@eudiplo/sdk-core 1.14.0-main.070d9f8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,3388 @@
1
+ type ClientOptions = {
2
+ baseUrl: string;
3
+ };
4
+ type RoleDto = {
5
+ /**
6
+ * OAuth2 roles
7
+ */
8
+ role: "presentation:manage" | "presentation:request" | "issuance:manage" | "issuance:offer" | "clients:manage" | "tenants:manage" | "registrar:manage";
9
+ };
10
+ type ClientCredentialsDto = {
11
+ grant_type?: string;
12
+ client_id: string;
13
+ client_secret: string;
14
+ };
15
+ type TokenResponse = {
16
+ access_token: string;
17
+ refresh_token?: string;
18
+ token_type: string;
19
+ expires_in: number;
20
+ };
21
+ type ImportTenantDto = {
22
+ /**
23
+ * The name of the tenant.
24
+ */
25
+ name: string;
26
+ /**
27
+ * The description of the tenant.
28
+ */
29
+ description?: string;
30
+ };
31
+ type SessionStorageConfig = {
32
+ /**
33
+ * Time-to-live for sessions in seconds. If not set, uses global SESSION_TTL.
34
+ */
35
+ ttlSeconds?: number;
36
+ /**
37
+ * Cleanup mode: 'full' deletes everything, 'anonymize' keeps metadata but removes PII.
38
+ */
39
+ cleanupMode?: "full" | "anonymize";
40
+ };
41
+ type StatusListConfig = {
42
+ /**
43
+ * The capacity of the status list. If not set, uses global STATUS_CAPACITY.
44
+ */
45
+ capacity?: number;
46
+ /**
47
+ * Bits per status entry: 1 (valid/revoked), 2 (with suspended), 4/8 (extended). If not set, uses global STATUS_BITS.
48
+ */
49
+ bits?: 1 | 2 | 4 | 8;
50
+ /**
51
+ * TTL in seconds for the status list JWT. If not set, uses global STATUS_TTL.
52
+ */
53
+ ttl?: number;
54
+ /**
55
+ * If true, regenerate JWT immediately on status changes. If false (default), use lazy regeneration on TTL expiry.
56
+ */
57
+ immediateUpdate?: boolean;
58
+ /**
59
+ * If true, include aggregation_uri in status list JWTs for pre-fetching support (default: true).
60
+ */
61
+ enableAggregation?: boolean;
62
+ };
63
+ type TenantEntity = {
64
+ /**
65
+ * Session storage configuration for this tenant. Controls TTL and cleanup behavior.
66
+ */
67
+ sessionConfig?: SessionStorageConfig;
68
+ /**
69
+ * Status list configuration for this tenant. Only affects newly created status lists.
70
+ */
71
+ statusListConfig?: StatusListConfig;
72
+ /**
73
+ * The unique identifier for the tenant.
74
+ */
75
+ id: string;
76
+ /**
77
+ * The name of the tenant.
78
+ */
79
+ name: string;
80
+ /**
81
+ * The description of the tenant.
82
+ */
83
+ description?: string;
84
+ /**
85
+ * The current status of the tenant.
86
+ */
87
+ status: string;
88
+ /**
89
+ * The clients associated with the tenant.
90
+ */
91
+ clients: Array<ClientEntity>;
92
+ };
93
+ type ClientEntity = {
94
+ /**
95
+ * List of presentation config IDs this client can use. If empty/null, all configs are allowed.
96
+ */
97
+ allowedPresentationConfigs?: Array<string>;
98
+ /**
99
+ * List of issuance config IDs this client can use. If empty/null, all configs are allowed.
100
+ */
101
+ allowedIssuanceConfigs?: Array<string>;
102
+ /**
103
+ * The unique identifier for the client.
104
+ */
105
+ clientId: string;
106
+ /**
107
+ * The secret key for the client.
108
+ */
109
+ secret?: string;
110
+ /**
111
+ * The unique identifier for the tenant that the client belongs to. Only null for accounts that manage tenants, that do not belong to a client
112
+ */
113
+ tenantId?: string;
114
+ /**
115
+ * The description of the client.
116
+ */
117
+ description?: string;
118
+ /**
119
+ * The roles assigned to the client.
120
+ */
121
+ roles: Array<"presentation:manage" | "presentation:request" | "issuance:manage" | "issuance:offer" | "clients:manage" | "tenants:manage" | "registrar:manage">;
122
+ /**
123
+ * The tenant that the client belongs to.
124
+ */
125
+ tenant?: TenantEntity;
126
+ };
127
+ type CreateTenantDto = {
128
+ /**
129
+ * Status list configuration for this tenant. Only affects newly created status lists.
130
+ */
131
+ statusListConfig?: StatusListConfig;
132
+ /**
133
+ * Session storage configuration. Controls TTL and cleanup behavior.
134
+ */
135
+ sessionConfig?: SessionStorageConfig;
136
+ roles?: Array<"presentation:manage" | "presentation:request" | "issuance:manage" | "issuance:offer" | "clients:manage" | "tenants:manage" | "registrar:manage">;
137
+ /**
138
+ * The unique identifier for the tenant.
139
+ */
140
+ id: string;
141
+ /**
142
+ * The name of the tenant.
143
+ */
144
+ name: string;
145
+ /**
146
+ * The description of the tenant.
147
+ */
148
+ description?: string;
149
+ };
150
+ type UpdateTenantDto = {
151
+ /**
152
+ * Status list configuration for this tenant. Only affects newly created status lists.
153
+ */
154
+ statusListConfig?: StatusListConfig;
155
+ /**
156
+ * Session storage configuration. Controls TTL and cleanup behavior.
157
+ */
158
+ sessionConfig?: SessionStorageConfig;
159
+ /**
160
+ * The name of the tenant.
161
+ */
162
+ name?: string;
163
+ /**
164
+ * The description of the tenant.
165
+ */
166
+ description?: string;
167
+ roles?: Array<"presentation:manage" | "presentation:request" | "issuance:manage" | "issuance:offer" | "clients:manage" | "tenants:manage" | "registrar:manage">;
168
+ };
169
+ type ClientSecretResponseDto = {
170
+ secret: string;
171
+ };
172
+ type UpdateClientDto = {
173
+ /**
174
+ * List of presentation config IDs this client can use. If empty/null, all configs are allowed.
175
+ */
176
+ allowedPresentationConfigs?: Array<string>;
177
+ /**
178
+ * List of issuance config IDs this client can use. If empty/null, all configs are allowed.
179
+ */
180
+ allowedIssuanceConfigs?: Array<string>;
181
+ /**
182
+ * The description of the client.
183
+ */
184
+ description?: string;
185
+ /**
186
+ * The roles assigned to the client.
187
+ */
188
+ roles: Array<"presentation:manage" | "presentation:request" | "issuance:manage" | "issuance:offer" | "clients:manage" | "tenants:manage" | "registrar:manage">;
189
+ };
190
+ type CreateClientDto = {
191
+ /**
192
+ * List of presentation config IDs this client can use. If empty/null, all configs are allowed.
193
+ */
194
+ allowedPresentationConfigs?: Array<string>;
195
+ /**
196
+ * List of issuance config IDs this client can use. If empty/null, all configs are allowed.
197
+ */
198
+ allowedIssuanceConfigs?: Array<string>;
199
+ /**
200
+ * The unique identifier for the client.
201
+ */
202
+ clientId: string;
203
+ /**
204
+ * The secret key for the client.
205
+ */
206
+ secret?: string;
207
+ /**
208
+ * The description of the client.
209
+ */
210
+ description?: string;
211
+ /**
212
+ * The roles assigned to the client.
213
+ */
214
+ roles: Array<"presentation:manage" | "presentation:request" | "issuance:manage" | "issuance:offer" | "clients:manage" | "tenants:manage" | "registrar:manage">;
215
+ };
216
+ type CertUsageEntity = {
217
+ tenantId: string;
218
+ certId: string;
219
+ usage: "access" | "signing" | "trustList" | "statusList";
220
+ cert: CertEntity;
221
+ };
222
+ type KeyEntity = {
223
+ /**
224
+ * Unique identifier for the key.
225
+ */
226
+ id: string;
227
+ /**
228
+ * Description of the key.
229
+ */
230
+ description?: string;
231
+ /**
232
+ * Tenant ID for the key.
233
+ */
234
+ tenantId: string;
235
+ /**
236
+ * The tenant that owns this object.
237
+ */
238
+ tenant: TenantEntity;
239
+ /**
240
+ * The key material.
241
+ * Encrypted at rest using AES-256-GCM.
242
+ */
243
+ key: {
244
+ [key: string]: unknown;
245
+ };
246
+ /**
247
+ * The usage type of the key.
248
+ */
249
+ usage: {
250
+ [key: string]: unknown;
251
+ };
252
+ /**
253
+ * Certificates associated with this key.
254
+ */
255
+ certificates: Array<CertEntity>;
256
+ /**
257
+ * The timestamp when the key was created.
258
+ */
259
+ createdAt: string;
260
+ /**
261
+ * The timestamp when the key was last updated.
262
+ */
263
+ updatedAt: string;
264
+ };
265
+ type CertEntity = {
266
+ /**
267
+ * The key ID this certificate is associated with
268
+ */
269
+ keyId: string;
270
+ /**
271
+ * Unique identifier for the key.
272
+ */
273
+ id: string;
274
+ /**
275
+ * Tenant ID for the key.
276
+ */
277
+ tenantId: string;
278
+ /**
279
+ * The tenant that owns this object.
280
+ */
281
+ tenant: TenantEntity;
282
+ /**
283
+ * Certificate chain in PEM format (leaf first, then intermediates/CA).
284
+ */
285
+ crt: Array<string>;
286
+ usages: Array<CertUsageEntity>;
287
+ /**
288
+ * Description of the key.
289
+ */
290
+ description?: string;
291
+ key: KeyEntity;
292
+ /**
293
+ * The timestamp when the certificate was created.
294
+ */
295
+ createdAt: string;
296
+ /**
297
+ * The timestamp when the certificate was last updated.
298
+ */
299
+ updatedAt: string;
300
+ };
301
+ type Key = {
302
+ kty: string;
303
+ x: string;
304
+ y: string;
305
+ crv: string;
306
+ d: string;
307
+ alg: string;
308
+ };
309
+ type KeyImportDto = {
310
+ /**
311
+ * The private key in JWK format.
312
+ */
313
+ key: Key;
314
+ /**
315
+ * Unique identifier for the key.
316
+ */
317
+ id: string;
318
+ /**
319
+ * Description of the key.
320
+ */
321
+ description?: string;
322
+ };
323
+ type UpdateKeyDto = {
324
+ /**
325
+ * Unique identifier for the key.
326
+ */
327
+ id: string;
328
+ /**
329
+ * Description of the key.
330
+ */
331
+ description?: string;
332
+ };
333
+ type CertImportDto = {
334
+ /**
335
+ * The key ID this certificate is associated with
336
+ */
337
+ keyId: string;
338
+ id?: string;
339
+ /**
340
+ * Usage types for the certificate.
341
+ */
342
+ certUsageTypes: Array<"access" | "signing" | "trustList" | "statusList">;
343
+ /**
344
+ * Certificate chain in PEM format (leaf first, then intermediates/CA).
345
+ * If not provided, a self-signed certificate will be generated.
346
+ */
347
+ crt?: Array<string>;
348
+ /**
349
+ * Subject name (CN) for self-signed certificate generation.
350
+ * If not provided, the tenant name will be used.
351
+ */
352
+ subjectName?: string;
353
+ /**
354
+ * Description of the key.
355
+ */
356
+ description?: string;
357
+ };
358
+ type CertResponseDto = {
359
+ /**
360
+ * The ID of the created self-signed certificate.
361
+ */
362
+ id: string;
363
+ };
364
+ type CertUpdateDto = {
365
+ /**
366
+ * Usage types for the certificate.
367
+ */
368
+ certUsageTypes: Array<"access" | "signing" | "trustList" | "statusList">;
369
+ usages: Array<CertUsageEntity>;
370
+ /**
371
+ * Description of the key.
372
+ */
373
+ description?: string;
374
+ };
375
+ type StatusListImportDto = {
376
+ /**
377
+ * Unique identifier for the status list
378
+ */
379
+ id: string;
380
+ /**
381
+ * Credential configuration ID to bind this list exclusively to. Leave empty for a shared list.
382
+ */
383
+ credentialConfigurationId?: string;
384
+ /**
385
+ * Certificate ID to use for signing. Leave empty to use the tenant's default StatusList certificate.
386
+ */
387
+ certId?: string;
388
+ /**
389
+ * Capacity of the status list. If not provided, uses tenant or global defaults.
390
+ */
391
+ capacity?: number;
392
+ /**
393
+ * Bits per status value. If not provided, uses tenant or global defaults.
394
+ */
395
+ bits?: 1 | 2 | 4 | 8;
396
+ };
397
+ type StatusListAggregationDto = {
398
+ /**
399
+ * Array of status list token URIs
400
+ */
401
+ status_lists: Array<string>;
402
+ };
403
+ type UpdateStatusListConfigDto = {
404
+ /**
405
+ * The capacity of the status list. Set to null to reset to global default.
406
+ */
407
+ capacity?: number;
408
+ /**
409
+ * Bits per status entry. Set to null to reset to global default.
410
+ */
411
+ bits?: 1 | 2 | 4 | 8;
412
+ /**
413
+ * TTL in seconds for the status list JWT. Set to null to reset to global default.
414
+ */
415
+ ttl?: number;
416
+ /**
417
+ * If true, regenerate JWT on every status change. Set to null to reset to default (false).
418
+ */
419
+ immediateUpdate?: boolean;
420
+ /**
421
+ * If true, include aggregation_uri in status list JWTs for pre-fetching support. Set to null to reset to default (true).
422
+ */
423
+ enableAggregation?: boolean;
424
+ };
425
+ type StatusListResponseDto = {
426
+ /**
427
+ * Unique identifier for the status list
428
+ */
429
+ id: string;
430
+ /**
431
+ * The tenant ID
432
+ */
433
+ tenantId: string;
434
+ /**
435
+ * Credential configuration ID this list is bound to. Null means shared.
436
+ */
437
+ credentialConfigurationId?: string;
438
+ /**
439
+ * Certificate ID used for signing. Null means using the tenant's default.
440
+ */
441
+ certId?: string;
442
+ /**
443
+ * Bits per status value
444
+ */
445
+ bits: 1 | 2 | 4 | 8;
446
+ /**
447
+ * Total capacity of the status list
448
+ */
449
+ capacity: number;
450
+ /**
451
+ * Number of entries in use
452
+ */
453
+ usedEntries: number;
454
+ /**
455
+ * Number of available entries
456
+ */
457
+ availableEntries: number;
458
+ /**
459
+ * The public URI for this status list
460
+ */
461
+ uri: string;
462
+ /**
463
+ * Creation timestamp
464
+ */
465
+ createdAt: string;
466
+ /**
467
+ * JWT expiration timestamp. Null if JWT has not been generated yet.
468
+ */
469
+ expiresAt?: string;
470
+ };
471
+ type CreateStatusListDto = {
472
+ /**
473
+ * Credential configuration ID to bind this list exclusively to. Leave empty for a shared list.
474
+ */
475
+ credentialConfigurationId?: string;
476
+ /**
477
+ * Certificate ID to use for signing. Leave empty to use the tenant's default StatusList certificate.
478
+ */
479
+ certId?: string;
480
+ /**
481
+ * Bits per status value. More bits allow more status states. Defaults to tenant configuration.
482
+ */
483
+ bits?: 1 | 2 | 4 | 8;
484
+ /**
485
+ * Maximum number of credential status entries. Defaults to tenant configuration.
486
+ */
487
+ capacity?: number;
488
+ };
489
+ type UpdateStatusListDto = {
490
+ /**
491
+ * Credential configuration ID to bind this list exclusively to. Set to null to make this a shared list.
492
+ */
493
+ credentialConfigurationId?: string;
494
+ /**
495
+ * Certificate ID to use for signing. Set to null to use the tenant's default StatusList certificate.
496
+ */
497
+ certId?: string;
498
+ };
499
+ type AuthorizeQueries = {
500
+ issuer_state?: string;
501
+ response_type?: string;
502
+ client_id?: string;
503
+ redirect_uri?: string;
504
+ resource?: string;
505
+ scope?: string;
506
+ code_challenge?: string;
507
+ code_challenge_method?: string;
508
+ dpop_jkt?: string;
509
+ request_uri?: string;
510
+ auth_session?: string;
511
+ state?: string;
512
+ };
513
+ type WebHookAuthConfigNone = {
514
+ /**
515
+ * The type of authentication used for the webhook.
516
+ */
517
+ type: "none";
518
+ };
519
+ type ApiKeyConfig = {
520
+ /**
521
+ * The name of the header where the API key will be sent.
522
+ */
523
+ headerName: string;
524
+ /**
525
+ * The value of the API key to be sent in the header.
526
+ */
527
+ value: string;
528
+ };
529
+ type WebHookAuthConfigHeader = {
530
+ /**
531
+ * The type of authentication used for the webhook.
532
+ */
533
+ type: "apiKey";
534
+ /**
535
+ * Configuration for API key authentication.
536
+ * This is required if the type is 'apiKey'.
537
+ */
538
+ config: ApiKeyConfig;
539
+ };
540
+ type WebhookConfig = {
541
+ /**
542
+ * Optional authentication configuration for the webhook.
543
+ * If not provided, no authentication will be used.
544
+ */
545
+ auth: WebHookAuthConfigNone | WebHookAuthConfigHeader;
546
+ /**
547
+ * The URL to which the webhook will send notifications.
548
+ */
549
+ url: string;
550
+ };
551
+ type OfferRequestDto = {
552
+ /**
553
+ * The type of response expected for the offer request.
554
+ */
555
+ response_type: "uri" | "dc-api";
556
+ /**
557
+ * Credential claims configuration per credential. Keys must match credentialConfigurationIds.
558
+ */
559
+ credentialClaims?: {
560
+ additionalProperties?: {
561
+ type: "inline";
562
+ claims: {
563
+ [key: string]: unknown;
564
+ };
565
+ } | {
566
+ type: "webhook";
567
+ webhook: {
568
+ [key: string]: unknown;
569
+ };
570
+ };
571
+ };
572
+ /**
573
+ * The flow type for the offer request.
574
+ */
575
+ flow: "authorization_code" | "pre_authorized_code";
576
+ /**
577
+ * Transaction code for pre-authorized code flow.
578
+ */
579
+ tx_code?: string;
580
+ /**
581
+ * Description for the transaction code (e.g., "Please enter the PIN sent to your email").
582
+ */
583
+ tx_code_description?: string;
584
+ /**
585
+ * List of credential configuration ids to be included in the offer.
586
+ */
587
+ credentialConfigurationIds: Array<string>;
588
+ /**
589
+ * Optional authorization server to be used for this issuance flow.
590
+ */
591
+ authorization_server?: string;
592
+ /**
593
+ * Webhook to notify about the status of the issuance process.
594
+ */
595
+ notifyWebhook?: WebhookConfig;
596
+ };
597
+ type TransactionData = {
598
+ type: string;
599
+ credential_ids: Array<string>;
600
+ };
601
+ type Session = {
602
+ /**
603
+ * Status of the session.
604
+ */
605
+ status: "active" | "fetched" | "completed" | "expired" | "failed";
606
+ /**
607
+ * Unique identifier for the session.
608
+ */
609
+ id: string;
610
+ /**
611
+ * The timestamp when the request was created.
612
+ */
613
+ createdAt: string;
614
+ /**
615
+ * The timestamp when the request was last updated.
616
+ */
617
+ updatedAt: string;
618
+ /**
619
+ * The timestamp when the request is set to expire.
620
+ */
621
+ expiresAt?: string;
622
+ /**
623
+ * Flag indicating whether to use the DC API for the presentation request.
624
+ */
625
+ useDcApi: boolean;
626
+ /**
627
+ * Tenant ID for multi-tenancy support.
628
+ */
629
+ tenantId: string;
630
+ /**
631
+ * The tenant that owns this object.
632
+ */
633
+ tenant: TenantEntity;
634
+ authorization_code?: string;
635
+ /**
636
+ * Request URI from the authorization request.
637
+ */
638
+ request_uri?: string;
639
+ /**
640
+ * Authorization queries associated with the session.
641
+ * Encrypted at rest.
642
+ */
643
+ auth_queries?: AuthorizeQueries;
644
+ /**
645
+ * Credential offer object containing details about the credential offer or presentation request.
646
+ * Encrypted at rest.
647
+ */
648
+ offer?: {
649
+ [key: string]: unknown;
650
+ };
651
+ /**
652
+ * Offer URL for the credential offer.
653
+ */
654
+ offerUrl?: string;
655
+ /**
656
+ * Credential payload containing the offer request details.
657
+ * Encrypted at rest - may contain sensitive claim data.
658
+ */
659
+ credentialPayload?: OfferRequestDto;
660
+ /**
661
+ * Webhook configuration to send the result of the notification response.
662
+ */
663
+ notifyWebhook?: WebhookConfig;
664
+ /**
665
+ * Notifications associated with the session.
666
+ */
667
+ notifications: Array<{
668
+ [key: string]: unknown;
669
+ }>;
670
+ requestId?: string;
671
+ /**
672
+ * The URL of the presentation auth request.
673
+ */
674
+ requestUrl?: string;
675
+ /**
676
+ * Signed presentation auth request.
677
+ */
678
+ requestObject?: string;
679
+ /**
680
+ * Verified credentials from the presentation process.
681
+ * Encrypted at rest - contains personal information.
682
+ */
683
+ credentials?: Array<{
684
+ [key: string]: unknown;
685
+ }>;
686
+ /**
687
+ * Noncce from the Verifiable Presentation request.
688
+ */
689
+ vp_nonce?: string;
690
+ /**
691
+ * Client ID used in the OID4VP authorization request.
692
+ */
693
+ clientId?: string;
694
+ /**
695
+ * Response URI used in the OID4VP authorization request.
696
+ */
697
+ responseUri?: string;
698
+ /**
699
+ * Redirect URI to which the user-agent should be redirected after the presentation is completed.
700
+ */
701
+ redirectUri?: string;
702
+ /**
703
+ * Where to send the claims webhook response.
704
+ */
705
+ parsedWebhook?: WebhookConfig;
706
+ /**
707
+ * Transaction data to include in the OID4VP authorization request.
708
+ * Can be overridden per-request from the presentation configuration.
709
+ */
710
+ transaction_data?: Array<TransactionData>;
711
+ externalIssuer?: string;
712
+ /**
713
+ * The subject (sub) from the external authorization server token.
714
+ * Used to identify the user at the external AS.
715
+ */
716
+ externalSubject?: string;
717
+ };
718
+ type StatusUpdateDto = {
719
+ /**
720
+ * The session ID of the user
721
+ */
722
+ sessionId: string;
723
+ /**
724
+ * The ID of the credential configuration
725
+ * This is optional, if not provided, all credentials will be revoked of the session.
726
+ */
727
+ credentialConfigurationId?: string;
728
+ /**
729
+ * The status of the credential
730
+ * 0 = valid, 1 = revoked, 2 = suspended
731
+ */
732
+ status: number;
733
+ };
734
+ type UpdateSessionConfigDto = {
735
+ /**
736
+ * Time-to-live for sessions in seconds. Set to null to use global default.
737
+ */
738
+ ttlSeconds?: number;
739
+ /**
740
+ * Cleanup mode: 'full' deletes everything, 'anonymize' keeps metadata but removes PII.
741
+ */
742
+ cleanupMode?: "full" | "anonymize";
743
+ };
744
+ type AuthenticationMethodNone = {
745
+ method: "none";
746
+ };
747
+ type AuthenticationUrlConfig = {
748
+ /**
749
+ * The URL used in the OID4VCI authorized code flow.
750
+ * This URL is where users will be redirected for authentication.
751
+ */
752
+ url: string;
753
+ /**
754
+ * Optional webhook configuration for authentication callbacks
755
+ */
756
+ webhook?: WebhookConfig;
757
+ };
758
+ type AuthenticationMethodAuth = {
759
+ method: "auth";
760
+ config: AuthenticationUrlConfig;
761
+ };
762
+ type PresentationDuringIssuanceConfig = {
763
+ /**
764
+ * Link to the presentation configuration that is relevant for the issuance process
765
+ */
766
+ type: string;
767
+ };
768
+ type AuthenticationMethodPresentation = {
769
+ method: "presentationDuringIssuance";
770
+ config: PresentationDuringIssuanceConfig;
771
+ };
772
+ type UpstreamOidcConfig = {
773
+ /**
774
+ * The OIDC issuer URL of the upstream provider
775
+ */
776
+ issuer: string;
777
+ /**
778
+ * The client ID registered with the upstream provider
779
+ */
780
+ clientId: string;
781
+ /**
782
+ * The client secret for confidential clients
783
+ */
784
+ clientSecret?: string;
785
+ /**
786
+ * Scopes to request from the upstream provider
787
+ */
788
+ scopes?: Array<string>;
789
+ };
790
+ type ChainedAsTokenConfig = {
791
+ /**
792
+ * Access token lifetime in seconds
793
+ */
794
+ lifetimeSeconds?: number;
795
+ /**
796
+ * Key ID for token signing
797
+ */
798
+ signingKeyId?: string;
799
+ };
800
+ type ChainedAsConfig = {
801
+ /**
802
+ * Enable chained AS mode
803
+ */
804
+ enabled: boolean;
805
+ /**
806
+ * Upstream OIDC provider configuration
807
+ */
808
+ upstream?: UpstreamOidcConfig;
809
+ /**
810
+ * Token configuration
811
+ */
812
+ token?: ChainedAsTokenConfig;
813
+ /**
814
+ * Require DPoP binding for tokens
815
+ */
816
+ requireDPoP?: boolean;
817
+ };
818
+ type DisplayLogo = {
819
+ uri: string;
820
+ alt_text?: string;
821
+ };
822
+ type DisplayInfo = {
823
+ name?: string;
824
+ locale?: string;
825
+ logo?: DisplayLogo;
826
+ };
827
+ type IssuanceConfig = {
828
+ /**
829
+ * Configuration for Chained Authorization Server mode.
830
+ * When enabled, EUDIPLO acts as an OAuth AS facade, delegating user authentication
831
+ * to an upstream OIDC provider while issuing its own tokens with issuer_state.
832
+ */
833
+ chainedAs?: ChainedAsConfig;
834
+ /**
835
+ * The tenant that owns this object.
836
+ */
837
+ tenant: TenantEntity;
838
+ /**
839
+ * Authentication server URL for the issuance process.
840
+ */
841
+ authServers?: Array<string>;
842
+ /**
843
+ * Value to determine the amount of credentials that are issued in a batch.
844
+ * Default is 1.
845
+ */
846
+ batchSize?: number;
847
+ /**
848
+ * Indicates whether DPoP is required for the issuance process. Default value is true.
849
+ */
850
+ dPopRequired?: boolean;
851
+ /**
852
+ * Indicates whether wallet attestation is required for the token endpoint.
853
+ * When enabled, wallets must provide OAuth-Client-Attestation headers.
854
+ * Default value is false.
855
+ */
856
+ walletAttestationRequired?: boolean;
857
+ /**
858
+ * URLs of trust lists containing trusted wallet providers.
859
+ * The wallet attestation's X.509 certificate will be validated against these trust lists.
860
+ * If empty and walletAttestationRequired is true, all wallet providers are rejected.
861
+ */
862
+ walletProviderTrustLists?: Array<string>;
863
+ display: Array<DisplayInfo>;
864
+ /**
865
+ * The timestamp when the VP request was created.
866
+ */
867
+ createdAt: string;
868
+ /**
869
+ * The timestamp when the VP request was last updated.
870
+ */
871
+ updatedAt: string;
872
+ };
873
+ type IssuanceDto = {
874
+ /**
875
+ * Configuration for Chained Authorization Server mode.
876
+ * When enabled, EUDIPLO acts as an OAuth AS facade, delegating user authentication
877
+ * to an upstream OIDC provider while issuing its own tokens with issuer_state.
878
+ */
879
+ chainedAs?: ChainedAsConfig;
880
+ /**
881
+ * Authentication server URL for the issuance process.
882
+ */
883
+ authServers?: Array<string>;
884
+ /**
885
+ * Value to determine the amount of credentials that are issued in a batch.
886
+ * Default is 1.
887
+ */
888
+ batchSize?: number;
889
+ /**
890
+ * Indicates whether DPoP is required for the issuance process. Default value is true.
891
+ */
892
+ dPopRequired?: boolean;
893
+ /**
894
+ * Indicates whether wallet attestation is required for the token endpoint.
895
+ * When enabled, wallets must provide OAuth-Client-Attestation headers.
896
+ * Default value is false.
897
+ */
898
+ walletAttestationRequired?: boolean;
899
+ /**
900
+ * URLs of trust lists containing trusted wallet providers.
901
+ * The wallet attestation's X.509 certificate will be validated against these trust lists.
902
+ * If empty and walletAttestationRequired is true, all wallet providers are rejected.
903
+ */
904
+ walletProviderTrustLists?: Array<string>;
905
+ display: Array<DisplayInfo>;
906
+ };
907
+ type ClaimsQuery = {
908
+ id: string;
909
+ path: Array<string>;
910
+ values?: Array<{
911
+ [key: string]: unknown;
912
+ }>;
913
+ };
914
+ type Claim = {
915
+ path: Array<string>;
916
+ };
917
+ type TrustedAuthorityQuery = {
918
+ type: "aki" | "etsi_tl";
919
+ values: Array<string>;
920
+ };
921
+ type CredentialQuery = {
922
+ id: string;
923
+ format: string;
924
+ multiple?: boolean;
925
+ claims?: Array<Claim>;
926
+ meta: {
927
+ [key: string]: unknown;
928
+ };
929
+ trusted_authorities?: Array<TrustedAuthorityQuery>;
930
+ };
931
+ type CredentialSetQuery = {
932
+ options: Array<Array<string>>;
933
+ required?: boolean;
934
+ };
935
+ type PolicyCredential = {
936
+ claims?: Array<ClaimsQuery>;
937
+ credentials: Array<CredentialQuery>;
938
+ credential_sets?: Array<CredentialSetQuery>;
939
+ };
940
+ type AttestationBasedPolicy = {
941
+ policy: "attestationBased";
942
+ values: Array<PolicyCredential>;
943
+ };
944
+ type NoneTrustPolicy = {
945
+ policy: "none";
946
+ };
947
+ type AllowListPolicy = {
948
+ policy: "allowList";
949
+ values: Array<string>;
950
+ };
951
+ type RootOfTrustPolicy = {
952
+ policy: "rootOfTrust";
953
+ values: string;
954
+ };
955
+ type Vct = {
956
+ vct?: string;
957
+ name?: string;
958
+ description?: string;
959
+ extends?: string;
960
+ "extends#integrity"?: string;
961
+ schema_uri?: string;
962
+ "schema_uri#integrity"?: string;
963
+ };
964
+ type IaeActionOpenid4VpPresentation = {
965
+ /**
966
+ * Action type discriminator
967
+ */
968
+ type: "openid4vp_presentation";
969
+ /**
970
+ * Optional label for this step (for display purposes)
971
+ */
972
+ label?: string;
973
+ /**
974
+ * ID of the presentation configuration to use for this step
975
+ */
976
+ presentationConfigId: string;
977
+ };
978
+ type IaeActionRedirectToWeb = {
979
+ /**
980
+ * Action type discriminator
981
+ */
982
+ type: "redirect_to_web";
983
+ /**
984
+ * Optional label for this step (for display purposes)
985
+ */
986
+ label?: string;
987
+ /**
988
+ * URL to redirect the user to for web-based interaction
989
+ */
990
+ url: string;
991
+ /**
992
+ * URL where the external service should redirect back after completion. If not provided, the service must call back to the IAE endpoint.
993
+ */
994
+ callbackUrl?: string;
995
+ /**
996
+ * Description of what the user should do on the web page (for wallet display)
997
+ */
998
+ description?: string;
999
+ };
1000
+ type EmbeddedDisclosurePolicy = {
1001
+ policy: string;
1002
+ };
1003
+ type DisplayImage = {
1004
+ uri: string;
1005
+ };
1006
+ type Display = {
1007
+ name: string;
1008
+ description: string;
1009
+ locale: string;
1010
+ background_color?: string;
1011
+ text_color?: string;
1012
+ background_image?: DisplayImage;
1013
+ logo?: DisplayImage;
1014
+ };
1015
+ type IssuerMetadataCredentialConfig = {
1016
+ format: "mso_mdoc" | "dc+sd-jwt";
1017
+ display: Array<Display>;
1018
+ scope?: string;
1019
+ /**
1020
+ * Document type for mDOC credentials (e.g., "org.iso.18013.5.1.mDL").
1021
+ * Only applicable when format is "mso_mdoc".
1022
+ */
1023
+ docType?: string;
1024
+ /**
1025
+ * Namespace for mDOC credentials (e.g., "org.iso.18013.5.1").
1026
+ * Only applicable when format is "mso_mdoc".
1027
+ * Used when claims are provided as a flat object.
1028
+ */
1029
+ namespace?: string;
1030
+ /**
1031
+ * Claims organized by namespace for mDOC credentials.
1032
+ * Allows specifying claims across multiple namespaces.
1033
+ * Only applicable when format is "mso_mdoc".
1034
+ * Example:
1035
+ * {
1036
+ * "org.iso.18013.5.1": { "given_name": "John", "family_name": "Doe" },
1037
+ * "org.iso.18013.5.1.aamva": { "DHS_compliance": "F" }
1038
+ * }
1039
+ */
1040
+ claimsByNamespace?: {
1041
+ [key: string]: unknown;
1042
+ };
1043
+ };
1044
+ type SchemaResponse = {
1045
+ $schema: string;
1046
+ type: string;
1047
+ properties: {
1048
+ [key: string]: unknown;
1049
+ };
1050
+ required?: Array<string>;
1051
+ title?: string;
1052
+ description?: string;
1053
+ };
1054
+ type CredentialConfig = {
1055
+ /**
1056
+ * VCT as a URI string (e.g., urn:eudi:pid:de:1) or as an object for EUDIPLO-hosted VCT
1057
+ */
1058
+ vct?: string | Vct;
1059
+ /**
1060
+ * List of IAE actions to execute before credential issuance
1061
+ */
1062
+ iaeActions?: Array<IaeActionOpenid4VpPresentation | IaeActionRedirectToWeb>;
1063
+ /**
1064
+ * Embedded disclosure policy (discriminated union by `policy`).
1065
+ * The discriminator makes class-transformer instantiate the right subclass,
1066
+ * and then class-validator runs that subclass’s rules.
1067
+ */
1068
+ embeddedDisclosurePolicy?: EmbeddedDisclosurePolicy;
1069
+ id: string;
1070
+ description?: string;
1071
+ /**
1072
+ * The tenant that owns this object.
1073
+ */
1074
+ tenant: TenantEntity;
1075
+ config: IssuerMetadataCredentialConfig;
1076
+ claims?: {
1077
+ [key: string]: unknown;
1078
+ };
1079
+ /**
1080
+ * Webhook to receive claims for the issuance process.
1081
+ */
1082
+ claimsWebhook?: WebhookConfig;
1083
+ /**
1084
+ * Webhook to receive claims for the issuance process.
1085
+ */
1086
+ notificationWebhook?: WebhookConfig;
1087
+ disclosureFrame?: {
1088
+ [key: string]: unknown;
1089
+ };
1090
+ keyBinding?: boolean;
1091
+ /**
1092
+ * Reference to the certificate used for signing.
1093
+ * Note: No DB-level FK constraint because CertEntity has a composite PK
1094
+ * (id + tenantId) and SET NULL behavior cannot work when tenantId is
1095
+ * part of this entity's own PK.
1096
+ */
1097
+ certId?: string;
1098
+ cert?: CertEntity;
1099
+ statusManagement?: boolean;
1100
+ lifeTime?: number;
1101
+ schema?: SchemaResponse;
1102
+ };
1103
+ type CredentialConfigCreate = {
1104
+ /**
1105
+ * VCT as a URI string (e.g., urn:eudi:pid:de:1) or as an object for EUDIPLO-hosted VCT
1106
+ */
1107
+ vct?: string | Vct;
1108
+ /**
1109
+ * List of IAE actions to execute before credential issuance
1110
+ */
1111
+ iaeActions?: Array<IaeActionOpenid4VpPresentation | IaeActionRedirectToWeb>;
1112
+ /**
1113
+ * Embedded disclosure policy (discriminated union by `policy`).
1114
+ * The discriminator makes class-transformer instantiate the right subclass,
1115
+ * and then class-validator runs that subclass’s rules.
1116
+ */
1117
+ embeddedDisclosurePolicy?: EmbeddedDisclosurePolicy;
1118
+ id: string;
1119
+ description?: string;
1120
+ config: IssuerMetadataCredentialConfig;
1121
+ claims?: {
1122
+ [key: string]: unknown;
1123
+ };
1124
+ /**
1125
+ * Webhook to receive claims for the issuance process.
1126
+ */
1127
+ claimsWebhook?: WebhookConfig;
1128
+ /**
1129
+ * Webhook to receive claims for the issuance process.
1130
+ */
1131
+ notificationWebhook?: WebhookConfig;
1132
+ disclosureFrame?: {
1133
+ [key: string]: unknown;
1134
+ };
1135
+ keyBinding?: boolean;
1136
+ /**
1137
+ * Reference to the certificate used for signing.
1138
+ * Note: No DB-level FK constraint because CertEntity has a composite PK
1139
+ * (id + tenantId) and SET NULL behavior cannot work when tenantId is
1140
+ * part of this entity's own PK.
1141
+ */
1142
+ certId?: string;
1143
+ statusManagement?: boolean;
1144
+ lifeTime?: number;
1145
+ schema?: SchemaResponse;
1146
+ };
1147
+ type CredentialConfigUpdate = {
1148
+ /**
1149
+ * VCT as a URI string (e.g., urn:eudi:pid:de:1) or as an object for EUDIPLO-hosted VCT
1150
+ */
1151
+ vct?: string | Vct;
1152
+ /**
1153
+ * List of IAE actions to execute before credential issuance
1154
+ */
1155
+ iaeActions?: Array<IaeActionOpenid4VpPresentation | IaeActionRedirectToWeb>;
1156
+ /**
1157
+ * Embedded disclosure policy (discriminated union by `policy`).
1158
+ * The discriminator makes class-transformer instantiate the right subclass,
1159
+ * and then class-validator runs that subclass’s rules.
1160
+ */
1161
+ embeddedDisclosurePolicy?: EmbeddedDisclosurePolicy;
1162
+ id?: string;
1163
+ description?: string;
1164
+ config?: IssuerMetadataCredentialConfig;
1165
+ claims?: {
1166
+ [key: string]: unknown;
1167
+ };
1168
+ /**
1169
+ * Webhook to receive claims for the issuance process.
1170
+ */
1171
+ claimsWebhook?: WebhookConfig;
1172
+ /**
1173
+ * Webhook to receive claims for the issuance process.
1174
+ */
1175
+ notificationWebhook?: WebhookConfig;
1176
+ disclosureFrame?: {
1177
+ [key: string]: unknown;
1178
+ };
1179
+ keyBinding?: boolean;
1180
+ /**
1181
+ * Reference to the certificate used for signing.
1182
+ * Note: No DB-level FK constraint because CertEntity has a composite PK
1183
+ * (id + tenantId) and SET NULL behavior cannot work when tenantId is
1184
+ * part of this entity's own PK.
1185
+ */
1186
+ certId?: string;
1187
+ statusManagement?: boolean;
1188
+ lifeTime?: number;
1189
+ schema?: SchemaResponse;
1190
+ };
1191
+ type Dcql = {
1192
+ credentials: Array<CredentialQuery>;
1193
+ credential_sets?: Array<CredentialSetQuery>;
1194
+ };
1195
+ type RegistrationCertificateRequest = {
1196
+ /**
1197
+ * The body of the registration certificate request containing the necessary details.
1198
+ */
1199
+ jwt: string;
1200
+ };
1201
+ type PresentationAttachment = {
1202
+ format: string;
1203
+ data: {
1204
+ [key: string]: unknown;
1205
+ };
1206
+ credential_ids?: Array<string>;
1207
+ };
1208
+ type PresentationConfig = {
1209
+ /**
1210
+ * Unique identifier for the VP request.
1211
+ */
1212
+ id: string;
1213
+ /**
1214
+ * The tenant that owns this object.
1215
+ */
1216
+ tenant: TenantEntity;
1217
+ /**
1218
+ * Description of the presentation configuration.
1219
+ */
1220
+ description?: string;
1221
+ /**
1222
+ * Lifetime how long the presentation request is valid after creation, in seconds.
1223
+ */
1224
+ lifeTime?: number;
1225
+ /**
1226
+ * The DCQL query to be used for the VP request.
1227
+ */
1228
+ dcql_query: Dcql;
1229
+ transaction_data?: Array<TransactionData>;
1230
+ /**
1231
+ * The registration certificate request containing the necessary details.
1232
+ */
1233
+ registrationCert?: RegistrationCertificateRequest;
1234
+ /**
1235
+ * Optional webhook URL to receive the response.
1236
+ */
1237
+ webhook?: WebhookConfig;
1238
+ /**
1239
+ * The timestamp when the VP request was created.
1240
+ */
1241
+ createdAt: string;
1242
+ /**
1243
+ * The timestamp when the VP request was last updated.
1244
+ */
1245
+ updatedAt: string;
1246
+ /**
1247
+ * Attestation that should be attached
1248
+ */
1249
+ attached?: Array<PresentationAttachment>;
1250
+ /**
1251
+ * Redirect URI to which the user-agent should be redirected after the presentation is completed.
1252
+ * You can use the `{sessionId}` placeholder in the URI, which will be replaced with the actual session ID.
1253
+ */
1254
+ redirectUri?: string;
1255
+ /**
1256
+ * Optional ID of the access certificate to use for signing the presentation request.
1257
+ * If not provided, the default access certificate for the tenant will be used.
1258
+ *
1259
+ * Note: This is intentionally NOT a TypeORM relationship because CertEntity uses
1260
+ * a composite primary key (id + tenantId), and SQLite cannot create foreign keys
1261
+ * that reference only part of a composite primary key. The relationship is handled
1262
+ * at the application level in the service layer.
1263
+ */
1264
+ accessCertId?: string;
1265
+ };
1266
+ type PresentationConfigCreateDto = {
1267
+ /**
1268
+ * Unique identifier for the VP request.
1269
+ */
1270
+ id: string;
1271
+ /**
1272
+ * Description of the presentation configuration.
1273
+ */
1274
+ description?: string;
1275
+ /**
1276
+ * Lifetime how long the presentation request is valid after creation, in seconds.
1277
+ */
1278
+ lifeTime?: number;
1279
+ /**
1280
+ * The DCQL query to be used for the VP request.
1281
+ */
1282
+ dcql_query: Dcql;
1283
+ transaction_data?: Array<TransactionData>;
1284
+ /**
1285
+ * The registration certificate request containing the necessary details.
1286
+ */
1287
+ registrationCert?: RegistrationCertificateRequest;
1288
+ /**
1289
+ * Optional webhook URL to receive the response.
1290
+ */
1291
+ webhook?: WebhookConfig;
1292
+ /**
1293
+ * Attestation that should be attached
1294
+ */
1295
+ attached?: Array<PresentationAttachment>;
1296
+ /**
1297
+ * Redirect URI to which the user-agent should be redirected after the presentation is completed.
1298
+ * You can use the `{sessionId}` placeholder in the URI, which will be replaced with the actual session ID.
1299
+ */
1300
+ redirectUri?: string;
1301
+ /**
1302
+ * Optional ID of the access certificate to use for signing the presentation request.
1303
+ * If not provided, the default access certificate for the tenant will be used.
1304
+ *
1305
+ * Note: This is intentionally NOT a TypeORM relationship because CertEntity uses
1306
+ * a composite primary key (id + tenantId), and SQLite cannot create foreign keys
1307
+ * that reference only part of a composite primary key. The relationship is handled
1308
+ * at the application level in the service layer.
1309
+ */
1310
+ accessCertId?: string;
1311
+ };
1312
+ type PresentationConfigUpdateDto = {
1313
+ /**
1314
+ * Unique identifier for the VP request.
1315
+ */
1316
+ id?: string;
1317
+ /**
1318
+ * Description of the presentation configuration.
1319
+ */
1320
+ description?: string;
1321
+ /**
1322
+ * Lifetime how long the presentation request is valid after creation, in seconds.
1323
+ */
1324
+ lifeTime?: number;
1325
+ /**
1326
+ * The DCQL query to be used for the VP request.
1327
+ */
1328
+ dcql_query?: Dcql;
1329
+ transaction_data?: Array<TransactionData>;
1330
+ /**
1331
+ * The registration certificate request containing the necessary details.
1332
+ */
1333
+ registrationCert?: RegistrationCertificateRequest;
1334
+ /**
1335
+ * Optional webhook URL to receive the response.
1336
+ */
1337
+ webhook?: WebhookConfig;
1338
+ /**
1339
+ * Attestation that should be attached
1340
+ */
1341
+ attached?: Array<PresentationAttachment>;
1342
+ /**
1343
+ * Redirect URI to which the user-agent should be redirected after the presentation is completed.
1344
+ * You can use the `{sessionId}` placeholder in the URI, which will be replaced with the actual session ID.
1345
+ */
1346
+ redirectUri?: string;
1347
+ /**
1348
+ * Optional ID of the access certificate to use for signing the presentation request.
1349
+ * If not provided, the default access certificate for the tenant will be used.
1350
+ *
1351
+ * Note: This is intentionally NOT a TypeORM relationship because CertEntity uses
1352
+ * a composite primary key (id + tenantId), and SQLite cannot create foreign keys
1353
+ * that reference only part of a composite primary key. The relationship is handled
1354
+ * at the application level in the service layer.
1355
+ */
1356
+ accessCertId?: string;
1357
+ };
1358
+ type DeferredCredentialRequestDto = {
1359
+ /**
1360
+ * The transaction identifier previously returned by the Credential Endpoint
1361
+ */
1362
+ transaction_id: string;
1363
+ };
1364
+ type NotificationRequestDto = {
1365
+ notification_id: string;
1366
+ event: {
1367
+ [key: string]: unknown;
1368
+ };
1369
+ };
1370
+ type ParResponseDto = {
1371
+ /**
1372
+ * The request URI for the Pushed Authorization Request.
1373
+ */
1374
+ request_uri: string;
1375
+ /**
1376
+ * The expiration time for the request URI in seconds.
1377
+ */
1378
+ expires_in: number;
1379
+ };
1380
+ type InteractiveAuthorizationRequestDto = {
1381
+ /**
1382
+ * Response type (for initial request)
1383
+ */
1384
+ response_type?: string;
1385
+ /**
1386
+ * Client identifier (for initial request)
1387
+ */
1388
+ client_id?: string;
1389
+ /**
1390
+ * Comma-separated list of supported interaction types (for initial request)
1391
+ */
1392
+ interaction_types_supported?: string;
1393
+ /**
1394
+ * Redirect URI (for initial request)
1395
+ */
1396
+ redirect_uri?: string;
1397
+ /**
1398
+ * OAuth scope
1399
+ */
1400
+ scope?: string;
1401
+ /**
1402
+ * PKCE code challenge
1403
+ */
1404
+ code_challenge?: string;
1405
+ /**
1406
+ * PKCE code challenge method
1407
+ */
1408
+ code_challenge_method?: string;
1409
+ /**
1410
+ * Authorization details
1411
+ */
1412
+ authorization_details?: {
1413
+ [key: string]: unknown;
1414
+ };
1415
+ /**
1416
+ * State parameter
1417
+ */
1418
+ state?: string;
1419
+ /**
1420
+ * Issuer state from credential offer
1421
+ */
1422
+ issuer_state?: string;
1423
+ /**
1424
+ * Auth session identifier (for follow-up request)
1425
+ */
1426
+ auth_session?: string;
1427
+ /**
1428
+ * OpenID4VP response (for follow-up request)
1429
+ */
1430
+ openid4vp_response?: string;
1431
+ /**
1432
+ * PKCE code verifier (for follow-up request)
1433
+ */
1434
+ code_verifier?: string;
1435
+ /**
1436
+ * JAR request JWT (by value)
1437
+ */
1438
+ request?: string;
1439
+ /**
1440
+ * JAR request URI (by reference)
1441
+ */
1442
+ request_uri?: string;
1443
+ };
1444
+ type InteractiveAuthorizationCodeResponseDto = {
1445
+ /**
1446
+ * Response status
1447
+ */
1448
+ status: string;
1449
+ /**
1450
+ * Authorization code
1451
+ */
1452
+ code: string;
1453
+ };
1454
+ type InteractiveAuthorizationErrorResponseDto = {
1455
+ /**
1456
+ * OAuth error code
1457
+ */
1458
+ error: string;
1459
+ /**
1460
+ * Human-readable error description
1461
+ */
1462
+ error_description?: string;
1463
+ };
1464
+ type ChainedAsParRequestDto = {
1465
+ /**
1466
+ * OAuth response type (must be 'code')
1467
+ */
1468
+ response_type: string;
1469
+ /**
1470
+ * Client identifier (wallet identifier)
1471
+ */
1472
+ client_id: string;
1473
+ /**
1474
+ * URI to redirect the wallet after authorization
1475
+ */
1476
+ redirect_uri: string;
1477
+ /**
1478
+ * PKCE code challenge
1479
+ */
1480
+ code_challenge?: string;
1481
+ /**
1482
+ * PKCE code challenge method (e.g., S256)
1483
+ */
1484
+ code_challenge_method?: string;
1485
+ /**
1486
+ * State parameter (returned in redirect)
1487
+ */
1488
+ state?: string;
1489
+ /**
1490
+ * Scope requested
1491
+ */
1492
+ scope?: string;
1493
+ /**
1494
+ * Issuer state from credential offer
1495
+ */
1496
+ issuer_state?: string;
1497
+ /**
1498
+ * Authorization details (JSON array)
1499
+ */
1500
+ authorization_details?: Array<{
1501
+ [key: string]: unknown;
1502
+ }>;
1503
+ };
1504
+ type ChainedAsParResponseDto = {
1505
+ /**
1506
+ * The request URI to use at the authorization endpoint
1507
+ */
1508
+ request_uri: string;
1509
+ /**
1510
+ * The lifetime of the request URI in seconds
1511
+ */
1512
+ expires_in: number;
1513
+ };
1514
+ type ChainedAsErrorResponseDto = {
1515
+ /**
1516
+ * Error code
1517
+ */
1518
+ error: string;
1519
+ /**
1520
+ * Human-readable error description
1521
+ */
1522
+ error_description?: string;
1523
+ };
1524
+ type ChainedAsTokenRequestDto = {
1525
+ /**
1526
+ * Grant type (must be 'authorization_code')
1527
+ */
1528
+ grant_type: string;
1529
+ /**
1530
+ * Authorization code received in the callback
1531
+ */
1532
+ code: string;
1533
+ /**
1534
+ * Client identifier
1535
+ */
1536
+ client_id?: string;
1537
+ /**
1538
+ * Redirect URI (must match the one used in PAR)
1539
+ */
1540
+ redirect_uri?: string;
1541
+ /**
1542
+ * PKCE code verifier
1543
+ */
1544
+ code_verifier?: string;
1545
+ };
1546
+ type ChainedAsTokenResponseDto = {
1547
+ /**
1548
+ * The access token
1549
+ */
1550
+ access_token: string;
1551
+ /**
1552
+ * Token type (Bearer or DPoP)
1553
+ */
1554
+ token_type: string;
1555
+ /**
1556
+ * Token lifetime in seconds
1557
+ */
1558
+ expires_in: number;
1559
+ /**
1560
+ * Scope granted
1561
+ */
1562
+ scope?: string;
1563
+ /**
1564
+ * Authorized credential configurations
1565
+ */
1566
+ authorization_details?: Array<{
1567
+ [key: string]: unknown;
1568
+ }>;
1569
+ /**
1570
+ * C_NONCE for credential request
1571
+ */
1572
+ c_nonce?: string;
1573
+ /**
1574
+ * C_NONCE lifetime in seconds
1575
+ */
1576
+ c_nonce_expires_in?: number;
1577
+ };
1578
+ type OfferResponse = {
1579
+ uri: string;
1580
+ /**
1581
+ * URI for cross-device flows (no redirect after completion)
1582
+ */
1583
+ crossDeviceUri?: string;
1584
+ session: string;
1585
+ };
1586
+ type CompleteDeferredDto = {
1587
+ [key: string]: unknown;
1588
+ };
1589
+ type DeferredOperationResponse = {
1590
+ [key: string]: unknown;
1591
+ };
1592
+ type FailDeferredDto = {
1593
+ [key: string]: unknown;
1594
+ };
1595
+ type EcPublic = {
1596
+ /**
1597
+ * The key type, which is always 'EC' for Elliptic Curve keys.
1598
+ */
1599
+ kty: string;
1600
+ /**
1601
+ * The algorithm intended for use with the key, such as 'ES256'.
1602
+ */
1603
+ crv: string;
1604
+ /**
1605
+ * The x coordinate of the EC public key.
1606
+ */
1607
+ x: string;
1608
+ /**
1609
+ * The y coordinate of the EC public key.
1610
+ */
1611
+ y: string;
1612
+ };
1613
+ type JwksResponseDto = {
1614
+ /**
1615
+ * An array of EC public keys in JWK format.
1616
+ */
1617
+ keys: Array<EcPublic>;
1618
+ };
1619
+ type AuthorizationResponse = {
1620
+ /**
1621
+ * The response string containing the authorization details.
1622
+ */
1623
+ response: string;
1624
+ /**
1625
+ * When set to true, the authorization response will be sent to the client.
1626
+ */
1627
+ sendResponse?: boolean;
1628
+ };
1629
+ type RegistrarConfigEntity = {
1630
+ /**
1631
+ * The base URL of the registrar API
1632
+ */
1633
+ registrarUrl: string;
1634
+ /**
1635
+ * The OIDC issuer URL for authentication (e.g., Keycloak realm URL)
1636
+ */
1637
+ oidcUrl: string;
1638
+ /**
1639
+ * The OIDC client ID for the registrar
1640
+ */
1641
+ clientId: string;
1642
+ /**
1643
+ * The OIDC client secret (optional, for confidential clients)
1644
+ */
1645
+ clientSecret?: string;
1646
+ /**
1647
+ * The username for OIDC login
1648
+ */
1649
+ username: string;
1650
+ /**
1651
+ * The password for OIDC login (stored in plaintext)
1652
+ */
1653
+ password: string;
1654
+ /**
1655
+ * The tenant ID this configuration belongs to.
1656
+ */
1657
+ tenantId: string;
1658
+ /**
1659
+ * The tenant that owns this configuration.
1660
+ */
1661
+ tenant: TenantEntity;
1662
+ };
1663
+ type CreateRegistrarConfigDto = {
1664
+ /**
1665
+ * The base URL of the registrar API
1666
+ */
1667
+ registrarUrl: string;
1668
+ /**
1669
+ * The OIDC issuer URL for authentication (e.g., Keycloak realm URL)
1670
+ */
1671
+ oidcUrl: string;
1672
+ /**
1673
+ * The OIDC client ID for the registrar
1674
+ */
1675
+ clientId: string;
1676
+ /**
1677
+ * The OIDC client secret (optional, for confidential clients)
1678
+ */
1679
+ clientSecret?: string;
1680
+ /**
1681
+ * The username for OIDC login
1682
+ */
1683
+ username: string;
1684
+ /**
1685
+ * The password for OIDC login (stored in plaintext)
1686
+ */
1687
+ password: string;
1688
+ };
1689
+ type UpdateRegistrarConfigDto = {
1690
+ /**
1691
+ * The base URL of the registrar API
1692
+ */
1693
+ registrarUrl?: string;
1694
+ /**
1695
+ * The OIDC issuer URL for authentication (e.g., Keycloak realm URL)
1696
+ */
1697
+ oidcUrl?: string;
1698
+ /**
1699
+ * The OIDC client ID for the registrar
1700
+ */
1701
+ clientId?: string;
1702
+ /**
1703
+ * The OIDC client secret (optional, for confidential clients)
1704
+ */
1705
+ clientSecret?: string;
1706
+ /**
1707
+ * The username for OIDC login
1708
+ */
1709
+ username?: string;
1710
+ /**
1711
+ * The password for OIDC login (stored in plaintext)
1712
+ */
1713
+ password?: string;
1714
+ };
1715
+ type CreateAccessCertificateDto = {
1716
+ /**
1717
+ * The ID of the key to create an access certificate for
1718
+ */
1719
+ keyId: string;
1720
+ };
1721
+ type TrustListCreateDto = {
1722
+ id?: string;
1723
+ certId?: string;
1724
+ entities: Array<{
1725
+ [key: string]: unknown;
1726
+ }>;
1727
+ description?: string;
1728
+ /**
1729
+ * The full trust list JSON (generated LoTE structure)
1730
+ */
1731
+ data?: {
1732
+ [key: string]: unknown;
1733
+ };
1734
+ };
1735
+ type TrustList = {
1736
+ /**
1737
+ * Unique identifier for the trust list
1738
+ */
1739
+ id: string;
1740
+ description?: string;
1741
+ /**
1742
+ * The tenant ID for which the VP request is made.
1743
+ */
1744
+ tenantId: string;
1745
+ /**
1746
+ * The tenant that owns this object.
1747
+ */
1748
+ tenant: TenantEntity;
1749
+ certId: string;
1750
+ cert: CertEntity;
1751
+ /**
1752
+ * The full trust list JSON (generated LoTE structure)
1753
+ */
1754
+ data?: {
1755
+ [key: string]: unknown;
1756
+ };
1757
+ /**
1758
+ * The original entity configuration used to create this trust list.
1759
+ * Stored for round-tripping when editing.
1760
+ */
1761
+ entityConfig?: Array<{
1762
+ [key: string]: unknown;
1763
+ }>;
1764
+ /**
1765
+ * The sequence number for versioning (incremented on updates)
1766
+ */
1767
+ sequenceNumber: number;
1768
+ /**
1769
+ * The signed JWT representation of this trust list
1770
+ */
1771
+ jwt: string;
1772
+ createdAt: string;
1773
+ updatedAt: string;
1774
+ };
1775
+ type TrustListVersion = {
1776
+ id: string;
1777
+ trustListId: string;
1778
+ trustList: TrustList;
1779
+ tenantId: string;
1780
+ /**
1781
+ * The sequence number at the time this version was created
1782
+ */
1783
+ sequenceNumber: number;
1784
+ /**
1785
+ * The full trust list JSON at this version
1786
+ */
1787
+ data: {
1788
+ [key: string]: unknown;
1789
+ };
1790
+ /**
1791
+ * The entity configuration at this version
1792
+ */
1793
+ entityConfig?: {
1794
+ [key: string]: unknown;
1795
+ };
1796
+ /**
1797
+ * The signed JWT at this version
1798
+ */
1799
+ jwt: string;
1800
+ createdAt: string;
1801
+ };
1802
+ type PresentationRequest = {
1803
+ /**
1804
+ * The type of response expected from the presentation request.
1805
+ */
1806
+ response_type: "uri" | "dc-api";
1807
+ /**
1808
+ * Identifier of the presentation configuration
1809
+ */
1810
+ requestId: string;
1811
+ /**
1812
+ * Webhook configuration to receive the response.
1813
+ * If not provided, the configured webhook from the configuration will be used.
1814
+ */
1815
+ webhook?: WebhookConfig;
1816
+ /**
1817
+ * Optional redirect URI to which the user-agent should be redirected after the presentation is completed.
1818
+ * You can use the `{sessionId}` placeholder in the URI, which will be replaced with the actual session ID.
1819
+ */
1820
+ redirectUri?: string;
1821
+ /**
1822
+ * Optional transaction data to include in the OID4VP request.
1823
+ * If provided, this will override the transaction_data from the presentation configuration.
1824
+ */
1825
+ transaction_data?: Array<TransactionData>;
1826
+ };
1827
+ type FileUploadDto = {
1828
+ file: Blob | File;
1829
+ };
1830
+ type AppControllerMainData = {
1831
+ body?: never;
1832
+ path?: never;
1833
+ query?: never;
1834
+ url: "/";
1835
+ };
1836
+ type AppControllerMainResponses = {
1837
+ 200: unknown;
1838
+ };
1839
+ type HealthControllerCheckData = {
1840
+ body?: never;
1841
+ path?: never;
1842
+ query?: never;
1843
+ url: "/health";
1844
+ };
1845
+ type HealthControllerCheckErrors = {
1846
+ /**
1847
+ * The Health Check is not successful
1848
+ */
1849
+ 503: {
1850
+ status?: string;
1851
+ info?: {
1852
+ [key: string]: {
1853
+ status: string;
1854
+ [key: string]: unknown | string;
1855
+ };
1856
+ };
1857
+ error?: {
1858
+ [key: string]: {
1859
+ status: string;
1860
+ [key: string]: unknown | string;
1861
+ };
1862
+ };
1863
+ details?: {
1864
+ [key: string]: {
1865
+ status: string;
1866
+ [key: string]: unknown | string;
1867
+ };
1868
+ };
1869
+ };
1870
+ };
1871
+ type HealthControllerCheckError = HealthControllerCheckErrors[keyof HealthControllerCheckErrors];
1872
+ type HealthControllerCheckResponses = {
1873
+ /**
1874
+ * The Health Check is successful
1875
+ */
1876
+ 200: {
1877
+ status?: string;
1878
+ info?: {
1879
+ [key: string]: {
1880
+ status: string;
1881
+ [key: string]: unknown | string;
1882
+ };
1883
+ };
1884
+ error?: {
1885
+ [key: string]: {
1886
+ status: string;
1887
+ [key: string]: unknown | string;
1888
+ };
1889
+ };
1890
+ details?: {
1891
+ [key: string]: {
1892
+ status: string;
1893
+ [key: string]: unknown | string;
1894
+ };
1895
+ };
1896
+ };
1897
+ };
1898
+ type HealthControllerCheckResponse = HealthControllerCheckResponses[keyof HealthControllerCheckResponses];
1899
+ type AuthControllerGetOAuth2TokenData = {
1900
+ body: ClientCredentialsDto;
1901
+ path?: never;
1902
+ query?: never;
1903
+ url: "/oauth2/token";
1904
+ };
1905
+ type AuthControllerGetOAuth2TokenErrors = {
1906
+ /**
1907
+ * Invalid client credentials
1908
+ */
1909
+ 401: unknown;
1910
+ };
1911
+ type AuthControllerGetOAuth2TokenResponses = {
1912
+ /**
1913
+ * OAuth2 token response
1914
+ */
1915
+ 200: TokenResponse;
1916
+ 201: TokenResponse;
1917
+ };
1918
+ type AuthControllerGetOAuth2TokenResponse = AuthControllerGetOAuth2TokenResponses[keyof AuthControllerGetOAuth2TokenResponses];
1919
+ type AuthControllerGetOidcDiscoveryData = {
1920
+ body?: never;
1921
+ path?: never;
1922
+ query?: never;
1923
+ url: "/.well-known/oauth-authorization-server";
1924
+ };
1925
+ type AuthControllerGetOidcDiscoveryResponses = {
1926
+ /**
1927
+ * OIDC Discovery Configuration
1928
+ */
1929
+ 200: unknown;
1930
+ };
1931
+ type AuthControllerGetGlobalJwksData = {
1932
+ body?: never;
1933
+ path?: never;
1934
+ query?: never;
1935
+ url: "/.well-known/jwks.json";
1936
+ };
1937
+ type AuthControllerGetGlobalJwksResponses = {
1938
+ /**
1939
+ * JSON Web Key Set
1940
+ */
1941
+ 200: unknown;
1942
+ };
1943
+ type TenantControllerGetTenantsData = {
1944
+ body?: never;
1945
+ path?: never;
1946
+ query?: never;
1947
+ url: "/tenant";
1948
+ };
1949
+ type TenantControllerGetTenantsResponses = {
1950
+ 200: Array<TenantEntity>;
1951
+ };
1952
+ type TenantControllerGetTenantsResponse = TenantControllerGetTenantsResponses[keyof TenantControllerGetTenantsResponses];
1953
+ type TenantControllerInitTenantData = {
1954
+ body: CreateTenantDto;
1955
+ path?: never;
1956
+ query?: never;
1957
+ url: "/tenant";
1958
+ };
1959
+ type TenantControllerInitTenantResponses = {
1960
+ 201: {
1961
+ [key: string]: unknown;
1962
+ };
1963
+ };
1964
+ type TenantControllerInitTenantResponse = TenantControllerInitTenantResponses[keyof TenantControllerInitTenantResponses];
1965
+ type TenantControllerDeleteTenantData = {
1966
+ body?: never;
1967
+ path: {
1968
+ id: string;
1969
+ };
1970
+ query?: never;
1971
+ url: "/tenant/{id}";
1972
+ };
1973
+ type TenantControllerDeleteTenantResponses = {
1974
+ 200: unknown;
1975
+ };
1976
+ type TenantControllerGetTenantData = {
1977
+ body?: never;
1978
+ path: {
1979
+ id: string;
1980
+ };
1981
+ query?: never;
1982
+ url: "/tenant/{id}";
1983
+ };
1984
+ type TenantControllerGetTenantResponses = {
1985
+ 200: TenantEntity;
1986
+ };
1987
+ type TenantControllerGetTenantResponse = TenantControllerGetTenantResponses[keyof TenantControllerGetTenantResponses];
1988
+ type TenantControllerUpdateTenantData = {
1989
+ body: UpdateTenantDto;
1990
+ path: {
1991
+ id: string;
1992
+ };
1993
+ query?: never;
1994
+ url: "/tenant/{id}";
1995
+ };
1996
+ type TenantControllerUpdateTenantResponses = {
1997
+ 200: TenantEntity;
1998
+ };
1999
+ type TenantControllerUpdateTenantResponse = TenantControllerUpdateTenantResponses[keyof TenantControllerUpdateTenantResponses];
2000
+ type ClientControllerGetClientsData = {
2001
+ body?: never;
2002
+ path?: never;
2003
+ query?: never;
2004
+ url: "/client";
2005
+ };
2006
+ type ClientControllerGetClientsResponses = {
2007
+ 200: Array<ClientEntity>;
2008
+ };
2009
+ type ClientControllerGetClientsResponse = ClientControllerGetClientsResponses[keyof ClientControllerGetClientsResponses];
2010
+ type ClientControllerCreateClientData = {
2011
+ body: CreateClientDto;
2012
+ path?: never;
2013
+ query?: never;
2014
+ url: "/client";
2015
+ };
2016
+ type ClientControllerCreateClientResponses = {
2017
+ 201: ClientEntity;
2018
+ };
2019
+ type ClientControllerCreateClientResponse = ClientControllerCreateClientResponses[keyof ClientControllerCreateClientResponses];
2020
+ type ClientControllerDeleteClientData = {
2021
+ body?: never;
2022
+ path: {
2023
+ id: string;
2024
+ };
2025
+ query?: never;
2026
+ url: "/client/{id}";
2027
+ };
2028
+ type ClientControllerDeleteClientResponses = {
2029
+ 200: unknown;
2030
+ };
2031
+ type ClientControllerGetClientData = {
2032
+ body?: never;
2033
+ path: {
2034
+ id: string;
2035
+ };
2036
+ query?: never;
2037
+ url: "/client/{id}";
2038
+ };
2039
+ type ClientControllerGetClientResponses = {
2040
+ 200: ClientEntity;
2041
+ };
2042
+ type ClientControllerGetClientResponse = ClientControllerGetClientResponses[keyof ClientControllerGetClientResponses];
2043
+ type ClientControllerUpdateClientData = {
2044
+ body: UpdateClientDto;
2045
+ path: {
2046
+ id: string;
2047
+ };
2048
+ query?: never;
2049
+ url: "/client/{id}";
2050
+ };
2051
+ type ClientControllerUpdateClientResponses = {
2052
+ 200: {
2053
+ [key: string]: unknown;
2054
+ };
2055
+ };
2056
+ type ClientControllerUpdateClientResponse = ClientControllerUpdateClientResponses[keyof ClientControllerUpdateClientResponses];
2057
+ type ClientControllerGetClientSecretData = {
2058
+ body?: never;
2059
+ path: {
2060
+ id: string;
2061
+ };
2062
+ query?: never;
2063
+ url: "/client/{id}/secret";
2064
+ };
2065
+ type ClientControllerGetClientSecretResponses = {
2066
+ 200: ClientSecretResponseDto;
2067
+ };
2068
+ type ClientControllerGetClientSecretResponse = ClientControllerGetClientSecretResponses[keyof ClientControllerGetClientSecretResponses];
2069
+ type ClientControllerRotateClientSecretData = {
2070
+ body?: never;
2071
+ path: {
2072
+ id: string;
2073
+ };
2074
+ query?: never;
2075
+ url: "/client/{id}/rotate-secret";
2076
+ };
2077
+ type ClientControllerRotateClientSecretResponses = {
2078
+ 201: ClientSecretResponseDto;
2079
+ };
2080
+ type ClientControllerRotateClientSecretResponse = ClientControllerRotateClientSecretResponses[keyof ClientControllerRotateClientSecretResponses];
2081
+ type KeyControllerGetKeysData = {
2082
+ body?: never;
2083
+ path?: never;
2084
+ query?: never;
2085
+ url: "/key";
2086
+ };
2087
+ type KeyControllerGetKeysResponses = {
2088
+ 200: Array<KeyEntity>;
2089
+ };
2090
+ type KeyControllerGetKeysResponse = KeyControllerGetKeysResponses[keyof KeyControllerGetKeysResponses];
2091
+ type KeyControllerAddKeyData = {
2092
+ body: KeyImportDto;
2093
+ path?: never;
2094
+ query?: never;
2095
+ url: "/key";
2096
+ };
2097
+ type KeyControllerAddKeyResponses = {
2098
+ 201: unknown;
2099
+ };
2100
+ type KeyControllerDeleteKeyData = {
2101
+ body?: never;
2102
+ path: {
2103
+ id: string;
2104
+ };
2105
+ query?: never;
2106
+ url: "/key/{id}";
2107
+ };
2108
+ type KeyControllerDeleteKeyResponses = {
2109
+ 200: unknown;
2110
+ };
2111
+ type KeyControllerGetKeyData = {
2112
+ body?: never;
2113
+ path: {
2114
+ id: string;
2115
+ };
2116
+ query?: never;
2117
+ url: "/key/{id}";
2118
+ };
2119
+ type KeyControllerGetKeyResponses = {
2120
+ 200: KeyEntity;
2121
+ };
2122
+ type KeyControllerGetKeyResponse = KeyControllerGetKeyResponses[keyof KeyControllerGetKeyResponses];
2123
+ type KeyControllerUpdateKeyData = {
2124
+ body: UpdateKeyDto;
2125
+ path: {
2126
+ id: string;
2127
+ };
2128
+ query?: never;
2129
+ url: "/key/{id}";
2130
+ };
2131
+ type KeyControllerUpdateKeyResponses = {
2132
+ 200: unknown;
2133
+ };
2134
+ type CertControllerGetCertificatesData = {
2135
+ body?: never;
2136
+ path?: never;
2137
+ query?: {
2138
+ keyId?: string;
2139
+ };
2140
+ url: "/certs";
2141
+ };
2142
+ type CertControllerGetCertificatesResponses = {
2143
+ 200: Array<CertEntity>;
2144
+ };
2145
+ type CertControllerGetCertificatesResponse = CertControllerGetCertificatesResponses[keyof CertControllerGetCertificatesResponses];
2146
+ type CertControllerAddCertificateData = {
2147
+ body: CertImportDto;
2148
+ path?: never;
2149
+ query?: never;
2150
+ url: "/certs";
2151
+ };
2152
+ type CertControllerAddCertificateResponses = {
2153
+ 201: CertResponseDto;
2154
+ };
2155
+ type CertControllerAddCertificateResponse = CertControllerAddCertificateResponses[keyof CertControllerAddCertificateResponses];
2156
+ type CertControllerDeleteCertificateData = {
2157
+ body?: never;
2158
+ path: {
2159
+ certId: string;
2160
+ };
2161
+ query?: never;
2162
+ url: "/certs/{certId}";
2163
+ };
2164
+ type CertControllerDeleteCertificateResponses = {
2165
+ 200: unknown;
2166
+ };
2167
+ type CertControllerGetCertificateData = {
2168
+ body?: never;
2169
+ path: {
2170
+ certId: string;
2171
+ };
2172
+ query?: never;
2173
+ url: "/certs/{certId}";
2174
+ };
2175
+ type CertControllerGetCertificateResponses = {
2176
+ 200: CertEntity;
2177
+ };
2178
+ type CertControllerGetCertificateResponse = CertControllerGetCertificateResponses[keyof CertControllerGetCertificateResponses];
2179
+ type CertControllerUpdateCertificateData = {
2180
+ body: CertUpdateDto;
2181
+ path: {
2182
+ certId: string;
2183
+ };
2184
+ query?: never;
2185
+ url: "/certs/{certId}";
2186
+ };
2187
+ type CertControllerUpdateCertificateResponses = {
2188
+ 200: unknown;
2189
+ };
2190
+ type CertControllerExportConfigData = {
2191
+ body?: never;
2192
+ path: {
2193
+ certId: string;
2194
+ };
2195
+ query?: never;
2196
+ url: "/certs/{certId}/config";
2197
+ };
2198
+ type CertControllerExportConfigResponses = {
2199
+ 200: CertImportDto;
2200
+ };
2201
+ type CertControllerExportConfigResponse = CertControllerExportConfigResponses[keyof CertControllerExportConfigResponses];
2202
+ type StatusListControllerGetListData = {
2203
+ body?: never;
2204
+ path: {
2205
+ tenantId: string;
2206
+ listId: string;
2207
+ };
2208
+ query?: never;
2209
+ url: "/{tenantId}/status-management/status-list/{listId}";
2210
+ };
2211
+ type StatusListControllerGetListResponses = {
2212
+ 200: string;
2213
+ };
2214
+ type StatusListControllerGetListResponse = StatusListControllerGetListResponses[keyof StatusListControllerGetListResponses];
2215
+ type StatusListControllerGetStatusListAggregationData = {
2216
+ body?: never;
2217
+ path: {
2218
+ tenantId: string;
2219
+ };
2220
+ query?: never;
2221
+ url: "/{tenantId}/status-management/status-list-aggregation";
2222
+ };
2223
+ type StatusListControllerGetStatusListAggregationResponses = {
2224
+ /**
2225
+ * List of status list URIs
2226
+ */
2227
+ 200: StatusListAggregationDto;
2228
+ };
2229
+ type StatusListControllerGetStatusListAggregationResponse = StatusListControllerGetStatusListAggregationResponses[keyof StatusListControllerGetStatusListAggregationResponses];
2230
+ type StatusListConfigControllerResetConfigData = {
2231
+ body?: never;
2232
+ path?: never;
2233
+ query?: never;
2234
+ url: "/status-list-config";
2235
+ };
2236
+ type StatusListConfigControllerResetConfigResponses = {
2237
+ /**
2238
+ * Configuration reset successfully
2239
+ */
2240
+ 204: void;
2241
+ };
2242
+ type StatusListConfigControllerResetConfigResponse = StatusListConfigControllerResetConfigResponses[keyof StatusListConfigControllerResetConfigResponses];
2243
+ type StatusListConfigControllerGetConfigData = {
2244
+ body?: never;
2245
+ path?: never;
2246
+ query?: never;
2247
+ url: "/status-list-config";
2248
+ };
2249
+ type StatusListConfigControllerGetConfigResponses = {
2250
+ /**
2251
+ * The status list configuration
2252
+ */
2253
+ 200: StatusListConfig;
2254
+ };
2255
+ type StatusListConfigControllerGetConfigResponse = StatusListConfigControllerGetConfigResponses[keyof StatusListConfigControllerGetConfigResponses];
2256
+ type StatusListConfigControllerUpdateConfigData = {
2257
+ body: UpdateStatusListConfigDto;
2258
+ path?: never;
2259
+ query?: never;
2260
+ url: "/status-list-config";
2261
+ };
2262
+ type StatusListConfigControllerUpdateConfigResponses = {
2263
+ /**
2264
+ * The updated status list configuration
2265
+ */
2266
+ 200: StatusListConfig;
2267
+ };
2268
+ type StatusListConfigControllerUpdateConfigResponse = StatusListConfigControllerUpdateConfigResponses[keyof StatusListConfigControllerUpdateConfigResponses];
2269
+ type StatusListManagementControllerGetListsData = {
2270
+ body?: never;
2271
+ path?: never;
2272
+ query?: never;
2273
+ url: "/status-lists";
2274
+ };
2275
+ type StatusListManagementControllerGetListsResponses = {
2276
+ /**
2277
+ * List of status lists
2278
+ */
2279
+ 200: Array<StatusListResponseDto>;
2280
+ };
2281
+ type StatusListManagementControllerGetListsResponse = StatusListManagementControllerGetListsResponses[keyof StatusListManagementControllerGetListsResponses];
2282
+ type StatusListManagementControllerCreateListData = {
2283
+ body: CreateStatusListDto;
2284
+ path?: never;
2285
+ query?: never;
2286
+ url: "/status-lists";
2287
+ };
2288
+ type StatusListManagementControllerCreateListResponses = {
2289
+ /**
2290
+ * The created status list
2291
+ */
2292
+ 201: StatusListResponseDto;
2293
+ };
2294
+ type StatusListManagementControllerCreateListResponse = StatusListManagementControllerCreateListResponses[keyof StatusListManagementControllerCreateListResponses];
2295
+ type StatusListManagementControllerDeleteListData = {
2296
+ body?: never;
2297
+ path: {
2298
+ /**
2299
+ * The status list ID
2300
+ */
2301
+ listId: string;
2302
+ };
2303
+ query?: never;
2304
+ url: "/status-lists/{listId}";
2305
+ };
2306
+ type StatusListManagementControllerDeleteListResponses = {
2307
+ /**
2308
+ * Status list deleted successfully
2309
+ */
2310
+ 204: void;
2311
+ };
2312
+ type StatusListManagementControllerDeleteListResponse = StatusListManagementControllerDeleteListResponses[keyof StatusListManagementControllerDeleteListResponses];
2313
+ type StatusListManagementControllerGetListData = {
2314
+ body?: never;
2315
+ path: {
2316
+ /**
2317
+ * The status list ID
2318
+ */
2319
+ listId: string;
2320
+ };
2321
+ query?: never;
2322
+ url: "/status-lists/{listId}";
2323
+ };
2324
+ type StatusListManagementControllerGetListResponses = {
2325
+ /**
2326
+ * The status list
2327
+ */
2328
+ 200: StatusListResponseDto;
2329
+ };
2330
+ type StatusListManagementControllerGetListResponse = StatusListManagementControllerGetListResponses[keyof StatusListManagementControllerGetListResponses];
2331
+ type StatusListManagementControllerUpdateListData = {
2332
+ body: UpdateStatusListDto;
2333
+ path: {
2334
+ /**
2335
+ * The status list ID
2336
+ */
2337
+ listId: string;
2338
+ };
2339
+ query?: never;
2340
+ url: "/status-lists/{listId}";
2341
+ };
2342
+ type StatusListManagementControllerUpdateListResponses = {
2343
+ /**
2344
+ * The updated status list
2345
+ */
2346
+ 200: StatusListResponseDto;
2347
+ };
2348
+ type StatusListManagementControllerUpdateListResponse = StatusListManagementControllerUpdateListResponses[keyof StatusListManagementControllerUpdateListResponses];
2349
+ type SessionControllerGetAllSessionsData = {
2350
+ body?: never;
2351
+ path?: never;
2352
+ query?: never;
2353
+ url: "/session";
2354
+ };
2355
+ type SessionControllerGetAllSessionsResponses = {
2356
+ 200: Array<Session>;
2357
+ };
2358
+ type SessionControllerGetAllSessionsResponse = SessionControllerGetAllSessionsResponses[keyof SessionControllerGetAllSessionsResponses];
2359
+ type SessionControllerDeleteSessionData = {
2360
+ body?: never;
2361
+ path: {
2362
+ id: string;
2363
+ };
2364
+ query?: never;
2365
+ url: "/session/{id}";
2366
+ };
2367
+ type SessionControllerDeleteSessionResponses = {
2368
+ 200: unknown;
2369
+ };
2370
+ type SessionControllerGetSessionData = {
2371
+ body?: never;
2372
+ path: {
2373
+ /**
2374
+ * The session ID
2375
+ */
2376
+ id: string;
2377
+ };
2378
+ query?: never;
2379
+ url: "/session/{id}";
2380
+ };
2381
+ type SessionControllerGetSessionResponses = {
2382
+ 200: Session;
2383
+ };
2384
+ type SessionControllerGetSessionResponse = SessionControllerGetSessionResponses[keyof SessionControllerGetSessionResponses];
2385
+ type SessionControllerRevokeAllData = {
2386
+ body: StatusUpdateDto;
2387
+ path?: never;
2388
+ query?: never;
2389
+ url: "/session/revoke";
2390
+ };
2391
+ type SessionControllerRevokeAllResponses = {
2392
+ 201: unknown;
2393
+ };
2394
+ type SessionConfigControllerResetConfigData = {
2395
+ body?: never;
2396
+ path?: never;
2397
+ query?: never;
2398
+ url: "/session-config";
2399
+ };
2400
+ type SessionConfigControllerResetConfigResponses = {
2401
+ /**
2402
+ * Configuration reset successfully
2403
+ */
2404
+ 200: unknown;
2405
+ };
2406
+ type SessionConfigControllerGetConfigData = {
2407
+ body?: never;
2408
+ path?: never;
2409
+ query?: never;
2410
+ url: "/session-config";
2411
+ };
2412
+ type SessionConfigControllerGetConfigResponses = {
2413
+ /**
2414
+ * The session storage configuration
2415
+ */
2416
+ 200: SessionStorageConfig;
2417
+ };
2418
+ type SessionConfigControllerGetConfigResponse = SessionConfigControllerGetConfigResponses[keyof SessionConfigControllerGetConfigResponses];
2419
+ type SessionConfigControllerUpdateConfigData = {
2420
+ body: UpdateSessionConfigDto;
2421
+ path?: never;
2422
+ query?: never;
2423
+ url: "/session-config";
2424
+ };
2425
+ type SessionConfigControllerUpdateConfigResponses = {
2426
+ /**
2427
+ * The updated session storage configuration
2428
+ */
2429
+ 200: SessionStorageConfig;
2430
+ };
2431
+ type SessionConfigControllerUpdateConfigResponse = SessionConfigControllerUpdateConfigResponses[keyof SessionConfigControllerUpdateConfigResponses];
2432
+ type SessionEventsControllerSubscribeToSessionEventsData = {
2433
+ body?: never;
2434
+ path: {
2435
+ /**
2436
+ * Session ID to subscribe to
2437
+ */
2438
+ id: string;
2439
+ };
2440
+ query: {
2441
+ /**
2442
+ * JWT access token for authentication
2443
+ */
2444
+ token: string;
2445
+ };
2446
+ url: "/session/{id}/events";
2447
+ };
2448
+ type SessionEventsControllerSubscribeToSessionEventsResponses = {
2449
+ 200: unknown;
2450
+ };
2451
+ type IssuanceConfigControllerGetIssuanceConfigurationsData = {
2452
+ body?: never;
2453
+ path?: never;
2454
+ query?: never;
2455
+ url: "/issuer/config";
2456
+ };
2457
+ type IssuanceConfigControllerGetIssuanceConfigurationsResponses = {
2458
+ 200: IssuanceConfig;
2459
+ };
2460
+ type IssuanceConfigControllerGetIssuanceConfigurationsResponse = IssuanceConfigControllerGetIssuanceConfigurationsResponses[keyof IssuanceConfigControllerGetIssuanceConfigurationsResponses];
2461
+ type IssuanceConfigControllerStoreIssuanceConfigurationData = {
2462
+ body: IssuanceDto;
2463
+ path?: never;
2464
+ query?: never;
2465
+ url: "/issuer/config";
2466
+ };
2467
+ type IssuanceConfigControllerStoreIssuanceConfigurationResponses = {
2468
+ 201: {
2469
+ [key: string]: unknown;
2470
+ };
2471
+ };
2472
+ type IssuanceConfigControllerStoreIssuanceConfigurationResponse = IssuanceConfigControllerStoreIssuanceConfigurationResponses[keyof IssuanceConfigControllerStoreIssuanceConfigurationResponses];
2473
+ type CredentialConfigControllerGetConfigsData = {
2474
+ body?: never;
2475
+ path?: never;
2476
+ query?: never;
2477
+ url: "/issuer/credentials";
2478
+ };
2479
+ type CredentialConfigControllerGetConfigsResponses = {
2480
+ 200: Array<CredentialConfig>;
2481
+ };
2482
+ type CredentialConfigControllerGetConfigsResponse = CredentialConfigControllerGetConfigsResponses[keyof CredentialConfigControllerGetConfigsResponses];
2483
+ type CredentialConfigControllerStoreCredentialConfigurationData = {
2484
+ body: CredentialConfigCreate;
2485
+ path?: never;
2486
+ query?: never;
2487
+ url: "/issuer/credentials";
2488
+ };
2489
+ type CredentialConfigControllerStoreCredentialConfigurationResponses = {
2490
+ 201: {
2491
+ [key: string]: unknown;
2492
+ };
2493
+ };
2494
+ type CredentialConfigControllerStoreCredentialConfigurationResponse = CredentialConfigControllerStoreCredentialConfigurationResponses[keyof CredentialConfigControllerStoreCredentialConfigurationResponses];
2495
+ type CredentialConfigControllerDeleteIssuanceConfigurationData = {
2496
+ body?: never;
2497
+ path: {
2498
+ id: string;
2499
+ };
2500
+ query?: never;
2501
+ url: "/issuer/credentials/{id}";
2502
+ };
2503
+ type CredentialConfigControllerDeleteIssuanceConfigurationResponses = {
2504
+ 200: unknown;
2505
+ };
2506
+ type CredentialConfigControllerGetConfigByIdData = {
2507
+ body?: never;
2508
+ path: {
2509
+ id: string;
2510
+ };
2511
+ query?: never;
2512
+ url: "/issuer/credentials/{id}";
2513
+ };
2514
+ type CredentialConfigControllerGetConfigByIdResponses = {
2515
+ 200: CredentialConfig;
2516
+ };
2517
+ type CredentialConfigControllerGetConfigByIdResponse = CredentialConfigControllerGetConfigByIdResponses[keyof CredentialConfigControllerGetConfigByIdResponses];
2518
+ type CredentialConfigControllerUpdateCredentialConfigurationData = {
2519
+ body: CredentialConfigUpdate;
2520
+ path: {
2521
+ id: string;
2522
+ };
2523
+ query?: never;
2524
+ url: "/issuer/credentials/{id}";
2525
+ };
2526
+ type CredentialConfigControllerUpdateCredentialConfigurationResponses = {
2527
+ 200: {
2528
+ [key: string]: unknown;
2529
+ };
2530
+ };
2531
+ type CredentialConfigControllerUpdateCredentialConfigurationResponse = CredentialConfigControllerUpdateCredentialConfigurationResponses[keyof CredentialConfigControllerUpdateCredentialConfigurationResponses];
2532
+ type PresentationManagementControllerConfigurationData = {
2533
+ body?: never;
2534
+ path?: never;
2535
+ query?: never;
2536
+ url: "/verifier/config";
2537
+ };
2538
+ type PresentationManagementControllerConfigurationResponses = {
2539
+ 200: Array<PresentationConfig>;
2540
+ };
2541
+ type PresentationManagementControllerConfigurationResponse = PresentationManagementControllerConfigurationResponses[keyof PresentationManagementControllerConfigurationResponses];
2542
+ type PresentationManagementControllerStorePresentationConfigData = {
2543
+ body: PresentationConfigCreateDto;
2544
+ path?: never;
2545
+ query?: never;
2546
+ url: "/verifier/config";
2547
+ };
2548
+ type PresentationManagementControllerStorePresentationConfigResponses = {
2549
+ 201: {
2550
+ [key: string]: unknown;
2551
+ };
2552
+ };
2553
+ type PresentationManagementControllerStorePresentationConfigResponse = PresentationManagementControllerStorePresentationConfigResponses[keyof PresentationManagementControllerStorePresentationConfigResponses];
2554
+ type PresentationManagementControllerDeleteConfigurationData = {
2555
+ body?: never;
2556
+ path: {
2557
+ id: string;
2558
+ };
2559
+ query?: never;
2560
+ url: "/verifier/config/{id}";
2561
+ };
2562
+ type PresentationManagementControllerDeleteConfigurationResponses = {
2563
+ 200: unknown;
2564
+ };
2565
+ type PresentationManagementControllerGetConfigurationData = {
2566
+ body?: never;
2567
+ path: {
2568
+ id: string;
2569
+ };
2570
+ query?: never;
2571
+ url: "/verifier/config/{id}";
2572
+ };
2573
+ type PresentationManagementControllerGetConfigurationResponses = {
2574
+ 200: PresentationConfig;
2575
+ };
2576
+ type PresentationManagementControllerGetConfigurationResponse = PresentationManagementControllerGetConfigurationResponses[keyof PresentationManagementControllerGetConfigurationResponses];
2577
+ type PresentationManagementControllerUpdateConfigurationData = {
2578
+ body: PresentationConfigUpdateDto;
2579
+ path: {
2580
+ id: string;
2581
+ };
2582
+ query?: never;
2583
+ url: "/verifier/config/{id}";
2584
+ };
2585
+ type PresentationManagementControllerUpdateConfigurationResponses = {
2586
+ 200: {
2587
+ [key: string]: unknown;
2588
+ };
2589
+ };
2590
+ type PresentationManagementControllerUpdateConfigurationResponse = PresentationManagementControllerUpdateConfigurationResponses[keyof PresentationManagementControllerUpdateConfigurationResponses];
2591
+ type CacheControllerGetStatsData = {
2592
+ body?: never;
2593
+ path?: never;
2594
+ query?: never;
2595
+ url: "/cache/stats";
2596
+ };
2597
+ type CacheControllerGetStatsResponses = {
2598
+ /**
2599
+ * Cache statistics
2600
+ */
2601
+ 200: unknown;
2602
+ };
2603
+ type CacheControllerClearAllCachesData = {
2604
+ body?: never;
2605
+ path?: never;
2606
+ query?: never;
2607
+ url: "/cache";
2608
+ };
2609
+ type CacheControllerClearAllCachesResponses = {
2610
+ /**
2611
+ * All caches cleared successfully
2612
+ */
2613
+ 204: void;
2614
+ };
2615
+ type CacheControllerClearAllCachesResponse = CacheControllerClearAllCachesResponses[keyof CacheControllerClearAllCachesResponses];
2616
+ type CacheControllerClearTrustListCacheData = {
2617
+ body?: never;
2618
+ path?: never;
2619
+ query?: never;
2620
+ url: "/cache/trust-list";
2621
+ };
2622
+ type CacheControllerClearTrustListCacheResponses = {
2623
+ /**
2624
+ * Trust list cache cleared successfully
2625
+ */
2626
+ 204: void;
2627
+ };
2628
+ type CacheControllerClearTrustListCacheResponse = CacheControllerClearTrustListCacheResponses[keyof CacheControllerClearTrustListCacheResponses];
2629
+ type CacheControllerClearStatusListCacheData = {
2630
+ body?: never;
2631
+ path?: never;
2632
+ query?: never;
2633
+ url: "/cache/status-list";
2634
+ };
2635
+ type CacheControllerClearStatusListCacheResponses = {
2636
+ /**
2637
+ * Status list cache cleared successfully
2638
+ */
2639
+ 204: void;
2640
+ };
2641
+ type CacheControllerClearStatusListCacheResponse = CacheControllerClearStatusListCacheResponses[keyof CacheControllerClearStatusListCacheResponses];
2642
+ type Oid4VciControllerCredentialData = {
2643
+ body?: never;
2644
+ path: {
2645
+ tenantId: string;
2646
+ };
2647
+ query?: never;
2648
+ url: "/{tenantId}/vci/credential";
2649
+ };
2650
+ type Oid4VciControllerCredentialResponses = {
2651
+ 200: {
2652
+ [key: string]: unknown;
2653
+ };
2654
+ };
2655
+ type Oid4VciControllerCredentialResponse = Oid4VciControllerCredentialResponses[keyof Oid4VciControllerCredentialResponses];
2656
+ type Oid4VciControllerDeferredCredentialData = {
2657
+ body: DeferredCredentialRequestDto;
2658
+ path: {
2659
+ tenantId: string;
2660
+ };
2661
+ query?: never;
2662
+ url: "/{tenantId}/vci/deferred_credential";
2663
+ };
2664
+ type Oid4VciControllerDeferredCredentialResponses = {
2665
+ 200: unknown;
2666
+ };
2667
+ type Oid4VciControllerNotificationsData = {
2668
+ body: NotificationRequestDto;
2669
+ path: {
2670
+ tenantId: string;
2671
+ };
2672
+ query?: never;
2673
+ url: "/{tenantId}/vci/notification";
2674
+ };
2675
+ type Oid4VciControllerNotificationsResponses = {
2676
+ 201: unknown;
2677
+ };
2678
+ type Oid4VciControllerNonceData = {
2679
+ body?: never;
2680
+ path: {
2681
+ tenantId: string;
2682
+ };
2683
+ query?: never;
2684
+ url: "/{tenantId}/vci/nonce";
2685
+ };
2686
+ type Oid4VciControllerNonceResponses = {
2687
+ 200: unknown;
2688
+ };
2689
+ type AuthorizeControllerAuthorizeData = {
2690
+ body?: never;
2691
+ path: {
2692
+ tenantId: string;
2693
+ };
2694
+ query?: {
2695
+ issuer_state?: string;
2696
+ response_type?: string;
2697
+ client_id?: string;
2698
+ redirect_uri?: string;
2699
+ resource?: string;
2700
+ scope?: string;
2701
+ code_challenge?: string;
2702
+ code_challenge_method?: string;
2703
+ dpop_jkt?: string;
2704
+ request_uri?: string;
2705
+ auth_session?: string;
2706
+ state?: string;
2707
+ };
2708
+ url: "/{tenantId}/authorize";
2709
+ };
2710
+ type AuthorizeControllerAuthorizeResponses = {
2711
+ 200: unknown;
2712
+ };
2713
+ type AuthorizeControllerParData = {
2714
+ /**
2715
+ * Pushed Authorization Request
2716
+ */
2717
+ body: AuthorizeQueries;
2718
+ path?: never;
2719
+ query?: never;
2720
+ url: "/{tenantId}/authorize/par";
2721
+ };
2722
+ type AuthorizeControllerParResponses = {
2723
+ 201: ParResponseDto;
2724
+ };
2725
+ type AuthorizeControllerParResponse = AuthorizeControllerParResponses[keyof AuthorizeControllerParResponses];
2726
+ type AuthorizeControllerTokenData = {
2727
+ body?: never;
2728
+ path: {
2729
+ tenantId: string;
2730
+ };
2731
+ query?: never;
2732
+ url: "/{tenantId}/authorize/token";
2733
+ };
2734
+ type AuthorizeControllerTokenResponses = {
2735
+ 201: {
2736
+ [key: string]: unknown;
2737
+ };
2738
+ };
2739
+ type AuthorizeControllerTokenResponse = AuthorizeControllerTokenResponses[keyof AuthorizeControllerTokenResponses];
2740
+ type InteractiveAuthorizationControllerInteractiveAuthorizationData = {
2741
+ /**
2742
+ * Interactive authorization request
2743
+ */
2744
+ body: InteractiveAuthorizationRequestDto;
2745
+ headers: {
2746
+ origin: string;
2747
+ };
2748
+ path: {
2749
+ tenantId: string;
2750
+ };
2751
+ query?: never;
2752
+ url: "/{tenantId}/authorize/interactive";
2753
+ };
2754
+ type InteractiveAuthorizationControllerInteractiveAuthorizationErrors = {
2755
+ /**
2756
+ * Error response
2757
+ */
2758
+ 400: InteractiveAuthorizationErrorResponseDto;
2759
+ };
2760
+ type InteractiveAuthorizationControllerInteractiveAuthorizationError = InteractiveAuthorizationControllerInteractiveAuthorizationErrors[keyof InteractiveAuthorizationControllerInteractiveAuthorizationErrors];
2761
+ type InteractiveAuthorizationControllerInteractiveAuthorizationResponses = {
2762
+ /**
2763
+ * Authorization code response (successful completion)
2764
+ */
2765
+ 200: InteractiveAuthorizationCodeResponseDto;
2766
+ };
2767
+ type InteractiveAuthorizationControllerInteractiveAuthorizationResponse = InteractiveAuthorizationControllerInteractiveAuthorizationResponses[keyof InteractiveAuthorizationControllerInteractiveAuthorizationResponses];
2768
+ type InteractiveAuthorizationControllerCompleteWebAuthData = {
2769
+ body?: never;
2770
+ path: {
2771
+ authSession: string;
2772
+ tenantId: string;
2773
+ };
2774
+ query?: never;
2775
+ url: "/{tenantId}/authorize/interactive/complete-web-auth/{authSession}";
2776
+ };
2777
+ type InteractiveAuthorizationControllerCompleteWebAuthErrors = {
2778
+ /**
2779
+ * Auth session not found
2780
+ */
2781
+ 404: unknown;
2782
+ };
2783
+ type InteractiveAuthorizationControllerCompleteWebAuthResponses = {
2784
+ /**
2785
+ * Web authorization marked as completed
2786
+ */
2787
+ 200: unknown;
2788
+ };
2789
+ type ChainedAsControllerParData = {
2790
+ body: ChainedAsParRequestDto;
2791
+ headers?: {
2792
+ /**
2793
+ * DPoP proof JWT
2794
+ */
2795
+ DPoP?: string;
2796
+ };
2797
+ path: {
2798
+ /**
2799
+ * Tenant identifier
2800
+ */
2801
+ tenant: string;
2802
+ };
2803
+ query?: never;
2804
+ url: "/{tenant}/chained-as/par";
2805
+ };
2806
+ type ChainedAsControllerParErrors = {
2807
+ /**
2808
+ * Invalid request
2809
+ */
2810
+ 400: ChainedAsErrorResponseDto;
2811
+ };
2812
+ type ChainedAsControllerParError = ChainedAsControllerParErrors[keyof ChainedAsControllerParErrors];
2813
+ type ChainedAsControllerParResponses = {
2814
+ /**
2815
+ * PAR request accepted
2816
+ */
2817
+ 201: ChainedAsParResponseDto;
2818
+ };
2819
+ type ChainedAsControllerParResponse = ChainedAsControllerParResponses[keyof ChainedAsControllerParResponses];
2820
+ type ChainedAsControllerAuthorizeData = {
2821
+ body?: never;
2822
+ path: {
2823
+ /**
2824
+ * Tenant identifier
2825
+ */
2826
+ tenant: string;
2827
+ };
2828
+ query: {
2829
+ /**
2830
+ * Client identifier
2831
+ */
2832
+ client_id: string;
2833
+ /**
2834
+ * Request URI from PAR response
2835
+ */
2836
+ request_uri: string;
2837
+ };
2838
+ url: "/{tenant}/chained-as/authorize";
2839
+ };
2840
+ type ChainedAsControllerAuthorizeErrors = {
2841
+ /**
2842
+ * Invalid request
2843
+ */
2844
+ 400: ChainedAsErrorResponseDto;
2845
+ };
2846
+ type ChainedAsControllerAuthorizeError = ChainedAsControllerAuthorizeErrors[keyof ChainedAsControllerAuthorizeErrors];
2847
+ type ChainedAsControllerAuthorizeResponses = {
2848
+ 200: unknown;
2849
+ };
2850
+ type ChainedAsControllerCallbackData = {
2851
+ body?: never;
2852
+ path: {
2853
+ /**
2854
+ * Tenant identifier
2855
+ */
2856
+ tenant: string;
2857
+ };
2858
+ query: {
2859
+ code: string;
2860
+ state: string;
2861
+ error: string;
2862
+ error_description: string;
2863
+ };
2864
+ url: "/{tenant}/chained-as/callback";
2865
+ };
2866
+ type ChainedAsControllerCallbackErrors = {
2867
+ /**
2868
+ * Invalid callback
2869
+ */
2870
+ 400: ChainedAsErrorResponseDto;
2871
+ };
2872
+ type ChainedAsControllerCallbackError = ChainedAsControllerCallbackErrors[keyof ChainedAsControllerCallbackErrors];
2873
+ type ChainedAsControllerCallbackResponses = {
2874
+ 200: unknown;
2875
+ };
2876
+ type ChainedAsControllerTokenData = {
2877
+ body: ChainedAsTokenRequestDto;
2878
+ headers?: {
2879
+ /**
2880
+ * DPoP proof JWT
2881
+ */
2882
+ DPoP?: string;
2883
+ };
2884
+ path: {
2885
+ /**
2886
+ * Tenant identifier
2887
+ */
2888
+ tenant: string;
2889
+ };
2890
+ query?: never;
2891
+ url: "/{tenant}/chained-as/token";
2892
+ };
2893
+ type ChainedAsControllerTokenErrors = {
2894
+ /**
2895
+ * Invalid request
2896
+ */
2897
+ 400: ChainedAsErrorResponseDto;
2898
+ /**
2899
+ * Invalid authorization code
2900
+ */
2901
+ 401: ChainedAsErrorResponseDto;
2902
+ };
2903
+ type ChainedAsControllerTokenError = ChainedAsControllerTokenErrors[keyof ChainedAsControllerTokenErrors];
2904
+ type ChainedAsControllerTokenResponses = {
2905
+ /**
2906
+ * Token issued successfully
2907
+ */
2908
+ 200: ChainedAsTokenResponseDto;
2909
+ };
2910
+ type ChainedAsControllerTokenResponse = ChainedAsControllerTokenResponses[keyof ChainedAsControllerTokenResponses];
2911
+ type ChainedAsControllerJwksData = {
2912
+ body?: never;
2913
+ path: {
2914
+ /**
2915
+ * Tenant identifier
2916
+ */
2917
+ tenant: string;
2918
+ };
2919
+ query?: never;
2920
+ url: "/{tenant}/chained-as/.well-known/jwks.json";
2921
+ };
2922
+ type ChainedAsControllerJwksResponses = {
2923
+ /**
2924
+ * JWKS document
2925
+ */
2926
+ 200: unknown;
2927
+ };
2928
+ type ChainedAsControllerGetMetadataData = {
2929
+ body?: never;
2930
+ path: {
2931
+ /**
2932
+ * Tenant identifier
2933
+ */
2934
+ tenant: string;
2935
+ };
2936
+ query?: never;
2937
+ url: "/{tenant}/chained-as/.well-known/oauth-authorization-server";
2938
+ };
2939
+ type ChainedAsControllerGetMetadataResponses = {
2940
+ /**
2941
+ * OAuth AS metadata
2942
+ */
2943
+ 200: unknown;
2944
+ };
2945
+ type CredentialOfferControllerGetOfferData = {
2946
+ body: OfferRequestDto;
2947
+ path?: never;
2948
+ query?: never;
2949
+ url: "/issuer/offer";
2950
+ };
2951
+ type CredentialOfferControllerGetOfferResponses = {
2952
+ /**
2953
+ * JSON response
2954
+ */
2955
+ 201: OfferResponse;
2956
+ };
2957
+ type CredentialOfferControllerGetOfferResponse = CredentialOfferControllerGetOfferResponses[keyof CredentialOfferControllerGetOfferResponses];
2958
+ type DeferredControllerCompleteDeferredData = {
2959
+ body: CompleteDeferredDto;
2960
+ path: {
2961
+ transactionId: string;
2962
+ };
2963
+ query?: never;
2964
+ url: "/issuer/deferred/{transactionId}/complete";
2965
+ };
2966
+ type DeferredControllerCompleteDeferredErrors = {
2967
+ /**
2968
+ * Transaction not found
2969
+ */
2970
+ 404: unknown;
2971
+ };
2972
+ type DeferredControllerCompleteDeferredResponses = {
2973
+ /**
2974
+ * Transaction completed successfully
2975
+ */
2976
+ 200: DeferredOperationResponse;
2977
+ };
2978
+ type DeferredControllerCompleteDeferredResponse = DeferredControllerCompleteDeferredResponses[keyof DeferredControllerCompleteDeferredResponses];
2979
+ type DeferredControllerFailDeferredData = {
2980
+ body?: FailDeferredDto;
2981
+ path: {
2982
+ transactionId: string;
2983
+ };
2984
+ query?: never;
2985
+ url: "/issuer/deferred/{transactionId}/fail";
2986
+ };
2987
+ type DeferredControllerFailDeferredErrors = {
2988
+ /**
2989
+ * Transaction not found
2990
+ */
2991
+ 404: unknown;
2992
+ };
2993
+ type DeferredControllerFailDeferredResponses = {
2994
+ /**
2995
+ * Transaction marked as failed
2996
+ */
2997
+ 200: DeferredOperationResponse;
2998
+ };
2999
+ type DeferredControllerFailDeferredResponse = DeferredControllerFailDeferredResponses[keyof DeferredControllerFailDeferredResponses];
3000
+ type Oid4VciMetadataControllerVctData = {
3001
+ body?: never;
3002
+ path: {
3003
+ id: string;
3004
+ tenantId: string;
3005
+ };
3006
+ query?: never;
3007
+ url: "/{tenantId}/credentials-metadata/vct/{id}";
3008
+ };
3009
+ type Oid4VciMetadataControllerVctResponses = {
3010
+ 200: Vct;
3011
+ };
3012
+ type Oid4VciMetadataControllerVctResponse = Oid4VciMetadataControllerVctResponses[keyof Oid4VciMetadataControllerVctResponses];
3013
+ type WellKnownControllerIssuerMetadata0Data = {
3014
+ body?: never;
3015
+ path: {
3016
+ tenantId: string;
3017
+ };
3018
+ query?: never;
3019
+ url: "/.well-known/openid-credential-issuer/{tenantId}";
3020
+ };
3021
+ type WellKnownControllerIssuerMetadata0Responses = {
3022
+ 200: {
3023
+ [key: string]: unknown;
3024
+ };
3025
+ };
3026
+ type WellKnownControllerIssuerMetadata0Response = WellKnownControllerIssuerMetadata0Responses[keyof WellKnownControllerIssuerMetadata0Responses];
3027
+ type WellKnownControllerIssuerMetadata1Data = {
3028
+ body?: never;
3029
+ path: {
3030
+ tenantId: string;
3031
+ };
3032
+ query?: never;
3033
+ url: "/{tenantId}/.well-known/openid-credential-issuer";
3034
+ };
3035
+ type WellKnownControllerIssuerMetadata1Responses = {
3036
+ 200: {
3037
+ [key: string]: unknown;
3038
+ };
3039
+ };
3040
+ type WellKnownControllerIssuerMetadata1Response = WellKnownControllerIssuerMetadata1Responses[keyof WellKnownControllerIssuerMetadata1Responses];
3041
+ type WellKnownControllerAuthzMetadata0Data = {
3042
+ body?: never;
3043
+ path: {
3044
+ tenantId: string;
3045
+ };
3046
+ query?: never;
3047
+ url: "/.well-known/oauth-authorization-server/{tenantId}";
3048
+ };
3049
+ type WellKnownControllerAuthzMetadata0Responses = {
3050
+ 200: unknown;
3051
+ };
3052
+ type WellKnownControllerAuthzMetadata1Data = {
3053
+ body?: never;
3054
+ path: {
3055
+ tenantId: string;
3056
+ };
3057
+ query?: never;
3058
+ url: "/{tenantId}/.well-known/oauth-authorization-server";
3059
+ };
3060
+ type WellKnownControllerAuthzMetadata1Responses = {
3061
+ 200: unknown;
3062
+ };
3063
+ type WellKnownControllerGetJwks0Data = {
3064
+ body?: never;
3065
+ path: {
3066
+ tenantId: string;
3067
+ };
3068
+ query?: never;
3069
+ url: "/.well-known/jwks.json/{tenantId}";
3070
+ };
3071
+ type WellKnownControllerGetJwks0Responses = {
3072
+ 200: JwksResponseDto;
3073
+ };
3074
+ type WellKnownControllerGetJwks0Response = WellKnownControllerGetJwks0Responses[keyof WellKnownControllerGetJwks0Responses];
3075
+ type WellKnownControllerGetJwks1Data = {
3076
+ body?: never;
3077
+ path: {
3078
+ tenantId: string;
3079
+ };
3080
+ query?: never;
3081
+ url: "/{tenantId}/.well-known/jwks.json";
3082
+ };
3083
+ type WellKnownControllerGetJwks1Responses = {
3084
+ 200: JwksResponseDto;
3085
+ };
3086
+ type WellKnownControllerGetJwks1Response = WellKnownControllerGetJwks1Responses[keyof WellKnownControllerGetJwks1Responses];
3087
+ type Oid4VpControllerGetRequestWithSessionData = {
3088
+ body?: never;
3089
+ path: {
3090
+ session: string;
3091
+ };
3092
+ query?: never;
3093
+ url: "/{session}/oid4vp/request";
3094
+ };
3095
+ type Oid4VpControllerGetRequestWithSessionResponses = {
3096
+ 200: string;
3097
+ };
3098
+ type Oid4VpControllerGetRequestWithSessionResponse = Oid4VpControllerGetRequestWithSessionResponses[keyof Oid4VpControllerGetRequestWithSessionResponses];
3099
+ type Oid4VpControllerGetPostRequestWithSessionData = {
3100
+ body?: never;
3101
+ path: {
3102
+ session: string;
3103
+ };
3104
+ query?: never;
3105
+ url: "/{session}/oid4vp/request";
3106
+ };
3107
+ type Oid4VpControllerGetPostRequestWithSessionResponses = {
3108
+ 201: string;
3109
+ };
3110
+ type Oid4VpControllerGetPostRequestWithSessionResponse = Oid4VpControllerGetPostRequestWithSessionResponses[keyof Oid4VpControllerGetPostRequestWithSessionResponses];
3111
+ type Oid4VpControllerGetRequestNoRedirectWithSessionData = {
3112
+ body?: never;
3113
+ path: {
3114
+ session: string;
3115
+ };
3116
+ query?: never;
3117
+ url: "/{session}/oid4vp/request/no-redirect";
3118
+ };
3119
+ type Oid4VpControllerGetRequestNoRedirectWithSessionResponses = {
3120
+ 200: string;
3121
+ };
3122
+ type Oid4VpControllerGetRequestNoRedirectWithSessionResponse = Oid4VpControllerGetRequestNoRedirectWithSessionResponses[keyof Oid4VpControllerGetRequestNoRedirectWithSessionResponses];
3123
+ type Oid4VpControllerGetResponseData = {
3124
+ body: AuthorizationResponse;
3125
+ path: {
3126
+ session: string;
3127
+ };
3128
+ query?: never;
3129
+ url: "/{session}/oid4vp";
3130
+ };
3131
+ type Oid4VpControllerGetResponseResponses = {
3132
+ 200: {
3133
+ [key: string]: unknown;
3134
+ };
3135
+ };
3136
+ type Oid4VpControllerGetResponseResponse = Oid4VpControllerGetResponseResponses[keyof Oid4VpControllerGetResponseResponses];
3137
+ type RegistrarControllerDeleteConfigData = {
3138
+ body?: never;
3139
+ path?: never;
3140
+ query?: never;
3141
+ url: "/registrar/config";
3142
+ };
3143
+ type RegistrarControllerDeleteConfigResponses = {
3144
+ /**
3145
+ * Configuration deleted successfully
3146
+ */
3147
+ 204: void;
3148
+ };
3149
+ type RegistrarControllerDeleteConfigResponse = RegistrarControllerDeleteConfigResponses[keyof RegistrarControllerDeleteConfigResponses];
3150
+ type RegistrarControllerGetConfigData = {
3151
+ body?: never;
3152
+ path?: never;
3153
+ query?: never;
3154
+ url: "/registrar/config";
3155
+ };
3156
+ type RegistrarControllerGetConfigErrors = {
3157
+ /**
3158
+ * No registrar configuration found
3159
+ */
3160
+ 404: unknown;
3161
+ };
3162
+ type RegistrarControllerGetConfigResponses = {
3163
+ /**
3164
+ * The registrar configuration
3165
+ */
3166
+ 200: RegistrarConfigEntity;
3167
+ };
3168
+ type RegistrarControllerGetConfigResponse = RegistrarControllerGetConfigResponses[keyof RegistrarControllerGetConfigResponses];
3169
+ type RegistrarControllerUpdateConfigData = {
3170
+ body: UpdateRegistrarConfigDto;
3171
+ path?: never;
3172
+ query?: never;
3173
+ url: "/registrar/config";
3174
+ };
3175
+ type RegistrarControllerUpdateConfigErrors = {
3176
+ /**
3177
+ * Invalid credentials
3178
+ */
3179
+ 400: unknown;
3180
+ /**
3181
+ * No registrar configuration found
3182
+ */
3183
+ 404: unknown;
3184
+ };
3185
+ type RegistrarControllerUpdateConfigResponses = {
3186
+ /**
3187
+ * Configuration updated successfully
3188
+ */
3189
+ 200: RegistrarConfigEntity;
3190
+ };
3191
+ type RegistrarControllerUpdateConfigResponse = RegistrarControllerUpdateConfigResponses[keyof RegistrarControllerUpdateConfigResponses];
3192
+ type RegistrarControllerCreateConfigData = {
3193
+ body: CreateRegistrarConfigDto;
3194
+ path?: never;
3195
+ query?: never;
3196
+ url: "/registrar/config";
3197
+ };
3198
+ type RegistrarControllerCreateConfigErrors = {
3199
+ /**
3200
+ * Invalid credentials
3201
+ */
3202
+ 400: unknown;
3203
+ };
3204
+ type RegistrarControllerCreateConfigResponses = {
3205
+ /**
3206
+ * Configuration created successfully
3207
+ */
3208
+ 201: RegistrarConfigEntity;
3209
+ };
3210
+ type RegistrarControllerCreateConfigResponse = RegistrarControllerCreateConfigResponses[keyof RegistrarControllerCreateConfigResponses];
3211
+ type RegistrarControllerCreateAccessCertificateData = {
3212
+ body: CreateAccessCertificateDto;
3213
+ path?: never;
3214
+ query?: never;
3215
+ url: "/registrar/access-certificate";
3216
+ };
3217
+ type RegistrarControllerCreateAccessCertificateErrors = {
3218
+ /**
3219
+ * No relying party found at registrar or failed to create certificate
3220
+ */
3221
+ 400: unknown;
3222
+ /**
3223
+ * No registrar configuration found or key not found
3224
+ */
3225
+ 404: unknown;
3226
+ };
3227
+ type RegistrarControllerCreateAccessCertificateResponses = {
3228
+ /**
3229
+ * Access certificate created successfully
3230
+ */
3231
+ 201: {
3232
+ /**
3233
+ * The certificate ID at the registrar
3234
+ */
3235
+ id?: string;
3236
+ /**
3237
+ * The certificate in PEM format
3238
+ */
3239
+ crt?: string;
3240
+ };
3241
+ };
3242
+ type RegistrarControllerCreateAccessCertificateResponse = RegistrarControllerCreateAccessCertificateResponses[keyof RegistrarControllerCreateAccessCertificateResponses];
3243
+ type TrustListControllerGetAllTrustListsData = {
3244
+ body?: never;
3245
+ path?: never;
3246
+ query?: never;
3247
+ url: "/trust-list";
3248
+ };
3249
+ type TrustListControllerGetAllTrustListsResponses = {
3250
+ 200: Array<TrustList>;
3251
+ };
3252
+ type TrustListControllerGetAllTrustListsResponse = TrustListControllerGetAllTrustListsResponses[keyof TrustListControllerGetAllTrustListsResponses];
3253
+ type TrustListControllerCreateTrustListData = {
3254
+ body: TrustListCreateDto;
3255
+ path?: never;
3256
+ query?: never;
3257
+ url: "/trust-list";
3258
+ };
3259
+ type TrustListControllerCreateTrustListResponses = {
3260
+ 201: TrustList;
3261
+ };
3262
+ type TrustListControllerCreateTrustListResponse = TrustListControllerCreateTrustListResponses[keyof TrustListControllerCreateTrustListResponses];
3263
+ type TrustListControllerDeleteTrustListData = {
3264
+ body?: never;
3265
+ path: {
3266
+ id: string;
3267
+ };
3268
+ query?: never;
3269
+ url: "/trust-list/{id}";
3270
+ };
3271
+ type TrustListControllerDeleteTrustListResponses = {
3272
+ 200: unknown;
3273
+ };
3274
+ type TrustListControllerGetTrustListData = {
3275
+ body?: never;
3276
+ path: {
3277
+ id: string;
3278
+ };
3279
+ query?: never;
3280
+ url: "/trust-list/{id}";
3281
+ };
3282
+ type TrustListControllerGetTrustListResponses = {
3283
+ 200: TrustList;
3284
+ };
3285
+ type TrustListControllerGetTrustListResponse = TrustListControllerGetTrustListResponses[keyof TrustListControllerGetTrustListResponses];
3286
+ type TrustListControllerUpdateTrustListData = {
3287
+ body: TrustListCreateDto;
3288
+ path: {
3289
+ id: string;
3290
+ };
3291
+ query?: never;
3292
+ url: "/trust-list/{id}";
3293
+ };
3294
+ type TrustListControllerUpdateTrustListResponses = {
3295
+ 200: TrustList;
3296
+ };
3297
+ type TrustListControllerUpdateTrustListResponse = TrustListControllerUpdateTrustListResponses[keyof TrustListControllerUpdateTrustListResponses];
3298
+ type TrustListControllerExportTrustListData = {
3299
+ body?: never;
3300
+ path: {
3301
+ id: string;
3302
+ };
3303
+ query?: never;
3304
+ url: "/trust-list/{id}/export";
3305
+ };
3306
+ type TrustListControllerExportTrustListResponses = {
3307
+ 200: TrustListCreateDto;
3308
+ };
3309
+ type TrustListControllerExportTrustListResponse = TrustListControllerExportTrustListResponses[keyof TrustListControllerExportTrustListResponses];
3310
+ type TrustListControllerGetTrustListVersionsData = {
3311
+ body?: never;
3312
+ path: {
3313
+ id: string;
3314
+ };
3315
+ query?: never;
3316
+ url: "/trust-list/{id}/versions";
3317
+ };
3318
+ type TrustListControllerGetTrustListVersionsResponses = {
3319
+ 200: Array<TrustListVersion>;
3320
+ };
3321
+ type TrustListControllerGetTrustListVersionsResponse = TrustListControllerGetTrustListVersionsResponses[keyof TrustListControllerGetTrustListVersionsResponses];
3322
+ type TrustListControllerGetTrustListVersionData = {
3323
+ body?: never;
3324
+ path: {
3325
+ id: string;
3326
+ versionId: string;
3327
+ };
3328
+ query?: never;
3329
+ url: "/trust-list/{id}/versions/{versionId}";
3330
+ };
3331
+ type TrustListControllerGetTrustListVersionResponses = {
3332
+ 200: TrustListVersion;
3333
+ };
3334
+ type TrustListControllerGetTrustListVersionResponse = TrustListControllerGetTrustListVersionResponses[keyof TrustListControllerGetTrustListVersionResponses];
3335
+ type TrustListPublicControllerGetTrustListJwtData = {
3336
+ body?: never;
3337
+ path: {
3338
+ tenantId: string;
3339
+ id: string;
3340
+ };
3341
+ query?: never;
3342
+ url: "/{tenantId}/trust-list/{id}";
3343
+ };
3344
+ type TrustListPublicControllerGetTrustListJwtResponses = {
3345
+ 200: string;
3346
+ };
3347
+ type TrustListPublicControllerGetTrustListJwtResponse = TrustListPublicControllerGetTrustListJwtResponses[keyof TrustListPublicControllerGetTrustListJwtResponses];
3348
+ type VerifierOfferControllerGetOfferData = {
3349
+ body: PresentationRequest;
3350
+ path?: never;
3351
+ query?: never;
3352
+ url: "/verifier/offer";
3353
+ };
3354
+ type VerifierOfferControllerGetOfferResponses = {
3355
+ /**
3356
+ * JSON response
3357
+ */
3358
+ 201: OfferResponse;
3359
+ };
3360
+ type VerifierOfferControllerGetOfferResponse = VerifierOfferControllerGetOfferResponses[keyof VerifierOfferControllerGetOfferResponses];
3361
+ type StorageControllerUploadData = {
3362
+ /**
3363
+ * List of cats
3364
+ */
3365
+ body: FileUploadDto;
3366
+ path?: never;
3367
+ query?: never;
3368
+ url: "/storage";
3369
+ };
3370
+ type StorageControllerUploadResponses = {
3371
+ 201: {
3372
+ [key: string]: unknown;
3373
+ };
3374
+ };
3375
+ type StorageControllerUploadResponse = StorageControllerUploadResponses[keyof StorageControllerUploadResponses];
3376
+ type StorageControllerDownloadData = {
3377
+ body?: never;
3378
+ path: {
3379
+ key: string;
3380
+ };
3381
+ query?: never;
3382
+ url: "/storage/{key}";
3383
+ };
3384
+ type StorageControllerDownloadResponses = {
3385
+ 200: unknown;
3386
+ };
3387
+
3388
+ export type { CertControllerGetCertificatesResponse as $, AllowListPolicy as A, AuthorizeQueries as B, CacheControllerClearAllCachesData as C, CacheControllerClearAllCachesResponse as D, CacheControllerClearAllCachesResponses as E, CacheControllerClearStatusListCacheData as F, CacheControllerClearStatusListCacheResponse as G, HealthControllerCheckResponse as H, CacheControllerClearStatusListCacheResponses as I, CacheControllerClearTrustListCacheData as J, CacheControllerClearTrustListCacheResponse as K, CacheControllerClearTrustListCacheResponses as L, CacheControllerGetStatsData as M, CacheControllerGetStatsResponses as N, CertControllerAddCertificateData as O, CertControllerAddCertificateResponse as P, CertControllerAddCertificateResponses as Q, CertControllerDeleteCertificateData as R, Session as S, CertControllerDeleteCertificateResponses as T, CertControllerExportConfigData as U, CertControllerExportConfigResponse as V, CertControllerExportConfigResponses as W, CertControllerGetCertificateData as X, CertControllerGetCertificateResponse as Y, CertControllerGetCertificateResponses as Z, CertControllerGetCertificatesData as _, HealthControllerCheckError as a, CompleteDeferredDto as a$, CertControllerGetCertificatesResponses as a0, CertControllerUpdateCertificateData as a1, CertControllerUpdateCertificateResponses as a2, CertEntity as a3, CertImportDto as a4, CertResponseDto as a5, CertUpdateDto as a6, CertUsageEntity as a7, ChainedAsConfig as a8, ChainedAsControllerAuthorizeData as a9, ChainedAsTokenResponseDto as aA, Claim as aB, ClaimsQuery as aC, ClientControllerCreateClientData as aD, ClientControllerCreateClientResponse as aE, ClientControllerCreateClientResponses as aF, ClientControllerDeleteClientData as aG, ClientControllerDeleteClientResponses as aH, ClientControllerGetClientData as aI, ClientControllerGetClientResponse as aJ, ClientControllerGetClientResponses as aK, ClientControllerGetClientSecretData as aL, ClientControllerGetClientSecretResponse as aM, ClientControllerGetClientSecretResponses as aN, ClientControllerGetClientsData as aO, ClientControllerGetClientsResponse as aP, ClientControllerGetClientsResponses as aQ, ClientControllerRotateClientSecretData as aR, ClientControllerRotateClientSecretResponse as aS, ClientControllerRotateClientSecretResponses as aT, ClientControllerUpdateClientData as aU, ClientControllerUpdateClientResponse as aV, ClientControllerUpdateClientResponses as aW, ClientCredentialsDto as aX, ClientEntity as aY, ClientOptions as aZ, ClientSecretResponseDto as a_, ChainedAsControllerAuthorizeError as aa, ChainedAsControllerAuthorizeErrors as ab, ChainedAsControllerAuthorizeResponses as ac, ChainedAsControllerCallbackData as ad, ChainedAsControllerCallbackError as ae, ChainedAsControllerCallbackErrors as af, ChainedAsControllerCallbackResponses as ag, ChainedAsControllerGetMetadataData as ah, ChainedAsControllerGetMetadataResponses as ai, ChainedAsControllerJwksData as aj, ChainedAsControllerJwksResponses as ak, ChainedAsControllerParData as al, ChainedAsControllerParError as am, ChainedAsControllerParErrors as an, ChainedAsControllerParResponse as ao, ChainedAsControllerParResponses as ap, ChainedAsControllerTokenData as aq, ChainedAsControllerTokenError as ar, ChainedAsControllerTokenErrors as as, ChainedAsControllerTokenResponse as at, ChainedAsControllerTokenResponses as au, ChainedAsErrorResponseDto as av, ChainedAsParRequestDto as aw, ChainedAsParResponseDto as ax, ChainedAsTokenConfig as ay, ChainedAsTokenRequestDto as az, ApiKeyConfig as b, IssuanceConfig as b$, CreateAccessCertificateDto as b0, CreateClientDto as b1, CreateRegistrarConfigDto as b2, CreateStatusListDto as b3, CreateTenantDto as b4, CredentialConfig as b5, CredentialConfigControllerDeleteIssuanceConfigurationData as b6, CredentialConfigControllerDeleteIssuanceConfigurationResponses as b7, CredentialConfigControllerGetConfigByIdData as b8, CredentialConfigControllerGetConfigByIdResponse as b9, DeferredCredentialRequestDto as bA, DeferredOperationResponse as bB, Display as bC, DisplayImage as bD, DisplayInfo as bE, DisplayLogo as bF, EcPublic as bG, EmbeddedDisclosurePolicy as bH, FailDeferredDto as bI, FileUploadDto as bJ, HealthControllerCheckData as bK, HealthControllerCheckErrors as bL, HealthControllerCheckResponses as bM, IaeActionOpenid4VpPresentation as bN, IaeActionRedirectToWeb as bO, ImportTenantDto as bP, InteractiveAuthorizationCodeResponseDto as bQ, InteractiveAuthorizationControllerCompleteWebAuthData as bR, InteractiveAuthorizationControllerCompleteWebAuthErrors as bS, InteractiveAuthorizationControllerCompleteWebAuthResponses as bT, InteractiveAuthorizationControllerInteractiveAuthorizationData as bU, InteractiveAuthorizationControllerInteractiveAuthorizationError as bV, InteractiveAuthorizationControllerInteractiveAuthorizationErrors as bW, InteractiveAuthorizationControllerInteractiveAuthorizationResponse as bX, InteractiveAuthorizationControllerInteractiveAuthorizationResponses as bY, InteractiveAuthorizationErrorResponseDto as bZ, InteractiveAuthorizationRequestDto as b_, CredentialConfigControllerGetConfigByIdResponses as ba, CredentialConfigControllerGetConfigsData as bb, CredentialConfigControllerGetConfigsResponse as bc, CredentialConfigControllerGetConfigsResponses as bd, CredentialConfigControllerStoreCredentialConfigurationData as be, CredentialConfigControllerStoreCredentialConfigurationResponse as bf, CredentialConfigControllerStoreCredentialConfigurationResponses as bg, CredentialConfigControllerUpdateCredentialConfigurationData as bh, CredentialConfigControllerUpdateCredentialConfigurationResponse as bi, CredentialConfigControllerUpdateCredentialConfigurationResponses as bj, CredentialConfigCreate as bk, CredentialConfigUpdate as bl, CredentialOfferControllerGetOfferData as bm, CredentialOfferControllerGetOfferResponse as bn, CredentialOfferControllerGetOfferResponses as bo, CredentialQuery as bp, CredentialSetQuery as bq, Dcql as br, DeferredControllerCompleteDeferredData as bs, DeferredControllerCompleteDeferredErrors as bt, DeferredControllerCompleteDeferredResponse as bu, DeferredControllerCompleteDeferredResponses as bv, DeferredControllerFailDeferredData as bw, DeferredControllerFailDeferredErrors as bx, DeferredControllerFailDeferredResponse as by, DeferredControllerFailDeferredResponses as bz, AppControllerMainData as c, PresentationManagementControllerDeleteConfigurationResponses as c$, IssuanceConfigControllerGetIssuanceConfigurationsData as c0, IssuanceConfigControllerGetIssuanceConfigurationsResponse as c1, IssuanceConfigControllerGetIssuanceConfigurationsResponses as c2, IssuanceConfigControllerStoreIssuanceConfigurationData as c3, IssuanceConfigControllerStoreIssuanceConfigurationResponse as c4, IssuanceConfigControllerStoreIssuanceConfigurationResponses as c5, IssuanceDto as c6, IssuerMetadataCredentialConfig as c7, JwksResponseDto as c8, Key as c9, Oid4VciControllerNotificationsResponses as cA, Oid4VciMetadataControllerVctData as cB, Oid4VciMetadataControllerVctResponse as cC, Oid4VciMetadataControllerVctResponses as cD, Oid4VpControllerGetPostRequestWithSessionData as cE, Oid4VpControllerGetPostRequestWithSessionResponse as cF, Oid4VpControllerGetPostRequestWithSessionResponses as cG, Oid4VpControllerGetRequestNoRedirectWithSessionData as cH, Oid4VpControllerGetRequestNoRedirectWithSessionResponse as cI, Oid4VpControllerGetRequestNoRedirectWithSessionResponses as cJ, Oid4VpControllerGetRequestWithSessionData as cK, Oid4VpControllerGetRequestWithSessionResponse as cL, Oid4VpControllerGetRequestWithSessionResponses as cM, Oid4VpControllerGetResponseData as cN, Oid4VpControllerGetResponseResponse as cO, Oid4VpControllerGetResponseResponses as cP, ParResponseDto as cQ, PolicyCredential as cR, PresentationAttachment as cS, PresentationConfig as cT, PresentationConfigCreateDto as cU, PresentationConfigUpdateDto as cV, PresentationDuringIssuanceConfig as cW, PresentationManagementControllerConfigurationData as cX, PresentationManagementControllerConfigurationResponse as cY, PresentationManagementControllerConfigurationResponses as cZ, PresentationManagementControllerDeleteConfigurationData as c_, KeyControllerAddKeyData as ca, KeyControllerAddKeyResponses as cb, KeyControllerDeleteKeyData as cc, KeyControllerDeleteKeyResponses as cd, KeyControllerGetKeyData as ce, KeyControllerGetKeyResponse as cf, KeyControllerGetKeyResponses as cg, KeyControllerGetKeysData as ch, KeyControllerGetKeysResponse as ci, KeyControllerGetKeysResponses as cj, KeyControllerUpdateKeyData as ck, KeyControllerUpdateKeyResponses as cl, KeyEntity as cm, KeyImportDto as cn, NoneTrustPolicy as co, NotificationRequestDto as cp, OfferRequestDto as cq, OfferResponse as cr, Oid4VciControllerCredentialData as cs, Oid4VciControllerCredentialResponse as ct, Oid4VciControllerCredentialResponses as cu, Oid4VciControllerDeferredCredentialData as cv, Oid4VciControllerDeferredCredentialResponses as cw, Oid4VciControllerNonceData as cx, Oid4VciControllerNonceResponses as cy, Oid4VciControllerNotificationsData as cz, AppControllerMainResponses as d, StatusListConfigControllerResetConfigResponses as d$, PresentationManagementControllerGetConfigurationData as d0, PresentationManagementControllerGetConfigurationResponse as d1, PresentationManagementControllerGetConfigurationResponses as d2, PresentationManagementControllerStorePresentationConfigData as d3, PresentationManagementControllerStorePresentationConfigResponse as d4, PresentationManagementControllerStorePresentationConfigResponses as d5, PresentationManagementControllerUpdateConfigurationData as d6, PresentationManagementControllerUpdateConfigurationResponse as d7, PresentationManagementControllerUpdateConfigurationResponses as d8, PresentationRequest as d9, SessionConfigControllerGetConfigResponse as dA, SessionConfigControllerGetConfigResponses as dB, SessionConfigControllerResetConfigData as dC, SessionConfigControllerResetConfigResponses as dD, SessionConfigControllerUpdateConfigData as dE, SessionConfigControllerUpdateConfigResponse as dF, SessionConfigControllerUpdateConfigResponses as dG, SessionControllerDeleteSessionData as dH, SessionControllerDeleteSessionResponses as dI, SessionControllerGetAllSessionsData as dJ, SessionControllerGetAllSessionsResponse as dK, SessionControllerGetAllSessionsResponses as dL, SessionControllerGetSessionData as dM, SessionControllerGetSessionResponse as dN, SessionControllerGetSessionResponses as dO, SessionControllerRevokeAllData as dP, SessionControllerRevokeAllResponses as dQ, SessionEventsControllerSubscribeToSessionEventsData as dR, SessionEventsControllerSubscribeToSessionEventsResponses as dS, SessionStorageConfig as dT, StatusListAggregationDto as dU, StatusListConfig as dV, StatusListConfigControllerGetConfigData as dW, StatusListConfigControllerGetConfigResponse as dX, StatusListConfigControllerGetConfigResponses as dY, StatusListConfigControllerResetConfigData as dZ, StatusListConfigControllerResetConfigResponse as d_, RegistrarConfigEntity as da, RegistrarControllerCreateAccessCertificateData as db, RegistrarControllerCreateAccessCertificateErrors as dc, RegistrarControllerCreateAccessCertificateResponse as dd, RegistrarControllerCreateAccessCertificateResponses as de, RegistrarControllerCreateConfigData as df, RegistrarControllerCreateConfigErrors as dg, RegistrarControllerCreateConfigResponse as dh, RegistrarControllerCreateConfigResponses as di, RegistrarControllerDeleteConfigData as dj, RegistrarControllerDeleteConfigResponse as dk, RegistrarControllerDeleteConfigResponses as dl, RegistrarControllerGetConfigData as dm, RegistrarControllerGetConfigErrors as dn, RegistrarControllerGetConfigResponse as dp, RegistrarControllerGetConfigResponses as dq, RegistrarControllerUpdateConfigData as dr, RegistrarControllerUpdateConfigErrors as ds, RegistrarControllerUpdateConfigResponse as dt, RegistrarControllerUpdateConfigResponses as du, RegistrationCertificateRequest as dv, RoleDto as dw, RootOfTrustPolicy as dx, SchemaResponse as dy, SessionConfigControllerGetConfigData as dz, AttestationBasedPolicy as e, TrustListControllerGetTrustListResponses as e$, StatusListConfigControllerUpdateConfigData as e0, StatusListConfigControllerUpdateConfigResponse as e1, StatusListConfigControllerUpdateConfigResponses as e2, StatusListControllerGetListData as e3, StatusListControllerGetListResponse as e4, StatusListControllerGetListResponses as e5, StatusListControllerGetStatusListAggregationData as e6, StatusListControllerGetStatusListAggregationResponse as e7, StatusListControllerGetStatusListAggregationResponses as e8, StatusListImportDto as e9, TenantControllerGetTenantResponses as eA, TenantControllerGetTenantsData as eB, TenantControllerGetTenantsResponse as eC, TenantControllerGetTenantsResponses as eD, TenantControllerInitTenantData as eE, TenantControllerInitTenantResponse as eF, TenantControllerInitTenantResponses as eG, TenantControllerUpdateTenantData as eH, TenantControllerUpdateTenantResponse as eI, TenantControllerUpdateTenantResponses as eJ, TenantEntity as eK, TokenResponse as eL, TransactionData as eM, TrustList as eN, TrustListControllerCreateTrustListData as eO, TrustListControllerCreateTrustListResponse as eP, TrustListControllerCreateTrustListResponses as eQ, TrustListControllerDeleteTrustListData as eR, TrustListControllerDeleteTrustListResponses as eS, TrustListControllerExportTrustListData as eT, TrustListControllerExportTrustListResponse as eU, TrustListControllerExportTrustListResponses as eV, TrustListControllerGetAllTrustListsData as eW, TrustListControllerGetAllTrustListsResponse as eX, TrustListControllerGetAllTrustListsResponses as eY, TrustListControllerGetTrustListData as eZ, TrustListControllerGetTrustListResponse as e_, StatusListManagementControllerCreateListData as ea, StatusListManagementControllerCreateListResponse as eb, StatusListManagementControllerCreateListResponses as ec, StatusListManagementControllerDeleteListData as ed, StatusListManagementControllerDeleteListResponse as ee, StatusListManagementControllerDeleteListResponses as ef, StatusListManagementControllerGetListData as eg, StatusListManagementControllerGetListResponse as eh, StatusListManagementControllerGetListResponses as ei, StatusListManagementControllerGetListsData as ej, StatusListManagementControllerGetListsResponse as ek, StatusListManagementControllerGetListsResponses as el, StatusListManagementControllerUpdateListData as em, StatusListManagementControllerUpdateListResponse as en, StatusListManagementControllerUpdateListResponses as eo, StatusListResponseDto as ep, StatusUpdateDto as eq, StorageControllerDownloadData as er, StorageControllerDownloadResponses as es, StorageControllerUploadData as et, StorageControllerUploadResponse as eu, StorageControllerUploadResponses as ev, TenantControllerDeleteTenantData as ew, TenantControllerDeleteTenantResponses as ex, TenantControllerGetTenantData as ey, TenantControllerGetTenantResponse as ez, AuthControllerGetGlobalJwksData as f, TrustListControllerGetTrustListVersionData as f0, TrustListControllerGetTrustListVersionResponse as f1, TrustListControllerGetTrustListVersionResponses as f2, TrustListControllerGetTrustListVersionsData as f3, TrustListControllerGetTrustListVersionsResponse as f4, TrustListControllerGetTrustListVersionsResponses as f5, TrustListControllerUpdateTrustListData as f6, TrustListControllerUpdateTrustListResponse as f7, TrustListControllerUpdateTrustListResponses as f8, TrustListCreateDto as f9, WellKnownControllerGetJwks0Responses as fA, WellKnownControllerGetJwks1Data as fB, WellKnownControllerGetJwks1Response as fC, WellKnownControllerGetJwks1Responses as fD, WellKnownControllerIssuerMetadata0Data as fE, WellKnownControllerIssuerMetadata0Response as fF, WellKnownControllerIssuerMetadata0Responses as fG, WellKnownControllerIssuerMetadata1Data as fH, WellKnownControllerIssuerMetadata1Response as fI, WellKnownControllerIssuerMetadata1Responses as fJ, TrustListPublicControllerGetTrustListJwtData as fa, TrustListPublicControllerGetTrustListJwtResponse as fb, TrustListPublicControllerGetTrustListJwtResponses as fc, TrustListVersion as fd, TrustedAuthorityQuery as fe, UpdateClientDto as ff, UpdateKeyDto as fg, UpdateRegistrarConfigDto as fh, UpdateSessionConfigDto as fi, UpdateStatusListConfigDto as fj, UpdateStatusListDto as fk, UpdateTenantDto as fl, UpstreamOidcConfig as fm, Vct as fn, VerifierOfferControllerGetOfferData as fo, VerifierOfferControllerGetOfferResponse as fp, VerifierOfferControllerGetOfferResponses as fq, WebHookAuthConfigHeader as fr, WebHookAuthConfigNone as fs, WebhookConfig as ft, WellKnownControllerAuthzMetadata0Data as fu, WellKnownControllerAuthzMetadata0Responses as fv, WellKnownControllerAuthzMetadata1Data as fw, WellKnownControllerAuthzMetadata1Responses as fx, WellKnownControllerGetJwks0Data as fy, WellKnownControllerGetJwks0Response as fz, AuthControllerGetGlobalJwksResponses as g, AuthControllerGetOAuth2TokenData as h, AuthControllerGetOAuth2TokenErrors as i, AuthControllerGetOAuth2TokenResponse as j, AuthControllerGetOAuth2TokenResponses as k, AuthControllerGetOidcDiscoveryData as l, AuthControllerGetOidcDiscoveryResponses as m, AuthenticationMethodAuth as n, AuthenticationMethodNone as o, AuthenticationMethodPresentation as p, AuthenticationUrlConfig as q, AuthorizationResponse as r, AuthorizeControllerAuthorizeData as s, AuthorizeControllerAuthorizeResponses as t, AuthorizeControllerParData as u, AuthorizeControllerParResponse as v, AuthorizeControllerParResponses as w, AuthorizeControllerTokenData as x, AuthorizeControllerTokenResponse as y, AuthorizeControllerTokenResponses as z };