@cubist-labs/cubesigner-sdk 0.1.23 → 0.1.50

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -1,10 +1,23 @@
1
1
  # CubeSigner TypeScript SDK
2
2
 
3
- CubeSigner is a hardware-backed, non-custodial key management platform
4
- built by Cubist for programmatically managing cryptographic keys.
3
+ CubeSigner is a hardware-backed, non-custodial platform for securely
4
+ managing cryptographic keys. This repository is the TypeScript SDK for
5
+ programmatically interacting with CubeSigner services.
5
6
 
6
- This repository is our SDK written in TypeScript for programmatically
7
- interacting with CubeSigner services.
7
+ ## CubeSigner background
8
+
9
+ [The Cubist team](https://cubist.dev/about) built CubeSigner to address the key
10
+ security vs key availability tradeoff: right now, many teams are forced to keep
11
+ keys available in memory and therefore exposed to attackers, or try to keep
12
+ keys safe—usually only at rest—at serious latency and engineering cost.
13
+ CubeSigner addresses this problem by giving developers low-latency access to
14
+ hardware-backed key generation and signing. During each of these operations,
15
+ CubeSigner safeguards their users' keys in HSM-sealed Nitro Enclaves—combining
16
+ cold wallet security with hot wallet speed and simplicity.
17
+
18
+ Right now, the CubeSigner SDK supports signing for EVM chains like Ethereum
19
+ and Avalanche, and non-EVM chains Bitcoin and Solana. Support for more chains
20
+ is in the works!
8
21
 
9
22
  ## Installing the SDK
10
23
 
@@ -58,11 +71,11 @@ session manager:
58
71
 
59
72
  ```typescript
60
73
  // Load session from a JSON file
61
- const fileStorage = new cs.JsonFileSessionStorage<cs.ManagementSessionInfo>(
74
+ const fileStorage = new cs.JsonFileSessionStorage<cs.CognitoSessionInfo>(
62
75
  `${process.env.HOME}/.config/cubesigner/management-session.json`,
63
76
  );
64
77
  // Create a session manager for a management token
65
- const sessionMgr = await cs.ManagementSessionManager.loadFromStorage(fileStorage);
78
+ const sessionMgr = await cs.CognitoSessionManager.loadFromStorage(fileStorage);
66
79
  new cs.CubeSigner({
67
80
  sessionMgr,
68
81
  });
@@ -100,7 +113,7 @@ transaction. For that, we need a key of type `Secp256k1.Evm`.
100
113
  const secpKey = await org.createKey(cs.Secp256k1.Evm);
101
114
  assert((await secpKey.owner()) == me.user_id);
102
115
  assert(await secpKey.enabled());
103
- console.log(`Created '${secpKey.type}' key ${secpKey.id}`);
116
+ console.log(`Created '${await secpKey.type()}' key ${secpKey.id}`);
104
117
  ```
105
118
 
106
119
  ### Create a `Role` and a `SignerSession`
@@ -188,7 +201,7 @@ assert(sig.data().rlp_signed_tx);
188
201
  ```typescript
189
202
  const { ethers } = require("ethers");
190
203
  // Create new Signer
191
- const ethersSigner = new cs.ethers.Signer(secpKey.materialId, session /*, provider */);
204
+ const ethersSigner = new cs.ethers.Signer(secpKey.materialId, session);
192
205
  assert((await ethersSigner.getAddress()) === secpKey.materialId);
193
206
  // sign transaction as usual:
194
207
  console.log(
@@ -251,22 +264,30 @@ disabled for `BLS` keys, and for other key types it can be enabled by
251
264
  attaching an `"AllowRawBlobSigning"` policy:
252
265
 
253
266
  ```typescript
254
- console.log("Confirming that raw blob is rejected by default");
255
- const blobReq = <cs.BlobSignRequest>{
256
- message_base64: "L1kE9g59xD3fzYQQSR7340BwU9fGrP6EMfIFcyX/YBc=",
257
- };
258
- try {
259
- await session.signBlob(secpKey, blobReq);
260
- assert(false, "Must be rejected by policy");
261
- } catch (e) {
262
- assert(`${e}`.includes("Raw blob signing not allowed"));
267
+ // Create a new Ed25519 key (e.g., for Cardano) and add it to our session role
268
+ const edKey = await org.createKey(cs.Ed25519.Cardano);
269
+ await role.addKey(edKey);
270
+ console.log(`Created '${await edKey.type()}' key ${edKey.id} and added it to role ${role.id}`);
271
+
272
+ // Sign raw blobs with our new ed key and the secp we created before
273
+ for (const key of [edKey, secpKey]) {
274
+ console.log(`Confirming that raw blob with ${await key.type()} is rejected by default`);
275
+ const blobReq = <cs.BlobSignRequest>{
276
+ message_base64: "L1kE9g59xD3fzYQQSR7340BwU9fGrP6EMfIFcyX/YBc=",
277
+ };
278
+ try {
279
+ await session.signBlob(key, blobReq);
280
+ assert(false, "Must be rejected by policy");
281
+ } catch (e) {
282
+ assert(`${e}`.includes("Raw blob signing not allowed"));
283
+ }
284
+
285
+ console.log("Signing raw blob after adding 'AllowRawBlobSigning' policy");
286
+ await key.appendPolicy(["AllowRawBlobSigning"]);
287
+ const blobSig = await session.signBlob(key, blobReq);
288
+ console.log(blobSig.data());
289
+ assert(blobSig.data().signature);
263
290
  }
264
-
265
- console.log("Signing raw blob after adding 'AllowRawBlobSigning' policy");
266
- await secpKey.appendPolicy(["AllowRawBlobSigning"]);
267
- const blobSig = await session.signBlob(secpKey, blobReq);
268
- console.log(blobSig.data());
269
- assert(blobSig.data().signature);
270
291
  ```
271
292
 
272
293
  > **Warning**
@@ -335,7 +356,7 @@ of `SignerSession`, required by all signing endpoints, e.g.,
335
356
  `signEvm`)
336
357
 
337
358
  ```typescript
338
- const oidcSession = await cubesigner.createOidcSession(oidcToken, org.id, ["sign:*"]);
359
+ const oidcSession = new cs.SignerSession(await cubesigner.oidcAuth(oidcToken, org.id, ["sign:*"]));
339
360
  ```
340
361
 
341
362
  or a _management_ session (i.e., and instance of `CubeSigner`,
@@ -344,7 +365,7 @@ information, configuring user MFA methods, etc.).
344
365
 
345
366
  ```typescript
346
367
  const oidcCubeSigner = new cs.CubeSigner({
347
- sessionMgr: await cubesigner.createOidcManager(oidcToken, org.id, ["manage:*"]),
368
+ sessionMgr: await cubesigner.oidcAuth(oidcToken, org.id, ["manage:*"]),
348
369
  });
349
370
  ```
350
371
 
@@ -392,7 +413,7 @@ as one of the configured MFA factors.
392
413
  ```typescript
393
414
  const mfa = (await oidcCubeSigner.aboutMe()).mfa;
394
415
  console.log("Configured MFA types", mfa);
395
- assert(mfa.includes("Totp"));
416
+ assert(mfa.map((m) => m.type).includes("totp"));
396
417
  ```
397
418
 
398
419
  ### Configure MFA policy for signing
@@ -1,16 +1,35 @@
1
1
  import { TypedDataDomain, TypedDataField, ethers } from "ethers";
2
- import { SignerSession } from "../signer_session";
2
+ import { MfaRequestInfo, SignerSession } from "../signer_session";
3
+ import { KeyInfo } from "../key";
4
+ import { CubeSigner } from "..";
5
+ /** Options for the signer */
6
+ interface SignerOptions {
7
+ /** Optional provider to use */
8
+ provider?: null | ethers.Provider;
9
+ /**
10
+ * The function to call when MFA information is retrieved. If this callback
11
+ * throws, no transaction is broadcast.
12
+ */
13
+ onMfaPoll?: (arg0: MfaRequestInfo) => void;
14
+ /**
15
+ * The amount of time (in milliseconds) to wait between checks for MFA
16
+ * updates. Default is 1000ms
17
+ */
18
+ mfaPollIntervalMs?: number;
19
+ /** Optional management session. Used to check for MFA updates */
20
+ managementSession?: CubeSigner;
21
+ }
3
22
  /**
4
23
  * A ethers.js Signer using CubeSigner
5
24
  */
6
25
  export declare class Signer extends ethers.AbstractSigner {
7
26
  #private;
8
27
  /** Create new Signer instance
9
- * @param {string} address The address of the account to use.
28
+ * @param {KeyInfo | string} address The key or the eth address of the account to use.
10
29
  * @param {SignerSession} signerSession The underlying Signer session.
11
- * @param {null | ethers.Provider} provider The optional provider instance to use.
30
+ * @param {SignerOptions} options The options to use for the Signer instance
12
31
  */
13
- constructor(address: string, signerSession: SignerSession, provider?: null | ethers.Provider);
32
+ constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions);
14
33
  /** Resolves to the signer address. */
15
34
  getAddress(): Promise<string>;
16
35
  /**
@@ -20,7 +39,7 @@ export declare class Signer extends ethers.AbstractSigner {
20
39
  */
21
40
  connect(provider: null | ethers.Provider): Signer;
22
41
  /**
23
- * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.
42
+ * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.
24
43
  * @param {ethers.TransactionRequest} tx The transaction to sign.
25
44
  * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
26
45
  */
@@ -48,3 +67,4 @@ export declare class Signer extends ethers.AbstractSigner {
48
67
  */
49
68
  private signBlob;
50
69
  }
70
+ export {};
@@ -10,7 +10,7 @@ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (
10
10
  if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
11
11
  return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
12
12
  };
13
- var _Signer_address, _Signer_key, _Signer_signerSession;
13
+ var _Signer_instances, _Signer_address, _Signer_key, _Signer_signerSession, _Signer_onMfaPoll, _Signer_mfaPollIntervalMs, _Signer_managementSession, _Signer_handleMfa;
14
14
  Object.defineProperty(exports, "__esModule", { value: true });
15
15
  exports.Signer = void 0;
16
16
  const ethers_1 = require("ethers");
@@ -19,20 +19,39 @@ const ethers_1 = require("ethers");
19
19
  */
20
20
  class Signer extends ethers_1.ethers.AbstractSigner {
21
21
  /** Create new Signer instance
22
- * @param {string} address The address of the account to use.
22
+ * @param {KeyInfo | string} address The key or the eth address of the account to use.
23
23
  * @param {SignerSession} signerSession The underlying Signer session.
24
- * @param {null | ethers.Provider} provider The optional provider instance to use.
24
+ * @param {SignerOptions} options The options to use for the Signer instance
25
25
  */
26
- constructor(address, signerSession, provider) {
27
- super(provider);
26
+ constructor(address, signerSession, options) {
27
+ super(options?.provider);
28
+ _Signer_instances.add(this);
28
29
  /** The address of the account */
29
30
  _Signer_address.set(this, void 0);
30
31
  /** The key to use for signing */
31
32
  _Signer_key.set(this, void 0);
32
33
  /** The underlying session */
33
34
  _Signer_signerSession.set(this, void 0);
34
- __classPrivateFieldSet(this, _Signer_address, address, "f");
35
+ /**
36
+ * The function to call when MFA information is retrieved. If this callback
37
+ * throws, no transaction is broadcast.
38
+ */
39
+ _Signer_onMfaPoll.set(this, void 0);
40
+ /** The amount of time to wait between checks for MFA updates */
41
+ _Signer_mfaPollIntervalMs.set(this, void 0);
42
+ /** Optional management session, used for MFA flows */
43
+ _Signer_managementSession.set(this, void 0);
44
+ if (typeof address === "string") {
45
+ __classPrivateFieldSet(this, _Signer_address, address, "f");
46
+ }
47
+ else {
48
+ __classPrivateFieldSet(this, _Signer_address, address.materialId, "f");
49
+ __classPrivateFieldSet(this, _Signer_key, address, "f");
50
+ }
35
51
  __classPrivateFieldSet(this, _Signer_signerSession, signerSession, "f");
52
+ __classPrivateFieldSet(this, _Signer_onMfaPoll, options?.onMfaPoll ?? (( /* _mfaInfo: MfaRequestInfo */) => { }), "f"); // eslint-disable-line @typescript-eslint/no-empty-function
53
+ __classPrivateFieldSet(this, _Signer_mfaPollIntervalMs, options?.mfaPollIntervalMs ?? 1000, "f");
54
+ __classPrivateFieldSet(this, _Signer_managementSession, options?.managementSession, "f");
36
55
  }
37
56
  /** Resolves to the signer address. */
38
57
  async getAddress() {
@@ -44,10 +63,10 @@ class Signer extends ethers_1.ethers.AbstractSigner {
44
63
  * @return {Signer} The signer connected to signer.
45
64
  */
46
65
  connect(provider) {
47
- return new Signer(__classPrivateFieldGet(this, _Signer_address, "f"), __classPrivateFieldGet(this, _Signer_signerSession, "f"), provider);
66
+ return new Signer(__classPrivateFieldGet(this, _Signer_address, "f"), __classPrivateFieldGet(this, _Signer_signerSession, "f"), { provider });
48
67
  }
49
68
  /**
50
- * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.
69
+ * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.
51
70
  * @param {ethers.TransactionRequest} tx The transaction to sign.
52
71
  * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
53
72
  */
@@ -70,8 +89,9 @@ class Signer extends ethers_1.ethers.AbstractSigner {
70
89
  chain_id: Number(chainId),
71
90
  tx: rpcTx,
72
91
  };
73
- const sig = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEvm(__classPrivateFieldGet(this, _Signer_address, "f"), req);
74
- return sig.data().rlp_signed_tx;
92
+ const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEvm(__classPrivateFieldGet(this, _Signer_address, "f"), req);
93
+ const data = await __classPrivateFieldGet(this, _Signer_instances, "m", _Signer_handleMfa).call(this, res);
94
+ return data.rlp_signed_tx;
75
95
  }
76
96
  /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)
77
97
  * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.
@@ -106,17 +126,34 @@ class Signer extends ethers_1.ethers.AbstractSigner {
106
126
  };
107
127
  // Get the key corresponding to this address
108
128
  if (__classPrivateFieldGet(this, _Signer_key, "f") === undefined) {
109
- const key = (await __classPrivateFieldGet(this, _Signer_signerSession, "f").keys()).find((k) => k.materialId === __classPrivateFieldGet(this, _Signer_address, "f"));
129
+ const key = (await __classPrivateFieldGet(this, _Signer_signerSession, "f").keys()).find((k) => k.material_id === __classPrivateFieldGet(this, _Signer_address, "f"));
110
130
  if (key === undefined) {
111
131
  throw new Error(`Cannot access key '${__classPrivateFieldGet(this, _Signer_address, "f")}'`);
112
132
  }
113
133
  __classPrivateFieldSet(this, _Signer_key, key, "f");
114
134
  }
115
- // sign
116
- const result = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signBlob(__classPrivateFieldGet(this, _Signer_key, "f"), blobReq);
117
- return result.data().signature;
135
+ const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signBlob(__classPrivateFieldGet(this, _Signer_key, "f").key_id, blobReq);
136
+ const data = await __classPrivateFieldGet(this, _Signer_instances, "m", _Signer_handleMfa).call(this, res);
137
+ return data.signature;
118
138
  }
119
139
  }
120
140
  exports.Signer = Signer;
121
- _Signer_address = new WeakMap(), _Signer_key = new WeakMap(), _Signer_signerSession = new WeakMap();
122
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/ethers/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAQgB;AAIhB;;GAEG;AACH,MAAa,MAAO,SAAQ,eAAM,CAAC,cAAc;IAU/C;;;;OAIG;IACH,YAAY,OAAe,EAAE,aAA4B,EAAE,QAAiC;QAC1F,KAAK,CAAC,QAAQ,CAAC,CAAC;QAflB,iCAAiC;QACxB,kCAAiB;QAE1B,iCAAiC;QACjC,8BAAW;QAEX,6BAA6B;QACpB,wCAA8B;QASrC,uBAAA,IAAI,mBAAY,OAAO,MAAA,CAAC;QACxB,uBAAA,IAAI,yBAAkB,aAAa,MAAA,CAAC;IACtC,CAAC;IAED,sCAAsC;IACtC,KAAK,CAAC,UAAU;QACd,OAAO,uBAAA,IAAI,uBAAS,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACH,OAAO,CAAC,QAAgC;QACtC,OAAO,IAAI,MAAM,CAAC,uBAAA,IAAI,uBAAS,EAAE,uBAAA,IAAI,6BAAe,EAAE,QAAQ,CAAC,CAAC;IAClE,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe,CAAC,EAA6B;QACjD,0CAA0C;QAC1C,IAAI,OAAO,GAAG,EAAE,CAAC,OAAO,CAAC;QACzB,IAAI,OAAO,KAAK,SAAS,EAAE;YACzB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,UAAU,EAAE,CAAC;YAClD,OAAO,GAAG,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,GAAG,CAAC;SAC/C;QAED,sDAAsD;QACtD,MAAM,KAAK,GACT,IAAI,CAAC,QAAQ,YAAY,2BAAkB;YACzC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACrC,CAAC,CAAC,gDAAgD;gBAChD,iDAAiD;gBACjD,0CAA0C;gBAC1C,2BAAkB,CAAC,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACpE,KAAK,CAAC,IAAI,GAAG,IAAA,gBAAO,EAAC,EAAE,CAAC,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,qBAAqB;QAE/D,MAAM,GAAG,GAAmB;YAC1B,QAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;YACzB,EAAE,EAAE,KAAK;SACV,CAAC;QACF,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,OAAO,GAAG,CAAC,IAAI,EAAE,CAAC,aAAa,CAAC;IAClC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,WAAW,CAAC,OAA4B;QAC5C,MAAM,MAAM,GAAG,eAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAC3C,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,aAAa,CACjB,MAAuB,EACvB,KAA4C,EAC5C,KAA0B;QAE1B,MAAM,MAAM,GAAG,yBAAgB,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC;QAC3D,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,QAAQ,CAAC,MAAc;QACnC,MAAM,OAAO,GAAoB;YAC/B,cAAc,EAAE,MAAM,CAAC,IAAI,CAAC,IAAA,iBAAQ,EAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;SACjE,CAAC;QACF,4CAA4C;QAC5C,IAAI,uBAAA,IAAI,mBAAK,KAAK,SAAS,EAAE;YAC3B,MAAM,GAAG,GAAG,CAAC,MAAM,uBAAA,IAAI,6BAAe,CAAC,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,UAAU,KAAK,uBAAA,IAAI,uBAAS,CAAC,CAAC;YAC3F,IAAI,GAAG,KAAK,SAAS,EAAE;gBACrB,MAAM,IAAI,KAAK,CAAC,sBAAsB,uBAAA,IAAI,uBAAS,GAAG,CAAC,CAAC;aACzD;YACD,uBAAA,IAAI,eAAQ,GAAG,MAAA,CAAC;SACjB;QACD,OAAO;QACP,MAAM,MAAM,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,QAAQ,CAAC,uBAAA,IAAI,mBAAK,EAAE,OAAO,CAAC,CAAC;QACtE,OAAO,MAAM,CAAC,IAAI,EAAE,CAAC,SAAS,CAAC;IACjC,CAAC;CACF;AAnHD,wBAmHC","sourcesContent":["import {\n  JsonRpcApiProvider,\n  TypedDataDomain,\n  TypedDataEncoder,\n  TypedDataField,\n  ethers,\n  getBytes,\n  toBeHex,\n} from \"ethers\";\nimport { BlobSignRequest, EvmSignRequest, SignerSession } from \"../signer_session\";\nimport { Key } from \"../key\";\n\n/**\n * A ethers.js Signer using CubeSigner\n */\nexport class Signer extends ethers.AbstractSigner {\n  /** The address of the account */\n  readonly #address: string;\n\n  /** The key to use for signing */\n  #key?: Key;\n\n  /** The underlying session */\n  readonly #signerSession: SignerSession;\n\n  /** Create new Signer instance\n   * @param {string} address The address of the account to use.\n   * @param {SignerSession} signerSession The underlying Signer session.\n   * @param {null | ethers.Provider} provider The optional provider instance to use.\n   */\n  constructor(address: string, signerSession: SignerSession, provider?: null | ethers.Provider) {\n    super(provider);\n    this.#address = address;\n    this.#signerSession = signerSession;\n  }\n\n  /** Resolves to the signer address. */\n  async getAddress(): Promise<string> {\n    return this.#address;\n  }\n\n  /**\n   *  Returns the signer connected to %%provider%%.\n   *  @param {null | ethers.Provider} provider The optional provider instance to use.\n   *  @return {Signer} The signer connected to signer.\n   */\n  connect(provider: null | ethers.Provider): Signer {\n    return new Signer(this.#address, this.#signerSession, provider);\n  }\n\n  /**\n   * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.\n   * @param {ethers.TransactionRequest} tx The transaction to sign.\n   * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.\n   */\n  async signTransaction(tx: ethers.TransactionRequest): Promise<string> {\n    // get the chain id from the network or tx\n    let chainId = tx.chainId;\n    if (chainId === undefined) {\n      const network = await this.provider?.getNetwork();\n      chainId = network?.chainId?.toString() ?? \"1\";\n    }\n\n    // Convert the transaction into a JSON-RPC transaction\n    const rpcTx =\n      this.provider instanceof JsonRpcApiProvider\n        ? this.provider.getRpcTransaction(tx)\n        : // We can just call the getRpcTransaction with a\n          // null receiver since it doesn't actually use it\n          // (and really should be declared static).\n          JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);\n    rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]\n\n    const req = <EvmSignRequest>{\n      chain_id: Number(chainId),\n      tx: rpcTx,\n    };\n    const sig = await this.#signerSession.signEvm(this.#address, req);\n    return sig.data().rlp_signed_tx;\n  }\n\n  /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)\n   * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {string | Uint8Array} message The message to sign.\n   * @return {Promise<string>} The signature.\n   */\n  async signMessage(message: string | Uint8Array): Promise<string> {\n    const digest = ethers.hashMessage(message);\n    return this.signBlob(digest);\n  }\n\n  /** Signs EIP-712 typed data. This uses ethers.js's\n   * [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)\n   * to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {TypedDataDomain} domain The domain of the typed data.\n   * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.\n   * @param {Record<string, any>} value The value of the typed data.\n   * @return {Promise<string>} The signature.\n   */\n  async signTypedData(\n    domain: TypedDataDomain,\n    types: Record<string, Array<TypedDataField>>,\n    value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any\n  ): Promise<string> {\n    const digest = TypedDataEncoder.hash(domain, types, value);\n    return this.signBlob(digest);\n  }\n\n  /** Sign arbitrary digest. This uses {@link Key#signBlob}.\n   * @param {string} digest The digest to sign.\n   * @return {Promise<string>} The signature.\n   */\n  private async signBlob(digest: string): Promise<string> {\n    const blobReq = <BlobSignRequest>{\n      message_base64: Buffer.from(getBytes(digest)).toString(\"base64\"),\n    };\n    // Get the key corresponding to this address\n    if (this.#key === undefined) {\n      const key = (await this.#signerSession.keys()).find((k) => k.materialId === this.#address);\n      if (key === undefined) {\n        throw new Error(`Cannot access key '${this.#address}'`);\n      }\n      this.#key = key;\n    }\n    // sign\n    const result = await this.#signerSession.signBlob(this.#key, blobReq);\n    return result.data().signature;\n  }\n}\n"]}
141
+ _Signer_address = new WeakMap(), _Signer_key = new WeakMap(), _Signer_signerSession = new WeakMap(), _Signer_onMfaPoll = new WeakMap(), _Signer_mfaPollIntervalMs = new WeakMap(), _Signer_managementSession = new WeakMap(), _Signer_instances = new WeakSet(), _Signer_handleMfa =
142
+ /**
143
+ * If the sign request requires MFA, this method waits for approvals
144
+ *
145
+ * @param {SignResponse<U>} res The response of a sign request
146
+ * @return {Promise<U>} The sign data after MFA approvals
147
+ */
148
+ async function _Signer_handleMfa(res) {
149
+ while (res.requiresMfa()) {
150
+ await new Promise((resolve) => setTimeout(resolve, __classPrivateFieldGet(this, _Signer_mfaPollIntervalMs, "f")));
151
+ const mfaInfo = await __classPrivateFieldGet(this, _Signer_signerSession, "f").getMfaInfo(__classPrivateFieldGet(this, _Signer_managementSession, "f"), res.mfaId());
152
+ __classPrivateFieldGet(this, _Signer_onMfaPoll, "f").call(this, mfaInfo);
153
+ if (mfaInfo.receipt) {
154
+ res = await res.signWithMfaApproval(mfaInfo);
155
+ }
156
+ }
157
+ return res.data();
158
+ };
159
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/ethers/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAQgB;AA6BhB;;GAEG;AACH,MAAa,MAAO,SAAQ,eAAM,CAAC,cAAc;IAsB/C;;;;OAIG;IACH,YAAY,OAAyB,EAAE,aAA4B,EAAE,OAAuB;QAC1F,KAAK,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;;QA3B3B,iCAAiC;QACxB,kCAAiB;QAE1B,iCAAiC;QACjC,8BAAe;QAEf,6BAA6B;QACpB,wCAA8B;QAEvC;;;WAGG;QACM,oCAA2C;QAEpD,gEAAgE;QACvD,4CAA2B;QAEpC,sDAAsD;QAC7C,4CAAgC;QASvC,IAAI,OAAO,OAAO,KAAK,QAAQ,EAAE;YAC/B,uBAAA,IAAI,mBAAY,OAAO,MAAA,CAAC;SACzB;aAAM;YACL,uBAAA,IAAI,mBAAY,OAAO,CAAC,UAAU,MAAA,CAAC;YACnC,uBAAA,IAAI,eAAQ,OAAkB,MAAA,CAAC;SAChC;QACD,uBAAA,IAAI,yBAAkB,aAAa,MAAA,CAAC;QACpC,uBAAA,IAAI,qBAAc,OAAO,EAAE,SAAS,IAAI,CAAC,EAAC,8BAA8B,EAAE,EAAE,GAAE,CAAC,CAAC,MAAA,CAAC,CAAC,2DAA2D;QAC7I,uBAAA,IAAI,6BAAsB,OAAO,EAAE,iBAAiB,IAAI,IAAI,MAAA,CAAC;QAC7D,uBAAA,IAAI,6BAAsB,OAAO,EAAE,iBAAiB,MAAA,CAAC;IACvD,CAAC;IAED,sCAAsC;IACtC,KAAK,CAAC,UAAU;QACd,OAAO,uBAAA,IAAI,uBAAS,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACH,OAAO,CAAC,QAAgC;QACtC,OAAO,IAAI,MAAM,CAAC,uBAAA,IAAI,uBAAS,EAAE,uBAAA,IAAI,6BAAe,EAAE,EAAE,QAAQ,EAAE,CAAC,CAAC;IACtE,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe,CAAC,EAA6B;QACjD,0CAA0C;QAC1C,IAAI,OAAO,GAAG,EAAE,CAAC,OAAO,CAAC;QACzB,IAAI,OAAO,KAAK,SAAS,EAAE;YACzB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,UAAU,EAAE,CAAC;YAClD,OAAO,GAAG,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,GAAG,CAAC;SAC/C;QAED,sDAAsD;QACtD,MAAM,KAAK,GACT,IAAI,CAAC,QAAQ,YAAY,2BAAkB;YACzC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACrC,CAAC,CAAC,gDAAgD;gBAChD,iDAAiD;gBACjD,0CAA0C;gBAC1C,2BAAkB,CAAC,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACpE,KAAK,CAAC,IAAI,GAAG,IAAA,gBAAO,EAAC,EAAE,CAAC,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,qBAAqB;QAE/D,MAAM,GAAG,GAAmB;YAC1B,QAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;YACzB,EAAE,EAAE,KAAK;SACV,CAAC;QAEF,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,aAAa,CAAC;IAC5B,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,WAAW,CAAC,OAA4B;QAC5C,MAAM,MAAM,GAAG,eAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAC3C,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,aAAa,CACjB,MAAuB,EACvB,KAA4C,EAC5C,KAA0B;QAE1B,MAAM,MAAM,GAAG,yBAAgB,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC;QAC3D,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,QAAQ,CAAC,MAAc;QACnC,MAAM,OAAO,GAAoB;YAC/B,cAAc,EAAE,MAAM,CAAC,IAAI,CAAC,IAAA,iBAAQ,EAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;SACjE,CAAC;QACF,4CAA4C;QAC5C,IAAI,uBAAA,IAAI,mBAAK,KAAK,SAAS,EAAE;YAC3B,MAAM,GAAG,GAAG,CAAC,MAAM,uBAAA,IAAI,6BAAe,CAAC,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,WAAW,KAAK,uBAAA,IAAI,uBAAS,CAAC,CAAC;YAC5F,IAAI,GAAG,KAAK,SAAS,EAAE;gBACrB,MAAM,IAAI,KAAK,CAAC,sBAAsB,uBAAA,IAAI,uBAAS,GAAG,CAAC,CAAC;aACzD;YACD,uBAAA,IAAI,eAAQ,GAAG,MAAA,CAAC;SACjB;QAED,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,QAAQ,CAAC,uBAAA,IAAI,mBAAK,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;QAC1E,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,SAAS,CAAC;IACxB,CAAC;CAoBF;AA7JD,wBA6JC;;AAlBC;;;;;GAKG;AACH,KAAK,4BAAe,GAAoB;IACtC,OAAO,GAAG,CAAC,WAAW,EAAE,EAAE;QACxB,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,uBAAA,IAAI,iCAAmB,CAAC,CAAC,CAAC;QAE7E,MAAM,OAAO,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,UAAU,CAAC,uBAAA,IAAI,iCAAoB,EAAE,GAAG,CAAC,KAAK,EAAE,CAAC,CAAC;QAC5F,uBAAA,IAAI,yBAAW,MAAf,IAAI,EAAY,OAAO,CAAC,CAAC;QACzB,IAAI,OAAO,CAAC,OAAO,EAAE;YACnB,GAAG,GAAG,MAAM,GAAG,CAAC,mBAAmB,CAAC,OAAO,CAAC,CAAC;SAC9C;KACF;IACD,OAAO,GAAG,CAAC,IAAI,EAAE,CAAC;AACpB,CAAC","sourcesContent":["import {\n  JsonRpcApiProvider,\n  TypedDataDomain,\n  TypedDataEncoder,\n  TypedDataField,\n  ethers,\n  getBytes,\n  toBeHex,\n} from \"ethers\";\nimport {\n  BlobSignRequest,\n  EvmSignRequest,\n  MfaRequestInfo,\n  SignerSession,\n  SignResponse,\n} from \"../signer_session\";\nimport { KeyInfo } from \"../key\";\nimport { CubeSigner } from \"..\";\n\n/** Options for the signer */\ninterface SignerOptions {\n  /** Optional provider to use */\n  provider?: null | ethers.Provider;\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  onMfaPoll?: (arg0: MfaRequestInfo) => void;\n  /**\n   * The amount of time (in milliseconds) to wait between checks for MFA\n   * updates. Default is 1000ms\n   */\n  mfaPollIntervalMs?: number;\n  /** Optional management session. Used to check for MFA updates */\n  managementSession?: CubeSigner;\n}\n\n/**\n * A ethers.js Signer using CubeSigner\n */\nexport class Signer extends ethers.AbstractSigner {\n  /** The address of the account */\n  readonly #address: string;\n\n  /** The key to use for signing */\n  #key?: KeyInfo;\n\n  /** The underlying session */\n  readonly #signerSession: SignerSession;\n\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  readonly #onMfaPoll: (arg0: MfaRequestInfo) => void;\n\n  /** The amount of time to wait between checks for MFA updates */\n  readonly #mfaPollIntervalMs: number;\n\n  /** Optional management session, used for MFA flows */\n  readonly #managementSession?: CubeSigner;\n\n  /** Create new Signer instance\n   * @param {KeyInfo | string} address The key or the eth address of the account to use.\n   * @param {SignerSession} signerSession The underlying Signer session.\n   * @param {SignerOptions} options The options to use for the Signer instance\n   */\n  constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions) {\n    super(options?.provider);\n    if (typeof address === \"string\") {\n      this.#address = address;\n    } else {\n      this.#address = address.materialId;\n      this.#key = address as KeyInfo;\n    }\n    this.#signerSession = signerSession;\n    this.#onMfaPoll = options?.onMfaPoll ?? ((/* _mfaInfo: MfaRequestInfo */) => {}); // eslint-disable-line @typescript-eslint/no-empty-function\n    this.#mfaPollIntervalMs = options?.mfaPollIntervalMs ?? 1000;\n    this.#managementSession = options?.managementSession;\n  }\n\n  /** Resolves to the signer address. */\n  async getAddress(): Promise<string> {\n    return this.#address;\n  }\n\n  /**\n   *  Returns the signer connected to %%provider%%.\n   *  @param {null | ethers.Provider} provider The optional provider instance to use.\n   *  @return {Signer} The signer connected to signer.\n   */\n  connect(provider: null | ethers.Provider): Signer {\n    return new Signer(this.#address, this.#signerSession, { provider });\n  }\n\n  /**\n   * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.\n   * @param {ethers.TransactionRequest} tx The transaction to sign.\n   * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.\n   */\n  async signTransaction(tx: ethers.TransactionRequest): Promise<string> {\n    // get the chain id from the network or tx\n    let chainId = tx.chainId;\n    if (chainId === undefined) {\n      const network = await this.provider?.getNetwork();\n      chainId = network?.chainId?.toString() ?? \"1\";\n    }\n\n    // Convert the transaction into a JSON-RPC transaction\n    const rpcTx =\n      this.provider instanceof JsonRpcApiProvider\n        ? this.provider.getRpcTransaction(tx)\n        : // We can just call the getRpcTransaction with a\n          // null receiver since it doesn't actually use it\n          // (and really should be declared static).\n          JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);\n    rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]\n\n    const req = <EvmSignRequest>{\n      chain_id: Number(chainId),\n      tx: rpcTx,\n    };\n\n    const res = await this.#signerSession.signEvm(this.#address, req);\n    const data = await this.#handleMfa(res);\n    return data.rlp_signed_tx;\n  }\n\n  /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)\n   * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {string | Uint8Array} message The message to sign.\n   * @return {Promise<string>} The signature.\n   */\n  async signMessage(message: string | Uint8Array): Promise<string> {\n    const digest = ethers.hashMessage(message);\n    return this.signBlob(digest);\n  }\n\n  /** Signs EIP-712 typed data. This uses ethers.js's\n   * [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)\n   * to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {TypedDataDomain} domain The domain of the typed data.\n   * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.\n   * @param {Record<string, any>} value The value of the typed data.\n   * @return {Promise<string>} The signature.\n   */\n  async signTypedData(\n    domain: TypedDataDomain,\n    types: Record<string, Array<TypedDataField>>,\n    value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any\n  ): Promise<string> {\n    const digest = TypedDataEncoder.hash(domain, types, value);\n    return this.signBlob(digest);\n  }\n\n  /** Sign arbitrary digest. This uses {@link Key#signBlob}.\n   * @param {string} digest The digest to sign.\n   * @return {Promise<string>} The signature.\n   */\n  private async signBlob(digest: string): Promise<string> {\n    const blobReq = <BlobSignRequest>{\n      message_base64: Buffer.from(getBytes(digest)).toString(\"base64\"),\n    };\n    // Get the key corresponding to this address\n    if (this.#key === undefined) {\n      const key = (await this.#signerSession.keys()).find((k) => k.material_id === this.#address);\n      if (key === undefined) {\n        throw new Error(`Cannot access key '${this.#address}'`);\n      }\n      this.#key = key;\n    }\n\n    const res = await this.#signerSession.signBlob(this.#key.key_id, blobReq);\n    const data = await this.#handleMfa(res);\n    return data.signature;\n  }\n\n  /**\n   * If the sign request requires MFA, this method waits for approvals\n   *\n   * @param {SignResponse<U>} res The response of a sign request\n   * @return {Promise<U>} The sign data after MFA approvals\n   */\n  async #handleMfa<U>(res: SignResponse<U>): Promise<U> {\n    while (res.requiresMfa()) {\n      await new Promise((resolve) => setTimeout(resolve, this.#mfaPollIntervalMs));\n\n      const mfaInfo = await this.#signerSession.getMfaInfo(this.#managementSession!, res.mfaId());\n      this.#onMfaPoll(mfaInfo);\n      if (mfaInfo.receipt) {\n        res = await res.signWithMfaApproval(mfaInfo);\n      }\n    }\n    return res.data();\n  }\n}\n"]}
@@ -1,34 +1,35 @@
1
1
  import { EnvInterface } from "./env";
2
- import { components, Client } from "./client";
2
+ import { components, Client, paths } from "./client";
3
3
  import { Org } from "./org";
4
- import { SignerSessionStorage } from "./session/signer_session_manager";
5
- import { SignerSession } from "./signer_session";
6
- import { ManagementSessionManager, ManagementSessionStorage } from "./session/management_session_manager";
7
- import { OidcSessionManager, OidcSessionStorage } from "./session/oidc_session_manager";
4
+ import { SignerSessionStorage, SignerSessionManager } from "./session/signer_session_manager";
5
+ import { MfaRequestInfo, SignResponse, SignerSession } from "./signer_session";
6
+ import { CognitoSessionManager, CognitoSessionStorage } from "./session/cognito_manager";
8
7
  /** CubeSigner constructor options */
9
8
  export interface CubeSignerOptions {
10
9
  /** The environment to use */
11
10
  env?: EnvInterface;
12
11
  /** The management authorization token */
13
- sessionMgr?: ManagementSessionManager | OidcSessionManager;
12
+ sessionMgr?: CognitoSessionManager | SignerSessionManager;
14
13
  }
15
14
  export type UserInfo = components["schemas"]["UserInfo"];
16
15
  export type TotpInfo = components["responses"]["TotpInfo"]["content"]["application/json"];
17
16
  export type ConfiguredMfa = components["schemas"]["ConfiguredMfa"];
17
+ export type RatchetConfig = components["schemas"]["RatchetConfig"];
18
+ type OidcAuthResponse = paths["/v0/org/{org_id}/oidc"]["post"]["responses"]["200"]["content"]["application/json"];
18
19
  /** CubeSigner client */
19
20
  export declare class CubeSigner {
20
21
  #private;
21
- readonly sessionMgr?: ManagementSessionManager | OidcSessionManager;
22
+ readonly sessionMgr?: CognitoSessionManager | SignerSessionManager;
22
23
  /** @return {EnvInterface} The CubeSigner environment of this client */
23
24
  get env(): EnvInterface;
24
25
  /**
25
26
  * Loads an existing management session and creates a CubeSigner instance.
26
- * @param {ManagementSessionStorage} storage Optional session storage to load
27
+ * @param {CognitoSessionStorage} storage Optional session storage to load
27
28
  * the session from. If not specified, the management session from the config
28
29
  * directory will be loaded.
29
30
  * @return {Promise<CubeSigner>} New CubeSigner instance
30
31
  */
31
- static loadManagementSession(storage?: ManagementSessionStorage): Promise<CubeSigner>;
32
+ static loadManagementSession(storage?: CognitoSessionStorage): Promise<CubeSigner>;
32
33
  /**
33
34
  * Loads a signer session from a session storage (e.g., session file).
34
35
  * @param {SignerSessionStorage} storage Optional session storage to load
@@ -37,37 +38,38 @@ export declare class CubeSigner {
37
38
  * @return {Promise<SignerSession>} New signer session
38
39
  */
39
40
  static loadSignerSession(storage?: SignerSessionStorage): Promise<SignerSession>;
40
- /**
41
- * Loads a signer session from OIDC storage
42
- * @param {OidcSessionStorage} storage The storage to load from
43
- * @return {Promise<SignerSession>} New signer session
44
- */
45
- static loadOidcSession(storage: OidcSessionStorage): Promise<SignerSession>;
46
41
  /**
47
42
  * Create a new CubeSigner instance.
48
- * @param {CubeSignerOptions} options The options for the CubeSigner instance.
43
+ * @param {CubeSignerOptions} options The optional configuraiton options for the CubeSigner instance.
49
44
  */
50
- constructor(options: CubeSignerOptions);
45
+ constructor(options?: CubeSignerOptions);
51
46
  /**
52
- * Authenticate an OIDC user and create a new OIDC session manager for them.
47
+ * Authenticate an OIDC user and create a new session manager for them.
53
48
  * @param {string} oidcToken The OIDC token
54
49
  * @param {string} orgId The id of the organization that the user is in
55
50
  * @param {List<string>} scopes The scopes of the resulting session
56
- * @param {OidcSessionStorage} storage The signer session storage
57
- * @return {Promise<OidcSessionManager>} The OIDC session manager
51
+ * @param {RatchetConfig} lifetimes Lifetimes of the new session.
52
+ * @param {SignerSessionStorage?} storage Optional signer session storage (defaults to in-memory storage)
53
+ * @return {Promise<SignerSessionManager>} The signer session manager
58
54
  */
59
- createOidcManager(oidcToken: string, orgId: string, scopes: Array<string>, storage?: OidcSessionStorage): Promise<OidcSessionManager>;
60
- /**
61
- * Authenticate an OIDC user and create a new session for them.
62
- * @param {string} oidcToken The OIDC token
63
- * @param {string} orgId The id of the organization that the user is in
64
- * @param {List<string>} scopes The scopes of the resulting session
65
- * @param {OidcSessionStorage} storage The signer session storage
66
- * @return {Promise<SignerSession>} The signer session
67
- */
68
- createOidcSession(oidcToken: string, orgId: string, scopes: Array<string>, storage?: OidcSessionStorage): Promise<SignerSession>;
55
+ oidcAuth(oidcToken: string, orgId: string, scopes: Array<string>, lifetimes?: RatchetConfig, storage?: SignerSessionStorage): Promise<SignerSessionManager>;
69
56
  /** Retrieves information about the current user. */
70
57
  aboutMe(): Promise<UserInfo>;
58
+ /**
59
+ * Creates and sets a new TOTP configuration for the logged in user,
60
+ * if and only if no TOTP configuration is already set.
61
+ *
62
+ * @return {Promise<TotpInfo>} Newly created TOTP configuration.
63
+ */
64
+ initTotp(): Promise<TotpInfo>;
65
+ /**
66
+ * Retrieves existing MFA request.
67
+ *
68
+ * @param {string} orgId Organization ID
69
+ * @param {string} mfaId MFA request ID
70
+ * @return {Promise<MfaRequestInfo>} MFA request information
71
+ */
72
+ mfaGet(orgId: string, mfaId: string): Promise<MfaRequestInfo>;
71
73
  /**
72
74
  * Creates and sets a new TOTP configuration for the logged-in user,
73
75
  * overriding the existing one (if any).
@@ -89,6 +91,23 @@ export declare class CubeSigner {
89
91
  * @internal
90
92
  * */
91
93
  management(): Promise<Client>;
94
+ /**
95
+ * Exchange an OIDC token for a CubeSigner session token.
96
+ * @param {string} oidcToken The OIDC token
97
+ * @param {string} orgId The id of the organization that the user is in
98
+ * @param {List<string>} scopes The scopes of the resulting session
99
+ * @param {RatchetConfig} lifetimes Lifetimes of the new session.
100
+ * @param {MfaReceipt} mfaReceipt Optional MFA receipt (id + confirmation code)
101
+ * @return {Promise<SignResponse<OidcAuthResponse>>} The session data.
102
+ */
103
+ oidcLogin(oidcToken: string, orgId: string, scopes: Array<string>, lifetimes?: RatchetConfig, mfaReceipt?: MfaReceipt): Promise<SignResponse<OidcAuthResponse>>;
104
+ }
105
+ /** MFA receipt */
106
+ export interface MfaReceipt {
107
+ /** MFA request ID */
108
+ mfaId: string;
109
+ /** MFA confirmation code */
110
+ mfaConf: string;
92
111
  }
93
112
  /** Organizations */
94
113
  export * from "./org";
@@ -105,9 +124,7 @@ export * from "./session/session_storage";
105
124
  /** Session manager */
106
125
  export * from "./session/session_manager";
107
126
  /** Management session manager */
108
- export * from "./session/management_session_manager";
109
- /** OIDC session manager */
110
- export * from "./session/oidc_session_manager";
127
+ export * from "./session/cognito_manager";
111
128
  /** Signer session manager */
112
129
  export * from "./session/signer_session_manager";
113
130
  /** Export ethers.js Signer */