@sphereon/ssi-sdk.oid4vci-holder 0.36.1-feature.SSISDK.82.and.SSISDK.70.37 → 0.36.1-next.39
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs +10 -5
- package/dist/index.cjs.map +1 -1
- package/dist/index.js +10 -5
- package/dist/index.js.map +1 -1
- package/package.json +24 -24
- package/src/agent/OID4VCIHolder.ts +2 -3
- package/src/machines/oid4vciMachine.ts +9 -1
- package/src/services/OID4VCIHolderService.ts +1 -1
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@sphereon/ssi-sdk.oid4vci-holder",
|
|
3
|
-
"version": "0.36.1-
|
|
3
|
+
"version": "0.36.1-next.39+f060eb6e",
|
|
4
4
|
"source": "src/index.ts",
|
|
5
5
|
"type": "module",
|
|
6
6
|
"main": "./dist/index.cjs",
|
|
@@ -26,27 +26,27 @@
|
|
|
26
26
|
"build": "tsup --config ../../tsup.config.ts --tsconfig ../../tsconfig.tsup.json"
|
|
27
27
|
},
|
|
28
28
|
"dependencies": {
|
|
29
|
-
"@sphereon/did-auth-siop": "0.20.1-
|
|
29
|
+
"@sphereon/did-auth-siop": "0.20.1-next.3",
|
|
30
30
|
"@sphereon/kmp-mdoc-core": "0.2.0-SNAPSHOT.26",
|
|
31
|
-
"@sphereon/oid4vci-client": "0.20.1-
|
|
32
|
-
"@sphereon/oid4vci-common": "0.20.1-
|
|
33
|
-
"@sphereon/ssi-sdk-ext.did-utils": "0.36.1-
|
|
34
|
-
"@sphereon/ssi-sdk-ext.identifier-resolution": "0.36.1-
|
|
35
|
-
"@sphereon/ssi-sdk-ext.jwt-service": "0.36.1-
|
|
36
|
-
"@sphereon/ssi-sdk-ext.key-utils": "0.36.1-
|
|
37
|
-
"@sphereon/ssi-sdk.contact-manager": "0.36.1-
|
|
38
|
-
"@sphereon/ssi-sdk.core": "0.36.1-
|
|
39
|
-
"@sphereon/ssi-sdk.credential-store": "0.36.1-
|
|
40
|
-
"@sphereon/ssi-sdk.credential-validation": "0.36.1-
|
|
41
|
-
"@sphereon/ssi-sdk.data-store-types": "0.36.1-
|
|
42
|
-
"@sphereon/ssi-sdk.issuance-branding": "0.36.1-
|
|
43
|
-
"@sphereon/ssi-sdk.mdl-mdoc": "0.36.1-
|
|
44
|
-
"@sphereon/ssi-sdk.oidf-client": "0.36.1-
|
|
45
|
-
"@sphereon/ssi-sdk.sd-jwt": "0.36.1-
|
|
46
|
-
"@sphereon/ssi-sdk.siopv2-oid4vp-common": "0.36.1-
|
|
47
|
-
"@sphereon/ssi-sdk.siopv2-oid4vp-op-auth": "0.36.1-
|
|
48
|
-
"@sphereon/ssi-sdk.xstate-machine-persistence": "0.36.1-
|
|
49
|
-
"@sphereon/ssi-types": "0.36.1-
|
|
31
|
+
"@sphereon/oid4vci-client": "0.20.1-next.3",
|
|
32
|
+
"@sphereon/oid4vci-common": "0.20.1-next.3",
|
|
33
|
+
"@sphereon/ssi-sdk-ext.did-utils": "0.36.1-next.39+f060eb6e",
|
|
34
|
+
"@sphereon/ssi-sdk-ext.identifier-resolution": "0.36.1-next.39+f060eb6e",
|
|
35
|
+
"@sphereon/ssi-sdk-ext.jwt-service": "0.36.1-next.39+f060eb6e",
|
|
36
|
+
"@sphereon/ssi-sdk-ext.key-utils": "0.36.1-next.39+f060eb6e",
|
|
37
|
+
"@sphereon/ssi-sdk.contact-manager": "0.36.1-next.39+f060eb6e",
|
|
38
|
+
"@sphereon/ssi-sdk.core": "0.36.1-next.39+f060eb6e",
|
|
39
|
+
"@sphereon/ssi-sdk.credential-store": "0.36.1-next.39+f060eb6e",
|
|
40
|
+
"@sphereon/ssi-sdk.credential-validation": "0.36.1-next.39+f060eb6e",
|
|
41
|
+
"@sphereon/ssi-sdk.data-store-types": "0.36.1-next.39+f060eb6e",
|
|
42
|
+
"@sphereon/ssi-sdk.issuance-branding": "0.36.1-next.39+f060eb6e",
|
|
43
|
+
"@sphereon/ssi-sdk.mdl-mdoc": "0.36.1-next.39+f060eb6e",
|
|
44
|
+
"@sphereon/ssi-sdk.oidf-client": "0.36.1-next.39+f060eb6e",
|
|
45
|
+
"@sphereon/ssi-sdk.sd-jwt": "0.36.1-next.39+f060eb6e",
|
|
46
|
+
"@sphereon/ssi-sdk.siopv2-oid4vp-common": "0.36.1-next.39+f060eb6e",
|
|
47
|
+
"@sphereon/ssi-sdk.siopv2-oid4vp-op-auth": "0.36.1-next.39+f060eb6e",
|
|
48
|
+
"@sphereon/ssi-sdk.xstate-machine-persistence": "0.36.1-next.39+f060eb6e",
|
|
49
|
+
"@sphereon/ssi-types": "0.36.1-next.39+f060eb6e",
|
|
50
50
|
"@veramo/core": "4.2.0",
|
|
51
51
|
"@veramo/data-store": "4.2.0",
|
|
52
52
|
"@veramo/utils": "4.2.0",
|
|
@@ -59,8 +59,8 @@
|
|
|
59
59
|
"xstate": "^4.38.3"
|
|
60
60
|
},
|
|
61
61
|
"devDependencies": {
|
|
62
|
-
"@sphereon/oid4vc-common": "0.20.1-
|
|
63
|
-
"@sphereon/ssi-sdk-ext.did-resolver-jwk": "0.36.1-
|
|
62
|
+
"@sphereon/oid4vc-common": "0.20.1-feat.SSISDK.83.1",
|
|
63
|
+
"@sphereon/ssi-sdk-ext.did-resolver-jwk": "0.36.1-next.39+f060eb6e",
|
|
64
64
|
"@sphereon/ssi-sdk.siopv2-oid4vp-common": "workspace:*",
|
|
65
65
|
"@types/i18n-js": "^3.8.9",
|
|
66
66
|
"@types/lodash.memoize": "^4.1.9",
|
|
@@ -90,5 +90,5 @@
|
|
|
90
90
|
"OID4VCI",
|
|
91
91
|
"State Machine"
|
|
92
92
|
],
|
|
93
|
-
"gitHead": "
|
|
93
|
+
"gitHead": "f060eb6e9930932f91cfbaa7535465d403a6c63c"
|
|
94
94
|
}
|
|
@@ -494,7 +494,7 @@ export class OID4VCIHolder implements IAgentPlugin {
|
|
|
494
494
|
if (!clientId) {
|
|
495
495
|
return Promise.reject(Error(`Missing client id in contact's connectionConfig`))
|
|
496
496
|
}
|
|
497
|
-
const client = await
|
|
497
|
+
const client = await OpenID4VCIClient.fromState({ state: openID4VCIClientState })
|
|
498
498
|
const authorizationCodeURL = await client.createAuthorizationRequestUrl({
|
|
499
499
|
authorizationRequest: {
|
|
500
500
|
clientId: clientId,
|
|
@@ -506,7 +506,7 @@ export class OID4VCIHolder implements IAgentPlugin {
|
|
|
506
506
|
return {
|
|
507
507
|
authorizationCodeURL,
|
|
508
508
|
// Needed, because the above createAuthorizationRequestUrl manipulates the state, adding pkce opts to the state
|
|
509
|
-
oid4vciClientState: JSON.parse(await client.exportState())
|
|
509
|
+
oid4vciClientState: JSON.parse(await client.exportState())
|
|
510
510
|
}
|
|
511
511
|
}
|
|
512
512
|
|
|
@@ -741,7 +741,6 @@ export class OID4VCIHolder implements IAgentPlugin {
|
|
|
741
741
|
format: issuanceOpt.format,
|
|
742
742
|
// TODO: We need to update the machine and add notifications support for actual deferred credentials instead of just waiting/retrying
|
|
743
743
|
deferredCredentialAwait: true,
|
|
744
|
-
...(issuanceOpt.id && typeof issuanceOpt.id === 'string' ? { credentialConfigurationId: issuanceOpt.id } : undefined),
|
|
745
744
|
...(!jwk && { kid }), // vci client either wants a jwk or kid. If we have used the jwk method do not provide the kid
|
|
746
745
|
jwk,
|
|
747
746
|
alg,
|
|
@@ -348,7 +348,7 @@ const createOID4VCIMachine = (opts?: CreateOID4VCIMachineOpts): OID4VCIStateMach
|
|
|
348
348
|
cond: OID4VCIMachineGuards.isFirstPartyApplication,
|
|
349
349
|
},
|
|
350
350
|
{
|
|
351
|
-
target: OID4VCIMachineStates.
|
|
351
|
+
target: OID4VCIMachineStates.initiateAuthorizationRequest,
|
|
352
352
|
cond: OID4VCIMachineGuards.requireAuthorizationGuard,
|
|
353
353
|
},
|
|
354
354
|
{
|
|
@@ -445,6 +445,10 @@ const createOID4VCIMachine = (opts?: CreateOID4VCIMachineOpts): OID4VCIStateMach
|
|
|
445
445
|
target: OID4VCIMachineStates.prepareAuthorizationRequest,
|
|
446
446
|
cond: OID4VCIMachineGuards.requireAuthorizationGuard,
|
|
447
447
|
},
|
|
448
|
+
{
|
|
449
|
+
target: OID4VCIMachineStates.initiateAuthorizationRequest,
|
|
450
|
+
cond: OID4VCIMachineGuards.requireAuthorizationGuard,
|
|
451
|
+
},
|
|
448
452
|
{
|
|
449
453
|
target: OID4VCIMachineStates.verifyPin,
|
|
450
454
|
cond: OID4VCIMachineGuards.requirePinGuard,
|
|
@@ -521,6 +525,10 @@ const createOID4VCIMachine = (opts?: CreateOID4VCIMachineOpts): OID4VCIStateMach
|
|
|
521
525
|
target: OID4VCIMachineStates.verifyPin,
|
|
522
526
|
cond: OID4VCIMachineGuards.requirePinGuard,
|
|
523
527
|
},
|
|
528
|
+
{
|
|
529
|
+
target: OID4VCIMachineStates.prepareAuthorizationRequest,
|
|
530
|
+
cond: OID4VCIMachineGuards.requireAuthorizationGuard,
|
|
531
|
+
},
|
|
524
532
|
{
|
|
525
533
|
target: OID4VCIMachineStates.getCredentials,
|
|
526
534
|
},
|
|
@@ -214,7 +214,7 @@ export const mapCredentialToAccept = async (args: MapCredentialToAcceptArgs): Pr
|
|
|
214
214
|
if (!hasher) {
|
|
215
215
|
return Promise.reject('a hasher is required for encoded SD-JWT credentials')
|
|
216
216
|
}
|
|
217
|
-
const asyncHasher: Hasher = (data: string | ArrayBuffer
|
|
217
|
+
const asyncHasher: Hasher = (data: string | ArrayBuffer, algorithm: string) => Promise.resolve(hasher(data, algorithm))
|
|
218
218
|
const decodedSdJwt = await CredentialMapper.decodeSdJwtVcAsync(wrappedVerifiableCredential.credential, asyncHasher)
|
|
219
219
|
uniformVerifiableCredential = sdJwtDecodedCredentialToUniformCredential(<SdJwtDecodedVerifiableCredential>decodedSdJwt)
|
|
220
220
|
} else if (CredentialMapper.isMsoMdocDecodedCredential(wrappedVerifiableCredential.credential)) {
|