@openid4vc/openid4vci 0.3.0-alpha-20250504132432 → 0.3.0-alpha-20250511115959
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.d.mts +26 -0
- package/dist/index.d.ts +26 -0
- package/package.json +3 -3
package/dist/index.d.mts
CHANGED
|
@@ -20979,26 +20979,52 @@ type JwtSignerDid = {
|
|
|
20979
20979
|
method: 'did';
|
|
20980
20980
|
didUrl: string;
|
|
20981
20981
|
alg: string;
|
|
20982
|
+
/**
|
|
20983
|
+
* The key id that should be used for signing. You need to make sure the kid actuall matches
|
|
20984
|
+
* with the key associated with the didUrl.
|
|
20985
|
+
*/
|
|
20986
|
+
kid?: string;
|
|
20982
20987
|
};
|
|
20983
20988
|
type JwtSignerJwk = {
|
|
20984
20989
|
method: 'jwk';
|
|
20985
20990
|
publicJwk: Jwk;
|
|
20986
20991
|
alg: string;
|
|
20992
|
+
/**
|
|
20993
|
+
* The key id that should be used for signing. You need to make sure the kid actuall matches
|
|
20994
|
+
* with the key associated with the jwk.
|
|
20995
|
+
*
|
|
20996
|
+
* If not provided the kid can also be extracted from the `publicJwk`. Providing it here means the `kid` won't
|
|
20997
|
+
* be included in the JWT header.
|
|
20998
|
+
*/
|
|
20999
|
+
kid?: string;
|
|
20987
21000
|
};
|
|
20988
21001
|
type JwtSignerX5c = {
|
|
20989
21002
|
method: 'x5c';
|
|
20990
21003
|
x5c: string[];
|
|
20991
21004
|
alg: string;
|
|
21005
|
+
/**
|
|
21006
|
+
* The key id that should be used for signing. You need to make sure the kid actuall matches
|
|
21007
|
+
* with the key associated with the leaf certificate.
|
|
21008
|
+
*/
|
|
21009
|
+
kid?: string;
|
|
20992
21010
|
};
|
|
20993
21011
|
type JwtSignerFederation = {
|
|
20994
21012
|
method: 'federation';
|
|
20995
21013
|
trustChain?: [string, ...string[]];
|
|
20996
21014
|
alg: string;
|
|
21015
|
+
/**
|
|
21016
|
+
* The key id that should be used for signing. You need to make sure the kid actuall matches
|
|
21017
|
+
* with a key present in the federation.
|
|
21018
|
+
*/
|
|
20997
21019
|
kid: string;
|
|
20998
21020
|
};
|
|
20999
21021
|
type JwtSignerCustom = {
|
|
21000
21022
|
method: 'custom';
|
|
21001
21023
|
alg: string;
|
|
21024
|
+
/**
|
|
21025
|
+
* The key id that should be used for signing.
|
|
21026
|
+
*/
|
|
21027
|
+
kid?: string;
|
|
21002
21028
|
};
|
|
21003
21029
|
type JwtSigner = JwtSignerDid | JwtSignerJwk | JwtSignerX5c | JwtSignerFederation | JwtSignerCustom;
|
|
21004
21030
|
type JweEncryptor = JwtSignerJwk & {
|
package/dist/index.d.ts
CHANGED
|
@@ -20979,26 +20979,52 @@ type JwtSignerDid = {
|
|
|
20979
20979
|
method: 'did';
|
|
20980
20980
|
didUrl: string;
|
|
20981
20981
|
alg: string;
|
|
20982
|
+
/**
|
|
20983
|
+
* The key id that should be used for signing. You need to make sure the kid actuall matches
|
|
20984
|
+
* with the key associated with the didUrl.
|
|
20985
|
+
*/
|
|
20986
|
+
kid?: string;
|
|
20982
20987
|
};
|
|
20983
20988
|
type JwtSignerJwk = {
|
|
20984
20989
|
method: 'jwk';
|
|
20985
20990
|
publicJwk: Jwk;
|
|
20986
20991
|
alg: string;
|
|
20992
|
+
/**
|
|
20993
|
+
* The key id that should be used for signing. You need to make sure the kid actuall matches
|
|
20994
|
+
* with the key associated with the jwk.
|
|
20995
|
+
*
|
|
20996
|
+
* If not provided the kid can also be extracted from the `publicJwk`. Providing it here means the `kid` won't
|
|
20997
|
+
* be included in the JWT header.
|
|
20998
|
+
*/
|
|
20999
|
+
kid?: string;
|
|
20987
21000
|
};
|
|
20988
21001
|
type JwtSignerX5c = {
|
|
20989
21002
|
method: 'x5c';
|
|
20990
21003
|
x5c: string[];
|
|
20991
21004
|
alg: string;
|
|
21005
|
+
/**
|
|
21006
|
+
* The key id that should be used for signing. You need to make sure the kid actuall matches
|
|
21007
|
+
* with the key associated with the leaf certificate.
|
|
21008
|
+
*/
|
|
21009
|
+
kid?: string;
|
|
20992
21010
|
};
|
|
20993
21011
|
type JwtSignerFederation = {
|
|
20994
21012
|
method: 'federation';
|
|
20995
21013
|
trustChain?: [string, ...string[]];
|
|
20996
21014
|
alg: string;
|
|
21015
|
+
/**
|
|
21016
|
+
* The key id that should be used for signing. You need to make sure the kid actuall matches
|
|
21017
|
+
* with a key present in the federation.
|
|
21018
|
+
*/
|
|
20997
21019
|
kid: string;
|
|
20998
21020
|
};
|
|
20999
21021
|
type JwtSignerCustom = {
|
|
21000
21022
|
method: 'custom';
|
|
21001
21023
|
alg: string;
|
|
21024
|
+
/**
|
|
21025
|
+
* The key id that should be used for signing.
|
|
21026
|
+
*/
|
|
21027
|
+
kid?: string;
|
|
21002
21028
|
};
|
|
21003
21029
|
type JwtSigner = JwtSignerDid | JwtSignerJwk | JwtSignerX5c | JwtSignerFederation | JwtSignerCustom;
|
|
21004
21030
|
type JweEncryptor = JwtSignerJwk & {
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@openid4vc/openid4vci",
|
|
3
|
-
"version": "0.3.0-alpha-
|
|
3
|
+
"version": "0.3.0-alpha-20250511115959",
|
|
4
4
|
"files": [
|
|
5
5
|
"dist"
|
|
6
6
|
],
|
|
@@ -21,8 +21,8 @@
|
|
|
21
21
|
},
|
|
22
22
|
"dependencies": {
|
|
23
23
|
"zod": "^3.24.2",
|
|
24
|
-
"@openid4vc/oauth2": "0.3.0-alpha-
|
|
25
|
-
"@openid4vc/utils": "0.3.0-alpha-
|
|
24
|
+
"@openid4vc/oauth2": "0.3.0-alpha-20250511115959",
|
|
25
|
+
"@openid4vc/utils": "0.3.0-alpha-20250511115959"
|
|
26
26
|
},
|
|
27
27
|
"devDependencies": {
|
|
28
28
|
"jose": "^6.0.10"
|