@nexeraid/identity-schemas 2.37.0 → 2.38.0-dev
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{CoinMarketCap.schema-6a1ff221.cjs.prod.cjs → CoinMarketCap.schema-5142a776.cjs.prod.cjs} +23 -12
- package/dist/{CoinMarketCap.schema-aefa43e8.cjs.dev.cjs → CoinMarketCap.schema-f5000da2.cjs.dev.cjs} +23 -12
- package/dist/{CoinMarketCap.schema-280414c3.esm.mjs → CoinMarketCap.schema-f9a98f8e.esm.mjs} +11 -2
- package/dist/declarations/src/customer.schema.d.ts +7 -0
- package/dist/declarations/src/customer.schema.d.ts.map +1 -1
- package/dist/declarations/src/identity/app-requests.schema.d.ts +358 -170
- package/dist/declarations/src/identity/app-requests.schema.d.ts.map +1 -1
- package/dist/declarations/src/identity/host-requests.schema.d.ts +10 -10
- package/dist/declarations/src/identity/identity-v2.schema.d.ts +86 -42
- package/dist/declarations/src/identity/identity-v2.schema.d.ts.map +1 -1
- package/dist/declarations/src/identity/kyc.schema.d.ts +190 -94
- package/dist/declarations/src/identity/kyc.schema.d.ts.map +1 -1
- package/dist/declarations/src/identity/query.schema.d.ts +141 -565
- package/dist/declarations/src/identity/query.schema.d.ts.map +1 -1
- package/dist/declarations/src/identity/scenario.schema.d.ts +316 -562
- package/dist/declarations/src/identity/scenario.schema.d.ts.map +1 -1
- package/dist/declarations/src/identity/zkps.schema.d.ts +145 -53
- package/dist/declarations/src/identity/zkps.schema.d.ts.map +1 -1
- package/dist/declarations/src/index.d.ts +1 -0
- package/dist/declarations/src/index.d.ts.map +1 -1
- package/dist/declarations/src/providers/comply-advantage/comply-advantage.schema.d.ts +42 -42
- package/dist/declarations/src/providers/kyb-sessions.schema.d.ts +16 -16
- package/dist/declarations/src/providers/kyc-sessions.schema.d.ts +36 -36
- package/dist/declarations/src/providers/merkle-science/merkle-science.schema.d.ts +32 -32
- package/dist/declarations/src/providers/provider.schema.d.ts +469 -469
- package/dist/declarations/src/providers/sumsub/sumsub-applicant.schema.d.ts +36 -36
- package/dist/declarations/src/providers/synaps/synaps.schema.d.ts +100 -100
- package/dist/declarations/src/vault/data-link.schema.d.ts +8 -0
- package/dist/declarations/src/vault/data-link.schema.d.ts.map +1 -0
- package/dist/declarations/src/vault/index.d.ts +3 -0
- package/dist/declarations/src/vault/index.d.ts.map +1 -0
- package/dist/declarations/src/vault/schemas/generated/Customer.schema.json.d.ts +897 -0
- package/dist/declarations/src/vault/schemas/generated/Customer.type.d.ts +47 -0
- package/dist/declarations/src/vault/schemas/generated/Customer.type.d.ts.map +1 -0
- package/dist/declarations/src/vault/schemas/generated/KycSession.schema.json.d.ts +1859 -0
- package/dist/declarations/src/vault/schemas/generated/KycSession.type.d.ts +219 -0
- package/dist/declarations/src/vault/schemas/generated/KycSession.type.d.ts.map +1 -0
- package/dist/declarations/src/vault/schemas/generated/Transaction.schema.json.d.ts +1139 -0
- package/dist/declarations/src/vault/schemas/generated/Transaction.type.d.ts +61 -0
- package/dist/declarations/src/vault/schemas/generated/Transaction.type.d.ts.map +1 -0
- package/dist/declarations/src/vault/vault.schema.d.ts +2808 -0
- package/dist/declarations/src/vault/vault.schema.d.ts.map +1 -0
- package/dist/declarations/src/verifiable-credentials/index.d.ts +5 -10
- package/dist/declarations/src/verifiable-credentials/index.d.ts.map +1 -1
- package/dist/declarations/src/verifiable-credentials/vcs.schema.d.ts +8764 -0
- package/dist/declarations/src/verifiable-credentials/vcs.schema.d.ts.map +1 -0
- package/dist/declarations/src/webhooks/alert.webhooks.schema.d.ts +2 -2
- package/dist/declarations/src/webhooks/customer.webhooks.schema.d.ts +28 -28
- package/dist/declarations/src/webhooks/send-verification-flow-webhook.schema.d.ts +100 -100
- package/dist/declarations/src/webhooks/svix.webhooks.schema.d.ts +1362 -1480
- package/dist/declarations/src/webhooks/svix.webhooks.schema.d.ts.map +1 -1
- package/dist/declarations/src/webhooks/tms.webhooks.schema.d.ts +2 -2
- package/dist/{frontend-utilities.schema-2cdacfcb.cjs.dev.cjs → frontend-utilities.schema-3dbbc782.cjs.dev.cjs} +7 -6
- package/dist/{frontend-utilities.schema-2c6e346e.esm.mjs → frontend-utilities.schema-aae337dd.esm.mjs} +2 -1
- package/dist/{frontend-utilities.schema-fb803ead.cjs.prod.cjs → frontend-utilities.schema-b58a8d24.cjs.prod.cjs} +7 -6
- package/dist/identity-api.schema-185a6e6e.cjs.dev.cjs +2012 -0
- package/dist/identity-api.schema-774e69d4.cjs.prod.cjs +2012 -0
- package/dist/identity-api.schema-80658b16.esm.mjs +1654 -0
- package/dist/nexeraid-identity-schemas.cjs.dev.cjs +124 -98
- package/dist/nexeraid-identity-schemas.cjs.prod.cjs +124 -98
- package/dist/nexeraid-identity-schemas.esm.mjs +5 -4
- package/dist/package.json +25 -5
- package/dist/vault.schema-05a9f7fa.cjs.dev.cjs +6349 -0
- package/dist/vault.schema-d868aba3.cjs.prod.cjs +6349 -0
- package/dist/vault.schema-dc014e8d.esm.mjs +6238 -0
- package/identity/dist/nexeraid-identity-schemas-identity.cjs.dev.cjs +16 -22
- package/identity/dist/nexeraid-identity-schemas-identity.cjs.prod.cjs +16 -22
- package/identity/dist/nexeraid-identity-schemas-identity.esm.mjs +3 -1
- package/package.json +25 -5
- package/providers/dist/nexeraid-identity-schemas-providers.cjs.dev.cjs +4 -2
- package/providers/dist/nexeraid-identity-schemas-providers.cjs.prod.cjs +4 -2
- package/providers/dist/nexeraid-identity-schemas-providers.esm.mjs +4 -2
- package/vault/dist/nexeraid-identity-schemas-vault.cjs.cjs +7 -0
- package/vault/dist/nexeraid-identity-schemas-vault.cjs.d.cts +2 -0
- package/vault/dist/nexeraid-identity-schemas-vault.cjs.d.mts +2 -0
- package/vault/dist/nexeraid-identity-schemas-vault.cjs.d.ts +2 -0
- package/vault/dist/nexeraid-identity-schemas-vault.cjs.dev.cjs +25 -0
- package/vault/dist/nexeraid-identity-schemas-vault.cjs.prod.cjs +25 -0
- package/vault/dist/nexeraid-identity-schemas-vault.esm.mjs +3 -0
- package/vault/package.json +4 -0
- package/verifiable-credentials/dist/nexeraid-identity-schemas-verifiable-credentials.cjs.dev.cjs +35 -20
- package/verifiable-credentials/dist/nexeraid-identity-schemas-verifiable-credentials.cjs.prod.cjs +35 -20
- package/verifiable-credentials/dist/nexeraid-identity-schemas-verifiable-credentials.esm.mjs +4 -2
- package/webhooks/dist/nexeraid-identity-schemas-webhooks.cjs.dev.cjs +22 -17
- package/webhooks/dist/nexeraid-identity-schemas-webhooks.cjs.prod.cjs +22 -17
- package/webhooks/dist/nexeraid-identity-schemas-webhooks.esm.mjs +8 -3
- package/dist/identity-api.schema-79b2c3a7.esm.mjs +0 -3485
- package/dist/identity-api.schema-ab731fb2.cjs.prod.cjs +0 -3895
- package/dist/identity-api.schema-d2a8b678.cjs.dev.cjs +0 -3895
- package/dist/transaction.schema-16357ae0.esm.mjs +0 -65
- package/dist/transaction.schema-548b315f.cjs.prod.cjs +0 -101
- package/dist/transaction.schema-8c266a30.cjs.dev.cjs +0 -101
|
@@ -0,0 +1,1654 @@
|
|
|
1
|
+
import { z } from 'zod';
|
|
2
|
+
import { Q as IDImageCredentialSubjectSchema, T as ProofOfResidenceCredentialSubjectSchema, S as SelfieImageCredentialSubjectSchema, P as IDInformationCredentialSubjectSchema, N as OLD_AMLScreeningsResultsCredentialSubjectSchema, E as ID3CredentialSubjectSchema, F as IDScanCredentialSubjectSchema, H as IDScanSelfieCredentialSubjectSchema, G as IDScanPassportCredentialSubjectSchema, aM as VaultMetadataLinkZodSchema, U as GenericVerifiableCredentialSchema, v as CustomerStatus } from './vault.schema-dc014e8d.esm.mjs';
|
|
3
|
+
import { nanoid } from 'nanoid';
|
|
4
|
+
|
|
5
|
+
function _toPrimitive(t, r) {
|
|
6
|
+
if ("object" != typeof t || !t) return t;
|
|
7
|
+
var e = t[Symbol.toPrimitive];
|
|
8
|
+
if (void 0 !== e) {
|
|
9
|
+
var i = e.call(t, r || "default");
|
|
10
|
+
if ("object" != typeof i) return i;
|
|
11
|
+
throw new TypeError("@@toPrimitive must return a primitive value.");
|
|
12
|
+
}
|
|
13
|
+
return ("string" === r ? String : Number)(t);
|
|
14
|
+
}
|
|
15
|
+
|
|
16
|
+
function _toPropertyKey(t) {
|
|
17
|
+
var i = _toPrimitive(t, "string");
|
|
18
|
+
return "symbol" == typeof i ? i : i + "";
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
function _defineProperty(e, r, t) {
|
|
22
|
+
return (r = _toPropertyKey(r)) in e ? Object.defineProperty(e, r, {
|
|
23
|
+
value: t,
|
|
24
|
+
enumerable: !0,
|
|
25
|
+
configurable: !0,
|
|
26
|
+
writable: !0
|
|
27
|
+
}) : e[r] = t, e;
|
|
28
|
+
}
|
|
29
|
+
|
|
30
|
+
/////////////////////////////////////////
|
|
31
|
+
// APTOS //
|
|
32
|
+
/////////////////////////////////////////
|
|
33
|
+
|
|
34
|
+
var NEXERA_APTOS_CHAINS = /*#__PURE__*/function (NEXERA_APTOS_CHAINS) {
|
|
35
|
+
NEXERA_APTOS_CHAINS["MAINNET"] = "mainnet-aptos";
|
|
36
|
+
NEXERA_APTOS_CHAINS["TESTNET"] = "testnet-aptos";
|
|
37
|
+
return NEXERA_APTOS_CHAINS;
|
|
38
|
+
}({});
|
|
39
|
+
var APTOS_CHAIN_NAMES = _defineProperty(_defineProperty({}, NEXERA_APTOS_CHAINS.MAINNET, "Aptos Mainnet"), NEXERA_APTOS_CHAINS.TESTNET, "Aptos Testnet");
|
|
40
|
+
var APTOS_CHAIN_NAMES_LIST = Object.values(APTOS_CHAIN_NAMES);
|
|
41
|
+
var APTOS_CHAIN_IDS = _defineProperty(_defineProperty({}, NEXERA_APTOS_CHAINS.MAINNET, "mainnet-aptos"), NEXERA_APTOS_CHAINS.TESTNET, "testnet-aptos");
|
|
42
|
+
var ACTIVE_APTOS_CHAIN_IDS = [NEXERA_APTOS_CHAINS.MAINNET, NEXERA_APTOS_CHAINS.TESTNET];
|
|
43
|
+
var AptosChainId = z["enum"](ACTIVE_APTOS_CHAIN_IDS).describe("a value that identifies the chain of the address.");
|
|
44
|
+
|
|
45
|
+
/////////////////////////////////////////
|
|
46
|
+
// BITCOIN //
|
|
47
|
+
/////////////////////////////////////////
|
|
48
|
+
|
|
49
|
+
var NEXERA_BITCOIN_CHAINS = /*#__PURE__*/function (NEXERA_BITCOIN_CHAINS) {
|
|
50
|
+
NEXERA_BITCOIN_CHAINS["MAINNET"] = "mainnet-bitcoin";
|
|
51
|
+
NEXERA_BITCOIN_CHAINS["TESTNET"] = "testnet-bitcoin";
|
|
52
|
+
return NEXERA_BITCOIN_CHAINS;
|
|
53
|
+
}({});
|
|
54
|
+
var BITCOIN_CHAIN_NAMES = _defineProperty(_defineProperty({}, NEXERA_BITCOIN_CHAINS.MAINNET, "Bitcoin Mainnet"), NEXERA_BITCOIN_CHAINS.TESTNET, "Bitcoin Testnet");
|
|
55
|
+
var BITCOIN_CHAIN_NAMES_LIST = Object.values(BITCOIN_CHAIN_NAMES);
|
|
56
|
+
var BITCOIN_CHAIN_IDS = _defineProperty(_defineProperty({}, NEXERA_BITCOIN_CHAINS.MAINNET, "mainnet-bitcoin"), NEXERA_BITCOIN_CHAINS.TESTNET, "testnet-bitcoin");
|
|
57
|
+
var ACTIVE_BITCOIN_CHAIN_IDS = [NEXERA_BITCOIN_CHAINS.MAINNET, NEXERA_BITCOIN_CHAINS.TESTNET];
|
|
58
|
+
var BitcoinChainId = z["enum"](ACTIVE_BITCOIN_CHAIN_IDS).describe("a value that identifies the chain of the address.");
|
|
59
|
+
|
|
60
|
+
/////////////////////////////////////////
|
|
61
|
+
// CARDANO //
|
|
62
|
+
/////////////////////////////////////////
|
|
63
|
+
|
|
64
|
+
var NEXERA_CARDANO_CHAINS = /*#__PURE__*/function (NEXERA_CARDANO_CHAINS) {
|
|
65
|
+
NEXERA_CARDANO_CHAINS["MAINNET"] = "cardano-mainnet";
|
|
66
|
+
NEXERA_CARDANO_CHAINS["TESTNET"] = "cardano-testnet";
|
|
67
|
+
return NEXERA_CARDANO_CHAINS;
|
|
68
|
+
}({});
|
|
69
|
+
var CARDANO_CHAIN_NAMES = _defineProperty(_defineProperty({}, NEXERA_CARDANO_CHAINS.MAINNET, "Cardano Mainnet"), NEXERA_CARDANO_CHAINS.TESTNET, "Cardano Testnet");
|
|
70
|
+
var CARDANO_CHAIN_NAMES_LIST = Object.values(CARDANO_CHAIN_NAMES);
|
|
71
|
+
var CARDANO_CHAIN_IDS = _defineProperty(_defineProperty({}, NEXERA_CARDANO_CHAINS.MAINNET, "cardano-mainnet"), NEXERA_CARDANO_CHAINS.TESTNET, "cardano-testnet");
|
|
72
|
+
var ACTIVE_CARDANO_CHAIN_IDS = [NEXERA_CARDANO_CHAINS.MAINNET, NEXERA_CARDANO_CHAINS.TESTNET];
|
|
73
|
+
var CardanoChainId = z["enum"](ACTIVE_CARDANO_CHAIN_IDS).describe("a value that identifies the chain of the address.");
|
|
74
|
+
|
|
75
|
+
/////////////////////////////////////////
|
|
76
|
+
// COSMOS //
|
|
77
|
+
/////////////////////////////////////////
|
|
78
|
+
|
|
79
|
+
var NEXERA_COSMOS_CHAINS = /*#__PURE__*/function (NEXERA_COSMOS_CHAINS) {
|
|
80
|
+
NEXERA_COSMOS_CHAINS["COSMOS"] = "cosmoshub-4";
|
|
81
|
+
NEXERA_COSMOS_CHAINS["COSMOS_TESTNET"] = "theta-testnet-001";
|
|
82
|
+
return NEXERA_COSMOS_CHAINS;
|
|
83
|
+
}({});
|
|
84
|
+
var COSMOS_CHAIN_NAMES = _defineProperty(_defineProperty({}, NEXERA_COSMOS_CHAINS.COSMOS, "Cosmos Mainnet"), NEXERA_COSMOS_CHAINS.COSMOS_TESTNET, "Cosmos Testnet");
|
|
85
|
+
var COSMOS_CHAIN_NAMES_LIST = Object.values(COSMOS_CHAIN_NAMES);
|
|
86
|
+
var COSMOS_CHAIN_IDS = _defineProperty(_defineProperty({}, NEXERA_COSMOS_CHAINS.COSMOS, "cosmoshub-4"), NEXERA_COSMOS_CHAINS.COSMOS_TESTNET, "theta-testnet-001");
|
|
87
|
+
var ACTIVE_COSMOS_CHAIN_IDS = [NEXERA_COSMOS_CHAINS.COSMOS, NEXERA_COSMOS_CHAINS.COSMOS_TESTNET];
|
|
88
|
+
var CosmosChainId = z["enum"](ACTIVE_COSMOS_CHAIN_IDS).describe("a value that identifies the chain of the address.");
|
|
89
|
+
|
|
90
|
+
var _NEXERA_EVM_CHAIN_NAM, _EVM_BLOCK_TIME;
|
|
91
|
+
var NEXERA_EVM_CHAINS = /*#__PURE__*/function (NEXERA_EVM_CHAINS) {
|
|
92
|
+
NEXERA_EVM_CHAINS["ETHEREUM"] = "1";
|
|
93
|
+
NEXERA_EVM_CHAINS["GOERLI"] = "5";
|
|
94
|
+
NEXERA_EVM_CHAINS["ARBITRUM"] = "42161";
|
|
95
|
+
NEXERA_EVM_CHAINS["ARBITRUM_GOERLI"] = "421613";
|
|
96
|
+
NEXERA_EVM_CHAINS["ARBITRUM_SEPOLIA"] = "421614";
|
|
97
|
+
NEXERA_EVM_CHAINS["OPTIMISM"] = "10";
|
|
98
|
+
NEXERA_EVM_CHAINS["OPTIMISM_GOERLI"] = "420";
|
|
99
|
+
NEXERA_EVM_CHAINS["OPTIMISM_SEPOLIA"] = "11155420";
|
|
100
|
+
NEXERA_EVM_CHAINS["AVALANCHE"] = "43114";
|
|
101
|
+
NEXERA_EVM_CHAINS["AVALANCHE_FUJI"] = "43113";
|
|
102
|
+
NEXERA_EVM_CHAINS["POLYGON"] = "137";
|
|
103
|
+
NEXERA_EVM_CHAINS["POLYGON_AMOY"] = "80002";
|
|
104
|
+
NEXERA_EVM_CHAINS["SEPOLIA"] = "11155111";
|
|
105
|
+
NEXERA_EVM_CHAINS["BASE"] = "8453";
|
|
106
|
+
NEXERA_EVM_CHAINS["BASE_GOERLI"] = "84531";
|
|
107
|
+
NEXERA_EVM_CHAINS["BASE_SEPOLIA"] = "84532";
|
|
108
|
+
NEXERA_EVM_CHAINS["MOONBEAM"] = "1284";
|
|
109
|
+
NEXERA_EVM_CHAINS["MOONRIVER"] = "1285";
|
|
110
|
+
NEXERA_EVM_CHAINS["BNB"] = "56";
|
|
111
|
+
NEXERA_EVM_CHAINS["BNB_TESTNET"] = "97";
|
|
112
|
+
NEXERA_EVM_CHAINS["SWISSTRONIK_TESTNET"] = "1291";
|
|
113
|
+
return NEXERA_EVM_CHAINS;
|
|
114
|
+
}({});
|
|
115
|
+
var NEXERA_EVM_CHAIN_NAMES = (_NEXERA_EVM_CHAIN_NAM = {}, _defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_NEXERA_EVM_CHAIN_NAM, NEXERA_EVM_CHAINS.ETHEREUM, "Ethereum Mainnet"), NEXERA_EVM_CHAINS.SEPOLIA, "Sepolia Testnet"), NEXERA_EVM_CHAINS.POLYGON, "Polygon Mainnet"), NEXERA_EVM_CHAINS.POLYGON_AMOY, "Polygon Amoy Testnet"), NEXERA_EVM_CHAINS.AVALANCHE, "Avalanche Mainnet"), NEXERA_EVM_CHAINS.AVALANCHE_FUJI, "Avalanche Fuji Testnet"), NEXERA_EVM_CHAINS.ARBITRUM, "Arbitrum Mainnet"), NEXERA_EVM_CHAINS.ARBITRUM_SEPOLIA, "Arbitrum Sepolia Testnet"), NEXERA_EVM_CHAINS.BASE, "Base Mainnet"), NEXERA_EVM_CHAINS.BASE_SEPOLIA, "Base Sepolia Testnet"), _defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_NEXERA_EVM_CHAIN_NAM, NEXERA_EVM_CHAINS.BNB, "Binance Smart Chain Mainnet"), NEXERA_EVM_CHAINS.BNB_TESTNET, "Binance Smart Chain Testnet"), NEXERA_EVM_CHAINS.OPTIMISM, "Optimism Mainnet"), NEXERA_EVM_CHAINS.OPTIMISM_SEPOLIA, "Optimism Sepolia Testnet"), NEXERA_EVM_CHAINS.MOONBEAM, "Moonbeam Mainnet"), NEXERA_EVM_CHAINS.MOONRIVER, "Moonriver Mainnet"), NEXERA_EVM_CHAINS.SWISSTRONIK_TESTNET, "Swisstronik Testnet"));
|
|
116
|
+
var NEXERA_EVM_CHAIN_NAMES_LIST = Object.values(NEXERA_EVM_CHAIN_NAMES);
|
|
117
|
+
var NEXERA_EVM_CHAINS_ID = [NEXERA_EVM_CHAINS.ETHEREUM, NEXERA_EVM_CHAINS.GOERLI, NEXERA_EVM_CHAINS.ARBITRUM, NEXERA_EVM_CHAINS.ARBITRUM_GOERLI, NEXERA_EVM_CHAINS.ARBITRUM_SEPOLIA, NEXERA_EVM_CHAINS.OPTIMISM, NEXERA_EVM_CHAINS.OPTIMISM_GOERLI, NEXERA_EVM_CHAINS.OPTIMISM_SEPOLIA, NEXERA_EVM_CHAINS.AVALANCHE, NEXERA_EVM_CHAINS.AVALANCHE_FUJI, NEXERA_EVM_CHAINS.POLYGON, NEXERA_EVM_CHAINS.POLYGON_AMOY, NEXERA_EVM_CHAINS.SEPOLIA, NEXERA_EVM_CHAINS.BASE, NEXERA_EVM_CHAINS.BASE_GOERLI, NEXERA_EVM_CHAINS.BASE_SEPOLIA, NEXERA_EVM_CHAINS.MOONBEAM, NEXERA_EVM_CHAINS.MOONRIVER, NEXERA_EVM_CHAINS.BNB, NEXERA_EVM_CHAINS.BNB_TESTNET, NEXERA_EVM_CHAINS.SWISSTRONIK_TESTNET];
|
|
118
|
+
var NexeraEvmChains = z["enum"](NEXERA_EVM_CHAINS_ID);
|
|
119
|
+
var EVM_BLOCK_TIME = (_EVM_BLOCK_TIME = {}, _defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_EVM_BLOCK_TIME, NEXERA_EVM_CHAINS.ETHEREUM, 12), NEXERA_EVM_CHAINS.GOERLI, 12), NEXERA_EVM_CHAINS.SEPOLIA, 12), NEXERA_EVM_CHAINS.ARBITRUM, 0.26), NEXERA_EVM_CHAINS.ARBITRUM_GOERLI, 0.26), NEXERA_EVM_CHAINS.ARBITRUM_SEPOLIA, 0.26), NEXERA_EVM_CHAINS.OPTIMISM, 2), NEXERA_EVM_CHAINS.OPTIMISM_GOERLI, 2), NEXERA_EVM_CHAINS.OPTIMISM_SEPOLIA, 2), NEXERA_EVM_CHAINS.AVALANCHE, 3), _defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_EVM_BLOCK_TIME, NEXERA_EVM_CHAINS.AVALANCHE_FUJI, 3), NEXERA_EVM_CHAINS.POLYGON, 2), NEXERA_EVM_CHAINS.POLYGON_AMOY, 2), NEXERA_EVM_CHAINS.BASE, 2), NEXERA_EVM_CHAINS.BASE_GOERLI, 2), NEXERA_EVM_CHAINS.BASE_SEPOLIA, 2), NEXERA_EVM_CHAINS.BNB, 3), NEXERA_EVM_CHAINS.BNB_TESTNET, 3), NEXERA_EVM_CHAINS.MOONBEAM, 12), NEXERA_EVM_CHAINS.MOONRIVER, 12), _defineProperty(_EVM_BLOCK_TIME, NEXERA_EVM_CHAINS.SWISSTRONIK_TESTNET, 4));
|
|
120
|
+
var EVM_CHAINS_WITHOUT_DEDICATED_NODE_RPC = [NEXERA_EVM_CHAINS.MOONBEAM, NEXERA_EVM_CHAINS.MOONRIVER, NEXERA_EVM_CHAINS.AVALANCHE_FUJI, NEXERA_EVM_CHAINS.BASE_SEPOLIA, NEXERA_EVM_CHAINS.BNB_TESTNET, NEXERA_EVM_CHAINS.OPTIMISM_SEPOLIA, NEXERA_EVM_CHAINS.ARBITRUM_SEPOLIA, NEXERA_EVM_CHAINS.SWISSTRONIK_TESTNET];
|
|
121
|
+
var ACTIVE_EVM_CHAIN_VALUES = [NEXERA_EVM_CHAINS.ETHEREUM, NEXERA_EVM_CHAINS.POLYGON, NEXERA_EVM_CHAINS.POLYGON_AMOY, NEXERA_EVM_CHAINS.AVALANCHE, NEXERA_EVM_CHAINS.AVALANCHE_FUJI, NEXERA_EVM_CHAINS.ARBITRUM, NEXERA_EVM_CHAINS.ARBITRUM_SEPOLIA, NEXERA_EVM_CHAINS.SEPOLIA, NEXERA_EVM_CHAINS.BASE, NEXERA_EVM_CHAINS.BASE_SEPOLIA, NEXERA_EVM_CHAINS.BNB,
|
|
122
|
+
// for Bsc
|
|
123
|
+
NEXERA_EVM_CHAINS.BNB_TESTNET, NEXERA_EVM_CHAINS.MOONBEAM, NEXERA_EVM_CHAINS.MOONRIVER, NEXERA_EVM_CHAINS.OPTIMISM, NEXERA_EVM_CHAINS.OPTIMISM_SEPOLIA, NEXERA_EVM_CHAINS.SWISSTRONIK_TESTNET];
|
|
124
|
+
var EvmChainId = z["enum"](ACTIVE_EVM_CHAIN_VALUES).describe("a numeric value that identifies the chain of the address. There are many sites that retrieve information on chainIDs such as <a href='https://chainlist.org/'>https://chainlist.org</a>.");
|
|
125
|
+
|
|
126
|
+
/////////////////////////////////////////
|
|
127
|
+
// POLKADOT //
|
|
128
|
+
/////////////////////////////////////////
|
|
129
|
+
|
|
130
|
+
var NEXERA_POLKADOT_CHAINS = /*#__PURE__*/function (NEXERA_POLKADOT_CHAINS) {
|
|
131
|
+
NEXERA_POLKADOT_CHAINS["POLKADOT_RELAY_CHAIN"] = "polkadot-relay-chain";
|
|
132
|
+
NEXERA_POLKADOT_CHAINS["KUSAMA_RELAY_CHAIN"] = "kusama-relay-chain";
|
|
133
|
+
NEXERA_POLKADOT_CHAINS["POLKADOT_TESTNET"] = "polkadot-testnet";
|
|
134
|
+
return NEXERA_POLKADOT_CHAINS;
|
|
135
|
+
}({});
|
|
136
|
+
var POLKADOT_CHAIN_NAMES = _defineProperty(_defineProperty(_defineProperty({}, NEXERA_POLKADOT_CHAINS.POLKADOT_RELAY_CHAIN, "Polkadot Mainnet"), NEXERA_POLKADOT_CHAINS.KUSAMA_RELAY_CHAIN, "Kusama Testnet"), NEXERA_POLKADOT_CHAINS.POLKADOT_TESTNET, "Polkadot Testnet");
|
|
137
|
+
var POLKADOT_CHAIN_NAMES_LIST = Object.values(POLKADOT_CHAIN_NAMES);
|
|
138
|
+
var POLKADOT_CHAIN_IDS = _defineProperty(_defineProperty(_defineProperty({}, NEXERA_POLKADOT_CHAINS.POLKADOT_RELAY_CHAIN, "polkadot-relay-chain"), NEXERA_POLKADOT_CHAINS.KUSAMA_RELAY_CHAIN, "kusama-relay-chain"), NEXERA_POLKADOT_CHAINS.POLKADOT_TESTNET, "polkadot-testnet");
|
|
139
|
+
var ACTIVE_POLKADOT_CHAIN_IDS = [NEXERA_POLKADOT_CHAINS.POLKADOT_RELAY_CHAIN, NEXERA_POLKADOT_CHAINS.KUSAMA_RELAY_CHAIN, NEXERA_POLKADOT_CHAINS.POLKADOT_TESTNET];
|
|
140
|
+
var PolkadotChainId = z["enum"](ACTIVE_POLKADOT_CHAIN_IDS).describe("a value that identifies the chain of the address.");
|
|
141
|
+
|
|
142
|
+
/////////////////////////////////////////
|
|
143
|
+
// SOLANA //
|
|
144
|
+
/////////////////////////////////////////
|
|
145
|
+
|
|
146
|
+
var NEXERA_SOLANA_CHAINS = /*#__PURE__*/function (NEXERA_SOLANA_CHAINS) {
|
|
147
|
+
NEXERA_SOLANA_CHAINS["MAINNET"] = "solana-mainnet";
|
|
148
|
+
NEXERA_SOLANA_CHAINS["TESTNET"] = "solana-testnet";
|
|
149
|
+
NEXERA_SOLANA_CHAINS["DEVNET"] = "solana-devnet";
|
|
150
|
+
return NEXERA_SOLANA_CHAINS;
|
|
151
|
+
}({});
|
|
152
|
+
var SOLANA_CHAIN_NAMES = _defineProperty(_defineProperty(_defineProperty({}, NEXERA_SOLANA_CHAINS.MAINNET, "Solana Mainnet"), NEXERA_SOLANA_CHAINS.TESTNET, "Solana Testnet"), NEXERA_SOLANA_CHAINS.DEVNET, "Solana Devnet");
|
|
153
|
+
var SOLANA_CHAIN_NAMES_LIST = Object.values(SOLANA_CHAIN_NAMES);
|
|
154
|
+
var SOLANA_CHAIN_IDS = _defineProperty(_defineProperty(_defineProperty({}, NEXERA_SOLANA_CHAINS.MAINNET, "solana-mainnet"), NEXERA_SOLANA_CHAINS.TESTNET, "solana-testnet"), NEXERA_SOLANA_CHAINS.DEVNET, "solana-devnet");
|
|
155
|
+
var ACTIVE_SOLANA_CHAIN_IDS = [NEXERA_SOLANA_CHAINS.MAINNET, NEXERA_SOLANA_CHAINS.TESTNET, NEXERA_SOLANA_CHAINS.DEVNET];
|
|
156
|
+
var SolanaChainId = z["enum"](ACTIVE_SOLANA_CHAIN_IDS).describe("a value that identifies the chain of the address.");
|
|
157
|
+
|
|
158
|
+
/////////////////////////////////////////
|
|
159
|
+
// STARKNET //
|
|
160
|
+
/////////////////////////////////////////
|
|
161
|
+
|
|
162
|
+
var NEXERA_STARKNET_CHAINS = /*#__PURE__*/function (NEXERA_STARKNET_CHAINS) {
|
|
163
|
+
NEXERA_STARKNET_CHAINS["STARKNET_MAIN"] = "0x534e5f4d41494e";
|
|
164
|
+
NEXERA_STARKNET_CHAINS["STARKNET_SEPOLIA"] = "0x534e5f5345504f4c4941";
|
|
165
|
+
return NEXERA_STARKNET_CHAINS;
|
|
166
|
+
}({});
|
|
167
|
+
var NEXERA_STARKNET_CHAIN_NAMES = {
|
|
168
|
+
STARKNET_MAIN: "Starknet Mainnet",
|
|
169
|
+
STARKNET_SEPOLIA: "Starknet Sepolia"
|
|
170
|
+
};
|
|
171
|
+
var NEXERA_STARKNET_CHAIN_IDS = {
|
|
172
|
+
STARKNET_MAIN: "0x534e5f4d41494e",
|
|
173
|
+
STARKNET_SEPOLIA: "0x534e5f5345504f4c4941"
|
|
174
|
+
};
|
|
175
|
+
var NEXERA_ACTIVE_STARKNET_CHAIN_IDS = [NEXERA_STARKNET_CHAIN_IDS.STARKNET_MAIN, NEXERA_STARKNET_CHAIN_IDS.STARKNET_SEPOLIA];
|
|
176
|
+
var StarknetChainId = z["enum"](NEXERA_ACTIVE_STARKNET_CHAIN_IDS).describe("a value that identifies the chain of the address.");
|
|
177
|
+
|
|
178
|
+
var NEXERA_TEZOS_CHAINS = /*#__PURE__*/function (NEXERA_TEZOS_CHAINS) {
|
|
179
|
+
NEXERA_TEZOS_CHAINS["TEZOS"] = "NetXdQprcVkpaWU";
|
|
180
|
+
NEXERA_TEZOS_CHAINS["TEZOS_GHOSTNET"] = "NetXnHfVqm9iesp";
|
|
181
|
+
return NEXERA_TEZOS_CHAINS;
|
|
182
|
+
}({});
|
|
183
|
+
/////////////////////////////////////////
|
|
184
|
+
// TEZOS //
|
|
185
|
+
/////////////////////////////////////////
|
|
186
|
+
|
|
187
|
+
var NEXERA_TEZOS_CHAIN_NAMES = _defineProperty(_defineProperty({}, NEXERA_TEZOS_CHAINS.TEZOS, "Tezos Mainnet"), NEXERA_TEZOS_CHAINS.TEZOS_GHOSTNET, "Tezos Ghostnet");
|
|
188
|
+
var NEXERA_TEZOS_CHAIN_NAMES_LIST = Object.values(NEXERA_TEZOS_CHAIN_NAMES);
|
|
189
|
+
var NEXERA_TEZOS_CHAIN_IDS = _defineProperty(_defineProperty({}, NEXERA_TEZOS_CHAINS.TEZOS, "NetXdQprcVkpaWU"), NEXERA_TEZOS_CHAINS.TEZOS_GHOSTNET, "NetXnHfVqm9iesp");
|
|
190
|
+
var ACTIVE_TEZOS_CHAIN_IDS = [NEXERA_TEZOS_CHAINS.TEZOS, NEXERA_TEZOS_CHAINS.TEZOS_GHOSTNET];
|
|
191
|
+
var TezosChainId = z["enum"](ACTIVE_TEZOS_CHAIN_IDS).describe("a numeric value that identifies the chain of the address. There are many sites that retrieve information on chainIDs such as <a href='https://chainlist.org/'>https://chainlist.org</a>.");
|
|
192
|
+
|
|
193
|
+
/////////////////////////////////////////
|
|
194
|
+
// MERGED //
|
|
195
|
+
/////////////////////////////////////////
|
|
196
|
+
|
|
197
|
+
var BlockchainId = z.union([EvmChainId, TezosChainId, CosmosChainId, StarknetChainId, BitcoinChainId, AptosChainId, PolkadotChainId, SolanaChainId, CardanoChainId]);
|
|
198
|
+
var NonTestnetBlockchainId = z.union([z.literal(NEXERA_EVM_CHAINS.ETHEREUM), z.literal(NEXERA_EVM_CHAINS.POLYGON), z.literal(NEXERA_EVM_CHAINS.AVALANCHE), z.literal(NEXERA_EVM_CHAINS.ARBITRUM), z.literal(NEXERA_EVM_CHAINS.BASE), z.literal(NEXERA_EVM_CHAINS.BNB), z.literal(NEXERA_EVM_CHAINS.OPTIMISM), z.literal(NEXERA_EVM_CHAINS.MOONBEAM), z.literal(NEXERA_EVM_CHAINS.MOONRIVER), z.literal(NEXERA_TEZOS_CHAINS.TEZOS), z.literal(NEXERA_COSMOS_CHAINS.COSMOS), z.literal(NEXERA_STARKNET_CHAINS.STARKNET_MAIN), z.literal(NEXERA_BITCOIN_CHAINS.MAINNET), z.literal(NEXERA_APTOS_CHAINS.MAINNET), z.literal(NEXERA_POLKADOT_CHAINS.POLKADOT_RELAY_CHAIN), z.literal(NEXERA_POLKADOT_CHAINS.KUSAMA_RELAY_CHAIN), z.literal(NEXERA_SOLANA_CHAINS.MAINNET), z.literal(NEXERA_CARDANO_CHAINS.MAINNET)]);
|
|
199
|
+
|
|
200
|
+
/////////////////////////////////////////
|
|
201
|
+
// Polygon //
|
|
202
|
+
/////////////////////////////////////////
|
|
203
|
+
|
|
204
|
+
var POLYGON_NETWORK_NAMES = ["main", "amoy"];
|
|
205
|
+
var PolygonNetworkNames = z["enum"](POLYGON_NETWORK_NAMES);
|
|
206
|
+
|
|
207
|
+
/**
|
|
208
|
+
* EIP155
|
|
209
|
+
*/
|
|
210
|
+
var String0x = z.string().refine(function (value) {
|
|
211
|
+
return value.startsWith("0x");
|
|
212
|
+
}, {
|
|
213
|
+
message: "0x string must start with '0x'"
|
|
214
|
+
}).describe("0x string");
|
|
215
|
+
var HexadecimalSchema = z.string().refine(function (value) {
|
|
216
|
+
return /^[0-9a-fA-F]+$/.test(value);
|
|
217
|
+
}, {
|
|
218
|
+
message: "Input must be a hexadecimal string"
|
|
219
|
+
});
|
|
220
|
+
|
|
221
|
+
/**
|
|
222
|
+
* EIP155
|
|
223
|
+
*/
|
|
224
|
+
var isValidAddress = function isValidAddress(address) {
|
|
225
|
+
var regex = /^0x[a-fA-F0-9]{40}$/;
|
|
226
|
+
return regex.test(address);
|
|
227
|
+
};
|
|
228
|
+
var PrivateKey = String0x;
|
|
229
|
+
var PublicKey = z.string();
|
|
230
|
+
/**
|
|
231
|
+
* Note: it might be nice to use String0x as the base object instead of z.string(),
|
|
232
|
+
* but this causes update-api to fail with the following error:
|
|
233
|
+
* TRPCError: [query.kyc.sumsub.getJourneyData] -
|
|
234
|
+
* Input parser key: "userAddress" must be ZodString, ZodNumber, ZodBoolean, ZodBigInt or ZodDate
|
|
235
|
+
*/
|
|
236
|
+
var AddressSchema = z.string().refine(function (value) {
|
|
237
|
+
// Check if the string starts with '0x' and the rest is a valid hexadecimal string
|
|
238
|
+
return /^0x[0-9A-Fa-f]*$/.test(value);
|
|
239
|
+
}, {
|
|
240
|
+
message: "Value must be a valid hexadecimal string prefixed with 0x"
|
|
241
|
+
}).transform(function (value) {
|
|
242
|
+
return value;
|
|
243
|
+
}).describe("String value that identifies the address of a specific user. Normally tied to an EOA that includes the Smart Wallet.");
|
|
244
|
+
var TxHash = z.string().refine(function (value) {
|
|
245
|
+
// Check if the string starts with '0x' and the rest is a valid hexadecimal string
|
|
246
|
+
return /^0x[0-9A-Fa-f]*$/.test(value);
|
|
247
|
+
}, {
|
|
248
|
+
message: "Value must be a valid hexadecimal string prefixed with 0x"
|
|
249
|
+
}).transform(function (value) {
|
|
250
|
+
return value;
|
|
251
|
+
}).describe("Transaction hash");
|
|
252
|
+
var shortBlockchainAddress = function shortBlockchainAddress(address) {
|
|
253
|
+
return "".concat(address.substring(0, 6), "...").concat(address.substring(address.length - 4));
|
|
254
|
+
};
|
|
255
|
+
|
|
256
|
+
/**
|
|
257
|
+
* Aptos
|
|
258
|
+
*/
|
|
259
|
+
var AptosAddress = String0x;
|
|
260
|
+
/**
|
|
261
|
+
* Starknet
|
|
262
|
+
*/
|
|
263
|
+
var StarknetAddress = String0x;
|
|
264
|
+
/**
|
|
265
|
+
* Polkadot
|
|
266
|
+
*/
|
|
267
|
+
var PolkadotAddress = z.string();
|
|
268
|
+
/**
|
|
269
|
+
* Cosmos
|
|
270
|
+
*/
|
|
271
|
+
var CosmosAddress = z.string().refine(function (value) {
|
|
272
|
+
return value.startsWith("cosmos");
|
|
273
|
+
}, {
|
|
274
|
+
message: "Cosmos address must start with 'cosmos'"
|
|
275
|
+
}).transform(function (value) {
|
|
276
|
+
return value;
|
|
277
|
+
}).describe("Cosmos address");
|
|
278
|
+
/**
|
|
279
|
+
* Tezos
|
|
280
|
+
*/
|
|
281
|
+
|
|
282
|
+
var TezosImplicitAddress = z.string().refine(function (value) {
|
|
283
|
+
return value.startsWith("tz");
|
|
284
|
+
}, {
|
|
285
|
+
message: "Tezos address (implicit account) must start with 'tz'"
|
|
286
|
+
}).describe("Tezos address (implicit account)");
|
|
287
|
+
var TezosContractAddress = z.string().refine(function (value) {
|
|
288
|
+
return value.startsWith("KT1");
|
|
289
|
+
}, {
|
|
290
|
+
message: "Tezos contract address must start with 'KT1'"
|
|
291
|
+
}).describe("Tezos contract address");
|
|
292
|
+
var TezosAddress = z.union([TezosImplicitAddress, TezosContractAddress]);
|
|
293
|
+
/**
|
|
294
|
+
* Cardano
|
|
295
|
+
*/
|
|
296
|
+
var CardanoAddress = z.string().refine(function (value) {
|
|
297
|
+
return value.startsWith("addr");
|
|
298
|
+
}, {
|
|
299
|
+
message: "Cardano address must start with 'addr'"
|
|
300
|
+
}).transform(function (value) {
|
|
301
|
+
return value;
|
|
302
|
+
}).describe("Cosmos address");
|
|
303
|
+
/**
|
|
304
|
+
* Bitcoin
|
|
305
|
+
*/
|
|
306
|
+
var BitcoinP2PKHAddress = z.string().refine(function (value) {
|
|
307
|
+
return value.startsWith("1");
|
|
308
|
+
}, {
|
|
309
|
+
message: "Bitcoin P2PKH Address must start with '1'"
|
|
310
|
+
}).describe("Bitcoin P2PKH Address");
|
|
311
|
+
var BitcoinP2SHAddress = z.string().refine(function (value) {
|
|
312
|
+
return value.startsWith("3");
|
|
313
|
+
}, {
|
|
314
|
+
message: "Bitcoin P2SH Address must start with '3'"
|
|
315
|
+
}).describe("Bitcoin P2SH Address");
|
|
316
|
+
var BitcoinBech32Address = z.string().refine(function (value) {
|
|
317
|
+
return value.startsWith("bc1");
|
|
318
|
+
}, {
|
|
319
|
+
message: "Bitcoin Bech32 Address must start with 'bc1'"
|
|
320
|
+
}).describe("Bitcoin Bech32 Address");
|
|
321
|
+
var BitcoinTestnetP2PKHAddress = z.string().refine(function (value) {
|
|
322
|
+
return value.startsWith("m") || value.startsWith("n");
|
|
323
|
+
}, {
|
|
324
|
+
message: "Bitcoin Testnet P2PKH Address must start with 'm' or 'n'"
|
|
325
|
+
}).describe("Bitcoin Testnet P2PKH Address");
|
|
326
|
+
var BitcoinTestnetP2SHAddress = z.string().refine(function (value) {
|
|
327
|
+
return value.startsWith("2");
|
|
328
|
+
}, {
|
|
329
|
+
message: "Bitcoin Testnet P2SH Address must start with '2'"
|
|
330
|
+
}).describe("Bitcoin Testnet P2SH Address");
|
|
331
|
+
var BitcoinTestnetBech32Address = z.string().refine(function (value) {
|
|
332
|
+
return value.startsWith("tb1");
|
|
333
|
+
}, {
|
|
334
|
+
message: "Bitcoin Testnet Bech32 Address must start with 'tb1'"
|
|
335
|
+
}).describe("Bitcoin Testnet Bech32 Address");
|
|
336
|
+
var BitcoinAddress = z.union([BitcoinP2PKHAddress, BitcoinP2SHAddress, BitcoinBech32Address, BitcoinTestnetP2PKHAddress, BitcoinTestnetP2SHAddress, BitcoinTestnetBech32Address]);
|
|
337
|
+
/**
|
|
338
|
+
* Chain agnostic schemas
|
|
339
|
+
*/
|
|
340
|
+
var BlockchainAddress = z.union([AddressSchema, TezosAddress, AptosAddress, PolkadotAddress, StarknetAddress, CosmosAddress, CardanoAddress, BitcoinAddress]);
|
|
341
|
+
|
|
342
|
+
var BLOCKCHAIN_NAMESPACES = ["tezos", "eip155", "aptos", "polkadot", "starknet", "cosmos", "solana", "cardano", "bitcoin"];
|
|
343
|
+
var BlockchainNamespace = z["enum"](BLOCKCHAIN_NAMESPACES);
|
|
344
|
+
var SUPPORTED_BLOCKCHAIN_NAMESPACES_FOR_SIGNATURE_AUTH = ["tezos", "eip155", "aptos", "polkadot", "starknet", "cosmos", "solana", "cardano"];
|
|
345
|
+
var SupportedBlockchainNamespaceForSignatureAuth = z["enum"](SUPPORTED_BLOCKCHAIN_NAMESPACES_FOR_SIGNATURE_AUTH);
|
|
346
|
+
// Nicer names
|
|
347
|
+
var BLOCKCHAIN_NAMESPACES_NAMES = {
|
|
348
|
+
tezos: "Tezos",
|
|
349
|
+
eip155: "EVM",
|
|
350
|
+
aptos: "Aptos",
|
|
351
|
+
polkadot: "Polkadot",
|
|
352
|
+
starknet: "Starknet",
|
|
353
|
+
cosmos: "Cosmos",
|
|
354
|
+
solana: "Solana",
|
|
355
|
+
cardano: "Cardano",
|
|
356
|
+
bitcoin: "Bitcoin"
|
|
357
|
+
};
|
|
358
|
+
var DISPLAYED_BLOCKCHAIN_NAMESPACES = ["Tezos", "EVM", "Aptos", "Polkadot", "Starknet", "Cosmos", "Solana", "Cardano", "Bitcoin"];
|
|
359
|
+
var DisplayedBlockchainNamespace = z["enum"](DISPLAYED_BLOCKCHAIN_NAMESPACES);
|
|
360
|
+
var BLOCKCHAIN_NAME_TO_NAMESPACE = {
|
|
361
|
+
Tezos: "tezos",
|
|
362
|
+
EVM: "eip155",
|
|
363
|
+
Aptos: "aptos",
|
|
364
|
+
Polkadot: "polkadot",
|
|
365
|
+
Starknet: "starknet",
|
|
366
|
+
Cosmos: "cosmos",
|
|
367
|
+
Solana: "solana",
|
|
368
|
+
Cardano: "cardano",
|
|
369
|
+
Bitcoin: "bitcoin"
|
|
370
|
+
};
|
|
371
|
+
var BLOCKCHAIN_NAMESPACE_TO_NAME = {
|
|
372
|
+
tezos: "Tezos",
|
|
373
|
+
eip155: "EVM",
|
|
374
|
+
aptos: "Aptos",
|
|
375
|
+
polkadot: "Polkadot",
|
|
376
|
+
starknet: "Starknet",
|
|
377
|
+
cosmos: "Cosmos",
|
|
378
|
+
solana: "Solana",
|
|
379
|
+
cardano: "Cardano",
|
|
380
|
+
bitcoin: "Bitcoin"
|
|
381
|
+
};
|
|
382
|
+
|
|
383
|
+
/**
|
|
384
|
+
* EIP155
|
|
385
|
+
*/
|
|
386
|
+
|
|
387
|
+
var EIP155Signature = String0x;
|
|
388
|
+
/**
|
|
389
|
+
* Aptos
|
|
390
|
+
*/
|
|
391
|
+
var AptosSignature = z.string();
|
|
392
|
+
/**
|
|
393
|
+
* Starknet
|
|
394
|
+
*/
|
|
395
|
+
|
|
396
|
+
var StarknetSignature = String0x;
|
|
397
|
+
/**
|
|
398
|
+
* Polkadot
|
|
399
|
+
*/
|
|
400
|
+
|
|
401
|
+
var PolkadotSignature = String0x;
|
|
402
|
+
/**
|
|
403
|
+
* Cosmos
|
|
404
|
+
*/
|
|
405
|
+
|
|
406
|
+
var CosmosSignature = HexadecimalSchema;
|
|
407
|
+
/**
|
|
408
|
+
* Tezos
|
|
409
|
+
*/
|
|
410
|
+
|
|
411
|
+
var EdSignature = z.string().refine(function (value) {
|
|
412
|
+
return value.startsWith("edsig");
|
|
413
|
+
}, {
|
|
414
|
+
message: "EdSignature must start with 'edsig'"
|
|
415
|
+
});
|
|
416
|
+
var SpSignature = z.string().refine(function (value) {
|
|
417
|
+
return value.startsWith("spsig");
|
|
418
|
+
}, {
|
|
419
|
+
message: "SpSignature must start with 'spsig'"
|
|
420
|
+
});
|
|
421
|
+
var P2Signature = z.string().refine(function (value) {
|
|
422
|
+
return value.startsWith("p2sig");
|
|
423
|
+
}, {
|
|
424
|
+
message: "P2Signature must start with 'p2sig'"
|
|
425
|
+
});
|
|
426
|
+
var TezosSignature = z.union([EdSignature, SpSignature, P2Signature]);
|
|
427
|
+
/**
|
|
428
|
+
* Cardano
|
|
429
|
+
*/
|
|
430
|
+
|
|
431
|
+
var CardanoSignature = HexadecimalSchema;
|
|
432
|
+
/**
|
|
433
|
+
* Chain agnostic schemas
|
|
434
|
+
*/
|
|
435
|
+
|
|
436
|
+
var BlockchainSignature = z.union([EIP155Signature, TezosSignature, AptosSignature, PolkadotSignature, StarknetSignature, CosmosSignature, CardanoSignature]);
|
|
437
|
+
|
|
438
|
+
/**
|
|
439
|
+
* EIP155
|
|
440
|
+
*/
|
|
441
|
+
|
|
442
|
+
var FunctionCallData = String0x;
|
|
443
|
+
/**
|
|
444
|
+
* Tezos
|
|
445
|
+
*/
|
|
446
|
+
|
|
447
|
+
var TezosEntrypointName = z.string().refine(function (value) {
|
|
448
|
+
return value.startsWith("%");
|
|
449
|
+
}, {
|
|
450
|
+
message: "Tezos entrypoint name must start with '%'"
|
|
451
|
+
}).describe("Tezos entrypoint name");
|
|
452
|
+
|
|
453
|
+
var ENVS = ["cicd", "local", "test-dev-1", "test-dev-2", "test-dev-3", "dev", "stage", "prod"];
|
|
454
|
+
var EnvironmentSchema = z["enum"](ENVS);
|
|
455
|
+
var UuidString = z.string().uuid();
|
|
456
|
+
var OtpCode = z.string().regex(/^\d{6}$/, "OtpCode must be a 6-digit number");
|
|
457
|
+
/**
|
|
458
|
+
* All public services
|
|
459
|
+
*/
|
|
460
|
+
var PUBLIC_SERVICES_SCHEMA_MAP = {
|
|
461
|
+
api: {
|
|
462
|
+
cicd: "http://localhost:3001",
|
|
463
|
+
local: "http://localhost:3001",
|
|
464
|
+
"test-dev-1": "https://api-test-dev-1.bjrcom.xyz",
|
|
465
|
+
"test-dev-2": "https://api-test-dev-2.bjrcom.xyz",
|
|
466
|
+
"test-dev-3": "https://api-test-dev-3.bjrcom.xyz",
|
|
467
|
+
dev: "https://api.bjrcom.xyz",
|
|
468
|
+
stage: "https://api.bjrpilot.xyz",
|
|
469
|
+
prod: "https://api.compilot.ai"
|
|
470
|
+
},
|
|
471
|
+
identity_api: {
|
|
472
|
+
cicd: "http://localhost:3015",
|
|
473
|
+
local: "http://localhost:3015",
|
|
474
|
+
"test-dev-1": "https://identity-api-test-dev-1.bjrcom.xyz",
|
|
475
|
+
"test-dev-2": "https://identity-api-test-dev-2.bjrcom.xyz",
|
|
476
|
+
"test-dev-3": "https://identity-api-test-dev-3.bjrcom.xyz",
|
|
477
|
+
dev: "https://identity-api.bjrcom.xyz",
|
|
478
|
+
stage: "https://identity-api.bjrpilot.xyz",
|
|
479
|
+
prod: "https://identity-api.compilot.ai"
|
|
480
|
+
},
|
|
481
|
+
identityV2: {
|
|
482
|
+
cicd: "http://localhost:3009",
|
|
483
|
+
local: "http://localhost:3009",
|
|
484
|
+
"test-dev-1": "https://identity-v2-test-dev-1.bjrcom.xyz",
|
|
485
|
+
"test-dev-2": "https://identity-v2-test-dev-2.bjrcom.xyz",
|
|
486
|
+
"test-dev-3": "https://identity-v2-test-dev-3.bjrcom.xyz",
|
|
487
|
+
dev: "https://identity-v2.bjrcom.xyz",
|
|
488
|
+
stage: "https://identity-v2.bjrpilot.xyz",
|
|
489
|
+
prod: "https://identity-v2.compilot.ai"
|
|
490
|
+
}
|
|
491
|
+
};
|
|
492
|
+
var IpAddress = z.string().optional().refine(function (val) {
|
|
493
|
+
return val === undefined || z.string().ip().safeParse(val).success;
|
|
494
|
+
}, {
|
|
495
|
+
message: "Invalid IP address"
|
|
496
|
+
});
|
|
497
|
+
|
|
498
|
+
var CredentialSchemas = {
|
|
499
|
+
ProofOfResidence: ProofOfResidenceCredentialSubjectSchema,
|
|
500
|
+
SelfieImage: SelfieImageCredentialSubjectSchema,
|
|
501
|
+
IDImage: IDImageCredentialSubjectSchema,
|
|
502
|
+
IDInformation: IDInformationCredentialSubjectSchema,
|
|
503
|
+
AMLScreeningsResults: OLD_AMLScreeningsResultsCredentialSubjectSchema,
|
|
504
|
+
ID3: ID3CredentialSubjectSchema,
|
|
505
|
+
IDScan: IDScanCredentialSubjectSchema,
|
|
506
|
+
IDScanSelfie: IDScanSelfieCredentialSubjectSchema,
|
|
507
|
+
IDScanPassport: IDScanPassportCredentialSubjectSchema
|
|
508
|
+
};
|
|
509
|
+
var CredentialNames = [{
|
|
510
|
+
value: "AMLScreeningsResults",
|
|
511
|
+
label: "AML screening results"
|
|
512
|
+
}, {
|
|
513
|
+
value: "ProofOfResidence",
|
|
514
|
+
label: "Proof of residence"
|
|
515
|
+
}, {
|
|
516
|
+
value: "SelfieImage",
|
|
517
|
+
label: "Selfie image"
|
|
518
|
+
}, {
|
|
519
|
+
value: "IDImage",
|
|
520
|
+
label: "ID image"
|
|
521
|
+
}, {
|
|
522
|
+
value: "IDInformation",
|
|
523
|
+
label: "ID information"
|
|
524
|
+
}];
|
|
525
|
+
var CredentialTypes = ["AMLScreeningsResults", "ProofOfResidence", "SelfieImage", "IDImage", "IDInformation", "ID3",
|
|
526
|
+
// this is for backwards compatibility
|
|
527
|
+
"IDScan",
|
|
528
|
+
// this is for backwards compatibility
|
|
529
|
+
"IDScanSelfie",
|
|
530
|
+
// this is for backwards compatibility
|
|
531
|
+
"IDScanPassport" // this is for backwards compatibility
|
|
532
|
+
];
|
|
533
|
+
var NexeraCredentialType = z["enum"](CredentialTypes);
|
|
534
|
+
var getCredentialName = function getCredentialName(value) {
|
|
535
|
+
var _CredentialNames$find;
|
|
536
|
+
return (_CredentialNames$find = CredentialNames.find(function (obj) {
|
|
537
|
+
return obj.value === value;
|
|
538
|
+
})) === null || _CredentialNames$find === void 0 ? void 0 : _CredentialNames$find.label;
|
|
539
|
+
};
|
|
540
|
+
var CredentialType = z.string().transform(function (x) {
|
|
541
|
+
return x.replace("_", "-");
|
|
542
|
+
}) // TODO determine why this is needed
|
|
543
|
+
.pipe(z["enum"](CredentialTypes));
|
|
544
|
+
// Should this be replaced by GenericVerifiableCredentialSchema?
|
|
545
|
+
|
|
546
|
+
var VerifiableCredential = z.object({
|
|
547
|
+
issuer: z.string(),
|
|
548
|
+
type: z.array(z.union([z.string(), CredentialType])),
|
|
549
|
+
credentialSubject: z.record(z.unknown())
|
|
550
|
+
}).catchall(z.any());
|
|
551
|
+
var CredentialMediaType = IDImageCredentialSubjectSchema.shape.mediaType_front;
|
|
552
|
+
|
|
553
|
+
// Request
|
|
554
|
+
|
|
555
|
+
var MediaType = /*#__PURE__*/function (MediaType) {
|
|
556
|
+
MediaType["ZKPMessage"] = "application/iden3-zkp-json";
|
|
557
|
+
MediaType["PlainMessage"] = "application/iden3comm-plain-json";
|
|
558
|
+
MediaType["SignedMessage"] = "application/iden3comm-signed-json";
|
|
559
|
+
return MediaType;
|
|
560
|
+
}({});
|
|
561
|
+
var MediaTypePID = z.nativeEnum(MediaType);
|
|
562
|
+
var CIRCUIT_IDS = ["authV2", "stateTransition", "credentialAtomicQueryMTPV2", "credentialAtomicQueryMTPV2OnChain", "credentialAtomicQuerySigV2", "credentialAtomicQuerySigV2OnChain", "credentialAtomicQueryV3-beta.1", "credentialAtomicQueryV3OnChain-beta.1", "linkedMultiQuery10-beta.1"];
|
|
563
|
+
var CircuitId = z["enum"](CIRCUIT_IDS);
|
|
564
|
+
var ZeroKnowledgeProofRequest = z.object({
|
|
565
|
+
id: z.number(),
|
|
566
|
+
circuitId: z.string(),
|
|
567
|
+
optional: z["boolean"]().optional(),
|
|
568
|
+
query: z.record(z.string(), z.any())
|
|
569
|
+
});
|
|
570
|
+
var AUTHORIZATION_REQUEST_MESSAGE_TYPES = {
|
|
571
|
+
AUTHORIZATION_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/authorization/1.0/request",
|
|
572
|
+
AUTHORIZATION_RESPONSE_MESSAGE_TYPE: "https://iden3-communication.io/authorization/1.0/response",
|
|
573
|
+
CREDENTIAL_ISSUANCE_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/credentials/1.0/issuance-request",
|
|
574
|
+
CREDENTIAL_FETCH_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/credentials/1.0/fetch-request",
|
|
575
|
+
CREDENTIAL_OFFER_MESSAGE_TYPE: "https://iden3-communication.io/credentials/1.0/offer",
|
|
576
|
+
CREDENTIAL_ISSUANCE_RESPONSE_MESSAGE_TYPE: "https://iden3-communication.io/credentials/1.0/issuance-response",
|
|
577
|
+
CREDENTIAL_REFRESH_MESSAGE_TYPE: "https://iden3-communication.io/credentials/1.0/refresh",
|
|
578
|
+
DEVICE_REGISTRATION_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/devices/1.0/registration",
|
|
579
|
+
MESSAGE_FETCH_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/messages/1.0/fetch",
|
|
580
|
+
PROOF_GENERATION_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/proofs/1.0/request",
|
|
581
|
+
PROOF_GENERATION_RESPONSE_MESSAGE_TYPE: "https://iden3-communication.io/proofs/1.0/response",
|
|
582
|
+
REVOCATION_STATUS_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/revocation/1.0/request-status",
|
|
583
|
+
REVOCATION_STATUS_RESPONSE_MESSAGE_TYPE: "https://iden3-communication.io/revocation/1.0/status",
|
|
584
|
+
CONTRACT_INVOKE_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/proofs/1.0/contract-invoke-request",
|
|
585
|
+
CONTRACT_INVOKE_RESPONSE_MESSAGE_TYPE: "https://iden3-communication.io/proofs/1.0/contract-invoke-response",
|
|
586
|
+
CREDENTIAL_ONCHAIN_OFFER_MESSAGE_TYPE: "https://iden3-communication.io/credentials/1.0/onchain-offer",
|
|
587
|
+
PROPOSAL_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/credentials/0.1/proposal-request",
|
|
588
|
+
PROPOSAL_MESSAGE_TYPE: "https://iden3-communication.io/credentials/0.1/proposal",
|
|
589
|
+
PAYMENT_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/credentials/0.1/payment-request",
|
|
590
|
+
PAYMENT_MESSAGE_TYPE: "https://iden3-communication.io/credentials/0.1/payment"
|
|
591
|
+
};
|
|
592
|
+
var AuthorizationRequestMessageTypes = ["https://iden3-communication.io/authorization/1.0/request", "https://iden3-communication.io/authorization/1.0/response", "https://iden3-communication.io/credentials/1.0/issuance-request", "https://iden3-communication.io/credentials/1.0/fetch-request", "https://iden3-communication.io/credentials/1.0/offer", "https://iden3-communication.io/credentials/1.0/issuance-response", "https://iden3-communication.io/credentials/1.0/refresh", "https://iden3-communication.io/devices/1.0/registration", "https://iden3-communication.io/messages/1.0/fetch", "https://iden3-communication.io/proofs/1.0/request", "https://iden3-communication.io/proofs/1.0/response", "https://iden3-communication.io/revocation/1.0/request-status", "https://iden3-communication.io/revocation/1.0/status", "https://iden3-communication.io/proofs/1.0/contract-invoke-request", "https://iden3-communication.io/proofs/1.0/contract-invoke-response", "https://iden3-communication.io/credentials/1.0/onchain-offer", "https://iden3-communication.io/credentials/0.1/proposal-request", "https://iden3-communication.io/credentials/0.1/proposal", "https://iden3-communication.io/credentials/0.1/payment-request", "https://iden3-communication.io/credentials/0.1/payment"];
|
|
593
|
+
var AuthorizationRequestMessageType = z["enum"](AuthorizationRequestMessageTypes);
|
|
594
|
+
var AuthorizationRequestMessage = z.object({
|
|
595
|
+
id: z.string(),
|
|
596
|
+
typ: MediaTypePID.optional(),
|
|
597
|
+
type: AuthorizationRequestMessageType,
|
|
598
|
+
thid: z.string().optional(),
|
|
599
|
+
body: z.object({
|
|
600
|
+
callbackUrl: z.string(),
|
|
601
|
+
reason: z.string().optional(),
|
|
602
|
+
did_doc: z.any().optional(),
|
|
603
|
+
message: z.string().optional(),
|
|
604
|
+
scope: z.array(ZeroKnowledgeProofRequest)
|
|
605
|
+
}),
|
|
606
|
+
from: z.string(),
|
|
607
|
+
to: z.string().optional()
|
|
608
|
+
});
|
|
609
|
+
// Response
|
|
610
|
+
var ProofData = z.object({
|
|
611
|
+
pi_a: z.array(z.string()),
|
|
612
|
+
pi_b: z.array(z.array(z.string())),
|
|
613
|
+
pi_c: z.array(z.string()),
|
|
614
|
+
protocol: z.string(),
|
|
615
|
+
curve: z.string().optional()
|
|
616
|
+
});
|
|
617
|
+
var ZeroKnowledgeProofResponse = z.object({
|
|
618
|
+
id: z.number(),
|
|
619
|
+
circuitId: z.string(),
|
|
620
|
+
vp: z.any().optional(),
|
|
621
|
+
proof: ProofData,
|
|
622
|
+
pub_signals: z.array(z.string())
|
|
623
|
+
});
|
|
624
|
+
var AuthorizationResponseMessage = z.object({
|
|
625
|
+
id: z.string(),
|
|
626
|
+
typ: MediaTypePID.optional(),
|
|
627
|
+
type: z.string(),
|
|
628
|
+
thid: z.string().optional(),
|
|
629
|
+
body: z.object({
|
|
630
|
+
did_doc: z.any().optional(),
|
|
631
|
+
message: z.string().optional(),
|
|
632
|
+
scope: z.array(ZeroKnowledgeProofResponse)
|
|
633
|
+
}),
|
|
634
|
+
from: z.string().optional(),
|
|
635
|
+
to: z.string().optional()
|
|
636
|
+
});
|
|
637
|
+
// Polygon Wallet
|
|
638
|
+
var CredentialQrCodeData = z.object({
|
|
639
|
+
id: z.string(),
|
|
640
|
+
typ: z.string(),
|
|
641
|
+
type: z.string(),
|
|
642
|
+
thid: z.string(),
|
|
643
|
+
body: z.object({
|
|
644
|
+
url: z.string(),
|
|
645
|
+
credentials: z.unknown()
|
|
646
|
+
}),
|
|
647
|
+
from: z.string(),
|
|
648
|
+
to: z.string()
|
|
649
|
+
});
|
|
650
|
+
var AuthQrCodeData = z.object({
|
|
651
|
+
id: z.string(),
|
|
652
|
+
typ: z.string(),
|
|
653
|
+
type: z.string(),
|
|
654
|
+
thid: z.string(),
|
|
655
|
+
body: z.object({
|
|
656
|
+
callbackUrl: z.string(),
|
|
657
|
+
reason: z.string(),
|
|
658
|
+
scope: z.unknown()
|
|
659
|
+
}),
|
|
660
|
+
from: z.string()
|
|
661
|
+
});
|
|
662
|
+
var QrCodeLinkWithSchemaType = z.object({
|
|
663
|
+
qrCodeLink: z.string().nullish(),
|
|
664
|
+
schemaType: z.string().nullish()
|
|
665
|
+
}).describe("Polygon ID Verifiable Credential Offer, to be consumed by the Polygon ID Wallet");
|
|
666
|
+
function parseIden3Message(input) {
|
|
667
|
+
var prefix = "request_uri=";
|
|
668
|
+
var startIndex = input.indexOf(prefix);
|
|
669
|
+
if (startIndex === -1) {
|
|
670
|
+
throw new Error("Wrong request - request doesn't start with request_uri=");
|
|
671
|
+
}
|
|
672
|
+
return z.string().url().parse(input.substring(startIndex + prefix.length));
|
|
673
|
+
}
|
|
674
|
+
function parseSessionIdFromUrl(urlString) {
|
|
675
|
+
var url = new URL(urlString);
|
|
676
|
+
var params = new URLSearchParams(url.search);
|
|
677
|
+
var sessionId = params.get("sessionID");
|
|
678
|
+
if (!sessionId) {
|
|
679
|
+
throw new Error("No Session Id found in callback url");
|
|
680
|
+
}
|
|
681
|
+
return sessionId;
|
|
682
|
+
}
|
|
683
|
+
|
|
684
|
+
var StoragePrefix = "storage";
|
|
685
|
+
var IdentityPrefix = "identity";
|
|
686
|
+
var EmailPrefix = "email";
|
|
687
|
+
var WalletPrefix = "wallet";
|
|
688
|
+
var AppPrefix = "app";
|
|
689
|
+
var ChallengePrefix = "challenge";
|
|
690
|
+
var TestPrefix = "test";
|
|
691
|
+
var CustomerScreeningPrefix = "cstscr";
|
|
692
|
+
var TagPrefix = "tag";
|
|
693
|
+
|
|
694
|
+
// TMS
|
|
695
|
+
var TagsToTransactionReviewsPrefix = "ttxr";
|
|
696
|
+
var TransactionAddressesPrefix = "txa";
|
|
697
|
+
var TransactionPrefix = "tx";
|
|
698
|
+
var TransactionFeesPrefix = "txf";
|
|
699
|
+
var TransactionReviewPrefix = "txrev";
|
|
700
|
+
var TransactionPartiesPrefix = "txpar";
|
|
701
|
+
var TransactionInfosPrefix = "txi";
|
|
702
|
+
var TransactionExtractedInfosPrefix = "txei";
|
|
703
|
+
var TransactionMethodsPrefix = "txm";
|
|
704
|
+
var TransactionMethodExtractedInfosPrefix = "txmei";
|
|
705
|
+
var InstitutionPrefix = "ins";
|
|
706
|
+
var InstitutionExtractedInfosPrefix = "insei";
|
|
707
|
+
var TransactionAmountPrefix = "txam";
|
|
708
|
+
|
|
709
|
+
// Add these lines near the top of the file with other prefix definitions
|
|
710
|
+
var ScenarioPrefix = "scenario";
|
|
711
|
+
var ListPrefix = "list";
|
|
712
|
+
var QueryPrefix = "query";
|
|
713
|
+
var ActionPrefix = "action";
|
|
714
|
+
|
|
715
|
+
// workflows-api
|
|
716
|
+
var WorkflowSessionAttributePrefix = "wsatr";
|
|
717
|
+
|
|
718
|
+
// ---
|
|
719
|
+
|
|
720
|
+
// Add these lines in the type definitions section
|
|
721
|
+
|
|
722
|
+
// TMS
|
|
723
|
+
|
|
724
|
+
// workflows-api
|
|
725
|
+
|
|
726
|
+
// ---
|
|
727
|
+
|
|
728
|
+
// TMS
|
|
729
|
+
|
|
730
|
+
// Scenarios service
|
|
731
|
+
|
|
732
|
+
// Workflows-API
|
|
733
|
+
|
|
734
|
+
var createBrandedSchemaId = function createBrandedSchemaId(brand) {
|
|
735
|
+
return z.custom(function (val) {
|
|
736
|
+
if (typeof val !== "string") return false;
|
|
737
|
+
return val.startsWith(brand);
|
|
738
|
+
}, {
|
|
739
|
+
message: "Invalid ".concat(brand, " id")
|
|
740
|
+
});
|
|
741
|
+
};
|
|
742
|
+
|
|
743
|
+
// ---
|
|
744
|
+
|
|
745
|
+
var StorageId = createBrandedSchemaId("".concat(StoragePrefix, "_"));
|
|
746
|
+
var IdentityId = createBrandedSchemaId("".concat(IdentityPrefix, "_"));
|
|
747
|
+
var EmailId = createBrandedSchemaId("".concat(EmailPrefix, "_"));
|
|
748
|
+
var WalletId = createBrandedSchemaId("".concat(WalletPrefix, "_"));
|
|
749
|
+
var AppId = createBrandedSchemaId("".concat(AppPrefix, "_"));
|
|
750
|
+
var ChallengeId = createBrandedSchemaId("".concat(ChallengePrefix, "_"));
|
|
751
|
+
var TestId = createBrandedSchemaId("".concat(TestPrefix, "_"));
|
|
752
|
+
var CustomerScreeningId = createBrandedSchemaId("".concat(CustomerScreeningPrefix, "_"));
|
|
753
|
+
var TagId = createBrandedSchemaId("".concat(TagPrefix, "_"));
|
|
754
|
+
var ActionId = createBrandedSchemaId("".concat(ActionPrefix, "_"));
|
|
755
|
+
|
|
756
|
+
// TMS
|
|
757
|
+
var TagsToTransactionReviewsId = createBrandedSchemaId("".concat(TagsToTransactionReviewsPrefix, "_"));
|
|
758
|
+
var TransactionAddressesId = createBrandedSchemaId("".concat(TransactionAddressesPrefix, "_"));
|
|
759
|
+
var TransactionId = createBrandedSchemaId("".concat(TransactionPrefix, "_"));
|
|
760
|
+
var TransactionFeesId = createBrandedSchemaId("".concat(TransactionFeesPrefix, "_"));
|
|
761
|
+
var TransactionReviewId = createBrandedSchemaId("".concat(TransactionReviewPrefix, "_"));
|
|
762
|
+
var TransactionPartiesId = createBrandedSchemaId("".concat(TransactionPartiesPrefix, "_"));
|
|
763
|
+
var TransactionInfosId = createBrandedSchemaId("".concat(TransactionInfosPrefix, "_"));
|
|
764
|
+
var TransactionExtractedInfosId = createBrandedSchemaId("".concat(TransactionExtractedInfosPrefix, "_"));
|
|
765
|
+
var TransactionMethodsId = createBrandedSchemaId("".concat(TransactionMethodsPrefix, "_"));
|
|
766
|
+
var TransactionMethodExtractedInfosId = createBrandedSchemaId("".concat(TransactionMethodExtractedInfosPrefix, "_"));
|
|
767
|
+
var InstitutionId = createBrandedSchemaId("".concat(InstitutionPrefix, "_"));
|
|
768
|
+
var InstitutionExtractedInfosId = createBrandedSchemaId("".concat(InstitutionExtractedInfosPrefix, "_"));
|
|
769
|
+
var TransactionAmountId = createBrandedSchemaId("".concat(TransactionAmountPrefix, "_"));
|
|
770
|
+
var ScenarioId = createBrandedSchemaId("".concat(ScenarioPrefix, "_"));
|
|
771
|
+
var ListId = createBrandedSchemaId("".concat(ListPrefix, "_"));
|
|
772
|
+
var QueryId = createBrandedSchemaId("".concat(QueryPrefix, "_"));
|
|
773
|
+
|
|
774
|
+
// Workflows api
|
|
775
|
+
var WorkflowSessionId = UuidString;
|
|
776
|
+
var WorkflowSessionAttributeId = createBrandedSchemaId("".concat(WorkflowSessionAttributePrefix, "_"));
|
|
777
|
+
var generateId = function generateId(type) {
|
|
778
|
+
return "".concat(type, "_").concat(nanoid(12));
|
|
779
|
+
};
|
|
780
|
+
var MemberId = z.string();
|
|
781
|
+
|
|
782
|
+
var QUERY_LOGIC_OPERATOR = ["AND", "OR"];
|
|
783
|
+
var QueryLogicOperator = z["enum"](QUERY_LOGIC_OPERATOR);
|
|
784
|
+
var OPERATORS = ["$noop",
|
|
785
|
+
// noop can be used in zkps as proof of credential issuance https://docs.privado.id/docs/verifier/verification-library/zk-query-language#exists---operator-11
|
|
786
|
+
"$eq",
|
|
787
|
+
// equal to
|
|
788
|
+
"$lt",
|
|
789
|
+
// less than
|
|
790
|
+
"$lte",
|
|
791
|
+
// less than or equal to
|
|
792
|
+
"$gt",
|
|
793
|
+
// greater than
|
|
794
|
+
"$gte",
|
|
795
|
+
// greater than or equal to
|
|
796
|
+
"$in",
|
|
797
|
+
// in
|
|
798
|
+
"$nin",
|
|
799
|
+
// not in
|
|
800
|
+
"$ne",
|
|
801
|
+
// not equal to
|
|
802
|
+
//"$between", // between
|
|
803
|
+
//"$nonbetween", // contains
|
|
804
|
+
"$exists" // exists
|
|
805
|
+
];
|
|
806
|
+
var Operator = z["enum"](OPERATORS);
|
|
807
|
+
var ZKPOperator = z["enum"](OPERATORS).exclude(["$lte", "$gte"]);
|
|
808
|
+
var operatorDisplayMap = _defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty({}, Operator["enum"].$eq, "="), Operator["enum"].$gt, ">"), Operator["enum"].$lt, "<"), Operator["enum"].$gte, ">="), Operator["enum"].$lte, "<="), Operator["enum"].$ne, "!="), Operator["enum"].$in, "in"), Operator["enum"].$nin, "not in"), Operator["enum"].$noop, "noop"), Operator["enum"].$exists, "exists");
|
|
809
|
+
var ARRAY_OPERATORS = [Operator["enum"].$in, Operator["enum"].$nin, Operator["enum"].$eq, Operator["enum"].$ne
|
|
810
|
+
//Operator.enum.$between,
|
|
811
|
+
//Operator.enum.$nonbetween,
|
|
812
|
+
];
|
|
813
|
+
var ArrayOperator = z["enum"](ARRAY_OPERATORS);
|
|
814
|
+
var STRING_OPERATORS = [Operator["enum"].$eq, Operator["enum"].$ne, Operator["enum"].$in, Operator["enum"].$nin, Operator["enum"].$exists];
|
|
815
|
+
var StringOperator = z["enum"](STRING_OPERATORS);
|
|
816
|
+
var NUMERIC_OPERATORS = [Operator["enum"].$eq, Operator["enum"].$ne, Operator["enum"].$gt, Operator["enum"].$gte, Operator["enum"].$lt, Operator["enum"].$lte
|
|
817
|
+
//Operator.enum.$between,
|
|
818
|
+
//Operator.enum.$nonbetween,
|
|
819
|
+
];
|
|
820
|
+
var NumericOperator = z["enum"](NUMERIC_OPERATORS);
|
|
821
|
+
var BOOLEAN_OPERATORS = [Operator["enum"].$eq, Operator["enum"].$ne];
|
|
822
|
+
var BooleanOperator = z["enum"](BOOLEAN_OPERATORS);
|
|
823
|
+
var DATE_OPERATORS = [Operator["enum"].$eq, Operator["enum"].$ne, Operator["enum"].$gt, Operator["enum"].$gte, Operator["enum"].$lt, Operator["enum"].$lte
|
|
824
|
+
//Operator.enum.$between,
|
|
825
|
+
//Operator.enum.$nonbetween,
|
|
826
|
+
];
|
|
827
|
+
var DateOperator = z["enum"](DATE_OPERATORS);
|
|
828
|
+
var SUPPORTED_TYPES = ["string", "integer", "boolean", "number", "array", "date"];
|
|
829
|
+
var SupportedType = z["enum"](SUPPORTED_TYPES);
|
|
830
|
+
var SupportedTypes = z.object(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty({}, SupportedType["enum"].string, StringOperator), SupportedType["enum"].integer, NumericOperator), SupportedType["enum"]["boolean"], BooleanOperator), SupportedType["enum"].number, NumericOperator), SupportedType["enum"].array, ArrayOperator), SupportedType["enum"].date, DateOperator));
|
|
831
|
+
var AllCredentialValues = z.union([z["boolean"](), z.string(), z.number(), z.array(z.string()), z.array(z.number())]);
|
|
832
|
+
var QueryConfigSimplified = z.object({
|
|
833
|
+
queryId: QueryId.describe("Unique ID for the query").optional(),
|
|
834
|
+
// TODO: this should not be optional?
|
|
835
|
+
requestId: z.coerce.number().nullish().describe("Request ID for ZKPs"),
|
|
836
|
+
attribute: VaultMetadataLinkZodSchema,
|
|
837
|
+
value: AllCredentialValues.nullish(),
|
|
838
|
+
// TODO: Make the value type dynamic based on the attribute type
|
|
839
|
+
operator: Operator // TODO: Make the operator type dynamic based on the attribute type
|
|
840
|
+
});
|
|
841
|
+
var PartialQueryConfigSimplified = QueryConfigSimplified.partial();
|
|
842
|
+
var OLD_ChallengeQuerySchema = z.object({
|
|
843
|
+
id: z.string().optional(),
|
|
844
|
+
query: QueryConfigSimplified
|
|
845
|
+
});
|
|
846
|
+
var OLD_CHALLENGE_QUERY_OPERATORS = ["GREATER_THAN", "LESS_THAN", "EQUAL_TO", "NOT_EQUAL_TO", "LESS_THAN_OR_EQUAL_TO", "GREATER_THAN_OR_EQUAL_TO", "IN", "NOT_IN",
|
|
847
|
+
//"BETWEEN",
|
|
848
|
+
//"NOT_BETWEEN",
|
|
849
|
+
"EXISTS"];
|
|
850
|
+
var OLD_ChallengeQueryOperator = z["enum"](OLD_CHALLENGE_QUERY_OPERATORS);
|
|
851
|
+
var OperatorMappings = {
|
|
852
|
+
toChallenge: _defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty({}, Operator["enum"].$noop, OLD_ChallengeQueryOperator["enum"].EQUAL_TO), Operator["enum"].$eq, OLD_ChallengeQueryOperator["enum"].EQUAL_TO), Operator["enum"].$lt, OLD_ChallengeQueryOperator["enum"].LESS_THAN), Operator["enum"].$lte, OLD_ChallengeQueryOperator["enum"].LESS_THAN_OR_EQUAL_TO), Operator["enum"].$gt, OLD_ChallengeQueryOperator["enum"].GREATER_THAN), Operator["enum"].$gte, OLD_ChallengeQueryOperator["enum"].GREATER_THAN_OR_EQUAL_TO), Operator["enum"].$in, OLD_ChallengeQueryOperator["enum"].IN), Operator["enum"].$nin, OLD_ChallengeQueryOperator["enum"].NOT_IN), Operator["enum"].$ne, OLD_ChallengeQueryOperator["enum"].NOT_EQUAL_TO), Operator["enum"].$exists, OLD_ChallengeQueryOperator["enum"].EXISTS),
|
|
853
|
+
fromChallenge: _defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty(_defineProperty({}, OLD_ChallengeQueryOperator["enum"].EQUAL_TO, Operator["enum"].$eq), OLD_ChallengeQueryOperator["enum"].LESS_THAN, Operator["enum"].$lt), OLD_ChallengeQueryOperator["enum"].LESS_THAN_OR_EQUAL_TO, Operator["enum"].$lte), OLD_ChallengeQueryOperator["enum"].GREATER_THAN, Operator["enum"].$gt), OLD_ChallengeQueryOperator["enum"].GREATER_THAN_OR_EQUAL_TO, Operator["enum"].$gte), OLD_ChallengeQueryOperator["enum"].IN, Operator["enum"].$in), OLD_ChallengeQueryOperator["enum"].NOT_IN, Operator["enum"].$nin), OLD_ChallengeQueryOperator["enum"].NOT_EQUAL_TO, Operator["enum"].$ne), OLD_ChallengeQueryOperator["enum"].EXISTS, Operator["enum"].$exists)
|
|
854
|
+
};
|
|
855
|
+
var OperatorToOLD_ChallengeQueryOperator = OperatorMappings.toChallenge;
|
|
856
|
+
var OLD_ChallengeQueryOperatorToOperator = OperatorMappings.fromChallenge;
|
|
857
|
+
|
|
858
|
+
// FIXME: Remove this once we migrate to the vault metadata
|
|
859
|
+
var OLD_QueryCredentialTypes = ["IDInformation", "IDImage", "SelfieImage", "ProofOfResidence", "AMLScreeningsResults", "ID3", "IDScan", "IDScanSelfie", "IDScanPassport"];
|
|
860
|
+
var OLD_QueryCredentialType = z["enum"](OLD_QueryCredentialTypes);
|
|
861
|
+
/**
|
|
862
|
+
* @deprecated Use vault client and services instead
|
|
863
|
+
*
|
|
864
|
+
* FIXME: Have a better way to determine which credentials are required, centralize this logic if possible
|
|
865
|
+
* and with a way that doesn't require looking into the link
|
|
866
|
+
*
|
|
867
|
+
* @param dataLink
|
|
868
|
+
* @returns
|
|
869
|
+
*/
|
|
870
|
+
function getOldCredentialType(dataLink) {
|
|
871
|
+
if (dataLink.path.includes("/vcs/")) {
|
|
872
|
+
var _dataLink$path$split$;
|
|
873
|
+
return (_dataLink$path$split$ = dataLink.path.split("/vcs/")[1]) === null || _dataLink$path$split$ === void 0 ? void 0 : _dataLink$path$split$.split("/")[0];
|
|
874
|
+
}
|
|
875
|
+
var mapping = {
|
|
876
|
+
"Customer/identityData/age": "IDInformation",
|
|
877
|
+
"Customer/identityData/nationality": "IDInformation",
|
|
878
|
+
"Customer/identityData/residence": "ProofOfResidence",
|
|
879
|
+
"Customer/kycStatus/selfieCheckStatus": "SelfieImage",
|
|
880
|
+
"Customer/kycStatus/idImageCheckStatus": "IDImage",
|
|
881
|
+
"Customer/kycStatus/idInformationCheckStatus": "IDInformation",
|
|
882
|
+
"Customer/kycStatus/proofOfResidenceCheckStatus": "ProofOfResidence"
|
|
883
|
+
};
|
|
884
|
+
if (dataLink.path in mapping) {
|
|
885
|
+
return mapping[dataLink.path];
|
|
886
|
+
}
|
|
887
|
+
return undefined;
|
|
888
|
+
}
|
|
889
|
+
|
|
890
|
+
/**
|
|
891
|
+
* @deprecated Use vault client and services instead
|
|
892
|
+
*
|
|
893
|
+
* @param dataLink
|
|
894
|
+
* @returns
|
|
895
|
+
*/
|
|
896
|
+
function getOldCredentialPath(dataLink) {
|
|
897
|
+
if (dataLink.path.includes("credentialSubject")) {
|
|
898
|
+
var _dataLink$path$split$2;
|
|
899
|
+
var path = (_dataLink$path$split$2 = dataLink.path.split("credentialSubject")[1]) !== null && _dataLink$path$split$2 !== void 0 ? _dataLink$path$split$2 : "";
|
|
900
|
+
path = path.startsWith("/") ? path.slice(1) : path;
|
|
901
|
+
path = path.replaceAll("/", ".");
|
|
902
|
+
return path;
|
|
903
|
+
}
|
|
904
|
+
var mapping = {
|
|
905
|
+
"Customer/identityData/age": "personalData.age",
|
|
906
|
+
"Customer/identityData/nationality": "personalData.nationality",
|
|
907
|
+
"Customer/identityData/residence": "personalData.residence"
|
|
908
|
+
};
|
|
909
|
+
if (dataLink.path in mapping) {
|
|
910
|
+
return mapping[dataLink.path];
|
|
911
|
+
}
|
|
912
|
+
return dataLink.path;
|
|
913
|
+
}
|
|
914
|
+
|
|
915
|
+
/**
|
|
916
|
+
* @deprecated Use vault client and services instead
|
|
917
|
+
*/
|
|
918
|
+
function oldCredentialPathToDataLink(path, credentialType) {
|
|
919
|
+
return {
|
|
920
|
+
version: "v1",
|
|
921
|
+
schema: "KycSession",
|
|
922
|
+
// all old paths are for customer credentials
|
|
923
|
+
path: "KycSession/vcs/".concat(credentialType, "/v1/credentialSubject/").concat(path.replaceAll(".", "/"))
|
|
924
|
+
};
|
|
925
|
+
}
|
|
926
|
+
|
|
927
|
+
var FLOW_TYPES = ["web2", "web3"];
|
|
928
|
+
var FlowType = z["enum"](FLOW_TYPES).describe("The flow type of the user");
|
|
929
|
+
var VerificationModes = ["full_verification", "sandbox"];
|
|
930
|
+
var VerificationMode = z["enum"](VerificationModes).describe("The verification mode of the project");
|
|
931
|
+
var IDENTITY_DOCUMENT_COUNTRY_LIST_OPTIONS = ["allowedCountryIdentityDocuments", "excludedCountryIdentityDocuments"];
|
|
932
|
+
var IdentityDocumentCountryListOption = z["enum"](IDENTITY_DOCUMENT_COUNTRY_LIST_OPTIONS);
|
|
933
|
+
var IDENTITY_DOCUMENT_OPTIONS = ["PASSPORT", "ID_CARD", "DRIVING_LICENSE"];
|
|
934
|
+
var IdentityDocumentOptionsType = z["enum"](IDENTITY_DOCUMENT_OPTIONS);
|
|
935
|
+
var PERSONAL_INFORMATION_FIELDS = ["EMAIL", "PHONE", "TWITTER", "DISCORD", "TELEGRAM"];
|
|
936
|
+
var PersonalInformationFieldsIdentityDocuments = z["enum"](PERSONAL_INFORMATION_FIELDS);
|
|
937
|
+
var Identifier = z.union([z.literal("verification"), z.literal("management")]);
|
|
938
|
+
|
|
939
|
+
/**
|
|
940
|
+
* Represents the additional data that can be attached to a customer
|
|
941
|
+
*/
|
|
942
|
+
|
|
943
|
+
var AdditionalCustomerInformationParams = z.object({
|
|
944
|
+
email: z.string().email().optional(),
|
|
945
|
+
phone: z.string().min(4).optional(),
|
|
946
|
+
wallet: z.object({
|
|
947
|
+
address: BlockchainAddress,
|
|
948
|
+
namespace: BlockchainNamespace
|
|
949
|
+
}).optional()
|
|
950
|
+
});
|
|
951
|
+
var OrganizationId = z.string();
|
|
952
|
+
var WorkspaceId = z.string();
|
|
953
|
+
var WorkflowId = UuidString;
|
|
954
|
+
var CustomerId = UuidString;
|
|
955
|
+
var IdentityWidgetAccessToken = z.object({
|
|
956
|
+
sub: BlockchainAddress,
|
|
957
|
+
blockchainNamespace: BlockchainNamespace,
|
|
958
|
+
exp: z.number(),
|
|
959
|
+
projectId: z.string(),
|
|
960
|
+
organizationId: OrganizationId,
|
|
961
|
+
customerId: UuidString,
|
|
962
|
+
workspaceId: WorkspaceId,
|
|
963
|
+
// cmsProjectId
|
|
964
|
+
workflowId: WorkflowId.optional(),
|
|
965
|
+
ipAddress: z.string().optional(),
|
|
966
|
+
timestamp: z.number(),
|
|
967
|
+
storeSharedVC: z["boolean"]().nullish(),
|
|
968
|
+
verificationMode: VerificationMode,
|
|
969
|
+
hosts: z.array(z.string())
|
|
970
|
+
});
|
|
971
|
+
|
|
972
|
+
// represents an id of a consumer in the external system of our client
|
|
973
|
+
// as it's an external id, it can be any string
|
|
974
|
+
var ExternalCustomerId = z.string();
|
|
975
|
+
var IdentityAppV2BaseJWT = z.object({
|
|
976
|
+
sub: IdentityId,
|
|
977
|
+
// @todo: this is named "flow type" here, but it's named "protocol" in the dashboard selection
|
|
978
|
+
flowType: z.union([z.literal(FlowType.Values.web3), z.literal(FlowType.Values.web2)]),
|
|
979
|
+
exp: z.number(),
|
|
980
|
+
customerId: UuidString,
|
|
981
|
+
verificationMode: VerificationMode,
|
|
982
|
+
organizationId: OrganizationId,
|
|
983
|
+
workspaceId: WorkspaceId,
|
|
984
|
+
workflowId: WorkflowId,
|
|
985
|
+
ipAddress: z.string().optional(),
|
|
986
|
+
timestamp: z.number(),
|
|
987
|
+
iat: z.number(),
|
|
988
|
+
hosts: z.array(z.string())
|
|
989
|
+
});
|
|
990
|
+
var IdentityAppV2Web3JWT = IdentityAppV2BaseJWT.extend({
|
|
991
|
+
flowType: z.literal(FlowType.Values.web3),
|
|
992
|
+
blockchainAddress: BlockchainAddress,
|
|
993
|
+
blockchainNamespace: BlockchainNamespace
|
|
994
|
+
});
|
|
995
|
+
var IdentityAppV2Web2JWT = IdentityAppV2BaseJWT.extend({
|
|
996
|
+
flowType: z.literal(FlowType.Values.web2),
|
|
997
|
+
/**
|
|
998
|
+
* @deprecated Fetch the additional user information from the services instead of relying on this field
|
|
999
|
+
* We only have this field in web2 mode because most of the services are relying on the blockchain address to be present in the JWT
|
|
1000
|
+
*/
|
|
1001
|
+
deprecated_additionalUserInformation: AdditionalCustomerInformationParams.optional()
|
|
1002
|
+
});
|
|
1003
|
+
var IdentityWidgetAccessToken_NEW = z.union([IdentityAppV2Web3JWT, IdentityAppV2Web2JWT]);
|
|
1004
|
+
var IdentityWidgetSessionToken = z.union([IdentityWidgetAccessToken, IdentityWidgetAccessToken_NEW]);
|
|
1005
|
+
|
|
1006
|
+
/**
|
|
1007
|
+
* The parameters required to create a new configuration in web2 mode.
|
|
1008
|
+
*/
|
|
1009
|
+
|
|
1010
|
+
var Web2CreateSessionParams = z.object({
|
|
1011
|
+
workflowId: WorkflowId,
|
|
1012
|
+
// required in web2 because we don't have the wallet address
|
|
1013
|
+
externalCustomerId: ExternalCustomerId,
|
|
1014
|
+
additionalInformation: AdditionalCustomerInformationParams.optional()
|
|
1015
|
+
});
|
|
1016
|
+
|
|
1017
|
+
var ScenarioTypes = ["PrivacyPreservingMonitoring", "IndividualMonitoring", "TransactionMonitoring"];
|
|
1018
|
+
var ScenarioType = z["enum"](ScenarioTypes);
|
|
1019
|
+
var BaseQueryResponse = z.object({
|
|
1020
|
+
result: z.object({
|
|
1021
|
+
is_valid: z["boolean"](),
|
|
1022
|
+
reasons: z.array(z.string())
|
|
1023
|
+
})
|
|
1024
|
+
});
|
|
1025
|
+
var OffChainZKPRuleResult = BaseQueryResponse.extend({
|
|
1026
|
+
result: z.object({
|
|
1027
|
+
is_valid: z["boolean"](),
|
|
1028
|
+
query: QueryConfigSimplified,
|
|
1029
|
+
reasons: z.array(z.string())
|
|
1030
|
+
})
|
|
1031
|
+
});
|
|
1032
|
+
var ExecuteQueryResponse = BaseQueryResponse.extend({
|
|
1033
|
+
executionId: UuidString
|
|
1034
|
+
});
|
|
1035
|
+
var RuleEngineResponse = z.object({
|
|
1036
|
+
objectType: ScenarioType,
|
|
1037
|
+
objectId: z.string().describe("Object id in the cms (challengeQueryid, offChainZKPid)"),
|
|
1038
|
+
name: z.string(),
|
|
1039
|
+
address: BlockchainAddress.nullish(),
|
|
1040
|
+
result: ExecuteQueryResponse,
|
|
1041
|
+
executionId: UuidString,
|
|
1042
|
+
scenarioId: z.string()
|
|
1043
|
+
});
|
|
1044
|
+
var ScenarioExecutionResponse = z.array(RuleEngineResponse);
|
|
1045
|
+
var RuleResultStatuses = ["valid", "not-valid", "error", "unknown"];
|
|
1046
|
+
var RuleResultStatus = z["enum"](RuleResultStatuses);
|
|
1047
|
+
var RuleResultStatusLabels = _defineProperty(_defineProperty(_defineProperty(_defineProperty({}, RuleResultStatus.Enum.valid, "Valid"), RuleResultStatus.Enum["not-valid"], "Not Valid"), RuleResultStatus.Enum.error, "Error"), RuleResultStatus.Enum.unknown, "Unknown");
|
|
1048
|
+
var SdkVerificationOutput = z.object({
|
|
1049
|
+
customerId: z.string().optional(),
|
|
1050
|
+
// for v1
|
|
1051
|
+
scenarioExecutionId: z.string().optional(),
|
|
1052
|
+
// for v1
|
|
1053
|
+
status: RuleResultStatus.optional(),
|
|
1054
|
+
// for v1
|
|
1055
|
+
results: z.array(ScenarioExecutionResponse).optional() // for v1,
|
|
1056
|
+
});
|
|
1057
|
+
var VerificationSessionStatuses = ["IN_PROGRESS", "COMPLETED", "NOT_STARTED"];
|
|
1058
|
+
var VerificationSessionStatus = z["enum"](VerificationSessionStatuses);
|
|
1059
|
+
var VerificationOutput = z.object({
|
|
1060
|
+
id: UuidString.nullable(),
|
|
1061
|
+
verificationResult: SdkVerificationOutput.nullable(),
|
|
1062
|
+
status: VerificationSessionStatus
|
|
1063
|
+
});
|
|
1064
|
+
var Scenario = z.object({
|
|
1065
|
+
id: ScenarioId,
|
|
1066
|
+
name: z.string(),
|
|
1067
|
+
description: z.string().nullish(),
|
|
1068
|
+
queries: z.array(QueryConfigSimplified),
|
|
1069
|
+
type: ScenarioType,
|
|
1070
|
+
workspaceId: WorkspaceId,
|
|
1071
|
+
vcsIncluded: z.array(CredentialType).nullish()
|
|
1072
|
+
});
|
|
1073
|
+
|
|
1074
|
+
// creating this because SmartContractDeployment has an issue with AddressSchema
|
|
1075
|
+
// during rpcPublisher.send
|
|
1076
|
+
// also the parsing of the queryconfiguration fields changes type slightly as well.
|
|
1077
|
+
var AbbreviatedWorkflowScenario = Scenario.omit({
|
|
1078
|
+
vcsIncluded: true,
|
|
1079
|
+
queries: true
|
|
1080
|
+
}).extend({
|
|
1081
|
+
queries: z.array(QueryConfigSimplified)
|
|
1082
|
+
});
|
|
1083
|
+
var TemplateScenario = Scenario.omit({
|
|
1084
|
+
workspaceId: true
|
|
1085
|
+
});
|
|
1086
|
+
var CreateTemplateScenario = TemplateScenario.omit({
|
|
1087
|
+
id: true
|
|
1088
|
+
});
|
|
1089
|
+
|
|
1090
|
+
var ScenarioAuthorizationData = z.object({
|
|
1091
|
+
executionId: UuidString,
|
|
1092
|
+
sessionId: UuidString,
|
|
1093
|
+
projectId: z.string(),
|
|
1094
|
+
address: BlockchainAddress.nullish(),
|
|
1095
|
+
status: z["enum"](["pending", "authorised", "unauthorised"]),
|
|
1096
|
+
scenarioId: z.string(),
|
|
1097
|
+
scenarioName: z.string(),
|
|
1098
|
+
requestMessage: AuthorizationRequestMessage,
|
|
1099
|
+
responseMessage: AuthorizationResponseMessage.nullish(),
|
|
1100
|
+
verificationError: z.string().nullish(),
|
|
1101
|
+
query: QueryConfigSimplified.array(),
|
|
1102
|
+
workflowSessionId: UuidString.optional()
|
|
1103
|
+
});
|
|
1104
|
+
// v1 sdk
|
|
1105
|
+
var SdkVerificationResponseSchema = SdkVerificationOutput;
|
|
1106
|
+
var CloseScreenNotification = z.object({
|
|
1107
|
+
type: z.literal("closeScreen"),
|
|
1108
|
+
identifier: z.string(),
|
|
1109
|
+
data: z.undefined()
|
|
1110
|
+
});
|
|
1111
|
+
var KycCompletionData = z.array(VerifiableCredential);
|
|
1112
|
+
var KycCompletionNotification = z.object({
|
|
1113
|
+
type: z.literal("kycCompletion"),
|
|
1114
|
+
identifier: z.string(),
|
|
1115
|
+
data: KycCompletionData
|
|
1116
|
+
});
|
|
1117
|
+
var RuleEngineScenarioExecutionData = z.object({
|
|
1118
|
+
type: z.literal("RuleEngineScenarioExecution"),
|
|
1119
|
+
data: SdkVerificationResponseSchema
|
|
1120
|
+
});
|
|
1121
|
+
var OffChainScenarioExecutionData = z.object({
|
|
1122
|
+
type: z.literal("OffChainScenarioExecution"),
|
|
1123
|
+
data: z.array(ScenarioAuthorizationData)
|
|
1124
|
+
});
|
|
1125
|
+
var OnChainScenarioExecutionData = z.object({
|
|
1126
|
+
type: z.literal("OnChainScenarioExecution"),
|
|
1127
|
+
data: z.any()
|
|
1128
|
+
});
|
|
1129
|
+
var ScenarioExecutionData = z.union([RuleEngineScenarioExecutionData, OffChainScenarioExecutionData, OnChainScenarioExecutionData]);
|
|
1130
|
+
var ScenarioExecutionNotification = z.object({
|
|
1131
|
+
type: z.literal("scenarioExecution"),
|
|
1132
|
+
identifier: z.string(),
|
|
1133
|
+
data: ScenarioExecutionData
|
|
1134
|
+
});
|
|
1135
|
+
var IsVerifiedNotification = z.object({
|
|
1136
|
+
type: z.literal("isVerifiedNotification"),
|
|
1137
|
+
identifier: z.string(),
|
|
1138
|
+
isVerified: z["boolean"]()
|
|
1139
|
+
});
|
|
1140
|
+
var PolygonIdInitialized = z.object({
|
|
1141
|
+
type: z.literal("polygonIdInitialized"),
|
|
1142
|
+
identifier: z.string(),
|
|
1143
|
+
data: z.string()
|
|
1144
|
+
});
|
|
1145
|
+
var OcvSdkInitialized = z.object({
|
|
1146
|
+
type: z.literal("ocvSdkInitialized"),
|
|
1147
|
+
identifier: z.string()
|
|
1148
|
+
});
|
|
1149
|
+
var StartCompletedNotification = z.object({
|
|
1150
|
+
type: z.literal("startCompletedNotification"),
|
|
1151
|
+
identifier: z.string()
|
|
1152
|
+
});
|
|
1153
|
+
var IdentityNotificationMessage = z.union([CloseScreenNotification, PolygonIdInitialized, OcvSdkInitialized, StartCompletedNotification, KycCompletionNotification, ScenarioExecutionNotification, IsVerifiedNotification]);
|
|
1154
|
+
var InitialDataRequest = z.object({
|
|
1155
|
+
type: z.literal("initialDataRequest"),
|
|
1156
|
+
identifier: z.string()
|
|
1157
|
+
});
|
|
1158
|
+
var SignatureRequest = z.object({
|
|
1159
|
+
type: z.literal("signatureRequest"),
|
|
1160
|
+
identifier: z.string(),
|
|
1161
|
+
data: z.object({
|
|
1162
|
+
message: z.string()
|
|
1163
|
+
})
|
|
1164
|
+
});
|
|
1165
|
+
var TransactionData = z.object({
|
|
1166
|
+
accountAddress: BlockchainAddress,
|
|
1167
|
+
to: BlockchainAddress,
|
|
1168
|
+
data: String0x,
|
|
1169
|
+
value: z.string().optional()
|
|
1170
|
+
});
|
|
1171
|
+
var SendTransactionRequest = z.object({
|
|
1172
|
+
type: z.literal("sendTransactionRequest"),
|
|
1173
|
+
identifier: z.string(),
|
|
1174
|
+
data: TransactionData
|
|
1175
|
+
});
|
|
1176
|
+
var IdentityRequestMessage = z.union([InitialDataRequest, SignatureRequest, SendTransactionRequest]);
|
|
1177
|
+
var AVAILABLE_FLOWS = ["VERIFICATION", "MANAGEMENT", "POLYGON_ID", "KYB"];
|
|
1178
|
+
var AvailableFlow = z["enum"](AVAILABLE_FLOWS);
|
|
1179
|
+
var DataAvailableOnStart = z.object({
|
|
1180
|
+
identifier: z.string().optional(),
|
|
1181
|
+
flow: z["enum"](AVAILABLE_FLOWS).optional(),
|
|
1182
|
+
accessToken: z.string(),
|
|
1183
|
+
signingMessage: z.string(),
|
|
1184
|
+
signature: z.string()
|
|
1185
|
+
});
|
|
1186
|
+
var InitialDataResponse = z.object({
|
|
1187
|
+
type: z.literal("onStartKyc"),
|
|
1188
|
+
data: DataAvailableOnStart
|
|
1189
|
+
});
|
|
1190
|
+
var SignatureResponse = z.object({
|
|
1191
|
+
type: z.literal("signature"),
|
|
1192
|
+
data: BlockchainSignature
|
|
1193
|
+
});
|
|
1194
|
+
var TransactionResponse = z.object({
|
|
1195
|
+
type: z.literal("transactionResponse"),
|
|
1196
|
+
data: z.object({
|
|
1197
|
+
txHash: TxHash
|
|
1198
|
+
})
|
|
1199
|
+
});
|
|
1200
|
+
var HostResponseMessage = z.union([InitialDataResponse, SignatureResponse, TransactionResponse]);
|
|
1201
|
+
|
|
1202
|
+
/**
|
|
1203
|
+
* Exported types
|
|
1204
|
+
*/
|
|
1205
|
+
|
|
1206
|
+
var ComplianceImplementationStepsInput = z.object({
|
|
1207
|
+
identityChecks: z["boolean"]().nullish(),
|
|
1208
|
+
configureIdentity: z["boolean"]().nullish(),
|
|
1209
|
+
deployIdentity: z["boolean"]().nullish(),
|
|
1210
|
+
monitorIdentity: z["boolean"]().nullish()
|
|
1211
|
+
});
|
|
1212
|
+
|
|
1213
|
+
/////////////
|
|
1214
|
+
// EIP-155 //
|
|
1215
|
+
/////////////
|
|
1216
|
+
|
|
1217
|
+
var TxAuthInput = z.object({
|
|
1218
|
+
workflowId: WorkflowId.optional(),
|
|
1219
|
+
chainId: EvmChainId,
|
|
1220
|
+
contractAbi: z.array(z.record(z.unknown())),
|
|
1221
|
+
contractAddress: AddressSchema,
|
|
1222
|
+
functionName: z.string(),
|
|
1223
|
+
args: z.array(z.unknown()),
|
|
1224
|
+
userAddress: AddressSchema,
|
|
1225
|
+
blockExpiration: z.number()["int"]().optional(),
|
|
1226
|
+
nonce: z.number()["int"]().optional()
|
|
1227
|
+
});
|
|
1228
|
+
// the api endpoint can source the userAddress from the session if it's not provided
|
|
1229
|
+
var ApiTxAuthInput = TxAuthInput.extend({
|
|
1230
|
+
userAddress: AddressSchema.optional()
|
|
1231
|
+
});
|
|
1232
|
+
var TxSignatureResponse = z.object({
|
|
1233
|
+
signature: EIP155Signature,
|
|
1234
|
+
blockExpiration: z.number()
|
|
1235
|
+
});
|
|
1236
|
+
var GetTxAuthDataSignatureResponse = z.union([z.object({
|
|
1237
|
+
isAuthorized: z.literal(true),
|
|
1238
|
+
signature: EIP155Signature,
|
|
1239
|
+
payload: z.string(),
|
|
1240
|
+
blockExpiration: z.number()
|
|
1241
|
+
}), z.object({
|
|
1242
|
+
isAuthorized: z.literal(false),
|
|
1243
|
+
errorMessage: z.any()
|
|
1244
|
+
})]);
|
|
1245
|
+
/////////////
|
|
1246
|
+
// Tezos //
|
|
1247
|
+
/////////////
|
|
1248
|
+
|
|
1249
|
+
var TezosTxAuthInput = z.object({
|
|
1250
|
+
workflowId: WorkflowId.optional(),
|
|
1251
|
+
chainID: TezosChainId,
|
|
1252
|
+
contractAddress: TezosContractAddress,
|
|
1253
|
+
functionName: TezosEntrypointName,
|
|
1254
|
+
args: z.string(),
|
|
1255
|
+
userAddress: TezosImplicitAddress,
|
|
1256
|
+
blockExpiration: z.number()["int"]().optional(),
|
|
1257
|
+
nonce: z.number()["int"]().optional()
|
|
1258
|
+
});
|
|
1259
|
+
// the api endpoint can source the userAddress from the session if it's not provided
|
|
1260
|
+
var ApiTezosTxAuthInput = TezosTxAuthInput.extend({
|
|
1261
|
+
userAddress: TezosImplicitAddress.optional()
|
|
1262
|
+
});
|
|
1263
|
+
var TezosTxSignatureResponse = z.object({
|
|
1264
|
+
signature: EdSignature,
|
|
1265
|
+
blockExpiration: z.number()
|
|
1266
|
+
});
|
|
1267
|
+
var GetTezosTxAuthDataSignatureResponse = z.union([z.object({
|
|
1268
|
+
isAuthorized: z.literal(true),
|
|
1269
|
+
signature: EdSignature,
|
|
1270
|
+
blockExpiration: z.number()
|
|
1271
|
+
}), z.object({
|
|
1272
|
+
isAuthorized: z.literal(false),
|
|
1273
|
+
errorMessage: z.any()
|
|
1274
|
+
})]);
|
|
1275
|
+
/////////////
|
|
1276
|
+
// General //
|
|
1277
|
+
/////////////
|
|
1278
|
+
|
|
1279
|
+
var ExtendedTxAuthInput = TxAuthInput.and(z.object({
|
|
1280
|
+
namespace: z.literal(BlockchainNamespace.Enum.eip155),
|
|
1281
|
+
userAddress: AddressSchema
|
|
1282
|
+
}));
|
|
1283
|
+
var ExtendedTezosTxAuthInput = TezosTxAuthInput.and(z.object({
|
|
1284
|
+
namespace: z.literal(BlockchainNamespace.Enum.tezos),
|
|
1285
|
+
userAddress: TezosImplicitAddress
|
|
1286
|
+
}));
|
|
1287
|
+
var ExtendedTxAuthDataSignatureResponse = GetTxAuthDataSignatureResponse.and(z.object({
|
|
1288
|
+
namespace: z.literal(BlockchainNamespace.Enum.eip155),
|
|
1289
|
+
userAddress: AddressSchema
|
|
1290
|
+
}));
|
|
1291
|
+
var ExtendedTezosTxAuthDataSignatureResponse = GetTezosTxAuthDataSignatureResponse.and(z.object({
|
|
1292
|
+
namespace: z.literal(BlockchainNamespace.Enum.tezos),
|
|
1293
|
+
userAddress: TezosImplicitAddress
|
|
1294
|
+
}));
|
|
1295
|
+
var AnyTxAuthDataSignatureResponse = z.union([ExtendedTxAuthDataSignatureResponse, ExtendedTezosTxAuthDataSignatureResponse]);
|
|
1296
|
+
/////////////
|
|
1297
|
+
// JS SDK //
|
|
1298
|
+
/////////////
|
|
1299
|
+
|
|
1300
|
+
var Eip155TxAuthInputJsSdk = ExtendedTxAuthInput.and(z.object({
|
|
1301
|
+
workflowId: WorkflowId
|
|
1302
|
+
}));
|
|
1303
|
+
var TezosTxAuthInputJsSdk = ExtendedTezosTxAuthInput.and(z.object({
|
|
1304
|
+
workflowId: WorkflowId
|
|
1305
|
+
}));
|
|
1306
|
+
var AnyTxAuthInputJsSdk = z.union([Eip155TxAuthInputJsSdk, TezosTxAuthInputJsSdk]);
|
|
1307
|
+
|
|
1308
|
+
var SimplifiedCredential = z.object({
|
|
1309
|
+
id: z.string(),
|
|
1310
|
+
type: z.array(z.string()),
|
|
1311
|
+
issuanceDate: z.string(),
|
|
1312
|
+
journeyId: z.string()
|
|
1313
|
+
});
|
|
1314
|
+
/**
|
|
1315
|
+
* GetCredentialsRequest
|
|
1316
|
+
*/
|
|
1317
|
+
var GetCredentialsRequest = z.object({
|
|
1318
|
+
type: z.literal("getCredentials"),
|
|
1319
|
+
data: z.undefined()
|
|
1320
|
+
});
|
|
1321
|
+
/**
|
|
1322
|
+
* GetCredentialsResponse
|
|
1323
|
+
*/
|
|
1324
|
+
var GetCredentialsResponse = z.object({
|
|
1325
|
+
type: z.literal("polygonIdCredentials"),
|
|
1326
|
+
credentials: z.array(SimplifiedCredential),
|
|
1327
|
+
identifier: z.string()
|
|
1328
|
+
});
|
|
1329
|
+
/**
|
|
1330
|
+
* PolygonIdRequest
|
|
1331
|
+
*/
|
|
1332
|
+
var PolygonIdRequestData = z.union([z.object({
|
|
1333
|
+
type: z.literal("auth"),
|
|
1334
|
+
authRequest: AuthorizationRequestMessage
|
|
1335
|
+
}), z.object({
|
|
1336
|
+
type: z.literal("credentialOffer"),
|
|
1337
|
+
credentialOfferRequest: QrCodeLinkWithSchemaType
|
|
1338
|
+
}), z.object({
|
|
1339
|
+
type: z.literal("zkp"),
|
|
1340
|
+
zkpRequest: ZeroKnowledgeProofRequest
|
|
1341
|
+
})]);
|
|
1342
|
+
var PolygonIdRequest = z.object({
|
|
1343
|
+
type: z.literal("polygonIdRequest"),
|
|
1344
|
+
data: PolygonIdRequestData
|
|
1345
|
+
});
|
|
1346
|
+
/**
|
|
1347
|
+
* PolygonIdResponse
|
|
1348
|
+
*/
|
|
1349
|
+
var PolygonIdResponseData = z.union([z.object({
|
|
1350
|
+
type: z.literal("auth"),
|
|
1351
|
+
authResponse: AuthorizationResponseMessage
|
|
1352
|
+
}), z.object({
|
|
1353
|
+
type: z.literal("credentialOffer"),
|
|
1354
|
+
credentialOfferResponse: z.array(GenericVerifiableCredentialSchema)
|
|
1355
|
+
}), z.object({
|
|
1356
|
+
type: z.literal("zkp"),
|
|
1357
|
+
zkpResponse: ZeroKnowledgeProofResponse
|
|
1358
|
+
}), z.object({
|
|
1359
|
+
type: z.literal("close"),
|
|
1360
|
+
screen: z["enum"](["auth", "credentialOffer", "zkp", "getCredentials"]),
|
|
1361
|
+
closeResponse: z.string()
|
|
1362
|
+
})]);
|
|
1363
|
+
var PolygonIdResponse = z.object({
|
|
1364
|
+
type: z.literal("polygonIdResponse"),
|
|
1365
|
+
identifier: z.string(),
|
|
1366
|
+
data: PolygonIdResponseData
|
|
1367
|
+
});
|
|
1368
|
+
/**
|
|
1369
|
+
* StartFlowRequest
|
|
1370
|
+
*/
|
|
1371
|
+
var StartFlowRequest = z.union([z.object({
|
|
1372
|
+
type: z.literal("startVerification"),
|
|
1373
|
+
data: z.undefined()
|
|
1374
|
+
}), z.object({
|
|
1375
|
+
type: z.literal("startManagement"),
|
|
1376
|
+
data: z.undefined()
|
|
1377
|
+
}), z.object({
|
|
1378
|
+
type: z.literal("startKYB"),
|
|
1379
|
+
data: z.undefined()
|
|
1380
|
+
})]);
|
|
1381
|
+
/**
|
|
1382
|
+
* IsVerifiedRequest
|
|
1383
|
+
*/
|
|
1384
|
+
var IsVerifiedRequest = z.object({
|
|
1385
|
+
type: z.literal("isVerifiedRequest"),
|
|
1386
|
+
data: z.object({
|
|
1387
|
+
userAddress: AddressSchema
|
|
1388
|
+
}),
|
|
1389
|
+
identifier: z.string()
|
|
1390
|
+
});
|
|
1391
|
+
/**
|
|
1392
|
+
* IsVerifiedResponse
|
|
1393
|
+
*/
|
|
1394
|
+
var IsVerifiedResponse = z.object({
|
|
1395
|
+
type: z.literal("isVerifiedResponse"),
|
|
1396
|
+
isVerified: z["boolean"](),
|
|
1397
|
+
identifier: z.string()
|
|
1398
|
+
});
|
|
1399
|
+
/**
|
|
1400
|
+
* GetTxAuthSigRequest
|
|
1401
|
+
*/
|
|
1402
|
+
var GetTxAuthSigRequest = z.object({
|
|
1403
|
+
type: z.literal("getTxAuthSigRequest"),
|
|
1404
|
+
data: ApiTxAuthInput,
|
|
1405
|
+
identifier: z.string()
|
|
1406
|
+
});
|
|
1407
|
+
/**
|
|
1408
|
+
* GetTxAuthSigResponse
|
|
1409
|
+
*/
|
|
1410
|
+
var GetTxAuthSigResponse = z.object({
|
|
1411
|
+
type: z.literal("getTxAuthSigResponse"),
|
|
1412
|
+
signatureResponse: GetTxAuthDataSignatureResponse,
|
|
1413
|
+
identifier: z.string()
|
|
1414
|
+
});
|
|
1415
|
+
/**
|
|
1416
|
+
* GetTxAuthSigRequest Tezos
|
|
1417
|
+
*/
|
|
1418
|
+
var GetTxAuthSigRequestTezos = z.object({
|
|
1419
|
+
type: z.literal("getTxAuthSigRequestTezos"),
|
|
1420
|
+
data: ApiTezosTxAuthInput,
|
|
1421
|
+
identifier: z.string()
|
|
1422
|
+
});
|
|
1423
|
+
/**
|
|
1424
|
+
* GetTxAuthSigResponse Tezos
|
|
1425
|
+
*/
|
|
1426
|
+
var GetTxAuthSigResponseTezos = z.object({
|
|
1427
|
+
type: z.literal("getTezosTxAuthSigResponse"),
|
|
1428
|
+
signatureResponse: GetTezosTxAuthDataSignatureResponse,
|
|
1429
|
+
identifier: z.string()
|
|
1430
|
+
});
|
|
1431
|
+
var HostRequestMessage = z.union([GetCredentialsRequest, PolygonIdRequest, StartFlowRequest, IsVerifiedRequest, GetTxAuthSigRequest, GetTxAuthSigRequestTezos]);
|
|
1432
|
+
var IdentityResponseMessage = z.union([GetCredentialsResponse, PolygonIdResponse, IsVerifiedResponse, GetTxAuthSigResponse, GetTxAuthSigResponseTezos]);
|
|
1433
|
+
|
|
1434
|
+
/**
|
|
1435
|
+
* Wallet challenge parameters
|
|
1436
|
+
*/
|
|
1437
|
+
|
|
1438
|
+
var GenerateWalletChallengeRequest = z.object({
|
|
1439
|
+
address: BlockchainAddress,
|
|
1440
|
+
namespace: SupportedBlockchainNamespaceForSignatureAuth,
|
|
1441
|
+
blockchainId: BlockchainId.optional(),
|
|
1442
|
+
origin: z.string().url(),
|
|
1443
|
+
workflowId: WorkflowId,
|
|
1444
|
+
externalCustomerId: ExternalCustomerId.optional(),
|
|
1445
|
+
additionalInformation: AdditionalCustomerInformationParams.optional()
|
|
1446
|
+
});
|
|
1447
|
+
var AuthSession = z.object({
|
|
1448
|
+
// JWT token containing user authentication data
|
|
1449
|
+
// Generated by the Identity-api using the IdentityWidgetAccessToken_NEW schema
|
|
1450
|
+
// Used for user identification in the identity-v2-app
|
|
1451
|
+
// We don't want users to rely on the structure of the token so we expose it as a string
|
|
1452
|
+
token: z.string(),
|
|
1453
|
+
// the timestamp at which the session will expire
|
|
1454
|
+
// in seconds since epoch to avoid timezone issues and date parsing errors
|
|
1455
|
+
// this is exposed in case the app needs to store the session so it knows when
|
|
1456
|
+
// the session becomes invalid again
|
|
1457
|
+
// We don't want users to rely on the fact that the token is a JWT, as we
|
|
1458
|
+
// want to change to openId in the future, so we expose the expiration as a number
|
|
1459
|
+
expiresAt: z.number(),
|
|
1460
|
+
// if an external customer id was provided, it will be returned
|
|
1461
|
+
// when obtaining the auth session to facilitate integration with the user's system
|
|
1462
|
+
externalCustomerId: ExternalCustomerId.optional()
|
|
1463
|
+
});
|
|
1464
|
+
var AuthSessionData = z.object({
|
|
1465
|
+
/**
|
|
1466
|
+
* The unique identifier of the user
|
|
1467
|
+
*/
|
|
1468
|
+
identityId: z.string(),
|
|
1469
|
+
/**
|
|
1470
|
+
* The unique identifier of the user's session
|
|
1471
|
+
*/
|
|
1472
|
+
customerId: z.string(),
|
|
1473
|
+
/**
|
|
1474
|
+
* The identifier passed by the user platform
|
|
1475
|
+
*/
|
|
1476
|
+
externalCustomerId: ExternalCustomerId.optional()
|
|
1477
|
+
});
|
|
1478
|
+
var ChallengeResponse = z.object({
|
|
1479
|
+
challenge: z.string()
|
|
1480
|
+
});
|
|
1481
|
+
////////////////
|
|
1482
|
+
// SDK messages
|
|
1483
|
+
////////////////
|
|
1484
|
+
|
|
1485
|
+
var AppConfigRequest = z.object({
|
|
1486
|
+
type: z.literal("appConfig"),
|
|
1487
|
+
data: z.object({
|
|
1488
|
+
authSession: AuthSession
|
|
1489
|
+
})
|
|
1490
|
+
});
|
|
1491
|
+
var WalletUpdated = z.object({
|
|
1492
|
+
type: z.literal("walletUpdated"),
|
|
1493
|
+
data: z.object({
|
|
1494
|
+
address: BlockchainAddress
|
|
1495
|
+
})
|
|
1496
|
+
});
|
|
1497
|
+
var WalletSignResponse = z.object({
|
|
1498
|
+
type: z.literal("walletSignResponse"),
|
|
1499
|
+
data: z.object({
|
|
1500
|
+
message: z.string(),
|
|
1501
|
+
signature: BlockchainSignature
|
|
1502
|
+
})
|
|
1503
|
+
});
|
|
1504
|
+
var TxAuthDataSignatureGatingRequest = z.object({
|
|
1505
|
+
type: z.literal("txAuthDataSignatureGatingRequest"),
|
|
1506
|
+
data: z.object({
|
|
1507
|
+
input: AnyTxAuthInputJsSdk
|
|
1508
|
+
})
|
|
1509
|
+
});
|
|
1510
|
+
var GetCustomerStatusRequest = z.object({
|
|
1511
|
+
type: z.literal("getCustomerStatusRequest")
|
|
1512
|
+
});
|
|
1513
|
+
var IdentitySdkMessage = z.union([AppConfigRequest, WalletUpdated, WalletSignResponse, TransactionResponse, TxAuthDataSignatureGatingRequest, GetCustomerStatusRequest]);
|
|
1514
|
+
var IdentitySdkMessageWithIdentifier = z.intersection(IdentitySdkMessage, z.object({
|
|
1515
|
+
identifier: z.string()
|
|
1516
|
+
}));
|
|
1517
|
+
////////////////
|
|
1518
|
+
// App messages
|
|
1519
|
+
////////////////
|
|
1520
|
+
|
|
1521
|
+
var IdentityAppLoadedNotification = z.object({
|
|
1522
|
+
type: z.literal("identityAppLoaded")
|
|
1523
|
+
});
|
|
1524
|
+
var IdentityAppConfiguredNotification = z.object({
|
|
1525
|
+
type: z.literal("identityAppConfigured"),
|
|
1526
|
+
data: z.object({
|
|
1527
|
+
auth: AuthSession
|
|
1528
|
+
})
|
|
1529
|
+
});
|
|
1530
|
+
var AuthenticationExpiredNotification = z.object({
|
|
1531
|
+
type: z.literal("authenticationExpired"),
|
|
1532
|
+
data: z.object({
|
|
1533
|
+
authSession: AuthSession
|
|
1534
|
+
})
|
|
1535
|
+
});
|
|
1536
|
+
var WalletSignRequest = z.object({
|
|
1537
|
+
type: z.literal("walletSignRequest"),
|
|
1538
|
+
data: z.object({
|
|
1539
|
+
message: z.string()
|
|
1540
|
+
})
|
|
1541
|
+
});
|
|
1542
|
+
var TxAuthDataSignatureResponse = z.object({
|
|
1543
|
+
type: z.literal("txAuthDataSignatureResponse"),
|
|
1544
|
+
data: AnyTxAuthDataSignatureResponse
|
|
1545
|
+
});
|
|
1546
|
+
var TxAuthDataSignatureGatingError = z.object({
|
|
1547
|
+
type: z.literal("txAuthDataSignatureGatingError"),
|
|
1548
|
+
data: z.object({
|
|
1549
|
+
error: z.string()
|
|
1550
|
+
})
|
|
1551
|
+
});
|
|
1552
|
+
var GetCustomerStatusResponse = z.object({
|
|
1553
|
+
type: z.literal("getCustomerStatusResponse"),
|
|
1554
|
+
data: z.union([CustomerStatus, z["null"]()])
|
|
1555
|
+
});
|
|
1556
|
+
var IdentityAppMessage = z.union([IdentityAppLoadedNotification, IdentityAppConfiguredNotification, AuthenticationExpiredNotification, WalletSignRequest, TxAuthDataSignatureResponse, TxAuthDataSignatureGatingError, GetCustomerStatusResponse,
|
|
1557
|
+
// `identifier` is a technical detail that should not be exposed to the app
|
|
1558
|
+
KycCompletionNotification.omit({
|
|
1559
|
+
identifier: true
|
|
1560
|
+
}), ScenarioExecutionNotification.omit({
|
|
1561
|
+
identifier: true
|
|
1562
|
+
}), CloseScreenNotification.omit({
|
|
1563
|
+
identifier: true
|
|
1564
|
+
}), IsVerifiedNotification.omit({
|
|
1565
|
+
identifier: true
|
|
1566
|
+
}), SendTransactionRequest.omit({
|
|
1567
|
+
identifier: true
|
|
1568
|
+
})]);
|
|
1569
|
+
var IdentityWallet = z.object({
|
|
1570
|
+
address: BlockchainAddress,
|
|
1571
|
+
namespace: SupportedBlockchainNamespaceForSignatureAuth
|
|
1572
|
+
});
|
|
1573
|
+
|
|
1574
|
+
var ZKPRequest = z.object({
|
|
1575
|
+
id: z.number(),
|
|
1576
|
+
circuitId: z["enum"](["credentialAtomicQuerySigV2", "credentialAtomicQuerySigV2OnChain"]),
|
|
1577
|
+
optional: z["boolean"]().optional(),
|
|
1578
|
+
query: QueryConfigSimplified
|
|
1579
|
+
});
|
|
1580
|
+
var ZKPRequestFromZKVerifier = z.object({
|
|
1581
|
+
id: z.number(),
|
|
1582
|
+
circuitId: z.string(),
|
|
1583
|
+
optional: z["boolean"]().optional(),
|
|
1584
|
+
query: z.record(z.unknown())
|
|
1585
|
+
});
|
|
1586
|
+
var PrivacyPreservingMonitoring = z.object({
|
|
1587
|
+
requestingAuthorizationMessage: z.string().nullish(),
|
|
1588
|
+
zkpRequest: z.array(ZKPRequest).nullish()
|
|
1589
|
+
});
|
|
1590
|
+
var CreateAuthRequestProps = z.object({
|
|
1591
|
+
hostUrl: z.string().url(),
|
|
1592
|
+
sessionId: UuidString,
|
|
1593
|
+
audience: z.string().describe("DID of the verifier"),
|
|
1594
|
+
callbackURL: z.string().describe("URL to which the auth response of the client callback will be sent"),
|
|
1595
|
+
query: z.array(QueryConfigSimplified),
|
|
1596
|
+
onChainVerification: z["boolean"]().optional(),
|
|
1597
|
+
id: z.string().uuid(),
|
|
1598
|
+
thid: z.string().uuid(),
|
|
1599
|
+
message: z.string().describe("Message shown to the user")
|
|
1600
|
+
});
|
|
1601
|
+
var AllScenarioExecutionAuthorizationData = z.object({
|
|
1602
|
+
executionId: UuidString,
|
|
1603
|
+
projectId: z.string(),
|
|
1604
|
+
scenarioExecutionIds: z.array(UuidString)
|
|
1605
|
+
});
|
|
1606
|
+
var SCENARIO_AUTHORIZATION_STATUSES = ["pending", "authorised", "unauthorised"];
|
|
1607
|
+
var ScenarioAuthorizationStatus = z["enum"](SCENARIO_AUTHORIZATION_STATUSES);
|
|
1608
|
+
|
|
1609
|
+
var HostMessage = z.union([HostRequestMessage, HostResponseMessage]);
|
|
1610
|
+
var IdentityMessage = z.union([IdentityNotificationMessage, IdentityRequestMessage, IdentityResponseMessage]);
|
|
1611
|
+
var RequiredDataRowSchema = z.object({
|
|
1612
|
+
type: CredentialType,
|
|
1613
|
+
requiredAttributes: z.array(z.object({
|
|
1614
|
+
attribute: z.string(),
|
|
1615
|
+
value: z.string(),
|
|
1616
|
+
operator: z.string()
|
|
1617
|
+
}))
|
|
1618
|
+
});
|
|
1619
|
+
var RequiredVerificationData = z.object({
|
|
1620
|
+
ruleEngine: z.object({
|
|
1621
|
+
requiredData: z.array(RequiredDataRowSchema)
|
|
1622
|
+
}),
|
|
1623
|
+
PrivacyPreservingMonitoring: z.object({
|
|
1624
|
+
requiredData: z.array(RequiredDataRowSchema),
|
|
1625
|
+
verifications: z.array(z.object({
|
|
1626
|
+
scenarioVerifierAddress: z.string(),
|
|
1627
|
+
conditions: z.array(ZKPRequest)
|
|
1628
|
+
}))
|
|
1629
|
+
})
|
|
1630
|
+
});
|
|
1631
|
+
|
|
1632
|
+
var WalletSignatureResponse = z.object({
|
|
1633
|
+
// the message we requested the user to sign
|
|
1634
|
+
message: z.string(),
|
|
1635
|
+
// the signature of the message
|
|
1636
|
+
signature: BlockchainSignature,
|
|
1637
|
+
// some wallets like Cardano Nami generate a new address for each transaction or signature
|
|
1638
|
+
// this means we have to request the signer's public key to verify the signature
|
|
1639
|
+
signerPublicKey: PublicKey,
|
|
1640
|
+
// the type of the signer's public key
|
|
1641
|
+
// this is optional because some wallets don't provide this information
|
|
1642
|
+
// but for other wallets like cosmos kepler, this is required to verify the signature
|
|
1643
|
+
signerPublicKeyType: z.string().optional(),
|
|
1644
|
+
// some wallets like Aptos Petra wrap the message in some text metadata before signing
|
|
1645
|
+
// this means the user doesn't sign the message directly, but a message that contains the original message
|
|
1646
|
+
signedMessage: z.string()
|
|
1647
|
+
});
|
|
1648
|
+
var VerifyWalletChallengeRequest = WalletSignatureResponse.and(z.object({
|
|
1649
|
+
address: BlockchainAddress,
|
|
1650
|
+
namespace: SupportedBlockchainNamespaceForSignatureAuth,
|
|
1651
|
+
blockchainId: BlockchainId.optional()
|
|
1652
|
+
}));
|
|
1653
|
+
|
|
1654
|
+
export { ACTIVE_POLKADOT_CHAIN_IDS as $, ACTIVE_EVM_CHAIN_VALUES as A, BlockchainId as B, CredentialTypes as C, SOLANA_CHAIN_IDS as D, EVM_BLOCK_TIME as E, ACTIVE_SOLANA_CHAIN_IDS as F, SolanaChainId as G, NEXERA_BITCOIN_CHAINS as H, BITCOIN_CHAIN_NAMES as I, BITCOIN_CHAIN_NAMES_LIST as J, BITCOIN_CHAIN_IDS as K, ACTIVE_BITCOIN_CHAIN_IDS as L, BitcoinChainId as M, NonTestnetBlockchainId as N, NEXERA_APTOS_CHAINS as O, POLYGON_NETWORK_NAMES as P, APTOS_CHAIN_NAMES as Q, APTOS_CHAIN_NAMES_LIST as R, StarknetChainId as S, TezosChainId as T, APTOS_CHAIN_IDS as U, ACTIVE_APTOS_CHAIN_IDS as V, AptosChainId as W, NEXERA_POLKADOT_CHAINS as X, POLKADOT_CHAIN_NAMES as Y, POLKADOT_CHAIN_NAMES_LIST as Z, POLKADOT_CHAIN_IDS as _, NEXERA_EVM_CHAINS as a, AppPrefix as a$, PolkadotChainId as a0, NEXERA_CARDANO_CHAINS as a1, CARDANO_CHAIN_NAMES as a2, CARDANO_CHAIN_NAMES_LIST as a3, CARDANO_CHAIN_IDS as a4, ACTIVE_CARDANO_CHAIN_IDS as a5, CardanoChainId as a6, isValidAddress as a7, PrivateKey as a8, PublicKey as a9, DISPLAYED_BLOCKCHAIN_NAMESPACES as aA, DisplayedBlockchainNamespace as aB, BLOCKCHAIN_NAME_TO_NAMESPACE as aC, BLOCKCHAIN_NAMESPACE_TO_NAME as aD, EIP155Signature as aE, AptosSignature as aF, StarknetSignature as aG, PolkadotSignature as aH, CosmosSignature as aI, EdSignature as aJ, SpSignature as aK, P2Signature as aL, TezosSignature as aM, CardanoSignature as aN, BlockchainSignature as aO, FunctionCallData as aP, TezosEntrypointName as aQ, ENVS as aR, EnvironmentSchema as aS, UuidString as aT, OtpCode as aU, PUBLIC_SERVICES_SCHEMA_MAP as aV, IpAddress as aW, StoragePrefix as aX, IdentityPrefix as aY, EmailPrefix as aZ, WalletPrefix as a_, AddressSchema as aa, TxHash as ab, shortBlockchainAddress as ac, AptosAddress as ad, StarknetAddress as ae, PolkadotAddress as af, CosmosAddress as ag, TezosImplicitAddress as ah, TezosContractAddress as ai, TezosAddress as aj, CardanoAddress as ak, BitcoinP2PKHAddress as al, BitcoinP2SHAddress as am, BitcoinBech32Address as an, BitcoinTestnetP2PKHAddress as ao, BitcoinTestnetP2SHAddress as ap, BitcoinTestnetBech32Address as aq, BitcoinAddress as ar, BlockchainAddress as as, String0x as at, HexadecimalSchema as au, BLOCKCHAIN_NAMESPACES as av, BlockchainNamespace as aw, SUPPORTED_BLOCKCHAIN_NAMESPACES_FOR_SIGNATURE_AUTH as ax, SupportedBlockchainNamespaceForSignatureAuth as ay, BLOCKCHAIN_NAMESPACES_NAMES as az, NEXERA_EVM_CHAIN_NAMES as b, IsVerifiedNotification as b$, ChallengePrefix as b0, TestPrefix as b1, CustomerScreeningPrefix as b2, TagPrefix as b3, TagsToTransactionReviewsPrefix as b4, TransactionAddressesPrefix as b5, TransactionPrefix as b6, TransactionFeesPrefix as b7, TransactionReviewPrefix as b8, TransactionPartiesPrefix as b9, TransactionFeesId as bA, TransactionReviewId as bB, TransactionPartiesId as bC, TransactionInfosId as bD, TransactionExtractedInfosId as bE, TransactionMethodsId as bF, TransactionMethodExtractedInfosId as bG, InstitutionId as bH, InstitutionExtractedInfosId as bI, TransactionAmountId as bJ, ScenarioId as bK, ListId as bL, QueryId as bM, WorkflowSessionId as bN, WorkflowSessionAttributeId as bO, generateId as bP, MemberId as bQ, ScenarioAuthorizationData as bR, SdkVerificationResponseSchema as bS, CloseScreenNotification as bT, KycCompletionData as bU, KycCompletionNotification as bV, RuleEngineScenarioExecutionData as bW, OffChainScenarioExecutionData as bX, OnChainScenarioExecutionData as bY, ScenarioExecutionData as bZ, ScenarioExecutionNotification as b_, TransactionInfosPrefix as ba, TransactionExtractedInfosPrefix as bb, TransactionMethodsPrefix as bc, TransactionMethodExtractedInfosPrefix as bd, InstitutionPrefix as be, InstitutionExtractedInfosPrefix as bf, TransactionAmountPrefix as bg, ScenarioPrefix as bh, ListPrefix as bi, QueryPrefix as bj, ActionPrefix as bk, WorkflowSessionAttributePrefix as bl, createBrandedSchemaId as bm, StorageId as bn, IdentityId as bo, EmailId as bp, WalletId as bq, AppId as br, ChallengeId as bs, TestId as bt, CustomerScreeningId as bu, TagId as bv, ActionId as bw, TagsToTransactionReviewsId as bx, TransactionAddressesId as by, TransactionId as bz, NEXERA_EVM_CHAIN_NAMES_LIST as c, IdentityAppMessage as c$, PolygonIdInitialized as c0, OcvSdkInitialized as c1, StartCompletedNotification as c2, IdentityNotificationMessage as c3, InitialDataRequest as c4, SignatureRequest as c5, TransactionData as c6, SendTransactionRequest as c7, IdentityRequestMessage as c8, AVAILABLE_FLOWS as c9, GetCredentialsRequest as cA, GetCredentialsResponse as cB, PolygonIdRequestData as cC, PolygonIdRequest as cD, PolygonIdResponseData as cE, PolygonIdResponse as cF, StartFlowRequest as cG, IsVerifiedRequest as cH, IsVerifiedResponse as cI, GetTxAuthSigRequest as cJ, GetTxAuthSigResponse as cK, GetTxAuthSigRequestTezos as cL, GetTxAuthSigResponseTezos as cM, HostRequestMessage as cN, IdentityResponseMessage as cO, GenerateWalletChallengeRequest as cP, AuthSession as cQ, AuthSessionData as cR, ChallengeResponse as cS, WalletSignResponse as cT, TxAuthDataSignatureGatingRequest as cU, GetCustomerStatusRequest as cV, IdentitySdkMessage as cW, IdentitySdkMessageWithIdentifier as cX, TxAuthDataSignatureResponse as cY, TxAuthDataSignatureGatingError as cZ, GetCustomerStatusResponse as c_, AvailableFlow as ca, DataAvailableOnStart as cb, InitialDataResponse as cc, SignatureResponse as cd, TransactionResponse as ce, HostResponseMessage as cf, ScenarioTypes as cg, ScenarioType as ch, BaseQueryResponse as ci, OffChainZKPRuleResult as cj, ExecuteQueryResponse as ck, RuleEngineResponse as cl, ScenarioExecutionResponse as cm, RuleResultStatuses as cn, RuleResultStatus as co, RuleResultStatusLabels as cp, SdkVerificationOutput as cq, VerificationSessionStatuses as cr, VerificationSessionStatus as cs, VerificationOutput as ct, Scenario as cu, AbbreviatedWorkflowScenario as cv, TemplateScenario as cw, CreateTemplateScenario as cx, ComplianceImplementationStepsInput as cy, SimplifiedCredential as cz, NEXERA_EVM_CHAINS_ID as d, GetTezosTxAuthDataSignatureResponse as d$, IdentityWallet as d0, HostMessage as d1, IdentityMessage as d2, RequiredDataRowSchema as d3, RequiredVerificationData as d4, MediaType as d5, MediaTypePID as d6, CIRCUIT_IDS as d7, CircuitId as d8, ZeroKnowledgeProofRequest as d9, BooleanOperator as dA, DATE_OPERATORS as dB, DateOperator as dC, SUPPORTED_TYPES as dD, SupportedType as dE, SupportedTypes as dF, AllCredentialValues as dG, QueryConfigSimplified as dH, PartialQueryConfigSimplified as dI, OLD_ChallengeQuerySchema as dJ, OLD_CHALLENGE_QUERY_OPERATORS as dK, OLD_ChallengeQueryOperator as dL, OperatorMappings as dM, OperatorToOLD_ChallengeQueryOperator as dN, OLD_ChallengeQueryOperatorToOperator as dO, OLD_QueryCredentialTypes as dP, OLD_QueryCredentialType as dQ, getOldCredentialType as dR, getOldCredentialPath as dS, oldCredentialPathToDataLink as dT, TxAuthInput as dU, ApiTxAuthInput as dV, TxSignatureResponse as dW, GetTxAuthDataSignatureResponse as dX, TezosTxAuthInput as dY, ApiTezosTxAuthInput as dZ, TezosTxSignatureResponse as d_, AUTHORIZATION_REQUEST_MESSAGE_TYPES as da, AuthorizationRequestMessageTypes as db, AuthorizationRequestMessageType as dc, AuthorizationRequestMessage as dd, ProofData as de, ZeroKnowledgeProofResponse as df, AuthorizationResponseMessage as dg, CredentialQrCodeData as dh, AuthQrCodeData as di, QrCodeLinkWithSchemaType as dj, parseIden3Message as dk, parseSessionIdFromUrl as dl, QUERY_LOGIC_OPERATOR as dm, QueryLogicOperator as dn, OPERATORS as dp, Operator as dq, ZKPOperator as dr, operatorDisplayMap as ds, ARRAY_OPERATORS as dt, ArrayOperator as du, STRING_OPERATORS as dv, StringOperator as dw, NUMERIC_OPERATORS as dx, NumericOperator as dy, BOOLEAN_OPERATORS as dz, NexeraEvmChains as e, ExtendedTxAuthInput as e0, ExtendedTezosTxAuthInput as e1, ExtendedTxAuthDataSignatureResponse as e2, ExtendedTezosTxAuthDataSignatureResponse as e3, AnyTxAuthDataSignatureResponse as e4, Eip155TxAuthInputJsSdk as e5, TezosTxAuthInputJsSdk as e6, AnyTxAuthInputJsSdk as e7, ZKPRequest as e8, ZKPRequestFromZKVerifier as e9, IdentityAppV2Web2JWT as eA, IdentityWidgetAccessToken_NEW as eB, IdentityWidgetSessionToken as eC, Web2CreateSessionParams as eD, CredentialSchemas as eE, CredentialNames as eF, NexeraCredentialType as eG, getCredentialName as eH, CredentialType as eI, VerifiableCredential as eJ, CredentialMediaType as eK, _defineProperty as eL, PrivacyPreservingMonitoring as ea, CreateAuthRequestProps as eb, AllScenarioExecutionAuthorizationData as ec, SCENARIO_AUTHORIZATION_STATUSES as ed, ScenarioAuthorizationStatus as ee, WalletSignatureResponse as ef, VerifyWalletChallengeRequest as eg, FLOW_TYPES as eh, FlowType as ei, VerificationModes as ej, VerificationMode as ek, IDENTITY_DOCUMENT_COUNTRY_LIST_OPTIONS as el, IdentityDocumentCountryListOption as em, IDENTITY_DOCUMENT_OPTIONS as en, IdentityDocumentOptionsType as eo, PERSONAL_INFORMATION_FIELDS as ep, PersonalInformationFieldsIdentityDocuments as eq, Identifier as er, AdditionalCustomerInformationParams as es, OrganizationId as et, WorkspaceId as eu, WorkflowId as ev, CustomerId as ew, IdentityWidgetAccessToken as ex, ExternalCustomerId as ey, IdentityAppV2Web3JWT as ez, EVM_CHAINS_WITHOUT_DEDICATED_NODE_RPC as f, EvmChainId as g, NEXERA_COSMOS_CHAINS as h, COSMOS_CHAIN_NAMES as i, COSMOS_CHAIN_NAMES_LIST as j, COSMOS_CHAIN_IDS as k, ACTIVE_COSMOS_CHAIN_IDS as l, CosmosChainId as m, NEXERA_TEZOS_CHAINS as n, NEXERA_TEZOS_CHAIN_NAMES as o, NEXERA_TEZOS_CHAIN_NAMES_LIST as p, NEXERA_TEZOS_CHAIN_IDS as q, ACTIVE_TEZOS_CHAIN_IDS as r, PolygonNetworkNames as s, NEXERA_STARKNET_CHAINS as t, NEXERA_STARKNET_CHAIN_NAMES as u, NEXERA_STARKNET_CHAIN_IDS as v, NEXERA_ACTIVE_STARKNET_CHAIN_IDS as w, NEXERA_SOLANA_CHAINS as x, SOLANA_CHAIN_NAMES as y, SOLANA_CHAIN_NAMES_LIST as z };
|