@cubist-labs/cubesigner-sdk-fs-storage 0.3.23 → 0.3.25
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.d.ts +2 -0
- package/dist/index.js +17 -1
- package/dist/org_event_processor.d.ts +57 -0
- package/dist/org_event_processor.js +137 -0
- package/package.json +2 -2
- package/src/index.ts +3 -0
- package/src/org_event_processor.ts +173 -0
package/dist/index.d.ts
CHANGED
|
@@ -23,3 +23,5 @@ export declare function defaultSignerSessionStorage(): SignerSessionStorage;
|
|
|
23
23
|
* @return {Promise<SignerSession>} Existing signer session from a default file on disk.
|
|
24
24
|
*/
|
|
25
25
|
export declare function loadSignerSession(): Promise<SignerSession>;
|
|
26
|
+
/** Utils for processing org events */
|
|
27
|
+
export * from "./org_event_processor";
|
package/dist/index.js
CHANGED
|
@@ -1,4 +1,18 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
14
|
+
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
15
|
+
};
|
|
2
16
|
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
17
|
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
18
|
};
|
|
@@ -54,4 +68,6 @@ async function loadSignerSession() {
|
|
|
54
68
|
return await cubesigner_sdk_1.SignerSession.loadSignerSession(defaultSignerSessionStorage());
|
|
55
69
|
}
|
|
56
70
|
exports.loadSignerSession = loadSignerSession;
|
|
57
|
-
|
|
71
|
+
/** Utils for processing org events */
|
|
72
|
+
__exportStar(require("./org_event_processor"), exports);
|
|
73
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,57 @@
|
|
|
1
|
+
import { Environment } from "@cubist-labs/cubesigner-sdk";
|
|
2
|
+
/** The common fields of SNS messages */
|
|
3
|
+
export interface SnsMessage {
|
|
4
|
+
Type: string;
|
|
5
|
+
MessageId: string;
|
|
6
|
+
TopicArn: string;
|
|
7
|
+
Message: string;
|
|
8
|
+
Timestamp: string;
|
|
9
|
+
SignatureVersion: string;
|
|
10
|
+
Signature: string;
|
|
11
|
+
SigningCertURL: string;
|
|
12
|
+
}
|
|
13
|
+
/** The format of a subscription confirmation sent by SNS */
|
|
14
|
+
export interface SubscriptionConfirmationMessage extends SnsMessage {
|
|
15
|
+
Token: string;
|
|
16
|
+
SubscribeURL: string;
|
|
17
|
+
}
|
|
18
|
+
/** Common fields for an org event */
|
|
19
|
+
export interface OrgEventBase {
|
|
20
|
+
org: string;
|
|
21
|
+
utc_timestamp: number;
|
|
22
|
+
org_event: string;
|
|
23
|
+
}
|
|
24
|
+
/** The format of an event message sent by SNS */
|
|
25
|
+
export interface OrgEventMessage extends SnsMessage {
|
|
26
|
+
Subject?: string;
|
|
27
|
+
UnsubscribeURL: string;
|
|
28
|
+
}
|
|
29
|
+
/** Options for the processor */
|
|
30
|
+
export interface OrgEventProcessorOptions {
|
|
31
|
+
env: Environment;
|
|
32
|
+
}
|
|
33
|
+
/** A utility for processing org event messages */
|
|
34
|
+
export declare class OrgEventProcessor {
|
|
35
|
+
#private;
|
|
36
|
+
/**
|
|
37
|
+
* Constructor.
|
|
38
|
+
* @param {string} orgId The org id
|
|
39
|
+
* @param {OrgEventProcessorOptions} options Additional options for the processor
|
|
40
|
+
*/
|
|
41
|
+
constructor(orgId: string, options?: OrgEventProcessorOptions);
|
|
42
|
+
/**
|
|
43
|
+
* Checks an SNS message and its signature. Throws an error if the message
|
|
44
|
+
* invalid or the signature is invalid.
|
|
45
|
+
*
|
|
46
|
+
* @param {SnsMessage} message The SNS message to check
|
|
47
|
+
*/
|
|
48
|
+
checkMessage(message: SnsMessage): Promise<void>;
|
|
49
|
+
/**
|
|
50
|
+
* Parse an org event and check its signature. Throws an error if the
|
|
51
|
+
* message is not a valid org event or the signature is invalid.
|
|
52
|
+
*
|
|
53
|
+
* @param {OrgEventMessage} message The org event message to check
|
|
54
|
+
* @return {OrgEventBase} The org event
|
|
55
|
+
*/
|
|
56
|
+
parse(message: OrgEventMessage): Promise<OrgEventBase>;
|
|
57
|
+
}
|
|
@@ -0,0 +1,137 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
3
|
+
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
4
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
5
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
6
|
+
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
7
|
+
};
|
|
8
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
9
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
10
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
11
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
12
|
+
};
|
|
13
|
+
var _OrgEventProcessor_instances, _OrgEventProcessor_topicArn, _OrgEventProcessor_orgId, _OrgEventProcessor_cachedCertificates, _OrgEventProcessor_fetchAndValidateCertificate;
|
|
14
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
+
exports.OrgEventProcessor = void 0;
|
|
16
|
+
const crypto_1 = require("crypto");
|
|
17
|
+
const cubesigner_sdk_1 = require("@cubist-labs/cubesigner-sdk");
|
|
18
|
+
// URLs that are safe to retrieve certificates from
|
|
19
|
+
const SNS_CERTIFICATE_URL_HOSTS = ["sns.us-east-1.amazonaws.com"];
|
|
20
|
+
const SNS_CERTIFICATE_HOST = "sns.amazonaws.com";
|
|
21
|
+
/** A utility for processing org event messages */
|
|
22
|
+
class OrgEventProcessor {
|
|
23
|
+
/**
|
|
24
|
+
* Constructor.
|
|
25
|
+
* @param {string} orgId The org id
|
|
26
|
+
* @param {OrgEventProcessorOptions} options Additional options for the processor
|
|
27
|
+
*/
|
|
28
|
+
constructor(orgId, options) {
|
|
29
|
+
_OrgEventProcessor_instances.add(this);
|
|
30
|
+
_OrgEventProcessor_topicArn.set(this, void 0);
|
|
31
|
+
_OrgEventProcessor_orgId.set(this, void 0);
|
|
32
|
+
_OrgEventProcessor_cachedCertificates.set(this, void 0);
|
|
33
|
+
__classPrivateFieldSet(this, _OrgEventProcessor_topicArn, cubesigner_sdk_1.envs[options?.env ?? "prod"].OrgEventsTopicArn, "f");
|
|
34
|
+
__classPrivateFieldSet(this, _OrgEventProcessor_orgId, orgId, "f");
|
|
35
|
+
__classPrivateFieldSet(this, _OrgEventProcessor_cachedCertificates, new Map(), "f");
|
|
36
|
+
}
|
|
37
|
+
/**
|
|
38
|
+
* Checks an SNS message and its signature. Throws an error if the message
|
|
39
|
+
* invalid or the signature is invalid.
|
|
40
|
+
*
|
|
41
|
+
* @param {SnsMessage} message The SNS message to check
|
|
42
|
+
*/
|
|
43
|
+
async checkMessage(message) {
|
|
44
|
+
// Check the topic ARN
|
|
45
|
+
if (message.TopicArn !== __classPrivateFieldGet(this, _OrgEventProcessor_topicArn, "f")) {
|
|
46
|
+
throw new Error(`Expected topic ARN '${__classPrivateFieldGet(this, _OrgEventProcessor_topicArn, "f")}', found '${message.TopicArn}'`);
|
|
47
|
+
}
|
|
48
|
+
// Both subscription confirmations and org event messages should have no subject
|
|
49
|
+
if ("Subject" in message) {
|
|
50
|
+
throw new Error("Expected a message without a subject");
|
|
51
|
+
}
|
|
52
|
+
// The org events topic uses signature version 2 (SHA256)
|
|
53
|
+
if (message.SignatureVersion !== "2") {
|
|
54
|
+
throw new Error("Expected signature version 2");
|
|
55
|
+
}
|
|
56
|
+
// Retrieve the certificate and sanity check it
|
|
57
|
+
const certificate = await __classPrivateFieldGet(this, _OrgEventProcessor_instances, "m", _OrgEventProcessor_fetchAndValidateCertificate).call(this, new URL(message.SigningCertURL));
|
|
58
|
+
// Extract fields specific to subscription confirmations
|
|
59
|
+
const subscribeUrl = message.SubscribeURL;
|
|
60
|
+
const token = message.Token;
|
|
61
|
+
// Check the signature
|
|
62
|
+
const fields = ["Message", message.Message, "MessageId", message.MessageId]
|
|
63
|
+
.concat(subscribeUrl !== undefined ? ["SubscribeURL", subscribeUrl] : [])
|
|
64
|
+
.concat(["Timestamp", message.Timestamp])
|
|
65
|
+
.concat(token !== undefined ? ["Token", token] : [])
|
|
66
|
+
.concat(["TopicArn", message.TopicArn, "Type", message.Type]);
|
|
67
|
+
const verify = (0, crypto_1.createVerify)("RSA-SHA256");
|
|
68
|
+
verify.update(fields.join("\n") + "\n");
|
|
69
|
+
const isValid = verify.verify(certificate.publicKey, message.Signature, "base64");
|
|
70
|
+
if (!isValid) {
|
|
71
|
+
throw new Error("The org event has an invalid signature");
|
|
72
|
+
}
|
|
73
|
+
}
|
|
74
|
+
/**
|
|
75
|
+
* Parse an org event and check its signature. Throws an error if the
|
|
76
|
+
* message is not a valid org event or the signature is invalid.
|
|
77
|
+
*
|
|
78
|
+
* @param {OrgEventMessage} message The org event message to check
|
|
79
|
+
* @return {OrgEventBase} The org event
|
|
80
|
+
*/
|
|
81
|
+
async parse(message) {
|
|
82
|
+
await this.checkMessage(message);
|
|
83
|
+
// Check that the event is for the expected org
|
|
84
|
+
const orgEvent = JSON.parse(message.Message);
|
|
85
|
+
if (orgEvent.org !== __classPrivateFieldGet(this, _OrgEventProcessor_orgId, "f")) {
|
|
86
|
+
throw new Error(`Expected org to be '${__classPrivateFieldGet(this, _OrgEventProcessor_orgId, "f")}', found '${orgEvent.org}'`);
|
|
87
|
+
}
|
|
88
|
+
return orgEvent;
|
|
89
|
+
}
|
|
90
|
+
}
|
|
91
|
+
exports.OrgEventProcessor = OrgEventProcessor;
|
|
92
|
+
_OrgEventProcessor_topicArn = new WeakMap(), _OrgEventProcessor_orgId = new WeakMap(), _OrgEventProcessor_cachedCertificates = new WeakMap(), _OrgEventProcessor_instances = new WeakSet(), _OrgEventProcessor_fetchAndValidateCertificate =
|
|
93
|
+
/**
|
|
94
|
+
* Fetches a certificate from a given URL or from the certificate cache.
|
|
95
|
+
* Throws an error if the URL does not correspond to an SNS certificate URL.
|
|
96
|
+
*
|
|
97
|
+
* Note: Ideally, this method would verify the certificate chain, but there
|
|
98
|
+
* is no obvious chain. Instead, this method only fetches certificates from
|
|
99
|
+
* a small set of allowlisted URLs.
|
|
100
|
+
*
|
|
101
|
+
* @param {URL} url The URL of the certificate
|
|
102
|
+
* @return {X509Certificate} The certificate
|
|
103
|
+
*/
|
|
104
|
+
async function _OrgEventProcessor_fetchAndValidateCertificate(url) {
|
|
105
|
+
const currTime = new Date().getTime();
|
|
106
|
+
const cachedCertificate = __classPrivateFieldGet(this, _OrgEventProcessor_cachedCertificates, "f").get(url);
|
|
107
|
+
if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {
|
|
108
|
+
return cachedCertificate;
|
|
109
|
+
}
|
|
110
|
+
// Only fetch certificates from HTTPS URLs
|
|
111
|
+
if (url.protocol !== "https:") {
|
|
112
|
+
throw new Error("Expected signing certificate URL to use HTTPS");
|
|
113
|
+
}
|
|
114
|
+
// Only fetch certificate URLs for SNS
|
|
115
|
+
if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {
|
|
116
|
+
throw new Error("Expected signing certificate URL for SNS in us-east-1");
|
|
117
|
+
}
|
|
118
|
+
const response = await fetch(url);
|
|
119
|
+
if (!response.ok) {
|
|
120
|
+
throw new Error(`Unable to download certificate. Status: ${response.status}`);
|
|
121
|
+
}
|
|
122
|
+
const blob = await response.blob();
|
|
123
|
+
const certificate = new crypto_1.X509Certificate(await blob.text());
|
|
124
|
+
if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {
|
|
125
|
+
throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);
|
|
126
|
+
}
|
|
127
|
+
// Check validity times
|
|
128
|
+
if (currTime < new Date(certificate.validFrom).getTime()) {
|
|
129
|
+
throw new Error("Certificate not valid yet");
|
|
130
|
+
}
|
|
131
|
+
if (new Date(certificate.validTo).getTime() < currTime) {
|
|
132
|
+
throw new Error("Certificate expired");
|
|
133
|
+
}
|
|
134
|
+
__classPrivateFieldGet(this, _OrgEventProcessor_cachedCertificates, "f").set(url, certificate);
|
|
135
|
+
return certificate;
|
|
136
|
+
};
|
|
137
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"org_event_processor.js","sourceRoot":"","sources":["../src/org_event_processor.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAAuD;AACvD,gEAAgE;AAEhE,mDAAmD;AACnD,MAAM,yBAAyB,GAAG,CAAC,6BAA6B,CAAC,CAAC;AAElE,MAAM,oBAAoB,GAAG,mBAAmB,CAAC;AAsCjD,kDAAkD;AAClD,MAAa,iBAAiB;IAK5B;;;;OAIG;IACH,YAAY,KAAa,EAAE,OAAkC;;QATpD,8CAAkB;QAClB,2CAAe;QACxB,wDAA+C;QAQ7C,uBAAA,IAAI,+BAAa,qBAAI,CAAC,OAAO,EAAE,GAAG,IAAI,MAAM,CAAC,CAAC,iBAAiB,MAAA,CAAC;QAChE,uBAAA,IAAI,4BAAU,KAAK,MAAA,CAAC;QACpB,uBAAA,IAAI,yCAAuB,IAAI,GAAG,EAAE,MAAA,CAAC;IACvC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,YAAY,CAAC,OAAmB;QACpC,sBAAsB;QACtB,IAAI,OAAO,CAAC,QAAQ,KAAK,uBAAA,IAAI,mCAAU,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CAAC,uBAAuB,uBAAA,IAAI,mCAAU,aAAa,OAAO,CAAC,QAAQ,GAAG,CAAC,CAAC;QACzF,CAAC;QAED,gFAAgF;QAChF,IAAI,SAAS,IAAI,OAAO,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;QAC1D,CAAC;QAED,yDAAyD;QACzD,IAAI,OAAO,CAAC,gBAAgB,KAAK,GAAG,EAAE,CAAC;YACrC,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QAED,+CAA+C;QAC/C,MAAM,WAAW,GAAG,MAAM,uBAAA,IAAI,oFAA6B,MAAjC,IAAI,EAA8B,IAAI,GAAG,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC;QAE7F,wDAAwD;QACxD,MAAM,YAAY,GAAI,OAA2C,CAAC,YAAY,CAAC;QAC/E,MAAM,KAAK,GAAI,OAA2C,CAAC,KAAK,CAAC;QAEjE,sBAAsB;QACtB,MAAM,MAAM,GAAG,CAAC,SAAS,EAAE,OAAO,CAAC,OAAO,EAAE,WAAW,EAAE,OAAO,CAAC,SAAS,CAAC;aACxE,MAAM,CAAC,YAAY,KAAK,SAAS,CAAC,CAAC,CAAC,CAAC,cAAc,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;aACxE,MAAM,CAAC,CAAC,WAAW,EAAE,OAAO,CAAC,SAAS,CAAC,CAAC;aACxC,MAAM,CAAC,KAAK,KAAK,SAAS,CAAC,CAAC,CAAC,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;aACnD,MAAM,CAAC,CAAC,UAAU,EAAE,OAAO,CAAC,QAAQ,EAAE,MAAM,EAAE,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC;QAChE,MAAM,MAAM,GAAG,IAAA,qBAAY,EAAC,YAAY,CAAC,CAAC;QAC1C,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,IAAI,CAAC,CAAC;QACxC,MAAM,OAAO,GAAG,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,OAAO,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;QAClF,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC5D,CAAC;IACH,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,KAAK,CAAC,OAAwB;QAClC,MAAM,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAEjC,+CAA+C;QAC/C,MAAM,QAAQ,GAAiB,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;QAC3D,IAAI,QAAQ,CAAC,GAAG,KAAK,uBAAA,IAAI,gCAAO,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CAAC,uBAAuB,uBAAA,IAAI,gCAAO,aAAa,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;QAClF,CAAC;QAED,OAAO,QAAQ,CAAC;IAClB,CAAC;CAmDF;AA/HD,8CA+HC;;AAjDC;;;;;;;;;;GAUG;AACH,KAAK,yDAA8B,GAAQ;IACzC,MAAM,QAAQ,GAAG,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,CAAC;IACtC,MAAM,iBAAiB,GAAG,uBAAA,IAAI,6CAAoB,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;IAC5D,IAAI,iBAAiB,IAAI,QAAQ,GAAG,IAAI,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;QAClF,OAAO,iBAAiB,CAAC;IAC3B,CAAC;IAED,0CAA0C;IAC1C,IAAI,GAAG,CAAC,QAAQ,KAAK,QAAQ,EAAE,CAAC;QAC9B,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;IACnE,CAAC;IAED,sCAAsC;IACtC,IAAI,yBAAyB,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC;QACvD,MAAM,IAAI,KAAK,CAAC,uDAAuD,CAAC,CAAC;IAC3E,CAAC;IAED,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;IAClC,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE,CAAC;QACjB,MAAM,IAAI,KAAK,CAAC,2CAA2C,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC;IAChF,CAAC;IACD,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;IACnC,MAAM,WAAW,GAAG,IAAI,wBAAe,CAAC,MAAM,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC;IAC3D,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,oBAAoB,CAAC,EAAE,CAAC;QACjD,MAAM,IAAI,KAAK,CAAC,mCAAmC,oBAAoB,GAAG,CAAC,CAAC;IAC9E,CAAC;IAED,uBAAuB;IACvB,IAAI,QAAQ,GAAG,IAAI,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;QACzD,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;IAC/C,CAAC;IACD,IAAI,IAAI,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,GAAG,QAAQ,EAAE,CAAC;QACvD,MAAM,IAAI,KAAK,CAAC,qBAAqB,CAAC,CAAC;IACzC,CAAC;IAED,uBAAA,IAAI,6CAAoB,CAAC,GAAG,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;IAC/C,OAAO,WAAW,CAAC;AACrB,CAAC","sourcesContent":["import { X509Certificate, createVerify } from \"crypto\";\nimport { Environment, envs } from \"@cubist-labs/cubesigner-sdk\";\n\n// URLs that are safe to retrieve certificates from\nconst SNS_CERTIFICATE_URL_HOSTS = [\"sns.us-east-1.amazonaws.com\"];\n\nconst SNS_CERTIFICATE_HOST = \"sns.amazonaws.com\";\n\n/** The common fields of SNS messages */\nexport interface SnsMessage {\n  Type: string;\n  MessageId: string;\n  TopicArn: string;\n  Message: string;\n  Timestamp: string;\n  SignatureVersion: string;\n  Signature: string;\n  SigningCertURL: string;\n}\n\n/** The format of a subscription confirmation sent by SNS */\nexport interface SubscriptionConfirmationMessage extends SnsMessage {\n  Token: string;\n  SubscribeURL: string;\n}\n\n/** Common fields for an org event */\nexport interface OrgEventBase {\n  org: string;\n  utc_timestamp: number;\n  org_event: string;\n}\n\n/** The format of an event message sent by SNS */\nexport interface OrgEventMessage extends SnsMessage {\n  Subject?: string;\n  UnsubscribeURL: string;\n}\n\n/** Options for the processor */\nexport interface OrgEventProcessorOptions {\n  env: Environment;\n}\n\n/** A utility for processing org event messages */\nexport class OrgEventProcessor {\n  readonly #topicArn: string;\n  readonly #orgId: string;\n  #cachedCertificates: Map<URL, X509Certificate>;\n\n  /**\n   * Constructor.\n   * @param {string} orgId The org id\n   * @param {OrgEventProcessorOptions} options Additional options for the processor\n   */\n  constructor(orgId: string, options?: OrgEventProcessorOptions) {\n    this.#topicArn = envs[options?.env ?? \"prod\"].OrgEventsTopicArn;\n    this.#orgId = orgId;\n    this.#cachedCertificates = new Map();\n  }\n\n  /**\n   * Checks an SNS message and its signature. Throws an error if the message\n   * invalid or the signature is invalid.\n   *\n   * @param {SnsMessage} message The SNS message to check\n   */\n  async checkMessage(message: SnsMessage) {\n    // Check the topic ARN\n    if (message.TopicArn !== this.#topicArn) {\n      throw new Error(`Expected topic ARN '${this.#topicArn}', found '${message.TopicArn}'`);\n    }\n\n    // Both subscription confirmations and org event messages should have no subject\n    if (\"Subject\" in message) {\n      throw new Error(\"Expected a message without a subject\");\n    }\n\n    // The org events topic uses signature version 2 (SHA256)\n    if (message.SignatureVersion !== \"2\") {\n      throw new Error(\"Expected signature version 2\");\n    }\n\n    // Retrieve the certificate and sanity check it\n    const certificate = await this.#fetchAndValidateCertificate(new URL(message.SigningCertURL));\n\n    // Extract fields specific to subscription confirmations\n    const subscribeUrl = (message as SubscriptionConfirmationMessage).SubscribeURL;\n    const token = (message as SubscriptionConfirmationMessage).Token;\n\n    // Check the signature\n    const fields = [\"Message\", message.Message, \"MessageId\", message.MessageId]\n      .concat(subscribeUrl !== undefined ? [\"SubscribeURL\", subscribeUrl] : [])\n      .concat([\"Timestamp\", message.Timestamp])\n      .concat(token !== undefined ? [\"Token\", token] : [])\n      .concat([\"TopicArn\", message.TopicArn, \"Type\", message.Type]);\n    const verify = createVerify(\"RSA-SHA256\");\n    verify.update(fields.join(\"\\n\") + \"\\n\");\n    const isValid = verify.verify(certificate.publicKey, message.Signature, \"base64\");\n    if (!isValid) {\n      throw new Error(\"The org event has an invalid signature\");\n    }\n  }\n\n  /**\n   * Parse an org event and check its signature. Throws an error if the\n   * message is not a valid org event or the signature is invalid.\n   *\n   * @param {OrgEventMessage} message The org event message to check\n   * @return {OrgEventBase} The org event\n   */\n  async parse(message: OrgEventMessage): Promise<OrgEventBase> {\n    await this.checkMessage(message);\n\n    // Check that the event is for the expected org\n    const orgEvent: OrgEventBase = JSON.parse(message.Message);\n    if (orgEvent.org !== this.#orgId) {\n      throw new Error(`Expected org to be '${this.#orgId}', found '${orgEvent.org}'`);\n    }\n\n    return orgEvent;\n  }\n\n  /**\n   * Fetches a certificate from a given URL or from the certificate cache.\n   * Throws an error if the URL does not correspond to an SNS certificate URL.\n   *\n   * Note: Ideally, this method would verify the certificate chain, but there\n   * is no obvious chain. Instead, this method only fetches certificates from\n   * a small set of allowlisted URLs.\n   *\n   * @param {URL} url The URL of the certificate\n   * @return {X509Certificate} The certificate\n   */\n  async #fetchAndValidateCertificate(url: URL): Promise<X509Certificate> {\n    const currTime = new Date().getTime();\n    const cachedCertificate = this.#cachedCertificates.get(url);\n    if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {\n      return cachedCertificate;\n    }\n\n    // Only fetch certificates from HTTPS URLs\n    if (url.protocol !== \"https:\") {\n      throw new Error(\"Expected signing certificate URL to use HTTPS\");\n    }\n\n    // Only fetch certificate URLs for SNS\n    if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {\n      throw new Error(\"Expected signing certificate URL for SNS in us-east-1\");\n    }\n\n    const response = await fetch(url);\n    if (!response.ok) {\n      throw new Error(`Unable to download certificate. Status: ${response.status}`);\n    }\n    const blob = await response.blob();\n    const certificate = new X509Certificate(await blob.text());\n    if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {\n      throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);\n    }\n\n    // Check validity times\n    if (currTime < new Date(certificate.validFrom).getTime()) {\n      throw new Error(\"Certificate not valid yet\");\n    }\n    if (new Date(certificate.validTo).getTime() < currTime) {\n      throw new Error(\"Certificate expired\");\n    }\n\n    this.#cachedCertificates.set(url, certificate);\n    return certificate;\n  }\n}\n"]}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@cubist-labs/cubesigner-sdk-fs-storage",
|
|
3
|
-
"version": "0.3.
|
|
3
|
+
"version": "0.3.25",
|
|
4
4
|
"description": "Filesystem storage implementation for CubeSigner SDK",
|
|
5
5
|
"license": "MIT OR Apache-2.0",
|
|
6
6
|
"author": "Cubist, Inc.",
|
|
@@ -20,7 +20,7 @@
|
|
|
20
20
|
"test": "jest --maxWorkers=1"
|
|
21
21
|
},
|
|
22
22
|
"peerDependencies": {
|
|
23
|
-
"@cubist-labs/cubesigner-sdk": "^0.3.
|
|
23
|
+
"@cubist-labs/cubesigner-sdk": "^0.3.25"
|
|
24
24
|
},
|
|
25
25
|
"directories": {
|
|
26
26
|
"test": "test"
|
package/src/index.ts
CHANGED
|
@@ -53,3 +53,6 @@ export function defaultSignerSessionStorage(): SignerSessionStorage {
|
|
|
53
53
|
export async function loadSignerSession(): Promise<SignerSession> {
|
|
54
54
|
return await SignerSession.loadSignerSession(defaultSignerSessionStorage());
|
|
55
55
|
}
|
|
56
|
+
|
|
57
|
+
/** Utils for processing org events */
|
|
58
|
+
export * from "./org_event_processor";
|
|
@@ -0,0 +1,173 @@
|
|
|
1
|
+
import { X509Certificate, createVerify } from "crypto";
|
|
2
|
+
import { Environment, envs } from "@cubist-labs/cubesigner-sdk";
|
|
3
|
+
|
|
4
|
+
// URLs that are safe to retrieve certificates from
|
|
5
|
+
const SNS_CERTIFICATE_URL_HOSTS = ["sns.us-east-1.amazonaws.com"];
|
|
6
|
+
|
|
7
|
+
const SNS_CERTIFICATE_HOST = "sns.amazonaws.com";
|
|
8
|
+
|
|
9
|
+
/** The common fields of SNS messages */
|
|
10
|
+
export interface SnsMessage {
|
|
11
|
+
Type: string;
|
|
12
|
+
MessageId: string;
|
|
13
|
+
TopicArn: string;
|
|
14
|
+
Message: string;
|
|
15
|
+
Timestamp: string;
|
|
16
|
+
SignatureVersion: string;
|
|
17
|
+
Signature: string;
|
|
18
|
+
SigningCertURL: string;
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
/** The format of a subscription confirmation sent by SNS */
|
|
22
|
+
export interface SubscriptionConfirmationMessage extends SnsMessage {
|
|
23
|
+
Token: string;
|
|
24
|
+
SubscribeURL: string;
|
|
25
|
+
}
|
|
26
|
+
|
|
27
|
+
/** Common fields for an org event */
|
|
28
|
+
export interface OrgEventBase {
|
|
29
|
+
org: string;
|
|
30
|
+
utc_timestamp: number;
|
|
31
|
+
org_event: string;
|
|
32
|
+
}
|
|
33
|
+
|
|
34
|
+
/** The format of an event message sent by SNS */
|
|
35
|
+
export interface OrgEventMessage extends SnsMessage {
|
|
36
|
+
Subject?: string;
|
|
37
|
+
UnsubscribeURL: string;
|
|
38
|
+
}
|
|
39
|
+
|
|
40
|
+
/** Options for the processor */
|
|
41
|
+
export interface OrgEventProcessorOptions {
|
|
42
|
+
env: Environment;
|
|
43
|
+
}
|
|
44
|
+
|
|
45
|
+
/** A utility for processing org event messages */
|
|
46
|
+
export class OrgEventProcessor {
|
|
47
|
+
readonly #topicArn: string;
|
|
48
|
+
readonly #orgId: string;
|
|
49
|
+
#cachedCertificates: Map<URL, X509Certificate>;
|
|
50
|
+
|
|
51
|
+
/**
|
|
52
|
+
* Constructor.
|
|
53
|
+
* @param {string} orgId The org id
|
|
54
|
+
* @param {OrgEventProcessorOptions} options Additional options for the processor
|
|
55
|
+
*/
|
|
56
|
+
constructor(orgId: string, options?: OrgEventProcessorOptions) {
|
|
57
|
+
this.#topicArn = envs[options?.env ?? "prod"].OrgEventsTopicArn;
|
|
58
|
+
this.#orgId = orgId;
|
|
59
|
+
this.#cachedCertificates = new Map();
|
|
60
|
+
}
|
|
61
|
+
|
|
62
|
+
/**
|
|
63
|
+
* Checks an SNS message and its signature. Throws an error if the message
|
|
64
|
+
* invalid or the signature is invalid.
|
|
65
|
+
*
|
|
66
|
+
* @param {SnsMessage} message The SNS message to check
|
|
67
|
+
*/
|
|
68
|
+
async checkMessage(message: SnsMessage) {
|
|
69
|
+
// Check the topic ARN
|
|
70
|
+
if (message.TopicArn !== this.#topicArn) {
|
|
71
|
+
throw new Error(`Expected topic ARN '${this.#topicArn}', found '${message.TopicArn}'`);
|
|
72
|
+
}
|
|
73
|
+
|
|
74
|
+
// Both subscription confirmations and org event messages should have no subject
|
|
75
|
+
if ("Subject" in message) {
|
|
76
|
+
throw new Error("Expected a message without a subject");
|
|
77
|
+
}
|
|
78
|
+
|
|
79
|
+
// The org events topic uses signature version 2 (SHA256)
|
|
80
|
+
if (message.SignatureVersion !== "2") {
|
|
81
|
+
throw new Error("Expected signature version 2");
|
|
82
|
+
}
|
|
83
|
+
|
|
84
|
+
// Retrieve the certificate and sanity check it
|
|
85
|
+
const certificate = await this.#fetchAndValidateCertificate(new URL(message.SigningCertURL));
|
|
86
|
+
|
|
87
|
+
// Extract fields specific to subscription confirmations
|
|
88
|
+
const subscribeUrl = (message as SubscriptionConfirmationMessage).SubscribeURL;
|
|
89
|
+
const token = (message as SubscriptionConfirmationMessage).Token;
|
|
90
|
+
|
|
91
|
+
// Check the signature
|
|
92
|
+
const fields = ["Message", message.Message, "MessageId", message.MessageId]
|
|
93
|
+
.concat(subscribeUrl !== undefined ? ["SubscribeURL", subscribeUrl] : [])
|
|
94
|
+
.concat(["Timestamp", message.Timestamp])
|
|
95
|
+
.concat(token !== undefined ? ["Token", token] : [])
|
|
96
|
+
.concat(["TopicArn", message.TopicArn, "Type", message.Type]);
|
|
97
|
+
const verify = createVerify("RSA-SHA256");
|
|
98
|
+
verify.update(fields.join("\n") + "\n");
|
|
99
|
+
const isValid = verify.verify(certificate.publicKey, message.Signature, "base64");
|
|
100
|
+
if (!isValid) {
|
|
101
|
+
throw new Error("The org event has an invalid signature");
|
|
102
|
+
}
|
|
103
|
+
}
|
|
104
|
+
|
|
105
|
+
/**
|
|
106
|
+
* Parse an org event and check its signature. Throws an error if the
|
|
107
|
+
* message is not a valid org event or the signature is invalid.
|
|
108
|
+
*
|
|
109
|
+
* @param {OrgEventMessage} message The org event message to check
|
|
110
|
+
* @return {OrgEventBase} The org event
|
|
111
|
+
*/
|
|
112
|
+
async parse(message: OrgEventMessage): Promise<OrgEventBase> {
|
|
113
|
+
await this.checkMessage(message);
|
|
114
|
+
|
|
115
|
+
// Check that the event is for the expected org
|
|
116
|
+
const orgEvent: OrgEventBase = JSON.parse(message.Message);
|
|
117
|
+
if (orgEvent.org !== this.#orgId) {
|
|
118
|
+
throw new Error(`Expected org to be '${this.#orgId}', found '${orgEvent.org}'`);
|
|
119
|
+
}
|
|
120
|
+
|
|
121
|
+
return orgEvent;
|
|
122
|
+
}
|
|
123
|
+
|
|
124
|
+
/**
|
|
125
|
+
* Fetches a certificate from a given URL or from the certificate cache.
|
|
126
|
+
* Throws an error if the URL does not correspond to an SNS certificate URL.
|
|
127
|
+
*
|
|
128
|
+
* Note: Ideally, this method would verify the certificate chain, but there
|
|
129
|
+
* is no obvious chain. Instead, this method only fetches certificates from
|
|
130
|
+
* a small set of allowlisted URLs.
|
|
131
|
+
*
|
|
132
|
+
* @param {URL} url The URL of the certificate
|
|
133
|
+
* @return {X509Certificate} The certificate
|
|
134
|
+
*/
|
|
135
|
+
async #fetchAndValidateCertificate(url: URL): Promise<X509Certificate> {
|
|
136
|
+
const currTime = new Date().getTime();
|
|
137
|
+
const cachedCertificate = this.#cachedCertificates.get(url);
|
|
138
|
+
if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {
|
|
139
|
+
return cachedCertificate;
|
|
140
|
+
}
|
|
141
|
+
|
|
142
|
+
// Only fetch certificates from HTTPS URLs
|
|
143
|
+
if (url.protocol !== "https:") {
|
|
144
|
+
throw new Error("Expected signing certificate URL to use HTTPS");
|
|
145
|
+
}
|
|
146
|
+
|
|
147
|
+
// Only fetch certificate URLs for SNS
|
|
148
|
+
if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {
|
|
149
|
+
throw new Error("Expected signing certificate URL for SNS in us-east-1");
|
|
150
|
+
}
|
|
151
|
+
|
|
152
|
+
const response = await fetch(url);
|
|
153
|
+
if (!response.ok) {
|
|
154
|
+
throw new Error(`Unable to download certificate. Status: ${response.status}`);
|
|
155
|
+
}
|
|
156
|
+
const blob = await response.blob();
|
|
157
|
+
const certificate = new X509Certificate(await blob.text());
|
|
158
|
+
if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {
|
|
159
|
+
throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);
|
|
160
|
+
}
|
|
161
|
+
|
|
162
|
+
// Check validity times
|
|
163
|
+
if (currTime < new Date(certificate.validFrom).getTime()) {
|
|
164
|
+
throw new Error("Certificate not valid yet");
|
|
165
|
+
}
|
|
166
|
+
if (new Date(certificate.validTo).getTime() < currTime) {
|
|
167
|
+
throw new Error("Certificate expired");
|
|
168
|
+
}
|
|
169
|
+
|
|
170
|
+
this.#cachedCertificates.set(url, certificate);
|
|
171
|
+
return certificate;
|
|
172
|
+
}
|
|
173
|
+
}
|