@meeco/svx-api-sdk 1.0.0-stage.20231211153548.58a6d84 → 1.0.0-stage.20231218095603.d71b65e

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (58) hide show
  1. package/.openapi-generator/FILES +4 -1
  2. package/lib/esm/apis/SharesApi.js +4 -4
  3. package/lib/esm/apis/VerifiableCredentialsApi.js +2 -2
  4. package/lib/esm/models/{VCGenerateCredentialDtoCnf.js → VCClaimsDto.js} +12 -9
  5. package/lib/esm/models/VCCredentialVerificationResultResponseDto.js +2 -1
  6. package/lib/esm/models/VCFieldsDto.js +3 -2
  7. package/lib/esm/models/VCFieldsDtoFilter.js +48 -0
  8. package/lib/esm/models/VCFilterDto.js +48 -0
  9. package/lib/esm/models/VCGenerateCredentialDto.js +5 -5
  10. package/lib/esm/models/VCGenerateCredentialDtoClaims.js +40 -0
  11. package/lib/esm/models/VCIdTokenVerificationResultResponseDto.js +2 -1
  12. package/lib/esm/models/VCOldPresentationRequestResponseVerificationResultResponseDto.js +2 -1
  13. package/lib/esm/models/VCPresentationRequestResponseVerificationOptionsDto.js +2 -1
  14. package/lib/esm/models/VCPresentationRequestResponseVerificationResultResponseDto.js +2 -1
  15. package/lib/esm/models/VCPresentationRequestUpdateVerificationResultRequestDto.js +2 -1
  16. package/lib/esm/models/VCPresentationRequestVerificationResultResponseDto.js +2 -1
  17. package/lib/esm/models/VCPresentationVerificationOptionsDto.js +2 -1
  18. package/lib/esm/models/VCPresentationVerificationResultResponseDto.js +2 -1
  19. package/lib/esm/models/index.js +4 -1
  20. package/lib/types/apis/SharesApi.d.ts +4 -4
  21. package/lib/types/apis/VerifiableCredentialsApi.d.ts +2 -2
  22. package/lib/types/models/VCClaimsDto.d.ts +38 -0
  23. package/lib/types/models/VCCredentialVerificationResultResponseDto.d.ts +1 -0
  24. package/lib/types/models/VCFieldsDto.d.ts +3 -2
  25. package/lib/types/models/VCFieldsDtoFilter.d.ts +43 -0
  26. package/lib/types/models/VCFilterDto.d.ts +43 -0
  27. package/lib/types/models/VCGenerateCredentialDto.d.ts +6 -6
  28. package/lib/types/models/VCGenerateCredentialDtoClaims.d.ts +39 -0
  29. package/lib/types/models/VCIdTokenVerificationResultResponseDto.d.ts +1 -0
  30. package/lib/types/models/VCOldPresentationRequestResponseVerificationResultResponseDto.d.ts +1 -0
  31. package/lib/types/models/VCPresentationRequestResponseVerificationOptionsDto.d.ts +2 -1
  32. package/lib/types/models/VCPresentationRequestResponseVerificationResultResponseDto.d.ts +1 -0
  33. package/lib/types/models/VCPresentationRequestUpdateVerificationResultRequestDto.d.ts +1 -0
  34. package/lib/types/models/VCPresentationRequestVerificationResultResponseDto.d.ts +1 -0
  35. package/lib/types/models/VCPresentationVerificationOptionsDto.d.ts +1 -0
  36. package/lib/types/models/VCPresentationVerificationResultResponseDto.d.ts +1 -0
  37. package/lib/types/models/index.d.ts +4 -1
  38. package/lib/umd/apis/SharesApi.js +4 -4
  39. package/lib/umd/apis/VerifiableCredentialsApi.js +2 -2
  40. package/lib/umd/models/VCClaimsDto.js +53 -0
  41. package/lib/umd/models/VCCredentialVerificationResultResponseDto.js +2 -1
  42. package/lib/umd/models/VCFieldsDto.js +3 -2
  43. package/lib/umd/models/VCFieldsDtoFilter.js +55 -0
  44. package/lib/umd/models/VCFilterDto.js +55 -0
  45. package/lib/umd/models/VCGenerateCredentialDto.js +5 -5
  46. package/lib/umd/models/VCGenerateCredentialDtoClaims.js +47 -0
  47. package/lib/umd/models/VCIdTokenVerificationResultResponseDto.js +2 -1
  48. package/lib/umd/models/VCOldPresentationRequestResponseVerificationResultResponseDto.js +2 -1
  49. package/lib/umd/models/VCPresentationRequestResponseVerificationOptionsDto.js +2 -1
  50. package/lib/umd/models/VCPresentationRequestResponseVerificationResultResponseDto.js +2 -1
  51. package/lib/umd/models/VCPresentationRequestUpdateVerificationResultRequestDto.js +2 -1
  52. package/lib/umd/models/VCPresentationRequestVerificationResultResponseDto.js +2 -1
  53. package/lib/umd/models/VCPresentationVerificationOptionsDto.js +2 -1
  54. package/lib/umd/models/VCPresentationVerificationResultResponseDto.js +2 -1
  55. package/lib/umd/models/index.js +4 -1
  56. package/package.json +1 -1
  57. package/lib/types/models/VCGenerateCredentialDtoCnf.d.ts +0 -31
  58. package/lib/umd/models/VCGenerateCredentialDtoCnf.js +0 -50
@@ -0,0 +1,38 @@
1
+ /**
2
+ * SVX API
3
+ * No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
4
+ *
5
+ * The version of the OpenAPI document: 1.3.1
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ import type { VCCnfDto } from './VCCnfDto';
13
+ /**
14
+ *
15
+ * @export
16
+ * @interface VCClaimsDto
17
+ */
18
+ export interface VCClaimsDto {
19
+ /**
20
+ *
21
+ * @type {string}
22
+ * @memberof VCClaimsDto
23
+ */
24
+ id?: string;
25
+ /**
26
+ *
27
+ * @type {VCCnfDto}
28
+ * @memberof VCClaimsDto
29
+ */
30
+ cnf?: VCCnfDto;
31
+ }
32
+ /**
33
+ * Check if a given object implements the VCClaimsDto interface.
34
+ */
35
+ export declare function instanceOfVCClaimsDto(value: object): boolean;
36
+ export declare function VCClaimsDtoFromJSON(json: any): VCClaimsDto;
37
+ export declare function VCClaimsDtoFromJSONTyped(json: any, ignoreDiscriminator: boolean): VCClaimsDto;
38
+ export declare function VCClaimsDtoToJSON(value?: VCClaimsDto | null): any;
@@ -51,6 +51,7 @@ export declare const VCCredentialVerificationResultResponseDtoChecksEnum: {
51
51
  readonly Nonce: "nonce";
52
52
  readonly Schema: "schema";
53
53
  readonly RevocationStatus: "revocation_status";
54
+ readonly Constraints: "constraints";
54
55
  };
55
56
  export type VCCredentialVerificationResultResponseDtoChecksEnum = typeof VCCredentialVerificationResultResponseDtoChecksEnum[keyof typeof VCCredentialVerificationResultResponseDtoChecksEnum];
56
57
  /**
@@ -9,6 +9,7 @@
9
9
  * https://openapi-generator.tech
10
10
  * Do not edit the class manually.
11
11
  */
12
+ import type { VCFieldsDtoFilter } from './VCFieldsDtoFilter';
12
13
  /**
13
14
  *
14
15
  * @export
@@ -29,10 +30,10 @@ export interface VCFieldsDto {
29
30
  purpose?: string;
30
31
  /**
31
32
  *
32
- * @type {object}
33
+ * @type {VCFieldsDtoFilter}
33
34
  * @memberof VCFieldsDto
34
35
  */
35
- filter?: object;
36
+ filter?: VCFieldsDtoFilter;
36
37
  }
37
38
  /**
38
39
  * Check if a given object implements the VCFieldsDto interface.
@@ -0,0 +1,43 @@
1
+ /**
2
+ * SVX API
3
+ * No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
4
+ *
5
+ * The version of the OpenAPI document: 1.3.1
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ /**
13
+ *
14
+ * @export
15
+ * @interface VCFieldsDtoFilter
16
+ */
17
+ export interface VCFieldsDtoFilter {
18
+ /**
19
+ *
20
+ * @type {string}
21
+ * @memberof VCFieldsDtoFilter
22
+ */
23
+ type: string;
24
+ /**
25
+ * The const can be a number | string | boolean | object.However, since openapi-generator fails to generate correct SDK for swagger file using oneOf property, here it is described only as string
26
+ * @type {string}
27
+ * @memberof VCFieldsDtoFilter
28
+ */
29
+ _const?: string;
30
+ /**
31
+ *
32
+ * @type {string}
33
+ * @memberof VCFieldsDtoFilter
34
+ */
35
+ pattern?: string;
36
+ }
37
+ /**
38
+ * Check if a given object implements the VCFieldsDtoFilter interface.
39
+ */
40
+ export declare function instanceOfVCFieldsDtoFilter(value: object): boolean;
41
+ export declare function VCFieldsDtoFilterFromJSON(json: any): VCFieldsDtoFilter;
42
+ export declare function VCFieldsDtoFilterFromJSONTyped(json: any, ignoreDiscriminator: boolean): VCFieldsDtoFilter;
43
+ export declare function VCFieldsDtoFilterToJSON(value?: VCFieldsDtoFilter | null): any;
@@ -0,0 +1,43 @@
1
+ /**
2
+ * SVX API
3
+ * No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
4
+ *
5
+ * The version of the OpenAPI document: 1.3.1
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ /**
13
+ *
14
+ * @export
15
+ * @interface VCFilterDto
16
+ */
17
+ export interface VCFilterDto {
18
+ /**
19
+ *
20
+ * @type {string}
21
+ * @memberof VCFilterDto
22
+ */
23
+ type: string;
24
+ /**
25
+ * The const can be a number | string | boolean | object.However, since openapi-generator fails to generate correct SDK for swagger file using oneOf property, here it is described only as string
26
+ * @type {string}
27
+ * @memberof VCFilterDto
28
+ */
29
+ _const?: string;
30
+ /**
31
+ *
32
+ * @type {string}
33
+ * @memberof VCFilterDto
34
+ */
35
+ pattern?: string;
36
+ }
37
+ /**
38
+ * Check if a given object implements the VCFilterDto interface.
39
+ */
40
+ export declare function instanceOfVCFilterDto(value: object): boolean;
41
+ export declare function VCFilterDtoFromJSON(json: any): VCFilterDto;
42
+ export declare function VCFilterDtoFromJSONTyped(json: any, ignoreDiscriminator: boolean): VCFilterDto;
43
+ export declare function VCFilterDtoToJSON(value?: VCFilterDto | null): any;
@@ -9,7 +9,7 @@
9
9
  * https://openapi-generator.tech
10
10
  * Do not edit the class manually.
11
11
  */
12
- import type { VCGenerateCredentialDtoCnf } from './VCGenerateCredentialDtoCnf';
12
+ import type { VCGenerateCredentialDtoClaims } from './VCGenerateCredentialDtoClaims';
13
13
  /**
14
14
  *
15
15
  * @export
@@ -30,10 +30,10 @@ export interface VCGenerateCredentialDto {
30
30
  issuer: object;
31
31
  /**
32
32
  *
33
- * @type {object}
33
+ * @type {VCGenerateCredentialDtoClaims}
34
34
  * @memberof VCGenerateCredentialDto
35
35
  */
36
- claims: object;
36
+ claims: VCGenerateCredentialDtoClaims;
37
37
  /**
38
38
  *
39
39
  * @type {boolean}
@@ -47,11 +47,11 @@ export interface VCGenerateCredentialDto {
47
47
  */
48
48
  expires_at?: Date;
49
49
  /**
50
- *
51
- * @type {VCGenerateCredentialDtoCnf}
50
+ * The type of the SD Verifiable Credential, The Type information Can be a string or an array of string.However, since openapi-generator fails to generate correct SDK for swagger file using oneOf property, here it is described only as string
51
+ * @type {string}
52
52
  * @memberof VCGenerateCredentialDto
53
53
  */
54
- cnf?: VCGenerateCredentialDtoCnf;
54
+ type?: string;
55
55
  }
56
56
  /**
57
57
  * Check if a given object implements the VCGenerateCredentialDto interface.
@@ -0,0 +1,39 @@
1
+ /**
2
+ * SVX API
3
+ * No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
4
+ *
5
+ * The version of the OpenAPI document: 1.3.1
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ import type { VCCnfDto } from './VCCnfDto';
13
+ /**
14
+ *
15
+ * @export
16
+ * @interface VCGenerateCredentialDtoClaims
17
+ */
18
+ export interface VCGenerateCredentialDtoClaims {
19
+ [key: string]: any | any;
20
+ /**
21
+ *
22
+ * @type {string}
23
+ * @memberof VCGenerateCredentialDtoClaims
24
+ */
25
+ id?: string;
26
+ /**
27
+ *
28
+ * @type {VCCnfDto}
29
+ * @memberof VCGenerateCredentialDtoClaims
30
+ */
31
+ cnf?: VCCnfDto;
32
+ }
33
+ /**
34
+ * Check if a given object implements the VCGenerateCredentialDtoClaims interface.
35
+ */
36
+ export declare function instanceOfVCGenerateCredentialDtoClaims(value: object): boolean;
37
+ export declare function VCGenerateCredentialDtoClaimsFromJSON(json: any): VCGenerateCredentialDtoClaims;
38
+ export declare function VCGenerateCredentialDtoClaimsFromJSONTyped(json: any, ignoreDiscriminator: boolean): VCGenerateCredentialDtoClaims;
39
+ export declare function VCGenerateCredentialDtoClaimsToJSON(value?: VCGenerateCredentialDtoClaims | null): any;
@@ -45,6 +45,7 @@ export declare const VCIdTokenVerificationResultResponseDtoChecksEnum: {
45
45
  readonly Nonce: "nonce";
46
46
  readonly Schema: "schema";
47
47
  readonly RevocationStatus: "revocation_status";
48
+ readonly Constraints: "constraints";
48
49
  };
49
50
  export type VCIdTokenVerificationResultResponseDtoChecksEnum = typeof VCIdTokenVerificationResultResponseDtoChecksEnum[keyof typeof VCIdTokenVerificationResultResponseDtoChecksEnum];
50
51
  /**
@@ -45,6 +45,7 @@ export declare const VCOldPresentationRequestResponseVerificationResultResponseD
45
45
  readonly Nonce: "nonce";
46
46
  readonly Schema: "schema";
47
47
  readonly RevocationStatus: "revocation_status";
48
+ readonly Constraints: "constraints";
48
49
  };
49
50
  export type VCOldPresentationRequestResponseVerificationResultResponseDtoChecksEnum = typeof VCOldPresentationRequestResponseVerificationResultResponseDtoChecksEnum[keyof typeof VCOldPresentationRequestResponseVerificationResultResponseDtoChecksEnum];
50
51
  /**
@@ -23,7 +23,7 @@ export interface VCPresentationRequestResponseVerificationOptionsDto {
23
23
  * @type {Array<string>}
24
24
  * @memberof VCPresentationRequestResponseVerificationOptionsDto
25
25
  */
26
- checks?: VCPresentationRequestResponseVerificationOptionsDtoChecksEnum;
26
+ checks?: Array<VCPresentationRequestResponseVerificationOptionsDtoChecksEnum>;
27
27
  /**
28
28
  *
29
29
  * @type {VCRequestVerificationOptionsDto}
@@ -48,6 +48,7 @@ export interface VCPresentationRequestResponseVerificationOptionsDto {
48
48
  */
49
49
  export declare const VCPresentationRequestResponseVerificationOptionsDtoChecksEnum: {
50
50
  readonly Format: "format";
51
+ readonly Constraints: "constraints";
51
52
  };
52
53
  export type VCPresentationRequestResponseVerificationOptionsDtoChecksEnum = typeof VCPresentationRequestResponseVerificationOptionsDtoChecksEnum[keyof typeof VCPresentationRequestResponseVerificationOptionsDtoChecksEnum];
53
54
  /**
@@ -66,6 +66,7 @@ export declare const VCPresentationRequestResponseVerificationResultResponseDtoC
66
66
  readonly Nonce: "nonce";
67
67
  readonly Schema: "schema";
68
68
  readonly RevocationStatus: "revocation_status";
69
+ readonly Constraints: "constraints";
69
70
  };
70
71
  export type VCPresentationRequestResponseVerificationResultResponseDtoChecksEnum = typeof VCPresentationRequestResponseVerificationResultResponseDtoChecksEnum[keyof typeof VCPresentationRequestResponseVerificationResultResponseDtoChecksEnum];
71
72
  /**
@@ -66,6 +66,7 @@ export declare const VCPresentationRequestUpdateVerificationResultRequestDtoChec
66
66
  readonly Nonce: "nonce";
67
67
  readonly Schema: "schema";
68
68
  readonly RevocationStatus: "revocation_status";
69
+ readonly Constraints: "constraints";
69
70
  };
70
71
  export type VCPresentationRequestUpdateVerificationResultRequestDtoChecksEnum = typeof VCPresentationRequestUpdateVerificationResultRequestDtoChecksEnum[keyof typeof VCPresentationRequestUpdateVerificationResultRequestDtoChecksEnum];
71
72
  /**
@@ -51,6 +51,7 @@ export declare const VCPresentationRequestVerificationResultResponseDtoChecksEnu
51
51
  readonly Nonce: "nonce";
52
52
  readonly Schema: "schema";
53
53
  readonly RevocationStatus: "revocation_status";
54
+ readonly Constraints: "constraints";
54
55
  };
55
56
  export type VCPresentationRequestVerificationResultResponseDtoChecksEnum = typeof VCPresentationRequestVerificationResultResponseDtoChecksEnum[keyof typeof VCPresentationRequestVerificationResultResponseDtoChecksEnum];
56
57
  /**
@@ -30,6 +30,7 @@ export declare const VCPresentationVerificationOptionsDtoChecksEnum: {
30
30
  readonly Signature: "signature";
31
31
  readonly Expiration: "expiration";
32
32
  readonly Nonce: "nonce";
33
+ readonly Constraints: "constraints";
33
34
  };
34
35
  export type VCPresentationVerificationOptionsDtoChecksEnum = typeof VCPresentationVerificationOptionsDtoChecksEnum[keyof typeof VCPresentationVerificationOptionsDtoChecksEnum];
35
36
  /**
@@ -52,6 +52,7 @@ export declare const VCPresentationVerificationResultResponseDtoChecksEnum: {
52
52
  readonly Nonce: "nonce";
53
53
  readonly Schema: "schema";
54
54
  readonly RevocationStatus: "revocation_status";
55
+ readonly Constraints: "constraints";
55
56
  };
56
57
  export type VCPresentationVerificationResultResponseDtoChecksEnum = typeof VCPresentationVerificationResultResponseDtoChecksEnum[keyof typeof VCPresentationVerificationResultResponseDtoChecksEnum];
57
58
  /**
@@ -246,6 +246,7 @@ export * from './ShreIntentListResponse';
246
246
  export * from './UpdateDelegationsRequest';
247
247
  export * from './VCApp';
248
248
  export * from './VCAppSignal';
249
+ export * from './VCClaimsDto';
249
250
  export * from './VCCnfDto';
250
251
  export * from './VCComponent';
251
252
  export * from './VCConstraintsDto';
@@ -278,9 +279,11 @@ export * from './VCDatabase';
278
279
  export * from './VCErrorResponseDto';
279
280
  export * from './VCErrorsResponseDto';
280
281
  export * from './VCFieldsDto';
282
+ export * from './VCFieldsDtoFilter';
283
+ export * from './VCFilterDto';
281
284
  export * from './VCFormatDto';
282
285
  export * from './VCGenerateCredentialDto';
283
- export * from './VCGenerateCredentialDtoCnf';
286
+ export * from './VCGenerateCredentialDtoClaims';
284
287
  export * from './VCGenerateCredentialPayloadDto';
285
288
  export * from './VCGeneratePresentationDto';
286
289
  export * from './VCGeneratePresentationPayloadDto';
@@ -373,7 +373,7 @@ class SharesApi extends runtime.BaseAPI {
373
373
  });
374
374
  }
375
375
  /**
376
- * Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `encrypted_value_verification_key` when creating or updating the share. When other senders create a share, `encrypted_value_verification_key` must be `NULL`. `value_verification_hash` may and should be sent by every sender, owner or not, because `value_verification_hash` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
376
+ * Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
377
377
  * Share your item with connected users
378
378
  */
379
379
  itemsIdSharesPostRaw(requestParameters, initOverrides) {
@@ -408,7 +408,7 @@ class SharesApi extends runtime.BaseAPI {
408
408
  });
409
409
  }
410
410
  /**
411
- * Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `encrypted_value_verification_key` when creating or updating the share. When other senders create a share, `encrypted_value_verification_key` must be `NULL`. `value_verification_hash` may and should be sent by every sender, owner or not, because `value_verification_hash` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
411
+ * Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
412
412
  * Share your item with connected users
413
413
  */
414
414
  itemsIdSharesPost(id, meecoDelegationId, meecoOrganisationId, postItemSharesRequest, initOverrides) {
@@ -418,7 +418,7 @@ class SharesApi extends runtime.BaseAPI {
418
418
  });
419
419
  }
420
420
  /**
421
- * Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `encrypted_value_verification_key` when creating or updating the share. When other senders create a share, `encrypted_value_verification_key` must be `NULL`. `value_verification_hash` may and should be sent by every sender, owner or not, because `value_verification_hash` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
421
+ * Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
422
422
  * Update all shares of one item
423
423
  */
424
424
  itemsIdSharesPutRaw(requestParameters, initOverrides) {
@@ -453,7 +453,7 @@ class SharesApi extends runtime.BaseAPI {
453
453
  });
454
454
  }
455
455
  /**
456
- * Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `encrypted_value_verification_key` when creating or updating the share. When other senders create a share, `encrypted_value_verification_key` must be `NULL`. `value_verification_hash` may and should be sent by every sender, owner or not, because `value_verification_hash` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
456
+ * Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
457
457
  * Update all shares of one item
458
458
  */
459
459
  itemsIdSharesPut(id, meecoDelegationId, meecoOrganisationId, putItemSharesRequest, initOverrides) {
@@ -330,7 +330,7 @@ class VerifiableCredentialsApi extends runtime.BaseAPI {
330
330
  });
331
331
  }
332
332
  /**
333
- * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p>
333
+ * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
334
334
  * Generate credential based on type and claims provided
335
335
  */
336
336
  credentialsGeneratePostRaw(requestParameters, initOverrides) {
@@ -368,7 +368,7 @@ class VerifiableCredentialsApi extends runtime.BaseAPI {
368
368
  });
369
369
  }
370
370
  /**
371
- * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p>
371
+ * <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
372
372
  * Generate credential based on type and claims provided
373
373
  */
374
374
  credentialsGeneratePost(meecoOrganisationID, vCGenerateCredentialPayloadDto, accept, initOverrides) {
@@ -0,0 +1,53 @@
1
+ "use strict";
2
+ /* tslint:disable */
3
+ /* eslint-disable */
4
+ /**
5
+ * SVX API
6
+ * No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
7
+ *
8
+ * The version of the OpenAPI document: 1.3.1
9
+ *
10
+ *
11
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
12
+ * https://openapi-generator.tech
13
+ * Do not edit the class manually.
14
+ */
15
+ Object.defineProperty(exports, "__esModule", { value: true });
16
+ exports.VCClaimsDtoToJSON = exports.VCClaimsDtoFromJSONTyped = exports.VCClaimsDtoFromJSON = exports.instanceOfVCClaimsDto = void 0;
17
+ const runtime_1 = require("../runtime");
18
+ const VCCnfDto_1 = require("./VCCnfDto");
19
+ /**
20
+ * Check if a given object implements the VCClaimsDto interface.
21
+ */
22
+ function instanceOfVCClaimsDto(value) {
23
+ let isInstance = true;
24
+ return isInstance;
25
+ }
26
+ exports.instanceOfVCClaimsDto = instanceOfVCClaimsDto;
27
+ function VCClaimsDtoFromJSON(json) {
28
+ return VCClaimsDtoFromJSONTyped(json, false);
29
+ }
30
+ exports.VCClaimsDtoFromJSON = VCClaimsDtoFromJSON;
31
+ function VCClaimsDtoFromJSONTyped(json, ignoreDiscriminator) {
32
+ if ((json === undefined) || (json === null)) {
33
+ return json;
34
+ }
35
+ return {
36
+ 'id': !(0, runtime_1.exists)(json, 'id') ? undefined : json['id'],
37
+ 'cnf': !(0, runtime_1.exists)(json, 'cnf') ? undefined : (0, VCCnfDto_1.VCCnfDtoFromJSON)(json['cnf']),
38
+ };
39
+ }
40
+ exports.VCClaimsDtoFromJSONTyped = VCClaimsDtoFromJSONTyped;
41
+ function VCClaimsDtoToJSON(value) {
42
+ if (value === undefined) {
43
+ return undefined;
44
+ }
45
+ if (value === null) {
46
+ return null;
47
+ }
48
+ return {
49
+ 'id': value.id,
50
+ 'cnf': (0, VCCnfDto_1.VCCnfDtoToJSON)(value.cnf),
51
+ };
52
+ }
53
+ exports.VCClaimsDtoToJSON = VCClaimsDtoToJSON;
@@ -24,7 +24,8 @@ exports.VCCredentialVerificationResultResponseDtoChecksEnum = {
24
24
  Expiration: 'expiration',
25
25
  Nonce: 'nonce',
26
26
  Schema: 'schema',
27
- RevocationStatus: 'revocation_status'
27
+ RevocationStatus: 'revocation_status',
28
+ Constraints: 'constraints'
28
29
  };
29
30
  /**
30
31
  * Check if a given object implements the VCCredentialVerificationResultResponseDto interface.
@@ -15,6 +15,7 @@
15
15
  Object.defineProperty(exports, "__esModule", { value: true });
16
16
  exports.VCFieldsDtoToJSON = exports.VCFieldsDtoFromJSONTyped = exports.VCFieldsDtoFromJSON = exports.instanceOfVCFieldsDto = void 0;
17
17
  const runtime_1 = require("../runtime");
18
+ const VCFieldsDtoFilter_1 = require("./VCFieldsDtoFilter");
18
19
  /**
19
20
  * Check if a given object implements the VCFieldsDto interface.
20
21
  */
@@ -35,7 +36,7 @@ function VCFieldsDtoFromJSONTyped(json, ignoreDiscriminator) {
35
36
  return {
36
37
  'path': json['path'],
37
38
  'purpose': !(0, runtime_1.exists)(json, 'purpose') ? undefined : json['purpose'],
38
- 'filter': !(0, runtime_1.exists)(json, 'filter') ? undefined : json['filter'],
39
+ 'filter': !(0, runtime_1.exists)(json, 'filter') ? undefined : (0, VCFieldsDtoFilter_1.VCFieldsDtoFilterFromJSON)(json['filter']),
39
40
  };
40
41
  }
41
42
  exports.VCFieldsDtoFromJSONTyped = VCFieldsDtoFromJSONTyped;
@@ -49,7 +50,7 @@ function VCFieldsDtoToJSON(value) {
49
50
  return {
50
51
  'path': value.path,
51
52
  'purpose': value.purpose,
52
- 'filter': value.filter,
53
+ 'filter': (0, VCFieldsDtoFilter_1.VCFieldsDtoFilterToJSON)(value.filter),
53
54
  };
54
55
  }
55
56
  exports.VCFieldsDtoToJSON = VCFieldsDtoToJSON;
@@ -0,0 +1,55 @@
1
+ "use strict";
2
+ /* tslint:disable */
3
+ /* eslint-disable */
4
+ /**
5
+ * SVX API
6
+ * No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
7
+ *
8
+ * The version of the OpenAPI document: 1.3.1
9
+ *
10
+ *
11
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
12
+ * https://openapi-generator.tech
13
+ * Do not edit the class manually.
14
+ */
15
+ Object.defineProperty(exports, "__esModule", { value: true });
16
+ exports.VCFieldsDtoFilterToJSON = exports.VCFieldsDtoFilterFromJSONTyped = exports.VCFieldsDtoFilterFromJSON = exports.instanceOfVCFieldsDtoFilter = void 0;
17
+ const runtime_1 = require("../runtime");
18
+ /**
19
+ * Check if a given object implements the VCFieldsDtoFilter interface.
20
+ */
21
+ function instanceOfVCFieldsDtoFilter(value) {
22
+ let isInstance = true;
23
+ isInstance = isInstance && "type" in value;
24
+ return isInstance;
25
+ }
26
+ exports.instanceOfVCFieldsDtoFilter = instanceOfVCFieldsDtoFilter;
27
+ function VCFieldsDtoFilterFromJSON(json) {
28
+ return VCFieldsDtoFilterFromJSONTyped(json, false);
29
+ }
30
+ exports.VCFieldsDtoFilterFromJSON = VCFieldsDtoFilterFromJSON;
31
+ function VCFieldsDtoFilterFromJSONTyped(json, ignoreDiscriminator) {
32
+ if ((json === undefined) || (json === null)) {
33
+ return json;
34
+ }
35
+ return {
36
+ 'type': json['type'],
37
+ '_const': !(0, runtime_1.exists)(json, 'const') ? undefined : json['const'],
38
+ 'pattern': !(0, runtime_1.exists)(json, 'pattern') ? undefined : json['pattern'],
39
+ };
40
+ }
41
+ exports.VCFieldsDtoFilterFromJSONTyped = VCFieldsDtoFilterFromJSONTyped;
42
+ function VCFieldsDtoFilterToJSON(value) {
43
+ if (value === undefined) {
44
+ return undefined;
45
+ }
46
+ if (value === null) {
47
+ return null;
48
+ }
49
+ return {
50
+ 'type': value.type,
51
+ 'const': value._const,
52
+ 'pattern': value.pattern,
53
+ };
54
+ }
55
+ exports.VCFieldsDtoFilterToJSON = VCFieldsDtoFilterToJSON;