@cubist-labs/cubesigner-sdk 0.1.77 → 0.2.15
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/package.json +68 -0
- package/dist/src/api.d.ts +493 -0
- package/dist/src/api.js +1166 -0
- package/dist/src/client.d.ts +534 -10
- package/dist/src/client.js +355 -19
- package/dist/src/ethers/index.d.ts +34 -9
- package/dist/src/ethers/index.js +63 -19
- package/dist/src/index.d.ts +51 -70
- package/dist/src/index.js +83 -237
- package/dist/src/key.d.ts +35 -64
- package/dist/src/key.js +32 -96
- package/dist/src/mfa.d.ts +85 -14
- package/dist/src/mfa.js +146 -40
- package/dist/src/org.d.ts +42 -194
- package/dist/src/org.js +52 -336
- package/dist/src/paginator.js +1 -1
- package/dist/src/response.d.ts +101 -0
- package/dist/src/response.js +164 -0
- package/dist/src/role.d.ts +87 -83
- package/dist/src/role.js +79 -136
- package/dist/src/schema.d.ts +936 -28
- package/dist/src/schema.js +1 -1
- package/dist/src/schema_types.d.ts +109 -0
- package/dist/src/schema_types.js +3 -0
- package/dist/src/session/cognito_manager.d.ts +15 -3
- package/dist/src/session/cognito_manager.js +23 -5
- package/dist/src/session/session_manager.d.ts +1 -1
- package/dist/src/session/session_manager.js +3 -11
- package/dist/src/session/session_storage.js +1 -1
- package/dist/src/session/signer_session_manager.d.ts +10 -29
- package/dist/src/session/signer_session_manager.js +21 -80
- package/dist/src/signer_session.d.ts +15 -252
- package/dist/src/signer_session.js +25 -424
- package/dist/src/user_export.d.ts +52 -0
- package/dist/src/user_export.js +129 -0
- package/dist/src/util.d.ts +15 -0
- package/dist/src/util.js +33 -11
- package/package.json +13 -11
- package/src/api.ts +1395 -0
- package/src/client.ts +413 -12
- package/src/ethers/index.ts +74 -28
- package/src/index.ts +96 -273
- package/src/key.ts +36 -131
- package/src/{fido.ts → mfa.ts} +62 -38
- package/src/org.ts +54 -405
- package/src/response.ts +196 -0
- package/src/role.ts +113 -184
- package/src/schema.ts +936 -28
- package/src/schema_types.ts +110 -0
- package/src/session/cognito_manager.ts +33 -6
- package/src/session/session_manager.ts +2 -8
- package/src/session/signer_session_manager.ts +29 -110
- package/src/signer_session.ts +22 -597
- package/src/user_export.ts +116 -0
- package/src/util.ts +29 -10
|
@@ -0,0 +1,164 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
3
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
4
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
5
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
6
|
+
};
|
|
7
|
+
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
8
|
+
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
9
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
10
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
11
|
+
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
12
|
+
};
|
|
13
|
+
var _CubeSignerResponse_requestFn, _CubeSignerResponse_resp, _CubeSignerResponse_mfaRequired;
|
|
14
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
+
exports.CubeSignerResponse = exports.mapResponse = void 0;
|
|
16
|
+
/**
|
|
17
|
+
* Take a {@link Response<U>} and a {@link MapFn<U, V>} function and return
|
|
18
|
+
* a {@link Response<V>} that maps the value of the original response when its status code is 200.
|
|
19
|
+
*
|
|
20
|
+
* @param {Response<U>} resp Original response
|
|
21
|
+
* @param {Map<U, V>} mapFn Map to apply to the response value when its status code is 200.
|
|
22
|
+
* @return {Response<V>} Response whose value for status code 200 is mapped from U to V
|
|
23
|
+
*/
|
|
24
|
+
function mapResponse(resp, mapFn) {
|
|
25
|
+
if (resp.accepted?.MfaRequired) {
|
|
26
|
+
return resp;
|
|
27
|
+
}
|
|
28
|
+
else {
|
|
29
|
+
return mapFn(resp);
|
|
30
|
+
}
|
|
31
|
+
}
|
|
32
|
+
exports.mapResponse = mapResponse;
|
|
33
|
+
/**
|
|
34
|
+
* A response of a CubeSigner request.
|
|
35
|
+
*/
|
|
36
|
+
class CubeSignerResponse {
|
|
37
|
+
/** @return {string} The MFA id associated with this request (if any) */
|
|
38
|
+
mfaId() {
|
|
39
|
+
return __classPrivateFieldGet(this, _CubeSignerResponse_mfaRequired, "f").id;
|
|
40
|
+
}
|
|
41
|
+
/** @return {boolean} True if this request requires an MFA approval */
|
|
42
|
+
requiresMfa() {
|
|
43
|
+
return __classPrivateFieldGet(this, _CubeSignerResponse_mfaRequired, "f") !== undefined;
|
|
44
|
+
}
|
|
45
|
+
/**
|
|
46
|
+
* Return session information to use for any MFA approval requests (if any was included in the response).
|
|
47
|
+
* @return {ClientSessionInfo | undefined}
|
|
48
|
+
*/
|
|
49
|
+
mfaSessionInfo() {
|
|
50
|
+
return __classPrivateFieldGet(this, _CubeSignerResponse_resp, "f").accepted?.MfaRequired?.session ?? undefined;
|
|
51
|
+
}
|
|
52
|
+
/** @return {U} The response data, if no MFA is required */
|
|
53
|
+
data() {
|
|
54
|
+
if (this.requiresMfa()) {
|
|
55
|
+
throw new Error("Cannot call `data()` while MFA is required");
|
|
56
|
+
}
|
|
57
|
+
return __classPrivateFieldGet(this, _CubeSignerResponse_resp, "f");
|
|
58
|
+
}
|
|
59
|
+
/**
|
|
60
|
+
* Approve the MFA request using a given session and a TOTP code.
|
|
61
|
+
*
|
|
62
|
+
* @param {SignerSession} session Signer session to use
|
|
63
|
+
* @param {string} code 6-digit TOTP code
|
|
64
|
+
* @return {CubeSignerResponse<U>} The result of signing with the approval
|
|
65
|
+
*/
|
|
66
|
+
async approveTotp(session, code) {
|
|
67
|
+
if (!this.requiresMfa()) {
|
|
68
|
+
return this;
|
|
69
|
+
}
|
|
70
|
+
const mfaId = this.mfaId();
|
|
71
|
+
const mfaOrgId = __classPrivateFieldGet(this, _CubeSignerResponse_mfaRequired, "f").org_id;
|
|
72
|
+
const mfaApproval = await session.mfaApproveTotp(mfaId, code);
|
|
73
|
+
const mfaConf = mfaApproval.receipt?.confirmation;
|
|
74
|
+
if (!mfaConf) {
|
|
75
|
+
return this;
|
|
76
|
+
}
|
|
77
|
+
return await this.signWithMfaApproval({ mfaId, mfaOrgId, mfaConf });
|
|
78
|
+
}
|
|
79
|
+
/**
|
|
80
|
+
* Approve the MFA request using a given `CubeSignerClient` instance (i.e., its session).
|
|
81
|
+
*
|
|
82
|
+
* @param {CubeSignerClient} cs CubeSigner whose session to use
|
|
83
|
+
* @return {CubeSignerResponse<U>} The result of signing with the approval
|
|
84
|
+
*/
|
|
85
|
+
async approve(cs) {
|
|
86
|
+
if (!this.requiresMfa()) {
|
|
87
|
+
return this;
|
|
88
|
+
}
|
|
89
|
+
const mfaId = __classPrivateFieldGet(this, _CubeSignerResponse_mfaRequired, "f").id;
|
|
90
|
+
const mfaOrgId = __classPrivateFieldGet(this, _CubeSignerResponse_mfaRequired, "f").org_id;
|
|
91
|
+
const mfaApproval = await cs.mfaApprove(mfaId);
|
|
92
|
+
const mfaConf = mfaApproval.receipt?.confirmation;
|
|
93
|
+
if (!mfaConf) {
|
|
94
|
+
return this;
|
|
95
|
+
}
|
|
96
|
+
return await this.signWithMfaApproval({ mfaId, mfaOrgId, mfaConf });
|
|
97
|
+
}
|
|
98
|
+
/**
|
|
99
|
+
* Resubmits the request with a given MFA receipt attached.
|
|
100
|
+
*
|
|
101
|
+
* @param {MfaReceipt} mfaReceipt The MFA receipt
|
|
102
|
+
* @return {Promise<CubeSignerResponse<U>>} The result of signing after MFA approval
|
|
103
|
+
*/
|
|
104
|
+
async signWithMfaApproval(mfaReceipt) {
|
|
105
|
+
const headers = CubeSignerResponse.getMfaHeaders(mfaReceipt);
|
|
106
|
+
return new CubeSignerResponse(__classPrivateFieldGet(this, _CubeSignerResponse_requestFn, "f"), await __classPrivateFieldGet(this, _CubeSignerResponse_requestFn, "f").call(this, headers));
|
|
107
|
+
}
|
|
108
|
+
// --------------------------------------------------------------------------
|
|
109
|
+
// -- INTERNAL --------------------------------------------------------------
|
|
110
|
+
// --------------------------------------------------------------------------
|
|
111
|
+
/**
|
|
112
|
+
* Constructor.
|
|
113
|
+
*
|
|
114
|
+
* @param {RequestFn} requestFn
|
|
115
|
+
* The signing function that this response is from.
|
|
116
|
+
* This argument is used to resend requests with different headers if needed.
|
|
117
|
+
* @param {U | AcceptedResponse} resp The response as returned by the OpenAPI client.
|
|
118
|
+
* @internal
|
|
119
|
+
*/
|
|
120
|
+
constructor(requestFn, resp) {
|
|
121
|
+
_CubeSignerResponse_requestFn.set(this, void 0);
|
|
122
|
+
_CubeSignerResponse_resp.set(this, void 0);
|
|
123
|
+
/**
|
|
124
|
+
* Optional MFA id. Only set if there is an MFA request associated with the
|
|
125
|
+
* signing request
|
|
126
|
+
*/
|
|
127
|
+
_CubeSignerResponse_mfaRequired.set(this, void 0);
|
|
128
|
+
__classPrivateFieldSet(this, _CubeSignerResponse_requestFn, requestFn, "f");
|
|
129
|
+
__classPrivateFieldSet(this, _CubeSignerResponse_resp, resp, "f");
|
|
130
|
+
__classPrivateFieldSet(this, _CubeSignerResponse_mfaRequired, __classPrivateFieldGet(this, _CubeSignerResponse_resp, "f").accepted?.MfaRequired, "f");
|
|
131
|
+
}
|
|
132
|
+
/**
|
|
133
|
+
* Static constructor.
|
|
134
|
+
* @param {RequestFn} requestFn
|
|
135
|
+
* The request function that this response is from.
|
|
136
|
+
* This argument is used to resend requests with different headers if needed.
|
|
137
|
+
* @param {MfaReceipt} mfaReceipt Optional MFA receipt
|
|
138
|
+
* @return {Promise<CubeSignerResponse<U>>} New instance of this class.
|
|
139
|
+
* @internal
|
|
140
|
+
*/
|
|
141
|
+
static async create(requestFn, mfaReceipt) {
|
|
142
|
+
const seed = await requestFn(this.getMfaHeaders(mfaReceipt));
|
|
143
|
+
return new CubeSignerResponse(requestFn, seed);
|
|
144
|
+
}
|
|
145
|
+
/**
|
|
146
|
+
* Return HTTP headers containing a given MFA receipt.
|
|
147
|
+
*
|
|
148
|
+
* @param {MfaReceipt} mfaReceipt MFA receipt
|
|
149
|
+
* @return {HeadersInit} Headers including that receipt
|
|
150
|
+
* @internal
|
|
151
|
+
*/
|
|
152
|
+
static getMfaHeaders(mfaReceipt) {
|
|
153
|
+
return mfaReceipt
|
|
154
|
+
? {
|
|
155
|
+
"x-cubist-mfa-id": mfaReceipt.mfaId,
|
|
156
|
+
"x-cubist-mfa-org-id": mfaReceipt.mfaOrgId,
|
|
157
|
+
"x-cubist-mfa-confirmation": mfaReceipt.mfaConf,
|
|
158
|
+
}
|
|
159
|
+
: undefined;
|
|
160
|
+
}
|
|
161
|
+
}
|
|
162
|
+
exports.CubeSignerResponse = CubeSignerResponse;
|
|
163
|
+
_CubeSignerResponse_requestFn = new WeakMap(), _CubeSignerResponse_resp = new WeakMap(), _CubeSignerResponse_mfaRequired = new WeakMap();
|
|
164
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"response.js","sourceRoot":"","sources":["../../src/response.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAqBA;;;;;;;GAOG;AACH,SAAgB,WAAW,CAAO,IAAiB,EAAE,KAAkB;IACrE,IAAK,IAAyB,CAAC,QAAQ,EAAE,WAAW,EAAE,CAAC;QACrD,OAAO,IAAwB,CAAC;IAClC,CAAC;SAAM,CAAC;QACN,OAAO,KAAK,CAAC,IAAS,CAAC,CAAC;IAC1B,CAAC;AACH,CAAC;AAND,kCAMC;AAWD;;GAEG;AACH,MAAa,kBAAkB;IAS7B,wEAAwE;IACxE,KAAK;QACH,OAAO,uBAAA,IAAI,uCAAc,CAAC,EAAE,CAAC;IAC/B,CAAC;IAED,sEAAsE;IACtE,WAAW;QACT,OAAO,uBAAA,IAAI,uCAAa,KAAK,SAAS,CAAC;IACzC,CAAC;IAED;;;OAGG;IACH,cAAc;QACZ,OAAQ,uBAAA,IAAI,gCAA2B,CAAC,QAAQ,EAAE,WAAW,EAAE,OAAO,IAAI,SAAS,CAAC;IACtF,CAAC;IAED,2DAA2D;IAC3D,IAAI;QACF,IAAI,IAAI,CAAC,WAAW,EAAE,EAAE,CAAC;YACvB,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAC;QAChE,CAAC;QACD,OAAO,uBAAA,IAAI,gCAAW,CAAC;IACzB,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,WAAW,CAAC,OAAsB,EAAE,IAAY;QACpD,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,EAAE,CAAC;YACxB,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,KAAK,GAAG,IAAI,CAAC,KAAK,EAAE,CAAC;QAC3B,MAAM,QAAQ,GAAG,uBAAA,IAAI,uCAAc,CAAC,MAAM,CAAC;QAC3C,MAAM,WAAW,GAAG,MAAM,OAAO,CAAC,cAAc,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;QAC9D,MAAM,OAAO,GAAG,WAAW,CAAC,OAAO,EAAE,YAAY,CAAC;QAElD,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,IAAI,CAAC;QACd,CAAC;QAED,OAAO,MAAM,IAAI,CAAC,mBAAmB,CAAC,EAAE,KAAK,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC,CAAC;IACtE,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,OAAO,CAAC,EAAoB;QAChC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,EAAE,CAAC;YACxB,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,KAAK,GAAG,uBAAA,IAAI,uCAAc,CAAC,EAAE,CAAC;QACpC,MAAM,QAAQ,GAAG,uBAAA,IAAI,uCAAc,CAAC,MAAM,CAAC;QAE3C,MAAM,WAAW,GAAG,MAAM,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC;QAC/C,MAAM,OAAO,GAAG,WAAW,CAAC,OAAO,EAAE,YAAY,CAAC;QAElD,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,IAAI,CAAC;QACd,CAAC;QAED,OAAO,MAAM,IAAI,CAAC,mBAAmB,CAAC,EAAE,KAAK,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC,CAAC;IACtE,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,mBAAmB,CAAC,UAAsB;QAC9C,MAAM,OAAO,GAAG,kBAAkB,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC;QAC7D,OAAO,IAAI,kBAAkB,CAAC,uBAAA,IAAI,qCAAW,EAAE,MAAM,uBAAA,IAAI,qCAAW,MAAf,IAAI,EAAY,OAAO,CAAC,CAAC,CAAC;IACjF,CAAC;IAED,6EAA6E;IAC7E,6EAA6E;IAC7E,6EAA6E;IAE7E;;;;;;;;OAQG;IACH,YAAY,SAAuB,EAAE,IAA0B;QA1GtD,gDAAyB;QACzB,2CAA4B;QACrC;;;WAGG;QACM,kDAA2B;QAqGlC,uBAAA,IAAI,iCAAc,SAAS,MAAA,CAAC;QAC5B,uBAAA,IAAI,4BAAS,IAAI,MAAA,CAAC;QAClB,uBAAA,IAAI,mCAAiB,uBAAA,IAAI,gCAA2B,CAAC,QAAQ,EAAE,WAAW,MAAA,CAAC;IAC7E,CAAC;IAED;;;;;;;;OAQG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,SAAuB,EACvB,UAAuB;QAEvB,MAAM,IAAI,GAAG,MAAM,SAAS,CAAC,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC,CAAC;QAC7D,OAAO,IAAI,kBAAkB,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;IACjD,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,aAAa,CAAC,UAAuB;QAC1C,OAAO,UAAU;YACf,CAAC,CAAC;gBACE,iBAAiB,EAAE,UAAU,CAAC,KAAK;gBACnC,qBAAqB,EAAE,UAAU,CAAC,QAAQ;gBAC1C,2BAA2B,EAAE,UAAU,CAAC,OAAO;aAChD;YACH,CAAC,CAAC,SAAS,CAAC;IAChB,CAAC;CACF;AAlJD,gDAkJC","sourcesContent":["import { CubeSignerClient, SignerSession } from \".\";\nimport { MfaReceipt } from \"./mfa\";\nimport { AcceptedResponse, NewSessionResponse } from \"./schema_types\";\n\n/**\n * Response type, which can be either a value of type {@link U}\n * or {@link AcceptedResponse} (status code 202) which requires MFA.\n */\nexport type Response<U> = U | AcceptedResponse;\n\n/**\n * Request function which optionally takes additional headers\n * (which, for example, can be used to attach an MFA receipt).\n */\nexport type RequestFn<U> = (headers?: HeadersInit) => Promise<Response<U>>;\n\n/**\n * Map function occasionally used to map a response from the API into a higher-level type.\n */\nexport type MapFn<U, V> = (u: U) => V;\n\n/**\n * Take a {@link Response<U>} and a {@link MapFn<U, V>} function and return\n * a {@link Response<V>} that maps the value of the original response when its status code is 200.\n *\n * @param {Response<U>} resp Original response\n * @param {Map<U, V>} mapFn Map to apply to the response value when its status code is 200.\n * @return {Response<V>} Response whose value for status code 200 is mapped from U to V\n */\nexport function mapResponse<U, V>(resp: Response<U>, mapFn: MapFn<U, V>): Response<V> {\n  if ((resp as AcceptedResponse).accepted?.MfaRequired) {\n    return resp as AcceptedResponse;\n  } else {\n    return mapFn(resp as U);\n  }\n}\n\nexport interface MfaRequired {\n  /** Org id */\n  org_id: string;\n  /** MFA request id */\n  id: string;\n  /** Optional MFA session */\n  session?: NewSessionResponse | null;\n}\n\n/**\n * A response of a CubeSigner request.\n */\nexport class CubeSignerResponse<U> {\n  readonly #requestFn: RequestFn<U>;\n  readonly #resp: U | AcceptedResponse;\n  /**\n   * Optional MFA id. Only set if there is an MFA request associated with the\n   * signing request\n   */\n  readonly #mfaRequired?: MfaRequired;\n\n  /** @return {string} The MFA id associated with this request (if any) */\n  mfaId(): string {\n    return this.#mfaRequired!.id;\n  }\n\n  /** @return {boolean} True if this request requires an MFA approval */\n  requiresMfa(): boolean {\n    return this.#mfaRequired !== undefined;\n  }\n\n  /**\n   * Return session information to use for any MFA approval requests (if any was included in the response).\n   * @return {ClientSessionInfo | undefined}\n   */\n  mfaSessionInfo(): NewSessionResponse | undefined {\n    return (this.#resp as AcceptedResponse).accepted?.MfaRequired?.session ?? undefined;\n  }\n\n  /** @return {U} The response data, if no MFA is required */\n  data(): U {\n    if (this.requiresMfa()) {\n      throw new Error(\"Cannot call `data()` while MFA is required\");\n    }\n    return this.#resp as U;\n  }\n\n  /**\n   * Approve the MFA request using a given session and a TOTP code.\n   *\n   * @param {SignerSession} session Signer session to use\n   * @param {string} code 6-digit TOTP code\n   * @return {CubeSignerResponse<U>} The result of signing with the approval\n   */\n  async approveTotp(session: SignerSession, code: string): Promise<CubeSignerResponse<U>> {\n    if (!this.requiresMfa()) {\n      return this;\n    }\n\n    const mfaId = this.mfaId();\n    const mfaOrgId = this.#mfaRequired!.org_id;\n    const mfaApproval = await session.mfaApproveTotp(mfaId, code);\n    const mfaConf = mfaApproval.receipt?.confirmation;\n\n    if (!mfaConf) {\n      return this;\n    }\n\n    return await this.signWithMfaApproval({ mfaId, mfaOrgId, mfaConf });\n  }\n\n  /**\n   * Approve the MFA request using a given `CubeSignerClient` instance (i.e., its session).\n   *\n   * @param {CubeSignerClient} cs CubeSigner whose session to use\n   * @return {CubeSignerResponse<U>} The result of signing with the approval\n   */\n  async approve(cs: CubeSignerClient): Promise<CubeSignerResponse<U>> {\n    if (!this.requiresMfa()) {\n      return this;\n    }\n\n    const mfaId = this.#mfaRequired!.id;\n    const mfaOrgId = this.#mfaRequired!.org_id;\n\n    const mfaApproval = await cs.mfaApprove(mfaId);\n    const mfaConf = mfaApproval.receipt?.confirmation;\n\n    if (!mfaConf) {\n      return this;\n    }\n\n    return await this.signWithMfaApproval({ mfaId, mfaOrgId, mfaConf });\n  }\n\n  /**\n   * Resubmits the request with a given MFA receipt attached.\n   *\n   * @param {MfaReceipt} mfaReceipt The MFA receipt\n   * @return {Promise<CubeSignerResponse<U>>} The result of signing after MFA approval\n   */\n  async signWithMfaApproval(mfaReceipt: MfaReceipt): Promise<CubeSignerResponse<U>> {\n    const headers = CubeSignerResponse.getMfaHeaders(mfaReceipt);\n    return new CubeSignerResponse(this.#requestFn, await this.#requestFn(headers));\n  }\n\n  // --------------------------------------------------------------------------\n  // -- INTERNAL --------------------------------------------------------------\n  // --------------------------------------------------------------------------\n\n  /**\n   * Constructor.\n   *\n   * @param {RequestFn} requestFn\n   *    The signing function that this response is from.\n   *    This argument is used to resend requests with different headers if needed.\n   * @param {U | AcceptedResponse} resp The response as returned by the OpenAPI client.\n   * @internal\n   */\n  constructor(requestFn: RequestFn<U>, resp: U | AcceptedResponse) {\n    this.#requestFn = requestFn;\n    this.#resp = resp;\n    this.#mfaRequired = (this.#resp as AcceptedResponse).accepted?.MfaRequired;\n  }\n\n  /**\n   * Static constructor.\n   * @param {RequestFn} requestFn\n   *    The request function that this response is from.\n   *    This argument is used to resend requests with different headers if needed.\n   * @param {MfaReceipt} mfaReceipt Optional MFA receipt\n   * @return {Promise<CubeSignerResponse<U>>} New instance of this class.\n   * @internal\n   */\n  static async create<U>(\n    requestFn: RequestFn<U>,\n    mfaReceipt?: MfaReceipt,\n  ): Promise<CubeSignerResponse<U>> {\n    const seed = await requestFn(this.getMfaHeaders(mfaReceipt));\n    return new CubeSignerResponse(requestFn, seed);\n  }\n\n  /**\n   * Return HTTP headers containing a given MFA receipt.\n   *\n   * @param {MfaReceipt} mfaReceipt MFA receipt\n   * @return {HeadersInit} Headers including that receipt\n   * @internal\n   */\n  static getMfaHeaders(mfaReceipt?: MfaReceipt): HeadersInit | undefined {\n    return mfaReceipt\n      ? {\n          \"x-cubist-mfa-id\": mfaReceipt.mfaId,\n          \"x-cubist-mfa-org-id\": mfaReceipt.mfaOrgId,\n          \"x-cubist-mfa-confirmation\": mfaReceipt.mfaConf,\n        }\n      : undefined;\n  }\n}\n"]}
|
package/dist/src/role.d.ts
CHANGED
|
@@ -1,17 +1,17 @@
|
|
|
1
|
-
import {
|
|
2
|
-
import {
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
1
|
+
import { Key, KeyWithPoliciesInfo, MfaType, PageOpts, RoleInfo, SignerSession, SignerSessionInfo, SignerSessionLifetime, SignerSessionStorage } from ".";
|
|
2
|
+
import { CubeSignerClient } from "./client";
|
|
3
|
+
/**
|
|
4
|
+
* Restrict transaction receiver.
|
|
5
|
+
*
|
|
6
6
|
* @example { TxReceiver: "0x8c594691c0e592ffa21f153a16ae41db5befcaaa" }
|
|
7
|
-
|
|
7
|
+
*/
|
|
8
8
|
export type TxReceiver = {
|
|
9
9
|
TxReceiver: string;
|
|
10
10
|
};
|
|
11
11
|
/** The kind of deposit contracts. */
|
|
12
12
|
export declare enum DepositContract {
|
|
13
13
|
/** Canonical deposit contract */
|
|
14
|
-
Canonical = 0
|
|
14
|
+
Canonical = 0,// eslint-disable-line no-unused-vars
|
|
15
15
|
/** Wrapper deposit contract */
|
|
16
16
|
Wrapper = 1
|
|
17
17
|
}
|
|
@@ -23,18 +23,22 @@ export type TxDepositBase = {
|
|
|
23
23
|
kind: DepositContract;
|
|
24
24
|
};
|
|
25
25
|
};
|
|
26
|
-
/**
|
|
27
|
-
*
|
|
28
|
-
*
|
|
26
|
+
/**
|
|
27
|
+
* Restrict transactions to calls to deposit contract with fixed validator (pubkey):
|
|
28
|
+
*
|
|
29
|
+
* @example { TxDeposit: { kind: DespositContract.Canonical, validator: { pubkey: "8879...8"} }}
|
|
30
|
+
*/
|
|
29
31
|
export type TxDepositPubkey = {
|
|
30
32
|
TxDeposit: {
|
|
31
33
|
kind: DepositContract;
|
|
32
34
|
pubkey: string;
|
|
33
35
|
};
|
|
34
36
|
};
|
|
35
|
-
/**
|
|
37
|
+
/**
|
|
38
|
+
* Restrict transactions to calls to deposit contract with any validator key in a role:
|
|
39
|
+
*
|
|
36
40
|
* @example { TxDeposit: { kind: DespositContract.Canonical, validator: { role_id: "Role#c63...af"} }}
|
|
37
|
-
|
|
41
|
+
*/
|
|
38
42
|
export type TxDepositRole = {
|
|
39
43
|
TxDeposit: {
|
|
40
44
|
kind: DepositContract;
|
|
@@ -43,14 +47,16 @@ export type TxDepositRole = {
|
|
|
43
47
|
};
|
|
44
48
|
/** All different kinds of sensitive operations. */
|
|
45
49
|
export declare enum OperationKind {
|
|
46
|
-
BlobSign = "BlobSign"
|
|
47
|
-
EvmSign = "Eth1Sign"
|
|
48
|
-
Eth2Sign = "Eth2Sign"
|
|
49
|
-
Eth2Stake = "Eth2Stake"
|
|
50
|
-
Eth2Unstake = "Eth2Unstake"
|
|
50
|
+
BlobSign = "BlobSign",// eslint-disable-line no-unused-vars
|
|
51
|
+
EvmSign = "Eth1Sign",// eslint-disable-line no-unused-vars
|
|
52
|
+
Eth2Sign = "Eth2Sign",// eslint-disable-line no-unused-vars
|
|
53
|
+
Eth2Stake = "Eth2Stake",// eslint-disable-line no-unused-vars
|
|
54
|
+
Eth2Unstake = "Eth2Unstake",// eslint-disable-line no-unused-vars
|
|
51
55
|
SolanaSign = "SolanaSign"
|
|
52
56
|
}
|
|
53
|
-
/**
|
|
57
|
+
/**
|
|
58
|
+
* MFA policy
|
|
59
|
+
*
|
|
54
60
|
* @example {
|
|
55
61
|
* {
|
|
56
62
|
* count: 1,
|
|
@@ -58,7 +64,7 @@ export declare enum OperationKind {
|
|
|
58
64
|
* allowed_mfa_types: [ "Totp" ],
|
|
59
65
|
* allowed_approvers: [ "User#123" ],
|
|
60
66
|
* }
|
|
61
|
-
|
|
67
|
+
*/
|
|
62
68
|
export type MfaPolicy = {
|
|
63
69
|
count?: number;
|
|
64
70
|
num_auth_factors?: number;
|
|
@@ -66,7 +72,9 @@ export type MfaPolicy = {
|
|
|
66
72
|
allowed_mfa_types?: MfaType[];
|
|
67
73
|
restricted_operations?: OperationKind[];
|
|
68
74
|
};
|
|
69
|
-
/**
|
|
75
|
+
/**
|
|
76
|
+
* Require MFA for transactions.
|
|
77
|
+
*
|
|
70
78
|
* @example {
|
|
71
79
|
* RequireMfa: {
|
|
72
80
|
* count: 1,
|
|
@@ -78,14 +86,16 @@ export type MfaPolicy = {
|
|
|
78
86
|
* ]
|
|
79
87
|
* }
|
|
80
88
|
* }
|
|
81
|
-
|
|
89
|
+
*/
|
|
82
90
|
export type RequireMfa = {
|
|
83
91
|
RequireMfa: MfaPolicy;
|
|
84
92
|
};
|
|
85
93
|
/** Allow raw blob signing */
|
|
86
94
|
export declare const AllowRawBlobSigning: "AllowRawBlobSigning";
|
|
87
95
|
export type AllowRawBlobSigning = typeof AllowRawBlobSigning;
|
|
88
|
-
/**
|
|
96
|
+
/**
|
|
97
|
+
* Key policy
|
|
98
|
+
*
|
|
89
99
|
* @example [
|
|
90
100
|
* {
|
|
91
101
|
* "TxReceiver": "0x8c594691c0e592ffa21f153a16ae41db5befcaaa"
|
|
@@ -106,7 +116,7 @@ export type AllowRawBlobSigning = typeof AllowRawBlobSigning;
|
|
|
106
116
|
* }
|
|
107
117
|
* }
|
|
108
118
|
* ]
|
|
109
|
-
|
|
119
|
+
*/
|
|
110
120
|
export type KeyPolicy = (TxReceiver | TxDeposit | RequireMfa | AllowRawBlobSigning)[];
|
|
111
121
|
/** A key guarded by a policy. */
|
|
112
122
|
export declare class KeyWithPolicies {
|
|
@@ -115,13 +125,13 @@ export declare class KeyWithPolicies {
|
|
|
115
125
|
readonly policy?: KeyPolicy;
|
|
116
126
|
/** @return {Promise<Key>} The key */
|
|
117
127
|
getKey(): Promise<Key>;
|
|
118
|
-
/**
|
|
119
|
-
*
|
|
120
|
-
* @param {
|
|
128
|
+
/**
|
|
129
|
+
* Constructor.
|
|
130
|
+
* @param {CubeSignerClient} csc The CubeSigner instance to use for signing.
|
|
121
131
|
* @param {KeyWithPoliciesInfo} keyWithPolicies The key and its policies
|
|
122
132
|
* @internal
|
|
123
|
-
|
|
124
|
-
constructor(
|
|
133
|
+
*/
|
|
134
|
+
constructor(csc: CubeSignerClient, keyWithPolicies: KeyWithPoliciesInfo);
|
|
125
135
|
}
|
|
126
136
|
/** Roles. */
|
|
127
137
|
export declare class Role {
|
|
@@ -131,7 +141,7 @@ export declare class Role {
|
|
|
131
141
|
/**
|
|
132
142
|
* The ID of the role.
|
|
133
143
|
* @example Role#bfe3eccb-731e-430d-b1e5-ac1363e6b06b
|
|
134
|
-
|
|
144
|
+
*/
|
|
135
145
|
readonly id: string;
|
|
136
146
|
/** Delete the role. */
|
|
137
147
|
delete(): Promise<void>;
|
|
@@ -141,96 +151,90 @@ export declare class Role {
|
|
|
141
151
|
enable(): Promise<void>;
|
|
142
152
|
/** Disable the role. */
|
|
143
153
|
disable(): Promise<void>;
|
|
144
|
-
/**
|
|
154
|
+
/**
|
|
155
|
+
* The list of all users with access to the role.
|
|
145
156
|
* @example [
|
|
146
157
|
* "User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f",
|
|
147
158
|
* "User#5593c25b-52e2-4fb5-b39b-96d41d681d82"
|
|
148
159
|
* ]
|
|
149
|
-
*
|
|
150
|
-
|
|
151
|
-
|
|
152
|
-
|
|
160
|
+
*
|
|
161
|
+
* @param {PageOpts} page Optional pagination options; by default, retrieves all users.
|
|
162
|
+
*/
|
|
163
|
+
users(page?: PageOpts): Promise<string[]>;
|
|
164
|
+
/**
|
|
165
|
+
* Add an existing user to an existing role.
|
|
166
|
+
*
|
|
153
167
|
* @param {string} userId The user-id of the user to add to the role.
|
|
154
|
-
|
|
168
|
+
*/
|
|
155
169
|
addUser(userId: string): Promise<void>;
|
|
156
|
-
/**
|
|
170
|
+
/**
|
|
171
|
+
* The list of keys in the role.
|
|
157
172
|
* @example [
|
|
158
173
|
* {
|
|
159
174
|
* id: "Key#bfe3eccb-731e-430d-b1e5-ac1363e6b06b",
|
|
160
175
|
* policy: { TxReceiver: "0x8c594691c0e592ffa21f153a16ae41db5befcaaa" }
|
|
161
176
|
* },
|
|
162
177
|
* ]
|
|
163
|
-
*
|
|
164
|
-
|
|
165
|
-
|
|
166
|
-
|
|
178
|
+
*
|
|
179
|
+
* @param {PageOpts} page Optional pagination options; by default, retrieves all keys in this role.
|
|
180
|
+
*/
|
|
181
|
+
keys(page?: PageOpts): Promise<KeyWithPolicies[]>;
|
|
182
|
+
/**
|
|
183
|
+
* Add a list of existing keys to an existing role.
|
|
184
|
+
*
|
|
167
185
|
* @param {Key[]} keys The list of keys to add to the role.
|
|
168
186
|
* @param {KeyPolicy?} policy The optional policy to apply to each key.
|
|
169
|
-
|
|
187
|
+
*/
|
|
170
188
|
addKeys(keys: Key[], policy?: KeyPolicy): Promise<void>;
|
|
171
|
-
/**
|
|
172
|
-
*
|
|
189
|
+
/**
|
|
190
|
+
* Add an existing key to an existing role.
|
|
191
|
+
*
|
|
173
192
|
* @param {Key} key The key to add to the role.
|
|
174
193
|
* @param {KeyPolicy?} policy The optional policy to apply to the key.
|
|
175
|
-
|
|
194
|
+
*/
|
|
176
195
|
addKey(key: Key, policy?: KeyPolicy): Promise<void>;
|
|
177
|
-
/**
|
|
178
|
-
*
|
|
196
|
+
/**
|
|
197
|
+
* Remove an existing key from an existing role.
|
|
198
|
+
*
|
|
179
199
|
* @param {Key} key The key to remove from the role.
|
|
180
|
-
|
|
200
|
+
*/
|
|
181
201
|
removeKey(key: Key): Promise<void>;
|
|
182
202
|
/**
|
|
183
203
|
* Create a new session for this role.
|
|
184
204
|
* @param {SignerSessionStorage} storage The session storage to use
|
|
185
205
|
* @param {string} purpose Descriptive purpose.
|
|
186
|
-
* @param {SignerSessionLifetime}
|
|
206
|
+
* @param {SignerSessionLifetime} lifetimes Optional session lifetimes.
|
|
207
|
+
* @param {string[]} scopes Session scopes. Only `sign:*` scopes are allowed.
|
|
187
208
|
* @return {Promise<SignerSession>} New signer session.
|
|
188
209
|
*/
|
|
189
|
-
createSession(storage: SignerSessionStorage, purpose: string,
|
|
210
|
+
createSession(storage: SignerSessionStorage, purpose: string, lifetimes?: SignerSessionLifetime, scopes?: string[]): Promise<SignerSession>;
|
|
190
211
|
/**
|
|
191
212
|
* List all signer sessions for this role. Returned objects can be used to
|
|
192
213
|
* revoke individual sessions, but they cannot be used for authentication.
|
|
214
|
+
*
|
|
215
|
+
* @param {PageOpts} page Optional pagination options; by default, retrieves all sessions.
|
|
193
216
|
* @return {Promise<SignerSessionInfo[]>} Signer sessions for this role.
|
|
194
217
|
*/
|
|
195
|
-
sessions(): Promise<SignerSessionInfo[]>;
|
|
196
|
-
/**
|
|
197
|
-
*
|
|
198
|
-
* @param {
|
|
218
|
+
sessions(page?: PageOpts): Promise<SignerSessionInfo[]>;
|
|
219
|
+
/**
|
|
220
|
+
* Constructor.
|
|
221
|
+
* @param {CubeSignerClient} csc The CubeSigner instance to use for signing.
|
|
199
222
|
* @param {RoleInfo} data The JSON response from the API server.
|
|
200
223
|
* @internal
|
|
201
|
-
|
|
202
|
-
constructor(
|
|
203
|
-
/**
|
|
224
|
+
*/
|
|
225
|
+
constructor(csc: CubeSignerClient, data: RoleInfo);
|
|
226
|
+
/**
|
|
227
|
+
* Update the role.
|
|
228
|
+
*
|
|
204
229
|
* @param {UpdateRoleRequest} request The JSON request to send to the API server.
|
|
205
|
-
*
|
|
230
|
+
* @return {Promise<RoleInfo>} The updated role information.
|
|
231
|
+
*/
|
|
206
232
|
private update;
|
|
207
|
-
/**
|
|
208
|
-
*
|
|
209
|
-
*
|
|
210
|
-
* @param {string?} name The optional name of the role.
|
|
211
|
-
* @return {Role} The new role.
|
|
212
|
-
* @internal
|
|
213
|
-
* */
|
|
214
|
-
static createRole(cs: CubeSigner, orgId: string, name?: string): Promise<Role>;
|
|
215
|
-
/** Get a role by id.
|
|
216
|
-
* @param {CubeSigner} cs The CubeSigner instance to use for signing.
|
|
217
|
-
* @param {string} orgId The id of the organization to which the role belongs.
|
|
218
|
-
* @param {string} roleId The id of the role to get.
|
|
219
|
-
* @return {Role} The role.
|
|
220
|
-
* @internal
|
|
221
|
-
* */
|
|
222
|
-
static getRole(cs: CubeSigner, orgId: string, roleId: string): Promise<Role>;
|
|
223
|
-
/** Fetches the role information.
|
|
233
|
+
/**
|
|
234
|
+
* Fetches the role information.
|
|
235
|
+
*
|
|
224
236
|
* @return {RoleInfo} The role information.
|
|
225
237
|
* @internal
|
|
226
|
-
|
|
238
|
+
*/
|
|
227
239
|
private fetch;
|
|
228
|
-
/** Delete role.
|
|
229
|
-
* @param {CubeSigner} cs The CubeSigner instance to use for signing.
|
|
230
|
-
* @param {string} orgId The id of the organization to which the role belongs.
|
|
231
|
-
* @param {string} roleId The id of the role to delete.
|
|
232
|
-
* @internal
|
|
233
|
-
* */
|
|
234
|
-
private static deleteRole;
|
|
235
240
|
}
|
|
236
|
-
export {};
|