@cubist-labs/cubesigner-sdk 0.1.23

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (64) hide show
  1. package/LICENSE-APACHE +177 -0
  2. package/LICENSE-MIT +25 -0
  3. package/NOTICE +13 -0
  4. package/README.md +470 -0
  5. package/dist/examples/ethers.d.ts +1 -0
  6. package/dist/examples/ethers.js +142 -0
  7. package/dist/spec/env/beta.json +9 -0
  8. package/dist/spec/env/gamma.json +9 -0
  9. package/dist/spec/env/prod.json +9 -0
  10. package/dist/src/client.d.ts +10 -0
  11. package/dist/src/client.js +21 -0
  12. package/dist/src/env.d.ts +15 -0
  13. package/dist/src/env.js +35 -0
  14. package/dist/src/ethers/index.d.ts +50 -0
  15. package/dist/src/ethers/index.js +122 -0
  16. package/dist/src/index.d.ts +114 -0
  17. package/dist/src/index.js +205 -0
  18. package/dist/src/key.d.ts +114 -0
  19. package/dist/src/key.js +201 -0
  20. package/dist/src/mfa.d.ts +23 -0
  21. package/dist/src/mfa.js +63 -0
  22. package/dist/src/org.d.ts +161 -0
  23. package/dist/src/org.js +264 -0
  24. package/dist/src/role.d.ts +224 -0
  25. package/dist/src/role.js +256 -0
  26. package/dist/src/schema.d.ts +3049 -0
  27. package/dist/src/schema.js +7 -0
  28. package/dist/src/session/generic.d.ts +47 -0
  29. package/dist/src/session/generic.js +3 -0
  30. package/dist/src/session/management_session_manager.d.ts +59 -0
  31. package/dist/src/session/management_session_manager.js +111 -0
  32. package/dist/src/session/oidc_session_manager.d.ts +78 -0
  33. package/dist/src/session/oidc_session_manager.js +142 -0
  34. package/dist/src/session/session_manager.d.ts +74 -0
  35. package/dist/src/session/session_manager.js +79 -0
  36. package/dist/src/session/session_storage.d.ts +47 -0
  37. package/dist/src/session/session_storage.js +76 -0
  38. package/dist/src/session/signer_session_manager.d.ts +88 -0
  39. package/dist/src/session/signer_session_manager.js +159 -0
  40. package/dist/src/sign.d.ts +114 -0
  41. package/dist/src/sign.js +248 -0
  42. package/dist/src/signer_session.d.ts +180 -0
  43. package/dist/src/signer_session.js +369 -0
  44. package/dist/src/util.d.ts +35 -0
  45. package/dist/src/util.js +75 -0
  46. package/dist/test/sessions.d.ts +35 -0
  47. package/dist/test/sessions.js +56 -0
  48. package/package.json +61 -0
  49. package/src/client.ts +12 -0
  50. package/src/env.ts +25 -0
  51. package/src/ethers/index.ts +131 -0
  52. package/src/index.ts +220 -0
  53. package/src/key.ts +249 -0
  54. package/src/org.ts +333 -0
  55. package/src/role.ts +385 -0
  56. package/src/schema.ts +3054 -0
  57. package/src/session/management_session_manager.ts +136 -0
  58. package/src/session/oidc_session_manager.ts +193 -0
  59. package/src/session/session_manager.ts +114 -0
  60. package/src/session/session_storage.ts +73 -0
  61. package/src/session/signer_session_manager.ts +211 -0
  62. package/src/signer_session.ts +464 -0
  63. package/src/util.ts +58 -0
  64. package/tsconfig.json +32 -0
@@ -0,0 +1,142 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __importStar = (this && this.__importStar) || function (mod) {
19
+ if (mod && mod.__esModule) return mod;
20
+ var result = {};
21
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
+ __setModuleDefault(result, mod);
23
+ return result;
24
+ };
25
+ Object.defineProperty(exports, "__esModule", { value: true });
26
+ const cs = __importStar(require("../src/index"));
27
+ const ethers_1 = require("ethers");
28
+ const WALLET_ADDRESS = env("WALLET_ADDRESS");
29
+ const RECIPIENT = env("RECIPIENT");
30
+ const RPC_PROVIDER = env("RPC_PROVIDER", "https://rpc.ankr.com/eth_goerli");
31
+ const AMOUNT = ethers_1.ethers.parseEther(env("AMOUNT", "0.0000001"));
32
+ const CUBE_SIGNER_TOKEN = env("CUBE_SIGNER_TOKEN", null /* load from fs */);
33
+ // create like CUBE_SIGNER_TOKEN=$(cs token create ... --output base64)
34
+ /** Main entry point */
35
+ async function main() {
36
+ // If token is passed via env variable, decode and parse it,
37
+ // otherwise just load token from default filesystem location.
38
+ const memStorage = CUBE_SIGNER_TOKEN
39
+ ? new cs.MemorySessionStorage(JSON.parse(atob(CUBE_SIGNER_TOKEN)))
40
+ : undefined;
41
+ // Load signer session
42
+ const signerSession = await cs.CubeSigner.loadSignerSession(memStorage);
43
+ const provider = new ethers_1.ethers.JsonRpcProvider(RPC_PROVIDER);
44
+ const signer = new EthersCubeSinger(WALLET_ADDRESS, signerSession, provider);
45
+ // get balance
46
+ const addr = await signer.getAddress();
47
+ console.log(`${addr} has ${await provider.getBalance(addr)} gwei`);
48
+ console.log(`Transferring ${AMOUNT} wei from ${addr} to ${RECIPIENT}...`);
49
+ const tx = {
50
+ to: RECIPIENT,
51
+ value: AMOUNT,
52
+ };
53
+ const response = await signer.sendTransaction(tx);
54
+ await response.wait();
55
+ // get new balance
56
+ console.log(`${addr} has ${await provider.getBalance(addr)} gwei`);
57
+ }
58
+ main().catch((err) => {
59
+ console.error(err);
60
+ process.exit(1);
61
+ });
62
+ /**
63
+ * A bare-bones ethers.Signer implementation that uses EthersCubeSinger to sign transactions.
64
+ */
65
+ class EthersCubeSinger extends ethers_1.ethers.AbstractSigner {
66
+ /** Create new EthersCubeSinger ethers.Signer instance
67
+ * @param {string} address The address of the account touser.
68
+ * @param {cs.SignerSession<cs.SignerSessionObject>} signerSession The underlying EthersCubeSinger session.
69
+ * @param {null | ethers.Provider} provider The optional provider instance to use.
70
+ */
71
+ constructor(address, signerSession, provider) {
72
+ super(provider);
73
+ this.address = address;
74
+ this.signerSession = signerSession;
75
+ }
76
+ /** Resolves to the signer address. */
77
+ async getAddress() {
78
+ return this.address;
79
+ }
80
+ /**
81
+ * Returns the signer connected to %%provider%%.
82
+ * @param {null | ethers.Provider} provider The optional provider instance to use.
83
+ * @return {EthersCubeSinger} The signer connected to signer.
84
+ */
85
+ connect(provider) {
86
+ return new EthersCubeSinger(this.address, this.signerSession, provider);
87
+ }
88
+ /**
89
+ * Signs a transaction.
90
+ * @param {ethers.TransactionRequest} tx The transaction to sign.
91
+ * @return {Promise<string>} The signature.
92
+ */
93
+ async signTransaction(tx) {
94
+ // get the chain id from the network or tx
95
+ let chainId = tx.chainId;
96
+ if (chainId === undefined) {
97
+ const network = await this.provider?.getNetwork();
98
+ const id = network?.chainId;
99
+ if (id === undefined) {
100
+ throw new Error("Missing chainId");
101
+ }
102
+ chainId = id.toString();
103
+ }
104
+ // Convert the transaction into a JSON-RPC transaction
105
+ const rpcTx = this.provider instanceof ethers_1.JsonRpcApiProvider
106
+ ? this.provider.getRpcTransaction(tx)
107
+ : // We can just call the getRpcTransaction with a
108
+ // null receiver since it doesn't actually use it
109
+ // (and really should be declared static).
110
+ ethers_1.JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);
111
+ rpcTx.type = (0, ethers_1.toBeHex)(tx.type ?? 0x02, 1); // we expect 0x0[0-2]
112
+ const req = {
113
+ chain_id: Number(chainId),
114
+ tx: rpcTx,
115
+ };
116
+ const sig = await this.signerSession.signEth1(this.address, req);
117
+ return sig.data().rlp_signed_tx;
118
+ }
119
+ /** Signs arbitrary message. Not yet implemented. */
120
+ async signMessage() {
121
+ throw new Error("Method not implemented.");
122
+ }
123
+ /** Signs typed data. Not yet implemented. */
124
+ signTypedData() {
125
+ throw new Error("Method not implemented.");
126
+ }
127
+ }
128
+ /**
129
+ * Returns the value of the environment variable.
130
+ * @param {string} name The name of the environment variable.
131
+ * @param {string} fallback The optional fallback value.
132
+ * @return {string} The value of the environment variable, the fallback, or undefined.
133
+ * @throws {Error} If the environment variable is not set and no fallback is provided.
134
+ */
135
+ function env(name, fallback) {
136
+ const val = process.env[name] ?? fallback;
137
+ if (val === undefined) {
138
+ throw new Error(`Missing environment variable ${name}`);
139
+ }
140
+ return val;
141
+ }
142
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"ethers.js","sourceRoot":"","sources":["../../examples/ethers.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;AAAA,iDAAmC;AACnC,mCAA6D;AAE7D,MAAM,cAAc,GAAW,GAAG,CAAC,gBAAgB,CAAE,CAAC;AACtD,MAAM,SAAS,GAAW,GAAG,CAAC,WAAW,CAAE,CAAC;AAC5C,MAAM,YAAY,GAAW,GAAG,CAAC,cAAc,EAAE,iCAAiC,CAAE,CAAC;AACrF,MAAM,MAAM,GAAW,eAAM,CAAC,UAAU,CAAC,GAAG,CAAC,QAAQ,EAAE,WAAW,CAAE,CAAC,CAAC;AACtE,MAAM,iBAAiB,GAAG,GAAG,CAAC,mBAAmB,EAAE,IAAI,CAAC,kBAAkB,CAAC,CAAC;AAC5E,uEAAuE;AAEvE,uBAAuB;AACvB,KAAK,UAAU,IAAI;IACjB,4DAA4D;IAC5D,8DAA8D;IAC9D,MAAM,UAAU,GAAG,iBAAiB;QAClC,CAAC,CAAC,IAAI,EAAE,CAAC,oBAAoB,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC;QAClE,CAAC,CAAC,SAAS,CAAC;IACd,sBAAsB;IACtB,MAAM,aAAa,GAAG,MAAM,EAAE,CAAC,UAAU,CAAC,iBAAiB,CAAC,UAAU,CAAC,CAAC;IAExE,MAAM,QAAQ,GAAG,IAAI,eAAM,CAAC,eAAe,CAAC,YAAY,CAAC,CAAC;IAC1D,MAAM,MAAM,GAAG,IAAI,gBAAgB,CAAC,cAAc,EAAE,aAAa,EAAE,QAAQ,CAAC,CAAC;IAE7E,cAAc;IACd,MAAM,IAAI,GAAG,MAAM,MAAM,CAAC,UAAU,EAAE,CAAC;IACvC,OAAO,CAAC,GAAG,CAAC,GAAG,IAAI,QAAQ,MAAM,QAAQ,CAAC,UAAU,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;IAEnE,OAAO,CAAC,GAAG,CAAC,gBAAgB,MAAM,aAAa,IAAI,OAAO,SAAS,KAAK,CAAC,CAAC;IAE1E,MAAM,EAAE,GAAG;QACT,EAAE,EAAE,SAAS;QACb,KAAK,EAAE,MAAM;KACd,CAAC;IAEF,MAAM,QAAQ,GAAG,MAAM,MAAM,CAAC,eAAe,CAAC,EAAE,CAAC,CAAC;IAClD,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;IAEtB,kBAAkB;IAClB,OAAO,CAAC,GAAG,CAAC,GAAG,IAAI,QAAQ,MAAM,QAAQ,CAAC,UAAU,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;AACrE,CAAC;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,CAAC,GAAU,EAAE,EAAE;IAC1B,OAAO,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;IACnB,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;AAClB,CAAC,CAAC,CAAC;AAEH;;GAEG;AACH,MAAM,gBAAiB,SAAQ,eAAM,CAAC,cAAc;IAOlD;;;;OAIG;IACH,YAAY,OAAe,EAAE,aAA+B,EAAE,QAAiC;QAC7F,KAAK,CAAC,QAAQ,CAAC,CAAC;QAChB,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QACvB,IAAI,CAAC,aAAa,GAAG,aAAa,CAAC;IACrC,CAAC;IAED,sCAAsC;IACtC,KAAK,CAAC,UAAU;QACd,OAAO,IAAI,CAAC,OAAO,CAAC;IACtB,CAAC;IAED;;;;OAIG;IACH,OAAO,CAAC,QAAgC;QACtC,OAAO,IAAI,gBAAgB,CAAC,IAAI,CAAC,OAAO,EAAE,IAAI,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC;IAC1E,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe,CAAC,EAA6B;QACjD,0CAA0C;QAC1C,IAAI,OAAO,GAAG,EAAE,CAAC,OAAO,CAAC;QACzB,IAAI,OAAO,KAAK,SAAS,EAAE;YACzB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,UAAU,EAAE,CAAC;YAClD,MAAM,EAAE,GAAG,OAAO,EAAE,OAAO,CAAC;YAC5B,IAAI,EAAE,KAAK,SAAS,EAAE;gBACpB,MAAM,IAAI,KAAK,CAAC,iBAAiB,CAAC,CAAC;aACpC;YACD,OAAO,GAAG,EAAE,CAAC,QAAQ,EAAE,CAAC;SACzB;QAED,sDAAsD;QACtD,MAAM,KAAK,GACT,IAAI,CAAC,QAAQ,YAAY,2BAAkB;YACzC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACrC,CAAC,CAAC,gDAAgD;gBAChD,iDAAiD;gBACjD,0CAA0C;gBAC1C,2BAAkB,CAAC,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACpE,KAAK,CAAC,IAAI,GAAG,IAAA,gBAAO,EAAC,EAAE,CAAC,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,qBAAqB;QAE/D,MAAM,GAAG,GAAuB;YAC9B,QAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;YACzB,EAAE,EAAE,KAAK;SACV,CAAC;QACF,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,IAAI,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;QACjE,OAAO,GAAG,CAAC,IAAI,EAAE,CAAC,aAAa,CAAC;IAClC,CAAC;IAED,oDAAoD;IACpD,KAAK,CAAC,WAAW;QACf,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;IAC7C,CAAC;IAED,6CAA6C;IAC7C,aAAa;QACX,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;IAC7C,CAAC;CACF;AAED;;;;;;GAMG;AACH,SAAS,GAAG,CAAC,IAAY,EAAE,QAAwB;IACjD,MAAM,GAAG,GAAG,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,IAAI,QAAQ,CAAC;IAC1C,IAAI,GAAG,KAAK,SAAS,EAAE;QACrB,MAAM,IAAI,KAAK,CAAC,gCAAgC,IAAI,EAAE,CAAC,CAAC;KACzD;IACD,OAAO,GAAG,CAAC;AACb,CAAC","sourcesContent":["import * as cs from \"../src/index\";\nimport { JsonRpcApiProvider, ethers, toBeHex } from \"ethers\";\n\nconst WALLET_ADDRESS: string = env(\"WALLET_ADDRESS\")!;\nconst RECIPIENT: string = env(\"RECIPIENT\")!;\nconst RPC_PROVIDER: string = env(\"RPC_PROVIDER\", \"https://rpc.ankr.com/eth_goerli\")!;\nconst AMOUNT: bigint = ethers.parseEther(env(\"AMOUNT\", \"0.0000001\")!);\nconst CUBE_SIGNER_TOKEN = env(\"CUBE_SIGNER_TOKEN\", null /* load from fs */);\n// create like CUBE_SIGNER_TOKEN=$(cs token create ... --output base64)\n\n/** Main entry point */\nasync function main() {\n  // If token is passed via env variable, decode and parse it,\n  // otherwise just load token from default filesystem location.\n  const memStorage = CUBE_SIGNER_TOKEN\n    ? new cs.MemorySessionStorage(JSON.parse(atob(CUBE_SIGNER_TOKEN)))\n    : undefined;\n  // Load signer session\n  const signerSession = await cs.CubeSigner.loadSignerSession(memStorage);\n\n  const provider = new ethers.JsonRpcProvider(RPC_PROVIDER);\n  const signer = new EthersCubeSinger(WALLET_ADDRESS, signerSession, provider);\n\n  // get balance\n  const addr = await signer.getAddress();\n  console.log(`${addr} has ${await provider.getBalance(addr)} gwei`);\n\n  console.log(`Transferring ${AMOUNT} wei from ${addr} to ${RECIPIENT}...`);\n\n  const tx = {\n    to: RECIPIENT,\n    value: AMOUNT,\n  };\n\n  const response = await signer.sendTransaction(tx);\n  await response.wait();\n\n  // get new balance\n  console.log(`${addr} has ${await provider.getBalance(addr)} gwei`);\n}\n\nmain().catch((err: Error) => {\n  console.error(err);\n  process.exit(1);\n});\n\n/**\n * A bare-bones ethers.Signer implementation that uses EthersCubeSinger to sign transactions.\n */\nclass EthersCubeSinger extends ethers.AbstractSigner {\n  /** The address of the account */\n  readonly address!: string;\n\n  /** The underlying EthersCubeSinger session */\n  readonly signerSession!: cs.SignerSession;\n\n  /** Create new EthersCubeSinger ethers.Signer instance\n   * @param {string} address The address of the account touser.\n   * @param {cs.SignerSession<cs.SignerSessionObject>} signerSession The underlying EthersCubeSinger session.\n   * @param {null | ethers.Provider} provider The optional provider instance to use.\n   */\n  constructor(address: string, signerSession: cs.SignerSession, provider?: null | ethers.Provider) {\n    super(provider);\n    this.address = address;\n    this.signerSession = signerSession;\n  }\n\n  /** Resolves to the signer address. */\n  async getAddress(): Promise<string> {\n    return this.address;\n  }\n\n  /**\n   *  Returns the signer connected to %%provider%%.\n   *  @param {null | ethers.Provider} provider The optional provider instance to use.\n   *  @return {EthersCubeSinger} The signer connected to signer.\n   */\n  connect(provider: null | ethers.Provider): EthersCubeSinger {\n    return new EthersCubeSinger(this.address, this.signerSession, provider);\n  }\n\n  /**\n   * Signs a transaction.\n   * @param {ethers.TransactionRequest} tx The transaction to sign.\n   * @return {Promise<string>} The signature.\n   */\n  async signTransaction(tx: ethers.TransactionRequest): Promise<string> {\n    // get the chain id from the network or tx\n    let chainId = tx.chainId;\n    if (chainId === undefined) {\n      const network = await this.provider?.getNetwork();\n      const id = network?.chainId;\n      if (id === undefined) {\n        throw new Error(\"Missing chainId\");\n      }\n      chainId = id.toString();\n    }\n\n    // Convert the transaction into a JSON-RPC transaction\n    const rpcTx =\n      this.provider instanceof JsonRpcApiProvider\n        ? this.provider.getRpcTransaction(tx)\n        : // We can just call the getRpcTransaction with a\n          // null receiver since it doesn't actually use it\n          // (and really should be declared static).\n          JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);\n    rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]\n\n    const req = <cs.Eth1SignRequest>{\n      chain_id: Number(chainId),\n      tx: rpcTx,\n    };\n    const sig = await this.signerSession.signEth1(this.address, req);\n    return sig.data().rlp_signed_tx;\n  }\n\n  /** Signs arbitrary message. Not yet implemented. */\n  async signMessage(): Promise<string> {\n    throw new Error(\"Method not implemented.\");\n  }\n\n  /** Signs typed data. Not yet implemented. */\n  signTypedData(): Promise<string> {\n    throw new Error(\"Method not implemented.\");\n  }\n}\n\n/**\n * Returns the value of the environment variable.\n * @param {string} name The name of the environment variable.\n * @param {string} fallback The optional fallback value.\n * @return {string} The value of the environment variable, the fallback, or undefined.\n * @throws {Error} If the environment variable is not set and no fallback is provided.\n */\nfunction env(name: string, fallback?: string | null): string | null {\n  const val = process.env[name] ?? fallback;\n  if (val === undefined) {\n    throw new Error(`Missing environment variable ${name}`);\n  }\n  return val;\n}\n"]}
@@ -0,0 +1,9 @@
1
+ {
2
+ "Dev-CubeSignerStack": {
3
+ "ClientId": "405mhvv13llufju1ruvnq42rdc",
4
+ "LongLivedClientId": "6he1bnm17s0dv8bb4hjim6fs6i",
5
+ "Region": "us-east-1",
6
+ "UserPoolId": "us-east-1_79ljlRRfX",
7
+ "SignerApiRoot": "https://beta.signer.cubist.dev"
8
+ }
9
+ }
@@ -0,0 +1,9 @@
1
+ {
2
+ "Dev-CubeSignerStack": {
3
+ "ClientId": "1tiou9ecj058khiidmhj4ds4rj",
4
+ "LongLivedClientId": "4jiuai7mtl5164of3drmvej234",
5
+ "Region": "us-east-1",
6
+ "UserPoolId": "us-east-1_RU7HEslOW",
7
+ "SignerApiRoot": "https://gamma.signer.cubist.dev"
8
+ }
9
+ }
@@ -0,0 +1,9 @@
1
+ {
2
+ "Dev-CubeSignerStack": {
3
+ "ClientId": "2saesgbmeu8p981sk33sr6nq1j",
4
+ "LongLivedClientId": "79qoe43lbiphd7jv0emqadtoia",
5
+ "Region": "us-east-1",
6
+ "UserPoolId": "us-east-1_lLLal8vGd",
7
+ "SignerApiRoot": "https://prod.signer.cubist.dev"
8
+ }
9
+ }
@@ -0,0 +1,10 @@
1
+ import createClient from "openapi-fetch";
2
+ import { paths } from "./schema";
3
+ /** Type of http client.
4
+ * @internal
5
+ * */
6
+ export type Client = ReturnType<typeof createClient<paths>>;
7
+ /** Re-export schema.
8
+ * @internal
9
+ * */
10
+ export * from "./schema";
@@ -0,0 +1,21 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __exportStar = (this && this.__exportStar) || function(m, exports) {
14
+ for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
15
+ };
16
+ Object.defineProperty(exports, "__esModule", { value: true });
17
+ /** Re-export schema.
18
+ * @internal
19
+ * */
20
+ __exportStar(require("./schema"), exports);
21
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,15 @@
1
+ export type Environment =
2
+ /** Production environment */
3
+ "prod"
4
+ /** Gamma, staging environment */
5
+ | "gamma"
6
+ /** Beta, development environment */
7
+ | "beta";
8
+ export interface EnvInterface {
9
+ ClientId: string;
10
+ LongLivedClientId: string;
11
+ Region: string;
12
+ UserPoolId: string;
13
+ SignerApiRoot: string;
14
+ }
15
+ export declare const envs: Record<Environment, EnvInterface>;
@@ -0,0 +1,35 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __importStar = (this && this.__importStar) || function (mod) {
19
+ if (mod && mod.__esModule) return mod;
20
+ var result = {};
21
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
+ __setModuleDefault(result, mod);
23
+ return result;
24
+ };
25
+ Object.defineProperty(exports, "__esModule", { value: true });
26
+ exports.envs = void 0;
27
+ const prodSpec = __importStar(require("../spec/env/prod.json"));
28
+ const gammaSpec = __importStar(require("../spec/env/gamma.json"));
29
+ const betaSpec = __importStar(require("../spec/env/beta.json"));
30
+ exports.envs = {
31
+ prod: prodSpec["Dev-CubeSignerStack"],
32
+ gamma: gammaSpec["Dev-CubeSignerStack"],
33
+ beta: betaSpec["Dev-CubeSignerStack"],
34
+ };
35
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,50 @@
1
+ import { TypedDataDomain, TypedDataField, ethers } from "ethers";
2
+ import { SignerSession } from "../signer_session";
3
+ /**
4
+ * A ethers.js Signer using CubeSigner
5
+ */
6
+ export declare class Signer extends ethers.AbstractSigner {
7
+ #private;
8
+ /** Create new Signer instance
9
+ * @param {string} address The address of the account to use.
10
+ * @param {SignerSession} signerSession The underlying Signer session.
11
+ * @param {null | ethers.Provider} provider The optional provider instance to use.
12
+ */
13
+ constructor(address: string, signerSession: SignerSession, provider?: null | ethers.Provider);
14
+ /** Resolves to the signer address. */
15
+ getAddress(): Promise<string>;
16
+ /**
17
+ * Returns the signer connected to %%provider%%.
18
+ * @param {null | ethers.Provider} provider The optional provider instance to use.
19
+ * @return {Signer} The signer connected to signer.
20
+ */
21
+ connect(provider: null | ethers.Provider): Signer;
22
+ /**
23
+ * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.
24
+ * @param {ethers.TransactionRequest} tx The transaction to sign.
25
+ * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
26
+ */
27
+ signTransaction(tx: ethers.TransactionRequest): Promise<string>;
28
+ /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)
29
+ * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.
30
+ * The key (for this session) must have the `"AllowRawBlobSigning"` policy attached.
31
+ * @param {string | Uint8Array} message The message to sign.
32
+ * @return {Promise<string>} The signature.
33
+ */
34
+ signMessage(message: string | Uint8Array): Promise<string>;
35
+ /** Signs EIP-712 typed data. This uses ethers.js's
36
+ * [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)
37
+ * to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.
38
+ * The key (for this session) must have the `"AllowRawBlobSigning"` policy attached.
39
+ * @param {TypedDataDomain} domain The domain of the typed data.
40
+ * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.
41
+ * @param {Record<string, any>} value The value of the typed data.
42
+ * @return {Promise<string>} The signature.
43
+ */
44
+ signTypedData(domain: TypedDataDomain, types: Record<string, Array<TypedDataField>>, value: Record<string, any>): Promise<string>;
45
+ /** Sign arbitrary digest. This uses {@link Key#signBlob}.
46
+ * @param {string} digest The digest to sign.
47
+ * @return {Promise<string>} The signature.
48
+ */
49
+ private signBlob;
50
+ }
@@ -0,0 +1,122 @@
1
+ "use strict";
2
+ var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
3
+ if (kind === "m") throw new TypeError("Private method is not writable");
4
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
5
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
6
+ return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
7
+ };
8
+ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
9
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
10
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
11
+ return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
12
+ };
13
+ var _Signer_address, _Signer_key, _Signer_signerSession;
14
+ Object.defineProperty(exports, "__esModule", { value: true });
15
+ exports.Signer = void 0;
16
+ const ethers_1 = require("ethers");
17
+ /**
18
+ * A ethers.js Signer using CubeSigner
19
+ */
20
+ class Signer extends ethers_1.ethers.AbstractSigner {
21
+ /** Create new Signer instance
22
+ * @param {string} address The address of the account to use.
23
+ * @param {SignerSession} signerSession The underlying Signer session.
24
+ * @param {null | ethers.Provider} provider The optional provider instance to use.
25
+ */
26
+ constructor(address, signerSession, provider) {
27
+ super(provider);
28
+ /** The address of the account */
29
+ _Signer_address.set(this, void 0);
30
+ /** The key to use for signing */
31
+ _Signer_key.set(this, void 0);
32
+ /** The underlying session */
33
+ _Signer_signerSession.set(this, void 0);
34
+ __classPrivateFieldSet(this, _Signer_address, address, "f");
35
+ __classPrivateFieldSet(this, _Signer_signerSession, signerSession, "f");
36
+ }
37
+ /** Resolves to the signer address. */
38
+ async getAddress() {
39
+ return __classPrivateFieldGet(this, _Signer_address, "f");
40
+ }
41
+ /**
42
+ * Returns the signer connected to %%provider%%.
43
+ * @param {null | ethers.Provider} provider The optional provider instance to use.
44
+ * @return {Signer} The signer connected to signer.
45
+ */
46
+ connect(provider) {
47
+ return new Signer(__classPrivateFieldGet(this, _Signer_address, "f"), __classPrivateFieldGet(this, _Signer_signerSession, "f"), provider);
48
+ }
49
+ /**
50
+ * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.
51
+ * @param {ethers.TransactionRequest} tx The transaction to sign.
52
+ * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
53
+ */
54
+ async signTransaction(tx) {
55
+ // get the chain id from the network or tx
56
+ let chainId = tx.chainId;
57
+ if (chainId === undefined) {
58
+ const network = await this.provider?.getNetwork();
59
+ chainId = network?.chainId?.toString() ?? "1";
60
+ }
61
+ // Convert the transaction into a JSON-RPC transaction
62
+ const rpcTx = this.provider instanceof ethers_1.JsonRpcApiProvider
63
+ ? this.provider.getRpcTransaction(tx)
64
+ : // We can just call the getRpcTransaction with a
65
+ // null receiver since it doesn't actually use it
66
+ // (and really should be declared static).
67
+ ethers_1.JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);
68
+ rpcTx.type = (0, ethers_1.toBeHex)(tx.type ?? 0x02, 1); // we expect 0x0[0-2]
69
+ const req = {
70
+ chain_id: Number(chainId),
71
+ tx: rpcTx,
72
+ };
73
+ const sig = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEvm(__classPrivateFieldGet(this, _Signer_address, "f"), req);
74
+ return sig.data().rlp_signed_tx;
75
+ }
76
+ /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)
77
+ * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.
78
+ * The key (for this session) must have the `"AllowRawBlobSigning"` policy attached.
79
+ * @param {string | Uint8Array} message The message to sign.
80
+ * @return {Promise<string>} The signature.
81
+ */
82
+ async signMessage(message) {
83
+ const digest = ethers_1.ethers.hashMessage(message);
84
+ return this.signBlob(digest);
85
+ }
86
+ /** Signs EIP-712 typed data. This uses ethers.js's
87
+ * [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)
88
+ * to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.
89
+ * The key (for this session) must have the `"AllowRawBlobSigning"` policy attached.
90
+ * @param {TypedDataDomain} domain The domain of the typed data.
91
+ * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.
92
+ * @param {Record<string, any>} value The value of the typed data.
93
+ * @return {Promise<string>} The signature.
94
+ */
95
+ async signTypedData(domain, types, value) {
96
+ const digest = ethers_1.TypedDataEncoder.hash(domain, types, value);
97
+ return this.signBlob(digest);
98
+ }
99
+ /** Sign arbitrary digest. This uses {@link Key#signBlob}.
100
+ * @param {string} digest The digest to sign.
101
+ * @return {Promise<string>} The signature.
102
+ */
103
+ async signBlob(digest) {
104
+ const blobReq = {
105
+ message_base64: Buffer.from((0, ethers_1.getBytes)(digest)).toString("base64"),
106
+ };
107
+ // Get the key corresponding to this address
108
+ if (__classPrivateFieldGet(this, _Signer_key, "f") === undefined) {
109
+ const key = (await __classPrivateFieldGet(this, _Signer_signerSession, "f").keys()).find((k) => k.materialId === __classPrivateFieldGet(this, _Signer_address, "f"));
110
+ if (key === undefined) {
111
+ throw new Error(`Cannot access key '${__classPrivateFieldGet(this, _Signer_address, "f")}'`);
112
+ }
113
+ __classPrivateFieldSet(this, _Signer_key, key, "f");
114
+ }
115
+ // sign
116
+ const result = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signBlob(__classPrivateFieldGet(this, _Signer_key, "f"), blobReq);
117
+ return result.data().signature;
118
+ }
119
+ }
120
+ exports.Signer = Signer;
121
+ _Signer_address = new WeakMap(), _Signer_key = new WeakMap(), _Signer_signerSession = new WeakMap();
122
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/ethers/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAQgB;AAIhB;;GAEG;AACH,MAAa,MAAO,SAAQ,eAAM,CAAC,cAAc;IAU/C;;;;OAIG;IACH,YAAY,OAAe,EAAE,aAA4B,EAAE,QAAiC;QAC1F,KAAK,CAAC,QAAQ,CAAC,CAAC;QAflB,iCAAiC;QACxB,kCAAiB;QAE1B,iCAAiC;QACjC,8BAAW;QAEX,6BAA6B;QACpB,wCAA8B;QASrC,uBAAA,IAAI,mBAAY,OAAO,MAAA,CAAC;QACxB,uBAAA,IAAI,yBAAkB,aAAa,MAAA,CAAC;IACtC,CAAC;IAED,sCAAsC;IACtC,KAAK,CAAC,UAAU;QACd,OAAO,uBAAA,IAAI,uBAAS,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACH,OAAO,CAAC,QAAgC;QACtC,OAAO,IAAI,MAAM,CAAC,uBAAA,IAAI,uBAAS,EAAE,uBAAA,IAAI,6BAAe,EAAE,QAAQ,CAAC,CAAC;IAClE,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe,CAAC,EAA6B;QACjD,0CAA0C;QAC1C,IAAI,OAAO,GAAG,EAAE,CAAC,OAAO,CAAC;QACzB,IAAI,OAAO,KAAK,SAAS,EAAE;YACzB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,UAAU,EAAE,CAAC;YAClD,OAAO,GAAG,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,GAAG,CAAC;SAC/C;QAED,sDAAsD;QACtD,MAAM,KAAK,GACT,IAAI,CAAC,QAAQ,YAAY,2BAAkB;YACzC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACrC,CAAC,CAAC,gDAAgD;gBAChD,iDAAiD;gBACjD,0CAA0C;gBAC1C,2BAAkB,CAAC,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACpE,KAAK,CAAC,IAAI,GAAG,IAAA,gBAAO,EAAC,EAAE,CAAC,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,qBAAqB;QAE/D,MAAM,GAAG,GAAmB;YAC1B,QAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;YACzB,EAAE,EAAE,KAAK;SACV,CAAC;QACF,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,OAAO,GAAG,CAAC,IAAI,EAAE,CAAC,aAAa,CAAC;IAClC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,WAAW,CAAC,OAA4B;QAC5C,MAAM,MAAM,GAAG,eAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAC3C,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,aAAa,CACjB,MAAuB,EACvB,KAA4C,EAC5C,KAA0B;QAE1B,MAAM,MAAM,GAAG,yBAAgB,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC;QAC3D,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,QAAQ,CAAC,MAAc;QACnC,MAAM,OAAO,GAAoB;YAC/B,cAAc,EAAE,MAAM,CAAC,IAAI,CAAC,IAAA,iBAAQ,EAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;SACjE,CAAC;QACF,4CAA4C;QAC5C,IAAI,uBAAA,IAAI,mBAAK,KAAK,SAAS,EAAE;YAC3B,MAAM,GAAG,GAAG,CAAC,MAAM,uBAAA,IAAI,6BAAe,CAAC,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,UAAU,KAAK,uBAAA,IAAI,uBAAS,CAAC,CAAC;YAC3F,IAAI,GAAG,KAAK,SAAS,EAAE;gBACrB,MAAM,IAAI,KAAK,CAAC,sBAAsB,uBAAA,IAAI,uBAAS,GAAG,CAAC,CAAC;aACzD;YACD,uBAAA,IAAI,eAAQ,GAAG,MAAA,CAAC;SACjB;QACD,OAAO;QACP,MAAM,MAAM,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,QAAQ,CAAC,uBAAA,IAAI,mBAAK,EAAE,OAAO,CAAC,CAAC;QACtE,OAAO,MAAM,CAAC,IAAI,EAAE,CAAC,SAAS,CAAC;IACjC,CAAC;CACF;AAnHD,wBAmHC","sourcesContent":["import {\n  JsonRpcApiProvider,\n  TypedDataDomain,\n  TypedDataEncoder,\n  TypedDataField,\n  ethers,\n  getBytes,\n  toBeHex,\n} from \"ethers\";\nimport { BlobSignRequest, EvmSignRequest, SignerSession } from \"../signer_session\";\nimport { Key } from \"../key\";\n\n/**\n * A ethers.js Signer using CubeSigner\n */\nexport class Signer extends ethers.AbstractSigner {\n  /** The address of the account */\n  readonly #address: string;\n\n  /** The key to use for signing */\n  #key?: Key;\n\n  /** The underlying session */\n  readonly #signerSession: SignerSession;\n\n  /** Create new Signer instance\n   * @param {string} address The address of the account to use.\n   * @param {SignerSession} signerSession The underlying Signer session.\n   * @param {null | ethers.Provider} provider The optional provider instance to use.\n   */\n  constructor(address: string, signerSession: SignerSession, provider?: null | ethers.Provider) {\n    super(provider);\n    this.#address = address;\n    this.#signerSession = signerSession;\n  }\n\n  /** Resolves to the signer address. */\n  async getAddress(): Promise<string> {\n    return this.#address;\n  }\n\n  /**\n   *  Returns the signer connected to %%provider%%.\n   *  @param {null | ethers.Provider} provider The optional provider instance to use.\n   *  @return {Signer} The signer connected to signer.\n   */\n  connect(provider: null | ethers.Provider): Signer {\n    return new Signer(this.#address, this.#signerSession, provider);\n  }\n\n  /**\n   * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.\n   * @param {ethers.TransactionRequest} tx The transaction to sign.\n   * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.\n   */\n  async signTransaction(tx: ethers.TransactionRequest): Promise<string> {\n    // get the chain id from the network or tx\n    let chainId = tx.chainId;\n    if (chainId === undefined) {\n      const network = await this.provider?.getNetwork();\n      chainId = network?.chainId?.toString() ?? \"1\";\n    }\n\n    // Convert the transaction into a JSON-RPC transaction\n    const rpcTx =\n      this.provider instanceof JsonRpcApiProvider\n        ? this.provider.getRpcTransaction(tx)\n        : // We can just call the getRpcTransaction with a\n          // null receiver since it doesn't actually use it\n          // (and really should be declared static).\n          JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);\n    rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]\n\n    const req = <EvmSignRequest>{\n      chain_id: Number(chainId),\n      tx: rpcTx,\n    };\n    const sig = await this.#signerSession.signEvm(this.#address, req);\n    return sig.data().rlp_signed_tx;\n  }\n\n  /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)\n   * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {string | Uint8Array} message The message to sign.\n   * @return {Promise<string>} The signature.\n   */\n  async signMessage(message: string | Uint8Array): Promise<string> {\n    const digest = ethers.hashMessage(message);\n    return this.signBlob(digest);\n  }\n\n  /** Signs EIP-712 typed data. This uses ethers.js's\n   * [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)\n   * to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {TypedDataDomain} domain The domain of the typed data.\n   * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.\n   * @param {Record<string, any>} value The value of the typed data.\n   * @return {Promise<string>} The signature.\n   */\n  async signTypedData(\n    domain: TypedDataDomain,\n    types: Record<string, Array<TypedDataField>>,\n    value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any\n  ): Promise<string> {\n    const digest = TypedDataEncoder.hash(domain, types, value);\n    return this.signBlob(digest);\n  }\n\n  /** Sign arbitrary digest. This uses {@link Key#signBlob}.\n   * @param {string} digest The digest to sign.\n   * @return {Promise<string>} The signature.\n   */\n  private async signBlob(digest: string): Promise<string> {\n    const blobReq = <BlobSignRequest>{\n      message_base64: Buffer.from(getBytes(digest)).toString(\"base64\"),\n    };\n    // Get the key corresponding to this address\n    if (this.#key === undefined) {\n      const key = (await this.#signerSession.keys()).find((k) => k.materialId === this.#address);\n      if (key === undefined) {\n        throw new Error(`Cannot access key '${this.#address}'`);\n      }\n      this.#key = key;\n    }\n    // sign\n    const result = await this.#signerSession.signBlob(this.#key, blobReq);\n    return result.data().signature;\n  }\n}\n"]}
@@ -0,0 +1,114 @@
1
+ import { EnvInterface } from "./env";
2
+ import { components, Client } from "./client";
3
+ import { Org } from "./org";
4
+ import { SignerSessionStorage } from "./session/signer_session_manager";
5
+ import { SignerSession } from "./signer_session";
6
+ import { ManagementSessionManager, ManagementSessionStorage } from "./session/management_session_manager";
7
+ import { OidcSessionManager, OidcSessionStorage } from "./session/oidc_session_manager";
8
+ /** CubeSigner constructor options */
9
+ export interface CubeSignerOptions {
10
+ /** The environment to use */
11
+ env?: EnvInterface;
12
+ /** The management authorization token */
13
+ sessionMgr?: ManagementSessionManager | OidcSessionManager;
14
+ }
15
+ export type UserInfo = components["schemas"]["UserInfo"];
16
+ export type TotpInfo = components["responses"]["TotpInfo"]["content"]["application/json"];
17
+ export type ConfiguredMfa = components["schemas"]["ConfiguredMfa"];
18
+ /** CubeSigner client */
19
+ export declare class CubeSigner {
20
+ #private;
21
+ readonly sessionMgr?: ManagementSessionManager | OidcSessionManager;
22
+ /** @return {EnvInterface} The CubeSigner environment of this client */
23
+ get env(): EnvInterface;
24
+ /**
25
+ * Loads an existing management session and creates a CubeSigner instance.
26
+ * @param {ManagementSessionStorage} storage Optional session storage to load
27
+ * the session from. If not specified, the management session from the config
28
+ * directory will be loaded.
29
+ * @return {Promise<CubeSigner>} New CubeSigner instance
30
+ */
31
+ static loadManagementSession(storage?: ManagementSessionStorage): Promise<CubeSigner>;
32
+ /**
33
+ * Loads a signer session from a session storage (e.g., session file).
34
+ * @param {SignerSessionStorage} storage Optional session storage to load
35
+ * the session from. If not specified, the signer session from the config
36
+ * directory will be loaded.
37
+ * @return {Promise<SignerSession>} New signer session
38
+ */
39
+ static loadSignerSession(storage?: SignerSessionStorage): Promise<SignerSession>;
40
+ /**
41
+ * Loads a signer session from OIDC storage
42
+ * @param {OidcSessionStorage} storage The storage to load from
43
+ * @return {Promise<SignerSession>} New signer session
44
+ */
45
+ static loadOidcSession(storage: OidcSessionStorage): Promise<SignerSession>;
46
+ /**
47
+ * Create a new CubeSigner instance.
48
+ * @param {CubeSignerOptions} options The options for the CubeSigner instance.
49
+ */
50
+ constructor(options: CubeSignerOptions);
51
+ /**
52
+ * Authenticate an OIDC user and create a new OIDC session manager for them.
53
+ * @param {string} oidcToken The OIDC token
54
+ * @param {string} orgId The id of the organization that the user is in
55
+ * @param {List<string>} scopes The scopes of the resulting session
56
+ * @param {OidcSessionStorage} storage The signer session storage
57
+ * @return {Promise<OidcSessionManager>} The OIDC session manager
58
+ */
59
+ createOidcManager(oidcToken: string, orgId: string, scopes: Array<string>, storage?: OidcSessionStorage): Promise<OidcSessionManager>;
60
+ /**
61
+ * Authenticate an OIDC user and create a new session for them.
62
+ * @param {string} oidcToken The OIDC token
63
+ * @param {string} orgId The id of the organization that the user is in
64
+ * @param {List<string>} scopes The scopes of the resulting session
65
+ * @param {OidcSessionStorage} storage The signer session storage
66
+ * @return {Promise<SignerSession>} The signer session
67
+ */
68
+ createOidcSession(oidcToken: string, orgId: string, scopes: Array<string>, storage?: OidcSessionStorage): Promise<SignerSession>;
69
+ /** Retrieves information about the current user. */
70
+ aboutMe(): Promise<UserInfo>;
71
+ /**
72
+ * Creates and sets a new TOTP configuration for the logged-in user,
73
+ * overriding the existing one (if any).
74
+ */
75
+ resetTotp(): Promise<TotpInfo>;
76
+ /**
77
+ * Verifies a given TOTP code against the current user's TOTP configuration.
78
+ * Throws an error if the verification fails.
79
+ * @param {string} code Current TOTP code
80
+ */
81
+ verifyTotp(code: string): Promise<void>;
82
+ /** Retrieves information about an organization.
83
+ * @param {string} orgId The ID or name of the organization.
84
+ * @return {Org} The organization.
85
+ * */
86
+ getOrg(orgId: string): Promise<Org>;
87
+ /** Get the management client.
88
+ * @return {Client} The client.
89
+ * @internal
90
+ * */
91
+ management(): Promise<Client>;
92
+ }
93
+ /** Organizations */
94
+ export * from "./org";
95
+ /** Keys */
96
+ export * from "./key";
97
+ /** Roles */
98
+ export * from "./role";
99
+ /** Env */
100
+ export * from "./env";
101
+ /** Sessions */
102
+ export * from "./signer_session";
103
+ /** Session storage */
104
+ export * from "./session/session_storage";
105
+ /** Session manager */
106
+ export * from "./session/session_manager";
107
+ /** Management session manager */
108
+ export * from "./session/management_session_manager";
109
+ /** OIDC session manager */
110
+ export * from "./session/oidc_session_manager";
111
+ /** Signer session manager */
112
+ export * from "./session/signer_session_manager";
113
+ /** Export ethers.js Signer */
114
+ export * as ethers from "./ethers";