@pagopa/io-react-native-wallet 0.27.1 → 0.28.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (153) hide show
  1. package/lib/commonjs/client/generated/wallet-provider.js +27 -19
  2. package/lib/commonjs/client/generated/wallet-provider.js.map +1 -1
  3. package/lib/commonjs/credential/issuance/03-start-user-authorization.js +3 -0
  4. package/lib/commonjs/credential/issuance/03-start-user-authorization.js.map +1 -1
  5. package/lib/commonjs/credential/presentation/01-start-flow.js +14 -24
  6. package/lib/commonjs/credential/presentation/01-start-flow.js.map +1 -1
  7. package/lib/commonjs/credential/presentation/03-get-request-object.js +30 -42
  8. package/lib/commonjs/credential/presentation/03-get-request-object.js.map +1 -1
  9. package/lib/commonjs/credential/presentation/04-retrieve-rp-jwks.js +32 -0
  10. package/lib/commonjs/credential/presentation/04-retrieve-rp-jwks.js.map +1 -0
  11. package/lib/commonjs/credential/presentation/05-verify-request-object.js +53 -0
  12. package/lib/commonjs/credential/presentation/05-verify-request-object.js.map +1 -0
  13. package/lib/commonjs/credential/presentation/06-fetch-presentation-definition.js +39 -0
  14. package/lib/commonjs/credential/presentation/06-fetch-presentation-definition.js.map +1 -0
  15. package/lib/commonjs/credential/presentation/07-evaluate-dcql-query.js +125 -0
  16. package/lib/commonjs/credential/presentation/07-evaluate-dcql-query.js.map +1 -0
  17. package/lib/commonjs/credential/presentation/07-evaluate-input-descriptor.js +289 -0
  18. package/lib/commonjs/credential/presentation/07-evaluate-input-descriptor.js.map +1 -0
  19. package/lib/commonjs/credential/presentation/08-send-authorization-response.js +170 -0
  20. package/lib/commonjs/credential/presentation/08-send-authorization-response.js.map +1 -0
  21. package/lib/commonjs/credential/presentation/errors.js +69 -1
  22. package/lib/commonjs/credential/presentation/errors.js.map +1 -1
  23. package/lib/commonjs/credential/presentation/index.js +29 -1
  24. package/lib/commonjs/credential/presentation/index.js.map +1 -1
  25. package/lib/commonjs/credential/presentation/types.js +124 -3
  26. package/lib/commonjs/credential/presentation/types.js.map +1 -1
  27. package/lib/commonjs/sd-jwt/index.js +41 -1
  28. package/lib/commonjs/sd-jwt/index.js.map +1 -1
  29. package/lib/commonjs/trust/chain.js +35 -50
  30. package/lib/commonjs/trust/chain.js.map +1 -1
  31. package/lib/commonjs/trust/index.js +139 -16
  32. package/lib/commonjs/trust/index.js.map +1 -1
  33. package/lib/commonjs/trust/types.js +36 -12
  34. package/lib/commonjs/trust/types.js.map +1 -1
  35. package/lib/commonjs/trust/utils.js +41 -0
  36. package/lib/commonjs/trust/utils.js.map +1 -0
  37. package/lib/commonjs/utils/jwk.js +5 -1
  38. package/lib/commonjs/utils/jwk.js.map +1 -1
  39. package/lib/commonjs/wallet-instance/index.js +10 -0
  40. package/lib/commonjs/wallet-instance/index.js.map +1 -1
  41. package/lib/module/client/generated/wallet-provider.js +22 -15
  42. package/lib/module/client/generated/wallet-provider.js.map +1 -1
  43. package/lib/module/credential/issuance/03-start-user-authorization.js +3 -0
  44. package/lib/module/credential/issuance/03-start-user-authorization.js.map +1 -1
  45. package/lib/module/credential/presentation/01-start-flow.js +14 -24
  46. package/lib/module/credential/presentation/01-start-flow.js.map +1 -1
  47. package/lib/module/credential/presentation/03-get-request-object.js +31 -43
  48. package/lib/module/credential/presentation/03-get-request-object.js.map +1 -1
  49. package/lib/module/credential/presentation/04-retrieve-rp-jwks.js +25 -0
  50. package/lib/module/credential/presentation/04-retrieve-rp-jwks.js.map +1 -0
  51. package/lib/module/credential/presentation/05-verify-request-object.js +46 -0
  52. package/lib/module/credential/presentation/05-verify-request-object.js.map +1 -0
  53. package/lib/module/credential/presentation/06-fetch-presentation-definition.js +32 -0
  54. package/lib/module/credential/presentation/06-fetch-presentation-definition.js.map +1 -0
  55. package/lib/module/credential/presentation/07-evaluate-dcql-query.js +117 -0
  56. package/lib/module/credential/presentation/07-evaluate-dcql-query.js.map +1 -0
  57. package/lib/module/credential/presentation/07-evaluate-input-descriptor.js +278 -0
  58. package/lib/module/credential/presentation/07-evaluate-input-descriptor.js.map +1 -0
  59. package/lib/module/credential/presentation/08-send-authorization-response.js +158 -0
  60. package/lib/module/credential/presentation/08-send-authorization-response.js.map +1 -0
  61. package/lib/module/credential/presentation/errors.js +64 -0
  62. package/lib/module/credential/presentation/errors.js.map +1 -1
  63. package/lib/module/credential/presentation/index.js +6 -2
  64. package/lib/module/credential/presentation/index.js.map +1 -1
  65. package/lib/module/credential/presentation/types.js +121 -2
  66. package/lib/module/credential/presentation/types.js.map +1 -1
  67. package/lib/module/sd-jwt/index.js +40 -1
  68. package/lib/module/sd-jwt/index.js.map +1 -1
  69. package/lib/module/trust/chain.js +32 -46
  70. package/lib/module/trust/chain.js.map +1 -1
  71. package/lib/module/trust/index.js +139 -18
  72. package/lib/module/trust/index.js.map +1 -1
  73. package/lib/module/trust/types.js +34 -11
  74. package/lib/module/trust/types.js.map +1 -1
  75. package/lib/module/trust/utils.js +33 -0
  76. package/lib/module/trust/utils.js.map +1 -0
  77. package/lib/module/utils/jwk.js +3 -0
  78. package/lib/module/utils/jwk.js.map +1 -1
  79. package/lib/module/wallet-instance/index.js +9 -0
  80. package/lib/module/wallet-instance/index.js.map +1 -1
  81. package/lib/typescript/client/generated/wallet-provider.d.ts +91 -54
  82. package/lib/typescript/client/generated/wallet-provider.d.ts.map +1 -1
  83. package/lib/typescript/credential/issuance/03-start-user-authorization.d.ts.map +1 -1
  84. package/lib/typescript/credential/presentation/01-start-flow.d.ts +26 -5
  85. package/lib/typescript/credential/presentation/01-start-flow.d.ts.map +1 -1
  86. package/lib/typescript/credential/presentation/03-get-request-object.d.ts +7 -10
  87. package/lib/typescript/credential/presentation/03-get-request-object.d.ts.map +1 -1
  88. package/lib/typescript/credential/presentation/04-retrieve-rp-jwks.d.ts +23 -0
  89. package/lib/typescript/credential/presentation/04-retrieve-rp-jwks.d.ts.map +1 -0
  90. package/lib/typescript/credential/presentation/05-verify-request-object.d.ts +18 -0
  91. package/lib/typescript/credential/presentation/05-verify-request-object.d.ts.map +1 -0
  92. package/lib/typescript/credential/presentation/06-fetch-presentation-definition.d.ts +21 -0
  93. package/lib/typescript/credential/presentation/06-fetch-presentation-definition.d.ts.map +1 -0
  94. package/lib/typescript/credential/presentation/07-evaluate-dcql-query.d.ts +20 -0
  95. package/lib/typescript/credential/presentation/07-evaluate-dcql-query.d.ts.map +1 -0
  96. package/lib/typescript/credential/presentation/07-evaluate-input-descriptor.d.ts +88 -0
  97. package/lib/typescript/credential/presentation/07-evaluate-input-descriptor.d.ts.map +1 -0
  98. package/lib/typescript/credential/presentation/08-send-authorization-response.d.ts +70 -0
  99. package/lib/typescript/credential/presentation/08-send-authorization-response.d.ts.map +1 -0
  100. package/lib/typescript/credential/presentation/errors.d.ts +44 -0
  101. package/lib/typescript/credential/presentation/errors.d.ts.map +1 -1
  102. package/lib/typescript/credential/presentation/index.d.ts +7 -3
  103. package/lib/typescript/credential/presentation/index.d.ts.map +1 -1
  104. package/lib/typescript/credential/presentation/types.d.ts +747 -10
  105. package/lib/typescript/credential/presentation/types.d.ts.map +1 -1
  106. package/lib/typescript/credential/status/types.d.ts +6 -6
  107. package/lib/typescript/sd-jwt/index.d.ts +31 -12
  108. package/lib/typescript/sd-jwt/index.d.ts.map +1 -1
  109. package/lib/typescript/sd-jwt/types.d.ts +6 -6
  110. package/lib/typescript/trust/chain.d.ts +4 -9
  111. package/lib/typescript/trust/chain.d.ts.map +1 -1
  112. package/lib/typescript/trust/index.d.ts +337 -61
  113. package/lib/typescript/trust/index.d.ts.map +1 -1
  114. package/lib/typescript/trust/types.d.ts +4074 -407
  115. package/lib/typescript/trust/types.d.ts.map +1 -1
  116. package/lib/typescript/trust/utils.d.ts +12 -0
  117. package/lib/typescript/trust/utils.d.ts.map +1 -0
  118. package/lib/typescript/utils/decoder.d.ts +1 -1
  119. package/lib/typescript/utils/decoder.d.ts.map +1 -1
  120. package/lib/typescript/utils/jwk.d.ts +137 -0
  121. package/lib/typescript/utils/jwk.d.ts.map +1 -1
  122. package/lib/typescript/wallet-instance/index.d.ts +8 -0
  123. package/lib/typescript/wallet-instance/index.d.ts.map +1 -1
  124. package/lib/typescript/wallet-instance-attestation/types.d.ts +36 -36
  125. package/package.json +5 -2
  126. package/src/client/generated/wallet-provider.ts +28 -19
  127. package/src/credential/issuance/03-start-user-authorization.ts +3 -0
  128. package/src/credential/presentation/01-start-flow.ts +19 -26
  129. package/src/credential/presentation/03-get-request-object.ts +35 -58
  130. package/src/credential/presentation/04-retrieve-rp-jwks.ts +34 -0
  131. package/src/credential/presentation/05-verify-request-object.ts +52 -0
  132. package/src/credential/presentation/06-fetch-presentation-definition.ts +48 -0
  133. package/src/credential/presentation/07-evaluate-dcql-query.ts +166 -0
  134. package/src/credential/presentation/07-evaluate-input-descriptor.ts +391 -0
  135. package/src/credential/presentation/08-send-authorization-response.ts +220 -0
  136. package/src/credential/presentation/errors.ts +64 -0
  137. package/src/credential/presentation/index.ts +22 -1
  138. package/src/credential/presentation/types.ts +133 -2
  139. package/src/sd-jwt/index.ts +49 -1
  140. package/src/trust/chain.ts +46 -66
  141. package/src/trust/index.ts +185 -20
  142. package/src/trust/types.ts +34 -10
  143. package/src/trust/utils.ts +35 -0
  144. package/src/utils/decoder.ts +1 -1
  145. package/src/utils/jwk.ts +8 -1
  146. package/src/wallet-instance/index.ts +13 -0
  147. package/lib/commonjs/credential/presentation/04-send-authorization-response.js +0 -138
  148. package/lib/commonjs/credential/presentation/04-send-authorization-response.js.map +0 -1
  149. package/lib/module/credential/presentation/04-send-authorization-response.js +0 -128
  150. package/lib/module/credential/presentation/04-send-authorization-response.js.map +0 -1
  151. package/lib/typescript/credential/presentation/04-send-authorization-response.d.ts +0 -34
  152. package/lib/typescript/credential/presentation/04-send-authorization-response.d.ts.map +0 -1
  153. package/src/credential/presentation/04-send-authorization-response.ts +0 -168
@@ -40,26 +40,6 @@ export declare const CreateWalletAttestationBody: z.ZodObject<{
40
40
  grant_type: "urn:ietf:params:oauth:grant-type:jwt-bearer";
41
41
  assertion: string;
42
42
  }>;
43
- export type ProblemDetail = z.infer<typeof ProblemDetail>;
44
- export declare const ProblemDetail: z.ZodObject<{
45
- type: z.ZodOptional<z.ZodString>;
46
- title: z.ZodOptional<z.ZodString>;
47
- status: z.ZodOptional<z.ZodNumber>;
48
- detail: z.ZodOptional<z.ZodString>;
49
- instance: z.ZodOptional<z.ZodString>;
50
- }, "strip", z.ZodTypeAny, {
51
- type?: string | undefined;
52
- title?: string | undefined;
53
- status?: number | undefined;
54
- detail?: string | undefined;
55
- instance?: string | undefined;
56
- }, {
57
- type?: string | undefined;
58
- title?: string | undefined;
59
- status?: number | undefined;
60
- detail?: string | undefined;
61
- instance?: string | undefined;
62
- }>;
63
43
  export type SetWalletInstanceStatusBody = z.infer<typeof SetWalletInstanceStatusBody>;
64
44
  export declare const SetWalletInstanceStatusBody: z.ZodObject<{
65
45
  status: z.ZodLiteral<"REVOKED">;
@@ -84,6 +64,26 @@ export declare const WalletInstanceData: z.ZodObject<{
84
64
  is_revoked: boolean;
85
65
  revocation_reason?: "CERTIFICATE_REVOKED_BY_ISSUER" | "NEW_WALLET_INSTANCE_CREATED" | "REVOKED_BY_USER" | undefined;
86
66
  }>;
67
+ export type ProblemDetail = z.infer<typeof ProblemDetail>;
68
+ export declare const ProblemDetail: z.ZodObject<{
69
+ type: z.ZodOptional<z.ZodString>;
70
+ title: z.ZodOptional<z.ZodString>;
71
+ status: z.ZodOptional<z.ZodNumber>;
72
+ detail: z.ZodOptional<z.ZodString>;
73
+ instance: z.ZodOptional<z.ZodString>;
74
+ }, "strip", z.ZodTypeAny, {
75
+ type?: string | undefined;
76
+ title?: string | undefined;
77
+ status?: number | undefined;
78
+ detail?: string | undefined;
79
+ instance?: string | undefined;
80
+ }, {
81
+ type?: string | undefined;
82
+ title?: string | undefined;
83
+ status?: number | undefined;
84
+ detail?: string | undefined;
85
+ instance?: string | undefined;
86
+ }>;
87
87
  export type get_GetNonce = typeof get_GetNonce;
88
88
  export declare const get_GetNonce: {
89
89
  method: z.ZodLiteral<"GET">;
@@ -130,6 +130,59 @@ export declare const post_CreateWalletInstance: {
130
130
  }>;
131
131
  response: z.ZodUnknown;
132
132
  };
133
+ export type post_CreateWalletAttestation = typeof post_CreateWalletAttestation;
134
+ export declare const post_CreateWalletAttestation: {
135
+ method: z.ZodLiteral<"POST">;
136
+ path: z.ZodLiteral<"/token">;
137
+ parameters: z.ZodObject<{
138
+ body: z.ZodObject<{
139
+ grant_type: z.ZodLiteral<"urn:ietf:params:oauth:grant-type:jwt-bearer">;
140
+ assertion: z.ZodString;
141
+ }, "strip", z.ZodTypeAny, {
142
+ grant_type: "urn:ietf:params:oauth:grant-type:jwt-bearer";
143
+ assertion: string;
144
+ }, {
145
+ grant_type: "urn:ietf:params:oauth:grant-type:jwt-bearer";
146
+ assertion: string;
147
+ }>;
148
+ }, "strip", z.ZodTypeAny, {
149
+ body: {
150
+ grant_type: "urn:ietf:params:oauth:grant-type:jwt-bearer";
151
+ assertion: string;
152
+ };
153
+ }, {
154
+ body: {
155
+ grant_type: "urn:ietf:params:oauth:grant-type:jwt-bearer";
156
+ assertion: string;
157
+ };
158
+ }>;
159
+ response: z.ZodObject<{
160
+ wallet_attestation: z.ZodString;
161
+ }, "strip", z.ZodTypeAny, {
162
+ wallet_attestation: string;
163
+ }, {
164
+ wallet_attestation: string;
165
+ }>;
166
+ };
167
+ export type get_GetCurrentWalletInstanceStatus = typeof get_GetCurrentWalletInstanceStatus;
168
+ export declare const get_GetCurrentWalletInstanceStatus: {
169
+ method: z.ZodLiteral<"GET">;
170
+ path: z.ZodLiteral<"/wallet-instances/current/status">;
171
+ parameters: z.ZodNever;
172
+ response: z.ZodObject<{
173
+ id: z.ZodString;
174
+ is_revoked: z.ZodBoolean;
175
+ revocation_reason: z.ZodOptional<z.ZodUnion<[z.ZodUnion<[z.ZodLiteral<"CERTIFICATE_REVOKED_BY_ISSUER">, z.ZodLiteral<"NEW_WALLET_INSTANCE_CREATED">, z.ZodLiteral<"REVOKED_BY_USER">]>, z.ZodUndefined]>>;
176
+ }, "strip", z.ZodTypeAny, {
177
+ id: string;
178
+ is_revoked: boolean;
179
+ revocation_reason?: "CERTIFICATE_REVOKED_BY_ISSUER" | "NEW_WALLET_INSTANCE_CREATED" | "REVOKED_BY_USER" | undefined;
180
+ }, {
181
+ id: string;
182
+ is_revoked: boolean;
183
+ revocation_reason?: "CERTIFICATE_REVOKED_BY_ISSUER" | "NEW_WALLET_INSTANCE_CREATED" | "REVOKED_BY_USER" | undefined;
184
+ }>;
185
+ };
133
186
  export type get_GetWalletInstanceStatus = typeof get_GetWalletInstanceStatus;
134
187
  export declare const get_GetWalletInstanceStatus: {
135
188
  method: z.ZodLiteral<"GET">;
@@ -201,40 +254,6 @@ export declare const put_SetWalletInstanceStatus: {
201
254
  }>;
202
255
  response: z.ZodUnknown;
203
256
  };
204
- export type post_CreateWalletAttestation = typeof post_CreateWalletAttestation;
205
- export declare const post_CreateWalletAttestation: {
206
- method: z.ZodLiteral<"POST">;
207
- path: z.ZodLiteral<"/token">;
208
- parameters: z.ZodObject<{
209
- body: z.ZodObject<{
210
- grant_type: z.ZodLiteral<"urn:ietf:params:oauth:grant-type:jwt-bearer">;
211
- assertion: z.ZodString;
212
- }, "strip", z.ZodTypeAny, {
213
- grant_type: "urn:ietf:params:oauth:grant-type:jwt-bearer";
214
- assertion: string;
215
- }, {
216
- grant_type: "urn:ietf:params:oauth:grant-type:jwt-bearer";
217
- assertion: string;
218
- }>;
219
- }, "strip", z.ZodTypeAny, {
220
- body: {
221
- grant_type: "urn:ietf:params:oauth:grant-type:jwt-bearer";
222
- assertion: string;
223
- };
224
- }, {
225
- body: {
226
- grant_type: "urn:ietf:params:oauth:grant-type:jwt-bearer";
227
- assertion: string;
228
- };
229
- }>;
230
- response: z.ZodObject<{
231
- wallet_attestation: z.ZodString;
232
- }, "strip", z.ZodTypeAny, {
233
- wallet_attestation: string;
234
- }, {
235
- wallet_attestation: string;
236
- }>;
237
- };
238
257
  export declare const EndpointByMethod: {
239
258
  get: {
240
259
  "/nonce": {
@@ -249,6 +268,24 @@ export declare const EndpointByMethod: {
249
268
  nonce: string;
250
269
  }>;
251
270
  };
271
+ "/wallet-instances/current/status": {
272
+ method: z.ZodLiteral<"GET">;
273
+ path: z.ZodLiteral<"/wallet-instances/current/status">;
274
+ parameters: z.ZodNever;
275
+ response: z.ZodObject<{
276
+ id: z.ZodString;
277
+ is_revoked: z.ZodBoolean;
278
+ revocation_reason: z.ZodOptional<z.ZodUnion<[z.ZodUnion<[z.ZodLiteral<"CERTIFICATE_REVOKED_BY_ISSUER">, z.ZodLiteral<"NEW_WALLET_INSTANCE_CREATED">, z.ZodLiteral<"REVOKED_BY_USER">]>, z.ZodUndefined]>>;
279
+ }, "strip", z.ZodTypeAny, {
280
+ id: string;
281
+ is_revoked: boolean;
282
+ revocation_reason?: "CERTIFICATE_REVOKED_BY_ISSUER" | "NEW_WALLET_INSTANCE_CREATED" | "REVOKED_BY_USER" | undefined;
283
+ }, {
284
+ id: string;
285
+ is_revoked: boolean;
286
+ revocation_reason?: "CERTIFICATE_REVOKED_BY_ISSUER" | "NEW_WALLET_INSTANCE_CREATED" | "REVOKED_BY_USER" | undefined;
287
+ }>;
288
+ };
252
289
  "/wallet-instances/{id}/status": {
253
290
  method: z.ZodLiteral<"GET">;
254
291
  path: z.ZodLiteral<"/wallet-instances/{id}/status">;
@@ -1 +1 @@
1
- {"version":3,"file":"wallet-provider.d.ts","sourceRoot":"","sources":["../../../../src/client/generated/wallet-provider.ts"],"names":[],"mappings":"AAAA,OAAO,CAAC,MAAM,KAAK,CAAC;AAEpB,MAAM,MAAM,eAAe,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,eAAe,CAAC,CAAC;AAC9D,eAAO,MAAM,eAAe;;;;;;EAE1B,CAAC;AAEH,MAAM,MAAM,qBAAqB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,qBAAqB,CAAC,CAAC;AAC1E,eAAO,MAAM,qBAAqB;;;;;;EAEhC,CAAC;AAEH,MAAM,MAAM,wBAAwB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,wBAAwB,CAAC,CAAC;AAChF,eAAO,MAAM,wBAAwB;;;;;;;;;;;;EAInC,CAAC;AAEH,MAAM,MAAM,2BAA2B,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,2BAA2B,CAAC,CAAC;AACtF,eAAO,MAAM,2BAA2B;;;;;;;;;EAGtC,CAAC;AAEH,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAC1D,eAAO,MAAM,aAAa;;;;;;;;;;;;;;;;;;EAMxB,CAAC;AAEH,MAAM,MAAM,2BAA2B,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,2BAA2B,CAAC,CAAC;AACtF,eAAO,MAAM,2BAA2B;;;;;;EAEtC,CAAC;AAEH,MAAM,MAAM,gBAAgB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,gBAAgB,CAAC,CAAC;AAChE,eAAO,MAAM,gBAAgB,2IAI3B,CAAC;AAEH,MAAM,MAAM,kBAAkB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,kBAAkB,CAAC,CAAC;AACpE,eAAO,MAAM,kBAAkB;;;;;;;;;;;;EAI7B,CAAC;AAEH,MAAM,MAAM,YAAY,GAAG,OAAO,YAAY,CAAC;AAC/C,eAAO,MAAM,YAAY;;;;;;;;;;;CAKxB,CAAC;AAEF,MAAM,MAAM,yBAAyB,GAAG,OAAO,yBAAyB,CAAC;AACzE,eAAO,MAAM,yBAAyB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAOrC,CAAC;AAEF,MAAM,MAAM,2BAA2B,GAAG,OAAO,2BAA2B,CAAC;AAC7E,eAAO,MAAM,2BAA2B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CASvC,CAAC;AAEF,MAAM,MAAM,2BAA2B,GAAG,OAAO,2BAA2B,CAAC;AAC7E,eAAO,MAAM,2BAA2B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAUvC,CAAC;AAEF,MAAM,MAAM,4BAA4B,GAAG,OAAO,4BAA4B,CAAC;AAC/E,eAAO,MAAM,4BAA4B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAOxC,CAAC;AAGF,eAAO,MAAM,gBAAgB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAY5B,CAAC;AACF,MAAM,MAAM,gBAAgB,GAAG,OAAO,gBAAgB,CAAC;AAIvD,MAAM,MAAM,YAAY,GAAG,gBAAgB,CAAC,KAAK,CAAC,CAAC;AACnD,MAAM,MAAM,aAAa,GAAG,gBAAgB,CAAC,MAAM,CAAC,CAAC;AACrD,MAAM,MAAM,YAAY,GAAG,gBAAgB,CAAC,KAAK,CAAC,CAAC;AACnD,MAAM,MAAM,YAAY,GAAG,gBAAgB,CAAC,MAAM,gBAAgB,CAAC,CAAC;AAIpE,MAAM,MAAM,kBAAkB,GAAG;IAC/B,IAAI,CAAC,EAAE,OAAO,CAAC;IACf,KAAK,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAChC,MAAM,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACjC,IAAI,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;CAChC,CAAC;AAEF,MAAM,MAAM,cAAc,GAAG,MAAM,GAAG,KAAK,GAAG,OAAO,GAAG,QAAQ,CAAC;AACjE,MAAM,MAAM,MAAM,GAAG,KAAK,GAAG,MAAM,GAAG,cAAc,CAAC;AAErD,MAAM,MAAM,eAAe,GAAG;IAC5B,UAAU,CAAC,EAAE,kBAAkB,GAAG,SAAS,CAAC;IAC5C,QAAQ,EAAE,OAAO,CAAC;CACnB,CAAC;AAEF,MAAM,MAAM,QAAQ,CAAC,OAAO,SAAS,eAAe,GAAG,eAAe,IAAI;IACxE,WAAW,EAAE,MAAM,CAAC;IACpB,MAAM,EAAE,MAAM,CAAC;IACf,IAAI,EAAE,MAAM,CAAC;IACb,UAAU,CAAC,EAAE,OAAO,CAAC,YAAY,CAAC,CAAC;IACnC,IAAI,EAAE;QACJ,KAAK,EAAE,MAAM,CAAC;QACd,aAAa,EAAE,OAAO,CAAC;QACvB,qBAAqB,EAAE,OAAO,CAAC;KAChC,CAAC;IACF,QAAQ,EAAE,OAAO,CAAC,UAAU,CAAC,CAAC;CAC/B,CAAC;AAEF,KAAK,OAAO,GAAG,CACb,MAAM,EAAE,MAAM,EACd,GAAG,EAAE,MAAM,EACX,UAAU,CAAC,EAAE,kBAAkB,GAAG,SAAS,KACxC,OAAO,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC,CAAC;AAEnC,KAAK,YAAY,CAAC,CAAC,IAAI;KACpB,CAAC,IAAI,MAAM,CAAC,CAAC,CAAC,GAAG,SAAS,SAAS,CAAC,CAAC,CAAC,CAAC,GAAG,KAAK,GAAG,CAAC;CACrD,CAAC,MAAM,CAAC,CAAC,CAAC;AAEX,KAAK,gBAAgB,CAAC,CAAC,IAAI,YAAY,CAAC,CAAC,CAAC,SAAS,KAAK,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC,GAAG,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;AAKtF,qBAAa,SAAS;IAGD,OAAO,EAAE,OAAO;IAFnC,OAAO,EAAE,MAAM,CAAM;gBAEF,OAAO,EAAE,OAAO;IAEnC,UAAU,CAAC,OAAO,EAAE,MAAM;IAM1B,GAAG,CAAC,IAAI,SAAS,MAAM,YAAY,EAAE,SAAS,SAAS,YAAY,CAAC,IAAI,CAAC,EACvE,IAAI,EAAE,IAAI,EACV,GAAG,MAAM,EAAE,gBAAgB,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC,CAAC,GAC5D,OAAO,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC;IAM1C,IAAI,CAAC,IAAI,SAAS,MAAM,aAAa,EAAE,SAAS,SAAS,aAAa,CAAC,IAAI,CAAC,EAC1E,IAAI,EAAE,IAAI,EACV,GAAG,MAAM,EAAE,gBAAgB,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC,CAAC,GAC5D,OAAO,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC;IAM1C,GAAG,CAAC,IAAI,SAAS,MAAM,YAAY,EAAE,SAAS,SAAS,YAAY,CAAC,IAAI,CAAC,EACvE,IAAI,EAAE,IAAI,EACV,GAAG,MAAM,EAAE,gBAAgB,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC,CAAC,GAC5D,OAAO,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC;CAI3C;AAED,wBAAgB,eAAe,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,CAAC,EAAE,MAAM,aAEjE;;AAED;;;;;;;;EAQE"}
1
+ {"version":3,"file":"wallet-provider.d.ts","sourceRoot":"","sources":["../../../../src/client/generated/wallet-provider.ts"],"names":[],"mappings":"AAAA,OAAO,CAAC,MAAM,KAAK,CAAC;AAEpB,MAAM,MAAM,eAAe,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,eAAe,CAAC,CAAC;AAC9D,eAAO,MAAM,eAAe;;;;;;EAE1B,CAAC;AAEH,MAAM,MAAM,qBAAqB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,qBAAqB,CAAC,CAAC;AAC1E,eAAO,MAAM,qBAAqB;;;;;;EAEhC,CAAC;AAEH,MAAM,MAAM,wBAAwB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,wBAAwB,CAAC,CAAC;AAChF,eAAO,MAAM,wBAAwB;;;;;;;;;;;;EAInC,CAAC;AAEH,MAAM,MAAM,2BAA2B,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,2BAA2B,CAAC,CAAC;AACtF,eAAO,MAAM,2BAA2B;;;;;;;;;EAGtC,CAAC;AAEH,MAAM,MAAM,2BAA2B,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,2BAA2B,CAAC,CAAC;AACtF,eAAO,MAAM,2BAA2B;;;;;;EAEtC,CAAC;AAEH,MAAM,MAAM,gBAAgB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,gBAAgB,CAAC,CAAC;AAChE,eAAO,MAAM,gBAAgB,2IAI3B,CAAC;AAEH,MAAM,MAAM,kBAAkB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,kBAAkB,CAAC,CAAC;AACpE,eAAO,MAAM,kBAAkB;;;;;;;;;;;;EAI7B,CAAC;AAEH,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAC1D,eAAO,MAAM,aAAa;;;;;;;;;;;;;;;;;;EAMxB,CAAC;AAEH,MAAM,MAAM,YAAY,GAAG,OAAO,YAAY,CAAC;AAC/C,eAAO,MAAM,YAAY;;;;;;;;;;;CAKxB,CAAC;AAEF,MAAM,MAAM,yBAAyB,GAAG,OAAO,yBAAyB,CAAC;AACzE,eAAO,MAAM,yBAAyB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAOrC,CAAC;AAEF,MAAM,MAAM,4BAA4B,GAAG,OAAO,4BAA4B,CAAC;AAC/E,eAAO,MAAM,4BAA4B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAOxC,CAAC;AAEF,MAAM,MAAM,kCAAkC,GAAG,OAAO,kCAAkC,CAAC;AAC3F,eAAO,MAAM,kCAAkC;;;;;;;;;;;;;;;;;CAK9C,CAAC;AAEF,MAAM,MAAM,2BAA2B,GAAG,OAAO,2BAA2B,CAAC;AAC7E,eAAO,MAAM,2BAA2B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CASvC,CAAC;AAEF,MAAM,MAAM,2BAA2B,GAAG,OAAO,2BAA2B,CAAC;AAC7E,eAAO,MAAM,2BAA2B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAUvC,CAAC;AAGF,eAAO,MAAM,gBAAgB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAa5B,CAAC;AACF,MAAM,MAAM,gBAAgB,GAAG,OAAO,gBAAgB,CAAC;AAIvD,MAAM,MAAM,YAAY,GAAG,gBAAgB,CAAC,KAAK,CAAC,CAAC;AACnD,MAAM,MAAM,aAAa,GAAG,gBAAgB,CAAC,MAAM,CAAC,CAAC;AACrD,MAAM,MAAM,YAAY,GAAG,gBAAgB,CAAC,KAAK,CAAC,CAAC;AACnD,MAAM,MAAM,YAAY,GAAG,gBAAgB,CAAC,MAAM,gBAAgB,CAAC,CAAC;AAIpE,MAAM,MAAM,kBAAkB,GAAG;IAC/B,IAAI,CAAC,EAAE,OAAO,CAAC;IACf,KAAK,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAChC,MAAM,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACjC,IAAI,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;CAChC,CAAC;AAEF,MAAM,MAAM,cAAc,GAAG,MAAM,GAAG,KAAK,GAAG,OAAO,GAAG,QAAQ,CAAC;AACjE,MAAM,MAAM,MAAM,GAAG,KAAK,GAAG,MAAM,GAAG,cAAc,CAAC;AAErD,MAAM,MAAM,eAAe,GAAG;IAC5B,UAAU,CAAC,EAAE,kBAAkB,GAAG,SAAS,CAAC;IAC5C,QAAQ,EAAE,OAAO,CAAC;CACnB,CAAC;AAEF,MAAM,MAAM,QAAQ,CAAC,OAAO,SAAS,eAAe,GAAG,eAAe,IAAI;IACxE,WAAW,EAAE,MAAM,CAAC;IACpB,MAAM,EAAE,MAAM,CAAC;IACf,IAAI,EAAE,MAAM,CAAC;IACb,UAAU,CAAC,EAAE,OAAO,CAAC,YAAY,CAAC,CAAC;IACnC,IAAI,EAAE;QACJ,KAAK,EAAE,MAAM,CAAC;QACd,aAAa,EAAE,OAAO,CAAC;QACvB,qBAAqB,EAAE,OAAO,CAAC;KAChC,CAAC;IACF,QAAQ,EAAE,OAAO,CAAC,UAAU,CAAC,CAAC;CAC/B,CAAC;AAEF,KAAK,OAAO,GAAG,CACb,MAAM,EAAE,MAAM,EACd,GAAG,EAAE,MAAM,EACX,UAAU,CAAC,EAAE,kBAAkB,GAAG,SAAS,KACxC,OAAO,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC,CAAC;AAEnC,KAAK,YAAY,CAAC,CAAC,IAAI;KACpB,CAAC,IAAI,MAAM,CAAC,CAAC,CAAC,GAAG,SAAS,SAAS,CAAC,CAAC,CAAC,CAAC,GAAG,KAAK,GAAG,CAAC;CACrD,CAAC,MAAM,CAAC,CAAC,CAAC;AAEX,KAAK,gBAAgB,CAAC,CAAC,IAAI,YAAY,CAAC,CAAC,CAAC,SAAS,KAAK,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC,GAAG,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;AAKtF,qBAAa,SAAS;IAGD,OAAO,EAAE,OAAO;IAFnC,OAAO,EAAE,MAAM,CAAM;gBAEF,OAAO,EAAE,OAAO;IAEnC,UAAU,CAAC,OAAO,EAAE,MAAM;IAM1B,GAAG,CAAC,IAAI,SAAS,MAAM,YAAY,EAAE,SAAS,SAAS,YAAY,CAAC,IAAI,CAAC,EACvE,IAAI,EAAE,IAAI,EACV,GAAG,MAAM,EAAE,gBAAgB,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC,CAAC,GAC5D,OAAO,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC;IAM1C,IAAI,CAAC,IAAI,SAAS,MAAM,aAAa,EAAE,SAAS,SAAS,aAAa,CAAC,IAAI,CAAC,EAC1E,IAAI,EAAE,IAAI,EACV,GAAG,MAAM,EAAE,gBAAgB,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC,CAAC,GAC5D,OAAO,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC;IAM1C,GAAG,CAAC,IAAI,SAAS,MAAM,YAAY,EAAE,SAAS,SAAS,YAAY,CAAC,IAAI,CAAC,EACvE,IAAI,EAAE,IAAI,EACV,GAAG,MAAM,EAAE,gBAAgB,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC,CAAC,GAC5D,OAAO,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC;CAI3C;AAED,wBAAgB,eAAe,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,CAAC,EAAE,MAAM,aAEjE;;AAED;;;;;;;;EAQE"}
@@ -1 +1 @@
1
- {"version":3,"file":"03-start-user-authorization.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/03-start-user-authorization.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AAEjE,OAAO,EAAoC,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC9E,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AACjD,OAAO,EAAE,mBAAmB,EAAkB,MAAM,iBAAiB,CAAC;AAGtE,MAAM,MAAM,sBAAsB,GAAG,CACnC,UAAU,EAAE,GAAG,CAAC,mBAAmB,CAAC,CAAC,YAAY,CAAC,EAClD,cAAc,EAAE,GAAG,CAAC,SAAS,CAAC,CAAC,gBAAgB,CAAC,EAChD,OAAO,EAAE;IACP,gBAAgB,EAAE,aAAa,CAAC;IAChC,yBAAyB,EAAE,MAAM,CAAC;IAClC,WAAW,EAAE,MAAM,CAAC;IACpB,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;CACjC,KACE,OAAO,CAAC;IACX,gBAAgB,EAAE,MAAM,CAAC;IACzB,QAAQ,EAAE,MAAM,CAAC;IACjB,YAAY,EAAE,MAAM,CAAC;IACrB,oBAAoB,EAAE,mBAAmB,CAAC;CAC3C,CAAC,CAAC;AAyDH;;;;;;;;;;;;;;;;;GAiBG;AACH,eAAO,MAAM,sBAAsB,EAAE,sBAmCpC,CAAC"}
1
+ {"version":3,"file":"03-start-user-authorization.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/03-start-user-authorization.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AAEjE,OAAO,EAAoC,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC9E,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AACjD,OAAO,EAAE,mBAAmB,EAAkB,MAAM,iBAAiB,CAAC;AAGtE,MAAM,MAAM,sBAAsB,GAAG,CACnC,UAAU,EAAE,GAAG,CAAC,mBAAmB,CAAC,CAAC,YAAY,CAAC,EAClD,cAAc,EAAE,GAAG,CAAC,SAAS,CAAC,CAAC,gBAAgB,CAAC,EAChD,OAAO,EAAE;IACP,gBAAgB,EAAE,aAAa,CAAC;IAChC,yBAAyB,EAAE,MAAM,CAAC;IAClC,WAAW,EAAE,MAAM,CAAC;IACpB,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;CACjC,KACE,OAAO,CAAC;IACX,gBAAgB,EAAE,MAAM,CAAC;IACzB,QAAQ,EAAE,MAAM,CAAC;IACjB,YAAY,EAAE,MAAM,CAAC;IACrB,oBAAoB,EAAE,mBAAmB,CAAC;CAC3C,CAAC,CAAC;AAyDH;;;;;;;;;;;;;;;;;GAiBG;AACH,eAAO,MAAM,sBAAsB,EAAE,sBAsCpC,CAAC"}
@@ -1,20 +1,41 @@
1
+ import * as z from "zod";
2
+ declare const PresentationParams: z.ZodObject<{
3
+ clientId: z.ZodString;
4
+ requestUri: z.ZodString;
5
+ requestUriMethod: z.ZodEnum<["get", "post"]>;
6
+ state: z.ZodOptional<z.ZodString>;
7
+ }, "strip", z.ZodTypeAny, {
8
+ clientId: string;
9
+ requestUri: string;
10
+ requestUriMethod: "get" | "post";
11
+ state?: string | undefined;
12
+ }, {
13
+ clientId: string;
14
+ requestUri: string;
15
+ requestUriMethod: "get" | "post";
16
+ state?: string | undefined;
17
+ }>;
18
+ export type PresentationParams = z.infer<typeof PresentationParams>;
1
19
  /**
2
20
  * The beginning of the presentation flow.
3
21
  * To be implemented accordind to the user touchpoint
4
22
  *
5
- * @param Optional parameters, depending on the starting touchoint
23
+ * @param params Presentation parameters, depending on the starting touchoint
6
24
  * @returns The url for the Relying Party to connect with
7
25
  */
8
- export type StartFlow<T extends Array<unknown> = []> = (...args: T) => {
9
- requestURI: string;
26
+ export type StartFlow = (params: PresentationParams) => {
27
+ requestUri: string;
10
28
  clientId: string;
29
+ requestUriMethod?: "get" | "post";
30
+ state?: string;
11
31
  };
12
32
  /**
13
33
  * Start a presentation flow by decoding an incoming QR-code
14
34
  *
15
- * @param qrcode The encoded QR-code content
35
+ * @param params The encoded QR-code content
16
36
  * @returns The url for the Relying Party to connect with
17
37
  * @throws If the provided qr code fails to be decoded
18
38
  */
19
- export declare const startFlowFromQR: StartFlow<[string]>;
39
+ export declare const startFlowFromQR: StartFlow;
40
+ export {};
20
41
  //# sourceMappingURL=01-start-flow.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"01-start-flow.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/01-start-flow.ts"],"names":[],"mappings":"AAWA;;;;;;GAMG;AACH,MAAM,MAAM,SAAS,CAAC,CAAC,SAAS,KAAK,CAAC,OAAO,CAAC,GAAG,EAAE,IAAI,CAAC,GAAG,IAAI,EAAE,CAAC,KAAK;IACrE,UAAU,EAAE,MAAM,CAAC;IACnB,QAAQ,EAAE,MAAM,CAAC;CAClB,CAAC;AAEF;;;;;;GAMG;AACH,eAAO,MAAM,eAAe,EAAE,SAAS,CAAC,CAAC,MAAM,CAAC,CAoB/C,CAAC"}
1
+ {"version":3,"file":"01-start-flow.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/01-start-flow.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAGzB,QAAA,MAAM,kBAAkB;;;;;;;;;;;;;;;EAKtB,CAAC;AACH,MAAM,MAAM,kBAAkB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,kBAAkB,CAAC,CAAC;AAEpE;;;;;;GAMG;AACH,MAAM,MAAM,SAAS,GAAG,CAAC,MAAM,EAAE,kBAAkB,KAAK;IACtD,UAAU,EAAE,MAAM,CAAC;IACnB,QAAQ,EAAE,MAAM,CAAC;IACjB,gBAAgB,CAAC,EAAE,KAAK,GAAG,MAAM,CAAC;IAClC,KAAK,CAAC,EAAE,MAAM,CAAC;CAChB,CAAC;AAEF;;;;;;GAMG;AACH,eAAO,MAAM,eAAe,EAAE,SAW7B,CAAC"}
@@ -1,23 +1,20 @@
1
- import { type CryptoContext } from "@pagopa/io-react-native-jwt";
2
- import type { EvaluateRelyingPartyTrust } from "./02-evaluate-rp-trust";
3
1
  import { type Out } from "../../utils/misc";
4
2
  import type { StartFlow } from "./01-start-flow";
5
- import { RequestObject } from "./types";
6
- export type GetRequestObject = (requestUri: Out<StartFlow>["requestURI"], rpConf: Out<EvaluateRelyingPartyTrust>["rpConf"], context: {
7
- wiaCryptoContext: CryptoContext;
3
+ import { RequestObjectWalletCapabilities } from "./types";
4
+ export type GetRequestObject = (requestUri: Out<StartFlow>["requestUri"], context: {
8
5
  appFetch?: GlobalFetch["fetch"];
9
6
  walletInstanceAttestation: string;
7
+ walletCapabilities?: RequestObjectWalletCapabilities;
10
8
  }) => Promise<{
11
- requestObject: RequestObject;
9
+ requestObjectEncodedJwt: string;
12
10
  }>;
13
11
  /**
14
- * Obtain the Request Object for RP authentication
12
+ * Obtain the Request Object for RP authentication. Both the GET and POST `request_uri_method` are supported.
15
13
  * @see https://italia.github.io/eudi-wallet-it-docs/versione-corrente/en/relying-party-solution.html
16
14
  *
17
15
  * @param requestUri The url for the Relying Party to connect with
18
- * @param rpConf The Relying Party's configuration
19
- * @param context.wiaCryptoContext The context to access the key associated with the Wallet Instance Attestation
20
- * @param context.walletInstanceAttestation The Wallet Instance Attestation token
16
+ * @param rpConf The Relying Party's configuration * @param context.walletInstanceAttestation The Wallet Instance Attestation token
17
+ * @param context.walletCapabilities (optional) An object containing the wallet technical capabilities that will be sent with a POST request
21
18
  * @param context.appFetch (optional) fetch api implementation. Default: built-in fetch
22
19
  * @returns The Request Object that describes the presentation
23
20
  */
@@ -1 +1 @@
1
- {"version":3,"file":"03-get-request-object.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/03-get-request-object.ts"],"names":[],"mappings":"AACA,OAAO,EAIL,KAAK,aAAa,EACnB,MAAM,6BAA6B,CAAC;AAIrC,OAAO,KAAK,EAAE,yBAAyB,EAAE,MAAM,wBAAwB,CAAC;AACxE,OAAO,EAAoB,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC9D,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AACjD,OAAO,EAAE,aAAa,EAAE,MAAM,SAAS,CAAC;AAExC,MAAM,MAAM,gBAAgB,GAAG,CAC7B,UAAU,EAAE,GAAG,CAAC,SAAS,CAAC,CAAC,YAAY,CAAC,EACxC,MAAM,EAAE,GAAG,CAAC,yBAAyB,CAAC,CAAC,QAAQ,CAAC,EAChD,OAAO,EAAE;IACP,gBAAgB,EAAE,aAAa,CAAC;IAChC,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;IAChC,yBAAyB,EAAE,MAAM,CAAC;CACnC,KACE,OAAO,CAAC;IAAE,aAAa,EAAE,aAAa,CAAA;CAAE,CAAC,CAAC;AAE/C;;;;;;;;;;GAUG;AACH,eAAO,MAAM,gBAAgB,EAAE,gBAgD9B,CAAC"}
1
+ {"version":3,"file":"03-get-request-object.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/03-get-request-object.ts"],"names":[],"mappings":"AAAA,OAAO,EAAoB,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC9D,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AACjD,OAAO,EAAE,+BAA+B,EAAE,MAAM,SAAS,CAAC;AAE1D,MAAM,MAAM,gBAAgB,GAAG,CAC7B,UAAU,EAAE,GAAG,CAAC,SAAS,CAAC,CAAC,YAAY,CAAC,EACxC,OAAO,EAAE;IACP,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;IAChC,yBAAyB,EAAE,MAAM,CAAC;IAClC,kBAAkB,CAAC,EAAE,+BAA+B,CAAC;CACtD,KACE,OAAO,CAAC;IAAE,uBAAuB,EAAE,MAAM,CAAA;CAAE,CAAC,CAAC;AAElD;;;;;;;;;GASG;AACH,eAAO,MAAM,gBAAgB,EAAE,gBAsC9B,CAAC"}
@@ -0,0 +1,23 @@
1
+ import { JWK } from "../../utils/jwk";
2
+ import { RelyingPartyEntityConfiguration } from "../../trust/types";
3
+ /**
4
+ * Defines the signature for a function that retrieves JSON Web Key Sets (JWKS) from a client.
5
+ *
6
+ * @template T - The tuple type representing the function arguments.
7
+ * @param args - The arguments passed to the function.
8
+ * @returns A promise resolving to an object containing an array of JWKs.
9
+ */
10
+ export type FetchJwks<T extends Array<unknown> = []> = (...args: T) => {
11
+ keys: JWK[];
12
+ };
13
+ /**
14
+ * Retrieves the JSON Web Key Set (JWKS) from a Relying Party's entity configuration.
15
+ *
16
+ * @param rpConfig - The configuration object of the Relying Party entity.
17
+ * @returns An object containing an array of JWKs.
18
+ * @throws Will throw an error if the configuration is invalid or if JWKS is not found.
19
+ */
20
+ export declare const getJwksFromConfig: FetchJwks<[
21
+ RelyingPartyEntityConfiguration["payload"]["metadata"]
22
+ ]>;
23
+ //# sourceMappingURL=04-retrieve-rp-jwks.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"04-retrieve-rp-jwks.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/04-retrieve-rp-jwks.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,GAAG,EAAE,MAAM,iBAAiB,CAAC;AACtC,OAAO,EAAE,+BAA+B,EAAE,MAAM,mBAAmB,CAAC;AAEpE;;;;;;GAMG;AACH,MAAM,MAAM,SAAS,CAAC,CAAC,SAAS,KAAK,CAAC,OAAO,CAAC,GAAG,EAAE,IAAI,CAAC,GAAG,IAAI,EAAE,CAAC,KAAK;IACrE,IAAI,EAAE,GAAG,EAAE,CAAC;CACb,CAAC;AAEF;;;;;;GAMG;AACH,eAAO,MAAM,iBAAiB,EAAE,SAAS,CACvC;IAAC,+BAA+B,CAAC,SAAS,CAAC,CAAC,UAAU,CAAC;CAAC,CAWzD,CAAC"}
@@ -0,0 +1,18 @@
1
+ import type { RelyingPartyEntityConfiguration } from "../../trust";
2
+ import { RequestObject } from "./types";
3
+ export type VerifyRequestObject = (requestObjectEncodedJwt: string, context: {
4
+ clientId: string;
5
+ rpConf: RelyingPartyEntityConfiguration["payload"];
6
+ }) => Promise<{
7
+ requestObject: RequestObject;
8
+ }>;
9
+ /**
10
+ * Function to verify the Request Object's signature and the client ID.
11
+ * @param requestObjectEncodedJwt The Request Object in JWT format
12
+ * @param context.clientId The client ID to verify
13
+ * @param context.jwkKeys The set of keys to verify the signature
14
+ * @param context.rpConf The Entity Configuration of the Relying Party
15
+ * @returns The verified Request Object
16
+ */
17
+ export declare const verifyRequestObject: VerifyRequestObject;
18
+ //# sourceMappingURL=05-verify-request-object.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"05-verify-request-object.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/05-verify-request-object.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,+BAA+B,EAAE,MAAM,aAAa,CAAC;AAEnE,OAAO,EAAE,aAAa,EAAE,MAAM,SAAS,CAAC;AAGxC,MAAM,MAAM,mBAAmB,GAAG,CAChC,uBAAuB,EAAE,MAAM,EAC/B,OAAO,EAAE;IACP,QAAQ,EAAE,MAAM,CAAC;IAEjB,MAAM,EAAE,+BAA+B,CAAC,SAAS,CAAC,CAAC;CACpD,KACE,OAAO,CAAC;IAAE,aAAa,EAAE,aAAa,CAAA;CAAE,CAAC,CAAC;AAE/C;;;;;;;GAOG;AACH,eAAO,MAAM,mBAAmB,EAAE,mBA4BjC,CAAC"}
@@ -0,0 +1,21 @@
1
+ import { PresentationDefinition, RequestObject } from "./types";
2
+ import { RelyingPartyEntityConfiguration } from "../../trust/types";
3
+ export type FetchPresentationDefinition = (requestObject: RequestObject, rpConf?: RelyingPartyEntityConfiguration["payload"]["metadata"]) => Promise<{
4
+ presentationDefinition: PresentationDefinition;
5
+ }>;
6
+ /**
7
+ * Retrieves a PresentationDefinition based on the given parameters.
8
+ *
9
+ * The method attempts the following strategies in order:
10
+ * 1. Checks if `presentation_definition` is directly available in the request object.
11
+ * 2. Uses a pre-configured `presentation_definition` from the relying party configuration if the `scope` is present in the request object.
12
+ *
13
+ * If none of the above conditions are met, the function throws an error indicating the definition could not be found. Note that `presentation_definition_uri` is not supported in 0.9.x.
14
+ *
15
+ * @param {RequestObject} requestObject - The request object containing the presentation definition or references to it.
16
+ * @param {RelyingPartyEntityConfiguration["payload"]["metadata"]} [rpConf] - Optional relying party configuration.
17
+ * @returns {Promise<{ presentationDefinition: PresentationDefinition }>} - Resolves with the presentation definition.
18
+ * @throws {Error} - Throws if the presentation definition cannot be found or fetched.
19
+ */
20
+ export declare const fetchPresentDefinition: FetchPresentationDefinition;
21
+ //# sourceMappingURL=06-fetch-presentation-definition.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"06-fetch-presentation-definition.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/06-fetch-presentation-definition.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,sBAAsB,EAAE,aAAa,EAAE,MAAM,SAAS,CAAC;AAChE,OAAO,EAAE,+BAA+B,EAAE,MAAM,mBAAmB,CAAC;AAEpE,MAAM,MAAM,2BAA2B,GAAG,CACxC,aAAa,EAAE,aAAa,EAC5B,MAAM,CAAC,EAAE,+BAA+B,CAAC,SAAS,CAAC,CAAC,UAAU,CAAC,KAC5D,OAAO,CAAC;IACX,sBAAsB,EAAE,sBAAsB,CAAC;CAChD,CAAC,CAAC;AAEH;;;;;;;;;;;;;GAaG;AACH,eAAO,MAAM,sBAAsB,EAAE,2BAuBpC,CAAC"}
@@ -0,0 +1,20 @@
1
+ import { DcqlQuery } from "dcql";
2
+ import type { DisclosureWithEncoded } from "../../sd-jwt/types";
3
+ import type { RemotePresentation } from "./types";
4
+ type EvaluateDcqlQuery = (credentialsSdJwt: [string, string][], query: DcqlQuery.Input) => {
5
+ id: string;
6
+ credential: string;
7
+ keyTag: string;
8
+ requiredDisclosures: DisclosureWithEncoded[];
9
+ isOptional?: boolean;
10
+ }[];
11
+ type PrepareRemotePresentations = (credentials: {
12
+ id: string;
13
+ credential: string;
14
+ keyTag: string;
15
+ requestedClaims: string[];
16
+ }[], nonce: string, clientId: string) => Promise<RemotePresentation[]>;
17
+ export declare const evaluateDcqlQuery: EvaluateDcqlQuery;
18
+ export declare const prepareRemotePresentations: PrepareRemotePresentations;
19
+ export {};
20
+ //# sourceMappingURL=07-evaluate-dcql-query.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"07-evaluate-dcql-query.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/07-evaluate-dcql-query.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,SAAS,EAIV,MAAM,MAAM,CAAC;AAGd,OAAO,KAAK,EAAc,qBAAqB,EAAE,MAAM,oBAAoB,CAAC;AAG5E,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,SAAS,CAAC;AAElD,KAAK,iBAAiB,GAAG,CACvB,gBAAgB,EAAE,CAAC,MAAM,EAAe,MAAM,CAAkB,EAAE,EAClE,KAAK,EAAE,SAAS,CAAC,KAAK,KACnB;IACH,EAAE,EAAE,MAAM,CAAC;IACX,UAAU,EAAE,MAAM,CAAC;IACnB,MAAM,EAAE,MAAM,CAAC;IACf,mBAAmB,EAAE,qBAAqB,EAAE,CAAC;IAC7C,UAAU,CAAC,EAAE,OAAO,CAAC;CACtB,EAAE,CAAC;AAEJ,KAAK,0BAA0B,GAAG,CAChC,WAAW,EAAE;IACX,EAAE,EAAE,MAAM,CAAC;IACX,UAAU,EAAE,MAAM,CAAC;IACnB,MAAM,EAAE,MAAM,CAAC;IACf,eAAe,EAAE,MAAM,EAAE,CAAC;CAC3B,EAAE,EACH,KAAK,EAAE,MAAM,EACb,QAAQ,EAAE,MAAM,KACb,OAAO,CAAC,kBAAkB,EAAE,CAAC,CAAC;AAyCnC,eAAO,MAAM,iBAAiB,EAAE,iBAoE/B,CAAC;AAEF,eAAO,MAAM,0BAA0B,EAAE,0BAqBxC,CAAC"}
@@ -0,0 +1,88 @@
1
+ import { InputDescriptor, type LegacyRemotePresentation } from "./types";
2
+ import { SdJwt4VC, type DisclosureWithEncoded } from "../../sd-jwt/types";
3
+ export type EvaluatedDisclosures = {
4
+ requiredDisclosures: DisclosureWithEncoded[];
5
+ optionalDisclosures: DisclosureWithEncoded[];
6
+ unrequestedDisclosures: DisclosureWithEncoded[];
7
+ };
8
+ export type EvaluateInputDescriptorSdJwt4VC = (inputDescriptor: InputDescriptor, payloadCredential: SdJwt4VC["payload"], disclosures: DisclosureWithEncoded[]) => EvaluatedDisclosures;
9
+ export type EvaluateInputDescriptors = (descriptors: InputDescriptor[], credentialsSdJwt: [string, string][]) => Promise<{
10
+ evaluatedDisclosure: EvaluatedDisclosures;
11
+ inputDescriptor: InputDescriptor;
12
+ credential: string;
13
+ keyTag: string;
14
+ }[]>;
15
+ export type PrepareRemotePresentations = (credentialAndDescriptors: {
16
+ requestedClaims: string[];
17
+ inputDescriptor: InputDescriptor;
18
+ credential: string;
19
+ keyTag: string;
20
+ }[], nonce: string, client_id: string) => Promise<LegacyRemotePresentation[]>;
21
+ /**
22
+ * Evaluates an InputDescriptor for an SD-JWT-based verifiable credential.
23
+ *
24
+ * - Checks each field in the InputDescriptor against the provided `payloadCredential`
25
+ * and `disclosures` (selectively disclosed claims).
26
+ * - Validates whether required fields are present (unless marked optional)
27
+ * and match any specified JSONPath.
28
+ * - If a field includes a JSON Schema filter, validates the claim value against that schema.
29
+ * - Enforces `limit_disclosure` rules by returning only disclosures, required and optional, matching the specified fields
30
+ * if set to "required". Otherwise also return the array unrequestedDisclosures with disclosures which can be passed for a particular use case.
31
+ * - Throws an error if a required field is invalid or missing.
32
+ *
33
+ * @param inputDescriptor - Describes constraints (fields, filters, etc.) that must be satisfied.
34
+ * @param payloadCredential - The credential payload to check against.
35
+ * @param disclosures - An array of DisclosureWithEncoded objects representing selective disclosures.
36
+ * @returns A filtered list of disclosures satisfying the descriptor constraints, or throws an error if not.
37
+ * @throws Will throw an error if any required constraint fails or if JSONPath lookups are invalid.
38
+ */
39
+ export declare const evaluateInputDescriptorForSdJwt4VC: EvaluateInputDescriptorSdJwt4VC;
40
+ type DecodedCredentialSdJwt = {
41
+ keyTag: string;
42
+ credential: string;
43
+ sdJwt: SdJwt4VC;
44
+ disclosures: DisclosureWithEncoded[];
45
+ };
46
+ /**
47
+ * Finds the first credential that satisfies the input descriptor constraints.
48
+ * @param inputDescriptor The input descriptor to evaluate.
49
+ * @param decodedSdJwtCredentials An array of decoded SD-JWT credentials.
50
+ * @returns An object containing the matched evaluation, keyTag, and credential.
51
+ */
52
+ export declare const findCredentialSdJwt: (inputDescriptor: InputDescriptor, decodedSdJwtCredentials: DecodedCredentialSdJwt[]) => {
53
+ matchedEvaluation: EvaluatedDisclosures;
54
+ matchedKeyTag: string;
55
+ matchedCredential: string;
56
+ };
57
+ /**
58
+ * Evaluates multiple input descriptors against provided SD-JWT and MDOC credentials.
59
+ *
60
+ * For each input descriptor, this function:
61
+ * - Checks the credential format.
62
+ * - Decodes the credential.
63
+ * - Evaluates the descriptor using the associated disclosures.
64
+ *
65
+ * @param inputDescriptors - An array of input descriptors.
66
+ * @param credentialsSdJwt - An array of tuples containing keyTag and SD-JWT credential.
67
+ * @returns An array of objects, each containing the evaluated disclosures,
68
+ * the input descriptor, the credential, and the keyTag.
69
+ * @throws {CredentialNotFoundError} When the credential format is unsupported.
70
+ */
71
+ export declare const evaluateInputDescriptors: EvaluateInputDescriptors;
72
+ /**
73
+ * Prepares remote presentations for a set of credentials based on input descriptors.
74
+ *
75
+ * For each credential and its corresponding input descriptor, this function:
76
+ * - Validates the credential format.
77
+ * - Generates a verifiable presentation token (vpToken) using the provided nonce and client identifier.
78
+ *
79
+ * @param credentialAndDescriptors - An array containing objects with requested claims,
80
+ * input descriptor, credential, and keyTag.
81
+ * @param nonce - A unique nonce for the verifiable presentation token.
82
+ * @param client_id - The client identifier.
83
+ * @returns A promise that resolves to an array of RemotePresentation objects.
84
+ * @throws {CredentialNotFoundError} When the credential format is unsupported.
85
+ */
86
+ export declare const prepareRemotePresentations: PrepareRemotePresentations;
87
+ export {};
88
+ //# sourceMappingURL=07-evaluate-input-descriptor.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"07-evaluate-input-descriptor.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/07-evaluate-input-descriptor.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,KAAK,wBAAwB,EAAE,MAAM,SAAS,CAAC;AACzE,OAAO,EAAE,QAAQ,EAAE,KAAK,qBAAqB,EAAE,MAAM,oBAAoB,CAAC;AAU1E,MAAM,MAAM,oBAAoB,GAAG;IACjC,mBAAmB,EAAE,qBAAqB,EAAE,CAAC;IAC7C,mBAAmB,EAAE,qBAAqB,EAAE,CAAC;IAC7C,sBAAsB,EAAE,qBAAqB,EAAE,CAAC;CACjD,CAAC;AAEF,MAAM,MAAM,+BAA+B,GAAG,CAC5C,eAAe,EAAE,eAAe,EAChC,iBAAiB,EAAE,QAAQ,CAAC,SAAS,CAAC,EACtC,WAAW,EAAE,qBAAqB,EAAE,KACjC,oBAAoB,CAAC;AAE1B,MAAM,MAAM,wBAAwB,GAAG,CACrC,WAAW,EAAE,eAAe,EAAE,EAC9B,gBAAgB,EAAE,CAAC,MAAM,EAAe,MAAM,CAAkB,EAAE,KAC/D,OAAO,CACV;IACE,mBAAmB,EAAE,oBAAoB,CAAC;IAC1C,eAAe,EAAE,eAAe,CAAC;IACjC,UAAU,EAAE,MAAM,CAAC;IACnB,MAAM,EAAE,MAAM,CAAC;CAChB,EAAE,CACJ,CAAC;AAEF,MAAM,MAAM,0BAA0B,GAAG,CACvC,wBAAwB,EAAE;IACxB,eAAe,EAAE,MAAM,EAAE,CAAC;IAC1B,eAAe,EAAE,eAAe,CAAC;IACjC,UAAU,EAAE,MAAM,CAAC;IACnB,MAAM,EAAE,MAAM,CAAC;CAChB,EAAE,EACH,KAAK,EAAE,MAAM,EACb,SAAS,EAAE,MAAM,KACd,OAAO,CAAC,wBAAwB,EAAE,CAAC,CAAC;AA+EzC;;;;;;;;;;;;;;;;;GAiBG;AACH,eAAO,MAAM,kCAAkC,EAAE,+BAsG9C,CAAC;AAEJ,KAAK,sBAAsB,GAAG;IAC5B,MAAM,EAAE,MAAM,CAAC;IACf,UAAU,EAAE,MAAM,CAAC;IACnB,KAAK,EAAE,QAAQ,CAAC;IAChB,WAAW,EAAE,qBAAqB,EAAE,CAAC;CACtC,CAAC;AAEF;;;;;GAKG;AACH,eAAO,MAAM,mBAAmB,oBACb,eAAe,2BACP,sBAAsB,EAAE,KAChD;IACD,iBAAiB,EAAE,oBAAoB,CAAC;IACxC,aAAa,EAAE,MAAM,CAAC;IACtB,iBAAiB,EAAE,MAAM,CAAC;CA6B3B,CAAC;AAEF;;;;;;;;;;;;;GAaG;AACH,eAAO,MAAM,wBAAwB,EAAE,wBAoCtC,CAAC;AAEF;;;;;;;;;;;;;GAaG;AACH,eAAO,MAAM,0BAA0B,EAAE,0BA6BxC,CAAC"}
@@ -0,0 +1,70 @@
1
+ import { type FetchJwks } from "./04-retrieve-rp-jwks";
2
+ import type { VerifyRequestObject } from "./05-verify-request-object";
3
+ import { type Out } from "../../utils/misc";
4
+ import { type RemotePresentation, DirectAuthorizationBodyPayload, type LegacyRemotePresentation, LegacyDirectAuthorizationBodyPayload } from "./types";
5
+ import * as z from "zod";
6
+ import type { JWK } from "../../utils/jwk";
7
+ import type { RelyingPartyEntityConfiguration } from "../../trust";
8
+ export type AuthorizationResponse = z.infer<typeof AuthorizationResponse>;
9
+ export declare const AuthorizationResponse: z.ZodObject<{
10
+ status: z.ZodOptional<z.ZodString>;
11
+ response_code: z.ZodOptional<z.ZodString>;
12
+ redirect_uri: z.ZodOptional<z.ZodString>;
13
+ }, "strip", z.ZodTypeAny, {
14
+ status?: string | undefined;
15
+ response_code?: string | undefined;
16
+ redirect_uri?: string | undefined;
17
+ }, {
18
+ status?: string | undefined;
19
+ response_code?: string | undefined;
20
+ redirect_uri?: string | undefined;
21
+ }>;
22
+ /**
23
+ * Selects a public key (with `use = enc`) from the set of JWK keys
24
+ * offered by the Relying Party (RP) for encryption.
25
+ *
26
+ * @param rpJwkKeys - The array of JWKs retrieved from the RP entity configuration.
27
+ * @returns The first suitable public key found in the list.
28
+ * @throws {NoSuitableKeysFoundInEntityConfiguration} If no suitable encryption key is found.
29
+ */
30
+ export declare const choosePublicKeyToEncrypt: (rpJwkKeys: Out<FetchJwks>["keys"]) => JWK;
31
+ /**
32
+ * Builds a URL-encoded form body for a direct POST response using JWT encryption.
33
+ *
34
+ * @param jwkKeys - Array of JWKs from the Relying Party for encryption.
35
+ * @param requestObject - Contains state, nonce, and other relevant info.
36
+ * @param payload - Object that contains the VP token to encrypt and the mapping of the credential disclosures
37
+ * @returns A URL-encoded string for an `application/x-www-form-urlencoded` POST body, where `response` contains the encrypted JWE.
38
+ */
39
+ export declare const buildDirectPostJwtBody: (requestObject: Out<VerifyRequestObject>["requestObject"], rpConf: RelyingPartyEntityConfiguration["payload"], payload: DirectAuthorizationBodyPayload | LegacyDirectAuthorizationBodyPayload) => Promise<string>;
40
+ /**
41
+ * Type definition for the function that sends the authorization response
42
+ * to the Relying Party, completing the presentation flow.
43
+ * Use with `presentation_definition`.
44
+ * @deprecated Use `sendAuthorizationResponse`
45
+ */
46
+ export type SendLegacyAuthorizationResponse = (requestObject: Out<VerifyRequestObject>["requestObject"], presentationDefinitionId: string, remotePresentations: LegacyRemotePresentation[], rpConf: RelyingPartyEntityConfiguration["payload"], context?: {
47
+ appFetch?: GlobalFetch["fetch"];
48
+ }) => Promise<AuthorizationResponse>;
49
+ /**
50
+ * Sends the authorization response to the Relying Party (RP) using the specified `response_mode`.
51
+ * This function completes the presentation flow in an OpenID 4 Verifiable Presentations scenario.
52
+ *
53
+ * @param requestObject - The request details, including presentation requirements.
54
+ * @param presentationDefinition - The definition of the expected presentation.
55
+ * @param jwkKeys - Array of JWKs from the Relying Party for optional encryption.
56
+ * @param presentation - Tuple with verifiable credential, claims, and crypto context.
57
+ * @param context - Contains optional custom fetch implementation.
58
+ * @returns Parsed and validated authorization response from the Relying Party.
59
+ */
60
+ export declare const sendLegacyAuthorizationResponse: SendLegacyAuthorizationResponse;
61
+ /**
62
+ * Type definition for the function that sends the authorization response
63
+ * to the Relying Party, completing the presentation flow.
64
+ * Use with DCQL queries.
65
+ */
66
+ export type SendAuthorizationResponse = (requestObject: Out<VerifyRequestObject>["requestObject"], remotePresentations: RemotePresentation[], rpConf: RelyingPartyEntityConfiguration["payload"], context?: {
67
+ appFetch?: GlobalFetch["fetch"];
68
+ }) => Promise<AuthorizationResponse>;
69
+ export declare const sendAuthorizationResponse: SendAuthorizationResponse;
70
+ //# sourceMappingURL=08-send-authorization-response.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"08-send-authorization-response.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/08-send-authorization-response.ts"],"names":[],"mappings":"AAEA,OAAO,EAAqB,KAAK,SAAS,EAAE,MAAM,uBAAuB,CAAC;AAC1E,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AAEtE,OAAO,EAAoB,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC9D,OAAO,EACL,KAAK,kBAAkB,EACvB,8BAA8B,EAC9B,KAAK,wBAAwB,EAC7B,oCAAoC,EACrC,MAAM,SAAS,CAAC;AACjB,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AACzB,OAAO,KAAK,EAAE,GAAG,EAAE,MAAM,iBAAiB,CAAC;AAC3C,OAAO,KAAK,EAAE,+BAA+B,EAAE,MAAM,aAAa,CAAC;AAEnE,MAAM,MAAM,qBAAqB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,qBAAqB,CAAC,CAAC;AAC1E,eAAO,MAAM,qBAAqB;;;;;;;;;;;;EAUhC,CAAC;AAEH;;;;;;;GAOG;AACH,eAAO,MAAM,wBAAwB,cACxB,IAAI,SAAS,CAAC,CAAC,MAAM,CAAC,KAChC,GAWF,CAAC;AAEF;;;;;;;GAOG;AACH,eAAO,MAAM,sBAAsB,kBAClB,IAAI,mBAAmB,CAAC,CAAC,eAAe,CAAC,UAChD,+BAA+B,CAAC,SAAS,CAAC,WACzC,8BAA8B,GAAG,oCAAoC,KAC7E,QAAQ,MAAM,CAgChB,CAAC;AAEF;;;;;GAKG;AACH,MAAM,MAAM,+BAA+B,GAAG,CAC5C,aAAa,EAAE,GAAG,CAAC,mBAAmB,CAAC,CAAC,eAAe,CAAC,EACxD,wBAAwB,EAAE,MAAM,EAChC,mBAAmB,EAAE,wBAAwB,EAAE,EAC/C,MAAM,EAAE,+BAA+B,CAAC,SAAS,CAAC,EAClD,OAAO,CAAC,EAAE;IACR,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;CACjC,KACE,OAAO,CAAC,qBAAqB,CAAC,CAAC;AAEpC;;;;;;;;;;GAUG;AACH,eAAO,MAAM,+BAA+B,EAAE,+BAkD3C,CAAC;AAEJ;;;;GAIG;AACH,MAAM,MAAM,yBAAyB,GAAG,CACtC,aAAa,EAAE,GAAG,CAAC,mBAAmB,CAAC,CAAC,eAAe,CAAC,EACxD,mBAAmB,EAAE,kBAAkB,EAAE,EACzC,MAAM,EAAE,+BAA+B,CAAC,SAAS,CAAC,EAClD,OAAO,CAAC,EAAE;IACR,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;CACjC,KACE,OAAO,CAAC,qBAAqB,CAAC,CAAC;AAEpC,eAAO,MAAM,yBAAyB,EAAE,yBA4BvC,CAAC"}
@@ -22,4 +22,48 @@ export declare class NoSuitableKeysFoundInEntityConfiguration extends IoWalletEr
22
22
  */
23
23
  constructor(scenario: string);
24
24
  }
25
+ /**
26
+ * When a QR code is not valid.
27
+ *
28
+ */
29
+ export declare class InvalidQRCodeError extends IoWalletError {
30
+ code: string;
31
+ /**
32
+ * @param detail A description of why the QR code is considered invalid.
33
+ */
34
+ constructor(detail: string);
35
+ }
36
+ /**
37
+ * When the entity is unverified because the Relying Party is not trusted.
38
+ *
39
+ */
40
+ export declare class UnverifiedEntityError extends IoWalletError {
41
+ code: string;
42
+ /**
43
+ * @param reason A description of why the entity cannot be verified.
44
+ */
45
+ constructor(reason: string);
46
+ }
47
+ /**
48
+ * When some required data is missing to continue because certain attributes are not contained inside the wallet.
49
+ *
50
+ */
51
+ export declare class MissingDataError extends IoWalletError {
52
+ code: string;
53
+ /**
54
+ * @param missingAttributes An array or description of the attributes that are missing.
55
+ */
56
+ constructor(missingAttributes: string);
57
+ }
58
+ /**
59
+ * When a credential is not found in the wallet.
60
+ *
61
+ */
62
+ export declare class CredentialNotFoundError extends IoWalletError {
63
+ code: string;
64
+ /**
65
+ * @param credentialId The ID of the credential that was not found.
66
+ */
67
+ constructor(credentialId: string);
68
+ }
25
69
  //# sourceMappingURL=errors.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"errors.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/errors.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,aAAa,EAAkB,MAAM,oBAAoB,CAAC;AAEnE;;;GAGG;AACH,qBAAa,sBAAuB,SAAQ,aAAa;IACvD,IAAI,SAAwD;IAE5D,iDAAiD;IACjD,KAAK,EAAE,MAAM,CAAC;IAEd,8CAA8C;IAC9C,MAAM,EAAE,MAAM,CAAC;gBAGb,OAAO,EAAE,MAAM,EACf,KAAK,GAAE,MAAsB,EAC7B,MAAM,GAAE,MAAsB;CAMjC;AAED;;;GAGG;AACH,qBAAa,wCAAyC,SAAQ,aAAa;IACzE,IAAI,SAAoC;IAExC;;OAEG;gBACS,QAAQ,EAAE,MAAM;CAI7B"}
1
+ {"version":3,"file":"errors.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/errors.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,aAAa,EAAkB,MAAM,oBAAoB,CAAC;AAEnE;;;GAGG;AACH,qBAAa,sBAAuB,SAAQ,aAAa;IACvD,IAAI,SAAwD;IAE5D,iDAAiD;IACjD,KAAK,EAAE,MAAM,CAAC;IAEd,8CAA8C;IAC9C,MAAM,EAAE,MAAM,CAAC;gBAGb,OAAO,EAAE,MAAM,EACf,KAAK,GAAE,MAAsB,EAC7B,MAAM,GAAE,MAAsB;CAMjC;AAED;;;GAGG;AACH,qBAAa,wCAAyC,SAAQ,aAAa;IACzE,IAAI,SAAoC;IAExC;;OAEG;gBACS,QAAQ,EAAE,MAAM;CAI7B;AAED;;;GAGG;AACH,qBAAa,kBAAmB,SAAQ,aAAa;IACnD,IAAI,SAAyB;IAE7B;;OAEG;gBACS,MAAM,EAAE,MAAM;CAI3B;AAED;;;GAGG;AACH,qBAAa,qBAAsB,SAAQ,aAAa;IACtD,IAAI,SAA8B;IAElC;;OAEG;gBACS,MAAM,EAAE,MAAM;CAI3B;AAED;;;GAGG;AACH,qBAAa,gBAAiB,SAAQ,aAAa;IACjD,IAAI,SAAsB;IAE1B;;OAEG;gBACS,iBAAiB,EAAE,MAAM;CAItC;AAED;;;GAGG;AACH,qBAAa,uBAAwB,SAAQ,aAAa;IACxD,IAAI,SAA8B;IAElC;;OAEG;gBACS,YAAY,EAAE,MAAM;CAIjC"}