@cubist-labs/cubesigner-sdk 0.1.26 → 0.1.77
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +94 -33
- package/dist/src/ethers/index.d.ts +25 -5
- package/dist/src/ethers/index.js +58 -16
- package/dist/src/fido.d.ts +76 -0
- package/dist/src/fido.js +148 -0
- package/dist/src/index.d.ts +148 -35
- package/dist/src/index.js +320 -53
- package/dist/src/key.d.ts +64 -8
- package/dist/src/key.js +91 -19
- package/dist/src/org.d.ts +98 -9
- package/dist/src/org.js +144 -29
- package/dist/src/paginator.d.ts +76 -0
- package/dist/src/paginator.js +99 -0
- package/dist/src/role.d.ts +20 -8
- package/dist/src/role.js +7 -5
- package/dist/src/schema.d.ts +2395 -393
- package/dist/src/schema.js +1 -1
- package/dist/src/session/cognito_manager.d.ts +59 -0
- package/dist/src/session/cognito_manager.js +111 -0
- package/dist/src/session/session_manager.d.ts +15 -0
- package/dist/src/session/session_manager.js +21 -2
- package/dist/src/session/session_storage.js +1 -1
- package/dist/src/session/signer_session_manager.d.ts +24 -12
- package/dist/src/session/signer_session_manager.js +45 -20
- package/dist/src/signer_session.d.ts +136 -38
- package/dist/src/signer_session.js +187 -80
- package/dist/src/util.d.ts +20 -0
- package/dist/src/util.js +31 -2
- package/package.json +12 -7
- package/src/ethers/index.ts +88 -16
- package/src/fido.ts +166 -0
- package/src/index.ts +366 -77
- package/src/key.ts +112 -16
- package/src/org.ts +200 -37
- package/src/paginator.ts +122 -0
- package/src/role.ts +24 -11
- package/src/schema.ts +2458 -449
- package/src/session/{management_session_manager.ts → cognito_manager.ts} +13 -15
- package/src/session/session_manager.ts +25 -1
- package/src/session/session_storage.ts +1 -1
- package/src/session/signer_session_manager.ts +57 -27
- package/src/signer_session.ts +266 -89
- package/src/util.ts +41 -0
- package/src/session/oidc_session_manager.ts +0 -193
package/README.md
CHANGED
|
@@ -71,11 +71,11 @@ session manager:
|
|
|
71
71
|
|
|
72
72
|
```typescript
|
|
73
73
|
// Load session from a JSON file
|
|
74
|
-
const fileStorage = new cs.JsonFileSessionStorage<cs.
|
|
74
|
+
const fileStorage = new cs.JsonFileSessionStorage<cs.CognitoSessionInfo>(
|
|
75
75
|
`${process.env.HOME}/.config/cubesigner/management-session.json`,
|
|
76
76
|
);
|
|
77
77
|
// Create a session manager for a management token
|
|
78
|
-
const sessionMgr = await cs.
|
|
78
|
+
const sessionMgr = await cs.CognitoSessionManager.loadFromStorage(fileStorage);
|
|
79
79
|
new cs.CubeSigner({
|
|
80
80
|
sessionMgr,
|
|
81
81
|
});
|
|
@@ -113,7 +113,8 @@ transaction. For that, we need a key of type `Secp256k1.Evm`.
|
|
|
113
113
|
const secpKey = await org.createKey(cs.Secp256k1.Evm);
|
|
114
114
|
assert((await secpKey.owner()) == me.user_id);
|
|
115
115
|
assert(await secpKey.enabled());
|
|
116
|
-
|
|
116
|
+
assert(await secpKey.type(), cs.Secp256k1.Evm);
|
|
117
|
+
console.log(`Created '${cs.Secp256k1.Evm}' key ${secpKey.id}`);
|
|
117
118
|
```
|
|
118
119
|
|
|
119
120
|
### Create a `Role` and a `SignerSession`
|
|
@@ -201,7 +202,7 @@ assert(sig.data().rlp_signed_tx);
|
|
|
201
202
|
```typescript
|
|
202
203
|
const { ethers } = require("ethers");
|
|
203
204
|
// Create new Signer
|
|
204
|
-
const ethersSigner = new cs.ethers.Signer(secpKey.materialId, session
|
|
205
|
+
const ethersSigner = new cs.ethers.Signer(secpKey.materialId, session);
|
|
205
206
|
assert((await ethersSigner.getAddress()) === secpKey.materialId);
|
|
206
207
|
// sign transaction as usual:
|
|
207
208
|
console.log(
|
|
@@ -264,22 +265,30 @@ disabled for `BLS` keys, and for other key types it can be enabled by
|
|
|
264
265
|
attaching an `"AllowRawBlobSigning"` policy:
|
|
265
266
|
|
|
266
267
|
```typescript
|
|
267
|
-
|
|
268
|
-
const
|
|
269
|
-
|
|
270
|
-
};
|
|
271
|
-
|
|
272
|
-
|
|
273
|
-
|
|
274
|
-
|
|
275
|
-
|
|
268
|
+
// Create a new Ed25519 key (e.g., for Cardano) and add it to our session role
|
|
269
|
+
const edKey = await org.createKey(cs.Ed25519.Cardano);
|
|
270
|
+
await role.addKey(edKey);
|
|
271
|
+
console.log(`Created '${await edKey.type()}' key ${edKey.id} and added it to role ${role.id}`);
|
|
272
|
+
|
|
273
|
+
// Sign raw blobs with our new ed key and the secp we created before
|
|
274
|
+
for (const key of [edKey, secpKey]) {
|
|
275
|
+
console.log(`Confirming that raw blob with ${await key.type()} is rejected by default`);
|
|
276
|
+
const blobReq = <cs.BlobSignRequest>{
|
|
277
|
+
message_base64: "L1kE9g59xD3fzYQQSR7340BwU9fGrP6EMfIFcyX/YBc=",
|
|
278
|
+
};
|
|
279
|
+
try {
|
|
280
|
+
await session.signBlob(key, blobReq);
|
|
281
|
+
assert(false, "Must be rejected by policy");
|
|
282
|
+
} catch (e) {
|
|
283
|
+
assert(`${e}`.includes("Raw blob signing not allowed"));
|
|
284
|
+
}
|
|
285
|
+
|
|
286
|
+
console.log("Signing raw blob after adding 'AllowRawBlobSigning' policy");
|
|
287
|
+
await key.appendPolicy(["AllowRawBlobSigning"]);
|
|
288
|
+
const blobSig = await session.signBlob(key, blobReq);
|
|
289
|
+
console.log(blobSig.data());
|
|
290
|
+
assert(blobSig.data().signature);
|
|
276
291
|
}
|
|
277
|
-
|
|
278
|
-
console.log("Signing raw blob after adding 'AllowRawBlobSigning' policy");
|
|
279
|
-
await secpKey.appendPolicy(["AllowRawBlobSigning"]);
|
|
280
|
-
const blobSig = await session.signBlob(secpKey, blobReq);
|
|
281
|
-
console.log(blobSig.data());
|
|
282
|
-
assert(blobSig.data().signature);
|
|
283
292
|
```
|
|
284
293
|
|
|
285
294
|
> **Warning**
|
|
@@ -343,12 +352,29 @@ export the underlying token:
|
|
|
343
352
|
const oidcToken = await cubesigner.sessionMgr!.token();
|
|
344
353
|
```
|
|
345
354
|
|
|
346
|
-
|
|
347
|
-
|
|
348
|
-
`signEvm`)
|
|
355
|
+
Before we can use the OIDC token for authentication, we must add an org policy
|
|
356
|
+
to allow the particular issuer/audience pair from the token.
|
|
349
357
|
|
|
350
358
|
```typescript
|
|
351
|
-
const
|
|
359
|
+
const oldOrgPolicy = await org.policy();
|
|
360
|
+
const oidcPayload = JSON.parse(atob(oidcToken.split(".")[1].replace(/-/g, "+").replace(/_/g, "/")));
|
|
361
|
+
const oidcAuthSourcesPolicy = {
|
|
362
|
+
OidcAuthSources: {
|
|
363
|
+
[oidcPayload.iss]: [oidcPayload.aud],
|
|
364
|
+
},
|
|
365
|
+
};
|
|
366
|
+
console.log("Setting org policy", oidcAuthSourcesPolicy);
|
|
367
|
+
await org.setPolicy([oidcAuthSourcesPolicy]);
|
|
368
|
+
```
|
|
369
|
+
|
|
370
|
+
Finally, exchange the OIDC token for either a _signer_ session (i.e., an instance
|
|
371
|
+
of `SignerSession`, required by all signing endpoints, e.g., `signEvm`)
|
|
372
|
+
|
|
373
|
+
```typescript
|
|
374
|
+
const oidcSession = new cs.SignerSession(
|
|
375
|
+
// we'll use this session for both signing and approving MFA request, hence the following scopes
|
|
376
|
+
await cubesigner.oidcAuth(oidcToken, org.id, ["manage:mfa", "sign:*"]),
|
|
377
|
+
);
|
|
352
378
|
```
|
|
353
379
|
|
|
354
380
|
or a _management_ session (i.e., and instance of `CubeSigner`,
|
|
@@ -357,7 +383,7 @@ information, configuring user MFA methods, etc.).
|
|
|
357
383
|
|
|
358
384
|
```typescript
|
|
359
385
|
const oidcCubeSigner = new cs.CubeSigner({
|
|
360
|
-
sessionMgr: await cubesigner.
|
|
386
|
+
sessionMgr: await cubesigner.oidcAuth(oidcToken, org.id, ["manage:*"]),
|
|
361
387
|
});
|
|
362
388
|
```
|
|
363
389
|
|
|
@@ -374,26 +400,56 @@ doesn't matter if that user is native to CubeSigner or a third-party
|
|
|
374
400
|
OIDC user. For that purpose, in this section we are going to use the
|
|
375
401
|
previously created `oidcCubeSigner` instance.
|
|
376
402
|
|
|
377
|
-
To set up TOTP, we call the `
|
|
378
|
-
TOTP
|
|
379
|
-
any) and returns a [TOTP
|
|
380
|
-
url](https://github.com/google/google-authenticator/wiki/Key-Uri-Format).
|
|
403
|
+
To set up TOTP, we first call the `resetTotpStart` method to initiate a
|
|
404
|
+
TOTP reset procedure.
|
|
381
405
|
|
|
382
406
|
```typescript
|
|
383
407
|
console.log(`Setting up TOTP for user ${me.email}`);
|
|
384
|
-
|
|
385
|
-
|
|
408
|
+
let totpResetResp = await oidcCubeSigner.resetTotpStart();
|
|
409
|
+
```
|
|
410
|
+
|
|
411
|
+
If the user has already configured TOTP (or any other form of MFA),
|
|
412
|
+
this response will require multi factor authentication. In that case,
|
|
413
|
+
for example, call `approveTotp` and provide the code for the existing
|
|
414
|
+
TOTP to proceed:
|
|
415
|
+
|
|
416
|
+
```typescript
|
|
417
|
+
import { authenticator } from "otplib"; // npm install otplib@12.0.1
|
|
418
|
+
|
|
419
|
+
let totpSecret = process.env["CS_USER_TOTP_SECRET"]!;
|
|
420
|
+
if (totpResetResp.requiresMfa()) {
|
|
421
|
+
console.log("Resetting TOTP requires MFA");
|
|
422
|
+
const code = authenticator.generate(totpSecret);
|
|
423
|
+
totpResetResp = await totpResetResp.approveTotp(oidcSession, code);
|
|
424
|
+
assert(!totpResetResp.requiresMfa());
|
|
425
|
+
console.log("MFA approved using existing TOTP");
|
|
426
|
+
}
|
|
386
427
|
```
|
|
387
428
|
|
|
429
|
+
The response contains a TOTP challenge, i.e., a new TOTP
|
|
430
|
+
configuration in the form of the standard
|
|
431
|
+
[TOTP url](https://github.com/google/google-authenticator/wiki/Key-Uri-Format).
|
|
388
432
|
From that url, we can generate a QR code to present to the user, or
|
|
389
433
|
create an authenticator for automated testing.
|
|
390
434
|
|
|
391
435
|
```typescript
|
|
392
|
-
|
|
436
|
+
const totpChallenge = totpResetResp.data();
|
|
437
|
+
assert(totpChallenge.totpUrl);
|
|
438
|
+
```
|
|
439
|
+
|
|
440
|
+
To complete the challenge, we must call `resetTotpComplete` and
|
|
441
|
+
provide the TOTP code matching the TOTP configuration from the challenge:
|
|
393
442
|
|
|
394
|
-
|
|
443
|
+
```typescript norun
|
|
444
|
+
totpSecret = new URL(totpChallenge.totp_url).searchParams.get("secret");
|
|
395
445
|
assert(totpSecret);
|
|
446
|
+
await totpChallenge.answer(authenticator.generate(totpSecret));
|
|
447
|
+
```
|
|
396
448
|
|
|
449
|
+
After TOTP is configured, we can double check that our authenticator
|
|
450
|
+
is generating the correct code by calling `verifyTotp`
|
|
451
|
+
|
|
452
|
+
```typescript
|
|
397
453
|
console.log(`Verifying current TOTP code`);
|
|
398
454
|
let code = authenticator.generate(totpSecret);
|
|
399
455
|
await oidcCubeSigner.verifyTotp(code);
|
|
@@ -405,7 +461,7 @@ as one of the configured MFA factors.
|
|
|
405
461
|
```typescript
|
|
406
462
|
const mfa = (await oidcCubeSigner.aboutMe()).mfa;
|
|
407
463
|
console.log("Configured MFA types", mfa);
|
|
408
|
-
assert(mfa.includes("
|
|
464
|
+
assert(mfa.map((m) => m.type).includes("totp"));
|
|
409
465
|
```
|
|
410
466
|
|
|
411
467
|
### Configure MFA policy for signing
|
|
@@ -453,6 +509,11 @@ we created.
|
|
|
453
509
|
console.log("Cleaning up");
|
|
454
510
|
await session.sessionMgr.revoke();
|
|
455
511
|
await role.delete();
|
|
512
|
+
|
|
513
|
+
// restore the old policy for the sake of repeatability of this example
|
|
514
|
+
// (normally you'd set your org policies once and leave them be)
|
|
515
|
+
console.log("Restoring org policy", oldOrgPolicy);
|
|
516
|
+
await org.setPolicy(oldOrgPolicy);
|
|
456
517
|
```
|
|
457
518
|
|
|
458
519
|
As of now, deleting keys is not supported.
|
|
@@ -1,16 +1,35 @@
|
|
|
1
1
|
import { TypedDataDomain, TypedDataField, ethers } from "ethers";
|
|
2
|
-
import { SignerSession } from "../signer_session";
|
|
2
|
+
import { MfaRequestInfo, SignerSession } from "../signer_session";
|
|
3
|
+
import { KeyInfo } from "../key";
|
|
4
|
+
import { CubeSigner } from "..";
|
|
5
|
+
/** Options for the signer */
|
|
6
|
+
interface SignerOptions {
|
|
7
|
+
/** Optional provider to use */
|
|
8
|
+
provider?: null | ethers.Provider;
|
|
9
|
+
/**
|
|
10
|
+
* The function to call when MFA information is retrieved. If this callback
|
|
11
|
+
* throws, no transaction is broadcast.
|
|
12
|
+
*/
|
|
13
|
+
onMfaPoll?: (arg0: MfaRequestInfo) => void;
|
|
14
|
+
/**
|
|
15
|
+
* The amount of time (in milliseconds) to wait between checks for MFA
|
|
16
|
+
* updates. Default is 1000ms
|
|
17
|
+
*/
|
|
18
|
+
mfaPollIntervalMs?: number;
|
|
19
|
+
/** Optional management session. Used to check for MFA updates */
|
|
20
|
+
managementSession?: CubeSigner;
|
|
21
|
+
}
|
|
3
22
|
/**
|
|
4
23
|
* A ethers.js Signer using CubeSigner
|
|
5
24
|
*/
|
|
6
25
|
export declare class Signer extends ethers.AbstractSigner {
|
|
7
26
|
#private;
|
|
8
27
|
/** Create new Signer instance
|
|
9
|
-
* @param {string} address The address of the account to use.
|
|
28
|
+
* @param {KeyInfo | string} address The key or the eth address of the account to use.
|
|
10
29
|
* @param {SignerSession} signerSession The underlying Signer session.
|
|
11
|
-
* @param {
|
|
30
|
+
* @param {SignerOptions} options The options to use for the Signer instance
|
|
12
31
|
*/
|
|
13
|
-
constructor(address: string, signerSession: SignerSession,
|
|
32
|
+
constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions);
|
|
14
33
|
/** Resolves to the signer address. */
|
|
15
34
|
getAddress(): Promise<string>;
|
|
16
35
|
/**
|
|
@@ -20,7 +39,7 @@ export declare class Signer extends ethers.AbstractSigner {
|
|
|
20
39
|
*/
|
|
21
40
|
connect(provider: null | ethers.Provider): Signer;
|
|
22
41
|
/**
|
|
23
|
-
* Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.
|
|
42
|
+
* Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.
|
|
24
43
|
* @param {ethers.TransactionRequest} tx The transaction to sign.
|
|
25
44
|
* @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
|
|
26
45
|
*/
|
|
@@ -48,3 +67,4 @@ export declare class Signer extends ethers.AbstractSigner {
|
|
|
48
67
|
*/
|
|
49
68
|
private signBlob;
|
|
50
69
|
}
|
|
70
|
+
export {};
|
package/dist/src/ethers/index.js
CHANGED
|
@@ -10,7 +10,7 @@ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (
|
|
|
10
10
|
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
11
11
|
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
12
12
|
};
|
|
13
|
-
var _Signer_address, _Signer_key, _Signer_signerSession;
|
|
13
|
+
var _Signer_instances, _Signer_address, _Signer_key, _Signer_signerSession, _Signer_onMfaPoll, _Signer_mfaPollIntervalMs, _Signer_managementSession, _Signer_handleMfa;
|
|
14
14
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
15
|
exports.Signer = void 0;
|
|
16
16
|
const ethers_1 = require("ethers");
|
|
@@ -19,20 +19,39 @@ const ethers_1 = require("ethers");
|
|
|
19
19
|
*/
|
|
20
20
|
class Signer extends ethers_1.ethers.AbstractSigner {
|
|
21
21
|
/** Create new Signer instance
|
|
22
|
-
* @param {string} address The address of the account to use.
|
|
22
|
+
* @param {KeyInfo | string} address The key or the eth address of the account to use.
|
|
23
23
|
* @param {SignerSession} signerSession The underlying Signer session.
|
|
24
|
-
* @param {
|
|
24
|
+
* @param {SignerOptions} options The options to use for the Signer instance
|
|
25
25
|
*/
|
|
26
|
-
constructor(address, signerSession,
|
|
27
|
-
super(provider);
|
|
26
|
+
constructor(address, signerSession, options) {
|
|
27
|
+
super(options?.provider);
|
|
28
|
+
_Signer_instances.add(this);
|
|
28
29
|
/** The address of the account */
|
|
29
30
|
_Signer_address.set(this, void 0);
|
|
30
31
|
/** The key to use for signing */
|
|
31
32
|
_Signer_key.set(this, void 0);
|
|
32
33
|
/** The underlying session */
|
|
33
34
|
_Signer_signerSession.set(this, void 0);
|
|
34
|
-
|
|
35
|
+
/**
|
|
36
|
+
* The function to call when MFA information is retrieved. If this callback
|
|
37
|
+
* throws, no transaction is broadcast.
|
|
38
|
+
*/
|
|
39
|
+
_Signer_onMfaPoll.set(this, void 0);
|
|
40
|
+
/** The amount of time to wait between checks for MFA updates */
|
|
41
|
+
_Signer_mfaPollIntervalMs.set(this, void 0);
|
|
42
|
+
/** Optional management session, used for MFA flows */
|
|
43
|
+
_Signer_managementSession.set(this, void 0);
|
|
44
|
+
if (typeof address === "string") {
|
|
45
|
+
__classPrivateFieldSet(this, _Signer_address, address, "f");
|
|
46
|
+
}
|
|
47
|
+
else {
|
|
48
|
+
__classPrivateFieldSet(this, _Signer_address, address.materialId, "f");
|
|
49
|
+
__classPrivateFieldSet(this, _Signer_key, address, "f");
|
|
50
|
+
}
|
|
35
51
|
__classPrivateFieldSet(this, _Signer_signerSession, signerSession, "f");
|
|
52
|
+
__classPrivateFieldSet(this, _Signer_onMfaPoll, options?.onMfaPoll ?? (( /* _mfaInfo: MfaRequestInfo */) => { }), "f"); // eslint-disable-line @typescript-eslint/no-empty-function
|
|
53
|
+
__classPrivateFieldSet(this, _Signer_mfaPollIntervalMs, options?.mfaPollIntervalMs ?? 1000, "f");
|
|
54
|
+
__classPrivateFieldSet(this, _Signer_managementSession, options?.managementSession, "f");
|
|
36
55
|
}
|
|
37
56
|
/** Resolves to the signer address. */
|
|
38
57
|
async getAddress() {
|
|
@@ -44,10 +63,10 @@ class Signer extends ethers_1.ethers.AbstractSigner {
|
|
|
44
63
|
* @return {Signer} The signer connected to signer.
|
|
45
64
|
*/
|
|
46
65
|
connect(provider) {
|
|
47
|
-
return new Signer(__classPrivateFieldGet(this, _Signer_address, "f"), __classPrivateFieldGet(this, _Signer_signerSession, "f"), provider);
|
|
66
|
+
return new Signer(__classPrivateFieldGet(this, _Signer_address, "f"), __classPrivateFieldGet(this, _Signer_signerSession, "f"), { provider });
|
|
48
67
|
}
|
|
49
68
|
/**
|
|
50
|
-
* Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.
|
|
69
|
+
* Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.
|
|
51
70
|
* @param {ethers.TransactionRequest} tx The transaction to sign.
|
|
52
71
|
* @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
|
|
53
72
|
*/
|
|
@@ -70,8 +89,9 @@ class Signer extends ethers_1.ethers.AbstractSigner {
|
|
|
70
89
|
chain_id: Number(chainId),
|
|
71
90
|
tx: rpcTx,
|
|
72
91
|
};
|
|
73
|
-
const
|
|
74
|
-
|
|
92
|
+
const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEvm(__classPrivateFieldGet(this, _Signer_address, "f"), req);
|
|
93
|
+
const data = await __classPrivateFieldGet(this, _Signer_instances, "m", _Signer_handleMfa).call(this, res);
|
|
94
|
+
return data.rlp_signed_tx;
|
|
75
95
|
}
|
|
76
96
|
/** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)
|
|
77
97
|
* to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.
|
|
@@ -106,17 +126,39 @@ class Signer extends ethers_1.ethers.AbstractSigner {
|
|
|
106
126
|
};
|
|
107
127
|
// Get the key corresponding to this address
|
|
108
128
|
if (__classPrivateFieldGet(this, _Signer_key, "f") === undefined) {
|
|
109
|
-
const key = (await __classPrivateFieldGet(this, _Signer_signerSession, "f").keys()).find((k) => k.
|
|
129
|
+
const key = (await __classPrivateFieldGet(this, _Signer_signerSession, "f").keys()).find((k) => k.material_id === __classPrivateFieldGet(this, _Signer_address, "f"));
|
|
110
130
|
if (key === undefined) {
|
|
111
131
|
throw new Error(`Cannot access key '${__classPrivateFieldGet(this, _Signer_address, "f")}'`);
|
|
112
132
|
}
|
|
113
133
|
__classPrivateFieldSet(this, _Signer_key, key, "f");
|
|
114
134
|
}
|
|
115
|
-
|
|
116
|
-
const
|
|
117
|
-
return
|
|
135
|
+
const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signBlob(__classPrivateFieldGet(this, _Signer_key, "f").key_id, blobReq);
|
|
136
|
+
const data = await __classPrivateFieldGet(this, _Signer_instances, "m", _Signer_handleMfa).call(this, res);
|
|
137
|
+
return data.signature;
|
|
118
138
|
}
|
|
119
139
|
}
|
|
120
140
|
exports.Signer = Signer;
|
|
121
|
-
_Signer_address = new WeakMap(), _Signer_key = new WeakMap(), _Signer_signerSession = new WeakMap()
|
|
122
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/ethers/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAQgB;AAIhB;;GAEG;AACH,MAAa,MAAO,SAAQ,eAAM,CAAC,cAAc;IAU/C;;;;OAIG;IACH,YAAY,OAAe,EAAE,aAA4B,EAAE,QAAiC;QAC1F,KAAK,CAAC,QAAQ,CAAC,CAAC;QAflB,iCAAiC;QACxB,kCAAiB;QAE1B,iCAAiC;QACjC,8BAAW;QAEX,6BAA6B;QACpB,wCAA8B;QASrC,uBAAA,IAAI,mBAAY,OAAO,MAAA,CAAC;QACxB,uBAAA,IAAI,yBAAkB,aAAa,MAAA,CAAC;IACtC,CAAC;IAED,sCAAsC;IACtC,KAAK,CAAC,UAAU;QACd,OAAO,uBAAA,IAAI,uBAAS,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACH,OAAO,CAAC,QAAgC;QACtC,OAAO,IAAI,MAAM,CAAC,uBAAA,IAAI,uBAAS,EAAE,uBAAA,IAAI,6BAAe,EAAE,QAAQ,CAAC,CAAC;IAClE,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe,CAAC,EAA6B;QACjD,0CAA0C;QAC1C,IAAI,OAAO,GAAG,EAAE,CAAC,OAAO,CAAC;QACzB,IAAI,OAAO,KAAK,SAAS,EAAE;YACzB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,UAAU,EAAE,CAAC;YAClD,OAAO,GAAG,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,GAAG,CAAC;SAC/C;QAED,sDAAsD;QACtD,MAAM,KAAK,GACT,IAAI,CAAC,QAAQ,YAAY,2BAAkB;YACzC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACrC,CAAC,CAAC,gDAAgD;gBAChD,iDAAiD;gBACjD,0CAA0C;gBAC1C,2BAAkB,CAAC,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACpE,KAAK,CAAC,IAAI,GAAG,IAAA,gBAAO,EAAC,EAAE,CAAC,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,qBAAqB;QAE/D,MAAM,GAAG,GAAmB;YAC1B,QAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;YACzB,EAAE,EAAE,KAAK;SACV,CAAC;QACF,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,OAAO,GAAG,CAAC,IAAI,EAAE,CAAC,aAAa,CAAC;IAClC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,WAAW,CAAC,OAA4B;QAC5C,MAAM,MAAM,GAAG,eAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAC3C,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,aAAa,CACjB,MAAuB,EACvB,KAA4C,EAC5C,KAA0B;QAE1B,MAAM,MAAM,GAAG,yBAAgB,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC;QAC3D,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,QAAQ,CAAC,MAAc;QACnC,MAAM,OAAO,GAAoB;YAC/B,cAAc,EAAE,MAAM,CAAC,IAAI,CAAC,IAAA,iBAAQ,EAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;SACjE,CAAC;QACF,4CAA4C;QAC5C,IAAI,uBAAA,IAAI,mBAAK,KAAK,SAAS,EAAE;YAC3B,MAAM,GAAG,GAAG,CAAC,MAAM,uBAAA,IAAI,6BAAe,CAAC,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,UAAU,KAAK,uBAAA,IAAI,uBAAS,CAAC,CAAC;YAC3F,IAAI,GAAG,KAAK,SAAS,EAAE;gBACrB,MAAM,IAAI,KAAK,CAAC,sBAAsB,uBAAA,IAAI,uBAAS,GAAG,CAAC,CAAC;aACzD;YACD,uBAAA,IAAI,eAAQ,GAAG,MAAA,CAAC;SACjB;QACD,OAAO;QACP,MAAM,MAAM,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,QAAQ,CAAC,uBAAA,IAAI,mBAAK,EAAE,OAAO,CAAC,CAAC;QACtE,OAAO,MAAM,CAAC,IAAI,EAAE,CAAC,SAAS,CAAC;IACjC,CAAC;CACF;AAnHD,wBAmHC","sourcesContent":["import {\n  JsonRpcApiProvider,\n  TypedDataDomain,\n  TypedDataEncoder,\n  TypedDataField,\n  ethers,\n  getBytes,\n  toBeHex,\n} from \"ethers\";\nimport { BlobSignRequest, EvmSignRequest, SignerSession } from \"../signer_session\";\nimport { Key } from \"../key\";\n\n/**\n * A ethers.js Signer using CubeSigner\n */\nexport class Signer extends ethers.AbstractSigner {\n  /** The address of the account */\n  readonly #address: string;\n\n  /** The key to use for signing */\n  #key?: Key;\n\n  /** The underlying session */\n  readonly #signerSession: SignerSession;\n\n  /** Create new Signer instance\n   * @param {string} address The address of the account to use.\n   * @param {SignerSession} signerSession The underlying Signer session.\n   * @param {null | ethers.Provider} provider The optional provider instance to use.\n   */\n  constructor(address: string, signerSession: SignerSession, provider?: null | ethers.Provider) {\n    super(provider);\n    this.#address = address;\n    this.#signerSession = signerSession;\n  }\n\n  /** Resolves to the signer address. */\n  async getAddress(): Promise<string> {\n    return this.#address;\n  }\n\n  /**\n   *  Returns the signer connected to %%provider%%.\n   *  @param {null | ethers.Provider} provider The optional provider instance to use.\n   *  @return {Signer} The signer connected to signer.\n   */\n  connect(provider: null | ethers.Provider): Signer {\n    return new Signer(this.#address, this.#signerSession, provider);\n  }\n\n  /**\n   * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set.\n   * @param {ethers.TransactionRequest} tx The transaction to sign.\n   * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.\n   */\n  async signTransaction(tx: ethers.TransactionRequest): Promise<string> {\n    // get the chain id from the network or tx\n    let chainId = tx.chainId;\n    if (chainId === undefined) {\n      const network = await this.provider?.getNetwork();\n      chainId = network?.chainId?.toString() ?? \"1\";\n    }\n\n    // Convert the transaction into a JSON-RPC transaction\n    const rpcTx =\n      this.provider instanceof JsonRpcApiProvider\n        ? this.provider.getRpcTransaction(tx)\n        : // We can just call the getRpcTransaction with a\n          // null receiver since it doesn't actually use it\n          // (and really should be declared static).\n          JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);\n    rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]\n\n    const req = <EvmSignRequest>{\n      chain_id: Number(chainId),\n      tx: rpcTx,\n    };\n    const sig = await this.#signerSession.signEvm(this.#address, req);\n    return sig.data().rlp_signed_tx;\n  }\n\n  /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)\n   * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {string | Uint8Array} message The message to sign.\n   * @return {Promise<string>} The signature.\n   */\n  async signMessage(message: string | Uint8Array): Promise<string> {\n    const digest = ethers.hashMessage(message);\n    return this.signBlob(digest);\n  }\n\n  /** Signs EIP-712 typed data. This uses ethers.js's\n   * [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)\n   * to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {TypedDataDomain} domain The domain of the typed data.\n   * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.\n   * @param {Record<string, any>} value The value of the typed data.\n   * @return {Promise<string>} The signature.\n   */\n  async signTypedData(\n    domain: TypedDataDomain,\n    types: Record<string, Array<TypedDataField>>,\n    value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any\n  ): Promise<string> {\n    const digest = TypedDataEncoder.hash(domain, types, value);\n    return this.signBlob(digest);\n  }\n\n  /** Sign arbitrary digest. This uses {@link Key#signBlob}.\n   * @param {string} digest The digest to sign.\n   * @return {Promise<string>} The signature.\n   */\n  private async signBlob(digest: string): Promise<string> {\n    const blobReq = <BlobSignRequest>{\n      message_base64: Buffer.from(getBytes(digest)).toString(\"base64\"),\n    };\n    // Get the key corresponding to this address\n    if (this.#key === undefined) {\n      const key = (await this.#signerSession.keys()).find((k) => k.materialId === this.#address);\n      if (key === undefined) {\n        throw new Error(`Cannot access key '${this.#address}'`);\n      }\n      this.#key = key;\n    }\n    // sign\n    const result = await this.#signerSession.signBlob(this.#key, blobReq);\n    return result.data().signature;\n  }\n}\n"]}
|
|
141
|
+
_Signer_address = new WeakMap(), _Signer_key = new WeakMap(), _Signer_signerSession = new WeakMap(), _Signer_onMfaPoll = new WeakMap(), _Signer_mfaPollIntervalMs = new WeakMap(), _Signer_managementSession = new WeakMap(), _Signer_instances = new WeakSet(), _Signer_handleMfa =
|
|
142
|
+
/**
|
|
143
|
+
* If the sign request requires MFA, this method waits for approvals
|
|
144
|
+
*
|
|
145
|
+
* @param {SignResponse<U>} res The response of a sign request
|
|
146
|
+
* @return {Promise<U>} The sign data after MFA approvals
|
|
147
|
+
*/
|
|
148
|
+
async function _Signer_handleMfa(res) {
|
|
149
|
+
while (res.requiresMfa()) {
|
|
150
|
+
await new Promise((resolve) => setTimeout(resolve, __classPrivateFieldGet(this, _Signer_mfaPollIntervalMs, "f")));
|
|
151
|
+
const mfaId = res.mfaId();
|
|
152
|
+
const mfaInfo = await __classPrivateFieldGet(this, _Signer_signerSession, "f").getMfaInfo(__classPrivateFieldGet(this, _Signer_managementSession, "f"), mfaId);
|
|
153
|
+
__classPrivateFieldGet(this, _Signer_onMfaPoll, "f").call(this, mfaInfo);
|
|
154
|
+
if (mfaInfo.receipt) {
|
|
155
|
+
res = await res.signWithMfaApproval({
|
|
156
|
+
mfaId,
|
|
157
|
+
mfaOrgId: __classPrivateFieldGet(this, _Signer_signerSession, "f").orgId,
|
|
158
|
+
mfaConf: mfaInfo.receipt.confirmation,
|
|
159
|
+
});
|
|
160
|
+
}
|
|
161
|
+
}
|
|
162
|
+
return res.data();
|
|
163
|
+
};
|
|
164
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/ethers/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAQgB;AA6BhB;;GAEG;AACH,MAAa,MAAO,SAAQ,eAAM,CAAC,cAAc;IAsB/C;;;;OAIG;IACH,YAAY,OAAyB,EAAE,aAA4B,EAAE,OAAuB;QAC1F,KAAK,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;;QA3B3B,iCAAiC;QACxB,kCAAiB;QAE1B,iCAAiC;QACjC,8BAAe;QAEf,6BAA6B;QACpB,wCAA8B;QAEvC;;;WAGG;QACM,oCAA2C;QAEpD,gEAAgE;QACvD,4CAA2B;QAEpC,sDAAsD;QAC7C,4CAAgC;QASvC,IAAI,OAAO,OAAO,KAAK,QAAQ,EAAE;YAC/B,uBAAA,IAAI,mBAAY,OAAO,MAAA,CAAC;SACzB;aAAM;YACL,uBAAA,IAAI,mBAAY,OAAO,CAAC,UAAU,MAAA,CAAC;YACnC,uBAAA,IAAI,eAAQ,OAAkB,MAAA,CAAC;SAChC;QACD,uBAAA,IAAI,yBAAkB,aAAa,MAAA,CAAC;QACpC,uBAAA,IAAI,qBAAc,OAAO,EAAE,SAAS,IAAI,CAAC,EAAC,8BAA8B,EAAE,EAAE,GAAE,CAAC,CAAC,MAAA,CAAC,CAAC,2DAA2D;QAC7I,uBAAA,IAAI,6BAAsB,OAAO,EAAE,iBAAiB,IAAI,IAAI,MAAA,CAAC;QAC7D,uBAAA,IAAI,6BAAsB,OAAO,EAAE,iBAAiB,MAAA,CAAC;IACvD,CAAC;IAED,sCAAsC;IACtC,KAAK,CAAC,UAAU;QACd,OAAO,uBAAA,IAAI,uBAAS,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACH,OAAO,CAAC,QAAgC;QACtC,OAAO,IAAI,MAAM,CAAC,uBAAA,IAAI,uBAAS,EAAE,uBAAA,IAAI,6BAAe,EAAE,EAAE,QAAQ,EAAE,CAAC,CAAC;IACtE,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe,CAAC,EAA6B;QACjD,0CAA0C;QAC1C,IAAI,OAAO,GAAG,EAAE,CAAC,OAAO,CAAC;QACzB,IAAI,OAAO,KAAK,SAAS,EAAE;YACzB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,UAAU,EAAE,CAAC;YAClD,OAAO,GAAG,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,GAAG,CAAC;SAC/C;QAED,sDAAsD;QACtD,MAAM,KAAK,GACT,IAAI,CAAC,QAAQ,YAAY,2BAAkB;YACzC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACrC,CAAC,CAAC,gDAAgD;gBAChD,iDAAiD;gBACjD,0CAA0C;gBAC1C,2BAAkB,CAAC,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACpE,KAAK,CAAC,IAAI,GAAG,IAAA,gBAAO,EAAC,EAAE,CAAC,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,qBAAqB;QAE/D,MAAM,GAAG,GAAmB;YAC1B,QAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;YACzB,EAAE,EAAE,KAAK;SACV,CAAC;QAEF,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,aAAa,CAAC;IAC5B,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,WAAW,CAAC,OAA4B;QAC5C,MAAM,MAAM,GAAG,eAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAC3C,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,aAAa,CACjB,MAAuB,EACvB,KAA4C,EAC5C,KAA0B;QAE1B,MAAM,MAAM,GAAG,yBAAgB,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC;QAC3D,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,QAAQ,CAAC,MAAc;QACnC,MAAM,OAAO,GAAoB;YAC/B,cAAc,EAAE,MAAM,CAAC,IAAI,CAAC,IAAA,iBAAQ,EAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;SACjE,CAAC;QACF,4CAA4C;QAC5C,IAAI,uBAAA,IAAI,mBAAK,KAAK,SAAS,EAAE;YAC3B,MAAM,GAAG,GAAG,CAAC,MAAM,uBAAA,IAAI,6BAAe,CAAC,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,WAAW,KAAK,uBAAA,IAAI,uBAAS,CAAC,CAAC;YAC5F,IAAI,GAAG,KAAK,SAAS,EAAE;gBACrB,MAAM,IAAI,KAAK,CAAC,sBAAsB,uBAAA,IAAI,uBAAS,GAAG,CAAC,CAAC;aACzD;YACD,uBAAA,IAAI,eAAQ,GAAG,MAAA,CAAC;SACjB;QAED,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,QAAQ,CAAC,uBAAA,IAAI,mBAAK,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;QAC1E,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,SAAS,CAAC;IACxB,CAAC;CAyBF;AAlKD,wBAkKC;;AAvBC;;;;;GAKG;AACH,KAAK,4BAAe,GAAoB;IACtC,OAAO,GAAG,CAAC,WAAW,EAAE,EAAE;QACxB,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,uBAAA,IAAI,iCAAmB,CAAC,CAAC,CAAC;QAE7E,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,EAAE,CAAC;QAC1B,MAAM,OAAO,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,UAAU,CAAC,uBAAA,IAAI,iCAAoB,EAAE,KAAK,CAAC,CAAC;QACtF,uBAAA,IAAI,yBAAW,MAAf,IAAI,EAAY,OAAO,CAAC,CAAC;QACzB,IAAI,OAAO,CAAC,OAAO,EAAE;YACnB,GAAG,GAAG,MAAM,GAAG,CAAC,mBAAmB,CAAC;gBAClC,KAAK;gBACL,QAAQ,EAAE,uBAAA,IAAI,6BAAe,CAAC,KAAK;gBACnC,OAAO,EAAE,OAAO,CAAC,OAAO,CAAC,YAAY;aACtC,CAAC,CAAC;SACJ;KACF;IACD,OAAO,GAAG,CAAC,IAAI,EAAE,CAAC;AACpB,CAAC","sourcesContent":["import {\n  JsonRpcApiProvider,\n  TypedDataDomain,\n  TypedDataEncoder,\n  TypedDataField,\n  ethers,\n  getBytes,\n  toBeHex,\n} from \"ethers\";\nimport {\n  BlobSignRequest,\n  EvmSignRequest,\n  MfaRequestInfo,\n  SignerSession,\n  SignResponse,\n} from \"../signer_session\";\nimport { KeyInfo } from \"../key\";\nimport { CubeSigner } from \"..\";\n\n/** Options for the signer */\ninterface SignerOptions {\n  /** Optional provider to use */\n  provider?: null | ethers.Provider;\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  onMfaPoll?: (arg0: MfaRequestInfo) => void;\n  /**\n   * The amount of time (in milliseconds) to wait between checks for MFA\n   * updates. Default is 1000ms\n   */\n  mfaPollIntervalMs?: number;\n  /** Optional management session. Used to check for MFA updates */\n  managementSession?: CubeSigner;\n}\n\n/**\n * A ethers.js Signer using CubeSigner\n */\nexport class Signer extends ethers.AbstractSigner {\n  /** The address of the account */\n  readonly #address: string;\n\n  /** The key to use for signing */\n  #key?: KeyInfo;\n\n  /** The underlying session */\n  readonly #signerSession: SignerSession;\n\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  readonly #onMfaPoll: (arg0: MfaRequestInfo) => void;\n\n  /** The amount of time to wait between checks for MFA updates */\n  readonly #mfaPollIntervalMs: number;\n\n  /** Optional management session, used for MFA flows */\n  readonly #managementSession?: CubeSigner;\n\n  /** Create new Signer instance\n   * @param {KeyInfo | string} address The key or the eth address of the account to use.\n   * @param {SignerSession} signerSession The underlying Signer session.\n   * @param {SignerOptions} options The options to use for the Signer instance\n   */\n  constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions) {\n    super(options?.provider);\n    if (typeof address === \"string\") {\n      this.#address = address;\n    } else {\n      this.#address = address.materialId;\n      this.#key = address as KeyInfo;\n    }\n    this.#signerSession = signerSession;\n    this.#onMfaPoll = options?.onMfaPoll ?? ((/* _mfaInfo: MfaRequestInfo */) => {}); // eslint-disable-line @typescript-eslint/no-empty-function\n    this.#mfaPollIntervalMs = options?.mfaPollIntervalMs ?? 1000;\n    this.#managementSession = options?.managementSession;\n  }\n\n  /** Resolves to the signer address. */\n  async getAddress(): Promise<string> {\n    return this.#address;\n  }\n\n  /**\n   *  Returns the signer connected to %%provider%%.\n   *  @param {null | ethers.Provider} provider The optional provider instance to use.\n   *  @return {Signer} The signer connected to signer.\n   */\n  connect(provider: null | ethers.Provider): Signer {\n    return new Signer(this.#address, this.#signerSession, { provider });\n  }\n\n  /**\n   * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.\n   * @param {ethers.TransactionRequest} tx The transaction to sign.\n   * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.\n   */\n  async signTransaction(tx: ethers.TransactionRequest): Promise<string> {\n    // get the chain id from the network or tx\n    let chainId = tx.chainId;\n    if (chainId === undefined) {\n      const network = await this.provider?.getNetwork();\n      chainId = network?.chainId?.toString() ?? \"1\";\n    }\n\n    // Convert the transaction into a JSON-RPC transaction\n    const rpcTx =\n      this.provider instanceof JsonRpcApiProvider\n        ? this.provider.getRpcTransaction(tx)\n        : // We can just call the getRpcTransaction with a\n          // null receiver since it doesn't actually use it\n          // (and really should be declared static).\n          JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);\n    rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]\n\n    const req = <EvmSignRequest>{\n      chain_id: Number(chainId),\n      tx: rpcTx,\n    };\n\n    const res = await this.#signerSession.signEvm(this.#address, req);\n    const data = await this.#handleMfa(res);\n    return data.rlp_signed_tx;\n  }\n\n  /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)\n   * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {string | Uint8Array} message The message to sign.\n   * @return {Promise<string>} The signature.\n   */\n  async signMessage(message: string | Uint8Array): Promise<string> {\n    const digest = ethers.hashMessage(message);\n    return this.signBlob(digest);\n  }\n\n  /** Signs EIP-712 typed data. This uses ethers.js's\n   * [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)\n   * to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {TypedDataDomain} domain The domain of the typed data.\n   * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.\n   * @param {Record<string, any>} value The value of the typed data.\n   * @return {Promise<string>} The signature.\n   */\n  async signTypedData(\n    domain: TypedDataDomain,\n    types: Record<string, Array<TypedDataField>>,\n    value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any\n  ): Promise<string> {\n    const digest = TypedDataEncoder.hash(domain, types, value);\n    return this.signBlob(digest);\n  }\n\n  /** Sign arbitrary digest. This uses {@link Key#signBlob}.\n   * @param {string} digest The digest to sign.\n   * @return {Promise<string>} The signature.\n   */\n  private async signBlob(digest: string): Promise<string> {\n    const blobReq = <BlobSignRequest>{\n      message_base64: Buffer.from(getBytes(digest)).toString(\"base64\"),\n    };\n    // Get the key corresponding to this address\n    if (this.#key === undefined) {\n      const key = (await this.#signerSession.keys()).find((k) => k.material_id === this.#address);\n      if (key === undefined) {\n        throw new Error(`Cannot access key '${this.#address}'`);\n      }\n      this.#key = key;\n    }\n\n    const res = await this.#signerSession.signBlob(this.#key.key_id, blobReq);\n    const data = await this.#handleMfa(res);\n    return data.signature;\n  }\n\n  /**\n   * If the sign request requires MFA, this method waits for approvals\n   *\n   * @param {SignResponse<U>} res The response of a sign request\n   * @return {Promise<U>} The sign data after MFA approvals\n   */\n  async #handleMfa<U>(res: SignResponse<U>): Promise<U> {\n    while (res.requiresMfa()) {\n      await new Promise((resolve) => setTimeout(resolve, this.#mfaPollIntervalMs));\n\n      const mfaId = res.mfaId();\n      const mfaInfo = await this.#signerSession.getMfaInfo(this.#managementSession!, mfaId);\n      this.#onMfaPoll(mfaInfo);\n      if (mfaInfo.receipt) {\n        res = await res.signWithMfaApproval({\n          mfaId,\n          mfaOrgId: this.#signerSession.orgId,\n          mfaConf: mfaInfo.receipt.confirmation,\n        });\n      }\n    }\n    return res.data();\n  }\n}\n"]}
|
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
import { CubeSigner, MfaRequestInfo, SignerSession } from ".";
|
|
2
|
+
import { components } from "./schema";
|
|
3
|
+
export type ApiAddFidoChallenge = components["responses"]["FidoCreateChallengeResponse"]["content"]["application/json"];
|
|
4
|
+
export type ApiMfaFidoChallenge = components["responses"]["FidoAssertChallenge"]["content"]["application/json"];
|
|
5
|
+
export type PublicKeyCredentialCreationOptions = components["schemas"]["PublicKeyCredentialCreationOptions"];
|
|
6
|
+
export type PublicKeyCredentialRequestOptions = components["schemas"]["PublicKeyCredentialRequestOptions"];
|
|
7
|
+
export type PublicKeyCredentialParameters = components["schemas"]["PublicKeyCredentialParameters"];
|
|
8
|
+
export type PublicKeyCredentialDescriptor = components["schemas"]["PublicKeyCredentialDescriptor"];
|
|
9
|
+
export type AuthenticatorSelectionCriteria = components["schemas"]["AuthenticatorSelectionCriteria"];
|
|
10
|
+
export type PublicKeyCredentialUserEntity = components["schemas"]["PublicKeyCredentialUserEntity"];
|
|
11
|
+
export type PublicKeyCredential = components["schemas"]["PublicKeyCredential"];
|
|
12
|
+
/**
|
|
13
|
+
* Returned after creating a request to add a new FIDO device.
|
|
14
|
+
* Provides some helper methods for answering this challenge.
|
|
15
|
+
*/
|
|
16
|
+
export declare class AddFidoChallenge {
|
|
17
|
+
#private;
|
|
18
|
+
readonly challengeId: string;
|
|
19
|
+
readonly options: any;
|
|
20
|
+
/**
|
|
21
|
+
* Constructor
|
|
22
|
+
* @param {CubeSigner} cs CubeSigner instance used to request to add a FIDO device
|
|
23
|
+
* @param {ApiAddFidoChallenge} challenge The challenge returned by the remote end.
|
|
24
|
+
*/
|
|
25
|
+
constructor(cs: CubeSigner, challenge: ApiAddFidoChallenge);
|
|
26
|
+
/**
|
|
27
|
+
* Answers this challenge by using the `CredentialsContainer` API to create a credential
|
|
28
|
+
* based on the the public key credential creation options from this challenge.
|
|
29
|
+
*/
|
|
30
|
+
createCredentialAndAnswer(): Promise<void>;
|
|
31
|
+
/**
|
|
32
|
+
* Answers this challenge using a given credential `cred`;
|
|
33
|
+
* the credential should be obtained by calling
|
|
34
|
+
*
|
|
35
|
+
* ```
|
|
36
|
+
* const cred = await navigator.credentials.create({ publicKey: this.options });
|
|
37
|
+
* ```
|
|
38
|
+
*
|
|
39
|
+
* @param {any} cred Credential created by calling the `CredentialContainer`'s `create` method
|
|
40
|
+
* based on the public key creation options from this challenge.
|
|
41
|
+
*/
|
|
42
|
+
answer(cred: any): Promise<void>;
|
|
43
|
+
}
|
|
44
|
+
/**
|
|
45
|
+
* Returned after initiating MFA approval using FIDO.
|
|
46
|
+
* Provides some helper methods for answering this challenge.
|
|
47
|
+
*/
|
|
48
|
+
export declare class MfaFidoChallenge {
|
|
49
|
+
#private;
|
|
50
|
+
readonly mfaId: string;
|
|
51
|
+
readonly challengeId: string;
|
|
52
|
+
readonly options: any;
|
|
53
|
+
/**
|
|
54
|
+
* @param {SignerSession} ss The session used to initiate MFA approval using FIDO
|
|
55
|
+
* @param {string} mfaId The MFA request id.
|
|
56
|
+
* @param {ApiMfaFidoChallenge} challenge The challenge returned by the remote end
|
|
57
|
+
*/
|
|
58
|
+
constructor(ss: SignerSession, mfaId: string, challenge: ApiMfaFidoChallenge);
|
|
59
|
+
/**
|
|
60
|
+
* Answers this challenge by using the `CredentialsContainer` API to get a credential
|
|
61
|
+
* based on the the public key credential request options from this challenge.
|
|
62
|
+
*/
|
|
63
|
+
createCredentialAndAnswer(): Promise<MfaRequestInfo>;
|
|
64
|
+
/**
|
|
65
|
+
* Answers this challenge using a given credential `cred`.
|
|
66
|
+
* To obtain this credential, for example, call
|
|
67
|
+
*
|
|
68
|
+
* ```
|
|
69
|
+
* const cred = await navigator.credentials.get({ publicKey: this.options });
|
|
70
|
+
* ```
|
|
71
|
+
*
|
|
72
|
+
* @param {any} cred Credential created by calling the `CredentialContainer`'s `get` method
|
|
73
|
+
* based on the public key credential request options from this challenge.
|
|
74
|
+
*/
|
|
75
|
+
answer(cred: any): Promise<MfaRequestInfo>;
|
|
76
|
+
}
|