@meeco/svx-api-sdk 1.0.0-stage.20231211153548.58a6d84 → 1.0.0-stage.20240301124316.cffdd63
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +8 -2
- package/lib/esm/apis/OrganisationsApi.js +5 -2
- package/lib/esm/apis/SharesApi.js +4 -4
- package/lib/esm/apis/VerifiableCredentialsApi.js +2 -2
- package/lib/esm/models/{ATOMOrgIdAndName.js → ATOMAdministeredArchivedOrg.js} +6 -6
- package/lib/esm/models/ATOMAdministeredOrg.js +60 -0
- package/lib/esm/models/ATOMWhoAmI.js +9 -3
- package/lib/esm/models/IDPForgotPasswordDto.js +43 -0
- package/lib/esm/models/IDPLoginRequestDto.js +3 -0
- package/lib/esm/models/{VCGenerateCredentialDtoCnf.js → IDPResetPasswordDto.js} +9 -9
- package/lib/esm/models/VCClaimsDto.js +46 -0
- package/lib/esm/models/VCCredentialVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCFieldsDto.js +3 -2
- package/lib/esm/models/VCFieldsDtoFilter.js +48 -0
- package/lib/esm/models/VCFilterDto.js +48 -0
- package/lib/esm/models/VCGenerateCredentialDto.js +5 -5
- package/lib/esm/models/VCGenerateCredentialDtoClaims.js +40 -0
- package/lib/esm/models/VCIdTokenVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCOldPresentationRequestResponseVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCPresentationRequestResponseVerificationOptionsDto.js +2 -1
- package/lib/esm/models/VCPresentationRequestResponseVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCPresentationRequestUpdateVerificationResultRequestDto.js +2 -1
- package/lib/esm/models/VCPresentationRequestVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCPresentationVerificationOptionsDto.js +2 -1
- package/lib/esm/models/VCPresentationVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/index.js +8 -2
- package/lib/types/apis/OrganisationsApi.d.ts +2 -1
- package/lib/types/apis/SharesApi.d.ts +4 -4
- package/lib/types/apis/VerifiableCredentialsApi.d.ts +2 -2
- package/lib/types/models/{ATOMOrgIdAndName.d.ts → ATOMAdministeredArchivedOrg.d.ts} +13 -13
- package/lib/types/models/ATOMAdministeredOrg.d.ts +67 -0
- package/lib/types/models/ATOMTenantInJwtForWhoAmI.d.ts +1 -1
- package/lib/types/models/ATOMWhoAmI.d.ts +16 -3
- package/lib/types/models/IDPForgotPasswordDto.d.ts +31 -0
- package/lib/types/models/IDPLoginRequestDto.d.ts +6 -0
- package/lib/types/models/IDPResetPasswordDto.d.ts +31 -0
- package/lib/types/models/VCClaimsDto.d.ts +38 -0
- package/lib/types/models/VCCredentialVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCFieldsDto.d.ts +3 -2
- package/lib/types/models/VCFieldsDtoFilter.d.ts +43 -0
- package/lib/types/models/VCFilterDto.d.ts +43 -0
- package/lib/types/models/VCGenerateCredentialDto.d.ts +6 -6
- package/lib/types/models/VCGenerateCredentialDtoClaims.d.ts +39 -0
- package/lib/types/models/VCIdTokenVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCOldPresentationRequestResponseVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCPresentationRequestResponseVerificationOptionsDto.d.ts +2 -1
- package/lib/types/models/VCPresentationRequestResponseVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCPresentationRequestUpdateVerificationResultRequestDto.d.ts +1 -0
- package/lib/types/models/VCPresentationRequestVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCPresentationVerificationOptionsDto.d.ts +1 -0
- package/lib/types/models/VCPresentationVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/index.d.ts +8 -2
- package/lib/umd/apis/OrganisationsApi.js +5 -2
- package/lib/umd/apis/SharesApi.js +4 -4
- package/lib/umd/apis/VerifiableCredentialsApi.js +2 -2
- package/lib/umd/models/{ATOMOrgIdAndName.js → ATOMAdministeredArchivedOrg.js} +11 -11
- package/lib/umd/models/ATOMAdministeredOrg.js +67 -0
- package/lib/umd/models/ATOMWhoAmI.js +9 -3
- package/lib/umd/models/IDPForgotPasswordDto.js +50 -0
- package/lib/umd/models/IDPLoginRequestDto.js +3 -0
- package/lib/umd/models/IDPResetPasswordDto.js +50 -0
- package/lib/umd/models/VCClaimsDto.js +53 -0
- package/lib/umd/models/VCCredentialVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCFieldsDto.js +3 -2
- package/lib/umd/models/VCFieldsDtoFilter.js +55 -0
- package/lib/umd/models/VCFilterDto.js +55 -0
- package/lib/umd/models/VCGenerateCredentialDto.js +5 -5
- package/lib/umd/models/VCGenerateCredentialDtoClaims.js +47 -0
- package/lib/umd/models/VCIdTokenVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCOldPresentationRequestResponseVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCPresentationRequestResponseVerificationOptionsDto.js +2 -1
- package/lib/umd/models/VCPresentationRequestResponseVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCPresentationRequestUpdateVerificationResultRequestDto.js +2 -1
- package/lib/umd/models/VCPresentationRequestVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCPresentationVerificationOptionsDto.js +2 -1
- package/lib/umd/models/VCPresentationVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/index.js +8 -2
- package/package.json +1 -1
- package/lib/types/models/VCGenerateCredentialDtoCnf.d.ts +0 -31
- package/lib/umd/models/VCGenerateCredentialDtoCnf.js +0 -50
|
@@ -0,0 +1,40 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* SVX API
|
|
5
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 1.3.1
|
|
8
|
+
*
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
import { exists } from '../runtime';
|
|
15
|
+
import { VCCnfDtoFromJSON, VCCnfDtoToJSON, } from './VCCnfDto';
|
|
16
|
+
/**
|
|
17
|
+
* Check if a given object implements the VCGenerateCredentialDtoClaims interface.
|
|
18
|
+
*/
|
|
19
|
+
export function instanceOfVCGenerateCredentialDtoClaims(value) {
|
|
20
|
+
let isInstance = true;
|
|
21
|
+
return isInstance;
|
|
22
|
+
}
|
|
23
|
+
export function VCGenerateCredentialDtoClaimsFromJSON(json) {
|
|
24
|
+
return VCGenerateCredentialDtoClaimsFromJSONTyped(json, false);
|
|
25
|
+
}
|
|
26
|
+
export function VCGenerateCredentialDtoClaimsFromJSONTyped(json, ignoreDiscriminator) {
|
|
27
|
+
if ((json === undefined) || (json === null)) {
|
|
28
|
+
return json;
|
|
29
|
+
}
|
|
30
|
+
return Object.assign(Object.assign({}, json), { 'id': !exists(json, 'id') ? undefined : json['id'], 'cnf': !exists(json, 'cnf') ? undefined : VCCnfDtoFromJSON(json['cnf']) });
|
|
31
|
+
}
|
|
32
|
+
export function VCGenerateCredentialDtoClaimsToJSON(value) {
|
|
33
|
+
if (value === undefined) {
|
|
34
|
+
return undefined;
|
|
35
|
+
}
|
|
36
|
+
if (value === null) {
|
|
37
|
+
return null;
|
|
38
|
+
}
|
|
39
|
+
return Object.assign(Object.assign({}, value), { 'id': value.id, 'cnf': VCCnfDtoToJSON(value.cnf) });
|
|
40
|
+
}
|
|
@@ -21,7 +21,8 @@ export const VCIdTokenVerificationResultResponseDtoChecksEnum = {
|
|
|
21
21
|
Expiration: 'expiration',
|
|
22
22
|
Nonce: 'nonce',
|
|
23
23
|
Schema: 'schema',
|
|
24
|
-
RevocationStatus: 'revocation_status'
|
|
24
|
+
RevocationStatus: 'revocation_status',
|
|
25
|
+
Constraints: 'constraints'
|
|
25
26
|
};
|
|
26
27
|
/**
|
|
27
28
|
* Check if a given object implements the VCIdTokenVerificationResultResponseDto interface.
|
|
@@ -21,7 +21,8 @@ export const VCOldPresentationRequestResponseVerificationResultResponseDtoChecks
|
|
|
21
21
|
Expiration: 'expiration',
|
|
22
22
|
Nonce: 'nonce',
|
|
23
23
|
Schema: 'schema',
|
|
24
|
-
RevocationStatus: 'revocation_status'
|
|
24
|
+
RevocationStatus: 'revocation_status',
|
|
25
|
+
Constraints: 'constraints'
|
|
25
26
|
};
|
|
26
27
|
/**
|
|
27
28
|
* Check if a given object implements the VCOldPresentationRequestResponseVerificationResultResponseDto interface.
|
|
@@ -19,7 +19,8 @@ import { VCRequestVerificationOptionsDtoFromJSON, VCRequestVerificationOptionsDt
|
|
|
19
19
|
* @export
|
|
20
20
|
*/
|
|
21
21
|
export const VCPresentationRequestResponseVerificationOptionsDtoChecksEnum = {
|
|
22
|
-
Format: 'format'
|
|
22
|
+
Format: 'format',
|
|
23
|
+
Constraints: 'constraints'
|
|
23
24
|
};
|
|
24
25
|
/**
|
|
25
26
|
* Check if a given object implements the VCPresentationRequestResponseVerificationOptionsDto interface.
|
|
@@ -24,7 +24,8 @@ export const VCPresentationRequestResponseVerificationResultResponseDtoChecksEnu
|
|
|
24
24
|
Expiration: 'expiration',
|
|
25
25
|
Nonce: 'nonce',
|
|
26
26
|
Schema: 'schema',
|
|
27
|
-
RevocationStatus: 'revocation_status'
|
|
27
|
+
RevocationStatus: 'revocation_status',
|
|
28
|
+
Constraints: 'constraints'
|
|
28
29
|
};
|
|
29
30
|
/**
|
|
30
31
|
* Check if a given object implements the VCPresentationRequestResponseVerificationResultResponseDto interface.
|
|
@@ -24,7 +24,8 @@ export const VCPresentationRequestUpdateVerificationResultRequestDtoChecksEnum =
|
|
|
24
24
|
Expiration: 'expiration',
|
|
25
25
|
Nonce: 'nonce',
|
|
26
26
|
Schema: 'schema',
|
|
27
|
-
RevocationStatus: 'revocation_status'
|
|
27
|
+
RevocationStatus: 'revocation_status',
|
|
28
|
+
Constraints: 'constraints'
|
|
28
29
|
};
|
|
29
30
|
/**
|
|
30
31
|
* Check if a given object implements the VCPresentationRequestUpdateVerificationResultRequestDto interface.
|
|
@@ -21,7 +21,8 @@ export const VCPresentationRequestVerificationResultResponseDtoChecksEnum = {
|
|
|
21
21
|
Expiration: 'expiration',
|
|
22
22
|
Nonce: 'nonce',
|
|
23
23
|
Schema: 'schema',
|
|
24
|
-
RevocationStatus: 'revocation_status'
|
|
24
|
+
RevocationStatus: 'revocation_status',
|
|
25
|
+
Constraints: 'constraints'
|
|
25
26
|
};
|
|
26
27
|
/**
|
|
27
28
|
* Check if a given object implements the VCPresentationRequestVerificationResultResponseDto interface.
|
|
@@ -19,7 +19,8 @@ export const VCPresentationVerificationOptionsDtoChecksEnum = {
|
|
|
19
19
|
Format: 'format',
|
|
20
20
|
Signature: 'signature',
|
|
21
21
|
Expiration: 'expiration',
|
|
22
|
-
Nonce: 'nonce'
|
|
22
|
+
Nonce: 'nonce',
|
|
23
|
+
Constraints: 'constraints'
|
|
23
24
|
};
|
|
24
25
|
/**
|
|
25
26
|
* Check if a given object implements the VCPresentationVerificationOptionsDto interface.
|
|
@@ -22,7 +22,8 @@ export const VCPresentationVerificationResultResponseDtoChecksEnum = {
|
|
|
22
22
|
Expiration: 'expiration',
|
|
23
23
|
Nonce: 'nonce',
|
|
24
24
|
Schema: 'schema',
|
|
25
|
-
RevocationStatus: 'revocation_status'
|
|
25
|
+
RevocationStatus: 'revocation_status',
|
|
26
|
+
Constraints: 'constraints'
|
|
26
27
|
};
|
|
27
28
|
/**
|
|
28
29
|
* Check if a given object implements the VCPresentationVerificationResultResponseDto interface.
|
package/lib/esm/models/index.js
CHANGED
|
@@ -2,6 +2,8 @@
|
|
|
2
2
|
/* eslint-disable */
|
|
3
3
|
export * from './ATOMActiveAndArchivedOrgList';
|
|
4
4
|
export * from './ATOMAdmin';
|
|
5
|
+
export * from './ATOMAdministeredArchivedOrg';
|
|
6
|
+
export * from './ATOMAdministeredOrg';
|
|
5
7
|
export * from './ATOMAgentList';
|
|
6
8
|
export * from './ATOMAgentToken';
|
|
7
9
|
export * from './ATOMApplicationVersion';
|
|
@@ -25,7 +27,6 @@ export * from './ATOMOneUser';
|
|
|
25
27
|
export * from './ATOMOrg';
|
|
26
28
|
export * from './ATOMOrgAgent';
|
|
27
29
|
export * from './ATOMOrgDescription';
|
|
28
|
-
export * from './ATOMOrgIdAndName';
|
|
29
30
|
export * from './ATOMOrgList';
|
|
30
31
|
export * from './ATOMPaginatedAdminList';
|
|
31
32
|
export * from './ATOMPaginatedOrgList';
|
|
@@ -151,6 +152,7 @@ export * from './IDPEndUserResponseModelDto';
|
|
|
151
152
|
export * from './IDPEndUsersResponseDto';
|
|
152
153
|
export * from './IDPErrorResponseModel';
|
|
153
154
|
export * from './IDPErrorsResponseModelDto';
|
|
155
|
+
export * from './IDPForgotPasswordDto';
|
|
154
156
|
export * from './IDPGenerateShortLivedAccessTokenDto';
|
|
155
157
|
export * from './IDPGenerateShortLivedAccessTokenPayloadDto';
|
|
156
158
|
export * from './IDPInvitationResponseDto';
|
|
@@ -161,6 +163,7 @@ export * from './IDPJwtIssuerJWKSKeys';
|
|
|
161
163
|
export * from './IDPJwtIssuerResponseDto';
|
|
162
164
|
export * from './IDPLoginRequestDto';
|
|
163
165
|
export * from './IDPMeta';
|
|
166
|
+
export * from './IDPResetPasswordDto';
|
|
164
167
|
export * from './IDPUpdateClientDto';
|
|
165
168
|
export * from './IDPUpdateClientPayloadDto';
|
|
166
169
|
export * from './IDPUserDto';
|
|
@@ -248,6 +251,7 @@ export * from './ShreIntentListResponse';
|
|
|
248
251
|
export * from './UpdateDelegationsRequest';
|
|
249
252
|
export * from './VCApp';
|
|
250
253
|
export * from './VCAppSignal';
|
|
254
|
+
export * from './VCClaimsDto';
|
|
251
255
|
export * from './VCCnfDto';
|
|
252
256
|
export * from './VCComponent';
|
|
253
257
|
export * from './VCConstraintsDto';
|
|
@@ -280,9 +284,11 @@ export * from './VCDatabase';
|
|
|
280
284
|
export * from './VCErrorResponseDto';
|
|
281
285
|
export * from './VCErrorsResponseDto';
|
|
282
286
|
export * from './VCFieldsDto';
|
|
287
|
+
export * from './VCFieldsDtoFilter';
|
|
288
|
+
export * from './VCFilterDto';
|
|
283
289
|
export * from './VCFormatDto';
|
|
284
290
|
export * from './VCGenerateCredentialDto';
|
|
285
|
-
export * from './
|
|
291
|
+
export * from './VCGenerateCredentialDtoClaims';
|
|
286
292
|
export * from './VCGenerateCredentialPayloadDto';
|
|
287
293
|
export * from './VCGeneratePresentationDto';
|
|
288
294
|
export * from './VCGeneratePresentationPayloadDto';
|
|
@@ -102,6 +102,7 @@ export interface TenantsTenantIdOrgsPostRequest {
|
|
|
102
102
|
tenantId: string;
|
|
103
103
|
aTOMCreateOrUpdateOrgRequest: ATOMCreateOrUpdateOrgRequest;
|
|
104
104
|
noFirstUser?: boolean;
|
|
105
|
+
addAllExternalSecurityRights?: boolean;
|
|
105
106
|
}
|
|
106
107
|
export interface VisibleOrgsGetRequest {
|
|
107
108
|
tenantId?: string;
|
|
@@ -309,7 +310,7 @@ export declare class OrganisationsApi extends runtime.BaseAPI {
|
|
|
309
310
|
* Create an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant with the ID in parameter `tenant_id`.
|
|
310
311
|
* Create an organisation
|
|
311
312
|
*/
|
|
312
|
-
tenantsTenantIdOrgsPost(tenantId: string, aTOMCreateOrUpdateOrgRequest: ATOMCreateOrUpdateOrgRequest, noFirstUser?: boolean, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<ATOMOneOrg>;
|
|
313
|
+
tenantsTenantIdOrgsPost(tenantId: string, aTOMCreateOrUpdateOrgRequest: ATOMCreateOrUpdateOrgRequest, noFirstUser?: boolean, addAllExternalSecurityRights?: boolean, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<ATOMOneOrg>;
|
|
313
314
|
/**
|
|
314
315
|
* Show a list of organisations which the current user can see. These are the following organisations: * If the current user has global security right `atom:global:view_all_tenants`, all organisations are shown * Organisations of all tenants for which the current user has tenant security right `atom:tenant:view_tenant_orgs` * Organisations for which current user is an admin and has security right `atom:org:view_org` Can take optional parameter `tenant_id` which will restrict the list of organisations to one tenant only.
|
|
315
316
|
* Show a list of organisations which current user can see.
|
|
@@ -183,22 +183,22 @@ export declare class SharesApi extends runtime.BaseAPI {
|
|
|
183
183
|
*/
|
|
184
184
|
itemsIdSharesGet(id: string, meecoDelegationId?: string, meecoOrganisationId?: string, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<GetItemSharesResponse>;
|
|
185
185
|
/**
|
|
186
|
-
* Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `
|
|
186
|
+
* Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
|
|
187
187
|
* Share your item with connected users
|
|
188
188
|
*/
|
|
189
189
|
itemsIdSharesPostRaw(requestParameters: ItemsIdSharesPostRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<VaultSharesCreateResponse>>;
|
|
190
190
|
/**
|
|
191
|
-
* Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `
|
|
191
|
+
* Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
|
|
192
192
|
* Share your item with connected users
|
|
193
193
|
*/
|
|
194
194
|
itemsIdSharesPost(id: string, meecoDelegationId?: string, meecoOrganisationId?: string, postItemSharesRequest?: PostItemSharesRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<VaultSharesCreateResponse>;
|
|
195
195
|
/**
|
|
196
|
-
* Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `
|
|
196
|
+
* Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
|
|
197
197
|
* Update all shares of one item
|
|
198
198
|
*/
|
|
199
199
|
itemsIdSharesPutRaw(requestParameters: ItemsIdSharesPutRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<ItemSharesUpdateResponse>>;
|
|
200
200
|
/**
|
|
201
|
-
* Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `
|
|
201
|
+
* Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
|
|
202
202
|
* Update all shares of one item
|
|
203
203
|
*/
|
|
204
204
|
itemsIdSharesPut(id: string, meecoDelegationId?: string, meecoOrganisationId?: string, putItemSharesRequest?: PutItemSharesRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<ItemSharesUpdateResponse>;
|
|
@@ -162,12 +162,12 @@ export declare class VerifiableCredentialsApi extends runtime.BaseAPI {
|
|
|
162
162
|
*/
|
|
163
163
|
credentialTypesPost(meecoOrganisationID: string, vCCreateCredentialTypePayloadDto: VCCreateCredentialTypePayloadDto, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<VCCredentialTypeResponseDto>;
|
|
164
164
|
/**
|
|
165
|
-
* <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p>
|
|
165
|
+
* <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
|
|
166
166
|
* Generate credential based on type and claims provided
|
|
167
167
|
*/
|
|
168
168
|
credentialsGeneratePostRaw(requestParameters: CredentialsGeneratePostRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<VCUnsignedCredentialResponseDto>>;
|
|
169
169
|
/**
|
|
170
|
-
* <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p>
|
|
170
|
+
* <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
|
|
171
171
|
* Generate credential based on type and claims provided
|
|
172
172
|
*/
|
|
173
173
|
credentialsGeneratePost(meecoOrganisationID: string, vCGenerateCredentialPayloadDto: VCGenerateCredentialPayloadDto, accept?: CredentialsGeneratePostAcceptEnum, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<VCUnsignedCredentialResponseDto>;
|
|
@@ -12,50 +12,50 @@
|
|
|
12
12
|
/**
|
|
13
13
|
*
|
|
14
14
|
* @export
|
|
15
|
-
* @interface
|
|
15
|
+
* @interface ATOMAdministeredArchivedOrg
|
|
16
16
|
*/
|
|
17
|
-
export interface
|
|
17
|
+
export interface ATOMAdministeredArchivedOrg {
|
|
18
18
|
/**
|
|
19
19
|
* The color associated with the tenant. Used for the UI.
|
|
20
20
|
* @type {string}
|
|
21
|
-
* @memberof
|
|
21
|
+
* @memberof ATOMAdministeredArchivedOrg
|
|
22
22
|
*/
|
|
23
23
|
color: string;
|
|
24
24
|
/**
|
|
25
25
|
* ID of an organisation
|
|
26
26
|
* @type {string}
|
|
27
|
-
* @memberof
|
|
27
|
+
* @memberof ATOMAdministeredArchivedOrg
|
|
28
28
|
*/
|
|
29
29
|
id: string;
|
|
30
30
|
/**
|
|
31
31
|
* URL to a logo image
|
|
32
32
|
* @type {string}
|
|
33
|
-
* @memberof
|
|
33
|
+
* @memberof ATOMAdministeredArchivedOrg
|
|
34
34
|
*/
|
|
35
35
|
logo_url: string;
|
|
36
36
|
/**
|
|
37
37
|
* Name of the organisation
|
|
38
38
|
* @type {string}
|
|
39
|
-
* @memberof
|
|
39
|
+
* @memberof ATOMAdministeredArchivedOrg
|
|
40
40
|
*/
|
|
41
41
|
name: string;
|
|
42
42
|
/**
|
|
43
43
|
*
|
|
44
44
|
* @type {boolean}
|
|
45
|
-
* @memberof
|
|
45
|
+
* @memberof ATOMAdministeredArchivedOrg
|
|
46
46
|
*/
|
|
47
47
|
tenant_active?: boolean;
|
|
48
48
|
/**
|
|
49
49
|
* ID of the tenant of the organisation
|
|
50
50
|
* @type {string}
|
|
51
|
-
* @memberof
|
|
51
|
+
* @memberof ATOMAdministeredArchivedOrg
|
|
52
52
|
*/
|
|
53
53
|
tenant_id: string;
|
|
54
54
|
}
|
|
55
55
|
/**
|
|
56
|
-
* Check if a given object implements the
|
|
56
|
+
* Check if a given object implements the ATOMAdministeredArchivedOrg interface.
|
|
57
57
|
*/
|
|
58
|
-
export declare function
|
|
59
|
-
export declare function
|
|
60
|
-
export declare function
|
|
61
|
-
export declare function
|
|
58
|
+
export declare function instanceOfATOMAdministeredArchivedOrg(value: object): boolean;
|
|
59
|
+
export declare function ATOMAdministeredArchivedOrgFromJSON(json: any): ATOMAdministeredArchivedOrg;
|
|
60
|
+
export declare function ATOMAdministeredArchivedOrgFromJSONTyped(json: any, ignoreDiscriminator: boolean): ATOMAdministeredArchivedOrg;
|
|
61
|
+
export declare function ATOMAdministeredArchivedOrgToJSON(value?: ATOMAdministeredArchivedOrg | null): any;
|
|
@@ -0,0 +1,67 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* SVX API
|
|
3
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 1.3.1
|
|
6
|
+
*
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
/**
|
|
13
|
+
*
|
|
14
|
+
* @export
|
|
15
|
+
* @interface ATOMAdministeredOrg
|
|
16
|
+
*/
|
|
17
|
+
export interface ATOMAdministeredOrg {
|
|
18
|
+
/**
|
|
19
|
+
* The color associated with the tenant. Used for the UI.
|
|
20
|
+
* @type {string}
|
|
21
|
+
* @memberof ATOMAdministeredOrg
|
|
22
|
+
*/
|
|
23
|
+
color: string;
|
|
24
|
+
/**
|
|
25
|
+
* ID of an organisation
|
|
26
|
+
* @type {string}
|
|
27
|
+
* @memberof ATOMAdministeredOrg
|
|
28
|
+
*/
|
|
29
|
+
id: string;
|
|
30
|
+
/**
|
|
31
|
+
* URL to a logo image
|
|
32
|
+
* @type {string}
|
|
33
|
+
* @memberof ATOMAdministeredOrg
|
|
34
|
+
*/
|
|
35
|
+
logo_url: string;
|
|
36
|
+
/**
|
|
37
|
+
* Name of the organisation
|
|
38
|
+
* @type {string}
|
|
39
|
+
* @memberof ATOMAdministeredOrg
|
|
40
|
+
*/
|
|
41
|
+
name: string;
|
|
42
|
+
/**
|
|
43
|
+
*
|
|
44
|
+
* @type {boolean}
|
|
45
|
+
* @memberof ATOMAdministeredOrg
|
|
46
|
+
*/
|
|
47
|
+
tenant_active?: boolean;
|
|
48
|
+
/**
|
|
49
|
+
* ID of the tenant of the organisation
|
|
50
|
+
* @type {string}
|
|
51
|
+
* @memberof ATOMAdministeredOrg
|
|
52
|
+
*/
|
|
53
|
+
tenant_id: string;
|
|
54
|
+
/**
|
|
55
|
+
* When the user became an admin of the organisation
|
|
56
|
+
* @type {Date}
|
|
57
|
+
* @memberof ATOMAdministeredOrg
|
|
58
|
+
*/
|
|
59
|
+
user_became_org_admin_at?: Date;
|
|
60
|
+
}
|
|
61
|
+
/**
|
|
62
|
+
* Check if a given object implements the ATOMAdministeredOrg interface.
|
|
63
|
+
*/
|
|
64
|
+
export declare function instanceOfATOMAdministeredOrg(value: object): boolean;
|
|
65
|
+
export declare function ATOMAdministeredOrgFromJSON(json: any): ATOMAdministeredOrg;
|
|
66
|
+
export declare function ATOMAdministeredOrgFromJSONTyped(json: any, ignoreDiscriminator: boolean): ATOMAdministeredOrg;
|
|
67
|
+
export declare function ATOMAdministeredOrgToJSON(value?: ATOMAdministeredOrg | null): any;
|
|
@@ -9,7 +9,8 @@
|
|
|
9
9
|
* https://openapi-generator.tech
|
|
10
10
|
* Do not edit the class manually.
|
|
11
11
|
*/
|
|
12
|
-
import type {
|
|
12
|
+
import type { ATOMAdministeredArchivedOrg } from './ATOMAdministeredArchivedOrg';
|
|
13
|
+
import type { ATOMAdministeredOrg } from './ATOMAdministeredOrg';
|
|
13
14
|
import type { ATOMTenantIdAndName } from './ATOMTenantIdAndName';
|
|
14
15
|
import type { ATOMTenantInJwtForWhoAmI } from './ATOMTenantInJwtForWhoAmI';
|
|
15
16
|
/**
|
|
@@ -18,12 +19,24 @@ import type { ATOMTenantInJwtForWhoAmI } from './ATOMTenantInJwtForWhoAmI';
|
|
|
18
19
|
* @interface ATOMWhoAmI
|
|
19
20
|
*/
|
|
20
21
|
export interface ATOMWhoAmI {
|
|
22
|
+
/**
|
|
23
|
+
* Names and IDs of the archived organizations the user administered
|
|
24
|
+
* @type {Array<ATOMAdministeredArchivedOrg>}
|
|
25
|
+
* @memberof ATOMWhoAmI
|
|
26
|
+
*/
|
|
27
|
+
administered_archived_orgs?: Array<ATOMAdministeredArchivedOrg>;
|
|
28
|
+
/**
|
|
29
|
+
* Names and IDs of the archived tenants the user administered
|
|
30
|
+
* @type {Array<ATOMTenantIdAndName>}
|
|
31
|
+
* @memberof ATOMWhoAmI
|
|
32
|
+
*/
|
|
33
|
+
administered_archived_tenants?: Array<ATOMTenantIdAndName>;
|
|
21
34
|
/**
|
|
22
35
|
* Names and IDs of the organizations the user administers
|
|
23
|
-
* @type {Array<
|
|
36
|
+
* @type {Array<ATOMAdministeredOrg>}
|
|
24
37
|
* @memberof ATOMWhoAmI
|
|
25
38
|
*/
|
|
26
|
-
administered_orgs: Array<
|
|
39
|
+
administered_orgs: Array<ATOMAdministeredOrg>;
|
|
27
40
|
/**
|
|
28
41
|
* Names and IDs of the tenants the user administers
|
|
29
42
|
* @type {Array<ATOMTenantIdAndName>}
|
|
@@ -0,0 +1,31 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* SVX API
|
|
3
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 1.3.1
|
|
6
|
+
*
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
/**
|
|
13
|
+
*
|
|
14
|
+
* @export
|
|
15
|
+
* @interface IDPForgotPasswordDto
|
|
16
|
+
*/
|
|
17
|
+
export interface IDPForgotPasswordDto {
|
|
18
|
+
/**
|
|
19
|
+
*
|
|
20
|
+
* @type {string}
|
|
21
|
+
* @memberof IDPForgotPasswordDto
|
|
22
|
+
*/
|
|
23
|
+
g_recaptcha_response: string;
|
|
24
|
+
}
|
|
25
|
+
/**
|
|
26
|
+
* Check if a given object implements the IDPForgotPasswordDto interface.
|
|
27
|
+
*/
|
|
28
|
+
export declare function instanceOfIDPForgotPasswordDto(value: object): boolean;
|
|
29
|
+
export declare function IDPForgotPasswordDtoFromJSON(json: any): IDPForgotPasswordDto;
|
|
30
|
+
export declare function IDPForgotPasswordDtoFromJSONTyped(json: any, ignoreDiscriminator: boolean): IDPForgotPasswordDto;
|
|
31
|
+
export declare function IDPForgotPasswordDtoToJSON(value?: IDPForgotPasswordDto | null): any;
|
|
@@ -0,0 +1,31 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* SVX API
|
|
3
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 1.3.1
|
|
6
|
+
*
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
/**
|
|
13
|
+
*
|
|
14
|
+
* @export
|
|
15
|
+
* @interface IDPResetPasswordDto
|
|
16
|
+
*/
|
|
17
|
+
export interface IDPResetPasswordDto {
|
|
18
|
+
/**
|
|
19
|
+
*
|
|
20
|
+
* @type {string}
|
|
21
|
+
* @memberof IDPResetPasswordDto
|
|
22
|
+
*/
|
|
23
|
+
g_recaptcha_response: string;
|
|
24
|
+
}
|
|
25
|
+
/**
|
|
26
|
+
* Check if a given object implements the IDPResetPasswordDto interface.
|
|
27
|
+
*/
|
|
28
|
+
export declare function instanceOfIDPResetPasswordDto(value: object): boolean;
|
|
29
|
+
export declare function IDPResetPasswordDtoFromJSON(json: any): IDPResetPasswordDto;
|
|
30
|
+
export declare function IDPResetPasswordDtoFromJSONTyped(json: any, ignoreDiscriminator: boolean): IDPResetPasswordDto;
|
|
31
|
+
export declare function IDPResetPasswordDtoToJSON(value?: IDPResetPasswordDto | null): any;
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* SVX API
|
|
3
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 1.3.1
|
|
6
|
+
*
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
import type { VCCnfDto } from './VCCnfDto';
|
|
13
|
+
/**
|
|
14
|
+
*
|
|
15
|
+
* @export
|
|
16
|
+
* @interface VCClaimsDto
|
|
17
|
+
*/
|
|
18
|
+
export interface VCClaimsDto {
|
|
19
|
+
/**
|
|
20
|
+
*
|
|
21
|
+
* @type {string}
|
|
22
|
+
* @memberof VCClaimsDto
|
|
23
|
+
*/
|
|
24
|
+
id?: string;
|
|
25
|
+
/**
|
|
26
|
+
*
|
|
27
|
+
* @type {VCCnfDto}
|
|
28
|
+
* @memberof VCClaimsDto
|
|
29
|
+
*/
|
|
30
|
+
cnf?: VCCnfDto;
|
|
31
|
+
}
|
|
32
|
+
/**
|
|
33
|
+
* Check if a given object implements the VCClaimsDto interface.
|
|
34
|
+
*/
|
|
35
|
+
export declare function instanceOfVCClaimsDto(value: object): boolean;
|
|
36
|
+
export declare function VCClaimsDtoFromJSON(json: any): VCClaimsDto;
|
|
37
|
+
export declare function VCClaimsDtoFromJSONTyped(json: any, ignoreDiscriminator: boolean): VCClaimsDto;
|
|
38
|
+
export declare function VCClaimsDtoToJSON(value?: VCClaimsDto | null): any;
|
|
@@ -51,6 +51,7 @@ export declare const VCCredentialVerificationResultResponseDtoChecksEnum: {
|
|
|
51
51
|
readonly Nonce: "nonce";
|
|
52
52
|
readonly Schema: "schema";
|
|
53
53
|
readonly RevocationStatus: "revocation_status";
|
|
54
|
+
readonly Constraints: "constraints";
|
|
54
55
|
};
|
|
55
56
|
export type VCCredentialVerificationResultResponseDtoChecksEnum = typeof VCCredentialVerificationResultResponseDtoChecksEnum[keyof typeof VCCredentialVerificationResultResponseDtoChecksEnum];
|
|
56
57
|
/**
|
|
@@ -9,6 +9,7 @@
|
|
|
9
9
|
* https://openapi-generator.tech
|
|
10
10
|
* Do not edit the class manually.
|
|
11
11
|
*/
|
|
12
|
+
import type { VCFieldsDtoFilter } from './VCFieldsDtoFilter';
|
|
12
13
|
/**
|
|
13
14
|
*
|
|
14
15
|
* @export
|
|
@@ -29,10 +30,10 @@ export interface VCFieldsDto {
|
|
|
29
30
|
purpose?: string;
|
|
30
31
|
/**
|
|
31
32
|
*
|
|
32
|
-
* @type {
|
|
33
|
+
* @type {VCFieldsDtoFilter}
|
|
33
34
|
* @memberof VCFieldsDto
|
|
34
35
|
*/
|
|
35
|
-
filter?:
|
|
36
|
+
filter?: VCFieldsDtoFilter;
|
|
36
37
|
}
|
|
37
38
|
/**
|
|
38
39
|
* Check if a given object implements the VCFieldsDto interface.
|