@pagopa/io-react-native-wallet 0.14.0 → 0.15.1
Sign up to get free protection for your applications and to get access to all the features.
- package/lib/commonjs/cie/manager.js +4 -4
- package/lib/commonjs/cie/manager.js.map +1 -1
- package/lib/commonjs/credential/issuance/04-complete-user-authorization.js +142 -21
- package/lib/commonjs/credential/issuance/04-complete-user-authorization.js.map +1 -1
- package/lib/commonjs/credential/issuance/07-verify-and-parse-credential.js +12 -4
- package/lib/commonjs/credential/issuance/07-verify-and-parse-credential.js.map +1 -1
- package/lib/commonjs/credential/issuance/index.js +14 -2
- package/lib/commonjs/credential/issuance/index.js.map +1 -1
- package/lib/commonjs/credential/issuance/types.js +9 -1
- package/lib/commonjs/credential/issuance/types.js.map +1 -1
- package/lib/commonjs/trust/types.js +5 -3
- package/lib/commonjs/trust/types.js.map +1 -1
- package/lib/commonjs/utils/decoder.js +28 -19
- package/lib/commonjs/utils/decoder.js.map +1 -1
- package/lib/module/cie/manager.js +4 -4
- package/lib/module/cie/manager.js.map +1 -1
- package/lib/module/credential/issuance/04-complete-user-authorization.js +140 -20
- package/lib/module/credential/issuance/04-complete-user-authorization.js.map +1 -1
- package/lib/module/credential/issuance/07-verify-and-parse-credential.js +12 -4
- package/lib/module/credential/issuance/07-verify-and-parse-credential.js.map +1 -1
- package/lib/module/credential/issuance/index.js +2 -2
- package/lib/module/credential/issuance/index.js.map +1 -1
- package/lib/module/credential/issuance/types.js +7 -0
- package/lib/module/credential/issuance/types.js.map +1 -1
- package/lib/module/trust/types.js +5 -3
- package/lib/module/trust/types.js.map +1 -1
- package/lib/module/utils/decoder.js +28 -19
- package/lib/module/utils/decoder.js.map +1 -1
- package/lib/typescript/credential/issuance/04-complete-user-authorization.d.ts +48 -6
- package/lib/typescript/credential/issuance/04-complete-user-authorization.d.ts.map +1 -1
- package/lib/typescript/credential/issuance/07-verify-and-parse-credential.d.ts +1 -0
- package/lib/typescript/credential/issuance/07-verify-and-parse-credential.d.ts.map +1 -1
- package/lib/typescript/credential/issuance/index.d.ts +3 -3
- package/lib/typescript/credential/issuance/index.d.ts.map +1 -1
- package/lib/typescript/credential/issuance/types.d.ts +10 -0
- package/lib/typescript/credential/issuance/types.d.ts.map +1 -1
- package/lib/typescript/trust/index.d.ts +14 -14
- package/lib/typescript/trust/types.d.ts +142 -142
- package/lib/typescript/trust/types.d.ts.map +1 -1
- package/lib/typescript/utils/decoder.d.ts.map +1 -1
- package/package.json +1 -1
- package/src/cie/manager.ts +4 -4
- package/src/credential/issuance/04-complete-user-authorization.ts +212 -20
- package/src/credential/issuance/07-verify-and-parse-credential.ts +14 -6
- package/src/credential/issuance/index.ts +10 -2
- package/src/credential/issuance/types.ts +7 -0
- package/src/trust/types.ts +8 -6
- package/src/utils/decoder.ts +28 -19
@@ -2,10 +2,20 @@ import { type AuthorizationContext, type AuthorizationResult } from "../../utils
|
|
2
2
|
import { type Out } from "../../utils/misc";
|
3
3
|
import type { StartUserAuthorization } from "./03-start-user-authorization";
|
4
4
|
import type { EvaluateIssuerTrust } from "./02-evaluate-issuer-trust";
|
5
|
+
import { type CryptoContext } from "@pagopa/io-react-native-jwt";
|
6
|
+
import { RequestObject } from "../presentation/types";
|
5
7
|
/**
|
6
8
|
* The interface of the phase to complete User authorization via strong identification when the response mode is "query" and the request credential is a PersonIdentificationData.
|
7
9
|
*/
|
8
10
|
export type CompleteUserAuthorizationWithQueryMode = (issuerRequestUri: Out<StartUserAuthorization>["issuerRequestUri"], clientId: Out<StartUserAuthorization>["clientId"], issuerConf: Out<EvaluateIssuerTrust>["issuerConf"], idpHint: string, redirectUri: string, authorizationContext?: AuthorizationContext) => Promise<AuthorizationResult>;
|
11
|
+
export type CompleteUserAuthorizationWithFormPostJwtMode = (requestObject: Out<GetRequestedCredentialToBePresented>, context: {
|
12
|
+
wiaCryptoContext: CryptoContext;
|
13
|
+
pidCryptoContext: CryptoContext;
|
14
|
+
pid: string;
|
15
|
+
walletInstanceAttestation: string;
|
16
|
+
appFetch?: GlobalFetch["fetch"];
|
17
|
+
}) => Promise<AuthorizationResult>;
|
18
|
+
export type GetRequestedCredentialToBePresented = (issuerRequestUri: Out<StartUserAuthorization>["issuerRequestUri"], clientId: Out<StartUserAuthorization>["clientId"], issuerConf: Out<EvaluateIssuerTrust>["issuerConf"], appFetch?: GlobalFetch["fetch"]) => Promise<RequestObject>;
|
9
19
|
/**
|
10
20
|
* WARNING: This function must be called after {@link startUserAuthorization}. The next function to be called is {@link authorizeAccess}.
|
11
21
|
* The interface of the phase to complete User authorization via strong identification when the response mode is "query" and the request credential is a PersonIdentificationData.
|
@@ -24,10 +34,42 @@ export type CompleteUserAuthorizationWithQueryMode = (issuerRequestUri: Out<Star
|
|
24
34
|
* @returns the authorization response which contains code, state and iss
|
25
35
|
*/
|
26
36
|
export declare const completeUserAuthorizationWithQueryMode: CompleteUserAuthorizationWithQueryMode;
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
37
|
+
/**
|
38
|
+
* WARNING: This function must be called after {@link startUserAuthorization}. The next function to be called is {@link completeUserAuthorizationWithFormPostJwtMode}.
|
39
|
+
* The interface of the phase to complete User authorization via presentation of existing credentials when the response mode is "form_post.jwt".
|
40
|
+
* It is used as a first step to complete the user authorization by obtaining the requested credential to be presented from the authorization server.
|
41
|
+
* The information is obtained by performing a GET request to the authorization endpoint with request_uri and client_id parameters.
|
42
|
+
* @param issuerRequestUri the URI of the issuer where the request is sent
|
43
|
+
* @param clientId Identifies the current client across all the requests of the issuing flow returned by {@link startUserAuthorization}
|
44
|
+
* @param issuerConf The issuer configuration returned by {@link evaluateIssuerTrust}
|
45
|
+
* @param appFetch (optional) fetch api implementation. Default: built-in fetch
|
46
|
+
* @throws {ValidationFailed} if an error while validating the response
|
47
|
+
* @returns the request object which contains the credential to be presented in order to obtain the requested credential
|
48
|
+
*/
|
49
|
+
export declare const getRequestedCredentialToBePresented: GetRequestedCredentialToBePresented;
|
50
|
+
/**
|
51
|
+
* WARNING: This function must be called after {@link startUserAuthorization}. The next function to be called is {@link completeUserAuthorizationWithFormPostJwtMode}.
|
52
|
+
* The interface of the phase to complete User authorization via presentation of existing credentials when the response mode is "form_post.jwt".
|
53
|
+
* It is used as a first step to complete the user authorization by obtaining the requested credential to be presented from the authorization server.
|
54
|
+
* The information is obtained by performing a GET request to the authorization endpoint with request_uri and client_id parameters.
|
55
|
+
* @param issuerRequestUri the URI of the issuer where the request is sent
|
56
|
+
* @param clientId Identifies the current client across all the requests of the issuing flow returned by {@link startUserAuthorization}
|
57
|
+
* @param issuerConf The issuer configuration returned by {@link evaluateIssuerTrust}
|
58
|
+
* @param context.walletInstanceAccestation the Wallet Instance's attestation to be presented
|
59
|
+
* @param context.pid the PID to be presented
|
60
|
+
* @param context.wiaCryptoContext The Wallet Instance's crypto context associated with the walletInstanceAttestation parameter
|
61
|
+
* @param context.pidCryptoContext The PID crypto context associated with the pid parameter
|
62
|
+
* @param context.appFetch (optional) fetch api implementation. Default: built-in fetch
|
63
|
+
* @throws {ValidationFailed} if an error while validating the response
|
64
|
+
* @returns the authorization response which contains code, state and iss
|
65
|
+
*/
|
66
|
+
export declare const completeUserAuthorizationWithFormPostJwtMode: CompleteUserAuthorizationWithFormPostJwtMode;
|
67
|
+
/**
|
68
|
+
* Parse the authorization response and return the result which contains code, state and iss.
|
69
|
+
* @throws {AuthorizationError} if an error occurs during the parsing process
|
70
|
+
* @throws {AuthorizationIdpError} if an error occurs during the parsing process and the error is related to the IDP
|
71
|
+
* @param authRes the authorization response to be parsed
|
72
|
+
* @returns the authorization result which contains code, state and iss
|
73
|
+
*/
|
74
|
+
export declare const parseAuthroizationResponse: (authRes: unknown) => AuthorizationResult;
|
33
75
|
//# sourceMappingURL=04-complete-user-authorization.d.ts.map
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"04-complete-user-authorization.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/04-complete-user-authorization.ts"],"names":[],"mappings":"AAAA,OAAO,EAGL,KAAK,oBAAoB,EACzB,KAAK,mBAAmB,EACzB,MAAM,kBAAkB,CAAC;AAC1B,OAAO,
|
1
|
+
{"version":3,"file":"04-complete-user-authorization.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/04-complete-user-authorization.ts"],"names":[],"mappings":"AAAA,OAAO,EAGL,KAAK,oBAAoB,EACzB,KAAK,mBAAmB,EACzB,MAAM,kBAAkB,CAAC;AAC1B,OAAO,EAAoB,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC9D,OAAO,KAAK,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AAO5E,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AAEtE,OAAO,EAIL,KAAK,aAAa,EACnB,MAAM,6BAA6B,CAAC;AACrC,OAAO,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAKtD;;GAEG;AACH,MAAM,MAAM,sCAAsC,GAAG,CACnD,gBAAgB,EAAE,GAAG,CAAC,sBAAsB,CAAC,CAAC,kBAAkB,CAAC,EACjE,QAAQ,EAAE,GAAG,CAAC,sBAAsB,CAAC,CAAC,UAAU,CAAC,EACjD,UAAU,EAAE,GAAG,CAAC,mBAAmB,CAAC,CAAC,YAAY,CAAC,EAClD,OAAO,EAAE,MAAM,EACf,WAAW,EAAE,MAAM,EACnB,oBAAoB,CAAC,EAAE,oBAAoB,KACxC,OAAO,CAAC,mBAAmB,CAAC,CAAC;AAElC,MAAM,MAAM,4CAA4C,GAAG,CACzD,aAAa,EAAE,GAAG,CAAC,mCAAmC,CAAC,EACvD,OAAO,EAAE;IACP,gBAAgB,EAAE,aAAa,CAAC;IAChC,gBAAgB,EAAE,aAAa,CAAC;IAChC,GAAG,EAAE,MAAM,CAAC;IACZ,yBAAyB,EAAE,MAAM,CAAC;IAClC,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;CACjC,KACE,OAAO,CAAC,mBAAmB,CAAC,CAAC;AAElC,MAAM,MAAM,mCAAmC,GAAG,CAChD,gBAAgB,EAAE,GAAG,CAAC,sBAAsB,CAAC,CAAC,kBAAkB,CAAC,EACjE,QAAQ,EAAE,GAAG,CAAC,sBAAsB,CAAC,CAAC,UAAU,CAAC,EACjD,UAAU,EAAE,GAAG,CAAC,mBAAmB,CAAC,CAAC,YAAY,CAAC,EAClD,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,KAC5B,OAAO,CAAC,aAAa,CAAC,CAAC;AAE5B;;;;;;;;;;;;;;;;GAgBG;AACH,eAAO,MAAM,sCAAsC,EAAE,sCAsDlD,CAAC;AAEJ;;;;;;;;;;;GAWG;AACH,eAAO,MAAM,mCAAmC,EAAE,mCAyB/C,CAAC;AAEJ;;;;;;;;;;;;;;;GAeG;AACH,eAAO,MAAM,4CAA4C,EAAE,4CAuGxD,CAAC;AAEJ;;;;;;GAMG;AACH,eAAO,MAAM,0BAA0B,YAC5B,OAAO,KACf,mBAaF,CAAC"}
|
@@ -4,6 +4,7 @@ import type { CryptoContext } from "@pagopa/io-react-native-jwt";
|
|
4
4
|
import type { ObtainCredential } from "./06-obtain-credential";
|
5
5
|
export type VerifyAndParseCredential = (issuerConf: Out<EvaluateIssuerTrust>["issuerConf"], credential: Out<ObtainCredential>["credential"], format: Out<ObtainCredential>["format"], context: {
|
6
6
|
credentialCryptoContext: CryptoContext;
|
7
|
+
ignoreMissingAttributes?: boolean;
|
7
8
|
}) => Promise<{
|
8
9
|
parsedCredential: ParsedCredential;
|
9
10
|
}>;
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"07-verify-and-parse-credential.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/07-verify-and-parse-credential.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AAKtE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AACjE,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,wBAAwB,CAAC;AAE/D,MAAM,MAAM,wBAAwB,GAAG,CACrC,UAAU,EAAE,GAAG,CAAC,mBAAmB,CAAC,CAAC,YAAY,CAAC,EAClD,UAAU,EAAE,GAAG,CAAC,gBAAgB,CAAC,CAAC,YAAY,CAAC,EAC/C,MAAM,EAAE,GAAG,CAAC,gBAAgB,CAAC,CAAC,QAAQ,CAAC,EACvC,OAAO,EAAE;IACP,uBAAuB,EAAE,aAAa,CAAC;
|
1
|
+
{"version":3,"file":"07-verify-and-parse-credential.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/07-verify-and-parse-credential.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AAKtE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AACjE,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,wBAAwB,CAAC;AAE/D,MAAM,MAAM,wBAAwB,GAAG,CACrC,UAAU,EAAE,GAAG,CAAC,mBAAmB,CAAC,CAAC,YAAY,CAAC,EAClD,UAAU,EAAE,GAAG,CAAC,gBAAgB,CAAC,CAAC,YAAY,CAAC,EAC/C,MAAM,EAAE,GAAG,CAAC,gBAAgB,CAAC,CAAC,QAAQ,CAAC,EACvC,OAAO,EAAE;IACP,uBAAuB,EAAE,aAAa,CAAC;IACvC,uBAAuB,CAAC,EAAE,OAAO,CAAC;CACnC,KACE,OAAO,CAAC;IAAE,gBAAgB,EAAE,gBAAgB,CAAA;CAAE,CAAC,CAAC;AAGrD,KAAK,gBAAgB,GAAG,MAAM;AAC5B,oBAAoB;AACpB,MAAM,EACN;IACE,2CAA2C;IAC3C,IAAI,EACA,yBAAyB,CAAC,MAAM,CAC9B,MAAM,EACN,MAAM,CACP,GACD,4BAA4B,CAAC,MAAM,GACnC,SAAS,CAAC;IACd,wCAAwC;IACxC,KAAK,EAAE,OAAO,CAAC;CAChB,CACF,CAAC;AAgKF;;;;;;;;;;GAUG;AACH,eAAO,MAAM,wBAAwB,EAAE,wBAgBtC,CAAC"}
|
@@ -1,10 +1,10 @@
|
|
1
1
|
import { type StartFlow } from "./01-start-flow";
|
2
2
|
import { evaluateIssuerTrust, type EvaluateIssuerTrust } from "./02-evaluate-issuer-trust";
|
3
3
|
import { startUserAuthorization, type StartUserAuthorization } from "./03-start-user-authorization";
|
4
|
-
import { completeUserAuthorizationWithQueryMode,
|
4
|
+
import { completeUserAuthorizationWithQueryMode, completeUserAuthorizationWithFormPostJwtMode, parseAuthroizationResponse, type CompleteUserAuthorizationWithQueryMode, type CompleteUserAuthorizationWithFormPostJwtMode, type GetRequestedCredentialToBePresented, getRequestedCredentialToBePresented } from "./04-complete-user-authorization";
|
5
5
|
import { authorizeAccess, type AuthorizeAccess } from "./05-authorize-access";
|
6
6
|
import { obtainCredential, type ObtainCredential } from "./06-obtain-credential";
|
7
7
|
import { verifyAndParseCredential, type VerifyAndParseCredential } from "./07-verify-and-parse-credential";
|
8
|
-
export { evaluateIssuerTrust, startUserAuthorization, completeUserAuthorizationWithQueryMode, authorizeAccess, obtainCredential, verifyAndParseCredential,
|
9
|
-
export type { StartFlow, EvaluateIssuerTrust, StartUserAuthorization, CompleteUserAuthorizationWithQueryMode, AuthorizeAccess, ObtainCredential, VerifyAndParseCredential, };
|
8
|
+
export { evaluateIssuerTrust, startUserAuthorization, completeUserAuthorizationWithQueryMode, getRequestedCredentialToBePresented, completeUserAuthorizationWithFormPostJwtMode, authorizeAccess, obtainCredential, verifyAndParseCredential, parseAuthroizationResponse, };
|
9
|
+
export type { StartFlow, EvaluateIssuerTrust, StartUserAuthorization, CompleteUserAuthorizationWithQueryMode, GetRequestedCredentialToBePresented, CompleteUserAuthorizationWithFormPostJwtMode, AuthorizeAccess, ObtainCredential, VerifyAndParseCredential, };
|
10
10
|
//# sourceMappingURL=index.d.ts.map
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,iBAAiB,CAAC;AACjD,OAAO,EACL,mBAAmB,EACnB,KAAK,mBAAmB,EACzB,MAAM,4BAA4B,CAAC;AACpC,OAAO,EACL,sBAAsB,EACtB,KAAK,sBAAsB,EAC5B,MAAM,+BAA+B,CAAC;AACvC,OAAO,EACL,sCAAsC,EACtC,
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,iBAAiB,CAAC;AACjD,OAAO,EACL,mBAAmB,EACnB,KAAK,mBAAmB,EACzB,MAAM,4BAA4B,CAAC;AACpC,OAAO,EACL,sBAAsB,EACtB,KAAK,sBAAsB,EAC5B,MAAM,+BAA+B,CAAC;AACvC,OAAO,EACL,sCAAsC,EACtC,4CAA4C,EAC5C,0BAA0B,EAC1B,KAAK,sCAAsC,EAC3C,KAAK,4CAA4C,EACjD,KAAK,mCAAmC,EACxC,mCAAmC,EACpC,MAAM,kCAAkC,CAAC;AAC1C,OAAO,EAAE,eAAe,EAAE,KAAK,eAAe,EAAE,MAAM,uBAAuB,CAAC;AAC9E,OAAO,EACL,gBAAgB,EAChB,KAAK,gBAAgB,EACtB,MAAM,wBAAwB,CAAC;AAChC,OAAO,EACL,wBAAwB,EACxB,KAAK,wBAAwB,EAC9B,MAAM,kCAAkC,CAAC;AAE1C,OAAO,EACL,mBAAmB,EACnB,sBAAsB,EACtB,sCAAsC,EACtC,mCAAmC,EACnC,4CAA4C,EAC5C,eAAe,EACf,gBAAgB,EAChB,wBAAwB,EACxB,0BAA0B,GAC3B,CAAC;AACF,YAAY,EACV,SAAS,EACT,mBAAmB,EACnB,sBAAsB,EACtB,sCAAsC,EACtC,mCAAmC,EACnC,4CAA4C,EAC5C,eAAe,EACf,gBAAgB,EAChB,wBAAwB,GACzB,CAAC"}
|
@@ -59,5 +59,15 @@ export declare const CredentialResponse: z.ZodObject<{
|
|
59
59
|
c_nonce_expires_in: number;
|
60
60
|
credential: string;
|
61
61
|
}>;
|
62
|
+
/**
|
63
|
+
* Shape from parsing a response given by a request uri during the EAA credential issuance flow with response mode "form_post.jwt".
|
64
|
+
*/
|
65
|
+
export declare const ResponseUriResultShape: z.ZodObject<{
|
66
|
+
redirect_uri: z.ZodString;
|
67
|
+
}, "strip", z.ZodTypeAny, {
|
68
|
+
redirect_uri: string;
|
69
|
+
}, {
|
70
|
+
redirect_uri: string;
|
71
|
+
}>;
|
62
72
|
export type ResponseMode = "query" | "form_post.jwt";
|
63
73
|
//# sourceMappingURL=types.d.ts.map
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/types.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAGzB,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAE1D,eAAO,MAAM,aAAa;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAOxB,CAAC;AAEH,MAAM,MAAM,kBAAkB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,kBAAkB,CAAC,CAAC;AAEpE,eAAO,MAAM,kBAAkB;;;;;;;;;;;;;;;EAK7B,CAAC;AAEH,MAAM,MAAM,YAAY,GAAG,OAAO,GAAG,eAAe,CAAC"}
|
1
|
+
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/types.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAGzB,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAE1D,eAAO,MAAM,aAAa;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAOxB,CAAC;AAEH,MAAM,MAAM,kBAAkB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,kBAAkB,CAAC,CAAC;AAEpE,eAAO,MAAM,kBAAkB;;;;;;;;;;;;;;;EAK7B,CAAC;AAEH;;GAEG;AACH,eAAO,MAAM,sBAAsB;;;;;;EAEjC,CAAC;AAEH,MAAM,MAAM,YAAY,GAAG,OAAO,GAAG,eAAe,CAAC"}
|
@@ -276,10 +276,10 @@ export declare const getCredentialIssuerEntityConfiguration: (entityBaseUrl: Par
|
|
276
276
|
display: {
|
277
277
|
name: string;
|
278
278
|
locale: string;
|
279
|
-
logo
|
279
|
+
logo?: {
|
280
280
|
url: string;
|
281
281
|
alt_text: string;
|
282
|
-
};
|
282
|
+
} | undefined;
|
283
283
|
}[];
|
284
284
|
credential_issuer: string;
|
285
285
|
credential_endpoint: string;
|
@@ -298,15 +298,15 @@ export declare const getCredentialIssuerEntityConfiguration: (entityBaseUrl: Par
|
|
298
298
|
}[];
|
299
299
|
format: "vc+sd-jwt" | "vc+mdoc-cbor";
|
300
300
|
scope: string;
|
301
|
-
|
301
|
+
cryptographic_binding_methods_supported: string[];
|
302
|
+
credential_signing_alg_values_supported: string[];
|
303
|
+
claims?: Record<string, {
|
302
304
|
value_type: string;
|
303
305
|
display: {
|
304
306
|
name: string;
|
305
307
|
locale: string;
|
306
308
|
}[];
|
307
|
-
}
|
308
|
-
cryptographic_binding_methods_supported: string[];
|
309
|
-
credential_signing_alg_values_supported: string[];
|
309
|
+
}> | undefined;
|
310
310
|
}>;
|
311
311
|
};
|
312
312
|
oauth_authorization_server: {
|
@@ -357,7 +357,7 @@ export declare const getCredentialIssuerEntityConfiguration: (entityBaseUrl: Par
|
|
357
357
|
response_types_supported?: string[] | undefined;
|
358
358
|
subject_types_supported?: string[] | undefined;
|
359
359
|
};
|
360
|
-
|
360
|
+
wallet_relying_party?: {
|
361
361
|
jwks: {
|
362
362
|
keys: {
|
363
363
|
kty: "RSA" | "EC";
|
@@ -726,10 +726,10 @@ export declare const getEntityConfiguration: (entityBaseUrl: Parameters<typeof f
|
|
726
726
|
display: {
|
727
727
|
name: string;
|
728
728
|
locale: string;
|
729
|
-
logo
|
729
|
+
logo?: {
|
730
730
|
url: string;
|
731
731
|
alt_text: string;
|
732
|
-
};
|
732
|
+
} | undefined;
|
733
733
|
}[];
|
734
734
|
credential_issuer: string;
|
735
735
|
credential_endpoint: string;
|
@@ -748,15 +748,15 @@ export declare const getEntityConfiguration: (entityBaseUrl: Parameters<typeof f
|
|
748
748
|
}[];
|
749
749
|
format: "vc+sd-jwt" | "vc+mdoc-cbor";
|
750
750
|
scope: string;
|
751
|
-
|
751
|
+
cryptographic_binding_methods_supported: string[];
|
752
|
+
credential_signing_alg_values_supported: string[];
|
753
|
+
claims?: Record<string, {
|
752
754
|
value_type: string;
|
753
755
|
display: {
|
754
756
|
name: string;
|
755
757
|
locale: string;
|
756
758
|
}[];
|
757
|
-
}
|
758
|
-
cryptographic_binding_methods_supported: string[];
|
759
|
-
credential_signing_alg_values_supported: string[];
|
759
|
+
}> | undefined;
|
760
760
|
}>;
|
761
761
|
};
|
762
762
|
oauth_authorization_server: {
|
@@ -807,7 +807,7 @@ export declare const getEntityConfiguration: (entityBaseUrl: Parameters<typeof f
|
|
807
807
|
response_types_supported?: string[] | undefined;
|
808
808
|
subject_types_supported?: string[] | undefined;
|
809
809
|
};
|
810
|
-
|
810
|
+
wallet_relying_party?: {
|
811
811
|
jwks: {
|
812
812
|
keys: {
|
813
813
|
kty: "RSA" | "EC";
|