dcql 0.3.0-alpha-20250501093131 → 0.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.d.mts +1832 -1
- package/dist/index.d.ts +1832 -1
- package/dist/index.js +328 -223
- package/dist/index.js.map +1 -1
- package/dist/index.mjs +326 -223
- package/dist/index.mjs.map +1 -1
- package/package.json +3 -6
package/dist/index.d.mts
CHANGED
@@ -95,11 +95,31 @@ declare namespace DcqlMdocPresentation {
|
|
95
95
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
96
96
|
readonly doctype: v.StringSchema<undefined>;
|
97
97
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
98
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
99
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
100
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
101
|
+
}, undefined>, v.ObjectSchema<{
|
102
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
103
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
104
|
+
}, undefined>, v.ObjectSchema<{
|
105
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
106
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
107
|
+
}, undefined>], undefined>, undefined>;
|
98
108
|
}, undefined>;
|
99
109
|
const model: Model<v.ObjectSchema<{
|
100
110
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
101
111
|
readonly doctype: v.StringSchema<undefined>;
|
102
112
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
113
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
114
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
115
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
116
|
+
}, undefined>, v.ObjectSchema<{
|
117
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
118
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
119
|
+
}, undefined>, v.ObjectSchema<{
|
120
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
121
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
122
|
+
}, undefined>], undefined>, undefined>;
|
103
123
|
}, undefined>>;
|
104
124
|
type Model = InferModelTypes<typeof model>;
|
105
125
|
}
|
@@ -109,11 +129,31 @@ declare namespace DcqlSdJwtVcPresentation {
|
|
109
129
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
110
130
|
readonly vct: v.StringSchema<undefined>;
|
111
131
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
132
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
133
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
134
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
135
|
+
}, undefined>, v.ObjectSchema<{
|
136
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
137
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
138
|
+
}, undefined>, v.ObjectSchema<{
|
139
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
140
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
141
|
+
}, undefined>], undefined>, undefined>;
|
112
142
|
}, undefined>;
|
113
143
|
const model: Model<v.ObjectSchema<{
|
114
144
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
115
145
|
readonly vct: v.StringSchema<undefined>;
|
116
146
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
147
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
148
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
149
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
150
|
+
}, undefined>, v.ObjectSchema<{
|
151
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
152
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
153
|
+
}, undefined>, v.ObjectSchema<{
|
154
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
155
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
156
|
+
}, undefined>], undefined>, undefined>;
|
117
157
|
}, undefined>>;
|
118
158
|
type Model = InferModelTypes<typeof model>;
|
119
159
|
}
|
@@ -123,11 +163,31 @@ declare namespace DcqlW3cVcPresentation {
|
|
123
163
|
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
124
164
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
125
165
|
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
166
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
167
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
168
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
169
|
+
}, undefined>, v.ObjectSchema<{
|
170
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
171
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
172
|
+
}, undefined>, v.ObjectSchema<{
|
173
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
174
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
175
|
+
}, undefined>], undefined>, undefined>;
|
126
176
|
}, undefined>;
|
127
177
|
const model: Model<v.ObjectSchema<{
|
128
178
|
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
129
179
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
130
180
|
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
181
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
182
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
183
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
184
|
+
}, undefined>, v.ObjectSchema<{
|
185
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
186
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
187
|
+
}, undefined>, v.ObjectSchema<{
|
188
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
189
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
190
|
+
}, undefined>], undefined>, undefined>;
|
131
191
|
}, undefined>>;
|
132
192
|
type Model = InferModelTypes<typeof model>;
|
133
193
|
}
|
@@ -137,14 +197,44 @@ declare namespace DcqlCredentialPresentation {
|
|
137
197
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
138
198
|
readonly doctype: v.StringSchema<undefined>;
|
139
199
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
200
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
201
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
202
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
203
|
+
}, undefined>, v.ObjectSchema<{
|
204
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
205
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
206
|
+
}, undefined>, v.ObjectSchema<{
|
207
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
208
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
209
|
+
}, undefined>], undefined>, undefined>;
|
140
210
|
}, undefined>, v.ObjectSchema<{
|
141
211
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
142
212
|
readonly vct: v.StringSchema<undefined>;
|
143
213
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
214
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
215
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
216
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
217
|
+
}, undefined>, v.ObjectSchema<{
|
218
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
219
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
220
|
+
}, undefined>, v.ObjectSchema<{
|
221
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
222
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
223
|
+
}, undefined>], undefined>, undefined>;
|
144
224
|
}, undefined>, v.ObjectSchema<{
|
145
225
|
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
146
226
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
147
227
|
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
228
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
229
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
230
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
231
|
+
}, undefined>, v.ObjectSchema<{
|
232
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
233
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
234
|
+
}, undefined>, v.ObjectSchema<{
|
235
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
236
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
237
|
+
}, undefined>], undefined>, undefined>;
|
148
238
|
}, undefined>], undefined>>;
|
149
239
|
type Model = InferModelTypes<typeof model>;
|
150
240
|
}
|
@@ -161,14 +251,44 @@ declare namespace DcqlQueryResult {
|
|
161
251
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
162
252
|
readonly doctype: v.StringSchema<undefined>;
|
163
253
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
254
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
255
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
256
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
257
|
+
}, undefined>, v.ObjectSchema<{
|
258
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
259
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
260
|
+
}, undefined>, v.ObjectSchema<{
|
261
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
262
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
263
|
+
}, undefined>], undefined>, undefined>;
|
164
264
|
}, undefined>, v.ObjectSchema<{
|
165
265
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
166
266
|
readonly vct: v.StringSchema<undefined>;
|
167
267
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
268
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
269
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
270
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
271
|
+
}, undefined>, v.ObjectSchema<{
|
272
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
273
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
274
|
+
}, undefined>, v.ObjectSchema<{
|
275
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
276
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
277
|
+
}, undefined>], undefined>, undefined>;
|
168
278
|
}, undefined>, v.ObjectSchema<{
|
169
279
|
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
170
280
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
171
281
|
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
282
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
283
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
284
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
285
|
+
}, undefined>, v.ObjectSchema<{
|
286
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
287
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
288
|
+
}, undefined>, v.ObjectSchema<{
|
289
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
290
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
291
|
+
}, undefined>], undefined>, undefined>;
|
172
292
|
}, undefined>], undefined>;
|
173
293
|
}, undefined>, v.ObjectSchema<{
|
174
294
|
readonly success: v.LiteralSchema<false, undefined>;
|
@@ -186,18 +306,48 @@ declare namespace DcqlQueryResult {
|
|
186
306
|
[x: string]: unknown;
|
187
307
|
};
|
188
308
|
};
|
309
|
+
authority?: {
|
310
|
+
type: "aki";
|
311
|
+
value: string;
|
312
|
+
} | {
|
313
|
+
type: "etsi_tl";
|
314
|
+
value: string;
|
315
|
+
} | {
|
316
|
+
type: "openid_federation";
|
317
|
+
value: string;
|
318
|
+
} | undefined;
|
189
319
|
} | {
|
190
320
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
191
321
|
vct: string;
|
192
322
|
claims: {
|
193
323
|
[x: string]: Json;
|
194
324
|
};
|
325
|
+
authority?: {
|
326
|
+
type: "aki";
|
327
|
+
value: string;
|
328
|
+
} | {
|
329
|
+
type: "etsi_tl";
|
330
|
+
value: string;
|
331
|
+
} | {
|
332
|
+
type: "openid_federation";
|
333
|
+
value: string;
|
334
|
+
} | undefined;
|
195
335
|
} | {
|
196
336
|
type: string[];
|
197
337
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
198
338
|
claims: {
|
199
339
|
[x: string]: Json;
|
200
340
|
};
|
341
|
+
authority?: {
|
342
|
+
type: "aki";
|
343
|
+
value: string;
|
344
|
+
} | {
|
345
|
+
type: "etsi_tl";
|
346
|
+
value: string;
|
347
|
+
} | {
|
348
|
+
type: "openid_federation";
|
349
|
+
value: string;
|
350
|
+
} | undefined;
|
201
351
|
};
|
202
352
|
success: true;
|
203
353
|
typed: true;
|
@@ -220,18 +370,48 @@ declare namespace DcqlQueryResult {
|
|
220
370
|
[x: string]: unknown;
|
221
371
|
};
|
222
372
|
};
|
373
|
+
authority?: {
|
374
|
+
type: "aki";
|
375
|
+
value: string;
|
376
|
+
} | {
|
377
|
+
type: "etsi_tl";
|
378
|
+
value: string;
|
379
|
+
} | {
|
380
|
+
type: "openid_federation";
|
381
|
+
value: string;
|
382
|
+
} | undefined;
|
223
383
|
} | {
|
224
384
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
225
385
|
vct: string;
|
226
386
|
claims: {
|
227
387
|
[x: string]: Json;
|
228
388
|
};
|
389
|
+
authority?: {
|
390
|
+
type: "aki";
|
391
|
+
value: string;
|
392
|
+
} | {
|
393
|
+
type: "etsi_tl";
|
394
|
+
value: string;
|
395
|
+
} | {
|
396
|
+
type: "openid_federation";
|
397
|
+
value: string;
|
398
|
+
} | undefined;
|
229
399
|
} | {
|
230
400
|
type: string[];
|
231
401
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
232
402
|
claims: {
|
233
403
|
[x: string]: Json;
|
234
404
|
};
|
405
|
+
authority?: {
|
406
|
+
type: "aki";
|
407
|
+
value: string;
|
408
|
+
} | {
|
409
|
+
type: "etsi_tl";
|
410
|
+
value: string;
|
411
|
+
} | {
|
412
|
+
type: "openid_federation";
|
413
|
+
value: string;
|
414
|
+
} | undefined;
|
235
415
|
};
|
236
416
|
success: true;
|
237
417
|
typed: true;
|
@@ -308,6 +488,22 @@ declare namespace DcqlQueryResult {
|
|
308
488
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
309
489
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
310
490
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
491
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
492
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
493
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
494
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
495
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
496
|
+
values: [string, ...string[]];
|
497
|
+
}, ...{
|
498
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
499
|
+
values: [string, ...string[]];
|
500
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
501
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
502
|
+
values: [string, ...string[]];
|
503
|
+
}, ...{
|
504
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
505
|
+
values: [string, ...string[]];
|
506
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
311
507
|
}, undefined>, v.ObjectSchema<{
|
312
508
|
readonly format: v.SchemaWithPipe<[v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>, v.DescriptionAction<"vc+sd-jwt" | "dc+sd-jwt", "REQUIRED. A string that specifies the format of the requested Verifiable Credential.">]>;
|
313
509
|
readonly claims: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
@@ -340,6 +536,22 @@ declare namespace DcqlQueryResult {
|
|
340
536
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
341
537
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
342
538
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
539
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
540
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
541
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
542
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
543
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
544
|
+
values: [string, ...string[]];
|
545
|
+
}, ...{
|
546
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
547
|
+
values: [string, ...string[]];
|
548
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
549
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
550
|
+
values: [string, ...string[]];
|
551
|
+
}, ...{
|
552
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
553
|
+
values: [string, ...string[]];
|
554
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
343
555
|
}, undefined>, v.ObjectSchema<{
|
344
556
|
readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
|
345
557
|
readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
@@ -362,6 +574,22 @@ declare namespace DcqlQueryResult {
|
|
362
574
|
}, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
363
575
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
364
576
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
577
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
578
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
579
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
580
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
581
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
582
|
+
values: [string, ...string[]];
|
583
|
+
}, ...{
|
584
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
585
|
+
values: [string, ...string[]];
|
586
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
587
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
588
|
+
values: [string, ...string[]];
|
589
|
+
}, ...{
|
590
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
591
|
+
values: [string, ...string[]];
|
592
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
365
593
|
}, undefined>], undefined>, undefined>, v.CustomSchema<[{
|
366
594
|
id: string;
|
367
595
|
format: "mso_mdoc";
|
@@ -387,6 +615,13 @@ declare namespace DcqlQueryResult {
|
|
387
615
|
intent_to_retain?: boolean | undefined;
|
388
616
|
})[]] | undefined;
|
389
617
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
618
|
+
trusted_authorities?: [{
|
619
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
620
|
+
values: [string, ...string[]];
|
621
|
+
}, ...{
|
622
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
623
|
+
values: [string, ...string[]];
|
624
|
+
}[]] | undefined;
|
390
625
|
meta?: {
|
391
626
|
doctype_value?: string | undefined;
|
392
627
|
} | undefined;
|
@@ -403,6 +638,13 @@ declare namespace DcqlQueryResult {
|
|
403
638
|
id?: string | undefined;
|
404
639
|
}[]] | undefined;
|
405
640
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
641
|
+
trusted_authorities?: [{
|
642
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
643
|
+
values: [string, ...string[]];
|
644
|
+
}, ...{
|
645
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
646
|
+
values: [string, ...string[]];
|
647
|
+
}[]] | undefined;
|
406
648
|
meta?: {
|
407
649
|
vct_values?: string[] | undefined;
|
408
650
|
} | undefined;
|
@@ -422,6 +664,13 @@ declare namespace DcqlQueryResult {
|
|
422
664
|
id?: string | undefined;
|
423
665
|
}[]] | undefined;
|
424
666
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
667
|
+
trusted_authorities?: [{
|
668
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
669
|
+
values: [string, ...string[]];
|
670
|
+
}, ...{
|
671
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
672
|
+
values: [string, ...string[]];
|
673
|
+
}[]] | undefined;
|
425
674
|
}, ...({
|
426
675
|
id: string;
|
427
676
|
format: "mso_mdoc";
|
@@ -447,6 +696,13 @@ declare namespace DcqlQueryResult {
|
|
447
696
|
intent_to_retain?: boolean | undefined;
|
448
697
|
})[]] | undefined;
|
449
698
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
699
|
+
trusted_authorities?: [{
|
700
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
701
|
+
values: [string, ...string[]];
|
702
|
+
}, ...{
|
703
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
704
|
+
values: [string, ...string[]];
|
705
|
+
}[]] | undefined;
|
450
706
|
meta?: {
|
451
707
|
doctype_value?: string | undefined;
|
452
708
|
} | undefined;
|
@@ -463,6 +719,13 @@ declare namespace DcqlQueryResult {
|
|
463
719
|
id?: string | undefined;
|
464
720
|
}[]] | undefined;
|
465
721
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
722
|
+
trusted_authorities?: [{
|
723
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
724
|
+
values: [string, ...string[]];
|
725
|
+
}, ...{
|
726
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
727
|
+
values: [string, ...string[]];
|
728
|
+
}[]] | undefined;
|
466
729
|
meta?: {
|
467
730
|
vct_values?: string[] | undefined;
|
468
731
|
} | undefined;
|
@@ -482,6 +745,13 @@ declare namespace DcqlQueryResult {
|
|
482
745
|
id?: string | undefined;
|
483
746
|
}[]] | undefined;
|
484
747
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
748
|
+
trusted_authorities?: [{
|
749
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
750
|
+
values: [string, ...string[]];
|
751
|
+
}, ...{
|
752
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
753
|
+
values: [string, ...string[]];
|
754
|
+
}[]] | undefined;
|
485
755
|
})[]], undefined>, v.DescriptionAction<[{
|
486
756
|
id: string;
|
487
757
|
format: "mso_mdoc";
|
@@ -507,6 +777,13 @@ declare namespace DcqlQueryResult {
|
|
507
777
|
intent_to_retain?: boolean | undefined;
|
508
778
|
})[]] | undefined;
|
509
779
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
780
|
+
trusted_authorities?: [{
|
781
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
782
|
+
values: [string, ...string[]];
|
783
|
+
}, ...{
|
784
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
785
|
+
values: [string, ...string[]];
|
786
|
+
}[]] | undefined;
|
510
787
|
meta?: {
|
511
788
|
doctype_value?: string | undefined;
|
512
789
|
} | undefined;
|
@@ -523,6 +800,13 @@ declare namespace DcqlQueryResult {
|
|
523
800
|
id?: string | undefined;
|
524
801
|
}[]] | undefined;
|
525
802
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
803
|
+
trusted_authorities?: [{
|
804
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
805
|
+
values: [string, ...string[]];
|
806
|
+
}, ...{
|
807
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
808
|
+
values: [string, ...string[]];
|
809
|
+
}[]] | undefined;
|
526
810
|
meta?: {
|
527
811
|
vct_values?: string[] | undefined;
|
528
812
|
} | undefined;
|
@@ -542,6 +826,13 @@ declare namespace DcqlQueryResult {
|
|
542
826
|
id?: string | undefined;
|
543
827
|
}[]] | undefined;
|
544
828
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
829
|
+
trusted_authorities?: [{
|
830
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
831
|
+
values: [string, ...string[]];
|
832
|
+
}, ...{
|
833
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
834
|
+
values: [string, ...string[]];
|
835
|
+
}[]] | undefined;
|
545
836
|
}, ...({
|
546
837
|
id: string;
|
547
838
|
format: "mso_mdoc";
|
@@ -567,6 +858,13 @@ declare namespace DcqlQueryResult {
|
|
567
858
|
intent_to_retain?: boolean | undefined;
|
568
859
|
})[]] | undefined;
|
569
860
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
861
|
+
trusted_authorities?: [{
|
862
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
863
|
+
values: [string, ...string[]];
|
864
|
+
}, ...{
|
865
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
866
|
+
values: [string, ...string[]];
|
867
|
+
}[]] | undefined;
|
570
868
|
meta?: {
|
571
869
|
doctype_value?: string | undefined;
|
572
870
|
} | undefined;
|
@@ -583,6 +881,13 @@ declare namespace DcqlQueryResult {
|
|
583
881
|
id?: string | undefined;
|
584
882
|
}[]] | undefined;
|
585
883
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
884
|
+
trusted_authorities?: [{
|
885
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
886
|
+
values: [string, ...string[]];
|
887
|
+
}, ...{
|
888
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
889
|
+
values: [string, ...string[]];
|
890
|
+
}[]] | undefined;
|
586
891
|
meta?: {
|
587
892
|
vct_values?: string[] | undefined;
|
588
893
|
} | undefined;
|
@@ -602,6 +907,13 @@ declare namespace DcqlQueryResult {
|
|
602
907
|
id?: string | undefined;
|
603
908
|
}[]] | undefined;
|
604
909
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
910
|
+
trusted_authorities?: [{
|
911
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
912
|
+
values: [string, ...string[]];
|
913
|
+
}, ...{
|
914
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
915
|
+
values: [string, ...string[]];
|
916
|
+
}[]] | undefined;
|
605
917
|
})[]], "REQUIRED. A non-empty array of Credential Queries that specify the requested Verifiable Credentials.">]>;
|
606
918
|
readonly credential_matches: v.RecordSchema<v.SchemaWithPipe<[v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>]>, v.UnionSchema<[v.ObjectSchema<{
|
607
919
|
readonly all: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.UnionSchema<[v.UndefinedSchema<undefined>, v.ObjectSchema<{
|
@@ -614,14 +926,44 @@ declare namespace DcqlQueryResult {
|
|
614
926
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
615
927
|
readonly doctype: v.StringSchema<undefined>;
|
616
928
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
929
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
930
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
931
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
932
|
+
}, undefined>, v.ObjectSchema<{
|
933
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
934
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
935
|
+
}, undefined>, v.ObjectSchema<{
|
936
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
937
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
938
|
+
}, undefined>], undefined>, undefined>;
|
617
939
|
}, undefined>, v.ObjectSchema<{
|
618
940
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
619
941
|
readonly vct: v.StringSchema<undefined>;
|
620
942
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
943
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
944
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
945
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
946
|
+
}, undefined>, v.ObjectSchema<{
|
947
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
948
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
949
|
+
}, undefined>, v.ObjectSchema<{
|
950
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
951
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
952
|
+
}, undefined>], undefined>, undefined>;
|
621
953
|
}, undefined>, v.ObjectSchema<{
|
622
954
|
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
623
955
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
624
956
|
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
957
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
958
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
959
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
960
|
+
}, undefined>, v.ObjectSchema<{
|
961
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
962
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
963
|
+
}, undefined>, v.ObjectSchema<{
|
964
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
965
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
966
|
+
}, undefined>], undefined>, undefined>;
|
625
967
|
}, undefined>], undefined>;
|
626
968
|
}, undefined>, v.ObjectSchema<{
|
627
969
|
readonly success: v.LiteralSchema<false, undefined>;
|
@@ -639,18 +981,48 @@ declare namespace DcqlQueryResult {
|
|
639
981
|
[x: string]: unknown;
|
640
982
|
};
|
641
983
|
};
|
984
|
+
authority?: {
|
985
|
+
type: "aki";
|
986
|
+
value: string;
|
987
|
+
} | {
|
988
|
+
type: "etsi_tl";
|
989
|
+
value: string;
|
990
|
+
} | {
|
991
|
+
type: "openid_federation";
|
992
|
+
value: string;
|
993
|
+
} | undefined;
|
642
994
|
} | {
|
643
995
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
644
996
|
vct: string;
|
645
997
|
claims: {
|
646
998
|
[x: string]: Json;
|
647
999
|
};
|
1000
|
+
authority?: {
|
1001
|
+
type: "aki";
|
1002
|
+
value: string;
|
1003
|
+
} | {
|
1004
|
+
type: "etsi_tl";
|
1005
|
+
value: string;
|
1006
|
+
} | {
|
1007
|
+
type: "openid_federation";
|
1008
|
+
value: string;
|
1009
|
+
} | undefined;
|
648
1010
|
} | {
|
649
1011
|
type: string[];
|
650
1012
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
651
1013
|
claims: {
|
652
1014
|
[x: string]: Json;
|
653
1015
|
};
|
1016
|
+
authority?: {
|
1017
|
+
type: "aki";
|
1018
|
+
value: string;
|
1019
|
+
} | {
|
1020
|
+
type: "etsi_tl";
|
1021
|
+
value: string;
|
1022
|
+
} | {
|
1023
|
+
type: "openid_federation";
|
1024
|
+
value: string;
|
1025
|
+
} | undefined;
|
654
1026
|
};
|
655
1027
|
success: true;
|
656
1028
|
typed: true;
|
@@ -673,18 +1045,48 @@ declare namespace DcqlQueryResult {
|
|
673
1045
|
[x: string]: unknown;
|
674
1046
|
};
|
675
1047
|
};
|
1048
|
+
authority?: {
|
1049
|
+
type: "aki";
|
1050
|
+
value: string;
|
1051
|
+
} | {
|
1052
|
+
type: "etsi_tl";
|
1053
|
+
value: string;
|
1054
|
+
} | {
|
1055
|
+
type: "openid_federation";
|
1056
|
+
value: string;
|
1057
|
+
} | undefined;
|
676
1058
|
} | {
|
677
1059
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
678
1060
|
vct: string;
|
679
1061
|
claims: {
|
680
1062
|
[x: string]: Json;
|
681
1063
|
};
|
1064
|
+
authority?: {
|
1065
|
+
type: "aki";
|
1066
|
+
value: string;
|
1067
|
+
} | {
|
1068
|
+
type: "etsi_tl";
|
1069
|
+
value: string;
|
1070
|
+
} | {
|
1071
|
+
type: "openid_federation";
|
1072
|
+
value: string;
|
1073
|
+
} | undefined;
|
682
1074
|
} | {
|
683
1075
|
type: string[];
|
684
1076
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
685
1077
|
claims: {
|
686
1078
|
[x: string]: Json;
|
687
1079
|
};
|
1080
|
+
authority?: {
|
1081
|
+
type: "aki";
|
1082
|
+
value: string;
|
1083
|
+
} | {
|
1084
|
+
type: "etsi_tl";
|
1085
|
+
value: string;
|
1086
|
+
} | {
|
1087
|
+
type: "openid_federation";
|
1088
|
+
value: string;
|
1089
|
+
} | undefined;
|
688
1090
|
};
|
689
1091
|
success: true;
|
690
1092
|
typed: true;
|
@@ -707,18 +1109,48 @@ declare namespace DcqlQueryResult {
|
|
707
1109
|
[x: string]: unknown;
|
708
1110
|
};
|
709
1111
|
};
|
1112
|
+
authority?: {
|
1113
|
+
type: "aki";
|
1114
|
+
value: string;
|
1115
|
+
} | {
|
1116
|
+
type: "etsi_tl";
|
1117
|
+
value: string;
|
1118
|
+
} | {
|
1119
|
+
type: "openid_federation";
|
1120
|
+
value: string;
|
1121
|
+
} | undefined;
|
710
1122
|
} | {
|
711
1123
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
712
1124
|
vct: string;
|
713
1125
|
claims: {
|
714
1126
|
[x: string]: Json;
|
715
1127
|
};
|
1128
|
+
authority?: {
|
1129
|
+
type: "aki";
|
1130
|
+
value: string;
|
1131
|
+
} | {
|
1132
|
+
type: "etsi_tl";
|
1133
|
+
value: string;
|
1134
|
+
} | {
|
1135
|
+
type: "openid_federation";
|
1136
|
+
value: string;
|
1137
|
+
} | undefined;
|
716
1138
|
} | {
|
717
1139
|
type: string[];
|
718
1140
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
719
1141
|
claims: {
|
720
1142
|
[x: string]: Json;
|
721
1143
|
};
|
1144
|
+
authority?: {
|
1145
|
+
type: "aki";
|
1146
|
+
value: string;
|
1147
|
+
} | {
|
1148
|
+
type: "etsi_tl";
|
1149
|
+
value: string;
|
1150
|
+
} | {
|
1151
|
+
type: "openid_federation";
|
1152
|
+
value: string;
|
1153
|
+
} | undefined;
|
722
1154
|
};
|
723
1155
|
success: true;
|
724
1156
|
typed: true;
|
@@ -741,18 +1173,48 @@ declare namespace DcqlQueryResult {
|
|
741
1173
|
[x: string]: unknown;
|
742
1174
|
};
|
743
1175
|
};
|
1176
|
+
authority?: {
|
1177
|
+
type: "aki";
|
1178
|
+
value: string;
|
1179
|
+
} | {
|
1180
|
+
type: "etsi_tl";
|
1181
|
+
value: string;
|
1182
|
+
} | {
|
1183
|
+
type: "openid_federation";
|
1184
|
+
value: string;
|
1185
|
+
} | undefined;
|
744
1186
|
} | {
|
745
1187
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
746
1188
|
vct: string;
|
747
1189
|
claims: {
|
748
1190
|
[x: string]: Json;
|
749
1191
|
};
|
1192
|
+
authority?: {
|
1193
|
+
type: "aki";
|
1194
|
+
value: string;
|
1195
|
+
} | {
|
1196
|
+
type: "etsi_tl";
|
1197
|
+
value: string;
|
1198
|
+
} | {
|
1199
|
+
type: "openid_federation";
|
1200
|
+
value: string;
|
1201
|
+
} | undefined;
|
750
1202
|
} | {
|
751
1203
|
type: string[];
|
752
1204
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
753
1205
|
claims: {
|
754
1206
|
[x: string]: Json;
|
755
1207
|
};
|
1208
|
+
authority?: {
|
1209
|
+
type: "aki";
|
1210
|
+
value: string;
|
1211
|
+
} | {
|
1212
|
+
type: "etsi_tl";
|
1213
|
+
value: string;
|
1214
|
+
} | {
|
1215
|
+
type: "openid_federation";
|
1216
|
+
value: string;
|
1217
|
+
} | undefined;
|
756
1218
|
};
|
757
1219
|
success: true;
|
758
1220
|
typed: true;
|
@@ -775,18 +1237,48 @@ declare namespace DcqlQueryResult {
|
|
775
1237
|
[x: string]: unknown;
|
776
1238
|
};
|
777
1239
|
};
|
1240
|
+
authority?: {
|
1241
|
+
type: "aki";
|
1242
|
+
value: string;
|
1243
|
+
} | {
|
1244
|
+
type: "etsi_tl";
|
1245
|
+
value: string;
|
1246
|
+
} | {
|
1247
|
+
type: "openid_federation";
|
1248
|
+
value: string;
|
1249
|
+
} | undefined;
|
778
1250
|
} | {
|
779
1251
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
780
1252
|
vct: string;
|
781
1253
|
claims: {
|
782
1254
|
[x: string]: Json;
|
783
1255
|
};
|
1256
|
+
authority?: {
|
1257
|
+
type: "aki";
|
1258
|
+
value: string;
|
1259
|
+
} | {
|
1260
|
+
type: "etsi_tl";
|
1261
|
+
value: string;
|
1262
|
+
} | {
|
1263
|
+
type: "openid_federation";
|
1264
|
+
value: string;
|
1265
|
+
} | undefined;
|
784
1266
|
} | {
|
785
1267
|
type: string[];
|
786
1268
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
787
1269
|
claims: {
|
788
1270
|
[x: string]: Json;
|
789
1271
|
};
|
1272
|
+
authority?: {
|
1273
|
+
type: "aki";
|
1274
|
+
value: string;
|
1275
|
+
} | {
|
1276
|
+
type: "etsi_tl";
|
1277
|
+
value: string;
|
1278
|
+
} | {
|
1279
|
+
type: "openid_federation";
|
1280
|
+
value: string;
|
1281
|
+
} | undefined;
|
790
1282
|
};
|
791
1283
|
success: true;
|
792
1284
|
typed: true;
|
@@ -809,18 +1301,48 @@ declare namespace DcqlQueryResult {
|
|
809
1301
|
[x: string]: unknown;
|
810
1302
|
};
|
811
1303
|
};
|
1304
|
+
authority?: {
|
1305
|
+
type: "aki";
|
1306
|
+
value: string;
|
1307
|
+
} | {
|
1308
|
+
type: "etsi_tl";
|
1309
|
+
value: string;
|
1310
|
+
} | {
|
1311
|
+
type: "openid_federation";
|
1312
|
+
value: string;
|
1313
|
+
} | undefined;
|
812
1314
|
} | {
|
813
1315
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
814
1316
|
vct: string;
|
815
1317
|
claims: {
|
816
1318
|
[x: string]: Json;
|
817
1319
|
};
|
1320
|
+
authority?: {
|
1321
|
+
type: "aki";
|
1322
|
+
value: string;
|
1323
|
+
} | {
|
1324
|
+
type: "etsi_tl";
|
1325
|
+
value: string;
|
1326
|
+
} | {
|
1327
|
+
type: "openid_federation";
|
1328
|
+
value: string;
|
1329
|
+
} | undefined;
|
818
1330
|
} | {
|
819
1331
|
type: string[];
|
820
1332
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
821
1333
|
claims: {
|
822
1334
|
[x: string]: Json;
|
823
1335
|
};
|
1336
|
+
authority?: {
|
1337
|
+
type: "aki";
|
1338
|
+
value: string;
|
1339
|
+
} | {
|
1340
|
+
type: "etsi_tl";
|
1341
|
+
value: string;
|
1342
|
+
} | {
|
1343
|
+
type: "openid_federation";
|
1344
|
+
value: string;
|
1345
|
+
} | undefined;
|
824
1346
|
};
|
825
1347
|
success: true;
|
826
1348
|
typed: true;
|
@@ -844,14 +1366,44 @@ declare namespace DcqlQueryResult {
|
|
844
1366
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
845
1367
|
readonly doctype: v.StringSchema<undefined>;
|
846
1368
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
1369
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1370
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1371
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1372
|
+
}, undefined>, v.ObjectSchema<{
|
1373
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1374
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1375
|
+
}, undefined>, v.ObjectSchema<{
|
1376
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1377
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1378
|
+
}, undefined>], undefined>, undefined>;
|
847
1379
|
}, undefined>, v.ObjectSchema<{
|
848
1380
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
849
1381
|
readonly vct: v.StringSchema<undefined>;
|
850
1382
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1383
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1384
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1385
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1386
|
+
}, undefined>, v.ObjectSchema<{
|
1387
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1388
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1389
|
+
}, undefined>, v.ObjectSchema<{
|
1390
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1391
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1392
|
+
}, undefined>], undefined>, undefined>;
|
851
1393
|
}, undefined>, v.ObjectSchema<{
|
852
1394
|
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
853
1395
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
854
1396
|
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
1397
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1398
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1399
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1400
|
+
}, undefined>, v.ObjectSchema<{
|
1401
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1402
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1403
|
+
}, undefined>, v.ObjectSchema<{
|
1404
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1405
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1406
|
+
}, undefined>], undefined>, undefined>;
|
855
1407
|
}, undefined>], undefined>;
|
856
1408
|
}, undefined>, v.ObjectSchema<{
|
857
1409
|
readonly success: v.LiteralSchema<false, undefined>;
|
@@ -865,14 +1417,44 @@ declare namespace DcqlQueryResult {
|
|
865
1417
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
866
1418
|
readonly doctype: v.StringSchema<undefined>;
|
867
1419
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
1420
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1421
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1422
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1423
|
+
}, undefined>, v.ObjectSchema<{
|
1424
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1425
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1426
|
+
}, undefined>, v.ObjectSchema<{
|
1427
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1428
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1429
|
+
}, undefined>], undefined>, undefined>;
|
868
1430
|
}, undefined>, v.ObjectSchema<{
|
869
1431
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
870
1432
|
readonly vct: v.StringSchema<undefined>;
|
871
1433
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1434
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1435
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1436
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1437
|
+
}, undefined>, v.ObjectSchema<{
|
1438
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1439
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1440
|
+
}, undefined>, v.ObjectSchema<{
|
1441
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1442
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1443
|
+
}, undefined>], undefined>, undefined>;
|
872
1444
|
}, undefined>, v.ObjectSchema<{
|
873
1445
|
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
874
1446
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
875
1447
|
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
1448
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1449
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1450
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1451
|
+
}, undefined>, v.ObjectSchema<{
|
1452
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1453
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1454
|
+
}, undefined>, v.ObjectSchema<{
|
1455
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1456
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1457
|
+
}, undefined>], undefined>, undefined>;
|
876
1458
|
}, undefined>], undefined>;
|
877
1459
|
}, undefined>, v.ObjectSchema<{
|
878
1460
|
readonly success: v.LiteralSchema<false, undefined>;
|
@@ -890,18 +1472,48 @@ declare namespace DcqlQueryResult {
|
|
890
1472
|
[x: string]: unknown;
|
891
1473
|
};
|
892
1474
|
};
|
1475
|
+
authority?: {
|
1476
|
+
type: "aki";
|
1477
|
+
value: string;
|
1478
|
+
} | {
|
1479
|
+
type: "etsi_tl";
|
1480
|
+
value: string;
|
1481
|
+
} | {
|
1482
|
+
type: "openid_federation";
|
1483
|
+
value: string;
|
1484
|
+
} | undefined;
|
893
1485
|
} | {
|
894
1486
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
895
1487
|
vct: string;
|
896
1488
|
claims: {
|
897
1489
|
[x: string]: Json;
|
898
1490
|
};
|
1491
|
+
authority?: {
|
1492
|
+
type: "aki";
|
1493
|
+
value: string;
|
1494
|
+
} | {
|
1495
|
+
type: "etsi_tl";
|
1496
|
+
value: string;
|
1497
|
+
} | {
|
1498
|
+
type: "openid_federation";
|
1499
|
+
value: string;
|
1500
|
+
} | undefined;
|
899
1501
|
} | {
|
900
1502
|
type: string[];
|
901
1503
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
902
1504
|
claims: {
|
903
1505
|
[x: string]: Json;
|
904
1506
|
};
|
1507
|
+
authority?: {
|
1508
|
+
type: "aki";
|
1509
|
+
value: string;
|
1510
|
+
} | {
|
1511
|
+
type: "etsi_tl";
|
1512
|
+
value: string;
|
1513
|
+
} | {
|
1514
|
+
type: "openid_federation";
|
1515
|
+
value: string;
|
1516
|
+
} | undefined;
|
905
1517
|
};
|
906
1518
|
success: true;
|
907
1519
|
typed: true;
|
@@ -924,18 +1536,48 @@ declare namespace DcqlQueryResult {
|
|
924
1536
|
[x: string]: unknown;
|
925
1537
|
};
|
926
1538
|
};
|
1539
|
+
authority?: {
|
1540
|
+
type: "aki";
|
1541
|
+
value: string;
|
1542
|
+
} | {
|
1543
|
+
type: "etsi_tl";
|
1544
|
+
value: string;
|
1545
|
+
} | {
|
1546
|
+
type: "openid_federation";
|
1547
|
+
value: string;
|
1548
|
+
} | undefined;
|
927
1549
|
} | {
|
928
1550
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
929
1551
|
vct: string;
|
930
1552
|
claims: {
|
931
1553
|
[x: string]: Json;
|
932
1554
|
};
|
1555
|
+
authority?: {
|
1556
|
+
type: "aki";
|
1557
|
+
value: string;
|
1558
|
+
} | {
|
1559
|
+
type: "etsi_tl";
|
1560
|
+
value: string;
|
1561
|
+
} | {
|
1562
|
+
type: "openid_federation";
|
1563
|
+
value: string;
|
1564
|
+
} | undefined;
|
933
1565
|
} | {
|
934
1566
|
type: string[];
|
935
1567
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
936
1568
|
claims: {
|
937
1569
|
[x: string]: Json;
|
938
1570
|
};
|
1571
|
+
authority?: {
|
1572
|
+
type: "aki";
|
1573
|
+
value: string;
|
1574
|
+
} | {
|
1575
|
+
type: "etsi_tl";
|
1576
|
+
value: string;
|
1577
|
+
} | {
|
1578
|
+
type: "openid_federation";
|
1579
|
+
value: string;
|
1580
|
+
} | undefined;
|
939
1581
|
};
|
940
1582
|
success: true;
|
941
1583
|
typed: true;
|
@@ -958,18 +1600,48 @@ declare namespace DcqlQueryResult {
|
|
958
1600
|
[x: string]: unknown;
|
959
1601
|
};
|
960
1602
|
};
|
1603
|
+
authority?: {
|
1604
|
+
type: "aki";
|
1605
|
+
value: string;
|
1606
|
+
} | {
|
1607
|
+
type: "etsi_tl";
|
1608
|
+
value: string;
|
1609
|
+
} | {
|
1610
|
+
type: "openid_federation";
|
1611
|
+
value: string;
|
1612
|
+
} | undefined;
|
961
1613
|
} | {
|
962
1614
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
963
1615
|
vct: string;
|
964
1616
|
claims: {
|
965
1617
|
[x: string]: Json;
|
966
1618
|
};
|
1619
|
+
authority?: {
|
1620
|
+
type: "aki";
|
1621
|
+
value: string;
|
1622
|
+
} | {
|
1623
|
+
type: "etsi_tl";
|
1624
|
+
value: string;
|
1625
|
+
} | {
|
1626
|
+
type: "openid_federation";
|
1627
|
+
value: string;
|
1628
|
+
} | undefined;
|
967
1629
|
} | {
|
968
1630
|
type: string[];
|
969
1631
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
970
1632
|
claims: {
|
971
1633
|
[x: string]: Json;
|
972
1634
|
};
|
1635
|
+
authority?: {
|
1636
|
+
type: "aki";
|
1637
|
+
value: string;
|
1638
|
+
} | {
|
1639
|
+
type: "etsi_tl";
|
1640
|
+
value: string;
|
1641
|
+
} | {
|
1642
|
+
type: "openid_federation";
|
1643
|
+
value: string;
|
1644
|
+
} | undefined;
|
973
1645
|
};
|
974
1646
|
success: true;
|
975
1647
|
typed: true;
|
@@ -992,18 +1664,48 @@ declare namespace DcqlQueryResult {
|
|
992
1664
|
[x: string]: unknown;
|
993
1665
|
};
|
994
1666
|
};
|
1667
|
+
authority?: {
|
1668
|
+
type: "aki";
|
1669
|
+
value: string;
|
1670
|
+
} | {
|
1671
|
+
type: "etsi_tl";
|
1672
|
+
value: string;
|
1673
|
+
} | {
|
1674
|
+
type: "openid_federation";
|
1675
|
+
value: string;
|
1676
|
+
} | undefined;
|
995
1677
|
} | {
|
996
1678
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
997
1679
|
vct: string;
|
998
1680
|
claims: {
|
999
1681
|
[x: string]: Json;
|
1000
1682
|
};
|
1683
|
+
authority?: {
|
1684
|
+
type: "aki";
|
1685
|
+
value: string;
|
1686
|
+
} | {
|
1687
|
+
type: "etsi_tl";
|
1688
|
+
value: string;
|
1689
|
+
} | {
|
1690
|
+
type: "openid_federation";
|
1691
|
+
value: string;
|
1692
|
+
} | undefined;
|
1001
1693
|
} | {
|
1002
1694
|
type: string[];
|
1003
1695
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
1004
1696
|
claims: {
|
1005
1697
|
[x: string]: Json;
|
1006
1698
|
};
|
1699
|
+
authority?: {
|
1700
|
+
type: "aki";
|
1701
|
+
value: string;
|
1702
|
+
} | {
|
1703
|
+
type: "etsi_tl";
|
1704
|
+
value: string;
|
1705
|
+
} | {
|
1706
|
+
type: "openid_federation";
|
1707
|
+
value: string;
|
1708
|
+
} | undefined;
|
1007
1709
|
};
|
1008
1710
|
success: true;
|
1009
1711
|
typed: true;
|
@@ -1026,18 +1728,48 @@ declare namespace DcqlQueryResult {
|
|
1026
1728
|
[x: string]: unknown;
|
1027
1729
|
};
|
1028
1730
|
};
|
1731
|
+
authority?: {
|
1732
|
+
type: "aki";
|
1733
|
+
value: string;
|
1734
|
+
} | {
|
1735
|
+
type: "etsi_tl";
|
1736
|
+
value: string;
|
1737
|
+
} | {
|
1738
|
+
type: "openid_federation";
|
1739
|
+
value: string;
|
1740
|
+
} | undefined;
|
1029
1741
|
} | {
|
1030
1742
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1031
1743
|
vct: string;
|
1032
1744
|
claims: {
|
1033
1745
|
[x: string]: Json;
|
1034
1746
|
};
|
1747
|
+
authority?: {
|
1748
|
+
type: "aki";
|
1749
|
+
value: string;
|
1750
|
+
} | {
|
1751
|
+
type: "etsi_tl";
|
1752
|
+
value: string;
|
1753
|
+
} | {
|
1754
|
+
type: "openid_federation";
|
1755
|
+
value: string;
|
1756
|
+
} | undefined;
|
1035
1757
|
} | {
|
1036
1758
|
type: string[];
|
1037
1759
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
1038
1760
|
claims: {
|
1039
1761
|
[x: string]: Json;
|
1040
1762
|
};
|
1763
|
+
authority?: {
|
1764
|
+
type: "aki";
|
1765
|
+
value: string;
|
1766
|
+
} | {
|
1767
|
+
type: "etsi_tl";
|
1768
|
+
value: string;
|
1769
|
+
} | {
|
1770
|
+
type: "openid_federation";
|
1771
|
+
value: string;
|
1772
|
+
} | undefined;
|
1041
1773
|
};
|
1042
1774
|
success: true;
|
1043
1775
|
typed: true;
|
@@ -1060,18 +1792,48 @@ declare namespace DcqlQueryResult {
|
|
1060
1792
|
[x: string]: unknown;
|
1061
1793
|
};
|
1062
1794
|
};
|
1795
|
+
authority?: {
|
1796
|
+
type: "aki";
|
1797
|
+
value: string;
|
1798
|
+
} | {
|
1799
|
+
type: "etsi_tl";
|
1800
|
+
value: string;
|
1801
|
+
} | {
|
1802
|
+
type: "openid_federation";
|
1803
|
+
value: string;
|
1804
|
+
} | undefined;
|
1063
1805
|
} | {
|
1064
1806
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1065
1807
|
vct: string;
|
1066
1808
|
claims: {
|
1067
1809
|
[x: string]: Json;
|
1068
1810
|
};
|
1811
|
+
authority?: {
|
1812
|
+
type: "aki";
|
1813
|
+
value: string;
|
1814
|
+
} | {
|
1815
|
+
type: "etsi_tl";
|
1816
|
+
value: string;
|
1817
|
+
} | {
|
1818
|
+
type: "openid_federation";
|
1819
|
+
value: string;
|
1820
|
+
} | undefined;
|
1069
1821
|
} | {
|
1070
1822
|
type: string[];
|
1071
1823
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
1072
1824
|
claims: {
|
1073
1825
|
[x: string]: Json;
|
1074
1826
|
};
|
1827
|
+
authority?: {
|
1828
|
+
type: "aki";
|
1829
|
+
value: string;
|
1830
|
+
} | {
|
1831
|
+
type: "etsi_tl";
|
1832
|
+
value: string;
|
1833
|
+
} | {
|
1834
|
+
type: "openid_federation";
|
1835
|
+
value: string;
|
1836
|
+
} | undefined;
|
1075
1837
|
};
|
1076
1838
|
success: true;
|
1077
1839
|
typed: true;
|
@@ -1138,11 +1900,31 @@ declare namespace DcqlMdocCredential {
|
|
1138
1900
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
1139
1901
|
readonly doctype: v.StringSchema<undefined>;
|
1140
1902
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
1903
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1904
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1905
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1906
|
+
}, undefined>, v.ObjectSchema<{
|
1907
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1908
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1909
|
+
}, undefined>, v.ObjectSchema<{
|
1910
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1911
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1912
|
+
}, undefined>], undefined>, undefined>;
|
1141
1913
|
}, undefined>;
|
1142
1914
|
const model: Model<v.ObjectSchema<{
|
1143
1915
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
1144
1916
|
readonly doctype: v.StringSchema<undefined>;
|
1145
1917
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
1918
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1919
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1920
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1921
|
+
}, undefined>, v.ObjectSchema<{
|
1922
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1923
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1924
|
+
}, undefined>, v.ObjectSchema<{
|
1925
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1926
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1927
|
+
}, undefined>], undefined>, undefined>;
|
1146
1928
|
}, undefined>>;
|
1147
1929
|
type Model = InferModelTypes<typeof model>;
|
1148
1930
|
type NameSpaces = v.InferOutput<typeof vNamespaces>;
|
@@ -1154,11 +1936,31 @@ declare namespace DcqlSdJwtVcCredential {
|
|
1154
1936
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
1155
1937
|
readonly vct: v.StringSchema<undefined>;
|
1156
1938
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1939
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1940
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1941
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1942
|
+
}, undefined>, v.ObjectSchema<{
|
1943
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1944
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1945
|
+
}, undefined>, v.ObjectSchema<{
|
1946
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1947
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1948
|
+
}, undefined>], undefined>, undefined>;
|
1157
1949
|
}, undefined>;
|
1158
1950
|
const model: Model<v.ObjectSchema<{
|
1159
1951
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
1160
1952
|
readonly vct: v.StringSchema<undefined>;
|
1161
1953
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1954
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1955
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1956
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1957
|
+
}, undefined>, v.ObjectSchema<{
|
1958
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1959
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1960
|
+
}, undefined>, v.ObjectSchema<{
|
1961
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1962
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1963
|
+
}, undefined>], undefined>, undefined>;
|
1162
1964
|
}, undefined>>;
|
1163
1965
|
type Model = InferModelTypes<typeof model>;
|
1164
1966
|
type Claims = Model['Output']['claims'];
|
@@ -1170,11 +1972,31 @@ declare namespace DcqlW3cVcCredential {
|
|
1170
1972
|
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
1171
1973
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1172
1974
|
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
1975
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1976
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1977
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1978
|
+
}, undefined>, v.ObjectSchema<{
|
1979
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1980
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1981
|
+
}, undefined>, v.ObjectSchema<{
|
1982
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1983
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1984
|
+
}, undefined>], undefined>, undefined>;
|
1173
1985
|
}, undefined>;
|
1174
1986
|
const model: Model<v.ObjectSchema<{
|
1175
1987
|
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
1176
1988
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1177
1989
|
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
1990
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
1991
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
1992
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
1993
|
+
}, undefined>, v.ObjectSchema<{
|
1994
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
1995
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
1996
|
+
}, undefined>, v.ObjectSchema<{
|
1997
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
1998
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
1999
|
+
}, undefined>], undefined>, undefined>;
|
1178
2000
|
}, undefined>>;
|
1179
2001
|
type Model = InferModelTypes<typeof model>;
|
1180
2002
|
type Claims = Model['Output']['claims'];
|
@@ -1185,14 +2007,44 @@ declare namespace DcqlCredential {
|
|
1185
2007
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
1186
2008
|
readonly doctype: v.StringSchema<undefined>;
|
1187
2009
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
2010
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2011
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2012
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2013
|
+
}, undefined>, v.ObjectSchema<{
|
2014
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2015
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2016
|
+
}, undefined>, v.ObjectSchema<{
|
2017
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2018
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2019
|
+
}, undefined>], undefined>, undefined>;
|
1188
2020
|
}, undefined>, v.ObjectSchema<{
|
1189
2021
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
1190
2022
|
readonly vct: v.StringSchema<undefined>;
|
1191
2023
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
2024
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2025
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2026
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2027
|
+
}, undefined>, v.ObjectSchema<{
|
2028
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2029
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2030
|
+
}, undefined>, v.ObjectSchema<{
|
2031
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2032
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2033
|
+
}, undefined>], undefined>, undefined>;
|
1192
2034
|
}, undefined>, v.ObjectSchema<{
|
1193
2035
|
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
1194
2036
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1195
2037
|
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
2038
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2039
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2040
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2041
|
+
}, undefined>, v.ObjectSchema<{
|
2042
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2043
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2044
|
+
}, undefined>, v.ObjectSchema<{
|
2045
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2046
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2047
|
+
}, undefined>], undefined>, undefined>;
|
1196
2048
|
}, undefined>], undefined>;
|
1197
2049
|
const vParseSuccess: v.ObjectSchema<{
|
1198
2050
|
readonly success: v.LiteralSchema<true, undefined>;
|
@@ -1204,14 +2056,44 @@ declare namespace DcqlCredential {
|
|
1204
2056
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
1205
2057
|
readonly doctype: v.StringSchema<undefined>;
|
1206
2058
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
2059
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2060
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2061
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2062
|
+
}, undefined>, v.ObjectSchema<{
|
2063
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2064
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2065
|
+
}, undefined>, v.ObjectSchema<{
|
2066
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2067
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2068
|
+
}, undefined>], undefined>, undefined>;
|
1207
2069
|
}, undefined>, v.ObjectSchema<{
|
1208
2070
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
1209
2071
|
readonly vct: v.StringSchema<undefined>;
|
1210
2072
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
2073
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2074
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2075
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2076
|
+
}, undefined>, v.ObjectSchema<{
|
2077
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2078
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2079
|
+
}, undefined>, v.ObjectSchema<{
|
2080
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2081
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2082
|
+
}, undefined>], undefined>, undefined>;
|
1211
2083
|
}, undefined>, v.ObjectSchema<{
|
1212
2084
|
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
1213
2085
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1214
2086
|
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
2087
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2088
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2089
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2090
|
+
}, undefined>, v.ObjectSchema<{
|
2091
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2092
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2093
|
+
}, undefined>, v.ObjectSchema<{
|
2094
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2095
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2096
|
+
}, undefined>], undefined>, undefined>;
|
1215
2097
|
}, undefined>], undefined>;
|
1216
2098
|
}, undefined>;
|
1217
2099
|
const vParseFailure: v.ObjectSchema<{
|
@@ -1226,14 +2108,44 @@ declare namespace DcqlCredential {
|
|
1226
2108
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
1227
2109
|
readonly doctype: v.StringSchema<undefined>;
|
1228
2110
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
2111
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2112
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2113
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2114
|
+
}, undefined>, v.ObjectSchema<{
|
2115
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2116
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2117
|
+
}, undefined>, v.ObjectSchema<{
|
2118
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2119
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2120
|
+
}, undefined>], undefined>, undefined>;
|
1229
2121
|
}, undefined>, v.ObjectSchema<{
|
1230
2122
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
1231
2123
|
readonly vct: v.StringSchema<undefined>;
|
1232
2124
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
2125
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2126
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2127
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2128
|
+
}, undefined>, v.ObjectSchema<{
|
2129
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2130
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2131
|
+
}, undefined>, v.ObjectSchema<{
|
2132
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2133
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2134
|
+
}, undefined>], undefined>, undefined>;
|
1233
2135
|
}, undefined>, v.ObjectSchema<{
|
1234
2136
|
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
1235
2137
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
1236
2138
|
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
2139
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
2140
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
2141
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
2142
|
+
}, undefined>, v.ObjectSchema<{
|
2143
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
2144
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
2145
|
+
}, undefined>, v.ObjectSchema<{
|
2146
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
2147
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
2148
|
+
}, undefined>], undefined>, undefined>;
|
1237
2149
|
}, undefined>], undefined>>;
|
1238
2150
|
type Model = InferModelTypes<typeof model>;
|
1239
2151
|
}
|
@@ -1309,6 +2221,22 @@ declare namespace DcqlQuery {
|
|
1309
2221
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
1310
2222
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
1311
2223
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
2224
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
2225
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
2226
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
2227
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
2228
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2229
|
+
values: [string, ...string[]];
|
2230
|
+
}, ...{
|
2231
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2232
|
+
values: [string, ...string[]];
|
2233
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
2234
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2235
|
+
values: [string, ...string[]];
|
2236
|
+
}, ...{
|
2237
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2238
|
+
values: [string, ...string[]];
|
2239
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
1312
2240
|
}, undefined>, v.ObjectSchema<{
|
1313
2241
|
readonly format: v.SchemaWithPipe<[v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>, v.DescriptionAction<"vc+sd-jwt" | "dc+sd-jwt", "REQUIRED. A string that specifies the format of the requested Verifiable Credential.">]>;
|
1314
2242
|
readonly claims: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
@@ -1341,6 +2269,22 @@ declare namespace DcqlQuery {
|
|
1341
2269
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
1342
2270
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
1343
2271
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
2272
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
2273
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
2274
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
2275
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
2276
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2277
|
+
values: [string, ...string[]];
|
2278
|
+
}, ...{
|
2279
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2280
|
+
values: [string, ...string[]];
|
2281
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
2282
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2283
|
+
values: [string, ...string[]];
|
2284
|
+
}, ...{
|
2285
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2286
|
+
values: [string, ...string[]];
|
2287
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
1344
2288
|
}, undefined>, v.ObjectSchema<{
|
1345
2289
|
readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
|
1346
2290
|
readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
@@ -1363,6 +2307,22 @@ declare namespace DcqlQuery {
|
|
1363
2307
|
}, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
1364
2308
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
1365
2309
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
2310
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
2311
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
2312
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
2313
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
2314
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2315
|
+
values: [string, ...string[]];
|
2316
|
+
}, ...{
|
2317
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2318
|
+
values: [string, ...string[]];
|
2319
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
2320
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2321
|
+
values: [string, ...string[]];
|
2322
|
+
}, ...{
|
2323
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2324
|
+
values: [string, ...string[]];
|
2325
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
1366
2326
|
}, undefined>], undefined>, undefined>, v.CustomSchema<[{
|
1367
2327
|
id: string;
|
1368
2328
|
format: "mso_mdoc";
|
@@ -1388,6 +2348,13 @@ declare namespace DcqlQuery {
|
|
1388
2348
|
intent_to_retain?: boolean | undefined;
|
1389
2349
|
})[]] | undefined;
|
1390
2350
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2351
|
+
trusted_authorities?: [{
|
2352
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2353
|
+
values: [string, ...string[]];
|
2354
|
+
}, ...{
|
2355
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2356
|
+
values: [string, ...string[]];
|
2357
|
+
}[]] | undefined;
|
1391
2358
|
meta?: {
|
1392
2359
|
doctype_value?: string | undefined;
|
1393
2360
|
} | undefined;
|
@@ -1404,6 +2371,13 @@ declare namespace DcqlQuery {
|
|
1404
2371
|
id?: string | undefined;
|
1405
2372
|
}[]] | undefined;
|
1406
2373
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2374
|
+
trusted_authorities?: [{
|
2375
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2376
|
+
values: [string, ...string[]];
|
2377
|
+
}, ...{
|
2378
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2379
|
+
values: [string, ...string[]];
|
2380
|
+
}[]] | undefined;
|
1407
2381
|
meta?: {
|
1408
2382
|
vct_values?: string[] | undefined;
|
1409
2383
|
} | undefined;
|
@@ -1423,6 +2397,13 @@ declare namespace DcqlQuery {
|
|
1423
2397
|
id?: string | undefined;
|
1424
2398
|
}[]] | undefined;
|
1425
2399
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2400
|
+
trusted_authorities?: [{
|
2401
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2402
|
+
values: [string, ...string[]];
|
2403
|
+
}, ...{
|
2404
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2405
|
+
values: [string, ...string[]];
|
2406
|
+
}[]] | undefined;
|
1426
2407
|
}, ...({
|
1427
2408
|
id: string;
|
1428
2409
|
format: "mso_mdoc";
|
@@ -1448,6 +2429,13 @@ declare namespace DcqlQuery {
|
|
1448
2429
|
intent_to_retain?: boolean | undefined;
|
1449
2430
|
})[]] | undefined;
|
1450
2431
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2432
|
+
trusted_authorities?: [{
|
2433
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2434
|
+
values: [string, ...string[]];
|
2435
|
+
}, ...{
|
2436
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2437
|
+
values: [string, ...string[]];
|
2438
|
+
}[]] | undefined;
|
1451
2439
|
meta?: {
|
1452
2440
|
doctype_value?: string | undefined;
|
1453
2441
|
} | undefined;
|
@@ -1464,6 +2452,13 @@ declare namespace DcqlQuery {
|
|
1464
2452
|
id?: string | undefined;
|
1465
2453
|
}[]] | undefined;
|
1466
2454
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2455
|
+
trusted_authorities?: [{
|
2456
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2457
|
+
values: [string, ...string[]];
|
2458
|
+
}, ...{
|
2459
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2460
|
+
values: [string, ...string[]];
|
2461
|
+
}[]] | undefined;
|
1467
2462
|
meta?: {
|
1468
2463
|
vct_values?: string[] | undefined;
|
1469
2464
|
} | undefined;
|
@@ -1483,6 +2478,13 @@ declare namespace DcqlQuery {
|
|
1483
2478
|
id?: string | undefined;
|
1484
2479
|
}[]] | undefined;
|
1485
2480
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2481
|
+
trusted_authorities?: [{
|
2482
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2483
|
+
values: [string, ...string[]];
|
2484
|
+
}, ...{
|
2485
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2486
|
+
values: [string, ...string[]];
|
2487
|
+
}[]] | undefined;
|
1486
2488
|
})[]], undefined>, v.DescriptionAction<[{
|
1487
2489
|
id: string;
|
1488
2490
|
format: "mso_mdoc";
|
@@ -1508,6 +2510,13 @@ declare namespace DcqlQuery {
|
|
1508
2510
|
intent_to_retain?: boolean | undefined;
|
1509
2511
|
})[]] | undefined;
|
1510
2512
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2513
|
+
trusted_authorities?: [{
|
2514
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2515
|
+
values: [string, ...string[]];
|
2516
|
+
}, ...{
|
2517
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2518
|
+
values: [string, ...string[]];
|
2519
|
+
}[]] | undefined;
|
1511
2520
|
meta?: {
|
1512
2521
|
doctype_value?: string | undefined;
|
1513
2522
|
} | undefined;
|
@@ -1524,6 +2533,13 @@ declare namespace DcqlQuery {
|
|
1524
2533
|
id?: string | undefined;
|
1525
2534
|
}[]] | undefined;
|
1526
2535
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2536
|
+
trusted_authorities?: [{
|
2537
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2538
|
+
values: [string, ...string[]];
|
2539
|
+
}, ...{
|
2540
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2541
|
+
values: [string, ...string[]];
|
2542
|
+
}[]] | undefined;
|
1527
2543
|
meta?: {
|
1528
2544
|
vct_values?: string[] | undefined;
|
1529
2545
|
} | undefined;
|
@@ -1543,6 +2559,13 @@ declare namespace DcqlQuery {
|
|
1543
2559
|
id?: string | undefined;
|
1544
2560
|
}[]] | undefined;
|
1545
2561
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2562
|
+
trusted_authorities?: [{
|
2563
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2564
|
+
values: [string, ...string[]];
|
2565
|
+
}, ...{
|
2566
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2567
|
+
values: [string, ...string[]];
|
2568
|
+
}[]] | undefined;
|
1546
2569
|
}, ...({
|
1547
2570
|
id: string;
|
1548
2571
|
format: "mso_mdoc";
|
@@ -1568,6 +2591,13 @@ declare namespace DcqlQuery {
|
|
1568
2591
|
intent_to_retain?: boolean | undefined;
|
1569
2592
|
})[]] | undefined;
|
1570
2593
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2594
|
+
trusted_authorities?: [{
|
2595
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2596
|
+
values: [string, ...string[]];
|
2597
|
+
}, ...{
|
2598
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2599
|
+
values: [string, ...string[]];
|
2600
|
+
}[]] | undefined;
|
1571
2601
|
meta?: {
|
1572
2602
|
doctype_value?: string | undefined;
|
1573
2603
|
} | undefined;
|
@@ -1584,6 +2614,13 @@ declare namespace DcqlQuery {
|
|
1584
2614
|
id?: string | undefined;
|
1585
2615
|
}[]] | undefined;
|
1586
2616
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2617
|
+
trusted_authorities?: [{
|
2618
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2619
|
+
values: [string, ...string[]];
|
2620
|
+
}, ...{
|
2621
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2622
|
+
values: [string, ...string[]];
|
2623
|
+
}[]] | undefined;
|
1587
2624
|
meta?: {
|
1588
2625
|
vct_values?: string[] | undefined;
|
1589
2626
|
} | undefined;
|
@@ -1603,6 +2640,13 @@ declare namespace DcqlQuery {
|
|
1603
2640
|
id?: string | undefined;
|
1604
2641
|
}[]] | undefined;
|
1605
2642
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2643
|
+
trusted_authorities?: [{
|
2644
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2645
|
+
values: [string, ...string[]];
|
2646
|
+
}, ...{
|
2647
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2648
|
+
values: [string, ...string[]];
|
2649
|
+
}[]] | undefined;
|
1606
2650
|
})[]], "REQUIRED. A non-empty array of Credential Queries that specify the requested Verifiable Credentials.">]>;
|
1607
2651
|
readonly credential_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
1608
2652
|
readonly options: v.SchemaWithPipe<[v.ArraySchema<v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, undefined>, v.CustomSchema<[string[], ...string[][]], undefined>, v.DescriptionAction<[string[], ...string[][]], "REQUIRED. A non-empty array, where each value in the array is a list of Credential Query identifiers representing one set of Credentials that satisfies the use case.">]>;
|
@@ -1665,6 +2709,13 @@ declare namespace DcqlQuery {
|
|
1665
2709
|
intent_to_retain?: boolean | undefined;
|
1666
2710
|
})[]] | undefined;
|
1667
2711
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2712
|
+
trusted_authorities?: [{
|
2713
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2714
|
+
values: [string, ...string[]];
|
2715
|
+
}, ...{
|
2716
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2717
|
+
values: [string, ...string[]];
|
2718
|
+
}[]] | undefined;
|
1668
2719
|
meta?: {
|
1669
2720
|
doctype_value?: string | undefined;
|
1670
2721
|
} | undefined;
|
@@ -1681,6 +2732,13 @@ declare namespace DcqlQuery {
|
|
1681
2732
|
id?: string | undefined;
|
1682
2733
|
}[]] | undefined;
|
1683
2734
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2735
|
+
trusted_authorities?: [{
|
2736
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2737
|
+
values: [string, ...string[]];
|
2738
|
+
}, ...{
|
2739
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2740
|
+
values: [string, ...string[]];
|
2741
|
+
}[]] | undefined;
|
1684
2742
|
meta?: {
|
1685
2743
|
vct_values?: string[] | undefined;
|
1686
2744
|
} | undefined;
|
@@ -1700,6 +2758,13 @@ declare namespace DcqlQuery {
|
|
1700
2758
|
id?: string | undefined;
|
1701
2759
|
}[]] | undefined;
|
1702
2760
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2761
|
+
trusted_authorities?: [{
|
2762
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2763
|
+
values: [string, ...string[]];
|
2764
|
+
}, ...{
|
2765
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2766
|
+
values: [string, ...string[]];
|
2767
|
+
}[]] | undefined;
|
1703
2768
|
}, ...({
|
1704
2769
|
id: string;
|
1705
2770
|
format: "mso_mdoc";
|
@@ -1725,6 +2790,13 @@ declare namespace DcqlQuery {
|
|
1725
2790
|
intent_to_retain?: boolean | undefined;
|
1726
2791
|
})[]] | undefined;
|
1727
2792
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2793
|
+
trusted_authorities?: [{
|
2794
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2795
|
+
values: [string, ...string[]];
|
2796
|
+
}, ...{
|
2797
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2798
|
+
values: [string, ...string[]];
|
2799
|
+
}[]] | undefined;
|
1728
2800
|
meta?: {
|
1729
2801
|
doctype_value?: string | undefined;
|
1730
2802
|
} | undefined;
|
@@ -1741,6 +2813,13 @@ declare namespace DcqlQuery {
|
|
1741
2813
|
id?: string | undefined;
|
1742
2814
|
}[]] | undefined;
|
1743
2815
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2816
|
+
trusted_authorities?: [{
|
2817
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2818
|
+
values: [string, ...string[]];
|
2819
|
+
}, ...{
|
2820
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2821
|
+
values: [string, ...string[]];
|
2822
|
+
}[]] | undefined;
|
1744
2823
|
meta?: {
|
1745
2824
|
vct_values?: string[] | undefined;
|
1746
2825
|
} | undefined;
|
@@ -1760,6 +2839,13 @@ declare namespace DcqlQuery {
|
|
1760
2839
|
id?: string | undefined;
|
1761
2840
|
}[]] | undefined;
|
1762
2841
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
2842
|
+
trusted_authorities?: [{
|
2843
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2844
|
+
values: [string, ...string[]];
|
2845
|
+
}, ...{
|
2846
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
2847
|
+
values: [string, ...string[]];
|
2848
|
+
}[]] | undefined;
|
1763
2849
|
})[]];
|
1764
2850
|
credential_matches: {
|
1765
2851
|
[x: string]: {
|
@@ -1771,18 +2857,48 @@ declare namespace DcqlQuery {
|
|
1771
2857
|
[x: string]: unknown;
|
1772
2858
|
};
|
1773
2859
|
};
|
2860
|
+
authority?: {
|
2861
|
+
type: "aki";
|
2862
|
+
value: string;
|
2863
|
+
} | {
|
2864
|
+
type: "etsi_tl";
|
2865
|
+
value: string;
|
2866
|
+
} | {
|
2867
|
+
type: "openid_federation";
|
2868
|
+
value: string;
|
2869
|
+
} | undefined;
|
1774
2870
|
} | {
|
1775
2871
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1776
2872
|
vct: string;
|
1777
2873
|
claims: {
|
1778
2874
|
[x: string]: Json;
|
1779
2875
|
};
|
2876
|
+
authority?: {
|
2877
|
+
type: "aki";
|
2878
|
+
value: string;
|
2879
|
+
} | {
|
2880
|
+
type: "etsi_tl";
|
2881
|
+
value: string;
|
2882
|
+
} | {
|
2883
|
+
type: "openid_federation";
|
2884
|
+
value: string;
|
2885
|
+
} | undefined;
|
1780
2886
|
} | {
|
1781
2887
|
type: string[];
|
1782
2888
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
1783
2889
|
claims: {
|
1784
2890
|
[x: string]: Json;
|
1785
2891
|
};
|
2892
|
+
authority?: {
|
2893
|
+
type: "aki";
|
2894
|
+
value: string;
|
2895
|
+
} | {
|
2896
|
+
type: "etsi_tl";
|
2897
|
+
value: string;
|
2898
|
+
} | {
|
2899
|
+
type: "openid_federation";
|
2900
|
+
value: string;
|
2901
|
+
} | undefined;
|
1786
2902
|
};
|
1787
2903
|
success: true;
|
1788
2904
|
typed: true;
|
@@ -1797,18 +2913,48 @@ declare namespace DcqlQuery {
|
|
1797
2913
|
[x: string]: unknown;
|
1798
2914
|
};
|
1799
2915
|
};
|
2916
|
+
authority?: {
|
2917
|
+
type: "aki";
|
2918
|
+
value: string;
|
2919
|
+
} | {
|
2920
|
+
type: "etsi_tl";
|
2921
|
+
value: string;
|
2922
|
+
} | {
|
2923
|
+
type: "openid_federation";
|
2924
|
+
value: string;
|
2925
|
+
} | undefined;
|
1800
2926
|
} | {
|
1801
2927
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1802
2928
|
vct: string;
|
1803
2929
|
claims: {
|
1804
2930
|
[x: string]: Json;
|
1805
2931
|
};
|
2932
|
+
authority?: {
|
2933
|
+
type: "aki";
|
2934
|
+
value: string;
|
2935
|
+
} | {
|
2936
|
+
type: "etsi_tl";
|
2937
|
+
value: string;
|
2938
|
+
} | {
|
2939
|
+
type: "openid_federation";
|
2940
|
+
value: string;
|
2941
|
+
} | undefined;
|
1806
2942
|
} | {
|
1807
2943
|
type: string[];
|
1808
2944
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
1809
2945
|
claims: {
|
1810
2946
|
[x: string]: Json;
|
1811
2947
|
};
|
2948
|
+
authority?: {
|
2949
|
+
type: "aki";
|
2950
|
+
value: string;
|
2951
|
+
} | {
|
2952
|
+
type: "etsi_tl";
|
2953
|
+
value: string;
|
2954
|
+
} | {
|
2955
|
+
type: "openid_federation";
|
2956
|
+
value: string;
|
2957
|
+
} | undefined;
|
1812
2958
|
};
|
1813
2959
|
success: true;
|
1814
2960
|
typed: true;
|
@@ -1831,18 +2977,48 @@ declare namespace DcqlQuery {
|
|
1831
2977
|
[x: string]: unknown;
|
1832
2978
|
};
|
1833
2979
|
};
|
2980
|
+
authority?: {
|
2981
|
+
type: "aki";
|
2982
|
+
value: string;
|
2983
|
+
} | {
|
2984
|
+
type: "etsi_tl";
|
2985
|
+
value: string;
|
2986
|
+
} | {
|
2987
|
+
type: "openid_federation";
|
2988
|
+
value: string;
|
2989
|
+
} | undefined;
|
1834
2990
|
} | {
|
1835
2991
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1836
2992
|
vct: string;
|
1837
2993
|
claims: {
|
1838
2994
|
[x: string]: Json;
|
1839
2995
|
};
|
2996
|
+
authority?: {
|
2997
|
+
type: "aki";
|
2998
|
+
value: string;
|
2999
|
+
} | {
|
3000
|
+
type: "etsi_tl";
|
3001
|
+
value: string;
|
3002
|
+
} | {
|
3003
|
+
type: "openid_federation";
|
3004
|
+
value: string;
|
3005
|
+
} | undefined;
|
1840
3006
|
} | {
|
1841
3007
|
type: string[];
|
1842
3008
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
1843
3009
|
claims: {
|
1844
3010
|
[x: string]: Json;
|
1845
3011
|
};
|
3012
|
+
authority?: {
|
3013
|
+
type: "aki";
|
3014
|
+
value: string;
|
3015
|
+
} | {
|
3016
|
+
type: "etsi_tl";
|
3017
|
+
value: string;
|
3018
|
+
} | {
|
3019
|
+
type: "openid_federation";
|
3020
|
+
value: string;
|
3021
|
+
} | undefined;
|
1846
3022
|
};
|
1847
3023
|
success: true;
|
1848
3024
|
typed: true;
|
@@ -1865,18 +3041,48 @@ declare namespace DcqlQuery {
|
|
1865
3041
|
[x: string]: unknown;
|
1866
3042
|
};
|
1867
3043
|
};
|
3044
|
+
authority?: {
|
3045
|
+
type: "aki";
|
3046
|
+
value: string;
|
3047
|
+
} | {
|
3048
|
+
type: "etsi_tl";
|
3049
|
+
value: string;
|
3050
|
+
} | {
|
3051
|
+
type: "openid_federation";
|
3052
|
+
value: string;
|
3053
|
+
} | undefined;
|
1868
3054
|
} | {
|
1869
3055
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1870
3056
|
vct: string;
|
1871
3057
|
claims: {
|
1872
3058
|
[x: string]: Json;
|
1873
3059
|
};
|
3060
|
+
authority?: {
|
3061
|
+
type: "aki";
|
3062
|
+
value: string;
|
3063
|
+
} | {
|
3064
|
+
type: "etsi_tl";
|
3065
|
+
value: string;
|
3066
|
+
} | {
|
3067
|
+
type: "openid_federation";
|
3068
|
+
value: string;
|
3069
|
+
} | undefined;
|
1874
3070
|
} | {
|
1875
3071
|
type: string[];
|
1876
3072
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
1877
3073
|
claims: {
|
1878
3074
|
[x: string]: Json;
|
1879
3075
|
};
|
3076
|
+
authority?: {
|
3077
|
+
type: "aki";
|
3078
|
+
value: string;
|
3079
|
+
} | {
|
3080
|
+
type: "etsi_tl";
|
3081
|
+
value: string;
|
3082
|
+
} | {
|
3083
|
+
type: "openid_federation";
|
3084
|
+
value: string;
|
3085
|
+
} | undefined;
|
1880
3086
|
};
|
1881
3087
|
success: true;
|
1882
3088
|
typed: true;
|
@@ -1899,18 +3105,48 @@ declare namespace DcqlQuery {
|
|
1899
3105
|
[x: string]: unknown;
|
1900
3106
|
};
|
1901
3107
|
};
|
3108
|
+
authority?: {
|
3109
|
+
type: "aki";
|
3110
|
+
value: string;
|
3111
|
+
} | {
|
3112
|
+
type: "etsi_tl";
|
3113
|
+
value: string;
|
3114
|
+
} | {
|
3115
|
+
type: "openid_federation";
|
3116
|
+
value: string;
|
3117
|
+
} | undefined;
|
1902
3118
|
} | {
|
1903
3119
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1904
3120
|
vct: string;
|
1905
3121
|
claims: {
|
1906
3122
|
[x: string]: Json;
|
1907
3123
|
};
|
3124
|
+
authority?: {
|
3125
|
+
type: "aki";
|
3126
|
+
value: string;
|
3127
|
+
} | {
|
3128
|
+
type: "etsi_tl";
|
3129
|
+
value: string;
|
3130
|
+
} | {
|
3131
|
+
type: "openid_federation";
|
3132
|
+
value: string;
|
3133
|
+
} | undefined;
|
1908
3134
|
} | {
|
1909
3135
|
type: string[];
|
1910
3136
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
1911
3137
|
claims: {
|
1912
3138
|
[x: string]: Json;
|
1913
3139
|
};
|
3140
|
+
authority?: {
|
3141
|
+
type: "aki";
|
3142
|
+
value: string;
|
3143
|
+
} | {
|
3144
|
+
type: "etsi_tl";
|
3145
|
+
value: string;
|
3146
|
+
} | {
|
3147
|
+
type: "openid_federation";
|
3148
|
+
value: string;
|
3149
|
+
} | undefined;
|
1914
3150
|
};
|
1915
3151
|
success: true;
|
1916
3152
|
typed: true;
|
@@ -1937,18 +3173,48 @@ declare namespace DcqlQuery {
|
|
1937
3173
|
[x: string]: unknown;
|
1938
3174
|
};
|
1939
3175
|
};
|
3176
|
+
authority?: {
|
3177
|
+
type: "aki";
|
3178
|
+
value: string;
|
3179
|
+
} | {
|
3180
|
+
type: "etsi_tl";
|
3181
|
+
value: string;
|
3182
|
+
} | {
|
3183
|
+
type: "openid_federation";
|
3184
|
+
value: string;
|
3185
|
+
} | undefined;
|
1940
3186
|
} | {
|
1941
3187
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1942
3188
|
vct: string;
|
1943
3189
|
claims: {
|
1944
3190
|
[x: string]: Json;
|
1945
3191
|
};
|
3192
|
+
authority?: {
|
3193
|
+
type: "aki";
|
3194
|
+
value: string;
|
3195
|
+
} | {
|
3196
|
+
type: "etsi_tl";
|
3197
|
+
value: string;
|
3198
|
+
} | {
|
3199
|
+
type: "openid_federation";
|
3200
|
+
value: string;
|
3201
|
+
} | undefined;
|
1946
3202
|
} | {
|
1947
3203
|
type: string[];
|
1948
3204
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
1949
3205
|
claims: {
|
1950
3206
|
[x: string]: Json;
|
1951
3207
|
};
|
3208
|
+
authority?: {
|
3209
|
+
type: "aki";
|
3210
|
+
value: string;
|
3211
|
+
} | {
|
3212
|
+
type: "etsi_tl";
|
3213
|
+
value: string;
|
3214
|
+
} | {
|
3215
|
+
type: "openid_federation";
|
3216
|
+
value: string;
|
3217
|
+
} | undefined;
|
1952
3218
|
};
|
1953
3219
|
success: true;
|
1954
3220
|
typed: true;
|
@@ -1971,18 +3237,48 @@ declare namespace DcqlQuery {
|
|
1971
3237
|
[x: string]: unknown;
|
1972
3238
|
};
|
1973
3239
|
};
|
3240
|
+
authority?: {
|
3241
|
+
type: "aki";
|
3242
|
+
value: string;
|
3243
|
+
} | {
|
3244
|
+
type: "etsi_tl";
|
3245
|
+
value: string;
|
3246
|
+
} | {
|
3247
|
+
type: "openid_federation";
|
3248
|
+
value: string;
|
3249
|
+
} | undefined;
|
1974
3250
|
} | {
|
1975
3251
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
1976
3252
|
vct: string;
|
1977
3253
|
claims: {
|
1978
3254
|
[x: string]: Json;
|
1979
3255
|
};
|
3256
|
+
authority?: {
|
3257
|
+
type: "aki";
|
3258
|
+
value: string;
|
3259
|
+
} | {
|
3260
|
+
type: "etsi_tl";
|
3261
|
+
value: string;
|
3262
|
+
} | {
|
3263
|
+
type: "openid_federation";
|
3264
|
+
value: string;
|
3265
|
+
} | undefined;
|
1980
3266
|
} | {
|
1981
3267
|
type: string[];
|
1982
3268
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
1983
3269
|
claims: {
|
1984
3270
|
[x: string]: Json;
|
1985
3271
|
};
|
3272
|
+
authority?: {
|
3273
|
+
type: "aki";
|
3274
|
+
value: string;
|
3275
|
+
} | {
|
3276
|
+
type: "etsi_tl";
|
3277
|
+
value: string;
|
3278
|
+
} | {
|
3279
|
+
type: "openid_federation";
|
3280
|
+
value: string;
|
3281
|
+
} | undefined;
|
1986
3282
|
};
|
1987
3283
|
success: true;
|
1988
3284
|
typed: true;
|
@@ -2005,18 +3301,48 @@ declare namespace DcqlQuery {
|
|
2005
3301
|
[x: string]: unknown;
|
2006
3302
|
};
|
2007
3303
|
};
|
3304
|
+
authority?: {
|
3305
|
+
type: "aki";
|
3306
|
+
value: string;
|
3307
|
+
} | {
|
3308
|
+
type: "etsi_tl";
|
3309
|
+
value: string;
|
3310
|
+
} | {
|
3311
|
+
type: "openid_federation";
|
3312
|
+
value: string;
|
3313
|
+
} | undefined;
|
2008
3314
|
} | {
|
2009
3315
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
2010
3316
|
vct: string;
|
2011
3317
|
claims: {
|
2012
3318
|
[x: string]: Json;
|
2013
3319
|
};
|
3320
|
+
authority?: {
|
3321
|
+
type: "aki";
|
3322
|
+
value: string;
|
3323
|
+
} | {
|
3324
|
+
type: "etsi_tl";
|
3325
|
+
value: string;
|
3326
|
+
} | {
|
3327
|
+
type: "openid_federation";
|
3328
|
+
value: string;
|
3329
|
+
} | undefined;
|
2014
3330
|
} | {
|
2015
3331
|
type: string[];
|
2016
3332
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
2017
3333
|
claims: {
|
2018
3334
|
[x: string]: Json;
|
2019
3335
|
};
|
3336
|
+
authority?: {
|
3337
|
+
type: "aki";
|
3338
|
+
value: string;
|
3339
|
+
} | {
|
3340
|
+
type: "etsi_tl";
|
3341
|
+
value: string;
|
3342
|
+
} | {
|
3343
|
+
type: "openid_federation";
|
3344
|
+
value: string;
|
3345
|
+
} | undefined;
|
2020
3346
|
};
|
2021
3347
|
success: true;
|
2022
3348
|
typed: true;
|
@@ -2039,18 +3365,48 @@ declare namespace DcqlQuery {
|
|
2039
3365
|
[x: string]: unknown;
|
2040
3366
|
};
|
2041
3367
|
};
|
3368
|
+
authority?: {
|
3369
|
+
type: "aki";
|
3370
|
+
value: string;
|
3371
|
+
} | {
|
3372
|
+
type: "etsi_tl";
|
3373
|
+
value: string;
|
3374
|
+
} | {
|
3375
|
+
type: "openid_federation";
|
3376
|
+
value: string;
|
3377
|
+
} | undefined;
|
2042
3378
|
} | {
|
2043
3379
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
2044
3380
|
vct: string;
|
2045
3381
|
claims: {
|
2046
3382
|
[x: string]: Json;
|
2047
3383
|
};
|
3384
|
+
authority?: {
|
3385
|
+
type: "aki";
|
3386
|
+
value: string;
|
3387
|
+
} | {
|
3388
|
+
type: "etsi_tl";
|
3389
|
+
value: string;
|
3390
|
+
} | {
|
3391
|
+
type: "openid_federation";
|
3392
|
+
value: string;
|
3393
|
+
} | undefined;
|
2048
3394
|
} | {
|
2049
3395
|
type: string[];
|
2050
3396
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
2051
3397
|
claims: {
|
2052
3398
|
[x: string]: Json;
|
2053
3399
|
};
|
3400
|
+
authority?: {
|
3401
|
+
type: "aki";
|
3402
|
+
value: string;
|
3403
|
+
} | {
|
3404
|
+
type: "etsi_tl";
|
3405
|
+
value: string;
|
3406
|
+
} | {
|
3407
|
+
type: "openid_federation";
|
3408
|
+
value: string;
|
3409
|
+
} | undefined;
|
2054
3410
|
};
|
2055
3411
|
success: true;
|
2056
3412
|
typed: true;
|
@@ -2110,6 +3466,13 @@ declare namespace DcqlQuery {
|
|
2110
3466
|
intent_to_retain?: boolean | undefined;
|
2111
3467
|
})[]] | undefined;
|
2112
3468
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3469
|
+
trusted_authorities?: [{
|
3470
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3471
|
+
values: [string, ...string[]];
|
3472
|
+
}, ...{
|
3473
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3474
|
+
values: [string, ...string[]];
|
3475
|
+
}[]] | undefined;
|
2113
3476
|
meta?: {
|
2114
3477
|
doctype_value?: string | undefined;
|
2115
3478
|
} | undefined;
|
@@ -2126,6 +3489,13 @@ declare namespace DcqlQuery {
|
|
2126
3489
|
id?: string | undefined;
|
2127
3490
|
}[]] | undefined;
|
2128
3491
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3492
|
+
trusted_authorities?: [{
|
3493
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3494
|
+
values: [string, ...string[]];
|
3495
|
+
}, ...{
|
3496
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3497
|
+
values: [string, ...string[]];
|
3498
|
+
}[]] | undefined;
|
2129
3499
|
meta?: {
|
2130
3500
|
vct_values?: string[] | undefined;
|
2131
3501
|
} | undefined;
|
@@ -2145,6 +3515,13 @@ declare namespace DcqlQuery {
|
|
2145
3515
|
id?: string | undefined;
|
2146
3516
|
}[]] | undefined;
|
2147
3517
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3518
|
+
trusted_authorities?: [{
|
3519
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3520
|
+
values: [string, ...string[]];
|
3521
|
+
}, ...{
|
3522
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3523
|
+
values: [string, ...string[]];
|
3524
|
+
}[]] | undefined;
|
2148
3525
|
}, ...({
|
2149
3526
|
id: string;
|
2150
3527
|
format: "mso_mdoc";
|
@@ -2170,6 +3547,13 @@ declare namespace DcqlQuery {
|
|
2170
3547
|
intent_to_retain?: boolean | undefined;
|
2171
3548
|
})[]] | undefined;
|
2172
3549
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3550
|
+
trusted_authorities?: [{
|
3551
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3552
|
+
values: [string, ...string[]];
|
3553
|
+
}, ...{
|
3554
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3555
|
+
values: [string, ...string[]];
|
3556
|
+
}[]] | undefined;
|
2173
3557
|
meta?: {
|
2174
3558
|
doctype_value?: string | undefined;
|
2175
3559
|
} | undefined;
|
@@ -2186,6 +3570,13 @@ declare namespace DcqlQuery {
|
|
2186
3570
|
id?: string | undefined;
|
2187
3571
|
}[]] | undefined;
|
2188
3572
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3573
|
+
trusted_authorities?: [{
|
3574
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3575
|
+
values: [string, ...string[]];
|
3576
|
+
}, ...{
|
3577
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3578
|
+
values: [string, ...string[]];
|
3579
|
+
}[]] | undefined;
|
2189
3580
|
meta?: {
|
2190
3581
|
vct_values?: string[] | undefined;
|
2191
3582
|
} | undefined;
|
@@ -2205,6 +3596,13 @@ declare namespace DcqlQuery {
|
|
2205
3596
|
id?: string | undefined;
|
2206
3597
|
}[]] | undefined;
|
2207
3598
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3599
|
+
trusted_authorities?: [{
|
3600
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3601
|
+
values: [string, ...string[]];
|
3602
|
+
}, ...{
|
3603
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3604
|
+
values: [string, ...string[]];
|
3605
|
+
}[]] | undefined;
|
2208
3606
|
})[]];
|
2209
3607
|
credential_sets?: [{
|
2210
3608
|
options: [string[], ...string[][]];
|
@@ -2239,14 +3637,44 @@ declare namespace DcqlPresentationResult {
|
|
2239
3637
|
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
|
2240
3638
|
readonly doctype: v.StringSchema<undefined>;
|
2241
3639
|
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
|
3640
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
3641
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
3642
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
3643
|
+
}, undefined>, v.ObjectSchema<{
|
3644
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
3645
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
3646
|
+
}, undefined>, v.ObjectSchema<{
|
3647
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
3648
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
3649
|
+
}, undefined>], undefined>, undefined>;
|
2242
3650
|
}, undefined>, v.ObjectSchema<{
|
2243
3651
|
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
|
2244
3652
|
readonly vct: v.StringSchema<undefined>;
|
2245
3653
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
3654
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
3655
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
3656
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
3657
|
+
}, undefined>, v.ObjectSchema<{
|
3658
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
3659
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
3660
|
+
}, undefined>, v.ObjectSchema<{
|
3661
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
3662
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
3663
|
+
}, undefined>], undefined>, undefined>;
|
2246
3664
|
}, undefined>, v.ObjectSchema<{
|
2247
3665
|
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
|
2248
3666
|
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
|
2249
3667
|
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
|
3668
|
+
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
3669
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
3670
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
3671
|
+
}, undefined>, v.ObjectSchema<{
|
3672
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
3673
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
3674
|
+
}, undefined>, v.ObjectSchema<{
|
3675
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
3676
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
3677
|
+
}, undefined>], undefined>, undefined>;
|
2250
3678
|
}, undefined>], undefined>;
|
2251
3679
|
readonly success: v.LiteralSchema<true, undefined>;
|
2252
3680
|
readonly typed: v.LiteralSchema<true, undefined>;
|
@@ -2312,6 +3740,22 @@ declare namespace DcqlPresentationResult {
|
|
2312
3740
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
2313
3741
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
2314
3742
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
3743
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
3744
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
3745
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
3746
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
3747
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3748
|
+
values: [string, ...string[]];
|
3749
|
+
}, ...{
|
3750
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3751
|
+
values: [string, ...string[]];
|
3752
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
3753
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3754
|
+
values: [string, ...string[]];
|
3755
|
+
}, ...{
|
3756
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3757
|
+
values: [string, ...string[]];
|
3758
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
2315
3759
|
}, undefined>, v.ObjectSchema<{
|
2316
3760
|
readonly format: v.SchemaWithPipe<[v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>, v.DescriptionAction<"vc+sd-jwt" | "dc+sd-jwt", "REQUIRED. A string that specifies the format of the requested Verifiable Credential.">]>;
|
2317
3761
|
readonly claims: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
@@ -2344,6 +3788,22 @@ declare namespace DcqlPresentationResult {
|
|
2344
3788
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
2345
3789
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
2346
3790
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
3791
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
3792
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
3793
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
3794
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
3795
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3796
|
+
values: [string, ...string[]];
|
3797
|
+
}, ...{
|
3798
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3799
|
+
values: [string, ...string[]];
|
3800
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
3801
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3802
|
+
values: [string, ...string[]];
|
3803
|
+
}, ...{
|
3804
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3805
|
+
values: [string, ...string[]];
|
3806
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
2347
3807
|
}, undefined>, v.ObjectSchema<{
|
2348
3808
|
readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
|
2349
3809
|
readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
@@ -2366,6 +3826,22 @@ declare namespace DcqlPresentationResult {
|
|
2366
3826
|
}, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
2367
3827
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
2368
3828
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
3829
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
3830
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
3831
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
3832
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
3833
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3834
|
+
values: [string, ...string[]];
|
3835
|
+
}, ...{
|
3836
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3837
|
+
values: [string, ...string[]];
|
3838
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
3839
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3840
|
+
values: [string, ...string[]];
|
3841
|
+
}, ...{
|
3842
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3843
|
+
values: [string, ...string[]];
|
3844
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
2369
3845
|
}, undefined>], undefined>, undefined>, v.CustomSchema<[{
|
2370
3846
|
id: string;
|
2371
3847
|
format: "mso_mdoc";
|
@@ -2391,6 +3867,13 @@ declare namespace DcqlPresentationResult {
|
|
2391
3867
|
intent_to_retain?: boolean | undefined;
|
2392
3868
|
})[]] | undefined;
|
2393
3869
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3870
|
+
trusted_authorities?: [{
|
3871
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3872
|
+
values: [string, ...string[]];
|
3873
|
+
}, ...{
|
3874
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3875
|
+
values: [string, ...string[]];
|
3876
|
+
}[]] | undefined;
|
2394
3877
|
meta?: {
|
2395
3878
|
doctype_value?: string | undefined;
|
2396
3879
|
} | undefined;
|
@@ -2407,6 +3890,13 @@ declare namespace DcqlPresentationResult {
|
|
2407
3890
|
id?: string | undefined;
|
2408
3891
|
}[]] | undefined;
|
2409
3892
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3893
|
+
trusted_authorities?: [{
|
3894
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3895
|
+
values: [string, ...string[]];
|
3896
|
+
}, ...{
|
3897
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3898
|
+
values: [string, ...string[]];
|
3899
|
+
}[]] | undefined;
|
2410
3900
|
meta?: {
|
2411
3901
|
vct_values?: string[] | undefined;
|
2412
3902
|
} | undefined;
|
@@ -2426,6 +3916,13 @@ declare namespace DcqlPresentationResult {
|
|
2426
3916
|
id?: string | undefined;
|
2427
3917
|
}[]] | undefined;
|
2428
3918
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3919
|
+
trusted_authorities?: [{
|
3920
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3921
|
+
values: [string, ...string[]];
|
3922
|
+
}, ...{
|
3923
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3924
|
+
values: [string, ...string[]];
|
3925
|
+
}[]] | undefined;
|
2429
3926
|
}, ...({
|
2430
3927
|
id: string;
|
2431
3928
|
format: "mso_mdoc";
|
@@ -2451,6 +3948,13 @@ declare namespace DcqlPresentationResult {
|
|
2451
3948
|
intent_to_retain?: boolean | undefined;
|
2452
3949
|
})[]] | undefined;
|
2453
3950
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3951
|
+
trusted_authorities?: [{
|
3952
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3953
|
+
values: [string, ...string[]];
|
3954
|
+
}, ...{
|
3955
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3956
|
+
values: [string, ...string[]];
|
3957
|
+
}[]] | undefined;
|
2454
3958
|
meta?: {
|
2455
3959
|
doctype_value?: string | undefined;
|
2456
3960
|
} | undefined;
|
@@ -2467,6 +3971,13 @@ declare namespace DcqlPresentationResult {
|
|
2467
3971
|
id?: string | undefined;
|
2468
3972
|
}[]] | undefined;
|
2469
3973
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
3974
|
+
trusted_authorities?: [{
|
3975
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3976
|
+
values: [string, ...string[]];
|
3977
|
+
}, ...{
|
3978
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
3979
|
+
values: [string, ...string[]];
|
3980
|
+
}[]] | undefined;
|
2470
3981
|
meta?: {
|
2471
3982
|
vct_values?: string[] | undefined;
|
2472
3983
|
} | undefined;
|
@@ -2486,6 +3997,13 @@ declare namespace DcqlPresentationResult {
|
|
2486
3997
|
id?: string | undefined;
|
2487
3998
|
}[]] | undefined;
|
2488
3999
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4000
|
+
trusted_authorities?: [{
|
4001
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4002
|
+
values: [string, ...string[]];
|
4003
|
+
}, ...{
|
4004
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4005
|
+
values: [string, ...string[]];
|
4006
|
+
}[]] | undefined;
|
2489
4007
|
})[]], undefined>, v.DescriptionAction<[{
|
2490
4008
|
id: string;
|
2491
4009
|
format: "mso_mdoc";
|
@@ -2511,6 +4029,13 @@ declare namespace DcqlPresentationResult {
|
|
2511
4029
|
intent_to_retain?: boolean | undefined;
|
2512
4030
|
})[]] | undefined;
|
2513
4031
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4032
|
+
trusted_authorities?: [{
|
4033
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4034
|
+
values: [string, ...string[]];
|
4035
|
+
}, ...{
|
4036
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4037
|
+
values: [string, ...string[]];
|
4038
|
+
}[]] | undefined;
|
2514
4039
|
meta?: {
|
2515
4040
|
doctype_value?: string | undefined;
|
2516
4041
|
} | undefined;
|
@@ -2527,6 +4052,13 @@ declare namespace DcqlPresentationResult {
|
|
2527
4052
|
id?: string | undefined;
|
2528
4053
|
}[]] | undefined;
|
2529
4054
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4055
|
+
trusted_authorities?: [{
|
4056
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4057
|
+
values: [string, ...string[]];
|
4058
|
+
}, ...{
|
4059
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4060
|
+
values: [string, ...string[]];
|
4061
|
+
}[]] | undefined;
|
2530
4062
|
meta?: {
|
2531
4063
|
vct_values?: string[] | undefined;
|
2532
4064
|
} | undefined;
|
@@ -2546,6 +4078,13 @@ declare namespace DcqlPresentationResult {
|
|
2546
4078
|
id?: string | undefined;
|
2547
4079
|
}[]] | undefined;
|
2548
4080
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4081
|
+
trusted_authorities?: [{
|
4082
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4083
|
+
values: [string, ...string[]];
|
4084
|
+
}, ...{
|
4085
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4086
|
+
values: [string, ...string[]];
|
4087
|
+
}[]] | undefined;
|
2549
4088
|
}, ...({
|
2550
4089
|
id: string;
|
2551
4090
|
format: "mso_mdoc";
|
@@ -2571,6 +4110,13 @@ declare namespace DcqlPresentationResult {
|
|
2571
4110
|
intent_to_retain?: boolean | undefined;
|
2572
4111
|
})[]] | undefined;
|
2573
4112
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4113
|
+
trusted_authorities?: [{
|
4114
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4115
|
+
values: [string, ...string[]];
|
4116
|
+
}, ...{
|
4117
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4118
|
+
values: [string, ...string[]];
|
4119
|
+
}[]] | undefined;
|
2574
4120
|
meta?: {
|
2575
4121
|
doctype_value?: string | undefined;
|
2576
4122
|
} | undefined;
|
@@ -2587,6 +4133,13 @@ declare namespace DcqlPresentationResult {
|
|
2587
4133
|
id?: string | undefined;
|
2588
4134
|
}[]] | undefined;
|
2589
4135
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4136
|
+
trusted_authorities?: [{
|
4137
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4138
|
+
values: [string, ...string[]];
|
4139
|
+
}, ...{
|
4140
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4141
|
+
values: [string, ...string[]];
|
4142
|
+
}[]] | undefined;
|
2590
4143
|
meta?: {
|
2591
4144
|
vct_values?: string[] | undefined;
|
2592
4145
|
} | undefined;
|
@@ -2606,6 +4159,13 @@ declare namespace DcqlPresentationResult {
|
|
2606
4159
|
id?: string | undefined;
|
2607
4160
|
}[]] | undefined;
|
2608
4161
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4162
|
+
trusted_authorities?: [{
|
4163
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4164
|
+
values: [string, ...string[]];
|
4165
|
+
}, ...{
|
4166
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4167
|
+
values: [string, ...string[]];
|
4168
|
+
}[]] | undefined;
|
2609
4169
|
})[]], "REQUIRED. A non-empty array of Credential Queries that specify the requested Verifiable Credentials.">]>;
|
2610
4170
|
readonly credential_sets: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
2611
4171
|
readonly matching_options: v.UnionSchema<[v.UndefinedSchema<undefined>, v.SchemaWithPipe<[v.ArraySchema<v.ArraySchema<v.StringSchema<undefined>, undefined>, undefined>, v.CustomSchema<[string[], ...string[][]], undefined>]>], undefined>;
|
@@ -2673,6 +4233,13 @@ declare namespace DcqlPresentationResult {
|
|
2673
4233
|
intent_to_retain?: boolean | undefined;
|
2674
4234
|
})[]] | undefined;
|
2675
4235
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4236
|
+
trusted_authorities?: [{
|
4237
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4238
|
+
values: [string, ...string[]];
|
4239
|
+
}, ...{
|
4240
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4241
|
+
values: [string, ...string[]];
|
4242
|
+
}[]] | undefined;
|
2676
4243
|
meta?: {
|
2677
4244
|
doctype_value?: string | undefined;
|
2678
4245
|
} | undefined;
|
@@ -2689,6 +4256,13 @@ declare namespace DcqlPresentationResult {
|
|
2689
4256
|
id?: string | undefined;
|
2690
4257
|
}[]] | undefined;
|
2691
4258
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4259
|
+
trusted_authorities?: [{
|
4260
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4261
|
+
values: [string, ...string[]];
|
4262
|
+
}, ...{
|
4263
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4264
|
+
values: [string, ...string[]];
|
4265
|
+
}[]] | undefined;
|
2692
4266
|
meta?: {
|
2693
4267
|
vct_values?: string[] | undefined;
|
2694
4268
|
} | undefined;
|
@@ -2708,6 +4282,13 @@ declare namespace DcqlPresentationResult {
|
|
2708
4282
|
id?: string | undefined;
|
2709
4283
|
}[]] | undefined;
|
2710
4284
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4285
|
+
trusted_authorities?: [{
|
4286
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4287
|
+
values: [string, ...string[]];
|
4288
|
+
}, ...{
|
4289
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4290
|
+
values: [string, ...string[]];
|
4291
|
+
}[]] | undefined;
|
2711
4292
|
}, ...({
|
2712
4293
|
id: string;
|
2713
4294
|
format: "mso_mdoc";
|
@@ -2733,6 +4314,13 @@ declare namespace DcqlPresentationResult {
|
|
2733
4314
|
intent_to_retain?: boolean | undefined;
|
2734
4315
|
})[]] | undefined;
|
2735
4316
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4317
|
+
trusted_authorities?: [{
|
4318
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4319
|
+
values: [string, ...string[]];
|
4320
|
+
}, ...{
|
4321
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4322
|
+
values: [string, ...string[]];
|
4323
|
+
}[]] | undefined;
|
2736
4324
|
meta?: {
|
2737
4325
|
doctype_value?: string | undefined;
|
2738
4326
|
} | undefined;
|
@@ -2749,6 +4337,13 @@ declare namespace DcqlPresentationResult {
|
|
2749
4337
|
id?: string | undefined;
|
2750
4338
|
}[]] | undefined;
|
2751
4339
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4340
|
+
trusted_authorities?: [{
|
4341
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4342
|
+
values: [string, ...string[]];
|
4343
|
+
}, ...{
|
4344
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4345
|
+
values: [string, ...string[]];
|
4346
|
+
}[]] | undefined;
|
2752
4347
|
meta?: {
|
2753
4348
|
vct_values?: string[] | undefined;
|
2754
4349
|
} | undefined;
|
@@ -2768,6 +4363,13 @@ declare namespace DcqlPresentationResult {
|
|
2768
4363
|
id?: string | undefined;
|
2769
4364
|
}[]] | undefined;
|
2770
4365
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4366
|
+
trusted_authorities?: [{
|
4367
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4368
|
+
values: [string, ...string[]];
|
4369
|
+
}, ...{
|
4370
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4371
|
+
values: [string, ...string[]];
|
4372
|
+
}[]] | undefined;
|
2771
4373
|
})[]];
|
2772
4374
|
canBeSatisfied: boolean;
|
2773
4375
|
invalid_matches: {
|
@@ -2790,18 +4392,48 @@ declare namespace DcqlPresentationResult {
|
|
2790
4392
|
[x: string]: unknown;
|
2791
4393
|
};
|
2792
4394
|
};
|
4395
|
+
authority?: {
|
4396
|
+
type: "aki";
|
4397
|
+
value: string;
|
4398
|
+
} | {
|
4399
|
+
type: "etsi_tl";
|
4400
|
+
value: string;
|
4401
|
+
} | {
|
4402
|
+
type: "openid_federation";
|
4403
|
+
value: string;
|
4404
|
+
} | undefined;
|
2793
4405
|
} | {
|
2794
4406
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
2795
4407
|
vct: string;
|
2796
4408
|
claims: {
|
2797
4409
|
[x: string]: Json;
|
2798
4410
|
};
|
4411
|
+
authority?: {
|
4412
|
+
type: "aki";
|
4413
|
+
value: string;
|
4414
|
+
} | {
|
4415
|
+
type: "etsi_tl";
|
4416
|
+
value: string;
|
4417
|
+
} | {
|
4418
|
+
type: "openid_federation";
|
4419
|
+
value: string;
|
4420
|
+
} | undefined;
|
2799
4421
|
} | {
|
2800
4422
|
type: string[];
|
2801
4423
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
2802
4424
|
claims: {
|
2803
4425
|
[x: string]: Json;
|
2804
4426
|
};
|
4427
|
+
authority?: {
|
4428
|
+
type: "aki";
|
4429
|
+
value: string;
|
4430
|
+
} | {
|
4431
|
+
type: "etsi_tl";
|
4432
|
+
value: string;
|
4433
|
+
} | {
|
4434
|
+
type: "openid_federation";
|
4435
|
+
value: string;
|
4436
|
+
} | undefined;
|
2805
4437
|
};
|
2806
4438
|
success: true;
|
2807
4439
|
typed: true;
|
@@ -2861,6 +4493,13 @@ declare namespace DcqlPresentationResult {
|
|
2861
4493
|
intent_to_retain?: boolean | undefined;
|
2862
4494
|
})[]] | undefined;
|
2863
4495
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4496
|
+
trusted_authorities?: [{
|
4497
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4498
|
+
values: [string, ...string[]];
|
4499
|
+
}, ...{
|
4500
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4501
|
+
values: [string, ...string[]];
|
4502
|
+
}[]] | undefined;
|
2864
4503
|
meta?: {
|
2865
4504
|
doctype_value?: string | undefined;
|
2866
4505
|
} | undefined;
|
@@ -2877,6 +4516,13 @@ declare namespace DcqlPresentationResult {
|
|
2877
4516
|
id?: string | undefined;
|
2878
4517
|
}[]] | undefined;
|
2879
4518
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4519
|
+
trusted_authorities?: [{
|
4520
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4521
|
+
values: [string, ...string[]];
|
4522
|
+
}, ...{
|
4523
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4524
|
+
values: [string, ...string[]];
|
4525
|
+
}[]] | undefined;
|
2880
4526
|
meta?: {
|
2881
4527
|
vct_values?: string[] | undefined;
|
2882
4528
|
} | undefined;
|
@@ -2896,6 +4542,13 @@ declare namespace DcqlPresentationResult {
|
|
2896
4542
|
id?: string | undefined;
|
2897
4543
|
}[]] | undefined;
|
2898
4544
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4545
|
+
trusted_authorities?: [{
|
4546
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4547
|
+
values: [string, ...string[]];
|
4548
|
+
}, ...{
|
4549
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4550
|
+
values: [string, ...string[]];
|
4551
|
+
}[]] | undefined;
|
2899
4552
|
}, ...({
|
2900
4553
|
id: string;
|
2901
4554
|
format: "mso_mdoc";
|
@@ -2921,6 +4574,13 @@ declare namespace DcqlPresentationResult {
|
|
2921
4574
|
intent_to_retain?: boolean | undefined;
|
2922
4575
|
})[]] | undefined;
|
2923
4576
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4577
|
+
trusted_authorities?: [{
|
4578
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4579
|
+
values: [string, ...string[]];
|
4580
|
+
}, ...{
|
4581
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4582
|
+
values: [string, ...string[]];
|
4583
|
+
}[]] | undefined;
|
2924
4584
|
meta?: {
|
2925
4585
|
doctype_value?: string | undefined;
|
2926
4586
|
} | undefined;
|
@@ -2937,6 +4597,13 @@ declare namespace DcqlPresentationResult {
|
|
2937
4597
|
id?: string | undefined;
|
2938
4598
|
}[]] | undefined;
|
2939
4599
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4600
|
+
trusted_authorities?: [{
|
4601
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4602
|
+
values: [string, ...string[]];
|
4603
|
+
}, ...{
|
4604
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4605
|
+
values: [string, ...string[]];
|
4606
|
+
}[]] | undefined;
|
2940
4607
|
meta?: {
|
2941
4608
|
vct_values?: string[] | undefined;
|
2942
4609
|
} | undefined;
|
@@ -2956,6 +4623,13 @@ declare namespace DcqlPresentationResult {
|
|
2956
4623
|
id?: string | undefined;
|
2957
4624
|
}[]] | undefined;
|
2958
4625
|
claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
|
4626
|
+
trusted_authorities?: [{
|
4627
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4628
|
+
values: [string, ...string[]];
|
4629
|
+
}, ...{
|
4630
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4631
|
+
values: [string, ...string[]];
|
4632
|
+
}[]] | undefined;
|
2959
4633
|
})[]];
|
2960
4634
|
canBeSatisfied: boolean;
|
2961
4635
|
invalid_matches: {
|
@@ -2978,18 +4652,48 @@ declare namespace DcqlPresentationResult {
|
|
2978
4652
|
[x: string]: unknown;
|
2979
4653
|
};
|
2980
4654
|
};
|
4655
|
+
authority?: {
|
4656
|
+
type: "aki";
|
4657
|
+
value: string;
|
4658
|
+
} | {
|
4659
|
+
type: "etsi_tl";
|
4660
|
+
value: string;
|
4661
|
+
} | {
|
4662
|
+
type: "openid_federation";
|
4663
|
+
value: string;
|
4664
|
+
} | undefined;
|
2981
4665
|
} | {
|
2982
4666
|
credential_format: "vc+sd-jwt" | "dc+sd-jwt";
|
2983
4667
|
vct: string;
|
2984
4668
|
claims: {
|
2985
4669
|
[x: string]: Json;
|
2986
4670
|
};
|
4671
|
+
authority?: {
|
4672
|
+
type: "aki";
|
4673
|
+
value: string;
|
4674
|
+
} | {
|
4675
|
+
type: "etsi_tl";
|
4676
|
+
value: string;
|
4677
|
+
} | {
|
4678
|
+
type: "openid_federation";
|
4679
|
+
value: string;
|
4680
|
+
} | undefined;
|
2987
4681
|
} | {
|
2988
4682
|
type: string[];
|
2989
4683
|
credential_format: "ldp_vc" | "jwt_vc_json";
|
2990
4684
|
claims: {
|
2991
4685
|
[x: string]: Json;
|
2992
4686
|
};
|
4687
|
+
authority?: {
|
4688
|
+
type: "aki";
|
4689
|
+
value: string;
|
4690
|
+
} | {
|
4691
|
+
type: "etsi_tl";
|
4692
|
+
value: string;
|
4693
|
+
} | {
|
4694
|
+
type: "openid_federation";
|
4695
|
+
value: string;
|
4696
|
+
} | undefined;
|
2993
4697
|
};
|
2994
4698
|
success: true;
|
2995
4699
|
typed: true;
|
@@ -3092,6 +4796,37 @@ declare namespace DcqlClaimsQuery {
|
|
3092
4796
|
}
|
3093
4797
|
type DcqlClaimsQuery = DcqlClaimsQuery.Out;
|
3094
4798
|
|
4799
|
+
/**
|
4800
|
+
* Specifies trusted authorities within a requested Credential.
|
4801
|
+
*/
|
4802
|
+
declare namespace DcqlTrustedAuthoritiesQuery {
|
4803
|
+
const vModel: v.VariantSchema<"type", v.ObjectSchema<{
|
4804
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
4805
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
4806
|
+
}, undefined>[], undefined>;
|
4807
|
+
type Input = v.InferInput<typeof vModel>;
|
4808
|
+
type Out = v.InferOutput<typeof vModel>;
|
4809
|
+
}
|
4810
|
+
type DcqlTrustedAuthoritiesQuery = DcqlTrustedAuthoritiesQuery.Out;
|
4811
|
+
/**
|
4812
|
+
* Specifies trusted authorities within a requested Credential.
|
4813
|
+
*/
|
4814
|
+
declare namespace DcqlCredentialTrustedAuthority {
|
4815
|
+
const vModel: v.VariantSchema<"type", readonly [v.ObjectSchema<{
|
4816
|
+
readonly type: v.LiteralSchema<"aki", undefined>;
|
4817
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
|
4818
|
+
}, undefined>, v.ObjectSchema<{
|
4819
|
+
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
|
4820
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
|
4821
|
+
}, undefined>, v.ObjectSchema<{
|
4822
|
+
readonly type: v.LiteralSchema<"openid_federation", undefined>;
|
4823
|
+
readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
|
4824
|
+
}, undefined>], undefined>;
|
4825
|
+
type Input = v.InferInput<typeof vModel>;
|
4826
|
+
type Out = v.InferOutput<typeof vModel>;
|
4827
|
+
}
|
4828
|
+
type DcqlCredentialTrustedAuthority = DcqlCredentialTrustedAuthority.Out;
|
4829
|
+
|
3095
4830
|
/**
|
3096
4831
|
* A Credential Query is an object representing a request for a presentation of one Credential.
|
3097
4832
|
*/
|
@@ -3156,6 +4891,22 @@ declare namespace DcqlCredentialQuery {
|
|
3156
4891
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
3157
4892
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
3158
4893
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
4894
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
4895
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
4896
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
4897
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
4898
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4899
|
+
values: [string, ...string[]];
|
4900
|
+
}, ...{
|
4901
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4902
|
+
values: [string, ...string[]];
|
4903
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
4904
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4905
|
+
values: [string, ...string[]];
|
4906
|
+
}, ...{
|
4907
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4908
|
+
values: [string, ...string[]];
|
4909
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
3159
4910
|
}, undefined>;
|
3160
4911
|
type Mdoc = v.InferOutput<typeof vMdoc>;
|
3161
4912
|
const vSdJwtVc: v.ObjectSchema<{
|
@@ -3190,6 +4941,22 @@ declare namespace DcqlCredentialQuery {
|
|
3190
4941
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
3191
4942
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
3192
4943
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
4944
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
4945
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
4946
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
4947
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
4948
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4949
|
+
values: [string, ...string[]];
|
4950
|
+
}, ...{
|
4951
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4952
|
+
values: [string, ...string[]];
|
4953
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
4954
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4955
|
+
values: [string, ...string[]];
|
4956
|
+
}, ...{
|
4957
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4958
|
+
values: [string, ...string[]];
|
4959
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
3193
4960
|
}, undefined>;
|
3194
4961
|
type SdJwtVc = v.InferOutput<typeof vSdJwtVc>;
|
3195
4962
|
const vW3cVc: v.ObjectSchema<{
|
@@ -3214,6 +4981,22 @@ declare namespace DcqlCredentialQuery {
|
|
3214
4981
|
}, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
3215
4982
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
3216
4983
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
4984
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
4985
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
4986
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
4987
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
4988
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4989
|
+
values: [string, ...string[]];
|
4990
|
+
}, ...{
|
4991
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4992
|
+
values: [string, ...string[]];
|
4993
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
4994
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4995
|
+
values: [string, ...string[]];
|
4996
|
+
}, ...{
|
4997
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
4998
|
+
values: [string, ...string[]];
|
4999
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
3217
5000
|
}, undefined>;
|
3218
5001
|
type W3cVc = v.InferOutput<typeof vW3cVc>;
|
3219
5002
|
const vModel: v.VariantSchema<"format", [v.ObjectSchema<{
|
@@ -3276,6 +5059,22 @@ declare namespace DcqlCredentialQuery {
|
|
3276
5059
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
3277
5060
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
3278
5061
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
5062
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
5063
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
5064
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
5065
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
5066
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5067
|
+
values: [string, ...string[]];
|
5068
|
+
}, ...{
|
5069
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5070
|
+
values: [string, ...string[]];
|
5071
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
5072
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5073
|
+
values: [string, ...string[]];
|
5074
|
+
}, ...{
|
5075
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5076
|
+
values: [string, ...string[]];
|
5077
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
3279
5078
|
}, undefined>, v.ObjectSchema<{
|
3280
5079
|
readonly format: v.SchemaWithPipe<[v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>, v.DescriptionAction<"vc+sd-jwt" | "dc+sd-jwt", "REQUIRED. A string that specifies the format of the requested Verifiable Credential.">]>;
|
3281
5080
|
readonly claims: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
@@ -3308,6 +5107,22 @@ declare namespace DcqlCredentialQuery {
|
|
3308
5107
|
} | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
3309
5108
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
3310
5109
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
5110
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
5111
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
5112
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
5113
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
5114
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5115
|
+
values: [string, ...string[]];
|
5116
|
+
}, ...{
|
5117
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5118
|
+
values: [string, ...string[]];
|
5119
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
5120
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5121
|
+
values: [string, ...string[]];
|
5122
|
+
}, ...{
|
5123
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5124
|
+
values: [string, ...string[]];
|
5125
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
3311
5126
|
}, undefined>, v.ObjectSchema<{
|
3312
5127
|
readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
|
3313
5128
|
readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
|
@@ -3330,6 +5145,22 @@ declare namespace DcqlCredentialQuery {
|
|
3330
5145
|
}, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
|
3331
5146
|
readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
|
3332
5147
|
readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
|
5148
|
+
readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
|
5149
|
+
readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
|
5150
|
+
readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
|
5151
|
+
}, undefined>[], undefined>, undefined>, v.CustomSchema<[{
|
5152
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5153
|
+
values: [string, ...string[]];
|
5154
|
+
}, ...{
|
5155
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5156
|
+
values: [string, ...string[]];
|
5157
|
+
}[]], undefined>]>, undefined>, v.DescriptionAction<[{
|
5158
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5159
|
+
values: [string, ...string[]];
|
5160
|
+
}, ...{
|
5161
|
+
type: "aki" | "etsi_tl" | "openid_federation";
|
5162
|
+
values: [string, ...string[]];
|
5163
|
+
}[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
|
3333
5164
|
}, undefined>], undefined>;
|
3334
5165
|
type Input = v.InferInput<typeof vModel>;
|
3335
5166
|
type Output = v.InferOutput<typeof vModel>;
|
@@ -3354,4 +5185,4 @@ declare namespace CredentialSetQuery {
|
|
3354
5185
|
}
|
3355
5186
|
type CredentialSetQuery = CredentialSetQuery.Output;
|
3356
5187
|
|
3357
|
-
export { CredentialSetQuery, DcqlClaimsQuery, DcqlCredential, DcqlCredentialPresentation, DcqlCredentialQuery, DcqlCredentialSetError, DcqlError, DcqlInvalidClaimsQueryIdError, DcqlInvalidPresentationRecordError, DcqlMdocCredential, DcqlMdocPresentation, DcqlMissingClaimSetParseError, DcqlNonUniqueCredentialQueryIdsError, DcqlParseError, DcqlPresentation, DcqlPresentationResult, DcqlPresentationResultError, DcqlQuery, DcqlQueryResult, DcqlSdJwtVcCredential, DcqlSdJwtVcPresentation, DcqlUndefinedClaimSetIdError, DcqlW3cVcCredential, DcqlW3cVcPresentation, getCauseFromUnknown, getDcqlErrorFromUnknown, runDcqlQuery };
|
5188
|
+
export { CredentialSetQuery, DcqlClaimsQuery, DcqlCredential, DcqlCredentialPresentation, DcqlCredentialQuery, DcqlCredentialSetError, DcqlCredentialTrustedAuthority, DcqlError, DcqlInvalidClaimsQueryIdError, DcqlInvalidPresentationRecordError, DcqlMdocCredential, DcqlMdocPresentation, DcqlMissingClaimSetParseError, DcqlNonUniqueCredentialQueryIdsError, DcqlParseError, DcqlPresentation, DcqlPresentationResult, DcqlPresentationResultError, DcqlQuery, DcqlQueryResult, DcqlSdJwtVcCredential, DcqlSdJwtVcPresentation, DcqlTrustedAuthoritiesQuery, DcqlUndefinedClaimSetIdError, DcqlW3cVcCredential, DcqlW3cVcPresentation, getCauseFromUnknown, getDcqlErrorFromUnknown, runDcqlQuery };
|