@cubist-labs/cubesigner-sdk 0.1.26 → 0.1.77

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (44) hide show
  1. package/README.md +94 -33
  2. package/dist/src/ethers/index.d.ts +25 -5
  3. package/dist/src/ethers/index.js +58 -16
  4. package/dist/src/fido.d.ts +76 -0
  5. package/dist/src/fido.js +148 -0
  6. package/dist/src/index.d.ts +148 -35
  7. package/dist/src/index.js +320 -53
  8. package/dist/src/key.d.ts +64 -8
  9. package/dist/src/key.js +91 -19
  10. package/dist/src/org.d.ts +98 -9
  11. package/dist/src/org.js +144 -29
  12. package/dist/src/paginator.d.ts +76 -0
  13. package/dist/src/paginator.js +99 -0
  14. package/dist/src/role.d.ts +20 -8
  15. package/dist/src/role.js +7 -5
  16. package/dist/src/schema.d.ts +2395 -393
  17. package/dist/src/schema.js +1 -1
  18. package/dist/src/session/cognito_manager.d.ts +59 -0
  19. package/dist/src/session/cognito_manager.js +111 -0
  20. package/dist/src/session/session_manager.d.ts +15 -0
  21. package/dist/src/session/session_manager.js +21 -2
  22. package/dist/src/session/session_storage.js +1 -1
  23. package/dist/src/session/signer_session_manager.d.ts +24 -12
  24. package/dist/src/session/signer_session_manager.js +45 -20
  25. package/dist/src/signer_session.d.ts +136 -38
  26. package/dist/src/signer_session.js +187 -80
  27. package/dist/src/util.d.ts +20 -0
  28. package/dist/src/util.js +31 -2
  29. package/package.json +12 -7
  30. package/src/ethers/index.ts +88 -16
  31. package/src/fido.ts +166 -0
  32. package/src/index.ts +366 -77
  33. package/src/key.ts +112 -16
  34. package/src/org.ts +200 -37
  35. package/src/paginator.ts +122 -0
  36. package/src/role.ts +24 -11
  37. package/src/schema.ts +2458 -449
  38. package/src/session/{management_session_manager.ts → cognito_manager.ts} +13 -15
  39. package/src/session/session_manager.ts +25 -1
  40. package/src/session/session_storage.ts +1 -1
  41. package/src/session/signer_session_manager.ts +57 -27
  42. package/src/signer_session.ts +266 -89
  43. package/src/util.ts +41 -0
  44. package/src/session/oidc_session_manager.ts +0 -193
package/README.md CHANGED
@@ -71,11 +71,11 @@ session manager:
71
71
 
72
72
  ```typescript
73
73
  // Load session from a JSON file
74
- const fileStorage = new cs.JsonFileSessionStorage<cs.ManagementSessionInfo>(
74
+ const fileStorage = new cs.JsonFileSessionStorage<cs.CognitoSessionInfo>(
75
75
  `${process.env.HOME}/.config/cubesigner/management-session.json`,
76
76
  );
77
77
  // Create a session manager for a management token
78
- const sessionMgr = await cs.ManagementSessionManager.loadFromStorage(fileStorage);
78
+ const sessionMgr = await cs.CognitoSessionManager.loadFromStorage(fileStorage);
79
79
  new cs.CubeSigner({
80
80
  sessionMgr,
81
81
  });
@@ -113,7 +113,8 @@ transaction. For that, we need a key of type `Secp256k1.Evm`.
113
113
  const secpKey = await org.createKey(cs.Secp256k1.Evm);
114
114
  assert((await secpKey.owner()) == me.user_id);
115
115
  assert(await secpKey.enabled());
116
- console.log(`Created '${secpKey.type}' key ${secpKey.id}`);
116
+ assert(await secpKey.type(), cs.Secp256k1.Evm);
117
+ console.log(`Created '${cs.Secp256k1.Evm}' key ${secpKey.id}`);
117
118
  ```
118
119
 
119
120
  ### Create a `Role` and a `SignerSession`
@@ -201,7 +202,7 @@ assert(sig.data().rlp_signed_tx);
201
202
  ```typescript
202
203
  const { ethers } = require("ethers");
203
204
  // Create new Signer
204
- const ethersSigner = new cs.ethers.Signer(secpKey.materialId, session /*, provider */);
205
+ const ethersSigner = new cs.ethers.Signer(secpKey.materialId, session);
205
206
  assert((await ethersSigner.getAddress()) === secpKey.materialId);
206
207
  // sign transaction as usual:
207
208
  console.log(
@@ -264,22 +265,30 @@ disabled for `BLS` keys, and for other key types it can be enabled by
264
265
  attaching an `"AllowRawBlobSigning"` policy:
265
266
 
266
267
  ```typescript
267
- console.log("Confirming that raw blob is rejected by default");
268
- const blobReq = <cs.BlobSignRequest>{
269
- message_base64: "L1kE9g59xD3fzYQQSR7340BwU9fGrP6EMfIFcyX/YBc=",
270
- };
271
- try {
272
- await session.signBlob(secpKey, blobReq);
273
- assert(false, "Must be rejected by policy");
274
- } catch (e) {
275
- assert(`${e}`.includes("Raw blob signing not allowed"));
268
+ // Create a new Ed25519 key (e.g., for Cardano) and add it to our session role
269
+ const edKey = await org.createKey(cs.Ed25519.Cardano);
270
+ await role.addKey(edKey);
271
+ console.log(`Created '${await edKey.type()}' key ${edKey.id} and added it to role ${role.id}`);
272
+
273
+ // Sign raw blobs with our new ed key and the secp we created before
274
+ for (const key of [edKey, secpKey]) {
275
+ console.log(`Confirming that raw blob with ${await key.type()} is rejected by default`);
276
+ const blobReq = <cs.BlobSignRequest>{
277
+ message_base64: "L1kE9g59xD3fzYQQSR7340BwU9fGrP6EMfIFcyX/YBc=",
278
+ };
279
+ try {
280
+ await session.signBlob(key, blobReq);
281
+ assert(false, "Must be rejected by policy");
282
+ } catch (e) {
283
+ assert(`${e}`.includes("Raw blob signing not allowed"));
284
+ }
285
+
286
+ console.log("Signing raw blob after adding 'AllowRawBlobSigning' policy");
287
+ await key.appendPolicy(["AllowRawBlobSigning"]);
288
+ const blobSig = await session.signBlob(key, blobReq);
289
+ console.log(blobSig.data());
290
+ assert(blobSig.data().signature);
276
291
  }
277
-
278
- console.log("Signing raw blob after adding 'AllowRawBlobSigning' policy");
279
- await secpKey.appendPolicy(["AllowRawBlobSigning"]);
280
- const blobSig = await session.signBlob(secpKey, blobReq);
281
- console.log(blobSig.data());
282
- assert(blobSig.data().signature);
283
292
  ```
284
293
 
285
294
  > **Warning**
@@ -343,12 +352,29 @@ export the underlying token:
343
352
  const oidcToken = await cubesigner.sessionMgr!.token();
344
353
  ```
345
354
 
346
- and then exchange it for either a _signer_ session (i.e., an instance
347
- of `SignerSession`, required by all signing endpoints, e.g.,
348
- `signEvm`)
355
+ Before we can use the OIDC token for authentication, we must add an org policy
356
+ to allow the particular issuer/audience pair from the token.
349
357
 
350
358
  ```typescript
351
- const oidcSession = await cubesigner.createOidcSession(oidcToken, org.id, ["sign:*"]);
359
+ const oldOrgPolicy = await org.policy();
360
+ const oidcPayload = JSON.parse(atob(oidcToken.split(".")[1].replace(/-/g, "+").replace(/_/g, "/")));
361
+ const oidcAuthSourcesPolicy = {
362
+ OidcAuthSources: {
363
+ [oidcPayload.iss]: [oidcPayload.aud],
364
+ },
365
+ };
366
+ console.log("Setting org policy", oidcAuthSourcesPolicy);
367
+ await org.setPolicy([oidcAuthSourcesPolicy]);
368
+ ```
369
+
370
+ Finally, exchange the OIDC token for either a _signer_ session (i.e., an instance
371
+ of `SignerSession`, required by all signing endpoints, e.g., `signEvm`)
372
+
373
+ ```typescript
374
+ const oidcSession = new cs.SignerSession(
375
+ // we'll use this session for both signing and approving MFA request, hence the following scopes
376
+ await cubesigner.oidcAuth(oidcToken, org.id, ["manage:mfa", "sign:*"]),
377
+ );
352
378
  ```
353
379
 
354
380
  or a _management_ session (i.e., and instance of `CubeSigner`,
@@ -357,7 +383,7 @@ information, configuring user MFA methods, etc.).
357
383
 
358
384
  ```typescript
359
385
  const oidcCubeSigner = new cs.CubeSigner({
360
- sessionMgr: await cubesigner.createOidcManager(oidcToken, org.id, ["manage:*"]),
386
+ sessionMgr: await cubesigner.oidcAuth(oidcToken, org.id, ["manage:*"]),
361
387
  });
362
388
  ```
363
389
 
@@ -374,26 +400,56 @@ doesn't matter if that user is native to CubeSigner or a third-party
374
400
  OIDC user. For that purpose, in this section we are going to use the
375
401
  previously created `oidcCubeSigner` instance.
376
402
 
377
- To set up TOTP, we call the `resetTotp` method which creates a new
378
- TOTP configuration for the users (overwriting the previous one, if
379
- any) and returns a [TOTP
380
- url](https://github.com/google/google-authenticator/wiki/Key-Uri-Format).
403
+ To set up TOTP, we first call the `resetTotpStart` method to initiate a
404
+ TOTP reset procedure.
381
405
 
382
406
  ```typescript
383
407
  console.log(`Setting up TOTP for user ${me.email}`);
384
- const totpResp = await oidcCubeSigner.resetTotp();
385
- assert(totpResp.totp_url);
408
+ let totpResetResp = await oidcCubeSigner.resetTotpStart();
409
+ ```
410
+
411
+ If the user has already configured TOTP (or any other form of MFA),
412
+ this response will require multi factor authentication. In that case,
413
+ for example, call `approveTotp` and provide the code for the existing
414
+ TOTP to proceed:
415
+
416
+ ```typescript
417
+ import { authenticator } from "otplib"; // npm install otplib@12.0.1
418
+
419
+ let totpSecret = process.env["CS_USER_TOTP_SECRET"]!;
420
+ if (totpResetResp.requiresMfa()) {
421
+ console.log("Resetting TOTP requires MFA");
422
+ const code = authenticator.generate(totpSecret);
423
+ totpResetResp = await totpResetResp.approveTotp(oidcSession, code);
424
+ assert(!totpResetResp.requiresMfa());
425
+ console.log("MFA approved using existing TOTP");
426
+ }
386
427
  ```
387
428
 
429
+ The response contains a TOTP challenge, i.e., a new TOTP
430
+ configuration in the form of the standard
431
+ [TOTP url](https://github.com/google/google-authenticator/wiki/Key-Uri-Format).
388
432
  From that url, we can generate a QR code to present to the user, or
389
433
  create an authenticator for automated testing.
390
434
 
391
435
  ```typescript
392
- import { authenticator } from "otplib"; // npm install otplib@12.0.1
436
+ const totpChallenge = totpResetResp.data();
437
+ assert(totpChallenge.totpUrl);
438
+ ```
439
+
440
+ To complete the challenge, we must call `resetTotpComplete` and
441
+ provide the TOTP code matching the TOTP configuration from the challenge:
393
442
 
394
- const totpSecret = new URL(totpResp.totp_url).searchParams.get("secret");
443
+ ```typescript norun
444
+ totpSecret = new URL(totpChallenge.totp_url).searchParams.get("secret");
395
445
  assert(totpSecret);
446
+ await totpChallenge.answer(authenticator.generate(totpSecret));
447
+ ```
396
448
 
449
+ After TOTP is configured, we can double check that our authenticator
450
+ is generating the correct code by calling `verifyTotp`
451
+
452
+ ```typescript
397
453
  console.log(`Verifying current TOTP code`);
398
454
  let code = authenticator.generate(totpSecret);
399
455
  await oidcCubeSigner.verifyTotp(code);
@@ -405,7 +461,7 @@ as one of the configured MFA factors.
405
461
  ```typescript
406
462
  const mfa = (await oidcCubeSigner.aboutMe()).mfa;
407
463
  console.log("Configured MFA types", mfa);
408
- assert(mfa.includes("Totp"));
464
+ assert(mfa.map((m) => m.type).includes("totp"));
409
465
  ```
410
466
 
411
467
  ### Configure MFA policy for signing
@@ -453,6 +509,11 @@ we created.
453
509
  console.log("Cleaning up");
454
510
  await session.sessionMgr.revoke();
455
511
  await role.delete();
512
+
513
+ // restore the old policy for the sake of repeatability of this example
514
+ // (normally you'd set your org policies once and leave them be)
515
+ console.log("Restoring org policy", oldOrgPolicy);
516
+ await org.setPolicy(oldOrgPolicy);
456
517
  ```
457
518
 
458
519
  As of now, deleting keys is not supported.
@@ -1,16 +1,35 @@
1
1
  import { TypedDataDomain, TypedDataField, ethers } from "ethers";
2
- import { SignerSession } from "../signer_session";
2
+ import { MfaRequestInfo, SignerSession } from "../signer_session";
3
+ import { KeyInfo } from "../key";
4
+ import { CubeSigner } from "..";
5
+ /** Options for the signer */
6
+ interface SignerOptions {
7
+ /** Optional provider to use */
8
+ provider?: null | ethers.Provider;
9
+ /**
10
+ * The function to call when MFA information is retrieved. If this callback
11
+ * throws, no transaction is broadcast.
12
+ */
13
+ onMfaPoll?: (arg0: MfaRequestInfo) => void;
14
+ /**
15
+ * The amount of time (in milliseconds) to wait between checks for MFA
16
+ * updates. Default is 1000ms
17
+ */
18
+ mfaPollIntervalMs?: number;
19
+ /** Optional management session. Used to check for MFA updates */
20
+ managementSession?: CubeSigner;
21
+ }
3
22
  /**
4
23
  * A ethers.js Signer using CubeSigner
5
24
  */
6
25
  export declare class Signer extends ethers.AbstractSigner {
7
26
  #private;
8
27
  /** Create new Signer instance
9
- * @param {string} address The address of the account to use.
28
+ * @param {KeyInfo | string} address The key or the eth address of the account to use.
10
29
  * @param {SignerSession} signerSession The underlying Signer session.
11
- * @param {null | ethers.Provider} provider The optional provider instance to use.
30
+ * @param {SignerOptions} options The options to use for the Signer instance
12
31
  */
13
- constructor(address: string, signerSession: SignerSession, provider?: null | ethers.Provider);
32
+ constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions);
14
33
  /** Resolves to the signer address. */
15
34
  getAddress(): Promise<string>;
16
35
  /**
@@ -20,7 +39,7 @@ export declare class Signer extends ethers.AbstractSigner {
20
39
  */
21
40
  connect(provider: null | ethers.Provider): Signer;
22
41
  /**
23
- * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.
42
+ * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.
24
43
  * @param {ethers.TransactionRequest} tx The transaction to sign.
25
44
  * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
26
45
  */
@@ -48,3 +67,4 @@ export declare class Signer extends ethers.AbstractSigner {
48
67
  */
49
68
  private signBlob;
50
69
  }
70
+ export {};
@@ -10,7 +10,7 @@ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (
10
10
  if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
11
11
  return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
12
12
  };
13
- var _Signer_address, _Signer_key, _Signer_signerSession;
13
+ var _Signer_instances, _Signer_address, _Signer_key, _Signer_signerSession, _Signer_onMfaPoll, _Signer_mfaPollIntervalMs, _Signer_managementSession, _Signer_handleMfa;
14
14
  Object.defineProperty(exports, "__esModule", { value: true });
15
15
  exports.Signer = void 0;
16
16
  const ethers_1 = require("ethers");
@@ -19,20 +19,39 @@ const ethers_1 = require("ethers");
19
19
  */
20
20
  class Signer extends ethers_1.ethers.AbstractSigner {
21
21
  /** Create new Signer instance
22
- * @param {string} address The address of the account to use.
22
+ * @param {KeyInfo | string} address The key or the eth address of the account to use.
23
23
  * @param {SignerSession} signerSession The underlying Signer session.
24
- * @param {null | ethers.Provider} provider The optional provider instance to use.
24
+ * @param {SignerOptions} options The options to use for the Signer instance
25
25
  */
26
- constructor(address, signerSession, provider) {
27
- super(provider);
26
+ constructor(address, signerSession, options) {
27
+ super(options?.provider);
28
+ _Signer_instances.add(this);
28
29
  /** The address of the account */
29
30
  _Signer_address.set(this, void 0);
30
31
  /** The key to use for signing */
31
32
  _Signer_key.set(this, void 0);
32
33
  /** The underlying session */
33
34
  _Signer_signerSession.set(this, void 0);
34
- __classPrivateFieldSet(this, _Signer_address, address, "f");
35
+ /**
36
+ * The function to call when MFA information is retrieved. If this callback
37
+ * throws, no transaction is broadcast.
38
+ */
39
+ _Signer_onMfaPoll.set(this, void 0);
40
+ /** The amount of time to wait between checks for MFA updates */
41
+ _Signer_mfaPollIntervalMs.set(this, void 0);
42
+ /** Optional management session, used for MFA flows */
43
+ _Signer_managementSession.set(this, void 0);
44
+ if (typeof address === "string") {
45
+ __classPrivateFieldSet(this, _Signer_address, address, "f");
46
+ }
47
+ else {
48
+ __classPrivateFieldSet(this, _Signer_address, address.materialId, "f");
49
+ __classPrivateFieldSet(this, _Signer_key, address, "f");
50
+ }
35
51
  __classPrivateFieldSet(this, _Signer_signerSession, signerSession, "f");
52
+ __classPrivateFieldSet(this, _Signer_onMfaPoll, options?.onMfaPoll ?? (( /* _mfaInfo: MfaRequestInfo */) => { }), "f"); // eslint-disable-line @typescript-eslint/no-empty-function
53
+ __classPrivateFieldSet(this, _Signer_mfaPollIntervalMs, options?.mfaPollIntervalMs ?? 1000, "f");
54
+ __classPrivateFieldSet(this, _Signer_managementSession, options?.managementSession, "f");
36
55
  }
37
56
  /** Resolves to the signer address. */
38
57
  async getAddress() {
@@ -44,10 +63,10 @@ class Signer extends ethers_1.ethers.AbstractSigner {
44
63
  * @return {Signer} The signer connected to signer.
45
64
  */
46
65
  connect(provider) {
47
- return new Signer(__classPrivateFieldGet(this, _Signer_address, "f"), __classPrivateFieldGet(this, _Signer_signerSession, "f"), provider);
66
+ return new Signer(__classPrivateFieldGet(this, _Signer_address, "f"), __classPrivateFieldGet(this, _Signer_signerSession, "f"), { provider });
48
67
  }
49
68
  /**
50
- * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.
69
+ * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.
51
70
  * @param {ethers.TransactionRequest} tx The transaction to sign.
52
71
  * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
53
72
  */
@@ -70,8 +89,9 @@ class Signer extends ethers_1.ethers.AbstractSigner {
70
89
  chain_id: Number(chainId),
71
90
  tx: rpcTx,
72
91
  };
73
- const sig = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEvm(__classPrivateFieldGet(this, _Signer_address, "f"), req);
74
- return sig.data().rlp_signed_tx;
92
+ const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEvm(__classPrivateFieldGet(this, _Signer_address, "f"), req);
93
+ const data = await __classPrivateFieldGet(this, _Signer_instances, "m", _Signer_handleMfa).call(this, res);
94
+ return data.rlp_signed_tx;
75
95
  }
76
96
  /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)
77
97
  * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.
@@ -106,17 +126,39 @@ class Signer extends ethers_1.ethers.AbstractSigner {
106
126
  };
107
127
  // Get the key corresponding to this address
108
128
  if (__classPrivateFieldGet(this, _Signer_key, "f") === undefined) {
109
- const key = (await __classPrivateFieldGet(this, _Signer_signerSession, "f").keys()).find((k) => k.materialId === __classPrivateFieldGet(this, _Signer_address, "f"));
129
+ const key = (await __classPrivateFieldGet(this, _Signer_signerSession, "f").keys()).find((k) => k.material_id === __classPrivateFieldGet(this, _Signer_address, "f"));
110
130
  if (key === undefined) {
111
131
  throw new Error(`Cannot access key '${__classPrivateFieldGet(this, _Signer_address, "f")}'`);
112
132
  }
113
133
  __classPrivateFieldSet(this, _Signer_key, key, "f");
114
134
  }
115
- // sign
116
- const result = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signBlob(__classPrivateFieldGet(this, _Signer_key, "f"), blobReq);
117
- return result.data().signature;
135
+ const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signBlob(__classPrivateFieldGet(this, _Signer_key, "f").key_id, blobReq);
136
+ const data = await __classPrivateFieldGet(this, _Signer_instances, "m", _Signer_handleMfa).call(this, res);
137
+ return data.signature;
118
138
  }
119
139
  }
120
140
  exports.Signer = Signer;
121
- _Signer_address = new WeakMap(), _Signer_key = new WeakMap(), _Signer_signerSession = new WeakMap();
122
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/ethers/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAQgB;AAIhB;;GAEG;AACH,MAAa,MAAO,SAAQ,eAAM,CAAC,cAAc;IAU/C;;;;OAIG;IACH,YAAY,OAAe,EAAE,aAA4B,EAAE,QAAiC;QAC1F,KAAK,CAAC,QAAQ,CAAC,CAAC;QAflB,iCAAiC;QACxB,kCAAiB;QAE1B,iCAAiC;QACjC,8BAAW;QAEX,6BAA6B;QACpB,wCAA8B;QASrC,uBAAA,IAAI,mBAAY,OAAO,MAAA,CAAC;QACxB,uBAAA,IAAI,yBAAkB,aAAa,MAAA,CAAC;IACtC,CAAC;IAED,sCAAsC;IACtC,KAAK,CAAC,UAAU;QACd,OAAO,uBAAA,IAAI,uBAAS,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACH,OAAO,CAAC,QAAgC;QACtC,OAAO,IAAI,MAAM,CAAC,uBAAA,IAAI,uBAAS,EAAE,uBAAA,IAAI,6BAAe,EAAE,QAAQ,CAAC,CAAC;IAClE,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe,CAAC,EAA6B;QACjD,0CAA0C;QAC1C,IAAI,OAAO,GAAG,EAAE,CAAC,OAAO,CAAC;QACzB,IAAI,OAAO,KAAK,SAAS,EAAE;YACzB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,UAAU,EAAE,CAAC;YAClD,OAAO,GAAG,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,GAAG,CAAC;SAC/C;QAED,sDAAsD;QACtD,MAAM,KAAK,GACT,IAAI,CAAC,QAAQ,YAAY,2BAAkB;YACzC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACrC,CAAC,CAAC,gDAAgD;gBAChD,iDAAiD;gBACjD,0CAA0C;gBAC1C,2BAAkB,CAAC,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACpE,KAAK,CAAC,IAAI,GAAG,IAAA,gBAAO,EAAC,EAAE,CAAC,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,qBAAqB;QAE/D,MAAM,GAAG,GAAmB;YAC1B,QAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;YACzB,EAAE,EAAE,KAAK;SACV,CAAC;QACF,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,OAAO,GAAG,CAAC,IAAI,EAAE,CAAC,aAAa,CAAC;IAClC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,WAAW,CAAC,OAA4B;QAC5C,MAAM,MAAM,GAAG,eAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAC3C,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,aAAa,CACjB,MAAuB,EACvB,KAA4C,EAC5C,KAA0B;QAE1B,MAAM,MAAM,GAAG,yBAAgB,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC;QAC3D,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,QAAQ,CAAC,MAAc;QACnC,MAAM,OAAO,GAAoB;YAC/B,cAAc,EAAE,MAAM,CAAC,IAAI,CAAC,IAAA,iBAAQ,EAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;SACjE,CAAC;QACF,4CAA4C;QAC5C,IAAI,uBAAA,IAAI,mBAAK,KAAK,SAAS,EAAE;YAC3B,MAAM,GAAG,GAAG,CAAC,MAAM,uBAAA,IAAI,6BAAe,CAAC,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,UAAU,KAAK,uBAAA,IAAI,uBAAS,CAAC,CAAC;YAC3F,IAAI,GAAG,KAAK,SAAS,EAAE;gBACrB,MAAM,IAAI,KAAK,CAAC,sBAAsB,uBAAA,IAAI,uBAAS,GAAG,CAAC,CAAC;aACzD;YACD,uBAAA,IAAI,eAAQ,GAAG,MAAA,CAAC;SACjB;QACD,OAAO;QACP,MAAM,MAAM,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,QAAQ,CAAC,uBAAA,IAAI,mBAAK,EAAE,OAAO,CAAC,CAAC;QACtE,OAAO,MAAM,CAAC,IAAI,EAAE,CAAC,SAAS,CAAC;IACjC,CAAC;CACF;AAnHD,wBAmHC","sourcesContent":["import {\n  JsonRpcApiProvider,\n  TypedDataDomain,\n  TypedDataEncoder,\n  TypedDataField,\n  ethers,\n  getBytes,\n  toBeHex,\n} from \"ethers\";\nimport { BlobSignRequest, EvmSignRequest, SignerSession } from \"../signer_session\";\nimport { Key } from \"../key\";\n\n/**\n * A ethers.js Signer using CubeSigner\n */\nexport class Signer extends ethers.AbstractSigner {\n  /** The address of the account */\n  readonly #address: string;\n\n  /** The key to use for signing */\n  #key?: Key;\n\n  /** The underlying session */\n  readonly #signerSession: SignerSession;\n\n  /** Create new Signer instance\n   * @param {string} address The address of the account to use.\n   * @param {SignerSession} signerSession The underlying Signer session.\n   * @param {null | ethers.Provider} provider The optional provider instance to use.\n   */\n  constructor(address: string, signerSession: SignerSession, provider?: null | ethers.Provider) {\n    super(provider);\n    this.#address = address;\n    this.#signerSession = signerSession;\n  }\n\n  /** Resolves to the signer address. */\n  async getAddress(): Promise<string> {\n    return this.#address;\n  }\n\n  /**\n   *  Returns the signer connected to %%provider%%.\n   *  @param {null | ethers.Provider} provider The optional provider instance to use.\n   *  @return {Signer} The signer connected to signer.\n   */\n  connect(provider: null | ethers.Provider): Signer {\n    return new Signer(this.#address, this.#signerSession, provider);\n  }\n\n  /**\n   * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.\n   * @param {ethers.TransactionRequest} tx The transaction to sign.\n   * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.\n   */\n  async signTransaction(tx: ethers.TransactionRequest): Promise<string> {\n    // get the chain id from the network or tx\n    let chainId = tx.chainId;\n    if (chainId === undefined) {\n      const network = await this.provider?.getNetwork();\n      chainId = network?.chainId?.toString() ?? \"1\";\n    }\n\n    // Convert the transaction into a JSON-RPC transaction\n    const rpcTx =\n      this.provider instanceof JsonRpcApiProvider\n        ? this.provider.getRpcTransaction(tx)\n        : // We can just call the getRpcTransaction with a\n          // null receiver since it doesn't actually use it\n          // (and really should be declared static).\n          JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);\n    rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]\n\n    const req = <EvmSignRequest>{\n      chain_id: Number(chainId),\n      tx: rpcTx,\n    };\n    const sig = await this.#signerSession.signEvm(this.#address, req);\n    return sig.data().rlp_signed_tx;\n  }\n\n  /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)\n   * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {string | Uint8Array} message The message to sign.\n   * @return {Promise<string>} The signature.\n   */\n  async signMessage(message: string | Uint8Array): Promise<string> {\n    const digest = ethers.hashMessage(message);\n    return this.signBlob(digest);\n  }\n\n  /** Signs EIP-712 typed data. This uses ethers.js's\n   * [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)\n   * to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {TypedDataDomain} domain The domain of the typed data.\n   * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.\n   * @param {Record<string, any>} value The value of the typed data.\n   * @return {Promise<string>} The signature.\n   */\n  async signTypedData(\n    domain: TypedDataDomain,\n    types: Record<string, Array<TypedDataField>>,\n    value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any\n  ): Promise<string> {\n    const digest = TypedDataEncoder.hash(domain, types, value);\n    return this.signBlob(digest);\n  }\n\n  /** Sign arbitrary digest. This uses {@link Key#signBlob}.\n   * @param {string} digest The digest to sign.\n   * @return {Promise<string>} The signature.\n   */\n  private async signBlob(digest: string): Promise<string> {\n    const blobReq = <BlobSignRequest>{\n      message_base64: Buffer.from(getBytes(digest)).toString(\"base64\"),\n    };\n    // Get the key corresponding to this address\n    if (this.#key === undefined) {\n      const key = (await this.#signerSession.keys()).find((k) => k.materialId === this.#address);\n      if (key === undefined) {\n        throw new Error(`Cannot access key '${this.#address}'`);\n      }\n      this.#key = key;\n    }\n    // sign\n    const result = await this.#signerSession.signBlob(this.#key, blobReq);\n    return result.data().signature;\n  }\n}\n"]}
141
+ _Signer_address = new WeakMap(), _Signer_key = new WeakMap(), _Signer_signerSession = new WeakMap(), _Signer_onMfaPoll = new WeakMap(), _Signer_mfaPollIntervalMs = new WeakMap(), _Signer_managementSession = new WeakMap(), _Signer_instances = new WeakSet(), _Signer_handleMfa =
142
+ /**
143
+ * If the sign request requires MFA, this method waits for approvals
144
+ *
145
+ * @param {SignResponse<U>} res The response of a sign request
146
+ * @return {Promise<U>} The sign data after MFA approvals
147
+ */
148
+ async function _Signer_handleMfa(res) {
149
+ while (res.requiresMfa()) {
150
+ await new Promise((resolve) => setTimeout(resolve, __classPrivateFieldGet(this, _Signer_mfaPollIntervalMs, "f")));
151
+ const mfaId = res.mfaId();
152
+ const mfaInfo = await __classPrivateFieldGet(this, _Signer_signerSession, "f").getMfaInfo(__classPrivateFieldGet(this, _Signer_managementSession, "f"), mfaId);
153
+ __classPrivateFieldGet(this, _Signer_onMfaPoll, "f").call(this, mfaInfo);
154
+ if (mfaInfo.receipt) {
155
+ res = await res.signWithMfaApproval({
156
+ mfaId,
157
+ mfaOrgId: __classPrivateFieldGet(this, _Signer_signerSession, "f").orgId,
158
+ mfaConf: mfaInfo.receipt.confirmation,
159
+ });
160
+ }
161
+ }
162
+ return res.data();
163
+ };
164
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/ethers/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAQgB;AA6BhB;;GAEG;AACH,MAAa,MAAO,SAAQ,eAAM,CAAC,cAAc;IAsB/C;;;;OAIG;IACH,YAAY,OAAyB,EAAE,aAA4B,EAAE,OAAuB;QAC1F,KAAK,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;;QA3B3B,iCAAiC;QACxB,kCAAiB;QAE1B,iCAAiC;QACjC,8BAAe;QAEf,6BAA6B;QACpB,wCAA8B;QAEvC;;;WAGG;QACM,oCAA2C;QAEpD,gEAAgE;QACvD,4CAA2B;QAEpC,sDAAsD;QAC7C,4CAAgC;QASvC,IAAI,OAAO,OAAO,KAAK,QAAQ,EAAE;YAC/B,uBAAA,IAAI,mBAAY,OAAO,MAAA,CAAC;SACzB;aAAM;YACL,uBAAA,IAAI,mBAAY,OAAO,CAAC,UAAU,MAAA,CAAC;YACnC,uBAAA,IAAI,eAAQ,OAAkB,MAAA,CAAC;SAChC;QACD,uBAAA,IAAI,yBAAkB,aAAa,MAAA,CAAC;QACpC,uBAAA,IAAI,qBAAc,OAAO,EAAE,SAAS,IAAI,CAAC,EAAC,8BAA8B,EAAE,EAAE,GAAE,CAAC,CAAC,MAAA,CAAC,CAAC,2DAA2D;QAC7I,uBAAA,IAAI,6BAAsB,OAAO,EAAE,iBAAiB,IAAI,IAAI,MAAA,CAAC;QAC7D,uBAAA,IAAI,6BAAsB,OAAO,EAAE,iBAAiB,MAAA,CAAC;IACvD,CAAC;IAED,sCAAsC;IACtC,KAAK,CAAC,UAAU;QACd,OAAO,uBAAA,IAAI,uBAAS,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACH,OAAO,CAAC,QAAgC;QACtC,OAAO,IAAI,MAAM,CAAC,uBAAA,IAAI,uBAAS,EAAE,uBAAA,IAAI,6BAAe,EAAE,EAAE,QAAQ,EAAE,CAAC,CAAC;IACtE,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe,CAAC,EAA6B;QACjD,0CAA0C;QAC1C,IAAI,OAAO,GAAG,EAAE,CAAC,OAAO,CAAC;QACzB,IAAI,OAAO,KAAK,SAAS,EAAE;YACzB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,UAAU,EAAE,CAAC;YAClD,OAAO,GAAG,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,GAAG,CAAC;SAC/C;QAED,sDAAsD;QACtD,MAAM,KAAK,GACT,IAAI,CAAC,QAAQ,YAAY,2BAAkB;YACzC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACrC,CAAC,CAAC,gDAAgD;gBAChD,iDAAiD;gBACjD,0CAA0C;gBAC1C,2BAAkB,CAAC,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACpE,KAAK,CAAC,IAAI,GAAG,IAAA,gBAAO,EAAC,EAAE,CAAC,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,qBAAqB;QAE/D,MAAM,GAAG,GAAmB;YAC1B,QAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;YACzB,EAAE,EAAE,KAAK;SACV,CAAC;QAEF,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,aAAa,CAAC;IAC5B,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,WAAW,CAAC,OAA4B;QAC5C,MAAM,MAAM,GAAG,eAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAC3C,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,aAAa,CACjB,MAAuB,EACvB,KAA4C,EAC5C,KAA0B;QAE1B,MAAM,MAAM,GAAG,yBAAgB,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC;QAC3D,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,QAAQ,CAAC,MAAc;QACnC,MAAM,OAAO,GAAoB;YAC/B,cAAc,EAAE,MAAM,CAAC,IAAI,CAAC,IAAA,iBAAQ,EAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;SACjE,CAAC;QACF,4CAA4C;QAC5C,IAAI,uBAAA,IAAI,mBAAK,KAAK,SAAS,EAAE;YAC3B,MAAM,GAAG,GAAG,CAAC,MAAM,uBAAA,IAAI,6BAAe,CAAC,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,WAAW,KAAK,uBAAA,IAAI,uBAAS,CAAC,CAAC;YAC5F,IAAI,GAAG,KAAK,SAAS,EAAE;gBACrB,MAAM,IAAI,KAAK,CAAC,sBAAsB,uBAAA,IAAI,uBAAS,GAAG,CAAC,CAAC;aACzD;YACD,uBAAA,IAAI,eAAQ,GAAG,MAAA,CAAC;SACjB;QAED,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,QAAQ,CAAC,uBAAA,IAAI,mBAAK,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;QAC1E,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,SAAS,CAAC;IACxB,CAAC;CAyBF;AAlKD,wBAkKC;;AAvBC;;;;;GAKG;AACH,KAAK,4BAAe,GAAoB;IACtC,OAAO,GAAG,CAAC,WAAW,EAAE,EAAE;QACxB,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,uBAAA,IAAI,iCAAmB,CAAC,CAAC,CAAC;QAE7E,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,EAAE,CAAC;QAC1B,MAAM,OAAO,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,UAAU,CAAC,uBAAA,IAAI,iCAAoB,EAAE,KAAK,CAAC,CAAC;QACtF,uBAAA,IAAI,yBAAW,MAAf,IAAI,EAAY,OAAO,CAAC,CAAC;QACzB,IAAI,OAAO,CAAC,OAAO,EAAE;YACnB,GAAG,GAAG,MAAM,GAAG,CAAC,mBAAmB,CAAC;gBAClC,KAAK;gBACL,QAAQ,EAAE,uBAAA,IAAI,6BAAe,CAAC,KAAK;gBACnC,OAAO,EAAE,OAAO,CAAC,OAAO,CAAC,YAAY;aACtC,CAAC,CAAC;SACJ;KACF;IACD,OAAO,GAAG,CAAC,IAAI,EAAE,CAAC;AACpB,CAAC","sourcesContent":["import {\n  JsonRpcApiProvider,\n  TypedDataDomain,\n  TypedDataEncoder,\n  TypedDataField,\n  ethers,\n  getBytes,\n  toBeHex,\n} from \"ethers\";\nimport {\n  BlobSignRequest,\n  EvmSignRequest,\n  MfaRequestInfo,\n  SignerSession,\n  SignResponse,\n} from \"../signer_session\";\nimport { KeyInfo } from \"../key\";\nimport { CubeSigner } from \"..\";\n\n/** Options for the signer */\ninterface SignerOptions {\n  /** Optional provider to use */\n  provider?: null | ethers.Provider;\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  onMfaPoll?: (arg0: MfaRequestInfo) => void;\n  /**\n   * The amount of time (in milliseconds) to wait between checks for MFA\n   * updates. Default is 1000ms\n   */\n  mfaPollIntervalMs?: number;\n  /** Optional management session. Used to check for MFA updates */\n  managementSession?: CubeSigner;\n}\n\n/**\n * A ethers.js Signer using CubeSigner\n */\nexport class Signer extends ethers.AbstractSigner {\n  /** The address of the account */\n  readonly #address: string;\n\n  /** The key to use for signing */\n  #key?: KeyInfo;\n\n  /** The underlying session */\n  readonly #signerSession: SignerSession;\n\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  readonly #onMfaPoll: (arg0: MfaRequestInfo) => void;\n\n  /** The amount of time to wait between checks for MFA updates */\n  readonly #mfaPollIntervalMs: number;\n\n  /** Optional management session, used for MFA flows */\n  readonly #managementSession?: CubeSigner;\n\n  /** Create new Signer instance\n   * @param {KeyInfo | string} address The key or the eth address of the account to use.\n   * @param {SignerSession} signerSession The underlying Signer session.\n   * @param {SignerOptions} options The options to use for the Signer instance\n   */\n  constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions) {\n    super(options?.provider);\n    if (typeof address === \"string\") {\n      this.#address = address;\n    } else {\n      this.#address = address.materialId;\n      this.#key = address as KeyInfo;\n    }\n    this.#signerSession = signerSession;\n    this.#onMfaPoll = options?.onMfaPoll ?? ((/* _mfaInfo: MfaRequestInfo */) => {}); // eslint-disable-line @typescript-eslint/no-empty-function\n    this.#mfaPollIntervalMs = options?.mfaPollIntervalMs ?? 1000;\n    this.#managementSession = options?.managementSession;\n  }\n\n  /** Resolves to the signer address. */\n  async getAddress(): Promise<string> {\n    return this.#address;\n  }\n\n  /**\n   *  Returns the signer connected to %%provider%%.\n   *  @param {null | ethers.Provider} provider The optional provider instance to use.\n   *  @return {Signer} The signer connected to signer.\n   */\n  connect(provider: null | ethers.Provider): Signer {\n    return new Signer(this.#address, this.#signerSession, { provider });\n  }\n\n  /**\n   * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.\n   * @param {ethers.TransactionRequest} tx The transaction to sign.\n   * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.\n   */\n  async signTransaction(tx: ethers.TransactionRequest): Promise<string> {\n    // get the chain id from the network or tx\n    let chainId = tx.chainId;\n    if (chainId === undefined) {\n      const network = await this.provider?.getNetwork();\n      chainId = network?.chainId?.toString() ?? \"1\";\n    }\n\n    // Convert the transaction into a JSON-RPC transaction\n    const rpcTx =\n      this.provider instanceof JsonRpcApiProvider\n        ? this.provider.getRpcTransaction(tx)\n        : // We can just call the getRpcTransaction with a\n          // null receiver since it doesn't actually use it\n          // (and really should be declared static).\n          JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);\n    rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]\n\n    const req = <EvmSignRequest>{\n      chain_id: Number(chainId),\n      tx: rpcTx,\n    };\n\n    const res = await this.#signerSession.signEvm(this.#address, req);\n    const data = await this.#handleMfa(res);\n    return data.rlp_signed_tx;\n  }\n\n  /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)\n   * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {string | Uint8Array} message The message to sign.\n   * @return {Promise<string>} The signature.\n   */\n  async signMessage(message: string | Uint8Array): Promise<string> {\n    const digest = ethers.hashMessage(message);\n    return this.signBlob(digest);\n  }\n\n  /** Signs EIP-712 typed data. This uses ethers.js's\n   * [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)\n   * to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {TypedDataDomain} domain The domain of the typed data.\n   * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.\n   * @param {Record<string, any>} value The value of the typed data.\n   * @return {Promise<string>} The signature.\n   */\n  async signTypedData(\n    domain: TypedDataDomain,\n    types: Record<string, Array<TypedDataField>>,\n    value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any\n  ): Promise<string> {\n    const digest = TypedDataEncoder.hash(domain, types, value);\n    return this.signBlob(digest);\n  }\n\n  /** Sign arbitrary digest. This uses {@link Key#signBlob}.\n   * @param {string} digest The digest to sign.\n   * @return {Promise<string>} The signature.\n   */\n  private async signBlob(digest: string): Promise<string> {\n    const blobReq = <BlobSignRequest>{\n      message_base64: Buffer.from(getBytes(digest)).toString(\"base64\"),\n    };\n    // Get the key corresponding to this address\n    if (this.#key === undefined) {\n      const key = (await this.#signerSession.keys()).find((k) => k.material_id === this.#address);\n      if (key === undefined) {\n        throw new Error(`Cannot access key '${this.#address}'`);\n      }\n      this.#key = key;\n    }\n\n    const res = await this.#signerSession.signBlob(this.#key.key_id, blobReq);\n    const data = await this.#handleMfa(res);\n    return data.signature;\n  }\n\n  /**\n   * If the sign request requires MFA, this method waits for approvals\n   *\n   * @param {SignResponse<U>} res The response of a sign request\n   * @return {Promise<U>} The sign data after MFA approvals\n   */\n  async #handleMfa<U>(res: SignResponse<U>): Promise<U> {\n    while (res.requiresMfa()) {\n      await new Promise((resolve) => setTimeout(resolve, this.#mfaPollIntervalMs));\n\n      const mfaId = res.mfaId();\n      const mfaInfo = await this.#signerSession.getMfaInfo(this.#managementSession!, mfaId);\n      this.#onMfaPoll(mfaInfo);\n      if (mfaInfo.receipt) {\n        res = await res.signWithMfaApproval({\n          mfaId,\n          mfaOrgId: this.#signerSession.orgId,\n          mfaConf: mfaInfo.receipt.confirmation,\n        });\n      }\n    }\n    return res.data();\n  }\n}\n"]}
@@ -0,0 +1,76 @@
1
+ import { CubeSigner, MfaRequestInfo, SignerSession } from ".";
2
+ import { components } from "./schema";
3
+ export type ApiAddFidoChallenge = components["responses"]["FidoCreateChallengeResponse"]["content"]["application/json"];
4
+ export type ApiMfaFidoChallenge = components["responses"]["FidoAssertChallenge"]["content"]["application/json"];
5
+ export type PublicKeyCredentialCreationOptions = components["schemas"]["PublicKeyCredentialCreationOptions"];
6
+ export type PublicKeyCredentialRequestOptions = components["schemas"]["PublicKeyCredentialRequestOptions"];
7
+ export type PublicKeyCredentialParameters = components["schemas"]["PublicKeyCredentialParameters"];
8
+ export type PublicKeyCredentialDescriptor = components["schemas"]["PublicKeyCredentialDescriptor"];
9
+ export type AuthenticatorSelectionCriteria = components["schemas"]["AuthenticatorSelectionCriteria"];
10
+ export type PublicKeyCredentialUserEntity = components["schemas"]["PublicKeyCredentialUserEntity"];
11
+ export type PublicKeyCredential = components["schemas"]["PublicKeyCredential"];
12
+ /**
13
+ * Returned after creating a request to add a new FIDO device.
14
+ * Provides some helper methods for answering this challenge.
15
+ */
16
+ export declare class AddFidoChallenge {
17
+ #private;
18
+ readonly challengeId: string;
19
+ readonly options: any;
20
+ /**
21
+ * Constructor
22
+ * @param {CubeSigner} cs CubeSigner instance used to request to add a FIDO device
23
+ * @param {ApiAddFidoChallenge} challenge The challenge returned by the remote end.
24
+ */
25
+ constructor(cs: CubeSigner, challenge: ApiAddFidoChallenge);
26
+ /**
27
+ * Answers this challenge by using the `CredentialsContainer` API to create a credential
28
+ * based on the the public key credential creation options from this challenge.
29
+ */
30
+ createCredentialAndAnswer(): Promise<void>;
31
+ /**
32
+ * Answers this challenge using a given credential `cred`;
33
+ * the credential should be obtained by calling
34
+ *
35
+ * ```
36
+ * const cred = await navigator.credentials.create({ publicKey: this.options });
37
+ * ```
38
+ *
39
+ * @param {any} cred Credential created by calling the `CredentialContainer`'s `create` method
40
+ * based on the public key creation options from this challenge.
41
+ */
42
+ answer(cred: any): Promise<void>;
43
+ }
44
+ /**
45
+ * Returned after initiating MFA approval using FIDO.
46
+ * Provides some helper methods for answering this challenge.
47
+ */
48
+ export declare class MfaFidoChallenge {
49
+ #private;
50
+ readonly mfaId: string;
51
+ readonly challengeId: string;
52
+ readonly options: any;
53
+ /**
54
+ * @param {SignerSession} ss The session used to initiate MFA approval using FIDO
55
+ * @param {string} mfaId The MFA request id.
56
+ * @param {ApiMfaFidoChallenge} challenge The challenge returned by the remote end
57
+ */
58
+ constructor(ss: SignerSession, mfaId: string, challenge: ApiMfaFidoChallenge);
59
+ /**
60
+ * Answers this challenge by using the `CredentialsContainer` API to get a credential
61
+ * based on the the public key credential request options from this challenge.
62
+ */
63
+ createCredentialAndAnswer(): Promise<MfaRequestInfo>;
64
+ /**
65
+ * Answers this challenge using a given credential `cred`.
66
+ * To obtain this credential, for example, call
67
+ *
68
+ * ```
69
+ * const cred = await navigator.credentials.get({ publicKey: this.options });
70
+ * ```
71
+ *
72
+ * @param {any} cred Credential created by calling the `CredentialContainer`'s `get` method
73
+ * based on the public key credential request options from this challenge.
74
+ */
75
+ answer(cred: any): Promise<MfaRequestInfo>;
76
+ }