@cubist-labs/cubesigner-sdk-fs-storage 0.3.23 → 0.3.25

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.d.ts CHANGED
@@ -23,3 +23,5 @@ export declare function defaultSignerSessionStorage(): SignerSessionStorage;
23
23
  * @return {Promise<SignerSession>} Existing signer session from a default file on disk.
24
24
  */
25
25
  export declare function loadSignerSession(): Promise<SignerSession>;
26
+ /** Utils for processing org events */
27
+ export * from "./org_event_processor";
package/dist/index.js CHANGED
@@ -1,4 +1,18 @@
1
1
  "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __exportStar = (this && this.__exportStar) || function(m, exports) {
14
+ for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
15
+ };
2
16
  var __importDefault = (this && this.__importDefault) || function (mod) {
3
17
  return (mod && mod.__esModule) ? mod : { "default": mod };
4
18
  };
@@ -54,4 +68,6 @@ async function loadSignerSession() {
54
68
  return await cubesigner_sdk_1.SignerSession.loadSignerSession(defaultSignerSessionStorage());
55
69
  }
56
70
  exports.loadSignerSession = loadSignerSession;
57
- //# sourceMappingURL=data:application/json;base64,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
71
+ /** Utils for processing org events */
72
+ __exportStar(require("./org_event_processor"), exports);
73
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi9zcmMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7QUFBQSxnRUFBb0c7QUFDcEcsaURBQXdEO0FBQ3hELGdEQUF3QjtBQUV4QixzQkFBc0I7QUFDdEIsK0NBQXdEO0FBQS9DLHNIQUFBLHNCQUFzQixPQUFBO0FBRS9COzs7R0FHRztBQUNILFNBQVMsU0FBUztJQUNoQixNQUFNLFNBQVMsR0FDYixPQUFPLENBQUMsUUFBUSxLQUFLLFFBQVE7UUFDM0IsQ0FBQyxDQUFDLEdBQUcsT0FBTyxDQUFDLEdBQUcsQ0FBQyxJQUFJLDhCQUE4QjtRQUNuRCxDQUFDLENBQUMsR0FBRyxPQUFPLENBQUMsR0FBRyxDQUFDLElBQUksVUFBVSxDQUFDO0lBQ3BDLE9BQU8sY0FBSSxDQUFDLElBQUksQ0FBQyxTQUFTLEVBQUUsWUFBWSxDQUFDLENBQUM7QUFDNUMsQ0FBQztBQUVELHNEQUFzRDtBQUN6QyxRQUFBLFVBQVUsR0FBRyxTQUFTLEVBQUUsQ0FBQztBQUV0QyxzRUFBc0U7QUFDekQsUUFBQSx1QkFBdUIsR0FBRyxjQUFJLENBQUMsSUFBSSxDQUFDLGtCQUFVLEVBQUUseUJBQXlCLENBQUMsQ0FBQztBQUV4RixrRUFBa0U7QUFDckQsUUFBQSxtQkFBbUIsR0FBRyxjQUFJLENBQUMsSUFBSSxDQUFDLGtCQUFVLEVBQUUscUJBQXFCLENBQUMsQ0FBQztBQUVoRjs7R0FFRztBQUNILFNBQWdCLCtCQUErQjtJQUM3QyxPQUFPLElBQUkscUNBQXNCLENBQUMsK0JBQXVCLENBQUMsQ0FBQztBQUM3RCxDQUFDO0FBRkQsMEVBRUM7QUFFRDs7R0FFRztBQUNJLEtBQUssVUFBVSxxQkFBcUI7SUFDekMsT0FBTyxNQUFNLGlDQUFnQixDQUFDLHFCQUFxQixDQUFDLCtCQUErQixFQUFFLENBQUMsQ0FBQztBQUN6RixDQUFDO0FBRkQsc0RBRUM7QUFFRDs7R0FFRztBQUNILFNBQWdCLDJCQUEyQjtJQUN6QyxPQUFPLElBQUkscUNBQXNCLENBQUMsMkJBQW1CLENBQUMsQ0FBQztBQUN6RCxDQUFDO0FBRkQsa0VBRUM7QUFFRDs7R0FFRztBQUNJLEtBQUssVUFBVSxpQkFBaUI7SUFDckMsT0FBTyxNQUFNLDhCQUFhLENBQUMsaUJBQWlCLENBQUMsMkJBQTJCLEVBQUUsQ0FBQyxDQUFDO0FBQzlFLENBQUM7QUFGRCw4Q0FFQztBQUVELHNDQUFzQztBQUN0Qyx3REFBc0MiLCJzb3VyY2VzQ29udGVudCI6WyJpbXBvcnQgeyBDdWJlU2lnbmVyQ2xpZW50LCBTaWduZXJTZXNzaW9uLCBTaWduZXJTZXNzaW9uU3RvcmFnZSB9IGZyb20gXCJAY3ViaXN0LWxhYnMvY3ViZXNpZ25lci1zZGtcIjtcbmltcG9ydCB7IEpzb25GaWxlU2Vzc2lvblN0b3JhZ2UgfSBmcm9tIFwiLi9maWxlX3N0b3JhZ2VcIjtcbmltcG9ydCBwYXRoIGZyb20gXCJwYXRoXCI7XG5cbi8qKiBTZXNzaW9uIHN0b3JhZ2UgKi9cbmV4cG9ydCB7IEpzb25GaWxlU2Vzc2lvblN0b3JhZ2UgfSBmcm9tIFwiLi9maWxlX3N0b3JhZ2VcIjtcblxuLyoqXG4gKiBEaXJlY3Rvcnkgd2hlcmUgQ3ViZVNpZ25lciBzdG9yZXMgY29uZmlnIGZpbGVzLlxuICogQHJldHVybiB7c3RyaW5nfSBDb25maWcgZGlyXG4gKi9cbmZ1bmN0aW9uIGNvbmZpZ0RpcigpOiBzdHJpbmcge1xuICBjb25zdCBjb25maWdEaXIgPVxuICAgIHByb2Nlc3MucGxhdGZvcm0gPT09IFwiZGFyd2luXCJcbiAgICAgID8gYCR7cHJvY2Vzcy5lbnYuSE9NRX0vTGlicmFyeS9BcHBsaWNhdGlvbiBTdXBwb3J0YFxuICAgICAgOiBgJHtwcm9jZXNzLmVudi5IT01FfS8uY29uZmlnYDtcbiAgcmV0dXJuIHBhdGguam9pbihjb25maWdEaXIsIFwiY3ViZXNpZ25lclwiKTtcbn1cblxuLyoqIERpcmVjdG9yeSB3aGVyZSBDdWJlU2lnbmVyIHN0b3JlcyBjb25maWcgZmlsZXMuICovXG5leHBvcnQgY29uc3QgQ09ORklHX0RJUiA9IGNvbmZpZ0RpcigpO1xuXG4vKiogRGVmYXVsdCBmaWxlIHBhdGggd2hlcmUgdGhlIG1hbmFnZW1lbnQgc2Vzc2lvbiB0b2tlbiBpcyBzdG9yZWQuICovXG5leHBvcnQgY29uc3QgTUFOQUdFTUVOVF9TRVNTSU9OX1BBVEggPSBwYXRoLmpvaW4oQ09ORklHX0RJUiwgXCJtYW5hZ2VtZW50LXNlc3Npb24uanNvblwiKTtcblxuLyoqIERlZmF1bHQgZmlsZSBwYXRoIHdoZXJlIHRoZSBzaWduZXIgc2Vzc2lvbiB0b2tlbiBpcyBzdG9yZWQuICovXG5leHBvcnQgY29uc3QgU0lHTkVSX1NFU1NJT05fUEFUSCA9IHBhdGguam9pbihDT05GSUdfRElSLCBcInNpZ25lci1zZXNzaW9uLmpzb25cIik7XG5cbi8qKlxuICogQHJldHVybiB7U2lnbmVyU2Vzc2lvblN0b3JhZ2V9IFN0b3JhZ2UgcG9pbnRpbmcgdG8gdGhlIGRlZmF1bHQgbWFuYWdlbWVudCBzZXNzaW9uIGZpbGUgb24gZGlzay5cbiAqL1xuZXhwb3J0IGZ1bmN0aW9uIGRlZmF1bHRNYW5hZ2VtZW50U2Vzc2lvblN0b3JhZ2UoKTogU2lnbmVyU2Vzc2lvblN0b3JhZ2Uge1xuICByZXR1cm4gbmV3IEpzb25GaWxlU2Vzc2lvblN0b3JhZ2UoTUFOQUdFTUVOVF9TRVNTSU9OX1BBVEgpO1xufVxuXG4vKipcbiAqIEByZXR1cm4ge1Byb21pc2U8Q3ViZVNpZ25lckNsaWVudD59IEV4aXN0aW5nIG1hbmFnZW1lbnQgc2Vzc2lvbiBmcm9tIHRoZSBkZWZhdWx0IGZpbGUgb24gZGlzay5cbiAqL1xuZXhwb3J0IGFzeW5jIGZ1bmN0aW9uIGxvYWRNYW5hZ2VtZW50U2Vzc2lvbigpOiBQcm9taXNlPEN1YmVTaWduZXJDbGllbnQ+IHtcbiAgcmV0dXJuIGF3YWl0IEN1YmVTaWduZXJDbGllbnQubG9hZE1hbmFnZW1lbnRTZXNzaW9uKGRlZmF1bHRNYW5hZ2VtZW50U2Vzc2lvblN0b3JhZ2UoKSk7XG59XG5cbi8qKlxuICogQHJldHVybiB7U2lnbmVyU2Vzc2lvblN0b3JhZ2V9IFN0b3JhZ2UgcG9pbnRpbmcgdG8gdGhlIGRlZmF1bHQgc2lnbmVyIHNlc3Npb24gZmlsZSBvbiBkaXNrLlxuICovXG5leHBvcnQgZnVuY3Rpb24gZGVmYXVsdFNpZ25lclNlc3Npb25TdG9yYWdlKCk6IFNpZ25lclNlc3Npb25TdG9yYWdlIHtcbiAgcmV0dXJuIG5ldyBKc29uRmlsZVNlc3Npb25TdG9yYWdlKFNJR05FUl9TRVNTSU9OX1BBVEgpO1xufVxuXG4vKipcbiAqIEByZXR1cm4ge1Byb21pc2U8U2lnbmVyU2Vzc2lvbj59IEV4aXN0aW5nIHNpZ25lciBzZXNzaW9uIGZyb20gYSBkZWZhdWx0IGZpbGUgb24gZGlzay5cbiAqL1xuZXhwb3J0IGFzeW5jIGZ1bmN0aW9uIGxvYWRTaWduZXJTZXNzaW9uKCk6IFByb21pc2U8U2lnbmVyU2Vzc2lvbj4ge1xuICByZXR1cm4gYXdhaXQgU2lnbmVyU2Vzc2lvbi5sb2FkU2lnbmVyU2Vzc2lvbihkZWZhdWx0U2lnbmVyU2Vzc2lvblN0b3JhZ2UoKSk7XG59XG5cbi8qKiBVdGlscyBmb3IgcHJvY2Vzc2luZyBvcmcgZXZlbnRzICovXG5leHBvcnQgKiBmcm9tIFwiLi9vcmdfZXZlbnRfcHJvY2Vzc29yXCI7XG4iXX0=
@@ -0,0 +1,57 @@
1
+ import { Environment } from "@cubist-labs/cubesigner-sdk";
2
+ /** The common fields of SNS messages */
3
+ export interface SnsMessage {
4
+ Type: string;
5
+ MessageId: string;
6
+ TopicArn: string;
7
+ Message: string;
8
+ Timestamp: string;
9
+ SignatureVersion: string;
10
+ Signature: string;
11
+ SigningCertURL: string;
12
+ }
13
+ /** The format of a subscription confirmation sent by SNS */
14
+ export interface SubscriptionConfirmationMessage extends SnsMessage {
15
+ Token: string;
16
+ SubscribeURL: string;
17
+ }
18
+ /** Common fields for an org event */
19
+ export interface OrgEventBase {
20
+ org: string;
21
+ utc_timestamp: number;
22
+ org_event: string;
23
+ }
24
+ /** The format of an event message sent by SNS */
25
+ export interface OrgEventMessage extends SnsMessage {
26
+ Subject?: string;
27
+ UnsubscribeURL: string;
28
+ }
29
+ /** Options for the processor */
30
+ export interface OrgEventProcessorOptions {
31
+ env: Environment;
32
+ }
33
+ /** A utility for processing org event messages */
34
+ export declare class OrgEventProcessor {
35
+ #private;
36
+ /**
37
+ * Constructor.
38
+ * @param {string} orgId The org id
39
+ * @param {OrgEventProcessorOptions} options Additional options for the processor
40
+ */
41
+ constructor(orgId: string, options?: OrgEventProcessorOptions);
42
+ /**
43
+ * Checks an SNS message and its signature. Throws an error if the message
44
+ * invalid or the signature is invalid.
45
+ *
46
+ * @param {SnsMessage} message The SNS message to check
47
+ */
48
+ checkMessage(message: SnsMessage): Promise<void>;
49
+ /**
50
+ * Parse an org event and check its signature. Throws an error if the
51
+ * message is not a valid org event or the signature is invalid.
52
+ *
53
+ * @param {OrgEventMessage} message The org event message to check
54
+ * @return {OrgEventBase} The org event
55
+ */
56
+ parse(message: OrgEventMessage): Promise<OrgEventBase>;
57
+ }
@@ -0,0 +1,137 @@
1
+ "use strict";
2
+ var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
3
+ if (kind === "m") throw new TypeError("Private method is not writable");
4
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
5
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
6
+ return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
7
+ };
8
+ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
9
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
10
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
11
+ return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
12
+ };
13
+ var _OrgEventProcessor_instances, _OrgEventProcessor_topicArn, _OrgEventProcessor_orgId, _OrgEventProcessor_cachedCertificates, _OrgEventProcessor_fetchAndValidateCertificate;
14
+ Object.defineProperty(exports, "__esModule", { value: true });
15
+ exports.OrgEventProcessor = void 0;
16
+ const crypto_1 = require("crypto");
17
+ const cubesigner_sdk_1 = require("@cubist-labs/cubesigner-sdk");
18
+ // URLs that are safe to retrieve certificates from
19
+ const SNS_CERTIFICATE_URL_HOSTS = ["sns.us-east-1.amazonaws.com"];
20
+ const SNS_CERTIFICATE_HOST = "sns.amazonaws.com";
21
+ /** A utility for processing org event messages */
22
+ class OrgEventProcessor {
23
+ /**
24
+ * Constructor.
25
+ * @param {string} orgId The org id
26
+ * @param {OrgEventProcessorOptions} options Additional options for the processor
27
+ */
28
+ constructor(orgId, options) {
29
+ _OrgEventProcessor_instances.add(this);
30
+ _OrgEventProcessor_topicArn.set(this, void 0);
31
+ _OrgEventProcessor_orgId.set(this, void 0);
32
+ _OrgEventProcessor_cachedCertificates.set(this, void 0);
33
+ __classPrivateFieldSet(this, _OrgEventProcessor_topicArn, cubesigner_sdk_1.envs[options?.env ?? "prod"].OrgEventsTopicArn, "f");
34
+ __classPrivateFieldSet(this, _OrgEventProcessor_orgId, orgId, "f");
35
+ __classPrivateFieldSet(this, _OrgEventProcessor_cachedCertificates, new Map(), "f");
36
+ }
37
+ /**
38
+ * Checks an SNS message and its signature. Throws an error if the message
39
+ * invalid or the signature is invalid.
40
+ *
41
+ * @param {SnsMessage} message The SNS message to check
42
+ */
43
+ async checkMessage(message) {
44
+ // Check the topic ARN
45
+ if (message.TopicArn !== __classPrivateFieldGet(this, _OrgEventProcessor_topicArn, "f")) {
46
+ throw new Error(`Expected topic ARN '${__classPrivateFieldGet(this, _OrgEventProcessor_topicArn, "f")}', found '${message.TopicArn}'`);
47
+ }
48
+ // Both subscription confirmations and org event messages should have no subject
49
+ if ("Subject" in message) {
50
+ throw new Error("Expected a message without a subject");
51
+ }
52
+ // The org events topic uses signature version 2 (SHA256)
53
+ if (message.SignatureVersion !== "2") {
54
+ throw new Error("Expected signature version 2");
55
+ }
56
+ // Retrieve the certificate and sanity check it
57
+ const certificate = await __classPrivateFieldGet(this, _OrgEventProcessor_instances, "m", _OrgEventProcessor_fetchAndValidateCertificate).call(this, new URL(message.SigningCertURL));
58
+ // Extract fields specific to subscription confirmations
59
+ const subscribeUrl = message.SubscribeURL;
60
+ const token = message.Token;
61
+ // Check the signature
62
+ const fields = ["Message", message.Message, "MessageId", message.MessageId]
63
+ .concat(subscribeUrl !== undefined ? ["SubscribeURL", subscribeUrl] : [])
64
+ .concat(["Timestamp", message.Timestamp])
65
+ .concat(token !== undefined ? ["Token", token] : [])
66
+ .concat(["TopicArn", message.TopicArn, "Type", message.Type]);
67
+ const verify = (0, crypto_1.createVerify)("RSA-SHA256");
68
+ verify.update(fields.join("\n") + "\n");
69
+ const isValid = verify.verify(certificate.publicKey, message.Signature, "base64");
70
+ if (!isValid) {
71
+ throw new Error("The org event has an invalid signature");
72
+ }
73
+ }
74
+ /**
75
+ * Parse an org event and check its signature. Throws an error if the
76
+ * message is not a valid org event or the signature is invalid.
77
+ *
78
+ * @param {OrgEventMessage} message The org event message to check
79
+ * @return {OrgEventBase} The org event
80
+ */
81
+ async parse(message) {
82
+ await this.checkMessage(message);
83
+ // Check that the event is for the expected org
84
+ const orgEvent = JSON.parse(message.Message);
85
+ if (orgEvent.org !== __classPrivateFieldGet(this, _OrgEventProcessor_orgId, "f")) {
86
+ throw new Error(`Expected org to be '${__classPrivateFieldGet(this, _OrgEventProcessor_orgId, "f")}', found '${orgEvent.org}'`);
87
+ }
88
+ return orgEvent;
89
+ }
90
+ }
91
+ exports.OrgEventProcessor = OrgEventProcessor;
92
+ _OrgEventProcessor_topicArn = new WeakMap(), _OrgEventProcessor_orgId = new WeakMap(), _OrgEventProcessor_cachedCertificates = new WeakMap(), _OrgEventProcessor_instances = new WeakSet(), _OrgEventProcessor_fetchAndValidateCertificate =
93
+ /**
94
+ * Fetches a certificate from a given URL or from the certificate cache.
95
+ * Throws an error if the URL does not correspond to an SNS certificate URL.
96
+ *
97
+ * Note: Ideally, this method would verify the certificate chain, but there
98
+ * is no obvious chain. Instead, this method only fetches certificates from
99
+ * a small set of allowlisted URLs.
100
+ *
101
+ * @param {URL} url The URL of the certificate
102
+ * @return {X509Certificate} The certificate
103
+ */
104
+ async function _OrgEventProcessor_fetchAndValidateCertificate(url) {
105
+ const currTime = new Date().getTime();
106
+ const cachedCertificate = __classPrivateFieldGet(this, _OrgEventProcessor_cachedCertificates, "f").get(url);
107
+ if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {
108
+ return cachedCertificate;
109
+ }
110
+ // Only fetch certificates from HTTPS URLs
111
+ if (url.protocol !== "https:") {
112
+ throw new Error("Expected signing certificate URL to use HTTPS");
113
+ }
114
+ // Only fetch certificate URLs for SNS
115
+ if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {
116
+ throw new Error("Expected signing certificate URL for SNS in us-east-1");
117
+ }
118
+ const response = await fetch(url);
119
+ if (!response.ok) {
120
+ throw new Error(`Unable to download certificate. Status: ${response.status}`);
121
+ }
122
+ const blob = await response.blob();
123
+ const certificate = new crypto_1.X509Certificate(await blob.text());
124
+ if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {
125
+ throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);
126
+ }
127
+ // Check validity times
128
+ if (currTime < new Date(certificate.validFrom).getTime()) {
129
+ throw new Error("Certificate not valid yet");
130
+ }
131
+ if (new Date(certificate.validTo).getTime() < currTime) {
132
+ throw new Error("Certificate expired");
133
+ }
134
+ __classPrivateFieldGet(this, _OrgEventProcessor_cachedCertificates, "f").set(url, certificate);
135
+ return certificate;
136
+ };
137
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"org_event_processor.js","sourceRoot":"","sources":["../src/org_event_processor.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAAuD;AACvD,gEAAgE;AAEhE,mDAAmD;AACnD,MAAM,yBAAyB,GAAG,CAAC,6BAA6B,CAAC,CAAC;AAElE,MAAM,oBAAoB,GAAG,mBAAmB,CAAC;AAsCjD,kDAAkD;AAClD,MAAa,iBAAiB;IAK5B;;;;OAIG;IACH,YAAY,KAAa,EAAE,OAAkC;;QATpD,8CAAkB;QAClB,2CAAe;QACxB,wDAA+C;QAQ7C,uBAAA,IAAI,+BAAa,qBAAI,CAAC,OAAO,EAAE,GAAG,IAAI,MAAM,CAAC,CAAC,iBAAiB,MAAA,CAAC;QAChE,uBAAA,IAAI,4BAAU,KAAK,MAAA,CAAC;QACpB,uBAAA,IAAI,yCAAuB,IAAI,GAAG,EAAE,MAAA,CAAC;IACvC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,YAAY,CAAC,OAAmB;QACpC,sBAAsB;QACtB,IAAI,OAAO,CAAC,QAAQ,KAAK,uBAAA,IAAI,mCAAU,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CAAC,uBAAuB,uBAAA,IAAI,mCAAU,aAAa,OAAO,CAAC,QAAQ,GAAG,CAAC,CAAC;QACzF,CAAC;QAED,gFAAgF;QAChF,IAAI,SAAS,IAAI,OAAO,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;QAC1D,CAAC;QAED,yDAAyD;QACzD,IAAI,OAAO,CAAC,gBAAgB,KAAK,GAAG,EAAE,CAAC;YACrC,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QAED,+CAA+C;QAC/C,MAAM,WAAW,GAAG,MAAM,uBAAA,IAAI,oFAA6B,MAAjC,IAAI,EAA8B,IAAI,GAAG,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC;QAE7F,wDAAwD;QACxD,MAAM,YAAY,GAAI,OAA2C,CAAC,YAAY,CAAC;QAC/E,MAAM,KAAK,GAAI,OAA2C,CAAC,KAAK,CAAC;QAEjE,sBAAsB;QACtB,MAAM,MAAM,GAAG,CAAC,SAAS,EAAE,OAAO,CAAC,OAAO,EAAE,WAAW,EAAE,OAAO,CAAC,SAAS,CAAC;aACxE,MAAM,CAAC,YAAY,KAAK,SAAS,CAAC,CAAC,CAAC,CAAC,cAAc,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;aACxE,MAAM,CAAC,CAAC,WAAW,EAAE,OAAO,CAAC,SAAS,CAAC,CAAC;aACxC,MAAM,CAAC,KAAK,KAAK,SAAS,CAAC,CAAC,CAAC,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;aACnD,MAAM,CAAC,CAAC,UAAU,EAAE,OAAO,CAAC,QAAQ,EAAE,MAAM,EAAE,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC;QAChE,MAAM,MAAM,GAAG,IAAA,qBAAY,EAAC,YAAY,CAAC,CAAC;QAC1C,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,IAAI,CAAC,CAAC;QACxC,MAAM,OAAO,GAAG,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,OAAO,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;QAClF,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC5D,CAAC;IACH,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,KAAK,CAAC,OAAwB;QAClC,MAAM,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAEjC,+CAA+C;QAC/C,MAAM,QAAQ,GAAiB,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;QAC3D,IAAI,QAAQ,CAAC,GAAG,KAAK,uBAAA,IAAI,gCAAO,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CAAC,uBAAuB,uBAAA,IAAI,gCAAO,aAAa,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;QAClF,CAAC;QAED,OAAO,QAAQ,CAAC;IAClB,CAAC;CAmDF;AA/HD,8CA+HC;;AAjDC;;;;;;;;;;GAUG;AACH,KAAK,yDAA8B,GAAQ;IACzC,MAAM,QAAQ,GAAG,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,CAAC;IACtC,MAAM,iBAAiB,GAAG,uBAAA,IAAI,6CAAoB,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;IAC5D,IAAI,iBAAiB,IAAI,QAAQ,GAAG,IAAI,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;QAClF,OAAO,iBAAiB,CAAC;IAC3B,CAAC;IAED,0CAA0C;IAC1C,IAAI,GAAG,CAAC,QAAQ,KAAK,QAAQ,EAAE,CAAC;QAC9B,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;IACnE,CAAC;IAED,sCAAsC;IACtC,IAAI,yBAAyB,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC;QACvD,MAAM,IAAI,KAAK,CAAC,uDAAuD,CAAC,CAAC;IAC3E,CAAC;IAED,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;IAClC,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE,CAAC;QACjB,MAAM,IAAI,KAAK,CAAC,2CAA2C,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC;IAChF,CAAC;IACD,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;IACnC,MAAM,WAAW,GAAG,IAAI,wBAAe,CAAC,MAAM,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC;IAC3D,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,oBAAoB,CAAC,EAAE,CAAC;QACjD,MAAM,IAAI,KAAK,CAAC,mCAAmC,oBAAoB,GAAG,CAAC,CAAC;IAC9E,CAAC;IAED,uBAAuB;IACvB,IAAI,QAAQ,GAAG,IAAI,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;QACzD,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;IAC/C,CAAC;IACD,IAAI,IAAI,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,GAAG,QAAQ,EAAE,CAAC;QACvD,MAAM,IAAI,KAAK,CAAC,qBAAqB,CAAC,CAAC;IACzC,CAAC;IAED,uBAAA,IAAI,6CAAoB,CAAC,GAAG,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;IAC/C,OAAO,WAAW,CAAC;AACrB,CAAC","sourcesContent":["import { X509Certificate, createVerify } from \"crypto\";\nimport { Environment, envs } from \"@cubist-labs/cubesigner-sdk\";\n\n// URLs that are safe to retrieve certificates from\nconst SNS_CERTIFICATE_URL_HOSTS = [\"sns.us-east-1.amazonaws.com\"];\n\nconst SNS_CERTIFICATE_HOST = \"sns.amazonaws.com\";\n\n/** The common fields of SNS messages */\nexport interface SnsMessage {\n  Type: string;\n  MessageId: string;\n  TopicArn: string;\n  Message: string;\n  Timestamp: string;\n  SignatureVersion: string;\n  Signature: string;\n  SigningCertURL: string;\n}\n\n/** The format of a subscription confirmation sent by SNS */\nexport interface SubscriptionConfirmationMessage extends SnsMessage {\n  Token: string;\n  SubscribeURL: string;\n}\n\n/** Common fields for an org event */\nexport interface OrgEventBase {\n  org: string;\n  utc_timestamp: number;\n  org_event: string;\n}\n\n/** The format of an event message sent by SNS */\nexport interface OrgEventMessage extends SnsMessage {\n  Subject?: string;\n  UnsubscribeURL: string;\n}\n\n/** Options for the processor */\nexport interface OrgEventProcessorOptions {\n  env: Environment;\n}\n\n/** A utility for processing org event messages */\nexport class OrgEventProcessor {\n  readonly #topicArn: string;\n  readonly #orgId: string;\n  #cachedCertificates: Map<URL, X509Certificate>;\n\n  /**\n   * Constructor.\n   * @param {string} orgId The org id\n   * @param {OrgEventProcessorOptions} options Additional options for the processor\n   */\n  constructor(orgId: string, options?: OrgEventProcessorOptions) {\n    this.#topicArn = envs[options?.env ?? \"prod\"].OrgEventsTopicArn;\n    this.#orgId = orgId;\n    this.#cachedCertificates = new Map();\n  }\n\n  /**\n   * Checks an SNS message and its signature. Throws an error if the message\n   * invalid or the signature is invalid.\n   *\n   * @param {SnsMessage} message The SNS message to check\n   */\n  async checkMessage(message: SnsMessage) {\n    // Check the topic ARN\n    if (message.TopicArn !== this.#topicArn) {\n      throw new Error(`Expected topic ARN '${this.#topicArn}', found '${message.TopicArn}'`);\n    }\n\n    // Both subscription confirmations and org event messages should have no subject\n    if (\"Subject\" in message) {\n      throw new Error(\"Expected a message without a subject\");\n    }\n\n    // The org events topic uses signature version 2 (SHA256)\n    if (message.SignatureVersion !== \"2\") {\n      throw new Error(\"Expected signature version 2\");\n    }\n\n    // Retrieve the certificate and sanity check it\n    const certificate = await this.#fetchAndValidateCertificate(new URL(message.SigningCertURL));\n\n    // Extract fields specific to subscription confirmations\n    const subscribeUrl = (message as SubscriptionConfirmationMessage).SubscribeURL;\n    const token = (message as SubscriptionConfirmationMessage).Token;\n\n    // Check the signature\n    const fields = [\"Message\", message.Message, \"MessageId\", message.MessageId]\n      .concat(subscribeUrl !== undefined ? [\"SubscribeURL\", subscribeUrl] : [])\n      .concat([\"Timestamp\", message.Timestamp])\n      .concat(token !== undefined ? [\"Token\", token] : [])\n      .concat([\"TopicArn\", message.TopicArn, \"Type\", message.Type]);\n    const verify = createVerify(\"RSA-SHA256\");\n    verify.update(fields.join(\"\\n\") + \"\\n\");\n    const isValid = verify.verify(certificate.publicKey, message.Signature, \"base64\");\n    if (!isValid) {\n      throw new Error(\"The org event has an invalid signature\");\n    }\n  }\n\n  /**\n   * Parse an org event and check its signature. Throws an error if the\n   * message is not a valid org event or the signature is invalid.\n   *\n   * @param {OrgEventMessage} message The org event message to check\n   * @return {OrgEventBase} The org event\n   */\n  async parse(message: OrgEventMessage): Promise<OrgEventBase> {\n    await this.checkMessage(message);\n\n    // Check that the event is for the expected org\n    const orgEvent: OrgEventBase = JSON.parse(message.Message);\n    if (orgEvent.org !== this.#orgId) {\n      throw new Error(`Expected org to be '${this.#orgId}', found '${orgEvent.org}'`);\n    }\n\n    return orgEvent;\n  }\n\n  /**\n   * Fetches a certificate from a given URL or from the certificate cache.\n   * Throws an error if the URL does not correspond to an SNS certificate URL.\n   *\n   * Note: Ideally, this method would verify the certificate chain, but there\n   * is no obvious chain. Instead, this method only fetches certificates from\n   * a small set of allowlisted URLs.\n   *\n   * @param {URL} url The URL of the certificate\n   * @return {X509Certificate} The certificate\n   */\n  async #fetchAndValidateCertificate(url: URL): Promise<X509Certificate> {\n    const currTime = new Date().getTime();\n    const cachedCertificate = this.#cachedCertificates.get(url);\n    if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {\n      return cachedCertificate;\n    }\n\n    // Only fetch certificates from HTTPS URLs\n    if (url.protocol !== \"https:\") {\n      throw new Error(\"Expected signing certificate URL to use HTTPS\");\n    }\n\n    // Only fetch certificate URLs for SNS\n    if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {\n      throw new Error(\"Expected signing certificate URL for SNS in us-east-1\");\n    }\n\n    const response = await fetch(url);\n    if (!response.ok) {\n      throw new Error(`Unable to download certificate. Status: ${response.status}`);\n    }\n    const blob = await response.blob();\n    const certificate = new X509Certificate(await blob.text());\n    if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {\n      throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);\n    }\n\n    // Check validity times\n    if (currTime < new Date(certificate.validFrom).getTime()) {\n      throw new Error(\"Certificate not valid yet\");\n    }\n    if (new Date(certificate.validTo).getTime() < currTime) {\n      throw new Error(\"Certificate expired\");\n    }\n\n    this.#cachedCertificates.set(url, certificate);\n    return certificate;\n  }\n}\n"]}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@cubist-labs/cubesigner-sdk-fs-storage",
3
- "version": "0.3.23",
3
+ "version": "0.3.25",
4
4
  "description": "Filesystem storage implementation for CubeSigner SDK",
5
5
  "license": "MIT OR Apache-2.0",
6
6
  "author": "Cubist, Inc.",
@@ -20,7 +20,7 @@
20
20
  "test": "jest --maxWorkers=1"
21
21
  },
22
22
  "peerDependencies": {
23
- "@cubist-labs/cubesigner-sdk": "^0.3.23"
23
+ "@cubist-labs/cubesigner-sdk": "^0.3.25"
24
24
  },
25
25
  "directories": {
26
26
  "test": "test"
package/src/index.ts CHANGED
@@ -53,3 +53,6 @@ export function defaultSignerSessionStorage(): SignerSessionStorage {
53
53
  export async function loadSignerSession(): Promise<SignerSession> {
54
54
  return await SignerSession.loadSignerSession(defaultSignerSessionStorage());
55
55
  }
56
+
57
+ /** Utils for processing org events */
58
+ export * from "./org_event_processor";
@@ -0,0 +1,173 @@
1
+ import { X509Certificate, createVerify } from "crypto";
2
+ import { Environment, envs } from "@cubist-labs/cubesigner-sdk";
3
+
4
+ // URLs that are safe to retrieve certificates from
5
+ const SNS_CERTIFICATE_URL_HOSTS = ["sns.us-east-1.amazonaws.com"];
6
+
7
+ const SNS_CERTIFICATE_HOST = "sns.amazonaws.com";
8
+
9
+ /** The common fields of SNS messages */
10
+ export interface SnsMessage {
11
+ Type: string;
12
+ MessageId: string;
13
+ TopicArn: string;
14
+ Message: string;
15
+ Timestamp: string;
16
+ SignatureVersion: string;
17
+ Signature: string;
18
+ SigningCertURL: string;
19
+ }
20
+
21
+ /** The format of a subscription confirmation sent by SNS */
22
+ export interface SubscriptionConfirmationMessage extends SnsMessage {
23
+ Token: string;
24
+ SubscribeURL: string;
25
+ }
26
+
27
+ /** Common fields for an org event */
28
+ export interface OrgEventBase {
29
+ org: string;
30
+ utc_timestamp: number;
31
+ org_event: string;
32
+ }
33
+
34
+ /** The format of an event message sent by SNS */
35
+ export interface OrgEventMessage extends SnsMessage {
36
+ Subject?: string;
37
+ UnsubscribeURL: string;
38
+ }
39
+
40
+ /** Options for the processor */
41
+ export interface OrgEventProcessorOptions {
42
+ env: Environment;
43
+ }
44
+
45
+ /** A utility for processing org event messages */
46
+ export class OrgEventProcessor {
47
+ readonly #topicArn: string;
48
+ readonly #orgId: string;
49
+ #cachedCertificates: Map<URL, X509Certificate>;
50
+
51
+ /**
52
+ * Constructor.
53
+ * @param {string} orgId The org id
54
+ * @param {OrgEventProcessorOptions} options Additional options for the processor
55
+ */
56
+ constructor(orgId: string, options?: OrgEventProcessorOptions) {
57
+ this.#topicArn = envs[options?.env ?? "prod"].OrgEventsTopicArn;
58
+ this.#orgId = orgId;
59
+ this.#cachedCertificates = new Map();
60
+ }
61
+
62
+ /**
63
+ * Checks an SNS message and its signature. Throws an error if the message
64
+ * invalid or the signature is invalid.
65
+ *
66
+ * @param {SnsMessage} message The SNS message to check
67
+ */
68
+ async checkMessage(message: SnsMessage) {
69
+ // Check the topic ARN
70
+ if (message.TopicArn !== this.#topicArn) {
71
+ throw new Error(`Expected topic ARN '${this.#topicArn}', found '${message.TopicArn}'`);
72
+ }
73
+
74
+ // Both subscription confirmations and org event messages should have no subject
75
+ if ("Subject" in message) {
76
+ throw new Error("Expected a message without a subject");
77
+ }
78
+
79
+ // The org events topic uses signature version 2 (SHA256)
80
+ if (message.SignatureVersion !== "2") {
81
+ throw new Error("Expected signature version 2");
82
+ }
83
+
84
+ // Retrieve the certificate and sanity check it
85
+ const certificate = await this.#fetchAndValidateCertificate(new URL(message.SigningCertURL));
86
+
87
+ // Extract fields specific to subscription confirmations
88
+ const subscribeUrl = (message as SubscriptionConfirmationMessage).SubscribeURL;
89
+ const token = (message as SubscriptionConfirmationMessage).Token;
90
+
91
+ // Check the signature
92
+ const fields = ["Message", message.Message, "MessageId", message.MessageId]
93
+ .concat(subscribeUrl !== undefined ? ["SubscribeURL", subscribeUrl] : [])
94
+ .concat(["Timestamp", message.Timestamp])
95
+ .concat(token !== undefined ? ["Token", token] : [])
96
+ .concat(["TopicArn", message.TopicArn, "Type", message.Type]);
97
+ const verify = createVerify("RSA-SHA256");
98
+ verify.update(fields.join("\n") + "\n");
99
+ const isValid = verify.verify(certificate.publicKey, message.Signature, "base64");
100
+ if (!isValid) {
101
+ throw new Error("The org event has an invalid signature");
102
+ }
103
+ }
104
+
105
+ /**
106
+ * Parse an org event and check its signature. Throws an error if the
107
+ * message is not a valid org event or the signature is invalid.
108
+ *
109
+ * @param {OrgEventMessage} message The org event message to check
110
+ * @return {OrgEventBase} The org event
111
+ */
112
+ async parse(message: OrgEventMessage): Promise<OrgEventBase> {
113
+ await this.checkMessage(message);
114
+
115
+ // Check that the event is for the expected org
116
+ const orgEvent: OrgEventBase = JSON.parse(message.Message);
117
+ if (orgEvent.org !== this.#orgId) {
118
+ throw new Error(`Expected org to be '${this.#orgId}', found '${orgEvent.org}'`);
119
+ }
120
+
121
+ return orgEvent;
122
+ }
123
+
124
+ /**
125
+ * Fetches a certificate from a given URL or from the certificate cache.
126
+ * Throws an error if the URL does not correspond to an SNS certificate URL.
127
+ *
128
+ * Note: Ideally, this method would verify the certificate chain, but there
129
+ * is no obvious chain. Instead, this method only fetches certificates from
130
+ * a small set of allowlisted URLs.
131
+ *
132
+ * @param {URL} url The URL of the certificate
133
+ * @return {X509Certificate} The certificate
134
+ */
135
+ async #fetchAndValidateCertificate(url: URL): Promise<X509Certificate> {
136
+ const currTime = new Date().getTime();
137
+ const cachedCertificate = this.#cachedCertificates.get(url);
138
+ if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {
139
+ return cachedCertificate;
140
+ }
141
+
142
+ // Only fetch certificates from HTTPS URLs
143
+ if (url.protocol !== "https:") {
144
+ throw new Error("Expected signing certificate URL to use HTTPS");
145
+ }
146
+
147
+ // Only fetch certificate URLs for SNS
148
+ if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {
149
+ throw new Error("Expected signing certificate URL for SNS in us-east-1");
150
+ }
151
+
152
+ const response = await fetch(url);
153
+ if (!response.ok) {
154
+ throw new Error(`Unable to download certificate. Status: ${response.status}`);
155
+ }
156
+ const blob = await response.blob();
157
+ const certificate = new X509Certificate(await blob.text());
158
+ if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {
159
+ throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);
160
+ }
161
+
162
+ // Check validity times
163
+ if (currTime < new Date(certificate.validFrom).getTime()) {
164
+ throw new Error("Certificate not valid yet");
165
+ }
166
+ if (new Date(certificate.validTo).getTime() < currTime) {
167
+ throw new Error("Certificate expired");
168
+ }
169
+
170
+ this.#cachedCertificates.set(url, certificate);
171
+ return certificate;
172
+ }
173
+ }