@eudiplo/sdk-core 3.1.2 → 4.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/api/client/client.gen.d.mts +1 -1
- package/dist/api/client/client.gen.d.ts +1 -1
- package/dist/api/client/client.gen.js +9 -7
- package/dist/api/client/client.gen.mjs +9 -7
- package/dist/api/client/index.d.mts +1 -1
- package/dist/api/client/index.d.ts +1 -1
- package/dist/api/client/index.js +10 -8
- package/dist/api/client/index.mjs +10 -8
- package/dist/api/client/types.gen.d.mts +1 -1
- package/dist/api/client/types.gen.d.ts +1 -1
- package/dist/api/client.gen.d.mts +2 -2
- package/dist/api/client.gen.d.ts +2 -2
- package/dist/api/client.gen.js +9 -7
- package/dist/api/client.gen.mjs +9 -7
- package/dist/api/index.d.mts +99 -232
- package/dist/api/index.d.ts +99 -232
- package/dist/api/index.js +206 -266
- package/dist/api/index.mjs +183 -218
- package/dist/index.d.mts +6 -6
- package/dist/index.d.ts +6 -6
- package/dist/index.js +220 -276
- package/dist/index.mjs +197 -228
- package/dist/{types.gen-B8BIFvOm.d.mts → types.gen-CVLCgolx.d.mts} +1390 -1222
- package/dist/{types.gen-B8BIFvOm.d.ts → types.gen-CVLCgolx.d.ts} +1390 -1222
- package/dist/{types.gen-Bdvb9JJk.d.mts → types.gen-CVkHMB8b.d.mts} +7 -6
- package/dist/{types.gen-Bdvb9JJk.d.ts → types.gen-CVkHMB8b.d.ts} +7 -6
- package/package.json +3 -3
|
@@ -1,6 +1,26 @@
|
|
|
1
1
|
type ClientOptions = {
|
|
2
2
|
baseUrl: string;
|
|
3
3
|
};
|
|
4
|
+
type GrafanaConfigDto = {
|
|
5
|
+
/**
|
|
6
|
+
* Base URL of the Grafana instance
|
|
7
|
+
*/
|
|
8
|
+
url?: string;
|
|
9
|
+
/**
|
|
10
|
+
* UID of the Tempo data source in Grafana
|
|
11
|
+
*/
|
|
12
|
+
tempoUid: string;
|
|
13
|
+
/**
|
|
14
|
+
* UID of the Loki data source in Grafana
|
|
15
|
+
*/
|
|
16
|
+
lokiUid: string;
|
|
17
|
+
};
|
|
18
|
+
type FrontendConfigResponseDto = {
|
|
19
|
+
/**
|
|
20
|
+
* Grafana observability configuration
|
|
21
|
+
*/
|
|
22
|
+
grafana: GrafanaConfigDto;
|
|
23
|
+
};
|
|
4
24
|
type RoleDto = {
|
|
5
25
|
/**
|
|
6
26
|
* OAuth2 roles
|
|
@@ -129,11 +149,6 @@ type CreateTenantDto = {
|
|
|
129
149
|
* Status list configuration for this tenant. Only affects newly created status lists.
|
|
130
150
|
*/
|
|
131
151
|
statusListConfig?: StatusListConfig;
|
|
132
|
-
/**
|
|
133
|
-
* Session storage configuration. Controls TTL and cleanup behavior.
|
|
134
|
-
*/
|
|
135
|
-
sessionConfig?: SessionStorageConfig;
|
|
136
|
-
roles?: Array<"presentation:manage" | "presentation:request" | "issuance:manage" | "issuance:offer" | "clients:manage" | "tenants:manage" | "registrar:manage">;
|
|
137
152
|
/**
|
|
138
153
|
* The unique identifier for the tenant.
|
|
139
154
|
*/
|
|
@@ -146,16 +161,17 @@ type CreateTenantDto = {
|
|
|
146
161
|
* The description of the tenant.
|
|
147
162
|
*/
|
|
148
163
|
description?: string;
|
|
164
|
+
/**
|
|
165
|
+
* Session storage configuration. Controls TTL and cleanup behavior.
|
|
166
|
+
*/
|
|
167
|
+
sessionConfig?: SessionStorageConfig;
|
|
168
|
+
roles?: Array<"presentation:manage" | "presentation:request" | "issuance:manage" | "issuance:offer" | "clients:manage" | "tenants:manage" | "registrar:manage">;
|
|
149
169
|
};
|
|
150
170
|
type UpdateTenantDto = {
|
|
151
171
|
/**
|
|
152
172
|
* Status list configuration for this tenant. Only affects newly created status lists.
|
|
153
173
|
*/
|
|
154
174
|
statusListConfig?: StatusListConfig;
|
|
155
|
-
/**
|
|
156
|
-
* Session storage configuration. Controls TTL and cleanup behavior.
|
|
157
|
-
*/
|
|
158
|
-
sessionConfig?: SessionStorageConfig;
|
|
159
175
|
/**
|
|
160
176
|
* The name of the tenant.
|
|
161
177
|
*/
|
|
@@ -164,6 +180,10 @@ type UpdateTenantDto = {
|
|
|
164
180
|
* The description of the tenant.
|
|
165
181
|
*/
|
|
166
182
|
description?: string;
|
|
183
|
+
/**
|
|
184
|
+
* Session storage configuration. Controls TTL and cleanup behavior.
|
|
185
|
+
*/
|
|
186
|
+
sessionConfig?: SessionStorageConfig;
|
|
167
187
|
roles?: Array<"presentation:manage" | "presentation:request" | "issuance:manage" | "issuance:offer" | "clients:manage" | "tenants:manage" | "registrar:manage">;
|
|
168
188
|
};
|
|
169
189
|
type ClientSecretResponseDto = {
|
|
@@ -213,138 +233,6 @@ type CreateClientDto = {
|
|
|
213
233
|
*/
|
|
214
234
|
roles: Array<"presentation:manage" | "presentation:request" | "issuance:manage" | "issuance:offer" | "clients:manage" | "tenants:manage" | "registrar:manage">;
|
|
215
235
|
};
|
|
216
|
-
type KeyEntity = {
|
|
217
|
-
/**
|
|
218
|
-
* Unique identifier for the key.
|
|
219
|
-
*/
|
|
220
|
-
id: string;
|
|
221
|
-
/**
|
|
222
|
-
* Description of the key.
|
|
223
|
-
*/
|
|
224
|
-
description?: string;
|
|
225
|
-
/**
|
|
226
|
-
* Tenant ID for the key.
|
|
227
|
-
*/
|
|
228
|
-
tenantId: string;
|
|
229
|
-
/**
|
|
230
|
-
* The tenant that owns this object.
|
|
231
|
-
*/
|
|
232
|
-
tenant: TenantEntity;
|
|
233
|
-
/**
|
|
234
|
-
* The key material.
|
|
235
|
-
* Encrypted at rest using AES-256-GCM.
|
|
236
|
-
*/
|
|
237
|
-
key: {
|
|
238
|
-
[key: string]: unknown;
|
|
239
|
-
};
|
|
240
|
-
/**
|
|
241
|
-
* The usage type of the key.
|
|
242
|
-
*/
|
|
243
|
-
usage: {
|
|
244
|
-
[key: string]: unknown;
|
|
245
|
-
};
|
|
246
|
-
/**
|
|
247
|
-
* The KMS provider used for this key.
|
|
248
|
-
* References a configured KMS provider name.
|
|
249
|
-
*/
|
|
250
|
-
kmsProvider: string;
|
|
251
|
-
/**
|
|
252
|
-
* Certificates associated with this key.
|
|
253
|
-
*/
|
|
254
|
-
certificates: Array<CertEntity>;
|
|
255
|
-
/**
|
|
256
|
-
* The timestamp when the key was created.
|
|
257
|
-
*/
|
|
258
|
-
createdAt: string;
|
|
259
|
-
/**
|
|
260
|
-
* The timestamp when the key was last updated.
|
|
261
|
-
*/
|
|
262
|
-
updatedAt: string;
|
|
263
|
-
};
|
|
264
|
-
type CertEntity = {
|
|
265
|
-
/**
|
|
266
|
-
* The key ID this certificate is associated with
|
|
267
|
-
*/
|
|
268
|
-
keyId: string;
|
|
269
|
-
/**
|
|
270
|
-
* Unique identifier for the key.
|
|
271
|
-
*/
|
|
272
|
-
id: string;
|
|
273
|
-
/**
|
|
274
|
-
* Tenant ID for the key.
|
|
275
|
-
*/
|
|
276
|
-
tenantId: string;
|
|
277
|
-
/**
|
|
278
|
-
* The tenant that owns this object.
|
|
279
|
-
*/
|
|
280
|
-
tenant: TenantEntity;
|
|
281
|
-
/**
|
|
282
|
-
* Certificate chain in PEM format (leaf first, then intermediates/CA).
|
|
283
|
-
*/
|
|
284
|
-
crt: Array<string>;
|
|
285
|
-
usages: Array<CertUsageEntity>;
|
|
286
|
-
/**
|
|
287
|
-
* Description of the key.
|
|
288
|
-
*/
|
|
289
|
-
description?: string;
|
|
290
|
-
key: KeyEntity;
|
|
291
|
-
/**
|
|
292
|
-
* The timestamp when the certificate was created.
|
|
293
|
-
*/
|
|
294
|
-
createdAt: string;
|
|
295
|
-
/**
|
|
296
|
-
* The timestamp when the certificate was last updated.
|
|
297
|
-
*/
|
|
298
|
-
updatedAt: string;
|
|
299
|
-
};
|
|
300
|
-
type CertUsageEntity = {
|
|
301
|
-
tenantId: string;
|
|
302
|
-
certId: string;
|
|
303
|
-
usage: "access" | "signing" | "trustList" | "statusList";
|
|
304
|
-
cert: CertEntity;
|
|
305
|
-
};
|
|
306
|
-
type CertImportDto = {
|
|
307
|
-
/**
|
|
308
|
-
* The key ID this certificate is associated with
|
|
309
|
-
*/
|
|
310
|
-
keyId: string;
|
|
311
|
-
id?: string;
|
|
312
|
-
/**
|
|
313
|
-
* Usage types for the certificate.
|
|
314
|
-
*/
|
|
315
|
-
certUsageTypes: Array<"access" | "signing" | "trustList" | "statusList">;
|
|
316
|
-
/**
|
|
317
|
-
* Certificate chain in PEM format (leaf first, then intermediates/CA).
|
|
318
|
-
* If not provided, a self-signed certificate will be generated.
|
|
319
|
-
*/
|
|
320
|
-
crt?: Array<string>;
|
|
321
|
-
/**
|
|
322
|
-
* Subject name (CN) for self-signed certificate generation.
|
|
323
|
-
* If not provided, the tenant name will be used.
|
|
324
|
-
*/
|
|
325
|
-
subjectName?: string;
|
|
326
|
-
/**
|
|
327
|
-
* Description of the key.
|
|
328
|
-
*/
|
|
329
|
-
description?: string;
|
|
330
|
-
};
|
|
331
|
-
type CertResponseDto = {
|
|
332
|
-
/**
|
|
333
|
-
* The ID of the created self-signed certificate.
|
|
334
|
-
*/
|
|
335
|
-
id: string;
|
|
336
|
-
};
|
|
337
|
-
type CertUpdateDto = {
|
|
338
|
-
/**
|
|
339
|
-
* Usage types for the certificate.
|
|
340
|
-
*/
|
|
341
|
-
certUsageTypes: Array<"access" | "signing" | "trustList" | "statusList">;
|
|
342
|
-
usages: Array<CertUsageEntity>;
|
|
343
|
-
/**
|
|
344
|
-
* Description of the key.
|
|
345
|
-
*/
|
|
346
|
-
description?: string;
|
|
347
|
-
};
|
|
348
236
|
type StatusListImportDto = {
|
|
349
237
|
/**
|
|
350
238
|
* Unique identifier for the status list
|
|
@@ -355,9 +243,9 @@ type StatusListImportDto = {
|
|
|
355
243
|
*/
|
|
356
244
|
credentialConfigurationId?: string;
|
|
357
245
|
/**
|
|
358
|
-
*
|
|
246
|
+
* Key chain ID to use for signing. Leave empty to use the tenant's default StatusList key chain.
|
|
359
247
|
*/
|
|
360
|
-
|
|
248
|
+
keyChainId?: string;
|
|
361
249
|
/**
|
|
362
250
|
* Capacity of the status list. If not provided, uses tenant or global defaults.
|
|
363
251
|
*/
|
|
@@ -409,9 +297,9 @@ type StatusListResponseDto = {
|
|
|
409
297
|
*/
|
|
410
298
|
credentialConfigurationId?: string;
|
|
411
299
|
/**
|
|
412
|
-
*
|
|
300
|
+
* Key chain ID used for signing. Null means using the tenant's default.
|
|
413
301
|
*/
|
|
414
|
-
|
|
302
|
+
keyChainId?: string;
|
|
415
303
|
/**
|
|
416
304
|
* Bits per status value
|
|
417
305
|
*/
|
|
@@ -447,9 +335,9 @@ type CreateStatusListDto = {
|
|
|
447
335
|
*/
|
|
448
336
|
credentialConfigurationId?: string;
|
|
449
337
|
/**
|
|
450
|
-
*
|
|
338
|
+
* Key chain ID to use for signing. Leave empty to use the tenant's default StatusList key chain.
|
|
451
339
|
*/
|
|
452
|
-
|
|
340
|
+
keyChainId?: string;
|
|
453
341
|
/**
|
|
454
342
|
* Bits per status value. More bits allow more status states. Defaults to tenant configuration.
|
|
455
343
|
*/
|
|
@@ -465,9 +353,9 @@ type UpdateStatusListDto = {
|
|
|
465
353
|
*/
|
|
466
354
|
credentialConfigurationId?: string;
|
|
467
355
|
/**
|
|
468
|
-
*
|
|
356
|
+
* Key chain ID to use for signing. Set to null to use the tenant's default StatusList key chain.
|
|
469
357
|
*/
|
|
470
|
-
|
|
358
|
+
keyChainId?: string;
|
|
471
359
|
};
|
|
472
360
|
type AuthorizeQueries = {
|
|
473
361
|
issuer_state?: string;
|
|
@@ -482,44 +370,14 @@ type AuthorizeQueries = {
|
|
|
482
370
|
request_uri?: string;
|
|
483
371
|
auth_session?: string;
|
|
484
372
|
state?: string;
|
|
485
|
-
};
|
|
486
|
-
type WebHookAuthConfigNone = {
|
|
487
|
-
/**
|
|
488
|
-
* The type of authentication used for the webhook.
|
|
489
|
-
*/
|
|
490
|
-
type: "none";
|
|
491
|
-
};
|
|
492
|
-
type ApiKeyConfig = {
|
|
493
|
-
/**
|
|
494
|
-
* The name of the header where the API key will be sent.
|
|
495
|
-
*/
|
|
496
|
-
headerName: string;
|
|
497
373
|
/**
|
|
498
|
-
*
|
|
499
|
-
|
|
500
|
-
|
|
501
|
-
};
|
|
502
|
-
type WebHookAuthConfigHeader = {
|
|
503
|
-
/**
|
|
504
|
-
* The type of authentication used for the webhook.
|
|
505
|
-
*/
|
|
506
|
-
type: "apiKey";
|
|
507
|
-
/**
|
|
508
|
-
* Configuration for API key authentication.
|
|
509
|
-
* This is required if the type is 'apiKey'.
|
|
510
|
-
*/
|
|
511
|
-
config: ApiKeyConfig;
|
|
512
|
-
};
|
|
513
|
-
type WebhookConfig = {
|
|
514
|
-
/**
|
|
515
|
-
* Optional authentication configuration for the webhook.
|
|
516
|
-
* If not provided, no authentication will be used.
|
|
517
|
-
*/
|
|
518
|
-
auth: WebHookAuthConfigNone | WebHookAuthConfigHeader;
|
|
519
|
-
/**
|
|
520
|
-
* The URL to which the webhook will send notifications.
|
|
374
|
+
* RFC 9396 authorization details. When passed via
|
|
375
|
+
* application/x-www-form-urlencoded (PAR) the value is a JSON string; when
|
|
376
|
+
* passed inside a signed request object it can already be an array.
|
|
521
377
|
*/
|
|
522
|
-
|
|
378
|
+
authorization_details?: {
|
|
379
|
+
[key: string]: unknown;
|
|
380
|
+
};
|
|
523
381
|
};
|
|
524
382
|
type OfferRequestDto = {
|
|
525
383
|
/**
|
|
@@ -535,10 +393,16 @@ type OfferRequestDto = {
|
|
|
535
393
|
claims: {
|
|
536
394
|
[key: string]: unknown;
|
|
537
395
|
};
|
|
396
|
+
} | {
|
|
397
|
+
type: "attributeProvider";
|
|
398
|
+
attributeProviderId: string;
|
|
538
399
|
} | {
|
|
539
400
|
type: "webhook";
|
|
540
401
|
webhook: {
|
|
541
|
-
|
|
402
|
+
url: string;
|
|
403
|
+
auth?: {
|
|
404
|
+
[key: string]: unknown;
|
|
405
|
+
};
|
|
542
406
|
};
|
|
543
407
|
};
|
|
544
408
|
};
|
|
@@ -563,9 +427,51 @@ type OfferRequestDto = {
|
|
|
563
427
|
*/
|
|
564
428
|
authorization_server?: string;
|
|
565
429
|
/**
|
|
566
|
-
*
|
|
430
|
+
* ID of the webhook endpoint to notify about the status of the issuance process.
|
|
431
|
+
*/
|
|
432
|
+
webhookEndpointId?: string;
|
|
433
|
+
};
|
|
434
|
+
type WebHookAuthConfigNone = {
|
|
435
|
+
/**
|
|
436
|
+
* The type of authentication used for the webhook.
|
|
437
|
+
*/
|
|
438
|
+
type: "none";
|
|
439
|
+
};
|
|
440
|
+
type ApiKeyConfig = {
|
|
441
|
+
/**
|
|
442
|
+
* The name of the header where the API key will be sent.
|
|
443
|
+
*/
|
|
444
|
+
headerName: string;
|
|
445
|
+
/**
|
|
446
|
+
* The value of the API key to be sent in the header.
|
|
447
|
+
*/
|
|
448
|
+
value: string;
|
|
449
|
+
};
|
|
450
|
+
type WebHookAuthConfigHeader = {
|
|
451
|
+
/**
|
|
452
|
+
* The type of authentication used for the webhook.
|
|
453
|
+
*/
|
|
454
|
+
type: "apiKey";
|
|
455
|
+
/**
|
|
456
|
+
* Configuration for API key authentication.
|
|
457
|
+
* This is required if the type is 'apiKey'.
|
|
458
|
+
*/
|
|
459
|
+
config: ApiKeyConfig;
|
|
460
|
+
};
|
|
461
|
+
type WebhookConfig = {
|
|
462
|
+
/**
|
|
463
|
+
* Optional authentication configuration for the webhook.
|
|
464
|
+
* If not provided, no authentication will be used.
|
|
465
|
+
*/
|
|
466
|
+
auth: WebHookAuthConfigNone | WebHookAuthConfigHeader;
|
|
467
|
+
/**
|
|
468
|
+
* List of credential IDs to include raw tokens for (e.g., ['sca_credential'])
|
|
469
|
+
*/
|
|
470
|
+
includeRawTokensFor?: Array<string>;
|
|
471
|
+
/**
|
|
472
|
+
* The URL to which the webhook will send notifications.
|
|
567
473
|
*/
|
|
568
|
-
|
|
474
|
+
url: string;
|
|
569
475
|
};
|
|
570
476
|
type TransactionData = {
|
|
571
477
|
type: string;
|
|
@@ -605,6 +511,15 @@ type Session = {
|
|
|
605
511
|
*/
|
|
606
512
|
tenant: TenantEntity;
|
|
607
513
|
authorization_code?: string;
|
|
514
|
+
/**
|
|
515
|
+
* Refresh token for the session - used to obtain a new access token.
|
|
516
|
+
*/
|
|
517
|
+
refresh_token?: string;
|
|
518
|
+
/**
|
|
519
|
+
* Expiration timestamp for the refresh token.
|
|
520
|
+
* Used to validate refresh_token grant requests.
|
|
521
|
+
*/
|
|
522
|
+
refresh_token_expires_at?: string;
|
|
608
523
|
/**
|
|
609
524
|
* Request URI from the authorization request.
|
|
610
525
|
*/
|
|
@@ -631,9 +546,9 @@ type Session = {
|
|
|
631
546
|
*/
|
|
632
547
|
credentialPayload?: OfferRequestDto;
|
|
633
548
|
/**
|
|
634
|
-
*
|
|
549
|
+
* ID of the webhook endpoint to notify about issuance status.
|
|
635
550
|
*/
|
|
636
|
-
|
|
551
|
+
webhookEndpointId?: string;
|
|
637
552
|
/**
|
|
638
553
|
* Notifications associated with the session.
|
|
639
554
|
*/
|
|
@@ -664,6 +579,18 @@ type Session = {
|
|
|
664
579
|
* Client ID used in the OID4VP authorization request.
|
|
665
580
|
*/
|
|
666
581
|
clientId?: string;
|
|
582
|
+
/**
|
|
583
|
+
* Cryptographic random nonce used in wallet-facing URLs (response_uri, request_uri, state).
|
|
584
|
+
* Per OID4VP spec Section 13.3, this separates the wallet-facing identifier (request-id)
|
|
585
|
+
* from the frontend-facing session ID (transaction-id) to prevent session fixation.
|
|
586
|
+
*/
|
|
587
|
+
walletNonce?: string;
|
|
588
|
+
/**
|
|
589
|
+
* Cryptographic random code generated after successful VP Token processing.
|
|
590
|
+
* Per OID4VP spec Section 13.3, included in redirect_uri so only the legitimate
|
|
591
|
+
* frontend (which receives the redirect) can confirm the session completed.
|
|
592
|
+
*/
|
|
593
|
+
responseCode?: string;
|
|
667
594
|
/**
|
|
668
595
|
* Response URI used in the OID4VP authorization request.
|
|
669
596
|
*/
|
|
@@ -687,6 +614,43 @@ type Session = {
|
|
|
687
614
|
* Used to identify the user at the external AS.
|
|
688
615
|
*/
|
|
689
616
|
externalSubject?: string;
|
|
617
|
+
/**
|
|
618
|
+
* Error reason if the session failed.
|
|
619
|
+
* Stores the error message when status is 'failed'.
|
|
620
|
+
*/
|
|
621
|
+
errorReason?: string;
|
|
622
|
+
};
|
|
623
|
+
type SessionLogEntryResponseDto = {
|
|
624
|
+
/**
|
|
625
|
+
* Log entry ID
|
|
626
|
+
*/
|
|
627
|
+
id: string;
|
|
628
|
+
/**
|
|
629
|
+
* Session ID
|
|
630
|
+
*/
|
|
631
|
+
sessionId: string;
|
|
632
|
+
/**
|
|
633
|
+
* Timestamp of the log entry
|
|
634
|
+
*/
|
|
635
|
+
timestamp: string;
|
|
636
|
+
/**
|
|
637
|
+
* Log level
|
|
638
|
+
*/
|
|
639
|
+
level: "info" | "warn" | "error";
|
|
640
|
+
/**
|
|
641
|
+
* Flow stage
|
|
642
|
+
*/
|
|
643
|
+
stage?: string;
|
|
644
|
+
/**
|
|
645
|
+
* Log message
|
|
646
|
+
*/
|
|
647
|
+
message: string;
|
|
648
|
+
/**
|
|
649
|
+
* Additional structured detail
|
|
650
|
+
*/
|
|
651
|
+
detail?: {
|
|
652
|
+
[key: string]: unknown;
|
|
653
|
+
};
|
|
690
654
|
};
|
|
691
655
|
type StatusUpdateDto = {
|
|
692
656
|
/**
|
|
@@ -798,12 +762,28 @@ type DisplayInfo = {
|
|
|
798
762
|
logo?: DisplayLogo;
|
|
799
763
|
};
|
|
800
764
|
type IssuanceConfig = {
|
|
765
|
+
/**
|
|
766
|
+
* Key ID for signing access tokens. If unset, the default signing key is used.
|
|
767
|
+
*/
|
|
768
|
+
signingKeyId?: string;
|
|
801
769
|
/**
|
|
802
770
|
* Configuration for Chained Authorization Server mode.
|
|
803
771
|
* When enabled, EUDIPLO acts as an OAuth AS facade, delegating user authentication
|
|
804
772
|
* to an upstream OIDC provider while issuing its own tokens with issuer_state.
|
|
805
773
|
*/
|
|
806
774
|
chainedAs?: ChainedAsConfig;
|
|
775
|
+
/**
|
|
776
|
+
* Whether refresh tokens should be issued for OID4VCI token responses.
|
|
777
|
+
*/
|
|
778
|
+
refreshTokenEnabled?: boolean;
|
|
779
|
+
/**
|
|
780
|
+
* Whether `credential_response_encryption` should be advertised in the credential issuer metadata.
|
|
781
|
+
*/
|
|
782
|
+
credentialResponseEncryption?: boolean;
|
|
783
|
+
/**
|
|
784
|
+
* Refresh token lifetime in seconds. Defaults to 2592000 (30 days).
|
|
785
|
+
*/
|
|
786
|
+
refreshTokenExpiresInSeconds?: number;
|
|
807
787
|
/**
|
|
808
788
|
* The tenant that owns this object.
|
|
809
789
|
*/
|
|
@@ -833,6 +813,13 @@ type IssuanceConfig = {
|
|
|
833
813
|
* If empty and walletAttestationRequired is true, all wallet providers are rejected.
|
|
834
814
|
*/
|
|
835
815
|
walletProviderTrustLists?: Array<string>;
|
|
816
|
+
/**
|
|
817
|
+
* The URL of the preferred authorization server for wallet-initiated flows.
|
|
818
|
+
* When set, this AS is placed first in the `authorization_servers` array
|
|
819
|
+
* of the credential issuer metadata, signaling wallets to use it by default.
|
|
820
|
+
* Must match one of the configured auth servers, the chained AS URL, or "built-in".
|
|
821
|
+
*/
|
|
822
|
+
preferredAuthServer?: string;
|
|
836
823
|
display: Array<DisplayInfo>;
|
|
837
824
|
/**
|
|
838
825
|
* The timestamp when the VP request was created.
|
|
@@ -844,12 +831,28 @@ type IssuanceConfig = {
|
|
|
844
831
|
updatedAt: string;
|
|
845
832
|
};
|
|
846
833
|
type IssuanceDto = {
|
|
834
|
+
/**
|
|
835
|
+
* Key ID for signing access tokens. If unset, the default signing key is used.
|
|
836
|
+
*/
|
|
837
|
+
signingKeyId?: string;
|
|
847
838
|
/**
|
|
848
839
|
* Configuration for Chained Authorization Server mode.
|
|
849
840
|
* When enabled, EUDIPLO acts as an OAuth AS facade, delegating user authentication
|
|
850
841
|
* to an upstream OIDC provider while issuing its own tokens with issuer_state.
|
|
851
842
|
*/
|
|
852
843
|
chainedAs?: ChainedAsConfig;
|
|
844
|
+
/**
|
|
845
|
+
* Whether refresh tokens should be issued for OID4VCI token responses.
|
|
846
|
+
*/
|
|
847
|
+
refreshTokenEnabled?: boolean;
|
|
848
|
+
/**
|
|
849
|
+
* Whether `credential_response_encryption` should be advertised in the credential issuer metadata.
|
|
850
|
+
*/
|
|
851
|
+
credentialResponseEncryption?: boolean;
|
|
852
|
+
/**
|
|
853
|
+
* Refresh token lifetime in seconds. Defaults to 2592000 (30 days).
|
|
854
|
+
*/
|
|
855
|
+
refreshTokenExpiresInSeconds?: number;
|
|
853
856
|
/**
|
|
854
857
|
* Authentication server URL for the issuance process.
|
|
855
858
|
*/
|
|
@@ -875,6 +878,13 @@ type IssuanceDto = {
|
|
|
875
878
|
* If empty and walletAttestationRequired is true, all wallet providers are rejected.
|
|
876
879
|
*/
|
|
877
880
|
walletProviderTrustLists?: Array<string>;
|
|
881
|
+
/**
|
|
882
|
+
* The URL of the preferred authorization server for wallet-initiated flows.
|
|
883
|
+
* When set, this AS is placed first in the `authorization_servers` array
|
|
884
|
+
* of the credential issuer metadata, signaling wallets to use it by default.
|
|
885
|
+
* Must match one of the configured auth servers, the chained AS URL, or "built-in".
|
|
886
|
+
*/
|
|
887
|
+
preferredAuthServer?: string;
|
|
878
888
|
display: Array<DisplayInfo>;
|
|
879
889
|
};
|
|
880
890
|
type ClaimsQuery = {
|
|
@@ -968,6 +978,16 @@ type IaeActionRedirectToWeb = {
|
|
|
968
978
|
type EmbeddedDisclosurePolicy = {
|
|
969
979
|
policy: string;
|
|
970
980
|
};
|
|
981
|
+
type KeyAttestationsRequired = {
|
|
982
|
+
/**
|
|
983
|
+
* List of required key storage types (e.g., iso_18045_high, iso_18045_moderate)
|
|
984
|
+
*/
|
|
985
|
+
key_storage?: Array<string>;
|
|
986
|
+
/**
|
|
987
|
+
* List of required user authentication types (e.g., iso_18045_high, iso_18045_moderate)
|
|
988
|
+
*/
|
|
989
|
+
user_authentication?: Array<string>;
|
|
990
|
+
};
|
|
971
991
|
type DisplayImage = {
|
|
972
992
|
uri: string;
|
|
973
993
|
};
|
|
@@ -980,8 +1000,38 @@ type Display = {
|
|
|
980
1000
|
background_image?: DisplayImage;
|
|
981
1001
|
logo?: DisplayImage;
|
|
982
1002
|
};
|
|
983
|
-
type
|
|
984
|
-
|
|
1003
|
+
type ClaimDisplayInfo = {
|
|
1004
|
+
/**
|
|
1005
|
+
* Human-readable name for the claim
|
|
1006
|
+
*/
|
|
1007
|
+
name?: string;
|
|
1008
|
+
/**
|
|
1009
|
+
* Locale identifier (e.g., en-US, de-DE)
|
|
1010
|
+
*/
|
|
1011
|
+
locale?: string;
|
|
1012
|
+
};
|
|
1013
|
+
type ClaimMetadata = {
|
|
1014
|
+
/**
|
|
1015
|
+
* Path to the claim. For SD-JWT: JSONPath-like array. For mDOC: [namespace, claim_name]
|
|
1016
|
+
*/
|
|
1017
|
+
path: Array<string>;
|
|
1018
|
+
/**
|
|
1019
|
+
* Whether this claim must be disclosed
|
|
1020
|
+
*/
|
|
1021
|
+
mandatory?: boolean;
|
|
1022
|
+
/**
|
|
1023
|
+
* Display information for the claim in different locales
|
|
1024
|
+
*/
|
|
1025
|
+
display?: Array<ClaimDisplayInfo>;
|
|
1026
|
+
};
|
|
1027
|
+
type IssuerMetadataCredentialConfig = {
|
|
1028
|
+
/**
|
|
1029
|
+
* Key attestation requirements for JWT proofs for this credential.
|
|
1030
|
+
* When set, this is published in proof_types_supported.jwt.key_attestations_required
|
|
1031
|
+
* for this specific credential configuration.
|
|
1032
|
+
*/
|
|
1033
|
+
keyAttestationsRequired?: KeyAttestationsRequired;
|
|
1034
|
+
format: "mso_mdoc" | "dc+sd-jwt";
|
|
985
1035
|
display: Array<Display>;
|
|
986
1036
|
scope?: string;
|
|
987
1037
|
/**
|
|
@@ -1008,6 +1058,120 @@ type IssuerMetadataCredentialConfig = {
|
|
|
1008
1058
|
claimsByNamespace?: {
|
|
1009
1059
|
[key: string]: unknown;
|
|
1010
1060
|
};
|
|
1061
|
+
/**
|
|
1062
|
+
* Claims metadata for wallet rendering.
|
|
1063
|
+
* Follows the OID4VCI credential_metadata.claims specification.
|
|
1064
|
+
* Each claim includes a path (JSONPath-like array), optional mandatory flag,
|
|
1065
|
+
* and display information with multi-language support.
|
|
1066
|
+
*
|
|
1067
|
+
* Example:
|
|
1068
|
+
* [
|
|
1069
|
+
* { "path": ["given_name"], "mandatory": false, "display": [{ "name": "Given Name", "locale": "en-US" }] },
|
|
1070
|
+
* { "path": ["address", "street_address"], "display": [{ "name": "Street Address", "locale": "en-US" }] }
|
|
1071
|
+
* ]
|
|
1072
|
+
*/
|
|
1073
|
+
claimsMetadata?: Array<ClaimMetadata>;
|
|
1074
|
+
};
|
|
1075
|
+
type AttributeProviderEntity = {
|
|
1076
|
+
auth: WebHookAuthConfigNone | WebHookAuthConfigHeader;
|
|
1077
|
+
id: string;
|
|
1078
|
+
tenantId: string;
|
|
1079
|
+
tenant: TenantEntity;
|
|
1080
|
+
name: string;
|
|
1081
|
+
description?: string;
|
|
1082
|
+
url: string;
|
|
1083
|
+
};
|
|
1084
|
+
type WebhookEndpointEntity = {
|
|
1085
|
+
auth: WebHookAuthConfigNone | WebHookAuthConfigHeader;
|
|
1086
|
+
id: string;
|
|
1087
|
+
tenantId: string;
|
|
1088
|
+
tenant: TenantEntity;
|
|
1089
|
+
name: string;
|
|
1090
|
+
description?: string;
|
|
1091
|
+
url: string;
|
|
1092
|
+
};
|
|
1093
|
+
type KeyChainEntity = {
|
|
1094
|
+
/**
|
|
1095
|
+
* Unique identifier for the key chain.
|
|
1096
|
+
* This is the ID referenced by other entities (e.g., issuance config's signingKeyId).
|
|
1097
|
+
*/
|
|
1098
|
+
id: string;
|
|
1099
|
+
/**
|
|
1100
|
+
* Tenant ID for the key chain.
|
|
1101
|
+
*/
|
|
1102
|
+
tenantId: string;
|
|
1103
|
+
/**
|
|
1104
|
+
* The tenant that owns this key chain.
|
|
1105
|
+
*/
|
|
1106
|
+
tenant: TenantEntity;
|
|
1107
|
+
/**
|
|
1108
|
+
* Human-readable description of the key chain.
|
|
1109
|
+
*/
|
|
1110
|
+
description?: string;
|
|
1111
|
+
/**
|
|
1112
|
+
* The purpose/role of this key chain in the system.
|
|
1113
|
+
*/
|
|
1114
|
+
usageType: "access" | "attestation" | "trustList" | "statusList" | "encrypt";
|
|
1115
|
+
/**
|
|
1116
|
+
* The usage type of the keys (sign or encrypt).
|
|
1117
|
+
*/
|
|
1118
|
+
usage: "sign" | "encrypt";
|
|
1119
|
+
/**
|
|
1120
|
+
* The KMS provider used for this key chain.
|
|
1121
|
+
* References a configured KMS provider name.
|
|
1122
|
+
*/
|
|
1123
|
+
kmsProvider: string;
|
|
1124
|
+
/**
|
|
1125
|
+
* External key identifier for cloud KMS providers.
|
|
1126
|
+
* This field stores the provider-specific key reference for the active signing key.
|
|
1127
|
+
*/
|
|
1128
|
+
externalKeyId?: string;
|
|
1129
|
+
rootKey?: {
|
|
1130
|
+
[key: string]: unknown;
|
|
1131
|
+
};
|
|
1132
|
+
/**
|
|
1133
|
+
* Root CA certificate in PEM format.
|
|
1134
|
+
* Self-signed certificate for the root CA key.
|
|
1135
|
+
*/
|
|
1136
|
+
rootCertificate?: string;
|
|
1137
|
+
activeKey: {
|
|
1138
|
+
[key: string]: unknown;
|
|
1139
|
+
};
|
|
1140
|
+
/**
|
|
1141
|
+
* Certificate for the active signing key in PEM format.
|
|
1142
|
+
* Either CA-signed (if rootKey exists) or self-signed.
|
|
1143
|
+
*/
|
|
1144
|
+
activeCertificate: string;
|
|
1145
|
+
rotationEnabled: boolean;
|
|
1146
|
+
/**
|
|
1147
|
+
* Rotation interval in days. Key material will be rotated after this many days.
|
|
1148
|
+
*/
|
|
1149
|
+
rotationIntervalDays?: number;
|
|
1150
|
+
/**
|
|
1151
|
+
* Certificate validity in days when generating new certificates.
|
|
1152
|
+
*/
|
|
1153
|
+
certValidityDays?: number;
|
|
1154
|
+
/**
|
|
1155
|
+
* Timestamp of when the key was last rotated.
|
|
1156
|
+
*/
|
|
1157
|
+
lastRotatedAt?: string;
|
|
1158
|
+
previousKey?: {
|
|
1159
|
+
[key: string]: unknown;
|
|
1160
|
+
};
|
|
1161
|
+
/**
|
|
1162
|
+
* Certificate for the previous signing key in PEM format.
|
|
1163
|
+
*/
|
|
1164
|
+
previousCertificate?: string;
|
|
1165
|
+
/**
|
|
1166
|
+
* Expiry date for the previous key.
|
|
1167
|
+
* After this date, the previous key should be deleted.
|
|
1168
|
+
*/
|
|
1169
|
+
previousKeyExpiry?: string;
|
|
1170
|
+
createdAt: string;
|
|
1171
|
+
/**
|
|
1172
|
+
* The timestamp when the key chain was last updated.
|
|
1173
|
+
*/
|
|
1174
|
+
updatedAt: string;
|
|
1011
1175
|
};
|
|
1012
1176
|
type SchemaResponse = {
|
|
1013
1177
|
$schema: string;
|
|
@@ -1045,25 +1209,27 @@ type CredentialConfig = {
|
|
|
1045
1209
|
[key: string]: unknown;
|
|
1046
1210
|
};
|
|
1047
1211
|
/**
|
|
1048
|
-
*
|
|
1212
|
+
* Reference to the attribute provider used for fetching claims.
|
|
1213
|
+
* Optional: if set, claims will be fetched from this provider during issuance.
|
|
1049
1214
|
*/
|
|
1050
|
-
|
|
1215
|
+
attributeProviderId?: string;
|
|
1216
|
+
attributeProvider?: AttributeProviderEntity;
|
|
1051
1217
|
/**
|
|
1052
|
-
*
|
|
1218
|
+
* Reference to the webhook endpoint used for notifications.
|
|
1219
|
+
* Optional: if set, notifications will be sent to this endpoint.
|
|
1053
1220
|
*/
|
|
1054
|
-
|
|
1221
|
+
webhookEndpointId?: string;
|
|
1222
|
+
webhookEndpoint?: WebhookEndpointEntity;
|
|
1055
1223
|
disclosureFrame?: {
|
|
1056
1224
|
[key: string]: unknown;
|
|
1057
1225
|
};
|
|
1058
1226
|
keyBinding?: boolean;
|
|
1059
1227
|
/**
|
|
1060
|
-
* Reference to the
|
|
1061
|
-
*
|
|
1062
|
-
* (id + tenantId) and SET NULL behavior cannot work when tenantId is
|
|
1063
|
-
* part of this entity's own PK.
|
|
1228
|
+
* Reference to the key chain used for signing.
|
|
1229
|
+
* Optional: if not specified, the default attestation key chain will be used.
|
|
1064
1230
|
*/
|
|
1065
|
-
|
|
1066
|
-
|
|
1231
|
+
keyChainId?: string;
|
|
1232
|
+
keyChain?: KeyChainEntity;
|
|
1067
1233
|
statusManagement?: boolean;
|
|
1068
1234
|
lifeTime?: number;
|
|
1069
1235
|
schema?: SchemaResponse;
|
|
@@ -1090,24 +1256,24 @@ type CredentialConfigCreate = {
|
|
|
1090
1256
|
[key: string]: unknown;
|
|
1091
1257
|
};
|
|
1092
1258
|
/**
|
|
1093
|
-
*
|
|
1259
|
+
* Reference to the attribute provider used for fetching claims.
|
|
1260
|
+
* Optional: if set, claims will be fetched from this provider during issuance.
|
|
1094
1261
|
*/
|
|
1095
|
-
|
|
1262
|
+
attributeProviderId?: string;
|
|
1096
1263
|
/**
|
|
1097
|
-
*
|
|
1264
|
+
* Reference to the webhook endpoint used for notifications.
|
|
1265
|
+
* Optional: if set, notifications will be sent to this endpoint.
|
|
1098
1266
|
*/
|
|
1099
|
-
|
|
1267
|
+
webhookEndpointId?: string;
|
|
1100
1268
|
disclosureFrame?: {
|
|
1101
1269
|
[key: string]: unknown;
|
|
1102
1270
|
};
|
|
1103
1271
|
keyBinding?: boolean;
|
|
1104
1272
|
/**
|
|
1105
|
-
* Reference to the
|
|
1106
|
-
*
|
|
1107
|
-
* (id + tenantId) and SET NULL behavior cannot work when tenantId is
|
|
1108
|
-
* part of this entity's own PK.
|
|
1273
|
+
* Reference to the key chain used for signing.
|
|
1274
|
+
* Optional: if not specified, the default attestation key chain will be used.
|
|
1109
1275
|
*/
|
|
1110
|
-
|
|
1276
|
+
keyChainId?: string;
|
|
1111
1277
|
statusManagement?: boolean;
|
|
1112
1278
|
lifeTime?: number;
|
|
1113
1279
|
schema?: SchemaResponse;
|
|
@@ -1134,37 +1300,92 @@ type CredentialConfigUpdate = {
|
|
|
1134
1300
|
[key: string]: unknown;
|
|
1135
1301
|
};
|
|
1136
1302
|
/**
|
|
1137
|
-
*
|
|
1303
|
+
* Reference to the attribute provider used for fetching claims.
|
|
1304
|
+
* Optional: if set, claims will be fetched from this provider during issuance.
|
|
1138
1305
|
*/
|
|
1139
|
-
|
|
1306
|
+
attributeProviderId?: string;
|
|
1140
1307
|
/**
|
|
1141
|
-
*
|
|
1308
|
+
* Reference to the webhook endpoint used for notifications.
|
|
1309
|
+
* Optional: if set, notifications will be sent to this endpoint.
|
|
1142
1310
|
*/
|
|
1143
|
-
|
|
1311
|
+
webhookEndpointId?: string;
|
|
1144
1312
|
disclosureFrame?: {
|
|
1145
1313
|
[key: string]: unknown;
|
|
1146
1314
|
};
|
|
1147
1315
|
keyBinding?: boolean;
|
|
1148
1316
|
/**
|
|
1149
|
-
* Reference to the
|
|
1150
|
-
*
|
|
1151
|
-
* (id + tenantId) and SET NULL behavior cannot work when tenantId is
|
|
1152
|
-
* part of this entity's own PK.
|
|
1317
|
+
* Reference to the key chain used for signing.
|
|
1318
|
+
* Optional: if not specified, the default attestation key chain will be used.
|
|
1153
1319
|
*/
|
|
1154
|
-
|
|
1320
|
+
keyChainId?: string;
|
|
1155
1321
|
statusManagement?: boolean;
|
|
1156
1322
|
lifeTime?: number;
|
|
1157
1323
|
schema?: SchemaResponse;
|
|
1158
1324
|
};
|
|
1325
|
+
type CreateAttributeProviderDto = {
|
|
1326
|
+
auth: WebHookAuthConfigNone | WebHookAuthConfigHeader;
|
|
1327
|
+
id: string;
|
|
1328
|
+
name: string;
|
|
1329
|
+
description?: string;
|
|
1330
|
+
url: string;
|
|
1331
|
+
};
|
|
1332
|
+
type UpdateAttributeProviderDto = {
|
|
1333
|
+
auth?: WebHookAuthConfigNone | WebHookAuthConfigHeader;
|
|
1334
|
+
id?: string;
|
|
1335
|
+
name?: string;
|
|
1336
|
+
description?: string;
|
|
1337
|
+
url?: string;
|
|
1338
|
+
};
|
|
1339
|
+
type CreateWebhookEndpointDto = {
|
|
1340
|
+
auth: WebHookAuthConfigNone | WebHookAuthConfigHeader;
|
|
1341
|
+
id: string;
|
|
1342
|
+
name: string;
|
|
1343
|
+
description?: string;
|
|
1344
|
+
url: string;
|
|
1345
|
+
};
|
|
1346
|
+
type UpdateWebhookEndpointDto = {
|
|
1347
|
+
auth?: WebHookAuthConfigNone | WebHookAuthConfigHeader;
|
|
1348
|
+
id?: string;
|
|
1349
|
+
name?: string;
|
|
1350
|
+
description?: string;
|
|
1351
|
+
url?: string;
|
|
1352
|
+
};
|
|
1159
1353
|
type Dcql = {
|
|
1160
1354
|
credentials: Array<CredentialQuery>;
|
|
1161
1355
|
credential_sets?: Array<CredentialSetQuery>;
|
|
1162
1356
|
};
|
|
1357
|
+
type RegistrationCertificatePurpose = {
|
|
1358
|
+
lang: string;
|
|
1359
|
+
value: string;
|
|
1360
|
+
};
|
|
1361
|
+
type RegistrationCertificateBody = {
|
|
1362
|
+
privacy_policy: string;
|
|
1363
|
+
support_uri: string;
|
|
1364
|
+
intermediary?: string;
|
|
1365
|
+
purpose?: Array<RegistrationCertificatePurpose>;
|
|
1366
|
+
credentials?: Array<{
|
|
1367
|
+
[key: string]: unknown;
|
|
1368
|
+
}>;
|
|
1369
|
+
provided_attestations?: Array<{
|
|
1370
|
+
[key: string]: unknown;
|
|
1371
|
+
}>;
|
|
1372
|
+
};
|
|
1163
1373
|
type RegistrationCertificateRequest = {
|
|
1164
1374
|
/**
|
|
1165
|
-
*
|
|
1375
|
+
* Optional registrar-side certificate identifier.
|
|
1376
|
+
* If provided and still valid, EUDIPLO reuses it instead of creating a new certificate.
|
|
1166
1377
|
*/
|
|
1167
|
-
|
|
1378
|
+
id?: string;
|
|
1379
|
+
/**
|
|
1380
|
+
* Registration certificate creation payload.
|
|
1381
|
+
* This is merged with tenant-level registrar defaults when a certificate is created.
|
|
1382
|
+
*/
|
|
1383
|
+
body?: RegistrationCertificateBody;
|
|
1384
|
+
/**
|
|
1385
|
+
* Optional pre-existing registration certificate JWT.
|
|
1386
|
+
* If provided, EUDIPLO forwards it as-is and does not create a new one.
|
|
1387
|
+
*/
|
|
1388
|
+
jwt?: string;
|
|
1168
1389
|
};
|
|
1169
1390
|
type PresentationAttachment = {
|
|
1170
1391
|
format: string;
|
|
@@ -1174,6 +1395,12 @@ type PresentationAttachment = {
|
|
|
1174
1395
|
credential_ids?: Array<string>;
|
|
1175
1396
|
};
|
|
1176
1397
|
type PresentationConfig = {
|
|
1398
|
+
/**
|
|
1399
|
+
* Server-managed cache of the materialized registration certificate. Read-only; values supplied by clients are ignored.
|
|
1400
|
+
*/
|
|
1401
|
+
readonly registrationCertCache?: {
|
|
1402
|
+
[key: string]: unknown;
|
|
1403
|
+
};
|
|
1177
1404
|
/**
|
|
1178
1405
|
* Unique identifier for the VP request.
|
|
1179
1406
|
*/
|
|
@@ -1229,7 +1456,13 @@ type PresentationConfig = {
|
|
|
1229
1456
|
* that reference only part of a composite primary key. The relationship is handled
|
|
1230
1457
|
* at the application level in the service layer.
|
|
1231
1458
|
*/
|
|
1232
|
-
|
|
1459
|
+
accessKeyChainId?: string;
|
|
1460
|
+
};
|
|
1461
|
+
type ResolveIssuerMetadataDto = {
|
|
1462
|
+
/**
|
|
1463
|
+
* Issuer URL or full OpenID4VCI metadata URL to resolve server-side.
|
|
1464
|
+
*/
|
|
1465
|
+
issuerUrl: string;
|
|
1233
1466
|
};
|
|
1234
1467
|
type PresentationConfigCreateDto = {
|
|
1235
1468
|
/**
|
|
@@ -1275,7 +1508,7 @@ type PresentationConfigCreateDto = {
|
|
|
1275
1508
|
* that reference only part of a composite primary key. The relationship is handled
|
|
1276
1509
|
* at the application level in the service layer.
|
|
1277
1510
|
*/
|
|
1278
|
-
|
|
1511
|
+
accessKeyChainId?: string;
|
|
1279
1512
|
};
|
|
1280
1513
|
type PresentationConfigUpdateDto = {
|
|
1281
1514
|
/**
|
|
@@ -1321,7 +1554,109 @@ type PresentationConfigUpdateDto = {
|
|
|
1321
1554
|
* that reference only part of a composite primary key. The relationship is handled
|
|
1322
1555
|
* at the application level in the service layer.
|
|
1323
1556
|
*/
|
|
1324
|
-
|
|
1557
|
+
accessKeyChainId?: string;
|
|
1558
|
+
};
|
|
1559
|
+
type RegistrarConfigResponseDto = {
|
|
1560
|
+
/**
|
|
1561
|
+
* The base URL of the registrar API
|
|
1562
|
+
*/
|
|
1563
|
+
registrarUrl: string;
|
|
1564
|
+
/**
|
|
1565
|
+
* The OIDC issuer URL for authentication (e.g., Keycloak realm URL)
|
|
1566
|
+
*/
|
|
1567
|
+
oidcUrl: string;
|
|
1568
|
+
/**
|
|
1569
|
+
* The OIDC client ID for the registrar
|
|
1570
|
+
*/
|
|
1571
|
+
clientId: string;
|
|
1572
|
+
/**
|
|
1573
|
+
* The OIDC client secret (optional, for confidential clients)
|
|
1574
|
+
*/
|
|
1575
|
+
clientSecret?: string;
|
|
1576
|
+
/**
|
|
1577
|
+
* The username for OIDC login
|
|
1578
|
+
*/
|
|
1579
|
+
username: string;
|
|
1580
|
+
/**
|
|
1581
|
+
* Optional default values merged into registration certificate creation requests (for example privacy_policy, support_uri, provided_attestations)
|
|
1582
|
+
*/
|
|
1583
|
+
registrationCertificateDefaults?: {
|
|
1584
|
+
[key: string]: unknown;
|
|
1585
|
+
};
|
|
1586
|
+
/**
|
|
1587
|
+
* Indicates whether a password is configured (actual password is never returned)
|
|
1588
|
+
*/
|
|
1589
|
+
hasPassword: boolean;
|
|
1590
|
+
};
|
|
1591
|
+
type CreateRegistrarConfigDto = {
|
|
1592
|
+
/**
|
|
1593
|
+
* The base URL of the registrar API
|
|
1594
|
+
*/
|
|
1595
|
+
registrarUrl: string;
|
|
1596
|
+
/**
|
|
1597
|
+
* The OIDC issuer URL for authentication (e.g., Keycloak realm URL)
|
|
1598
|
+
*/
|
|
1599
|
+
oidcUrl: string;
|
|
1600
|
+
/**
|
|
1601
|
+
* The OIDC client ID for the registrar
|
|
1602
|
+
*/
|
|
1603
|
+
clientId: string;
|
|
1604
|
+
/**
|
|
1605
|
+
* The OIDC client secret (optional, for confidential clients)
|
|
1606
|
+
*/
|
|
1607
|
+
clientSecret?: string;
|
|
1608
|
+
/**
|
|
1609
|
+
* The username for OIDC login
|
|
1610
|
+
*/
|
|
1611
|
+
username: string;
|
|
1612
|
+
/**
|
|
1613
|
+
* The password for OIDC login (stored in plaintext)
|
|
1614
|
+
*/
|
|
1615
|
+
password: string;
|
|
1616
|
+
/**
|
|
1617
|
+
* Optional default values merged into registration certificate creation requests (for example privacy_policy, support_uri, provided_attestations)
|
|
1618
|
+
*/
|
|
1619
|
+
registrationCertificateDefaults?: {
|
|
1620
|
+
[key: string]: unknown;
|
|
1621
|
+
};
|
|
1622
|
+
};
|
|
1623
|
+
type UpdateRegistrarConfigDto = {
|
|
1624
|
+
/**
|
|
1625
|
+
* The base URL of the registrar API
|
|
1626
|
+
*/
|
|
1627
|
+
registrarUrl?: string;
|
|
1628
|
+
/**
|
|
1629
|
+
* The OIDC issuer URL for authentication (e.g., Keycloak realm URL)
|
|
1630
|
+
*/
|
|
1631
|
+
oidcUrl?: string;
|
|
1632
|
+
/**
|
|
1633
|
+
* The OIDC client ID for the registrar
|
|
1634
|
+
*/
|
|
1635
|
+
clientId?: string;
|
|
1636
|
+
/**
|
|
1637
|
+
* The OIDC client secret (optional, for confidential clients)
|
|
1638
|
+
*/
|
|
1639
|
+
clientSecret?: string;
|
|
1640
|
+
/**
|
|
1641
|
+
* The username for OIDC login
|
|
1642
|
+
*/
|
|
1643
|
+
username?: string;
|
|
1644
|
+
/**
|
|
1645
|
+
* The password for OIDC login (stored in plaintext)
|
|
1646
|
+
*/
|
|
1647
|
+
password?: string;
|
|
1648
|
+
/**
|
|
1649
|
+
* Optional default values merged into registration certificate creation requests (for example privacy_policy, support_uri, provided_attestations)
|
|
1650
|
+
*/
|
|
1651
|
+
registrationCertificateDefaults?: {
|
|
1652
|
+
[key: string]: unknown;
|
|
1653
|
+
};
|
|
1654
|
+
};
|
|
1655
|
+
type CreateAccessCertificateDto = {
|
|
1656
|
+
/**
|
|
1657
|
+
* The ID of the key to create an access certificate for
|
|
1658
|
+
*/
|
|
1659
|
+
keyId: string;
|
|
1325
1660
|
};
|
|
1326
1661
|
type DeferredCredentialRequestDto = {
|
|
1327
1662
|
/**
|
|
@@ -1335,6 +1670,9 @@ type NotificationRequestDto = {
|
|
|
1335
1670
|
[key: string]: unknown;
|
|
1336
1671
|
};
|
|
1337
1672
|
};
|
|
1673
|
+
type Object$1 = {
|
|
1674
|
+
[key: string]: unknown;
|
|
1675
|
+
};
|
|
1338
1676
|
type ParResponseDto = {
|
|
1339
1677
|
/**
|
|
1340
1678
|
* The request URI for the Pushed Authorization Request.
|
|
@@ -1429,46 +1767,6 @@ type InteractiveAuthorizationErrorResponseDto = {
|
|
|
1429
1767
|
*/
|
|
1430
1768
|
error_description?: string;
|
|
1431
1769
|
};
|
|
1432
|
-
type ChainedAsParRequestDto = {
|
|
1433
|
-
/**
|
|
1434
|
-
* OAuth response type (must be 'code')
|
|
1435
|
-
*/
|
|
1436
|
-
response_type: string;
|
|
1437
|
-
/**
|
|
1438
|
-
* Client identifier (wallet identifier)
|
|
1439
|
-
*/
|
|
1440
|
-
client_id: string;
|
|
1441
|
-
/**
|
|
1442
|
-
* URI to redirect the wallet after authorization
|
|
1443
|
-
*/
|
|
1444
|
-
redirect_uri: string;
|
|
1445
|
-
/**
|
|
1446
|
-
* PKCE code challenge
|
|
1447
|
-
*/
|
|
1448
|
-
code_challenge?: string;
|
|
1449
|
-
/**
|
|
1450
|
-
* PKCE code challenge method (e.g., S256)
|
|
1451
|
-
*/
|
|
1452
|
-
code_challenge_method?: string;
|
|
1453
|
-
/**
|
|
1454
|
-
* State parameter (returned in redirect)
|
|
1455
|
-
*/
|
|
1456
|
-
state?: string;
|
|
1457
|
-
/**
|
|
1458
|
-
* Scope requested
|
|
1459
|
-
*/
|
|
1460
|
-
scope?: string;
|
|
1461
|
-
/**
|
|
1462
|
-
* Issuer state from credential offer
|
|
1463
|
-
*/
|
|
1464
|
-
issuer_state?: string;
|
|
1465
|
-
/**
|
|
1466
|
-
* Authorization details (JSON array)
|
|
1467
|
-
*/
|
|
1468
|
-
authorization_details?: Array<{
|
|
1469
|
-
[key: string]: unknown;
|
|
1470
|
-
}>;
|
|
1471
|
-
};
|
|
1472
1770
|
type ChainedAsParResponseDto = {
|
|
1473
1771
|
/**
|
|
1474
1772
|
* The request URI to use at the authorization endpoint
|
|
@@ -1491,13 +1789,17 @@ type ChainedAsErrorResponseDto = {
|
|
|
1491
1789
|
};
|
|
1492
1790
|
type ChainedAsTokenRequestDto = {
|
|
1493
1791
|
/**
|
|
1494
|
-
* Grant type (
|
|
1792
|
+
* Grant type ('authorization_code' or 'refresh_token')
|
|
1495
1793
|
*/
|
|
1496
1794
|
grant_type: string;
|
|
1497
1795
|
/**
|
|
1498
|
-
* Authorization code received in the callback
|
|
1796
|
+
* Authorization code received in the callback (authorization_code grant)
|
|
1499
1797
|
*/
|
|
1500
|
-
code
|
|
1798
|
+
code?: string;
|
|
1799
|
+
/**
|
|
1800
|
+
* Refresh token (refresh_token grant)
|
|
1801
|
+
*/
|
|
1802
|
+
refresh_token?: string;
|
|
1501
1803
|
/**
|
|
1502
1804
|
* Client identifier
|
|
1503
1805
|
*/
|
|
@@ -1542,6 +1844,10 @@ type ChainedAsTokenResponseDto = {
|
|
|
1542
1844
|
* C_NONCE lifetime in seconds
|
|
1543
1845
|
*/
|
|
1544
1846
|
c_nonce_expires_in?: number;
|
|
1847
|
+
/**
|
|
1848
|
+
* Refresh token (issued when refresh tokens are enabled)
|
|
1849
|
+
*/
|
|
1850
|
+
refresh_token?: string;
|
|
1545
1851
|
};
|
|
1546
1852
|
type OfferResponse = {
|
|
1547
1853
|
uri: string;
|
|
@@ -1605,112 +1911,51 @@ type JwksResponseDto = {
|
|
|
1605
1911
|
};
|
|
1606
1912
|
type AuthorizationResponse = {
|
|
1607
1913
|
/**
|
|
1608
|
-
* The response string containing the authorization details.
|
|
1914
|
+
* The response string containing the authorization details (JWE-encrypted VP token).
|
|
1915
|
+
* Required for success responses, absent for error responses.
|
|
1609
1916
|
*/
|
|
1610
|
-
response
|
|
1917
|
+
response?: string;
|
|
1611
1918
|
/**
|
|
1612
1919
|
* When set to true, the authorization response will be sent to the client.
|
|
1613
1920
|
*/
|
|
1614
1921
|
sendResponse?: boolean;
|
|
1615
|
-
|
|
1616
|
-
type RegistrarConfigEntity = {
|
|
1617
|
-
/**
|
|
1618
|
-
* The base URL of the registrar API
|
|
1619
|
-
*/
|
|
1620
|
-
registrarUrl: string;
|
|
1621
|
-
/**
|
|
1622
|
-
* The OIDC issuer URL for authentication (e.g., Keycloak realm URL)
|
|
1623
|
-
*/
|
|
1624
|
-
oidcUrl: string;
|
|
1625
|
-
/**
|
|
1626
|
-
* The OIDC client ID for the registrar
|
|
1627
|
-
*/
|
|
1628
|
-
clientId: string;
|
|
1629
|
-
/**
|
|
1630
|
-
* The OIDC client secret (optional, for confidential clients)
|
|
1631
|
-
*/
|
|
1632
|
-
clientSecret?: string;
|
|
1633
|
-
/**
|
|
1634
|
-
* The username for OIDC login
|
|
1635
|
-
*/
|
|
1636
|
-
username: string;
|
|
1637
|
-
/**
|
|
1638
|
-
* The password for OIDC login (stored in plaintext)
|
|
1639
|
-
*/
|
|
1640
|
-
password: string;
|
|
1641
|
-
/**
|
|
1642
|
-
* The tenant ID this configuration belongs to.
|
|
1643
|
-
*/
|
|
1644
|
-
tenantId: string;
|
|
1645
|
-
/**
|
|
1646
|
-
* The tenant that owns this configuration.
|
|
1647
|
-
*/
|
|
1648
|
-
tenant: TenantEntity;
|
|
1649
|
-
};
|
|
1650
|
-
type CreateRegistrarConfigDto = {
|
|
1651
|
-
/**
|
|
1652
|
-
* The base URL of the registrar API
|
|
1653
|
-
*/
|
|
1654
|
-
registrarUrl: string;
|
|
1655
|
-
/**
|
|
1656
|
-
* The OIDC issuer URL for authentication (e.g., Keycloak realm URL)
|
|
1657
|
-
*/
|
|
1658
|
-
oidcUrl: string;
|
|
1659
|
-
/**
|
|
1660
|
-
* The OIDC client ID for the registrar
|
|
1661
|
-
*/
|
|
1662
|
-
clientId: string;
|
|
1663
|
-
/**
|
|
1664
|
-
* The OIDC client secret (optional, for confidential clients)
|
|
1665
|
-
*/
|
|
1666
|
-
clientSecret?: string;
|
|
1667
|
-
/**
|
|
1668
|
-
* The username for OIDC login
|
|
1669
|
-
*/
|
|
1670
|
-
username: string;
|
|
1671
|
-
/**
|
|
1672
|
-
* The password for OIDC login (stored in plaintext)
|
|
1673
|
-
*/
|
|
1674
|
-
password: string;
|
|
1675
|
-
};
|
|
1676
|
-
type UpdateRegistrarConfigDto = {
|
|
1677
|
-
/**
|
|
1678
|
-
* The base URL of the registrar API
|
|
1679
|
-
*/
|
|
1680
|
-
registrarUrl?: string;
|
|
1681
|
-
/**
|
|
1682
|
-
* The OIDC issuer URL for authentication (e.g., Keycloak realm URL)
|
|
1683
|
-
*/
|
|
1684
|
-
oidcUrl?: string;
|
|
1922
|
+
error?: string;
|
|
1685
1923
|
/**
|
|
1686
|
-
*
|
|
1924
|
+
* Human-readable description of the error.
|
|
1687
1925
|
*/
|
|
1688
|
-
|
|
1926
|
+
error_description?: string;
|
|
1689
1927
|
/**
|
|
1690
|
-
*
|
|
1928
|
+
* URI with additional information about the error.
|
|
1691
1929
|
*/
|
|
1692
|
-
|
|
1930
|
+
error_uri?: string;
|
|
1693
1931
|
/**
|
|
1694
|
-
*
|
|
1932
|
+
* State value from the authorization request (for correlation).
|
|
1695
1933
|
*/
|
|
1696
|
-
|
|
1697
|
-
/**
|
|
1698
|
-
* The password for OIDC login (stored in plaintext)
|
|
1699
|
-
*/
|
|
1700
|
-
password?: string;
|
|
1934
|
+
state?: string;
|
|
1701
1935
|
};
|
|
1702
|
-
type
|
|
1703
|
-
|
|
1704
|
-
|
|
1705
|
-
|
|
1706
|
-
|
|
1936
|
+
type TrustListEntityInfo = {
|
|
1937
|
+
name: string;
|
|
1938
|
+
lang?: string;
|
|
1939
|
+
uri?: string;
|
|
1940
|
+
country?: string;
|
|
1941
|
+
locality?: string;
|
|
1942
|
+
postalCode?: string;
|
|
1943
|
+
streetAddress?: string;
|
|
1944
|
+
contactUri?: string;
|
|
1945
|
+
};
|
|
1946
|
+
type InternalTrustListEntity = {
|
|
1947
|
+
type: "internal";
|
|
1948
|
+
issuerKeyChainId: string;
|
|
1949
|
+
revocationKeyChainId: string;
|
|
1950
|
+
info: TrustListEntityInfo;
|
|
1951
|
+
};
|
|
1952
|
+
type ExternalTrustListEntity = {
|
|
1953
|
+
type: "external";
|
|
1954
|
+
issuerCertPem: string;
|
|
1955
|
+
revocationCertPem: string;
|
|
1956
|
+
info: TrustListEntityInfo;
|
|
1707
1957
|
};
|
|
1708
1958
|
type TrustListCreateDto = {
|
|
1709
|
-
id?: string;
|
|
1710
|
-
certId?: string;
|
|
1711
|
-
entities: Array<{
|
|
1712
|
-
[key: string]: unknown;
|
|
1713
|
-
}>;
|
|
1714
1959
|
description?: string;
|
|
1715
1960
|
/**
|
|
1716
1961
|
* The full trust list JSON (generated LoTE structure)
|
|
@@ -1718,6 +1963,13 @@ type TrustListCreateDto = {
|
|
|
1718
1963
|
data?: {
|
|
1719
1964
|
[key: string]: unknown;
|
|
1720
1965
|
};
|
|
1966
|
+
entities: Array<({
|
|
1967
|
+
type: "internal";
|
|
1968
|
+
} & InternalTrustListEntity) | ({
|
|
1969
|
+
type: "external";
|
|
1970
|
+
} & ExternalTrustListEntity)>;
|
|
1971
|
+
id?: string;
|
|
1972
|
+
keyChainId?: string;
|
|
1721
1973
|
};
|
|
1722
1974
|
type TrustList = {
|
|
1723
1975
|
/**
|
|
@@ -1733,8 +1985,8 @@ type TrustList = {
|
|
|
1733
1985
|
* The tenant that owns this object.
|
|
1734
1986
|
*/
|
|
1735
1987
|
tenant: TenantEntity;
|
|
1736
|
-
|
|
1737
|
-
|
|
1988
|
+
keyChainId: string;
|
|
1989
|
+
keyChain: KeyChainEntity;
|
|
1738
1990
|
/**
|
|
1739
1991
|
* The full trust list JSON (generated LoTE structure)
|
|
1740
1992
|
*/
|
|
@@ -1786,29 +2038,6 @@ type TrustListVersion = {
|
|
|
1786
2038
|
jwt: string;
|
|
1787
2039
|
createdAt: string;
|
|
1788
2040
|
};
|
|
1789
|
-
type DbKmsConfigDto = {
|
|
1790
|
-
[key: string]: unknown;
|
|
1791
|
-
};
|
|
1792
|
-
type VaultKmsConfigDto = {
|
|
1793
|
-
/**
|
|
1794
|
-
* URL of the HashiCorp Vault instance. Supports ${ENV_VAR} placeholders.
|
|
1795
|
-
*/
|
|
1796
|
-
vaultUrl: string;
|
|
1797
|
-
/**
|
|
1798
|
-
* Authentication token for HashiCorp Vault. Supports ${ENV_VAR} placeholders.
|
|
1799
|
-
*/
|
|
1800
|
-
vaultToken: string;
|
|
1801
|
-
};
|
|
1802
|
-
type KmsConfigDto = {
|
|
1803
|
-
/**
|
|
1804
|
-
* Name of the default KMS provider. Defaults to "db" if not set.
|
|
1805
|
-
*/
|
|
1806
|
-
defaultProvider?: string;
|
|
1807
|
-
providers: {
|
|
1808
|
-
db?: DbKmsConfigDto;
|
|
1809
|
-
vault?: VaultKmsConfigDto;
|
|
1810
|
-
};
|
|
1811
|
-
};
|
|
1812
2041
|
type KmsProviderCapabilitiesDto = {
|
|
1813
2042
|
/**
|
|
1814
2043
|
* Whether the provider supports importing existing keys.
|
|
@@ -1825,9 +2054,17 @@ type KmsProviderCapabilitiesDto = {
|
|
|
1825
2054
|
};
|
|
1826
2055
|
type KmsProviderInfoDto = {
|
|
1827
2056
|
/**
|
|
1828
|
-
* Unique provider
|
|
2057
|
+
* Unique provider ID (matches the id in kms.json).
|
|
1829
2058
|
*/
|
|
1830
2059
|
name: string;
|
|
2060
|
+
/**
|
|
2061
|
+
* Type of the KMS provider (db, vault, aws-kms).
|
|
2062
|
+
*/
|
|
2063
|
+
type: string;
|
|
2064
|
+
/**
|
|
2065
|
+
* Human-readable description of this provider instance.
|
|
2066
|
+
*/
|
|
2067
|
+
description?: string;
|
|
1831
2068
|
/**
|
|
1832
2069
|
* Capabilities of this provider.
|
|
1833
2070
|
*/
|
|
@@ -1843,55 +2080,316 @@ type KmsProvidersResponseDto = {
|
|
|
1843
2080
|
*/
|
|
1844
2081
|
default: string;
|
|
1845
2082
|
};
|
|
1846
|
-
type
|
|
2083
|
+
type CertificateInfoDto = {
|
|
1847
2084
|
/**
|
|
1848
|
-
*
|
|
2085
|
+
* Certificate in PEM format.
|
|
1849
2086
|
*/
|
|
1850
|
-
|
|
2087
|
+
pem: string;
|
|
2088
|
+
/**
|
|
2089
|
+
* Certificate subject (CN).
|
|
2090
|
+
*/
|
|
2091
|
+
subject?: string;
|
|
2092
|
+
/**
|
|
2093
|
+
* Certificate issuer (CN).
|
|
2094
|
+
*/
|
|
2095
|
+
issuer?: string;
|
|
2096
|
+
/**
|
|
2097
|
+
* Certificate not before date.
|
|
2098
|
+
*/
|
|
2099
|
+
notBefore?: string;
|
|
2100
|
+
/**
|
|
2101
|
+
* Certificate not after date.
|
|
2102
|
+
*/
|
|
2103
|
+
notAfter?: string;
|
|
2104
|
+
/**
|
|
2105
|
+
* Serial number.
|
|
2106
|
+
*/
|
|
2107
|
+
serialNumber?: string;
|
|
2108
|
+
};
|
|
2109
|
+
type PublicKeyInfoDto = {
|
|
2110
|
+
/**
|
|
2111
|
+
* Key type (e.g., EC).
|
|
2112
|
+
*/
|
|
2113
|
+
kty: string;
|
|
2114
|
+
/**
|
|
2115
|
+
* Key algorithm (e.g., ES256).
|
|
2116
|
+
*/
|
|
2117
|
+
alg?: string;
|
|
2118
|
+
/**
|
|
2119
|
+
* Key ID.
|
|
2120
|
+
*/
|
|
2121
|
+
kid?: string;
|
|
2122
|
+
/**
|
|
2123
|
+
* Curve (for EC keys).
|
|
2124
|
+
*/
|
|
2125
|
+
crv?: string;
|
|
2126
|
+
};
|
|
2127
|
+
type RotationPolicyResponseDto = {
|
|
1851
2128
|
/**
|
|
1852
|
-
*
|
|
2129
|
+
* Whether automatic key rotation is enabled.
|
|
2130
|
+
*/
|
|
2131
|
+
enabled: boolean;
|
|
2132
|
+
/**
|
|
2133
|
+
* Rotation interval in days.
|
|
2134
|
+
*/
|
|
2135
|
+
intervalDays?: number;
|
|
2136
|
+
/**
|
|
2137
|
+
* Certificate validity in days.
|
|
2138
|
+
*/
|
|
2139
|
+
certValidityDays?: number;
|
|
2140
|
+
/**
|
|
2141
|
+
* Next scheduled rotation date.
|
|
2142
|
+
*/
|
|
2143
|
+
nextRotationAt?: string;
|
|
2144
|
+
};
|
|
2145
|
+
type KeyChainResponseDto = {
|
|
2146
|
+
/**
|
|
2147
|
+
* Unique identifier for the key chain.
|
|
2148
|
+
*/
|
|
2149
|
+
id: string;
|
|
2150
|
+
/**
|
|
2151
|
+
* Usage type of the key chain.
|
|
2152
|
+
*/
|
|
2153
|
+
usageType: "access" | "attestation" | "trustList" | "statusList" | "encrypt";
|
|
2154
|
+
/**
|
|
2155
|
+
* Type of key chain (standalone or internalChain).
|
|
2156
|
+
*/
|
|
2157
|
+
type: "standalone" | "internalChain";
|
|
2158
|
+
/**
|
|
2159
|
+
* Human-readable description.
|
|
1853
2160
|
*/
|
|
1854
2161
|
description?: string;
|
|
2162
|
+
/**
|
|
2163
|
+
* KMS provider used for this key chain.
|
|
2164
|
+
*/
|
|
2165
|
+
kmsProvider: string;
|
|
2166
|
+
/**
|
|
2167
|
+
* Root CA certificate (only for internalChain type).
|
|
2168
|
+
*/
|
|
2169
|
+
rootCertificate?: CertificateInfoDto;
|
|
2170
|
+
/**
|
|
2171
|
+
* Active signing key's public key info.
|
|
2172
|
+
*/
|
|
2173
|
+
activePublicKey: PublicKeyInfoDto;
|
|
2174
|
+
/**
|
|
2175
|
+
* Active signing key's certificate. Not present for encryption keys.
|
|
2176
|
+
*/
|
|
2177
|
+
activeCertificate?: CertificateInfoDto;
|
|
2178
|
+
/**
|
|
2179
|
+
* Previous signing key's public key info (if in grace period).
|
|
2180
|
+
*/
|
|
2181
|
+
previousPublicKey?: PublicKeyInfoDto;
|
|
2182
|
+
/**
|
|
2183
|
+
* Previous signing key's certificate (if in grace period).
|
|
2184
|
+
*/
|
|
2185
|
+
previousCertificate?: CertificateInfoDto;
|
|
2186
|
+
/**
|
|
2187
|
+
* Previous key expiry date.
|
|
2188
|
+
*/
|
|
2189
|
+
previousKeyExpiry?: string;
|
|
2190
|
+
/**
|
|
2191
|
+
* Rotation policy configuration.
|
|
2192
|
+
*/
|
|
2193
|
+
rotationPolicy: RotationPolicyResponseDto;
|
|
2194
|
+
/**
|
|
2195
|
+
* Timestamp when the key chain was created.
|
|
2196
|
+
*/
|
|
2197
|
+
createdAt: string;
|
|
2198
|
+
/**
|
|
2199
|
+
* Timestamp when the key chain was last updated.
|
|
2200
|
+
*/
|
|
2201
|
+
updatedAt: string;
|
|
1855
2202
|
};
|
|
1856
|
-
type
|
|
2203
|
+
type ExportEcJwk = {
|
|
2204
|
+
/**
|
|
2205
|
+
* Key type
|
|
2206
|
+
*/
|
|
1857
2207
|
kty: string;
|
|
2208
|
+
/**
|
|
2209
|
+
* Curve
|
|
2210
|
+
*/
|
|
2211
|
+
crv: string;
|
|
2212
|
+
/**
|
|
2213
|
+
* X coordinate (base64url)
|
|
2214
|
+
*/
|
|
1858
2215
|
x: string;
|
|
2216
|
+
/**
|
|
2217
|
+
* Y coordinate (base64url)
|
|
2218
|
+
*/
|
|
1859
2219
|
y: string;
|
|
1860
|
-
|
|
2220
|
+
/**
|
|
2221
|
+
* Private key (base64url)
|
|
2222
|
+
*/
|
|
1861
2223
|
d: string;
|
|
1862
|
-
|
|
2224
|
+
/**
|
|
2225
|
+
* Algorithm
|
|
2226
|
+
*/
|
|
2227
|
+
alg?: string;
|
|
2228
|
+
/**
|
|
2229
|
+
* Key ID
|
|
2230
|
+
*/
|
|
2231
|
+
kid?: string;
|
|
1863
2232
|
};
|
|
1864
|
-
type
|
|
2233
|
+
type ExportRotationPolicyDto = {
|
|
1865
2234
|
/**
|
|
1866
|
-
*
|
|
2235
|
+
* Whether rotation is enabled.
|
|
1867
2236
|
*/
|
|
1868
|
-
|
|
2237
|
+
enabled: boolean;
|
|
1869
2238
|
/**
|
|
1870
|
-
*
|
|
2239
|
+
* Rotation interval in days.
|
|
1871
2240
|
*/
|
|
1872
|
-
|
|
2241
|
+
intervalDays?: number;
|
|
1873
2242
|
/**
|
|
1874
|
-
*
|
|
2243
|
+
* Certificate validity in days.
|
|
2244
|
+
*/
|
|
2245
|
+
certValidityDays?: number;
|
|
2246
|
+
};
|
|
2247
|
+
type KeyChainExportDto = {
|
|
2248
|
+
/**
|
|
2249
|
+
* Key chain ID.
|
|
1875
2250
|
*/
|
|
1876
2251
|
id: string;
|
|
1877
2252
|
/**
|
|
1878
|
-
*
|
|
2253
|
+
* Human-readable description.
|
|
2254
|
+
*/
|
|
2255
|
+
description?: string;
|
|
2256
|
+
/**
|
|
2257
|
+
* Usage type for this key chain.
|
|
2258
|
+
*/
|
|
2259
|
+
usageType: "access" | "attestation" | "trustList" | "statusList" | "encrypt";
|
|
2260
|
+
/**
|
|
2261
|
+
* The private key in JWK format (EC).
|
|
2262
|
+
*/
|
|
2263
|
+
key: ExportEcJwk;
|
|
2264
|
+
/**
|
|
2265
|
+
* Certificate chain in PEM format (leaf first, then intermediates/CA).
|
|
2266
|
+
*/
|
|
2267
|
+
crt?: Array<string>;
|
|
2268
|
+
/**
|
|
2269
|
+
* KMS provider name.
|
|
2270
|
+
*/
|
|
2271
|
+
kmsProvider?: string;
|
|
2272
|
+
/**
|
|
2273
|
+
* Rotation policy.
|
|
2274
|
+
*/
|
|
2275
|
+
rotationPolicy?: ExportRotationPolicyDto;
|
|
2276
|
+
};
|
|
2277
|
+
type RotationPolicyCreateDto = {
|
|
2278
|
+
/**
|
|
2279
|
+
* Whether automatic key rotation is enabled.
|
|
2280
|
+
*/
|
|
2281
|
+
enabled: boolean;
|
|
2282
|
+
/**
|
|
2283
|
+
* Rotation interval in days. Required when enabled is true.
|
|
2284
|
+
*/
|
|
2285
|
+
intervalDays?: number;
|
|
2286
|
+
/**
|
|
2287
|
+
* Certificate validity in days. Defaults to rotation interval + 30 days grace period.
|
|
2288
|
+
*/
|
|
2289
|
+
certValidityDays?: number;
|
|
2290
|
+
};
|
|
2291
|
+
type KeyChainCreateDto = {
|
|
2292
|
+
/**
|
|
2293
|
+
* Usage type determines the purpose of this key chain (access, attestation, etc.).
|
|
2294
|
+
*/
|
|
2295
|
+
usageType: "access" | "attestation" | "trustList" | "statusList" | "encrypt";
|
|
2296
|
+
/**
|
|
2297
|
+
* Type of key chain to create.
|
|
2298
|
+
*/
|
|
2299
|
+
type: "standalone" | "internalChain";
|
|
2300
|
+
/**
|
|
2301
|
+
* Human-readable description for the key chain.
|
|
1879
2302
|
*/
|
|
1880
2303
|
description?: string;
|
|
2304
|
+
/**
|
|
2305
|
+
* KMS provider to use (defaults to the configured default provider).
|
|
2306
|
+
*/
|
|
2307
|
+
kmsProvider?: string;
|
|
2308
|
+
/**
|
|
2309
|
+
* Rotation policy configuration. Only applicable for the signing key (root CA never rotates).
|
|
2310
|
+
*/
|
|
2311
|
+
rotationPolicy?: RotationPolicyCreateDto;
|
|
1881
2312
|
};
|
|
1882
|
-
type
|
|
2313
|
+
type EcJwk = {
|
|
2314
|
+
kty: string;
|
|
2315
|
+
x: string;
|
|
2316
|
+
y: string;
|
|
2317
|
+
crv: string;
|
|
2318
|
+
d: string;
|
|
2319
|
+
alg?: string;
|
|
2320
|
+
kid?: string;
|
|
2321
|
+
};
|
|
2322
|
+
type RotationPolicyImportDto = {
|
|
2323
|
+
/**
|
|
2324
|
+
* Whether rotation is enabled. When true, the imported key becomes a root CA.
|
|
2325
|
+
*/
|
|
2326
|
+
enabled: boolean;
|
|
1883
2327
|
/**
|
|
1884
|
-
*
|
|
2328
|
+
* Rotation interval in days.
|
|
2329
|
+
*/
|
|
2330
|
+
intervalDays?: number;
|
|
2331
|
+
/**
|
|
2332
|
+
* Certificate validity in days.
|
|
2333
|
+
*/
|
|
2334
|
+
certValidityDays?: number;
|
|
2335
|
+
};
|
|
2336
|
+
type KeyChainImportDto = {
|
|
2337
|
+
/**
|
|
2338
|
+
* ID for the key chain. If not provided, a new UUID will be generated.
|
|
2339
|
+
*/
|
|
2340
|
+
id?: string;
|
|
2341
|
+
/**
|
|
2342
|
+
* The private key in JWK format.
|
|
2343
|
+
*/
|
|
2344
|
+
key: EcJwk;
|
|
2345
|
+
/**
|
|
2346
|
+
* Human-readable description.
|
|
2347
|
+
*/
|
|
2348
|
+
description?: string;
|
|
2349
|
+
/**
|
|
2350
|
+
* Usage type for this key chain.
|
|
2351
|
+
*/
|
|
2352
|
+
usageType: "access" | "attestation" | "trustList" | "statusList" | "encrypt";
|
|
2353
|
+
/**
|
|
2354
|
+
* Certificate chain in PEM format (leaf first, then intermediates/CA).
|
|
2355
|
+
*/
|
|
2356
|
+
crt?: Array<string>;
|
|
2357
|
+
/**
|
|
2358
|
+
* KMS provider to use. Defaults to 'db'.
|
|
1885
2359
|
*/
|
|
1886
2360
|
kmsProvider?: string;
|
|
1887
2361
|
/**
|
|
1888
|
-
*
|
|
2362
|
+
* Rotation policy. When enabled, the imported key becomes a root CA and a new leaf key is generated.
|
|
1889
2363
|
*/
|
|
1890
|
-
|
|
2364
|
+
rotationPolicy?: RotationPolicyImportDto;
|
|
2365
|
+
};
|
|
2366
|
+
type RotationPolicyUpdateDto = {
|
|
2367
|
+
/**
|
|
2368
|
+
* Whether automatic key rotation is enabled.
|
|
2369
|
+
*/
|
|
2370
|
+
enabled?: boolean;
|
|
2371
|
+
/**
|
|
2372
|
+
* Rotation interval in days.
|
|
2373
|
+
*/
|
|
2374
|
+
intervalDays?: number;
|
|
1891
2375
|
/**
|
|
1892
|
-
*
|
|
2376
|
+
* Certificate validity in days.
|
|
2377
|
+
*/
|
|
2378
|
+
certValidityDays?: number;
|
|
2379
|
+
};
|
|
2380
|
+
type KeyChainUpdateDto = {
|
|
2381
|
+
/**
|
|
2382
|
+
* Human-readable description for the key chain.
|
|
1893
2383
|
*/
|
|
1894
2384
|
description?: string;
|
|
2385
|
+
/**
|
|
2386
|
+
* Rotation policy configuration.
|
|
2387
|
+
*/
|
|
2388
|
+
rotationPolicy?: RotationPolicyUpdateDto;
|
|
2389
|
+
/**
|
|
2390
|
+
* Active certificate chain in PEM format. Used for external certificate updates.
|
|
2391
|
+
*/
|
|
2392
|
+
activeCertificate?: string;
|
|
1895
2393
|
};
|
|
1896
2394
|
type PresentationRequest = {
|
|
1897
2395
|
/**
|
|
@@ -1921,124 +2419,97 @@ type PresentationRequest = {
|
|
|
1921
2419
|
type FileUploadDto = {
|
|
1922
2420
|
file: Blob | File;
|
|
1923
2421
|
};
|
|
1924
|
-
type
|
|
1925
|
-
body?: never;
|
|
1926
|
-
path?: never;
|
|
1927
|
-
query?: never;
|
|
1928
|
-
url: "/";
|
|
1929
|
-
};
|
|
1930
|
-
type AppControllerMainResponses = {
|
|
1931
|
-
200: unknown;
|
|
1932
|
-
};
|
|
1933
|
-
type HealthControllerCheckData = {
|
|
1934
|
-
body?: never;
|
|
1935
|
-
path?: never;
|
|
1936
|
-
query?: never;
|
|
1937
|
-
url: "/health";
|
|
1938
|
-
};
|
|
1939
|
-
type HealthControllerCheckErrors = {
|
|
2422
|
+
type PresentationConfigWritable = {
|
|
1940
2423
|
/**
|
|
1941
|
-
*
|
|
2424
|
+
* Unique identifier for the VP request.
|
|
1942
2425
|
*/
|
|
1943
|
-
|
|
1944
|
-
status?: string;
|
|
1945
|
-
info?: {
|
|
1946
|
-
[key: string]: {
|
|
1947
|
-
status: string;
|
|
1948
|
-
[key: string]: unknown | string;
|
|
1949
|
-
};
|
|
1950
|
-
};
|
|
1951
|
-
error?: {
|
|
1952
|
-
[key: string]: {
|
|
1953
|
-
status: string;
|
|
1954
|
-
[key: string]: unknown | string;
|
|
1955
|
-
};
|
|
1956
|
-
};
|
|
1957
|
-
details?: {
|
|
1958
|
-
[key: string]: {
|
|
1959
|
-
status: string;
|
|
1960
|
-
[key: string]: unknown | string;
|
|
1961
|
-
};
|
|
1962
|
-
};
|
|
1963
|
-
};
|
|
1964
|
-
};
|
|
1965
|
-
type HealthControllerCheckError = HealthControllerCheckErrors[keyof HealthControllerCheckErrors];
|
|
1966
|
-
type HealthControllerCheckResponses = {
|
|
2426
|
+
id: string;
|
|
1967
2427
|
/**
|
|
1968
|
-
* The
|
|
2428
|
+
* The tenant that owns this object.
|
|
1969
2429
|
*/
|
|
1970
|
-
|
|
1971
|
-
status?: string;
|
|
1972
|
-
info?: {
|
|
1973
|
-
[key: string]: {
|
|
1974
|
-
status: string;
|
|
1975
|
-
[key: string]: unknown | string;
|
|
1976
|
-
};
|
|
1977
|
-
};
|
|
1978
|
-
error?: {
|
|
1979
|
-
[key: string]: {
|
|
1980
|
-
status: string;
|
|
1981
|
-
[key: string]: unknown | string;
|
|
1982
|
-
};
|
|
1983
|
-
};
|
|
1984
|
-
details?: {
|
|
1985
|
-
[key: string]: {
|
|
1986
|
-
status: string;
|
|
1987
|
-
[key: string]: unknown | string;
|
|
1988
|
-
};
|
|
1989
|
-
};
|
|
1990
|
-
};
|
|
1991
|
-
};
|
|
1992
|
-
type HealthControllerCheckResponse = HealthControllerCheckResponses[keyof HealthControllerCheckResponses];
|
|
1993
|
-
type AuthControllerGetOAuth2TokenData = {
|
|
1994
|
-
body: ClientCredentialsDto;
|
|
1995
|
-
path?: never;
|
|
1996
|
-
query?: never;
|
|
1997
|
-
url: "/oauth2/token";
|
|
1998
|
-
};
|
|
1999
|
-
type AuthControllerGetOAuth2TokenErrors = {
|
|
2430
|
+
tenant: TenantEntity;
|
|
2000
2431
|
/**
|
|
2001
|
-
*
|
|
2432
|
+
* Description of the presentation configuration.
|
|
2002
2433
|
*/
|
|
2003
|
-
|
|
2004
|
-
|
|
2005
|
-
|
|
2434
|
+
description?: string;
|
|
2435
|
+
/**
|
|
2436
|
+
* Lifetime how long the presentation request is valid after creation, in seconds.
|
|
2437
|
+
*/
|
|
2438
|
+
lifeTime?: number;
|
|
2439
|
+
/**
|
|
2440
|
+
* The DCQL query to be used for the VP request.
|
|
2441
|
+
*/
|
|
2442
|
+
dcql_query: Dcql;
|
|
2443
|
+
transaction_data?: Array<TransactionData>;
|
|
2006
2444
|
/**
|
|
2007
|
-
*
|
|
2445
|
+
* The registration certificate request containing the necessary details.
|
|
2446
|
+
*/
|
|
2447
|
+
registrationCert?: RegistrationCertificateRequest;
|
|
2448
|
+
/**
|
|
2449
|
+
* Optional webhook URL to receive the response.
|
|
2450
|
+
*/
|
|
2451
|
+
webhook?: WebhookConfig;
|
|
2452
|
+
/**
|
|
2453
|
+
* The timestamp when the VP request was created.
|
|
2008
2454
|
*/
|
|
2009
|
-
|
|
2010
|
-
|
|
2455
|
+
createdAt: string;
|
|
2456
|
+
/**
|
|
2457
|
+
* The timestamp when the VP request was last updated.
|
|
2458
|
+
*/
|
|
2459
|
+
updatedAt: string;
|
|
2460
|
+
/**
|
|
2461
|
+
* Attestation that should be attached
|
|
2462
|
+
*/
|
|
2463
|
+
attached?: Array<PresentationAttachment>;
|
|
2464
|
+
/**
|
|
2465
|
+
* Redirect URI to which the user-agent should be redirected after the presentation is completed.
|
|
2466
|
+
* You can use the `{sessionId}` placeholder in the URI, which will be replaced with the actual session ID.
|
|
2467
|
+
*/
|
|
2468
|
+
redirectUri?: string;
|
|
2469
|
+
/**
|
|
2470
|
+
* Optional ID of the access certificate to use for signing the presentation request.
|
|
2471
|
+
* If not provided, the default access certificate for the tenant will be used.
|
|
2472
|
+
*
|
|
2473
|
+
* Note: This is intentionally NOT a TypeORM relationship because CertEntity uses
|
|
2474
|
+
* a composite primary key (id + tenantId), and SQLite cannot create foreign keys
|
|
2475
|
+
* that reference only part of a composite primary key. The relationship is handled
|
|
2476
|
+
* at the application level in the service layer.
|
|
2477
|
+
*/
|
|
2478
|
+
accessKeyChainId?: string;
|
|
2479
|
+
};
|
|
2480
|
+
type ObjectWritable = {
|
|
2481
|
+
[key: string]: unknown;
|
|
2011
2482
|
};
|
|
2012
|
-
type
|
|
2013
|
-
type AuthControllerGetOidcDiscoveryData = {
|
|
2483
|
+
type AppControllerGetVersionData = {
|
|
2014
2484
|
body?: never;
|
|
2015
2485
|
path?: never;
|
|
2016
2486
|
query?: never;
|
|
2017
|
-
url: "
|
|
2487
|
+
url: "/api/version";
|
|
2018
2488
|
};
|
|
2019
|
-
type
|
|
2489
|
+
type AppControllerGetVersionResponses = {
|
|
2020
2490
|
/**
|
|
2021
|
-
*
|
|
2491
|
+
* Service version info
|
|
2022
2492
|
*/
|
|
2023
2493
|
200: unknown;
|
|
2024
2494
|
};
|
|
2025
|
-
type
|
|
2495
|
+
type AppControllerGetFrontendConfigData = {
|
|
2026
2496
|
body?: never;
|
|
2027
2497
|
path?: never;
|
|
2028
2498
|
query?: never;
|
|
2029
|
-
url: "
|
|
2499
|
+
url: "/api/frontend-config";
|
|
2030
2500
|
};
|
|
2031
|
-
type
|
|
2501
|
+
type AppControllerGetFrontendConfigResponses = {
|
|
2032
2502
|
/**
|
|
2033
|
-
*
|
|
2503
|
+
* Frontend configuration
|
|
2034
2504
|
*/
|
|
2035
|
-
200:
|
|
2505
|
+
200: FrontendConfigResponseDto;
|
|
2036
2506
|
};
|
|
2507
|
+
type AppControllerGetFrontendConfigResponse = AppControllerGetFrontendConfigResponses[keyof AppControllerGetFrontendConfigResponses];
|
|
2037
2508
|
type TenantControllerGetTenantsData = {
|
|
2038
2509
|
body?: never;
|
|
2039
2510
|
path?: never;
|
|
2040
2511
|
query?: never;
|
|
2041
|
-
url: "/tenant";
|
|
2512
|
+
url: "/api/tenant";
|
|
2042
2513
|
};
|
|
2043
2514
|
type TenantControllerGetTenantsResponses = {
|
|
2044
2515
|
200: Array<TenantEntity>;
|
|
@@ -2048,7 +2519,7 @@ type TenantControllerInitTenantData = {
|
|
|
2048
2519
|
body: CreateTenantDto;
|
|
2049
2520
|
path?: never;
|
|
2050
2521
|
query?: never;
|
|
2051
|
-
url: "/tenant";
|
|
2522
|
+
url: "/api/tenant";
|
|
2052
2523
|
};
|
|
2053
2524
|
type TenantControllerInitTenantResponses = {
|
|
2054
2525
|
201: {
|
|
@@ -2062,7 +2533,7 @@ type TenantControllerDeleteTenantData = {
|
|
|
2062
2533
|
id: string;
|
|
2063
2534
|
};
|
|
2064
2535
|
query?: never;
|
|
2065
|
-
url: "/tenant/{id}";
|
|
2536
|
+
url: "/api/tenant/{id}";
|
|
2066
2537
|
};
|
|
2067
2538
|
type TenantControllerDeleteTenantResponses = {
|
|
2068
2539
|
200: unknown;
|
|
@@ -2073,7 +2544,7 @@ type TenantControllerGetTenantData = {
|
|
|
2073
2544
|
id: string;
|
|
2074
2545
|
};
|
|
2075
2546
|
query?: never;
|
|
2076
|
-
url: "/tenant/{id}";
|
|
2547
|
+
url: "/api/tenant/{id}";
|
|
2077
2548
|
};
|
|
2078
2549
|
type TenantControllerGetTenantResponses = {
|
|
2079
2550
|
200: TenantEntity;
|
|
@@ -2085,7 +2556,7 @@ type TenantControllerUpdateTenantData = {
|
|
|
2085
2556
|
id: string;
|
|
2086
2557
|
};
|
|
2087
2558
|
query?: never;
|
|
2088
|
-
url: "/tenant/{id}";
|
|
2559
|
+
url: "/api/tenant/{id}";
|
|
2089
2560
|
};
|
|
2090
2561
|
type TenantControllerUpdateTenantResponses = {
|
|
2091
2562
|
200: TenantEntity;
|
|
@@ -2095,184 +2566,88 @@ type ClientControllerGetClientsData = {
|
|
|
2095
2566
|
body?: never;
|
|
2096
2567
|
path?: never;
|
|
2097
2568
|
query?: never;
|
|
2098
|
-
url: "/client";
|
|
2569
|
+
url: "/api/client";
|
|
2099
2570
|
};
|
|
2100
2571
|
type ClientControllerGetClientsResponses = {
|
|
2101
2572
|
200: Array<ClientEntity>;
|
|
2102
2573
|
};
|
|
2103
|
-
type ClientControllerGetClientsResponse = ClientControllerGetClientsResponses[keyof ClientControllerGetClientsResponses];
|
|
2104
|
-
type ClientControllerCreateClientData = {
|
|
2105
|
-
body: CreateClientDto;
|
|
2106
|
-
path?: never;
|
|
2107
|
-
query?: never;
|
|
2108
|
-
url: "/client";
|
|
2109
|
-
};
|
|
2110
|
-
type ClientControllerCreateClientResponses = {
|
|
2111
|
-
201: ClientEntity;
|
|
2112
|
-
};
|
|
2113
|
-
type ClientControllerCreateClientResponse = ClientControllerCreateClientResponses[keyof ClientControllerCreateClientResponses];
|
|
2114
|
-
type ClientControllerDeleteClientData = {
|
|
2115
|
-
body?: never;
|
|
2116
|
-
path: {
|
|
2117
|
-
id: string;
|
|
2118
|
-
};
|
|
2119
|
-
query?: never;
|
|
2120
|
-
url: "/client/{id}";
|
|
2121
|
-
};
|
|
2122
|
-
type ClientControllerDeleteClientResponses = {
|
|
2123
|
-
200: unknown;
|
|
2124
|
-
};
|
|
2125
|
-
type ClientControllerGetClientData = {
|
|
2126
|
-
body?: never;
|
|
2127
|
-
path: {
|
|
2128
|
-
id: string;
|
|
2129
|
-
};
|
|
2130
|
-
query?: never;
|
|
2131
|
-
url: "/client/{id}";
|
|
2132
|
-
};
|
|
2133
|
-
type ClientControllerGetClientResponses = {
|
|
2134
|
-
200: ClientEntity;
|
|
2135
|
-
};
|
|
2136
|
-
type ClientControllerGetClientResponse = ClientControllerGetClientResponses[keyof ClientControllerGetClientResponses];
|
|
2137
|
-
type ClientControllerUpdateClientData = {
|
|
2138
|
-
body: UpdateClientDto;
|
|
2139
|
-
path: {
|
|
2140
|
-
id: string;
|
|
2141
|
-
};
|
|
2142
|
-
query?: never;
|
|
2143
|
-
url: "/client/{id}";
|
|
2144
|
-
};
|
|
2145
|
-
type ClientControllerUpdateClientResponses = {
|
|
2146
|
-
200: {
|
|
2147
|
-
[key: string]: unknown;
|
|
2148
|
-
};
|
|
2149
|
-
};
|
|
2150
|
-
type ClientControllerUpdateClientResponse = ClientControllerUpdateClientResponses[keyof ClientControllerUpdateClientResponses];
|
|
2151
|
-
type ClientControllerGetClientSecretData = {
|
|
2152
|
-
body?: never;
|
|
2153
|
-
path: {
|
|
2154
|
-
id: string;
|
|
2155
|
-
};
|
|
2156
|
-
query?: never;
|
|
2157
|
-
url: "/client/{id}/secret";
|
|
2158
|
-
};
|
|
2159
|
-
type ClientControllerGetClientSecretResponses = {
|
|
2160
|
-
200: ClientSecretResponseDto;
|
|
2161
|
-
};
|
|
2162
|
-
type ClientControllerGetClientSecretResponse = ClientControllerGetClientSecretResponses[keyof ClientControllerGetClientSecretResponses];
|
|
2163
|
-
type ClientControllerRotateClientSecretData = {
|
|
2164
|
-
body?: never;
|
|
2165
|
-
path: {
|
|
2166
|
-
id: string;
|
|
2167
|
-
};
|
|
2168
|
-
query?: never;
|
|
2169
|
-
url: "/client/{id}/rotate-secret";
|
|
2170
|
-
};
|
|
2171
|
-
type ClientControllerRotateClientSecretResponses = {
|
|
2172
|
-
201: ClientSecretResponseDto;
|
|
2173
|
-
};
|
|
2174
|
-
type ClientControllerRotateClientSecretResponse = ClientControllerRotateClientSecretResponses[keyof ClientControllerRotateClientSecretResponses];
|
|
2175
|
-
type CertControllerGetCertificatesData = {
|
|
2176
|
-
body?: never;
|
|
2177
|
-
path?: never;
|
|
2178
|
-
query?: {
|
|
2179
|
-
keyId?: string;
|
|
2180
|
-
};
|
|
2181
|
-
url: "/certs";
|
|
2182
|
-
};
|
|
2183
|
-
type CertControllerGetCertificatesResponses = {
|
|
2184
|
-
200: Array<CertEntity>;
|
|
2185
|
-
};
|
|
2186
|
-
type CertControllerGetCertificatesResponse = CertControllerGetCertificatesResponses[keyof CertControllerGetCertificatesResponses];
|
|
2187
|
-
type CertControllerAddCertificateData = {
|
|
2188
|
-
body: CertImportDto;
|
|
2574
|
+
type ClientControllerGetClientsResponse = ClientControllerGetClientsResponses[keyof ClientControllerGetClientsResponses];
|
|
2575
|
+
type ClientControllerCreateClientData = {
|
|
2576
|
+
body: CreateClientDto;
|
|
2189
2577
|
path?: never;
|
|
2190
2578
|
query?: never;
|
|
2191
|
-
url: "/
|
|
2579
|
+
url: "/api/client";
|
|
2192
2580
|
};
|
|
2193
|
-
type
|
|
2194
|
-
201:
|
|
2581
|
+
type ClientControllerCreateClientResponses = {
|
|
2582
|
+
201: ClientEntity;
|
|
2195
2583
|
};
|
|
2196
|
-
type
|
|
2197
|
-
type
|
|
2584
|
+
type ClientControllerCreateClientResponse = ClientControllerCreateClientResponses[keyof ClientControllerCreateClientResponses];
|
|
2585
|
+
type ClientControllerDeleteClientData = {
|
|
2198
2586
|
body?: never;
|
|
2199
2587
|
path: {
|
|
2200
|
-
|
|
2588
|
+
id: string;
|
|
2201
2589
|
};
|
|
2202
2590
|
query?: never;
|
|
2203
|
-
url: "/
|
|
2591
|
+
url: "/api/client/{id}";
|
|
2204
2592
|
};
|
|
2205
|
-
type
|
|
2593
|
+
type ClientControllerDeleteClientResponses = {
|
|
2206
2594
|
200: unknown;
|
|
2207
2595
|
};
|
|
2208
|
-
type
|
|
2596
|
+
type ClientControllerGetClientData = {
|
|
2209
2597
|
body?: never;
|
|
2210
2598
|
path: {
|
|
2211
|
-
|
|
2599
|
+
id: string;
|
|
2212
2600
|
};
|
|
2213
2601
|
query?: never;
|
|
2214
|
-
url: "/
|
|
2602
|
+
url: "/api/client/{id}";
|
|
2215
2603
|
};
|
|
2216
|
-
type
|
|
2217
|
-
200:
|
|
2604
|
+
type ClientControllerGetClientResponses = {
|
|
2605
|
+
200: ClientEntity;
|
|
2218
2606
|
};
|
|
2219
|
-
type
|
|
2220
|
-
type
|
|
2221
|
-
body:
|
|
2607
|
+
type ClientControllerGetClientResponse = ClientControllerGetClientResponses[keyof ClientControllerGetClientResponses];
|
|
2608
|
+
type ClientControllerUpdateClientData = {
|
|
2609
|
+
body: UpdateClientDto;
|
|
2222
2610
|
path: {
|
|
2223
|
-
|
|
2611
|
+
id: string;
|
|
2224
2612
|
};
|
|
2225
2613
|
query?: never;
|
|
2226
|
-
url: "/
|
|
2227
|
-
};
|
|
2228
|
-
type CertControllerUpdateCertificateResponses = {
|
|
2229
|
-
200: unknown;
|
|
2614
|
+
url: "/api/client/{id}";
|
|
2230
2615
|
};
|
|
2231
|
-
type
|
|
2232
|
-
|
|
2233
|
-
|
|
2234
|
-
certId: string;
|
|
2616
|
+
type ClientControllerUpdateClientResponses = {
|
|
2617
|
+
200: {
|
|
2618
|
+
[key: string]: unknown;
|
|
2235
2619
|
};
|
|
2236
|
-
query?: never;
|
|
2237
|
-
url: "/certs/{certId}/config";
|
|
2238
|
-
};
|
|
2239
|
-
type CertControllerExportConfigResponses = {
|
|
2240
|
-
200: CertImportDto;
|
|
2241
2620
|
};
|
|
2242
|
-
type
|
|
2243
|
-
type
|
|
2621
|
+
type ClientControllerUpdateClientResponse = ClientControllerUpdateClientResponses[keyof ClientControllerUpdateClientResponses];
|
|
2622
|
+
type ClientControllerGetClientSecretData = {
|
|
2244
2623
|
body?: never;
|
|
2245
2624
|
path: {
|
|
2246
|
-
|
|
2247
|
-
listId: string;
|
|
2625
|
+
id: string;
|
|
2248
2626
|
};
|
|
2249
2627
|
query?: never;
|
|
2250
|
-
url: "/
|
|
2628
|
+
url: "/api/client/{id}/secret";
|
|
2251
2629
|
};
|
|
2252
|
-
type
|
|
2253
|
-
200:
|
|
2630
|
+
type ClientControllerGetClientSecretResponses = {
|
|
2631
|
+
200: ClientSecretResponseDto;
|
|
2254
2632
|
};
|
|
2255
|
-
type
|
|
2256
|
-
type
|
|
2633
|
+
type ClientControllerGetClientSecretResponse = ClientControllerGetClientSecretResponses[keyof ClientControllerGetClientSecretResponses];
|
|
2634
|
+
type ClientControllerRotateClientSecretData = {
|
|
2257
2635
|
body?: never;
|
|
2258
2636
|
path: {
|
|
2259
|
-
|
|
2637
|
+
id: string;
|
|
2260
2638
|
};
|
|
2261
2639
|
query?: never;
|
|
2262
|
-
url: "/{
|
|
2640
|
+
url: "/api/client/{id}/rotate-secret";
|
|
2263
2641
|
};
|
|
2264
|
-
type
|
|
2265
|
-
|
|
2266
|
-
* List of status list URIs
|
|
2267
|
-
*/
|
|
2268
|
-
200: StatusListAggregationDto;
|
|
2642
|
+
type ClientControllerRotateClientSecretResponses = {
|
|
2643
|
+
201: ClientSecretResponseDto;
|
|
2269
2644
|
};
|
|
2270
|
-
type
|
|
2645
|
+
type ClientControllerRotateClientSecretResponse = ClientControllerRotateClientSecretResponses[keyof ClientControllerRotateClientSecretResponses];
|
|
2271
2646
|
type StatusListConfigControllerResetConfigData = {
|
|
2272
2647
|
body?: never;
|
|
2273
2648
|
path?: never;
|
|
2274
2649
|
query?: never;
|
|
2275
|
-
url: "/status-list-config";
|
|
2650
|
+
url: "/api/status-list-config";
|
|
2276
2651
|
};
|
|
2277
2652
|
type StatusListConfigControllerResetConfigResponses = {
|
|
2278
2653
|
/**
|
|
@@ -2285,7 +2660,7 @@ type StatusListConfigControllerGetConfigData = {
|
|
|
2285
2660
|
body?: never;
|
|
2286
2661
|
path?: never;
|
|
2287
2662
|
query?: never;
|
|
2288
|
-
url: "/status-list-config";
|
|
2663
|
+
url: "/api/status-list-config";
|
|
2289
2664
|
};
|
|
2290
2665
|
type StatusListConfigControllerGetConfigResponses = {
|
|
2291
2666
|
/**
|
|
@@ -2298,7 +2673,7 @@ type StatusListConfigControllerUpdateConfigData = {
|
|
|
2298
2673
|
body: UpdateStatusListConfigDto;
|
|
2299
2674
|
path?: never;
|
|
2300
2675
|
query?: never;
|
|
2301
|
-
url: "/status-list-config";
|
|
2676
|
+
url: "/api/status-list-config";
|
|
2302
2677
|
};
|
|
2303
2678
|
type StatusListConfigControllerUpdateConfigResponses = {
|
|
2304
2679
|
/**
|
|
@@ -2311,7 +2686,7 @@ type StatusListManagementControllerGetListsData = {
|
|
|
2311
2686
|
body?: never;
|
|
2312
2687
|
path?: never;
|
|
2313
2688
|
query?: never;
|
|
2314
|
-
url: "/status-lists";
|
|
2689
|
+
url: "/api/status-lists";
|
|
2315
2690
|
};
|
|
2316
2691
|
type StatusListManagementControllerGetListsResponses = {
|
|
2317
2692
|
/**
|
|
@@ -2324,7 +2699,7 @@ type StatusListManagementControllerCreateListData = {
|
|
|
2324
2699
|
body: CreateStatusListDto;
|
|
2325
2700
|
path?: never;
|
|
2326
2701
|
query?: never;
|
|
2327
|
-
url: "/status-lists";
|
|
2702
|
+
url: "/api/status-lists";
|
|
2328
2703
|
};
|
|
2329
2704
|
type StatusListManagementControllerCreateListResponses = {
|
|
2330
2705
|
/**
|
|
@@ -2342,7 +2717,7 @@ type StatusListManagementControllerDeleteListData = {
|
|
|
2342
2717
|
listId: string;
|
|
2343
2718
|
};
|
|
2344
2719
|
query?: never;
|
|
2345
|
-
url: "/status-lists/{listId}";
|
|
2720
|
+
url: "/api/status-lists/{listId}";
|
|
2346
2721
|
};
|
|
2347
2722
|
type StatusListManagementControllerDeleteListResponses = {
|
|
2348
2723
|
/**
|
|
@@ -2360,7 +2735,7 @@ type StatusListManagementControllerGetListData = {
|
|
|
2360
2735
|
listId: string;
|
|
2361
2736
|
};
|
|
2362
2737
|
query?: never;
|
|
2363
|
-
url: "/status-lists/{listId}";
|
|
2738
|
+
url: "/api/status-lists/{listId}";
|
|
2364
2739
|
};
|
|
2365
2740
|
type StatusListManagementControllerGetListResponses = {
|
|
2366
2741
|
/**
|
|
@@ -2378,7 +2753,7 @@ type StatusListManagementControllerUpdateListData = {
|
|
|
2378
2753
|
listId: string;
|
|
2379
2754
|
};
|
|
2380
2755
|
query?: never;
|
|
2381
|
-
url: "/status-lists/{listId}";
|
|
2756
|
+
url: "/api/status-lists/{listId}";
|
|
2382
2757
|
};
|
|
2383
2758
|
type StatusListManagementControllerUpdateListResponses = {
|
|
2384
2759
|
/**
|
|
@@ -2391,7 +2766,7 @@ type SessionControllerGetAllSessionsData = {
|
|
|
2391
2766
|
body?: never;
|
|
2392
2767
|
path?: never;
|
|
2393
2768
|
query?: never;
|
|
2394
|
-
url: "/session";
|
|
2769
|
+
url: "/api/session";
|
|
2395
2770
|
};
|
|
2396
2771
|
type SessionControllerGetAllSessionsResponses = {
|
|
2397
2772
|
200: Array<Session>;
|
|
@@ -2403,7 +2778,7 @@ type SessionControllerDeleteSessionData = {
|
|
|
2403
2778
|
id: string;
|
|
2404
2779
|
};
|
|
2405
2780
|
query?: never;
|
|
2406
|
-
url: "/session/{id}";
|
|
2781
|
+
url: "/api/session/{id}";
|
|
2407
2782
|
};
|
|
2408
2783
|
type SessionControllerDeleteSessionResponses = {
|
|
2409
2784
|
200: unknown;
|
|
@@ -2417,17 +2792,32 @@ type SessionControllerGetSessionData = {
|
|
|
2417
2792
|
id: string;
|
|
2418
2793
|
};
|
|
2419
2794
|
query?: never;
|
|
2420
|
-
url: "/session/{id}";
|
|
2795
|
+
url: "/api/session/{id}";
|
|
2421
2796
|
};
|
|
2422
2797
|
type SessionControllerGetSessionResponses = {
|
|
2423
2798
|
200: Session;
|
|
2424
2799
|
};
|
|
2425
2800
|
type SessionControllerGetSessionResponse = SessionControllerGetSessionResponses[keyof SessionControllerGetSessionResponses];
|
|
2801
|
+
type SessionControllerGetSessionLogsData = {
|
|
2802
|
+
body?: never;
|
|
2803
|
+
path: {
|
|
2804
|
+
/**
|
|
2805
|
+
* The session ID
|
|
2806
|
+
*/
|
|
2807
|
+
id: string;
|
|
2808
|
+
};
|
|
2809
|
+
query?: never;
|
|
2810
|
+
url: "/api/session/{id}/logs";
|
|
2811
|
+
};
|
|
2812
|
+
type SessionControllerGetSessionLogsResponses = {
|
|
2813
|
+
200: Array<SessionLogEntryResponseDto>;
|
|
2814
|
+
};
|
|
2815
|
+
type SessionControllerGetSessionLogsResponse = SessionControllerGetSessionLogsResponses[keyof SessionControllerGetSessionLogsResponses];
|
|
2426
2816
|
type SessionControllerRevokeAllData = {
|
|
2427
2817
|
body: StatusUpdateDto;
|
|
2428
2818
|
path?: never;
|
|
2429
2819
|
query?: never;
|
|
2430
|
-
url: "/session/revoke";
|
|
2820
|
+
url: "/api/session/revoke";
|
|
2431
2821
|
};
|
|
2432
2822
|
type SessionControllerRevokeAllResponses = {
|
|
2433
2823
|
201: unknown;
|
|
@@ -2436,7 +2826,7 @@ type SessionConfigControllerResetConfigData = {
|
|
|
2436
2826
|
body?: never;
|
|
2437
2827
|
path?: never;
|
|
2438
2828
|
query?: never;
|
|
2439
|
-
url: "/session-config";
|
|
2829
|
+
url: "/api/session-config";
|
|
2440
2830
|
};
|
|
2441
2831
|
type SessionConfigControllerResetConfigResponses = {
|
|
2442
2832
|
/**
|
|
@@ -2448,7 +2838,7 @@ type SessionConfigControllerGetConfigData = {
|
|
|
2448
2838
|
body?: never;
|
|
2449
2839
|
path?: never;
|
|
2450
2840
|
query?: never;
|
|
2451
|
-
url: "/session-config";
|
|
2841
|
+
url: "/api/session-config";
|
|
2452
2842
|
};
|
|
2453
2843
|
type SessionConfigControllerGetConfigResponses = {
|
|
2454
2844
|
/**
|
|
@@ -2461,7 +2851,7 @@ type SessionConfigControllerUpdateConfigData = {
|
|
|
2461
2851
|
body: UpdateSessionConfigDto;
|
|
2462
2852
|
path?: never;
|
|
2463
2853
|
query?: never;
|
|
2464
|
-
url: "/session-config";
|
|
2854
|
+
url: "/api/session-config";
|
|
2465
2855
|
};
|
|
2466
2856
|
type SessionConfigControllerUpdateConfigResponses = {
|
|
2467
2857
|
/**
|
|
@@ -2484,7 +2874,7 @@ type SessionEventsControllerSubscribeToSessionEventsData = {
|
|
|
2484
2874
|
*/
|
|
2485
2875
|
token: string;
|
|
2486
2876
|
};
|
|
2487
|
-
url: "/session/{id}/events";
|
|
2877
|
+
url: "/api/session/{id}/events";
|
|
2488
2878
|
};
|
|
2489
2879
|
type SessionEventsControllerSubscribeToSessionEventsResponses = {
|
|
2490
2880
|
200: unknown;
|
|
@@ -2493,7 +2883,7 @@ type IssuanceConfigControllerGetIssuanceConfigurationsData = {
|
|
|
2493
2883
|
body?: never;
|
|
2494
2884
|
path?: never;
|
|
2495
2885
|
query?: never;
|
|
2496
|
-
url: "/issuer/config";
|
|
2886
|
+
url: "/api/issuer/config";
|
|
2497
2887
|
};
|
|
2498
2888
|
type IssuanceConfigControllerGetIssuanceConfigurationsResponses = {
|
|
2499
2889
|
200: IssuanceConfig;
|
|
@@ -2503,7 +2893,7 @@ type IssuanceConfigControllerStoreIssuanceConfigurationData = {
|
|
|
2503
2893
|
body: IssuanceDto;
|
|
2504
2894
|
path?: never;
|
|
2505
2895
|
query?: never;
|
|
2506
|
-
url: "/issuer/config";
|
|
2896
|
+
url: "/api/issuer/config";
|
|
2507
2897
|
};
|
|
2508
2898
|
type IssuanceConfigControllerStoreIssuanceConfigurationResponses = {
|
|
2509
2899
|
201: {
|
|
@@ -2515,7 +2905,7 @@ type CredentialConfigControllerGetConfigsData = {
|
|
|
2515
2905
|
body?: never;
|
|
2516
2906
|
path?: never;
|
|
2517
2907
|
query?: never;
|
|
2518
|
-
url: "/issuer/credentials";
|
|
2908
|
+
url: "/api/issuer/credentials";
|
|
2519
2909
|
};
|
|
2520
2910
|
type CredentialConfigControllerGetConfigsResponses = {
|
|
2521
2911
|
200: Array<CredentialConfig>;
|
|
@@ -2525,7 +2915,7 @@ type CredentialConfigControllerStoreCredentialConfigurationData = {
|
|
|
2525
2915
|
body: CredentialConfigCreate;
|
|
2526
2916
|
path?: never;
|
|
2527
2917
|
query?: never;
|
|
2528
|
-
url: "/issuer/credentials";
|
|
2918
|
+
url: "/api/issuer/credentials";
|
|
2529
2919
|
};
|
|
2530
2920
|
type CredentialConfigControllerStoreCredentialConfigurationResponses = {
|
|
2531
2921
|
201: {
|
|
@@ -2539,7 +2929,7 @@ type CredentialConfigControllerDeleteIssuanceConfigurationData = {
|
|
|
2539
2929
|
id: string;
|
|
2540
2930
|
};
|
|
2541
2931
|
query?: never;
|
|
2542
|
-
url: "/issuer/credentials/{id}";
|
|
2932
|
+
url: "/api/issuer/credentials/{id}";
|
|
2543
2933
|
};
|
|
2544
2934
|
type CredentialConfigControllerDeleteIssuanceConfigurationResponses = {
|
|
2545
2935
|
200: unknown;
|
|
@@ -2550,7 +2940,7 @@ type CredentialConfigControllerGetConfigByIdData = {
|
|
|
2550
2940
|
id: string;
|
|
2551
2941
|
};
|
|
2552
2942
|
query?: never;
|
|
2553
|
-
url: "/issuer/credentials/{id}";
|
|
2943
|
+
url: "/api/issuer/credentials/{id}";
|
|
2554
2944
|
};
|
|
2555
2945
|
type CredentialConfigControllerGetConfigByIdResponses = {
|
|
2556
2946
|
200: CredentialConfig;
|
|
@@ -2562,7 +2952,7 @@ type CredentialConfigControllerUpdateCredentialConfigurationData = {
|
|
|
2562
2952
|
id: string;
|
|
2563
2953
|
};
|
|
2564
2954
|
query?: never;
|
|
2565
|
-
url: "/issuer/credentials/{id}";
|
|
2955
|
+
url: "/api/issuer/credentials/{id}";
|
|
2566
2956
|
};
|
|
2567
2957
|
type CredentialConfigControllerUpdateCredentialConfigurationResponses = {
|
|
2568
2958
|
200: {
|
|
@@ -2570,638 +2960,323 @@ type CredentialConfigControllerUpdateCredentialConfigurationResponses = {
|
|
|
2570
2960
|
};
|
|
2571
2961
|
};
|
|
2572
2962
|
type CredentialConfigControllerUpdateCredentialConfigurationResponse = CredentialConfigControllerUpdateCredentialConfigurationResponses[keyof CredentialConfigControllerUpdateCredentialConfigurationResponses];
|
|
2573
|
-
type
|
|
2574
|
-
body?: never;
|
|
2575
|
-
path?: never;
|
|
2576
|
-
query?: never;
|
|
2577
|
-
url: "/verifier/config";
|
|
2578
|
-
};
|
|
2579
|
-
type PresentationManagementControllerConfigurationResponses = {
|
|
2580
|
-
200: Array<PresentationConfig>;
|
|
2581
|
-
};
|
|
2582
|
-
type PresentationManagementControllerConfigurationResponse = PresentationManagementControllerConfigurationResponses[keyof PresentationManagementControllerConfigurationResponses];
|
|
2583
|
-
type PresentationManagementControllerStorePresentationConfigData = {
|
|
2584
|
-
body: PresentationConfigCreateDto;
|
|
2585
|
-
path?: never;
|
|
2586
|
-
query?: never;
|
|
2587
|
-
url: "/verifier/config";
|
|
2588
|
-
};
|
|
2589
|
-
type PresentationManagementControllerStorePresentationConfigResponses = {
|
|
2590
|
-
201: {
|
|
2591
|
-
[key: string]: unknown;
|
|
2592
|
-
};
|
|
2593
|
-
};
|
|
2594
|
-
type PresentationManagementControllerStorePresentationConfigResponse = PresentationManagementControllerStorePresentationConfigResponses[keyof PresentationManagementControllerStorePresentationConfigResponses];
|
|
2595
|
-
type PresentationManagementControllerDeleteConfigurationData = {
|
|
2596
|
-
body?: never;
|
|
2597
|
-
path: {
|
|
2598
|
-
id: string;
|
|
2599
|
-
};
|
|
2600
|
-
query?: never;
|
|
2601
|
-
url: "/verifier/config/{id}";
|
|
2602
|
-
};
|
|
2603
|
-
type PresentationManagementControllerDeleteConfigurationResponses = {
|
|
2604
|
-
200: unknown;
|
|
2605
|
-
};
|
|
2606
|
-
type PresentationManagementControllerGetConfigurationData = {
|
|
2607
|
-
body?: never;
|
|
2608
|
-
path: {
|
|
2609
|
-
id: string;
|
|
2610
|
-
};
|
|
2611
|
-
query?: never;
|
|
2612
|
-
url: "/verifier/config/{id}";
|
|
2613
|
-
};
|
|
2614
|
-
type PresentationManagementControllerGetConfigurationResponses = {
|
|
2615
|
-
200: PresentationConfig;
|
|
2616
|
-
};
|
|
2617
|
-
type PresentationManagementControllerGetConfigurationResponse = PresentationManagementControllerGetConfigurationResponses[keyof PresentationManagementControllerGetConfigurationResponses];
|
|
2618
|
-
type PresentationManagementControllerUpdateConfigurationData = {
|
|
2619
|
-
body: PresentationConfigUpdateDto;
|
|
2620
|
-
path: {
|
|
2621
|
-
id: string;
|
|
2622
|
-
};
|
|
2623
|
-
query?: never;
|
|
2624
|
-
url: "/verifier/config/{id}";
|
|
2625
|
-
};
|
|
2626
|
-
type PresentationManagementControllerUpdateConfigurationResponses = {
|
|
2627
|
-
200: {
|
|
2628
|
-
[key: string]: unknown;
|
|
2629
|
-
};
|
|
2630
|
-
};
|
|
2631
|
-
type PresentationManagementControllerUpdateConfigurationResponse = PresentationManagementControllerUpdateConfigurationResponses[keyof PresentationManagementControllerUpdateConfigurationResponses];
|
|
2632
|
-
type CacheControllerGetStatsData = {
|
|
2963
|
+
type AttributeProviderControllerGetAllData = {
|
|
2633
2964
|
body?: never;
|
|
2634
2965
|
path?: never;
|
|
2635
2966
|
query?: never;
|
|
2636
|
-
url: "/
|
|
2967
|
+
url: "/api/issuer/attribute-providers";
|
|
2637
2968
|
};
|
|
2638
|
-
type
|
|
2969
|
+
type AttributeProviderControllerGetAllResponses = {
|
|
2639
2970
|
/**
|
|
2640
|
-
*
|
|
2971
|
+
* List of attribute providers
|
|
2641
2972
|
*/
|
|
2642
2973
|
200: unknown;
|
|
2643
2974
|
};
|
|
2644
|
-
type
|
|
2645
|
-
body
|
|
2646
|
-
path?: never;
|
|
2647
|
-
query?: never;
|
|
2648
|
-
url: "/cache";
|
|
2649
|
-
};
|
|
2650
|
-
type CacheControllerClearAllCachesResponses = {
|
|
2651
|
-
/**
|
|
2652
|
-
* All caches cleared successfully
|
|
2653
|
-
*/
|
|
2654
|
-
204: void;
|
|
2655
|
-
};
|
|
2656
|
-
type CacheControllerClearAllCachesResponse = CacheControllerClearAllCachesResponses[keyof CacheControllerClearAllCachesResponses];
|
|
2657
|
-
type CacheControllerClearTrustListCacheData = {
|
|
2658
|
-
body?: never;
|
|
2659
|
-
path?: never;
|
|
2660
|
-
query?: never;
|
|
2661
|
-
url: "/cache/trust-list";
|
|
2662
|
-
};
|
|
2663
|
-
type CacheControllerClearTrustListCacheResponses = {
|
|
2664
|
-
/**
|
|
2665
|
-
* Trust list cache cleared successfully
|
|
2666
|
-
*/
|
|
2667
|
-
204: void;
|
|
2668
|
-
};
|
|
2669
|
-
type CacheControllerClearTrustListCacheResponse = CacheControllerClearTrustListCacheResponses[keyof CacheControllerClearTrustListCacheResponses];
|
|
2670
|
-
type CacheControllerClearStatusListCacheData = {
|
|
2671
|
-
body?: never;
|
|
2975
|
+
type AttributeProviderControllerCreateData = {
|
|
2976
|
+
body: CreateAttributeProviderDto;
|
|
2672
2977
|
path?: never;
|
|
2673
2978
|
query?: never;
|
|
2674
|
-
url: "/
|
|
2979
|
+
url: "/api/issuer/attribute-providers";
|
|
2675
2980
|
};
|
|
2676
|
-
type
|
|
2981
|
+
type AttributeProviderControllerCreateResponses = {
|
|
2677
2982
|
/**
|
|
2678
|
-
*
|
|
2983
|
+
* Attribute provider created
|
|
2679
2984
|
*/
|
|
2680
|
-
204: void;
|
|
2681
|
-
};
|
|
2682
|
-
type CacheControllerClearStatusListCacheResponse = CacheControllerClearStatusListCacheResponses[keyof CacheControllerClearStatusListCacheResponses];
|
|
2683
|
-
type Oid4VciControllerCredentialData = {
|
|
2684
|
-
body?: never;
|
|
2685
|
-
path: {
|
|
2686
|
-
tenantId: string;
|
|
2687
|
-
};
|
|
2688
|
-
query?: never;
|
|
2689
|
-
url: "/{tenantId}/vci/credential";
|
|
2690
|
-
};
|
|
2691
|
-
type Oid4VciControllerCredentialResponses = {
|
|
2692
|
-
200: {
|
|
2693
|
-
[key: string]: unknown;
|
|
2694
|
-
};
|
|
2695
|
-
};
|
|
2696
|
-
type Oid4VciControllerCredentialResponse = Oid4VciControllerCredentialResponses[keyof Oid4VciControllerCredentialResponses];
|
|
2697
|
-
type Oid4VciControllerDeferredCredentialData = {
|
|
2698
|
-
body: DeferredCredentialRequestDto;
|
|
2699
|
-
path: {
|
|
2700
|
-
tenantId: string;
|
|
2701
|
-
};
|
|
2702
|
-
query?: never;
|
|
2703
|
-
url: "/{tenantId}/vci/deferred_credential";
|
|
2704
|
-
};
|
|
2705
|
-
type Oid4VciControllerDeferredCredentialResponses = {
|
|
2706
|
-
200: unknown;
|
|
2707
|
-
};
|
|
2708
|
-
type Oid4VciControllerNotificationsData = {
|
|
2709
|
-
body: NotificationRequestDto;
|
|
2710
|
-
path: {
|
|
2711
|
-
tenantId: string;
|
|
2712
|
-
};
|
|
2713
|
-
query?: never;
|
|
2714
|
-
url: "/{tenantId}/vci/notification";
|
|
2715
|
-
};
|
|
2716
|
-
type Oid4VciControllerNotificationsResponses = {
|
|
2717
2985
|
201: unknown;
|
|
2718
2986
|
};
|
|
2719
|
-
type
|
|
2720
|
-
body?: never;
|
|
2721
|
-
path: {
|
|
2722
|
-
tenantId: string;
|
|
2723
|
-
};
|
|
2724
|
-
query?: never;
|
|
2725
|
-
url: "/{tenantId}/vci/nonce";
|
|
2726
|
-
};
|
|
2727
|
-
type Oid4VciControllerNonceResponses = {
|
|
2728
|
-
200: unknown;
|
|
2729
|
-
};
|
|
2730
|
-
type AuthorizeControllerAuthorizeData = {
|
|
2731
|
-
body?: never;
|
|
2732
|
-
path: {
|
|
2733
|
-
tenantId: string;
|
|
2734
|
-
};
|
|
2735
|
-
query?: {
|
|
2736
|
-
issuer_state?: string;
|
|
2737
|
-
response_type?: string;
|
|
2738
|
-
client_id?: string;
|
|
2739
|
-
redirect_uri?: string;
|
|
2740
|
-
resource?: string;
|
|
2741
|
-
scope?: string;
|
|
2742
|
-
code_challenge?: string;
|
|
2743
|
-
code_challenge_method?: string;
|
|
2744
|
-
dpop_jkt?: string;
|
|
2745
|
-
request_uri?: string;
|
|
2746
|
-
auth_session?: string;
|
|
2747
|
-
state?: string;
|
|
2748
|
-
};
|
|
2749
|
-
url: "/{tenantId}/authorize";
|
|
2750
|
-
};
|
|
2751
|
-
type AuthorizeControllerAuthorizeResponses = {
|
|
2752
|
-
200: unknown;
|
|
2753
|
-
};
|
|
2754
|
-
type AuthorizeControllerParData = {
|
|
2755
|
-
/**
|
|
2756
|
-
* Pushed Authorization Request
|
|
2757
|
-
*/
|
|
2758
|
-
body: AuthorizeQueries;
|
|
2759
|
-
path?: never;
|
|
2760
|
-
query?: never;
|
|
2761
|
-
url: "/{tenantId}/authorize/par";
|
|
2762
|
-
};
|
|
2763
|
-
type AuthorizeControllerParResponses = {
|
|
2764
|
-
201: ParResponseDto;
|
|
2765
|
-
};
|
|
2766
|
-
type AuthorizeControllerParResponse = AuthorizeControllerParResponses[keyof AuthorizeControllerParResponses];
|
|
2767
|
-
type AuthorizeControllerTokenData = {
|
|
2768
|
-
body?: never;
|
|
2769
|
-
path: {
|
|
2770
|
-
tenantId: string;
|
|
2771
|
-
};
|
|
2772
|
-
query?: never;
|
|
2773
|
-
url: "/{tenantId}/authorize/token";
|
|
2774
|
-
};
|
|
2775
|
-
type AuthorizeControllerTokenResponses = {
|
|
2776
|
-
201: {
|
|
2777
|
-
[key: string]: unknown;
|
|
2778
|
-
};
|
|
2779
|
-
};
|
|
2780
|
-
type AuthorizeControllerTokenResponse = AuthorizeControllerTokenResponses[keyof AuthorizeControllerTokenResponses];
|
|
2781
|
-
type InteractiveAuthorizationControllerInteractiveAuthorizationData = {
|
|
2782
|
-
/**
|
|
2783
|
-
* Interactive authorization request
|
|
2784
|
-
*/
|
|
2785
|
-
body: InteractiveAuthorizationRequestDto;
|
|
2786
|
-
headers: {
|
|
2787
|
-
origin: string;
|
|
2788
|
-
};
|
|
2789
|
-
path: {
|
|
2790
|
-
tenantId: string;
|
|
2791
|
-
};
|
|
2792
|
-
query?: never;
|
|
2793
|
-
url: "/{tenantId}/authorize/interactive";
|
|
2794
|
-
};
|
|
2795
|
-
type InteractiveAuthorizationControllerInteractiveAuthorizationErrors = {
|
|
2796
|
-
/**
|
|
2797
|
-
* Error response
|
|
2798
|
-
*/
|
|
2799
|
-
400: InteractiveAuthorizationErrorResponseDto;
|
|
2800
|
-
};
|
|
2801
|
-
type InteractiveAuthorizationControllerInteractiveAuthorizationError = InteractiveAuthorizationControllerInteractiveAuthorizationErrors[keyof InteractiveAuthorizationControllerInteractiveAuthorizationErrors];
|
|
2802
|
-
type InteractiveAuthorizationControllerInteractiveAuthorizationResponses = {
|
|
2803
|
-
/**
|
|
2804
|
-
* Authorization code response (successful completion)
|
|
2805
|
-
*/
|
|
2806
|
-
200: InteractiveAuthorizationCodeResponseDto;
|
|
2807
|
-
};
|
|
2808
|
-
type InteractiveAuthorizationControllerInteractiveAuthorizationResponse = InteractiveAuthorizationControllerInteractiveAuthorizationResponses[keyof InteractiveAuthorizationControllerInteractiveAuthorizationResponses];
|
|
2809
|
-
type InteractiveAuthorizationControllerCompleteWebAuthData = {
|
|
2987
|
+
type AttributeProviderControllerDeleteData = {
|
|
2810
2988
|
body?: never;
|
|
2811
2989
|
path: {
|
|
2812
|
-
|
|
2813
|
-
tenantId: string;
|
|
2990
|
+
id: string;
|
|
2814
2991
|
};
|
|
2815
2992
|
query?: never;
|
|
2816
|
-
url: "/
|
|
2993
|
+
url: "/api/issuer/attribute-providers/{id}";
|
|
2817
2994
|
};
|
|
2818
|
-
type
|
|
2995
|
+
type AttributeProviderControllerDeleteErrors = {
|
|
2819
2996
|
/**
|
|
2820
|
-
*
|
|
2997
|
+
* Attribute provider not found
|
|
2821
2998
|
*/
|
|
2822
2999
|
404: unknown;
|
|
2823
3000
|
};
|
|
2824
|
-
type
|
|
3001
|
+
type AttributeProviderControllerDeleteResponses = {
|
|
2825
3002
|
/**
|
|
2826
|
-
*
|
|
3003
|
+
* Attribute provider deleted
|
|
2827
3004
|
*/
|
|
2828
3005
|
200: unknown;
|
|
2829
3006
|
};
|
|
2830
|
-
type
|
|
2831
|
-
body: ChainedAsParRequestDto;
|
|
2832
|
-
headers?: {
|
|
2833
|
-
/**
|
|
2834
|
-
* DPoP proof JWT
|
|
2835
|
-
*/
|
|
2836
|
-
DPoP?: string;
|
|
2837
|
-
/**
|
|
2838
|
-
* Wallet attestation JWT
|
|
2839
|
-
*/
|
|
2840
|
-
"OAuth-Client-Attestation"?: string;
|
|
2841
|
-
/**
|
|
2842
|
-
* Wallet attestation proof-of-possession JWT
|
|
2843
|
-
*/
|
|
2844
|
-
"OAuth-Client-Attestation-PoP"?: string;
|
|
2845
|
-
};
|
|
2846
|
-
path: {
|
|
2847
|
-
/**
|
|
2848
|
-
* Tenant identifier
|
|
2849
|
-
*/
|
|
2850
|
-
tenant: string;
|
|
2851
|
-
};
|
|
2852
|
-
query?: never;
|
|
2853
|
-
url: "/{tenant}/chained-as/par";
|
|
2854
|
-
};
|
|
2855
|
-
type ChainedAsControllerParErrors = {
|
|
2856
|
-
/**
|
|
2857
|
-
* Invalid request
|
|
2858
|
-
*/
|
|
2859
|
-
400: ChainedAsErrorResponseDto;
|
|
2860
|
-
};
|
|
2861
|
-
type ChainedAsControllerParError = ChainedAsControllerParErrors[keyof ChainedAsControllerParErrors];
|
|
2862
|
-
type ChainedAsControllerParResponses = {
|
|
2863
|
-
/**
|
|
2864
|
-
* PAR request accepted
|
|
2865
|
-
*/
|
|
2866
|
-
201: ChainedAsParResponseDto;
|
|
2867
|
-
};
|
|
2868
|
-
type ChainedAsControllerParResponse = ChainedAsControllerParResponses[keyof ChainedAsControllerParResponses];
|
|
2869
|
-
type ChainedAsControllerAuthorizeData = {
|
|
3007
|
+
type AttributeProviderControllerGetByIdData = {
|
|
2870
3008
|
body?: never;
|
|
2871
3009
|
path: {
|
|
2872
|
-
|
|
2873
|
-
* Tenant identifier
|
|
2874
|
-
*/
|
|
2875
|
-
tenant: string;
|
|
2876
|
-
};
|
|
2877
|
-
query: {
|
|
2878
|
-
/**
|
|
2879
|
-
* Client identifier
|
|
2880
|
-
*/
|
|
2881
|
-
client_id: string;
|
|
2882
|
-
/**
|
|
2883
|
-
* Request URI from PAR response
|
|
2884
|
-
*/
|
|
2885
|
-
request_uri: string;
|
|
3010
|
+
id: string;
|
|
2886
3011
|
};
|
|
2887
|
-
|
|
3012
|
+
query?: never;
|
|
3013
|
+
url: "/api/issuer/attribute-providers/{id}";
|
|
2888
3014
|
};
|
|
2889
|
-
type
|
|
3015
|
+
type AttributeProviderControllerGetByIdErrors = {
|
|
2890
3016
|
/**
|
|
2891
|
-
*
|
|
3017
|
+
* Attribute provider not found
|
|
2892
3018
|
*/
|
|
2893
|
-
|
|
2894
|
-
};
|
|
2895
|
-
type ChainedAsControllerAuthorizeError = ChainedAsControllerAuthorizeErrors[keyof ChainedAsControllerAuthorizeErrors];
|
|
2896
|
-
type ChainedAsControllerAuthorizeResponses = {
|
|
2897
|
-
200: unknown;
|
|
2898
|
-
};
|
|
2899
|
-
type ChainedAsControllerCallbackData = {
|
|
2900
|
-
body?: never;
|
|
2901
|
-
path: {
|
|
2902
|
-
/**
|
|
2903
|
-
* Tenant identifier
|
|
2904
|
-
*/
|
|
2905
|
-
tenant: string;
|
|
2906
|
-
};
|
|
2907
|
-
query: {
|
|
2908
|
-
code: string;
|
|
2909
|
-
state: string;
|
|
2910
|
-
error: string;
|
|
2911
|
-
error_description: string;
|
|
2912
|
-
};
|
|
2913
|
-
url: "/{tenant}/chained-as/callback";
|
|
3019
|
+
404: unknown;
|
|
2914
3020
|
};
|
|
2915
|
-
type
|
|
3021
|
+
type AttributeProviderControllerGetByIdResponses = {
|
|
2916
3022
|
/**
|
|
2917
|
-
*
|
|
3023
|
+
* The attribute provider
|
|
2918
3024
|
*/
|
|
2919
|
-
400: ChainedAsErrorResponseDto;
|
|
2920
|
-
};
|
|
2921
|
-
type ChainedAsControllerCallbackError = ChainedAsControllerCallbackErrors[keyof ChainedAsControllerCallbackErrors];
|
|
2922
|
-
type ChainedAsControllerCallbackResponses = {
|
|
2923
3025
|
200: unknown;
|
|
2924
3026
|
};
|
|
2925
|
-
type
|
|
2926
|
-
body:
|
|
2927
|
-
headers?: {
|
|
2928
|
-
/**
|
|
2929
|
-
* DPoP proof JWT
|
|
2930
|
-
*/
|
|
2931
|
-
DPoP?: string;
|
|
2932
|
-
};
|
|
3027
|
+
type AttributeProviderControllerUpdateData = {
|
|
3028
|
+
body: UpdateAttributeProviderDto;
|
|
2933
3029
|
path: {
|
|
2934
|
-
|
|
2935
|
-
* Tenant identifier
|
|
2936
|
-
*/
|
|
2937
|
-
tenant: string;
|
|
3030
|
+
id: string;
|
|
2938
3031
|
};
|
|
2939
3032
|
query?: never;
|
|
2940
|
-
url: "/
|
|
2941
|
-
};
|
|
2942
|
-
type ChainedAsControllerTokenErrors = {
|
|
2943
|
-
/**
|
|
2944
|
-
* Invalid request
|
|
2945
|
-
*/
|
|
2946
|
-
400: ChainedAsErrorResponseDto;
|
|
2947
|
-
/**
|
|
2948
|
-
* Invalid authorization code
|
|
2949
|
-
*/
|
|
2950
|
-
401: ChainedAsErrorResponseDto;
|
|
3033
|
+
url: "/api/issuer/attribute-providers/{id}";
|
|
2951
3034
|
};
|
|
2952
|
-
type
|
|
2953
|
-
type ChainedAsControllerTokenResponses = {
|
|
3035
|
+
type AttributeProviderControllerUpdateErrors = {
|
|
2954
3036
|
/**
|
|
2955
|
-
*
|
|
3037
|
+
* Attribute provider not found
|
|
2956
3038
|
*/
|
|
2957
|
-
|
|
2958
|
-
};
|
|
2959
|
-
type ChainedAsControllerTokenResponse = ChainedAsControllerTokenResponses[keyof ChainedAsControllerTokenResponses];
|
|
2960
|
-
type ChainedAsControllerJwksData = {
|
|
2961
|
-
body?: never;
|
|
2962
|
-
path: {
|
|
2963
|
-
/**
|
|
2964
|
-
* Tenant identifier
|
|
2965
|
-
*/
|
|
2966
|
-
tenant: string;
|
|
2967
|
-
};
|
|
2968
|
-
query?: never;
|
|
2969
|
-
url: "/{tenant}/chained-as/.well-known/jwks.json";
|
|
3039
|
+
404: unknown;
|
|
2970
3040
|
};
|
|
2971
|
-
type
|
|
3041
|
+
type AttributeProviderControllerUpdateResponses = {
|
|
2972
3042
|
/**
|
|
2973
|
-
*
|
|
3043
|
+
* Attribute provider updated
|
|
2974
3044
|
*/
|
|
2975
3045
|
200: unknown;
|
|
2976
3046
|
};
|
|
2977
|
-
type
|
|
3047
|
+
type WebhookEndpointControllerGetAllData = {
|
|
2978
3048
|
body?: never;
|
|
2979
|
-
path
|
|
2980
|
-
/**
|
|
2981
|
-
* Tenant identifier
|
|
2982
|
-
*/
|
|
2983
|
-
tenant: string;
|
|
2984
|
-
};
|
|
3049
|
+
path?: never;
|
|
2985
3050
|
query?: never;
|
|
2986
|
-
url: "/
|
|
3051
|
+
url: "/api/issuer/webhook-endpoints";
|
|
2987
3052
|
};
|
|
2988
|
-
type
|
|
3053
|
+
type WebhookEndpointControllerGetAllResponses = {
|
|
2989
3054
|
/**
|
|
2990
|
-
*
|
|
3055
|
+
* List of webhook endpoints
|
|
2991
3056
|
*/
|
|
2992
3057
|
200: unknown;
|
|
2993
3058
|
};
|
|
2994
|
-
type
|
|
2995
|
-
body:
|
|
3059
|
+
type WebhookEndpointControllerCreateData = {
|
|
3060
|
+
body: CreateWebhookEndpointDto;
|
|
2996
3061
|
path?: never;
|
|
2997
3062
|
query?: never;
|
|
2998
|
-
url: "/issuer/
|
|
3063
|
+
url: "/api/issuer/webhook-endpoints";
|
|
2999
3064
|
};
|
|
3000
|
-
type
|
|
3065
|
+
type WebhookEndpointControllerCreateResponses = {
|
|
3001
3066
|
/**
|
|
3002
|
-
*
|
|
3067
|
+
* Webhook endpoint created
|
|
3003
3068
|
*/
|
|
3004
|
-
201:
|
|
3069
|
+
201: unknown;
|
|
3005
3070
|
};
|
|
3006
|
-
type
|
|
3007
|
-
|
|
3008
|
-
body: CompleteDeferredDto;
|
|
3071
|
+
type WebhookEndpointControllerDeleteData = {
|
|
3072
|
+
body?: never;
|
|
3009
3073
|
path: {
|
|
3010
|
-
|
|
3074
|
+
id: string;
|
|
3011
3075
|
};
|
|
3012
3076
|
query?: never;
|
|
3013
|
-
url: "/issuer/
|
|
3077
|
+
url: "/api/issuer/webhook-endpoints/{id}";
|
|
3014
3078
|
};
|
|
3015
|
-
type
|
|
3079
|
+
type WebhookEndpointControllerDeleteErrors = {
|
|
3016
3080
|
/**
|
|
3017
|
-
*
|
|
3081
|
+
* Webhook endpoint not found
|
|
3018
3082
|
*/
|
|
3019
3083
|
404: unknown;
|
|
3020
3084
|
};
|
|
3021
|
-
type
|
|
3085
|
+
type WebhookEndpointControllerDeleteResponses = {
|
|
3022
3086
|
/**
|
|
3023
|
-
*
|
|
3087
|
+
* Webhook endpoint deleted
|
|
3024
3088
|
*/
|
|
3025
|
-
200:
|
|
3089
|
+
200: unknown;
|
|
3026
3090
|
};
|
|
3027
|
-
type
|
|
3028
|
-
|
|
3029
|
-
body?: FailDeferredDto;
|
|
3091
|
+
type WebhookEndpointControllerGetByIdData = {
|
|
3092
|
+
body?: never;
|
|
3030
3093
|
path: {
|
|
3031
|
-
|
|
3094
|
+
id: string;
|
|
3032
3095
|
};
|
|
3033
3096
|
query?: never;
|
|
3034
|
-
url: "/issuer/
|
|
3097
|
+
url: "/api/issuer/webhook-endpoints/{id}";
|
|
3035
3098
|
};
|
|
3036
|
-
type
|
|
3099
|
+
type WebhookEndpointControllerGetByIdErrors = {
|
|
3037
3100
|
/**
|
|
3038
|
-
*
|
|
3101
|
+
* Webhook endpoint not found
|
|
3039
3102
|
*/
|
|
3040
3103
|
404: unknown;
|
|
3041
3104
|
};
|
|
3042
|
-
type
|
|
3105
|
+
type WebhookEndpointControllerGetByIdResponses = {
|
|
3043
3106
|
/**
|
|
3044
|
-
*
|
|
3107
|
+
* The webhook endpoint
|
|
3045
3108
|
*/
|
|
3046
|
-
200:
|
|
3109
|
+
200: unknown;
|
|
3047
3110
|
};
|
|
3048
|
-
type
|
|
3049
|
-
|
|
3050
|
-
body?: never;
|
|
3111
|
+
type WebhookEndpointControllerUpdateData = {
|
|
3112
|
+
body: UpdateWebhookEndpointDto;
|
|
3051
3113
|
path: {
|
|
3052
3114
|
id: string;
|
|
3053
|
-
tenantId: string;
|
|
3054
3115
|
};
|
|
3055
3116
|
query?: never;
|
|
3056
|
-
url: "/
|
|
3117
|
+
url: "/api/issuer/webhook-endpoints/{id}";
|
|
3118
|
+
};
|
|
3119
|
+
type WebhookEndpointControllerUpdateErrors = {
|
|
3120
|
+
/**
|
|
3121
|
+
* Webhook endpoint not found
|
|
3122
|
+
*/
|
|
3123
|
+
404: unknown;
|
|
3057
3124
|
};
|
|
3058
|
-
type
|
|
3059
|
-
|
|
3125
|
+
type WebhookEndpointControllerUpdateResponses = {
|
|
3126
|
+
/**
|
|
3127
|
+
* Webhook endpoint updated
|
|
3128
|
+
*/
|
|
3129
|
+
200: unknown;
|
|
3060
3130
|
};
|
|
3061
|
-
type
|
|
3062
|
-
type WellKnownControllerIssuerMetadata0Data = {
|
|
3131
|
+
type PresentationManagementControllerConfigurationData = {
|
|
3063
3132
|
body?: never;
|
|
3064
|
-
path
|
|
3065
|
-
tenantId: string;
|
|
3066
|
-
};
|
|
3133
|
+
path?: never;
|
|
3067
3134
|
query?: never;
|
|
3068
|
-
url: "
|
|
3135
|
+
url: "/api/verifier/config";
|
|
3069
3136
|
};
|
|
3070
|
-
type
|
|
3071
|
-
200:
|
|
3072
|
-
[key: string]: unknown;
|
|
3073
|
-
};
|
|
3137
|
+
type PresentationManagementControllerConfigurationResponses = {
|
|
3138
|
+
200: Array<PresentationConfig>;
|
|
3074
3139
|
};
|
|
3075
|
-
type
|
|
3076
|
-
type
|
|
3077
|
-
body
|
|
3078
|
-
path
|
|
3079
|
-
tenantId: string;
|
|
3080
|
-
};
|
|
3140
|
+
type PresentationManagementControllerConfigurationResponse = PresentationManagementControllerConfigurationResponses[keyof PresentationManagementControllerConfigurationResponses];
|
|
3141
|
+
type PresentationManagementControllerStorePresentationConfigData = {
|
|
3142
|
+
body: PresentationConfigCreateDto;
|
|
3143
|
+
path?: never;
|
|
3081
3144
|
query?: never;
|
|
3082
|
-
url: "/
|
|
3145
|
+
url: "/api/verifier/config";
|
|
3083
3146
|
};
|
|
3084
|
-
type
|
|
3085
|
-
|
|
3086
|
-
[key: string]: unknown;
|
|
3087
|
-
};
|
|
3147
|
+
type PresentationManagementControllerStorePresentationConfigResponses = {
|
|
3148
|
+
201: PresentationConfig;
|
|
3088
3149
|
};
|
|
3089
|
-
type
|
|
3090
|
-
type
|
|
3091
|
-
body
|
|
3092
|
-
path
|
|
3093
|
-
tenantId: string;
|
|
3094
|
-
};
|
|
3150
|
+
type PresentationManagementControllerStorePresentationConfigResponse = PresentationManagementControllerStorePresentationConfigResponses[keyof PresentationManagementControllerStorePresentationConfigResponses];
|
|
3151
|
+
type PresentationManagementControllerResolveIssuerMetadataData = {
|
|
3152
|
+
body: ResolveIssuerMetadataDto;
|
|
3153
|
+
path?: never;
|
|
3095
3154
|
query?: never;
|
|
3096
|
-
url: "
|
|
3155
|
+
url: "/api/verifier/config/issuer-metadata/resolve";
|
|
3156
|
+
};
|
|
3157
|
+
type PresentationManagementControllerResolveIssuerMetadataErrors = {
|
|
3158
|
+
/**
|
|
3159
|
+
* Invalid issuer URL or metadata could not be resolved
|
|
3160
|
+
*/
|
|
3161
|
+
400: unknown;
|
|
3097
3162
|
};
|
|
3098
|
-
type
|
|
3163
|
+
type PresentationManagementControllerResolveIssuerMetadataResponses = {
|
|
3164
|
+
/**
|
|
3165
|
+
* Resolved credential issuer metadata
|
|
3166
|
+
*/
|
|
3099
3167
|
200: unknown;
|
|
3100
3168
|
};
|
|
3101
|
-
type
|
|
3169
|
+
type PresentationManagementControllerDeleteConfigurationData = {
|
|
3102
3170
|
body?: never;
|
|
3103
3171
|
path: {
|
|
3104
|
-
|
|
3172
|
+
id: string;
|
|
3105
3173
|
};
|
|
3106
3174
|
query?: never;
|
|
3107
|
-
url: "/{
|
|
3175
|
+
url: "/api/verifier/config/{id}";
|
|
3108
3176
|
};
|
|
3109
|
-
type
|
|
3177
|
+
type PresentationManagementControllerDeleteConfigurationResponses = {
|
|
3110
3178
|
200: unknown;
|
|
3111
3179
|
};
|
|
3112
|
-
type
|
|
3180
|
+
type PresentationManagementControllerGetConfigurationData = {
|
|
3113
3181
|
body?: never;
|
|
3114
3182
|
path: {
|
|
3115
|
-
|
|
3183
|
+
id: string;
|
|
3116
3184
|
};
|
|
3117
3185
|
query?: never;
|
|
3118
|
-
url: "
|
|
3186
|
+
url: "/api/verifier/config/{id}";
|
|
3119
3187
|
};
|
|
3120
|
-
type
|
|
3121
|
-
200:
|
|
3122
|
-
[key: string]: unknown;
|
|
3123
|
-
};
|
|
3188
|
+
type PresentationManagementControllerGetConfigurationResponses = {
|
|
3189
|
+
200: PresentationConfig;
|
|
3124
3190
|
};
|
|
3125
|
-
type
|
|
3126
|
-
type
|
|
3127
|
-
body
|
|
3191
|
+
type PresentationManagementControllerGetConfigurationResponse = PresentationManagementControllerGetConfigurationResponses[keyof PresentationManagementControllerGetConfigurationResponses];
|
|
3192
|
+
type PresentationManagementControllerUpdateConfigurationData = {
|
|
3193
|
+
body: PresentationConfigUpdateDto;
|
|
3128
3194
|
path: {
|
|
3129
|
-
|
|
3195
|
+
id: string;
|
|
3130
3196
|
};
|
|
3131
3197
|
query?: never;
|
|
3132
|
-
url: "
|
|
3198
|
+
url: "/api/verifier/config/{id}";
|
|
3133
3199
|
};
|
|
3134
|
-
type
|
|
3135
|
-
200:
|
|
3200
|
+
type PresentationManagementControllerUpdateConfigurationResponses = {
|
|
3201
|
+
200: PresentationConfig;
|
|
3136
3202
|
};
|
|
3137
|
-
type
|
|
3138
|
-
type
|
|
3203
|
+
type PresentationManagementControllerUpdateConfigurationResponse = PresentationManagementControllerUpdateConfigurationResponses[keyof PresentationManagementControllerUpdateConfigurationResponses];
|
|
3204
|
+
type PresentationManagementControllerReissueRegistrationCertificateData = {
|
|
3139
3205
|
body?: never;
|
|
3140
3206
|
path: {
|
|
3141
|
-
|
|
3207
|
+
id: string;
|
|
3142
3208
|
};
|
|
3143
3209
|
query?: never;
|
|
3144
|
-
url: "/{
|
|
3210
|
+
url: "/api/verifier/config/{id}/registration-cert/reissue";
|
|
3211
|
+
};
|
|
3212
|
+
type PresentationManagementControllerReissueRegistrationCertificateErrors = {
|
|
3213
|
+
/**
|
|
3214
|
+
* Config has no registrationCert spec or registrar is not enabled
|
|
3215
|
+
*/
|
|
3216
|
+
400: unknown;
|
|
3145
3217
|
};
|
|
3146
|
-
type
|
|
3147
|
-
|
|
3218
|
+
type PresentationManagementControllerReissueRegistrationCertificateResponses = {
|
|
3219
|
+
/**
|
|
3220
|
+
* Updated presentation configuration
|
|
3221
|
+
*/
|
|
3222
|
+
200: unknown;
|
|
3148
3223
|
};
|
|
3149
|
-
type
|
|
3150
|
-
type Oid4VpControllerGetRequestWithSessionData = {
|
|
3224
|
+
type CacheControllerGetStatsData = {
|
|
3151
3225
|
body?: never;
|
|
3152
|
-
path
|
|
3153
|
-
session: string;
|
|
3154
|
-
};
|
|
3226
|
+
path?: never;
|
|
3155
3227
|
query?: never;
|
|
3156
|
-
url: "/
|
|
3228
|
+
url: "/api/cache/stats";
|
|
3157
3229
|
};
|
|
3158
|
-
type
|
|
3159
|
-
|
|
3230
|
+
type CacheControllerGetStatsResponses = {
|
|
3231
|
+
/**
|
|
3232
|
+
* Cache statistics
|
|
3233
|
+
*/
|
|
3234
|
+
200: unknown;
|
|
3160
3235
|
};
|
|
3161
|
-
type
|
|
3162
|
-
type Oid4VpControllerGetPostRequestWithSessionData = {
|
|
3236
|
+
type CacheControllerClearAllCachesData = {
|
|
3163
3237
|
body?: never;
|
|
3164
|
-
path
|
|
3165
|
-
session: string;
|
|
3166
|
-
};
|
|
3238
|
+
path?: never;
|
|
3167
3239
|
query?: never;
|
|
3168
|
-
url: "/
|
|
3240
|
+
url: "/api/cache";
|
|
3169
3241
|
};
|
|
3170
|
-
type
|
|
3171
|
-
|
|
3242
|
+
type CacheControllerClearAllCachesResponses = {
|
|
3243
|
+
/**
|
|
3244
|
+
* All caches cleared successfully
|
|
3245
|
+
*/
|
|
3246
|
+
204: void;
|
|
3172
3247
|
};
|
|
3173
|
-
type
|
|
3174
|
-
type
|
|
3248
|
+
type CacheControllerClearAllCachesResponse = CacheControllerClearAllCachesResponses[keyof CacheControllerClearAllCachesResponses];
|
|
3249
|
+
type CacheControllerClearTrustListCacheData = {
|
|
3175
3250
|
body?: never;
|
|
3176
|
-
path
|
|
3177
|
-
session: string;
|
|
3178
|
-
};
|
|
3251
|
+
path?: never;
|
|
3179
3252
|
query?: never;
|
|
3180
|
-
url: "/
|
|
3253
|
+
url: "/api/cache/trust-list";
|
|
3181
3254
|
};
|
|
3182
|
-
type
|
|
3183
|
-
|
|
3255
|
+
type CacheControllerClearTrustListCacheResponses = {
|
|
3256
|
+
/**
|
|
3257
|
+
* Trust list cache cleared successfully
|
|
3258
|
+
*/
|
|
3259
|
+
204: void;
|
|
3184
3260
|
};
|
|
3185
|
-
type
|
|
3186
|
-
type
|
|
3187
|
-
body
|
|
3188
|
-
path
|
|
3189
|
-
session: string;
|
|
3190
|
-
};
|
|
3261
|
+
type CacheControllerClearTrustListCacheResponse = CacheControllerClearTrustListCacheResponses[keyof CacheControllerClearTrustListCacheResponses];
|
|
3262
|
+
type CacheControllerClearStatusListCacheData = {
|
|
3263
|
+
body?: never;
|
|
3264
|
+
path?: never;
|
|
3191
3265
|
query?: never;
|
|
3192
|
-
url: "/
|
|
3266
|
+
url: "/api/cache/status-list";
|
|
3193
3267
|
};
|
|
3194
|
-
type
|
|
3195
|
-
|
|
3196
|
-
|
|
3197
|
-
|
|
3268
|
+
type CacheControllerClearStatusListCacheResponses = {
|
|
3269
|
+
/**
|
|
3270
|
+
* Status list cache cleared successfully
|
|
3271
|
+
*/
|
|
3272
|
+
204: void;
|
|
3198
3273
|
};
|
|
3199
|
-
type
|
|
3274
|
+
type CacheControllerClearStatusListCacheResponse = CacheControllerClearStatusListCacheResponses[keyof CacheControllerClearStatusListCacheResponses];
|
|
3200
3275
|
type RegistrarControllerDeleteConfigData = {
|
|
3201
3276
|
body?: never;
|
|
3202
3277
|
path?: never;
|
|
3203
3278
|
query?: never;
|
|
3204
|
-
url: "/registrar/config";
|
|
3279
|
+
url: "/api/registrar/config";
|
|
3205
3280
|
};
|
|
3206
3281
|
type RegistrarControllerDeleteConfigResponses = {
|
|
3207
3282
|
/**
|
|
@@ -3214,7 +3289,7 @@ type RegistrarControllerGetConfigData = {
|
|
|
3214
3289
|
body?: never;
|
|
3215
3290
|
path?: never;
|
|
3216
3291
|
query?: never;
|
|
3217
|
-
url: "/registrar/config";
|
|
3292
|
+
url: "/api/registrar/config";
|
|
3218
3293
|
};
|
|
3219
3294
|
type RegistrarControllerGetConfigErrors = {
|
|
3220
3295
|
/**
|
|
@@ -3226,14 +3301,14 @@ type RegistrarControllerGetConfigResponses = {
|
|
|
3226
3301
|
/**
|
|
3227
3302
|
* The registrar configuration
|
|
3228
3303
|
*/
|
|
3229
|
-
200:
|
|
3304
|
+
200: RegistrarConfigResponseDto;
|
|
3230
3305
|
};
|
|
3231
3306
|
type RegistrarControllerGetConfigResponse = RegistrarControllerGetConfigResponses[keyof RegistrarControllerGetConfigResponses];
|
|
3232
3307
|
type RegistrarControllerUpdateConfigData = {
|
|
3233
3308
|
body: UpdateRegistrarConfigDto;
|
|
3234
3309
|
path?: never;
|
|
3235
3310
|
query?: never;
|
|
3236
|
-
url: "/registrar/config";
|
|
3311
|
+
url: "/api/registrar/config";
|
|
3237
3312
|
};
|
|
3238
3313
|
type RegistrarControllerUpdateConfigErrors = {
|
|
3239
3314
|
/**
|
|
@@ -3249,14 +3324,14 @@ type RegistrarControllerUpdateConfigResponses = {
|
|
|
3249
3324
|
/**
|
|
3250
3325
|
* Configuration updated successfully
|
|
3251
3326
|
*/
|
|
3252
|
-
200:
|
|
3327
|
+
200: RegistrarConfigResponseDto;
|
|
3253
3328
|
};
|
|
3254
3329
|
type RegistrarControllerUpdateConfigResponse = RegistrarControllerUpdateConfigResponses[keyof RegistrarControllerUpdateConfigResponses];
|
|
3255
3330
|
type RegistrarControllerCreateConfigData = {
|
|
3256
3331
|
body: CreateRegistrarConfigDto;
|
|
3257
3332
|
path?: never;
|
|
3258
3333
|
query?: never;
|
|
3259
|
-
url: "/registrar/config";
|
|
3334
|
+
url: "/api/registrar/config";
|
|
3260
3335
|
};
|
|
3261
3336
|
type RegistrarControllerCreateConfigErrors = {
|
|
3262
3337
|
/**
|
|
@@ -3268,14 +3343,14 @@ type RegistrarControllerCreateConfigResponses = {
|
|
|
3268
3343
|
/**
|
|
3269
3344
|
* Configuration created successfully
|
|
3270
3345
|
*/
|
|
3271
|
-
201:
|
|
3346
|
+
201: RegistrarConfigResponseDto;
|
|
3272
3347
|
};
|
|
3273
3348
|
type RegistrarControllerCreateConfigResponse = RegistrarControllerCreateConfigResponses[keyof RegistrarControllerCreateConfigResponses];
|
|
3274
3349
|
type RegistrarControllerCreateAccessCertificateData = {
|
|
3275
3350
|
body: CreateAccessCertificateDto;
|
|
3276
3351
|
path?: never;
|
|
3277
3352
|
query?: never;
|
|
3278
|
-
url: "/registrar/access-certificate";
|
|
3353
|
+
url: "/api/registrar/access-certificate";
|
|
3279
3354
|
};
|
|
3280
3355
|
type RegistrarControllerCreateAccessCertificateErrors = {
|
|
3281
3356
|
/**
|
|
@@ -3303,11 +3378,66 @@ type RegistrarControllerCreateAccessCertificateResponses = {
|
|
|
3303
3378
|
};
|
|
3304
3379
|
};
|
|
3305
3380
|
type RegistrarControllerCreateAccessCertificateResponse = RegistrarControllerCreateAccessCertificateResponses[keyof RegistrarControllerCreateAccessCertificateResponses];
|
|
3381
|
+
type CredentialOfferControllerGetOfferData = {
|
|
3382
|
+
body: OfferRequestDto;
|
|
3383
|
+
path?: never;
|
|
3384
|
+
query?: never;
|
|
3385
|
+
url: "/api/issuer/offer";
|
|
3386
|
+
};
|
|
3387
|
+
type CredentialOfferControllerGetOfferResponses = {
|
|
3388
|
+
/**
|
|
3389
|
+
* JSON response
|
|
3390
|
+
*/
|
|
3391
|
+
201: OfferResponse;
|
|
3392
|
+
};
|
|
3393
|
+
type CredentialOfferControllerGetOfferResponse = CredentialOfferControllerGetOfferResponses[keyof CredentialOfferControllerGetOfferResponses];
|
|
3394
|
+
type DeferredControllerCompleteDeferredData = {
|
|
3395
|
+
body: CompleteDeferredDto;
|
|
3396
|
+
path: {
|
|
3397
|
+
transactionId: string;
|
|
3398
|
+
};
|
|
3399
|
+
query?: never;
|
|
3400
|
+
url: "/api/issuer/deferred/{transactionId}/complete";
|
|
3401
|
+
};
|
|
3402
|
+
type DeferredControllerCompleteDeferredErrors = {
|
|
3403
|
+
/**
|
|
3404
|
+
* Transaction not found
|
|
3405
|
+
*/
|
|
3406
|
+
404: unknown;
|
|
3407
|
+
};
|
|
3408
|
+
type DeferredControllerCompleteDeferredResponses = {
|
|
3409
|
+
/**
|
|
3410
|
+
* Transaction completed successfully
|
|
3411
|
+
*/
|
|
3412
|
+
200: DeferredOperationResponse;
|
|
3413
|
+
};
|
|
3414
|
+
type DeferredControllerCompleteDeferredResponse = DeferredControllerCompleteDeferredResponses[keyof DeferredControllerCompleteDeferredResponses];
|
|
3415
|
+
type DeferredControllerFailDeferredData = {
|
|
3416
|
+
body?: FailDeferredDto;
|
|
3417
|
+
path: {
|
|
3418
|
+
transactionId: string;
|
|
3419
|
+
};
|
|
3420
|
+
query?: never;
|
|
3421
|
+
url: "/api/issuer/deferred/{transactionId}/fail";
|
|
3422
|
+
};
|
|
3423
|
+
type DeferredControllerFailDeferredErrors = {
|
|
3424
|
+
/**
|
|
3425
|
+
* Transaction not found
|
|
3426
|
+
*/
|
|
3427
|
+
404: unknown;
|
|
3428
|
+
};
|
|
3429
|
+
type DeferredControllerFailDeferredResponses = {
|
|
3430
|
+
/**
|
|
3431
|
+
* Transaction marked as failed
|
|
3432
|
+
*/
|
|
3433
|
+
200: DeferredOperationResponse;
|
|
3434
|
+
};
|
|
3435
|
+
type DeferredControllerFailDeferredResponse = DeferredControllerFailDeferredResponses[keyof DeferredControllerFailDeferredResponses];
|
|
3306
3436
|
type TrustListControllerGetAllTrustListsData = {
|
|
3307
3437
|
body?: never;
|
|
3308
3438
|
path?: never;
|
|
3309
3439
|
query?: never;
|
|
3310
|
-
url: "/trust-list";
|
|
3440
|
+
url: "/api/trust-list";
|
|
3311
3441
|
};
|
|
3312
3442
|
type TrustListControllerGetAllTrustListsResponses = {
|
|
3313
3443
|
200: Array<TrustList>;
|
|
@@ -3317,7 +3447,7 @@ type TrustListControllerCreateTrustListData = {
|
|
|
3317
3447
|
body: TrustListCreateDto;
|
|
3318
3448
|
path?: never;
|
|
3319
3449
|
query?: never;
|
|
3320
|
-
url: "/trust-list";
|
|
3450
|
+
url: "/api/trust-list";
|
|
3321
3451
|
};
|
|
3322
3452
|
type TrustListControllerCreateTrustListResponses = {
|
|
3323
3453
|
201: TrustList;
|
|
@@ -3329,7 +3459,7 @@ type TrustListControllerDeleteTrustListData = {
|
|
|
3329
3459
|
id: string;
|
|
3330
3460
|
};
|
|
3331
3461
|
query?: never;
|
|
3332
|
-
url: "/trust-list/{id}";
|
|
3462
|
+
url: "/api/trust-list/{id}";
|
|
3333
3463
|
};
|
|
3334
3464
|
type TrustListControllerDeleteTrustListResponses = {
|
|
3335
3465
|
200: unknown;
|
|
@@ -3340,7 +3470,7 @@ type TrustListControllerGetTrustListData = {
|
|
|
3340
3470
|
id: string;
|
|
3341
3471
|
};
|
|
3342
3472
|
query?: never;
|
|
3343
|
-
url: "/trust-list/{id}";
|
|
3473
|
+
url: "/api/trust-list/{id}";
|
|
3344
3474
|
};
|
|
3345
3475
|
type TrustListControllerGetTrustListResponses = {
|
|
3346
3476
|
200: TrustList;
|
|
@@ -3352,7 +3482,7 @@ type TrustListControllerUpdateTrustListData = {
|
|
|
3352
3482
|
id: string;
|
|
3353
3483
|
};
|
|
3354
3484
|
query?: never;
|
|
3355
|
-
url: "/trust-list/{id}";
|
|
3485
|
+
url: "/api/trust-list/{id}";
|
|
3356
3486
|
};
|
|
3357
3487
|
type TrustListControllerUpdateTrustListResponses = {
|
|
3358
3488
|
200: TrustList;
|
|
@@ -3364,7 +3494,7 @@ type TrustListControllerExportTrustListData = {
|
|
|
3364
3494
|
id: string;
|
|
3365
3495
|
};
|
|
3366
3496
|
query?: never;
|
|
3367
|
-
url: "/trust-list/{id}/export";
|
|
3497
|
+
url: "/api/trust-list/{id}/export";
|
|
3368
3498
|
};
|
|
3369
3499
|
type TrustListControllerExportTrustListResponses = {
|
|
3370
3500
|
200: TrustListCreateDto;
|
|
@@ -3376,7 +3506,7 @@ type TrustListControllerGetTrustListVersionsData = {
|
|
|
3376
3506
|
id: string;
|
|
3377
3507
|
};
|
|
3378
3508
|
query?: never;
|
|
3379
|
-
url: "/trust-list/{id}/versions";
|
|
3509
|
+
url: "/api/trust-list/{id}/versions";
|
|
3380
3510
|
};
|
|
3381
3511
|
type TrustListControllerGetTrustListVersionsResponses = {
|
|
3382
3512
|
200: Array<TrustListVersion>;
|
|
@@ -3389,117 +3519,169 @@ type TrustListControllerGetTrustListVersionData = {
|
|
|
3389
3519
|
versionId: string;
|
|
3390
3520
|
};
|
|
3391
3521
|
query?: never;
|
|
3392
|
-
url: "/trust-list/{id}/versions/{versionId}";
|
|
3522
|
+
url: "/api/trust-list/{id}/versions/{versionId}";
|
|
3393
3523
|
};
|
|
3394
3524
|
type TrustListControllerGetTrustListVersionResponses = {
|
|
3395
3525
|
200: TrustListVersion;
|
|
3396
3526
|
};
|
|
3397
3527
|
type TrustListControllerGetTrustListVersionResponse = TrustListControllerGetTrustListVersionResponses[keyof TrustListControllerGetTrustListVersionResponses];
|
|
3398
|
-
type
|
|
3399
|
-
body?: never;
|
|
3400
|
-
path: {
|
|
3401
|
-
tenantId: string;
|
|
3402
|
-
id: string;
|
|
3403
|
-
};
|
|
3404
|
-
query?: never;
|
|
3405
|
-
url: "/{tenantId}/trust-list/{id}";
|
|
3406
|
-
};
|
|
3407
|
-
type TrustListPublicControllerGetTrustListJwtResponses = {
|
|
3408
|
-
200: string;
|
|
3409
|
-
};
|
|
3410
|
-
type TrustListPublicControllerGetTrustListJwtResponse = TrustListPublicControllerGetTrustListJwtResponses[keyof TrustListPublicControllerGetTrustListJwtResponses];
|
|
3411
|
-
type KeyControllerGetProvidersData = {
|
|
3528
|
+
type KeyChainControllerGetProvidersData = {
|
|
3412
3529
|
body?: never;
|
|
3413
3530
|
path?: never;
|
|
3414
3531
|
query?: never;
|
|
3415
|
-
url: "/key/providers";
|
|
3532
|
+
url: "/api/key-chain/providers";
|
|
3416
3533
|
};
|
|
3417
|
-
type
|
|
3534
|
+
type KeyChainControllerGetProvidersResponses = {
|
|
3418
3535
|
/**
|
|
3419
|
-
* List of available KMS providers
|
|
3536
|
+
* List of available KMS providers with capabilities
|
|
3420
3537
|
*/
|
|
3421
3538
|
200: KmsProvidersResponseDto;
|
|
3422
3539
|
};
|
|
3423
|
-
type
|
|
3424
|
-
type
|
|
3540
|
+
type KeyChainControllerGetProvidersResponse = KeyChainControllerGetProvidersResponses[keyof KeyChainControllerGetProvidersResponses];
|
|
3541
|
+
type KeyChainControllerGetAllData = {
|
|
3425
3542
|
body?: never;
|
|
3426
3543
|
path?: never;
|
|
3427
3544
|
query?: never;
|
|
3428
|
-
url: "/key";
|
|
3545
|
+
url: "/api/key-chain";
|
|
3429
3546
|
};
|
|
3430
|
-
type
|
|
3431
|
-
|
|
3547
|
+
type KeyChainControllerGetAllResponses = {
|
|
3548
|
+
/**
|
|
3549
|
+
* List of key chains
|
|
3550
|
+
*/
|
|
3551
|
+
200: Array<KeyChainResponseDto>;
|
|
3432
3552
|
};
|
|
3433
|
-
type
|
|
3434
|
-
type
|
|
3435
|
-
body:
|
|
3553
|
+
type KeyChainControllerGetAllResponse = KeyChainControllerGetAllResponses[keyof KeyChainControllerGetAllResponses];
|
|
3554
|
+
type KeyChainControllerCreateData = {
|
|
3555
|
+
body: KeyChainCreateDto;
|
|
3436
3556
|
path?: never;
|
|
3437
3557
|
query?: never;
|
|
3438
|
-
url: "/key";
|
|
3558
|
+
url: "/api/key-chain";
|
|
3439
3559
|
};
|
|
3440
|
-
type
|
|
3560
|
+
type KeyChainControllerCreateResponses = {
|
|
3441
3561
|
/**
|
|
3442
|
-
* Key
|
|
3562
|
+
* Key chain created successfully
|
|
3443
3563
|
*/
|
|
3444
3564
|
201: unknown;
|
|
3445
3565
|
};
|
|
3446
|
-
type
|
|
3566
|
+
type KeyChainControllerDeleteData = {
|
|
3447
3567
|
body?: never;
|
|
3448
3568
|
path: {
|
|
3449
3569
|
id: string;
|
|
3450
3570
|
};
|
|
3451
3571
|
query?: never;
|
|
3452
|
-
url: "/key/{id}";
|
|
3572
|
+
url: "/api/key-chain/{id}";
|
|
3573
|
+
};
|
|
3574
|
+
type KeyChainControllerDeleteErrors = {
|
|
3575
|
+
/**
|
|
3576
|
+
* Key chain not found
|
|
3577
|
+
*/
|
|
3578
|
+
404: unknown;
|
|
3453
3579
|
};
|
|
3454
|
-
type
|
|
3580
|
+
type KeyChainControllerDeleteResponses = {
|
|
3455
3581
|
/**
|
|
3456
|
-
* Key deleted successfully
|
|
3582
|
+
* Key chain deleted successfully
|
|
3457
3583
|
*/
|
|
3458
3584
|
200: unknown;
|
|
3459
3585
|
};
|
|
3460
|
-
type
|
|
3586
|
+
type KeyChainControllerGetByIdData = {
|
|
3461
3587
|
body?: never;
|
|
3462
3588
|
path: {
|
|
3463
3589
|
id: string;
|
|
3464
3590
|
};
|
|
3465
3591
|
query?: never;
|
|
3466
|
-
url: "/key/{id}";
|
|
3592
|
+
url: "/api/key-chain/{id}";
|
|
3593
|
+
};
|
|
3594
|
+
type KeyChainControllerGetByIdErrors = {
|
|
3595
|
+
/**
|
|
3596
|
+
* Key chain not found
|
|
3597
|
+
*/
|
|
3598
|
+
404: unknown;
|
|
3467
3599
|
};
|
|
3468
|
-
type
|
|
3469
|
-
|
|
3600
|
+
type KeyChainControllerGetByIdResponses = {
|
|
3601
|
+
/**
|
|
3602
|
+
* The key chain
|
|
3603
|
+
*/
|
|
3604
|
+
200: KeyChainResponseDto;
|
|
3470
3605
|
};
|
|
3471
|
-
type
|
|
3472
|
-
type
|
|
3473
|
-
body:
|
|
3606
|
+
type KeyChainControllerGetByIdResponse = KeyChainControllerGetByIdResponses[keyof KeyChainControllerGetByIdResponses];
|
|
3607
|
+
type KeyChainControllerUpdateData = {
|
|
3608
|
+
body: KeyChainUpdateDto;
|
|
3474
3609
|
path: {
|
|
3475
3610
|
id: string;
|
|
3476
3611
|
};
|
|
3477
3612
|
query?: never;
|
|
3478
|
-
url: "/key/{id}";
|
|
3613
|
+
url: "/api/key-chain/{id}";
|
|
3479
3614
|
};
|
|
3480
|
-
type
|
|
3615
|
+
type KeyChainControllerUpdateErrors = {
|
|
3481
3616
|
/**
|
|
3482
|
-
* Key
|
|
3617
|
+
* Key chain not found
|
|
3618
|
+
*/
|
|
3619
|
+
404: unknown;
|
|
3620
|
+
};
|
|
3621
|
+
type KeyChainControllerUpdateResponses = {
|
|
3622
|
+
/**
|
|
3623
|
+
* Key chain updated successfully
|
|
3483
3624
|
*/
|
|
3484
3625
|
200: unknown;
|
|
3485
3626
|
};
|
|
3486
|
-
type
|
|
3487
|
-
body
|
|
3627
|
+
type KeyChainControllerExportData = {
|
|
3628
|
+
body?: never;
|
|
3629
|
+
path: {
|
|
3630
|
+
id: string;
|
|
3631
|
+
};
|
|
3632
|
+
query?: never;
|
|
3633
|
+
url: "/api/key-chain/{id}/export";
|
|
3634
|
+
};
|
|
3635
|
+
type KeyChainControllerExportErrors = {
|
|
3636
|
+
/**
|
|
3637
|
+
* Key chain not found
|
|
3638
|
+
*/
|
|
3639
|
+
404: unknown;
|
|
3640
|
+
};
|
|
3641
|
+
type KeyChainControllerExportResponses = {
|
|
3642
|
+
/**
|
|
3643
|
+
* Key chain export data
|
|
3644
|
+
*/
|
|
3645
|
+
200: KeyChainExportDto;
|
|
3646
|
+
};
|
|
3647
|
+
type KeyChainControllerExportResponse = KeyChainControllerExportResponses[keyof KeyChainControllerExportResponses];
|
|
3648
|
+
type KeyChainControllerImportData = {
|
|
3649
|
+
body: KeyChainImportDto;
|
|
3488
3650
|
path?: never;
|
|
3489
3651
|
query?: never;
|
|
3490
|
-
url: "/key/
|
|
3652
|
+
url: "/api/key-chain/import";
|
|
3491
3653
|
};
|
|
3492
|
-
type
|
|
3654
|
+
type KeyChainControllerImportResponses = {
|
|
3493
3655
|
/**
|
|
3494
|
-
* Key
|
|
3656
|
+
* Key chain imported successfully
|
|
3495
3657
|
*/
|
|
3496
3658
|
201: unknown;
|
|
3497
3659
|
};
|
|
3660
|
+
type KeyChainControllerRotateData = {
|
|
3661
|
+
body?: never;
|
|
3662
|
+
path: {
|
|
3663
|
+
id: string;
|
|
3664
|
+
};
|
|
3665
|
+
query?: never;
|
|
3666
|
+
url: "/api/key-chain/{id}/rotate";
|
|
3667
|
+
};
|
|
3668
|
+
type KeyChainControllerRotateErrors = {
|
|
3669
|
+
/**
|
|
3670
|
+
* Key chain not found
|
|
3671
|
+
*/
|
|
3672
|
+
404: unknown;
|
|
3673
|
+
};
|
|
3674
|
+
type KeyChainControllerRotateResponses = {
|
|
3675
|
+
/**
|
|
3676
|
+
* Key chain rotated successfully
|
|
3677
|
+
*/
|
|
3678
|
+
200: unknown;
|
|
3679
|
+
};
|
|
3498
3680
|
type VerifierOfferControllerGetOfferData = {
|
|
3499
3681
|
body: PresentationRequest;
|
|
3500
3682
|
path?: never;
|
|
3501
3683
|
query?: never;
|
|
3502
|
-
url: "/verifier/offer";
|
|
3684
|
+
url: "/api/verifier/offer";
|
|
3503
3685
|
};
|
|
3504
3686
|
type VerifierOfferControllerGetOfferResponses = {
|
|
3505
3687
|
/**
|
|
@@ -3509,13 +3691,10 @@ type VerifierOfferControllerGetOfferResponses = {
|
|
|
3509
3691
|
};
|
|
3510
3692
|
type VerifierOfferControllerGetOfferResponse = VerifierOfferControllerGetOfferResponses[keyof VerifierOfferControllerGetOfferResponses];
|
|
3511
3693
|
type StorageControllerUploadData = {
|
|
3512
|
-
/**
|
|
3513
|
-
* List of cats
|
|
3514
|
-
*/
|
|
3515
3694
|
body: FileUploadDto;
|
|
3516
3695
|
path?: never;
|
|
3517
3696
|
query?: never;
|
|
3518
|
-
url: "/storage";
|
|
3697
|
+
url: "/api/storage";
|
|
3519
3698
|
};
|
|
3520
3699
|
type StorageControllerUploadResponses = {
|
|
3521
3700
|
201: {
|
|
@@ -3523,16 +3702,5 @@ type StorageControllerUploadResponses = {
|
|
|
3523
3702
|
};
|
|
3524
3703
|
};
|
|
3525
3704
|
type StorageControllerUploadResponse = StorageControllerUploadResponses[keyof StorageControllerUploadResponses];
|
|
3526
|
-
type StorageControllerDownloadData = {
|
|
3527
|
-
body?: never;
|
|
3528
|
-
path: {
|
|
3529
|
-
key: string;
|
|
3530
|
-
};
|
|
3531
|
-
query?: never;
|
|
3532
|
-
url: "/storage/{key}";
|
|
3533
|
-
};
|
|
3534
|
-
type StorageControllerDownloadResponses = {
|
|
3535
|
-
200: unknown;
|
|
3536
|
-
};
|
|
3537
3705
|
|
|
3538
|
-
export type { CertControllerGetCertificatesResponse as $, AllowListPolicy as A, AuthorizeQueries as B, CacheControllerClearAllCachesData as C, CacheControllerClearAllCachesResponse as D, CacheControllerClearAllCachesResponses as E, CacheControllerClearStatusListCacheData as F, CacheControllerClearStatusListCacheResponse as G, HealthControllerCheckResponse as H, CacheControllerClearStatusListCacheResponses as I, CacheControllerClearTrustListCacheData as J, CacheControllerClearTrustListCacheResponse as K, CacheControllerClearTrustListCacheResponses as L, CacheControllerGetStatsData as M, CacheControllerGetStatsResponses as N, CertControllerAddCertificateData as O, CertControllerAddCertificateResponse as P, CertControllerAddCertificateResponses as Q, CertControllerDeleteCertificateData as R, Session as S, CertControllerDeleteCertificateResponses as T, CertControllerExportConfigData as U, CertControllerExportConfigResponse as V, CertControllerExportConfigResponses as W, CertControllerGetCertificateData as X, CertControllerGetCertificateResponse as Y, CertControllerGetCertificateResponses as Z, CertControllerGetCertificatesData as _, HealthControllerCheckError as a, CreateAccessCertificateDto as a$, CertControllerGetCertificatesResponses as a0, CertControllerUpdateCertificateData as a1, CertControllerUpdateCertificateResponses as a2, CertEntity as a3, CertImportDto as a4, CertResponseDto as a5, CertUpdateDto as a6, CertUsageEntity as a7, ChainedAsConfig as a8, ChainedAsControllerAuthorizeData as a9, ChainedAsTokenResponseDto as aA, ClaimsQuery as aB, ClientControllerCreateClientData as aC, ClientControllerCreateClientResponse as aD, ClientControllerCreateClientResponses as aE, ClientControllerDeleteClientData as aF, ClientControllerDeleteClientResponses as aG, ClientControllerGetClientData as aH, ClientControllerGetClientResponse as aI, ClientControllerGetClientResponses as aJ, ClientControllerGetClientSecretData as aK, ClientControllerGetClientSecretResponse as aL, ClientControllerGetClientSecretResponses as aM, ClientControllerGetClientsData as aN, ClientControllerGetClientsResponse as aO, ClientControllerGetClientsResponses as aP, ClientControllerRotateClientSecretData as aQ, ClientControllerRotateClientSecretResponse as aR, ClientControllerRotateClientSecretResponses as aS, ClientControllerUpdateClientData as aT, ClientControllerUpdateClientResponse as aU, ClientControllerUpdateClientResponses as aV, ClientCredentialsDto as aW, ClientEntity as aX, ClientOptions as aY, ClientSecretResponseDto as aZ, CompleteDeferredDto as a_, ChainedAsControllerAuthorizeError as aa, ChainedAsControllerAuthorizeErrors as ab, ChainedAsControllerAuthorizeResponses as ac, ChainedAsControllerCallbackData as ad, ChainedAsControllerCallbackError as ae, ChainedAsControllerCallbackErrors as af, ChainedAsControllerCallbackResponses as ag, ChainedAsControllerGetMetadataData as ah, ChainedAsControllerGetMetadataResponses as ai, ChainedAsControllerJwksData as aj, ChainedAsControllerJwksResponses as ak, ChainedAsControllerParData as al, ChainedAsControllerParError as am, ChainedAsControllerParErrors as an, ChainedAsControllerParResponse as ao, ChainedAsControllerParResponses as ap, ChainedAsControllerTokenData as aq, ChainedAsControllerTokenError as ar, ChainedAsControllerTokenErrors as as, ChainedAsControllerTokenResponse as at, ChainedAsControllerTokenResponses as au, ChainedAsErrorResponseDto as av, ChainedAsParRequestDto as aw, ChainedAsParResponseDto as ax, ChainedAsTokenConfig as ay, ChainedAsTokenRequestDto as az, ApiKeyConfig as b, IssuanceConfig as b$, CreateClientDto as b0, CreateRegistrarConfigDto as b1, CreateStatusListDto as b2, CreateTenantDto as b3, CredentialConfig as b4, CredentialConfigControllerDeleteIssuanceConfigurationData as b5, CredentialConfigControllerDeleteIssuanceConfigurationResponses as b6, CredentialConfigControllerGetConfigByIdData as b7, CredentialConfigControllerGetConfigByIdResponse as b8, CredentialConfigControllerGetConfigByIdResponses as b9, DeferredCredentialRequestDto as bA, DeferredOperationResponse as bB, Display as bC, DisplayImage as bD, DisplayInfo as bE, DisplayLogo as bF, EcPublic as bG, EmbeddedDisclosurePolicy as bH, FailDeferredDto as bI, FileUploadDto as bJ, HealthControllerCheckData as bK, HealthControllerCheckErrors as bL, HealthControllerCheckResponses as bM, IaeActionOpenid4VpPresentation as bN, IaeActionRedirectToWeb as bO, ImportTenantDto as bP, InteractiveAuthorizationCodeResponseDto as bQ, InteractiveAuthorizationControllerCompleteWebAuthData as bR, InteractiveAuthorizationControllerCompleteWebAuthErrors as bS, InteractiveAuthorizationControllerCompleteWebAuthResponses as bT, InteractiveAuthorizationControllerInteractiveAuthorizationData as bU, InteractiveAuthorizationControllerInteractiveAuthorizationError as bV, InteractiveAuthorizationControllerInteractiveAuthorizationErrors as bW, InteractiveAuthorizationControllerInteractiveAuthorizationResponse as bX, InteractiveAuthorizationControllerInteractiveAuthorizationResponses as bY, InteractiveAuthorizationErrorResponseDto as bZ, InteractiveAuthorizationRequestDto as b_, CredentialConfigControllerGetConfigsData as ba, CredentialConfigControllerGetConfigsResponse as bb, CredentialConfigControllerGetConfigsResponses as bc, CredentialConfigControllerStoreCredentialConfigurationData as bd, CredentialConfigControllerStoreCredentialConfigurationResponse as be, CredentialConfigControllerStoreCredentialConfigurationResponses as bf, CredentialConfigControllerUpdateCredentialConfigurationData as bg, CredentialConfigControllerUpdateCredentialConfigurationResponse as bh, CredentialConfigControllerUpdateCredentialConfigurationResponses as bi, CredentialConfigCreate as bj, CredentialConfigUpdate as bk, CredentialOfferControllerGetOfferData as bl, CredentialOfferControllerGetOfferResponse as bm, CredentialOfferControllerGetOfferResponses as bn, CredentialQuery as bo, CredentialSetQuery as bp, DbKmsConfigDto as bq, Dcql as br, DeferredControllerCompleteDeferredData as bs, DeferredControllerCompleteDeferredErrors as bt, DeferredControllerCompleteDeferredResponse as bu, DeferredControllerCompleteDeferredResponses as bv, DeferredControllerFailDeferredData as bw, DeferredControllerFailDeferredErrors as bx, DeferredControllerFailDeferredResponse as by, DeferredControllerFailDeferredResponses as bz, AppControllerMainData as c, PolicyCredential as c$, IssuanceConfigControllerGetIssuanceConfigurationsData as c0, IssuanceConfigControllerGetIssuanceConfigurationsResponse as c1, IssuanceConfigControllerGetIssuanceConfigurationsResponses as c2, IssuanceConfigControllerStoreIssuanceConfigurationData as c3, IssuanceConfigControllerStoreIssuanceConfigurationResponse as c4, IssuanceConfigControllerStoreIssuanceConfigurationResponses as c5, IssuanceDto as c6, IssuerMetadataCredentialConfig as c7, JwksResponseDto as c8, Key as c9, OfferRequestDto as cA, OfferResponse as cB, Oid4VciControllerCredentialData as cC, Oid4VciControllerCredentialResponse as cD, Oid4VciControllerCredentialResponses as cE, Oid4VciControllerDeferredCredentialData as cF, Oid4VciControllerDeferredCredentialResponses as cG, Oid4VciControllerNonceData as cH, Oid4VciControllerNonceResponses as cI, Oid4VciControllerNotificationsData as cJ, Oid4VciControllerNotificationsResponses as cK, Oid4VciMetadataControllerVctData as cL, Oid4VciMetadataControllerVctResponse as cM, Oid4VciMetadataControllerVctResponses as cN, Oid4VpControllerGetPostRequestWithSessionData as cO, Oid4VpControllerGetPostRequestWithSessionResponse as cP, Oid4VpControllerGetPostRequestWithSessionResponses as cQ, Oid4VpControllerGetRequestNoRedirectWithSessionData as cR, Oid4VpControllerGetRequestNoRedirectWithSessionResponse as cS, Oid4VpControllerGetRequestNoRedirectWithSessionResponses as cT, Oid4VpControllerGetRequestWithSessionData as cU, Oid4VpControllerGetRequestWithSessionResponse as cV, Oid4VpControllerGetRequestWithSessionResponses as cW, Oid4VpControllerGetResponseData as cX, Oid4VpControllerGetResponseResponse as cY, Oid4VpControllerGetResponseResponses as cZ, ParResponseDto as c_, KeyControllerAddKeyData as ca, KeyControllerAddKeyResponses as cb, KeyControllerDeleteKeyData as cc, KeyControllerDeleteKeyResponses as cd, KeyControllerGenerateKeyData as ce, KeyControllerGenerateKeyResponses as cf, KeyControllerGetKeyData as cg, KeyControllerGetKeyResponse as ch, KeyControllerGetKeyResponses as ci, KeyControllerGetKeysData as cj, KeyControllerGetKeysResponse as ck, KeyControllerGetKeysResponses as cl, KeyControllerGetProvidersData as cm, KeyControllerGetProvidersResponse as cn, KeyControllerGetProvidersResponses as co, KeyControllerUpdateKeyData as cp, KeyControllerUpdateKeyResponses as cq, KeyEntity as cr, KeyGenerateDto as cs, KeyImportDto as ct, KmsConfigDto as cu, KmsProviderCapabilitiesDto as cv, KmsProviderInfoDto as cw, KmsProvidersResponseDto as cx, NoneTrustPolicy as cy, NotificationRequestDto as cz, AppControllerMainResponses as d, SessionEventsControllerSubscribeToSessionEventsData as d$, PresentationAttachment as d0, PresentationConfig as d1, PresentationConfigCreateDto as d2, PresentationConfigUpdateDto as d3, PresentationDuringIssuanceConfig as d4, PresentationManagementControllerConfigurationData as d5, PresentationManagementControllerConfigurationResponse as d6, PresentationManagementControllerConfigurationResponses as d7, PresentationManagementControllerDeleteConfigurationData as d8, PresentationManagementControllerDeleteConfigurationResponses as d9, RegistrarControllerGetConfigResponses as dA, RegistrarControllerUpdateConfigData as dB, RegistrarControllerUpdateConfigErrors as dC, RegistrarControllerUpdateConfigResponse as dD, RegistrarControllerUpdateConfigResponses as dE, RegistrationCertificateRequest as dF, RoleDto as dG, RootOfTrustPolicy as dH, SchemaResponse as dI, SessionConfigControllerGetConfigData as dJ, SessionConfigControllerGetConfigResponse as dK, SessionConfigControllerGetConfigResponses as dL, SessionConfigControllerResetConfigData as dM, SessionConfigControllerResetConfigResponses as dN, SessionConfigControllerUpdateConfigData as dO, SessionConfigControllerUpdateConfigResponse as dP, SessionConfigControllerUpdateConfigResponses as dQ, SessionControllerDeleteSessionData as dR, SessionControllerDeleteSessionResponses as dS, SessionControllerGetAllSessionsData as dT, SessionControllerGetAllSessionsResponse as dU, SessionControllerGetAllSessionsResponses as dV, SessionControllerGetSessionData as dW, SessionControllerGetSessionResponse as dX, SessionControllerGetSessionResponses as dY, SessionControllerRevokeAllData as dZ, SessionControllerRevokeAllResponses as d_, PresentationManagementControllerGetConfigurationData as da, PresentationManagementControllerGetConfigurationResponse as db, PresentationManagementControllerGetConfigurationResponses as dc, PresentationManagementControllerStorePresentationConfigData as dd, PresentationManagementControllerStorePresentationConfigResponse as de, PresentationManagementControllerStorePresentationConfigResponses as df, PresentationManagementControllerUpdateConfigurationData as dg, PresentationManagementControllerUpdateConfigurationResponse as dh, PresentationManagementControllerUpdateConfigurationResponses as di, PresentationRequest as dj, RegistrarConfigEntity as dk, RegistrarControllerCreateAccessCertificateData as dl, RegistrarControllerCreateAccessCertificateErrors as dm, RegistrarControllerCreateAccessCertificateResponse as dn, RegistrarControllerCreateAccessCertificateResponses as dp, RegistrarControllerCreateConfigData as dq, RegistrarControllerCreateConfigErrors as dr, RegistrarControllerCreateConfigResponse as ds, RegistrarControllerCreateConfigResponses as dt, RegistrarControllerDeleteConfigData as du, RegistrarControllerDeleteConfigResponse as dv, RegistrarControllerDeleteConfigResponses as dw, RegistrarControllerGetConfigData as dx, RegistrarControllerGetConfigErrors as dy, RegistrarControllerGetConfigResponse as dz, AttestationBasedPolicy as e, TrustListControllerDeleteTrustListData as e$, SessionEventsControllerSubscribeToSessionEventsResponses as e0, SessionStorageConfig as e1, StatusListAggregationDto as e2, StatusListConfig as e3, StatusListConfigControllerGetConfigData as e4, StatusListConfigControllerGetConfigResponse as e5, StatusListConfigControllerGetConfigResponses as e6, StatusListConfigControllerResetConfigData as e7, StatusListConfigControllerResetConfigResponse as e8, StatusListConfigControllerResetConfigResponses as e9, StatusUpdateDto as eA, StorageControllerDownloadData as eB, StorageControllerDownloadResponses as eC, StorageControllerUploadData as eD, StorageControllerUploadResponse as eE, StorageControllerUploadResponses as eF, TenantControllerDeleteTenantData as eG, TenantControllerDeleteTenantResponses as eH, TenantControllerGetTenantData as eI, TenantControllerGetTenantResponse as eJ, TenantControllerGetTenantResponses as eK, TenantControllerGetTenantsData as eL, TenantControllerGetTenantsResponse as eM, TenantControllerGetTenantsResponses as eN, TenantControllerInitTenantData as eO, TenantControllerInitTenantResponse as eP, TenantControllerInitTenantResponses as eQ, TenantControllerUpdateTenantData as eR, TenantControllerUpdateTenantResponse as eS, TenantControllerUpdateTenantResponses as eT, TenantEntity as eU, TokenResponse as eV, TransactionData as eW, TrustList as eX, TrustListControllerCreateTrustListData as eY, TrustListControllerCreateTrustListResponse as eZ, TrustListControllerCreateTrustListResponses as e_, StatusListConfigControllerUpdateConfigData as ea, StatusListConfigControllerUpdateConfigResponse as eb, StatusListConfigControllerUpdateConfigResponses as ec, StatusListControllerGetListData as ed, StatusListControllerGetListResponse as ee, StatusListControllerGetListResponses as ef, StatusListControllerGetStatusListAggregationData as eg, StatusListControllerGetStatusListAggregationResponse as eh, StatusListControllerGetStatusListAggregationResponses as ei, StatusListImportDto as ej, StatusListManagementControllerCreateListData as ek, StatusListManagementControllerCreateListResponse as el, StatusListManagementControllerCreateListResponses as em, StatusListManagementControllerDeleteListData as en, StatusListManagementControllerDeleteListResponse as eo, StatusListManagementControllerDeleteListResponses as ep, StatusListManagementControllerGetListData as eq, StatusListManagementControllerGetListResponse as er, StatusListManagementControllerGetListResponses as es, StatusListManagementControllerGetListsData as et, StatusListManagementControllerGetListsResponse as eu, StatusListManagementControllerGetListsResponses as ev, StatusListManagementControllerUpdateListData as ew, StatusListManagementControllerUpdateListResponse as ex, StatusListManagementControllerUpdateListResponses as ey, StatusListResponseDto as ez, AuthControllerGetGlobalJwksData as f, TrustListControllerDeleteTrustListResponses as f0, TrustListControllerExportTrustListData as f1, TrustListControllerExportTrustListResponse as f2, TrustListControllerExportTrustListResponses as f3, TrustListControllerGetAllTrustListsData as f4, TrustListControllerGetAllTrustListsResponse as f5, TrustListControllerGetAllTrustListsResponses as f6, TrustListControllerGetTrustListData as f7, TrustListControllerGetTrustListResponse as f8, TrustListControllerGetTrustListResponses as f9, VerifierOfferControllerGetOfferResponse as fA, VerifierOfferControllerGetOfferResponses as fB, WebHookAuthConfigHeader as fC, WebHookAuthConfigNone as fD, WebhookConfig as fE, WellKnownControllerAuthzMetadata0Data as fF, WellKnownControllerAuthzMetadata0Responses as fG, WellKnownControllerAuthzMetadata1Data as fH, WellKnownControllerAuthzMetadata1Responses as fI, WellKnownControllerChainedAsMetadataData as fJ, WellKnownControllerChainedAsMetadataResponse as fK, WellKnownControllerChainedAsMetadataResponses as fL, WellKnownControllerGetJwks0Data as fM, WellKnownControllerGetJwks0Response as fN, WellKnownControllerGetJwks0Responses as fO, WellKnownControllerGetJwks1Data as fP, WellKnownControllerGetJwks1Response as fQ, WellKnownControllerGetJwks1Responses as fR, WellKnownControllerIssuerMetadata0Data as fS, WellKnownControllerIssuerMetadata0Response as fT, WellKnownControllerIssuerMetadata0Responses as fU, WellKnownControllerIssuerMetadata1Data as fV, WellKnownControllerIssuerMetadata1Response as fW, WellKnownControllerIssuerMetadata1Responses as fX, TrustListControllerGetTrustListVersionData as fa, TrustListControllerGetTrustListVersionResponse as fb, TrustListControllerGetTrustListVersionResponses as fc, TrustListControllerGetTrustListVersionsData as fd, TrustListControllerGetTrustListVersionsResponse as fe, TrustListControllerGetTrustListVersionsResponses as ff, TrustListControllerUpdateTrustListData as fg, TrustListControllerUpdateTrustListResponse as fh, TrustListControllerUpdateTrustListResponses as fi, TrustListCreateDto as fj, TrustListPublicControllerGetTrustListJwtData as fk, TrustListPublicControllerGetTrustListJwtResponse as fl, TrustListPublicControllerGetTrustListJwtResponses as fm, TrustListVersion as fn, TrustedAuthorityQuery as fo, UpdateClientDto as fp, UpdateKeyDto as fq, UpdateRegistrarConfigDto as fr, UpdateSessionConfigDto as fs, UpdateStatusListConfigDto as ft, UpdateStatusListDto as fu, UpdateTenantDto as fv, UpstreamOidcConfig as fw, VaultKmsConfigDto as fx, Vct as fy, VerifierOfferControllerGetOfferData as fz, AuthControllerGetGlobalJwksResponses as g, AuthControllerGetOAuth2TokenData as h, AuthControllerGetOAuth2TokenErrors as i, AuthControllerGetOAuth2TokenResponse as j, AuthControllerGetOAuth2TokenResponses as k, AuthControllerGetOidcDiscoveryData as l, AuthControllerGetOidcDiscoveryResponses as m, AuthenticationMethodAuth as n, AuthenticationMethodNone as o, AuthenticationMethodPresentation as p, AuthenticationUrlConfig as q, AuthorizationResponse as r, AuthorizeControllerAuthorizeData as s, AuthorizeControllerAuthorizeResponses as t, AuthorizeControllerParData as u, AuthorizeControllerParResponse as v, AuthorizeControllerParResponses as w, AuthorizeControllerTokenData as x, AuthorizeControllerTokenResponse as y, AuthorizeControllerTokenResponses as z };
|
|
3706
|
+
export type { ClientControllerDeleteClientData as $, AllowListPolicy as A, AuthorizeQueries as B, CacheControllerClearAllCachesData as C, CacheControllerClearAllCachesResponse as D, CacheControllerClearAllCachesResponses as E, CacheControllerClearStatusListCacheData as F, CacheControllerClearStatusListCacheResponse as G, CacheControllerClearStatusListCacheResponses as H, CacheControllerClearTrustListCacheData as I, CacheControllerClearTrustListCacheResponse as J, CacheControllerClearTrustListCacheResponses as K, CacheControllerGetStatsData as L, CacheControllerGetStatsResponses as M, CertificateInfoDto as N, ChainedAsConfig as O, ChainedAsErrorResponseDto as P, ChainedAsParResponseDto as Q, ChainedAsTokenConfig as R, Session as S, ChainedAsTokenRequestDto as T, ChainedAsTokenResponseDto as U, ClaimDisplayInfo as V, ClaimMetadata as W, ClaimsQuery as X, ClientControllerCreateClientData as Y, ClientControllerCreateClientResponse as Z, ClientControllerCreateClientResponses as _, ApiKeyConfig as a, DisplayInfo as a$, ClientControllerDeleteClientResponses as a0, ClientControllerGetClientData as a1, ClientControllerGetClientResponse as a2, ClientControllerGetClientResponses as a3, ClientControllerGetClientSecretData as a4, ClientControllerGetClientSecretResponse as a5, ClientControllerGetClientSecretResponses as a6, ClientControllerGetClientsData as a7, ClientControllerGetClientsResponse as a8, ClientControllerGetClientsResponses as a9, CredentialConfigControllerGetConfigsResponses as aA, CredentialConfigControllerStoreCredentialConfigurationData as aB, CredentialConfigControllerStoreCredentialConfigurationResponse as aC, CredentialConfigControllerStoreCredentialConfigurationResponses as aD, CredentialConfigControllerUpdateCredentialConfigurationData as aE, CredentialConfigControllerUpdateCredentialConfigurationResponse as aF, CredentialConfigControllerUpdateCredentialConfigurationResponses as aG, CredentialConfigCreate as aH, CredentialConfigUpdate as aI, CredentialOfferControllerGetOfferData as aJ, CredentialOfferControllerGetOfferResponse as aK, CredentialOfferControllerGetOfferResponses as aL, CredentialQuery as aM, CredentialSetQuery as aN, Dcql as aO, DeferredControllerCompleteDeferredData as aP, DeferredControllerCompleteDeferredErrors as aQ, DeferredControllerCompleteDeferredResponse as aR, DeferredControllerCompleteDeferredResponses as aS, DeferredControllerFailDeferredData as aT, DeferredControllerFailDeferredErrors as aU, DeferredControllerFailDeferredResponse as aV, DeferredControllerFailDeferredResponses as aW, DeferredCredentialRequestDto as aX, DeferredOperationResponse as aY, Display as aZ, DisplayImage as a_, ClientControllerRotateClientSecretData as aa, ClientControllerRotateClientSecretResponse as ab, ClientControllerRotateClientSecretResponses as ac, ClientControllerUpdateClientData as ad, ClientControllerUpdateClientResponse as ae, ClientControllerUpdateClientResponses as af, ClientCredentialsDto as ag, ClientEntity as ah, ClientOptions as ai, ClientSecretResponseDto as aj, CompleteDeferredDto as ak, CreateAccessCertificateDto as al, CreateAttributeProviderDto as am, CreateClientDto as an, CreateRegistrarConfigDto as ao, CreateStatusListDto as ap, CreateTenantDto as aq, CreateWebhookEndpointDto as ar, CredentialConfig as as, CredentialConfigControllerDeleteIssuanceConfigurationData as at, CredentialConfigControllerDeleteIssuanceConfigurationResponses as au, CredentialConfigControllerGetConfigByIdData as av, CredentialConfigControllerGetConfigByIdResponse as aw, CredentialConfigControllerGetConfigByIdResponses as ax, CredentialConfigControllerGetConfigsData as ay, CredentialConfigControllerGetConfigsResponse as az, AppControllerGetFrontendConfigData as b, KmsProviderInfoDto as b$, DisplayLogo as b0, EcJwk as b1, EcPublic as b2, EmbeddedDisclosurePolicy as b3, ExportEcJwk as b4, ExportRotationPolicyDto as b5, ExternalTrustListEntity as b6, FailDeferredDto as b7, FileUploadDto as b8, FrontendConfigResponseDto as b9, KeyChainControllerExportResponse as bA, KeyChainControllerExportResponses as bB, KeyChainControllerGetAllData as bC, KeyChainControllerGetAllResponse as bD, KeyChainControllerGetAllResponses as bE, KeyChainControllerGetByIdData as bF, KeyChainControllerGetByIdErrors as bG, KeyChainControllerGetByIdResponse as bH, KeyChainControllerGetByIdResponses as bI, KeyChainControllerGetProvidersData as bJ, KeyChainControllerGetProvidersResponse as bK, KeyChainControllerGetProvidersResponses as bL, KeyChainControllerImportData as bM, KeyChainControllerImportResponses as bN, KeyChainControllerRotateData as bO, KeyChainControllerRotateErrors as bP, KeyChainControllerRotateResponses as bQ, KeyChainControllerUpdateData as bR, KeyChainControllerUpdateErrors as bS, KeyChainControllerUpdateResponses as bT, KeyChainCreateDto as bU, KeyChainEntity as bV, KeyChainExportDto as bW, KeyChainImportDto as bX, KeyChainResponseDto as bY, KeyChainUpdateDto as bZ, KmsProviderCapabilitiesDto as b_, GrafanaConfigDto as ba, IaeActionOpenid4VpPresentation as bb, IaeActionRedirectToWeb as bc, ImportTenantDto as bd, InteractiveAuthorizationCodeResponseDto as be, InteractiveAuthorizationErrorResponseDto as bf, InteractiveAuthorizationRequestDto as bg, InternalTrustListEntity as bh, IssuanceConfig as bi, IssuanceConfigControllerGetIssuanceConfigurationsData as bj, IssuanceConfigControllerGetIssuanceConfigurationsResponse as bk, IssuanceConfigControllerGetIssuanceConfigurationsResponses as bl, IssuanceConfigControllerStoreIssuanceConfigurationData as bm, IssuanceConfigControllerStoreIssuanceConfigurationResponse as bn, IssuanceConfigControllerStoreIssuanceConfigurationResponses as bo, IssuanceDto as bp, IssuerMetadataCredentialConfig as bq, JwksResponseDto as br, KeyAttestationsRequired as bs, KeyChainControllerCreateData as bt, KeyChainControllerCreateResponses as bu, KeyChainControllerDeleteData as bv, KeyChainControllerDeleteErrors as bw, KeyChainControllerDeleteResponses as bx, KeyChainControllerExportData as by, KeyChainControllerExportErrors as bz, AppControllerGetFrontendConfigResponse as c, RotationPolicyCreateDto as c$, KmsProvidersResponseDto as c0, NoneTrustPolicy as c1, NotificationRequestDto as c2, Object$1 as c3, ObjectWritable as c4, OfferRequestDto as c5, OfferResponse as c6, ParResponseDto as c7, PolicyCredential as c8, PresentationAttachment as c9, PublicKeyInfoDto as cA, RegistrarConfigResponseDto as cB, RegistrarControllerCreateAccessCertificateData as cC, RegistrarControllerCreateAccessCertificateErrors as cD, RegistrarControllerCreateAccessCertificateResponse as cE, RegistrarControllerCreateAccessCertificateResponses as cF, RegistrarControllerCreateConfigData as cG, RegistrarControllerCreateConfigErrors as cH, RegistrarControllerCreateConfigResponse as cI, RegistrarControllerCreateConfigResponses as cJ, RegistrarControllerDeleteConfigData as cK, RegistrarControllerDeleteConfigResponse as cL, RegistrarControllerDeleteConfigResponses as cM, RegistrarControllerGetConfigData as cN, RegistrarControllerGetConfigErrors as cO, RegistrarControllerGetConfigResponse as cP, RegistrarControllerGetConfigResponses as cQ, RegistrarControllerUpdateConfigData as cR, RegistrarControllerUpdateConfigErrors as cS, RegistrarControllerUpdateConfigResponse as cT, RegistrarControllerUpdateConfigResponses as cU, RegistrationCertificateBody as cV, RegistrationCertificatePurpose as cW, RegistrationCertificateRequest as cX, ResolveIssuerMetadataDto as cY, RoleDto as cZ, RootOfTrustPolicy as c_, PresentationConfig as ca, PresentationConfigCreateDto as cb, PresentationConfigUpdateDto as cc, PresentationConfigWritable as cd, PresentationDuringIssuanceConfig as ce, PresentationManagementControllerConfigurationData as cf, PresentationManagementControllerConfigurationResponse as cg, PresentationManagementControllerConfigurationResponses as ch, PresentationManagementControllerDeleteConfigurationData as ci, PresentationManagementControllerDeleteConfigurationResponses as cj, PresentationManagementControllerGetConfigurationData as ck, PresentationManagementControllerGetConfigurationResponse as cl, PresentationManagementControllerGetConfigurationResponses as cm, PresentationManagementControllerReissueRegistrationCertificateData as cn, PresentationManagementControllerReissueRegistrationCertificateErrors as co, PresentationManagementControllerReissueRegistrationCertificateResponses as cp, PresentationManagementControllerResolveIssuerMetadataData as cq, PresentationManagementControllerResolveIssuerMetadataErrors as cr, PresentationManagementControllerResolveIssuerMetadataResponses as cs, PresentationManagementControllerStorePresentationConfigData as ct, PresentationManagementControllerStorePresentationConfigResponse as cu, PresentationManagementControllerStorePresentationConfigResponses as cv, PresentationManagementControllerUpdateConfigurationData as cw, PresentationManagementControllerUpdateConfigurationResponse as cx, PresentationManagementControllerUpdateConfigurationResponses as cy, PresentationRequest as cz, AppControllerGetFrontendConfigResponses as d, TenantControllerDeleteTenantResponses as d$, RotationPolicyImportDto as d0, RotationPolicyResponseDto as d1, RotationPolicyUpdateDto as d2, SchemaResponse as d3, SessionConfigControllerGetConfigData as d4, SessionConfigControllerGetConfigResponse as d5, SessionConfigControllerGetConfigResponses as d6, SessionConfigControllerResetConfigData as d7, SessionConfigControllerResetConfigResponses as d8, SessionConfigControllerUpdateConfigData as d9, StatusListConfigControllerResetConfigResponse as dA, StatusListConfigControllerResetConfigResponses as dB, StatusListConfigControllerUpdateConfigData as dC, StatusListConfigControllerUpdateConfigResponse as dD, StatusListConfigControllerUpdateConfigResponses as dE, StatusListImportDto as dF, StatusListManagementControllerCreateListData as dG, StatusListManagementControllerCreateListResponse as dH, StatusListManagementControllerCreateListResponses as dI, StatusListManagementControllerDeleteListData as dJ, StatusListManagementControllerDeleteListResponse as dK, StatusListManagementControllerDeleteListResponses as dL, StatusListManagementControllerGetListData as dM, StatusListManagementControllerGetListResponse as dN, StatusListManagementControllerGetListResponses as dO, StatusListManagementControllerGetListsData as dP, StatusListManagementControllerGetListsResponse as dQ, StatusListManagementControllerGetListsResponses as dR, StatusListManagementControllerUpdateListData as dS, StatusListManagementControllerUpdateListResponse as dT, StatusListManagementControllerUpdateListResponses as dU, StatusListResponseDto as dV, StatusUpdateDto as dW, StorageControllerUploadData as dX, StorageControllerUploadResponse as dY, StorageControllerUploadResponses as dZ, TenantControllerDeleteTenantData as d_, SessionConfigControllerUpdateConfigResponse as da, SessionConfigControllerUpdateConfigResponses as db, SessionControllerDeleteSessionData as dc, SessionControllerDeleteSessionResponses as dd, SessionControllerGetAllSessionsData as de, SessionControllerGetAllSessionsResponse as df, SessionControllerGetAllSessionsResponses as dg, SessionControllerGetSessionData as dh, SessionControllerGetSessionLogsData as di, SessionControllerGetSessionLogsResponse as dj, SessionControllerGetSessionLogsResponses as dk, SessionControllerGetSessionResponse as dl, SessionControllerGetSessionResponses as dm, SessionControllerRevokeAllData as dn, SessionControllerRevokeAllResponses as dp, SessionEventsControllerSubscribeToSessionEventsData as dq, SessionEventsControllerSubscribeToSessionEventsResponses as dr, SessionLogEntryResponseDto as ds, SessionStorageConfig as dt, StatusListAggregationDto as du, StatusListConfig as dv, StatusListConfigControllerGetConfigData as dw, StatusListConfigControllerGetConfigResponse as dx, StatusListConfigControllerGetConfigResponses as dy, StatusListConfigControllerResetConfigData as dz, AppControllerGetVersionData as e, WebhookEndpointControllerDeleteResponses as e$, TenantControllerGetTenantData as e0, TenantControllerGetTenantResponse as e1, TenantControllerGetTenantResponses as e2, TenantControllerGetTenantsData as e3, TenantControllerGetTenantsResponse as e4, TenantControllerGetTenantsResponses as e5, TenantControllerInitTenantData as e6, TenantControllerInitTenantResponse as e7, TenantControllerInitTenantResponses as e8, TenantControllerUpdateTenantData as e9, TrustListControllerUpdateTrustListData as eA, TrustListControllerUpdateTrustListResponse as eB, TrustListControllerUpdateTrustListResponses as eC, TrustListCreateDto as eD, TrustListEntityInfo as eE, TrustListVersion as eF, TrustedAuthorityQuery as eG, UpdateAttributeProviderDto as eH, UpdateClientDto as eI, UpdateRegistrarConfigDto as eJ, UpdateSessionConfigDto as eK, UpdateStatusListConfigDto as eL, UpdateStatusListDto as eM, UpdateTenantDto as eN, UpdateWebhookEndpointDto as eO, UpstreamOidcConfig as eP, Vct as eQ, VerifierOfferControllerGetOfferData as eR, VerifierOfferControllerGetOfferResponse as eS, VerifierOfferControllerGetOfferResponses as eT, WebHookAuthConfigHeader as eU, WebHookAuthConfigNone as eV, WebhookConfig as eW, WebhookEndpointControllerCreateData as eX, WebhookEndpointControllerCreateResponses as eY, WebhookEndpointControllerDeleteData as eZ, WebhookEndpointControllerDeleteErrors as e_, TenantControllerUpdateTenantResponse as ea, TenantControllerUpdateTenantResponses as eb, TenantEntity as ec, TokenResponse as ed, TransactionData as ee, TrustList as ef, TrustListControllerCreateTrustListData as eg, TrustListControllerCreateTrustListResponse as eh, TrustListControllerCreateTrustListResponses as ei, TrustListControllerDeleteTrustListData as ej, TrustListControllerDeleteTrustListResponses as ek, TrustListControllerExportTrustListData as el, TrustListControllerExportTrustListResponse as em, TrustListControllerExportTrustListResponses as en, TrustListControllerGetAllTrustListsData as eo, TrustListControllerGetAllTrustListsResponse as ep, TrustListControllerGetAllTrustListsResponses as eq, TrustListControllerGetTrustListData as er, TrustListControllerGetTrustListResponse as es, TrustListControllerGetTrustListResponses as et, TrustListControllerGetTrustListVersionData as eu, TrustListControllerGetTrustListVersionResponse as ev, TrustListControllerGetTrustListVersionResponses as ew, TrustListControllerGetTrustListVersionsData as ex, TrustListControllerGetTrustListVersionsResponse as ey, TrustListControllerGetTrustListVersionsResponses as ez, AppControllerGetVersionResponses as f, WebhookEndpointControllerGetAllData as f0, WebhookEndpointControllerGetAllResponses as f1, WebhookEndpointControllerGetByIdData as f2, WebhookEndpointControllerGetByIdErrors as f3, WebhookEndpointControllerGetByIdResponses as f4, WebhookEndpointControllerUpdateData as f5, WebhookEndpointControllerUpdateErrors as f6, WebhookEndpointControllerUpdateResponses as f7, WebhookEndpointEntity as f8, AttestationBasedPolicy as g, AttributeProviderControllerCreateData as h, AttributeProviderControllerCreateResponses as i, AttributeProviderControllerDeleteData as j, AttributeProviderControllerDeleteErrors as k, AttributeProviderControllerDeleteResponses as l, AttributeProviderControllerGetAllData as m, AttributeProviderControllerGetAllResponses as n, AttributeProviderControllerGetByIdData as o, AttributeProviderControllerGetByIdErrors as p, AttributeProviderControllerGetByIdResponses as q, AttributeProviderControllerUpdateData as r, AttributeProviderControllerUpdateErrors as s, AttributeProviderControllerUpdateResponses as t, AttributeProviderEntity as u, AuthenticationMethodAuth as v, AuthenticationMethodNone as w, AuthenticationMethodPresentation as x, AuthenticationUrlConfig as y, AuthorizationResponse as z };
|