- Consolidated DATABASE_ACCESS_CLARIFICATION.md content into main plan
- Consolidated ACTIVE_DID_CHANGE_REQUIREMENTS.md content into main plan
- Consolidated TIMESAFARI_INTEGRATION_ANALYSIS.md content into main plan
- Enhanced main document with Option A architecture overview
- Added comprehensive TimeSafari integration patterns section
- Added critical requirement section for activeDid change detection
- Added event-based solution implementation details
- Updated README.md to reference single consolidated document
- Eliminated unnecessary document proliferation as requested
The BACKGROUND_DATA_FETCHING_PLAN.md now serves as the single source of truth
for all implementation guidance, containing Option A architecture, TimeSafari
integration patterns, activeDid change management, and platform-specific details.
- Added critical requirement that plugin MUST be notified of activeDid changes
- Enhanced plugin interface with onActiveDidChange() callback method
- Added clearCacheForNewIdentity() and refreshAuthenticationForNewIdentity() methods
- Updated integration examples to include activeDid change listeners
- Created comprehensive ActiveDid change requirements document covering:
* Security implications of not detecting changes
* Event-based notification pattern implementation
* Cache clearing and authentication refresh requirements
* Testing scenarios for identity switching
* Platform-specific considerations and edge cases
* Performance optimization for rapid identity changes
This addresses the critical data integrity and security requirement that the plugin
must know when TimeSafari users switch identities to prevent data leakage.
- Simplified authentication to use single activeDid instead of complex user management
- Updated plugin interface to require only setActiveDid() method
- Modified API requests to use activeDid as both issuer and recipient
- Streamlined configuration to activeDid: string instead of complex credential object
- Aligned JWT generation with simple DID-based authentication pattern
- Reduced complexity while maintaining security through DID signing
This assumption significantly simplifies the host application integration.
- Document native HTTP client implementation for Android/iOS
- Include JWT authentication strategies (Basic DID + Advanced Passkey)
- Detail API endpoint integration with TimeSafari/Endorser.ch patterns
- Cover error handling, caching, and performance optimization
- Provide migration phases and testing strategies
- Include platform-specific considerations and success criteria
This plan replaces web push implementations with native solutions
for reliable background data fetching across all target platforms.