@pagopa/io-react-native-wallet 0.14.0 → 0.15.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/commonjs/cie/manager.js +4 -4
- package/lib/commonjs/cie/manager.js.map +1 -1
- package/lib/commonjs/credential/issuance/04-complete-user-authorization.js +142 -21
- package/lib/commonjs/credential/issuance/04-complete-user-authorization.js.map +1 -1
- package/lib/commonjs/credential/issuance/07-verify-and-parse-credential.js +12 -4
- package/lib/commonjs/credential/issuance/07-verify-and-parse-credential.js.map +1 -1
- package/lib/commonjs/credential/issuance/index.js +14 -2
- package/lib/commonjs/credential/issuance/index.js.map +1 -1
- package/lib/commonjs/credential/issuance/types.js +9 -1
- package/lib/commonjs/credential/issuance/types.js.map +1 -1
- package/lib/commonjs/trust/types.js +5 -3
- package/lib/commonjs/trust/types.js.map +1 -1
- package/lib/commonjs/utils/decoder.js +28 -19
- package/lib/commonjs/utils/decoder.js.map +1 -1
- package/lib/module/cie/manager.js +4 -4
- package/lib/module/cie/manager.js.map +1 -1
- package/lib/module/credential/issuance/04-complete-user-authorization.js +140 -20
- package/lib/module/credential/issuance/04-complete-user-authorization.js.map +1 -1
- package/lib/module/credential/issuance/07-verify-and-parse-credential.js +12 -4
- package/lib/module/credential/issuance/07-verify-and-parse-credential.js.map +1 -1
- package/lib/module/credential/issuance/index.js +2 -2
- package/lib/module/credential/issuance/index.js.map +1 -1
- package/lib/module/credential/issuance/types.js +7 -0
- package/lib/module/credential/issuance/types.js.map +1 -1
- package/lib/module/trust/types.js +5 -3
- package/lib/module/trust/types.js.map +1 -1
- package/lib/module/utils/decoder.js +28 -19
- package/lib/module/utils/decoder.js.map +1 -1
- package/lib/typescript/credential/issuance/04-complete-user-authorization.d.ts +48 -6
- package/lib/typescript/credential/issuance/04-complete-user-authorization.d.ts.map +1 -1
- package/lib/typescript/credential/issuance/07-verify-and-parse-credential.d.ts +1 -0
- package/lib/typescript/credential/issuance/07-verify-and-parse-credential.d.ts.map +1 -1
- package/lib/typescript/credential/issuance/index.d.ts +3 -3
- package/lib/typescript/credential/issuance/index.d.ts.map +1 -1
- package/lib/typescript/credential/issuance/types.d.ts +10 -0
- package/lib/typescript/credential/issuance/types.d.ts.map +1 -1
- package/lib/typescript/trust/index.d.ts +14 -14
- package/lib/typescript/trust/types.d.ts +142 -142
- package/lib/typescript/trust/types.d.ts.map +1 -1
- package/lib/typescript/utils/decoder.d.ts.map +1 -1
- package/package.json +1 -1
- package/src/cie/manager.ts +4 -4
- package/src/credential/issuance/04-complete-user-authorization.ts +212 -20
- package/src/credential/issuance/07-verify-and-parse-credential.ts +14 -6
- package/src/credential/issuance/index.ts +10 -2
- package/src/credential/issuance/types.ts +7 -0
- package/src/trust/types.ts +8 -6
- package/src/utils/decoder.ts +28 -19
@@ -2,10 +2,20 @@ import { type AuthorizationContext, type AuthorizationResult } from "../../utils
|
|
2
2
|
import { type Out } from "../../utils/misc";
|
3
3
|
import type { StartUserAuthorization } from "./03-start-user-authorization";
|
4
4
|
import type { EvaluateIssuerTrust } from "./02-evaluate-issuer-trust";
|
5
|
+
import { type CryptoContext } from "@pagopa/io-react-native-jwt";
|
6
|
+
import { RequestObject } from "../presentation/types";
|
5
7
|
/**
|
6
8
|
* The interface of the phase to complete User authorization via strong identification when the response mode is "query" and the request credential is a PersonIdentificationData.
|
7
9
|
*/
|
8
10
|
export type CompleteUserAuthorizationWithQueryMode = (issuerRequestUri: Out<StartUserAuthorization>["issuerRequestUri"], clientId: Out<StartUserAuthorization>["clientId"], issuerConf: Out<EvaluateIssuerTrust>["issuerConf"], idpHint: string, redirectUri: string, authorizationContext?: AuthorizationContext) => Promise<AuthorizationResult>;
|
11
|
+
export type CompleteUserAuthorizationWithFormPostJwtMode = (requestObject: Out<GetRequestedCredentialToBePresented>, context: {
|
12
|
+
wiaCryptoContext: CryptoContext;
|
13
|
+
pidCryptoContext: CryptoContext;
|
14
|
+
pid: string;
|
15
|
+
walletInstanceAttestation: string;
|
16
|
+
appFetch?: GlobalFetch["fetch"];
|
17
|
+
}) => Promise<AuthorizationResult>;
|
18
|
+
export type GetRequestedCredentialToBePresented = (issuerRequestUri: Out<StartUserAuthorization>["issuerRequestUri"], clientId: Out<StartUserAuthorization>["clientId"], issuerConf: Out<EvaluateIssuerTrust>["issuerConf"], appFetch?: GlobalFetch["fetch"]) => Promise<RequestObject>;
|
9
19
|
/**
|
10
20
|
* WARNING: This function must be called after {@link startUserAuthorization}. The next function to be called is {@link authorizeAccess}.
|
11
21
|
* The interface of the phase to complete User authorization via strong identification when the response mode is "query" and the request credential is a PersonIdentificationData.
|
@@ -24,10 +34,42 @@ export type CompleteUserAuthorizationWithQueryMode = (issuerRequestUri: Out<Star
|
|
24
34
|
* @returns the authorization response which contains code, state and iss
|
25
35
|
*/
|
26
36
|
export declare const completeUserAuthorizationWithQueryMode: CompleteUserAuthorizationWithQueryMode;
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
37
|
+
/**
|
38
|
+
* WARNING: This function must be called after {@link startUserAuthorization}. The next function to be called is {@link completeUserAuthorizationWithFormPostJwtMode}.
|
39
|
+
* The interface of the phase to complete User authorization via presentation of existing credentials when the response mode is "form_post.jwt".
|
40
|
+
* It is used as a first step to complete the user authorization by obtaining the requested credential to be presented from the authorization server.
|
41
|
+
* The information is obtained by performing a GET request to the authorization endpoint with request_uri and client_id parameters.
|
42
|
+
* @param issuerRequestUri the URI of the issuer where the request is sent
|
43
|
+
* @param clientId Identifies the current client across all the requests of the issuing flow returned by {@link startUserAuthorization}
|
44
|
+
* @param issuerConf The issuer configuration returned by {@link evaluateIssuerTrust}
|
45
|
+
* @param appFetch (optional) fetch api implementation. Default: built-in fetch
|
46
|
+
* @throws {ValidationFailed} if an error while validating the response
|
47
|
+
* @returns the request object which contains the credential to be presented in order to obtain the requested credential
|
48
|
+
*/
|
49
|
+
export declare const getRequestedCredentialToBePresented: GetRequestedCredentialToBePresented;
|
50
|
+
/**
|
51
|
+
* WARNING: This function must be called after {@link startUserAuthorization}. The next function to be called is {@link completeUserAuthorizationWithFormPostJwtMode}.
|
52
|
+
* The interface of the phase to complete User authorization via presentation of existing credentials when the response mode is "form_post.jwt".
|
53
|
+
* It is used as a first step to complete the user authorization by obtaining the requested credential to be presented from the authorization server.
|
54
|
+
* The information is obtained by performing a GET request to the authorization endpoint with request_uri and client_id parameters.
|
55
|
+
* @param issuerRequestUri the URI of the issuer where the request is sent
|
56
|
+
* @param clientId Identifies the current client across all the requests of the issuing flow returned by {@link startUserAuthorization}
|
57
|
+
* @param issuerConf The issuer configuration returned by {@link evaluateIssuerTrust}
|
58
|
+
* @param context.walletInstanceAccestation the Wallet Instance's attestation to be presented
|
59
|
+
* @param context.pid the PID to be presented
|
60
|
+
* @param context.wiaCryptoContext The Wallet Instance's crypto context associated with the walletInstanceAttestation parameter
|
61
|
+
* @param context.pidCryptoContext The PID crypto context associated with the pid parameter
|
62
|
+
* @param context.appFetch (optional) fetch api implementation. Default: built-in fetch
|
63
|
+
* @throws {ValidationFailed} if an error while validating the response
|
64
|
+
* @returns the authorization response which contains code, state and iss
|
65
|
+
*/
|
66
|
+
export declare const completeUserAuthorizationWithFormPostJwtMode: CompleteUserAuthorizationWithFormPostJwtMode;
|
67
|
+
/**
|
68
|
+
* Parse the authorization response and return the result which contains code, state and iss.
|
69
|
+
* @throws {AuthorizationError} if an error occurs during the parsing process
|
70
|
+
* @throws {AuthorizationIdpError} if an error occurs during the parsing process and the error is related to the IDP
|
71
|
+
* @param authRes the authorization response to be parsed
|
72
|
+
* @returns the authorization result which contains code, state and iss
|
73
|
+
*/
|
74
|
+
export declare const parseAuthroizationResponse: (authRes: unknown) => AuthorizationResult;
|
33
75
|
//# sourceMappingURL=04-complete-user-authorization.d.ts.map
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"04-complete-user-authorization.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/04-complete-user-authorization.ts"],"names":[],"mappings":"AAAA,OAAO,EAGL,KAAK,oBAAoB,EACzB,KAAK,mBAAmB,EACzB,MAAM,kBAAkB,CAAC;AAC1B,OAAO,
|
1
|
+
{"version":3,"file":"04-complete-user-authorization.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/04-complete-user-authorization.ts"],"names":[],"mappings":"AAAA,OAAO,EAGL,KAAK,oBAAoB,EACzB,KAAK,mBAAmB,EACzB,MAAM,kBAAkB,CAAC;AAC1B,OAAO,EAAoB,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC9D,OAAO,KAAK,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AAO5E,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AAEtE,OAAO,EAIL,KAAK,aAAa,EACnB,MAAM,6BAA6B,CAAC;AACrC,OAAO,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAKtD;;GAEG;AACH,MAAM,MAAM,sCAAsC,GAAG,CACnD,gBAAgB,EAAE,GAAG,CAAC,sBAAsB,CAAC,CAAC,kBAAkB,CAAC,EACjE,QAAQ,EAAE,GAAG,CAAC,sBAAsB,CAAC,CAAC,UAAU,CAAC,EACjD,UAAU,EAAE,GAAG,CAAC,mBAAmB,CAAC,CAAC,YAAY,CAAC,EAClD,OAAO,EAAE,MAAM,EACf,WAAW,EAAE,MAAM,EACnB,oBAAoB,CAAC,EAAE,oBAAoB,KACxC,OAAO,CAAC,mBAAmB,CAAC,CAAC;AAElC,MAAM,MAAM,4CAA4C,GAAG,CACzD,aAAa,EAAE,GAAG,CAAC,mCAAmC,CAAC,EACvD,OAAO,EAAE;IACP,gBAAgB,EAAE,aAAa,CAAC;IAChC,gBAAgB,EAAE,aAAa,CAAC;IAChC,GAAG,EAAE,MAAM,CAAC;IACZ,yBAAyB,EAAE,MAAM,CAAC;IAClC,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;CACjC,KACE,OAAO,CAAC,mBAAmB,CAAC,CAAC;AAElC,MAAM,MAAM,mCAAmC,GAAG,CAChD,gBAAgB,EAAE,GAAG,CAAC,sBAAsB,CAAC,CAAC,kBAAkB,CAAC,EACjE,QAAQ,EAAE,GAAG,CAAC,sBAAsB,CAAC,CAAC,UAAU,CAAC,EACjD,UAAU,EAAE,GAAG,CAAC,mBAAmB,CAAC,CAAC,YAAY,CAAC,EAClD,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,KAC5B,OAAO,CAAC,aAAa,CAAC,CAAC;AAE5B;;;;;;;;;;;;;;;;GAgBG;AACH,eAAO,MAAM,sCAAsC,EAAE,sCAsDlD,CAAC;AAEJ;;;;;;;;;;;GAWG;AACH,eAAO,MAAM,mCAAmC,EAAE,mCAyB/C,CAAC;AAEJ;;;;;;;;;;;;;;;GAeG;AACH,eAAO,MAAM,4CAA4C,EAAE,4CAuGxD,CAAC;AAEJ;;;;;;GAMG;AACH,eAAO,MAAM,0BAA0B,YAC5B,OAAO,KACf,mBAaF,CAAC"}
|
@@ -4,6 +4,7 @@ import type { CryptoContext } from "@pagopa/io-react-native-jwt";
|
|
4
4
|
import type { ObtainCredential } from "./06-obtain-credential";
|
5
5
|
export type VerifyAndParseCredential = (issuerConf: Out<EvaluateIssuerTrust>["issuerConf"], credential: Out<ObtainCredential>["credential"], format: Out<ObtainCredential>["format"], context: {
|
6
6
|
credentialCryptoContext: CryptoContext;
|
7
|
+
ignoreMissingAttributes?: boolean;
|
7
8
|
}) => Promise<{
|
8
9
|
parsedCredential: ParsedCredential;
|
9
10
|
}>;
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"07-verify-and-parse-credential.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/07-verify-and-parse-credential.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AAKtE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AACjE,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,wBAAwB,CAAC;AAE/D,MAAM,MAAM,wBAAwB,GAAG,CACrC,UAAU,EAAE,GAAG,CAAC,mBAAmB,CAAC,CAAC,YAAY,CAAC,EAClD,UAAU,EAAE,GAAG,CAAC,gBAAgB,CAAC,CAAC,YAAY,CAAC,EAC/C,MAAM,EAAE,GAAG,CAAC,gBAAgB,CAAC,CAAC,QAAQ,CAAC,EACvC,OAAO,EAAE;IACP,uBAAuB,EAAE,aAAa,CAAC;
|
1
|
+
{"version":3,"file":"07-verify-and-parse-credential.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/07-verify-and-parse-credential.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AAKtE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AACjE,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,wBAAwB,CAAC;AAE/D,MAAM,MAAM,wBAAwB,GAAG,CACrC,UAAU,EAAE,GAAG,CAAC,mBAAmB,CAAC,CAAC,YAAY,CAAC,EAClD,UAAU,EAAE,GAAG,CAAC,gBAAgB,CAAC,CAAC,YAAY,CAAC,EAC/C,MAAM,EAAE,GAAG,CAAC,gBAAgB,CAAC,CAAC,QAAQ,CAAC,EACvC,OAAO,EAAE;IACP,uBAAuB,EAAE,aAAa,CAAC;IACvC,uBAAuB,CAAC,EAAE,OAAO,CAAC;CACnC,KACE,OAAO,CAAC;IAAE,gBAAgB,EAAE,gBAAgB,CAAA;CAAE,CAAC,CAAC;AAGrD,KAAK,gBAAgB,GAAG,MAAM;AAC5B,oBAAoB;AACpB,MAAM,EACN;IACE,2CAA2C;IAC3C,IAAI,EACA,yBAAyB,CAAC,MAAM,CAC9B,MAAM,EACN,MAAM,CACP,GACD,4BAA4B,CAAC,MAAM,GACnC,SAAS,CAAC;IACd,wCAAwC;IACxC,KAAK,EAAE,OAAO,CAAC;CAChB,CACF,CAAC;AAgKF;;;;;;;;;;GAUG;AACH,eAAO,MAAM,wBAAwB,EAAE,wBAgBtC,CAAC"}
|
@@ -1,10 +1,10 @@
|
|
1
1
|
import { type StartFlow } from "./01-start-flow";
|
2
2
|
import { evaluateIssuerTrust, type EvaluateIssuerTrust } from "./02-evaluate-issuer-trust";
|
3
3
|
import { startUserAuthorization, type StartUserAuthorization } from "./03-start-user-authorization";
|
4
|
-
import { completeUserAuthorizationWithQueryMode,
|
4
|
+
import { completeUserAuthorizationWithQueryMode, completeUserAuthorizationWithFormPostJwtMode, parseAuthroizationResponse, type CompleteUserAuthorizationWithQueryMode, type CompleteUserAuthorizationWithFormPostJwtMode, type GetRequestedCredentialToBePresented, getRequestedCredentialToBePresented } from "./04-complete-user-authorization";
|
5
5
|
import { authorizeAccess, type AuthorizeAccess } from "./05-authorize-access";
|
6
6
|
import { obtainCredential, type ObtainCredential } from "./06-obtain-credential";
|
7
7
|
import { verifyAndParseCredential, type VerifyAndParseCredential } from "./07-verify-and-parse-credential";
|
8
|
-
export { evaluateIssuerTrust, startUserAuthorization, completeUserAuthorizationWithQueryMode, authorizeAccess, obtainCredential, verifyAndParseCredential,
|
9
|
-
export type { StartFlow, EvaluateIssuerTrust, StartUserAuthorization, CompleteUserAuthorizationWithQueryMode, AuthorizeAccess, ObtainCredential, VerifyAndParseCredential, };
|
8
|
+
export { evaluateIssuerTrust, startUserAuthorization, completeUserAuthorizationWithQueryMode, getRequestedCredentialToBePresented, completeUserAuthorizationWithFormPostJwtMode, authorizeAccess, obtainCredential, verifyAndParseCredential, parseAuthroizationResponse, };
|
9
|
+
export type { StartFlow, EvaluateIssuerTrust, StartUserAuthorization, CompleteUserAuthorizationWithQueryMode, GetRequestedCredentialToBePresented, CompleteUserAuthorizationWithFormPostJwtMode, AuthorizeAccess, ObtainCredential, VerifyAndParseCredential, };
|
10
10
|
//# sourceMappingURL=index.d.ts.map
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,iBAAiB,CAAC;AACjD,OAAO,EACL,mBAAmB,EACnB,KAAK,mBAAmB,EACzB,MAAM,4BAA4B,CAAC;AACpC,OAAO,EACL,sBAAsB,EACtB,KAAK,sBAAsB,EAC5B,MAAM,+BAA+B,CAAC;AACvC,OAAO,EACL,sCAAsC,EACtC,
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,iBAAiB,CAAC;AACjD,OAAO,EACL,mBAAmB,EACnB,KAAK,mBAAmB,EACzB,MAAM,4BAA4B,CAAC;AACpC,OAAO,EACL,sBAAsB,EACtB,KAAK,sBAAsB,EAC5B,MAAM,+BAA+B,CAAC;AACvC,OAAO,EACL,sCAAsC,EACtC,4CAA4C,EAC5C,0BAA0B,EAC1B,KAAK,sCAAsC,EAC3C,KAAK,4CAA4C,EACjD,KAAK,mCAAmC,EACxC,mCAAmC,EACpC,MAAM,kCAAkC,CAAC;AAC1C,OAAO,EAAE,eAAe,EAAE,KAAK,eAAe,EAAE,MAAM,uBAAuB,CAAC;AAC9E,OAAO,EACL,gBAAgB,EAChB,KAAK,gBAAgB,EACtB,MAAM,wBAAwB,CAAC;AAChC,OAAO,EACL,wBAAwB,EACxB,KAAK,wBAAwB,EAC9B,MAAM,kCAAkC,CAAC;AAE1C,OAAO,EACL,mBAAmB,EACnB,sBAAsB,EACtB,sCAAsC,EACtC,mCAAmC,EACnC,4CAA4C,EAC5C,eAAe,EACf,gBAAgB,EAChB,wBAAwB,EACxB,0BAA0B,GAC3B,CAAC;AACF,YAAY,EACV,SAAS,EACT,mBAAmB,EACnB,sBAAsB,EACtB,sCAAsC,EACtC,mCAAmC,EACnC,4CAA4C,EAC5C,eAAe,EACf,gBAAgB,EAChB,wBAAwB,GACzB,CAAC"}
|
@@ -59,5 +59,15 @@ export declare const CredentialResponse: z.ZodObject<{
|
|
59
59
|
c_nonce_expires_in: number;
|
60
60
|
credential: string;
|
61
61
|
}>;
|
62
|
+
/**
|
63
|
+
* Shape from parsing a response given by a request uri during the EAA credential issuance flow with response mode "form_post.jwt".
|
64
|
+
*/
|
65
|
+
export declare const ResponseUriResultShape: z.ZodObject<{
|
66
|
+
redirect_uri: z.ZodString;
|
67
|
+
}, "strip", z.ZodTypeAny, {
|
68
|
+
redirect_uri: string;
|
69
|
+
}, {
|
70
|
+
redirect_uri: string;
|
71
|
+
}>;
|
62
72
|
export type ResponseMode = "query" | "form_post.jwt";
|
63
73
|
//# sourceMappingURL=types.d.ts.map
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/types.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAGzB,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAE1D,eAAO,MAAM,aAAa;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAOxB,CAAC;AAEH,MAAM,MAAM,kBAAkB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,kBAAkB,CAAC,CAAC;AAEpE,eAAO,MAAM,kBAAkB;;;;;;;;;;;;;;;EAK7B,CAAC;AAEH,MAAM,MAAM,YAAY,GAAG,OAAO,GAAG,eAAe,CAAC"}
|
1
|
+
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/types.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAGzB,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAE1D,eAAO,MAAM,aAAa;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAOxB,CAAC;AAEH,MAAM,MAAM,kBAAkB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,kBAAkB,CAAC,CAAC;AAEpE,eAAO,MAAM,kBAAkB;;;;;;;;;;;;;;;EAK7B,CAAC;AAEH;;GAEG;AACH,eAAO,MAAM,sBAAsB;;;;;;EAEjC,CAAC;AAEH,MAAM,MAAM,YAAY,GAAG,OAAO,GAAG,eAAe,CAAC"}
|
@@ -276,10 +276,10 @@ export declare const getCredentialIssuerEntityConfiguration: (entityBaseUrl: Par
|
|
276
276
|
display: {
|
277
277
|
name: string;
|
278
278
|
locale: string;
|
279
|
-
logo
|
279
|
+
logo?: {
|
280
280
|
url: string;
|
281
281
|
alt_text: string;
|
282
|
-
};
|
282
|
+
} | undefined;
|
283
283
|
}[];
|
284
284
|
credential_issuer: string;
|
285
285
|
credential_endpoint: string;
|
@@ -298,15 +298,15 @@ export declare const getCredentialIssuerEntityConfiguration: (entityBaseUrl: Par
|
|
298
298
|
}[];
|
299
299
|
format: "vc+sd-jwt" | "vc+mdoc-cbor";
|
300
300
|
scope: string;
|
301
|
-
|
301
|
+
cryptographic_binding_methods_supported: string[];
|
302
|
+
credential_signing_alg_values_supported: string[];
|
303
|
+
claims?: Record<string, {
|
302
304
|
value_type: string;
|
303
305
|
display: {
|
304
306
|
name: string;
|
305
307
|
locale: string;
|
306
308
|
}[];
|
307
|
-
}
|
308
|
-
cryptographic_binding_methods_supported: string[];
|
309
|
-
credential_signing_alg_values_supported: string[];
|
309
|
+
}> | undefined;
|
310
310
|
}>;
|
311
311
|
};
|
312
312
|
oauth_authorization_server: {
|
@@ -357,7 +357,7 @@ export declare const getCredentialIssuerEntityConfiguration: (entityBaseUrl: Par
|
|
357
357
|
response_types_supported?: string[] | undefined;
|
358
358
|
subject_types_supported?: string[] | undefined;
|
359
359
|
};
|
360
|
-
|
360
|
+
wallet_relying_party?: {
|
361
361
|
jwks: {
|
362
362
|
keys: {
|
363
363
|
kty: "RSA" | "EC";
|
@@ -726,10 +726,10 @@ export declare const getEntityConfiguration: (entityBaseUrl: Parameters<typeof f
|
|
726
726
|
display: {
|
727
727
|
name: string;
|
728
728
|
locale: string;
|
729
|
-
logo
|
729
|
+
logo?: {
|
730
730
|
url: string;
|
731
731
|
alt_text: string;
|
732
|
-
};
|
732
|
+
} | undefined;
|
733
733
|
}[];
|
734
734
|
credential_issuer: string;
|
735
735
|
credential_endpoint: string;
|
@@ -748,15 +748,15 @@ export declare const getEntityConfiguration: (entityBaseUrl: Parameters<typeof f
|
|
748
748
|
}[];
|
749
749
|
format: "vc+sd-jwt" | "vc+mdoc-cbor";
|
750
750
|
scope: string;
|
751
|
-
|
751
|
+
cryptographic_binding_methods_supported: string[];
|
752
|
+
credential_signing_alg_values_supported: string[];
|
753
|
+
claims?: Record<string, {
|
752
754
|
value_type: string;
|
753
755
|
display: {
|
754
756
|
name: string;
|
755
757
|
locale: string;
|
756
758
|
}[];
|
757
|
-
}
|
758
|
-
cryptographic_binding_methods_supported: string[];
|
759
|
-
credential_signing_alg_values_supported: string[];
|
759
|
+
}> | undefined;
|
760
760
|
}>;
|
761
761
|
};
|
762
762
|
oauth_authorization_server: {
|
@@ -807,7 +807,7 @@ export declare const getEntityConfiguration: (entityBaseUrl: Parameters<typeof f
|
|
807
807
|
response_types_supported?: string[] | undefined;
|
808
808
|
subject_types_supported?: string[] | undefined;
|
809
809
|
};
|
810
|
-
|
810
|
+
wallet_relying_party?: {
|
811
811
|
jwks: {
|
812
812
|
keys: {
|
813
813
|
kty: "RSA" | "EC";
|