@triveria/wallet 0.0.244 → 0.0.246
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/api.d.ts +85 -1
- package/api.js +71 -0
- package/package.json +1 -1
package/api.d.ts
CHANGED
|
@@ -132,6 +132,38 @@ export interface CertificateImportRequest {
|
|
|
132
132
|
*/
|
|
133
133
|
'certificate': string;
|
|
134
134
|
}
|
|
135
|
+
/**
|
|
136
|
+
*
|
|
137
|
+
* @export
|
|
138
|
+
* @interface CertificateIssueRequest
|
|
139
|
+
*/
|
|
140
|
+
export interface CertificateIssueRequest {
|
|
141
|
+
/**
|
|
142
|
+
*
|
|
143
|
+
* @type {string}
|
|
144
|
+
* @memberof CertificateIssueRequest
|
|
145
|
+
*/
|
|
146
|
+
'csr': string;
|
|
147
|
+
/**
|
|
148
|
+
*
|
|
149
|
+
* @type {string}
|
|
150
|
+
* @memberof CertificateIssueRequest
|
|
151
|
+
*/
|
|
152
|
+
'expirationDate': string;
|
|
153
|
+
}
|
|
154
|
+
/**
|
|
155
|
+
*
|
|
156
|
+
* @export
|
|
157
|
+
* @interface CertificateIssueResponse
|
|
158
|
+
*/
|
|
159
|
+
export interface CertificateIssueResponse {
|
|
160
|
+
/**
|
|
161
|
+
*
|
|
162
|
+
* @type {string}
|
|
163
|
+
* @memberof CertificateIssueResponse
|
|
164
|
+
*/
|
|
165
|
+
'certificate': string;
|
|
166
|
+
}
|
|
135
167
|
/**
|
|
136
168
|
* Accompanying information about the verifiable credential draft - schema, type, format etc.
|
|
137
169
|
* @export
|
|
@@ -1011,7 +1043,7 @@ export interface EbsiSpecificWalletData {
|
|
|
1011
1043
|
'configuration': EbsiConfiguration;
|
|
1012
1044
|
}
|
|
1013
1045
|
/**
|
|
1014
|
-
* Configuration for EUDI trust framework.
|
|
1046
|
+
* Configuration for EUDI trust framework. The field didTrustFramework marks which DID TF is used when the wallet uses did as its identifier.
|
|
1015
1047
|
* @export
|
|
1016
1048
|
* @interface EudiConfiguration
|
|
1017
1049
|
*/
|
|
@@ -1168,6 +1200,19 @@ export interface IdTokenSendRequest {
|
|
|
1168
1200
|
*/
|
|
1169
1201
|
'requestUrl': string;
|
|
1170
1202
|
}
|
|
1203
|
+
/**
|
|
1204
|
+
* Configuration for IDTL trust framework
|
|
1205
|
+
* @export
|
|
1206
|
+
* @interface IdtlConfiguration
|
|
1207
|
+
*/
|
|
1208
|
+
export interface IdtlConfiguration {
|
|
1209
|
+
/**
|
|
1210
|
+
* Defines if a wallet is onboarded
|
|
1211
|
+
* @type {boolean}
|
|
1212
|
+
* @memberof IdtlConfiguration
|
|
1213
|
+
*/
|
|
1214
|
+
'isOnboarded': boolean;
|
|
1215
|
+
}
|
|
1171
1216
|
/**
|
|
1172
1217
|
* Request for authorization flow credential issuance process start. Consists of offered credential\'s types and credential offer endpoint (most commonly only schema)
|
|
1173
1218
|
* @export
|
|
@@ -2288,6 +2333,12 @@ export interface WalletConfig {
|
|
|
2288
2333
|
* @memberof WalletConfig
|
|
2289
2334
|
*/
|
|
2290
2335
|
'EUDI'?: EudiConfiguration;
|
|
2336
|
+
/**
|
|
2337
|
+
*
|
|
2338
|
+
* @type {IdtlConfiguration}
|
|
2339
|
+
* @memberof WalletConfig
|
|
2340
|
+
*/
|
|
2341
|
+
'IDTL'?: IdtlConfiguration;
|
|
2291
2342
|
/**
|
|
2292
2343
|
*
|
|
2293
2344
|
* @type {SigningKeyIdentifier}
|
|
@@ -2735,6 +2786,14 @@ export declare const DefaultApiAxiosParamCreator: (configuration?: Configuration
|
|
|
2735
2786
|
* @throws {RequiredError}
|
|
2736
2787
|
*/
|
|
2737
2788
|
tfRevokeAccreditation: (walletId: string, revokeAccreditationRequest?: RevokeAccreditationRequest, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
2789
|
+
/**
|
|
2790
|
+
* Issues a certificate based on the provided certificate request
|
|
2791
|
+
* @param {string} walletId
|
|
2792
|
+
* @param {CertificateIssueRequest} [certificateIssueRequest]
|
|
2793
|
+
* @param {*} [options] Override http request option.
|
|
2794
|
+
* @throws {RequiredError}
|
|
2795
|
+
*/
|
|
2796
|
+
tfX509CertificateIssue: (walletId: string, certificateIssueRequest?: CertificateIssueRequest, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
2738
2797
|
/**
|
|
2739
2798
|
* Returns an url where verifier accepts presentations from a holder.
|
|
2740
2799
|
* @param {string} walletId
|
|
@@ -3128,6 +3187,14 @@ export declare const DefaultApiFp: (configuration?: Configuration) => {
|
|
|
3128
3187
|
* @throws {RequiredError}
|
|
3129
3188
|
*/
|
|
3130
3189
|
tfRevokeAccreditation(walletId: string, revokeAccreditationRequest?: RevokeAccreditationRequest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<void>>;
|
|
3190
|
+
/**
|
|
3191
|
+
* Issues a certificate based on the provided certificate request
|
|
3192
|
+
* @param {string} walletId
|
|
3193
|
+
* @param {CertificateIssueRequest} [certificateIssueRequest]
|
|
3194
|
+
* @param {*} [options] Override http request option.
|
|
3195
|
+
* @throws {RequiredError}
|
|
3196
|
+
*/
|
|
3197
|
+
tfX509CertificateIssue(walletId: string, certificateIssueRequest?: CertificateIssueRequest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<CertificateIssueResponse>>;
|
|
3131
3198
|
/**
|
|
3132
3199
|
* Returns an url where verifier accepts presentations from a holder.
|
|
3133
3200
|
* @param {string} walletId
|
|
@@ -3523,6 +3590,14 @@ export declare const DefaultApiFactory: (configuration?: Configuration, basePath
|
|
|
3523
3590
|
* @throws {RequiredError}
|
|
3524
3591
|
*/
|
|
3525
3592
|
tfRevokeAccreditation(walletId: string, revokeAccreditationRequest?: RevokeAccreditationRequest, options?: RawAxiosRequestConfig): AxiosPromise<void>;
|
|
3593
|
+
/**
|
|
3594
|
+
* Issues a certificate based on the provided certificate request
|
|
3595
|
+
* @param {string} walletId
|
|
3596
|
+
* @param {CertificateIssueRequest} [certificateIssueRequest]
|
|
3597
|
+
* @param {*} [options] Override http request option.
|
|
3598
|
+
* @throws {RequiredError}
|
|
3599
|
+
*/
|
|
3600
|
+
tfX509CertificateIssue(walletId: string, certificateIssueRequest?: CertificateIssueRequest, options?: RawAxiosRequestConfig): AxiosPromise<CertificateIssueResponse>;
|
|
3526
3601
|
/**
|
|
3527
3602
|
* Returns an url where verifier accepts presentations from a holder.
|
|
3528
3603
|
* @param {string} walletId
|
|
@@ -3951,6 +4026,15 @@ export declare class DefaultApi extends BaseAPI {
|
|
|
3951
4026
|
* @memberof DefaultApi
|
|
3952
4027
|
*/
|
|
3953
4028
|
tfRevokeAccreditation(walletId: string, revokeAccreditationRequest?: RevokeAccreditationRequest, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<void, any>>;
|
|
4029
|
+
/**
|
|
4030
|
+
* Issues a certificate based on the provided certificate request
|
|
4031
|
+
* @param {string} walletId
|
|
4032
|
+
* @param {CertificateIssueRequest} [certificateIssueRequest]
|
|
4033
|
+
* @param {*} [options] Override http request option.
|
|
4034
|
+
* @throws {RequiredError}
|
|
4035
|
+
* @memberof DefaultApi
|
|
4036
|
+
*/
|
|
4037
|
+
tfX509CertificateIssue(walletId: string, certificateIssueRequest?: CertificateIssueRequest, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<CertificateIssueResponse, any>>;
|
|
3954
4038
|
/**
|
|
3955
4039
|
* Returns an url where verifier accepts presentations from a holder.
|
|
3956
4040
|
* @param {string} walletId
|
package/api.js
CHANGED
|
@@ -1294,6 +1294,40 @@ const DefaultApiAxiosParamCreator = function (configuration) {
|
|
|
1294
1294
|
options: localVarRequestOptions,
|
|
1295
1295
|
};
|
|
1296
1296
|
}),
|
|
1297
|
+
/**
|
|
1298
|
+
* Issues a certificate based on the provided certificate request
|
|
1299
|
+
* @param {string} walletId
|
|
1300
|
+
* @param {CertificateIssueRequest} [certificateIssueRequest]
|
|
1301
|
+
* @param {*} [options] Override http request option.
|
|
1302
|
+
* @throws {RequiredError}
|
|
1303
|
+
*/
|
|
1304
|
+
tfX509CertificateIssue: (walletId, certificateIssueRequest, options = {}) => __awaiter(this, void 0, void 0, function* () {
|
|
1305
|
+
// verify required parameter 'walletId' is not null or undefined
|
|
1306
|
+
(0, common_1.assertParamExists)('tfX509CertificateIssue', 'walletId', walletId);
|
|
1307
|
+
const localVarPath = `/tf/{wallet_id}/x509`
|
|
1308
|
+
.replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
|
|
1309
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
1310
|
+
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
1311
|
+
let baseOptions;
|
|
1312
|
+
if (configuration) {
|
|
1313
|
+
baseOptions = configuration.baseOptions;
|
|
1314
|
+
}
|
|
1315
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'POST' }, baseOptions), options);
|
|
1316
|
+
const localVarHeaderParameter = {};
|
|
1317
|
+
const localVarQueryParameter = {};
|
|
1318
|
+
// authentication accessToken required
|
|
1319
|
+
// http bearer authentication required
|
|
1320
|
+
yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
|
|
1321
|
+
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
1322
|
+
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
1323
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
1324
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
1325
|
+
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(certificateIssueRequest, localVarRequestOptions, configuration);
|
|
1326
|
+
return {
|
|
1327
|
+
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
1328
|
+
options: localVarRequestOptions,
|
|
1329
|
+
};
|
|
1330
|
+
}),
|
|
1297
1331
|
/**
|
|
1298
1332
|
* Returns an url where verifier accepts presentations from a holder.
|
|
1299
1333
|
* @param {string} walletId
|
|
@@ -2396,6 +2430,22 @@ const DefaultApiFp = function (configuration) {
|
|
|
2396
2430
|
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
2397
2431
|
});
|
|
2398
2432
|
},
|
|
2433
|
+
/**
|
|
2434
|
+
* Issues a certificate based on the provided certificate request
|
|
2435
|
+
* @param {string} walletId
|
|
2436
|
+
* @param {CertificateIssueRequest} [certificateIssueRequest]
|
|
2437
|
+
* @param {*} [options] Override http request option.
|
|
2438
|
+
* @throws {RequiredError}
|
|
2439
|
+
*/
|
|
2440
|
+
tfX509CertificateIssue(walletId, certificateIssueRequest, options) {
|
|
2441
|
+
var _a, _b, _c;
|
|
2442
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2443
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.tfX509CertificateIssue(walletId, certificateIssueRequest, options);
|
|
2444
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
2445
|
+
const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.tfX509CertificateIssue']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
2446
|
+
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
2447
|
+
});
|
|
2448
|
+
},
|
|
2399
2449
|
/**
|
|
2400
2450
|
* Returns an url where verifier accepts presentations from a holder.
|
|
2401
2451
|
* @param {string} walletId
|
|
@@ -2991,6 +3041,16 @@ const DefaultApiFactory = function (configuration, basePath, axios) {
|
|
|
2991
3041
|
tfRevokeAccreditation(walletId, revokeAccreditationRequest, options) {
|
|
2992
3042
|
return localVarFp.tfRevokeAccreditation(walletId, revokeAccreditationRequest, options).then((request) => request(axios, basePath));
|
|
2993
3043
|
},
|
|
3044
|
+
/**
|
|
3045
|
+
* Issues a certificate based on the provided certificate request
|
|
3046
|
+
* @param {string} walletId
|
|
3047
|
+
* @param {CertificateIssueRequest} [certificateIssueRequest]
|
|
3048
|
+
* @param {*} [options] Override http request option.
|
|
3049
|
+
* @throws {RequiredError}
|
|
3050
|
+
*/
|
|
3051
|
+
tfX509CertificateIssue(walletId, certificateIssueRequest, options) {
|
|
3052
|
+
return localVarFp.tfX509CertificateIssue(walletId, certificateIssueRequest, options).then((request) => request(axios, basePath));
|
|
3053
|
+
},
|
|
2994
3054
|
/**
|
|
2995
3055
|
* Returns an url where verifier accepts presentations from a holder.
|
|
2996
3056
|
* @param {string} walletId
|
|
@@ -3515,6 +3575,17 @@ class DefaultApi extends base_1.BaseAPI {
|
|
|
3515
3575
|
tfRevokeAccreditation(walletId, revokeAccreditationRequest, options) {
|
|
3516
3576
|
return (0, exports.DefaultApiFp)(this.configuration).tfRevokeAccreditation(walletId, revokeAccreditationRequest, options).then((request) => request(this.axios, this.basePath));
|
|
3517
3577
|
}
|
|
3578
|
+
/**
|
|
3579
|
+
* Issues a certificate based on the provided certificate request
|
|
3580
|
+
* @param {string} walletId
|
|
3581
|
+
* @param {CertificateIssueRequest} [certificateIssueRequest]
|
|
3582
|
+
* @param {*} [options] Override http request option.
|
|
3583
|
+
* @throws {RequiredError}
|
|
3584
|
+
* @memberof DefaultApi
|
|
3585
|
+
*/
|
|
3586
|
+
tfX509CertificateIssue(walletId, certificateIssueRequest, options) {
|
|
3587
|
+
return (0, exports.DefaultApiFp)(this.configuration).tfX509CertificateIssue(walletId, certificateIssueRequest, options).then((request) => request(this.axios, this.basePath));
|
|
3588
|
+
}
|
|
3518
3589
|
/**
|
|
3519
3590
|
* Returns an url where verifier accepts presentations from a holder.
|
|
3520
3591
|
* @param {string} walletId
|