@triveria/wallet 0.0.277 → 0.0.278

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/api.d.ts +44 -2
  2. package/api.js +42 -14
  3. package/package.json +1 -1
package/api.d.ts CHANGED
@@ -135,6 +135,14 @@ export interface CredentialIssuerDefinition {
135
135
  * Type of issuer to be used with credentials of the type specified.
136
136
  */
137
137
  'credentialIssuer': CredentialIssuerDefinitionCredentialIssuerEnum;
138
+ /**
139
+ * Type of authorization used in credential interactions. Supported types: `none` - No authorization needed, use when the issuer uses pre authorized offers. `oauthNoAuth` - Authorization using Oauth2 with mock AS that immediately returns the authorization code. `oauthCustom` - Authorization using Oauth2, AS uses custom authentication provider. `openid` - Authorization using openid, id_token/vp_token request required before returning authorization code. `openidCustom` - Authorization using openid, AS uses custom authentication provider. When interacting with EUDI Wallet, use `oauth`/`oauthCustom` authorization type.
140
+ */
141
+ 'authorization'?: CredentialIssuerDefinitionAuthorizationEnum;
142
+ /**
143
+ * Custom Login Provider URL. Required when using `oauthCustom` and `openidCustom` authorization.
144
+ */
145
+ 'authnProviderUrl'?: string;
138
146
  'issuerConfiguration'?: CredentialIssuerDefinitionIssuerConfiguration;
139
147
  'credentialFormat': CredentialFormat;
140
148
  'signingKeyIdentifier'?: SigningKeyIdentifier;
@@ -151,6 +159,14 @@ export declare const CredentialIssuerDefinitionCredentialIssuerEnum: {
151
159
  readonly CredentialRequirements: "CredentialRequirements";
152
160
  };
153
161
  export type CredentialIssuerDefinitionCredentialIssuerEnum = typeof CredentialIssuerDefinitionCredentialIssuerEnum[keyof typeof CredentialIssuerDefinitionCredentialIssuerEnum];
162
+ export declare const CredentialIssuerDefinitionAuthorizationEnum: {
163
+ readonly None: "none";
164
+ readonly OauthNoAuth: "oauthNoAuth";
165
+ readonly OauthCustom: "oauthCustom";
166
+ readonly Openid: "openid";
167
+ readonly OpenidCustom: "openidCustom";
168
+ };
169
+ export type CredentialIssuerDefinitionAuthorizationEnum = typeof CredentialIssuerDefinitionAuthorizationEnum[keyof typeof CredentialIssuerDefinitionAuthorizationEnum];
154
170
  /**
155
171
  * @type CredentialIssuerDefinitionIssuerConfiguration
156
172
  */
@@ -244,6 +260,15 @@ export interface CredentialPayload {
244
260
  */
245
261
  'validateSchema'?: boolean;
246
262
  }
263
+ /**
264
+ * Credential property that will be verified. `verifySchema` is only applicable in W3C VCDM credentials. With other types, this field will be ignored.
265
+ */
266
+ export declare const CredentialPropertyToVerify: {
267
+ readonly VerifyExpiration: "verifyExpiration";
268
+ readonly VerifyStatus: "verifyStatus";
269
+ readonly VerifySchema: "verifySchema";
270
+ };
271
+ export type CredentialPropertyToVerify = typeof CredentialPropertyToVerify[keyof typeof CredentialPropertyToVerify];
247
272
  export interface CredentialRequest {
248
273
  'types': string;
249
274
  'format': CredentialFormat;
@@ -292,6 +317,9 @@ export interface CredentialType {
292
317
  'type'?: Array<string>;
293
318
  'doctype'?: string;
294
319
  }
320
+ /**
321
+ * Verifier configuration. `keyIdentifier` is the same as wallet key identifier by default.
322
+ */
295
323
  export interface CredentialVerifierDefinition {
296
324
  /**
297
325
  * Human readable name of the definition
@@ -308,6 +336,11 @@ export interface CredentialVerifierDefinition {
308
336
  'scope'?: string;
309
337
  'presentationDefinition'?: PresentationDefinition;
310
338
  'dcqlQuery'?: DCQLQuery;
339
+ 'keyIdentifier'?: SigningKeyIdentifier;
340
+ /**
341
+ * List of credential properties that should be verified.
342
+ */
343
+ 'toVerify'?: Set<CredentialPropertyToVerify>;
311
344
  }
312
345
  /**
313
346
  * The wrapper contains Verifiable Credential in both, the Credential and as Base64 signed format alongside with metadata.
@@ -598,6 +631,10 @@ export interface InteractionAuthorizationConsent {
598
631
  }
599
632
  export interface InteractionAuthorizationRequirements {
600
633
  'requirementType': InteractionAuthorizationRequirementsRequirementTypeEnum;
634
+ /**
635
+ * URL where custom user authentication for issuance shall be performed. Present when `requirementType` is `custom`.
636
+ */
637
+ 'authnUrl'?: string;
601
638
  'presentationDefinition'?: PresentationDefinition;
602
639
  'dcqlQuery'?: DCQLQuery;
603
640
  /**
@@ -617,6 +654,7 @@ export declare const InteractionAuthorizationRequirementsRequirementTypeEnum: {
617
654
  readonly IdToken: "id_token";
618
655
  readonly VpToken: "vp_token";
619
656
  readonly Pin: "pin";
657
+ readonly Custom: "custom";
620
658
  };
621
659
  export type InteractionAuthorizationRequirementsRequirementTypeEnum = typeof InteractionAuthorizationRequirementsRequirementTypeEnum[keyof typeof InteractionAuthorizationRequirementsRequirementTypeEnum];
622
660
  export interface IssuanceRequirementsToVerify {
@@ -868,11 +906,15 @@ export interface VPDrivenIssuerConfig {
868
906
  /**
869
907
  * ID of the verifier used for verification of presented credential.
870
908
  */
871
- 'credentialVerifierId': string;
909
+ 'credentialVerifierId'?: string;
910
+ /**
911
+ * When true, authentication result returned from custom login provider configured for this issuer is used. In this case, credentialVerifierId must not be set.
912
+ */
913
+ 'useAuthnProviderResult'?: boolean;
872
914
  /**
873
915
  * Mapping of the input values set as JSONPath elements to the output credential claims.
874
916
  */
875
- 'mapping'?: object;
917
+ 'mapping': object;
876
918
  }
877
919
  /**
878
920
  * The offer to be accepted. The offer URL is mandatory.
package/api.js CHANGED
@@ -25,7 +25,7 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
25
25
  return (mod && mod.__esModule) ? mod : { "default": mod };
26
26
  };
27
27
  Object.defineProperty(exports, "__esModule", { value: true });
28
- exports.WmpEntityListEntityTypeEnum = exports.CredentialListInteractionEnum = exports.DefaultApi = exports.DefaultApiFactory = exports.DefaultApiFp = exports.DefaultApiAxiosParamCreator = exports.XadesSignatureType = exports.WmpRequestType = exports.WalletNotificationEventType = exports.WalletCapability = exports.TrustFrameworkType = exports.SystemImpactStatusEnum = exports.SigningKeyIdentifier = exports.RevokeAccreditationRequestTypeEnum = exports.PresentationDefinitionSubmissionRequirementsRuleEnum = exports.OidcRevisionOidc4vpEnum = exports.OidcRevisionOidc4vciEnum = exports.ObjectVerticalAlignment = exports.ObjectHorizontalAlignment = exports.ListSort = exports.InteractionAuthorizationRequirementsRequirementTypeEnum = exports.HealthStatusStatusEnum = exports.EntityAccreditationRequestTypeEnum = exports.DocumentSignatureValidityVerificationResultEnum = exports.DeferredStatusEnum = exports.CredentialNotificationEventTypeEnum = exports.CredentialMetadataStatusEnum = exports.CredentialMetadataInteractionEnum = exports.CredentialIssuerDefinitionCredentialIssuerEnum = exports.CredentialFormat = exports.AccreditationRequestTypeEnum = void 0;
28
+ exports.WmpEntityListEntityTypeEnum = exports.CredentialListInteractionEnum = exports.DefaultApi = exports.DefaultApiFactory = exports.DefaultApiFp = exports.DefaultApiAxiosParamCreator = exports.XadesSignatureType = exports.WmpRequestType = exports.WalletNotificationEventType = exports.WalletCapability = exports.TrustFrameworkType = exports.SystemImpactStatusEnum = exports.SigningKeyIdentifier = exports.RevokeAccreditationRequestTypeEnum = exports.PresentationDefinitionSubmissionRequirementsRuleEnum = exports.OidcRevisionOidc4vpEnum = exports.OidcRevisionOidc4vciEnum = exports.ObjectVerticalAlignment = exports.ObjectHorizontalAlignment = exports.ListSort = exports.InteractionAuthorizationRequirementsRequirementTypeEnum = exports.HealthStatusStatusEnum = exports.EntityAccreditationRequestTypeEnum = exports.DocumentSignatureValidityVerificationResultEnum = exports.DeferredStatusEnum = exports.CredentialPropertyToVerify = exports.CredentialNotificationEventTypeEnum = exports.CredentialMetadataStatusEnum = exports.CredentialMetadataInteractionEnum = exports.CredentialIssuerDefinitionAuthorizationEnum = exports.CredentialIssuerDefinitionCredentialIssuerEnum = exports.CredentialFormat = exports.AccreditationRequestTypeEnum = void 0;
29
29
  const axios_1 = __importDefault(require("axios"));
30
30
  // Some imports not used depending on template conditions
31
31
  // @ts-ignore
@@ -51,6 +51,13 @@ exports.CredentialIssuerDefinitionCredentialIssuerEnum = {
51
51
  VpDriven: 'VPDriven',
52
52
  CredentialRequirements: 'CredentialRequirements'
53
53
  };
54
+ exports.CredentialIssuerDefinitionAuthorizationEnum = {
55
+ None: 'none',
56
+ OauthNoAuth: 'oauthNoAuth',
57
+ OauthCustom: 'oauthCustom',
58
+ Openid: 'openid',
59
+ OpenidCustom: 'openidCustom'
60
+ };
54
61
  exports.CredentialMetadataInteractionEnum = {
55
62
  Issuance: 'issuance',
56
63
  Receive: 'receive',
@@ -68,6 +75,14 @@ exports.CredentialNotificationEventTypeEnum = {
68
75
  CredentialReceived: 'credential.received',
69
76
  CredentialRevoked: 'credential.revoked'
70
77
  };
78
+ /**
79
+ * Credential property that will be verified. `verifySchema` is only applicable in W3C VCDM credentials. With other types, this field will be ignored.
80
+ */
81
+ exports.CredentialPropertyToVerify = {
82
+ VerifyExpiration: 'verifyExpiration',
83
+ VerifyStatus: 'verifyStatus',
84
+ VerifySchema: 'verifySchema'
85
+ };
71
86
  exports.DeferredStatusEnum = {
72
87
  InProgress: 'in_progress',
73
88
  Completed: 'completed',
@@ -93,7 +108,8 @@ exports.InteractionAuthorizationRequirementsRequirementTypeEnum = {
93
108
  None: 'none',
94
109
  IdToken: 'id_token',
95
110
  VpToken: 'vp_token',
96
- Pin: 'pin'
111
+ Pin: 'pin',
112
+ Custom: 'custom'
97
113
  };
98
114
  /**
99
115
  * Sort flag controls the sort direction by the time created
@@ -1391,8 +1407,7 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1391
1407
  tfAccreditAs: (walletId_1, accreditationRequest_1, ...args_1) => __awaiter(this, [walletId_1, accreditationRequest_1, ...args_1], void 0, function* (walletId, accreditationRequest, options = {}) {
1392
1408
  // verify required parameter 'walletId' is not null or undefined
1393
1409
  (0, common_1.assertParamExists)('tfAccreditAs', 'walletId', walletId);
1394
- const localVarPath = `/tf/{wallet_id}/accredit`
1395
- .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
1410
+ const localVarPath = `/tf/accredit`;
1396
1411
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
1397
1412
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
1398
1413
  let baseOptions;
@@ -1407,6 +1422,9 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1407
1422
  yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1408
1423
  localVarHeaderParameter['Content-Type'] = 'application/json';
1409
1424
  localVarHeaderParameter['Accept'] = 'application/json';
1425
+ if (walletId != null) {
1426
+ localVarHeaderParameter['wallet_id'] = String(walletId);
1427
+ }
1410
1428
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1411
1429
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1412
1430
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
@@ -1426,8 +1444,7 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1426
1444
  tfAccreditRequest: (walletId_1, entityAccreditationRequest_1, ...args_1) => __awaiter(this, [walletId_1, entityAccreditationRequest_1, ...args_1], void 0, function* (walletId, entityAccreditationRequest, options = {}) {
1427
1445
  // verify required parameter 'walletId' is not null or undefined
1428
1446
  (0, common_1.assertParamExists)('tfAccreditRequest', 'walletId', walletId);
1429
- const localVarPath = `/tf/{wallet_id}/accreditation_request`
1430
- .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
1447
+ const localVarPath = `/tf/accreditation_request`;
1431
1448
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
1432
1449
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
1433
1450
  let baseOptions;
@@ -1442,6 +1459,9 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1442
1459
  yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1443
1460
  localVarHeaderParameter['Content-Type'] = 'application/json';
1444
1461
  localVarHeaderParameter['Accept'] = 'application/json';
1462
+ if (walletId != null) {
1463
+ localVarHeaderParameter['wallet_id'] = String(walletId);
1464
+ }
1445
1465
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1446
1466
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1447
1467
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
@@ -1461,8 +1481,7 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1461
1481
  tfOnboard: (walletId_1, onboardingRequest_1, ...args_1) => __awaiter(this, [walletId_1, onboardingRequest_1, ...args_1], void 0, function* (walletId, onboardingRequest, options = {}) {
1462
1482
  // verify required parameter 'walletId' is not null or undefined
1463
1483
  (0, common_1.assertParamExists)('tfOnboard', 'walletId', walletId);
1464
- const localVarPath = `/tf/{wallet_id}/onboard`
1465
- .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
1484
+ const localVarPath = `/tf/onboard`;
1466
1485
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
1467
1486
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
1468
1487
  let baseOptions;
@@ -1477,6 +1496,9 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1477
1496
  yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1478
1497
  localVarHeaderParameter['Content-Type'] = 'application/json';
1479
1498
  localVarHeaderParameter['Accept'] = 'application/json';
1499
+ if (walletId != null) {
1500
+ localVarHeaderParameter['wallet_id'] = String(walletId);
1501
+ }
1480
1502
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1481
1503
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1482
1504
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
@@ -1496,8 +1518,7 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1496
1518
  tfOnboardRequest: (walletId_1, entityOnboardingRequest_1, ...args_1) => __awaiter(this, [walletId_1, entityOnboardingRequest_1, ...args_1], void 0, function* (walletId, entityOnboardingRequest, options = {}) {
1497
1519
  // verify required parameter 'walletId' is not null or undefined
1498
1520
  (0, common_1.assertParamExists)('tfOnboardRequest', 'walletId', walletId);
1499
- const localVarPath = `/tf/{wallet_id}/onboard_request`
1500
- .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
1521
+ const localVarPath = `/tf/onboard_request`;
1501
1522
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
1502
1523
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
1503
1524
  let baseOptions;
@@ -1512,6 +1533,9 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1512
1533
  yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1513
1534
  localVarHeaderParameter['Content-Type'] = 'application/json';
1514
1535
  localVarHeaderParameter['Accept'] = 'application/json';
1536
+ if (walletId != null) {
1537
+ localVarHeaderParameter['wallet_id'] = String(walletId);
1538
+ }
1515
1539
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1516
1540
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1517
1541
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
@@ -1531,8 +1555,7 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1531
1555
  tfRevokeAccreditation: (walletId_1, revokeAccreditationRequest_1, ...args_1) => __awaiter(this, [walletId_1, revokeAccreditationRequest_1, ...args_1], void 0, function* (walletId, revokeAccreditationRequest, options = {}) {
1532
1556
  // verify required parameter 'walletId' is not null or undefined
1533
1557
  (0, common_1.assertParamExists)('tfRevokeAccreditation', 'walletId', walletId);
1534
- const localVarPath = `/tf/{wallet_id}/revoke-accredit`
1535
- .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
1558
+ const localVarPath = `/tf/revoke-accredit`;
1536
1559
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
1537
1560
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
1538
1561
  let baseOptions;
@@ -1547,6 +1570,9 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1547
1570
  yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1548
1571
  localVarHeaderParameter['Content-Type'] = 'application/json';
1549
1572
  localVarHeaderParameter['Accept'] = 'application/json';
1573
+ if (walletId != null) {
1574
+ localVarHeaderParameter['wallet_id'] = String(walletId);
1575
+ }
1550
1576
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1551
1577
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1552
1578
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
@@ -1566,8 +1592,7 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1566
1592
  tfX509CertificateIssue: (walletId_1, certificateIssueRequest_1, ...args_1) => __awaiter(this, [walletId_1, certificateIssueRequest_1, ...args_1], void 0, function* (walletId, certificateIssueRequest, options = {}) {
1567
1593
  // verify required parameter 'walletId' is not null or undefined
1568
1594
  (0, common_1.assertParamExists)('tfX509CertificateIssue', 'walletId', walletId);
1569
- const localVarPath = `/tf/{wallet_id}/x509`
1570
- .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
1595
+ const localVarPath = `/tf/x509`;
1571
1596
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
1572
1597
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
1573
1598
  let baseOptions;
@@ -1582,6 +1607,9 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1582
1607
  yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1583
1608
  localVarHeaderParameter['Content-Type'] = 'application/json';
1584
1609
  localVarHeaderParameter['Accept'] = 'application/json';
1610
+ if (walletId != null) {
1611
+ localVarHeaderParameter['wallet_id'] = String(walletId);
1612
+ }
1585
1613
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1586
1614
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1587
1615
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@triveria/wallet",
3
3
  "private": false,
4
- "version": "0.0.277",
4
+ "version": "0.0.278",
5
5
  "description": "",
6
6
  "main": "index.js",
7
7
  "scripts": {