@pagopa/io-react-native-wallet 2.0.0-next.3 → 2.0.0-next.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/commonjs/credential/issuance/04-complete-user-authorization.js +75 -57
- package/lib/commonjs/credential/issuance/04-complete-user-authorization.js.map +1 -1
- package/lib/commonjs/credential/issuance/06-obtain-credential.js.map +1 -1
- package/lib/commonjs/credential/issuance/README.md +45 -34
- package/lib/commonjs/credential/issuance/types.js +1 -0
- package/lib/commonjs/credential/issuance/types.js.map +1 -1
- package/lib/commonjs/credential/presentation/07-evaluate-dcql-query.js +6 -13
- package/lib/commonjs/credential/presentation/07-evaluate-dcql-query.js.map +1 -1
- package/lib/commonjs/credential/presentation/07-evaluate-input-descriptor.js +7 -8
- package/lib/commonjs/credential/presentation/07-evaluate-input-descriptor.js.map +1 -1
- package/lib/commonjs/credential/presentation/types.js +1 -1
- package/lib/commonjs/credential/presentation/types.js.map +1 -1
- package/lib/commonjs/sd-jwt/index.js +6 -1
- package/lib/commonjs/sd-jwt/index.js.map +1 -1
- package/lib/commonjs/sd-jwt/types.js +25 -9
- package/lib/commonjs/sd-jwt/types.js.map +1 -1
- package/lib/commonjs/wallet-instance-attestation/types.js +1 -2
- package/lib/commonjs/wallet-instance-attestation/types.js.map +1 -1
- package/lib/module/credential/issuance/04-complete-user-authorization.js +76 -58
- package/lib/module/credential/issuance/04-complete-user-authorization.js.map +1 -1
- package/lib/module/credential/issuance/06-obtain-credential.js.map +1 -1
- package/lib/module/credential/issuance/README.md +45 -34
- package/lib/module/credential/issuance/types.js +1 -0
- package/lib/module/credential/issuance/types.js.map +1 -1
- package/lib/module/credential/presentation/07-evaluate-dcql-query.js +6 -13
- package/lib/module/credential/presentation/07-evaluate-dcql-query.js.map +1 -1
- package/lib/module/credential/presentation/07-evaluate-input-descriptor.js +7 -8
- package/lib/module/credential/presentation/07-evaluate-input-descriptor.js.map +1 -1
- package/lib/module/credential/presentation/types.js +1 -1
- package/lib/module/credential/presentation/types.js.map +1 -1
- package/lib/module/sd-jwt/index.js +6 -1
- package/lib/module/sd-jwt/index.js.map +1 -1
- package/lib/module/sd-jwt/types.js +25 -9
- package/lib/module/sd-jwt/types.js.map +1 -1
- package/lib/module/wallet-instance-attestation/types.js +1 -2
- package/lib/module/wallet-instance-attestation/types.js.map +1 -1
- package/lib/typescript/credential/issuance/04-complete-user-authorization.d.ts +7 -14
- package/lib/typescript/credential/issuance/04-complete-user-authorization.d.ts.map +1 -1
- package/lib/typescript/credential/issuance/06-obtain-credential.d.ts.map +1 -1
- package/lib/typescript/credential/issuance/types.d.ts +3 -0
- package/lib/typescript/credential/issuance/types.d.ts.map +1 -1
- package/lib/typescript/credential/presentation/01-start-flow.d.ts +2 -2
- package/lib/typescript/credential/presentation/07-evaluate-dcql-query.d.ts +4 -3
- package/lib/typescript/credential/presentation/07-evaluate-dcql-query.d.ts.map +1 -1
- package/lib/typescript/credential/presentation/07-evaluate-input-descriptor.d.ts +9 -5
- package/lib/typescript/credential/presentation/07-evaluate-input-descriptor.d.ts.map +1 -1
- package/lib/typescript/credential/presentation/types.d.ts +3 -4
- package/lib/typescript/credential/presentation/types.d.ts.map +1 -1
- package/lib/typescript/credential/status/types.d.ts +4 -4
- package/lib/typescript/sd-jwt/index.d.ts +68 -40
- package/lib/typescript/sd-jwt/index.d.ts.map +1 -1
- package/lib/typescript/sd-jwt/types.d.ts +97 -46
- package/lib/typescript/sd-jwt/types.d.ts.map +1 -1
- package/package.json +1 -1
- package/src/credential/issuance/04-complete-user-authorization.ts +79 -85
- package/src/credential/issuance/06-obtain-credential.ts +4 -1
- package/src/credential/issuance/README.md +45 -34
- package/src/credential/issuance/types.ts +1 -0
- package/src/credential/presentation/07-evaluate-dcql-query.ts +16 -17
- package/src/credential/presentation/07-evaluate-input-descriptor.ts +16 -13
- package/src/credential/presentation/types.ts +1 -2
- package/src/sd-jwt/index.ts +5 -1
- package/src/sd-jwt/types.ts +24 -10
- package/src/wallet-instance-attestation/types.ts +1 -1
@@ -8,11 +8,9 @@ import { RequestObject } from "../presentation/types";
|
|
8
8
|
* The interface of the phase to complete User authorization via strong identification when the response mode is "query" and the request credential is a PersonIdentificationData.
|
9
9
|
*/
|
10
10
|
export type CompleteUserAuthorizationWithQueryMode = (authRedirectUrl: string) => Promise<AuthorizationResult>;
|
11
|
-
export type CompleteUserAuthorizationWithFormPostJwtMode = (requestObject: Out<GetRequestedCredentialToBePresented>, context: {
|
11
|
+
export type CompleteUserAuthorizationWithFormPostJwtMode = (requestObject: Out<GetRequestedCredentialToBePresented>, pid: string, context: {
|
12
12
|
wiaCryptoContext: CryptoContext;
|
13
13
|
pidCryptoContext: CryptoContext;
|
14
|
-
pid: string;
|
15
|
-
walletInstanceAttestation: string;
|
16
14
|
appFetch?: GlobalFetch["fetch"];
|
17
15
|
}) => Promise<AuthorizationResult>;
|
18
16
|
export type GetRequestedCredentialToBePresented = (issuerRequestUri: Out<StartUserAuthorization>["issuerRequestUri"], clientId: Out<StartUserAuthorization>["clientId"], issuerConf: Out<EvaluateIssuerTrust>["issuerConf"], appFetch?: GlobalFetch["fetch"]) => Promise<RequestObject>;
|
@@ -51,18 +49,13 @@ export declare const completeUserAuthorizationWithQueryMode: CompleteUserAuthori
|
|
51
49
|
*/
|
52
50
|
export declare const getRequestedCredentialToBePresented: GetRequestedCredentialToBePresented;
|
53
51
|
/**
|
54
|
-
* WARNING: This function must be called after {@link
|
52
|
+
* WARNING: This function must be called after {@link getRequestedCredentialToBePresented}. The next function to be called is {@link authorizeAccess}.
|
55
53
|
* The interface of the phase to complete User authorization via presentation of existing credentials when the response mode is "form_post.jwt".
|
56
|
-
*
|
57
|
-
*
|
58
|
-
* @param
|
59
|
-
* @param
|
60
|
-
* @param
|
61
|
-
* @param context.walletInstanceAccestation the Wallet Instance's attestation to be presented
|
62
|
-
* @param context.pid the PID to be presented
|
63
|
-
* @param context.wiaCryptoContext The Wallet Instance's crypto context associated with the walletInstanceAttestation parameter
|
64
|
-
* @param context.pidCryptoContext The PID crypto context associated with the pid parameter
|
65
|
-
* @param context.appFetch (optional) fetch api implementation. Default: built-in fetch
|
54
|
+
* The information is obtained by performing a POST request to the endpoint received in the response_uri field of the requestObject, where the Authorization Response payload is posted.
|
55
|
+
* Following this,the redirect_uri from the response is used to obtain the final authorization response.
|
56
|
+
* @param requestObject - The request object containing the necessary parameters for authorization.
|
57
|
+
* @param pid The `PID` that must be presented for the issuance of credentials.
|
58
|
+
* @param appFetch (optional) fetch api implementation. Default: built-in fetch
|
66
59
|
* @throws {ValidationFailed} if an error while validating the response
|
67
60
|
* @returns the authorization response which contains code, state and iss
|
68
61
|
*/
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"04-complete-user-authorization.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/04-complete-user-authorization.ts"],"names":[],"mappings":"AAAA,OAAO,EAGL,KAAK,mBAAmB,EACzB,MAAM,kBAAkB,CAAC;AAC1B,OAAO,EAAoB,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC9D,OAAO,KAAK,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AAG5E,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,
|
1
|
+
{"version":3,"file":"04-complete-user-authorization.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/04-complete-user-authorization.ts"],"names":[],"mappings":"AAAA,OAAO,EAGL,KAAK,mBAAmB,EACzB,MAAM,kBAAkB,CAAC;AAC1B,OAAO,EAAoB,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC9D,OAAO,KAAK,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AAG5E,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAGL,KAAK,aAAa,EACnB,MAAM,6BAA6B,CAAC;AACrC,OAAO,EAA2B,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAQ/E;;GAEG;AACH,MAAM,MAAM,sCAAsC,GAAG,CACnD,eAAe,EAAE,MAAM,KACpB,OAAO,CAAC,mBAAmB,CAAC,CAAC;AAElC,MAAM,MAAM,4CAA4C,GAAG,CACzD,aAAa,EAAE,GAAG,CAAC,mCAAmC,CAAC,EACvD,GAAG,EAAE,MAAM,EACX,OAAO,EAAE;IACP,gBAAgB,EAAE,aAAa,CAAC;IAChC,gBAAgB,EAAE,aAAa,CAAC;IAChC,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;CACjC,KACE,OAAO,CAAC,mBAAmB,CAAC,CAAC;AAElC,MAAM,MAAM,mCAAmC,GAAG,CAChD,gBAAgB,EAAE,GAAG,CAAC,sBAAsB,CAAC,CAAC,kBAAkB,CAAC,EACjE,QAAQ,EAAE,GAAG,CAAC,sBAAsB,CAAC,CAAC,UAAU,CAAC,EACjD,UAAU,EAAE,GAAG,CAAC,mBAAmB,CAAC,CAAC,YAAY,CAAC,EAClD,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,KAC5B,OAAO,CAAC,aAAa,CAAC,CAAC;AAE5B,MAAM,MAAM,qBAAqB,GAAG,CAClC,gBAAgB,EAAE,GAAG,CAAC,sBAAsB,CAAC,CAAC,kBAAkB,CAAC,EACjE,QAAQ,EAAE,GAAG,CAAC,sBAAsB,CAAC,CAAC,UAAU,CAAC,EACjD,UAAU,EAAE,GAAG,CAAC,mBAAmB,CAAC,CAAC,YAAY,CAAC,EAClD,OAAO,CAAC,EAAE,MAAM,KACb,OAAO,CAAC;IACX,OAAO,EAAE,MAAM,CAAC;CACjB,CAAC,CAAC;AAEH;;;;;;;;GAQG;AACH,eAAO,MAAM,qBAAqB,EAAE,qBAqBnC,CAAC;AAEF;;;;;;GAMG;AACH,eAAO,MAAM,sCAAsC,EAAE,sCASlD,CAAC;AAEJ;;;;;;;;;;;GAWG;AACH,eAAO,MAAM,mCAAmC,EAAE,mCAsC/C,CAAC;AAEJ;;;;;;;;;;GAUG;AACH,eAAO,MAAM,4CAA4C,EAAE,4CAoFxD,CAAC;AAEJ;;;;;;GAMG;AACH,eAAO,MAAM,0BAA0B,YAC5B,OAAO,KACf,mBAqBF,CAAC"}
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"06-obtain-credential.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/06-obtain-credential.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,aAAa,EAGnB,MAAM,6BAA6B,CAAC;AACrC,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,uBAAuB,CAAC;AAC7D,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAAoB,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC9D,OAAO,KAAK,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AAa5E,MAAM,MAAM,gBAAgB,GAAG,CAC7B,UAAU,EAAE,GAAG,CAAC,mBAAmB,CAAC,CAAC,YAAY,CAAC,EAClD,WAAW,EAAE,GAAG,CAAC,eAAe,CAAC,CAAC,aAAa,CAAC,EAChD,QAAQ,EAAE,GAAG,CAAC,sBAAsB,CAAC,CAAC,UAAU,CAAC,EACjD,oBAAoB,EAAE;IACpB,2BAA2B,EAAE,MAAM,CAAC;IACpC,qBAAqB,CAAC,EAAE,MAAM,CAAC;CAChC,EACD,OAAO,EAAE;IACP,iBAAiB,EAAE,aAAa,CAAC;IACjC,uBAAuB,EAAE,aAAa,CAAC;IACvC,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;CACjC,EACD,aAAa,CAAC,EAAE,WAAW,KACxB,OAAO,CAAC;
|
1
|
+
{"version":3,"file":"06-obtain-credential.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/06-obtain-credential.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,aAAa,EAGnB,MAAM,6BAA6B,CAAC;AACrC,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,uBAAuB,CAAC;AAC7D,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAAoB,KAAK,GAAG,EAAE,MAAM,kBAAkB,CAAC;AAC9D,OAAO,KAAK,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AAa5E,MAAM,MAAM,gBAAgB,GAAG,CAC7B,UAAU,EAAE,GAAG,CAAC,mBAAmB,CAAC,CAAC,YAAY,CAAC,EAClD,WAAW,EAAE,GAAG,CAAC,eAAe,CAAC,CAAC,aAAa,CAAC,EAChD,QAAQ,EAAE,GAAG,CAAC,sBAAsB,CAAC,CAAC,UAAU,CAAC,EACjD,oBAAoB,EAAE;IACpB,2BAA2B,EAAE,MAAM,CAAC;IACpC,qBAAqB,CAAC,EAAE,MAAM,CAAC;CAChC,EACD,OAAO,EAAE;IACP,iBAAiB,EAAE,aAAa,CAAC;IACjC,uBAAuB,EAAE,aAAa,CAAC;IACvC,QAAQ,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,CAAC;CACjC,EACD,aAAa,CAAC,EAAE,WAAW,KACxB,OAAO,CAAC;IACX,UAAU,EAAE,MAAM,CAAC;IACnB,MAAM,EAAE,MAAM,CAAC;CAChB,CAAC,CAAC;AAEH,eAAO,MAAM,gBAAgB,UACpB,MAAM,UACL,MAAM,YACJ,MAAM,OACX,aAAa,KACjB,QAAQ,MAAM,CAehB,CAAC;AAEF;;;;;;;;;;;;;;;GAeG;AACH,eAAO,MAAM,gBAAgB,EAAE,gBA0I9B,CAAC"}
|
@@ -16,6 +16,7 @@ export declare const AuthorizationDetail: z.ZodObject<{
|
|
16
16
|
export type TokenResponse = z.infer<typeof TokenResponse>;
|
17
17
|
export declare const TokenResponse: z.ZodObject<{
|
18
18
|
access_token: z.ZodString;
|
19
|
+
refresh_token: z.ZodOptional<z.ZodString>;
|
19
20
|
authorization_details: z.ZodArray<z.ZodObject<{
|
20
21
|
type: z.ZodLiteral<"openid_credential">;
|
21
22
|
credential_configuration_id: z.ZodString;
|
@@ -40,6 +41,7 @@ export declare const TokenResponse: z.ZodObject<{
|
|
40
41
|
}[];
|
41
42
|
expires_in: number;
|
42
43
|
token_type: string;
|
44
|
+
refresh_token?: string | undefined;
|
43
45
|
}, {
|
44
46
|
access_token: string;
|
45
47
|
authorization_details: {
|
@@ -49,6 +51,7 @@ export declare const TokenResponse: z.ZodObject<{
|
|
49
51
|
}[];
|
50
52
|
expires_in: number;
|
51
53
|
token_type: string;
|
54
|
+
refresh_token?: string | undefined;
|
52
55
|
}>;
|
53
56
|
export type CredentialResponse = z.infer<typeof CredentialResponse>;
|
54
57
|
export declare const CredentialResponse: z.ZodObject<{
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAEzB,MAAM,MAAM,mBAAmB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,mBAAmB,CAAC,CAAC;AACtE,eAAO,MAAM,mBAAmB;;;;;;;;;;;;EAI9B,CAAC;AAEH,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAE1D,eAAO,MAAM,aAAa
|
1
|
+
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../src/credential/issuance/types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAEzB,MAAM,MAAM,mBAAmB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,mBAAmB,CAAC,CAAC;AACtE,eAAO,MAAM,mBAAmB;;;;;;;;;;;;EAI9B,CAAC;AAEH,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAE1D,eAAO,MAAM,aAAa;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAMxB,CAAC;AAEH,MAAM,MAAM,kBAAkB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,kBAAkB,CAAC,CAAC;AAEpE,eAAO,MAAM,kBAAkB;;;;;;;;;;;;;;;;;;;EAO7B,CAAC;AAEH;;GAEG;AACH,eAAO,MAAM,sBAAsB;;;;;;EAEjC,CAAC;AAEH,MAAM,MAAM,YAAY,GAAG,OAAO,GAAG,eAAe,CAAC;AAErD,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAC1D,eAAO,MAAM,aAAa;;;;;;EAExB,CAAC"}
|
@@ -5,14 +5,14 @@ declare const PresentationParams: z.ZodObject<{
|
|
5
5
|
request_uri_method: z.ZodEnum<["get", "post"]>;
|
6
6
|
state: z.ZodOptional<z.ZodString>;
|
7
7
|
}, "strip", z.ZodTypeAny, {
|
8
|
+
request_uri_method: "get" | "post";
|
8
9
|
client_id: string;
|
9
10
|
request_uri: string;
|
10
|
-
request_uri_method: "get" | "post";
|
11
11
|
state?: string | undefined;
|
12
12
|
}, {
|
13
|
+
request_uri_method: "get" | "post";
|
13
14
|
client_id: string;
|
14
15
|
request_uri: string;
|
15
|
-
request_uri_method: "get" | "post";
|
16
16
|
state?: string | undefined;
|
17
17
|
}>;
|
18
18
|
export type PresentationParams = z.infer<typeof PresentationParams>;
|
@@ -1,6 +1,7 @@
|
|
1
1
|
import { DcqlQuery } from "dcql";
|
2
2
|
import type { Disclosure } from "../../sd-jwt/types";
|
3
3
|
import type { RemotePresentation } from "./types";
|
4
|
+
import type { CryptoContext } from "@pagopa/io-react-native-jwt";
|
4
5
|
/**
|
5
6
|
* The purpose for the credential request by the RP.
|
6
7
|
*/
|
@@ -8,18 +9,18 @@ type CredentialPurpose = {
|
|
8
9
|
required: boolean;
|
9
10
|
description?: string;
|
10
11
|
};
|
11
|
-
export type EvaluateDcqlQuery = (credentialsSdJwt: [
|
12
|
+
export type EvaluateDcqlQuery = (credentialsSdJwt: [CryptoContext, string][], query: DcqlQuery.Input) => {
|
12
13
|
id: string;
|
13
14
|
vct: string;
|
14
15
|
credential: string;
|
15
|
-
|
16
|
+
cryptoContext: CryptoContext;
|
16
17
|
requiredDisclosures: Disclosure[];
|
17
18
|
purposes: CredentialPurpose[];
|
18
19
|
}[];
|
19
20
|
export type PrepareRemotePresentations = (credentials: {
|
20
21
|
id: string;
|
21
22
|
credential: string;
|
22
|
-
|
23
|
+
cryptoContext: CryptoContext;
|
23
24
|
requestedClaims: string[];
|
24
25
|
}[], nonce: string, clientId: string) => Promise<RemotePresentation[]>;
|
25
26
|
export declare const evaluateDcqlQuery: EvaluateDcqlQuery;
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"07-evaluate-dcql-query.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/07-evaluate-dcql-query.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAA8B,MAAM,MAAM,CAAC;AAG7D,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;
|
1
|
+
{"version":3,"file":"07-evaluate-dcql-query.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/07-evaluate-dcql-query.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAA8B,MAAM,MAAM,CAAC;AAG7D,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AACrD,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,SAAS,CAAC;AAElD,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AAEjE;;GAEG;AACH,KAAK,iBAAiB,GAAG;IACvB,QAAQ,EAAE,OAAO,CAAC;IAClB,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB,CAAC;AAEF,MAAM,MAAM,iBAAiB,GAAG,CAC9B,gBAAgB,EAAE,CAAC,aAAa,EAAE,MAAM,CAAkB,EAAE,EAC5D,KAAK,EAAE,SAAS,CAAC,KAAK,KACnB;IACH,EAAE,EAAE,MAAM,CAAC;IACX,GAAG,EAAE,MAAM,CAAC;IACZ,UAAU,EAAE,MAAM,CAAC;IACnB,aAAa,EAAE,aAAa,CAAC;IAC7B,mBAAmB,EAAE,UAAU,EAAE,CAAC;IAClC,QAAQ,EAAE,iBAAiB,EAAE,CAAC;CAC/B,EAAE,CAAC;AAEJ,MAAM,MAAM,0BAA0B,GAAG,CACvC,WAAW,EAAE;IACX,EAAE,EAAE,MAAM,CAAC;IACX,UAAU,EAAE,MAAM,CAAC;IACnB,aAAa,EAAE,aAAa,CAAC;IAC7B,eAAe,EAAE,MAAM,EAAE,CAAC;CAC3B,EAAE,EACH,KAAK,EAAE,MAAM,EACb,QAAQ,EAAE,MAAM,KACb,OAAO,CAAC,kBAAkB,EAAE,CAAC,CAAC;AAsEnC,eAAO,MAAM,iBAAiB,EAAE,iBAoE/B,CAAC;AAEF,eAAO,MAAM,0BAA0B,EAAE,0BAoBxC,CAAC"}
|
@@ -1,16 +1,20 @@
|
|
1
1
|
import { InputDescriptor, type LegacyRemotePresentation } from "./types";
|
2
2
|
import { SdJwt4VC, type DisclosureWithEncoded } from "../../sd-jwt/types";
|
3
|
+
import type { CryptoContext } from "@pagopa/io-react-native-jwt";
|
3
4
|
export type EvaluatedDisclosures = {
|
4
5
|
requiredDisclosures: DisclosureWithEncoded[];
|
5
6
|
optionalDisclosures: DisclosureWithEncoded[];
|
6
7
|
unrequestedDisclosures: DisclosureWithEncoded[];
|
7
8
|
};
|
8
9
|
export type EvaluateInputDescriptorSdJwt4VC = (inputDescriptor: InputDescriptor, payloadCredential: SdJwt4VC["payload"], disclosures: DisclosureWithEncoded[]) => EvaluatedDisclosures;
|
9
|
-
export type EvaluateInputDescriptors = (descriptors: InputDescriptor[], credentialsSdJwt: [
|
10
|
+
export type EvaluateInputDescriptors = (descriptors: InputDescriptor[], credentialsSdJwt: [
|
11
|
+
CryptoContext,
|
12
|
+
string
|
13
|
+
][]) => Promise<{
|
10
14
|
evaluatedDisclosure: EvaluatedDisclosures;
|
11
15
|
inputDescriptor: InputDescriptor;
|
12
16
|
credential: string;
|
13
|
-
|
17
|
+
cryptoContext: CryptoContext;
|
14
18
|
}[]>;
|
15
19
|
/**
|
16
20
|
* @deprecated Use `prepareRemotePresentations` from DCQL
|
@@ -19,7 +23,7 @@ export type PrepareLegacyRemotePresentations = (credentialAndDescriptors: {
|
|
19
23
|
requestedClaims: string[];
|
20
24
|
inputDescriptor: InputDescriptor;
|
21
25
|
credential: string;
|
22
|
-
|
26
|
+
cryptoContext: CryptoContext;
|
23
27
|
}[], nonce: string, client_id: string) => Promise<LegacyRemotePresentation[]>;
|
24
28
|
/**
|
25
29
|
* Evaluates an InputDescriptor for an SD-JWT-based verifiable credential.
|
@@ -41,7 +45,7 @@ export type PrepareLegacyRemotePresentations = (credentialAndDescriptors: {
|
|
41
45
|
*/
|
42
46
|
export declare const evaluateInputDescriptorForSdJwt4VC: EvaluateInputDescriptorSdJwt4VC;
|
43
47
|
type DecodedCredentialSdJwt = {
|
44
|
-
|
48
|
+
cryptoContext: CryptoContext;
|
45
49
|
credential: string;
|
46
50
|
sdJwt: SdJwt4VC;
|
47
51
|
disclosures: DisclosureWithEncoded[];
|
@@ -54,8 +58,8 @@ type DecodedCredentialSdJwt = {
|
|
54
58
|
*/
|
55
59
|
export declare const findCredentialSdJwt: (inputDescriptor: InputDescriptor, decodedSdJwtCredentials: DecodedCredentialSdJwt[]) => {
|
56
60
|
matchedEvaluation: EvaluatedDisclosures;
|
57
|
-
matchedKeyTag: string;
|
58
61
|
matchedCredential: string;
|
62
|
+
cryptoContext: CryptoContext;
|
59
63
|
};
|
60
64
|
/**
|
61
65
|
* Evaluates multiple input descriptors against provided SD-JWT and MDOC credentials.
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"07-evaluate-input-descriptor.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/07-evaluate-input-descriptor.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,KAAK,wBAAwB,EAAE,MAAM,SAAS,CAAC;AACzE,OAAO,EAAE,QAAQ,EAAE,KAAK,qBAAqB,EAAE,MAAM,oBAAoB,CAAC;
|
1
|
+
{"version":3,"file":"07-evaluate-input-descriptor.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/07-evaluate-input-descriptor.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,KAAK,wBAAwB,EAAE,MAAM,SAAS,CAAC;AACzE,OAAO,EAAE,QAAQ,EAAE,KAAK,qBAAqB,EAAE,MAAM,oBAAoB,CAAC;AAK1E,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AAKjE,MAAM,MAAM,oBAAoB,GAAG;IACjC,mBAAmB,EAAE,qBAAqB,EAAE,CAAC;IAC7C,mBAAmB,EAAE,qBAAqB,EAAE,CAAC;IAC7C,sBAAsB,EAAE,qBAAqB,EAAE,CAAC;CACjD,CAAC;AAEF,MAAM,MAAM,+BAA+B,GAAG,CAC5C,eAAe,EAAE,eAAe,EAChC,iBAAiB,EAAE,QAAQ,CAAC,SAAS,CAAC,EACtC,WAAW,EAAE,qBAAqB,EAAE,KACjC,oBAAoB,CAAC;AAE1B,MAAM,MAAM,wBAAwB,GAAG,CACrC,WAAW,EAAE,eAAe,EAAE,EAC9B,gBAAgB,EAAE;IAChB,aAAa;IACb,MAAM;CACP,EAAE,KACA,OAAO,CACV;IACE,mBAAmB,EAAE,oBAAoB,CAAC;IAC1C,eAAe,EAAE,eAAe,CAAC;IACjC,UAAU,EAAE,MAAM,CAAC;IACnB,aAAa,EAAE,aAAa,CAAC;CAC9B,EAAE,CACJ,CAAC;AAEF;;GAEG;AACH,MAAM,MAAM,gCAAgC,GAAG,CAC7C,wBAAwB,EAAE;IACxB,eAAe,EAAE,MAAM,EAAE,CAAC;IAC1B,eAAe,EAAE,eAAe,CAAC;IACjC,UAAU,EAAE,MAAM,CAAC;IACnB,aAAa,EAAE,aAAa,CAAC;CAC9B,EAAE,EACH,KAAK,EAAE,MAAM,EACb,SAAS,EAAE,MAAM,KACd,OAAO,CAAC,wBAAwB,EAAE,CAAC,CAAC;AA+EzC;;;;;;;;;;;;;;;;;GAiBG;AACH,eAAO,MAAM,kCAAkC,EAAE,+BAsG9C,CAAC;AAEJ,KAAK,sBAAsB,GAAG;IAC5B,aAAa,EAAE,aAAa,CAAC;IAC7B,UAAU,EAAE,MAAM,CAAC;IACnB,KAAK,EAAE,QAAQ,CAAC;IAChB,WAAW,EAAE,qBAAqB,EAAE,CAAC;CACtC,CAAC;AAEF;;;;;GAKG;AACH,eAAO,MAAM,mBAAmB,oBACb,eAAe,2BACP,sBAAsB,EAAE,KAChD;IACD,iBAAiB,EAAE,oBAAoB,CAAC;IACxC,iBAAiB,EAAE,MAAM,CAAC;IAC1B,aAAa,EAAE,aAAa,CAAC;CAgC9B,CAAC;AAEF;;;;;;;;;;;;;GAaG;AACH,eAAO,MAAM,wBAAwB,EAAE,wBA0CtC,CAAC;AAEF;;;;;;;;;;;;;;;GAeG;AACH,eAAO,MAAM,gCAAgC,EAAE,gCA6B5C,CAAC"}
|
@@ -26,7 +26,6 @@ export type LegacyRemotePresentation = {
|
|
26
26
|
export type RemotePresentation = {
|
27
27
|
requestedClaims: string[];
|
28
28
|
credentialId: string;
|
29
|
-
format: string;
|
30
29
|
vpToken: string;
|
31
30
|
};
|
32
31
|
export type InputDescriptor = z.infer<typeof InputDescriptor>;
|
@@ -349,7 +348,7 @@ export declare const RequestObject: z.ZodObject<{
|
|
349
348
|
state: z.ZodOptional<z.ZodString>;
|
350
349
|
nonce: z.ZodString;
|
351
350
|
response_uri: z.ZodString;
|
352
|
-
|
351
|
+
request_uri_method: z.ZodOptional<z.ZodString>;
|
353
352
|
response_type: z.ZodLiteral<"vp_token">;
|
354
353
|
response_mode: z.ZodLiteral<"direct_post.jwt">;
|
355
354
|
client_id: z.ZodString;
|
@@ -582,7 +581,7 @@ export declare const RequestObject: z.ZodObject<{
|
|
582
581
|
response_mode: "direct_post.jwt";
|
583
582
|
client_id: string;
|
584
583
|
state?: string | undefined;
|
585
|
-
|
584
|
+
request_uri_method?: string | undefined;
|
586
585
|
dcql_query?: Record<string, any> | undefined;
|
587
586
|
scope?: string | undefined;
|
588
587
|
presentation_definition?: {
|
@@ -632,7 +631,7 @@ export declare const RequestObject: z.ZodObject<{
|
|
632
631
|
response_mode: "direct_post.jwt";
|
633
632
|
client_id: string;
|
634
633
|
state?: string | undefined;
|
635
|
-
|
634
|
+
request_uri_method?: string | undefined;
|
636
635
|
dcql_query?: Record<string, any> | undefined;
|
637
636
|
scope?: string | undefined;
|
638
637
|
presentation_definition?: {
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AAEjE,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAEzB;;GAEG;AACH,MAAM,MAAM,YAAY,GAAG;IACO,MAAM;IACzB,MAAM,EAAE;IACsC,aAAa;CACzE,CAAC;AAEF;;;;GAIG;AACH,MAAM,MAAM,wBAAwB,GAAG;IACrC,eAAe,EAAE,MAAM,EAAE,CAAC;IAC1B,eAAe,EAAE,eAAe,CAAC;IACjC,MAAM,EAAE,MAAM,CAAC;IACf,OAAO,EAAE,MAAM,CAAC;CACjB,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,kBAAkB,GAAG;IAC/B,eAAe,EAAE,MAAM,EAAE,CAAC;IAC1B,YAAY,EAAE,MAAM,CAAC;IACrB,
|
1
|
+
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../src/credential/presentation/types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AAEjE,OAAO,KAAK,CAAC,MAAM,KAAK,CAAC;AAEzB;;GAEG;AACH,MAAM,MAAM,YAAY,GAAG;IACO,MAAM;IACzB,MAAM,EAAE;IACsC,aAAa;CACzE,CAAC;AAEF;;;;GAIG;AACH,MAAM,MAAM,wBAAwB,GAAG;IACrC,eAAe,EAAE,MAAM,EAAE,CAAC;IAC1B,eAAe,EAAE,eAAe,CAAC;IACjC,MAAM,EAAE,MAAM,CAAC;IACf,OAAO,EAAE,MAAM,CAAC;CACjB,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,kBAAkB,GAAG;IAC/B,eAAe,EAAE,MAAM,EAAE,CAAC;IAC1B,YAAY,EAAE,MAAM,CAAC;IACrB,OAAO,EAAE,MAAM,CAAC;CACjB,CAAC;AAmBF,MAAM,MAAM,eAAe,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,eAAe,CAAC,CAAC;AAC9D,eAAO,MAAM,eAAe;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAO1B,CAAC;AAqBH,MAAM,MAAM,sBAAsB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,sBAAsB,CAAC,CAAC;AAC5E,eAAO,MAAM,sBAAsB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAMjC,CAAC;AAEH,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAC1D,eAAO,MAAM,aAAa;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAcxB,CAAC;AAEH,MAAM,MAAM,cAAc,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,cAAc,CAAC,CAAC;AAC5D,eAAO,MAAM,cAAc;;;;;;;;;;;;;;;;;;;;;;;;;EAWzB,CAAC;AAEH;;;GAGG;AACH,MAAM,MAAM,+BAA+B,GAAG,CAAC,CAAC,KAAK,CACnD,OAAO,+BAA+B,CACvC,CAAC;AACF,eAAO,MAAM,+BAA+B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAG1C,CAAC;AAEH;;;;GAIG;AACH,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,aAAa,CAAC,CAAC;AAC1D,eAAO,MAAM,aAAa,gJAOxB,CAAC;AAUH;;GAEG;AACH,MAAM,MAAM,8BAA8B,GAAG,CAAC,CAAC,KAAK,CAClD,OAAO,8BAA8B,CACtC,CAAC;AACF,eAAO,MAAM,8BAA8B;;;;;;;;;;;;;;;;;;;;;;;;IAMzC,CAAC"}
|
@@ -163,9 +163,9 @@ export declare const ParsedStatusAttestation: z.ZodObject<{
|
|
163
163
|
exp: z.ZodNumber;
|
164
164
|
iat: z.ZodNumber;
|
165
165
|
}, "strip", z.ZodTypeAny, {
|
166
|
+
credential_hash_alg: string;
|
166
167
|
iat: number;
|
167
168
|
exp: number;
|
168
|
-
credential_hash_alg: string;
|
169
169
|
cnf: {
|
170
170
|
jwk: {
|
171
171
|
kty: "RSA" | "EC";
|
@@ -194,9 +194,9 @@ export declare const ParsedStatusAttestation: z.ZodObject<{
|
|
194
194
|
};
|
195
195
|
credential_hash: string;
|
196
196
|
}, {
|
197
|
+
credential_hash_alg: string;
|
197
198
|
iat: number;
|
198
199
|
exp: number;
|
199
|
-
credential_hash_alg: string;
|
200
200
|
cnf: {
|
201
201
|
jwk: {
|
202
202
|
kty: "RSA" | "EC";
|
@@ -232,9 +232,9 @@ export declare const ParsedStatusAttestation: z.ZodObject<{
|
|
232
232
|
kid?: string | undefined;
|
233
233
|
};
|
234
234
|
payload: {
|
235
|
+
credential_hash_alg: string;
|
235
236
|
iat: number;
|
236
237
|
exp: number;
|
237
|
-
credential_hash_alg: string;
|
238
238
|
cnf: {
|
239
239
|
jwk: {
|
240
240
|
kty: "RSA" | "EC";
|
@@ -270,9 +270,9 @@ export declare const ParsedStatusAttestation: z.ZodObject<{
|
|
270
270
|
kid?: string | undefined;
|
271
271
|
};
|
272
272
|
payload: {
|
273
|
+
credential_hash_alg: string;
|
273
274
|
iat: number;
|
274
275
|
exp: number;
|
275
|
-
credential_hash_alg: string;
|
276
276
|
cnf: {
|
277
277
|
jwk: {
|
278
278
|
kty: "RSA" | "EC";
|
@@ -21,16 +21,14 @@ export * from "./utils";
|
|
21
21
|
export declare const decode: <S extends z.ZodType<{
|
22
22
|
header: {
|
23
23
|
alg: string;
|
24
|
-
|
25
|
-
|
24
|
+
kid: string;
|
25
|
+
typ: "vc+sd-jwt" | "dc+sd-jwt";
|
26
|
+
trust_chain?: string[] | undefined;
|
27
|
+
x5c?: string[] | undefined;
|
28
|
+
vctm?: string[] | undefined;
|
26
29
|
};
|
27
30
|
payload: {
|
28
31
|
iss: string;
|
29
|
-
status: {
|
30
|
-
status_assertion: {
|
31
|
-
credential_hash_alg: "sha-256";
|
32
|
-
};
|
33
|
-
};
|
34
32
|
sub: string;
|
35
33
|
exp: number;
|
36
34
|
_sd_alg: "sha-256";
|
@@ -61,26 +59,33 @@ export declare const decode: <S extends z.ZodType<{
|
|
61
59
|
};
|
62
60
|
};
|
63
61
|
vct: string;
|
64
|
-
"vct#integrity": string;
|
65
|
-
issuing_authority: string;
|
66
|
-
issuing_country: string;
|
67
62
|
iat?: number | undefined;
|
63
|
+
status?: {
|
64
|
+
status_assertion: {
|
65
|
+
credential_hash_alg: "sha-256";
|
66
|
+
};
|
67
|
+
} | {
|
68
|
+
status_attestation: {
|
69
|
+
credential_hash_alg: "sha-256";
|
70
|
+
};
|
71
|
+
} | undefined;
|
72
|
+
"vct#integrity"?: string | undefined;
|
73
|
+
issuing_authority?: string | undefined;
|
74
|
+
issuing_country?: string | undefined;
|
68
75
|
} & {
|
69
76
|
_sd: string[];
|
70
77
|
};
|
71
78
|
}, z.ZodTypeDef, {
|
72
79
|
header: {
|
73
80
|
alg: string;
|
74
|
-
|
75
|
-
|
81
|
+
kid: string;
|
82
|
+
typ: "vc+sd-jwt" | "dc+sd-jwt";
|
83
|
+
trust_chain?: string[] | undefined;
|
84
|
+
x5c?: string[] | undefined;
|
85
|
+
vctm?: string[] | undefined;
|
76
86
|
};
|
77
87
|
payload: {
|
78
88
|
iss: string;
|
79
|
-
status: {
|
80
|
-
status_assertion: {
|
81
|
-
credential_hash_alg: "sha-256";
|
82
|
-
};
|
83
|
-
};
|
84
89
|
sub: string;
|
85
90
|
exp: number;
|
86
91
|
_sd_alg: "sha-256";
|
@@ -111,10 +116,19 @@ export declare const decode: <S extends z.ZodType<{
|
|
111
116
|
};
|
112
117
|
};
|
113
118
|
vct: string;
|
114
|
-
"vct#integrity": string;
|
115
|
-
issuing_authority: string;
|
116
|
-
issuing_country: string;
|
117
119
|
iat?: number | undefined;
|
120
|
+
status?: {
|
121
|
+
status_assertion: {
|
122
|
+
credential_hash_alg: "sha-256";
|
123
|
+
};
|
124
|
+
} | {
|
125
|
+
status_attestation: {
|
126
|
+
credential_hash_alg: "sha-256";
|
127
|
+
};
|
128
|
+
} | undefined;
|
129
|
+
"vct#integrity"?: string | undefined;
|
130
|
+
issuing_authority?: string | undefined;
|
131
|
+
issuing_country?: string | undefined;
|
118
132
|
} & {
|
119
133
|
_sd: string[];
|
120
134
|
};
|
@@ -161,16 +175,14 @@ export declare const disclose: (token: string, claims: string[]) => Promise<{
|
|
161
175
|
export declare const verify: <S extends z.ZodType<{
|
162
176
|
header: {
|
163
177
|
alg: string;
|
164
|
-
|
165
|
-
|
178
|
+
kid: string;
|
179
|
+
typ: "vc+sd-jwt" | "dc+sd-jwt";
|
180
|
+
trust_chain?: string[] | undefined;
|
181
|
+
x5c?: string[] | undefined;
|
182
|
+
vctm?: string[] | undefined;
|
166
183
|
};
|
167
184
|
payload: {
|
168
185
|
iss: string;
|
169
|
-
status: {
|
170
|
-
status_assertion: {
|
171
|
-
credential_hash_alg: "sha-256";
|
172
|
-
};
|
173
|
-
};
|
174
186
|
sub: string;
|
175
187
|
exp: number;
|
176
188
|
_sd_alg: "sha-256";
|
@@ -201,26 +213,33 @@ export declare const verify: <S extends z.ZodType<{
|
|
201
213
|
};
|
202
214
|
};
|
203
215
|
vct: string;
|
204
|
-
"vct#integrity": string;
|
205
|
-
issuing_authority: string;
|
206
|
-
issuing_country: string;
|
207
216
|
iat?: number | undefined;
|
217
|
+
status?: {
|
218
|
+
status_assertion: {
|
219
|
+
credential_hash_alg: "sha-256";
|
220
|
+
};
|
221
|
+
} | {
|
222
|
+
status_attestation: {
|
223
|
+
credential_hash_alg: "sha-256";
|
224
|
+
};
|
225
|
+
} | undefined;
|
226
|
+
"vct#integrity"?: string | undefined;
|
227
|
+
issuing_authority?: string | undefined;
|
228
|
+
issuing_country?: string | undefined;
|
208
229
|
} & {
|
209
230
|
_sd: string[];
|
210
231
|
};
|
211
232
|
}, z.ZodTypeDef, {
|
212
233
|
header: {
|
213
234
|
alg: string;
|
214
|
-
|
215
|
-
|
235
|
+
kid: string;
|
236
|
+
typ: "vc+sd-jwt" | "dc+sd-jwt";
|
237
|
+
trust_chain?: string[] | undefined;
|
238
|
+
x5c?: string[] | undefined;
|
239
|
+
vctm?: string[] | undefined;
|
216
240
|
};
|
217
241
|
payload: {
|
218
242
|
iss: string;
|
219
|
-
status: {
|
220
|
-
status_assertion: {
|
221
|
-
credential_hash_alg: "sha-256";
|
222
|
-
};
|
223
|
-
};
|
224
243
|
sub: string;
|
225
244
|
exp: number;
|
226
245
|
_sd_alg: "sha-256";
|
@@ -251,10 +270,19 @@ export declare const verify: <S extends z.ZodType<{
|
|
251
270
|
};
|
252
271
|
};
|
253
272
|
vct: string;
|
254
|
-
"vct#integrity": string;
|
255
|
-
issuing_authority: string;
|
256
|
-
issuing_country: string;
|
257
273
|
iat?: number | undefined;
|
274
|
+
status?: {
|
275
|
+
status_assertion: {
|
276
|
+
credential_hash_alg: "sha-256";
|
277
|
+
};
|
278
|
+
} | {
|
279
|
+
status_attestation: {
|
280
|
+
credential_hash_alg: "sha-256";
|
281
|
+
};
|
282
|
+
} | undefined;
|
283
|
+
"vct#integrity"?: string | undefined;
|
284
|
+
issuing_authority?: string | undefined;
|
285
|
+
issuing_country?: string | undefined;
|
258
286
|
} & {
|
259
287
|
_sd: string[];
|
260
288
|
};
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/sd-jwt/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAC;AAKxB,OAAO,EAAE,UAAU,EAAE,QAAQ,EAAE,KAAK,qBAAqB,EAAE,MAAM,SAAS,CAAC;AAE3E,OAAO,KAAK,EAAE,GAAG,EAAE,MAAM,cAAc,CAAC;AACxC,OAAO,KAAK,MAAM,MAAM,UAAU,CAAC;AAEnC,OAAO,EAAE,KAAK,YAAY,EAAE,MAAM,kCAAkC,CAAC;AAErE,cAAc,SAAS,CAAC;AAQxB;;;;;;;;;;;;;GAaG;AACH,eAAO,MAAM,MAAM
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/sd-jwt/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAC;AAKxB,OAAO,EAAE,UAAU,EAAE,QAAQ,EAAE,KAAK,qBAAqB,EAAE,MAAM,SAAS,CAAC;AAE3E,OAAO,KAAK,EAAE,GAAG,EAAE,MAAM,cAAc,CAAC;AACxC,OAAO,KAAK,MAAM,MAAM,UAAU,CAAC;AAEnC,OAAO,EAAE,KAAK,YAAY,EAAE,MAAM,kCAAkC,CAAC;AAErE,cAAc,SAAS,CAAC;AAQxB;;;;;;;;;;;;;GAaG;AACH,eAAO,MAAM,MAAM;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;WACV,MAAM;;iBAIA,qBAAqB,EAAE;CA0BrC,CAAC;AAEF;;;;;;;;;;;;GAYG;AACH,eAAO,MAAM,QAAQ,UACZ,MAAM,UACL,MAAM,EAAE;WACE,MAAM;WAAS;QAAE,KAAK,EAAE,MAAM,CAAC;QAAC,IAAI,EAAE,MAAM,CAAA;KAAE,EAAE;EA4CnE,CAAC;AAEF;;;;;;;;;;;;;;;GAeG;AACH,eAAO,MAAM,MAAM;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;WACV,MAAM,aACF,GAAG,GAAG,GAAG,EAAE;;iBAEqB,UAAU,EAAE;EAqBxD,CAAC;AAEF;;;;;;;;;;;;;;GAcG;AACH,eAAO,MAAM,cAAc,UAClB,MAAM,aACF,MAAM;cAGP,MAAM;EAyBjB,CAAC;AAEF,OAAO,EAAE,QAAQ,EAAE,MAAM,EAAE,CAAC"}
|