@nexeraid/identity-schemas 2.66.0-dev → 2.67.0-dev
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{CoinMarketCap.schema-9db73f74.cjs.dev.cjs → CoinMarketCap.schema-25910ca1.cjs.dev.cjs} +26 -201
- package/dist/{CoinMarketCap.schema-9200bd52.esm.mjs → CoinMarketCap.schema-863fe4bf.esm.mjs} +5 -166
- package/dist/{CoinMarketCap.schema-2c92523f.cjs.prod.cjs → CoinMarketCap.schema-9b46e91a.cjs.prod.cjs} +26 -201
- package/dist/declarations/src/blockchain/namespaces.schema.d.ts +5 -15
- package/dist/declarations/src/blockchain/namespaces.schema.d.ts.map +1 -1
- package/dist/declarations/src/countries.schema.d.ts +6 -1
- package/dist/declarations/src/countries.schema.d.ts.map +1 -1
- package/dist/declarations/src/customer.schema.d.ts +0 -7
- package/dist/declarations/src/customer.schema.d.ts.map +1 -1
- package/dist/declarations/src/identity-ids.schema.d.ts +6 -18
- package/dist/declarations/src/identity-ids.schema.d.ts.map +1 -1
- package/dist/declarations/src/index.d.ts +1 -0
- package/dist/declarations/src/index.d.ts.map +1 -1
- package/dist/declarations/src/nexeraSSID.schema.d.ts +9 -9
- package/dist/declarations/src/providers/big/BIGBitRankVerifiedScore.schema.d.ts +24 -24
- package/dist/declarations/src/providers/chainalysis/chainalysis.schema.d.ts +12 -12
- package/dist/declarations/src/providers/comply-advantage/comply-advantage.schema.d.ts +122 -122
- package/dist/declarations/src/providers/kyc-sessions.schema.d.ts +12 -12
- package/dist/declarations/src/providers/merkle-science/merkle-science.schema.d.ts +26 -26
- package/dist/declarations/src/providers/provider.schema.d.ts +319 -1243
- package/dist/declarations/src/providers/provider.schema.d.ts.map +1 -1
- package/dist/declarations/src/providers/scorechain/allScorechainBlockchains.schema.d.ts +1153 -0
- package/dist/declarations/src/providers/scorechain/allScorechainBlockchains.schema.d.ts.map +1 -0
- package/dist/declarations/src/providers/scorechain/scorechain.schema.d.ts +3472 -351
- package/dist/declarations/src/providers/scorechain/scorechain.schema.d.ts.map +1 -1
- package/dist/declarations/src/providers/sumsub/sumsub-applicant.schema.d.ts +281 -281
- package/dist/declarations/src/providers/sumsub/sumsub.schema.d.ts +10 -10
- package/dist/declarations/src/vault/schemas/generated/Customer.schema.json.d.ts +785 -1
- package/dist/declarations/src/vault/schemas/generated/Customer.type.d.ts +16 -1
- package/dist/declarations/src/vault/schemas/generated/Customer.type.d.ts.map +1 -1
- package/dist/declarations/src/vault/vault.schema.d.ts +146 -19
- package/dist/declarations/src/vault/vault.schema.d.ts.map +1 -1
- package/dist/declarations/src/wallet-screening.schema.d.ts +81 -0
- package/dist/declarations/src/wallet-screening.schema.d.ts.map +1 -0
- package/dist/declarations/src/webhooks/send-verification-flow-webhook.schema.d.ts +3189 -14681
- package/dist/declarations/src/webhooks/send-verification-flow-webhook.schema.d.ts.map +1 -1
- package/dist/declarations/src/webhooks/svix.webhooks.schema.d.ts +4201 -71554
- package/dist/declarations/src/webhooks/svix.webhooks.schema.d.ts.map +1 -1
- package/dist/identity-api.schema-095969b9.cjs.prod.cjs +1308 -0
- package/dist/identity-api.schema-36a2a1b2.esm.mjs +1113 -0
- package/dist/identity-api.schema-8829a875.cjs.dev.cjs +1308 -0
- package/dist/nexeraid-identity-schemas.cjs.dev.cjs +323 -327
- package/dist/nexeraid-identity-schemas.cjs.prod.cjs +323 -327
- package/dist/nexeraid-identity-schemas.esm.mjs +4 -4
- package/dist/package.json +1 -1
- package/dist/{tfhe-utilities-8b80d9aa.cjs.dev.cjs → tfhe-utilities-03589c6a.cjs.dev.cjs} +2 -2
- package/dist/{tfhe-utilities-151f4537.esm.mjs → tfhe-utilities-1fc75756.esm.mjs} +2 -2
- package/dist/{tfhe-utilities-24730089.cjs.prod.cjs → tfhe-utilities-6b015591.cjs.prod.cjs} +2 -2
- package/dist/{vault.schema-cc3c5ffc.esm.mjs → vault.schema-1c1dcdb7.esm.mjs} +2510 -82
- package/dist/{vault.schema-91f2c199.cjs.prod.cjs → vault.schema-7ed4edcb.cjs.dev.cjs} +2753 -104
- package/dist/{vault.schema-958064b8.cjs.dev.cjs → vault.schema-cc989cdf.cjs.prod.cjs} +2753 -104
- package/identity/dist/nexeraid-identity-schemas-identity.cjs.dev.cjs +3 -3
- package/identity/dist/nexeraid-identity-schemas-identity.cjs.prod.cjs +3 -3
- package/identity/dist/nexeraid-identity-schemas-identity.esm.mjs +3 -3
- package/package.json +1 -1
- package/providers/dist/nexeraid-identity-schemas-providers.cjs.dev.cjs +1190 -18
- package/providers/dist/nexeraid-identity-schemas-providers.cjs.prod.cjs +1190 -18
- package/providers/dist/nexeraid-identity-schemas-providers.esm.mjs +1158 -5
- package/vault/dist/nexeraid-identity-schemas-vault.cjs.dev.cjs +2 -1
- package/vault/dist/nexeraid-identity-schemas-vault.cjs.prod.cjs +2 -1
- package/vault/dist/nexeraid-identity-schemas-vault.esm.mjs +2 -1
- package/verifiable-credentials/dist/nexeraid-identity-schemas-verifiable-credentials.cjs.dev.cjs +4 -4
- package/verifiable-credentials/dist/nexeraid-identity-schemas-verifiable-credentials.cjs.prod.cjs +4 -4
- package/verifiable-credentials/dist/nexeraid-identity-schemas-verifiable-credentials.esm.mjs +4 -4
- package/webhooks/dist/nexeraid-identity-schemas-webhooks.cjs.dev.cjs +34 -58
- package/webhooks/dist/nexeraid-identity-schemas-webhooks.cjs.prod.cjs +34 -58
- package/webhooks/dist/nexeraid-identity-schemas-webhooks.esm.mjs +10 -31
- package/dist/identity-api.schema-60af6079.esm.mjs +0 -1751
- package/dist/identity-api.schema-63ee6cfc.cjs.dev.cjs +0 -2139
- package/dist/identity-api.schema-9119d895.cjs.prod.cjs +0 -2139
|
@@ -0,0 +1,1308 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
var zod = require('zod');
|
|
4
|
+
var vault_schema = require('./vault.schema-cc989cdf.cjs.prod.cjs');
|
|
5
|
+
|
|
6
|
+
var CredentialSchemas = {
|
|
7
|
+
ProofOfResidence: vault_schema.ProofOfResidenceCredentialSubjectSchema,
|
|
8
|
+
SelfieImage: vault_schema.SelfieImageCredentialSubjectSchema,
|
|
9
|
+
IDImage: vault_schema.IDImageCredentialSubjectSchema,
|
|
10
|
+
IDInformation: vault_schema.IDInformationCredentialSubjectSchema,
|
|
11
|
+
IDInformationTfhe: vault_schema.IDInformationTfheCredentialSubjectSchema,
|
|
12
|
+
AMLScreeningsResults: vault_schema.OLD_AMLScreeningsResultsCredentialSubjectSchema,
|
|
13
|
+
ID3: vault_schema.ID3CredentialSubjectSchema,
|
|
14
|
+
IDScan: vault_schema.IDScanCredentialSubjectSchema,
|
|
15
|
+
IDScanSelfie: vault_schema.IDScanSelfieCredentialSubjectSchema,
|
|
16
|
+
IDScanPassport: vault_schema.IDScanPassportCredentialSubjectSchema
|
|
17
|
+
};
|
|
18
|
+
var CredentialNames = [{
|
|
19
|
+
value: "AMLScreeningsResults",
|
|
20
|
+
label: "AML screening results"
|
|
21
|
+
}, {
|
|
22
|
+
value: "ProofOfResidence",
|
|
23
|
+
label: "Proof of residence"
|
|
24
|
+
}, {
|
|
25
|
+
value: "SelfieImage",
|
|
26
|
+
label: "Selfie image"
|
|
27
|
+
}, {
|
|
28
|
+
value: "IDImage",
|
|
29
|
+
label: "ID image"
|
|
30
|
+
}, {
|
|
31
|
+
value: "IDInformation",
|
|
32
|
+
label: "ID information"
|
|
33
|
+
}, {
|
|
34
|
+
value: "IDInformationTfhe",
|
|
35
|
+
label: "ID information for TFHE"
|
|
36
|
+
}];
|
|
37
|
+
var CredentialTypes = ["AMLScreeningsResults", "ProofOfResidence", "SelfieImage", "IDImage", "IDInformation", "IDInformationTfhe", "ID3",
|
|
38
|
+
// this is for backwards compatibility
|
|
39
|
+
"IDScan",
|
|
40
|
+
// this is for backwards compatibility
|
|
41
|
+
"IDScanSelfie",
|
|
42
|
+
// this is for backwards compatibility
|
|
43
|
+
"IDScanPassport" // this is for backwards compatibility
|
|
44
|
+
];
|
|
45
|
+
var NexeraCredentialType = zod.z["enum"](CredentialTypes);
|
|
46
|
+
var getCredentialName = function getCredentialName(value) {
|
|
47
|
+
var _CredentialNames$find;
|
|
48
|
+
return (_CredentialNames$find = CredentialNames.find(function (obj) {
|
|
49
|
+
return obj.value === value;
|
|
50
|
+
})) === null || _CredentialNames$find === void 0 ? void 0 : _CredentialNames$find.label;
|
|
51
|
+
};
|
|
52
|
+
var CredentialType = zod.z.string().transform(function (x) {
|
|
53
|
+
return x.replace("_", "-");
|
|
54
|
+
}) // TODO determine why this is needed
|
|
55
|
+
.pipe(zod.z["enum"](CredentialTypes));
|
|
56
|
+
// Should this be replaced by GenericVerifiableCredentialSchema?
|
|
57
|
+
|
|
58
|
+
var VerifiableCredential = zod.z.object({
|
|
59
|
+
issuer: zod.z.string(),
|
|
60
|
+
type: zod.z.array(zod.z.union([zod.z.string(), CredentialType])),
|
|
61
|
+
credentialSubject: zod.z.record(zod.z.unknown())
|
|
62
|
+
}).catchall(zod.z.any());
|
|
63
|
+
var CredentialMediaType = vault_schema.IDImageCredentialSubjectSchema.shape.mediaType_front;
|
|
64
|
+
|
|
65
|
+
// Request
|
|
66
|
+
|
|
67
|
+
var MediaType = /*#__PURE__*/function (MediaType) {
|
|
68
|
+
MediaType["ZKPMessage"] = "application/iden3-zkp-json";
|
|
69
|
+
MediaType["PlainMessage"] = "application/iden3comm-plain-json";
|
|
70
|
+
MediaType["SignedMessage"] = "application/iden3comm-signed-json";
|
|
71
|
+
return MediaType;
|
|
72
|
+
}({});
|
|
73
|
+
var MediaTypePID = zod.z.nativeEnum(MediaType);
|
|
74
|
+
var CIRCUIT_IDS = ["authV2", "stateTransition", "credentialAtomicQueryMTPV2", "credentialAtomicQueryMTPV2OnChain", "credentialAtomicQuerySigV2", "credentialAtomicQuerySigV2OnChain", "credentialAtomicQueryV3-beta.1", "credentialAtomicQueryV3OnChain-beta.1", "linkedMultiQuery10-beta.1"];
|
|
75
|
+
var CircuitId = zod.z["enum"](CIRCUIT_IDS);
|
|
76
|
+
var ZeroKnowledgeProofRequest = zod.z.object({
|
|
77
|
+
id: zod.z.number(),
|
|
78
|
+
circuitId: zod.z.string(),
|
|
79
|
+
optional: zod.z["boolean"]().optional(),
|
|
80
|
+
query: zod.z.record(zod.z.string(), zod.z.any())
|
|
81
|
+
});
|
|
82
|
+
var AUTHORIZATION_REQUEST_MESSAGE_TYPES = {
|
|
83
|
+
AUTHORIZATION_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/authorization/1.0/request",
|
|
84
|
+
AUTHORIZATION_RESPONSE_MESSAGE_TYPE: "https://iden3-communication.io/authorization/1.0/response",
|
|
85
|
+
CREDENTIAL_ISSUANCE_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/credentials/1.0/issuance-request",
|
|
86
|
+
CREDENTIAL_FETCH_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/credentials/1.0/fetch-request",
|
|
87
|
+
CREDENTIAL_OFFER_MESSAGE_TYPE: "https://iden3-communication.io/credentials/1.0/offer",
|
|
88
|
+
CREDENTIAL_ISSUANCE_RESPONSE_MESSAGE_TYPE: "https://iden3-communication.io/credentials/1.0/issuance-response",
|
|
89
|
+
CREDENTIAL_REFRESH_MESSAGE_TYPE: "https://iden3-communication.io/credentials/1.0/refresh",
|
|
90
|
+
DEVICE_REGISTRATION_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/devices/1.0/registration",
|
|
91
|
+
MESSAGE_FETCH_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/messages/1.0/fetch",
|
|
92
|
+
PROOF_GENERATION_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/proofs/1.0/request",
|
|
93
|
+
PROOF_GENERATION_RESPONSE_MESSAGE_TYPE: "https://iden3-communication.io/proofs/1.0/response",
|
|
94
|
+
REVOCATION_STATUS_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/revocation/1.0/request-status",
|
|
95
|
+
REVOCATION_STATUS_RESPONSE_MESSAGE_TYPE: "https://iden3-communication.io/revocation/1.0/status",
|
|
96
|
+
CONTRACT_INVOKE_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/proofs/1.0/contract-invoke-request",
|
|
97
|
+
CONTRACT_INVOKE_RESPONSE_MESSAGE_TYPE: "https://iden3-communication.io/proofs/1.0/contract-invoke-response",
|
|
98
|
+
CREDENTIAL_ONCHAIN_OFFER_MESSAGE_TYPE: "https://iden3-communication.io/credentials/1.0/onchain-offer",
|
|
99
|
+
PROPOSAL_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/credentials/0.1/proposal-request",
|
|
100
|
+
PROPOSAL_MESSAGE_TYPE: "https://iden3-communication.io/credentials/0.1/proposal",
|
|
101
|
+
PAYMENT_REQUEST_MESSAGE_TYPE: "https://iden3-communication.io/credentials/0.1/payment-request",
|
|
102
|
+
PAYMENT_MESSAGE_TYPE: "https://iden3-communication.io/credentials/0.1/payment"
|
|
103
|
+
};
|
|
104
|
+
var AuthorizationRequestMessageTypes = ["https://iden3-communication.io/authorization/1.0/request", "https://iden3-communication.io/authorization/1.0/response", "https://iden3-communication.io/credentials/1.0/issuance-request", "https://iden3-communication.io/credentials/1.0/fetch-request", "https://iden3-communication.io/credentials/1.0/offer", "https://iden3-communication.io/credentials/1.0/issuance-response", "https://iden3-communication.io/credentials/1.0/refresh", "https://iden3-communication.io/devices/1.0/registration", "https://iden3-communication.io/messages/1.0/fetch", "https://iden3-communication.io/proofs/1.0/request", "https://iden3-communication.io/proofs/1.0/response", "https://iden3-communication.io/revocation/1.0/request-status", "https://iden3-communication.io/revocation/1.0/status", "https://iden3-communication.io/proofs/1.0/contract-invoke-request", "https://iden3-communication.io/proofs/1.0/contract-invoke-response", "https://iden3-communication.io/credentials/1.0/onchain-offer", "https://iden3-communication.io/credentials/0.1/proposal-request", "https://iden3-communication.io/credentials/0.1/proposal", "https://iden3-communication.io/credentials/0.1/payment-request", "https://iden3-communication.io/credentials/0.1/payment"];
|
|
105
|
+
var AuthorizationRequestMessageType = zod.z["enum"](AuthorizationRequestMessageTypes);
|
|
106
|
+
var AuthorizationRequestMessage = zod.z.object({
|
|
107
|
+
id: zod.z.string(),
|
|
108
|
+
typ: MediaTypePID.optional(),
|
|
109
|
+
type: AuthorizationRequestMessageType,
|
|
110
|
+
thid: zod.z.string().optional(),
|
|
111
|
+
body: zod.z.object({
|
|
112
|
+
callbackUrl: zod.z.string(),
|
|
113
|
+
reason: zod.z.string().optional(),
|
|
114
|
+
did_doc: zod.z.any().optional(),
|
|
115
|
+
message: zod.z.string().optional(),
|
|
116
|
+
scope: zod.z.array(ZeroKnowledgeProofRequest)
|
|
117
|
+
}),
|
|
118
|
+
from: zod.z.string(),
|
|
119
|
+
to: zod.z.string().optional()
|
|
120
|
+
});
|
|
121
|
+
// Response
|
|
122
|
+
var ProofData = zod.z.object({
|
|
123
|
+
pi_a: zod.z.array(zod.z.string()),
|
|
124
|
+
pi_b: zod.z.array(zod.z.array(zod.z.string())),
|
|
125
|
+
pi_c: zod.z.array(zod.z.string()),
|
|
126
|
+
protocol: zod.z.string(),
|
|
127
|
+
curve: zod.z.string().optional()
|
|
128
|
+
});
|
|
129
|
+
var ZeroKnowledgeProofResponse = zod.z.object({
|
|
130
|
+
id: zod.z.number(),
|
|
131
|
+
circuitId: zod.z.string(),
|
|
132
|
+
vp: zod.z.any().optional(),
|
|
133
|
+
proof: ProofData,
|
|
134
|
+
pub_signals: zod.z.array(zod.z.string())
|
|
135
|
+
});
|
|
136
|
+
var AuthorizationResponseMessage = zod.z.object({
|
|
137
|
+
id: zod.z.string(),
|
|
138
|
+
typ: MediaTypePID.optional(),
|
|
139
|
+
type: zod.z.string(),
|
|
140
|
+
thid: zod.z.string().optional(),
|
|
141
|
+
body: zod.z.object({
|
|
142
|
+
did_doc: zod.z.any().optional(),
|
|
143
|
+
message: zod.z.string().optional(),
|
|
144
|
+
scope: zod.z.array(ZeroKnowledgeProofResponse)
|
|
145
|
+
}),
|
|
146
|
+
from: zod.z.string().optional(),
|
|
147
|
+
to: zod.z.string().optional()
|
|
148
|
+
});
|
|
149
|
+
// Polygon Wallet
|
|
150
|
+
var CredentialQrCodeData = zod.z.object({
|
|
151
|
+
id: zod.z.string(),
|
|
152
|
+
typ: zod.z.string(),
|
|
153
|
+
type: zod.z.string(),
|
|
154
|
+
thid: zod.z.string(),
|
|
155
|
+
body: zod.z.object({
|
|
156
|
+
url: zod.z.string(),
|
|
157
|
+
credentials: zod.z.unknown()
|
|
158
|
+
}),
|
|
159
|
+
from: zod.z.string(),
|
|
160
|
+
to: zod.z.string()
|
|
161
|
+
});
|
|
162
|
+
var AuthQrCodeData = zod.z.object({
|
|
163
|
+
id: zod.z.string(),
|
|
164
|
+
typ: zod.z.string(),
|
|
165
|
+
type: zod.z.string(),
|
|
166
|
+
thid: zod.z.string(),
|
|
167
|
+
body: zod.z.object({
|
|
168
|
+
callbackUrl: zod.z.string(),
|
|
169
|
+
reason: zod.z.string(),
|
|
170
|
+
scope: zod.z.unknown()
|
|
171
|
+
}),
|
|
172
|
+
from: zod.z.string()
|
|
173
|
+
});
|
|
174
|
+
var QrCodeLinkWithSchemaType = zod.z.object({
|
|
175
|
+
qrCodeLink: zod.z.string().nullish(),
|
|
176
|
+
schemaType: zod.z.string().nullish()
|
|
177
|
+
}).describe("Polygon ID Verifiable Credential Offer, to be consumed by the Polygon ID Wallet");
|
|
178
|
+
function parseIden3Message(input) {
|
|
179
|
+
var prefix = "request_uri=";
|
|
180
|
+
var startIndex = input.indexOf(prefix);
|
|
181
|
+
if (startIndex === -1) {
|
|
182
|
+
throw new Error("Wrong request - request doesn't start with request_uri=");
|
|
183
|
+
}
|
|
184
|
+
return zod.z.string().url().parse(input.substring(startIndex + prefix.length));
|
|
185
|
+
}
|
|
186
|
+
function parseSessionIdFromUrl(urlString) {
|
|
187
|
+
var url = new URL(urlString);
|
|
188
|
+
var params = new URLSearchParams(url.search);
|
|
189
|
+
var sessionId = params.get("sessionID");
|
|
190
|
+
if (!sessionId) {
|
|
191
|
+
throw new Error("No Session Id found in callback url");
|
|
192
|
+
}
|
|
193
|
+
return sessionId;
|
|
194
|
+
}
|
|
195
|
+
|
|
196
|
+
var QUERY_LOGIC_OPERATOR = ["AND", "OR"];
|
|
197
|
+
var QueryLogicOperator = zod.z["enum"](QUERY_LOGIC_OPERATOR);
|
|
198
|
+
var OPERATORS = ["$noop",
|
|
199
|
+
// noop can be used in zkps as proof of credential issuance https://docs.privado.id/docs/verifier/verification-library/zk-query-language#exists---operator-11
|
|
200
|
+
"$eq",
|
|
201
|
+
// equal to
|
|
202
|
+
"$lt",
|
|
203
|
+
// less than
|
|
204
|
+
"$lte",
|
|
205
|
+
// less than or equal to
|
|
206
|
+
"$gt",
|
|
207
|
+
// greater than
|
|
208
|
+
"$gte",
|
|
209
|
+
// greater than or equal to
|
|
210
|
+
"$in",
|
|
211
|
+
// in
|
|
212
|
+
"$nin",
|
|
213
|
+
// not in
|
|
214
|
+
"$ne",
|
|
215
|
+
// not equal to
|
|
216
|
+
//"$between", // between
|
|
217
|
+
//"$nonbetween", // contains
|
|
218
|
+
"$exists" // exists
|
|
219
|
+
];
|
|
220
|
+
var Operator = zod.z["enum"](OPERATORS);
|
|
221
|
+
var ZKPOperator = zod.z["enum"](OPERATORS).exclude(["$lte", "$gte"]);
|
|
222
|
+
var operatorDisplayMap = vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty({}, Operator["enum"].$eq, "="), Operator["enum"].$gt, ">"), Operator["enum"].$lt, "<"), Operator["enum"].$gte, ">="), Operator["enum"].$lte, "<="), Operator["enum"].$ne, "!="), Operator["enum"].$in, "in"), Operator["enum"].$nin, "not in"), Operator["enum"].$noop, "noop"), Operator["enum"].$exists, "exists");
|
|
223
|
+
var ARRAY_OPERATORS = [Operator["enum"].$in, Operator["enum"].$nin, Operator["enum"].$eq, Operator["enum"].$ne
|
|
224
|
+
//Operator.enum.$between,
|
|
225
|
+
//Operator.enum.$nonbetween,
|
|
226
|
+
];
|
|
227
|
+
var ArrayOperator = zod.z["enum"](ARRAY_OPERATORS);
|
|
228
|
+
var STRING_OPERATORS = [Operator["enum"].$eq, Operator["enum"].$ne, Operator["enum"].$in, Operator["enum"].$nin, Operator["enum"].$exists];
|
|
229
|
+
var StringOperator = zod.z["enum"](STRING_OPERATORS);
|
|
230
|
+
var NUMERIC_OPERATORS = [Operator["enum"].$eq, Operator["enum"].$ne, Operator["enum"].$gt, Operator["enum"].$gte, Operator["enum"].$lt, Operator["enum"].$lte
|
|
231
|
+
//Operator.enum.$between,
|
|
232
|
+
//Operator.enum.$nonbetween,
|
|
233
|
+
];
|
|
234
|
+
var NumericOperator = zod.z["enum"](NUMERIC_OPERATORS);
|
|
235
|
+
var BOOLEAN_OPERATORS = [Operator["enum"].$eq, Operator["enum"].$ne];
|
|
236
|
+
var BooleanOperator = zod.z["enum"](BOOLEAN_OPERATORS);
|
|
237
|
+
var DATE_OPERATORS = [Operator["enum"].$eq, Operator["enum"].$ne, Operator["enum"].$gt, Operator["enum"].$gte, Operator["enum"].$lt, Operator["enum"].$lte
|
|
238
|
+
//Operator.enum.$between,
|
|
239
|
+
//Operator.enum.$nonbetween,
|
|
240
|
+
];
|
|
241
|
+
var DateOperator = zod.z["enum"](DATE_OPERATORS);
|
|
242
|
+
var SUPPORTED_TYPES = ["string", "integer", "boolean", "number", "array", "date", "decimal"];
|
|
243
|
+
var SupportedType = zod.z["enum"](SUPPORTED_TYPES);
|
|
244
|
+
var SupportedTypes = zod.z.object(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty({}, SupportedType["enum"].string, StringOperator), SupportedType["enum"].integer, NumericOperator), SupportedType["enum"]["boolean"], BooleanOperator), SupportedType["enum"].number, NumericOperator), SupportedType["enum"].array, ArrayOperator), SupportedType["enum"].date, DateOperator), SupportedType["enum"].decimal, NumericOperator));
|
|
245
|
+
var IDInformationTfhe = zod.z.object({
|
|
246
|
+
type: zod.z.literal("IDInformationTfhe"),
|
|
247
|
+
requestId: zod.z.coerce.number().nullish(),
|
|
248
|
+
attribute: zod.z.string(),
|
|
249
|
+
value: zod.z.string(),
|
|
250
|
+
operator: Operator
|
|
251
|
+
});
|
|
252
|
+
var AllCredentialValues = zod.z.union([zod.z["boolean"](), zod.z.string(), zod.z.number(), zod.z.array(zod.z.string()), zod.z.array(zod.z.number())]);
|
|
253
|
+
var QueriesOptions = zod.z.array(zod.z.object({
|
|
254
|
+
title: zod.z.string(),
|
|
255
|
+
link: vault_schema.VaultMetadataLinkZodSchema
|
|
256
|
+
}));
|
|
257
|
+
var QueryType = zod.z["enum"](["IDInformation", "IDInformationTfhe", "SelfieImage", "IDImage", "ProofOfResidence", "AMLScreeningsResults",
|
|
258
|
+
// backwards compatibility
|
|
259
|
+
"ID3",
|
|
260
|
+
// this is for backwards compatibility
|
|
261
|
+
"IDScan",
|
|
262
|
+
// this is for backwards compatibility
|
|
263
|
+
"IDScanSelfie",
|
|
264
|
+
// this is for backwards compatibility
|
|
265
|
+
"IDScanPassport" // this is for backwards compatibility
|
|
266
|
+
]);
|
|
267
|
+
var QueryConfigTfhe = zod.z.object({
|
|
268
|
+
type: zod.z.literal("IDInformationTfhe"),
|
|
269
|
+
requestId: zod.z.coerce.number().nullish(),
|
|
270
|
+
attribute: zod.z.string(),
|
|
271
|
+
value: zod.z.string(),
|
|
272
|
+
operator: Operator
|
|
273
|
+
});
|
|
274
|
+
var QueryConfigSimplified = zod.z.object({
|
|
275
|
+
queryId: vault_schema.QueryId.describe("Unique ID for the query").optional(),
|
|
276
|
+
// TODO: this should not be optional?
|
|
277
|
+
id: vault_schema.QueryId.describe("Unique ID for the query").optional(),
|
|
278
|
+
// TODO: this should not be optional?
|
|
279
|
+
requestId: zod.z.coerce.number().nullish().describe("Request ID for ZKPs"),
|
|
280
|
+
attribute: vault_schema.VaultMetadataLinkZodSchema,
|
|
281
|
+
value: AllCredentialValues.nullish(),
|
|
282
|
+
// TODO: Make the value type dynamic based on the attribute type
|
|
283
|
+
operator: Operator // TODO: Make the operator type dynamic based on the attribute type
|
|
284
|
+
});
|
|
285
|
+
var RuleResultQueryConfig = QueryConfigSimplified.extend({
|
|
286
|
+
attribute: zod.z.union([zod.z.string(), vault_schema.VaultMetadataLinkZodSchema]),
|
|
287
|
+
// string for backwards compatibility
|
|
288
|
+
type: QueryType.nullish() // Backwards compatibility
|
|
289
|
+
});
|
|
290
|
+
var PartialQueryConfigSimplified = QueryConfigSimplified.partial();
|
|
291
|
+
var OLD_ChallengeQuerySchema = zod.z.object({
|
|
292
|
+
id: zod.z.string().optional(),
|
|
293
|
+
query: QueryConfigSimplified
|
|
294
|
+
});
|
|
295
|
+
var QueryCredentialTypes = ["IDInformation", "IDInformationTfhe", "IDImage", "SelfieImage", "ProofOfResidence"];
|
|
296
|
+
var QueryCredentialType = zod.z["enum"](QueryCredentialTypes);
|
|
297
|
+
var ChallengeQuerySchema = zod.z.object({
|
|
298
|
+
id: zod.z.string().optional(),
|
|
299
|
+
query: QueryConfigSimplified
|
|
300
|
+
});
|
|
301
|
+
var OLD_CHALLENGE_QUERY_OPERATORS = ["GREATER_THAN", "LESS_THAN", "EQUAL_TO", "NOT_EQUAL_TO", "LESS_THAN_OR_EQUAL_TO", "GREATER_THAN_OR_EQUAL_TO", "IN", "NOT_IN",
|
|
302
|
+
//"BETWEEN",
|
|
303
|
+
//"NOT_BETWEEN",
|
|
304
|
+
"EXISTS"];
|
|
305
|
+
var OLD_ChallengeQueryOperator = zod.z["enum"](OLD_CHALLENGE_QUERY_OPERATORS);
|
|
306
|
+
var OperatorMappings = {
|
|
307
|
+
toChallenge: vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty({}, Operator["enum"].$noop, OLD_ChallengeQueryOperator["enum"].EQUAL_TO), Operator["enum"].$eq, OLD_ChallengeQueryOperator["enum"].EQUAL_TO), Operator["enum"].$lt, OLD_ChallengeQueryOperator["enum"].LESS_THAN), Operator["enum"].$lte, OLD_ChallengeQueryOperator["enum"].LESS_THAN_OR_EQUAL_TO), Operator["enum"].$gt, OLD_ChallengeQueryOperator["enum"].GREATER_THAN), Operator["enum"].$gte, OLD_ChallengeQueryOperator["enum"].GREATER_THAN_OR_EQUAL_TO), Operator["enum"].$in, OLD_ChallengeQueryOperator["enum"].IN), Operator["enum"].$nin, OLD_ChallengeQueryOperator["enum"].NOT_IN), Operator["enum"].$ne, OLD_ChallengeQueryOperator["enum"].NOT_EQUAL_TO), Operator["enum"].$exists, OLD_ChallengeQueryOperator["enum"].EXISTS),
|
|
308
|
+
fromChallenge: vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty({}, OLD_ChallengeQueryOperator["enum"].EQUAL_TO, Operator["enum"].$eq), OLD_ChallengeQueryOperator["enum"].LESS_THAN, Operator["enum"].$lt), OLD_ChallengeQueryOperator["enum"].LESS_THAN_OR_EQUAL_TO, Operator["enum"].$lte), OLD_ChallengeQueryOperator["enum"].GREATER_THAN, Operator["enum"].$gt), OLD_ChallengeQueryOperator["enum"].GREATER_THAN_OR_EQUAL_TO, Operator["enum"].$gte), OLD_ChallengeQueryOperator["enum"].IN, Operator["enum"].$in), OLD_ChallengeQueryOperator["enum"].NOT_IN, Operator["enum"].$nin), OLD_ChallengeQueryOperator["enum"].NOT_EQUAL_TO, Operator["enum"].$ne), OLD_ChallengeQueryOperator["enum"].EXISTS, Operator["enum"].$exists)
|
|
309
|
+
};
|
|
310
|
+
var OperatorToOLD_ChallengeQueryOperator = OperatorMappings.toChallenge;
|
|
311
|
+
var OLD_ChallengeQueryOperatorToOperator = OperatorMappings.fromChallenge;
|
|
312
|
+
|
|
313
|
+
// FIXME: Remove this once we migrate to the vault metadata
|
|
314
|
+
var OLD_QueryCredentialTypes = ["IDInformation", "IDImage", "SelfieImage", "ProofOfResidence", "AMLScreeningsResults", "ID3", "IDScan", "IDScanSelfie", "IDScanPassport"];
|
|
315
|
+
var OLD_QueryCredentialType = zod.z["enum"](OLD_QueryCredentialTypes);
|
|
316
|
+
/**
|
|
317
|
+
* @deprecated Use vault client and services instead
|
|
318
|
+
*
|
|
319
|
+
* FIXME: Have a better way to determine which credentials are required, centralize this logic if possible
|
|
320
|
+
* and with a way that doesn't require looking into the link
|
|
321
|
+
*
|
|
322
|
+
* @param dataLink
|
|
323
|
+
* @returns
|
|
324
|
+
*/
|
|
325
|
+
function getOldCredentialType(dataLink) {
|
|
326
|
+
if (dataLink.path.includes("/vcs/")) {
|
|
327
|
+
var _dataLink$path$split$;
|
|
328
|
+
return (_dataLink$path$split$ = dataLink.path.split("/vcs/")[1]) === null || _dataLink$path$split$ === void 0 ? void 0 : _dataLink$path$split$.split("/")[0];
|
|
329
|
+
}
|
|
330
|
+
var mapping = {
|
|
331
|
+
"Customer/identityData/age": "IDInformation",
|
|
332
|
+
"Customer/identityData/nationality": "IDInformation",
|
|
333
|
+
"Customer/identityData/residence": "ProofOfResidence",
|
|
334
|
+
"Customer/kycStatus/selfieCheckStatus": "SelfieImage",
|
|
335
|
+
"Customer/kycStatus/idImageCheckStatus": "IDImage",
|
|
336
|
+
"Customer/kycStatus/idInformationCheckStatus": "IDInformation",
|
|
337
|
+
"Customer/kycStatus/proofOfResidenceCheckStatus": "ProofOfResidence"
|
|
338
|
+
};
|
|
339
|
+
if (dataLink.path in mapping) {
|
|
340
|
+
return mapping[dataLink.path];
|
|
341
|
+
}
|
|
342
|
+
return undefined;
|
|
343
|
+
}
|
|
344
|
+
|
|
345
|
+
/**
|
|
346
|
+
* @deprecated Use vault client and services instead
|
|
347
|
+
*
|
|
348
|
+
* @param dataLink
|
|
349
|
+
* @returns
|
|
350
|
+
*/
|
|
351
|
+
function getOldCredentialPath(dataLink) {
|
|
352
|
+
if (dataLink.path.includes("credentialSubject")) {
|
|
353
|
+
var _dataLink$path$split$2;
|
|
354
|
+
var path = (_dataLink$path$split$2 = dataLink.path.split("credentialSubject")[1]) !== null && _dataLink$path$split$2 !== void 0 ? _dataLink$path$split$2 : "";
|
|
355
|
+
path = path.startsWith("/") ? path.slice(1) : path;
|
|
356
|
+
path = path.replaceAll("/", ".");
|
|
357
|
+
return path;
|
|
358
|
+
}
|
|
359
|
+
var mapping = {
|
|
360
|
+
"Customer/identityData/age": "personalData.age",
|
|
361
|
+
"Customer/identityData/nationality": "personalData.nationality",
|
|
362
|
+
"Customer/identityData/residence": "personalData.residence"
|
|
363
|
+
};
|
|
364
|
+
if (dataLink.path in mapping) {
|
|
365
|
+
return mapping[dataLink.path];
|
|
366
|
+
}
|
|
367
|
+
return dataLink.path;
|
|
368
|
+
}
|
|
369
|
+
|
|
370
|
+
/**
|
|
371
|
+
* @deprecated Use vault client and services instead
|
|
372
|
+
*/
|
|
373
|
+
function oldCredentialPathToDataLink(path, credentialType) {
|
|
374
|
+
return {
|
|
375
|
+
version: "v1",
|
|
376
|
+
schema: "KycSession",
|
|
377
|
+
// all old paths are for customer credentials
|
|
378
|
+
path: "KycSession/vcs/".concat(credentialType, "/v1/credentialSubject/").concat(path.replaceAll(".", "/"))
|
|
379
|
+
};
|
|
380
|
+
}
|
|
381
|
+
|
|
382
|
+
var ScenarioTypes = ["PrivacyPreservingMonitoring", "IndividualMonitoring", "TransactionMonitoring", "TFHE" // TODO integrate TFHE verification
|
|
383
|
+
];
|
|
384
|
+
var ScenarioType = zod.z["enum"](ScenarioTypes);
|
|
385
|
+
var ScenarioStatuses = ["enabled", "disabled"];
|
|
386
|
+
var ScenarioStatus = zod.z["enum"](ScenarioStatuses);
|
|
387
|
+
var ScenarioSchema = zod.z.object({
|
|
388
|
+
title: zod.z.string(),
|
|
389
|
+
link: zod.z.object({
|
|
390
|
+
version: zod.z.string(),
|
|
391
|
+
schema: zod.z.string(),
|
|
392
|
+
path: zod.z.string()
|
|
393
|
+
}),
|
|
394
|
+
status: zod.z["enum"]([ScenarioStatus.Enum.enabled, ScenarioStatus.Enum.disabled]).optional()
|
|
395
|
+
});
|
|
396
|
+
var BackwardsCompatibleScenarioTypes = ["PrivacyPreservingMonitoring", "IndividualMonitoring", "TransactionMonitoring", "TFHE", "OffChainZKP",
|
|
397
|
+
// Backwards compatible
|
|
398
|
+
"ChallengeQuery" // Backwards compatible
|
|
399
|
+
];
|
|
400
|
+
var BackwardsCompatibleScenarioType = zod.z["enum"](BackwardsCompatibleScenarioTypes);
|
|
401
|
+
var BaseQueryResponse = zod.z.object({
|
|
402
|
+
result: zod.z.object({
|
|
403
|
+
is_valid: zod.z["boolean"](),
|
|
404
|
+
reasons: zod.z.array(zod.z.string())
|
|
405
|
+
})
|
|
406
|
+
});
|
|
407
|
+
var OffChainZKPRuleResult = BaseQueryResponse.extend({
|
|
408
|
+
result: zod.z.object({
|
|
409
|
+
is_valid: zod.z["boolean"](),
|
|
410
|
+
query: QueryConfigSimplified,
|
|
411
|
+
reasons: zod.z.array(zod.z.string())
|
|
412
|
+
})
|
|
413
|
+
});
|
|
414
|
+
var ExecuteQueryResponse = BaseQueryResponse.extend({
|
|
415
|
+
executionId: vault_schema.UuidString
|
|
416
|
+
});
|
|
417
|
+
var RuleEngineResponse = zod.z.object({
|
|
418
|
+
objectType: BackwardsCompatibleScenarioType,
|
|
419
|
+
objectId: zod.z.string().describe("Object id in the cms (challengeQueryid, offChainZKPid)"),
|
|
420
|
+
name: zod.z.string(),
|
|
421
|
+
address: vault_schema.BlockchainAddress.nullish(),
|
|
422
|
+
result: ExecuteQueryResponse,
|
|
423
|
+
executionId: vault_schema.UuidString,
|
|
424
|
+
scenarioId: zod.z.string()
|
|
425
|
+
});
|
|
426
|
+
var ScenarioExecutionResponse = zod.z.array(RuleEngineResponse);
|
|
427
|
+
var RuleResultStatuses = ["valid", "not-valid", "error", "unknown"];
|
|
428
|
+
var RuleResultStatus = zod.z["enum"](RuleResultStatuses);
|
|
429
|
+
var RuleResultStatusLabels = vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty(vault_schema._defineProperty({}, RuleResultStatus.Enum.valid, "Valid"), RuleResultStatus.Enum["not-valid"], "Not Valid"), RuleResultStatus.Enum.error, "Error"), RuleResultStatus.Enum.unknown, "Unknown");
|
|
430
|
+
var SdkVerificationOutput = zod.z.object({
|
|
431
|
+
customerId: zod.z.string().optional(),
|
|
432
|
+
// for v1
|
|
433
|
+
scenarioExecutionId: zod.z.string().optional(),
|
|
434
|
+
// for v1
|
|
435
|
+
status: RuleResultStatus.optional(),
|
|
436
|
+
// for v1
|
|
437
|
+
results: zod.z.array(ScenarioExecutionResponse).optional() // for v1,
|
|
438
|
+
});
|
|
439
|
+
var VerificationSessionStatuses = ["IN_PROGRESS", "COMPLETED", "NOT_STARTED"];
|
|
440
|
+
var VerificationSessionStatus = zod.z["enum"](VerificationSessionStatuses);
|
|
441
|
+
var VerificationOutput = zod.z.object({
|
|
442
|
+
id: vault_schema.UuidString.nullable(),
|
|
443
|
+
verificationResult: SdkVerificationOutput.nullable(),
|
|
444
|
+
status: VerificationSessionStatus
|
|
445
|
+
});
|
|
446
|
+
var Scenario = zod.z.object({
|
|
447
|
+
id: vault_schema.ScenarioId,
|
|
448
|
+
name: zod.z.string(),
|
|
449
|
+
description: zod.z.string().nullish(),
|
|
450
|
+
queries: zod.z.array(QueryConfigSimplified),
|
|
451
|
+
type: ScenarioType,
|
|
452
|
+
workspaceId: vault_schema.WorkspaceId,
|
|
453
|
+
vcsIncluded: zod.z.array(CredentialType).nullish()
|
|
454
|
+
});
|
|
455
|
+
|
|
456
|
+
// creating this because SmartContractDeployment has an issue with AddressSchema
|
|
457
|
+
// during rpcPublisher.send
|
|
458
|
+
// also the parsing of the queryconfiguration fields changes type slightly as well.
|
|
459
|
+
var AbbreviatedWorkflowScenario = Scenario.omit({
|
|
460
|
+
vcsIncluded: true,
|
|
461
|
+
queries: true
|
|
462
|
+
}).extend({
|
|
463
|
+
queries: zod.z.array(QueryConfigSimplified)
|
|
464
|
+
});
|
|
465
|
+
var TemplateScenario = Scenario.omit({
|
|
466
|
+
workspaceId: true
|
|
467
|
+
});
|
|
468
|
+
var CreateTemplateScenario = TemplateScenario.omit({
|
|
469
|
+
id: true
|
|
470
|
+
});
|
|
471
|
+
|
|
472
|
+
var ScenarioAuthorizationData = zod.z.object({
|
|
473
|
+
executionId: vault_schema.UuidString,
|
|
474
|
+
sessionId: vault_schema.UuidString,
|
|
475
|
+
projectId: zod.z.string(),
|
|
476
|
+
address: vault_schema.BlockchainAddress.nullish(),
|
|
477
|
+
status: zod.z["enum"](["pending", "authorised", "unauthorised"]),
|
|
478
|
+
scenarioId: zod.z.string(),
|
|
479
|
+
scenarioName: zod.z.string(),
|
|
480
|
+
requestMessage: AuthorizationRequestMessage,
|
|
481
|
+
responseMessage: AuthorizationResponseMessage.nullish(),
|
|
482
|
+
verificationError: zod.z.string().nullish(),
|
|
483
|
+
query: QueryConfigSimplified.array(),
|
|
484
|
+
workflowSessionId: vault_schema.UuidString.optional()
|
|
485
|
+
});
|
|
486
|
+
// v1 sdk
|
|
487
|
+
var SdkVerificationResponseSchema = SdkVerificationOutput;
|
|
488
|
+
var CloseScreenNotification = zod.z.object({
|
|
489
|
+
type: zod.z.literal("closeScreen"),
|
|
490
|
+
identifier: zod.z.string(),
|
|
491
|
+
data: zod.z.undefined()
|
|
492
|
+
});
|
|
493
|
+
var KycCompletionData = zod.z.array(VerifiableCredential);
|
|
494
|
+
var KycCompletionNotification = zod.z.object({
|
|
495
|
+
type: zod.z.literal("kycCompletion"),
|
|
496
|
+
identifier: zod.z.string(),
|
|
497
|
+
data: KycCompletionData
|
|
498
|
+
});
|
|
499
|
+
var RuleEngineScenarioExecutionData = zod.z.object({
|
|
500
|
+
type: zod.z.literal("RuleEngineScenarioExecution"),
|
|
501
|
+
data: SdkVerificationResponseSchema
|
|
502
|
+
});
|
|
503
|
+
var OffChainScenarioExecutionData = zod.z.object({
|
|
504
|
+
type: zod.z.literal("OffChainScenarioExecution"),
|
|
505
|
+
data: zod.z.array(ScenarioAuthorizationData)
|
|
506
|
+
});
|
|
507
|
+
var OnChainScenarioExecutionData = zod.z.object({
|
|
508
|
+
type: zod.z.literal("OnChainScenarioExecution"),
|
|
509
|
+
data: zod.z.any()
|
|
510
|
+
});
|
|
511
|
+
var ScenarioExecutionData = zod.z.union([RuleEngineScenarioExecutionData, OffChainScenarioExecutionData, OnChainScenarioExecutionData]);
|
|
512
|
+
var ScenarioExecutionNotification = zod.z.object({
|
|
513
|
+
type: zod.z.literal("scenarioExecution"),
|
|
514
|
+
identifier: zod.z.string(),
|
|
515
|
+
data: ScenarioExecutionData
|
|
516
|
+
});
|
|
517
|
+
var IsVerifiedNotification = zod.z.object({
|
|
518
|
+
type: zod.z.literal("isVerifiedNotification"),
|
|
519
|
+
identifier: zod.z.string(),
|
|
520
|
+
isVerified: zod.z["boolean"]()
|
|
521
|
+
});
|
|
522
|
+
var PolygonIdInitialized = zod.z.object({
|
|
523
|
+
type: zod.z.literal("polygonIdInitialized"),
|
|
524
|
+
identifier: zod.z.string(),
|
|
525
|
+
data: zod.z.string()
|
|
526
|
+
});
|
|
527
|
+
var OcvSdkInitialized = zod.z.object({
|
|
528
|
+
type: zod.z.literal("ocvSdkInitialized"),
|
|
529
|
+
identifier: zod.z.string()
|
|
530
|
+
});
|
|
531
|
+
var StartCompletedNotification = zod.z.object({
|
|
532
|
+
type: zod.z.literal("startCompletedNotification"),
|
|
533
|
+
identifier: zod.z.string()
|
|
534
|
+
});
|
|
535
|
+
var IdentityNotificationMessage = zod.z.union([CloseScreenNotification, PolygonIdInitialized, OcvSdkInitialized, StartCompletedNotification, KycCompletionNotification, ScenarioExecutionNotification, IsVerifiedNotification]);
|
|
536
|
+
var InitialDataRequest = zod.z.object({
|
|
537
|
+
type: zod.z.literal("initialDataRequest"),
|
|
538
|
+
identifier: zod.z.string()
|
|
539
|
+
});
|
|
540
|
+
var SignatureRequest = zod.z.object({
|
|
541
|
+
type: zod.z.literal("signatureRequest"),
|
|
542
|
+
identifier: zod.z.string(),
|
|
543
|
+
data: zod.z.object({
|
|
544
|
+
message: zod.z.string()
|
|
545
|
+
})
|
|
546
|
+
});
|
|
547
|
+
var TransactionData = zod.z.object({
|
|
548
|
+
accountAddress: vault_schema.BlockchainAddress,
|
|
549
|
+
to: vault_schema.BlockchainAddress,
|
|
550
|
+
data: vault_schema.String0x,
|
|
551
|
+
value: zod.z.string().optional()
|
|
552
|
+
});
|
|
553
|
+
var SendTransactionRequest = zod.z.object({
|
|
554
|
+
type: zod.z.literal("sendTransactionRequest"),
|
|
555
|
+
identifier: zod.z.string(),
|
|
556
|
+
data: TransactionData
|
|
557
|
+
});
|
|
558
|
+
var IdentityRequestMessage = zod.z.union([InitialDataRequest, SignatureRequest, SendTransactionRequest]);
|
|
559
|
+
var AVAILABLE_FLOWS = ["VERIFICATION", "MANAGEMENT", "POLYGON_ID", "KYB"];
|
|
560
|
+
var AvailableFlow = zod.z["enum"](AVAILABLE_FLOWS);
|
|
561
|
+
var DataAvailableOnStart = zod.z.object({
|
|
562
|
+
identifier: zod.z.string().optional(),
|
|
563
|
+
flow: zod.z["enum"](AVAILABLE_FLOWS).optional(),
|
|
564
|
+
accessToken: zod.z.string(),
|
|
565
|
+
signingMessage: zod.z.string(),
|
|
566
|
+
signature: zod.z.string()
|
|
567
|
+
});
|
|
568
|
+
var InitialDataResponse = zod.z.object({
|
|
569
|
+
type: zod.z.literal("onStartKyc"),
|
|
570
|
+
data: DataAvailableOnStart
|
|
571
|
+
});
|
|
572
|
+
var SignatureResponse = zod.z.object({
|
|
573
|
+
type: zod.z.literal("signature"),
|
|
574
|
+
data: vault_schema.BlockchainSignature
|
|
575
|
+
});
|
|
576
|
+
var TransactionResponse = zod.z.object({
|
|
577
|
+
type: zod.z.literal("transactionResponse"),
|
|
578
|
+
data: zod.z.object({
|
|
579
|
+
txHash: vault_schema.TxHash
|
|
580
|
+
})
|
|
581
|
+
});
|
|
582
|
+
var HostResponseMessage = zod.z.union([InitialDataResponse, SignatureResponse, TransactionResponse]);
|
|
583
|
+
|
|
584
|
+
/**
|
|
585
|
+
* Exported types
|
|
586
|
+
*/
|
|
587
|
+
|
|
588
|
+
var ComplianceImplementationStepsInput = zod.z.object({
|
|
589
|
+
identityChecks: zod.z["boolean"]().nullish(),
|
|
590
|
+
configureIdentity: zod.z["boolean"]().nullish(),
|
|
591
|
+
deployIdentity: zod.z["boolean"]().nullish(),
|
|
592
|
+
monitorIdentity: zod.z["boolean"]().nullish()
|
|
593
|
+
});
|
|
594
|
+
|
|
595
|
+
/////////////
|
|
596
|
+
// EIP-155 //
|
|
597
|
+
/////////////
|
|
598
|
+
|
|
599
|
+
var TxAuthInput = zod.z.object({
|
|
600
|
+
workflowId: vault_schema.WorkflowId.optional(),
|
|
601
|
+
chainId: vault_schema.EvmChainId,
|
|
602
|
+
contractAbi: zod.z.array(zod.z.record(zod.z.unknown())),
|
|
603
|
+
contractAddress: vault_schema.AddressSchema,
|
|
604
|
+
functionName: zod.z.string(),
|
|
605
|
+
args: zod.z.array(zod.z.unknown()),
|
|
606
|
+
userAddress: vault_schema.AddressSchema,
|
|
607
|
+
blockExpiration: zod.z.number()["int"]().optional(),
|
|
608
|
+
nonce: zod.z.number()["int"]().optional()
|
|
609
|
+
});
|
|
610
|
+
// the api endpoint can source the userAddress from the session if it's not provided
|
|
611
|
+
var ApiTxAuthInput = TxAuthInput.extend({
|
|
612
|
+
userAddress: vault_schema.AddressSchema.optional()
|
|
613
|
+
});
|
|
614
|
+
var TxSignatureResponse = zod.z.object({
|
|
615
|
+
signature: vault_schema.EIP155Signature,
|
|
616
|
+
blockExpiration: zod.z.number()
|
|
617
|
+
});
|
|
618
|
+
var GetTxAuthDataSignatureResponse = zod.z.union([zod.z.object({
|
|
619
|
+
isAuthorized: zod.z.literal(true),
|
|
620
|
+
signature: vault_schema.EIP155Signature,
|
|
621
|
+
payload: zod.z.string(),
|
|
622
|
+
blockExpiration: zod.z.number()
|
|
623
|
+
}), zod.z.object({
|
|
624
|
+
isAuthorized: zod.z.literal(false),
|
|
625
|
+
errorMessage: zod.z.any()
|
|
626
|
+
})]);
|
|
627
|
+
/////////////
|
|
628
|
+
// Tezos //
|
|
629
|
+
/////////////
|
|
630
|
+
|
|
631
|
+
var TezosTxAuthInput = zod.z.object({
|
|
632
|
+
workflowId: vault_schema.WorkflowId.optional(),
|
|
633
|
+
chainID: vault_schema.TezosChainId,
|
|
634
|
+
contractAddress: vault_schema.TezosContractAddress,
|
|
635
|
+
functionName: vault_schema.TezosEntrypointName,
|
|
636
|
+
args: zod.z.string(),
|
|
637
|
+
userAddress: vault_schema.TezosImplicitAddress,
|
|
638
|
+
blockExpiration: zod.z.number()["int"]().optional(),
|
|
639
|
+
nonce: zod.z.number()["int"]().optional()
|
|
640
|
+
});
|
|
641
|
+
// the api endpoint can source the userAddress from the session if it's not provided
|
|
642
|
+
var ApiTezosTxAuthInput = TezosTxAuthInput.extend({
|
|
643
|
+
userAddress: vault_schema.TezosImplicitAddress.optional()
|
|
644
|
+
});
|
|
645
|
+
var TezosTxSignatureResponse = zod.z.object({
|
|
646
|
+
signature: vault_schema.EdSignature,
|
|
647
|
+
blockExpiration: zod.z.number()
|
|
648
|
+
});
|
|
649
|
+
var GetTezosTxAuthDataSignatureResponse = zod.z.union([zod.z.object({
|
|
650
|
+
isAuthorized: zod.z.literal(true),
|
|
651
|
+
signature: vault_schema.EdSignature,
|
|
652
|
+
blockExpiration: zod.z.number()
|
|
653
|
+
}), zod.z.object({
|
|
654
|
+
isAuthorized: zod.z.literal(false),
|
|
655
|
+
errorMessage: zod.z.any()
|
|
656
|
+
})]);
|
|
657
|
+
/////////////
|
|
658
|
+
// General //
|
|
659
|
+
/////////////
|
|
660
|
+
|
|
661
|
+
var ExtendedTxAuthInput = TxAuthInput.and(zod.z.object({
|
|
662
|
+
namespace: zod.z.literal(vault_schema.BlockchainNamespace.Enum.eip155),
|
|
663
|
+
userAddress: vault_schema.AddressSchema
|
|
664
|
+
}));
|
|
665
|
+
var ExtendedTezosTxAuthInput = TezosTxAuthInput.and(zod.z.object({
|
|
666
|
+
namespace: zod.z.literal(vault_schema.BlockchainNamespace.Enum.tezos),
|
|
667
|
+
userAddress: vault_schema.TezosImplicitAddress
|
|
668
|
+
}));
|
|
669
|
+
var ExtendedTxAuthDataSignatureResponse = GetTxAuthDataSignatureResponse.and(zod.z.object({
|
|
670
|
+
namespace: zod.z.literal(vault_schema.BlockchainNamespace.Enum.eip155),
|
|
671
|
+
userAddress: vault_schema.AddressSchema
|
|
672
|
+
}));
|
|
673
|
+
var ExtendedTezosTxAuthDataSignatureResponse = GetTezosTxAuthDataSignatureResponse.and(zod.z.object({
|
|
674
|
+
namespace: zod.z.literal(vault_schema.BlockchainNamespace.Enum.tezos),
|
|
675
|
+
userAddress: vault_schema.TezosImplicitAddress
|
|
676
|
+
}));
|
|
677
|
+
var AnyTxAuthDataSignatureResponse = zod.z.union([ExtendedTxAuthDataSignatureResponse, ExtendedTezosTxAuthDataSignatureResponse]);
|
|
678
|
+
/////////////
|
|
679
|
+
// JS SDK //
|
|
680
|
+
/////////////
|
|
681
|
+
|
|
682
|
+
var Eip155TxAuthInputJsSdk = ExtendedTxAuthInput.and(zod.z.object({
|
|
683
|
+
workflowId: vault_schema.WorkflowId
|
|
684
|
+
}));
|
|
685
|
+
var TezosTxAuthInputJsSdk = ExtendedTezosTxAuthInput.and(zod.z.object({
|
|
686
|
+
workflowId: vault_schema.WorkflowId
|
|
687
|
+
}));
|
|
688
|
+
var AnyTxAuthInputJsSdk = zod.z.union([Eip155TxAuthInputJsSdk, TezosTxAuthInputJsSdk]);
|
|
689
|
+
|
|
690
|
+
var SimplifiedCredential = zod.z.object({
|
|
691
|
+
id: zod.z.string(),
|
|
692
|
+
type: zod.z.array(zod.z.string()),
|
|
693
|
+
issuanceDate: zod.z.string(),
|
|
694
|
+
journeyId: zod.z.string()
|
|
695
|
+
});
|
|
696
|
+
/**
|
|
697
|
+
* GetCredentialsRequest
|
|
698
|
+
*/
|
|
699
|
+
var GetCredentialsRequest = zod.z.object({
|
|
700
|
+
type: zod.z.literal("getCredentials"),
|
|
701
|
+
data: zod.z.undefined()
|
|
702
|
+
});
|
|
703
|
+
/**
|
|
704
|
+
* GetCredentialsResponse
|
|
705
|
+
*/
|
|
706
|
+
var GetCredentialsResponse = zod.z.object({
|
|
707
|
+
type: zod.z.literal("polygonIdCredentials"),
|
|
708
|
+
credentials: zod.z.array(SimplifiedCredential),
|
|
709
|
+
identifier: zod.z.string()
|
|
710
|
+
});
|
|
711
|
+
/**
|
|
712
|
+
* PolygonIdRequest
|
|
713
|
+
*/
|
|
714
|
+
var PolygonIdRequestData = zod.z.union([zod.z.object({
|
|
715
|
+
type: zod.z.literal("auth"),
|
|
716
|
+
authRequest: AuthorizationRequestMessage
|
|
717
|
+
}), zod.z.object({
|
|
718
|
+
type: zod.z.literal("credentialOffer"),
|
|
719
|
+
credentialOfferRequest: QrCodeLinkWithSchemaType
|
|
720
|
+
}), zod.z.object({
|
|
721
|
+
type: zod.z.literal("zkp"),
|
|
722
|
+
zkpRequest: ZeroKnowledgeProofRequest
|
|
723
|
+
})]);
|
|
724
|
+
var PolygonIdRequest = zod.z.object({
|
|
725
|
+
type: zod.z.literal("polygonIdRequest"),
|
|
726
|
+
data: PolygonIdRequestData
|
|
727
|
+
});
|
|
728
|
+
/**
|
|
729
|
+
* PolygonIdResponse
|
|
730
|
+
*/
|
|
731
|
+
var PolygonIdResponseData = zod.z.union([zod.z.object({
|
|
732
|
+
type: zod.z.literal("auth"),
|
|
733
|
+
authResponse: AuthorizationResponseMessage
|
|
734
|
+
}), zod.z.object({
|
|
735
|
+
type: zod.z.literal("credentialOffer"),
|
|
736
|
+
credentialOfferResponse: zod.z.array(vault_schema.GenericVerifiableCredentialSchema)
|
|
737
|
+
}), zod.z.object({
|
|
738
|
+
type: zod.z.literal("zkp"),
|
|
739
|
+
zkpResponse: ZeroKnowledgeProofResponse
|
|
740
|
+
}), zod.z.object({
|
|
741
|
+
type: zod.z.literal("close"),
|
|
742
|
+
screen: zod.z["enum"](["auth", "credentialOffer", "zkp", "getCredentials"]),
|
|
743
|
+
closeResponse: zod.z.string()
|
|
744
|
+
})]);
|
|
745
|
+
var PolygonIdResponse = zod.z.object({
|
|
746
|
+
type: zod.z.literal("polygonIdResponse"),
|
|
747
|
+
identifier: zod.z.string(),
|
|
748
|
+
data: PolygonIdResponseData
|
|
749
|
+
});
|
|
750
|
+
/**
|
|
751
|
+
* StartFlowRequest
|
|
752
|
+
*/
|
|
753
|
+
var StartFlowRequest = zod.z.union([zod.z.object({
|
|
754
|
+
type: zod.z.literal("startVerification"),
|
|
755
|
+
data: zod.z.undefined()
|
|
756
|
+
}), zod.z.object({
|
|
757
|
+
type: zod.z.literal("startManagement"),
|
|
758
|
+
data: zod.z.undefined()
|
|
759
|
+
}), zod.z.object({
|
|
760
|
+
type: zod.z.literal("startKYB"),
|
|
761
|
+
data: zod.z.undefined()
|
|
762
|
+
})]);
|
|
763
|
+
/**
|
|
764
|
+
* IsVerifiedRequest
|
|
765
|
+
*/
|
|
766
|
+
var IsVerifiedRequest = zod.z.object({
|
|
767
|
+
type: zod.z.literal("isVerifiedRequest"),
|
|
768
|
+
data: zod.z.object({
|
|
769
|
+
userAddress: vault_schema.AddressSchema
|
|
770
|
+
}),
|
|
771
|
+
identifier: zod.z.string()
|
|
772
|
+
});
|
|
773
|
+
/**
|
|
774
|
+
* IsVerifiedResponse
|
|
775
|
+
*/
|
|
776
|
+
var IsVerifiedResponse = zod.z.object({
|
|
777
|
+
type: zod.z.literal("isVerifiedResponse"),
|
|
778
|
+
isVerified: zod.z["boolean"](),
|
|
779
|
+
identifier: zod.z.string()
|
|
780
|
+
});
|
|
781
|
+
/**
|
|
782
|
+
* GetTxAuthSigRequest
|
|
783
|
+
*/
|
|
784
|
+
var GetTxAuthSigRequest = zod.z.object({
|
|
785
|
+
type: zod.z.literal("getTxAuthSigRequest"),
|
|
786
|
+
data: ApiTxAuthInput,
|
|
787
|
+
identifier: zod.z.string()
|
|
788
|
+
});
|
|
789
|
+
/**
|
|
790
|
+
* GetTxAuthSigResponse
|
|
791
|
+
*/
|
|
792
|
+
var GetTxAuthSigResponse = zod.z.object({
|
|
793
|
+
type: zod.z.literal("getTxAuthSigResponse"),
|
|
794
|
+
signatureResponse: GetTxAuthDataSignatureResponse,
|
|
795
|
+
identifier: zod.z.string()
|
|
796
|
+
});
|
|
797
|
+
/**
|
|
798
|
+
* GetTxAuthSigRequest Tezos
|
|
799
|
+
*/
|
|
800
|
+
var GetTxAuthSigRequestTezos = zod.z.object({
|
|
801
|
+
type: zod.z.literal("getTxAuthSigRequestTezos"),
|
|
802
|
+
data: ApiTezosTxAuthInput,
|
|
803
|
+
identifier: zod.z.string()
|
|
804
|
+
});
|
|
805
|
+
/**
|
|
806
|
+
* GetTxAuthSigResponse Tezos
|
|
807
|
+
*/
|
|
808
|
+
var GetTxAuthSigResponseTezos = zod.z.object({
|
|
809
|
+
type: zod.z.literal("getTezosTxAuthSigResponse"),
|
|
810
|
+
signatureResponse: GetTezosTxAuthDataSignatureResponse,
|
|
811
|
+
identifier: zod.z.string()
|
|
812
|
+
});
|
|
813
|
+
var HostRequestMessage = zod.z.union([GetCredentialsRequest, PolygonIdRequest, StartFlowRequest, IsVerifiedRequest, GetTxAuthSigRequest, GetTxAuthSigRequestTezos]);
|
|
814
|
+
var IdentityResponseMessage = zod.z.union([GetCredentialsResponse, PolygonIdResponse, IsVerifiedResponse, GetTxAuthSigResponse, GetTxAuthSigResponseTezos]);
|
|
815
|
+
|
|
816
|
+
// Risk Score
|
|
817
|
+
var RiskScoreTypes = ["Low", "Medium", "High", "No risk"];
|
|
818
|
+
var RiskScoreType = zod.z["enum"](RiskScoreTypes);
|
|
819
|
+
// Customer Type
|
|
820
|
+
var CustomerTypes = ["Individual", "Company"];
|
|
821
|
+
var CustomerType = zod.z["enum"](CustomerTypes);
|
|
822
|
+
// KYC Onboarding Level
|
|
823
|
+
var KycOnboardingLevels = ["Sign-up", "AML screening", "KYC", "Questionaire", "Onboarded"];
|
|
824
|
+
var KycOnboardingLevel = zod.z["enum"](KycOnboardingLevels);
|
|
825
|
+
// KYB Onboarding Level
|
|
826
|
+
var KybOnboardingLevels = ["Onboarding", "KYB", "Onboarded"];
|
|
827
|
+
var KybOnboardingLevel = zod.z["enum"](KybOnboardingLevels);
|
|
828
|
+
var CustomerOnboardingLevels = [].concat(KycOnboardingLevels, KybOnboardingLevels);
|
|
829
|
+
var CustomerOnboardingLevel = zod.z["enum"](CustomerOnboardingLevels);
|
|
830
|
+
// Customer Status
|
|
831
|
+
var CustomerStatuses = ["Active", "Rejected", "Dormant", "To be reviewed", "Failed", "Escalated", "Terminated", "No status"];
|
|
832
|
+
var CustomerStatus = zod.z["enum"](CustomerStatuses);
|
|
833
|
+
var BasicCustomerContactInformation = zod.z.object({
|
|
834
|
+
email: zod.z.string().email(),
|
|
835
|
+
phone: zod.z.string().min(4),
|
|
836
|
+
twitter: zod.z.string(),
|
|
837
|
+
discord: zod.z.string(),
|
|
838
|
+
telegram: zod.z.string()
|
|
839
|
+
}).partial();
|
|
840
|
+
var CUSTOMERS_CHARTS = ["totalCustomers", "onboarded", "active", "dormant", "rejected", "topCountriesByCustomersCount", "customersRiskLevel", "customersByStatus", "trendOfStatusesOverTime"];
|
|
841
|
+
var CustomersChartType = zod.z["enum"](CUSTOMERS_CHARTS);
|
|
842
|
+
var CUSTOMER_TABLE_COLUMNS = ["selected", "wallets", "type", "country_of_residence", "risk_score", "onboarding_level", "open_alerts_count", "status", "date_onboarded"];
|
|
843
|
+
var CustomerTableColumn = zod.z["enum"](CUSTOMER_TABLE_COLUMNS);
|
|
844
|
+
var CUSTOMER_AUTOMATION_REASONS = {
|
|
845
|
+
"rule-engine": {
|
|
846
|
+
fail: "Rules engine verification failed",
|
|
847
|
+
pass: "Rules engine verification passed"
|
|
848
|
+
},
|
|
849
|
+
kyc: {
|
|
850
|
+
green: {
|
|
851
|
+
"final": "Passed KYC"
|
|
852
|
+
},
|
|
853
|
+
yellow: {
|
|
854
|
+
retry: "User rejected by the KYC provider with possibility to retry",
|
|
855
|
+
fail: "User rejected by the KYC provider"
|
|
856
|
+
},
|
|
857
|
+
red: {
|
|
858
|
+
retry: "User rejected by the KYC provider with possibility to retry",
|
|
859
|
+
fail: "User rejected by the KYC provider"
|
|
860
|
+
}
|
|
861
|
+
},
|
|
862
|
+
kyb: {
|
|
863
|
+
green: {
|
|
864
|
+
"final": "Passed KYB"
|
|
865
|
+
},
|
|
866
|
+
yellow: {
|
|
867
|
+
retry: "Company rejected by the KYB provider with possibility to retry",
|
|
868
|
+
fail: "Company rejected by the KYB provider"
|
|
869
|
+
},
|
|
870
|
+
red: {
|
|
871
|
+
retry: "Company rejected by the KYB provider with possibility to retry",
|
|
872
|
+
fail: "Company rejected by the KYB provider"
|
|
873
|
+
},
|
|
874
|
+
beneficiaryOnToBeReviewState: "One or more beneficiaries are on 'To be reviewed' state"
|
|
875
|
+
},
|
|
876
|
+
"aml-screening": {
|
|
877
|
+
fail: "AML screening hits received during onboarding",
|
|
878
|
+
ongoingMonitoringFail: "AML screening hits received during ongoing monitoring",
|
|
879
|
+
pass: "Passed AML screening"
|
|
880
|
+
},
|
|
881
|
+
offchain_zkp: {
|
|
882
|
+
fail: "Offchain ZKP verification failed",
|
|
883
|
+
pass: "Offchain ZKP verification passed"
|
|
884
|
+
},
|
|
885
|
+
tfhe: {
|
|
886
|
+
fail: "TFHE verification failed",
|
|
887
|
+
pass: "TFHE verification passed"
|
|
888
|
+
}
|
|
889
|
+
};
|
|
890
|
+
|
|
891
|
+
/**
|
|
892
|
+
* Wallet challenge parameters
|
|
893
|
+
*/
|
|
894
|
+
|
|
895
|
+
var GenerateWalletChallengeRequest = zod.z.object({
|
|
896
|
+
address: vault_schema.BlockchainAddress,
|
|
897
|
+
namespace: vault_schema.SupportedBlockchainNamespaceForSignatureAuth,
|
|
898
|
+
blockchainId: vault_schema.BlockchainId.optional(),
|
|
899
|
+
origin: zod.z.string().url(),
|
|
900
|
+
workflowId: vault_schema.WorkflowId,
|
|
901
|
+
externalCustomerId: vault_schema.ExternalCustomerId.optional(),
|
|
902
|
+
additionalInformation: vault_schema.AdditionalCustomerInformationParams.optional()
|
|
903
|
+
});
|
|
904
|
+
var AuthSession = zod.z.object({
|
|
905
|
+
// JWT token containing user authentication data
|
|
906
|
+
// Generated by the Identity-api using the IdentityWidgetAccessToken_NEW schema
|
|
907
|
+
// Used for user identification in the identity-v2-app
|
|
908
|
+
// We don't want users to rely on the structure of the token so we expose it as a string
|
|
909
|
+
token: zod.z.string(),
|
|
910
|
+
// the timestamp at which the session will expire
|
|
911
|
+
// in seconds since epoch to avoid timezone issues and date parsing errors
|
|
912
|
+
// this is exposed in case the app needs to store the session so it knows when
|
|
913
|
+
// the session becomes invalid again
|
|
914
|
+
// We don't want users to rely on the fact that the token is a JWT, as we
|
|
915
|
+
// want to change to openId in the future, so we expose the expiration as a number
|
|
916
|
+
expiresAt: zod.z.number(),
|
|
917
|
+
// if an external customer id was provided, it will be returned
|
|
918
|
+
// when obtaining the auth session to facilitate integration with the user's system
|
|
919
|
+
externalCustomerId: vault_schema.ExternalCustomerId.optional()
|
|
920
|
+
});
|
|
921
|
+
var AuthSessionData = zod.z.object({
|
|
922
|
+
/**
|
|
923
|
+
* The unique identifier of the user
|
|
924
|
+
*/
|
|
925
|
+
identityId: zod.z.string(),
|
|
926
|
+
/**
|
|
927
|
+
* The unique identifier of the user's session
|
|
928
|
+
*/
|
|
929
|
+
customerId: zod.z.string(),
|
|
930
|
+
/**
|
|
931
|
+
* The identifier passed by the user platform
|
|
932
|
+
*/
|
|
933
|
+
externalCustomerId: vault_schema.ExternalCustomerId.optional()
|
|
934
|
+
});
|
|
935
|
+
var ChallengeResponse = zod.z.object({
|
|
936
|
+
challenge: zod.z.string()
|
|
937
|
+
});
|
|
938
|
+
////////////////
|
|
939
|
+
// SDK messages
|
|
940
|
+
////////////////
|
|
941
|
+
|
|
942
|
+
var AppConfigRequest = zod.z.object({
|
|
943
|
+
type: zod.z.literal("appConfig"),
|
|
944
|
+
data: zod.z.object({
|
|
945
|
+
authSession: AuthSession
|
|
946
|
+
})
|
|
947
|
+
});
|
|
948
|
+
var WalletUpdated = zod.z.object({
|
|
949
|
+
type: zod.z.literal("walletUpdated"),
|
|
950
|
+
data: zod.z.object({
|
|
951
|
+
address: vault_schema.BlockchainAddress
|
|
952
|
+
})
|
|
953
|
+
});
|
|
954
|
+
var WalletSignResponse = zod.z.object({
|
|
955
|
+
type: zod.z.literal("walletSignResponse"),
|
|
956
|
+
data: zod.z.object({
|
|
957
|
+
message: zod.z.string(),
|
|
958
|
+
signature: vault_schema.BlockchainSignature
|
|
959
|
+
})
|
|
960
|
+
});
|
|
961
|
+
var TxAuthDataSignatureGatingRequest = zod.z.object({
|
|
962
|
+
type: zod.z.literal("txAuthDataSignatureGatingRequest"),
|
|
963
|
+
data: zod.z.object({
|
|
964
|
+
input: AnyTxAuthInputJsSdk
|
|
965
|
+
})
|
|
966
|
+
});
|
|
967
|
+
var GetCustomerStatusRequest = zod.z.object({
|
|
968
|
+
type: zod.z.literal("getCustomerStatusRequest")
|
|
969
|
+
});
|
|
970
|
+
var IdentitySdkMessage = zod.z.union([AppConfigRequest, WalletUpdated, WalletSignResponse, TransactionResponse, TxAuthDataSignatureGatingRequest, GetCustomerStatusRequest]);
|
|
971
|
+
var IdentitySdkMessageWithIdentifier = zod.z.intersection(IdentitySdkMessage, zod.z.object({
|
|
972
|
+
identifier: zod.z.string()
|
|
973
|
+
}));
|
|
974
|
+
////////////////
|
|
975
|
+
// App messages
|
|
976
|
+
////////////////
|
|
977
|
+
|
|
978
|
+
var IdentityAppLoadedNotification = zod.z.object({
|
|
979
|
+
type: zod.z.literal("identityAppLoaded")
|
|
980
|
+
});
|
|
981
|
+
var IdentityAppConfiguredNotification = zod.z.object({
|
|
982
|
+
type: zod.z.literal("identityAppConfigured"),
|
|
983
|
+
data: zod.z.object({
|
|
984
|
+
auth: AuthSession
|
|
985
|
+
})
|
|
986
|
+
});
|
|
987
|
+
var AuthenticationExpiredNotification = zod.z.object({
|
|
988
|
+
type: zod.z.literal("authenticationExpired"),
|
|
989
|
+
data: zod.z.object({
|
|
990
|
+
authSession: AuthSession
|
|
991
|
+
})
|
|
992
|
+
});
|
|
993
|
+
var WalletSignRequest = zod.z.object({
|
|
994
|
+
type: zod.z.literal("walletSignRequest"),
|
|
995
|
+
data: zod.z.object({
|
|
996
|
+
message: zod.z.string()
|
|
997
|
+
})
|
|
998
|
+
});
|
|
999
|
+
var TxAuthDataSignatureResponse = zod.z.object({
|
|
1000
|
+
type: zod.z.literal("txAuthDataSignatureResponse"),
|
|
1001
|
+
data: AnyTxAuthDataSignatureResponse
|
|
1002
|
+
});
|
|
1003
|
+
var TxAuthDataSignatureGatingError = zod.z.object({
|
|
1004
|
+
type: zod.z.literal("txAuthDataSignatureGatingError"),
|
|
1005
|
+
data: zod.z.object({
|
|
1006
|
+
error: zod.z.string()
|
|
1007
|
+
})
|
|
1008
|
+
});
|
|
1009
|
+
var GetCustomerStatusResponse = zod.z.object({
|
|
1010
|
+
type: zod.z.literal("getCustomerStatusResponse"),
|
|
1011
|
+
data: zod.z.union([CustomerStatus, zod.z["null"]()])
|
|
1012
|
+
});
|
|
1013
|
+
var IdentityAppMessage = zod.z.union([IdentityAppLoadedNotification, IdentityAppConfiguredNotification, AuthenticationExpiredNotification, WalletSignRequest, TxAuthDataSignatureResponse, TxAuthDataSignatureGatingError, GetCustomerStatusResponse,
|
|
1014
|
+
// `identifier` is a technical detail that should not be exposed to the app
|
|
1015
|
+
KycCompletionNotification.omit({
|
|
1016
|
+
identifier: true
|
|
1017
|
+
}), ScenarioExecutionNotification.omit({
|
|
1018
|
+
identifier: true
|
|
1019
|
+
}), CloseScreenNotification.omit({
|
|
1020
|
+
identifier: true
|
|
1021
|
+
}), IsVerifiedNotification.omit({
|
|
1022
|
+
identifier: true
|
|
1023
|
+
}), SendTransactionRequest.omit({
|
|
1024
|
+
identifier: true
|
|
1025
|
+
})]);
|
|
1026
|
+
var IdentityWallet = zod.z.object({
|
|
1027
|
+
address: vault_schema.BlockchainAddress,
|
|
1028
|
+
namespace: vault_schema.SupportedBlockchainNamespaceForSignatureAuth
|
|
1029
|
+
});
|
|
1030
|
+
|
|
1031
|
+
var ZKPRequest = zod.z.object({
|
|
1032
|
+
id: zod.z.number(),
|
|
1033
|
+
circuitId: zod.z["enum"](["credentialAtomicQuerySigV2", "credentialAtomicQuerySigV2OnChain"]),
|
|
1034
|
+
optional: zod.z["boolean"]().optional(),
|
|
1035
|
+
query: QueryConfigSimplified
|
|
1036
|
+
});
|
|
1037
|
+
var ZKPRequestFromZKVerifier = zod.z.object({
|
|
1038
|
+
id: zod.z.number(),
|
|
1039
|
+
circuitId: zod.z.string(),
|
|
1040
|
+
optional: zod.z["boolean"]().optional(),
|
|
1041
|
+
query: zod.z.record(zod.z.unknown())
|
|
1042
|
+
});
|
|
1043
|
+
var PrivacyPreservingMonitoring = zod.z.object({
|
|
1044
|
+
requestingAuthorizationMessage: zod.z.string().nullish(),
|
|
1045
|
+
zkpRequest: zod.z.array(ZKPRequest).nullish()
|
|
1046
|
+
});
|
|
1047
|
+
var CreateAuthRequestProps = zod.z.object({
|
|
1048
|
+
hostUrl: zod.z.string().url(),
|
|
1049
|
+
sessionId: vault_schema.UuidString,
|
|
1050
|
+
audience: zod.z.string().describe("DID of the verifier"),
|
|
1051
|
+
callbackURL: zod.z.string().describe("URL to which the auth response of the client callback will be sent"),
|
|
1052
|
+
query: zod.z.array(QueryConfigSimplified),
|
|
1053
|
+
onChainVerification: zod.z["boolean"]().optional(),
|
|
1054
|
+
id: zod.z.string().uuid(),
|
|
1055
|
+
thid: zod.z.string().uuid(),
|
|
1056
|
+
message: zod.z.string().describe("Message shown to the user")
|
|
1057
|
+
});
|
|
1058
|
+
var AllScenarioExecutionAuthorizationData = zod.z.object({
|
|
1059
|
+
executionId: vault_schema.UuidString,
|
|
1060
|
+
projectId: zod.z.string(),
|
|
1061
|
+
scenarioExecutionIds: zod.z.array(vault_schema.UuidString)
|
|
1062
|
+
});
|
|
1063
|
+
var SCENARIO_AUTHORIZATION_STATUSES = ["pending", "authorised", "unauthorised"];
|
|
1064
|
+
var ScenarioAuthorizationStatus = zod.z["enum"](SCENARIO_AUTHORIZATION_STATUSES);
|
|
1065
|
+
|
|
1066
|
+
var HostMessage = zod.z.union([HostRequestMessage, HostResponseMessage]);
|
|
1067
|
+
var IdentityMessage = zod.z.union([IdentityNotificationMessage, IdentityRequestMessage, IdentityResponseMessage]);
|
|
1068
|
+
var RequiredDataRowSchema = zod.z.object({
|
|
1069
|
+
type: CredentialType,
|
|
1070
|
+
requiredAttributes: zod.z.array(zod.z.object({
|
|
1071
|
+
attribute: zod.z.string(),
|
|
1072
|
+
value: zod.z.string(),
|
|
1073
|
+
operator: zod.z.string()
|
|
1074
|
+
}))
|
|
1075
|
+
});
|
|
1076
|
+
var RequiredVerificationData = zod.z.object({
|
|
1077
|
+
ruleEngine: zod.z.object({
|
|
1078
|
+
requiredData: zod.z.array(RequiredDataRowSchema)
|
|
1079
|
+
}),
|
|
1080
|
+
PrivacyPreservingMonitoring: zod.z.object({
|
|
1081
|
+
requiredData: zod.z.array(RequiredDataRowSchema),
|
|
1082
|
+
verifications: zod.z.array(zod.z.object({
|
|
1083
|
+
scenarioVerifierAddress: zod.z.string(),
|
|
1084
|
+
conditions: zod.z.array(ZKPRequest)
|
|
1085
|
+
}))
|
|
1086
|
+
}),
|
|
1087
|
+
tfhe: zod.z.object({
|
|
1088
|
+
requiredData: zod.z.array(RequiredDataRowSchema),
|
|
1089
|
+
verifications: zod.z.array(QueryConfigSimplified)
|
|
1090
|
+
})
|
|
1091
|
+
});
|
|
1092
|
+
|
|
1093
|
+
var WalletSignatureResponse = zod.z.object({
|
|
1094
|
+
// the message we requested the user to sign
|
|
1095
|
+
message: zod.z.string(),
|
|
1096
|
+
// the signature of the message
|
|
1097
|
+
signature: vault_schema.BlockchainSignature,
|
|
1098
|
+
// some wallets like Cardano Nami generate a new address for each transaction or signature
|
|
1099
|
+
// this means we have to request the signer's public key to verify the signature
|
|
1100
|
+
signerPublicKey: vault_schema.PublicKey,
|
|
1101
|
+
// the type of the signer's public key
|
|
1102
|
+
// this is optional because some wallets don't provide this information
|
|
1103
|
+
// but for other wallets like cosmos kepler, this is required to verify the signature
|
|
1104
|
+
signerPublicKeyType: zod.z.string().optional(),
|
|
1105
|
+
// some wallets like Aptos Petra wrap the message in some text metadata before signing
|
|
1106
|
+
// this means the user doesn't sign the message directly, but a message that contains the original message
|
|
1107
|
+
signedMessage: zod.z.string()
|
|
1108
|
+
});
|
|
1109
|
+
var VerifyWalletChallengeRequest = WalletSignatureResponse.and(zod.z.object({
|
|
1110
|
+
address: vault_schema.BlockchainAddress,
|
|
1111
|
+
namespace: vault_schema.SupportedBlockchainNamespaceForSignatureAuth,
|
|
1112
|
+
blockchainId: vault_schema.BlockchainId.optional()
|
|
1113
|
+
}));
|
|
1114
|
+
|
|
1115
|
+
exports.ARRAY_OPERATORS = ARRAY_OPERATORS;
|
|
1116
|
+
exports.AUTHORIZATION_REQUEST_MESSAGE_TYPES = AUTHORIZATION_REQUEST_MESSAGE_TYPES;
|
|
1117
|
+
exports.AVAILABLE_FLOWS = AVAILABLE_FLOWS;
|
|
1118
|
+
exports.AbbreviatedWorkflowScenario = AbbreviatedWorkflowScenario;
|
|
1119
|
+
exports.AllCredentialValues = AllCredentialValues;
|
|
1120
|
+
exports.AllScenarioExecutionAuthorizationData = AllScenarioExecutionAuthorizationData;
|
|
1121
|
+
exports.AnyTxAuthDataSignatureResponse = AnyTxAuthDataSignatureResponse;
|
|
1122
|
+
exports.AnyTxAuthInputJsSdk = AnyTxAuthInputJsSdk;
|
|
1123
|
+
exports.ApiTezosTxAuthInput = ApiTezosTxAuthInput;
|
|
1124
|
+
exports.ApiTxAuthInput = ApiTxAuthInput;
|
|
1125
|
+
exports.ArrayOperator = ArrayOperator;
|
|
1126
|
+
exports.AuthQrCodeData = AuthQrCodeData;
|
|
1127
|
+
exports.AuthSession = AuthSession;
|
|
1128
|
+
exports.AuthSessionData = AuthSessionData;
|
|
1129
|
+
exports.AuthorizationRequestMessage = AuthorizationRequestMessage;
|
|
1130
|
+
exports.AuthorizationRequestMessageType = AuthorizationRequestMessageType;
|
|
1131
|
+
exports.AuthorizationRequestMessageTypes = AuthorizationRequestMessageTypes;
|
|
1132
|
+
exports.AuthorizationResponseMessage = AuthorizationResponseMessage;
|
|
1133
|
+
exports.AvailableFlow = AvailableFlow;
|
|
1134
|
+
exports.BOOLEAN_OPERATORS = BOOLEAN_OPERATORS;
|
|
1135
|
+
exports.BackwardsCompatibleScenarioType = BackwardsCompatibleScenarioType;
|
|
1136
|
+
exports.BackwardsCompatibleScenarioTypes = BackwardsCompatibleScenarioTypes;
|
|
1137
|
+
exports.BaseQueryResponse = BaseQueryResponse;
|
|
1138
|
+
exports.BasicCustomerContactInformation = BasicCustomerContactInformation;
|
|
1139
|
+
exports.BooleanOperator = BooleanOperator;
|
|
1140
|
+
exports.CIRCUIT_IDS = CIRCUIT_IDS;
|
|
1141
|
+
exports.CUSTOMERS_CHARTS = CUSTOMERS_CHARTS;
|
|
1142
|
+
exports.CUSTOMER_AUTOMATION_REASONS = CUSTOMER_AUTOMATION_REASONS;
|
|
1143
|
+
exports.CUSTOMER_TABLE_COLUMNS = CUSTOMER_TABLE_COLUMNS;
|
|
1144
|
+
exports.ChallengeQuerySchema = ChallengeQuerySchema;
|
|
1145
|
+
exports.ChallengeResponse = ChallengeResponse;
|
|
1146
|
+
exports.CircuitId = CircuitId;
|
|
1147
|
+
exports.CloseScreenNotification = CloseScreenNotification;
|
|
1148
|
+
exports.ComplianceImplementationStepsInput = ComplianceImplementationStepsInput;
|
|
1149
|
+
exports.CreateAuthRequestProps = CreateAuthRequestProps;
|
|
1150
|
+
exports.CreateTemplateScenario = CreateTemplateScenario;
|
|
1151
|
+
exports.CredentialMediaType = CredentialMediaType;
|
|
1152
|
+
exports.CredentialNames = CredentialNames;
|
|
1153
|
+
exports.CredentialQrCodeData = CredentialQrCodeData;
|
|
1154
|
+
exports.CredentialSchemas = CredentialSchemas;
|
|
1155
|
+
exports.CredentialType = CredentialType;
|
|
1156
|
+
exports.CredentialTypes = CredentialTypes;
|
|
1157
|
+
exports.CustomerOnboardingLevel = CustomerOnboardingLevel;
|
|
1158
|
+
exports.CustomerOnboardingLevels = CustomerOnboardingLevels;
|
|
1159
|
+
exports.CustomerStatus = CustomerStatus;
|
|
1160
|
+
exports.CustomerStatuses = CustomerStatuses;
|
|
1161
|
+
exports.CustomerTableColumn = CustomerTableColumn;
|
|
1162
|
+
exports.CustomerType = CustomerType;
|
|
1163
|
+
exports.CustomerTypes = CustomerTypes;
|
|
1164
|
+
exports.CustomersChartType = CustomersChartType;
|
|
1165
|
+
exports.DATE_OPERATORS = DATE_OPERATORS;
|
|
1166
|
+
exports.DataAvailableOnStart = DataAvailableOnStart;
|
|
1167
|
+
exports.DateOperator = DateOperator;
|
|
1168
|
+
exports.Eip155TxAuthInputJsSdk = Eip155TxAuthInputJsSdk;
|
|
1169
|
+
exports.ExecuteQueryResponse = ExecuteQueryResponse;
|
|
1170
|
+
exports.ExtendedTezosTxAuthDataSignatureResponse = ExtendedTezosTxAuthDataSignatureResponse;
|
|
1171
|
+
exports.ExtendedTezosTxAuthInput = ExtendedTezosTxAuthInput;
|
|
1172
|
+
exports.ExtendedTxAuthDataSignatureResponse = ExtendedTxAuthDataSignatureResponse;
|
|
1173
|
+
exports.ExtendedTxAuthInput = ExtendedTxAuthInput;
|
|
1174
|
+
exports.GenerateWalletChallengeRequest = GenerateWalletChallengeRequest;
|
|
1175
|
+
exports.GetCredentialsRequest = GetCredentialsRequest;
|
|
1176
|
+
exports.GetCredentialsResponse = GetCredentialsResponse;
|
|
1177
|
+
exports.GetCustomerStatusRequest = GetCustomerStatusRequest;
|
|
1178
|
+
exports.GetCustomerStatusResponse = GetCustomerStatusResponse;
|
|
1179
|
+
exports.GetTezosTxAuthDataSignatureResponse = GetTezosTxAuthDataSignatureResponse;
|
|
1180
|
+
exports.GetTxAuthDataSignatureResponse = GetTxAuthDataSignatureResponse;
|
|
1181
|
+
exports.GetTxAuthSigRequest = GetTxAuthSigRequest;
|
|
1182
|
+
exports.GetTxAuthSigRequestTezos = GetTxAuthSigRequestTezos;
|
|
1183
|
+
exports.GetTxAuthSigResponse = GetTxAuthSigResponse;
|
|
1184
|
+
exports.GetTxAuthSigResponseTezos = GetTxAuthSigResponseTezos;
|
|
1185
|
+
exports.HostMessage = HostMessage;
|
|
1186
|
+
exports.HostRequestMessage = HostRequestMessage;
|
|
1187
|
+
exports.HostResponseMessage = HostResponseMessage;
|
|
1188
|
+
exports.IDInformationTfhe = IDInformationTfhe;
|
|
1189
|
+
exports.IdentityAppMessage = IdentityAppMessage;
|
|
1190
|
+
exports.IdentityMessage = IdentityMessage;
|
|
1191
|
+
exports.IdentityNotificationMessage = IdentityNotificationMessage;
|
|
1192
|
+
exports.IdentityRequestMessage = IdentityRequestMessage;
|
|
1193
|
+
exports.IdentityResponseMessage = IdentityResponseMessage;
|
|
1194
|
+
exports.IdentitySdkMessage = IdentitySdkMessage;
|
|
1195
|
+
exports.IdentitySdkMessageWithIdentifier = IdentitySdkMessageWithIdentifier;
|
|
1196
|
+
exports.IdentityWallet = IdentityWallet;
|
|
1197
|
+
exports.InitialDataRequest = InitialDataRequest;
|
|
1198
|
+
exports.InitialDataResponse = InitialDataResponse;
|
|
1199
|
+
exports.IsVerifiedNotification = IsVerifiedNotification;
|
|
1200
|
+
exports.IsVerifiedRequest = IsVerifiedRequest;
|
|
1201
|
+
exports.IsVerifiedResponse = IsVerifiedResponse;
|
|
1202
|
+
exports.KybOnboardingLevel = KybOnboardingLevel;
|
|
1203
|
+
exports.KybOnboardingLevels = KybOnboardingLevels;
|
|
1204
|
+
exports.KycCompletionData = KycCompletionData;
|
|
1205
|
+
exports.KycCompletionNotification = KycCompletionNotification;
|
|
1206
|
+
exports.KycOnboardingLevel = KycOnboardingLevel;
|
|
1207
|
+
exports.KycOnboardingLevels = KycOnboardingLevels;
|
|
1208
|
+
exports.MediaType = MediaType;
|
|
1209
|
+
exports.MediaTypePID = MediaTypePID;
|
|
1210
|
+
exports.NUMERIC_OPERATORS = NUMERIC_OPERATORS;
|
|
1211
|
+
exports.NexeraCredentialType = NexeraCredentialType;
|
|
1212
|
+
exports.NumericOperator = NumericOperator;
|
|
1213
|
+
exports.OLD_CHALLENGE_QUERY_OPERATORS = OLD_CHALLENGE_QUERY_OPERATORS;
|
|
1214
|
+
exports.OLD_ChallengeQueryOperator = OLD_ChallengeQueryOperator;
|
|
1215
|
+
exports.OLD_ChallengeQueryOperatorToOperator = OLD_ChallengeQueryOperatorToOperator;
|
|
1216
|
+
exports.OLD_ChallengeQuerySchema = OLD_ChallengeQuerySchema;
|
|
1217
|
+
exports.OLD_QueryCredentialType = OLD_QueryCredentialType;
|
|
1218
|
+
exports.OLD_QueryCredentialTypes = OLD_QueryCredentialTypes;
|
|
1219
|
+
exports.OPERATORS = OPERATORS;
|
|
1220
|
+
exports.OcvSdkInitialized = OcvSdkInitialized;
|
|
1221
|
+
exports.OffChainScenarioExecutionData = OffChainScenarioExecutionData;
|
|
1222
|
+
exports.OffChainZKPRuleResult = OffChainZKPRuleResult;
|
|
1223
|
+
exports.OnChainScenarioExecutionData = OnChainScenarioExecutionData;
|
|
1224
|
+
exports.Operator = Operator;
|
|
1225
|
+
exports.OperatorMappings = OperatorMappings;
|
|
1226
|
+
exports.OperatorToOLD_ChallengeQueryOperator = OperatorToOLD_ChallengeQueryOperator;
|
|
1227
|
+
exports.PartialQueryConfigSimplified = PartialQueryConfigSimplified;
|
|
1228
|
+
exports.PolygonIdInitialized = PolygonIdInitialized;
|
|
1229
|
+
exports.PolygonIdRequest = PolygonIdRequest;
|
|
1230
|
+
exports.PolygonIdRequestData = PolygonIdRequestData;
|
|
1231
|
+
exports.PolygonIdResponse = PolygonIdResponse;
|
|
1232
|
+
exports.PolygonIdResponseData = PolygonIdResponseData;
|
|
1233
|
+
exports.PrivacyPreservingMonitoring = PrivacyPreservingMonitoring;
|
|
1234
|
+
exports.ProofData = ProofData;
|
|
1235
|
+
exports.QUERY_LOGIC_OPERATOR = QUERY_LOGIC_OPERATOR;
|
|
1236
|
+
exports.QrCodeLinkWithSchemaType = QrCodeLinkWithSchemaType;
|
|
1237
|
+
exports.QueriesOptions = QueriesOptions;
|
|
1238
|
+
exports.QueryConfigSimplified = QueryConfigSimplified;
|
|
1239
|
+
exports.QueryConfigTfhe = QueryConfigTfhe;
|
|
1240
|
+
exports.QueryCredentialType = QueryCredentialType;
|
|
1241
|
+
exports.QueryCredentialTypes = QueryCredentialTypes;
|
|
1242
|
+
exports.QueryLogicOperator = QueryLogicOperator;
|
|
1243
|
+
exports.QueryType = QueryType;
|
|
1244
|
+
exports.RequiredDataRowSchema = RequiredDataRowSchema;
|
|
1245
|
+
exports.RequiredVerificationData = RequiredVerificationData;
|
|
1246
|
+
exports.RiskScoreType = RiskScoreType;
|
|
1247
|
+
exports.RiskScoreTypes = RiskScoreTypes;
|
|
1248
|
+
exports.RuleEngineResponse = RuleEngineResponse;
|
|
1249
|
+
exports.RuleEngineScenarioExecutionData = RuleEngineScenarioExecutionData;
|
|
1250
|
+
exports.RuleResultQueryConfig = RuleResultQueryConfig;
|
|
1251
|
+
exports.RuleResultStatus = RuleResultStatus;
|
|
1252
|
+
exports.RuleResultStatusLabels = RuleResultStatusLabels;
|
|
1253
|
+
exports.RuleResultStatuses = RuleResultStatuses;
|
|
1254
|
+
exports.SCENARIO_AUTHORIZATION_STATUSES = SCENARIO_AUTHORIZATION_STATUSES;
|
|
1255
|
+
exports.STRING_OPERATORS = STRING_OPERATORS;
|
|
1256
|
+
exports.SUPPORTED_TYPES = SUPPORTED_TYPES;
|
|
1257
|
+
exports.Scenario = Scenario;
|
|
1258
|
+
exports.ScenarioAuthorizationData = ScenarioAuthorizationData;
|
|
1259
|
+
exports.ScenarioAuthorizationStatus = ScenarioAuthorizationStatus;
|
|
1260
|
+
exports.ScenarioExecutionData = ScenarioExecutionData;
|
|
1261
|
+
exports.ScenarioExecutionNotification = ScenarioExecutionNotification;
|
|
1262
|
+
exports.ScenarioExecutionResponse = ScenarioExecutionResponse;
|
|
1263
|
+
exports.ScenarioSchema = ScenarioSchema;
|
|
1264
|
+
exports.ScenarioStatus = ScenarioStatus;
|
|
1265
|
+
exports.ScenarioStatuses = ScenarioStatuses;
|
|
1266
|
+
exports.ScenarioType = ScenarioType;
|
|
1267
|
+
exports.ScenarioTypes = ScenarioTypes;
|
|
1268
|
+
exports.SdkVerificationOutput = SdkVerificationOutput;
|
|
1269
|
+
exports.SdkVerificationResponseSchema = SdkVerificationResponseSchema;
|
|
1270
|
+
exports.SendTransactionRequest = SendTransactionRequest;
|
|
1271
|
+
exports.SignatureRequest = SignatureRequest;
|
|
1272
|
+
exports.SignatureResponse = SignatureResponse;
|
|
1273
|
+
exports.SimplifiedCredential = SimplifiedCredential;
|
|
1274
|
+
exports.StartCompletedNotification = StartCompletedNotification;
|
|
1275
|
+
exports.StartFlowRequest = StartFlowRequest;
|
|
1276
|
+
exports.StringOperator = StringOperator;
|
|
1277
|
+
exports.SupportedType = SupportedType;
|
|
1278
|
+
exports.SupportedTypes = SupportedTypes;
|
|
1279
|
+
exports.TemplateScenario = TemplateScenario;
|
|
1280
|
+
exports.TezosTxAuthInput = TezosTxAuthInput;
|
|
1281
|
+
exports.TezosTxAuthInputJsSdk = TezosTxAuthInputJsSdk;
|
|
1282
|
+
exports.TezosTxSignatureResponse = TezosTxSignatureResponse;
|
|
1283
|
+
exports.TransactionData = TransactionData;
|
|
1284
|
+
exports.TransactionResponse = TransactionResponse;
|
|
1285
|
+
exports.TxAuthDataSignatureGatingError = TxAuthDataSignatureGatingError;
|
|
1286
|
+
exports.TxAuthDataSignatureGatingRequest = TxAuthDataSignatureGatingRequest;
|
|
1287
|
+
exports.TxAuthDataSignatureResponse = TxAuthDataSignatureResponse;
|
|
1288
|
+
exports.TxAuthInput = TxAuthInput;
|
|
1289
|
+
exports.TxSignatureResponse = TxSignatureResponse;
|
|
1290
|
+
exports.VerifiableCredential = VerifiableCredential;
|
|
1291
|
+
exports.VerificationOutput = VerificationOutput;
|
|
1292
|
+
exports.VerificationSessionStatus = VerificationSessionStatus;
|
|
1293
|
+
exports.VerificationSessionStatuses = VerificationSessionStatuses;
|
|
1294
|
+
exports.VerifyWalletChallengeRequest = VerifyWalletChallengeRequest;
|
|
1295
|
+
exports.WalletSignResponse = WalletSignResponse;
|
|
1296
|
+
exports.WalletSignatureResponse = WalletSignatureResponse;
|
|
1297
|
+
exports.ZKPOperator = ZKPOperator;
|
|
1298
|
+
exports.ZKPRequest = ZKPRequest;
|
|
1299
|
+
exports.ZKPRequestFromZKVerifier = ZKPRequestFromZKVerifier;
|
|
1300
|
+
exports.ZeroKnowledgeProofRequest = ZeroKnowledgeProofRequest;
|
|
1301
|
+
exports.ZeroKnowledgeProofResponse = ZeroKnowledgeProofResponse;
|
|
1302
|
+
exports.getCredentialName = getCredentialName;
|
|
1303
|
+
exports.getOldCredentialPath = getOldCredentialPath;
|
|
1304
|
+
exports.getOldCredentialType = getOldCredentialType;
|
|
1305
|
+
exports.oldCredentialPathToDataLink = oldCredentialPathToDataLink;
|
|
1306
|
+
exports.operatorDisplayMap = operatorDisplayMap;
|
|
1307
|
+
exports.parseIden3Message = parseIden3Message;
|
|
1308
|
+
exports.parseSessionIdFromUrl = parseSessionIdFromUrl;
|