@eudiplo/sdk-core 1.14.0-main.0002da5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +460 -0
- package/dist/api/client/client.gen.d.mts +5 -0
- package/dist/api/client/client.gen.d.ts +5 -0
- package/dist/api/client/client.gen.js +823 -0
- package/dist/api/client/client.gen.mjs +821 -0
- package/dist/api/client/index.d.mts +58 -0
- package/dist/api/client/index.d.ts +58 -0
- package/dist/api/client/index.js +1052 -0
- package/dist/api/client/index.mjs +1043 -0
- package/dist/api/client/types.gen.d.mts +1 -0
- package/dist/api/client/types.gen.d.ts +1 -0
- package/dist/api/client/types.gen.js +4 -0
- package/dist/api/client/types.gen.mjs +3 -0
- package/dist/api/client.gen.d.mts +15 -0
- package/dist/api/client.gen.d.ts +15 -0
- package/dist/api/client.gen.js +828 -0
- package/dist/api/client.gen.mjs +826 -0
- package/dist/api/index.d.mts +393 -0
- package/dist/api/index.d.ts +393 -0
- package/dist/api/index.js +1473 -0
- package/dist/api/index.mjs +1389 -0
- package/dist/index.d.mts +651 -0
- package/dist/index.d.ts +651 -0
- package/dist/index.js +2126 -0
- package/dist/index.mjs +2030 -0
- package/dist/types.gen-D8LjzWc0.d.mts +328 -0
- package/dist/types.gen-D8LjzWc0.d.ts +328 -0
- package/dist/types.gen-sNmRQvUI.d.mts +3433 -0
- package/dist/types.gen-sNmRQvUI.d.ts +3433 -0
- package/package.json +73 -0
|
@@ -0,0 +1,3433 @@
|
|
|
1
|
+
type ClientOptions = {
|
|
2
|
+
baseUrl: string;
|
|
3
|
+
};
|
|
4
|
+
type RoleDto = {
|
|
5
|
+
/**
|
|
6
|
+
* OAuth2 roles
|
|
7
|
+
*/
|
|
8
|
+
role: "presentation:manage" | "presentation:request" | "issuance:manage" | "issuance:offer" | "clients:manage" | "tenants:manage" | "registrar:manage";
|
|
9
|
+
};
|
|
10
|
+
type ClientCredentialsDto = {
|
|
11
|
+
grant_type?: string;
|
|
12
|
+
client_id: string;
|
|
13
|
+
client_secret: string;
|
|
14
|
+
};
|
|
15
|
+
type TokenResponse = {
|
|
16
|
+
access_token: string;
|
|
17
|
+
refresh_token?: string;
|
|
18
|
+
token_type: string;
|
|
19
|
+
expires_in: number;
|
|
20
|
+
};
|
|
21
|
+
type ImportTenantDto = {
|
|
22
|
+
/**
|
|
23
|
+
* The name of the tenant.
|
|
24
|
+
*/
|
|
25
|
+
name: string;
|
|
26
|
+
/**
|
|
27
|
+
* The description of the tenant.
|
|
28
|
+
*/
|
|
29
|
+
description?: string;
|
|
30
|
+
};
|
|
31
|
+
type SessionStorageConfig = {
|
|
32
|
+
/**
|
|
33
|
+
* Time-to-live for sessions in seconds. If not set, uses global SESSION_TTL.
|
|
34
|
+
*/
|
|
35
|
+
ttlSeconds?: number;
|
|
36
|
+
/**
|
|
37
|
+
* Cleanup mode: 'full' deletes everything, 'anonymize' keeps metadata but removes PII.
|
|
38
|
+
*/
|
|
39
|
+
cleanupMode?: "full" | "anonymize";
|
|
40
|
+
};
|
|
41
|
+
type StatusListConfig = {
|
|
42
|
+
/**
|
|
43
|
+
* The capacity of the status list. If not set, uses global STATUS_CAPACITY.
|
|
44
|
+
*/
|
|
45
|
+
capacity?: number;
|
|
46
|
+
/**
|
|
47
|
+
* Bits per status entry: 1 (valid/revoked), 2 (with suspended), 4/8 (extended). If not set, uses global STATUS_BITS.
|
|
48
|
+
*/
|
|
49
|
+
bits?: 1 | 2 | 4 | 8;
|
|
50
|
+
/**
|
|
51
|
+
* TTL in seconds for the status list JWT. If not set, uses global STATUS_TTL.
|
|
52
|
+
*/
|
|
53
|
+
ttl?: number;
|
|
54
|
+
/**
|
|
55
|
+
* If true, regenerate JWT immediately on status changes. If false (default), use lazy regeneration on TTL expiry.
|
|
56
|
+
*/
|
|
57
|
+
immediateUpdate?: boolean;
|
|
58
|
+
/**
|
|
59
|
+
* If true, include aggregation_uri in status list JWTs for pre-fetching support (default: true).
|
|
60
|
+
*/
|
|
61
|
+
enableAggregation?: boolean;
|
|
62
|
+
};
|
|
63
|
+
type TenantEntity = {
|
|
64
|
+
/**
|
|
65
|
+
* Session storage configuration for this tenant. Controls TTL and cleanup behavior.
|
|
66
|
+
*/
|
|
67
|
+
sessionConfig?: SessionStorageConfig;
|
|
68
|
+
/**
|
|
69
|
+
* Status list configuration for this tenant. Only affects newly created status lists.
|
|
70
|
+
*/
|
|
71
|
+
statusListConfig?: StatusListConfig;
|
|
72
|
+
/**
|
|
73
|
+
* The unique identifier for the tenant.
|
|
74
|
+
*/
|
|
75
|
+
id: string;
|
|
76
|
+
/**
|
|
77
|
+
* The name of the tenant.
|
|
78
|
+
*/
|
|
79
|
+
name: string;
|
|
80
|
+
/**
|
|
81
|
+
* The description of the tenant.
|
|
82
|
+
*/
|
|
83
|
+
description?: string;
|
|
84
|
+
/**
|
|
85
|
+
* The current status of the tenant.
|
|
86
|
+
*/
|
|
87
|
+
status: string;
|
|
88
|
+
/**
|
|
89
|
+
* The clients associated with the tenant.
|
|
90
|
+
*/
|
|
91
|
+
clients: Array<ClientEntity>;
|
|
92
|
+
};
|
|
93
|
+
type ClientEntity = {
|
|
94
|
+
/**
|
|
95
|
+
* List of presentation config IDs this client can use. If empty/null, all configs are allowed.
|
|
96
|
+
*/
|
|
97
|
+
allowedPresentationConfigs?: Array<string>;
|
|
98
|
+
/**
|
|
99
|
+
* List of issuance config IDs this client can use. If empty/null, all configs are allowed.
|
|
100
|
+
*/
|
|
101
|
+
allowedIssuanceConfigs?: Array<string>;
|
|
102
|
+
/**
|
|
103
|
+
* The unique identifier for the client.
|
|
104
|
+
*/
|
|
105
|
+
clientId: string;
|
|
106
|
+
/**
|
|
107
|
+
* The secret key for the client.
|
|
108
|
+
*/
|
|
109
|
+
secret?: string;
|
|
110
|
+
/**
|
|
111
|
+
* The unique identifier for the tenant that the client belongs to. Only null for accounts that manage tenants, that do not belong to a client
|
|
112
|
+
*/
|
|
113
|
+
tenantId?: string;
|
|
114
|
+
/**
|
|
115
|
+
* The description of the client.
|
|
116
|
+
*/
|
|
117
|
+
description?: string;
|
|
118
|
+
/**
|
|
119
|
+
* The roles assigned to the client.
|
|
120
|
+
*/
|
|
121
|
+
roles: Array<"presentation:manage" | "presentation:request" | "issuance:manage" | "issuance:offer" | "clients:manage" | "tenants:manage" | "registrar:manage">;
|
|
122
|
+
/**
|
|
123
|
+
* The tenant that the client belongs to.
|
|
124
|
+
*/
|
|
125
|
+
tenant?: TenantEntity;
|
|
126
|
+
};
|
|
127
|
+
type CreateTenantDto = {
|
|
128
|
+
/**
|
|
129
|
+
* Status list configuration for this tenant. Only affects newly created status lists.
|
|
130
|
+
*/
|
|
131
|
+
statusListConfig?: StatusListConfig;
|
|
132
|
+
/**
|
|
133
|
+
* Session storage configuration. Controls TTL and cleanup behavior.
|
|
134
|
+
*/
|
|
135
|
+
sessionConfig?: SessionStorageConfig;
|
|
136
|
+
roles?: Array<"presentation:manage" | "presentation:request" | "issuance:manage" | "issuance:offer" | "clients:manage" | "tenants:manage" | "registrar:manage">;
|
|
137
|
+
/**
|
|
138
|
+
* The unique identifier for the tenant.
|
|
139
|
+
*/
|
|
140
|
+
id: string;
|
|
141
|
+
/**
|
|
142
|
+
* The name of the tenant.
|
|
143
|
+
*/
|
|
144
|
+
name: string;
|
|
145
|
+
/**
|
|
146
|
+
* The description of the tenant.
|
|
147
|
+
*/
|
|
148
|
+
description?: string;
|
|
149
|
+
};
|
|
150
|
+
type UpdateTenantDto = {
|
|
151
|
+
/**
|
|
152
|
+
* Status list configuration for this tenant. Only affects newly created status lists.
|
|
153
|
+
*/
|
|
154
|
+
statusListConfig?: StatusListConfig;
|
|
155
|
+
/**
|
|
156
|
+
* Session storage configuration. Controls TTL and cleanup behavior.
|
|
157
|
+
*/
|
|
158
|
+
sessionConfig?: SessionStorageConfig;
|
|
159
|
+
/**
|
|
160
|
+
* The name of the tenant.
|
|
161
|
+
*/
|
|
162
|
+
name?: string;
|
|
163
|
+
/**
|
|
164
|
+
* The description of the tenant.
|
|
165
|
+
*/
|
|
166
|
+
description?: string;
|
|
167
|
+
roles?: Array<"presentation:manage" | "presentation:request" | "issuance:manage" | "issuance:offer" | "clients:manage" | "tenants:manage" | "registrar:manage">;
|
|
168
|
+
};
|
|
169
|
+
type ClientSecretResponseDto = {
|
|
170
|
+
secret: string;
|
|
171
|
+
};
|
|
172
|
+
type UpdateClientDto = {
|
|
173
|
+
/**
|
|
174
|
+
* List of presentation config IDs this client can use. If empty/null, all configs are allowed.
|
|
175
|
+
*/
|
|
176
|
+
allowedPresentationConfigs?: Array<string>;
|
|
177
|
+
/**
|
|
178
|
+
* List of issuance config IDs this client can use. If empty/null, all configs are allowed.
|
|
179
|
+
*/
|
|
180
|
+
allowedIssuanceConfigs?: Array<string>;
|
|
181
|
+
/**
|
|
182
|
+
* The description of the client.
|
|
183
|
+
*/
|
|
184
|
+
description?: string;
|
|
185
|
+
/**
|
|
186
|
+
* The roles assigned to the client.
|
|
187
|
+
*/
|
|
188
|
+
roles: Array<"presentation:manage" | "presentation:request" | "issuance:manage" | "issuance:offer" | "clients:manage" | "tenants:manage" | "registrar:manage">;
|
|
189
|
+
};
|
|
190
|
+
type CreateClientDto = {
|
|
191
|
+
/**
|
|
192
|
+
* List of presentation config IDs this client can use. If empty/null, all configs are allowed.
|
|
193
|
+
*/
|
|
194
|
+
allowedPresentationConfigs?: Array<string>;
|
|
195
|
+
/**
|
|
196
|
+
* List of issuance config IDs this client can use. If empty/null, all configs are allowed.
|
|
197
|
+
*/
|
|
198
|
+
allowedIssuanceConfigs?: Array<string>;
|
|
199
|
+
/**
|
|
200
|
+
* The unique identifier for the client.
|
|
201
|
+
*/
|
|
202
|
+
clientId: string;
|
|
203
|
+
/**
|
|
204
|
+
* The secret key for the client.
|
|
205
|
+
*/
|
|
206
|
+
secret?: string;
|
|
207
|
+
/**
|
|
208
|
+
* The description of the client.
|
|
209
|
+
*/
|
|
210
|
+
description?: string;
|
|
211
|
+
/**
|
|
212
|
+
* The roles assigned to the client.
|
|
213
|
+
*/
|
|
214
|
+
roles: Array<"presentation:manage" | "presentation:request" | "issuance:manage" | "issuance:offer" | "clients:manage" | "tenants:manage" | "registrar:manage">;
|
|
215
|
+
};
|
|
216
|
+
type StatusListImportDto = {
|
|
217
|
+
/**
|
|
218
|
+
* Unique identifier for the status list
|
|
219
|
+
*/
|
|
220
|
+
id: string;
|
|
221
|
+
/**
|
|
222
|
+
* Credential configuration ID to bind this list exclusively to. Leave empty for a shared list.
|
|
223
|
+
*/
|
|
224
|
+
credentialConfigurationId?: string;
|
|
225
|
+
/**
|
|
226
|
+
* Key chain ID to use for signing. Leave empty to use the tenant's default StatusList key chain.
|
|
227
|
+
*/
|
|
228
|
+
keyChainId?: string;
|
|
229
|
+
/**
|
|
230
|
+
* Capacity of the status list. If not provided, uses tenant or global defaults.
|
|
231
|
+
*/
|
|
232
|
+
capacity?: number;
|
|
233
|
+
/**
|
|
234
|
+
* Bits per status value. If not provided, uses tenant or global defaults.
|
|
235
|
+
*/
|
|
236
|
+
bits?: 1 | 2 | 4 | 8;
|
|
237
|
+
};
|
|
238
|
+
type StatusListAggregationDto = {
|
|
239
|
+
/**
|
|
240
|
+
* Array of status list token URIs
|
|
241
|
+
*/
|
|
242
|
+
status_lists: Array<string>;
|
|
243
|
+
};
|
|
244
|
+
type UpdateStatusListConfigDto = {
|
|
245
|
+
/**
|
|
246
|
+
* The capacity of the status list. Set to null to reset to global default.
|
|
247
|
+
*/
|
|
248
|
+
capacity?: number;
|
|
249
|
+
/**
|
|
250
|
+
* Bits per status entry. Set to null to reset to global default.
|
|
251
|
+
*/
|
|
252
|
+
bits?: 1 | 2 | 4 | 8;
|
|
253
|
+
/**
|
|
254
|
+
* TTL in seconds for the status list JWT. Set to null to reset to global default.
|
|
255
|
+
*/
|
|
256
|
+
ttl?: number;
|
|
257
|
+
/**
|
|
258
|
+
* If true, regenerate JWT on every status change. Set to null to reset to default (false).
|
|
259
|
+
*/
|
|
260
|
+
immediateUpdate?: boolean;
|
|
261
|
+
/**
|
|
262
|
+
* If true, include aggregation_uri in status list JWTs for pre-fetching support. Set to null to reset to default (true).
|
|
263
|
+
*/
|
|
264
|
+
enableAggregation?: boolean;
|
|
265
|
+
};
|
|
266
|
+
type StatusListResponseDto = {
|
|
267
|
+
/**
|
|
268
|
+
* Unique identifier for the status list
|
|
269
|
+
*/
|
|
270
|
+
id: string;
|
|
271
|
+
/**
|
|
272
|
+
* The tenant ID
|
|
273
|
+
*/
|
|
274
|
+
tenantId: string;
|
|
275
|
+
/**
|
|
276
|
+
* Credential configuration ID this list is bound to. Null means shared.
|
|
277
|
+
*/
|
|
278
|
+
credentialConfigurationId?: string;
|
|
279
|
+
/**
|
|
280
|
+
* Key chain ID used for signing. Null means using the tenant's default.
|
|
281
|
+
*/
|
|
282
|
+
keyChainId?: string;
|
|
283
|
+
/**
|
|
284
|
+
* Bits per status value
|
|
285
|
+
*/
|
|
286
|
+
bits: 1 | 2 | 4 | 8;
|
|
287
|
+
/**
|
|
288
|
+
* Total capacity of the status list
|
|
289
|
+
*/
|
|
290
|
+
capacity: number;
|
|
291
|
+
/**
|
|
292
|
+
* Number of entries in use
|
|
293
|
+
*/
|
|
294
|
+
usedEntries: number;
|
|
295
|
+
/**
|
|
296
|
+
* Number of available entries
|
|
297
|
+
*/
|
|
298
|
+
availableEntries: number;
|
|
299
|
+
/**
|
|
300
|
+
* The public URI for this status list
|
|
301
|
+
*/
|
|
302
|
+
uri: string;
|
|
303
|
+
/**
|
|
304
|
+
* Creation timestamp
|
|
305
|
+
*/
|
|
306
|
+
createdAt: string;
|
|
307
|
+
/**
|
|
308
|
+
* JWT expiration timestamp. Null if JWT has not been generated yet.
|
|
309
|
+
*/
|
|
310
|
+
expiresAt?: string;
|
|
311
|
+
};
|
|
312
|
+
type CreateStatusListDto = {
|
|
313
|
+
/**
|
|
314
|
+
* Credential configuration ID to bind this list exclusively to. Leave empty for a shared list.
|
|
315
|
+
*/
|
|
316
|
+
credentialConfigurationId?: string;
|
|
317
|
+
/**
|
|
318
|
+
* Key chain ID to use for signing. Leave empty to use the tenant's default StatusList key chain.
|
|
319
|
+
*/
|
|
320
|
+
keyChainId?: string;
|
|
321
|
+
/**
|
|
322
|
+
* Bits per status value. More bits allow more status states. Defaults to tenant configuration.
|
|
323
|
+
*/
|
|
324
|
+
bits?: 1 | 2 | 4 | 8;
|
|
325
|
+
/**
|
|
326
|
+
* Maximum number of credential status entries. Defaults to tenant configuration.
|
|
327
|
+
*/
|
|
328
|
+
capacity?: number;
|
|
329
|
+
};
|
|
330
|
+
type UpdateStatusListDto = {
|
|
331
|
+
/**
|
|
332
|
+
* Credential configuration ID to bind this list exclusively to. Set to null to make this a shared list.
|
|
333
|
+
*/
|
|
334
|
+
credentialConfigurationId?: string;
|
|
335
|
+
/**
|
|
336
|
+
* Key chain ID to use for signing. Set to null to use the tenant's default StatusList key chain.
|
|
337
|
+
*/
|
|
338
|
+
keyChainId?: string;
|
|
339
|
+
};
|
|
340
|
+
type AuthorizeQueries = {
|
|
341
|
+
issuer_state?: string;
|
|
342
|
+
response_type?: string;
|
|
343
|
+
client_id?: string;
|
|
344
|
+
redirect_uri?: string;
|
|
345
|
+
resource?: string;
|
|
346
|
+
scope?: string;
|
|
347
|
+
code_challenge?: string;
|
|
348
|
+
code_challenge_method?: string;
|
|
349
|
+
dpop_jkt?: string;
|
|
350
|
+
request_uri?: string;
|
|
351
|
+
auth_session?: string;
|
|
352
|
+
state?: string;
|
|
353
|
+
};
|
|
354
|
+
type OfferRequestDto = {
|
|
355
|
+
/**
|
|
356
|
+
* The type of response expected for the offer request.
|
|
357
|
+
*/
|
|
358
|
+
response_type: "uri" | "dc-api";
|
|
359
|
+
/**
|
|
360
|
+
* Credential claims configuration per credential. Keys must match credentialConfigurationIds.
|
|
361
|
+
*/
|
|
362
|
+
credentialClaims?: {
|
|
363
|
+
additionalProperties?: {
|
|
364
|
+
type: "inline";
|
|
365
|
+
claims: {
|
|
366
|
+
[key: string]: unknown;
|
|
367
|
+
};
|
|
368
|
+
} | {
|
|
369
|
+
type: "attributeProvider";
|
|
370
|
+
attributeProviderId: string;
|
|
371
|
+
} | {
|
|
372
|
+
type: "webhook";
|
|
373
|
+
webhook: {
|
|
374
|
+
url: string;
|
|
375
|
+
auth?: {
|
|
376
|
+
[key: string]: unknown;
|
|
377
|
+
};
|
|
378
|
+
};
|
|
379
|
+
};
|
|
380
|
+
};
|
|
381
|
+
/**
|
|
382
|
+
* The flow type for the offer request.
|
|
383
|
+
*/
|
|
384
|
+
flow: "authorization_code" | "pre_authorized_code";
|
|
385
|
+
/**
|
|
386
|
+
* Transaction code for pre-authorized code flow.
|
|
387
|
+
*/
|
|
388
|
+
tx_code?: string;
|
|
389
|
+
/**
|
|
390
|
+
* Description for the transaction code (e.g., "Please enter the PIN sent to your email").
|
|
391
|
+
*/
|
|
392
|
+
tx_code_description?: string;
|
|
393
|
+
/**
|
|
394
|
+
* List of credential configuration ids to be included in the offer.
|
|
395
|
+
*/
|
|
396
|
+
credentialConfigurationIds: Array<string>;
|
|
397
|
+
/**
|
|
398
|
+
* Optional authorization server to be used for this issuance flow.
|
|
399
|
+
*/
|
|
400
|
+
authorization_server?: string;
|
|
401
|
+
/**
|
|
402
|
+
* ID of the webhook endpoint to notify about the status of the issuance process.
|
|
403
|
+
*/
|
|
404
|
+
webhookEndpointId?: string;
|
|
405
|
+
};
|
|
406
|
+
type WebHookAuthConfigNone = {
|
|
407
|
+
/**
|
|
408
|
+
* The type of authentication used for the webhook.
|
|
409
|
+
*/
|
|
410
|
+
type: "none";
|
|
411
|
+
};
|
|
412
|
+
type ApiKeyConfig = {
|
|
413
|
+
/**
|
|
414
|
+
* The name of the header where the API key will be sent.
|
|
415
|
+
*/
|
|
416
|
+
headerName: string;
|
|
417
|
+
/**
|
|
418
|
+
* The value of the API key to be sent in the header.
|
|
419
|
+
*/
|
|
420
|
+
value: string;
|
|
421
|
+
};
|
|
422
|
+
type WebHookAuthConfigHeader = {
|
|
423
|
+
/**
|
|
424
|
+
* The type of authentication used for the webhook.
|
|
425
|
+
*/
|
|
426
|
+
type: "apiKey";
|
|
427
|
+
/**
|
|
428
|
+
* Configuration for API key authentication.
|
|
429
|
+
* This is required if the type is 'apiKey'.
|
|
430
|
+
*/
|
|
431
|
+
config: ApiKeyConfig;
|
|
432
|
+
};
|
|
433
|
+
type WebhookConfig = {
|
|
434
|
+
/**
|
|
435
|
+
* Optional authentication configuration for the webhook.
|
|
436
|
+
* If not provided, no authentication will be used.
|
|
437
|
+
*/
|
|
438
|
+
auth: WebHookAuthConfigNone | WebHookAuthConfigHeader;
|
|
439
|
+
/**
|
|
440
|
+
* The URL to which the webhook will send notifications.
|
|
441
|
+
*/
|
|
442
|
+
url: string;
|
|
443
|
+
};
|
|
444
|
+
type TransactionData = {
|
|
445
|
+
type: string;
|
|
446
|
+
credential_ids: Array<string>;
|
|
447
|
+
};
|
|
448
|
+
type Session = {
|
|
449
|
+
/**
|
|
450
|
+
* Status of the session.
|
|
451
|
+
*/
|
|
452
|
+
status: "active" | "fetched" | "completed" | "expired" | "failed";
|
|
453
|
+
/**
|
|
454
|
+
* Unique identifier for the session.
|
|
455
|
+
*/
|
|
456
|
+
id: string;
|
|
457
|
+
/**
|
|
458
|
+
* The timestamp when the request was created.
|
|
459
|
+
*/
|
|
460
|
+
createdAt: string;
|
|
461
|
+
/**
|
|
462
|
+
* The timestamp when the request was last updated.
|
|
463
|
+
*/
|
|
464
|
+
updatedAt: string;
|
|
465
|
+
/**
|
|
466
|
+
* The timestamp when the request is set to expire.
|
|
467
|
+
*/
|
|
468
|
+
expiresAt?: string;
|
|
469
|
+
/**
|
|
470
|
+
* Flag indicating whether to use the DC API for the presentation request.
|
|
471
|
+
*/
|
|
472
|
+
useDcApi: boolean;
|
|
473
|
+
/**
|
|
474
|
+
* Tenant ID for multi-tenancy support.
|
|
475
|
+
*/
|
|
476
|
+
tenantId: string;
|
|
477
|
+
/**
|
|
478
|
+
* The tenant that owns this object.
|
|
479
|
+
*/
|
|
480
|
+
tenant: TenantEntity;
|
|
481
|
+
authorization_code?: string;
|
|
482
|
+
/**
|
|
483
|
+
* Request URI from the authorization request.
|
|
484
|
+
*/
|
|
485
|
+
request_uri?: string;
|
|
486
|
+
/**
|
|
487
|
+
* Authorization queries associated with the session.
|
|
488
|
+
* Encrypted at rest.
|
|
489
|
+
*/
|
|
490
|
+
auth_queries?: AuthorizeQueries;
|
|
491
|
+
/**
|
|
492
|
+
* Credential offer object containing details about the credential offer or presentation request.
|
|
493
|
+
* Encrypted at rest.
|
|
494
|
+
*/
|
|
495
|
+
offer?: {
|
|
496
|
+
[key: string]: unknown;
|
|
497
|
+
};
|
|
498
|
+
/**
|
|
499
|
+
* Offer URL for the credential offer.
|
|
500
|
+
*/
|
|
501
|
+
offerUrl?: string;
|
|
502
|
+
/**
|
|
503
|
+
* Credential payload containing the offer request details.
|
|
504
|
+
* Encrypted at rest - may contain sensitive claim data.
|
|
505
|
+
*/
|
|
506
|
+
credentialPayload?: OfferRequestDto;
|
|
507
|
+
/**
|
|
508
|
+
* ID of the webhook endpoint to notify about issuance status.
|
|
509
|
+
*/
|
|
510
|
+
webhookEndpointId?: string;
|
|
511
|
+
/**
|
|
512
|
+
* Notifications associated with the session.
|
|
513
|
+
*/
|
|
514
|
+
notifications: Array<{
|
|
515
|
+
[key: string]: unknown;
|
|
516
|
+
}>;
|
|
517
|
+
requestId?: string;
|
|
518
|
+
/**
|
|
519
|
+
* The URL of the presentation auth request.
|
|
520
|
+
*/
|
|
521
|
+
requestUrl?: string;
|
|
522
|
+
/**
|
|
523
|
+
* Signed presentation auth request.
|
|
524
|
+
*/
|
|
525
|
+
requestObject?: string;
|
|
526
|
+
/**
|
|
527
|
+
* Verified credentials from the presentation process.
|
|
528
|
+
* Encrypted at rest - contains personal information.
|
|
529
|
+
*/
|
|
530
|
+
credentials?: Array<{
|
|
531
|
+
[key: string]: unknown;
|
|
532
|
+
}>;
|
|
533
|
+
/**
|
|
534
|
+
* Noncce from the Verifiable Presentation request.
|
|
535
|
+
*/
|
|
536
|
+
vp_nonce?: string;
|
|
537
|
+
/**
|
|
538
|
+
* Client ID used in the OID4VP authorization request.
|
|
539
|
+
*/
|
|
540
|
+
clientId?: string;
|
|
541
|
+
/**
|
|
542
|
+
* Response URI used in the OID4VP authorization request.
|
|
543
|
+
*/
|
|
544
|
+
responseUri?: string;
|
|
545
|
+
/**
|
|
546
|
+
* Redirect URI to which the user-agent should be redirected after the presentation is completed.
|
|
547
|
+
*/
|
|
548
|
+
redirectUri?: string;
|
|
549
|
+
/**
|
|
550
|
+
* Where to send the claims webhook response.
|
|
551
|
+
*/
|
|
552
|
+
parsedWebhook?: WebhookConfig;
|
|
553
|
+
/**
|
|
554
|
+
* Transaction data to include in the OID4VP authorization request.
|
|
555
|
+
* Can be overridden per-request from the presentation configuration.
|
|
556
|
+
*/
|
|
557
|
+
transaction_data?: Array<TransactionData>;
|
|
558
|
+
externalIssuer?: string;
|
|
559
|
+
/**
|
|
560
|
+
* The subject (sub) from the external authorization server token.
|
|
561
|
+
* Used to identify the user at the external AS.
|
|
562
|
+
*/
|
|
563
|
+
externalSubject?: string;
|
|
564
|
+
};
|
|
565
|
+
type SessionLogEntryResponseDto = {
|
|
566
|
+
/**
|
|
567
|
+
* Log entry ID
|
|
568
|
+
*/
|
|
569
|
+
id: string;
|
|
570
|
+
/**
|
|
571
|
+
* Session ID
|
|
572
|
+
*/
|
|
573
|
+
sessionId: string;
|
|
574
|
+
/**
|
|
575
|
+
* Timestamp of the log entry
|
|
576
|
+
*/
|
|
577
|
+
timestamp: string;
|
|
578
|
+
/**
|
|
579
|
+
* Log level
|
|
580
|
+
*/
|
|
581
|
+
level: "info" | "warn" | "error";
|
|
582
|
+
/**
|
|
583
|
+
* Flow stage
|
|
584
|
+
*/
|
|
585
|
+
stage?: string;
|
|
586
|
+
/**
|
|
587
|
+
* Log message
|
|
588
|
+
*/
|
|
589
|
+
message: string;
|
|
590
|
+
/**
|
|
591
|
+
* Additional structured detail
|
|
592
|
+
*/
|
|
593
|
+
detail?: {
|
|
594
|
+
[key: string]: unknown;
|
|
595
|
+
};
|
|
596
|
+
};
|
|
597
|
+
type StatusUpdateDto = {
|
|
598
|
+
/**
|
|
599
|
+
* The session ID of the user
|
|
600
|
+
*/
|
|
601
|
+
sessionId: string;
|
|
602
|
+
/**
|
|
603
|
+
* The ID of the credential configuration
|
|
604
|
+
* This is optional, if not provided, all credentials will be revoked of the session.
|
|
605
|
+
*/
|
|
606
|
+
credentialConfigurationId?: string;
|
|
607
|
+
/**
|
|
608
|
+
* The status of the credential
|
|
609
|
+
* 0 = valid, 1 = revoked, 2 = suspended
|
|
610
|
+
*/
|
|
611
|
+
status: number;
|
|
612
|
+
};
|
|
613
|
+
type UpdateSessionConfigDto = {
|
|
614
|
+
/**
|
|
615
|
+
* Time-to-live for sessions in seconds. Set to null to use global default.
|
|
616
|
+
*/
|
|
617
|
+
ttlSeconds?: number;
|
|
618
|
+
/**
|
|
619
|
+
* Cleanup mode: 'full' deletes everything, 'anonymize' keeps metadata but removes PII.
|
|
620
|
+
*/
|
|
621
|
+
cleanupMode?: "full" | "anonymize";
|
|
622
|
+
};
|
|
623
|
+
type AuthenticationMethodNone = {
|
|
624
|
+
method: "none";
|
|
625
|
+
};
|
|
626
|
+
type AuthenticationUrlConfig = {
|
|
627
|
+
/**
|
|
628
|
+
* The URL used in the OID4VCI authorized code flow.
|
|
629
|
+
* This URL is where users will be redirected for authentication.
|
|
630
|
+
*/
|
|
631
|
+
url: string;
|
|
632
|
+
/**
|
|
633
|
+
* Optional webhook configuration for authentication callbacks
|
|
634
|
+
*/
|
|
635
|
+
webhook?: WebhookConfig;
|
|
636
|
+
};
|
|
637
|
+
type AuthenticationMethodAuth = {
|
|
638
|
+
method: "auth";
|
|
639
|
+
config: AuthenticationUrlConfig;
|
|
640
|
+
};
|
|
641
|
+
type PresentationDuringIssuanceConfig = {
|
|
642
|
+
/**
|
|
643
|
+
* Link to the presentation configuration that is relevant for the issuance process
|
|
644
|
+
*/
|
|
645
|
+
type: string;
|
|
646
|
+
};
|
|
647
|
+
type AuthenticationMethodPresentation = {
|
|
648
|
+
method: "presentationDuringIssuance";
|
|
649
|
+
config: PresentationDuringIssuanceConfig;
|
|
650
|
+
};
|
|
651
|
+
type UpstreamOidcConfig = {
|
|
652
|
+
/**
|
|
653
|
+
* The OIDC issuer URL of the upstream provider
|
|
654
|
+
*/
|
|
655
|
+
issuer: string;
|
|
656
|
+
/**
|
|
657
|
+
* The client ID registered with the upstream provider
|
|
658
|
+
*/
|
|
659
|
+
clientId: string;
|
|
660
|
+
/**
|
|
661
|
+
* The client secret for confidential clients
|
|
662
|
+
*/
|
|
663
|
+
clientSecret?: string;
|
|
664
|
+
/**
|
|
665
|
+
* Scopes to request from the upstream provider
|
|
666
|
+
*/
|
|
667
|
+
scopes?: Array<string>;
|
|
668
|
+
};
|
|
669
|
+
type ChainedAsTokenConfig = {
|
|
670
|
+
/**
|
|
671
|
+
* Access token lifetime in seconds
|
|
672
|
+
*/
|
|
673
|
+
lifetimeSeconds?: number;
|
|
674
|
+
/**
|
|
675
|
+
* Key ID for token signing
|
|
676
|
+
*/
|
|
677
|
+
signingKeyId?: string;
|
|
678
|
+
};
|
|
679
|
+
type ChainedAsConfig = {
|
|
680
|
+
/**
|
|
681
|
+
* Enable chained AS mode
|
|
682
|
+
*/
|
|
683
|
+
enabled: boolean;
|
|
684
|
+
/**
|
|
685
|
+
* Upstream OIDC provider configuration
|
|
686
|
+
*/
|
|
687
|
+
upstream?: UpstreamOidcConfig;
|
|
688
|
+
/**
|
|
689
|
+
* Token configuration
|
|
690
|
+
*/
|
|
691
|
+
token?: ChainedAsTokenConfig;
|
|
692
|
+
/**
|
|
693
|
+
* Require DPoP binding for tokens
|
|
694
|
+
*/
|
|
695
|
+
requireDPoP?: boolean;
|
|
696
|
+
};
|
|
697
|
+
type DisplayLogo = {
|
|
698
|
+
uri: string;
|
|
699
|
+
alt_text?: string;
|
|
700
|
+
};
|
|
701
|
+
type DisplayInfo = {
|
|
702
|
+
name?: string;
|
|
703
|
+
locale?: string;
|
|
704
|
+
logo?: DisplayLogo;
|
|
705
|
+
};
|
|
706
|
+
type IssuanceConfig = {
|
|
707
|
+
/**
|
|
708
|
+
* Key ID for signing access tokens. If unset, the default signing key is used.
|
|
709
|
+
*/
|
|
710
|
+
signingKeyId?: string;
|
|
711
|
+
/**
|
|
712
|
+
* Configuration for Chained Authorization Server mode.
|
|
713
|
+
* When enabled, EUDIPLO acts as an OAuth AS facade, delegating user authentication
|
|
714
|
+
* to an upstream OIDC provider while issuing its own tokens with issuer_state.
|
|
715
|
+
*/
|
|
716
|
+
chainedAs?: ChainedAsConfig;
|
|
717
|
+
/**
|
|
718
|
+
* The tenant that owns this object.
|
|
719
|
+
*/
|
|
720
|
+
tenant: TenantEntity;
|
|
721
|
+
/**
|
|
722
|
+
* Authentication server URL for the issuance process.
|
|
723
|
+
*/
|
|
724
|
+
authServers?: Array<string>;
|
|
725
|
+
/**
|
|
726
|
+
* Value to determine the amount of credentials that are issued in a batch.
|
|
727
|
+
* Default is 1.
|
|
728
|
+
*/
|
|
729
|
+
batchSize?: number;
|
|
730
|
+
/**
|
|
731
|
+
* Indicates whether DPoP is required for the issuance process. Default value is true.
|
|
732
|
+
*/
|
|
733
|
+
dPopRequired?: boolean;
|
|
734
|
+
/**
|
|
735
|
+
* Indicates whether wallet attestation is required for the token endpoint.
|
|
736
|
+
* When enabled, wallets must provide OAuth-Client-Attestation headers.
|
|
737
|
+
* Default value is false.
|
|
738
|
+
*/
|
|
739
|
+
walletAttestationRequired?: boolean;
|
|
740
|
+
/**
|
|
741
|
+
* URLs of trust lists containing trusted wallet providers.
|
|
742
|
+
* The wallet attestation's X.509 certificate will be validated against these trust lists.
|
|
743
|
+
* If empty and walletAttestationRequired is true, all wallet providers are rejected.
|
|
744
|
+
*/
|
|
745
|
+
walletProviderTrustLists?: Array<string>;
|
|
746
|
+
/**
|
|
747
|
+
* The URL of the preferred authorization server for wallet-initiated flows.
|
|
748
|
+
* When set, this AS is placed first in the `authorization_servers` array
|
|
749
|
+
* of the credential issuer metadata, signaling wallets to use it by default.
|
|
750
|
+
* Must match one of the configured auth servers, the chained AS URL, or "built-in".
|
|
751
|
+
*/
|
|
752
|
+
preferredAuthServer?: string;
|
|
753
|
+
display: Array<DisplayInfo>;
|
|
754
|
+
/**
|
|
755
|
+
* The timestamp when the VP request was created.
|
|
756
|
+
*/
|
|
757
|
+
createdAt: string;
|
|
758
|
+
/**
|
|
759
|
+
* The timestamp when the VP request was last updated.
|
|
760
|
+
*/
|
|
761
|
+
updatedAt: string;
|
|
762
|
+
};
|
|
763
|
+
type IssuanceDto = {
|
|
764
|
+
/**
|
|
765
|
+
* Key ID for signing access tokens. If unset, the default signing key is used.
|
|
766
|
+
*/
|
|
767
|
+
signingKeyId?: string;
|
|
768
|
+
/**
|
|
769
|
+
* Configuration for Chained Authorization Server mode.
|
|
770
|
+
* When enabled, EUDIPLO acts as an OAuth AS facade, delegating user authentication
|
|
771
|
+
* to an upstream OIDC provider while issuing its own tokens with issuer_state.
|
|
772
|
+
*/
|
|
773
|
+
chainedAs?: ChainedAsConfig;
|
|
774
|
+
/**
|
|
775
|
+
* Authentication server URL for the issuance process.
|
|
776
|
+
*/
|
|
777
|
+
authServers?: Array<string>;
|
|
778
|
+
/**
|
|
779
|
+
* Value to determine the amount of credentials that are issued in a batch.
|
|
780
|
+
* Default is 1.
|
|
781
|
+
*/
|
|
782
|
+
batchSize?: number;
|
|
783
|
+
/**
|
|
784
|
+
* Indicates whether DPoP is required for the issuance process. Default value is true.
|
|
785
|
+
*/
|
|
786
|
+
dPopRequired?: boolean;
|
|
787
|
+
/**
|
|
788
|
+
* Indicates whether wallet attestation is required for the token endpoint.
|
|
789
|
+
* When enabled, wallets must provide OAuth-Client-Attestation headers.
|
|
790
|
+
* Default value is false.
|
|
791
|
+
*/
|
|
792
|
+
walletAttestationRequired?: boolean;
|
|
793
|
+
/**
|
|
794
|
+
* URLs of trust lists containing trusted wallet providers.
|
|
795
|
+
* The wallet attestation's X.509 certificate will be validated against these trust lists.
|
|
796
|
+
* If empty and walletAttestationRequired is true, all wallet providers are rejected.
|
|
797
|
+
*/
|
|
798
|
+
walletProviderTrustLists?: Array<string>;
|
|
799
|
+
/**
|
|
800
|
+
* The URL of the preferred authorization server for wallet-initiated flows.
|
|
801
|
+
* When set, this AS is placed first in the `authorization_servers` array
|
|
802
|
+
* of the credential issuer metadata, signaling wallets to use it by default.
|
|
803
|
+
* Must match one of the configured auth servers, the chained AS URL, or "built-in".
|
|
804
|
+
*/
|
|
805
|
+
preferredAuthServer?: string;
|
|
806
|
+
display: Array<DisplayInfo>;
|
|
807
|
+
};
|
|
808
|
+
type ClaimsQuery = {
|
|
809
|
+
id?: string;
|
|
810
|
+
path: Array<string>;
|
|
811
|
+
values?: Array<string>;
|
|
812
|
+
};
|
|
813
|
+
type TrustedAuthorityQuery = {
|
|
814
|
+
type: "aki" | "etsi_tl";
|
|
815
|
+
values: Array<string>;
|
|
816
|
+
};
|
|
817
|
+
type CredentialQuery = {
|
|
818
|
+
id: string;
|
|
819
|
+
format: string;
|
|
820
|
+
multiple?: boolean;
|
|
821
|
+
claims?: Array<ClaimsQuery>;
|
|
822
|
+
meta: {
|
|
823
|
+
[key: string]: unknown;
|
|
824
|
+
};
|
|
825
|
+
trusted_authorities?: Array<TrustedAuthorityQuery>;
|
|
826
|
+
};
|
|
827
|
+
type CredentialSetQuery = {
|
|
828
|
+
options: Array<Array<string>>;
|
|
829
|
+
required?: boolean;
|
|
830
|
+
};
|
|
831
|
+
type PolicyCredential = {
|
|
832
|
+
claims?: Array<ClaimsQuery>;
|
|
833
|
+
credentials: Array<CredentialQuery>;
|
|
834
|
+
credential_sets?: Array<CredentialSetQuery>;
|
|
835
|
+
};
|
|
836
|
+
type AttestationBasedPolicy = {
|
|
837
|
+
policy: "attestationBased";
|
|
838
|
+
values: Array<PolicyCredential>;
|
|
839
|
+
};
|
|
840
|
+
type NoneTrustPolicy = {
|
|
841
|
+
policy: "none";
|
|
842
|
+
};
|
|
843
|
+
type AllowListPolicy = {
|
|
844
|
+
policy: "allowList";
|
|
845
|
+
values: Array<string>;
|
|
846
|
+
};
|
|
847
|
+
type RootOfTrustPolicy = {
|
|
848
|
+
policy: "rootOfTrust";
|
|
849
|
+
values: string;
|
|
850
|
+
};
|
|
851
|
+
type Vct = {
|
|
852
|
+
vct?: string;
|
|
853
|
+
name?: string;
|
|
854
|
+
description?: string;
|
|
855
|
+
extends?: string;
|
|
856
|
+
"extends#integrity"?: string;
|
|
857
|
+
schema_uri?: string;
|
|
858
|
+
"schema_uri#integrity"?: string;
|
|
859
|
+
};
|
|
860
|
+
type IaeActionOpenid4VpPresentation = {
|
|
861
|
+
/**
|
|
862
|
+
* Action type discriminator
|
|
863
|
+
*/
|
|
864
|
+
type: "openid4vp_presentation";
|
|
865
|
+
/**
|
|
866
|
+
* Optional label for this step (for display purposes)
|
|
867
|
+
*/
|
|
868
|
+
label?: string;
|
|
869
|
+
/**
|
|
870
|
+
* ID of the presentation configuration to use for this step
|
|
871
|
+
*/
|
|
872
|
+
presentationConfigId: string;
|
|
873
|
+
};
|
|
874
|
+
type IaeActionRedirectToWeb = {
|
|
875
|
+
/**
|
|
876
|
+
* Action type discriminator
|
|
877
|
+
*/
|
|
878
|
+
type: "redirect_to_web";
|
|
879
|
+
/**
|
|
880
|
+
* Optional label for this step (for display purposes)
|
|
881
|
+
*/
|
|
882
|
+
label?: string;
|
|
883
|
+
/**
|
|
884
|
+
* URL to redirect the user to for web-based interaction
|
|
885
|
+
*/
|
|
886
|
+
url: string;
|
|
887
|
+
/**
|
|
888
|
+
* URL where the external service should redirect back after completion. If not provided, the service must call back to the IAE endpoint.
|
|
889
|
+
*/
|
|
890
|
+
callbackUrl?: string;
|
|
891
|
+
/**
|
|
892
|
+
* Description of what the user should do on the web page (for wallet display)
|
|
893
|
+
*/
|
|
894
|
+
description?: string;
|
|
895
|
+
};
|
|
896
|
+
type EmbeddedDisclosurePolicy = {
|
|
897
|
+
policy: string;
|
|
898
|
+
};
|
|
899
|
+
type DisplayImage = {
|
|
900
|
+
uri: string;
|
|
901
|
+
};
|
|
902
|
+
type Display = {
|
|
903
|
+
name: string;
|
|
904
|
+
description: string;
|
|
905
|
+
locale: string;
|
|
906
|
+
background_color?: string;
|
|
907
|
+
text_color?: string;
|
|
908
|
+
background_image?: DisplayImage;
|
|
909
|
+
logo?: DisplayImage;
|
|
910
|
+
};
|
|
911
|
+
type IssuerMetadataCredentialConfig = {
|
|
912
|
+
format: "mso_mdoc" | "dc+sd-jwt";
|
|
913
|
+
display: Array<Display>;
|
|
914
|
+
scope?: string;
|
|
915
|
+
/**
|
|
916
|
+
* Document type for mDOC credentials (e.g., "org.iso.18013.5.1.mDL").
|
|
917
|
+
* Only applicable when format is "mso_mdoc".
|
|
918
|
+
*/
|
|
919
|
+
docType?: string;
|
|
920
|
+
/**
|
|
921
|
+
* Namespace for mDOC credentials (e.g., "org.iso.18013.5.1").
|
|
922
|
+
* Only applicable when format is "mso_mdoc".
|
|
923
|
+
* Used when claims are provided as a flat object.
|
|
924
|
+
*/
|
|
925
|
+
namespace?: string;
|
|
926
|
+
/**
|
|
927
|
+
* Claims organized by namespace for mDOC credentials.
|
|
928
|
+
* Allows specifying claims across multiple namespaces.
|
|
929
|
+
* Only applicable when format is "mso_mdoc".
|
|
930
|
+
* Example:
|
|
931
|
+
* {
|
|
932
|
+
* "org.iso.18013.5.1": { "given_name": "John", "family_name": "Doe" },
|
|
933
|
+
* "org.iso.18013.5.1.aamva": { "DHS_compliance": "F" }
|
|
934
|
+
* }
|
|
935
|
+
*/
|
|
936
|
+
claimsByNamespace?: {
|
|
937
|
+
[key: string]: unknown;
|
|
938
|
+
};
|
|
939
|
+
};
|
|
940
|
+
type AttributeProviderEntity = {
|
|
941
|
+
auth: WebHookAuthConfigNone | WebHookAuthConfigHeader;
|
|
942
|
+
id: string;
|
|
943
|
+
tenantId: string;
|
|
944
|
+
tenant: TenantEntity;
|
|
945
|
+
name: string;
|
|
946
|
+
description?: string;
|
|
947
|
+
url: string;
|
|
948
|
+
};
|
|
949
|
+
type WebhookEndpointEntity = {
|
|
950
|
+
auth: WebHookAuthConfigNone | WebHookAuthConfigHeader;
|
|
951
|
+
id: string;
|
|
952
|
+
tenantId: string;
|
|
953
|
+
tenant: TenantEntity;
|
|
954
|
+
name: string;
|
|
955
|
+
description?: string;
|
|
956
|
+
url: string;
|
|
957
|
+
};
|
|
958
|
+
type KeyChainEntity = {
|
|
959
|
+
/**
|
|
960
|
+
* Unique identifier for the key chain.
|
|
961
|
+
* This is the ID referenced by other entities (e.g., issuance config's signingKeyId).
|
|
962
|
+
*/
|
|
963
|
+
id: string;
|
|
964
|
+
/**
|
|
965
|
+
* Tenant ID for the key chain.
|
|
966
|
+
*/
|
|
967
|
+
tenantId: string;
|
|
968
|
+
/**
|
|
969
|
+
* The tenant that owns this key chain.
|
|
970
|
+
*/
|
|
971
|
+
tenant: TenantEntity;
|
|
972
|
+
/**
|
|
973
|
+
* Human-readable description of the key chain.
|
|
974
|
+
*/
|
|
975
|
+
description?: string;
|
|
976
|
+
/**
|
|
977
|
+
* The purpose/role of this key chain in the system.
|
|
978
|
+
*/
|
|
979
|
+
usageType: "access" | "attestation" | "trustList" | "statusList" | "encrypt";
|
|
980
|
+
/**
|
|
981
|
+
* The usage type of the keys (sign or encrypt).
|
|
982
|
+
*/
|
|
983
|
+
usage: "sign" | "encrypt";
|
|
984
|
+
/**
|
|
985
|
+
* The KMS provider used for this key chain.
|
|
986
|
+
* References a configured KMS provider name.
|
|
987
|
+
*/
|
|
988
|
+
kmsProvider: string;
|
|
989
|
+
/**
|
|
990
|
+
* External key identifier for cloud KMS providers.
|
|
991
|
+
* This field stores the provider-specific key reference for the active signing key.
|
|
992
|
+
*/
|
|
993
|
+
externalKeyId?: string;
|
|
994
|
+
rootKey?: {
|
|
995
|
+
[key: string]: unknown;
|
|
996
|
+
};
|
|
997
|
+
/**
|
|
998
|
+
* Root CA certificate in PEM format.
|
|
999
|
+
* Self-signed certificate for the root CA key.
|
|
1000
|
+
*/
|
|
1001
|
+
rootCertificate?: string;
|
|
1002
|
+
activeKey: {
|
|
1003
|
+
[key: string]: unknown;
|
|
1004
|
+
};
|
|
1005
|
+
/**
|
|
1006
|
+
* Certificate for the active signing key in PEM format.
|
|
1007
|
+
* Either CA-signed (if rootKey exists) or self-signed.
|
|
1008
|
+
*/
|
|
1009
|
+
activeCertificate: string;
|
|
1010
|
+
rotationEnabled: boolean;
|
|
1011
|
+
/**
|
|
1012
|
+
* Rotation interval in days. Key material will be rotated after this many days.
|
|
1013
|
+
*/
|
|
1014
|
+
rotationIntervalDays?: number;
|
|
1015
|
+
/**
|
|
1016
|
+
* Certificate validity in days when generating new certificates.
|
|
1017
|
+
*/
|
|
1018
|
+
certValidityDays?: number;
|
|
1019
|
+
/**
|
|
1020
|
+
* Timestamp of when the key was last rotated.
|
|
1021
|
+
*/
|
|
1022
|
+
lastRotatedAt?: string;
|
|
1023
|
+
previousKey?: {
|
|
1024
|
+
[key: string]: unknown;
|
|
1025
|
+
};
|
|
1026
|
+
/**
|
|
1027
|
+
* Certificate for the previous signing key in PEM format.
|
|
1028
|
+
*/
|
|
1029
|
+
previousCertificate?: string;
|
|
1030
|
+
/**
|
|
1031
|
+
* Expiry date for the previous key.
|
|
1032
|
+
* After this date, the previous key should be deleted.
|
|
1033
|
+
*/
|
|
1034
|
+
previousKeyExpiry?: string;
|
|
1035
|
+
createdAt: string;
|
|
1036
|
+
/**
|
|
1037
|
+
* The timestamp when the key chain was last updated.
|
|
1038
|
+
*/
|
|
1039
|
+
updatedAt: string;
|
|
1040
|
+
};
|
|
1041
|
+
type SchemaResponse = {
|
|
1042
|
+
$schema: string;
|
|
1043
|
+
type: string;
|
|
1044
|
+
properties: {
|
|
1045
|
+
[key: string]: unknown;
|
|
1046
|
+
};
|
|
1047
|
+
required?: Array<string>;
|
|
1048
|
+
title?: string;
|
|
1049
|
+
description?: string;
|
|
1050
|
+
};
|
|
1051
|
+
type CredentialConfig = {
|
|
1052
|
+
/**
|
|
1053
|
+
* VCT as a URI string (e.g., urn:eudi:pid:de:1) or as an object for EUDIPLO-hosted VCT
|
|
1054
|
+
*/
|
|
1055
|
+
vct?: string | Vct;
|
|
1056
|
+
/**
|
|
1057
|
+
* List of IAE actions to execute before credential issuance
|
|
1058
|
+
*/
|
|
1059
|
+
iaeActions?: Array<IaeActionOpenid4VpPresentation | IaeActionRedirectToWeb>;
|
|
1060
|
+
/**
|
|
1061
|
+
* Embedded disclosure policy (discriminated union by `policy`).
|
|
1062
|
+
* The discriminator makes class-transformer instantiate the right subclass,
|
|
1063
|
+
* and then class-validator runs that subclass’s rules.
|
|
1064
|
+
*/
|
|
1065
|
+
embeddedDisclosurePolicy?: EmbeddedDisclosurePolicy;
|
|
1066
|
+
id: string;
|
|
1067
|
+
description?: string;
|
|
1068
|
+
/**
|
|
1069
|
+
* The tenant that owns this object.
|
|
1070
|
+
*/
|
|
1071
|
+
tenant: TenantEntity;
|
|
1072
|
+
config: IssuerMetadataCredentialConfig;
|
|
1073
|
+
claims?: {
|
|
1074
|
+
[key: string]: unknown;
|
|
1075
|
+
};
|
|
1076
|
+
/**
|
|
1077
|
+
* Reference to the attribute provider used for fetching claims.
|
|
1078
|
+
* Optional: if set, claims will be fetched from this provider during issuance.
|
|
1079
|
+
*/
|
|
1080
|
+
attributeProviderId?: string;
|
|
1081
|
+
attributeProvider?: AttributeProviderEntity;
|
|
1082
|
+
/**
|
|
1083
|
+
* Reference to the webhook endpoint used for notifications.
|
|
1084
|
+
* Optional: if set, notifications will be sent to this endpoint.
|
|
1085
|
+
*/
|
|
1086
|
+
webhookEndpointId?: string;
|
|
1087
|
+
webhookEndpoint?: WebhookEndpointEntity;
|
|
1088
|
+
disclosureFrame?: {
|
|
1089
|
+
[key: string]: unknown;
|
|
1090
|
+
};
|
|
1091
|
+
keyBinding?: boolean;
|
|
1092
|
+
/**
|
|
1093
|
+
* Reference to the key chain used for signing.
|
|
1094
|
+
* Optional: if not specified, the default attestation key chain will be used.
|
|
1095
|
+
*/
|
|
1096
|
+
keyChainId?: string;
|
|
1097
|
+
keyChain?: KeyChainEntity;
|
|
1098
|
+
statusManagement?: boolean;
|
|
1099
|
+
lifeTime?: number;
|
|
1100
|
+
schema?: SchemaResponse;
|
|
1101
|
+
};
|
|
1102
|
+
type CredentialConfigCreate = {
|
|
1103
|
+
/**
|
|
1104
|
+
* VCT as a URI string (e.g., urn:eudi:pid:de:1) or as an object for EUDIPLO-hosted VCT
|
|
1105
|
+
*/
|
|
1106
|
+
vct?: string | Vct;
|
|
1107
|
+
/**
|
|
1108
|
+
* List of IAE actions to execute before credential issuance
|
|
1109
|
+
*/
|
|
1110
|
+
iaeActions?: Array<IaeActionOpenid4VpPresentation | IaeActionRedirectToWeb>;
|
|
1111
|
+
/**
|
|
1112
|
+
* Embedded disclosure policy (discriminated union by `policy`).
|
|
1113
|
+
* The discriminator makes class-transformer instantiate the right subclass,
|
|
1114
|
+
* and then class-validator runs that subclass’s rules.
|
|
1115
|
+
*/
|
|
1116
|
+
embeddedDisclosurePolicy?: EmbeddedDisclosurePolicy;
|
|
1117
|
+
id: string;
|
|
1118
|
+
description?: string;
|
|
1119
|
+
config: IssuerMetadataCredentialConfig;
|
|
1120
|
+
claims?: {
|
|
1121
|
+
[key: string]: unknown;
|
|
1122
|
+
};
|
|
1123
|
+
/**
|
|
1124
|
+
* Reference to the attribute provider used for fetching claims.
|
|
1125
|
+
* Optional: if set, claims will be fetched from this provider during issuance.
|
|
1126
|
+
*/
|
|
1127
|
+
attributeProviderId?: string;
|
|
1128
|
+
/**
|
|
1129
|
+
* Reference to the webhook endpoint used for notifications.
|
|
1130
|
+
* Optional: if set, notifications will be sent to this endpoint.
|
|
1131
|
+
*/
|
|
1132
|
+
webhookEndpointId?: string;
|
|
1133
|
+
disclosureFrame?: {
|
|
1134
|
+
[key: string]: unknown;
|
|
1135
|
+
};
|
|
1136
|
+
keyBinding?: boolean;
|
|
1137
|
+
/**
|
|
1138
|
+
* Reference to the key chain used for signing.
|
|
1139
|
+
* Optional: if not specified, the default attestation key chain will be used.
|
|
1140
|
+
*/
|
|
1141
|
+
keyChainId?: string;
|
|
1142
|
+
statusManagement?: boolean;
|
|
1143
|
+
lifeTime?: number;
|
|
1144
|
+
schema?: SchemaResponse;
|
|
1145
|
+
};
|
|
1146
|
+
type CredentialConfigUpdate = {
|
|
1147
|
+
/**
|
|
1148
|
+
* VCT as a URI string (e.g., urn:eudi:pid:de:1) or as an object for EUDIPLO-hosted VCT
|
|
1149
|
+
*/
|
|
1150
|
+
vct?: string | Vct;
|
|
1151
|
+
/**
|
|
1152
|
+
* List of IAE actions to execute before credential issuance
|
|
1153
|
+
*/
|
|
1154
|
+
iaeActions?: Array<IaeActionOpenid4VpPresentation | IaeActionRedirectToWeb>;
|
|
1155
|
+
/**
|
|
1156
|
+
* Embedded disclosure policy (discriminated union by `policy`).
|
|
1157
|
+
* The discriminator makes class-transformer instantiate the right subclass,
|
|
1158
|
+
* and then class-validator runs that subclass’s rules.
|
|
1159
|
+
*/
|
|
1160
|
+
embeddedDisclosurePolicy?: EmbeddedDisclosurePolicy;
|
|
1161
|
+
id?: string;
|
|
1162
|
+
description?: string;
|
|
1163
|
+
config?: IssuerMetadataCredentialConfig;
|
|
1164
|
+
claims?: {
|
|
1165
|
+
[key: string]: unknown;
|
|
1166
|
+
};
|
|
1167
|
+
/**
|
|
1168
|
+
* Reference to the attribute provider used for fetching claims.
|
|
1169
|
+
* Optional: if set, claims will be fetched from this provider during issuance.
|
|
1170
|
+
*/
|
|
1171
|
+
attributeProviderId?: string;
|
|
1172
|
+
/**
|
|
1173
|
+
* Reference to the webhook endpoint used for notifications.
|
|
1174
|
+
* Optional: if set, notifications will be sent to this endpoint.
|
|
1175
|
+
*/
|
|
1176
|
+
webhookEndpointId?: string;
|
|
1177
|
+
disclosureFrame?: {
|
|
1178
|
+
[key: string]: unknown;
|
|
1179
|
+
};
|
|
1180
|
+
keyBinding?: boolean;
|
|
1181
|
+
/**
|
|
1182
|
+
* Reference to the key chain used for signing.
|
|
1183
|
+
* Optional: if not specified, the default attestation key chain will be used.
|
|
1184
|
+
*/
|
|
1185
|
+
keyChainId?: string;
|
|
1186
|
+
statusManagement?: boolean;
|
|
1187
|
+
lifeTime?: number;
|
|
1188
|
+
schema?: SchemaResponse;
|
|
1189
|
+
};
|
|
1190
|
+
type CreateAttributeProviderDto = {
|
|
1191
|
+
auth: WebHookAuthConfigNone | WebHookAuthConfigHeader;
|
|
1192
|
+
id: string;
|
|
1193
|
+
name: string;
|
|
1194
|
+
description?: string;
|
|
1195
|
+
url: string;
|
|
1196
|
+
};
|
|
1197
|
+
type UpdateAttributeProviderDto = {
|
|
1198
|
+
auth?: WebHookAuthConfigNone | WebHookAuthConfigHeader;
|
|
1199
|
+
id?: string;
|
|
1200
|
+
name?: string;
|
|
1201
|
+
description?: string;
|
|
1202
|
+
url?: string;
|
|
1203
|
+
};
|
|
1204
|
+
type CreateWebhookEndpointDto = {
|
|
1205
|
+
auth: WebHookAuthConfigNone | WebHookAuthConfigHeader;
|
|
1206
|
+
id: string;
|
|
1207
|
+
name: string;
|
|
1208
|
+
description?: string;
|
|
1209
|
+
url: string;
|
|
1210
|
+
};
|
|
1211
|
+
type UpdateWebhookEndpointDto = {
|
|
1212
|
+
auth?: WebHookAuthConfigNone | WebHookAuthConfigHeader;
|
|
1213
|
+
id?: string;
|
|
1214
|
+
name?: string;
|
|
1215
|
+
description?: string;
|
|
1216
|
+
url?: string;
|
|
1217
|
+
};
|
|
1218
|
+
type Dcql = {
|
|
1219
|
+
credentials: Array<CredentialQuery>;
|
|
1220
|
+
credential_sets?: Array<CredentialSetQuery>;
|
|
1221
|
+
};
|
|
1222
|
+
type RegistrationCertificateRequest = {
|
|
1223
|
+
/**
|
|
1224
|
+
* The body of the registration certificate request containing the necessary details.
|
|
1225
|
+
*/
|
|
1226
|
+
jwt: string;
|
|
1227
|
+
};
|
|
1228
|
+
type PresentationAttachment = {
|
|
1229
|
+
format: string;
|
|
1230
|
+
data: {
|
|
1231
|
+
[key: string]: unknown;
|
|
1232
|
+
};
|
|
1233
|
+
credential_ids?: Array<string>;
|
|
1234
|
+
};
|
|
1235
|
+
type PresentationConfig = {
|
|
1236
|
+
/**
|
|
1237
|
+
* Unique identifier for the VP request.
|
|
1238
|
+
*/
|
|
1239
|
+
id: string;
|
|
1240
|
+
/**
|
|
1241
|
+
* The tenant that owns this object.
|
|
1242
|
+
*/
|
|
1243
|
+
tenant: TenantEntity;
|
|
1244
|
+
/**
|
|
1245
|
+
* Description of the presentation configuration.
|
|
1246
|
+
*/
|
|
1247
|
+
description?: string;
|
|
1248
|
+
/**
|
|
1249
|
+
* Lifetime how long the presentation request is valid after creation, in seconds.
|
|
1250
|
+
*/
|
|
1251
|
+
lifeTime?: number;
|
|
1252
|
+
/**
|
|
1253
|
+
* The DCQL query to be used for the VP request.
|
|
1254
|
+
*/
|
|
1255
|
+
dcql_query: Dcql;
|
|
1256
|
+
transaction_data?: Array<TransactionData>;
|
|
1257
|
+
/**
|
|
1258
|
+
* The registration certificate request containing the necessary details.
|
|
1259
|
+
*/
|
|
1260
|
+
registrationCert?: RegistrationCertificateRequest;
|
|
1261
|
+
/**
|
|
1262
|
+
* Optional webhook URL to receive the response.
|
|
1263
|
+
*/
|
|
1264
|
+
webhook?: WebhookConfig;
|
|
1265
|
+
/**
|
|
1266
|
+
* The timestamp when the VP request was created.
|
|
1267
|
+
*/
|
|
1268
|
+
createdAt: string;
|
|
1269
|
+
/**
|
|
1270
|
+
* The timestamp when the VP request was last updated.
|
|
1271
|
+
*/
|
|
1272
|
+
updatedAt: string;
|
|
1273
|
+
/**
|
|
1274
|
+
* Attestation that should be attached
|
|
1275
|
+
*/
|
|
1276
|
+
attached?: Array<PresentationAttachment>;
|
|
1277
|
+
/**
|
|
1278
|
+
* Redirect URI to which the user-agent should be redirected after the presentation is completed.
|
|
1279
|
+
* You can use the `{sessionId}` placeholder in the URI, which will be replaced with the actual session ID.
|
|
1280
|
+
*/
|
|
1281
|
+
redirectUri?: string;
|
|
1282
|
+
/**
|
|
1283
|
+
* Optional ID of the access certificate to use for signing the presentation request.
|
|
1284
|
+
* If not provided, the default access certificate for the tenant will be used.
|
|
1285
|
+
*
|
|
1286
|
+
* Note: This is intentionally NOT a TypeORM relationship because CertEntity uses
|
|
1287
|
+
* a composite primary key (id + tenantId), and SQLite cannot create foreign keys
|
|
1288
|
+
* that reference only part of a composite primary key. The relationship is handled
|
|
1289
|
+
* at the application level in the service layer.
|
|
1290
|
+
*/
|
|
1291
|
+
accessKeyChainId?: string;
|
|
1292
|
+
};
|
|
1293
|
+
type PresentationConfigCreateDto = {
|
|
1294
|
+
/**
|
|
1295
|
+
* Unique identifier for the VP request.
|
|
1296
|
+
*/
|
|
1297
|
+
id: string;
|
|
1298
|
+
/**
|
|
1299
|
+
* Description of the presentation configuration.
|
|
1300
|
+
*/
|
|
1301
|
+
description?: string;
|
|
1302
|
+
/**
|
|
1303
|
+
* Lifetime how long the presentation request is valid after creation, in seconds.
|
|
1304
|
+
*/
|
|
1305
|
+
lifeTime?: number;
|
|
1306
|
+
/**
|
|
1307
|
+
* The DCQL query to be used for the VP request.
|
|
1308
|
+
*/
|
|
1309
|
+
dcql_query: Dcql;
|
|
1310
|
+
transaction_data?: Array<TransactionData>;
|
|
1311
|
+
/**
|
|
1312
|
+
* The registration certificate request containing the necessary details.
|
|
1313
|
+
*/
|
|
1314
|
+
registrationCert?: RegistrationCertificateRequest;
|
|
1315
|
+
/**
|
|
1316
|
+
* Optional webhook URL to receive the response.
|
|
1317
|
+
*/
|
|
1318
|
+
webhook?: WebhookConfig;
|
|
1319
|
+
/**
|
|
1320
|
+
* Attestation that should be attached
|
|
1321
|
+
*/
|
|
1322
|
+
attached?: Array<PresentationAttachment>;
|
|
1323
|
+
/**
|
|
1324
|
+
* Redirect URI to which the user-agent should be redirected after the presentation is completed.
|
|
1325
|
+
* You can use the `{sessionId}` placeholder in the URI, which will be replaced with the actual session ID.
|
|
1326
|
+
*/
|
|
1327
|
+
redirectUri?: string;
|
|
1328
|
+
/**
|
|
1329
|
+
* Optional ID of the access certificate to use for signing the presentation request.
|
|
1330
|
+
* If not provided, the default access certificate for the tenant will be used.
|
|
1331
|
+
*
|
|
1332
|
+
* Note: This is intentionally NOT a TypeORM relationship because CertEntity uses
|
|
1333
|
+
* a composite primary key (id + tenantId), and SQLite cannot create foreign keys
|
|
1334
|
+
* that reference only part of a composite primary key. The relationship is handled
|
|
1335
|
+
* at the application level in the service layer.
|
|
1336
|
+
*/
|
|
1337
|
+
accessKeyChainId?: string;
|
|
1338
|
+
};
|
|
1339
|
+
type PresentationConfigUpdateDto = {
|
|
1340
|
+
/**
|
|
1341
|
+
* Unique identifier for the VP request.
|
|
1342
|
+
*/
|
|
1343
|
+
id?: string;
|
|
1344
|
+
/**
|
|
1345
|
+
* Description of the presentation configuration.
|
|
1346
|
+
*/
|
|
1347
|
+
description?: string;
|
|
1348
|
+
/**
|
|
1349
|
+
* Lifetime how long the presentation request is valid after creation, in seconds.
|
|
1350
|
+
*/
|
|
1351
|
+
lifeTime?: number;
|
|
1352
|
+
/**
|
|
1353
|
+
* The DCQL query to be used for the VP request.
|
|
1354
|
+
*/
|
|
1355
|
+
dcql_query?: Dcql;
|
|
1356
|
+
transaction_data?: Array<TransactionData>;
|
|
1357
|
+
/**
|
|
1358
|
+
* The registration certificate request containing the necessary details.
|
|
1359
|
+
*/
|
|
1360
|
+
registrationCert?: RegistrationCertificateRequest;
|
|
1361
|
+
/**
|
|
1362
|
+
* Optional webhook URL to receive the response.
|
|
1363
|
+
*/
|
|
1364
|
+
webhook?: WebhookConfig;
|
|
1365
|
+
/**
|
|
1366
|
+
* Attestation that should be attached
|
|
1367
|
+
*/
|
|
1368
|
+
attached?: Array<PresentationAttachment>;
|
|
1369
|
+
/**
|
|
1370
|
+
* Redirect URI to which the user-agent should be redirected after the presentation is completed.
|
|
1371
|
+
* You can use the `{sessionId}` placeholder in the URI, which will be replaced with the actual session ID.
|
|
1372
|
+
*/
|
|
1373
|
+
redirectUri?: string;
|
|
1374
|
+
/**
|
|
1375
|
+
* Optional ID of the access certificate to use for signing the presentation request.
|
|
1376
|
+
* If not provided, the default access certificate for the tenant will be used.
|
|
1377
|
+
*
|
|
1378
|
+
* Note: This is intentionally NOT a TypeORM relationship because CertEntity uses
|
|
1379
|
+
* a composite primary key (id + tenantId), and SQLite cannot create foreign keys
|
|
1380
|
+
* that reference only part of a composite primary key. The relationship is handled
|
|
1381
|
+
* at the application level in the service layer.
|
|
1382
|
+
*/
|
|
1383
|
+
accessKeyChainId?: string;
|
|
1384
|
+
};
|
|
1385
|
+
type DeferredCredentialRequestDto = {
|
|
1386
|
+
/**
|
|
1387
|
+
* The transaction identifier previously returned by the Credential Endpoint
|
|
1388
|
+
*/
|
|
1389
|
+
transaction_id: string;
|
|
1390
|
+
};
|
|
1391
|
+
type NotificationRequestDto = {
|
|
1392
|
+
notification_id: string;
|
|
1393
|
+
event: {
|
|
1394
|
+
[key: string]: unknown;
|
|
1395
|
+
};
|
|
1396
|
+
};
|
|
1397
|
+
type ParResponseDto = {
|
|
1398
|
+
/**
|
|
1399
|
+
* The request URI for the Pushed Authorization Request.
|
|
1400
|
+
*/
|
|
1401
|
+
request_uri: string;
|
|
1402
|
+
/**
|
|
1403
|
+
* The expiration time for the request URI in seconds.
|
|
1404
|
+
*/
|
|
1405
|
+
expires_in: number;
|
|
1406
|
+
};
|
|
1407
|
+
type InteractiveAuthorizationRequestDto = {
|
|
1408
|
+
/**
|
|
1409
|
+
* Response type (for initial request)
|
|
1410
|
+
*/
|
|
1411
|
+
response_type?: string;
|
|
1412
|
+
/**
|
|
1413
|
+
* Client identifier (for initial request)
|
|
1414
|
+
*/
|
|
1415
|
+
client_id?: string;
|
|
1416
|
+
/**
|
|
1417
|
+
* Comma-separated list of supported interaction types (for initial request)
|
|
1418
|
+
*/
|
|
1419
|
+
interaction_types_supported?: string;
|
|
1420
|
+
/**
|
|
1421
|
+
* Redirect URI (for initial request)
|
|
1422
|
+
*/
|
|
1423
|
+
redirect_uri?: string;
|
|
1424
|
+
/**
|
|
1425
|
+
* OAuth scope
|
|
1426
|
+
*/
|
|
1427
|
+
scope?: string;
|
|
1428
|
+
/**
|
|
1429
|
+
* PKCE code challenge
|
|
1430
|
+
*/
|
|
1431
|
+
code_challenge?: string;
|
|
1432
|
+
/**
|
|
1433
|
+
* PKCE code challenge method
|
|
1434
|
+
*/
|
|
1435
|
+
code_challenge_method?: string;
|
|
1436
|
+
/**
|
|
1437
|
+
* Authorization details
|
|
1438
|
+
*/
|
|
1439
|
+
authorization_details?: {
|
|
1440
|
+
[key: string]: unknown;
|
|
1441
|
+
};
|
|
1442
|
+
/**
|
|
1443
|
+
* State parameter
|
|
1444
|
+
*/
|
|
1445
|
+
state?: string;
|
|
1446
|
+
/**
|
|
1447
|
+
* Issuer state from credential offer
|
|
1448
|
+
*/
|
|
1449
|
+
issuer_state?: string;
|
|
1450
|
+
/**
|
|
1451
|
+
* Auth session identifier (for follow-up request)
|
|
1452
|
+
*/
|
|
1453
|
+
auth_session?: string;
|
|
1454
|
+
/**
|
|
1455
|
+
* OpenID4VP response (for follow-up request)
|
|
1456
|
+
*/
|
|
1457
|
+
openid4vp_response?: string;
|
|
1458
|
+
/**
|
|
1459
|
+
* PKCE code verifier (for follow-up request)
|
|
1460
|
+
*/
|
|
1461
|
+
code_verifier?: string;
|
|
1462
|
+
/**
|
|
1463
|
+
* JAR request JWT (by value)
|
|
1464
|
+
*/
|
|
1465
|
+
request?: string;
|
|
1466
|
+
/**
|
|
1467
|
+
* JAR request URI (by reference)
|
|
1468
|
+
*/
|
|
1469
|
+
request_uri?: string;
|
|
1470
|
+
};
|
|
1471
|
+
type InteractiveAuthorizationCodeResponseDto = {
|
|
1472
|
+
/**
|
|
1473
|
+
* Response status
|
|
1474
|
+
*/
|
|
1475
|
+
status: string;
|
|
1476
|
+
/**
|
|
1477
|
+
* Authorization code
|
|
1478
|
+
*/
|
|
1479
|
+
code: string;
|
|
1480
|
+
};
|
|
1481
|
+
type InteractiveAuthorizationErrorResponseDto = {
|
|
1482
|
+
/**
|
|
1483
|
+
* OAuth error code
|
|
1484
|
+
*/
|
|
1485
|
+
error: string;
|
|
1486
|
+
/**
|
|
1487
|
+
* Human-readable error description
|
|
1488
|
+
*/
|
|
1489
|
+
error_description?: string;
|
|
1490
|
+
};
|
|
1491
|
+
type ChainedAsParRequestDto = {
|
|
1492
|
+
/**
|
|
1493
|
+
* OAuth response type (must be 'code')
|
|
1494
|
+
*/
|
|
1495
|
+
response_type: string;
|
|
1496
|
+
/**
|
|
1497
|
+
* Client identifier (wallet identifier)
|
|
1498
|
+
*/
|
|
1499
|
+
client_id: string;
|
|
1500
|
+
/**
|
|
1501
|
+
* URI to redirect the wallet after authorization
|
|
1502
|
+
*/
|
|
1503
|
+
redirect_uri: string;
|
|
1504
|
+
/**
|
|
1505
|
+
* PKCE code challenge
|
|
1506
|
+
*/
|
|
1507
|
+
code_challenge?: string;
|
|
1508
|
+
/**
|
|
1509
|
+
* PKCE code challenge method (e.g., S256)
|
|
1510
|
+
*/
|
|
1511
|
+
code_challenge_method?: string;
|
|
1512
|
+
/**
|
|
1513
|
+
* State parameter (returned in redirect)
|
|
1514
|
+
*/
|
|
1515
|
+
state?: string;
|
|
1516
|
+
/**
|
|
1517
|
+
* Scope requested
|
|
1518
|
+
*/
|
|
1519
|
+
scope?: string;
|
|
1520
|
+
/**
|
|
1521
|
+
* Issuer state from credential offer
|
|
1522
|
+
*/
|
|
1523
|
+
issuer_state?: string;
|
|
1524
|
+
/**
|
|
1525
|
+
* Authorization details (JSON array)
|
|
1526
|
+
*/
|
|
1527
|
+
authorization_details?: Array<{
|
|
1528
|
+
[key: string]: unknown;
|
|
1529
|
+
}>;
|
|
1530
|
+
};
|
|
1531
|
+
type ChainedAsParResponseDto = {
|
|
1532
|
+
/**
|
|
1533
|
+
* The request URI to use at the authorization endpoint
|
|
1534
|
+
*/
|
|
1535
|
+
request_uri: string;
|
|
1536
|
+
/**
|
|
1537
|
+
* The lifetime of the request URI in seconds
|
|
1538
|
+
*/
|
|
1539
|
+
expires_in: number;
|
|
1540
|
+
};
|
|
1541
|
+
type ChainedAsErrorResponseDto = {
|
|
1542
|
+
/**
|
|
1543
|
+
* Error code
|
|
1544
|
+
*/
|
|
1545
|
+
error: string;
|
|
1546
|
+
/**
|
|
1547
|
+
* Human-readable error description
|
|
1548
|
+
*/
|
|
1549
|
+
error_description?: string;
|
|
1550
|
+
};
|
|
1551
|
+
type ChainedAsTokenRequestDto = {
|
|
1552
|
+
/**
|
|
1553
|
+
* Grant type (must be 'authorization_code')
|
|
1554
|
+
*/
|
|
1555
|
+
grant_type: string;
|
|
1556
|
+
/**
|
|
1557
|
+
* Authorization code received in the callback
|
|
1558
|
+
*/
|
|
1559
|
+
code: string;
|
|
1560
|
+
/**
|
|
1561
|
+
* Client identifier
|
|
1562
|
+
*/
|
|
1563
|
+
client_id?: string;
|
|
1564
|
+
/**
|
|
1565
|
+
* Redirect URI (must match the one used in PAR)
|
|
1566
|
+
*/
|
|
1567
|
+
redirect_uri?: string;
|
|
1568
|
+
/**
|
|
1569
|
+
* PKCE code verifier
|
|
1570
|
+
*/
|
|
1571
|
+
code_verifier?: string;
|
|
1572
|
+
};
|
|
1573
|
+
type ChainedAsTokenResponseDto = {
|
|
1574
|
+
/**
|
|
1575
|
+
* The access token
|
|
1576
|
+
*/
|
|
1577
|
+
access_token: string;
|
|
1578
|
+
/**
|
|
1579
|
+
* Token type (Bearer or DPoP)
|
|
1580
|
+
*/
|
|
1581
|
+
token_type: string;
|
|
1582
|
+
/**
|
|
1583
|
+
* Token lifetime in seconds
|
|
1584
|
+
*/
|
|
1585
|
+
expires_in: number;
|
|
1586
|
+
/**
|
|
1587
|
+
* Scope granted
|
|
1588
|
+
*/
|
|
1589
|
+
scope?: string;
|
|
1590
|
+
/**
|
|
1591
|
+
* Authorized credential configurations
|
|
1592
|
+
*/
|
|
1593
|
+
authorization_details?: Array<{
|
|
1594
|
+
[key: string]: unknown;
|
|
1595
|
+
}>;
|
|
1596
|
+
/**
|
|
1597
|
+
* C_NONCE for credential request
|
|
1598
|
+
*/
|
|
1599
|
+
c_nonce?: string;
|
|
1600
|
+
/**
|
|
1601
|
+
* C_NONCE lifetime in seconds
|
|
1602
|
+
*/
|
|
1603
|
+
c_nonce_expires_in?: number;
|
|
1604
|
+
};
|
|
1605
|
+
type OfferResponse = {
|
|
1606
|
+
uri: string;
|
|
1607
|
+
/**
|
|
1608
|
+
* URI for cross-device flows (no redirect after completion)
|
|
1609
|
+
*/
|
|
1610
|
+
crossDeviceUri?: string;
|
|
1611
|
+
session: string;
|
|
1612
|
+
};
|
|
1613
|
+
type CompleteDeferredDto = {
|
|
1614
|
+
/**
|
|
1615
|
+
* Claims to include in the credential. The structure should match the credential configuration's expected claims.
|
|
1616
|
+
*/
|
|
1617
|
+
claims: {
|
|
1618
|
+
[key: string]: unknown;
|
|
1619
|
+
};
|
|
1620
|
+
};
|
|
1621
|
+
type DeferredOperationResponse = {
|
|
1622
|
+
/**
|
|
1623
|
+
* The transaction ID
|
|
1624
|
+
*/
|
|
1625
|
+
transactionId: string;
|
|
1626
|
+
/**
|
|
1627
|
+
* The new status of the transaction
|
|
1628
|
+
*/
|
|
1629
|
+
status: "pending" | "ready" | "retrieved" | "expired" | "failed";
|
|
1630
|
+
/**
|
|
1631
|
+
* Optional message
|
|
1632
|
+
*/
|
|
1633
|
+
message?: string;
|
|
1634
|
+
};
|
|
1635
|
+
type FailDeferredDto = {
|
|
1636
|
+
/**
|
|
1637
|
+
* Optional error message explaining why the issuance failed
|
|
1638
|
+
*/
|
|
1639
|
+
error?: string;
|
|
1640
|
+
};
|
|
1641
|
+
type EcPublic = {
|
|
1642
|
+
/**
|
|
1643
|
+
* The key type, which is always 'EC' for Elliptic Curve keys.
|
|
1644
|
+
*/
|
|
1645
|
+
kty: string;
|
|
1646
|
+
/**
|
|
1647
|
+
* The algorithm intended for use with the key, such as 'ES256'.
|
|
1648
|
+
*/
|
|
1649
|
+
crv: string;
|
|
1650
|
+
/**
|
|
1651
|
+
* The x coordinate of the EC public key.
|
|
1652
|
+
*/
|
|
1653
|
+
x: string;
|
|
1654
|
+
/**
|
|
1655
|
+
* The y coordinate of the EC public key.
|
|
1656
|
+
*/
|
|
1657
|
+
y: string;
|
|
1658
|
+
};
|
|
1659
|
+
type JwksResponseDto = {
|
|
1660
|
+
/**
|
|
1661
|
+
* An array of EC public keys in JWK format.
|
|
1662
|
+
*/
|
|
1663
|
+
keys: Array<EcPublic>;
|
|
1664
|
+
};
|
|
1665
|
+
type AuthorizationResponse = {
|
|
1666
|
+
/**
|
|
1667
|
+
* The response string containing the authorization details.
|
|
1668
|
+
*/
|
|
1669
|
+
response: string;
|
|
1670
|
+
/**
|
|
1671
|
+
* When set to true, the authorization response will be sent to the client.
|
|
1672
|
+
*/
|
|
1673
|
+
sendResponse?: boolean;
|
|
1674
|
+
};
|
|
1675
|
+
type RegistrarConfigEntity = {
|
|
1676
|
+
/**
|
|
1677
|
+
* The base URL of the registrar API
|
|
1678
|
+
*/
|
|
1679
|
+
registrarUrl: string;
|
|
1680
|
+
/**
|
|
1681
|
+
* The OIDC issuer URL for authentication (e.g., Keycloak realm URL)
|
|
1682
|
+
*/
|
|
1683
|
+
oidcUrl: string;
|
|
1684
|
+
/**
|
|
1685
|
+
* The OIDC client ID for the registrar
|
|
1686
|
+
*/
|
|
1687
|
+
clientId: string;
|
|
1688
|
+
/**
|
|
1689
|
+
* The OIDC client secret (optional, for confidential clients)
|
|
1690
|
+
*/
|
|
1691
|
+
clientSecret?: string;
|
|
1692
|
+
/**
|
|
1693
|
+
* The username for OIDC login
|
|
1694
|
+
*/
|
|
1695
|
+
username: string;
|
|
1696
|
+
/**
|
|
1697
|
+
* The password for OIDC login (stored in plaintext)
|
|
1698
|
+
*/
|
|
1699
|
+
password: string;
|
|
1700
|
+
/**
|
|
1701
|
+
* The tenant ID this configuration belongs to.
|
|
1702
|
+
*/
|
|
1703
|
+
tenantId: string;
|
|
1704
|
+
/**
|
|
1705
|
+
* The tenant that owns this configuration.
|
|
1706
|
+
*/
|
|
1707
|
+
tenant: TenantEntity;
|
|
1708
|
+
};
|
|
1709
|
+
type CreateRegistrarConfigDto = {
|
|
1710
|
+
/**
|
|
1711
|
+
* The base URL of the registrar API
|
|
1712
|
+
*/
|
|
1713
|
+
registrarUrl: string;
|
|
1714
|
+
/**
|
|
1715
|
+
* The OIDC issuer URL for authentication (e.g., Keycloak realm URL)
|
|
1716
|
+
*/
|
|
1717
|
+
oidcUrl: string;
|
|
1718
|
+
/**
|
|
1719
|
+
* The OIDC client ID for the registrar
|
|
1720
|
+
*/
|
|
1721
|
+
clientId: string;
|
|
1722
|
+
/**
|
|
1723
|
+
* The OIDC client secret (optional, for confidential clients)
|
|
1724
|
+
*/
|
|
1725
|
+
clientSecret?: string;
|
|
1726
|
+
/**
|
|
1727
|
+
* The username for OIDC login
|
|
1728
|
+
*/
|
|
1729
|
+
username: string;
|
|
1730
|
+
/**
|
|
1731
|
+
* The password for OIDC login (stored in plaintext)
|
|
1732
|
+
*/
|
|
1733
|
+
password: string;
|
|
1734
|
+
};
|
|
1735
|
+
type UpdateRegistrarConfigDto = {
|
|
1736
|
+
/**
|
|
1737
|
+
* The base URL of the registrar API
|
|
1738
|
+
*/
|
|
1739
|
+
registrarUrl?: string;
|
|
1740
|
+
/**
|
|
1741
|
+
* The OIDC issuer URL for authentication (e.g., Keycloak realm URL)
|
|
1742
|
+
*/
|
|
1743
|
+
oidcUrl?: string;
|
|
1744
|
+
/**
|
|
1745
|
+
* The OIDC client ID for the registrar
|
|
1746
|
+
*/
|
|
1747
|
+
clientId?: string;
|
|
1748
|
+
/**
|
|
1749
|
+
* The OIDC client secret (optional, for confidential clients)
|
|
1750
|
+
*/
|
|
1751
|
+
clientSecret?: string;
|
|
1752
|
+
/**
|
|
1753
|
+
* The username for OIDC login
|
|
1754
|
+
*/
|
|
1755
|
+
username?: string;
|
|
1756
|
+
/**
|
|
1757
|
+
* The password for OIDC login (stored in plaintext)
|
|
1758
|
+
*/
|
|
1759
|
+
password?: string;
|
|
1760
|
+
};
|
|
1761
|
+
type CreateAccessCertificateDto = {
|
|
1762
|
+
/**
|
|
1763
|
+
* The ID of the key to create an access certificate for
|
|
1764
|
+
*/
|
|
1765
|
+
keyId: string;
|
|
1766
|
+
};
|
|
1767
|
+
type TrustListEntityInfo = {
|
|
1768
|
+
name: string;
|
|
1769
|
+
lang?: string;
|
|
1770
|
+
uri?: string;
|
|
1771
|
+
country?: string;
|
|
1772
|
+
locality?: string;
|
|
1773
|
+
postalCode?: string;
|
|
1774
|
+
streetAddress?: string;
|
|
1775
|
+
contactUri?: string;
|
|
1776
|
+
};
|
|
1777
|
+
type InternalTrustListEntity = {
|
|
1778
|
+
type: "internal";
|
|
1779
|
+
issuerKeyChainId: string;
|
|
1780
|
+
revocationKeyChainId: string;
|
|
1781
|
+
info: TrustListEntityInfo;
|
|
1782
|
+
};
|
|
1783
|
+
type ExternalTrustListEntity = {
|
|
1784
|
+
type: "external";
|
|
1785
|
+
issuerCertPem: string;
|
|
1786
|
+
revocationCertPem: string;
|
|
1787
|
+
info: TrustListEntityInfo;
|
|
1788
|
+
};
|
|
1789
|
+
type TrustListCreateDto = {
|
|
1790
|
+
entities: Array<({
|
|
1791
|
+
type: "internal";
|
|
1792
|
+
} & InternalTrustListEntity) | ({
|
|
1793
|
+
type: "external";
|
|
1794
|
+
} & ExternalTrustListEntity)>;
|
|
1795
|
+
id?: string;
|
|
1796
|
+
description?: string;
|
|
1797
|
+
keyChainId?: string;
|
|
1798
|
+
/**
|
|
1799
|
+
* The full trust list JSON (generated LoTE structure)
|
|
1800
|
+
*/
|
|
1801
|
+
data?: {
|
|
1802
|
+
[key: string]: unknown;
|
|
1803
|
+
};
|
|
1804
|
+
};
|
|
1805
|
+
type TrustList = {
|
|
1806
|
+
/**
|
|
1807
|
+
* Unique identifier for the trust list
|
|
1808
|
+
*/
|
|
1809
|
+
id: string;
|
|
1810
|
+
description?: string;
|
|
1811
|
+
/**
|
|
1812
|
+
* The tenant ID for which the VP request is made.
|
|
1813
|
+
*/
|
|
1814
|
+
tenantId: string;
|
|
1815
|
+
/**
|
|
1816
|
+
* The tenant that owns this object.
|
|
1817
|
+
*/
|
|
1818
|
+
tenant: TenantEntity;
|
|
1819
|
+
keyChainId: string;
|
|
1820
|
+
keyChain: KeyChainEntity;
|
|
1821
|
+
/**
|
|
1822
|
+
* The full trust list JSON (generated LoTE structure)
|
|
1823
|
+
*/
|
|
1824
|
+
data?: {
|
|
1825
|
+
[key: string]: unknown;
|
|
1826
|
+
};
|
|
1827
|
+
/**
|
|
1828
|
+
* The original entity configuration used to create this trust list.
|
|
1829
|
+
* Stored for round-tripping when editing.
|
|
1830
|
+
*/
|
|
1831
|
+
entityConfig?: Array<{
|
|
1832
|
+
[key: string]: unknown;
|
|
1833
|
+
}>;
|
|
1834
|
+
/**
|
|
1835
|
+
* The sequence number for versioning (incremented on updates)
|
|
1836
|
+
*/
|
|
1837
|
+
sequenceNumber: number;
|
|
1838
|
+
/**
|
|
1839
|
+
* The signed JWT representation of this trust list
|
|
1840
|
+
*/
|
|
1841
|
+
jwt: string;
|
|
1842
|
+
createdAt: string;
|
|
1843
|
+
updatedAt: string;
|
|
1844
|
+
};
|
|
1845
|
+
type TrustListVersion = {
|
|
1846
|
+
id: string;
|
|
1847
|
+
trustListId: string;
|
|
1848
|
+
trustList: TrustList;
|
|
1849
|
+
tenantId: string;
|
|
1850
|
+
/**
|
|
1851
|
+
* The sequence number at the time this version was created
|
|
1852
|
+
*/
|
|
1853
|
+
sequenceNumber: number;
|
|
1854
|
+
/**
|
|
1855
|
+
* The full trust list JSON at this version
|
|
1856
|
+
*/
|
|
1857
|
+
data: {
|
|
1858
|
+
[key: string]: unknown;
|
|
1859
|
+
};
|
|
1860
|
+
/**
|
|
1861
|
+
* The entity configuration at this version
|
|
1862
|
+
*/
|
|
1863
|
+
entityConfig?: {
|
|
1864
|
+
[key: string]: unknown;
|
|
1865
|
+
};
|
|
1866
|
+
/**
|
|
1867
|
+
* The signed JWT at this version
|
|
1868
|
+
*/
|
|
1869
|
+
jwt: string;
|
|
1870
|
+
createdAt: string;
|
|
1871
|
+
};
|
|
1872
|
+
type KmsProviderCapabilitiesDto = {
|
|
1873
|
+
/**
|
|
1874
|
+
* Whether the provider supports importing existing keys.
|
|
1875
|
+
*/
|
|
1876
|
+
canImport: boolean;
|
|
1877
|
+
/**
|
|
1878
|
+
* Whether the provider supports generating new keys.
|
|
1879
|
+
*/
|
|
1880
|
+
canCreate: boolean;
|
|
1881
|
+
/**
|
|
1882
|
+
* Whether the provider supports deleting keys.
|
|
1883
|
+
*/
|
|
1884
|
+
canDelete: boolean;
|
|
1885
|
+
};
|
|
1886
|
+
type KmsProviderInfoDto = {
|
|
1887
|
+
/**
|
|
1888
|
+
* Unique provider ID (matches the id in kms.json).
|
|
1889
|
+
*/
|
|
1890
|
+
name: string;
|
|
1891
|
+
/**
|
|
1892
|
+
* Type of the KMS provider (db, vault, aws-kms).
|
|
1893
|
+
*/
|
|
1894
|
+
type: string;
|
|
1895
|
+
/**
|
|
1896
|
+
* Human-readable description of this provider instance.
|
|
1897
|
+
*/
|
|
1898
|
+
description?: string;
|
|
1899
|
+
/**
|
|
1900
|
+
* Capabilities of this provider.
|
|
1901
|
+
*/
|
|
1902
|
+
capabilities: KmsProviderCapabilitiesDto;
|
|
1903
|
+
};
|
|
1904
|
+
type KmsProvidersResponseDto = {
|
|
1905
|
+
/**
|
|
1906
|
+
* Detailed info for each registered KMS provider.
|
|
1907
|
+
*/
|
|
1908
|
+
providers: Array<KmsProviderInfoDto>;
|
|
1909
|
+
/**
|
|
1910
|
+
* The default KMS provider name.
|
|
1911
|
+
*/
|
|
1912
|
+
default: string;
|
|
1913
|
+
};
|
|
1914
|
+
type CertificateInfoDto = {
|
|
1915
|
+
/**
|
|
1916
|
+
* Certificate in PEM format.
|
|
1917
|
+
*/
|
|
1918
|
+
pem: string;
|
|
1919
|
+
/**
|
|
1920
|
+
* Certificate subject (CN).
|
|
1921
|
+
*/
|
|
1922
|
+
subject?: string;
|
|
1923
|
+
/**
|
|
1924
|
+
* Certificate issuer (CN).
|
|
1925
|
+
*/
|
|
1926
|
+
issuer?: string;
|
|
1927
|
+
/**
|
|
1928
|
+
* Certificate not before date.
|
|
1929
|
+
*/
|
|
1930
|
+
notBefore?: string;
|
|
1931
|
+
/**
|
|
1932
|
+
* Certificate not after date.
|
|
1933
|
+
*/
|
|
1934
|
+
notAfter?: string;
|
|
1935
|
+
/**
|
|
1936
|
+
* Serial number.
|
|
1937
|
+
*/
|
|
1938
|
+
serialNumber?: string;
|
|
1939
|
+
};
|
|
1940
|
+
type PublicKeyInfoDto = {
|
|
1941
|
+
/**
|
|
1942
|
+
* Key type (e.g., EC).
|
|
1943
|
+
*/
|
|
1944
|
+
kty: string;
|
|
1945
|
+
/**
|
|
1946
|
+
* Key algorithm (e.g., ES256).
|
|
1947
|
+
*/
|
|
1948
|
+
alg?: string;
|
|
1949
|
+
/**
|
|
1950
|
+
* Key ID.
|
|
1951
|
+
*/
|
|
1952
|
+
kid?: string;
|
|
1953
|
+
/**
|
|
1954
|
+
* Curve (for EC keys).
|
|
1955
|
+
*/
|
|
1956
|
+
crv?: string;
|
|
1957
|
+
};
|
|
1958
|
+
type RotationPolicyResponseDto = {
|
|
1959
|
+
/**
|
|
1960
|
+
* Whether automatic key rotation is enabled.
|
|
1961
|
+
*/
|
|
1962
|
+
enabled: boolean;
|
|
1963
|
+
/**
|
|
1964
|
+
* Rotation interval in days.
|
|
1965
|
+
*/
|
|
1966
|
+
intervalDays?: number;
|
|
1967
|
+
/**
|
|
1968
|
+
* Certificate validity in days.
|
|
1969
|
+
*/
|
|
1970
|
+
certValidityDays?: number;
|
|
1971
|
+
/**
|
|
1972
|
+
* Next scheduled rotation date.
|
|
1973
|
+
*/
|
|
1974
|
+
nextRotationAt?: string;
|
|
1975
|
+
};
|
|
1976
|
+
type KeyChainResponseDto = {
|
|
1977
|
+
/**
|
|
1978
|
+
* Unique identifier for the key chain.
|
|
1979
|
+
*/
|
|
1980
|
+
id: string;
|
|
1981
|
+
/**
|
|
1982
|
+
* Usage type of the key chain.
|
|
1983
|
+
*/
|
|
1984
|
+
usageType: "access" | "attestation" | "trustList" | "statusList" | "encrypt";
|
|
1985
|
+
/**
|
|
1986
|
+
* Type of key chain (standalone or internalChain).
|
|
1987
|
+
*/
|
|
1988
|
+
type: "standalone" | "internalChain";
|
|
1989
|
+
/**
|
|
1990
|
+
* Human-readable description.
|
|
1991
|
+
*/
|
|
1992
|
+
description?: string;
|
|
1993
|
+
/**
|
|
1994
|
+
* KMS provider used for this key chain.
|
|
1995
|
+
*/
|
|
1996
|
+
kmsProvider: string;
|
|
1997
|
+
/**
|
|
1998
|
+
* Root CA certificate (only for internalChain type).
|
|
1999
|
+
*/
|
|
2000
|
+
rootCertificate?: CertificateInfoDto;
|
|
2001
|
+
/**
|
|
2002
|
+
* Active signing key's public key info.
|
|
2003
|
+
*/
|
|
2004
|
+
activePublicKey: PublicKeyInfoDto;
|
|
2005
|
+
/**
|
|
2006
|
+
* Active signing key's certificate. Not present for encryption keys.
|
|
2007
|
+
*/
|
|
2008
|
+
activeCertificate?: CertificateInfoDto;
|
|
2009
|
+
/**
|
|
2010
|
+
* Previous signing key's public key info (if in grace period).
|
|
2011
|
+
*/
|
|
2012
|
+
previousPublicKey?: PublicKeyInfoDto;
|
|
2013
|
+
/**
|
|
2014
|
+
* Previous signing key's certificate (if in grace period).
|
|
2015
|
+
*/
|
|
2016
|
+
previousCertificate?: CertificateInfoDto;
|
|
2017
|
+
/**
|
|
2018
|
+
* Previous key expiry date.
|
|
2019
|
+
*/
|
|
2020
|
+
previousKeyExpiry?: string;
|
|
2021
|
+
/**
|
|
2022
|
+
* Rotation policy configuration.
|
|
2023
|
+
*/
|
|
2024
|
+
rotationPolicy: RotationPolicyResponseDto;
|
|
2025
|
+
/**
|
|
2026
|
+
* Timestamp when the key chain was created.
|
|
2027
|
+
*/
|
|
2028
|
+
createdAt: string;
|
|
2029
|
+
/**
|
|
2030
|
+
* Timestamp when the key chain was last updated.
|
|
2031
|
+
*/
|
|
2032
|
+
updatedAt: string;
|
|
2033
|
+
};
|
|
2034
|
+
type ExportEcJwk = {
|
|
2035
|
+
/**
|
|
2036
|
+
* Key type
|
|
2037
|
+
*/
|
|
2038
|
+
kty: string;
|
|
2039
|
+
/**
|
|
2040
|
+
* Curve
|
|
2041
|
+
*/
|
|
2042
|
+
crv: string;
|
|
2043
|
+
/**
|
|
2044
|
+
* X coordinate (base64url)
|
|
2045
|
+
*/
|
|
2046
|
+
x: string;
|
|
2047
|
+
/**
|
|
2048
|
+
* Y coordinate (base64url)
|
|
2049
|
+
*/
|
|
2050
|
+
y: string;
|
|
2051
|
+
/**
|
|
2052
|
+
* Private key (base64url)
|
|
2053
|
+
*/
|
|
2054
|
+
d: string;
|
|
2055
|
+
/**
|
|
2056
|
+
* Algorithm
|
|
2057
|
+
*/
|
|
2058
|
+
alg?: string;
|
|
2059
|
+
/**
|
|
2060
|
+
* Key ID
|
|
2061
|
+
*/
|
|
2062
|
+
kid?: string;
|
|
2063
|
+
};
|
|
2064
|
+
type ExportRotationPolicyDto = {
|
|
2065
|
+
/**
|
|
2066
|
+
* Whether rotation is enabled.
|
|
2067
|
+
*/
|
|
2068
|
+
enabled: boolean;
|
|
2069
|
+
/**
|
|
2070
|
+
* Rotation interval in days.
|
|
2071
|
+
*/
|
|
2072
|
+
intervalDays?: number;
|
|
2073
|
+
/**
|
|
2074
|
+
* Certificate validity in days.
|
|
2075
|
+
*/
|
|
2076
|
+
certValidityDays?: number;
|
|
2077
|
+
};
|
|
2078
|
+
type KeyChainExportDto = {
|
|
2079
|
+
/**
|
|
2080
|
+
* Key chain ID.
|
|
2081
|
+
*/
|
|
2082
|
+
id: string;
|
|
2083
|
+
/**
|
|
2084
|
+
* Human-readable description.
|
|
2085
|
+
*/
|
|
2086
|
+
description?: string;
|
|
2087
|
+
/**
|
|
2088
|
+
* Usage type for this key chain.
|
|
2089
|
+
*/
|
|
2090
|
+
usageType: "access" | "attestation" | "trustList" | "statusList" | "encrypt";
|
|
2091
|
+
/**
|
|
2092
|
+
* The private key in JWK format (EC).
|
|
2093
|
+
*/
|
|
2094
|
+
key: ExportEcJwk;
|
|
2095
|
+
/**
|
|
2096
|
+
* Certificate chain in PEM format (leaf first, then intermediates/CA).
|
|
2097
|
+
*/
|
|
2098
|
+
crt?: Array<string>;
|
|
2099
|
+
/**
|
|
2100
|
+
* KMS provider name.
|
|
2101
|
+
*/
|
|
2102
|
+
kmsProvider?: string;
|
|
2103
|
+
/**
|
|
2104
|
+
* Rotation policy.
|
|
2105
|
+
*/
|
|
2106
|
+
rotationPolicy?: ExportRotationPolicyDto;
|
|
2107
|
+
};
|
|
2108
|
+
type RotationPolicyCreateDto = {
|
|
2109
|
+
/**
|
|
2110
|
+
* Whether automatic key rotation is enabled.
|
|
2111
|
+
*/
|
|
2112
|
+
enabled: boolean;
|
|
2113
|
+
/**
|
|
2114
|
+
* Rotation interval in days. Required when enabled is true.
|
|
2115
|
+
*/
|
|
2116
|
+
intervalDays?: number;
|
|
2117
|
+
/**
|
|
2118
|
+
* Certificate validity in days. Defaults to rotation interval + 30 days grace period.
|
|
2119
|
+
*/
|
|
2120
|
+
certValidityDays?: number;
|
|
2121
|
+
};
|
|
2122
|
+
type KeyChainCreateDto = {
|
|
2123
|
+
/**
|
|
2124
|
+
* Usage type determines the purpose of this key chain (access, attestation, etc.).
|
|
2125
|
+
*/
|
|
2126
|
+
usageType: "access" | "attestation" | "trustList" | "statusList" | "encrypt";
|
|
2127
|
+
/**
|
|
2128
|
+
* Type of key chain to create.
|
|
2129
|
+
*/
|
|
2130
|
+
type: "standalone" | "internalChain";
|
|
2131
|
+
/**
|
|
2132
|
+
* Human-readable description for the key chain.
|
|
2133
|
+
*/
|
|
2134
|
+
description?: string;
|
|
2135
|
+
/**
|
|
2136
|
+
* KMS provider to use (defaults to the configured default provider).
|
|
2137
|
+
*/
|
|
2138
|
+
kmsProvider?: string;
|
|
2139
|
+
/**
|
|
2140
|
+
* Rotation policy configuration. Only applicable for the signing key (root CA never rotates).
|
|
2141
|
+
*/
|
|
2142
|
+
rotationPolicy?: RotationPolicyCreateDto;
|
|
2143
|
+
};
|
|
2144
|
+
type EcJwk = {
|
|
2145
|
+
kty: string;
|
|
2146
|
+
x: string;
|
|
2147
|
+
y: string;
|
|
2148
|
+
crv: string;
|
|
2149
|
+
d: string;
|
|
2150
|
+
alg?: string;
|
|
2151
|
+
kid?: string;
|
|
2152
|
+
};
|
|
2153
|
+
type RotationPolicyImportDto = {
|
|
2154
|
+
/**
|
|
2155
|
+
* Whether rotation is enabled. When true, the imported key becomes a root CA.
|
|
2156
|
+
*/
|
|
2157
|
+
enabled: boolean;
|
|
2158
|
+
/**
|
|
2159
|
+
* Rotation interval in days.
|
|
2160
|
+
*/
|
|
2161
|
+
intervalDays?: number;
|
|
2162
|
+
/**
|
|
2163
|
+
* Certificate validity in days.
|
|
2164
|
+
*/
|
|
2165
|
+
certValidityDays?: number;
|
|
2166
|
+
};
|
|
2167
|
+
type KeyChainImportDto = {
|
|
2168
|
+
/**
|
|
2169
|
+
* ID for the key chain. If not provided, a new UUID will be generated.
|
|
2170
|
+
*/
|
|
2171
|
+
id?: string;
|
|
2172
|
+
/**
|
|
2173
|
+
* The private key in JWK format.
|
|
2174
|
+
*/
|
|
2175
|
+
key: EcJwk;
|
|
2176
|
+
/**
|
|
2177
|
+
* Human-readable description.
|
|
2178
|
+
*/
|
|
2179
|
+
description?: string;
|
|
2180
|
+
/**
|
|
2181
|
+
* Usage type for this key chain.
|
|
2182
|
+
*/
|
|
2183
|
+
usageType: "access" | "attestation" | "trustList" | "statusList" | "encrypt";
|
|
2184
|
+
/**
|
|
2185
|
+
* Certificate chain in PEM format (leaf first, then intermediates/CA).
|
|
2186
|
+
*/
|
|
2187
|
+
crt?: Array<string>;
|
|
2188
|
+
/**
|
|
2189
|
+
* KMS provider to use. Defaults to 'db'.
|
|
2190
|
+
*/
|
|
2191
|
+
kmsProvider?: string;
|
|
2192
|
+
/**
|
|
2193
|
+
* Rotation policy. When enabled, the imported key becomes a root CA and a new leaf key is generated.
|
|
2194
|
+
*/
|
|
2195
|
+
rotationPolicy?: RotationPolicyImportDto;
|
|
2196
|
+
};
|
|
2197
|
+
type RotationPolicyUpdateDto = {
|
|
2198
|
+
/**
|
|
2199
|
+
* Whether automatic key rotation is enabled.
|
|
2200
|
+
*/
|
|
2201
|
+
enabled?: boolean;
|
|
2202
|
+
/**
|
|
2203
|
+
* Rotation interval in days.
|
|
2204
|
+
*/
|
|
2205
|
+
intervalDays?: number;
|
|
2206
|
+
/**
|
|
2207
|
+
* Certificate validity in days.
|
|
2208
|
+
*/
|
|
2209
|
+
certValidityDays?: number;
|
|
2210
|
+
};
|
|
2211
|
+
type KeyChainUpdateDto = {
|
|
2212
|
+
/**
|
|
2213
|
+
* Human-readable description for the key chain.
|
|
2214
|
+
*/
|
|
2215
|
+
description?: string;
|
|
2216
|
+
/**
|
|
2217
|
+
* Rotation policy configuration.
|
|
2218
|
+
*/
|
|
2219
|
+
rotationPolicy?: RotationPolicyUpdateDto;
|
|
2220
|
+
/**
|
|
2221
|
+
* Active certificate chain in PEM format. Used for external certificate updates.
|
|
2222
|
+
*/
|
|
2223
|
+
activeCertificate?: string;
|
|
2224
|
+
};
|
|
2225
|
+
type PresentationRequest = {
|
|
2226
|
+
/**
|
|
2227
|
+
* The type of response expected from the presentation request.
|
|
2228
|
+
*/
|
|
2229
|
+
response_type: "uri" | "dc-api";
|
|
2230
|
+
/**
|
|
2231
|
+
* Identifier of the presentation configuration
|
|
2232
|
+
*/
|
|
2233
|
+
requestId: string;
|
|
2234
|
+
/**
|
|
2235
|
+
* Webhook configuration to receive the response.
|
|
2236
|
+
* If not provided, the configured webhook from the configuration will be used.
|
|
2237
|
+
*/
|
|
2238
|
+
webhook?: WebhookConfig;
|
|
2239
|
+
/**
|
|
2240
|
+
* Optional redirect URI to which the user-agent should be redirected after the presentation is completed.
|
|
2241
|
+
* You can use the `{sessionId}` placeholder in the URI, which will be replaced with the actual session ID.
|
|
2242
|
+
*/
|
|
2243
|
+
redirectUri?: string;
|
|
2244
|
+
/**
|
|
2245
|
+
* Optional transaction data to include in the OID4VP request.
|
|
2246
|
+
* If provided, this will override the transaction_data from the presentation configuration.
|
|
2247
|
+
*/
|
|
2248
|
+
transaction_data?: Array<TransactionData>;
|
|
2249
|
+
};
|
|
2250
|
+
type FileUploadDto = {
|
|
2251
|
+
file: Blob | File;
|
|
2252
|
+
};
|
|
2253
|
+
type AppControllerGetVersionData = {
|
|
2254
|
+
body?: never;
|
|
2255
|
+
path?: never;
|
|
2256
|
+
query?: never;
|
|
2257
|
+
url: "/api/version";
|
|
2258
|
+
};
|
|
2259
|
+
type AppControllerGetVersionResponses = {
|
|
2260
|
+
/**
|
|
2261
|
+
* Service version info
|
|
2262
|
+
*/
|
|
2263
|
+
200: unknown;
|
|
2264
|
+
};
|
|
2265
|
+
type TenantControllerGetTenantsData = {
|
|
2266
|
+
body?: never;
|
|
2267
|
+
path?: never;
|
|
2268
|
+
query?: never;
|
|
2269
|
+
url: "/api/tenant";
|
|
2270
|
+
};
|
|
2271
|
+
type TenantControllerGetTenantsResponses = {
|
|
2272
|
+
200: Array<TenantEntity>;
|
|
2273
|
+
};
|
|
2274
|
+
type TenantControllerGetTenantsResponse = TenantControllerGetTenantsResponses[keyof TenantControllerGetTenantsResponses];
|
|
2275
|
+
type TenantControllerInitTenantData = {
|
|
2276
|
+
body: CreateTenantDto;
|
|
2277
|
+
path?: never;
|
|
2278
|
+
query?: never;
|
|
2279
|
+
url: "/api/tenant";
|
|
2280
|
+
};
|
|
2281
|
+
type TenantControllerInitTenantResponses = {
|
|
2282
|
+
201: {
|
|
2283
|
+
[key: string]: unknown;
|
|
2284
|
+
};
|
|
2285
|
+
};
|
|
2286
|
+
type TenantControllerInitTenantResponse = TenantControllerInitTenantResponses[keyof TenantControllerInitTenantResponses];
|
|
2287
|
+
type TenantControllerDeleteTenantData = {
|
|
2288
|
+
body?: never;
|
|
2289
|
+
path: {
|
|
2290
|
+
id: string;
|
|
2291
|
+
};
|
|
2292
|
+
query?: never;
|
|
2293
|
+
url: "/api/tenant/{id}";
|
|
2294
|
+
};
|
|
2295
|
+
type TenantControllerDeleteTenantResponses = {
|
|
2296
|
+
200: unknown;
|
|
2297
|
+
};
|
|
2298
|
+
type TenantControllerGetTenantData = {
|
|
2299
|
+
body?: never;
|
|
2300
|
+
path: {
|
|
2301
|
+
id: string;
|
|
2302
|
+
};
|
|
2303
|
+
query?: never;
|
|
2304
|
+
url: "/api/tenant/{id}";
|
|
2305
|
+
};
|
|
2306
|
+
type TenantControllerGetTenantResponses = {
|
|
2307
|
+
200: TenantEntity;
|
|
2308
|
+
};
|
|
2309
|
+
type TenantControllerGetTenantResponse = TenantControllerGetTenantResponses[keyof TenantControllerGetTenantResponses];
|
|
2310
|
+
type TenantControllerUpdateTenantData = {
|
|
2311
|
+
body: UpdateTenantDto;
|
|
2312
|
+
path: {
|
|
2313
|
+
id: string;
|
|
2314
|
+
};
|
|
2315
|
+
query?: never;
|
|
2316
|
+
url: "/api/tenant/{id}";
|
|
2317
|
+
};
|
|
2318
|
+
type TenantControllerUpdateTenantResponses = {
|
|
2319
|
+
200: TenantEntity;
|
|
2320
|
+
};
|
|
2321
|
+
type TenantControllerUpdateTenantResponse = TenantControllerUpdateTenantResponses[keyof TenantControllerUpdateTenantResponses];
|
|
2322
|
+
type ClientControllerGetClientsData = {
|
|
2323
|
+
body?: never;
|
|
2324
|
+
path?: never;
|
|
2325
|
+
query?: never;
|
|
2326
|
+
url: "/api/client";
|
|
2327
|
+
};
|
|
2328
|
+
type ClientControllerGetClientsResponses = {
|
|
2329
|
+
200: Array<ClientEntity>;
|
|
2330
|
+
};
|
|
2331
|
+
type ClientControllerGetClientsResponse = ClientControllerGetClientsResponses[keyof ClientControllerGetClientsResponses];
|
|
2332
|
+
type ClientControllerCreateClientData = {
|
|
2333
|
+
body: CreateClientDto;
|
|
2334
|
+
path?: never;
|
|
2335
|
+
query?: never;
|
|
2336
|
+
url: "/api/client";
|
|
2337
|
+
};
|
|
2338
|
+
type ClientControllerCreateClientResponses = {
|
|
2339
|
+
201: ClientEntity;
|
|
2340
|
+
};
|
|
2341
|
+
type ClientControllerCreateClientResponse = ClientControllerCreateClientResponses[keyof ClientControllerCreateClientResponses];
|
|
2342
|
+
type ClientControllerDeleteClientData = {
|
|
2343
|
+
body?: never;
|
|
2344
|
+
path: {
|
|
2345
|
+
id: string;
|
|
2346
|
+
};
|
|
2347
|
+
query?: never;
|
|
2348
|
+
url: "/api/client/{id}";
|
|
2349
|
+
};
|
|
2350
|
+
type ClientControllerDeleteClientResponses = {
|
|
2351
|
+
200: unknown;
|
|
2352
|
+
};
|
|
2353
|
+
type ClientControllerGetClientData = {
|
|
2354
|
+
body?: never;
|
|
2355
|
+
path: {
|
|
2356
|
+
id: string;
|
|
2357
|
+
};
|
|
2358
|
+
query?: never;
|
|
2359
|
+
url: "/api/client/{id}";
|
|
2360
|
+
};
|
|
2361
|
+
type ClientControllerGetClientResponses = {
|
|
2362
|
+
200: ClientEntity;
|
|
2363
|
+
};
|
|
2364
|
+
type ClientControllerGetClientResponse = ClientControllerGetClientResponses[keyof ClientControllerGetClientResponses];
|
|
2365
|
+
type ClientControllerUpdateClientData = {
|
|
2366
|
+
body: UpdateClientDto;
|
|
2367
|
+
path: {
|
|
2368
|
+
id: string;
|
|
2369
|
+
};
|
|
2370
|
+
query?: never;
|
|
2371
|
+
url: "/api/client/{id}";
|
|
2372
|
+
};
|
|
2373
|
+
type ClientControllerUpdateClientResponses = {
|
|
2374
|
+
200: {
|
|
2375
|
+
[key: string]: unknown;
|
|
2376
|
+
};
|
|
2377
|
+
};
|
|
2378
|
+
type ClientControllerUpdateClientResponse = ClientControllerUpdateClientResponses[keyof ClientControllerUpdateClientResponses];
|
|
2379
|
+
type ClientControllerGetClientSecretData = {
|
|
2380
|
+
body?: never;
|
|
2381
|
+
path: {
|
|
2382
|
+
id: string;
|
|
2383
|
+
};
|
|
2384
|
+
query?: never;
|
|
2385
|
+
url: "/api/client/{id}/secret";
|
|
2386
|
+
};
|
|
2387
|
+
type ClientControllerGetClientSecretResponses = {
|
|
2388
|
+
200: ClientSecretResponseDto;
|
|
2389
|
+
};
|
|
2390
|
+
type ClientControllerGetClientSecretResponse = ClientControllerGetClientSecretResponses[keyof ClientControllerGetClientSecretResponses];
|
|
2391
|
+
type ClientControllerRotateClientSecretData = {
|
|
2392
|
+
body?: never;
|
|
2393
|
+
path: {
|
|
2394
|
+
id: string;
|
|
2395
|
+
};
|
|
2396
|
+
query?: never;
|
|
2397
|
+
url: "/api/client/{id}/rotate-secret";
|
|
2398
|
+
};
|
|
2399
|
+
type ClientControllerRotateClientSecretResponses = {
|
|
2400
|
+
201: ClientSecretResponseDto;
|
|
2401
|
+
};
|
|
2402
|
+
type ClientControllerRotateClientSecretResponse = ClientControllerRotateClientSecretResponses[keyof ClientControllerRotateClientSecretResponses];
|
|
2403
|
+
type StatusListConfigControllerResetConfigData = {
|
|
2404
|
+
body?: never;
|
|
2405
|
+
path?: never;
|
|
2406
|
+
query?: never;
|
|
2407
|
+
url: "/api/status-list-config";
|
|
2408
|
+
};
|
|
2409
|
+
type StatusListConfigControllerResetConfigResponses = {
|
|
2410
|
+
/**
|
|
2411
|
+
* Configuration reset successfully
|
|
2412
|
+
*/
|
|
2413
|
+
204: void;
|
|
2414
|
+
};
|
|
2415
|
+
type StatusListConfigControllerResetConfigResponse = StatusListConfigControllerResetConfigResponses[keyof StatusListConfigControllerResetConfigResponses];
|
|
2416
|
+
type StatusListConfigControllerGetConfigData = {
|
|
2417
|
+
body?: never;
|
|
2418
|
+
path?: never;
|
|
2419
|
+
query?: never;
|
|
2420
|
+
url: "/api/status-list-config";
|
|
2421
|
+
};
|
|
2422
|
+
type StatusListConfigControllerGetConfigResponses = {
|
|
2423
|
+
/**
|
|
2424
|
+
* The status list configuration
|
|
2425
|
+
*/
|
|
2426
|
+
200: StatusListConfig;
|
|
2427
|
+
};
|
|
2428
|
+
type StatusListConfigControllerGetConfigResponse = StatusListConfigControllerGetConfigResponses[keyof StatusListConfigControllerGetConfigResponses];
|
|
2429
|
+
type StatusListConfigControllerUpdateConfigData = {
|
|
2430
|
+
body: UpdateStatusListConfigDto;
|
|
2431
|
+
path?: never;
|
|
2432
|
+
query?: never;
|
|
2433
|
+
url: "/api/status-list-config";
|
|
2434
|
+
};
|
|
2435
|
+
type StatusListConfigControllerUpdateConfigResponses = {
|
|
2436
|
+
/**
|
|
2437
|
+
* The updated status list configuration
|
|
2438
|
+
*/
|
|
2439
|
+
200: StatusListConfig;
|
|
2440
|
+
};
|
|
2441
|
+
type StatusListConfigControllerUpdateConfigResponse = StatusListConfigControllerUpdateConfigResponses[keyof StatusListConfigControllerUpdateConfigResponses];
|
|
2442
|
+
type StatusListManagementControllerGetListsData = {
|
|
2443
|
+
body?: never;
|
|
2444
|
+
path?: never;
|
|
2445
|
+
query?: never;
|
|
2446
|
+
url: "/api/status-lists";
|
|
2447
|
+
};
|
|
2448
|
+
type StatusListManagementControllerGetListsResponses = {
|
|
2449
|
+
/**
|
|
2450
|
+
* List of status lists
|
|
2451
|
+
*/
|
|
2452
|
+
200: Array<StatusListResponseDto>;
|
|
2453
|
+
};
|
|
2454
|
+
type StatusListManagementControllerGetListsResponse = StatusListManagementControllerGetListsResponses[keyof StatusListManagementControllerGetListsResponses];
|
|
2455
|
+
type StatusListManagementControllerCreateListData = {
|
|
2456
|
+
body: CreateStatusListDto;
|
|
2457
|
+
path?: never;
|
|
2458
|
+
query?: never;
|
|
2459
|
+
url: "/api/status-lists";
|
|
2460
|
+
};
|
|
2461
|
+
type StatusListManagementControllerCreateListResponses = {
|
|
2462
|
+
/**
|
|
2463
|
+
* The created status list
|
|
2464
|
+
*/
|
|
2465
|
+
201: StatusListResponseDto;
|
|
2466
|
+
};
|
|
2467
|
+
type StatusListManagementControllerCreateListResponse = StatusListManagementControllerCreateListResponses[keyof StatusListManagementControllerCreateListResponses];
|
|
2468
|
+
type StatusListManagementControllerDeleteListData = {
|
|
2469
|
+
body?: never;
|
|
2470
|
+
path: {
|
|
2471
|
+
/**
|
|
2472
|
+
* The status list ID
|
|
2473
|
+
*/
|
|
2474
|
+
listId: string;
|
|
2475
|
+
};
|
|
2476
|
+
query?: never;
|
|
2477
|
+
url: "/api/status-lists/{listId}";
|
|
2478
|
+
};
|
|
2479
|
+
type StatusListManagementControllerDeleteListResponses = {
|
|
2480
|
+
/**
|
|
2481
|
+
* Status list deleted successfully
|
|
2482
|
+
*/
|
|
2483
|
+
204: void;
|
|
2484
|
+
};
|
|
2485
|
+
type StatusListManagementControllerDeleteListResponse = StatusListManagementControllerDeleteListResponses[keyof StatusListManagementControllerDeleteListResponses];
|
|
2486
|
+
type StatusListManagementControllerGetListData = {
|
|
2487
|
+
body?: never;
|
|
2488
|
+
path: {
|
|
2489
|
+
/**
|
|
2490
|
+
* The status list ID
|
|
2491
|
+
*/
|
|
2492
|
+
listId: string;
|
|
2493
|
+
};
|
|
2494
|
+
query?: never;
|
|
2495
|
+
url: "/api/status-lists/{listId}";
|
|
2496
|
+
};
|
|
2497
|
+
type StatusListManagementControllerGetListResponses = {
|
|
2498
|
+
/**
|
|
2499
|
+
* The status list
|
|
2500
|
+
*/
|
|
2501
|
+
200: StatusListResponseDto;
|
|
2502
|
+
};
|
|
2503
|
+
type StatusListManagementControllerGetListResponse = StatusListManagementControllerGetListResponses[keyof StatusListManagementControllerGetListResponses];
|
|
2504
|
+
type StatusListManagementControllerUpdateListData = {
|
|
2505
|
+
body: UpdateStatusListDto;
|
|
2506
|
+
path: {
|
|
2507
|
+
/**
|
|
2508
|
+
* The status list ID
|
|
2509
|
+
*/
|
|
2510
|
+
listId: string;
|
|
2511
|
+
};
|
|
2512
|
+
query?: never;
|
|
2513
|
+
url: "/api/status-lists/{listId}";
|
|
2514
|
+
};
|
|
2515
|
+
type StatusListManagementControllerUpdateListResponses = {
|
|
2516
|
+
/**
|
|
2517
|
+
* The updated status list
|
|
2518
|
+
*/
|
|
2519
|
+
200: StatusListResponseDto;
|
|
2520
|
+
};
|
|
2521
|
+
type StatusListManagementControllerUpdateListResponse = StatusListManagementControllerUpdateListResponses[keyof StatusListManagementControllerUpdateListResponses];
|
|
2522
|
+
type SessionControllerGetAllSessionsData = {
|
|
2523
|
+
body?: never;
|
|
2524
|
+
path?: never;
|
|
2525
|
+
query?: never;
|
|
2526
|
+
url: "/api/session";
|
|
2527
|
+
};
|
|
2528
|
+
type SessionControllerGetAllSessionsResponses = {
|
|
2529
|
+
200: Array<Session>;
|
|
2530
|
+
};
|
|
2531
|
+
type SessionControllerGetAllSessionsResponse = SessionControllerGetAllSessionsResponses[keyof SessionControllerGetAllSessionsResponses];
|
|
2532
|
+
type SessionControllerDeleteSessionData = {
|
|
2533
|
+
body?: never;
|
|
2534
|
+
path: {
|
|
2535
|
+
id: string;
|
|
2536
|
+
};
|
|
2537
|
+
query?: never;
|
|
2538
|
+
url: "/api/session/{id}";
|
|
2539
|
+
};
|
|
2540
|
+
type SessionControllerDeleteSessionResponses = {
|
|
2541
|
+
200: unknown;
|
|
2542
|
+
};
|
|
2543
|
+
type SessionControllerGetSessionData = {
|
|
2544
|
+
body?: never;
|
|
2545
|
+
path: {
|
|
2546
|
+
/**
|
|
2547
|
+
* The session ID
|
|
2548
|
+
*/
|
|
2549
|
+
id: string;
|
|
2550
|
+
};
|
|
2551
|
+
query?: never;
|
|
2552
|
+
url: "/api/session/{id}";
|
|
2553
|
+
};
|
|
2554
|
+
type SessionControllerGetSessionResponses = {
|
|
2555
|
+
200: Session;
|
|
2556
|
+
};
|
|
2557
|
+
type SessionControllerGetSessionResponse = SessionControllerGetSessionResponses[keyof SessionControllerGetSessionResponses];
|
|
2558
|
+
type SessionControllerGetSessionLogsData = {
|
|
2559
|
+
body?: never;
|
|
2560
|
+
path: {
|
|
2561
|
+
/**
|
|
2562
|
+
* The session ID
|
|
2563
|
+
*/
|
|
2564
|
+
id: string;
|
|
2565
|
+
};
|
|
2566
|
+
query?: never;
|
|
2567
|
+
url: "/api/session/{id}/logs";
|
|
2568
|
+
};
|
|
2569
|
+
type SessionControllerGetSessionLogsResponses = {
|
|
2570
|
+
200: Array<SessionLogEntryResponseDto>;
|
|
2571
|
+
};
|
|
2572
|
+
type SessionControllerGetSessionLogsResponse = SessionControllerGetSessionLogsResponses[keyof SessionControllerGetSessionLogsResponses];
|
|
2573
|
+
type SessionControllerRevokeAllData = {
|
|
2574
|
+
body: StatusUpdateDto;
|
|
2575
|
+
path?: never;
|
|
2576
|
+
query?: never;
|
|
2577
|
+
url: "/api/session/revoke";
|
|
2578
|
+
};
|
|
2579
|
+
type SessionControllerRevokeAllResponses = {
|
|
2580
|
+
201: unknown;
|
|
2581
|
+
};
|
|
2582
|
+
type SessionConfigControllerResetConfigData = {
|
|
2583
|
+
body?: never;
|
|
2584
|
+
path?: never;
|
|
2585
|
+
query?: never;
|
|
2586
|
+
url: "/api/session-config";
|
|
2587
|
+
};
|
|
2588
|
+
type SessionConfigControllerResetConfigResponses = {
|
|
2589
|
+
/**
|
|
2590
|
+
* Configuration reset successfully
|
|
2591
|
+
*/
|
|
2592
|
+
200: unknown;
|
|
2593
|
+
};
|
|
2594
|
+
type SessionConfigControllerGetConfigData = {
|
|
2595
|
+
body?: never;
|
|
2596
|
+
path?: never;
|
|
2597
|
+
query?: never;
|
|
2598
|
+
url: "/api/session-config";
|
|
2599
|
+
};
|
|
2600
|
+
type SessionConfigControllerGetConfigResponses = {
|
|
2601
|
+
/**
|
|
2602
|
+
* The session storage configuration
|
|
2603
|
+
*/
|
|
2604
|
+
200: SessionStorageConfig;
|
|
2605
|
+
};
|
|
2606
|
+
type SessionConfigControllerGetConfigResponse = SessionConfigControllerGetConfigResponses[keyof SessionConfigControllerGetConfigResponses];
|
|
2607
|
+
type SessionConfigControllerUpdateConfigData = {
|
|
2608
|
+
body: UpdateSessionConfigDto;
|
|
2609
|
+
path?: never;
|
|
2610
|
+
query?: never;
|
|
2611
|
+
url: "/api/session-config";
|
|
2612
|
+
};
|
|
2613
|
+
type SessionConfigControllerUpdateConfigResponses = {
|
|
2614
|
+
/**
|
|
2615
|
+
* The updated session storage configuration
|
|
2616
|
+
*/
|
|
2617
|
+
200: SessionStorageConfig;
|
|
2618
|
+
};
|
|
2619
|
+
type SessionConfigControllerUpdateConfigResponse = SessionConfigControllerUpdateConfigResponses[keyof SessionConfigControllerUpdateConfigResponses];
|
|
2620
|
+
type SessionEventsControllerSubscribeToSessionEventsData = {
|
|
2621
|
+
body?: never;
|
|
2622
|
+
path: {
|
|
2623
|
+
/**
|
|
2624
|
+
* Session ID to subscribe to
|
|
2625
|
+
*/
|
|
2626
|
+
id: string;
|
|
2627
|
+
};
|
|
2628
|
+
query: {
|
|
2629
|
+
/**
|
|
2630
|
+
* JWT access token for authentication
|
|
2631
|
+
*/
|
|
2632
|
+
token: string;
|
|
2633
|
+
};
|
|
2634
|
+
url: "/api/session/{id}/events";
|
|
2635
|
+
};
|
|
2636
|
+
type SessionEventsControllerSubscribeToSessionEventsResponses = {
|
|
2637
|
+
200: unknown;
|
|
2638
|
+
};
|
|
2639
|
+
type IssuanceConfigControllerGetIssuanceConfigurationsData = {
|
|
2640
|
+
body?: never;
|
|
2641
|
+
path?: never;
|
|
2642
|
+
query?: never;
|
|
2643
|
+
url: "/api/issuer/config";
|
|
2644
|
+
};
|
|
2645
|
+
type IssuanceConfigControllerGetIssuanceConfigurationsResponses = {
|
|
2646
|
+
200: IssuanceConfig;
|
|
2647
|
+
};
|
|
2648
|
+
type IssuanceConfigControllerGetIssuanceConfigurationsResponse = IssuanceConfigControllerGetIssuanceConfigurationsResponses[keyof IssuanceConfigControllerGetIssuanceConfigurationsResponses];
|
|
2649
|
+
type IssuanceConfigControllerStoreIssuanceConfigurationData = {
|
|
2650
|
+
body: IssuanceDto;
|
|
2651
|
+
path?: never;
|
|
2652
|
+
query?: never;
|
|
2653
|
+
url: "/api/issuer/config";
|
|
2654
|
+
};
|
|
2655
|
+
type IssuanceConfigControllerStoreIssuanceConfigurationResponses = {
|
|
2656
|
+
201: {
|
|
2657
|
+
[key: string]: unknown;
|
|
2658
|
+
};
|
|
2659
|
+
};
|
|
2660
|
+
type IssuanceConfigControllerStoreIssuanceConfigurationResponse = IssuanceConfigControllerStoreIssuanceConfigurationResponses[keyof IssuanceConfigControllerStoreIssuanceConfigurationResponses];
|
|
2661
|
+
type CredentialConfigControllerGetConfigsData = {
|
|
2662
|
+
body?: never;
|
|
2663
|
+
path?: never;
|
|
2664
|
+
query?: never;
|
|
2665
|
+
url: "/api/issuer/credentials";
|
|
2666
|
+
};
|
|
2667
|
+
type CredentialConfigControllerGetConfigsResponses = {
|
|
2668
|
+
200: Array<CredentialConfig>;
|
|
2669
|
+
};
|
|
2670
|
+
type CredentialConfigControllerGetConfigsResponse = CredentialConfigControllerGetConfigsResponses[keyof CredentialConfigControllerGetConfigsResponses];
|
|
2671
|
+
type CredentialConfigControllerStoreCredentialConfigurationData = {
|
|
2672
|
+
body: CredentialConfigCreate;
|
|
2673
|
+
path?: never;
|
|
2674
|
+
query?: never;
|
|
2675
|
+
url: "/api/issuer/credentials";
|
|
2676
|
+
};
|
|
2677
|
+
type CredentialConfigControllerStoreCredentialConfigurationResponses = {
|
|
2678
|
+
201: {
|
|
2679
|
+
[key: string]: unknown;
|
|
2680
|
+
};
|
|
2681
|
+
};
|
|
2682
|
+
type CredentialConfigControllerStoreCredentialConfigurationResponse = CredentialConfigControllerStoreCredentialConfigurationResponses[keyof CredentialConfigControllerStoreCredentialConfigurationResponses];
|
|
2683
|
+
type CredentialConfigControllerDeleteIssuanceConfigurationData = {
|
|
2684
|
+
body?: never;
|
|
2685
|
+
path: {
|
|
2686
|
+
id: string;
|
|
2687
|
+
};
|
|
2688
|
+
query?: never;
|
|
2689
|
+
url: "/api/issuer/credentials/{id}";
|
|
2690
|
+
};
|
|
2691
|
+
type CredentialConfigControllerDeleteIssuanceConfigurationResponses = {
|
|
2692
|
+
200: unknown;
|
|
2693
|
+
};
|
|
2694
|
+
type CredentialConfigControllerGetConfigByIdData = {
|
|
2695
|
+
body?: never;
|
|
2696
|
+
path: {
|
|
2697
|
+
id: string;
|
|
2698
|
+
};
|
|
2699
|
+
query?: never;
|
|
2700
|
+
url: "/api/issuer/credentials/{id}";
|
|
2701
|
+
};
|
|
2702
|
+
type CredentialConfigControllerGetConfigByIdResponses = {
|
|
2703
|
+
200: CredentialConfig;
|
|
2704
|
+
};
|
|
2705
|
+
type CredentialConfigControllerGetConfigByIdResponse = CredentialConfigControllerGetConfigByIdResponses[keyof CredentialConfigControllerGetConfigByIdResponses];
|
|
2706
|
+
type CredentialConfigControllerUpdateCredentialConfigurationData = {
|
|
2707
|
+
body: CredentialConfigUpdate;
|
|
2708
|
+
path: {
|
|
2709
|
+
id: string;
|
|
2710
|
+
};
|
|
2711
|
+
query?: never;
|
|
2712
|
+
url: "/api/issuer/credentials/{id}";
|
|
2713
|
+
};
|
|
2714
|
+
type CredentialConfigControllerUpdateCredentialConfigurationResponses = {
|
|
2715
|
+
200: {
|
|
2716
|
+
[key: string]: unknown;
|
|
2717
|
+
};
|
|
2718
|
+
};
|
|
2719
|
+
type CredentialConfigControllerUpdateCredentialConfigurationResponse = CredentialConfigControllerUpdateCredentialConfigurationResponses[keyof CredentialConfigControllerUpdateCredentialConfigurationResponses];
|
|
2720
|
+
type AttributeProviderControllerGetAllData = {
|
|
2721
|
+
body?: never;
|
|
2722
|
+
path?: never;
|
|
2723
|
+
query?: never;
|
|
2724
|
+
url: "/api/issuer/attribute-providers";
|
|
2725
|
+
};
|
|
2726
|
+
type AttributeProviderControllerGetAllResponses = {
|
|
2727
|
+
/**
|
|
2728
|
+
* List of attribute providers
|
|
2729
|
+
*/
|
|
2730
|
+
200: unknown;
|
|
2731
|
+
};
|
|
2732
|
+
type AttributeProviderControllerCreateData = {
|
|
2733
|
+
body: CreateAttributeProviderDto;
|
|
2734
|
+
path?: never;
|
|
2735
|
+
query?: never;
|
|
2736
|
+
url: "/api/issuer/attribute-providers";
|
|
2737
|
+
};
|
|
2738
|
+
type AttributeProviderControllerCreateResponses = {
|
|
2739
|
+
/**
|
|
2740
|
+
* Attribute provider created
|
|
2741
|
+
*/
|
|
2742
|
+
201: unknown;
|
|
2743
|
+
};
|
|
2744
|
+
type AttributeProviderControllerDeleteData = {
|
|
2745
|
+
body?: never;
|
|
2746
|
+
path: {
|
|
2747
|
+
id: string;
|
|
2748
|
+
};
|
|
2749
|
+
query?: never;
|
|
2750
|
+
url: "/api/issuer/attribute-providers/{id}";
|
|
2751
|
+
};
|
|
2752
|
+
type AttributeProviderControllerDeleteErrors = {
|
|
2753
|
+
/**
|
|
2754
|
+
* Attribute provider not found
|
|
2755
|
+
*/
|
|
2756
|
+
404: unknown;
|
|
2757
|
+
};
|
|
2758
|
+
type AttributeProviderControllerDeleteResponses = {
|
|
2759
|
+
/**
|
|
2760
|
+
* Attribute provider deleted
|
|
2761
|
+
*/
|
|
2762
|
+
200: unknown;
|
|
2763
|
+
};
|
|
2764
|
+
type AttributeProviderControllerGetByIdData = {
|
|
2765
|
+
body?: never;
|
|
2766
|
+
path: {
|
|
2767
|
+
id: string;
|
|
2768
|
+
};
|
|
2769
|
+
query?: never;
|
|
2770
|
+
url: "/api/issuer/attribute-providers/{id}";
|
|
2771
|
+
};
|
|
2772
|
+
type AttributeProviderControllerGetByIdErrors = {
|
|
2773
|
+
/**
|
|
2774
|
+
* Attribute provider not found
|
|
2775
|
+
*/
|
|
2776
|
+
404: unknown;
|
|
2777
|
+
};
|
|
2778
|
+
type AttributeProviderControllerGetByIdResponses = {
|
|
2779
|
+
/**
|
|
2780
|
+
* The attribute provider
|
|
2781
|
+
*/
|
|
2782
|
+
200: unknown;
|
|
2783
|
+
};
|
|
2784
|
+
type AttributeProviderControllerUpdateData = {
|
|
2785
|
+
body: UpdateAttributeProviderDto;
|
|
2786
|
+
path: {
|
|
2787
|
+
id: string;
|
|
2788
|
+
};
|
|
2789
|
+
query?: never;
|
|
2790
|
+
url: "/api/issuer/attribute-providers/{id}";
|
|
2791
|
+
};
|
|
2792
|
+
type AttributeProviderControllerUpdateErrors = {
|
|
2793
|
+
/**
|
|
2794
|
+
* Attribute provider not found
|
|
2795
|
+
*/
|
|
2796
|
+
404: unknown;
|
|
2797
|
+
};
|
|
2798
|
+
type AttributeProviderControllerUpdateResponses = {
|
|
2799
|
+
/**
|
|
2800
|
+
* Attribute provider updated
|
|
2801
|
+
*/
|
|
2802
|
+
200: unknown;
|
|
2803
|
+
};
|
|
2804
|
+
type WebhookEndpointControllerGetAllData = {
|
|
2805
|
+
body?: never;
|
|
2806
|
+
path?: never;
|
|
2807
|
+
query?: never;
|
|
2808
|
+
url: "/api/issuer/webhook-endpoints";
|
|
2809
|
+
};
|
|
2810
|
+
type WebhookEndpointControllerGetAllResponses = {
|
|
2811
|
+
/**
|
|
2812
|
+
* List of webhook endpoints
|
|
2813
|
+
*/
|
|
2814
|
+
200: unknown;
|
|
2815
|
+
};
|
|
2816
|
+
type WebhookEndpointControllerCreateData = {
|
|
2817
|
+
body: CreateWebhookEndpointDto;
|
|
2818
|
+
path?: never;
|
|
2819
|
+
query?: never;
|
|
2820
|
+
url: "/api/issuer/webhook-endpoints";
|
|
2821
|
+
};
|
|
2822
|
+
type WebhookEndpointControllerCreateResponses = {
|
|
2823
|
+
/**
|
|
2824
|
+
* Webhook endpoint created
|
|
2825
|
+
*/
|
|
2826
|
+
201: unknown;
|
|
2827
|
+
};
|
|
2828
|
+
type WebhookEndpointControllerDeleteData = {
|
|
2829
|
+
body?: never;
|
|
2830
|
+
path: {
|
|
2831
|
+
id: string;
|
|
2832
|
+
};
|
|
2833
|
+
query?: never;
|
|
2834
|
+
url: "/api/issuer/webhook-endpoints/{id}";
|
|
2835
|
+
};
|
|
2836
|
+
type WebhookEndpointControllerDeleteErrors = {
|
|
2837
|
+
/**
|
|
2838
|
+
* Webhook endpoint not found
|
|
2839
|
+
*/
|
|
2840
|
+
404: unknown;
|
|
2841
|
+
};
|
|
2842
|
+
type WebhookEndpointControllerDeleteResponses = {
|
|
2843
|
+
/**
|
|
2844
|
+
* Webhook endpoint deleted
|
|
2845
|
+
*/
|
|
2846
|
+
200: unknown;
|
|
2847
|
+
};
|
|
2848
|
+
type WebhookEndpointControllerGetByIdData = {
|
|
2849
|
+
body?: never;
|
|
2850
|
+
path: {
|
|
2851
|
+
id: string;
|
|
2852
|
+
};
|
|
2853
|
+
query?: never;
|
|
2854
|
+
url: "/api/issuer/webhook-endpoints/{id}";
|
|
2855
|
+
};
|
|
2856
|
+
type WebhookEndpointControllerGetByIdErrors = {
|
|
2857
|
+
/**
|
|
2858
|
+
* Webhook endpoint not found
|
|
2859
|
+
*/
|
|
2860
|
+
404: unknown;
|
|
2861
|
+
};
|
|
2862
|
+
type WebhookEndpointControllerGetByIdResponses = {
|
|
2863
|
+
/**
|
|
2864
|
+
* The webhook endpoint
|
|
2865
|
+
*/
|
|
2866
|
+
200: unknown;
|
|
2867
|
+
};
|
|
2868
|
+
type WebhookEndpointControllerUpdateData = {
|
|
2869
|
+
body: UpdateWebhookEndpointDto;
|
|
2870
|
+
path: {
|
|
2871
|
+
id: string;
|
|
2872
|
+
};
|
|
2873
|
+
query?: never;
|
|
2874
|
+
url: "/api/issuer/webhook-endpoints/{id}";
|
|
2875
|
+
};
|
|
2876
|
+
type WebhookEndpointControllerUpdateErrors = {
|
|
2877
|
+
/**
|
|
2878
|
+
* Webhook endpoint not found
|
|
2879
|
+
*/
|
|
2880
|
+
404: unknown;
|
|
2881
|
+
};
|
|
2882
|
+
type WebhookEndpointControllerUpdateResponses = {
|
|
2883
|
+
/**
|
|
2884
|
+
* Webhook endpoint updated
|
|
2885
|
+
*/
|
|
2886
|
+
200: unknown;
|
|
2887
|
+
};
|
|
2888
|
+
type PresentationManagementControllerConfigurationData = {
|
|
2889
|
+
body?: never;
|
|
2890
|
+
path?: never;
|
|
2891
|
+
query?: never;
|
|
2892
|
+
url: "/api/verifier/config";
|
|
2893
|
+
};
|
|
2894
|
+
type PresentationManagementControllerConfigurationResponses = {
|
|
2895
|
+
200: Array<PresentationConfig>;
|
|
2896
|
+
};
|
|
2897
|
+
type PresentationManagementControllerConfigurationResponse = PresentationManagementControllerConfigurationResponses[keyof PresentationManagementControllerConfigurationResponses];
|
|
2898
|
+
type PresentationManagementControllerStorePresentationConfigData = {
|
|
2899
|
+
body: PresentationConfigCreateDto;
|
|
2900
|
+
path?: never;
|
|
2901
|
+
query?: never;
|
|
2902
|
+
url: "/api/verifier/config";
|
|
2903
|
+
};
|
|
2904
|
+
type PresentationManagementControllerStorePresentationConfigResponses = {
|
|
2905
|
+
201: {
|
|
2906
|
+
[key: string]: unknown;
|
|
2907
|
+
};
|
|
2908
|
+
};
|
|
2909
|
+
type PresentationManagementControllerStorePresentationConfigResponse = PresentationManagementControllerStorePresentationConfigResponses[keyof PresentationManagementControllerStorePresentationConfigResponses];
|
|
2910
|
+
type PresentationManagementControllerDeleteConfigurationData = {
|
|
2911
|
+
body?: never;
|
|
2912
|
+
path: {
|
|
2913
|
+
id: string;
|
|
2914
|
+
};
|
|
2915
|
+
query?: never;
|
|
2916
|
+
url: "/api/verifier/config/{id}";
|
|
2917
|
+
};
|
|
2918
|
+
type PresentationManagementControllerDeleteConfigurationResponses = {
|
|
2919
|
+
200: unknown;
|
|
2920
|
+
};
|
|
2921
|
+
type PresentationManagementControllerGetConfigurationData = {
|
|
2922
|
+
body?: never;
|
|
2923
|
+
path: {
|
|
2924
|
+
id: string;
|
|
2925
|
+
};
|
|
2926
|
+
query?: never;
|
|
2927
|
+
url: "/api/verifier/config/{id}";
|
|
2928
|
+
};
|
|
2929
|
+
type PresentationManagementControllerGetConfigurationResponses = {
|
|
2930
|
+
200: PresentationConfig;
|
|
2931
|
+
};
|
|
2932
|
+
type PresentationManagementControllerGetConfigurationResponse = PresentationManagementControllerGetConfigurationResponses[keyof PresentationManagementControllerGetConfigurationResponses];
|
|
2933
|
+
type PresentationManagementControllerUpdateConfigurationData = {
|
|
2934
|
+
body: PresentationConfigUpdateDto;
|
|
2935
|
+
path: {
|
|
2936
|
+
id: string;
|
|
2937
|
+
};
|
|
2938
|
+
query?: never;
|
|
2939
|
+
url: "/api/verifier/config/{id}";
|
|
2940
|
+
};
|
|
2941
|
+
type PresentationManagementControllerUpdateConfigurationResponses = {
|
|
2942
|
+
200: {
|
|
2943
|
+
[key: string]: unknown;
|
|
2944
|
+
};
|
|
2945
|
+
};
|
|
2946
|
+
type PresentationManagementControllerUpdateConfigurationResponse = PresentationManagementControllerUpdateConfigurationResponses[keyof PresentationManagementControllerUpdateConfigurationResponses];
|
|
2947
|
+
type CacheControllerGetStatsData = {
|
|
2948
|
+
body?: never;
|
|
2949
|
+
path?: never;
|
|
2950
|
+
query?: never;
|
|
2951
|
+
url: "/api/cache/stats";
|
|
2952
|
+
};
|
|
2953
|
+
type CacheControllerGetStatsResponses = {
|
|
2954
|
+
/**
|
|
2955
|
+
* Cache statistics
|
|
2956
|
+
*/
|
|
2957
|
+
200: unknown;
|
|
2958
|
+
};
|
|
2959
|
+
type CacheControllerClearAllCachesData = {
|
|
2960
|
+
body?: never;
|
|
2961
|
+
path?: never;
|
|
2962
|
+
query?: never;
|
|
2963
|
+
url: "/api/cache";
|
|
2964
|
+
};
|
|
2965
|
+
type CacheControllerClearAllCachesResponses = {
|
|
2966
|
+
/**
|
|
2967
|
+
* All caches cleared successfully
|
|
2968
|
+
*/
|
|
2969
|
+
204: void;
|
|
2970
|
+
};
|
|
2971
|
+
type CacheControllerClearAllCachesResponse = CacheControllerClearAllCachesResponses[keyof CacheControllerClearAllCachesResponses];
|
|
2972
|
+
type CacheControllerClearTrustListCacheData = {
|
|
2973
|
+
body?: never;
|
|
2974
|
+
path?: never;
|
|
2975
|
+
query?: never;
|
|
2976
|
+
url: "/api/cache/trust-list";
|
|
2977
|
+
};
|
|
2978
|
+
type CacheControllerClearTrustListCacheResponses = {
|
|
2979
|
+
/**
|
|
2980
|
+
* Trust list cache cleared successfully
|
|
2981
|
+
*/
|
|
2982
|
+
204: void;
|
|
2983
|
+
};
|
|
2984
|
+
type CacheControllerClearTrustListCacheResponse = CacheControllerClearTrustListCacheResponses[keyof CacheControllerClearTrustListCacheResponses];
|
|
2985
|
+
type CacheControllerClearStatusListCacheData = {
|
|
2986
|
+
body?: never;
|
|
2987
|
+
path?: never;
|
|
2988
|
+
query?: never;
|
|
2989
|
+
url: "/api/cache/status-list";
|
|
2990
|
+
};
|
|
2991
|
+
type CacheControllerClearStatusListCacheResponses = {
|
|
2992
|
+
/**
|
|
2993
|
+
* Status list cache cleared successfully
|
|
2994
|
+
*/
|
|
2995
|
+
204: void;
|
|
2996
|
+
};
|
|
2997
|
+
type CacheControllerClearStatusListCacheResponse = CacheControllerClearStatusListCacheResponses[keyof CacheControllerClearStatusListCacheResponses];
|
|
2998
|
+
type CredentialOfferControllerGetOfferData = {
|
|
2999
|
+
body: OfferRequestDto;
|
|
3000
|
+
path?: never;
|
|
3001
|
+
query?: never;
|
|
3002
|
+
url: "/api/issuer/offer";
|
|
3003
|
+
};
|
|
3004
|
+
type CredentialOfferControllerGetOfferResponses = {
|
|
3005
|
+
/**
|
|
3006
|
+
* JSON response
|
|
3007
|
+
*/
|
|
3008
|
+
201: OfferResponse;
|
|
3009
|
+
};
|
|
3010
|
+
type CredentialOfferControllerGetOfferResponse = CredentialOfferControllerGetOfferResponses[keyof CredentialOfferControllerGetOfferResponses];
|
|
3011
|
+
type DeferredControllerCompleteDeferredData = {
|
|
3012
|
+
body: CompleteDeferredDto;
|
|
3013
|
+
path: {
|
|
3014
|
+
transactionId: string;
|
|
3015
|
+
};
|
|
3016
|
+
query?: never;
|
|
3017
|
+
url: "/api/issuer/deferred/{transactionId}/complete";
|
|
3018
|
+
};
|
|
3019
|
+
type DeferredControllerCompleteDeferredErrors = {
|
|
3020
|
+
/**
|
|
3021
|
+
* Transaction not found
|
|
3022
|
+
*/
|
|
3023
|
+
404: unknown;
|
|
3024
|
+
};
|
|
3025
|
+
type DeferredControllerCompleteDeferredResponses = {
|
|
3026
|
+
/**
|
|
3027
|
+
* Transaction completed successfully
|
|
3028
|
+
*/
|
|
3029
|
+
200: DeferredOperationResponse;
|
|
3030
|
+
};
|
|
3031
|
+
type DeferredControllerCompleteDeferredResponse = DeferredControllerCompleteDeferredResponses[keyof DeferredControllerCompleteDeferredResponses];
|
|
3032
|
+
type DeferredControllerFailDeferredData = {
|
|
3033
|
+
body?: FailDeferredDto;
|
|
3034
|
+
path: {
|
|
3035
|
+
transactionId: string;
|
|
3036
|
+
};
|
|
3037
|
+
query?: never;
|
|
3038
|
+
url: "/api/issuer/deferred/{transactionId}/fail";
|
|
3039
|
+
};
|
|
3040
|
+
type DeferredControllerFailDeferredErrors = {
|
|
3041
|
+
/**
|
|
3042
|
+
* Transaction not found
|
|
3043
|
+
*/
|
|
3044
|
+
404: unknown;
|
|
3045
|
+
};
|
|
3046
|
+
type DeferredControllerFailDeferredResponses = {
|
|
3047
|
+
/**
|
|
3048
|
+
* Transaction marked as failed
|
|
3049
|
+
*/
|
|
3050
|
+
200: DeferredOperationResponse;
|
|
3051
|
+
};
|
|
3052
|
+
type DeferredControllerFailDeferredResponse = DeferredControllerFailDeferredResponses[keyof DeferredControllerFailDeferredResponses];
|
|
3053
|
+
type RegistrarControllerDeleteConfigData = {
|
|
3054
|
+
body?: never;
|
|
3055
|
+
path?: never;
|
|
3056
|
+
query?: never;
|
|
3057
|
+
url: "/api/registrar/config";
|
|
3058
|
+
};
|
|
3059
|
+
type RegistrarControllerDeleteConfigResponses = {
|
|
3060
|
+
/**
|
|
3061
|
+
* Configuration deleted successfully
|
|
3062
|
+
*/
|
|
3063
|
+
204: void;
|
|
3064
|
+
};
|
|
3065
|
+
type RegistrarControllerDeleteConfigResponse = RegistrarControllerDeleteConfigResponses[keyof RegistrarControllerDeleteConfigResponses];
|
|
3066
|
+
type RegistrarControllerGetConfigData = {
|
|
3067
|
+
body?: never;
|
|
3068
|
+
path?: never;
|
|
3069
|
+
query?: never;
|
|
3070
|
+
url: "/api/registrar/config";
|
|
3071
|
+
};
|
|
3072
|
+
type RegistrarControllerGetConfigErrors = {
|
|
3073
|
+
/**
|
|
3074
|
+
* No registrar configuration found
|
|
3075
|
+
*/
|
|
3076
|
+
404: unknown;
|
|
3077
|
+
};
|
|
3078
|
+
type RegistrarControllerGetConfigResponses = {
|
|
3079
|
+
/**
|
|
3080
|
+
* The registrar configuration
|
|
3081
|
+
*/
|
|
3082
|
+
200: RegistrarConfigEntity;
|
|
3083
|
+
};
|
|
3084
|
+
type RegistrarControllerGetConfigResponse = RegistrarControllerGetConfigResponses[keyof RegistrarControllerGetConfigResponses];
|
|
3085
|
+
type RegistrarControllerUpdateConfigData = {
|
|
3086
|
+
body: UpdateRegistrarConfigDto;
|
|
3087
|
+
path?: never;
|
|
3088
|
+
query?: never;
|
|
3089
|
+
url: "/api/registrar/config";
|
|
3090
|
+
};
|
|
3091
|
+
type RegistrarControllerUpdateConfigErrors = {
|
|
3092
|
+
/**
|
|
3093
|
+
* Invalid credentials
|
|
3094
|
+
*/
|
|
3095
|
+
400: unknown;
|
|
3096
|
+
/**
|
|
3097
|
+
* No registrar configuration found
|
|
3098
|
+
*/
|
|
3099
|
+
404: unknown;
|
|
3100
|
+
};
|
|
3101
|
+
type RegistrarControllerUpdateConfigResponses = {
|
|
3102
|
+
/**
|
|
3103
|
+
* Configuration updated successfully
|
|
3104
|
+
*/
|
|
3105
|
+
200: RegistrarConfigEntity;
|
|
3106
|
+
};
|
|
3107
|
+
type RegistrarControllerUpdateConfigResponse = RegistrarControllerUpdateConfigResponses[keyof RegistrarControllerUpdateConfigResponses];
|
|
3108
|
+
type RegistrarControllerCreateConfigData = {
|
|
3109
|
+
body: CreateRegistrarConfigDto;
|
|
3110
|
+
path?: never;
|
|
3111
|
+
query?: never;
|
|
3112
|
+
url: "/api/registrar/config";
|
|
3113
|
+
};
|
|
3114
|
+
type RegistrarControllerCreateConfigErrors = {
|
|
3115
|
+
/**
|
|
3116
|
+
* Invalid credentials
|
|
3117
|
+
*/
|
|
3118
|
+
400: unknown;
|
|
3119
|
+
};
|
|
3120
|
+
type RegistrarControllerCreateConfigResponses = {
|
|
3121
|
+
/**
|
|
3122
|
+
* Configuration created successfully
|
|
3123
|
+
*/
|
|
3124
|
+
201: RegistrarConfigEntity;
|
|
3125
|
+
};
|
|
3126
|
+
type RegistrarControllerCreateConfigResponse = RegistrarControllerCreateConfigResponses[keyof RegistrarControllerCreateConfigResponses];
|
|
3127
|
+
type RegistrarControllerCreateAccessCertificateData = {
|
|
3128
|
+
body: CreateAccessCertificateDto;
|
|
3129
|
+
path?: never;
|
|
3130
|
+
query?: never;
|
|
3131
|
+
url: "/api/registrar/access-certificate";
|
|
3132
|
+
};
|
|
3133
|
+
type RegistrarControllerCreateAccessCertificateErrors = {
|
|
3134
|
+
/**
|
|
3135
|
+
* No relying party found at registrar or failed to create certificate
|
|
3136
|
+
*/
|
|
3137
|
+
400: unknown;
|
|
3138
|
+
/**
|
|
3139
|
+
* No registrar configuration found or key not found
|
|
3140
|
+
*/
|
|
3141
|
+
404: unknown;
|
|
3142
|
+
};
|
|
3143
|
+
type RegistrarControllerCreateAccessCertificateResponses = {
|
|
3144
|
+
/**
|
|
3145
|
+
* Access certificate created successfully
|
|
3146
|
+
*/
|
|
3147
|
+
201: {
|
|
3148
|
+
/**
|
|
3149
|
+
* The certificate ID at the registrar
|
|
3150
|
+
*/
|
|
3151
|
+
id?: string;
|
|
3152
|
+
/**
|
|
3153
|
+
* The certificate in PEM format
|
|
3154
|
+
*/
|
|
3155
|
+
crt?: string;
|
|
3156
|
+
};
|
|
3157
|
+
};
|
|
3158
|
+
type RegistrarControllerCreateAccessCertificateResponse = RegistrarControllerCreateAccessCertificateResponses[keyof RegistrarControllerCreateAccessCertificateResponses];
|
|
3159
|
+
type TrustListControllerGetAllTrustListsData = {
|
|
3160
|
+
body?: never;
|
|
3161
|
+
path?: never;
|
|
3162
|
+
query?: never;
|
|
3163
|
+
url: "/api/trust-list";
|
|
3164
|
+
};
|
|
3165
|
+
type TrustListControllerGetAllTrustListsResponses = {
|
|
3166
|
+
200: Array<TrustList>;
|
|
3167
|
+
};
|
|
3168
|
+
type TrustListControllerGetAllTrustListsResponse = TrustListControllerGetAllTrustListsResponses[keyof TrustListControllerGetAllTrustListsResponses];
|
|
3169
|
+
type TrustListControllerCreateTrustListData = {
|
|
3170
|
+
body: TrustListCreateDto;
|
|
3171
|
+
path?: never;
|
|
3172
|
+
query?: never;
|
|
3173
|
+
url: "/api/trust-list";
|
|
3174
|
+
};
|
|
3175
|
+
type TrustListControllerCreateTrustListResponses = {
|
|
3176
|
+
201: TrustList;
|
|
3177
|
+
};
|
|
3178
|
+
type TrustListControllerCreateTrustListResponse = TrustListControllerCreateTrustListResponses[keyof TrustListControllerCreateTrustListResponses];
|
|
3179
|
+
type TrustListControllerDeleteTrustListData = {
|
|
3180
|
+
body?: never;
|
|
3181
|
+
path: {
|
|
3182
|
+
id: string;
|
|
3183
|
+
};
|
|
3184
|
+
query?: never;
|
|
3185
|
+
url: "/api/trust-list/{id}";
|
|
3186
|
+
};
|
|
3187
|
+
type TrustListControllerDeleteTrustListResponses = {
|
|
3188
|
+
200: unknown;
|
|
3189
|
+
};
|
|
3190
|
+
type TrustListControllerGetTrustListData = {
|
|
3191
|
+
body?: never;
|
|
3192
|
+
path: {
|
|
3193
|
+
id: string;
|
|
3194
|
+
};
|
|
3195
|
+
query?: never;
|
|
3196
|
+
url: "/api/trust-list/{id}";
|
|
3197
|
+
};
|
|
3198
|
+
type TrustListControllerGetTrustListResponses = {
|
|
3199
|
+
200: TrustList;
|
|
3200
|
+
};
|
|
3201
|
+
type TrustListControllerGetTrustListResponse = TrustListControllerGetTrustListResponses[keyof TrustListControllerGetTrustListResponses];
|
|
3202
|
+
type TrustListControllerUpdateTrustListData = {
|
|
3203
|
+
body: TrustListCreateDto;
|
|
3204
|
+
path: {
|
|
3205
|
+
id: string;
|
|
3206
|
+
};
|
|
3207
|
+
query?: never;
|
|
3208
|
+
url: "/api/trust-list/{id}";
|
|
3209
|
+
};
|
|
3210
|
+
type TrustListControllerUpdateTrustListResponses = {
|
|
3211
|
+
200: TrustList;
|
|
3212
|
+
};
|
|
3213
|
+
type TrustListControllerUpdateTrustListResponse = TrustListControllerUpdateTrustListResponses[keyof TrustListControllerUpdateTrustListResponses];
|
|
3214
|
+
type TrustListControllerExportTrustListData = {
|
|
3215
|
+
body?: never;
|
|
3216
|
+
path: {
|
|
3217
|
+
id: string;
|
|
3218
|
+
};
|
|
3219
|
+
query?: never;
|
|
3220
|
+
url: "/api/trust-list/{id}/export";
|
|
3221
|
+
};
|
|
3222
|
+
type TrustListControllerExportTrustListResponses = {
|
|
3223
|
+
200: TrustListCreateDto;
|
|
3224
|
+
};
|
|
3225
|
+
type TrustListControllerExportTrustListResponse = TrustListControllerExportTrustListResponses[keyof TrustListControllerExportTrustListResponses];
|
|
3226
|
+
type TrustListControllerGetTrustListVersionsData = {
|
|
3227
|
+
body?: never;
|
|
3228
|
+
path: {
|
|
3229
|
+
id: string;
|
|
3230
|
+
};
|
|
3231
|
+
query?: never;
|
|
3232
|
+
url: "/api/trust-list/{id}/versions";
|
|
3233
|
+
};
|
|
3234
|
+
type TrustListControllerGetTrustListVersionsResponses = {
|
|
3235
|
+
200: Array<TrustListVersion>;
|
|
3236
|
+
};
|
|
3237
|
+
type TrustListControllerGetTrustListVersionsResponse = TrustListControllerGetTrustListVersionsResponses[keyof TrustListControllerGetTrustListVersionsResponses];
|
|
3238
|
+
type TrustListControllerGetTrustListVersionData = {
|
|
3239
|
+
body?: never;
|
|
3240
|
+
path: {
|
|
3241
|
+
id: string;
|
|
3242
|
+
versionId: string;
|
|
3243
|
+
};
|
|
3244
|
+
query?: never;
|
|
3245
|
+
url: "/api/trust-list/{id}/versions/{versionId}";
|
|
3246
|
+
};
|
|
3247
|
+
type TrustListControllerGetTrustListVersionResponses = {
|
|
3248
|
+
200: TrustListVersion;
|
|
3249
|
+
};
|
|
3250
|
+
type TrustListControllerGetTrustListVersionResponse = TrustListControllerGetTrustListVersionResponses[keyof TrustListControllerGetTrustListVersionResponses];
|
|
3251
|
+
type KeyChainControllerGetProvidersData = {
|
|
3252
|
+
body?: never;
|
|
3253
|
+
path?: never;
|
|
3254
|
+
query?: never;
|
|
3255
|
+
url: "/api/key-chain/providers";
|
|
3256
|
+
};
|
|
3257
|
+
type KeyChainControllerGetProvidersResponses = {
|
|
3258
|
+
/**
|
|
3259
|
+
* List of available KMS providers with capabilities
|
|
3260
|
+
*/
|
|
3261
|
+
200: KmsProvidersResponseDto;
|
|
3262
|
+
};
|
|
3263
|
+
type KeyChainControllerGetProvidersResponse = KeyChainControllerGetProvidersResponses[keyof KeyChainControllerGetProvidersResponses];
|
|
3264
|
+
type KeyChainControllerGetAllData = {
|
|
3265
|
+
body?: never;
|
|
3266
|
+
path?: never;
|
|
3267
|
+
query?: never;
|
|
3268
|
+
url: "/api/key-chain";
|
|
3269
|
+
};
|
|
3270
|
+
type KeyChainControllerGetAllResponses = {
|
|
3271
|
+
/**
|
|
3272
|
+
* List of key chains
|
|
3273
|
+
*/
|
|
3274
|
+
200: Array<KeyChainResponseDto>;
|
|
3275
|
+
};
|
|
3276
|
+
type KeyChainControllerGetAllResponse = KeyChainControllerGetAllResponses[keyof KeyChainControllerGetAllResponses];
|
|
3277
|
+
type KeyChainControllerCreateData = {
|
|
3278
|
+
body: KeyChainCreateDto;
|
|
3279
|
+
path?: never;
|
|
3280
|
+
query?: never;
|
|
3281
|
+
url: "/api/key-chain";
|
|
3282
|
+
};
|
|
3283
|
+
type KeyChainControllerCreateResponses = {
|
|
3284
|
+
/**
|
|
3285
|
+
* Key chain created successfully
|
|
3286
|
+
*/
|
|
3287
|
+
201: unknown;
|
|
3288
|
+
};
|
|
3289
|
+
type KeyChainControllerDeleteData = {
|
|
3290
|
+
body?: never;
|
|
3291
|
+
path: {
|
|
3292
|
+
id: string;
|
|
3293
|
+
};
|
|
3294
|
+
query?: never;
|
|
3295
|
+
url: "/api/key-chain/{id}";
|
|
3296
|
+
};
|
|
3297
|
+
type KeyChainControllerDeleteErrors = {
|
|
3298
|
+
/**
|
|
3299
|
+
* Key chain not found
|
|
3300
|
+
*/
|
|
3301
|
+
404: unknown;
|
|
3302
|
+
};
|
|
3303
|
+
type KeyChainControllerDeleteResponses = {
|
|
3304
|
+
/**
|
|
3305
|
+
* Key chain deleted successfully
|
|
3306
|
+
*/
|
|
3307
|
+
200: unknown;
|
|
3308
|
+
};
|
|
3309
|
+
type KeyChainControllerGetByIdData = {
|
|
3310
|
+
body?: never;
|
|
3311
|
+
path: {
|
|
3312
|
+
id: string;
|
|
3313
|
+
};
|
|
3314
|
+
query?: never;
|
|
3315
|
+
url: "/api/key-chain/{id}";
|
|
3316
|
+
};
|
|
3317
|
+
type KeyChainControllerGetByIdErrors = {
|
|
3318
|
+
/**
|
|
3319
|
+
* Key chain not found
|
|
3320
|
+
*/
|
|
3321
|
+
404: unknown;
|
|
3322
|
+
};
|
|
3323
|
+
type KeyChainControllerGetByIdResponses = {
|
|
3324
|
+
/**
|
|
3325
|
+
* The key chain
|
|
3326
|
+
*/
|
|
3327
|
+
200: KeyChainResponseDto;
|
|
3328
|
+
};
|
|
3329
|
+
type KeyChainControllerGetByIdResponse = KeyChainControllerGetByIdResponses[keyof KeyChainControllerGetByIdResponses];
|
|
3330
|
+
type KeyChainControllerUpdateData = {
|
|
3331
|
+
body: KeyChainUpdateDto;
|
|
3332
|
+
path: {
|
|
3333
|
+
id: string;
|
|
3334
|
+
};
|
|
3335
|
+
query?: never;
|
|
3336
|
+
url: "/api/key-chain/{id}";
|
|
3337
|
+
};
|
|
3338
|
+
type KeyChainControllerUpdateErrors = {
|
|
3339
|
+
/**
|
|
3340
|
+
* Key chain not found
|
|
3341
|
+
*/
|
|
3342
|
+
404: unknown;
|
|
3343
|
+
};
|
|
3344
|
+
type KeyChainControllerUpdateResponses = {
|
|
3345
|
+
/**
|
|
3346
|
+
* Key chain updated successfully
|
|
3347
|
+
*/
|
|
3348
|
+
200: unknown;
|
|
3349
|
+
};
|
|
3350
|
+
type KeyChainControllerExportData = {
|
|
3351
|
+
body?: never;
|
|
3352
|
+
path: {
|
|
3353
|
+
id: string;
|
|
3354
|
+
};
|
|
3355
|
+
query?: never;
|
|
3356
|
+
url: "/api/key-chain/{id}/export";
|
|
3357
|
+
};
|
|
3358
|
+
type KeyChainControllerExportErrors = {
|
|
3359
|
+
/**
|
|
3360
|
+
* Key chain not found
|
|
3361
|
+
*/
|
|
3362
|
+
404: unknown;
|
|
3363
|
+
};
|
|
3364
|
+
type KeyChainControllerExportResponses = {
|
|
3365
|
+
/**
|
|
3366
|
+
* Key chain export data
|
|
3367
|
+
*/
|
|
3368
|
+
200: KeyChainExportDto;
|
|
3369
|
+
};
|
|
3370
|
+
type KeyChainControllerExportResponse = KeyChainControllerExportResponses[keyof KeyChainControllerExportResponses];
|
|
3371
|
+
type KeyChainControllerImportData = {
|
|
3372
|
+
body: KeyChainImportDto;
|
|
3373
|
+
path?: never;
|
|
3374
|
+
query?: never;
|
|
3375
|
+
url: "/api/key-chain/import";
|
|
3376
|
+
};
|
|
3377
|
+
type KeyChainControllerImportResponses = {
|
|
3378
|
+
/**
|
|
3379
|
+
* Key chain imported successfully
|
|
3380
|
+
*/
|
|
3381
|
+
201: unknown;
|
|
3382
|
+
};
|
|
3383
|
+
type KeyChainControllerRotateData = {
|
|
3384
|
+
body?: never;
|
|
3385
|
+
path: {
|
|
3386
|
+
id: string;
|
|
3387
|
+
};
|
|
3388
|
+
query?: never;
|
|
3389
|
+
url: "/api/key-chain/{id}/rotate";
|
|
3390
|
+
};
|
|
3391
|
+
type KeyChainControllerRotateErrors = {
|
|
3392
|
+
/**
|
|
3393
|
+
* Key chain not found
|
|
3394
|
+
*/
|
|
3395
|
+
404: unknown;
|
|
3396
|
+
};
|
|
3397
|
+
type KeyChainControllerRotateResponses = {
|
|
3398
|
+
/**
|
|
3399
|
+
* Key chain rotated successfully
|
|
3400
|
+
*/
|
|
3401
|
+
200: unknown;
|
|
3402
|
+
201: unknown;
|
|
3403
|
+
};
|
|
3404
|
+
type VerifierOfferControllerGetOfferData = {
|
|
3405
|
+
body: PresentationRequest;
|
|
3406
|
+
path?: never;
|
|
3407
|
+
query?: never;
|
|
3408
|
+
url: "/api/verifier/offer";
|
|
3409
|
+
};
|
|
3410
|
+
type VerifierOfferControllerGetOfferResponses = {
|
|
3411
|
+
/**
|
|
3412
|
+
* JSON response
|
|
3413
|
+
*/
|
|
3414
|
+
201: OfferResponse;
|
|
3415
|
+
};
|
|
3416
|
+
type VerifierOfferControllerGetOfferResponse = VerifierOfferControllerGetOfferResponses[keyof VerifierOfferControllerGetOfferResponses];
|
|
3417
|
+
type StorageControllerUploadData = {
|
|
3418
|
+
/**
|
|
3419
|
+
* List of cats
|
|
3420
|
+
*/
|
|
3421
|
+
body: FileUploadDto;
|
|
3422
|
+
path?: never;
|
|
3423
|
+
query?: never;
|
|
3424
|
+
url: "/api/storage";
|
|
3425
|
+
};
|
|
3426
|
+
type StorageControllerUploadResponses = {
|
|
3427
|
+
201: {
|
|
3428
|
+
[key: string]: unknown;
|
|
3429
|
+
};
|
|
3430
|
+
};
|
|
3431
|
+
type StorageControllerUploadResponse = StorageControllerUploadResponses[keyof StorageControllerUploadResponses];
|
|
3432
|
+
|
|
3433
|
+
export type { ClientControllerGetClientResponses as $, AllowListPolicy as A, CacheControllerClearStatusListCacheData as B, CacheControllerClearAllCachesData as C, CacheControllerClearStatusListCacheResponse as D, CacheControllerClearStatusListCacheResponses as E, CacheControllerClearTrustListCacheData as F, CacheControllerClearTrustListCacheResponse as G, CacheControllerClearTrustListCacheResponses as H, CacheControllerGetStatsData as I, CacheControllerGetStatsResponses as J, CertificateInfoDto as K, ChainedAsConfig as L, ChainedAsErrorResponseDto as M, ChainedAsParRequestDto as N, ChainedAsParResponseDto as O, ChainedAsTokenConfig as P, ChainedAsTokenRequestDto as Q, ChainedAsTokenResponseDto as R, Session as S, ClaimsQuery as T, ClientControllerCreateClientData as U, ClientControllerCreateClientResponse as V, ClientControllerCreateClientResponses as W, ClientControllerDeleteClientData as X, ClientControllerDeleteClientResponses as Y, ClientControllerGetClientData as Z, ClientControllerGetClientResponse as _, ApiKeyConfig as a, EmbeddedDisclosurePolicy as a$, ClientControllerGetClientSecretData as a0, ClientControllerGetClientSecretResponse as a1, ClientControllerGetClientSecretResponses as a2, ClientControllerGetClientsData as a3, ClientControllerGetClientsResponse as a4, ClientControllerGetClientsResponses as a5, ClientControllerRotateClientSecretData as a6, ClientControllerRotateClientSecretResponse as a7, ClientControllerRotateClientSecretResponses as a8, ClientControllerUpdateClientData as a9, CredentialConfigControllerUpdateCredentialConfigurationData as aA, CredentialConfigControllerUpdateCredentialConfigurationResponse as aB, CredentialConfigControllerUpdateCredentialConfigurationResponses as aC, CredentialConfigCreate as aD, CredentialConfigUpdate as aE, CredentialOfferControllerGetOfferData as aF, CredentialOfferControllerGetOfferResponse as aG, CredentialOfferControllerGetOfferResponses as aH, CredentialQuery as aI, CredentialSetQuery as aJ, Dcql as aK, DeferredControllerCompleteDeferredData as aL, DeferredControllerCompleteDeferredErrors as aM, DeferredControllerCompleteDeferredResponse as aN, DeferredControllerCompleteDeferredResponses as aO, DeferredControllerFailDeferredData as aP, DeferredControllerFailDeferredErrors as aQ, DeferredControllerFailDeferredResponse as aR, DeferredControllerFailDeferredResponses as aS, DeferredCredentialRequestDto as aT, DeferredOperationResponse as aU, Display as aV, DisplayImage as aW, DisplayInfo as aX, DisplayLogo as aY, EcJwk as aZ, EcPublic as a_, ClientControllerUpdateClientResponse as aa, ClientControllerUpdateClientResponses as ab, ClientCredentialsDto as ac, ClientEntity as ad, ClientOptions as ae, ClientSecretResponseDto as af, CompleteDeferredDto as ag, CreateAccessCertificateDto as ah, CreateAttributeProviderDto as ai, CreateClientDto as aj, CreateRegistrarConfigDto as ak, CreateStatusListDto as al, CreateTenantDto as am, CreateWebhookEndpointDto as an, CredentialConfig as ao, CredentialConfigControllerDeleteIssuanceConfigurationData as ap, CredentialConfigControllerDeleteIssuanceConfigurationResponses as aq, CredentialConfigControllerGetConfigByIdData as ar, CredentialConfigControllerGetConfigByIdResponse as as, CredentialConfigControllerGetConfigByIdResponses as at, CredentialConfigControllerGetConfigsData as au, CredentialConfigControllerGetConfigsResponse as av, CredentialConfigControllerGetConfigsResponses as aw, CredentialConfigControllerStoreCredentialConfigurationData as ax, CredentialConfigControllerStoreCredentialConfigurationResponse as ay, CredentialConfigControllerStoreCredentialConfigurationResponses as az, AppControllerGetVersionData as b, PolicyCredential as b$, ExportEcJwk as b0, ExportRotationPolicyDto as b1, ExternalTrustListEntity as b2, FailDeferredDto as b3, FileUploadDto as b4, IaeActionOpenid4VpPresentation as b5, IaeActionRedirectToWeb as b6, ImportTenantDto as b7, InteractiveAuthorizationCodeResponseDto as b8, InteractiveAuthorizationErrorResponseDto as b9, KeyChainControllerGetByIdResponse as bA, KeyChainControllerGetByIdResponses as bB, KeyChainControllerGetProvidersData as bC, KeyChainControllerGetProvidersResponse as bD, KeyChainControllerGetProvidersResponses as bE, KeyChainControllerImportData as bF, KeyChainControllerImportResponses as bG, KeyChainControllerRotateData as bH, KeyChainControllerRotateErrors as bI, KeyChainControllerRotateResponses as bJ, KeyChainControllerUpdateData as bK, KeyChainControllerUpdateErrors as bL, KeyChainControllerUpdateResponses as bM, KeyChainCreateDto as bN, KeyChainEntity as bO, KeyChainExportDto as bP, KeyChainImportDto as bQ, KeyChainResponseDto as bR, KeyChainUpdateDto as bS, KmsProviderCapabilitiesDto as bT, KmsProviderInfoDto as bU, KmsProvidersResponseDto as bV, NoneTrustPolicy as bW, NotificationRequestDto as bX, OfferRequestDto as bY, OfferResponse as bZ, ParResponseDto as b_, InteractiveAuthorizationRequestDto as ba, InternalTrustListEntity as bb, IssuanceConfig as bc, IssuanceConfigControllerGetIssuanceConfigurationsData as bd, IssuanceConfigControllerGetIssuanceConfigurationsResponse as be, IssuanceConfigControllerGetIssuanceConfigurationsResponses as bf, IssuanceConfigControllerStoreIssuanceConfigurationData as bg, IssuanceConfigControllerStoreIssuanceConfigurationResponse as bh, IssuanceConfigControllerStoreIssuanceConfigurationResponses as bi, IssuanceDto as bj, IssuerMetadataCredentialConfig as bk, JwksResponseDto as bl, KeyChainControllerCreateData as bm, KeyChainControllerCreateResponses as bn, KeyChainControllerDeleteData as bo, KeyChainControllerDeleteErrors as bp, KeyChainControllerDeleteResponses as bq, KeyChainControllerExportData as br, KeyChainControllerExportErrors as bs, KeyChainControllerExportResponse as bt, KeyChainControllerExportResponses as bu, KeyChainControllerGetAllData as bv, KeyChainControllerGetAllResponse as bw, KeyChainControllerGetAllResponses as bx, KeyChainControllerGetByIdData as by, KeyChainControllerGetByIdErrors as bz, AppControllerGetVersionResponses as c, SessionControllerGetSessionLogsData as c$, PresentationAttachment as c0, PresentationConfig as c1, PresentationConfigCreateDto as c2, PresentationConfigUpdateDto as c3, PresentationDuringIssuanceConfig as c4, PresentationManagementControllerConfigurationData as c5, PresentationManagementControllerConfigurationResponse as c6, PresentationManagementControllerConfigurationResponses as c7, PresentationManagementControllerDeleteConfigurationData as c8, PresentationManagementControllerDeleteConfigurationResponses as c9, RegistrarControllerGetConfigResponses as cA, RegistrarControllerUpdateConfigData as cB, RegistrarControllerUpdateConfigErrors as cC, RegistrarControllerUpdateConfigResponse as cD, RegistrarControllerUpdateConfigResponses as cE, RegistrationCertificateRequest as cF, RoleDto as cG, RootOfTrustPolicy as cH, RotationPolicyCreateDto as cI, RotationPolicyImportDto as cJ, RotationPolicyResponseDto as cK, RotationPolicyUpdateDto as cL, SchemaResponse as cM, SessionConfigControllerGetConfigData as cN, SessionConfigControllerGetConfigResponse as cO, SessionConfigControllerGetConfigResponses as cP, SessionConfigControllerResetConfigData as cQ, SessionConfigControllerResetConfigResponses as cR, SessionConfigControllerUpdateConfigData as cS, SessionConfigControllerUpdateConfigResponse as cT, SessionConfigControllerUpdateConfigResponses as cU, SessionControllerDeleteSessionData as cV, SessionControllerDeleteSessionResponses as cW, SessionControllerGetAllSessionsData as cX, SessionControllerGetAllSessionsResponse as cY, SessionControllerGetAllSessionsResponses as cZ, SessionControllerGetSessionData as c_, PresentationManagementControllerGetConfigurationData as ca, PresentationManagementControllerGetConfigurationResponse as cb, PresentationManagementControllerGetConfigurationResponses as cc, PresentationManagementControllerStorePresentationConfigData as cd, PresentationManagementControllerStorePresentationConfigResponse as ce, PresentationManagementControllerStorePresentationConfigResponses as cf, PresentationManagementControllerUpdateConfigurationData as cg, PresentationManagementControllerUpdateConfigurationResponse as ch, PresentationManagementControllerUpdateConfigurationResponses as ci, PresentationRequest as cj, PublicKeyInfoDto as ck, RegistrarConfigEntity as cl, RegistrarControllerCreateAccessCertificateData as cm, RegistrarControllerCreateAccessCertificateErrors as cn, RegistrarControllerCreateAccessCertificateResponse as co, RegistrarControllerCreateAccessCertificateResponses as cp, RegistrarControllerCreateConfigData as cq, RegistrarControllerCreateConfigErrors as cr, RegistrarControllerCreateConfigResponse as cs, RegistrarControllerCreateConfigResponses as ct, RegistrarControllerDeleteConfigData as cu, RegistrarControllerDeleteConfigResponse as cv, RegistrarControllerDeleteConfigResponses as cw, RegistrarControllerGetConfigData as cx, RegistrarControllerGetConfigErrors as cy, RegistrarControllerGetConfigResponse as cz, AttestationBasedPolicy as d, TrustListControllerCreateTrustListResponses as d$, SessionControllerGetSessionLogsResponse as d0, SessionControllerGetSessionLogsResponses as d1, SessionControllerGetSessionResponse as d2, SessionControllerGetSessionResponses as d3, SessionControllerRevokeAllData as d4, SessionControllerRevokeAllResponses as d5, SessionEventsControllerSubscribeToSessionEventsData as d6, SessionEventsControllerSubscribeToSessionEventsResponses as d7, SessionLogEntryResponseDto as d8, SessionStorageConfig as d9, StatusListManagementControllerUpdateListResponse as dA, StatusListManagementControllerUpdateListResponses as dB, StatusListResponseDto as dC, StatusUpdateDto as dD, StorageControllerUploadData as dE, StorageControllerUploadResponse as dF, StorageControllerUploadResponses as dG, TenantControllerDeleteTenantData as dH, TenantControllerDeleteTenantResponses as dI, TenantControllerGetTenantData as dJ, TenantControllerGetTenantResponse as dK, TenantControllerGetTenantResponses as dL, TenantControllerGetTenantsData as dM, TenantControllerGetTenantsResponse as dN, TenantControllerGetTenantsResponses as dO, TenantControllerInitTenantData as dP, TenantControllerInitTenantResponse as dQ, TenantControllerInitTenantResponses as dR, TenantControllerUpdateTenantData as dS, TenantControllerUpdateTenantResponse as dT, TenantControllerUpdateTenantResponses as dU, TenantEntity as dV, TokenResponse as dW, TransactionData as dX, TrustList as dY, TrustListControllerCreateTrustListData as dZ, TrustListControllerCreateTrustListResponse as d_, StatusListAggregationDto as da, StatusListConfig as db, StatusListConfigControllerGetConfigData as dc, StatusListConfigControllerGetConfigResponse as dd, StatusListConfigControllerGetConfigResponses as de, StatusListConfigControllerResetConfigData as df, StatusListConfigControllerResetConfigResponse as dg, StatusListConfigControllerResetConfigResponses as dh, StatusListConfigControllerUpdateConfigData as di, StatusListConfigControllerUpdateConfigResponse as dj, StatusListConfigControllerUpdateConfigResponses as dk, StatusListImportDto as dl, StatusListManagementControllerCreateListData as dm, StatusListManagementControllerCreateListResponse as dn, StatusListManagementControllerCreateListResponses as dp, StatusListManagementControllerDeleteListData as dq, StatusListManagementControllerDeleteListResponse as dr, StatusListManagementControllerDeleteListResponses as ds, StatusListManagementControllerGetListData as dt, StatusListManagementControllerGetListResponse as du, StatusListManagementControllerGetListResponses as dv, StatusListManagementControllerGetListsData as dw, StatusListManagementControllerGetListsResponse as dx, StatusListManagementControllerGetListsResponses as dy, StatusListManagementControllerUpdateListData as dz, AttributeProviderControllerCreateData as e, TrustListControllerDeleteTrustListData as e0, TrustListControllerDeleteTrustListResponses as e1, TrustListControllerExportTrustListData as e2, TrustListControllerExportTrustListResponse as e3, TrustListControllerExportTrustListResponses as e4, TrustListControllerGetAllTrustListsData as e5, TrustListControllerGetAllTrustListsResponse as e6, TrustListControllerGetAllTrustListsResponses as e7, TrustListControllerGetTrustListData as e8, TrustListControllerGetTrustListResponse as e9, VerifierOfferControllerGetOfferResponses as eA, WebHookAuthConfigHeader as eB, WebHookAuthConfigNone as eC, WebhookConfig as eD, WebhookEndpointControllerCreateData as eE, WebhookEndpointControllerCreateResponses as eF, WebhookEndpointControllerDeleteData as eG, WebhookEndpointControllerDeleteErrors as eH, WebhookEndpointControllerDeleteResponses as eI, WebhookEndpointControllerGetAllData as eJ, WebhookEndpointControllerGetAllResponses as eK, WebhookEndpointControllerGetByIdData as eL, WebhookEndpointControllerGetByIdErrors as eM, WebhookEndpointControllerGetByIdResponses as eN, WebhookEndpointControllerUpdateData as eO, WebhookEndpointControllerUpdateErrors as eP, WebhookEndpointControllerUpdateResponses as eQ, WebhookEndpointEntity as eR, TrustListControllerGetTrustListResponses as ea, TrustListControllerGetTrustListVersionData as eb, TrustListControllerGetTrustListVersionResponse as ec, TrustListControllerGetTrustListVersionResponses as ed, TrustListControllerGetTrustListVersionsData as ee, TrustListControllerGetTrustListVersionsResponse as ef, TrustListControllerGetTrustListVersionsResponses as eg, TrustListControllerUpdateTrustListData as eh, TrustListControllerUpdateTrustListResponse as ei, TrustListControllerUpdateTrustListResponses as ej, TrustListCreateDto as ek, TrustListEntityInfo as el, TrustListVersion as em, TrustedAuthorityQuery as en, UpdateAttributeProviderDto as eo, UpdateClientDto as ep, UpdateRegistrarConfigDto as eq, UpdateSessionConfigDto as er, UpdateStatusListConfigDto as es, UpdateStatusListDto as et, UpdateTenantDto as eu, UpdateWebhookEndpointDto as ev, UpstreamOidcConfig as ew, Vct as ex, VerifierOfferControllerGetOfferData as ey, VerifierOfferControllerGetOfferResponse as ez, AttributeProviderControllerCreateResponses as f, AttributeProviderControllerDeleteData as g, AttributeProviderControllerDeleteErrors as h, AttributeProviderControllerDeleteResponses as i, AttributeProviderControllerGetAllData as j, AttributeProviderControllerGetAllResponses as k, AttributeProviderControllerGetByIdData as l, AttributeProviderControllerGetByIdErrors as m, AttributeProviderControllerGetByIdResponses as n, AttributeProviderControllerUpdateData as o, AttributeProviderControllerUpdateErrors as p, AttributeProviderControllerUpdateResponses as q, AttributeProviderEntity as r, AuthenticationMethodAuth as s, AuthenticationMethodNone as t, AuthenticationMethodPresentation as u, AuthenticationUrlConfig as v, AuthorizationResponse as w, AuthorizeQueries as x, CacheControllerClearAllCachesResponse as y, CacheControllerClearAllCachesResponses as z };
|