@sphereon/ssi-sdk.ebsi-support 0.34.1-next.299 → 0.34.1-next.322
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs +6 -2
- package/dist/index.cjs.map +1 -1
- package/dist/index.js +6 -2
- package/dist/index.js.map +1 -1
- package/package.json +24 -24
- package/src/agent/EbsiSupport.ts +4 -4
- package/src/functions/Attestation.ts +8 -4
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@sphereon/ssi-sdk.ebsi-support",
|
|
3
|
-
"version": "0.34.1-next.
|
|
3
|
+
"version": "0.34.1-next.322+78f8dd31",
|
|
4
4
|
"source": "src/index.ts",
|
|
5
5
|
"type": "module",
|
|
6
6
|
"main": "./dist/index.cjs",
|
|
@@ -27,21 +27,21 @@
|
|
|
27
27
|
},
|
|
28
28
|
"dependencies": {
|
|
29
29
|
"@ethersproject/random": "^5.7.0",
|
|
30
|
-
"@sphereon/did-auth-siop": "0.19.1-next.
|
|
31
|
-
"@sphereon/did-auth-siop-adapter": "0.19.1-next.
|
|
30
|
+
"@sphereon/did-auth-siop": "0.19.1-next.234",
|
|
31
|
+
"@sphereon/did-auth-siop-adapter": "0.19.1-next.234",
|
|
32
32
|
"@sphereon/pex": "5.0.0-unstable.28",
|
|
33
33
|
"@sphereon/pex-models": "^2.3.2",
|
|
34
|
-
"@sphereon/ssi-sdk-ext.did-resolver-ebsi": "0.34.1-next.
|
|
35
|
-
"@sphereon/ssi-sdk-ext.did-utils": "0.34.1-next.
|
|
36
|
-
"@sphereon/ssi-sdk-ext.identifier-resolution": "0.34.1-next.
|
|
37
|
-
"@sphereon/ssi-sdk-ext.jwt-service": "0.34.1-next.
|
|
38
|
-
"@sphereon/ssi-sdk-ext.key-utils": "0.34.1-next.
|
|
39
|
-
"@sphereon/ssi-sdk.contact-manager": "0.34.1-next.
|
|
40
|
-
"@sphereon/ssi-sdk.core": "0.34.1-next.
|
|
41
|
-
"@sphereon/ssi-sdk.oid4vci-holder": "0.34.1-next.
|
|
42
|
-
"@sphereon/ssi-sdk.presentation-exchange": "0.34.1-next.
|
|
43
|
-
"@sphereon/ssi-sdk.siopv2-oid4vp-op-auth": "0.34.1-next.
|
|
44
|
-
"@sphereon/ssi-types": "0.34.1-next.
|
|
34
|
+
"@sphereon/ssi-sdk-ext.did-resolver-ebsi": "0.34.1-next.322+78f8dd31",
|
|
35
|
+
"@sphereon/ssi-sdk-ext.did-utils": "0.34.1-next.322+78f8dd31",
|
|
36
|
+
"@sphereon/ssi-sdk-ext.identifier-resolution": "0.34.1-next.322+78f8dd31",
|
|
37
|
+
"@sphereon/ssi-sdk-ext.jwt-service": "0.34.1-next.322+78f8dd31",
|
|
38
|
+
"@sphereon/ssi-sdk-ext.key-utils": "0.34.1-next.322+78f8dd31",
|
|
39
|
+
"@sphereon/ssi-sdk.contact-manager": "0.34.1-next.322+78f8dd31",
|
|
40
|
+
"@sphereon/ssi-sdk.core": "0.34.1-next.322+78f8dd31",
|
|
41
|
+
"@sphereon/ssi-sdk.oid4vci-holder": "0.34.1-next.322+78f8dd31",
|
|
42
|
+
"@sphereon/ssi-sdk.presentation-exchange": "0.34.1-next.322+78f8dd31",
|
|
43
|
+
"@sphereon/ssi-sdk.siopv2-oid4vp-op-auth": "0.34.1-next.322+78f8dd31",
|
|
44
|
+
"@sphereon/ssi-types": "0.34.1-next.322+78f8dd31",
|
|
45
45
|
"@veramo/core": "4.2.0",
|
|
46
46
|
"@veramo/did-manager": "4.2.0",
|
|
47
47
|
"@veramo/utils": "4.2.0",
|
|
@@ -56,15 +56,15 @@
|
|
|
56
56
|
"xstate": "^4.38.3"
|
|
57
57
|
},
|
|
58
58
|
"devDependencies": {
|
|
59
|
-
"@sphereon/oid4vci-client": "0.19.1-next.
|
|
60
|
-
"@sphereon/oid4vci-common": "0.19.1-next.
|
|
61
|
-
"@sphereon/ssi-express-support": "0.34.1-next.
|
|
62
|
-
"@sphereon/ssi-sdk-ext.key-manager": "0.34.1-next.
|
|
63
|
-
"@sphereon/ssi-sdk-ext.kms-local": "0.34.1-next.
|
|
64
|
-
"@sphereon/ssi-sdk.agent-config": "0.34.1-next.
|
|
65
|
-
"@sphereon/ssi-sdk.data-store": "0.34.1-next.
|
|
66
|
-
"@sphereon/ssi-sdk.data-store-types": "0.34.1-next.
|
|
67
|
-
"@sphereon/ssi-sdk.public-key-hosting": "0.34.1-next.
|
|
59
|
+
"@sphereon/oid4vci-client": "0.19.1-next.234",
|
|
60
|
+
"@sphereon/oid4vci-common": "0.19.1-next.234",
|
|
61
|
+
"@sphereon/ssi-express-support": "0.34.1-next.322+78f8dd31",
|
|
62
|
+
"@sphereon/ssi-sdk-ext.key-manager": "0.34.1-next.322+78f8dd31",
|
|
63
|
+
"@sphereon/ssi-sdk-ext.kms-local": "0.34.1-next.322+78f8dd31",
|
|
64
|
+
"@sphereon/ssi-sdk.agent-config": "0.34.1-next.322+78f8dd31",
|
|
65
|
+
"@sphereon/ssi-sdk.data-store": "0.34.1-next.322+78f8dd31",
|
|
66
|
+
"@sphereon/ssi-sdk.data-store-types": "0.34.1-next.322+78f8dd31",
|
|
67
|
+
"@sphereon/ssi-sdk.public-key-hosting": "0.34.1-next.322+78f8dd31",
|
|
68
68
|
"@transmute/json-web-signature": "0.7.0-unstable.81",
|
|
69
69
|
"@types/cors": "^2.8.17",
|
|
70
70
|
"@types/express": "^4.17.21",
|
|
@@ -99,5 +99,5 @@
|
|
|
99
99
|
"EBSI",
|
|
100
100
|
"EBSI Authorization Client"
|
|
101
101
|
],
|
|
102
|
-
"gitHead": "
|
|
102
|
+
"gitHead": "78f8dd3157066ae8cf11d2ae50c8c3d8f43b8ed0"
|
|
103
103
|
}
|
package/src/agent/EbsiSupport.ts
CHANGED
|
@@ -217,15 +217,15 @@ export class EbsiSupport implements IAgentPlugin {
|
|
|
217
217
|
|
|
218
218
|
const presentationSubmission = { id: v4(), definition_id: definitionResponse.id, descriptor_map: [] } satisfies PresentationSubmission
|
|
219
219
|
// FIXME SSISDK-40
|
|
220
|
-
|
|
221
|
-
|
|
222
|
-
|
|
220
|
+
//hasInputDescriptors
|
|
221
|
+
//? vp.presentationSubmission
|
|
222
|
+
//: ({ id: v4(), definition_id: definitionResponse.id, descriptor_map: [] } satisfies PresentationSubmission)
|
|
223
223
|
|
|
224
224
|
console.log(`Presentation submission`, presentationSubmission)
|
|
225
225
|
const tokenRequestArgs = {
|
|
226
226
|
grant_type: 'vp_token',
|
|
227
227
|
// FIXME SSISDK-40
|
|
228
|
-
vp_token: ''
|
|
228
|
+
vp_token: '', //CredentialMapper.toCompactJWT(vp.verifiablePresentations[0]), // FIXME How are we going to send multiple presentations in a vp_token?
|
|
229
229
|
scope,
|
|
230
230
|
presentation_submission: presentationSubmission,
|
|
231
231
|
apiOpts: { environment, version: 'v4' },
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { OpenID4VCIClient } from '@sphereon/oid4vci-client'
|
|
2
2
|
import {
|
|
3
3
|
Alg,
|
|
4
|
-
|
|
4
|
+
AuthorizationDetailsV1_0_15,
|
|
5
5
|
AuthorizationRequestOpts,
|
|
6
6
|
AuthzFlowType,
|
|
7
7
|
CredentialConfigurationSupported,
|
|
@@ -119,11 +119,15 @@ export const ebsiCreateAttestationAuthRequestURL = async (
|
|
|
119
119
|
throw Error(`Could not find '${credentialType}' with format(s) '${formats.join(',')}' in list of supported types for issuer: ${credentialIssuer}`)
|
|
120
120
|
}
|
|
121
121
|
const authorizationDetails = supportedConfigurations.map((supported) => {
|
|
122
|
+
const credential_configuration_id = supported.id as string
|
|
123
|
+
if (!credential_configuration_id) {
|
|
124
|
+
throw Error(`Credential configuration id missing for credential type: ${credentialType}`)
|
|
125
|
+
}
|
|
122
126
|
return {
|
|
123
127
|
type: 'openid_credential',
|
|
124
|
-
|
|
125
|
-
|
|
126
|
-
}
|
|
128
|
+
credential_configuration_id,
|
|
129
|
+
credential_identifiers: getTypesFromCredentialSupported(supported),
|
|
130
|
+
} satisfies AuthorizationDetailsV1_0_15
|
|
127
131
|
})
|
|
128
132
|
|
|
129
133
|
const signCallbacks: ProofOfPossessionCallbacks = requestObjectOpts.signCallbacks ?? {
|