@sphereon/ssi-sdk.oid4vci-holder 0.34.1-feature.SSISDK.45.94 → 0.34.1-feature.SSISDK.46.41

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@sphereon/ssi-sdk.oid4vci-holder",
3
- "version": "0.34.1-feature.SSISDK.45.94+24a0078a",
3
+ "version": "0.34.1-feature.SSISDK.46.41+1e7378b3",
4
4
  "source": "src/index.ts",
5
5
  "type": "module",
6
6
  "main": "./dist/index.cjs",
@@ -26,41 +26,40 @@
26
26
  "build": "tsup --config ../../tsup.config.ts --tsconfig ../../tsconfig.tsup.json"
27
27
  },
28
28
  "dependencies": {
29
- "@sphereon/did-auth-siop": "0.19.1-feature.SSISDK.45.91",
29
+ "@sphereon/did-auth-siop": "0.19.1-next.2",
30
30
  "@sphereon/kmp-mdoc-core": "0.2.0-SNAPSHOT.26",
31
- "@sphereon/oid4vci-client": "0.19.1-feature.SSISDK.45.91",
32
- "@sphereon/oid4vci-common": "0.19.1-feature.SSISDK.45.91",
33
- "@sphereon/ssi-sdk-ext.did-utils": "0.34.1-feature.SSISDK.45.94+24a0078a",
34
- "@sphereon/ssi-sdk-ext.identifier-resolution": "0.34.1-feature.SSISDK.45.94+24a0078a",
35
- "@sphereon/ssi-sdk-ext.jwt-service": "0.34.1-feature.SSISDK.45.94+24a0078a",
36
- "@sphereon/ssi-sdk-ext.key-utils": "0.34.1-feature.SSISDK.45.94+24a0078a",
37
- "@sphereon/ssi-sdk.contact-manager": "0.34.1-feature.SSISDK.45.94+24a0078a",
38
- "@sphereon/ssi-sdk.core": "0.34.1-feature.SSISDK.45.94+24a0078a",
39
- "@sphereon/ssi-sdk.credential-store": "0.34.1-feature.SSISDK.45.94+24a0078a",
40
- "@sphereon/ssi-sdk.credential-validation": "0.34.1-feature.SSISDK.45.94+24a0078a",
41
- "@sphereon/ssi-sdk.data-store": "0.34.1-feature.SSISDK.45.94+24a0078a",
42
- "@sphereon/ssi-sdk.issuance-branding": "0.34.1-feature.SSISDK.45.94+24a0078a",
43
- "@sphereon/ssi-sdk.mdl-mdoc": "0.34.1-feature.SSISDK.45.94+24a0078a",
44
- "@sphereon/ssi-sdk.oidf-client": "0.34.1-feature.SSISDK.45.94+24a0078a",
45
- "@sphereon/ssi-sdk.sd-jwt": "0.34.1-feature.SSISDK.45.94+24a0078a",
46
- "@sphereon/ssi-sdk.siopv2-oid4vp-common": "0.34.1-feature.SSISDK.45.94+24a0078a",
47
- "@sphereon/ssi-sdk.siopv2-oid4vp-op-auth": "0.34.1-feature.SSISDK.45.94+24a0078a",
48
- "@sphereon/ssi-sdk.xstate-machine-persistence": "0.34.1-feature.SSISDK.45.94+24a0078a",
49
- "@sphereon/ssi-types": "0.34.1-feature.SSISDK.45.94+24a0078a",
31
+ "@sphereon/oid4vci-client": "0.19.1-next.2",
32
+ "@sphereon/oid4vci-common": "0.19.1-next.2",
33
+ "@sphereon/ssi-sdk-ext.did-utils": "0.34.1-feature.SSISDK.46.41+1e7378b3",
34
+ "@sphereon/ssi-sdk-ext.identifier-resolution": "0.34.1-feature.SSISDK.46.41+1e7378b3",
35
+ "@sphereon/ssi-sdk-ext.jwt-service": "0.34.1-feature.SSISDK.46.41+1e7378b3",
36
+ "@sphereon/ssi-sdk-ext.key-utils": "0.34.1-feature.SSISDK.46.41+1e7378b3",
37
+ "@sphereon/ssi-sdk.contact-manager": "0.34.1-feature.SSISDK.46.41+1e7378b3",
38
+ "@sphereon/ssi-sdk.core": "0.34.1-feature.SSISDK.46.41+1e7378b3",
39
+ "@sphereon/ssi-sdk.credential-store": "0.34.1-feature.SSISDK.46.41+1e7378b3",
40
+ "@sphereon/ssi-sdk.credential-validation": "0.34.1-feature.SSISDK.46.41+1e7378b3",
41
+ "@sphereon/ssi-sdk.data-store": "0.34.1-feature.SSISDK.46.41+1e7378b3",
42
+ "@sphereon/ssi-sdk.issuance-branding": "0.34.1-feature.SSISDK.46.41+1e7378b3",
43
+ "@sphereon/ssi-sdk.mdl-mdoc": "0.34.1-feature.SSISDK.46.41+1e7378b3",
44
+ "@sphereon/ssi-sdk.oidf-client": "0.34.1-feature.SSISDK.46.41+1e7378b3",
45
+ "@sphereon/ssi-sdk.sd-jwt": "0.34.1-feature.SSISDK.46.41+1e7378b3",
46
+ "@sphereon/ssi-sdk.siopv2-oid4vp-common": "0.34.1-feature.SSISDK.46.41+1e7378b3",
47
+ "@sphereon/ssi-sdk.siopv2-oid4vp-op-auth": "0.34.1-feature.SSISDK.46.41+1e7378b3",
48
+ "@sphereon/ssi-sdk.xstate-machine-persistence": "0.34.1-feature.SSISDK.46.41+1e7378b3",
49
+ "@sphereon/ssi-types": "0.34.1-feature.SSISDK.46.41+1e7378b3",
50
50
  "@veramo/core": "4.2.0",
51
51
  "@veramo/data-store": "4.2.0",
52
52
  "@veramo/utils": "4.2.0",
53
53
  "ajv": "^8.17.1",
54
54
  "ajv-formats": "^3.0.1",
55
- "dcql": "1.0.1",
56
55
  "i18n-js": "^3.9.2",
57
56
  "lodash.memoize": "^4.1.2",
58
57
  "uuid": "^9.0.1",
59
58
  "xstate": "^4.38.3"
60
59
  },
61
60
  "devDependencies": {
62
- "@sphereon/oid4vc-common": "0.19.1-feature.SSISDK.45.91",
63
- "@sphereon/ssi-sdk-ext.did-resolver-jwk": "0.34.1-feature.SSISDK.45.94+24a0078a",
61
+ "@sphereon/oid4vc-common": "0.19.1-next.2",
62
+ "@sphereon/ssi-sdk-ext.did-resolver-jwk": "0.34.1-feature.SSISDK.46.41+1e7378b3",
64
63
  "@sphereon/ssi-sdk.siopv2-oid4vp-common": "workspace:*",
65
64
  "@types/i18n-js": "^3.8.9",
66
65
  "@types/lodash.memoize": "^4.1.9",
@@ -90,5 +89,5 @@
90
89
  "OID4VCI",
91
90
  "State Machine"
92
91
  ],
93
- "gitHead": "24a0078a739502cd84e93cc2d4c3938c8854087a"
92
+ "gitHead": "1e7378b3f12474c82c0563d3fd8d73f5452aa410"
94
93
  }
@@ -4,8 +4,8 @@ import {
4
4
  AuthorizationRequestOpts,
5
5
  AuthorizationServerClientOpts,
6
6
  AuthorizationServerOpts,
7
- CredentialConfigurationSupportedJwtVcJsonLdAndLdpVcV1_0_15,
8
- CredentialDefinitionJwtVcJsonLdAndLdpVcV1_0_15,
7
+ CredentialConfigurationSupportedJwtVcJsonLdAndLdpVcV1_0_13,
8
+ CredentialDefinitionJwtVcJsonLdAndLdpVcV1_0_13,
9
9
  CredentialOfferRequestWithBaseUrl,
10
10
  DefaultURISchemes,
11
11
  EndpointMetadataResult,
@@ -30,11 +30,11 @@ import {
30
30
  } from '@sphereon/ssi-sdk-ext.identifier-resolution'
31
31
  import { IJwtService, JwsHeader } from '@sphereon/ssi-sdk-ext.jwt-service'
32
32
  import { signatureAlgorithmFromKey } from '@sphereon/ssi-sdk-ext.key-utils'
33
- import { defaultHasher } from '@sphereon/ssi-sdk.core'
34
33
  import {
35
34
  ConnectionType,
36
35
  CorrelationIdentifierType,
37
36
  CredentialCorrelationType,
37
+ CredentialRole,
38
38
  ensureRawDocument,
39
39
  FindPartyArgs,
40
40
  IBasicCredentialLocaleBranding,
@@ -54,10 +54,10 @@ import {
54
54
  JoseSignatureAlgorithmString,
55
55
  JwtDecodedVerifiableCredential,
56
56
  Loggers,
57
+ OriginalVerifiableCredential,
57
58
  parseDid,
58
59
  SdJwtDecodedVerifiableCredentialPayload,
59
60
  WrappedW3CVerifiableCredential,
60
- CredentialRole,
61
61
  } from '@sphereon/ssi-types'
62
62
  import {
63
63
  CredentialPayload,
@@ -73,19 +73,6 @@ import { asArray, computeEntryHash } from '@veramo/utils'
73
73
  import { decodeJWT } from 'did-jwt'
74
74
  import { v4 as uuidv4 } from 'uuid'
75
75
  import { OID4VCIMachine } from '../machines/oid4vciMachine'
76
- import {
77
- extractCredentialFromResponse,
78
- getBasicIssuerLocaleBranding,
79
- getCredentialBranding,
80
- getCredentialConfigsSupportedMerged,
81
- getIdentifierOpts,
82
- getIssuanceOpts,
83
- mapCredentialToAccept,
84
- selectCredentialLocaleBranding,
85
- startFirstPartApplicationMachine,
86
- verifyCredentialToAccept,
87
- } from '../services/OID4VCIHolderService'
88
- import 'cross-fetch/polyfill'
89
76
  import {
90
77
  AddContactIdentityArgs,
91
78
  AssertValidCredentialsArgs,
@@ -124,6 +111,19 @@ import {
124
111
  VerifyEBSICredentialIssuerArgs,
125
112
  VerifyEBSICredentialIssuerResult,
126
113
  } from '../types/IOID4VCIHolder'
114
+ import {
115
+ getBasicIssuerLocaleBranding,
116
+ getCredentialBranding,
117
+ getCredentialConfigsSupportedMerged,
118
+ getIdentifierOpts,
119
+ getIssuanceOpts,
120
+ mapCredentialToAccept,
121
+ selectCredentialLocaleBranding,
122
+ startFirstPartApplicationMachine,
123
+ verifyCredentialToAccept,
124
+ } from '../services/OID4VCIHolderService'
125
+ import 'cross-fetch/polyfill'
126
+ import { defaultHasher } from '@sphereon/ssi-sdk.core'
127
127
 
128
128
  /**
129
129
  * {@inheritDoc IOID4VCIHolder}
@@ -151,7 +151,7 @@ export function signCallback(
151
151
  context: IAgentContext<IKeyManager & IDIDManager & IResolver & IIdentifierResolution & IJwtService>,
152
152
  nonce?: string,
153
153
  ) {
154
- return async (jwt: Jwt, kid?: string, noIssPayloadUpdate?: boolean) => {
154
+ return async (jwt: Jwt, kid?: string) => {
155
155
  let resolution = await context.agent.identifierManagedGet(identifier)
156
156
  const jwk = jwt.header.jwk ?? (resolution.method === 'jwk' ? resolution.jwk : undefined)
157
157
  if (!resolution.issuer && !jwt.payload.iss) {
@@ -170,7 +170,7 @@ export function signCallback(
170
170
  }
171
171
  return (
172
172
  await context.agent.jwtCreateJwsCompactSignature({
173
- issuer: { ...resolution, noIssPayloadUpdate: noIssPayloadUpdate ?? false },
173
+ issuer: { ...resolution, noIssPayloadUpdate: false },
174
174
  protectedHeader: header,
175
175
  payload,
176
176
  })
@@ -229,7 +229,7 @@ export class OID4VCIHolder implements IAgentPlugin {
229
229
  oid4vciHolderStoreIssuerBranding: this.oid4vciHolderStoreIssuerBranding.bind(this),
230
230
  }
231
231
 
232
- private readonly vcFormatPreferences: Array<string> = ['dc+sd-jwt', 'vc+sd-jwt', 'mso_mdoc', 'jwt_vc_json', 'jwt_vc', 'ldp_vc']
232
+ private readonly vcFormatPreferences: Array<string> = ['vc+sd-jwt', 'mso_mdoc', 'jwt_vc_json', 'jwt_vc', 'ldp_vc']
233
233
  private readonly jsonldCryptographicSuitePreferences: Array<string> = [
234
234
  'Ed25519Signature2018',
235
235
  'EcdsaSecp256k1Signature2019',
@@ -939,8 +939,7 @@ export class OID4VCIHolder implements IAgentPlugin {
939
939
  ? 'credential_accepted_holder_signed'
940
940
  : 'credential_deleted_holder_signed'
941
941
  logger.log(`Subject issuance/signing will be used, with event`, event)
942
-
943
- const issuerVC = extractCredentialFromResponse(mappedCredentialToAccept.credentialToAccept.credentialResponse)
942
+ const issuerVC = mappedCredentialToAccept.credentialToAccept.credentialResponse.credential as OriginalVerifiableCredential
944
943
  const wrappedIssuerVC = CredentialMapper.toWrappedVerifiableCredential(issuerVC, { hasher: this.hasher ?? defaultHasher })
945
944
  console.log(`Wrapped VC: ${wrappedIssuerVC.type}, ${wrappedIssuerVC.format}`)
946
945
  // We will use the subject of the VCI Issuer (the holder, as the issuer of the new credential, so the below is not a mistake!)
@@ -1170,9 +1169,9 @@ export class OID4VCIHolder implements IAgentPlugin {
1170
1169
  return undefined
1171
1170
  }
1172
1171
 
1173
- private getCredentialDefinition(issuanceOpt: IssuanceOpts): CredentialDefinitionJwtVcJsonLdAndLdpVcV1_0_15 | undefined {
1172
+ private getCredentialDefinition(issuanceOpt: IssuanceOpts): CredentialDefinitionJwtVcJsonLdAndLdpVcV1_0_13 | undefined {
1174
1173
  if (issuanceOpt.format == 'ldp_vc' || issuanceOpt.format == 'jwt_vc_json-ld') {
1175
- return (issuanceOpt as CredentialConfigurationSupportedJwtVcJsonLdAndLdpVcV1_0_15).credential_definition
1174
+ return (issuanceOpt as CredentialConfigurationSupportedJwtVcJsonLdAndLdpVcV1_0_13).credential_definition
1176
1175
  }
1177
1176
  return undefined
1178
1177
  }
@@ -1,17 +1,16 @@
1
1
  import { LOG } from '@sphereon/oid4vci-client'
2
2
  import {
3
- AuthorizationChallengeCodeResponse,
4
3
  CredentialConfigurationSupported,
5
- CredentialConfigurationSupportedSdJwtVcV1_0_15,
4
+ CredentialSupportedSdJwtVc,
5
+ CredentialConfigurationSupportedSdJwtVcV1_0_13,
6
6
  CredentialOfferFormatV1_0_11,
7
7
  CredentialResponse,
8
- CredentialResponseV1_0_15,
9
- CredentialSupportedSdJwtVc,
10
8
  getSupportedCredentials,
11
9
  getTypesFromCredentialSupported,
12
10
  getTypesFromObject,
13
11
  MetadataDisplay,
14
12
  OpenId4VCIVersion,
13
+ AuthorizationChallengeCodeResponse,
15
14
  } from '@sphereon/oid4vci-common'
16
15
  import { KeyUse } from '@sphereon/ssi-sdk-ext.did-resolver-jwk'
17
16
  import { getOrCreatePrimaryIdentifier, SupportedDidMethodEnum } from '@sphereon/ssi-sdk-ext.did-utils'
@@ -24,7 +23,6 @@ import {
24
23
  managedIdentifierToJwk,
25
24
  } from '@sphereon/ssi-sdk-ext.identifier-resolution'
26
25
  import { keyTypeFromCryptographicSuite } from '@sphereon/ssi-sdk-ext.key-utils'
27
- import { defaultHasher } from '@sphereon/ssi-sdk.core'
28
26
  import { IBasicCredentialLocaleBranding, IBasicIssuerLocaleBranding } from '@sphereon/ssi-sdk.data-store'
29
27
  import {
30
28
  CredentialMapper,
@@ -42,12 +40,8 @@ import {
42
40
  } from '@sphereon/ssi-types'
43
41
  import { asArray } from '@veramo/utils'
44
42
  import { translate } from '../localization/Localization'
45
- import { FirstPartyMachine } from '../machines/firstPartyMachine'
46
- import { issuerLocaleBrandingFrom, oid4vciGetCredentialBrandingFrom, sdJwtGetCredentialBrandingFrom } from '../mappers/OIDC4VCIBrandingMapper'
47
- import { FirstPartyMachineState, FirstPartyMachineStateTypes } from '../types/FirstPartyMachine'
48
43
  import {
49
44
  DidAgents,
50
- GetBasicIssuerLocaleBrandingArgs,
51
45
  GetCredentialBrandingArgs,
52
46
  GetCredentialConfigsSupportedArgs,
53
47
  GetCredentialConfigsSupportedBySingleTypeOrIdArgs,
@@ -55,17 +49,22 @@ import {
55
49
  GetIssuanceCryptoSuiteArgs,
56
50
  GetIssuanceDidMethodArgs,
57
51
  GetIssuanceOptsArgs,
52
+ GetBasicIssuerLocaleBrandingArgs,
58
53
  GetPreferredCredentialFormatsArgs,
59
54
  IssuanceOpts,
60
55
  MapCredentialToAcceptArgs,
61
56
  MappedCredentialToAccept,
62
57
  OID4VCIHolderEvent,
63
- RequiredContext,
64
58
  SelectAppLocaleBrandingArgs,
65
- StartFirstPartApplicationMachine,
66
59
  VerificationResult,
67
60
  VerifyCredentialToAcceptArgs,
61
+ StartFirstPartApplicationMachine,
62
+ RequiredContext,
68
63
  } from '../types/IOID4VCIHolder'
64
+ import { oid4vciGetCredentialBrandingFrom, sdJwtGetCredentialBrandingFrom, issuerLocaleBrandingFrom } from '../mappers/OIDC4VCIBrandingMapper'
65
+ import { FirstPartyMachine } from '../machines/firstPartyMachine'
66
+ import { FirstPartyMachineState, FirstPartyMachineStateTypes } from '../types/FirstPartyMachine'
67
+ import { defaultHasher } from '@sphereon/ssi-sdk.core'
69
68
 
70
69
  export const getCredentialBranding = async (args: GetCredentialBrandingArgs): Promise<Record<string, Array<IBasicCredentialLocaleBranding>>> => {
71
70
  const { credentialsSupported, context } = args
@@ -73,8 +72,8 @@ export const getCredentialBranding = async (args: GetCredentialBrandingArgs): Pr
73
72
  await Promise.all(
74
73
  Object.entries(credentialsSupported).map(async ([configId, credentialsConfigSupported]): Promise<void> => {
75
74
  let sdJwtTypeMetadata: SdJwtTypeMetadata | undefined
76
- if (credentialsConfigSupported.format === 'dc+sd-jwt') {
77
- const vct = (<CredentialSupportedSdJwtVc | CredentialConfigurationSupportedSdJwtVcV1_0_15>credentialsConfigSupported).vct
75
+ if (credentialsConfigSupported.format === 'vc+sd-jwt') {
76
+ const vct = (<CredentialSupportedSdJwtVc | CredentialConfigurationSupportedSdJwtVcV1_0_13>credentialsConfigSupported).vct
78
77
  if (vct.startsWith('http')) {
79
78
  try {
80
79
  sdJwtTypeMetadata = await context.agent.fetchSdJwtTypeMetadataFromVctUrl({ vct })
@@ -154,7 +153,10 @@ export const selectCredentialLocaleBranding = async (
154
153
  export const verifyCredentialToAccept = async (args: VerifyCredentialToAcceptArgs): Promise<VerificationResult> => {
155
154
  const { mappedCredential, hasher, onVerifyEBSICredentialIssuer, schemaValidation, context } = args
156
155
 
157
- const credential = extractCredentialFromResponse(mappedCredential.credentialToAccept.credentialResponse)
156
+ const credential = mappedCredential.credentialToAccept.credentialResponse.credential as OriginalVerifiableCredential
157
+ if (!credential) {
158
+ return Promise.reject(Error('No credential found in credential response'))
159
+ }
158
160
 
159
161
  const wrappedVC = CredentialMapper.toWrappedVerifiableCredential(credential, { hasher: hasher ?? defaultHasher })
160
162
  if (
@@ -203,7 +205,11 @@ export const verifyCredentialToAccept = async (args: VerifyCredentialToAcceptArg
203
205
  export const mapCredentialToAccept = async (args: MapCredentialToAcceptArgs): Promise<MappedCredentialToAccept> => {
204
206
  const { credentialToAccept, hasher } = args
205
207
 
206
- const verifiableCredential = extractCredentialFromResponse(credentialToAccept.credentialResponse) as W3CVerifiableCredential
208
+ const credentialResponse: CredentialResponse = credentialToAccept.credentialResponse
209
+ const verifiableCredential: W3CVerifiableCredential | undefined = credentialResponse.credential
210
+ if (!verifiableCredential) {
211
+ return Promise.reject(Error('No credential found in credential response'))
212
+ }
207
213
 
208
214
  const wrappedVerifiableCredential: WrappedVerifiableCredential = CredentialMapper.toWrappedVerifiableCredential(
209
215
  verifiableCredential as OriginalVerifiableCredential,
@@ -234,7 +240,6 @@ export const mapCredentialToAccept = async (args: MapCredentialToAcceptArgs): Pr
234
240
  ? uniformVerifiableCredential.decodedPayload.iss
235
241
  : uniformVerifiableCredential.issuer.id
236
242
 
237
- const credentialResponse = credentialToAccept.credentialResponse as CredentialResponseV1_0_15
238
243
  return {
239
244
  correlationId,
240
245
  credentialToAccept,
@@ -245,27 +250,6 @@ export const mapCredentialToAccept = async (args: MapCredentialToAcceptArgs): Pr
245
250
  }
246
251
  }
247
252
 
248
- export const extractCredentialFromResponse = (credentialResponse: CredentialResponse): OriginalVerifiableCredential => {
249
- let credential: OriginalVerifiableCredential | undefined
250
-
251
- if ('credential' in credentialResponse) {
252
- credential = credentialResponse.credential as OriginalVerifiableCredential
253
- } else if (
254
- 'credentials' in credentialResponse &&
255
- credentialResponse.credentials &&
256
- Array.isArray(credentialResponse.credentials) &&
257
- credentialResponse.credentials.length > 0
258
- ) {
259
- credential = credentialResponse.credentials[0].credential as OriginalVerifiableCredential // FIXME SSISDK-13 (no multi-credential support yet)
260
- }
261
-
262
- if (!credential) {
263
- throw new Error('No credential found in credential response')
264
- }
265
-
266
- return credential
267
- }
268
-
269
253
  export const getIdentifierOpts = async (args: GetIdentifierArgs): Promise<ManagedIdentifierResult> => {
270
254
  const { issuanceOpt, context } = args
271
255
  const { identifier: identifierArg } = issuanceOpt
@@ -597,7 +581,6 @@ export const getIssuanceCryptoSuite = async (opts: GetIssuanceCryptoSuiteArgs):
597
581
  case 'jwt_vc_json':
598
582
  case 'jwt_vc':
599
583
  case 'vc+sd-jwt':
600
- case 'dc+sd-jwt':
601
584
  case 'mso_mdoc': {
602
585
  const supportedPreferences: Array<JoseSignatureAlgorithm | JoseSignatureAlgorithmString> = jwtCryptographicSuitePreferences.filter(
603
586
  (suite: JoseSignatureAlgorithm | JoseSignatureAlgorithmString) => signing_algs_supported.includes(suite),
@@ -1,12 +1,11 @@
1
1
  import { BaseActionObject, Interpreter, ResolveTypegenMeta, ServiceMap, State, StateMachine, StatesConfig, TypegenDisabled } from 'xstate'
2
2
  import { OpenID4VCIClientState } from '@sphereon/oid4vci-client'
3
3
  import { DidAuthConfig, Party } from '@sphereon/ssi-sdk.data-store'
4
- import { RPRegistrationMetadataPayload } from '@sphereon/did-auth-siop'
4
+ import { PresentationDefinitionWithLocation, RPRegistrationMetadataPayload } from '@sphereon/did-auth-siop'
5
5
  import { UniqueDigitalCredential } from '@sphereon/ssi-sdk.credential-store'
6
6
  import { AuthorizationChallengeCodeResponse } from '@sphereon/oid4vci-common'
7
7
  import { IIdentifier } from '@veramo/core'
8
8
  import { ErrorDetails, RequiredContext } from './IOID4VCIHolder'
9
- import { DcqlQuery } from 'dcql'
10
9
 
11
10
  export enum FirstPartyMachineStateTypes {
12
11
  sendAuthorizationChallengeRequest = 'sendAuthorizationChallengeRequest',
@@ -150,7 +149,7 @@ export type SiopV2AuthorizationRequestData = {
150
149
  clientIdScheme?: string
151
150
  clientId?: string
152
151
  entityId?: string
153
- dcqlQuery: DcqlQuery
152
+ presentationDefinitions?: PresentationDefinitionWithLocation[]
154
153
  }
155
154
 
156
155
  export type FirstPartyMachineNavigationArgs = {
@@ -7,7 +7,6 @@ import {
7
7
  CredentialConfigurationSupported,
8
8
  CredentialOfferRequestWithBaseUrl,
9
9
  CredentialResponse,
10
- CredentialResponseV1_0_15,
11
10
  CredentialsSupportedDisplay,
12
11
  EndpointMetadataResult,
13
12
  ExperimentalSubjectIssuance,
@@ -378,7 +377,6 @@ export enum OID4VCIMachineGuards {
378
377
  requirePinGuard = 'oid4vciRequirePinGuard',
379
378
  requireAuthorizationGuard = 'oid4vciRequireAuthorizationGuard',
380
379
  noAuthorizationGuard = 'oid4vciNoAuthorizationGuard',
381
- hasNonceEndpointGuard = 'oid4vciHasNonceEndpointGuard ',
382
380
  hasAuthorizationResponse = 'oid4vciHasAuthorizationResponse',
383
381
  hasNoContactIdentityGuard = 'oid4vciHasNoContactIdentityGuard',
384
382
  verificationCodeGuard = 'oid4vciVerificationCodeGuard',
@@ -503,7 +501,7 @@ export type CredentialToAccept = {
503
501
  id?: string
504
502
  types: string[]
505
503
  issuanceOpt: IssuanceOpts
506
- credentialResponse: CredentialResponseV1_0_15 | CredentialResponse
504
+ credentialResponse: CredentialResponse
507
505
  }
508
506
 
509
507
  export type GetCredentialConfigsSupportedArgs = {