@cef-ebsi/cli 1.0.0-alpha.4 → 1.0.0-alpha.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (74) hide show
  1. package/LICENSE +189 -189
  2. package/bin/cli.js +0 -0
  3. package/dist/abi/pilot/TnTV1.js +1375 -0
  4. package/dist/abi/pilot/TnTV1.js.map +1 -0
  5. package/dist/abi/test/TnTV1.js +1375 -0
  6. package/dist/abi/test/TnTV1.js.map +1 -0
  7. package/dist/app.js +5 -1
  8. package/dist/app.js.map +1 -1
  9. package/dist/buildParam/index.js +4 -0
  10. package/dist/buildParam/index.js.map +1 -1
  11. package/dist/buildParam/tntV1.js +181 -0
  12. package/dist/buildParam/tntV1.js.map +1 -0
  13. package/dist/commands/authorisation-v4.js +3 -1
  14. package/dist/commands/authorisation-v4.js.map +1 -1
  15. package/dist/commands/compute.js +1 -1
  16. package/dist/commands/compute.js.map +1 -1
  17. package/dist/commands/ledger-v4.js +25 -5
  18. package/dist/commands/ledger-v4.js.map +1 -1
  19. package/dist/config.js +41 -3
  20. package/dist/config.js.map +1 -1
  21. package/dist/scripts/accreditAndAuthorize/conformance/step1 +34 -34
  22. package/dist/scripts/accreditAndAuthorize/conformance/step2 +17 -17
  23. package/dist/scripts/accreditAndAuthorize/conformance/step3 +8 -8
  24. package/dist/scripts/accreditAndAuthorize/conformance/step4 +26 -26
  25. package/dist/scripts/accreditAndAuthorize/conformance/step5 +12 -12
  26. package/dist/scripts/accreditAndAuthorize/conformance/step6 +13 -13
  27. package/dist/scripts/accreditAndAuthorize/conformance/step7 +6 -6
  28. package/dist/scripts/accreditAndAuthorize/test/step1 +34 -34
  29. package/dist/scripts/accreditAndAuthorize/test/step2 +17 -17
  30. package/dist/scripts/accreditAndAuthorize/test/step3 +8 -8
  31. package/dist/scripts/accreditAndAuthorize/test/step4 +26 -26
  32. package/dist/scripts/accreditAndAuthorize/test/step5 +12 -12
  33. package/dist/scripts/accreditAndAuthorize/test/step6 +13 -13
  34. package/dist/scripts/accreditAndAuthorize/test/step7 +6 -6
  35. package/dist/scripts/accreditTI +20 -20
  36. package/dist/scripts/assets/CTRevocableCredential.json +29 -29
  37. package/dist/scripts/assets/CredentialToAttestVerifiableAuthorisationForTrustChain.json +28 -28
  38. package/dist/scripts/assets/VerifiableAccreditationToAccredit.json +35 -35
  39. package/dist/scripts/assets/VerifiableAccreditationToAttest.json +32 -32
  40. package/dist/scripts/assets/VerifiableAuthorisationForTrustChain.json +21 -21
  41. package/dist/scripts/assets/VerifiableAuthorisationToOnboard.json +23 -23
  42. package/dist/scripts/bootstrap/0a-loadTPROperator +5 -5
  43. package/dist/scripts/bootstrap/0b-loadAdmin +8 -8
  44. package/dist/scripts/bootstrap/1-populateTPR +112 -112
  45. package/dist/scripts/bootstrap/2-populateDID +5 -5
  46. package/dist/scripts/bootstrap/3-populateTAR +28 -26
  47. package/dist/scripts/bootstrap/4-populateTimestamp +8 -8
  48. package/dist/scripts/bootstrap/5-populateTIR +9 -9
  49. package/dist/scripts/bootstrap/6-populateTSR +81 -81
  50. package/dist/scripts/bootstrap/7-setupConformanceIssuer +34 -34
  51. package/dist/scripts/initializeContracts +5 -5
  52. package/dist/scripts/issueVcOnboard +9 -9
  53. package/dist/scripts/issueVcRootTAO +11 -11
  54. package/dist/scripts/issueVcTAO +12 -12
  55. package/dist/scripts/issueVcTI +12 -12
  56. package/dist/scripts/issue_CTRevocableCredential +12 -12
  57. package/dist/scripts/issue_SelfAttestationSupportOffice +10 -10
  58. package/dist/scripts/issue_VerifiableAccreditationToAccredit +11 -11
  59. package/dist/scripts/issue_VerifiableAccreditationToAttest +11 -11
  60. package/dist/scripts/issue_VerifiableAuthorisationForTrustChain +10 -10
  61. package/dist/scripts/issue_VerifiableAuthorisationToOnboard +9 -9
  62. package/dist/scripts/preregisterIssuer +6 -6
  63. package/dist/scripts/registerDidDocument_ES256K +5 -0
  64. package/dist/scripts/registerDidDocument_ES256K_ES256 +13 -13
  65. package/dist/scripts/registerIssuer +6 -6
  66. package/dist/scripts/wctv3/accreditAndAuthorize +105 -105
  67. package/dist/scripts/wctv3/holderWallet +38 -38
  68. package/dist/scripts/wctv3/issueToHolder +36 -36
  69. package/dist/scripts/wctv3/pda1 +1 -1
  70. package/dist/scripts/wctv3/verifier +6 -6
  71. package/dist/tsconfig.tsbuildinfo +1 -1
  72. package/dist/utils/http.js +5 -0
  73. package/dist/utils/http.js.map +1 -1
  74. package/package.json +99 -97
@@ -1,27 +1,27 @@
1
- # request VerifiableAccreditationToAccredit (TAO)
2
- vcTAO: conformance getCredential tao
3
-
4
- # register the credential for TAO
5
- t: authorisation auth tir_write_presentation ES256
6
- using token t.access_token
7
- tir setAttributeData myIssuer.did vcTAO.reservedAttributeId vcTAO.vc
8
- set vcTAO.url https://api-test.ebsi.eu/trusted-issuers-registry/v4/issuers/ myIssuer.did /attributes/ vcTAO.reservedAttributeId
9
- set user.accreditationUrl vcTAO.url
10
- conformance clientMockInitiate
11
-
12
- # Go to https://api-test.ebsi.eu/docs/wallet-conformance/accredit-authorise/flow
13
- # and validate the following tests:
14
- #
15
- # - Request VerifiableAccreditationToAccredit
16
- # - Request VerifiableAccreditationToAccredit
17
- # - Register VerifiableAccreditationToAccredit into the Trusted Issuers Registry
18
- # - Register VerifiableAccreditationToAccredit into the Trusted Issuers Registry
19
- # - Issue VerifiableAuthorisationToOnboard for Conformance Issuer's sub-account DID
20
- # - Issue VerifiableAuthorisationToOnboard for Conformance Issuer's sub-account DID
21
- # - Validate the issuance was correct
22
- # - Issue VerifiableAccreditationToAttest for sub-account DID
23
- # - Issue VerifiableAccreditationToAttest for sub-account DID
24
- # - Validate the issuance was correct
25
- # - Issue VerifiableAccreditationToAccredit for sub-account DID
26
- # - Issue VerifiableAccreditationToAccredit for sub-account DID
1
+ # request VerifiableAccreditationToAccredit (TAO)
2
+ vcTAO: conformance getCredential tao
3
+
4
+ # register the credential for TAO
5
+ t: authorisation auth tir_write_presentation ES256
6
+ using token t.access_token
7
+ tir setAttributeData myIssuer.did vcTAO.reservedAttributeId vcTAO.vc
8
+ set vcTAO.url https://api-test.ebsi.eu/trusted-issuers-registry/v4/issuers/ myIssuer.did /attributes/ vcTAO.reservedAttributeId
9
+ set user.accreditationUrl vcTAO.url
10
+ conformance clientMockInitiate
11
+
12
+ # Go to https://api-test.ebsi.eu/docs/wallet-conformance/accredit-authorise/flow
13
+ # and validate the following tests:
14
+ #
15
+ # - Request VerifiableAccreditationToAccredit
16
+ # - Request VerifiableAccreditationToAccredit
17
+ # - Register VerifiableAccreditationToAccredit into the Trusted Issuers Registry
18
+ # - Register VerifiableAccreditationToAccredit into the Trusted Issuers Registry
19
+ # - Issue VerifiableAuthorisationToOnboard for Conformance Issuer's sub-account DID
20
+ # - Issue VerifiableAuthorisationToOnboard for Conformance Issuer's sub-account DID
21
+ # - Validate the issuance was correct
22
+ # - Issue VerifiableAccreditationToAttest for sub-account DID
23
+ # - Issue VerifiableAccreditationToAttest for sub-account DID
24
+ # - Validate the issuance was correct
25
+ # - Issue VerifiableAccreditationToAccredit for sub-account DID
26
+ # - Issue VerifiableAccreditationToAccredit for sub-account DID
27
27
  # - Validate the issuance was correct
@@ -1,13 +1,13 @@
1
- # revoke credential issued to subaccount
2
- subaccount: compute subaccountDid myIssuer.did
3
- attributes: tir get /issuers/ subaccount /attributes
4
- t: authorisation auth tir_write_presentation ES256
5
- using token t.access_token
6
- tir setAttributeMetadata subaccount attributes.items.0.id revoked myIssuer.did vcTAO.reservedAttributeId
7
- tir setAttributeMetadata subaccount attributes.items.1.id revoked myIssuer.did vcTAO.reservedAttributeId
8
-
9
- # Go to https://api-test.ebsi.eu/docs/wallet-conformance/accredit-authorise/flow
10
- # and validate the following tests:
11
- #
12
- # - Revoke accreditations from sub-account DID
1
+ # revoke credential issued to subaccount
2
+ subaccount: compute subaccountDid myIssuer.did
3
+ attributes: tir get /issuers/ subaccount /attributes
4
+ t: authorisation auth tir_write_presentation ES256
5
+ using token t.access_token
6
+ tir setAttributeMetadata subaccount attributes.items.0.id revoked myIssuer.did vcTAO.reservedAttributeId
7
+ tir setAttributeMetadata subaccount attributes.items.1.id revoked myIssuer.did vcTAO.reservedAttributeId
8
+
9
+ # Go to https://api-test.ebsi.eu/docs/wallet-conformance/accredit-authorise/flow
10
+ # and validate the following tests:
11
+ #
12
+ # - Revoke accreditations from sub-account DID
13
13
  # - Revoke accreditations from sub-account DID
@@ -1,14 +1,14 @@
1
- # request VerifiableAuthorisationForTrustChain (Root TAO)
2
- vcRootTAO: conformance getCredential roottao ES256 vcOnboard.vc
3
-
4
- # register the credential for RootTAO
5
- t: authorisation auth tir_write_presentation ES256
6
- using token t.access_token
7
- tir setAttributeData myIssuer.did vcRootTAO.reservedAttributeId vcRootTAO.vc
8
-
9
- # Go to https://api-test.ebsi.eu/docs/wallet-conformance/accredit-authorise/flow
10
- # and validate the following tests:
11
- #
12
- # - Request VerifiableAuthorisationForTrustChain
13
- # - Request VerifiableAuthorisationForTrustChain
1
+ # request VerifiableAuthorisationForTrustChain (Root TAO)
2
+ vcRootTAO: conformance getCredential roottao ES256 vcOnboard.vc
3
+
4
+ # register the credential for RootTAO
5
+ t: authorisation auth tir_write_presentation ES256
6
+ using token t.access_token
7
+ tir setAttributeData myIssuer.did vcRootTAO.reservedAttributeId vcRootTAO.vc
8
+
9
+ # Go to https://api-test.ebsi.eu/docs/wallet-conformance/accredit-authorise/flow
10
+ # and validate the following tests:
11
+ #
12
+ # - Request VerifiableAuthorisationForTrustChain
13
+ # - Request VerifiableAuthorisationForTrustChain
14
14
  # - Register VerifiableAuthorisationForTrustChain into the Trusted Issuers Registry
@@ -1,7 +1,7 @@
1
- # request CTAAQualificationCredential
2
- ctaaQualification: conformance getCredential qualification
3
-
4
- # Go to https://api-test.ebsi.eu/docs/wallet-conformance/accredit-authorise/flow
5
- # and validate the following tests:
6
- #
1
+ # request CTAAQualificationCredential
2
+ ctaaQualification: conformance getCredential qualification
3
+
4
+ # Go to https://api-test.ebsi.eu/docs/wallet-conformance/accredit-authorise/flow
5
+ # and validate the following tests:
6
+ #
7
7
  # - Request CTAAQualificationCredential from Conformance Issuer
@@ -1,21 +1,21 @@
1
- # load tao
2
- using user null
3
- using user ES256K did1 PRIVATE_KEY_ES256K_TAO DID_TAO
4
- using user ES256 did1 PRIVATE_KEY_ES256_TAO DID_TAO
5
- set taoPrivateKeyES256K user.privateKeyHex
6
- set taoPrivateKeyES256 user.keys.ES256.privateKeyJwk
7
- set taoDid user.did
8
-
9
- # create accreditation to attest
10
- payloadVcTI: load assets/VerifiableAccreditationToAttest.json
11
- set payloadVcTI.issuer taoDid
12
- set payloadVcTI.credentialSubject.id NEW_ISSUER_DID
13
- set payloadVcTI.credentialSchema.id CREDENTIAL_SCHEMA_ID
14
- set payloadVcTI.termsOfUse.id ACCREDITATION_TAO
15
- vcTI: compute createVcJwt payloadVcTI {} ES256
16
-
17
- # preregister the new issuer
18
- tTao: authorisation auth tir_write_presentation ES256K
19
- using token tTao.access_token
20
- attributeIdTI: compute randomID
1
+ # load tao
2
+ using user null
3
+ using user ES256K did1 PRIVATE_KEY_ES256K_TAO DID_TAO
4
+ using user ES256 did1 PRIVATE_KEY_ES256_TAO DID_TAO
5
+ set taoPrivateKeyES256K user.privateKeyHex
6
+ set taoPrivateKeyES256 user.keys.ES256.privateKeyJwk
7
+ set taoDid user.did
8
+
9
+ # create accreditation to attest
10
+ payloadVcTI: load assets/VerifiableAccreditationToAttest.json
11
+ set payloadVcTI.issuer taoDid
12
+ set payloadVcTI.credentialSubject.id NEW_ISSUER_DID
13
+ set payloadVcTI.credentialSchema.id CREDENTIAL_SCHEMA_ID
14
+ set payloadVcTI.termsOfUse.id ACCREDITATION_TAO
15
+ vcTI: compute createVcJwt payloadVcTI {} ES256
16
+
17
+ # preregister the new issuer
18
+ tTao: authorisation auth tir_write_presentation ES256K
19
+ using token tTao.access_token
20
+ attributeIdTI: compute randomID
21
21
  tir setAttributeMetadata NEW_ISSUER_DID attributeIdTI ti taoDid ACCREDITATION_ID_TAO
@@ -1,30 +1,30 @@
1
- {
2
- "@context": [
3
- "https://www.w3.org/2018/credentials/v1"
4
- ],
5
- "type": [
6
- "VerifiableCredential",
7
- "VerifiableAttestation",
8
- "CTRevocable"
9
- ],
10
- "issuer": "",
11
- "credentialSubject": {
12
- "id": ""
13
- },
14
- "credentialStatus": {
15
- "id": "",
16
- "type": "StatusList2021Entry",
17
- "statusPurpose": "revocation",
18
- "statusListIndex": "",
19
- "statusListCredential": ""
20
- },
21
- "termsOfUse": {
22
- "id": "",
23
- "type": "IssuanceCertificate"
24
-
25
- },
26
- "credentialSchema": {
27
- "id": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM",
28
- "type": "FullJsonSchemaValidator2021"
29
- }
1
+ {
2
+ "@context": [
3
+ "https://www.w3.org/2018/credentials/v1"
4
+ ],
5
+ "type": [
6
+ "VerifiableCredential",
7
+ "VerifiableAttestation",
8
+ "CTRevocable"
9
+ ],
10
+ "issuer": "",
11
+ "credentialSubject": {
12
+ "id": ""
13
+ },
14
+ "credentialStatus": {
15
+ "id": "",
16
+ "type": "StatusList2021Entry",
17
+ "statusPurpose": "revocation",
18
+ "statusListIndex": "",
19
+ "statusListCredential": ""
20
+ },
21
+ "termsOfUse": {
22
+ "id": "",
23
+ "type": "IssuanceCertificate"
24
+
25
+ },
26
+ "credentialSchema": {
27
+ "id": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM",
28
+ "type": "FullJsonSchemaValidator2021"
29
+ }
30
30
  }
@@ -1,29 +1,29 @@
1
- {
2
- "@context": [
3
- "https://www.w3.org/2018/credentials/v1"
4
- ],
5
- "type": [
6
- "VerifiableCredential",
7
- "VerifiableAttestation",
8
- "VerifiableAccreditation",
9
- "VerifiableAccreditationToAttest"
10
- ],
11
- "issuer": "",
12
- "credentialSubject": {
13
- "id": "",
14
- "accreditedFor": [
15
- {
16
- "schemaId": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM",
17
- "types": [
18
- "VerifiableCredential",
19
- "VerifiableAttestation",
20
- "VerifiableAuthorisationForTrustChain"
21
- ]
22
- }
23
- ]
24
- },
25
- "credentialSchema": {
26
- "id": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/zjVFNvbEBPAr3a724DttioZpgZmNr75BBtRzZqk7pkDe",
27
- "type": "FullJsonSchemaValidator2021"
28
- }
1
+ {
2
+ "@context": [
3
+ "https://www.w3.org/2018/credentials/v1"
4
+ ],
5
+ "type": [
6
+ "VerifiableCredential",
7
+ "VerifiableAttestation",
8
+ "VerifiableAccreditation",
9
+ "VerifiableAccreditationToAttest"
10
+ ],
11
+ "issuer": "",
12
+ "credentialSubject": {
13
+ "id": "",
14
+ "accreditedFor": [
15
+ {
16
+ "schemaId": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM",
17
+ "types": [
18
+ "VerifiableCredential",
19
+ "VerifiableAttestation",
20
+ "VerifiableAuthorisationForTrustChain"
21
+ ]
22
+ }
23
+ ]
24
+ },
25
+ "credentialSchema": {
26
+ "id": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/zjVFNvbEBPAr3a724DttioZpgZmNr75BBtRzZqk7pkDe",
27
+ "type": "FullJsonSchemaValidator2021"
28
+ }
29
29
  }
@@ -1,35 +1,35 @@
1
- {
2
- "@context": ["https://www.w3.org/2018/credentials/v1"],
3
- "id": "urn:uuid:8568b525-a24e-4bc0-9d97-6a8459ec0130",
4
- "type": [
5
- "VerifiableCredential",
6
- "VerifiableAttestation",
7
- "VerifiableAccreditation",
8
- "VerifiableAccreditationToAccredit"
9
- ],
10
- "issuer": "",
11
- "credentialSubject": {
12
- "id": "",
13
- "accreditedFor": [
14
- {
15
- "schemaId": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM",
16
- "types": [
17
- "VerifiableCredential",
18
- "VerifiableAttestation",
19
- "CTRevocable"
20
- ],
21
- "limitJurisdiction": "https://publications.europa.eu/resource/authority/atu/FIN"
22
- }
23
- ]
24
- },
25
- "termsOfUse": [
26
- {
27
- "id": "",
28
- "type": "IssuanceCertificate"
29
- }
30
- ],
31
- "credentialSchema": {
32
- "id": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/zjVFNvbEBPAr3a724DttioZpgZmNr75BBtRzZqk7pkDe",
33
- "type": "FullJsonSchemaValidator2021"
34
- }
35
- }
1
+ {
2
+ "@context": ["https://www.w3.org/2018/credentials/v1"],
3
+ "id": "urn:uuid:8568b525-a24e-4bc0-9d97-6a8459ec0130",
4
+ "type": [
5
+ "VerifiableCredential",
6
+ "VerifiableAttestation",
7
+ "VerifiableAccreditation",
8
+ "VerifiableAccreditationToAccredit"
9
+ ],
10
+ "issuer": "",
11
+ "credentialSubject": {
12
+ "id": "",
13
+ "accreditedFor": [
14
+ {
15
+ "schemaId": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM",
16
+ "types": [
17
+ "VerifiableCredential",
18
+ "VerifiableAttestation",
19
+ "CTRevocable"
20
+ ],
21
+ "limitJurisdiction": "https://publications.europa.eu/resource/authority/atu/FIN"
22
+ }
23
+ ]
24
+ },
25
+ "termsOfUse": [
26
+ {
27
+ "id": "",
28
+ "type": "IssuanceCertificate"
29
+ }
30
+ ],
31
+ "credentialSchema": {
32
+ "id": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/zjVFNvbEBPAr3a724DttioZpgZmNr75BBtRzZqk7pkDe",
33
+ "type": "FullJsonSchemaValidator2021"
34
+ }
35
+ }
@@ -1,33 +1,33 @@
1
- {
2
- "@context": ["https://www.w3.org/2018/credentials/v1"],
3
- "type": [
4
- "VerifiableCredential",
5
- "VerifiableAttestation",
6
- "VerifiableAccreditation",
7
- "VerifiableAccreditationToAttest"
8
- ],
9
- "issuer": "",
10
- "credentialSubject": {
11
- "id": "",
12
- "accreditedFor": [
13
- {
14
- "schemaId": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM",
15
- "types": [
16
- "VerifiableCredential",
17
- "VerifiableAttestation",
18
- "CTRevocable"
19
- ],
20
- "limitJurisdiction":
21
- "https://publications.europa.eu/resource/authority/atu/EUR"
22
- }
23
- ]
24
- },
25
- "termsOfUse": {
26
- "id": "",
27
- "type": "IssuanceCertificate"
28
- },
29
- "credentialSchema": {
30
- "id": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/zjVFNvbEBPAr3a724DttioZpgZmNr75BBtRzZqk7pkDe",
31
- "type": "FullJsonSchemaValidator2021"
32
- }
1
+ {
2
+ "@context": ["https://www.w3.org/2018/credentials/v1"],
3
+ "type": [
4
+ "VerifiableCredential",
5
+ "VerifiableAttestation",
6
+ "VerifiableAccreditation",
7
+ "VerifiableAccreditationToAttest"
8
+ ],
9
+ "issuer": "",
10
+ "credentialSubject": {
11
+ "id": "",
12
+ "accreditedFor": [
13
+ {
14
+ "schemaId": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM",
15
+ "types": [
16
+ "VerifiableCredential",
17
+ "VerifiableAttestation",
18
+ "CTRevocable"
19
+ ],
20
+ "limitJurisdiction":
21
+ "https://publications.europa.eu/resource/authority/atu/EUR"
22
+ }
23
+ ]
24
+ },
25
+ "termsOfUse": {
26
+ "id": "",
27
+ "type": "IssuanceCertificate"
28
+ },
29
+ "credentialSchema": {
30
+ "id": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/zjVFNvbEBPAr3a724DttioZpgZmNr75BBtRzZqk7pkDe",
31
+ "type": "FullJsonSchemaValidator2021"
32
+ }
33
33
  }
@@ -1,22 +1,22 @@
1
- {
2
- "@context": [
3
- "https://www.w3.org/2018/credentials/v1"
4
- ],
5
- "type": [
6
- "VerifiableCredential",
7
- "VerifiableAttestation",
8
- "VerifiableAuthorisationForTrustChain"
9
- ],
10
- "issuer": "",
11
- "credentialSubject": {
12
- "id": ""
13
- },
14
- "termsOfUse": {
15
- "id": "",
16
- "type": "IssuanceCertificate"
17
- },
18
- "credentialSchema": {
19
- "id": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM",
20
- "type": "FullJsonSchemaValidator2021"
21
- }
1
+ {
2
+ "@context": [
3
+ "https://www.w3.org/2018/credentials/v1"
4
+ ],
5
+ "type": [
6
+ "VerifiableCredential",
7
+ "VerifiableAttestation",
8
+ "VerifiableAuthorisationForTrustChain"
9
+ ],
10
+ "issuer": "",
11
+ "credentialSubject": {
12
+ "id": ""
13
+ },
14
+ "termsOfUse": {
15
+ "id": "",
16
+ "type": "IssuanceCertificate"
17
+ },
18
+ "credentialSchema": {
19
+ "id": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM",
20
+ "type": "FullJsonSchemaValidator2021"
21
+ }
22
22
  }
@@ -1,24 +1,24 @@
1
- {
2
- "@context": [
3
- "https://www.w3.org/2018/credentials/v1"
4
- ],
5
- "type": [
6
- "VerifiableCredential",
7
- "VerifiableAttestation",
8
- "VerifiableAuthorisationToOnboard"
9
- ],
10
- "issuer": "",
11
- "credentialSubject": {
12
- "id": "",
13
- "accreditedFor": []
14
- },
15
- "termsOfUse": {
16
- "id": "",
17
- "type": "IssuanceCertificate"
18
-
19
- },
20
- "credentialSchema": {
21
- "id": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM",
22
- "type": "FullJsonSchemaValidator2021"
23
- }
1
+ {
2
+ "@context": [
3
+ "https://www.w3.org/2018/credentials/v1"
4
+ ],
5
+ "type": [
6
+ "VerifiableCredential",
7
+ "VerifiableAttestation",
8
+ "VerifiableAuthorisationToOnboard"
9
+ ],
10
+ "issuer": "",
11
+ "credentialSubject": {
12
+ "id": "",
13
+ "accreditedFor": []
14
+ },
15
+ "termsOfUse": {
16
+ "id": "",
17
+ "type": "IssuanceCertificate"
18
+
19
+ },
20
+ "credentialSchema": {
21
+ "id": "https://api-pilot.ebsi.eu/trusted-schemas-registry/v2/schemas/z3MgUFUkb722uq4x3dv5yAJmnNmzDFeK5UC8x83QoeLJM",
22
+ "type": "FullJsonSchemaValidator2021"
23
+ }
24
24
  }
@@ -1,5 +1,5 @@
1
- # Script to load the admin with the ROLE OPERATOR in the Trusted Apps Registry
2
- # This role is granted by the multisignature wallet
3
- env SET_ENV
4
- using user null
5
- using user ES256K did1 PRIVATE_KEY_TPR_OPERATOR DID_TPR_OPERATOR
1
+ # Script to load the admin with the ROLE OPERATOR in the Trusted Apps Registry
2
+ # This role is granted by the multisignature wallet
3
+ env SET_ENV
4
+ using user null
5
+ using user ES256K did1 PRIVATE_KEY_TPR_OPERATOR DID_TPR_OPERATOR
@@ -1,8 +1,8 @@
1
- # Script to load a user with admin attributes in the Trusted Policies Registry
2
- # (example: "TIR:insertIssuer" -> attribute to insert issuers in the Trusted Issuers Registry)
3
- env SET_ENV
4
- using user null
5
- using user ES256K did1 PRIVATE_KEY_ES256K_SUPPORT_OFFICE DID_SUPPORT_OFFICE
6
- using user ES256 did1 PRIVATE_KEY_ES256_SUPPORT_OFFICE DID_SUPPORT_OFFICE
7
- set user.accreditationId ACCREDITATION_ID_SUPPORT_OFFICE
8
- set user.accreditationUrl ACCREDITATION_URL_SUPPORT_OFFICE
1
+ # Script to load a user with admin attributes in the Trusted Policies Registry
2
+ # (example: "TIR:insertIssuer" -> attribute to insert issuers in the Trusted Issuers Registry)
3
+ env SET_ENV
4
+ using user null
5
+ using user ES256K did1 PRIVATE_KEY_ES256K_SUPPORT_OFFICE DID_SUPPORT_OFFICE
6
+ using user ES256 did1 PRIVATE_KEY_ES256_SUPPORT_OFFICE DID_SUPPORT_OFFICE
7
+ set user.accreditationId ACCREDITATION_ID_SUPPORT_OFFICE
8
+ set user.accreditationUrl ACCREDITATION_URL_SUPPORT_OFFICE