dcql
Version:
Digital Credentials Query Language (DCQL)
355 lines (354 loc) • 1.16 MB
text/typescript
import * as v from "valibot";
//#region src/dcql-error/e-base.d.ts
declare function getCauseFromUnknown(cause: unknown): Error | undefined;
declare function getDcqlErrorFromUnknown(cause: unknown): DcqlError;
type DCQL_ERROR_CODE = 'PARSE_ERROR' | 'INTERNAL_SERVER_ERROR' | 'NOT_IMPLEMENTED' | 'BAD_REQUEST';
declare class DcqlError extends Error {
readonly cause?: Error;
readonly code: DCQL_ERROR_CODE;
constructor(opts: {
message?: string;
code: DCQL_ERROR_CODE;
cause?: unknown;
});
}
//#endregion
//#region src/dcql-error/e-dcql.d.ts
declare class DcqlCredentialSetError extends DcqlError {
constructor(opts: {
message: string;
cause?: unknown;
});
}
declare class DcqlUndefinedClaimSetIdError extends DcqlError {
constructor(opts: {
message: string;
cause?: unknown;
});
}
declare class DcqlNonUniqueCredentialQueryIdsError extends DcqlError {
constructor(opts: {
message: string;
cause?: unknown;
});
}
declare class DcqlParseError extends DcqlError {
constructor(opts: {
message: string;
cause?: unknown;
});
}
declare class DcqlInvalidClaimsQueryIdError extends DcqlError {
constructor(opts: {
message: string;
cause?: unknown;
});
}
declare class DcqlMissingClaimSetParseError extends DcqlError {
constructor(opts: {
message: string;
cause?: unknown;
});
}
declare class DcqlInvalidPresentationRecordError extends DcqlError {
constructor(opts: {
message: string;
cause?: unknown;
});
}
declare class DcqlPresentationResultError extends DcqlError {
constructor(opts: {
message: string;
cause?: unknown;
});
}
//#endregion
//#region src/u-model.d.ts
type UnknownBaseSchema = v.BaseSchema<unknown, unknown, v.BaseIssue<unknown>>;
type EnsureOutputAssignableToInput<T extends UnknownBaseSchema> = v.InferOutput<T> extends v.InferInput<T> ? T : never;
declare class ModelDefinition<T extends UnknownBaseSchema> {
private input;
constructor(input: {
vModel: EnsureOutputAssignableToInput<T>;
});
get v(): EnsureOutputAssignableToInput<T>;
parse(input: T): v.InferOutput<T> | DcqlParseError;
safeParse(input: unknown): {
success: true;
output: v.InferOutput<T>;
} | {
success: false;
flattened: v.FlatErrors<T>;
error: v.ValiError<T>;
};
is(input: unknown): input is v.InferOutput<T>;
}
type InferModelTypes<T extends ModelDefinition<any>> = T extends ModelDefinition<infer U> ? {
Input: v.InferInput<U>;
Output: v.InferOutput<U>;
} : never;
//#endregion
//#region src/u-dcql.d.ts
type NonEmptyArray<T> = [T, ...T[]];
type Json = string | number | boolean | null | {
[key: string]: Json;
} | Json[];
//#endregion
//#region src/dcql-presentation/m-dcql-credential-presentation.d.ts
declare namespace DcqlMdocPresentation {
const vModel: v.ObjectSchema<{
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
readonly doctype: v.StringSchema<undefined>;
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
readonly type: v.LiteralSchema<"aki", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"aki trusted authority value must be a string">, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains a list of KeyIdentifier entries of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of one of the elements MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"etsi_tl trusted authority value must be a string">, v.UrlAction<string, "etsi_tl trusted authority value must be a valid https url">, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"openid_federation", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"openid_federation trusted authority value must be a string">, v.UrlAction<string, "openid_federation trusted authority value must be a valid https url">, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>], undefined>, undefined>;
readonly cryptographic_holder_binding: v.SchemaWithPipe<readonly [v.BooleanSchema<undefined>, v.DescriptionAction<boolean, "Indicates support/inclusion of cryptographic holder binding. This will be checked against the `require_cryptographic_holder_binding` property from the query.">]>;
}, undefined>;
const model: ModelDefinition<v.ObjectSchema<{
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
readonly doctype: v.StringSchema<undefined>;
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
readonly type: v.LiteralSchema<"aki", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"aki trusted authority value must be a string">, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains a list of KeyIdentifier entries of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of one of the elements MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"etsi_tl trusted authority value must be a string">, v.UrlAction<string, "etsi_tl trusted authority value must be a valid https url">, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"openid_federation", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"openid_federation trusted authority value must be a string">, v.UrlAction<string, "openid_federation trusted authority value must be a valid https url">, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>], undefined>, undefined>;
readonly cryptographic_holder_binding: v.SchemaWithPipe<readonly [v.BooleanSchema<undefined>, v.DescriptionAction<boolean, "Indicates support/inclusion of cryptographic holder binding. This will be checked against the `require_cryptographic_holder_binding` property from the query.">]>;
}, undefined>>;
type Model = InferModelTypes<typeof model>;
}
type DcqlMdocPresentation = DcqlMdocPresentation.Model['Output'];
declare namespace DcqlSdJwtVcPresentation {
const vModel: v.ObjectSchema<{
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
readonly vct: v.StringSchema<undefined>;
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json>, undefined>;
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
readonly type: v.LiteralSchema<"aki", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"aki trusted authority value must be a string">, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains a list of KeyIdentifier entries of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of one of the elements MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"etsi_tl trusted authority value must be a string">, v.UrlAction<string, "etsi_tl trusted authority value must be a valid https url">, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"openid_federation", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"openid_federation trusted authority value must be a string">, v.UrlAction<string, "openid_federation trusted authority value must be a valid https url">, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>], undefined>, undefined>;
readonly cryptographic_holder_binding: v.SchemaWithPipe<readonly [v.BooleanSchema<undefined>, v.DescriptionAction<boolean, "Indicates support/inclusion of cryptographic holder binding. This will be checked against the `require_cryptographic_holder_binding` property from the query.">]>;
}, undefined>;
const model: ModelDefinition<v.ObjectSchema<{
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
readonly vct: v.StringSchema<undefined>;
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json>, undefined>;
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
readonly type: v.LiteralSchema<"aki", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"aki trusted authority value must be a string">, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains a list of KeyIdentifier entries of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of one of the elements MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"etsi_tl trusted authority value must be a string">, v.UrlAction<string, "etsi_tl trusted authority value must be a valid https url">, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"openid_federation", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"openid_federation trusted authority value must be a string">, v.UrlAction<string, "openid_federation trusted authority value must be a valid https url">, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>], undefined>, undefined>;
readonly cryptographic_holder_binding: v.SchemaWithPipe<readonly [v.BooleanSchema<undefined>, v.DescriptionAction<boolean, "Indicates support/inclusion of cryptographic holder binding. This will be checked against the `require_cryptographic_holder_binding` property from the query.">]>;
}, undefined>>;
type Model = InferModelTypes<typeof model>;
}
type DcqlSdJwtVcPresentation = DcqlSdJwtVcPresentation.Model['Output'];
declare namespace DcqlW3cVcPresentation {
const vModel: v.ObjectSchema<{
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json", "vc+sd-jwt"], undefined>;
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json>, undefined>;
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
readonly type: v.LiteralSchema<"aki", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"aki trusted authority value must be a string">, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains a list of KeyIdentifier entries of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of one of the elements MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"etsi_tl trusted authority value must be a string">, v.UrlAction<string, "etsi_tl trusted authority value must be a valid https url">, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"openid_federation", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"openid_federation trusted authority value must be a string">, v.UrlAction<string, "openid_federation trusted authority value must be a valid https url">, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>], undefined>, undefined>;
readonly cryptographic_holder_binding: v.SchemaWithPipe<readonly [v.BooleanSchema<undefined>, v.DescriptionAction<boolean, "Indicates support/inclusion of cryptographic holder binding. This will be checked against the `require_cryptographic_holder_binding` property from the query.">]>;
}, undefined>;
const model: ModelDefinition<v.ObjectSchema<{
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json", "vc+sd-jwt"], undefined>;
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json>, undefined>;
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
readonly type: v.LiteralSchema<"aki", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"aki trusted authority value must be a string">, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains a list of KeyIdentifier entries of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of one of the elements MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"etsi_tl trusted authority value must be a string">, v.UrlAction<string, "etsi_tl trusted authority value must be a valid https url">, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"openid_federation", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"openid_federation trusted authority value must be a string">, v.UrlAction<string, "openid_federation trusted authority value must be a valid https url">, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>], undefined>, undefined>;
readonly cryptographic_holder_binding: v.SchemaWithPipe<readonly [v.BooleanSchema<undefined>, v.DescriptionAction<boolean, "Indicates support/inclusion of cryptographic holder binding. This will be checked against the `require_cryptographic_holder_binding` property from the query.">]>;
}, undefined>>;
type Model = InferModelTypes<typeof model>;
}
type DcqlW3cVcPresentation = DcqlW3cVcPresentation.Model['Output'];
declare namespace DcqlCredentialPresentation {
const model: ModelDefinition<v.VariantSchema<"credential_format", [v.ObjectSchema<{
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
readonly doctype: v.StringSchema<undefined>;
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
readonly type: v.LiteralSchema<"aki", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"aki trusted authority value must be a string">, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains a list of KeyIdentifier entries of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of one of the elements MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"etsi_tl trusted authority value must be a string">, v.UrlAction<string, "etsi_tl trusted authority value must be a valid https url">, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"openid_federation", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"openid_federation trusted authority value must be a string">, v.UrlAction<string, "openid_federation trusted authority value must be a valid https url">, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>], undefined>, undefined>;
readonly cryptographic_holder_binding: v.SchemaWithPipe<readonly [v.BooleanSchema<undefined>, v.DescriptionAction<boolean, "Indicates support/inclusion of cryptographic holder binding. This will be checked against the `require_cryptographic_holder_binding` property from the query.">]>;
}, undefined>, v.ObjectSchema<{
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
readonly vct: v.StringSchema<undefined>;
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json>, undefined>;
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
readonly type: v.LiteralSchema<"aki", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"aki trusted authority value must be a string">, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains a list of KeyIdentifier entries of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of one of the elements MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"etsi_tl trusted authority value must be a string">, v.UrlAction<string, "etsi_tl trusted authority value must be a valid https url">, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"openid_federation", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"openid_federation trusted authority value must be a string">, v.UrlAction<string, "openid_federation trusted authority value must be a valid https url">, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>], undefined>, undefined>;
readonly cryptographic_holder_binding: v.SchemaWithPipe<readonly [v.BooleanSchema<undefined>, v.DescriptionAction<boolean, "Indicates support/inclusion of cryptographic holder binding. This will be checked against the `require_cryptographic_holder_binding` property from the query.">]>;
}, undefined>, v.ObjectSchema<{
readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json", "vc+sd-jwt"], undefined>;
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json>, undefined>;
readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
readonly type: v.LiteralSchema<"aki", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"aki trusted authority value must be a string">, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains a list of KeyIdentifier entries of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of one of the elements MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"etsi_tl trusted authority value must be a string">, v.UrlAction<string, "etsi_tl trusted authority value must be a valid https url">, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"openid_federation", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"openid_federation trusted authority value must be a string">, v.UrlAction<string, "openid_federation trusted authority value must be a valid https url">, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>], undefined>, undefined>;
readonly cryptographic_holder_binding: v.SchemaWithPipe<readonly [v.BooleanSchema<undefined>, v.DescriptionAction<boolean, "Indicates support/inclusion of cryptographic holder binding. This will be checked against the `require_cryptographic_holder_binding` property from the query.">]>;
}, undefined>], undefined>>;
type Model = InferModelTypes<typeof model>;
}
type DcqlCredentialPresentation = DcqlCredentialPresentation.Model['Output'];
//#endregion
//#region src/dcql-presentation/m-dcql-presentation.d.ts
declare namespace DcqlPresentation {
const vModel: v.SchemaWithPipe<readonly [v.UnionSchema<[v.RecordSchema<v.SchemaWithPipe<readonly [v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, v.SchemaWithPipe<readonly [v.ArraySchema<v.UnionSchema<[v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json>, undefined>], undefined>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string | {
[x: string]: Json;
}>, v.ErrorMessage<v.CustomIssue> | undefined>]>, undefined>, v.RecordSchema<v.SchemaWithPipe<readonly [v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, v.UnionSchema<[v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json>, undefined>], undefined>, undefined>], undefined>, v.DescriptionAction<{
[x: string]: NonEmptyArray<string | {
[x: string]: Json;
}>;
} | {
[x: string]: string | {
[x: string]: Json;
};
}, "REQUIRED. This is a JSON-encoded object containing entries where the key is the id value used for a Credential Query in the DCQL query and the value is an array of one or more Presentations that match the respective Credential Query. When multiple is omitted, or set to false, the array MUST contain only one Presentation. There MUST NOT be any entry in the JSON-encoded object for optional Credential Queries when there are no matching Credentials for the respective Credential Query. Each Presentation is represented as a string or object, depending on the format as defined in Appendix B. The same rules as above apply for encoding the Presentations.">]>;
type Input = v.InferInput<typeof vModel>;
type Output = v.InferOutput<typeof vModel>;
const parse: (input: Input | string) => {
[x: string]: NonEmptyArray<string | {
[x: string]: Json;
}>;
} | {
[x: string]: string | {
[x: string]: Json;
};
};
const encode: (input: Output) => string;
}
type DcqlPresentation = DcqlPresentation.Output;
//#endregion
//#region src/u-dcql-credential.d.ts
declare namespace DcqlMdocCredential {
const vNamespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
const vModel: v.ObjectSchema<{
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
readonly doctype: v.StringSchema<undefined>;
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
readonly type: v.LiteralSchema<"aki", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"aki trusted authority value must be a string">, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains a list of KeyIdentifier entries of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of one of the elements MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"etsi_tl trusted authority value must be a string">, v.UrlAction<string, "etsi_tl trusted authority value must be a valid https url">, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"openid_federation", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"openid_federation trusted authority value must be a string">, v.UrlAction<string, "openid_federation trusted authority value must be a valid https url">, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>], undefined>, undefined>;
/**
* Indicates support/inclusion of cryptographic holder binding. This will be checked against
* the `require_cryptographic_holder_binding` property from the query.
*
* In the context of a presentation this value means whether the presentation is created
* with cryptographic holder binding. In the context of a credential query this means whether
* the credential supports cryptographic holder binding.
*/
readonly cryptographic_holder_binding: v.SchemaWithPipe<readonly [v.BooleanSchema<undefined>, v.DescriptionAction<boolean, "Indicates support/inclusion of cryptographic holder binding. This will be checked against the `require_cryptographic_holder_binding` property from the query.">]>;
}, undefined>;
const model: ModelDefinition<v.ObjectSchema<{
readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
readonly doctype: v.StringSchema<undefined>;
readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
readonly type: v.LiteralSchema<"aki", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"aki trusted authority value must be a string">, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains a list of KeyIdentifier entries of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of one of the elements MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"etsi_tl trusted authority value must be a string">, v.UrlAction<string, "etsi_tl trusted authority value must be a valid https url">, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"openid_federation", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"openid_federation trusted authority value must be a string">, v.UrlAction<string, "openid_federation trusted authority value must be a valid https url">, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>], undefined>, undefined>;
/**
* Indicates support/inclusion of cryptographic holder binding. This will be checked against
* the `require_cryptographic_holder_binding` property from the query.
*
* In the context of a presentation this value means whether the presentation is created
* with cryptographic holder binding. In the context of a credential query this means whether
* the credential supports cryptographic holder binding.
*/
readonly cryptographic_holder_binding: v.SchemaWithPipe<readonly [v.BooleanSchema<undefined>, v.DescriptionAction<boolean, "Indicates support/inclusion of cryptographic holder binding. This will be checked against the `require_cryptographic_holder_binding` property from the query.">]>;
}, undefined>>;
type Model = InferModelTypes<typeof model>;
type NameSpaces = v.InferOutput<typeof vNamespaces>;
}
type DcqlMdocCredential = DcqlMdocCredential.Model['Output'];
declare namespace DcqlSdJwtVcCredential {
const vClaims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json>, undefined>;
const vModel: v.ObjectSchema<{
readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
readonly vct: v.StringSchema<undefined>;
readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json>, undefined>;
readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
readonly type: v.LiteralSchema<"aki", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"aki trusted authority value must be a string">, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains a list of KeyIdentifier entries of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of one of the elements MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"etsi_tl", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"etsi_tl trusted authority value must be a string">, v.UrlAction<string, "etsi_tl trusted authority value must be a valid https url">, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<string>, v.ErrorMessage<v.CustomIssue> | undefined>]>;
}, undefined>, v.ObjectSchema<{
readonly type: v.LiteralSchema<"openid_federation", undefined>;
readonly values: v.SchemaWithPipe<readonly [v.ArraySchema<v.SchemaWithPipe<readonly [v.StringSchema<"openid_federation trusted authority value must be a string">, v.UrlAction<string, "openid_federation trusted authority value must be a valid https url">, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, (i: v.ArrayIssue) => string>, v.CustomSchema<NonEmptyArray<strin