@cubist-labs/cubesigner-sdk 0.1.50 → 0.1.77
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +66 -13
- package/dist/src/ethers/index.js +8 -3
- package/dist/src/fido.d.ts +76 -0
- package/dist/src/fido.js +148 -0
- package/dist/src/index.d.ts +105 -9
- package/dist/src/index.js +260 -33
- package/dist/src/key.d.ts +9 -3
- package/dist/src/key.js +18 -9
- package/dist/src/org.d.ts +33 -9
- package/dist/src/org.js +68 -35
- package/dist/src/paginator.d.ts +76 -0
- package/dist/src/paginator.js +99 -0
- package/dist/src/role.d.ts +1 -1
- package/dist/src/role.js +3 -3
- package/dist/src/schema.d.ts +1326 -506
- package/dist/src/schema.js +1 -1
- package/dist/src/session/session_manager.js +2 -2
- package/dist/src/session/session_storage.js +1 -1
- package/dist/src/session/signer_session_manager.d.ts +2 -0
- package/dist/src/session/signer_session_manager.js +4 -2
- package/dist/src/signer_session.d.ts +104 -18
- package/dist/src/signer_session.js +138 -46
- package/dist/src/util.d.ts +20 -0
- package/dist/src/util.js +31 -2
- package/package.json +9 -7
- package/src/ethers/index.ts +7 -2
- package/src/fido.ts +166 -0
- package/src/index.ts +277 -36
- package/src/key.ts +12 -3
- package/src/org.ts +103 -56
- package/src/paginator.ts +122 -0
- package/src/role.ts +3 -3
- package/src/schema.ts +1326 -505
- package/src/session/session_manager.ts +1 -1
- package/src/session/session_storage.ts +1 -1
- package/src/session/signer_session_manager.ts +5 -1
- package/src/signer_session.ts +212 -44
- package/src/util.ts +41 -0
package/README.md
CHANGED
|
@@ -113,7 +113,8 @@ transaction. For that, we need a key of type `Secp256k1.Evm`.
|
|
|
113
113
|
const secpKey = await org.createKey(cs.Secp256k1.Evm);
|
|
114
114
|
assert((await secpKey.owner()) == me.user_id);
|
|
115
115
|
assert(await secpKey.enabled());
|
|
116
|
-
|
|
116
|
+
assert(await secpKey.type(), cs.Secp256k1.Evm);
|
|
117
|
+
console.log(`Created '${cs.Secp256k1.Evm}' key ${secpKey.id}`);
|
|
117
118
|
```
|
|
118
119
|
|
|
119
120
|
### Create a `Role` and a `SignerSession`
|
|
@@ -351,12 +352,29 @@ export the underlying token:
|
|
|
351
352
|
const oidcToken = await cubesigner.sessionMgr!.token();
|
|
352
353
|
```
|
|
353
354
|
|
|
354
|
-
|
|
355
|
-
|
|
356
|
-
`signEvm`)
|
|
355
|
+
Before we can use the OIDC token for authentication, we must add an org policy
|
|
356
|
+
to allow the particular issuer/audience pair from the token.
|
|
357
357
|
|
|
358
358
|
```typescript
|
|
359
|
-
const
|
|
359
|
+
const oldOrgPolicy = await org.policy();
|
|
360
|
+
const oidcPayload = JSON.parse(atob(oidcToken.split(".")[1].replace(/-/g, "+").replace(/_/g, "/")));
|
|
361
|
+
const oidcAuthSourcesPolicy = {
|
|
362
|
+
OidcAuthSources: {
|
|
363
|
+
[oidcPayload.iss]: [oidcPayload.aud],
|
|
364
|
+
},
|
|
365
|
+
};
|
|
366
|
+
console.log("Setting org policy", oidcAuthSourcesPolicy);
|
|
367
|
+
await org.setPolicy([oidcAuthSourcesPolicy]);
|
|
368
|
+
```
|
|
369
|
+
|
|
370
|
+
Finally, exchange the OIDC token for either a _signer_ session (i.e., an instance
|
|
371
|
+
of `SignerSession`, required by all signing endpoints, e.g., `signEvm`)
|
|
372
|
+
|
|
373
|
+
```typescript
|
|
374
|
+
const oidcSession = new cs.SignerSession(
|
|
375
|
+
// we'll use this session for both signing and approving MFA request, hence the following scopes
|
|
376
|
+
await cubesigner.oidcAuth(oidcToken, org.id, ["manage:mfa", "sign:*"]),
|
|
377
|
+
);
|
|
360
378
|
```
|
|
361
379
|
|
|
362
380
|
or a _management_ session (i.e., and instance of `CubeSigner`,
|
|
@@ -382,26 +400,56 @@ doesn't matter if that user is native to CubeSigner or a third-party
|
|
|
382
400
|
OIDC user. For that purpose, in this section we are going to use the
|
|
383
401
|
previously created `oidcCubeSigner` instance.
|
|
384
402
|
|
|
385
|
-
To set up TOTP, we call the `
|
|
386
|
-
TOTP
|
|
387
|
-
any) and returns a [TOTP
|
|
388
|
-
url](https://github.com/google/google-authenticator/wiki/Key-Uri-Format).
|
|
403
|
+
To set up TOTP, we first call the `resetTotpStart` method to initiate a
|
|
404
|
+
TOTP reset procedure.
|
|
389
405
|
|
|
390
406
|
```typescript
|
|
391
407
|
console.log(`Setting up TOTP for user ${me.email}`);
|
|
392
|
-
|
|
393
|
-
assert(totpResp.totp_url);
|
|
408
|
+
let totpResetResp = await oidcCubeSigner.resetTotpStart();
|
|
394
409
|
```
|
|
395
410
|
|
|
411
|
+
If the user has already configured TOTP (or any other form of MFA),
|
|
412
|
+
this response will require multi factor authentication. In that case,
|
|
413
|
+
for example, call `approveTotp` and provide the code for the existing
|
|
414
|
+
TOTP to proceed:
|
|
415
|
+
|
|
416
|
+
```typescript
|
|
417
|
+
import { authenticator } from "otplib"; // npm install otplib@12.0.1
|
|
418
|
+
|
|
419
|
+
let totpSecret = process.env["CS_USER_TOTP_SECRET"]!;
|
|
420
|
+
if (totpResetResp.requiresMfa()) {
|
|
421
|
+
console.log("Resetting TOTP requires MFA");
|
|
422
|
+
const code = authenticator.generate(totpSecret);
|
|
423
|
+
totpResetResp = await totpResetResp.approveTotp(oidcSession, code);
|
|
424
|
+
assert(!totpResetResp.requiresMfa());
|
|
425
|
+
console.log("MFA approved using existing TOTP");
|
|
426
|
+
}
|
|
427
|
+
```
|
|
428
|
+
|
|
429
|
+
The response contains a TOTP challenge, i.e., a new TOTP
|
|
430
|
+
configuration in the form of the standard
|
|
431
|
+
[TOTP url](https://github.com/google/google-authenticator/wiki/Key-Uri-Format).
|
|
396
432
|
From that url, we can generate a QR code to present to the user, or
|
|
397
433
|
create an authenticator for automated testing.
|
|
398
434
|
|
|
399
435
|
```typescript
|
|
400
|
-
|
|
436
|
+
const totpChallenge = totpResetResp.data();
|
|
437
|
+
assert(totpChallenge.totpUrl);
|
|
438
|
+
```
|
|
401
439
|
|
|
402
|
-
|
|
440
|
+
To complete the challenge, we must call `resetTotpComplete` and
|
|
441
|
+
provide the TOTP code matching the TOTP configuration from the challenge:
|
|
442
|
+
|
|
443
|
+
```typescript norun
|
|
444
|
+
totpSecret = new URL(totpChallenge.totp_url).searchParams.get("secret");
|
|
403
445
|
assert(totpSecret);
|
|
446
|
+
await totpChallenge.answer(authenticator.generate(totpSecret));
|
|
447
|
+
```
|
|
448
|
+
|
|
449
|
+
After TOTP is configured, we can double check that our authenticator
|
|
450
|
+
is generating the correct code by calling `verifyTotp`
|
|
404
451
|
|
|
452
|
+
```typescript
|
|
405
453
|
console.log(`Verifying current TOTP code`);
|
|
406
454
|
let code = authenticator.generate(totpSecret);
|
|
407
455
|
await oidcCubeSigner.verifyTotp(code);
|
|
@@ -461,6 +509,11 @@ we created.
|
|
|
461
509
|
console.log("Cleaning up");
|
|
462
510
|
await session.sessionMgr.revoke();
|
|
463
511
|
await role.delete();
|
|
512
|
+
|
|
513
|
+
// restore the old policy for the sake of repeatability of this example
|
|
514
|
+
// (normally you'd set your org policies once and leave them be)
|
|
515
|
+
console.log("Restoring org policy", oldOrgPolicy);
|
|
516
|
+
await org.setPolicy(oldOrgPolicy);
|
|
464
517
|
```
|
|
465
518
|
|
|
466
519
|
As of now, deleting keys is not supported.
|
package/dist/src/ethers/index.js
CHANGED
|
@@ -148,12 +148,17 @@ _Signer_address = new WeakMap(), _Signer_key = new WeakMap(), _Signer_signerSess
|
|
|
148
148
|
async function _Signer_handleMfa(res) {
|
|
149
149
|
while (res.requiresMfa()) {
|
|
150
150
|
await new Promise((resolve) => setTimeout(resolve, __classPrivateFieldGet(this, _Signer_mfaPollIntervalMs, "f")));
|
|
151
|
-
const
|
|
151
|
+
const mfaId = res.mfaId();
|
|
152
|
+
const mfaInfo = await __classPrivateFieldGet(this, _Signer_signerSession, "f").getMfaInfo(__classPrivateFieldGet(this, _Signer_managementSession, "f"), mfaId);
|
|
152
153
|
__classPrivateFieldGet(this, _Signer_onMfaPoll, "f").call(this, mfaInfo);
|
|
153
154
|
if (mfaInfo.receipt) {
|
|
154
|
-
res = await res.signWithMfaApproval(
|
|
155
|
+
res = await res.signWithMfaApproval({
|
|
156
|
+
mfaId,
|
|
157
|
+
mfaOrgId: __classPrivateFieldGet(this, _Signer_signerSession, "f").orgId,
|
|
158
|
+
mfaConf: mfaInfo.receipt.confirmation,
|
|
159
|
+
});
|
|
155
160
|
}
|
|
156
161
|
}
|
|
157
162
|
return res.data();
|
|
158
163
|
};
|
|
159
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/ethers/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAQgB;AA6BhB;;GAEG;AACH,MAAa,MAAO,SAAQ,eAAM,CAAC,cAAc;IAsB/C;;;;OAIG;IACH,YAAY,OAAyB,EAAE,aAA4B,EAAE,OAAuB;QAC1F,KAAK,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;;QA3B3B,iCAAiC;QACxB,kCAAiB;QAE1B,iCAAiC;QACjC,8BAAe;QAEf,6BAA6B;QACpB,wCAA8B;QAEvC;;;WAGG;QACM,oCAA2C;QAEpD,gEAAgE;QACvD,4CAA2B;QAEpC,sDAAsD;QAC7C,4CAAgC;QASvC,IAAI,OAAO,OAAO,KAAK,QAAQ,EAAE;YAC/B,uBAAA,IAAI,mBAAY,OAAO,MAAA,CAAC;SACzB;aAAM;YACL,uBAAA,IAAI,mBAAY,OAAO,CAAC,UAAU,MAAA,CAAC;YACnC,uBAAA,IAAI,eAAQ,OAAkB,MAAA,CAAC;SAChC;QACD,uBAAA,IAAI,yBAAkB,aAAa,MAAA,CAAC;QACpC,uBAAA,IAAI,qBAAc,OAAO,EAAE,SAAS,IAAI,CAAC,EAAC,8BAA8B,EAAE,EAAE,GAAE,CAAC,CAAC,MAAA,CAAC,CAAC,2DAA2D;QAC7I,uBAAA,IAAI,6BAAsB,OAAO,EAAE,iBAAiB,IAAI,IAAI,MAAA,CAAC;QAC7D,uBAAA,IAAI,6BAAsB,OAAO,EAAE,iBAAiB,MAAA,CAAC;IACvD,CAAC;IAED,sCAAsC;IACtC,KAAK,CAAC,UAAU;QACd,OAAO,uBAAA,IAAI,uBAAS,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACH,OAAO,CAAC,QAAgC;QACtC,OAAO,IAAI,MAAM,CAAC,uBAAA,IAAI,uBAAS,EAAE,uBAAA,IAAI,6BAAe,EAAE,EAAE,QAAQ,EAAE,CAAC,CAAC;IACtE,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe,CAAC,EAA6B;QACjD,0CAA0C;QAC1C,IAAI,OAAO,GAAG,EAAE,CAAC,OAAO,CAAC;QACzB,IAAI,OAAO,KAAK,SAAS,EAAE;YACzB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,UAAU,EAAE,CAAC;YAClD,OAAO,GAAG,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,GAAG,CAAC;SAC/C;QAED,sDAAsD;QACtD,MAAM,KAAK,GACT,IAAI,CAAC,QAAQ,YAAY,2BAAkB;YACzC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACrC,CAAC,CAAC,gDAAgD;gBAChD,iDAAiD;gBACjD,0CAA0C;gBAC1C,2BAAkB,CAAC,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACpE,KAAK,CAAC,IAAI,GAAG,IAAA,gBAAO,EAAC,EAAE,CAAC,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,qBAAqB;QAE/D,MAAM,GAAG,GAAmB;YAC1B,QAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;YACzB,EAAE,EAAE,KAAK;SACV,CAAC;QAEF,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,aAAa,CAAC;IAC5B,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,WAAW,CAAC,OAA4B;QAC5C,MAAM,MAAM,GAAG,eAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAC3C,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,aAAa,CACjB,MAAuB,EACvB,KAA4C,EAC5C,KAA0B;QAE1B,MAAM,MAAM,GAAG,yBAAgB,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC;QAC3D,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,QAAQ,CAAC,MAAc;QACnC,MAAM,OAAO,GAAoB;YAC/B,cAAc,EAAE,MAAM,CAAC,IAAI,CAAC,IAAA,iBAAQ,EAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;SACjE,CAAC;QACF,4CAA4C;QAC5C,IAAI,uBAAA,IAAI,mBAAK,KAAK,SAAS,EAAE;YAC3B,MAAM,GAAG,GAAG,CAAC,MAAM,uBAAA,IAAI,6BAAe,CAAC,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,WAAW,KAAK,uBAAA,IAAI,uBAAS,CAAC,CAAC;YAC5F,IAAI,GAAG,KAAK,SAAS,EAAE;gBACrB,MAAM,IAAI,KAAK,CAAC,sBAAsB,uBAAA,IAAI,uBAAS,GAAG,CAAC,CAAC;aACzD;YACD,uBAAA,IAAI,eAAQ,GAAG,MAAA,CAAC;SACjB;QAED,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,QAAQ,CAAC,uBAAA,IAAI,mBAAK,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;QAC1E,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,SAAS,CAAC;IACxB,CAAC;CAoBF;AA7JD,wBA6JC;;AAlBC;;;;;GAKG;AACH,KAAK,4BAAe,GAAoB;IACtC,OAAO,GAAG,CAAC,WAAW,EAAE,EAAE;QACxB,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,uBAAA,IAAI,iCAAmB,CAAC,CAAC,CAAC;QAE7E,MAAM,OAAO,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,UAAU,CAAC,uBAAA,IAAI,iCAAoB,EAAE,GAAG,CAAC,KAAK,EAAE,CAAC,CAAC;QAC5F,uBAAA,IAAI,yBAAW,MAAf,IAAI,EAAY,OAAO,CAAC,CAAC;QACzB,IAAI,OAAO,CAAC,OAAO,EAAE;YACnB,GAAG,GAAG,MAAM,GAAG,CAAC,mBAAmB,CAAC,OAAO,CAAC,CAAC;SAC9C;KACF;IACD,OAAO,GAAG,CAAC,IAAI,EAAE,CAAC;AACpB,CAAC","sourcesContent":["import {\n  JsonRpcApiProvider,\n  TypedDataDomain,\n  TypedDataEncoder,\n  TypedDataField,\n  ethers,\n  getBytes,\n  toBeHex,\n} from \"ethers\";\nimport {\n  BlobSignRequest,\n  EvmSignRequest,\n  MfaRequestInfo,\n  SignerSession,\n  SignResponse,\n} from \"../signer_session\";\nimport { KeyInfo } from \"../key\";\nimport { CubeSigner } from \"..\";\n\n/** Options for the signer */\ninterface SignerOptions {\n  /** Optional provider to use */\n  provider?: null | ethers.Provider;\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  onMfaPoll?: (arg0: MfaRequestInfo) => void;\n  /**\n   * The amount of time (in milliseconds) to wait between checks for MFA\n   * updates. Default is 1000ms\n   */\n  mfaPollIntervalMs?: number;\n  /** Optional management session. Used to check for MFA updates */\n  managementSession?: CubeSigner;\n}\n\n/**\n * A ethers.js Signer using CubeSigner\n */\nexport class Signer extends ethers.AbstractSigner {\n  /** The address of the account */\n  readonly #address: string;\n\n  /** The key to use for signing */\n  #key?: KeyInfo;\n\n  /** The underlying session */\n  readonly #signerSession: SignerSession;\n\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  readonly #onMfaPoll: (arg0: MfaRequestInfo) => void;\n\n  /** The amount of time to wait between checks for MFA updates */\n  readonly #mfaPollIntervalMs: number;\n\n  /** Optional management session, used for MFA flows */\n  readonly #managementSession?: CubeSigner;\n\n  /** Create new Signer instance\n   * @param {KeyInfo | string} address The key or the eth address of the account to use.\n   * @param {SignerSession} signerSession The underlying Signer session.\n   * @param {SignerOptions} options The options to use for the Signer instance\n   */\n  constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions) {\n    super(options?.provider);\n    if (typeof address === \"string\") {\n      this.#address = address;\n    } else {\n      this.#address = address.materialId;\n      this.#key = address as KeyInfo;\n    }\n    this.#signerSession = signerSession;\n    this.#onMfaPoll = options?.onMfaPoll ?? ((/* _mfaInfo: MfaRequestInfo */) => {}); // eslint-disable-line @typescript-eslint/no-empty-function\n    this.#mfaPollIntervalMs = options?.mfaPollIntervalMs ?? 1000;\n    this.#managementSession = options?.managementSession;\n  }\n\n  /** Resolves to the signer address. */\n  async getAddress(): Promise<string> {\n    return this.#address;\n  }\n\n  /**\n   *  Returns the signer connected to %%provider%%.\n   *  @param {null | ethers.Provider} provider The optional provider instance to use.\n   *  @return {Signer} The signer connected to signer.\n   */\n  connect(provider: null | ethers.Provider): Signer {\n    return new Signer(this.#address, this.#signerSession, { provider });\n  }\n\n  /**\n   * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.\n   * @param {ethers.TransactionRequest} tx The transaction to sign.\n   * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.\n   */\n  async signTransaction(tx: ethers.TransactionRequest): Promise<string> {\n    // get the chain id from the network or tx\n    let chainId = tx.chainId;\n    if (chainId === undefined) {\n      const network = await this.provider?.getNetwork();\n      chainId = network?.chainId?.toString() ?? \"1\";\n    }\n\n    // Convert the transaction into a JSON-RPC transaction\n    const rpcTx =\n      this.provider instanceof JsonRpcApiProvider\n        ? this.provider.getRpcTransaction(tx)\n        : // We can just call the getRpcTransaction with a\n          // null receiver since it doesn't actually use it\n          // (and really should be declared static).\n          JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);\n    rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]\n\n    const req = <EvmSignRequest>{\n      chain_id: Number(chainId),\n      tx: rpcTx,\n    };\n\n    const res = await this.#signerSession.signEvm(this.#address, req);\n    const data = await this.#handleMfa(res);\n    return data.rlp_signed_tx;\n  }\n\n  /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)\n   * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {string | Uint8Array} message The message to sign.\n   * @return {Promise<string>} The signature.\n   */\n  async signMessage(message: string | Uint8Array): Promise<string> {\n    const digest = ethers.hashMessage(message);\n    return this.signBlob(digest);\n  }\n\n  /** Signs EIP-712 typed data. This uses ethers.js's\n   * [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)\n   * to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {TypedDataDomain} domain The domain of the typed data.\n   * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.\n   * @param {Record<string, any>} value The value of the typed data.\n   * @return {Promise<string>} The signature.\n   */\n  async signTypedData(\n    domain: TypedDataDomain,\n    types: Record<string, Array<TypedDataField>>,\n    value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any\n  ): Promise<string> {\n    const digest = TypedDataEncoder.hash(domain, types, value);\n    return this.signBlob(digest);\n  }\n\n  /** Sign arbitrary digest. This uses {@link Key#signBlob}.\n   * @param {string} digest The digest to sign.\n   * @return {Promise<string>} The signature.\n   */\n  private async signBlob(digest: string): Promise<string> {\n    const blobReq = <BlobSignRequest>{\n      message_base64: Buffer.from(getBytes(digest)).toString(\"base64\"),\n    };\n    // Get the key corresponding to this address\n    if (this.#key === undefined) {\n      const key = (await this.#signerSession.keys()).find((k) => k.material_id === this.#address);\n      if (key === undefined) {\n        throw new Error(`Cannot access key '${this.#address}'`);\n      }\n      this.#key = key;\n    }\n\n    const res = await this.#signerSession.signBlob(this.#key.key_id, blobReq);\n    const data = await this.#handleMfa(res);\n    return data.signature;\n  }\n\n  /**\n   * If the sign request requires MFA, this method waits for approvals\n   *\n   * @param {SignResponse<U>} res The response of a sign request\n   * @return {Promise<U>} The sign data after MFA approvals\n   */\n  async #handleMfa<U>(res: SignResponse<U>): Promise<U> {\n    while (res.requiresMfa()) {\n      await new Promise((resolve) => setTimeout(resolve, this.#mfaPollIntervalMs));\n\n      const mfaInfo = await this.#signerSession.getMfaInfo(this.#managementSession!, res.mfaId());\n      this.#onMfaPoll(mfaInfo);\n      if (mfaInfo.receipt) {\n        res = await res.signWithMfaApproval(mfaInfo);\n      }\n    }\n    return res.data();\n  }\n}\n"]}
|
|
164
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/ethers/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAQgB;AA6BhB;;GAEG;AACH,MAAa,MAAO,SAAQ,eAAM,CAAC,cAAc;IAsB/C;;;;OAIG;IACH,YAAY,OAAyB,EAAE,aAA4B,EAAE,OAAuB;QAC1F,KAAK,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;;QA3B3B,iCAAiC;QACxB,kCAAiB;QAE1B,iCAAiC;QACjC,8BAAe;QAEf,6BAA6B;QACpB,wCAA8B;QAEvC;;;WAGG;QACM,oCAA2C;QAEpD,gEAAgE;QACvD,4CAA2B;QAEpC,sDAAsD;QAC7C,4CAAgC;QASvC,IAAI,OAAO,OAAO,KAAK,QAAQ,EAAE;YAC/B,uBAAA,IAAI,mBAAY,OAAO,MAAA,CAAC;SACzB;aAAM;YACL,uBAAA,IAAI,mBAAY,OAAO,CAAC,UAAU,MAAA,CAAC;YACnC,uBAAA,IAAI,eAAQ,OAAkB,MAAA,CAAC;SAChC;QACD,uBAAA,IAAI,yBAAkB,aAAa,MAAA,CAAC;QACpC,uBAAA,IAAI,qBAAc,OAAO,EAAE,SAAS,IAAI,CAAC,EAAC,8BAA8B,EAAE,EAAE,GAAE,CAAC,CAAC,MAAA,CAAC,CAAC,2DAA2D;QAC7I,uBAAA,IAAI,6BAAsB,OAAO,EAAE,iBAAiB,IAAI,IAAI,MAAA,CAAC;QAC7D,uBAAA,IAAI,6BAAsB,OAAO,EAAE,iBAAiB,MAAA,CAAC;IACvD,CAAC;IAED,sCAAsC;IACtC,KAAK,CAAC,UAAU;QACd,OAAO,uBAAA,IAAI,uBAAS,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACH,OAAO,CAAC,QAAgC;QACtC,OAAO,IAAI,MAAM,CAAC,uBAAA,IAAI,uBAAS,EAAE,uBAAA,IAAI,6BAAe,EAAE,EAAE,QAAQ,EAAE,CAAC,CAAC;IACtE,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe,CAAC,EAA6B;QACjD,0CAA0C;QAC1C,IAAI,OAAO,GAAG,EAAE,CAAC,OAAO,CAAC;QACzB,IAAI,OAAO,KAAK,SAAS,EAAE;YACzB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,UAAU,EAAE,CAAC;YAClD,OAAO,GAAG,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,GAAG,CAAC;SAC/C;QAED,sDAAsD;QACtD,MAAM,KAAK,GACT,IAAI,CAAC,QAAQ,YAAY,2BAAkB;YACzC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACrC,CAAC,CAAC,gDAAgD;gBAChD,iDAAiD;gBACjD,0CAA0C;gBAC1C,2BAAkB,CAAC,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACpE,KAAK,CAAC,IAAI,GAAG,IAAA,gBAAO,EAAC,EAAE,CAAC,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,qBAAqB;QAE/D,MAAM,GAAG,GAAmB;YAC1B,QAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;YACzB,EAAE,EAAE,KAAK;SACV,CAAC;QAEF,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,aAAa,CAAC;IAC5B,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,WAAW,CAAC,OAA4B;QAC5C,MAAM,MAAM,GAAG,eAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAC3C,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,aAAa,CACjB,MAAuB,EACvB,KAA4C,EAC5C,KAA0B;QAE1B,MAAM,MAAM,GAAG,yBAAgB,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC;QAC3D,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,QAAQ,CAAC,MAAc;QACnC,MAAM,OAAO,GAAoB;YAC/B,cAAc,EAAE,MAAM,CAAC,IAAI,CAAC,IAAA,iBAAQ,EAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;SACjE,CAAC;QACF,4CAA4C;QAC5C,IAAI,uBAAA,IAAI,mBAAK,KAAK,SAAS,EAAE;YAC3B,MAAM,GAAG,GAAG,CAAC,MAAM,uBAAA,IAAI,6BAAe,CAAC,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,WAAW,KAAK,uBAAA,IAAI,uBAAS,CAAC,CAAC;YAC5F,IAAI,GAAG,KAAK,SAAS,EAAE;gBACrB,MAAM,IAAI,KAAK,CAAC,sBAAsB,uBAAA,IAAI,uBAAS,GAAG,CAAC,CAAC;aACzD;YACD,uBAAA,IAAI,eAAQ,GAAG,MAAA,CAAC;SACjB;QAED,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,QAAQ,CAAC,uBAAA,IAAI,mBAAK,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;QAC1E,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,SAAS,CAAC;IACxB,CAAC;CAyBF;AAlKD,wBAkKC;;AAvBC;;;;;GAKG;AACH,KAAK,4BAAe,GAAoB;IACtC,OAAO,GAAG,CAAC,WAAW,EAAE,EAAE;QACxB,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,uBAAA,IAAI,iCAAmB,CAAC,CAAC,CAAC;QAE7E,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,EAAE,CAAC;QAC1B,MAAM,OAAO,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,UAAU,CAAC,uBAAA,IAAI,iCAAoB,EAAE,KAAK,CAAC,CAAC;QACtF,uBAAA,IAAI,yBAAW,MAAf,IAAI,EAAY,OAAO,CAAC,CAAC;QACzB,IAAI,OAAO,CAAC,OAAO,EAAE;YACnB,GAAG,GAAG,MAAM,GAAG,CAAC,mBAAmB,CAAC;gBAClC,KAAK;gBACL,QAAQ,EAAE,uBAAA,IAAI,6BAAe,CAAC,KAAK;gBACnC,OAAO,EAAE,OAAO,CAAC,OAAO,CAAC,YAAY;aACtC,CAAC,CAAC;SACJ;KACF;IACD,OAAO,GAAG,CAAC,IAAI,EAAE,CAAC;AACpB,CAAC","sourcesContent":["import {\n  JsonRpcApiProvider,\n  TypedDataDomain,\n  TypedDataEncoder,\n  TypedDataField,\n  ethers,\n  getBytes,\n  toBeHex,\n} from \"ethers\";\nimport {\n  BlobSignRequest,\n  EvmSignRequest,\n  MfaRequestInfo,\n  SignerSession,\n  SignResponse,\n} from \"../signer_session\";\nimport { KeyInfo } from \"../key\";\nimport { CubeSigner } from \"..\";\n\n/** Options for the signer */\ninterface SignerOptions {\n  /** Optional provider to use */\n  provider?: null | ethers.Provider;\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  onMfaPoll?: (arg0: MfaRequestInfo) => void;\n  /**\n   * The amount of time (in milliseconds) to wait between checks for MFA\n   * updates. Default is 1000ms\n   */\n  mfaPollIntervalMs?: number;\n  /** Optional management session. Used to check for MFA updates */\n  managementSession?: CubeSigner;\n}\n\n/**\n * A ethers.js Signer using CubeSigner\n */\nexport class Signer extends ethers.AbstractSigner {\n  /** The address of the account */\n  readonly #address: string;\n\n  /** The key to use for signing */\n  #key?: KeyInfo;\n\n  /** The underlying session */\n  readonly #signerSession: SignerSession;\n\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  readonly #onMfaPoll: (arg0: MfaRequestInfo) => void;\n\n  /** The amount of time to wait between checks for MFA updates */\n  readonly #mfaPollIntervalMs: number;\n\n  /** Optional management session, used for MFA flows */\n  readonly #managementSession?: CubeSigner;\n\n  /** Create new Signer instance\n   * @param {KeyInfo | string} address The key or the eth address of the account to use.\n   * @param {SignerSession} signerSession The underlying Signer session.\n   * @param {SignerOptions} options The options to use for the Signer instance\n   */\n  constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions) {\n    super(options?.provider);\n    if (typeof address === \"string\") {\n      this.#address = address;\n    } else {\n      this.#address = address.materialId;\n      this.#key = address as KeyInfo;\n    }\n    this.#signerSession = signerSession;\n    this.#onMfaPoll = options?.onMfaPoll ?? ((/* _mfaInfo: MfaRequestInfo */) => {}); // eslint-disable-line @typescript-eslint/no-empty-function\n    this.#mfaPollIntervalMs = options?.mfaPollIntervalMs ?? 1000;\n    this.#managementSession = options?.managementSession;\n  }\n\n  /** Resolves to the signer address. */\n  async getAddress(): Promise<string> {\n    return this.#address;\n  }\n\n  /**\n   *  Returns the signer connected to %%provider%%.\n   *  @param {null | ethers.Provider} provider The optional provider instance to use.\n   *  @return {Signer} The signer connected to signer.\n   */\n  connect(provider: null | ethers.Provider): Signer {\n    return new Signer(this.#address, this.#signerSession, { provider });\n  }\n\n  /**\n   * Signs a transaction. This populates the transaction type to `0x02` (EIP-1559) unless set. This method will block if the key requires MFA approval.\n   * @param {ethers.TransactionRequest} tx The transaction to sign.\n   * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.\n   */\n  async signTransaction(tx: ethers.TransactionRequest): Promise<string> {\n    // get the chain id from the network or tx\n    let chainId = tx.chainId;\n    if (chainId === undefined) {\n      const network = await this.provider?.getNetwork();\n      chainId = network?.chainId?.toString() ?? \"1\";\n    }\n\n    // Convert the transaction into a JSON-RPC transaction\n    const rpcTx =\n      this.provider instanceof JsonRpcApiProvider\n        ? this.provider.getRpcTransaction(tx)\n        : // We can just call the getRpcTransaction with a\n          // null receiver since it doesn't actually use it\n          // (and really should be declared static).\n          JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);\n    rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]\n\n    const req = <EvmSignRequest>{\n      chain_id: Number(chainId),\n      tx: rpcTx,\n    };\n\n    const res = await this.#signerSession.signEvm(this.#address, req);\n    const data = await this.#handleMfa(res);\n    return data.rlp_signed_tx;\n  }\n\n  /** Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)\n   * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {string | Uint8Array} message The message to sign.\n   * @return {Promise<string>} The signature.\n   */\n  async signMessage(message: string | Uint8Array): Promise<string> {\n    const digest = ethers.hashMessage(message);\n    return this.signBlob(digest);\n  }\n\n  /** Signs EIP-712 typed data. This uses ethers.js's\n   * [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)\n   * to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` policy attached.\n   * @param {TypedDataDomain} domain The domain of the typed data.\n   * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.\n   * @param {Record<string, any>} value The value of the typed data.\n   * @return {Promise<string>} The signature.\n   */\n  async signTypedData(\n    domain: TypedDataDomain,\n    types: Record<string, Array<TypedDataField>>,\n    value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any\n  ): Promise<string> {\n    const digest = TypedDataEncoder.hash(domain, types, value);\n    return this.signBlob(digest);\n  }\n\n  /** Sign arbitrary digest. This uses {@link Key#signBlob}.\n   * @param {string} digest The digest to sign.\n   * @return {Promise<string>} The signature.\n   */\n  private async signBlob(digest: string): Promise<string> {\n    const blobReq = <BlobSignRequest>{\n      message_base64: Buffer.from(getBytes(digest)).toString(\"base64\"),\n    };\n    // Get the key corresponding to this address\n    if (this.#key === undefined) {\n      const key = (await this.#signerSession.keys()).find((k) => k.material_id === this.#address);\n      if (key === undefined) {\n        throw new Error(`Cannot access key '${this.#address}'`);\n      }\n      this.#key = key;\n    }\n\n    const res = await this.#signerSession.signBlob(this.#key.key_id, blobReq);\n    const data = await this.#handleMfa(res);\n    return data.signature;\n  }\n\n  /**\n   * If the sign request requires MFA, this method waits for approvals\n   *\n   * @param {SignResponse<U>} res The response of a sign request\n   * @return {Promise<U>} The sign data after MFA approvals\n   */\n  async #handleMfa<U>(res: SignResponse<U>): Promise<U> {\n    while (res.requiresMfa()) {\n      await new Promise((resolve) => setTimeout(resolve, this.#mfaPollIntervalMs));\n\n      const mfaId = res.mfaId();\n      const mfaInfo = await this.#signerSession.getMfaInfo(this.#managementSession!, mfaId);\n      this.#onMfaPoll(mfaInfo);\n      if (mfaInfo.receipt) {\n        res = await res.signWithMfaApproval({\n          mfaId,\n          mfaOrgId: this.#signerSession.orgId,\n          mfaConf: mfaInfo.receipt.confirmation,\n        });\n      }\n    }\n    return res.data();\n  }\n}\n"]}
|
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
import { CubeSigner, MfaRequestInfo, SignerSession } from ".";
|
|
2
|
+
import { components } from "./schema";
|
|
3
|
+
export type ApiAddFidoChallenge = components["responses"]["FidoCreateChallengeResponse"]["content"]["application/json"];
|
|
4
|
+
export type ApiMfaFidoChallenge = components["responses"]["FidoAssertChallenge"]["content"]["application/json"];
|
|
5
|
+
export type PublicKeyCredentialCreationOptions = components["schemas"]["PublicKeyCredentialCreationOptions"];
|
|
6
|
+
export type PublicKeyCredentialRequestOptions = components["schemas"]["PublicKeyCredentialRequestOptions"];
|
|
7
|
+
export type PublicKeyCredentialParameters = components["schemas"]["PublicKeyCredentialParameters"];
|
|
8
|
+
export type PublicKeyCredentialDescriptor = components["schemas"]["PublicKeyCredentialDescriptor"];
|
|
9
|
+
export type AuthenticatorSelectionCriteria = components["schemas"]["AuthenticatorSelectionCriteria"];
|
|
10
|
+
export type PublicKeyCredentialUserEntity = components["schemas"]["PublicKeyCredentialUserEntity"];
|
|
11
|
+
export type PublicKeyCredential = components["schemas"]["PublicKeyCredential"];
|
|
12
|
+
/**
|
|
13
|
+
* Returned after creating a request to add a new FIDO device.
|
|
14
|
+
* Provides some helper methods for answering this challenge.
|
|
15
|
+
*/
|
|
16
|
+
export declare class AddFidoChallenge {
|
|
17
|
+
#private;
|
|
18
|
+
readonly challengeId: string;
|
|
19
|
+
readonly options: any;
|
|
20
|
+
/**
|
|
21
|
+
* Constructor
|
|
22
|
+
* @param {CubeSigner} cs CubeSigner instance used to request to add a FIDO device
|
|
23
|
+
* @param {ApiAddFidoChallenge} challenge The challenge returned by the remote end.
|
|
24
|
+
*/
|
|
25
|
+
constructor(cs: CubeSigner, challenge: ApiAddFidoChallenge);
|
|
26
|
+
/**
|
|
27
|
+
* Answers this challenge by using the `CredentialsContainer` API to create a credential
|
|
28
|
+
* based on the the public key credential creation options from this challenge.
|
|
29
|
+
*/
|
|
30
|
+
createCredentialAndAnswer(): Promise<void>;
|
|
31
|
+
/**
|
|
32
|
+
* Answers this challenge using a given credential `cred`;
|
|
33
|
+
* the credential should be obtained by calling
|
|
34
|
+
*
|
|
35
|
+
* ```
|
|
36
|
+
* const cred = await navigator.credentials.create({ publicKey: this.options });
|
|
37
|
+
* ```
|
|
38
|
+
*
|
|
39
|
+
* @param {any} cred Credential created by calling the `CredentialContainer`'s `create` method
|
|
40
|
+
* based on the public key creation options from this challenge.
|
|
41
|
+
*/
|
|
42
|
+
answer(cred: any): Promise<void>;
|
|
43
|
+
}
|
|
44
|
+
/**
|
|
45
|
+
* Returned after initiating MFA approval using FIDO.
|
|
46
|
+
* Provides some helper methods for answering this challenge.
|
|
47
|
+
*/
|
|
48
|
+
export declare class MfaFidoChallenge {
|
|
49
|
+
#private;
|
|
50
|
+
readonly mfaId: string;
|
|
51
|
+
readonly challengeId: string;
|
|
52
|
+
readonly options: any;
|
|
53
|
+
/**
|
|
54
|
+
* @param {SignerSession} ss The session used to initiate MFA approval using FIDO
|
|
55
|
+
* @param {string} mfaId The MFA request id.
|
|
56
|
+
* @param {ApiMfaFidoChallenge} challenge The challenge returned by the remote end
|
|
57
|
+
*/
|
|
58
|
+
constructor(ss: SignerSession, mfaId: string, challenge: ApiMfaFidoChallenge);
|
|
59
|
+
/**
|
|
60
|
+
* Answers this challenge by using the `CredentialsContainer` API to get a credential
|
|
61
|
+
* based on the the public key credential request options from this challenge.
|
|
62
|
+
*/
|
|
63
|
+
createCredentialAndAnswer(): Promise<MfaRequestInfo>;
|
|
64
|
+
/**
|
|
65
|
+
* Answers this challenge using a given credential `cred`.
|
|
66
|
+
* To obtain this credential, for example, call
|
|
67
|
+
*
|
|
68
|
+
* ```
|
|
69
|
+
* const cred = await navigator.credentials.get({ publicKey: this.options });
|
|
70
|
+
* ```
|
|
71
|
+
*
|
|
72
|
+
* @param {any} cred Credential created by calling the `CredentialContainer`'s `get` method
|
|
73
|
+
* based on the public key credential request options from this challenge.
|
|
74
|
+
*/
|
|
75
|
+
answer(cred: any): Promise<MfaRequestInfo>;
|
|
76
|
+
}
|
package/dist/src/fido.js
ADDED
|
@@ -0,0 +1,148 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/* eslint-disable @typescript-eslint/no-explicit-any */
|
|
3
|
+
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
4
|
+
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
5
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
6
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
7
|
+
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
8
|
+
};
|
|
9
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
10
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
11
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
12
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
13
|
+
};
|
|
14
|
+
var _AddFidoChallenge_cs, _MfaFidoChallenge_ss;
|
|
15
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
|
+
exports.MfaFidoChallenge = exports.AddFidoChallenge = void 0;
|
|
17
|
+
const util_1 = require("./util");
|
|
18
|
+
/**
|
|
19
|
+
* Returned after creating a request to add a new FIDO device.
|
|
20
|
+
* Provides some helper methods for answering this challenge.
|
|
21
|
+
*/
|
|
22
|
+
class AddFidoChallenge {
|
|
23
|
+
/**
|
|
24
|
+
* Constructor
|
|
25
|
+
* @param {CubeSigner} cs CubeSigner instance used to request to add a FIDO device
|
|
26
|
+
* @param {ApiAddFidoChallenge} challenge The challenge returned by the remote end.
|
|
27
|
+
*/
|
|
28
|
+
constructor(cs, challenge) {
|
|
29
|
+
_AddFidoChallenge_cs.set(this, void 0);
|
|
30
|
+
__classPrivateFieldSet(this, _AddFidoChallenge_cs, cs, "f");
|
|
31
|
+
this.challengeId = challenge.challenge_id;
|
|
32
|
+
// fix options returned from the server: rename fields and decode base64 fields to uint8[]
|
|
33
|
+
this.options = {
|
|
34
|
+
...challenge.options,
|
|
35
|
+
challenge: (0, util_1.decodeBase64Url)(challenge.options.challenge),
|
|
36
|
+
};
|
|
37
|
+
this.options.pubKeyCredParams ??= challenge.options.pub_key_cred_params;
|
|
38
|
+
this.options.excludeCredentials ??= challenge.options.exclude_credentials;
|
|
39
|
+
this.options.authenticatorSelection ??= challenge.options.authenticator_selection;
|
|
40
|
+
delete this.options.pub_key_cred_params;
|
|
41
|
+
delete this.options.exclude_credentials;
|
|
42
|
+
delete this.options.authenticator_selection;
|
|
43
|
+
if (challenge.options.user) {
|
|
44
|
+
this.options.user.id = (0, util_1.decodeBase64Url)(challenge.options.user.id);
|
|
45
|
+
}
|
|
46
|
+
for (const credential of this.options.excludeCredentials ?? []) {
|
|
47
|
+
credential.id = (0, util_1.decodeBase64Url)(credential.id);
|
|
48
|
+
}
|
|
49
|
+
}
|
|
50
|
+
/**
|
|
51
|
+
* Answers this challenge by using the `CredentialsContainer` API to create a credential
|
|
52
|
+
* based on the the public key credential creation options from this challenge.
|
|
53
|
+
*/
|
|
54
|
+
async createCredentialAndAnswer() {
|
|
55
|
+
const cred = await navigator.credentials.create({ publicKey: this.options });
|
|
56
|
+
await this.answer(cred);
|
|
57
|
+
}
|
|
58
|
+
/**
|
|
59
|
+
* Answers this challenge using a given credential `cred`;
|
|
60
|
+
* the credential should be obtained by calling
|
|
61
|
+
*
|
|
62
|
+
* ```
|
|
63
|
+
* const cred = await navigator.credentials.create({ publicKey: this.options });
|
|
64
|
+
* ```
|
|
65
|
+
*
|
|
66
|
+
* @param {any} cred Credential created by calling the `CredentialContainer`'s `create` method
|
|
67
|
+
* based on the public key creation options from this challenge.
|
|
68
|
+
*/
|
|
69
|
+
async answer(cred) {
|
|
70
|
+
const answer = {
|
|
71
|
+
id: cred.id,
|
|
72
|
+
response: {
|
|
73
|
+
clientDataJSON: (0, util_1.encodeToBase64Url)(cred.response.clientDataJSON),
|
|
74
|
+
attestationObject: (0, util_1.encodeToBase64Url)(cred.response.attestationObject),
|
|
75
|
+
},
|
|
76
|
+
};
|
|
77
|
+
await __classPrivateFieldGet(this, _AddFidoChallenge_cs, "f").addFidoComplete(this.challengeId, answer);
|
|
78
|
+
}
|
|
79
|
+
}
|
|
80
|
+
exports.AddFidoChallenge = AddFidoChallenge;
|
|
81
|
+
_AddFidoChallenge_cs = new WeakMap();
|
|
82
|
+
/**
|
|
83
|
+
* Returned after initiating MFA approval using FIDO.
|
|
84
|
+
* Provides some helper methods for answering this challenge.
|
|
85
|
+
*/
|
|
86
|
+
class MfaFidoChallenge {
|
|
87
|
+
/**
|
|
88
|
+
* @param {SignerSession} ss The session used to initiate MFA approval using FIDO
|
|
89
|
+
* @param {string} mfaId The MFA request id.
|
|
90
|
+
* @param {ApiMfaFidoChallenge} challenge The challenge returned by the remote end
|
|
91
|
+
*/
|
|
92
|
+
constructor(ss, mfaId, challenge) {
|
|
93
|
+
_MfaFidoChallenge_ss.set(this, void 0);
|
|
94
|
+
__classPrivateFieldSet(this, _MfaFidoChallenge_ss, ss, "f");
|
|
95
|
+
this.mfaId = mfaId;
|
|
96
|
+
this.challengeId = challenge.challenge_id;
|
|
97
|
+
// fix options returned from the server: rename fields and decode base64 fields into uint8[]
|
|
98
|
+
this.options = {
|
|
99
|
+
...challenge.options,
|
|
100
|
+
challenge: (0, util_1.decodeBase64Url)(challenge.options.challenge),
|
|
101
|
+
};
|
|
102
|
+
this.options.rpId ??= challenge.options.rp_id;
|
|
103
|
+
this.options.allowCredentials ??= challenge.options.allow_credentials;
|
|
104
|
+
this.options.userVerification ??= challenge.options.user_verification;
|
|
105
|
+
delete this.options.rp_id;
|
|
106
|
+
delete this.options.allow_credentials;
|
|
107
|
+
delete this.options.user_verification;
|
|
108
|
+
for (const credential of this.options.allowCredentials ?? []) {
|
|
109
|
+
credential.id = (0, util_1.decodeBase64Url)(credential.id);
|
|
110
|
+
if (credential.transports === null) {
|
|
111
|
+
delete credential.transports;
|
|
112
|
+
}
|
|
113
|
+
}
|
|
114
|
+
}
|
|
115
|
+
/**
|
|
116
|
+
* Answers this challenge by using the `CredentialsContainer` API to get a credential
|
|
117
|
+
* based on the the public key credential request options from this challenge.
|
|
118
|
+
*/
|
|
119
|
+
async createCredentialAndAnswer() {
|
|
120
|
+
const cred = await navigator.credentials.get({ publicKey: this.options });
|
|
121
|
+
return await this.answer(cred);
|
|
122
|
+
}
|
|
123
|
+
/**
|
|
124
|
+
* Answers this challenge using a given credential `cred`.
|
|
125
|
+
* To obtain this credential, for example, call
|
|
126
|
+
*
|
|
127
|
+
* ```
|
|
128
|
+
* const cred = await navigator.credentials.get({ publicKey: this.options });
|
|
129
|
+
* ```
|
|
130
|
+
*
|
|
131
|
+
* @param {any} cred Credential created by calling the `CredentialContainer`'s `get` method
|
|
132
|
+
* based on the public key credential request options from this challenge.
|
|
133
|
+
*/
|
|
134
|
+
async answer(cred) {
|
|
135
|
+
const answer = {
|
|
136
|
+
id: cred.id,
|
|
137
|
+
response: {
|
|
138
|
+
clientDataJSON: (0, util_1.encodeToBase64Url)(cred.response.clientDataJSON),
|
|
139
|
+
authenticatorData: (0, util_1.encodeToBase64Url)(cred.response.authenticatorData),
|
|
140
|
+
signature: (0, util_1.encodeToBase64Url)(cred.response.signature),
|
|
141
|
+
},
|
|
142
|
+
};
|
|
143
|
+
return await __classPrivateFieldGet(this, _MfaFidoChallenge_ss, "f").fidoApproveComplete(this.mfaId, this.challengeId, answer);
|
|
144
|
+
}
|
|
145
|
+
}
|
|
146
|
+
exports.MfaFidoChallenge = MfaFidoChallenge;
|
|
147
|
+
_MfaFidoChallenge_ss = new WeakMap();
|
|
148
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"fido.js","sourceRoot":"","sources":["../../src/fido.ts"],"names":[],"mappings":";AAAA,uDAAuD;;;;;;;;;;;;;;;AAIvD,iCAA4D;AAmB5D;;;GAGG;AACH,MAAa,gBAAgB;IAK3B;;;;OAIG;IACH,YAAY,EAAc,EAAE,SAA8B;QATjD,uCAAgB;QAUvB,uBAAA,IAAI,wBAAO,EAAE,MAAA,CAAC;QACd,IAAI,CAAC,WAAW,GAAG,SAAS,CAAC,YAAY,CAAC;QAE1C,0FAA0F;QAC1F,IAAI,CAAC,OAAO,GAAG;YACb,GAAG,SAAS,CAAC,OAAO;YACpB,SAAS,EAAE,IAAA,sBAAe,EAAC,SAAS,CAAC,OAAO,CAAC,SAAS,CAAC;SACxD,CAAC;QACF,IAAI,CAAC,OAAO,CAAC,gBAAgB,KAAK,SAAS,CAAC,OAAO,CAAC,mBAAmB,CAAC;QACxE,IAAI,CAAC,OAAO,CAAC,kBAAkB,KAAK,SAAS,CAAC,OAAO,CAAC,mBAAmB,CAAC;QAC1E,IAAI,CAAC,OAAO,CAAC,sBAAsB,KAAK,SAAS,CAAC,OAAO,CAAC,uBAAuB,CAAC;QAClF,OAAO,IAAI,CAAC,OAAO,CAAC,mBAAmB,CAAC;QACxC,OAAO,IAAI,CAAC,OAAO,CAAC,mBAAmB,CAAC;QACxC,OAAO,IAAI,CAAC,OAAO,CAAC,uBAAuB,CAAC;QAE5C,IAAI,SAAS,CAAC,OAAO,CAAC,IAAI,EAAE;YAC1B,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,GAAG,IAAA,sBAAe,EAAC,SAAS,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;SACnE;QAED,KAAK,MAAM,UAAU,IAAI,IAAI,CAAC,OAAO,CAAC,kBAAkB,IAAI,EAAE,EAAE;YAC9D,UAAU,CAAC,EAAE,GAAG,IAAA,sBAAe,EAAC,UAAU,CAAC,EAAE,CAAC,CAAC;SAChD;IACH,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,yBAAyB;QAC7B,MAAM,IAAI,GAAG,MAAM,SAAS,CAAC,WAAW,CAAC,MAAM,CAAC,EAAE,SAAS,EAAE,IAAI,CAAC,OAAO,EAAE,CAAC,CAAC;QAC7E,MAAM,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;IAC1B,CAAC;IAED;;;;;;;;;;OAUG;IACH,KAAK,CAAC,MAAM,CAAC,IAAS;QACpB,MAAM,MAAM,GAAwB;YAClC,EAAE,EAAE,IAAI,CAAC,EAAE;YACX,QAAQ,EAAE;gBACR,cAAc,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,cAAc,CAAC;gBAC/D,iBAAiB,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC;aACtE;SACF,CAAC;QACF,MAAM,uBAAA,IAAI,4BAAI,CAAC,eAAe,CAAC,IAAI,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;IAC3D,CAAC;CACF;AAjED,4CAiEC;;AAED;;;GAGG;AACH,MAAa,gBAAgB;IAM3B;;;;OAIG;IACH,YAAY,EAAiB,EAAE,KAAa,EAAE,SAA8B;QAVnE,uCAAmB;QAW1B,uBAAA,IAAI,wBAAO,EAAE,MAAA,CAAC;QACd,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;QACnB,IAAI,CAAC,WAAW,GAAG,SAAS,CAAC,YAAY,CAAC;QAE1C,4FAA4F;QAC5F,IAAI,CAAC,OAAO,GAAG;YACb,GAAG,SAAS,CAAC,OAAO;YACpB,SAAS,EAAE,IAAA,sBAAe,EAAC,SAAS,CAAC,OAAO,CAAC,SAAS,CAAC;SACxD,CAAC;QACF,IAAI,CAAC,OAAO,CAAC,IAAI,KAAK,SAAS,CAAC,OAAO,CAAC,KAAK,CAAC;QAC9C,IAAI,CAAC,OAAO,CAAC,gBAAgB,KAAK,SAAS,CAAC,OAAO,CAAC,iBAAiB,CAAC;QACtE,IAAI,CAAC,OAAO,CAAC,gBAAgB,KAAK,SAAS,CAAC,OAAO,CAAC,iBAAiB,CAAC;QACtE,OAAO,IAAI,CAAC,OAAO,CAAC,KAAK,CAAC;QAC1B,OAAO,IAAI,CAAC,OAAO,CAAC,iBAAiB,CAAC;QACtC,OAAO,IAAI,CAAC,OAAO,CAAC,iBAAiB,CAAC;QAEtC,KAAK,MAAM,UAAU,IAAI,IAAI,CAAC,OAAO,CAAC,gBAAgB,IAAI,EAAE,EAAE;YAC5D,UAAU,CAAC,EAAE,GAAG,IAAA,sBAAe,EAAC,UAAU,CAAC,EAAE,CAAC,CAAC;YAC/C,IAAI,UAAU,CAAC,UAAU,KAAK,IAAI,EAAE;gBAClC,OAAO,UAAU,CAAC,UAAU,CAAC;aAC9B;SACF;IACH,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,yBAAyB;QAC7B,MAAM,IAAI,GAAG,MAAM,SAAS,CAAC,WAAW,CAAC,GAAG,CAAC,EAAE,SAAS,EAAE,IAAI,CAAC,OAAO,EAAE,CAAC,CAAC;QAC1E,OAAO,MAAM,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;IACjC,CAAC;IAED;;;;;;;;;;OAUG;IACH,KAAK,CAAC,MAAM,CAAC,IAAS;QACpB,MAAM,MAAM,GAAwB;YAClC,EAAE,EAAE,IAAI,CAAC,EAAE;YACX,QAAQ,EAAE;gBACR,cAAc,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,cAAc,CAAC;gBAC/D,iBAAiB,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC;gBACrE,SAAS,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC;aACtD;SACF,CAAC;QACF,OAAO,MAAM,uBAAA,IAAI,4BAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,KAAK,EAAE,IAAI,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;IAClF,CAAC;CACF;AAnED,4CAmEC","sourcesContent":["/* eslint-disable @typescript-eslint/no-explicit-any */\n\nimport { CubeSigner, MfaRequestInfo, SignerSession } from \".\";\nimport { components } from \"./schema\";\nimport { decodeBase64Url, encodeToBase64Url } from \"./util\";\n\nexport type ApiAddFidoChallenge =\n  components[\"responses\"][\"FidoCreateChallengeResponse\"][\"content\"][\"application/json\"];\n\nexport type ApiMfaFidoChallenge =\n  components[\"responses\"][\"FidoAssertChallenge\"][\"content\"][\"application/json\"];\n\nexport type PublicKeyCredentialCreationOptions =\n  components[\"schemas\"][\"PublicKeyCredentialCreationOptions\"];\nexport type PublicKeyCredentialRequestOptions =\n  components[\"schemas\"][\"PublicKeyCredentialRequestOptions\"];\nexport type PublicKeyCredentialParameters = components[\"schemas\"][\"PublicKeyCredentialParameters\"];\nexport type PublicKeyCredentialDescriptor = components[\"schemas\"][\"PublicKeyCredentialDescriptor\"];\nexport type AuthenticatorSelectionCriteria =\n  components[\"schemas\"][\"AuthenticatorSelectionCriteria\"];\nexport type PublicKeyCredentialUserEntity = components[\"schemas\"][\"PublicKeyCredentialUserEntity\"];\nexport type PublicKeyCredential = components[\"schemas\"][\"PublicKeyCredential\"];\n\n/**\n * Returned after creating a request to add a new FIDO device.\n * Provides some helper methods for answering this challenge.\n */\nexport class AddFidoChallenge {\n  readonly #cs: CubeSigner;\n  readonly challengeId: string;\n  readonly options: any;\n\n  /**\n   * Constructor\n   * @param {CubeSigner} cs CubeSigner instance used to request to add a FIDO device\n   * @param {ApiAddFidoChallenge} challenge The challenge returned by the remote end.\n   */\n  constructor(cs: CubeSigner, challenge: ApiAddFidoChallenge) {\n    this.#cs = cs;\n    this.challengeId = challenge.challenge_id;\n\n    // fix options returned from the server: rename fields and decode base64 fields to uint8[]\n    this.options = {\n      ...challenge.options,\n      challenge: decodeBase64Url(challenge.options.challenge),\n    };\n    this.options.pubKeyCredParams ??= challenge.options.pub_key_cred_params;\n    this.options.excludeCredentials ??= challenge.options.exclude_credentials;\n    this.options.authenticatorSelection ??= challenge.options.authenticator_selection;\n    delete this.options.pub_key_cred_params;\n    delete this.options.exclude_credentials;\n    delete this.options.authenticator_selection;\n\n    if (challenge.options.user) {\n      this.options.user.id = decodeBase64Url(challenge.options.user.id);\n    }\n\n    for (const credential of this.options.excludeCredentials ?? []) {\n      credential.id = decodeBase64Url(credential.id);\n    }\n  }\n\n  /**\n   * Answers this challenge by using the `CredentialsContainer` API to create a credential\n   * based on the the public key credential creation options from this challenge.\n   */\n  async createCredentialAndAnswer() {\n    const cred = await navigator.credentials.create({ publicKey: this.options });\n    await this.answer(cred);\n  }\n\n  /**\n   * Answers this challenge using a given credential `cred`;\n   * the credential should be obtained by calling\n   *\n   * ```\n   * const cred = await navigator.credentials.create({ publicKey: this.options });\n   * ```\n   *\n   * @param {any} cred Credential created by calling the `CredentialContainer`'s `create` method\n   *                   based on the public key creation options from this challenge.\n   */\n  async answer(cred: any) {\n    const answer = <PublicKeyCredential>{\n      id: cred.id,\n      response: {\n        clientDataJSON: encodeToBase64Url(cred.response.clientDataJSON),\n        attestationObject: encodeToBase64Url(cred.response.attestationObject),\n      },\n    };\n    await this.#cs.addFidoComplete(this.challengeId, answer);\n  }\n}\n\n/**\n * Returned after initiating MFA approval using FIDO.\n * Provides some helper methods for answering this challenge.\n */\nexport class MfaFidoChallenge {\n  readonly #ss: SignerSession;\n  readonly mfaId: string;\n  readonly challengeId: string;\n  readonly options: any;\n\n  /**\n   * @param {SignerSession} ss The session used to initiate MFA approval using FIDO\n   * @param {string} mfaId The MFA request id.\n   * @param {ApiMfaFidoChallenge} challenge The challenge returned by the remote end\n   */\n  constructor(ss: SignerSession, mfaId: string, challenge: ApiMfaFidoChallenge) {\n    this.#ss = ss;\n    this.mfaId = mfaId;\n    this.challengeId = challenge.challenge_id;\n\n    // fix options returned from the server: rename fields and decode base64 fields into uint8[]\n    this.options = {\n      ...challenge.options,\n      challenge: decodeBase64Url(challenge.options.challenge),\n    };\n    this.options.rpId ??= challenge.options.rp_id;\n    this.options.allowCredentials ??= challenge.options.allow_credentials;\n    this.options.userVerification ??= challenge.options.user_verification;\n    delete this.options.rp_id;\n    delete this.options.allow_credentials;\n    delete this.options.user_verification;\n\n    for (const credential of this.options.allowCredentials ?? []) {\n      credential.id = decodeBase64Url(credential.id);\n      if (credential.transports === null) {\n        delete credential.transports;\n      }\n    }\n  }\n\n  /**\n   * Answers this challenge by using the `CredentialsContainer` API to get a credential\n   * based on the the public key credential request options from this challenge.\n   */\n  async createCredentialAndAnswer(): Promise<MfaRequestInfo> {\n    const cred = await navigator.credentials.get({ publicKey: this.options });\n    return await this.answer(cred);\n  }\n\n  /**\n   * Answers this challenge using a given credential `cred`.\n   * To obtain this credential, for example, call\n   *\n   * ```\n   * const cred = await navigator.credentials.get({ publicKey: this.options });\n   * ```\n   *\n   * @param {any} cred Credential created by calling the `CredentialContainer`'s `get` method\n   *                   based on the public key credential request options from this challenge.\n   */\n  async answer(cred: any): Promise<MfaRequestInfo> {\n    const answer = <PublicKeyCredential>{\n      id: cred.id,\n      response: {\n        clientDataJSON: encodeToBase64Url(cred.response.clientDataJSON),\n        authenticatorData: encodeToBase64Url(cred.response.authenticatorData),\n        signature: encodeToBase64Url(cred.response.signature),\n      },\n    };\n    return await this.#ss.fidoApproveComplete(this.mfaId, this.challengeId, answer);\n  }\n}\n"]}
|
package/dist/src/index.d.ts
CHANGED
|
@@ -4,26 +4,54 @@ import { Org } from "./org";
|
|
|
4
4
|
import { SignerSessionStorage, SignerSessionManager } from "./session/signer_session_manager";
|
|
5
5
|
import { MfaRequestInfo, SignResponse, SignerSession } from "./signer_session";
|
|
6
6
|
import { CognitoSessionManager, CognitoSessionStorage } from "./session/cognito_manager";
|
|
7
|
+
import { AddFidoChallenge, PublicKeyCredential } from "./fido";
|
|
7
8
|
/** CubeSigner constructor options */
|
|
8
9
|
export interface CubeSignerOptions {
|
|
9
10
|
/** The environment to use */
|
|
10
11
|
env?: EnvInterface;
|
|
11
12
|
/** The management authorization token */
|
|
12
13
|
sessionMgr?: CognitoSessionManager | SignerSessionManager;
|
|
14
|
+
/** Optional organization id */
|
|
15
|
+
orgId?: string;
|
|
13
16
|
}
|
|
14
17
|
export type UserInfo = components["schemas"]["UserInfo"];
|
|
15
18
|
export type TotpInfo = components["responses"]["TotpInfo"]["content"]["application/json"];
|
|
16
19
|
export type ConfiguredMfa = components["schemas"]["ConfiguredMfa"];
|
|
17
20
|
export type RatchetConfig = components["schemas"]["RatchetConfig"];
|
|
21
|
+
export type IdentityProof = components["schemas"]["IdentityProof"];
|
|
18
22
|
type OidcAuthResponse = paths["/v0/org/{org_id}/oidc"]["post"]["responses"]["200"]["content"]["application/json"];
|
|
23
|
+
/** TOTP challenge that must be answered before user's TOTP is updated */
|
|
24
|
+
export declare class TotpChallenge {
|
|
25
|
+
#private;
|
|
26
|
+
/** The id of the challenge */
|
|
27
|
+
get totpId(): string;
|
|
28
|
+
/** The new TOTP configuration */
|
|
29
|
+
get totpUrl(): string;
|
|
30
|
+
/**
|
|
31
|
+
* @param {CubeSigner} cs Used when answering the challenge.
|
|
32
|
+
* @param {TotpInfo} totpInfo TOTP challenge information.
|
|
33
|
+
*/
|
|
34
|
+
constructor(cs: CubeSigner, totpInfo: TotpInfo);
|
|
35
|
+
/**
|
|
36
|
+
* Answer the challenge with the code that corresponds to this `this.totpUrl`.
|
|
37
|
+
* @param {string} code 6-digit code that corresponds to this `this.totpUrl`.
|
|
38
|
+
*/
|
|
39
|
+
answer(code: string): Promise<void>;
|
|
40
|
+
}
|
|
19
41
|
/** CubeSigner client */
|
|
20
42
|
export declare class CubeSigner {
|
|
21
43
|
#private;
|
|
22
44
|
readonly sessionMgr?: CognitoSessionManager | SignerSessionManager;
|
|
23
45
|
/** @return {EnvInterface} The CubeSigner environment of this client */
|
|
24
46
|
get env(): EnvInterface;
|
|
47
|
+
/**
|
|
48
|
+
* Set the organization ID
|
|
49
|
+
* @param {string} orgId The new organization id.
|
|
50
|
+
*/
|
|
51
|
+
setOrgId(orgId: string): void;
|
|
25
52
|
/**
|
|
26
53
|
* Loads an existing management session and creates a CubeSigner instance.
|
|
54
|
+
*
|
|
27
55
|
* @param {CognitoSessionStorage} storage Optional session storage to load
|
|
28
56
|
* the session from. If not specified, the management session from the config
|
|
29
57
|
* directory will be loaded.
|
|
@@ -53,15 +81,12 @@ export declare class CubeSigner {
|
|
|
53
81
|
* @return {Promise<SignerSessionManager>} The signer session manager
|
|
54
82
|
*/
|
|
55
83
|
oidcAuth(oidcToken: string, orgId: string, scopes: Array<string>, lifetimes?: RatchetConfig, storage?: SignerSessionStorage): Promise<SignerSessionManager>;
|
|
56
|
-
/** Retrieves information about the current user. */
|
|
57
|
-
aboutMe(): Promise<UserInfo>;
|
|
58
84
|
/**
|
|
59
|
-
*
|
|
60
|
-
* if and only if no TOTP configuration is already set.
|
|
85
|
+
* Retrieves information about the current user.
|
|
61
86
|
*
|
|
62
|
-
* @return {Promise<
|
|
87
|
+
* @return {Promise<UserInfo>} User information.
|
|
63
88
|
*/
|
|
64
|
-
|
|
89
|
+
aboutMe(): Promise<UserInfo>;
|
|
65
90
|
/**
|
|
66
91
|
* Retrieves existing MFA request.
|
|
67
92
|
*
|
|
@@ -71,10 +96,47 @@ export declare class CubeSigner {
|
|
|
71
96
|
*/
|
|
72
97
|
mfaGet(orgId: string, mfaId: string): Promise<MfaRequestInfo>;
|
|
73
98
|
/**
|
|
74
|
-
*
|
|
75
|
-
*
|
|
99
|
+
* List pending MFA requests accessible to the current user.
|
|
100
|
+
* @param {string} orgId Organization ID
|
|
101
|
+
* @return {Promise<MfaRequestInfo[]>} The MFA requests.
|
|
102
|
+
*/
|
|
103
|
+
mfaList(orgId: string): Promise<MfaRequestInfo[]>;
|
|
104
|
+
/**
|
|
105
|
+
* Approve a pending MFA request.
|
|
106
|
+
*
|
|
107
|
+
* @param {string} orgId The org id of the MFA request
|
|
108
|
+
* @param {string} mfaId The id of the MFA request
|
|
109
|
+
* @return {Promise<MfaRequestInfo>} The result of the MFA request
|
|
110
|
+
*/
|
|
111
|
+
mfaApprove(orgId: string, mfaId: string): Promise<MfaRequestInfo>;
|
|
112
|
+
/**
|
|
113
|
+
* Initiate adding a new FIDO device. MFA may be required.
|
|
114
|
+
* @param {string} name The name of the new device.
|
|
115
|
+
* @param {MfaReceipt} mfaReceipt Optional MFA receipt to include in HTTP headers
|
|
116
|
+
* @return {Promise<SignResponse<AddFidoChallenge>>} A challenge that must be answered in order to complete FIDO registration.
|
|
76
117
|
*/
|
|
77
|
-
|
|
118
|
+
addFidoStart(name: string, mfaReceipt?: MfaReceipt): Promise<SignResponse<AddFidoChallenge>>;
|
|
119
|
+
/**
|
|
120
|
+
* Complete a previously initiated request to add a new FIDO device.
|
|
121
|
+
* @param {string} challengeId The ID of the challenge returned by the remote end.
|
|
122
|
+
* @param {PublicKeyCredential} credential The answer to the challenge.
|
|
123
|
+
*/
|
|
124
|
+
addFidoComplete(challengeId: string, credential: PublicKeyCredential): Promise<void>;
|
|
125
|
+
/**
|
|
126
|
+
* Creates a request to change user's TOTP. This request returns a new TOTP challenge
|
|
127
|
+
* that must be answered by calling `resetTotpComplete`
|
|
128
|
+
*
|
|
129
|
+
* @param {MfaReceipt} mfaReceipt MFA receipt to include in HTTP headers
|
|
130
|
+
*/
|
|
131
|
+
resetTotpStart(mfaReceipt?: MfaReceipt): Promise<SignResponse<TotpChallenge>>;
|
|
132
|
+
/**
|
|
133
|
+
* Answer the TOTP challenge issued by `resetTotpStart`. If successful, user's
|
|
134
|
+
* TOTP configuration will be updated to that of the TOTP challenge.
|
|
135
|
+
*
|
|
136
|
+
* @param {string} totpId - The ID of the TOTP challenge
|
|
137
|
+
* @param {string} code - The TOTP code that should verify against the TOTP configuration from the challenge.
|
|
138
|
+
*/
|
|
139
|
+
resetTotpComplete(totpId: string, code: string): Promise<void>;
|
|
78
140
|
/**
|
|
79
141
|
* Verifies a given TOTP code against the current user's TOTP configuration.
|
|
80
142
|
* Throws an error if the verification fails.
|
|
@@ -86,11 +148,39 @@ export declare class CubeSigner {
|
|
|
86
148
|
* @return {Org} The organization.
|
|
87
149
|
* */
|
|
88
150
|
getOrg(orgId: string): Promise<Org>;
|
|
151
|
+
/**
|
|
152
|
+
* Deletes a given key.
|
|
153
|
+
* @param {string} orgId - Organization id
|
|
154
|
+
* @param {string} keyId - Key id
|
|
155
|
+
*/
|
|
156
|
+
deleteKey(orgId: string, keyId: string): Promise<void>;
|
|
89
157
|
/** Get the management client.
|
|
90
158
|
* @return {Client} The client.
|
|
91
159
|
* @internal
|
|
92
160
|
* */
|
|
93
161
|
management(): Promise<Client>;
|
|
162
|
+
/**
|
|
163
|
+
* Obtain a proof of authentication.
|
|
164
|
+
*
|
|
165
|
+
* @param {string} orgId The id of the organization that the user is in
|
|
166
|
+
* @return {Promise<IdentityProof>} Proof of authentication
|
|
167
|
+
*/
|
|
168
|
+
proveIdentity(orgId: string): Promise<IdentityProof>;
|
|
169
|
+
/**
|
|
170
|
+
* Exchange an OIDC token for a proof of authentication.
|
|
171
|
+
*
|
|
172
|
+
* @param {string} oidcToken The OIDC token
|
|
173
|
+
* @param {string} orgId The id of the organization that the user is in
|
|
174
|
+
* @return {Promise<IdentityProof>} Proof of authentication
|
|
175
|
+
*/
|
|
176
|
+
oidcProveIdentity(oidcToken: string, orgId: string): Promise<IdentityProof>;
|
|
177
|
+
/**
|
|
178
|
+
* Checks if a given identity proof is valid.
|
|
179
|
+
*
|
|
180
|
+
* @param {string} orgId The id of the organization that the user is in.
|
|
181
|
+
* @param {IdentityProof} identityProof The proof of authentication.
|
|
182
|
+
*/
|
|
183
|
+
verifyIdentity(orgId: string, identityProof: IdentityProof): Promise<void>;
|
|
94
184
|
/**
|
|
95
185
|
* Exchange an OIDC token for a CubeSigner session token.
|
|
96
186
|
* @param {string} oidcToken The OIDC token
|
|
@@ -106,6 +196,8 @@ export declare class CubeSigner {
|
|
|
106
196
|
export interface MfaReceipt {
|
|
107
197
|
/** MFA request ID */
|
|
108
198
|
mfaId: string;
|
|
199
|
+
/** Corresponding org ID */
|
|
200
|
+
mfaOrgId: string;
|
|
109
201
|
/** MFA confirmation code */
|
|
110
202
|
mfaConf: string;
|
|
111
203
|
}
|
|
@@ -117,6 +209,10 @@ export * from "./key";
|
|
|
117
209
|
export * from "./role";
|
|
118
210
|
/** Env */
|
|
119
211
|
export * from "./env";
|
|
212
|
+
/** Fido */
|
|
213
|
+
export * from "./fido";
|
|
214
|
+
/** Pagination */
|
|
215
|
+
export * from "./paginator";
|
|
120
216
|
/** Sessions */
|
|
121
217
|
export * from "./signer_session";
|
|
122
218
|
/** Session storage */
|