@cubist-labs/cubesigner-sdk 0.1.23 → 0.1.50
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +47 -26
- package/dist/src/ethers/index.d.ts +25 -5
- package/dist/src/ethers/index.js +53 -16
- package/dist/src/index.d.ts +50 -33
- package/dist/src/index.js +79 -39
- package/dist/src/key.d.ts +58 -8
- package/dist/src/key.js +77 -14
- package/dist/src/org.d.ts +71 -6
- package/dist/src/org.js +90 -8
- package/dist/src/role.d.ts +19 -7
- package/dist/src/role.js +5 -3
- package/dist/src/schema.d.ts +1273 -91
- package/dist/src/schema.js +1 -1
- package/dist/src/session/cognito_manager.d.ts +59 -0
- package/dist/src/session/cognito_manager.js +111 -0
- package/dist/src/session/session_manager.d.ts +15 -0
- package/dist/src/session/session_manager.js +20 -1
- package/dist/src/session/signer_session_manager.d.ts +22 -12
- package/dist/src/session/signer_session_manager.js +42 -19
- package/dist/src/signer_session.d.ts +41 -29
- package/dist/src/signer_session.js +84 -69
- package/package.json +4 -1
- package/src/ethers/index.ts +83 -16
- package/src/index.ts +112 -64
- package/src/key.ts +103 -16
- package/src/org.ts +126 -10
- package/src/role.ts +21 -8
- package/src/schema.ts +1356 -168
- package/src/session/{management_session_manager.ts → cognito_manager.ts} +13 -15
- package/src/session/session_manager.ts +24 -0
- package/src/session/signer_session_manager.ts +52 -26
- package/src/signer_session.ts +90 -81
- package/src/session/oidc_session_manager.ts +0 -193
package/README.md
CHANGED
|
@@ -1,10 +1,23 @@
|
|
|
1
1
|
# CubeSigner TypeScript SDK
|
|
2
2
|
|
|
3
|
-
CubeSigner is a hardware-backed, non-custodial
|
|
4
|
-
|
|
3
|
+
CubeSigner is a hardware-backed, non-custodial platform for securely
|
|
4
|
+
managing cryptographic keys. This repository is the TypeScript SDK for
|
|
5
|
+
programmatically interacting with CubeSigner services.
|
|
5
6
|
|
|
6
|
-
|
|
7
|
-
|
|
7
|
+
## CubeSigner background
|
|
8
|
+
|
|
9
|
+
[The Cubist team](https://cubist.dev/about) built CubeSigner to address the key
|
|
10
|
+
security vs key availability tradeoff: right now, many teams are forced to keep
|
|
11
|
+
keys available in memory and therefore exposed to attackers, or try to keep
|
|
12
|
+
keys safe—usually only at rest—at serious latency and engineering cost.
|
|
13
|
+
CubeSigner addresses this problem by giving developers low-latency access to
|
|
14
|
+
hardware-backed key generation and signing. During each of these operations,
|
|
15
|
+
CubeSigner safeguards their users' keys in HSM-sealed Nitro Enclaves—combining
|
|
16
|
+
cold wallet security with hot wallet speed and simplicity.
|
|
17
|
+
|
|
18
|
+
Right now, the CubeSigner SDK supports signing for EVM chains like Ethereum
|
|
19
|
+
and Avalanche, and non-EVM chains Bitcoin and Solana. Support for more chains
|
|
20
|
+
is in the works!
|
|
8
21
|
|
|
9
22
|
## Installing the SDK
|
|
10
23
|
|
|
@@ -58,11 +71,11 @@ session manager:
|
|
|
58
71
|
|
|
59
72
|
```typescript
|
|
60
73
|
// Load session from a JSON file
|
|
61
|
-
const fileStorage = new cs.JsonFileSessionStorage<cs.
|
|
74
|
+
const fileStorage = new cs.JsonFileSessionStorage<cs.CognitoSessionInfo>(
|
|
62
75
|
`${process.env.HOME}/.config/cubesigner/management-session.json`,
|
|
63
76
|
);
|
|
64
77
|
// Create a session manager for a management token
|
|
65
|
-
const sessionMgr = await cs.
|
|
78
|
+
const sessionMgr = await cs.CognitoSessionManager.loadFromStorage(fileStorage);
|
|
66
79
|
new cs.CubeSigner({
|
|
67
80
|
sessionMgr,
|
|
68
81
|
});
|
|
@@ -100,7 +113,7 @@ transaction. For that, we need a key of type `Secp256k1.Evm`.
|
|
|
100
113
|
const secpKey = await org.createKey(cs.Secp256k1.Evm);
|
|
101
114
|
assert((await secpKey.owner()) == me.user_id);
|
|
102
115
|
assert(await secpKey.enabled());
|
|
103
|
-
console.log(`Created '${secpKey.type}' key ${secpKey.id}`);
|
|
116
|
+
console.log(`Created '${await secpKey.type()}' key ${secpKey.id}`);
|
|
104
117
|
```
|
|
105
118
|
|
|
106
119
|
### Create a `Role` and a `SignerSession`
|
|
@@ -188,7 +201,7 @@ assert(sig.data().rlp_signed_tx);
|
|
|
188
201
|
```typescript
|
|
189
202
|
const { ethers } = require("ethers");
|
|
190
203
|
// Create new Signer
|
|
191
|
-
const ethersSigner = new cs.ethers.Signer(secpKey.materialId, session
|
|
204
|
+
const ethersSigner = new cs.ethers.Signer(secpKey.materialId, session);
|
|
192
205
|
assert((await ethersSigner.getAddress()) === secpKey.materialId);
|
|
193
206
|
// sign transaction as usual:
|
|
194
207
|
console.log(
|
|
@@ -251,22 +264,30 @@ disabled for `BLS` keys, and for other key types it can be enabled by
|
|
|
251
264
|
attaching an `"AllowRawBlobSigning"` policy:
|
|
252
265
|
|
|
253
266
|
```typescript
|
|
254
|
-
|
|
255
|
-
const
|
|
256
|
-
|
|
257
|
-
};
|
|
258
|
-
|
|
259
|
-
|
|
260
|
-
|
|
261
|
-
|
|
262
|
-
|
|
267
|
+
// Create a new Ed25519 key (e.g., for Cardano) and add it to our session role
|
|
268
|
+
const edKey = await org.createKey(cs.Ed25519.Cardano);
|
|
269
|
+
await role.addKey(edKey);
|
|
270
|
+
console.log(`Created '${await edKey.type()}' key ${edKey.id} and added it to role ${role.id}`);
|
|
271
|
+
|
|
272
|
+
// Sign raw blobs with our new ed key and the secp we created before
|
|
273
|
+
for (const key of [edKey, secpKey]) {
|
|
274
|
+
console.log(`Confirming that raw blob with ${await key.type()} is rejected by default`);
|
|
275
|
+
const blobReq = <cs.BlobSignRequest>{
|
|
276
|
+
message_base64: "L1kE9g59xD3fzYQQSR7340BwU9fGrP6EMfIFcyX/YBc=",
|
|
277
|
+
};
|
|
278
|
+
try {
|
|
279
|
+
await session.signBlob(key, blobReq);
|
|
280
|
+
assert(false, "Must be rejected by policy");
|
|
281
|
+
} catch (e) {
|
|
282
|
+
assert(`${e}`.includes("Raw blob signing not allowed"));
|
|
283
|
+
}
|
|
284
|
+
|
|
285
|
+
console.log("Signing raw blob after adding 'AllowRawBlobSigning' policy");
|
|
286
|
+
await key.appendPolicy(["AllowRawBlobSigning"]);
|
|
287
|
+
const blobSig = await session.signBlob(key, blobReq);
|
|
288
|
+
console.log(blobSig.data());
|
|
289
|
+
assert(blobSig.data().signature);
|
|
263
290
|
}
|
|
264
|
-
|
|
265
|
-
console.log("Signing raw blob after adding 'AllowRawBlobSigning' policy");
|
|
266
|
-
await secpKey.appendPolicy(["AllowRawBlobSigning"]);
|
|
267
|
-
const blobSig = await session.signBlob(secpKey, blobReq);
|
|
268
|
-
console.log(blobSig.data());
|
|
269
|
-
assert(blobSig.data().signature);
|
|
270
291
|
```
|
|
271
292
|
|
|
272
293
|
> **Warning**
|
|
@@ -335,7 +356,7 @@ of `SignerSession`, required by all signing endpoints, e.g.,
|
|
|
335
356
|
`signEvm`)
|
|
336
357
|
|
|
337
358
|
```typescript
|
|
338
|
-
const oidcSession = await cubesigner.
|
|
359
|
+
const oidcSession = new cs.SignerSession(await cubesigner.oidcAuth(oidcToken, org.id, ["sign:*"]));
|
|
339
360
|
```
|
|
340
361
|
|
|
341
362
|
or a _management_ session (i.e., and instance of `CubeSigner`,
|
|
@@ -344,7 +365,7 @@ information, configuring user MFA methods, etc.).
|
|
|
344
365
|
|
|
345
366
|
```typescript
|
|
346
367
|
const oidcCubeSigner = new cs.CubeSigner({
|
|
347
|
-
sessionMgr: await cubesigner.
|
|
368
|
+
sessionMgr: await cubesigner.oidcAuth(oidcToken, org.id, ["manage:*"]),
|
|
348
369
|
});
|
|
349
370
|
```
|
|
350
371
|
|
|
@@ -392,7 +413,7 @@ as one of the configured MFA factors.
|
|
|
392
413
|
```typescript
|
|
393
414
|
const mfa = (await oidcCubeSigner.aboutMe()).mfa;
|
|
394
415
|
console.log("Configured MFA types", mfa);
|
|
395
|
-
assert(mfa.includes("
|
|
416
|
+
assert(mfa.map((m) => m.type).includes("totp"));
|
|
396
417
|
```
|
|
397
418
|
|
|
398
419
|
### Configure MFA policy for signing
|
|
@@ -1,16 +1,35 @@
|
|
|
1
1
|
import { TypedDataDomain, TypedDataField, ethers } from "ethers";
|
|
2
|
-
import { SignerSession } from "../signer_session";
|
|
2
|
+
import { MfaRequestInfo, SignerSession } from "../signer_session";
|
|
3
|
+
import { KeyInfo } from "../key";
|
|
4
|
+
import { CubeSigner } from "..";
|
|
5
|
+
/** Options for the signer */
|
|
6
|
+
interface SignerOptions {
|
|
7
|
+
/** Optional provider to use */
|
|
8
|
+
provider?: null | ethers.Provider;
|
|
9
|
+
/**
|
|
10
|
+
* The function to call when MFA information is retrieved. If this callback
|
|
11
|
+
* throws, no transaction is broadcast.
|
|
12
|
+
*/
|
|
13
|
+
onMfaPoll?: (arg0: MfaRequestInfo) => void;
|
|
14
|
+
/**
|
|
15
|
+
* The amount of time (in milliseconds) to wait between checks for MFA
|
|
16
|
+
* updates. Default is 1000ms
|
|
17
|
+
*/
|
|
18
|
+
mfaPollIntervalMs?: number;
|
|
19
|
+
/** Optional management session. Used to check for MFA updates */
|
|
20
|
+
managementSession?: CubeSigner;
|
|
21
|
+
}
|
|
3
22
|
/**
|
|
4
23
|
* A ethers.js Signer using CubeSigner
|
|
5
24
|
*/
|
|
6
25
|
export declare class Signer extends ethers.AbstractSigner {
|
|
7
26
|
#private;
|
|
8
27
|
/** Create new Signer instance
|
|
9
|
-
* @param {string} address The address of the account to use.
|
|
28
|
+
* @param {KeyInfo | string} address The key or the eth address of the account to use.
|
|
10
29
|
* @param {SignerSession} signerSession The underlying Signer session.
|
|
11
|
-
* @param {
|
|
30
|
+
* @param {SignerOptions} options The options to use for the Signer instance
|
|
12
31
|
*/
|
|
13
|
-
constructor(address: string, signerSession: SignerSession,
|
|
32
|
+
constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions);
|
|
14
33
|
/** Resolves to the signer address. */
|
|
15
34
|
getAddress(): Promise<string>;
|
|
16
35
|
/**
|
|
@@ -20,7 +39,7 @@ export declare class Signer extends ethers.AbstractSigner {
|
|
|
20
39
|
*/
|
|
21
40
|
connect(provider: null | ethers.Provider): Signer;
|
|
22
41
|
/**
|
|
23
|
-
* Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.
|
|
42
|
+
* Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.
|
|
24
43
|
* @param {ethers.TransactionRequest} tx The transaction to sign.
|
|
25
44
|
* @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
|
|
26
45
|
*/
|
|
@@ -48,3 +67,4 @@ export declare class Signer extends ethers.AbstractSigner {
|
|
|
48
67
|
*/
|
|
49
68
|
private signBlob;
|
|
50
69
|
}
|
|
70
|
+
export {};
|
package/dist/src/ethers/index.js
CHANGED
|
@@ -10,7 +10,7 @@ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (
|
|
|
10
10
|
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
11
11
|
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
12
12
|
};
|
|
13
|
-
var _Signer_address, _Signer_key, _Signer_signerSession;
|
|
13
|
+
var _Signer_instances, _Signer_address, _Signer_key, _Signer_signerSession, _Signer_onMfaPoll, _Signer_mfaPollIntervalMs, _Signer_managementSession, _Signer_handleMfa;
|
|
14
14
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
15
|
exports.Signer = void 0;
|
|
16
16
|
const ethers_1 = require("ethers");
|
|
@@ -19,20 +19,39 @@ const ethers_1 = require("ethers");
|
|
|
19
19
|
*/
|
|
20
20
|
class Signer extends ethers_1.ethers.AbstractSigner {
|
|
21
21
|
/** Create new Signer instance
|
|
22
|
-
* @param {string} address The address of the account to use.
|
|
22
|
+
* @param {KeyInfo | string} address The key or the eth address of the account to use.
|
|
23
23
|
* @param {SignerSession} signerSession The underlying Signer session.
|
|
24
|
-
* @param {
|
|
24
|
+
* @param {SignerOptions} options The options to use for the Signer instance
|
|
25
25
|
*/
|
|
26
|
-
constructor(address, signerSession,
|
|
27
|
-
super(provider);
|
|
26
|
+
constructor(address, signerSession, options) {
|
|
27
|
+
super(options?.provider);
|
|
28
|
+
_Signer_instances.add(this);
|
|
28
29
|
/** The address of the account */
|
|
29
30
|
_Signer_address.set(this, void 0);
|
|
30
31
|
/** The key to use for signing */
|
|
31
32
|
_Signer_key.set(this, void 0);
|
|
32
33
|
/** The underlying session */
|
|
33
34
|
_Signer_signerSession.set(this, void 0);
|
|
34
|
-
|
|
35
|
+
/**
|
|
36
|
+
* The function to call when MFA information is retrieved. If this callback
|
|
37
|
+
* throws, no transaction is broadcast.
|
|
38
|
+
*/
|
|
39
|
+
_Signer_onMfaPoll.set(this, void 0);
|
|
40
|
+
/** The amount of time to wait between checks for MFA updates */
|
|
41
|
+
_Signer_mfaPollIntervalMs.set(this, void 0);
|
|
42
|
+
/** Optional management session, used for MFA flows */
|
|
43
|
+
_Signer_managementSession.set(this, void 0);
|
|
44
|
+
if (typeof address === "string") {
|
|
45
|
+
__classPrivateFieldSet(this, _Signer_address, address, "f");
|
|
46
|
+
}
|
|
47
|
+
else {
|
|
48
|
+
__classPrivateFieldSet(this, _Signer_address, address.materialId, "f");
|
|
49
|
+
__classPrivateFieldSet(this, _Signer_key, address, "f");
|
|
50
|
+
}
|
|
35
51
|
__classPrivateFieldSet(this, _Signer_signerSession, signerSession, "f");
|
|
52
|
+
__classPrivateFieldSet(this, _Signer_onMfaPoll, options?.onMfaPoll ?? (( /* _mfaInfo: MfaRequestInfo */) => { }), "f"); // eslint-disable-line @typescript-eslint/no-empty-function
|
|
53
|
+
__classPrivateFieldSet(this, _Signer_mfaPollIntervalMs, options?.mfaPollIntervalMs ?? 1000, "f");
|
|
54
|
+
__classPrivateFieldSet(this, _Signer_managementSession, options?.managementSession, "f");
|
|
36
55
|
}
|
|
37
56
|
/** Resolves to the signer address. */
|
|
38
57
|
async getAddress() {
|
|
@@ -44,10 +63,10 @@ class Signer extends ethers_1.ethers.AbstractSigner {
|
|
|
44
63
|
* @return {Signer} The signer connected to signer.
|
|
45
64
|
*/
|
|
46
65
|
connect(provider) {
|
|
47
|
-
return new Signer(__classPrivateFieldGet(this, _Signer_address, "f"), __classPrivateFieldGet(this, _Signer_signerSession, "f"), provider);
|
|
66
|
+
return new Signer(__classPrivateFieldGet(this, _Signer_address, "f"), __classPrivateFieldGet(this, _Signer_signerSession, "f"), { provider });
|
|
48
67
|
}
|
|
49
68
|
/**
|
|
50
|
-
* Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.
|
|
69
|
+
* Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.
|
|
51
70
|
* @param {ethers.TransactionRequest} tx The transaction to sign.
|
|
52
71
|
* @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
|
|
53
72
|
*/
|
|
@@ -70,8 +89,9 @@ class Signer extends ethers_1.ethers.AbstractSigner {
|
|
|
70
89
|
chain_id: Number(chainId),
|
|
71
90
|
tx: rpcTx,
|
|
72
91
|
};
|
|
73
|
-
const
|
|
74
|
-
|
|
92
|
+
const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEvm(__classPrivateFieldGet(this, _Signer_address, "f"), req);
|
|
93
|
+
const data = await __classPrivateFieldGet(this, _Signer_instances, "m", _Signer_handleMfa).call(this, res);
|
|
94
|
+
return data.rlp_signed_tx;
|
|
75
95
|
}
|
|
76
96
|
/** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)
|
|
77
97
|
* to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.
|
|
@@ -106,17 +126,34 @@ class Signer extends ethers_1.ethers.AbstractSigner {
|
|
|
106
126
|
};
|
|
107
127
|
// Get the key corresponding to this address
|
|
108
128
|
if (__classPrivateFieldGet(this, _Signer_key, "f") === undefined) {
|
|
109
|
-
const key = (await __classPrivateFieldGet(this, _Signer_signerSession, "f").keys()).find((k) => k.
|
|
129
|
+
const key = (await __classPrivateFieldGet(this, _Signer_signerSession, "f").keys()).find((k) => k.material_id === __classPrivateFieldGet(this, _Signer_address, "f"));
|
|
110
130
|
if (key === undefined) {
|
|
111
131
|
throw new Error(`Cannot access key '${__classPrivateFieldGet(this, _Signer_address, "f")}'`);
|
|
112
132
|
}
|
|
113
133
|
__classPrivateFieldSet(this, _Signer_key, key, "f");
|
|
114
134
|
}
|
|
115
|
-
|
|
116
|
-
const
|
|
117
|
-
return
|
|
135
|
+
const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signBlob(__classPrivateFieldGet(this, _Signer_key, "f").key_id, blobReq);
|
|
136
|
+
const data = await __classPrivateFieldGet(this, _Signer_instances, "m", _Signer_handleMfa).call(this, res);
|
|
137
|
+
return data.signature;
|
|
118
138
|
}
|
|
119
139
|
}
|
|
120
140
|
exports.Signer = Signer;
|
|
121
|
-
_Signer_address = new WeakMap(), _Signer_key = new WeakMap(), _Signer_signerSession = new WeakMap()
|
|
122
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/ethers/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAQgB;AAIhB;;GAEG;AACH,MAAa,MAAO,SAAQ,eAAM,CAAC,cAAc;IAU/C;;;;OAIG;IACH,YAAY,OAAe,EAAE,aAA4B,EAAE,QAAiC;QAC1F,KAAK,CAAC,QAAQ,CAAC,CAAC;QAflB,iCAAiC;QACxB,kCAAiB;QAE1B,iCAAiC;QACjC,8BAAW;QAEX,6BAA6B;QACpB,wCAA8B;QASrC,uBAAA,IAAI,mBAAY,OAAO,MAAA,CAAC;QACxB,uBAAA,IAAI,yBAAkB,aAAa,MAAA,CAAC;IACtC,CAAC;IAED,sCAAsC;IACtC,KAAK,CAAC,UAAU;QACd,OAAO,uBAAA,IAAI,uBAAS,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACH,OAAO,CAAC,QAAgC;QACtC,OAAO,IAAI,MAAM,CAAC,uBAAA,IAAI,uBAAS,EAAE,uBAAA,IAAI,6BAAe,EAAE,QAAQ,CAAC,CAAC;IAClE,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe,CAAC,EAA6B;QACjD,0CAA0C;QAC1C,IAAI,OAAO,GAAG,EAAE,CAAC,OAAO,CAAC;QACzB,IAAI,OAAO,KAAK,SAAS,EAAE;YACzB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,UAAU,EAAE,CAAC;YAClD,OAAO,GAAG,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,GAAG,CAAC;SAC/C;QAED,sDAAsD;QACtD,MAAM,KAAK,GACT,IAAI,CAAC,QAAQ,YAAY,2BAAkB;YACzC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACrC,CAAC,CAAC,gDAAgD;gBAChD,iDAAiD;gBACjD,0CAA0C;gBAC1C,2BAAkB,CAAC,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACpE,KAAK,CAAC,IAAI,GAAG,IAAA,gBAAO,EAAC,EAAE,CAAC,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,qBAAqB;QAE/D,MAAM,GAAG,GAAmB;YAC1B,QAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;YACzB,EAAE,EAAE,KAAK;SACV,CAAC;QACF,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,OAAO,GAAG,CAAC,IAAI,EAAE,CAAC,aAAa,CAAC;IAClC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,WAAW,CAAC,OAA4B;QAC5C,MAAM,MAAM,GAAG,eAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAC3C,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,aAAa,CACjB,MAAuB,EACvB,KAA4C,EAC5C,KAA0B;QAE1B,MAAM,MAAM,GAAG,yBAAgB,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC;QAC3D,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,QAAQ,CAAC,MAAc;QACnC,MAAM,OAAO,GAAoB;YAC/B,cAAc,EAAE,MAAM,CAAC,IAAI,CAAC,IAAA,iBAAQ,EAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;SACjE,CAAC;QACF,4CAA4C;QAC5C,IAAI,uBAAA,IAAI,mBAAK,KAAK,SAAS,EAAE;YAC3B,MAAM,GAAG,GAAG,CAAC,MAAM,uBAAA,IAAI,6BAAe,CAAC,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,UAAU,KAAK,uBAAA,IAAI,uBAAS,CAAC,CAAC;YAC3F,IAAI,GAAG,KAAK,SAAS,EAAE;gBACrB,MAAM,IAAI,KAAK,CAAC,sBAAsB,uBAAA,IAAI,uBAAS,GAAG,CAAC,CAAC;aACzD;YACD,uBAAA,IAAI,eAAQ,GAAG,MAAA,CAAC;SACjB;QACD,OAAO;QACP,MAAM,MAAM,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,QAAQ,CAAC,uBAAA,IAAI,mBAAK,EAAE,OAAO,CAAC,CAAC;QACtE,OAAO,MAAM,CAAC,IAAI,EAAE,CAAC,SAAS,CAAC;IACjC,CAAC;CACF;AAnHD,wBAmHC","sourcesContent":["import {\n  JsonRpcApiProvider,\n  TypedDataDomain,\n  TypedDataEncoder,\n  TypedDataField,\n  ethers,\n  getBytes,\n  toBeHex,\n} from \"ethers\";\nimport { BlobSignRequest, EvmSignRequest, SignerSession } from \"../signer_session\";\nimport { Key } from \"../key\";\n\n/**\n * A ethers.js Signer using CubeSigner\n */\nexport class Signer extends ethers.AbstractSigner {\n  /** The address of the account */\n  readonly #address: string;\n\n  /** The key to use for signing */\n  #key?: Key;\n\n  /** The underlying session */\n  readonly #signerSession: SignerSession;\n\n  /** Create new Signer instance\n   * @param {string} address The address of the account to use.\n   * @param {SignerSession} signerSession The underlying Signer session.\n   * @param {null | ethers.Provider} provider The optional provider instance to use.\n   */\n  constructor(address: string, signerSession: SignerSession, provider?: null | ethers.Provider) {\n    super(provider);\n    this.#address = address;\n    this.#signerSession = signerSession;\n  }\n\n  /** Resolves to the signer address. */\n  async getAddress(): Promise<string> {\n    return this.#address;\n  }\n\n  /**\n   *  Returns the signer connected to %%provider%%.\n   *  @param {null | ethers.Provider} provider The optional provider instance to use.\n   *  @return {Signer} The signer connected to signer.\n   */\n  connect(provider: null | ethers.Provider): Signer {\n    return new Signer(this.#address, this.#signerSession, provider);\n  }\n\n  /**\n   * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.\n   * @param {ethers.TransactionRequest} tx The transaction to sign.\n   * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.\n   */\n  async signTransaction(tx: ethers.TransactionRequest): Promise<string> {\n    // get the chain id from the network or tx\n    let chainId = tx.chainId;\n    if (chainId === undefined) {\n      const network = await this.provider?.getNetwork();\n      chainId = network?.chainId?.toString() ?? \"1\";\n    }\n\n    // Convert the transaction into a JSON-RPC transaction\n    const rpcTx =\n      this.provider instanceof JsonRpcApiProvider\n        ? this.provider.getRpcTransaction(tx)\n        : // We can just call the getRpcTransaction with a\n          // null receiver since it doesn't actually use it\n          // (and really should be declared static).\n          JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);\n    rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]\n\n    const req = <EvmSignRequest>{\n      chain_id: Number(chainId),\n      tx: rpcTx,\n    };\n    const sig = await this.#signerSession.signEvm(this.#address, req);\n    return sig.data().rlp_signed_tx;\n  }\n\n  /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)\n   * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {string | Uint8Array} message The message to sign.\n   * @return {Promise<string>} The signature.\n   */\n  async signMessage(message: string | Uint8Array): Promise<string> {\n    const digest = ethers.hashMessage(message);\n    return this.signBlob(digest);\n  }\n\n  /** Signs EIP-712 typed data. This uses ethers.js's\n   * [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)\n   * to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {TypedDataDomain} domain The domain of the typed data.\n   * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.\n   * @param {Record<string, any>} value The value of the typed data.\n   * @return {Promise<string>} The signature.\n   */\n  async signTypedData(\n    domain: TypedDataDomain,\n    types: Record<string, Array<TypedDataField>>,\n    value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any\n  ): Promise<string> {\n    const digest = TypedDataEncoder.hash(domain, types, value);\n    return this.signBlob(digest);\n  }\n\n  /** Sign arbitrary digest. This uses {@link Key#signBlob}.\n   * @param {string} digest The digest to sign.\n   * @return {Promise<string>} The signature.\n   */\n  private async signBlob(digest: string): Promise<string> {\n    const blobReq = <BlobSignRequest>{\n      message_base64: Buffer.from(getBytes(digest)).toString(\"base64\"),\n    };\n    // Get the key corresponding to this address\n    if (this.#key === undefined) {\n      const key = (await this.#signerSession.keys()).find((k) => k.materialId === this.#address);\n      if (key === undefined) {\n        throw new Error(`Cannot access key '${this.#address}'`);\n      }\n      this.#key = key;\n    }\n    // sign\n    const result = await this.#signerSession.signBlob(this.#key, blobReq);\n    return result.data().signature;\n  }\n}\n"]}
|
|
141
|
+
_Signer_address = new WeakMap(), _Signer_key = new WeakMap(), _Signer_signerSession = new WeakMap(), _Signer_onMfaPoll = new WeakMap(), _Signer_mfaPollIntervalMs = new WeakMap(), _Signer_managementSession = new WeakMap(), _Signer_instances = new WeakSet(), _Signer_handleMfa =
|
|
142
|
+
/**
|
|
143
|
+
* If the sign request requires MFA, this method waits for approvals
|
|
144
|
+
*
|
|
145
|
+
* @param {SignResponse<U>} res The response of a sign request
|
|
146
|
+
* @return {Promise<U>} The sign data after MFA approvals
|
|
147
|
+
*/
|
|
148
|
+
async function _Signer_handleMfa(res) {
|
|
149
|
+
while (res.requiresMfa()) {
|
|
150
|
+
await new Promise((resolve) => setTimeout(resolve, __classPrivateFieldGet(this, _Signer_mfaPollIntervalMs, "f")));
|
|
151
|
+
const mfaInfo = await __classPrivateFieldGet(this, _Signer_signerSession, "f").getMfaInfo(__classPrivateFieldGet(this, _Signer_managementSession, "f"), res.mfaId());
|
|
152
|
+
__classPrivateFieldGet(this, _Signer_onMfaPoll, "f").call(this, mfaInfo);
|
|
153
|
+
if (mfaInfo.receipt) {
|
|
154
|
+
res = await res.signWithMfaApproval(mfaInfo);
|
|
155
|
+
}
|
|
156
|
+
}
|
|
157
|
+
return res.data();
|
|
158
|
+
};
|
|
159
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/ethers/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAQgB;AA6BhB;;GAEG;AACH,MAAa,MAAO,SAAQ,eAAM,CAAC,cAAc;IAsB/C;;;;OAIG;IACH,YAAY,OAAyB,EAAE,aAA4B,EAAE,OAAuB;QAC1F,KAAK,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;;QA3B3B,iCAAiC;QACxB,kCAAiB;QAE1B,iCAAiC;QACjC,8BAAe;QAEf,6BAA6B;QACpB,wCAA8B;QAEvC;;;WAGG;QACM,oCAA2C;QAEpD,gEAAgE;QACvD,4CAA2B;QAEpC,sDAAsD;QAC7C,4CAAgC;QASvC,IAAI,OAAO,OAAO,KAAK,QAAQ,EAAE;YAC/B,uBAAA,IAAI,mBAAY,OAAO,MAAA,CAAC;SACzB;aAAM;YACL,uBAAA,IAAI,mBAAY,OAAO,CAAC,UAAU,MAAA,CAAC;YACnC,uBAAA,IAAI,eAAQ,OAAkB,MAAA,CAAC;SAChC;QACD,uBAAA,IAAI,yBAAkB,aAAa,MAAA,CAAC;QACpC,uBAAA,IAAI,qBAAc,OAAO,EAAE,SAAS,IAAI,CAAC,EAAC,8BAA8B,EAAE,EAAE,GAAE,CAAC,CAAC,MAAA,CAAC,CAAC,2DAA2D;QAC7I,uBAAA,IAAI,6BAAsB,OAAO,EAAE,iBAAiB,IAAI,IAAI,MAAA,CAAC;QAC7D,uBAAA,IAAI,6BAAsB,OAAO,EAAE,iBAAiB,MAAA,CAAC;IACvD,CAAC;IAED,sCAAsC;IACtC,KAAK,CAAC,UAAU;QACd,OAAO,uBAAA,IAAI,uBAAS,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACH,OAAO,CAAC,QAAgC;QACtC,OAAO,IAAI,MAAM,CAAC,uBAAA,IAAI,uBAAS,EAAE,uBAAA,IAAI,6BAAe,EAAE,EAAE,QAAQ,EAAE,CAAC,CAAC;IACtE,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe,CAAC,EAA6B;QACjD,0CAA0C;QAC1C,IAAI,OAAO,GAAG,EAAE,CAAC,OAAO,CAAC;QACzB,IAAI,OAAO,KAAK,SAAS,EAAE;YACzB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,UAAU,EAAE,CAAC;YAClD,OAAO,GAAG,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,GAAG,CAAC;SAC/C;QAED,sDAAsD;QACtD,MAAM,KAAK,GACT,IAAI,CAAC,QAAQ,YAAY,2BAAkB;YACzC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACrC,CAAC,CAAC,gDAAgD;gBAChD,iDAAiD;gBACjD,0CAA0C;gBAC1C,2BAAkB,CAAC,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACpE,KAAK,CAAC,IAAI,GAAG,IAAA,gBAAO,EAAC,EAAE,CAAC,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,qBAAqB;QAE/D,MAAM,GAAG,GAAmB;YAC1B,QAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;YACzB,EAAE,EAAE,KAAK;SACV,CAAC;QAEF,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,aAAa,CAAC;IAC5B,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,WAAW,CAAC,OAA4B;QAC5C,MAAM,MAAM,GAAG,eAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAC3C,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,aAAa,CACjB,MAAuB,EACvB,KAA4C,EAC5C,KAA0B;QAE1B,MAAM,MAAM,GAAG,yBAAgB,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC;QAC3D,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,QAAQ,CAAC,MAAc;QACnC,MAAM,OAAO,GAAoB;YAC/B,cAAc,EAAE,MAAM,CAAC,IAAI,CAAC,IAAA,iBAAQ,EAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;SACjE,CAAC;QACF,4CAA4C;QAC5C,IAAI,uBAAA,IAAI,mBAAK,KAAK,SAAS,EAAE;YAC3B,MAAM,GAAG,GAAG,CAAC,MAAM,uBAAA,IAAI,6BAAe,CAAC,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,WAAW,KAAK,uBAAA,IAAI,uBAAS,CAAC,CAAC;YAC5F,IAAI,GAAG,KAAK,SAAS,EAAE;gBACrB,MAAM,IAAI,KAAK,CAAC,sBAAsB,uBAAA,IAAI,uBAAS,GAAG,CAAC,CAAC;aACzD;YACD,uBAAA,IAAI,eAAQ,GAAG,MAAA,CAAC;SACjB;QAED,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,QAAQ,CAAC,uBAAA,IAAI,mBAAK,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;QAC1E,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,SAAS,CAAC;IACxB,CAAC;CAoBF;AA7JD,wBA6JC;;AAlBC;;;;;GAKG;AACH,KAAK,4BAAe,GAAoB;IACtC,OAAO,GAAG,CAAC,WAAW,EAAE,EAAE;QACxB,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,uBAAA,IAAI,iCAAmB,CAAC,CAAC,CAAC;QAE7E,MAAM,OAAO,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,UAAU,CAAC,uBAAA,IAAI,iCAAoB,EAAE,GAAG,CAAC,KAAK,EAAE,CAAC,CAAC;QAC5F,uBAAA,IAAI,yBAAW,MAAf,IAAI,EAAY,OAAO,CAAC,CAAC;QACzB,IAAI,OAAO,CAAC,OAAO,EAAE;YACnB,GAAG,GAAG,MAAM,GAAG,CAAC,mBAAmB,CAAC,OAAO,CAAC,CAAC;SAC9C;KACF;IACD,OAAO,GAAG,CAAC,IAAI,EAAE,CAAC;AACpB,CAAC","sourcesContent":["import {\n  JsonRpcApiProvider,\n  TypedDataDomain,\n  TypedDataEncoder,\n  TypedDataField,\n  ethers,\n  getBytes,\n  toBeHex,\n} from \"ethers\";\nimport {\n  BlobSignRequest,\n  EvmSignRequest,\n  MfaRequestInfo,\n  SignerSession,\n  SignResponse,\n} from \"../signer_session\";\nimport { KeyInfo } from \"../key\";\nimport { CubeSigner } from \"..\";\n\n/** Options for the signer */\ninterface SignerOptions {\n  /** Optional provider to use */\n  provider?: null | ethers.Provider;\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  onMfaPoll?: (arg0: MfaRequestInfo) => void;\n  /**\n   * The amount of time (in milliseconds) to wait between checks for MFA\n   * updates. Default is 1000ms\n   */\n  mfaPollIntervalMs?: number;\n  /** Optional management session. Used to check for MFA updates */\n  managementSession?: CubeSigner;\n}\n\n/**\n * A ethers.js Signer using CubeSigner\n */\nexport class Signer extends ethers.AbstractSigner {\n  /** The address of the account */\n  readonly #address: string;\n\n  /** The key to use for signing */\n  #key?: KeyInfo;\n\n  /** The underlying session */\n  readonly #signerSession: SignerSession;\n\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  readonly #onMfaPoll: (arg0: MfaRequestInfo) => void;\n\n  /** The amount of time to wait between checks for MFA updates */\n  readonly #mfaPollIntervalMs: number;\n\n  /** Optional management session, used for MFA flows */\n  readonly #managementSession?: CubeSigner;\n\n  /** Create new Signer instance\n   * @param {KeyInfo | string} address The key or the eth address of the account to use.\n   * @param {SignerSession} signerSession The underlying Signer session.\n   * @param {SignerOptions} options The options to use for the Signer instance\n   */\n  constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions) {\n    super(options?.provider);\n    if (typeof address === \"string\") {\n      this.#address = address;\n    } else {\n      this.#address = address.materialId;\n      this.#key = address as KeyInfo;\n    }\n    this.#signerSession = signerSession;\n    this.#onMfaPoll = options?.onMfaPoll ?? ((/* _mfaInfo: MfaRequestInfo */) => {}); // eslint-disable-line @typescript-eslint/no-empty-function\n    this.#mfaPollIntervalMs = options?.mfaPollIntervalMs ?? 1000;\n    this.#managementSession = options?.managementSession;\n  }\n\n  /** Resolves to the signer address. */\n  async getAddress(): Promise<string> {\n    return this.#address;\n  }\n\n  /**\n   *  Returns the signer connected to %%provider%%.\n   *  @param {null | ethers.Provider} provider The optional provider instance to use.\n   *  @return {Signer} The signer connected to signer.\n   */\n  connect(provider: null | ethers.Provider): Signer {\n    return new Signer(this.#address, this.#signerSession, { provider });\n  }\n\n  /**\n   * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.\n   * @param {ethers.TransactionRequest} tx The transaction to sign.\n   * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.\n   */\n  async signTransaction(tx: ethers.TransactionRequest): Promise<string> {\n    // get the chain id from the network or tx\n    let chainId = tx.chainId;\n    if (chainId === undefined) {\n      const network = await this.provider?.getNetwork();\n      chainId = network?.chainId?.toString() ?? \"1\";\n    }\n\n    // Convert the transaction into a JSON-RPC transaction\n    const rpcTx =\n      this.provider instanceof JsonRpcApiProvider\n        ? this.provider.getRpcTransaction(tx)\n        : // We can just call the getRpcTransaction with a\n          // null receiver since it doesn't actually use it\n          // (and really should be declared static).\n          JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);\n    rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]\n\n    const req = <EvmSignRequest>{\n      chain_id: Number(chainId),\n      tx: rpcTx,\n    };\n\n    const res = await this.#signerSession.signEvm(this.#address, req);\n    const data = await this.#handleMfa(res);\n    return data.rlp_signed_tx;\n  }\n\n  /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)\n   * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {string | Uint8Array} message The message to sign.\n   * @return {Promise<string>} The signature.\n   */\n  async signMessage(message: string | Uint8Array): Promise<string> {\n    const digest = ethers.hashMessage(message);\n    return this.signBlob(digest);\n  }\n\n  /** Signs EIP-712 typed data. This uses ethers.js's\n   * [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)\n   * to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {TypedDataDomain} domain The domain of the typed data.\n   * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.\n   * @param {Record<string, any>} value The value of the typed data.\n   * @return {Promise<string>} The signature.\n   */\n  async signTypedData(\n    domain: TypedDataDomain,\n    types: Record<string, Array<TypedDataField>>,\n    value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any\n  ): Promise<string> {\n    const digest = TypedDataEncoder.hash(domain, types, value);\n    return this.signBlob(digest);\n  }\n\n  /** Sign arbitrary digest. This uses {@link Key#signBlob}.\n   * @param {string} digest The digest to sign.\n   * @return {Promise<string>} The signature.\n   */\n  private async signBlob(digest: string): Promise<string> {\n    const blobReq = <BlobSignRequest>{\n      message_base64: Buffer.from(getBytes(digest)).toString(\"base64\"),\n    };\n    // Get the key corresponding to this address\n    if (this.#key === undefined) {\n      const key = (await this.#signerSession.keys()).find((k) => k.material_id === this.#address);\n      if (key === undefined) {\n        throw new Error(`Cannot access key '${this.#address}'`);\n      }\n      this.#key = key;\n    }\n\n    const res = await this.#signerSession.signBlob(this.#key.key_id, blobReq);\n    const data = await this.#handleMfa(res);\n    return data.signature;\n  }\n\n  /**\n   * If the sign request requires MFA, this method waits for approvals\n   *\n   * @param {SignResponse<U>} res The response of a sign request\n   * @return {Promise<U>} The sign data after MFA approvals\n   */\n  async #handleMfa<U>(res: SignResponse<U>): Promise<U> {\n    while (res.requiresMfa()) {\n      await new Promise((resolve) => setTimeout(resolve, this.#mfaPollIntervalMs));\n\n      const mfaInfo = await this.#signerSession.getMfaInfo(this.#managementSession!, res.mfaId());\n      this.#onMfaPoll(mfaInfo);\n      if (mfaInfo.receipt) {\n        res = await res.signWithMfaApproval(mfaInfo);\n      }\n    }\n    return res.data();\n  }\n}\n"]}
|
package/dist/src/index.d.ts
CHANGED
|
@@ -1,34 +1,35 @@
|
|
|
1
1
|
import { EnvInterface } from "./env";
|
|
2
|
-
import { components, Client } from "./client";
|
|
2
|
+
import { components, Client, paths } from "./client";
|
|
3
3
|
import { Org } from "./org";
|
|
4
|
-
import { SignerSessionStorage } from "./session/signer_session_manager";
|
|
5
|
-
import { SignerSession } from "./signer_session";
|
|
6
|
-
import {
|
|
7
|
-
import { OidcSessionManager, OidcSessionStorage } from "./session/oidc_session_manager";
|
|
4
|
+
import { SignerSessionStorage, SignerSessionManager } from "./session/signer_session_manager";
|
|
5
|
+
import { MfaRequestInfo, SignResponse, SignerSession } from "./signer_session";
|
|
6
|
+
import { CognitoSessionManager, CognitoSessionStorage } from "./session/cognito_manager";
|
|
8
7
|
/** CubeSigner constructor options */
|
|
9
8
|
export interface CubeSignerOptions {
|
|
10
9
|
/** The environment to use */
|
|
11
10
|
env?: EnvInterface;
|
|
12
11
|
/** The management authorization token */
|
|
13
|
-
sessionMgr?:
|
|
12
|
+
sessionMgr?: CognitoSessionManager | SignerSessionManager;
|
|
14
13
|
}
|
|
15
14
|
export type UserInfo = components["schemas"]["UserInfo"];
|
|
16
15
|
export type TotpInfo = components["responses"]["TotpInfo"]["content"]["application/json"];
|
|
17
16
|
export type ConfiguredMfa = components["schemas"]["ConfiguredMfa"];
|
|
17
|
+
export type RatchetConfig = components["schemas"]["RatchetConfig"];
|
|
18
|
+
type OidcAuthResponse = paths["/v0/org/{org_id}/oidc"]["post"]["responses"]["200"]["content"]["application/json"];
|
|
18
19
|
/** CubeSigner client */
|
|
19
20
|
export declare class CubeSigner {
|
|
20
21
|
#private;
|
|
21
|
-
readonly sessionMgr?:
|
|
22
|
+
readonly sessionMgr?: CognitoSessionManager | SignerSessionManager;
|
|
22
23
|
/** @return {EnvInterface} The CubeSigner environment of this client */
|
|
23
24
|
get env(): EnvInterface;
|
|
24
25
|
/**
|
|
25
26
|
* Loads an existing management session and creates a CubeSigner instance.
|
|
26
|
-
* @param {
|
|
27
|
+
* @param {CognitoSessionStorage} storage Optional session storage to load
|
|
27
28
|
* the session from. If not specified, the management session from the config
|
|
28
29
|
* directory will be loaded.
|
|
29
30
|
* @return {Promise<CubeSigner>} New CubeSigner instance
|
|
30
31
|
*/
|
|
31
|
-
static loadManagementSession(storage?:
|
|
32
|
+
static loadManagementSession(storage?: CognitoSessionStorage): Promise<CubeSigner>;
|
|
32
33
|
/**
|
|
33
34
|
* Loads a signer session from a session storage (e.g., session file).
|
|
34
35
|
* @param {SignerSessionStorage} storage Optional session storage to load
|
|
@@ -37,37 +38,38 @@ export declare class CubeSigner {
|
|
|
37
38
|
* @return {Promise<SignerSession>} New signer session
|
|
38
39
|
*/
|
|
39
40
|
static loadSignerSession(storage?: SignerSessionStorage): Promise<SignerSession>;
|
|
40
|
-
/**
|
|
41
|
-
* Loads a signer session from OIDC storage
|
|
42
|
-
* @param {OidcSessionStorage} storage The storage to load from
|
|
43
|
-
* @return {Promise<SignerSession>} New signer session
|
|
44
|
-
*/
|
|
45
|
-
static loadOidcSession(storage: OidcSessionStorage): Promise<SignerSession>;
|
|
46
41
|
/**
|
|
47
42
|
* Create a new CubeSigner instance.
|
|
48
|
-
* @param {CubeSignerOptions} options The options for the CubeSigner instance.
|
|
43
|
+
* @param {CubeSignerOptions} options The optional configuraiton options for the CubeSigner instance.
|
|
49
44
|
*/
|
|
50
|
-
constructor(options
|
|
45
|
+
constructor(options?: CubeSignerOptions);
|
|
51
46
|
/**
|
|
52
|
-
* Authenticate an OIDC user and create a new
|
|
47
|
+
* Authenticate an OIDC user and create a new session manager for them.
|
|
53
48
|
* @param {string} oidcToken The OIDC token
|
|
54
49
|
* @param {string} orgId The id of the organization that the user is in
|
|
55
50
|
* @param {List<string>} scopes The scopes of the resulting session
|
|
56
|
-
* @param {
|
|
57
|
-
* @
|
|
51
|
+
* @param {RatchetConfig} lifetimes Lifetimes of the new session.
|
|
52
|
+
* @param {SignerSessionStorage?} storage Optional signer session storage (defaults to in-memory storage)
|
|
53
|
+
* @return {Promise<SignerSessionManager>} The signer session manager
|
|
58
54
|
*/
|
|
59
|
-
|
|
60
|
-
/**
|
|
61
|
-
* Authenticate an OIDC user and create a new session for them.
|
|
62
|
-
* @param {string} oidcToken The OIDC token
|
|
63
|
-
* @param {string} orgId The id of the organization that the user is in
|
|
64
|
-
* @param {List<string>} scopes The scopes of the resulting session
|
|
65
|
-
* @param {OidcSessionStorage} storage The signer session storage
|
|
66
|
-
* @return {Promise<SignerSession>} The signer session
|
|
67
|
-
*/
|
|
68
|
-
createOidcSession(oidcToken: string, orgId: string, scopes: Array<string>, storage?: OidcSessionStorage): Promise<SignerSession>;
|
|
55
|
+
oidcAuth(oidcToken: string, orgId: string, scopes: Array<string>, lifetimes?: RatchetConfig, storage?: SignerSessionStorage): Promise<SignerSessionManager>;
|
|
69
56
|
/** Retrieves information about the current user. */
|
|
70
57
|
aboutMe(): Promise<UserInfo>;
|
|
58
|
+
/**
|
|
59
|
+
* Creates and sets a new TOTP configuration for the logged in user,
|
|
60
|
+
* if and only if no TOTP configuration is already set.
|
|
61
|
+
*
|
|
62
|
+
* @return {Promise<TotpInfo>} Newly created TOTP configuration.
|
|
63
|
+
*/
|
|
64
|
+
initTotp(): Promise<TotpInfo>;
|
|
65
|
+
/**
|
|
66
|
+
* Retrieves existing MFA request.
|
|
67
|
+
*
|
|
68
|
+
* @param {string} orgId Organization ID
|
|
69
|
+
* @param {string} mfaId MFA request ID
|
|
70
|
+
* @return {Promise<MfaRequestInfo>} MFA request information
|
|
71
|
+
*/
|
|
72
|
+
mfaGet(orgId: string, mfaId: string): Promise<MfaRequestInfo>;
|
|
71
73
|
/**
|
|
72
74
|
* Creates and sets a new TOTP configuration for the logged-in user,
|
|
73
75
|
* overriding the existing one (if any).
|
|
@@ -89,6 +91,23 @@ export declare class CubeSigner {
|
|
|
89
91
|
* @internal
|
|
90
92
|
* */
|
|
91
93
|
management(): Promise<Client>;
|
|
94
|
+
/**
|
|
95
|
+
* Exchange an OIDC token for a CubeSigner session token.
|
|
96
|
+
* @param {string} oidcToken The OIDC token
|
|
97
|
+
* @param {string} orgId The id of the organization that the user is in
|
|
98
|
+
* @param {List<string>} scopes The scopes of the resulting session
|
|
99
|
+
* @param {RatchetConfig} lifetimes Lifetimes of the new session.
|
|
100
|
+
* @param {MfaReceipt} mfaReceipt Optional MFA receipt (id + confirmation code)
|
|
101
|
+
* @return {Promise<SignResponse<OidcAuthResponse>>} The session data.
|
|
102
|
+
*/
|
|
103
|
+
oidcLogin(oidcToken: string, orgId: string, scopes: Array<string>, lifetimes?: RatchetConfig, mfaReceipt?: MfaReceipt): Promise<SignResponse<OidcAuthResponse>>;
|
|
104
|
+
}
|
|
105
|
+
/** MFA receipt */
|
|
106
|
+
export interface MfaReceipt {
|
|
107
|
+
/** MFA request ID */
|
|
108
|
+
mfaId: string;
|
|
109
|
+
/** MFA confirmation code */
|
|
110
|
+
mfaConf: string;
|
|
92
111
|
}
|
|
93
112
|
/** Organizations */
|
|
94
113
|
export * from "./org";
|
|
@@ -105,9 +124,7 @@ export * from "./session/session_storage";
|
|
|
105
124
|
/** Session manager */
|
|
106
125
|
export * from "./session/session_manager";
|
|
107
126
|
/** Management session manager */
|
|
108
|
-
export * from "./session/
|
|
109
|
-
/** OIDC session manager */
|
|
110
|
-
export * from "./session/oidc_session_manager";
|
|
127
|
+
export * from "./session/cognito_manager";
|
|
111
128
|
/** Signer session manager */
|
|
112
129
|
export * from "./session/signer_session_manager";
|
|
113
130
|
/** Export ethers.js Signer */
|