@meeco/svx-api-sdk 1.0.0-stage.20231129111134.b1ab71a → 1.0.0-stage.20231218095603.d71b65e
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +8 -1
- package/lib/esm/apis/ConnectionsApi.js +5 -2
- package/lib/esm/apis/SharesApi.js +4 -4
- package/lib/esm/apis/VerifiableCredentialsApi.js +2 -2
- package/lib/esm/models/ATOMCreateOrUpdateOrgRequest.js +2 -0
- package/lib/esm/models/ATOMOrg.js +2 -0
- package/lib/esm/models/IDPClientModelDto.js +6 -0
- package/lib/esm/models/IDPCreateClientDto.js +85 -0
- package/lib/esm/models/IDPCreateClientPayloadDto.js +44 -0
- package/lib/esm/models/IDPUpdateClientDto.js +61 -0
- package/lib/esm/models/IDPUpdateClientPayloadDto.js +44 -0
- package/lib/esm/models/{VCGenerateCredentialDtoCnf.js → VCClaimsDto.js} +12 -9
- package/lib/esm/models/VCCredentialVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCFieldsDto.js +3 -2
- package/lib/esm/models/VCFieldsDtoFilter.js +48 -0
- package/lib/esm/models/VCFilterDto.js +48 -0
- package/lib/esm/models/VCGenerateCredentialDto.js +5 -5
- package/lib/esm/models/VCGenerateCredentialDtoClaims.js +40 -0
- package/lib/esm/models/VCIdTokenVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCOldPresentationRequestResponseVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCPresentationRequestResponseVerificationOptionsDto.js +2 -1
- package/lib/esm/models/VCPresentationRequestResponseVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCPresentationRequestUpdateVerificationResultRequestDto.js +2 -1
- package/lib/esm/models/VCPresentationRequestVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCPresentationVerificationOptionsDto.js +2 -1
- package/lib/esm/models/VCPresentationVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/index.js +8 -1
- package/lib/types/apis/ConnectionsApi.d.ts +2 -1
- package/lib/types/apis/SharesApi.d.ts +4 -4
- package/lib/types/apis/VerifiableCredentialsApi.d.ts +2 -2
- package/lib/types/models/ATOMCreateOrUpdateOrgRequest.d.ts +6 -0
- package/lib/types/models/ATOMOrg.d.ts +6 -0
- package/lib/types/models/IDPClientModelDto.d.ts +12 -0
- package/lib/types/models/IDPCreateClientDto.d.ts +102 -0
- package/lib/types/models/IDPCreateClientPayloadDto.d.ts +32 -0
- package/lib/types/models/IDPUpdateClientDto.d.ts +70 -0
- package/lib/types/models/IDPUpdateClientPayloadDto.d.ts +32 -0
- package/lib/types/models/VCClaimsDto.d.ts +38 -0
- package/lib/types/models/VCCredentialVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCFieldsDto.d.ts +3 -2
- package/lib/types/models/VCFieldsDtoFilter.d.ts +43 -0
- package/lib/types/models/VCFilterDto.d.ts +43 -0
- package/lib/types/models/VCGenerateCredentialDto.d.ts +6 -6
- package/lib/types/models/VCGenerateCredentialDtoClaims.d.ts +39 -0
- package/lib/types/models/VCIdTokenVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCOldPresentationRequestResponseVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCPresentationRequestResponseVerificationOptionsDto.d.ts +2 -1
- package/lib/types/models/VCPresentationRequestResponseVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCPresentationRequestUpdateVerificationResultRequestDto.d.ts +1 -0
- package/lib/types/models/VCPresentationRequestVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCPresentationVerificationOptionsDto.d.ts +1 -0
- package/lib/types/models/VCPresentationVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/index.d.ts +8 -1
- package/lib/umd/apis/ConnectionsApi.js +5 -2
- package/lib/umd/apis/SharesApi.js +4 -4
- package/lib/umd/apis/VerifiableCredentialsApi.js +2 -2
- package/lib/umd/models/ATOMCreateOrUpdateOrgRequest.js +2 -0
- package/lib/umd/models/ATOMOrg.js +2 -0
- package/lib/umd/models/IDPClientModelDto.js +6 -0
- package/lib/umd/models/IDPCreateClientDto.js +92 -0
- package/lib/umd/models/IDPCreateClientPayloadDto.js +51 -0
- package/lib/umd/models/IDPUpdateClientDto.js +68 -0
- package/lib/umd/models/IDPUpdateClientPayloadDto.js +51 -0
- package/lib/umd/models/VCClaimsDto.js +53 -0
- package/lib/umd/models/VCCredentialVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCFieldsDto.js +3 -2
- package/lib/umd/models/VCFieldsDtoFilter.js +55 -0
- package/lib/umd/models/VCFilterDto.js +55 -0
- package/lib/umd/models/VCGenerateCredentialDto.js +5 -5
- package/lib/umd/models/VCGenerateCredentialDtoClaims.js +47 -0
- package/lib/umd/models/VCIdTokenVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCOldPresentationRequestResponseVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCPresentationRequestResponseVerificationOptionsDto.js +2 -1
- package/lib/umd/models/VCPresentationRequestResponseVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCPresentationRequestUpdateVerificationResultRequestDto.js +2 -1
- package/lib/umd/models/VCPresentationRequestVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCPresentationVerificationOptionsDto.js +2 -1
- package/lib/umd/models/VCPresentationVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/index.js +8 -1
- package/package.json +1 -1
- package/lib/types/models/VCGenerateCredentialDtoCnf.d.ts +0 -31
- package/lib/umd/models/VCGenerateCredentialDtoCnf.js +0 -50
|
@@ -51,6 +51,7 @@ export declare const VCCredentialVerificationResultResponseDtoChecksEnum: {
|
|
|
51
51
|
readonly Nonce: "nonce";
|
|
52
52
|
readonly Schema: "schema";
|
|
53
53
|
readonly RevocationStatus: "revocation_status";
|
|
54
|
+
readonly Constraints: "constraints";
|
|
54
55
|
};
|
|
55
56
|
export type VCCredentialVerificationResultResponseDtoChecksEnum = typeof VCCredentialVerificationResultResponseDtoChecksEnum[keyof typeof VCCredentialVerificationResultResponseDtoChecksEnum];
|
|
56
57
|
/**
|
|
@@ -9,6 +9,7 @@
|
|
|
9
9
|
* https://openapi-generator.tech
|
|
10
10
|
* Do not edit the class manually.
|
|
11
11
|
*/
|
|
12
|
+
import type { VCFieldsDtoFilter } from './VCFieldsDtoFilter';
|
|
12
13
|
/**
|
|
13
14
|
*
|
|
14
15
|
* @export
|
|
@@ -29,10 +30,10 @@ export interface VCFieldsDto {
|
|
|
29
30
|
purpose?: string;
|
|
30
31
|
/**
|
|
31
32
|
*
|
|
32
|
-
* @type {
|
|
33
|
+
* @type {VCFieldsDtoFilter}
|
|
33
34
|
* @memberof VCFieldsDto
|
|
34
35
|
*/
|
|
35
|
-
filter?:
|
|
36
|
+
filter?: VCFieldsDtoFilter;
|
|
36
37
|
}
|
|
37
38
|
/**
|
|
38
39
|
* Check if a given object implements the VCFieldsDto interface.
|
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* SVX API
|
|
3
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 1.3.1
|
|
6
|
+
*
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
/**
|
|
13
|
+
*
|
|
14
|
+
* @export
|
|
15
|
+
* @interface VCFieldsDtoFilter
|
|
16
|
+
*/
|
|
17
|
+
export interface VCFieldsDtoFilter {
|
|
18
|
+
/**
|
|
19
|
+
*
|
|
20
|
+
* @type {string}
|
|
21
|
+
* @memberof VCFieldsDtoFilter
|
|
22
|
+
*/
|
|
23
|
+
type: string;
|
|
24
|
+
/**
|
|
25
|
+
* The const can be a number | string | boolean | object.However, since openapi-generator fails to generate correct SDK for swagger file using oneOf property, here it is described only as string
|
|
26
|
+
* @type {string}
|
|
27
|
+
* @memberof VCFieldsDtoFilter
|
|
28
|
+
*/
|
|
29
|
+
_const?: string;
|
|
30
|
+
/**
|
|
31
|
+
*
|
|
32
|
+
* @type {string}
|
|
33
|
+
* @memberof VCFieldsDtoFilter
|
|
34
|
+
*/
|
|
35
|
+
pattern?: string;
|
|
36
|
+
}
|
|
37
|
+
/**
|
|
38
|
+
* Check if a given object implements the VCFieldsDtoFilter interface.
|
|
39
|
+
*/
|
|
40
|
+
export declare function instanceOfVCFieldsDtoFilter(value: object): boolean;
|
|
41
|
+
export declare function VCFieldsDtoFilterFromJSON(json: any): VCFieldsDtoFilter;
|
|
42
|
+
export declare function VCFieldsDtoFilterFromJSONTyped(json: any, ignoreDiscriminator: boolean): VCFieldsDtoFilter;
|
|
43
|
+
export declare function VCFieldsDtoFilterToJSON(value?: VCFieldsDtoFilter | null): any;
|
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* SVX API
|
|
3
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 1.3.1
|
|
6
|
+
*
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
/**
|
|
13
|
+
*
|
|
14
|
+
* @export
|
|
15
|
+
* @interface VCFilterDto
|
|
16
|
+
*/
|
|
17
|
+
export interface VCFilterDto {
|
|
18
|
+
/**
|
|
19
|
+
*
|
|
20
|
+
* @type {string}
|
|
21
|
+
* @memberof VCFilterDto
|
|
22
|
+
*/
|
|
23
|
+
type: string;
|
|
24
|
+
/**
|
|
25
|
+
* The const can be a number | string | boolean | object.However, since openapi-generator fails to generate correct SDK for swagger file using oneOf property, here it is described only as string
|
|
26
|
+
* @type {string}
|
|
27
|
+
* @memberof VCFilterDto
|
|
28
|
+
*/
|
|
29
|
+
_const?: string;
|
|
30
|
+
/**
|
|
31
|
+
*
|
|
32
|
+
* @type {string}
|
|
33
|
+
* @memberof VCFilterDto
|
|
34
|
+
*/
|
|
35
|
+
pattern?: string;
|
|
36
|
+
}
|
|
37
|
+
/**
|
|
38
|
+
* Check if a given object implements the VCFilterDto interface.
|
|
39
|
+
*/
|
|
40
|
+
export declare function instanceOfVCFilterDto(value: object): boolean;
|
|
41
|
+
export declare function VCFilterDtoFromJSON(json: any): VCFilterDto;
|
|
42
|
+
export declare function VCFilterDtoFromJSONTyped(json: any, ignoreDiscriminator: boolean): VCFilterDto;
|
|
43
|
+
export declare function VCFilterDtoToJSON(value?: VCFilterDto | null): any;
|
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
* https://openapi-generator.tech
|
|
10
10
|
* Do not edit the class manually.
|
|
11
11
|
*/
|
|
12
|
-
import type {
|
|
12
|
+
import type { VCGenerateCredentialDtoClaims } from './VCGenerateCredentialDtoClaims';
|
|
13
13
|
/**
|
|
14
14
|
*
|
|
15
15
|
* @export
|
|
@@ -30,10 +30,10 @@ export interface VCGenerateCredentialDto {
|
|
|
30
30
|
issuer: object;
|
|
31
31
|
/**
|
|
32
32
|
*
|
|
33
|
-
* @type {
|
|
33
|
+
* @type {VCGenerateCredentialDtoClaims}
|
|
34
34
|
* @memberof VCGenerateCredentialDto
|
|
35
35
|
*/
|
|
36
|
-
claims:
|
|
36
|
+
claims: VCGenerateCredentialDtoClaims;
|
|
37
37
|
/**
|
|
38
38
|
*
|
|
39
39
|
* @type {boolean}
|
|
@@ -47,11 +47,11 @@ export interface VCGenerateCredentialDto {
|
|
|
47
47
|
*/
|
|
48
48
|
expires_at?: Date;
|
|
49
49
|
/**
|
|
50
|
-
*
|
|
51
|
-
* @type {
|
|
50
|
+
* The type of the SD Verifiable Credential, The Type information Can be a string or an array of string.However, since openapi-generator fails to generate correct SDK for swagger file using oneOf property, here it is described only as string
|
|
51
|
+
* @type {string}
|
|
52
52
|
* @memberof VCGenerateCredentialDto
|
|
53
53
|
*/
|
|
54
|
-
|
|
54
|
+
type?: string;
|
|
55
55
|
}
|
|
56
56
|
/**
|
|
57
57
|
* Check if a given object implements the VCGenerateCredentialDto interface.
|
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* SVX API
|
|
3
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 1.3.1
|
|
6
|
+
*
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
import type { VCCnfDto } from './VCCnfDto';
|
|
13
|
+
/**
|
|
14
|
+
*
|
|
15
|
+
* @export
|
|
16
|
+
* @interface VCGenerateCredentialDtoClaims
|
|
17
|
+
*/
|
|
18
|
+
export interface VCGenerateCredentialDtoClaims {
|
|
19
|
+
[key: string]: any | any;
|
|
20
|
+
/**
|
|
21
|
+
*
|
|
22
|
+
* @type {string}
|
|
23
|
+
* @memberof VCGenerateCredentialDtoClaims
|
|
24
|
+
*/
|
|
25
|
+
id?: string;
|
|
26
|
+
/**
|
|
27
|
+
*
|
|
28
|
+
* @type {VCCnfDto}
|
|
29
|
+
* @memberof VCGenerateCredentialDtoClaims
|
|
30
|
+
*/
|
|
31
|
+
cnf?: VCCnfDto;
|
|
32
|
+
}
|
|
33
|
+
/**
|
|
34
|
+
* Check if a given object implements the VCGenerateCredentialDtoClaims interface.
|
|
35
|
+
*/
|
|
36
|
+
export declare function instanceOfVCGenerateCredentialDtoClaims(value: object): boolean;
|
|
37
|
+
export declare function VCGenerateCredentialDtoClaimsFromJSON(json: any): VCGenerateCredentialDtoClaims;
|
|
38
|
+
export declare function VCGenerateCredentialDtoClaimsFromJSONTyped(json: any, ignoreDiscriminator: boolean): VCGenerateCredentialDtoClaims;
|
|
39
|
+
export declare function VCGenerateCredentialDtoClaimsToJSON(value?: VCGenerateCredentialDtoClaims | null): any;
|
|
@@ -45,6 +45,7 @@ export declare const VCIdTokenVerificationResultResponseDtoChecksEnum: {
|
|
|
45
45
|
readonly Nonce: "nonce";
|
|
46
46
|
readonly Schema: "schema";
|
|
47
47
|
readonly RevocationStatus: "revocation_status";
|
|
48
|
+
readonly Constraints: "constraints";
|
|
48
49
|
};
|
|
49
50
|
export type VCIdTokenVerificationResultResponseDtoChecksEnum = typeof VCIdTokenVerificationResultResponseDtoChecksEnum[keyof typeof VCIdTokenVerificationResultResponseDtoChecksEnum];
|
|
50
51
|
/**
|
|
@@ -45,6 +45,7 @@ export declare const VCOldPresentationRequestResponseVerificationResultResponseD
|
|
|
45
45
|
readonly Nonce: "nonce";
|
|
46
46
|
readonly Schema: "schema";
|
|
47
47
|
readonly RevocationStatus: "revocation_status";
|
|
48
|
+
readonly Constraints: "constraints";
|
|
48
49
|
};
|
|
49
50
|
export type VCOldPresentationRequestResponseVerificationResultResponseDtoChecksEnum = typeof VCOldPresentationRequestResponseVerificationResultResponseDtoChecksEnum[keyof typeof VCOldPresentationRequestResponseVerificationResultResponseDtoChecksEnum];
|
|
50
51
|
/**
|
|
@@ -23,7 +23,7 @@ export interface VCPresentationRequestResponseVerificationOptionsDto {
|
|
|
23
23
|
* @type {Array<string>}
|
|
24
24
|
* @memberof VCPresentationRequestResponseVerificationOptionsDto
|
|
25
25
|
*/
|
|
26
|
-
checks?: VCPresentationRequestResponseVerificationOptionsDtoChecksEnum
|
|
26
|
+
checks?: Array<VCPresentationRequestResponseVerificationOptionsDtoChecksEnum>;
|
|
27
27
|
/**
|
|
28
28
|
*
|
|
29
29
|
* @type {VCRequestVerificationOptionsDto}
|
|
@@ -48,6 +48,7 @@ export interface VCPresentationRequestResponseVerificationOptionsDto {
|
|
|
48
48
|
*/
|
|
49
49
|
export declare const VCPresentationRequestResponseVerificationOptionsDtoChecksEnum: {
|
|
50
50
|
readonly Format: "format";
|
|
51
|
+
readonly Constraints: "constraints";
|
|
51
52
|
};
|
|
52
53
|
export type VCPresentationRequestResponseVerificationOptionsDtoChecksEnum = typeof VCPresentationRequestResponseVerificationOptionsDtoChecksEnum[keyof typeof VCPresentationRequestResponseVerificationOptionsDtoChecksEnum];
|
|
53
54
|
/**
|
|
@@ -66,6 +66,7 @@ export declare const VCPresentationRequestResponseVerificationResultResponseDtoC
|
|
|
66
66
|
readonly Nonce: "nonce";
|
|
67
67
|
readonly Schema: "schema";
|
|
68
68
|
readonly RevocationStatus: "revocation_status";
|
|
69
|
+
readonly Constraints: "constraints";
|
|
69
70
|
};
|
|
70
71
|
export type VCPresentationRequestResponseVerificationResultResponseDtoChecksEnum = typeof VCPresentationRequestResponseVerificationResultResponseDtoChecksEnum[keyof typeof VCPresentationRequestResponseVerificationResultResponseDtoChecksEnum];
|
|
71
72
|
/**
|
|
@@ -66,6 +66,7 @@ export declare const VCPresentationRequestUpdateVerificationResultRequestDtoChec
|
|
|
66
66
|
readonly Nonce: "nonce";
|
|
67
67
|
readonly Schema: "schema";
|
|
68
68
|
readonly RevocationStatus: "revocation_status";
|
|
69
|
+
readonly Constraints: "constraints";
|
|
69
70
|
};
|
|
70
71
|
export type VCPresentationRequestUpdateVerificationResultRequestDtoChecksEnum = typeof VCPresentationRequestUpdateVerificationResultRequestDtoChecksEnum[keyof typeof VCPresentationRequestUpdateVerificationResultRequestDtoChecksEnum];
|
|
71
72
|
/**
|
|
@@ -51,6 +51,7 @@ export declare const VCPresentationRequestVerificationResultResponseDtoChecksEnu
|
|
|
51
51
|
readonly Nonce: "nonce";
|
|
52
52
|
readonly Schema: "schema";
|
|
53
53
|
readonly RevocationStatus: "revocation_status";
|
|
54
|
+
readonly Constraints: "constraints";
|
|
54
55
|
};
|
|
55
56
|
export type VCPresentationRequestVerificationResultResponseDtoChecksEnum = typeof VCPresentationRequestVerificationResultResponseDtoChecksEnum[keyof typeof VCPresentationRequestVerificationResultResponseDtoChecksEnum];
|
|
56
57
|
/**
|
|
@@ -30,6 +30,7 @@ export declare const VCPresentationVerificationOptionsDtoChecksEnum: {
|
|
|
30
30
|
readonly Signature: "signature";
|
|
31
31
|
readonly Expiration: "expiration";
|
|
32
32
|
readonly Nonce: "nonce";
|
|
33
|
+
readonly Constraints: "constraints";
|
|
33
34
|
};
|
|
34
35
|
export type VCPresentationVerificationOptionsDtoChecksEnum = typeof VCPresentationVerificationOptionsDtoChecksEnum[keyof typeof VCPresentationVerificationOptionsDtoChecksEnum];
|
|
35
36
|
/**
|
|
@@ -52,6 +52,7 @@ export declare const VCPresentationVerificationResultResponseDtoChecksEnum: {
|
|
|
52
52
|
readonly Nonce: "nonce";
|
|
53
53
|
readonly Schema: "schema";
|
|
54
54
|
readonly RevocationStatus: "revocation_status";
|
|
55
|
+
readonly Constraints: "constraints";
|
|
55
56
|
};
|
|
56
57
|
export type VCPresentationVerificationResultResponseDtoChecksEnum = typeof VCPresentationVerificationResultResponseDtoChecksEnum[keyof typeof VCPresentationVerificationResultResponseDtoChecksEnum];
|
|
57
58
|
/**
|
|
@@ -137,6 +137,8 @@ export * from './IDPAuthorisationSiopSessionRequestPayloadDto';
|
|
|
137
137
|
export * from './IDPClientModelDto';
|
|
138
138
|
export * from './IDPClientResponseDto';
|
|
139
139
|
export * from './IDPClientsResponseDto';
|
|
140
|
+
export * from './IDPCreateClientDto';
|
|
141
|
+
export * from './IDPCreateClientPayloadDto';
|
|
140
142
|
export * from './IDPCreateInvitationDto';
|
|
141
143
|
export * from './IDPCreateInvitationPayloadDto';
|
|
142
144
|
export * from './IDPEndUserInvitationResponseDto';
|
|
@@ -157,6 +159,8 @@ export * from './IDPJwtIssuerJWKSKeys';
|
|
|
157
159
|
export * from './IDPJwtIssuerResponseDto';
|
|
158
160
|
export * from './IDPLoginRequestDto';
|
|
159
161
|
export * from './IDPMeta';
|
|
162
|
+
export * from './IDPUpdateClientDto';
|
|
163
|
+
export * from './IDPUpdateClientPayloadDto';
|
|
160
164
|
export * from './IDPUserDto';
|
|
161
165
|
export * from './IDPUserResponseDto';
|
|
162
166
|
export * from './IDPWhoAmIResponseModelDto';
|
|
@@ -242,6 +246,7 @@ export * from './ShreIntentListResponse';
|
|
|
242
246
|
export * from './UpdateDelegationsRequest';
|
|
243
247
|
export * from './VCApp';
|
|
244
248
|
export * from './VCAppSignal';
|
|
249
|
+
export * from './VCClaimsDto';
|
|
245
250
|
export * from './VCCnfDto';
|
|
246
251
|
export * from './VCComponent';
|
|
247
252
|
export * from './VCConstraintsDto';
|
|
@@ -274,9 +279,11 @@ export * from './VCDatabase';
|
|
|
274
279
|
export * from './VCErrorResponseDto';
|
|
275
280
|
export * from './VCErrorsResponseDto';
|
|
276
281
|
export * from './VCFieldsDto';
|
|
282
|
+
export * from './VCFieldsDtoFilter';
|
|
283
|
+
export * from './VCFilterDto';
|
|
277
284
|
export * from './VCFormatDto';
|
|
278
285
|
export * from './VCGenerateCredentialDto';
|
|
279
|
-
export * from './
|
|
286
|
+
export * from './VCGenerateCredentialDtoClaims';
|
|
280
287
|
export * from './VCGenerateCredentialPayloadDto';
|
|
281
288
|
export * from './VCGeneratePresentationDto';
|
|
282
289
|
export * from './VCGeneratePresentationPayloadDto';
|
|
@@ -243,6 +243,9 @@ class ConnectionsApi extends runtime.BaseAPI {
|
|
|
243
243
|
if (requestParameters.perPage !== undefined) {
|
|
244
244
|
queryParameters['per_page'] = requestParameters.perPage;
|
|
245
245
|
}
|
|
246
|
+
if (requestParameters.page !== undefined) {
|
|
247
|
+
queryParameters['page'] = requestParameters.page;
|
|
248
|
+
}
|
|
246
249
|
const headerParameters = {};
|
|
247
250
|
if (requestParameters.meecoDelegationId !== undefined && requestParameters.meecoDelegationId !== null) {
|
|
248
251
|
headerParameters['Meeco-Delegation-Id'] = String(requestParameters.meecoDelegationId);
|
|
@@ -270,9 +273,9 @@ class ConnectionsApi extends runtime.BaseAPI {
|
|
|
270
273
|
* Retrieves invitations that the current user has created. Parameter `state` fetches invitations with a certain state. Currenty there are 6 states: * `new` * `connected` * `rejected` * `accepted` * `cancelled` * `expired` If parameter `state` is not submitted, only invitations with states `new`, `accepted` and `rejected` are fetched.
|
|
271
274
|
* List invitations
|
|
272
275
|
*/
|
|
273
|
-
invitationsGet(state, nextPageAfter, perPage, meecoDelegationId, meecoOrganisationId, initOverrides) {
|
|
276
|
+
invitationsGet(state, nextPageAfter, perPage, page, meecoDelegationId, meecoOrganisationId, initOverrides) {
|
|
274
277
|
return __awaiter(this, void 0, void 0, function* () {
|
|
275
|
-
const response = yield this.invitationsGetRaw({ state: state, nextPageAfter: nextPageAfter, perPage: perPage, meecoDelegationId: meecoDelegationId, meecoOrganisationId: meecoOrganisationId }, initOverrides);
|
|
278
|
+
const response = yield this.invitationsGetRaw({ state: state, nextPageAfter: nextPageAfter, perPage: perPage, page: page, meecoDelegationId: meecoDelegationId, meecoOrganisationId: meecoOrganisationId }, initOverrides);
|
|
276
279
|
return yield response.value();
|
|
277
280
|
});
|
|
278
281
|
}
|
|
@@ -373,7 +373,7 @@ class SharesApi extends runtime.BaseAPI {
|
|
|
373
373
|
});
|
|
374
374
|
}
|
|
375
375
|
/**
|
|
376
|
-
* Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `
|
|
376
|
+
* Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
|
|
377
377
|
* Share your item with connected users
|
|
378
378
|
*/
|
|
379
379
|
itemsIdSharesPostRaw(requestParameters, initOverrides) {
|
|
@@ -408,7 +408,7 @@ class SharesApi extends runtime.BaseAPI {
|
|
|
408
408
|
});
|
|
409
409
|
}
|
|
410
410
|
/**
|
|
411
|
-
* Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `
|
|
411
|
+
* Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
|
|
412
412
|
* Share your item with connected users
|
|
413
413
|
*/
|
|
414
414
|
itemsIdSharesPost(id, meecoDelegationId, meecoOrganisationId, postItemSharesRequest, initOverrides) {
|
|
@@ -418,7 +418,7 @@ class SharesApi extends runtime.BaseAPI {
|
|
|
418
418
|
});
|
|
419
419
|
}
|
|
420
420
|
/**
|
|
421
|
-
* Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `
|
|
421
|
+
* Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
|
|
422
422
|
* Update all shares of one item
|
|
423
423
|
*/
|
|
424
424
|
itemsIdSharesPutRaw(requestParameters, initOverrides) {
|
|
@@ -453,7 +453,7 @@ class SharesApi extends runtime.BaseAPI {
|
|
|
453
453
|
});
|
|
454
454
|
}
|
|
455
455
|
/**
|
|
456
|
-
* Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `
|
|
456
|
+
* Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
|
|
457
457
|
* Update all shares of one item
|
|
458
458
|
*/
|
|
459
459
|
itemsIdSharesPut(id, meecoDelegationId, meecoOrganisationId, putItemSharesRequest, initOverrides) {
|
|
@@ -330,7 +330,7 @@ class VerifiableCredentialsApi extends runtime.BaseAPI {
|
|
|
330
330
|
});
|
|
331
331
|
}
|
|
332
332
|
/**
|
|
333
|
-
* <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p>
|
|
333
|
+
* <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
|
|
334
334
|
* Generate credential based on type and claims provided
|
|
335
335
|
*/
|
|
336
336
|
credentialsGeneratePostRaw(requestParameters, initOverrides) {
|
|
@@ -368,7 +368,7 @@ class VerifiableCredentialsApi extends runtime.BaseAPI {
|
|
|
368
368
|
});
|
|
369
369
|
}
|
|
370
370
|
/**
|
|
371
|
-
* <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p>
|
|
371
|
+
* <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
|
|
372
372
|
* Generate credential based on type and claims provided
|
|
373
373
|
*/
|
|
374
374
|
credentialsGeneratePost(meecoOrganisationID, vCGenerateCredentialPayloadDto, accept, initOverrides) {
|
|
@@ -39,6 +39,7 @@ function ATOMCreateOrUpdateOrgRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
39
39
|
'business_address': !(0, runtime_1.exists)(json, 'business_address') ? undefined : json['business_address'],
|
|
40
40
|
'color': !(0, runtime_1.exists)(json, 'color') ? undefined : json['color'],
|
|
41
41
|
'company_number': !(0, runtime_1.exists)(json, 'company_number') ? undefined : json['company_number'],
|
|
42
|
+
'company_url': !(0, runtime_1.exists)(json, 'company_url') ? undefined : json['company_url'],
|
|
42
43
|
'legal_name': !(0, runtime_1.exists)(json, 'legal_name') ? undefined : json['legal_name'],
|
|
43
44
|
'lei_number': !(0, runtime_1.exists)(json, 'lei_number') ? undefined : json['lei_number'],
|
|
44
45
|
'logo_url': !(0, runtime_1.exists)(json, 'logo_url') ? undefined : json['logo_url'],
|
|
@@ -62,6 +63,7 @@ function ATOMCreateOrUpdateOrgRequestToJSON(value) {
|
|
|
62
63
|
'business_address': value.business_address,
|
|
63
64
|
'color': value.color,
|
|
64
65
|
'company_number': value.company_number,
|
|
66
|
+
'company_url': value.company_url,
|
|
65
67
|
'legal_name': value.legal_name,
|
|
66
68
|
'lei_number': value.lei_number,
|
|
67
69
|
'logo_url': value.logo_url,
|
|
@@ -43,6 +43,7 @@ function ATOMOrgFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
43
43
|
'business_address': !(0, runtime_1.exists)(json, 'business_address') ? undefined : json['business_address'],
|
|
44
44
|
'color': !(0, runtime_1.exists)(json, 'color') ? undefined : json['color'],
|
|
45
45
|
'company_number': !(0, runtime_1.exists)(json, 'company_number') ? undefined : json['company_number'],
|
|
46
|
+
'company_url': !(0, runtime_1.exists)(json, 'company_url') ? undefined : json['company_url'],
|
|
46
47
|
'created_at': !(0, runtime_1.exists)(json, 'created_at') ? undefined : (new Date(json['created_at'])),
|
|
47
48
|
'id': json['id'],
|
|
48
49
|
'legal_name': !(0, runtime_1.exists)(json, 'legal_name') ? undefined : json['legal_name'],
|
|
@@ -72,6 +73,7 @@ function ATOMOrgToJSON(value) {
|
|
|
72
73
|
'business_address': value.business_address,
|
|
73
74
|
'color': value.color,
|
|
74
75
|
'company_number': value.company_number,
|
|
76
|
+
'company_url': value.company_url,
|
|
75
77
|
'created_at': value.created_at === undefined ? undefined : (value.created_at.toISOString()),
|
|
76
78
|
'id': value.id,
|
|
77
79
|
'legal_name': value.legal_name,
|
|
@@ -30,6 +30,8 @@ function instanceOfIDPClientModelDto(value) {
|
|
|
30
30
|
isInstance = isInstance && "is_active" in value;
|
|
31
31
|
isInstance = isInstance && "created_at" in value;
|
|
32
32
|
isInstance = isInstance && "updated_at" in value;
|
|
33
|
+
isInstance = isInstance && "auth_method" in value;
|
|
34
|
+
isInstance = isInstance && "application_base_url" in value;
|
|
33
35
|
return isInstance;
|
|
34
36
|
}
|
|
35
37
|
exports.instanceOfIDPClientModelDto = instanceOfIDPClientModelDto;
|
|
@@ -53,6 +55,8 @@ function IDPClientModelDtoFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
53
55
|
'is_active': json['is_active'],
|
|
54
56
|
'created_at': (new Date(json['created_at'])),
|
|
55
57
|
'updated_at': (new Date(json['updated_at'])),
|
|
58
|
+
'auth_method': json['auth_method'],
|
|
59
|
+
'application_base_url': json['application_base_url'],
|
|
56
60
|
};
|
|
57
61
|
}
|
|
58
62
|
exports.IDPClientModelDtoFromJSONTyped = IDPClientModelDtoFromJSONTyped;
|
|
@@ -75,6 +79,8 @@ function IDPClientModelDtoToJSON(value) {
|
|
|
75
79
|
'is_active': value.is_active,
|
|
76
80
|
'created_at': (value.created_at.toISOString()),
|
|
77
81
|
'updated_at': (value.updated_at.toISOString()),
|
|
82
|
+
'auth_method': value.auth_method,
|
|
83
|
+
'application_base_url': value.application_base_url,
|
|
78
84
|
};
|
|
79
85
|
}
|
|
80
86
|
exports.IDPClientModelDtoToJSON = IDPClientModelDtoToJSON;
|
|
@@ -0,0 +1,92 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/* tslint:disable */
|
|
3
|
+
/* eslint-disable */
|
|
4
|
+
/**
|
|
5
|
+
* SVX API
|
|
6
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
7
|
+
*
|
|
8
|
+
* The version of the OpenAPI document: 1.3.1
|
|
9
|
+
*
|
|
10
|
+
*
|
|
11
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
12
|
+
* https://openapi-generator.tech
|
|
13
|
+
* Do not edit the class manually.
|
|
14
|
+
*/
|
|
15
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
|
+
exports.IDPCreateClientDtoToJSON = exports.IDPCreateClientDtoFromJSONTyped = exports.IDPCreateClientDtoFromJSON = exports.instanceOfIDPCreateClientDto = exports.IDPCreateClientDtoTokenEndpointAuthMethodEnum = exports.IDPCreateClientDtoTypeEnum = void 0;
|
|
17
|
+
/**
|
|
18
|
+
* @export
|
|
19
|
+
*/
|
|
20
|
+
exports.IDPCreateClientDtoTypeEnum = {
|
|
21
|
+
User: 'user',
|
|
22
|
+
Agent: 'agent'
|
|
23
|
+
};
|
|
24
|
+
/**
|
|
25
|
+
* @export
|
|
26
|
+
*/
|
|
27
|
+
exports.IDPCreateClientDtoTokenEndpointAuthMethodEnum = {
|
|
28
|
+
ClientSecretBasic: 'client_secret_basic',
|
|
29
|
+
ClientSecretPost: 'client_secret_post',
|
|
30
|
+
None: 'none'
|
|
31
|
+
};
|
|
32
|
+
/**
|
|
33
|
+
* Check if a given object implements the IDPCreateClientDto interface.
|
|
34
|
+
*/
|
|
35
|
+
function instanceOfIDPCreateClientDto(value) {
|
|
36
|
+
let isInstance = true;
|
|
37
|
+
isInstance = isInstance && "id" in value;
|
|
38
|
+
isInstance = isInstance && "name" in value;
|
|
39
|
+
isInstance = isInstance && "description" in value;
|
|
40
|
+
isInstance = isInstance && "scopes" in value;
|
|
41
|
+
isInstance = isInstance && "redirects" in value;
|
|
42
|
+
isInstance = isInstance && "logout_redirects" in value;
|
|
43
|
+
isInstance = isInstance && "type" in value;
|
|
44
|
+
isInstance = isInstance && "is_active" in value;
|
|
45
|
+
isInstance = isInstance && "application_base_url" in value;
|
|
46
|
+
isInstance = isInstance && "token_endpoint_auth_method" in value;
|
|
47
|
+
return isInstance;
|
|
48
|
+
}
|
|
49
|
+
exports.instanceOfIDPCreateClientDto = instanceOfIDPCreateClientDto;
|
|
50
|
+
function IDPCreateClientDtoFromJSON(json) {
|
|
51
|
+
return IDPCreateClientDtoFromJSONTyped(json, false);
|
|
52
|
+
}
|
|
53
|
+
exports.IDPCreateClientDtoFromJSON = IDPCreateClientDtoFromJSON;
|
|
54
|
+
function IDPCreateClientDtoFromJSONTyped(json, ignoreDiscriminator) {
|
|
55
|
+
if ((json === undefined) || (json === null)) {
|
|
56
|
+
return json;
|
|
57
|
+
}
|
|
58
|
+
return {
|
|
59
|
+
'id': json['id'],
|
|
60
|
+
'name': json['name'],
|
|
61
|
+
'description': json['description'],
|
|
62
|
+
'scopes': json['scopes'],
|
|
63
|
+
'redirects': json['redirects'],
|
|
64
|
+
'logout_redirects': json['logout_redirects'],
|
|
65
|
+
'type': json['type'],
|
|
66
|
+
'is_active': json['is_active'],
|
|
67
|
+
'application_base_url': json['application_base_url'],
|
|
68
|
+
'token_endpoint_auth_method': json['token_endpoint_auth_method'],
|
|
69
|
+
};
|
|
70
|
+
}
|
|
71
|
+
exports.IDPCreateClientDtoFromJSONTyped = IDPCreateClientDtoFromJSONTyped;
|
|
72
|
+
function IDPCreateClientDtoToJSON(value) {
|
|
73
|
+
if (value === undefined) {
|
|
74
|
+
return undefined;
|
|
75
|
+
}
|
|
76
|
+
if (value === null) {
|
|
77
|
+
return null;
|
|
78
|
+
}
|
|
79
|
+
return {
|
|
80
|
+
'id': value.id,
|
|
81
|
+
'name': value.name,
|
|
82
|
+
'description': value.description,
|
|
83
|
+
'scopes': value.scopes,
|
|
84
|
+
'redirects': value.redirects,
|
|
85
|
+
'logout_redirects': value.logout_redirects,
|
|
86
|
+
'type': value.type,
|
|
87
|
+
'is_active': value.is_active,
|
|
88
|
+
'application_base_url': value.application_base_url,
|
|
89
|
+
'token_endpoint_auth_method': value.token_endpoint_auth_method,
|
|
90
|
+
};
|
|
91
|
+
}
|
|
92
|
+
exports.IDPCreateClientDtoToJSON = IDPCreateClientDtoToJSON;
|