@cubist-labs/cubesigner-sdk 0.1.26 → 0.1.50
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +30 -22
- package/dist/src/ethers/index.d.ts +25 -5
- package/dist/src/ethers/index.js +53 -16
- package/dist/src/index.d.ts +50 -33
- package/dist/src/index.js +79 -39
- package/dist/src/key.d.ts +58 -8
- package/dist/src/key.js +77 -14
- package/dist/src/org.d.ts +71 -6
- package/dist/src/org.js +90 -8
- package/dist/src/role.d.ts +19 -7
- package/dist/src/role.js +5 -3
- package/dist/src/schema.d.ts +1273 -91
- package/dist/src/schema.js +1 -1
- package/dist/src/session/cognito_manager.d.ts +59 -0
- package/dist/src/session/cognito_manager.js +111 -0
- package/dist/src/session/session_manager.d.ts +15 -0
- package/dist/src/session/session_manager.js +20 -1
- package/dist/src/session/signer_session_manager.d.ts +22 -12
- package/dist/src/session/signer_session_manager.js +42 -19
- package/dist/src/signer_session.d.ts +41 -29
- package/dist/src/signer_session.js +84 -69
- package/package.json +4 -1
- package/src/ethers/index.ts +83 -16
- package/src/index.ts +112 -64
- package/src/key.ts +103 -16
- package/src/org.ts +126 -10
- package/src/role.ts +21 -8
- package/src/schema.ts +1356 -168
- package/src/session/{management_session_manager.ts → cognito_manager.ts} +13 -15
- package/src/session/session_manager.ts +24 -0
- package/src/session/signer_session_manager.ts +52 -26
- package/src/signer_session.ts +90 -81
- package/src/session/oidc_session_manager.ts +0 -193
package/README.md
CHANGED
|
@@ -71,11 +71,11 @@ session manager:
|
|
|
71
71
|
|
|
72
72
|
```typescript
|
|
73
73
|
// Load session from a JSON file
|
|
74
|
-
const fileStorage = new cs.JsonFileSessionStorage<cs.
|
|
74
|
+
const fileStorage = new cs.JsonFileSessionStorage<cs.CognitoSessionInfo>(
|
|
75
75
|
`${process.env.HOME}/.config/cubesigner/management-session.json`,
|
|
76
76
|
);
|
|
77
77
|
// Create a session manager for a management token
|
|
78
|
-
const sessionMgr = await cs.
|
|
78
|
+
const sessionMgr = await cs.CognitoSessionManager.loadFromStorage(fileStorage);
|
|
79
79
|
new cs.CubeSigner({
|
|
80
80
|
sessionMgr,
|
|
81
81
|
});
|
|
@@ -113,7 +113,7 @@ transaction. For that, we need a key of type `Secp256k1.Evm`.
|
|
|
113
113
|
const secpKey = await org.createKey(cs.Secp256k1.Evm);
|
|
114
114
|
assert((await secpKey.owner()) == me.user_id);
|
|
115
115
|
assert(await secpKey.enabled());
|
|
116
|
-
console.log(`Created '${secpKey.type}' key ${secpKey.id}`);
|
|
116
|
+
console.log(`Created '${await secpKey.type()}' key ${secpKey.id}`);
|
|
117
117
|
```
|
|
118
118
|
|
|
119
119
|
### Create a `Role` and a `SignerSession`
|
|
@@ -201,7 +201,7 @@ assert(sig.data().rlp_signed_tx);
|
|
|
201
201
|
```typescript
|
|
202
202
|
const { ethers } = require("ethers");
|
|
203
203
|
// Create new Signer
|
|
204
|
-
const ethersSigner = new cs.ethers.Signer(secpKey.materialId, session
|
|
204
|
+
const ethersSigner = new cs.ethers.Signer(secpKey.materialId, session);
|
|
205
205
|
assert((await ethersSigner.getAddress()) === secpKey.materialId);
|
|
206
206
|
// sign transaction as usual:
|
|
207
207
|
console.log(
|
|
@@ -264,22 +264,30 @@ disabled for `BLS` keys, and for other key types it can be enabled by
|
|
|
264
264
|
attaching an `"AllowRawBlobSigning"` policy:
|
|
265
265
|
|
|
266
266
|
```typescript
|
|
267
|
-
|
|
268
|
-
const
|
|
269
|
-
|
|
270
|
-
};
|
|
271
|
-
|
|
272
|
-
|
|
273
|
-
|
|
274
|
-
|
|
275
|
-
|
|
267
|
+
// Create a new Ed25519 key (e.g., for Cardano) and add it to our session role
|
|
268
|
+
const edKey = await org.createKey(cs.Ed25519.Cardano);
|
|
269
|
+
await role.addKey(edKey);
|
|
270
|
+
console.log(`Created '${await edKey.type()}' key ${edKey.id} and added it to role ${role.id}`);
|
|
271
|
+
|
|
272
|
+
// Sign raw blobs with our new ed key and the secp we created before
|
|
273
|
+
for (const key of [edKey, secpKey]) {
|
|
274
|
+
console.log(`Confirming that raw blob with ${await key.type()} is rejected by default`);
|
|
275
|
+
const blobReq = <cs.BlobSignRequest>{
|
|
276
|
+
message_base64: "L1kE9g59xD3fzYQQSR7340BwU9fGrP6EMfIFcyX/YBc=",
|
|
277
|
+
};
|
|
278
|
+
try {
|
|
279
|
+
await session.signBlob(key, blobReq);
|
|
280
|
+
assert(false, "Must be rejected by policy");
|
|
281
|
+
} catch (e) {
|
|
282
|
+
assert(`${e}`.includes("Raw blob signing not allowed"));
|
|
283
|
+
}
|
|
284
|
+
|
|
285
|
+
console.log("Signing raw blob after adding 'AllowRawBlobSigning' policy");
|
|
286
|
+
await key.appendPolicy(["AllowRawBlobSigning"]);
|
|
287
|
+
const blobSig = await session.signBlob(key, blobReq);
|
|
288
|
+
console.log(blobSig.data());
|
|
289
|
+
assert(blobSig.data().signature);
|
|
276
290
|
}
|
|
277
|
-
|
|
278
|
-
console.log("Signing raw blob after adding 'AllowRawBlobSigning' policy");
|
|
279
|
-
await secpKey.appendPolicy(["AllowRawBlobSigning"]);
|
|
280
|
-
const blobSig = await session.signBlob(secpKey, blobReq);
|
|
281
|
-
console.log(blobSig.data());
|
|
282
|
-
assert(blobSig.data().signature);
|
|
283
291
|
```
|
|
284
292
|
|
|
285
293
|
> **Warning**
|
|
@@ -348,7 +356,7 @@ of `SignerSession`, required by all signing endpoints, e.g.,
|
|
|
348
356
|
`signEvm`)
|
|
349
357
|
|
|
350
358
|
```typescript
|
|
351
|
-
const oidcSession = await cubesigner.
|
|
359
|
+
const oidcSession = new cs.SignerSession(await cubesigner.oidcAuth(oidcToken, org.id, ["sign:*"]));
|
|
352
360
|
```
|
|
353
361
|
|
|
354
362
|
or a _management_ session (i.e., and instance of `CubeSigner`,
|
|
@@ -357,7 +365,7 @@ information, configuring user MFA methods, etc.).
|
|
|
357
365
|
|
|
358
366
|
```typescript
|
|
359
367
|
const oidcCubeSigner = new cs.CubeSigner({
|
|
360
|
-
sessionMgr: await cubesigner.
|
|
368
|
+
sessionMgr: await cubesigner.oidcAuth(oidcToken, org.id, ["manage:*"]),
|
|
361
369
|
});
|
|
362
370
|
```
|
|
363
371
|
|
|
@@ -405,7 +413,7 @@ as one of the configured MFA factors.
|
|
|
405
413
|
```typescript
|
|
406
414
|
const mfa = (await oidcCubeSigner.aboutMe()).mfa;
|
|
407
415
|
console.log("Configured MFA types", mfa);
|
|
408
|
-
assert(mfa.includes("
|
|
416
|
+
assert(mfa.map((m) => m.type).includes("totp"));
|
|
409
417
|
```
|
|
410
418
|
|
|
411
419
|
### Configure MFA policy for signing
|
|
@@ -1,16 +1,35 @@
|
|
|
1
1
|
import { TypedDataDomain, TypedDataField, ethers } from "ethers";
|
|
2
|
-
import { SignerSession } from "../signer_session";
|
|
2
|
+
import { MfaRequestInfo, SignerSession } from "../signer_session";
|
|
3
|
+
import { KeyInfo } from "../key";
|
|
4
|
+
import { CubeSigner } from "..";
|
|
5
|
+
/** Options for the signer */
|
|
6
|
+
interface SignerOptions {
|
|
7
|
+
/** Optional provider to use */
|
|
8
|
+
provider?: null | ethers.Provider;
|
|
9
|
+
/**
|
|
10
|
+
* The function to call when MFA information is retrieved. If this callback
|
|
11
|
+
* throws, no transaction is broadcast.
|
|
12
|
+
*/
|
|
13
|
+
onMfaPoll?: (arg0: MfaRequestInfo) => void;
|
|
14
|
+
/**
|
|
15
|
+
* The amount of time (in milliseconds) to wait between checks for MFA
|
|
16
|
+
* updates. Default is 1000ms
|
|
17
|
+
*/
|
|
18
|
+
mfaPollIntervalMs?: number;
|
|
19
|
+
/** Optional management session. Used to check for MFA updates */
|
|
20
|
+
managementSession?: CubeSigner;
|
|
21
|
+
}
|
|
3
22
|
/**
|
|
4
23
|
* A ethers.js Signer using CubeSigner
|
|
5
24
|
*/
|
|
6
25
|
export declare class Signer extends ethers.AbstractSigner {
|
|
7
26
|
#private;
|
|
8
27
|
/** Create new Signer instance
|
|
9
|
-
* @param {string} address The address of the account to use.
|
|
28
|
+
* @param {KeyInfo | string} address The key or the eth address of the account to use.
|
|
10
29
|
* @param {SignerSession} signerSession The underlying Signer session.
|
|
11
|
-
* @param {
|
|
30
|
+
* @param {SignerOptions} options The options to use for the Signer instance
|
|
12
31
|
*/
|
|
13
|
-
constructor(address: string, signerSession: SignerSession,
|
|
32
|
+
constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions);
|
|
14
33
|
/** Resolves to the signer address. */
|
|
15
34
|
getAddress(): Promise<string>;
|
|
16
35
|
/**
|
|
@@ -20,7 +39,7 @@ export declare class Signer extends ethers.AbstractSigner {
|
|
|
20
39
|
*/
|
|
21
40
|
connect(provider: null | ethers.Provider): Signer;
|
|
22
41
|
/**
|
|
23
|
-
* Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.
|
|
42
|
+
* Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.
|
|
24
43
|
* @param {ethers.TransactionRequest} tx The transaction to sign.
|
|
25
44
|
* @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
|
|
26
45
|
*/
|
|
@@ -48,3 +67,4 @@ export declare class Signer extends ethers.AbstractSigner {
|
|
|
48
67
|
*/
|
|
49
68
|
private signBlob;
|
|
50
69
|
}
|
|
70
|
+
export {};
|
package/dist/src/ethers/index.js
CHANGED
|
@@ -10,7 +10,7 @@ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (
|
|
|
10
10
|
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
11
11
|
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
12
12
|
};
|
|
13
|
-
var _Signer_address, _Signer_key, _Signer_signerSession;
|
|
13
|
+
var _Signer_instances, _Signer_address, _Signer_key, _Signer_signerSession, _Signer_onMfaPoll, _Signer_mfaPollIntervalMs, _Signer_managementSession, _Signer_handleMfa;
|
|
14
14
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
15
|
exports.Signer = void 0;
|
|
16
16
|
const ethers_1 = require("ethers");
|
|
@@ -19,20 +19,39 @@ const ethers_1 = require("ethers");
|
|
|
19
19
|
*/
|
|
20
20
|
class Signer extends ethers_1.ethers.AbstractSigner {
|
|
21
21
|
/** Create new Signer instance
|
|
22
|
-
* @param {string} address The address of the account to use.
|
|
22
|
+
* @param {KeyInfo | string} address The key or the eth address of the account to use.
|
|
23
23
|
* @param {SignerSession} signerSession The underlying Signer session.
|
|
24
|
-
* @param {
|
|
24
|
+
* @param {SignerOptions} options The options to use for the Signer instance
|
|
25
25
|
*/
|
|
26
|
-
constructor(address, signerSession,
|
|
27
|
-
super(provider);
|
|
26
|
+
constructor(address, signerSession, options) {
|
|
27
|
+
super(options?.provider);
|
|
28
|
+
_Signer_instances.add(this);
|
|
28
29
|
/** The address of the account */
|
|
29
30
|
_Signer_address.set(this, void 0);
|
|
30
31
|
/** The key to use for signing */
|
|
31
32
|
_Signer_key.set(this, void 0);
|
|
32
33
|
/** The underlying session */
|
|
33
34
|
_Signer_signerSession.set(this, void 0);
|
|
34
|
-
|
|
35
|
+
/**
|
|
36
|
+
* The function to call when MFA information is retrieved. If this callback
|
|
37
|
+
* throws, no transaction is broadcast.
|
|
38
|
+
*/
|
|
39
|
+
_Signer_onMfaPoll.set(this, void 0);
|
|
40
|
+
/** The amount of time to wait between checks for MFA updates */
|
|
41
|
+
_Signer_mfaPollIntervalMs.set(this, void 0);
|
|
42
|
+
/** Optional management session, used for MFA flows */
|
|
43
|
+
_Signer_managementSession.set(this, void 0);
|
|
44
|
+
if (typeof address === "string") {
|
|
45
|
+
__classPrivateFieldSet(this, _Signer_address, address, "f");
|
|
46
|
+
}
|
|
47
|
+
else {
|
|
48
|
+
__classPrivateFieldSet(this, _Signer_address, address.materialId, "f");
|
|
49
|
+
__classPrivateFieldSet(this, _Signer_key, address, "f");
|
|
50
|
+
}
|
|
35
51
|
__classPrivateFieldSet(this, _Signer_signerSession, signerSession, "f");
|
|
52
|
+
__classPrivateFieldSet(this, _Signer_onMfaPoll, options?.onMfaPoll ?? (( /* _mfaInfo: MfaRequestInfo */) => { }), "f"); // eslint-disable-line @typescript-eslint/no-empty-function
|
|
53
|
+
__classPrivateFieldSet(this, _Signer_mfaPollIntervalMs, options?.mfaPollIntervalMs ?? 1000, "f");
|
|
54
|
+
__classPrivateFieldSet(this, _Signer_managementSession, options?.managementSession, "f");
|
|
36
55
|
}
|
|
37
56
|
/** Resolves to the signer address. */
|
|
38
57
|
async getAddress() {
|
|
@@ -44,10 +63,10 @@ class Signer extends ethers_1.ethers.AbstractSigner {
|
|
|
44
63
|
* @return {Signer} The signer connected to signer.
|
|
45
64
|
*/
|
|
46
65
|
connect(provider) {
|
|
47
|
-
return new Signer(__classPrivateFieldGet(this, _Signer_address, "f"), __classPrivateFieldGet(this, _Signer_signerSession, "f"), provider);
|
|
66
|
+
return new Signer(__classPrivateFieldGet(this, _Signer_address, "f"), __classPrivateFieldGet(this, _Signer_signerSession, "f"), { provider });
|
|
48
67
|
}
|
|
49
68
|
/**
|
|
50
|
-
* Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.
|
|
69
|
+
* Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.
|
|
51
70
|
* @param {ethers.TransactionRequest} tx The transaction to sign.
|
|
52
71
|
* @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
|
|
53
72
|
*/
|
|
@@ -70,8 +89,9 @@ class Signer extends ethers_1.ethers.AbstractSigner {
|
|
|
70
89
|
chain_id: Number(chainId),
|
|
71
90
|
tx: rpcTx,
|
|
72
91
|
};
|
|
73
|
-
const
|
|
74
|
-
|
|
92
|
+
const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEvm(__classPrivateFieldGet(this, _Signer_address, "f"), req);
|
|
93
|
+
const data = await __classPrivateFieldGet(this, _Signer_instances, "m", _Signer_handleMfa).call(this, res);
|
|
94
|
+
return data.rlp_signed_tx;
|
|
75
95
|
}
|
|
76
96
|
/** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)
|
|
77
97
|
* to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.
|
|
@@ -106,17 +126,34 @@ class Signer extends ethers_1.ethers.AbstractSigner {
|
|
|
106
126
|
};
|
|
107
127
|
// Get the key corresponding to this address
|
|
108
128
|
if (__classPrivateFieldGet(this, _Signer_key, "f") === undefined) {
|
|
109
|
-
const key = (await __classPrivateFieldGet(this, _Signer_signerSession, "f").keys()).find((k) => k.
|
|
129
|
+
const key = (await __classPrivateFieldGet(this, _Signer_signerSession, "f").keys()).find((k) => k.material_id === __classPrivateFieldGet(this, _Signer_address, "f"));
|
|
110
130
|
if (key === undefined) {
|
|
111
131
|
throw new Error(`Cannot access key '${__classPrivateFieldGet(this, _Signer_address, "f")}'`);
|
|
112
132
|
}
|
|
113
133
|
__classPrivateFieldSet(this, _Signer_key, key, "f");
|
|
114
134
|
}
|
|
115
|
-
|
|
116
|
-
const
|
|
117
|
-
return
|
|
135
|
+
const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signBlob(__classPrivateFieldGet(this, _Signer_key, "f").key_id, blobReq);
|
|
136
|
+
const data = await __classPrivateFieldGet(this, _Signer_instances, "m", _Signer_handleMfa).call(this, res);
|
|
137
|
+
return data.signature;
|
|
118
138
|
}
|
|
119
139
|
}
|
|
120
140
|
exports.Signer = Signer;
|
|
121
|
-
_Signer_address = new WeakMap(), _Signer_key = new WeakMap(), _Signer_signerSession = new WeakMap()
|
|
122
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/ethers/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAQgB;AAIhB;;GAEG;AACH,MAAa,MAAO,SAAQ,eAAM,CAAC,cAAc;IAU/C;;;;OAIG;IACH,YAAY,OAAe,EAAE,aAA4B,EAAE,QAAiC;QAC1F,KAAK,CAAC,QAAQ,CAAC,CAAC;QAflB,iCAAiC;QACxB,kCAAiB;QAE1B,iCAAiC;QACjC,8BAAW;QAEX,6BAA6B;QACpB,wCAA8B;QASrC,uBAAA,IAAI,mBAAY,OAAO,MAAA,CAAC;QACxB,uBAAA,IAAI,yBAAkB,aAAa,MAAA,CAAC;IACtC,CAAC;IAED,sCAAsC;IACtC,KAAK,CAAC,UAAU;QACd,OAAO,uBAAA,IAAI,uBAAS,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACH,OAAO,CAAC,QAAgC;QACtC,OAAO,IAAI,MAAM,CAAC,uBAAA,IAAI,uBAAS,EAAE,uBAAA,IAAI,6BAAe,EAAE,QAAQ,CAAC,CAAC;IAClE,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe,CAAC,EAA6B;QACjD,0CAA0C;QAC1C,IAAI,OAAO,GAAG,EAAE,CAAC,OAAO,CAAC;QACzB,IAAI,OAAO,KAAK,SAAS,EAAE;YACzB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,UAAU,EAAE,CAAC;YAClD,OAAO,GAAG,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,GAAG,CAAC;SAC/C;QAED,sDAAsD;QACtD,MAAM,KAAK,GACT,IAAI,CAAC,QAAQ,YAAY,2BAAkB;YACzC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACrC,CAAC,CAAC,gDAAgD;gBAChD,iDAAiD;gBACjD,0CAA0C;gBAC1C,2BAAkB,CAAC,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACpE,KAAK,CAAC,IAAI,GAAG,IAAA,gBAAO,EAAC,EAAE,CAAC,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,qBAAqB;QAE/D,MAAM,GAAG,GAAmB;YAC1B,QAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;YACzB,EAAE,EAAE,KAAK;SACV,CAAC;QACF,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,OAAO,GAAG,CAAC,IAAI,EAAE,CAAC,aAAa,CAAC;IAClC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,WAAW,CAAC,OAA4B;QAC5C,MAAM,MAAM,GAAG,eAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAC3C,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,aAAa,CACjB,MAAuB,EACvB,KAA4C,EAC5C,KAA0B;QAE1B,MAAM,MAAM,GAAG,yBAAgB,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC;QAC3D,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,QAAQ,CAAC,MAAc;QACnC,MAAM,OAAO,GAAoB;YAC/B,cAAc,EAAE,MAAM,CAAC,IAAI,CAAC,IAAA,iBAAQ,EAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;SACjE,CAAC;QACF,4CAA4C;QAC5C,IAAI,uBAAA,IAAI,mBAAK,KAAK,SAAS,EAAE;YAC3B,MAAM,GAAG,GAAG,CAAC,MAAM,uBAAA,IAAI,6BAAe,CAAC,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,UAAU,KAAK,uBAAA,IAAI,uBAAS,CAAC,CAAC;YAC3F,IAAI,GAAG,KAAK,SAAS,EAAE;gBACrB,MAAM,IAAI,KAAK,CAAC,sBAAsB,uBAAA,IAAI,uBAAS,GAAG,CAAC,CAAC;aACzD;YACD,uBAAA,IAAI,eAAQ,GAAG,MAAA,CAAC;SACjB;QACD,OAAO;QACP,MAAM,MAAM,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,QAAQ,CAAC,uBAAA,IAAI,mBAAK,EAAE,OAAO,CAAC,CAAC;QACtE,OAAO,MAAM,CAAC,IAAI,EAAE,CAAC,SAAS,CAAC;IACjC,CAAC;CACF;AAnHD,wBAmHC","sourcesContent":["import {\n  JsonRpcApiProvider,\n  TypedDataDomain,\n  TypedDataEncoder,\n  TypedDataField,\n  ethers,\n  getBytes,\n  toBeHex,\n} from \"ethers\";\nimport { BlobSignRequest, EvmSignRequest, SignerSession } from \"../signer_session\";\nimport { Key } from \"../key\";\n\n/**\n * A ethers.js Signer using CubeSigner\n */\nexport class Signer extends ethers.AbstractSigner {\n  /** The address of the account */\n  readonly #address: string;\n\n  /** The key to use for signing */\n  #key?: Key;\n\n  /** The underlying session */\n  readonly #signerSession: SignerSession;\n\n  /** Create new Signer instance\n   * @param {string} address The address of the account to use.\n   * @param {SignerSession} signerSession The underlying Signer session.\n   * @param {null | ethers.Provider} provider The optional provider instance to use.\n   */\n  constructor(address: string, signerSession: SignerSession, provider?: null | ethers.Provider) {\n    super(provider);\n    this.#address = address;\n    this.#signerSession = signerSession;\n  }\n\n  /** Resolves to the signer address. */\n  async getAddress(): Promise<string> {\n    return this.#address;\n  }\n\n  /**\n   *  Returns the signer connected to %%provider%%.\n   *  @param {null | ethers.Provider} provider The optional provider instance to use.\n   *  @return {Signer} The signer connected to signer.\n   */\n  connect(provider: null | ethers.Provider): Signer {\n    return new Signer(this.#address, this.#signerSession, provider);\n  }\n\n  /**\n   * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.\n   * @param {ethers.TransactionRequest} tx The transaction to sign.\n   * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.\n   */\n  async signTransaction(tx: ethers.TransactionRequest): Promise<string> {\n    // get the chain id from the network or tx\n    let chainId = tx.chainId;\n    if (chainId === undefined) {\n      const network = await this.provider?.getNetwork();\n      chainId = network?.chainId?.toString() ?? \"1\";\n    }\n\n    // Convert the transaction into a JSON-RPC transaction\n    const rpcTx =\n      this.provider instanceof JsonRpcApiProvider\n        ? this.provider.getRpcTransaction(tx)\n        : // We can just call the getRpcTransaction with a\n          // null receiver since it doesn't actually use it\n          // (and really should be declared static).\n          JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);\n    rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]\n\n    const req = <EvmSignRequest>{\n      chain_id: Number(chainId),\n      tx: rpcTx,\n    };\n    const sig = await this.#signerSession.signEvm(this.#address, req);\n    return sig.data().rlp_signed_tx;\n  }\n\n  /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)\n   * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {string | Uint8Array} message The message to sign.\n   * @return {Promise<string>} The signature.\n   */\n  async signMessage(message: string | Uint8Array): Promise<string> {\n    const digest = ethers.hashMessage(message);\n    return this.signBlob(digest);\n  }\n\n  /** Signs EIP-712 typed data. This uses ethers.js's\n   * [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)\n   * to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {TypedDataDomain} domain The domain of the typed data.\n   * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.\n   * @param {Record<string, any>} value The value of the typed data.\n   * @return {Promise<string>} The signature.\n   */\n  async signTypedData(\n    domain: TypedDataDomain,\n    types: Record<string, Array<TypedDataField>>,\n    value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any\n  ): Promise<string> {\n    const digest = TypedDataEncoder.hash(domain, types, value);\n    return this.signBlob(digest);\n  }\n\n  /** Sign arbitrary digest. This uses {@link Key#signBlob}.\n   * @param {string} digest The digest to sign.\n   * @return {Promise<string>} The signature.\n   */\n  private async signBlob(digest: string): Promise<string> {\n    const blobReq = <BlobSignRequest>{\n      message_base64: Buffer.from(getBytes(digest)).toString(\"base64\"),\n    };\n    // Get the key corresponding to this address\n    if (this.#key === undefined) {\n      const key = (await this.#signerSession.keys()).find((k) => k.materialId === this.#address);\n      if (key === undefined) {\n        throw new Error(`Cannot access key '${this.#address}'`);\n      }\n      this.#key = key;\n    }\n    // sign\n    const result = await this.#signerSession.signBlob(this.#key, blobReq);\n    return result.data().signature;\n  }\n}\n"]}
|
|
141
|
+
_Signer_address = new WeakMap(), _Signer_key = new WeakMap(), _Signer_signerSession = new WeakMap(), _Signer_onMfaPoll = new WeakMap(), _Signer_mfaPollIntervalMs = new WeakMap(), _Signer_managementSession = new WeakMap(), _Signer_instances = new WeakSet(), _Signer_handleMfa =
|
|
142
|
+
/**
|
|
143
|
+
* If the sign request requires MFA, this method waits for approvals
|
|
144
|
+
*
|
|
145
|
+
* @param {SignResponse<U>} res The response of a sign request
|
|
146
|
+
* @return {Promise<U>} The sign data after MFA approvals
|
|
147
|
+
*/
|
|
148
|
+
async function _Signer_handleMfa(res) {
|
|
149
|
+
while (res.requiresMfa()) {
|
|
150
|
+
await new Promise((resolve) => setTimeout(resolve, __classPrivateFieldGet(this, _Signer_mfaPollIntervalMs, "f")));
|
|
151
|
+
const mfaInfo = await __classPrivateFieldGet(this, _Signer_signerSession, "f").getMfaInfo(__classPrivateFieldGet(this, _Signer_managementSession, "f"), res.mfaId());
|
|
152
|
+
__classPrivateFieldGet(this, _Signer_onMfaPoll, "f").call(this, mfaInfo);
|
|
153
|
+
if (mfaInfo.receipt) {
|
|
154
|
+
res = await res.signWithMfaApproval(mfaInfo);
|
|
155
|
+
}
|
|
156
|
+
}
|
|
157
|
+
return res.data();
|
|
158
|
+
};
|
|
159
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/ethers/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAQgB;AA6BhB;;GAEG;AACH,MAAa,MAAO,SAAQ,eAAM,CAAC,cAAc;IAsB/C;;;;OAIG;IACH,YAAY,OAAyB,EAAE,aAA4B,EAAE,OAAuB;QAC1F,KAAK,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;;QA3B3B,iCAAiC;QACxB,kCAAiB;QAE1B,iCAAiC;QACjC,8BAAe;QAEf,6BAA6B;QACpB,wCAA8B;QAEvC;;;WAGG;QACM,oCAA2C;QAEpD,gEAAgE;QACvD,4CAA2B;QAEpC,sDAAsD;QAC7C,4CAAgC;QASvC,IAAI,OAAO,OAAO,KAAK,QAAQ,EAAE;YAC/B,uBAAA,IAAI,mBAAY,OAAO,MAAA,CAAC;SACzB;aAAM;YACL,uBAAA,IAAI,mBAAY,OAAO,CAAC,UAAU,MAAA,CAAC;YACnC,uBAAA,IAAI,eAAQ,OAAkB,MAAA,CAAC;SAChC;QACD,uBAAA,IAAI,yBAAkB,aAAa,MAAA,CAAC;QACpC,uBAAA,IAAI,qBAAc,OAAO,EAAE,SAAS,IAAI,CAAC,EAAC,8BAA8B,EAAE,EAAE,GAAE,CAAC,CAAC,MAAA,CAAC,CAAC,2DAA2D;QAC7I,uBAAA,IAAI,6BAAsB,OAAO,EAAE,iBAAiB,IAAI,IAAI,MAAA,CAAC;QAC7D,uBAAA,IAAI,6BAAsB,OAAO,EAAE,iBAAiB,MAAA,CAAC;IACvD,CAAC;IAED,sCAAsC;IACtC,KAAK,CAAC,UAAU;QACd,OAAO,uBAAA,IAAI,uBAAS,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACH,OAAO,CAAC,QAAgC;QACtC,OAAO,IAAI,MAAM,CAAC,uBAAA,IAAI,uBAAS,EAAE,uBAAA,IAAI,6BAAe,EAAE,EAAE,QAAQ,EAAE,CAAC,CAAC;IACtE,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe,CAAC,EAA6B;QACjD,0CAA0C;QAC1C,IAAI,OAAO,GAAG,EAAE,CAAC,OAAO,CAAC;QACzB,IAAI,OAAO,KAAK,SAAS,EAAE;YACzB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,UAAU,EAAE,CAAC;YAClD,OAAO,GAAG,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,GAAG,CAAC;SAC/C;QAED,sDAAsD;QACtD,MAAM,KAAK,GACT,IAAI,CAAC,QAAQ,YAAY,2BAAkB;YACzC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACrC,CAAC,CAAC,gDAAgD;gBAChD,iDAAiD;gBACjD,0CAA0C;gBAC1C,2BAAkB,CAAC,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACpE,KAAK,CAAC,IAAI,GAAG,IAAA,gBAAO,EAAC,EAAE,CAAC,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,qBAAqB;QAE/D,MAAM,GAAG,GAAmB;YAC1B,QAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;YACzB,EAAE,EAAE,KAAK;SACV,CAAC;QAEF,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,aAAa,CAAC;IAC5B,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,WAAW,CAAC,OAA4B;QAC5C,MAAM,MAAM,GAAG,eAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAC3C,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,aAAa,CACjB,MAAuB,EACvB,KAA4C,EAC5C,KAA0B;QAE1B,MAAM,MAAM,GAAG,yBAAgB,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC;QAC3D,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,QAAQ,CAAC,MAAc;QACnC,MAAM,OAAO,GAAoB;YAC/B,cAAc,EAAE,MAAM,CAAC,IAAI,CAAC,IAAA,iBAAQ,EAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;SACjE,CAAC;QACF,4CAA4C;QAC5C,IAAI,uBAAA,IAAI,mBAAK,KAAK,SAAS,EAAE;YAC3B,MAAM,GAAG,GAAG,CAAC,MAAM,uBAAA,IAAI,6BAAe,CAAC,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,WAAW,KAAK,uBAAA,IAAI,uBAAS,CAAC,CAAC;YAC5F,IAAI,GAAG,KAAK,SAAS,EAAE;gBACrB,MAAM,IAAI,KAAK,CAAC,sBAAsB,uBAAA,IAAI,uBAAS,GAAG,CAAC,CAAC;aACzD;YACD,uBAAA,IAAI,eAAQ,GAAG,MAAA,CAAC;SACjB;QAED,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,QAAQ,CAAC,uBAAA,IAAI,mBAAK,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;QAC1E,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,SAAS,CAAC;IACxB,CAAC;CAoBF;AA7JD,wBA6JC;;AAlBC;;;;;GAKG;AACH,KAAK,4BAAe,GAAoB;IACtC,OAAO,GAAG,CAAC,WAAW,EAAE,EAAE;QACxB,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,uBAAA,IAAI,iCAAmB,CAAC,CAAC,CAAC;QAE7E,MAAM,OAAO,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,UAAU,CAAC,uBAAA,IAAI,iCAAoB,EAAE,GAAG,CAAC,KAAK,EAAE,CAAC,CAAC;QAC5F,uBAAA,IAAI,yBAAW,MAAf,IAAI,EAAY,OAAO,CAAC,CAAC;QACzB,IAAI,OAAO,CAAC,OAAO,EAAE;YACnB,GAAG,GAAG,MAAM,GAAG,CAAC,mBAAmB,CAAC,OAAO,CAAC,CAAC;SAC9C;KACF;IACD,OAAO,GAAG,CAAC,IAAI,EAAE,CAAC;AACpB,CAAC","sourcesContent":["import {\n  JsonRpcApiProvider,\n  TypedDataDomain,\n  TypedDataEncoder,\n  TypedDataField,\n  ethers,\n  getBytes,\n  toBeHex,\n} from \"ethers\";\nimport {\n  BlobSignRequest,\n  EvmSignRequest,\n  MfaRequestInfo,\n  SignerSession,\n  SignResponse,\n} from \"../signer_session\";\nimport { KeyInfo } from \"../key\";\nimport { CubeSigner } from \"..\";\n\n/** Options for the signer */\ninterface SignerOptions {\n  /** Optional provider to use */\n  provider?: null | ethers.Provider;\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  onMfaPoll?: (arg0: MfaRequestInfo) => void;\n  /**\n   * The amount of time (in milliseconds) to wait between checks for MFA\n   * updates. Default is 1000ms\n   */\n  mfaPollIntervalMs?: number;\n  /** Optional management session. Used to check for MFA updates */\n  managementSession?: CubeSigner;\n}\n\n/**\n * A ethers.js Signer using CubeSigner\n */\nexport class Signer extends ethers.AbstractSigner {\n  /** The address of the account */\n  readonly #address: string;\n\n  /** The key to use for signing */\n  #key?: KeyInfo;\n\n  /** The underlying session */\n  readonly #signerSession: SignerSession;\n\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  readonly #onMfaPoll: (arg0: MfaRequestInfo) => void;\n\n  /** The amount of time to wait between checks for MFA updates */\n  readonly #mfaPollIntervalMs: number;\n\n  /** Optional management session, used for MFA flows */\n  readonly #managementSession?: CubeSigner;\n\n  /** Create new Signer instance\n   * @param {KeyInfo | string} address The key or the eth address of the account to use.\n   * @param {SignerSession} signerSession The underlying Signer session.\n   * @param {SignerOptions} options The options to use for the Signer instance\n   */\n  constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions) {\n    super(options?.provider);\n    if (typeof address === \"string\") {\n      this.#address = address;\n    } else {\n      this.#address = address.materialId;\n      this.#key = address as KeyInfo;\n    }\n    this.#signerSession = signerSession;\n    this.#onMfaPoll = options?.onMfaPoll ?? ((/* _mfaInfo: MfaRequestInfo */) => {}); // eslint-disable-line @typescript-eslint/no-empty-function\n    this.#mfaPollIntervalMs = options?.mfaPollIntervalMs ?? 1000;\n    this.#managementSession = options?.managementSession;\n  }\n\n  /** Resolves to the signer address. */\n  async getAddress(): Promise<string> {\n    return this.#address;\n  }\n\n  /**\n   *  Returns the signer connected to %%provider%%.\n   *  @param {null | ethers.Provider} provider The optional provider instance to use.\n   *  @return {Signer} The signer connected to signer.\n   */\n  connect(provider: null | ethers.Provider): Signer {\n    return new Signer(this.#address, this.#signerSession, { provider });\n  }\n\n  /**\n   * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.\n   * @param {ethers.TransactionRequest} tx The transaction to sign.\n   * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.\n   */\n  async signTransaction(tx: ethers.TransactionRequest): Promise<string> {\n    // get the chain id from the network or tx\n    let chainId = tx.chainId;\n    if (chainId === undefined) {\n      const network = await this.provider?.getNetwork();\n      chainId = network?.chainId?.toString() ?? \"1\";\n    }\n\n    // Convert the transaction into a JSON-RPC transaction\n    const rpcTx =\n      this.provider instanceof JsonRpcApiProvider\n        ? this.provider.getRpcTransaction(tx)\n        : // We can just call the getRpcTransaction with a\n          // null receiver since it doesn't actually use it\n          // (and really should be declared static).\n          JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);\n    rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]\n\n    const req = <EvmSignRequest>{\n      chain_id: Number(chainId),\n      tx: rpcTx,\n    };\n\n    const res = await this.#signerSession.signEvm(this.#address, req);\n    const data = await this.#handleMfa(res);\n    return data.rlp_signed_tx;\n  }\n\n  /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)\n   * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {string | Uint8Array} message The message to sign.\n   * @return {Promise<string>} The signature.\n   */\n  async signMessage(message: string | Uint8Array): Promise<string> {\n    const digest = ethers.hashMessage(message);\n    return this.signBlob(digest);\n  }\n\n  /** Signs EIP-712 typed data. This uses ethers.js's\n   * [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)\n   * to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {TypedDataDomain} domain The domain of the typed data.\n   * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.\n   * @param {Record<string, any>} value The value of the typed data.\n   * @return {Promise<string>} The signature.\n   */\n  async signTypedData(\n    domain: TypedDataDomain,\n    types: Record<string, Array<TypedDataField>>,\n    value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any\n  ): Promise<string> {\n    const digest = TypedDataEncoder.hash(domain, types, value);\n    return this.signBlob(digest);\n  }\n\n  /** Sign arbitrary digest. This uses {@link Key#signBlob}.\n   * @param {string} digest The digest to sign.\n   * @return {Promise<string>} The signature.\n   */\n  private async signBlob(digest: string): Promise<string> {\n    const blobReq = <BlobSignRequest>{\n      message_base64: Buffer.from(getBytes(digest)).toString(\"base64\"),\n    };\n    // Get the key corresponding to this address\n    if (this.#key === undefined) {\n      const key = (await this.#signerSession.keys()).find((k) => k.material_id === this.#address);\n      if (key === undefined) {\n        throw new Error(`Cannot access key '${this.#address}'`);\n      }\n      this.#key = key;\n    }\n\n    const res = await this.#signerSession.signBlob(this.#key.key_id, blobReq);\n    const data = await this.#handleMfa(res);\n    return data.signature;\n  }\n\n  /**\n   * If the sign request requires MFA, this method waits for approvals\n   *\n   * @param {SignResponse<U>} res The response of a sign request\n   * @return {Promise<U>} The sign data after MFA approvals\n   */\n  async #handleMfa<U>(res: SignResponse<U>): Promise<U> {\n    while (res.requiresMfa()) {\n      await new Promise((resolve) => setTimeout(resolve, this.#mfaPollIntervalMs));\n\n      const mfaInfo = await this.#signerSession.getMfaInfo(this.#managementSession!, res.mfaId());\n      this.#onMfaPoll(mfaInfo);\n      if (mfaInfo.receipt) {\n        res = await res.signWithMfaApproval(mfaInfo);\n      }\n    }\n    return res.data();\n  }\n}\n"]}
|
package/dist/src/index.d.ts
CHANGED
|
@@ -1,34 +1,35 @@
|
|
|
1
1
|
import { EnvInterface } from "./env";
|
|
2
|
-
import { components, Client } from "./client";
|
|
2
|
+
import { components, Client, paths } from "./client";
|
|
3
3
|
import { Org } from "./org";
|
|
4
|
-
import { SignerSessionStorage } from "./session/signer_session_manager";
|
|
5
|
-
import { SignerSession } from "./signer_session";
|
|
6
|
-
import {
|
|
7
|
-
import { OidcSessionManager, OidcSessionStorage } from "./session/oidc_session_manager";
|
|
4
|
+
import { SignerSessionStorage, SignerSessionManager } from "./session/signer_session_manager";
|
|
5
|
+
import { MfaRequestInfo, SignResponse, SignerSession } from "./signer_session";
|
|
6
|
+
import { CognitoSessionManager, CognitoSessionStorage } from "./session/cognito_manager";
|
|
8
7
|
/** CubeSigner constructor options */
|
|
9
8
|
export interface CubeSignerOptions {
|
|
10
9
|
/** The environment to use */
|
|
11
10
|
env?: EnvInterface;
|
|
12
11
|
/** The management authorization token */
|
|
13
|
-
sessionMgr?:
|
|
12
|
+
sessionMgr?: CognitoSessionManager | SignerSessionManager;
|
|
14
13
|
}
|
|
15
14
|
export type UserInfo = components["schemas"]["UserInfo"];
|
|
16
15
|
export type TotpInfo = components["responses"]["TotpInfo"]["content"]["application/json"];
|
|
17
16
|
export type ConfiguredMfa = components["schemas"]["ConfiguredMfa"];
|
|
17
|
+
export type RatchetConfig = components["schemas"]["RatchetConfig"];
|
|
18
|
+
type OidcAuthResponse = paths["/v0/org/{org_id}/oidc"]["post"]["responses"]["200"]["content"]["application/json"];
|
|
18
19
|
/** CubeSigner client */
|
|
19
20
|
export declare class CubeSigner {
|
|
20
21
|
#private;
|
|
21
|
-
readonly sessionMgr?:
|
|
22
|
+
readonly sessionMgr?: CognitoSessionManager | SignerSessionManager;
|
|
22
23
|
/** @return {EnvInterface} The CubeSigner environment of this client */
|
|
23
24
|
get env(): EnvInterface;
|
|
24
25
|
/**
|
|
25
26
|
* Loads an existing management session and creates a CubeSigner instance.
|
|
26
|
-
* @param {
|
|
27
|
+
* @param {CognitoSessionStorage} storage Optional session storage to load
|
|
27
28
|
* the session from. If not specified, the management session from the config
|
|
28
29
|
* directory will be loaded.
|
|
29
30
|
* @return {Promise<CubeSigner>} New CubeSigner instance
|
|
30
31
|
*/
|
|
31
|
-
static loadManagementSession(storage?:
|
|
32
|
+
static loadManagementSession(storage?: CognitoSessionStorage): Promise<CubeSigner>;
|
|
32
33
|
/**
|
|
33
34
|
* Loads a signer session from a session storage (e.g., session file).
|
|
34
35
|
* @param {SignerSessionStorage} storage Optional session storage to load
|
|
@@ -37,37 +38,38 @@ export declare class CubeSigner {
|
|
|
37
38
|
* @return {Promise<SignerSession>} New signer session
|
|
38
39
|
*/
|
|
39
40
|
static loadSignerSession(storage?: SignerSessionStorage): Promise<SignerSession>;
|
|
40
|
-
/**
|
|
41
|
-
* Loads a signer session from OIDC storage
|
|
42
|
-
* @param {OidcSessionStorage} storage The storage to load from
|
|
43
|
-
* @return {Promise<SignerSession>} New signer session
|
|
44
|
-
*/
|
|
45
|
-
static loadOidcSession(storage: OidcSessionStorage): Promise<SignerSession>;
|
|
46
41
|
/**
|
|
47
42
|
* Create a new CubeSigner instance.
|
|
48
|
-
* @param {CubeSignerOptions} options The options for the CubeSigner instance.
|
|
43
|
+
* @param {CubeSignerOptions} options The optional configuraiton options for the CubeSigner instance.
|
|
49
44
|
*/
|
|
50
|
-
constructor(options
|
|
45
|
+
constructor(options?: CubeSignerOptions);
|
|
51
46
|
/**
|
|
52
|
-
* Authenticate an OIDC user and create a new
|
|
47
|
+
* Authenticate an OIDC user and create a new session manager for them.
|
|
53
48
|
* @param {string} oidcToken The OIDC token
|
|
54
49
|
* @param {string} orgId The id of the organization that the user is in
|
|
55
50
|
* @param {List<string>} scopes The scopes of the resulting session
|
|
56
|
-
* @param {
|
|
57
|
-
* @
|
|
51
|
+
* @param {RatchetConfig} lifetimes Lifetimes of the new session.
|
|
52
|
+
* @param {SignerSessionStorage?} storage Optional signer session storage (defaults to in-memory storage)
|
|
53
|
+
* @return {Promise<SignerSessionManager>} The signer session manager
|
|
58
54
|
*/
|
|
59
|
-
|
|
60
|
-
/**
|
|
61
|
-
* Authenticate an OIDC user and create a new session for them.
|
|
62
|
-
* @param {string} oidcToken The OIDC token
|
|
63
|
-
* @param {string} orgId The id of the organization that the user is in
|
|
64
|
-
* @param {List<string>} scopes The scopes of the resulting session
|
|
65
|
-
* @param {OidcSessionStorage} storage The signer session storage
|
|
66
|
-
* @return {Promise<SignerSession>} The signer session
|
|
67
|
-
*/
|
|
68
|
-
createOidcSession(oidcToken: string, orgId: string, scopes: Array<string>, storage?: OidcSessionStorage): Promise<SignerSession>;
|
|
55
|
+
oidcAuth(oidcToken: string, orgId: string, scopes: Array<string>, lifetimes?: RatchetConfig, storage?: SignerSessionStorage): Promise<SignerSessionManager>;
|
|
69
56
|
/** Retrieves information about the current user. */
|
|
70
57
|
aboutMe(): Promise<UserInfo>;
|
|
58
|
+
/**
|
|
59
|
+
* Creates and sets a new TOTP configuration for the logged in user,
|
|
60
|
+
* if and only if no TOTP configuration is already set.
|
|
61
|
+
*
|
|
62
|
+
* @return {Promise<TotpInfo>} Newly created TOTP configuration.
|
|
63
|
+
*/
|
|
64
|
+
initTotp(): Promise<TotpInfo>;
|
|
65
|
+
/**
|
|
66
|
+
* Retrieves existing MFA request.
|
|
67
|
+
*
|
|
68
|
+
* @param {string} orgId Organization ID
|
|
69
|
+
* @param {string} mfaId MFA request ID
|
|
70
|
+
* @return {Promise<MfaRequestInfo>} MFA request information
|
|
71
|
+
*/
|
|
72
|
+
mfaGet(orgId: string, mfaId: string): Promise<MfaRequestInfo>;
|
|
71
73
|
/**
|
|
72
74
|
* Creates and sets a new TOTP configuration for the logged-in user,
|
|
73
75
|
* overriding the existing one (if any).
|
|
@@ -89,6 +91,23 @@ export declare class CubeSigner {
|
|
|
89
91
|
* @internal
|
|
90
92
|
* */
|
|
91
93
|
management(): Promise<Client>;
|
|
94
|
+
/**
|
|
95
|
+
* Exchange an OIDC token for a CubeSigner session token.
|
|
96
|
+
* @param {string} oidcToken The OIDC token
|
|
97
|
+
* @param {string} orgId The id of the organization that the user is in
|
|
98
|
+
* @param {List<string>} scopes The scopes of the resulting session
|
|
99
|
+
* @param {RatchetConfig} lifetimes Lifetimes of the new session.
|
|
100
|
+
* @param {MfaReceipt} mfaReceipt Optional MFA receipt (id + confirmation code)
|
|
101
|
+
* @return {Promise<SignResponse<OidcAuthResponse>>} The session data.
|
|
102
|
+
*/
|
|
103
|
+
oidcLogin(oidcToken: string, orgId: string, scopes: Array<string>, lifetimes?: RatchetConfig, mfaReceipt?: MfaReceipt): Promise<SignResponse<OidcAuthResponse>>;
|
|
104
|
+
}
|
|
105
|
+
/** MFA receipt */
|
|
106
|
+
export interface MfaReceipt {
|
|
107
|
+
/** MFA request ID */
|
|
108
|
+
mfaId: string;
|
|
109
|
+
/** MFA confirmation code */
|
|
110
|
+
mfaConf: string;
|
|
92
111
|
}
|
|
93
112
|
/** Organizations */
|
|
94
113
|
export * from "./org";
|
|
@@ -105,9 +124,7 @@ export * from "./session/session_storage";
|
|
|
105
124
|
/** Session manager */
|
|
106
125
|
export * from "./session/session_manager";
|
|
107
126
|
/** Management session manager */
|
|
108
|
-
export * from "./session/
|
|
109
|
-
/** OIDC session manager */
|
|
110
|
-
export * from "./session/oidc_session_manager";
|
|
127
|
+
export * from "./session/cognito_manager";
|
|
111
128
|
/** Signer session manager */
|
|
112
129
|
export * from "./session/signer_session_manager";
|
|
113
130
|
/** Export ethers.js Signer */
|