@triveria/wallet 0.0.277 → 0.0.278
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/api.d.ts +44 -2
- package/api.js +42 -14
- package/package.json +1 -1
package/api.d.ts
CHANGED
|
@@ -135,6 +135,14 @@ export interface CredentialIssuerDefinition {
|
|
|
135
135
|
* Type of issuer to be used with credentials of the type specified.
|
|
136
136
|
*/
|
|
137
137
|
'credentialIssuer': CredentialIssuerDefinitionCredentialIssuerEnum;
|
|
138
|
+
/**
|
|
139
|
+
* Type of authorization used in credential interactions. Supported types: `none` - No authorization needed, use when the issuer uses pre authorized offers. `oauthNoAuth` - Authorization using Oauth2 with mock AS that immediately returns the authorization code. `oauthCustom` - Authorization using Oauth2, AS uses custom authentication provider. `openid` - Authorization using openid, id_token/vp_token request required before returning authorization code. `openidCustom` - Authorization using openid, AS uses custom authentication provider. When interacting with EUDI Wallet, use `oauth`/`oauthCustom` authorization type.
|
|
140
|
+
*/
|
|
141
|
+
'authorization'?: CredentialIssuerDefinitionAuthorizationEnum;
|
|
142
|
+
/**
|
|
143
|
+
* Custom Login Provider URL. Required when using `oauthCustom` and `openidCustom` authorization.
|
|
144
|
+
*/
|
|
145
|
+
'authnProviderUrl'?: string;
|
|
138
146
|
'issuerConfiguration'?: CredentialIssuerDefinitionIssuerConfiguration;
|
|
139
147
|
'credentialFormat': CredentialFormat;
|
|
140
148
|
'signingKeyIdentifier'?: SigningKeyIdentifier;
|
|
@@ -151,6 +159,14 @@ export declare const CredentialIssuerDefinitionCredentialIssuerEnum: {
|
|
|
151
159
|
readonly CredentialRequirements: "CredentialRequirements";
|
|
152
160
|
};
|
|
153
161
|
export type CredentialIssuerDefinitionCredentialIssuerEnum = typeof CredentialIssuerDefinitionCredentialIssuerEnum[keyof typeof CredentialIssuerDefinitionCredentialIssuerEnum];
|
|
162
|
+
export declare const CredentialIssuerDefinitionAuthorizationEnum: {
|
|
163
|
+
readonly None: "none";
|
|
164
|
+
readonly OauthNoAuth: "oauthNoAuth";
|
|
165
|
+
readonly OauthCustom: "oauthCustom";
|
|
166
|
+
readonly Openid: "openid";
|
|
167
|
+
readonly OpenidCustom: "openidCustom";
|
|
168
|
+
};
|
|
169
|
+
export type CredentialIssuerDefinitionAuthorizationEnum = typeof CredentialIssuerDefinitionAuthorizationEnum[keyof typeof CredentialIssuerDefinitionAuthorizationEnum];
|
|
154
170
|
/**
|
|
155
171
|
* @type CredentialIssuerDefinitionIssuerConfiguration
|
|
156
172
|
*/
|
|
@@ -244,6 +260,15 @@ export interface CredentialPayload {
|
|
|
244
260
|
*/
|
|
245
261
|
'validateSchema'?: boolean;
|
|
246
262
|
}
|
|
263
|
+
/**
|
|
264
|
+
* Credential property that will be verified. `verifySchema` is only applicable in W3C VCDM credentials. With other types, this field will be ignored.
|
|
265
|
+
*/
|
|
266
|
+
export declare const CredentialPropertyToVerify: {
|
|
267
|
+
readonly VerifyExpiration: "verifyExpiration";
|
|
268
|
+
readonly VerifyStatus: "verifyStatus";
|
|
269
|
+
readonly VerifySchema: "verifySchema";
|
|
270
|
+
};
|
|
271
|
+
export type CredentialPropertyToVerify = typeof CredentialPropertyToVerify[keyof typeof CredentialPropertyToVerify];
|
|
247
272
|
export interface CredentialRequest {
|
|
248
273
|
'types': string;
|
|
249
274
|
'format': CredentialFormat;
|
|
@@ -292,6 +317,9 @@ export interface CredentialType {
|
|
|
292
317
|
'type'?: Array<string>;
|
|
293
318
|
'doctype'?: string;
|
|
294
319
|
}
|
|
320
|
+
/**
|
|
321
|
+
* Verifier configuration. `keyIdentifier` is the same as wallet key identifier by default.
|
|
322
|
+
*/
|
|
295
323
|
export interface CredentialVerifierDefinition {
|
|
296
324
|
/**
|
|
297
325
|
* Human readable name of the definition
|
|
@@ -308,6 +336,11 @@ export interface CredentialVerifierDefinition {
|
|
|
308
336
|
'scope'?: string;
|
|
309
337
|
'presentationDefinition'?: PresentationDefinition;
|
|
310
338
|
'dcqlQuery'?: DCQLQuery;
|
|
339
|
+
'keyIdentifier'?: SigningKeyIdentifier;
|
|
340
|
+
/**
|
|
341
|
+
* List of credential properties that should be verified.
|
|
342
|
+
*/
|
|
343
|
+
'toVerify'?: Set<CredentialPropertyToVerify>;
|
|
311
344
|
}
|
|
312
345
|
/**
|
|
313
346
|
* The wrapper contains Verifiable Credential in both, the Credential and as Base64 signed format alongside with metadata.
|
|
@@ -598,6 +631,10 @@ export interface InteractionAuthorizationConsent {
|
|
|
598
631
|
}
|
|
599
632
|
export interface InteractionAuthorizationRequirements {
|
|
600
633
|
'requirementType': InteractionAuthorizationRequirementsRequirementTypeEnum;
|
|
634
|
+
/**
|
|
635
|
+
* URL where custom user authentication for issuance shall be performed. Present when `requirementType` is `custom`.
|
|
636
|
+
*/
|
|
637
|
+
'authnUrl'?: string;
|
|
601
638
|
'presentationDefinition'?: PresentationDefinition;
|
|
602
639
|
'dcqlQuery'?: DCQLQuery;
|
|
603
640
|
/**
|
|
@@ -617,6 +654,7 @@ export declare const InteractionAuthorizationRequirementsRequirementTypeEnum: {
|
|
|
617
654
|
readonly IdToken: "id_token";
|
|
618
655
|
readonly VpToken: "vp_token";
|
|
619
656
|
readonly Pin: "pin";
|
|
657
|
+
readonly Custom: "custom";
|
|
620
658
|
};
|
|
621
659
|
export type InteractionAuthorizationRequirementsRequirementTypeEnum = typeof InteractionAuthorizationRequirementsRequirementTypeEnum[keyof typeof InteractionAuthorizationRequirementsRequirementTypeEnum];
|
|
622
660
|
export interface IssuanceRequirementsToVerify {
|
|
@@ -868,11 +906,15 @@ export interface VPDrivenIssuerConfig {
|
|
|
868
906
|
/**
|
|
869
907
|
* ID of the verifier used for verification of presented credential.
|
|
870
908
|
*/
|
|
871
|
-
'credentialVerifierId'
|
|
909
|
+
'credentialVerifierId'?: string;
|
|
910
|
+
/**
|
|
911
|
+
* When true, authentication result returned from custom login provider configured for this issuer is used. In this case, credentialVerifierId must not be set.
|
|
912
|
+
*/
|
|
913
|
+
'useAuthnProviderResult'?: boolean;
|
|
872
914
|
/**
|
|
873
915
|
* Mapping of the input values set as JSONPath elements to the output credential claims.
|
|
874
916
|
*/
|
|
875
|
-
'mapping'
|
|
917
|
+
'mapping': object;
|
|
876
918
|
}
|
|
877
919
|
/**
|
|
878
920
|
* The offer to be accepted. The offer URL is mandatory.
|
package/api.js
CHANGED
|
@@ -25,7 +25,7 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
25
25
|
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
26
26
|
};
|
|
27
27
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
28
|
-
exports.WmpEntityListEntityTypeEnum = exports.CredentialListInteractionEnum = exports.DefaultApi = exports.DefaultApiFactory = exports.DefaultApiFp = exports.DefaultApiAxiosParamCreator = exports.XadesSignatureType = exports.WmpRequestType = exports.WalletNotificationEventType = exports.WalletCapability = exports.TrustFrameworkType = exports.SystemImpactStatusEnum = exports.SigningKeyIdentifier = exports.RevokeAccreditationRequestTypeEnum = exports.PresentationDefinitionSubmissionRequirementsRuleEnum = exports.OidcRevisionOidc4vpEnum = exports.OidcRevisionOidc4vciEnum = exports.ObjectVerticalAlignment = exports.ObjectHorizontalAlignment = exports.ListSort = exports.InteractionAuthorizationRequirementsRequirementTypeEnum = exports.HealthStatusStatusEnum = exports.EntityAccreditationRequestTypeEnum = exports.DocumentSignatureValidityVerificationResultEnum = exports.DeferredStatusEnum = exports.CredentialNotificationEventTypeEnum = exports.CredentialMetadataStatusEnum = exports.CredentialMetadataInteractionEnum = exports.CredentialIssuerDefinitionCredentialIssuerEnum = exports.CredentialFormat = exports.AccreditationRequestTypeEnum = void 0;
|
|
28
|
+
exports.WmpEntityListEntityTypeEnum = exports.CredentialListInteractionEnum = exports.DefaultApi = exports.DefaultApiFactory = exports.DefaultApiFp = exports.DefaultApiAxiosParamCreator = exports.XadesSignatureType = exports.WmpRequestType = exports.WalletNotificationEventType = exports.WalletCapability = exports.TrustFrameworkType = exports.SystemImpactStatusEnum = exports.SigningKeyIdentifier = exports.RevokeAccreditationRequestTypeEnum = exports.PresentationDefinitionSubmissionRequirementsRuleEnum = exports.OidcRevisionOidc4vpEnum = exports.OidcRevisionOidc4vciEnum = exports.ObjectVerticalAlignment = exports.ObjectHorizontalAlignment = exports.ListSort = exports.InteractionAuthorizationRequirementsRequirementTypeEnum = exports.HealthStatusStatusEnum = exports.EntityAccreditationRequestTypeEnum = exports.DocumentSignatureValidityVerificationResultEnum = exports.DeferredStatusEnum = exports.CredentialPropertyToVerify = exports.CredentialNotificationEventTypeEnum = exports.CredentialMetadataStatusEnum = exports.CredentialMetadataInteractionEnum = exports.CredentialIssuerDefinitionAuthorizationEnum = exports.CredentialIssuerDefinitionCredentialIssuerEnum = exports.CredentialFormat = exports.AccreditationRequestTypeEnum = void 0;
|
|
29
29
|
const axios_1 = __importDefault(require("axios"));
|
|
30
30
|
// Some imports not used depending on template conditions
|
|
31
31
|
// @ts-ignore
|
|
@@ -51,6 +51,13 @@ exports.CredentialIssuerDefinitionCredentialIssuerEnum = {
|
|
|
51
51
|
VpDriven: 'VPDriven',
|
|
52
52
|
CredentialRequirements: 'CredentialRequirements'
|
|
53
53
|
};
|
|
54
|
+
exports.CredentialIssuerDefinitionAuthorizationEnum = {
|
|
55
|
+
None: 'none',
|
|
56
|
+
OauthNoAuth: 'oauthNoAuth',
|
|
57
|
+
OauthCustom: 'oauthCustom',
|
|
58
|
+
Openid: 'openid',
|
|
59
|
+
OpenidCustom: 'openidCustom'
|
|
60
|
+
};
|
|
54
61
|
exports.CredentialMetadataInteractionEnum = {
|
|
55
62
|
Issuance: 'issuance',
|
|
56
63
|
Receive: 'receive',
|
|
@@ -68,6 +75,14 @@ exports.CredentialNotificationEventTypeEnum = {
|
|
|
68
75
|
CredentialReceived: 'credential.received',
|
|
69
76
|
CredentialRevoked: 'credential.revoked'
|
|
70
77
|
};
|
|
78
|
+
/**
|
|
79
|
+
* Credential property that will be verified. `verifySchema` is only applicable in W3C VCDM credentials. With other types, this field will be ignored.
|
|
80
|
+
*/
|
|
81
|
+
exports.CredentialPropertyToVerify = {
|
|
82
|
+
VerifyExpiration: 'verifyExpiration',
|
|
83
|
+
VerifyStatus: 'verifyStatus',
|
|
84
|
+
VerifySchema: 'verifySchema'
|
|
85
|
+
};
|
|
71
86
|
exports.DeferredStatusEnum = {
|
|
72
87
|
InProgress: 'in_progress',
|
|
73
88
|
Completed: 'completed',
|
|
@@ -93,7 +108,8 @@ exports.InteractionAuthorizationRequirementsRequirementTypeEnum = {
|
|
|
93
108
|
None: 'none',
|
|
94
109
|
IdToken: 'id_token',
|
|
95
110
|
VpToken: 'vp_token',
|
|
96
|
-
Pin: 'pin'
|
|
111
|
+
Pin: 'pin',
|
|
112
|
+
Custom: 'custom'
|
|
97
113
|
};
|
|
98
114
|
/**
|
|
99
115
|
* Sort flag controls the sort direction by the time created
|
|
@@ -1391,8 +1407,7 @@ const DefaultApiAxiosParamCreator = function (configuration) {
|
|
|
1391
1407
|
tfAccreditAs: (walletId_1, accreditationRequest_1, ...args_1) => __awaiter(this, [walletId_1, accreditationRequest_1, ...args_1], void 0, function* (walletId, accreditationRequest, options = {}) {
|
|
1392
1408
|
// verify required parameter 'walletId' is not null or undefined
|
|
1393
1409
|
(0, common_1.assertParamExists)('tfAccreditAs', 'walletId', walletId);
|
|
1394
|
-
const localVarPath = `/tf/
|
|
1395
|
-
.replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
|
|
1410
|
+
const localVarPath = `/tf/accredit`;
|
|
1396
1411
|
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
1397
1412
|
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
1398
1413
|
let baseOptions;
|
|
@@ -1407,6 +1422,9 @@ const DefaultApiAxiosParamCreator = function (configuration) {
|
|
|
1407
1422
|
yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
|
|
1408
1423
|
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
1409
1424
|
localVarHeaderParameter['Accept'] = 'application/json';
|
|
1425
|
+
if (walletId != null) {
|
|
1426
|
+
localVarHeaderParameter['wallet_id'] = String(walletId);
|
|
1427
|
+
}
|
|
1410
1428
|
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
1411
1429
|
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
1412
1430
|
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
@@ -1426,8 +1444,7 @@ const DefaultApiAxiosParamCreator = function (configuration) {
|
|
|
1426
1444
|
tfAccreditRequest: (walletId_1, entityAccreditationRequest_1, ...args_1) => __awaiter(this, [walletId_1, entityAccreditationRequest_1, ...args_1], void 0, function* (walletId, entityAccreditationRequest, options = {}) {
|
|
1427
1445
|
// verify required parameter 'walletId' is not null or undefined
|
|
1428
1446
|
(0, common_1.assertParamExists)('tfAccreditRequest', 'walletId', walletId);
|
|
1429
|
-
const localVarPath = `/tf/
|
|
1430
|
-
.replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
|
|
1447
|
+
const localVarPath = `/tf/accreditation_request`;
|
|
1431
1448
|
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
1432
1449
|
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
1433
1450
|
let baseOptions;
|
|
@@ -1442,6 +1459,9 @@ const DefaultApiAxiosParamCreator = function (configuration) {
|
|
|
1442
1459
|
yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
|
|
1443
1460
|
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
1444
1461
|
localVarHeaderParameter['Accept'] = 'application/json';
|
|
1462
|
+
if (walletId != null) {
|
|
1463
|
+
localVarHeaderParameter['wallet_id'] = String(walletId);
|
|
1464
|
+
}
|
|
1445
1465
|
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
1446
1466
|
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
1447
1467
|
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
@@ -1461,8 +1481,7 @@ const DefaultApiAxiosParamCreator = function (configuration) {
|
|
|
1461
1481
|
tfOnboard: (walletId_1, onboardingRequest_1, ...args_1) => __awaiter(this, [walletId_1, onboardingRequest_1, ...args_1], void 0, function* (walletId, onboardingRequest, options = {}) {
|
|
1462
1482
|
// verify required parameter 'walletId' is not null or undefined
|
|
1463
1483
|
(0, common_1.assertParamExists)('tfOnboard', 'walletId', walletId);
|
|
1464
|
-
const localVarPath = `/tf/
|
|
1465
|
-
.replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
|
|
1484
|
+
const localVarPath = `/tf/onboard`;
|
|
1466
1485
|
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
1467
1486
|
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
1468
1487
|
let baseOptions;
|
|
@@ -1477,6 +1496,9 @@ const DefaultApiAxiosParamCreator = function (configuration) {
|
|
|
1477
1496
|
yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
|
|
1478
1497
|
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
1479
1498
|
localVarHeaderParameter['Accept'] = 'application/json';
|
|
1499
|
+
if (walletId != null) {
|
|
1500
|
+
localVarHeaderParameter['wallet_id'] = String(walletId);
|
|
1501
|
+
}
|
|
1480
1502
|
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
1481
1503
|
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
1482
1504
|
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
@@ -1496,8 +1518,7 @@ const DefaultApiAxiosParamCreator = function (configuration) {
|
|
|
1496
1518
|
tfOnboardRequest: (walletId_1, entityOnboardingRequest_1, ...args_1) => __awaiter(this, [walletId_1, entityOnboardingRequest_1, ...args_1], void 0, function* (walletId, entityOnboardingRequest, options = {}) {
|
|
1497
1519
|
// verify required parameter 'walletId' is not null or undefined
|
|
1498
1520
|
(0, common_1.assertParamExists)('tfOnboardRequest', 'walletId', walletId);
|
|
1499
|
-
const localVarPath = `/tf/
|
|
1500
|
-
.replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
|
|
1521
|
+
const localVarPath = `/tf/onboard_request`;
|
|
1501
1522
|
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
1502
1523
|
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
1503
1524
|
let baseOptions;
|
|
@@ -1512,6 +1533,9 @@ const DefaultApiAxiosParamCreator = function (configuration) {
|
|
|
1512
1533
|
yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
|
|
1513
1534
|
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
1514
1535
|
localVarHeaderParameter['Accept'] = 'application/json';
|
|
1536
|
+
if (walletId != null) {
|
|
1537
|
+
localVarHeaderParameter['wallet_id'] = String(walletId);
|
|
1538
|
+
}
|
|
1515
1539
|
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
1516
1540
|
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
1517
1541
|
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
@@ -1531,8 +1555,7 @@ const DefaultApiAxiosParamCreator = function (configuration) {
|
|
|
1531
1555
|
tfRevokeAccreditation: (walletId_1, revokeAccreditationRequest_1, ...args_1) => __awaiter(this, [walletId_1, revokeAccreditationRequest_1, ...args_1], void 0, function* (walletId, revokeAccreditationRequest, options = {}) {
|
|
1532
1556
|
// verify required parameter 'walletId' is not null or undefined
|
|
1533
1557
|
(0, common_1.assertParamExists)('tfRevokeAccreditation', 'walletId', walletId);
|
|
1534
|
-
const localVarPath = `/tf/
|
|
1535
|
-
.replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
|
|
1558
|
+
const localVarPath = `/tf/revoke-accredit`;
|
|
1536
1559
|
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
1537
1560
|
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
1538
1561
|
let baseOptions;
|
|
@@ -1547,6 +1570,9 @@ const DefaultApiAxiosParamCreator = function (configuration) {
|
|
|
1547
1570
|
yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
|
|
1548
1571
|
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
1549
1572
|
localVarHeaderParameter['Accept'] = 'application/json';
|
|
1573
|
+
if (walletId != null) {
|
|
1574
|
+
localVarHeaderParameter['wallet_id'] = String(walletId);
|
|
1575
|
+
}
|
|
1550
1576
|
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
1551
1577
|
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
1552
1578
|
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
@@ -1566,8 +1592,7 @@ const DefaultApiAxiosParamCreator = function (configuration) {
|
|
|
1566
1592
|
tfX509CertificateIssue: (walletId_1, certificateIssueRequest_1, ...args_1) => __awaiter(this, [walletId_1, certificateIssueRequest_1, ...args_1], void 0, function* (walletId, certificateIssueRequest, options = {}) {
|
|
1567
1593
|
// verify required parameter 'walletId' is not null or undefined
|
|
1568
1594
|
(0, common_1.assertParamExists)('tfX509CertificateIssue', 'walletId', walletId);
|
|
1569
|
-
const localVarPath = `/tf/
|
|
1570
|
-
.replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
|
|
1595
|
+
const localVarPath = `/tf/x509`;
|
|
1571
1596
|
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
1572
1597
|
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
1573
1598
|
let baseOptions;
|
|
@@ -1582,6 +1607,9 @@ const DefaultApiAxiosParamCreator = function (configuration) {
|
|
|
1582
1607
|
yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
|
|
1583
1608
|
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
1584
1609
|
localVarHeaderParameter['Accept'] = 'application/json';
|
|
1610
|
+
if (walletId != null) {
|
|
1611
|
+
localVarHeaderParameter['wallet_id'] = String(walletId);
|
|
1612
|
+
}
|
|
1585
1613
|
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
1586
1614
|
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
1587
1615
|
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|