@learncard/types 5.12.2 → 5.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/auth.d.ts +328 -0
- package/dist/auth.d.ts.map +1 -0
- package/dist/index.d.ts +1 -0
- package/dist/index.d.ts.map +1 -1
- package/dist/lcn.d.ts +115 -2
- package/dist/lcn.d.ts.map +1 -1
- package/dist/types.cjs.development.js +59 -5
- package/dist/types.cjs.development.js.map +3 -3
- package/dist/types.cjs.production.min.js +10 -10
- package/dist/types.cjs.production.min.js.map +4 -4
- package/dist/types.esm.js +59 -5
- package/dist/types.esm.js.map +3 -3
- package/package.json +1 -1
package/dist/auth.d.ts
ADDED
|
@@ -0,0 +1,328 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Provider-agnostic interfaces for authentication and key derivation.
|
|
3
|
+
*
|
|
4
|
+
* Both @learncard/sss-key-manager and learn-card-base import from here,
|
|
5
|
+
* ensuring a single canonical source for abstract interfaces without
|
|
6
|
+
* coupling consumers to any specific implementation.
|
|
7
|
+
*/
|
|
8
|
+
/**
|
|
9
|
+
* Typed error for auth session issues.
|
|
10
|
+
* Auth providers should throw this (instead of generic Error) when the
|
|
11
|
+
* session is expired, revoked, or missing so the coordinator can
|
|
12
|
+
* distinguish "not logged in" from "unexpected failure".
|
|
13
|
+
*/
|
|
14
|
+
export declare class AuthSessionError extends Error {
|
|
15
|
+
readonly reason: 'expired' | 'no_session' | 'revoked' | 'network';
|
|
16
|
+
constructor(message: string, reason: 'expired' | 'no_session' | 'revoked' | 'network');
|
|
17
|
+
}
|
|
18
|
+
/**
|
|
19
|
+
* Auth provider identifier. Known values: 'firebase', 'supertokens', 'keycloak', 'oidc'.
|
|
20
|
+
* Use any string to support custom auth providers without modifying this type.
|
|
21
|
+
*/
|
|
22
|
+
export type AuthProviderType = string;
|
|
23
|
+
export interface AuthUser {
|
|
24
|
+
id: string;
|
|
25
|
+
email?: string;
|
|
26
|
+
phone?: string;
|
|
27
|
+
displayName?: string;
|
|
28
|
+
photoUrl?: string;
|
|
29
|
+
providerType: AuthProviderType;
|
|
30
|
+
/** Account creation timestamp (when available from the auth provider) */
|
|
31
|
+
createdAt?: Date;
|
|
32
|
+
}
|
|
33
|
+
/**
|
|
34
|
+
* Abstract auth provider interface.
|
|
35
|
+
* Implementations wrap a specific auth SDK (Firebase, Supertokens, etc.)
|
|
36
|
+
* and expose a uniform API to the coordinator.
|
|
37
|
+
*/
|
|
38
|
+
export interface AuthProvider {
|
|
39
|
+
getIdToken(forceRefresh?: boolean): Promise<string>;
|
|
40
|
+
getCurrentUser(): Promise<AuthUser | null>;
|
|
41
|
+
getProviderType(): AuthProviderType;
|
|
42
|
+
signOut(): Promise<void>;
|
|
43
|
+
/**
|
|
44
|
+
* Attempt to silently refresh the auth session (e.g., force-refresh
|
|
45
|
+
* the JWT using the underlying refresh token).
|
|
46
|
+
*
|
|
47
|
+
* Returns `true` if the session was successfully refreshed.
|
|
48
|
+
* Returns `false` if a full re-authentication is required.
|
|
49
|
+
*
|
|
50
|
+
* Optional — providers that don't implement this will require full
|
|
51
|
+
* re-auth whenever the session expires.
|
|
52
|
+
*/
|
|
53
|
+
refreshSession?(): Promise<boolean>;
|
|
54
|
+
/**
|
|
55
|
+
* Re-authenticate with a server-issued token (e.g., a Firebase custom
|
|
56
|
+
* token returned after a server-side account change that invalidates
|
|
57
|
+
* the current session).
|
|
58
|
+
*
|
|
59
|
+
* Returns the refreshed AuthUser read directly from the auth SDK
|
|
60
|
+
* (not from the app store, which may be stale).
|
|
61
|
+
*
|
|
62
|
+
* Optional — only needed by providers whose server-side account
|
|
63
|
+
* mutations invalidate the client session.
|
|
64
|
+
*/
|
|
65
|
+
reauthenticateWithToken?(token: string): Promise<AuthUser | null>;
|
|
66
|
+
}
|
|
67
|
+
/**
|
|
68
|
+
* Opaque handle returned by `sendPhoneOtp()`.
|
|
69
|
+
* On web this wraps a ConfirmationResult; on native it carries a verificationId.
|
|
70
|
+
* Consumers pass this back to `confirmPhoneOtp()` — never inspect internals.
|
|
71
|
+
*/
|
|
72
|
+
export interface PhoneVerificationHandle {
|
|
73
|
+
verificationId: string;
|
|
74
|
+
/** Platform-specific confirmation object (e.g. Firebase ConfirmationResult) */
|
|
75
|
+
_internal?: unknown;
|
|
76
|
+
}
|
|
77
|
+
/**
|
|
78
|
+
* Abstract sign-in adapter interface.
|
|
79
|
+
*
|
|
80
|
+
* Encapsulates **all** provider-specific sign-in logic (Firebase, Supertokens,
|
|
81
|
+
* Keycloak, …). Apps register a concrete adapter at startup via
|
|
82
|
+
* `registerSignInAdapterFactory()` and resolve it through the provider registry.
|
|
83
|
+
*
|
|
84
|
+
* The `subscribe()` method is the **single source of truth** for auth state:
|
|
85
|
+
* `SignInAdapterProvider` calls it once and writes every state change to
|
|
86
|
+
* `authUserStore`, replacing the Phase 1 bridge.
|
|
87
|
+
*
|
|
88
|
+
* Individual sign-in methods return `Promise<AuthUser>` on success and throw
|
|
89
|
+
* on failure — the app-level hook (`useFirebase` / `useAuth`) handles UI
|
|
90
|
+
* feedback (toasts, modals, analytics).
|
|
91
|
+
*/
|
|
92
|
+
export interface SignInAdapter {
|
|
93
|
+
readonly providerType: AuthProviderType;
|
|
94
|
+
/**
|
|
95
|
+
* Subscribe to auth-state changes. The callback fires immediately with
|
|
96
|
+
* the current state and again on every sign-in / sign-out.
|
|
97
|
+
*
|
|
98
|
+
* Returns an unsubscribe function.
|
|
99
|
+
*/
|
|
100
|
+
subscribe(onUser: (user: AuthUser | null) => void): () => void;
|
|
101
|
+
/** Synchronous snapshot of the last user emitted by `subscribe()`. */
|
|
102
|
+
getCurrentUser(): AuthUser | null;
|
|
103
|
+
sendEmailLink(email: string, redirectUrl?: string): Promise<void>;
|
|
104
|
+
verifyEmailLink(email: string, link: string): Promise<AuthUser>;
|
|
105
|
+
isEmailLink(link: string): boolean;
|
|
106
|
+
/**
|
|
107
|
+
* Send an SMS OTP to the given number.
|
|
108
|
+
* On web this sets up a RecaptchaVerifier transparently.
|
|
109
|
+
*/
|
|
110
|
+
sendPhoneOtp(phoneNumber: string): Promise<PhoneVerificationHandle>;
|
|
111
|
+
/**
|
|
112
|
+
* Confirm a phone OTP using the handle returned by `sendPhoneOtp()`.
|
|
113
|
+
*/
|
|
114
|
+
confirmPhoneOtp(handle: PhoneVerificationHandle, code: string | number): Promise<AuthUser>;
|
|
115
|
+
/**
|
|
116
|
+
* Confirm a phone OTP using a native verificationId (Capacitor auto-verify
|
|
117
|
+
* path). Falls back to `confirmPhoneOtp` when not implemented.
|
|
118
|
+
*/
|
|
119
|
+
confirmNativePhoneOtp?(verificationId: string, code: string | number): Promise<AuthUser>;
|
|
120
|
+
signInWithGoogle(): Promise<AuthUser>;
|
|
121
|
+
signInWithApple(): Promise<AuthUser>;
|
|
122
|
+
/** Check for a pending OAuth redirect result (e.g. Apple on web). */
|
|
123
|
+
checkRedirectResult?(): Promise<AuthUser | null>;
|
|
124
|
+
signInWithCustomToken(token: string): Promise<AuthUser>;
|
|
125
|
+
/** Sign in with an OIDC credential (e.g. Keycloak World Scouts SSO). */
|
|
126
|
+
signInWithOidcCredential?(providerId: string, idToken: string): Promise<AuthUser>;
|
|
127
|
+
deleteAccount(): Promise<void>;
|
|
128
|
+
signOut(): Promise<void>;
|
|
129
|
+
/** Tear down any DOM elements created by the adapter (e.g. RecaptchaVerifier). */
|
|
130
|
+
cleanup?(): void;
|
|
131
|
+
}
|
|
132
|
+
/**
|
|
133
|
+
* Recovery method metadata returned by the server.
|
|
134
|
+
* The `type` is a string so strategies can define their own method types
|
|
135
|
+
* without modifying this interface.
|
|
136
|
+
*/
|
|
137
|
+
export interface RecoveryMethodInfo {
|
|
138
|
+
type: string;
|
|
139
|
+
createdAt: Date;
|
|
140
|
+
credentialId?: string;
|
|
141
|
+
}
|
|
142
|
+
/**
|
|
143
|
+
* Generic result of a successful recovery execution.
|
|
144
|
+
* All strategies must produce a private key + DID.
|
|
145
|
+
*/
|
|
146
|
+
export interface RecoveryResult {
|
|
147
|
+
privateKey: string;
|
|
148
|
+
did: string;
|
|
149
|
+
}
|
|
150
|
+
/**
|
|
151
|
+
* Server key status returned by the strategy's fetchServerKeyStatus.
|
|
152
|
+
* The strategy owns the server shape — different strategies may
|
|
153
|
+
* have fundamentally different server payloads.
|
|
154
|
+
*/
|
|
155
|
+
export interface ServerKeyStatus {
|
|
156
|
+
exists: boolean;
|
|
157
|
+
needsMigration: boolean;
|
|
158
|
+
primaryDid: string | null;
|
|
159
|
+
recoveryMethods: RecoveryMethodInfo[];
|
|
160
|
+
authShare: string | null;
|
|
161
|
+
shareVersion: number | null;
|
|
162
|
+
maskedRecoveryEmail?: string | null;
|
|
163
|
+
}
|
|
164
|
+
/**
|
|
165
|
+
* Declarative capability flags for a key derivation strategy.
|
|
166
|
+
*
|
|
167
|
+
* UI components read these to decide which features to show.
|
|
168
|
+
* Each strategy declares its own capabilities — no strategy-specific
|
|
169
|
+
* checks needed in the UI layer.
|
|
170
|
+
*
|
|
171
|
+
* All flags default to `false` when absent.
|
|
172
|
+
*
|
|
173
|
+
* @example
|
|
174
|
+
* ```ts
|
|
175
|
+
* // SSS declares full capabilities:
|
|
176
|
+
* capabilities: { recovery: true, deviceLinking: true, localKeyPersistence: true }
|
|
177
|
+
*
|
|
178
|
+
* // Web3Auth derives keys on-demand, nothing local to manage:
|
|
179
|
+
* capabilities: { recovery: false, deviceLinking: false, localKeyPersistence: false }
|
|
180
|
+
* ```
|
|
181
|
+
*/
|
|
182
|
+
export interface KeyDerivationCapabilities {
|
|
183
|
+
/** Strategy supports user-facing recovery methods (setup + execution) */
|
|
184
|
+
recovery: boolean;
|
|
185
|
+
/** Strategy supports cross-device key transfer (e.g., QR-based device linking) */
|
|
186
|
+
deviceLinking: boolean;
|
|
187
|
+
/**
|
|
188
|
+
* Strategy persists key material locally (e.g., device share in IndexedDB).
|
|
189
|
+
* When true, "public computer" / "forget device" features are relevant.
|
|
190
|
+
*/
|
|
191
|
+
localKeyPersistence: boolean;
|
|
192
|
+
/**
|
|
193
|
+
* Strategy supports upgrading the user's contact method (e.g., phone → email).
|
|
194
|
+
* When true, the `upgradeContactMethod` method is available and the
|
|
195
|
+
* email-linking gate can be shown for phone-only users.
|
|
196
|
+
*/
|
|
197
|
+
contactMethodUpgrade: boolean;
|
|
198
|
+
}
|
|
199
|
+
/**
|
|
200
|
+
* Key Derivation Strategy
|
|
201
|
+
*
|
|
202
|
+
* Abstract interface for different key derivation implementations.
|
|
203
|
+
* Used by AuthCoordinator to delegate key operations.
|
|
204
|
+
*
|
|
205
|
+
* The strategy owns:
|
|
206
|
+
* - Local key storage
|
|
207
|
+
* - Key splitting and reconstruction
|
|
208
|
+
* - Server communication for remote key components
|
|
209
|
+
* - Recovery method execution and setup
|
|
210
|
+
* - Storage cleanup knowledge
|
|
211
|
+
*
|
|
212
|
+
* Type parameters allow each strategy to define its own recovery shapes:
|
|
213
|
+
* - TRecoveryInput: what the user provides to recover (e.g., password, passkey)
|
|
214
|
+
* - TRecoverySetupInput: what the user provides to set up a recovery method
|
|
215
|
+
* - TRecoverySetupResult: what setup returns (e.g., generated phrase, credential ID)
|
|
216
|
+
*
|
|
217
|
+
* @example
|
|
218
|
+
* // SSS strategy with specific recovery types:
|
|
219
|
+
* type SSSStrategy = KeyDerivationStrategy<SSSRecoveryInput, SSSRecoverySetupInput, SSSRecoverySetupResult>;
|
|
220
|
+
*
|
|
221
|
+
* // Simple strategy with no recovery:
|
|
222
|
+
* type SimpleStrategy = KeyDerivationStrategy<never, never, never>;
|
|
223
|
+
*/
|
|
224
|
+
export interface KeyDerivationStrategy<TRecoveryInput = unknown, TRecoverySetupInput = unknown, TRecoverySetupResult = unknown> {
|
|
225
|
+
readonly name: string;
|
|
226
|
+
/** Declarative feature flags — UI reads these to gate features */
|
|
227
|
+
readonly capabilities: KeyDerivationCapabilities;
|
|
228
|
+
/** Check if there's a local key component (e.g., device share) */
|
|
229
|
+
hasLocalKey(): Promise<boolean>;
|
|
230
|
+
/** Get the local key component */
|
|
231
|
+
getLocalKey(): Promise<string | null>;
|
|
232
|
+
/** Store a local key component */
|
|
233
|
+
storeLocalKey(key: string): Promise<void>;
|
|
234
|
+
/** Clear all local key data */
|
|
235
|
+
clearLocalKeys(): Promise<void>;
|
|
236
|
+
/** Split a private key into shares/components */
|
|
237
|
+
splitKey(privateKey: string): Promise<{
|
|
238
|
+
localKey: string;
|
|
239
|
+
remoteKey: string;
|
|
240
|
+
}>;
|
|
241
|
+
/** Reconstruct private key from components */
|
|
242
|
+
reconstructKey(localKey: string, remoteKey: string): Promise<string>;
|
|
243
|
+
/** Verify that stored keys can reconstruct the expected DID */
|
|
244
|
+
verifyKeys?(localKey: string, remoteKey: string, expectedDid: string, didFromPrivateKey: (pk: string) => Promise<string>): Promise<boolean>;
|
|
245
|
+
/** Fetch the server-side key status for the authenticated user */
|
|
246
|
+
fetchServerKeyStatus(token: string, providerType: AuthProviderType): Promise<ServerKeyStatus>;
|
|
247
|
+
/** Store the remote key component on the server */
|
|
248
|
+
storeAuthShare(token: string, providerType: AuthProviderType, remoteKey: string, did: string, didAuthVp?: string): Promise<void>;
|
|
249
|
+
/** Mark migration complete on the server (optional — only needed for migration-capable strategies) */
|
|
250
|
+
markMigrated?(token: string, providerType: AuthProviderType, didAuthVp?: string): Promise<void>;
|
|
251
|
+
/** Execute a recovery flow and return the recovered private key + DID */
|
|
252
|
+
executeRecovery(params: {
|
|
253
|
+
token: string;
|
|
254
|
+
providerType: AuthProviderType;
|
|
255
|
+
input: TRecoveryInput;
|
|
256
|
+
/** Optional: validate the reconstructed key's DID before rotating shares */
|
|
257
|
+
didFromPrivateKey?: (privateKey: string) => Promise<string>;
|
|
258
|
+
}): Promise<RecoveryResult>;
|
|
259
|
+
/** Set up a new recovery method */
|
|
260
|
+
setupRecoveryMethod?(params: {
|
|
261
|
+
token: string;
|
|
262
|
+
providerType: AuthProviderType;
|
|
263
|
+
privateKey: string;
|
|
264
|
+
input: TRecoverySetupInput;
|
|
265
|
+
authUser?: AuthUser;
|
|
266
|
+
/** Optional: sign a DID-Auth VP JWT for server write operations */
|
|
267
|
+
signDidAuthVp?: (privateKey: string) => Promise<string>;
|
|
268
|
+
}): Promise<TRecoverySetupResult>;
|
|
269
|
+
/** Get configured recovery methods for the authenticated user */
|
|
270
|
+
getAvailableRecoveryMethods?(token: string, providerType: AuthProviderType): Promise<RecoveryMethodInfo[]>;
|
|
271
|
+
/**
|
|
272
|
+
* Verify email ownership and upgrade the user's contact method on the
|
|
273
|
+
* server (e.g., phone → email). The server verifies the OTP code, links
|
|
274
|
+
* the email to the auth account (passwordless), and atomically updates
|
|
275
|
+
* the UserKey contact method.
|
|
276
|
+
*
|
|
277
|
+
* Strategies that don't manage server-side contact methods can omit this.
|
|
278
|
+
*
|
|
279
|
+
* @param token - Auth token for the current session
|
|
280
|
+
* @param providerType - Auth provider type
|
|
281
|
+
* @param previousPhone - The phone number being replaced
|
|
282
|
+
* @param email - The new email address (already OTP-verified client-side)
|
|
283
|
+
* @param code - The 6-digit verification code
|
|
284
|
+
*/
|
|
285
|
+
upgradeContactMethod?(token: string, providerType: AuthProviderType, previousPhone: string, email: string, code: string): Promise<{
|
|
286
|
+
customToken?: string;
|
|
287
|
+
} | void>;
|
|
288
|
+
/**
|
|
289
|
+
* Send a backup share to the user's email for fail-safe recovery.
|
|
290
|
+
* Called by the coordinator after key setup or migration.
|
|
291
|
+
* Implementation should be fire-and-forget (non-fatal on failure).
|
|
292
|
+
*
|
|
293
|
+
* @param token - Auth token for server communication
|
|
294
|
+
* @param providerType - Auth provider type
|
|
295
|
+
* @param privateKey - The private key to derive the email share from
|
|
296
|
+
* @param email - Destination email address
|
|
297
|
+
*/
|
|
298
|
+
sendEmailBackupShare?(token: string, providerType: AuthProviderType, privateKey: string, email: string): Promise<void>;
|
|
299
|
+
/**
|
|
300
|
+
* Get the share version associated with the local device share.
|
|
301
|
+
* Used to request the matching auth share from the server and to
|
|
302
|
+
* include in QR cross-device transfers.
|
|
303
|
+
*
|
|
304
|
+
* Returns null for legacy shares with no stored version.
|
|
305
|
+
*/
|
|
306
|
+
getLocalShareVersion?(): Promise<number | null>;
|
|
307
|
+
/**
|
|
308
|
+
* Store the share version for the local device share.
|
|
309
|
+
* Called after receiving a device share + version via QR transfer.
|
|
310
|
+
*/
|
|
311
|
+
storeLocalShareVersion?(version: number): Promise<void>;
|
|
312
|
+
/**
|
|
313
|
+
* Inform the strategy which user is active so it can scope local storage
|
|
314
|
+
* (e.g., device shares) per-user. Called by the coordinator after
|
|
315
|
+
* authentication, before any local-key operations.
|
|
316
|
+
*
|
|
317
|
+
* Strategies that don't need per-user scoping can omit this method.
|
|
318
|
+
*
|
|
319
|
+
* @param userId - Stable, unique identifier for the authenticated user
|
|
320
|
+
* (e.g., Firebase UID). Must NOT change across sessions.
|
|
321
|
+
*/
|
|
322
|
+
setActiveUser?(userId: string): void;
|
|
323
|
+
/** Return storage keys (e.g., IndexedDB database names) that should be preserved during logout */
|
|
324
|
+
getPreservedStorageKeys(): string[];
|
|
325
|
+
/** Strategy-specific cleanup beyond clearLocalKeys (optional) */
|
|
326
|
+
cleanup?(): Promise<void>;
|
|
327
|
+
}
|
|
328
|
+
//# sourceMappingURL=auth.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"auth.d.ts","sourceRoot":"","sources":["../src/auth.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;AAMH;;;;;GAKG;AACH,qBAAa,gBAAiB,SAAQ,KAAK;aAGnB,MAAM,EAAE,SAAS,GAAG,YAAY,GAAG,SAAS,GAAG,SAAS;gBADxE,OAAO,EAAE,MAAM,EACC,MAAM,EAAE,SAAS,GAAG,YAAY,GAAG,SAAS,GAAG,SAAS;CAK/E;AAMD;;;GAGG;AACH,MAAM,MAAM,gBAAgB,GAAG,MAAM,CAAC;AAEtC,MAAM,WAAW,QAAQ;IACrB,EAAE,EAAE,MAAM,CAAC;IACX,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,YAAY,EAAE,gBAAgB,CAAC;IAE/B,yEAAyE;IACzE,SAAS,CAAC,EAAE,IAAI,CAAC;CACpB;AAED;;;;GAIG;AACH,MAAM,WAAW,YAAY;IACzB,UAAU,CAAC,YAAY,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC;IACpD,cAAc,IAAI,OAAO,CAAC,QAAQ,GAAG,IAAI,CAAC,CAAC;IAC3C,eAAe,IAAI,gBAAgB,CAAC;IACpC,OAAO,IAAI,OAAO,CAAC,IAAI,CAAC,CAAC;IAEzB;;;;;;;;;OASG;IACH,cAAc,CAAC,IAAI,OAAO,CAAC,OAAO,CAAC,CAAC;IAEpC;;;;;;;;;;OAUG;IACH,uBAAuB,CAAC,CAAC,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,QAAQ,GAAG,IAAI,CAAC,CAAC;CACrE;AAMD;;;;GAIG;AACH,MAAM,WAAW,uBAAuB;IACpC,cAAc,EAAE,MAAM,CAAC;IAEvB,+EAA+E;IAC/E,SAAS,CAAC,EAAE,OAAO,CAAC;CACvB;AAED;;;;;;;;;;;;;;GAcG;AACH,MAAM,WAAW,aAAa;IAC1B,QAAQ,CAAC,YAAY,EAAE,gBAAgB,CAAC;IAIxC;;;;;OAKG;IACH,SAAS,CAAC,MAAM,EAAE,CAAC,IAAI,EAAE,QAAQ,GAAG,IAAI,KAAK,IAAI,GAAG,MAAM,IAAI,CAAC;IAE/D,sEAAsE;IACtE,cAAc,IAAI,QAAQ,GAAG,IAAI,CAAC;IAIlC,aAAa,CAAC,KAAK,EAAE,MAAM,EAAE,WAAW,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC;IAElE,eAAe,CAAC,KAAK,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAC;IAEhE,WAAW,CAAC,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC;IAInC;;;OAGG;IACH,YAAY,CAAC,WAAW,EAAE,MAAM,GAAG,OAAO,CAAC,uBAAuB,CAAC,CAAC;IAEpE;;OAEG;IACH,eAAe,CAAC,MAAM,EAAE,uBAAuB,EAAE,IAAI,EAAE,MAAM,GAAG,MAAM,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAC;IAE3F;;;OAGG;IACH,qBAAqB,CAAC,CAAC,cAAc,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,GAAG,MAAM,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAC;IAIzF,gBAAgB,IAAI,OAAO,CAAC,QAAQ,CAAC,CAAC;IAEtC,eAAe,IAAI,OAAO,CAAC,QAAQ,CAAC,CAAC;IAErC,qEAAqE;IACrE,mBAAmB,CAAC,IAAI,OAAO,CAAC,QAAQ,GAAG,IAAI,CAAC,CAAC;IAIjD,qBAAqB,CAAC,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAC;IAExD,wEAAwE;IACxE,wBAAwB,CAAC,CAAC,UAAU,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAC;IAIlF,aAAa,IAAI,OAAO,CAAC,IAAI,CAAC,CAAC;IAE/B,OAAO,IAAI,OAAO,CAAC,IAAI,CAAC,CAAC;IAIzB,kFAAkF;IAClF,OAAO,CAAC,IAAI,IAAI,CAAC;CACpB;AAMD;;;;GAIG;AACH,MAAM,WAAW,kBAAkB;IAC/B,IAAI,EAAE,MAAM,CAAC;IACb,SAAS,EAAE,IAAI,CAAC;IAChB,YAAY,CAAC,EAAE,MAAM,CAAC;CACzB;AAED;;;GAGG;AACH,MAAM,WAAW,cAAc;IAC3B,UAAU,EAAE,MAAM,CAAC;IACnB,GAAG,EAAE,MAAM,CAAC;CACf;AAMD;;;;GAIG;AACH,MAAM,WAAW,eAAe;IAC5B,MAAM,EAAE,OAAO,CAAC;IAChB,cAAc,EAAE,OAAO,CAAC;IACxB,UAAU,EAAE,MAAM,GAAG,IAAI,CAAC;IAC1B,eAAe,EAAE,kBAAkB,EAAE,CAAC;IACtC,SAAS,EAAE,MAAM,GAAG,IAAI,CAAC;IACzB,YAAY,EAAE,MAAM,GAAG,IAAI,CAAC;IAC5B,mBAAmB,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;CACvC;AAMD;;;;;;;;;;;;;;;;;GAiBG;AACH,MAAM,WAAW,yBAAyB;IACtC,yEAAyE;IACzE,QAAQ,EAAE,OAAO,CAAC;IAElB,kFAAkF;IAClF,aAAa,EAAE,OAAO,CAAC;IAEvB;;;OAGG;IACH,mBAAmB,EAAE,OAAO,CAAC;IAE7B;;;;OAIG;IACH,oBAAoB,EAAE,OAAO,CAAC;CACjC;AAMD;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,MAAM,WAAW,qBAAqB,CAClC,cAAc,GAAG,OAAO,EACxB,mBAAmB,GAAG,OAAO,EAC7B,oBAAoB,GAAG,OAAO;IAE9B,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAC;IAEtB,kEAAkE;IAClE,QAAQ,CAAC,YAAY,EAAE,yBAAyB,CAAC;IAIjD,kEAAkE;IAClE,WAAW,IAAI,OAAO,CAAC,OAAO,CAAC,CAAC;IAEhC,kCAAkC;IAClC,WAAW,IAAI,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC;IAEtC,kCAAkC;IAClC,aAAa,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC;IAE1C,+BAA+B;IAC/B,cAAc,IAAI,OAAO,CAAC,IAAI,CAAC,CAAC;IAEhC,iDAAiD;IACjD,QAAQ,CAAC,UAAU,EAAE,MAAM,GAAG,OAAO,CAAC;QAAE,QAAQ,EAAE,MAAM,CAAC;QAAC,SAAS,EAAE,MAAM,CAAA;KAAE,CAAC,CAAC;IAE/E,8CAA8C;IAC9C,cAAc,CAAC,QAAQ,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC;IAErE,+DAA+D;IAC/D,UAAU,CAAC,CACP,QAAQ,EAAE,MAAM,EAChB,SAAS,EAAE,MAAM,EACjB,WAAW,EAAE,MAAM,EACnB,iBAAiB,EAAE,CAAC,EAAE,EAAE,MAAM,KAAK,OAAO,CAAC,MAAM,CAAC,GACnD,OAAO,CAAC,OAAO,CAAC,CAAC;IAIpB,kEAAkE;IAClE,oBAAoB,CAAC,KAAK,EAAE,MAAM,EAAE,YAAY,EAAE,gBAAgB,GAAG,OAAO,CAAC,eAAe,CAAC,CAAC;IAE9F,mDAAmD;IACnD,cAAc,CAAC,KAAK,EAAE,MAAM,EAAE,YAAY,EAAE,gBAAgB,EAAE,SAAS,EAAE,MAAM,EAAE,GAAG,EAAE,MAAM,EAAE,SAAS,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC;IAEjI,sGAAsG;IACtG,YAAY,CAAC,CAAC,KAAK,EAAE,MAAM,EAAE,YAAY,EAAE,gBAAgB,EAAE,SAAS,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC;IAIhG,yEAAyE;IACzE,eAAe,CAAC,MAAM,EAAE;QACpB,KAAK,EAAE,MAAM,CAAC;QACd,YAAY,EAAE,gBAAgB,CAAC;QAC/B,KAAK,EAAE,cAAc,CAAC;QACtB,4EAA4E;QAC5E,iBAAiB,CAAC,EAAE,CAAC,UAAU,EAAE,MAAM,KAAK,OAAO,CAAC,MAAM,CAAC,CAAC;KAC/D,GAAG,OAAO,CAAC,cAAc,CAAC,CAAC;IAE5B,mCAAmC;IACnC,mBAAmB,CAAC,CAAC,MAAM,EAAE;QACzB,KAAK,EAAE,MAAM,CAAC;QACd,YAAY,EAAE,gBAAgB,CAAC;QAC/B,UAAU,EAAE,MAAM,CAAC;QACnB,KAAK,EAAE,mBAAmB,CAAC;QAC3B,QAAQ,CAAC,EAAE,QAAQ,CAAC;QACpB,mEAAmE;QACnE,aAAa,CAAC,EAAE,CAAC,UAAU,EAAE,MAAM,KAAK,OAAO,CAAC,MAAM,CAAC,CAAC;KAC3D,GAAG,OAAO,CAAC,oBAAoB,CAAC,CAAC;IAElC,iEAAiE;IACjE,2BAA2B,CAAC,CAAC,KAAK,EAAE,MAAM,EAAE,YAAY,EAAE,gBAAgB,GAAG,OAAO,CAAC,kBAAkB,EAAE,CAAC,CAAC;IAI3G;;;;;;;;;;;;;OAaG;IACH,oBAAoB,CAAC,CACjB,KAAK,EAAE,MAAM,EACb,YAAY,EAAE,gBAAgB,EAC9B,aAAa,EAAE,MAAM,EACrB,KAAK,EAAE,MAAM,EACb,IAAI,EAAE,MAAM,GACb,OAAO,CAAC;QAAE,WAAW,CAAC,EAAE,MAAM,CAAA;KAAE,GAAG,IAAI,CAAC,CAAC;IAI5C;;;;;;;;;OASG;IACH,oBAAoB,CAAC,CACjB,KAAK,EAAE,MAAM,EACb,YAAY,EAAE,gBAAgB,EAC9B,UAAU,EAAE,MAAM,EAClB,KAAK,EAAE,MAAM,GACd,OAAO,CAAC,IAAI,CAAC,CAAC;IAIjB;;;;;;OAMG;IACH,oBAAoB,CAAC,IAAI,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC;IAEhD;;;OAGG;IACH,sBAAsB,CAAC,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC;IAIxD;;;;;;;;;OASG;IACH,aAAa,CAAC,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI,CAAC;IAIrC,kGAAkG;IAClG,uBAAuB,IAAI,MAAM,EAAE,CAAC;IAEpC,iEAAiE;IACjE,OAAO,CAAC,IAAI,OAAO,CAAC,IAAI,CAAC,CAAC;CAC7B"}
|
package/dist/index.d.ts
CHANGED
package/dist/index.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAEA,cAAc,MAAM,CAAC;AACrB,cAAc,OAAO,CAAC;AACtB,cAAc,QAAQ,CAAC;AACvB,cAAc,aAAa,CAAC;AAC5B,cAAc,cAAc,CAAC;AAC7B,cAAc,OAAO,CAAC;AACtB,cAAc,UAAU,CAAC;AACzB,cAAc,SAAS,CAAC;AACxB,cAAc,QAAQ,CAAC;AACvB,cAAc,WAAW,CAAC;AAC1B,cAAc,WAAW,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAEA,cAAc,MAAM,CAAC;AACrB,cAAc,OAAO,CAAC;AACtB,cAAc,QAAQ,CAAC;AACvB,cAAc,aAAa,CAAC;AAC5B,cAAc,cAAc,CAAC;AAC7B,cAAc,OAAO,CAAC;AACtB,cAAc,UAAU,CAAC;AACzB,cAAc,SAAS,CAAC;AACxB,cAAc,QAAQ,CAAC;AACvB,cAAc,WAAW,CAAC;AAC1B,cAAc,WAAW,CAAC;AAC1B,cAAc,QAAQ,CAAC"}
|
package/dist/lcn.d.ts
CHANGED
|
@@ -3022,6 +3022,7 @@ export declare const LCNNotificationTypeEnumValidator: z.ZodEnum<{
|
|
|
3022
3022
|
APP_LISTING_SUBMITTED: "APP_LISTING_SUBMITTED";
|
|
3023
3023
|
APP_LISTING_APPROVED: "APP_LISTING_APPROVED";
|
|
3024
3024
|
APP_LISTING_REJECTED: "APP_LISTING_REJECTED";
|
|
3025
|
+
DEVICE_LINK_REQUEST: "DEVICE_LINK_REQUEST";
|
|
3025
3026
|
}>;
|
|
3026
3027
|
export type LCNNotificationTypeEnum = z.infer<typeof LCNNotificationTypeEnumValidator>;
|
|
3027
3028
|
export declare const LCNNotificationMessageValidator: z.ZodObject<{
|
|
@@ -3141,6 +3142,7 @@ export declare const LCNNotificationValidator: z.ZodObject<{
|
|
|
3141
3142
|
APP_LISTING_SUBMITTED: "APP_LISTING_SUBMITTED";
|
|
3142
3143
|
APP_LISTING_APPROVED: "APP_LISTING_APPROVED";
|
|
3143
3144
|
APP_LISTING_REJECTED: "APP_LISTING_REJECTED";
|
|
3145
|
+
DEVICE_LINK_REQUEST: "DEVICE_LINK_REQUEST";
|
|
3144
3146
|
}>;
|
|
3145
3147
|
to: z.ZodIntersection<z.ZodObject<{
|
|
3146
3148
|
profileId: z.ZodOptional<z.ZodString>;
|
|
@@ -3431,6 +3433,7 @@ export declare const InboxCredentialValidator: z.ZodObject<{
|
|
|
3431
3433
|
webhookUrl: z.ZodOptional<z.ZodString>;
|
|
3432
3434
|
boostUri: z.ZodOptional<z.ZodString>;
|
|
3433
3435
|
activityId: z.ZodOptional<z.ZodString>;
|
|
3436
|
+
integrationId: z.ZodOptional<z.ZodString>;
|
|
3434
3437
|
signingAuthority: z.ZodOptional<z.ZodObject<{
|
|
3435
3438
|
endpoint: z.ZodOptional<z.ZodString>;
|
|
3436
3439
|
name: z.ZodOptional<z.ZodString>;
|
|
@@ -3457,6 +3460,7 @@ export declare const PaginatedInboxCredentialsValidator: z.ZodObject<{
|
|
|
3457
3460
|
webhookUrl: z.ZodOptional<z.ZodString>;
|
|
3458
3461
|
boostUri: z.ZodOptional<z.ZodString>;
|
|
3459
3462
|
activityId: z.ZodOptional<z.ZodString>;
|
|
3463
|
+
integrationId: z.ZodOptional<z.ZodString>;
|
|
3460
3464
|
signingAuthority: z.ZodOptional<z.ZodObject<{
|
|
3461
3465
|
endpoint: z.ZodOptional<z.ZodString>;
|
|
3462
3466
|
name: z.ZodOptional<z.ZodString>;
|
|
@@ -4153,8 +4157,12 @@ export declare const IssueInboxCredentialResponseValidator: z.ZodObject<{
|
|
|
4153
4157
|
recipientDid: z.ZodOptional<z.ZodString>;
|
|
4154
4158
|
}, z.core.$strip>;
|
|
4155
4159
|
export type IssueInboxCredentialResponseType = z.infer<typeof IssueInboxCredentialResponseValidator>;
|
|
4160
|
+
/** A simple name reference that the server resolves to a boost template */
|
|
4161
|
+
export declare const CredentialNameRefValidator: z.ZodObject<{
|
|
4162
|
+
name: z.ZodString;
|
|
4163
|
+
}, z.core.$loose>;
|
|
4156
4164
|
export declare const ClaimInboxCredentialValidator: z.ZodObject<{
|
|
4157
|
-
credential: z.ZodUnion<[z.ZodUnion<[z.ZodObject<{
|
|
4165
|
+
credential: z.ZodUnion<[z.ZodUnion<[z.ZodUnion<[z.ZodObject<{
|
|
4158
4166
|
'@context': z.ZodArray<z.ZodUnion<[z.ZodString, z.ZodRecord<z.ZodString, z.ZodAny>]>>;
|
|
4159
4167
|
id: z.ZodOptional<z.ZodString>;
|
|
4160
4168
|
type: z.ZodArray<z.ZodString>;
|
|
@@ -4760,7 +4768,9 @@ export declare const ClaimInboxCredentialValidator: z.ZodObject<{
|
|
|
4760
4768
|
genre: z.ZodOptional<z.ZodString>;
|
|
4761
4769
|
audience: z.ZodOptional<z.ZodString>;
|
|
4762
4770
|
}, z.core.$catchall<z.ZodAny>>>]>>;
|
|
4763
|
-
}, z.core.$catchall<z.ZodAny>>]
|
|
4771
|
+
}, z.core.$catchall<z.ZodAny>>]>, z.ZodObject<{
|
|
4772
|
+
name: z.ZodString;
|
|
4773
|
+
}, z.core.$loose>]>;
|
|
4764
4774
|
configuration: z.ZodOptional<z.ZodObject<{
|
|
4765
4775
|
publishableKey: z.ZodString;
|
|
4766
4776
|
signingAuthorityName: z.ZodOptional<z.ZodString>;
|
|
@@ -5419,6 +5429,13 @@ export declare const PromotionLevelValidator: z.ZodEnum<{
|
|
|
5419
5429
|
DEMOTED: "DEMOTED";
|
|
5420
5430
|
}>;
|
|
5421
5431
|
export type PromotionLevel = z.infer<typeof PromotionLevelValidator>;
|
|
5432
|
+
export declare const AgeRatingValidator: z.ZodEnum<{
|
|
5433
|
+
"4+": "4+";
|
|
5434
|
+
"9+": "9+";
|
|
5435
|
+
"12+": "12+";
|
|
5436
|
+
"17+": "17+";
|
|
5437
|
+
}>;
|
|
5438
|
+
export type AgeRating = z.infer<typeof AgeRatingValidator>;
|
|
5422
5439
|
export declare const AppStoreListingValidator: z.ZodObject<{
|
|
5423
5440
|
listing_id: z.ZodString;
|
|
5424
5441
|
slug: z.ZodOptional<z.ZodString>;
|
|
@@ -5456,6 +5473,13 @@ export declare const AppStoreListingValidator: z.ZodObject<{
|
|
|
5456
5473
|
highlights: z.ZodOptional<z.ZodArray<z.ZodString>>;
|
|
5457
5474
|
screenshots: z.ZodOptional<z.ZodArray<z.ZodString>>;
|
|
5458
5475
|
hero_background_color: z.ZodOptional<z.ZodString>;
|
|
5476
|
+
min_age: z.ZodOptional<z.ZodNumber>;
|
|
5477
|
+
age_rating: z.ZodOptional<z.ZodEnum<{
|
|
5478
|
+
"4+": "4+";
|
|
5479
|
+
"9+": "9+";
|
|
5480
|
+
"12+": "12+";
|
|
5481
|
+
"17+": "17+";
|
|
5482
|
+
}>>;
|
|
5459
5483
|
}, z.core.$strip>;
|
|
5460
5484
|
export type AppStoreListing = z.infer<typeof AppStoreListingValidator>;
|
|
5461
5485
|
export declare const AppStoreListingCreateValidator: z.ZodObject<{
|
|
@@ -5482,6 +5506,13 @@ export declare const AppStoreListingCreateValidator: z.ZodObject<{
|
|
|
5482
5506
|
highlights: z.ZodOptional<z.ZodArray<z.ZodString>>;
|
|
5483
5507
|
screenshots: z.ZodOptional<z.ZodArray<z.ZodString>>;
|
|
5484
5508
|
hero_background_color: z.ZodOptional<z.ZodString>;
|
|
5509
|
+
min_age: z.ZodOptional<z.ZodNumber>;
|
|
5510
|
+
age_rating: z.ZodOptional<z.ZodEnum<{
|
|
5511
|
+
"4+": "4+";
|
|
5512
|
+
"9+": "9+";
|
|
5513
|
+
"12+": "12+";
|
|
5514
|
+
"17+": "17+";
|
|
5515
|
+
}>>;
|
|
5485
5516
|
}, z.core.$strip>;
|
|
5486
5517
|
export type AppStoreListingCreateType = z.infer<typeof AppStoreListingCreateValidator>;
|
|
5487
5518
|
export declare const AppStoreListingUpdateValidator: z.ZodObject<{
|
|
@@ -5508,6 +5539,13 @@ export declare const AppStoreListingUpdateValidator: z.ZodObject<{
|
|
|
5508
5539
|
highlights: z.ZodOptional<z.ZodOptional<z.ZodArray<z.ZodString>>>;
|
|
5509
5540
|
screenshots: z.ZodOptional<z.ZodOptional<z.ZodArray<z.ZodString>>>;
|
|
5510
5541
|
hero_background_color: z.ZodOptional<z.ZodOptional<z.ZodString>>;
|
|
5542
|
+
min_age: z.ZodOptional<z.ZodOptional<z.ZodNumber>>;
|
|
5543
|
+
age_rating: z.ZodOptional<z.ZodOptional<z.ZodEnum<{
|
|
5544
|
+
"4+": "4+";
|
|
5545
|
+
"9+": "9+";
|
|
5546
|
+
"12+": "12+";
|
|
5547
|
+
"17+": "17+";
|
|
5548
|
+
}>>>;
|
|
5511
5549
|
}, z.core.$strip>;
|
|
5512
5550
|
export type AppStoreListingUpdateType = z.infer<typeof AppStoreListingUpdateValidator>;
|
|
5513
5551
|
export declare const InstalledAppValidator: z.ZodObject<{
|
|
@@ -5547,6 +5585,13 @@ export declare const InstalledAppValidator: z.ZodObject<{
|
|
|
5547
5585
|
highlights: z.ZodOptional<z.ZodArray<z.ZodString>>;
|
|
5548
5586
|
screenshots: z.ZodOptional<z.ZodArray<z.ZodString>>;
|
|
5549
5587
|
hero_background_color: z.ZodOptional<z.ZodString>;
|
|
5588
|
+
min_age: z.ZodOptional<z.ZodNumber>;
|
|
5589
|
+
age_rating: z.ZodOptional<z.ZodEnum<{
|
|
5590
|
+
"4+": "4+";
|
|
5591
|
+
"9+": "9+";
|
|
5592
|
+
"12+": "12+";
|
|
5593
|
+
"17+": "17+";
|
|
5594
|
+
}>>;
|
|
5550
5595
|
installed_at: z.ZodString;
|
|
5551
5596
|
}, z.core.$strip>;
|
|
5552
5597
|
export type InstalledApp = z.infer<typeof InstalledAppValidator>;
|
|
@@ -5590,6 +5635,13 @@ export declare const PaginatedAppStoreListingsValidator: z.ZodObject<{
|
|
|
5590
5635
|
highlights: z.ZodOptional<z.ZodArray<z.ZodString>>;
|
|
5591
5636
|
screenshots: z.ZodOptional<z.ZodArray<z.ZodString>>;
|
|
5592
5637
|
hero_background_color: z.ZodOptional<z.ZodString>;
|
|
5638
|
+
min_age: z.ZodOptional<z.ZodNumber>;
|
|
5639
|
+
age_rating: z.ZodOptional<z.ZodEnum<{
|
|
5640
|
+
"4+": "4+";
|
|
5641
|
+
"9+": "9+";
|
|
5642
|
+
"12+": "12+";
|
|
5643
|
+
"17+": "17+";
|
|
5644
|
+
}>>;
|
|
5593
5645
|
}, z.core.$strip>>;
|
|
5594
5646
|
}, z.core.$strip>;
|
|
5595
5647
|
export type PaginatedAppStoreListings = z.infer<typeof PaginatedAppStoreListingsValidator>;
|
|
@@ -5633,6 +5685,13 @@ export declare const PaginatedInstalledAppsValidator: z.ZodObject<{
|
|
|
5633
5685
|
highlights: z.ZodOptional<z.ZodArray<z.ZodString>>;
|
|
5634
5686
|
screenshots: z.ZodOptional<z.ZodArray<z.ZodString>>;
|
|
5635
5687
|
hero_background_color: z.ZodOptional<z.ZodString>;
|
|
5688
|
+
min_age: z.ZodOptional<z.ZodNumber>;
|
|
5689
|
+
age_rating: z.ZodOptional<z.ZodEnum<{
|
|
5690
|
+
"4+": "4+";
|
|
5691
|
+
"9+": "9+";
|
|
5692
|
+
"12+": "12+";
|
|
5693
|
+
"17+": "17+";
|
|
5694
|
+
}>>;
|
|
5636
5695
|
installed_at: z.ZodString;
|
|
5637
5696
|
}, z.core.$strip>>;
|
|
5638
5697
|
}, z.core.$strip>;
|
|
@@ -5646,12 +5705,50 @@ export declare const SendCredentialEventValidator: z.ZodObject<{
|
|
|
5646
5705
|
type: z.ZodLiteral<"send-credential">;
|
|
5647
5706
|
templateAlias: z.ZodString;
|
|
5648
5707
|
templateData: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodUnknown>>;
|
|
5708
|
+
preventDuplicateClaim: z.ZodOptional<z.ZodBoolean>;
|
|
5649
5709
|
}, z.core.$strip>;
|
|
5650
5710
|
export type SendCredentialEvent = z.infer<typeof SendCredentialEventValidator>;
|
|
5711
|
+
export declare const CheckCredentialEventValidator: z.ZodObject<{
|
|
5712
|
+
type: z.ZodLiteral<"check-credential">;
|
|
5713
|
+
templateAlias: z.ZodOptional<z.ZodString>;
|
|
5714
|
+
boostUri: z.ZodOptional<z.ZodString>;
|
|
5715
|
+
}, z.core.$strip>;
|
|
5716
|
+
export type CheckCredentialEvent = z.infer<typeof CheckCredentialEventValidator>;
|
|
5717
|
+
export declare const CheckIssuanceStatusEventValidator: z.ZodObject<{
|
|
5718
|
+
type: z.ZodLiteral<"check-issuance-status">;
|
|
5719
|
+
templateAlias: z.ZodOptional<z.ZodString>;
|
|
5720
|
+
boostUri: z.ZodOptional<z.ZodString>;
|
|
5721
|
+
recipient: z.ZodString;
|
|
5722
|
+
}, z.core.$strip>;
|
|
5723
|
+
export type CheckIssuanceStatusEvent = z.infer<typeof CheckIssuanceStatusEventValidator>;
|
|
5724
|
+
export declare const GetTemplateRecipientsEventValidator: z.ZodObject<{
|
|
5725
|
+
type: z.ZodLiteral<"get-template-recipients">;
|
|
5726
|
+
templateAlias: z.ZodOptional<z.ZodString>;
|
|
5727
|
+
boostUri: z.ZodOptional<z.ZodString>;
|
|
5728
|
+
limit: z.ZodOptional<z.ZodNumber>;
|
|
5729
|
+
cursor: z.ZodOptional<z.ZodString>;
|
|
5730
|
+
}, z.core.$strip>;
|
|
5731
|
+
export type GetTemplateRecipientsEvent = z.infer<typeof GetTemplateRecipientsEventValidator>;
|
|
5651
5732
|
export declare const AppEventValidator: z.ZodDiscriminatedUnion<[z.ZodObject<{
|
|
5652
5733
|
type: z.ZodLiteral<"send-credential">;
|
|
5653
5734
|
templateAlias: z.ZodString;
|
|
5654
5735
|
templateData: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodUnknown>>;
|
|
5736
|
+
preventDuplicateClaim: z.ZodOptional<z.ZodBoolean>;
|
|
5737
|
+
}, z.core.$strip>, z.ZodObject<{
|
|
5738
|
+
type: z.ZodLiteral<"check-credential">;
|
|
5739
|
+
templateAlias: z.ZodOptional<z.ZodString>;
|
|
5740
|
+
boostUri: z.ZodOptional<z.ZodString>;
|
|
5741
|
+
}, z.core.$strip>, z.ZodObject<{
|
|
5742
|
+
type: z.ZodLiteral<"check-issuance-status">;
|
|
5743
|
+
templateAlias: z.ZodOptional<z.ZodString>;
|
|
5744
|
+
boostUri: z.ZodOptional<z.ZodString>;
|
|
5745
|
+
recipient: z.ZodString;
|
|
5746
|
+
}, z.core.$strip>, z.ZodObject<{
|
|
5747
|
+
type: z.ZodLiteral<"get-template-recipients">;
|
|
5748
|
+
templateAlias: z.ZodOptional<z.ZodString>;
|
|
5749
|
+
boostUri: z.ZodOptional<z.ZodString>;
|
|
5750
|
+
limit: z.ZodOptional<z.ZodNumber>;
|
|
5751
|
+
cursor: z.ZodOptional<z.ZodString>;
|
|
5655
5752
|
}, z.core.$strip>], "type">;
|
|
5656
5753
|
export type AppEvent = z.infer<typeof AppEventValidator>;
|
|
5657
5754
|
export declare const AppEventInputValidator: z.ZodObject<{
|
|
@@ -5660,6 +5757,22 @@ export declare const AppEventInputValidator: z.ZodObject<{
|
|
|
5660
5757
|
type: z.ZodLiteral<"send-credential">;
|
|
5661
5758
|
templateAlias: z.ZodString;
|
|
5662
5759
|
templateData: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodUnknown>>;
|
|
5760
|
+
preventDuplicateClaim: z.ZodOptional<z.ZodBoolean>;
|
|
5761
|
+
}, z.core.$strip>, z.ZodObject<{
|
|
5762
|
+
type: z.ZodLiteral<"check-credential">;
|
|
5763
|
+
templateAlias: z.ZodOptional<z.ZodString>;
|
|
5764
|
+
boostUri: z.ZodOptional<z.ZodString>;
|
|
5765
|
+
}, z.core.$strip>, z.ZodObject<{
|
|
5766
|
+
type: z.ZodLiteral<"check-issuance-status">;
|
|
5767
|
+
templateAlias: z.ZodOptional<z.ZodString>;
|
|
5768
|
+
boostUri: z.ZodOptional<z.ZodString>;
|
|
5769
|
+
recipient: z.ZodString;
|
|
5770
|
+
}, z.core.$strip>, z.ZodObject<{
|
|
5771
|
+
type: z.ZodLiteral<"get-template-recipients">;
|
|
5772
|
+
templateAlias: z.ZodOptional<z.ZodString>;
|
|
5773
|
+
boostUri: z.ZodOptional<z.ZodString>;
|
|
5774
|
+
limit: z.ZodOptional<z.ZodNumber>;
|
|
5775
|
+
cursor: z.ZodOptional<z.ZodString>;
|
|
5663
5776
|
}, z.core.$strip>], "type">;
|
|
5664
5777
|
}, z.core.$strip>;
|
|
5665
5778
|
export type AppEventInput = z.infer<typeof AppEventInputValidator>;
|