@sphereon/ssi-sdk.oidf-client 0.30.2-fix.368 → 0.30.2-fix.395

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- {"version":3,"file":"OIDFClient.d.ts","sourceRoot":"","sources":["../../src/agent/OIDFClient.ts"],"names":[],"mappings":"AAEA,OAAO,EAAC,YAAY,EAAC,MAAM,cAAc,CAAA;AAGzC,OAAO,EACL,WAAW,EACX,cAAc,EAGf,MAAM,sBAAsB,CAAA;AAE7B,eAAO,MAAM,iBAAiB,EAAE,KAAK,CAAC,MAAM,CAAyB,CAAA;AAErE,qBAAa,UAAW,YAAW,YAAY;IAC7C,OAAO,CAAC,QAAQ,CAAC,oBAAoB,CAAC,CAAe;IACrD,OAAO,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAgB;IACvD,QAAQ,CAAC,OAAO,EAAE,WAAW,CAE5B;IACD,QAAQ,CAAC,MAAM,MAAqB;gBAExB,IAAI,CAAC,EAAE,cAAc;IAOjC,OAAO,CAAC,mBAAmB;IAS3B,OAAO,CAAC,kBAAkB;IAqB1B,OAAO,CAAC,aAAa;YAOP,iBAAiB;CAOhC"}
1
+ {"version":3,"file":"OIDFClient.d.ts","sourceRoot":"","sources":["../../src/agent/OIDFClient.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,YAAY,EAAE,MAAM,cAAc,CAAA;AAG3C,OAAO,EAAE,WAAW,EAAE,cAAc,EAA2C,MAAM,sBAAsB,CAAA;AAE3G,eAAO,MAAM,iBAAiB,EAAE,KAAK,CAAC,MAAM,CAAyB,CAAA;AAErE,qBAAa,UAAW,YAAW,YAAY;IAC7C,OAAO,CAAC,QAAQ,CAAC,oBAAoB,CAAC,CAAe;IACrD,OAAO,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAgB;IACvD,QAAQ,CAAC,OAAO,EAAE,WAAW,CAE5B;IACD,QAAQ,CAAC,MAAM,MAAqB;gBAExB,IAAI,CAAC,EAAE,cAAc;IAOjC,OAAO,CAAC,mBAAmB;IAS3B,OAAO,CAAC,kBAAkB;IAqB1B,OAAO,CAAC,aAAa;YAOP,iBAAiB;CAOhC"}
@@ -29,7 +29,7 @@ class OIDFClient {
29
29
  verify: (jwt, key) => __awaiter(this, void 0, void 0, function* () {
30
30
  const verification = yield context.agent.jwtVerifyJwsSignature({ jws: jwt, jwk: key });
31
31
  return !verification.error;
32
- })
32
+ }),
33
33
  };
34
34
  }
35
35
  defaultFetchJSImpl(context) {
@@ -37,7 +37,7 @@ class OIDFClient {
37
37
  fetchStatement(endpoint) {
38
38
  return __awaiter(this, void 0, void 0, function* () {
39
39
  const requestInfo = new cross_fetch_1.Request(endpoint, {
40
- method: 'GET'
40
+ method: 'GET',
41
41
  });
42
42
  const response = yield context.agent.resourceResolve({
43
43
  input: requestInfo,
@@ -48,7 +48,7 @@ class OIDFClient {
48
48
  }
49
49
  return yield response.text();
50
50
  });
51
- }
51
+ },
52
52
  };
53
53
  }
54
54
  getOIDFClient(context) {
@@ -1 +1 @@
1
- {"version":3,"file":"OIDFClient.js","sourceRoot":"","sources":["../../src/agent/OIDFClient.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,iFAA6H;AAG7H,6CAAoC;AACpC,2BAA0B;AAQb,QAAA,iBAAiB,GAAkB,CAAC,mBAAmB,CAAC,CAAA;AAErE,MAAa,UAAU;IAQrB,YAAY,IAAqB;QALxB,YAAO,GAAgB;YAC9B,iBAAiB,EAAE,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,CAAC;SACrD,CAAA;QACQ,WAAM,GAAG,UAAM,CAAC,WAAW,CAAA;QAGlC,MAAM,EAAC,oBAAoB,EAAE,qBAAqB,EAAC,qBAAO,IAAI,CAAC,CAAA;QAE/D,IAAI,CAAC,oBAAoB,GAAG,oBAAoB,CAAA;QAChD,IAAI,CAAC,qBAAqB,GAAG,qBAAqB,CAAA;IACpD,CAAC;IAEO,mBAAmB,CAAC,OAAyB;QACnD,OAAO;YACL,MAAM,EAAE,CAAO,GAAW,EAAE,GAAQ,EAAoB,EAAE;gBACxD,MAAM,YAAY,GAAG,MAAM,OAAO,CAAC,KAAK,CAAC,qBAAqB,CAAC,EAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAC,CAAC,CAAA;gBACpF,OAAO,CAAC,YAAY,CAAC,KAAK,CAAA;YAC5B,CAAC,CAAA;SACF,CAAA;IACH,CAAC;IAEO,kBAAkB,CAAC,OAAyB;QAClD,OAAO;YACC,cAAc,CAAC,QAAgB;;oBACnC,MAAM,WAAW,GAAG,IAAI,qBAAO,CAAC,QAAQ,EAAE;wBACxC,MAAM,EAAE,KAAK;qBACd,CAAC,CAAA;oBAEF,MAAM,QAAQ,GAAG,MAAM,OAAO,CAAC,KAAK,CAAC,eAAe,CAAC;wBACnD,KAAK,EAAE,WAAW;wBAClB,YAAY,EAAE,kCAAkC;qBACjD,CAAC,CAAA;oBAEF,IAAI,QAAQ,CAAC,MAAM,IAAI,GAAG,EAAE,CAAC;wBACzB,MAAM,IAAI,KAAK,CAAC,kCAAkC,QAAQ,EAAE,CAAC,CAAA;oBACjE,CAAC;oBAED,OAAO,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;gBAC9B,CAAC;aAAA;SACF,CAAA;IACH,CAAC;IAEO,aAAa,CAAC,OAAyB;QAC7C,OAAO,IAAI,2CAAgB,CACzB,IAAI,CAAC,oBAAoB,IAAI,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC,EAC7D,IAAI,CAAC,qBAAqB,IAAI,IAAI,CAAC,mBAAmB,CAAC,OAAO,CAAC,CAChE,CAAA;IACH,CAAC;IAEa,iBAAiB,CAAC,IAA2B,EAAE,OAAyB;;YACpF,MAAM,EAAE,gBAAgB,EAAE,YAAY,EAAE,GAAG,IAAI,CAAA;YAE/C,MAAM,UAAU,GAAG,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,CAAA;YAE9C,OAAO,MAAM,UAAU,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,YAAY,EAAE,EAAE,CAAC,CAAA;QAC/E,CAAC;KAAA;CACF;AA3DD,gCA2DC"}
1
+ {"version":3,"file":"OIDFClient.js","sourceRoot":"","sources":["../../src/agent/OIDFClient.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,iFAA+H;AAG/H,6CAAqC;AACrC,2BAA4B;AAGf,QAAA,iBAAiB,GAAkB,CAAC,mBAAmB,CAAC,CAAA;AAErE,MAAa,UAAU;IAQrB,YAAY,IAAqB;QALxB,YAAO,GAAgB;YAC9B,iBAAiB,EAAE,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,CAAC;SACrD,CAAA;QACQ,WAAM,GAAG,UAAM,CAAC,WAAW,CAAA;QAGlC,MAAM,EAAE,oBAAoB,EAAE,qBAAqB,EAAE,qBAAQ,IAAI,CAAE,CAAA;QAEnE,IAAI,CAAC,oBAAoB,GAAG,oBAAoB,CAAA;QAChD,IAAI,CAAC,qBAAqB,GAAG,qBAAqB,CAAA;IACpD,CAAC;IAEO,mBAAmB,CAAC,OAAyB;QACnD,OAAO;YACL,MAAM,EAAE,CAAO,GAAW,EAAE,GAAQ,EAAoB,EAAE;gBACxD,MAAM,YAAY,GAAG,MAAM,OAAO,CAAC,KAAK,CAAC,qBAAqB,CAAC,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,CAAA;gBACtF,OAAO,CAAC,YAAY,CAAC,KAAK,CAAA;YAC5B,CAAC,CAAA;SACF,CAAA;IACH,CAAC;IAEO,kBAAkB,CAAC,OAAyB;QAClD,OAAO;YACC,cAAc,CAAC,QAAgB;;oBACnC,MAAM,WAAW,GAAG,IAAI,qBAAO,CAAC,QAAQ,EAAE;wBACxC,MAAM,EAAE,KAAK;qBACd,CAAC,CAAA;oBAEF,MAAM,QAAQ,GAAG,MAAM,OAAO,CAAC,KAAK,CAAC,eAAe,CAAC;wBACnD,KAAK,EAAE,WAAW;wBAClB,YAAY,EAAE,kCAAkC;qBACjD,CAAC,CAAA;oBAEF,IAAI,QAAQ,CAAC,MAAM,IAAI,GAAG,EAAE,CAAC;wBAC3B,MAAM,IAAI,KAAK,CAAC,kCAAkC,QAAQ,EAAE,CAAC,CAAA;oBAC/D,CAAC;oBAED,OAAO,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;gBAC9B,CAAC;aAAA;SACF,CAAA;IACH,CAAC;IAEO,aAAa,CAAC,OAAyB;QAC7C,OAAO,IAAI,2CAAgB,CACzB,IAAI,CAAC,oBAAoB,IAAI,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC,EAC7D,IAAI,CAAC,qBAAqB,IAAI,IAAI,CAAC,mBAAmB,CAAC,OAAO,CAAC,CAChE,CAAA;IACH,CAAC;IAEa,iBAAiB,CAAC,IAA2B,EAAE,OAAyB;;YACpF,MAAM,EAAE,gBAAgB,EAAE,YAAY,EAAE,GAAG,IAAI,CAAA;YAE/C,MAAM,UAAU,GAAG,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,CAAA;YAE9C,OAAO,MAAM,UAAU,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,YAAY,EAAE,EAAE,CAAC,CAAA;QAC/E,CAAC;KAAA;CACF;AA3DD,gCA2DC"}
package/dist/index.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;AAAA,mDAA2C;AAE3C;;GAEG;AACH,MAAM,MAAM,GAAG,OAAO,CAAC,uBAAuB,CAAC,CAAA;AACtC,wBAAM;AAEF,QAAA,MAAM,GAAG,mBAAO,CAAC,OAAO,CAAC,GAAG,CAAC,sBAAsB,CAAC,CAAA;AAEjE,iDAAkE;AAAzD,wGAAA,UAAU,OAAA;AAAE,+GAAA,iBAAiB,OAAA;AAEtC,sDAAmC"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;AAAA,mDAA6C;AAE7C;;GAEG;AACH,MAAM,MAAM,GAAG,OAAO,CAAC,uBAAuB,CAAC,CAAA;AACtC,wBAAM;AAEF,QAAA,MAAM,GAAG,mBAAO,CAAC,OAAO,CAAC,GAAG,CAAC,sBAAsB,CAAC,CAAA;AAEjE,iDAAkE;AAAzD,wGAAA,UAAU,OAAA;AAAE,+GAAA,iBAAiB,OAAA;AAEtC,sDAAmC"}
@@ -1,4 +1,4 @@
1
- import { IResourceResolver } from "@sphereon/ssi-sdk.resource-resolver";
1
+ import { IResourceResolver } from '@sphereon/ssi-sdk.resource-resolver';
2
2
  import { IAgentContext, IPluginMethodMap } from '@veramo/core';
3
3
  import { IJwtService } from '@sphereon/ssi-sdk-ext.jwt-service';
4
4
  import { ICryptoService, IFetchService, TrustChainResolveResponse } from '@sphereon/openid-federation-client';
@@ -1 +1 @@
1
- {"version":3,"file":"IOIDFClient.d.ts","sourceRoot":"","sources":["../../src/types/IOIDFClient.ts"],"names":[],"mappings":"AAAA,OAAO,EAAC,iBAAiB,EAAC,MAAM,qCAAqC,CAAC;AACtE,OAAO,EAAC,aAAa,EAAE,gBAAgB,EAAC,MAAM,cAAc,CAAC;AAC7D,OAAO,EACH,WAAW,EACd,MAAM,mCAAmC,CAAC;AAC3C,OAAO,EAAC,cAAc,EAAE,aAAa,EAAE,yBAAyB,EAAC,MAAM,oCAAoC,CAAA;AAE3G,MAAM,MAAM,gBAAgB,GAAG,WAAW,GAAG,iBAAiB,CAAA;AAC9D,MAAM,MAAM,gBAAgB,GAAG,aAAa,CAAC,gBAAgB,CAAC,CAAA;AAE9D,MAAM,WAAW,WAAY,SAAQ,gBAAgB;IACjD,iBAAiB,CAAC,IAAI,EAAE,qBAAqB,EAAE,OAAO,EAAE,gBAAgB,GAAG,OAAO,CAAC,yBAAyB,CAAC,CAAA;CAChH;AAED,MAAM,MAAM,qBAAqB,GAAG;IAChC,gBAAgB,EAAE,MAAM,CAAC;IACzB,YAAY,EAAE,KAAK,CAAC,MAAM,CAAC,CAAA;CAC9B,CAAA;AAED,MAAM,MAAM,cAAc,GAAG;IACzB,oBAAoB,CAAC,EAAE,aAAa,CAAA;IACpC,qBAAqB,CAAC,EAAE,cAAc,CAAA;CACzC,CAAA"}
1
+ {"version":3,"file":"IOIDFClient.d.ts","sourceRoot":"","sources":["../../src/types/IOIDFClient.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,iBAAiB,EAAE,MAAM,qCAAqC,CAAA;AACvE,OAAO,EAAE,aAAa,EAAE,gBAAgB,EAAE,MAAM,cAAc,CAAA;AAC9D,OAAO,EAAE,WAAW,EAAE,MAAM,mCAAmC,CAAA;AAC/D,OAAO,EAAE,cAAc,EAAE,aAAa,EAAE,yBAAyB,EAAE,MAAM,oCAAoC,CAAA;AAE7G,MAAM,MAAM,gBAAgB,GAAG,WAAW,GAAG,iBAAiB,CAAA;AAC9D,MAAM,MAAM,gBAAgB,GAAG,aAAa,CAAC,gBAAgB,CAAC,CAAA;AAE9D,MAAM,WAAW,WAAY,SAAQ,gBAAgB;IACnD,iBAAiB,CAAC,IAAI,EAAE,qBAAqB,EAAE,OAAO,EAAE,gBAAgB,GAAG,OAAO,CAAC,yBAAyB,CAAC,CAAA;CAC9G;AAED,MAAM,MAAM,qBAAqB,GAAG;IAClC,gBAAgB,EAAE,MAAM,CAAA;IACxB,YAAY,EAAE,KAAK,CAAC,MAAM,CAAC,CAAA;CAC5B,CAAA;AAED,MAAM,MAAM,cAAc,GAAG;IAC3B,oBAAoB,CAAC,EAAE,aAAa,CAAA;IACpC,qBAAqB,CAAC,EAAE,cAAc,CAAA;CACvC,CAAA"}
package/package.json CHANGED
@@ -1,51 +1,51 @@
1
1
  {
2
- "name": "@sphereon/ssi-sdk.oidf-client",
3
- "version": "0.30.2-fix.368+d1fddfcc",
4
- "source": "src/index.ts",
5
- "main": "dist/index.js",
6
- "types": "dist/index.d.ts",
7
- "veramo": {
8
- "pluginInterfaces": {
9
- "IOIDFClient": "./src/types/IOIDFClient.ts"
10
- }
11
- },
12
- "scripts": {
13
- "build": "tsc",
14
- "build:clean": "tsc --build --clean && tsc --build",
15
- "generate-plugin-schema": "ts-node ../../packages/dev/bin/sphereon.js dev generate-plugin-schema"
16
- },
17
- "dependencies": {
18
- "@sphereon/openid-federation-client": "0.1.1-unstable.0647eb6",
19
- "@sphereon/openid-federation-common": "0.1.1-unstable.0647eb6",
20
- "@sphereon/openid-federation-open-api": "0.1.1-unstable.0647eb6",
21
- "@sphereon/ssi-sdk-ext.jwt-service": "0.25.1-next.22",
22
- "@sphereon/ssi-sdk.resource-resolver": "0.30.2-fix.368+d1fddfcc",
23
- "@sphereon/ssi-types": "0.30.2-fix.368+d1fddfcc"
24
- },
25
- "devDependencies": {
26
- "@sphereon/ssi-sdk.agent-config": "0.30.2-fix.368+d1fddfcc",
27
- "@veramo/remote-client": "4.2.0",
28
- "@veramo/remote-server": "4.2.0"
29
- },
30
- "files": [
31
- "dist/**/*",
32
- "src/**/*",
33
- "README.md",
34
- "plugin.schema.json",
35
- "LICENSE"
36
- ],
37
- "private": false,
38
- "publishConfig": {
39
- "access": "public"
40
- },
41
- "repository": "git@github.com:Sphereon-Opensource/SSI-SDK.git",
42
- "author": "Sphereon <dev@sphereon.com>",
43
- "license": "Apache-2.0",
44
- "keywords": [
45
- "Sphereon",
46
- "SSI",
47
- "Veramo",
48
- "OpenID Federation"
49
- ],
50
- "gitHead": "d1fddfcc5ac002b56ff6b5c19ed4fda5800e2f18"
2
+ "name": "@sphereon/ssi-sdk.oidf-client",
3
+ "version": "0.30.2-fix.395+c1e7ae67",
4
+ "source": "src/index.ts",
5
+ "main": "dist/index.js",
6
+ "types": "dist/index.d.ts",
7
+ "veramo": {
8
+ "pluginInterfaces": {
9
+ "IOIDFClient": "./src/types/IOIDFClient.ts"
10
+ }
11
+ },
12
+ "scripts": {
13
+ "build": "tsc",
14
+ "build:clean": "tsc --build --clean && tsc --build",
15
+ "generate-plugin-schema": "ts-node ../../packages/dev/bin/sphereon.js dev generate-plugin-schema"
16
+ },
17
+ "dependencies": {
18
+ "@sphereon/openid-federation-client": "0.1.1-unstable.0647eb6",
19
+ "@sphereon/openid-federation-common": "0.1.1-unstable.0647eb6",
20
+ "@sphereon/openid-federation-open-api": "0.1.1-unstable.0647eb6",
21
+ "@sphereon/ssi-sdk-ext.jwt-service": "0.26.0",
22
+ "@sphereon/ssi-sdk.resource-resolver": "0.30.2-fix.395+c1e7ae67",
23
+ "@sphereon/ssi-types": "0.30.2-fix.395+c1e7ae67"
24
+ },
25
+ "devDependencies": {
26
+ "@sphereon/ssi-sdk.agent-config": "0.30.2-fix.395+c1e7ae67",
27
+ "@veramo/remote-client": "4.2.0",
28
+ "@veramo/remote-server": "4.2.0"
29
+ },
30
+ "files": [
31
+ "dist/**/*",
32
+ "src/**/*",
33
+ "README.md",
34
+ "plugin.schema.json",
35
+ "LICENSE"
36
+ ],
37
+ "private": false,
38
+ "publishConfig": {
39
+ "access": "public"
40
+ },
41
+ "repository": "git@github.com:Sphereon-Opensource/SSI-SDK.git",
42
+ "author": "Sphereon <dev@sphereon.com>",
43
+ "license": "Apache-2.0",
44
+ "keywords": [
45
+ "Sphereon",
46
+ "SSI",
47
+ "Veramo",
48
+ "OpenID Federation"
49
+ ],
50
+ "gitHead": "c1e7ae67eeb24c55535e023028bda50f3d5213a0"
51
51
  }
@@ -1,14 +1,9 @@
1
- import {FederationClient, ICryptoService, IFetchService, TrustChainResolveResponse} from '@sphereon/openid-federation-client'
2
- import {JWK} from "@sphereon/ssi-types";
3
- import {IAgentPlugin} from '@veramo/core'
4
- import {Request} from "cross-fetch";
5
- import {schema} from '../'
6
- import {
7
- IOIDFClient,
8
- OIDFClientArgs,
9
- IRequiredContext,
10
- ResolveTrustChainArgs
11
- } from '../types/IOIDFClient'
1
+ import { FederationClient, ICryptoService, IFetchService, TrustChainResolveResponse } from '@sphereon/openid-federation-client'
2
+ import { JWK } from '@sphereon/ssi-types'
3
+ import { IAgentPlugin } from '@veramo/core'
4
+ import { Request } from 'cross-fetch'
5
+ import { schema } from '../'
6
+ import { IOIDFClient, OIDFClientArgs, IRequiredContext, ResolveTrustChainArgs } from '../types/IOIDFClient'
12
7
 
13
8
  export const oidfClientMethods: Array<string> = ['resolveTrustChain']
14
9
 
@@ -21,7 +16,7 @@ export class OIDFClient implements IAgentPlugin {
21
16
  readonly schema = schema.IOIDFClient
22
17
 
23
18
  constructor(args?: OIDFClientArgs) {
24
- const {fetchServiceCallback, cryptoServiceCallback} = {...args}
19
+ const { fetchServiceCallback, cryptoServiceCallback } = { ...args }
25
20
 
26
21
  this.fetchServiceCallback = fetchServiceCallback
27
22
  this.cryptoServiceCallback = cryptoServiceCallback
@@ -30,9 +25,9 @@ export class OIDFClient implements IAgentPlugin {
30
25
  private defaultCryptoJSImpl(context: IRequiredContext): ICryptoService {
31
26
  return {
32
27
  verify: async (jwt: string, key: JWK): Promise<boolean> => {
33
- const verification = await context.agent.jwtVerifyJwsSignature({jws: jwt, jwk: key})
28
+ const verification = await context.agent.jwtVerifyJwsSignature({ jws: jwt, jwk: key })
34
29
  return !verification.error
35
- }
30
+ },
36
31
  }
37
32
  }
38
33
 
@@ -40,7 +35,7 @@ export class OIDFClient implements IAgentPlugin {
40
35
  return {
41
36
  async fetchStatement(endpoint: string): Promise<string> {
42
37
  const requestInfo = new Request(endpoint, {
43
- method: 'GET'
38
+ method: 'GET',
44
39
  })
45
40
 
46
41
  const response = await context.agent.resourceResolve({
@@ -49,18 +44,18 @@ export class OIDFClient implements IAgentPlugin {
49
44
  })
50
45
 
51
46
  if (response.status != 200) {
52
- throw new Error(`Failed to fetch statement from ${endpoint}`)
47
+ throw new Error(`Failed to fetch statement from ${endpoint}`)
53
48
  }
54
49
 
55
50
  return await response.text()
56
- }
51
+ },
57
52
  }
58
53
  }
59
54
 
60
55
  private getOIDFClient(context: IRequiredContext): FederationClient {
61
56
  return new FederationClient(
62
57
  this.fetchServiceCallback || this.defaultFetchJSImpl(context),
63
- this.cryptoServiceCallback || this.defaultCryptoJSImpl(context)
58
+ this.cryptoServiceCallback || this.defaultCryptoJSImpl(context),
64
59
  )
65
60
  }
66
61
 
package/src/index.ts CHANGED
@@ -1,4 +1,4 @@
1
- import {Loggers} from '@sphereon/ssi-types'
1
+ import { Loggers } from '@sphereon/ssi-types'
2
2
 
3
3
  /**
4
4
  * @public
@@ -1,23 +1,21 @@
1
- import {IResourceResolver} from "@sphereon/ssi-sdk.resource-resolver";
2
- import {IAgentContext, IPluginMethodMap} from '@veramo/core';
3
- import {
4
- IJwtService,
5
- } from '@sphereon/ssi-sdk-ext.jwt-service';
6
- import {ICryptoService, IFetchService, TrustChainResolveResponse} from '@sphereon/openid-federation-client'
1
+ import { IResourceResolver } from '@sphereon/ssi-sdk.resource-resolver'
2
+ import { IAgentContext, IPluginMethodMap } from '@veramo/core'
3
+ import { IJwtService } from '@sphereon/ssi-sdk-ext.jwt-service'
4
+ import { ICryptoService, IFetchService, TrustChainResolveResponse } from '@sphereon/openid-federation-client'
7
5
 
8
6
  export type IRequiredPlugins = IJwtService & IResourceResolver
9
7
  export type IRequiredContext = IAgentContext<IRequiredPlugins>
10
8
 
11
9
  export interface IOIDFClient extends IPluginMethodMap {
12
- resolveTrustChain(args: ResolveTrustChainArgs, context: IRequiredContext): Promise<TrustChainResolveResponse>
10
+ resolveTrustChain(args: ResolveTrustChainArgs, context: IRequiredContext): Promise<TrustChainResolveResponse>
13
11
  }
14
12
 
15
13
  export type ResolveTrustChainArgs = {
16
- entityIdentifier: string,
17
- trustAnchors: Array<string>
14
+ entityIdentifier: string
15
+ trustAnchors: Array<string>
18
16
  }
19
17
 
20
18
  export type OIDFClientArgs = {
21
- fetchServiceCallback?: IFetchService
22
- cryptoServiceCallback?: ICryptoService
19
+ fetchServiceCallback?: IFetchService
20
+ cryptoServiceCallback?: ICryptoService
23
21
  }