@mattrglobal/verifier-sdk-web 2.1.2-unstable.147 → 2.1.2-unstable.148

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -2,6 +2,8 @@
2
2
 
3
3
  # Table of Contents
4
4
 
5
+ - [verifier-sdk-web](#verifier-sdk-web)
6
+ - [Table of Contents](#table-of-contents)
5
7
  - [General](#general)
6
8
  - [Licensing](#licensing)
7
9
  - [Overview](#overview)
@@ -35,15 +37,21 @@ Request or download the
35
37
 
36
38
  ## Overview
37
39
 
38
- The Verifier Web SDK is a powerful tool for integrating online credential verification capabilities into your web applications. It enables secure and efficient verification of [mDocs](https://learn.mattr.global/docs/mdocs), supporting both [same-device](https://learn.mattr.global/docs/verification/online/mdocs/overview#same-device-verification-workflow) and [cross-device](https://learn.mattr.global/docs/verification/online/mdocs/overview#cross-device-verification-workflow) verification workflows. The SDK leverages the MATTR VII platform to handle credential presentation and verification processes.
40
+ The Verifier Web SDK is a powerful tool for integrating online credential verification capabilities into your web
41
+ applications. It enables secure and efficient verification of [mDocs](https://learn.mattr.global/docs/mdocs), supporting
42
+ both [same-device](https://learn.mattr.global/docs/verification/online/mdocs/overview#same-device-verification-workflow)
43
+ and
44
+ [cross-device](https://learn.mattr.global/docs/verification/online/mdocs/overview#cross-device-verification-workflow)
45
+ verification workflows. The SDK leverages the MATTR VII platform to handle credential presentation and verification
46
+ processes.
39
47
 
40
48
  ## Features
41
49
 
42
- * Simple integration into web applications.
43
- * Supports both same-device and cross-device presentation flows.
44
- * Secure handling of mDocs requests and responses.
45
- * Compliant with [ISO/IEC DTS 18013-7](https://www.iso.org/standard/82772.html).
46
- * Offers [DC API](https://wicg.github.io/digital-credentials/) support as a **tech-preview**.
50
+ - Simple integration into web applications.
51
+ - Supports both same-device and cross-device presentation flows.
52
+ - Secure handling of mDocs requests and responses.
53
+ - Compliant with [ISO/IEC DTS 18013-7](https://www.iso.org/standard/82772.html).
54
+ - Offers [DC API](https://wicg.github.io/digital-credentials/) support as a **tech-preview**.
47
55
 
48
56
  > In this SDK mDocs are referred to as Mobile Credentials.
49
57
 
@@ -51,8 +59,8 @@ The Verifier Web SDK is a powerful tool for integrating online credential verifi
51
59
 
52
60
  ## How to get access to the MATTR Pi Verifier Web SDK
53
61
 
54
- Refer to our [SDK Docs landing page](https://learn.mattr.global/guides/get-started-pi) for step-by-step instructions to gain access
55
- to any of our SDKs.
62
+ Refer to our [SDK Docs landing page](https://learn.mattr.global/guides/get-started-pi) for step-by-step instructions to
63
+ gain access to any of our SDKs.
56
64
 
57
65
  > Please [reach out](mailto:dev-support@mattr.global) if you need any assistance.
58
66
 
@@ -82,25 +90,28 @@ MATTRVerifierSDK.initialize(...);
82
90
  <script src="https://cdn.mattr.global/js/verifier-sdk-web/{VERSION}/verifier-js.production.js"></script>
83
91
  ```
84
92
 
85
- > This script will automatically pick up any SDK patch updates. You can lock your implementation to a specific patch version by replacing 1.0 with the specific version (e.g. https://cdn.mattr.global/js/verifier-sdk-web/1.0.1/verifier-js.production.js).
93
+ > This script will automatically pick up any SDK patch updates. You can lock your implementation to a specific patch
94
+ > version by replacing 1.0 with the specific version (e.g.
95
+ > https://cdn.mattr.global/js/verifier-sdk-web/1.0.1/verifier-js.production.js).
86
96
 
87
97
  2. Access SDK functions via global `MATTRVerifierSDK` object.
88
98
 
89
99
  ```javascript
90
- <script>
91
- MATTRVerifierSDK.initialize(...);
92
- </script>
100
+ <script>MATTRVerifierSDK.initialize(...);</script>
93
101
  ```
94
102
 
95
103
  # Usage
96
104
 
97
- The SDK can make a request to create a presentation session with a configured MATTR VII verifier tenant. This requires the following configurations and settings:
98
- * Initialize the SDK with the URL of the MATTR VII tenant that will handle the verification request.
99
- * Prepare a credential query that defines what claims are required for verification.
100
- * Generate a unique challenge for the presentation session.
101
- * Determine what presentation flows are supported in the session.
102
- * Define what wallets can be used to respond to the verification request.
103
- * Configure the URI the user will be redirected to when the verification workflow is completed (only required for same-device flows).
105
+ The SDK can make a request to create a presentation session with a configured MATTR VII verifier tenant. This requires
106
+ the following configurations and settings:
107
+
108
+ - Initialize the SDK with the URL of the MATTR VII tenant that will handle the verification request.
109
+ - Prepare a credential query that defines what claims are required for verification.
110
+ - Generate a unique challenge for the presentation session.
111
+ - Determine what presentation flows are supported in the session.
112
+ - Define what wallets can be used to respond to the verification request.
113
+ - Configure the URI the user will be redirected to when the verification workflow is completed (only required for
114
+ same-device flows).
104
115
 
105
116
  ## Initialize the SDK
106
117
 
@@ -111,96 +122,137 @@ MATTRVerifierSDK.initialize({ apiBaseUrl, applicationId });
111
122
  ```
112
123
 
113
124
  - `apiBaseUrl` (required): URL of the MATTR VII verifier tenant.
114
- - `applicationId` (required): Unique identifier of the verifier application. This must match the [`id`](https://learn.mattr.global/api-reference/latest/tag/Verifier-applications#operation/postVerifierApplication!c=201&path=0/id&t=response) parameter in the response returned when [creating a Verifier application](https://learn.mattr.global/api-reference/latest/tag/Verifier-applications#operation/postVerifierApplication) on the MATTR VII verifier tenant.
125
+ - `applicationId` (required): Unique identifier of the verifier application. This must match the
126
+ [`id`](https://learn.mattr.global/api-reference/latest/tag/Verifier-applications#operation/postVerifierApplication!c=201&path=0/id&t=response)
127
+ parameter in the response returned when
128
+ [creating a Verifier application](https://learn.mattr.global/api-reference/latest/tag/Verifier-applications#operation/postVerifierApplication)
129
+ on the MATTR VII verifier tenant.
115
130
 
116
131
  ## Prepare a credential query
117
132
 
118
- The following example credential query will request the `given_name`, `family_name`, `birth_date` and `portrait` claims from a `mobile` credential profile with `org.iso.18013.5.1.mDL` as a docType:
133
+ The following example credential query will request the `given_name`, `family_name`, `birth_date` and `portrait` claims
134
+ from a `mobile` credential profile with `org.iso.18013.5.1.mDL` as a docType:
119
135
 
120
136
  ```javascript
121
137
  const credentialQuery = [
122
138
  {
123
- "profile": "mobile",
124
- "docType": "org.iso.18013.5.1.mDL",
125
- "nameSpaces": {
139
+ profile: "mobile",
140
+ docType: "org.iso.18013.5.1.mDL",
141
+ nameSpaces: {
126
142
  "org.iso.18013.5.1": {
127
- "given_name": {
128
- "intentToRetain": false
143
+ given_name: {
144
+ intentToRetain: false,
145
+ },
146
+ family_name: {
147
+ intentToRetain: false,
129
148
  },
130
- "family_name": {
131
- "intentToRetain": false
149
+ birth_date: {
150
+ intentToRetain: false,
132
151
  },
133
- "birth_date": {
134
- "intentToRetain": false
152
+ portrait: {
153
+ intentToRetain: false,
135
154
  },
136
- "portrait": {
137
- "intentToRetain": false
155
+ resident_postal_code: {
156
+ intentToRetain: false,
138
157
  },
139
- "resident_postal_code": {
140
- "intentToRetain": false
141
- }
142
158
  },
143
- }
144
- }
159
+ },
160
+ },
145
161
  ];
146
162
  ```
147
- * `profile`: Credential format of the credential that will be verified. Currently only mobile (mDocs) is supported.
148
- * `docType`: the mDL’s type. Confirm with the certificate issuer for what docType they are issuing. Some common examples include:
149
- * Mobile Driver License (`org.iso.18013.5.1.mDL`).
150
- * PhotoID (`org.iso.23220.photoid.1`).
151
- * Mobile Vehicle Registration Card (`org.iso.7367.1.mVRC`).
152
- * Health certificate (`org.micov.vtr.1`).
153
- * `nameSpaces`: Each namespace corresponds to a group of claims included in the credential. These can be claims that are part of a specific standard, jurisdiction or any other reference. The namespace would usually correspond to the requested `docType`.
154
- * `intentToRetain` (Optional): When set to `true`, the holder will be indicated that the verifier intends to retain this claim beyond the verification workflow. Defaults to `false` when not specified.
155
-
156
- > The API supports including multiple query objects in the `credentialQuery` array in a single request. For simplicity, this example only includes a single query object.
157
163
 
158
- In this example the `credentialQuery` query will request for the `birthdate`, `portrait` and `resident_postal_code` claims from any credentials whose `profile` is `mobile` and `docType` is `org.iso.18013.5.1.mDL`.
164
+ - `profile`: Credential format of the credential that will be verified. Currently only mobile (mDocs) is supported.
165
+ - `docType`: the mDL’s type. Confirm with the certificate issuer for what docType they are issuing. Some common examples
166
+ include:
167
+ - Mobile Driver License (`org.iso.18013.5.1.mDL`).
168
+ - PhotoID (`org.iso.23220.photoid.1`).
169
+ - Mobile Vehicle Registration Card (`org.iso.7367.1.mVRC`).
170
+ - Health certificate (`org.micov.vtr.1`).
171
+ - `nameSpaces`: Each namespace corresponds to a group of claims included in the credential. These can be claims that are
172
+ part of a specific standard, jurisdiction or any other reference. The namespace would usually correspond to the
173
+ requested `docType`.
174
+ - `intentToRetain` (Optional): When set to `true`, the holder will be indicated that the verifier intends to retain
175
+ this claim beyond the verification workflow. Defaults to `false` when not specified.
176
+
177
+ > The API supports including multiple query objects in the `credentialQuery` array in a single request. For simplicity,
178
+ > this example only includes a single query object.
159
179
 
160
- It also sets `intentToRetain` as `false` for all claims, indicating to the holder that the verifier will not retain any of these claims.
180
+ In this example the `credentialQuery` query will request for the `birthdate`, `portrait` and `resident_postal_code`
181
+ claims from any credentials whose `profile` is `mobile` and `docType` is `org.iso.18013.5.1.mDL`.
161
182
 
162
- > While `intentToRetain` defaults to false, it is explicitly set to `false` in the example above for clarity purposes. If there is no intention to retain a claim, it is sufficient to simply exclude `intentToRetain` from the query.
183
+ It also sets `intentToRetain` as `false` for all claims, indicating to the holder that the verifier will not retain any
184
+ of these claims.
185
+
186
+ > While `intentToRetain` defaults to false, it is explicitly set to `false` in the example above for clarity purposes.
187
+ > If there is no intention to retain a claim, it is sufficient to simply exclude `intentToRetain` from the query.
163
188
 
164
189
  ## Generate challenge
165
190
 
166
- The Verifier Web SDK passes a unique challenge to the MATTR VII verifier tenant with every request to create a new presentation session. The purpose of the challenge is to ensure the security and integrity of the credential verification process by preventing replay attacks and verifying the authenticity of each request and response. You can either:
167
- * Generate this challenge by your backend and pass it to the SDK.
168
- * Generate it using the SDK built-in method.
191
+ The Verifier Web SDK passes a unique challenge to the MATTR VII verifier tenant with every request to create a new
192
+ presentation session. The purpose of the challenge is to ensure the security and integrity of the credential
193
+ verification process by preventing replay attacks and verifying the authenticity of each request and response. You can
194
+ either:
195
+
196
+ - Generate this challenge by your backend and pass it to the SDK.
197
+ - Generate it using the SDK built-in method.
169
198
 
170
- When the challenge is generated by your backend, you should use it to validate the verification results received from the MATTR VII verifier tenant.
199
+ When the challenge is generated by your backend, you should use it to validate the verification results received from
200
+ the MATTR VII verifier tenant.
171
201
 
172
202
  ## Determine supported presentation flows
173
203
 
174
- The **same-device flow** involves the user completing all steps on a single device, such as their smartphone. They initiate the credential request on the verifier's web app, are redirected to their wallet app to consent and present credentials, and then return to the verifier's web app with the results.
204
+ The **same-device flow** involves the user completing all steps on a single device, such as their smartphone. They
205
+ initiate the credential request on the verifier's web app, are redirected to their wallet app to consent and present
206
+ credentials, and then return to the verifier's web app with the results.
175
207
 
176
- In contrast, the **cross-device flow** starts on one device, like a laptop. When the user initiates the request, the web app responds by displaying a QR code. The user then scans this QR code with their smartphone, use their wallet app to present matching credentials, and the results are sent back to the verifier's web app.
208
+ In contrast, the **cross-device flow** starts on one device, like a laptop. When the user initiates the request, the web
209
+ app responds by displaying a QR code. The user then scans this QR code with their smartphone, use their wallet app to
210
+ present matching credentials, and the results are sent back to the verifier's web app.
177
211
 
178
- The main difference is that the same-device flow uses only one device for the entire process, while the cross-device flow uses two devices for added flexibility.
212
+ The main difference is that the same-device flow uses only one device for the entire process, while the cross-device
213
+ flow uses two devices for added flexibility.
179
214
 
180
215
  By default, the Verifier Web SDK automatically selects a flow based on the browser's user agent:
181
- * Same-device flows are used when the agent is a mobile device.
182
- * Cross-device flows are used in all other cases.
183
216
 
184
- This behavior can be explicitly overridden by specifying the desired mode in the SDK configuration, as shown in the [examples](#usage-examples) below.
217
+ - Same-device flows are used when the agent is a mobile device.
218
+ - Cross-device flows are used in all other cases.
219
+
220
+ This behavior can be explicitly overridden by specifying the desired mode in the SDK configuration, as shown in the
221
+ [examples](#request-credentials-examples) below.
185
222
 
186
223
  ## Define wallet identifiers
187
224
 
188
- You can define an identifier of a specific wallet you want to invoke with this verification request. The identifier defined by the SDK in the credential request must match one of the identifiers of a [wallet provider](https://learn.mattr.global/api-reference/latest/tag/Wallet-providers#operation/postWalletProvider!path=name&t=request) created on the MATTR VII verifier tenant.
189
- * If an identifier is provided and matches the `id` of one of the objects in the `walletProviders` array, the verifier tenant will invoke that specific wallet using its corresponding [`authorizationEndpoint`](https://learn.mattr.global/api-reference/latest/tag/Wallet-providers#operation/postWalletProvider!path=openid4vpConfiguration/authorizationEndpoint&t=request).
190
- * If an identifier is provided and does not match the `id` of any of the objects in the `walletProviders array`, the request will fail.
191
- * If an identifier is not provided, the verifier tenant will use `mdoc-openid4vp://` (default OID4VP scheme) to invoke any wallet.
225
+ You can define an identifier of a specific wallet you want to invoke with this verification request. The identifier
226
+ defined by the SDK in the credential request must match one of the identifiers of a
227
+ [wallet provider](https://learn.mattr.global/api-reference/latest/tag/Wallet-providers#operation/postWalletProvider!path=name&t=request)
228
+ created on the MATTR VII verifier tenant.
229
+
230
+ - If an identifier is provided and matches the `id` of one of the objects in the `walletProviders` array, the verifier
231
+ tenant will invoke that specific wallet using its corresponding
232
+ [`authorizationEndpoint`](https://learn.mattr.global/api-reference/latest/tag/Wallet-providers#operation/postWalletProvider!path=openid4vpConfiguration/authorizationEndpoint&t=request).
233
+ - If an identifier is provided and does not match the `id` of any of the objects in the `walletProviders array`, the
234
+ request will fail.
235
+ - If an identifier is not provided, the verifier tenant will use `mdoc-openid4vp://` (default OID4VP scheme) to invoke
236
+ any wallet.
192
237
 
193
238
  ## Configure redirectUri
194
239
 
195
- When using the same-device presentation flow, the SDK must define what URI to redirect the user to once they complete the verification workflow in their wallet app. This can be any URI (including custom URI schemes), and must match one of the values defined in the [`redirectUris` array](https://learn.mattr.global/api-reference/latest/tag/Verifier-applications#operation/postVerifierApplication!path=0/openid4vpConfiguration/redirectUris&t=request) when creating a verifier application.
240
+ When using the same-device presentation flow, the SDK must define what URI to redirect the user to once they complete
241
+ the verification workflow in their wallet app. This can be any URI (including custom URI schemes), and must match one of
242
+ the values defined in the
243
+ [`redirectUris` array](https://learn.mattr.global/api-reference/latest/tag/Verifier-applications#operation/postVerifierApplication!path=0/openid4vpConfiguration/redirectUris&t=request)
244
+ when creating a verifier application.
196
245
 
197
246
  ## Request credentials using the DC API
198
247
 
199
- > DC API support is currently offered as a **tech preview**. As such, functionality may be limited, may not work in all scenarios, and could change or break without prior notice.
248
+ > DC API support is currently offered as a **tech preview**. As such, functionality may be limited, may not work in all
249
+ > scenarios, and could change or break without prior notice.
200
250
 
201
- 1. Add the `dcApiConfiguration` object to your MATTR VII [verifier application configuration](https://learn.mattr.global/docs/verification/remote-verification-api-reference/verifier-applications#update-a-verifier-application).
251
+ 1. Add the `dcApiConfiguration` object to your MATTR VII
252
+ [verifier application configuration](https://learn.mattr.global/docs/verification/remote-verification-api-reference/verifier-applications#update-a-verifier-application).
202
253
 
203
- 2. Use the SDK's `isDigitalCredentialsApiSupported` method to determine if the user's browser supports the Digital Credentials API:
254
+ 2. Use the SDK's `isDigitalCredentialsApiSupported` method to determine if the user's browser supports the Digital
255
+ Credentials API:
204
256
 
205
257
  ```typescript
206
258
  import * as MattrVerifierSDK from "@mattrglobal/verifier-sdk-web";
@@ -243,9 +295,9 @@ const result = await MATTRVerifierSDK.requestCredentials({
243
295
  credentialQuery: credentialQuery, // Define what credential query to use
244
296
  challenge: MATTRVerifierSDK.utils.generateChallenge(), // Pass a unique challenge
245
297
  openid4vpConfiguration: {
246
- walletProviderId, // Define the wallet identifier
247
- redirectUri, // Define the redirect URI (not required for cross-device only requests)
248
- }
298
+ walletProviderId, // Define the wallet identifier
299
+ redirectUri, // Define the redirect URI (not required for cross-device only requests)
300
+ },
249
301
  });
250
302
 
251
303
  if (result.isErr()) {
@@ -254,12 +306,21 @@ if (result.isErr()) {
254
306
  console.info("<<< MATTRVerifierSDK.requestCredentials succeed", result.value);
255
307
  }
256
308
  ```
257
- * `apiBaseUrl` : Replace with the [`tenant_url`](https://learn.mattr.global/docs/platform-management/authentication) of your MATTR VII verifier tenant.
258
- * `credentialQuery`: The credential query to be used in the request.
259
- * `challenge`: The challenge that will be passed to the MATTR VII tenant with the request to create a presentation session. This example uses the SDK built-in method to generate the challenge, but you can replace it with a challenge generated by your backend system.
260
- * `walletProviderId`: Replace with a wallet identifier that matches one of the identifiers of a [wallet provider](https://learn.mattr.global/api-reference/latest/tag/Wallet-providers#operation/postWalletProvider!path=name&t=request) created on the MATTR VII verifier tenant..
261
- * `mode`: When omitted, the SDK defaults to automatically selecting a flow based on the browser's user agent (set to `undefined` in the example for clarity).
262
- * `redirectUri` Replace with a URI that matches one of the values in the [`redirectUris` array](https://learn.mattr.global/api-reference/latest/tag/Verifier-applications#operation/postVerifierApplication!path=0/openid4vpConfiguration/redirectUris&t=request) in the MATTR VII tenant's verifier application.
309
+
310
+ - `apiBaseUrl` : Replace with the [`tenant_url`](https://learn.mattr.global/docs/platform-management/authentication) of
311
+ your MATTR VII verifier tenant.
312
+ - `credentialQuery`: The credential query to be used in the request.
313
+ - `challenge`: The challenge that will be passed to the MATTR VII tenant with the request to create a presentation
314
+ session. This example uses the SDK built-in method to generate the challenge, but you can replace it with a challenge
315
+ generated by your backend system.
316
+ - `walletProviderId`: Replace with a wallet identifier that matches one of the identifiers of a
317
+ [wallet provider](https://learn.mattr.global/api-reference/latest/tag/Wallet-providers#operation/postWalletProvider!path=name&t=request)
318
+ created on the MATTR VII verifier tenant..
319
+ - `mode`: When omitted, the SDK defaults to automatically selecting a flow based on the browser's user agent (set to
320
+ `undefined` in the example for clarity).
321
+ - `redirectUri` Replace with a URI that matches one of the values in the
322
+ [`redirectUris` array](https://learn.mattr.global/api-reference/latest/tag/Verifier-applications#operation/postVerifierApplication!path=0/openid4vpConfiguration/redirectUris&t=request)
323
+ in the MATTR VII tenant's verifier application.
263
324
 
264
325
  ## Request credentials with explicit same-device flow
265
326
 
@@ -269,10 +330,10 @@ const result = await MATTRVerifierSDK.requestCredentials({
269
330
  credentialQuery: credentialQuery,
270
331
  challenge: MATTRVerifierSDK.utils.generateChallenge(),
271
332
  openid4vpConfiguration: {
272
- redirectUri,
273
- walletProviderId,
274
- mode: "sameDevice",
275
- }
333
+ redirectUri,
334
+ walletProviderId,
335
+ mode: "sameDevice",
336
+ },
276
337
  });
277
338
 
278
339
  // result can be retrieved on redirect uri page. for example
@@ -282,9 +343,9 @@ window.addEventListener("load", async () => {
282
343
  });
283
344
  ```
284
345
 
285
- * `mode`: When set to `sameDevice`, the SDK will only support same-device flow in this verification workflow.
286
- * Note that in this case you must define a `redirectUri`.
287
- * This example shows how you can redirect the user to page that will retrieve and display the verification results.
346
+ - `mode`: When set to `sameDevice`, the SDK will only support same-device flow in this verification workflow.
347
+ - Note that in this case you must define a `redirectUri`.
348
+ - This example shows how you can redirect the user to page that will retrieve and display the verification results.
288
349
 
289
350
  ## Request credentials with explicit cross-device flow
290
351
 
@@ -294,9 +355,9 @@ const result = await MATTRVerifierSDK.requestCredentials({
294
355
  credentialQuery: credentialQuery,
295
356
  challenge: MATTRVerifierSDK.utils.generateChallenge(),
296
357
  openid4vpConfiguration: {
297
- walletProviderId,
298
- mode: "crossDevice",
299
- }
358
+ walletProviderId,
359
+ mode: "crossDevice",
360
+ },
300
361
  });
301
362
 
302
363
  if (result.isErr()) {
@@ -306,8 +367,10 @@ if (result.isErr()) {
306
367
  }
307
368
  ```
308
369
 
309
- * `mode`: When set to `crossDevice`, the SDK will only support cross-device flow in this verification workflow.
310
- * Note that in this case you must define how to handle verification completion and failure.
370
+ - `mode`: When set to `crossDevice`, the SDK will only support cross-device flow in this verification workflow.
371
+ - Note that in this case you must define how to handle verification completion and failure.
311
372
 
312
373
  # Error Handling
313
- The SDK includes mechanisms for handling errors, such as invalid requests, session timeouts, and user aborts. Callbacks provide detailed error information to help diagnose and remedy issues.
374
+
375
+ The SDK includes mechanisms for handling errors, such as invalid requests, session timeouts, and user aborts. Callbacks
376
+ provide detailed error information to help diagnose and remedy issues.
@@ -7,7 +7,7 @@
7
7
  * Do Not Translate or Localize
8
8
  *
9
9
  * Bundle of @mattrglobal/verifier-sdk-web
10
- * Generated: 2026-04-30
10
+ * Generated: 2026-05-04
11
11
  * Version: 2.1.1
12
12
  * Dependencies:
13
13
  */
@@ -7,7 +7,7 @@
7
7
  * Do Not Translate or Localize
8
8
  *
9
9
  * Bundle of @mattrglobal/verifier-sdk-web
10
- * Generated: 2026-04-30
10
+ * Generated: 2026-05-04
11
11
  * Version: 2.1.1
12
12
  * Dependencies:
13
13
  *
@@ -7,7 +7,7 @@
7
7
  * Do Not Translate or Localize
8
8
  *
9
9
  * Bundle of @mattrglobal/verifier-sdk-web
10
- * Generated: 2026-04-30
10
+ * Generated: 2026-05-04
11
11
  * Version: 2.1.1
12
12
  * Dependencies:
13
13
  *
@@ -7,7 +7,7 @@
7
7
  * Do Not Translate or Localize
8
8
  *
9
9
  * Bundle of @mattrglobal/verifier-sdk-web
10
- * Generated: 2026-04-30
10
+ * Generated: 2026-05-04
11
11
  * Version: 2.1.1
12
12
  * Dependencies:
13
13
  *
@@ -7,7 +7,7 @@
7
7
  * Do Not Translate or Localize
8
8
  *
9
9
  * Bundle of @mattrglobal/verifier-sdk-web
10
- * Generated: 2026-04-30
10
+ * Generated: 2026-05-04
11
11
  * Version: 2.1.1
12
12
  * Dependencies:
13
13
  *
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@mattrglobal/verifier-sdk-web",
3
- "version": "2.1.2-unstable.147+333e2cba",
3
+ "version": "2.1.2-unstable.148+e1d5c753",
4
4
  "main": "dist/lib/verifier-js.cjs.js",
5
5
  "types": "dist/typings/index.d.ts",
6
6
  "module": "dist/verifier-js.production.esm.js",
@@ -28,7 +28,9 @@
28
28
  "test:es-check:es2017": "es-check es2017 'dist/verifier-js.development.js' && es-check es2017 'dist/verifier-js.production.js'",
29
29
  "test:es-check:es2017:module": "es-check es2017 'dist/verifier-js.production.esm.js' --module",
30
30
  "docs": "rm -rf generatedDoc/ && typedoc && cp CHANGELOG_PUBLIC.md generatedDoc/CHANGELOG.md",
31
- "docs:html": "NAME=\"MATTR Verifier Web SDK\" ../../scripts/generateHtmlDocs.sh"
31
+ "docs:html": "NAME=\"MATTR Verifier Web SDK\" ../../scripts/generateHtmlDocs.sh",
32
+ "prepack": "cp README.md README_INTERNAL.md && cp README_PUBLIC.md README.md",
33
+ "postpack": "mv README_INTERNAL.md README.md"
32
34
  },
33
- "gitHead": "333e2cba81e983421a88cec9bba01ee2c815be44"
35
+ "gitHead": "e1d5c753e89a45442daeff832997da0cc417b478"
34
36
  }