@sphereon/ssi-sdk.oid4vci-holder 0.36.1-feature.SSISDK.82.and.SSISDK.70.37 → 0.36.1-next.39

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@sphereon/ssi-sdk.oid4vci-holder",
3
- "version": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
3
+ "version": "0.36.1-next.39+f060eb6e",
4
4
  "source": "src/index.ts",
5
5
  "type": "module",
6
6
  "main": "./dist/index.cjs",
@@ -26,27 +26,27 @@
26
26
  "build": "tsup --config ../../tsup.config.ts --tsconfig ../../tsconfig.tsup.json"
27
27
  },
28
28
  "dependencies": {
29
- "@sphereon/did-auth-siop": "0.20.1-fix.1",
29
+ "@sphereon/did-auth-siop": "0.20.1-next.3",
30
30
  "@sphereon/kmp-mdoc-core": "0.2.0-SNAPSHOT.26",
31
- "@sphereon/oid4vci-client": "0.20.1-fix.1",
32
- "@sphereon/oid4vci-common": "0.20.1-fix.1",
33
- "@sphereon/ssi-sdk-ext.did-utils": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
34
- "@sphereon/ssi-sdk-ext.identifier-resolution": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
35
- "@sphereon/ssi-sdk-ext.jwt-service": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
36
- "@sphereon/ssi-sdk-ext.key-utils": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
37
- "@sphereon/ssi-sdk.contact-manager": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
38
- "@sphereon/ssi-sdk.core": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
39
- "@sphereon/ssi-sdk.credential-store": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
40
- "@sphereon/ssi-sdk.credential-validation": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
41
- "@sphereon/ssi-sdk.data-store-types": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
42
- "@sphereon/ssi-sdk.issuance-branding": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
43
- "@sphereon/ssi-sdk.mdl-mdoc": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
44
- "@sphereon/ssi-sdk.oidf-client": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
45
- "@sphereon/ssi-sdk.sd-jwt": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
46
- "@sphereon/ssi-sdk.siopv2-oid4vp-common": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
47
- "@sphereon/ssi-sdk.siopv2-oid4vp-op-auth": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
48
- "@sphereon/ssi-sdk.xstate-machine-persistence": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
49
- "@sphereon/ssi-types": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
31
+ "@sphereon/oid4vci-client": "0.20.1-next.3",
32
+ "@sphereon/oid4vci-common": "0.20.1-next.3",
33
+ "@sphereon/ssi-sdk-ext.did-utils": "0.36.1-next.39+f060eb6e",
34
+ "@sphereon/ssi-sdk-ext.identifier-resolution": "0.36.1-next.39+f060eb6e",
35
+ "@sphereon/ssi-sdk-ext.jwt-service": "0.36.1-next.39+f060eb6e",
36
+ "@sphereon/ssi-sdk-ext.key-utils": "0.36.1-next.39+f060eb6e",
37
+ "@sphereon/ssi-sdk.contact-manager": "0.36.1-next.39+f060eb6e",
38
+ "@sphereon/ssi-sdk.core": "0.36.1-next.39+f060eb6e",
39
+ "@sphereon/ssi-sdk.credential-store": "0.36.1-next.39+f060eb6e",
40
+ "@sphereon/ssi-sdk.credential-validation": "0.36.1-next.39+f060eb6e",
41
+ "@sphereon/ssi-sdk.data-store-types": "0.36.1-next.39+f060eb6e",
42
+ "@sphereon/ssi-sdk.issuance-branding": "0.36.1-next.39+f060eb6e",
43
+ "@sphereon/ssi-sdk.mdl-mdoc": "0.36.1-next.39+f060eb6e",
44
+ "@sphereon/ssi-sdk.oidf-client": "0.36.1-next.39+f060eb6e",
45
+ "@sphereon/ssi-sdk.sd-jwt": "0.36.1-next.39+f060eb6e",
46
+ "@sphereon/ssi-sdk.siopv2-oid4vp-common": "0.36.1-next.39+f060eb6e",
47
+ "@sphereon/ssi-sdk.siopv2-oid4vp-op-auth": "0.36.1-next.39+f060eb6e",
48
+ "@sphereon/ssi-sdk.xstate-machine-persistence": "0.36.1-next.39+f060eb6e",
49
+ "@sphereon/ssi-types": "0.36.1-next.39+f060eb6e",
50
50
  "@veramo/core": "4.2.0",
51
51
  "@veramo/data-store": "4.2.0",
52
52
  "@veramo/utils": "4.2.0",
@@ -59,8 +59,8 @@
59
59
  "xstate": "^4.38.3"
60
60
  },
61
61
  "devDependencies": {
62
- "@sphereon/oid4vc-common": "0.20.1-fix.1",
63
- "@sphereon/ssi-sdk-ext.did-resolver-jwk": "0.36.1-feature.SSISDK.82.and.SSISDK.70.37+4f1096f2",
62
+ "@sphereon/oid4vc-common": "0.20.1-feat.SSISDK.83.1",
63
+ "@sphereon/ssi-sdk-ext.did-resolver-jwk": "0.36.1-next.39+f060eb6e",
64
64
  "@sphereon/ssi-sdk.siopv2-oid4vp-common": "workspace:*",
65
65
  "@types/i18n-js": "^3.8.9",
66
66
  "@types/lodash.memoize": "^4.1.9",
@@ -90,5 +90,5 @@
90
90
  "OID4VCI",
91
91
  "State Machine"
92
92
  ],
93
- "gitHead": "4f1096f2d7ce22bdc20319a780386979393bc2ef"
93
+ "gitHead": "f060eb6e9930932f91cfbaa7535465d403a6c63c"
94
94
  }
@@ -494,7 +494,7 @@ export class OID4VCIHolder implements IAgentPlugin {
494
494
  if (!clientId) {
495
495
  return Promise.reject(Error(`Missing client id in contact's connectionConfig`))
496
496
  }
497
- const client = await OpenID4VCIClientV1_0_15.fromState({ state: openID4VCIClientState })
497
+ const client = await OpenID4VCIClient.fromState({ state: openID4VCIClientState })
498
498
  const authorizationCodeURL = await client.createAuthorizationRequestUrl({
499
499
  authorizationRequest: {
500
500
  clientId: clientId,
@@ -506,7 +506,7 @@ export class OID4VCIHolder implements IAgentPlugin {
506
506
  return {
507
507
  authorizationCodeURL,
508
508
  // Needed, because the above createAuthorizationRequestUrl manipulates the state, adding pkce opts to the state
509
- oid4vciClientState: JSON.parse(await client.exportState()),
509
+ oid4vciClientState: JSON.parse(await client.exportState())
510
510
  }
511
511
  }
512
512
 
@@ -741,7 +741,6 @@ export class OID4VCIHolder implements IAgentPlugin {
741
741
  format: issuanceOpt.format,
742
742
  // TODO: We need to update the machine and add notifications support for actual deferred credentials instead of just waiting/retrying
743
743
  deferredCredentialAwait: true,
744
- ...(issuanceOpt.id && typeof issuanceOpt.id === 'string' ? { credentialConfigurationId: issuanceOpt.id } : undefined),
745
744
  ...(!jwk && { kid }), // vci client either wants a jwk or kid. If we have used the jwk method do not provide the kid
746
745
  jwk,
747
746
  alg,
@@ -348,7 +348,7 @@ const createOID4VCIMachine = (opts?: CreateOID4VCIMachineOpts): OID4VCIStateMach
348
348
  cond: OID4VCIMachineGuards.isFirstPartyApplication,
349
349
  },
350
350
  {
351
- target: OID4VCIMachineStates.prepareAuthorizationRequest,
351
+ target: OID4VCIMachineStates.initiateAuthorizationRequest,
352
352
  cond: OID4VCIMachineGuards.requireAuthorizationGuard,
353
353
  },
354
354
  {
@@ -445,6 +445,10 @@ const createOID4VCIMachine = (opts?: CreateOID4VCIMachineOpts): OID4VCIStateMach
445
445
  target: OID4VCIMachineStates.prepareAuthorizationRequest,
446
446
  cond: OID4VCIMachineGuards.requireAuthorizationGuard,
447
447
  },
448
+ {
449
+ target: OID4VCIMachineStates.initiateAuthorizationRequest,
450
+ cond: OID4VCIMachineGuards.requireAuthorizationGuard,
451
+ },
448
452
  {
449
453
  target: OID4VCIMachineStates.verifyPin,
450
454
  cond: OID4VCIMachineGuards.requirePinGuard,
@@ -521,6 +525,10 @@ const createOID4VCIMachine = (opts?: CreateOID4VCIMachineOpts): OID4VCIStateMach
521
525
  target: OID4VCIMachineStates.verifyPin,
522
526
  cond: OID4VCIMachineGuards.requirePinGuard,
523
527
  },
528
+ {
529
+ target: OID4VCIMachineStates.prepareAuthorizationRequest,
530
+ cond: OID4VCIMachineGuards.requireAuthorizationGuard,
531
+ },
524
532
  {
525
533
  target: OID4VCIMachineStates.getCredentials,
526
534
  },
@@ -214,7 +214,7 @@ export const mapCredentialToAccept = async (args: MapCredentialToAcceptArgs): Pr
214
214
  if (!hasher) {
215
215
  return Promise.reject('a hasher is required for encoded SD-JWT credentials')
216
216
  }
217
- const asyncHasher: Hasher = (data: string | ArrayBuffer | SharedArrayBuffer, algorithm: string) => Promise.resolve(hasher(data, algorithm))
217
+ const asyncHasher: Hasher = (data: string | ArrayBuffer, algorithm: string) => Promise.resolve(hasher(data, algorithm))
218
218
  const decodedSdJwt = await CredentialMapper.decodeSdJwtVcAsync(wrappedVerifiableCredential.credential, asyncHasher)
219
219
  uniformVerifiableCredential = sdJwtDecodedCredentialToUniformCredential(<SdJwtDecodedVerifiableCredential>decodedSdJwt)
220
220
  } else if (CredentialMapper.isMsoMdocDecodedCredential(wrappedVerifiableCredential.credential)) {