@meeco/svx-api-sdk 1.0.0-stage.20231211153548.58a6d84 → 1.0.0-stage.20240301124316.cffdd63
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +8 -2
- package/lib/esm/apis/OrganisationsApi.js +5 -2
- package/lib/esm/apis/SharesApi.js +4 -4
- package/lib/esm/apis/VerifiableCredentialsApi.js +2 -2
- package/lib/esm/models/{ATOMOrgIdAndName.js → ATOMAdministeredArchivedOrg.js} +6 -6
- package/lib/esm/models/ATOMAdministeredOrg.js +60 -0
- package/lib/esm/models/ATOMWhoAmI.js +9 -3
- package/lib/esm/models/IDPForgotPasswordDto.js +43 -0
- package/lib/esm/models/IDPLoginRequestDto.js +3 -0
- package/lib/esm/models/{VCGenerateCredentialDtoCnf.js → IDPResetPasswordDto.js} +9 -9
- package/lib/esm/models/VCClaimsDto.js +46 -0
- package/lib/esm/models/VCCredentialVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCFieldsDto.js +3 -2
- package/lib/esm/models/VCFieldsDtoFilter.js +48 -0
- package/lib/esm/models/VCFilterDto.js +48 -0
- package/lib/esm/models/VCGenerateCredentialDto.js +5 -5
- package/lib/esm/models/VCGenerateCredentialDtoClaims.js +40 -0
- package/lib/esm/models/VCIdTokenVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCOldPresentationRequestResponseVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCPresentationRequestResponseVerificationOptionsDto.js +2 -1
- package/lib/esm/models/VCPresentationRequestResponseVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCPresentationRequestUpdateVerificationResultRequestDto.js +2 -1
- package/lib/esm/models/VCPresentationRequestVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/VCPresentationVerificationOptionsDto.js +2 -1
- package/lib/esm/models/VCPresentationVerificationResultResponseDto.js +2 -1
- package/lib/esm/models/index.js +8 -2
- package/lib/types/apis/OrganisationsApi.d.ts +2 -1
- package/lib/types/apis/SharesApi.d.ts +4 -4
- package/lib/types/apis/VerifiableCredentialsApi.d.ts +2 -2
- package/lib/types/models/{ATOMOrgIdAndName.d.ts → ATOMAdministeredArchivedOrg.d.ts} +13 -13
- package/lib/types/models/ATOMAdministeredOrg.d.ts +67 -0
- package/lib/types/models/ATOMTenantInJwtForWhoAmI.d.ts +1 -1
- package/lib/types/models/ATOMWhoAmI.d.ts +16 -3
- package/lib/types/models/IDPForgotPasswordDto.d.ts +31 -0
- package/lib/types/models/IDPLoginRequestDto.d.ts +6 -0
- package/lib/types/models/IDPResetPasswordDto.d.ts +31 -0
- package/lib/types/models/VCClaimsDto.d.ts +38 -0
- package/lib/types/models/VCCredentialVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCFieldsDto.d.ts +3 -2
- package/lib/types/models/VCFieldsDtoFilter.d.ts +43 -0
- package/lib/types/models/VCFilterDto.d.ts +43 -0
- package/lib/types/models/VCGenerateCredentialDto.d.ts +6 -6
- package/lib/types/models/VCGenerateCredentialDtoClaims.d.ts +39 -0
- package/lib/types/models/VCIdTokenVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCOldPresentationRequestResponseVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCPresentationRequestResponseVerificationOptionsDto.d.ts +2 -1
- package/lib/types/models/VCPresentationRequestResponseVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCPresentationRequestUpdateVerificationResultRequestDto.d.ts +1 -0
- package/lib/types/models/VCPresentationRequestVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/VCPresentationVerificationOptionsDto.d.ts +1 -0
- package/lib/types/models/VCPresentationVerificationResultResponseDto.d.ts +1 -0
- package/lib/types/models/index.d.ts +8 -2
- package/lib/umd/apis/OrganisationsApi.js +5 -2
- package/lib/umd/apis/SharesApi.js +4 -4
- package/lib/umd/apis/VerifiableCredentialsApi.js +2 -2
- package/lib/umd/models/{ATOMOrgIdAndName.js → ATOMAdministeredArchivedOrg.js} +11 -11
- package/lib/umd/models/ATOMAdministeredOrg.js +67 -0
- package/lib/umd/models/ATOMWhoAmI.js +9 -3
- package/lib/umd/models/IDPForgotPasswordDto.js +50 -0
- package/lib/umd/models/IDPLoginRequestDto.js +3 -0
- package/lib/umd/models/IDPResetPasswordDto.js +50 -0
- package/lib/umd/models/VCClaimsDto.js +53 -0
- package/lib/umd/models/VCCredentialVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCFieldsDto.js +3 -2
- package/lib/umd/models/VCFieldsDtoFilter.js +55 -0
- package/lib/umd/models/VCFilterDto.js +55 -0
- package/lib/umd/models/VCGenerateCredentialDto.js +5 -5
- package/lib/umd/models/VCGenerateCredentialDtoClaims.js +47 -0
- package/lib/umd/models/VCIdTokenVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCOldPresentationRequestResponseVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCPresentationRequestResponseVerificationOptionsDto.js +2 -1
- package/lib/umd/models/VCPresentationRequestResponseVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCPresentationRequestUpdateVerificationResultRequestDto.js +2 -1
- package/lib/umd/models/VCPresentationRequestVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/VCPresentationVerificationOptionsDto.js +2 -1
- package/lib/umd/models/VCPresentationVerificationResultResponseDto.js +2 -1
- package/lib/umd/models/index.js +8 -2
- package/package.json +1 -1
- package/lib/types/models/VCGenerateCredentialDtoCnf.d.ts +0 -31
- package/lib/umd/models/VCGenerateCredentialDtoCnf.js +0 -50
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* SVX API
|
|
3
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 1.3.1
|
|
6
|
+
*
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
/**
|
|
13
|
+
*
|
|
14
|
+
* @export
|
|
15
|
+
* @interface VCFieldsDtoFilter
|
|
16
|
+
*/
|
|
17
|
+
export interface VCFieldsDtoFilter {
|
|
18
|
+
/**
|
|
19
|
+
*
|
|
20
|
+
* @type {string}
|
|
21
|
+
* @memberof VCFieldsDtoFilter
|
|
22
|
+
*/
|
|
23
|
+
type: string;
|
|
24
|
+
/**
|
|
25
|
+
* The const can be a number | string | boolean | object.However, since openapi-generator fails to generate correct SDK for swagger file using oneOf property, here it is described only as string
|
|
26
|
+
* @type {string}
|
|
27
|
+
* @memberof VCFieldsDtoFilter
|
|
28
|
+
*/
|
|
29
|
+
_const?: string;
|
|
30
|
+
/**
|
|
31
|
+
*
|
|
32
|
+
* @type {string}
|
|
33
|
+
* @memberof VCFieldsDtoFilter
|
|
34
|
+
*/
|
|
35
|
+
pattern?: string;
|
|
36
|
+
}
|
|
37
|
+
/**
|
|
38
|
+
* Check if a given object implements the VCFieldsDtoFilter interface.
|
|
39
|
+
*/
|
|
40
|
+
export declare function instanceOfVCFieldsDtoFilter(value: object): boolean;
|
|
41
|
+
export declare function VCFieldsDtoFilterFromJSON(json: any): VCFieldsDtoFilter;
|
|
42
|
+
export declare function VCFieldsDtoFilterFromJSONTyped(json: any, ignoreDiscriminator: boolean): VCFieldsDtoFilter;
|
|
43
|
+
export declare function VCFieldsDtoFilterToJSON(value?: VCFieldsDtoFilter | null): any;
|
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* SVX API
|
|
3
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 1.3.1
|
|
6
|
+
*
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
/**
|
|
13
|
+
*
|
|
14
|
+
* @export
|
|
15
|
+
* @interface VCFilterDto
|
|
16
|
+
*/
|
|
17
|
+
export interface VCFilterDto {
|
|
18
|
+
/**
|
|
19
|
+
*
|
|
20
|
+
* @type {string}
|
|
21
|
+
* @memberof VCFilterDto
|
|
22
|
+
*/
|
|
23
|
+
type: string;
|
|
24
|
+
/**
|
|
25
|
+
* The const can be a number | string | boolean | object.However, since openapi-generator fails to generate correct SDK for swagger file using oneOf property, here it is described only as string
|
|
26
|
+
* @type {string}
|
|
27
|
+
* @memberof VCFilterDto
|
|
28
|
+
*/
|
|
29
|
+
_const?: string;
|
|
30
|
+
/**
|
|
31
|
+
*
|
|
32
|
+
* @type {string}
|
|
33
|
+
* @memberof VCFilterDto
|
|
34
|
+
*/
|
|
35
|
+
pattern?: string;
|
|
36
|
+
}
|
|
37
|
+
/**
|
|
38
|
+
* Check if a given object implements the VCFilterDto interface.
|
|
39
|
+
*/
|
|
40
|
+
export declare function instanceOfVCFilterDto(value: object): boolean;
|
|
41
|
+
export declare function VCFilterDtoFromJSON(json: any): VCFilterDto;
|
|
42
|
+
export declare function VCFilterDtoFromJSONTyped(json: any, ignoreDiscriminator: boolean): VCFilterDto;
|
|
43
|
+
export declare function VCFilterDtoToJSON(value?: VCFilterDto | null): any;
|
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
* https://openapi-generator.tech
|
|
10
10
|
* Do not edit the class manually.
|
|
11
11
|
*/
|
|
12
|
-
import type {
|
|
12
|
+
import type { VCGenerateCredentialDtoClaims } from './VCGenerateCredentialDtoClaims';
|
|
13
13
|
/**
|
|
14
14
|
*
|
|
15
15
|
* @export
|
|
@@ -30,10 +30,10 @@ export interface VCGenerateCredentialDto {
|
|
|
30
30
|
issuer: object;
|
|
31
31
|
/**
|
|
32
32
|
*
|
|
33
|
-
* @type {
|
|
33
|
+
* @type {VCGenerateCredentialDtoClaims}
|
|
34
34
|
* @memberof VCGenerateCredentialDto
|
|
35
35
|
*/
|
|
36
|
-
claims:
|
|
36
|
+
claims: VCGenerateCredentialDtoClaims;
|
|
37
37
|
/**
|
|
38
38
|
*
|
|
39
39
|
* @type {boolean}
|
|
@@ -47,11 +47,11 @@ export interface VCGenerateCredentialDto {
|
|
|
47
47
|
*/
|
|
48
48
|
expires_at?: Date;
|
|
49
49
|
/**
|
|
50
|
-
*
|
|
51
|
-
* @type {
|
|
50
|
+
* The type of the SD Verifiable Credential, The Type information Can be a string or an array of string.However, since openapi-generator fails to generate correct SDK for swagger file using oneOf property, here it is described only as string
|
|
51
|
+
* @type {string}
|
|
52
52
|
* @memberof VCGenerateCredentialDto
|
|
53
53
|
*/
|
|
54
|
-
|
|
54
|
+
type?: string;
|
|
55
55
|
}
|
|
56
56
|
/**
|
|
57
57
|
* Check if a given object implements the VCGenerateCredentialDto interface.
|
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* SVX API
|
|
3
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 1.3.1
|
|
6
|
+
*
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
import type { VCCnfDto } from './VCCnfDto';
|
|
13
|
+
/**
|
|
14
|
+
*
|
|
15
|
+
* @export
|
|
16
|
+
* @interface VCGenerateCredentialDtoClaims
|
|
17
|
+
*/
|
|
18
|
+
export interface VCGenerateCredentialDtoClaims {
|
|
19
|
+
[key: string]: any | any;
|
|
20
|
+
/**
|
|
21
|
+
*
|
|
22
|
+
* @type {string}
|
|
23
|
+
* @memberof VCGenerateCredentialDtoClaims
|
|
24
|
+
*/
|
|
25
|
+
id?: string;
|
|
26
|
+
/**
|
|
27
|
+
*
|
|
28
|
+
* @type {VCCnfDto}
|
|
29
|
+
* @memberof VCGenerateCredentialDtoClaims
|
|
30
|
+
*/
|
|
31
|
+
cnf?: VCCnfDto;
|
|
32
|
+
}
|
|
33
|
+
/**
|
|
34
|
+
* Check if a given object implements the VCGenerateCredentialDtoClaims interface.
|
|
35
|
+
*/
|
|
36
|
+
export declare function instanceOfVCGenerateCredentialDtoClaims(value: object): boolean;
|
|
37
|
+
export declare function VCGenerateCredentialDtoClaimsFromJSON(json: any): VCGenerateCredentialDtoClaims;
|
|
38
|
+
export declare function VCGenerateCredentialDtoClaimsFromJSONTyped(json: any, ignoreDiscriminator: boolean): VCGenerateCredentialDtoClaims;
|
|
39
|
+
export declare function VCGenerateCredentialDtoClaimsToJSON(value?: VCGenerateCredentialDtoClaims | null): any;
|
|
@@ -45,6 +45,7 @@ export declare const VCIdTokenVerificationResultResponseDtoChecksEnum: {
|
|
|
45
45
|
readonly Nonce: "nonce";
|
|
46
46
|
readonly Schema: "schema";
|
|
47
47
|
readonly RevocationStatus: "revocation_status";
|
|
48
|
+
readonly Constraints: "constraints";
|
|
48
49
|
};
|
|
49
50
|
export type VCIdTokenVerificationResultResponseDtoChecksEnum = typeof VCIdTokenVerificationResultResponseDtoChecksEnum[keyof typeof VCIdTokenVerificationResultResponseDtoChecksEnum];
|
|
50
51
|
/**
|
|
@@ -45,6 +45,7 @@ export declare const VCOldPresentationRequestResponseVerificationResultResponseD
|
|
|
45
45
|
readonly Nonce: "nonce";
|
|
46
46
|
readonly Schema: "schema";
|
|
47
47
|
readonly RevocationStatus: "revocation_status";
|
|
48
|
+
readonly Constraints: "constraints";
|
|
48
49
|
};
|
|
49
50
|
export type VCOldPresentationRequestResponseVerificationResultResponseDtoChecksEnum = typeof VCOldPresentationRequestResponseVerificationResultResponseDtoChecksEnum[keyof typeof VCOldPresentationRequestResponseVerificationResultResponseDtoChecksEnum];
|
|
50
51
|
/**
|
|
@@ -23,7 +23,7 @@ export interface VCPresentationRequestResponseVerificationOptionsDto {
|
|
|
23
23
|
* @type {Array<string>}
|
|
24
24
|
* @memberof VCPresentationRequestResponseVerificationOptionsDto
|
|
25
25
|
*/
|
|
26
|
-
checks?: VCPresentationRequestResponseVerificationOptionsDtoChecksEnum
|
|
26
|
+
checks?: Array<VCPresentationRequestResponseVerificationOptionsDtoChecksEnum>;
|
|
27
27
|
/**
|
|
28
28
|
*
|
|
29
29
|
* @type {VCRequestVerificationOptionsDto}
|
|
@@ -48,6 +48,7 @@ export interface VCPresentationRequestResponseVerificationOptionsDto {
|
|
|
48
48
|
*/
|
|
49
49
|
export declare const VCPresentationRequestResponseVerificationOptionsDtoChecksEnum: {
|
|
50
50
|
readonly Format: "format";
|
|
51
|
+
readonly Constraints: "constraints";
|
|
51
52
|
};
|
|
52
53
|
export type VCPresentationRequestResponseVerificationOptionsDtoChecksEnum = typeof VCPresentationRequestResponseVerificationOptionsDtoChecksEnum[keyof typeof VCPresentationRequestResponseVerificationOptionsDtoChecksEnum];
|
|
53
54
|
/**
|
|
@@ -66,6 +66,7 @@ export declare const VCPresentationRequestResponseVerificationResultResponseDtoC
|
|
|
66
66
|
readonly Nonce: "nonce";
|
|
67
67
|
readonly Schema: "schema";
|
|
68
68
|
readonly RevocationStatus: "revocation_status";
|
|
69
|
+
readonly Constraints: "constraints";
|
|
69
70
|
};
|
|
70
71
|
export type VCPresentationRequestResponseVerificationResultResponseDtoChecksEnum = typeof VCPresentationRequestResponseVerificationResultResponseDtoChecksEnum[keyof typeof VCPresentationRequestResponseVerificationResultResponseDtoChecksEnum];
|
|
71
72
|
/**
|
|
@@ -66,6 +66,7 @@ export declare const VCPresentationRequestUpdateVerificationResultRequestDtoChec
|
|
|
66
66
|
readonly Nonce: "nonce";
|
|
67
67
|
readonly Schema: "schema";
|
|
68
68
|
readonly RevocationStatus: "revocation_status";
|
|
69
|
+
readonly Constraints: "constraints";
|
|
69
70
|
};
|
|
70
71
|
export type VCPresentationRequestUpdateVerificationResultRequestDtoChecksEnum = typeof VCPresentationRequestUpdateVerificationResultRequestDtoChecksEnum[keyof typeof VCPresentationRequestUpdateVerificationResultRequestDtoChecksEnum];
|
|
71
72
|
/**
|
|
@@ -51,6 +51,7 @@ export declare const VCPresentationRequestVerificationResultResponseDtoChecksEnu
|
|
|
51
51
|
readonly Nonce: "nonce";
|
|
52
52
|
readonly Schema: "schema";
|
|
53
53
|
readonly RevocationStatus: "revocation_status";
|
|
54
|
+
readonly Constraints: "constraints";
|
|
54
55
|
};
|
|
55
56
|
export type VCPresentationRequestVerificationResultResponseDtoChecksEnum = typeof VCPresentationRequestVerificationResultResponseDtoChecksEnum[keyof typeof VCPresentationRequestVerificationResultResponseDtoChecksEnum];
|
|
56
57
|
/**
|
|
@@ -30,6 +30,7 @@ export declare const VCPresentationVerificationOptionsDtoChecksEnum: {
|
|
|
30
30
|
readonly Signature: "signature";
|
|
31
31
|
readonly Expiration: "expiration";
|
|
32
32
|
readonly Nonce: "nonce";
|
|
33
|
+
readonly Constraints: "constraints";
|
|
33
34
|
};
|
|
34
35
|
export type VCPresentationVerificationOptionsDtoChecksEnum = typeof VCPresentationVerificationOptionsDtoChecksEnum[keyof typeof VCPresentationVerificationOptionsDtoChecksEnum];
|
|
35
36
|
/**
|
|
@@ -52,6 +52,7 @@ export declare const VCPresentationVerificationResultResponseDtoChecksEnum: {
|
|
|
52
52
|
readonly Nonce: "nonce";
|
|
53
53
|
readonly Schema: "schema";
|
|
54
54
|
readonly RevocationStatus: "revocation_status";
|
|
55
|
+
readonly Constraints: "constraints";
|
|
55
56
|
};
|
|
56
57
|
export type VCPresentationVerificationResultResponseDtoChecksEnum = typeof VCPresentationVerificationResultResponseDtoChecksEnum[keyof typeof VCPresentationVerificationResultResponseDtoChecksEnum];
|
|
57
58
|
/**
|
|
@@ -1,5 +1,7 @@
|
|
|
1
1
|
export * from './ATOMActiveAndArchivedOrgList';
|
|
2
2
|
export * from './ATOMAdmin';
|
|
3
|
+
export * from './ATOMAdministeredArchivedOrg';
|
|
4
|
+
export * from './ATOMAdministeredOrg';
|
|
3
5
|
export * from './ATOMAgentList';
|
|
4
6
|
export * from './ATOMAgentToken';
|
|
5
7
|
export * from './ATOMApplicationVersion';
|
|
@@ -23,7 +25,6 @@ export * from './ATOMOneUser';
|
|
|
23
25
|
export * from './ATOMOrg';
|
|
24
26
|
export * from './ATOMOrgAgent';
|
|
25
27
|
export * from './ATOMOrgDescription';
|
|
26
|
-
export * from './ATOMOrgIdAndName';
|
|
27
28
|
export * from './ATOMOrgList';
|
|
28
29
|
export * from './ATOMPaginatedAdminList';
|
|
29
30
|
export * from './ATOMPaginatedOrgList';
|
|
@@ -149,6 +150,7 @@ export * from './IDPEndUserResponseModelDto';
|
|
|
149
150
|
export * from './IDPEndUsersResponseDto';
|
|
150
151
|
export * from './IDPErrorResponseModel';
|
|
151
152
|
export * from './IDPErrorsResponseModelDto';
|
|
153
|
+
export * from './IDPForgotPasswordDto';
|
|
152
154
|
export * from './IDPGenerateShortLivedAccessTokenDto';
|
|
153
155
|
export * from './IDPGenerateShortLivedAccessTokenPayloadDto';
|
|
154
156
|
export * from './IDPInvitationResponseDto';
|
|
@@ -159,6 +161,7 @@ export * from './IDPJwtIssuerJWKSKeys';
|
|
|
159
161
|
export * from './IDPJwtIssuerResponseDto';
|
|
160
162
|
export * from './IDPLoginRequestDto';
|
|
161
163
|
export * from './IDPMeta';
|
|
164
|
+
export * from './IDPResetPasswordDto';
|
|
162
165
|
export * from './IDPUpdateClientDto';
|
|
163
166
|
export * from './IDPUpdateClientPayloadDto';
|
|
164
167
|
export * from './IDPUserDto';
|
|
@@ -246,6 +249,7 @@ export * from './ShreIntentListResponse';
|
|
|
246
249
|
export * from './UpdateDelegationsRequest';
|
|
247
250
|
export * from './VCApp';
|
|
248
251
|
export * from './VCAppSignal';
|
|
252
|
+
export * from './VCClaimsDto';
|
|
249
253
|
export * from './VCCnfDto';
|
|
250
254
|
export * from './VCComponent';
|
|
251
255
|
export * from './VCConstraintsDto';
|
|
@@ -278,9 +282,11 @@ export * from './VCDatabase';
|
|
|
278
282
|
export * from './VCErrorResponseDto';
|
|
279
283
|
export * from './VCErrorsResponseDto';
|
|
280
284
|
export * from './VCFieldsDto';
|
|
285
|
+
export * from './VCFieldsDtoFilter';
|
|
286
|
+
export * from './VCFilterDto';
|
|
281
287
|
export * from './VCFormatDto';
|
|
282
288
|
export * from './VCGenerateCredentialDto';
|
|
283
|
-
export * from './
|
|
289
|
+
export * from './VCGenerateCredentialDtoClaims';
|
|
284
290
|
export * from './VCGenerateCredentialPayloadDto';
|
|
285
291
|
export * from './VCGeneratePresentationDto';
|
|
286
292
|
export * from './VCGeneratePresentationPayloadDto';
|
|
@@ -892,6 +892,9 @@ class OrganisationsApi extends runtime.BaseAPI {
|
|
|
892
892
|
if (requestParameters.noFirstUser !== undefined) {
|
|
893
893
|
queryParameters['no_first_user'] = requestParameters.noFirstUser;
|
|
894
894
|
}
|
|
895
|
+
if (requestParameters.addAllExternalSecurityRights !== undefined) {
|
|
896
|
+
queryParameters['add_all_external_security_rights'] = requestParameters.addAllExternalSecurityRights;
|
|
897
|
+
}
|
|
895
898
|
const headerParameters = {};
|
|
896
899
|
headerParameters['Content-Type'] = 'application/json';
|
|
897
900
|
if (this.configuration && this.configuration.accessToken) {
|
|
@@ -915,9 +918,9 @@ class OrganisationsApi extends runtime.BaseAPI {
|
|
|
915
918
|
* Create an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant with the ID in parameter `tenant_id`.
|
|
916
919
|
* Create an organisation
|
|
917
920
|
*/
|
|
918
|
-
tenantsTenantIdOrgsPost(tenantId, aTOMCreateOrUpdateOrgRequest, noFirstUser, initOverrides) {
|
|
921
|
+
tenantsTenantIdOrgsPost(tenantId, aTOMCreateOrUpdateOrgRequest, noFirstUser, addAllExternalSecurityRights, initOverrides) {
|
|
919
922
|
return __awaiter(this, void 0, void 0, function* () {
|
|
920
|
-
const response = yield this.tenantsTenantIdOrgsPostRaw({ tenantId: tenantId, aTOMCreateOrUpdateOrgRequest: aTOMCreateOrUpdateOrgRequest, noFirstUser: noFirstUser }, initOverrides);
|
|
923
|
+
const response = yield this.tenantsTenantIdOrgsPostRaw({ tenantId: tenantId, aTOMCreateOrUpdateOrgRequest: aTOMCreateOrUpdateOrgRequest, noFirstUser: noFirstUser, addAllExternalSecurityRights: addAllExternalSecurityRights }, initOverrides);
|
|
921
924
|
return yield response.value();
|
|
922
925
|
});
|
|
923
926
|
}
|
|
@@ -373,7 +373,7 @@ class SharesApi extends runtime.BaseAPI {
|
|
|
373
373
|
});
|
|
374
374
|
}
|
|
375
375
|
/**
|
|
376
|
-
* Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `
|
|
376
|
+
* Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
|
|
377
377
|
* Share your item with connected users
|
|
378
378
|
*/
|
|
379
379
|
itemsIdSharesPostRaw(requestParameters, initOverrides) {
|
|
@@ -408,7 +408,7 @@ class SharesApi extends runtime.BaseAPI {
|
|
|
408
408
|
});
|
|
409
409
|
}
|
|
410
410
|
/**
|
|
411
|
-
* Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `
|
|
411
|
+
* Share your item with connected users. Each share can be a share of all slots of the item, in that case `slot_id` is `NULL`, or it can be a share of just one slot. In this case `slot_id` references one of the slots of the item. There are 3 users involved in each share: * owner - the owner of the shared item * sender - the user who shares data. Can be the owner or one of the recipients * recipient - the user who recieves the shared data. Whether a non-owner may on-share a shared slot is defined in field `onsharing_permitted`. Only the owner of the item can set `onsharing_permitted` to `true`. If `onsharing_permitted` is `false`, the recipient may on-share the item, but when that recipient creates an on-share, `onsharing_permitted` in that on-share is forced to be `false`. In other words, the depth of on-sharing in limited to 3: OWNER ==> RECIPIENT AND SENDER ==> RECIPIENT Some shares require that the recipient accepts the terms of the share. Until the terms are not accepted the share DEK is hidden. Data in slots is initially encrypted with the DEK in field `encrypted_dek`. The DEK in `encrypted_dek` is encrypted with the public key of the share recipient. When processing a share the client application is expected to decrypt the slot data and re-encrypt with the private DEK. A public key of the recipient is needed to encrypt the share DEK. Updating all shares of the same item is performed by the owner in one go. In a situation when a share has been created by a recipient, not the owner, and there is no connection between the owner and the recipient, the owner has no access to a public key of the recipient. In order to address this problem when a share is created we also add fields `public_key` and `keypair_external_id` from the connection record between the recipient and the sender. `keypair_external_id` identifies the keypair that the public key belongs to. When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
|
|
412
412
|
* Share your item with connected users
|
|
413
413
|
*/
|
|
414
414
|
itemsIdSharesPost(id, meecoDelegationId, meecoOrganisationId, postItemSharesRequest, initOverrides) {
|
|
@@ -418,7 +418,7 @@ class SharesApi extends runtime.BaseAPI {
|
|
|
418
418
|
});
|
|
419
419
|
}
|
|
420
420
|
/**
|
|
421
|
-
* Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `
|
|
421
|
+
* Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
|
|
422
422
|
* Update all shares of one item
|
|
423
423
|
*/
|
|
424
424
|
itemsIdSharesPutRaw(requestParameters, initOverrides) {
|
|
@@ -453,7 +453,7 @@ class SharesApi extends runtime.BaseAPI {
|
|
|
453
453
|
});
|
|
454
454
|
}
|
|
455
455
|
/**
|
|
456
|
-
* Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `
|
|
456
|
+
* Updating all shares of one item is done by the item owner in one go. Before calling this endpoint the client application is expected to retrieve the list of shares IDs and public keys via `GET /items/{id}/shares`. The POST body of this endpoint contains * a list of share DEKs encrypted with public keys of share recipients * a list of slot values for each slot and each share, each encrypted with the DEK of the share that the slot belongs to * Optionally: a list of completed `ClientTask` tasks When a recipient of a share on-shares the data with someone else, nothing prevents him/her to encrypt some other data instead of the original data. We need a way to enforce integrity of on-shares. We do this with help of HMAC - hash-based message authentication code obtained by running a cryptographic hash function over the data and a shared secret key. Two fields in each slot are used for this purpose: * `encrypted_value_verification_key` - is a value verification key encrypted in the same way as the value itself: with the share DEK * `value_verification_hash` - the result of the HMAC function run on the slot value using `encrypted_value_verification_key`. `value_verification_hash` is stored as-is, unencrypted. Only the owner of the data may send `value_verification_hash` when creating or updating the share. When other senders create a share, `value_verification_hash` must be `NULL`. `encrypted_value_verification_key` may and should be sent by every sender, owner or not, because `encrypted_value_verification_key` must be re-encrypted with the share DEK for each share. If the sender replaces `encrypted_value_verification_key` and/or the slot value, this will break the client-side verification against `encrypted_value_verification_key`. Field `encrypted_value` may be `NULL`. If `encrypted_value` is `NULL`, then `encrypted_value_verification_key` and `value_verification_hash` may also be `NULL`. If `encrypted_value` is present, then `encrypted_value_verification_key` and `value_verification_hash` are mandatory.
|
|
457
457
|
* Update all shares of one item
|
|
458
458
|
*/
|
|
459
459
|
itemsIdSharesPut(id, meecoDelegationId, meecoOrganisationId, putItemSharesRequest, initOverrides) {
|
|
@@ -330,7 +330,7 @@ class VerifiableCredentialsApi extends runtime.BaseAPI {
|
|
|
330
330
|
});
|
|
331
331
|
}
|
|
332
332
|
/**
|
|
333
|
-
* <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p>
|
|
333
|
+
* <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
|
|
334
334
|
* Generate credential based on type and claims provided
|
|
335
335
|
*/
|
|
336
336
|
credentialsGeneratePostRaw(requestParameters, initOverrides) {
|
|
@@ -368,7 +368,7 @@ class VerifiableCredentialsApi extends runtime.BaseAPI {
|
|
|
368
368
|
});
|
|
369
369
|
}
|
|
370
370
|
/**
|
|
371
|
-
* <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p>
|
|
371
|
+
* <h4>Requires the following security rights:</h4><ul><li><code>vc:org:manage</code></li></ul><br /><hr /><p>Generates unsigned verifiable credential token in JWT format. Client is expected to sign it with a private key.</p><hr /><p>An example of how credential signing in Javascript:</p><pre><code>import { generateKeyPairFromSeed } from \'@stablelib/ed25519\'; <br />import { EdDSASigner, hexToBytes } from \'did-jwt\'; <br /><br />const key = generateKeyPairFromSeed(hexToBytes(SECRET_HEX)); <br />const signerFn = EdDSASigner(key.secretKey); <br /><br />const signature = await signerFn(unsignedJwt); <br />const vcJwt = [unsignedJwt, signature].join(\'.\');</code></pre><hr /><br /><h4>Issuer property caveat</h4><p>We use <b>openapi-generator</b> to generate Typescript SDK for the given API swagger definition. However, <b>openapi-generator</b> does not support <b>oneOf</b> configuration properly and generates an invalid Typescript SDK. To avoid the problem, swagger defines <b>issuer</b> property only as string for the moment. While in fact, endpoint accepts issuer as an object in format of <code>{id: string; name: string;}</code> as well.</p><br /><h4>Type property caveat</h4><p> <code>Type</code> is required for <code>vc+sd-jwt</code> format and must be a string <br /> however, endpoint accepts <code>Type</code> as an Array of string for <code>JWT VC</code> in format of <code>[\"VerifiableCredential\", \"AlumniCredential\"]</code> as well. <br /></p>
|
|
372
372
|
* Generate credential based on type and claims provided
|
|
373
373
|
*/
|
|
374
374
|
credentialsGeneratePost(meecoOrganisationID, vCGenerateCredentialPayloadDto, accept, initOverrides) {
|
|
@@ -13,12 +13,12 @@
|
|
|
13
13
|
* Do not edit the class manually.
|
|
14
14
|
*/
|
|
15
15
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
|
-
exports.
|
|
16
|
+
exports.ATOMAdministeredArchivedOrgToJSON = exports.ATOMAdministeredArchivedOrgFromJSONTyped = exports.ATOMAdministeredArchivedOrgFromJSON = exports.instanceOfATOMAdministeredArchivedOrg = void 0;
|
|
17
17
|
const runtime_1 = require("../runtime");
|
|
18
18
|
/**
|
|
19
|
-
* Check if a given object implements the
|
|
19
|
+
* Check if a given object implements the ATOMAdministeredArchivedOrg interface.
|
|
20
20
|
*/
|
|
21
|
-
function
|
|
21
|
+
function instanceOfATOMAdministeredArchivedOrg(value) {
|
|
22
22
|
let isInstance = true;
|
|
23
23
|
isInstance = isInstance && "color" in value;
|
|
24
24
|
isInstance = isInstance && "id" in value;
|
|
@@ -27,12 +27,12 @@ function instanceOfATOMOrgIdAndName(value) {
|
|
|
27
27
|
isInstance = isInstance && "tenant_id" in value;
|
|
28
28
|
return isInstance;
|
|
29
29
|
}
|
|
30
|
-
exports.
|
|
31
|
-
function
|
|
32
|
-
return
|
|
30
|
+
exports.instanceOfATOMAdministeredArchivedOrg = instanceOfATOMAdministeredArchivedOrg;
|
|
31
|
+
function ATOMAdministeredArchivedOrgFromJSON(json) {
|
|
32
|
+
return ATOMAdministeredArchivedOrgFromJSONTyped(json, false);
|
|
33
33
|
}
|
|
34
|
-
exports.
|
|
35
|
-
function
|
|
34
|
+
exports.ATOMAdministeredArchivedOrgFromJSON = ATOMAdministeredArchivedOrgFromJSON;
|
|
35
|
+
function ATOMAdministeredArchivedOrgFromJSONTyped(json, ignoreDiscriminator) {
|
|
36
36
|
if ((json === undefined) || (json === null)) {
|
|
37
37
|
return json;
|
|
38
38
|
}
|
|
@@ -45,8 +45,8 @@ function ATOMOrgIdAndNameFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
45
45
|
'tenant_id': json['tenant_id'],
|
|
46
46
|
};
|
|
47
47
|
}
|
|
48
|
-
exports.
|
|
49
|
-
function
|
|
48
|
+
exports.ATOMAdministeredArchivedOrgFromJSONTyped = ATOMAdministeredArchivedOrgFromJSONTyped;
|
|
49
|
+
function ATOMAdministeredArchivedOrgToJSON(value) {
|
|
50
50
|
if (value === undefined) {
|
|
51
51
|
return undefined;
|
|
52
52
|
}
|
|
@@ -62,4 +62,4 @@ function ATOMOrgIdAndNameToJSON(value) {
|
|
|
62
62
|
'tenant_id': value.tenant_id,
|
|
63
63
|
};
|
|
64
64
|
}
|
|
65
|
-
exports.
|
|
65
|
+
exports.ATOMAdministeredArchivedOrgToJSON = ATOMAdministeredArchivedOrgToJSON;
|
|
@@ -0,0 +1,67 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/* tslint:disable */
|
|
3
|
+
/* eslint-disable */
|
|
4
|
+
/**
|
|
5
|
+
* SVX API
|
|
6
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
7
|
+
*
|
|
8
|
+
* The version of the OpenAPI document: 1.3.1
|
|
9
|
+
*
|
|
10
|
+
*
|
|
11
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
12
|
+
* https://openapi-generator.tech
|
|
13
|
+
* Do not edit the class manually.
|
|
14
|
+
*/
|
|
15
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
|
+
exports.ATOMAdministeredOrgToJSON = exports.ATOMAdministeredOrgFromJSONTyped = exports.ATOMAdministeredOrgFromJSON = exports.instanceOfATOMAdministeredOrg = void 0;
|
|
17
|
+
const runtime_1 = require("../runtime");
|
|
18
|
+
/**
|
|
19
|
+
* Check if a given object implements the ATOMAdministeredOrg interface.
|
|
20
|
+
*/
|
|
21
|
+
function instanceOfATOMAdministeredOrg(value) {
|
|
22
|
+
let isInstance = true;
|
|
23
|
+
isInstance = isInstance && "color" in value;
|
|
24
|
+
isInstance = isInstance && "id" in value;
|
|
25
|
+
isInstance = isInstance && "logo_url" in value;
|
|
26
|
+
isInstance = isInstance && "name" in value;
|
|
27
|
+
isInstance = isInstance && "tenant_id" in value;
|
|
28
|
+
return isInstance;
|
|
29
|
+
}
|
|
30
|
+
exports.instanceOfATOMAdministeredOrg = instanceOfATOMAdministeredOrg;
|
|
31
|
+
function ATOMAdministeredOrgFromJSON(json) {
|
|
32
|
+
return ATOMAdministeredOrgFromJSONTyped(json, false);
|
|
33
|
+
}
|
|
34
|
+
exports.ATOMAdministeredOrgFromJSON = ATOMAdministeredOrgFromJSON;
|
|
35
|
+
function ATOMAdministeredOrgFromJSONTyped(json, ignoreDiscriminator) {
|
|
36
|
+
if ((json === undefined) || (json === null)) {
|
|
37
|
+
return json;
|
|
38
|
+
}
|
|
39
|
+
return {
|
|
40
|
+
'color': json['color'],
|
|
41
|
+
'id': json['id'],
|
|
42
|
+
'logo_url': json['logo_url'],
|
|
43
|
+
'name': json['name'],
|
|
44
|
+
'tenant_active': !(0, runtime_1.exists)(json, 'tenant_active') ? undefined : json['tenant_active'],
|
|
45
|
+
'tenant_id': json['tenant_id'],
|
|
46
|
+
'user_became_org_admin_at': !(0, runtime_1.exists)(json, 'user_became_org_admin_at') ? undefined : (new Date(json['user_became_org_admin_at'])),
|
|
47
|
+
};
|
|
48
|
+
}
|
|
49
|
+
exports.ATOMAdministeredOrgFromJSONTyped = ATOMAdministeredOrgFromJSONTyped;
|
|
50
|
+
function ATOMAdministeredOrgToJSON(value) {
|
|
51
|
+
if (value === undefined) {
|
|
52
|
+
return undefined;
|
|
53
|
+
}
|
|
54
|
+
if (value === null) {
|
|
55
|
+
return null;
|
|
56
|
+
}
|
|
57
|
+
return {
|
|
58
|
+
'color': value.color,
|
|
59
|
+
'id': value.id,
|
|
60
|
+
'logo_url': value.logo_url,
|
|
61
|
+
'name': value.name,
|
|
62
|
+
'tenant_active': value.tenant_active,
|
|
63
|
+
'tenant_id': value.tenant_id,
|
|
64
|
+
'user_became_org_admin_at': value.user_became_org_admin_at === undefined ? undefined : (value.user_became_org_admin_at.toISOString()),
|
|
65
|
+
};
|
|
66
|
+
}
|
|
67
|
+
exports.ATOMAdministeredOrgToJSON = ATOMAdministeredOrgToJSON;
|
|
@@ -14,7 +14,9 @@
|
|
|
14
14
|
*/
|
|
15
15
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
16
|
exports.ATOMWhoAmIToJSON = exports.ATOMWhoAmIFromJSONTyped = exports.ATOMWhoAmIFromJSON = exports.instanceOfATOMWhoAmI = void 0;
|
|
17
|
-
const
|
|
17
|
+
const runtime_1 = require("../runtime");
|
|
18
|
+
const ATOMAdministeredArchivedOrg_1 = require("./ATOMAdministeredArchivedOrg");
|
|
19
|
+
const ATOMAdministeredOrg_1 = require("./ATOMAdministeredOrg");
|
|
18
20
|
const ATOMTenantIdAndName_1 = require("./ATOMTenantIdAndName");
|
|
19
21
|
const ATOMTenantInJwtForWhoAmI_1 = require("./ATOMTenantInJwtForWhoAmI");
|
|
20
22
|
/**
|
|
@@ -42,7 +44,9 @@ function ATOMWhoAmIFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
42
44
|
return json;
|
|
43
45
|
}
|
|
44
46
|
return {
|
|
45
|
-
'
|
|
47
|
+
'administered_archived_orgs': !(0, runtime_1.exists)(json, 'administered_archived_orgs') ? undefined : (json['administered_archived_orgs'].map(ATOMAdministeredArchivedOrg_1.ATOMAdministeredArchivedOrgFromJSON)),
|
|
48
|
+
'administered_archived_tenants': !(0, runtime_1.exists)(json, 'administered_archived_tenants') ? undefined : (json['administered_archived_tenants'].map(ATOMTenantIdAndName_1.ATOMTenantIdAndNameFromJSON)),
|
|
49
|
+
'administered_orgs': (json['administered_orgs'].map(ATOMAdministeredOrg_1.ATOMAdministeredOrgFromJSON)),
|
|
46
50
|
'administered_tenants': (json['administered_tenants'].map(ATOMTenantIdAndName_1.ATOMTenantIdAndNameFromJSON)),
|
|
47
51
|
'family_name': json['family_name'],
|
|
48
52
|
'given_name': json['given_name'],
|
|
@@ -61,7 +65,9 @@ function ATOMWhoAmIToJSON(value) {
|
|
|
61
65
|
return null;
|
|
62
66
|
}
|
|
63
67
|
return {
|
|
64
|
-
'
|
|
68
|
+
'administered_archived_orgs': value.administered_archived_orgs === undefined ? undefined : (value.administered_archived_orgs.map(ATOMAdministeredArchivedOrg_1.ATOMAdministeredArchivedOrgToJSON)),
|
|
69
|
+
'administered_archived_tenants': value.administered_archived_tenants === undefined ? undefined : (value.administered_archived_tenants.map(ATOMTenantIdAndName_1.ATOMTenantIdAndNameToJSON)),
|
|
70
|
+
'administered_orgs': (value.administered_orgs.map(ATOMAdministeredOrg_1.ATOMAdministeredOrgToJSON)),
|
|
65
71
|
'administered_tenants': (value.administered_tenants.map(ATOMTenantIdAndName_1.ATOMTenantIdAndNameToJSON)),
|
|
66
72
|
'family_name': value.family_name,
|
|
67
73
|
'given_name': value.given_name,
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/* tslint:disable */
|
|
3
|
+
/* eslint-disable */
|
|
4
|
+
/**
|
|
5
|
+
* SVX API
|
|
6
|
+
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
|
|
7
|
+
*
|
|
8
|
+
* The version of the OpenAPI document: 1.3.1
|
|
9
|
+
*
|
|
10
|
+
*
|
|
11
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
12
|
+
* https://openapi-generator.tech
|
|
13
|
+
* Do not edit the class manually.
|
|
14
|
+
*/
|
|
15
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
|
+
exports.IDPForgotPasswordDtoToJSON = exports.IDPForgotPasswordDtoFromJSONTyped = exports.IDPForgotPasswordDtoFromJSON = exports.instanceOfIDPForgotPasswordDto = void 0;
|
|
17
|
+
/**
|
|
18
|
+
* Check if a given object implements the IDPForgotPasswordDto interface.
|
|
19
|
+
*/
|
|
20
|
+
function instanceOfIDPForgotPasswordDto(value) {
|
|
21
|
+
let isInstance = true;
|
|
22
|
+
isInstance = isInstance && "g_recaptcha_response" in value;
|
|
23
|
+
return isInstance;
|
|
24
|
+
}
|
|
25
|
+
exports.instanceOfIDPForgotPasswordDto = instanceOfIDPForgotPasswordDto;
|
|
26
|
+
function IDPForgotPasswordDtoFromJSON(json) {
|
|
27
|
+
return IDPForgotPasswordDtoFromJSONTyped(json, false);
|
|
28
|
+
}
|
|
29
|
+
exports.IDPForgotPasswordDtoFromJSON = IDPForgotPasswordDtoFromJSON;
|
|
30
|
+
function IDPForgotPasswordDtoFromJSONTyped(json, ignoreDiscriminator) {
|
|
31
|
+
if ((json === undefined) || (json === null)) {
|
|
32
|
+
return json;
|
|
33
|
+
}
|
|
34
|
+
return {
|
|
35
|
+
'g_recaptcha_response': json['g-recaptcha-response'],
|
|
36
|
+
};
|
|
37
|
+
}
|
|
38
|
+
exports.IDPForgotPasswordDtoFromJSONTyped = IDPForgotPasswordDtoFromJSONTyped;
|
|
39
|
+
function IDPForgotPasswordDtoToJSON(value) {
|
|
40
|
+
if (value === undefined) {
|
|
41
|
+
return undefined;
|
|
42
|
+
}
|
|
43
|
+
if (value === null) {
|
|
44
|
+
return null;
|
|
45
|
+
}
|
|
46
|
+
return {
|
|
47
|
+
'g-recaptcha-response': value.g_recaptcha_response,
|
|
48
|
+
};
|
|
49
|
+
}
|
|
50
|
+
exports.IDPForgotPasswordDtoToJSON = IDPForgotPasswordDtoToJSON;
|