Open RP-OIS-SK opened 1 month ago
Hi @RP-OIS-SK, are you certain the "merkleRoot": "dbc401436622594ecf53f96e8d12919bd415906ac1851a9f122b28af95e41370"
has already been issued on the document store? Looking at the events emitted at this document store, the last issuance was performed 58 days ago (2024-04-12).
You may also debug your issuance process using the Sepolia testnet to perform a single issuance of a certificate, followed by batch issuance of certificates so that you do not need to consume real Ethers.
The users said it was issued sometime ago, it is only recently the students complained the they can view the certificate. How to check whether markle root is issued ? Is the markle root hash equal to transaction hash ?
You can check whether the merkleRoot
was issued before by querying the isIssued
function of the contract:
Source: https://etherscan.io/address/0x18270bA6dA0380a2cbC705bc6C0AD6651282bD14#readContract
In this case, 0xdbc401436622594ecf53f96e8d12919bd415906ac1851a9f122b28af95e41370
has already been issued correctly.
Do you have access to the certificate? Can you try verifying it on opencerts.io using your own computer?
I have tested it on a notebook, the same error.
We have been issuing certificate for a number of years. Recently, some of certificates issued recently get "Certificate is not valid, certificate has been tampered with .." error while most of the certificate issued out have no problem. Is there any way to find what the cause of this ?
Example of certificate with error - I have removed the sensitive contents. In this case, the whole batch of certificates have this error. Is it due to merkleRoot not issue properly in Ethereum ?
"certificateStore": "cc7b4401-daa3-486c-9ee0-6420c3721bf7:string:0x18270bA6dA0380a2cbC705bc6C0AD6651282bD14",