@cubist-labs/cubesigner-sdk 0.1.23
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE-APACHE +177 -0
- package/LICENSE-MIT +25 -0
- package/NOTICE +13 -0
- package/README.md +470 -0
- package/dist/examples/ethers.d.ts +1 -0
- package/dist/examples/ethers.js +142 -0
- package/dist/spec/env/beta.json +9 -0
- package/dist/spec/env/gamma.json +9 -0
- package/dist/spec/env/prod.json +9 -0
- package/dist/src/client.d.ts +10 -0
- package/dist/src/client.js +21 -0
- package/dist/src/env.d.ts +15 -0
- package/dist/src/env.js +35 -0
- package/dist/src/ethers/index.d.ts +50 -0
- package/dist/src/ethers/index.js +122 -0
- package/dist/src/index.d.ts +114 -0
- package/dist/src/index.js +205 -0
- package/dist/src/key.d.ts +114 -0
- package/dist/src/key.js +201 -0
- package/dist/src/mfa.d.ts +23 -0
- package/dist/src/mfa.js +63 -0
- package/dist/src/org.d.ts +161 -0
- package/dist/src/org.js +264 -0
- package/dist/src/role.d.ts +224 -0
- package/dist/src/role.js +256 -0
- package/dist/src/schema.d.ts +3049 -0
- package/dist/src/schema.js +7 -0
- package/dist/src/session/generic.d.ts +47 -0
- package/dist/src/session/generic.js +3 -0
- package/dist/src/session/management_session_manager.d.ts +59 -0
- package/dist/src/session/management_session_manager.js +111 -0
- package/dist/src/session/oidc_session_manager.d.ts +78 -0
- package/dist/src/session/oidc_session_manager.js +142 -0
- package/dist/src/session/session_manager.d.ts +74 -0
- package/dist/src/session/session_manager.js +79 -0
- package/dist/src/session/session_storage.d.ts +47 -0
- package/dist/src/session/session_storage.js +76 -0
- package/dist/src/session/signer_session_manager.d.ts +88 -0
- package/dist/src/session/signer_session_manager.js +159 -0
- package/dist/src/sign.d.ts +114 -0
- package/dist/src/sign.js +248 -0
- package/dist/src/signer_session.d.ts +180 -0
- package/dist/src/signer_session.js +369 -0
- package/dist/src/util.d.ts +35 -0
- package/dist/src/util.js +75 -0
- package/dist/test/sessions.d.ts +35 -0
- package/dist/test/sessions.js +56 -0
- package/package.json +61 -0
- package/src/client.ts +12 -0
- package/src/env.ts +25 -0
- package/src/ethers/index.ts +131 -0
- package/src/index.ts +220 -0
- package/src/key.ts +249 -0
- package/src/org.ts +333 -0
- package/src/role.ts +385 -0
- package/src/schema.ts +3054 -0
- package/src/session/management_session_manager.ts +136 -0
- package/src/session/oidc_session_manager.ts +193 -0
- package/src/session/session_manager.ts +114 -0
- package/src/session/session_storage.ts +73 -0
- package/src/session/signer_session_manager.ts +211 -0
- package/src/signer_session.ts +464 -0
- package/src/util.ts +58 -0
- package/tsconfig.json +32 -0
|
@@ -0,0 +1,205 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
+
}) : function(o, v) {
|
|
16
|
+
o["default"] = v;
|
|
17
|
+
});
|
|
18
|
+
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
+
if (mod && mod.__esModule) return mod;
|
|
20
|
+
var result = {};
|
|
21
|
+
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
+
__setModuleDefault(result, mod);
|
|
23
|
+
return result;
|
|
24
|
+
};
|
|
25
|
+
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
26
|
+
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
27
|
+
};
|
|
28
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
29
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
30
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
31
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
32
|
+
};
|
|
33
|
+
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
34
|
+
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
35
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
36
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
37
|
+
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
38
|
+
};
|
|
39
|
+
var _CubeSigner_env;
|
|
40
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
41
|
+
exports.ethers = exports.CubeSigner = void 0;
|
|
42
|
+
const env_1 = require("./env");
|
|
43
|
+
const org_1 = require("./org");
|
|
44
|
+
const session_storage_1 = require("./session/session_storage");
|
|
45
|
+
const signer_session_1 = require("./signer_session");
|
|
46
|
+
const management_session_manager_1 = require("./session/management_session_manager");
|
|
47
|
+
const oidc_session_manager_1 = require("./session/oidc_session_manager");
|
|
48
|
+
const util_1 = require("./util");
|
|
49
|
+
const path = __importStar(require("path"));
|
|
50
|
+
/** CubeSigner client */
|
|
51
|
+
class CubeSigner {
|
|
52
|
+
/** @return {EnvInterface} The CubeSigner environment of this client */
|
|
53
|
+
get env() {
|
|
54
|
+
return __classPrivateFieldGet(this, _CubeSigner_env, "f");
|
|
55
|
+
}
|
|
56
|
+
/**
|
|
57
|
+
* Loads an existing management session and creates a CubeSigner instance.
|
|
58
|
+
* @param {ManagementSessionStorage} storage Optional session storage to load
|
|
59
|
+
* the session from. If not specified, the management session from the config
|
|
60
|
+
* directory will be loaded.
|
|
61
|
+
* @return {Promise<CubeSigner>} New CubeSigner instance
|
|
62
|
+
*/
|
|
63
|
+
static async loadManagementSession(storage) {
|
|
64
|
+
const defaultFilePath = path.join((0, util_1.configDir)(), "management-session.json");
|
|
65
|
+
const sessionMgr = await management_session_manager_1.ManagementSessionManager.loadFromStorage(storage ?? new session_storage_1.JsonFileSessionStorage(defaultFilePath));
|
|
66
|
+
return new CubeSigner({
|
|
67
|
+
sessionMgr,
|
|
68
|
+
});
|
|
69
|
+
}
|
|
70
|
+
/**
|
|
71
|
+
* Loads a signer session from a session storage (e.g., session file).
|
|
72
|
+
* @param {SignerSessionStorage} storage Optional session storage to load
|
|
73
|
+
* the session from. If not specified, the signer session from the config
|
|
74
|
+
* directory will be loaded.
|
|
75
|
+
* @return {Promise<SignerSession>} New signer session
|
|
76
|
+
*/
|
|
77
|
+
static async loadSignerSession(storage) {
|
|
78
|
+
const defaultFilePath = path.join((0, util_1.configDir)(), "signer-session.json");
|
|
79
|
+
const sss = storage ?? new session_storage_1.JsonFileSessionStorage(defaultFilePath);
|
|
80
|
+
const env = (await sss.retrieve()).env["Dev-CubeSignerStack"];
|
|
81
|
+
return await signer_session_1.SignerSession.loadSignerSession(new CubeSigner({ env }), sss);
|
|
82
|
+
}
|
|
83
|
+
/**
|
|
84
|
+
* Loads a signer session from OIDC storage
|
|
85
|
+
* @param {OidcSessionStorage} storage The storage to load from
|
|
86
|
+
* @return {Promise<SignerSession>} New signer session
|
|
87
|
+
*/
|
|
88
|
+
static async loadOidcSession(storage) {
|
|
89
|
+
const env = (await storage.retrieve()).env;
|
|
90
|
+
return await signer_session_1.SignerSession.loadOidcSession(new CubeSigner({ env }), storage);
|
|
91
|
+
}
|
|
92
|
+
/**
|
|
93
|
+
* Create a new CubeSigner instance.
|
|
94
|
+
* @param {CubeSignerOptions} options The options for the CubeSigner instance.
|
|
95
|
+
*/
|
|
96
|
+
constructor(options) {
|
|
97
|
+
_CubeSigner_env.set(this, void 0);
|
|
98
|
+
let env = options.env;
|
|
99
|
+
if (options.sessionMgr) {
|
|
100
|
+
this.sessionMgr = options.sessionMgr;
|
|
101
|
+
env = env ?? this.sessionMgr.env;
|
|
102
|
+
}
|
|
103
|
+
__classPrivateFieldSet(this, _CubeSigner_env, env ?? env_1.envs["gamma"], "f");
|
|
104
|
+
}
|
|
105
|
+
/**
|
|
106
|
+
* Authenticate an OIDC user and create a new OIDC session manager for them.
|
|
107
|
+
* @param {string} oidcToken The OIDC token
|
|
108
|
+
* @param {string} orgId The id of the organization that the user is in
|
|
109
|
+
* @param {List<string>} scopes The scopes of the resulting session
|
|
110
|
+
* @param {OidcSessionStorage} storage The signer session storage
|
|
111
|
+
* @return {Promise<OidcSessionManager>} The OIDC session manager
|
|
112
|
+
*/
|
|
113
|
+
async createOidcManager(oidcToken, orgId, scopes, storage) {
|
|
114
|
+
return await oidc_session_manager_1.OidcSessionManager.create(this.env, storage || new session_storage_1.MemorySessionStorage(), oidcToken, orgId, scopes);
|
|
115
|
+
}
|
|
116
|
+
/**
|
|
117
|
+
* Authenticate an OIDC user and create a new session for them.
|
|
118
|
+
* @param {string} oidcToken The OIDC token
|
|
119
|
+
* @param {string} orgId The id of the organization that the user is in
|
|
120
|
+
* @param {List<string>} scopes The scopes of the resulting session
|
|
121
|
+
* @param {OidcSessionStorage} storage The signer session storage
|
|
122
|
+
* @return {Promise<SignerSession>} The signer session
|
|
123
|
+
*/
|
|
124
|
+
async createOidcSession(oidcToken, orgId, scopes, storage) {
|
|
125
|
+
const mgr = await this.createOidcManager(oidcToken, orgId, scopes, storage);
|
|
126
|
+
return await CubeSigner.loadOidcSession(mgr.storage);
|
|
127
|
+
}
|
|
128
|
+
/** Retrieves information about the current user. */
|
|
129
|
+
async aboutMe() {
|
|
130
|
+
const resp = await (await this.management()).get("/v0/about_me", {
|
|
131
|
+
parseAs: "json",
|
|
132
|
+
});
|
|
133
|
+
const data = (0, util_1.assertOk)(resp);
|
|
134
|
+
return data;
|
|
135
|
+
}
|
|
136
|
+
/**
|
|
137
|
+
* Creates and sets a new TOTP configuration for the logged-in user,
|
|
138
|
+
* overriding the existing one (if any).
|
|
139
|
+
*/
|
|
140
|
+
async resetTotp() {
|
|
141
|
+
const resp = await (await this.management()).patch("/v0/totp", {
|
|
142
|
+
parseAs: "json",
|
|
143
|
+
});
|
|
144
|
+
return (0, util_1.assertOk)(resp);
|
|
145
|
+
}
|
|
146
|
+
/**
|
|
147
|
+
* Verifies a given TOTP code against the current user's TOTP configuration.
|
|
148
|
+
* Throws an error if the verification fails.
|
|
149
|
+
* @param {string} code Current TOTP code
|
|
150
|
+
*/
|
|
151
|
+
async verifyTotp(code) {
|
|
152
|
+
const resp = await (await this.management()).get("/v0/totp/verify/{code}", {
|
|
153
|
+
params: { path: { code } },
|
|
154
|
+
parseAs: "json",
|
|
155
|
+
});
|
|
156
|
+
(0, util_1.assertOk)(resp);
|
|
157
|
+
}
|
|
158
|
+
/** Retrieves information about an organization.
|
|
159
|
+
* @param {string} orgId The ID or name of the organization.
|
|
160
|
+
* @return {Org} The organization.
|
|
161
|
+
* */
|
|
162
|
+
async getOrg(orgId) {
|
|
163
|
+
const resp = await (await this.management()).get("/v0/org/{org_id}", {
|
|
164
|
+
params: { path: { org_id: orgId } },
|
|
165
|
+
parseAs: "json",
|
|
166
|
+
});
|
|
167
|
+
const data = (0, util_1.assertOk)(resp);
|
|
168
|
+
return new org_1.Org(this, data);
|
|
169
|
+
}
|
|
170
|
+
/** Get the management client.
|
|
171
|
+
* @return {Client} The client.
|
|
172
|
+
* @internal
|
|
173
|
+
* */
|
|
174
|
+
async management() {
|
|
175
|
+
if (!this.sessionMgr) {
|
|
176
|
+
throw new Error("No management session loaded");
|
|
177
|
+
}
|
|
178
|
+
return await this.sessionMgr.client();
|
|
179
|
+
}
|
|
180
|
+
}
|
|
181
|
+
exports.CubeSigner = CubeSigner;
|
|
182
|
+
_CubeSigner_env = new WeakMap();
|
|
183
|
+
/** Organizations */
|
|
184
|
+
__exportStar(require("./org"), exports);
|
|
185
|
+
/** Keys */
|
|
186
|
+
__exportStar(require("./key"), exports);
|
|
187
|
+
/** Roles */
|
|
188
|
+
__exportStar(require("./role"), exports);
|
|
189
|
+
/** Env */
|
|
190
|
+
__exportStar(require("./env"), exports);
|
|
191
|
+
/** Sessions */
|
|
192
|
+
__exportStar(require("./signer_session"), exports);
|
|
193
|
+
/** Session storage */
|
|
194
|
+
__exportStar(require("./session/session_storage"), exports);
|
|
195
|
+
/** Session manager */
|
|
196
|
+
__exportStar(require("./session/session_manager"), exports);
|
|
197
|
+
/** Management session manager */
|
|
198
|
+
__exportStar(require("./session/management_session_manager"), exports);
|
|
199
|
+
/** OIDC session manager */
|
|
200
|
+
__exportStar(require("./session/oidc_session_manager"), exports);
|
|
201
|
+
/** Signer session manager */
|
|
202
|
+
__exportStar(require("./session/signer_session_manager"), exports);
|
|
203
|
+
/** Export ethers.js Signer */
|
|
204
|
+
exports.ethers = __importStar(require("./ethers"));
|
|
205
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,+BAA2C;AAE3C,+BAA4B;AAC5B,+DAAyF;AAEzF,qDAAiD;AACjD,qFAG8C;AAC9C,yEAAwF;AACxF,iCAA6C;AAC7C,2CAA6B;AAc7B,wBAAwB;AACxB,MAAa,UAAU;IAIrB,uEAAuE;IACvE,IAAI,GAAG;QACL,OAAO,uBAAA,IAAI,uBAAK,CAAC;IACnB,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,KAAK,CAAC,qBAAqB,CAAC,OAAkC;QACnE,MAAM,eAAe,GAAG,IAAI,CAAC,IAAI,CAAC,IAAA,gBAAS,GAAE,EAAE,yBAAyB,CAAC,CAAC;QAC1E,MAAM,UAAU,GAAG,MAAM,qDAAwB,CAAC,eAAe,CAC/D,OAAO,IAAI,IAAI,wCAAsB,CAAC,eAAe,CAAC,CACvD,CAAC;QACF,OAAO,IAAI,UAAU,CAAoB;YACvC,UAAU;SACX,CAAC,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAAC,OAA8B;QAC3D,MAAM,eAAe,GAAG,IAAI,CAAC,IAAI,CAAC,IAAA,gBAAS,GAAE,EAAE,qBAAqB,CAAC,CAAC;QACtE,MAAM,GAAG,GAAG,OAAO,IAAI,IAAI,wCAAsB,CAAC,eAAe,CAAC,CAAC;QACnE,MAAM,GAAG,GAAG,CAAC,MAAM,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC,GAAG,CAAC,qBAAqB,CAAC,CAAC;QAC9D,OAAO,MAAM,8BAAa,CAAC,iBAAiB,CAAC,IAAI,UAAU,CAAC,EAAE,GAAG,EAAE,CAAC,EAAE,GAAG,CAAC,CAAC;IAC7E,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,eAAe,CAAC,OAA2B;QACtD,MAAM,GAAG,GAAG,CAAC,MAAM,OAAO,CAAC,QAAQ,EAAE,CAAC,CAAC,GAAG,CAAC;QAC3C,OAAO,MAAM,8BAAa,CAAC,eAAe,CAAC,IAAI,UAAU,CAAC,EAAE,GAAG,EAAE,CAAC,EAAE,OAAO,CAAC,CAAC;IAC/E,CAAC;IAED;;;OAGG;IACH,YAAY,OAA0B;QArD7B,kCAAmB;QAsD1B,IAAI,GAAG,GAAG,OAAO,CAAC,GAAG,CAAC;QACtB,IAAI,OAAO,CAAC,UAAU,EAAE;YACtB,IAAI,CAAC,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC;YACrC,GAAG,GAAG,GAAG,IAAI,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC;SAClC;QACD,uBAAA,IAAI,mBAAQ,GAAG,IAAI,UAAI,CAAC,OAAO,CAAC,MAAA,CAAC;IACnC,CAAC;IAED;;;;;;;OAOG;IACH,KAAK,CAAC,iBAAiB,CACrB,SAAiB,EACjB,KAAa,EACb,MAAqB,EACrB,OAA4B;QAE5B,OAAO,MAAM,yCAAkB,CAAC,MAAM,CACpC,IAAI,CAAC,GAAG,EACR,OAAO,IAAI,IAAI,sCAAoB,EAAE,EACrC,SAAS,EACT,KAAK,EACL,MAAM,CACP,CAAC;IACJ,CAAC;IAED;;;;;;;OAOG;IACH,KAAK,CAAC,iBAAiB,CACrB,SAAiB,EACjB,KAAa,EACb,MAAqB,EACrB,OAA4B;QAE5B,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,SAAS,EAAE,KAAK,EAAE,MAAM,EAAE,OAAO,CAAC,CAAC;QAC5E,OAAO,MAAM,UAAU,CAAC,eAAe,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;IACvD,CAAC;IAED,oDAAoD;IACpD,KAAK,CAAC,OAAO;QACX,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,IAAI,CAAC,UAAU,EAAE,CACxB,CAAC,GAAG,CAAC,cAAc,EAAE;YACpB,OAAO,EAAE,MAAM;SAChB,CAAC,CAAC;QACH,MAAM,IAAI,GAAG,IAAA,eAAQ,EAAC,IAAI,CAAC,CAAC;QAC5B,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,SAAS;QACb,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,IAAI,CAAC,UAAU,EAAE,CACxB,CAAC,KAAK,CAAC,UAAU,EAAE;YAClB,OAAO,EAAE,MAAM;SAChB,CAAC,CAAC;QACH,OAAO,IAAA,eAAQ,EAAC,IAAI,CAAC,CAAC;IACxB,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,UAAU,CAAC,IAAY;QAC3B,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,IAAI,CAAC,UAAU,EAAE,CACxB,CAAC,GAAG,CAAC,wBAAwB,EAAE;YAC9B,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,IAAI,EAAE,EAAE;YAC1B,OAAO,EAAE,MAAM;SAChB,CAAC,CAAC;QACH,IAAA,eAAQ,EAAC,IAAI,CAAC,CAAC;IACjB,CAAC;IAED;;;SAGK;IACL,KAAK,CAAC,MAAM,CAAC,KAAa;QACxB,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,IAAI,CAAC,UAAU,EAAE,CACxB,CAAC,GAAG,CAAC,kBAAkB,EAAE;YACxB,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,KAAK,EAAE,EAAE;YACnC,OAAO,EAAE,MAAM;SAChB,CAAC,CAAC;QAEH,MAAM,IAAI,GAAG,IAAA,eAAQ,EAAC,IAAI,CAAC,CAAC;QAC5B,OAAO,IAAI,SAAG,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC7B,CAAC;IAED;;;SAGK;IACL,KAAK,CAAC,UAAU;QACd,IAAI,CAAC,IAAI,CAAC,UAAU,EAAE;YACpB,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;SACjD;QACD,OAAO,MAAM,IAAI,CAAC,UAAU,CAAC,MAAM,EAAE,CAAC;IACxC,CAAC;CACF;AAzKD,gCAyKC;;AAED,oBAAoB;AACpB,wCAAsB;AACtB,WAAW;AACX,wCAAsB;AACtB,YAAY;AACZ,yCAAuB;AACvB,UAAU;AACV,wCAAsB;AACtB,eAAe;AACf,mDAAiC;AACjC,sBAAsB;AACtB,4DAA0C;AAC1C,sBAAsB;AACtB,4DAA0C;AAC1C,iCAAiC;AACjC,uEAAqD;AACrD,2BAA2B;AAC3B,iEAA+C;AAC/C,6BAA6B;AAC7B,mEAAiD;AACjD,8BAA8B;AAC9B,mDAAmC","sourcesContent":["import { envs, EnvInterface } from \"./env\";\nimport { components, Client } from \"./client\";\nimport { Org } from \"./org\";\nimport { JsonFileSessionStorage, MemorySessionStorage } from \"./session/session_storage\";\nimport { SignerSessionStorage } from \"./session/signer_session_manager\";\nimport { SignerSession } from \"./signer_session\";\nimport {\n  ManagementSessionManager,\n  ManagementSessionStorage,\n} from \"./session/management_session_manager\";\nimport { OidcSessionManager, OidcSessionStorage } from \"./session/oidc_session_manager\";\nimport { assertOk, configDir } from \"./util\";\nimport * as path from \"path\";\n\n/** CubeSigner constructor options */\nexport interface CubeSignerOptions {\n  /** The environment to use */\n  env?: EnvInterface;\n  /** The management authorization token */\n  sessionMgr?: ManagementSessionManager | OidcSessionManager;\n}\n\nexport type UserInfo = components[\"schemas\"][\"UserInfo\"];\nexport type TotpInfo = components[\"responses\"][\"TotpInfo\"][\"content\"][\"application/json\"];\nexport type ConfiguredMfa = components[\"schemas\"][\"ConfiguredMfa\"];\n\n/** CubeSigner client */\nexport class CubeSigner {\n  readonly #env: EnvInterface;\n  readonly sessionMgr?: ManagementSessionManager | OidcSessionManager;\n\n  /** @return {EnvInterface} The CubeSigner environment of this client */\n  get env(): EnvInterface {\n    return this.#env;\n  }\n\n  /**\n   * Loads an existing management session and creates a CubeSigner instance.\n   * @param {ManagementSessionStorage} storage Optional session storage to load\n   * the session from. If not specified, the management session from the config\n   * directory will be loaded.\n   * @return {Promise<CubeSigner>} New CubeSigner instance\n   */\n  static async loadManagementSession(storage?: ManagementSessionStorage): Promise<CubeSigner> {\n    const defaultFilePath = path.join(configDir(), \"management-session.json\");\n    const sessionMgr = await ManagementSessionManager.loadFromStorage(\n      storage ?? new JsonFileSessionStorage(defaultFilePath),\n    );\n    return new CubeSigner(<CubeSignerOptions>{\n      sessionMgr,\n    });\n  }\n\n  /**\n   * Loads a signer session from a session storage (e.g., session file).\n   * @param {SignerSessionStorage} storage Optional session storage to load\n   * the session from. If not specified, the signer session from the config\n   * directory will be loaded.\n   * @return {Promise<SignerSession>} New signer session\n   */\n  static async loadSignerSession(storage?: SignerSessionStorage): Promise<SignerSession> {\n    const defaultFilePath = path.join(configDir(), \"signer-session.json\");\n    const sss = storage ?? new JsonFileSessionStorage(defaultFilePath);\n    const env = (await sss.retrieve()).env[\"Dev-CubeSignerStack\"];\n    return await SignerSession.loadSignerSession(new CubeSigner({ env }), sss);\n  }\n\n  /**\n   * Loads a signer session from OIDC storage\n   * @param {OidcSessionStorage} storage The storage to load from\n   * @return {Promise<SignerSession>} New signer session\n   */\n  static async loadOidcSession(storage: OidcSessionStorage): Promise<SignerSession> {\n    const env = (await storage.retrieve()).env;\n    return await SignerSession.loadOidcSession(new CubeSigner({ env }), storage);\n  }\n\n  /**\n   * Create a new CubeSigner instance.\n   * @param {CubeSignerOptions} options The options for the CubeSigner instance.\n   */\n  constructor(options: CubeSignerOptions) {\n    let env = options.env;\n    if (options.sessionMgr) {\n      this.sessionMgr = options.sessionMgr;\n      env = env ?? this.sessionMgr.env;\n    }\n    this.#env = env ?? envs[\"gamma\"];\n  }\n\n  /**\n   * Authenticate an OIDC user and create a new OIDC session manager for them.\n   * @param {string} oidcToken The OIDC token\n   * @param {string} orgId The id of the organization that the user is in\n   * @param {List<string>} scopes The scopes of the resulting session\n   * @param {OidcSessionStorage} storage The signer session storage\n   * @return {Promise<OidcSessionManager>} The OIDC session manager\n   */\n  async createOidcManager(\n    oidcToken: string,\n    orgId: string,\n    scopes: Array<string>,\n    storage?: OidcSessionStorage,\n  ): Promise<OidcSessionManager> {\n    return await OidcSessionManager.create(\n      this.env,\n      storage || new MemorySessionStorage(),\n      oidcToken,\n      orgId,\n      scopes,\n    );\n  }\n\n  /**\n   * Authenticate an OIDC user and create a new session for them.\n   * @param {string} oidcToken The OIDC token\n   * @param {string} orgId The id of the organization that the user is in\n   * @param {List<string>} scopes The scopes of the resulting session\n   * @param {OidcSessionStorage} storage The signer session storage\n   * @return {Promise<SignerSession>} The signer session\n   */\n  async createOidcSession(\n    oidcToken: string,\n    orgId: string,\n    scopes: Array<string>,\n    storage?: OidcSessionStorage,\n  ): Promise<SignerSession> {\n    const mgr = await this.createOidcManager(oidcToken, orgId, scopes, storage);\n    return await CubeSigner.loadOidcSession(mgr.storage);\n  }\n\n  /** Retrieves information about the current user. */\n  async aboutMe(): Promise<UserInfo> {\n    const resp = await (\n      await this.management()\n    ).get(\"/v0/about_me\", {\n      parseAs: \"json\",\n    });\n    const data = assertOk(resp);\n    return data;\n  }\n\n  /**\n   * Creates and sets a new TOTP configuration for the logged-in user,\n   * overriding the existing one (if any).\n   */\n  async resetTotp(): Promise<TotpInfo> {\n    const resp = await (\n      await this.management()\n    ).patch(\"/v0/totp\", {\n      parseAs: \"json\",\n    });\n    return assertOk(resp);\n  }\n\n  /**\n   * Verifies a given TOTP code against the current user's TOTP configuration.\n   * Throws an error if the verification fails.\n   * @param {string} code Current TOTP code\n   */\n  async verifyTotp(code: string) {\n    const resp = await (\n      await this.management()\n    ).get(\"/v0/totp/verify/{code}\", {\n      params: { path: { code } },\n      parseAs: \"json\",\n    });\n    assertOk(resp);\n  }\n\n  /** Retrieves information about an organization.\n   * @param {string} orgId The ID or name of the organization.\n   * @return {Org} The organization.\n   * */\n  async getOrg(orgId: string): Promise<Org> {\n    const resp = await (\n      await this.management()\n    ).get(\"/v0/org/{org_id}\", {\n      params: { path: { org_id: orgId } },\n      parseAs: \"json\",\n    });\n\n    const data = assertOk(resp);\n    return new Org(this, data);\n  }\n\n  /** Get the management client.\n   * @return {Client} The client.\n   * @internal\n   * */\n  async management(): Promise<Client> {\n    if (!this.sessionMgr) {\n      throw new Error(\"No management session loaded\");\n    }\n    return await this.sessionMgr.client();\n  }\n}\n\n/** Organizations */\nexport * from \"./org\";\n/** Keys */\nexport * from \"./key\";\n/** Roles */\nexport * from \"./role\";\n/** Env */\nexport * from \"./env\";\n/** Sessions */\nexport * from \"./signer_session\";\n/** Session storage */\nexport * from \"./session/session_storage\";\n/** Session manager */\nexport * from \"./session/session_manager\";\n/** Management session manager */\nexport * from \"./session/management_session_manager\";\n/** OIDC session manager */\nexport * from \"./session/oidc_session_manager\";\n/** Signer session manager */\nexport * from \"./session/signer_session_manager\";\n/** Export ethers.js Signer */\nexport * as ethers from \"./ethers\";\n"]}
|
|
@@ -0,0 +1,114 @@
|
|
|
1
|
+
import { CubeSigner, KeyPolicy } from ".";
|
|
2
|
+
import { components } from "./client";
|
|
3
|
+
/** Secp256k1 key type */
|
|
4
|
+
export declare enum Secp256k1 {
|
|
5
|
+
Evm = "SecpEthAddr",
|
|
6
|
+
Btc = "SecpBtc",
|
|
7
|
+
BtcTest = "SecpBtcTest"
|
|
8
|
+
}
|
|
9
|
+
/** BLS key type */
|
|
10
|
+
export declare enum BLS {
|
|
11
|
+
Eth2Deposited = "BlsPub",
|
|
12
|
+
Eth2Inactive = "BlsInactive"
|
|
13
|
+
}
|
|
14
|
+
/** Ed25519 key type */
|
|
15
|
+
export declare enum Ed25519 {
|
|
16
|
+
Solana = "Ed25519SolanaAddr",
|
|
17
|
+
Sui = "Ed25519SuiAddr",
|
|
18
|
+
Aptos = "Ed25519AptosAddr"
|
|
19
|
+
}
|
|
20
|
+
/** Key type */
|
|
21
|
+
export type KeyType = Secp256k1 | BLS | Ed25519;
|
|
22
|
+
type KeyInfo = components["schemas"]["KeyInfo"];
|
|
23
|
+
/** Signing keys. */
|
|
24
|
+
export declare class Key {
|
|
25
|
+
#private;
|
|
26
|
+
/** The organization that this key is in */
|
|
27
|
+
readonly orgId: string;
|
|
28
|
+
/**
|
|
29
|
+
* The id of the key: "Key#" followed by a unique identifier specific to
|
|
30
|
+
* the type of key (such as a public key for BLS or an ethereum address for Secp)
|
|
31
|
+
* @example Key#0x8e3484687e66cdd26cf04c3647633ab4f3570148
|
|
32
|
+
* */
|
|
33
|
+
readonly id: string;
|
|
34
|
+
/** The type of key. */
|
|
35
|
+
readonly type: KeyType;
|
|
36
|
+
/**
|
|
37
|
+
* A unique identifier specific to the type of key, such as a public key or an ethereum address
|
|
38
|
+
* @example 0x8e3484687e66cdd26cf04c3647633ab4f3570148
|
|
39
|
+
* */
|
|
40
|
+
readonly materialId: string;
|
|
41
|
+
/**
|
|
42
|
+
* @description Hex-encoded, serialized public key. The format used depends on the key type:
|
|
43
|
+
* - secp256k1 keys use 65-byte uncompressed SECG format
|
|
44
|
+
* - BLS keys use 48-byte compressed BLS12-381 (ZCash) format
|
|
45
|
+
* @example 0x04d2688b6bc2ce7f9879b9e745f3c4dc177908c5cef0c1b64cff19ae7ff27dee623c64fe9d9c325c7fbbc748bbd5f607ce14dd83e28ebbbb7d3e7f2ffb70a79431
|
|
46
|
+
* */
|
|
47
|
+
readonly publicKey: string;
|
|
48
|
+
/** Is the key enabled? */
|
|
49
|
+
enabled(): Promise<boolean>;
|
|
50
|
+
/** Enable the key. */
|
|
51
|
+
enable(): Promise<void>;
|
|
52
|
+
/** Disable the key. */
|
|
53
|
+
disable(): Promise<void>;
|
|
54
|
+
/**
|
|
55
|
+
* Set new policy (overwriting any policies previously set for this key)
|
|
56
|
+
* @param {KeyPolicy} policy The new policy to set
|
|
57
|
+
*/
|
|
58
|
+
setPolicy(policy: KeyPolicy): Promise<void>;
|
|
59
|
+
/**
|
|
60
|
+
* Append to existing key policy. This append is not atomic -- it uses {@link policy} to fetch the current policy and then {@link setPolicy} to set the policy -- and should not be used in across concurrent sessions.
|
|
61
|
+
* @param {KeyPolicy} policy The policy to append to the existing one.
|
|
62
|
+
*/
|
|
63
|
+
appendPolicy(policy: KeyPolicy): Promise<void>;
|
|
64
|
+
/**
|
|
65
|
+
* Get the policy for the org.
|
|
66
|
+
* @return {Promise<KeyPolicy>} The policy for the org.
|
|
67
|
+
*/
|
|
68
|
+
policy(): Promise<KeyPolicy>;
|
|
69
|
+
/**
|
|
70
|
+
* @description Owner of the key
|
|
71
|
+
* @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
|
|
72
|
+
* */
|
|
73
|
+
owner(): Promise<string>;
|
|
74
|
+
/** Set the owner of the key. Only the key (or org) owner can change the owner of the key.
|
|
75
|
+
* @param {string} owner The user-id of the new owner of the key.
|
|
76
|
+
* */
|
|
77
|
+
setOwner(owner: string): Promise<void>;
|
|
78
|
+
/** Create a new key.
|
|
79
|
+
* @param {CubeSigner} cs The CubeSigner instance to use for signing.
|
|
80
|
+
* @param {string} orgId The id of the organization to which the key belongs.
|
|
81
|
+
* @param {KeyInfo} data The JSON response from the API server.
|
|
82
|
+
* @internal
|
|
83
|
+
* */
|
|
84
|
+
constructor(cs: CubeSigner, orgId: string, data: KeyInfo);
|
|
85
|
+
/** Update the key.
|
|
86
|
+
* @param {UpdateKeyRequest} request The JSON request to send to the API server.
|
|
87
|
+
* @return {KeyInfo} The JSON response from the API server.
|
|
88
|
+
* */
|
|
89
|
+
private update;
|
|
90
|
+
/** Create new signing keys.
|
|
91
|
+
* @param {CubeSigner} cs The CubeSigner instance to use for signing.
|
|
92
|
+
* @param {string} orgId The id of the organization to which the key belongs.
|
|
93
|
+
* @param {KeyType} keyType The type of key to create.
|
|
94
|
+
* @param {number} count The number of keys to create.
|
|
95
|
+
* @param {string?} ownerId The owner of the keys. Defaults to the session's user.
|
|
96
|
+
* @return {Key[]} The new keys.
|
|
97
|
+
* @internal
|
|
98
|
+
* */
|
|
99
|
+
static createKeys(cs: CubeSigner, orgId: string, keyType: KeyType, count: number, ownerId?: string): Promise<Key[]>;
|
|
100
|
+
/** Get a key by id.
|
|
101
|
+
* @param {CubeSigner} cs The CubeSigner instance to use for signing.
|
|
102
|
+
* @param {string} orgId The id of the organization to which the key belongs.
|
|
103
|
+
* @param {string} keyId The id of the key to get.
|
|
104
|
+
* @return {Key} The key.
|
|
105
|
+
* @internal
|
|
106
|
+
* */
|
|
107
|
+
static getKey(cs: CubeSigner, orgId: string, keyId: string): Promise<Key>;
|
|
108
|
+
/** Fetches the key information.
|
|
109
|
+
* @return {KeyInfo} The key information.
|
|
110
|
+
* @internal
|
|
111
|
+
* */
|
|
112
|
+
private fetch;
|
|
113
|
+
}
|
|
114
|
+
export {};
|
package/dist/src/key.js
ADDED
|
@@ -0,0 +1,201 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
3
|
+
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
4
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
5
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
6
|
+
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
7
|
+
};
|
|
8
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
9
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
10
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
11
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
12
|
+
};
|
|
13
|
+
var _Key_cs;
|
|
14
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
+
exports.Key = exports.Ed25519 = exports.BLS = exports.Secp256k1 = void 0;
|
|
16
|
+
const util_1 = require("./util");
|
|
17
|
+
/** Secp256k1 key type */
|
|
18
|
+
var Secp256k1;
|
|
19
|
+
(function (Secp256k1) {
|
|
20
|
+
Secp256k1["Evm"] = "SecpEthAddr";
|
|
21
|
+
Secp256k1["Btc"] = "SecpBtc";
|
|
22
|
+
Secp256k1["BtcTest"] = "SecpBtcTest";
|
|
23
|
+
})(Secp256k1 || (exports.Secp256k1 = Secp256k1 = {}));
|
|
24
|
+
/** BLS key type */
|
|
25
|
+
var BLS;
|
|
26
|
+
(function (BLS) {
|
|
27
|
+
BLS["Eth2Deposited"] = "BlsPub";
|
|
28
|
+
BLS["Eth2Inactive"] = "BlsInactive";
|
|
29
|
+
})(BLS || (exports.BLS = BLS = {}));
|
|
30
|
+
/** Ed25519 key type */
|
|
31
|
+
var Ed25519;
|
|
32
|
+
(function (Ed25519) {
|
|
33
|
+
Ed25519["Solana"] = "Ed25519SolanaAddr";
|
|
34
|
+
Ed25519["Sui"] = "Ed25519SuiAddr";
|
|
35
|
+
Ed25519["Aptos"] = "Ed25519AptosAddr";
|
|
36
|
+
})(Ed25519 || (exports.Ed25519 = Ed25519 = {}));
|
|
37
|
+
/** Signing keys. */
|
|
38
|
+
class Key {
|
|
39
|
+
/** Is the key enabled? */
|
|
40
|
+
async enabled() {
|
|
41
|
+
const data = await this.fetch();
|
|
42
|
+
return data.enabled;
|
|
43
|
+
}
|
|
44
|
+
/** Enable the key. */
|
|
45
|
+
async enable() {
|
|
46
|
+
await this.update({ enabled: true });
|
|
47
|
+
}
|
|
48
|
+
/** Disable the key. */
|
|
49
|
+
async disable() {
|
|
50
|
+
await this.update({ enabled: false });
|
|
51
|
+
}
|
|
52
|
+
/**
|
|
53
|
+
* Set new policy (overwriting any policies previously set for this key)
|
|
54
|
+
* @param {KeyPolicy} policy The new policy to set
|
|
55
|
+
*/
|
|
56
|
+
async setPolicy(policy) {
|
|
57
|
+
await this.update({ policy: policy });
|
|
58
|
+
}
|
|
59
|
+
/**
|
|
60
|
+
* Append to existing key policy. This append is not atomic -- it uses {@link policy} to fetch the current policy and then {@link setPolicy} to set the policy -- and should not be used in across concurrent sessions.
|
|
61
|
+
* @param {KeyPolicy} policy The policy to append to the existing one.
|
|
62
|
+
*/
|
|
63
|
+
async appendPolicy(policy) {
|
|
64
|
+
const existing = await this.policy();
|
|
65
|
+
await this.setPolicy([...existing, ...policy]);
|
|
66
|
+
}
|
|
67
|
+
/**
|
|
68
|
+
* Get the policy for the org.
|
|
69
|
+
* @return {Promise<KeyPolicy>} The policy for the org.
|
|
70
|
+
*/
|
|
71
|
+
async policy() {
|
|
72
|
+
const data = await this.fetch();
|
|
73
|
+
return (data.policy ?? []);
|
|
74
|
+
}
|
|
75
|
+
/**
|
|
76
|
+
* @description Owner of the key
|
|
77
|
+
* @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
|
|
78
|
+
* */
|
|
79
|
+
async owner() {
|
|
80
|
+
const data = await this.fetch();
|
|
81
|
+
return data.owner;
|
|
82
|
+
}
|
|
83
|
+
/** Set the owner of the key. Only the key (or org) owner can change the owner of the key.
|
|
84
|
+
* @param {string} owner The user-id of the new owner of the key.
|
|
85
|
+
* */
|
|
86
|
+
async setOwner(owner) {
|
|
87
|
+
await this.update({ owner });
|
|
88
|
+
}
|
|
89
|
+
// --------------------------------------------------------------------------
|
|
90
|
+
// -- INTERNAL --------------------------------------------------------------
|
|
91
|
+
// --------------------------------------------------------------------------
|
|
92
|
+
/** Create a new key.
|
|
93
|
+
* @param {CubeSigner} cs The CubeSigner instance to use for signing.
|
|
94
|
+
* @param {string} orgId The id of the organization to which the key belongs.
|
|
95
|
+
* @param {KeyInfo} data The JSON response from the API server.
|
|
96
|
+
* @internal
|
|
97
|
+
* */
|
|
98
|
+
constructor(cs, orgId, data) {
|
|
99
|
+
/** The CubeSigner instance that this key is associated with */
|
|
100
|
+
_Key_cs.set(this, void 0);
|
|
101
|
+
__classPrivateFieldSet(this, _Key_cs, cs, "f");
|
|
102
|
+
this.orgId = orgId;
|
|
103
|
+
this.id = data.key_id;
|
|
104
|
+
this.type = fromSchemaKeyType(data.key_type);
|
|
105
|
+
this.materialId = data.material_id;
|
|
106
|
+
this.publicKey = data.public_key;
|
|
107
|
+
}
|
|
108
|
+
/** Update the key.
|
|
109
|
+
* @param {UpdateKeyRequest} request The JSON request to send to the API server.
|
|
110
|
+
* @return {KeyInfo} The JSON response from the API server.
|
|
111
|
+
* */
|
|
112
|
+
async update(request) {
|
|
113
|
+
const resp = await (await __classPrivateFieldGet(this, _Key_cs, "f").management()).patch("/v0/org/{org_id}/keys/{key_id}", {
|
|
114
|
+
params: { path: { org_id: this.orgId, key_id: this.id } },
|
|
115
|
+
body: request,
|
|
116
|
+
parseAs: "json",
|
|
117
|
+
});
|
|
118
|
+
return (0, util_1.assertOk)(resp);
|
|
119
|
+
}
|
|
120
|
+
/** Create new signing keys.
|
|
121
|
+
* @param {CubeSigner} cs The CubeSigner instance to use for signing.
|
|
122
|
+
* @param {string} orgId The id of the organization to which the key belongs.
|
|
123
|
+
* @param {KeyType} keyType The type of key to create.
|
|
124
|
+
* @param {number} count The number of keys to create.
|
|
125
|
+
* @param {string?} ownerId The owner of the keys. Defaults to the session's user.
|
|
126
|
+
* @return {Key[]} The new keys.
|
|
127
|
+
* @internal
|
|
128
|
+
* */
|
|
129
|
+
static async createKeys(cs, orgId, keyType, count, ownerId) {
|
|
130
|
+
const chain_id = 0; // not used anymore
|
|
131
|
+
const resp = await (await cs.management()).post("/v0/org/{org_id}/keys", {
|
|
132
|
+
params: { path: { org_id: orgId } },
|
|
133
|
+
body: {
|
|
134
|
+
count,
|
|
135
|
+
chain_id,
|
|
136
|
+
key_type: keyType,
|
|
137
|
+
owner: ownerId || null,
|
|
138
|
+
},
|
|
139
|
+
parseAs: "json",
|
|
140
|
+
});
|
|
141
|
+
const data = (0, util_1.assertOk)(resp);
|
|
142
|
+
return data.keys.map((k) => new Key(cs, orgId, k));
|
|
143
|
+
}
|
|
144
|
+
/** Get a key by id.
|
|
145
|
+
* @param {CubeSigner} cs The CubeSigner instance to use for signing.
|
|
146
|
+
* @param {string} orgId The id of the organization to which the key belongs.
|
|
147
|
+
* @param {string} keyId The id of the key to get.
|
|
148
|
+
* @return {Key} The key.
|
|
149
|
+
* @internal
|
|
150
|
+
* */
|
|
151
|
+
static async getKey(cs, orgId, keyId) {
|
|
152
|
+
const resp = await (await cs.management()).get("/v0/org/{org_id}/keys/{key_id}", {
|
|
153
|
+
params: { path: { org_id: orgId, key_id: keyId } },
|
|
154
|
+
parseAs: "json",
|
|
155
|
+
});
|
|
156
|
+
const data = (0, util_1.assertOk)(resp);
|
|
157
|
+
return new Key(cs, orgId, data);
|
|
158
|
+
}
|
|
159
|
+
/** Fetches the key information.
|
|
160
|
+
* @return {KeyInfo} The key information.
|
|
161
|
+
* @internal
|
|
162
|
+
* */
|
|
163
|
+
async fetch() {
|
|
164
|
+
const resp = await (await __classPrivateFieldGet(this, _Key_cs, "f").management()).get("/v0/org/{org_id}/keys/{key_id}", {
|
|
165
|
+
params: { path: { org_id: this.orgId, key_id: this.id } },
|
|
166
|
+
parseAs: "json",
|
|
167
|
+
});
|
|
168
|
+
const data = (0, util_1.assertOk)(resp);
|
|
169
|
+
return data;
|
|
170
|
+
}
|
|
171
|
+
}
|
|
172
|
+
exports.Key = Key;
|
|
173
|
+
_Key_cs = new WeakMap();
|
|
174
|
+
/** Convert a schema key type to a key type.
|
|
175
|
+
* @param {SchemaKeyType} ty The schema key type.
|
|
176
|
+
* @return {KeyType} The key type.
|
|
177
|
+
* @internal
|
|
178
|
+
* */
|
|
179
|
+
function fromSchemaKeyType(ty) {
|
|
180
|
+
switch (ty) {
|
|
181
|
+
case "SecpEthAddr":
|
|
182
|
+
return Secp256k1.Evm;
|
|
183
|
+
case "SecpBtc":
|
|
184
|
+
return Secp256k1.Btc;
|
|
185
|
+
case "SecpBtcTest":
|
|
186
|
+
return Secp256k1.BtcTest;
|
|
187
|
+
case "BlsPub":
|
|
188
|
+
return BLS.Eth2Deposited;
|
|
189
|
+
case "BlsInactive":
|
|
190
|
+
return BLS.Eth2Inactive;
|
|
191
|
+
case "Ed25519SolanaAddr":
|
|
192
|
+
return Ed25519.Solana;
|
|
193
|
+
case "Ed25519SuiAddr":
|
|
194
|
+
return Ed25519.Sui;
|
|
195
|
+
case "Ed25519AptosAddr":
|
|
196
|
+
return Ed25519.Aptos;
|
|
197
|
+
default:
|
|
198
|
+
throw new Error(`Unknown key type: ${ty}`);
|
|
199
|
+
}
|
|
200
|
+
}
|
|
201
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key.js","sourceRoot":"","sources":["../../src/key.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAEA,iCAAkC;AAElC,yBAAyB;AACzB,IAAY,SAIX;AAJD,WAAY,SAAS;IACnB,gCAAmB,CAAA;IACnB,4BAAe,CAAA;IACf,oCAAuB,CAAA;AACzB,CAAC,EAJW,SAAS,yBAAT,SAAS,QAIpB;AAED,mBAAmB;AACnB,IAAY,GAGX;AAHD,WAAY,GAAG;IACb,+BAAwB,CAAA;IACxB,mCAA4B,CAAA;AAC9B,CAAC,EAHW,GAAG,mBAAH,GAAG,QAGd;AAED,uBAAuB;AACvB,IAAY,OAIX;AAJD,WAAY,OAAO;IACjB,uCAA4B,CAAA;IAC5B,iCAAsB,CAAA;IACtB,qCAA0B,CAAA;AAC5B,CAAC,EAJW,OAAO,uBAAP,OAAO,QAIlB;AAWD,oBAAoB;AACpB,MAAa,GAAG;IA6Bd,0BAA0B;IAC1B,KAAK,CAAC,OAAO;QACX,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,KAAK,EAAE,CAAC;QAChC,OAAO,IAAI,CAAC,OAAO,CAAC;IACtB,CAAC;IAED,sBAAsB;IACtB,KAAK,CAAC,MAAM;QACV,MAAM,IAAI,CAAC,MAAM,CAAC,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC,CAAC;IACvC,CAAC;IAED,uBAAuB;IACvB,KAAK,CAAC,OAAO;QACX,MAAM,IAAI,CAAC,MAAM,CAAC,EAAE,OAAO,EAAE,KAAK,EAAE,CAAC,CAAC;IACxC,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,SAAS,CAAC,MAAiB;QAC/B,MAAM,IAAI,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,MAA4C,EAAE,CAAC,CAAC;IAC9E,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,YAAY,CAAC,MAAiB;QAClC,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,EAAE,CAAC;QACrC,MAAM,IAAI,CAAC,SAAS,CAAC,CAAC,GAAG,QAAQ,EAAE,GAAG,MAAM,CAAC,CAAC,CAAC;IACjD,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,MAAM;QACV,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,KAAK,EAAE,CAAC;QAChC,OAAO,CAAC,IAAI,CAAC,MAAM,IAAI,EAAE,CAAyB,CAAC;IACrD,CAAC;IAED;;;SAGK;IACL,KAAK,CAAC,KAAK;QACT,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,KAAK,EAAE,CAAC;QAChC,OAAO,IAAI,CAAC,KAAK,CAAC;IACpB,CAAC;IAED;;SAEK;IACL,KAAK,CAAC,QAAQ,CAAC,KAAa;QAC1B,MAAM,IAAI,CAAC,MAAM,CAAC,EAAE,KAAK,EAAE,CAAC,CAAC;IAC/B,CAAC;IAED,6EAA6E;IAC7E,6EAA6E;IAC7E,6EAA6E;IAE7E;;;;;SAKK;IACL,YAAY,EAAc,EAAE,KAAa,EAAE,IAAa;QAhGxD,+DAA+D;QACtD,0BAAgB;QAgGvB,uBAAA,IAAI,WAAO,EAAE,MAAA,CAAC;QACd,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;QACnB,IAAI,CAAC,EAAE,GAAG,IAAI,CAAC,MAAM,CAAC;QACtB,IAAI,CAAC,IAAI,GAAG,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QAC7C,IAAI,CAAC,UAAU,GAAG,IAAI,CAAC,WAAW,CAAC;QACnC,IAAI,CAAC,SAAS,GAAG,IAAI,CAAC,UAAU,CAAC;IACnC,CAAC;IAED;;;SAGK;IACG,KAAK,CAAC,MAAM,CAAC,OAAyB;QAC5C,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,uBAAA,IAAI,eAAI,CAAC,UAAU,EAAE,CAC5B,CAAC,KAAK,CAAC,gCAAgC,EAAE;YACxC,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,IAAI,CAAC,KAAK,EAAE,MAAM,EAAE,IAAI,CAAC,EAAE,EAAE,EAAE;YACzD,IAAI,EAAE,OAAO;YACb,OAAO,EAAE,MAAM;SAChB,CAAC,CAAC;QACH,OAAO,IAAA,eAAQ,EAAC,IAAI,CAAC,CAAC;IACxB,CAAC;IAED;;;;;;;;SAQK;IACL,MAAM,CAAC,KAAK,CAAC,UAAU,CACrB,EAAc,EACd,KAAa,EACb,OAAgB,EAChB,KAAa,EACb,OAAgB;QAEhB,MAAM,QAAQ,GAAG,CAAC,CAAC,CAAC,mBAAmB;QACvC,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,EAAE,CAAC,UAAU,EAAE,CACtB,CAAC,IAAI,CAAC,uBAAuB,EAAE;YAC9B,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,KAAK,EAAE,EAAE;YACnC,IAAI,EAAE;gBACJ,KAAK;gBACL,QAAQ;gBACR,QAAQ,EAAE,OAAO;gBACjB,KAAK,EAAE,OAAO,IAAI,IAAI;aACvB;YACD,OAAO,EAAE,MAAM;SAChB,CAAC,CAAC;QACH,MAAM,IAAI,GAAG,IAAA,eAAQ,EAAC,IAAI,CAAC,CAAC;QAC5B,OAAO,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAU,EAAE,EAAE,CAAC,IAAI,GAAG,CAAC,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC,CAAC,CAAC;IAC9D,CAAC;IAED;;;;;;SAMK;IACL,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,EAAc,EAAE,KAAa,EAAE,KAAa;QAC9D,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,EAAE,CAAC,UAAU,EAAE,CACtB,CAAC,GAAG,CAAC,gCAAgC,EAAE;YACtC,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,EAAE;YAClD,OAAO,EAAE,MAAM;SAChB,CAAC,CAAC;QACH,MAAM,IAAI,GAAG,IAAA,eAAQ,EAAC,IAAI,CAAC,CAAC;QAC5B,OAAO,IAAI,GAAG,CAAC,EAAE,EAAE,KAAK,EAAE,IAAI,CAAC,CAAC;IAClC,CAAC;IAED;;;SAGK;IACG,KAAK,CAAC,KAAK;QACjB,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,uBAAA,IAAI,eAAI,CAAC,UAAU,EAAE,CAC5B,CAAC,GAAG,CAAC,gCAAgC,EAAE;YACtC,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,IAAI,CAAC,KAAK,EAAE,MAAM,EAAE,IAAI,CAAC,EAAE,EAAE,EAAE;YACzD,OAAO,EAAE,MAAM;SAChB,CAAC,CAAC;QACH,MAAM,IAAI,GAAG,IAAA,eAAQ,EAAC,IAAI,CAAC,CAAC;QAC5B,OAAO,IAAI,CAAC;IACd,CAAC;CACF;AA1LD,kBA0LC;;AAED;;;;KAIK;AACL,SAAS,iBAAiB,CAAC,EAAiB;IAC1C,QAAQ,EAAE,EAAE;QACV,KAAK,aAAa;YAChB,OAAO,SAAS,CAAC,GAAG,CAAC;QACvB,KAAK,SAAS;YACZ,OAAO,SAAS,CAAC,GAAG,CAAC;QACvB,KAAK,aAAa;YAChB,OAAO,SAAS,CAAC,OAAO,CAAC;QAC3B,KAAK,QAAQ;YACX,OAAO,GAAG,CAAC,aAAa,CAAC;QAC3B,KAAK,aAAa;YAChB,OAAO,GAAG,CAAC,YAAY,CAAC;QAC1B,KAAK,mBAAmB;YACtB,OAAO,OAAO,CAAC,MAAM,CAAC;QACxB,KAAK,gBAAgB;YACnB,OAAO,OAAO,CAAC,GAAG,CAAC;QACrB,KAAK,kBAAkB;YACrB,OAAO,OAAO,CAAC,KAAK,CAAC;QACvB;YACE,MAAM,IAAI,KAAK,CAAC,qBAAqB,EAAE,EAAE,CAAC,CAAC;KAC9C;AACH,CAAC","sourcesContent":["import { CubeSigner, KeyPolicy } from \".\";\nimport { components } from \"./client\";\nimport { assertOk } from \"./util\";\n\n/** Secp256k1 key type */\nexport enum Secp256k1 {\n  Evm = \"SecpEthAddr\", // eslint-disable-line no-unused-vars\n  Btc = \"SecpBtc\", // eslint-disable-line no-unused-vars\n  BtcTest = \"SecpBtcTest\", // eslint-disable-line no-unused-vars\n}\n\n/** BLS key type */\nexport enum BLS {\n  Eth2Deposited = \"BlsPub\", // eslint-disable-line no-unused-vars\n  Eth2Inactive = \"BlsInactive\", // eslint-disable-line no-unused-vars\n}\n\n/** Ed25519 key type */\nexport enum Ed25519 {\n  Solana = \"Ed25519SolanaAddr\", // eslint-disable-line no-unused-vars\n  Sui = \"Ed25519SuiAddr\", // eslint-disable-line no-unused-vars\n  Aptos = \"Ed25519AptosAddr\", // eslint-disable-line no-unused-vars\n}\n\n/** Key type */\nexport type KeyType = Secp256k1 | BLS | Ed25519;\n\n/** Schema key type (i.e., key type at the API level) */\ntype SchemaKeyType = components[\"schemas\"][\"KeyType\"];\n\ntype UpdateKeyRequest = components[\"schemas\"][\"UpdateKeyRequest\"];\ntype KeyInfo = components[\"schemas\"][\"KeyInfo\"];\n\n/** Signing keys. */\nexport class Key {\n  /** The CubeSigner instance that this key is associated with */\n  readonly #cs: CubeSigner;\n  /** The organization that this key is in */\n  readonly orgId: string;\n  /**\n   * The id of the key: \"Key#\" followed by a unique identifier specific to\n   * the type of key (such as a public key for BLS or an ethereum address for Secp)\n   * @example Key#0x8e3484687e66cdd26cf04c3647633ab4f3570148\n   * */\n  readonly id: string;\n\n  /** The type of key. */\n  readonly type: KeyType;\n\n  /**\n   * A unique identifier specific to the type of key, such as a public key or an ethereum address\n   * @example 0x8e3484687e66cdd26cf04c3647633ab4f3570148\n   * */\n  readonly materialId: string;\n\n  /**\n   * @description Hex-encoded, serialized public key. The format used depends on the key type:\n   * - secp256k1 keys use 65-byte uncompressed SECG format\n   * - BLS keys use 48-byte compressed BLS12-381 (ZCash) format\n   * @example 0x04d2688b6bc2ce7f9879b9e745f3c4dc177908c5cef0c1b64cff19ae7ff27dee623c64fe9d9c325c7fbbc748bbd5f607ce14dd83e28ebbbb7d3e7f2ffb70a79431\n   * */\n  readonly publicKey: string;\n\n  /** Is the key enabled? */\n  async enabled(): Promise<boolean> {\n    const data = await this.fetch();\n    return data.enabled;\n  }\n\n  /** Enable the key. */\n  async enable() {\n    await this.update({ enabled: true });\n  }\n\n  /** Disable the key. */\n  async disable() {\n    await this.update({ enabled: false });\n  }\n\n  /**\n   * Set new policy (overwriting any policies previously set for this key)\n   * @param {KeyPolicy} policy The new policy to set\n   */\n  async setPolicy(policy: KeyPolicy) {\n    await this.update({ policy: policy as unknown as Record<string, never>[] });\n  }\n\n  /**\n   * Append to existing key policy. This append is not atomic -- it uses {@link policy} to fetch the current policy and then {@link setPolicy} to set the policy -- and should not be used in across concurrent sessions.\n   * @param {KeyPolicy} policy The policy to append to the existing one.\n   */\n  async appendPolicy(policy: KeyPolicy) {\n    const existing = await this.policy();\n    await this.setPolicy([...existing, ...policy]);\n  }\n\n  /**\n   * Get the policy for the org.\n   * @return {Promise<KeyPolicy>} The policy for the org.\n   */\n  async policy(): Promise<KeyPolicy> {\n    const data = await this.fetch();\n    return (data.policy ?? []) as unknown as KeyPolicy;\n  }\n\n  /**\n   * @description Owner of the key\n   * @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f\n   * */\n  async owner(): Promise<string> {\n    const data = await this.fetch();\n    return data.owner;\n  }\n\n  /** Set the owner of the key. Only the key (or org) owner can change the owner of the key.\n   * @param {string} owner The user-id of the new owner of the key.\n   * */\n  async setOwner(owner: string) {\n    await this.update({ owner });\n  }\n\n  // --------------------------------------------------------------------------\n  // -- INTERNAL --------------------------------------------------------------\n  // --------------------------------------------------------------------------\n\n  /** Create a new key.\n   * @param {CubeSigner} cs The CubeSigner instance to use for signing.\n   * @param {string} orgId The id of the organization to which the key belongs.\n   * @param {KeyInfo} data The JSON response from the API server.\n   * @internal\n   * */\n  constructor(cs: CubeSigner, orgId: string, data: KeyInfo) {\n    this.#cs = cs;\n    this.orgId = orgId;\n    this.id = data.key_id;\n    this.type = fromSchemaKeyType(data.key_type);\n    this.materialId = data.material_id;\n    this.publicKey = data.public_key;\n  }\n\n  /** Update the key.\n   * @param {UpdateKeyRequest} request The JSON request to send to the API server.\n   * @return {KeyInfo} The JSON response from the API server.\n   * */\n  private async update(request: UpdateKeyRequest): Promise<KeyInfo> {\n    const resp = await (\n      await this.#cs.management()\n    ).patch(\"/v0/org/{org_id}/keys/{key_id}\", {\n      params: { path: { org_id: this.orgId, key_id: this.id } },\n      body: request,\n      parseAs: \"json\",\n    });\n    return assertOk(resp);\n  }\n\n  /** Create new signing keys.\n   * @param {CubeSigner} cs The CubeSigner instance to use for signing.\n   * @param {string} orgId The id of the organization to which the key belongs.\n   * @param {KeyType} keyType The type of key to create.\n   * @param {number} count The number of keys to create.\n   * @param {string?} ownerId The owner of the keys. Defaults to the session's user.\n   * @return {Key[]} The new keys.\n   * @internal\n   * */\n  static async createKeys(\n    cs: CubeSigner,\n    orgId: string,\n    keyType: KeyType,\n    count: number,\n    ownerId?: string,\n  ): Promise<Key[]> {\n    const chain_id = 0; // not used anymore\n    const resp = await (\n      await cs.management()\n    ).post(\"/v0/org/{org_id}/keys\", {\n      params: { path: { org_id: orgId } },\n      body: {\n        count,\n        chain_id,\n        key_type: keyType,\n        owner: ownerId || null,\n      },\n      parseAs: \"json\",\n    });\n    const data = assertOk(resp);\n    return data.keys.map((k: KeyInfo) => new Key(cs, orgId, k));\n  }\n\n  /** Get a key by id.\n   * @param {CubeSigner} cs The CubeSigner instance to use for signing.\n   * @param {string} orgId The id of the organization to which the key belongs.\n   * @param {string} keyId The id of the key to get.\n   * @return {Key} The key.\n   * @internal\n   * */\n  static async getKey(cs: CubeSigner, orgId: string, keyId: string): Promise<Key> {\n    const resp = await (\n      await cs.management()\n    ).get(\"/v0/org/{org_id}/keys/{key_id}\", {\n      params: { path: { org_id: orgId, key_id: keyId } },\n      parseAs: \"json\",\n    });\n    const data = assertOk(resp);\n    return new Key(cs, orgId, data);\n  }\n\n  /** Fetches the key information.\n   * @return {KeyInfo} The key information.\n   * @internal\n   * */\n  private async fetch(): Promise<KeyInfo> {\n    const resp = await (\n      await this.#cs.management()\n    ).get(\"/v0/org/{org_id}/keys/{key_id}\", {\n      params: { path: { org_id: this.orgId, key_id: this.id } },\n      parseAs: \"json\",\n    });\n    const data = assertOk(resp);\n    return data;\n  }\n}\n\n/** Convert a schema key type to a key type.\n * @param {SchemaKeyType} ty The schema key type.\n * @return {KeyType} The key type.\n * @internal\n * */\nfunction fromSchemaKeyType(ty: SchemaKeyType): KeyType {\n  switch (ty) {\n    case \"SecpEthAddr\":\n      return Secp256k1.Evm;\n    case \"SecpBtc\":\n      return Secp256k1.Btc;\n    case \"SecpBtcTest\":\n      return Secp256k1.BtcTest;\n    case \"BlsPub\":\n      return BLS.Eth2Deposited;\n    case \"BlsInactive\":\n      return BLS.Eth2Inactive;\n    case \"Ed25519SolanaAddr\":\n      return Ed25519.Solana;\n    case \"Ed25519SuiAddr\":\n      return Ed25519.Sui;\n    case \"Ed25519AptosAddr\":\n      return Ed25519.Aptos;\n    default:\n      throw new Error(`Unknown key type: ${ty}`);\n  }\n}\n"]}
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
import { Sign, SignResponse, Role } from ".";
|
|
2
|
+
/**
|
|
3
|
+
* Wrapper around @type {Sign} and @type {Role} that adds a **single-approval**
|
|
4
|
+
* multi-factor authorization on top of all sign operations.
|
|
5
|
+
*/
|
|
6
|
+
export declare class Mfa {
|
|
7
|
+
#private;
|
|
8
|
+
/**
|
|
9
|
+
* Auto approve a sign operation that requires MFA.
|
|
10
|
+
*
|
|
11
|
+
* @param signFn The sign operation to call
|
|
12
|
+
* @param {T} args Arguments to the sign operation
|
|
13
|
+
* @return {Promise<U>} The result of the sign operation.
|
|
14
|
+
*/
|
|
15
|
+
autoApprove<T extends Array<any>, U>(// eslint-disable-line @typescript-eslint/no-explicit-any
|
|
16
|
+
signFn: (...args: T) => Promise<SignResponse<U>>, ...args: T): Promise<U>;
|
|
17
|
+
/**
|
|
18
|
+
* Constructor.
|
|
19
|
+
* @param {Sign} sign Sign instance to use for signing
|
|
20
|
+
* @param {Role} role Role instance to use for MFA approval
|
|
21
|
+
*/
|
|
22
|
+
constructor(sign: Sign, role: Role);
|
|
23
|
+
}
|