@sphereon/ssi-sdk-ext.identifier-resolution 0.28.1-feature.esm.cjs.8 → 0.28.1-feature.esm.cjs.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs +161 -181
- package/dist/index.cjs.map +1 -1
- package/package.json +9 -9
package/dist/index.cjs
CHANGED
|
@@ -1,30 +1,14 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __defProp = Object.defineProperty;
|
|
3
|
-
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
1
|
+
"use strict";Object.defineProperty(exports, "__esModule", {value: true}); function _nullishCoalesce(lhs, rhsFn) { if (lhs != null) { return lhs; } else { return rhsFn(); } } function _optionalChain(ops) { let lastAccessLHS = undefined; let value = ops[0]; let i = 1; while (i < ops.length) { const op = ops[i]; const fn = ops[i + 1]; i += 2; if ((op === 'optionalAccess' || op === 'optionalCall') && value == null) { return undefined; } if (op === 'access' || op === 'optionalAccess') { lastAccessLHS = value; value = fn(value); } else if (op === 'call' || op === 'optionalCall') { value = fn((...args) => value.call(lastAccessLHS, ...args)); lastAccessLHS = undefined; } } return value; } var _class;var __defProp = Object.defineProperty;
|
|
4
2
|
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
5
|
-
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
6
3
|
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
|
7
4
|
var __commonJS = (cb, mod) => function __require() {
|
|
8
5
|
return mod || (0, cb[__getOwnPropNames(cb)[0]])((mod = { exports: {} }).exports, mod), mod.exports;
|
|
9
6
|
};
|
|
10
|
-
var __export = (target, all) => {
|
|
11
|
-
for (var name in all)
|
|
12
|
-
__defProp(target, name, { get: all[name], enumerable: true });
|
|
13
|
-
};
|
|
14
|
-
var __copyProps = (to, from, except, desc) => {
|
|
15
|
-
if (from && typeof from === "object" || typeof from === "function") {
|
|
16
|
-
for (let key of __getOwnPropNames(from))
|
|
17
|
-
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
18
|
-
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
19
|
-
}
|
|
20
|
-
return to;
|
|
21
|
-
};
|
|
22
|
-
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
23
7
|
|
|
24
8
|
// plugin.schema.json
|
|
25
9
|
var require_plugin_schema = __commonJS({
|
|
26
|
-
"plugin.schema.json"(exports,
|
|
27
|
-
|
|
10
|
+
"plugin.schema.json"(exports, module) {
|
|
11
|
+
module.exports = {
|
|
28
12
|
IIdentifierResolution: {
|
|
29
13
|
components: {
|
|
30
14
|
schemas: {
|
|
@@ -4346,66 +4330,6 @@ var require_plugin_schema = __commonJS({
|
|
|
4346
4330
|
}
|
|
4347
4331
|
});
|
|
4348
4332
|
|
|
4349
|
-
// src/index.ts
|
|
4350
|
-
var index_exports = {};
|
|
4351
|
-
__export(index_exports, {
|
|
4352
|
-
IdentifierResolution: () => IdentifierResolution,
|
|
4353
|
-
ensureManagedIdentifierResult: () => ensureManagedIdentifierResult,
|
|
4354
|
-
getManagedCoseKeyIdentifier: () => getManagedCoseKeyIdentifier,
|
|
4355
|
-
getManagedDidIdentifier: () => getManagedDidIdentifier,
|
|
4356
|
-
getManagedIdentifier: () => getManagedIdentifier,
|
|
4357
|
-
getManagedJwkIdentifier: () => getManagedJwkIdentifier,
|
|
4358
|
-
getManagedKeyIdentifier: () => getManagedKeyIdentifier,
|
|
4359
|
-
getManagedKidIdentifier: () => getManagedKidIdentifier,
|
|
4360
|
-
getManagedOID4VCIssuerIdentifier: () => getManagedOID4VCIssuerIdentifier,
|
|
4361
|
-
getManagedX5cIdentifier: () => getManagedX5cIdentifier,
|
|
4362
|
-
identifierResolutionContextMethods: () => identifierResolutionContextMethods,
|
|
4363
|
-
isCoseKeyIdentifier: () => isCoseKeyIdentifier,
|
|
4364
|
-
isDidIdentifier: () => isDidIdentifier,
|
|
4365
|
-
isExternalIdentifierCoseKeyOpts: () => isExternalIdentifierCoseKeyOpts,
|
|
4366
|
-
isExternalIdentifierDidOpts: () => isExternalIdentifierDidOpts,
|
|
4367
|
-
isExternalIdentifierJwkOpts: () => isExternalIdentifierJwkOpts,
|
|
4368
|
-
isExternalIdentifierJwksUrlOpts: () => isExternalIdentifierJwksUrlOpts,
|
|
4369
|
-
isExternalIdentifierKidOpts: () => isExternalIdentifierKidOpts,
|
|
4370
|
-
isExternalIdentifierOIDFEntityIdOpts: () => isExternalIdentifierOIDFEntityIdOpts,
|
|
4371
|
-
isExternalIdentifierOidcDiscoveryOpts: () => isExternalIdentifierOidcDiscoveryOpts,
|
|
4372
|
-
isExternalIdentifierX5cOpts: () => isExternalIdentifierX5cOpts,
|
|
4373
|
-
isIIdentifier: () => isIIdentifier,
|
|
4374
|
-
isJwkIdentifier: () => isJwkIdentifier,
|
|
4375
|
-
isJwksUrlIdentifier: () => isJwksUrlIdentifier,
|
|
4376
|
-
isKeyIdentifier: () => isKeyIdentifier,
|
|
4377
|
-
isKidIdentifier: () => isKidIdentifier,
|
|
4378
|
-
isManagedIdentifierCoseKeyOpts: () => isManagedIdentifierCoseKeyOpts,
|
|
4379
|
-
isManagedIdentifierCoseKeyResult: () => isManagedIdentifierCoseKeyResult,
|
|
4380
|
-
isManagedIdentifierDidOpts: () => isManagedIdentifierDidOpts,
|
|
4381
|
-
isManagedIdentifierDidResult: () => isManagedIdentifierDidResult,
|
|
4382
|
-
isManagedIdentifierJwkOpts: () => isManagedIdentifierJwkOpts,
|
|
4383
|
-
isManagedIdentifierJwkResult: () => isManagedIdentifierJwkResult,
|
|
4384
|
-
isManagedIdentifierKeyOpts: () => isManagedIdentifierKeyOpts,
|
|
4385
|
-
isManagedIdentifierKeyResult: () => isManagedIdentifierKeyResult,
|
|
4386
|
-
isManagedIdentifierKidOpts: () => isManagedIdentifierKidOpts,
|
|
4387
|
-
isManagedIdentifierKidResult: () => isManagedIdentifierKidResult,
|
|
4388
|
-
isManagedIdentifierOID4VCIssuerOpts: () => isManagedIdentifierOID4VCIssuerOpts,
|
|
4389
|
-
isManagedIdentifierResult: () => isManagedIdentifierResult,
|
|
4390
|
-
isManagedIdentifierX5cOpts: () => isManagedIdentifierX5cOpts,
|
|
4391
|
-
isManagedIdentifierX5cResult: () => isManagedIdentifierX5cResult,
|
|
4392
|
-
isOID4VCIssuerIdentifier: () => isOID4VCIssuerIdentifier,
|
|
4393
|
-
isOIDFEntityIdIdentifier: () => isOIDFEntityIdIdentifier,
|
|
4394
|
-
isOidcDiscoveryIdentifier: () => isOidcDiscoveryIdentifier,
|
|
4395
|
-
isX5cIdentifier: () => isX5cIdentifier,
|
|
4396
|
-
legacyKeyRefsToIdentifierOpts: () => legacyKeyRefsToIdentifierOpts,
|
|
4397
|
-
managedIdentifierToJwk: () => managedIdentifierToJwk,
|
|
4398
|
-
managedIdentifierToKeyResult: () => managedIdentifierToKeyResult,
|
|
4399
|
-
resolveExternalCoseKeyIdentifier: () => resolveExternalCoseKeyIdentifier,
|
|
4400
|
-
resolveExternalDidIdentifier: () => resolveExternalDidIdentifier,
|
|
4401
|
-
resolveExternalIdentifier: () => resolveExternalIdentifier,
|
|
4402
|
-
resolveExternalJwkIdentifier: () => resolveExternalJwkIdentifier,
|
|
4403
|
-
resolveExternalOIDFEntityIdIdentifier: () => resolveExternalOIDFEntityIdIdentifier,
|
|
4404
|
-
resolveExternalX5cIdentifier: () => resolveExternalX5cIdentifier,
|
|
4405
|
-
schema: () => schema
|
|
4406
|
-
});
|
|
4407
|
-
module.exports = __toCommonJS(index_exports);
|
|
4408
|
-
|
|
4409
4333
|
// src/types/common.ts
|
|
4410
4334
|
function isDidIdentifier(identifier) {
|
|
4411
4335
|
return isIIdentifier(identifier) || typeof identifier === "string" && identifier.startsWith("did:");
|
|
@@ -4574,20 +4498,20 @@ var identifierResolutionContextMethods = [
|
|
|
4574
4498
|
];
|
|
4575
4499
|
|
|
4576
4500
|
// src/agent/IdentifierResolution.ts
|
|
4577
|
-
var
|
|
4501
|
+
var _ssisdkextkeyutils = require('@sphereon/ssi-sdk-ext.key-utils');
|
|
4578
4502
|
|
|
4579
4503
|
// src/functions/managedIdentifierFunctions.ts
|
|
4580
|
-
var
|
|
4581
|
-
|
|
4582
|
-
var
|
|
4583
|
-
var
|
|
4584
|
-
var
|
|
4504
|
+
var _ssisdkextdidutils = require('@sphereon/ssi-sdk-ext.did-utils');
|
|
4505
|
+
|
|
4506
|
+
var _ssisdkextx509utils = require('@sphereon/ssi-sdk-ext.x509-utils');
|
|
4507
|
+
var _ssisdkagentconfig = require('@sphereon/ssi-sdk.agent-config');
|
|
4508
|
+
var _pkijs = require('pkijs');
|
|
4585
4509
|
async function getManagedKidIdentifier(opts, context) {
|
|
4586
4510
|
const method = "kid";
|
|
4587
4511
|
let key = void 0;
|
|
4588
4512
|
let issuer = void 0;
|
|
4589
4513
|
let kid = void 0;
|
|
4590
|
-
if (!(0,
|
|
4514
|
+
if (!_ssisdkagentconfig.contextHasKeyManager.call(void 0, context)) {
|
|
4591
4515
|
return Promise.reject(Error(`Cannot get Key/JWK identifier if KeyManager plugin is not enabled!`));
|
|
4592
4516
|
} else if (opts.identifier.startsWith("did:")) {
|
|
4593
4517
|
const did = opts.identifier.split("#")[0];
|
|
@@ -4598,24 +4522,24 @@ async function getManagedKidIdentifier(opts, context) {
|
|
|
4598
4522
|
}, context);
|
|
4599
4523
|
key = didIdentifier.key;
|
|
4600
4524
|
issuer = didIdentifier.issuer;
|
|
4601
|
-
kid = opts
|
|
4525
|
+
kid = _nullishCoalesce(_nullishCoalesce(_optionalChain([opts, 'optionalAccess', _ => _.kid]), () => ( _optionalChain([key, 'access', _2 => _2.meta, 'optionalAccess', _3 => _3.verificationMethod, 'optionalAccess', _4 => _4.id]))), () => ( didIdentifier.kid));
|
|
4602
4526
|
}
|
|
4603
4527
|
if (!key) {
|
|
4604
4528
|
key = await context.agent.keyManagerGet({
|
|
4605
|
-
kid: opts.kmsKeyRef
|
|
4529
|
+
kid: _nullishCoalesce(opts.kmsKeyRef, () => ( opts.identifier))
|
|
4606
4530
|
});
|
|
4607
4531
|
}
|
|
4608
|
-
const jwk = (0,
|
|
4532
|
+
const jwk = _ssisdkextkeyutils.toJwk.call(void 0, key.publicKeyHex, key.type, {
|
|
4609
4533
|
key
|
|
4610
4534
|
});
|
|
4611
|
-
const jwkThumbprint = key.meta
|
|
4535
|
+
const jwkThumbprint = _nullishCoalesce(_optionalChain([key, 'access', _5 => _5.meta, 'optionalAccess', _6 => _6.jwkThumbprint]), () => ( _ssisdkextkeyutils.calculateJwkThumbprint.call(void 0, {
|
|
4612
4536
|
jwk
|
|
4613
|
-
});
|
|
4537
|
+
})));
|
|
4614
4538
|
if (!kid) {
|
|
4615
|
-
kid = opts.kid
|
|
4539
|
+
kid = _nullishCoalesce(_nullishCoalesce(_nullishCoalesce(opts.kid, () => ( _optionalChain([key, 'access', _7 => _7.meta, 'optionalAccess', _8 => _8.verificationMethod, 'optionalAccess', _9 => _9.id]))), () => ( key.kid)), () => ( jwkThumbprint));
|
|
4616
4540
|
}
|
|
4617
4541
|
if (!issuer) {
|
|
4618
|
-
issuer = opts.issuer
|
|
4542
|
+
issuer = _nullishCoalesce(opts.issuer, () => ( kid));
|
|
4619
4543
|
}
|
|
4620
4544
|
return {
|
|
4621
4545
|
method,
|
|
@@ -4647,14 +4571,14 @@ async function getManagedKeyIdentifier(opts, _context) {
|
|
|
4647
4571
|
if (opts.kmsKeyRef && opts.kmsKeyRef !== key.kid) {
|
|
4648
4572
|
return Promise.reject(Error(`Cannot get a managed key object by providing a key and a kmsKeyRef that are different.}`));
|
|
4649
4573
|
}
|
|
4650
|
-
const jwk = (0,
|
|
4574
|
+
const jwk = _ssisdkextkeyutils.toJwk.call(void 0, key.publicKeyHex, key.type, {
|
|
4651
4575
|
key
|
|
4652
4576
|
});
|
|
4653
|
-
const jwkThumbprint = key.meta
|
|
4577
|
+
const jwkThumbprint = _nullishCoalesce(_optionalChain([key, 'access', _10 => _10.meta, 'optionalAccess', _11 => _11.jwkThumbprint]), () => ( _ssisdkextkeyutils.calculateJwkThumbprint.call(void 0, {
|
|
4654
4578
|
jwk
|
|
4655
|
-
});
|
|
4656
|
-
const kid = opts.kid
|
|
4657
|
-
const issuer = opts.issuer
|
|
4579
|
+
})));
|
|
4580
|
+
const kid = _nullishCoalesce(_nullishCoalesce(opts.kid, () => ( _optionalChain([key, 'access', _12 => _12.meta, 'optionalAccess', _13 => _13.verificationMethod, 'optionalAccess', _14 => _14.id]))), () => ( jwkThumbprint));
|
|
4581
|
+
const issuer = _nullishCoalesce(opts.issuer, () => ( kid));
|
|
4658
4582
|
return {
|
|
4659
4583
|
method,
|
|
4660
4584
|
key,
|
|
@@ -4673,17 +4597,17 @@ __name(getManagedKeyIdentifier, "getManagedKeyIdentifier");
|
|
|
4673
4597
|
async function getManagedCoseKeyIdentifier(opts, context) {
|
|
4674
4598
|
const method = "cose_key";
|
|
4675
4599
|
const coseKey = opts.identifier;
|
|
4676
|
-
if (!(0,
|
|
4600
|
+
if (!_ssisdkagentconfig.contextHasKeyManager.call(void 0, context)) {
|
|
4677
4601
|
return Promise.reject(Error(`Cannot get Cose Key identifier if KeyManager plugin is not enabled!`));
|
|
4678
4602
|
}
|
|
4679
|
-
const jwk = (0,
|
|
4680
|
-
const jwkThumbprint = (0,
|
|
4603
|
+
const jwk = _ssisdkextkeyutils.coseKeyToJwk.call(void 0, coseKey);
|
|
4604
|
+
const jwkThumbprint = _ssisdkextkeyutils.calculateJwkThumbprint.call(void 0, {
|
|
4681
4605
|
jwk
|
|
4682
4606
|
});
|
|
4683
4607
|
const key = await context.agent.keyManagerGet({
|
|
4684
|
-
kid: opts.kmsKeyRef
|
|
4608
|
+
kid: _nullishCoalesce(opts.kmsKeyRef, () => ( jwkThumbprint))
|
|
4685
4609
|
});
|
|
4686
|
-
const kid = opts.kid
|
|
4610
|
+
const kid = _nullishCoalesce(_nullishCoalesce(opts.kid, () => ( coseKey.kid)), () => ( jwkThumbprint));
|
|
4687
4611
|
const issuer = opts.issuer;
|
|
4688
4612
|
return {
|
|
4689
4613
|
method,
|
|
@@ -4702,7 +4626,7 @@ async function getManagedCoseKeyIdentifier(opts, context) {
|
|
|
4702
4626
|
__name(getManagedCoseKeyIdentifier, "getManagedCoseKeyIdentifier");
|
|
4703
4627
|
async function getManagedDidIdentifier(opts, context) {
|
|
4704
4628
|
const method = "did";
|
|
4705
|
-
if (!(0,
|
|
4629
|
+
if (!_ssisdkagentconfig.contextHasDidManager.call(void 0, context)) {
|
|
4706
4630
|
return Promise.reject(Error(`Cannot get DID identifier if DID Manager plugin is not enabled!`));
|
|
4707
4631
|
}
|
|
4708
4632
|
let identifier;
|
|
@@ -4714,26 +4638,26 @@ async function getManagedDidIdentifier(opts, context) {
|
|
|
4714
4638
|
identifier = opts.identifier;
|
|
4715
4639
|
}
|
|
4716
4640
|
const did = identifier.did;
|
|
4717
|
-
const keys = identifier
|
|
4718
|
-
const extendedKey = await (0,
|
|
4641
|
+
const keys = _optionalChain([identifier, 'optionalAccess', _15 => _15.keys]);
|
|
4642
|
+
const extendedKey = await _ssisdkextdidutils.getFirstKeyWithRelation.call(void 0, {
|
|
4719
4643
|
...opts,
|
|
4720
4644
|
identifier,
|
|
4721
|
-
vmRelationship: opts.vmRelationship
|
|
4645
|
+
vmRelationship: _nullishCoalesce(opts.vmRelationship, () => ( "verificationMethod"))
|
|
4722
4646
|
}, context);
|
|
4723
4647
|
const key = extendedKey;
|
|
4724
4648
|
const controllerKeyId = identifier.controllerKeyId;
|
|
4725
|
-
const jwk = (0,
|
|
4649
|
+
const jwk = _ssisdkextkeyutils.toJwk.call(void 0, key.publicKeyHex, key.type, {
|
|
4726
4650
|
key
|
|
4727
4651
|
});
|
|
4728
|
-
const jwkThumbprint = key.meta
|
|
4652
|
+
const jwkThumbprint = _nullishCoalesce(_optionalChain([key, 'access', _16 => _16.meta, 'optionalAccess', _17 => _17.jwkThumbprint]), () => ( _ssisdkextkeyutils.calculateJwkThumbprint.call(void 0, {
|
|
4729
4653
|
jwk
|
|
4730
|
-
});
|
|
4731
|
-
let kid = opts.kid
|
|
4654
|
+
})));
|
|
4655
|
+
let kid = _nullishCoalesce(opts.kid, () => ( _optionalChain([extendedKey, 'access', _18 => _18.meta, 'optionalAccess', _19 => _19.verificationMethod, 'optionalAccess', _20 => _20.id])));
|
|
4732
4656
|
if (!kid.startsWith(did)) {
|
|
4733
4657
|
const hash = kid.startsWith("#") ? "" : "#";
|
|
4734
4658
|
kid = `${did}${hash}${kid}`;
|
|
4735
4659
|
}
|
|
4736
|
-
const issuer = opts.issuer
|
|
4660
|
+
const issuer = _nullishCoalesce(opts.issuer, () => ( did));
|
|
4737
4661
|
return {
|
|
4738
4662
|
method,
|
|
4739
4663
|
key,
|
|
@@ -4755,20 +4679,20 @@ __name(getManagedDidIdentifier, "getManagedDidIdentifier");
|
|
|
4755
4679
|
async function getManagedJwkIdentifier(opts, context) {
|
|
4756
4680
|
const method = "jwk";
|
|
4757
4681
|
const { kid, issuer } = opts;
|
|
4758
|
-
if (!(0,
|
|
4682
|
+
if (!_ssisdkagentconfig.contextHasKeyManager.call(void 0, context)) {
|
|
4759
4683
|
return Promise.reject(Error(`Cannot get Key/JWK identifier if KeyManager plugin is not enabled!`));
|
|
4760
4684
|
}
|
|
4761
4685
|
const key = await context.agent.keyManagerGet({
|
|
4762
|
-
kid: opts.kmsKeyRef
|
|
4686
|
+
kid: _nullishCoalesce(opts.kmsKeyRef, () => ( _ssisdkextkeyutils.calculateJwkThumbprint.call(void 0, {
|
|
4763
4687
|
jwk: opts.identifier
|
|
4764
|
-
})
|
|
4688
|
+
})))
|
|
4765
4689
|
});
|
|
4766
|
-
const jwk = opts.identifier
|
|
4690
|
+
const jwk = _nullishCoalesce(opts.identifier, () => ( _ssisdkextkeyutils.toJwk.call(void 0, key.publicKeyHex, key.type, {
|
|
4767
4691
|
key
|
|
4768
|
-
});
|
|
4769
|
-
const jwkThumbprint = key.meta
|
|
4692
|
+
})));
|
|
4693
|
+
const jwkThumbprint = _nullishCoalesce(_optionalChain([key, 'access', _21 => _21.meta, 'optionalAccess', _22 => _22.jwkThumbprint]), () => ( _ssisdkextkeyutils.calculateJwkThumbprint.call(void 0, {
|
|
4770
4694
|
jwk
|
|
4771
|
-
});
|
|
4695
|
+
})));
|
|
4772
4696
|
return {
|
|
4773
4697
|
method,
|
|
4774
4698
|
key,
|
|
@@ -4790,23 +4714,23 @@ async function getManagedX5cIdentifier(opts, context) {
|
|
|
4790
4714
|
const x5c = opts.identifier;
|
|
4791
4715
|
if (x5c.length === 0) {
|
|
4792
4716
|
return Promise.reject(`Cannot resolve x5c when an empty x5c is passed in`);
|
|
4793
|
-
} else if (!(0,
|
|
4717
|
+
} else if (!_ssisdkagentconfig.contextHasKeyManager.call(void 0, context)) {
|
|
4794
4718
|
return Promise.reject(Error(`Cannot get X5c identifier if KeyManager plugin is not enabled!`));
|
|
4795
4719
|
}
|
|
4796
|
-
const cryptoImpl = (0,
|
|
4797
|
-
const certificate = (0,
|
|
4798
|
-
const cryptoEngine = new
|
|
4720
|
+
const cryptoImpl = _ssisdkextkeyutils.globalCrypto.call(void 0, false, opts.crypto);
|
|
4721
|
+
const certificate = _ssisdkextx509utils.pemOrDerToX509Certificate.call(void 0, x5c[0]);
|
|
4722
|
+
const cryptoEngine = new (0, _pkijs.CryptoEngine)({
|
|
4799
4723
|
name: "identifier_resolver_managed",
|
|
4800
4724
|
crypto: cryptoImpl
|
|
4801
4725
|
});
|
|
4802
|
-
(0,
|
|
4726
|
+
_pkijs.setEngine.call(void 0, cryptoEngine.name, cryptoEngine);
|
|
4803
4727
|
const pk = await certificate.getPublicKey(void 0, cryptoEngine);
|
|
4804
4728
|
const jwk = await cryptoEngine.subtle.exportKey("jwk", pk);
|
|
4805
|
-
const jwkThumbprint = (0,
|
|
4729
|
+
const jwkThumbprint = _ssisdkextkeyutils.calculateJwkThumbprint.call(void 0, {
|
|
4806
4730
|
jwk
|
|
4807
4731
|
});
|
|
4808
4732
|
const key = await context.agent.keyManagerGet({
|
|
4809
|
-
kid: opts.kmsKeyRef
|
|
4733
|
+
kid: _nullishCoalesce(opts.kmsKeyRef, () => ( jwkThumbprint))
|
|
4810
4734
|
});
|
|
4811
4735
|
return {
|
|
4812
4736
|
method,
|
|
@@ -4841,7 +4765,7 @@ async function getManagedOID4VCIssuerIdentifier(opts, context) {
|
|
|
4841
4765
|
dq: "mxRTU3QDyR2EnCv0Nl0TCF90oliJGAHR9HJmBe__EjuCBbwHfcT8OG3hWOv8vpzokQPRl5cQt3NckzX3fs6xlJN4Ai2Hh2zduKFVQ2p-AF2p6Yfahscjtq-GY9cB85NxLy2IXCC0PF--Sq9LOrTE9QV988SJy_yUrAjcZ5MmECk",
|
|
4842
4766
|
qi: "ldHXIrEmMZVaNwGzDF9WG8sHj2mOZmQpw9yrjLK9hAsmsNr5LTyqWAqJIYZSwPTYWhY4nu2O0EY9G9uYiqewXfCKw_UngrJt8Xwfq1Zruz0YY869zPN4GiE9-9rzdZB33RBw8kIOquY3MK74FMwCihYx_LiU2YTHkaoJ3ncvtvg"
|
|
4843
4767
|
};
|
|
4844
|
-
const jwkThumbprint = (0,
|
|
4768
|
+
const jwkThumbprint = _ssisdkextkeyutils.calculateJwkThumbprint.call(void 0, {
|
|
4845
4769
|
jwk
|
|
4846
4770
|
});
|
|
4847
4771
|
const key = {
|
|
@@ -4920,13 +4844,13 @@ async function managedIdentifierToJwk(identifier, context) {
|
|
|
4920
4844
|
__name(managedIdentifierToJwk, "managedIdentifierToJwk");
|
|
4921
4845
|
|
|
4922
4846
|
// src/functions/externalIdentifierFunctions.ts
|
|
4923
|
-
|
|
4924
|
-
|
|
4925
|
-
|
|
4926
|
-
|
|
4927
|
-
var
|
|
4928
|
-
var
|
|
4929
|
-
|
|
4847
|
+
|
|
4848
|
+
|
|
4849
|
+
|
|
4850
|
+
|
|
4851
|
+
var _ssitypes = require('@sphereon/ssi-types');
|
|
4852
|
+
var _utils = require('@veramo/utils');
|
|
4853
|
+
|
|
4930
4854
|
async function resolveExternalIdentifier(opts, context) {
|
|
4931
4855
|
let method;
|
|
4932
4856
|
if (isExternalIdentifierDidOpts(opts)) {
|
|
@@ -4953,26 +4877,26 @@ async function resolveExternalX5cIdentifier(opts, context) {
|
|
|
4953
4877
|
if (!isExternalIdentifierX5cOpts(opts)) {
|
|
4954
4878
|
return Promise.reject("External x5c Identifier args need to be provided");
|
|
4955
4879
|
}
|
|
4956
|
-
const verify = opts.verify
|
|
4957
|
-
const x5c = opts.identifier.map((derOrPem) => derOrPem.includes("CERTIFICATE") ? (0,
|
|
4880
|
+
const verify = _nullishCoalesce(opts.verify, () => ( true));
|
|
4881
|
+
const x5c = opts.identifier.map((derOrPem) => derOrPem.includes("CERTIFICATE") ? _ssisdkextx509utils.PEMToDer.call(void 0, derOrPem) : derOrPem);
|
|
4958
4882
|
if (x5c.length === 0) {
|
|
4959
4883
|
return Promise.reject("Empty certification chain is not allowed");
|
|
4960
4884
|
}
|
|
4961
|
-
const certificates = x5c.map(
|
|
4885
|
+
const certificates = x5c.map(_ssisdkextx509utils.pemOrDerToX509Certificate);
|
|
4962
4886
|
let verificationResult;
|
|
4963
4887
|
let issuerJWK;
|
|
4964
4888
|
let jwks = [];
|
|
4965
4889
|
if (verify) {
|
|
4966
|
-
if ((0,
|
|
4890
|
+
if (_ssisdkagentconfig.contextHasPlugin.call(void 0, context, "verifyCertificateChain")) {
|
|
4967
4891
|
verificationResult = await context.agent.verifyCertificateChain({
|
|
4968
4892
|
chain: opts.identifier,
|
|
4969
|
-
trustAnchors: opts.trustAnchors
|
|
4893
|
+
trustAnchors: _nullishCoalesce(opts.trustAnchors, () => ( [])),
|
|
4970
4894
|
verificationTime: opts.verificationTime
|
|
4971
4895
|
});
|
|
4972
4896
|
} else {
|
|
4973
|
-
verificationResult = await (0,
|
|
4897
|
+
verificationResult = await _ssisdkextx509utils.validateX509CertificateChain.call(void 0, {
|
|
4974
4898
|
chain: opts.identifier,
|
|
4975
|
-
trustAnchors: opts.trustAnchors
|
|
4899
|
+
trustAnchors: _nullishCoalesce(opts.trustAnchors, () => ( [])),
|
|
4976
4900
|
verificationTime: opts.verificationTime,
|
|
4977
4901
|
opts
|
|
4978
4902
|
});
|
|
@@ -4982,30 +4906,30 @@ async function resolveExternalX5cIdentifier(opts, context) {
|
|
|
4982
4906
|
return {
|
|
4983
4907
|
jwk: cert.publicKeyJWK,
|
|
4984
4908
|
kid: cert.subject.dn.DN,
|
|
4985
|
-
jwkThumbprint: (0,
|
|
4909
|
+
jwkThumbprint: _ssisdkextkeyutils.calculateJwkThumbprint.call(void 0, {
|
|
4986
4910
|
jwk: cert.publicKeyJWK
|
|
4987
4911
|
}),
|
|
4988
|
-
publicKeyHex: (0,
|
|
4912
|
+
publicKeyHex: _ssisdkextdidutils.jwkTtoPublicKeyHex.call(void 0, cert.publicKeyJWK)
|
|
4989
4913
|
};
|
|
4990
4914
|
});
|
|
4991
4915
|
}
|
|
4992
4916
|
}
|
|
4993
4917
|
if (!jwks || jwks.length === 0) {
|
|
4994
|
-
const cryptoEngine = new
|
|
4918
|
+
const cryptoEngine = new (0, _pkijs.CryptoEngine)({
|
|
4995
4919
|
name: "identifier_resolver_external",
|
|
4996
|
-
crypto: (0,
|
|
4920
|
+
crypto: _ssisdkextkeyutils.globalCrypto.call(void 0, false, opts.crypto)
|
|
4997
4921
|
});
|
|
4998
|
-
(0,
|
|
4922
|
+
_pkijs.setEngine.call(void 0, cryptoEngine.name, cryptoEngine);
|
|
4999
4923
|
jwks = await Promise.all(certificates.map(async (cert) => {
|
|
5000
4924
|
const pk = await cert.getPublicKey(void 0, cryptoEngine);
|
|
5001
4925
|
const jwk = await cryptoEngine.exportKey("jwk", pk);
|
|
5002
4926
|
return {
|
|
5003
4927
|
jwk,
|
|
5004
|
-
kid: (0,
|
|
5005
|
-
jwkThumbprint: (0,
|
|
4928
|
+
kid: _ssisdkextx509utils.getSubjectDN.call(void 0, cert).DN,
|
|
4929
|
+
jwkThumbprint: _ssisdkextkeyutils.calculateJwkThumbprint.call(void 0, {
|
|
5006
4930
|
jwk
|
|
5007
4931
|
}),
|
|
5008
|
-
publicKeyHex: (0,
|
|
4932
|
+
publicKeyHex: _ssisdkextdidutils.jwkTtoPublicKeyHex.call(void 0, jwk)
|
|
5009
4933
|
};
|
|
5010
4934
|
}));
|
|
5011
4935
|
}
|
|
@@ -5037,7 +4961,7 @@ async function resolveExternalJwkIdentifier(opts, context) {
|
|
|
5037
4961
|
identifier: jwk.x5c
|
|
5038
4962
|
}, context);
|
|
5039
4963
|
}
|
|
5040
|
-
const jwkThumbprint = (0,
|
|
4964
|
+
const jwkThumbprint = _ssisdkextkeyutils.calculateJwkThumbprint.call(void 0, {
|
|
5041
4965
|
jwk
|
|
5042
4966
|
});
|
|
5043
4967
|
return {
|
|
@@ -5048,7 +4972,7 @@ async function resolveExternalJwkIdentifier(opts, context) {
|
|
|
5048
4972
|
jwk,
|
|
5049
4973
|
jwkThumbprint,
|
|
5050
4974
|
kid: jwk.kid,
|
|
5051
|
-
publicKeyHex: (0,
|
|
4975
|
+
publicKeyHex: _ssisdkextdidutils.jwkTtoPublicKeyHex.call(void 0, jwk)
|
|
5052
4976
|
}
|
|
5053
4977
|
],
|
|
5054
4978
|
x5c
|
|
@@ -5067,8 +4991,8 @@ async function resolveExternalCoseKeyIdentifier(opts, context) {
|
|
|
5067
4991
|
identifier: coseKey.x5chain
|
|
5068
4992
|
}, context);
|
|
5069
4993
|
}
|
|
5070
|
-
const jwk = (0,
|
|
5071
|
-
const jwkThumbprint = (0,
|
|
4994
|
+
const jwk = _ssisdkextkeyutils.coseKeyToJwk.call(void 0, coseKey);
|
|
4995
|
+
const jwkThumbprint = _ssisdkextkeyutils.calculateJwkThumbprint.call(void 0, {
|
|
5072
4996
|
jwk
|
|
5073
4997
|
});
|
|
5074
4998
|
return {
|
|
@@ -5079,7 +5003,7 @@ async function resolveExternalCoseKeyIdentifier(opts, context) {
|
|
|
5079
5003
|
jwk,
|
|
5080
5004
|
jwkThumbprint,
|
|
5081
5005
|
kid: coseKey.kid,
|
|
5082
|
-
publicKeyHex: (0,
|
|
5006
|
+
publicKeyHex: _ssisdkextdidutils.jwkTtoPublicKeyHex.call(void 0, jwk)
|
|
5083
5007
|
}
|
|
5084
5008
|
],
|
|
5085
5009
|
x5c
|
|
@@ -5089,36 +5013,36 @@ __name(resolveExternalCoseKeyIdentifier, "resolveExternalCoseKeyIdentifier");
|
|
|
5089
5013
|
async function resolveExternalDidIdentifier(opts, context) {
|
|
5090
5014
|
if (!isExternalIdentifierDidOpts(opts)) {
|
|
5091
5015
|
return Promise.reject("External DID Identifier args need to be provided");
|
|
5092
|
-
} else if (!(0,
|
|
5016
|
+
} else if (!_ssisdkagentconfig.contextHasPlugin.call(void 0, context, "resolveDid")) {
|
|
5093
5017
|
return Promise.reject(Error(`Cannot get external DID identifier if DID resolver plugin is not enabled!`));
|
|
5094
5018
|
}
|
|
5095
5019
|
const { uniresolverResolution = false, localResolution = true, resolverResolution = true } = opts;
|
|
5096
5020
|
const did = opts.identifier;
|
|
5097
5021
|
let parsed;
|
|
5098
5022
|
try {
|
|
5099
|
-
parsed = (0,
|
|
5023
|
+
parsed = _ssitypes.parseDid.call(void 0, did);
|
|
5100
5024
|
} catch (error) {
|
|
5101
5025
|
return Promise.reject(error);
|
|
5102
5026
|
}
|
|
5103
5027
|
const didParsed = parsed;
|
|
5104
|
-
const didResolutionResult = await (0,
|
|
5028
|
+
const didResolutionResult = await _ssisdkextdidutils.getAgentResolver.call(void 0, context, {
|
|
5105
5029
|
uniresolverResolution,
|
|
5106
5030
|
localResolution,
|
|
5107
5031
|
resolverResolution
|
|
5108
5032
|
}).resolve(did);
|
|
5109
|
-
const didDocument = didResolutionResult.didDocument
|
|
5110
|
-
const didJwks = didDocument ? (0,
|
|
5111
|
-
const jwks = didJwks ? Array.from(new Set(Array.from(Object.values(didJwks).filter((jwks2) => (0,
|
|
5033
|
+
const didDocument = _nullishCoalesce(didResolutionResult.didDocument, () => ( void 0));
|
|
5034
|
+
const didJwks = didDocument ? _ssisdkextdidutils.didDocumentToJwks.call(void 0, didDocument) : void 0;
|
|
5035
|
+
const jwks = didJwks ? Array.from(new Set(Array.from(Object.values(didJwks).filter((jwks2) => _utils.isDefined.call(void 0, jwks2) && jwks2.length > 0).flatMap((jwks2) => jwks2)).flatMap((jwk) => {
|
|
5112
5036
|
return {
|
|
5113
5037
|
jwk,
|
|
5114
|
-
jwkThumbprint: (0,
|
|
5038
|
+
jwkThumbprint: _ssisdkextkeyutils.calculateJwkThumbprint.call(void 0, {
|
|
5115
5039
|
jwk
|
|
5116
5040
|
}),
|
|
5117
5041
|
kid: jwk.kid,
|
|
5118
|
-
publicKeyHex: (0,
|
|
5042
|
+
publicKeyHex: _ssisdkextdidutils.jwkTtoPublicKeyHex.call(void 0, jwk)
|
|
5119
5043
|
};
|
|
5120
5044
|
}).map((jwk) => JSON.stringify(jwk)))).map((jwks2) => JSON.parse(jwks2)) : [];
|
|
5121
|
-
if (didResolutionResult
|
|
5045
|
+
if (_optionalChain([didResolutionResult, 'optionalAccess', _23 => _23.didDocument])) {
|
|
5122
5046
|
delete didResolutionResult["didDocument"];
|
|
5123
5047
|
}
|
|
5124
5048
|
return {
|
|
@@ -5134,15 +5058,15 @@ async function resolveExternalDidIdentifier(opts, context) {
|
|
|
5134
5058
|
__name(resolveExternalDidIdentifier, "resolveExternalDidIdentifier");
|
|
5135
5059
|
|
|
5136
5060
|
// src/functions/externalOIDFIdentifier.ts
|
|
5137
|
-
|
|
5138
|
-
var
|
|
5139
|
-
var
|
|
5061
|
+
|
|
5062
|
+
var _fromstring = require('uint8arrays/from-string');
|
|
5063
|
+
var _tostring = require('uint8arrays/to-string');
|
|
5140
5064
|
async function resolveExternalOIDFEntityIdIdentifier(opts, context) {
|
|
5141
5065
|
let { trustAnchors, identifier } = opts;
|
|
5142
5066
|
if (!trustAnchors || trustAnchors.length === 0) {
|
|
5143
5067
|
return Promise.reject(Error("ExternalIdentifierOIDFEntityIdOpts is missing the trustAnchors"));
|
|
5144
5068
|
}
|
|
5145
|
-
if (!(0,
|
|
5069
|
+
if (!_ssisdkagentconfig.contextHasPlugin.call(void 0, context, "jwtVerifyJwsSignature")) {
|
|
5146
5070
|
return Promise.reject(Error("For OIDFEntityId resolving the agent needs to have the JwtService plugin enabled"));
|
|
5147
5071
|
}
|
|
5148
5072
|
const trustedAnchors = /* @__PURE__ */ new Set();
|
|
@@ -5157,7 +5081,7 @@ async function resolveExternalOIDFEntityIdIdentifier(opts, context) {
|
|
|
5157
5081
|
]
|
|
5158
5082
|
});
|
|
5159
5083
|
if (resolveResult.error || !resolveResult.trustChain) {
|
|
5160
|
-
errorList[trustAnchor] = resolveResult.errorMessage
|
|
5084
|
+
errorList[trustAnchor] = _nullishCoalesce(resolveResult.errorMessage, () => ( "unspecified"));
|
|
5161
5085
|
} else {
|
|
5162
5086
|
const trustChain = resolveResult.trustChain.asJsReadonlyArrayView();
|
|
5163
5087
|
if (trustChain.length === 0) {
|
|
@@ -5176,7 +5100,7 @@ async function resolveExternalOIDFEntityIdIdentifier(opts, context) {
|
|
|
5176
5100
|
errorList[trustAnchor] = "No signature was present in the trust anchor JWS";
|
|
5177
5101
|
continue;
|
|
5178
5102
|
}
|
|
5179
|
-
payload = JSON.parse((0,
|
|
5103
|
+
payload = JSON.parse(_tostring.toString.call(void 0, _fromstring.fromString.call(void 0, jwtVerifyResult.jws.payload, "base64url")));
|
|
5180
5104
|
const signature = jwtVerifyResult.jws.signatures[0];
|
|
5181
5105
|
if (signature.identifier.jwks.length === 0) {
|
|
5182
5106
|
errorList[trustAnchor] = "No JWK was present in the trust anchor signature";
|
|
@@ -5205,14 +5129,14 @@ __name(resolveExternalOIDFEntityIdIdentifier, "resolveExternalOIDFEntityIdIdenti
|
|
|
5205
5129
|
function legacyKeyRefsToIdentifierOpts(opts) {
|
|
5206
5130
|
if (!opts.idOpts) {
|
|
5207
5131
|
console.warn(`Legacy idOpts being used. Support will be dropped in the future. Consider switching to the idOpts, to have support for DIDs, JWKS, x5c etc. See https://github.com/Sphereon-Opensource/SSI-SDK-crypto-extensions/tree/feature/multi_identifier_support/packages/identifier-resolution`);
|
|
5208
|
-
let kmsKeyRef = opts.keyRef
|
|
5132
|
+
let kmsKeyRef = _nullishCoalesce(_nullishCoalesce(_nullishCoalesce(_nullishCoalesce(opts.keyRef, () => ( _optionalChain([opts, 'access', _24 => _24.didOpts, 'optionalAccess', _25 => _25.idOpts, 'optionalAccess', _26 => _26.kmsKeyRef]))), () => ( _optionalChain([opts, 'access', _27 => _27.didOpts, 'optionalAccess', _28 => _28.kid]))), () => ( _optionalChain([opts, 'access', _29 => _29.didOpts, 'optionalAccess', _30 => _30.idOpts, 'optionalAccess', _31 => _31.kid]))), () => ( (typeof _optionalChain([opts, 'access', _32 => _32.didOpts, 'optionalAccess', _33 => _33.idOpts, 'optionalAccess', _34 => _34.identifier]) === "object" ? opts.didOpts.idOpts.identifier.keys[0].kid : void 0)));
|
|
5209
5133
|
if (!kmsKeyRef) {
|
|
5210
5134
|
throw Error("Key ref is needed for access token signer");
|
|
5211
5135
|
}
|
|
5212
|
-
let identifier = opts.didOpts
|
|
5136
|
+
let identifier = _nullishCoalesce(_optionalChain([opts, 'access', _35 => _35.didOpts, 'optionalAccess', _36 => _36.identifier]), () => ( _optionalChain([opts, 'access', _37 => _37.didOpts, 'optionalAccess', _38 => _38.idOpts, 'optionalAccess', _39 => _39.identifier])));
|
|
5213
5137
|
return {
|
|
5214
|
-
kmsKeyRef: opts.keyRef
|
|
5215
|
-
identifier: identifier
|
|
5138
|
+
kmsKeyRef: _nullishCoalesce(opts.keyRef, () => ( kmsKeyRef)),
|
|
5139
|
+
identifier: _nullishCoalesce(identifier, () => ( kmsKeyRef)),
|
|
5216
5140
|
issuer: opts.iss
|
|
5217
5141
|
};
|
|
5218
5142
|
} else {
|
|
@@ -5231,13 +5155,13 @@ function legacyKeyRefsToIdentifierOpts(opts) {
|
|
|
5231
5155
|
__name(legacyKeyRefsToIdentifierOpts, "legacyKeyRefsToIdentifierOpts");
|
|
5232
5156
|
|
|
5233
5157
|
// src/agent/IdentifierResolution.ts
|
|
5234
|
-
var IdentifierResolution = class {
|
|
5158
|
+
var IdentifierResolution = (_class = class {
|
|
5235
5159
|
static {
|
|
5236
5160
|
__name(this, "IdentifierResolution");
|
|
5237
5161
|
}
|
|
5238
|
-
|
|
5239
|
-
schema = schema.IMnemonicInfoGenerator
|
|
5240
|
-
methods = {
|
|
5162
|
+
|
|
5163
|
+
__init() {this.schema = exports.schema = schema.IMnemonicInfoGenerator}
|
|
5164
|
+
__init2() {this.methods = {
|
|
5241
5165
|
identifierManagedGet: this.identifierManagedGet.bind(this),
|
|
5242
5166
|
identifierManagedGetByDid: this.identifierManagedGetByDid.bind(this),
|
|
5243
5167
|
identifierManagedGetByKid: this.identifierManagedGetByKid.bind(this),
|
|
@@ -5252,12 +5176,12 @@ var IdentifierResolution = class {
|
|
|
5252
5176
|
identifierExternalResolveByJwk: this.identifierExternalResolveByJwk.bind(this),
|
|
5253
5177
|
identifierExternalResolveByCoseKey: this.identifierExternalResolveByCoseKey.bind(this),
|
|
5254
5178
|
identifierExternalResolveByOIDFEntityId: this.identifierExternalResolveByOIDFEntityId.bind(this)
|
|
5255
|
-
}
|
|
5179
|
+
}}
|
|
5256
5180
|
/**
|
|
5257
5181
|
* TODO: Add a cache, as we are retrieving the same keys/info quite often
|
|
5258
5182
|
*/
|
|
5259
|
-
constructor(opts) {
|
|
5260
|
-
this._crypto = (0,
|
|
5183
|
+
constructor(opts) {;_class.prototype.__init.call(this);_class.prototype.__init2.call(this);
|
|
5184
|
+
this._crypto = _ssisdkextkeyutils.globalCrypto.call(void 0, false, _optionalChain([opts, 'optionalAccess', _40 => _40.crypto]));
|
|
5261
5185
|
}
|
|
5262
5186
|
/**
|
|
5263
5187
|
* Main method for managed identifiers. We always go through this method (also the other methods below) as we want to
|
|
@@ -5349,8 +5273,64 @@ var IdentifierResolution = class {
|
|
|
5349
5273
|
method: "entity_id"
|
|
5350
5274
|
}, context);
|
|
5351
5275
|
}
|
|
5352
|
-
};
|
|
5276
|
+
}, _class);
|
|
5353
5277
|
|
|
5354
5278
|
// src/index.ts
|
|
5355
5279
|
var schema = require_plugin_schema();
|
|
5280
|
+
|
|
5281
|
+
|
|
5282
|
+
|
|
5283
|
+
|
|
5284
|
+
|
|
5285
|
+
|
|
5286
|
+
|
|
5287
|
+
|
|
5288
|
+
|
|
5289
|
+
|
|
5290
|
+
|
|
5291
|
+
|
|
5292
|
+
|
|
5293
|
+
|
|
5294
|
+
|
|
5295
|
+
|
|
5296
|
+
|
|
5297
|
+
|
|
5298
|
+
|
|
5299
|
+
|
|
5300
|
+
|
|
5301
|
+
|
|
5302
|
+
|
|
5303
|
+
|
|
5304
|
+
|
|
5305
|
+
|
|
5306
|
+
|
|
5307
|
+
|
|
5308
|
+
|
|
5309
|
+
|
|
5310
|
+
|
|
5311
|
+
|
|
5312
|
+
|
|
5313
|
+
|
|
5314
|
+
|
|
5315
|
+
|
|
5316
|
+
|
|
5317
|
+
|
|
5318
|
+
|
|
5319
|
+
|
|
5320
|
+
|
|
5321
|
+
|
|
5322
|
+
|
|
5323
|
+
|
|
5324
|
+
|
|
5325
|
+
|
|
5326
|
+
|
|
5327
|
+
|
|
5328
|
+
|
|
5329
|
+
|
|
5330
|
+
|
|
5331
|
+
|
|
5332
|
+
|
|
5333
|
+
|
|
5334
|
+
|
|
5335
|
+
exports.IdentifierResolution = IdentifierResolution; exports.ensureManagedIdentifierResult = ensureManagedIdentifierResult; exports.getManagedCoseKeyIdentifier = getManagedCoseKeyIdentifier; exports.getManagedDidIdentifier = getManagedDidIdentifier; exports.getManagedIdentifier = getManagedIdentifier; exports.getManagedJwkIdentifier = getManagedJwkIdentifier; exports.getManagedKeyIdentifier = getManagedKeyIdentifier; exports.getManagedKidIdentifier = getManagedKidIdentifier; exports.getManagedOID4VCIssuerIdentifier = getManagedOID4VCIssuerIdentifier; exports.getManagedX5cIdentifier = getManagedX5cIdentifier; exports.identifierResolutionContextMethods = identifierResolutionContextMethods; exports.isCoseKeyIdentifier = isCoseKeyIdentifier; exports.isDidIdentifier = isDidIdentifier; exports.isExternalIdentifierCoseKeyOpts = isExternalIdentifierCoseKeyOpts; exports.isExternalIdentifierDidOpts = isExternalIdentifierDidOpts; exports.isExternalIdentifierJwkOpts = isExternalIdentifierJwkOpts; exports.isExternalIdentifierJwksUrlOpts = isExternalIdentifierJwksUrlOpts; exports.isExternalIdentifierKidOpts = isExternalIdentifierKidOpts; exports.isExternalIdentifierOIDFEntityIdOpts = isExternalIdentifierOIDFEntityIdOpts; exports.isExternalIdentifierOidcDiscoveryOpts = isExternalIdentifierOidcDiscoveryOpts; exports.isExternalIdentifierX5cOpts = isExternalIdentifierX5cOpts; exports.isIIdentifier = isIIdentifier; exports.isJwkIdentifier = isJwkIdentifier; exports.isJwksUrlIdentifier = isJwksUrlIdentifier; exports.isKeyIdentifier = isKeyIdentifier; exports.isKidIdentifier = isKidIdentifier; exports.isManagedIdentifierCoseKeyOpts = isManagedIdentifierCoseKeyOpts; exports.isManagedIdentifierCoseKeyResult = isManagedIdentifierCoseKeyResult; exports.isManagedIdentifierDidOpts = isManagedIdentifierDidOpts; exports.isManagedIdentifierDidResult = isManagedIdentifierDidResult; exports.isManagedIdentifierJwkOpts = isManagedIdentifierJwkOpts; exports.isManagedIdentifierJwkResult = isManagedIdentifierJwkResult; exports.isManagedIdentifierKeyOpts = isManagedIdentifierKeyOpts; exports.isManagedIdentifierKeyResult = isManagedIdentifierKeyResult; exports.isManagedIdentifierKidOpts = isManagedIdentifierKidOpts; exports.isManagedIdentifierKidResult = isManagedIdentifierKidResult; exports.isManagedIdentifierOID4VCIssuerOpts = isManagedIdentifierOID4VCIssuerOpts; exports.isManagedIdentifierResult = isManagedIdentifierResult; exports.isManagedIdentifierX5cOpts = isManagedIdentifierX5cOpts; exports.isManagedIdentifierX5cResult = isManagedIdentifierX5cResult; exports.isOID4VCIssuerIdentifier = isOID4VCIssuerIdentifier; exports.isOIDFEntityIdIdentifier = isOIDFEntityIdIdentifier; exports.isOidcDiscoveryIdentifier = isOidcDiscoveryIdentifier; exports.isX5cIdentifier = isX5cIdentifier; exports.legacyKeyRefsToIdentifierOpts = legacyKeyRefsToIdentifierOpts; exports.managedIdentifierToJwk = managedIdentifierToJwk; exports.managedIdentifierToKeyResult = managedIdentifierToKeyResult; exports.resolveExternalCoseKeyIdentifier = resolveExternalCoseKeyIdentifier; exports.resolveExternalDidIdentifier = resolveExternalDidIdentifier; exports.resolveExternalIdentifier = resolveExternalIdentifier; exports.resolveExternalJwkIdentifier = resolveExternalJwkIdentifier; exports.resolveExternalOIDFEntityIdIdentifier = resolveExternalOIDFEntityIdIdentifier; exports.resolveExternalX5cIdentifier = resolveExternalX5cIdentifier; exports.schema = schema;
|
|
5356
5336
|
//# sourceMappingURL=index.cjs.map
|