GetValidationResult(qrCodeData);
var status = result.Status;
var signatureIsValid = result.HasValidSignature;
...
or
...
string qrCodeData = "Raw qr code data staring with HC1:";
try
{
// Decode and validate the signature.
// If anything fails, an exception is thrown containing the error details
var result = await dgcReader.Verify(qrCodeData);
}
catch(Exception e)
{
Console.WriteLine($"Error verifying DGC: {e.Message}");
}
Information about how to interprete the decoded values can be found in the Value Sets for Digital Green Certificates and the COVID-19 Data Reporting for Non-Lab-Based Testing.
Rules validation
Rules validation is an optional service and can be done by registering an IRulesValidator
service, or by passing it to the constructor.
Once registered, the validator will be executed when calling DgcReader.Verify()
or DgcReader.GetValidationResult()
.
If validation succeded, the result status will be set to Valid
or PartiallyValid
, otherwise another status will be returned when calling DgcReader.GetValidationResult()
, or an exception will be thrown when using DgcReader.Verify()
.
While TrustList providers and BlackList providers are virtually interchangeable, the rules for determining if a certificate is valid are different for every country.
For this reason, a specific implementation of the IRulesValidator
should be used in order to determine if the certificate is valid for a particular country.
In the repository there is currently an implementation for the Italian validation rules.
Note: These rules are changing overtime, so it is not ensured in any way that the implementation it is fully compliant with the current Italian dispositions.
Anyway, current Italian regulations also requires the usage of the offical SDK it-dgc-verificac19-sdk-android for an application in order to be compliant.
Supported frameworks differences
The library supports a wide range of .NET and .NET Framework versions, trying to keep the dependencies to third party libraries at minimum.
For this reason, the implementation of the cryptographic functionalities for signature validations and certificates parsing are implemented with the apis of the System.Security.Cryptography
namespace.
These APIs were not fully implemented in previous versions of the framework, so the version compiled for .NET Framework 4.5.2 uses the BouncyCastle library instead.
Packages
Upgrading from version < 1.2.0
In 1.2.0 release of the packages, many changes was made in order to cleanup and standardize the interfaces as mush as possible. If you are upgrading from a previus version, keep this in mind and read this readme carefully in order to correctly use the library as intended.
Extending the library
All you have to do in order to extend the library is to implement the interfaces exposed under the DgcReader.Interfaces.*
namespace.
You can use the implementations in the repository as an example, or you can code them from scratch.
If you are implementing a TrustList provider, the DgcReader.TrustListProviders.Abstractions
package can results useful to simply implement a service optimized for multiple concurrent requests like a web application.
Any suggestion will be appreciated!
Requirements
In order to compile and run the solution, you will need the following tools:
- Microsoft Visual Studio 2019 with the latest updates installed (16.11.7 at the moment of writing), or Microsoft Visual Studio 2022
- Because some projects supports multiple version of the .NET framework, you should have installed the related targeting packs. At the moment, .NET Framework 4.5.2, .NET Framework 4.7 and .NET Standard 2.0 are supported
Disclaimer
This library is not an official implementation, therefore its use may be subject to restrictions by some countries regulations.
The author assumes no responsibility for any unauthorized use of the library and no warranties about the correctness of the implementation, as better stated in the License.
Some code of the library is based on the DCCValidator App.
Many thanks to their authors for sharing their code!
Copyright © 2021 Davide Trevisan
Licensed under the Apache License, Version 2.0
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net5.0 was computed. net5.0-windows was computed. net6.0 was computed. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
.NET Core | netcoreapp2.0 was computed. netcoreapp2.1 was computed. netcoreapp2.2 was computed. netcoreapp3.0 was computed. netcoreapp3.1 was computed. |
.NET Standard | netstandard2.0 is compatible. netstandard2.1 was computed. |
.NET Framework | net452 is compatible. net46 was computed. net461 was computed. net462 was computed. net463 was computed. net47 is compatible. net471 was computed. net472 was computed. net48 was computed. net481 was computed. |
MonoAndroid | monoandroid was computed. |
MonoMac | monomac was computed. |
MonoTouch | monotouch was computed. |
Tizen | tizen40 was computed. tizen60 was computed. |
Xamarin.iOS | xamarinios was computed. |
Xamarin.Mac | xamarinmac was computed. |
Xamarin.TVOS | xamarintvos was computed. |
Xamarin.WatchOS | xamarinwatchos was computed. |
-
.NETFramework 4.5.2
- DgcReader (>= 1.3.0)
- Newtonsoft.Json (>= 13.0.1)
- System.Net.Http (>= 4.3.4)
- System.ValueTuple (>= 4.5.0)
-
.NETFramework 4.7
- DgcReader (>= 1.3.0)
- Newtonsoft.Json (>= 13.0.1)
- System.Net.Http (>= 4.3.4)
-
.NETStandard 2.0
- DgcReader (>= 1.3.0)
- Newtonsoft.Json (>= 13.0.1)
NuGet packages (3)
Showing the top 3 NuGet packages that depend on DgcReader.TrustListProviders.Abstractions:
Package | Downloads |
---|---|
DgcReader.TrustListProviders.Italy
Trustlist provider implementation using certificates from the official Italian backend. This provider is included in the list of verified SDKs by Italian authorities |
|
DgcReader.TrustListProviders.Sweden
Unofficial TrustList provider implementation using the Swedish backend endpoints |
|
DgcReader.TrustListProviders.Germany
Unofficial TrustList provider implementation using the German backend endpoints |
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
2.6.1 | 872 | 4/3/2023 |
2.6.0 | 879 | 4/2/2023 |
2.6.0-CI-20230402-140522 | 619 | 4/2/2023 |
2.5.5 | 1,701 | 6/14/2022 |
2.5.5-rc1 | 703 | 6/14/2022 |
2.5.5-CI-20230402-112357 | 601 | 4/2/2023 |
2.5.5-CI-20230402-101020 | 589 | 4/2/2023 |
2.5.4 | 1,585 | 5/4/2022 |
2.5.4-rc2 | 641 | 5/4/2022 |
2.5.4-rc1 | 630 | 5/4/2022 |
2.5.3 | 2,271 | 3/5/2022 |
2.5.3-rc1 | 691 | 3/5/2022 |
2.5.1 | 1,631 | 2/16/2022 |
2.5.1-rc1 | 662 | 2/15/2022 |
2.5.0 | 1,634 | 2/14/2022 |
2.5.0-rc3 | 652 | 2/14/2022 |
2.5.0-rc2 | 692 | 2/11/2022 |
2.5.0-rc1 | 644 | 2/11/2022 |
2.4.0 | 1,580 | 2/6/2022 |
2.3.0 | 1,648 | 1/28/2022 |
2.2.1 | 1,657 | 1/21/2022 |
2.2.0 | 1,163 | 1/16/2022 |
2.1.0 | 1,019 | 1/6/2022 |
2.0.0 | 981 | 12/27/2021 |
1.3.0 | 1,083 | 12/6/2021 |
1.2.0 | 996 | 11/4/2021 |
1.0.0 | 970 | 11/2/2021 |
1.0.0-CI-20211102-130745 | 707 | 11/2/2021 |
1.0.0-CI-20211102-124304 | 681 | 11/2/2021 |
1.0.0-CI-20211102-120059 | 718 | 11/2/2021 |