@meeco/svx-api-sdk 1.0.0-stage.20231129111134.b1ab71a → 1.0.0-stage.20231218095603.d71b65e
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +8 -1
- package/lib/esm/apis/ConnectionsApi.js +5 -2
- package/lib/esm/apis/SharesApi.js +4 -4
- package/lib/esm/apis/VerifiableCredentialsApi.js +2 -2
- package/lib/esm/models/ATOMCreateOrUpdateOrgRequest.js +2 -0
- package/lib/esm/models/ATOMOrg.js +2 -0
- package/lib/esm/models/IDPClientModelDto.js +6 -0
- package/lib/esm/models/IDPCreateClientDto.js +85 -0
- package/lib/esm/models/IDPCreateClientPayloadDto.js +44 -0
- package/lib/esm/models/IDPUpdateClientDto.js +61 -0
- package/lib/esm/models/IDPUpdateClientPayloadDto.js +44 -0
- package/lib/esm/models/{VCGenerateCredentialDtoCnf.js → VCClaimsDto.js} +12 -9
- package/lib/esm/models/VCCredentialVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCFieldsDto.js +3 -2
- package/lib/esm/models/VCFieldsDtoFilter.js +48 -0
- package/lib/esm/models/VCFilterDto.js +48 -0
- package/lib/esm/models/VCGenerateCredentialDto.js +5 -5
- package/lib/esm/models/VCGenerateCredentialDtoClaims.js +40 -0
- package/lib/esm/models/VCIdTokenVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCOldPresentationRequestResponseVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCPresentationRequestResponseVerificationOptionsDto.js +2 -1
- package/lib/esm/models/VCPresentationRequestResponseVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCPresentationRequestUpdateVerificationResultRequestDto.js +2 -1
- package/lib/esm/models/VCPresentationRequestVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCPresentationVerificationOptionsDto.js +2 -1
- package/lib/esm/models/VCPresentationVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/index.js +8 -1
- package/lib/types/apis/ConnectionsApi.d.ts +2 -1
- package/lib/types/apis/SharesApi.d.ts +4 -4
- package/lib/types/apis/VerifiableCredentialsApi.d.ts +2 -2
- package/lib/types/models/ATOMCreateOrUpdateOrgRequest.d.ts +6 -0
- package/lib/types/models/ATOMOrg.d.ts +6 -0
- package/lib/types/models/IDPClientModelDto.d.ts +12 -0
- package/lib/types/models/IDPCreateClientDto.d.ts +102 -0
- package/lib/types/models/IDPCreateClientPayloadDto.d.ts +32 -0
- package/lib/types/models/IDPUpdateClientDto.d.ts +70 -0
- package/lib/types/models/IDPUpdateClientPayloadDto.d.ts +32 -0
- package/lib/types/models/VCClaimsDto.d.ts +38 -0
- package/lib/types/models/VCCredentialVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCFieldsDto.d.ts +3 -2
- package/lib/types/models/VCFieldsDtoFilter.d.ts +43 -0
- package/lib/types/models/VCFilterDto.d.ts +43 -0
- package/lib/types/models/VCGenerateCredentialDto.d.ts +6 -6
- package/lib/types/models/VCGenerateCredentialDtoClaims.d.ts +39 -0
- package/lib/types/models/VCIdTokenVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCOldPresentationRequestResponseVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCPresentationRequestResponseVerificationOptionsDto.d.ts +2 -1
- package/lib/types/models/VCPresentationRequestResponseVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCPresentationRequestUpdateVerificationResultRequestDto.d.ts +1 -0
- package/lib/types/models/VCPresentationRequestVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCPresentationVerificationOptionsDto.d.ts +1 -0
- package/lib/types/models/VCPresentationVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/index.d.ts +8 -1
- package/lib/umd/apis/ConnectionsApi.js +5 -2
- package/lib/umd/apis/SharesApi.js +4 -4
- package/lib/umd/apis/VerifiableCredentialsApi.js +2 -2
- package/lib/umd/models/ATOMCreateOrUpdateOrgRequest.js +2 -0
- package/lib/umd/models/ATOMOrg.js +2 -0
- package/lib/umd/models/IDPClientModelDto.js +6 -0
- package/lib/umd/models/IDPCreateClientDto.js +92 -0
- package/lib/umd/models/IDPCreateClientPayloadDto.js +51 -0
- package/lib/umd/models/IDPUpdateClientDto.js +68 -0
- package/lib/umd/models/IDPUpdateClientPayloadDto.js +51 -0
- package/lib/umd/models/VCClaimsDto.js +53 -0
- package/lib/umd/models/VCCredentialVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCFieldsDto.js +3 -2
- package/lib/umd/models/VCFieldsDtoFilter.js +55 -0
- package/lib/umd/models/VCFilterDto.js +55 -0
- package/lib/umd/models/VCGenerateCredentialDto.js +5 -5
- package/lib/umd/models/VCGenerateCredentialDtoClaims.js +47 -0
- package/lib/umd/models/VCIdTokenVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCOldPresentationRequestResponseVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCPresentationRequestResponseVerificationOptionsDto.js +2 -1
- package/lib/umd/models/VCPresentationRequestResponseVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCPresentationRequestUpdateVerificationResultRequestDto.js +2 -1
- package/lib/umd/models/VCPresentationRequestVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCPresentationVerificationOptionsDto.js +2 -1
- package/lib/umd/models/VCPresentationVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/index.js +8 -1
- package/package.json +1 -1
- package/lib/types/models/VCGenerateCredentialDtoCnf.d.ts +0 -31
- package/lib/umd/models/VCGenerateCredentialDtoCnf.js +0 -50
package/.openapi-generator/FILES
CHANGED
|
@@ -156,6 +156,8 @@ models/IDPAuthorisationSiopSessionRequestPayloadDto.ts
|
|
|
156
156
|
models/IDPClientModelDto.ts
|
|
157
157
|
models/IDPClientResponseDto.ts
|
|
158
158
|
models/IDPClientsResponseDto.ts
|
|
159
|
+
models/IDPCreateClientDto.ts
|
|
160
|
+
models/IDPCreateClientPayloadDto.ts
|
|
159
161
|
models/IDPCreateInvitationDto.ts
|
|
160
162
|
models/IDPCreateInvitationPayloadDto.ts
|
|
161
163
|
models/IDPEndUserInvitationResponseDto.ts
|
|
@@ -176,6 +178,8 @@ models/IDPJwtIssuerJWKSKeys.ts
|
|
|
176
178
|
models/IDPJwtIssuerResponseDto.ts
|
|
177
179
|
models/IDPLoginRequestDto.ts
|
|
178
180
|
models/IDPMeta.ts
|
|
181
|
+
models/IDPUpdateClientDto.ts
|
|
182
|
+
models/IDPUpdateClientPayloadDto.ts
|
|
179
183
|
models/IDPUserDto.ts
|
|
180
184
|
models/IDPUserResponseDto.ts
|
|
181
185
|
models/IDPWhoAmIResponseModelDto.ts
|
|
@@ -261,6 +265,7 @@ models/ShreIntentListResponse.ts
|
|
|
261
265
|
models/UpdateDelegationsRequest.ts
|
|
262
266
|
models/VCApp.ts
|
|
263
267
|
models/VCAppSignal.ts
|
|
268
|
+
models/VCClaimsDto.ts
|
|
264
269
|
models/VCCnfDto.ts
|
|
265
270
|
models/VCComponent.ts
|
|
266
271
|
models/VCConstraintsDto.ts
|
|
@@ -293,9 +298,11 @@ models/VCDatabase.ts
|
|
|
293
298
|
models/VCErrorResponseDto.ts
|
|
294
299
|
models/VCErrorsResponseDto.ts
|
|
295
300
|
models/VCFieldsDto.ts
|
|
301
|
+
models/VCFieldsDtoFilter.ts
|
|
302
|
+
models/VCFilterDto.ts
|
|
296
303
|
models/VCFormatDto.ts
|
|
297
304
|
models/VCGenerateCredentialDto.ts
|
|
298
|
-
models/
|
|
305
|
+
models/VCGenerateCredentialDtoClaims.ts
|
|
299
306
|
models/VCGenerateCredentialPayloadDto.ts
|
|
300
307
|
models/VCGeneratePresentationDto.ts
|
|
301
308
|
models/VCGeneratePresentationPayloadDto.ts
|
|
@@ -217,6 +217,9 @@ export class ConnectionsApi extends runtime.BaseAPI {
|
|
|
217
217
|
if (requestParameters.perPage !== undefined) {
|
|
218
218
|
queryParameters['per_page'] = requestParameters.perPage;
|
|
219
219
|
}
|
|
220
|
+
if (requestParameters.page !== undefined) {
|
|
221
|
+
queryParameters['page'] = requestParameters.page;
|
|
222
|
+
}
|
|
220
223
|
const headerParameters = {};
|
|
221
224
|
if (requestParameters.meecoDelegationId !== undefined && requestParameters.meecoDelegationId !== null) {
|
|
222
225
|
headerParameters['Meeco-Delegation-Id'] = String(requestParameters.meecoDelegationId);
|
|
@@ -244,9 +247,9 @@ export class ConnectionsApi extends runtime.BaseAPI {
|
|
|
244
247
|
* Retrieves invitations that the current user has created. Parameter `state` fetches invitations with a certain state. Currenty there are 6 states: * `new` * `connected` * `rejected` * `accepted` * `cancelled` * `expired` If parameter `state` is not submitted, only invitations with states `new`, `accepted` and `rejected` are fetched.
|
|
245
248
|
* List invitations
|
|
246
249
|
*/
|
|
247
|
-
invitationsGet(state, nextPageAfter, perPage, meecoDelegationId, meecoOrganisationId, initOverrides) {
|
|
250
|
+
invitationsGet(state, nextPageAfter, perPage, page, meecoDelegationId, meecoOrganisationId, initOverrides) {
|
|
248
251
|
return __awaiter(this, void 0, void 0, function* () {
|
|
249
|
-
const response = yield this.invitationsGetRaw({ state: state, nextPageAfter: nextPageAfter, perPage: perPage, meecoDelegationId: meecoDelegationId, meecoOrganisationId: meecoOrganisationId }, initOverrides);
|
|
252
|
+
const response = yield this.invitationsGetRaw({ state: state, nextPageAfter: nextPageAfter, perPage: perPage, page: page, meecoDelegationId: meecoDelegationId, meecoOrganisationId: meecoOrganisationId }, initOverrides);
|
|
250
253
|
return yield response.value();
|
|
251
254
|
});
|
|
252
255
|
}
|
|
@@ -347,7 +347,7 @@ export class SharesApi extends runtime.BaseAPI {
|
|
|
347
347
|
});
|
|
348
348
|
}
|
|
349
349
|
/**
|
|
350
|
-
* Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `
|
|
350
|
+
* Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
|
|
351
351
|
* Share your item with connected users
|
|
352
352
|
*/
|
|
353
353
|
itemsIdSharesPostRaw(requestParameters, initOverrides) {
|
|
@@ -382,7 +382,7 @@ export class SharesApi extends runtime.BaseAPI {
|
|
|
382
382
|
});
|
|
383
383
|
}
|
|
384
384
|
/**
|
|
385
|
-
* Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `
|
|
385
|
+
* Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
|
|
386
386
|
* Share your item with connected users
|
|
387
387
|
*/
|
|
388
388
|
itemsIdSharesPost(id, meecoDelegationId, meecoOrganisationId, postItemSharesRequest, initOverrides) {
|
|
@@ -392,7 +392,7 @@ export class SharesApi extends runtime.BaseAPI {
|
|
|
392
392
|
});
|
|
393
393
|
}
|
|
394
394
|
/**
|
|
395
|
-
* Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `
|
|
395
|
+
* Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
|
|
396
396
|
* Update all shares of one item
|
|
397
397
|
*/
|
|
398
398
|
itemsIdSharesPutRaw(requestParameters, initOverrides) {
|
|
@@ -427,7 +427,7 @@ export class SharesApi extends runtime.BaseAPI {
|
|
|
427
427
|
});
|
|
428
428
|
}
|
|
429
429
|
/**
|
|
430
|
-
* Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `
|
|
430
|
+
* Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
|
|
431
431
|
* Update all shares of one item
|
|
432
432
|
*/
|
|
433
433
|
itemsIdSharesPut(id, meecoDelegationId, meecoOrganisationId, putItemSharesRequest, initOverrides) {
|
|
@@ -304,7 +304,7 @@ export class VerifiableCredentialsApi extends runtime.BaseAPI {
|
|
|
304
304
|
});
|
|
305
305
|
}
|
|
306
306
|
/**
|
|
307
|
-
* <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p>
|
|
307
|
+
* <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
|
|
308
308
|
* Generate credential based on type and claims provided
|
|
309
309
|
*/
|
|
310
310
|
credentialsGeneratePostRaw(requestParameters, initOverrides) {
|
|
@@ -342,7 +342,7 @@ export class VerifiableCredentialsApi extends runtime.BaseAPI {
|
|
|
342
342
|
});
|
|
343
343
|
}
|
|
344
344
|
/**
|
|
345
|
-
* <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p>
|
|
345
|
+
* <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
|
|
346
346
|
* Generate credential based on type and claims provided
|
|
347
347
|
*/
|
|
348
348
|
credentialsGeneratePost(meecoOrganisationID, vCGenerateCredentialPayloadDto, accept, initOverrides) {
|
|
@@ -34,6 +34,7 @@ export function ATOMCreateOrUpdateOrgRequestFromJSONTyped(json, ignoreDiscrimina
|
|
|
34
34
|
'business_address': !exists(json, 'business_address') ? undefined : json['business_address'],
|
|
35
35
|
'color': !exists(json, 'color') ? undefined : json['color'],
|
|
36
36
|
'company_number': !exists(json, 'company_number') ? undefined : json['company_number'],
|
|
37
|
+
'company_url': !exists(json, 'company_url') ? undefined : json['company_url'],
|
|
37
38
|
'legal_name': !exists(json, 'legal_name') ? undefined : json['legal_name'],
|
|
38
39
|
'lei_number': !exists(json, 'lei_number') ? undefined : json['lei_number'],
|
|
39
40
|
'logo_url': !exists(json, 'logo_url') ? undefined : json['logo_url'],
|
|
@@ -56,6 +57,7 @@ export function ATOMCreateOrUpdateOrgRequestToJSON(value) {
|
|
|
56
57
|
'business_address': value.business_address,
|
|
57
58
|
'color': value.color,
|
|
58
59
|
'company_number': value.company_number,
|
|
60
|
+
'company_url': value.company_url,
|
|
59
61
|
'legal_name': value.legal_name,
|
|
60
62
|
'lei_number': value.lei_number,
|
|
61
63
|
'logo_url': value.logo_url,
|
|
@@ -38,6 +38,7 @@ export function ATOMOrgFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
38
38
|
'business_address': !exists(json, 'business_address') ? undefined : json['business_address'],
|
|
39
39
|
'color': !exists(json, 'color') ? undefined : json['color'],
|
|
40
40
|
'company_number': !exists(json, 'company_number') ? undefined : json['company_number'],
|
|
41
|
+
'company_url': !exists(json, 'company_url') ? undefined : json['company_url'],
|
|
41
42
|
'created_at': !exists(json, 'created_at') ? undefined : (new Date(json['created_at'])),
|
|
42
43
|
'id': json['id'],
|
|
43
44
|
'legal_name': !exists(json, 'legal_name') ? undefined : json['legal_name'],
|
|
@@ -66,6 +67,7 @@ export function ATOMOrgToJSON(value) {
|
|
|
66
67
|
'business_address': value.business_address,
|
|
67
68
|
'color': value.color,
|
|
68
69
|
'company_number': value.company_number,
|
|
70
|
+
'company_url': value.company_url,
|
|
69
71
|
'created_at': value.created_at === undefined ? undefined : (value.created_at.toISOString()),
|
|
70
72
|
'id': value.id,
|
|
71
73
|
'legal_name': value.legal_name,
|
|
@@ -27,6 +27,8 @@ export function instanceOfIDPClientModelDto(value) {
|
|
|
27
27
|
isInstance = isInstance && "is_active" in value;
|
|
28
28
|
isInstance = isInstance && "created_at" in value;
|
|
29
29
|
isInstance = isInstance && "updated_at" in value;
|
|
30
|
+
isInstance = isInstance && "auth_method" in value;
|
|
31
|
+
isInstance = isInstance && "application_base_url" in value;
|
|
30
32
|
return isInstance;
|
|
31
33
|
}
|
|
32
34
|
export function IDPClientModelDtoFromJSON(json) {
|
|
@@ -48,6 +50,8 @@ export function IDPClientModelDtoFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
48
50
|
'is_active': json['is_active'],
|
|
49
51
|
'created_at': (new Date(json['created_at'])),
|
|
50
52
|
'updated_at': (new Date(json['updated_at'])),
|
|
53
|
+
'auth_method': json['auth_method'],
|
|
54
|
+
'application_base_url': json['application_base_url'],
|
|
51
55
|
};
|
|
52
56
|
}
|
|
53
57
|
export function IDPClientModelDtoToJSON(value) {
|
|
@@ -69,5 +73,7 @@ export function IDPClientModelDtoToJSON(value) {
|
|
|
69
73
|
'is_active': value.is_active,
|
|
70
74
|
'created_at': (value.created_at.toISOString()),
|
|
71
75
|
'updated_at': (value.updated_at.toISOString()),
|
|
76
|
+
'auth_method': value.auth_method,
|
|
77
|
+
'application_base_url': value.application_base_url,
|
|
72
78
|
};
|
|
73
79
|
}
|
|
@@ -0,0 +1,85 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* SVX API
|
|
5
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 1.3.1
|
|
8
|
+
*
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
/**
|
|
15
|
+
* @export
|
|
16
|
+
*/
|
|
17
|
+
export const IDPCreateClientDtoTypeEnum = {
|
|
18
|
+
User: 'user',
|
|
19
|
+
Agent: 'agent'
|
|
20
|
+
};
|
|
21
|
+
/**
|
|
22
|
+
* @export
|
|
23
|
+
*/
|
|
24
|
+
export const IDPCreateClientDtoTokenEndpointAuthMethodEnum = {
|
|
25
|
+
ClientSecretBasic: 'client_secret_basic',
|
|
26
|
+
ClientSecretPost: 'client_secret_post',
|
|
27
|
+
None: 'none'
|
|
28
|
+
};
|
|
29
|
+
/**
|
|
30
|
+
* Check if a given object implements the IDPCreateClientDto interface.
|
|
31
|
+
*/
|
|
32
|
+
export function instanceOfIDPCreateClientDto(value) {
|
|
33
|
+
let isInstance = true;
|
|
34
|
+
isInstance = isInstance && "id" in value;
|
|
35
|
+
isInstance = isInstance && "name" in value;
|
|
36
|
+
isInstance = isInstance && "description" in value;
|
|
37
|
+
isInstance = isInstance && "scopes" in value;
|
|
38
|
+
isInstance = isInstance && "redirects" in value;
|
|
39
|
+
isInstance = isInstance && "logout_redirects" in value;
|
|
40
|
+
isInstance = isInstance && "type" in value;
|
|
41
|
+
isInstance = isInstance && "is_active" in value;
|
|
42
|
+
isInstance = isInstance && "application_base_url" in value;
|
|
43
|
+
isInstance = isInstance && "token_endpoint_auth_method" in value;
|
|
44
|
+
return isInstance;
|
|
45
|
+
}
|
|
46
|
+
export function IDPCreateClientDtoFromJSON(json) {
|
|
47
|
+
return IDPCreateClientDtoFromJSONTyped(json, false);
|
|
48
|
+
}
|
|
49
|
+
export function IDPCreateClientDtoFromJSONTyped(json, ignoreDiscriminator) {
|
|
50
|
+
if ((json === undefined) || (json === null)) {
|
|
51
|
+
return json;
|
|
52
|
+
}
|
|
53
|
+
return {
|
|
54
|
+
'id': json['id'],
|
|
55
|
+
'name': json['name'],
|
|
56
|
+
'description': json['description'],
|
|
57
|
+
'scopes': json['scopes'],
|
|
58
|
+
'redirects': json['redirects'],
|
|
59
|
+
'logout_redirects': json['logout_redirects'],
|
|
60
|
+
'type': json['type'],
|
|
61
|
+
'is_active': json['is_active'],
|
|
62
|
+
'application_base_url': json['application_base_url'],
|
|
63
|
+
'token_endpoint_auth_method': json['token_endpoint_auth_method'],
|
|
64
|
+
};
|
|
65
|
+
}
|
|
66
|
+
export function IDPCreateClientDtoToJSON(value) {
|
|
67
|
+
if (value === undefined) {
|
|
68
|
+
return undefined;
|
|
69
|
+
}
|
|
70
|
+
if (value === null) {
|
|
71
|
+
return null;
|
|
72
|
+
}
|
|
73
|
+
return {
|
|
74
|
+
'id': value.id,
|
|
75
|
+
'name': value.name,
|
|
76
|
+
'description': value.description,
|
|
77
|
+
'scopes': value.scopes,
|
|
78
|
+
'redirects': value.redirects,
|
|
79
|
+
'logout_redirects': value.logout_redirects,
|
|
80
|
+
'type': value.type,
|
|
81
|
+
'is_active': value.is_active,
|
|
82
|
+
'application_base_url': value.application_base_url,
|
|
83
|
+
'token_endpoint_auth_method': value.token_endpoint_auth_method,
|
|
84
|
+
};
|
|
85
|
+
}
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* SVX API
|
|
5
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 1.3.1
|
|
8
|
+
*
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
import { IDPCreateClientDtoFromJSON, IDPCreateClientDtoToJSON, } from './IDPCreateClientDto';
|
|
15
|
+
/**
|
|
16
|
+
* Check if a given object implements the IDPCreateClientPayloadDto interface.
|
|
17
|
+
*/
|
|
18
|
+
export function instanceOfIDPCreateClientPayloadDto(value) {
|
|
19
|
+
let isInstance = true;
|
|
20
|
+
isInstance = isInstance && "client" in value;
|
|
21
|
+
return isInstance;
|
|
22
|
+
}
|
|
23
|
+
export function IDPCreateClientPayloadDtoFromJSON(json) {
|
|
24
|
+
return IDPCreateClientPayloadDtoFromJSONTyped(json, false);
|
|
25
|
+
}
|
|
26
|
+
export function IDPCreateClientPayloadDtoFromJSONTyped(json, ignoreDiscriminator) {
|
|
27
|
+
if ((json === undefined) || (json === null)) {
|
|
28
|
+
return json;
|
|
29
|
+
}
|
|
30
|
+
return {
|
|
31
|
+
'client': IDPCreateClientDtoFromJSON(json['client']),
|
|
32
|
+
};
|
|
33
|
+
}
|
|
34
|
+
export function IDPCreateClientPayloadDtoToJSON(value) {
|
|
35
|
+
if (value === undefined) {
|
|
36
|
+
return undefined;
|
|
37
|
+
}
|
|
38
|
+
if (value === null) {
|
|
39
|
+
return null;
|
|
40
|
+
}
|
|
41
|
+
return {
|
|
42
|
+
'client': IDPCreateClientDtoToJSON(value.client),
|
|
43
|
+
};
|
|
44
|
+
}
|
|
@@ -0,0 +1,61 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* SVX API
|
|
5
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 1.3.1
|
|
8
|
+
*
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
import { exists } from '../runtime';
|
|
15
|
+
/**
|
|
16
|
+
* @export
|
|
17
|
+
*/
|
|
18
|
+
export const IDPUpdateClientDtoTokenEndpointAuthMethodEnum = {
|
|
19
|
+
ClientSecretBasic: 'client_secret_basic',
|
|
20
|
+
ClientSecretPost: 'client_secret_post',
|
|
21
|
+
None: 'none'
|
|
22
|
+
};
|
|
23
|
+
/**
|
|
24
|
+
* Check if a given object implements the IDPUpdateClientDto interface.
|
|
25
|
+
*/
|
|
26
|
+
export function instanceOfIDPUpdateClientDto(value) {
|
|
27
|
+
let isInstance = true;
|
|
28
|
+
return isInstance;
|
|
29
|
+
}
|
|
30
|
+
export function IDPUpdateClientDtoFromJSON(json) {
|
|
31
|
+
return IDPUpdateClientDtoFromJSONTyped(json, false);
|
|
32
|
+
}
|
|
33
|
+
export function IDPUpdateClientDtoFromJSONTyped(json, ignoreDiscriminator) {
|
|
34
|
+
if ((json === undefined) || (json === null)) {
|
|
35
|
+
return json;
|
|
36
|
+
}
|
|
37
|
+
return {
|
|
38
|
+
'scopes': !exists(json, 'scopes') ? undefined : json['scopes'],
|
|
39
|
+
'redirects': !exists(json, 'redirects') ? undefined : json['redirects'],
|
|
40
|
+
'logout_redirects': !exists(json, 'logout_redirects') ? undefined : json['logout_redirects'],
|
|
41
|
+
'is_active': !exists(json, 'is_active') ? undefined : json['is_active'],
|
|
42
|
+
'application_base_url': !exists(json, 'application_base_url') ? undefined : json['application_base_url'],
|
|
43
|
+
'token_endpoint_auth_method': !exists(json, 'token_endpoint_auth_method') ? undefined : json['token_endpoint_auth_method'],
|
|
44
|
+
};
|
|
45
|
+
}
|
|
46
|
+
export function IDPUpdateClientDtoToJSON(value) {
|
|
47
|
+
if (value === undefined) {
|
|
48
|
+
return undefined;
|
|
49
|
+
}
|
|
50
|
+
if (value === null) {
|
|
51
|
+
return null;
|
|
52
|
+
}
|
|
53
|
+
return {
|
|
54
|
+
'scopes': value.scopes,
|
|
55
|
+
'redirects': value.redirects,
|
|
56
|
+
'logout_redirects': value.logout_redirects,
|
|
57
|
+
'is_active': value.is_active,
|
|
58
|
+
'application_base_url': value.application_base_url,
|
|
59
|
+
'token_endpoint_auth_method': value.token_endpoint_auth_method,
|
|
60
|
+
};
|
|
61
|
+
}
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* SVX API
|
|
5
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 1.3.1
|
|
8
|
+
*
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
import { IDPUpdateClientDtoFromJSON, IDPUpdateClientDtoToJSON, } from './IDPUpdateClientDto';
|
|
15
|
+
/**
|
|
16
|
+
* Check if a given object implements the IDPUpdateClientPayloadDto interface.
|
|
17
|
+
*/
|
|
18
|
+
export function instanceOfIDPUpdateClientPayloadDto(value) {
|
|
19
|
+
let isInstance = true;
|
|
20
|
+
isInstance = isInstance && "client" in value;
|
|
21
|
+
return isInstance;
|
|
22
|
+
}
|
|
23
|
+
export function IDPUpdateClientPayloadDtoFromJSON(json) {
|
|
24
|
+
return IDPUpdateClientPayloadDtoFromJSONTyped(json, false);
|
|
25
|
+
}
|
|
26
|
+
export function IDPUpdateClientPayloadDtoFromJSONTyped(json, ignoreDiscriminator) {
|
|
27
|
+
if ((json === undefined) || (json === null)) {
|
|
28
|
+
return json;
|
|
29
|
+
}
|
|
30
|
+
return {
|
|
31
|
+
'client': IDPUpdateClientDtoFromJSON(json['client']),
|
|
32
|
+
};
|
|
33
|
+
}
|
|
34
|
+
export function IDPUpdateClientPayloadDtoToJSON(value) {
|
|
35
|
+
if (value === undefined) {
|
|
36
|
+
return undefined;
|
|
37
|
+
}
|
|
38
|
+
if (value === null) {
|
|
39
|
+
return null;
|
|
40
|
+
}
|
|
41
|
+
return {
|
|
42
|
+
'client': IDPUpdateClientDtoToJSON(value.client),
|
|
43
|
+
};
|
|
44
|
+
}
|
|
@@ -11,26 +11,28 @@
|
|
|
11
11
|
* https://openapi-generator.tech
|
|
12
12
|
* Do not edit the class manually.
|
|
13
13
|
*/
|
|
14
|
+
import { exists } from '../runtime';
|
|
15
|
+
import { VCCnfDtoFromJSON, VCCnfDtoToJSON, } from './VCCnfDto';
|
|
14
16
|
/**
|
|
15
|
-
* Check if a given object implements the
|
|
17
|
+
* Check if a given object implements the VCClaimsDto interface.
|
|
16
18
|
*/
|
|
17
|
-
export function
|
|
19
|
+
export function instanceOfVCClaimsDto(value) {
|
|
18
20
|
let isInstance = true;
|
|
19
|
-
isInstance = isInstance && "jwk" in value;
|
|
20
21
|
return isInstance;
|
|
21
22
|
}
|
|
22
|
-
export function
|
|
23
|
-
return
|
|
23
|
+
export function VCClaimsDtoFromJSON(json) {
|
|
24
|
+
return VCClaimsDtoFromJSONTyped(json, false);
|
|
24
25
|
}
|
|
25
|
-
export function
|
|
26
|
+
export function VCClaimsDtoFromJSONTyped(json, ignoreDiscriminator) {
|
|
26
27
|
if ((json === undefined) || (json === null)) {
|
|
27
28
|
return json;
|
|
28
29
|
}
|
|
29
30
|
return {
|
|
30
|
-
'
|
|
31
|
+
'id': !exists(json, 'id') ? undefined : json['id'],
|
|
32
|
+
'cnf': !exists(json, 'cnf') ? undefined : VCCnfDtoFromJSON(json['cnf']),
|
|
31
33
|
};
|
|
32
34
|
}
|
|
33
|
-
export function
|
|
35
|
+
export function VCClaimsDtoToJSON(value) {
|
|
34
36
|
if (value === undefined) {
|
|
35
37
|
return undefined;
|
|
36
38
|
}
|
|
@@ -38,6 +40,7 @@ export function VCGenerateCredentialDtoCnfToJSON(value) {
|
|
|
38
40
|
return null;
|
|
39
41
|
}
|
|
40
42
|
return {
|
|
41
|
-
'
|
|
43
|
+
'id': value.id,
|
|
44
|
+
'cnf': VCCnfDtoToJSON(value.cnf),
|
|
42
45
|
};
|
|
43
46
|
}
|
|
@@ -21,7 +21,8 @@ export const VCCredentialVerificationResultResponseDtoChecksEnum = {
|
|
|
21
21
|
Expiration: 'expiration',
|
|
22
22
|
Nonce: 'nonce',
|
|
23
23
|
Schema: 'schema',
|
|
24
|
-
RevocationStatus: 'revocation_status'
|
|
24
|
+
RevocationStatus: 'revocation_status',
|
|
25
|
+
Constraints: 'constraints'
|
|
25
26
|
};
|
|
26
27
|
/**
|
|
27
28
|
* Check if a given object implements the VCCredentialVerificationResultResponseDto interface.
|
|
@@ -12,6 +12,7 @@
|
|
|
12
12
|
* Do not edit the class manually.
|
|
13
13
|
*/
|
|
14
14
|
import { exists } from '../runtime';
|
|
15
|
+
import { VCFieldsDtoFilterFromJSON, VCFieldsDtoFilterToJSON, } from './VCFieldsDtoFilter';
|
|
15
16
|
/**
|
|
16
17
|
* Check if a given object implements the VCFieldsDto interface.
|
|
17
18
|
*/
|
|
@@ -30,7 +31,7 @@ export function VCFieldsDtoFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
30
31
|
return {
|
|
31
32
|
'path': json['path'],
|
|
32
33
|
'purpose': !exists(json, 'purpose') ? undefined : json['purpose'],
|
|
33
|
-
'filter': !exists(json, 'filter') ? undefined : json['filter'],
|
|
34
|
+
'filter': !exists(json, 'filter') ? undefined : VCFieldsDtoFilterFromJSON(json['filter']),
|
|
34
35
|
};
|
|
35
36
|
}
|
|
36
37
|
export function VCFieldsDtoToJSON(value) {
|
|
@@ -43,6 +44,6 @@ export function VCFieldsDtoToJSON(value) {
|
|
|
43
44
|
return {
|
|
44
45
|
'path': value.path,
|
|
45
46
|
'purpose': value.purpose,
|
|
46
|
-
'filter': value.filter,
|
|
47
|
+
'filter': VCFieldsDtoFilterToJSON(value.filter),
|
|
47
48
|
};
|
|
48
49
|
}
|
|
@@ -0,0 +1,48 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* SVX API
|
|
5
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 1.3.1
|
|
8
|
+
*
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
import { exists } from '../runtime';
|
|
15
|
+
/**
|
|
16
|
+
* Check if a given object implements the VCFieldsDtoFilter interface.
|
|
17
|
+
*/
|
|
18
|
+
export function instanceOfVCFieldsDtoFilter(value) {
|
|
19
|
+
let isInstance = true;
|
|
20
|
+
isInstance = isInstance && "type" in value;
|
|
21
|
+
return isInstance;
|
|
22
|
+
}
|
|
23
|
+
export function VCFieldsDtoFilterFromJSON(json) {
|
|
24
|
+
return VCFieldsDtoFilterFromJSONTyped(json, false);
|
|
25
|
+
}
|
|
26
|
+
export function VCFieldsDtoFilterFromJSONTyped(json, ignoreDiscriminator) {
|
|
27
|
+
if ((json === undefined) || (json === null)) {
|
|
28
|
+
return json;
|
|
29
|
+
}
|
|
30
|
+
return {
|
|
31
|
+
'type': json['type'],
|
|
32
|
+
'_const': !exists(json, 'const') ? undefined : json['const'],
|
|
33
|
+
'pattern': !exists(json, 'pattern') ? undefined : json['pattern'],
|
|
34
|
+
};
|
|
35
|
+
}
|
|
36
|
+
export function VCFieldsDtoFilterToJSON(value) {
|
|
37
|
+
if (value === undefined) {
|
|
38
|
+
return undefined;
|
|
39
|
+
}
|
|
40
|
+
if (value === null) {
|
|
41
|
+
return null;
|
|
42
|
+
}
|
|
43
|
+
return {
|
|
44
|
+
'type': value.type,
|
|
45
|
+
'const': value._const,
|
|
46
|
+
'pattern': value.pattern,
|
|
47
|
+
};
|
|
48
|
+
}
|
|
@@ -0,0 +1,48 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* SVX API
|
|
5
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 1.3.1
|
|
8
|
+
*
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
import { exists } from '../runtime';
|
|
15
|
+
/**
|
|
16
|
+
* Check if a given object implements the VCFilterDto interface.
|
|
17
|
+
*/
|
|
18
|
+
export function instanceOfVCFilterDto(value) {
|
|
19
|
+
let isInstance = true;
|
|
20
|
+
isInstance = isInstance && "type" in value;
|
|
21
|
+
return isInstance;
|
|
22
|
+
}
|
|
23
|
+
export function VCFilterDtoFromJSON(json) {
|
|
24
|
+
return VCFilterDtoFromJSONTyped(json, false);
|
|
25
|
+
}
|
|
26
|
+
export function VCFilterDtoFromJSONTyped(json, ignoreDiscriminator) {
|
|
27
|
+
if ((json === undefined) || (json === null)) {
|
|
28
|
+
return json;
|
|
29
|
+
}
|
|
30
|
+
return {
|
|
31
|
+
'type': json['type'],
|
|
32
|
+
'_const': !exists(json, 'const') ? undefined : json['const'],
|
|
33
|
+
'pattern': !exists(json, 'pattern') ? undefined : json['pattern'],
|
|
34
|
+
};
|
|
35
|
+
}
|
|
36
|
+
export function VCFilterDtoToJSON(value) {
|
|
37
|
+
if (value === undefined) {
|
|
38
|
+
return undefined;
|
|
39
|
+
}
|
|
40
|
+
if (value === null) {
|
|
41
|
+
return null;
|
|
42
|
+
}
|
|
43
|
+
return {
|
|
44
|
+
'type': value.type,
|
|
45
|
+
'const': value._const,
|
|
46
|
+
'pattern': value.pattern,
|
|
47
|
+
};
|
|
48
|
+
}
|