@pagopa/io-react-native-wallet 1.3.0 → 1.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/commonjs/credential/issuance/06-obtain-credential.js +8 -2
- package/lib/commonjs/credential/issuance/06-obtain-credential.js.map +1 -1
- package/lib/commonjs/credential/issuance/07-verify-and-parse-credential.js +147 -3
- package/lib/commonjs/credential/issuance/07-verify-and-parse-credential.js.map +1 -1
- package/lib/commonjs/credential/issuance/const.js +1 -1
- package/lib/commonjs/credential/issuance/const.js.map +1 -1
- package/lib/commonjs/credential/issuance/types.js +1 -1
- package/lib/commonjs/credential/issuance/types.js.map +1 -1
- package/lib/commonjs/credential/presentation/03-get-request-object.js +7 -25
- package/lib/commonjs/credential/presentation/03-get-request-object.js.map +1 -1
- package/lib/commonjs/credential/presentation/07-evaluate-input-descriptor.js +1 -1
- package/lib/commonjs/credential/presentation/07-evaluate-input-descriptor.js.map +1 -1
- package/lib/commonjs/credential/presentation/08-send-authorization-response.js +52 -12
- package/lib/commonjs/credential/presentation/08-send-authorization-response.js.map +1 -1
- package/lib/commonjs/credential/presentation/README.md +1 -3
- package/lib/commonjs/credential/presentation/index.js +6 -0
- package/lib/commonjs/credential/presentation/index.js.map +1 -1
- package/lib/commonjs/credential/presentation/types.js +19 -1
- package/lib/commonjs/credential/presentation/types.js.map +1 -1
- package/lib/commonjs/entity/openid-connect/issuer/types.js +10 -7
- package/lib/commonjs/entity/openid-connect/issuer/types.js.map +1 -1
- package/lib/commonjs/entity/trust/types.js +1 -1
- package/lib/commonjs/entity/trust/types.js.map +1 -1
- package/lib/commonjs/mdoc/converters.js +26 -0
- package/lib/commonjs/mdoc/converters.js.map +1 -0
- package/lib/commonjs/mdoc/index.js +28 -0
- package/lib/commonjs/mdoc/index.js.map +1 -0
- package/lib/commonjs/utils/string.js +13 -1
- package/lib/commonjs/utils/string.js.map +1 -1
- package/lib/module/credential/issuance/06-obtain-credential.js +8 -2
- package/lib/module/credential/issuance/06-obtain-credential.js.map +1 -1
- package/lib/module/credential/issuance/07-verify-and-parse-credential.js +147 -3
- package/lib/module/credential/issuance/07-verify-and-parse-credential.js.map +1 -1
- package/lib/module/credential/issuance/const.js +1 -1
- package/lib/module/credential/issuance/const.js.map +1 -1
- package/lib/module/credential/issuance/types.js +1 -1
- package/lib/module/credential/issuance/types.js.map +1 -1
- package/lib/module/credential/presentation/03-get-request-object.js +7 -24
- package/lib/module/credential/presentation/03-get-request-object.js.map +1 -1
- package/lib/module/credential/presentation/07-evaluate-input-descriptor.js +1 -1
- package/lib/module/credential/presentation/07-evaluate-input-descriptor.js.map +1 -1
- package/lib/module/credential/presentation/08-send-authorization-response.js +51 -11
- package/lib/module/credential/presentation/08-send-authorization-response.js.map +1 -1
- package/lib/module/credential/presentation/README.md +1 -3
- package/lib/module/credential/presentation/index.js +2 -2
- package/lib/module/credential/presentation/index.js.map +1 -1
- package/lib/module/credential/presentation/types.js +18 -0
- package/lib/module/credential/presentation/types.js.map +1 -1
- package/lib/module/entity/openid-connect/issuer/types.js +7 -6
- package/lib/module/entity/openid-connect/issuer/types.js.map +1 -1
- package/lib/module/entity/trust/types.js +1 -1
- package/lib/module/entity/trust/types.js.map +1 -1
- package/lib/module/mdoc/converters.js +20 -0
- package/lib/module/mdoc/converters.js.map +1 -0
- package/lib/module/mdoc/index.js +21 -0
- package/lib/module/mdoc/index.js.map +1 -0
- package/lib/module/utils/string.js +12 -0
- package/lib/module/utils/string.js.map +1 -1
- package/lib/typescript/credential/issuance/06-obtain-credential.d.ts.map +1 -1
- package/lib/typescript/credential/issuance/07-verify-and-parse-credential.d.ts.map +1 -1
- package/lib/typescript/credential/issuance/const.d.ts +1 -1
- package/lib/typescript/credential/issuance/const.d.ts.map +1 -1
- package/lib/typescript/credential/issuance/types.d.ts +7 -7
- package/lib/typescript/credential/presentation/03-get-request-object.d.ts +2 -8
- package/lib/typescript/credential/presentation/03-get-request-object.d.ts.map +1 -1
- package/lib/typescript/credential/presentation/07-evaluate-input-descriptor.d.ts.map +1 -1
- package/lib/typescript/credential/presentation/08-send-authorization-response.d.ts +23 -7
- package/lib/typescript/credential/presentation/08-send-authorization-response.d.ts.map +1 -1
- package/lib/typescript/credential/presentation/index.d.ts +3 -3
- package/lib/typescript/credential/presentation/index.d.ts.map +1 -1
- package/lib/typescript/credential/presentation/types.d.ts +26 -0
- package/lib/typescript/credential/presentation/types.d.ts.map +1 -1
- package/lib/typescript/entity/openid-connect/issuer/types.d.ts +177 -41
- package/lib/typescript/entity/openid-connect/issuer/types.d.ts.map +1 -1
- package/lib/typescript/entity/trust/index.d.ts +2 -2
- package/lib/typescript/entity/trust/types.d.ts +22 -22
- package/lib/typescript/mdoc/converters.d.ts +8 -0
- package/lib/typescript/mdoc/converters.d.ts.map +1 -0
- package/lib/typescript/mdoc/index.d.ts +6 -0
- package/lib/typescript/mdoc/index.d.ts.map +1 -0
- package/lib/typescript/sd-jwt/index.d.ts +4 -4
- package/lib/typescript/sd-jwt/types.d.ts +5 -5
- package/lib/typescript/utils/string.d.ts +7 -0
- package/lib/typescript/utils/string.d.ts.map +1 -1
- package/package.json +3 -1
- package/src/credential/issuance/06-obtain-credential.ts +14 -5
- package/src/credential/issuance/07-verify-and-parse-credential.ts +201 -1
- package/src/credential/issuance/const.ts +1 -1
- package/src/credential/issuance/types.ts +1 -1
- package/src/credential/presentation/03-get-request-object.ts +4 -29
- package/src/credential/presentation/07-evaluate-input-descriptor.ts +2 -5
- package/src/credential/presentation/08-send-authorization-response.ts +70 -22
- package/src/credential/presentation/README.md +1 -3
- package/src/credential/presentation/index.ts +4 -0
- package/src/credential/presentation/types.ts +26 -0
- package/src/entity/openid-connect/issuer/types.ts +18 -10
- package/src/entity/trust/types.ts +1 -1
- package/src/mdoc/converters.ts +26 -0
- package/src/mdoc/index.ts +28 -0
- package/src/utils/string.ts +12 -0
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"07-verify-and-parse-credential.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/07-verify-and-parse-credential.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;
|
1
|
+
{"version":3,"file":"07-verify-and-parse-credential.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/07-verify-and-parse-credential.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AAEjE,OAAO,KAAK,EAAE,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,wBAAwB,CAAC;AAO9D,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,wBAAwB,CAAC;AAO/D,MAAM,MAAM,wBAAwB,GAAG,CACrC,UAAU,EAAE,GAAG,CAAC,eAAe,CAAC,CAAC,YAAY,CAAC,EAC9C,UAAU,EAAE,GAAG,CAAC,gBAAgB,CAAC,CAAC,YAAY,CAAC,EAC/C,MAAM,EAAE,GAAG,CAAC,gBAAgB,CAAC,CAAC,QAAQ,CAAC,EACvC,OAAO,EAAE;IACP,uBAAuB,EAAE,aAAa,CAAC;IACvC;;OAEG;IACH,uBAAuB,CAAC,EAAE,OAAO,CAAC;IAClC;;OAEG;IACH,0BAA0B,CAAC,EAAE,OAAO,CAAC;CACtC,KACE,OAAO,CAAC;IACX,gBAAgB,EAAE,gBAAgB,CAAC;IACnC,UAAU,EAAE,IAAI,CAAC;IACjB,QAAQ,EAAE,IAAI,GAAG,SAAS,CAAC;CAC5B,CAAC,CAAC;AAGH,KAAK,gBAAgB,GAAG,MAAM;AAC5B,oBAAoB;AACpB,MAAM,EACN;IACE,2CAA2C;IAC3C,IAAI,EACA,yBAAyB,CAAC,MAAM,CAC9B,MAAM,EACN,MAAM,CACP,GACD,4BAA4B,CAAC,MAAM,GACnC,SAAS,CAAC;IACd,wCAAwC;IACxC,KAAK,EAAE,OAAO,CAAC;CAChB,CACF,CAAC;AA2WF;;;;;;;;;;;;GAYG;AACH,eAAO,MAAM,wBAAwB,EAAE,wBAwBtC,CAAC"}
|
@@ -1,5 +1,5 @@
|
|
1
1
|
import * as z from "zod";
|
2
2
|
export declare const ASSERTION_TYPE = "urn:ietf:params:oauth:client-assertion-type:jwt-client-attestation";
|
3
3
|
export type SupportedCredentialFormat = z.infer<typeof SupportedCredentialFormat>;
|
4
|
-
export declare const SupportedCredentialFormat: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"
|
4
|
+
export declare const SupportedCredentialFormat: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"mso_mdoc">]>;
|
5
5
|
//# sourceMappingURL=const.d.ts.map
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"const.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/const.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AACzB,eAAO,MAAM,cAAc,uEAC2C,CAAC;AAEvE,MAAM,MAAM,yBAAyB,GAAG,CAAC,CAAC,KAAK,CAC7C,OAAO,yBAAyB,CACjC,CAAC;AACF,eAAO,MAAM,yBAAyB,
|
1
|
+
{"version":3,"file":"const.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/const.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AACzB,eAAO,MAAM,cAAc,uEAC2C,CAAC;AAEvE,MAAM,MAAM,yBAAyB,GAAG,CAAC,CAAC,KAAK,CAC7C,OAAO,yBAAyB,CACjC,CAAC;AACF,eAAO,MAAM,yBAAyB,mEAGpC,CAAC"}
|
@@ -2,7 +2,7 @@ import * as z from "zod";
|
|
2
2
|
export type TokenResponse = z.infer<typeof TokenResponse>;
|
3
3
|
export declare const TokenResponse: z.ZodObject<{
|
4
4
|
access_token: z.ZodString;
|
5
|
-
authorization_details: z.ZodObject<{
|
5
|
+
authorization_details: z.ZodArray<z.ZodObject<{
|
6
6
|
credential_configuration_id: z.ZodString;
|
7
7
|
type: z.ZodLiteral<"openid_credential">;
|
8
8
|
}, "strip", z.ZodTypeAny, {
|
@@ -11,7 +11,7 @@ export declare const TokenResponse: z.ZodObject<{
|
|
11
11
|
}, {
|
12
12
|
type: "openid_credential";
|
13
13
|
credential_configuration_id: string;
|
14
|
-
}>;
|
14
|
+
}>, "many">;
|
15
15
|
c_nonce: z.ZodString;
|
16
16
|
c_nonce_expires_in: z.ZodNumber;
|
17
17
|
expires_in: z.ZodNumber;
|
@@ -20,7 +20,7 @@ export declare const TokenResponse: z.ZodObject<{
|
|
20
20
|
authorization_details: {
|
21
21
|
type: "openid_credential";
|
22
22
|
credential_configuration_id: string;
|
23
|
-
};
|
23
|
+
}[];
|
24
24
|
access_token: string;
|
25
25
|
c_nonce: string;
|
26
26
|
c_nonce_expires_in: number;
|
@@ -30,7 +30,7 @@ export declare const TokenResponse: z.ZodObject<{
|
|
30
30
|
authorization_details: {
|
31
31
|
type: "openid_credential";
|
32
32
|
credential_configuration_id: string;
|
33
|
-
};
|
33
|
+
}[];
|
34
34
|
access_token: string;
|
35
35
|
c_nonce: string;
|
36
36
|
c_nonce_expires_in: number;
|
@@ -42,14 +42,14 @@ export declare const CredentialResponse: z.ZodObject<{
|
|
42
42
|
c_nonce: z.ZodString;
|
43
43
|
c_nonce_expires_in: z.ZodNumber;
|
44
44
|
credential: z.ZodString;
|
45
|
-
format: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"
|
45
|
+
format: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"mso_mdoc">]>;
|
46
46
|
}, "strip", z.ZodTypeAny, {
|
47
|
-
format: "vc+sd-jwt" | "
|
47
|
+
format: "vc+sd-jwt" | "mso_mdoc";
|
48
48
|
c_nonce: string;
|
49
49
|
c_nonce_expires_in: number;
|
50
50
|
credential: string;
|
51
51
|
}, {
|
52
|
-
format: "vc+sd-jwt" | "
|
52
|
+
format: "vc+sd-jwt" | "mso_mdoc";
|
53
53
|
c_nonce: string;
|
54
54
|
c_nonce_expires_in: number;
|
55
55
|
credential: string;
|
@@ -1,10 +1,7 @@
|
|
1
|
-
import { type CryptoContext } from "@pagopa/io-react-native-jwt";
|
2
1
|
import { type Out } from "../../utils/misc";
|
3
2
|
import type { StartFlow } from "./01-start-flow";
|
4
|
-
export type GetRequestObject = (requestUri: Out<StartFlow>["requestUri"], context
|
5
|
-
wiaCryptoContext: CryptoContext;
|
3
|
+
export type GetRequestObject = (requestUri: Out<StartFlow>["requestUri"], context?: {
|
6
4
|
appFetch?: GlobalFetch["fetch"];
|
7
|
-
walletInstanceAttestation: string;
|
8
5
|
}) => Promise<{
|
9
6
|
requestObjectEncodedJwt: string;
|
10
7
|
}>;
|
@@ -12,10 +9,7 @@ export type GetRequestObject = (requestUri: Out<StartFlow>["requestUri"], contex
|
|
12
9
|
* Obtain the Request Object for RP authentication
|
13
10
|
* @see https://italia.github.io/eudi-wallet-it-docs/versione-corrente/en/relying-party-solution.html
|
14
11
|
*
|
15
|
-
* @param requestUri The
|
16
|
-
* @param rpConf The Relying Party's configuration
|
17
|
-
* @param context.wiaCryptoContext The context to access the key associated with the Wallet Instance Attestation
|
18
|
-
* @param context.walletInstanceAttestation The Wallet Instance Attestation token
|
12
|
+
* @param requestUri The request uri of the Relying Party
|
19
13
|
* @param context.appFetch (optional) fetch api implementation. Default: built-in fetch
|
20
14
|
* @returns The Request Object that describes the presentation
|
21
15
|
*/
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"03-get-request-object.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/03-get-request-object.ts"],"names":[],"mappings":"
|
1
|
+
{"version":3,"file":"03-get-request-object.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/03-get-request-object.ts"],"names":[],"mappings":"AAAA,OAAO,EAAoB,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC9D,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAEjD,MAAM,MAAM,gBAAgB,GAAG,CAC7B,UAAU,EAAE,GAAG,CAAC,SAAS,CAAC,CAAC,YAAY,CAAC,EACxC,OAAO,CAAC,EAAE;IACR,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;CACjC,KACE,OAAO,CAAC;IAAE,uBAAuB,EAAE,MAAM,CAAA;CAAE,CAAC,CAAC;AAElD;;;;;;;GAOG;AACH,eAAO,MAAM,gBAAgB,EAAE,gBAc9B,CAAC"}
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"07-evaluate-input-descriptor.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/07-evaluate-input-descriptor.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,MAAM,SAAS,CAAC;AAC1C,OAAO,EAAE,QAAQ,EAAE,KAAK,qBAAqB,EAAE,MAAM,oBAAoB,CAAC;AAO1E,MAAM,MAAM,oBAAoB,GAAG;IACjC,mBAAmB,EAAE,qBAAqB,EAAE,CAAC;IAC7C,mBAAmB,EAAE,qBAAqB,EAAE,CAAC;IAC7C,sBAAsB,EAAE,qBAAqB,EAAE,CAAC;CACjD,CAAC;AAEF,MAAM,MAAM,+BAA+B,GAAG,CAC5C,eAAe,EAAE,eAAe,EAChC,iBAAiB,EAAE,QAAQ,CAAC,SAAS,CAAC,EACtC,WAAW,EAAE,qBAAqB,EAAE,KACjC,oBAAoB,CAAC;AA4E1B;;;;;;;;;;;;;;;;;GAiBG;AACH,eAAO,MAAM,kCAAkC,EAAE,+
|
1
|
+
{"version":3,"file":"07-evaluate-input-descriptor.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/07-evaluate-input-descriptor.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,MAAM,SAAS,CAAC;AAC1C,OAAO,EAAE,QAAQ,EAAE,KAAK,qBAAqB,EAAE,MAAM,oBAAoB,CAAC;AAO1E,MAAM,MAAM,oBAAoB,GAAG;IACjC,mBAAmB,EAAE,qBAAqB,EAAE,CAAC;IAC7C,mBAAmB,EAAE,qBAAqB,EAAE,CAAC;IAC7C,sBAAsB,EAAE,qBAAqB,EAAE,CAAC;CACjD,CAAC;AAEF,MAAM,MAAM,+BAA+B,GAAG,CAC5C,eAAe,EAAE,eAAe,EAChC,iBAAiB,EAAE,QAAQ,CAAC,SAAS,CAAC,EACtC,WAAW,EAAE,qBAAqB,EAAE,KACjC,oBAAoB,CAAC;AA4E1B;;;;;;;;;;;;;;;;;GAiBG;AACH,eAAO,MAAM,kCAAkC,EAAE,+BAsG9C,CAAC"}
|
@@ -1,7 +1,7 @@
|
|
1
1
|
import type { FetchJwks } from "./04-retrieve-rp-jwks";
|
2
2
|
import type { VerifyRequestObjectSignature } from "./05-verify-request-object";
|
3
3
|
import { type Out } from "../../utils/misc";
|
4
|
-
import { PresentationDefinition, type Presentation } from "./types";
|
4
|
+
import { DirectAuthorizationBodyPayload, ErrorResponse, PresentationDefinition, type Presentation } from "./types";
|
5
5
|
import * as z from "zod";
|
6
6
|
import type { JWK } from "../../utils/jwk";
|
7
7
|
export type AuthorizationResponse = z.infer<typeof AuthorizationResponse>;
|
@@ -60,22 +60,20 @@ export declare const prepareVpToken: (requestObject: Out<VerifyRequestObjectSign
|
|
60
60
|
* Builds a URL-encoded form body for a direct POST response without encryption.
|
61
61
|
*
|
62
62
|
* @param requestObject - Contains state, nonce, and other relevant info.
|
63
|
-
* @param
|
64
|
-
* @param presentationSubmission - Object mapping credential disclosures.
|
63
|
+
* @param payload - Object that contains either the VP token to encrypt and the stringified mapping of the credential disclosures or the error code
|
65
64
|
* @returns A URL-encoded string suitable for an `application/x-www-form-urlencoded` POST body.
|
66
65
|
*/
|
67
|
-
export declare const buildDirectPostBody: (requestObject: Out<VerifyRequestObjectSignature>["requestObject"],
|
66
|
+
export declare const buildDirectPostBody: (requestObject: Out<VerifyRequestObjectSignature>["requestObject"], payload: DirectAuthorizationBodyPayload) => Promise<string>;
|
68
67
|
/**
|
69
68
|
* Builds a URL-encoded form body for a direct POST response using JWT encryption.
|
70
69
|
*
|
71
70
|
* @param jwkKeys - Array of JWKs from the Relying Party for encryption.
|
72
71
|
* @param requestObject - Contains state, nonce, and other relevant info.
|
73
|
-
* @param
|
74
|
-
* @param presentationSubmission - Object mapping credential disclosures.
|
72
|
+
* @param payload - Object that contains either the VP token to encrypt and the mapping of the credential disclosures or the error code
|
75
73
|
* @returns A URL-encoded string for an `application/x-www-form-urlencoded` POST body,
|
76
74
|
* where `response` contains the encrypted JWE.
|
77
75
|
*/
|
78
|
-
export declare const buildDirectPostJwtBody: (jwkKeys: Out<FetchJwks>["keys"], requestObject: Out<VerifyRequestObjectSignature>["requestObject"],
|
76
|
+
export declare const buildDirectPostJwtBody: (jwkKeys: Out<FetchJwks>["keys"], requestObject: Out<VerifyRequestObjectSignature>["requestObject"], payload: DirectAuthorizationBodyPayload) => Promise<string>;
|
79
77
|
/**
|
80
78
|
* Type definition for the function that sends the authorization response
|
81
79
|
* to the Relying Party, completing the presentation flow.
|
@@ -96,4 +94,22 @@ context?: {
|
|
96
94
|
* @returns Parsed and validated authorization response from the Relying Party.
|
97
95
|
*/
|
98
96
|
export declare const sendAuthorizationResponse: SendAuthorizationResponse;
|
97
|
+
/**
|
98
|
+
* Type definition for the function that sends the authorization response
|
99
|
+
* to the Relying Party, completing the presentation flow.
|
100
|
+
*/
|
101
|
+
export type SendAuthorizationErrorResponse = (requestObject: Out<VerifyRequestObjectSignature>["requestObject"], error: ErrorResponse, jwkKeys: Out<FetchJwks>["keys"], context?: {
|
102
|
+
appFetch?: GlobalFetch["fetch"];
|
103
|
+
}) => Promise<AuthorizationResponse>;
|
104
|
+
/**
|
105
|
+
* Sends the authorization error response to the Relying Party (RP) using the specified `response_mode`.
|
106
|
+
* This function completes the presentation flow in an OpenID 4 Verifiable Presentations scenario.
|
107
|
+
*
|
108
|
+
* @param requestObject - The request details, including presentation requirements.
|
109
|
+
* @param error - The response error value
|
110
|
+
* @param jwkKeys - Array of JWKs from the Relying Party for optional encryption.
|
111
|
+
* @param context - Contains optional custom fetch implementation.
|
112
|
+
* @returns Parsed and validated authorization response from the Relying Party.
|
113
|
+
*/
|
114
|
+
export declare const sendAuthorizationErrorResponse: SendAuthorizationErrorResponse;
|
99
115
|
//# sourceMappingURL=08-send-authorization-response.d.ts.map
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"08-send-authorization-response.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/08-send-authorization-response.ts"],"names":[],"mappings":"AAMA,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,uBAAuB,CAAC;AACvD,OAAO,KAAK,EAAE,4BAA4B,EAAE,MAAM,4BAA4B,CAAC;AAE/E,OAAO,EAAoB,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAE9D,OAAO,
|
1
|
+
{"version":3,"file":"08-send-authorization-response.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/08-send-authorization-response.ts"],"names":[],"mappings":"AAMA,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,uBAAuB,CAAC;AACvD,OAAO,KAAK,EAAE,4BAA4B,EAAE,MAAM,4BAA4B,CAAC;AAE/E,OAAO,EAAoB,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAE9D,OAAO,EACL,8BAA8B,EAC9B,aAAa,EACb,sBAAsB,EACtB,KAAK,YAAY,EAClB,MAAM,SAAS,CAAC;AACjB,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AACzB,OAAO,KAAK,EAAE,GAAG,EAAE,MAAM,iBAAiB,CAAC;AAE3C,MAAM,MAAM,qBAAqB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,qBAAqB,CAAC,CAAC;AAC1E,eAAO,MAAM,qBAAqB;;;;;;;;;;;;EAUhC,CAAC;AAEH;;;;;;;GAOG;AACH,eAAO,MAAM,wBAAwB,cACxB,IAAI,SAAS,CAAC,CAAC,MAAM,CAAC,KAChC,GAWF,CAAC;AAEF;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,eAAO,MAAM,cAAc,kBACV,IAAI,4BAA4B,CAAC,CAAC,eAAe,CAAC,0BACzC,sBAAsB;cAGpC,MAAM;6BACS,OAAO,MAAM,EAAE,OAAO,CAAC;EAuCjD,CAAC;AAEF;;;;;;GAMG;AACH,eAAO,MAAM,mBAAmB,kBACf,IAAI,4BAA4B,CAAC,CAAC,eAAe,CAAC,WACxD,8BAA8B,KACtC,QAAQ,MAAM,CAWhB,CAAC;AAEF;;;;;;;;GAQG;AACH,eAAO,MAAM,sBAAsB,YACxB,IAAI,SAAS,CAAC,CAAC,MAAM,CAAC,iBAChB,IAAI,4BAA4B,CAAC,CAAC,eAAe,CAAC,WACxD,8BAA8B,KACtC,QAAQ,MAAM,CA8BhB,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,yBAAyB,GAAG,CACtC,aAAa,EAAE,GAAG,CAAC,4BAA4B,CAAC,CAAC,eAAe,CAAC,EACjE,sBAAsB,EAAE,sBAAsB,EAC9C,OAAO,EAAE,GAAG,CAAC,SAAS,CAAC,CAAC,MAAM,CAAC,EAC/B,YAAY,EAAE,YAAY,EAAE,iDAAiD;AAC7E,OAAO,CAAC,EAAE;IACR,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;CACjC,KACE,OAAO,CAAC,qBAAqB,CAAC,CAAC;AAEpC;;;;;;;;;;GAUG;AACH,eAAO,MAAM,yBAAyB,EAAE,yBAqCvC,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,8BAA8B,GAAG,CAC3C,aAAa,EAAE,GAAG,CAAC,4BAA4B,CAAC,CAAC,eAAe,CAAC,EACjE,KAAK,EAAE,aAAa,EACpB,OAAO,EAAE,GAAG,CAAC,SAAS,CAAC,CAAC,MAAM,CAAC,EAC/B,OAAO,CAAC,EAAE;IACR,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;CACjC,KACE,OAAO,CAAC,qBAAqB,CAAC,CAAC;AAEpC;;;;;;;;;GASG;AACH,eAAO,MAAM,8BAA8B,EAAE,8BAuB1C,CAAC"}
|
@@ -5,8 +5,8 @@ import { fetchJwksFromRequestObject, fetchJwksFromConfig, type FetchJwks } from
|
|
5
5
|
import { verifyRequestObjectSignature, type VerifyRequestObjectSignature } from "./05-verify-request-object";
|
6
6
|
import { fetchPresentDefinition, type FetchPresentationDefinition } from "./06-fetch-presentation-definition";
|
7
7
|
import { evaluateInputDescriptorForSdJwt4VC, type EvaluateInputDescriptorSdJwt4VC } from "./07-evaluate-input-descriptor";
|
8
|
-
import { sendAuthorizationResponse, type SendAuthorizationResponse } from "./08-send-authorization-response";
|
8
|
+
import { sendAuthorizationResponse, type SendAuthorizationResponse, sendAuthorizationErrorResponse, type SendAuthorizationErrorResponse } from "./08-send-authorization-response";
|
9
9
|
import * as Errors from "./errors";
|
10
|
-
export { startFlowFromQR, evaluateRelyingPartyTrust, getRequestObject, fetchJwksFromRequestObject, fetchJwksFromConfig, verifyRequestObjectSignature, fetchPresentDefinition, evaluateInputDescriptorForSdJwt4VC, sendAuthorizationResponse, Errors, };
|
11
|
-
export type { StartFlow, EvaluateRelyingPartyTrust, GetRequestObject, FetchJwks, VerifyRequestObjectSignature, FetchPresentationDefinition, EvaluateInputDescriptorSdJwt4VC, SendAuthorizationResponse, };
|
10
|
+
export { startFlowFromQR, evaluateRelyingPartyTrust, getRequestObject, fetchJwksFromRequestObject, fetchJwksFromConfig, verifyRequestObjectSignature, fetchPresentDefinition, evaluateInputDescriptorForSdJwt4VC, sendAuthorizationResponse, sendAuthorizationErrorResponse, Errors, };
|
11
|
+
export type { StartFlow, EvaluateRelyingPartyTrust, GetRequestObject, FetchJwks, VerifyRequestObjectSignature, FetchPresentationDefinition, EvaluateInputDescriptorSdJwt4VC, SendAuthorizationResponse, SendAuthorizationErrorResponse, };
|
12
12
|
//# sourceMappingURL=index.d.ts.map
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,KAAK,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAClE,OAAO,EACL,yBAAyB,EACzB,KAAK,yBAAyB,EAC/B,MAAM,wBAAwB,CAAC;AAChC,OAAO,EACL,gBAAgB,EAChB,KAAK,gBAAgB,EACtB,MAAM,yBAAyB,CAAC;AACjC,OAAO,EACL,0BAA0B,EAC1B,mBAAmB,EACnB,KAAK,SAAS,EACf,MAAM,uBAAuB,CAAC;AAC/B,OAAO,EACL,4BAA4B,EAC5B,KAAK,4BAA4B,EAClC,MAAM,4BAA4B,CAAC;AACpC,OAAO,EACL,sBAAsB,EACtB,KAAK,2BAA2B,EACjC,MAAM,oCAAoC,CAAC;AAC5C,OAAO,EACL,kCAAkC,EAClC,KAAK,+BAA+B,EACrC,MAAM,gCAAgC,CAAC;AACxC,OAAO,EACL,yBAAyB,EACzB,KAAK,yBAAyB,
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,KAAK,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAClE,OAAO,EACL,yBAAyB,EACzB,KAAK,yBAAyB,EAC/B,MAAM,wBAAwB,CAAC;AAChC,OAAO,EACL,gBAAgB,EAChB,KAAK,gBAAgB,EACtB,MAAM,yBAAyB,CAAC;AACjC,OAAO,EACL,0BAA0B,EAC1B,mBAAmB,EACnB,KAAK,SAAS,EACf,MAAM,uBAAuB,CAAC;AAC/B,OAAO,EACL,4BAA4B,EAC5B,KAAK,4BAA4B,EAClC,MAAM,4BAA4B,CAAC;AACpC,OAAO,EACL,sBAAsB,EACtB,KAAK,2BAA2B,EACjC,MAAM,oCAAoC,CAAC;AAC5C,OAAO,EACL,kCAAkC,EAClC,KAAK,+BAA+B,EACrC,MAAM,gCAAgC,CAAC;AACxC,OAAO,EACL,yBAAyB,EACzB,KAAK,yBAAyB,EAC9B,8BAA8B,EAC9B,KAAK,8BAA8B,EACpC,MAAM,kCAAkC,CAAC;AAC1C,OAAO,KAAK,MAAM,MAAM,UAAU,CAAC;AAEnC,OAAO,EACL,eAAe,EACf,yBAAyB,EACzB,gBAAgB,EAChB,0BAA0B,EAC1B,mBAAmB,EACnB,4BAA4B,EAC5B,sBAAsB,EACtB,kCAAkC,EAClC,yBAAyB,EACzB,8BAA8B,EAC9B,MAAM,GACP,CAAC;AACF,YAAY,EACV,SAAS,EACT,yBAAyB,EACzB,gBAAgB,EAChB,SAAS,EACT,4BAA4B,EAC5B,2BAA2B,EAC3B,+BAA+B,EAC/B,yBAAyB,EACzB,8BAA8B,GAC/B,CAAC"}
|
@@ -898,4 +898,30 @@ export declare const RequestObject: z.ZodObject<{
|
|
898
898
|
}[] | undefined;
|
899
899
|
} | undefined;
|
900
900
|
}>;
|
901
|
+
/**
|
902
|
+
* This type models the possible error responses the OpenID4VP protocol allows for a presentation of a credential.
|
903
|
+
* See https://openid.github.io/OpenID4VP/openid-4-verifiable-presentations-wg-draft.html#name-error-response for more information.
|
904
|
+
*/
|
905
|
+
export type ErrorResponse = z.infer<typeof ErrorResponse>;
|
906
|
+
export declare const ErrorResponse: z.ZodEnum<["invalid_scope", "invalid_request", "invalid_client", "access_denied"]>;
|
907
|
+
/**
|
908
|
+
* Type that defines the possible payload formats accepted by {@link buildDirectPostJwtBody} and {@link buildDirectPostBody}
|
909
|
+
*/
|
910
|
+
export type DirectAuthorizationBodyPayload = z.infer<typeof DirectAuthorizationBodyPayload>;
|
911
|
+
export declare const DirectAuthorizationBodyPayload: z.ZodUnion<[z.ZodObject<{
|
912
|
+
vp_token: z.ZodString;
|
913
|
+
presentation_submission: z.ZodRecord<z.ZodString, z.ZodUnknown>;
|
914
|
+
}, "strip", z.ZodTypeAny, {
|
915
|
+
vp_token: string;
|
916
|
+
presentation_submission: Record<string, unknown>;
|
917
|
+
}, {
|
918
|
+
vp_token: string;
|
919
|
+
presentation_submission: Record<string, unknown>;
|
920
|
+
}>, z.ZodObject<{
|
921
|
+
error: z.ZodEnum<["invalid_scope", "invalid_request", "invalid_client", "access_denied"]>;
|
922
|
+
}, "strip", z.ZodTypeAny, {
|
923
|
+
error: "invalid_scope" | "invalid_request" | "invalid_client" | "access_denied";
|
924
|
+
}, {
|
925
|
+
error: "invalid_scope" | "invalid_request" | "invalid_client" | "access_denied";
|
926
|
+
}>]>;
|
901
927
|
//# sourceMappingURL=types.d.ts.map
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AAEjE,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAGzB;;GAEG;AACH,MAAM,MAAM,YAAY,GAAG;IACO,MAAM;IACzB,MAAM,EAAE;IACsC,aAAa;CACzE,CAAC;AAmBF,MAAM,MAAM,eAAe,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,eAAe,CAAC,CAAC;AAC9D,eAAO,MAAM,eAAe;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAO1B,CAAC;AAqBH,MAAM,MAAM,sBAAsB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,sBAAsB,CAAC,CAAC;AAC5E,eAAO,MAAM,sBAAsB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAMjC,CAAC;AAEH,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAC1D,eAAO,MAAM,aAAa;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAqBxB,CAAC"}
|
1
|
+
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AAEjE,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAGzB;;GAEG;AACH,MAAM,MAAM,YAAY,GAAG;IACO,MAAM;IACzB,MAAM,EAAE;IACsC,aAAa;CACzE,CAAC;AAmBF,MAAM,MAAM,eAAe,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,eAAe,CAAC,CAAC;AAC9D,eAAO,MAAM,eAAe;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAO1B,CAAC;AAqBH,MAAM,MAAM,sBAAsB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,sBAAsB,CAAC,CAAC;AAC5E,eAAO,MAAM,sBAAsB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAMjC,CAAC;AAEH,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAC1D,eAAO,MAAM,aAAa;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAqBxB,CAAC;AAEH;;;GAGG;AACH,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAC1D,eAAO,MAAM,aAAa,oFAKxB,CAAC;AAEH;;GAEG;AACH,MAAM,MAAM,8BAA8B,GAAG,CAAC,CAAC,KAAK,CAClD,OAAO,8BAA8B,CACtC,CAAC;AACF,eAAO,MAAM,8BAA8B;;;;;;;;;;;;;;;IAMzC,CAAC"}
|
@@ -44,12 +44,64 @@ export declare const CredentialClaimDisplay: z.ZodObject<{
|
|
44
44
|
name: string;
|
45
45
|
locale: string;
|
46
46
|
}>;
|
47
|
-
export declare const CredentialFormat: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"
|
47
|
+
export declare const CredentialFormat: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"mso_mdoc">]>;
|
48
|
+
export type CredentialClaim = z.infer<typeof CredentialClaim>;
|
49
|
+
export declare const CredentialClaim: z.ZodObject<{
|
50
|
+
mandatory: z.ZodBoolean;
|
51
|
+
display: z.ZodArray<z.ZodObject<{
|
52
|
+
name: z.ZodString;
|
53
|
+
locale: z.ZodString;
|
54
|
+
}, "strip", z.ZodTypeAny, {
|
55
|
+
name: string;
|
56
|
+
locale: string;
|
57
|
+
}, {
|
58
|
+
name: string;
|
59
|
+
locale: string;
|
60
|
+
}>, "many">;
|
61
|
+
}, "strip", z.ZodTypeAny, {
|
62
|
+
mandatory: boolean;
|
63
|
+
display: {
|
64
|
+
name: string;
|
65
|
+
locale: string;
|
66
|
+
}[];
|
67
|
+
}, {
|
68
|
+
mandatory: boolean;
|
69
|
+
display: {
|
70
|
+
name: string;
|
71
|
+
locale: string;
|
72
|
+
}[];
|
73
|
+
}>;
|
74
|
+
export type CredentialSdJwtClaims = z.infer<typeof CredentialSdJwtClaims>;
|
75
|
+
export declare const CredentialSdJwtClaims: z.ZodRecord<z.ZodString, z.ZodObject<{
|
76
|
+
mandatory: z.ZodBoolean;
|
77
|
+
display: z.ZodArray<z.ZodObject<{
|
78
|
+
name: z.ZodString;
|
79
|
+
locale: z.ZodString;
|
80
|
+
}, "strip", z.ZodTypeAny, {
|
81
|
+
name: string;
|
82
|
+
locale: string;
|
83
|
+
}, {
|
84
|
+
name: string;
|
85
|
+
locale: string;
|
86
|
+
}>, "many">;
|
87
|
+
}, "strip", z.ZodTypeAny, {
|
88
|
+
mandatory: boolean;
|
89
|
+
display: {
|
90
|
+
name: string;
|
91
|
+
locale: string;
|
92
|
+
}[];
|
93
|
+
}, {
|
94
|
+
mandatory: boolean;
|
95
|
+
display: {
|
96
|
+
name: string;
|
97
|
+
locale: string;
|
98
|
+
}[];
|
99
|
+
}>>;
|
48
100
|
export type CredentialConfigurationSupported = z.infer<typeof CredentialConfigurationSupported>;
|
49
101
|
export declare const CredentialConfigurationSupported: z.ZodRecord<z.ZodString, z.ZodObject<{
|
50
102
|
cryptographic_suites_supported: z.ZodArray<z.ZodString, "many">;
|
51
|
-
vct: z.ZodString
|
52
|
-
scope: z.ZodString
|
103
|
+
vct: z.ZodOptional<z.ZodString>;
|
104
|
+
scope: z.ZodOptional<z.ZodString>;
|
53
105
|
cryptographic_binding_methods_supported: z.ZodArray<z.ZodString, "many">;
|
54
106
|
display: z.ZodArray<z.ZodObject<{
|
55
107
|
name: z.ZodString;
|
@@ -85,8 +137,8 @@ export declare const CredentialConfigurationSupported: z.ZodRecord<z.ZodString,
|
|
85
137
|
background_color?: string | undefined;
|
86
138
|
text_color?: string | undefined;
|
87
139
|
}>, "many">;
|
88
|
-
format: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"
|
89
|
-
claims: z.ZodRecord<z.ZodString, z.ZodObject<{
|
140
|
+
format: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"mso_mdoc">]>;
|
141
|
+
claims: z.ZodOptional<z.ZodUnion<[z.ZodRecord<z.ZodString, z.ZodObject<{
|
90
142
|
mandatory: z.ZodBoolean;
|
91
143
|
display: z.ZodArray<z.ZodObject<{
|
92
144
|
name: z.ZodString;
|
@@ -110,7 +162,31 @@ export declare const CredentialConfigurationSupported: z.ZodRecord<z.ZodString,
|
|
110
162
|
name: string;
|
111
163
|
locale: string;
|
112
164
|
}[];
|
113
|
-
}
|
165
|
+
}>>, z.ZodRecord<z.ZodString, z.ZodRecord<z.ZodString, z.ZodObject<{
|
166
|
+
mandatory: z.ZodBoolean;
|
167
|
+
display: z.ZodArray<z.ZodObject<{
|
168
|
+
name: z.ZodString;
|
169
|
+
locale: z.ZodString;
|
170
|
+
}, "strip", z.ZodTypeAny, {
|
171
|
+
name: string;
|
172
|
+
locale: string;
|
173
|
+
}, {
|
174
|
+
name: string;
|
175
|
+
locale: string;
|
176
|
+
}>, "many">;
|
177
|
+
}, "strip", z.ZodTypeAny, {
|
178
|
+
mandatory: boolean;
|
179
|
+
display: {
|
180
|
+
name: string;
|
181
|
+
locale: string;
|
182
|
+
}[];
|
183
|
+
}, {
|
184
|
+
mandatory: boolean;
|
185
|
+
display: {
|
186
|
+
name: string;
|
187
|
+
locale: string;
|
188
|
+
}[];
|
189
|
+
}>>>]>>;
|
114
190
|
}, "strip", z.ZodTypeAny, {
|
115
191
|
display: {
|
116
192
|
name: string;
|
@@ -123,17 +199,23 @@ export declare const CredentialConfigurationSupported: z.ZodRecord<z.ZodString,
|
|
123
199
|
text_color?: string | undefined;
|
124
200
|
}[];
|
125
201
|
cryptographic_suites_supported: string[];
|
126
|
-
vct: string;
|
127
|
-
scope: string;
|
128
202
|
cryptographic_binding_methods_supported: string[];
|
129
|
-
format: "vc+sd-jwt" | "
|
130
|
-
|
203
|
+
format: "vc+sd-jwt" | "mso_mdoc";
|
204
|
+
vct?: string | undefined;
|
205
|
+
scope?: string | undefined;
|
206
|
+
claims?: Record<string, {
|
131
207
|
mandatory: boolean;
|
132
208
|
display: {
|
133
209
|
name: string;
|
134
210
|
locale: string;
|
135
211
|
}[];
|
136
|
-
}
|
212
|
+
}> | Record<string, Record<string, {
|
213
|
+
mandatory: boolean;
|
214
|
+
display: {
|
215
|
+
name: string;
|
216
|
+
locale: string;
|
217
|
+
}[];
|
218
|
+
}>> | undefined;
|
137
219
|
}, {
|
138
220
|
display: {
|
139
221
|
name: string;
|
@@ -146,17 +228,23 @@ export declare const CredentialConfigurationSupported: z.ZodRecord<z.ZodString,
|
|
146
228
|
text_color?: string | undefined;
|
147
229
|
}[];
|
148
230
|
cryptographic_suites_supported: string[];
|
149
|
-
vct: string;
|
150
|
-
scope: string;
|
151
231
|
cryptographic_binding_methods_supported: string[];
|
152
|
-
format: "vc+sd-jwt" | "
|
153
|
-
|
232
|
+
format: "vc+sd-jwt" | "mso_mdoc";
|
233
|
+
vct?: string | undefined;
|
234
|
+
scope?: string | undefined;
|
235
|
+
claims?: Record<string, {
|
154
236
|
mandatory: boolean;
|
155
237
|
display: {
|
156
238
|
name: string;
|
157
239
|
locale: string;
|
158
240
|
}[];
|
159
|
-
}
|
241
|
+
}> | Record<string, Record<string, {
|
242
|
+
mandatory: boolean;
|
243
|
+
display: {
|
244
|
+
name: string;
|
245
|
+
locale: string;
|
246
|
+
}[];
|
247
|
+
}>> | undefined;
|
160
248
|
}>>;
|
161
249
|
export type CredentialIssuerKeys = z.infer<typeof CredentialIssuerKeys>;
|
162
250
|
export declare const CredentialIssuerKeys: z.ZodObject<{
|
@@ -285,8 +373,8 @@ export type CredentialIssuerConfiguration = z.infer<typeof CredentialIssuerConfi
|
|
285
373
|
export declare const CredentialIssuerConfiguration: z.ZodObject<{
|
286
374
|
credential_configurations_supported: z.ZodRecord<z.ZodString, z.ZodObject<{
|
287
375
|
cryptographic_suites_supported: z.ZodArray<z.ZodString, "many">;
|
288
|
-
vct: z.ZodString
|
289
|
-
scope: z.ZodString
|
376
|
+
vct: z.ZodOptional<z.ZodString>;
|
377
|
+
scope: z.ZodOptional<z.ZodString>;
|
290
378
|
cryptographic_binding_methods_supported: z.ZodArray<z.ZodString, "many">;
|
291
379
|
display: z.ZodArray<z.ZodObject<{
|
292
380
|
name: z.ZodString;
|
@@ -322,8 +410,8 @@ export declare const CredentialIssuerConfiguration: z.ZodObject<{
|
|
322
410
|
background_color?: string | undefined;
|
323
411
|
text_color?: string | undefined;
|
324
412
|
}>, "many">;
|
325
|
-
format: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"
|
326
|
-
claims: z.ZodRecord<z.ZodString, z.ZodObject<{
|
413
|
+
format: z.ZodUnion<[z.ZodLiteral<"vc+sd-jwt">, z.ZodLiteral<"mso_mdoc">]>;
|
414
|
+
claims: z.ZodOptional<z.ZodUnion<[z.ZodRecord<z.ZodString, z.ZodObject<{
|
327
415
|
mandatory: z.ZodBoolean;
|
328
416
|
display: z.ZodArray<z.ZodObject<{
|
329
417
|
name: z.ZodString;
|
@@ -347,7 +435,31 @@ export declare const CredentialIssuerConfiguration: z.ZodObject<{
|
|
347
435
|
name: string;
|
348
436
|
locale: string;
|
349
437
|
}[];
|
350
|
-
}
|
438
|
+
}>>, z.ZodRecord<z.ZodString, z.ZodRecord<z.ZodString, z.ZodObject<{
|
439
|
+
mandatory: z.ZodBoolean;
|
440
|
+
display: z.ZodArray<z.ZodObject<{
|
441
|
+
name: z.ZodString;
|
442
|
+
locale: z.ZodString;
|
443
|
+
}, "strip", z.ZodTypeAny, {
|
444
|
+
name: string;
|
445
|
+
locale: string;
|
446
|
+
}, {
|
447
|
+
name: string;
|
448
|
+
locale: string;
|
449
|
+
}>, "many">;
|
450
|
+
}, "strip", z.ZodTypeAny, {
|
451
|
+
mandatory: boolean;
|
452
|
+
display: {
|
453
|
+
name: string;
|
454
|
+
locale: string;
|
455
|
+
}[];
|
456
|
+
}, {
|
457
|
+
mandatory: boolean;
|
458
|
+
display: {
|
459
|
+
name: string;
|
460
|
+
locale: string;
|
461
|
+
}[];
|
462
|
+
}>>>]>>;
|
351
463
|
}, "strip", z.ZodTypeAny, {
|
352
464
|
display: {
|
353
465
|
name: string;
|
@@ -360,17 +472,23 @@ export declare const CredentialIssuerConfiguration: z.ZodObject<{
|
|
360
472
|
text_color?: string | undefined;
|
361
473
|
}[];
|
362
474
|
cryptographic_suites_supported: string[];
|
363
|
-
vct: string;
|
364
|
-
scope: string;
|
365
475
|
cryptographic_binding_methods_supported: string[];
|
366
|
-
format: "vc+sd-jwt" | "
|
367
|
-
|
476
|
+
format: "vc+sd-jwt" | "mso_mdoc";
|
477
|
+
vct?: string | undefined;
|
478
|
+
scope?: string | undefined;
|
479
|
+
claims?: Record<string, {
|
480
|
+
mandatory: boolean;
|
481
|
+
display: {
|
482
|
+
name: string;
|
483
|
+
locale: string;
|
484
|
+
}[];
|
485
|
+
}> | Record<string, Record<string, {
|
368
486
|
mandatory: boolean;
|
369
487
|
display: {
|
370
488
|
name: string;
|
371
489
|
locale: string;
|
372
490
|
}[];
|
373
|
-
}
|
491
|
+
}>> | undefined;
|
374
492
|
}, {
|
375
493
|
display: {
|
376
494
|
name: string;
|
@@ -383,17 +501,23 @@ export declare const CredentialIssuerConfiguration: z.ZodObject<{
|
|
383
501
|
text_color?: string | undefined;
|
384
502
|
}[];
|
385
503
|
cryptographic_suites_supported: string[];
|
386
|
-
vct: string;
|
387
|
-
scope: string;
|
388
504
|
cryptographic_binding_methods_supported: string[];
|
389
|
-
format: "vc+sd-jwt" | "
|
390
|
-
|
505
|
+
format: "vc+sd-jwt" | "mso_mdoc";
|
506
|
+
vct?: string | undefined;
|
507
|
+
scope?: string | undefined;
|
508
|
+
claims?: Record<string, {
|
391
509
|
mandatory: boolean;
|
392
510
|
display: {
|
393
511
|
name: string;
|
394
512
|
locale: string;
|
395
513
|
}[];
|
396
|
-
}
|
514
|
+
}> | Record<string, Record<string, {
|
515
|
+
mandatory: boolean;
|
516
|
+
display: {
|
517
|
+
name: string;
|
518
|
+
locale: string;
|
519
|
+
}[];
|
520
|
+
}>> | undefined;
|
397
521
|
}>>;
|
398
522
|
pushed_authorization_request_endpoint: z.ZodString;
|
399
523
|
dpop_signing_alg_values_supported: z.ZodArray<z.ZodString, "many">;
|
@@ -536,17 +660,23 @@ export declare const CredentialIssuerConfiguration: z.ZodObject<{
|
|
536
660
|
text_color?: string | undefined;
|
537
661
|
}[];
|
538
662
|
cryptographic_suites_supported: string[];
|
539
|
-
vct: string;
|
540
|
-
scope: string;
|
541
663
|
cryptographic_binding_methods_supported: string[];
|
542
|
-
format: "vc+sd-jwt" | "
|
543
|
-
|
664
|
+
format: "vc+sd-jwt" | "mso_mdoc";
|
665
|
+
vct?: string | undefined;
|
666
|
+
scope?: string | undefined;
|
667
|
+
claims?: Record<string, {
|
544
668
|
mandatory: boolean;
|
545
669
|
display: {
|
546
670
|
name: string;
|
547
671
|
locale: string;
|
548
672
|
}[];
|
549
|
-
}
|
673
|
+
}> | Record<string, Record<string, {
|
674
|
+
mandatory: boolean;
|
675
|
+
display: {
|
676
|
+
name: string;
|
677
|
+
locale: string;
|
678
|
+
}[];
|
679
|
+
}>> | undefined;
|
550
680
|
}>;
|
551
681
|
pushed_authorization_request_endpoint: string;
|
552
682
|
dpop_signing_alg_values_supported: string[];
|
@@ -593,17 +723,23 @@ export declare const CredentialIssuerConfiguration: z.ZodObject<{
|
|
593
723
|
text_color?: string | undefined;
|
594
724
|
}[];
|
595
725
|
cryptographic_suites_supported: string[];
|
596
|
-
vct: string;
|
597
|
-
scope: string;
|
598
726
|
cryptographic_binding_methods_supported: string[];
|
599
|
-
format: "vc+sd-jwt" | "
|
600
|
-
|
727
|
+
format: "vc+sd-jwt" | "mso_mdoc";
|
728
|
+
vct?: string | undefined;
|
729
|
+
scope?: string | undefined;
|
730
|
+
claims?: Record<string, {
|
731
|
+
mandatory: boolean;
|
732
|
+
display: {
|
733
|
+
name: string;
|
734
|
+
locale: string;
|
735
|
+
}[];
|
736
|
+
}> | Record<string, Record<string, {
|
601
737
|
mandatory: boolean;
|
602
738
|
display: {
|
603
739
|
name: string;
|
604
740
|
locale: string;
|
605
741
|
}[];
|
606
|
-
}
|
742
|
+
}>> | undefined;
|
607
743
|
}>;
|
608
744
|
pushed_authorization_request_endpoint: string;
|
609
745
|
dpop_signing_alg_values_supported: string[];
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../../src/entity/openid-connect/issuer/types.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAIzB,MAAM,MAAM,iBAAiB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,iBAAiB,CAAC,CAAC;AAClE,eAAO,MAAM,iBAAiB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAW5B,CAAC;AAEH,eAAO,MAAM,sBAAsB;;;;;;;;;EAGjC,CAAC;AAEH,eAAO,MAAM,gBAAgB,
|
1
|
+
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../../src/entity/openid-connect/issuer/types.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAIzB,MAAM,MAAM,iBAAiB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,iBAAiB,CAAC,CAAC;AAClE,eAAO,MAAM,iBAAiB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAW5B,CAAC;AAEH,eAAO,MAAM,sBAAsB;;;;;;;;;EAGjC,CAAC;AAEH,eAAO,MAAM,gBAAgB,mEAG3B,CAAC;AAEH,MAAM,MAAM,eAAe,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,eAAe,CAAC,CAAC;AAC9D,eAAO,MAAM,eAAe;;;;;;;;;;;;;;;;;;;;;;;;EAG1B,CAAC;AAEH,MAAM,MAAM,qBAAqB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,qBAAqB,CAAC,CAAC;AAC1E,eAAO,MAAM,qBAAqB;;;;;;;;;;;;;;;;;;;;;;;;GAA4B,CAAC;AAE/D,MAAM,MAAM,gCAAgC,GAAG,CAAC,CAAC,KAAK,CACpD,OAAO,gCAAgC,CACxC,CAAC;AACF,eAAO,MAAM,gCAAgC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAe5C,CAAC;AAEF,MAAM,MAAM,oBAAoB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,oBAAoB,CAAC,CAAC;AACxE,eAAO,MAAM,oBAAoB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAE/B,CAAC;AAEH,MAAM,MAAM,6BAA6B,GAAG,CAAC,CAAC,KAAK,CACjD,OAAO,6BAA6B,CACrC,CAAC;AACF,eAAO,MAAM,6BAA6B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EASxC,CAAC"}
|
@@ -268,7 +268,7 @@ export declare const getCredentialIssuerEntityConfiguration: (entityBaseUrl: Par
|
|
268
268
|
}[];
|
269
269
|
scope: string;
|
270
270
|
cryptographic_binding_methods_supported: string[];
|
271
|
-
format: "vc+sd-jwt" | "
|
271
|
+
format: "vc+sd-jwt" | "mso_mdoc";
|
272
272
|
credential_signing_alg_values_supported: string[];
|
273
273
|
claims?: Record<string, {
|
274
274
|
display: {
|
@@ -802,7 +802,7 @@ export declare const getEntityConfiguration: (entityBaseUrl: Parameters<typeof f
|
|
802
802
|
}[];
|
803
803
|
scope: string;
|
804
804
|
cryptographic_binding_methods_supported: string[];
|
805
|
-
format: "vc+sd-jwt" | "
|
805
|
+
format: "vc+sd-jwt" | "mso_mdoc";
|
806
806
|
credential_signing_alg_values_supported: string[];
|
807
807
|
claims?: Record<string, {
|
808
808
|
display: {
|