dcql 0.2.22 → 0.3.0-alpha-20250527162348
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.d.mts +2018 -64
- package/dist/index.d.ts +2018 -64
- package/dist/index.js +356 -216
- package/dist/index.js.map +1 -1
- package/dist/index.mjs +354 -216
- package/dist/index.mjs.map +1 -1
- package/package.json +3 -6
package/dist/index.d.mts
CHANGED
@@ -95,11 +95,31 @@ declare namespace DcqlMdocPresentation {
|
|
95
95
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
96
96
|
readonly doctype: v.StringSchema<undefined>;
|
97
97
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
98
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
99
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
100
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
101
|
+
}, undefined>, v.ObjectSchema<{
|
102
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
103
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
104
|
+
}, undefined>, v.ObjectSchema<{
|
105
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
106
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
107
|
+
}, undefined>], undefined>, undefined>;
|
98
108
|
}, undefined>;
|
99
109
|
const model: Model<v.ObjectSchema<{
|
100
110
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
101
111
|
readonly doctype: v.StringSchema<undefined>;
|
102
112
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
113
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
114
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
115
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
116
|
+
}, undefined>, v.ObjectSchema<{
|
117
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
118
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
119
|
+
}, undefined>, v.ObjectSchema<{
|
120
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
121
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
122
|
+
}, undefined>], undefined>, undefined>;
|
103
123
|
}, undefined>>;
|
104
124
|
type Model = InferModelTypes<typeof model>;
|
105
125
|
}
|
@@ -109,23 +129,65 @@ declare namespace DcqlSdJwtVcPresentation {
|
|
109
129
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
110
130
|
readonly vct: v.StringSchema<undefined>;
|
111
131
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
132
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
133
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
134
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
135
|
+
}, undefined>, v.ObjectSchema<{
|
136
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
137
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
138
|
+
}, undefined>, v.ObjectSchema<{
|
139
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
140
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
141
|
+
}, undefined>], undefined>, undefined>;
|
112
142
|
}, undefined>;
|
113
143
|
const model: Model<v.ObjectSchema<{
|
114
144
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
115
145
|
readonly vct: v.StringSchema<undefined>;
|
116
146
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
147
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
148
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
149
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
150
|
+
}, undefined>, v.ObjectSchema<{
|
151
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
152
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
153
|
+
}, undefined>, v.ObjectSchema<{
|
154
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
155
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
156
|
+
}, undefined>], undefined>, undefined>;
|
117
157
|
}, undefined>>;
|
118
158
|
type Model = InferModelTypes<typeof model>;
|
119
159
|
}
|
120
160
|
type DcqlSdJwtVcPresentation = DcqlSdJwtVcPresentation.Model['Output'];
|
121
161
|
declare namespace DcqlW3cVcPresentation {
|
122
162
|
const vModel: v.ObjectSchema<{
|
123
|
-
readonly credential_format: v.PicklistSchema<["
|
163
|
+
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
124
164
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
165
|
+
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
166
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
167
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
168
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
169
|
+
}, undefined>, v.ObjectSchema<{
|
170
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
171
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
172
|
+
}, undefined>, v.ObjectSchema<{
|
173
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
174
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
175
|
+
}, undefined>], undefined>, undefined>;
|
125
176
|
}, undefined>;
|
126
177
|
const model: Model<v.ObjectSchema<{
|
127
|
-
readonly credential_format: v.PicklistSchema<["
|
178
|
+
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
128
179
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
180
|
+
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
181
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
182
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
183
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
184
|
+
}, undefined>, v.ObjectSchema<{
|
185
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
186
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
187
|
+
}, undefined>, v.ObjectSchema<{
|
188
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
189
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
190
|
+
}, undefined>], undefined>, undefined>;
|
129
191
|
}, undefined>>;
|
130
192
|
type Model = InferModelTypes<typeof model>;
|
131
193
|
}
|
@@ -135,13 +197,44 @@ declare namespace DcqlCredentialPresentation {
|
|
135
197
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
136
198
|
readonly doctype: v.StringSchema<undefined>;
|
137
199
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
200
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
201
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
202
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
203
|
+
}, undefined>, v.ObjectSchema<{
|
204
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
205
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
206
|
+
}, undefined>, v.ObjectSchema<{
|
207
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
208
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
209
|
+
}, undefined>], undefined>, undefined>;
|
138
210
|
}, undefined>, v.ObjectSchema<{
|
139
211
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
140
212
|
readonly vct: v.StringSchema<undefined>;
|
141
213
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
214
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
215
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
216
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
217
|
+
}, undefined>, v.ObjectSchema<{
|
218
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
219
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
220
|
+
}, undefined>, v.ObjectSchema<{
|
221
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
222
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
223
|
+
}, undefined>], undefined>, undefined>;
|
142
224
|
}, undefined>, v.ObjectSchema<{
|
143
|
-
readonly credential_format: v.PicklistSchema<["
|
225
|
+
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
144
226
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
227
|
+
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
228
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
229
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
230
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
231
|
+
}, undefined>, v.ObjectSchema<{
|
232
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
233
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
234
|
+
}, undefined>, v.ObjectSchema<{
|
235
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
236
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
237
|
+
}, undefined>], undefined>, undefined>;
|
145
238
|
}, undefined>], undefined>>;
|
146
239
|
type Model = InferModelTypes<typeof model>;
|
147
240
|
}
|
@@ -158,13 +251,44 @@ declare namespace DcqlQueryResult {
|
|
158
251
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
159
252
|
readonly doctype: v.StringSchema<undefined>;
|
160
253
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
254
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
255
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
256
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
257
|
+
}, undefined>, v.ObjectSchema<{
|
258
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
259
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
260
|
+
}, undefined>, v.ObjectSchema<{
|
261
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
262
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
263
|
+
}, undefined>], undefined>, undefined>;
|
161
264
|
}, undefined>, v.ObjectSchema<{
|
162
265
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
163
266
|
readonly vct: v.StringSchema<undefined>;
|
164
267
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
268
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
269
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
270
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
271
|
+
}, undefined>, v.ObjectSchema<{
|
272
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
273
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
274
|
+
}, undefined>, v.ObjectSchema<{
|
275
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
276
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
277
|
+
}, undefined>], undefined>, undefined>;
|
165
278
|
}, undefined>, v.ObjectSchema<{
|
166
|
-
readonly credential_format: v.PicklistSchema<["
|
279
|
+
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
167
280
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
281
|
+
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
282
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
283
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
284
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
285
|
+
}, undefined>, v.ObjectSchema<{
|
286
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
287
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
288
|
+
}, undefined>, v.ObjectSchema<{
|
289
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
290
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
291
|
+
}, undefined>], undefined>, undefined>;
|
168
292
|
}, undefined>], undefined>;
|
169
293
|
}, undefined>, v.ObjectSchema<{
|
170
294
|
readonly success: v.LiteralSchema<false, undefined>;
|
@@ -182,17 +306,48 @@ declare namespace DcqlQueryResult {
|
|
182
306
|
[x: string]: unknown;
|
183
307
|
};
|
184
308
|
};
|
309
|
+
authority?: {
|
310
|
+
type: "aki";
|
311
|
+
value: string;
|
312
|
+
} | {
|
313
|
+
type: "etsi_tl";
|
314
|
+
value: string;
|
315
|
+
} | {
|
316
|
+
type: "openid_federation";
|
317
|
+
value: string;
|
318
|
+
} | undefined;
|
185
319
|
} | {
|
186
320
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
187
321
|
vct: string;
|
188
322
|
claims: {
|
189
323
|
[x: string]: Json;
|
190
324
|
};
|
325
|
+
authority?: {
|
326
|
+
type: "aki";
|
327
|
+
value: string;
|
328
|
+
} | {
|
329
|
+
type: "etsi_tl";
|
330
|
+
value: string;
|
331
|
+
} | {
|
332
|
+
type: "openid_federation";
|
333
|
+
value: string;
|
334
|
+
} | undefined;
|
191
335
|
} | {
|
192
|
-
|
336
|
+
type: string[];
|
337
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
193
338
|
claims: {
|
194
339
|
[x: string]: Json;
|
195
340
|
};
|
341
|
+
authority?: {
|
342
|
+
type: "aki";
|
343
|
+
value: string;
|
344
|
+
} | {
|
345
|
+
type: "etsi_tl";
|
346
|
+
value: string;
|
347
|
+
} | {
|
348
|
+
type: "openid_federation";
|
349
|
+
value: string;
|
350
|
+
} | undefined;
|
196
351
|
};
|
197
352
|
success: true;
|
198
353
|
typed: true;
|
@@ -215,17 +370,48 @@ declare namespace DcqlQueryResult {
|
|
215
370
|
[x: string]: unknown;
|
216
371
|
};
|
217
372
|
};
|
373
|
+
authority?: {
|
374
|
+
type: "aki";
|
375
|
+
value: string;
|
376
|
+
} | {
|
377
|
+
type: "etsi_tl";
|
378
|
+
value: string;
|
379
|
+
} | {
|
380
|
+
type: "openid_federation";
|
381
|
+
value: string;
|
382
|
+
} | undefined;
|
218
383
|
} | {
|
219
384
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
220
385
|
vct: string;
|
221
386
|
claims: {
|
222
387
|
[x: string]: Json;
|
223
388
|
};
|
389
|
+
authority?: {
|
390
|
+
type: "aki";
|
391
|
+
value: string;
|
392
|
+
} | {
|
393
|
+
type: "etsi_tl";
|
394
|
+
value: string;
|
395
|
+
} | {
|
396
|
+
type: "openid_federation";
|
397
|
+
value: string;
|
398
|
+
} | undefined;
|
224
399
|
} | {
|
225
|
-
|
400
|
+
type: string[];
|
401
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
226
402
|
claims: {
|
227
403
|
[x: string]: Json;
|
228
404
|
};
|
405
|
+
authority?: {
|
406
|
+
type: "aki";
|
407
|
+
value: string;
|
408
|
+
} | {
|
409
|
+
type: "etsi_tl";
|
410
|
+
value: string;
|
411
|
+
} | {
|
412
|
+
type: "openid_federation";
|
413
|
+
value: string;
|
414
|
+
} | undefined;
|
229
415
|
};
|
230
416
|
success: true;
|
231
417
|
typed: true;
|
@@ -302,6 +488,22 @@ declare namespace DcqlQueryResult {
|
|
302
488
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
303
489
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
304
490
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
491
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
492
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
493
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
494
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
495
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
496
|
+
values: [string, ...string[]];
|
497
|
+
}, ...{
|
498
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
499
|
+
values: [string, ...string[]];
|
500
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
501
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
502
|
+
values: [string, ...string[]];
|
503
|
+
}, ...{
|
504
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
505
|
+
values: [string, ...string[]];
|
506
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
305
507
|
}, undefined>, v.ObjectSchema<{
|
306
508
|
readonly format: v.SchemaWithPipe<[v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>, v.DescriptionAction<"vc+sd-jwt" | "dc+sd-jwt", "REQUIRED. A string that specifies the format of the requested Verifiable Credential.">]>;
|
307
509
|
readonly claims: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
@@ -334,8 +536,24 @@ declare namespace DcqlQueryResult {
|
|
334
536
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
335
537
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
336
538
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
539
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
540
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
541
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
542
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
543
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
544
|
+
values: [string, ...string[]];
|
545
|
+
}, ...{
|
546
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
547
|
+
values: [string, ...string[]];
|
548
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
549
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
550
|
+
values: [string, ...string[]];
|
551
|
+
}, ...{
|
552
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
553
|
+
values: [string, ...string[]];
|
554
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
337
555
|
}, undefined>, v.ObjectSchema<{
|
338
|
-
readonly format: v.PicklistSchema<["jwt_vc_json", "
|
556
|
+
readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
|
339
557
|
readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
340
558
|
readonly id: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.DescriptionAction<string | undefined, "A string identifying the particular claim. The value MUST be a non-empty string consisting of alphanumeric, underscore (_) or hyphen (-) characters. Within the particular claims array, the same id MUST NOT be present more than once.">]>;
|
341
559
|
readonly path: v.SchemaWithPipe<[v.ArraySchema<v.UnionSchema<[v.StringSchema<undefined>, v.SchemaWithPipe<[v.NumberSchema<undefined>, v.IntegerAction<number, undefined>, v.MinValueAction<number, 0, undefined>]>, v.NullSchema<undefined>], undefined>, undefined>, v.CustomSchema<[string | number | null, ...(string | number | null)[]], undefined>, v.DescriptionAction<[string | number | null, ...(string | number | null)[]], "A non-empty array representing a claims path pointer that specifies the path to a claim within the Verifiable Credential.">]>;
|
@@ -349,8 +567,29 @@ declare namespace DcqlQueryResult {
|
|
349
567
|
values?: (string | number | boolean)[] | undefined;
|
350
568
|
id?: string | undefined;
|
351
569
|
}[]], undefined>]>, undefined>;
|
570
|
+
readonly meta: v.SchemaWithPipe<[v.SchemaWithPipe<[v.ObjectSchema<{
|
571
|
+
readonly type_values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.StringSchema<undefined>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]], "REQUIRED. An array of string arrays that specifies the fully expanded types (IRIs) after the @context was applied that the Verifier accepts to be presented in the Presentation. Each of the top-level arrays specifies one alternative to match the type values of the Verifiable Credential against. Each inner array specifies a set of fully expanded types that MUST be present in the type property of the Verifiable Credential, regardless of order or the presence of additional types.">]>;
|
572
|
+
}, undefined>]>, v.DescriptionAction<{
|
573
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
574
|
+
}, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
352
575
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
353
576
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
577
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
578
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
579
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
580
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
581
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
582
|
+
values: [string, ...string[]];
|
583
|
+
}, ...{
|
584
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
585
|
+
values: [string, ...string[]];
|
586
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
587
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
588
|
+
values: [string, ...string[]];
|
589
|
+
}, ...{
|
590
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
591
|
+
values: [string, ...string[]];
|
592
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
354
593
|
}, undefined>], undefined>, undefined>, v.CustomSchema<[{
|
355
594
|
id: string;
|
356
595
|
format: "mso_mdoc";
|
@@ -376,6 +615,13 @@ declare namespace DcqlQueryResult {
|
|
376
615
|
intent_to_retain?: boolean | undefined;
|
377
616
|
})[]] | undefined;
|
378
617
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
618
|
+
trusted_authorities?: [{
|
619
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
620
|
+
values: [string, ...string[]];
|
621
|
+
}, ...{
|
622
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
623
|
+
values: [string, ...string[]];
|
624
|
+
}[]] | undefined;
|
379
625
|
meta?: {
|
380
626
|
doctype_value?: string | undefined;
|
381
627
|
} | undefined;
|
@@ -392,12 +638,22 @@ declare namespace DcqlQueryResult {
|
|
392
638
|
id?: string | undefined;
|
393
639
|
}[]] | undefined;
|
394
640
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
641
|
+
trusted_authorities?: [{
|
642
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
643
|
+
values: [string, ...string[]];
|
644
|
+
}, ...{
|
645
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
646
|
+
values: [string, ...string[]];
|
647
|
+
}[]] | undefined;
|
395
648
|
meta?: {
|
396
649
|
vct_values?: string[] | undefined;
|
397
650
|
} | undefined;
|
398
651
|
} | {
|
399
652
|
id: string;
|
400
|
-
format: "
|
653
|
+
format: "ldp_vc" | "jwt_vc_json";
|
654
|
+
meta: {
|
655
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
656
|
+
};
|
401
657
|
claims?: [{
|
402
658
|
path: [string | number | null, ...(string | number | null)[]];
|
403
659
|
values?: (string | number | boolean)[] | undefined;
|
@@ -408,6 +664,13 @@ declare namespace DcqlQueryResult {
|
|
408
664
|
id?: string | undefined;
|
409
665
|
}[]] | undefined;
|
410
666
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
667
|
+
trusted_authorities?: [{
|
668
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
669
|
+
values: [string, ...string[]];
|
670
|
+
}, ...{
|
671
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
672
|
+
values: [string, ...string[]];
|
673
|
+
}[]] | undefined;
|
411
674
|
}, ...({
|
412
675
|
id: string;
|
413
676
|
format: "mso_mdoc";
|
@@ -433,6 +696,13 @@ declare namespace DcqlQueryResult {
|
|
433
696
|
intent_to_retain?: boolean | undefined;
|
434
697
|
})[]] | undefined;
|
435
698
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
699
|
+
trusted_authorities?: [{
|
700
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
701
|
+
values: [string, ...string[]];
|
702
|
+
}, ...{
|
703
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
704
|
+
values: [string, ...string[]];
|
705
|
+
}[]] | undefined;
|
436
706
|
meta?: {
|
437
707
|
doctype_value?: string | undefined;
|
438
708
|
} | undefined;
|
@@ -449,12 +719,22 @@ declare namespace DcqlQueryResult {
|
|
449
719
|
id?: string | undefined;
|
450
720
|
}[]] | undefined;
|
451
721
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
722
|
+
trusted_authorities?: [{
|
723
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
724
|
+
values: [string, ...string[]];
|
725
|
+
}, ...{
|
726
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
727
|
+
values: [string, ...string[]];
|
728
|
+
}[]] | undefined;
|
452
729
|
meta?: {
|
453
730
|
vct_values?: string[] | undefined;
|
454
731
|
} | undefined;
|
455
732
|
} | {
|
456
733
|
id: string;
|
457
|
-
format: "
|
734
|
+
format: "ldp_vc" | "jwt_vc_json";
|
735
|
+
meta: {
|
736
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
737
|
+
};
|
458
738
|
claims?: [{
|
459
739
|
path: [string | number | null, ...(string | number | null)[]];
|
460
740
|
values?: (string | number | boolean)[] | undefined;
|
@@ -465,6 +745,13 @@ declare namespace DcqlQueryResult {
|
|
465
745
|
id?: string | undefined;
|
466
746
|
}[]] | undefined;
|
467
747
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
748
|
+
trusted_authorities?: [{
|
749
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
750
|
+
values: [string, ...string[]];
|
751
|
+
}, ...{
|
752
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
753
|
+
values: [string, ...string[]];
|
754
|
+
}[]] | undefined;
|
468
755
|
})[]], undefined>, v.DescriptionAction<[{
|
469
756
|
id: string;
|
470
757
|
format: "mso_mdoc";
|
@@ -490,6 +777,13 @@ declare namespace DcqlQueryResult {
|
|
490
777
|
intent_to_retain?: boolean | undefined;
|
491
778
|
})[]] | undefined;
|
492
779
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
780
|
+
trusted_authorities?: [{
|
781
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
782
|
+
values: [string, ...string[]];
|
783
|
+
}, ...{
|
784
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
785
|
+
values: [string, ...string[]];
|
786
|
+
}[]] | undefined;
|
493
787
|
meta?: {
|
494
788
|
doctype_value?: string | undefined;
|
495
789
|
} | undefined;
|
@@ -506,12 +800,22 @@ declare namespace DcqlQueryResult {
|
|
506
800
|
id?: string | undefined;
|
507
801
|
}[]] | undefined;
|
508
802
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
803
|
+
trusted_authorities?: [{
|
804
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
805
|
+
values: [string, ...string[]];
|
806
|
+
}, ...{
|
807
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
808
|
+
values: [string, ...string[]];
|
809
|
+
}[]] | undefined;
|
509
810
|
meta?: {
|
510
811
|
vct_values?: string[] | undefined;
|
511
812
|
} | undefined;
|
512
813
|
} | {
|
513
814
|
id: string;
|
514
|
-
format: "
|
815
|
+
format: "ldp_vc" | "jwt_vc_json";
|
816
|
+
meta: {
|
817
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
818
|
+
};
|
515
819
|
claims?: [{
|
516
820
|
path: [string | number | null, ...(string | number | null)[]];
|
517
821
|
values?: (string | number | boolean)[] | undefined;
|
@@ -522,6 +826,13 @@ declare namespace DcqlQueryResult {
|
|
522
826
|
id?: string | undefined;
|
523
827
|
}[]] | undefined;
|
524
828
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
829
|
+
trusted_authorities?: [{
|
830
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
831
|
+
values: [string, ...string[]];
|
832
|
+
}, ...{
|
833
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
834
|
+
values: [string, ...string[]];
|
835
|
+
}[]] | undefined;
|
525
836
|
}, ...({
|
526
837
|
id: string;
|
527
838
|
format: "mso_mdoc";
|
@@ -547,6 +858,13 @@ declare namespace DcqlQueryResult {
|
|
547
858
|
intent_to_retain?: boolean | undefined;
|
548
859
|
})[]] | undefined;
|
549
860
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
861
|
+
trusted_authorities?: [{
|
862
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
863
|
+
values: [string, ...string[]];
|
864
|
+
}, ...{
|
865
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
866
|
+
values: [string, ...string[]];
|
867
|
+
}[]] | undefined;
|
550
868
|
meta?: {
|
551
869
|
doctype_value?: string | undefined;
|
552
870
|
} | undefined;
|
@@ -563,12 +881,22 @@ declare namespace DcqlQueryResult {
|
|
563
881
|
id?: string | undefined;
|
564
882
|
}[]] | undefined;
|
565
883
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
884
|
+
trusted_authorities?: [{
|
885
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
886
|
+
values: [string, ...string[]];
|
887
|
+
}, ...{
|
888
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
889
|
+
values: [string, ...string[]];
|
890
|
+
}[]] | undefined;
|
566
891
|
meta?: {
|
567
892
|
vct_values?: string[] | undefined;
|
568
893
|
} | undefined;
|
569
894
|
} | {
|
570
895
|
id: string;
|
571
|
-
format: "
|
896
|
+
format: "ldp_vc" | "jwt_vc_json";
|
897
|
+
meta: {
|
898
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
899
|
+
};
|
572
900
|
claims?: [{
|
573
901
|
path: [string | number | null, ...(string | number | null)[]];
|
574
902
|
values?: (string | number | boolean)[] | undefined;
|
@@ -579,6 +907,13 @@ declare namespace DcqlQueryResult {
|
|
579
907
|
id?: string | undefined;
|
580
908
|
}[]] | undefined;
|
581
909
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
910
|
+
trusted_authorities?: [{
|
911
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
912
|
+
values: [string, ...string[]];
|
913
|
+
}, ...{
|
914
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
915
|
+
values: [string, ...string[]];
|
916
|
+
}[]] | undefined;
|
582
917
|
})[]], "REQUIRED. A non-empty array of Credential Queries that specify the requested Verifiable Credentials.">]>;
|
583
918
|
readonly credential_matches: v.RecordSchema<v.SchemaWithPipe<[v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>]>, v.UnionSchema<[v.ObjectSchema<{
|
584
919
|
readonly all: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.UnionSchema<[v.UndefinedSchema<undefined>, v.ObjectSchema<{
|
@@ -591,13 +926,44 @@ declare namespace DcqlQueryResult {
|
|
591
926
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
592
927
|
readonly doctype: v.StringSchema<undefined>;
|
593
928
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
929
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
930
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
931
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
932
|
+
}, undefined>, v.ObjectSchema<{
|
933
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
934
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
935
|
+
}, undefined>, v.ObjectSchema<{
|
936
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
937
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
938
|
+
}, undefined>], undefined>, undefined>;
|
594
939
|
}, undefined>, v.ObjectSchema<{
|
595
940
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
596
941
|
readonly vct: v.StringSchema<undefined>;
|
597
942
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
943
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
944
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
945
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
946
|
+
}, undefined>, v.ObjectSchema<{
|
947
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
948
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
949
|
+
}, undefined>, v.ObjectSchema<{
|
950
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
951
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
952
|
+
}, undefined>], undefined>, undefined>;
|
598
953
|
}, undefined>, v.ObjectSchema<{
|
599
|
-
readonly credential_format: v.PicklistSchema<["
|
954
|
+
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
600
955
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
956
|
+
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
957
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
958
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
959
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
960
|
+
}, undefined>, v.ObjectSchema<{
|
961
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
962
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
963
|
+
}, undefined>, v.ObjectSchema<{
|
964
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
965
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
966
|
+
}, undefined>], undefined>, undefined>;
|
601
967
|
}, undefined>], undefined>;
|
602
968
|
}, undefined>, v.ObjectSchema<{
|
603
969
|
readonly success: v.LiteralSchema<false, undefined>;
|
@@ -615,17 +981,48 @@ declare namespace DcqlQueryResult {
|
|
615
981
|
[x: string]: unknown;
|
616
982
|
};
|
617
983
|
};
|
984
|
+
authority?: {
|
985
|
+
type: "aki";
|
986
|
+
value: string;
|
987
|
+
} | {
|
988
|
+
type: "etsi_tl";
|
989
|
+
value: string;
|
990
|
+
} | {
|
991
|
+
type: "openid_federation";
|
992
|
+
value: string;
|
993
|
+
} | undefined;
|
618
994
|
} | {
|
619
995
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
620
996
|
vct: string;
|
621
997
|
claims: {
|
622
998
|
[x: string]: Json;
|
623
999
|
};
|
1000
|
+
authority?: {
|
1001
|
+
type: "aki";
|
1002
|
+
value: string;
|
1003
|
+
} | {
|
1004
|
+
type: "etsi_tl";
|
1005
|
+
value: string;
|
1006
|
+
} | {
|
1007
|
+
type: "openid_federation";
|
1008
|
+
value: string;
|
1009
|
+
} | undefined;
|
624
1010
|
} | {
|
625
|
-
|
1011
|
+
type: string[];
|
1012
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
626
1013
|
claims: {
|
627
1014
|
[x: string]: Json;
|
628
1015
|
};
|
1016
|
+
authority?: {
|
1017
|
+
type: "aki";
|
1018
|
+
value: string;
|
1019
|
+
} | {
|
1020
|
+
type: "etsi_tl";
|
1021
|
+
value: string;
|
1022
|
+
} | {
|
1023
|
+
type: "openid_federation";
|
1024
|
+
value: string;
|
1025
|
+
} | undefined;
|
629
1026
|
};
|
630
1027
|
success: true;
|
631
1028
|
typed: true;
|
@@ -648,17 +1045,48 @@ declare namespace DcqlQueryResult {
|
|
648
1045
|
[x: string]: unknown;
|
649
1046
|
};
|
650
1047
|
};
|
1048
|
+
authority?: {
|
1049
|
+
type: "aki";
|
1050
|
+
value: string;
|
1051
|
+
} | {
|
1052
|
+
type: "etsi_tl";
|
1053
|
+
value: string;
|
1054
|
+
} | {
|
1055
|
+
type: "openid_federation";
|
1056
|
+
value: string;
|
1057
|
+
} | undefined;
|
651
1058
|
} | {
|
652
1059
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
653
1060
|
vct: string;
|
654
1061
|
claims: {
|
655
1062
|
[x: string]: Json;
|
656
1063
|
};
|
1064
|
+
authority?: {
|
1065
|
+
type: "aki";
|
1066
|
+
value: string;
|
1067
|
+
} | {
|
1068
|
+
type: "etsi_tl";
|
1069
|
+
value: string;
|
1070
|
+
} | {
|
1071
|
+
type: "openid_federation";
|
1072
|
+
value: string;
|
1073
|
+
} | undefined;
|
657
1074
|
} | {
|
658
|
-
|
1075
|
+
type: string[];
|
1076
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
659
1077
|
claims: {
|
660
1078
|
[x: string]: Json;
|
661
1079
|
};
|
1080
|
+
authority?: {
|
1081
|
+
type: "aki";
|
1082
|
+
value: string;
|
1083
|
+
} | {
|
1084
|
+
type: "etsi_tl";
|
1085
|
+
value: string;
|
1086
|
+
} | {
|
1087
|
+
type: "openid_federation";
|
1088
|
+
value: string;
|
1089
|
+
} | undefined;
|
662
1090
|
};
|
663
1091
|
success: true;
|
664
1092
|
typed: true;
|
@@ -681,17 +1109,48 @@ declare namespace DcqlQueryResult {
|
|
681
1109
|
[x: string]: unknown;
|
682
1110
|
};
|
683
1111
|
};
|
1112
|
+
authority?: {
|
1113
|
+
type: "aki";
|
1114
|
+
value: string;
|
1115
|
+
} | {
|
1116
|
+
type: "etsi_tl";
|
1117
|
+
value: string;
|
1118
|
+
} | {
|
1119
|
+
type: "openid_federation";
|
1120
|
+
value: string;
|
1121
|
+
} | undefined;
|
684
1122
|
} | {
|
685
1123
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
686
1124
|
vct: string;
|
687
1125
|
claims: {
|
688
1126
|
[x: string]: Json;
|
689
1127
|
};
|
1128
|
+
authority?: {
|
1129
|
+
type: "aki";
|
1130
|
+
value: string;
|
1131
|
+
} | {
|
1132
|
+
type: "etsi_tl";
|
1133
|
+
value: string;
|
1134
|
+
} | {
|
1135
|
+
type: "openid_federation";
|
1136
|
+
value: string;
|
1137
|
+
} | undefined;
|
690
1138
|
} | {
|
691
|
-
|
1139
|
+
type: string[];
|
1140
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
692
1141
|
claims: {
|
693
1142
|
[x: string]: Json;
|
694
1143
|
};
|
1144
|
+
authority?: {
|
1145
|
+
type: "aki";
|
1146
|
+
value: string;
|
1147
|
+
} | {
|
1148
|
+
type: "etsi_tl";
|
1149
|
+
value: string;
|
1150
|
+
} | {
|
1151
|
+
type: "openid_federation";
|
1152
|
+
value: string;
|
1153
|
+
} | undefined;
|
695
1154
|
};
|
696
1155
|
success: true;
|
697
1156
|
typed: true;
|
@@ -714,17 +1173,48 @@ declare namespace DcqlQueryResult {
|
|
714
1173
|
[x: string]: unknown;
|
715
1174
|
};
|
716
1175
|
};
|
1176
|
+
authority?: {
|
1177
|
+
type: "aki";
|
1178
|
+
value: string;
|
1179
|
+
} | {
|
1180
|
+
type: "etsi_tl";
|
1181
|
+
value: string;
|
1182
|
+
} | {
|
1183
|
+
type: "openid_federation";
|
1184
|
+
value: string;
|
1185
|
+
} | undefined;
|
717
1186
|
} | {
|
718
1187
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
719
1188
|
vct: string;
|
720
1189
|
claims: {
|
721
1190
|
[x: string]: Json;
|
722
1191
|
};
|
1192
|
+
authority?: {
|
1193
|
+
type: "aki";
|
1194
|
+
value: string;
|
1195
|
+
} | {
|
1196
|
+
type: "etsi_tl";
|
1197
|
+
value: string;
|
1198
|
+
} | {
|
1199
|
+
type: "openid_federation";
|
1200
|
+
value: string;
|
1201
|
+
} | undefined;
|
723
1202
|
} | {
|
724
|
-
|
1203
|
+
type: string[];
|
1204
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
725
1205
|
claims: {
|
726
1206
|
[x: string]: Json;
|
727
1207
|
};
|
1208
|
+
authority?: {
|
1209
|
+
type: "aki";
|
1210
|
+
value: string;
|
1211
|
+
} | {
|
1212
|
+
type: "etsi_tl";
|
1213
|
+
value: string;
|
1214
|
+
} | {
|
1215
|
+
type: "openid_federation";
|
1216
|
+
value: string;
|
1217
|
+
} | undefined;
|
728
1218
|
};
|
729
1219
|
success: true;
|
730
1220
|
typed: true;
|
@@ -747,17 +1237,48 @@ declare namespace DcqlQueryResult {
|
|
747
1237
|
[x: string]: unknown;
|
748
1238
|
};
|
749
1239
|
};
|
1240
|
+
authority?: {
|
1241
|
+
type: "aki";
|
1242
|
+
value: string;
|
1243
|
+
} | {
|
1244
|
+
type: "etsi_tl";
|
1245
|
+
value: string;
|
1246
|
+
} | {
|
1247
|
+
type: "openid_federation";
|
1248
|
+
value: string;
|
1249
|
+
} | undefined;
|
750
1250
|
} | {
|
751
1251
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
752
1252
|
vct: string;
|
753
1253
|
claims: {
|
754
1254
|
[x: string]: Json;
|
755
1255
|
};
|
1256
|
+
authority?: {
|
1257
|
+
type: "aki";
|
1258
|
+
value: string;
|
1259
|
+
} | {
|
1260
|
+
type: "etsi_tl";
|
1261
|
+
value: string;
|
1262
|
+
} | {
|
1263
|
+
type: "openid_federation";
|
1264
|
+
value: string;
|
1265
|
+
} | undefined;
|
756
1266
|
} | {
|
757
|
-
|
1267
|
+
type: string[];
|
1268
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
758
1269
|
claims: {
|
759
1270
|
[x: string]: Json;
|
760
1271
|
};
|
1272
|
+
authority?: {
|
1273
|
+
type: "aki";
|
1274
|
+
value: string;
|
1275
|
+
} | {
|
1276
|
+
type: "etsi_tl";
|
1277
|
+
value: string;
|
1278
|
+
} | {
|
1279
|
+
type: "openid_federation";
|
1280
|
+
value: string;
|
1281
|
+
} | undefined;
|
761
1282
|
};
|
762
1283
|
success: true;
|
763
1284
|
typed: true;
|
@@ -780,17 +1301,48 @@ declare namespace DcqlQueryResult {
|
|
780
1301
|
[x: string]: unknown;
|
781
1302
|
};
|
782
1303
|
};
|
1304
|
+
authority?: {
|
1305
|
+
type: "aki";
|
1306
|
+
value: string;
|
1307
|
+
} | {
|
1308
|
+
type: "etsi_tl";
|
1309
|
+
value: string;
|
1310
|
+
} | {
|
1311
|
+
type: "openid_federation";
|
1312
|
+
value: string;
|
1313
|
+
} | undefined;
|
783
1314
|
} | {
|
784
1315
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
785
1316
|
vct: string;
|
786
1317
|
claims: {
|
787
1318
|
[x: string]: Json;
|
788
1319
|
};
|
1320
|
+
authority?: {
|
1321
|
+
type: "aki";
|
1322
|
+
value: string;
|
1323
|
+
} | {
|
1324
|
+
type: "etsi_tl";
|
1325
|
+
value: string;
|
1326
|
+
} | {
|
1327
|
+
type: "openid_federation";
|
1328
|
+
value: string;
|
1329
|
+
} | undefined;
|
789
1330
|
} | {
|
790
|
-
|
1331
|
+
type: string[];
|
1332
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
791
1333
|
claims: {
|
792
1334
|
[x: string]: Json;
|
793
1335
|
};
|
1336
|
+
authority?: {
|
1337
|
+
type: "aki";
|
1338
|
+
value: string;
|
1339
|
+
} | {
|
1340
|
+
type: "etsi_tl";
|
1341
|
+
value: string;
|
1342
|
+
} | {
|
1343
|
+
type: "openid_federation";
|
1344
|
+
value: string;
|
1345
|
+
} | undefined;
|
794
1346
|
};
|
795
1347
|
success: true;
|
796
1348
|
typed: true;
|
@@ -814,13 +1366,44 @@ declare namespace DcqlQueryResult {
|
|
814
1366
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
815
1367
|
readonly doctype: v.StringSchema<undefined>;
|
816
1368
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
1369
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1370
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1371
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1372
|
+
}, undefined>, v.ObjectSchema<{
|
1373
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1374
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1375
|
+
}, undefined>, v.ObjectSchema<{
|
1376
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1377
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1378
|
+
}, undefined>], undefined>, undefined>;
|
817
1379
|
}, undefined>, v.ObjectSchema<{
|
818
1380
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
819
1381
|
readonly vct: v.StringSchema<undefined>;
|
820
1382
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1383
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1384
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1385
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1386
|
+
}, undefined>, v.ObjectSchema<{
|
1387
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1388
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1389
|
+
}, undefined>, v.ObjectSchema<{
|
1390
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1391
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1392
|
+
}, undefined>], undefined>, undefined>;
|
821
1393
|
}, undefined>, v.ObjectSchema<{
|
822
|
-
readonly credential_format: v.PicklistSchema<["
|
1394
|
+
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
823
1395
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1396
|
+
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
1397
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1398
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1399
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1400
|
+
}, undefined>, v.ObjectSchema<{
|
1401
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1402
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1403
|
+
}, undefined>, v.ObjectSchema<{
|
1404
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1405
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1406
|
+
}, undefined>], undefined>, undefined>;
|
824
1407
|
}, undefined>], undefined>;
|
825
1408
|
}, undefined>, v.ObjectSchema<{
|
826
1409
|
readonly success: v.LiteralSchema<false, undefined>;
|
@@ -834,13 +1417,44 @@ declare namespace DcqlQueryResult {
|
|
834
1417
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
835
1418
|
readonly doctype: v.StringSchema<undefined>;
|
836
1419
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
1420
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1421
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1422
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1423
|
+
}, undefined>, v.ObjectSchema<{
|
1424
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1425
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1426
|
+
}, undefined>, v.ObjectSchema<{
|
1427
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1428
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1429
|
+
}, undefined>], undefined>, undefined>;
|
837
1430
|
}, undefined>, v.ObjectSchema<{
|
838
1431
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
839
1432
|
readonly vct: v.StringSchema<undefined>;
|
840
1433
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1434
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1435
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1436
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1437
|
+
}, undefined>, v.ObjectSchema<{
|
1438
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1439
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1440
|
+
}, undefined>, v.ObjectSchema<{
|
1441
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1442
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1443
|
+
}, undefined>], undefined>, undefined>;
|
841
1444
|
}, undefined>, v.ObjectSchema<{
|
842
|
-
readonly credential_format: v.PicklistSchema<["
|
1445
|
+
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
843
1446
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1447
|
+
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
1448
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1449
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1450
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1451
|
+
}, undefined>, v.ObjectSchema<{
|
1452
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1453
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1454
|
+
}, undefined>, v.ObjectSchema<{
|
1455
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1456
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1457
|
+
}, undefined>], undefined>, undefined>;
|
844
1458
|
}, undefined>], undefined>;
|
845
1459
|
}, undefined>, v.ObjectSchema<{
|
846
1460
|
readonly success: v.LiteralSchema<false, undefined>;
|
@@ -858,17 +1472,48 @@ declare namespace DcqlQueryResult {
|
|
858
1472
|
[x: string]: unknown;
|
859
1473
|
};
|
860
1474
|
};
|
1475
|
+
authority?: {
|
1476
|
+
type: "aki";
|
1477
|
+
value: string;
|
1478
|
+
} | {
|
1479
|
+
type: "etsi_tl";
|
1480
|
+
value: string;
|
1481
|
+
} | {
|
1482
|
+
type: "openid_federation";
|
1483
|
+
value: string;
|
1484
|
+
} | undefined;
|
861
1485
|
} | {
|
862
1486
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
863
1487
|
vct: string;
|
864
1488
|
claims: {
|
865
1489
|
[x: string]: Json;
|
866
1490
|
};
|
1491
|
+
authority?: {
|
1492
|
+
type: "aki";
|
1493
|
+
value: string;
|
1494
|
+
} | {
|
1495
|
+
type: "etsi_tl";
|
1496
|
+
value: string;
|
1497
|
+
} | {
|
1498
|
+
type: "openid_federation";
|
1499
|
+
value: string;
|
1500
|
+
} | undefined;
|
867
1501
|
} | {
|
868
|
-
|
1502
|
+
type: string[];
|
1503
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
869
1504
|
claims: {
|
870
1505
|
[x: string]: Json;
|
871
1506
|
};
|
1507
|
+
authority?: {
|
1508
|
+
type: "aki";
|
1509
|
+
value: string;
|
1510
|
+
} | {
|
1511
|
+
type: "etsi_tl";
|
1512
|
+
value: string;
|
1513
|
+
} | {
|
1514
|
+
type: "openid_federation";
|
1515
|
+
value: string;
|
1516
|
+
} | undefined;
|
872
1517
|
};
|
873
1518
|
success: true;
|
874
1519
|
typed: true;
|
@@ -891,17 +1536,48 @@ declare namespace DcqlQueryResult {
|
|
891
1536
|
[x: string]: unknown;
|
892
1537
|
};
|
893
1538
|
};
|
1539
|
+
authority?: {
|
1540
|
+
type: "aki";
|
1541
|
+
value: string;
|
1542
|
+
} | {
|
1543
|
+
type: "etsi_tl";
|
1544
|
+
value: string;
|
1545
|
+
} | {
|
1546
|
+
type: "openid_federation";
|
1547
|
+
value: string;
|
1548
|
+
} | undefined;
|
894
1549
|
} | {
|
895
1550
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
896
1551
|
vct: string;
|
897
1552
|
claims: {
|
898
1553
|
[x: string]: Json;
|
899
1554
|
};
|
1555
|
+
authority?: {
|
1556
|
+
type: "aki";
|
1557
|
+
value: string;
|
1558
|
+
} | {
|
1559
|
+
type: "etsi_tl";
|
1560
|
+
value: string;
|
1561
|
+
} | {
|
1562
|
+
type: "openid_federation";
|
1563
|
+
value: string;
|
1564
|
+
} | undefined;
|
900
1565
|
} | {
|
901
|
-
|
1566
|
+
type: string[];
|
1567
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
902
1568
|
claims: {
|
903
1569
|
[x: string]: Json;
|
904
1570
|
};
|
1571
|
+
authority?: {
|
1572
|
+
type: "aki";
|
1573
|
+
value: string;
|
1574
|
+
} | {
|
1575
|
+
type: "etsi_tl";
|
1576
|
+
value: string;
|
1577
|
+
} | {
|
1578
|
+
type: "openid_federation";
|
1579
|
+
value: string;
|
1580
|
+
} | undefined;
|
905
1581
|
};
|
906
1582
|
success: true;
|
907
1583
|
typed: true;
|
@@ -924,17 +1600,48 @@ declare namespace DcqlQueryResult {
|
|
924
1600
|
[x: string]: unknown;
|
925
1601
|
};
|
926
1602
|
};
|
1603
|
+
authority?: {
|
1604
|
+
type: "aki";
|
1605
|
+
value: string;
|
1606
|
+
} | {
|
1607
|
+
type: "etsi_tl";
|
1608
|
+
value: string;
|
1609
|
+
} | {
|
1610
|
+
type: "openid_federation";
|
1611
|
+
value: string;
|
1612
|
+
} | undefined;
|
927
1613
|
} | {
|
928
1614
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
929
1615
|
vct: string;
|
930
1616
|
claims: {
|
931
1617
|
[x: string]: Json;
|
932
1618
|
};
|
1619
|
+
authority?: {
|
1620
|
+
type: "aki";
|
1621
|
+
value: string;
|
1622
|
+
} | {
|
1623
|
+
type: "etsi_tl";
|
1624
|
+
value: string;
|
1625
|
+
} | {
|
1626
|
+
type: "openid_federation";
|
1627
|
+
value: string;
|
1628
|
+
} | undefined;
|
933
1629
|
} | {
|
934
|
-
|
1630
|
+
type: string[];
|
1631
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
935
1632
|
claims: {
|
936
1633
|
[x: string]: Json;
|
937
1634
|
};
|
1635
|
+
authority?: {
|
1636
|
+
type: "aki";
|
1637
|
+
value: string;
|
1638
|
+
} | {
|
1639
|
+
type: "etsi_tl";
|
1640
|
+
value: string;
|
1641
|
+
} | {
|
1642
|
+
type: "openid_federation";
|
1643
|
+
value: string;
|
1644
|
+
} | undefined;
|
938
1645
|
};
|
939
1646
|
success: true;
|
940
1647
|
typed: true;
|
@@ -957,17 +1664,48 @@ declare namespace DcqlQueryResult {
|
|
957
1664
|
[x: string]: unknown;
|
958
1665
|
};
|
959
1666
|
};
|
1667
|
+
authority?: {
|
1668
|
+
type: "aki";
|
1669
|
+
value: string;
|
1670
|
+
} | {
|
1671
|
+
type: "etsi_tl";
|
1672
|
+
value: string;
|
1673
|
+
} | {
|
1674
|
+
type: "openid_federation";
|
1675
|
+
value: string;
|
1676
|
+
} | undefined;
|
960
1677
|
} | {
|
961
1678
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
962
1679
|
vct: string;
|
963
1680
|
claims: {
|
964
1681
|
[x: string]: Json;
|
965
1682
|
};
|
1683
|
+
authority?: {
|
1684
|
+
type: "aki";
|
1685
|
+
value: string;
|
1686
|
+
} | {
|
1687
|
+
type: "etsi_tl";
|
1688
|
+
value: string;
|
1689
|
+
} | {
|
1690
|
+
type: "openid_federation";
|
1691
|
+
value: string;
|
1692
|
+
} | undefined;
|
966
1693
|
} | {
|
967
|
-
|
1694
|
+
type: string[];
|
1695
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
968
1696
|
claims: {
|
969
1697
|
[x: string]: Json;
|
970
1698
|
};
|
1699
|
+
authority?: {
|
1700
|
+
type: "aki";
|
1701
|
+
value: string;
|
1702
|
+
} | {
|
1703
|
+
type: "etsi_tl";
|
1704
|
+
value: string;
|
1705
|
+
} | {
|
1706
|
+
type: "openid_federation";
|
1707
|
+
value: string;
|
1708
|
+
} | undefined;
|
971
1709
|
};
|
972
1710
|
success: true;
|
973
1711
|
typed: true;
|
@@ -990,17 +1728,48 @@ declare namespace DcqlQueryResult {
|
|
990
1728
|
[x: string]: unknown;
|
991
1729
|
};
|
992
1730
|
};
|
1731
|
+
authority?: {
|
1732
|
+
type: "aki";
|
1733
|
+
value: string;
|
1734
|
+
} | {
|
1735
|
+
type: "etsi_tl";
|
1736
|
+
value: string;
|
1737
|
+
} | {
|
1738
|
+
type: "openid_federation";
|
1739
|
+
value: string;
|
1740
|
+
} | undefined;
|
993
1741
|
} | {
|
994
1742
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
995
1743
|
vct: string;
|
996
1744
|
claims: {
|
997
1745
|
[x: string]: Json;
|
998
1746
|
};
|
1747
|
+
authority?: {
|
1748
|
+
type: "aki";
|
1749
|
+
value: string;
|
1750
|
+
} | {
|
1751
|
+
type: "etsi_tl";
|
1752
|
+
value: string;
|
1753
|
+
} | {
|
1754
|
+
type: "openid_federation";
|
1755
|
+
value: string;
|
1756
|
+
} | undefined;
|
999
1757
|
} | {
|
1000
|
-
|
1758
|
+
type: string[];
|
1759
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
1001
1760
|
claims: {
|
1002
1761
|
[x: string]: Json;
|
1003
1762
|
};
|
1763
|
+
authority?: {
|
1764
|
+
type: "aki";
|
1765
|
+
value: string;
|
1766
|
+
} | {
|
1767
|
+
type: "etsi_tl";
|
1768
|
+
value: string;
|
1769
|
+
} | {
|
1770
|
+
type: "openid_federation";
|
1771
|
+
value: string;
|
1772
|
+
} | undefined;
|
1004
1773
|
};
|
1005
1774
|
success: true;
|
1006
1775
|
typed: true;
|
@@ -1023,17 +1792,48 @@ declare namespace DcqlQueryResult {
|
|
1023
1792
|
[x: string]: unknown;
|
1024
1793
|
};
|
1025
1794
|
};
|
1795
|
+
authority?: {
|
1796
|
+
type: "aki";
|
1797
|
+
value: string;
|
1798
|
+
} | {
|
1799
|
+
type: "etsi_tl";
|
1800
|
+
value: string;
|
1801
|
+
} | {
|
1802
|
+
type: "openid_federation";
|
1803
|
+
value: string;
|
1804
|
+
} | undefined;
|
1026
1805
|
} | {
|
1027
1806
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1028
1807
|
vct: string;
|
1029
1808
|
claims: {
|
1030
1809
|
[x: string]: Json;
|
1031
1810
|
};
|
1811
|
+
authority?: {
|
1812
|
+
type: "aki";
|
1813
|
+
value: string;
|
1814
|
+
} | {
|
1815
|
+
type: "etsi_tl";
|
1816
|
+
value: string;
|
1817
|
+
} | {
|
1818
|
+
type: "openid_federation";
|
1819
|
+
value: string;
|
1820
|
+
} | undefined;
|
1032
1821
|
} | {
|
1033
|
-
|
1822
|
+
type: string[];
|
1823
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
1034
1824
|
claims: {
|
1035
1825
|
[x: string]: Json;
|
1036
1826
|
};
|
1827
|
+
authority?: {
|
1828
|
+
type: "aki";
|
1829
|
+
value: string;
|
1830
|
+
} | {
|
1831
|
+
type: "etsi_tl";
|
1832
|
+
value: string;
|
1833
|
+
} | {
|
1834
|
+
type: "openid_federation";
|
1835
|
+
value: string;
|
1836
|
+
} | undefined;
|
1037
1837
|
};
|
1038
1838
|
success: true;
|
1039
1839
|
typed: true;
|
@@ -1100,11 +1900,31 @@ declare namespace DcqlMdocCredential {
|
|
1100
1900
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
1101
1901
|
readonly doctype: v.StringSchema<undefined>;
|
1102
1902
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
1903
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1904
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1905
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1906
|
+
}, undefined>, v.ObjectSchema<{
|
1907
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1908
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1909
|
+
}, undefined>, v.ObjectSchema<{
|
1910
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1911
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1912
|
+
}, undefined>], undefined>, undefined>;
|
1103
1913
|
}, undefined>;
|
1104
1914
|
const model: Model<v.ObjectSchema<{
|
1105
1915
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
1106
1916
|
readonly doctype: v.StringSchema<undefined>;
|
1107
1917
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
1918
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1919
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1920
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1921
|
+
}, undefined>, v.ObjectSchema<{
|
1922
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1923
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1924
|
+
}, undefined>, v.ObjectSchema<{
|
1925
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1926
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1927
|
+
}, undefined>], undefined>, undefined>;
|
1108
1928
|
}, undefined>>;
|
1109
1929
|
type Model = InferModelTypes<typeof model>;
|
1110
1930
|
type NameSpaces = v.InferOutput<typeof vNamespaces>;
|
@@ -1116,11 +1936,31 @@ declare namespace DcqlSdJwtVcCredential {
|
|
1116
1936
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
1117
1937
|
readonly vct: v.StringSchema<undefined>;
|
1118
1938
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1939
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1940
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1941
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1942
|
+
}, undefined>, v.ObjectSchema<{
|
1943
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1944
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1945
|
+
}, undefined>, v.ObjectSchema<{
|
1946
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1947
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1948
|
+
}, undefined>], undefined>, undefined>;
|
1119
1949
|
}, undefined>;
|
1120
1950
|
const model: Model<v.ObjectSchema<{
|
1121
1951
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
1122
1952
|
readonly vct: v.StringSchema<undefined>;
|
1123
1953
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1954
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1955
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1956
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1957
|
+
}, undefined>, v.ObjectSchema<{
|
1958
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1959
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1960
|
+
}, undefined>, v.ObjectSchema<{
|
1961
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1962
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1963
|
+
}, undefined>], undefined>, undefined>;
|
1124
1964
|
}, undefined>>;
|
1125
1965
|
type Model = InferModelTypes<typeof model>;
|
1126
1966
|
type Claims = Model['Output']['claims'];
|
@@ -1129,12 +1969,34 @@ type DcqlSdJwtVcCredential = DcqlSdJwtVcCredential.Model['Output'];
|
|
1129
1969
|
declare namespace DcqlW3cVcCredential {
|
1130
1970
|
const vClaims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1131
1971
|
const vModel: v.ObjectSchema<{
|
1132
|
-
readonly credential_format: v.PicklistSchema<["
|
1972
|
+
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
1133
1973
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1974
|
+
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
1975
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1976
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1977
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1978
|
+
}, undefined>, v.ObjectSchema<{
|
1979
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1980
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1981
|
+
}, undefined>, v.ObjectSchema<{
|
1982
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1983
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1984
|
+
}, undefined>], undefined>, undefined>;
|
1134
1985
|
}, undefined>;
|
1135
1986
|
const model: Model<v.ObjectSchema<{
|
1136
|
-
readonly credential_format: v.PicklistSchema<["
|
1987
|
+
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
1137
1988
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1989
|
+
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
1990
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1991
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1992
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1993
|
+
}, undefined>, v.ObjectSchema<{
|
1994
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1995
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1996
|
+
}, undefined>, v.ObjectSchema<{
|
1997
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1998
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1999
|
+
}, undefined>], undefined>, undefined>;
|
1138
2000
|
}, undefined>>;
|
1139
2001
|
type Model = InferModelTypes<typeof model>;
|
1140
2002
|
type Claims = Model['Output']['claims'];
|
@@ -1145,13 +2007,44 @@ declare namespace DcqlCredential {
|
|
1145
2007
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
1146
2008
|
readonly doctype: v.StringSchema<undefined>;
|
1147
2009
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
2010
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2011
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2012
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2013
|
+
}, undefined>, v.ObjectSchema<{
|
2014
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2015
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2016
|
+
}, undefined>, v.ObjectSchema<{
|
2017
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2018
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2019
|
+
}, undefined>], undefined>, undefined>;
|
1148
2020
|
}, undefined>, v.ObjectSchema<{
|
1149
2021
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
1150
2022
|
readonly vct: v.StringSchema<undefined>;
|
1151
2023
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
2024
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2025
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2026
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2027
|
+
}, undefined>, v.ObjectSchema<{
|
2028
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2029
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2030
|
+
}, undefined>, v.ObjectSchema<{
|
2031
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2032
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2033
|
+
}, undefined>], undefined>, undefined>;
|
1152
2034
|
}, undefined>, v.ObjectSchema<{
|
1153
|
-
readonly credential_format: v.PicklistSchema<["
|
2035
|
+
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
1154
2036
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
2037
|
+
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
2038
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2039
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2040
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2041
|
+
}, undefined>, v.ObjectSchema<{
|
2042
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2043
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2044
|
+
}, undefined>, v.ObjectSchema<{
|
2045
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2046
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2047
|
+
}, undefined>], undefined>, undefined>;
|
1155
2048
|
}, undefined>], undefined>;
|
1156
2049
|
const vParseSuccess: v.ObjectSchema<{
|
1157
2050
|
readonly success: v.LiteralSchema<true, undefined>;
|
@@ -1163,13 +2056,44 @@ declare namespace DcqlCredential {
|
|
1163
2056
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
1164
2057
|
readonly doctype: v.StringSchema<undefined>;
|
1165
2058
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
2059
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2060
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2061
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2062
|
+
}, undefined>, v.ObjectSchema<{
|
2063
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2064
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2065
|
+
}, undefined>, v.ObjectSchema<{
|
2066
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2067
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2068
|
+
}, undefined>], undefined>, undefined>;
|
1166
2069
|
}, undefined>, v.ObjectSchema<{
|
1167
2070
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
1168
2071
|
readonly vct: v.StringSchema<undefined>;
|
1169
2072
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
2073
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2074
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2075
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2076
|
+
}, undefined>, v.ObjectSchema<{
|
2077
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2078
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2079
|
+
}, undefined>, v.ObjectSchema<{
|
2080
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2081
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2082
|
+
}, undefined>], undefined>, undefined>;
|
1170
2083
|
}, undefined>, v.ObjectSchema<{
|
1171
|
-
readonly credential_format: v.PicklistSchema<["
|
2084
|
+
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
1172
2085
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
2086
|
+
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
2087
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2088
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2089
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2090
|
+
}, undefined>, v.ObjectSchema<{
|
2091
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2092
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2093
|
+
}, undefined>, v.ObjectSchema<{
|
2094
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2095
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2096
|
+
}, undefined>], undefined>, undefined>;
|
1173
2097
|
}, undefined>], undefined>;
|
1174
2098
|
}, undefined>;
|
1175
2099
|
const vParseFailure: v.ObjectSchema<{
|
@@ -1184,13 +2108,44 @@ declare namespace DcqlCredential {
|
|
1184
2108
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
1185
2109
|
readonly doctype: v.StringSchema<undefined>;
|
1186
2110
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
2111
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2112
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2113
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2114
|
+
}, undefined>, v.ObjectSchema<{
|
2115
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2116
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2117
|
+
}, undefined>, v.ObjectSchema<{
|
2118
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2119
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2120
|
+
}, undefined>], undefined>, undefined>;
|
1187
2121
|
}, undefined>, v.ObjectSchema<{
|
1188
2122
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
1189
2123
|
readonly vct: v.StringSchema<undefined>;
|
1190
2124
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
2125
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2126
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2127
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2128
|
+
}, undefined>, v.ObjectSchema<{
|
2129
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2130
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2131
|
+
}, undefined>, v.ObjectSchema<{
|
2132
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2133
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2134
|
+
}, undefined>], undefined>, undefined>;
|
1191
2135
|
}, undefined>, v.ObjectSchema<{
|
1192
|
-
readonly credential_format: v.PicklistSchema<["
|
2136
|
+
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
1193
2137
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
2138
|
+
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
2139
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2140
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2141
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2142
|
+
}, undefined>, v.ObjectSchema<{
|
2143
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2144
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2145
|
+
}, undefined>, v.ObjectSchema<{
|
2146
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2147
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2148
|
+
}, undefined>], undefined>, undefined>;
|
1194
2149
|
}, undefined>], undefined>>;
|
1195
2150
|
type Model = InferModelTypes<typeof model>;
|
1196
2151
|
}
|
@@ -1266,6 +2221,22 @@ declare namespace DcqlQuery {
|
|
1266
2221
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
1267
2222
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
1268
2223
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
2224
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
2225
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
2226
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
2227
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
2228
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2229
|
+
values: [string, ...string[]];
|
2230
|
+
}, ...{
|
2231
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2232
|
+
values: [string, ...string[]];
|
2233
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
2234
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2235
|
+
values: [string, ...string[]];
|
2236
|
+
}, ...{
|
2237
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2238
|
+
values: [string, ...string[]];
|
2239
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
1269
2240
|
}, undefined>, v.ObjectSchema<{
|
1270
2241
|
readonly format: v.SchemaWithPipe<[v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>, v.DescriptionAction<"vc+sd-jwt" | "dc+sd-jwt", "REQUIRED. A string that specifies the format of the requested Verifiable Credential.">]>;
|
1271
2242
|
readonly claims: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
@@ -1298,8 +2269,24 @@ declare namespace DcqlQuery {
|
|
1298
2269
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
1299
2270
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
1300
2271
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
2272
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
2273
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
2274
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
2275
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
2276
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2277
|
+
values: [string, ...string[]];
|
2278
|
+
}, ...{
|
2279
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2280
|
+
values: [string, ...string[]];
|
2281
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
2282
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2283
|
+
values: [string, ...string[]];
|
2284
|
+
}, ...{
|
2285
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2286
|
+
values: [string, ...string[]];
|
2287
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
1301
2288
|
}, undefined>, v.ObjectSchema<{
|
1302
|
-
readonly format: v.PicklistSchema<["jwt_vc_json", "
|
2289
|
+
readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
|
1303
2290
|
readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
1304
2291
|
readonly id: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.DescriptionAction<string | undefined, "A string identifying the particular claim. The value MUST be a non-empty string consisting of alphanumeric, underscore (_) or hyphen (-) characters. Within the particular claims array, the same id MUST NOT be present more than once.">]>;
|
1305
2292
|
readonly path: v.SchemaWithPipe<[v.ArraySchema<v.UnionSchema<[v.StringSchema<undefined>, v.SchemaWithPipe<[v.NumberSchema<undefined>, v.IntegerAction<number, undefined>, v.MinValueAction<number, 0, undefined>]>, v.NullSchema<undefined>], undefined>, undefined>, v.CustomSchema<[string | number | null, ...(string | number | null)[]], undefined>, v.DescriptionAction<[string | number | null, ...(string | number | null)[]], "A non-empty array representing a claims path pointer that specifies the path to a claim within the Verifiable Credential.">]>;
|
@@ -1313,8 +2300,29 @@ declare namespace DcqlQuery {
|
|
1313
2300
|
values?: (string | number | boolean)[] | undefined;
|
1314
2301
|
id?: string | undefined;
|
1315
2302
|
}[]], undefined>]>, undefined>;
|
2303
|
+
readonly meta: v.SchemaWithPipe<[v.SchemaWithPipe<[v.ObjectSchema<{
|
2304
|
+
readonly type_values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.StringSchema<undefined>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]], "REQUIRED. An array of string arrays that specifies the fully expanded types (IRIs) after the @context was applied that the Verifier accepts to be presented in the Presentation. Each of the top-level arrays specifies one alternative to match the type values of the Verifiable Credential against. Each inner array specifies a set of fully expanded types that MUST be present in the type property of the Verifiable Credential, regardless of order or the presence of additional types.">]>;
|
2305
|
+
}, undefined>]>, v.DescriptionAction<{
|
2306
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
2307
|
+
}, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
1316
2308
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
1317
2309
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
2310
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
2311
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
2312
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
2313
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
2314
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2315
|
+
values: [string, ...string[]];
|
2316
|
+
}, ...{
|
2317
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2318
|
+
values: [string, ...string[]];
|
2319
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
2320
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2321
|
+
values: [string, ...string[]];
|
2322
|
+
}, ...{
|
2323
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2324
|
+
values: [string, ...string[]];
|
2325
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
1318
2326
|
}, undefined>], undefined>, undefined>, v.CustomSchema<[{
|
1319
2327
|
id: string;
|
1320
2328
|
format: "mso_mdoc";
|
@@ -1340,6 +2348,13 @@ declare namespace DcqlQuery {
|
|
1340
2348
|
intent_to_retain?: boolean | undefined;
|
1341
2349
|
})[]] | undefined;
|
1342
2350
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2351
|
+
trusted_authorities?: [{
|
2352
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2353
|
+
values: [string, ...string[]];
|
2354
|
+
}, ...{
|
2355
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2356
|
+
values: [string, ...string[]];
|
2357
|
+
}[]] | undefined;
|
1343
2358
|
meta?: {
|
1344
2359
|
doctype_value?: string | undefined;
|
1345
2360
|
} | undefined;
|
@@ -1356,12 +2371,22 @@ declare namespace DcqlQuery {
|
|
1356
2371
|
id?: string | undefined;
|
1357
2372
|
}[]] | undefined;
|
1358
2373
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2374
|
+
trusted_authorities?: [{
|
2375
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2376
|
+
values: [string, ...string[]];
|
2377
|
+
}, ...{
|
2378
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2379
|
+
values: [string, ...string[]];
|
2380
|
+
}[]] | undefined;
|
1359
2381
|
meta?: {
|
1360
2382
|
vct_values?: string[] | undefined;
|
1361
2383
|
} | undefined;
|
1362
2384
|
} | {
|
1363
2385
|
id: string;
|
1364
|
-
format: "
|
2386
|
+
format: "ldp_vc" | "jwt_vc_json";
|
2387
|
+
meta: {
|
2388
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
2389
|
+
};
|
1365
2390
|
claims?: [{
|
1366
2391
|
path: [string | number | null, ...(string | number | null)[]];
|
1367
2392
|
values?: (string | number | boolean)[] | undefined;
|
@@ -1372,6 +2397,13 @@ declare namespace DcqlQuery {
|
|
1372
2397
|
id?: string | undefined;
|
1373
2398
|
}[]] | undefined;
|
1374
2399
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2400
|
+
trusted_authorities?: [{
|
2401
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2402
|
+
values: [string, ...string[]];
|
2403
|
+
}, ...{
|
2404
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2405
|
+
values: [string, ...string[]];
|
2406
|
+
}[]] | undefined;
|
1375
2407
|
}, ...({
|
1376
2408
|
id: string;
|
1377
2409
|
format: "mso_mdoc";
|
@@ -1397,6 +2429,13 @@ declare namespace DcqlQuery {
|
|
1397
2429
|
intent_to_retain?: boolean | undefined;
|
1398
2430
|
})[]] | undefined;
|
1399
2431
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2432
|
+
trusted_authorities?: [{
|
2433
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2434
|
+
values: [string, ...string[]];
|
2435
|
+
}, ...{
|
2436
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2437
|
+
values: [string, ...string[]];
|
2438
|
+
}[]] | undefined;
|
1400
2439
|
meta?: {
|
1401
2440
|
doctype_value?: string | undefined;
|
1402
2441
|
} | undefined;
|
@@ -1413,12 +2452,22 @@ declare namespace DcqlQuery {
|
|
1413
2452
|
id?: string | undefined;
|
1414
2453
|
}[]] | undefined;
|
1415
2454
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2455
|
+
trusted_authorities?: [{
|
2456
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2457
|
+
values: [string, ...string[]];
|
2458
|
+
}, ...{
|
2459
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2460
|
+
values: [string, ...string[]];
|
2461
|
+
}[]] | undefined;
|
1416
2462
|
meta?: {
|
1417
2463
|
vct_values?: string[] | undefined;
|
1418
2464
|
} | undefined;
|
1419
2465
|
} | {
|
1420
2466
|
id: string;
|
1421
|
-
format: "
|
2467
|
+
format: "ldp_vc" | "jwt_vc_json";
|
2468
|
+
meta: {
|
2469
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
2470
|
+
};
|
1422
2471
|
claims?: [{
|
1423
2472
|
path: [string | number | null, ...(string | number | null)[]];
|
1424
2473
|
values?: (string | number | boolean)[] | undefined;
|
@@ -1429,6 +2478,13 @@ declare namespace DcqlQuery {
|
|
1429
2478
|
id?: string | undefined;
|
1430
2479
|
}[]] | undefined;
|
1431
2480
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2481
|
+
trusted_authorities?: [{
|
2482
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2483
|
+
values: [string, ...string[]];
|
2484
|
+
}, ...{
|
2485
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2486
|
+
values: [string, ...string[]];
|
2487
|
+
}[]] | undefined;
|
1432
2488
|
})[]], undefined>, v.DescriptionAction<[{
|
1433
2489
|
id: string;
|
1434
2490
|
format: "mso_mdoc";
|
@@ -1454,6 +2510,13 @@ declare namespace DcqlQuery {
|
|
1454
2510
|
intent_to_retain?: boolean | undefined;
|
1455
2511
|
})[]] | undefined;
|
1456
2512
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2513
|
+
trusted_authorities?: [{
|
2514
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2515
|
+
values: [string, ...string[]];
|
2516
|
+
}, ...{
|
2517
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2518
|
+
values: [string, ...string[]];
|
2519
|
+
}[]] | undefined;
|
1457
2520
|
meta?: {
|
1458
2521
|
doctype_value?: string | undefined;
|
1459
2522
|
} | undefined;
|
@@ -1470,12 +2533,22 @@ declare namespace DcqlQuery {
|
|
1470
2533
|
id?: string | undefined;
|
1471
2534
|
}[]] | undefined;
|
1472
2535
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2536
|
+
trusted_authorities?: [{
|
2537
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2538
|
+
values: [string, ...string[]];
|
2539
|
+
}, ...{
|
2540
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2541
|
+
values: [string, ...string[]];
|
2542
|
+
}[]] | undefined;
|
1473
2543
|
meta?: {
|
1474
2544
|
vct_values?: string[] | undefined;
|
1475
2545
|
} | undefined;
|
1476
2546
|
} | {
|
1477
2547
|
id: string;
|
1478
|
-
format: "
|
2548
|
+
format: "ldp_vc" | "jwt_vc_json";
|
2549
|
+
meta: {
|
2550
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
2551
|
+
};
|
1479
2552
|
claims?: [{
|
1480
2553
|
path: [string | number | null, ...(string | number | null)[]];
|
1481
2554
|
values?: (string | number | boolean)[] | undefined;
|
@@ -1486,6 +2559,13 @@ declare namespace DcqlQuery {
|
|
1486
2559
|
id?: string | undefined;
|
1487
2560
|
}[]] | undefined;
|
1488
2561
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2562
|
+
trusted_authorities?: [{
|
2563
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2564
|
+
values: [string, ...string[]];
|
2565
|
+
}, ...{
|
2566
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2567
|
+
values: [string, ...string[]];
|
2568
|
+
}[]] | undefined;
|
1489
2569
|
}, ...({
|
1490
2570
|
id: string;
|
1491
2571
|
format: "mso_mdoc";
|
@@ -1511,6 +2591,13 @@ declare namespace DcqlQuery {
|
|
1511
2591
|
intent_to_retain?: boolean | undefined;
|
1512
2592
|
})[]] | undefined;
|
1513
2593
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2594
|
+
trusted_authorities?: [{
|
2595
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2596
|
+
values: [string, ...string[]];
|
2597
|
+
}, ...{
|
2598
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2599
|
+
values: [string, ...string[]];
|
2600
|
+
}[]] | undefined;
|
1514
2601
|
meta?: {
|
1515
2602
|
doctype_value?: string | undefined;
|
1516
2603
|
} | undefined;
|
@@ -1527,12 +2614,22 @@ declare namespace DcqlQuery {
|
|
1527
2614
|
id?: string | undefined;
|
1528
2615
|
}[]] | undefined;
|
1529
2616
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2617
|
+
trusted_authorities?: [{
|
2618
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2619
|
+
values: [string, ...string[]];
|
2620
|
+
}, ...{
|
2621
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2622
|
+
values: [string, ...string[]];
|
2623
|
+
}[]] | undefined;
|
1530
2624
|
meta?: {
|
1531
2625
|
vct_values?: string[] | undefined;
|
1532
2626
|
} | undefined;
|
1533
2627
|
} | {
|
1534
2628
|
id: string;
|
1535
|
-
format: "
|
2629
|
+
format: "ldp_vc" | "jwt_vc_json";
|
2630
|
+
meta: {
|
2631
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
2632
|
+
};
|
1536
2633
|
claims?: [{
|
1537
2634
|
path: [string | number | null, ...(string | number | null)[]];
|
1538
2635
|
values?: (string | number | boolean)[] | undefined;
|
@@ -1543,6 +2640,13 @@ declare namespace DcqlQuery {
|
|
1543
2640
|
id?: string | undefined;
|
1544
2641
|
}[]] | undefined;
|
1545
2642
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2643
|
+
trusted_authorities?: [{
|
2644
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2645
|
+
values: [string, ...string[]];
|
2646
|
+
}, ...{
|
2647
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2648
|
+
values: [string, ...string[]];
|
2649
|
+
}[]] | undefined;
|
1546
2650
|
})[]], "REQUIRED. A non-empty array of Credential Queries that specify the requested Verifiable Credentials.">]>;
|
1547
2651
|
readonly credential_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
1548
2652
|
readonly options: v.SchemaWithPipe<[v.ArraySchema<v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, undefined>, v.CustomSchema<[string[], ...string[][]], undefined>, v.DescriptionAction<[string[], ...string[][]], "REQUIRED. A non-empty array, where each value in the array is a list of Credential Query identifiers representing one set of Credentials that satisfies the use case.">]>;
|
@@ -1605,6 +2709,13 @@ declare namespace DcqlQuery {
|
|
1605
2709
|
intent_to_retain?: boolean | undefined;
|
1606
2710
|
})[]] | undefined;
|
1607
2711
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2712
|
+
trusted_authorities?: [{
|
2713
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2714
|
+
values: [string, ...string[]];
|
2715
|
+
}, ...{
|
2716
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2717
|
+
values: [string, ...string[]];
|
2718
|
+
}[]] | undefined;
|
1608
2719
|
meta?: {
|
1609
2720
|
doctype_value?: string | undefined;
|
1610
2721
|
} | undefined;
|
@@ -1621,12 +2732,22 @@ declare namespace DcqlQuery {
|
|
1621
2732
|
id?: string | undefined;
|
1622
2733
|
}[]] | undefined;
|
1623
2734
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2735
|
+
trusted_authorities?: [{
|
2736
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2737
|
+
values: [string, ...string[]];
|
2738
|
+
}, ...{
|
2739
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2740
|
+
values: [string, ...string[]];
|
2741
|
+
}[]] | undefined;
|
1624
2742
|
meta?: {
|
1625
2743
|
vct_values?: string[] | undefined;
|
1626
2744
|
} | undefined;
|
1627
2745
|
} | {
|
1628
2746
|
id: string;
|
1629
|
-
format: "
|
2747
|
+
format: "ldp_vc" | "jwt_vc_json";
|
2748
|
+
meta: {
|
2749
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
2750
|
+
};
|
1630
2751
|
claims?: [{
|
1631
2752
|
path: [string | number | null, ...(string | number | null)[]];
|
1632
2753
|
values?: (string | number | boolean)[] | undefined;
|
@@ -1637,6 +2758,13 @@ declare namespace DcqlQuery {
|
|
1637
2758
|
id?: string | undefined;
|
1638
2759
|
}[]] | undefined;
|
1639
2760
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2761
|
+
trusted_authorities?: [{
|
2762
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2763
|
+
values: [string, ...string[]];
|
2764
|
+
}, ...{
|
2765
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2766
|
+
values: [string, ...string[]];
|
2767
|
+
}[]] | undefined;
|
1640
2768
|
}, ...({
|
1641
2769
|
id: string;
|
1642
2770
|
format: "mso_mdoc";
|
@@ -1662,6 +2790,13 @@ declare namespace DcqlQuery {
|
|
1662
2790
|
intent_to_retain?: boolean | undefined;
|
1663
2791
|
})[]] | undefined;
|
1664
2792
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2793
|
+
trusted_authorities?: [{
|
2794
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2795
|
+
values: [string, ...string[]];
|
2796
|
+
}, ...{
|
2797
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2798
|
+
values: [string, ...string[]];
|
2799
|
+
}[]] | undefined;
|
1665
2800
|
meta?: {
|
1666
2801
|
doctype_value?: string | undefined;
|
1667
2802
|
} | undefined;
|
@@ -1678,12 +2813,22 @@ declare namespace DcqlQuery {
|
|
1678
2813
|
id?: string | undefined;
|
1679
2814
|
}[]] | undefined;
|
1680
2815
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2816
|
+
trusted_authorities?: [{
|
2817
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2818
|
+
values: [string, ...string[]];
|
2819
|
+
}, ...{
|
2820
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2821
|
+
values: [string, ...string[]];
|
2822
|
+
}[]] | undefined;
|
1681
2823
|
meta?: {
|
1682
2824
|
vct_values?: string[] | undefined;
|
1683
2825
|
} | undefined;
|
1684
2826
|
} | {
|
1685
2827
|
id: string;
|
1686
|
-
format: "
|
2828
|
+
format: "ldp_vc" | "jwt_vc_json";
|
2829
|
+
meta: {
|
2830
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
2831
|
+
};
|
1687
2832
|
claims?: [{
|
1688
2833
|
path: [string | number | null, ...(string | number | null)[]];
|
1689
2834
|
values?: (string | number | boolean)[] | undefined;
|
@@ -1694,6 +2839,13 @@ declare namespace DcqlQuery {
|
|
1694
2839
|
id?: string | undefined;
|
1695
2840
|
}[]] | undefined;
|
1696
2841
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2842
|
+
trusted_authorities?: [{
|
2843
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2844
|
+
values: [string, ...string[]];
|
2845
|
+
}, ...{
|
2846
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2847
|
+
values: [string, ...string[]];
|
2848
|
+
}[]] | undefined;
|
1697
2849
|
})[]];
|
1698
2850
|
credential_matches: {
|
1699
2851
|
[x: string]: {
|
@@ -1705,17 +2857,48 @@ declare namespace DcqlQuery {
|
|
1705
2857
|
[x: string]: unknown;
|
1706
2858
|
};
|
1707
2859
|
};
|
2860
|
+
authority?: {
|
2861
|
+
type: "aki";
|
2862
|
+
value: string;
|
2863
|
+
} | {
|
2864
|
+
type: "etsi_tl";
|
2865
|
+
value: string;
|
2866
|
+
} | {
|
2867
|
+
type: "openid_federation";
|
2868
|
+
value: string;
|
2869
|
+
} | undefined;
|
1708
2870
|
} | {
|
1709
2871
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1710
2872
|
vct: string;
|
1711
2873
|
claims: {
|
1712
2874
|
[x: string]: Json;
|
1713
2875
|
};
|
2876
|
+
authority?: {
|
2877
|
+
type: "aki";
|
2878
|
+
value: string;
|
2879
|
+
} | {
|
2880
|
+
type: "etsi_tl";
|
2881
|
+
value: string;
|
2882
|
+
} | {
|
2883
|
+
type: "openid_federation";
|
2884
|
+
value: string;
|
2885
|
+
} | undefined;
|
1714
2886
|
} | {
|
1715
|
-
|
2887
|
+
type: string[];
|
2888
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
1716
2889
|
claims: {
|
1717
2890
|
[x: string]: Json;
|
1718
2891
|
};
|
2892
|
+
authority?: {
|
2893
|
+
type: "aki";
|
2894
|
+
value: string;
|
2895
|
+
} | {
|
2896
|
+
type: "etsi_tl";
|
2897
|
+
value: string;
|
2898
|
+
} | {
|
2899
|
+
type: "openid_federation";
|
2900
|
+
value: string;
|
2901
|
+
} | undefined;
|
1719
2902
|
};
|
1720
2903
|
success: true;
|
1721
2904
|
typed: true;
|
@@ -1730,17 +2913,48 @@ declare namespace DcqlQuery {
|
|
1730
2913
|
[x: string]: unknown;
|
1731
2914
|
};
|
1732
2915
|
};
|
2916
|
+
authority?: {
|
2917
|
+
type: "aki";
|
2918
|
+
value: string;
|
2919
|
+
} | {
|
2920
|
+
type: "etsi_tl";
|
2921
|
+
value: string;
|
2922
|
+
} | {
|
2923
|
+
type: "openid_federation";
|
2924
|
+
value: string;
|
2925
|
+
} | undefined;
|
1733
2926
|
} | {
|
1734
2927
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1735
2928
|
vct: string;
|
1736
2929
|
claims: {
|
1737
2930
|
[x: string]: Json;
|
1738
2931
|
};
|
2932
|
+
authority?: {
|
2933
|
+
type: "aki";
|
2934
|
+
value: string;
|
2935
|
+
} | {
|
2936
|
+
type: "etsi_tl";
|
2937
|
+
value: string;
|
2938
|
+
} | {
|
2939
|
+
type: "openid_federation";
|
2940
|
+
value: string;
|
2941
|
+
} | undefined;
|
1739
2942
|
} | {
|
1740
|
-
|
2943
|
+
type: string[];
|
2944
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
1741
2945
|
claims: {
|
1742
2946
|
[x: string]: Json;
|
1743
2947
|
};
|
2948
|
+
authority?: {
|
2949
|
+
type: "aki";
|
2950
|
+
value: string;
|
2951
|
+
} | {
|
2952
|
+
type: "etsi_tl";
|
2953
|
+
value: string;
|
2954
|
+
} | {
|
2955
|
+
type: "openid_federation";
|
2956
|
+
value: string;
|
2957
|
+
} | undefined;
|
1744
2958
|
};
|
1745
2959
|
success: true;
|
1746
2960
|
typed: true;
|
@@ -1763,17 +2977,48 @@ declare namespace DcqlQuery {
|
|
1763
2977
|
[x: string]: unknown;
|
1764
2978
|
};
|
1765
2979
|
};
|
2980
|
+
authority?: {
|
2981
|
+
type: "aki";
|
2982
|
+
value: string;
|
2983
|
+
} | {
|
2984
|
+
type: "etsi_tl";
|
2985
|
+
value: string;
|
2986
|
+
} | {
|
2987
|
+
type: "openid_federation";
|
2988
|
+
value: string;
|
2989
|
+
} | undefined;
|
1766
2990
|
} | {
|
1767
2991
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1768
2992
|
vct: string;
|
1769
2993
|
claims: {
|
1770
2994
|
[x: string]: Json;
|
1771
2995
|
};
|
2996
|
+
authority?: {
|
2997
|
+
type: "aki";
|
2998
|
+
value: string;
|
2999
|
+
} | {
|
3000
|
+
type: "etsi_tl";
|
3001
|
+
value: string;
|
3002
|
+
} | {
|
3003
|
+
type: "openid_federation";
|
3004
|
+
value: string;
|
3005
|
+
} | undefined;
|
1772
3006
|
} | {
|
1773
|
-
|
3007
|
+
type: string[];
|
3008
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
1774
3009
|
claims: {
|
1775
3010
|
[x: string]: Json;
|
1776
3011
|
};
|
3012
|
+
authority?: {
|
3013
|
+
type: "aki";
|
3014
|
+
value: string;
|
3015
|
+
} | {
|
3016
|
+
type: "etsi_tl";
|
3017
|
+
value: string;
|
3018
|
+
} | {
|
3019
|
+
type: "openid_federation";
|
3020
|
+
value: string;
|
3021
|
+
} | undefined;
|
1777
3022
|
};
|
1778
3023
|
success: true;
|
1779
3024
|
typed: true;
|
@@ -1796,17 +3041,48 @@ declare namespace DcqlQuery {
|
|
1796
3041
|
[x: string]: unknown;
|
1797
3042
|
};
|
1798
3043
|
};
|
3044
|
+
authority?: {
|
3045
|
+
type: "aki";
|
3046
|
+
value: string;
|
3047
|
+
} | {
|
3048
|
+
type: "etsi_tl";
|
3049
|
+
value: string;
|
3050
|
+
} | {
|
3051
|
+
type: "openid_federation";
|
3052
|
+
value: string;
|
3053
|
+
} | undefined;
|
1799
3054
|
} | {
|
1800
3055
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1801
3056
|
vct: string;
|
1802
3057
|
claims: {
|
1803
3058
|
[x: string]: Json;
|
1804
3059
|
};
|
3060
|
+
authority?: {
|
3061
|
+
type: "aki";
|
3062
|
+
value: string;
|
3063
|
+
} | {
|
3064
|
+
type: "etsi_tl";
|
3065
|
+
value: string;
|
3066
|
+
} | {
|
3067
|
+
type: "openid_federation";
|
3068
|
+
value: string;
|
3069
|
+
} | undefined;
|
1805
3070
|
} | {
|
1806
|
-
|
3071
|
+
type: string[];
|
3072
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
1807
3073
|
claims: {
|
1808
3074
|
[x: string]: Json;
|
1809
3075
|
};
|
3076
|
+
authority?: {
|
3077
|
+
type: "aki";
|
3078
|
+
value: string;
|
3079
|
+
} | {
|
3080
|
+
type: "etsi_tl";
|
3081
|
+
value: string;
|
3082
|
+
} | {
|
3083
|
+
type: "openid_federation";
|
3084
|
+
value: string;
|
3085
|
+
} | undefined;
|
1810
3086
|
};
|
1811
3087
|
success: true;
|
1812
3088
|
typed: true;
|
@@ -1829,17 +3105,48 @@ declare namespace DcqlQuery {
|
|
1829
3105
|
[x: string]: unknown;
|
1830
3106
|
};
|
1831
3107
|
};
|
3108
|
+
authority?: {
|
3109
|
+
type: "aki";
|
3110
|
+
value: string;
|
3111
|
+
} | {
|
3112
|
+
type: "etsi_tl";
|
3113
|
+
value: string;
|
3114
|
+
} | {
|
3115
|
+
type: "openid_federation";
|
3116
|
+
value: string;
|
3117
|
+
} | undefined;
|
1832
3118
|
} | {
|
1833
3119
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1834
3120
|
vct: string;
|
1835
3121
|
claims: {
|
1836
3122
|
[x: string]: Json;
|
1837
3123
|
};
|
3124
|
+
authority?: {
|
3125
|
+
type: "aki";
|
3126
|
+
value: string;
|
3127
|
+
} | {
|
3128
|
+
type: "etsi_tl";
|
3129
|
+
value: string;
|
3130
|
+
} | {
|
3131
|
+
type: "openid_federation";
|
3132
|
+
value: string;
|
3133
|
+
} | undefined;
|
1838
3134
|
} | {
|
1839
|
-
|
3135
|
+
type: string[];
|
3136
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
1840
3137
|
claims: {
|
1841
3138
|
[x: string]: Json;
|
1842
3139
|
};
|
3140
|
+
authority?: {
|
3141
|
+
type: "aki";
|
3142
|
+
value: string;
|
3143
|
+
} | {
|
3144
|
+
type: "etsi_tl";
|
3145
|
+
value: string;
|
3146
|
+
} | {
|
3147
|
+
type: "openid_federation";
|
3148
|
+
value: string;
|
3149
|
+
} | undefined;
|
1843
3150
|
};
|
1844
3151
|
success: true;
|
1845
3152
|
typed: true;
|
@@ -1866,17 +3173,48 @@ declare namespace DcqlQuery {
|
|
1866
3173
|
[x: string]: unknown;
|
1867
3174
|
};
|
1868
3175
|
};
|
3176
|
+
authority?: {
|
3177
|
+
type: "aki";
|
3178
|
+
value: string;
|
3179
|
+
} | {
|
3180
|
+
type: "etsi_tl";
|
3181
|
+
value: string;
|
3182
|
+
} | {
|
3183
|
+
type: "openid_federation";
|
3184
|
+
value: string;
|
3185
|
+
} | undefined;
|
1869
3186
|
} | {
|
1870
3187
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1871
3188
|
vct: string;
|
1872
3189
|
claims: {
|
1873
3190
|
[x: string]: Json;
|
1874
3191
|
};
|
3192
|
+
authority?: {
|
3193
|
+
type: "aki";
|
3194
|
+
value: string;
|
3195
|
+
} | {
|
3196
|
+
type: "etsi_tl";
|
3197
|
+
value: string;
|
3198
|
+
} | {
|
3199
|
+
type: "openid_federation";
|
3200
|
+
value: string;
|
3201
|
+
} | undefined;
|
1875
3202
|
} | {
|
1876
|
-
|
3203
|
+
type: string[];
|
3204
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
1877
3205
|
claims: {
|
1878
3206
|
[x: string]: Json;
|
1879
3207
|
};
|
3208
|
+
authority?: {
|
3209
|
+
type: "aki";
|
3210
|
+
value: string;
|
3211
|
+
} | {
|
3212
|
+
type: "etsi_tl";
|
3213
|
+
value: string;
|
3214
|
+
} | {
|
3215
|
+
type: "openid_federation";
|
3216
|
+
value: string;
|
3217
|
+
} | undefined;
|
1880
3218
|
};
|
1881
3219
|
success: true;
|
1882
3220
|
typed: true;
|
@@ -1899,17 +3237,48 @@ declare namespace DcqlQuery {
|
|
1899
3237
|
[x: string]: unknown;
|
1900
3238
|
};
|
1901
3239
|
};
|
3240
|
+
authority?: {
|
3241
|
+
type: "aki";
|
3242
|
+
value: string;
|
3243
|
+
} | {
|
3244
|
+
type: "etsi_tl";
|
3245
|
+
value: string;
|
3246
|
+
} | {
|
3247
|
+
type: "openid_federation";
|
3248
|
+
value: string;
|
3249
|
+
} | undefined;
|
1902
3250
|
} | {
|
1903
3251
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1904
3252
|
vct: string;
|
1905
3253
|
claims: {
|
1906
3254
|
[x: string]: Json;
|
1907
3255
|
};
|
3256
|
+
authority?: {
|
3257
|
+
type: "aki";
|
3258
|
+
value: string;
|
3259
|
+
} | {
|
3260
|
+
type: "etsi_tl";
|
3261
|
+
value: string;
|
3262
|
+
} | {
|
3263
|
+
type: "openid_federation";
|
3264
|
+
value: string;
|
3265
|
+
} | undefined;
|
1908
3266
|
} | {
|
1909
|
-
|
3267
|
+
type: string[];
|
3268
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
1910
3269
|
claims: {
|
1911
3270
|
[x: string]: Json;
|
1912
3271
|
};
|
3272
|
+
authority?: {
|
3273
|
+
type: "aki";
|
3274
|
+
value: string;
|
3275
|
+
} | {
|
3276
|
+
type: "etsi_tl";
|
3277
|
+
value: string;
|
3278
|
+
} | {
|
3279
|
+
type: "openid_federation";
|
3280
|
+
value: string;
|
3281
|
+
} | undefined;
|
1913
3282
|
};
|
1914
3283
|
success: true;
|
1915
3284
|
typed: true;
|
@@ -1932,17 +3301,48 @@ declare namespace DcqlQuery {
|
|
1932
3301
|
[x: string]: unknown;
|
1933
3302
|
};
|
1934
3303
|
};
|
3304
|
+
authority?: {
|
3305
|
+
type: "aki";
|
3306
|
+
value: string;
|
3307
|
+
} | {
|
3308
|
+
type: "etsi_tl";
|
3309
|
+
value: string;
|
3310
|
+
} | {
|
3311
|
+
type: "openid_federation";
|
3312
|
+
value: string;
|
3313
|
+
} | undefined;
|
1935
3314
|
} | {
|
1936
3315
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1937
3316
|
vct: string;
|
1938
3317
|
claims: {
|
1939
3318
|
[x: string]: Json;
|
1940
3319
|
};
|
3320
|
+
authority?: {
|
3321
|
+
type: "aki";
|
3322
|
+
value: string;
|
3323
|
+
} | {
|
3324
|
+
type: "etsi_tl";
|
3325
|
+
value: string;
|
3326
|
+
} | {
|
3327
|
+
type: "openid_federation";
|
3328
|
+
value: string;
|
3329
|
+
} | undefined;
|
1941
3330
|
} | {
|
1942
|
-
|
3331
|
+
type: string[];
|
3332
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
1943
3333
|
claims: {
|
1944
3334
|
[x: string]: Json;
|
1945
3335
|
};
|
3336
|
+
authority?: {
|
3337
|
+
type: "aki";
|
3338
|
+
value: string;
|
3339
|
+
} | {
|
3340
|
+
type: "etsi_tl";
|
3341
|
+
value: string;
|
3342
|
+
} | {
|
3343
|
+
type: "openid_federation";
|
3344
|
+
value: string;
|
3345
|
+
} | undefined;
|
1946
3346
|
};
|
1947
3347
|
success: true;
|
1948
3348
|
typed: true;
|
@@ -1965,17 +3365,48 @@ declare namespace DcqlQuery {
|
|
1965
3365
|
[x: string]: unknown;
|
1966
3366
|
};
|
1967
3367
|
};
|
3368
|
+
authority?: {
|
3369
|
+
type: "aki";
|
3370
|
+
value: string;
|
3371
|
+
} | {
|
3372
|
+
type: "etsi_tl";
|
3373
|
+
value: string;
|
3374
|
+
} | {
|
3375
|
+
type: "openid_federation";
|
3376
|
+
value: string;
|
3377
|
+
} | undefined;
|
1968
3378
|
} | {
|
1969
3379
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1970
3380
|
vct: string;
|
1971
3381
|
claims: {
|
1972
3382
|
[x: string]: Json;
|
1973
3383
|
};
|
3384
|
+
authority?: {
|
3385
|
+
type: "aki";
|
3386
|
+
value: string;
|
3387
|
+
} | {
|
3388
|
+
type: "etsi_tl";
|
3389
|
+
value: string;
|
3390
|
+
} | {
|
3391
|
+
type: "openid_federation";
|
3392
|
+
value: string;
|
3393
|
+
} | undefined;
|
1974
3394
|
} | {
|
1975
|
-
|
3395
|
+
type: string[];
|
3396
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
1976
3397
|
claims: {
|
1977
3398
|
[x: string]: Json;
|
1978
3399
|
};
|
3400
|
+
authority?: {
|
3401
|
+
type: "aki";
|
3402
|
+
value: string;
|
3403
|
+
} | {
|
3404
|
+
type: "etsi_tl";
|
3405
|
+
value: string;
|
3406
|
+
} | {
|
3407
|
+
type: "openid_federation";
|
3408
|
+
value: string;
|
3409
|
+
} | undefined;
|
1979
3410
|
};
|
1980
3411
|
success: true;
|
1981
3412
|
typed: true;
|
@@ -2035,6 +3466,13 @@ declare namespace DcqlQuery {
|
|
2035
3466
|
intent_to_retain?: boolean | undefined;
|
2036
3467
|
})[]] | undefined;
|
2037
3468
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3469
|
+
trusted_authorities?: [{
|
3470
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3471
|
+
values: [string, ...string[]];
|
3472
|
+
}, ...{
|
3473
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3474
|
+
values: [string, ...string[]];
|
3475
|
+
}[]] | undefined;
|
2038
3476
|
meta?: {
|
2039
3477
|
doctype_value?: string | undefined;
|
2040
3478
|
} | undefined;
|
@@ -2051,12 +3489,22 @@ declare namespace DcqlQuery {
|
|
2051
3489
|
id?: string | undefined;
|
2052
3490
|
}[]] | undefined;
|
2053
3491
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3492
|
+
trusted_authorities?: [{
|
3493
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3494
|
+
values: [string, ...string[]];
|
3495
|
+
}, ...{
|
3496
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3497
|
+
values: [string, ...string[]];
|
3498
|
+
}[]] | undefined;
|
2054
3499
|
meta?: {
|
2055
3500
|
vct_values?: string[] | undefined;
|
2056
3501
|
} | undefined;
|
2057
3502
|
} | {
|
2058
3503
|
id: string;
|
2059
|
-
format: "
|
3504
|
+
format: "ldp_vc" | "jwt_vc_json";
|
3505
|
+
meta: {
|
3506
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
3507
|
+
};
|
2060
3508
|
claims?: [{
|
2061
3509
|
path: [string | number | null, ...(string | number | null)[]];
|
2062
3510
|
values?: (string | number | boolean)[] | undefined;
|
@@ -2067,6 +3515,13 @@ declare namespace DcqlQuery {
|
|
2067
3515
|
id?: string | undefined;
|
2068
3516
|
}[]] | undefined;
|
2069
3517
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3518
|
+
trusted_authorities?: [{
|
3519
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3520
|
+
values: [string, ...string[]];
|
3521
|
+
}, ...{
|
3522
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3523
|
+
values: [string, ...string[]];
|
3524
|
+
}[]] | undefined;
|
2070
3525
|
}, ...({
|
2071
3526
|
id: string;
|
2072
3527
|
format: "mso_mdoc";
|
@@ -2092,6 +3547,13 @@ declare namespace DcqlQuery {
|
|
2092
3547
|
intent_to_retain?: boolean | undefined;
|
2093
3548
|
})[]] | undefined;
|
2094
3549
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3550
|
+
trusted_authorities?: [{
|
3551
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3552
|
+
values: [string, ...string[]];
|
3553
|
+
}, ...{
|
3554
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3555
|
+
values: [string, ...string[]];
|
3556
|
+
}[]] | undefined;
|
2095
3557
|
meta?: {
|
2096
3558
|
doctype_value?: string | undefined;
|
2097
3559
|
} | undefined;
|
@@ -2108,12 +3570,22 @@ declare namespace DcqlQuery {
|
|
2108
3570
|
id?: string | undefined;
|
2109
3571
|
}[]] | undefined;
|
2110
3572
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3573
|
+
trusted_authorities?: [{
|
3574
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3575
|
+
values: [string, ...string[]];
|
3576
|
+
}, ...{
|
3577
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3578
|
+
values: [string, ...string[]];
|
3579
|
+
}[]] | undefined;
|
2111
3580
|
meta?: {
|
2112
3581
|
vct_values?: string[] | undefined;
|
2113
3582
|
} | undefined;
|
2114
3583
|
} | {
|
2115
3584
|
id: string;
|
2116
|
-
format: "
|
3585
|
+
format: "ldp_vc" | "jwt_vc_json";
|
3586
|
+
meta: {
|
3587
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
3588
|
+
};
|
2117
3589
|
claims?: [{
|
2118
3590
|
path: [string | number | null, ...(string | number | null)[]];
|
2119
3591
|
values?: (string | number | boolean)[] | undefined;
|
@@ -2124,6 +3596,13 @@ declare namespace DcqlQuery {
|
|
2124
3596
|
id?: string | undefined;
|
2125
3597
|
}[]] | undefined;
|
2126
3598
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3599
|
+
trusted_authorities?: [{
|
3600
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3601
|
+
values: [string, ...string[]];
|
3602
|
+
}, ...{
|
3603
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3604
|
+
values: [string, ...string[]];
|
3605
|
+
}[]] | undefined;
|
2127
3606
|
})[]];
|
2128
3607
|
credential_sets?: [{
|
2129
3608
|
options: [string[], ...string[][]];
|
@@ -2158,13 +3637,44 @@ declare namespace DcqlPresentationResult {
|
|
2158
3637
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
2159
3638
|
readonly doctype: v.StringSchema<undefined>;
|
2160
3639
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
3640
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
3641
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
3642
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
3643
|
+
}, undefined>, v.ObjectSchema<{
|
3644
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
3645
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
3646
|
+
}, undefined>, v.ObjectSchema<{
|
3647
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
3648
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
3649
|
+
}, undefined>], undefined>, undefined>;
|
2161
3650
|
}, undefined>, v.ObjectSchema<{
|
2162
3651
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
2163
3652
|
readonly vct: v.StringSchema<undefined>;
|
2164
3653
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
3654
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
3655
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
3656
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
3657
|
+
}, undefined>, v.ObjectSchema<{
|
3658
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
3659
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
3660
|
+
}, undefined>, v.ObjectSchema<{
|
3661
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
3662
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
3663
|
+
}, undefined>], undefined>, undefined>;
|
2165
3664
|
}, undefined>, v.ObjectSchema<{
|
2166
|
-
readonly credential_format: v.PicklistSchema<["
|
3665
|
+
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
2167
3666
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
3667
|
+
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
3668
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
3669
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
3670
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
3671
|
+
}, undefined>, v.ObjectSchema<{
|
3672
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
3673
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
3674
|
+
}, undefined>, v.ObjectSchema<{
|
3675
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
3676
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
3677
|
+
}, undefined>], undefined>, undefined>;
|
2168
3678
|
}, undefined>], undefined>;
|
2169
3679
|
readonly success: v.LiteralSchema<true, undefined>;
|
2170
3680
|
readonly typed: v.LiteralSchema<true, undefined>;
|
@@ -2230,6 +3740,22 @@ declare namespace DcqlPresentationResult {
|
|
2230
3740
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
2231
3741
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
2232
3742
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
3743
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
3744
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
3745
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
3746
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
3747
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3748
|
+
values: [string, ...string[]];
|
3749
|
+
}, ...{
|
3750
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3751
|
+
values: [string, ...string[]];
|
3752
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
3753
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3754
|
+
values: [string, ...string[]];
|
3755
|
+
}, ...{
|
3756
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3757
|
+
values: [string, ...string[]];
|
3758
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
2233
3759
|
}, undefined>, v.ObjectSchema<{
|
2234
3760
|
readonly format: v.SchemaWithPipe<[v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>, v.DescriptionAction<"vc+sd-jwt" | "dc+sd-jwt", "REQUIRED. A string that specifies the format of the requested Verifiable Credential.">]>;
|
2235
3761
|
readonly claims: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
@@ -2262,8 +3788,24 @@ declare namespace DcqlPresentationResult {
|
|
2262
3788
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
2263
3789
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
2264
3790
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
3791
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
3792
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
3793
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
3794
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
3795
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3796
|
+
values: [string, ...string[]];
|
3797
|
+
}, ...{
|
3798
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3799
|
+
values: [string, ...string[]];
|
3800
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
3801
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3802
|
+
values: [string, ...string[]];
|
3803
|
+
}, ...{
|
3804
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3805
|
+
values: [string, ...string[]];
|
3806
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
2265
3807
|
}, undefined>, v.ObjectSchema<{
|
2266
|
-
readonly format: v.PicklistSchema<["jwt_vc_json", "
|
3808
|
+
readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
|
2267
3809
|
readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
2268
3810
|
readonly id: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.DescriptionAction<string | undefined, "A string identifying the particular claim. The value MUST be a non-empty string consisting of alphanumeric, underscore (_) or hyphen (-) characters. Within the particular claims array, the same id MUST NOT be present more than once.">]>;
|
2269
3811
|
readonly path: v.SchemaWithPipe<[v.ArraySchema<v.UnionSchema<[v.StringSchema<undefined>, v.SchemaWithPipe<[v.NumberSchema<undefined>, v.IntegerAction<number, undefined>, v.MinValueAction<number, 0, undefined>]>, v.NullSchema<undefined>], undefined>, undefined>, v.CustomSchema<[string | number | null, ...(string | number | null)[]], undefined>, v.DescriptionAction<[string | number | null, ...(string | number | null)[]], "A non-empty array representing a claims path pointer that specifies the path to a claim within the Verifiable Credential.">]>;
|
@@ -2277,8 +3819,29 @@ declare namespace DcqlPresentationResult {
|
|
2277
3819
|
values?: (string | number | boolean)[] | undefined;
|
2278
3820
|
id?: string | undefined;
|
2279
3821
|
}[]], undefined>]>, undefined>;
|
3822
|
+
readonly meta: v.SchemaWithPipe<[v.SchemaWithPipe<[v.ObjectSchema<{
|
3823
|
+
readonly type_values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.StringSchema<undefined>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]], "REQUIRED. An array of string arrays that specifies the fully expanded types (IRIs) after the @context was applied that the Verifier accepts to be presented in the Presentation. Each of the top-level arrays specifies one alternative to match the type values of the Verifiable Credential against. Each inner array specifies a set of fully expanded types that MUST be present in the type property of the Verifiable Credential, regardless of order or the presence of additional types.">]>;
|
3824
|
+
}, undefined>]>, v.DescriptionAction<{
|
3825
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
3826
|
+
}, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
2280
3827
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
2281
3828
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
3829
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
3830
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
3831
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
3832
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
3833
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3834
|
+
values: [string, ...string[]];
|
3835
|
+
}, ...{
|
3836
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3837
|
+
values: [string, ...string[]];
|
3838
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
3839
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3840
|
+
values: [string, ...string[]];
|
3841
|
+
}, ...{
|
3842
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3843
|
+
values: [string, ...string[]];
|
3844
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
2282
3845
|
}, undefined>], undefined>, undefined>, v.CustomSchema<[{
|
2283
3846
|
id: string;
|
2284
3847
|
format: "mso_mdoc";
|
@@ -2304,6 +3867,13 @@ declare namespace DcqlPresentationResult {
|
|
2304
3867
|
intent_to_retain?: boolean | undefined;
|
2305
3868
|
})[]] | undefined;
|
2306
3869
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3870
|
+
trusted_authorities?: [{
|
3871
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3872
|
+
values: [string, ...string[]];
|
3873
|
+
}, ...{
|
3874
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3875
|
+
values: [string, ...string[]];
|
3876
|
+
}[]] | undefined;
|
2307
3877
|
meta?: {
|
2308
3878
|
doctype_value?: string | undefined;
|
2309
3879
|
} | undefined;
|
@@ -2320,12 +3890,22 @@ declare namespace DcqlPresentationResult {
|
|
2320
3890
|
id?: string | undefined;
|
2321
3891
|
}[]] | undefined;
|
2322
3892
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3893
|
+
trusted_authorities?: [{
|
3894
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3895
|
+
values: [string, ...string[]];
|
3896
|
+
}, ...{
|
3897
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3898
|
+
values: [string, ...string[]];
|
3899
|
+
}[]] | undefined;
|
2323
3900
|
meta?: {
|
2324
3901
|
vct_values?: string[] | undefined;
|
2325
3902
|
} | undefined;
|
2326
3903
|
} | {
|
2327
3904
|
id: string;
|
2328
|
-
format: "
|
3905
|
+
format: "ldp_vc" | "jwt_vc_json";
|
3906
|
+
meta: {
|
3907
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
3908
|
+
};
|
2329
3909
|
claims?: [{
|
2330
3910
|
path: [string | number | null, ...(string | number | null)[]];
|
2331
3911
|
values?: (string | number | boolean)[] | undefined;
|
@@ -2336,6 +3916,13 @@ declare namespace DcqlPresentationResult {
|
|
2336
3916
|
id?: string | undefined;
|
2337
3917
|
}[]] | undefined;
|
2338
3918
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3919
|
+
trusted_authorities?: [{
|
3920
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3921
|
+
values: [string, ...string[]];
|
3922
|
+
}, ...{
|
3923
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3924
|
+
values: [string, ...string[]];
|
3925
|
+
}[]] | undefined;
|
2339
3926
|
}, ...({
|
2340
3927
|
id: string;
|
2341
3928
|
format: "mso_mdoc";
|
@@ -2361,6 +3948,13 @@ declare namespace DcqlPresentationResult {
|
|
2361
3948
|
intent_to_retain?: boolean | undefined;
|
2362
3949
|
})[]] | undefined;
|
2363
3950
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3951
|
+
trusted_authorities?: [{
|
3952
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3953
|
+
values: [string, ...string[]];
|
3954
|
+
}, ...{
|
3955
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3956
|
+
values: [string, ...string[]];
|
3957
|
+
}[]] | undefined;
|
2364
3958
|
meta?: {
|
2365
3959
|
doctype_value?: string | undefined;
|
2366
3960
|
} | undefined;
|
@@ -2377,12 +3971,22 @@ declare namespace DcqlPresentationResult {
|
|
2377
3971
|
id?: string | undefined;
|
2378
3972
|
}[]] | undefined;
|
2379
3973
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3974
|
+
trusted_authorities?: [{
|
3975
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3976
|
+
values: [string, ...string[]];
|
3977
|
+
}, ...{
|
3978
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3979
|
+
values: [string, ...string[]];
|
3980
|
+
}[]] | undefined;
|
2380
3981
|
meta?: {
|
2381
3982
|
vct_values?: string[] | undefined;
|
2382
3983
|
} | undefined;
|
2383
3984
|
} | {
|
2384
3985
|
id: string;
|
2385
|
-
format: "
|
3986
|
+
format: "ldp_vc" | "jwt_vc_json";
|
3987
|
+
meta: {
|
3988
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
3989
|
+
};
|
2386
3990
|
claims?: [{
|
2387
3991
|
path: [string | number | null, ...(string | number | null)[]];
|
2388
3992
|
values?: (string | number | boolean)[] | undefined;
|
@@ -2393,6 +3997,13 @@ declare namespace DcqlPresentationResult {
|
|
2393
3997
|
id?: string | undefined;
|
2394
3998
|
}[]] | undefined;
|
2395
3999
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4000
|
+
trusted_authorities?: [{
|
4001
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4002
|
+
values: [string, ...string[]];
|
4003
|
+
}, ...{
|
4004
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4005
|
+
values: [string, ...string[]];
|
4006
|
+
}[]] | undefined;
|
2396
4007
|
})[]], undefined>, v.DescriptionAction<[{
|
2397
4008
|
id: string;
|
2398
4009
|
format: "mso_mdoc";
|
@@ -2418,6 +4029,13 @@ declare namespace DcqlPresentationResult {
|
|
2418
4029
|
intent_to_retain?: boolean | undefined;
|
2419
4030
|
})[]] | undefined;
|
2420
4031
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4032
|
+
trusted_authorities?: [{
|
4033
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4034
|
+
values: [string, ...string[]];
|
4035
|
+
}, ...{
|
4036
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4037
|
+
values: [string, ...string[]];
|
4038
|
+
}[]] | undefined;
|
2421
4039
|
meta?: {
|
2422
4040
|
doctype_value?: string | undefined;
|
2423
4041
|
} | undefined;
|
@@ -2434,12 +4052,22 @@ declare namespace DcqlPresentationResult {
|
|
2434
4052
|
id?: string | undefined;
|
2435
4053
|
}[]] | undefined;
|
2436
4054
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4055
|
+
trusted_authorities?: [{
|
4056
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4057
|
+
values: [string, ...string[]];
|
4058
|
+
}, ...{
|
4059
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4060
|
+
values: [string, ...string[]];
|
4061
|
+
}[]] | undefined;
|
2437
4062
|
meta?: {
|
2438
4063
|
vct_values?: string[] | undefined;
|
2439
4064
|
} | undefined;
|
2440
4065
|
} | {
|
2441
4066
|
id: string;
|
2442
|
-
format: "
|
4067
|
+
format: "ldp_vc" | "jwt_vc_json";
|
4068
|
+
meta: {
|
4069
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
4070
|
+
};
|
2443
4071
|
claims?: [{
|
2444
4072
|
path: [string | number | null, ...(string | number | null)[]];
|
2445
4073
|
values?: (string | number | boolean)[] | undefined;
|
@@ -2450,6 +4078,13 @@ declare namespace DcqlPresentationResult {
|
|
2450
4078
|
id?: string | undefined;
|
2451
4079
|
}[]] | undefined;
|
2452
4080
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4081
|
+
trusted_authorities?: [{
|
4082
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4083
|
+
values: [string, ...string[]];
|
4084
|
+
}, ...{
|
4085
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4086
|
+
values: [string, ...string[]];
|
4087
|
+
}[]] | undefined;
|
2453
4088
|
}, ...({
|
2454
4089
|
id: string;
|
2455
4090
|
format: "mso_mdoc";
|
@@ -2475,6 +4110,13 @@ declare namespace DcqlPresentationResult {
|
|
2475
4110
|
intent_to_retain?: boolean | undefined;
|
2476
4111
|
})[]] | undefined;
|
2477
4112
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4113
|
+
trusted_authorities?: [{
|
4114
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4115
|
+
values: [string, ...string[]];
|
4116
|
+
}, ...{
|
4117
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4118
|
+
values: [string, ...string[]];
|
4119
|
+
}[]] | undefined;
|
2478
4120
|
meta?: {
|
2479
4121
|
doctype_value?: string | undefined;
|
2480
4122
|
} | undefined;
|
@@ -2491,12 +4133,22 @@ declare namespace DcqlPresentationResult {
|
|
2491
4133
|
id?: string | undefined;
|
2492
4134
|
}[]] | undefined;
|
2493
4135
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4136
|
+
trusted_authorities?: [{
|
4137
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4138
|
+
values: [string, ...string[]];
|
4139
|
+
}, ...{
|
4140
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4141
|
+
values: [string, ...string[]];
|
4142
|
+
}[]] | undefined;
|
2494
4143
|
meta?: {
|
2495
4144
|
vct_values?: string[] | undefined;
|
2496
4145
|
} | undefined;
|
2497
4146
|
} | {
|
2498
4147
|
id: string;
|
2499
|
-
format: "
|
4148
|
+
format: "ldp_vc" | "jwt_vc_json";
|
4149
|
+
meta: {
|
4150
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
4151
|
+
};
|
2500
4152
|
claims?: [{
|
2501
4153
|
path: [string | number | null, ...(string | number | null)[]];
|
2502
4154
|
values?: (string | number | boolean)[] | undefined;
|
@@ -2507,6 +4159,13 @@ declare namespace DcqlPresentationResult {
|
|
2507
4159
|
id?: string | undefined;
|
2508
4160
|
}[]] | undefined;
|
2509
4161
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4162
|
+
trusted_authorities?: [{
|
4163
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4164
|
+
values: [string, ...string[]];
|
4165
|
+
}, ...{
|
4166
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4167
|
+
values: [string, ...string[]];
|
4168
|
+
}[]] | undefined;
|
2510
4169
|
})[]], "REQUIRED. A non-empty array of Credential Queries that specify the requested Verifiable Credentials.">]>;
|
2511
4170
|
readonly credential_sets: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
2512
4171
|
readonly matching_options: v.UnionSchema<[v.UndefinedSchema<undefined>, v.SchemaWithPipe<[v.ArraySchema<v.ArraySchema<v.StringSchema<undefined>, undefined>, undefined>, v.CustomSchema<[string[], ...string[][]], undefined>]>], undefined>;
|
@@ -2574,6 +4233,13 @@ declare namespace DcqlPresentationResult {
|
|
2574
4233
|
intent_to_retain?: boolean | undefined;
|
2575
4234
|
})[]] | undefined;
|
2576
4235
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4236
|
+
trusted_authorities?: [{
|
4237
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4238
|
+
values: [string, ...string[]];
|
4239
|
+
}, ...{
|
4240
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4241
|
+
values: [string, ...string[]];
|
4242
|
+
}[]] | undefined;
|
2577
4243
|
meta?: {
|
2578
4244
|
doctype_value?: string | undefined;
|
2579
4245
|
} | undefined;
|
@@ -2590,12 +4256,22 @@ declare namespace DcqlPresentationResult {
|
|
2590
4256
|
id?: string | undefined;
|
2591
4257
|
}[]] | undefined;
|
2592
4258
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4259
|
+
trusted_authorities?: [{
|
4260
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4261
|
+
values: [string, ...string[]];
|
4262
|
+
}, ...{
|
4263
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4264
|
+
values: [string, ...string[]];
|
4265
|
+
}[]] | undefined;
|
2593
4266
|
meta?: {
|
2594
4267
|
vct_values?: string[] | undefined;
|
2595
4268
|
} | undefined;
|
2596
4269
|
} | {
|
2597
4270
|
id: string;
|
2598
|
-
format: "
|
4271
|
+
format: "ldp_vc" | "jwt_vc_json";
|
4272
|
+
meta: {
|
4273
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
4274
|
+
};
|
2599
4275
|
claims?: [{
|
2600
4276
|
path: [string | number | null, ...(string | number | null)[]];
|
2601
4277
|
values?: (string | number | boolean)[] | undefined;
|
@@ -2606,6 +4282,13 @@ declare namespace DcqlPresentationResult {
|
|
2606
4282
|
id?: string | undefined;
|
2607
4283
|
}[]] | undefined;
|
2608
4284
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4285
|
+
trusted_authorities?: [{
|
4286
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4287
|
+
values: [string, ...string[]];
|
4288
|
+
}, ...{
|
4289
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4290
|
+
values: [string, ...string[]];
|
4291
|
+
}[]] | undefined;
|
2609
4292
|
}, ...({
|
2610
4293
|
id: string;
|
2611
4294
|
format: "mso_mdoc";
|
@@ -2631,6 +4314,13 @@ declare namespace DcqlPresentationResult {
|
|
2631
4314
|
intent_to_retain?: boolean | undefined;
|
2632
4315
|
})[]] | undefined;
|
2633
4316
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4317
|
+
trusted_authorities?: [{
|
4318
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4319
|
+
values: [string, ...string[]];
|
4320
|
+
}, ...{
|
4321
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4322
|
+
values: [string, ...string[]];
|
4323
|
+
}[]] | undefined;
|
2634
4324
|
meta?: {
|
2635
4325
|
doctype_value?: string | undefined;
|
2636
4326
|
} | undefined;
|
@@ -2647,12 +4337,22 @@ declare namespace DcqlPresentationResult {
|
|
2647
4337
|
id?: string | undefined;
|
2648
4338
|
}[]] | undefined;
|
2649
4339
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4340
|
+
trusted_authorities?: [{
|
4341
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4342
|
+
values: [string, ...string[]];
|
4343
|
+
}, ...{
|
4344
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4345
|
+
values: [string, ...string[]];
|
4346
|
+
}[]] | undefined;
|
2650
4347
|
meta?: {
|
2651
4348
|
vct_values?: string[] | undefined;
|
2652
4349
|
} | undefined;
|
2653
4350
|
} | {
|
2654
4351
|
id: string;
|
2655
|
-
format: "
|
4352
|
+
format: "ldp_vc" | "jwt_vc_json";
|
4353
|
+
meta: {
|
4354
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
4355
|
+
};
|
2656
4356
|
claims?: [{
|
2657
4357
|
path: [string | number | null, ...(string | number | null)[]];
|
2658
4358
|
values?: (string | number | boolean)[] | undefined;
|
@@ -2663,6 +4363,13 @@ declare namespace DcqlPresentationResult {
|
|
2663
4363
|
id?: string | undefined;
|
2664
4364
|
}[]] | undefined;
|
2665
4365
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4366
|
+
trusted_authorities?: [{
|
4367
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4368
|
+
values: [string, ...string[]];
|
4369
|
+
}, ...{
|
4370
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4371
|
+
values: [string, ...string[]];
|
4372
|
+
}[]] | undefined;
|
2666
4373
|
})[]];
|
2667
4374
|
canBeSatisfied: boolean;
|
2668
4375
|
invalid_matches: {
|
@@ -2685,17 +4392,48 @@ declare namespace DcqlPresentationResult {
|
|
2685
4392
|
[x: string]: unknown;
|
2686
4393
|
};
|
2687
4394
|
};
|
4395
|
+
authority?: {
|
4396
|
+
type: "aki";
|
4397
|
+
value: string;
|
4398
|
+
} | {
|
4399
|
+
type: "etsi_tl";
|
4400
|
+
value: string;
|
4401
|
+
} | {
|
4402
|
+
type: "openid_federation";
|
4403
|
+
value: string;
|
4404
|
+
} | undefined;
|
2688
4405
|
} | {
|
2689
4406
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
2690
4407
|
vct: string;
|
2691
4408
|
claims: {
|
2692
4409
|
[x: string]: Json;
|
2693
4410
|
};
|
4411
|
+
authority?: {
|
4412
|
+
type: "aki";
|
4413
|
+
value: string;
|
4414
|
+
} | {
|
4415
|
+
type: "etsi_tl";
|
4416
|
+
value: string;
|
4417
|
+
} | {
|
4418
|
+
type: "openid_federation";
|
4419
|
+
value: string;
|
4420
|
+
} | undefined;
|
2694
4421
|
} | {
|
2695
|
-
|
4422
|
+
type: string[];
|
4423
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
2696
4424
|
claims: {
|
2697
4425
|
[x: string]: Json;
|
2698
4426
|
};
|
4427
|
+
authority?: {
|
4428
|
+
type: "aki";
|
4429
|
+
value: string;
|
4430
|
+
} | {
|
4431
|
+
type: "etsi_tl";
|
4432
|
+
value: string;
|
4433
|
+
} | {
|
4434
|
+
type: "openid_federation";
|
4435
|
+
value: string;
|
4436
|
+
} | undefined;
|
2699
4437
|
};
|
2700
4438
|
success: true;
|
2701
4439
|
typed: true;
|
@@ -2755,6 +4493,13 @@ declare namespace DcqlPresentationResult {
|
|
2755
4493
|
intent_to_retain?: boolean | undefined;
|
2756
4494
|
})[]] | undefined;
|
2757
4495
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4496
|
+
trusted_authorities?: [{
|
4497
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4498
|
+
values: [string, ...string[]];
|
4499
|
+
}, ...{
|
4500
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4501
|
+
values: [string, ...string[]];
|
4502
|
+
}[]] | undefined;
|
2758
4503
|
meta?: {
|
2759
4504
|
doctype_value?: string | undefined;
|
2760
4505
|
} | undefined;
|
@@ -2771,12 +4516,22 @@ declare namespace DcqlPresentationResult {
|
|
2771
4516
|
id?: string | undefined;
|
2772
4517
|
}[]] | undefined;
|
2773
4518
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4519
|
+
trusted_authorities?: [{
|
4520
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4521
|
+
values: [string, ...string[]];
|
4522
|
+
}, ...{
|
4523
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4524
|
+
values: [string, ...string[]];
|
4525
|
+
}[]] | undefined;
|
2774
4526
|
meta?: {
|
2775
4527
|
vct_values?: string[] | undefined;
|
2776
4528
|
} | undefined;
|
2777
4529
|
} | {
|
2778
4530
|
id: string;
|
2779
|
-
format: "
|
4531
|
+
format: "ldp_vc" | "jwt_vc_json";
|
4532
|
+
meta: {
|
4533
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
4534
|
+
};
|
2780
4535
|
claims?: [{
|
2781
4536
|
path: [string | number | null, ...(string | number | null)[]];
|
2782
4537
|
values?: (string | number | boolean)[] | undefined;
|
@@ -2787,6 +4542,13 @@ declare namespace DcqlPresentationResult {
|
|
2787
4542
|
id?: string | undefined;
|
2788
4543
|
}[]] | undefined;
|
2789
4544
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4545
|
+
trusted_authorities?: [{
|
4546
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4547
|
+
values: [string, ...string[]];
|
4548
|
+
}, ...{
|
4549
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4550
|
+
values: [string, ...string[]];
|
4551
|
+
}[]] | undefined;
|
2790
4552
|
}, ...({
|
2791
4553
|
id: string;
|
2792
4554
|
format: "mso_mdoc";
|
@@ -2812,6 +4574,13 @@ declare namespace DcqlPresentationResult {
|
|
2812
4574
|
intent_to_retain?: boolean | undefined;
|
2813
4575
|
})[]] | undefined;
|
2814
4576
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4577
|
+
trusted_authorities?: [{
|
4578
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4579
|
+
values: [string, ...string[]];
|
4580
|
+
}, ...{
|
4581
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4582
|
+
values: [string, ...string[]];
|
4583
|
+
}[]] | undefined;
|
2815
4584
|
meta?: {
|
2816
4585
|
doctype_value?: string | undefined;
|
2817
4586
|
} | undefined;
|
@@ -2828,12 +4597,22 @@ declare namespace DcqlPresentationResult {
|
|
2828
4597
|
id?: string | undefined;
|
2829
4598
|
}[]] | undefined;
|
2830
4599
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4600
|
+
trusted_authorities?: [{
|
4601
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4602
|
+
values: [string, ...string[]];
|
4603
|
+
}, ...{
|
4604
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4605
|
+
values: [string, ...string[]];
|
4606
|
+
}[]] | undefined;
|
2831
4607
|
meta?: {
|
2832
4608
|
vct_values?: string[] | undefined;
|
2833
4609
|
} | undefined;
|
2834
4610
|
} | {
|
2835
4611
|
id: string;
|
2836
|
-
format: "
|
4612
|
+
format: "ldp_vc" | "jwt_vc_json";
|
4613
|
+
meta: {
|
4614
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
4615
|
+
};
|
2837
4616
|
claims?: [{
|
2838
4617
|
path: [string | number | null, ...(string | number | null)[]];
|
2839
4618
|
values?: (string | number | boolean)[] | undefined;
|
@@ -2844,6 +4623,13 @@ declare namespace DcqlPresentationResult {
|
|
2844
4623
|
id?: string | undefined;
|
2845
4624
|
}[]] | undefined;
|
2846
4625
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4626
|
+
trusted_authorities?: [{
|
4627
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4628
|
+
values: [string, ...string[]];
|
4629
|
+
}, ...{
|
4630
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4631
|
+
values: [string, ...string[]];
|
4632
|
+
}[]] | undefined;
|
2847
4633
|
})[]];
|
2848
4634
|
canBeSatisfied: boolean;
|
2849
4635
|
invalid_matches: {
|
@@ -2866,17 +4652,48 @@ declare namespace DcqlPresentationResult {
|
|
2866
4652
|
[x: string]: unknown;
|
2867
4653
|
};
|
2868
4654
|
};
|
4655
|
+
authority?: {
|
4656
|
+
type: "aki";
|
4657
|
+
value: string;
|
4658
|
+
} | {
|
4659
|
+
type: "etsi_tl";
|
4660
|
+
value: string;
|
4661
|
+
} | {
|
4662
|
+
type: "openid_federation";
|
4663
|
+
value: string;
|
4664
|
+
} | undefined;
|
2869
4665
|
} | {
|
2870
4666
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
2871
4667
|
vct: string;
|
2872
4668
|
claims: {
|
2873
4669
|
[x: string]: Json;
|
2874
4670
|
};
|
4671
|
+
authority?: {
|
4672
|
+
type: "aki";
|
4673
|
+
value: string;
|
4674
|
+
} | {
|
4675
|
+
type: "etsi_tl";
|
4676
|
+
value: string;
|
4677
|
+
} | {
|
4678
|
+
type: "openid_federation";
|
4679
|
+
value: string;
|
4680
|
+
} | undefined;
|
2875
4681
|
} | {
|
2876
|
-
|
4682
|
+
type: string[];
|
4683
|
+
credential_format: "ldp_vc" | "jwt_vc_json";
|
2877
4684
|
claims: {
|
2878
4685
|
[x: string]: Json;
|
2879
4686
|
};
|
4687
|
+
authority?: {
|
4688
|
+
type: "aki";
|
4689
|
+
value: string;
|
4690
|
+
} | {
|
4691
|
+
type: "etsi_tl";
|
4692
|
+
value: string;
|
4693
|
+
} | {
|
4694
|
+
type: "openid_federation";
|
4695
|
+
value: string;
|
4696
|
+
} | undefined;
|
2880
4697
|
};
|
2881
4698
|
success: true;
|
2882
4699
|
typed: true;
|
@@ -2979,6 +4796,37 @@ declare namespace DcqlClaimsQuery {
|
|
2979
4796
|
}
|
2980
4797
|
type DcqlClaimsQuery = DcqlClaimsQuery.Out;
|
2981
4798
|
|
4799
|
+
/**
|
4800
|
+
* Specifies trusted authorities within a requested Credential.
|
4801
|
+
*/
|
4802
|
+
declare namespace DcqlTrustedAuthoritiesQuery {
|
4803
|
+
const vModel: v.VariantSchema<"type", v.ObjectSchema<{
|
4804
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
4805
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
4806
|
+
}, undefined>[], undefined>;
|
4807
|
+
type Input = v.InferInput<typeof vModel>;
|
4808
|
+
type Out = v.InferOutput<typeof vModel>;
|
4809
|
+
}
|
4810
|
+
type DcqlTrustedAuthoritiesQuery = DcqlTrustedAuthoritiesQuery.Out;
|
4811
|
+
/**
|
4812
|
+
* Specifies trusted authorities within a requested Credential.
|
4813
|
+
*/
|
4814
|
+
declare namespace DcqlCredentialTrustedAuthority {
|
4815
|
+
const vModel: v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
4816
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
4817
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
4818
|
+
}, undefined>, v.ObjectSchema<{
|
4819
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
4820
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
4821
|
+
}, undefined>, v.ObjectSchema<{
|
4822
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
4823
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
4824
|
+
}, undefined>], undefined>;
|
4825
|
+
type Input = v.InferInput<typeof vModel>;
|
4826
|
+
type Out = v.InferOutput<typeof vModel>;
|
4827
|
+
}
|
4828
|
+
type DcqlCredentialTrustedAuthority = DcqlCredentialTrustedAuthority.Out;
|
4829
|
+
|
2982
4830
|
/**
|
2983
4831
|
* A Credential Query is an object representing a request for a presentation of one Credential.
|
2984
4832
|
*/
|
@@ -3043,6 +4891,22 @@ declare namespace DcqlCredentialQuery {
|
|
3043
4891
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
3044
4892
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
3045
4893
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
4894
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
4895
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
4896
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
4897
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
4898
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4899
|
+
values: [string, ...string[]];
|
4900
|
+
}, ...{
|
4901
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4902
|
+
values: [string, ...string[]];
|
4903
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
4904
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4905
|
+
values: [string, ...string[]];
|
4906
|
+
}, ...{
|
4907
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4908
|
+
values: [string, ...string[]];
|
4909
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
3046
4910
|
}, undefined>;
|
3047
4911
|
type Mdoc = v.InferOutput<typeof vMdoc>;
|
3048
4912
|
const vSdJwtVc: v.ObjectSchema<{
|
@@ -3077,10 +4941,26 @@ declare namespace DcqlCredentialQuery {
|
|
3077
4941
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
3078
4942
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
3079
4943
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
4944
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
4945
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
4946
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
4947
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
4948
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4949
|
+
values: [string, ...string[]];
|
4950
|
+
}, ...{
|
4951
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4952
|
+
values: [string, ...string[]];
|
4953
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
4954
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4955
|
+
values: [string, ...string[]];
|
4956
|
+
}, ...{
|
4957
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4958
|
+
values: [string, ...string[]];
|
4959
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
3080
4960
|
}, undefined>;
|
3081
4961
|
type SdJwtVc = v.InferOutput<typeof vSdJwtVc>;
|
3082
4962
|
const vW3cVc: v.ObjectSchema<{
|
3083
|
-
readonly format: v.PicklistSchema<["jwt_vc_json", "
|
4963
|
+
readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
|
3084
4964
|
readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
3085
4965
|
readonly id: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.DescriptionAction<string | undefined, "A string identifying the particular claim. The value MUST be a non-empty string consisting of alphanumeric, underscore (_) or hyphen (-) characters. Within the particular claims array, the same id MUST NOT be present more than once.">]>;
|
3086
4966
|
readonly path: v.SchemaWithPipe<[v.ArraySchema<v.UnionSchema<[v.StringSchema<undefined>, v.SchemaWithPipe<[v.NumberSchema<undefined>, v.IntegerAction<number, undefined>, v.MinValueAction<number, 0, undefined>]>, v.NullSchema<undefined>], undefined>, undefined>, v.CustomSchema<[string | number | null, ...(string | number | null)[]], undefined>, v.DescriptionAction<[string | number | null, ...(string | number | null)[]], "A non-empty array representing a claims path pointer that specifies the path to a claim within the Verifiable Credential.">]>;
|
@@ -3094,8 +4974,29 @@ declare namespace DcqlCredentialQuery {
|
|
3094
4974
|
values?: (string | number | boolean)[] | undefined;
|
3095
4975
|
id?: string | undefined;
|
3096
4976
|
}[]], undefined>]>, undefined>;
|
4977
|
+
readonly meta: v.SchemaWithPipe<[v.SchemaWithPipe<[v.ObjectSchema<{
|
4978
|
+
readonly type_values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.StringSchema<undefined>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]], "REQUIRED. An array of string arrays that specifies the fully expanded types (IRIs) after the @context was applied that the Verifier accepts to be presented in the Presentation. Each of the top-level arrays specifies one alternative to match the type values of the Verifiable Credential against. Each inner array specifies a set of fully expanded types that MUST be present in the type property of the Verifiable Credential, regardless of order or the presence of additional types.">]>;
|
4979
|
+
}, undefined>]>, v.DescriptionAction<{
|
4980
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
4981
|
+
}, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
3097
4982
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
3098
4983
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
4984
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
4985
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
4986
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
4987
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
4988
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4989
|
+
values: [string, ...string[]];
|
4990
|
+
}, ...{
|
4991
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4992
|
+
values: [string, ...string[]];
|
4993
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
4994
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4995
|
+
values: [string, ...string[]];
|
4996
|
+
}, ...{
|
4997
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4998
|
+
values: [string, ...string[]];
|
4999
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
3099
5000
|
}, undefined>;
|
3100
5001
|
type W3cVc = v.InferOutput<typeof vW3cVc>;
|
3101
5002
|
const vModel: v.VariantSchema<"format", [v.ObjectSchema<{
|
@@ -3158,6 +5059,22 @@ declare namespace DcqlCredentialQuery {
|
|
3158
5059
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
3159
5060
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
3160
5061
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
5062
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
5063
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
5064
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
5065
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
5066
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5067
|
+
values: [string, ...string[]];
|
5068
|
+
}, ...{
|
5069
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5070
|
+
values: [string, ...string[]];
|
5071
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
5072
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5073
|
+
values: [string, ...string[]];
|
5074
|
+
}, ...{
|
5075
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5076
|
+
values: [string, ...string[]];
|
5077
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
3161
5078
|
}, undefined>, v.ObjectSchema<{
|
3162
5079
|
readonly format: v.SchemaWithPipe<[v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>, v.DescriptionAction<"vc+sd-jwt" | "dc+sd-jwt", "REQUIRED. A string that specifies the format of the requested Verifiable Credential.">]>;
|
3163
5080
|
readonly claims: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
@@ -3190,8 +5107,24 @@ declare namespace DcqlCredentialQuery {
|
|
3190
5107
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
3191
5108
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
3192
5109
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
5110
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
5111
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
5112
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
5113
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
5114
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5115
|
+
values: [string, ...string[]];
|
5116
|
+
}, ...{
|
5117
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5118
|
+
values: [string, ...string[]];
|
5119
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
5120
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5121
|
+
values: [string, ...string[]];
|
5122
|
+
}, ...{
|
5123
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5124
|
+
values: [string, ...string[]];
|
5125
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
3193
5126
|
}, undefined>, v.ObjectSchema<{
|
3194
|
-
readonly format: v.PicklistSchema<["jwt_vc_json", "
|
5127
|
+
readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
|
3195
5128
|
readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
3196
5129
|
readonly id: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.DescriptionAction<string | undefined, "A string identifying the particular claim. The value MUST be a non-empty string consisting of alphanumeric, underscore (_) or hyphen (-) characters. Within the particular claims array, the same id MUST NOT be present more than once.">]>;
|
3197
5130
|
readonly path: v.SchemaWithPipe<[v.ArraySchema<v.UnionSchema<[v.StringSchema<undefined>, v.SchemaWithPipe<[v.NumberSchema<undefined>, v.IntegerAction<number, undefined>, v.MinValueAction<number, 0, undefined>]>, v.NullSchema<undefined>], undefined>, undefined>, v.CustomSchema<[string | number | null, ...(string | number | null)[]], undefined>, v.DescriptionAction<[string | number | null, ...(string | number | null)[]], "A non-empty array representing a claims path pointer that specifies the path to a claim within the Verifiable Credential.">]>;
|
@@ -3205,8 +5138,29 @@ declare namespace DcqlCredentialQuery {
|
|
3205
5138
|
values?: (string | number | boolean)[] | undefined;
|
3206
5139
|
id?: string | undefined;
|
3207
5140
|
}[]], undefined>]>, undefined>;
|
5141
|
+
readonly meta: v.SchemaWithPipe<[v.SchemaWithPipe<[v.ObjectSchema<{
|
5142
|
+
readonly type_values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.StringSchema<undefined>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]], "REQUIRED. An array of string arrays that specifies the fully expanded types (IRIs) after the @context was applied that the Verifier accepts to be presented in the Presentation. Each of the top-level arrays specifies one alternative to match the type values of the Verifiable Credential against. Each inner array specifies a set of fully expanded types that MUST be present in the type property of the Verifiable Credential, regardless of order or the presence of additional types.">]>;
|
5143
|
+
}, undefined>]>, v.DescriptionAction<{
|
5144
|
+
type_values: [[string, ...string[]], ...[string, ...string[]][]];
|
5145
|
+
}, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
3208
5146
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
3209
5147
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
5148
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
5149
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
5150
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
5151
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
5152
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5153
|
+
values: [string, ...string[]];
|
5154
|
+
}, ...{
|
5155
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5156
|
+
values: [string, ...string[]];
|
5157
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
5158
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5159
|
+
values: [string, ...string[]];
|
5160
|
+
}, ...{
|
5161
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5162
|
+
values: [string, ...string[]];
|
5163
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
3210
5164
|
}, undefined>], undefined>;
|
3211
5165
|
type Input = v.InferInput<typeof vModel>;
|
3212
5166
|
type Output = v.InferOutput<typeof vModel>;
|
@@ -3231,4 +5185,4 @@ declare namespace CredentialSetQuery {
|
|
3231
5185
|
}
|
3232
5186
|
type CredentialSetQuery = CredentialSetQuery.Output;
|
3233
5187
|
|
3234
|
-
export { CredentialSetQuery, DcqlClaimsQuery, DcqlCredential, DcqlCredentialPresentation, DcqlCredentialQuery, DcqlCredentialSetError, DcqlError, DcqlInvalidClaimsQueryIdError, DcqlInvalidPresentationRecordError, DcqlMdocCredential, DcqlMdocPresentation, DcqlMissingClaimSetParseError, DcqlNonUniqueCredentialQueryIdsError, DcqlParseError, DcqlPresentation, DcqlPresentationResult, DcqlPresentationResultError, DcqlQuery, DcqlQueryResult, DcqlSdJwtVcCredential, DcqlSdJwtVcPresentation, DcqlUndefinedClaimSetIdError, DcqlW3cVcCredential, DcqlW3cVcPresentation, getCauseFromUnknown, getDcqlErrorFromUnknown, runDcqlQuery };
|
5188
|
+
export { CredentialSetQuery, DcqlClaimsQuery, DcqlCredential, DcqlCredentialPresentation, DcqlCredentialQuery, DcqlCredentialSetError, DcqlCredentialTrustedAuthority, DcqlError, DcqlInvalidClaimsQueryIdError, DcqlInvalidPresentationRecordError, DcqlMdocCredential, DcqlMdocPresentation, DcqlMissingClaimSetParseError, DcqlNonUniqueCredentialQueryIdsError, DcqlParseError, DcqlPresentation, DcqlPresentationResult, DcqlPresentationResultError, DcqlQuery, DcqlQueryResult, DcqlSdJwtVcCredential, DcqlSdJwtVcPresentation, DcqlTrustedAuthoritiesQuery, DcqlUndefinedClaimSetIdError, DcqlW3cVcCredential, DcqlW3cVcPresentation, getCauseFromUnknown, getDcqlErrorFromUnknown, runDcqlQuery };
|