@sphereon/ssi-sdk.siopv2-oid4vp-op-auth 0.33.1-feature.vcdm2.tsup.31 → 0.33.1-next.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/agent/DidAuthSiopOpAuthenticator.d.ts +36 -0
- package/dist/agent/DidAuthSiopOpAuthenticator.d.ts.map +1 -0
- package/dist/agent/DidAuthSiopOpAuthenticator.js +392 -0
- package/dist/agent/DidAuthSiopOpAuthenticator.js.map +1 -0
- package/dist/index.d.ts +8 -555
- package/dist/index.d.ts.map +1 -0
- package/dist/index.js +31 -2420
- package/dist/index.js.map +1 -1
- package/dist/link-handler/index.d.ts +22 -0
- package/dist/link-handler/index.d.ts.map +1 -0
- package/dist/link-handler/index.js +57 -0
- package/dist/link-handler/index.js.map +1 -0
- package/dist/localization/Localization.d.ts +9 -0
- package/dist/localization/Localization.d.ts.map +1 -0
- package/dist/localization/Localization.js +46 -0
- package/dist/localization/Localization.js.map +1 -0
- package/dist/localization/translations/en.json +9 -0
- package/dist/localization/translations/nl.json +8 -0
- package/dist/machine/CallbackStateListener.d.ts +3 -0
- package/dist/machine/CallbackStateListener.d.ts.map +1 -0
- package/dist/machine/CallbackStateListener.js +48 -0
- package/dist/machine/CallbackStateListener.js.map +1 -0
- package/dist/machine/Siopv2Machine.d.ts +8 -0
- package/dist/machine/Siopv2Machine.d.ts.map +1 -0
- package/dist/machine/Siopv2Machine.js +364 -0
- package/dist/machine/Siopv2Machine.js.map +1 -0
- package/dist/services/IdentifierService.d.ts +3 -0
- package/dist/services/IdentifierService.d.ts.map +1 -0
- package/dist/services/IdentifierService.js +28 -0
- package/dist/services/IdentifierService.js.map +1 -0
- package/dist/services/Siopv2MachineService.d.ts +18 -0
- package/dist/services/Siopv2MachineService.d.ts.map +1 -0
- package/dist/services/Siopv2MachineService.js +299 -0
- package/dist/services/Siopv2MachineService.js.map +1 -0
- package/dist/session/OID4VP.d.ts +72 -0
- package/dist/session/OID4VP.d.ts.map +1 -0
- package/dist/session/OID4VP.js +224 -0
- package/dist/session/OID4VP.js.map +1 -0
- package/dist/session/OpSession.d.ts +39 -0
- package/dist/session/OpSession.d.ts.map +1 -0
- package/dist/session/OpSession.js +365 -0
- package/dist/session/OpSession.js.map +1 -0
- package/dist/session/functions.d.ts +37 -0
- package/dist/session/functions.d.ts.map +1 -0
- package/dist/session/functions.js +163 -0
- package/dist/session/functions.js.map +1 -0
- package/dist/session/index.d.ts +4 -0
- package/dist/session/index.d.ts.map +1 -0
- package/dist/session/index.js +20 -0
- package/dist/session/index.js.map +1 -0
- package/dist/types/IDidAuthSiopOpAuthenticator.d.ts +120 -0
- package/dist/types/IDidAuthSiopOpAuthenticator.d.ts.map +1 -0
- package/dist/types/IDidAuthSiopOpAuthenticator.js +10 -0
- package/dist/types/IDidAuthSiopOpAuthenticator.js.map +1 -0
- package/dist/types/error/index.d.ts +8 -0
- package/dist/types/error/index.d.ts.map +1 -0
- package/dist/types/error/index.js +3 -0
- package/dist/types/error/index.js.map +1 -0
- package/dist/types/identifier/index.d.ts +53 -0
- package/dist/types/identifier/index.d.ts.map +1 -0
- package/dist/types/identifier/index.js +5 -0
- package/dist/types/identifier/index.js.map +1 -0
- package/dist/types/index.d.ts +6 -0
- package/dist/types/index.d.ts.map +1 -0
- package/dist/types/index.js +22 -0
- package/dist/types/index.js.map +1 -0
- package/dist/types/machine/index.d.ts +124 -0
- package/dist/types/machine/index.d.ts.map +1 -0
- package/dist/types/machine/index.js +57 -0
- package/dist/types/machine/index.js.map +1 -0
- package/dist/types/siop-service/index.d.ts +80 -0
- package/dist/types/siop-service/index.d.ts.map +1 -0
- package/dist/types/siop-service/index.js +14 -0
- package/dist/types/siop-service/index.js.map +1 -0
- package/dist/utils/CredentialUtils.d.ts +23 -0
- package/dist/utils/CredentialUtils.d.ts.map +1 -0
- package/dist/utils/CredentialUtils.js +65 -0
- package/dist/utils/CredentialUtils.js.map +1 -0
- package/dist/utils/dcql.d.ts +5 -0
- package/dist/utils/dcql.d.ts.map +1 -0
- package/dist/utils/dcql.js +37 -0
- package/dist/utils/dcql.js.map +1 -0
- package/package.json +30 -40
- package/src/agent/DidAuthSiopOpAuthenticator.ts +14 -13
- package/src/session/OpSession.ts +13 -13
- package/dist/index.cjs +0 -2451
- package/dist/index.cjs.map +0 -1
- package/dist/index.d.cts +0 -559
|
@@ -0,0 +1,28 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
+
});
|
|
10
|
+
};
|
|
11
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
+
exports.getIdentifierWithKey = void 0;
|
|
13
|
+
const ssi_sdk_ext_did_resolver_jwk_1 = require("@sphereon/ssi-sdk-ext.did-resolver-jwk");
|
|
14
|
+
const ssi_sdk_ext_did_utils_1 = require("@sphereon/ssi-sdk-ext.did-utils");
|
|
15
|
+
const getIdentifierWithKey = (args) => __awaiter(void 0, void 0, void 0, function* () {
|
|
16
|
+
var _a;
|
|
17
|
+
const { keyOpts, context } = args;
|
|
18
|
+
const agentContext = Object.assign(Object.assign({}, context), { agent: context.agent });
|
|
19
|
+
const identifier = (_a = keyOpts.identifier) !== null && _a !== void 0 ? _a : (yield (0, ssi_sdk_ext_did_utils_1.getOrCreatePrimaryIdentifier)(agentContext, {
|
|
20
|
+
method: keyOpts.didMethod,
|
|
21
|
+
createOpts: { options: { type: keyOpts.keyType, use: ssi_sdk_ext_did_resolver_jwk_1.KeyUse.Signature, codecName: keyOpts.codecName } },
|
|
22
|
+
}));
|
|
23
|
+
const key = yield (0, ssi_sdk_ext_did_utils_1.getAuthenticationKey)({ identifier, keyType: keyOpts.keyType }, agentContext);
|
|
24
|
+
const kid = key.meta.verificationMethod.id;
|
|
25
|
+
return { identifier, key, kid };
|
|
26
|
+
});
|
|
27
|
+
exports.getIdentifierWithKey = getIdentifierWithKey;
|
|
28
|
+
//# sourceMappingURL=IdentifierService.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"IdentifierService.js","sourceRoot":"","sources":["../../src/services/IdentifierService.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,yFAA+D;AAG/D,2EAAoG;AAE7F,MAAM,oBAAoB,GAAG,CAAO,IAAuB,EAA8B,EAAE;;IAChG,MAAM,EAAE,OAAO,EAAE,OAAO,EAAE,GAAG,IAAI,CAAA;IACjC,MAAM,YAAY,mCAAQ,OAAO,KAAE,KAAK,EAAE,OAAO,CAAC,KAAkB,GAAE,CAAA;IAEtE,MAAM,UAAU,GACd,MAAA,OAAO,CAAC,UAAU,mCAClB,CAAC,MAAM,IAAA,oDAA4B,EAAC,YAAY,EAAE;QAChD,MAAM,EAAE,OAAO,CAAC,SAAS;QACzB,UAAU,EAAE,EAAE,OAAO,EAAE,EAAE,IAAI,EAAE,OAAO,CAAC,OAAO,EAAE,GAAG,EAAE,qCAAM,CAAC,SAAS,EAAE,SAAS,EAAE,OAAO,CAAC,SAAS,EAAE,EAAE;KACxG,CAAC,CAAC,CAAA;IACL,MAAM,GAAG,GAAkB,MAAM,IAAA,4CAAoB,EAAC,EAAE,UAAU,EAAE,OAAO,EAAE,OAAO,CAAC,OAAO,EAAE,EAAE,YAAY,CAAC,CAAA;IAC7G,MAAM,GAAG,GAAW,GAAG,CAAC,IAAI,CAAC,kBAAkB,CAAC,EAAE,CAAA;IAElD,OAAO,EAAE,UAAU,EAAE,GAAG,EAAE,GAAG,EAAE,CAAA;AACjC,CAAC,CAAA,CAAA;AAdY,QAAA,oBAAoB,wBAchC"}
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
import { IPresentationDefinition } from '@sphereon/pex';
|
|
2
|
+
import { ManagedIdentifierOptsOrResult } from '@sphereon/ssi-sdk-ext.identifier-resolution';
|
|
3
|
+
import { ConnectionType } from '@sphereon/ssi-sdk.data-store';
|
|
4
|
+
import { HasherSync } from '@sphereon/ssi-types';
|
|
5
|
+
import { RequiredContext, SelectableCredentialsMap, VerifiableCredentialsWithDefinition } from '../types';
|
|
6
|
+
import { DcqlQuery } from 'dcql';
|
|
7
|
+
export declare const logger: import("@sphereon/ssi-types").ISimpleLogger<unknown>;
|
|
8
|
+
export declare const siopSendAuthorizationResponse: (connectionType: ConnectionType, args: {
|
|
9
|
+
sessionId: string;
|
|
10
|
+
verifiableCredentialsWithDefinition?: VerifiableCredentialsWithDefinition[];
|
|
11
|
+
idOpts?: ManagedIdentifierOptsOrResult;
|
|
12
|
+
isFirstParty?: boolean;
|
|
13
|
+
hasher?: HasherSync;
|
|
14
|
+
dcqlQuery?: DcqlQuery;
|
|
15
|
+
}, context: RequiredContext) => Promise<Response>;
|
|
16
|
+
export declare const getSelectableCredentials: (presentationDefinition: IPresentationDefinition, context: RequiredContext) => Promise<SelectableCredentialsMap>;
|
|
17
|
+
export declare const translateCorrelationIdToName: (correlationId: string, context: RequiredContext) => Promise<string | undefined>;
|
|
18
|
+
//# sourceMappingURL=Siopv2MachineService.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"Siopv2MachineService.d.ts","sourceRoot":"","sources":["../../src/services/Siopv2MachineService.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,uBAAuB,EAAO,MAAM,eAAe,CAAA;AAE5D,OAAO,EAA4B,6BAA6B,EAAE,MAAM,6CAA6C,CAAA;AAErH,OAAO,EAAE,cAAc,EAAkB,MAAM,8BAA8B,CAAA;AAC7E,OAAO,EAAoB,UAAU,EAAiE,MAAM,qBAAqB,CAAA;AAEjI,OAAO,EAGL,eAAe,EAEf,wBAAwB,EAGxB,mCAAmC,EAEpC,MAAM,UAAU,CAAA;AAIjB,OAAO,EAAgE,SAAS,EAAE,MAAM,MAAM,CAAA;AAI9F,eAAO,MAAM,MAAM,sDAAwC,CAAA;AAqB3D,eAAO,MAAM,6BAA6B,mBACxB,cAAc,QACxB;IACJ,SAAS,EAAE,MAAM,CAAA;IACjB,mCAAmC,CAAC,EAAE,mCAAmC,EAAE,CAAA;IAC3E,MAAM,CAAC,EAAE,6BAA6B,CAAA;IACtC,YAAY,CAAC,EAAE,OAAO,CAAA;IACtB,MAAM,CAAC,EAAE,UAAU,CAAA;IACnB,SAAS,CAAC,EAAE,SAAS,CAAA;CACtB,WACQ,eAAe,sBA6NzB,CAAA;AAYD,eAAO,MAAM,wBAAwB,2BACX,uBAAuB,WACtC,eAAe,KACvB,OAAO,CAAC,wBAAwB,CA8ClC,CAAA;AAED,eAAO,MAAM,4BAA4B,kBAAyB,MAAM,WAAW,eAAe,KAAG,OAAO,CAAC,MAAM,GAAG,SAAS,CAY9H,CAAA"}
|
|
@@ -0,0 +1,299 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
+
});
|
|
10
|
+
};
|
|
11
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
+
exports.translateCorrelationIdToName = exports.getSelectableCredentials = exports.siopSendAuthorizationResponse = exports.logger = void 0;
|
|
13
|
+
const did_auth_siop_1 = require("@sphereon/did-auth-siop");
|
|
14
|
+
const pex_1 = require("@sphereon/pex");
|
|
15
|
+
const ssi_sdk_ext_identifier_resolution_1 = require("@sphereon/ssi-sdk-ext.identifier-resolution");
|
|
16
|
+
const ssi_sdk_credential_store_1 = require("@sphereon/ssi-sdk.credential-store");
|
|
17
|
+
const ssi_sdk_data_store_1 = require("@sphereon/ssi-sdk.data-store");
|
|
18
|
+
const ssi_types_1 = require("@sphereon/ssi-types");
|
|
19
|
+
const types_1 = require("../types");
|
|
20
|
+
const ssi_sdk_ext_did_utils_1 = require("@sphereon/ssi-sdk-ext.did-utils");
|
|
21
|
+
const ssi_sdk_core_1 = require("@sphereon/ssi-sdk.core");
|
|
22
|
+
const dcql_1 = require("dcql");
|
|
23
|
+
const dcql_2 = require("../utils/dcql");
|
|
24
|
+
const CredentialUtils_1 = require("../utils/CredentialUtils");
|
|
25
|
+
exports.logger = ssi_types_1.Loggers.DEFAULT.get(types_1.LOGGER_NAMESPACE);
|
|
26
|
+
const createEbsiIdentifier = (agentContext) => __awaiter(void 0, void 0, void 0, function* () {
|
|
27
|
+
exports.logger.log(`No EBSI key present yet. Creating a new one...`);
|
|
28
|
+
const { result: newIdentifier, created } = yield (0, ssi_sdk_ext_did_utils_1.getOrCreatePrimaryIdentifier)(agentContext, {
|
|
29
|
+
method: ssi_sdk_ext_did_utils_1.SupportedDidMethodEnum.DID_KEY,
|
|
30
|
+
createOpts: { options: { codecName: 'jwk_jcs-pub', type: 'Secp256r1' } },
|
|
31
|
+
});
|
|
32
|
+
exports.logger.log(`EBSI key created: ${newIdentifier.did}`);
|
|
33
|
+
if (created) {
|
|
34
|
+
yield agentContext.agent.emit(types_1.Siopv2HolderEvent.IDENTIFIER_CREATED, { result: newIdentifier });
|
|
35
|
+
}
|
|
36
|
+
return yield agentContext.agent.identifierManagedGetByDid({ identifier: newIdentifier.did });
|
|
37
|
+
});
|
|
38
|
+
const hasEbsiClient = (authorizationRequest) => __awaiter(void 0, void 0, void 0, function* () {
|
|
39
|
+
const clientId = yield authorizationRequest.getMergedProperty('client_id');
|
|
40
|
+
const redirectUri = yield authorizationRequest.getMergedProperty('redirect_uri');
|
|
41
|
+
return (clientId === null || clientId === void 0 ? void 0 : clientId.toLowerCase().includes('.ebsi.eu')) || (redirectUri === null || redirectUri === void 0 ? void 0 : redirectUri.toLowerCase().includes('.ebsi.eu'));
|
|
42
|
+
});
|
|
43
|
+
const siopSendAuthorizationResponse = (connectionType, args, context) => __awaiter(void 0, void 0, void 0, function* () {
|
|
44
|
+
var _a, _b, _c, _d, _e, _f, _g, _h, _j, _k, _l, _m, _o, _p, _q, _r, _s;
|
|
45
|
+
const { agent } = context;
|
|
46
|
+
const agentContext = Object.assign(Object.assign({}, context), { agent: context.agent });
|
|
47
|
+
let { idOpts, isFirstParty, hasher = ssi_sdk_core_1.defaultHasher } = args;
|
|
48
|
+
if (connectionType !== ssi_sdk_data_store_1.ConnectionType.SIOPv2_OpenID4VP) {
|
|
49
|
+
return Promise.reject(Error(`No supported authentication provider for type: ${connectionType}`));
|
|
50
|
+
}
|
|
51
|
+
const session = yield agent.siopGetOPSession({ sessionId: args.sessionId });
|
|
52
|
+
const request = yield session.getAuthorizationRequest();
|
|
53
|
+
const aud = yield request.authorizationRequest.getMergedProperty('aud');
|
|
54
|
+
exports.logger.debug(`AUD: ${aud}`);
|
|
55
|
+
exports.logger.debug(JSON.stringify(request.authorizationRequest));
|
|
56
|
+
let presentationsAndDefs;
|
|
57
|
+
let presentationSubmission;
|
|
58
|
+
if (yield session.hasPresentationDefinitions()) {
|
|
59
|
+
const oid4vp = yield session.getOID4VP({ hasher });
|
|
60
|
+
const credentialsAndDefinitions = args.verifiableCredentialsWithDefinition
|
|
61
|
+
? args.verifiableCredentialsWithDefinition
|
|
62
|
+
: yield oid4vp.filterCredentialsAgainstAllDefinitions(ssi_sdk_data_store_1.CredentialRole.HOLDER);
|
|
63
|
+
const domain = (_b = (_a = (yield request.authorizationRequest.getMergedProperty('client_id'))) !== null && _a !== void 0 ? _a : request.issuer) !== null && _b !== void 0 ? _b : (request.versions.includes(did_auth_siop_1.SupportedVersion.JWT_VC_PRESENTATION_PROFILE_v1)
|
|
64
|
+
? 'https://self-issued.me/v2/openid-vc'
|
|
65
|
+
: 'https://self-issued.me/v2');
|
|
66
|
+
exports.logger.log(`NONCE: ${session.nonce}, domain: ${domain}`);
|
|
67
|
+
const firstUniqueDC = credentialsAndDefinitions[0].credentials[0];
|
|
68
|
+
if (typeof firstUniqueDC !== 'object' || !('digitalCredential' in firstUniqueDC)) {
|
|
69
|
+
return Promise.reject(Error('SiopMachine only supports UniqueDigitalCredentials for now'));
|
|
70
|
+
}
|
|
71
|
+
let identifier;
|
|
72
|
+
const digitalCredential = firstUniqueDC.digitalCredential;
|
|
73
|
+
const firstVC = firstUniqueDC.uniformVerifiableCredential;
|
|
74
|
+
const holder = ssi_types_1.CredentialMapper.isSdJwtDecodedCredential(firstVC)
|
|
75
|
+
? ((_c = firstVC.decodedPayload.cnf) === null || _c === void 0 ? void 0 : _c.jwk)
|
|
76
|
+
? //TODO SDK-19: convert the JWK to hex and search for the appropriate key and associated DID
|
|
77
|
+
//doesn't apply to did:jwk only, as you can represent any DID key as a JWK. So whenever you encounter a JWK it doesn't mean it had to come from a did:jwk in the system. It just can always be represented as a did:jwk
|
|
78
|
+
`did:jwk:${(0, ssi_sdk_core_1.encodeJoseBlob)((_d = firstVC.decodedPayload.cnf) === null || _d === void 0 ? void 0 : _d.jwk)}#0`
|
|
79
|
+
: firstVC.decodedPayload.sub
|
|
80
|
+
: Array.isArray(firstVC.credentialSubject)
|
|
81
|
+
? firstVC.credentialSubject[0].id
|
|
82
|
+
: firstVC.credentialSubject.id;
|
|
83
|
+
if (!digitalCredential.kmsKeyRef) {
|
|
84
|
+
// In case the store does not have the kmsKeyRef lets search for the holder
|
|
85
|
+
if (!holder) {
|
|
86
|
+
return Promise.reject(`No holder found and no kmsKeyRef in DB. Cannot determine identifier to use`);
|
|
87
|
+
}
|
|
88
|
+
try {
|
|
89
|
+
identifier = yield session.context.agent.identifierManagedGet({ identifier: holder });
|
|
90
|
+
}
|
|
91
|
+
catch (e) {
|
|
92
|
+
exports.logger.debug(`Holder DID not found: ${holder}`);
|
|
93
|
+
throw e;
|
|
94
|
+
}
|
|
95
|
+
}
|
|
96
|
+
else if ((0, ssi_sdk_ext_identifier_resolution_1.isOID4VCIssuerIdentifier)(digitalCredential.kmsKeyRef)) {
|
|
97
|
+
identifier = yield session.context.agent.identifierManagedGetByOID4VCIssuer({
|
|
98
|
+
identifier: firstUniqueDC.digitalCredential.kmsKeyRef,
|
|
99
|
+
});
|
|
100
|
+
}
|
|
101
|
+
else {
|
|
102
|
+
switch (digitalCredential.subjectCorrelationType) {
|
|
103
|
+
case 'DID':
|
|
104
|
+
identifier = yield session.context.agent.identifierManagedGetByDid({
|
|
105
|
+
identifier: (_e = digitalCredential.subjectCorrelationId) !== null && _e !== void 0 ? _e : holder,
|
|
106
|
+
kmsKeyRef: digitalCredential.kmsKeyRef,
|
|
107
|
+
});
|
|
108
|
+
break;
|
|
109
|
+
// TODO other implementations?
|
|
110
|
+
default:
|
|
111
|
+
if (((_f = digitalCredential.subjectCorrelationId) === null || _f === void 0 ? void 0 : _f.startsWith('did:')) || (holder === null || holder === void 0 ? void 0 : holder.startsWith('did:'))) {
|
|
112
|
+
identifier = yield session.context.agent.identifierManagedGetByDid({
|
|
113
|
+
identifier: (_g = digitalCredential.subjectCorrelationId) !== null && _g !== void 0 ? _g : holder,
|
|
114
|
+
kmsKeyRef: digitalCredential.kmsKeyRef,
|
|
115
|
+
});
|
|
116
|
+
}
|
|
117
|
+
else {
|
|
118
|
+
// Since we are using the kmsKeyRef we will find the KID regardless of the identifier. We set it for later access though
|
|
119
|
+
identifier = yield session.context.agent.identifierManagedGetByKid({
|
|
120
|
+
identifier: (_j = (_h = digitalCredential.subjectCorrelationId) !== null && _h !== void 0 ? _h : holder) !== null && _j !== void 0 ? _j : digitalCredential.kmsKeyRef,
|
|
121
|
+
kmsKeyRef: digitalCredential.kmsKeyRef,
|
|
122
|
+
});
|
|
123
|
+
}
|
|
124
|
+
}
|
|
125
|
+
}
|
|
126
|
+
if (identifier === undefined && idOpts !== undefined && (yield hasEbsiClient(request.authorizationRequest))) {
|
|
127
|
+
identifier = yield createEbsiIdentifier(agentContext);
|
|
128
|
+
}
|
|
129
|
+
exports.logger.debug(`Identifier`, identifier);
|
|
130
|
+
// TODO Add mdoc support
|
|
131
|
+
presentationsAndDefs = yield oid4vp.createVerifiablePresentations(ssi_sdk_data_store_1.CredentialRole.HOLDER, credentialsAndDefinitions, {
|
|
132
|
+
idOpts: identifier,
|
|
133
|
+
proofOpts: {
|
|
134
|
+
nonce: session.nonce,
|
|
135
|
+
domain,
|
|
136
|
+
},
|
|
137
|
+
});
|
|
138
|
+
if (!presentationsAndDefs || presentationsAndDefs.length === 0) {
|
|
139
|
+
throw Error('No verifiable presentations could be created');
|
|
140
|
+
}
|
|
141
|
+
else if (presentationsAndDefs.length > 1) {
|
|
142
|
+
throw Error(`Only one verifiable presentation supported for now. Got ${presentationsAndDefs.length}`);
|
|
143
|
+
}
|
|
144
|
+
idOpts = presentationsAndDefs[0].idOpts;
|
|
145
|
+
presentationSubmission = presentationsAndDefs[0].presentationSubmission;
|
|
146
|
+
exports.logger.log(`Definitions and locations:`, JSON.stringify((_k = presentationsAndDefs === null || presentationsAndDefs === void 0 ? void 0 : presentationsAndDefs[0]) === null || _k === void 0 ? void 0 : _k.verifiablePresentations, null, 2));
|
|
147
|
+
exports.logger.log(`Presentation Submission:`, JSON.stringify(presentationSubmission, null, 2));
|
|
148
|
+
const mergedVerifiablePresentations = (presentationsAndDefs === null || presentationsAndDefs === void 0 ? void 0 : presentationsAndDefs.flatMap((pd) => pd.verifiablePresentations)) || [];
|
|
149
|
+
return yield session.sendAuthorizationResponse(Object.assign(Object.assign(Object.assign({}, (presentationsAndDefs && { verifiablePresentations: mergedVerifiablePresentations })), (presentationSubmission && { presentationSubmission })), {
|
|
150
|
+
// todo: Change issuer value in case we do not use identifier. Use key.meta.jwkThumbprint then
|
|
151
|
+
responseSignerOpts: idOpts, isFirstParty }));
|
|
152
|
+
}
|
|
153
|
+
else if (request.dcqlQuery) {
|
|
154
|
+
if (args.verifiableCredentialsWithDefinition !== undefined && args.verifiableCredentialsWithDefinition !== null) {
|
|
155
|
+
const vcs = args.verifiableCredentialsWithDefinition.flatMap((vcd) => vcd.credentials);
|
|
156
|
+
const domain = (_m = (_l = (yield request.authorizationRequest.getMergedProperty('client_id'))) !== null && _l !== void 0 ? _l : request.issuer) !== null && _m !== void 0 ? _m : (request.versions.includes(did_auth_siop_1.SupportedVersion.JWT_VC_PRESENTATION_PROFILE_v1)
|
|
157
|
+
? 'https://self-issued.me/v2/openid-vc'
|
|
158
|
+
: 'https://self-issued.me/v2');
|
|
159
|
+
exports.logger.debug(`NONCE: ${session.nonce}, domain: ${domain}`);
|
|
160
|
+
const firstUniqueDC = vcs[0];
|
|
161
|
+
if (typeof firstUniqueDC !== 'object' || !('digitalCredential' in firstUniqueDC)) {
|
|
162
|
+
return Promise.reject(Error('SiopMachine only supports UniqueDigitalCredentials for now'));
|
|
163
|
+
}
|
|
164
|
+
let identifier;
|
|
165
|
+
const digitalCredential = firstUniqueDC.digitalCredential;
|
|
166
|
+
const firstVC = firstUniqueDC.uniformVerifiableCredential;
|
|
167
|
+
const holder = ssi_types_1.CredentialMapper.isSdJwtDecodedCredential(firstVC)
|
|
168
|
+
? ((_o = firstVC.decodedPayload.cnf) === null || _o === void 0 ? void 0 : _o.jwk)
|
|
169
|
+
? //TODO SDK-19: convert the JWK to hex and search for the appropriate key and associated DID
|
|
170
|
+
//doesn't apply to did:jwk only, as you can represent any DID key as a JWK. So whenever you encounter a JWK it doesn't mean it had to come from a did:jwk in the system. It just can always be represented as a did:jwk
|
|
171
|
+
`did:jwk:${(0, ssi_sdk_core_1.encodeJoseBlob)((_p = firstVC.decodedPayload.cnf) === null || _p === void 0 ? void 0 : _p.jwk)}#0`
|
|
172
|
+
: firstVC.decodedPayload.sub
|
|
173
|
+
: Array.isArray(firstVC.credentialSubject)
|
|
174
|
+
? firstVC.credentialSubject[0].id
|
|
175
|
+
: firstVC.credentialSubject.id;
|
|
176
|
+
if (!digitalCredential.kmsKeyRef) {
|
|
177
|
+
// In case the store does not have the kmsKeyRef lets search for the holder
|
|
178
|
+
if (!holder) {
|
|
179
|
+
return Promise.reject(`No holder found and no kmsKeyRef in DB. Cannot determine identifier to use`);
|
|
180
|
+
}
|
|
181
|
+
try {
|
|
182
|
+
identifier = yield session.context.agent.identifierManagedGet({ identifier: holder });
|
|
183
|
+
}
|
|
184
|
+
catch (e) {
|
|
185
|
+
exports.logger.debug(`Holder DID not found: ${holder}`);
|
|
186
|
+
throw e;
|
|
187
|
+
}
|
|
188
|
+
}
|
|
189
|
+
else if ((0, ssi_sdk_ext_identifier_resolution_1.isOID4VCIssuerIdentifier)(digitalCredential.kmsKeyRef)) {
|
|
190
|
+
identifier = yield session.context.agent.identifierManagedGetByOID4VCIssuer({
|
|
191
|
+
identifier: firstUniqueDC.digitalCredential.kmsKeyRef,
|
|
192
|
+
});
|
|
193
|
+
}
|
|
194
|
+
else {
|
|
195
|
+
switch (digitalCredential.subjectCorrelationType) {
|
|
196
|
+
case 'DID':
|
|
197
|
+
identifier = yield session.context.agent.identifierManagedGetByDid({
|
|
198
|
+
identifier: (_q = digitalCredential.subjectCorrelationId) !== null && _q !== void 0 ? _q : holder,
|
|
199
|
+
kmsKeyRef: digitalCredential.kmsKeyRef,
|
|
200
|
+
});
|
|
201
|
+
break;
|
|
202
|
+
// TODO other implementations?
|
|
203
|
+
default:
|
|
204
|
+
// Since we are using the kmsKeyRef we will find the KID regardless of the identifier. We set it for later access though
|
|
205
|
+
identifier = yield session.context.agent.identifierManagedGetByKid({
|
|
206
|
+
identifier: (_s = (_r = digitalCredential.subjectCorrelationId) !== null && _r !== void 0 ? _r : holder) !== null && _s !== void 0 ? _s : digitalCredential.kmsKeyRef,
|
|
207
|
+
kmsKeyRef: digitalCredential.kmsKeyRef,
|
|
208
|
+
});
|
|
209
|
+
}
|
|
210
|
+
}
|
|
211
|
+
console.log(`Identifier`, identifier);
|
|
212
|
+
const dcqlRepresentations = [];
|
|
213
|
+
vcs.forEach((vc) => {
|
|
214
|
+
const rep = (0, dcql_2.convertToDcqlCredentials)(vc, args.hasher);
|
|
215
|
+
if (rep) {
|
|
216
|
+
dcqlRepresentations.push(rep);
|
|
217
|
+
}
|
|
218
|
+
});
|
|
219
|
+
const queryResult = dcql_1.DcqlQuery.query(request.dcqlQuery, dcqlRepresentations);
|
|
220
|
+
const presentation = {};
|
|
221
|
+
for (const [key, value] of Object.entries(queryResult.credential_matches)) {
|
|
222
|
+
const allMatches = Array.isArray(value) ? value : [value];
|
|
223
|
+
allMatches.forEach((match) => {
|
|
224
|
+
if (match.success) {
|
|
225
|
+
const originalCredential = (0, CredentialUtils_1.getOriginalVerifiableCredential)(vcs[match.input_credential_index]);
|
|
226
|
+
if (!originalCredential) {
|
|
227
|
+
throw new Error(`Index ${match.input_credential_index} out of range in credentials array`);
|
|
228
|
+
}
|
|
229
|
+
presentation[key] =
|
|
230
|
+
originalCredential['compactSdJwtVc'] !== undefined ? originalCredential.compactSdJwtVc : originalCredential;
|
|
231
|
+
}
|
|
232
|
+
});
|
|
233
|
+
}
|
|
234
|
+
const response = session.sendAuthorizationResponse(Object.assign({ responseSignerOpts: identifier }, { dcqlQuery: { dcqlPresentation: dcql_1.DcqlPresentation.parse(presentation) } }));
|
|
235
|
+
exports.logger.debug(`Response: `, response);
|
|
236
|
+
return response;
|
|
237
|
+
}
|
|
238
|
+
}
|
|
239
|
+
throw Error('Presentation Definition or DCQL is required');
|
|
240
|
+
});
|
|
241
|
+
exports.siopSendAuthorizationResponse = siopSendAuthorizationResponse;
|
|
242
|
+
function buildPartialPD(inputDescriptor, presentationDefinition) {
|
|
243
|
+
return Object.assign(Object.assign({}, presentationDefinition), { input_descriptors: [inputDescriptor] });
|
|
244
|
+
}
|
|
245
|
+
const getSelectableCredentials = (presentationDefinition, context) => __awaiter(void 0, void 0, void 0, function* () {
|
|
246
|
+
var _a;
|
|
247
|
+
const agentContext = Object.assign(Object.assign({}, context), { agent: context.agent });
|
|
248
|
+
const { agent } = agentContext;
|
|
249
|
+
const pex = new pex_1.PEX();
|
|
250
|
+
const uniqueVerifiableCredentials = yield agent.crsGetUniqueCredentials({
|
|
251
|
+
filter: (0, ssi_sdk_credential_store_1.verifiableCredentialForRoleFilter)(ssi_sdk_data_store_1.CredentialRole.HOLDER),
|
|
252
|
+
});
|
|
253
|
+
const credentialBranding = yield agent.ibGetCredentialBranding();
|
|
254
|
+
const selectableCredentialsMap = new Map();
|
|
255
|
+
for (const inputDescriptor of presentationDefinition.input_descriptors) {
|
|
256
|
+
const partialPD = buildPartialPD(inputDescriptor, presentationDefinition);
|
|
257
|
+
const originalCredentials = uniqueVerifiableCredentials.map((uniqueVC) => {
|
|
258
|
+
return ssi_types_1.CredentialMapper.storedCredentialToOriginalFormat(uniqueVC.originalVerifiableCredential); // ( ! is valid for verifiableCredentialForRoleFilter )
|
|
259
|
+
});
|
|
260
|
+
const selectionResults = pex.selectFrom(partialPD, originalCredentials);
|
|
261
|
+
const selectableCredentials = [];
|
|
262
|
+
for (const selectedCredential of selectionResults.verifiableCredential || []) {
|
|
263
|
+
const filteredUniqueVC = uniqueVerifiableCredentials.find((uniqueVC) => {
|
|
264
|
+
const proof = uniqueVC.uniformVerifiableCredential.proof;
|
|
265
|
+
return Array.isArray(proof) ? proof.some((proofItem) => proofItem.jwt === selectedCredential) : proof.jwt === selectedCredential;
|
|
266
|
+
});
|
|
267
|
+
if (filteredUniqueVC) {
|
|
268
|
+
const filteredCredentialBrandings = credentialBranding.filter((cb) => cb.vcHash === filteredUniqueVC.hash);
|
|
269
|
+
const issuerPartyIdentity = yield agent.cmGetContacts({
|
|
270
|
+
filter: [{ identities: { identifier: { correlationId: filteredUniqueVC.uniformVerifiableCredential.issuerDid } } }],
|
|
271
|
+
});
|
|
272
|
+
const subjectPartyIdentity = yield agent.cmGetContacts({
|
|
273
|
+
filter: [{ identities: { identifier: { correlationId: filteredUniqueVC.uniformVerifiableCredential.subjectDid } } }],
|
|
274
|
+
});
|
|
275
|
+
selectableCredentials.push({
|
|
276
|
+
credential: filteredUniqueVC,
|
|
277
|
+
credentialBranding: (_a = filteredCredentialBrandings[0]) === null || _a === void 0 ? void 0 : _a.localeBranding,
|
|
278
|
+
issuerParty: issuerPartyIdentity === null || issuerPartyIdentity === void 0 ? void 0 : issuerPartyIdentity[0],
|
|
279
|
+
subjectParty: subjectPartyIdentity === null || subjectPartyIdentity === void 0 ? void 0 : subjectPartyIdentity[0],
|
|
280
|
+
});
|
|
281
|
+
}
|
|
282
|
+
}
|
|
283
|
+
selectableCredentialsMap.set(inputDescriptor.id, selectableCredentials);
|
|
284
|
+
}
|
|
285
|
+
return selectableCredentialsMap;
|
|
286
|
+
});
|
|
287
|
+
exports.getSelectableCredentials = getSelectableCredentials;
|
|
288
|
+
const translateCorrelationIdToName = (correlationId, context) => __awaiter(void 0, void 0, void 0, function* () {
|
|
289
|
+
const { agent } = context;
|
|
290
|
+
const contacts = yield agent.cmGetContacts({
|
|
291
|
+
filter: [{ identities: { identifier: { correlationId } } }],
|
|
292
|
+
});
|
|
293
|
+
if (contacts.length === 0) {
|
|
294
|
+
return undefined;
|
|
295
|
+
}
|
|
296
|
+
return contacts[0].contact.displayName;
|
|
297
|
+
});
|
|
298
|
+
exports.translateCorrelationIdToName = translateCorrelationIdToName;
|
|
299
|
+
//# sourceMappingURL=Siopv2MachineService.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"Siopv2MachineService.js","sourceRoot":"","sources":["../../src/services/Siopv2MachineService.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,2DAAgF;AAChF,uCAA4D;AAE5D,mGAAqH;AACrH,iFAA+G;AAC/G,qEAA6E;AAC7E,mDAAiI;AAEjI,oCAUiB;AAEjB,2EAAsG;AACtG,yDAAsE;AACtE,+BAA8F;AAC9F,wCAAwD;AACxD,8DAA0E;AAE7D,QAAA,MAAM,GAAG,mBAAO,CAAC,OAAO,CAAC,GAAG,CAAC,wBAAgB,CAAC,CAAA;AAE3D,MAAM,oBAAoB,GAAG,CAAO,YAAwC,EAA0C,EAAE;IACtH,cAAM,CAAC,GAAG,CAAC,gDAAgD,CAAC,CAAA;IAC5D,MAAM,EAAE,MAAM,EAAE,aAAa,EAAE,OAAO,EAAE,GAAG,MAAM,IAAA,oDAA4B,EAAC,YAAY,EAAE;QAC1F,MAAM,EAAE,8CAAsB,CAAC,OAAO;QACtC,UAAU,EAAE,EAAE,OAAO,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,IAAI,EAAE,WAAW,EAAE,EAAE;KACzE,CAAC,CAAA;IACF,cAAM,CAAC,GAAG,CAAC,qBAAqB,aAAa,CAAC,GAAG,EAAE,CAAC,CAAA;IACpD,IAAI,OAAO,EAAE,CAAC;QACZ,MAAM,YAAY,CAAC,KAAK,CAAC,IAAI,CAAC,yBAAiB,CAAC,kBAAkB,EAAE,EAAE,MAAM,EAAE,aAAa,EAAE,CAAC,CAAA;IAChG,CAAC;IACD,OAAO,MAAM,YAAY,CAAC,KAAK,CAAC,yBAAyB,CAAC,EAAE,UAAU,EAAE,aAAa,CAAC,GAAG,EAAE,CAAC,CAAA;AAC9F,CAAC,CAAA,CAAA;AAED,MAAM,aAAa,GAAG,CAAO,oBAA0C,EAAE,EAAE;IACzE,MAAM,QAAQ,GAAG,MAAM,oBAAoB,CAAC,iBAAiB,CAAS,WAAW,CAAC,CAAA;IAClF,MAAM,WAAW,GAAG,MAAM,oBAAoB,CAAC,iBAAiB,CAAS,cAAc,CAAC,CAAA;IACxF,OAAO,CAAA,QAAQ,aAAR,QAAQ,uBAAR,QAAQ,CAAE,WAAW,GAAG,QAAQ,CAAC,UAAU,CAAC,MAAI,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,WAAW,GAAG,QAAQ,CAAC,UAAU,CAAC,CAAA,CAAA;AACxG,CAAC,CAAA,CAAA;AAEM,MAAM,6BAA6B,GAAG,CAC3C,cAA8B,EAC9B,IAOC,EACD,OAAwB,EACxB,EAAE;;IACF,MAAM,EAAE,KAAK,EAAE,GAAG,OAAO,CAAA;IACzB,MAAM,YAAY,mCAAQ,OAAO,KAAE,KAAK,EAAE,OAAO,CAAC,KAAkB,GAAE,CAAA;IACtE,IAAI,EAAE,MAAM,EAAE,YAAY,EAAE,MAAM,GAAG,4BAAa,EAAE,GAAG,IAAI,CAAA;IAE3D,IAAI,cAAc,KAAK,mCAAc,CAAC,gBAAgB,EAAE,CAAC;QACvD,OAAO,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,kDAAkD,cAAc,EAAE,CAAC,CAAC,CAAA;IAClG,CAAC;IACD,MAAM,OAAO,GAAc,MAAM,KAAK,CAAC,gBAAgB,CAAC,EAAE,SAAS,EAAE,IAAI,CAAC,SAAS,EAAE,CAAC,CAAA;IACtF,MAAM,OAAO,GAAG,MAAM,OAAO,CAAC,uBAAuB,EAAE,CAAA;IACvD,MAAM,GAAG,GAAG,MAAM,OAAO,CAAC,oBAAoB,CAAC,iBAAiB,CAAS,KAAK,CAAC,CAAA;IAC/E,cAAM,CAAC,KAAK,CAAC,QAAQ,GAAG,EAAE,CAAC,CAAA;IAC3B,cAAM,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAC,CAAA;IAE1D,IAAI,oBAAwE,CAAA;IAC5E,IAAI,sBAA0D,CAAA;IAC9D,IAAI,MAAM,OAAO,CAAC,0BAA0B,EAAE,EAAE,CAAC;QAC/C,MAAM,MAAM,GAAW,MAAM,OAAO,CAAC,SAAS,CAAC,EAAE,MAAM,EAAE,CAAC,CAAA;QAE1D,MAAM,yBAAyB,GAAG,IAAI,CAAC,mCAAmC;YACxE,CAAC,CAAC,IAAI,CAAC,mCAAmC;YAC1C,CAAC,CAAC,MAAM,MAAM,CAAC,sCAAsC,CAAC,mCAAc,CAAC,MAAM,CAAC,CAAA;QAC9E,MAAM,MAAM,GACV,MAAA,MAAC,CAAC,MAAM,OAAO,CAAC,oBAAoB,CAAC,iBAAiB,CAAC,WAAW,CAAC,CAAY,mCAC/E,OAAO,CAAC,MAAM,mCACd,CAAC,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,gCAAgB,CAAC,8BAA8B,CAAC;YACzE,CAAC,CAAC,qCAAqC;YACvC,CAAC,CAAC,2BAA2B,CAAC,CAAA;QAClC,cAAM,CAAC,GAAG,CAAC,UAAU,OAAO,CAAC,KAAK,aAAa,MAAM,EAAE,CAAC,CAAA;QAExD,MAAM,aAAa,GAAG,yBAAyB,CAAC,CAAC,CAAC,CAAC,WAAW,CAAC,CAAC,CAAC,CAAA;QACjE,IAAI,OAAO,aAAa,KAAK,QAAQ,IAAI,CAAC,CAAC,mBAAmB,IAAI,aAAa,CAAC,EAAE,CAAC;YACjF,OAAO,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,4DAA4D,CAAC,CAAC,CAAA;QAC5F,CAAC;QAED,IAAI,UAAyC,CAAA;QAC7C,MAAM,iBAAiB,GAAG,aAAa,CAAC,iBAAiB,CAAA;QACzD,MAAM,OAAO,GAAG,aAAa,CAAC,2BAA2B,CAAA;QACzD,MAAM,MAAM,GAAG,4BAAgB,CAAC,wBAAwB,CAAC,OAAO,CAAC;YAC/D,CAAC,CAAC,CAAA,MAAA,OAAO,CAAC,cAAc,CAAC,GAAG,0CAAE,GAAG;gBAC/B,CAAC,CAAC,2FAA2F;oBAC3F,uNAAuN;oBACvN,WAAW,IAAA,6BAAc,EAAC,MAAA,OAAO,CAAC,cAAc,CAAC,GAAG,0CAAE,GAAG,CAAC,IAAI;gBAChE,CAAC,CAAC,OAAO,CAAC,cAAc,CAAC,GAAG;YAC9B,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC,iBAAiB,CAAC;gBACxC,CAAC,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC,CAAC,EAAE;gBACjC,CAAC,CAAC,OAAO,CAAC,iBAAiB,CAAC,EAAE,CAAA;QAClC,IAAI,CAAC,iBAAiB,CAAC,SAAS,EAAE,CAAC;YACjC,2EAA2E;YAE3E,IAAI,CAAC,MAAM,EAAE,CAAC;gBACZ,OAAO,OAAO,CAAC,MAAM,CAAC,4EAA4E,CAAC,CAAA;YACrG,CAAC;YACD,IAAI,CAAC;gBACH,UAAU,GAAG,MAAM,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,oBAAoB,CAAC,EAAE,UAAU,EAAE,MAAM,EAAE,CAAC,CAAA;YACvF,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,cAAM,CAAC,KAAK,CAAC,yBAAyB,MAAM,EAAE,CAAC,CAAA;gBAC/C,MAAM,CAAC,CAAA;YACT,CAAC;QACH,CAAC;aAAM,IAAI,IAAA,4DAAwB,EAAC,iBAAiB,CAAC,SAAS,CAAC,EAAE,CAAC;YACjE,UAAU,GAAG,MAAM,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,kCAAkC,CAAC;gBAC1E,UAAU,EAAE,aAAa,CAAC,iBAAiB,CAAC,SAAS;aACtD,CAAC,CAAA;QACJ,CAAC;aAAM,CAAC;YACN,QAAQ,iBAAiB,CAAC,sBAAsB,EAAE,CAAC;gBACjD,KAAK,KAAK;oBACR,UAAU,GAAG,MAAM,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,yBAAyB,CAAC;wBACjE,UAAU,EAAE,MAAA,iBAAiB,CAAC,oBAAoB,mCAAI,MAAM;wBAC5D,SAAS,EAAE,iBAAiB,CAAC,SAAS;qBACvC,CAAC,CAAA;oBACF,MAAK;gBACP,8BAA8B;gBAC9B;oBACE,IAAI,CAAA,MAAA,iBAAiB,CAAC,oBAAoB,0CAAE,UAAU,CAAC,MAAM,CAAC,MAAI,MAAM,aAAN,MAAM,uBAAN,MAAM,CAAE,UAAU,CAAC,MAAM,CAAC,CAAA,EAAE,CAAC;wBAC7F,UAAU,GAAG,MAAM,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,yBAAyB,CAAC;4BACjE,UAAU,EAAE,MAAA,iBAAiB,CAAC,oBAAoB,mCAAI,MAAM;4BAC5D,SAAS,EAAE,iBAAiB,CAAC,SAAS;yBACvC,CAAC,CAAA;oBACJ,CAAC;yBAAM,CAAC;wBACN,wHAAwH;wBACxH,UAAU,GAAG,MAAM,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,yBAAyB,CAAC;4BACjE,UAAU,EAAE,MAAA,MAAA,iBAAiB,CAAC,oBAAoB,mCAAI,MAAM,mCAAI,iBAAiB,CAAC,SAAS;4BAC3F,SAAS,EAAE,iBAAiB,CAAC,SAAS;yBACvC,CAAC,CAAA;oBACJ,CAAC;YACL,CAAC;QACH,CAAC;QAED,IAAI,UAAU,KAAK,SAAS,IAAI,MAAM,KAAK,SAAS,IAAI,CAAC,MAAM,aAAa,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAC,EAAE,CAAC;YAC5G,UAAU,GAAG,MAAM,oBAAoB,CAAC,YAAY,CAAC,CAAA;QACvD,CAAC;QACD,cAAM,CAAC,KAAK,CAAC,YAAY,EAAE,UAAU,CAAC,CAAA;QAEtC,wBAAwB;QAExB,oBAAoB,GAAG,MAAM,MAAM,CAAC,6BAA6B,CAAC,mCAAc,CAAC,MAAM,EAAE,yBAAyB,EAAE;YAClH,MAAM,EAAE,UAAU;YAClB,SAAS,EAAE;gBACT,KAAK,EAAE,OAAO,CAAC,KAAK;gBACpB,MAAM;aACP;SACF,CAAC,CAAA;QACF,IAAI,CAAC,oBAAoB,IAAI,oBAAoB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YAC/D,MAAM,KAAK,CAAC,8CAA8C,CAAC,CAAA;QAC7D,CAAC;aAAM,IAAI,oBAAoB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC3C,MAAM,KAAK,CAAC,2DAA2D,oBAAoB,CAAC,MAAM,EAAE,CAAC,CAAA;QACvG,CAAC;QAED,MAAM,GAAG,oBAAoB,CAAC,CAAC,CAAC,CAAC,MAAM,CAAA;QACvC,sBAAsB,GAAG,oBAAoB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAA;QAEvE,cAAM,CAAC,GAAG,CAAC,4BAA4B,EAAE,IAAI,CAAC,SAAS,CAAC,MAAA,oBAAoB,aAApB,oBAAoB,uBAApB,oBAAoB,CAAG,CAAC,CAAC,0CAAE,uBAAuB,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAA;QACrH,cAAM,CAAC,GAAG,CAAC,0BAA0B,EAAE,IAAI,CAAC,SAAS,CAAC,sBAAsB,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAA;QACvF,MAAM,6BAA6B,GAAG,CAAA,oBAAoB,aAApB,oBAAoB,uBAApB,oBAAoB,CAAE,OAAO,CAAC,CAAC,EAAE,EAAE,EAAE,CAAC,EAAE,CAAC,uBAAuB,CAAC,KAAI,EAAE,CAAA;QAC7G,OAAO,MAAM,OAAO,CAAC,yBAAyB,+CACzC,CAAC,oBAAoB,IAAI,EAAE,uBAAuB,EAAE,6BAA6B,EAAE,CAAC,GACpF,CAAC,sBAAsB,IAAI,EAAE,sBAAsB,EAAE,CAAC;YACzD,8FAA8F;YAC9F,kBAAkB,EAAE,MAAO,EAC3B,YAAY,IACZ,CAAA;IACJ,CAAC;SAAM,IAAI,OAAO,CAAC,SAAS,EAAE,CAAC;QAC7B,IAAI,IAAI,CAAC,mCAAmC,KAAK,SAAS,IAAI,IAAI,CAAC,mCAAmC,KAAK,IAAI,EAAE,CAAC;YAChH,MAAM,GAAG,GAAG,IAAI,CAAC,mCAAmC,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,WAAW,CAAC,CAAA;YACtF,MAAM,MAAM,GACV,MAAA,MAAC,CAAC,MAAM,OAAO,CAAC,oBAAoB,CAAC,iBAAiB,CAAC,WAAW,CAAC,CAAY,mCAC/E,OAAO,CAAC,MAAM,mCACd,CAAC,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,gCAAgB,CAAC,8BAA8B,CAAC;gBACzE,CAAC,CAAC,qCAAqC;gBACvC,CAAC,CAAC,2BAA2B,CAAC,CAAA;YAClC,cAAM,CAAC,KAAK,CAAC,UAAU,OAAO,CAAC,KAAK,aAAa,MAAM,EAAE,CAAC,CAAA;YAE1D,MAAM,aAAa,GAAG,GAAG,CAAC,CAAC,CAAC,CAAA;YAC5B,IAAI,OAAO,aAAa,KAAK,QAAQ,IAAI,CAAC,CAAC,mBAAmB,IAAI,aAAa,CAAC,EAAE,CAAC;gBACjF,OAAO,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,4DAA4D,CAAC,CAAC,CAAA;YAC5F,CAAC;YAED,IAAI,UAAyC,CAAA;YAC7C,MAAM,iBAAiB,GAAG,aAAa,CAAC,iBAAiB,CAAA;YACzD,MAAM,OAAO,GAAG,aAAa,CAAC,2BAA2B,CAAA;YACzD,MAAM,MAAM,GAAG,4BAAgB,CAAC,wBAAwB,CAAC,OAAO,CAAC;gBAC/D,CAAC,CAAC,CAAA,MAAA,OAAO,CAAC,cAAc,CAAC,GAAG,0CAAE,GAAG;oBAC/B,CAAC,CAAC,2FAA2F;wBAC3F,uNAAuN;wBACvN,WAAW,IAAA,6BAAc,EAAC,MAAA,OAAO,CAAC,cAAc,CAAC,GAAG,0CAAE,GAAG,CAAC,IAAI;oBAChE,CAAC,CAAC,OAAO,CAAC,cAAc,CAAC,GAAG;gBAC9B,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC,iBAAiB,CAAC;oBACxC,CAAC,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC,CAAC,EAAE;oBACjC,CAAC,CAAC,OAAO,CAAC,iBAAiB,CAAC,EAAE,CAAA;YAClC,IAAI,CAAC,iBAAiB,CAAC,SAAS,EAAE,CAAC;gBACjC,2EAA2E;gBAE3E,IAAI,CAAC,MAAM,EAAE,CAAC;oBACZ,OAAO,OAAO,CAAC,MAAM,CAAC,4EAA4E,CAAC,CAAA;gBACrG,CAAC;gBACD,IAAI,CAAC;oBACH,UAAU,GAAG,MAAM,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,oBAAoB,CAAC,EAAE,UAAU,EAAE,MAAM,EAAE,CAAC,CAAA;gBACvF,CAAC;gBAAC,OAAO,CAAC,EAAE,CAAC;oBACX,cAAM,CAAC,KAAK,CAAC,yBAAyB,MAAM,EAAE,CAAC,CAAA;oBAC/C,MAAM,CAAC,CAAA;gBACT,CAAC;YACH,CAAC;iBAAM,IAAI,IAAA,4DAAwB,EAAC,iBAAiB,CAAC,SAAS,CAAC,EAAE,CAAC;gBACjE,UAAU,GAAG,MAAM,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,kCAAkC,CAAC;oBAC1E,UAAU,EAAE,aAAa,CAAC,iBAAiB,CAAC,SAAS;iBACtD,CAAC,CAAA;YACJ,CAAC;iBAAM,CAAC;gBACN,QAAQ,iBAAiB,CAAC,sBAAsB,EAAE,CAAC;oBACjD,KAAK,KAAK;wBACR,UAAU,GAAG,MAAM,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,yBAAyB,CAAC;4BACjE,UAAU,EAAE,MAAA,iBAAiB,CAAC,oBAAoB,mCAAI,MAAM;4BAC5D,SAAS,EAAE,iBAAiB,CAAC,SAAS;yBACvC,CAAC,CAAA;wBACF,MAAK;oBACP,8BAA8B;oBAC9B;wBACE,wHAAwH;wBACxH,UAAU,GAAG,MAAM,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,yBAAyB,CAAC;4BACjE,UAAU,EAAE,MAAA,MAAA,iBAAiB,CAAC,oBAAoB,mCAAI,MAAM,mCAAI,iBAAiB,CAAC,SAAS;4BAC3F,SAAS,EAAE,iBAAiB,CAAC,SAAS;yBACvC,CAAC,CAAA;gBACN,CAAC;YACH,CAAC;YACD,OAAO,CAAC,GAAG,CAAC,YAAY,EAAE,UAAU,CAAC,CAAA;YAErC,MAAM,mBAAmB,GAAqB,EAAE,CAAA;YAChD,GAAG,CAAC,OAAO,CAAC,CAAC,EAA0D,EAAE,EAAE;gBACzE,MAAM,GAAG,GAAG,IAAA,+BAAwB,EAAC,EAAE,EAAE,IAAI,CAAC,MAAM,CAAC,CAAA;gBACrD,IAAI,GAAG,EAAE,CAAC;oBACR,mBAAmB,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;gBAC/B,CAAC;YACH,CAAC,CAAC,CAAA;YAEF,MAAM,WAAW,GAAG,gBAAS,CAAC,KAAK,CAAC,OAAO,CAAC,SAAS,EAAE,mBAAmB,CAAC,CAAA;YAC3E,MAAM,YAAY,GAA+C,EAAE,CAAA;YAEnE,KAAK,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,WAAW,CAAC,kBAAkB,CAAC,EAAE,CAAC;gBAC1E,MAAM,UAAU,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAA;gBACzD,UAAU,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE;oBAC3B,IAAI,KAAK,CAAC,OAAO,EAAE,CAAC;wBAClB,MAAM,kBAAkB,GAAG,IAAA,iDAA+B,EAAC,GAAG,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAA;wBAC7F,IAAI,CAAC,kBAAkB,EAAE,CAAC;4BACxB,MAAM,IAAI,KAAK,CAAC,SAAS,KAAK,CAAC,sBAAsB,oCAAoC,CAAC,CAAA;wBAC5F,CAAC;wBACD,YAAY,CAAC,GAAG,CAAC;4BACd,kBAA0B,CAAC,gBAAgB,CAAC,KAAK,SAAS,CAAC,CAAC,CAAE,kBAA0B,CAAC,cAAc,CAAC,CAAC,CAAC,kBAAkB,CAAA;oBACjI,CAAC;gBACH,CAAC,CAAC,CAAA;YACJ,CAAC;YAED,MAAM,QAAQ,GAAG,OAAO,CAAC,yBAAyB,iBAChD,kBAAkB,EAAE,UAAU,IAC3B,EAAE,SAAS,EAAE,EAAE,gBAAgB,EAAE,uBAAgB,CAAC,KAAK,CAAC,YAAY,CAAC,EAAE,EAAE,EAC5E,CAAA;YAEF,cAAM,CAAC,KAAK,CAAC,YAAY,EAAE,QAAQ,CAAC,CAAA;YAEpC,OAAO,QAAQ,CAAA;QACjB,CAAC;IACH,CAAC;IACD,MAAM,KAAK,CAAC,6CAA6C,CAAC,CAAA;AAC5D,CAAC,CAAA,CAAA;AAvOY,QAAA,6BAA6B,iCAuOzC;AAED,SAAS,cAAc,CACrB,eAAsD,EACtD,sBAA2E;IAE3E,OAAO,gCACF,sBAAsB,KACzB,iBAAiB,EAAE,CAAC,eAAe,CAAC,GACV,CAAA;AAC9B,CAAC;AAEM,MAAM,wBAAwB,GAAG,CACtC,sBAA+C,EAC/C,OAAwB,EACW,EAAE;;IACrC,MAAM,YAAY,mCAAQ,OAAO,KAAE,KAAK,EAAE,OAAO,CAAC,KAAiC,GAAE,CAAA;IACrF,MAAM,EAAE,KAAK,EAAE,GAAG,YAAY,CAAA;IAC9B,MAAM,GAAG,GAAG,IAAI,SAAG,EAAE,CAAA;IAErB,MAAM,2BAA2B,GAAG,MAAM,KAAK,CAAC,uBAAuB,CAAC;QACtE,MAAM,EAAE,IAAA,4DAAiC,EAAC,mCAAc,CAAC,MAAM,CAAC;KACjE,CAAC,CAAA;IACF,MAAM,kBAAkB,GAAG,MAAM,KAAK,CAAC,uBAAuB,EAAE,CAAA;IAEhE,MAAM,wBAAwB,GAA6B,IAAI,GAAG,EAAE,CAAA;IAEpE,KAAK,MAAM,eAAe,IAAI,sBAAsB,CAAC,iBAAiB,EAAE,CAAC;QACvE,MAAM,SAAS,GAAG,cAAc,CAAC,eAAe,EAAE,sBAAsB,CAAC,CAAA;QACzE,MAAM,mBAAmB,GAAG,2BAA2B,CAAC,GAAG,CAAC,CAAC,QAAQ,EAAE,EAAE;YACvE,OAAO,4BAAgB,CAAC,gCAAgC,CAAC,QAAQ,CAAC,4BAA6B,CAAC,CAAA,CAAC,uDAAuD;QAC1J,CAAC,CAAC,CAAA;QACF,MAAM,gBAAgB,GAAG,GAAG,CAAC,UAAU,CAAC,SAAS,EAAE,mBAAmB,CAAC,CAAA;QAEvE,MAAM,qBAAqB,GAAgC,EAAE,CAAA;QAC7D,KAAK,MAAM,kBAAkB,IAAI,gBAAgB,CAAC,oBAAoB,IAAI,EAAE,EAAE,CAAC;YAC7E,MAAM,gBAAgB,GAAG,2BAA2B,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,EAAE;gBACrE,MAAM,KAAK,GAAG,QAAQ,CAAC,2BAA4B,CAAC,KAAK,CAAA;gBACzD,OAAO,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,SAAS,EAAE,EAAE,CAAC,SAAS,CAAC,GAAG,KAAK,kBAAkB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,KAAK,kBAAkB,CAAA;YAClI,CAAC,CAAC,CAAA;YAEF,IAAI,gBAAgB,EAAE,CAAC;gBACrB,MAAM,2BAA2B,GAAG,kBAAkB,CAAC,MAAM,CAAC,CAAC,EAAE,EAAE,EAAE,CAAC,EAAE,CAAC,MAAM,KAAK,gBAAgB,CAAC,IAAI,CAAC,CAAA;gBAC1G,MAAM,mBAAmB,GAAG,MAAM,KAAK,CAAC,aAAa,CAAC;oBACpD,MAAM,EAAE,CAAC,EAAE,UAAU,EAAE,EAAE,UAAU,EAAE,EAAE,aAAa,EAAE,gBAAgB,CAAC,2BAA4B,CAAC,SAAS,EAAE,EAAE,EAAE,CAAC;iBACrH,CAAC,CAAA;gBACF,MAAM,oBAAoB,GAAG,MAAM,KAAK,CAAC,aAAa,CAAC;oBACrD,MAAM,EAAE,CAAC,EAAE,UAAU,EAAE,EAAE,UAAU,EAAE,EAAE,aAAa,EAAE,gBAAgB,CAAC,2BAA4B,CAAC,UAAU,EAAE,EAAE,EAAE,CAAC;iBACtH,CAAC,CAAA;gBAEF,qBAAqB,CAAC,IAAI,CAAC;oBACzB,UAAU,EAAE,gBAAgB;oBAC5B,kBAAkB,EAAE,MAAA,2BAA2B,CAAC,CAAC,CAAC,0CAAE,cAAc;oBAClE,WAAW,EAAE,mBAAmB,aAAnB,mBAAmB,uBAAnB,mBAAmB,CAAG,CAAC,CAAC;oBACrC,YAAY,EAAE,oBAAoB,aAApB,oBAAoB,uBAApB,oBAAoB,CAAG,CAAC,CAAC;iBACxC,CAAC,CAAA;YACJ,CAAC;QACH,CAAC;QACD,wBAAwB,CAAC,GAAG,CAAC,eAAe,CAAC,EAAE,EAAE,qBAAqB,CAAC,CAAA;IACzE,CAAC;IACD,OAAO,wBAAwB,CAAA;AACjC,CAAC,CAAA,CAAA;AAjDY,QAAA,wBAAwB,4BAiDpC;AAEM,MAAM,4BAA4B,GAAG,CAAO,aAAqB,EAAE,OAAwB,EAA+B,EAAE;IACjI,MAAM,EAAE,KAAK,EAAE,GAAG,OAAO,CAAA;IAEzB,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,aAAa,CAAC;QACzC,MAAM,EAAE,CAAC,EAAE,UAAU,EAAE,EAAE,UAAU,EAAE,EAAE,aAAa,EAAE,EAAE,EAAE,CAAC;KAC5D,CAAC,CAAA;IAEF,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QAC1B,OAAO,SAAS,CAAA;IAClB,CAAC;IAED,OAAO,QAAQ,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,WAAW,CAAA;AACxC,CAAC,CAAA,CAAA;AAZY,QAAA,4BAA4B,gCAYxC"}
|
|
@@ -0,0 +1,72 @@
|
|
|
1
|
+
import { PresentationDefinitionWithLocation } from '@sphereon/did-auth-siop';
|
|
2
|
+
import { SelectResults } from '@sphereon/pex';
|
|
3
|
+
import { Format } from '@sphereon/pex-models';
|
|
4
|
+
import { ManagedIdentifierOptsOrResult } from '@sphereon/ssi-sdk-ext.identifier-resolution';
|
|
5
|
+
import { ProofOptions } from '@sphereon/ssi-sdk.core';
|
|
6
|
+
import { UniqueDigitalCredential } from '@sphereon/ssi-sdk.credential-store';
|
|
7
|
+
import { CredentialRole, FindDigitalCredentialArgs } from '@sphereon/ssi-sdk.data-store';
|
|
8
|
+
import { HasherSync, OriginalVerifiableCredential } from '@sphereon/ssi-types';
|
|
9
|
+
import { VerifiableCredentialsWithDefinition, VerifiablePresentationWithDefinition } from '../types';
|
|
10
|
+
import { OpSession } from './OpSession';
|
|
11
|
+
export declare class OID4VP {
|
|
12
|
+
private readonly session;
|
|
13
|
+
private readonly allIdentifiers;
|
|
14
|
+
private readonly hasher?;
|
|
15
|
+
private constructor();
|
|
16
|
+
static init(session: OpSession, allIdentifiers: string[], hasher?: HasherSync): Promise<OID4VP>;
|
|
17
|
+
getPresentationDefinitions(): Promise<PresentationDefinitionWithLocation[] | undefined>;
|
|
18
|
+
private getPresentationExchange;
|
|
19
|
+
createVerifiablePresentations(credentialRole: CredentialRole, credentialsWithDefinitions: VerifiableCredentialsWithDefinition[], opts?: {
|
|
20
|
+
forceNoCredentialsInVP?: boolean;
|
|
21
|
+
restrictToFormats?: Format;
|
|
22
|
+
restrictToDIDMethods?: string[];
|
|
23
|
+
proofOpts?: ProofOptions;
|
|
24
|
+
idOpts?: ManagedIdentifierOptsOrResult;
|
|
25
|
+
skipDidResolution?: boolean;
|
|
26
|
+
holderDID?: string;
|
|
27
|
+
subjectIsHolder?: boolean;
|
|
28
|
+
hasher?: HasherSync;
|
|
29
|
+
applyFilter?: boolean;
|
|
30
|
+
}): Promise<VerifiablePresentationWithDefinition[]>;
|
|
31
|
+
createVerifiablePresentation(credentialRole: CredentialRole, selectedVerifiableCredentials: VerifiableCredentialsWithDefinition, opts?: {
|
|
32
|
+
forceNoCredentialsInVP?: boolean;
|
|
33
|
+
restrictToFormats?: Format;
|
|
34
|
+
restrictToDIDMethods?: string[];
|
|
35
|
+
proofOpts?: ProofOptions;
|
|
36
|
+
idOpts?: ManagedIdentifierOptsOrResult;
|
|
37
|
+
skipDidResolution?: boolean;
|
|
38
|
+
holder?: string;
|
|
39
|
+
subjectIsHolder?: boolean;
|
|
40
|
+
applyFilter?: boolean;
|
|
41
|
+
hasher?: HasherSync;
|
|
42
|
+
}): Promise<VerifiablePresentationWithDefinition>;
|
|
43
|
+
filterCredentialsAgainstAllDefinitions(credentialRole: CredentialRole, opts?: {
|
|
44
|
+
filterOpts?: {
|
|
45
|
+
verifiableCredentials?: UniqueDigitalCredential[];
|
|
46
|
+
filter?: FindDigitalCredentialArgs;
|
|
47
|
+
};
|
|
48
|
+
holderDIDs?: string[];
|
|
49
|
+
restrictToFormats?: Format;
|
|
50
|
+
restrictToDIDMethods?: string[];
|
|
51
|
+
}): Promise<VerifiableCredentialsWithDefinition[]>;
|
|
52
|
+
filterCredentials(credentialRole: CredentialRole, presentationDefinition: PresentationDefinitionWithLocation, opts?: {
|
|
53
|
+
filterOpts?: {
|
|
54
|
+
verifiableCredentials?: (UniqueDigitalCredential | OriginalVerifiableCredential)[];
|
|
55
|
+
filter?: FindDigitalCredentialArgs;
|
|
56
|
+
};
|
|
57
|
+
holderDIDs?: string[];
|
|
58
|
+
restrictToFormats?: Format;
|
|
59
|
+
restrictToDIDMethods?: string[];
|
|
60
|
+
}): Promise<VerifiableCredentialsWithDefinition>;
|
|
61
|
+
filterCredentialsWithSelectionStatus(credentialRole: CredentialRole, presentationDefinition: PresentationDefinitionWithLocation, opts?: {
|
|
62
|
+
filterOpts?: {
|
|
63
|
+
verifiableCredentials?: OriginalVerifiableCredential[];
|
|
64
|
+
filter?: FindDigitalCredentialArgs;
|
|
65
|
+
};
|
|
66
|
+
holderDIDs?: string[];
|
|
67
|
+
restrictToFormats?: Format;
|
|
68
|
+
restrictToDIDMethods?: string[];
|
|
69
|
+
}): Promise<SelectResults>;
|
|
70
|
+
private getCredentials;
|
|
71
|
+
}
|
|
72
|
+
//# sourceMappingURL=OID4VP.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"OID4VP.d.ts","sourceRoot":"","sources":["../../src/session/OID4VP.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kCAAkC,EAAwB,MAAM,yBAAyB,CAAA;AAClG,OAAO,EAAE,aAAa,EAAsC,MAAM,eAAe,CAAA;AACjF,OAAO,EAAE,MAAM,EAAE,MAAM,sBAAsB,CAAA;AAC7C,OAAO,EAGL,6BAA6B,EAE9B,MAAM,6CAA6C,CAAA;AACpD,OAAO,EAAiB,YAAY,EAAE,MAAM,wBAAwB,CAAA;AACpE,OAAO,EAAE,uBAAuB,EAAqC,MAAM,oCAAoC,CAAA;AAC/G,OAAO,EAAE,cAAc,EAAE,yBAAyB,EAAE,MAAM,8BAA8B,CAAA;AACxF,OAAO,EAAc,UAAU,EAAU,4BAA4B,EAAE,MAAM,qBAAqB,CAAA;AAClG,OAAO,EAIL,mCAAmC,EACnC,oCAAoC,EACrC,MAAM,UAAU,CAAA;AAEjB,OAAO,EAAE,SAAS,EAAE,MAAM,aAAa,CAAA;AAEvC,qBAAa,MAAM;IACjB,OAAO,CAAC,QAAQ,CAAC,OAAO,CAAW;IACnC,OAAO,CAAC,QAAQ,CAAC,cAAc,CAAU;IACzC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAY;IAEpC,OAAO;WAQa,IAAI,CAAC,OAAO,EAAE,SAAS,EAAE,cAAc,EAAE,MAAM,EAAE,EAAE,MAAM,CAAC,EAAE,UAAU,GAAG,OAAO,CAAC,MAAM,CAAC;IAI/F,0BAA0B,IAAI,OAAO,CAAC,kCAAkC,EAAE,GAAG,SAAS,CAAC;IAQpG,OAAO,CAAC,uBAAuB;IAUlB,6BAA6B,CACxC,cAAc,EAAE,cAAc,EAC9B,0BAA0B,EAAE,mCAAmC,EAAE,EACjE,IAAI,CAAC,EAAE;QACL,sBAAsB,CAAC,EAAE,OAAO,CAAA;QAChC,iBAAiB,CAAC,EAAE,MAAM,CAAA;QAC1B,oBAAoB,CAAC,EAAE,MAAM,EAAE,CAAA;QAC/B,SAAS,CAAC,EAAE,YAAY,CAAA;QACxB,MAAM,CAAC,EAAE,6BAA6B,CAAA;QACtC,iBAAiB,CAAC,EAAE,OAAO,CAAA;QAC3B,SAAS,CAAC,EAAE,MAAM,CAAA;QAClB,eAAe,CAAC,EAAE,OAAO,CAAA;QACzB,MAAM,CAAC,EAAE,UAAU,CAAA;QACnB,WAAW,CAAC,EAAE,OAAO,CAAA;KACtB,GACA,OAAO,CAAC,oCAAoC,EAAE,CAAC;IAIrC,4BAA4B,CACvC,cAAc,EAAE,cAAc,EAC9B,6BAA6B,EAAE,mCAAmC,EAClE,IAAI,CAAC,EAAE;QACL,sBAAsB,CAAC,EAAE,OAAO,CAAA;QAChC,iBAAiB,CAAC,EAAE,MAAM,CAAA;QAC1B,oBAAoB,CAAC,EAAE,MAAM,EAAE,CAAA;QAC/B,SAAS,CAAC,EAAE,YAAY,CAAA;QACxB,MAAM,CAAC,EAAE,6BAA6B,CAAA;QACtC,iBAAiB,CAAC,EAAE,OAAO,CAAA;QAC3B,MAAM,CAAC,EAAE,MAAM,CAAA;QACf,eAAe,CAAC,EAAE,OAAO,CAAA;QACzB,WAAW,CAAC,EAAE,OAAO,CAAA;QACrB,MAAM,CAAC,EAAE,UAAU,CAAA;KACpB,GACA,OAAO,CAAC,oCAAoC,CAAC;IA0HnC,sCAAsC,CACjD,cAAc,EAAE,cAAc,EAC9B,IAAI,CAAC,EAAE;QACL,UAAU,CAAC,EAAE;YACX,qBAAqB,CAAC,EAAE,uBAAuB,EAAE,CAAA;YACjD,MAAM,CAAC,EAAE,yBAAyB,CAAA;SACnC,CAAA;QACD,UAAU,CAAC,EAAE,MAAM,EAAE,CAAA;QACrB,iBAAiB,CAAC,EAAE,MAAM,CAAA;QAC1B,oBAAoB,CAAC,EAAE,MAAM,EAAE,CAAA;KAChC,GACA,OAAO,CAAC,mCAAmC,EAAE,CAAC;IAWpC,iBAAiB,CAC5B,cAAc,EAAE,cAAc,EAC9B,sBAAsB,EAAE,kCAAkC,EAC1D,IAAI,CAAC,EAAE;QACL,UAAU,CAAC,EAAE;YAAE,qBAAqB,CAAC,EAAE,CAAC,uBAAuB,GAAG,4BAA4B,CAAC,EAAE,CAAC;YAAC,MAAM,CAAC,EAAE,yBAAyB,CAAA;SAAE,CAAA;QACvI,UAAU,CAAC,EAAE,MAAM,EAAE,CAAA;QACrB,iBAAiB,CAAC,EAAE,MAAM,CAAA;QAC1B,oBAAoB,CAAC,EAAE,MAAM,EAAE,CAAA;KAChC,GACA,OAAO,CAAC,mCAAmC,CAAC;IA8BlC,oCAAoC,CAC/C,cAAc,EAAE,cAAc,EAC9B,sBAAsB,EAAE,kCAAkC,EAC1D,IAAI,CAAC,EAAE;QACL,UAAU,CAAC,EAAE;YAAE,qBAAqB,CAAC,EAAE,4BAA4B,EAAE,CAAC;YAAC,MAAM,CAAC,EAAE,yBAAyB,CAAA;SAAE,CAAA;QAC3G,UAAU,CAAC,EAAE,MAAM,EAAE,CAAA;QACrB,iBAAiB,CAAC,EAAE,MAAM,CAAA;QAC1B,oBAAoB,CAAC,EAAE,MAAM,EAAE,CAAA;KAChC,GACA,OAAO,CAAC,aAAa,CAAC;YAiBX,cAAc;CAoB7B"}
|