@sphereon/ssi-sdk.siopv2-oid4vp-op-auth 0.33.0 → 0.33.1-feature.vcdm2.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/agent/DidAuthSiopOpAuthenticator.js +319 -340
- package/dist/agent/DidAuthSiopOpAuthenticator.js.map +1 -1
- package/dist/index.js +7 -27
- package/dist/index.js.map +1 -1
- package/dist/link-handler/index.js +35 -47
- package/dist/link-handler/index.js.map +1 -1
- package/dist/localization/Localization.js +38 -43
- package/dist/localization/Localization.js.map +1 -1
- package/dist/machine/CallbackStateListener.js +9 -22
- package/dist/machine/CallbackStateListener.js.map +1 -1
- package/dist/machine/Siopv2Machine.js +129 -131
- package/dist/machine/Siopv2Machine.js.map +1 -1
- package/dist/services/IdentifierService.js +11 -24
- package/dist/services/IdentifierService.js.map +1 -1
- package/dist/services/Siopv2MachineService.js +117 -120
- package/dist/services/Siopv2MachineService.js.map +1 -1
- package/dist/session/OID4VP.js +184 -195
- package/dist/session/OID4VP.js.map +1 -1
- package/dist/session/OpSession.js +252 -288
- package/dist/session/OpSession.js.map +1 -1
- package/dist/session/functions.js +95 -111
- package/dist/session/functions.js.map +1 -1
- package/dist/session/index.js +3 -19
- package/dist/session/index.js.map +1 -1
- package/dist/types/IDidAuthSiopOpAuthenticator.js +4 -7
- package/dist/types/IDidAuthSiopOpAuthenticator.js.map +1 -1
- package/dist/types/error/index.js +1 -2
- package/dist/types/identifier/index.js +1 -4
- package/dist/types/identifier/index.js.map +1 -1
- package/dist/types/index.js +5 -21
- package/dist/types/index.js.map +1 -1
- package/dist/types/machine/index.js +10 -13
- package/dist/types/machine/index.js.map +1 -1
- package/dist/types/siop-service/index.js +4 -7
- package/dist/types/siop-service/index.js.map +1 -1
- package/dist/utils/CredentialUtils.js +18 -28
- package/dist/utils/CredentialUtils.js.map +1 -1
- package/dist/utils/dcql.js +6 -9
- package/dist/utils/dcql.js.map +1 -1
- package/package.json +15 -15
package/dist/session/OID4VP.js
CHANGED
|
@@ -1,224 +1,213 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
exports.OID4VP = void 0;
|
|
13
|
-
const did_auth_siop_1 = require("@sphereon/did-auth-siop");
|
|
14
|
-
const pex_1 = require("@sphereon/pex");
|
|
15
|
-
const ssi_sdk_ext_identifier_resolution_1 = require("@sphereon/ssi-sdk-ext.identifier-resolution");
|
|
16
|
-
const ssi_sdk_core_1 = require("@sphereon/ssi-sdk.core");
|
|
17
|
-
const ssi_sdk_credential_store_1 = require("@sphereon/ssi-sdk.credential-store");
|
|
18
|
-
const types_1 = require("../types");
|
|
19
|
-
const functions_1 = require("./functions");
|
|
20
|
-
class OID4VP {
|
|
1
|
+
import { PresentationExchange } from '@sphereon/did-auth-siop';
|
|
2
|
+
import { Status } from '@sphereon/pex';
|
|
3
|
+
import { isManagedIdentifierDidResult, isOID4VCIssuerIdentifier, } from '@sphereon/ssi-sdk-ext.identifier-resolution';
|
|
4
|
+
import { defaultHasher } from '@sphereon/ssi-sdk.core';
|
|
5
|
+
import { verifiableCredentialForRoleFilter } from '@sphereon/ssi-sdk.credential-store';
|
|
6
|
+
import { DEFAULT_JWT_PROOF_TYPE, } from '../types';
|
|
7
|
+
import { createOID4VPPresentationSignCallback } from './functions';
|
|
8
|
+
export class OID4VP {
|
|
9
|
+
session;
|
|
10
|
+
allIdentifiers;
|
|
11
|
+
hasher;
|
|
21
12
|
constructor(args) {
|
|
22
|
-
const { session, allIdentifiers, hasher =
|
|
13
|
+
const { session, allIdentifiers, hasher = defaultHasher } = args;
|
|
23
14
|
this.session = session;
|
|
24
|
-
this.allIdentifiers = allIdentifiers
|
|
15
|
+
this.allIdentifiers = allIdentifiers ?? [];
|
|
25
16
|
this.hasher = hasher;
|
|
26
17
|
}
|
|
27
|
-
static init(session, allIdentifiers, hasher) {
|
|
28
|
-
return
|
|
29
|
-
return new OID4VP({ session, allIdentifiers: allIdentifiers !== null && allIdentifiers !== void 0 ? allIdentifiers : (yield session.getSupportedDIDs()), hasher });
|
|
30
|
-
});
|
|
18
|
+
static async init(session, allIdentifiers, hasher) {
|
|
19
|
+
return new OID4VP({ session, allIdentifiers: allIdentifiers ?? (await session.getSupportedDIDs()), hasher });
|
|
31
20
|
}
|
|
32
|
-
getPresentationDefinitions() {
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
return definitions;
|
|
39
|
-
});
|
|
21
|
+
async getPresentationDefinitions() {
|
|
22
|
+
const definitions = await this.session.getPresentationDefinitions();
|
|
23
|
+
if (definitions) {
|
|
24
|
+
PresentationExchange.assertValidPresentationDefinitionWithLocations(definitions);
|
|
25
|
+
}
|
|
26
|
+
return definitions;
|
|
40
27
|
}
|
|
41
28
|
getPresentationExchange(args) {
|
|
42
29
|
const { verifiableCredentials, allIdentifiers, hasher } = args;
|
|
43
|
-
return new
|
|
44
|
-
allDIDs: allIdentifiers
|
|
30
|
+
return new PresentationExchange({
|
|
31
|
+
allDIDs: allIdentifiers ?? this.allIdentifiers,
|
|
45
32
|
allVerifiableCredentials: verifiableCredentials,
|
|
46
|
-
hasher: hasher
|
|
33
|
+
hasher: hasher ?? this.hasher,
|
|
47
34
|
});
|
|
48
35
|
}
|
|
49
|
-
createVerifiablePresentations(credentialRole, credentialsWithDefinitions, opts) {
|
|
50
|
-
return
|
|
51
|
-
return yield Promise.all(credentialsWithDefinitions.map((cred) => this.createVerifiablePresentation(credentialRole, cred, opts)));
|
|
52
|
-
});
|
|
36
|
+
async createVerifiablePresentations(credentialRole, credentialsWithDefinitions, opts) {
|
|
37
|
+
return await Promise.all(credentialsWithDefinitions.map((cred) => this.createVerifiablePresentation(credentialRole, cred, opts)));
|
|
53
38
|
}
|
|
54
|
-
createVerifiablePresentation(credentialRole, selectedVerifiableCredentials, opts) {
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
|
|
63
|
-
|
|
64
|
-
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
|
|
74
|
-
|
|
75
|
-
// const firstVC = firstUniqueDC.uniformVerifiableCredential!
|
|
76
|
-
if (typeof firstUniqueDC !== 'object' || !('digitalCredential' in firstUniqueDC)) {
|
|
77
|
-
return Promise.reject(Error('If no opts provided, credentials should be of type UniqueDigitalCredential'));
|
|
78
|
-
}
|
|
79
|
-
idOpts = (0, ssi_sdk_ext_identifier_resolution_1.isOID4VCIssuerIdentifier)(firstUniqueDC.digitalCredential.kmsKeyRef)
|
|
80
|
-
? yield this.session.context.agent.identifierManagedGetByIssuer({
|
|
81
|
-
identifier: firstUniqueDC.digitalCredential.kmsKeyRef,
|
|
82
|
-
})
|
|
83
|
-
: yield this.session.context.agent.identifierManagedGetByKid({
|
|
84
|
-
identifier: firstUniqueDC.digitalCredential.kmsKeyRef,
|
|
85
|
-
kmsKeyRef: firstUniqueDC.digitalCredential.kmsKeyRef,
|
|
86
|
-
});
|
|
87
|
-
/*
|
|
88
|
-
const holder = CredentialMapper.isSdJwtDecodedCredential(firstVC)
|
|
89
|
-
? firstVC.decodedPayload.cnf?.jwk
|
|
90
|
-
? //TODO SDK-19: convert the JWK to hex and search for the appropriate key and associated DID
|
|
91
|
-
//doesn't apply to did:jwk only, as you can represent any DID key as a JWK. So whenever you encounter a JWK it doesn't mean it had to come from a did:jwk in the system. It just can always be represented as a did:jwk
|
|
92
|
-
`did:jwk:${encodeJoseBlob(firstVC.decodedPayload.cnf?.jwk)}#0`
|
|
93
|
-
: firstVC.decodedPayload.sub
|
|
94
|
-
: Array.isArray(firstVC.credentialSubject)
|
|
95
|
-
? firstVC.credentialSubject[0].id
|
|
96
|
-
: firstVC.credentialSubject.id
|
|
97
|
-
if (holder) {
|
|
98
|
-
idOpts = { identifier: holder }
|
|
99
|
-
}
|
|
100
|
-
*/
|
|
39
|
+
async createVerifiablePresentation(credentialRole, selectedVerifiableCredentials, opts) {
|
|
40
|
+
const { subjectIsHolder, holder, forceNoCredentialsInVP = false } = { ...opts };
|
|
41
|
+
if (subjectIsHolder && holder) {
|
|
42
|
+
throw Error('Cannot both have subject is holder and a holderDID value at the same time (programming error)');
|
|
43
|
+
}
|
|
44
|
+
if (forceNoCredentialsInVP) {
|
|
45
|
+
selectedVerifiableCredentials.credentials = [];
|
|
46
|
+
}
|
|
47
|
+
else if (!selectedVerifiableCredentials?.credentials || selectedVerifiableCredentials.credentials.length === 0) {
|
|
48
|
+
throw Error('No verifiable verifiableCredentials provided for presentation definition');
|
|
49
|
+
}
|
|
50
|
+
const proofOptions = {
|
|
51
|
+
...opts?.proofOpts,
|
|
52
|
+
challenge: opts?.proofOpts?.nonce ?? opts?.proofOpts?.challenge ?? this.session.nonce,
|
|
53
|
+
domain: opts?.proofOpts?.domain ?? (await this.session.getRedirectUri()),
|
|
54
|
+
};
|
|
55
|
+
let idOpts = opts?.idOpts;
|
|
56
|
+
if (!idOpts) {
|
|
57
|
+
if (opts?.subjectIsHolder) {
|
|
58
|
+
if (forceNoCredentialsInVP) {
|
|
59
|
+
return Promise.reject(Error(`Cannot have subject is holder, when force no credentials is being used, as we could never determine the holder then. Please provide holderDID`));
|
|
101
60
|
}
|
|
102
|
-
|
|
103
|
-
|
|
61
|
+
const firstUniqueDC = selectedVerifiableCredentials.credentials[0];
|
|
62
|
+
// const firstVC = firstUniqueDC.uniformVerifiableCredential!
|
|
63
|
+
if (typeof firstUniqueDC !== 'object' || !('digitalCredential' in firstUniqueDC)) {
|
|
64
|
+
return Promise.reject(Error('If no opts provided, credentials should be of type UniqueDigitalCredential'));
|
|
104
65
|
}
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
? selectedVerifiableCredentials
|
|
109
|
-
: (opts === null || opts === void 0 ? void 0 : opts.applyFilter)
|
|
110
|
-
? yield this.filterCredentials(credentialRole, selectedVerifiableCredentials.definition, {
|
|
111
|
-
restrictToFormats: opts === null || opts === void 0 ? void 0 : opts.restrictToFormats,
|
|
112
|
-
restrictToDIDMethods: opts === null || opts === void 0 ? void 0 : opts.restrictToDIDMethods,
|
|
113
|
-
filterOpts: {
|
|
114
|
-
verifiableCredentials: selectedVerifiableCredentials.credentials,
|
|
115
|
-
},
|
|
66
|
+
idOpts = isOID4VCIssuerIdentifier(firstUniqueDC.digitalCredential.kmsKeyRef)
|
|
67
|
+
? await this.session.context.agent.identifierManagedGetByIssuer({
|
|
68
|
+
identifier: firstUniqueDC.digitalCredential.kmsKeyRef,
|
|
116
69
|
})
|
|
117
|
-
: {
|
|
118
|
-
|
|
119
|
-
|
|
120
|
-
};
|
|
121
|
-
|
|
122
|
-
|
|
123
|
-
|
|
124
|
-
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
|
|
129
|
-
|
|
130
|
-
|
|
131
|
-
|
|
132
|
-
|
|
133
|
-
const identifier = yield this.session.context.agent.identifierManagedGet(idOpts);
|
|
134
|
-
const verifiableCredentials = vcs.credentials.map((credential) => typeof credential === 'object' && 'digitalCredential' in credential ? credential.originalVerifiableCredential : credential);
|
|
135
|
-
const presentationResult = yield this.getPresentationExchange({
|
|
136
|
-
verifiableCredentials: verifiableCredentials,
|
|
137
|
-
allIdentifiers: this.allIdentifiers,
|
|
138
|
-
hasher: opts === null || opts === void 0 ? void 0 : opts.hasher,
|
|
139
|
-
}).createVerifiablePresentation(vcs.definition.definition, verifiableCredentials, signCallback, Object.assign({ proofOptions }, (identifier && (0, ssi_sdk_ext_identifier_resolution_1.isManagedIdentifierDidResult)(identifier) && { holderDID: identifier.did })));
|
|
140
|
-
const verifiablePresentations = presentationResult.verifiablePresentations.map((verifiablePresentation) => typeof verifiablePresentation !== 'string' &&
|
|
141
|
-
'proof' in verifiablePresentation &&
|
|
142
|
-
'jwt' in verifiablePresentation.proof &&
|
|
143
|
-
verifiablePresentation.proof.jwt
|
|
144
|
-
? verifiablePresentation.proof.jwt
|
|
145
|
-
: verifiablePresentation);
|
|
146
|
-
return Object.assign(Object.assign({}, presentationResult), { verifiablePresentations, verifiableCredentials: verifiableCredentials, definition: selectedVerifiableCredentials.definition, idOpts });
|
|
147
|
-
});
|
|
148
|
-
}
|
|
149
|
-
filterCredentialsAgainstAllDefinitions(credentialRole, opts) {
|
|
150
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
151
|
-
const defs = yield this.getPresentationDefinitions();
|
|
152
|
-
const result = [];
|
|
153
|
-
if (defs) {
|
|
154
|
-
for (const definition of defs) {
|
|
155
|
-
result.push(yield this.filterCredentials(credentialRole, definition, opts));
|
|
70
|
+
: await this.session.context.agent.identifierManagedGetByKid({
|
|
71
|
+
identifier: firstUniqueDC.digitalCredential.kmsKeyRef,
|
|
72
|
+
kmsKeyRef: firstUniqueDC.digitalCredential.kmsKeyRef,
|
|
73
|
+
});
|
|
74
|
+
/*
|
|
75
|
+
const holder = CredentialMapper.isSdJwtDecodedCredential(firstVC)
|
|
76
|
+
? firstVC.decodedPayload.cnf?.jwk
|
|
77
|
+
? //TODO SDK-19: convert the JWK to hex and search for the appropriate key and associated DID
|
|
78
|
+
//doesn't apply to did:jwk only, as you can represent any DID key as a JWK. So whenever you encounter a JWK it doesn't mean it had to come from a did:jwk in the system. It just can always be represented as a did:jwk
|
|
79
|
+
`did:jwk:${encodeJoseBlob(firstVC.decodedPayload.cnf?.jwk)}#0`
|
|
80
|
+
: firstVC.decodedPayload.sub
|
|
81
|
+
: Array.isArray(firstVC.credentialSubject)
|
|
82
|
+
? firstVC.credentialSubject[0].id
|
|
83
|
+
: firstVC.credentialSubject.id
|
|
84
|
+
if (holder) {
|
|
85
|
+
idOpts = { identifier: holder }
|
|
156
86
|
}
|
|
87
|
+
*/
|
|
88
|
+
}
|
|
89
|
+
else if (opts?.holder) {
|
|
90
|
+
idOpts = { identifier: opts.holder };
|
|
157
91
|
}
|
|
158
|
-
|
|
92
|
+
}
|
|
93
|
+
// We are making sure to filter, in case the user submitted all verifiableCredentials in the wallet/agent. We also make sure to get original formats back
|
|
94
|
+
const vcs = forceNoCredentialsInVP
|
|
95
|
+
? selectedVerifiableCredentials
|
|
96
|
+
: opts?.applyFilter
|
|
97
|
+
? await this.filterCredentials(credentialRole, selectedVerifiableCredentials.definition, {
|
|
98
|
+
restrictToFormats: opts?.restrictToFormats,
|
|
99
|
+
restrictToDIDMethods: opts?.restrictToDIDMethods,
|
|
100
|
+
filterOpts: {
|
|
101
|
+
verifiableCredentials: selectedVerifiableCredentials.credentials,
|
|
102
|
+
},
|
|
103
|
+
})
|
|
104
|
+
: {
|
|
105
|
+
definition: selectedVerifiableCredentials.definition,
|
|
106
|
+
credentials: selectedVerifiableCredentials.credentials,
|
|
107
|
+
};
|
|
108
|
+
if (!idOpts) {
|
|
109
|
+
return Promise.reject(Error(`No identifier options present at this point`));
|
|
110
|
+
}
|
|
111
|
+
const signCallback = await createOID4VPPresentationSignCallback({
|
|
112
|
+
presentationSignCallback: this.session.options.presentationSignCallback,
|
|
113
|
+
idOpts,
|
|
114
|
+
context: this.session.context,
|
|
115
|
+
domain: proofOptions.domain,
|
|
116
|
+
challenge: proofOptions.challenge,
|
|
117
|
+
format: opts?.restrictToFormats ?? selectedVerifiableCredentials.definition.definition.format,
|
|
118
|
+
skipDidResolution: opts?.skipDidResolution ?? false,
|
|
159
119
|
});
|
|
160
|
-
|
|
161
|
-
|
|
162
|
-
|
|
163
|
-
|
|
164
|
-
|
|
165
|
-
|
|
166
|
-
|
|
167
|
-
|
|
168
|
-
|
|
169
|
-
|
|
170
|
-
udcMap.set(credential, credential);
|
|
171
|
-
}
|
|
172
|
-
});
|
|
173
|
-
const credentials = (yield this.filterCredentialsWithSelectionStatus(credentialRole, presentationDefinition, Object.assign(Object.assign({}, opts), { filterOpts: {
|
|
174
|
-
verifiableCredentials: (_d = (_c = opts === null || opts === void 0 ? void 0 : opts.filterOpts) === null || _c === void 0 ? void 0 : _c.verifiableCredentials) === null || _d === void 0 ? void 0 : _d.map((credential) => {
|
|
175
|
-
if (typeof credential === 'object' && 'digitalCredential' in credential) {
|
|
176
|
-
return credential.originalVerifiableCredential;
|
|
177
|
-
}
|
|
178
|
-
else {
|
|
179
|
-
return credential;
|
|
180
|
-
}
|
|
181
|
-
}),
|
|
182
|
-
} }))).verifiableCredential;
|
|
183
|
-
return {
|
|
184
|
-
definition: presentationDefinition,
|
|
185
|
-
credentials: (_e = credentials === null || credentials === void 0 ? void 0 : credentials.map((vc) => udcMap.get(vc))) !== null && _e !== void 0 ? _e : [],
|
|
186
|
-
};
|
|
120
|
+
const identifier = await this.session.context.agent.identifierManagedGet(idOpts);
|
|
121
|
+
const verifiableCredentials = vcs.credentials.map((credential) => typeof credential === 'object' && 'digitalCredential' in credential ? credential.originalVerifiableCredential : credential);
|
|
122
|
+
const presentationResult = await this.getPresentationExchange({
|
|
123
|
+
verifiableCredentials: verifiableCredentials,
|
|
124
|
+
allIdentifiers: this.allIdentifiers,
|
|
125
|
+
hasher: opts?.hasher,
|
|
126
|
+
}).createVerifiablePresentation(vcs.definition.definition, verifiableCredentials, signCallback, {
|
|
127
|
+
proofOptions,
|
|
128
|
+
// fixme: Update to newer siop-vp to not require dids here. But when Veramo is creating the VP it's still looking at this field to pass into didManagerGet
|
|
129
|
+
...(identifier && isManagedIdentifierDidResult(identifier) && { holderDID: identifier.did }),
|
|
187
130
|
});
|
|
131
|
+
const verifiablePresentations = presentationResult.verifiablePresentations.map((verifiablePresentation) => typeof verifiablePresentation !== 'string' &&
|
|
132
|
+
'proof' in verifiablePresentation &&
|
|
133
|
+
'jwt' in verifiablePresentation.proof &&
|
|
134
|
+
verifiablePresentation.proof.jwt
|
|
135
|
+
? verifiablePresentation.proof.jwt
|
|
136
|
+
: verifiablePresentation);
|
|
137
|
+
return {
|
|
138
|
+
...presentationResult,
|
|
139
|
+
verifiablePresentations,
|
|
140
|
+
verifiableCredentials: verifiableCredentials,
|
|
141
|
+
definition: selectedVerifiableCredentials.definition,
|
|
142
|
+
idOpts,
|
|
143
|
+
};
|
|
188
144
|
}
|
|
189
|
-
|
|
190
|
-
|
|
191
|
-
|
|
192
|
-
|
|
193
|
-
|
|
194
|
-
|
|
195
|
-
throw Error(JSON.stringify(selectionResults.errors));
|
|
145
|
+
async filterCredentialsAgainstAllDefinitions(credentialRole, opts) {
|
|
146
|
+
const defs = await this.getPresentationDefinitions();
|
|
147
|
+
const result = [];
|
|
148
|
+
if (defs) {
|
|
149
|
+
for (const definition of defs) {
|
|
150
|
+
result.push(await this.filterCredentials(credentialRole, definition, opts));
|
|
196
151
|
}
|
|
197
|
-
|
|
198
|
-
|
|
152
|
+
}
|
|
153
|
+
return result;
|
|
154
|
+
}
|
|
155
|
+
async filterCredentials(credentialRole, presentationDefinition, opts) {
|
|
156
|
+
const udcMap = new Map();
|
|
157
|
+
opts?.filterOpts?.verifiableCredentials?.forEach((credential) => {
|
|
158
|
+
if (typeof credential === 'object' && 'digitalCredential' in credential) {
|
|
159
|
+
udcMap.set(credential.originalVerifiableCredential, credential);
|
|
199
160
|
}
|
|
200
|
-
|
|
201
|
-
|
|
202
|
-
throw Error(JSON.stringify(selectionResults.errors));
|
|
161
|
+
else {
|
|
162
|
+
udcMap.set(credential, credential);
|
|
203
163
|
}
|
|
204
|
-
return selectionResults;
|
|
205
164
|
});
|
|
165
|
+
const credentials = (await this.filterCredentialsWithSelectionStatus(credentialRole, presentationDefinition, {
|
|
166
|
+
...opts,
|
|
167
|
+
filterOpts: {
|
|
168
|
+
verifiableCredentials: opts?.filterOpts?.verifiableCredentials?.map((credential) => {
|
|
169
|
+
if (typeof credential === 'object' && 'digitalCredential' in credential) {
|
|
170
|
+
return credential.originalVerifiableCredential;
|
|
171
|
+
}
|
|
172
|
+
else {
|
|
173
|
+
return credential;
|
|
174
|
+
}
|
|
175
|
+
}),
|
|
176
|
+
},
|
|
177
|
+
})).verifiableCredential;
|
|
178
|
+
return {
|
|
179
|
+
definition: presentationDefinition,
|
|
180
|
+
credentials: credentials?.map((vc) => udcMap.get(vc)) ?? [],
|
|
181
|
+
};
|
|
206
182
|
}
|
|
207
|
-
|
|
208
|
-
|
|
209
|
-
|
|
210
|
-
|
|
211
|
-
|
|
212
|
-
|
|
213
|
-
|
|
214
|
-
|
|
215
|
-
|
|
216
|
-
|
|
217
|
-
|
|
218
|
-
|
|
219
|
-
|
|
183
|
+
async filterCredentialsWithSelectionStatus(credentialRole, presentationDefinition, opts) {
|
|
184
|
+
const selectionResults = await this.getPresentationExchange({
|
|
185
|
+
verifiableCredentials: await this.getCredentials(credentialRole, opts?.filterOpts),
|
|
186
|
+
}).selectVerifiableCredentialsForSubmission(presentationDefinition.definition, opts);
|
|
187
|
+
if (selectionResults.errors && selectionResults.errors.length > 0) {
|
|
188
|
+
throw Error(JSON.stringify(selectionResults.errors));
|
|
189
|
+
}
|
|
190
|
+
else if (selectionResults.areRequiredCredentialsPresent === Status.ERROR) {
|
|
191
|
+
throw Error(`Not all required credentials are available to satisfy the relying party's request`);
|
|
192
|
+
}
|
|
193
|
+
const matches = selectionResults.matches;
|
|
194
|
+
if (!matches || matches.length === 0 || !selectionResults.verifiableCredential || selectionResults.verifiableCredential.length === 0) {
|
|
195
|
+
throw Error(JSON.stringify(selectionResults.errors));
|
|
196
|
+
}
|
|
197
|
+
return selectionResults;
|
|
198
|
+
}
|
|
199
|
+
async getCredentials(credentialRole, filterOpts) {
|
|
200
|
+
if (filterOpts?.verifiableCredentials && filterOpts.verifiableCredentials.length > 0) {
|
|
201
|
+
return filterOpts.verifiableCredentials;
|
|
202
|
+
}
|
|
203
|
+
const filter = verifiableCredentialForRoleFilter(credentialRole, filterOpts?.filter);
|
|
204
|
+
const uniqueCredentials = await this.session.context.agent.crsGetUniqueCredentials({ filter });
|
|
205
|
+
return uniqueCredentials.map((uniqueVC) => {
|
|
206
|
+
const vc = uniqueVC.uniformVerifiableCredential;
|
|
207
|
+
const proof = Array.isArray(vc.proof) ? vc.proof : [vc.proof];
|
|
208
|
+
const jwtProof = proof.find((p) => p?.type === DEFAULT_JWT_PROOF_TYPE);
|
|
209
|
+
return jwtProof ? jwtProof.jwt : vc;
|
|
220
210
|
});
|
|
221
211
|
}
|
|
222
212
|
}
|
|
223
|
-
exports.OID4VP = OID4VP;
|
|
224
213
|
//# sourceMappingURL=OID4VP.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"OID4VP.js","sourceRoot":"","sources":["../../src/session/OID4VP.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"OID4VP.js","sourceRoot":"","sources":["../../src/session/OID4VP.ts"],"names":[],"mappings":"AAAA,OAAO,EAAsC,oBAAoB,EAAE,MAAM,yBAAyB,CAAA;AAClG,OAAO,EAAiB,MAAM,EAA8B,MAAM,eAAe,CAAA;AAEjF,OAAO,EACL,4BAA4B,EAC5B,wBAAwB,GAGzB,MAAM,6CAA6C,CAAA;AACpD,OAAO,EAAE,aAAa,EAAgB,MAAM,wBAAwB,CAAA;AACpE,OAAO,EAA2B,iCAAiC,EAAE,MAAM,oCAAoC,CAAA;AAG/G,OAAO,EACL,sBAAsB,GAKvB,MAAM,UAAU,CAAA;AACjB,OAAO,EAAE,oCAAoC,EAAE,MAAM,aAAa,CAAA;AAGlE,MAAM,OAAO,MAAM;IACA,OAAO,CAAW;IAClB,cAAc,CAAU;IACxB,MAAM,CAAa;IAEpC,YAAoB,IAAiB;QACnC,MAAM,EAAE,OAAO,EAAE,cAAc,EAAE,MAAM,GAAG,aAAa,EAAE,GAAG,IAAI,CAAA;QAEhE,IAAI,CAAC,OAAO,GAAG,OAAO,CAAA;QACtB,IAAI,CAAC,cAAc,GAAG,cAAc,IAAI,EAAE,CAAA;QAC1C,IAAI,CAAC,MAAM,GAAG,MAAM,CAAA;IACtB,CAAC;IAEM,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,OAAkB,EAAE,cAAwB,EAAE,MAAmB;QACxF,OAAO,IAAI,MAAM,CAAC,EAAE,OAAO,EAAE,cAAc,EAAE,cAAc,IAAI,CAAC,MAAM,OAAO,CAAC,gBAAgB,EAAE,CAAC,EAAE,MAAM,EAAE,CAAC,CAAA;IAC9G,CAAC;IAEM,KAAK,CAAC,0BAA0B;QACrC,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,0BAA0B,EAAE,CAAA;QACnE,IAAI,WAAW,EAAE,CAAC;YAChB,oBAAoB,CAAC,8CAA8C,CAAC,WAAW,CAAC,CAAA;QAClF,CAAC;QACD,OAAO,WAAW,CAAA;IACpB,CAAC;IAEO,uBAAuB,CAAC,IAAkC;QAChE,MAAM,EAAE,qBAAqB,EAAE,cAAc,EAAE,MAAM,EAAE,GAAG,IAAI,CAAA;QAE9D,OAAO,IAAI,oBAAoB,CAAC;YAC9B,OAAO,EAAE,cAAc,IAAI,IAAI,CAAC,cAAc;YAC9C,wBAAwB,EAAE,qBAAqB;YAC/C,MAAM,EAAE,MAAM,IAAI,IAAI,CAAC,MAAM;SAC9B,CAAC,CAAA;IACJ,CAAC;IAEM,KAAK,CAAC,6BAA6B,CACxC,cAA8B,EAC9B,0BAAiE,EACjE,IAWC;QAED,OAAO,MAAM,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,4BAA4B,CAAC,cAAc,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,CAAC,CAAA;IACnI,CAAC;IAEM,KAAK,CAAC,4BAA4B,CACvC,cAA8B,EAC9B,6BAAkE,EAClE,IAWC;QAED,MAAM,EAAE,eAAe,EAAE,MAAM,EAAE,sBAAsB,GAAG,KAAK,EAAE,GAAG,EAAE,GAAG,IAAI,EAAE,CAAA;QAC/E,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;YAC9B,MAAM,KAAK,CAAC,+FAA+F,CAAC,CAAA;QAC9G,CAAC;QACD,IAAI,sBAAsB,EAAE,CAAC;YAC3B,6BAA6B,CAAC,WAAW,GAAG,EAAE,CAAA;QAChD,CAAC;aAAM,IAAI,CAAC,6BAA6B,EAAE,WAAW,IAAI,6BAA6B,CAAC,WAAW,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACjH,MAAM,KAAK,CAAC,0EAA0E,CAAC,CAAA;QACzF,CAAC;QAED,MAAM,YAAY,GAAiB;YACjC,GAAG,IAAI,EAAE,SAAS;YAClB,SAAS,EAAE,IAAI,EAAE,SAAS,EAAE,KAAK,IAAI,IAAI,EAAE,SAAS,EAAE,SAAS,IAAI,IAAI,CAAC,OAAO,CAAC,KAAK;YACrF,MAAM,EAAE,IAAI,EAAE,SAAS,EAAE,MAAM,IAAI,CAAC,MAAM,IAAI,CAAC,OAAO,CAAC,cAAc,EAAE,CAAC;SACzE,CAAA;QAED,IAAI,MAAM,GAAG,IAAI,EAAE,MAAM,CAAA;QACzB,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,IAAI,IAAI,EAAE,eAAe,EAAE,CAAC;gBAC1B,IAAI,sBAAsB,EAAE,CAAC;oBAC3B,OAAO,OAAO,CAAC,MAAM,CACnB,KAAK,CACH,+IAA+I,CAChJ,CACF,CAAA;gBACH,CAAC;gBACD,MAAM,aAAa,GAAG,6BAA6B,CAAC,WAAW,CAAC,CAAC,CAAC,CAAA;gBAClE,oEAAoE;gBACpE,IAAI,OAAO,aAAa,KAAK,QAAQ,IAAI,CAAC,CAAC,mBAAmB,IAAI,aAAa,CAAC,EAAE,CAAC;oBACjF,OAAO,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,4EAA4E,CAAC,CAAC,CAAA;gBAC5G,CAAC;gBAED,MAAM,GAAG,wBAAwB,CAAC,aAAa,CAAC,iBAAiB,CAAC,SAAS,CAAC;oBAC1E,CAAC,CAAC,MAAM,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,4BAA4B,CAAC;wBAC5D,UAAU,EAAE,aAAa,CAAC,iBAAiB,CAAC,SAAS;qBACtD,CAAC;oBACJ,CAAC,CAAC,MAAM,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,yBAAyB,CAAC;wBACzD,UAAU,EAAE,aAAa,CAAC,iBAAiB,CAAC,SAAS;wBACrD,SAAS,EAAE,aAAa,CAAC,iBAAiB,CAAC,SAAS;qBACrD,CAAC,CAAA;gBAEN;;;;;;;;;;;;;UAaN;YACI,CAAC;iBAAM,IAAI,IAAI,EAAE,MAAM,EAAE,CAAC;gBACxB,MAAM,GAAG,EAAE,UAAU,EAAE,IAAI,CAAC,MAAM,EAAE,CAAA;YACtC,CAAC;QACH,CAAC;QAED,yJAAyJ;QACzJ,MAAM,GAAG,GAAG,sBAAsB;YAChC,CAAC,CAAC,6BAA6B;YAC/B,CAAC,CAAC,IAAI,EAAE,WAAW;gBACjB,CAAC,CAAC,MAAM,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,6BAA6B,CAAC,UAAU,EAAE;oBACrF,iBAAiB,EAAE,IAAI,EAAE,iBAAiB;oBAC1C,oBAAoB,EAAE,IAAI,EAAE,oBAAoB;oBAChD,UAAU,EAAE;wBACV,qBAAqB,EAAE,6BAA6B,CAAC,WAAW;qBACjE;iBACF,CAAC;gBACJ,CAAC,CAAC;oBACE,UAAU,EAAE,6BAA6B,CAAC,UAAU;oBACpD,WAAW,EAAE,6BAA6B,CAAC,WAAW;iBACvD,CAAA;QAEP,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,OAAO,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,6CAA6C,CAAC,CAAC,CAAA;QAC7E,CAAC;QAED,MAAM,YAAY,GAAG,MAAM,oCAAoC,CAAC;YAC9D,wBAAwB,EAAE,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,wBAAwB;YACvE,MAAM;YACN,OAAO,EAAE,IAAI,CAAC,OAAO,CAAC,OAAO;YAC7B,MAAM,EAAE,YAAY,CAAC,MAAM;YAC3B,SAAS,EAAE,YAAY,CAAC,SAAS;YACjC,MAAM,EAAE,IAAI,EAAE,iBAAiB,IAAI,6BAA6B,CAAC,UAAU,CAAC,UAAU,CAAC,MAAM;YAC7F,iBAAiB,EAAE,IAAI,EAAE,iBAAiB,IAAI,KAAK;SACpD,CAAC,CAAA;QACF,MAAM,UAAU,GAA4B,MAAM,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,oBAAoB,CAAC,MAAM,CAAC,CAAA;QACzG,MAAM,qBAAqB,GAAG,GAAG,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC,UAAU,EAAE,EAAE,CAC/D,OAAO,UAAU,KAAK,QAAQ,IAAI,mBAAmB,IAAI,UAAU,CAAC,CAAC,CAAC,UAAU,CAAC,4BAA6B,CAAC,CAAC,CAAC,UAAU,CAC5H,CAAA;QACD,MAAM,kBAAkB,GAAG,MAAM,IAAI,CAAC,uBAAuB,CAAC;YAC5D,qBAAqB,EAAE,qBAAqB;YAC5C,cAAc,EAAE,IAAI,CAAC,cAAc;YACnC,MAAM,EAAE,IAAI,EAAE,MAAM;SACrB,CAAC,CAAC,4BAA4B,CAAC,GAAG,CAAC,UAAU,CAAC,UAAU,EAAE,qBAAqB,EAAE,YAAY,EAAE;YAC9F,YAAY;YACZ,0JAA0J;YAC1J,GAAG,CAAC,UAAU,IAAI,4BAA4B,CAAC,UAAU,CAAC,IAAI,EAAE,SAAS,EAAE,UAAU,CAAC,GAAG,EAAE,CAAC;SAC7F,CAAC,CAAA;QAEF,MAAM,uBAAuB,GAAG,kBAAkB,CAAC,uBAAuB,CAAC,GAAG,CAAC,CAAC,sBAAsB,EAAE,EAAE,CACxG,OAAO,sBAAsB,KAAK,QAAQ;YAC1C,OAAO,IAAI,sBAAsB;YACjC,KAAK,IAAI,sBAAsB,CAAC,KAAK;YACrC,sBAAsB,CAAC,KAAK,CAAC,GAAG;YAC9B,CAAC,CAAC,sBAAsB,CAAC,KAAK,CAAC,GAAG;YAClC,CAAC,CAAC,sBAAsB,CAC3B,CAAA;QAED,OAAO;YACL,GAAG,kBAAkB;YACrB,uBAAuB;YACvB,qBAAqB,EAAE,qBAAqB;YAC5C,UAAU,EAAE,6BAA6B,CAAC,UAAU;YACpD,MAAM;SACP,CAAA;IACH,CAAC;IAEM,KAAK,CAAC,sCAAsC,CACjD,cAA8B,EAC9B,IAQC;QAED,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,0BAA0B,EAAE,CAAA;QACpD,MAAM,MAAM,GAA0C,EAAE,CAAA;QACxD,IAAI,IAAI,EAAE,CAAC;YACT,KAAK,MAAM,UAAU,IAAI,IAAI,EAAE,CAAC;gBAC9B,MAAM,CAAC,IAAI,CAAC,MAAM,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,UAAU,EAAE,IAAI,CAAC,CAAC,CAAA;YAC7E,CAAC;QACH,CAAC;QACD,OAAO,MAAM,CAAA;IACf,CAAC;IAEM,KAAK,CAAC,iBAAiB,CAC5B,cAA8B,EAC9B,sBAA0D,EAC1D,IAKC;QAED,MAAM,MAAM,GAAG,IAAI,GAAG,EAAwF,CAAA;QAC9G,IAAI,EAAE,UAAU,EAAE,qBAAqB,EAAE,OAAO,CAAC,CAAC,UAAU,EAAE,EAAE;YAC9D,IAAI,OAAO,UAAU,KAAK,QAAQ,IAAI,mBAAmB,IAAI,UAAU,EAAE,CAAC;gBACxE,MAAM,CAAC,GAAG,CAAC,UAAU,CAAC,4BAA6B,EAAE,UAAU,CAAC,CAAA;YAClE,CAAC;iBAAM,CAAC;gBACN,MAAM,CAAC,GAAG,CAAC,UAAU,EAAE,UAAU,CAAC,CAAA;YACpC,CAAC;QACH,CAAC,CAAC,CAAA;QAEF,MAAM,WAAW,GAAG,CAClB,MAAM,IAAI,CAAC,oCAAoC,CAAC,cAAc,EAAE,sBAAsB,EAAE;YACtF,GAAG,IAAI;YACP,UAAU,EAAE;gBACV,qBAAqB,EAAE,IAAI,EAAE,UAAU,EAAE,qBAAqB,EAAE,GAAG,CAAC,CAAC,UAAU,EAAE,EAAE;oBACjF,IAAI,OAAO,UAAU,KAAK,QAAQ,IAAI,mBAAmB,IAAI,UAAU,EAAE,CAAC;wBACxE,OAAO,UAAU,CAAC,4BAA6B,CAAA;oBACjD,CAAC;yBAAM,CAAC;wBACN,OAAO,UAAU,CAAA;oBACnB,CAAC;gBACH,CAAC,CAAC;aACH;SACF,CAAC,CACH,CAAC,oBAAoB,CAAA;QACtB,OAAO;YACL,UAAU,EAAE,sBAAsB;YAClC,WAAW,EAAE,WAAW,EAAE,GAAG,CAAC,CAAC,EAAE,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,CAAE,CAAC,IAAI,EAAE;SAC7D,CAAA;IACH,CAAC;IAEM,KAAK,CAAC,oCAAoC,CAC/C,cAA8B,EAC9B,sBAA0D,EAC1D,IAKC;QAED,MAAM,gBAAgB,GAAkB,MAAM,IAAI,CAAC,uBAAuB,CAAC;YACzE,qBAAqB,EAAE,MAAM,IAAI,CAAC,cAAc,CAAC,cAAc,EAAE,IAAI,EAAE,UAAU,CAAC;SACnF,CAAC,CAAC,wCAAwC,CAAC,sBAAsB,CAAC,UAAU,EAAE,IAAI,CAAC,CAAA;QACpF,IAAI,gBAAgB,CAAC,MAAM,IAAI,gBAAgB,CAAC,MAAM,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAClE,MAAM,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC,CAAA;QACtD,CAAC;aAAM,IAAI,gBAAgB,CAAC,6BAA6B,KAAK,MAAM,CAAC,KAAK,EAAE,CAAC;YAC3E,MAAM,KAAK,CAAC,mFAAmF,CAAC,CAAA;QAClG,CAAC;QAED,MAAM,OAAO,GAA6C,gBAAgB,CAAC,OAAO,CAAA;QAClF,IAAI,CAAC,OAAO,IAAI,OAAO,CAAC,MAAM,KAAK,CAAC,IAAI,CAAC,gBAAgB,CAAC,oBAAoB,IAAI,gBAAgB,CAAC,oBAAoB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACrI,MAAM,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC,CAAA;QACtD,CAAC;QACD,OAAO,gBAAgB,CAAA;IACzB,CAAC;IAEO,KAAK,CAAC,cAAc,CAC1B,cAA8B,EAC9B,UAGC;QAED,IAAI,UAAU,EAAE,qBAAqB,IAAI,UAAU,CAAC,qBAAqB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACrF,OAAO,UAAU,CAAC,qBAAqB,CAAA;QACzC,CAAC;QAED,MAAM,MAAM,GAAG,iCAAiC,CAAC,cAAc,EAAE,UAAU,EAAE,MAAM,CAAC,CAAA;QACpF,MAAM,iBAAiB,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,uBAAuB,CAAC,EAAE,MAAM,EAAE,CAAC,CAAA;QAC9F,OAAO,iBAAiB,CAAC,GAAG,CAAC,CAAC,QAAiC,EAAE,EAAE;YACjE,MAAM,EAAE,GAAG,QAAQ,CAAC,2BAA4B,CAAA;YAChD,MAAM,KAAK,GAAG,KAAK,CAAC,OAAO,CAAC,EAAE,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,KAAK,CAAC,CAAA;YAC7D,MAAM,QAAQ,GAAG,KAAK,CAAC,IAAI,CAAC,CAAC,CAAS,EAAE,EAAE,CAAC,CAAC,EAAE,IAAI,KAAK,sBAAsB,CAAC,CAAA;YAC9E,OAAO,QAAQ,CAAC,CAAC,CAAE,QAAQ,CAAC,GAAkB,CAAC,CAAC,CAAC,EAAE,CAAA;QACrD,CAAC,CAAC,CAAA;IACJ,CAAC;CACF"}
|