@sphereon/ssi-sdk.ebsi-support 0.34.1-next.299 → 0.34.1-next.322

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@sphereon/ssi-sdk.ebsi-support",
3
- "version": "0.34.1-next.299+9e9f5a50",
3
+ "version": "0.34.1-next.322+78f8dd31",
4
4
  "source": "src/index.ts",
5
5
  "type": "module",
6
6
  "main": "./dist/index.cjs",
@@ -27,21 +27,21 @@
27
27
  },
28
28
  "dependencies": {
29
29
  "@ethersproject/random": "^5.7.0",
30
- "@sphereon/did-auth-siop": "0.19.1-next.220",
31
- "@sphereon/did-auth-siop-adapter": "0.19.1-next.220",
30
+ "@sphereon/did-auth-siop": "0.19.1-next.234",
31
+ "@sphereon/did-auth-siop-adapter": "0.19.1-next.234",
32
32
  "@sphereon/pex": "5.0.0-unstable.28",
33
33
  "@sphereon/pex-models": "^2.3.2",
34
- "@sphereon/ssi-sdk-ext.did-resolver-ebsi": "0.34.1-next.299+9e9f5a50",
35
- "@sphereon/ssi-sdk-ext.did-utils": "0.34.1-next.299+9e9f5a50",
36
- "@sphereon/ssi-sdk-ext.identifier-resolution": "0.34.1-next.299+9e9f5a50",
37
- "@sphereon/ssi-sdk-ext.jwt-service": "0.34.1-next.299+9e9f5a50",
38
- "@sphereon/ssi-sdk-ext.key-utils": "0.34.1-next.299+9e9f5a50",
39
- "@sphereon/ssi-sdk.contact-manager": "0.34.1-next.299+9e9f5a50",
40
- "@sphereon/ssi-sdk.core": "0.34.1-next.299+9e9f5a50",
41
- "@sphereon/ssi-sdk.oid4vci-holder": "0.34.1-next.299+9e9f5a50",
42
- "@sphereon/ssi-sdk.presentation-exchange": "0.34.1-next.299+9e9f5a50",
43
- "@sphereon/ssi-sdk.siopv2-oid4vp-op-auth": "0.34.1-next.299+9e9f5a50",
44
- "@sphereon/ssi-types": "0.34.1-next.299+9e9f5a50",
34
+ "@sphereon/ssi-sdk-ext.did-resolver-ebsi": "0.34.1-next.322+78f8dd31",
35
+ "@sphereon/ssi-sdk-ext.did-utils": "0.34.1-next.322+78f8dd31",
36
+ "@sphereon/ssi-sdk-ext.identifier-resolution": "0.34.1-next.322+78f8dd31",
37
+ "@sphereon/ssi-sdk-ext.jwt-service": "0.34.1-next.322+78f8dd31",
38
+ "@sphereon/ssi-sdk-ext.key-utils": "0.34.1-next.322+78f8dd31",
39
+ "@sphereon/ssi-sdk.contact-manager": "0.34.1-next.322+78f8dd31",
40
+ "@sphereon/ssi-sdk.core": "0.34.1-next.322+78f8dd31",
41
+ "@sphereon/ssi-sdk.oid4vci-holder": "0.34.1-next.322+78f8dd31",
42
+ "@sphereon/ssi-sdk.presentation-exchange": "0.34.1-next.322+78f8dd31",
43
+ "@sphereon/ssi-sdk.siopv2-oid4vp-op-auth": "0.34.1-next.322+78f8dd31",
44
+ "@sphereon/ssi-types": "0.34.1-next.322+78f8dd31",
45
45
  "@veramo/core": "4.2.0",
46
46
  "@veramo/did-manager": "4.2.0",
47
47
  "@veramo/utils": "4.2.0",
@@ -56,15 +56,15 @@
56
56
  "xstate": "^4.38.3"
57
57
  },
58
58
  "devDependencies": {
59
- "@sphereon/oid4vci-client": "0.19.1-next.220",
60
- "@sphereon/oid4vci-common": "0.19.1-next.220",
61
- "@sphereon/ssi-express-support": "0.34.1-next.299+9e9f5a50",
62
- "@sphereon/ssi-sdk-ext.key-manager": "0.34.1-next.299+9e9f5a50",
63
- "@sphereon/ssi-sdk-ext.kms-local": "0.34.1-next.299+9e9f5a50",
64
- "@sphereon/ssi-sdk.agent-config": "0.34.1-next.299+9e9f5a50",
65
- "@sphereon/ssi-sdk.data-store": "0.34.1-next.299+9e9f5a50",
66
- "@sphereon/ssi-sdk.data-store-types": "0.34.1-next.299+9e9f5a50",
67
- "@sphereon/ssi-sdk.public-key-hosting": "0.34.1-next.299+9e9f5a50",
59
+ "@sphereon/oid4vci-client": "0.19.1-next.234",
60
+ "@sphereon/oid4vci-common": "0.19.1-next.234",
61
+ "@sphereon/ssi-express-support": "0.34.1-next.322+78f8dd31",
62
+ "@sphereon/ssi-sdk-ext.key-manager": "0.34.1-next.322+78f8dd31",
63
+ "@sphereon/ssi-sdk-ext.kms-local": "0.34.1-next.322+78f8dd31",
64
+ "@sphereon/ssi-sdk.agent-config": "0.34.1-next.322+78f8dd31",
65
+ "@sphereon/ssi-sdk.data-store": "0.34.1-next.322+78f8dd31",
66
+ "@sphereon/ssi-sdk.data-store-types": "0.34.1-next.322+78f8dd31",
67
+ "@sphereon/ssi-sdk.public-key-hosting": "0.34.1-next.322+78f8dd31",
68
68
  "@transmute/json-web-signature": "0.7.0-unstable.81",
69
69
  "@types/cors": "^2.8.17",
70
70
  "@types/express": "^4.17.21",
@@ -99,5 +99,5 @@
99
99
  "EBSI",
100
100
  "EBSI Authorization Client"
101
101
  ],
102
- "gitHead": "9e9f5a50ead9373a078cb5291cbc4fb1e7865dc2"
102
+ "gitHead": "78f8dd3157066ae8cf11d2ae50c8c3d8f43b8ed0"
103
103
  }
@@ -217,15 +217,15 @@ export class EbsiSupport implements IAgentPlugin {
217
217
 
218
218
  const presentationSubmission = { id: v4(), definition_id: definitionResponse.id, descriptor_map: [] } satisfies PresentationSubmission
219
219
  // FIXME SSISDK-40
220
- //hasInputDescriptors
221
- //? vp.presentationSubmission
222
- //: ({ id: v4(), definition_id: definitionResponse.id, descriptor_map: [] } satisfies PresentationSubmission)
220
+ //hasInputDescriptors
221
+ //? vp.presentationSubmission
222
+ //: ({ id: v4(), definition_id: definitionResponse.id, descriptor_map: [] } satisfies PresentationSubmission)
223
223
 
224
224
  console.log(`Presentation submission`, presentationSubmission)
225
225
  const tokenRequestArgs = {
226
226
  grant_type: 'vp_token',
227
227
  // FIXME SSISDK-40
228
- vp_token: '',//CredentialMapper.toCompactJWT(vp.verifiablePresentations[0]), // FIXME How are we going to send multiple presentations in a vp_token?
228
+ vp_token: '', //CredentialMapper.toCompactJWT(vp.verifiablePresentations[0]), // FIXME How are we going to send multiple presentations in a vp_token?
229
229
  scope,
230
230
  presentation_submission: presentationSubmission,
231
231
  apiOpts: { environment, version: 'v4' },
@@ -1,7 +1,7 @@
1
1
  import { OpenID4VCIClient } from '@sphereon/oid4vci-client'
2
2
  import {
3
3
  Alg,
4
- AuthorizationDetails,
4
+ AuthorizationDetailsV1_0_15,
5
5
  AuthorizationRequestOpts,
6
6
  AuthzFlowType,
7
7
  CredentialConfigurationSupported,
@@ -119,11 +119,15 @@ export const ebsiCreateAttestationAuthRequestURL = async (
119
119
  throw Error(`Could not find '${credentialType}' with format(s) '${formats.join(',')}' in list of supported types for issuer: ${credentialIssuer}`)
120
120
  }
121
121
  const authorizationDetails = supportedConfigurations.map((supported) => {
122
+ const credential_configuration_id = supported.id as string
123
+ if (!credential_configuration_id) {
124
+ throw Error(`Credential configuration id missing for credential type: ${credentialType}`)
125
+ }
122
126
  return {
123
127
  type: 'openid_credential',
124
- format: supported.format,
125
- types: getTypesFromCredentialSupported(supported),
126
- } as AuthorizationDetails
128
+ credential_configuration_id,
129
+ credential_identifiers: getTypesFromCredentialSupported(supported),
130
+ } satisfies AuthorizationDetailsV1_0_15
127
131
  })
128
132
 
129
133
  const signCallbacks: ProofOfPossessionCallbacks = requestObjectOpts.signCallbacks ?? {