@triveria/wallet 0.0.247 → 0.0.249

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/api.d.ts +242 -6
  2. package/api.js +435 -1
  3. package/package.json +1 -1
package/api.d.ts CHANGED
@@ -289,7 +289,7 @@ export interface CredentialVerifierDefinition {
289
289
  * Unique ID of the definition
290
290
  */
291
291
  'id': string;
292
- 'presentationDefinition': PresentationDefinition;
292
+ 'presentationDefinition'?: PresentationDefinition;
293
293
  'dcqlQuery'?: DCQLQuery;
294
294
  }
295
295
  /**
@@ -383,10 +383,6 @@ export interface EbsiSpecificWalletData {
383
383
  'isOnboarded': boolean;
384
384
  'attributeId'?: string;
385
385
  'proxyUrl'?: string;
386
- /**
387
- * Defines if the specific wallet is a legal entity
388
- */
389
- 'isLegalEntity'?: boolean;
390
386
  'configuration': EbsiConfiguration;
391
387
  }
392
388
  /**
@@ -396,7 +392,11 @@ export interface EudiConfiguration {
396
392
  /**
397
393
  * URL of EUDI Trusted List
398
394
  */
399
- 'tslUrl': string;
395
+ 'etsiTslUrl': string;
396
+ /**
397
+ * Base64 encoded certificates with which the TL validity is checked
398
+ */
399
+ 'trustedTslCertificates'?: Array<string>;
400
400
  'didTrustFramework'?: TrustFrameworkType;
401
401
  }
402
402
  /**
@@ -456,6 +456,14 @@ export interface IdtlConfiguration {
456
456
  * Defines if a wallet is onboarded
457
457
  */
458
458
  'isOnboarded': boolean;
459
+ /**
460
+ * URL of ETSI trusted list
461
+ */
462
+ 'etsiTslUrl'?: string;
463
+ /**
464
+ * Base64 encoded certificates with which the TL validity is checked
465
+ */
466
+ 'trustedTslCertificates'?: Array<string>;
459
467
  }
460
468
  /**
461
469
  * Request for authorization flow credential issuance process start. Consists of offered credential\'s types and credential offer endpoint (most commonly only schema)
@@ -607,6 +615,18 @@ export interface Oauth2Profile {
607
615
  export interface Oauth2RedirectUri {
608
616
  'redirect_uri': string;
609
617
  }
618
+ export declare const ObjectHorizontalAlignment: {
619
+ readonly Left: "left";
620
+ readonly Center: "center";
621
+ readonly Right: "right";
622
+ };
623
+ export type ObjectHorizontalAlignment = typeof ObjectHorizontalAlignment[keyof typeof ObjectHorizontalAlignment];
624
+ export declare const ObjectVerticalAlignment: {
625
+ readonly Top: "top";
626
+ readonly Middle: "middle";
627
+ readonly Bottom: "bottom";
628
+ };
629
+ export type ObjectVerticalAlignment = typeof ObjectVerticalAlignment[keyof typeof ObjectVerticalAlignment];
610
630
  export interface OfferReceivedNotification {
611
631
  'credentialType': string;
612
632
  'offerId': string;
@@ -635,6 +655,34 @@ export type OidcRevisionOidc4vpEnum = typeof OidcRevisionOidc4vpEnum[keyof typeo
635
655
  export interface OnboardResult {
636
656
  'did': string;
637
657
  }
658
+ export interface PdfSignatureValidity {
659
+ 'verificationResult': PdfSignatureValidityVerificationResultEnum;
660
+ /**
661
+ * Details about PDF signature verification errors/warnings
662
+ */
663
+ 'details'?: Array<string>;
664
+ /**
665
+ * Qualification of the signing certificate (QSig, QSeal etc.)
666
+ */
667
+ 'signingCertificateQualification': string;
668
+ /**
669
+ * Signing certificate in base64 encoded form
670
+ */
671
+ 'signingCertificate': string;
672
+ }
673
+ export declare const PdfSignatureValidityVerificationResultEnum: {
674
+ readonly Valid: "valid";
675
+ readonly InvalidSignature: "invalid_signature";
676
+ readonly Revoked: "revoked";
677
+ readonly Expired: "expired";
678
+ readonly UntrustedCertificate: "untrusted_certificate";
679
+ };
680
+ export type PdfSignatureValidityVerificationResultEnum = typeof PdfSignatureValidityVerificationResultEnum[keyof typeof PdfSignatureValidityVerificationResultEnum];
681
+ export interface PdfVerificationResponse {
682
+ 'vpValid'?: boolean;
683
+ 'verifiedCredentials'?: VerifiedWrapper;
684
+ 'signatures'?: Array<PdfSignatureValidity>;
685
+ }
638
686
  /**
639
687
  * Result of the preauthorized issuance process start. Consists of the preauthorized code, pin, and the issuer url.
640
688
  */
@@ -878,6 +926,10 @@ export interface WalletConfig {
878
926
  'credentialVerifiers'?: Array<CredentialVerifierDefinition>;
879
927
  'oidcRevision'?: OidcRevision;
880
928
  'trustFramework': TrustFrameworkType;
929
+ /**
930
+ * Defines if the specific wallet is a legal entity
931
+ */
932
+ 'legalEntity'?: boolean;
881
933
  'EBSI'?: EbsiSpecificWalletData;
882
934
  'EUDI'?: EudiConfiguration;
883
935
  'IDTL'?: IdtlConfiguration;
@@ -1170,6 +1222,40 @@ export declare const DefaultApiAxiosParamCreator: (configuration?: Configuration
1170
1222
  * @throws {RequiredError}
1171
1223
  */
1172
1224
  issuerInitiatePreauthOffer: (walletId: string, initPreAuthOffer?: InitPreAuthOffer, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
1225
+ /**
1226
+ * Returns a signed PDF contained in the verifiable credential containing the credential VP added as an attachment in incremental update.
1227
+ * @param {string} credentialId Verifiable Credential Identifier
1228
+ * @param {boolean} signPdf Whether to sign the PDF with holder\&#39;s X509 certificate or not
1229
+ * @param {string} walletId
1230
+ * @param {*} [options] Override http request option.
1231
+ * @throws {RequiredError}
1232
+ */
1233
+ pdfCredentialMakeVp: (credentialId: string, signPdf: boolean, walletId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
1234
+ /**
1235
+ * Deletes the PDF associated with the verifiable credential. Can be used only for credentials in Draft state.
1236
+ * @param {string} credentialId Verifiable Credential Identifier
1237
+ * @param {string} walletId
1238
+ * @param {*} [options] Override http request option.
1239
+ * @throws {RequiredError}
1240
+ */
1241
+ pdfCredentialTwinDelete: (credentialId: string, walletId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
1242
+ /**
1243
+ * Returns either an unsigned PDF that was uploaded to be signed and embedded into a verifiable credential in case of credential in Draft state, or a signed PDF embedded in an issued VC.
1244
+ * @param {string} credentialId Verifiable Credential Identifier
1245
+ * @param {string} walletId
1246
+ * @param {*} [options] Override http request option.
1247
+ * @throws {RequiredError}
1248
+ */
1249
+ pdfCredentialTwinGet: (credentialId: string, walletId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
1250
+ /**
1251
+ * Uploads a PDF that will be signed and embedded with the verifiable credential when it will be issued. Can be used only for credentials in Draft state. Maximal size of the PDF document is 50 MB.
1252
+ * @param {string} credentialId Verifiable Credential Identifier
1253
+ * @param {string} walletId
1254
+ * @param {File} [pdf]
1255
+ * @param {*} [options] Override http request option.
1256
+ * @throws {RequiredError}
1257
+ */
1258
+ pdfCredentialTwinUpload: (credentialId: string, walletId: string, pdf?: File, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
1173
1259
  /**
1174
1260
  * Accredits a legal entity as RTAO, TAO or TI.
1175
1261
  * @param {string} walletId
@@ -1233,6 +1319,18 @@ export declare const DefaultApiAxiosParamCreator: (configuration?: Configuration
1233
1319
  * @throws {RequiredError}
1234
1320
  */
1235
1321
  verifierLinkedVpVerify: (walletId: string, did: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
1322
+ /**
1323
+ * Verifies the signatures of uploaded PDF and extracts and verifies VP in the PDF document Maximum size of the PDF document is 50 MB.
1324
+ * @param {string} walletId
1325
+ * @param {boolean} extractVp Whether to extract VP attachment from the PDF
1326
+ * @param {File} [pdf]
1327
+ * @param {Array<string>} [trustedCertificates] Base64 encoded x509 certificates with which the PDF may be signed.
1328
+ * @param {Array<string>} [trustedListsUrl] URLs of ETSI trusted lists that will be used for verification purposes. If not provided, ETSI trust list configured for the wallet will be used.
1329
+ * @param {Array<string>} [trustedListSigningCertificates] Base64 encoded x509 certificates with which the ETSI trusted lists may be signed. If not provided, values from wallet config will be used.
1330
+ * @param {*} [options] Override http request option.
1331
+ * @throws {RequiredError}
1332
+ */
1333
+ verifierPdfVerify: (walletId: string, extractVp: boolean, pdf?: File, trustedCertificates?: Array<string>, trustedListsUrl?: Array<string>, trustedListSigningCertificates?: Array<string>, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
1236
1334
  /**
1237
1335
  * Creates a new wallet for the authenticated client.
1238
1336
  * @param {WalletCreatePayload} [walletCreatePayload]
@@ -1577,6 +1675,40 @@ export declare const DefaultApiFp: (configuration?: Configuration) => {
1577
1675
  * @throws {RequiredError}
1578
1676
  */
1579
1677
  issuerInitiatePreauthOffer(walletId: string, initPreAuthOffer?: InitPreAuthOffer, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<PreAuthOffer>>;
1678
+ /**
1679
+ * Returns a signed PDF contained in the verifiable credential containing the credential VP added as an attachment in incremental update.
1680
+ * @param {string} credentialId Verifiable Credential Identifier
1681
+ * @param {boolean} signPdf Whether to sign the PDF with holder\&#39;s X509 certificate or not
1682
+ * @param {string} walletId
1683
+ * @param {*} [options] Override http request option.
1684
+ * @throws {RequiredError}
1685
+ */
1686
+ pdfCredentialMakeVp(credentialId: string, signPdf: boolean, walletId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<File>>;
1687
+ /**
1688
+ * Deletes the PDF associated with the verifiable credential. Can be used only for credentials in Draft state.
1689
+ * @param {string} credentialId Verifiable Credential Identifier
1690
+ * @param {string} walletId
1691
+ * @param {*} [options] Override http request option.
1692
+ * @throws {RequiredError}
1693
+ */
1694
+ pdfCredentialTwinDelete(credentialId: string, walletId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<void>>;
1695
+ /**
1696
+ * Returns either an unsigned PDF that was uploaded to be signed and embedded into a verifiable credential in case of credential in Draft state, or a signed PDF embedded in an issued VC.
1697
+ * @param {string} credentialId Verifiable Credential Identifier
1698
+ * @param {string} walletId
1699
+ * @param {*} [options] Override http request option.
1700
+ * @throws {RequiredError}
1701
+ */
1702
+ pdfCredentialTwinGet(credentialId: string, walletId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<File>>;
1703
+ /**
1704
+ * Uploads a PDF that will be signed and embedded with the verifiable credential when it will be issued. Can be used only for credentials in Draft state. Maximal size of the PDF document is 50 MB.
1705
+ * @param {string} credentialId Verifiable Credential Identifier
1706
+ * @param {string} walletId
1707
+ * @param {File} [pdf]
1708
+ * @param {*} [options] Override http request option.
1709
+ * @throws {RequiredError}
1710
+ */
1711
+ pdfCredentialTwinUpload(credentialId: string, walletId: string, pdf?: File, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<void>>;
1580
1712
  /**
1581
1713
  * Accredits a legal entity as RTAO, TAO or TI.
1582
1714
  * @param {string} walletId
@@ -1640,6 +1772,18 @@ export declare const DefaultApiFp: (configuration?: Configuration) => {
1640
1772
  * @throws {RequiredError}
1641
1773
  */
1642
1774
  verifierLinkedVpVerify(walletId: string, did: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<VerifiedLinkedVp>>>;
1775
+ /**
1776
+ * Verifies the signatures of uploaded PDF and extracts and verifies VP in the PDF document Maximum size of the PDF document is 50 MB.
1777
+ * @param {string} walletId
1778
+ * @param {boolean} extractVp Whether to extract VP attachment from the PDF
1779
+ * @param {File} [pdf]
1780
+ * @param {Array<string>} [trustedCertificates] Base64 encoded x509 certificates with which the PDF may be signed.
1781
+ * @param {Array<string>} [trustedListsUrl] URLs of ETSI trusted lists that will be used for verification purposes. If not provided, ETSI trust list configured for the wallet will be used.
1782
+ * @param {Array<string>} [trustedListSigningCertificates] Base64 encoded x509 certificates with which the ETSI trusted lists may be signed. If not provided, values from wallet config will be used.
1783
+ * @param {*} [options] Override http request option.
1784
+ * @throws {RequiredError}
1785
+ */
1786
+ verifierPdfVerify(walletId: string, extractVp: boolean, pdf?: File, trustedCertificates?: Array<string>, trustedListsUrl?: Array<string>, trustedListSigningCertificates?: Array<string>, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<PdfVerificationResponse>>;
1643
1787
  /**
1644
1788
  * Creates a new wallet for the authenticated client.
1645
1789
  * @param {WalletCreatePayload} [walletCreatePayload]
@@ -1986,6 +2130,40 @@ export declare const DefaultApiFactory: (configuration?: Configuration, basePath
1986
2130
  * @throws {RequiredError}
1987
2131
  */
1988
2132
  issuerInitiatePreauthOffer(walletId: string, initPreAuthOffer?: InitPreAuthOffer, options?: RawAxiosRequestConfig): AxiosPromise<PreAuthOffer>;
2133
+ /**
2134
+ * Returns a signed PDF contained in the verifiable credential containing the credential VP added as an attachment in incremental update.
2135
+ * @param {string} credentialId Verifiable Credential Identifier
2136
+ * @param {boolean} signPdf Whether to sign the PDF with holder\&#39;s X509 certificate or not
2137
+ * @param {string} walletId
2138
+ * @param {*} [options] Override http request option.
2139
+ * @throws {RequiredError}
2140
+ */
2141
+ pdfCredentialMakeVp(credentialId: string, signPdf: boolean, walletId: string, options?: RawAxiosRequestConfig): AxiosPromise<File>;
2142
+ /**
2143
+ * Deletes the PDF associated with the verifiable credential. Can be used only for credentials in Draft state.
2144
+ * @param {string} credentialId Verifiable Credential Identifier
2145
+ * @param {string} walletId
2146
+ * @param {*} [options] Override http request option.
2147
+ * @throws {RequiredError}
2148
+ */
2149
+ pdfCredentialTwinDelete(credentialId: string, walletId: string, options?: RawAxiosRequestConfig): AxiosPromise<void>;
2150
+ /**
2151
+ * Returns either an unsigned PDF that was uploaded to be signed and embedded into a verifiable credential in case of credential in Draft state, or a signed PDF embedded in an issued VC.
2152
+ * @param {string} credentialId Verifiable Credential Identifier
2153
+ * @param {string} walletId
2154
+ * @param {*} [options] Override http request option.
2155
+ * @throws {RequiredError}
2156
+ */
2157
+ pdfCredentialTwinGet(credentialId: string, walletId: string, options?: RawAxiosRequestConfig): AxiosPromise<File>;
2158
+ /**
2159
+ * Uploads a PDF that will be signed and embedded with the verifiable credential when it will be issued. Can be used only for credentials in Draft state. Maximal size of the PDF document is 50 MB.
2160
+ * @param {string} credentialId Verifiable Credential Identifier
2161
+ * @param {string} walletId
2162
+ * @param {File} [pdf]
2163
+ * @param {*} [options] Override http request option.
2164
+ * @throws {RequiredError}
2165
+ */
2166
+ pdfCredentialTwinUpload(credentialId: string, walletId: string, pdf?: File, options?: RawAxiosRequestConfig): AxiosPromise<void>;
1989
2167
  /**
1990
2168
  * Accredits a legal entity as RTAO, TAO or TI.
1991
2169
  * @param {string} walletId
@@ -2049,6 +2227,18 @@ export declare const DefaultApiFactory: (configuration?: Configuration, basePath
2049
2227
  * @throws {RequiredError}
2050
2228
  */
2051
2229
  verifierLinkedVpVerify(walletId: string, did: string, options?: RawAxiosRequestConfig): AxiosPromise<Array<VerifiedLinkedVp>>;
2230
+ /**
2231
+ * Verifies the signatures of uploaded PDF and extracts and verifies VP in the PDF document Maximum size of the PDF document is 50 MB.
2232
+ * @param {string} walletId
2233
+ * @param {boolean} extractVp Whether to extract VP attachment from the PDF
2234
+ * @param {File} [pdf]
2235
+ * @param {Array<string>} [trustedCertificates] Base64 encoded x509 certificates with which the PDF may be signed.
2236
+ * @param {Array<string>} [trustedListsUrl] URLs of ETSI trusted lists that will be used for verification purposes. If not provided, ETSI trust list configured for the wallet will be used.
2237
+ * @param {Array<string>} [trustedListSigningCertificates] Base64 encoded x509 certificates with which the ETSI trusted lists may be signed. If not provided, values from wallet config will be used.
2238
+ * @param {*} [options] Override http request option.
2239
+ * @throws {RequiredError}
2240
+ */
2241
+ verifierPdfVerify(walletId: string, extractVp: boolean, pdf?: File, trustedCertificates?: Array<string>, trustedListsUrl?: Array<string>, trustedListSigningCertificates?: Array<string>, options?: RawAxiosRequestConfig): AxiosPromise<PdfVerificationResponse>;
2052
2242
  /**
2053
2243
  * Creates a new wallet for the authenticated client.
2054
2244
  * @param {WalletCreatePayload} [walletCreatePayload]
@@ -2395,6 +2585,40 @@ export declare class DefaultApi extends BaseAPI {
2395
2585
  * @throws {RequiredError}
2396
2586
  */
2397
2587
  issuerInitiatePreauthOffer(walletId: string, initPreAuthOffer?: InitPreAuthOffer, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<PreAuthOffer, any>>;
2588
+ /**
2589
+ * Returns a signed PDF contained in the verifiable credential containing the credential VP added as an attachment in incremental update.
2590
+ * @param {string} credentialId Verifiable Credential Identifier
2591
+ * @param {boolean} signPdf Whether to sign the PDF with holder\&#39;s X509 certificate or not
2592
+ * @param {string} walletId
2593
+ * @param {*} [options] Override http request option.
2594
+ * @throws {RequiredError}
2595
+ */
2596
+ pdfCredentialMakeVp(credentialId: string, signPdf: boolean, walletId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<File, any>>;
2597
+ /**
2598
+ * Deletes the PDF associated with the verifiable credential. Can be used only for credentials in Draft state.
2599
+ * @param {string} credentialId Verifiable Credential Identifier
2600
+ * @param {string} walletId
2601
+ * @param {*} [options] Override http request option.
2602
+ * @throws {RequiredError}
2603
+ */
2604
+ pdfCredentialTwinDelete(credentialId: string, walletId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<void, any>>;
2605
+ /**
2606
+ * Returns either an unsigned PDF that was uploaded to be signed and embedded into a verifiable credential in case of credential in Draft state, or a signed PDF embedded in an issued VC.
2607
+ * @param {string} credentialId Verifiable Credential Identifier
2608
+ * @param {string} walletId
2609
+ * @param {*} [options] Override http request option.
2610
+ * @throws {RequiredError}
2611
+ */
2612
+ pdfCredentialTwinGet(credentialId: string, walletId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<File, any>>;
2613
+ /**
2614
+ * Uploads a PDF that will be signed and embedded with the verifiable credential when it will be issued. Can be used only for credentials in Draft state. Maximal size of the PDF document is 50 MB.
2615
+ * @param {string} credentialId Verifiable Credential Identifier
2616
+ * @param {string} walletId
2617
+ * @param {File} [pdf]
2618
+ * @param {*} [options] Override http request option.
2619
+ * @throws {RequiredError}
2620
+ */
2621
+ pdfCredentialTwinUpload(credentialId: string, walletId: string, pdf?: File, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<void, any>>;
2398
2622
  /**
2399
2623
  * Accredits a legal entity as RTAO, TAO or TI.
2400
2624
  * @param {string} walletId
@@ -2458,6 +2682,18 @@ export declare class DefaultApi extends BaseAPI {
2458
2682
  * @throws {RequiredError}
2459
2683
  */
2460
2684
  verifierLinkedVpVerify(walletId: string, did: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<VerifiedLinkedVp[], any>>;
2685
+ /**
2686
+ * Verifies the signatures of uploaded PDF and extracts and verifies VP in the PDF document Maximum size of the PDF document is 50 MB.
2687
+ * @param {string} walletId
2688
+ * @param {boolean} extractVp Whether to extract VP attachment from the PDF
2689
+ * @param {File} [pdf]
2690
+ * @param {Array<string>} [trustedCertificates] Base64 encoded x509 certificates with which the PDF may be signed.
2691
+ * @param {Array<string>} [trustedListsUrl] URLs of ETSI trusted lists that will be used for verification purposes. If not provided, ETSI trust list configured for the wallet will be used.
2692
+ * @param {Array<string>} [trustedListSigningCertificates] Base64 encoded x509 certificates with which the ETSI trusted lists may be signed. If not provided, values from wallet config will be used.
2693
+ * @param {*} [options] Override http request option.
2694
+ * @throws {RequiredError}
2695
+ */
2696
+ verifierPdfVerify(walletId: string, extractVp: boolean, pdf?: File, trustedCertificates?: Array<string>, trustedListsUrl?: Array<string>, trustedListSigningCertificates?: Array<string>, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<PdfVerificationResponse, any>>;
2461
2697
  /**
2462
2698
  * Creates a new wallet for the authenticated client.
2463
2699
  * @param {WalletCreatePayload} [walletCreatePayload]
package/api.js CHANGED
@@ -25,7 +25,7 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
25
25
  return (mod && mod.__esModule) ? mod : { "default": mod };
26
26
  };
27
27
  Object.defineProperty(exports, "__esModule", { value: true });
28
- exports.CredentialListInteractionEnum = exports.DefaultApi = exports.DefaultApiFactory = exports.DefaultApiFp = exports.DefaultApiAxiosParamCreator = exports.WalletNotificationEventType = exports.WalletCapability = exports.TrustFrameworkType = exports.SystemImpactStatusEnum = exports.SigningKeyIdentifier = exports.RevokeAccreditationRequestTypeEnum = exports.PresentationDefinitionSubmissionRequirementsRuleEnum = exports.PrepareToAccreditRequestTypeEnum = exports.OidcRevisionOidc4vpEnum = exports.OidcRevisionOidc4vciEnum = exports.ListSort = exports.InteractionAuthorizationRequirementsRequirementTypeEnum = exports.HealthStatusStatusEnum = exports.DeferredStatusEnum = exports.CredentialMetadataStatusEnum = exports.CredentialMetadataInteractionEnum = exports.CredentialIssuerDefinitionCredentialIssuerEnum = exports.CredentialFormat = exports.AccreditationRequestTypeEnum = void 0;
28
+ exports.CredentialListInteractionEnum = exports.DefaultApi = exports.DefaultApiFactory = exports.DefaultApiFp = exports.DefaultApiAxiosParamCreator = exports.WalletNotificationEventType = exports.WalletCapability = exports.TrustFrameworkType = exports.SystemImpactStatusEnum = exports.SigningKeyIdentifier = exports.RevokeAccreditationRequestTypeEnum = exports.PresentationDefinitionSubmissionRequirementsRuleEnum = exports.PrepareToAccreditRequestTypeEnum = exports.PdfSignatureValidityVerificationResultEnum = exports.OidcRevisionOidc4vpEnum = exports.OidcRevisionOidc4vciEnum = exports.ObjectVerticalAlignment = exports.ObjectHorizontalAlignment = exports.ListSort = exports.InteractionAuthorizationRequirementsRequirementTypeEnum = exports.HealthStatusStatusEnum = exports.DeferredStatusEnum = exports.CredentialMetadataStatusEnum = exports.CredentialMetadataInteractionEnum = exports.CredentialIssuerDefinitionCredentialIssuerEnum = exports.CredentialFormat = exports.AccreditationRequestTypeEnum = void 0;
29
29
  const axios_1 = __importDefault(require("axios"));
30
30
  // Some imports not used depending on template conditions
31
31
  // @ts-ignore
@@ -85,6 +85,16 @@ exports.ListSort = {
85
85
  Asc: 'asc',
86
86
  Desc: 'desc'
87
87
  };
88
+ exports.ObjectHorizontalAlignment = {
89
+ Left: 'left',
90
+ Center: 'center',
91
+ Right: 'right'
92
+ };
93
+ exports.ObjectVerticalAlignment = {
94
+ Top: 'top',
95
+ Middle: 'middle',
96
+ Bottom: 'bottom'
97
+ };
88
98
  exports.OidcRevisionOidc4vciEnum = {
89
99
  Draft11: 'Draft11',
90
100
  Draft15: 'Draft15'
@@ -93,6 +103,13 @@ exports.OidcRevisionOidc4vpEnum = {
93
103
  Draft16: 'Draft16',
94
104
  Draft23: 'Draft23'
95
105
  };
106
+ exports.PdfSignatureValidityVerificationResultEnum = {
107
+ Valid: 'valid',
108
+ InvalidSignature: 'invalid_signature',
109
+ Revoked: 'revoked',
110
+ Expired: 'expired',
111
+ UntrustedCertificate: 'untrusted_certificate'
112
+ };
96
113
  exports.PrepareToAccreditRequestTypeEnum = {
97
114
  TrustedIssuer: 'TrustedIssuer',
98
115
  TrustedAccreditationOrganisation: 'TrustedAccreditationOrganisation'
@@ -1108,6 +1125,167 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1108
1125
  options: localVarRequestOptions,
1109
1126
  };
1110
1127
  }),
1128
+ /**
1129
+ * Returns a signed PDF contained in the verifiable credential containing the credential VP added as an attachment in incremental update.
1130
+ * @param {string} credentialId Verifiable Credential Identifier
1131
+ * @param {boolean} signPdf Whether to sign the PDF with holder\&#39;s X509 certificate or not
1132
+ * @param {string} walletId
1133
+ * @param {*} [options] Override http request option.
1134
+ * @throws {RequiredError}
1135
+ */
1136
+ pdfCredentialMakeVp: (credentialId, signPdf, walletId, options = {}) => __awaiter(this, void 0, void 0, function* () {
1137
+ // verify required parameter 'credentialId' is not null or undefined
1138
+ (0, common_1.assertParamExists)('pdfCredentialMakeVp', 'credentialId', credentialId);
1139
+ // verify required parameter 'signPdf' is not null or undefined
1140
+ (0, common_1.assertParamExists)('pdfCredentialMakeVp', 'signPdf', signPdf);
1141
+ // verify required parameter 'walletId' is not null or undefined
1142
+ (0, common_1.assertParamExists)('pdfCredentialMakeVp', 'walletId', walletId);
1143
+ const localVarPath = `/credentials/{credential_id}/pdf/vp`
1144
+ .replace(`{${"credential_id"}}`, encodeURIComponent(String(credentialId)));
1145
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
1146
+ const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
1147
+ let baseOptions;
1148
+ if (configuration) {
1149
+ baseOptions = configuration.baseOptions;
1150
+ }
1151
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'POST' }, baseOptions), options);
1152
+ const localVarHeaderParameter = {};
1153
+ const localVarQueryParameter = {};
1154
+ // authentication accessToken required
1155
+ // http bearer authentication required
1156
+ yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1157
+ if (signPdf !== undefined) {
1158
+ localVarQueryParameter['sign_pdf'] = signPdf;
1159
+ }
1160
+ if (walletId != null) {
1161
+ localVarHeaderParameter['wallet-id'] = String(walletId);
1162
+ }
1163
+ (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1164
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1165
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
1166
+ return {
1167
+ url: (0, common_1.toPathString)(localVarUrlObj),
1168
+ options: localVarRequestOptions,
1169
+ };
1170
+ }),
1171
+ /**
1172
+ * Deletes the PDF associated with the verifiable credential. Can be used only for credentials in Draft state.
1173
+ * @param {string} credentialId Verifiable Credential Identifier
1174
+ * @param {string} walletId
1175
+ * @param {*} [options] Override http request option.
1176
+ * @throws {RequiredError}
1177
+ */
1178
+ pdfCredentialTwinDelete: (credentialId, walletId, options = {}) => __awaiter(this, void 0, void 0, function* () {
1179
+ // verify required parameter 'credentialId' is not null or undefined
1180
+ (0, common_1.assertParamExists)('pdfCredentialTwinDelete', 'credentialId', credentialId);
1181
+ // verify required parameter 'walletId' is not null or undefined
1182
+ (0, common_1.assertParamExists)('pdfCredentialTwinDelete', 'walletId', walletId);
1183
+ const localVarPath = `/credentials/{credential_id}/pdf`
1184
+ .replace(`{${"credential_id"}}`, encodeURIComponent(String(credentialId)));
1185
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
1186
+ const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
1187
+ let baseOptions;
1188
+ if (configuration) {
1189
+ baseOptions = configuration.baseOptions;
1190
+ }
1191
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'DELETE' }, baseOptions), options);
1192
+ const localVarHeaderParameter = {};
1193
+ const localVarQueryParameter = {};
1194
+ // authentication accessToken required
1195
+ // http bearer authentication required
1196
+ yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1197
+ if (walletId != null) {
1198
+ localVarHeaderParameter['wallet-id'] = String(walletId);
1199
+ }
1200
+ (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1201
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1202
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
1203
+ return {
1204
+ url: (0, common_1.toPathString)(localVarUrlObj),
1205
+ options: localVarRequestOptions,
1206
+ };
1207
+ }),
1208
+ /**
1209
+ * Returns either an unsigned PDF that was uploaded to be signed and embedded into a verifiable credential in case of credential in Draft state, or a signed PDF embedded in an issued VC.
1210
+ * @param {string} credentialId Verifiable Credential Identifier
1211
+ * @param {string} walletId
1212
+ * @param {*} [options] Override http request option.
1213
+ * @throws {RequiredError}
1214
+ */
1215
+ pdfCredentialTwinGet: (credentialId, walletId, options = {}) => __awaiter(this, void 0, void 0, function* () {
1216
+ // verify required parameter 'credentialId' is not null or undefined
1217
+ (0, common_1.assertParamExists)('pdfCredentialTwinGet', 'credentialId', credentialId);
1218
+ // verify required parameter 'walletId' is not null or undefined
1219
+ (0, common_1.assertParamExists)('pdfCredentialTwinGet', 'walletId', walletId);
1220
+ const localVarPath = `/credentials/{credential_id}/pdf`
1221
+ .replace(`{${"credential_id"}}`, encodeURIComponent(String(credentialId)));
1222
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
1223
+ const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
1224
+ let baseOptions;
1225
+ if (configuration) {
1226
+ baseOptions = configuration.baseOptions;
1227
+ }
1228
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
1229
+ const localVarHeaderParameter = {};
1230
+ const localVarQueryParameter = {};
1231
+ // authentication accessToken required
1232
+ // http bearer authentication required
1233
+ yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1234
+ if (walletId != null) {
1235
+ localVarHeaderParameter['wallet-id'] = String(walletId);
1236
+ }
1237
+ (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1238
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1239
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
1240
+ return {
1241
+ url: (0, common_1.toPathString)(localVarUrlObj),
1242
+ options: localVarRequestOptions,
1243
+ };
1244
+ }),
1245
+ /**
1246
+ * Uploads a PDF that will be signed and embedded with the verifiable credential when it will be issued. Can be used only for credentials in Draft state. Maximal size of the PDF document is 50 MB.
1247
+ * @param {string} credentialId Verifiable Credential Identifier
1248
+ * @param {string} walletId
1249
+ * @param {File} [pdf]
1250
+ * @param {*} [options] Override http request option.
1251
+ * @throws {RequiredError}
1252
+ */
1253
+ pdfCredentialTwinUpload: (credentialId, walletId, pdf, options = {}) => __awaiter(this, void 0, void 0, function* () {
1254
+ // verify required parameter 'credentialId' is not null or undefined
1255
+ (0, common_1.assertParamExists)('pdfCredentialTwinUpload', 'credentialId', credentialId);
1256
+ // verify required parameter 'walletId' is not null or undefined
1257
+ (0, common_1.assertParamExists)('pdfCredentialTwinUpload', 'walletId', walletId);
1258
+ const localVarPath = `/credentials/{credential_id}/pdf`
1259
+ .replace(`{${"credential_id"}}`, encodeURIComponent(String(credentialId)));
1260
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
1261
+ const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
1262
+ let baseOptions;
1263
+ if (configuration) {
1264
+ baseOptions = configuration.baseOptions;
1265
+ }
1266
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'POST' }, baseOptions), options);
1267
+ const localVarHeaderParameter = {};
1268
+ const localVarQueryParameter = {};
1269
+ const localVarFormParams = new ((configuration && configuration.formDataCtor) || FormData)();
1270
+ // authentication accessToken required
1271
+ // http bearer authentication required
1272
+ yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1273
+ if (pdf !== undefined) {
1274
+ localVarFormParams.append('pdf', pdf);
1275
+ }
1276
+ localVarHeaderParameter['Content-Type'] = 'multipart/form-data';
1277
+ if (walletId != null) {
1278
+ localVarHeaderParameter['wallet-id'] = String(walletId);
1279
+ }
1280
+ (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1281
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1282
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
1283
+ localVarRequestOptions.data = localVarFormParams;
1284
+ return {
1285
+ url: (0, common_1.toPathString)(localVarUrlObj),
1286
+ options: localVarRequestOptions,
1287
+ };
1288
+ }),
1111
1289
  /**
1112
1290
  * Accredits a legal entity as RTAO, TAO or TI.
1113
1291
  * @param {string} walletId
@@ -1384,6 +1562,64 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1384
1562
  options: localVarRequestOptions,
1385
1563
  };
1386
1564
  }),
1565
+ /**
1566
+ * Verifies the signatures of uploaded PDF and extracts and verifies VP in the PDF document Maximum size of the PDF document is 50 MB.
1567
+ * @param {string} walletId
1568
+ * @param {boolean} extractVp Whether to extract VP attachment from the PDF
1569
+ * @param {File} [pdf]
1570
+ * @param {Array<string>} [trustedCertificates] Base64 encoded x509 certificates with which the PDF may be signed.
1571
+ * @param {Array<string>} [trustedListsUrl] URLs of ETSI trusted lists that will be used for verification purposes. If not provided, ETSI trust list configured for the wallet will be used.
1572
+ * @param {Array<string>} [trustedListSigningCertificates] Base64 encoded x509 certificates with which the ETSI trusted lists may be signed. If not provided, values from wallet config will be used.
1573
+ * @param {*} [options] Override http request option.
1574
+ * @throws {RequiredError}
1575
+ */
1576
+ verifierPdfVerify: (walletId, extractVp, pdf, trustedCertificates, trustedListsUrl, trustedListSigningCertificates, options = {}) => __awaiter(this, void 0, void 0, function* () {
1577
+ // verify required parameter 'walletId' is not null or undefined
1578
+ (0, common_1.assertParamExists)('verifierPdfVerify', 'walletId', walletId);
1579
+ // verify required parameter 'extractVp' is not null or undefined
1580
+ (0, common_1.assertParamExists)('verifierPdfVerify', 'extractVp', extractVp);
1581
+ const localVarPath = `/verifier/pdf`;
1582
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
1583
+ const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
1584
+ let baseOptions;
1585
+ if (configuration) {
1586
+ baseOptions = configuration.baseOptions;
1587
+ }
1588
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'POST' }, baseOptions), options);
1589
+ const localVarHeaderParameter = {};
1590
+ const localVarQueryParameter = {};
1591
+ const localVarFormParams = new ((configuration && configuration.formDataCtor) || FormData)();
1592
+ // authentication accessToken required
1593
+ // http bearer authentication required
1594
+ yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1595
+ if (pdf !== undefined) {
1596
+ localVarFormParams.append('pdf', pdf);
1597
+ }
1598
+ if (extractVp !== undefined) {
1599
+ localVarFormParams.append('extractVp', String(extractVp));
1600
+ }
1601
+ if (trustedCertificates) {
1602
+ localVarFormParams.append('trustedCertificates', trustedCertificates.join(base_1.COLLECTION_FORMATS.csv));
1603
+ }
1604
+ if (trustedListsUrl) {
1605
+ localVarFormParams.append('trustedListsUrl', trustedListsUrl.join(base_1.COLLECTION_FORMATS.csv));
1606
+ }
1607
+ if (trustedListSigningCertificates) {
1608
+ localVarFormParams.append('trustedListSigningCertificates', trustedListSigningCertificates.join(base_1.COLLECTION_FORMATS.csv));
1609
+ }
1610
+ localVarHeaderParameter['Content-Type'] = 'multipart/form-data';
1611
+ if (walletId != null) {
1612
+ localVarHeaderParameter['wallet-id'] = String(walletId);
1613
+ }
1614
+ (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1615
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1616
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
1617
+ localVarRequestOptions.data = localVarFormParams;
1618
+ return {
1619
+ url: (0, common_1.toPathString)(localVarUrlObj),
1620
+ options: localVarRequestOptions,
1621
+ };
1622
+ }),
1387
1623
  /**
1388
1624
  * Creates a new wallet for the authenticated client.
1389
1625
  * @param {WalletCreatePayload} [walletCreatePayload]
@@ -2359,6 +2595,72 @@ const DefaultApiFp = function (configuration) {
2359
2595
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
2360
2596
  });
2361
2597
  },
2598
+ /**
2599
+ * Returns a signed PDF contained in the verifiable credential containing the credential VP added as an attachment in incremental update.
2600
+ * @param {string} credentialId Verifiable Credential Identifier
2601
+ * @param {boolean} signPdf Whether to sign the PDF with holder\&#39;s X509 certificate or not
2602
+ * @param {string} walletId
2603
+ * @param {*} [options] Override http request option.
2604
+ * @throws {RequiredError}
2605
+ */
2606
+ pdfCredentialMakeVp(credentialId, signPdf, walletId, options) {
2607
+ var _a, _b, _c;
2608
+ return __awaiter(this, void 0, void 0, function* () {
2609
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.pdfCredentialMakeVp(credentialId, signPdf, walletId, options);
2610
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
2611
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.pdfCredentialMakeVp']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
2612
+ return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
2613
+ });
2614
+ },
2615
+ /**
2616
+ * Deletes the PDF associated with the verifiable credential. Can be used only for credentials in Draft state.
2617
+ * @param {string} credentialId Verifiable Credential Identifier
2618
+ * @param {string} walletId
2619
+ * @param {*} [options] Override http request option.
2620
+ * @throws {RequiredError}
2621
+ */
2622
+ pdfCredentialTwinDelete(credentialId, walletId, options) {
2623
+ var _a, _b, _c;
2624
+ return __awaiter(this, void 0, void 0, function* () {
2625
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.pdfCredentialTwinDelete(credentialId, walletId, options);
2626
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
2627
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.pdfCredentialTwinDelete']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
2628
+ return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
2629
+ });
2630
+ },
2631
+ /**
2632
+ * Returns either an unsigned PDF that was uploaded to be signed and embedded into a verifiable credential in case of credential in Draft state, or a signed PDF embedded in an issued VC.
2633
+ * @param {string} credentialId Verifiable Credential Identifier
2634
+ * @param {string} walletId
2635
+ * @param {*} [options] Override http request option.
2636
+ * @throws {RequiredError}
2637
+ */
2638
+ pdfCredentialTwinGet(credentialId, walletId, options) {
2639
+ var _a, _b, _c;
2640
+ return __awaiter(this, void 0, void 0, function* () {
2641
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.pdfCredentialTwinGet(credentialId, walletId, options);
2642
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
2643
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.pdfCredentialTwinGet']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
2644
+ return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
2645
+ });
2646
+ },
2647
+ /**
2648
+ * Uploads a PDF that will be signed and embedded with the verifiable credential when it will be issued. Can be used only for credentials in Draft state. Maximal size of the PDF document is 50 MB.
2649
+ * @param {string} credentialId Verifiable Credential Identifier
2650
+ * @param {string} walletId
2651
+ * @param {File} [pdf]
2652
+ * @param {*} [options] Override http request option.
2653
+ * @throws {RequiredError}
2654
+ */
2655
+ pdfCredentialTwinUpload(credentialId, walletId, pdf, options) {
2656
+ var _a, _b, _c;
2657
+ return __awaiter(this, void 0, void 0, function* () {
2658
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.pdfCredentialTwinUpload(credentialId, walletId, pdf, options);
2659
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
2660
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.pdfCredentialTwinUpload']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
2661
+ return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
2662
+ });
2663
+ },
2362
2664
  /**
2363
2665
  * Accredits a legal entity as RTAO, TAO or TI.
2364
2666
  * @param {string} walletId
@@ -2486,6 +2788,26 @@ const DefaultApiFp = function (configuration) {
2486
2788
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
2487
2789
  });
2488
2790
  },
2791
+ /**
2792
+ * Verifies the signatures of uploaded PDF and extracts and verifies VP in the PDF document Maximum size of the PDF document is 50 MB.
2793
+ * @param {string} walletId
2794
+ * @param {boolean} extractVp Whether to extract VP attachment from the PDF
2795
+ * @param {File} [pdf]
2796
+ * @param {Array<string>} [trustedCertificates] Base64 encoded x509 certificates with which the PDF may be signed.
2797
+ * @param {Array<string>} [trustedListsUrl] URLs of ETSI trusted lists that will be used for verification purposes. If not provided, ETSI trust list configured for the wallet will be used.
2798
+ * @param {Array<string>} [trustedListSigningCertificates] Base64 encoded x509 certificates with which the ETSI trusted lists may be signed. If not provided, values from wallet config will be used.
2799
+ * @param {*} [options] Override http request option.
2800
+ * @throws {RequiredError}
2801
+ */
2802
+ verifierPdfVerify(walletId, extractVp, pdf, trustedCertificates, trustedListsUrl, trustedListSigningCertificates, options) {
2803
+ var _a, _b, _c;
2804
+ return __awaiter(this, void 0, void 0, function* () {
2805
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.verifierPdfVerify(walletId, extractVp, pdf, trustedCertificates, trustedListsUrl, trustedListSigningCertificates, options);
2806
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
2807
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.verifierPdfVerify']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
2808
+ return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
2809
+ });
2810
+ },
2489
2811
  /**
2490
2812
  * Creates a new wallet for the authenticated client.
2491
2813
  * @param {WalletCreatePayload} [walletCreatePayload]
@@ -3014,6 +3336,48 @@ const DefaultApiFactory = function (configuration, basePath, axios) {
3014
3336
  issuerInitiatePreauthOffer(walletId, initPreAuthOffer, options) {
3015
3337
  return localVarFp.issuerInitiatePreauthOffer(walletId, initPreAuthOffer, options).then((request) => request(axios, basePath));
3016
3338
  },
3339
+ /**
3340
+ * Returns a signed PDF contained in the verifiable credential containing the credential VP added as an attachment in incremental update.
3341
+ * @param {string} credentialId Verifiable Credential Identifier
3342
+ * @param {boolean} signPdf Whether to sign the PDF with holder\&#39;s X509 certificate or not
3343
+ * @param {string} walletId
3344
+ * @param {*} [options] Override http request option.
3345
+ * @throws {RequiredError}
3346
+ */
3347
+ pdfCredentialMakeVp(credentialId, signPdf, walletId, options) {
3348
+ return localVarFp.pdfCredentialMakeVp(credentialId, signPdf, walletId, options).then((request) => request(axios, basePath));
3349
+ },
3350
+ /**
3351
+ * Deletes the PDF associated with the verifiable credential. Can be used only for credentials in Draft state.
3352
+ * @param {string} credentialId Verifiable Credential Identifier
3353
+ * @param {string} walletId
3354
+ * @param {*} [options] Override http request option.
3355
+ * @throws {RequiredError}
3356
+ */
3357
+ pdfCredentialTwinDelete(credentialId, walletId, options) {
3358
+ return localVarFp.pdfCredentialTwinDelete(credentialId, walletId, options).then((request) => request(axios, basePath));
3359
+ },
3360
+ /**
3361
+ * Returns either an unsigned PDF that was uploaded to be signed and embedded into a verifiable credential in case of credential in Draft state, or a signed PDF embedded in an issued VC.
3362
+ * @param {string} credentialId Verifiable Credential Identifier
3363
+ * @param {string} walletId
3364
+ * @param {*} [options] Override http request option.
3365
+ * @throws {RequiredError}
3366
+ */
3367
+ pdfCredentialTwinGet(credentialId, walletId, options) {
3368
+ return localVarFp.pdfCredentialTwinGet(credentialId, walletId, options).then((request) => request(axios, basePath));
3369
+ },
3370
+ /**
3371
+ * Uploads a PDF that will be signed and embedded with the verifiable credential when it will be issued. Can be used only for credentials in Draft state. Maximal size of the PDF document is 50 MB.
3372
+ * @param {string} credentialId Verifiable Credential Identifier
3373
+ * @param {string} walletId
3374
+ * @param {File} [pdf]
3375
+ * @param {*} [options] Override http request option.
3376
+ * @throws {RequiredError}
3377
+ */
3378
+ pdfCredentialTwinUpload(credentialId, walletId, pdf, options) {
3379
+ return localVarFp.pdfCredentialTwinUpload(credentialId, walletId, pdf, options).then((request) => request(axios, basePath));
3380
+ },
3017
3381
  /**
3018
3382
  * Accredits a legal entity as RTAO, TAO or TI.
3019
3383
  * @param {string} walletId
@@ -3093,6 +3457,20 @@ const DefaultApiFactory = function (configuration, basePath, axios) {
3093
3457
  verifierLinkedVpVerify(walletId, did, options) {
3094
3458
  return localVarFp.verifierLinkedVpVerify(walletId, did, options).then((request) => request(axios, basePath));
3095
3459
  },
3460
+ /**
3461
+ * Verifies the signatures of uploaded PDF and extracts and verifies VP in the PDF document Maximum size of the PDF document is 50 MB.
3462
+ * @param {string} walletId
3463
+ * @param {boolean} extractVp Whether to extract VP attachment from the PDF
3464
+ * @param {File} [pdf]
3465
+ * @param {Array<string>} [trustedCertificates] Base64 encoded x509 certificates with which the PDF may be signed.
3466
+ * @param {Array<string>} [trustedListsUrl] URLs of ETSI trusted lists that will be used for verification purposes. If not provided, ETSI trust list configured for the wallet will be used.
3467
+ * @param {Array<string>} [trustedListSigningCertificates] Base64 encoded x509 certificates with which the ETSI trusted lists may be signed. If not provided, values from wallet config will be used.
3468
+ * @param {*} [options] Override http request option.
3469
+ * @throws {RequiredError}
3470
+ */
3471
+ verifierPdfVerify(walletId, extractVp, pdf, trustedCertificates, trustedListsUrl, trustedListSigningCertificates, options) {
3472
+ return localVarFp.verifierPdfVerify(walletId, extractVp, pdf, trustedCertificates, trustedListsUrl, trustedListSigningCertificates, options).then((request) => request(axios, basePath));
3473
+ },
3096
3474
  /**
3097
3475
  * Creates a new wallet for the authenticated client.
3098
3476
  * @param {WalletCreatePayload} [walletCreatePayload]
@@ -3523,6 +3901,48 @@ class DefaultApi extends base_1.BaseAPI {
3523
3901
  issuerInitiatePreauthOffer(walletId, initPreAuthOffer, options) {
3524
3902
  return (0, exports.DefaultApiFp)(this.configuration).issuerInitiatePreauthOffer(walletId, initPreAuthOffer, options).then((request) => request(this.axios, this.basePath));
3525
3903
  }
3904
+ /**
3905
+ * Returns a signed PDF contained in the verifiable credential containing the credential VP added as an attachment in incremental update.
3906
+ * @param {string} credentialId Verifiable Credential Identifier
3907
+ * @param {boolean} signPdf Whether to sign the PDF with holder\&#39;s X509 certificate or not
3908
+ * @param {string} walletId
3909
+ * @param {*} [options] Override http request option.
3910
+ * @throws {RequiredError}
3911
+ */
3912
+ pdfCredentialMakeVp(credentialId, signPdf, walletId, options) {
3913
+ return (0, exports.DefaultApiFp)(this.configuration).pdfCredentialMakeVp(credentialId, signPdf, walletId, options).then((request) => request(this.axios, this.basePath));
3914
+ }
3915
+ /**
3916
+ * Deletes the PDF associated with the verifiable credential. Can be used only for credentials in Draft state.
3917
+ * @param {string} credentialId Verifiable Credential Identifier
3918
+ * @param {string} walletId
3919
+ * @param {*} [options] Override http request option.
3920
+ * @throws {RequiredError}
3921
+ */
3922
+ pdfCredentialTwinDelete(credentialId, walletId, options) {
3923
+ return (0, exports.DefaultApiFp)(this.configuration).pdfCredentialTwinDelete(credentialId, walletId, options).then((request) => request(this.axios, this.basePath));
3924
+ }
3925
+ /**
3926
+ * Returns either an unsigned PDF that was uploaded to be signed and embedded into a verifiable credential in case of credential in Draft state, or a signed PDF embedded in an issued VC.
3927
+ * @param {string} credentialId Verifiable Credential Identifier
3928
+ * @param {string} walletId
3929
+ * @param {*} [options] Override http request option.
3930
+ * @throws {RequiredError}
3931
+ */
3932
+ pdfCredentialTwinGet(credentialId, walletId, options) {
3933
+ return (0, exports.DefaultApiFp)(this.configuration).pdfCredentialTwinGet(credentialId, walletId, options).then((request) => request(this.axios, this.basePath));
3934
+ }
3935
+ /**
3936
+ * Uploads a PDF that will be signed and embedded with the verifiable credential when it will be issued. Can be used only for credentials in Draft state. Maximal size of the PDF document is 50 MB.
3937
+ * @param {string} credentialId Verifiable Credential Identifier
3938
+ * @param {string} walletId
3939
+ * @param {File} [pdf]
3940
+ * @param {*} [options] Override http request option.
3941
+ * @throws {RequiredError}
3942
+ */
3943
+ pdfCredentialTwinUpload(credentialId, walletId, pdf, options) {
3944
+ return (0, exports.DefaultApiFp)(this.configuration).pdfCredentialTwinUpload(credentialId, walletId, pdf, options).then((request) => request(this.axios, this.basePath));
3945
+ }
3526
3946
  /**
3527
3947
  * Accredits a legal entity as RTAO, TAO or TI.
3528
3948
  * @param {string} walletId
@@ -3602,6 +4022,20 @@ class DefaultApi extends base_1.BaseAPI {
3602
4022
  verifierLinkedVpVerify(walletId, did, options) {
3603
4023
  return (0, exports.DefaultApiFp)(this.configuration).verifierLinkedVpVerify(walletId, did, options).then((request) => request(this.axios, this.basePath));
3604
4024
  }
4025
+ /**
4026
+ * Verifies the signatures of uploaded PDF and extracts and verifies VP in the PDF document Maximum size of the PDF document is 50 MB.
4027
+ * @param {string} walletId
4028
+ * @param {boolean} extractVp Whether to extract VP attachment from the PDF
4029
+ * @param {File} [pdf]
4030
+ * @param {Array<string>} [trustedCertificates] Base64 encoded x509 certificates with which the PDF may be signed.
4031
+ * @param {Array<string>} [trustedListsUrl] URLs of ETSI trusted lists that will be used for verification purposes. If not provided, ETSI trust list configured for the wallet will be used.
4032
+ * @param {Array<string>} [trustedListSigningCertificates] Base64 encoded x509 certificates with which the ETSI trusted lists may be signed. If not provided, values from wallet config will be used.
4033
+ * @param {*} [options] Override http request option.
4034
+ * @throws {RequiredError}
4035
+ */
4036
+ verifierPdfVerify(walletId, extractVp, pdf, trustedCertificates, trustedListsUrl, trustedListSigningCertificates, options) {
4037
+ return (0, exports.DefaultApiFp)(this.configuration).verifierPdfVerify(walletId, extractVp, pdf, trustedCertificates, trustedListsUrl, trustedListSigningCertificates, options).then((request) => request(this.axios, this.basePath));
4038
+ }
3605
4039
  /**
3606
4040
  * Creates a new wallet for the authenticated client.
3607
4041
  * @param {WalletCreatePayload} [walletCreatePayload]
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@triveria/wallet",
3
3
  "private": false,
4
- "version": "0.0.247",
4
+ "version": "0.0.249",
5
5
  "description": "",
6
6
  "main": "index.js",
7
7
  "scripts": {