diff --git a/clients/dart/credential_issuance_client/.openapi-generator/FILES b/clients/dart/credential_issuance_client/.openapi-generator/FILES index dcf851d7..9929e1cf 100644 --- a/clients/dart/credential_issuance_client/.openapi-generator/FILES +++ b/clients/dart/credential_issuance_client/.openapi-generator/FILES @@ -124,5 +124,3 @@ lib/model/update_issuance_config_input.dart lib/model/vc_claimed_error.dart lib/model/well_known_open_id_credential_issuer_response.dart pubspec.yaml -test/credential_offer_claimed_error_test.dart -test/missing_holder_did_error_test.dart diff --git a/clients/dart/iota_client/doc/DefaultApi.md b/clients/dart/iota_client/doc/DefaultApi.md index 44ed879f..554ff107 100644 --- a/clients/dart/iota_client/doc/DefaultApi.md +++ b/clients/dart/iota_client/doc/DefaultApi.md @@ -14,7 +14,7 @@ All URIs are relative to *https://apse1.api.affinidi.io/ais* # **listLoggedConsents** -> ListLoggedConsentsOK listLoggedConsents(userId, limit, exclusiveStartKey) +> ListLoggedConsentsOK listLoggedConsents(configurationId, userId, limit, exclusiveStartKey) returns a list of logged consents for the project @@ -28,12 +28,13 @@ import 'package:affinidi_tdk_iota_client/api.dart'; //defaultApiClient.getAuthentication('ProjectTokenAuth').apiKeyPrefix = 'Bearer'; final api_instance = DefaultApi(); +final configurationId = configurationId_example; // String | final userId = userId_example; // String | final limit = 56; // int | Maximum number of records to fetch in a list final exclusiveStartKey = exclusiveStartKey_example; // String | The base64url encoded key of the first item that this operation will evaluate (it is not returned). Use the value that was returned in the previous operation. try { - final result = api_instance.listLoggedConsents(userId, limit, exclusiveStartKey); + final result = api_instance.listLoggedConsents(configurationId, userId, limit, exclusiveStartKey); print(result); } catch (e) { print('Exception when calling DefaultApi->listLoggedConsents: $e\n'); @@ -44,6 +45,7 @@ try { | Name | Type | Description | Notes | | --------------------- | ---------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------- | +| **configurationId** | **String** | | [optional] | | **userId** | **String** | | [optional] | | **limit** | **int** | Maximum number of records to fetch in a list | [optional] | | **exclusiveStartKey** | **String** | The base64url encoded key of the first item that this operation will evaluate (it is not returned). Use the value that was returned in the previous operation. | [optional] | diff --git a/clients/dart/iota_client/lib/api/default_api.dart b/clients/dart/iota_client/lib/api/default_api.dart index 02f3b2aa..d3a21679 100644 --- a/clients/dart/iota_client/lib/api/default_api.dart +++ b/clients/dart/iota_client/lib/api/default_api.dart @@ -22,6 +22,8 @@ class DefaultApi { /// /// Parameters: /// + /// * [String] configurationId: + /// /// * [String] userId: /// /// * [int] limit: @@ -29,7 +31,7 @@ class DefaultApi { /// /// * [String] exclusiveStartKey: /// The base64url encoded key of the first item that this operation will evaluate (it is not returned). Use the value that was returned in the previous operation. - Future listLoggedConsentsWithHttpInfo({ String? userId, int? limit, String? exclusiveStartKey, }) async { + Future listLoggedConsentsWithHttpInfo({ String? configurationId, String? userId, int? limit, String? exclusiveStartKey, }) async { // ignore: prefer_const_declarations final path = r'/v1/logged-consents'; @@ -40,6 +42,9 @@ class DefaultApi { final headerParams = {}; final formParams = {}; + if (configurationId != null) { + queryParams.addAll(_queryParams('', 'configurationId', configurationId)); + } if (userId != null) { queryParams.addAll(_queryParams('', 'userId', userId)); } @@ -68,6 +73,8 @@ class DefaultApi { /// /// Parameters: /// + /// * [String] configurationId: + /// /// * [String] userId: /// /// * [int] limit: @@ -75,8 +82,8 @@ class DefaultApi { /// /// * [String] exclusiveStartKey: /// The base64url encoded key of the first item that this operation will evaluate (it is not returned). Use the value that was returned in the previous operation. - Future listLoggedConsents({ String? userId, int? limit, String? exclusiveStartKey, }) async { - final response = await listLoggedConsentsWithHttpInfo( userId: userId, limit: limit, exclusiveStartKey: exclusiveStartKey, ); + Future listLoggedConsents({ String? configurationId, String? userId, int? limit, String? exclusiveStartKey, }) async { + final response = await listLoggedConsentsWithHttpInfo( configurationId: configurationId, userId: userId, limit: limit, exclusiveStartKey: exclusiveStartKey, ); if (response.statusCode >= HttpStatus.badRequest) { throw ApiException(response.statusCode, await _decodeBodyBytes(response)); } diff --git a/clients/dart/login_configuration_client/.openapi-generator/FILES b/clients/dart/login_configuration_client/.openapi-generator/FILES index 35b7b876..b20bac6c 100644 --- a/clients/dart/login_configuration_client/.openapi-generator/FILES +++ b/clients/dart/login_configuration_client/.openapi-generator/FILES @@ -34,6 +34,7 @@ doc/InvalidClaimContextError.md doc/InvalidGroupsError.md doc/InvalidParameterError.md doc/InvalidParameterErrorDetailsInner.md +doc/InvalidVPTokenCreationTimeError.md doc/JsonWebKey.md doc/JsonWebKeyKeysInner.md doc/ListLoginConfigurationOutput.md @@ -98,6 +99,7 @@ lib/model/invalid_claim_context_error.dart lib/model/invalid_groups_error.dart lib/model/invalid_parameter_error.dart lib/model/invalid_parameter_error_details_inner.dart +lib/model/invalid_vp_token_creation_time_error.dart lib/model/json_web_key.dart lib/model/json_web_key_keys_inner.dart lib/model/list_login_configuration_output.dart @@ -122,3 +124,4 @@ lib/model/unauthorized_error.dart lib/model/update_login_configuration_input.dart lib/model/vp_token_validation_error.dart pubspec.yaml +test/invalid_vp_token_creation_time_error_test.dart diff --git a/clients/dart/login_configuration_client/README.md b/clients/dart/login_configuration_client/README.md index cf4cdb28..a24729e4 100644 --- a/clients/dart/login_configuration_client/README.md +++ b/clients/dart/login_configuration_client/README.md @@ -128,6 +128,7 @@ All URIs are relative to *https://apse1.api.affinidi.io/vpa* - [InvalidGroupsError](doc//InvalidGroupsError.md) - [InvalidParameterError](doc//InvalidParameterError.md) - [InvalidParameterErrorDetailsInner](doc//InvalidParameterErrorDetailsInner.md) +- [InvalidVPTokenCreationTimeError](doc//InvalidVPTokenCreationTimeError.md) - [JsonWebKey](doc//JsonWebKey.md) - [JsonWebKeyKeysInner](doc//JsonWebKeyKeysInner.md) - [ListLoginConfigurationOutput](doc//ListLoginConfigurationOutput.md) diff --git a/clients/dart/login_configuration_client/doc/InvalidVPTokenCreationTimeError.md b/clients/dart/login_configuration_client/doc/InvalidVPTokenCreationTimeError.md new file mode 100644 index 00000000..48b72e33 --- /dev/null +++ b/clients/dart/login_configuration_client/doc/InvalidVPTokenCreationTimeError.md @@ -0,0 +1,19 @@ +# affinidi_tdk_login_configuration_client.model.InvalidVPTokenCreationTimeError + +## Load the model package + +```dart +import 'package:affinidi_tdk_login_configuration_client/api.dart'; +``` + +## Properties + +| Name | Type | Description | Notes | +| ------------------ | ----------------------------------------------------------------------------------- | ----------- | -------------------------------- | +| **name** | **String** | | +| **message** | **String** | | +| **httpStatusCode** | **int** | | +| **traceId** | **String** | | +| **details** | [**List**](InvalidParameterErrorDetailsInner.md) | | [optional] [default to const []] | + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/clients/dart/login_configuration_client/doc/LoginSessionDtoAuthorizationRequest.md b/clients/dart/login_configuration_client/doc/LoginSessionDtoAuthorizationRequest.md index 221fe556..44fd66fb 100644 --- a/clients/dart/login_configuration_client/doc/LoginSessionDtoAuthorizationRequest.md +++ b/clients/dart/login_configuration_client/doc/LoginSessionDtoAuthorizationRequest.md @@ -14,5 +14,6 @@ import 'package:affinidi_tdk_login_configuration_client/api.dart'; | **presentationDefinition** | **String** | Presentation Definition to ask from the user. In JSON Stringify format. | | **ari** | **String** | ARI is used for analytics proposals. | [optional] | | **clientId** | **String** | clientId used for detect origin. | [optional] | +| **nonce** | **String** | nonce for VP Token proof challenge | [optional] | [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/clients/dart/login_configuration_client/lib/api.dart b/clients/dart/login_configuration_client/lib/api.dart index d606e7bd..cecddc69 100644 --- a/clients/dart/login_configuration_client/lib/api.dart +++ b/clients/dart/login_configuration_client/lib/api.dart @@ -61,6 +61,7 @@ part 'model/invalid_claim_context_error.dart'; part 'model/invalid_groups_error.dart'; part 'model/invalid_parameter_error.dart'; part 'model/invalid_parameter_error_details_inner.dart'; +part 'model/invalid_vp_token_creation_time_error.dart'; part 'model/json_web_key.dart'; part 'model/json_web_key_keys_inner.dart'; part 'model/list_login_configuration_output.dart'; diff --git a/clients/dart/login_configuration_client/lib/api_client.dart b/clients/dart/login_configuration_client/lib/api_client.dart index f2f2c838..d0175110 100644 --- a/clients/dart/login_configuration_client/lib/api_client.dart +++ b/clients/dart/login_configuration_client/lib/api_client.dart @@ -236,6 +236,8 @@ class ApiClient { return InvalidParameterError.fromJson(value); case 'InvalidParameterErrorDetailsInner': return InvalidParameterErrorDetailsInner.fromJson(value); + case 'InvalidVPTokenCreationTimeError': + return InvalidVPTokenCreationTimeError.fromJson(value); case 'JsonWebKey': return JsonWebKey.fromJson(value); case 'JsonWebKeyKeysInner': diff --git a/clients/dart/login_configuration_client/lib/model/invalid_vp_token_creation_time_error.dart b/clients/dart/login_configuration_client/lib/model/invalid_vp_token_creation_time_error.dart new file mode 100644 index 00000000..06671ec7 --- /dev/null +++ b/clients/dart/login_configuration_client/lib/model/invalid_vp_token_creation_time_error.dart @@ -0,0 +1,353 @@ +// +// AUTO-GENERATED FILE, DO NOT MODIFY! +// +// @dart=2.12 + +// ignore_for_file: unused_element, unused_import +// ignore_for_file: always_put_required_named_parameters_first +// ignore_for_file: constant_identifier_names +// ignore_for_file: lines_longer_than_80_chars + +part of openapi.api; + +class InvalidVPTokenCreationTimeError { + /// Returns a new [InvalidVPTokenCreationTimeError] instance. + InvalidVPTokenCreationTimeError({ + required this.name, + required this.message, + required this.httpStatusCode, + required this.traceId, + this.details = const [], + }); + + InvalidVPTokenCreationTimeErrorNameEnum name; + + InvalidVPTokenCreationTimeErrorMessageEnum message; + + InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum httpStatusCode; + + String traceId; + + List details; + + @override + bool operator ==(Object other) => identical(this, other) || other is InvalidVPTokenCreationTimeError && + other.name == name && + other.message == message && + other.httpStatusCode == httpStatusCode && + other.traceId == traceId && + _deepEquality.equals(other.details, details); + + @override + int get hashCode => + // ignore: unnecessary_parenthesis + (name.hashCode) + + (message.hashCode) + + (httpStatusCode.hashCode) + + (traceId.hashCode) + + (details.hashCode); + + @override + String toString() => 'InvalidVPTokenCreationTimeError[name=$name, message=$message, httpStatusCode=$httpStatusCode, traceId=$traceId, details=$details]'; + + Map toJson() { + final json = {}; + json[r'name'] = this.name; + json[r'message'] = this.message; + json[r'httpStatusCode'] = this.httpStatusCode; + json[r'traceId'] = this.traceId; + json[r'details'] = this.details; + return json; + } + + /// Returns a new [InvalidVPTokenCreationTimeError] instance and imports its values from + /// [value] if it's a [Map], null otherwise. + // ignore: prefer_constructors_over_static_methods + static InvalidVPTokenCreationTimeError? fromJson(dynamic value) { + if (value is Map) { + final json = value.cast(); + + // Ensure that the map contains the required keys. + // Note 1: the values aren't checked for validity beyond being non-null. + // Note 2: this code is stripped in release mode! + assert(() { + requiredKeys.forEach((key) { + assert(json.containsKey(key), 'Required key "InvalidVPTokenCreationTimeError[$key]" is missing from JSON.'); + assert(json[key] != null, 'Required key "InvalidVPTokenCreationTimeError[$key]" has a null value in JSON.'); + }); + return true; + }()); + + return InvalidVPTokenCreationTimeError( + name: InvalidVPTokenCreationTimeErrorNameEnum.fromJson(json[r'name'])!, + message: InvalidVPTokenCreationTimeErrorMessageEnum.fromJson(json[r'message'])!, + httpStatusCode: InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum.fromJson(json[r'httpStatusCode'])!, + traceId: mapValueOfType(json, r'traceId')!, + details: InvalidParameterErrorDetailsInner.listFromJson(json[r'details']), + ); + } + return null; + } + + static List listFromJson(dynamic json, {bool growable = false,}) { + final result = []; + if (json is List && json.isNotEmpty) { + for (final row in json) { + final value = InvalidVPTokenCreationTimeError.fromJson(row); + if (value != null) { + result.add(value); + } + } + } + return result.toList(growable: growable); + } + + static Map mapFromJson(dynamic json) { + final map = {}; + if (json is Map && json.isNotEmpty) { + json = json.cast(); // ignore: parameter_assignments + for (final entry in json.entries) { + final value = InvalidVPTokenCreationTimeError.fromJson(entry.value); + if (value != null) { + map[entry.key] = value; + } + } + } + return map; + } + + // maps a json object with a list of InvalidVPTokenCreationTimeError-objects as value to a dart map + static Map> mapListFromJson(dynamic json, {bool growable = false,}) { + final map = >{}; + if (json is Map && json.isNotEmpty) { + // ignore: parameter_assignments + json = json.cast(); + for (final entry in json.entries) { + map[entry.key] = InvalidVPTokenCreationTimeError.listFromJson(entry.value, growable: growable,); + } + } + return map; + } + + /// The list of required keys that must be present in a JSON. + static const requiredKeys = { + 'name', + 'message', + 'httpStatusCode', + 'traceId', + }; +} + + +class InvalidVPTokenCreationTimeErrorNameEnum { + /// Instantiate a new enum with the provided [value]. + const InvalidVPTokenCreationTimeErrorNameEnum._(this.value); + + /// The underlying value of this enum member. + final String value; + + @override + String toString() => value; + + String toJson() => value; + + static const invalidVPTokenCreationTimeError = InvalidVPTokenCreationTimeErrorNameEnum._(r'InvalidVPTokenCreationTimeError'); + + /// List of all possible values in this [enum][InvalidVPTokenCreationTimeErrorNameEnum]. + static const values = [ + invalidVPTokenCreationTimeError, + ]; + + static InvalidVPTokenCreationTimeErrorNameEnum? fromJson(dynamic value) => InvalidVPTokenCreationTimeErrorNameEnumTypeTransformer().decode(value); + + static List listFromJson(dynamic json, {bool growable = false,}) { + final result = []; + if (json is List && json.isNotEmpty) { + for (final row in json) { + final value = InvalidVPTokenCreationTimeErrorNameEnum.fromJson(row); + if (value != null) { + result.add(value); + } + } + } + return result.toList(growable: growable); + } +} + +/// Transformation class that can [encode] an instance of [InvalidVPTokenCreationTimeErrorNameEnum] to String, +/// and [decode] dynamic data back to [InvalidVPTokenCreationTimeErrorNameEnum]. +class InvalidVPTokenCreationTimeErrorNameEnumTypeTransformer { + factory InvalidVPTokenCreationTimeErrorNameEnumTypeTransformer() => _instance ??= const InvalidVPTokenCreationTimeErrorNameEnumTypeTransformer._(); + + const InvalidVPTokenCreationTimeErrorNameEnumTypeTransformer._(); + + String encode(InvalidVPTokenCreationTimeErrorNameEnum data) => data.value; + + /// Decodes a [dynamic value][data] to a InvalidVPTokenCreationTimeErrorNameEnum. + /// + /// If [allowNull] is true and the [dynamic value][data] cannot be decoded successfully, + /// then null is returned. However, if [allowNull] is false and the [dynamic value][data] + /// cannot be decoded successfully, then an [UnimplementedError] is thrown. + /// + /// The [allowNull] is very handy when an API changes and a new enum value is added or removed, + /// and users are still using an old app with the old code. + InvalidVPTokenCreationTimeErrorNameEnum? decode(dynamic data, {bool allowNull = true}) { + if (data != null) { + switch (data) { + case r'InvalidVPTokenCreationTimeError': return InvalidVPTokenCreationTimeErrorNameEnum.invalidVPTokenCreationTimeError; + default: + if (!allowNull) { + throw ArgumentError('Unknown enum value to decode: $data'); + } + } + } + return null; + } + + /// Singleton [InvalidVPTokenCreationTimeErrorNameEnumTypeTransformer] instance. + static InvalidVPTokenCreationTimeErrorNameEnumTypeTransformer? _instance; +} + + + +class InvalidVPTokenCreationTimeErrorMessageEnum { + /// Instantiate a new enum with the provided [value]. + const InvalidVPTokenCreationTimeErrorMessageEnum._(this.value); + + /// The underlying value of this enum member. + final String value; + + @override + String toString() => value; + + String toJson() => value; + + static const vPTokenHasExpired = InvalidVPTokenCreationTimeErrorMessageEnum._(r'VP token has expired'); + + /// List of all possible values in this [enum][InvalidVPTokenCreationTimeErrorMessageEnum]. + static const values = [ + vPTokenHasExpired, + ]; + + static InvalidVPTokenCreationTimeErrorMessageEnum? fromJson(dynamic value) => InvalidVPTokenCreationTimeErrorMessageEnumTypeTransformer().decode(value); + + static List listFromJson(dynamic json, {bool growable = false,}) { + final result = []; + if (json is List && json.isNotEmpty) { + for (final row in json) { + final value = InvalidVPTokenCreationTimeErrorMessageEnum.fromJson(row); + if (value != null) { + result.add(value); + } + } + } + return result.toList(growable: growable); + } +} + +/// Transformation class that can [encode] an instance of [InvalidVPTokenCreationTimeErrorMessageEnum] to String, +/// and [decode] dynamic data back to [InvalidVPTokenCreationTimeErrorMessageEnum]. +class InvalidVPTokenCreationTimeErrorMessageEnumTypeTransformer { + factory InvalidVPTokenCreationTimeErrorMessageEnumTypeTransformer() => _instance ??= const InvalidVPTokenCreationTimeErrorMessageEnumTypeTransformer._(); + + const InvalidVPTokenCreationTimeErrorMessageEnumTypeTransformer._(); + + String encode(InvalidVPTokenCreationTimeErrorMessageEnum data) => data.value; + + /// Decodes a [dynamic value][data] to a InvalidVPTokenCreationTimeErrorMessageEnum. + /// + /// If [allowNull] is true and the [dynamic value][data] cannot be decoded successfully, + /// then null is returned. However, if [allowNull] is false and the [dynamic value][data] + /// cannot be decoded successfully, then an [UnimplementedError] is thrown. + /// + /// The [allowNull] is very handy when an API changes and a new enum value is added or removed, + /// and users are still using an old app with the old code. + InvalidVPTokenCreationTimeErrorMessageEnum? decode(dynamic data, {bool allowNull = true}) { + if (data != null) { + switch (data) { + case r'VP token has expired': return InvalidVPTokenCreationTimeErrorMessageEnum.vPTokenHasExpired; + default: + if (!allowNull) { + throw ArgumentError('Unknown enum value to decode: $data'); + } + } + } + return null; + } + + /// Singleton [InvalidVPTokenCreationTimeErrorMessageEnumTypeTransformer] instance. + static InvalidVPTokenCreationTimeErrorMessageEnumTypeTransformer? _instance; +} + + + +class InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum { + /// Instantiate a new enum with the provided [value]. + const InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum._(this.value); + + /// The underlying value of this enum member. + final int value; + + @override + String toString() => value.toString(); + + int toJson() => value; + + static const number400 = InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum._(400); + + /// List of all possible values in this [enum][InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum]. + static const values = [ + number400, + ]; + + static InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum? fromJson(dynamic value) => InvalidVPTokenCreationTimeErrorHttpStatusCodeEnumTypeTransformer().decode(value); + + static List listFromJson(dynamic json, {bool growable = false,}) { + final result = []; + if (json is List && json.isNotEmpty) { + for (final row in json) { + final value = InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum.fromJson(row); + if (value != null) { + result.add(value); + } + } + } + return result.toList(growable: growable); + } +} + +/// Transformation class that can [encode] an instance of [InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum] to int, +/// and [decode] dynamic data back to [InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum]. +class InvalidVPTokenCreationTimeErrorHttpStatusCodeEnumTypeTransformer { + factory InvalidVPTokenCreationTimeErrorHttpStatusCodeEnumTypeTransformer() => _instance ??= const InvalidVPTokenCreationTimeErrorHttpStatusCodeEnumTypeTransformer._(); + + const InvalidVPTokenCreationTimeErrorHttpStatusCodeEnumTypeTransformer._(); + + int encode(InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum data) => data.value; + + /// Decodes a [dynamic value][data] to a InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum. + /// + /// If [allowNull] is true and the [dynamic value][data] cannot be decoded successfully, + /// then null is returned. However, if [allowNull] is false and the [dynamic value][data] + /// cannot be decoded successfully, then an [UnimplementedError] is thrown. + /// + /// The [allowNull] is very handy when an API changes and a new enum value is added or removed, + /// and users are still using an old app with the old code. + InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum? decode(dynamic data, {bool allowNull = true}) { + if (data != null) { + switch (data) { + case 400: return InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum.number400; + default: + if (!allowNull) { + throw ArgumentError('Unknown enum value to decode: $data'); + } + } + } + return null; + } + + /// Singleton [InvalidVPTokenCreationTimeErrorHttpStatusCodeEnumTypeTransformer] instance. + static InvalidVPTokenCreationTimeErrorHttpStatusCodeEnumTypeTransformer? _instance; +} + + diff --git a/clients/dart/login_configuration_client/lib/model/login_session_dto_authorization_request.dart b/clients/dart/login_configuration_client/lib/model/login_session_dto_authorization_request.dart index 6af63854..b365eb4f 100644 --- a/clients/dart/login_configuration_client/lib/model/login_session_dto_authorization_request.dart +++ b/clients/dart/login_configuration_client/lib/model/login_session_dto_authorization_request.dart @@ -17,6 +17,7 @@ class LoginSessionDtoAuthorizationRequest { required this.presentationDefinition, this.ari, this.clientId, + this.nonce, }); /// State parameter @@ -43,12 +44,22 @@ class LoginSessionDtoAuthorizationRequest { /// String? clientId; + /// nonce for VP Token proof challenge + /// + /// Please note: This property should have been non-nullable! Since the specification file + /// does not include a default value (using the "default:" property), however, the generated + /// source code must fall back to having a nullable type. + /// Consider adding a "default:" property in the specification file to hide this note. + /// + String? nonce; + @override bool operator ==(Object other) => identical(this, other) || other is LoginSessionDtoAuthorizationRequest && other.state == state && other.presentationDefinition == presentationDefinition && other.ari == ari && - other.clientId == clientId; + other.clientId == clientId && + other.nonce == nonce; @override int get hashCode => @@ -56,10 +67,11 @@ class LoginSessionDtoAuthorizationRequest { (state.hashCode) + (presentationDefinition.hashCode) + (ari == null ? 0 : ari!.hashCode) + - (clientId == null ? 0 : clientId!.hashCode); + (clientId == null ? 0 : clientId!.hashCode) + + (nonce == null ? 0 : nonce!.hashCode); @override - String toString() => 'LoginSessionDtoAuthorizationRequest[state=$state, presentationDefinition=$presentationDefinition, ari=$ari, clientId=$clientId]'; + String toString() => 'LoginSessionDtoAuthorizationRequest[state=$state, presentationDefinition=$presentationDefinition, ari=$ari, clientId=$clientId, nonce=$nonce]'; Map toJson() { final json = {}; @@ -75,6 +87,11 @@ class LoginSessionDtoAuthorizationRequest { } else { json[r'clientId'] = null; } + if (this.nonce != null) { + json[r'nonce'] = this.nonce; + } else { + json[r'nonce'] = null; + } return json; } @@ -101,6 +118,7 @@ class LoginSessionDtoAuthorizationRequest { presentationDefinition: mapValueOfType(json, r'presentationDefinition')!, ari: mapValueOfType(json, r'ari'), clientId: mapValueOfType(json, r'clientId'), + nonce: mapValueOfType(json, r'nonce'), ); } return null; diff --git a/clients/dart/login_configuration_client/test/invalid_vp_token_creation_time_error_test.dart b/clients/dart/login_configuration_client/test/invalid_vp_token_creation_time_error_test.dart new file mode 100644 index 00000000..a9bf25e2 --- /dev/null +++ b/clients/dart/login_configuration_client/test/invalid_vp_token_creation_time_error_test.dart @@ -0,0 +1,47 @@ +// +// AUTO-GENERATED FILE, DO NOT MODIFY! +// +// @dart=2.12 + +// ignore_for_file: unused_element, unused_import +// ignore_for_file: always_put_required_named_parameters_first +// ignore_for_file: constant_identifier_names +// ignore_for_file: lines_longer_than_80_chars + +import 'package:affinidi_tdk_login_configuration_client/api.dart'; +import 'package:test/test.dart'; + +// tests for InvalidVPTokenCreationTimeError +void main() { + // final instance = InvalidVPTokenCreationTimeError(); + + group('test InvalidVPTokenCreationTimeError', () { + // String name + test('to test the property `name`', () async { + // TODO + }); + + // String message + test('to test the property `message`', () async { + // TODO + }); + + // int httpStatusCode + test('to test the property `httpStatusCode`', () async { + // TODO + }); + + // String traceId + test('to test the property `traceId`', () async { + // TODO + }); + + // List details (default value: const []) + test('to test the property `details`', () async { + // TODO + }); + + + }); + +} diff --git a/clients/dart/wallets_client/.openapi-generator/FILES b/clients/dart/wallets_client/.openapi-generator/FILES index 6619f673..fc75aa2f 100644 --- a/clients/dart/wallets_client/.openapi-generator/FILES +++ b/clients/dart/wallets_client/.openapi-generator/FILES @@ -72,4 +72,3 @@ lib/model/wallet_dto.dart lib/model/wallet_dto_keys_inner.dart lib/model/wallets_list_dto.dart pubspec.yaml -test/sign_credential_result_dto_signed_credential_test.dart diff --git a/clients/python/credential_issuance_client/.openapi-generator/FILES b/clients/python/credential_issuance_client/.openapi-generator/FILES index 2b929cc1..8acc55cf 100644 --- a/clients/python/credential_issuance_client/.openapi-generator/FILES +++ b/clients/python/credential_issuance_client/.openapi-generator/FILES @@ -129,6 +129,4 @@ setup.cfg setup.py test-requirements.txt test/__init__.py -test/test_credential_offer_claimed_error.py -test/test_missing_holder_did_error.py tox.ini diff --git a/clients/python/iota_client/affinidi_tdk_iota_client/api/default_api.py b/clients/python/iota_client/affinidi_tdk_iota_client/api/default_api.py index cd70ec18..e552cdc9 100644 --- a/clients/python/iota_client/affinidi_tdk_iota_client/api/default_api.py +++ b/clients/python/iota_client/affinidi_tdk_iota_client/api/default_api.py @@ -47,16 +47,18 @@ def __init__(self, api_client=None) -> None: self.api_client = api_client @validate_arguments - def list_logged_consents(self, user_id : Optional[StrictStr] = None, limit : Annotated[Optional[conint(strict=True, le=100, ge=1)], Field(description="Maximum number of records to fetch in a list")] = None, exclusive_start_key : Annotated[Optional[constr(strict=True, max_length=3000)], Field(description="The base64url encoded key of the first item that this operation will evaluate (it is not returned). Use the value that was returned in the previous operation.")] = None, **kwargs) -> ListLoggedConsentsOK: # noqa: E501 + def list_logged_consents(self, configuration_id : Optional[StrictStr] = None, user_id : Optional[StrictStr] = None, limit : Annotated[Optional[conint(strict=True, le=100, ge=1)], Field(description="Maximum number of records to fetch in a list")] = None, exclusive_start_key : Annotated[Optional[constr(strict=True, max_length=3000)], Field(description="The base64url encoded key of the first item that this operation will evaluate (it is not returned). Use the value that was returned in the previous operation.")] = None, **kwargs) -> ListLoggedConsentsOK: # noqa: E501 """list_logged_consents # noqa: E501 returns a list of logged consents for the project # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.list_logged_consents(user_id, limit, exclusive_start_key, async_req=True) + >>> thread = api.list_logged_consents(configuration_id, user_id, limit, exclusive_start_key, async_req=True) >>> result = thread.get() + :param configuration_id: + :type configuration_id: str :param user_id: :type user_id: str :param limit: Maximum number of records to fetch in a list @@ -78,19 +80,21 @@ def list_logged_consents(self, user_id : Optional[StrictStr] = None, limit : Ann if '_preload_content' in kwargs: message = "Error! Please call the list_logged_consents_with_http_info method with `_preload_content` instead and obtain raw data from ApiResponse.raw_data" # noqa: E501 raise ValueError(message) - return self.list_logged_consents_with_http_info(user_id, limit, exclusive_start_key, **kwargs) # noqa: E501 + return self.list_logged_consents_with_http_info(configuration_id, user_id, limit, exclusive_start_key, **kwargs) # noqa: E501 @validate_arguments - def list_logged_consents_with_http_info(self, user_id : Optional[StrictStr] = None, limit : Annotated[Optional[conint(strict=True, le=100, ge=1)], Field(description="Maximum number of records to fetch in a list")] = None, exclusive_start_key : Annotated[Optional[constr(strict=True, max_length=3000)], Field(description="The base64url encoded key of the first item that this operation will evaluate (it is not returned). Use the value that was returned in the previous operation.")] = None, **kwargs) -> ApiResponse: # noqa: E501 + def list_logged_consents_with_http_info(self, configuration_id : Optional[StrictStr] = None, user_id : Optional[StrictStr] = None, limit : Annotated[Optional[conint(strict=True, le=100, ge=1)], Field(description="Maximum number of records to fetch in a list")] = None, exclusive_start_key : Annotated[Optional[constr(strict=True, max_length=3000)], Field(description="The base64url encoded key of the first item that this operation will evaluate (it is not returned). Use the value that was returned in the previous operation.")] = None, **kwargs) -> ApiResponse: # noqa: E501 """list_logged_consents # noqa: E501 returns a list of logged consents for the project # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.list_logged_consents_with_http_info(user_id, limit, exclusive_start_key, async_req=True) + >>> thread = api.list_logged_consents_with_http_info(configuration_id, user_id, limit, exclusive_start_key, async_req=True) >>> result = thread.get() + :param configuration_id: + :type configuration_id: str :param user_id: :type user_id: str :param limit: Maximum number of records to fetch in a list @@ -125,6 +129,7 @@ def list_logged_consents_with_http_info(self, user_id : Optional[StrictStr] = No _params = locals() _all_params = [ + 'configuration_id', 'user_id', 'limit', 'exclusive_start_key' @@ -158,6 +163,9 @@ def list_logged_consents_with_http_info(self, user_id : Optional[StrictStr] = No # process the query parameters _query_params = [] + if _params.get('configuration_id') is not None: # noqa: E501 + _query_params.append(('configurationId', _params['configuration_id'])) + if _params.get('user_id') is not None: # noqa: E501 _query_params.append(('userId', _params['user_id'])) diff --git a/clients/python/iota_client/docs/DefaultApi.md b/clients/python/iota_client/docs/DefaultApi.md index 3fba681f..4d9c9c01 100644 --- a/clients/python/iota_client/docs/DefaultApi.md +++ b/clients/python/iota_client/docs/DefaultApi.md @@ -8,7 +8,7 @@ All URIs are relative to *https://apse1.api.affinidi.io/ais* # **list_logged_consents** -> ListLoggedConsentsOK list_logged_consents(user_id=user_id, limit=limit, exclusive_start_key=exclusive_start_key) +> ListLoggedConsentsOK list_logged_consents(configuration_id=configuration_id, user_id=user_id, limit=limit, exclusive_start_key=exclusive_start_key) returns a list of logged consents for the project @@ -45,12 +45,13 @@ configuration.api_key['ProjectTokenAuth'] = os.environ["API_KEY"] with affinidi_tdk_iota_client.ApiClient(configuration) as api_client: # Create an instance of the API class api_instance = affinidi_tdk_iota_client.DefaultApi(api_client) + configuration_id = 'configuration_id_example' # str | (optional) user_id = 'user_id_example' # str | (optional) limit = 56 # int | Maximum number of records to fetch in a list (optional) exclusive_start_key = 'exclusive_start_key_example' # str | The base64url encoded key of the first item that this operation will evaluate (it is not returned). Use the value that was returned in the previous operation. (optional) try: - api_response = api_instance.list_logged_consents(user_id=user_id, limit=limit, exclusive_start_key=exclusive_start_key) + api_response = api_instance.list_logged_consents(configuration_id=configuration_id, user_id=user_id, limit=limit, exclusive_start_key=exclusive_start_key) print("The response of DefaultApi->list_logged_consents:\n") pprint(api_response) except Exception as e: @@ -61,6 +62,7 @@ with affinidi_tdk_iota_client.ApiClient(configuration) as api_client: | Name | Type | Description | Notes | | ----------------------- | ------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------- | +| **configuration_id** | **str** | | [optional] | | **user_id** | **str** | | [optional] | | **limit** | **int** | Maximum number of records to fetch in a list | [optional] | | **exclusive_start_key** | **str** | The base64url encoded key of the first item that this operation will evaluate (it is not returned). Use the value that was returned in the previous operation. | [optional] | diff --git a/clients/python/login_configuration_client/.openapi-generator/FILES b/clients/python/login_configuration_client/.openapi-generator/FILES index 40030042..9e8fa2ec 100644 --- a/clients/python/login_configuration_client/.openapi-generator/FILES +++ b/clients/python/login_configuration_client/.openapi-generator/FILES @@ -43,6 +43,7 @@ affinidi_tdk_login_configuration_client/models/invalid_claim_context_error.py affinidi_tdk_login_configuration_client/models/invalid_groups_error.py affinidi_tdk_login_configuration_client/models/invalid_parameter_error.py affinidi_tdk_login_configuration_client/models/invalid_parameter_error_details_inner.py +affinidi_tdk_login_configuration_client/models/invalid_vp_token_creation_time_error.py affinidi_tdk_login_configuration_client/models/json_web_key.py affinidi_tdk_login_configuration_client/models/json_web_key_keys_inner.py affinidi_tdk_login_configuration_client/models/list_login_configuration_output.py @@ -106,6 +107,7 @@ docs/InvalidClaimContextError.md docs/InvalidGroupsError.md docs/InvalidParameterError.md docs/InvalidParameterErrorDetailsInner.md +docs/InvalidVPTokenCreationTimeError.md docs/JsonWebKey.md docs/JsonWebKeyKeysInner.md docs/ListLoginConfigurationOutput.md @@ -139,4 +141,5 @@ setup.cfg setup.py test-requirements.txt test/__init__.py +test/test_invalid_vp_token_creation_time_error.py tox.ini diff --git a/clients/python/login_configuration_client/README.md b/clients/python/login_configuration_client/README.md index 33968015..5dd2f668 100644 --- a/clients/python/login_configuration_client/README.md +++ b/clients/python/login_configuration_client/README.md @@ -162,6 +162,7 @@ All URIs are relative to *https://apse1.api.affinidi.io/vpa* - [InvalidGroupsError](docs/InvalidGroupsError.md) - [InvalidParameterError](docs/InvalidParameterError.md) - [InvalidParameterErrorDetailsInner](docs/InvalidParameterErrorDetailsInner.md) +- [InvalidVPTokenCreationTimeError](docs/InvalidVPTokenCreationTimeError.md) - [JsonWebKey](docs/JsonWebKey.md) - [JsonWebKeyKeysInner](docs/JsonWebKeyKeysInner.md) - [ListLoginConfigurationOutput](docs/ListLoginConfigurationOutput.md) diff --git a/clients/python/login_configuration_client/affinidi_tdk_login_configuration_client/__init__.py b/clients/python/login_configuration_client/affinidi_tdk_login_configuration_client/__init__.py index 1139b64a..592c24b6 100644 --- a/clients/python/login_configuration_client/affinidi_tdk_login_configuration_client/__init__.py +++ b/clients/python/login_configuration_client/affinidi_tdk_login_configuration_client/__init__.py @@ -65,6 +65,7 @@ from affinidi_tdk_login_configuration_client.models.invalid_groups_error import InvalidGroupsError from affinidi_tdk_login_configuration_client.models.invalid_parameter_error import InvalidParameterError from affinidi_tdk_login_configuration_client.models.invalid_parameter_error_details_inner import InvalidParameterErrorDetailsInner +from affinidi_tdk_login_configuration_client.models.invalid_vp_token_creation_time_error import InvalidVPTokenCreationTimeError from affinidi_tdk_login_configuration_client.models.json_web_key import JsonWebKey from affinidi_tdk_login_configuration_client.models.json_web_key_keys_inner import JsonWebKeyKeysInner from affinidi_tdk_login_configuration_client.models.list_login_configuration_output import ListLoginConfigurationOutput diff --git a/clients/python/login_configuration_client/affinidi_tdk_login_configuration_client/models/__init__.py b/clients/python/login_configuration_client/affinidi_tdk_login_configuration_client/models/__init__.py index 063b0e9e..944e8b86 100644 --- a/clients/python/login_configuration_client/affinidi_tdk_login_configuration_client/models/__init__.py +++ b/clients/python/login_configuration_client/affinidi_tdk_login_configuration_client/models/__init__.py @@ -44,6 +44,7 @@ from affinidi_tdk_login_configuration_client.models.invalid_groups_error import InvalidGroupsError from affinidi_tdk_login_configuration_client.models.invalid_parameter_error import InvalidParameterError from affinidi_tdk_login_configuration_client.models.invalid_parameter_error_details_inner import InvalidParameterErrorDetailsInner +from affinidi_tdk_login_configuration_client.models.invalid_vp_token_creation_time_error import InvalidVPTokenCreationTimeError from affinidi_tdk_login_configuration_client.models.json_web_key import JsonWebKey from affinidi_tdk_login_configuration_client.models.json_web_key_keys_inner import JsonWebKeyKeysInner from affinidi_tdk_login_configuration_client.models.list_login_configuration_output import ListLoginConfigurationOutput diff --git a/clients/python/login_configuration_client/affinidi_tdk_login_configuration_client/models/invalid_vp_token_creation_time_error.py b/clients/python/login_configuration_client/affinidi_tdk_login_configuration_client/models/invalid_vp_token_creation_time_error.py new file mode 100644 index 00000000..359d3670 --- /dev/null +++ b/clients/python/login_configuration_client/affinidi_tdk_login_configuration_client/models/invalid_vp_token_creation_time_error.py @@ -0,0 +1,109 @@ +# coding: utf-8 + +""" + OidcVpAdapterBackend + + Affinidi OIDC VP Adapter Backend An authorization token is necessary to create or obtain a project Access Token and access Admin APIs. Follow these step-by-step [instructions](https://lemmatree.atlassian.net/wiki/spaces/NETCORE/pages/2735317648020/ASA+Developer+Flow#Instructions-on-how-to-create-the-Project.) to set up an authorization token + + The version of the OpenAPI document: 1.0.0 + Contact: info@affinidi.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + + +from typing import List, Optional, Union +from pydantic import BaseModel, Field, StrictFloat, StrictInt, StrictStr, conlist, validator +from affinidi_tdk_login_configuration_client.models.invalid_parameter_error_details_inner import InvalidParameterErrorDetailsInner + +class InvalidVPTokenCreationTimeError(BaseModel): + """ + InvalidVPTokenCreationTimeError + """ + name: StrictStr = Field(...) + message: StrictStr = Field(...) + http_status_code: Union[StrictFloat, StrictInt] = Field(..., alias="httpStatusCode") + trace_id: StrictStr = Field(..., alias="traceId") + details: Optional[conlist(InvalidParameterErrorDetailsInner)] = None + __properties = ["name", "message", "httpStatusCode", "traceId", "details"] + + @validator('name') + def name_validate_enum(cls, value): + """Validates the enum""" + if value not in ('InvalidVPTokenCreationTimeError'): + raise ValueError("must be one of enum values ('InvalidVPTokenCreationTimeError')") + return value + + @validator('message') + def message_validate_enum(cls, value): + """Validates the enum""" + if value not in ('VP token has expired'): + raise ValueError("must be one of enum values ('VP token has expired')") + return value + + @validator('http_status_code') + def http_status_code_validate_enum(cls, value): + """Validates the enum""" + if value not in (400): + raise ValueError("must be one of enum values (400)") + return value + + class Config: + """Pydantic configuration""" + allow_population_by_field_name = True + validate_assignment = True + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.dict(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> InvalidVPTokenCreationTimeError: + """Create an instance of InvalidVPTokenCreationTimeError from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self): + """Returns the dictionary representation of the model using alias""" + _dict = self.dict(by_alias=True, + exclude={ + }, + exclude_none=True) + # override the default output from pydantic by calling `to_dict()` of each item in details (list) + _items = [] + if self.details: + for _item in self.details: + if _item: + _items.append(_item.to_dict()) + _dict['details'] = _items + return _dict + + @classmethod + def from_dict(cls, obj: dict) -> InvalidVPTokenCreationTimeError: + """Create an instance of InvalidVPTokenCreationTimeError from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return InvalidVPTokenCreationTimeError.parse_obj(obj) + + _obj = InvalidVPTokenCreationTimeError.parse_obj({ + "name": obj.get("name"), + "message": obj.get("message"), + "http_status_code": obj.get("httpStatusCode"), + "trace_id": obj.get("traceId"), + "details": [InvalidParameterErrorDetailsInner.from_dict(_item) for _item in obj.get("details")] if obj.get("details") is not None else None + }) + return _obj + + diff --git a/clients/python/login_configuration_client/affinidi_tdk_login_configuration_client/models/login_session_dto_authorization_request.py b/clients/python/login_configuration_client/affinidi_tdk_login_configuration_client/models/login_session_dto_authorization_request.py index 5c357c60..14bd31c6 100644 --- a/clients/python/login_configuration_client/affinidi_tdk_login_configuration_client/models/login_session_dto_authorization_request.py +++ b/clients/python/login_configuration_client/affinidi_tdk_login_configuration_client/models/login_session_dto_authorization_request.py @@ -30,7 +30,8 @@ class LoginSessionDtoAuthorizationRequest(BaseModel): presentation_definition: StrictStr = Field(..., alias="presentationDefinition", description="Presentation Definition to ask from the user. In JSON Stringify format.") ari: Optional[StrictStr] = Field(None, description="ARI is used for analytics proposals.") client_id: Optional[StrictStr] = Field(None, alias="clientId", description="clientId used for detect origin.") - __properties = ["state", "presentationDefinition", "ari", "clientId"] + nonce: Optional[StrictStr] = Field(None, description="nonce for VP Token proof challenge") + __properties = ["state", "presentationDefinition", "ari", "clientId", "nonce"] class Config: """Pydantic configuration""" @@ -71,7 +72,8 @@ def from_dict(cls, obj: dict) -> LoginSessionDtoAuthorizationRequest: "state": obj.get("state"), "presentation_definition": obj.get("presentationDefinition"), "ari": obj.get("ari"), - "client_id": obj.get("clientId") + "client_id": obj.get("clientId"), + "nonce": obj.get("nonce") }) return _obj diff --git a/clients/python/login_configuration_client/docs/InvalidVPTokenCreationTimeError.md b/clients/python/login_configuration_client/docs/InvalidVPTokenCreationTimeError.md new file mode 100644 index 00000000..cd7b9bf7 --- /dev/null +++ b/clients/python/login_configuration_client/docs/InvalidVPTokenCreationTimeError.md @@ -0,0 +1,31 @@ +# InvalidVPTokenCreationTimeError + +## Properties + +| Name | Type | Description | Notes | +| -------------------- | ----------------------------------------------------------------------------------- | ----------- | ---------- | +| **name** | **str** | | +| **message** | **str** | | +| **http_status_code** | **float** | | +| **trace_id** | **str** | | +| **details** | [**List[InvalidParameterErrorDetailsInner]**](InvalidParameterErrorDetailsInner.md) | | [optional] | + +## Example + +```python +from affinidi_tdk_login_configuration_client.models.invalid_vp_token_creation_time_error import InvalidVPTokenCreationTimeError + +# TODO update the JSON string below +json = "{}" +# create an instance of InvalidVPTokenCreationTimeError from a JSON string +invalid_vp_token_creation_time_error_instance = InvalidVPTokenCreationTimeError.from_json(json) +# print the JSON string representation of the object +print InvalidVPTokenCreationTimeError.to_json() + +# convert the object into a dict +invalid_vp_token_creation_time_error_dict = invalid_vp_token_creation_time_error_instance.to_dict() +# create an instance of InvalidVPTokenCreationTimeError from a dict +invalid_vp_token_creation_time_error_form_dict = invalid_vp_token_creation_time_error.from_dict(invalid_vp_token_creation_time_error_dict) +``` + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/clients/python/login_configuration_client/docs/LoginSessionDtoAuthorizationRequest.md b/clients/python/login_configuration_client/docs/LoginSessionDtoAuthorizationRequest.md index 0c7c0db9..4317bb8c 100644 --- a/clients/python/login_configuration_client/docs/LoginSessionDtoAuthorizationRequest.md +++ b/clients/python/login_configuration_client/docs/LoginSessionDtoAuthorizationRequest.md @@ -8,6 +8,7 @@ | **presentation_definition** | **str** | Presentation Definition to ask from the user. In JSON Stringify format. | | **ari** | **str** | ARI is used for analytics proposals. | [optional] | | **client_id** | **str** | clientId used for detect origin. | [optional] | +| **nonce** | **str** | nonce for VP Token proof challenge | [optional] | ## Example diff --git a/clients/python/login_configuration_client/test/test_invalid_vp_token_creation_time_error.py b/clients/python/login_configuration_client/test/test_invalid_vp_token_creation_time_error.py new file mode 100644 index 00000000..7a6b8e8e --- /dev/null +++ b/clients/python/login_configuration_client/test/test_invalid_vp_token_creation_time_error.py @@ -0,0 +1,67 @@ +# coding: utf-8 + +""" + OidcVpAdapterBackend + + Affinidi OIDC VP Adapter Backend An authorization token is necessary to create or obtain a project Access Token and access Admin APIs. Follow these step-by-step [instructions](https://lemmatree.atlassian.net/wiki/spaces/NETCORE/pages/2735317648020/ASA+Developer+Flow#Instructions-on-how-to-create-the-Project.) to set up an authorization token + + The version of the OpenAPI document: 1.0.0 + Contact: info@affinidi.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest +import datetime + +from affinidi_tdk_login_configuration_client.models.invalid_vp_token_creation_time_error import InvalidVPTokenCreationTimeError # noqa: E501 + +class TestInvalidVPTokenCreationTimeError(unittest.TestCase): + """InvalidVPTokenCreationTimeError unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> InvalidVPTokenCreationTimeError: + """Test InvalidVPTokenCreationTimeError + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `InvalidVPTokenCreationTimeError` + """ + model = InvalidVPTokenCreationTimeError() # noqa: E501 + if include_optional: + return InvalidVPTokenCreationTimeError( + name = 'InvalidVPTokenCreationTimeError', + message = 'VP token has expired', + http_status_code = 400, + trace_id = '', + details = [ + affinidi_tdk_login_configuration_client.models.invalid_parameter_error_details_inner.InvalidParameterError_details_inner( + issue = '', + field = '', + value = '', + location = '', ) + ] + ) + else: + return InvalidVPTokenCreationTimeError( + name = 'InvalidVPTokenCreationTimeError', + message = 'VP token has expired', + http_status_code = 400, + trace_id = '', + ) + """ + + def testInvalidVPTokenCreationTimeError(self): + """Test InvalidVPTokenCreationTimeError""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/clients/python/wallets_client/.openapi-generator/FILES b/clients/python/wallets_client/.openapi-generator/FILES index 31aef251..b70235b0 100644 --- a/clients/python/wallets_client/.openapi-generator/FILES +++ b/clients/python/wallets_client/.openapi-generator/FILES @@ -77,5 +77,4 @@ setup.cfg setup.py test-requirements.txt test/__init__.py -test/test_sign_credential_result_dto_signed_credential.py tox.ini diff --git a/clients/typescript/credential-issuance-client/package.json b/clients/typescript/credential-issuance-client/package.json index 9406c31f..25331adc 100644 --- a/clients/typescript/credential-issuance-client/package.json +++ b/clients/typescript/credential-issuance-client/package.json @@ -1,6 +1,6 @@ { "name": "@affinidi-tdk/credential-issuance-client", - "version": "1.15.0", + "version": "1.0.0", "description": "Affinidi TDK typescript client for Affinidi CREDENTIAL ISSUANCE", "author": "Affinidi", "repository": { diff --git a/clients/typescript/credential-verification-client/package.json b/clients/typescript/credential-verification-client/package.json index 6dabaef0..7694b648 100644 --- a/clients/typescript/credential-verification-client/package.json +++ b/clients/typescript/credential-verification-client/package.json @@ -1,6 +1,6 @@ { "name": "@affinidi-tdk/credential-verification-client", - "version": "1.15.0", + "version": "1.0.0", "description": "Affinidi TDK typescript client for Affinidi CREDENTIAL VERIFICATION", "author": "Affinidi", "repository": { diff --git a/clients/typescript/iam-client/package.json b/clients/typescript/iam-client/package.json index 59557603..a001edb5 100644 --- a/clients/typescript/iam-client/package.json +++ b/clients/typescript/iam-client/package.json @@ -1,6 +1,6 @@ { "name": "@affinidi-tdk/iam-client", - "version": "1.15.0", + "version": "1.0.0", "description": "Affinidi TDK typescript client for Affinidi IAM", "author": "Affinidi", "repository": { diff --git a/clients/typescript/iota-client/api.ts b/clients/typescript/iota-client/api.ts index 064736c8..e2ec9aaf 100644 --- a/clients/typescript/iota-client/api.ts +++ b/clients/typescript/iota-client/api.ts @@ -2035,6 +2035,7 @@ export const DefaultApiAxiosParamCreator = function ( return { /** * returns a list of logged consents for the project + * @param {string} [configurationId] * @param {string} [userId] * @param {number} [limit] Maximum number of records to fetch in a list * @param {string} [exclusiveStartKey] The base64url encoded key of the first item that this operation will evaluate (it is not returned). Use the value that was returned in the previous operation. @@ -2042,6 +2043,7 @@ export const DefaultApiAxiosParamCreator = function ( * @throws {RequiredError} */ listLoggedConsents: async ( + configurationId?: string, userId?: string, limit?: number, exclusiveStartKey?: string, @@ -2070,6 +2072,10 @@ export const DefaultApiAxiosParamCreator = function ( configuration, ) + if (configurationId !== undefined) { + localVarQueryParameter['configurationId'] = configurationId + } + if (userId !== undefined) { localVarQueryParameter['userId'] = userId } @@ -2108,6 +2114,7 @@ export const DefaultApiFp = function (configuration?: Configuration) { return { /** * returns a list of logged consents for the project + * @param {string} [configurationId] * @param {string} [userId] * @param {number} [limit] Maximum number of records to fetch in a list * @param {string} [exclusiveStartKey] The base64url encoded key of the first item that this operation will evaluate (it is not returned). Use the value that was returned in the previous operation. @@ -2115,6 +2122,7 @@ export const DefaultApiFp = function (configuration?: Configuration) { * @throws {RequiredError} */ async listLoggedConsents( + configurationId?: string, userId?: string, limit?: number, exclusiveStartKey?: string, @@ -2127,6 +2135,7 @@ export const DefaultApiFp = function (configuration?: Configuration) { > { const localVarAxiosArgs = await localVarAxiosParamCreator.listLoggedConsents( + configurationId, userId, limit, exclusiveStartKey, @@ -2159,6 +2168,7 @@ export const DefaultApiFactory = function ( return { /** * returns a list of logged consents for the project + * @param {string} [configurationId] * @param {string} [userId] * @param {number} [limit] Maximum number of records to fetch in a list * @param {string} [exclusiveStartKey] The base64url encoded key of the first item that this operation will evaluate (it is not returned). Use the value that was returned in the previous operation. @@ -2166,13 +2176,20 @@ export const DefaultApiFactory = function ( * @throws {RequiredError} */ listLoggedConsents( + configurationId?: string, userId?: string, limit?: number, exclusiveStartKey?: string, options?: any, ): AxiosPromise { return localVarFp - .listLoggedConsents(userId, limit, exclusiveStartKey, options) + .listLoggedConsents( + configurationId, + userId, + limit, + exclusiveStartKey, + options, + ) .then((request) => request(axios, basePath)) }, } @@ -2187,6 +2204,7 @@ export const DefaultApiFactory = function ( export class DefaultApi extends BaseAPI { /** * returns a list of logged consents for the project + * @param {string} [configurationId] * @param {string} [userId] * @param {number} [limit] Maximum number of records to fetch in a list * @param {string} [exclusiveStartKey] The base64url encoded key of the first item that this operation will evaluate (it is not returned). Use the value that was returned in the previous operation. @@ -2195,13 +2213,20 @@ export class DefaultApi extends BaseAPI { * @memberof DefaultApi */ public listLoggedConsents( + configurationId?: string, userId?: string, limit?: number, exclusiveStartKey?: string, options?: RawAxiosRequestConfig, ) { return DefaultApiFp(this.configuration) - .listLoggedConsents(userId, limit, exclusiveStartKey, options) + .listLoggedConsents( + configurationId, + userId, + limit, + exclusiveStartKey, + options, + ) .then((request) => request(this.axios, this.basePath)) } } diff --git a/clients/typescript/iota-client/docs/Apis/DefaultApi.md b/clients/typescript/iota-client/docs/Apis/DefaultApi.md index 74edf9f2..0b6ccb64 100644 --- a/clients/typescript/iota-client/docs/Apis/DefaultApi.md +++ b/clients/typescript/iota-client/docs/Apis/DefaultApi.md @@ -10,7 +10,7 @@ All URIs are relative to *https://apse1.api.affinidi.io/ais* # **listLoggedConsents** -> ListLoggedConsentsOK listLoggedConsents(userId, limit, exclusiveStartKey) +> ListLoggedConsentsOK listLoggedConsents(configurationId, userId, limit, exclusiveStartKey) returns a list of logged consents for the project @@ -18,6 +18,7 @@ All URIs are relative to *https://apse1.api.affinidi.io/ais* | Name | Type | Description | Notes | | --------------------- | ----------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------- | +| **configurationId** | **String** | | [optional] [default to null] | | **userId** | **String** | | [optional] [default to null] | | **limit** | **Integer** | Maximum number of records to fetch in a list | [optional] [default to null] | | **exclusiveStartKey** | **String** | The base64url encoded key of the first item that this operation will evaluate (it is not returned). Use the value that was returned in the previous operation. | [optional] [default to null] | diff --git a/clients/typescript/iota-client/package.json b/clients/typescript/iota-client/package.json index 6f9f01db..b23283a3 100644 --- a/clients/typescript/iota-client/package.json +++ b/clients/typescript/iota-client/package.json @@ -1,6 +1,6 @@ { "name": "@affinidi-tdk/iota-client", - "version": "1.11.0", + "version": "1.0.0", "description": "Affinidi TDK typescript client for Affinidi IOTA", "author": "Affinidi", "repository": { diff --git a/clients/typescript/login-configuration-client/api.ts b/clients/typescript/login-configuration-client/api.ts index 97ade82e..ed1389f0 100644 --- a/clients/typescript/login-configuration-client/api.ts +++ b/clients/typescript/login-configuration-client/api.ts @@ -1101,6 +1101,63 @@ export interface InvalidParameterErrorDetailsInner { */ location?: string } +/** + * + * @export + * @interface InvalidVPTokenCreationTimeError + */ +export interface InvalidVPTokenCreationTimeError { + /** + * + * @type {string} + * @memberof InvalidVPTokenCreationTimeError + */ + name: InvalidVPTokenCreationTimeErrorNameEnum + /** + * + * @type {string} + * @memberof InvalidVPTokenCreationTimeError + */ + message: InvalidVPTokenCreationTimeErrorMessageEnum + /** + * + * @type {number} + * @memberof InvalidVPTokenCreationTimeError + */ + httpStatusCode: InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum + /** + * + * @type {string} + * @memberof InvalidVPTokenCreationTimeError + */ + traceId: string + /** + * + * @type {Array} + * @memberof InvalidVPTokenCreationTimeError + */ + details?: Array +} + +export const InvalidVPTokenCreationTimeErrorNameEnum = { + InvalidVpTokenCreationTimeError: 'InvalidVPTokenCreationTimeError', +} as const + +export type InvalidVPTokenCreationTimeErrorNameEnum = + (typeof InvalidVPTokenCreationTimeErrorNameEnum)[keyof typeof InvalidVPTokenCreationTimeErrorNameEnum] +export const InvalidVPTokenCreationTimeErrorMessageEnum = { + VpTokenHasExpired: 'VP token has expired', +} as const + +export type InvalidVPTokenCreationTimeErrorMessageEnum = + (typeof InvalidVPTokenCreationTimeErrorMessageEnum)[keyof typeof InvalidVPTokenCreationTimeErrorMessageEnum] +export const InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum = { + NUMBER_400: 400, +} as const + +export type InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum = + (typeof InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum)[keyof typeof InvalidVPTokenCreationTimeErrorHttpStatusCodeEnum] + /** * * @export @@ -1518,6 +1575,12 @@ export interface LoginSessionDtoAuthorizationRequest { * @memberof LoginSessionDtoAuthorizationRequest */ clientId?: string + /** + * nonce for VP Token proof challenge + * @type {string} + * @memberof LoginSessionDtoAuthorizationRequest + */ + nonce?: string } /** * Input for Creating a Login Session diff --git a/clients/typescript/login-configuration-client/docs/.openapi-generator/FILES b/clients/typescript/login-configuration-client/docs/.openapi-generator/FILES index 2a993e64..6ef9c54d 100644 --- a/clients/typescript/login-configuration-client/docs/.openapi-generator/FILES +++ b/clients/typescript/login-configuration-client/docs/.openapi-generator/FILES @@ -30,6 +30,7 @@ Models/InvalidClaimContextError.md Models/InvalidGroupsError.md Models/InvalidParameterError.md Models/InvalidParameterError_details_inner.md +Models/InvalidVPTokenCreationTimeError.md Models/JsonWebKey.md Models/JsonWebKey_keys_inner.md Models/ListLoginConfigurationOutput.md diff --git a/clients/typescript/login-configuration-client/docs/Models/InvalidVPTokenCreationTimeError.md b/clients/typescript/login-configuration-client/docs/Models/InvalidVPTokenCreationTimeError.md new file mode 100644 index 00000000..f77badb8 --- /dev/null +++ b/clients/typescript/login-configuration-client/docs/Models/InvalidVPTokenCreationTimeError.md @@ -0,0 +1,13 @@ +# InvalidVPTokenCreationTimeError + +## Properties + +| Name | Type | Description | Notes | +| ------------------ | -------------------------------------------------- | ----------- | ---------------------------- | +| **name** | **String** | | [default to null] | +| **message** | **String** | | [default to null] | +| **httpStatusCode** | **BigDecimal** | | [default to null] | +| **traceId** | **String** | | [default to null] | +| **details** | [**List**](InvalidParameterError_details_inner.md) | | [optional] [default to null] | + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/clients/typescript/login-configuration-client/docs/Models/LoginSessionDto_authorizationRequest.md b/clients/typescript/login-configuration-client/docs/Models/LoginSessionDto_authorizationRequest.md index b4498ef4..7bcc4d18 100644 --- a/clients/typescript/login-configuration-client/docs/Models/LoginSessionDto_authorizationRequest.md +++ b/clients/typescript/login-configuration-client/docs/Models/LoginSessionDto_authorizationRequest.md @@ -8,5 +8,6 @@ | **presentationDefinition** | **String** | Presentation Definition to ask from the user. In JSON Stringify format. | [default to null] | | **ari** | **String** | ARI is used for analytics proposals. | [optional] [default to null] | | **clientId** | **String** | clientId used for detect origin. | [optional] [default to null] | +| **nonce** | **String** | nonce for VP Token proof challenge | [optional] [default to null] | [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/clients/typescript/login-configuration-client/docs/README.md b/clients/typescript/login-configuration-client/docs/README.md index 7d667565..8efc0d49 100644 --- a/clients/typescript/login-configuration-client/docs/README.md +++ b/clients/typescript/login-configuration-client/docs/README.md @@ -69,6 +69,7 @@ All URIs are relative to *https://apse1.api.affinidi.io/vpa* - [InvalidGroupsError](./Models/InvalidGroupsError.md) - [InvalidParameterError](./Models/InvalidParameterError.md) - [InvalidParameterError_details_inner](./Models/InvalidParameterError_details_inner.md) +- [InvalidVPTokenCreationTimeError](./Models/InvalidVPTokenCreationTimeError.md) - [JsonWebKey](./Models/JsonWebKey.md) - [JsonWebKey_keys_inner](./Models/JsonWebKey_keys_inner.md) - [ListLoginConfigurationOutput](./Models/ListLoginConfigurationOutput.md) diff --git a/clients/typescript/login-configuration-client/package.json b/clients/typescript/login-configuration-client/package.json index ec966829..5db82c1f 100644 --- a/clients/typescript/login-configuration-client/package.json +++ b/clients/typescript/login-configuration-client/package.json @@ -1,6 +1,6 @@ { "name": "@affinidi-tdk/login-configuration-client", - "version": "1.17.0", + "version": "1.0.0", "description": "Affinidi TDK typescript client for Affinidi LOGIN CONFIGURATION", "author": "Affinidi", "repository": { diff --git a/clients/typescript/wallets-client/package.json b/clients/typescript/wallets-client/package.json index 2ac7936d..760767a2 100644 --- a/clients/typescript/wallets-client/package.json +++ b/clients/typescript/wallets-client/package.json @@ -1,6 +1,6 @@ { "name": "@affinidi-tdk/wallets-client", - "version": "1.14.0", + "version": "1.0.0", "description": "Affinidi TDK typescript client for Affinidi WALLETS", "author": "Affinidi", "repository": { diff --git a/package-lock.json b/package-lock.json index 9c0155e2..4e9eda04 100644 --- a/package-lock.json +++ b/package-lock.json @@ -77,7 +77,7 @@ }, "clients/typescript/credential-verification-client": { "name": "@affinidi-tdk/credential-verification-client", - "version": "1.14.1", + "version": "1.0.0", "license": "Apache-2.0", "dependencies": { "axios": "^1.6.0", @@ -111,7 +111,7 @@ }, "clients/typescript/iam-client": { "name": "@affinidi-tdk/iam-client", - "version": "1.14.1", + "version": "1.0.0", "license": "Apache-2.0", "dependencies": { "axios": "^1.6.0", @@ -145,7 +145,7 @@ }, "clients/typescript/iota-client": { "name": "@affinidi-tdk/iota-client", - "version": "1.10.1", + "version": "1.0.0", "license": "Apache-2.0", "dependencies": { "axios": "^1.6.0", @@ -179,7 +179,7 @@ }, "clients/typescript/login-configuration-client": { "name": "@affinidi-tdk/login-configuration-client", - "version": "1.16.1", + "version": "1.0.0", "license": "Apache-2.0", "dependencies": { "axios": "^1.6.0", @@ -213,7 +213,7 @@ }, "clients/typescript/wallets-client": { "name": "@affinidi-tdk/wallets-client", - "version": "1.13.1", + "version": "1.0.0", "license": "Apache-2.0", "dependencies": { "axios": "^1.6.0", @@ -247,7 +247,7 @@ }, "libs/iota-browser": { "name": "@affinidi-tdk/iota-browser", - "version": "1.3.2", + "version": "1.5.1", "license": "Apache-2.0", "dependencies": { "@affinidi-tdk/common": "^1.1.1", @@ -423,7 +423,7 @@ }, "libs/iota-core": { "name": "@affinidi-tdk/iota-core", - "version": "1.3.2", + "version": "1.5.1", "bundleDependencies": [ "@affinidi-tdk/common", "@affinidi-tdk/iota-client", @@ -447,6 +447,17 @@ "typescript": "^5.2.2" } }, + "libs/iota-core/node_modules/@affinidi-tdk/iota-client": { + "version": "1.11.0", + "resolved": "https://registry.npmjs.org/@affinidi-tdk/iota-client/-/iota-client-1.11.0.tgz", + "integrity": "sha512-6YPvj9imSMlvCkHYikSFBazjUcGNRhbjBUN0u879d+TSnHyQgZXe5cu1qQjIPOvvVBszhVH4L6/0h0D11gOLlQ==", + "inBundle": true, + "dependencies": { + "axios": "^1.6.0", + "axios-retry": "^4.1.0", + "url": "^0.11.3" + } + }, "libs/iota-core/node_modules/@types/node": { "version": "22.0.0", "resolved": "https://registry.npmjs.org/@types/node/-/node-22.0.0.tgz", @@ -22671,7 +22682,7 @@ }, "packages/auth-provider": { "name": "@affinidi-tdk/auth-provider", - "version": "1.13.2", + "version": "1.15.1", "bundleDependencies": [ "@affinidi-tdk/common", "@types/jsonwebtoken", @@ -22891,7 +22902,7 @@ }, "packages/common": { "name": "@affinidi-tdk/common", - "version": "1.5.2", + "version": "1.7.1", "license": "Apache-2.0", "devDependencies": { "@typescript-eslint/eslint-plugin": "^7.4.0",