@sphereon/ssi-sdk.oid4vci-holder 0.34.1-feature.SSISDK.78.280 → 0.34.1-feature.SSISDK.78.306

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@sphereon/ssi-sdk.oid4vci-holder",
3
- "version": "0.34.1-feature.SSISDK.78.280+c08a3255",
3
+ "version": "0.34.1-feature.SSISDK.78.306+9aff176a",
4
4
  "source": "src/index.ts",
5
5
  "type": "module",
6
6
  "main": "./dist/index.cjs",
@@ -30,23 +30,23 @@
30
30
  "@sphereon/kmp-mdoc-core": "0.2.0-SNAPSHOT.26",
31
31
  "@sphereon/oid4vci-client": "0.19.1-next.220",
32
32
  "@sphereon/oid4vci-common": "0.19.1-next.220",
33
- "@sphereon/ssi-sdk-ext.did-utils": "0.34.1-feature.SSISDK.78.280+c08a3255",
34
- "@sphereon/ssi-sdk-ext.identifier-resolution": "0.34.1-feature.SSISDK.78.280+c08a3255",
35
- "@sphereon/ssi-sdk-ext.jwt-service": "0.34.1-feature.SSISDK.78.280+c08a3255",
36
- "@sphereon/ssi-sdk-ext.key-utils": "0.34.1-feature.SSISDK.78.280+c08a3255",
37
- "@sphereon/ssi-sdk.contact-manager": "0.34.1-feature.SSISDK.78.280+c08a3255",
38
- "@sphereon/ssi-sdk.core": "0.34.1-feature.SSISDK.78.280+c08a3255",
39
- "@sphereon/ssi-sdk.credential-store": "0.34.1-feature.SSISDK.78.280+c08a3255",
40
- "@sphereon/ssi-sdk.credential-validation": "0.34.1-feature.SSISDK.78.280+c08a3255",
41
- "@sphereon/ssi-sdk.data-store-types": "0.34.1-feature.SSISDK.78.280+c08a3255",
42
- "@sphereon/ssi-sdk.issuance-branding": "0.34.1-feature.SSISDK.78.280+c08a3255",
43
- "@sphereon/ssi-sdk.mdl-mdoc": "0.34.1-feature.SSISDK.78.280+c08a3255",
44
- "@sphereon/ssi-sdk.oidf-client": "0.34.1-feature.SSISDK.78.280+c08a3255",
45
- "@sphereon/ssi-sdk.sd-jwt": "0.34.1-feature.SSISDK.78.280+c08a3255",
46
- "@sphereon/ssi-sdk.siopv2-oid4vp-common": "0.34.1-feature.SSISDK.78.280+c08a3255",
47
- "@sphereon/ssi-sdk.siopv2-oid4vp-op-auth": "0.34.1-feature.SSISDK.78.280+c08a3255",
48
- "@sphereon/ssi-sdk.xstate-machine-persistence": "0.34.1-feature.SSISDK.78.280+c08a3255",
49
- "@sphereon/ssi-types": "0.34.1-feature.SSISDK.78.280+c08a3255",
33
+ "@sphereon/ssi-sdk-ext.did-utils": "0.34.1-feature.SSISDK.78.306+9aff176a",
34
+ "@sphereon/ssi-sdk-ext.identifier-resolution": "0.34.1-feature.SSISDK.78.306+9aff176a",
35
+ "@sphereon/ssi-sdk-ext.jwt-service": "0.34.1-feature.SSISDK.78.306+9aff176a",
36
+ "@sphereon/ssi-sdk-ext.key-utils": "0.34.1-feature.SSISDK.78.306+9aff176a",
37
+ "@sphereon/ssi-sdk.contact-manager": "0.34.1-feature.SSISDK.78.306+9aff176a",
38
+ "@sphereon/ssi-sdk.core": "0.34.1-feature.SSISDK.78.306+9aff176a",
39
+ "@sphereon/ssi-sdk.credential-store": "0.34.1-feature.SSISDK.78.306+9aff176a",
40
+ "@sphereon/ssi-sdk.credential-validation": "0.34.1-feature.SSISDK.78.306+9aff176a",
41
+ "@sphereon/ssi-sdk.data-store-types": "0.34.1-feature.SSISDK.78.306+9aff176a",
42
+ "@sphereon/ssi-sdk.issuance-branding": "0.34.1-feature.SSISDK.78.306+9aff176a",
43
+ "@sphereon/ssi-sdk.mdl-mdoc": "0.34.1-feature.SSISDK.78.306+9aff176a",
44
+ "@sphereon/ssi-sdk.oidf-client": "0.34.1-feature.SSISDK.78.306+9aff176a",
45
+ "@sphereon/ssi-sdk.sd-jwt": "0.34.1-feature.SSISDK.78.306+9aff176a",
46
+ "@sphereon/ssi-sdk.siopv2-oid4vp-common": "0.34.1-feature.SSISDK.78.306+9aff176a",
47
+ "@sphereon/ssi-sdk.siopv2-oid4vp-op-auth": "0.34.1-feature.SSISDK.78.306+9aff176a",
48
+ "@sphereon/ssi-sdk.xstate-machine-persistence": "0.34.1-feature.SSISDK.78.306+9aff176a",
49
+ "@sphereon/ssi-types": "0.34.1-feature.SSISDK.78.306+9aff176a",
50
50
  "@veramo/core": "4.2.0",
51
51
  "@veramo/data-store": "4.2.0",
52
52
  "@veramo/utils": "4.2.0",
@@ -60,7 +60,7 @@
60
60
  },
61
61
  "devDependencies": {
62
62
  "@sphereon/oid4vc-common": "0.19.1-next.220",
63
- "@sphereon/ssi-sdk-ext.did-resolver-jwk": "0.34.1-feature.SSISDK.78.280+c08a3255",
63
+ "@sphereon/ssi-sdk-ext.did-resolver-jwk": "0.34.1-feature.SSISDK.78.306+9aff176a",
64
64
  "@sphereon/ssi-sdk.siopv2-oid4vp-common": "workspace:*",
65
65
  "@types/i18n-js": "^3.8.9",
66
66
  "@types/lodash.memoize": "^4.1.9",
@@ -90,5 +90,5 @@
90
90
  "OID4VCI",
91
91
  "State Machine"
92
92
  ],
93
- "gitHead": "c08a32550479235265b02f17e9554f541836c635"
93
+ "gitHead": "9aff176afa613d6f69fb1ff33d4f6c8c7b811ffd"
94
94
  }
@@ -99,7 +99,7 @@ const oid4vciRequireAuthorizationGuard = (ctx: OID4VCIMachineContext, _event: OI
99
99
  throw Error('Missing openID4VCI client state in context')
100
100
  }
101
101
 
102
- if (openID4VCIClientState.authorizationRequestOpts) {
102
+ if (openID4VCIClientState.authorizationURL && openID4VCIClientState.authorizationRequestOpts) {
103
103
  // We have authz options or there is not credential offer to begin with.
104
104
  // We require authz as long as we do not have the authz code response
105
105
  return !ctx.openID4VCIClientState?.authorizationCodeResponse
@@ -440,6 +440,10 @@ const createOID4VCIMachine = (opts?: CreateOID4VCIMachineOpts): OID4VCIStateMach
440
440
  target: OID4VCIMachineStates.startFirstPartApplicationFlow,
441
441
  cond: OID4VCIMachineGuards.isFirstPartyApplication,
442
442
  },
443
+ {
444
+ target: OID4VCIMachineStates.prepareAuthorizationRequest,
445
+ cond: OID4VCIMachineGuards.requireAuthorizationGuard,
446
+ },
443
447
  {
444
448
  target: OID4VCIMachineStates.initiateAuthorizationRequest,
445
449
  cond: OID4VCIMachineGuards.requireAuthorizationGuard,
@@ -512,6 +516,10 @@ const createOID4VCIMachine = (opts?: CreateOID4VCIMachineOpts): OID4VCIStateMach
512
516
  target: OID4VCIMachineStates.startFirstPartApplicationFlow,
513
517
  cond: OID4VCIMachineGuards.isFirstPartyApplication,
514
518
  },
519
+ {
520
+ target: OID4VCIMachineStates.prepareAuthorizationRequest,
521
+ cond: OID4VCIMachineGuards.requireAuthorizationGuard,
522
+ },
515
523
  {
516
524
  target: OID4VCIMachineStates.verifyPin,
517
525
  cond: OID4VCIMachineGuards.requirePinGuard,
@@ -209,9 +209,7 @@ export const mapCredentialToAccept = async (args: MapCredentialToAcceptArgs): Pr
209
209
  )
210
210
  let uniformVerifiableCredential: IVerifiableCredential
211
211
  if (CredentialMapper.isSdJwtDecodedCredential(wrappedVerifiableCredential.credential)) {
212
- uniformVerifiableCredential = await sdJwtDecodedCredentialToUniformCredential(
213
- <SdJwtDecodedVerifiableCredential>wrappedVerifiableCredential.credential,
214
- )
212
+ uniformVerifiableCredential = sdJwtDecodedCredentialToUniformCredential(<SdJwtDecodedVerifiableCredential>wrappedVerifiableCredential.credential)
215
213
  } else if (CredentialMapper.isSdJwtEncoded(wrappedVerifiableCredential.credential)) {
216
214
  if (!hasher) {
217
215
  return Promise.reject('a hasher is required for encoded SD-JWT credentials')