@meeco/svx-api-sdk 1.0.0-develop.20250108183718.7fc3d67 → 1.0.0-develop.20250108184711.803db02

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (59) hide show
  1. package/.openapi-generator/FILES +2 -8
  2. package/lib/esm/apis/VerifiableCredentialsApi.js +2 -2
  3. package/lib/esm/apis/VerifiablePresentationsApi.js +8 -11
  4. package/lib/esm/models/VCCreateCredentialTypeConfigDto.js +8 -3
  5. package/lib/esm/models/VCCreatePresentationRequestOptionsRequestDto.js +1 -1
  6. package/lib/esm/models/VCCredentialTypeConfigDto.js +14 -5
  7. package/lib/esm/models/VCCredentialTypeModelDto.js +12 -12
  8. package/lib/esm/models/VCFieldsDtoFilter.js +6 -0
  9. package/lib/esm/models/VCFilterContainsDto.js +45 -0
  10. package/lib/esm/models/VCFilterDto.js +6 -0
  11. package/lib/esm/models/VCFilterItemsDto.js +43 -0
  12. package/lib/esm/models/VCInputDescriptorDto.js +2 -0
  13. package/lib/esm/models/index.js +2 -7
  14. package/lib/types/apis/VerifiableCredentialsApi.d.ts +2 -2
  15. package/lib/types/apis/VerifiablePresentationsApi.d.ts +8 -8
  16. package/lib/types/models/VCCreateCredentialTypeConfigDto.d.ts +20 -3
  17. package/lib/types/models/VCCreatePresentationRequestOptionsRequestDto.d.ts +1 -1
  18. package/lib/types/models/VCCredentialTypeConfigDto.d.ts +23 -6
  19. package/lib/types/models/VCCredentialTypeModelDto.d.ts +10 -10
  20. package/lib/types/models/VCFieldsDtoFilter.d.ts +14 -0
  21. package/lib/types/models/VCFilterContainsDto.d.ts +37 -0
  22. package/lib/types/models/VCFilterDto.d.ts +14 -0
  23. package/lib/types/models/VCFilterItemsDto.d.ts +31 -0
  24. package/lib/types/models/VCInputDescriptorDto.d.ts +6 -0
  25. package/lib/types/models/index.d.ts +2 -7
  26. package/lib/umd/apis/VerifiableCredentialsApi.js +2 -2
  27. package/lib/umd/apis/VerifiablePresentationsApi.js +8 -11
  28. package/lib/umd/models/VCCreateCredentialTypeConfigDto.js +8 -3
  29. package/lib/umd/models/VCCreatePresentationRequestOptionsRequestDto.js +1 -1
  30. package/lib/umd/models/VCCredentialTypeConfigDto.js +14 -5
  31. package/lib/umd/models/VCCredentialTypeModelDto.js +12 -12
  32. package/lib/umd/models/VCFieldsDtoFilter.js +6 -0
  33. package/lib/umd/models/VCFilterContainsDto.js +52 -0
  34. package/lib/umd/models/VCFilterDto.js +6 -0
  35. package/lib/umd/models/VCFilterItemsDto.js +50 -0
  36. package/lib/umd/models/VCInputDescriptorDto.js +2 -0
  37. package/lib/umd/models/index.js +2 -7
  38. package/package.json +1 -1
  39. package/lib/esm/models/VCCreateCredentialTypeConfigDtoExpiry.js +0 -49
  40. package/lib/esm/models/VCCreateCredentialTypeExpiryDto.js +0 -49
  41. package/lib/esm/models/VCCredentialTypeConfigDtoExpiry.js +0 -49
  42. package/lib/esm/models/VCCredentialTypeExpiryDto.js +0 -49
  43. package/lib/esm/models/VCCredentialTypeModelDtoConfig.js +0 -52
  44. package/lib/esm/models/VCCredentialTypeModelDtoSchema.js +0 -55
  45. package/lib/esm/models/VCCredentialTypeModelDtoStyle.js +0 -49
  46. package/lib/types/models/VCCreateCredentialTypeConfigDtoExpiry.d.ts +0 -43
  47. package/lib/types/models/VCCreateCredentialTypeExpiryDto.d.ts +0 -43
  48. package/lib/types/models/VCCredentialTypeConfigDtoExpiry.d.ts +0 -43
  49. package/lib/types/models/VCCredentialTypeExpiryDto.d.ts +0 -43
  50. package/lib/types/models/VCCredentialTypeModelDtoConfig.d.ts +0 -50
  51. package/lib/types/models/VCCredentialTypeModelDtoSchema.d.ts +0 -55
  52. package/lib/types/models/VCCredentialTypeModelDtoStyle.d.ts +0 -43
  53. package/lib/umd/models/VCCreateCredentialTypeConfigDtoExpiry.js +0 -56
  54. package/lib/umd/models/VCCreateCredentialTypeExpiryDto.js +0 -56
  55. package/lib/umd/models/VCCredentialTypeConfigDtoExpiry.js +0 -56
  56. package/lib/umd/models/VCCredentialTypeExpiryDto.js +0 -56
  57. package/lib/umd/models/VCCredentialTypeModelDtoConfig.js +0 -59
  58. package/lib/umd/models/VCCredentialTypeModelDtoSchema.js +0 -62
  59. package/lib/umd/models/VCCredentialTypeModelDtoStyle.js +0 -56
@@ -1,4 +1,3 @@
1
- .openapi-generator-ignore
2
1
  apis/ClassificationsApi.ts
3
2
  apis/ConnectionsApi.ts
4
3
  apis/DIDsApi.ts
@@ -226,9 +225,7 @@ models/VCClaimsDto.ts
226
225
  models/VCCnfDto.ts
227
226
  models/VCConstraintsDto.ts
228
227
  models/VCCreateCredentialTypeConfigDto.ts
229
- models/VCCreateCredentialTypeConfigDtoExpiry.ts
230
228
  models/VCCreateCredentialTypeDto.ts
231
- models/VCCreateCredentialTypeExpiryDto.ts
232
229
  models/VCCreateCredentialTypePayloadDto.ts
233
230
  models/VCCreateCredentialTypeStyleDto.ts
234
231
  models/VCCreatePresentationDefinitionDto.ts
@@ -242,12 +239,7 @@ models/VCCredentialJSONSchemaPayloadDto.ts
242
239
  models/VCCredentialModelDto.ts
243
240
  models/VCCredentialResponseDto.ts
244
241
  models/VCCredentialTypeConfigDto.ts
245
- models/VCCredentialTypeConfigDtoExpiry.ts
246
- models/VCCredentialTypeExpiryDto.ts
247
242
  models/VCCredentialTypeModelDto.ts
248
- models/VCCredentialTypeModelDtoConfig.ts
249
- models/VCCredentialTypeModelDtoSchema.ts
250
- models/VCCredentialTypeModelDtoStyle.ts
251
243
  models/VCCredentialTypeResponseDto.ts
252
244
  models/VCCredentialTypeSchemaDto.ts
253
245
  models/VCCredentialTypeStyleDto.ts
@@ -260,7 +252,9 @@ models/VCErrorResponseDto.ts
260
252
  models/VCErrorsResponseDto.ts
261
253
  models/VCFieldsDto.ts
262
254
  models/VCFieldsDtoFilter.ts
255
+ models/VCFilterContainsDto.ts
263
256
  models/VCFilterDto.ts
257
+ models/VCFilterItemsDto.ts
264
258
  models/VCFilterNotPredicateDto.ts
265
259
  models/VCGenerateCredentialDto.ts
266
260
  models/VCGenerateCredentialDtoClaims.ts
@@ -307,7 +307,7 @@ export class VerifiableCredentialsApi extends runtime.BaseAPI {
307
307
  });
308
308
  }
309
309
  /**
310
- * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { Ed25519 } from \'@meeco/sdk\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = new Ed25519(hexToBytes(SEED_HEX)); <br />const signerFn = EdDSASigner(key.getSecretKey()); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
310
+ * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of credential signing in Javascript:</p><pre><code>import { Ed25519 } from \'@meeco/sdk\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = new Ed25519(hexToBytes(SEED_HEX)); <br />const signerFn = EdDSASigner(key.getSecretKey()); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
311
311
  * Generate credential based on type and claims provided
312
312
  */
313
313
  credentialsGeneratePostRaw(requestParameters, initOverrides) {
@@ -342,7 +342,7 @@ export class VerifiableCredentialsApi extends runtime.BaseAPI {
342
342
  });
343
343
  }
344
344
  /**
345
- * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { Ed25519 } from \'@meeco/sdk\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = new Ed25519(hexToBytes(SEED_HEX)); <br />const signerFn = EdDSASigner(key.getSecretKey()); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
345
+ * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of credential signing in Javascript:</p><pre><code>import { Ed25519 } from \'@meeco/sdk\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = new Ed25519(hexToBytes(SEED_HEX)); <br />const signerFn = EdDSASigner(key.getSecretKey()); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
346
346
  * Generate credential based on type and claims provided
347
347
  */
348
348
  credentialsGeneratePost(meecoOrganisationID, vCGenerateCredentialPayloadDto, initOverrides) {
@@ -202,7 +202,7 @@ export class VerifiablePresentationsApi extends runtime.BaseAPI {
202
202
  });
203
203
  }
204
204
  /**
205
- * <h4>Depending on the presence of the <code>Meeco-Organisation-ID</code> header, endpoint requires one of the following security rights:</h4><ul><li><code>vc:tenant:manage</code> if <code>Meeco-Organisation-ID</code> is not specified</li><li><code>vc:org:manage</code> if <code>Meeco-Organisation-ID</code> is specified</li></ul><br />Register Presentation Request for organisation<br /><p>When using a Presentation Definition with a <code>format</code> of <code>vc+sd-jwt</code>,the <code>vp_formats</code> of the Generated Presentation Request <code>registration</code> will be set to <pre><code>\"vc+sd-jwt\": { <br /> \"sd-jwt_alg_values\": [ <br /> \"ES256\", \"EdDSA\" <br /> ], <br /> \"sd-jwt_alg_values\": [ <br /> \"ES256\", \"EdDSA\" <br /> ] <br /> } </code>, </pre>and <code>subject_syntax_types_supported</code> will be set to <code>urn:ietf:params:oauth:jwk-thumbprint</code>.</p><br /><br /><pre><code>\"registration\": { <br /> ... <br /> \"subject_syntax_types_supported\": [ <br /> \"urn:ietf:params:oauth:jwk-thumbprint\" <br /> ], <br /> \"vp_formats\": { <br /> \"vc+sd-jwt\": { <br /> \"sd-jwt_alg_values\": [ <br /> \"ES256\", \"EdDSA\" <br /> ], <br /> \"sd-jwt_alg_values\": [ <br /> \"ES256\", \"EdDSA\" <br /> ] <br /> }, <br /> ... <br />} <br /></code></pre>
205
+ * <h4>Depending on the presence of the <code>Meeco-Organisation-ID</code> header, endpoint requires one of the following security rights:</h4><ul><li><code>vc:tenant:manage</code> if <code>Meeco-Organisation-ID</code> is not specified</li><li><code>vc:org:manage</code> if <code>Meeco-Organisation-ID</code> is specified</li></ul><br />Register Presentation Request for organisation
206
206
  * Create a Presentation Request
207
207
  */
208
208
  openidPresentationsRequestsPostRaw(requestParameters, initOverrides) {
@@ -234,7 +234,7 @@ export class VerifiablePresentationsApi extends runtime.BaseAPI {
234
234
  });
235
235
  }
236
236
  /**
237
- * <h4>Depending on the presence of the <code>Meeco-Organisation-ID</code> header, endpoint requires one of the following security rights:</h4><ul><li><code>vc:tenant:manage</code> if <code>Meeco-Organisation-ID</code> is not specified</li><li><code>vc:org:manage</code> if <code>Meeco-Organisation-ID</code> is specified</li></ul><br />Register Presentation Request for organisation<br /><p>When using a Presentation Definition with a <code>format</code> of <code>vc+sd-jwt</code>,the <code>vp_formats</code> of the Generated Presentation Request <code>registration</code> will be set to <pre><code>\"vc+sd-jwt\": { <br /> \"sd-jwt_alg_values\": [ <br /> \"ES256\", \"EdDSA\" <br /> ], <br /> \"sd-jwt_alg_values\": [ <br /> \"ES256\", \"EdDSA\" <br /> ] <br /> } </code>, </pre>and <code>subject_syntax_types_supported</code> will be set to <code>urn:ietf:params:oauth:jwk-thumbprint</code>.</p><br /><br /><pre><code>\"registration\": { <br /> ... <br /> \"subject_syntax_types_supported\": [ <br /> \"urn:ietf:params:oauth:jwk-thumbprint\" <br /> ], <br /> \"vp_formats\": { <br /> \"vc+sd-jwt\": { <br /> \"sd-jwt_alg_values\": [ <br /> \"ES256\", \"EdDSA\" <br /> ], <br /> \"sd-jwt_alg_values\": [ <br /> \"ES256\", \"EdDSA\" <br /> ] <br /> }, <br /> ... <br />} <br /></code></pre>
237
+ * <h4>Depending on the presence of the <code>Meeco-Organisation-ID</code> header, endpoint requires one of the following security rights:</h4><ul><li><code>vc:tenant:manage</code> if <code>Meeco-Organisation-ID</code> is not specified</li><li><code>vc:org:manage</code> if <code>Meeco-Organisation-ID</code> is specified</li></ul><br />Register Presentation Request for organisation
238
238
  * Create a Presentation Request
239
239
  */
240
240
  openidPresentationsRequestsPost(vCCreatePresentationRequestPayloadDto, meecoOrganisationID, initOverrides) {
@@ -510,7 +510,7 @@ export class VerifiablePresentationsApi extends runtime.BaseAPI {
510
510
  });
511
511
  }
512
512
  /**
513
- * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br />Register Presentation Definitions for organisation<br /><p><code>input_descriptors</code> property MUST follow the <a target=\"_blank\" href=\"https://identity.foundation/presentation-exchange/spec/v2.1.1/#input-descriptor\">DIF Presentation Exchange Specification</a></p><p>When <code>format</code> of the Presentation Definition is set to <code>vc+sd-jwt</code>, then <code>vp_formats</code> of the Generated Presentation Request <code>registration</code> will be set to</p><pre><code>{ <br /> \"vc+sd-jwt\": { <br /> \"sd-jwt_alg_values\": [ <br /> \"ES256\", <br /> \"EdDSA\" <br /> ], <br /> \"kb-jwt_alg_values\": [ <br /> \"ES256\", <br /> \"EdDSA\" <br /> ] <br /> } <br />} <br /></code></pre><p>and <code>subject_syntax_types_supported</code> will be set to <code>urn:ietf:params:oauth:jwk-thumbprint</code>.</p><br />
513
+ * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br />Register Presentation Definitions for organisation<br /><p><code>input_descriptors</code> property MUST follow the <a target=\"_blank\" href=\"https://identity.foundation/presentation-exchange/spec/v2.1.1/#input-descriptor\">DIF Presentation Exchange Specification</a></p>
514
514
  * Create a Presentation Definition
515
515
  */
516
516
  presentationDefinitionsPostRaw(requestParameters, initOverrides) {
@@ -545,7 +545,7 @@ export class VerifiablePresentationsApi extends runtime.BaseAPI {
545
545
  });
546
546
  }
547
547
  /**
548
- * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br />Register Presentation Definitions for organisation<br /><p><code>input_descriptors</code> property MUST follow the <a target=\"_blank\" href=\"https://identity.foundation/presentation-exchange/spec/v2.1.1/#input-descriptor\">DIF Presentation Exchange Specification</a></p><p>When <code>format</code> of the Presentation Definition is set to <code>vc+sd-jwt</code>, then <code>vp_formats</code> of the Generated Presentation Request <code>registration</code> will be set to</p><pre><code>{ <br /> \"vc+sd-jwt\": { <br /> \"sd-jwt_alg_values\": [ <br /> \"ES256\", <br /> \"EdDSA\" <br /> ], <br /> \"kb-jwt_alg_values\": [ <br /> \"ES256\", <br /> \"EdDSA\" <br /> ] <br /> } <br />} <br /></code></pre><p>and <code>subject_syntax_types_supported</code> will be set to <code>urn:ietf:params:oauth:jwk-thumbprint</code>.</p><br />
548
+ * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br />Register Presentation Definitions for organisation<br /><p><code>input_descriptors</code> property MUST follow the <a target=\"_blank\" href=\"https://identity.foundation/presentation-exchange/spec/v2.1.1/#input-descriptor\">DIF Presentation Exchange Specification</a></p>
549
549
  * Create a Presentation Definition
550
550
  */
551
551
  presentationDefinitionsPost(meecoOrganisationID, vCCreatePresentationDefinitionPayloadDto, initOverrides) {
@@ -597,14 +597,11 @@ export class VerifiablePresentationsApi extends runtime.BaseAPI {
597
597
  });
598
598
  }
599
599
  /**
600
- * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><p>Verify a verifiable presentation</p><p><b>Checks performed:</b><ul><li>Verifiable presentation signature</li><li>Verifiable presentation format and required attributes</li><li>Verifiable presentation expiration if present</li><li>Verifiable presentation credentials if present <em>(check <code>POST /credentials/verify</code> for more information)</em></li></ul></p><p>Presentation expiration check is not considered critical and will be returned under <code>warnings</code> attribute. It is up for the client application to decide how it should be handled. All other failed checks will be served under <code>errors</code> attribute.</p><p><code>failed_to_verify_jwt</code> error might appear in both: errors and warnings list. <br />So far, the only case when <code>failed_to_verify_jwt</code> appears in the warnings list is when presentation is expired. <br /></p>
600
+ * <h4>Depending on the presence of the <code>Meeco-Organisation-ID</code> header, endpoint requires one of the following security rights:</h4><ul><li><code>vc:tenant:manage</code> if <code>Meeco-Organisation-ID</code> is not specified</li><li><code>vc:org:manage</code> if <code>Meeco-Organisation-ID</code> is specified</li></ul><br /><p>Verify a verifiable presentation</p><p><b>Checks performed:</b><ul><li>Verifiable presentation signature</li><li>Verifiable presentation format and required attributes</li><li>Verifiable presentation expiration if present</li><li>Verifiable presentation credentials if present <em>(check <code>POST /credentials/verify</code> for more information)</em></li></ul></p><p>Presentation expiration check is not considered critical and will be returned under <code>warnings</code> attribute. It is up for the client application to decide how it should be handled. All other failed checks will be served under <code>errors</code> attribute.</p><p><code>failed_to_verify_jwt</code> error might appear in both: errors and warnings list. <br />So far, the only case when <code>failed_to_verify_jwt</code> appears in the warnings list is when presentation is expired. <br /></p>
601
601
  * Verify a verifiable presentation
602
602
  */
603
603
  presentationsVerifyPostRaw(requestParameters, initOverrides) {
604
604
  return __awaiter(this, void 0, void 0, function* () {
605
- if (requestParameters.meecoOrganisationID === null || requestParameters.meecoOrganisationID === undefined) {
606
- throw new runtime.RequiredError('meecoOrganisationID', 'Required parameter requestParameters.meecoOrganisationID was null or undefined when calling presentationsVerifyPost.');
607
- }
608
605
  if (requestParameters.vCVerifySignedPresentationRequestPayloadDto === null || requestParameters.vCVerifySignedPresentationRequestPayloadDto === undefined) {
609
606
  throw new runtime.RequiredError('vCVerifySignedPresentationRequestPayloadDto', 'Required parameter requestParameters.vCVerifySignedPresentationRequestPayloadDto was null or undefined when calling presentationsVerifyPost.');
610
607
  }
@@ -632,12 +629,12 @@ export class VerifiablePresentationsApi extends runtime.BaseAPI {
632
629
  });
633
630
  }
634
631
  /**
635
- * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><p>Verify a verifiable presentation</p><p><b>Checks performed:</b><ul><li>Verifiable presentation signature</li><li>Verifiable presentation format and required attributes</li><li>Verifiable presentation expiration if present</li><li>Verifiable presentation credentials if present <em>(check <code>POST /credentials/verify</code> for more information)</em></li></ul></p><p>Presentation expiration check is not considered critical and will be returned under <code>warnings</code> attribute. It is up for the client application to decide how it should be handled. All other failed checks will be served under <code>errors</code> attribute.</p><p><code>failed_to_verify_jwt</code> error might appear in both: errors and warnings list. <br />So far, the only case when <code>failed_to_verify_jwt</code> appears in the warnings list is when presentation is expired. <br /></p>
632
+ * <h4>Depending on the presence of the <code>Meeco-Organisation-ID</code> header, endpoint requires one of the following security rights:</h4><ul><li><code>vc:tenant:manage</code> if <code>Meeco-Organisation-ID</code> is not specified</li><li><code>vc:org:manage</code> if <code>Meeco-Organisation-ID</code> is specified</li></ul><br /><p>Verify a verifiable presentation</p><p><b>Checks performed:</b><ul><li>Verifiable presentation signature</li><li>Verifiable presentation format and required attributes</li><li>Verifiable presentation expiration if present</li><li>Verifiable presentation credentials if present <em>(check <code>POST /credentials/verify</code> for more information)</em></li></ul></p><p>Presentation expiration check is not considered critical and will be returned under <code>warnings</code> attribute. It is up for the client application to decide how it should be handled. All other failed checks will be served under <code>errors</code> attribute.</p><p><code>failed_to_verify_jwt</code> error might appear in both: errors and warnings list. <br />So far, the only case when <code>failed_to_verify_jwt</code> appears in the warnings list is when presentation is expired. <br /></p>
636
633
  * Verify a verifiable presentation
637
634
  */
638
- presentationsVerifyPost(meecoOrganisationID, vCVerifySignedPresentationRequestPayloadDto, initOverrides) {
635
+ presentationsVerifyPost(vCVerifySignedPresentationRequestPayloadDto, meecoOrganisationID, initOverrides) {
639
636
  return __awaiter(this, void 0, void 0, function* () {
640
- const response = yield this.presentationsVerifyPostRaw({ meecoOrganisationID: meecoOrganisationID, vCVerifySignedPresentationRequestPayloadDto: vCVerifySignedPresentationRequestPayloadDto }, initOverrides);
637
+ const response = yield this.presentationsVerifyPostRaw({ vCVerifySignedPresentationRequestPayloadDto: vCVerifySignedPresentationRequestPayloadDto, meecoOrganisationID: meecoOrganisationID }, initOverrides);
641
638
  return yield response.value();
642
639
  });
643
640
  }
@@ -12,7 +12,6 @@
12
12
  * Do not edit the class manually.
13
13
  */
14
14
  import { exists } from '../runtime';
15
- import { VCCreateCredentialTypeConfigDtoExpiryFromJSON, VCCreateCredentialTypeConfigDtoExpiryToJSON, } from './VCCreateCredentialTypeConfigDtoExpiry';
16
15
  /**
17
16
  * Check if a given object implements the VCCreateCredentialTypeConfigDto interface.
18
17
  */
@@ -29,7 +28,10 @@ export function VCCreateCredentialTypeConfigDtoFromJSONTyped(json, ignoreDiscrim
29
28
  }
30
29
  return {
31
30
  'vct': !exists(json, 'vct') ? undefined : json['vct'],
32
- 'expiry': !exists(json, 'expiry') ? undefined : VCCreateCredentialTypeConfigDtoExpiryFromJSON(json['expiry']),
31
+ 'valid_in': !exists(json, 'valid_in') ? undefined : json['valid_in'],
32
+ 'valid_at': !exists(json, 'valid_at') ? undefined : (new Date(json['valid_at'])),
33
+ 'expires_in': !exists(json, 'expires_in') ? undefined : json['expires_in'],
34
+ 'expires_at': !exists(json, 'expires_at') ? undefined : (new Date(json['expires_at'])),
33
35
  'issuer_credential_configurations_supported_name': !exists(json, 'issuer_credential_configurations_supported_name') ? undefined : json['issuer_credential_configurations_supported_name'],
34
36
  'disclosure_frame': !exists(json, 'disclosure_frame') ? undefined : json['disclosure_frame'],
35
37
  };
@@ -43,7 +45,10 @@ export function VCCreateCredentialTypeConfigDtoToJSON(value) {
43
45
  }
44
46
  return {
45
47
  'vct': value.vct,
46
- 'expiry': VCCreateCredentialTypeConfigDtoExpiryToJSON(value.expiry),
48
+ 'valid_in': value.valid_in,
49
+ 'valid_at': value.valid_at === undefined ? undefined : (value.valid_at.toISOString()),
50
+ 'expires_in': value.expires_in,
51
+ 'expires_at': value.expires_at === undefined ? undefined : (value.expires_at.toISOString()),
47
52
  'issuer_credential_configurations_supported_name': value.issuer_credential_configurations_supported_name,
48
53
  'disclosure_frame': value.disclosure_frame,
49
54
  };
@@ -15,7 +15,7 @@
15
15
  * @export
16
16
  */
17
17
  export const VCCreatePresentationRequestOptionsRequestDtoProtocolVersionEnum = {
18
- Oid4vpDraft18: 'oid4vp-draft18'
18
+ Openid4vpDraft18: 'openid4vp-draft18'
19
19
  };
20
20
  /**
21
21
  * Check if a given object implements the VCCreatePresentationRequestOptionsRequestDto interface.
@@ -11,15 +11,18 @@
11
11
  * https://openapi-generator.tech
12
12
  * Do not edit the class manually.
13
13
  */
14
- import { exists } from '../runtime';
15
- import { VCCredentialTypeConfigDtoExpiryFromJSON, VCCredentialTypeConfigDtoExpiryToJSON, } from './VCCredentialTypeConfigDtoExpiry';
16
14
  /**
17
15
  * Check if a given object implements the VCCredentialTypeConfigDto interface.
18
16
  */
19
17
  export function instanceOfVCCredentialTypeConfigDto(value) {
20
18
  let isInstance = true;
21
19
  isInstance = isInstance && "vct" in value;
20
+ isInstance = isInstance && "valid_in" in value;
21
+ isInstance = isInstance && "valid_at" in value;
22
+ isInstance = isInstance && "expires_in" in value;
23
+ isInstance = isInstance && "expires_at" in value;
22
24
  isInstance = isInstance && "issuer_credential_configurations_supported_name" in value;
25
+ isInstance = isInstance && "disclosure_frame" in value;
23
26
  return isInstance;
24
27
  }
25
28
  export function VCCredentialTypeConfigDtoFromJSON(json) {
@@ -31,9 +34,12 @@ export function VCCredentialTypeConfigDtoFromJSONTyped(json, ignoreDiscriminator
31
34
  }
32
35
  return {
33
36
  'vct': json['vct'],
34
- 'expiry': !exists(json, 'expiry') ? undefined : VCCredentialTypeConfigDtoExpiryFromJSON(json['expiry']),
37
+ 'valid_in': json['valid_in'],
38
+ 'valid_at': (json['valid_at'] === null ? null : new Date(json['valid_at'])),
39
+ 'expires_in': json['expires_in'],
40
+ 'expires_at': (json['expires_at'] === null ? null : new Date(json['expires_at'])),
35
41
  'issuer_credential_configurations_supported_name': json['issuer_credential_configurations_supported_name'],
36
- 'disclosure_frame': !exists(json, 'disclosure_frame') ? undefined : json['disclosure_frame'],
42
+ 'disclosure_frame': json['disclosure_frame'],
37
43
  };
38
44
  }
39
45
  export function VCCredentialTypeConfigDtoToJSON(value) {
@@ -45,7 +51,10 @@ export function VCCredentialTypeConfigDtoToJSON(value) {
45
51
  }
46
52
  return {
47
53
  'vct': value.vct,
48
- 'expiry': VCCredentialTypeConfigDtoExpiryToJSON(value.expiry),
54
+ 'valid_in': value.valid_in,
55
+ 'valid_at': (value.valid_at === null ? null : value.valid_at.toISOString()),
56
+ 'expires_in': value.expires_in,
57
+ 'expires_at': (value.expires_at === null ? null : value.expires_at.toISOString()),
49
58
  'issuer_credential_configurations_supported_name': value.issuer_credential_configurations_supported_name,
50
59
  'disclosure_frame': value.disclosure_frame,
51
60
  };
@@ -11,10 +11,9 @@
11
11
  * https://openapi-generator.tech
12
12
  * Do not edit the class manually.
13
13
  */
14
- import { exists } from '../runtime';
15
- import { VCCredentialTypeModelDtoConfigFromJSON, VCCredentialTypeModelDtoConfigToJSON, } from './VCCredentialTypeModelDtoConfig';
16
- import { VCCredentialTypeModelDtoSchemaFromJSON, VCCredentialTypeModelDtoSchemaToJSON, } from './VCCredentialTypeModelDtoSchema';
17
- import { VCCredentialTypeModelDtoStyleFromJSON, VCCredentialTypeModelDtoStyleToJSON, } from './VCCredentialTypeModelDtoStyle';
14
+ import { VCCredentialTypeConfigDtoFromJSON, VCCredentialTypeConfigDtoToJSON, } from './VCCredentialTypeConfigDto';
15
+ import { VCCredentialTypeSchemaDtoFromJSON, VCCredentialTypeSchemaDtoToJSON, } from './VCCredentialTypeSchemaDto';
16
+ import { VCCredentialTypeStyleDtoFromJSON, VCCredentialTypeStyleDtoToJSON, } from './VCCredentialTypeStyleDto';
18
17
  /**
19
18
  * @export
20
19
  */
@@ -34,6 +33,7 @@ export function instanceOfVCCredentialTypeModelDto(value) {
34
33
  isInstance = isInstance && "schema" in value;
35
34
  isInstance = isInstance && "style" in value;
36
35
  isInstance = isInstance && "format" in value;
36
+ isInstance = isInstance && "config" in value;
37
37
  isInstance = isInstance && "created_at" in value;
38
38
  isInstance = isInstance && "archived" in value;
39
39
  isInstance = isInstance && "archived_at" in value;
@@ -51,13 +51,13 @@ export function VCCredentialTypeModelDtoFromJSONTyped(json, ignoreDiscriminator)
51
51
  'name': json['name'],
52
52
  'type': json['type'],
53
53
  'organization_id': json['organization_id'],
54
- 'schema': VCCredentialTypeModelDtoSchemaFromJSON(json['schema']),
55
- 'style': VCCredentialTypeModelDtoStyleFromJSON(json['style']),
54
+ 'schema': VCCredentialTypeSchemaDtoFromJSON(json['schema']),
55
+ 'style': VCCredentialTypeStyleDtoFromJSON(json['style']),
56
56
  'format': json['format'],
57
- 'config': !exists(json, 'config') ? undefined : VCCredentialTypeModelDtoConfigFromJSON(json['config']),
57
+ 'config': VCCredentialTypeConfigDtoFromJSON(json['config']),
58
58
  'created_at': (new Date(json['created_at'])),
59
59
  'archived': json['archived'],
60
- 'archived_at': (new Date(json['archived_at'])),
60
+ 'archived_at': (json['archived_at'] === null ? null : new Date(json['archived_at'])),
61
61
  };
62
62
  }
63
63
  export function VCCredentialTypeModelDtoToJSON(value) {
@@ -72,12 +72,12 @@ export function VCCredentialTypeModelDtoToJSON(value) {
72
72
  'name': value.name,
73
73
  'type': value.type,
74
74
  'organization_id': value.organization_id,
75
- 'schema': VCCredentialTypeModelDtoSchemaToJSON(value.schema),
76
- 'style': VCCredentialTypeModelDtoStyleToJSON(value.style),
75
+ 'schema': VCCredentialTypeSchemaDtoToJSON(value.schema),
76
+ 'style': VCCredentialTypeStyleDtoToJSON(value.style),
77
77
  'format': value.format,
78
- 'config': VCCredentialTypeModelDtoConfigToJSON(value.config),
78
+ 'config': VCCredentialTypeConfigDtoToJSON(value.config),
79
79
  'created_at': (value.created_at.toISOString()),
80
80
  'archived': value.archived,
81
- 'archived_at': (value.archived_at.toISOString()),
81
+ 'archived_at': (value.archived_at === null ? null : value.archived_at.toISOString()),
82
82
  };
83
83
  }
@@ -12,6 +12,8 @@
12
12
  * Do not edit the class manually.
13
13
  */
14
14
  import { exists } from '../runtime';
15
+ import { VCFilterContainsDtoFromJSON, VCFilterContainsDtoToJSON, } from './VCFilterContainsDto';
16
+ import { VCFilterItemsDtoFromJSON, VCFilterItemsDtoToJSON, } from './VCFilterItemsDto';
15
17
  import { VCFilterNotPredicateDtoFromJSON, VCFilterNotPredicateDtoToJSON, } from './VCFilterNotPredicateDto';
16
18
  /**
17
19
  * Check if a given object implements the VCFieldsDtoFilter interface.
@@ -39,6 +41,8 @@ export function VCFieldsDtoFilterFromJSONTyped(json, ignoreDiscriminator) {
39
41
  'maximum': !exists(json, 'maximum') ? undefined : json['maximum'],
40
42
  '_enum': !exists(json, 'enum') ? undefined : json['enum'],
41
43
  'not': !exists(json, 'not') ? undefined : VCFilterNotPredicateDtoFromJSON(json['not']),
44
+ 'items': !exists(json, 'items') ? undefined : VCFilterItemsDtoFromJSON(json['items']),
45
+ 'contains': !exists(json, 'contains') ? undefined : VCFilterContainsDtoFromJSON(json['contains']),
42
46
  };
43
47
  }
44
48
  export function VCFieldsDtoFilterToJSON(value) {
@@ -59,5 +63,7 @@ export function VCFieldsDtoFilterToJSON(value) {
59
63
  'maximum': value.maximum,
60
64
  'enum': value._enum,
61
65
  'not': VCFilterNotPredicateDtoToJSON(value.not),
66
+ 'items': VCFilterItemsDtoToJSON(value.items),
67
+ 'contains': VCFilterContainsDtoToJSON(value.contains),
62
68
  };
63
69
  }
@@ -0,0 +1,45 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * SVX API
5
+ * No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
6
+ *
7
+ * The version of the OpenAPI document: 2.0.0
8
+ *
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+ import { exists } from '../runtime';
15
+ /**
16
+ * Check if a given object implements the VCFilterContainsDto interface.
17
+ */
18
+ export function instanceOfVCFilterContainsDto(value) {
19
+ let isInstance = true;
20
+ return isInstance;
21
+ }
22
+ export function VCFilterContainsDtoFromJSON(json) {
23
+ return VCFilterContainsDtoFromJSONTyped(json, false);
24
+ }
25
+ export function VCFilterContainsDtoFromJSONTyped(json, ignoreDiscriminator) {
26
+ if ((json === undefined) || (json === null)) {
27
+ return json;
28
+ }
29
+ return {
30
+ 'type': !exists(json, 'type') ? undefined : json['type'],
31
+ '_const': !exists(json, 'const') ? undefined : json['const'],
32
+ };
33
+ }
34
+ export function VCFilterContainsDtoToJSON(value) {
35
+ if (value === undefined) {
36
+ return undefined;
37
+ }
38
+ if (value === null) {
39
+ return null;
40
+ }
41
+ return {
42
+ 'type': value.type,
43
+ 'const': value._const,
44
+ };
45
+ }
@@ -12,6 +12,8 @@
12
12
  * Do not edit the class manually.
13
13
  */
14
14
  import { exists } from '../runtime';
15
+ import { VCFilterContainsDtoFromJSON, VCFilterContainsDtoToJSON, } from './VCFilterContainsDto';
16
+ import { VCFilterItemsDtoFromJSON, VCFilterItemsDtoToJSON, } from './VCFilterItemsDto';
15
17
  import { VCFilterNotPredicateDtoFromJSON, VCFilterNotPredicateDtoToJSON, } from './VCFilterNotPredicateDto';
16
18
  /**
17
19
  * Check if a given object implements the VCFilterDto interface.
@@ -39,6 +41,8 @@ export function VCFilterDtoFromJSONTyped(json, ignoreDiscriminator) {
39
41
  'maximum': !exists(json, 'maximum') ? undefined : json['maximum'],
40
42
  '_enum': !exists(json, 'enum') ? undefined : json['enum'],
41
43
  'not': !exists(json, 'not') ? undefined : VCFilterNotPredicateDtoFromJSON(json['not']),
44
+ 'items': !exists(json, 'items') ? undefined : VCFilterItemsDtoFromJSON(json['items']),
45
+ 'contains': !exists(json, 'contains') ? undefined : VCFilterContainsDtoFromJSON(json['contains']),
42
46
  };
43
47
  }
44
48
  export function VCFilterDtoToJSON(value) {
@@ -59,5 +63,7 @@ export function VCFilterDtoToJSON(value) {
59
63
  'maximum': value.maximum,
60
64
  'enum': value._enum,
61
65
  'not': VCFilterNotPredicateDtoToJSON(value.not),
66
+ 'items': VCFilterItemsDtoToJSON(value.items),
67
+ 'contains': VCFilterContainsDtoToJSON(value.contains),
62
68
  };
63
69
  }
@@ -0,0 +1,43 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * SVX API
5
+ * No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
6
+ *
7
+ * The version of the OpenAPI document: 2.0.0
8
+ *
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+ /**
15
+ * Check if a given object implements the VCFilterItemsDto interface.
16
+ */
17
+ export function instanceOfVCFilterItemsDto(value) {
18
+ let isInstance = true;
19
+ isInstance = isInstance && "type" in value;
20
+ return isInstance;
21
+ }
22
+ export function VCFilterItemsDtoFromJSON(json) {
23
+ return VCFilterItemsDtoFromJSONTyped(json, false);
24
+ }
25
+ export function VCFilterItemsDtoFromJSONTyped(json, ignoreDiscriminator) {
26
+ if ((json === undefined) || (json === null)) {
27
+ return json;
28
+ }
29
+ return {
30
+ 'type': json['type'],
31
+ };
32
+ }
33
+ export function VCFilterItemsDtoToJSON(value) {
34
+ if (value === undefined) {
35
+ return undefined;
36
+ }
37
+ if (value === null) {
38
+ return null;
39
+ }
40
+ return {
41
+ 'type': value.type,
42
+ };
43
+ }
@@ -34,6 +34,7 @@ export function VCInputDescriptorDtoFromJSONTyped(json, ignoreDiscriminator) {
34
34
  'name': !exists(json, 'name') ? undefined : json['name'],
35
35
  'purpose': !exists(json, 'purpose') ? undefined : json['purpose'],
36
36
  'constraints': VCConstraintsDtoFromJSON(json['constraints']),
37
+ 'format': !exists(json, 'format') ? undefined : json['format'],
37
38
  };
38
39
  }
39
40
  export function VCInputDescriptorDtoToJSON(value) {
@@ -48,5 +49,6 @@ export function VCInputDescriptorDtoToJSON(value) {
48
49
  'name': value.name,
49
50
  'purpose': value.purpose,
50
51
  'constraints': VCConstraintsDtoToJSON(value.constraints),
52
+ 'format': value.format,
51
53
  };
52
54
  }
@@ -209,9 +209,7 @@ export * from './VCClaimsDto';
209
209
  export * from './VCCnfDto';
210
210
  export * from './VCConstraintsDto';
211
211
  export * from './VCCreateCredentialTypeConfigDto';
212
- export * from './VCCreateCredentialTypeConfigDtoExpiry';
213
212
  export * from './VCCreateCredentialTypeDto';
214
- export * from './VCCreateCredentialTypeExpiryDto';
215
213
  export * from './VCCreateCredentialTypePayloadDto';
216
214
  export * from './VCCreateCredentialTypeStyleDto';
217
215
  export * from './VCCreatePresentationDefinitionDto';
@@ -225,12 +223,7 @@ export * from './VCCredentialJSONSchemaPayloadDto';
225
223
  export * from './VCCredentialModelDto';
226
224
  export * from './VCCredentialResponseDto';
227
225
  export * from './VCCredentialTypeConfigDto';
228
- export * from './VCCredentialTypeConfigDtoExpiry';
229
- export * from './VCCredentialTypeExpiryDto';
230
226
  export * from './VCCredentialTypeModelDto';
231
- export * from './VCCredentialTypeModelDtoConfig';
232
- export * from './VCCredentialTypeModelDtoSchema';
233
- export * from './VCCredentialTypeModelDtoStyle';
234
227
  export * from './VCCredentialTypeResponseDto';
235
228
  export * from './VCCredentialTypeSchemaDto';
236
229
  export * from './VCCredentialTypeStyleDto';
@@ -243,7 +236,9 @@ export * from './VCErrorResponseDto';
243
236
  export * from './VCErrorsResponseDto';
244
237
  export * from './VCFieldsDto';
245
238
  export * from './VCFieldsDtoFilter';
239
+ export * from './VCFilterContainsDto';
246
240
  export * from './VCFilterDto';
241
+ export * from './VCFilterItemsDto';
247
242
  export * from './VCFilterNotPredicateDto';
248
243
  export * from './VCGenerateCredentialDto';
249
244
  export * from './VCGenerateCredentialDtoClaims';
@@ -167,12 +167,12 @@ export declare class VerifiableCredentialsApi extends runtime.BaseAPI {
167
167
  */
168
168
  credentialTypesPost(meecoOrganisationID: string, vCCreateCredentialTypePayloadDto: VCCreateCredentialTypePayloadDto, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<VCCredentialTypeResponseDto>;
169
169
  /**
170
- * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { Ed25519 } from \'@meeco/sdk\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = new Ed25519(hexToBytes(SEED_HEX)); <br />const signerFn = EdDSASigner(key.getSecretKey()); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
170
+ * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of credential signing in Javascript:</p><pre><code>import { Ed25519 } from \'@meeco/sdk\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = new Ed25519(hexToBytes(SEED_HEX)); <br />const signerFn = EdDSASigner(key.getSecretKey()); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
171
171
  * Generate credential based on type and claims provided
172
172
  */
173
173
  credentialsGeneratePostRaw(requestParameters: CredentialsGeneratePostRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<VCUnsignedCredentialResponseDto>>;
174
174
  /**
175
- * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { Ed25519 } from \'@meeco/sdk\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = new Ed25519(hexToBytes(SEED_HEX)); <br />const signerFn = EdDSASigner(key.getSecretKey()); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
175
+ * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of credential signing in Javascript:</p><pre><code>import { Ed25519 } from \'@meeco/sdk\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = new Ed25519(hexToBytes(SEED_HEX)); <br />const signerFn = EdDSASigner(key.getSecretKey()); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
176
176
  * Generate credential based on type and claims provided
177
177
  */
178
178
  credentialsGeneratePost(meecoOrganisationID: string, vCGenerateCredentialPayloadDto: VCGenerateCredentialPayloadDto, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<VCUnsignedCredentialResponseDto>;