@bifold/core 3.0.0 → 3.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/commonjs/components/buttons/Button.js +2 -6
- package/lib/commonjs/components/buttons/Button.js.map +1 -1
- package/lib/commonjs/components/inputs/BiometryControl.js +29 -5
- package/lib/commonjs/components/inputs/BiometryControl.js.map +1 -1
- package/lib/commonjs/components/listItems/NotificationListItem.js +5 -1
- package/lib/commonjs/components/listItems/NotificationListItem.js.map +1 -1
- package/lib/commonjs/components/modals/ConfirmPINModal.js +0 -1
- package/lib/commonjs/components/modals/ConfirmPINModal.js.map +1 -1
- package/lib/commonjs/components/views/KeyboardView.js +5 -3
- package/lib/commonjs/components/views/KeyboardView.js.map +1 -1
- package/lib/commonjs/components/views/ScreenWrapper.js +9 -5
- package/lib/commonjs/components/views/ScreenWrapper.js.map +1 -1
- package/lib/commonjs/container-impl.js +4 -2
- package/lib/commonjs/container-impl.js.map +1 -1
- package/lib/commonjs/contexts/auth.js +47 -45
- package/lib/commonjs/contexts/auth.js.map +1 -1
- package/lib/commonjs/hooks/notifications.js +4 -2
- package/lib/commonjs/hooks/notifications.js.map +1 -1
- package/lib/commonjs/hooks/useBifoldAgentSetup.js +4 -13
- package/lib/commonjs/hooks/useBifoldAgentSetup.js.map +1 -1
- package/lib/commonjs/index.js +9 -1
- package/lib/commonjs/index.js.map +1 -1
- package/lib/commonjs/localization/en/en.json +7 -0
- package/lib/commonjs/localization/fr/fr.json +7 -0
- package/lib/commonjs/localization/pt-br/pt-br.json +7 -0
- package/lib/commonjs/modules/openid/context/OpenIDCredentialRecordProvider.js +27 -27
- package/lib/commonjs/modules/openid/context/OpenIDCredentialRecordProvider.js.map +1 -1
- package/lib/commonjs/modules/openid/credentialRecord.js +114 -0
- package/lib/commonjs/modules/openid/credentialRecord.js.map +1 -0
- package/lib/commonjs/modules/openid/display.js +0 -3
- package/lib/commonjs/modules/openid/display.js.map +1 -1
- package/lib/commonjs/modules/openid/hooks/openid.js +6 -8
- package/lib/commonjs/modules/openid/hooks/openid.js.map +1 -1
- package/lib/commonjs/modules/openid/hooks/useAcceptReplacement.js +16 -19
- package/lib/commonjs/modules/openid/hooks/useAcceptReplacement.js.map +1 -1
- package/lib/commonjs/modules/openid/hooks/useDeclineReplacement.js +1 -10
- package/lib/commonjs/modules/openid/hooks/useDeclineReplacement.js.map +1 -1
- package/lib/commonjs/modules/openid/hooks/useExpiredNotifications.js +1 -1
- package/lib/commonjs/modules/openid/hooks/useExpiredNotifications.js.map +1 -1
- package/lib/commonjs/modules/openid/hooks/useUpgradeExpiredCredential.js +8 -42
- package/lib/commonjs/modules/openid/hooks/useUpgradeExpiredCredential.js.map +1 -1
- package/lib/commonjs/modules/openid/metadata.js +2 -0
- package/lib/commonjs/modules/openid/metadata.js.map +1 -1
- package/lib/commonjs/modules/openid/offerResolve.js +34 -58
- package/lib/commonjs/modules/openid/offerResolve.js.map +1 -1
- package/lib/commonjs/modules/openid/refresh/operations.js +37 -0
- package/lib/commonjs/modules/openid/refresh/operations.js.map +1 -0
- package/lib/commonjs/modules/openid/refresh/reIssuance.js +7 -10
- package/lib/commonjs/modules/openid/refresh/reIssuance.js.map +1 -1
- package/lib/commonjs/modules/openid/refresh/refreshOrchestrator.js +46 -62
- package/lib/commonjs/modules/openid/refresh/refreshOrchestrator.js.map +1 -1
- package/lib/commonjs/modules/openid/refresh/refreshToken.js +12 -12
- package/lib/commonjs/modules/openid/refresh/refreshToken.js.map +1 -1
- package/lib/commonjs/modules/openid/refresh/registry.js +1 -1
- package/lib/commonjs/modules/openid/refresh/registry.js.map +1 -1
- package/lib/commonjs/modules/openid/refresh/types.js +11 -1
- package/lib/commonjs/modules/openid/refresh/types.js.map +1 -1
- package/lib/commonjs/modules/openid/refresh/verifyCredentialStatus.js +6 -6
- package/lib/commonjs/modules/openid/refresh/verifyCredentialStatus.js.map +1 -1
- package/lib/commonjs/modules/openid/resolverProof.js +5 -102
- package/lib/commonjs/modules/openid/resolverProof.js.map +1 -1
- package/lib/commonjs/modules/openid/screens/OpenIDConnection.js +11 -23
- package/lib/commonjs/modules/openid/screens/OpenIDConnection.js.map +1 -1
- package/lib/commonjs/navigators/TabStack.js +5 -3
- package/lib/commonjs/navigators/TabStack.js.map +1 -1
- package/lib/commonjs/screens/Home.js +1 -1
- package/lib/commonjs/screens/Home.js.map +1 -1
- package/lib/commonjs/screens/Settings.js +1 -1
- package/lib/commonjs/screens/Settings.js.map +1 -1
- package/lib/commonjs/utils/agent.js +3 -3
- package/lib/commonjs/utils/agent.js.map +1 -1
- package/lib/commonjs/utils/helpers.js +0 -2
- package/lib/commonjs/utils/helpers.js.map +1 -1
- package/lib/module/components/buttons/Button.js +4 -7
- package/lib/module/components/buttons/Button.js.map +1 -1
- package/lib/module/components/inputs/BiometryControl.js +30 -6
- package/lib/module/components/inputs/BiometryControl.js.map +1 -1
- package/lib/module/components/listItems/NotificationListItem.js +5 -1
- package/lib/module/components/listItems/NotificationListItem.js.map +1 -1
- package/lib/module/components/modals/ConfirmPINModal.js +0 -1
- package/lib/module/components/modals/ConfirmPINModal.js.map +1 -1
- package/lib/module/components/views/KeyboardView.js +6 -4
- package/lib/module/components/views/KeyboardView.js.map +1 -1
- package/lib/module/components/views/ScreenWrapper.js +9 -5
- package/lib/module/components/views/ScreenWrapper.js.map +1 -1
- package/lib/module/container-impl.js +4 -2
- package/lib/module/container-impl.js.map +1 -1
- package/lib/module/contexts/auth.js +47 -44
- package/lib/module/contexts/auth.js.map +1 -1
- package/lib/module/hooks/notifications.js +4 -2
- package/lib/module/hooks/notifications.js.map +1 -1
- package/lib/module/hooks/useBifoldAgentSetup.js +4 -13
- package/lib/module/hooks/useBifoldAgentSetup.js.map +1 -1
- package/lib/module/index.js +1 -0
- package/lib/module/index.js.map +1 -1
- package/lib/module/localization/en/en.json +7 -0
- package/lib/module/localization/fr/fr.json +7 -0
- package/lib/module/localization/pt-br/pt-br.json +7 -0
- package/lib/module/modules/openid/context/OpenIDCredentialRecordProvider.js +28 -28
- package/lib/module/modules/openid/context/OpenIDCredentialRecordProvider.js.map +1 -1
- package/lib/module/modules/openid/credentialRecord.js +98 -0
- package/lib/module/modules/openid/credentialRecord.js.map +1 -0
- package/lib/module/modules/openid/display.js +0 -3
- package/lib/module/modules/openid/display.js.map +1 -1
- package/lib/module/modules/openid/hooks/openid.js +6 -8
- package/lib/module/modules/openid/hooks/openid.js.map +1 -1
- package/lib/module/modules/openid/hooks/useAcceptReplacement.js +16 -19
- package/lib/module/modules/openid/hooks/useAcceptReplacement.js.map +1 -1
- package/lib/module/modules/openid/hooks/useDeclineReplacement.js +2 -11
- package/lib/module/modules/openid/hooks/useDeclineReplacement.js.map +1 -1
- package/lib/module/modules/openid/hooks/useExpiredNotifications.js +1 -1
- package/lib/module/modules/openid/hooks/useExpiredNotifications.js.map +1 -1
- package/lib/module/modules/openid/hooks/useUpgradeExpiredCredential.js +8 -42
- package/lib/module/modules/openid/hooks/useUpgradeExpiredCredential.js.map +1 -1
- package/lib/module/modules/openid/metadata.js +3 -1
- package/lib/module/modules/openid/metadata.js.map +1 -1
- package/lib/module/modules/openid/offerResolve.js +34 -58
- package/lib/module/modules/openid/offerResolve.js.map +1 -1
- package/lib/module/modules/openid/refresh/operations.js +31 -0
- package/lib/module/modules/openid/refresh/operations.js.map +1 -0
- package/lib/module/modules/openid/refresh/reIssuance.js +7 -10
- package/lib/module/modules/openid/refresh/reIssuance.js.map +1 -1
- package/lib/module/modules/openid/refresh/refreshOrchestrator.js +48 -63
- package/lib/module/modules/openid/refresh/refreshOrchestrator.js.map +1 -1
- package/lib/module/modules/openid/refresh/refreshToken.js +12 -12
- package/lib/module/modules/openid/refresh/refreshToken.js.map +1 -1
- package/lib/module/modules/openid/refresh/registry.js +1 -1
- package/lib/module/modules/openid/refresh/registry.js.map +1 -1
- package/lib/module/modules/openid/refresh/types.js +11 -0
- package/lib/module/modules/openid/refresh/types.js.map +1 -1
- package/lib/module/modules/openid/refresh/verifyCredentialStatus.js +6 -6
- package/lib/module/modules/openid/refresh/verifyCredentialStatus.js.map +1 -1
- package/lib/module/modules/openid/resolverProof.js +5 -98
- package/lib/module/modules/openid/resolverProof.js.map +1 -1
- package/lib/module/modules/openid/screens/OpenIDConnection.js +11 -23
- package/lib/module/modules/openid/screens/OpenIDConnection.js.map +1 -1
- package/lib/module/navigators/TabStack.js +5 -3
- package/lib/module/navigators/TabStack.js.map +1 -1
- package/lib/module/screens/Home.js +1 -1
- package/lib/module/screens/Home.js.map +1 -1
- package/lib/module/screens/Settings.js +1 -1
- package/lib/module/screens/Settings.js.map +1 -1
- package/lib/module/utils/agent.js +3 -3
- package/lib/module/utils/agent.js.map +1 -1
- package/lib/module/utils/helpers.js +0 -2
- package/lib/module/utils/helpers.js.map +1 -1
- package/lib/typescript/src/components/buttons/Button.d.ts +3 -2
- package/lib/typescript/src/components/buttons/Button.d.ts.map +1 -1
- package/lib/typescript/src/components/inputs/BiometryControl.d.ts.map +1 -1
- package/lib/typescript/src/components/listItems/NotificationListItem.d.ts.map +1 -1
- package/lib/typescript/src/components/modals/ConfirmPINModal.d.ts.map +1 -1
- package/lib/typescript/src/components/views/KeyboardView.d.ts +3 -2
- package/lib/typescript/src/components/views/KeyboardView.d.ts.map +1 -1
- package/lib/typescript/src/components/views/ScreenWrapper.d.ts +5 -1
- package/lib/typescript/src/components/views/ScreenWrapper.d.ts.map +1 -1
- package/lib/typescript/src/container-impl.d.ts.map +1 -1
- package/lib/typescript/src/contexts/auth.d.ts +0 -1
- package/lib/typescript/src/contexts/auth.d.ts.map +1 -1
- package/lib/typescript/src/hooks/notifications.d.ts.map +1 -1
- package/lib/typescript/src/hooks/useBifoldAgentSetup.d.ts.map +1 -1
- package/lib/typescript/src/index.d.ts +1 -0
- package/lib/typescript/src/index.d.ts.map +1 -1
- package/lib/typescript/src/modules/openid/context/OpenIDCredentialRecordProvider.d.ts +7 -6
- package/lib/typescript/src/modules/openid/context/OpenIDCredentialRecordProvider.d.ts.map +1 -1
- package/lib/typescript/src/modules/openid/credentialRecord.d.ts +19 -0
- package/lib/typescript/src/modules/openid/credentialRecord.d.ts.map +1 -0
- package/lib/typescript/src/modules/openid/display.d.ts +2 -3
- package/lib/typescript/src/modules/openid/display.d.ts.map +1 -1
- package/lib/typescript/src/modules/openid/hooks/openid.d.ts +2 -2
- package/lib/typescript/src/modules/openid/hooks/openid.d.ts.map +1 -1
- package/lib/typescript/src/modules/openid/hooks/useAcceptReplacement.d.ts +2 -4
- package/lib/typescript/src/modules/openid/hooks/useAcceptReplacement.d.ts.map +1 -1
- package/lib/typescript/src/modules/openid/hooks/useDeclineReplacement.d.ts.map +1 -1
- package/lib/typescript/src/modules/openid/hooks/useUpgradeExpiredCredential.d.ts.map +1 -1
- package/lib/typescript/src/modules/openid/metadata.d.ts +9 -8
- package/lib/typescript/src/modules/openid/metadata.d.ts.map +1 -1
- package/lib/typescript/src/modules/openid/offerResolve.d.ts +9 -15
- package/lib/typescript/src/modules/openid/offerResolve.d.ts.map +1 -1
- package/lib/typescript/src/modules/openid/refresh/operations.d.ts +13 -0
- package/lib/typescript/src/modules/openid/refresh/operations.d.ts.map +1 -0
- package/lib/typescript/src/modules/openid/refresh/reIssuance.d.ts +4 -7
- package/lib/typescript/src/modules/openid/refresh/reIssuance.d.ts.map +1 -1
- package/lib/typescript/src/modules/openid/refresh/refreshOrchestrator.d.ts +2 -5
- package/lib/typescript/src/modules/openid/refresh/refreshOrchestrator.d.ts.map +1 -1
- package/lib/typescript/src/modules/openid/refresh/refreshToken.d.ts +3 -2
- package/lib/typescript/src/modules/openid/refresh/refreshToken.d.ts.map +1 -1
- package/lib/typescript/src/modules/openid/refresh/types.d.ts +14 -4
- package/lib/typescript/src/modules/openid/refresh/types.d.ts.map +1 -1
- package/lib/typescript/src/modules/openid/refresh/verifyCredentialStatus.d.ts +2 -2
- package/lib/typescript/src/modules/openid/refresh/verifyCredentialStatus.d.ts.map +1 -1
- package/lib/typescript/src/modules/openid/resolverProof.d.ts +2 -21
- package/lib/typescript/src/modules/openid/resolverProof.d.ts.map +1 -1
- package/lib/typescript/src/modules/openid/screens/OpenIDConnection.d.ts.map +1 -1
- package/lib/typescript/src/screens/Home.d.ts.map +1 -1
- package/lib/typescript/src/utils/agent.d.ts +3 -1
- package/lib/typescript/src/utils/agent.d.ts.map +1 -1
- package/lib/typescript/src/utils/helpers.d.ts.map +1 -1
- package/package.json +29 -29
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["useCallback","credentialRegistry","
|
|
1
|
+
{"version":3,"names":["useCallback","credentialRegistry","selectOldIdByReplacementId","useDeclineReplacement","opts","logger","declineByOldId","oldId","setState","prev","_dropRepl","restRepl","replacements","_dropRef","restRefreshing","refreshing","expired","checked","filter","id","info","declineByNewId","newId","warn","declineFromNotification","notif","_notif$metadata","_notif$metadata2","metadata","replacementId"],"sourceRoot":"../../../../../src","sources":["modules/openid/hooks/useDeclineReplacement.ts"],"mappings":"AAAA;AACA,SAASA,WAAW,QAAQ,OAAO;AACnC,SAASC,kBAAkB,EAAEC,0BAA0B,QAAQ,qBAAqB;AAQpF;AACA;AACA;AACA;AACA,OAAO,SAASC,qBAAqBA,CAACC,IAAa,GAAG,CAAC,CAAC,EAAE;EACxD,MAAM;IAAEC;EAAO,CAAC,GAAGD,IAAI;;EAEvB;AACF;AACA;EACE,MAAME,cAAc,GAAGN,WAAW,CAChC,MAAOO,KAAa,IAAK;IACvBN,kBAAkB,CAACO,QAAQ,CAAEC,IAAI,IAAK;MACpC;MACA,MAAM;QAAE,CAACF,KAAK,GAAGG,SAAS;QAAE,GAAGC;MAAS,CAAC,GAAGF,IAAI,CAACG,YAAY;MAC7D;MACA,MAAM;QAAE,CAACL,KAAK,GAAGM,QAAQ;QAAE,GAAGC;MAAe,CAAC,GAAGL,IAAI,CAACM,UAAU;MAChE,OAAO;QACL,GAAGN,IAAI;QACPO,OAAO,EAAEP,IAAI,CAACO,OAAO;QACrBC,OAAO,EAAER,IAAI,CAACQ,OAAO,CAACC,MAAM,CAAEC,EAAE,IAAKA,EAAE,KAAKZ,KAAK,CAAC;QAClDK,YAAY,EAAED,QAAQ;QACtBI,UAAU,EAAED;MACd,CAAC;IACH,CAAC,CAAC;IACFT,MAAM,aAANA,MAAM,eAANA,MAAM,CAAEe,IAAI,CAAC,2DAA2Db,KAAK,EAAE,CAAC;EAClF,CAAC,EACD,CAACF,MAAM,CACT,CAAC;;EAED;AACF;AACA;EACE,MAAMgB,cAAc,GAAGrB,WAAW,CAChC,MAAOsB,KAAa,IAAK;IACvB,MAAMf,KAAK,GAAGL,0BAA0B,CAACoB,KAAK,CAAC;IAC/C,IAAI,CAACf,KAAK,EAAE;MACVF,MAAM,aAANA,MAAM,eAANA,MAAM,CAAEkB,IAAI,CAAC,kDAAkDD,KAAK,EAAE,CAAC;MACvE;IACF;IACA,MAAMhB,cAAc,CAACC,KAAK,CAAC;EAC7B,CAAC,EACD,CAACD,cAAc,EAAED,MAAM,CACzB,CAAC;;EAED;AACF;AACA;EACE,MAAMmB,uBAAuB,GAAGxB,WAAW,CACzC,MAAOyB,KAAyB,IAAK;IAAA,IAAAC,eAAA,EAAAC,gBAAA;IACnC,MAAMpB,KAAK,GAAGkB,KAAK,aAALA,KAAK,gBAAAC,eAAA,GAALD,KAAK,CAAEG,QAAQ,cAAAF,eAAA,uBAAfA,eAAA,CAAiBnB,KAA2B;IAC1D,IAAIA,KAAK,EAAE;MACT,MAAMD,cAAc,CAACC,KAAK,CAAC;MAC3B;IACF;IACA,MAAMe,KAAK,GAAGG,KAAK,aAALA,KAAK,gBAAAE,gBAAA,GAALF,KAAK,CAAEG,QAAQ,cAAAD,gBAAA,uBAAfA,gBAAA,CAAiBE,aAAmC;IAClE,IAAIP,KAAK,EAAE;MACT,MAAMD,cAAc,CAACC,KAAK,CAAC;MAC3B;IACF;IACAjB,MAAM,aAANA,MAAM,eAANA,MAAM,CAAEkB,IAAI,CAAC,2DAA2D,CAAC;EAC3E,CAAC,EACD,CAACjB,cAAc,EAAEe,cAAc,EAAEhB,MAAM,CACzC,CAAC;EAED,OAAO;IAAEC,cAAc;IAAEe,cAAc;IAAEG;EAAwB,CAAC;AACpE","ignoreList":[]}
|
|
@@ -12,7 +12,7 @@ export const useExpiredNotifications = () => {
|
|
|
12
12
|
} = useDeclineReplacement({
|
|
13
13
|
logger
|
|
14
14
|
});
|
|
15
|
-
const build = useCallback(s => s.expired.filter(oldId => s.checked.includes(oldId)).map(oldId => {
|
|
15
|
+
const build = useCallback(s => s.expired.filter(oldId => s.checked.includes(oldId) && !s.replacements[oldId]).map(oldId => {
|
|
16
16
|
const lite = s.byId[oldId];
|
|
17
17
|
const n = {
|
|
18
18
|
type: OpenIDCustomNotificationType.CredentialExpired,
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["useCallback","useEffect","useState","credentialRegistry","OpenIDCustomNotificationType","TOKENS","useServices","useDeclineReplacement","useExpiredNotifications","items","setItems","logger","UTIL_LOGGER","declineByOldId","build","s","expired","filter","oldId","checked","includes","map","lite","byId","n","type","CredentialExpired","title","pageTitle","buttonTitle","description","createdAt","Date","onPressAction","onCloseAction","component","metadata","format","getState","unsub","subscribe"],"sourceRoot":"../../../../../src","sources":["modules/openid/hooks/useExpiredNotifications.ts"],"mappings":"AAAA;AACA,SAASA,WAAW,EAAEC,SAAS,EAAEC,QAAQ,QAAQ,OAAO;AACxD,SAASC,kBAAkB,QAAuB,qBAAqB;AAEvE,SAASC,4BAA4B,QAAQ,kBAAkB;AAC/D,SAASC,MAAM,EAAEC,WAAW,QAAQ,wBAAwB;AAC5D,SAASC,qBAAqB,QAAQ,yBAAyB;AAE/D,OAAO,MAAMC,uBAAuB,GAAGA,CAAA,KAA4B;EACjE,MAAM,CAACC,KAAK,EAAEC,QAAQ,CAAC,GAAGR,QAAQ,CAAuB,EAAE,CAAC;EAC5D,MAAM,CAACS,MAAM,CAAC,GAAGL,WAAW,CAAC,CAACD,MAAM,CAACO,WAAW,CAAC,CAAC;EAClD,MAAM;IAAEC;EAAe,CAAC,GAAGN,qBAAqB,CAAC;IAAEI;EAAO,CAAC,CAAC;EAE5D,MAAMG,KAAK,GAAGd,WAAW,CACtBe,CAAgB,IACfA,CAAC,CAACC,OAAO,CACNC,MAAM,CAAEC,KAAK,IAAKH,CAAC,CAACI,OAAO,CAACC,QAAQ,CAACF,KAAK,CAAC,CAAC,
|
|
1
|
+
{"version":3,"names":["useCallback","useEffect","useState","credentialRegistry","OpenIDCustomNotificationType","TOKENS","useServices","useDeclineReplacement","useExpiredNotifications","items","setItems","logger","UTIL_LOGGER","declineByOldId","build","s","expired","filter","oldId","checked","includes","replacements","map","lite","byId","n","type","CredentialExpired","title","pageTitle","buttonTitle","description","createdAt","Date","onPressAction","onCloseAction","component","metadata","format","getState","unsub","subscribe"],"sourceRoot":"../../../../../src","sources":["modules/openid/hooks/useExpiredNotifications.ts"],"mappings":"AAAA;AACA,SAASA,WAAW,EAAEC,SAAS,EAAEC,QAAQ,QAAQ,OAAO;AACxD,SAASC,kBAAkB,QAAuB,qBAAqB;AAEvE,SAASC,4BAA4B,QAAQ,kBAAkB;AAC/D,SAASC,MAAM,EAAEC,WAAW,QAAQ,wBAAwB;AAC5D,SAASC,qBAAqB,QAAQ,yBAAyB;AAE/D,OAAO,MAAMC,uBAAuB,GAAGA,CAAA,KAA4B;EACjE,MAAM,CAACC,KAAK,EAAEC,QAAQ,CAAC,GAAGR,QAAQ,CAAuB,EAAE,CAAC;EAC5D,MAAM,CAACS,MAAM,CAAC,GAAGL,WAAW,CAAC,CAACD,MAAM,CAACO,WAAW,CAAC,CAAC;EAClD,MAAM;IAAEC;EAAe,CAAC,GAAGN,qBAAqB,CAAC;IAAEI;EAAO,CAAC,CAAC;EAE5D,MAAMG,KAAK,GAAGd,WAAW,CACtBe,CAAgB,IACfA,CAAC,CAACC,OAAO,CACNC,MAAM,CAAEC,KAAK,IAAKH,CAAC,CAACI,OAAO,CAACC,QAAQ,CAACF,KAAK,CAAC,IAAI,CAACH,CAAC,CAACM,YAAY,CAACH,KAAK,CAAC,CAAC,CACtEI,GAAG,CAAEJ,KAAK,IAAK;IACd,MAAMK,IAAI,GAAGR,CAAC,CAACS,IAAI,CAACN,KAAK,CAAC;IAC1B,MAAMO,CAAqB,GAAG;MAC5BC,IAAI,EAAEtB,4BAA4B,CAACuB,iBAAiB;MACpDC,KAAK,EAAE,oBAAoB;MAC3BC,SAAS,EAAE,oBAAoB;MAC/BC,WAAW,EAAE,QAAQ;MACrBC,WAAW,EAAE,mFAAmF;MAChGC,SAAS,EAAE,IAAIC,IAAI,CAAC,CAAC;MACrBC,aAAa,EAAEA,CAAA,KAAM,CAAC,CAAC;MACvBC,aAAa,EAAEA,CAAA,KAAMtB,cAAc,CAACK,KAAK,CAAC;MAC1CkB,SAAS,EAAEA,CAAA,KAAM,IAAI;MACrBC,QAAQ,EAAE;QACRnB,KAAK;QACLoB,MAAM,EAAEf,IAAI,aAAJA,IAAI,uBAAJA,IAAI,CAAEe;MAChB;IACF,CAAC;IACD,OAAOb,CAAC;EACV,CAAC,CAAC,EACN,CAACZ,cAAc,CACjB,CAAC;EAEDZ,SAAS,CAAC,MAAM;IACdS,QAAQ,CAACI,KAAK,CAACX,kBAAkB,CAACoC,QAAQ,CAAC,CAAC,CAAC,CAAC;IAC9C,MAAMC,KAAK,GAAGrC,kBAAkB,CAACsC,SAAS,CAAE1B,CAAC,IAAKL,QAAQ,CAACI,KAAK,CAACC,CAAC,CAAC,CAAC,CAAC;IACrE,OAAOyB,KAAK;EACd,CAAC,EAAE,CAAC1B,KAAK,CAAC,CAAC;EAEX,OAAOL,KAAK;AACd,CAAC","ignoreList":[]}
|
|
@@ -3,82 +3,48 @@ import { useCallback } from 'react';
|
|
|
3
3
|
import { useNavigation } from '@react-navigation/native';
|
|
4
4
|
import { useAgent } from '@bifold/react-hooks';
|
|
5
5
|
import { Screens, Stacks } from '../../../types/navigators';
|
|
6
|
-
import { refreshAccessToken } from '../refresh/refreshToken';
|
|
7
|
-
import { reissueCredentialWithAccessToken } from '../refresh/reIssuance';
|
|
8
6
|
import { useOpenIDCredentials } from '../context/OpenIDCredentialRecordProvider';
|
|
9
|
-
import { credentialRegistry } from '../refresh/registry';
|
|
10
7
|
import { TOKENS, useServices } from '../../../container-api';
|
|
8
|
+
import { refreshAndQueueReplacement } from '../refresh/operations';
|
|
11
9
|
export const useUpgradeExpiredCredential = () => {
|
|
12
10
|
const navigation = useNavigation();
|
|
13
11
|
const {
|
|
14
12
|
agent
|
|
15
13
|
} = useAgent();
|
|
16
14
|
const {
|
|
17
|
-
|
|
15
|
+
getCredentialById
|
|
18
16
|
} = useOpenIDCredentials();
|
|
19
17
|
const [logger] = useServices([TOKENS.UTIL_LOGGER]);
|
|
20
18
|
const upgrade = useCallback(async oldId => {
|
|
21
|
-
var _newRecord$createdAt;
|
|
22
19
|
if (!agent) {
|
|
23
20
|
logger === null || logger === void 0 || logger.warn('⚠️ [Upgrade] Agent not ready, cannot upgrade credential');
|
|
24
21
|
return;
|
|
25
22
|
}
|
|
26
23
|
logger === null || logger === void 0 || logger.info(`🔁 [Upgrade] Starting upgrade flow for oldId=${oldId}`);
|
|
27
|
-
|
|
28
|
-
// 1. Load the “old” record
|
|
29
|
-
const byId = credentialRegistry.getState().byId[oldId];
|
|
30
|
-
if (!byId) {
|
|
31
|
-
logger === null || logger === void 0 || logger.warn(`⚠️ [Upgrade] No lite record for oldId=${oldId}`);
|
|
32
|
-
return;
|
|
33
|
-
}
|
|
34
|
-
|
|
35
|
-
// We try all three repos – you can refine this using byId.format if you want
|
|
36
|
-
const rec = await getSdJwtCredentialById(oldId);
|
|
24
|
+
const rec = await getCredentialById(oldId);
|
|
37
25
|
if (!rec) {
|
|
38
26
|
logger === null || logger === void 0 || logger.warn(`⚠️ [Upgrade] No full record found for oldId=${oldId}`);
|
|
39
27
|
return;
|
|
40
28
|
}
|
|
41
|
-
|
|
42
|
-
// 2. Use refresh token to get new access token
|
|
43
|
-
const token = await refreshAccessToken({
|
|
44
|
-
logger,
|
|
45
|
-
cred: rec,
|
|
46
|
-
agentContext: agent.context
|
|
47
|
-
});
|
|
48
|
-
if (!token) {
|
|
49
|
-
logger === null || logger === void 0 || logger.warn(`⚠️ [Upgrade] No refresh token available for oldId=${oldId}`);
|
|
50
|
-
return;
|
|
51
|
-
}
|
|
52
|
-
|
|
53
|
-
// 3. Re-issue credential using access token
|
|
54
|
-
const newRecord = await reissueCredentialWithAccessToken({
|
|
29
|
+
const newRecord = await refreshAndQueueReplacement({
|
|
55
30
|
agent,
|
|
56
31
|
logger,
|
|
57
|
-
record: rec
|
|
58
|
-
tokenResponse: token
|
|
32
|
+
record: rec
|
|
59
33
|
});
|
|
60
34
|
if (!newRecord) {
|
|
61
|
-
logger === null || logger === void 0 || logger.warn(`⚠️ [Upgrade]
|
|
35
|
+
logger === null || logger === void 0 || logger.warn(`⚠️ [Upgrade] Could not issue replacement for oldId=${oldId}`);
|
|
62
36
|
return;
|
|
63
37
|
}
|
|
64
38
|
logger === null || logger === void 0 || logger.info(`💾 [Upgrade] New credential issued ${newRecord.id} from oldId=${oldId}`);
|
|
65
39
|
|
|
66
|
-
//
|
|
67
|
-
credentialRegistry.getState().markExpiredWithReplacement(oldId, {
|
|
68
|
-
id: newRecord.id,
|
|
69
|
-
format: byId.format,
|
|
70
|
-
createdAt: (_newRecord$createdAt = newRecord.createdAt) === null || _newRecord$createdAt === void 0 ? void 0 : _newRecord$createdAt.toISOString(),
|
|
71
|
-
issuer: byId.issuer
|
|
72
|
-
});
|
|
73
|
-
|
|
74
|
-
// 5. Navigate to the OpenID offer screen, passing the new record directly
|
|
40
|
+
// Navigate to the OpenID offer screen, passing the new record directly
|
|
75
41
|
navigation.navigate(Stacks.ConnectionStack, {
|
|
76
42
|
screen: Screens.OpenIDCredentialOffer,
|
|
77
43
|
params: {
|
|
78
44
|
credential: newRecord
|
|
79
45
|
}
|
|
80
46
|
});
|
|
81
|
-
}, [agent, logger, navigation,
|
|
47
|
+
}, [agent, logger, navigation, getCredentialById]);
|
|
82
48
|
return {
|
|
83
49
|
upgrade
|
|
84
50
|
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["useCallback","useNavigation","useAgent","Screens","Stacks","
|
|
1
|
+
{"version":3,"names":["useCallback","useNavigation","useAgent","Screens","Stacks","useOpenIDCredentials","TOKENS","useServices","refreshAndQueueReplacement","useUpgradeExpiredCredential","navigation","agent","getCredentialById","logger","UTIL_LOGGER","upgrade","oldId","warn","info","rec","newRecord","record","id","navigate","ConnectionStack","screen","OpenIDCredentialOffer","params","credential"],"sourceRoot":"../../../../../src","sources":["modules/openid/hooks/useUpgradeExpiredCredential.ts"],"mappings":"AAAA;AACA,SAASA,WAAW,QAAQ,OAAO;AACnC,SAAyBC,aAAa,QAAQ,0BAA0B;AACxE,SAASC,QAAQ,QAAQ,qBAAqB;AAE9C,SAA0BC,OAAO,EAAEC,MAAM,QAAQ,2BAA2B;AAC5E,SAASC,oBAAoB,QAAQ,2CAA2C;AAChF,SAASC,MAAM,EAAEC,WAAW,QAAQ,wBAAwB;AAC5D,SAASC,0BAA0B,QAAQ,uBAAuB;AAElE,OAAO,MAAMC,2BAA2B,GAAGA,CAAA,KAAM;EAC/C,MAAMC,UAAU,GAAGT,aAAa,CAAkC,CAAC;EACnE,MAAM;IAAEU;EAAM,CAAC,GAAGT,QAAQ,CAAC,CAAC;EAC5B,MAAM;IAAEU;EAAkB,CAAC,GAAGP,oBAAoB,CAAC,CAAC;EACpD,MAAM,CAACQ,MAAM,CAAC,GAAGN,WAAW,CAAC,CAACD,MAAM,CAACQ,WAAW,CAAC,CAAC;EAElD,MAAMC,OAAO,GAAGf,WAAW,CACzB,MAAOgB,KAAa,IAAK;IACvB,IAAI,CAACL,KAAK,EAAE;MACVE,MAAM,aAANA,MAAM,eAANA,MAAM,CAAEI,IAAI,CAAC,yDAAyD,CAAC;MACvE;IACF;IAEAJ,MAAM,aAANA,MAAM,eAANA,MAAM,CAAEK,IAAI,CAAC,gDAAgDF,KAAK,EAAE,CAAC;IAErE,MAAMG,GAAG,GAAG,MAAMP,iBAAiB,CAACI,KAAK,CAAC;IAE1C,IAAI,CAACG,GAAG,EAAE;MACRN,MAAM,aAANA,MAAM,eAANA,MAAM,CAAEI,IAAI,CAAC,+CAA+CD,KAAK,EAAE,CAAC;MACpE;IACF;IAEA,MAAMI,SAAS,GAAG,MAAMZ,0BAA0B,CAAC;MACjDG,KAAK;MACLE,MAAM;MACNQ,MAAM,EAAEF;IACV,CAAC,CAAC;IAEF,IAAI,CAACC,SAAS,EAAE;MACdP,MAAM,aAANA,MAAM,eAANA,MAAM,CAAEI,IAAI,CAAC,sDAAsDD,KAAK,EAAE,CAAC;MAC3E;IACF;IAEAH,MAAM,aAANA,MAAM,eAANA,MAAM,CAAEK,IAAI,CAAC,sCAAsCE,SAAS,CAACE,EAAE,eAAeN,KAAK,EAAE,CAAC;;IAEtF;IACAN,UAAU,CAACa,QAAQ,CAACnB,MAAM,CAACoB,eAAe,EAAE;MAC1CC,MAAM,EAAEtB,OAAO,CAACuB,qBAAqB;MACrCC,MAAM,EAAE;QACNC,UAAU,EAAER;MACd;IACF,CAAC,CAAC;EACJ,CAAC,EACD,CAACT,KAAK,EAAEE,MAAM,EAAEH,UAAU,EAAEE,iBAAiB,CAC/C,CAAC;EAED,OAAO;IAAEG;EAAQ,CAAC;AACpB,CAAC","ignoreList":[]}
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import { W3cCredentialRecord, SdJwtVcRecord, MdocRecord, W3cCredentialRepository, SdJwtVcRepository, MdocRepository } from '@credo-ts/core';
|
|
1
|
+
import { W3cCredentialRecord, SdJwtVcRecord, MdocRecord, W3cV2CredentialRecord, W3cCredentialRepository, W3cV2CredentialRepository, SdJwtVcRepository, MdocRepository } from '@credo-ts/core';
|
|
2
2
|
export const openId4VcCredentialMetadataKey = '_bifold/openId4VcCredentialMetadata';
|
|
3
3
|
export const refreshCredentialMetadataKey = '_bifold/refreshCredentialMetadata';
|
|
4
4
|
export function extractOpenId4VcCredentialMetadata(credentialMetadata, serverMetadata) {
|
|
@@ -52,6 +52,8 @@ export function deleteRefreshCredentialMetadata(credentialRecord) {
|
|
|
52
52
|
export async function persistCredentialRecord(agentContext, record) {
|
|
53
53
|
if (record instanceof W3cCredentialRecord) {
|
|
54
54
|
await agentContext.dependencyManager.resolve(W3cCredentialRepository).update(agentContext, record);
|
|
55
|
+
} else if (record instanceof W3cV2CredentialRecord) {
|
|
56
|
+
await agentContext.dependencyManager.resolve(W3cV2CredentialRepository).update(agentContext, record);
|
|
55
57
|
} else if (record instanceof SdJwtVcRecord) {
|
|
56
58
|
await agentContext.dependencyManager.resolve(SdJwtVcRepository).update(agentContext, record);
|
|
57
59
|
} else if (record instanceof MdocRecord) {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["W3cCredentialRecord","SdJwtVcRecord","MdocRecord","W3cCredentialRepository","SdJwtVcRepository","MdocRepository","openId4VcCredentialMetadataKey","refreshCredentialMetadataKey","extractOpenId4VcCredentialMetadata","credentialMetadata","serverMetadata","credential","display","order","credential_subject","issuer","id","getOpenId4VcCredentialMetadata","credentialRecord","metadata","get","setOpenId4VcCredentialMetadata","set","getRefreshCredentialMetadata","setRefreshCredentialMetadata","deleteRefreshCredentialMetadata","delete","persistCredentialRecord","agentContext","record","dependencyManager","resolve","update","Error","markOpenIDCredentialStatus","status","refreshMetadata","lastCheckResult","temporaryMetaVanillaObject","notificationMetadata","undefined","tokenResponse"],"sourceRoot":"../../../../src","sources":["modules/openid/metadata.tsx"],"mappings":"AAAA,SACEA,mBAAmB,EACnBC,aAAa,EACbC,UAAU,
|
|
1
|
+
{"version":3,"names":["W3cCredentialRecord","SdJwtVcRecord","MdocRecord","W3cV2CredentialRecord","W3cCredentialRepository","W3cV2CredentialRepository","SdJwtVcRepository","MdocRepository","openId4VcCredentialMetadataKey","refreshCredentialMetadataKey","extractOpenId4VcCredentialMetadata","credentialMetadata","serverMetadata","credential","display","order","credential_subject","issuer","id","getOpenId4VcCredentialMetadata","credentialRecord","metadata","get","setOpenId4VcCredentialMetadata","set","getRefreshCredentialMetadata","setRefreshCredentialMetadata","deleteRefreshCredentialMetadata","delete","persistCredentialRecord","agentContext","record","dependencyManager","resolve","update","Error","markOpenIDCredentialStatus","status","refreshMetadata","lastCheckResult","temporaryMetaVanillaObject","notificationMetadata","undefined","tokenResponse"],"sourceRoot":"../../../../src","sources":["modules/openid/metadata.tsx"],"mappings":"AAAA,SACEA,mBAAmB,EACnBC,aAAa,EACbC,UAAU,EACVC,qBAAqB,EAErBC,uBAAuB,EACvBC,yBAAyB,EACzBC,iBAAiB,EACjBC,cAAc,QACT,gBAAgB;AAUvB,OAAO,MAAMC,8BAA8B,GAAG,qCAAqC;AACnF,OAAO,MAAMC,4BAA4B,GAAG,mCAAmC;AA2B/E,OAAO,SAASC,kCAAkCA,CAChDC,kBAAkG,EAClGC,cAAqF,EACxD;EAC7B,OAAO;IACLC,UAAU,EAAE;MACVC,OAAO,EAAEH,kBAAkB,CAACG,OAAO;MACnCC,KAAK,EAAEJ,kBAAkB,CAACI,KAAK;MAC/BC,kBAAkB,EAAEL,kBAAkB,CAACK;IACzC,CAAC;IACDC,MAAM,EAAE;MACNH,OAAO,EAAEF,cAAc,CAACE,OAAO;MAC/BI,EAAE,EAAEN,cAAc,CAACM;IACrB;EACF,CAAC;AACH;;AAEA;AACA;AACA;AACA,OAAO,SAASC,8BAA8BA,CAC5CC,gBAAwC,EACJ;EACpC,OAAOA,gBAAgB,CAACC,QAAQ,CAACC,GAAG,CAACd,8BAA8B,CAAC;AACtE;;AAEA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASe,8BAA8BA,CAC5CH,gBAAwC,EACxCC,QAAqC,EACrC;EACAD,gBAAgB,CAACC,QAAQ,CAACG,GAAG,CAAChB,8BAA8B,EAAEa,QAAQ,CAAC;AACzE;;AAEA;AACA;AACA;AACA,OAAO,SAASI,4BAA4BA,CAC1CL,gBAAwC,EACN;EAClC,OAAOA,gBAAgB,CAACC,QAAQ,CAACC,GAAG,CAACb,4BAA4B,CAAC;AACpE;;AAEA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASiB,4BAA4BA,CAC1CN,gBAAwC,EACxCC,QAAmC,EACnC;EACAD,gBAAgB,CAACC,QAAQ,CAACG,GAAG,CAACf,4BAA4B,EAAEY,QAAQ,CAAC;AACvE;AAEA,OAAO,SAASM,+BAA+BA,CAC7CP,gBAAwC,EACxC;EACAA,gBAAgB,CAACC,QAAQ,CAACO,MAAM,CAACnB,4BAA4B,CAAC;AAChE;AAEA,OAAO,eAAeoB,uBAAuBA,CAC3CC,YAA0B,EAC1BC,MAA8B,EAC9B;EACA,IAAIA,MAAM,YAAY/B,mBAAmB,EAAE;IACzC,MAAM8B,YAAY,CAACE,iBAAiB,CAACC,OAAO,CAAC7B,uBAAuB,CAAC,CAAC8B,MAAM,CAACJ,YAAY,EAAEC,MAAM,CAAC;EACpG,CAAC,MAAM,IAAIA,MAAM,YAAY5B,qBAAqB,EAAE;IAClD,MAAM2B,YAAY,CAACE,iBAAiB,CAACC,OAAO,CAAC5B,yBAAyB,CAAC,CAAC6B,MAAM,CAACJ,YAAY,EAAEC,MAAM,CAAC;EACtG,CAAC,MAAM,IAAIA,MAAM,YAAY9B,aAAa,EAAE;IAC1C,MAAM6B,YAAY,CAACE,iBAAiB,CAACC,OAAO,CAAC3B,iBAAiB,CAAC,CAAC4B,MAAM,CAACJ,YAAY,EAAEC,MAAM,CAAC;EAC9F,CAAC,MAAM,IAAIA,MAAM,YAAY7B,UAAU,EAAE;IACvC,MAAM4B,YAAY,CAACE,iBAAiB,CAACC,OAAO,CAAC1B,cAAc,CAAC,CAAC2B,MAAM,CAACJ,YAAY,EAAEC,MAAM,CAAC;EAC3F,CAAC,MAAM;IACL,MAAM,IAAII,KAAK,CAAC,oDAAoD,CAAC;EACvE;AACF;AAEA,OAAO,eAAeC,0BAA0BA,CAAC;EAC/CvB,UAAU;EACVwB,MAAM;EACNP;AAKF,CAAC,EAAE;EACD,MAAMQ,eAAe,GAAGb,4BAA4B,CAACZ,UAAU,CAAC;EAChE,IAAI,CAACyB,eAAe,EAAE;IACpB,MAAM,IAAIH,KAAK,CAAC,qDAAqD,CAAC;EACxE;EAEAG,eAAe,CAACC,eAAe,GAAGF,MAAM;EAExCX,4BAA4B,CAACb,UAAU,EAAEyB,eAAe,CAAC;;EAEzD;EACA,MAAMT,uBAAuB,CAACC,YAAY,EAAEjB,UAAU,CAAC;AACzD;AAEA,OAAO,MAAM2B,0BAAgE,GAAG;EAC9EC,oBAAoB,EAAEC,SAAS;EAC/BC,aAAa,EAAED;AACjB,CAAC","ignoreList":[]}
|
|
@@ -1,6 +1,21 @@
|
|
|
1
1
|
import { OpenId4VciCredentialFormatProfile } from '@credo-ts/openid4vc';
|
|
2
2
|
import { DidJwk, DidKey, Kms } from '@credo-ts/core';
|
|
3
3
|
import { extractOpenId4VcCredentialMetadata, setOpenId4VcCredentialMetadata } from './metadata';
|
|
4
|
+
const getCredentialConfigurationIdsToRequest = ({
|
|
5
|
+
resolvedCredentialOffer,
|
|
6
|
+
credentialConfigurationIdsToRequest
|
|
7
|
+
}) => {
|
|
8
|
+
const credentialConfigurationIds = credentialConfigurationIdsToRequest ?? [Object.keys(resolvedCredentialOffer.offeredCredentialConfigurations)[0]];
|
|
9
|
+
if (credentialConfigurationIds.length === 0 || !credentialConfigurationIds[0]) {
|
|
10
|
+
throw new Error('No credential configuration ID found in the credential offer.');
|
|
11
|
+
}
|
|
12
|
+
for (const credentialConfigurationId of credentialConfigurationIds) {
|
|
13
|
+
if (!resolvedCredentialOffer.offeredCredentialConfigurations[credentialConfigurationId]) {
|
|
14
|
+
throw new Error(`Parameter 'credentialConfigurationIdsToRequest' with values ${credentialConfigurationIdsToRequest} is not a credential_configuration_id in the credential offer.`);
|
|
15
|
+
}
|
|
16
|
+
}
|
|
17
|
+
return credentialConfigurationIds;
|
|
18
|
+
};
|
|
4
19
|
export const resolveOpenId4VciOffer = async ({
|
|
5
20
|
agent,
|
|
6
21
|
data,
|
|
@@ -22,7 +37,7 @@ export const resolveOpenId4VciOffer = async ({
|
|
|
22
37
|
});
|
|
23
38
|
const resolvedCredentialOffer = await agent.openid4vc.holder.resolveCredentialOffer(offerUri);
|
|
24
39
|
if (authorization) {
|
|
25
|
-
throw new Error('Authorization flow is not
|
|
40
|
+
throw new Error('Authorization code flow is not implemented in this OpenID credential offer flow.');
|
|
26
41
|
}
|
|
27
42
|
return resolvedCredentialOffer;
|
|
28
43
|
};
|
|
@@ -31,7 +46,7 @@ export async function acquirePreAuthorizedAccessToken({
|
|
|
31
46
|
resolvedCredentialOffer,
|
|
32
47
|
txCode
|
|
33
48
|
}) {
|
|
34
|
-
return await agent.
|
|
49
|
+
return await agent.openid4vc.holder.requestToken({
|
|
35
50
|
resolvedCredentialOffer,
|
|
36
51
|
txCode
|
|
37
52
|
});
|
|
@@ -45,13 +60,7 @@ export const customCredentialBindingResolver = async ({
|
|
|
45
60
|
proofTypes
|
|
46
61
|
}) => {
|
|
47
62
|
var _proofTypes$jwt;
|
|
48
|
-
// First, we try to pick a did method
|
|
49
|
-
// Prefer did:jwk, otherwise use did:key, otherwise use undefined
|
|
50
63
|
let didMethod = supportsAllDidMethods || supportedDidMethods !== null && supportedDidMethods !== void 0 && supportedDidMethods.includes('did:jwk') ? 'jwk' : supportedDidMethods !== null && supportedDidMethods !== void 0 && supportedDidMethods.includes('did:key') ? 'key' : undefined;
|
|
51
|
-
|
|
52
|
-
// If supportedDidMethods is undefined, and supportsJwk is false, we will default to did:key
|
|
53
|
-
// this is important as part of MATTR launchpad support which MUST use did:key but doesn't
|
|
54
|
-
// define which did methods they support
|
|
55
64
|
if (!supportedDidMethods && !supportsJwk) {
|
|
56
65
|
didMethod = 'key';
|
|
57
66
|
}
|
|
@@ -69,21 +78,20 @@ export const customCredentialBindingResolver = async ({
|
|
|
69
78
|
if (didResult.didState.state !== 'finished') {
|
|
70
79
|
throw new Error('DID creation failed.');
|
|
71
80
|
}
|
|
72
|
-
let
|
|
81
|
+
let didUrl;
|
|
73
82
|
if (didMethod === 'jwk') {
|
|
74
|
-
|
|
75
|
-
verificationMethodId = didJwk.verificationMethodId;
|
|
83
|
+
didUrl = DidJwk.fromDid(didResult.didState.did).verificationMethodId;
|
|
76
84
|
} else {
|
|
77
85
|
const didKey = DidKey.fromDid(didResult.didState.did);
|
|
78
|
-
|
|
86
|
+
didUrl = `${didKey.did}#${didKey.publicJwk.fingerprint}`;
|
|
79
87
|
}
|
|
80
88
|
return {
|
|
81
|
-
|
|
82
|
-
|
|
89
|
+
method: 'did',
|
|
90
|
+
didUrls: [didUrl]
|
|
83
91
|
};
|
|
84
92
|
}
|
|
85
93
|
|
|
86
|
-
//
|
|
94
|
+
// Fallback: plain jwk for sd-jwt/mdoc only
|
|
87
95
|
if (supportsJwk && (credentialFormat === OpenId4VciCredentialFormatProfile.SdJwtVc || credentialFormat === OpenId4VciCredentialFormatProfile.MsoMdoc)) {
|
|
88
96
|
return {
|
|
89
97
|
method: 'jwk',
|
|
@@ -97,31 +105,29 @@ export const receiveCredentialFromOpenId4VciOffer = async ({
|
|
|
97
105
|
resolvedCredentialOffer,
|
|
98
106
|
tokenResponse,
|
|
99
107
|
credentialConfigurationIdsToRequest,
|
|
100
|
-
clientId
|
|
101
|
-
pidSchemes
|
|
108
|
+
clientId
|
|
102
109
|
}) => {
|
|
103
|
-
const
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
}
|
|
110
|
+
const credentialConfigurationIds = getCredentialConfigurationIdsToRequest({
|
|
111
|
+
resolvedCredentialOffer,
|
|
112
|
+
credentialConfigurationIdsToRequest
|
|
113
|
+
});
|
|
107
114
|
const credentials = await agent.openid4vc.holder.requestCredentials({
|
|
108
115
|
resolvedCredentialOffer,
|
|
109
116
|
...tokenResponse,
|
|
110
117
|
clientId,
|
|
111
|
-
credentialConfigurationIds
|
|
118
|
+
credentialConfigurationIds,
|
|
112
119
|
verifyCredentialStatus: false,
|
|
113
120
|
allowedProofOfPossessionSignatureAlgorithms: [
|
|
114
121
|
// NOTE: MATTR launchpad for JFF MUST use EdDSA. So it is important that the default (first allowed one)
|
|
115
122
|
// is EdDSA. The list is ordered by preference, so if no suites are defined by the issuer, the first one
|
|
116
123
|
// will be used
|
|
117
|
-
|
|
124
|
+
'EdDSA', 'ES256'],
|
|
118
125
|
credentialBindingResolver: async ({
|
|
119
126
|
supportedDidMethods,
|
|
120
127
|
proofTypes,
|
|
121
128
|
supportsAllDidMethods,
|
|
122
129
|
supportsJwk,
|
|
123
|
-
credentialFormat
|
|
124
|
-
credentialConfigurationId
|
|
130
|
+
credentialFormat
|
|
125
131
|
}) => {
|
|
126
132
|
return customCredentialBindingResolver({
|
|
127
133
|
agent,
|
|
@@ -129,10 +135,7 @@ export const receiveCredentialFromOpenId4VciOffer = async ({
|
|
|
129
135
|
proofTypes,
|
|
130
136
|
supportsAllDidMethods,
|
|
131
137
|
supportsJwk,
|
|
132
|
-
credentialFormat
|
|
133
|
-
credentialConfigurationId,
|
|
134
|
-
resolvedCredentialOffer,
|
|
135
|
-
pidSchemes
|
|
138
|
+
credentialFormat
|
|
136
139
|
});
|
|
137
140
|
}
|
|
138
141
|
});
|
|
@@ -144,36 +147,9 @@ export const receiveCredentialFromOpenId4VciOffer = async ({
|
|
|
144
147
|
throw new Error('Error retrieving credential using pre authorized flow: firstCredential is string.');
|
|
145
148
|
}
|
|
146
149
|
const record = firstCredential.record;
|
|
147
|
-
|
|
148
|
-
|
|
149
|
-
|
|
150
|
-
// if ('compact' in firstCredential.) {
|
|
151
|
-
// // TODO: add claimFormat to SdJwtVc
|
|
152
|
-
// record = new SdJwtVcRecord({
|
|
153
|
-
// credentialInstances: firstCredential.credential.compact,
|
|
154
|
-
// })
|
|
155
|
-
// } else if (firstCredential.credential instanceof Mdoc) {
|
|
156
|
-
// record = new MdocRecord({
|
|
157
|
-
// mdoc: firstCredential.credential,
|
|
158
|
-
// })
|
|
159
|
-
// } else {
|
|
160
|
-
// record = new W3cCredentialRecord({
|
|
161
|
-
// credential: firstCredential.credential as W3cJwtVerifiableCredential | W3cJsonLdVerifiableCredential,
|
|
162
|
-
// // We don't support expanded types right now, but would become problem when we support JSON-LD
|
|
163
|
-
// tags: {},
|
|
164
|
-
// })
|
|
165
|
-
// }
|
|
166
|
-
|
|
167
|
-
// TODO: Confirm how this should be handled, notificationMetadata for openid4vc may have been removed
|
|
168
|
-
|
|
169
|
-
// const notificationMetadata = { ...firstCredential.notificationMetadata }
|
|
170
|
-
// if (notificationMetadata) {
|
|
171
|
-
// temporaryMetaVanillaObject.notificationMetadata = notificationMetadata
|
|
172
|
-
// }
|
|
173
|
-
|
|
174
|
-
const openId4VcMetadata = extractOpenId4VcCredentialMetadata(Object.values(resolvedCredentialOffer.offeredCredentialConfigurations)[0], {
|
|
150
|
+
const requestedCredentialConfiguration = resolvedCredentialOffer.offeredCredentialConfigurations[credentialConfigurationIds[0]];
|
|
151
|
+
const openId4VcMetadata = extractOpenId4VcCredentialMetadata(requestedCredentialConfiguration, {
|
|
175
152
|
id: resolvedCredentialOffer.metadata.credentialIssuer.credential_issuer,
|
|
176
|
-
// This might not be correct
|
|
177
153
|
display: resolvedCredentialOffer.metadata.credentialIssuer.display
|
|
178
154
|
});
|
|
179
155
|
setOpenId4VcCredentialMetadata(record, openId4VcMetadata);
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["OpenId4VciCredentialFormatProfile","DidJwk","DidKey","Kms","extractOpenId4VcCredentialMetadata","setOpenId4VcCredentialMetadata","resolveOpenId4VciOffer","agent","data","uri","authorization","offerUri","encodeURIComponent","JSON","stringify","
|
|
1
|
+
{"version":3,"names":["OpenId4VciCredentialFormatProfile","DidJwk","DidKey","Kms","extractOpenId4VcCredentialMetadata","setOpenId4VcCredentialMetadata","getCredentialConfigurationIdsToRequest","resolvedCredentialOffer","credentialConfigurationIdsToRequest","credentialConfigurationIds","Object","keys","offeredCredentialConfigurations","length","Error","credentialConfigurationId","resolveOpenId4VciOffer","agent","data","uri","authorization","offerUri","encodeURIComponent","JSON","stringify","config","logger","info","openid4vc","holder","resolveCredentialOffer","acquirePreAuthorizedAccessToken","txCode","requestToken","customCredentialBindingResolver","supportedDidMethods","supportsAllDidMethods","supportsJwk","credentialFormat","proofTypes","_proofTypes$jwt","didMethod","includes","undefined","key","kms","createKeyForSignatureAlgorithm","algorithm","jwt","supportedSignatureAlgorithms","publicJwk","PublicJwk","fromPublicJwk","didResult","dids","create","method","options","keyId","didState","state","didUrl","fromDid","did","verificationMethodId","didKey","fingerprint","didUrls","SdJwtVc","MsoMdoc","join","receiveCredentialFromOpenId4VciOffer","tokenResponse","clientId","credentials","requestCredentials","verifyCredentialStatus","allowedProofOfPossessionSignatureAlgorithms","credentialBindingResolver","firstCredential","record","requestedCredentialConfiguration","openId4VcMetadata","id","metadata","credentialIssuer","credential_issuer","display"],"sourceRoot":"../../../../src","sources":["modules/openid/offerResolve.tsx"],"mappings":"AAAA,SAGEA,iCAAiC,QAG5B,qBAAqB;AAC5B,SAAgBC,MAAM,EAAEC,MAAM,EAA4CC,GAAG,QAAQ,gBAAgB;AACrG,SAASC,kCAAkC,EAAEC,8BAA8B,QAAQ,YAAY;AAU/F,MAAMC,sCAAsC,GAAGA,CAAC;EAC9CC,uBAAuB;EACvBC;AAIF,CAAC,KAAK;EACJ,MAAMC,0BAA0B,GAAGD,mCAAmC,IAAI,CACxEE,MAAM,CAACC,IAAI,CAACJ,uBAAuB,CAACK,+BAA+B,CAAC,CAAC,CAAC,CAAC,CACxE;EAED,IAAIH,0BAA0B,CAACI,MAAM,KAAK,CAAC,IAAI,CAACJ,0BAA0B,CAAC,CAAC,CAAC,EAAE;IAC7E,MAAM,IAAIK,KAAK,CAAC,+DAA+D,CAAC;EAClF;EAEA,KAAK,MAAMC,yBAAyB,IAAIN,0BAA0B,EAAE;IAClE,IAAI,CAACF,uBAAuB,CAACK,+BAA+B,CAACG,yBAAyB,CAAC,EAAE;MACvF,MAAM,IAAID,KAAK,CACb,+DAA+DN,mCAAmC,gEACpG,CAAC;IACH;EACF;EAEA,OAAOC,0BAA0B;AACnC,CAAC;AAED,OAAO,MAAMO,sBAAsB,GAAG,MAAAA,CAAO;EAC3CC,KAAK;EACLC,IAAI;EACJC,GAAG;EACHC;AAQF,CAAC,KAAiD;EAChD,IAAIC,QAAQ,GAAGF,GAAG;EAElB,IAAI,CAACE,QAAQ,IAAIH,IAAI,EAAE;IACrB;IACA;IACAG,QAAQ,GAAG,8CAA8CC,kBAAkB,CAACC,IAAI,CAACC,SAAS,CAACN,IAAI,CAAC,CAAC,EAAE;EACrG,CAAC,MAAM,IAAI,CAACG,QAAQ,EAAE;IACpB,MAAM,IAAIP,KAAK,CAAC,qCAAqC,CAAC;EACxD;EAEAG,KAAK,CAACQ,MAAM,CAACC,MAAM,CAACC,IAAI,CAAC,wBAAwBN,QAAQ,EAAE,EAAE;IAC3DA,QAAQ;IACRH,IAAI,EAAEA,IAAI;IACVC,GAAG,EAAEE;EACP,CAAC,CAAC;EAEF,MAAMd,uBAAuB,GAAG,MAAMU,KAAK,CAACW,SAAS,CAACC,MAAM,CAACC,sBAAsB,CAACT,QAAQ,CAAC;EAE7F,IAAID,aAAa,EAAE;IACjB,MAAM,IAAIN,KAAK,CAAC,kFAAkF,CAAC;EACrG;EAEA,OAAOP,uBAAuB;AAChC,CAAC;AAED,OAAO,eAAewB,+BAA+BA,CAAC;EACpDd,KAAK;EACLV,uBAAuB;EACvByB;AAKF,CAAC,EAA2C;EAC1C,OAAO,MAAMf,KAAK,CAACW,SAAS,CAACC,MAAM,CAACI,YAAY,CAAC;IAC/C1B,uBAAuB;IACvByB;EACF,CAAC,CAAC;AACJ;AAEA,OAAO,MAAME,+BAA+B,GAAG,MAAAA,CAAO;EACpDjB,KAAK;EACLkB,mBAAmB;EACnBC,qBAAqB;EACrBC,WAAW;EACXC,gBAAgB;EAChBC;AACgC,CAAC,KAAgD;EAAA,IAAAC,eAAA;EACjF,IAAIC,SAAoC,GACtCL,qBAAqB,IAAID,mBAAmB,aAAnBA,mBAAmB,eAAnBA,mBAAmB,CAAEO,QAAQ,CAAC,SAAS,CAAC,GAC7D,KAAK,GACLP,mBAAmB,aAAnBA,mBAAmB,eAAnBA,mBAAmB,CAAEO,QAAQ,CAAC,SAAS,CAAC,GACtC,KAAK,GACLC,SAAS;EAEjB,IAAI,CAACR,mBAAmB,IAAI,CAACE,WAAW,EAAE;IACxCI,SAAS,GAAG,KAAK;EACnB;EAEA,MAAMG,GAAG,GAAG,MAAM3B,KAAK,CAAC4B,GAAG,CAACC,8BAA8B,CAAC;IACzDC,SAAS,EAAE,CAAAR,UAAU,aAAVA,UAAU,gBAAAC,eAAA,GAAVD,UAAU,CAAES,GAAG,cAAAR,eAAA,uBAAfA,eAAA,CAAiBS,4BAA4B,CAAC,CAAC,CAAC,KAAI;EACjE,CAAC,CAAC;EACF,MAAMC,SAAS,GAAG/C,GAAG,CAACgD,SAAS,CAACC,aAAa,CAACR,GAAG,CAACM,SAAS,CAAC;EAE5D,IAAIT,SAAS,EAAE;IACb,MAAMY,SAAS,GAAG,MAAMpC,KAAK,CAACqC,IAAI,CAACC,MAAM,CAA4C;MACnFC,MAAM,EAAEf,SAAS;MACjBgB,OAAO,EAAE;QACPC,KAAK,EAAEd,GAAG,CAACc;MACb;IACF,CAAC,CAAC;IAEF,IAAIL,SAAS,CAACM,QAAQ,CAACC,KAAK,KAAK,UAAU,EAAE;MAC3C,MAAM,IAAI9C,KAAK,CAAC,sBAAsB,CAAC;IACzC;IAEA,IAAI+C,MAAc;IAClB,IAAIpB,SAAS,KAAK,KAAK,EAAE;MACvBoB,MAAM,GAAG5D,MAAM,CAAC6D,OAAO,CAACT,SAAS,CAACM,QAAQ,CAACI,GAAG,CAAC,CAACC,oBAAoB;IACtE,CAAC,MAAM;MACL,MAAMC,MAAM,GAAG/D,MAAM,CAAC4D,OAAO,CAACT,SAAS,CAACM,QAAQ,CAACI,GAAG,CAAC;MACrDF,MAAM,GAAG,GAAGI,MAAM,CAACF,GAAG,IAAIE,MAAM,CAACf,SAAS,CAACgB,WAAW,EAAE;IAC1D;IAEA,OAAO;MACLV,MAAM,EAAE,KAAK;MACbW,OAAO,EAAE,CAACN,MAAM;IAClB,CAAC;EACH;;EAEA;EACA,IACExB,WAAW,KACVC,gBAAgB,KAAKtC,iCAAiC,CAACoE,OAAO,IAC7D9B,gBAAgB,KAAKtC,iCAAiC,CAACqE,OAAO,CAAC,EACjE;IACA,OAAO;MACLb,MAAM,EAAE,KAAK;MACb7C,IAAI,EAAE,CAACuC,SAAS,CAAC,CAAE;IACrB,CAAC;EACH;EAEA,MAAM,IAAIpC,KAAK,CACb,wIACEuB,WAAW,GAAG,OAAO,GAAG,EAAE,GACzB,CAAAF,mBAAmB,aAAnBA,mBAAmB,uBAAnBA,mBAAmB,CAAEmC,IAAI,CAAC,IAAI,CAAC,KAAI,SAAS,EACjD,CAAC;AACH,CAAC;AAED,OAAO,MAAMC,oCAAoC,GAAG,MAAAA,CAAO;EACzDtD,KAAK;EACLV,uBAAuB;EACvBiE,aAAa;EACbhE,mCAAmC;EACnCiE;AAOF,CAAC,KAAsC;EACrC,MAAMhE,0BAA0B,GAAGH,sCAAsC,CAAC;IACxEC,uBAAuB;IACvBC;EACF,CAAC,CAAC;EAEF,MAAMkE,WAAW,GAAG,MAAMzD,KAAK,CAACW,SAAS,CAACC,MAAM,CAAC8C,kBAAkB,CAAC;IAClEpE,uBAAuB;IACvB,GAAGiE,aAAa;IAChBC,QAAQ;IACRhE,0BAA0B;IAC1BmE,sBAAsB,EAAE,KAAK;IAC7BC,2CAA2C,EAAE;IAC3C;IACA;IACA;IACA,OAAO,EACP,OAAO,CACR;IACDC,yBAAyB,EAAE,MAAAA,CAAO;MAChC3C,mBAAmB;MACnBI,UAAU;MACVH,qBAAqB;MACrBC,WAAW;MACXC;IACkC,CAAC,KAAK;MACxC,OAAOJ,+BAA+B,CAAC;QACrCjB,KAAK;QACLkB,mBAAmB;QACnBI,UAAU;QACVH,qBAAqB;QACrBC,WAAW;QACXC;MACF,CAAC,CAAC;IACJ;EACF,CAAC,CAAC;;EAEF;EACA,MAAM,CAACyC,eAAe,CAAC,GAAGL,WAAW,CAACA,WAAW;EACjD,IAAI,CAACK,eAAe,EAClB,MAAM,IAAIjE,KAAK,CAAC,oFAAoF,CAAC;EAEvG,IAAI,OAAOiE,eAAe,KAAK,QAAQ,EAAE;IACvC,MAAM,IAAIjE,KAAK,CAAC,mFAAmF,CAAC;EACtG;EAEA,MAAMkE,MAAM,GAAGD,eAAe,CAACC,MAAM;EACrC,MAAMC,gCAAgC,GACpC1E,uBAAuB,CAACK,+BAA+B,CAACH,0BAA0B,CAAC,CAAC,CAAC,CAAC;EAExF,MAAMyE,iBAAiB,GAAG9E,kCAAkC,CAAC6E,gCAAgC,EAAS;IACpGE,EAAE,EAAE5E,uBAAuB,CAAC6E,QAAQ,CAACC,gBAAgB,CAACC,iBAAiB;IACvEC,OAAO,EAAEhF,uBAAuB,CAAC6E,QAAQ,CAACC,gBAAgB,CAACE;EAC7D,CAAC,CAAC;EAEFlF,8BAA8B,CAAC2E,MAAM,EAAEE,iBAAiB,CAAC;EAEzD,OAAOF,MAAM;AACf,CAAC","ignoreList":[]}
|
|
@@ -0,0 +1,31 @@
|
|
|
1
|
+
import { toOpenIDCredentialLite } from '../credentialRecord';
|
|
2
|
+
import { refreshAccessToken } from './refreshToken';
|
|
3
|
+
import { credentialRegistry } from './registry';
|
|
4
|
+
import { reissueCredentialWithAccessToken } from './reIssuance';
|
|
5
|
+
export async function refreshAndQueueReplacement({
|
|
6
|
+
agent,
|
|
7
|
+
logger,
|
|
8
|
+
record,
|
|
9
|
+
toLite = toOpenIDCredentialLite
|
|
10
|
+
}) {
|
|
11
|
+
const token = await refreshAccessToken({
|
|
12
|
+
logger,
|
|
13
|
+
cred: record,
|
|
14
|
+
agentContext: agent.context
|
|
15
|
+
});
|
|
16
|
+
if (!token) {
|
|
17
|
+
return undefined;
|
|
18
|
+
}
|
|
19
|
+
const newRecord = await reissueCredentialWithAccessToken({
|
|
20
|
+
agent,
|
|
21
|
+
logger,
|
|
22
|
+
record,
|
|
23
|
+
tokenResponse: token
|
|
24
|
+
});
|
|
25
|
+
if (!newRecord) {
|
|
26
|
+
return undefined;
|
|
27
|
+
}
|
|
28
|
+
credentialRegistry.getState().markExpiredWithReplacement(record.id, toLite(newRecord));
|
|
29
|
+
return newRecord;
|
|
30
|
+
}
|
|
31
|
+
//# sourceMappingURL=operations.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":["toOpenIDCredentialLite","refreshAccessToken","credentialRegistry","reissueCredentialWithAccessToken","refreshAndQueueReplacement","agent","logger","record","toLite","token","cred","agentContext","context","undefined","newRecord","tokenResponse","getState","markExpiredWithReplacement","id"],"sourceRoot":"../../../../../src","sources":["modules/openid/refresh/operations.ts"],"mappings":"AAEA,SAAiCA,sBAAsB,QAAQ,qBAAqB;AACpF,SAASC,kBAAkB,QAAQ,gBAAgB;AACnD,SAASC,kBAAkB,QAAQ,YAAY;AAC/C,SAASC,gCAAgC,QAAQ,cAAc;AAU/D,OAAO,eAAeC,0BAA0BA,CAAC;EAC/CC,KAAK;EACLC,MAAM;EACNC,MAAM;EACNC,MAAM,GAAGR;AACc,CAAC,EAAE;EAC1B,MAAMS,KAAK,GAAG,MAAMR,kBAAkB,CAAC;IAAEK,MAAM;IAAEI,IAAI,EAAEH,MAAM;IAAEI,YAAY,EAAEN,KAAK,CAACO;EAAQ,CAAC,CAAC;EAC7F,IAAI,CAACH,KAAK,EAAE;IACV,OAAOI,SAAS;EAClB;EAEA,MAAMC,SAAS,GAAG,MAAMX,gCAAgC,CAAC;IACvDE,KAAK;IACLC,MAAM;IACNC,MAAM;IACNQ,aAAa,EAAEN;EACjB,CAAC,CAAC;EAEF,IAAI,CAACK,SAAS,EAAE;IACd,OAAOD,SAAS;EAClB;EAEAX,kBAAkB,CAACc,QAAQ,CAAC,CAAC,CAACC,0BAA0B,CAACV,MAAM,CAACW,EAAE,EAAEV,MAAM,CAACM,SAAS,CAAC,CAAC;EACtF,OAAOA,SAAS;AAClB","ignoreList":[]}
|
|
@@ -6,8 +6,7 @@ export async function reissueCredentialWithAccessToken({
|
|
|
6
6
|
logger,
|
|
7
7
|
record,
|
|
8
8
|
tokenResponse,
|
|
9
|
-
clientId
|
|
10
|
-
pidSchemes
|
|
9
|
+
clientId
|
|
11
10
|
}) {
|
|
12
11
|
if (!record) {
|
|
13
12
|
throw new Error('No credential record provided for re-issuance.');
|
|
@@ -29,26 +28,23 @@ export async function reissueCredentialWithAccessToken({
|
|
|
29
28
|
logger.info('*** Starting to get new credential via re-issuance flow ***');
|
|
30
29
|
// Request a **new** credential using the *existing* configuration id
|
|
31
30
|
|
|
32
|
-
const creds = await agent.
|
|
31
|
+
const creds = await agent.openid4vc.holder.requestCredentials({
|
|
33
32
|
resolvedCredentialOffer,
|
|
34
33
|
accessToken: tokenResponse.access_token,
|
|
35
34
|
tokenType: tokenResponse.token_type || 'Bearer',
|
|
36
35
|
cNonce: tokenResponse.c_nonce,
|
|
37
36
|
clientId,
|
|
38
|
-
|
|
37
|
+
credentialConfigurationIds: [credentialConfigurationId],
|
|
39
38
|
verifyCredentialStatus: false,
|
|
40
39
|
// you’ll check after storing
|
|
41
40
|
allowedProofOfPossessionSignatureAlgorithms: ['EdDSA', 'ES256'],
|
|
42
41
|
credentialBindingResolver: async opts => customCredentialBindingResolver({
|
|
43
42
|
agent,
|
|
44
43
|
supportedDidMethods: opts.supportedDidMethods,
|
|
45
|
-
|
|
44
|
+
proofTypes: opts.proofTypes,
|
|
46
45
|
supportsAllDidMethods: opts.supportsAllDidMethods,
|
|
47
46
|
supportsJwk: opts.supportsJwk,
|
|
48
|
-
credentialFormat: opts.credentialFormat
|
|
49
|
-
// supportedCredentialId: opts.supportedCredentialId,
|
|
50
|
-
resolvedCredentialOffer: resolvedCredentialOffer,
|
|
51
|
-
pidSchemes
|
|
47
|
+
credentialFormat: opts.credentialFormat
|
|
52
48
|
})
|
|
53
49
|
});
|
|
54
50
|
logger.info('*** New credential received via re-issuance flow ***.');
|
|
@@ -70,7 +66,8 @@ export async function reissueCredentialWithAccessToken({
|
|
|
70
66
|
// })
|
|
71
67
|
// }
|
|
72
68
|
|
|
73
|
-
const
|
|
69
|
+
const requestedCredentialConfiguration = resolvedCredentialOffer.offeredCredentialConfigurations[credentialConfigurationId];
|
|
70
|
+
const openId4VcMetadata = extractOpenId4VcCredentialMetadata(requestedCredentialConfiguration, {
|
|
74
71
|
id: resolvedCredentialOffer.metadata.credentialIssuer.credential_issuer,
|
|
75
72
|
display: resolvedCredentialOffer.metadata.credentialIssuer.display
|
|
76
73
|
});
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["customCredentialBindingResolver","extractOpenId4VcCredentialMetadata","getRefreshCredentialMetadata","setOpenId4VcCredentialMetadata","setRefreshCredentialMetadata","RefreshStatus","reissueCredentialWithAccessToken","agent","logger","record","tokenResponse","clientId","
|
|
1
|
+
{"version":3,"names":["customCredentialBindingResolver","extractOpenId4VcCredentialMetadata","getRefreshCredentialMetadata","setOpenId4VcCredentialMetadata","setRefreshCredentialMetadata","RefreshStatus","reissueCredentialWithAccessToken","agent","logger","record","tokenResponse","clientId","Error","refreshMetaData","credentialConfigurationId","resolvedCredentialOffer","access_token","info","creds","openid4vc","holder","requestCredentials","accessToken","tokenType","token_type","cNonce","c_nonce","credentialConfigurationIds","verifyCredentialStatus","allowedProofOfPossessionSignatureAlgorithms","credentialBindingResolver","opts","supportedDidMethods","proofTypes","supportsAllDidMethods","supportsJwk","credentialFormat","firstCredential","credentials","newRecord","requestedCredentialConfiguration","offeredCredentialConfigurations","openId4VcMetadata","id","metadata","credentialIssuer","credential_issuer","display","refreshToken","refresh_token","lastCheckedAt","Date","now","lastCheckResult","Valid"],"sourceRoot":"../../../../../src","sources":["modules/openid/refresh/reIssuance.ts"],"mappings":"AASA,SAASA,+BAA+B,QAAQ,iBAAiB;AAEjE,SACEC,kCAAkC,EAClCC,4BAA4B,EAC5BC,8BAA8B,EAC9BC,4BAA4B,QACvB,aAAa;AACpB,SAASC,aAAa,QAAQ,SAAS;AAYvC,OAAO,eAAeC,gCAAgCA,CAAC;EACrDC,KAAK;EACLC,MAAM;EACNC,MAAM;EACNC,aAAa;EACbC;AAC2B,CAAC,EAA+C;EAC3E,IAAI,CAACF,MAAM,EAAE;IACX,MAAM,IAAIG,KAAK,CAAC,gDAAgD,CAAC;EACnE;EAEA,MAAMC,eAAe,GAAGX,4BAA4B,CAACO,MAAM,CAAC;EAC5D,IAAI,CAACI,eAAe,EAAE;IACpB,MAAM,IAAID,KAAK,CAAC,0DAA0D,CAAC;EAC7E;EACA,MAAM;IAAEE,yBAAyB;IAAEC;EAAwB,CAAC,GAAGF,eAAe;EAE9E,IAAI,CAACE,uBAAuB,EAAE;IAC5B,MAAM,IAAIH,KAAK,CAAC,6EAA6E,CAAC;EAChG;EAEA,IAAI,CAACF,aAAa,CAACM,YAAY,EAAE;IAC/B,MAAM,IAAIJ,KAAK,CAAC,8DAA8D,CAAC;EACjF;EAEAJ,MAAM,CAACS,IAAI,CAAC,6DAA6D,CAAC;EAC1E;;EAQA,MAAMC,KAAe,GAAG,MAAMX,KAAK,CAACY,SAAS,CAACC,MAAM,CAACC,kBAAkB,CAAC;IACtEN,uBAAuB;IACvBO,WAAW,EAAEZ,aAAa,CAACM,YAAY;IACvCO,SAAS,EAAEb,aAAa,CAACc,UAAU,IAAI,QAAQ;IAC/CC,MAAM,EAAEf,aAAa,CAACgB,OAAO;IAC7Bf,QAAQ;IACRgB,0BAA0B,EAAE,CAACb,yBAAyB,CAAC;IACvDc,sBAAsB,EAAE,KAAK;IAAE;IAC/BC,2CAA2C,EAAE,CAAC,OAAO,EAAE,OAAO,CAAC;IAC/DC,yBAAyB,EAAE,MAAOC,IAAwC,IACxE/B,+BAA+B,CAAC;MAC9BO,KAAK;MACLyB,mBAAmB,EAAED,IAAI,CAACC,mBAAmB;MAC7CC,UAAU,EAAEF,IAAI,CAACE,UAAU;MAC3BC,qBAAqB,EAAEH,IAAI,CAACG,qBAAqB;MACjDC,WAAW,EAAEJ,IAAI,CAACI,WAAW;MAC7BC,gBAAgB,EAAEL,IAAI,CAACK;IACzB,CAAC;EACL,CAAC,CAAC;EAEF5B,MAAM,CAACS,IAAI,CAAC,uDAAuD,CAAC;;EAEpE;EACA,MAAM,CAACoB,eAAe,CAAC,GAAGnB,KAAK,CAACoB,WAAW;EAC3C,IAAI,CAACD,eAAe,IAAI,OAAOA,eAAe,KAAK,QAAQ,EAAE;IAC3D,MAAM,IAAIzB,KAAK,CAAC,+DAA+D,CAAC;EAClF;EAEA,MAAM2B,SAAiC,GAAGF,eAAe,CAAC5B,MAAM;EAChE;EACA;EACA;EACA;EACA;EACA;EACA;EACA;EACA;EACA;;EAEA,MAAM+B,gCAAgC,GACpCzB,uBAAuB,CAAC0B,+BAA+B,CAAC3B,yBAAyB,CAAC;EAEpF,MAAM4B,iBAAiB,GAAGzC,kCAAkC,CAACuC,gCAAgC,EAAS;IACpGG,EAAE,EAAE5B,uBAAuB,CAAC6B,QAAQ,CAACC,gBAAgB,CAACC,iBAAiB;IACvEC,OAAO,EAAEhC,uBAAuB,CAAC6B,QAAQ,CAACC,gBAAgB,CAACE;EAC7D,CAAC,CAAC;EAEF5C,8BAA8B,CAACoC,SAAS,EAAEG,iBAAiB,CAAC;EAE5DtC,4BAA4B,CAACmC,SAAS,EAAE;IACtC,GAAG1B,eAAe;IAClBmC,YAAY,EAAEtC,aAAa,CAACuC,aAAa,IAAIpC,eAAe,CAACmC,YAAY;IACzEE,aAAa,EAAEC,IAAI,CAACC,GAAG,CAAC,CAAC;IACzBC,eAAe,EAAEhD,aAAa,CAACiD;EACjC,CAAC,CAAC;EAEF,OAAOf,SAAS;AAClB","ignoreList":[]}
|