@cubist-labs/cubesigner-sdk 0.1.77 → 0.2.15

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (55) hide show
  1. package/dist/package.json +68 -0
  2. package/dist/src/api.d.ts +493 -0
  3. package/dist/src/api.js +1166 -0
  4. package/dist/src/client.d.ts +534 -10
  5. package/dist/src/client.js +355 -19
  6. package/dist/src/ethers/index.d.ts +34 -9
  7. package/dist/src/ethers/index.js +63 -19
  8. package/dist/src/index.d.ts +51 -70
  9. package/dist/src/index.js +83 -237
  10. package/dist/src/key.d.ts +35 -64
  11. package/dist/src/key.js +32 -96
  12. package/dist/src/mfa.d.ts +85 -14
  13. package/dist/src/mfa.js +146 -40
  14. package/dist/src/org.d.ts +42 -194
  15. package/dist/src/org.js +52 -336
  16. package/dist/src/paginator.js +1 -1
  17. package/dist/src/response.d.ts +101 -0
  18. package/dist/src/response.js +164 -0
  19. package/dist/src/role.d.ts +87 -83
  20. package/dist/src/role.js +79 -136
  21. package/dist/src/schema.d.ts +936 -28
  22. package/dist/src/schema.js +1 -1
  23. package/dist/src/schema_types.d.ts +109 -0
  24. package/dist/src/schema_types.js +3 -0
  25. package/dist/src/session/cognito_manager.d.ts +15 -3
  26. package/dist/src/session/cognito_manager.js +23 -5
  27. package/dist/src/session/session_manager.d.ts +1 -1
  28. package/dist/src/session/session_manager.js +3 -11
  29. package/dist/src/session/session_storage.js +1 -1
  30. package/dist/src/session/signer_session_manager.d.ts +10 -29
  31. package/dist/src/session/signer_session_manager.js +21 -80
  32. package/dist/src/signer_session.d.ts +15 -252
  33. package/dist/src/signer_session.js +25 -424
  34. package/dist/src/user_export.d.ts +52 -0
  35. package/dist/src/user_export.js +129 -0
  36. package/dist/src/util.d.ts +15 -0
  37. package/dist/src/util.js +33 -11
  38. package/package.json +13 -11
  39. package/src/api.ts +1395 -0
  40. package/src/client.ts +413 -12
  41. package/src/ethers/index.ts +74 -28
  42. package/src/index.ts +96 -273
  43. package/src/key.ts +36 -131
  44. package/src/{fido.ts → mfa.ts} +62 -38
  45. package/src/org.ts +54 -405
  46. package/src/response.ts +196 -0
  47. package/src/role.ts +113 -184
  48. package/src/schema.ts +936 -28
  49. package/src/schema_types.ts +110 -0
  50. package/src/session/cognito_manager.ts +33 -6
  51. package/src/session/session_manager.ts +2 -8
  52. package/src/session/signer_session_manager.ts +29 -110
  53. package/src/signer_session.ts +22 -597
  54. package/src/user_export.ts +116 -0
  55. package/src/util.ts +29 -10
@@ -0,0 +1,164 @@
1
+ "use strict";
2
+ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
3
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
4
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
5
+ return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
6
+ };
7
+ var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
8
+ if (kind === "m") throw new TypeError("Private method is not writable");
9
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
10
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
11
+ return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
12
+ };
13
+ var _CubeSignerResponse_requestFn, _CubeSignerResponse_resp, _CubeSignerResponse_mfaRequired;
14
+ Object.defineProperty(exports, "__esModule", { value: true });
15
+ exports.CubeSignerResponse = exports.mapResponse = void 0;
16
+ /**
17
+ * Take a {@link Response<U>} and a {@link MapFn<U, V>} function and return
18
+ * a {@link Response<V>} that maps the value of the original response when its status code is 200.
19
+ *
20
+ * @param {Response<U>} resp Original response
21
+ * @param {Map<U, V>} mapFn Map to apply to the response value when its status code is 200.
22
+ * @return {Response<V>} Response whose value for status code 200 is mapped from U to V
23
+ */
24
+ function mapResponse(resp, mapFn) {
25
+ if (resp.accepted?.MfaRequired) {
26
+ return resp;
27
+ }
28
+ else {
29
+ return mapFn(resp);
30
+ }
31
+ }
32
+ exports.mapResponse = mapResponse;
33
+ /**
34
+ * A response of a CubeSigner request.
35
+ */
36
+ class CubeSignerResponse {
37
+ /** @return {string} The MFA id associated with this request (if any) */
38
+ mfaId() {
39
+ return __classPrivateFieldGet(this, _CubeSignerResponse_mfaRequired, "f").id;
40
+ }
41
+ /** @return {boolean} True if this request requires an MFA approval */
42
+ requiresMfa() {
43
+ return __classPrivateFieldGet(this, _CubeSignerResponse_mfaRequired, "f") !== undefined;
44
+ }
45
+ /**
46
+ * Return session information to use for any MFA approval requests (if any was included in the response).
47
+ * @return {ClientSessionInfo | undefined}
48
+ */
49
+ mfaSessionInfo() {
50
+ return __classPrivateFieldGet(this, _CubeSignerResponse_resp, "f").accepted?.MfaRequired?.session ?? undefined;
51
+ }
52
+ /** @return {U} The response data, if no MFA is required */
53
+ data() {
54
+ if (this.requiresMfa()) {
55
+ throw new Error("Cannot call `data()` while MFA is required");
56
+ }
57
+ return __classPrivateFieldGet(this, _CubeSignerResponse_resp, "f");
58
+ }
59
+ /**
60
+ * Approve the MFA request using a given session and a TOTP code.
61
+ *
62
+ * @param {SignerSession} session Signer session to use
63
+ * @param {string} code 6-digit TOTP code
64
+ * @return {CubeSignerResponse<U>} The result of signing with the approval
65
+ */
66
+ async approveTotp(session, code) {
67
+ if (!this.requiresMfa()) {
68
+ return this;
69
+ }
70
+ const mfaId = this.mfaId();
71
+ const mfaOrgId = __classPrivateFieldGet(this, _CubeSignerResponse_mfaRequired, "f").org_id;
72
+ const mfaApproval = await session.mfaApproveTotp(mfaId, code);
73
+ const mfaConf = mfaApproval.receipt?.confirmation;
74
+ if (!mfaConf) {
75
+ return this;
76
+ }
77
+ return await this.signWithMfaApproval({ mfaId, mfaOrgId, mfaConf });
78
+ }
79
+ /**
80
+ * Approve the MFA request using a given `CubeSignerClient` instance (i.e., its session).
81
+ *
82
+ * @param {CubeSignerClient} cs CubeSigner whose session to use
83
+ * @return {CubeSignerResponse<U>} The result of signing with the approval
84
+ */
85
+ async approve(cs) {
86
+ if (!this.requiresMfa()) {
87
+ return this;
88
+ }
89
+ const mfaId = __classPrivateFieldGet(this, _CubeSignerResponse_mfaRequired, "f").id;
90
+ const mfaOrgId = __classPrivateFieldGet(this, _CubeSignerResponse_mfaRequired, "f").org_id;
91
+ const mfaApproval = await cs.mfaApprove(mfaId);
92
+ const mfaConf = mfaApproval.receipt?.confirmation;
93
+ if (!mfaConf) {
94
+ return this;
95
+ }
96
+ return await this.signWithMfaApproval({ mfaId, mfaOrgId, mfaConf });
97
+ }
98
+ /**
99
+ * Resubmits the request with a given MFA receipt attached.
100
+ *
101
+ * @param {MfaReceipt} mfaReceipt The MFA receipt
102
+ * @return {Promise<CubeSignerResponse<U>>} The result of signing after MFA approval
103
+ */
104
+ async signWithMfaApproval(mfaReceipt) {
105
+ const headers = CubeSignerResponse.getMfaHeaders(mfaReceipt);
106
+ return new CubeSignerResponse(__classPrivateFieldGet(this, _CubeSignerResponse_requestFn, "f"), await __classPrivateFieldGet(this, _CubeSignerResponse_requestFn, "f").call(this, headers));
107
+ }
108
+ // --------------------------------------------------------------------------
109
+ // -- INTERNAL --------------------------------------------------------------
110
+ // --------------------------------------------------------------------------
111
+ /**
112
+ * Constructor.
113
+ *
114
+ * @param {RequestFn} requestFn
115
+ * The signing function that this response is from.
116
+ * This argument is used to resend requests with different headers if needed.
117
+ * @param {U | AcceptedResponse} resp The response as returned by the OpenAPI client.
118
+ * @internal
119
+ */
120
+ constructor(requestFn, resp) {
121
+ _CubeSignerResponse_requestFn.set(this, void 0);
122
+ _CubeSignerResponse_resp.set(this, void 0);
123
+ /**
124
+ * Optional MFA id. Only set if there is an MFA request associated with the
125
+ * signing request
126
+ */
127
+ _CubeSignerResponse_mfaRequired.set(this, void 0);
128
+ __classPrivateFieldSet(this, _CubeSignerResponse_requestFn, requestFn, "f");
129
+ __classPrivateFieldSet(this, _CubeSignerResponse_resp, resp, "f");
130
+ __classPrivateFieldSet(this, _CubeSignerResponse_mfaRequired, __classPrivateFieldGet(this, _CubeSignerResponse_resp, "f").accepted?.MfaRequired, "f");
131
+ }
132
+ /**
133
+ * Static constructor.
134
+ * @param {RequestFn} requestFn
135
+ * The request function that this response is from.
136
+ * This argument is used to resend requests with different headers if needed.
137
+ * @param {MfaReceipt} mfaReceipt Optional MFA receipt
138
+ * @return {Promise<CubeSignerResponse<U>>} New instance of this class.
139
+ * @internal
140
+ */
141
+ static async create(requestFn, mfaReceipt) {
142
+ const seed = await requestFn(this.getMfaHeaders(mfaReceipt));
143
+ return new CubeSignerResponse(requestFn, seed);
144
+ }
145
+ /**
146
+ * Return HTTP headers containing a given MFA receipt.
147
+ *
148
+ * @param {MfaReceipt} mfaReceipt MFA receipt
149
+ * @return {HeadersInit} Headers including that receipt
150
+ * @internal
151
+ */
152
+ static getMfaHeaders(mfaReceipt) {
153
+ return mfaReceipt
154
+ ? {
155
+ "x-cubist-mfa-id": mfaReceipt.mfaId,
156
+ "x-cubist-mfa-org-id": mfaReceipt.mfaOrgId,
157
+ "x-cubist-mfa-confirmation": mfaReceipt.mfaConf,
158
+ }
159
+ : undefined;
160
+ }
161
+ }
162
+ exports.CubeSignerResponse = CubeSignerResponse;
163
+ _CubeSignerResponse_requestFn = new WeakMap(), _CubeSignerResponse_resp = new WeakMap(), _CubeSignerResponse_mfaRequired = new WeakMap();
164
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"response.js","sourceRoot":"","sources":["../../src/response.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAqBA;;;;;;;GAOG;AACH,SAAgB,WAAW,CAAO,IAAiB,EAAE,KAAkB;IACrE,IAAK,IAAyB,CAAC,QAAQ,EAAE,WAAW,EAAE,CAAC;QACrD,OAAO,IAAwB,CAAC;IAClC,CAAC;SAAM,CAAC;QACN,OAAO,KAAK,CAAC,IAAS,CAAC,CAAC;IAC1B,CAAC;AACH,CAAC;AAND,kCAMC;AAWD;;GAEG;AACH,MAAa,kBAAkB;IAS7B,wEAAwE;IACxE,KAAK;QACH,OAAO,uBAAA,IAAI,uCAAc,CAAC,EAAE,CAAC;IAC/B,CAAC;IAED,sEAAsE;IACtE,WAAW;QACT,OAAO,uBAAA,IAAI,uCAAa,KAAK,SAAS,CAAC;IACzC,CAAC;IAED;;;OAGG;IACH,cAAc;QACZ,OAAQ,uBAAA,IAAI,gCAA2B,CAAC,QAAQ,EAAE,WAAW,EAAE,OAAO,IAAI,SAAS,CAAC;IACtF,CAAC;IAED,2DAA2D;IAC3D,IAAI;QACF,IAAI,IAAI,CAAC,WAAW,EAAE,EAAE,CAAC;YACvB,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAC;QAChE,CAAC;QACD,OAAO,uBAAA,IAAI,gCAAW,CAAC;IACzB,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,WAAW,CAAC,OAAsB,EAAE,IAAY;QACpD,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,EAAE,CAAC;YACxB,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,KAAK,GAAG,IAAI,CAAC,KAAK,EAAE,CAAC;QAC3B,MAAM,QAAQ,GAAG,uBAAA,IAAI,uCAAc,CAAC,MAAM,CAAC;QAC3C,MAAM,WAAW,GAAG,MAAM,OAAO,CAAC,cAAc,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;QAC9D,MAAM,OAAO,GAAG,WAAW,CAAC,OAAO,EAAE,YAAY,CAAC;QAElD,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,IAAI,CAAC;QACd,CAAC;QAED,OAAO,MAAM,IAAI,CAAC,mBAAmB,CAAC,EAAE,KAAK,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC,CAAC;IACtE,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,OAAO,CAAC,EAAoB;QAChC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,EAAE,CAAC;YACxB,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,KAAK,GAAG,uBAAA,IAAI,uCAAc,CAAC,EAAE,CAAC;QACpC,MAAM,QAAQ,GAAG,uBAAA,IAAI,uCAAc,CAAC,MAAM,CAAC;QAE3C,MAAM,WAAW,GAAG,MAAM,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC;QAC/C,MAAM,OAAO,GAAG,WAAW,CAAC,OAAO,EAAE,YAAY,CAAC;QAElD,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,IAAI,CAAC;QACd,CAAC;QAED,OAAO,MAAM,IAAI,CAAC,mBAAmB,CAAC,EAAE,KAAK,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC,CAAC;IACtE,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,mBAAmB,CAAC,UAAsB;QAC9C,MAAM,OAAO,GAAG,kBAAkB,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC;QAC7D,OAAO,IAAI,kBAAkB,CAAC,uBAAA,IAAI,qCAAW,EAAE,MAAM,uBAAA,IAAI,qCAAW,MAAf,IAAI,EAAY,OAAO,CAAC,CAAC,CAAC;IACjF,CAAC;IAED,6EAA6E;IAC7E,6EAA6E;IAC7E,6EAA6E;IAE7E;;;;;;;;OAQG;IACH,YAAY,SAAuB,EAAE,IAA0B;QA1GtD,gDAAyB;QACzB,2CAA4B;QACrC;;;WAGG;QACM,kDAA2B;QAqGlC,uBAAA,IAAI,iCAAc,SAAS,MAAA,CAAC;QAC5B,uBAAA,IAAI,4BAAS,IAAI,MAAA,CAAC;QAClB,uBAAA,IAAI,mCAAiB,uBAAA,IAAI,gCAA2B,CAAC,QAAQ,EAAE,WAAW,MAAA,CAAC;IAC7E,CAAC;IAED;;;;;;;;OAQG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,SAAuB,EACvB,UAAuB;QAEvB,MAAM,IAAI,GAAG,MAAM,SAAS,CAAC,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC,CAAC;QAC7D,OAAO,IAAI,kBAAkB,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;IACjD,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,aAAa,CAAC,UAAuB;QAC1C,OAAO,UAAU;YACf,CAAC,CAAC;gBACE,iBAAiB,EAAE,UAAU,CAAC,KAAK;gBACnC,qBAAqB,EAAE,UAAU,CAAC,QAAQ;gBAC1C,2BAA2B,EAAE,UAAU,CAAC,OAAO;aAChD;YACH,CAAC,CAAC,SAAS,CAAC;IAChB,CAAC;CACF;AAlJD,gDAkJC","sourcesContent":["import { CubeSignerClient, SignerSession } from \".\";\nimport { MfaReceipt } from \"./mfa\";\nimport { AcceptedResponse, NewSessionResponse } from \"./schema_types\";\n\n/**\n * Response type, which can be either a value of type {@link U}\n * or {@link AcceptedResponse} (status code 202) which requires MFA.\n */\nexport type Response<U> = U | AcceptedResponse;\n\n/**\n * Request function which optionally takes additional headers\n * (which, for example, can be used to attach an MFA receipt).\n */\nexport type RequestFn<U> = (headers?: HeadersInit) => Promise<Response<U>>;\n\n/**\n * Map function occasionally used to map a response from the API into a higher-level type.\n */\nexport type MapFn<U, V> = (u: U) => V;\n\n/**\n * Take a {@link Response<U>} and a {@link MapFn<U, V>} function and return\n * a {@link Response<V>} that maps the value of the original response when its status code is 200.\n *\n * @param {Response<U>} resp Original response\n * @param {Map<U, V>} mapFn Map to apply to the response value when its status code is 200.\n * @return {Response<V>} Response whose value for status code 200 is mapped from U to V\n */\nexport function mapResponse<U, V>(resp: Response<U>, mapFn: MapFn<U, V>): Response<V> {\n  if ((resp as AcceptedResponse).accepted?.MfaRequired) {\n    return resp as AcceptedResponse;\n  } else {\n    return mapFn(resp as U);\n  }\n}\n\nexport interface MfaRequired {\n  /** Org id */\n  org_id: string;\n  /** MFA request id */\n  id: string;\n  /** Optional MFA session */\n  session?: NewSessionResponse | null;\n}\n\n/**\n * A response of a CubeSigner request.\n */\nexport class CubeSignerResponse<U> {\n  readonly #requestFn: RequestFn<U>;\n  readonly #resp: U | AcceptedResponse;\n  /**\n   * Optional MFA id. Only set if there is an MFA request associated with the\n   * signing request\n   */\n  readonly #mfaRequired?: MfaRequired;\n\n  /** @return {string} The MFA id associated with this request (if any) */\n  mfaId(): string {\n    return this.#mfaRequired!.id;\n  }\n\n  /** @return {boolean} True if this request requires an MFA approval */\n  requiresMfa(): boolean {\n    return this.#mfaRequired !== undefined;\n  }\n\n  /**\n   * Return session information to use for any MFA approval requests (if any was included in the response).\n   * @return {ClientSessionInfo | undefined}\n   */\n  mfaSessionInfo(): NewSessionResponse | undefined {\n    return (this.#resp as AcceptedResponse).accepted?.MfaRequired?.session ?? undefined;\n  }\n\n  /** @return {U} The response data, if no MFA is required */\n  data(): U {\n    if (this.requiresMfa()) {\n      throw new Error(\"Cannot call `data()` while MFA is required\");\n    }\n    return this.#resp as U;\n  }\n\n  /**\n   * Approve the MFA request using a given session and a TOTP code.\n   *\n   * @param {SignerSession} session Signer session to use\n   * @param {string} code 6-digit TOTP code\n   * @return {CubeSignerResponse<U>} The result of signing with the approval\n   */\n  async approveTotp(session: SignerSession, code: string): Promise<CubeSignerResponse<U>> {\n    if (!this.requiresMfa()) {\n      return this;\n    }\n\n    const mfaId = this.mfaId();\n    const mfaOrgId = this.#mfaRequired!.org_id;\n    const mfaApproval = await session.mfaApproveTotp(mfaId, code);\n    const mfaConf = mfaApproval.receipt?.confirmation;\n\n    if (!mfaConf) {\n      return this;\n    }\n\n    return await this.signWithMfaApproval({ mfaId, mfaOrgId, mfaConf });\n  }\n\n  /**\n   * Approve the MFA request using a given `CubeSignerClient` instance (i.e., its session).\n   *\n   * @param {CubeSignerClient} cs CubeSigner whose session to use\n   * @return {CubeSignerResponse<U>} The result of signing with the approval\n   */\n  async approve(cs: CubeSignerClient): Promise<CubeSignerResponse<U>> {\n    if (!this.requiresMfa()) {\n      return this;\n    }\n\n    const mfaId = this.#mfaRequired!.id;\n    const mfaOrgId = this.#mfaRequired!.org_id;\n\n    const mfaApproval = await cs.mfaApprove(mfaId);\n    const mfaConf = mfaApproval.receipt?.confirmation;\n\n    if (!mfaConf) {\n      return this;\n    }\n\n    return await this.signWithMfaApproval({ mfaId, mfaOrgId, mfaConf });\n  }\n\n  /**\n   * Resubmits the request with a given MFA receipt attached.\n   *\n   * @param {MfaReceipt} mfaReceipt The MFA receipt\n   * @return {Promise<CubeSignerResponse<U>>} The result of signing after MFA approval\n   */\n  async signWithMfaApproval(mfaReceipt: MfaReceipt): Promise<CubeSignerResponse<U>> {\n    const headers = CubeSignerResponse.getMfaHeaders(mfaReceipt);\n    return new CubeSignerResponse(this.#requestFn, await this.#requestFn(headers));\n  }\n\n  // --------------------------------------------------------------------------\n  // -- INTERNAL --------------------------------------------------------------\n  // --------------------------------------------------------------------------\n\n  /**\n   * Constructor.\n   *\n   * @param {RequestFn} requestFn\n   *    The signing function that this response is from.\n   *    This argument is used to resend requests with different headers if needed.\n   * @param {U | AcceptedResponse} resp The response as returned by the OpenAPI client.\n   * @internal\n   */\n  constructor(requestFn: RequestFn<U>, resp: U | AcceptedResponse) {\n    this.#requestFn = requestFn;\n    this.#resp = resp;\n    this.#mfaRequired = (this.#resp as AcceptedResponse).accepted?.MfaRequired;\n  }\n\n  /**\n   * Static constructor.\n   * @param {RequestFn} requestFn\n   *    The request function that this response is from.\n   *    This argument is used to resend requests with different headers if needed.\n   * @param {MfaReceipt} mfaReceipt Optional MFA receipt\n   * @return {Promise<CubeSignerResponse<U>>} New instance of this class.\n   * @internal\n   */\n  static async create<U>(\n    requestFn: RequestFn<U>,\n    mfaReceipt?: MfaReceipt,\n  ): Promise<CubeSignerResponse<U>> {\n    const seed = await requestFn(this.getMfaHeaders(mfaReceipt));\n    return new CubeSignerResponse(requestFn, seed);\n  }\n\n  /**\n   * Return HTTP headers containing a given MFA receipt.\n   *\n   * @param {MfaReceipt} mfaReceipt MFA receipt\n   * @return {HeadersInit} Headers including that receipt\n   * @internal\n   */\n  static getMfaHeaders(mfaReceipt?: MfaReceipt): HeadersInit | undefined {\n    return mfaReceipt\n      ? {\n          \"x-cubist-mfa-id\": mfaReceipt.mfaId,\n          \"x-cubist-mfa-org-id\": mfaReceipt.mfaOrgId,\n          \"x-cubist-mfa-confirmation\": mfaReceipt.mfaConf,\n        }\n      : undefined;\n  }\n}\n"]}
@@ -1,17 +1,17 @@
1
- import { CubeSigner, Key, MfaType, SignerSession, SignerSessionInfo, SignerSessionLifetime, SignerSessionStorage } from ".";
2
- import { components } from "./client";
3
- type KeyWithPoliciesInfo = components["schemas"]["KeyInRoleInfo"];
4
- export type RoleInfo = components["schemas"]["RoleInfo"];
5
- /** Restrict transaction receiver.
1
+ import { Key, KeyWithPoliciesInfo, MfaType, PageOpts, RoleInfo, SignerSession, SignerSessionInfo, SignerSessionLifetime, SignerSessionStorage } from ".";
2
+ import { CubeSignerClient } from "./client";
3
+ /**
4
+ * Restrict transaction receiver.
5
+ *
6
6
  * @example { TxReceiver: "0x8c594691c0e592ffa21f153a16ae41db5befcaaa" }
7
- * */
7
+ */
8
8
  export type TxReceiver = {
9
9
  TxReceiver: string;
10
10
  };
11
11
  /** The kind of deposit contracts. */
12
12
  export declare enum DepositContract {
13
13
  /** Canonical deposit contract */
14
- Canonical = 0,
14
+ Canonical = 0,// eslint-disable-line no-unused-vars
15
15
  /** Wrapper deposit contract */
16
16
  Wrapper = 1
17
17
  }
@@ -23,18 +23,22 @@ export type TxDepositBase = {
23
23
  kind: DepositContract;
24
24
  };
25
25
  };
26
- /** Restrict transactions to calls to deposit contract with fixed validator (pubkey):
27
- * @example { TxDeposit: { kind: DespositContract.Canonical, validator: { pubkey: "8879...8"} }}
28
- * */
26
+ /**
27
+ * Restrict transactions to calls to deposit contract with fixed validator (pubkey):
28
+ *
29
+ * @example { TxDeposit: { kind: DespositContract.Canonical, validator: { pubkey: "8879...8"} }}
30
+ */
29
31
  export type TxDepositPubkey = {
30
32
  TxDeposit: {
31
33
  kind: DepositContract;
32
34
  pubkey: string;
33
35
  };
34
36
  };
35
- /** Restrict transactions to calls to deposit contract with any validator key in a role:
37
+ /**
38
+ * Restrict transactions to calls to deposit contract with any validator key in a role:
39
+ *
36
40
  * @example { TxDeposit: { kind: DespositContract.Canonical, validator: { role_id: "Role#c63...af"} }}
37
- * */
41
+ */
38
42
  export type TxDepositRole = {
39
43
  TxDeposit: {
40
44
  kind: DepositContract;
@@ -43,14 +47,16 @@ export type TxDepositRole = {
43
47
  };
44
48
  /** All different kinds of sensitive operations. */
45
49
  export declare enum OperationKind {
46
- BlobSign = "BlobSign",
47
- EvmSign = "Eth1Sign",
48
- Eth2Sign = "Eth2Sign",
49
- Eth2Stake = "Eth2Stake",
50
- Eth2Unstake = "Eth2Unstake",
50
+ BlobSign = "BlobSign",// eslint-disable-line no-unused-vars
51
+ EvmSign = "Eth1Sign",// eslint-disable-line no-unused-vars
52
+ Eth2Sign = "Eth2Sign",// eslint-disable-line no-unused-vars
53
+ Eth2Stake = "Eth2Stake",// eslint-disable-line no-unused-vars
54
+ Eth2Unstake = "Eth2Unstake",// eslint-disable-line no-unused-vars
51
55
  SolanaSign = "SolanaSign"
52
56
  }
53
- /** MFA policy
57
+ /**
58
+ * MFA policy
59
+ *
54
60
  * @example {
55
61
  * {
56
62
  * count: 1,
@@ -58,7 +64,7 @@ export declare enum OperationKind {
58
64
  * allowed_mfa_types: [ "Totp" ],
59
65
  * allowed_approvers: [ "User#123" ],
60
66
  * }
61
- * */
67
+ */
62
68
  export type MfaPolicy = {
63
69
  count?: number;
64
70
  num_auth_factors?: number;
@@ -66,7 +72,9 @@ export type MfaPolicy = {
66
72
  allowed_mfa_types?: MfaType[];
67
73
  restricted_operations?: OperationKind[];
68
74
  };
69
- /** Require MFA for transactions.
75
+ /**
76
+ * Require MFA for transactions.
77
+ *
70
78
  * @example {
71
79
  * RequireMfa: {
72
80
  * count: 1,
@@ -78,14 +86,16 @@ export type MfaPolicy = {
78
86
  * ]
79
87
  * }
80
88
  * }
81
- * */
89
+ */
82
90
  export type RequireMfa = {
83
91
  RequireMfa: MfaPolicy;
84
92
  };
85
93
  /** Allow raw blob signing */
86
94
  export declare const AllowRawBlobSigning: "AllowRawBlobSigning";
87
95
  export type AllowRawBlobSigning = typeof AllowRawBlobSigning;
88
- /** Key policy
96
+ /**
97
+ * Key policy
98
+ *
89
99
  * @example [
90
100
  * {
91
101
  * "TxReceiver": "0x8c594691c0e592ffa21f153a16ae41db5befcaaa"
@@ -106,7 +116,7 @@ export type AllowRawBlobSigning = typeof AllowRawBlobSigning;
106
116
  * }
107
117
  * }
108
118
  * ]
109
- * */
119
+ */
110
120
  export type KeyPolicy = (TxReceiver | TxDeposit | RequireMfa | AllowRawBlobSigning)[];
111
121
  /** A key guarded by a policy. */
112
122
  export declare class KeyWithPolicies {
@@ -115,13 +125,13 @@ export declare class KeyWithPolicies {
115
125
  readonly policy?: KeyPolicy;
116
126
  /** @return {Promise<Key>} The key */
117
127
  getKey(): Promise<Key>;
118
- /** Constructor.
119
- * @param {CubeSigner} cs The CubeSigner instance to use for signing.
120
- * @param {string} orgId The id of the organization to which the key belongs.
128
+ /**
129
+ * Constructor.
130
+ * @param {CubeSignerClient} csc The CubeSigner instance to use for signing.
121
131
  * @param {KeyWithPoliciesInfo} keyWithPolicies The key and its policies
122
132
  * @internal
123
- * */
124
- constructor(cs: CubeSigner, orgId: string, keyWithPolicies: KeyWithPoliciesInfo);
133
+ */
134
+ constructor(csc: CubeSignerClient, keyWithPolicies: KeyWithPoliciesInfo);
125
135
  }
126
136
  /** Roles. */
127
137
  export declare class Role {
@@ -131,7 +141,7 @@ export declare class Role {
131
141
  /**
132
142
  * The ID of the role.
133
143
  * @example Role#bfe3eccb-731e-430d-b1e5-ac1363e6b06b
134
- * */
144
+ */
135
145
  readonly id: string;
136
146
  /** Delete the role. */
137
147
  delete(): Promise<void>;
@@ -141,96 +151,90 @@ export declare class Role {
141
151
  enable(): Promise<void>;
142
152
  /** Disable the role. */
143
153
  disable(): Promise<void>;
144
- /** The list of users with access to the role.
154
+ /**
155
+ * The list of all users with access to the role.
145
156
  * @example [
146
157
  * "User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f",
147
158
  * "User#5593c25b-52e2-4fb5-b39b-96d41d681d82"
148
159
  * ]
149
- * */
150
- users(): Promise<string[]>;
151
- /** Add a user to the role.
152
- * Adds an existing user to an existing role.
160
+ *
161
+ * @param {PageOpts} page Optional pagination options; by default, retrieves all users.
162
+ */
163
+ users(page?: PageOpts): Promise<string[]>;
164
+ /**
165
+ * Add an existing user to an existing role.
166
+ *
153
167
  * @param {string} userId The user-id of the user to add to the role.
154
- * */
168
+ */
155
169
  addUser(userId: string): Promise<void>;
156
- /** The list of keys in the role.
170
+ /**
171
+ * The list of keys in the role.
157
172
  * @example [
158
173
  * {
159
174
  * id: "Key#bfe3eccb-731e-430d-b1e5-ac1363e6b06b",
160
175
  * policy: { TxReceiver: "0x8c594691c0e592ffa21f153a16ae41db5befcaaa" }
161
176
  * },
162
177
  * ]
163
- * */
164
- keys(): Promise<KeyWithPolicies[]>;
165
- /** Add keys to the role.
166
- * Adds a list of existing keys to an existing role.
178
+ *
179
+ * @param {PageOpts} page Optional pagination options; by default, retrieves all keys in this role.
180
+ */
181
+ keys(page?: PageOpts): Promise<KeyWithPolicies[]>;
182
+ /**
183
+ * Add a list of existing keys to an existing role.
184
+ *
167
185
  * @param {Key[]} keys The list of keys to add to the role.
168
186
  * @param {KeyPolicy?} policy The optional policy to apply to each key.
169
- * */
187
+ */
170
188
  addKeys(keys: Key[], policy?: KeyPolicy): Promise<void>;
171
- /** Add a key to the role.
172
- * Adds an existing key to an existing role.
189
+ /**
190
+ * Add an existing key to an existing role.
191
+ *
173
192
  * @param {Key} key The key to add to the role.
174
193
  * @param {KeyPolicy?} policy The optional policy to apply to the key.
175
- * */
194
+ */
176
195
  addKey(key: Key, policy?: KeyPolicy): Promise<void>;
177
- /** Remove key from the role.
178
- * Removes an existing key from an existing role.
196
+ /**
197
+ * Remove an existing key from an existing role.
198
+ *
179
199
  * @param {Key} key The key to remove from the role.
180
- * */
200
+ */
181
201
  removeKey(key: Key): Promise<void>;
182
202
  /**
183
203
  * Create a new session for this role.
184
204
  * @param {SignerSessionStorage} storage The session storage to use
185
205
  * @param {string} purpose Descriptive purpose.
186
- * @param {SignerSessionLifetime} ttl Optional session lifetimes.
206
+ * @param {SignerSessionLifetime} lifetimes Optional session lifetimes.
207
+ * @param {string[]} scopes Session scopes. Only `sign:*` scopes are allowed.
187
208
  * @return {Promise<SignerSession>} New signer session.
188
209
  */
189
- createSession(storage: SignerSessionStorage, purpose: string, ttl?: SignerSessionLifetime): Promise<SignerSession>;
210
+ createSession(storage: SignerSessionStorage, purpose: string, lifetimes?: SignerSessionLifetime, scopes?: string[]): Promise<SignerSession>;
190
211
  /**
191
212
  * List all signer sessions for this role. Returned objects can be used to
192
213
  * revoke individual sessions, but they cannot be used for authentication.
214
+ *
215
+ * @param {PageOpts} page Optional pagination options; by default, retrieves all sessions.
193
216
  * @return {Promise<SignerSessionInfo[]>} Signer sessions for this role.
194
217
  */
195
- sessions(): Promise<SignerSessionInfo[]>;
196
- /** Create a new role.
197
- * @param {CubeSigner} cs The CubeSigner instance to use for signing.
198
- * @param {string} orgId The id of the organization to which the role belongs.
218
+ sessions(page?: PageOpts): Promise<SignerSessionInfo[]>;
219
+ /**
220
+ * Constructor.
221
+ * @param {CubeSignerClient} csc The CubeSigner instance to use for signing.
199
222
  * @param {RoleInfo} data The JSON response from the API server.
200
223
  * @internal
201
- * */
202
- constructor(cs: CubeSigner, orgId: string, data: RoleInfo);
203
- /** Update the role.
224
+ */
225
+ constructor(csc: CubeSignerClient, data: RoleInfo);
226
+ /**
227
+ * Update the role.
228
+ *
204
229
  * @param {UpdateRoleRequest} request The JSON request to send to the API server.
205
- * */
230
+ * @return {Promise<RoleInfo>} The updated role information.
231
+ */
206
232
  private update;
207
- /** Create new role.
208
- * @param {CubeSigner} cs The CubeSigner instance to use for signing.
209
- * @param {string} orgId The id of the organization to which the role belongs.
210
- * @param {string?} name The optional name of the role.
211
- * @return {Role} The new role.
212
- * @internal
213
- * */
214
- static createRole(cs: CubeSigner, orgId: string, name?: string): Promise<Role>;
215
- /** Get a role by id.
216
- * @param {CubeSigner} cs The CubeSigner instance to use for signing.
217
- * @param {string} orgId The id of the organization to which the role belongs.
218
- * @param {string} roleId The id of the role to get.
219
- * @return {Role} The role.
220
- * @internal
221
- * */
222
- static getRole(cs: CubeSigner, orgId: string, roleId: string): Promise<Role>;
223
- /** Fetches the role information.
233
+ /**
234
+ * Fetches the role information.
235
+ *
224
236
  * @return {RoleInfo} The role information.
225
237
  * @internal
226
- * */
238
+ */
227
239
  private fetch;
228
- /** Delete role.
229
- * @param {CubeSigner} cs The CubeSigner instance to use for signing.
230
- * @param {string} orgId The id of the organization to which the role belongs.
231
- * @param {string} roleId The id of the role to delete.
232
- * @internal
233
- * */
234
- private static deleteRole;
235
240
  }
236
- export {};