@triveria/wallet 0.0.244 → 0.0.246

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/api.d.ts +85 -1
  2. package/api.js +71 -0
  3. package/package.json +1 -1
package/api.d.ts CHANGED
@@ -132,6 +132,38 @@ export interface CertificateImportRequest {
132
132
  */
133
133
  'certificate': string;
134
134
  }
135
+ /**
136
+ *
137
+ * @export
138
+ * @interface CertificateIssueRequest
139
+ */
140
+ export interface CertificateIssueRequest {
141
+ /**
142
+ *
143
+ * @type {string}
144
+ * @memberof CertificateIssueRequest
145
+ */
146
+ 'csr': string;
147
+ /**
148
+ *
149
+ * @type {string}
150
+ * @memberof CertificateIssueRequest
151
+ */
152
+ 'expirationDate': string;
153
+ }
154
+ /**
155
+ *
156
+ * @export
157
+ * @interface CertificateIssueResponse
158
+ */
159
+ export interface CertificateIssueResponse {
160
+ /**
161
+ *
162
+ * @type {string}
163
+ * @memberof CertificateIssueResponse
164
+ */
165
+ 'certificate': string;
166
+ }
135
167
  /**
136
168
  * Accompanying information about the verifiable credential draft - schema, type, format etc.
137
169
  * @export
@@ -1011,7 +1043,7 @@ export interface EbsiSpecificWalletData {
1011
1043
  'configuration': EbsiConfiguration;
1012
1044
  }
1013
1045
  /**
1014
- * Configuration for EUDI trust framework. Field didTrustFramework is used when the wallet uses did as its identifier.
1046
+ * Configuration for EUDI trust framework. The field didTrustFramework marks which DID TF is used when the wallet uses did as its identifier.
1015
1047
  * @export
1016
1048
  * @interface EudiConfiguration
1017
1049
  */
@@ -1168,6 +1200,19 @@ export interface IdTokenSendRequest {
1168
1200
  */
1169
1201
  'requestUrl': string;
1170
1202
  }
1203
+ /**
1204
+ * Configuration for IDTL trust framework
1205
+ * @export
1206
+ * @interface IdtlConfiguration
1207
+ */
1208
+ export interface IdtlConfiguration {
1209
+ /**
1210
+ * Defines if a wallet is onboarded
1211
+ * @type {boolean}
1212
+ * @memberof IdtlConfiguration
1213
+ */
1214
+ 'isOnboarded': boolean;
1215
+ }
1171
1216
  /**
1172
1217
  * Request for authorization flow credential issuance process start. Consists of offered credential\'s types and credential offer endpoint (most commonly only schema)
1173
1218
  * @export
@@ -2288,6 +2333,12 @@ export interface WalletConfig {
2288
2333
  * @memberof WalletConfig
2289
2334
  */
2290
2335
  'EUDI'?: EudiConfiguration;
2336
+ /**
2337
+ *
2338
+ * @type {IdtlConfiguration}
2339
+ * @memberof WalletConfig
2340
+ */
2341
+ 'IDTL'?: IdtlConfiguration;
2291
2342
  /**
2292
2343
  *
2293
2344
  * @type {SigningKeyIdentifier}
@@ -2735,6 +2786,14 @@ export declare const DefaultApiAxiosParamCreator: (configuration?: Configuration
2735
2786
  * @throws {RequiredError}
2736
2787
  */
2737
2788
  tfRevokeAccreditation: (walletId: string, revokeAccreditationRequest?: RevokeAccreditationRequest, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
2789
+ /**
2790
+ * Issues a certificate based on the provided certificate request
2791
+ * @param {string} walletId
2792
+ * @param {CertificateIssueRequest} [certificateIssueRequest]
2793
+ * @param {*} [options] Override http request option.
2794
+ * @throws {RequiredError}
2795
+ */
2796
+ tfX509CertificateIssue: (walletId: string, certificateIssueRequest?: CertificateIssueRequest, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
2738
2797
  /**
2739
2798
  * Returns an url where verifier accepts presentations from a holder.
2740
2799
  * @param {string} walletId
@@ -3128,6 +3187,14 @@ export declare const DefaultApiFp: (configuration?: Configuration) => {
3128
3187
  * @throws {RequiredError}
3129
3188
  */
3130
3189
  tfRevokeAccreditation(walletId: string, revokeAccreditationRequest?: RevokeAccreditationRequest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<void>>;
3190
+ /**
3191
+ * Issues a certificate based on the provided certificate request
3192
+ * @param {string} walletId
3193
+ * @param {CertificateIssueRequest} [certificateIssueRequest]
3194
+ * @param {*} [options] Override http request option.
3195
+ * @throws {RequiredError}
3196
+ */
3197
+ tfX509CertificateIssue(walletId: string, certificateIssueRequest?: CertificateIssueRequest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<CertificateIssueResponse>>;
3131
3198
  /**
3132
3199
  * Returns an url where verifier accepts presentations from a holder.
3133
3200
  * @param {string} walletId
@@ -3523,6 +3590,14 @@ export declare const DefaultApiFactory: (configuration?: Configuration, basePath
3523
3590
  * @throws {RequiredError}
3524
3591
  */
3525
3592
  tfRevokeAccreditation(walletId: string, revokeAccreditationRequest?: RevokeAccreditationRequest, options?: RawAxiosRequestConfig): AxiosPromise<void>;
3593
+ /**
3594
+ * Issues a certificate based on the provided certificate request
3595
+ * @param {string} walletId
3596
+ * @param {CertificateIssueRequest} [certificateIssueRequest]
3597
+ * @param {*} [options] Override http request option.
3598
+ * @throws {RequiredError}
3599
+ */
3600
+ tfX509CertificateIssue(walletId: string, certificateIssueRequest?: CertificateIssueRequest, options?: RawAxiosRequestConfig): AxiosPromise<CertificateIssueResponse>;
3526
3601
  /**
3527
3602
  * Returns an url where verifier accepts presentations from a holder.
3528
3603
  * @param {string} walletId
@@ -3951,6 +4026,15 @@ export declare class DefaultApi extends BaseAPI {
3951
4026
  * @memberof DefaultApi
3952
4027
  */
3953
4028
  tfRevokeAccreditation(walletId: string, revokeAccreditationRequest?: RevokeAccreditationRequest, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<void, any>>;
4029
+ /**
4030
+ * Issues a certificate based on the provided certificate request
4031
+ * @param {string} walletId
4032
+ * @param {CertificateIssueRequest} [certificateIssueRequest]
4033
+ * @param {*} [options] Override http request option.
4034
+ * @throws {RequiredError}
4035
+ * @memberof DefaultApi
4036
+ */
4037
+ tfX509CertificateIssue(walletId: string, certificateIssueRequest?: CertificateIssueRequest, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<CertificateIssueResponse, any>>;
3954
4038
  /**
3955
4039
  * Returns an url where verifier accepts presentations from a holder.
3956
4040
  * @param {string} walletId
package/api.js CHANGED
@@ -1294,6 +1294,40 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1294
1294
  options: localVarRequestOptions,
1295
1295
  };
1296
1296
  }),
1297
+ /**
1298
+ * Issues a certificate based on the provided certificate request
1299
+ * @param {string} walletId
1300
+ * @param {CertificateIssueRequest} [certificateIssueRequest]
1301
+ * @param {*} [options] Override http request option.
1302
+ * @throws {RequiredError}
1303
+ */
1304
+ tfX509CertificateIssue: (walletId, certificateIssueRequest, options = {}) => __awaiter(this, void 0, void 0, function* () {
1305
+ // verify required parameter 'walletId' is not null or undefined
1306
+ (0, common_1.assertParamExists)('tfX509CertificateIssue', 'walletId', walletId);
1307
+ const localVarPath = `/tf/{wallet_id}/x509`
1308
+ .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
1309
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
1310
+ const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
1311
+ let baseOptions;
1312
+ if (configuration) {
1313
+ baseOptions = configuration.baseOptions;
1314
+ }
1315
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'POST' }, baseOptions), options);
1316
+ const localVarHeaderParameter = {};
1317
+ const localVarQueryParameter = {};
1318
+ // authentication accessToken required
1319
+ // http bearer authentication required
1320
+ yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1321
+ localVarHeaderParameter['Content-Type'] = 'application/json';
1322
+ (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1323
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1324
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
1325
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(certificateIssueRequest, localVarRequestOptions, configuration);
1326
+ return {
1327
+ url: (0, common_1.toPathString)(localVarUrlObj),
1328
+ options: localVarRequestOptions,
1329
+ };
1330
+ }),
1297
1331
  /**
1298
1332
  * Returns an url where verifier accepts presentations from a holder.
1299
1333
  * @param {string} walletId
@@ -2396,6 +2430,22 @@ const DefaultApiFp = function (configuration) {
2396
2430
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
2397
2431
  });
2398
2432
  },
2433
+ /**
2434
+ * Issues a certificate based on the provided certificate request
2435
+ * @param {string} walletId
2436
+ * @param {CertificateIssueRequest} [certificateIssueRequest]
2437
+ * @param {*} [options] Override http request option.
2438
+ * @throws {RequiredError}
2439
+ */
2440
+ tfX509CertificateIssue(walletId, certificateIssueRequest, options) {
2441
+ var _a, _b, _c;
2442
+ return __awaiter(this, void 0, void 0, function* () {
2443
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.tfX509CertificateIssue(walletId, certificateIssueRequest, options);
2444
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
2445
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.tfX509CertificateIssue']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
2446
+ return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
2447
+ });
2448
+ },
2399
2449
  /**
2400
2450
  * Returns an url where verifier accepts presentations from a holder.
2401
2451
  * @param {string} walletId
@@ -2991,6 +3041,16 @@ const DefaultApiFactory = function (configuration, basePath, axios) {
2991
3041
  tfRevokeAccreditation(walletId, revokeAccreditationRequest, options) {
2992
3042
  return localVarFp.tfRevokeAccreditation(walletId, revokeAccreditationRequest, options).then((request) => request(axios, basePath));
2993
3043
  },
3044
+ /**
3045
+ * Issues a certificate based on the provided certificate request
3046
+ * @param {string} walletId
3047
+ * @param {CertificateIssueRequest} [certificateIssueRequest]
3048
+ * @param {*} [options] Override http request option.
3049
+ * @throws {RequiredError}
3050
+ */
3051
+ tfX509CertificateIssue(walletId, certificateIssueRequest, options) {
3052
+ return localVarFp.tfX509CertificateIssue(walletId, certificateIssueRequest, options).then((request) => request(axios, basePath));
3053
+ },
2994
3054
  /**
2995
3055
  * Returns an url where verifier accepts presentations from a holder.
2996
3056
  * @param {string} walletId
@@ -3515,6 +3575,17 @@ class DefaultApi extends base_1.BaseAPI {
3515
3575
  tfRevokeAccreditation(walletId, revokeAccreditationRequest, options) {
3516
3576
  return (0, exports.DefaultApiFp)(this.configuration).tfRevokeAccreditation(walletId, revokeAccreditationRequest, options).then((request) => request(this.axios, this.basePath));
3517
3577
  }
3578
+ /**
3579
+ * Issues a certificate based on the provided certificate request
3580
+ * @param {string} walletId
3581
+ * @param {CertificateIssueRequest} [certificateIssueRequest]
3582
+ * @param {*} [options] Override http request option.
3583
+ * @throws {RequiredError}
3584
+ * @memberof DefaultApi
3585
+ */
3586
+ tfX509CertificateIssue(walletId, certificateIssueRequest, options) {
3587
+ return (0, exports.DefaultApiFp)(this.configuration).tfX509CertificateIssue(walletId, certificateIssueRequest, options).then((request) => request(this.axios, this.basePath));
3588
+ }
3518
3589
  /**
3519
3590
  * Returns an url where verifier accepts presentations from a holder.
3520
3591
  * @param {string} walletId
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@triveria/wallet",
3
3
  "private": false,
4
- "version": "0.0.244",
4
+ "version": "0.0.246",
5
5
  "description": "",
6
6
  "main": "index.js",
7
7
  "scripts": {