@twin.org/node-core 0.0.2-next.12 → 0.0.2-next.13

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -153,9 +153,7 @@ async function bootstrap(engineCore, context, envVars) {
153
153
  await bootstrapBlobEncryption(engineCore, context, envVars);
154
154
  await addVerificationMethod(engineCore, context, "attestation", envVars.attestationVerificationMethodId);
155
155
  await addVerificationMethod(engineCore, context, "immutable proof", envVars.immutableProofVerificationMethodId);
156
- if (core.Coerce.boolean(envVars.rightsManagementEnabled) ?? false) {
157
- await addVerificationMethod(engineCore, context, "rights management", envVars.rightsManagementVerificationMethodId);
158
- }
156
+ await addVerificationMethod(engineCore, context, "node to node authentication", envVars.vcAuthenticationVerificationMethodId);
159
157
  await bootstrapSynchronisedStorage(engineCore, context, envVars);
160
158
  }
161
159
  /**
@@ -494,8 +492,6 @@ async function bootstrapAuth(engineCore, context, envVars, features) {
494
492
  */
495
493
  async function bootstrapSynchronisedStorage(engineCore, context, envVars, features) {
496
494
  if (core.Coerce.boolean(envVars.synchronisedStorageEnabled) ?? false) {
497
- // Add the verification method to the identity if it doesn't exist
498
- await addVerificationMethod(engineCore, context, "synchronised storage", envVars.synchronisedStorageVerificationMethodId);
499
495
  // If this is a trusted node we need to add the blob encryption key pair
500
496
  if (core.Is.stringValue(envVars.synchronisedStorageBlobStorageEncryptionKeyId) &&
501
497
  core.Is.stringBase64(envVars.synchronisedStorageBlobStorageKey)) {
@@ -574,8 +570,7 @@ function buildEngineConfiguration(envVars) {
574
570
  envVars.blobStorageEnableEncryption ??= "false";
575
571
  envVars.blobStorageEncryptionKeyId ??= "blob-encryption";
576
572
  envVars.synchronisedStorageBlobStorageEncryptionKeyId ??= "synchronised-storage-blob-encryption";
577
- envVars.synchronisedStorageVerificationMethodId ??= "synchronised-storage-assertion";
578
- envVars.rightsManagementVerificationMethodId ??= "rights-management-assertion";
573
+ envVars.vcAuthenticationVerificationMethodId ??= "node-authentication-assertion";
579
574
  const coreConfig = {
580
575
  debug: core.Coerce.boolean(envVars.debug) ?? false,
581
576
  types: {}
@@ -602,6 +597,7 @@ function buildEngineConfiguration(envVars) {
602
597
  configureAuditableItemGraph(coreConfig);
603
598
  configureAuditableItemStream(coreConfig);
604
599
  configureDocumentManagement(coreConfig);
600
+ configureNodeToNode(coreConfig, envVars);
605
601
  configureRightsManagement(coreConfig, envVars);
606
602
  configureSynchronisedStorage(coreConfig, envVars);
607
603
  configureFederatedCatalogue(coreConfig, envVars);
@@ -1358,6 +1354,24 @@ function configureDocumentManagement(coreConfig, envVars) {
1358
1354
  });
1359
1355
  }
1360
1356
  }
1357
+ /**
1358
+ * Configures the node to node.
1359
+ * @param coreConfig The core config.
1360
+ * @param envVars The environment variables.
1361
+ */
1362
+ function configureNodeToNode(coreConfig, envVars) {
1363
+ if (core.Is.arrayValue(coreConfig.types.identityComponent)) {
1364
+ // Can only perform VC authentication if identity component is available
1365
+ coreConfig.types.authenticationGeneratorComponent ??= [];
1366
+ coreConfig.types.authenticationGeneratorComponent.push({
1367
+ type: engineTypes.AuthenticationGeneratorComponentType.VerifiableCredential,
1368
+ options: {
1369
+ config: { verificationMethodId: envVars.vcAuthenticationVerificationMethodId ?? "" }
1370
+ },
1371
+ features: ["verifiable-credential"]
1372
+ });
1373
+ }
1374
+ }
1361
1375
  /**
1362
1376
  * Configures the rights management.
1363
1377
  * @param coreConfig The core config.
@@ -1421,7 +1435,6 @@ function configureRightsManagement(coreConfig, envVars) {
1421
1435
  : undefined,
1422
1436
  config: {
1423
1437
  baseCallbackUrl: envVars.rightsManagementBaseCallbackUrl ?? "",
1424
- rightsManagementMethodId: envVars.rightsManagementVerificationMethodId ?? "",
1425
1438
  offers: core.Is.arrayValue(envVars.rightsManagementOffers)
1426
1439
  ? envVars.rightsManagementOffers
1427
1440
  : [],
@@ -1442,7 +1455,6 @@ function configureRightsManagement(coreConfig, envVars) {
1442
1455
  type: engineTypes.RightsManagementDarpComponentType.Service,
1443
1456
  options: {
1444
1457
  config: {
1445
- rightsManagementMethodId: envVars.rightsManagementVerificationMethodId ?? "",
1446
1458
  dataAccessComponentCreator: async (url) => new rightsManagementRestClient.DataAccessPointClient({ endpoint: url })
1447
1459
  }
1448
1460
  }
@@ -1482,7 +1494,6 @@ function configureSynchronisedStorage(coreConfig, envVars) {
1482
1494
  options: {
1483
1495
  config: {
1484
1496
  verifiableStorageKeyId: verifiableStorageKeyId ?? "",
1485
- synchronisedStorageMethodId: envVars.synchronisedStorageVerificationMethodId,
1486
1497
  blobStorageEncryptionKeyId: envVars.synchronisedStorageBlobStorageEncryptionKeyId,
1487
1498
  entityUpdateIntervalMinutes: core.Coerce.number(envVars.synchronisedStorageEntityUpdateIntervalMinutes),
1488
1499
  consolidationIntervalMinutes: core.Coerce.number(envVars.synchronisedStorageConsolidationIntervalMinutes),
@@ -1715,6 +1726,14 @@ function buildEngineServerConfiguration(envVars, coreEngineConfig, serverInfo, o
1715
1726
  }
1716
1727
  });
1717
1728
  }
1729
+ if (core.Coerce.boolean(envVars.enableVerifiableCredentialRouteProcessors) ?? false) {
1730
+ serverConfig.types.restRouteProcessor.push({
1731
+ type: engineServerTypes.RestRouteProcessorType.AuthVerifiableCredential
1732
+ });
1733
+ serverConfig.types.socketRouteProcessor.push({
1734
+ type: engineServerTypes.SocketRouteProcessorType.AuthVerifiableCredential
1735
+ });
1736
+ }
1718
1737
  engineServer.addDefaultRestPaths(serverConfig);
1719
1738
  engineServer.addDefaultSocketPaths(serverConfig);
1720
1739
  return serverConfig;
@@ -1787,7 +1806,7 @@ async function run(nodeOptions) {
1787
1806
  nodeOptions ??= {};
1788
1807
  const serverInfo = {
1789
1808
  name: nodeOptions?.serverName ?? "TWIN Node Server",
1790
- version: nodeOptions?.serverVersion ?? "0.0.2-next.12" // x-release-please-version
1809
+ version: nodeOptions?.serverVersion ?? "0.0.2-next.13" // x-release-please-version
1791
1810
  };
1792
1811
  console.log(`\u001B[4m🌩️ ${serverInfo.name} v${serverInfo.version}\u001B[24m\n`);
1793
1812
  if (!core.Is.stringValue(nodeOptions?.executionDirectory)) {
@@ -1,8 +1,8 @@
1
1
  import { PasswordHelper } from '@twin.org/api-auth-entity-storage-service';
2
- import { I18n, Is, Coerce, Converter, RandomHelper, StringHelper, Urn, GeneralError, ErrorHelper, EnvHelper } from '@twin.org/core';
2
+ import { I18n, Is, Converter, RandomHelper, StringHelper, Coerce, Urn, GeneralError, ErrorHelper, EnvHelper } from '@twin.org/core';
3
3
  import { PasswordGenerator, Bip39 } from '@twin.org/crypto';
4
4
  import { AuthenticationComponentType, InformationComponentType, RestRouteProcessorType, SocketRouteProcessorType, AuthenticationAdminComponentType } from '@twin.org/engine-server-types';
5
- import { WalletConnectorType, IdentityConnectorType, EntityStorageConnectorType, BlobStorageConnectorType, BlobStorageComponentType, VaultConnectorType, DltConfigType, LoggingConnectorType, LoggingComponentType, BackgroundTaskConnectorType, TaskSchedulerComponentType, EventBusConnectorType, EventBusComponentType, TelemetryConnectorType, TelemetryComponentType, MessagingEmailConnectorType, MessagingSmsConnectorType, MessagingPushNotificationConnectorType, MessagingComponentType, FaucetConnectorType, NftConnectorType, NftComponentType, VerifiableStorageConnectorType, VerifiableStorageComponentType, ImmutableProofComponentType, AuditableItemGraphComponentType, AuditableItemStreamComponentType, IdentityComponentType, IdentityResolverConnectorType, IdentityResolverComponentType, IdentityProfileConnectorType, IdentityProfileComponentType, AttestationConnectorType, AttestationComponentType, DataConverterConnectorType, DataExtractorConnectorType, DataProcessingComponentType, DocumentManagementComponentType, RightsManagementPapComponentType, RightsManagementPmpComponentType, RightsManagementPipComponentType, RightsManagementPxpComponentType, RightsManagementPdpComponentType, RightsManagementPepComponentType, RightsManagementPnpComponentType, RightsManagementPnapComponentType, RightsManagementDapComponentType, RightsManagementDarpComponentType, SynchronisedStorageComponentType, FederatedCatalogueComponentType, DataSpaceConnectorComponentType } from '@twin.org/engine-types';
5
+ import { WalletConnectorType, IdentityConnectorType, EntityStorageConnectorType, BlobStorageConnectorType, BlobStorageComponentType, VaultConnectorType, DltConfigType, LoggingConnectorType, LoggingComponentType, BackgroundTaskConnectorType, TaskSchedulerComponentType, EventBusConnectorType, EventBusComponentType, TelemetryConnectorType, TelemetryComponentType, MessagingEmailConnectorType, MessagingSmsConnectorType, MessagingPushNotificationConnectorType, MessagingComponentType, FaucetConnectorType, NftConnectorType, NftComponentType, VerifiableStorageConnectorType, VerifiableStorageComponentType, ImmutableProofComponentType, AuditableItemGraphComponentType, AuditableItemStreamComponentType, IdentityComponentType, IdentityResolverConnectorType, IdentityResolverComponentType, IdentityProfileConnectorType, IdentityProfileComponentType, AttestationConnectorType, AttestationComponentType, DataConverterConnectorType, DataExtractorConnectorType, DataProcessingComponentType, DocumentManagementComponentType, AuthenticationGeneratorComponentType, RightsManagementPapComponentType, RightsManagementPmpComponentType, RightsManagementPipComponentType, RightsManagementPxpComponentType, RightsManagementPdpComponentType, RightsManagementPepComponentType, RightsManagementPnpComponentType, RightsManagementPnapComponentType, RightsManagementDapComponentType, RightsManagementDarpComponentType, SynchronisedStorageComponentType, FederatedCatalogueComponentType, DataSpaceConnectorComponentType } from '@twin.org/engine-types';
6
6
  import { EntityStorageConnectorFactory } from '@twin.org/entity-storage-models';
7
7
  import { IdentityProfileConnectorFactory, IdentityConnectorFactory, IdentityResolverConnectorFactory, DocumentHelper } from '@twin.org/identity-models';
8
8
  import { VaultConnectorFactory, VaultKeyType } from '@twin.org/vault-models';
@@ -132,9 +132,7 @@ async function bootstrap(engineCore, context, envVars) {
132
132
  await bootstrapBlobEncryption(engineCore, context, envVars);
133
133
  await addVerificationMethod(engineCore, context, "attestation", envVars.attestationVerificationMethodId);
134
134
  await addVerificationMethod(engineCore, context, "immutable proof", envVars.immutableProofVerificationMethodId);
135
- if (Coerce.boolean(envVars.rightsManagementEnabled) ?? false) {
136
- await addVerificationMethod(engineCore, context, "rights management", envVars.rightsManagementVerificationMethodId);
137
- }
135
+ await addVerificationMethod(engineCore, context, "node to node authentication", envVars.vcAuthenticationVerificationMethodId);
138
136
  await bootstrapSynchronisedStorage(engineCore, context, envVars);
139
137
  }
140
138
  /**
@@ -473,8 +471,6 @@ async function bootstrapAuth(engineCore, context, envVars, features) {
473
471
  */
474
472
  async function bootstrapSynchronisedStorage(engineCore, context, envVars, features) {
475
473
  if (Coerce.boolean(envVars.synchronisedStorageEnabled) ?? false) {
476
- // Add the verification method to the identity if it doesn't exist
477
- await addVerificationMethod(engineCore, context, "synchronised storage", envVars.synchronisedStorageVerificationMethodId);
478
474
  // If this is a trusted node we need to add the blob encryption key pair
479
475
  if (Is.stringValue(envVars.synchronisedStorageBlobStorageEncryptionKeyId) &&
480
476
  Is.stringBase64(envVars.synchronisedStorageBlobStorageKey)) {
@@ -553,8 +549,7 @@ function buildEngineConfiguration(envVars) {
553
549
  envVars.blobStorageEnableEncryption ??= "false";
554
550
  envVars.blobStorageEncryptionKeyId ??= "blob-encryption";
555
551
  envVars.synchronisedStorageBlobStorageEncryptionKeyId ??= "synchronised-storage-blob-encryption";
556
- envVars.synchronisedStorageVerificationMethodId ??= "synchronised-storage-assertion";
557
- envVars.rightsManagementVerificationMethodId ??= "rights-management-assertion";
552
+ envVars.vcAuthenticationVerificationMethodId ??= "node-authentication-assertion";
558
553
  const coreConfig = {
559
554
  debug: Coerce.boolean(envVars.debug) ?? false,
560
555
  types: {}
@@ -581,6 +576,7 @@ function buildEngineConfiguration(envVars) {
581
576
  configureAuditableItemGraph(coreConfig);
582
577
  configureAuditableItemStream(coreConfig);
583
578
  configureDocumentManagement(coreConfig);
579
+ configureNodeToNode(coreConfig, envVars);
584
580
  configureRightsManagement(coreConfig, envVars);
585
581
  configureSynchronisedStorage(coreConfig, envVars);
586
582
  configureFederatedCatalogue(coreConfig, envVars);
@@ -1337,6 +1333,24 @@ function configureDocumentManagement(coreConfig, envVars) {
1337
1333
  });
1338
1334
  }
1339
1335
  }
1336
+ /**
1337
+ * Configures the node to node.
1338
+ * @param coreConfig The core config.
1339
+ * @param envVars The environment variables.
1340
+ */
1341
+ function configureNodeToNode(coreConfig, envVars) {
1342
+ if (Is.arrayValue(coreConfig.types.identityComponent)) {
1343
+ // Can only perform VC authentication if identity component is available
1344
+ coreConfig.types.authenticationGeneratorComponent ??= [];
1345
+ coreConfig.types.authenticationGeneratorComponent.push({
1346
+ type: AuthenticationGeneratorComponentType.VerifiableCredential,
1347
+ options: {
1348
+ config: { verificationMethodId: envVars.vcAuthenticationVerificationMethodId ?? "" }
1349
+ },
1350
+ features: ["verifiable-credential"]
1351
+ });
1352
+ }
1353
+ }
1340
1354
  /**
1341
1355
  * Configures the rights management.
1342
1356
  * @param coreConfig The core config.
@@ -1400,7 +1414,6 @@ function configureRightsManagement(coreConfig, envVars) {
1400
1414
  : undefined,
1401
1415
  config: {
1402
1416
  baseCallbackUrl: envVars.rightsManagementBaseCallbackUrl ?? "",
1403
- rightsManagementMethodId: envVars.rightsManagementVerificationMethodId ?? "",
1404
1417
  offers: Is.arrayValue(envVars.rightsManagementOffers)
1405
1418
  ? envVars.rightsManagementOffers
1406
1419
  : [],
@@ -1421,7 +1434,6 @@ function configureRightsManagement(coreConfig, envVars) {
1421
1434
  type: RightsManagementDarpComponentType.Service,
1422
1435
  options: {
1423
1436
  config: {
1424
- rightsManagementMethodId: envVars.rightsManagementVerificationMethodId ?? "",
1425
1437
  dataAccessComponentCreator: async (url) => new DataAccessPointClient({ endpoint: url })
1426
1438
  }
1427
1439
  }
@@ -1461,7 +1473,6 @@ function configureSynchronisedStorage(coreConfig, envVars) {
1461
1473
  options: {
1462
1474
  config: {
1463
1475
  verifiableStorageKeyId: verifiableStorageKeyId ?? "",
1464
- synchronisedStorageMethodId: envVars.synchronisedStorageVerificationMethodId,
1465
1476
  blobStorageEncryptionKeyId: envVars.synchronisedStorageBlobStorageEncryptionKeyId,
1466
1477
  entityUpdateIntervalMinutes: Coerce.number(envVars.synchronisedStorageEntityUpdateIntervalMinutes),
1467
1478
  consolidationIntervalMinutes: Coerce.number(envVars.synchronisedStorageConsolidationIntervalMinutes),
@@ -1694,6 +1705,14 @@ function buildEngineServerConfiguration(envVars, coreEngineConfig, serverInfo, o
1694
1705
  }
1695
1706
  });
1696
1707
  }
1708
+ if (Coerce.boolean(envVars.enableVerifiableCredentialRouteProcessors) ?? false) {
1709
+ serverConfig.types.restRouteProcessor.push({
1710
+ type: RestRouteProcessorType.AuthVerifiableCredential
1711
+ });
1712
+ serverConfig.types.socketRouteProcessor.push({
1713
+ type: SocketRouteProcessorType.AuthVerifiableCredential
1714
+ });
1715
+ }
1697
1716
  addDefaultRestPaths(serverConfig);
1698
1717
  addDefaultSocketPaths(serverConfig);
1699
1718
  return serverConfig;
@@ -1766,7 +1785,7 @@ async function run(nodeOptions) {
1766
1785
  nodeOptions ??= {};
1767
1786
  const serverInfo = {
1768
1787
  name: nodeOptions?.serverName ?? "TWIN Node Server",
1769
- version: nodeOptions?.serverVersion ?? "0.0.2-next.12" // x-release-please-version
1788
+ version: nodeOptions?.serverVersion ?? "0.0.2-next.13" // x-release-please-version
1770
1789
  };
1771
1790
  console.log(`\u001B[4m🌩️ ${serverInfo.name} v${serverInfo.version}\u001B[24m\n`);
1772
1791
  if (!Is.stringValue(nodeOptions?.executionDirectory)) {
@@ -390,11 +390,6 @@ export interface IEngineEnvironmentVariables {
390
390
  * This only required if using a custom verifiable storage item, otherwise it will default the the network name.
391
391
  */
392
392
  synchronisedStorageVerifiableStorageKeyId?: string;
393
- /**
394
- * The identity verification method id to use with synchronised storage for signing/verifying changesets.
395
- * Defaults to synchronised-storage-assertion.
396
- */
397
- synchronisedStorageVerificationMethodId?: string;
398
393
  /**
399
394
  * The key from the vault which is used to encrypt the synchronised storage blobs.
400
395
  * Only required for trusted nodes, as regular nodes will request from the trusted nodes.
@@ -446,11 +441,6 @@ export interface IEngineEnvironmentVariables {
446
441
  * What is the base callback url for rights management negotiations e.g. https://my-node/rights-management.
447
442
  */
448
443
  rightsManagementBaseCallbackUrl?: string;
449
- /**
450
- * The rights management verification method id to use when signing/verifying negotiation requests.
451
- * Defaults to rights-management-assertion.
452
- */
453
- rightsManagementVerificationMethodId?: string;
454
444
  /**
455
445
  * The rights management configuration which includes the information sources modules to load.
456
446
  * Use the @json: prefix to specify the path to the JSON configuration file.
@@ -499,4 +489,9 @@ export interface IEngineEnvironmentVariables {
499
489
  * Use the @json: prefix to specify the path to the JSON configuration file.
500
490
  */
501
491
  dataSpaceConnectorApps?: string;
492
+ /**
493
+ * Verifiable credential assertion for node to node communication.
494
+ * Defaults to node-authentication-assertion.
495
+ */
496
+ vcAuthenticationVerificationMethodId?: string;
502
497
  }
@@ -42,6 +42,10 @@ export interface IEngineServerEnvironmentVariables {
42
42
  * Additional MIME type processors to include, comma separated.
43
43
  */
44
44
  mimeTypeProcessors?: string;
45
+ /**
46
+ * Enable to the route processor for verifiable credentials.
47
+ */
48
+ enableVerifiableCredentialRouteProcessors?: string;
45
49
  /**
46
50
  * Disable Node Identity route processors.
47
51
  */
package/docs/changelog.md CHANGED
@@ -1,5 +1,12 @@
1
1
  # @twin.org/node-core - Changelog
2
2
 
3
+ ## [0.0.2-next.13](https://github.com/twinfoundation/node/compare/node-core-v0.0.2-next.12...node-core-v0.0.2-next.13) (2025-09-24)
4
+
5
+
6
+ ### Features
7
+
8
+ * update to latest engine ([00d4974](https://github.com/twinfoundation/node/commit/00d4974f9cfb02bf48505cfb4af4a7aba1df4b3d))
9
+
3
10
  ## [0.0.2-next.12](https://github.com/twinfoundation/node/compare/node-core-v0.0.2-next.11...node-core-v0.0.2-next.12) (2025-09-19)
4
11
 
5
12
 
@@ -780,15 +780,6 @@ This only required if using a custom verifiable storage item, otherwise it will
780
780
 
781
781
  ***
782
782
 
783
- ### synchronisedStorageVerificationMethodId?
784
-
785
- > `optional` **synchronisedStorageVerificationMethodId**: `string`
786
-
787
- The identity verification method id to use with synchronised storage for signing/verifying changesets.
788
- Defaults to synchronised-storage-assertion.
789
-
790
- ***
791
-
792
783
  ### synchronisedStorageBlobStorageEncryptionKeyId?
793
784
 
794
785
  > `optional` **synchronisedStorageBlobStorageEncryptionKeyId**: `string`
@@ -904,15 +895,6 @@ What is the base callback url for rights management negotiations e.g. https://my
904
895
 
905
896
  ***
906
897
 
907
- ### rightsManagementVerificationMethodId?
908
-
909
- > `optional` **rightsManagementVerificationMethodId**: `string`
910
-
911
- The rights management verification method id to use when signing/verifying negotiation requests.
912
- Defaults to rights-management-assertion.
913
-
914
- ***
915
-
916
898
  ### rightsManagementInformationSources?
917
899
 
918
900
  > `optional` **rightsManagementInformationSources**: `string`
@@ -998,3 +980,12 @@ Is the data space connector enabled, defaults to false.
998
980
 
999
981
  The application configuration for the data space connector.
1000
982
  Use the @json: prefix to specify the path to the JSON configuration file.
983
+
984
+ ***
985
+
986
+ ### vcAuthenticationVerificationMethodId?
987
+
988
+ > `optional` **vcAuthenticationVerificationMethodId**: `string`
989
+
990
+ Verifiable credential assertion for node to node communication.
991
+ Defaults to node-authentication-assertion.
@@ -88,6 +88,14 @@ Additional MIME type processors to include, comma separated.
88
88
 
89
89
  ***
90
90
 
91
+ ### enableVerifiableCredentialRouteProcessors?
92
+
93
+ > `optional` **enableVerifiableCredentialRouteProcessors**: `string`
94
+
95
+ Enable to the route processor for verifiable credentials.
96
+
97
+ ***
98
+
91
99
  ### disableNodeIdentity?
92
100
 
93
101
  > `optional` **disableNodeIdentity**: `string`
@@ -1164,19 +1164,6 @@ This only required if using a custom verifiable storage item, otherwise it will
1164
1164
 
1165
1165
  ***
1166
1166
 
1167
- ### synchronisedStorageVerificationMethodId?
1168
-
1169
- > `optional` **synchronisedStorageVerificationMethodId**: `string`
1170
-
1171
- The identity verification method id to use with synchronised storage for signing/verifying changesets.
1172
- Defaults to synchronised-storage-assertion.
1173
-
1174
- #### Inherited from
1175
-
1176
- [`IEngineEnvironmentVariables`](IEngineEnvironmentVariables.md).[`synchronisedStorageVerificationMethodId`](IEngineEnvironmentVariables.md#synchronisedstorageverificationmethodid)
1177
-
1178
- ***
1179
-
1180
1167
  ### synchronisedStorageBlobStorageEncryptionKeyId?
1181
1168
 
1182
1169
  > `optional` **synchronisedStorageBlobStorageEncryptionKeyId**: `string`
@@ -1336,19 +1323,6 @@ What is the base callback url for rights management negotiations e.g. https://my
1336
1323
 
1337
1324
  ***
1338
1325
 
1339
- ### rightsManagementVerificationMethodId?
1340
-
1341
- > `optional` **rightsManagementVerificationMethodId**: `string`
1342
-
1343
- The rights management verification method id to use when signing/verifying negotiation requests.
1344
- Defaults to rights-management-assertion.
1345
-
1346
- #### Inherited from
1347
-
1348
- [`IEngineEnvironmentVariables`](IEngineEnvironmentVariables.md).[`rightsManagementVerificationMethodId`](IEngineEnvironmentVariables.md#rightsmanagementverificationmethodid)
1349
-
1350
- ***
1351
-
1352
1326
  ### rightsManagementInformationSources?
1353
1327
 
1354
1328
  > `optional` **rightsManagementInformationSources**: `string`
@@ -1477,6 +1451,19 @@ Use the @json: prefix to specify the path to the JSON configuration file.
1477
1451
 
1478
1452
  ***
1479
1453
 
1454
+ ### vcAuthenticationVerificationMethodId?
1455
+
1456
+ > `optional` **vcAuthenticationVerificationMethodId**: `string`
1457
+
1458
+ Verifiable credential assertion for node to node communication.
1459
+ Defaults to node-authentication-assertion.
1460
+
1461
+ #### Inherited from
1462
+
1463
+ [`IEngineEnvironmentVariables`](IEngineEnvironmentVariables.md).[`vcAuthenticationVerificationMethodId`](IEngineEnvironmentVariables.md#vcauthenticationverificationmethodid)
1464
+
1465
+ ***
1466
+
1480
1467
  ### port?
1481
1468
 
1482
1469
  > `optional` **port**: `string`
@@ -1597,6 +1584,18 @@ Additional MIME type processors to include, comma separated.
1597
1584
 
1598
1585
  ***
1599
1586
 
1587
+ ### enableVerifiableCredentialRouteProcessors?
1588
+
1589
+ > `optional` **enableVerifiableCredentialRouteProcessors**: `string`
1590
+
1591
+ Enable to the route processor for verifiable credentials.
1592
+
1593
+ #### Inherited from
1594
+
1595
+ [`IEngineServerEnvironmentVariables`](IEngineServerEnvironmentVariables.md).[`enableVerifiableCredentialRouteProcessors`](IEngineServerEnvironmentVariables.md#enableverifiablecredentialrouteprocessors)
1596
+
1597
+ ***
1598
+
1600
1599
  ### disableNodeIdentity?
1601
1600
 
1602
1601
  > `optional` **disableNodeIdentity**: `string`
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@twin.org/node-core",
3
- "version": "0.0.2-next.12",
3
+ "version": "0.0.2-next.13",
4
4
  "description": "TWIN Node Core for serving APIs using the specified configuration",
5
5
  "repository": {
6
6
  "type": "git",