@pagopa/io-react-native-wallet 1.3.0 → 1.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (100) hide show
  1. package/lib/commonjs/credential/issuance/06-obtain-credential.js +8 -2
  2. package/lib/commonjs/credential/issuance/06-obtain-credential.js.map +1 -1
  3. package/lib/commonjs/credential/issuance/07-verify-and-parse-credential.js +147 -3
  4. package/lib/commonjs/credential/issuance/07-verify-and-parse-credential.js.map +1 -1
  5. package/lib/commonjs/credential/issuance/const.js +1 -1
  6. package/lib/commonjs/credential/issuance/const.js.map +1 -1
  7. package/lib/commonjs/credential/issuance/types.js +1 -1
  8. package/lib/commonjs/credential/issuance/types.js.map +1 -1
  9. package/lib/commonjs/credential/presentation/03-get-request-object.js +7 -25
  10. package/lib/commonjs/credential/presentation/03-get-request-object.js.map +1 -1
  11. package/lib/commonjs/credential/presentation/07-evaluate-input-descriptor.js +1 -1
  12. package/lib/commonjs/credential/presentation/07-evaluate-input-descriptor.js.map +1 -1
  13. package/lib/commonjs/credential/presentation/08-send-authorization-response.js +52 -12
  14. package/lib/commonjs/credential/presentation/08-send-authorization-response.js.map +1 -1
  15. package/lib/commonjs/credential/presentation/README.md +1 -3
  16. package/lib/commonjs/credential/presentation/index.js +6 -0
  17. package/lib/commonjs/credential/presentation/index.js.map +1 -1
  18. package/lib/commonjs/credential/presentation/types.js +19 -1
  19. package/lib/commonjs/credential/presentation/types.js.map +1 -1
  20. package/lib/commonjs/entity/openid-connect/issuer/types.js +10 -7
  21. package/lib/commonjs/entity/openid-connect/issuer/types.js.map +1 -1
  22. package/lib/commonjs/entity/trust/types.js +1 -1
  23. package/lib/commonjs/entity/trust/types.js.map +1 -1
  24. package/lib/commonjs/mdoc/converters.js +26 -0
  25. package/lib/commonjs/mdoc/converters.js.map +1 -0
  26. package/lib/commonjs/mdoc/index.js +28 -0
  27. package/lib/commonjs/mdoc/index.js.map +1 -0
  28. package/lib/commonjs/utils/string.js +13 -1
  29. package/lib/commonjs/utils/string.js.map +1 -1
  30. package/lib/module/credential/issuance/06-obtain-credential.js +8 -2
  31. package/lib/module/credential/issuance/06-obtain-credential.js.map +1 -1
  32. package/lib/module/credential/issuance/07-verify-and-parse-credential.js +147 -3
  33. package/lib/module/credential/issuance/07-verify-and-parse-credential.js.map +1 -1
  34. package/lib/module/credential/issuance/const.js +1 -1
  35. package/lib/module/credential/issuance/const.js.map +1 -1
  36. package/lib/module/credential/issuance/types.js +1 -1
  37. package/lib/module/credential/issuance/types.js.map +1 -1
  38. package/lib/module/credential/presentation/03-get-request-object.js +7 -24
  39. package/lib/module/credential/presentation/03-get-request-object.js.map +1 -1
  40. package/lib/module/credential/presentation/07-evaluate-input-descriptor.js +1 -1
  41. package/lib/module/credential/presentation/07-evaluate-input-descriptor.js.map +1 -1
  42. package/lib/module/credential/presentation/08-send-authorization-response.js +51 -11
  43. package/lib/module/credential/presentation/08-send-authorization-response.js.map +1 -1
  44. package/lib/module/credential/presentation/README.md +1 -3
  45. package/lib/module/credential/presentation/index.js +2 -2
  46. package/lib/module/credential/presentation/index.js.map +1 -1
  47. package/lib/module/credential/presentation/types.js +18 -0
  48. package/lib/module/credential/presentation/types.js.map +1 -1
  49. package/lib/module/entity/openid-connect/issuer/types.js +7 -6
  50. package/lib/module/entity/openid-connect/issuer/types.js.map +1 -1
  51. package/lib/module/entity/trust/types.js +1 -1
  52. package/lib/module/entity/trust/types.js.map +1 -1
  53. package/lib/module/mdoc/converters.js +20 -0
  54. package/lib/module/mdoc/converters.js.map +1 -0
  55. package/lib/module/mdoc/index.js +21 -0
  56. package/lib/module/mdoc/index.js.map +1 -0
  57. package/lib/module/utils/string.js +12 -0
  58. package/lib/module/utils/string.js.map +1 -1
  59. package/lib/typescript/credential/issuance/06-obtain-credential.d.ts.map +1 -1
  60. package/lib/typescript/credential/issuance/07-verify-and-parse-credential.d.ts.map +1 -1
  61. package/lib/typescript/credential/issuance/const.d.ts +1 -1
  62. package/lib/typescript/credential/issuance/const.d.ts.map +1 -1
  63. package/lib/typescript/credential/issuance/types.d.ts +7 -7
  64. package/lib/typescript/credential/presentation/03-get-request-object.d.ts +2 -8
  65. package/lib/typescript/credential/presentation/03-get-request-object.d.ts.map +1 -1
  66. package/lib/typescript/credential/presentation/07-evaluate-input-descriptor.d.ts.map +1 -1
  67. package/lib/typescript/credential/presentation/08-send-authorization-response.d.ts +23 -7
  68. package/lib/typescript/credential/presentation/08-send-authorization-response.d.ts.map +1 -1
  69. package/lib/typescript/credential/presentation/index.d.ts +3 -3
  70. package/lib/typescript/credential/presentation/index.d.ts.map +1 -1
  71. package/lib/typescript/credential/presentation/types.d.ts +26 -0
  72. package/lib/typescript/credential/presentation/types.d.ts.map +1 -1
  73. package/lib/typescript/entity/openid-connect/issuer/types.d.ts +177 -41
  74. package/lib/typescript/entity/openid-connect/issuer/types.d.ts.map +1 -1
  75. package/lib/typescript/entity/trust/index.d.ts +2 -2
  76. package/lib/typescript/entity/trust/types.d.ts +22 -22
  77. package/lib/typescript/mdoc/converters.d.ts +8 -0
  78. package/lib/typescript/mdoc/converters.d.ts.map +1 -0
  79. package/lib/typescript/mdoc/index.d.ts +6 -0
  80. package/lib/typescript/mdoc/index.d.ts.map +1 -0
  81. package/lib/typescript/sd-jwt/index.d.ts +4 -4
  82. package/lib/typescript/sd-jwt/types.d.ts +5 -5
  83. package/lib/typescript/utils/string.d.ts +7 -0
  84. package/lib/typescript/utils/string.d.ts.map +1 -1
  85. package/package.json +3 -1
  86. package/src/credential/issuance/06-obtain-credential.ts +14 -5
  87. package/src/credential/issuance/07-verify-and-parse-credential.ts +201 -1
  88. package/src/credential/issuance/const.ts +1 -1
  89. package/src/credential/issuance/types.ts +1 -1
  90. package/src/credential/presentation/03-get-request-object.ts +4 -29
  91. package/src/credential/presentation/07-evaluate-input-descriptor.ts +2 -5
  92. package/src/credential/presentation/08-send-authorization-response.ts +70 -22
  93. package/src/credential/presentation/README.md +1 -3
  94. package/src/credential/presentation/index.ts +4 -0
  95. package/src/credential/presentation/types.ts +26 -0
  96. package/src/entity/openid-connect/issuer/types.ts +18 -10
  97. package/src/entity/trust/types.ts +1 -1
  98. package/src/mdoc/converters.ts +26 -0
  99. package/src/mdoc/index.ts +28 -0
  100. package/src/utils/string.ts +12 -0
@@ -1 +1 @@
1
- {"version":3,"file":"07-verify-and-parse-credential.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/07-verify-and-parse-credential.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AACjE,OAAO,KAAK,EAAE,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,wBAAwB,CAAC;AAM9D,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,wBAAwB,CAAC;AAE/D,MAAM,MAAM,wBAAwB,GAAG,CACrC,UAAU,EAAE,GAAG,CAAC,eAAe,CAAC,CAAC,YAAY,CAAC,EAC9C,UAAU,EAAE,GAAG,CAAC,gBAAgB,CAAC,CAAC,YAAY,CAAC,EAC/C,MAAM,EAAE,GAAG,CAAC,gBAAgB,CAAC,CAAC,QAAQ,CAAC,EACvC,OAAO,EAAE;IACP,uBAAuB,EAAE,aAAa,CAAC;IACvC;;OAEG;IACH,uBAAuB,CAAC,EAAE,OAAO,CAAC;IAClC;;OAEG;IACH,0BAA0B,CAAC,EAAE,OAAO,CAAC;CACtC,KACE,OAAO,CAAC;IACX,gBAAgB,EAAE,gBAAgB,CAAC;IACnC,UAAU,EAAE,IAAI,CAAC;IACjB,QAAQ,EAAE,IAAI,GAAG,SAAS,CAAC;CAC5B,CAAC,CAAC;AAGH,KAAK,gBAAgB,GAAG,MAAM;AAC5B,oBAAoB;AACpB,MAAM,EACN;IACE,2CAA2C;IAC3C,IAAI,EACA,yBAAyB,CAAC,MAAM,CAC9B,MAAM,EACN,MAAM,CACP,GACD,4BAA4B,CAAC,MAAM,GACnC,SAAS,CAAC;IACd,wCAAwC;IACxC,KAAK,EAAE,OAAO,CAAC;CAChB,CACF,CAAC;AAkLF;;;;;;;;;;;;GAYG;AACH,eAAO,MAAM,wBAAwB,EAAE,wBAgBtC,CAAC"}
1
+ {"version":3,"file":"07-verify-and-parse-credential.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/07-verify-and-parse-credential.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AAEjE,OAAO,KAAK,EAAE,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,wBAAwB,CAAC;AAO9D,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,wBAAwB,CAAC;AAO/D,MAAM,MAAM,wBAAwB,GAAG,CACrC,UAAU,EAAE,GAAG,CAAC,eAAe,CAAC,CAAC,YAAY,CAAC,EAC9C,UAAU,EAAE,GAAG,CAAC,gBAAgB,CAAC,CAAC,YAAY,CAAC,EAC/C,MAAM,EAAE,GAAG,CAAC,gBAAgB,CAAC,CAAC,QAAQ,CAAC,EACvC,OAAO,EAAE;IACP,uBAAuB,EAAE,aAAa,CAAC;IACvC;;OAEG;IACH,uBAAuB,CAAC,EAAE,OAAO,CAAC;IAClC;;OAEG;IACH,0BAA0B,CAAC,EAAE,OAAO,CAAC;CACtC,KACE,OAAO,CAAC;IACX,gBAAgB,EAAE,gBAAgB,CAAC;IACnC,UAAU,EAAE,IAAI,CAAC;IACjB,QAAQ,EAAE,IAAI,GAAG,SAAS,CAAC;CAC5B,CAAC,CAAC;AAGH,KAAK,gBAAgB,GAAG,MAAM;AAC5B,oBAAoB;AACpB,MAAM,EACN;IACE,2CAA2C;IAC3C,IAAI,EACA,yBAAyB,CAAC,MAAM,CAC9B,MAAM,EACN,MAAM,CACP,GACD,4BAA4B,CAAC,MAAM,GACnC,SAAS,CAAC;IACd,wCAAwC;IACxC,KAAK,EAAE,OAAO,CAAC;CAChB,CACF,CAAC;AA2WF;;;;;;;;;;;;GAYG;AACH,eAAO,MAAM,wBAAwB,EAAE,wBAwBtC,CAAC"}
@@ -1,5 +1,5 @@
1
1
  import * as z from "zod";
2
2
  export declare const ASSERTION_TYPE = "urn:ietf:params:oauth:client-assertion-type:jwt-client-attestation";
3
3
  export type SupportedCredentialFormat = z.infer<typeof SupportedCredentialFormat>;
4
- export declare const SupportedCredentialFormat: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"vc+mdoc-cbor">]>;
4
+ export declare const SupportedCredentialFormat: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"mso_mdoc">]>;
5
5
  //# sourceMappingURL=const.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"const.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/const.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AACzB,eAAO,MAAM,cAAc,uEAC2C,CAAC;AAEvE,MAAM,MAAM,yBAAyB,GAAG,CAAC,CAAC,KAAK,CAC7C,OAAO,yBAAyB,CACjC,CAAC;AACF,eAAO,MAAM,yBAAyB,uEAGpC,CAAC"}
1
+ {"version":3,"file":"const.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/const.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AACzB,eAAO,MAAM,cAAc,uEAC2C,CAAC;AAEvE,MAAM,MAAM,yBAAyB,GAAG,CAAC,CAAC,KAAK,CAC7C,OAAO,yBAAyB,CACjC,CAAC;AACF,eAAO,MAAM,yBAAyB,mEAGpC,CAAC"}
@@ -2,7 +2,7 @@ import * as z from "zod";
2
2
  export type TokenResponse = z.infer<typeof TokenResponse>;
3
3
  export declare const TokenResponse: z.ZodObject<{
4
4
  access_token: z.ZodString;
5
- authorization_details: z.ZodObject<{
5
+ authorization_details: z.ZodArray<z.ZodObject<{
6
6
  credential_configuration_id: z.ZodString;
7
7
  type: z.ZodLiteral<"openid_credential">;
8
8
  }, "strip", z.ZodTypeAny, {
@@ -11,7 +11,7 @@ export declare const TokenResponse: z.ZodObject<{
11
11
  }, {
12
12
  type: "openid_credential";
13
13
  credential_configuration_id: string;
14
- }>;
14
+ }>, "many">;
15
15
  c_nonce: z.ZodString;
16
16
  c_nonce_expires_in: z.ZodNumber;
17
17
  expires_in: z.ZodNumber;
@@ -20,7 +20,7 @@ export declare const TokenResponse: z.ZodObject<{
20
20
  authorization_details: {
21
21
  type: "openid_credential";
22
22
  credential_configuration_id: string;
23
- };
23
+ }[];
24
24
  access_token: string;
25
25
  c_nonce: string;
26
26
  c_nonce_expires_in: number;
@@ -30,7 +30,7 @@ export declare const TokenResponse: z.ZodObject<{
30
30
  authorization_details: {
31
31
  type: "openid_credential";
32
32
  credential_configuration_id: string;
33
- };
33
+ }[];
34
34
  access_token: string;
35
35
  c_nonce: string;
36
36
  c_nonce_expires_in: number;
@@ -42,14 +42,14 @@ export declare const CredentialResponse: z.ZodObject<{
42
42
  c_nonce: z.ZodString;
43
43
  c_nonce_expires_in: z.ZodNumber;
44
44
  credential: z.ZodString;
45
- format: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"vc+mdoc-cbor">]>;
45
+ format: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"mso_mdoc">]>;
46
46
  }, "strip", z.ZodTypeAny, {
47
- format: "vc+sd-jwt" | "vc+mdoc-cbor";
47
+ format: "vc+sd-jwt" | "mso_mdoc";
48
48
  c_nonce: string;
49
49
  c_nonce_expires_in: number;
50
50
  credential: string;
51
51
  }, {
52
- format: "vc+sd-jwt" | "vc+mdoc-cbor";
52
+ format: "vc+sd-jwt" | "mso_mdoc";
53
53
  c_nonce: string;
54
54
  c_nonce_expires_in: number;
55
55
  credential: string;
@@ -1,10 +1,7 @@
1
- import { type CryptoContext } from "@pagopa/io-react-native-jwt";
2
1
  import { type Out } from "../../utils/misc";
3
2
  import type { StartFlow } from "./01-start-flow";
4
- export type GetRequestObject = (requestUri: Out<StartFlow>["requestUri"], context: {
5
- wiaCryptoContext: CryptoContext;
3
+ export type GetRequestObject = (requestUri: Out<StartFlow>["requestUri"], context?: {
6
4
  appFetch?: GlobalFetch["fetch"];
7
- walletInstanceAttestation: string;
8
5
  }) => Promise<{
9
6
  requestObjectEncodedJwt: string;
10
7
  }>;
@@ -12,10 +9,7 @@ export type GetRequestObject = (requestUri: Out<StartFlow>["requestUri"], contex
12
9
  * Obtain the Request Object for RP authentication
13
10
  * @see https://italia.github.io/eudi-wallet-it-docs/versione-corrente/en/relying-party-solution.html
14
11
  *
15
- * @param requestUri The url for the Relying Party to connect with
16
- * @param rpConf The Relying Party's configuration
17
- * @param context.wiaCryptoContext The context to access the key associated with the Wallet Instance Attestation
18
- * @param context.walletInstanceAttestation The Wallet Instance Attestation token
12
+ * @param requestUri The request uri of the Relying Party
19
13
  * @param context.appFetch (optional) fetch api implementation. Default: built-in fetch
20
14
  * @returns The Request Object that describes the presentation
21
15
  */
@@ -1 +1 @@
1
- {"version":3,"file":"03-get-request-object.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/03-get-request-object.ts"],"names":[],"mappings":"AACA,OAAO,EAEL,KAAK,aAAa,EACnB,MAAM,6BAA6B,CAAC;AAGrC,OAAO,EAAoB,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC9D,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAEjD,MAAM,MAAM,gBAAgB,GAAG,CAC7B,UAAU,EAAE,GAAG,CAAC,SAAS,CAAC,CAAC,YAAY,CAAC,EACxC,OAAO,EAAE;IACP,gBAAgB,EAAE,aAAa,CAAC;IAChC,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;IAChC,yBAAyB,EAAE,MAAM,CAAC;CACnC,KACE,OAAO,CAAC;IAAE,uBAAuB,EAAE,MAAM,CAAA;CAAE,CAAC,CAAC;AAElD;;;;;;;;;;GAUG;AACH,eAAO,MAAM,gBAAgB,EAAE,gBA2B9B,CAAC"}
1
+ {"version":3,"file":"03-get-request-object.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/03-get-request-object.ts"],"names":[],"mappings":"AAAA,OAAO,EAAoB,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC9D,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAEjD,MAAM,MAAM,gBAAgB,GAAG,CAC7B,UAAU,EAAE,GAAG,CAAC,SAAS,CAAC,CAAC,YAAY,CAAC,EACxC,OAAO,CAAC,EAAE;IACR,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;CACjC,KACE,OAAO,CAAC;IAAE,uBAAuB,EAAE,MAAM,CAAA;CAAE,CAAC,CAAC;AAElD;;;;;;;GAOG;AACH,eAAO,MAAM,gBAAgB,EAAE,gBAc9B,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"07-evaluate-input-descriptor.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/07-evaluate-input-descriptor.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,MAAM,SAAS,CAAC;AAC1C,OAAO,EAAE,QAAQ,EAAE,KAAK,qBAAqB,EAAE,MAAM,oBAAoB,CAAC;AAO1E,MAAM,MAAM,oBAAoB,GAAG;IACjC,mBAAmB,EAAE,qBAAqB,EAAE,CAAC;IAC7C,mBAAmB,EAAE,qBAAqB,EAAE,CAAC;IAC7C,sBAAsB,EAAE,qBAAqB,EAAE,CAAC;CACjD,CAAC;AAEF,MAAM,MAAM,+BAA+B,GAAG,CAC5C,eAAe,EAAE,eAAe,EAChC,iBAAiB,EAAE,QAAQ,CAAC,SAAS,CAAC,EACtC,WAAW,EAAE,qBAAqB,EAAE,KACjC,oBAAoB,CAAC;AA4E1B;;;;;;;;;;;;;;;;;GAiBG;AACH,eAAO,MAAM,kCAAkC,EAAE,+BAyG9C,CAAC"}
1
+ {"version":3,"file":"07-evaluate-input-descriptor.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/07-evaluate-input-descriptor.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,MAAM,SAAS,CAAC;AAC1C,OAAO,EAAE,QAAQ,EAAE,KAAK,qBAAqB,EAAE,MAAM,oBAAoB,CAAC;AAO1E,MAAM,MAAM,oBAAoB,GAAG;IACjC,mBAAmB,EAAE,qBAAqB,EAAE,CAAC;IAC7C,mBAAmB,EAAE,qBAAqB,EAAE,CAAC;IAC7C,sBAAsB,EAAE,qBAAqB,EAAE,CAAC;CACjD,CAAC;AAEF,MAAM,MAAM,+BAA+B,GAAG,CAC5C,eAAe,EAAE,eAAe,EAChC,iBAAiB,EAAE,QAAQ,CAAC,SAAS,CAAC,EACtC,WAAW,EAAE,qBAAqB,EAAE,KACjC,oBAAoB,CAAC;AA4E1B;;;;;;;;;;;;;;;;;GAiBG;AACH,eAAO,MAAM,kCAAkC,EAAE,+BAsG9C,CAAC"}
@@ -1,7 +1,7 @@
1
1
  import type { FetchJwks } from "./04-retrieve-rp-jwks";
2
2
  import type { VerifyRequestObjectSignature } from "./05-verify-request-object";
3
3
  import { type Out } from "../../utils/misc";
4
- import { PresentationDefinition, type Presentation } from "./types";
4
+ import { DirectAuthorizationBodyPayload, ErrorResponse, PresentationDefinition, type Presentation } from "./types";
5
5
  import * as z from "zod";
6
6
  import type { JWK } from "../../utils/jwk";
7
7
  export type AuthorizationResponse = z.infer<typeof AuthorizationResponse>;
@@ -60,22 +60,20 @@ export declare const prepareVpToken: (requestObject: Out<VerifyRequestObjectSign
60
60
  * Builds a URL-encoded form body for a direct POST response without encryption.
61
61
  *
62
62
  * @param requestObject - Contains state, nonce, and other relevant info.
63
- * @param vpToken - The signed VP token to include.
64
- * @param presentationSubmission - Object mapping credential disclosures.
63
+ * @param payload - Object that contains either the VP token to encrypt and the stringified mapping of the credential disclosures or the error code
65
64
  * @returns A URL-encoded string suitable for an `application/x-www-form-urlencoded` POST body.
66
65
  */
67
- export declare const buildDirectPostBody: (requestObject: Out<VerifyRequestObjectSignature>["requestObject"], vpToken: string, presentationSubmission: Record<string, unknown>) => Promise<string>;
66
+ export declare const buildDirectPostBody: (requestObject: Out<VerifyRequestObjectSignature>["requestObject"], payload: DirectAuthorizationBodyPayload) => Promise<string>;
68
67
  /**
69
68
  * Builds a URL-encoded form body for a direct POST response using JWT encryption.
70
69
  *
71
70
  * @param jwkKeys - Array of JWKs from the Relying Party for encryption.
72
71
  * @param requestObject - Contains state, nonce, and other relevant info.
73
- * @param vpToken - The signed VP token to encrypt.
74
- * @param presentationSubmission - Object mapping credential disclosures.
72
+ * @param payload - Object that contains either the VP token to encrypt and the mapping of the credential disclosures or the error code
75
73
  * @returns A URL-encoded string for an `application/x-www-form-urlencoded` POST body,
76
74
  * where `response` contains the encrypted JWE.
77
75
  */
78
- export declare const buildDirectPostJwtBody: (jwkKeys: Out<FetchJwks>["keys"], requestObject: Out<VerifyRequestObjectSignature>["requestObject"], vpToken: string, presentationSubmission: Record<string, unknown>) => Promise<string>;
76
+ export declare const buildDirectPostJwtBody: (jwkKeys: Out<FetchJwks>["keys"], requestObject: Out<VerifyRequestObjectSignature>["requestObject"], payload: DirectAuthorizationBodyPayload) => Promise<string>;
79
77
  /**
80
78
  * Type definition for the function that sends the authorization response
81
79
  * to the Relying Party, completing the presentation flow.
@@ -96,4 +94,22 @@ context?: {
96
94
  * @returns Parsed and validated authorization response from the Relying Party.
97
95
  */
98
96
  export declare const sendAuthorizationResponse: SendAuthorizationResponse;
97
+ /**
98
+ * Type definition for the function that sends the authorization response
99
+ * to the Relying Party, completing the presentation flow.
100
+ */
101
+ export type SendAuthorizationErrorResponse = (requestObject: Out<VerifyRequestObjectSignature>["requestObject"], error: ErrorResponse, jwkKeys: Out<FetchJwks>["keys"], context?: {
102
+ appFetch?: GlobalFetch["fetch"];
103
+ }) => Promise<AuthorizationResponse>;
104
+ /**
105
+ * Sends the authorization error response to the Relying Party (RP) using the specified `response_mode`.
106
+ * This function completes the presentation flow in an OpenID 4 Verifiable Presentations scenario.
107
+ *
108
+ * @param requestObject - The request details, including presentation requirements.
109
+ * @param error - The response error value
110
+ * @param jwkKeys - Array of JWKs from the Relying Party for optional encryption.
111
+ * @param context - Contains optional custom fetch implementation.
112
+ * @returns Parsed and validated authorization response from the Relying Party.
113
+ */
114
+ export declare const sendAuthorizationErrorResponse: SendAuthorizationErrorResponse;
99
115
  //# sourceMappingURL=08-send-authorization-response.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"08-send-authorization-response.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/08-send-authorization-response.ts"],"names":[],"mappings":"AAMA,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,uBAAuB,CAAC;AACvD,OAAO,KAAK,EAAE,4BAA4B,EAAE,MAAM,4BAA4B,CAAC;AAE/E,OAAO,EAAoB,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAE9D,OAAO,EAAE,sBAAsB,EAAE,KAAK,YAAY,EAAE,MAAM,SAAS,CAAC;AACpE,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AACzB,OAAO,KAAK,EAAE,GAAG,EAAE,MAAM,iBAAiB,CAAC;AAE3C,MAAM,MAAM,qBAAqB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,qBAAqB,CAAC,CAAC;AAC1E,eAAO,MAAM,qBAAqB;;;;;;;;;;;;EAUhC,CAAC;AAEH;;;;;;;GAOG;AACH,eAAO,MAAM,wBAAwB,cACxB,IAAI,SAAS,CAAC,CAAC,MAAM,CAAC,KAChC,GAWF,CAAC;AAEF;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,eAAO,MAAM,cAAc,kBACV,IAAI,4BAA4B,CAAC,CAAC,eAAe,CAAC,0BACzC,sBAAsB;cAGpC,MAAM;6BACS,OAAO,MAAM,EAAE,OAAO,CAAC;EAuCjD,CAAC;AAEF;;;;;;;GAOG;AACH,eAAO,MAAM,mBAAmB,kBACf,IAAI,4BAA4B,CAAC,CAAC,eAAe,CAAC,WACxD,MAAM,0BACS,OAAO,MAAM,EAAE,OAAO,CAAC,KAC9C,QAAQ,MAAM,CAQhB,CAAC;AAEF;;;;;;;;;GASG;AACH,eAAO,MAAM,sBAAsB,YACxB,IAAI,SAAS,CAAC,CAAC,MAAM,CAAC,iBAChB,IAAI,4BAA4B,CAAC,CAAC,eAAe,CAAC,WACxD,MAAM,0BACS,OAAO,MAAM,EAAE,OAAO,CAAC,KAC9C,QAAQ,MAAM,CA+BhB,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,yBAAyB,GAAG,CACtC,aAAa,EAAE,GAAG,CAAC,4BAA4B,CAAC,CAAC,eAAe,CAAC,EACjE,sBAAsB,EAAE,sBAAsB,EAC9C,OAAO,EAAE,GAAG,CAAC,SAAS,CAAC,CAAC,MAAM,CAAC,EAC/B,YAAY,EAAE,YAAY,EAAE,iDAAiD;AAC7E,OAAO,CAAC,EAAE;IACR,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;CACjC,KACE,OAAO,CAAC,qBAAqB,CAAC,CAAC;AAEpC;;;;;;;;;;GAUG;AACH,eAAO,MAAM,yBAAyB,EAAE,yBAwCvC,CAAC"}
1
+ {"version":3,"file":"08-send-authorization-response.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/08-send-authorization-response.ts"],"names":[],"mappings":"AAMA,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,uBAAuB,CAAC;AACvD,OAAO,KAAK,EAAE,4BAA4B,EAAE,MAAM,4BAA4B,CAAC;AAE/E,OAAO,EAAoB,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAE9D,OAAO,EACL,8BAA8B,EAC9B,aAAa,EACb,sBAAsB,EACtB,KAAK,YAAY,EAClB,MAAM,SAAS,CAAC;AACjB,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AACzB,OAAO,KAAK,EAAE,GAAG,EAAE,MAAM,iBAAiB,CAAC;AAE3C,MAAM,MAAM,qBAAqB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,qBAAqB,CAAC,CAAC;AAC1E,eAAO,MAAM,qBAAqB;;;;;;;;;;;;EAUhC,CAAC;AAEH;;;;;;;GAOG;AACH,eAAO,MAAM,wBAAwB,cACxB,IAAI,SAAS,CAAC,CAAC,MAAM,CAAC,KAChC,GAWF,CAAC;AAEF;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,eAAO,MAAM,cAAc,kBACV,IAAI,4BAA4B,CAAC,CAAC,eAAe,CAAC,0BACzC,sBAAsB;cAGpC,MAAM;6BACS,OAAO,MAAM,EAAE,OAAO,CAAC;EAuCjD,CAAC;AAEF;;;;;;GAMG;AACH,eAAO,MAAM,mBAAmB,kBACf,IAAI,4BAA4B,CAAC,CAAC,eAAe,CAAC,WACxD,8BAA8B,KACtC,QAAQ,MAAM,CAWhB,CAAC;AAEF;;;;;;;;GAQG;AACH,eAAO,MAAM,sBAAsB,YACxB,IAAI,SAAS,CAAC,CAAC,MAAM,CAAC,iBAChB,IAAI,4BAA4B,CAAC,CAAC,eAAe,CAAC,WACxD,8BAA8B,KACtC,QAAQ,MAAM,CA8BhB,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,yBAAyB,GAAG,CACtC,aAAa,EAAE,GAAG,CAAC,4BAA4B,CAAC,CAAC,eAAe,CAAC,EACjE,sBAAsB,EAAE,sBAAsB,EAC9C,OAAO,EAAE,GAAG,CAAC,SAAS,CAAC,CAAC,MAAM,CAAC,EAC/B,YAAY,EAAE,YAAY,EAAE,iDAAiD;AAC7E,OAAO,CAAC,EAAE;IACR,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;CACjC,KACE,OAAO,CAAC,qBAAqB,CAAC,CAAC;AAEpC;;;;;;;;;;GAUG;AACH,eAAO,MAAM,yBAAyB,EAAE,yBAqCvC,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,8BAA8B,GAAG,CAC3C,aAAa,EAAE,GAAG,CAAC,4BAA4B,CAAC,CAAC,eAAe,CAAC,EACjE,KAAK,EAAE,aAAa,EACpB,OAAO,EAAE,GAAG,CAAC,SAAS,CAAC,CAAC,MAAM,CAAC,EAC/B,OAAO,CAAC,EAAE;IACR,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;CACjC,KACE,OAAO,CAAC,qBAAqB,CAAC,CAAC;AAEpC;;;;;;;;;GASG;AACH,eAAO,MAAM,8BAA8B,EAAE,8BAuB1C,CAAC"}
@@ -5,8 +5,8 @@ import { fetchJwksFromRequestObject, fetchJwksFromConfig, type FetchJwks } from
5
5
  import { verifyRequestObjectSignature, type VerifyRequestObjectSignature } from "./05-verify-request-object";
6
6
  import { fetchPresentDefinition, type FetchPresentationDefinition } from "./06-fetch-presentation-definition";
7
7
  import { evaluateInputDescriptorForSdJwt4VC, type EvaluateInputDescriptorSdJwt4VC } from "./07-evaluate-input-descriptor";
8
- import { sendAuthorizationResponse, type SendAuthorizationResponse } from "./08-send-authorization-response";
8
+ import { sendAuthorizationResponse, type SendAuthorizationResponse, sendAuthorizationErrorResponse, type SendAuthorizationErrorResponse } from "./08-send-authorization-response";
9
9
  import * as Errors from "./errors";
10
- export { startFlowFromQR, evaluateRelyingPartyTrust, getRequestObject, fetchJwksFromRequestObject, fetchJwksFromConfig, verifyRequestObjectSignature, fetchPresentDefinition, evaluateInputDescriptorForSdJwt4VC, sendAuthorizationResponse, Errors, };
11
- export type { StartFlow, EvaluateRelyingPartyTrust, GetRequestObject, FetchJwks, VerifyRequestObjectSignature, FetchPresentationDefinition, EvaluateInputDescriptorSdJwt4VC, SendAuthorizationResponse, };
10
+ export { startFlowFromQR, evaluateRelyingPartyTrust, getRequestObject, fetchJwksFromRequestObject, fetchJwksFromConfig, verifyRequestObjectSignature, fetchPresentDefinition, evaluateInputDescriptorForSdJwt4VC, sendAuthorizationResponse, sendAuthorizationErrorResponse, Errors, };
11
+ export type { StartFlow, EvaluateRelyingPartyTrust, GetRequestObject, FetchJwks, VerifyRequestObjectSignature, FetchPresentationDefinition, EvaluateInputDescriptorSdJwt4VC, SendAuthorizationResponse, SendAuthorizationErrorResponse, };
12
12
  //# sourceMappingURL=index.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,KAAK,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAClE,OAAO,EACL,yBAAyB,EACzB,KAAK,yBAAyB,EAC/B,MAAM,wBAAwB,CAAC;AAChC,OAAO,EACL,gBAAgB,EAChB,KAAK,gBAAgB,EACtB,MAAM,yBAAyB,CAAC;AACjC,OAAO,EACL,0BAA0B,EAC1B,mBAAmB,EACnB,KAAK,SAAS,EACf,MAAM,uBAAuB,CAAC;AAC/B,OAAO,EACL,4BAA4B,EAC5B,KAAK,4BAA4B,EAClC,MAAM,4BAA4B,CAAC;AACpC,OAAO,EACL,sBAAsB,EACtB,KAAK,2BAA2B,EACjC,MAAM,oCAAoC,CAAC;AAC5C,OAAO,EACL,kCAAkC,EAClC,KAAK,+BAA+B,EACrC,MAAM,gCAAgC,CAAC;AACxC,OAAO,EACL,yBAAyB,EACzB,KAAK,yBAAyB,EAC/B,MAAM,kCAAkC,CAAC;AAC1C,OAAO,KAAK,MAAM,MAAM,UAAU,CAAC;AAEnC,OAAO,EACL,eAAe,EACf,yBAAyB,EACzB,gBAAgB,EAChB,0BAA0B,EAC1B,mBAAmB,EACnB,4BAA4B,EAC5B,sBAAsB,EACtB,kCAAkC,EAClC,yBAAyB,EACzB,MAAM,GACP,CAAC;AACF,YAAY,EACV,SAAS,EACT,yBAAyB,EACzB,gBAAgB,EAChB,SAAS,EACT,4BAA4B,EAC5B,2BAA2B,EAC3B,+BAA+B,EAC/B,yBAAyB,GAC1B,CAAC"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,KAAK,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAClE,OAAO,EACL,yBAAyB,EACzB,KAAK,yBAAyB,EAC/B,MAAM,wBAAwB,CAAC;AAChC,OAAO,EACL,gBAAgB,EAChB,KAAK,gBAAgB,EACtB,MAAM,yBAAyB,CAAC;AACjC,OAAO,EACL,0BAA0B,EAC1B,mBAAmB,EACnB,KAAK,SAAS,EACf,MAAM,uBAAuB,CAAC;AAC/B,OAAO,EACL,4BAA4B,EAC5B,KAAK,4BAA4B,EAClC,MAAM,4BAA4B,CAAC;AACpC,OAAO,EACL,sBAAsB,EACtB,KAAK,2BAA2B,EACjC,MAAM,oCAAoC,CAAC;AAC5C,OAAO,EACL,kCAAkC,EAClC,KAAK,+BAA+B,EACrC,MAAM,gCAAgC,CAAC;AACxC,OAAO,EACL,yBAAyB,EACzB,KAAK,yBAAyB,EAC9B,8BAA8B,EAC9B,KAAK,8BAA8B,EACpC,MAAM,kCAAkC,CAAC;AAC1C,OAAO,KAAK,MAAM,MAAM,UAAU,CAAC;AAEnC,OAAO,EACL,eAAe,EACf,yBAAyB,EACzB,gBAAgB,EAChB,0BAA0B,EAC1B,mBAAmB,EACnB,4BAA4B,EAC5B,sBAAsB,EACtB,kCAAkC,EAClC,yBAAyB,EACzB,8BAA8B,EAC9B,MAAM,GACP,CAAC;AACF,YAAY,EACV,SAAS,EACT,yBAAyB,EACzB,gBAAgB,EAChB,SAAS,EACT,4BAA4B,EAC5B,2BAA2B,EAC3B,+BAA+B,EAC/B,yBAAyB,EACzB,8BAA8B,GAC/B,CAAC"}
@@ -898,4 +898,30 @@ export declare const RequestObject: z.ZodObject<{
898
898
  }[] | undefined;
899
899
  } | undefined;
900
900
  }>;
901
+ /**
902
+ * This type models the possible error responses the OpenID4VP protocol allows for a presentation of a credential.
903
+ * See https://openid.github.io/OpenID4VP/openid-4-verifiable-presentations-wg-draft.html#name-error-response for more information.
904
+ */
905
+ export type ErrorResponse = z.infer<typeof ErrorResponse>;
906
+ export declare const ErrorResponse: z.ZodEnum<["invalid_scope", "invalid_request", "invalid_client", "access_denied"]>;
907
+ /**
908
+ * Type that defines the possible payload formats accepted by {@link buildDirectPostJwtBody} and {@link buildDirectPostBody}
909
+ */
910
+ export type DirectAuthorizationBodyPayload = z.infer<typeof DirectAuthorizationBodyPayload>;
911
+ export declare const DirectAuthorizationBodyPayload: z.ZodUnion<[z.ZodObject<{
912
+ vp_token: z.ZodString;
913
+ presentation_submission: z.ZodRecord<z.ZodString, z.ZodUnknown>;
914
+ }, "strip", z.ZodTypeAny, {
915
+ vp_token: string;
916
+ presentation_submission: Record<string, unknown>;
917
+ }, {
918
+ vp_token: string;
919
+ presentation_submission: Record<string, unknown>;
920
+ }>, z.ZodObject<{
921
+ error: z.ZodEnum<["invalid_scope", "invalid_request", "invalid_client", "access_denied"]>;
922
+ }, "strip", z.ZodTypeAny, {
923
+ error: "invalid_scope" | "invalid_request" | "invalid_client" | "access_denied";
924
+ }, {
925
+ error: "invalid_scope" | "invalid_request" | "invalid_client" | "access_denied";
926
+ }>]>;
901
927
  //# sourceMappingURL=types.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AAEjE,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAGzB;;GAEG;AACH,MAAM,MAAM,YAAY,GAAG;IACO,MAAM;IACzB,MAAM,EAAE;IACsC,aAAa;CACzE,CAAC;AAmBF,MAAM,MAAM,eAAe,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,eAAe,CAAC,CAAC;AAC9D,eAAO,MAAM,eAAe;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAO1B,CAAC;AAqBH,MAAM,MAAM,sBAAsB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,sBAAsB,CAAC,CAAC;AAC5E,eAAO,MAAM,sBAAsB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAMjC,CAAC;AAEH,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAC1D,eAAO,MAAM,aAAa;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAqBxB,CAAC"}
1
+ {"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AAEjE,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAGzB;;GAEG;AACH,MAAM,MAAM,YAAY,GAAG;IACO,MAAM;IACzB,MAAM,EAAE;IACsC,aAAa;CACzE,CAAC;AAmBF,MAAM,MAAM,eAAe,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,eAAe,CAAC,CAAC;AAC9D,eAAO,MAAM,eAAe;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAO1B,CAAC;AAqBH,MAAM,MAAM,sBAAsB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,sBAAsB,CAAC,CAAC;AAC5E,eAAO,MAAM,sBAAsB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAMjC,CAAC;AAEH,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAC1D,eAAO,MAAM,aAAa;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAqBxB,CAAC;AAEH;;;GAGG;AACH,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAC1D,eAAO,MAAM,aAAa,oFAKxB,CAAC;AAEH;;GAEG;AACH,MAAM,MAAM,8BAA8B,GAAG,CAAC,CAAC,KAAK,CAClD,OAAO,8BAA8B,CACtC,CAAC;AACF,eAAO,MAAM,8BAA8B;;;;;;;;;;;;;;;IAMzC,CAAC"}
@@ -44,12 +44,64 @@ export declare const CredentialClaimDisplay: z.ZodObject<{
44
44
  name: string;
45
45
  locale: string;
46
46
  }>;
47
- export declare const CredentialFormat: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"example+sd-jwt">]>;
47
+ export declare const CredentialFormat: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"mso_mdoc">]>;
48
+ export type CredentialClaim = z.infer<typeof CredentialClaim>;
49
+ export declare const CredentialClaim: z.ZodObject<{
50
+ mandatory: z.ZodBoolean;
51
+ display: z.ZodArray<z.ZodObject<{
52
+ name: z.ZodString;
53
+ locale: z.ZodString;
54
+ }, "strip", z.ZodTypeAny, {
55
+ name: string;
56
+ locale: string;
57
+ }, {
58
+ name: string;
59
+ locale: string;
60
+ }>, "many">;
61
+ }, "strip", z.ZodTypeAny, {
62
+ mandatory: boolean;
63
+ display: {
64
+ name: string;
65
+ locale: string;
66
+ }[];
67
+ }, {
68
+ mandatory: boolean;
69
+ display: {
70
+ name: string;
71
+ locale: string;
72
+ }[];
73
+ }>;
74
+ export type CredentialSdJwtClaims = z.infer<typeof CredentialSdJwtClaims>;
75
+ export declare const CredentialSdJwtClaims: z.ZodRecord<z.ZodString, z.ZodObject<{
76
+ mandatory: z.ZodBoolean;
77
+ display: z.ZodArray<z.ZodObject<{
78
+ name: z.ZodString;
79
+ locale: z.ZodString;
80
+ }, "strip", z.ZodTypeAny, {
81
+ name: string;
82
+ locale: string;
83
+ }, {
84
+ name: string;
85
+ locale: string;
86
+ }>, "many">;
87
+ }, "strip", z.ZodTypeAny, {
88
+ mandatory: boolean;
89
+ display: {
90
+ name: string;
91
+ locale: string;
92
+ }[];
93
+ }, {
94
+ mandatory: boolean;
95
+ display: {
96
+ name: string;
97
+ locale: string;
98
+ }[];
99
+ }>>;
48
100
  export type CredentialConfigurationSupported = z.infer<typeof CredentialConfigurationSupported>;
49
101
  export declare const CredentialConfigurationSupported: z.ZodRecord<z.ZodString, z.ZodObject<{
50
102
  cryptographic_suites_supported: z.ZodArray<z.ZodString, "many">;
51
- vct: z.ZodString;
52
- scope: z.ZodString;
103
+ vct: z.ZodOptional<z.ZodString>;
104
+ scope: z.ZodOptional<z.ZodString>;
53
105
  cryptographic_binding_methods_supported: z.ZodArray<z.ZodString, "many">;
54
106
  display: z.ZodArray<z.ZodObject<{
55
107
  name: z.ZodString;
@@ -85,8 +137,8 @@ export declare const CredentialConfigurationSupported: z.ZodRecord<z.ZodString,
85
137
  background_color?: string | undefined;
86
138
  text_color?: string | undefined;
87
139
  }>, "many">;
88
- format: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"example+sd-jwt">]>;
89
- claims: z.ZodRecord<z.ZodString, z.ZodObject<{
140
+ format: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"mso_mdoc">]>;
141
+ claims: z.ZodOptional<z.ZodUnion<[z.ZodRecord<z.ZodString, z.ZodObject<{
90
142
  mandatory: z.ZodBoolean;
91
143
  display: z.ZodArray<z.ZodObject<{
92
144
  name: z.ZodString;
@@ -110,7 +162,31 @@ export declare const CredentialConfigurationSupported: z.ZodRecord<z.ZodString,
110
162
  name: string;
111
163
  locale: string;
112
164
  }[];
113
- }>>;
165
+ }>>, z.ZodRecord<z.ZodString, z.ZodRecord<z.ZodString, z.ZodObject<{
166
+ mandatory: z.ZodBoolean;
167
+ display: z.ZodArray<z.ZodObject<{
168
+ name: z.ZodString;
169
+ locale: z.ZodString;
170
+ }, "strip", z.ZodTypeAny, {
171
+ name: string;
172
+ locale: string;
173
+ }, {
174
+ name: string;
175
+ locale: string;
176
+ }>, "many">;
177
+ }, "strip", z.ZodTypeAny, {
178
+ mandatory: boolean;
179
+ display: {
180
+ name: string;
181
+ locale: string;
182
+ }[];
183
+ }, {
184
+ mandatory: boolean;
185
+ display: {
186
+ name: string;
187
+ locale: string;
188
+ }[];
189
+ }>>>]>>;
114
190
  }, "strip", z.ZodTypeAny, {
115
191
  display: {
116
192
  name: string;
@@ -123,17 +199,23 @@ export declare const CredentialConfigurationSupported: z.ZodRecord<z.ZodString,
123
199
  text_color?: string | undefined;
124
200
  }[];
125
201
  cryptographic_suites_supported: string[];
126
- vct: string;
127
- scope: string;
128
202
  cryptographic_binding_methods_supported: string[];
129
- format: "vc+sd-jwt" | "example+sd-jwt";
130
- claims: Record<string, {
203
+ format: "vc+sd-jwt" | "mso_mdoc";
204
+ vct?: string | undefined;
205
+ scope?: string | undefined;
206
+ claims?: Record<string, {
131
207
  mandatory: boolean;
132
208
  display: {
133
209
  name: string;
134
210
  locale: string;
135
211
  }[];
136
- }>;
212
+ }> | Record<string, Record<string, {
213
+ mandatory: boolean;
214
+ display: {
215
+ name: string;
216
+ locale: string;
217
+ }[];
218
+ }>> | undefined;
137
219
  }, {
138
220
  display: {
139
221
  name: string;
@@ -146,17 +228,23 @@ export declare const CredentialConfigurationSupported: z.ZodRecord<z.ZodString,
146
228
  text_color?: string | undefined;
147
229
  }[];
148
230
  cryptographic_suites_supported: string[];
149
- vct: string;
150
- scope: string;
151
231
  cryptographic_binding_methods_supported: string[];
152
- format: "vc+sd-jwt" | "example+sd-jwt";
153
- claims: Record<string, {
232
+ format: "vc+sd-jwt" | "mso_mdoc";
233
+ vct?: string | undefined;
234
+ scope?: string | undefined;
235
+ claims?: Record<string, {
154
236
  mandatory: boolean;
155
237
  display: {
156
238
  name: string;
157
239
  locale: string;
158
240
  }[];
159
- }>;
241
+ }> | Record<string, Record<string, {
242
+ mandatory: boolean;
243
+ display: {
244
+ name: string;
245
+ locale: string;
246
+ }[];
247
+ }>> | undefined;
160
248
  }>>;
161
249
  export type CredentialIssuerKeys = z.infer<typeof CredentialIssuerKeys>;
162
250
  export declare const CredentialIssuerKeys: z.ZodObject<{
@@ -285,8 +373,8 @@ export type CredentialIssuerConfiguration = z.infer<typeof CredentialIssuerConfi
285
373
  export declare const CredentialIssuerConfiguration: z.ZodObject<{
286
374
  credential_configurations_supported: z.ZodRecord<z.ZodString, z.ZodObject<{
287
375
  cryptographic_suites_supported: z.ZodArray<z.ZodString, "many">;
288
- vct: z.ZodString;
289
- scope: z.ZodString;
376
+ vct: z.ZodOptional<z.ZodString>;
377
+ scope: z.ZodOptional<z.ZodString>;
290
378
  cryptographic_binding_methods_supported: z.ZodArray<z.ZodString, "many">;
291
379
  display: z.ZodArray<z.ZodObject<{
292
380
  name: z.ZodString;
@@ -322,8 +410,8 @@ export declare const CredentialIssuerConfiguration: z.ZodObject<{
322
410
  background_color?: string | undefined;
323
411
  text_color?: string | undefined;
324
412
  }>, "many">;
325
- format: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"example+sd-jwt">]>;
326
- claims: z.ZodRecord<z.ZodString, z.ZodObject<{
413
+ format: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"mso_mdoc">]>;
414
+ claims: z.ZodOptional<z.ZodUnion<[z.ZodRecord<z.ZodString, z.ZodObject<{
327
415
  mandatory: z.ZodBoolean;
328
416
  display: z.ZodArray<z.ZodObject<{
329
417
  name: z.ZodString;
@@ -347,7 +435,31 @@ export declare const CredentialIssuerConfiguration: z.ZodObject<{
347
435
  name: string;
348
436
  locale: string;
349
437
  }[];
350
- }>>;
438
+ }>>, z.ZodRecord<z.ZodString, z.ZodRecord<z.ZodString, z.ZodObject<{
439
+ mandatory: z.ZodBoolean;
440
+ display: z.ZodArray<z.ZodObject<{
441
+ name: z.ZodString;
442
+ locale: z.ZodString;
443
+ }, "strip", z.ZodTypeAny, {
444
+ name: string;
445
+ locale: string;
446
+ }, {
447
+ name: string;
448
+ locale: string;
449
+ }>, "many">;
450
+ }, "strip", z.ZodTypeAny, {
451
+ mandatory: boolean;
452
+ display: {
453
+ name: string;
454
+ locale: string;
455
+ }[];
456
+ }, {
457
+ mandatory: boolean;
458
+ display: {
459
+ name: string;
460
+ locale: string;
461
+ }[];
462
+ }>>>]>>;
351
463
  }, "strip", z.ZodTypeAny, {
352
464
  display: {
353
465
  name: string;
@@ -360,17 +472,23 @@ export declare const CredentialIssuerConfiguration: z.ZodObject<{
360
472
  text_color?: string | undefined;
361
473
  }[];
362
474
  cryptographic_suites_supported: string[];
363
- vct: string;
364
- scope: string;
365
475
  cryptographic_binding_methods_supported: string[];
366
- format: "vc+sd-jwt" | "example+sd-jwt";
367
- claims: Record<string, {
476
+ format: "vc+sd-jwt" | "mso_mdoc";
477
+ vct?: string | undefined;
478
+ scope?: string | undefined;
479
+ claims?: Record<string, {
480
+ mandatory: boolean;
481
+ display: {
482
+ name: string;
483
+ locale: string;
484
+ }[];
485
+ }> | Record<string, Record<string, {
368
486
  mandatory: boolean;
369
487
  display: {
370
488
  name: string;
371
489
  locale: string;
372
490
  }[];
373
- }>;
491
+ }>> | undefined;
374
492
  }, {
375
493
  display: {
376
494
  name: string;
@@ -383,17 +501,23 @@ export declare const CredentialIssuerConfiguration: z.ZodObject<{
383
501
  text_color?: string | undefined;
384
502
  }[];
385
503
  cryptographic_suites_supported: string[];
386
- vct: string;
387
- scope: string;
388
504
  cryptographic_binding_methods_supported: string[];
389
- format: "vc+sd-jwt" | "example+sd-jwt";
390
- claims: Record<string, {
505
+ format: "vc+sd-jwt" | "mso_mdoc";
506
+ vct?: string | undefined;
507
+ scope?: string | undefined;
508
+ claims?: Record<string, {
391
509
  mandatory: boolean;
392
510
  display: {
393
511
  name: string;
394
512
  locale: string;
395
513
  }[];
396
- }>;
514
+ }> | Record<string, Record<string, {
515
+ mandatory: boolean;
516
+ display: {
517
+ name: string;
518
+ locale: string;
519
+ }[];
520
+ }>> | undefined;
397
521
  }>>;
398
522
  pushed_authorization_request_endpoint: z.ZodString;
399
523
  dpop_signing_alg_values_supported: z.ZodArray<z.ZodString, "many">;
@@ -536,17 +660,23 @@ export declare const CredentialIssuerConfiguration: z.ZodObject<{
536
660
  text_color?: string | undefined;
537
661
  }[];
538
662
  cryptographic_suites_supported: string[];
539
- vct: string;
540
- scope: string;
541
663
  cryptographic_binding_methods_supported: string[];
542
- format: "vc+sd-jwt" | "example+sd-jwt";
543
- claims: Record<string, {
664
+ format: "vc+sd-jwt" | "mso_mdoc";
665
+ vct?: string | undefined;
666
+ scope?: string | undefined;
667
+ claims?: Record<string, {
544
668
  mandatory: boolean;
545
669
  display: {
546
670
  name: string;
547
671
  locale: string;
548
672
  }[];
549
- }>;
673
+ }> | Record<string, Record<string, {
674
+ mandatory: boolean;
675
+ display: {
676
+ name: string;
677
+ locale: string;
678
+ }[];
679
+ }>> | undefined;
550
680
  }>;
551
681
  pushed_authorization_request_endpoint: string;
552
682
  dpop_signing_alg_values_supported: string[];
@@ -593,17 +723,23 @@ export declare const CredentialIssuerConfiguration: z.ZodObject<{
593
723
  text_color?: string | undefined;
594
724
  }[];
595
725
  cryptographic_suites_supported: string[];
596
- vct: string;
597
- scope: string;
598
726
  cryptographic_binding_methods_supported: string[];
599
- format: "vc+sd-jwt" | "example+sd-jwt";
600
- claims: Record<string, {
727
+ format: "vc+sd-jwt" | "mso_mdoc";
728
+ vct?: string | undefined;
729
+ scope?: string | undefined;
730
+ claims?: Record<string, {
731
+ mandatory: boolean;
732
+ display: {
733
+ name: string;
734
+ locale: string;
735
+ }[];
736
+ }> | Record<string, Record<string, {
601
737
  mandatory: boolean;
602
738
  display: {
603
739
  name: string;
604
740
  locale: string;
605
741
  }[];
606
- }>;
742
+ }>> | undefined;
607
743
  }>;
608
744
  pushed_authorization_request_endpoint: string;
609
745
  dpop_signing_alg_values_supported: string[];
@@ -1 +1 @@
1
- {"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../../src/entity/openid-connect/issuer/types.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAIzB,MAAM,MAAM,iBAAiB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,iBAAiB,CAAC,CAAC;AAClE,eAAO,MAAM,iBAAiB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAW5B,CAAC;AAEH,eAAO,MAAM,sBAAsB;;;;;;;;;EAGjC,CAAC;AAEH,eAAO,MAAM,gBAAgB,yEAG3B,CAAC;AAQH,MAAM,MAAM,gCAAgC,GAAG,CAAC,CAAC,KAAK,CACpD,OAAO,gCAAgC,CACxC,CAAC;AACF,eAAO,MAAM,gCAAgC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAU5C,CAAC;AAEF,MAAM,MAAM,oBAAoB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,oBAAoB,CAAC,CAAC;AACxE,eAAO,MAAM,oBAAoB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAE/B,CAAC;AAEH,MAAM,MAAM,6BAA6B,GAAG,CAAC,CAAC,KAAK,CACjD,OAAO,6BAA6B,CACrC,CAAC;AACF,eAAO,MAAM,6BAA6B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EASxC,CAAC"}
1
+ {"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../../src/entity/openid-connect/issuer/types.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAIzB,MAAM,MAAM,iBAAiB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,iBAAiB,CAAC,CAAC;AAClE,eAAO,MAAM,iBAAiB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAW5B,CAAC;AAEH,eAAO,MAAM,sBAAsB;;;;;;;;;EAGjC,CAAC;AAEH,eAAO,MAAM,gBAAgB,mEAG3B,CAAC;AAEH,MAAM,MAAM,eAAe,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,eAAe,CAAC,CAAC;AAC9D,eAAO,MAAM,eAAe;;;;;;;;;;;;;;;;;;;;;;;;EAG1B,CAAC;AAEH,MAAM,MAAM,qBAAqB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,qBAAqB,CAAC,CAAC;AAC1E,eAAO,MAAM,qBAAqB;;;;;;;;;;;;;;;;;;;;;;;;GAA4B,CAAC;AAE/D,MAAM,MAAM,gCAAgC,GAAG,CAAC,CAAC,KAAK,CACpD,OAAO,gCAAgC,CACxC,CAAC;AACF,eAAO,MAAM,gCAAgC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAe5C,CAAC;AAEF,MAAM,MAAM,oBAAoB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,oBAAoB,CAAC,CAAC;AACxE,eAAO,MAAM,oBAAoB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAE/B,CAAC;AAEH,MAAM,MAAM,6BAA6B,GAAG,CAAC,CAAC,KAAK,CACjD,OAAO,6BAA6B,CACrC,CAAC;AACF,eAAO,MAAM,6BAA6B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EASxC,CAAC"}
@@ -268,7 +268,7 @@ export declare const getCredentialIssuerEntityConfiguration: (entityBaseUrl: Par
268
268
  }[];
269
269
  scope: string;
270
270
  cryptographic_binding_methods_supported: string[];
271
- format: "vc+sd-jwt" | "vc+mdoc-cbor";
271
+ format: "vc+sd-jwt" | "mso_mdoc";
272
272
  credential_signing_alg_values_supported: string[];
273
273
  claims?: Record<string, {
274
274
  display: {
@@ -802,7 +802,7 @@ export declare const getEntityConfiguration: (entityBaseUrl: Parameters<typeof f
802
802
  }[];
803
803
  scope: string;
804
804
  cryptographic_binding_methods_supported: string[];
805
- format: "vc+sd-jwt" | "vc+mdoc-cbor";
805
+ format: "vc+sd-jwt" | "mso_mdoc";
806
806
  credential_signing_alg_values_supported: string[];
807
807
  claims?: Record<string, {
808
808
  display: {