@sphereon/ssi-sdk.oidf-client 0.30.2-fix.280 → 0.30.2-fix.363
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/agent/OIDFClient.d.ts +6 -5
- package/dist/agent/OIDFClient.d.ts.map +1 -1
- package/dist/agent/OIDFClient.js +36 -56
- package/dist/agent/OIDFClient.js.map +1 -1
- package/dist/ssi-sdk.oidf-client.d.ts +17 -21
- package/dist/types/IOIDFClient.d.ts +8 -12
- package/dist/types/IOIDFClient.d.ts.map +1 -1
- package/package.json +10 -12
- package/plugin.schema.json +3 -3080
- package/src/agent/OIDFClient.ts +53 -60
- package/src/types/IOIDFClient.ts +8 -18
|
@@ -2,13 +2,14 @@ import { IAgentPlugin } from '@veramo/core';
|
|
|
2
2
|
import { IOIDFClient, OIDFClientArgs } from '../types/IOIDFClient';
|
|
3
3
|
export declare const oidfClientMethods: Array<string>;
|
|
4
4
|
export declare class OIDFClient implements IAgentPlugin {
|
|
5
|
-
private
|
|
5
|
+
private readonly fetchServiceCallback?;
|
|
6
|
+
private readonly cryptoServiceCallback?;
|
|
7
|
+
readonly methods: IOIDFClient;
|
|
6
8
|
readonly schema: any;
|
|
7
9
|
constructor(args?: OIDFClientArgs);
|
|
8
|
-
|
|
10
|
+
private defaultCryptoJSImpl;
|
|
11
|
+
private defaultFetchJSImpl;
|
|
12
|
+
private getOIDFClient;
|
|
9
13
|
private resolveTrustChain;
|
|
10
|
-
private checkAndSetDefaultCryptoService;
|
|
11
|
-
private signJwt;
|
|
12
|
-
private verifyJwt;
|
|
13
14
|
}
|
|
14
15
|
//# sourceMappingURL=OIDFClient.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"OIDFClient.d.ts","sourceRoot":"","sources":["../../src/agent/OIDFClient.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"OIDFClient.d.ts","sourceRoot":"","sources":["../../src/agent/OIDFClient.ts"],"names":[],"mappings":"AAEA,OAAO,EAAC,YAAY,EAAC,MAAM,cAAc,CAAA;AAGzC,OAAO,EACL,WAAW,EACX,cAAc,EAGf,MAAM,sBAAsB,CAAA;AAE7B,eAAO,MAAM,iBAAiB,EAAE,KAAK,CAAC,MAAM,CAAyB,CAAA;AAErE,qBAAa,UAAW,YAAW,YAAY;IAC7C,OAAO,CAAC,QAAQ,CAAC,oBAAoB,CAAC,CAAe;IACrD,OAAO,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAgB;IACvD,QAAQ,CAAC,OAAO,EAAE,WAAW,CAE5B;IACD,QAAQ,CAAC,MAAM,MAAqB;gBAExB,IAAI,CAAC,EAAE,cAAc;IAOjC,OAAO,CAAC,mBAAmB;IAS3B,OAAO,CAAC,kBAAkB;IAqB1B,OAAO,CAAC,aAAa;YAOP,iBAAiB;CAOhC"}
|
package/dist/agent/OIDFClient.js
CHANGED
|
@@ -11,74 +11,54 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
|
|
|
11
11
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
12
|
exports.OIDFClient = exports.oidfClientMethods = void 0;
|
|
13
13
|
const openid_federation_client_1 = require("@sphereon/openid-federation-client");
|
|
14
|
-
const
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
var DefaultTrustChainJSImpl = openid_federation_client_1.com.sphereon.oid.fed.client.trustchain.DefaultTrustChainJSImpl;
|
|
18
|
-
var DefaultCallbacks = openid_federation_client_1.com.sphereon.oid.fed.client.service.DefaultCallbacks;
|
|
19
|
-
exports.oidfClientMethods = ['resolveTrustChain', 'signJwt', 'verifyJwt'];
|
|
14
|
+
const cross_fetch_1 = require("cross-fetch");
|
|
15
|
+
const __1 = require("../");
|
|
16
|
+
exports.oidfClientMethods = ['resolveTrustChain'];
|
|
20
17
|
class OIDFClient {
|
|
21
18
|
constructor(args) {
|
|
22
|
-
this.schema = index_1.schema.IOIDFClient;
|
|
23
19
|
this.methods = {
|
|
24
20
|
resolveTrustChain: this.resolveTrustChain.bind(this),
|
|
25
|
-
signJwt: this.signJwt.bind(this),
|
|
26
|
-
verifyJwt: this.verifyJwt.bind(this),
|
|
27
21
|
};
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
// Depends on the crypto and fetch services, thus it must be the last one to be set
|
|
33
|
-
DefaultCallbacks.setTrustChainServiceDefault(new DefaultTrustChainJSImpl());
|
|
34
|
-
this.oidfClient = new FederationClient();
|
|
35
|
-
}
|
|
22
|
+
this.schema = __1.schema.IOIDFClient;
|
|
23
|
+
const { fetchServiceCallback, cryptoServiceCallback } = Object.assign({}, args);
|
|
24
|
+
this.fetchServiceCallback = fetchServiceCallback;
|
|
25
|
+
this.cryptoServiceCallback = cryptoServiceCallback;
|
|
36
26
|
}
|
|
37
|
-
|
|
38
|
-
return
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
}
|
|
27
|
+
defaultCryptoJSImpl(context) {
|
|
28
|
+
return {
|
|
29
|
+
verify: (jwt, key) => __awaiter(this, void 0, void 0, function* () {
|
|
30
|
+
const verification = yield context.agent.jwtVerifyJwsSignature({ jws: jwt, jwk: key });
|
|
31
|
+
return !verification.error;
|
|
32
|
+
})
|
|
33
|
+
};
|
|
44
34
|
}
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
console.error(`Error verifying the JWT: ${e.message}`);
|
|
61
|
-
return Promise.reject(e);
|
|
62
|
-
}
|
|
63
|
-
}),
|
|
35
|
+
defaultFetchJSImpl(context) {
|
|
36
|
+
return {
|
|
37
|
+
fetchStatement(endpoint) {
|
|
38
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
39
|
+
const requestInfo = new cross_fetch_1.Request(endpoint, {
|
|
40
|
+
method: 'GET'
|
|
41
|
+
});
|
|
42
|
+
const response = yield context.agent.resourceResolve({
|
|
43
|
+
input: requestInfo,
|
|
44
|
+
resourceType: 'application/entity-statement+jwt',
|
|
45
|
+
});
|
|
46
|
+
if (response.status != 200) {
|
|
47
|
+
throw new Error(`Failed to fetch statement from ${endpoint}`);
|
|
48
|
+
}
|
|
49
|
+
return yield response.text();
|
|
64
50
|
});
|
|
65
|
-
DefaultCallbacks.setFetchServiceDefault(new DefaultFetchJSImpl());
|
|
66
|
-
DefaultCallbacks.setTrustChainServiceDefault(new DefaultTrustChainJSImpl());
|
|
67
|
-
this.oidfClient = new FederationClient();
|
|
68
|
-
}
|
|
69
|
-
catch (error) {
|
|
70
|
-
throw Error(`Could not initialize the federation client: ${error.message}`);
|
|
71
51
|
}
|
|
72
|
-
}
|
|
52
|
+
};
|
|
73
53
|
}
|
|
74
|
-
|
|
75
|
-
return
|
|
76
|
-
return yield context.agent.jwtCreateJwsCompactSignature(args);
|
|
77
|
-
});
|
|
54
|
+
getOIDFClient(context) {
|
|
55
|
+
return new openid_federation_client_1.FederationClient(this.fetchServiceCallback || this.defaultFetchJSImpl(context), this.cryptoServiceCallback || this.defaultCryptoJSImpl(context));
|
|
78
56
|
}
|
|
79
|
-
|
|
57
|
+
resolveTrustChain(args, context) {
|
|
80
58
|
return __awaiter(this, void 0, void 0, function* () {
|
|
81
|
-
|
|
59
|
+
const { entityIdentifier, trustAnchors } = args;
|
|
60
|
+
const oidfClient = this.getOIDFClient(context);
|
|
61
|
+
return yield oidfClient.resolveTrustChain(entityIdentifier, trustAnchors, 10);
|
|
82
62
|
});
|
|
83
63
|
}
|
|
84
64
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"OIDFClient.js","sourceRoot":"","sources":["../../src/agent/OIDFClient.ts"],"names":[],"mappings":";;;;;;;;;;;;
|
|
1
|
+
{"version":3,"file":"OIDFClient.js","sourceRoot":"","sources":["../../src/agent/OIDFClient.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,iFAA6H;AAG7H,6CAAoC;AACpC,2BAA0B;AAQb,QAAA,iBAAiB,GAAkB,CAAC,mBAAmB,CAAC,CAAA;AAErE,MAAa,UAAU;IAQrB,YAAY,IAAqB;QALxB,YAAO,GAAgB;YAC9B,iBAAiB,EAAE,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,CAAC;SACrD,CAAA;QACQ,WAAM,GAAG,UAAM,CAAC,WAAW,CAAA;QAGlC,MAAM,EAAC,oBAAoB,EAAE,qBAAqB,EAAC,qBAAO,IAAI,CAAC,CAAA;QAE/D,IAAI,CAAC,oBAAoB,GAAG,oBAAoB,CAAA;QAChD,IAAI,CAAC,qBAAqB,GAAG,qBAAqB,CAAA;IACpD,CAAC;IAEO,mBAAmB,CAAC,OAAyB;QACnD,OAAO;YACL,MAAM,EAAE,CAAO,GAAW,EAAE,GAAQ,EAAoB,EAAE;gBACxD,MAAM,YAAY,GAAG,MAAM,OAAO,CAAC,KAAK,CAAC,qBAAqB,CAAC,EAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAC,CAAC,CAAA;gBACpF,OAAO,CAAC,YAAY,CAAC,KAAK,CAAA;YAC5B,CAAC,CAAA;SACF,CAAA;IACH,CAAC;IAEO,kBAAkB,CAAC,OAAyB;QAClD,OAAO;YACC,cAAc,CAAC,QAAgB;;oBACnC,MAAM,WAAW,GAAG,IAAI,qBAAO,CAAC,QAAQ,EAAE;wBACxC,MAAM,EAAE,KAAK;qBACd,CAAC,CAAA;oBAEF,MAAM,QAAQ,GAAG,MAAM,OAAO,CAAC,KAAK,CAAC,eAAe,CAAC;wBACnD,KAAK,EAAE,WAAW;wBAClB,YAAY,EAAE,kCAAkC;qBACjD,CAAC,CAAA;oBAEF,IAAI,QAAQ,CAAC,MAAM,IAAI,GAAG,EAAE,CAAC;wBACzB,MAAM,IAAI,KAAK,CAAC,kCAAkC,QAAQ,EAAE,CAAC,CAAA;oBACjE,CAAC;oBAED,OAAO,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;gBAC9B,CAAC;aAAA;SACF,CAAA;IACH,CAAC;IAEO,aAAa,CAAC,OAAyB;QAC7C,OAAO,IAAI,2CAAgB,CACzB,IAAI,CAAC,oBAAoB,IAAI,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC,EAC7D,IAAI,CAAC,qBAAqB,IAAI,IAAI,CAAC,mBAAmB,CAAC,OAAO,CAAC,CAChE,CAAA;IACH,CAAC;IAEa,iBAAiB,CAAC,IAA2B,EAAE,OAAyB;;YACpF,MAAM,EAAE,gBAAgB,EAAE,YAAY,EAAE,GAAG,IAAI,CAAA;YAE/C,MAAM,UAAU,GAAG,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,CAAA;YAE9C,OAAO,MAAM,UAAU,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,YAAY,EAAE,EAAE,CAAC,CAAA;QAC/E,CAAC;KAAA;CACF;AA3DD,gCA2DC"}
|
|
@@ -1,51 +1,47 @@
|
|
|
1
|
-
import { CreateJwsCompactArgs } from '@sphereon/ssi-sdk-ext.jwt-service';
|
|
2
1
|
import { IAgentContext } from '@veramo/core';
|
|
3
2
|
import { IAgentPlugin } from '@veramo/core';
|
|
4
|
-
import {
|
|
3
|
+
import { ICryptoService } from '@sphereon/openid-federation-client';
|
|
4
|
+
import { IFetchService } from '@sphereon/openid-federation-client';
|
|
5
5
|
import { IJwtService } from '@sphereon/ssi-sdk-ext.jwt-service';
|
|
6
6
|
import { IPluginMethodMap } from '@veramo/core';
|
|
7
|
+
import { IResourceResolver } from '@sphereon/ssi-sdk.resource-resolver';
|
|
7
8
|
import { ISimpleLogger } from '@sphereon/ssi-types';
|
|
8
|
-
import {
|
|
9
|
-
import { VerifyJwsArgs } from '@sphereon/ssi-sdk-ext.jwt-service';
|
|
10
|
-
|
|
11
|
-
export declare type CryptoServiceCallbackArgs = ICryptoCallbackServiceJS;
|
|
9
|
+
import { TrustChainResolveResponse } from '@sphereon/openid-federation-client';
|
|
12
10
|
|
|
13
11
|
export declare interface IOIDFClient extends IPluginMethodMap {
|
|
14
|
-
resolveTrustChain(args: ResolveTrustChainArgs, context:
|
|
15
|
-
signJwt(args: CreateJwsCompactArgs, context: RequiredContext): Promise<JwtCompactResult>;
|
|
16
|
-
verifyJwt(args: VerifyJwsArgs, context: RequiredContext): Promise<IJwsValidationResult>;
|
|
12
|
+
resolveTrustChain(args: ResolveTrustChainArgs, context: IRequiredContext): Promise<TrustChainResolveResponse>;
|
|
17
13
|
}
|
|
18
14
|
|
|
19
|
-
export declare
|
|
15
|
+
export declare type IRequiredContext = IAgentContext<IRequiredPlugins>;
|
|
20
16
|
|
|
21
|
-
declare type
|
|
17
|
+
export declare type IRequiredPlugins = IJwtService & IResourceResolver;
|
|
18
|
+
|
|
19
|
+
export declare const logger: ISimpleLogger<unknown>;
|
|
22
20
|
|
|
23
21
|
export declare class OIDFClient implements IAgentPlugin {
|
|
24
|
-
private
|
|
22
|
+
private readonly fetchServiceCallback?;
|
|
23
|
+
private readonly cryptoServiceCallback?;
|
|
24
|
+
readonly methods: IOIDFClient;
|
|
25
25
|
readonly schema: any;
|
|
26
26
|
constructor(args?: OIDFClientArgs);
|
|
27
|
-
|
|
27
|
+
private defaultCryptoJSImpl;
|
|
28
|
+
private defaultFetchJSImpl;
|
|
29
|
+
private getOIDFClient;
|
|
28
30
|
private resolveTrustChain;
|
|
29
|
-
private checkAndSetDefaultCryptoService;
|
|
30
|
-
private signJwt;
|
|
31
|
-
private verifyJwt;
|
|
32
31
|
}
|
|
33
32
|
|
|
34
33
|
export declare type OIDFClientArgs = {
|
|
35
|
-
|
|
34
|
+
fetchServiceCallback?: IFetchService;
|
|
35
|
+
cryptoServiceCallback?: ICryptoService;
|
|
36
36
|
};
|
|
37
37
|
|
|
38
38
|
export declare const oidfClientMethods: Array<string>;
|
|
39
39
|
|
|
40
|
-
export declare type RequiredContext = IAgentContext<IJwtService>;
|
|
41
|
-
|
|
42
40
|
export declare type ResolveTrustChainArgs = {
|
|
43
41
|
entityIdentifier: string;
|
|
44
42
|
trustAnchors: Array<string>;
|
|
45
43
|
};
|
|
46
44
|
|
|
47
|
-
export declare type ResolveTrustChainCallbackResult = Nullable<Array<string>>;
|
|
48
|
-
|
|
49
45
|
/**
|
|
50
46
|
* @public
|
|
51
47
|
*/
|
|
@@ -1,22 +1,18 @@
|
|
|
1
|
+
import { IResourceResolver } from "@sphereon/ssi-sdk.resource-resolver";
|
|
1
2
|
import { IAgentContext, IPluginMethodMap } from '@veramo/core';
|
|
2
|
-
import {
|
|
3
|
-
import
|
|
4
|
-
|
|
3
|
+
import { IJwtService } from '@sphereon/ssi-sdk-ext.jwt-service';
|
|
4
|
+
import { ICryptoService, IFetchService, TrustChainResolveResponse } from '@sphereon/openid-federation-client';
|
|
5
|
+
export type IRequiredPlugins = IJwtService & IResourceResolver;
|
|
6
|
+
export type IRequiredContext = IAgentContext<IRequiredPlugins>;
|
|
5
7
|
export interface IOIDFClient extends IPluginMethodMap {
|
|
6
|
-
resolveTrustChain(args: ResolveTrustChainArgs, context:
|
|
7
|
-
signJwt(args: CreateJwsCompactArgs, context: RequiredContext): Promise<JwtCompactResult>;
|
|
8
|
-
verifyJwt(args: VerifyJwsArgs, context: RequiredContext): Promise<IJwsValidationResult>;
|
|
8
|
+
resolveTrustChain(args: ResolveTrustChainArgs, context: IRequiredContext): Promise<TrustChainResolveResponse>;
|
|
9
9
|
}
|
|
10
10
|
export type ResolveTrustChainArgs = {
|
|
11
11
|
entityIdentifier: string;
|
|
12
12
|
trustAnchors: Array<string>;
|
|
13
13
|
};
|
|
14
14
|
export type OIDFClientArgs = {
|
|
15
|
-
|
|
15
|
+
fetchServiceCallback?: IFetchService;
|
|
16
|
+
cryptoServiceCallback?: ICryptoService;
|
|
16
17
|
};
|
|
17
|
-
export type CryptoServiceCallbackArgs = ICryptoCallbackServiceJS;
|
|
18
|
-
type Nullable<T> = T | null | undefined;
|
|
19
|
-
export type ResolveTrustChainCallbackResult = Nullable<Array<string>>;
|
|
20
|
-
export type RequiredContext = IAgentContext<IJwtService>;
|
|
21
|
-
export {};
|
|
22
18
|
//# sourceMappingURL=IOIDFClient.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"IOIDFClient.d.ts","sourceRoot":"","sources":["../../src/types/IOIDFClient.ts"],"names":[],"mappings":"AAAA,OAAO,EAAC,aAAa,EAAE,gBAAgB,EAAC,MAAM,cAAc,CAAC;AAC7D,OAAO,
|
|
1
|
+
{"version":3,"file":"IOIDFClient.d.ts","sourceRoot":"","sources":["../../src/types/IOIDFClient.ts"],"names":[],"mappings":"AAAA,OAAO,EAAC,iBAAiB,EAAC,MAAM,qCAAqC,CAAC;AACtE,OAAO,EAAC,aAAa,EAAE,gBAAgB,EAAC,MAAM,cAAc,CAAC;AAC7D,OAAO,EACH,WAAW,EACd,MAAM,mCAAmC,CAAC;AAC3C,OAAO,EAAC,cAAc,EAAE,aAAa,EAAE,yBAAyB,EAAC,MAAM,oCAAoC,CAAA;AAE3G,MAAM,MAAM,gBAAgB,GAAG,WAAW,GAAG,iBAAiB,CAAA;AAC9D,MAAM,MAAM,gBAAgB,GAAG,aAAa,CAAC,gBAAgB,CAAC,CAAA;AAE9D,MAAM,WAAW,WAAY,SAAQ,gBAAgB;IACjD,iBAAiB,CAAC,IAAI,EAAE,qBAAqB,EAAE,OAAO,EAAE,gBAAgB,GAAG,OAAO,CAAC,yBAAyB,CAAC,CAAA;CAChH;AAED,MAAM,MAAM,qBAAqB,GAAG;IAChC,gBAAgB,EAAE,MAAM,CAAC;IACzB,YAAY,EAAE,KAAK,CAAC,MAAM,CAAC,CAAA;CAC9B,CAAA;AAED,MAAM,MAAM,cAAc,GAAG;IACzB,oBAAoB,CAAC,EAAE,aAAa,CAAA;IACpC,qBAAqB,CAAC,EAAE,cAAc,CAAA;CACzC,CAAA"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@sphereon/ssi-sdk.oidf-client",
|
|
3
|
-
"version": "0.30.2-fix.
|
|
3
|
+
"version": "0.30.2-fix.363+7d10b978",
|
|
4
4
|
"source": "src/index.ts",
|
|
5
5
|
"main": "dist/index.js",
|
|
6
6
|
"types": "dist/index.d.ts",
|
|
@@ -15,19 +15,17 @@
|
|
|
15
15
|
"generate-plugin-schema": "ts-node ../../packages/dev/bin/sphereon.js dev generate-plugin-schema"
|
|
16
16
|
},
|
|
17
17
|
"dependencies": {
|
|
18
|
-
"@sphereon/openid-federation-client": "0.1.
|
|
19
|
-
"@sphereon/openid-federation-common": "0.1.
|
|
20
|
-
"@sphereon/openid-federation-open-api": "0.1.
|
|
21
|
-
"@sphereon/ssi-sdk-ext.jwt-service": "0.25.
|
|
22
|
-
"@sphereon/ssi-
|
|
18
|
+
"@sphereon/openid-federation-client": "0.1.1-unstable.0647eb6",
|
|
19
|
+
"@sphereon/openid-federation-common": "0.1.1-unstable.0647eb6",
|
|
20
|
+
"@sphereon/openid-federation-open-api": "0.1.1-unstable.0647eb6",
|
|
21
|
+
"@sphereon/ssi-sdk-ext.jwt-service": "0.25.1-next.22",
|
|
22
|
+
"@sphereon/ssi-sdk.resource-resolver": "0.30.2-fix.363+7d10b978",
|
|
23
|
+
"@sphereon/ssi-types": "0.30.2-fix.363+7d10b978"
|
|
23
24
|
},
|
|
24
25
|
"devDependencies": {
|
|
25
|
-
"@sphereon/ssi-sdk.agent-config": "0.30.2-fix.
|
|
26
|
+
"@sphereon/ssi-sdk.agent-config": "0.30.2-fix.363+7d10b978",
|
|
26
27
|
"@veramo/remote-client": "4.2.0",
|
|
27
|
-
"@veramo/remote-server": "4.2.0"
|
|
28
|
-
"cross-fetch": "^3.1.8",
|
|
29
|
-
"jose": "5.9.4",
|
|
30
|
-
"nock": "^13.5.5"
|
|
28
|
+
"@veramo/remote-server": "4.2.0"
|
|
31
29
|
},
|
|
32
30
|
"files": [
|
|
33
31
|
"dist/**/*",
|
|
@@ -49,5 +47,5 @@
|
|
|
49
47
|
"Veramo",
|
|
50
48
|
"OpenID Federation"
|
|
51
49
|
],
|
|
52
|
-
"gitHead": "
|
|
50
|
+
"gitHead": "7d10b978eff3a14bceda6bf81498dfd3d70e8eed"
|
|
53
51
|
}
|