@triveria/wallet 0.0.248 → 0.0.250
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/api.d.ts +242 -6
- package/api.js +435 -1
- package/base.js +1 -1
- package/package.json +1 -1
package/api.d.ts
CHANGED
|
@@ -289,7 +289,7 @@ export interface CredentialVerifierDefinition {
|
|
|
289
289
|
* Unique ID of the definition
|
|
290
290
|
*/
|
|
291
291
|
'id': string;
|
|
292
|
-
'presentationDefinition'
|
|
292
|
+
'presentationDefinition'?: PresentationDefinition;
|
|
293
293
|
'dcqlQuery'?: DCQLQuery;
|
|
294
294
|
}
|
|
295
295
|
/**
|
|
@@ -383,10 +383,6 @@ export interface EbsiSpecificWalletData {
|
|
|
383
383
|
'isOnboarded': boolean;
|
|
384
384
|
'attributeId'?: string;
|
|
385
385
|
'proxyUrl'?: string;
|
|
386
|
-
/**
|
|
387
|
-
* Defines if the specific wallet is a legal entity
|
|
388
|
-
*/
|
|
389
|
-
'isLegalEntity'?: boolean;
|
|
390
386
|
'configuration': EbsiConfiguration;
|
|
391
387
|
}
|
|
392
388
|
/**
|
|
@@ -396,7 +392,11 @@ export interface EudiConfiguration {
|
|
|
396
392
|
/**
|
|
397
393
|
* URL of EUDI Trusted List
|
|
398
394
|
*/
|
|
399
|
-
'
|
|
395
|
+
'etsiTslUrl': string;
|
|
396
|
+
/**
|
|
397
|
+
* Base64 encoded certificates with which the TL validity is checked
|
|
398
|
+
*/
|
|
399
|
+
'trustedTslCertificates'?: Array<string>;
|
|
400
400
|
'didTrustFramework'?: TrustFrameworkType;
|
|
401
401
|
}
|
|
402
402
|
/**
|
|
@@ -456,6 +456,14 @@ export interface IdtlConfiguration {
|
|
|
456
456
|
* Defines if a wallet is onboarded
|
|
457
457
|
*/
|
|
458
458
|
'isOnboarded': boolean;
|
|
459
|
+
/**
|
|
460
|
+
* URL of ETSI trusted list
|
|
461
|
+
*/
|
|
462
|
+
'etsiTslUrl'?: string;
|
|
463
|
+
/**
|
|
464
|
+
* Base64 encoded certificates with which the TL validity is checked
|
|
465
|
+
*/
|
|
466
|
+
'trustedTslCertificates'?: Array<string>;
|
|
459
467
|
}
|
|
460
468
|
/**
|
|
461
469
|
* Request for authorization flow credential issuance process start. Consists of offered credential\'s types and credential offer endpoint (most commonly only schema)
|
|
@@ -607,6 +615,18 @@ export interface Oauth2Profile {
|
|
|
607
615
|
export interface Oauth2RedirectUri {
|
|
608
616
|
'redirect_uri': string;
|
|
609
617
|
}
|
|
618
|
+
export declare const ObjectHorizontalAlignment: {
|
|
619
|
+
readonly Left: "left";
|
|
620
|
+
readonly Center: "center";
|
|
621
|
+
readonly Right: "right";
|
|
622
|
+
};
|
|
623
|
+
export type ObjectHorizontalAlignment = typeof ObjectHorizontalAlignment[keyof typeof ObjectHorizontalAlignment];
|
|
624
|
+
export declare const ObjectVerticalAlignment: {
|
|
625
|
+
readonly Top: "top";
|
|
626
|
+
readonly Middle: "middle";
|
|
627
|
+
readonly Bottom: "bottom";
|
|
628
|
+
};
|
|
629
|
+
export type ObjectVerticalAlignment = typeof ObjectVerticalAlignment[keyof typeof ObjectVerticalAlignment];
|
|
610
630
|
export interface OfferReceivedNotification {
|
|
611
631
|
'credentialType': string;
|
|
612
632
|
'offerId': string;
|
|
@@ -635,6 +655,34 @@ export type OidcRevisionOidc4vpEnum = typeof OidcRevisionOidc4vpEnum[keyof typeo
|
|
|
635
655
|
export interface OnboardResult {
|
|
636
656
|
'did': string;
|
|
637
657
|
}
|
|
658
|
+
export interface PdfSignatureValidity {
|
|
659
|
+
'verificationResult': PdfSignatureValidityVerificationResultEnum;
|
|
660
|
+
/**
|
|
661
|
+
* Details about PDF signature verification errors/warnings
|
|
662
|
+
*/
|
|
663
|
+
'details'?: Array<string>;
|
|
664
|
+
/**
|
|
665
|
+
* Qualification of the signing certificate (QSig, QSeal etc.)
|
|
666
|
+
*/
|
|
667
|
+
'signingCertificateQualification': string;
|
|
668
|
+
/**
|
|
669
|
+
* Signing certificate in base64 encoded form
|
|
670
|
+
*/
|
|
671
|
+
'signingCertificate': string;
|
|
672
|
+
}
|
|
673
|
+
export declare const PdfSignatureValidityVerificationResultEnum: {
|
|
674
|
+
readonly Valid: "valid";
|
|
675
|
+
readonly InvalidSignature: "invalid_signature";
|
|
676
|
+
readonly Revoked: "revoked";
|
|
677
|
+
readonly Expired: "expired";
|
|
678
|
+
readonly UntrustedCertificate: "untrusted_certificate";
|
|
679
|
+
};
|
|
680
|
+
export type PdfSignatureValidityVerificationResultEnum = typeof PdfSignatureValidityVerificationResultEnum[keyof typeof PdfSignatureValidityVerificationResultEnum];
|
|
681
|
+
export interface PdfVerificationResponse {
|
|
682
|
+
'vpValid'?: boolean;
|
|
683
|
+
'verifiedCredentials'?: VerifiedWrapper;
|
|
684
|
+
'signatures'?: Array<PdfSignatureValidity>;
|
|
685
|
+
}
|
|
638
686
|
/**
|
|
639
687
|
* Result of the preauthorized issuance process start. Consists of the preauthorized code, pin, and the issuer url.
|
|
640
688
|
*/
|
|
@@ -878,6 +926,10 @@ export interface WalletConfig {
|
|
|
878
926
|
'credentialVerifiers'?: Array<CredentialVerifierDefinition>;
|
|
879
927
|
'oidcRevision'?: OidcRevision;
|
|
880
928
|
'trustFramework': TrustFrameworkType;
|
|
929
|
+
/**
|
|
930
|
+
* Defines if the specific wallet is a legal entity
|
|
931
|
+
*/
|
|
932
|
+
'legalEntity'?: boolean;
|
|
881
933
|
'EBSI'?: EbsiSpecificWalletData;
|
|
882
934
|
'EUDI'?: EudiConfiguration;
|
|
883
935
|
'IDTL'?: IdtlConfiguration;
|
|
@@ -1170,6 +1222,40 @@ export declare const DefaultApiAxiosParamCreator: (configuration?: Configuration
|
|
|
1170
1222
|
* @throws {RequiredError}
|
|
1171
1223
|
*/
|
|
1172
1224
|
issuerInitiatePreauthOffer: (walletId: string, initPreAuthOffer?: InitPreAuthOffer, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
1225
|
+
/**
|
|
1226
|
+
* Returns a signed PDF contained in the verifiable credential containing the credential VP added as an attachment in incremental update.
|
|
1227
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
1228
|
+
* @param {boolean} signPdf Whether to sign the PDF with holder\'s X509 certificate or not
|
|
1229
|
+
* @param {string} walletId
|
|
1230
|
+
* @param {*} [options] Override http request option.
|
|
1231
|
+
* @throws {RequiredError}
|
|
1232
|
+
*/
|
|
1233
|
+
pdfCredentialMakeVp: (credentialId: string, signPdf: boolean, walletId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
1234
|
+
/**
|
|
1235
|
+
* Deletes the PDF associated with the verifiable credential. Can be used only for credentials in Draft state.
|
|
1236
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
1237
|
+
* @param {string} walletId
|
|
1238
|
+
* @param {*} [options] Override http request option.
|
|
1239
|
+
* @throws {RequiredError}
|
|
1240
|
+
*/
|
|
1241
|
+
pdfCredentialTwinDelete: (credentialId: string, walletId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
1242
|
+
/**
|
|
1243
|
+
* Returns either an unsigned PDF that was uploaded to be signed and embedded into a verifiable credential in case of credential in Draft state, or a signed PDF embedded in an issued VC.
|
|
1244
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
1245
|
+
* @param {string} walletId
|
|
1246
|
+
* @param {*} [options] Override http request option.
|
|
1247
|
+
* @throws {RequiredError}
|
|
1248
|
+
*/
|
|
1249
|
+
pdfCredentialTwinGet: (credentialId: string, walletId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
1250
|
+
/**
|
|
1251
|
+
* Uploads a PDF that will be signed and embedded with the verifiable credential when it will be issued. Can be used only for credentials in Draft state. Maximal size of the PDF document is 50 MB.
|
|
1252
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
1253
|
+
* @param {string} walletId
|
|
1254
|
+
* @param {File} [pdf]
|
|
1255
|
+
* @param {*} [options] Override http request option.
|
|
1256
|
+
* @throws {RequiredError}
|
|
1257
|
+
*/
|
|
1258
|
+
pdfCredentialTwinUpload: (credentialId: string, walletId: string, pdf?: File, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
1173
1259
|
/**
|
|
1174
1260
|
* Accredits a legal entity as RTAO, TAO or TI.
|
|
1175
1261
|
* @param {string} walletId
|
|
@@ -1233,6 +1319,18 @@ export declare const DefaultApiAxiosParamCreator: (configuration?: Configuration
|
|
|
1233
1319
|
* @throws {RequiredError}
|
|
1234
1320
|
*/
|
|
1235
1321
|
verifierLinkedVpVerify: (walletId: string, did: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
1322
|
+
/**
|
|
1323
|
+
* Verifies the signatures of uploaded PDF and extracts and verifies VP in the PDF document Maximum size of the PDF document is 50 MB.
|
|
1324
|
+
* @param {string} walletId
|
|
1325
|
+
* @param {boolean} extractVp Whether to extract VP attachment from the PDF
|
|
1326
|
+
* @param {File} [pdf]
|
|
1327
|
+
* @param {Array<string>} [trustedCertificates] Base64 encoded x509 certificates with which the PDF may be signed.
|
|
1328
|
+
* @param {Array<string>} [trustedListsUrl] URLs of ETSI trusted lists that will be used for verification purposes. If not provided, ETSI trust list configured for the wallet will be used.
|
|
1329
|
+
* @param {Array<string>} [trustedListSigningCertificates] Base64 encoded x509 certificates with which the ETSI trusted lists may be signed. If not provided, values from wallet config will be used.
|
|
1330
|
+
* @param {*} [options] Override http request option.
|
|
1331
|
+
* @throws {RequiredError}
|
|
1332
|
+
*/
|
|
1333
|
+
verifierPdfVerify: (walletId: string, extractVp: boolean, pdf?: File, trustedCertificates?: Array<string>, trustedListsUrl?: Array<string>, trustedListSigningCertificates?: Array<string>, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
1236
1334
|
/**
|
|
1237
1335
|
* Creates a new wallet for the authenticated client.
|
|
1238
1336
|
* @param {WalletCreatePayload} [walletCreatePayload]
|
|
@@ -1577,6 +1675,40 @@ export declare const DefaultApiFp: (configuration?: Configuration) => {
|
|
|
1577
1675
|
* @throws {RequiredError}
|
|
1578
1676
|
*/
|
|
1579
1677
|
issuerInitiatePreauthOffer(walletId: string, initPreAuthOffer?: InitPreAuthOffer, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<PreAuthOffer>>;
|
|
1678
|
+
/**
|
|
1679
|
+
* Returns a signed PDF contained in the verifiable credential containing the credential VP added as an attachment in incremental update.
|
|
1680
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
1681
|
+
* @param {boolean} signPdf Whether to sign the PDF with holder\'s X509 certificate or not
|
|
1682
|
+
* @param {string} walletId
|
|
1683
|
+
* @param {*} [options] Override http request option.
|
|
1684
|
+
* @throws {RequiredError}
|
|
1685
|
+
*/
|
|
1686
|
+
pdfCredentialMakeVp(credentialId: string, signPdf: boolean, walletId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<File>>;
|
|
1687
|
+
/**
|
|
1688
|
+
* Deletes the PDF associated with the verifiable credential. Can be used only for credentials in Draft state.
|
|
1689
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
1690
|
+
* @param {string} walletId
|
|
1691
|
+
* @param {*} [options] Override http request option.
|
|
1692
|
+
* @throws {RequiredError}
|
|
1693
|
+
*/
|
|
1694
|
+
pdfCredentialTwinDelete(credentialId: string, walletId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<void>>;
|
|
1695
|
+
/**
|
|
1696
|
+
* Returns either an unsigned PDF that was uploaded to be signed and embedded into a verifiable credential in case of credential in Draft state, or a signed PDF embedded in an issued VC.
|
|
1697
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
1698
|
+
* @param {string} walletId
|
|
1699
|
+
* @param {*} [options] Override http request option.
|
|
1700
|
+
* @throws {RequiredError}
|
|
1701
|
+
*/
|
|
1702
|
+
pdfCredentialTwinGet(credentialId: string, walletId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<File>>;
|
|
1703
|
+
/**
|
|
1704
|
+
* Uploads a PDF that will be signed and embedded with the verifiable credential when it will be issued. Can be used only for credentials in Draft state. Maximal size of the PDF document is 50 MB.
|
|
1705
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
1706
|
+
* @param {string} walletId
|
|
1707
|
+
* @param {File} [pdf]
|
|
1708
|
+
* @param {*} [options] Override http request option.
|
|
1709
|
+
* @throws {RequiredError}
|
|
1710
|
+
*/
|
|
1711
|
+
pdfCredentialTwinUpload(credentialId: string, walletId: string, pdf?: File, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<void>>;
|
|
1580
1712
|
/**
|
|
1581
1713
|
* Accredits a legal entity as RTAO, TAO or TI.
|
|
1582
1714
|
* @param {string} walletId
|
|
@@ -1640,6 +1772,18 @@ export declare const DefaultApiFp: (configuration?: Configuration) => {
|
|
|
1640
1772
|
* @throws {RequiredError}
|
|
1641
1773
|
*/
|
|
1642
1774
|
verifierLinkedVpVerify(walletId: string, did: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<VerifiedLinkedVp>>>;
|
|
1775
|
+
/**
|
|
1776
|
+
* Verifies the signatures of uploaded PDF and extracts and verifies VP in the PDF document Maximum size of the PDF document is 50 MB.
|
|
1777
|
+
* @param {string} walletId
|
|
1778
|
+
* @param {boolean} extractVp Whether to extract VP attachment from the PDF
|
|
1779
|
+
* @param {File} [pdf]
|
|
1780
|
+
* @param {Array<string>} [trustedCertificates] Base64 encoded x509 certificates with which the PDF may be signed.
|
|
1781
|
+
* @param {Array<string>} [trustedListsUrl] URLs of ETSI trusted lists that will be used for verification purposes. If not provided, ETSI trust list configured for the wallet will be used.
|
|
1782
|
+
* @param {Array<string>} [trustedListSigningCertificates] Base64 encoded x509 certificates with which the ETSI trusted lists may be signed. If not provided, values from wallet config will be used.
|
|
1783
|
+
* @param {*} [options] Override http request option.
|
|
1784
|
+
* @throws {RequiredError}
|
|
1785
|
+
*/
|
|
1786
|
+
verifierPdfVerify(walletId: string, extractVp: boolean, pdf?: File, trustedCertificates?: Array<string>, trustedListsUrl?: Array<string>, trustedListSigningCertificates?: Array<string>, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<PdfVerificationResponse>>;
|
|
1643
1787
|
/**
|
|
1644
1788
|
* Creates a new wallet for the authenticated client.
|
|
1645
1789
|
* @param {WalletCreatePayload} [walletCreatePayload]
|
|
@@ -1986,6 +2130,40 @@ export declare const DefaultApiFactory: (configuration?: Configuration, basePath
|
|
|
1986
2130
|
* @throws {RequiredError}
|
|
1987
2131
|
*/
|
|
1988
2132
|
issuerInitiatePreauthOffer(walletId: string, initPreAuthOffer?: InitPreAuthOffer, options?: RawAxiosRequestConfig): AxiosPromise<PreAuthOffer>;
|
|
2133
|
+
/**
|
|
2134
|
+
* Returns a signed PDF contained in the verifiable credential containing the credential VP added as an attachment in incremental update.
|
|
2135
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
2136
|
+
* @param {boolean} signPdf Whether to sign the PDF with holder\'s X509 certificate or not
|
|
2137
|
+
* @param {string} walletId
|
|
2138
|
+
* @param {*} [options] Override http request option.
|
|
2139
|
+
* @throws {RequiredError}
|
|
2140
|
+
*/
|
|
2141
|
+
pdfCredentialMakeVp(credentialId: string, signPdf: boolean, walletId: string, options?: RawAxiosRequestConfig): AxiosPromise<File>;
|
|
2142
|
+
/**
|
|
2143
|
+
* Deletes the PDF associated with the verifiable credential. Can be used only for credentials in Draft state.
|
|
2144
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
2145
|
+
* @param {string} walletId
|
|
2146
|
+
* @param {*} [options] Override http request option.
|
|
2147
|
+
* @throws {RequiredError}
|
|
2148
|
+
*/
|
|
2149
|
+
pdfCredentialTwinDelete(credentialId: string, walletId: string, options?: RawAxiosRequestConfig): AxiosPromise<void>;
|
|
2150
|
+
/**
|
|
2151
|
+
* Returns either an unsigned PDF that was uploaded to be signed and embedded into a verifiable credential in case of credential in Draft state, or a signed PDF embedded in an issued VC.
|
|
2152
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
2153
|
+
* @param {string} walletId
|
|
2154
|
+
* @param {*} [options] Override http request option.
|
|
2155
|
+
* @throws {RequiredError}
|
|
2156
|
+
*/
|
|
2157
|
+
pdfCredentialTwinGet(credentialId: string, walletId: string, options?: RawAxiosRequestConfig): AxiosPromise<File>;
|
|
2158
|
+
/**
|
|
2159
|
+
* Uploads a PDF that will be signed and embedded with the verifiable credential when it will be issued. Can be used only for credentials in Draft state. Maximal size of the PDF document is 50 MB.
|
|
2160
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
2161
|
+
* @param {string} walletId
|
|
2162
|
+
* @param {File} [pdf]
|
|
2163
|
+
* @param {*} [options] Override http request option.
|
|
2164
|
+
* @throws {RequiredError}
|
|
2165
|
+
*/
|
|
2166
|
+
pdfCredentialTwinUpload(credentialId: string, walletId: string, pdf?: File, options?: RawAxiosRequestConfig): AxiosPromise<void>;
|
|
1989
2167
|
/**
|
|
1990
2168
|
* Accredits a legal entity as RTAO, TAO or TI.
|
|
1991
2169
|
* @param {string} walletId
|
|
@@ -2049,6 +2227,18 @@ export declare const DefaultApiFactory: (configuration?: Configuration, basePath
|
|
|
2049
2227
|
* @throws {RequiredError}
|
|
2050
2228
|
*/
|
|
2051
2229
|
verifierLinkedVpVerify(walletId: string, did: string, options?: RawAxiosRequestConfig): AxiosPromise<Array<VerifiedLinkedVp>>;
|
|
2230
|
+
/**
|
|
2231
|
+
* Verifies the signatures of uploaded PDF and extracts and verifies VP in the PDF document Maximum size of the PDF document is 50 MB.
|
|
2232
|
+
* @param {string} walletId
|
|
2233
|
+
* @param {boolean} extractVp Whether to extract VP attachment from the PDF
|
|
2234
|
+
* @param {File} [pdf]
|
|
2235
|
+
* @param {Array<string>} [trustedCertificates] Base64 encoded x509 certificates with which the PDF may be signed.
|
|
2236
|
+
* @param {Array<string>} [trustedListsUrl] URLs of ETSI trusted lists that will be used for verification purposes. If not provided, ETSI trust list configured for the wallet will be used.
|
|
2237
|
+
* @param {Array<string>} [trustedListSigningCertificates] Base64 encoded x509 certificates with which the ETSI trusted lists may be signed. If not provided, values from wallet config will be used.
|
|
2238
|
+
* @param {*} [options] Override http request option.
|
|
2239
|
+
* @throws {RequiredError}
|
|
2240
|
+
*/
|
|
2241
|
+
verifierPdfVerify(walletId: string, extractVp: boolean, pdf?: File, trustedCertificates?: Array<string>, trustedListsUrl?: Array<string>, trustedListSigningCertificates?: Array<string>, options?: RawAxiosRequestConfig): AxiosPromise<PdfVerificationResponse>;
|
|
2052
2242
|
/**
|
|
2053
2243
|
* Creates a new wallet for the authenticated client.
|
|
2054
2244
|
* @param {WalletCreatePayload} [walletCreatePayload]
|
|
@@ -2395,6 +2585,40 @@ export declare class DefaultApi extends BaseAPI {
|
|
|
2395
2585
|
* @throws {RequiredError}
|
|
2396
2586
|
*/
|
|
2397
2587
|
issuerInitiatePreauthOffer(walletId: string, initPreAuthOffer?: InitPreAuthOffer, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<PreAuthOffer, any>>;
|
|
2588
|
+
/**
|
|
2589
|
+
* Returns a signed PDF contained in the verifiable credential containing the credential VP added as an attachment in incremental update.
|
|
2590
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
2591
|
+
* @param {boolean} signPdf Whether to sign the PDF with holder\'s X509 certificate or not
|
|
2592
|
+
* @param {string} walletId
|
|
2593
|
+
* @param {*} [options] Override http request option.
|
|
2594
|
+
* @throws {RequiredError}
|
|
2595
|
+
*/
|
|
2596
|
+
pdfCredentialMakeVp(credentialId: string, signPdf: boolean, walletId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<File, any>>;
|
|
2597
|
+
/**
|
|
2598
|
+
* Deletes the PDF associated with the verifiable credential. Can be used only for credentials in Draft state.
|
|
2599
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
2600
|
+
* @param {string} walletId
|
|
2601
|
+
* @param {*} [options] Override http request option.
|
|
2602
|
+
* @throws {RequiredError}
|
|
2603
|
+
*/
|
|
2604
|
+
pdfCredentialTwinDelete(credentialId: string, walletId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<void, any>>;
|
|
2605
|
+
/**
|
|
2606
|
+
* Returns either an unsigned PDF that was uploaded to be signed and embedded into a verifiable credential in case of credential in Draft state, or a signed PDF embedded in an issued VC.
|
|
2607
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
2608
|
+
* @param {string} walletId
|
|
2609
|
+
* @param {*} [options] Override http request option.
|
|
2610
|
+
* @throws {RequiredError}
|
|
2611
|
+
*/
|
|
2612
|
+
pdfCredentialTwinGet(credentialId: string, walletId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<File, any>>;
|
|
2613
|
+
/**
|
|
2614
|
+
* Uploads a PDF that will be signed and embedded with the verifiable credential when it will be issued. Can be used only for credentials in Draft state. Maximal size of the PDF document is 50 MB.
|
|
2615
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
2616
|
+
* @param {string} walletId
|
|
2617
|
+
* @param {File} [pdf]
|
|
2618
|
+
* @param {*} [options] Override http request option.
|
|
2619
|
+
* @throws {RequiredError}
|
|
2620
|
+
*/
|
|
2621
|
+
pdfCredentialTwinUpload(credentialId: string, walletId: string, pdf?: File, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<void, any>>;
|
|
2398
2622
|
/**
|
|
2399
2623
|
* Accredits a legal entity as RTAO, TAO or TI.
|
|
2400
2624
|
* @param {string} walletId
|
|
@@ -2458,6 +2682,18 @@ export declare class DefaultApi extends BaseAPI {
|
|
|
2458
2682
|
* @throws {RequiredError}
|
|
2459
2683
|
*/
|
|
2460
2684
|
verifierLinkedVpVerify(walletId: string, did: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<VerifiedLinkedVp[], any>>;
|
|
2685
|
+
/**
|
|
2686
|
+
* Verifies the signatures of uploaded PDF and extracts and verifies VP in the PDF document Maximum size of the PDF document is 50 MB.
|
|
2687
|
+
* @param {string} walletId
|
|
2688
|
+
* @param {boolean} extractVp Whether to extract VP attachment from the PDF
|
|
2689
|
+
* @param {File} [pdf]
|
|
2690
|
+
* @param {Array<string>} [trustedCertificates] Base64 encoded x509 certificates with which the PDF may be signed.
|
|
2691
|
+
* @param {Array<string>} [trustedListsUrl] URLs of ETSI trusted lists that will be used for verification purposes. If not provided, ETSI trust list configured for the wallet will be used.
|
|
2692
|
+
* @param {Array<string>} [trustedListSigningCertificates] Base64 encoded x509 certificates with which the ETSI trusted lists may be signed. If not provided, values from wallet config will be used.
|
|
2693
|
+
* @param {*} [options] Override http request option.
|
|
2694
|
+
* @throws {RequiredError}
|
|
2695
|
+
*/
|
|
2696
|
+
verifierPdfVerify(walletId: string, extractVp: boolean, pdf?: File, trustedCertificates?: Array<string>, trustedListsUrl?: Array<string>, trustedListSigningCertificates?: Array<string>, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<PdfVerificationResponse, any>>;
|
|
2461
2697
|
/**
|
|
2462
2698
|
* Creates a new wallet for the authenticated client.
|
|
2463
2699
|
* @param {WalletCreatePayload} [walletCreatePayload]
|
package/api.js
CHANGED
|
@@ -25,7 +25,7 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
25
25
|
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
26
26
|
};
|
|
27
27
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
28
|
-
exports.CredentialListInteractionEnum = exports.DefaultApi = exports.DefaultApiFactory = exports.DefaultApiFp = exports.DefaultApiAxiosParamCreator = exports.WalletNotificationEventType = exports.WalletCapability = exports.TrustFrameworkType = exports.SystemImpactStatusEnum = exports.SigningKeyIdentifier = exports.RevokeAccreditationRequestTypeEnum = exports.PresentationDefinitionSubmissionRequirementsRuleEnum = exports.PrepareToAccreditRequestTypeEnum = exports.OidcRevisionOidc4vpEnum = exports.OidcRevisionOidc4vciEnum = exports.ListSort = exports.InteractionAuthorizationRequirementsRequirementTypeEnum = exports.HealthStatusStatusEnum = exports.DeferredStatusEnum = exports.CredentialMetadataStatusEnum = exports.CredentialMetadataInteractionEnum = exports.CredentialIssuerDefinitionCredentialIssuerEnum = exports.CredentialFormat = exports.AccreditationRequestTypeEnum = void 0;
|
|
28
|
+
exports.CredentialListInteractionEnum = exports.DefaultApi = exports.DefaultApiFactory = exports.DefaultApiFp = exports.DefaultApiAxiosParamCreator = exports.WalletNotificationEventType = exports.WalletCapability = exports.TrustFrameworkType = exports.SystemImpactStatusEnum = exports.SigningKeyIdentifier = exports.RevokeAccreditationRequestTypeEnum = exports.PresentationDefinitionSubmissionRequirementsRuleEnum = exports.PrepareToAccreditRequestTypeEnum = exports.PdfSignatureValidityVerificationResultEnum = exports.OidcRevisionOidc4vpEnum = exports.OidcRevisionOidc4vciEnum = exports.ObjectVerticalAlignment = exports.ObjectHorizontalAlignment = exports.ListSort = exports.InteractionAuthorizationRequirementsRequirementTypeEnum = exports.HealthStatusStatusEnum = exports.DeferredStatusEnum = exports.CredentialMetadataStatusEnum = exports.CredentialMetadataInteractionEnum = exports.CredentialIssuerDefinitionCredentialIssuerEnum = exports.CredentialFormat = exports.AccreditationRequestTypeEnum = void 0;
|
|
29
29
|
const axios_1 = __importDefault(require("axios"));
|
|
30
30
|
// Some imports not used depending on template conditions
|
|
31
31
|
// @ts-ignore
|
|
@@ -85,6 +85,16 @@ exports.ListSort = {
|
|
|
85
85
|
Asc: 'asc',
|
|
86
86
|
Desc: 'desc'
|
|
87
87
|
};
|
|
88
|
+
exports.ObjectHorizontalAlignment = {
|
|
89
|
+
Left: 'left',
|
|
90
|
+
Center: 'center',
|
|
91
|
+
Right: 'right'
|
|
92
|
+
};
|
|
93
|
+
exports.ObjectVerticalAlignment = {
|
|
94
|
+
Top: 'top',
|
|
95
|
+
Middle: 'middle',
|
|
96
|
+
Bottom: 'bottom'
|
|
97
|
+
};
|
|
88
98
|
exports.OidcRevisionOidc4vciEnum = {
|
|
89
99
|
Draft11: 'Draft11',
|
|
90
100
|
Draft15: 'Draft15'
|
|
@@ -93,6 +103,13 @@ exports.OidcRevisionOidc4vpEnum = {
|
|
|
93
103
|
Draft16: 'Draft16',
|
|
94
104
|
Draft23: 'Draft23'
|
|
95
105
|
};
|
|
106
|
+
exports.PdfSignatureValidityVerificationResultEnum = {
|
|
107
|
+
Valid: 'valid',
|
|
108
|
+
InvalidSignature: 'invalid_signature',
|
|
109
|
+
Revoked: 'revoked',
|
|
110
|
+
Expired: 'expired',
|
|
111
|
+
UntrustedCertificate: 'untrusted_certificate'
|
|
112
|
+
};
|
|
96
113
|
exports.PrepareToAccreditRequestTypeEnum = {
|
|
97
114
|
TrustedIssuer: 'TrustedIssuer',
|
|
98
115
|
TrustedAccreditationOrganisation: 'TrustedAccreditationOrganisation'
|
|
@@ -1108,6 +1125,167 @@ const DefaultApiAxiosParamCreator = function (configuration) {
|
|
|
1108
1125
|
options: localVarRequestOptions,
|
|
1109
1126
|
};
|
|
1110
1127
|
}),
|
|
1128
|
+
/**
|
|
1129
|
+
* Returns a signed PDF contained in the verifiable credential containing the credential VP added as an attachment in incremental update.
|
|
1130
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
1131
|
+
* @param {boolean} signPdf Whether to sign the PDF with holder\'s X509 certificate or not
|
|
1132
|
+
* @param {string} walletId
|
|
1133
|
+
* @param {*} [options] Override http request option.
|
|
1134
|
+
* @throws {RequiredError}
|
|
1135
|
+
*/
|
|
1136
|
+
pdfCredentialMakeVp: (credentialId, signPdf, walletId, options = {}) => __awaiter(this, void 0, void 0, function* () {
|
|
1137
|
+
// verify required parameter 'credentialId' is not null or undefined
|
|
1138
|
+
(0, common_1.assertParamExists)('pdfCredentialMakeVp', 'credentialId', credentialId);
|
|
1139
|
+
// verify required parameter 'signPdf' is not null or undefined
|
|
1140
|
+
(0, common_1.assertParamExists)('pdfCredentialMakeVp', 'signPdf', signPdf);
|
|
1141
|
+
// verify required parameter 'walletId' is not null or undefined
|
|
1142
|
+
(0, common_1.assertParamExists)('pdfCredentialMakeVp', 'walletId', walletId);
|
|
1143
|
+
const localVarPath = `/credentials/{credential_id}/pdf/vp`
|
|
1144
|
+
.replace(`{${"credential_id"}}`, encodeURIComponent(String(credentialId)));
|
|
1145
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
1146
|
+
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
1147
|
+
let baseOptions;
|
|
1148
|
+
if (configuration) {
|
|
1149
|
+
baseOptions = configuration.baseOptions;
|
|
1150
|
+
}
|
|
1151
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'POST' }, baseOptions), options);
|
|
1152
|
+
const localVarHeaderParameter = {};
|
|
1153
|
+
const localVarQueryParameter = {};
|
|
1154
|
+
// authentication accessToken required
|
|
1155
|
+
// http bearer authentication required
|
|
1156
|
+
yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
|
|
1157
|
+
if (signPdf !== undefined) {
|
|
1158
|
+
localVarQueryParameter['sign_pdf'] = signPdf;
|
|
1159
|
+
}
|
|
1160
|
+
if (walletId != null) {
|
|
1161
|
+
localVarHeaderParameter['wallet-id'] = String(walletId);
|
|
1162
|
+
}
|
|
1163
|
+
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
1164
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
1165
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
1166
|
+
return {
|
|
1167
|
+
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
1168
|
+
options: localVarRequestOptions,
|
|
1169
|
+
};
|
|
1170
|
+
}),
|
|
1171
|
+
/**
|
|
1172
|
+
* Deletes the PDF associated with the verifiable credential. Can be used only for credentials in Draft state.
|
|
1173
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
1174
|
+
* @param {string} walletId
|
|
1175
|
+
* @param {*} [options] Override http request option.
|
|
1176
|
+
* @throws {RequiredError}
|
|
1177
|
+
*/
|
|
1178
|
+
pdfCredentialTwinDelete: (credentialId, walletId, options = {}) => __awaiter(this, void 0, void 0, function* () {
|
|
1179
|
+
// verify required parameter 'credentialId' is not null or undefined
|
|
1180
|
+
(0, common_1.assertParamExists)('pdfCredentialTwinDelete', 'credentialId', credentialId);
|
|
1181
|
+
// verify required parameter 'walletId' is not null or undefined
|
|
1182
|
+
(0, common_1.assertParamExists)('pdfCredentialTwinDelete', 'walletId', walletId);
|
|
1183
|
+
const localVarPath = `/credentials/{credential_id}/pdf`
|
|
1184
|
+
.replace(`{${"credential_id"}}`, encodeURIComponent(String(credentialId)));
|
|
1185
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
1186
|
+
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
1187
|
+
let baseOptions;
|
|
1188
|
+
if (configuration) {
|
|
1189
|
+
baseOptions = configuration.baseOptions;
|
|
1190
|
+
}
|
|
1191
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'DELETE' }, baseOptions), options);
|
|
1192
|
+
const localVarHeaderParameter = {};
|
|
1193
|
+
const localVarQueryParameter = {};
|
|
1194
|
+
// authentication accessToken required
|
|
1195
|
+
// http bearer authentication required
|
|
1196
|
+
yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
|
|
1197
|
+
if (walletId != null) {
|
|
1198
|
+
localVarHeaderParameter['wallet-id'] = String(walletId);
|
|
1199
|
+
}
|
|
1200
|
+
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
1201
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
1202
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
1203
|
+
return {
|
|
1204
|
+
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
1205
|
+
options: localVarRequestOptions,
|
|
1206
|
+
};
|
|
1207
|
+
}),
|
|
1208
|
+
/**
|
|
1209
|
+
* Returns either an unsigned PDF that was uploaded to be signed and embedded into a verifiable credential in case of credential in Draft state, or a signed PDF embedded in an issued VC.
|
|
1210
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
1211
|
+
* @param {string} walletId
|
|
1212
|
+
* @param {*} [options] Override http request option.
|
|
1213
|
+
* @throws {RequiredError}
|
|
1214
|
+
*/
|
|
1215
|
+
pdfCredentialTwinGet: (credentialId, walletId, options = {}) => __awaiter(this, void 0, void 0, function* () {
|
|
1216
|
+
// verify required parameter 'credentialId' is not null or undefined
|
|
1217
|
+
(0, common_1.assertParamExists)('pdfCredentialTwinGet', 'credentialId', credentialId);
|
|
1218
|
+
// verify required parameter 'walletId' is not null or undefined
|
|
1219
|
+
(0, common_1.assertParamExists)('pdfCredentialTwinGet', 'walletId', walletId);
|
|
1220
|
+
const localVarPath = `/credentials/{credential_id}/pdf`
|
|
1221
|
+
.replace(`{${"credential_id"}}`, encodeURIComponent(String(credentialId)));
|
|
1222
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
1223
|
+
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
1224
|
+
let baseOptions;
|
|
1225
|
+
if (configuration) {
|
|
1226
|
+
baseOptions = configuration.baseOptions;
|
|
1227
|
+
}
|
|
1228
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
|
|
1229
|
+
const localVarHeaderParameter = {};
|
|
1230
|
+
const localVarQueryParameter = {};
|
|
1231
|
+
// authentication accessToken required
|
|
1232
|
+
// http bearer authentication required
|
|
1233
|
+
yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
|
|
1234
|
+
if (walletId != null) {
|
|
1235
|
+
localVarHeaderParameter['wallet-id'] = String(walletId);
|
|
1236
|
+
}
|
|
1237
|
+
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
1238
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
1239
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
1240
|
+
return {
|
|
1241
|
+
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
1242
|
+
options: localVarRequestOptions,
|
|
1243
|
+
};
|
|
1244
|
+
}),
|
|
1245
|
+
/**
|
|
1246
|
+
* Uploads a PDF that will be signed and embedded with the verifiable credential when it will be issued. Can be used only for credentials in Draft state. Maximal size of the PDF document is 50 MB.
|
|
1247
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
1248
|
+
* @param {string} walletId
|
|
1249
|
+
* @param {File} [pdf]
|
|
1250
|
+
* @param {*} [options] Override http request option.
|
|
1251
|
+
* @throws {RequiredError}
|
|
1252
|
+
*/
|
|
1253
|
+
pdfCredentialTwinUpload: (credentialId, walletId, pdf, options = {}) => __awaiter(this, void 0, void 0, function* () {
|
|
1254
|
+
// verify required parameter 'credentialId' is not null or undefined
|
|
1255
|
+
(0, common_1.assertParamExists)('pdfCredentialTwinUpload', 'credentialId', credentialId);
|
|
1256
|
+
// verify required parameter 'walletId' is not null or undefined
|
|
1257
|
+
(0, common_1.assertParamExists)('pdfCredentialTwinUpload', 'walletId', walletId);
|
|
1258
|
+
const localVarPath = `/credentials/{credential_id}/pdf`
|
|
1259
|
+
.replace(`{${"credential_id"}}`, encodeURIComponent(String(credentialId)));
|
|
1260
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
1261
|
+
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
1262
|
+
let baseOptions;
|
|
1263
|
+
if (configuration) {
|
|
1264
|
+
baseOptions = configuration.baseOptions;
|
|
1265
|
+
}
|
|
1266
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'POST' }, baseOptions), options);
|
|
1267
|
+
const localVarHeaderParameter = {};
|
|
1268
|
+
const localVarQueryParameter = {};
|
|
1269
|
+
const localVarFormParams = new ((configuration && configuration.formDataCtor) || FormData)();
|
|
1270
|
+
// authentication accessToken required
|
|
1271
|
+
// http bearer authentication required
|
|
1272
|
+
yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
|
|
1273
|
+
if (pdf !== undefined) {
|
|
1274
|
+
localVarFormParams.append('pdf', pdf);
|
|
1275
|
+
}
|
|
1276
|
+
localVarHeaderParameter['Content-Type'] = 'multipart/form-data';
|
|
1277
|
+
if (walletId != null) {
|
|
1278
|
+
localVarHeaderParameter['wallet-id'] = String(walletId);
|
|
1279
|
+
}
|
|
1280
|
+
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
1281
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
1282
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
1283
|
+
localVarRequestOptions.data = localVarFormParams;
|
|
1284
|
+
return {
|
|
1285
|
+
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
1286
|
+
options: localVarRequestOptions,
|
|
1287
|
+
};
|
|
1288
|
+
}),
|
|
1111
1289
|
/**
|
|
1112
1290
|
* Accredits a legal entity as RTAO, TAO or TI.
|
|
1113
1291
|
* @param {string} walletId
|
|
@@ -1384,6 +1562,64 @@ const DefaultApiAxiosParamCreator = function (configuration) {
|
|
|
1384
1562
|
options: localVarRequestOptions,
|
|
1385
1563
|
};
|
|
1386
1564
|
}),
|
|
1565
|
+
/**
|
|
1566
|
+
* Verifies the signatures of uploaded PDF and extracts and verifies VP in the PDF document Maximum size of the PDF document is 50 MB.
|
|
1567
|
+
* @param {string} walletId
|
|
1568
|
+
* @param {boolean} extractVp Whether to extract VP attachment from the PDF
|
|
1569
|
+
* @param {File} [pdf]
|
|
1570
|
+
* @param {Array<string>} [trustedCertificates] Base64 encoded x509 certificates with which the PDF may be signed.
|
|
1571
|
+
* @param {Array<string>} [trustedListsUrl] URLs of ETSI trusted lists that will be used for verification purposes. If not provided, ETSI trust list configured for the wallet will be used.
|
|
1572
|
+
* @param {Array<string>} [trustedListSigningCertificates] Base64 encoded x509 certificates with which the ETSI trusted lists may be signed. If not provided, values from wallet config will be used.
|
|
1573
|
+
* @param {*} [options] Override http request option.
|
|
1574
|
+
* @throws {RequiredError}
|
|
1575
|
+
*/
|
|
1576
|
+
verifierPdfVerify: (walletId, extractVp, pdf, trustedCertificates, trustedListsUrl, trustedListSigningCertificates, options = {}) => __awaiter(this, void 0, void 0, function* () {
|
|
1577
|
+
// verify required parameter 'walletId' is not null or undefined
|
|
1578
|
+
(0, common_1.assertParamExists)('verifierPdfVerify', 'walletId', walletId);
|
|
1579
|
+
// verify required parameter 'extractVp' is not null or undefined
|
|
1580
|
+
(0, common_1.assertParamExists)('verifierPdfVerify', 'extractVp', extractVp);
|
|
1581
|
+
const localVarPath = `/verifier/pdf`;
|
|
1582
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
1583
|
+
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
1584
|
+
let baseOptions;
|
|
1585
|
+
if (configuration) {
|
|
1586
|
+
baseOptions = configuration.baseOptions;
|
|
1587
|
+
}
|
|
1588
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'POST' }, baseOptions), options);
|
|
1589
|
+
const localVarHeaderParameter = {};
|
|
1590
|
+
const localVarQueryParameter = {};
|
|
1591
|
+
const localVarFormParams = new ((configuration && configuration.formDataCtor) || FormData)();
|
|
1592
|
+
// authentication accessToken required
|
|
1593
|
+
// http bearer authentication required
|
|
1594
|
+
yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
|
|
1595
|
+
if (pdf !== undefined) {
|
|
1596
|
+
localVarFormParams.append('pdf', pdf);
|
|
1597
|
+
}
|
|
1598
|
+
if (extractVp !== undefined) {
|
|
1599
|
+
localVarFormParams.append('extractVp', String(extractVp));
|
|
1600
|
+
}
|
|
1601
|
+
if (trustedCertificates) {
|
|
1602
|
+
localVarFormParams.append('trustedCertificates', trustedCertificates.join(base_1.COLLECTION_FORMATS.csv));
|
|
1603
|
+
}
|
|
1604
|
+
if (trustedListsUrl) {
|
|
1605
|
+
localVarFormParams.append('trustedListsUrl', trustedListsUrl.join(base_1.COLLECTION_FORMATS.csv));
|
|
1606
|
+
}
|
|
1607
|
+
if (trustedListSigningCertificates) {
|
|
1608
|
+
localVarFormParams.append('trustedListSigningCertificates', trustedListSigningCertificates.join(base_1.COLLECTION_FORMATS.csv));
|
|
1609
|
+
}
|
|
1610
|
+
localVarHeaderParameter['Content-Type'] = 'multipart/form-data';
|
|
1611
|
+
if (walletId != null) {
|
|
1612
|
+
localVarHeaderParameter['wallet-id'] = String(walletId);
|
|
1613
|
+
}
|
|
1614
|
+
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
1615
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
1616
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
1617
|
+
localVarRequestOptions.data = localVarFormParams;
|
|
1618
|
+
return {
|
|
1619
|
+
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
1620
|
+
options: localVarRequestOptions,
|
|
1621
|
+
};
|
|
1622
|
+
}),
|
|
1387
1623
|
/**
|
|
1388
1624
|
* Creates a new wallet for the authenticated client.
|
|
1389
1625
|
* @param {WalletCreatePayload} [walletCreatePayload]
|
|
@@ -2359,6 +2595,72 @@ const DefaultApiFp = function (configuration) {
|
|
|
2359
2595
|
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
2360
2596
|
});
|
|
2361
2597
|
},
|
|
2598
|
+
/**
|
|
2599
|
+
* Returns a signed PDF contained in the verifiable credential containing the credential VP added as an attachment in incremental update.
|
|
2600
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
2601
|
+
* @param {boolean} signPdf Whether to sign the PDF with holder\'s X509 certificate or not
|
|
2602
|
+
* @param {string} walletId
|
|
2603
|
+
* @param {*} [options] Override http request option.
|
|
2604
|
+
* @throws {RequiredError}
|
|
2605
|
+
*/
|
|
2606
|
+
pdfCredentialMakeVp(credentialId, signPdf, walletId, options) {
|
|
2607
|
+
var _a, _b, _c;
|
|
2608
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2609
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.pdfCredentialMakeVp(credentialId, signPdf, walletId, options);
|
|
2610
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
2611
|
+
const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.pdfCredentialMakeVp']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
2612
|
+
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
2613
|
+
});
|
|
2614
|
+
},
|
|
2615
|
+
/**
|
|
2616
|
+
* Deletes the PDF associated with the verifiable credential. Can be used only for credentials in Draft state.
|
|
2617
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
2618
|
+
* @param {string} walletId
|
|
2619
|
+
* @param {*} [options] Override http request option.
|
|
2620
|
+
* @throws {RequiredError}
|
|
2621
|
+
*/
|
|
2622
|
+
pdfCredentialTwinDelete(credentialId, walletId, options) {
|
|
2623
|
+
var _a, _b, _c;
|
|
2624
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2625
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.pdfCredentialTwinDelete(credentialId, walletId, options);
|
|
2626
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
2627
|
+
const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.pdfCredentialTwinDelete']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
2628
|
+
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
2629
|
+
});
|
|
2630
|
+
},
|
|
2631
|
+
/**
|
|
2632
|
+
* Returns either an unsigned PDF that was uploaded to be signed and embedded into a verifiable credential in case of credential in Draft state, or a signed PDF embedded in an issued VC.
|
|
2633
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
2634
|
+
* @param {string} walletId
|
|
2635
|
+
* @param {*} [options] Override http request option.
|
|
2636
|
+
* @throws {RequiredError}
|
|
2637
|
+
*/
|
|
2638
|
+
pdfCredentialTwinGet(credentialId, walletId, options) {
|
|
2639
|
+
var _a, _b, _c;
|
|
2640
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2641
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.pdfCredentialTwinGet(credentialId, walletId, options);
|
|
2642
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
2643
|
+
const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.pdfCredentialTwinGet']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
2644
|
+
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
2645
|
+
});
|
|
2646
|
+
},
|
|
2647
|
+
/**
|
|
2648
|
+
* Uploads a PDF that will be signed and embedded with the verifiable credential when it will be issued. Can be used only for credentials in Draft state. Maximal size of the PDF document is 50 MB.
|
|
2649
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
2650
|
+
* @param {string} walletId
|
|
2651
|
+
* @param {File} [pdf]
|
|
2652
|
+
* @param {*} [options] Override http request option.
|
|
2653
|
+
* @throws {RequiredError}
|
|
2654
|
+
*/
|
|
2655
|
+
pdfCredentialTwinUpload(credentialId, walletId, pdf, options) {
|
|
2656
|
+
var _a, _b, _c;
|
|
2657
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2658
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.pdfCredentialTwinUpload(credentialId, walletId, pdf, options);
|
|
2659
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
2660
|
+
const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.pdfCredentialTwinUpload']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
2661
|
+
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
2662
|
+
});
|
|
2663
|
+
},
|
|
2362
2664
|
/**
|
|
2363
2665
|
* Accredits a legal entity as RTAO, TAO or TI.
|
|
2364
2666
|
* @param {string} walletId
|
|
@@ -2486,6 +2788,26 @@ const DefaultApiFp = function (configuration) {
|
|
|
2486
2788
|
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
2487
2789
|
});
|
|
2488
2790
|
},
|
|
2791
|
+
/**
|
|
2792
|
+
* Verifies the signatures of uploaded PDF and extracts and verifies VP in the PDF document Maximum size of the PDF document is 50 MB.
|
|
2793
|
+
* @param {string} walletId
|
|
2794
|
+
* @param {boolean} extractVp Whether to extract VP attachment from the PDF
|
|
2795
|
+
* @param {File} [pdf]
|
|
2796
|
+
* @param {Array<string>} [trustedCertificates] Base64 encoded x509 certificates with which the PDF may be signed.
|
|
2797
|
+
* @param {Array<string>} [trustedListsUrl] URLs of ETSI trusted lists that will be used for verification purposes. If not provided, ETSI trust list configured for the wallet will be used.
|
|
2798
|
+
* @param {Array<string>} [trustedListSigningCertificates] Base64 encoded x509 certificates with which the ETSI trusted lists may be signed. If not provided, values from wallet config will be used.
|
|
2799
|
+
* @param {*} [options] Override http request option.
|
|
2800
|
+
* @throws {RequiredError}
|
|
2801
|
+
*/
|
|
2802
|
+
verifierPdfVerify(walletId, extractVp, pdf, trustedCertificates, trustedListsUrl, trustedListSigningCertificates, options) {
|
|
2803
|
+
var _a, _b, _c;
|
|
2804
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2805
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.verifierPdfVerify(walletId, extractVp, pdf, trustedCertificates, trustedListsUrl, trustedListSigningCertificates, options);
|
|
2806
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
2807
|
+
const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.verifierPdfVerify']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
2808
|
+
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
2809
|
+
});
|
|
2810
|
+
},
|
|
2489
2811
|
/**
|
|
2490
2812
|
* Creates a new wallet for the authenticated client.
|
|
2491
2813
|
* @param {WalletCreatePayload} [walletCreatePayload]
|
|
@@ -3014,6 +3336,48 @@ const DefaultApiFactory = function (configuration, basePath, axios) {
|
|
|
3014
3336
|
issuerInitiatePreauthOffer(walletId, initPreAuthOffer, options) {
|
|
3015
3337
|
return localVarFp.issuerInitiatePreauthOffer(walletId, initPreAuthOffer, options).then((request) => request(axios, basePath));
|
|
3016
3338
|
},
|
|
3339
|
+
/**
|
|
3340
|
+
* Returns a signed PDF contained in the verifiable credential containing the credential VP added as an attachment in incremental update.
|
|
3341
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
3342
|
+
* @param {boolean} signPdf Whether to sign the PDF with holder\'s X509 certificate or not
|
|
3343
|
+
* @param {string} walletId
|
|
3344
|
+
* @param {*} [options] Override http request option.
|
|
3345
|
+
* @throws {RequiredError}
|
|
3346
|
+
*/
|
|
3347
|
+
pdfCredentialMakeVp(credentialId, signPdf, walletId, options) {
|
|
3348
|
+
return localVarFp.pdfCredentialMakeVp(credentialId, signPdf, walletId, options).then((request) => request(axios, basePath));
|
|
3349
|
+
},
|
|
3350
|
+
/**
|
|
3351
|
+
* Deletes the PDF associated with the verifiable credential. Can be used only for credentials in Draft state.
|
|
3352
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
3353
|
+
* @param {string} walletId
|
|
3354
|
+
* @param {*} [options] Override http request option.
|
|
3355
|
+
* @throws {RequiredError}
|
|
3356
|
+
*/
|
|
3357
|
+
pdfCredentialTwinDelete(credentialId, walletId, options) {
|
|
3358
|
+
return localVarFp.pdfCredentialTwinDelete(credentialId, walletId, options).then((request) => request(axios, basePath));
|
|
3359
|
+
},
|
|
3360
|
+
/**
|
|
3361
|
+
* Returns either an unsigned PDF that was uploaded to be signed and embedded into a verifiable credential in case of credential in Draft state, or a signed PDF embedded in an issued VC.
|
|
3362
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
3363
|
+
* @param {string} walletId
|
|
3364
|
+
* @param {*} [options] Override http request option.
|
|
3365
|
+
* @throws {RequiredError}
|
|
3366
|
+
*/
|
|
3367
|
+
pdfCredentialTwinGet(credentialId, walletId, options) {
|
|
3368
|
+
return localVarFp.pdfCredentialTwinGet(credentialId, walletId, options).then((request) => request(axios, basePath));
|
|
3369
|
+
},
|
|
3370
|
+
/**
|
|
3371
|
+
* Uploads a PDF that will be signed and embedded with the verifiable credential when it will be issued. Can be used only for credentials in Draft state. Maximal size of the PDF document is 50 MB.
|
|
3372
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
3373
|
+
* @param {string} walletId
|
|
3374
|
+
* @param {File} [pdf]
|
|
3375
|
+
* @param {*} [options] Override http request option.
|
|
3376
|
+
* @throws {RequiredError}
|
|
3377
|
+
*/
|
|
3378
|
+
pdfCredentialTwinUpload(credentialId, walletId, pdf, options) {
|
|
3379
|
+
return localVarFp.pdfCredentialTwinUpload(credentialId, walletId, pdf, options).then((request) => request(axios, basePath));
|
|
3380
|
+
},
|
|
3017
3381
|
/**
|
|
3018
3382
|
* Accredits a legal entity as RTAO, TAO or TI.
|
|
3019
3383
|
* @param {string} walletId
|
|
@@ -3093,6 +3457,20 @@ const DefaultApiFactory = function (configuration, basePath, axios) {
|
|
|
3093
3457
|
verifierLinkedVpVerify(walletId, did, options) {
|
|
3094
3458
|
return localVarFp.verifierLinkedVpVerify(walletId, did, options).then((request) => request(axios, basePath));
|
|
3095
3459
|
},
|
|
3460
|
+
/**
|
|
3461
|
+
* Verifies the signatures of uploaded PDF and extracts and verifies VP in the PDF document Maximum size of the PDF document is 50 MB.
|
|
3462
|
+
* @param {string} walletId
|
|
3463
|
+
* @param {boolean} extractVp Whether to extract VP attachment from the PDF
|
|
3464
|
+
* @param {File} [pdf]
|
|
3465
|
+
* @param {Array<string>} [trustedCertificates] Base64 encoded x509 certificates with which the PDF may be signed.
|
|
3466
|
+
* @param {Array<string>} [trustedListsUrl] URLs of ETSI trusted lists that will be used for verification purposes. If not provided, ETSI trust list configured for the wallet will be used.
|
|
3467
|
+
* @param {Array<string>} [trustedListSigningCertificates] Base64 encoded x509 certificates with which the ETSI trusted lists may be signed. If not provided, values from wallet config will be used.
|
|
3468
|
+
* @param {*} [options] Override http request option.
|
|
3469
|
+
* @throws {RequiredError}
|
|
3470
|
+
*/
|
|
3471
|
+
verifierPdfVerify(walletId, extractVp, pdf, trustedCertificates, trustedListsUrl, trustedListSigningCertificates, options) {
|
|
3472
|
+
return localVarFp.verifierPdfVerify(walletId, extractVp, pdf, trustedCertificates, trustedListsUrl, trustedListSigningCertificates, options).then((request) => request(axios, basePath));
|
|
3473
|
+
},
|
|
3096
3474
|
/**
|
|
3097
3475
|
* Creates a new wallet for the authenticated client.
|
|
3098
3476
|
* @param {WalletCreatePayload} [walletCreatePayload]
|
|
@@ -3523,6 +3901,48 @@ class DefaultApi extends base_1.BaseAPI {
|
|
|
3523
3901
|
issuerInitiatePreauthOffer(walletId, initPreAuthOffer, options) {
|
|
3524
3902
|
return (0, exports.DefaultApiFp)(this.configuration).issuerInitiatePreauthOffer(walletId, initPreAuthOffer, options).then((request) => request(this.axios, this.basePath));
|
|
3525
3903
|
}
|
|
3904
|
+
/**
|
|
3905
|
+
* Returns a signed PDF contained in the verifiable credential containing the credential VP added as an attachment in incremental update.
|
|
3906
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
3907
|
+
* @param {boolean} signPdf Whether to sign the PDF with holder\'s X509 certificate or not
|
|
3908
|
+
* @param {string} walletId
|
|
3909
|
+
* @param {*} [options] Override http request option.
|
|
3910
|
+
* @throws {RequiredError}
|
|
3911
|
+
*/
|
|
3912
|
+
pdfCredentialMakeVp(credentialId, signPdf, walletId, options) {
|
|
3913
|
+
return (0, exports.DefaultApiFp)(this.configuration).pdfCredentialMakeVp(credentialId, signPdf, walletId, options).then((request) => request(this.axios, this.basePath));
|
|
3914
|
+
}
|
|
3915
|
+
/**
|
|
3916
|
+
* Deletes the PDF associated with the verifiable credential. Can be used only for credentials in Draft state.
|
|
3917
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
3918
|
+
* @param {string} walletId
|
|
3919
|
+
* @param {*} [options] Override http request option.
|
|
3920
|
+
* @throws {RequiredError}
|
|
3921
|
+
*/
|
|
3922
|
+
pdfCredentialTwinDelete(credentialId, walletId, options) {
|
|
3923
|
+
return (0, exports.DefaultApiFp)(this.configuration).pdfCredentialTwinDelete(credentialId, walletId, options).then((request) => request(this.axios, this.basePath));
|
|
3924
|
+
}
|
|
3925
|
+
/**
|
|
3926
|
+
* Returns either an unsigned PDF that was uploaded to be signed and embedded into a verifiable credential in case of credential in Draft state, or a signed PDF embedded in an issued VC.
|
|
3927
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
3928
|
+
* @param {string} walletId
|
|
3929
|
+
* @param {*} [options] Override http request option.
|
|
3930
|
+
* @throws {RequiredError}
|
|
3931
|
+
*/
|
|
3932
|
+
pdfCredentialTwinGet(credentialId, walletId, options) {
|
|
3933
|
+
return (0, exports.DefaultApiFp)(this.configuration).pdfCredentialTwinGet(credentialId, walletId, options).then((request) => request(this.axios, this.basePath));
|
|
3934
|
+
}
|
|
3935
|
+
/**
|
|
3936
|
+
* Uploads a PDF that will be signed and embedded with the verifiable credential when it will be issued. Can be used only for credentials in Draft state. Maximal size of the PDF document is 50 MB.
|
|
3937
|
+
* @param {string} credentialId Verifiable Credential Identifier
|
|
3938
|
+
* @param {string} walletId
|
|
3939
|
+
* @param {File} [pdf]
|
|
3940
|
+
* @param {*} [options] Override http request option.
|
|
3941
|
+
* @throws {RequiredError}
|
|
3942
|
+
*/
|
|
3943
|
+
pdfCredentialTwinUpload(credentialId, walletId, pdf, options) {
|
|
3944
|
+
return (0, exports.DefaultApiFp)(this.configuration).pdfCredentialTwinUpload(credentialId, walletId, pdf, options).then((request) => request(this.axios, this.basePath));
|
|
3945
|
+
}
|
|
3526
3946
|
/**
|
|
3527
3947
|
* Accredits a legal entity as RTAO, TAO or TI.
|
|
3528
3948
|
* @param {string} walletId
|
|
@@ -3602,6 +4022,20 @@ class DefaultApi extends base_1.BaseAPI {
|
|
|
3602
4022
|
verifierLinkedVpVerify(walletId, did, options) {
|
|
3603
4023
|
return (0, exports.DefaultApiFp)(this.configuration).verifierLinkedVpVerify(walletId, did, options).then((request) => request(this.axios, this.basePath));
|
|
3604
4024
|
}
|
|
4025
|
+
/**
|
|
4026
|
+
* Verifies the signatures of uploaded PDF and extracts and verifies VP in the PDF document Maximum size of the PDF document is 50 MB.
|
|
4027
|
+
* @param {string} walletId
|
|
4028
|
+
* @param {boolean} extractVp Whether to extract VP attachment from the PDF
|
|
4029
|
+
* @param {File} [pdf]
|
|
4030
|
+
* @param {Array<string>} [trustedCertificates] Base64 encoded x509 certificates with which the PDF may be signed.
|
|
4031
|
+
* @param {Array<string>} [trustedListsUrl] URLs of ETSI trusted lists that will be used for verification purposes. If not provided, ETSI trust list configured for the wallet will be used.
|
|
4032
|
+
* @param {Array<string>} [trustedListSigningCertificates] Base64 encoded x509 certificates with which the ETSI trusted lists may be signed. If not provided, values from wallet config will be used.
|
|
4033
|
+
* @param {*} [options] Override http request option.
|
|
4034
|
+
* @throws {RequiredError}
|
|
4035
|
+
*/
|
|
4036
|
+
verifierPdfVerify(walletId, extractVp, pdf, trustedCertificates, trustedListsUrl, trustedListSigningCertificates, options) {
|
|
4037
|
+
return (0, exports.DefaultApiFp)(this.configuration).verifierPdfVerify(walletId, extractVp, pdf, trustedCertificates, trustedListsUrl, trustedListSigningCertificates, options).then((request) => request(this.axios, this.basePath));
|
|
4038
|
+
}
|
|
3605
4039
|
/**
|
|
3606
4040
|
* Creates a new wallet for the authenticated client.
|
|
3607
4041
|
* @param {WalletCreatePayload} [walletCreatePayload]
|
package/base.js
CHANGED
|
@@ -18,7 +18,7 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
18
18
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
19
19
|
exports.operationServerMap = exports.RequiredError = exports.BaseAPI = exports.COLLECTION_FORMATS = exports.BASE_PATH = void 0;
|
|
20
20
|
const axios_1 = __importDefault(require("axios"));
|
|
21
|
-
exports.BASE_PATH = "/api/v1".replace(/\/+$/, "");
|
|
21
|
+
exports.BASE_PATH = "https://wallet.dev.triveria.io/api/v1".replace(/\/+$/, "");
|
|
22
22
|
exports.COLLECTION_FORMATS = {
|
|
23
23
|
csv: ",",
|
|
24
24
|
ssv: " ",
|