Emit approval for request
Emit approval for request
Allows you to issue an affirmative or negative approval for a previously received request.
Path Parameters
- id string required
Approval's unique id
- application/json
Request Body required
Vote of the user for an existing request
- MOD1
- MOD2
- state string required
Possible values: [
RespondedAccepted
] - state string required
Possible values: [
RespondedRejected
]
- 204
- 400
- 404
- 409
- 500
Request successfully voted
- application/json
- Schema
- Example (from schema)
- Example
Schema
- id string
Approval request identifier
reponse object
ApprovalResponseBody object
appr_req_hash stringHash of the request for approval
approved booleanValue specifying if it has been approved
SignatureBody object
signer stringSignature of the issuer
timestamp int64Timestamp at which the signature was made
value stringSignature value
request object
ApprovalRequestResponse object
event_request object
EventRequestBody object
oneOf- MOD1
- MOD2
- MOD3
- MOD4
Create object
governance_id stringGovernance identifier
name stringName of subject
namespace stringNamespace to which the subject belongs
public_key stringPublic key of the subject
schema_id stringSubject schema json identifier
Fact object
payloadChanges to be applied to the subject
subject_id stringSubject identifier
Transfer object
public_key stringPublic key of the new owner
subject_id stringSubject identifier
EOL object
subject_id stringSubject identifier
SignatureBody object
signer stringSignature of the issuer
timestamp int64Timestamp at which the signature was made
value stringSignature value
gov_version int64Governance version
hash_prev_event stringPrevious event hash
patchChanges to be applied to the subject
sn int64Current sequence number of the subject
state_hash stringHash of the state
SignatureBody object
signer stringSignature of the issuer
timestamp int64Timestamp at which the signature was made
value stringSignature value
- state string
Possible values: [
Pending
,RespondedAccepted
,RespondedRejected
,Obsolete
]
{
"id": "string",
"reponse": {
"ApprovalResponseBody": {
"appr_req_hash": "string",
"approved": true
},
"SignatureBody": {
"signer": "string",
"timestamp": 0,
"value": "string"
}
},
"request": {
"ApprovalRequestResponse": {
"event_request": {
"EventRequestBody": {
"Create": {
"governance_id": "string",
"name": "string",
"namespace": "string",
"public_key": "string",
"schema_id": "string"
}
},
"SignatureBody": {
"signer": "string",
"timestamp": 0,
"value": "string"
}
},
"gov_version": 0,
"hash_prev_event": "string",
"sn": 0,
"state_hash": "string"
},
"SignatureBody": {
"signer": "string",
"timestamp": 0,
"value": "string"
}
},
"state": "Pending"
}
{
"id": "J5dfpH-ahrqSo-od4jyZkubyO-XWFJSQ9maK73jKI4Ao",
"reponse": {
"appr_req_hash": "J5dfpH-ahrqSo-od4jyZkubyO-XWFJSQ9maK73jKI4Ao",
"approved": true,
"signature": {
"signer": "EbwR0yYrCYpTzlN5i5GX_MtAbKRw5y2euv3TqiTgwggs",
"timestamp": 168864361,
"value": "SERUEr362pHPIcORhUnYPxnW1A_jW675_yphYIQIKaO6wytdh7xwwNTXHW6Q1fs9F6ag8VpTy2DM_5ppRT7irFDg"
}
},
"request": {
"event_request": {
"Fact": {
"payload": {
"Patch": {
"data": [
{
"op": "add",
"path": "/members/0",
"value": {
"id": "EbwR0yYrCYpTzlN5i5GX_MtAbKRw5y2euv3TqiTgwggs",
"name": "WPO"
}
}
]
}
},
"subject_id": "JoifaSpfenD2bEPeBLvUTWh30brm4tKcvdW8exQnkGoQ"
},
"signature": {
"signer": "EbwR0yYrCYpTzlN5i5GX_MtAbKRw5y2euv3TqiTgwggs",
"timestamp": 1688643580,
"value": "SE4yS1Q1Smhm3Az3r6WNFKAGd2Us69vyUA3j5q_riE6MICh_Ub2fSLxNS3Nn-g_CpppvABq6s_c8dF5kbmUir4Ag"
}
},
"gov_version": 0,
"hash_prev_event": "JLic8SLrT7tJxA9B3aLaaKaIEuV7Wouo2ogHCid6O4g8",
"patch": [
{
"op": "add",
"path": "/members/0",
"value": {
"id": "EbwR0yYrCYpTzlN5i5GX_MtAbKRw5y2euv3TqiTgwggs",
"name": "WPO"
}
}
],
"signature": {
"signer": "E0gaiDcPRVmYLUGbseHmBk2_2H-FAlSgaO6ZMOXhh4Gs",
"timestamp": 1688643580,
"value": "SEFyfXR6kE04gGdCtXZN-So6nNJAAe1qwnTkl0UuoFpCEEuQhwkZND77o1Y9OVuVus8mgGtyAdTi-A7_0MkDKgBw"
},
"sn": 1,
"state_hash": "JbDVCZxkDkZ5gLCc7Ge5X75pHHf8dA7_s8UynsnzG5o8"
},
"state": "Responded"
}
Bad Request
Not Found
Conflict
Internal Server Error