@meeco/svx-api-sdk 1.0.0-stage.20231129111134.b1ab71a → 1.0.0-stage.20231218095603.d71b65e

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (82) hide show
  1. package/.openapi-generator/FILES +8 -1
  2. package/lib/esm/apis/ConnectionsApi.js +5 -2
  3. package/lib/esm/apis/SharesApi.js +4 -4
  4. package/lib/esm/apis/VerifiableCredentialsApi.js +2 -2
  5. package/lib/esm/models/ATOMCreateOrUpdateOrgRequest.js +2 -0
  6. package/lib/esm/models/ATOMOrg.js +2 -0
  7. package/lib/esm/models/IDPClientModelDto.js +6 -0
  8. package/lib/esm/models/IDPCreateClientDto.js +85 -0
  9. package/lib/esm/models/IDPCreateClientPayloadDto.js +44 -0
  10. package/lib/esm/models/IDPUpdateClientDto.js +61 -0
  11. package/lib/esm/models/IDPUpdateClientPayloadDto.js +44 -0
  12. package/lib/esm/models/{VCGenerateCredentialDtoCnf.js → VCClaimsDto.js} +12 -9
  13. package/lib/esm/models/VCCredentialVerificationResultResponseDto.js +2 -1
  14. package/lib/esm/models/VCFieldsDto.js +3 -2
  15. package/lib/esm/models/VCFieldsDtoFilter.js +48 -0
  16. package/lib/esm/models/VCFilterDto.js +48 -0
  17. package/lib/esm/models/VCGenerateCredentialDto.js +5 -5
  18. package/lib/esm/models/VCGenerateCredentialDtoClaims.js +40 -0
  19. package/lib/esm/models/VCIdTokenVerificationResultResponseDto.js +2 -1
  20. package/lib/esm/models/VCOldPresentationRequestResponseVerificationResultResponseDto.js +2 -1
  21. package/lib/esm/models/VCPresentationRequestResponseVerificationOptionsDto.js +2 -1
  22. package/lib/esm/models/VCPresentationRequestResponseVerificationResultResponseDto.js +2 -1
  23. package/lib/esm/models/VCPresentationRequestUpdateVerificationResultRequestDto.js +2 -1
  24. package/lib/esm/models/VCPresentationRequestVerificationResultResponseDto.js +2 -1
  25. package/lib/esm/models/VCPresentationVerificationOptionsDto.js +2 -1
  26. package/lib/esm/models/VCPresentationVerificationResultResponseDto.js +2 -1
  27. package/lib/esm/models/index.js +8 -1
  28. package/lib/types/apis/ConnectionsApi.d.ts +2 -1
  29. package/lib/types/apis/SharesApi.d.ts +4 -4
  30. package/lib/types/apis/VerifiableCredentialsApi.d.ts +2 -2
  31. package/lib/types/models/ATOMCreateOrUpdateOrgRequest.d.ts +6 -0
  32. package/lib/types/models/ATOMOrg.d.ts +6 -0
  33. package/lib/types/models/IDPClientModelDto.d.ts +12 -0
  34. package/lib/types/models/IDPCreateClientDto.d.ts +102 -0
  35. package/lib/types/models/IDPCreateClientPayloadDto.d.ts +32 -0
  36. package/lib/types/models/IDPUpdateClientDto.d.ts +70 -0
  37. package/lib/types/models/IDPUpdateClientPayloadDto.d.ts +32 -0
  38. package/lib/types/models/VCClaimsDto.d.ts +38 -0
  39. package/lib/types/models/VCCredentialVerificationResultResponseDto.d.ts +1 -0
  40. package/lib/types/models/VCFieldsDto.d.ts +3 -2
  41. package/lib/types/models/VCFieldsDtoFilter.d.ts +43 -0
  42. package/lib/types/models/VCFilterDto.d.ts +43 -0
  43. package/lib/types/models/VCGenerateCredentialDto.d.ts +6 -6
  44. package/lib/types/models/VCGenerateCredentialDtoClaims.d.ts +39 -0
  45. package/lib/types/models/VCIdTokenVerificationResultResponseDto.d.ts +1 -0
  46. package/lib/types/models/VCOldPresentationRequestResponseVerificationResultResponseDto.d.ts +1 -0
  47. package/lib/types/models/VCPresentationRequestResponseVerificationOptionsDto.d.ts +2 -1
  48. package/lib/types/models/VCPresentationRequestResponseVerificationResultResponseDto.d.ts +1 -0
  49. package/lib/types/models/VCPresentationRequestUpdateVerificationResultRequestDto.d.ts +1 -0
  50. package/lib/types/models/VCPresentationRequestVerificationResultResponseDto.d.ts +1 -0
  51. package/lib/types/models/VCPresentationVerificationOptionsDto.d.ts +1 -0
  52. package/lib/types/models/VCPresentationVerificationResultResponseDto.d.ts +1 -0
  53. package/lib/types/models/index.d.ts +8 -1
  54. package/lib/umd/apis/ConnectionsApi.js +5 -2
  55. package/lib/umd/apis/SharesApi.js +4 -4
  56. package/lib/umd/apis/VerifiableCredentialsApi.js +2 -2
  57. package/lib/umd/models/ATOMCreateOrUpdateOrgRequest.js +2 -0
  58. package/lib/umd/models/ATOMOrg.js +2 -0
  59. package/lib/umd/models/IDPClientModelDto.js +6 -0
  60. package/lib/umd/models/IDPCreateClientDto.js +92 -0
  61. package/lib/umd/models/IDPCreateClientPayloadDto.js +51 -0
  62. package/lib/umd/models/IDPUpdateClientDto.js +68 -0
  63. package/lib/umd/models/IDPUpdateClientPayloadDto.js +51 -0
  64. package/lib/umd/models/VCClaimsDto.js +53 -0
  65. package/lib/umd/models/VCCredentialVerificationResultResponseDto.js +2 -1
  66. package/lib/umd/models/VCFieldsDto.js +3 -2
  67. package/lib/umd/models/VCFieldsDtoFilter.js +55 -0
  68. package/lib/umd/models/VCFilterDto.js +55 -0
  69. package/lib/umd/models/VCGenerateCredentialDto.js +5 -5
  70. package/lib/umd/models/VCGenerateCredentialDtoClaims.js +47 -0
  71. package/lib/umd/models/VCIdTokenVerificationResultResponseDto.js +2 -1
  72. package/lib/umd/models/VCOldPresentationRequestResponseVerificationResultResponseDto.js +2 -1
  73. package/lib/umd/models/VCPresentationRequestResponseVerificationOptionsDto.js +2 -1
  74. package/lib/umd/models/VCPresentationRequestResponseVerificationResultResponseDto.js +2 -1
  75. package/lib/umd/models/VCPresentationRequestUpdateVerificationResultRequestDto.js +2 -1
  76. package/lib/umd/models/VCPresentationRequestVerificationResultResponseDto.js +2 -1
  77. package/lib/umd/models/VCPresentationVerificationOptionsDto.js +2 -1
  78. package/lib/umd/models/VCPresentationVerificationResultResponseDto.js +2 -1
  79. package/lib/umd/models/index.js +8 -1
  80. package/package.json +1 -1
  81. package/lib/types/models/VCGenerateCredentialDtoCnf.d.ts +0 -31
  82. package/lib/umd/models/VCGenerateCredentialDtoCnf.js +0 -50
@@ -12,7 +12,7 @@
12
12
  * Do not edit the class manually.
13
13
  */
14
14
  import { exists } from '../runtime';
15
- import { VCGenerateCredentialDtoCnfFromJSON, VCGenerateCredentialDtoCnfToJSON, } from './VCGenerateCredentialDtoCnf';
15
+ import { VCGenerateCredentialDtoClaimsFromJSON, VCGenerateCredentialDtoClaimsToJSON, } from './VCGenerateCredentialDtoClaims';
16
16
  /**
17
17
  * Check if a given object implements the VCGenerateCredentialDto interface.
18
18
  */
@@ -33,10 +33,10 @@ export function VCGenerateCredentialDtoFromJSONTyped(json, ignoreDiscriminator)
33
33
  return {
34
34
  'credential_type_id': json['credential_type_id'],
35
35
  'issuer': json['issuer'],
36
- 'claims': json['claims'],
36
+ 'claims': VCGenerateCredentialDtoClaimsFromJSON(json['claims']),
37
37
  'revocable': !exists(json, 'revocable') ? undefined : json['revocable'],
38
38
  'expires_at': !exists(json, 'expires_at') ? undefined : (new Date(json['expires_at'])),
39
- 'cnf': !exists(json, 'cnf') ? undefined : VCGenerateCredentialDtoCnfFromJSON(json['cnf']),
39
+ 'type': !exists(json, 'type') ? undefined : json['type'],
40
40
  };
41
41
  }
42
42
  export function VCGenerateCredentialDtoToJSON(value) {
@@ -49,9 +49,9 @@ export function VCGenerateCredentialDtoToJSON(value) {
49
49
  return {
50
50
  'credential_type_id': value.credential_type_id,
51
51
  'issuer': value.issuer,
52
- 'claims': value.claims,
52
+ 'claims': VCGenerateCredentialDtoClaimsToJSON(value.claims),
53
53
  'revocable': value.revocable,
54
54
  'expires_at': value.expires_at === undefined ? undefined : (value.expires_at.toISOString()),
55
- 'cnf': VCGenerateCredentialDtoCnfToJSON(value.cnf),
55
+ 'type': value.type,
56
56
  };
57
57
  }
@@ -0,0 +1,40 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * SVX API
5
+ * No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
6
+ *
7
+ * The version of the OpenAPI document: 1.3.1
8
+ *
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+ import { exists } from '../runtime';
15
+ import { VCCnfDtoFromJSON, VCCnfDtoToJSON, } from './VCCnfDto';
16
+ /**
17
+ * Check if a given object implements the VCGenerateCredentialDtoClaims interface.
18
+ */
19
+ export function instanceOfVCGenerateCredentialDtoClaims(value) {
20
+ let isInstance = true;
21
+ return isInstance;
22
+ }
23
+ export function VCGenerateCredentialDtoClaimsFromJSON(json) {
24
+ return VCGenerateCredentialDtoClaimsFromJSONTyped(json, false);
25
+ }
26
+ export function VCGenerateCredentialDtoClaimsFromJSONTyped(json, ignoreDiscriminator) {
27
+ if ((json === undefined) || (json === null)) {
28
+ return json;
29
+ }
30
+ return Object.assign(Object.assign({}, json), { 'id': !exists(json, 'id') ? undefined : json['id'], 'cnf': !exists(json, 'cnf') ? undefined : VCCnfDtoFromJSON(json['cnf']) });
31
+ }
32
+ export function VCGenerateCredentialDtoClaimsToJSON(value) {
33
+ if (value === undefined) {
34
+ return undefined;
35
+ }
36
+ if (value === null) {
37
+ return null;
38
+ }
39
+ return Object.assign(Object.assign({}, value), { 'id': value.id, 'cnf': VCCnfDtoToJSON(value.cnf) });
40
+ }
@@ -21,7 +21,8 @@ export const VCIdTokenVerificationResultResponseDtoChecksEnum = {
21
21
  Expiration: 'expiration',
22
22
  Nonce: 'nonce',
23
23
  Schema: 'schema',
24
- RevocationStatus: 'revocation_status'
24
+ RevocationStatus: 'revocation_status',
25
+ Constraints: 'constraints'
25
26
  };
26
27
  /**
27
28
  * Check if a given object implements the VCIdTokenVerificationResultResponseDto interface.
@@ -21,7 +21,8 @@ export const VCOldPresentationRequestResponseVerificationResultResponseDtoChecks
21
21
  Expiration: 'expiration',
22
22
  Nonce: 'nonce',
23
23
  Schema: 'schema',
24
- RevocationStatus: 'revocation_status'
24
+ RevocationStatus: 'revocation_status',
25
+ Constraints: 'constraints'
25
26
  };
26
27
  /**
27
28
  * Check if a given object implements the VCOldPresentationRequestResponseVerificationResultResponseDto interface.
@@ -19,7 +19,8 @@ import { VCRequestVerificationOptionsDtoFromJSON, VCRequestVerificationOptionsDt
19
19
  * @export
20
20
  */
21
21
  export const VCPresentationRequestResponseVerificationOptionsDtoChecksEnum = {
22
- Format: 'format'
22
+ Format: 'format',
23
+ Constraints: 'constraints'
23
24
  };
24
25
  /**
25
26
  * Check if a given object implements the VCPresentationRequestResponseVerificationOptionsDto interface.
@@ -24,7 +24,8 @@ export const VCPresentationRequestResponseVerificationResultResponseDtoChecksEnu
24
24
  Expiration: 'expiration',
25
25
  Nonce: 'nonce',
26
26
  Schema: 'schema',
27
- RevocationStatus: 'revocation_status'
27
+ RevocationStatus: 'revocation_status',
28
+ Constraints: 'constraints'
28
29
  };
29
30
  /**
30
31
  * Check if a given object implements the VCPresentationRequestResponseVerificationResultResponseDto interface.
@@ -24,7 +24,8 @@ export const VCPresentationRequestUpdateVerificationResultRequestDtoChecksEnum =
24
24
  Expiration: 'expiration',
25
25
  Nonce: 'nonce',
26
26
  Schema: 'schema',
27
- RevocationStatus: 'revocation_status'
27
+ RevocationStatus: 'revocation_status',
28
+ Constraints: 'constraints'
28
29
  };
29
30
  /**
30
31
  * Check if a given object implements the VCPresentationRequestUpdateVerificationResultRequestDto interface.
@@ -21,7 +21,8 @@ export const VCPresentationRequestVerificationResultResponseDtoChecksEnum = {
21
21
  Expiration: 'expiration',
22
22
  Nonce: 'nonce',
23
23
  Schema: 'schema',
24
- RevocationStatus: 'revocation_status'
24
+ RevocationStatus: 'revocation_status',
25
+ Constraints: 'constraints'
25
26
  };
26
27
  /**
27
28
  * Check if a given object implements the VCPresentationRequestVerificationResultResponseDto interface.
@@ -19,7 +19,8 @@ export const VCPresentationVerificationOptionsDtoChecksEnum = {
19
19
  Format: 'format',
20
20
  Signature: 'signature',
21
21
  Expiration: 'expiration',
22
- Nonce: 'nonce'
22
+ Nonce: 'nonce',
23
+ Constraints: 'constraints'
23
24
  };
24
25
  /**
25
26
  * Check if a given object implements the VCPresentationVerificationOptionsDto interface.
@@ -22,7 +22,8 @@ export const VCPresentationVerificationResultResponseDtoChecksEnum = {
22
22
  Expiration: 'expiration',
23
23
  Nonce: 'nonce',
24
24
  Schema: 'schema',
25
- RevocationStatus: 'revocation_status'
25
+ RevocationStatus: 'revocation_status',
26
+ Constraints: 'constraints'
26
27
  };
27
28
  /**
28
29
  * Check if a given object implements the VCPresentationVerificationResultResponseDto interface.
@@ -139,6 +139,8 @@ export * from './IDPAuthorisationSiopSessionRequestPayloadDto';
139
139
  export * from './IDPClientModelDto';
140
140
  export * from './IDPClientResponseDto';
141
141
  export * from './IDPClientsResponseDto';
142
+ export * from './IDPCreateClientDto';
143
+ export * from './IDPCreateClientPayloadDto';
142
144
  export * from './IDPCreateInvitationDto';
143
145
  export * from './IDPCreateInvitationPayloadDto';
144
146
  export * from './IDPEndUserInvitationResponseDto';
@@ -159,6 +161,8 @@ export * from './IDPJwtIssuerJWKSKeys';
159
161
  export * from './IDPJwtIssuerResponseDto';
160
162
  export * from './IDPLoginRequestDto';
161
163
  export * from './IDPMeta';
164
+ export * from './IDPUpdateClientDto';
165
+ export * from './IDPUpdateClientPayloadDto';
162
166
  export * from './IDPUserDto';
163
167
  export * from './IDPUserResponseDto';
164
168
  export * from './IDPWhoAmIResponseModelDto';
@@ -244,6 +248,7 @@ export * from './ShreIntentListResponse';
244
248
  export * from './UpdateDelegationsRequest';
245
249
  export * from './VCApp';
246
250
  export * from './VCAppSignal';
251
+ export * from './VCClaimsDto';
247
252
  export * from './VCCnfDto';
248
253
  export * from './VCComponent';
249
254
  export * from './VCConstraintsDto';
@@ -276,9 +281,11 @@ export * from './VCDatabase';
276
281
  export * from './VCErrorResponseDto';
277
282
  export * from './VCErrorsResponseDto';
278
283
  export * from './VCFieldsDto';
284
+ export * from './VCFieldsDtoFilter';
285
+ export * from './VCFilterDto';
279
286
  export * from './VCFormatDto';
280
287
  export * from './VCGenerateCredentialDto';
281
- export * from './VCGenerateCredentialDtoCnf';
288
+ export * from './VCGenerateCredentialDtoClaims';
282
289
  export * from './VCGenerateCredentialPayloadDto';
283
290
  export * from './VCGeneratePresentationDto';
284
291
  export * from './VCGeneratePresentationPayloadDto';
@@ -38,6 +38,7 @@ export interface InvitationsGetRequest {
38
38
  state?: string;
39
39
  nextPageAfter?: string;
40
40
  perPage?: number;
41
+ page?: number;
41
42
  meecoDelegationId?: string;
42
43
  meecoOrganisationId?: string;
43
44
  }
@@ -127,7 +128,7 @@ export declare class ConnectionsApi extends runtime.BaseAPI {
127
128
  * Retrieves invitations that the current user has created. Parameter `state` fetches invitations with a certain state. Currenty there are 6 states: * `new` * `connected` * `rejected` * `accepted` * `cancelled` * `expired` If parameter `state` is not submitted, only invitations with states `new`, `accepted` and `rejected` are fetched.
128
129
  * List invitations
129
130
  */
130
- invitationsGet(state?: string, nextPageAfter?: string, perPage?: number, meecoDelegationId?: string, meecoOrganisationId?: string, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<InvitationsResponse>;
131
+ invitationsGet(state?: string, nextPageAfter?: string, perPage?: number, page?: number, meecoDelegationId?: string, meecoOrganisationId?: string, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<InvitationsResponse>;
131
132
  /**
132
133
  * Delete an invitation by its token or ID. Only the user who created the invitation may delete it.
133
134
  * Delete an invitation
@@ -183,22 +183,22 @@ export declare class SharesApi extends runtime.BaseAPI {
183
183
  */
184
184
  itemsIdSharesGet(id: string, meecoDelegationId?: string, meecoOrganisationId?: string, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<GetItemSharesResponse>;
185
185
  /**
186
- * Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `encrypted_value_verification_key` when creating or updating the share. When other senders create a share, `encrypted_value_verification_key` must be `NULL`. `value_verification_hash` may and should be sent by every sender, owner or not, because `value_verification_hash` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
186
+ * Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
187
187
  * Share your item with connected users
188
188
  */
189
189
  itemsIdSharesPostRaw(requestParameters: ItemsIdSharesPostRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<VaultSharesCreateResponse>>;
190
190
  /**
191
- * Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `encrypted_value_verification_key` when creating or updating the share. When other senders create a share, `encrypted_value_verification_key` must be `NULL`. `value_verification_hash` may and should be sent by every sender, owner or not, because `value_verification_hash` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
191
+ * Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
192
192
  * Share your item with connected users
193
193
  */
194
194
  itemsIdSharesPost(id: string, meecoDelegationId?: string, meecoOrganisationId?: string, postItemSharesRequest?: PostItemSharesRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<VaultSharesCreateResponse>;
195
195
  /**
196
- * Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `encrypted_value_verification_key` when creating or updating the share. When other senders create a share, `encrypted_value_verification_key` must be `NULL`. `value_verification_hash` may and should be sent by every sender, owner or not, because `value_verification_hash` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
196
+ * Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
197
197
  * Update all shares of one item
198
198
  */
199
199
  itemsIdSharesPutRaw(requestParameters: ItemsIdSharesPutRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<ItemSharesUpdateResponse>>;
200
200
  /**
201
- * Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `encrypted_value_verification_key` when creating or updating the share. When other senders create a share, `encrypted_value_verification_key` must be `NULL`. `value_verification_hash` may and should be sent by every sender, owner or not, because `value_verification_hash` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
201
+ * Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
202
202
  * Update all shares of one item
203
203
  */
204
204
  itemsIdSharesPut(id: string, meecoDelegationId?: string, meecoOrganisationId?: string, putItemSharesRequest?: PutItemSharesRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<ItemSharesUpdateResponse>;
@@ -162,12 +162,12 @@ export declare class VerifiableCredentialsApi extends runtime.BaseAPI {
162
162
  */
163
163
  credentialTypesPost(meecoOrganisationID: string, vCCreateCredentialTypePayloadDto: VCCreateCredentialTypePayloadDto, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<VCCredentialTypeResponseDto>;
164
164
  /**
165
- * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p>
165
+ * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
166
166
  * Generate credential based on type and claims provided
167
167
  */
168
168
  credentialsGeneratePostRaw(requestParameters: CredentialsGeneratePostRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<VCUnsignedCredentialResponseDto>>;
169
169
  /**
170
- * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p>
170
+ * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
171
171
  * Generate credential based on type and claims provided
172
172
  */
173
173
  credentialsGeneratePost(meecoOrganisationID: string, vCGenerateCredentialPayloadDto: VCGenerateCredentialPayloadDto, accept?: CredentialsGeneratePostAcceptEnum, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<VCUnsignedCredentialResponseDto>;
@@ -51,6 +51,12 @@ export interface ATOMCreateOrUpdateOrgRequest {
51
51
  * @memberof ATOMCreateOrUpdateOrgRequest
52
52
  */
53
53
  company_number?: string;
54
+ /**
55
+ * URL of the company
56
+ * @type {string}
57
+ * @memberof ATOMCreateOrUpdateOrgRequest
58
+ */
59
+ company_url?: string | null;
54
60
  /**
55
61
  * Legal number
56
62
  * @type {string}
@@ -57,6 +57,12 @@ export interface ATOMOrg {
57
57
  * @memberof ATOMOrg
58
58
  */
59
59
  company_number?: string | null;
60
+ /**
61
+ * URL of the company
62
+ * @type {string}
63
+ * @memberof ATOMOrg
64
+ */
65
+ company_url?: string | null;
60
66
  /**
61
67
  * When the organisation was created
62
68
  * @type {Date}
@@ -81,6 +81,18 @@ export interface IDPClientModelDto {
81
81
  * @memberof IDPClientModelDto
82
82
  */
83
83
  updated_at: Date;
84
+ /**
85
+ *
86
+ * @type {string}
87
+ * @memberof IDPClientModelDto
88
+ */
89
+ auth_method: string;
90
+ /**
91
+ *
92
+ * @type {string}
93
+ * @memberof IDPClientModelDto
94
+ */
95
+ application_base_url: string;
84
96
  }
85
97
  /**
86
98
  * Check if a given object implements the IDPClientModelDto interface.
@@ -0,0 +1,102 @@
1
+ /**
2
+ * SVX API
3
+ * No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
4
+ *
5
+ * The version of the OpenAPI document: 1.3.1
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ /**
13
+ *
14
+ * @export
15
+ * @interface IDPCreateClientDto
16
+ */
17
+ export interface IDPCreateClientDto {
18
+ /**
19
+ *
20
+ * @type {string}
21
+ * @memberof IDPCreateClientDto
22
+ */
23
+ id: string;
24
+ /**
25
+ *
26
+ * @type {string}
27
+ * @memberof IDPCreateClientDto
28
+ */
29
+ name: string;
30
+ /**
31
+ *
32
+ * @type {string}
33
+ * @memberof IDPCreateClientDto
34
+ */
35
+ description: string;
36
+ /**
37
+ *
38
+ * @type {string}
39
+ * @memberof IDPCreateClientDto
40
+ */
41
+ scopes: string;
42
+ /**
43
+ *
44
+ * @type {Array<string>}
45
+ * @memberof IDPCreateClientDto
46
+ */
47
+ redirects: Array<string>;
48
+ /**
49
+ *
50
+ * @type {Array<string>}
51
+ * @memberof IDPCreateClientDto
52
+ */
53
+ logout_redirects: Array<string>;
54
+ /**
55
+ *
56
+ * @type {string}
57
+ * @memberof IDPCreateClientDto
58
+ */
59
+ type: IDPCreateClientDtoTypeEnum;
60
+ /**
61
+ *
62
+ * @type {boolean}
63
+ * @memberof IDPCreateClientDto
64
+ */
65
+ is_active: boolean;
66
+ /**
67
+ *
68
+ * @type {string}
69
+ * @memberof IDPCreateClientDto
70
+ */
71
+ application_base_url: string;
72
+ /**
73
+ *
74
+ * @type {string}
75
+ * @memberof IDPCreateClientDto
76
+ */
77
+ token_endpoint_auth_method: IDPCreateClientDtoTokenEndpointAuthMethodEnum;
78
+ }
79
+ /**
80
+ * @export
81
+ */
82
+ export declare const IDPCreateClientDtoTypeEnum: {
83
+ readonly User: "user";
84
+ readonly Agent: "agent";
85
+ };
86
+ export type IDPCreateClientDtoTypeEnum = typeof IDPCreateClientDtoTypeEnum[keyof typeof IDPCreateClientDtoTypeEnum];
87
+ /**
88
+ * @export
89
+ */
90
+ export declare const IDPCreateClientDtoTokenEndpointAuthMethodEnum: {
91
+ readonly ClientSecretBasic: "client_secret_basic";
92
+ readonly ClientSecretPost: "client_secret_post";
93
+ readonly None: "none";
94
+ };
95
+ export type IDPCreateClientDtoTokenEndpointAuthMethodEnum = typeof IDPCreateClientDtoTokenEndpointAuthMethodEnum[keyof typeof IDPCreateClientDtoTokenEndpointAuthMethodEnum];
96
+ /**
97
+ * Check if a given object implements the IDPCreateClientDto interface.
98
+ */
99
+ export declare function instanceOfIDPCreateClientDto(value: object): boolean;
100
+ export declare function IDPCreateClientDtoFromJSON(json: any): IDPCreateClientDto;
101
+ export declare function IDPCreateClientDtoFromJSONTyped(json: any, ignoreDiscriminator: boolean): IDPCreateClientDto;
102
+ export declare function IDPCreateClientDtoToJSON(value?: IDPCreateClientDto | null): any;
@@ -0,0 +1,32 @@
1
+ /**
2
+ * SVX API
3
+ * No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
4
+ *
5
+ * The version of the OpenAPI document: 1.3.1
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ import type { IDPCreateClientDto } from './IDPCreateClientDto';
13
+ /**
14
+ *
15
+ * @export
16
+ * @interface IDPCreateClientPayloadDto
17
+ */
18
+ export interface IDPCreateClientPayloadDto {
19
+ /**
20
+ *
21
+ * @type {IDPCreateClientDto}
22
+ * @memberof IDPCreateClientPayloadDto
23
+ */
24
+ client: IDPCreateClientDto;
25
+ }
26
+ /**
27
+ * Check if a given object implements the IDPCreateClientPayloadDto interface.
28
+ */
29
+ export declare function instanceOfIDPCreateClientPayloadDto(value: object): boolean;
30
+ export declare function IDPCreateClientPayloadDtoFromJSON(json: any): IDPCreateClientPayloadDto;
31
+ export declare function IDPCreateClientPayloadDtoFromJSONTyped(json: any, ignoreDiscriminator: boolean): IDPCreateClientPayloadDto;
32
+ export declare function IDPCreateClientPayloadDtoToJSON(value?: IDPCreateClientPayloadDto | null): any;
@@ -0,0 +1,70 @@
1
+ /**
2
+ * SVX API
3
+ * No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
4
+ *
5
+ * The version of the OpenAPI document: 1.3.1
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ /**
13
+ *
14
+ * @export
15
+ * @interface IDPUpdateClientDto
16
+ */
17
+ export interface IDPUpdateClientDto {
18
+ /**
19
+ *
20
+ * @type {string}
21
+ * @memberof IDPUpdateClientDto
22
+ */
23
+ scopes?: string;
24
+ /**
25
+ *
26
+ * @type {Array<string>}
27
+ * @memberof IDPUpdateClientDto
28
+ */
29
+ redirects?: Array<string>;
30
+ /**
31
+ *
32
+ * @type {Array<string>}
33
+ * @memberof IDPUpdateClientDto
34
+ */
35
+ logout_redirects?: Array<string>;
36
+ /**
37
+ *
38
+ * @type {boolean}
39
+ * @memberof IDPUpdateClientDto
40
+ */
41
+ is_active?: boolean;
42
+ /**
43
+ *
44
+ * @type {string}
45
+ * @memberof IDPUpdateClientDto
46
+ */
47
+ application_base_url?: string;
48
+ /**
49
+ *
50
+ * @type {string}
51
+ * @memberof IDPUpdateClientDto
52
+ */
53
+ token_endpoint_auth_method?: IDPUpdateClientDtoTokenEndpointAuthMethodEnum;
54
+ }
55
+ /**
56
+ * @export
57
+ */
58
+ export declare const IDPUpdateClientDtoTokenEndpointAuthMethodEnum: {
59
+ readonly ClientSecretBasic: "client_secret_basic";
60
+ readonly ClientSecretPost: "client_secret_post";
61
+ readonly None: "none";
62
+ };
63
+ export type IDPUpdateClientDtoTokenEndpointAuthMethodEnum = typeof IDPUpdateClientDtoTokenEndpointAuthMethodEnum[keyof typeof IDPUpdateClientDtoTokenEndpointAuthMethodEnum];
64
+ /**
65
+ * Check if a given object implements the IDPUpdateClientDto interface.
66
+ */
67
+ export declare function instanceOfIDPUpdateClientDto(value: object): boolean;
68
+ export declare function IDPUpdateClientDtoFromJSON(json: any): IDPUpdateClientDto;
69
+ export declare function IDPUpdateClientDtoFromJSONTyped(json: any, ignoreDiscriminator: boolean): IDPUpdateClientDto;
70
+ export declare function IDPUpdateClientDtoToJSON(value?: IDPUpdateClientDto | null): any;
@@ -0,0 +1,32 @@
1
+ /**
2
+ * SVX API
3
+ * No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
4
+ *
5
+ * The version of the OpenAPI document: 1.3.1
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ import type { IDPUpdateClientDto } from './IDPUpdateClientDto';
13
+ /**
14
+ *
15
+ * @export
16
+ * @interface IDPUpdateClientPayloadDto
17
+ */
18
+ export interface IDPUpdateClientPayloadDto {
19
+ /**
20
+ *
21
+ * @type {IDPUpdateClientDto}
22
+ * @memberof IDPUpdateClientPayloadDto
23
+ */
24
+ client: IDPUpdateClientDto;
25
+ }
26
+ /**
27
+ * Check if a given object implements the IDPUpdateClientPayloadDto interface.
28
+ */
29
+ export declare function instanceOfIDPUpdateClientPayloadDto(value: object): boolean;
30
+ export declare function IDPUpdateClientPayloadDtoFromJSON(json: any): IDPUpdateClientPayloadDto;
31
+ export declare function IDPUpdateClientPayloadDtoFromJSONTyped(json: any, ignoreDiscriminator: boolean): IDPUpdateClientPayloadDto;
32
+ export declare function IDPUpdateClientPayloadDtoToJSON(value?: IDPUpdateClientPayloadDto | null): any;
@@ -0,0 +1,38 @@
1
+ /**
2
+ * SVX API
3
+ * No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
4
+ *
5
+ * The version of the OpenAPI document: 1.3.1
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ import type { VCCnfDto } from './VCCnfDto';
13
+ /**
14
+ *
15
+ * @export
16
+ * @interface VCClaimsDto
17
+ */
18
+ export interface VCClaimsDto {
19
+ /**
20
+ *
21
+ * @type {string}
22
+ * @memberof VCClaimsDto
23
+ */
24
+ id?: string;
25
+ /**
26
+ *
27
+ * @type {VCCnfDto}
28
+ * @memberof VCClaimsDto
29
+ */
30
+ cnf?: VCCnfDto;
31
+ }
32
+ /**
33
+ * Check if a given object implements the VCClaimsDto interface.
34
+ */
35
+ export declare function instanceOfVCClaimsDto(value: object): boolean;
36
+ export declare function VCClaimsDtoFromJSON(json: any): VCClaimsDto;
37
+ export declare function VCClaimsDtoFromJSONTyped(json: any, ignoreDiscriminator: boolean): VCClaimsDto;
38
+ export declare function VCClaimsDtoToJSON(value?: VCClaimsDto | null): any;