@cubist-labs/cubesigner-sdk 0.1.77 → 0.2.15
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/package.json +68 -0
- package/dist/src/api.d.ts +493 -0
- package/dist/src/api.js +1166 -0
- package/dist/src/client.d.ts +534 -10
- package/dist/src/client.js +355 -19
- package/dist/src/ethers/index.d.ts +34 -9
- package/dist/src/ethers/index.js +63 -19
- package/dist/src/index.d.ts +51 -70
- package/dist/src/index.js +83 -237
- package/dist/src/key.d.ts +35 -64
- package/dist/src/key.js +32 -96
- package/dist/src/mfa.d.ts +85 -14
- package/dist/src/mfa.js +146 -40
- package/dist/src/org.d.ts +42 -194
- package/dist/src/org.js +52 -336
- package/dist/src/paginator.js +1 -1
- package/dist/src/response.d.ts +101 -0
- package/dist/src/response.js +164 -0
- package/dist/src/role.d.ts +87 -83
- package/dist/src/role.js +79 -136
- package/dist/src/schema.d.ts +936 -28
- package/dist/src/schema.js +1 -1
- package/dist/src/schema_types.d.ts +109 -0
- package/dist/src/schema_types.js +3 -0
- package/dist/src/session/cognito_manager.d.ts +15 -3
- package/dist/src/session/cognito_manager.js +23 -5
- package/dist/src/session/session_manager.d.ts +1 -1
- package/dist/src/session/session_manager.js +3 -11
- package/dist/src/session/session_storage.js +1 -1
- package/dist/src/session/signer_session_manager.d.ts +10 -29
- package/dist/src/session/signer_session_manager.js +21 -80
- package/dist/src/signer_session.d.ts +15 -252
- package/dist/src/signer_session.js +25 -424
- package/dist/src/user_export.d.ts +52 -0
- package/dist/src/user_export.js +129 -0
- package/dist/src/util.d.ts +15 -0
- package/dist/src/util.js +33 -11
- package/package.json +13 -11
- package/src/api.ts +1395 -0
- package/src/client.ts +413 -12
- package/src/ethers/index.ts +74 -28
- package/src/index.ts +96 -273
- package/src/key.ts +36 -131
- package/src/{fido.ts → mfa.ts} +62 -38
- package/src/org.ts +54 -405
- package/src/response.ts +196 -0
- package/src/role.ts +113 -184
- package/src/schema.ts +936 -28
- package/src/schema_types.ts +110 -0
- package/src/session/cognito_manager.ts +33 -6
- package/src/session/session_manager.ts +2 -8
- package/src/session/signer_session_manager.ts +29 -110
- package/src/signer_session.ts +22 -597
- package/src/user_export.ts +116 -0
- package/src/util.ts +29 -10
package/dist/src/client.js
CHANGED
|
@@ -1,21 +1,357 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
14
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
15
|
-
};
|
|
16
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
3
|
+
exports.CubeSignerClient = void 0;
|
|
4
|
+
const signer_session_manager_1 = require("./session/signer_session_manager");
|
|
5
|
+
const cognito_manager_1 = require("./session/cognito_manager");
|
|
6
|
+
const api_1 = require("./api");
|
|
7
|
+
const key_1 = require("./key");
|
|
8
|
+
const role_1 = require("./role");
|
|
9
|
+
const session_storage_1 = require("./session/session_storage");
|
|
10
|
+
/**
|
|
11
|
+
* Client to use to send requests to CubeSigner services
|
|
12
|
+
* when authenticating using a CubeSigner session token.
|
|
13
|
+
*/
|
|
14
|
+
class CubeSignerClient extends api_1.CubeSignerApi {
|
|
15
|
+
/**
|
|
16
|
+
* Constructor.
|
|
17
|
+
* @param {SignerSessionManager} sessionMgr The session manager to use
|
|
18
|
+
* @param {string?} orgId Optional organization ID; if omitted, uses the org ID from the session manager.
|
|
19
|
+
*/
|
|
20
|
+
constructor(sessionMgr, orgId) {
|
|
21
|
+
super(sessionMgr, orgId);
|
|
22
|
+
}
|
|
23
|
+
/**
|
|
24
|
+
* Returns a new instance of this class using the same session manager but targeting a different organization.
|
|
25
|
+
*
|
|
26
|
+
* @param {string} orgId The organization ID.
|
|
27
|
+
* @return {CubeSignerClient} A new instance of this class using the same session manager but targeting different organization.
|
|
28
|
+
*/
|
|
29
|
+
withOrg(orgId) {
|
|
30
|
+
return orgId ? new CubeSignerClient(this.sessionMgr, orgId) : this;
|
|
31
|
+
}
|
|
32
|
+
/**
|
|
33
|
+
* Loads an existing management session and creates a {@link CubeSignerClient} instance.
|
|
34
|
+
*
|
|
35
|
+
* @return {Promise<CubeSignerClient>} New CubeSigner instance
|
|
36
|
+
*/
|
|
37
|
+
static async loadManagementSession() {
|
|
38
|
+
const mgr = await cognito_manager_1.CognitoSessionManager.loadManagementSession();
|
|
39
|
+
// HACK: Ignore that sessionMgr may be a CognitoSessionManager and pretend that it
|
|
40
|
+
// is a SignerSessionManager; that's fine because the CubeSignerClient will
|
|
41
|
+
// almost always just call `await token()` on it, which works in both cases.
|
|
42
|
+
// NOTE: This will go away once `cs login` starts producing signer sessions.
|
|
43
|
+
return new CubeSignerClient(mgr);
|
|
44
|
+
}
|
|
45
|
+
/**
|
|
46
|
+
* Create a new signing key.
|
|
47
|
+
* @param {KeyType} type The type of key to create.
|
|
48
|
+
* @param {string?} ownerId The owner of the key. Defaults to the session's user.
|
|
49
|
+
* @return {Key[]} The new keys.
|
|
50
|
+
*/
|
|
51
|
+
async createKey(type, ownerId) {
|
|
52
|
+
return (await this.createKeys(type, 1, ownerId))[0];
|
|
53
|
+
}
|
|
54
|
+
/**
|
|
55
|
+
* Create new signing keys.
|
|
56
|
+
* @param {KeyType} type The type of key to create.
|
|
57
|
+
* @param {number} count The number of keys to create.
|
|
58
|
+
* @param {string?} ownerId The owner of the keys. Defaults to the session's user.
|
|
59
|
+
* @return {Key[]} The new keys.
|
|
60
|
+
*/
|
|
61
|
+
async createKeys(type, count, ownerId) {
|
|
62
|
+
const keys = await this.keysCreate(type, count, ownerId);
|
|
63
|
+
return keys.map((k) => new key_1.Key(this, k));
|
|
64
|
+
}
|
|
65
|
+
/**
|
|
66
|
+
* Derive a key of the given type using the given derivation path and mnemonic.
|
|
67
|
+
* The owner of the derived key will be the owner of the mnemonic.
|
|
68
|
+
*
|
|
69
|
+
* @param {KeyType} type Type of key to derive from the mnemonic.
|
|
70
|
+
* @param {string} derivationPath Mnemonic derivation path used to generate new key.
|
|
71
|
+
* @param {string} mnemonicId materialId of mnemonic key used to derive the new key.
|
|
72
|
+
*
|
|
73
|
+
* @return {Key} newly derived key or undefined if it already exists.
|
|
74
|
+
*/
|
|
75
|
+
async deriveKey(type, derivationPath, mnemonicId) {
|
|
76
|
+
return (await this.deriveKeys(type, [derivationPath], mnemonicId))[0];
|
|
77
|
+
}
|
|
78
|
+
/**
|
|
79
|
+
* Derive a set of keys of the given type using the given derivation paths and mnemonic.
|
|
80
|
+
*
|
|
81
|
+
* The owner of the derived keys will be the owner of the mnemonic.
|
|
82
|
+
*
|
|
83
|
+
* @param {KeyType} type Type of key to derive from the mnemonic.
|
|
84
|
+
* @param {string[]} derivationPaths Mnemonic derivation paths used to generate new key.
|
|
85
|
+
* @param {string} mnemonicId materialId of mnemonic key used to derive the new key.
|
|
86
|
+
*
|
|
87
|
+
* @return {Key[]} newly derived keys.
|
|
88
|
+
*/
|
|
89
|
+
async deriveKeys(type, derivationPaths, mnemonicId) {
|
|
90
|
+
const keys = await this.keysDerive(type, derivationPaths, mnemonicId);
|
|
91
|
+
return keys.map((k) => new key_1.Key(this, k));
|
|
92
|
+
}
|
|
93
|
+
/**
|
|
94
|
+
* Create a new {@link OidcClient} that will use a given OIDC token for auth.
|
|
95
|
+
* @param {string} oidcToken The authentication token to use
|
|
96
|
+
* @return {OidcClient} New OIDC client.
|
|
97
|
+
*/
|
|
98
|
+
newOidcClient(oidcToken) {
|
|
99
|
+
return new api_1.OidcClient(this.sessionMgr.env, this.orgId, oidcToken);
|
|
100
|
+
}
|
|
101
|
+
/**
|
|
102
|
+
* Authenticate an OIDC user and create a new session manager for them.
|
|
103
|
+
*
|
|
104
|
+
* @param {string} oidcToken The OIDC token
|
|
105
|
+
* @param {List<string>} scopes The scopes of the resulting session
|
|
106
|
+
* @param {OidcAuthOptions} options Options.
|
|
107
|
+
* @return {Promise<SignerSessionManager>} The signer session manager
|
|
108
|
+
*/
|
|
109
|
+
async oidcAuth(oidcToken, scopes, options) {
|
|
110
|
+
const oidcClient = this.newOidcClient(oidcToken);
|
|
111
|
+
const resp = await oidcClient.sessionCreate(scopes, options?.lifetimes, options?.mfaReceipt);
|
|
112
|
+
return await signer_session_manager_1.SignerSessionManager.loadFromStorage(new session_storage_1.MemorySessionStorage(resp.data()));
|
|
113
|
+
}
|
|
114
|
+
/**
|
|
115
|
+
* Create a new user in the organization and sends an invitation to that user.
|
|
116
|
+
*
|
|
117
|
+
* Same as {@link orgUserInvite}.
|
|
118
|
+
*/
|
|
119
|
+
get createUser() {
|
|
120
|
+
return this.orgUserInvite.bind(this);
|
|
121
|
+
}
|
|
122
|
+
/**
|
|
123
|
+
* Create a new OIDC user.
|
|
124
|
+
*
|
|
125
|
+
* Same as {@link orgUserCreateOidc}.
|
|
126
|
+
*/
|
|
127
|
+
get createOidcUser() {
|
|
128
|
+
return this.orgUserCreateOidc.bind(this);
|
|
129
|
+
}
|
|
130
|
+
/**
|
|
131
|
+
* Delete an existing OIDC user.
|
|
132
|
+
*
|
|
133
|
+
* Same as {@link orgUserDeleteOidc}.
|
|
134
|
+
*/
|
|
135
|
+
get deleteOidcUser() {
|
|
136
|
+
return this.orgUserDeleteOidc.bind(this);
|
|
137
|
+
}
|
|
138
|
+
/**
|
|
139
|
+
* List users in the organization.
|
|
140
|
+
*
|
|
141
|
+
* Same as {@link orgUsersList}
|
|
142
|
+
*/
|
|
143
|
+
get users() {
|
|
144
|
+
return this.orgUsersList.bind(this);
|
|
145
|
+
}
|
|
146
|
+
/**
|
|
147
|
+
* Obtain information about the current user.
|
|
148
|
+
*
|
|
149
|
+
* Same as {@link userGet}
|
|
150
|
+
*/
|
|
151
|
+
get user() {
|
|
152
|
+
return this.userGet.bind(this);
|
|
153
|
+
}
|
|
154
|
+
/**
|
|
155
|
+
* Get information about a specific org.
|
|
156
|
+
*
|
|
157
|
+
* @param {string?} orgId The ID or name of the org
|
|
158
|
+
* @return {Promise<OrgInfo>} CubeSigner client for the requested org.
|
|
159
|
+
*/
|
|
160
|
+
async org(orgId) {
|
|
161
|
+
return await this.withOrg(orgId).orgGet();
|
|
162
|
+
}
|
|
163
|
+
/**
|
|
164
|
+
* Obtain information about the current user.
|
|
165
|
+
*
|
|
166
|
+
* Same as {@link userGet}
|
|
167
|
+
*/
|
|
168
|
+
get aboutMe() {
|
|
169
|
+
return this.userGet.bind(this);
|
|
170
|
+
}
|
|
171
|
+
/**
|
|
172
|
+
* Get a key by id.
|
|
173
|
+
*
|
|
174
|
+
* @param {string} keyId The id of the key to get.
|
|
175
|
+
* @return {Key} The key.
|
|
176
|
+
*/
|
|
177
|
+
async getKey(keyId) {
|
|
178
|
+
const keyInfo = await this.keyGet(keyId);
|
|
179
|
+
return new key_1.Key(this, keyInfo);
|
|
180
|
+
}
|
|
181
|
+
/**
|
|
182
|
+
* Get all keys in the org.
|
|
183
|
+
*
|
|
184
|
+
* @param {KeyType?} type Optional key type to filter list for.
|
|
185
|
+
* @param {PageOpts} page Pagination options. Defaults to fetching the entire result set.
|
|
186
|
+
* @return {Promise<Key[]>} The keys.
|
|
187
|
+
*/
|
|
188
|
+
async orgKeys(type, page) {
|
|
189
|
+
const paginator = this.keysList(type, page);
|
|
190
|
+
const keys = await paginator.fetch();
|
|
191
|
+
return keys.map((k) => new key_1.Key(this, k));
|
|
192
|
+
}
|
|
193
|
+
/**
|
|
194
|
+
* Create a new role.
|
|
195
|
+
*
|
|
196
|
+
* @param {string?} name The name of the role.
|
|
197
|
+
* @return {Role} The new role.
|
|
198
|
+
*/
|
|
199
|
+
async createRole(name) {
|
|
200
|
+
const roleId = await this.roleCreate(name);
|
|
201
|
+
const roleInfo = await this.roleGet(roleId);
|
|
202
|
+
return new role_1.Role(this, roleInfo);
|
|
203
|
+
}
|
|
204
|
+
/**
|
|
205
|
+
* Get a role by id or name.
|
|
206
|
+
*
|
|
207
|
+
* @param {string} roleId The id or name of the role to get.
|
|
208
|
+
* @return {Role} The role.
|
|
209
|
+
*/
|
|
210
|
+
async getRole(roleId) {
|
|
211
|
+
const roleInfo = await this.roleGet(roleId);
|
|
212
|
+
return new role_1.Role(this, roleInfo);
|
|
213
|
+
}
|
|
214
|
+
/**
|
|
215
|
+
* List all roles in the org.
|
|
216
|
+
*
|
|
217
|
+
* @param {PageOpts} page Pagination options. Defaults to fetching the entire result set.
|
|
218
|
+
* @return {Role[]} The roles.
|
|
219
|
+
*/
|
|
220
|
+
async listRoles(page) {
|
|
221
|
+
const roles = await this.rolesList(page).fetch();
|
|
222
|
+
return roles.map((r) => new role_1.Role(this, r));
|
|
223
|
+
}
|
|
224
|
+
/**
|
|
225
|
+
* List all users in the org.
|
|
226
|
+
*
|
|
227
|
+
* Same as {@link orgUsersList}
|
|
228
|
+
*/
|
|
229
|
+
get listUsers() {
|
|
230
|
+
return this.orgUsersList.bind(this);
|
|
231
|
+
}
|
|
232
|
+
/**
|
|
233
|
+
* Approve a pending MFA request.
|
|
234
|
+
*
|
|
235
|
+
* Same as {@link mfaApprove}
|
|
236
|
+
*/
|
|
237
|
+
get approveMfaRequest() {
|
|
238
|
+
return this.mfaApprove.bind(this);
|
|
239
|
+
}
|
|
240
|
+
/**
|
|
241
|
+
* Approve a pending MFA request using TOTP.
|
|
242
|
+
*
|
|
243
|
+
* Same as {@link mfaApproveTotp}
|
|
244
|
+
*/
|
|
245
|
+
get totpApprove() {
|
|
246
|
+
return this.mfaApproveTotp.bind(this);
|
|
247
|
+
}
|
|
248
|
+
/**
|
|
249
|
+
* Initiate approval of an existing MFA request using FIDO.
|
|
250
|
+
*
|
|
251
|
+
* Returns a {@link MfaFidoChallenge} that must be answered by calling
|
|
252
|
+
* {@link MfaFidoChallenge.answer} or {@link fidoApproveComplete}.
|
|
253
|
+
*
|
|
254
|
+
* Same as {@link mfaApproveFidoInit}
|
|
255
|
+
*/
|
|
256
|
+
get fidoApproveStart() {
|
|
257
|
+
return this.mfaApproveFidoInit.bind(this);
|
|
258
|
+
}
|
|
259
|
+
/**
|
|
260
|
+
* Answer the MFA approval with FIDO challenge issued by {@link fidoApproveStart}.
|
|
261
|
+
*
|
|
262
|
+
* Same as {@link mfaApproveFidoComplete}
|
|
263
|
+
*/
|
|
264
|
+
get fidoApproveComplete() {
|
|
265
|
+
return this.mfaApproveFidoComplete.bind(this);
|
|
266
|
+
}
|
|
267
|
+
/**
|
|
268
|
+
* Get a pending MFA request by its id.
|
|
269
|
+
*
|
|
270
|
+
* Same as {@link CubeSignerClient.getMfaInfo}
|
|
271
|
+
*/
|
|
272
|
+
get getMfaInfo() {
|
|
273
|
+
return this.mfaGet.bind(this);
|
|
274
|
+
}
|
|
275
|
+
/**
|
|
276
|
+
* List pending MFA requests accessible to the current user.
|
|
277
|
+
*
|
|
278
|
+
* Same as {@link CubeSignerClient.mfaList}
|
|
279
|
+
*/
|
|
280
|
+
get listMfaInfos() {
|
|
281
|
+
return this.mfaList.bind(this);
|
|
282
|
+
}
|
|
283
|
+
/**
|
|
284
|
+
* Obtain a proof of authentication.
|
|
285
|
+
*
|
|
286
|
+
* Same as {@link CubeSignerClient.identityProve}
|
|
287
|
+
*/
|
|
288
|
+
get proveIdentity() {
|
|
289
|
+
return this.identityProve.bind(this);
|
|
290
|
+
}
|
|
291
|
+
/**
|
|
292
|
+
* Check if a given proof of OIDC authentication is valid.
|
|
293
|
+
*
|
|
294
|
+
* Same as {@link CubeSignerClient.identityVerify}
|
|
295
|
+
*/
|
|
296
|
+
get verifyIdentity() {
|
|
297
|
+
return this.identityVerify.bind(this);
|
|
298
|
+
}
|
|
299
|
+
/**
|
|
300
|
+
* Creates a request to add a new FIDO device.
|
|
301
|
+
*
|
|
302
|
+
* Returns a {@link AddFidoChallenge} that must be answered by calling {@link AddFidoChallenge.answer}.
|
|
303
|
+
*
|
|
304
|
+
* MFA may be required.
|
|
305
|
+
*
|
|
306
|
+
* Same as {@link CubeSignerClient.userRegisterFidoInit}
|
|
307
|
+
*/
|
|
308
|
+
get addFidoStart() {
|
|
309
|
+
return this.userRegisterFidoInit.bind(this);
|
|
310
|
+
}
|
|
311
|
+
/**
|
|
312
|
+
* Creates a request to change user's TOTP. Returns a {@link TotpChallenge}
|
|
313
|
+
* that must be answered by calling {@link TotpChallenge.answer} or
|
|
314
|
+
* {@link resetTotpComplete}.
|
|
315
|
+
*
|
|
316
|
+
* Same as {@link userResetTotpInit}
|
|
317
|
+
*/
|
|
318
|
+
get resetTotpStart() {
|
|
319
|
+
return this.userResetTotpInit.bind(this);
|
|
320
|
+
}
|
|
321
|
+
/**
|
|
322
|
+
* Answer the TOTP challenge issued by {@link resetTotpStart}. If successful,
|
|
323
|
+
* user's TOTP configuration will be updated to that of the TOTP challenge.
|
|
324
|
+
*
|
|
325
|
+
* Same as {@link userResetTotpComplete}
|
|
326
|
+
*/
|
|
327
|
+
get resetTotpComplete() {
|
|
328
|
+
return this.userResetTotpComplete.bind(this);
|
|
329
|
+
}
|
|
330
|
+
/**
|
|
331
|
+
* Verifies a given TOTP code against the current user's TOTP configuration.
|
|
332
|
+
* Throws an error if the verification fails.
|
|
333
|
+
*
|
|
334
|
+
* Same as {@link userVerifyTotp}
|
|
335
|
+
*/
|
|
336
|
+
get verifyTotp() {
|
|
337
|
+
return this.userVerifyTotp.bind(this);
|
|
338
|
+
}
|
|
339
|
+
/**
|
|
340
|
+
* Sign a stake request.
|
|
341
|
+
*
|
|
342
|
+
* Same as {@link signStake}
|
|
343
|
+
*/
|
|
344
|
+
get stake() {
|
|
345
|
+
return this.signStake.bind(this);
|
|
346
|
+
}
|
|
347
|
+
/**
|
|
348
|
+
* Sign an unstake request.
|
|
349
|
+
*
|
|
350
|
+
* Same as {@link signUnstake}
|
|
351
|
+
*/
|
|
352
|
+
get unstake() {
|
|
353
|
+
return this.signUnstake.bind(this);
|
|
354
|
+
}
|
|
355
|
+
}
|
|
356
|
+
exports.CubeSignerClient = CubeSignerClient;
|
|
357
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"client.js","sourceRoot":"","sources":["../../src/client.ts"],"names":[],"mappings":";;;AAAA,6EAA8F;AAC9F,+DAAkE;AAClE,+BAAkD;AAClD,+BAAqC;AAIrC,iCAA8B;AAK9B,+DAAiE;AAYjE;;;GAGG;AACH,MAAa,gBAAiB,SAAQ,mBAAa;IACjD;;;;OAIG;IACH,YAAY,UAAgC,EAAE,KAAc;QAC1D,KAAK,CAAC,UAAU,EAAE,KAAK,CAAC,CAAC;IAC3B,CAAC;IAED;;;;;OAKG;IACH,OAAO,CAAC,KAAc;QACpB,OAAO,KAAK,CAAC,CAAC,CAAC,IAAI,gBAAgB,CAAC,IAAI,CAAC,UAAU,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC;IACrE,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,qBAAqB;QAChC,MAAM,GAAG,GAAG,MAAM,uCAAqB,CAAC,qBAAqB,EAAE,CAAC;QAChE,kFAAkF;QAClF,iFAAiF;QACjF,kFAAkF;QAClF,4EAA4E;QAC5E,OAAO,IAAI,gBAAgB,CAAC,GAAsC,CAAC,CAAC;IACtE,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,SAAS,CAAC,IAAa,EAAE,OAAgB;QAC7C,OAAO,CAAC,MAAM,IAAI,CAAC,UAAU,CAAC,IAAI,EAAE,CAAC,EAAE,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;IACtD,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,UAAU,CAAC,IAAa,EAAE,KAAa,EAAE,OAAgB;QAC7D,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,IAAI,EAAE,KAAK,EAAE,OAAO,CAAC,CAAC;QACzD,OAAO,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,IAAI,SAAG,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;IAC3C,CAAC;IAED;;;;;;;;;OASG;IACH,KAAK,CAAC,SAAS,CACb,IAAa,EACb,cAAsB,EACtB,UAAkB;QAElB,OAAO,CAAC,MAAM,IAAI,CAAC,UAAU,CAAC,IAAI,EAAE,CAAC,cAAc,CAAC,EAAE,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;IACxE,CAAC;IAED;;;;;;;;;;OAUG;IACH,KAAK,CAAC,UAAU,CAAC,IAAa,EAAE,eAAyB,EAAE,UAAkB;QAC3E,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,IAAI,EAAE,eAAe,EAAE,UAAU,CAAC,CAAC;QACtE,OAAO,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,IAAI,SAAG,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;IAC3C,CAAC;IAED;;;;OAIG;IACH,aAAa,CAAC,SAAiB;QAC7B,OAAO,IAAI,gBAAU,CAAC,IAAI,CAAC,UAAU,CAAC,GAAG,EAAE,IAAI,CAAC,KAAK,EAAE,SAAS,CAAC,CAAC;IACpE,CAAC;IAED;;;;;;;OAOG;IACH,KAAK,CAAC,QAAQ,CACZ,SAAiB,EACjB,MAAqB,EACrB,OAAyB;QAEzB,MAAM,UAAU,GAAG,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,CAAC;QACjD,MAAM,IAAI,GAAG,MAAM,UAAU,CAAC,aAAa,CAAC,MAAM,EAAE,OAAO,EAAE,SAAS,EAAE,OAAO,EAAE,UAAU,CAAC,CAAC;QAC7F,OAAO,MAAM,6CAAoB,CAAC,eAAe,CAAC,IAAI,sCAAoB,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;IAC3F,CAAC;IAED;;;;OAIG;IACH,IAAI,UAAU;QACZ,OAAO,IAAI,CAAC,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACvC,CAAC;IAED;;;;OAIG;IACH,IAAI,cAAc;QAChB,OAAO,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC3C,CAAC;IAED;;;;OAIG;IACH,IAAI,cAAc;QAChB,OAAO,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC3C,CAAC;IAED;;;;OAIG;IACH,IAAI,KAAK;QACP,OAAO,IAAI,CAAC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACtC,CAAC;IAED;;;;OAIG;IACH,IAAI,IAAI;QACN,OAAO,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACjC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,GAAG,CAAC,KAAc;QACtB,OAAO,MAAM,IAAI,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,MAAM,EAAE,CAAC;IAC5C,CAAC;IAED;;;;OAIG;IACH,IAAI,OAAO;QACT,OAAO,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACjC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,MAAM,CAAC,KAAa;QACxB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;QACzC,OAAO,IAAI,SAAG,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;IAChC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CAAC,IAAc,EAAE,IAAe;QAC3C,MAAM,SAAS,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;QAC5C,MAAM,IAAI,GAAG,MAAM,SAAS,CAAC,KAAK,EAAE,CAAC;QACrC,OAAO,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,IAAI,SAAG,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;IAC3C,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,UAAU,CAAC,IAAa;QAC5B,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;QAC3C,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;QAC5C,OAAO,IAAI,WAAI,CAAC,IAAI,EAAE,QAAQ,CAAC,CAAC;IAClC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,OAAO,CAAC,MAAc;QAC1B,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;QAC5C,OAAO,IAAI,WAAI,CAAC,IAAI,EAAE,QAAQ,CAAC,CAAC;IAClC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,SAAS,CAAC,IAAe;QAC7B,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,KAAK,EAAE,CAAC;QACjD,OAAO,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,IAAI,WAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;IAC7C,CAAC;IAED;;;;OAIG;IACH,IAAI,SAAS;QACX,OAAO,IAAI,CAAC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACtC,CAAC;IAED;;;;OAIG;IACH,IAAI,iBAAiB;QACnB,OAAO,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACpC,CAAC;IAED;;;;OAIG;IACH,IAAI,WAAW;QACb,OAAO,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACxC,CAAC;IAED;;;;;;;OAOG;IACH,IAAI,gBAAgB;QAClB,OAAO,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC5C,CAAC;IAED;;;;OAIG;IACH,IAAI,mBAAmB;QACrB,OAAO,IAAI,CAAC,sBAAsB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAChD,CAAC;IAED;;;;OAIG;IACH,IAAI,UAAU;QACZ,OAAO,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAChC,CAAC;IAED;;;;OAIG;IACH,IAAI,YAAY;QACd,OAAO,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACjC,CAAC;IAED;;;;OAIG;IACH,IAAI,aAAa;QACf,OAAO,IAAI,CAAC,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACvC,CAAC;IAED;;;;OAIG;IACH,IAAI,cAAc;QAChB,OAAO,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACxC,CAAC;IAED;;;;;;;;OAQG;IACH,IAAI,YAAY;QACd,OAAO,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC9C,CAAC;IAED;;;;;;OAMG;IACH,IAAI,cAAc;QAChB,OAAO,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC3C,CAAC;IAED;;;;;OAKG;IACH,IAAI,iBAAiB;QACnB,OAAO,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC/C,CAAC;IAED;;;;;OAKG;IACH,IAAI,UAAU;QACZ,OAAO,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACxC,CAAC;IAED;;;;OAIG;IACH,IAAI,KAAK;QACP,OAAO,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACnC,CAAC;IAED;;;;OAIG;IACH,IAAI,OAAO;QACT,OAAO,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACrC,CAAC;CACF;AAhYD,4CAgYC","sourcesContent":["import { SignerSessionManager, SignerSessionStorage } from \"./session/signer_session_manager\";\nimport { CognitoSessionManager } from \"./session/cognito_manager\";\nimport { CubeSignerApi, OidcClient } from \"./api\";\nimport { KeyType, Key } from \"./key\";\nimport { OrgInfo, RatchetConfig } from \"./schema_types\";\nimport { MfaReceipt } from \"./mfa\";\nimport { PageOpts } from \"./paginator\";\nimport { Role } from \"./role\";\n\n// used in doc comments\n// eslint-disable-next-line no-unused-vars, @typescript-eslint/no-unused-vars\nimport { AddFidoChallenge, MfaFidoChallenge, TotpChallenge } from \"./mfa\";\nimport { MemorySessionStorage } from \"./session/session_storage\";\n\n/** Options for logging in with OIDC token */\nexport interface OidcAuthOptions {\n  /** Optional token lifetimes */\n  lifetimes?: RatchetConfig;\n  /** Optional MFA receipt */\n  mfaReceipt?: MfaReceipt;\n  /** Optional storage to use for the returned session (defaults to {@link MemorySessionStorage}) */\n  storage?: SignerSessionStorage;\n}\n\n/**\n * Client to use to send requests to CubeSigner services\n * when authenticating using a CubeSigner session token.\n */\nexport class CubeSignerClient extends CubeSignerApi {\n  /**\n   * Constructor.\n   * @param {SignerSessionManager} sessionMgr The session manager to use\n   * @param {string?} orgId Optional organization ID; if omitted, uses the org ID from the session manager.\n   */\n  constructor(sessionMgr: SignerSessionManager, orgId?: string) {\n    super(sessionMgr, orgId);\n  }\n\n  /**\n   * Returns a new instance of this class using the same session manager but targeting a different organization.\n   *\n   * @param {string} orgId The organization ID.\n   * @return {CubeSignerClient} A new instance of this class using the same session manager but targeting different organization.\n   */\n  withOrg(orgId?: string): CubeSignerClient {\n    return orgId ? new CubeSignerClient(this.sessionMgr, orgId) : this;\n  }\n\n  /**\n   * Loads an existing management session and creates a {@link CubeSignerClient} instance.\n   *\n   * @return {Promise<CubeSignerClient>} New CubeSigner instance\n   */\n  static async loadManagementSession(): Promise<CubeSignerClient> {\n    const mgr = await CognitoSessionManager.loadManagementSession();\n    // HACK: Ignore that sessionMgr may be a CognitoSessionManager and pretend that it\n    //       is a SignerSessionManager; that's fine because the CubeSignerClient will\n    //       almost always just call `await token()` on it, which works in both cases.\n    // NOTE: This will go away once `cs login` starts producing signer sessions.\n    return new CubeSignerClient(mgr as unknown as SignerSessionManager);\n  }\n\n  /**\n   * Create a new signing key.\n   * @param {KeyType} type The type of key to create.\n   * @param {string?} ownerId The owner of the key. Defaults to the session's user.\n   * @return {Key[]} The new keys.\n   */\n  async createKey(type: KeyType, ownerId?: string): Promise<Key> {\n    return (await this.createKeys(type, 1, ownerId))[0];\n  }\n\n  /**\n   * Create new signing keys.\n   * @param {KeyType} type The type of key to create.\n   * @param {number} count The number of keys to create.\n   * @param {string?} ownerId The owner of the keys. Defaults to the session's user.\n   * @return {Key[]} The new keys.\n   */\n  async createKeys(type: KeyType, count: number, ownerId?: string): Promise<Key[]> {\n    const keys = await this.keysCreate(type, count, ownerId);\n    return keys.map((k) => new Key(this, k));\n  }\n\n  /**\n   * Derive a key of the given type using the given derivation path and mnemonic.\n   * The owner of the derived key will be the owner of the mnemonic.\n   *\n   * @param {KeyType} type Type of key to derive from the mnemonic.\n   * @param {string} derivationPath Mnemonic derivation path used to generate new key.\n   * @param {string} mnemonicId materialId of mnemonic key used to derive the new key.\n   *\n   * @return {Key} newly derived key or undefined if it already exists.\n   */\n  async deriveKey(\n    type: KeyType,\n    derivationPath: string,\n    mnemonicId: string,\n  ): Promise<Key | undefined> {\n    return (await this.deriveKeys(type, [derivationPath], mnemonicId))[0];\n  }\n\n  /**\n   * Derive a set of keys of the given type using the given derivation paths and mnemonic.\n   *\n   * The owner of the derived keys will be the owner of the mnemonic.\n   *\n   * @param {KeyType} type Type of key to derive from the mnemonic.\n   * @param {string[]} derivationPaths Mnemonic derivation paths used to generate new key.\n   * @param {string} mnemonicId materialId of mnemonic key used to derive the new key.\n   *\n   * @return {Key[]} newly derived keys.\n   */\n  async deriveKeys(type: KeyType, derivationPaths: string[], mnemonicId: string): Promise<Key[]> {\n    const keys = await this.keysDerive(type, derivationPaths, mnemonicId);\n    return keys.map((k) => new Key(this, k));\n  }\n\n  /**\n   * Create a new {@link OidcClient} that will use a given OIDC token for auth.\n   * @param {string} oidcToken The authentication token to use\n   * @return {OidcClient} New OIDC client.\n   */\n  newOidcClient(oidcToken: string): OidcClient {\n    return new OidcClient(this.sessionMgr.env, this.orgId, oidcToken);\n  }\n\n  /**\n   * Authenticate an OIDC user and create a new session manager for them.\n   *\n   * @param {string} oidcToken The OIDC token\n   * @param {List<string>} scopes The scopes of the resulting session\n   * @param {OidcAuthOptions} options Options.\n   * @return {Promise<SignerSessionManager>} The signer session manager\n   */\n  async oidcAuth(\n    oidcToken: string,\n    scopes: Array<string>,\n    options?: OidcAuthOptions,\n  ): Promise<SignerSessionManager> {\n    const oidcClient = this.newOidcClient(oidcToken);\n    const resp = await oidcClient.sessionCreate(scopes, options?.lifetimes, options?.mfaReceipt);\n    return await SignerSessionManager.loadFromStorage(new MemorySessionStorage(resp.data()));\n  }\n\n  /**\n   * Create a new user in the organization and sends an invitation to that user.\n   *\n   * Same as {@link orgUserInvite}.\n   */\n  get createUser() {\n    return this.orgUserInvite.bind(this);\n  }\n\n  /**\n   * Create a new OIDC user.\n   *\n   * Same as {@link orgUserCreateOidc}.\n   */\n  get createOidcUser() {\n    return this.orgUserCreateOidc.bind(this);\n  }\n\n  /**\n   * Delete an existing OIDC user.\n   *\n   * Same as {@link orgUserDeleteOidc}.\n   */\n  get deleteOidcUser() {\n    return this.orgUserDeleteOidc.bind(this);\n  }\n\n  /**\n   * List users in the organization.\n   *\n   * Same as {@link orgUsersList}\n   */\n  get users() {\n    return this.orgUsersList.bind(this);\n  }\n\n  /**\n   * Obtain information about the current user.\n   *\n   * Same as {@link userGet}\n   */\n  get user() {\n    return this.userGet.bind(this);\n  }\n\n  /**\n   * Get information about a specific org.\n   *\n   * @param {string?} orgId The ID or name of the org\n   * @return {Promise<OrgInfo>} CubeSigner client for the requested org.\n   */\n  async org(orgId?: string): Promise<OrgInfo> {\n    return await this.withOrg(orgId).orgGet();\n  }\n\n  /**\n   * Obtain information about the current user.\n   *\n   * Same as {@link userGet}\n   */\n  get aboutMe() {\n    return this.userGet.bind(this);\n  }\n\n  /**\n   * Get a key by id.\n   *\n   * @param {string} keyId The id of the key to get.\n   * @return {Key} The key.\n   */\n  async getKey(keyId: string): Promise<Key> {\n    const keyInfo = await this.keyGet(keyId);\n    return new Key(this, keyInfo);\n  }\n\n  /**\n   * Get all keys in the org.\n   *\n   * @param {KeyType?} type Optional key type to filter list for.\n   * @param {PageOpts} page Pagination options. Defaults to fetching the entire result set.\n   * @return {Promise<Key[]>} The keys.\n   */\n  async orgKeys(type?: KeyType, page?: PageOpts): Promise<Key[]> {\n    const paginator = this.keysList(type, page);\n    const keys = await paginator.fetch();\n    return keys.map((k) => new Key(this, k));\n  }\n\n  /**\n   * Create a new role.\n   *\n   * @param {string?} name The name of the role.\n   * @return {Role} The new role.\n   */\n  async createRole(name?: string): Promise<Role> {\n    const roleId = await this.roleCreate(name);\n    const roleInfo = await this.roleGet(roleId);\n    return new Role(this, roleInfo);\n  }\n\n  /**\n   * Get a role by id or name.\n   *\n   * @param {string} roleId The id or name of the role to get.\n   * @return {Role} The role.\n   */\n  async getRole(roleId: string): Promise<Role> {\n    const roleInfo = await this.roleGet(roleId);\n    return new Role(this, roleInfo);\n  }\n\n  /**\n   * List all roles in the org.\n   *\n   * @param {PageOpts} page Pagination options. Defaults to fetching the entire result set.\n   * @return {Role[]} The roles.\n   */\n  async listRoles(page?: PageOpts): Promise<Role[]> {\n    const roles = await this.rolesList(page).fetch();\n    return roles.map((r) => new Role(this, r));\n  }\n\n  /**\n   * List all users in the org.\n   *\n   * Same as {@link orgUsersList}\n   */\n  get listUsers() {\n    return this.orgUsersList.bind(this);\n  }\n\n  /**\n   * Approve a pending MFA request.\n   *\n   * Same as {@link mfaApprove}\n   */\n  get approveMfaRequest() {\n    return this.mfaApprove.bind(this);\n  }\n\n  /**\n   * Approve a pending MFA request using TOTP.\n   *\n   * Same as {@link mfaApproveTotp}\n   */\n  get totpApprove() {\n    return this.mfaApproveTotp.bind(this);\n  }\n\n  /**\n   * Initiate approval of an existing MFA request using FIDO.\n   *\n   * Returns a {@link MfaFidoChallenge} that must be answered by calling\n   * {@link MfaFidoChallenge.answer} or {@link fidoApproveComplete}.\n   *\n   * Same as {@link mfaApproveFidoInit}\n   */\n  get fidoApproveStart() {\n    return this.mfaApproveFidoInit.bind(this);\n  }\n\n  /**\n   * Answer the MFA approval with FIDO challenge issued by {@link fidoApproveStart}.\n   *\n   * Same as {@link mfaApproveFidoComplete}\n   */\n  get fidoApproveComplete() {\n    return this.mfaApproveFidoComplete.bind(this);\n  }\n\n  /**\n   * Get a pending MFA request by its id.\n   *\n   * Same as {@link CubeSignerClient.getMfaInfo}\n   */\n  get getMfaInfo() {\n    return this.mfaGet.bind(this);\n  }\n\n  /**\n   * List pending MFA requests accessible to the current user.\n   *\n   * Same as {@link CubeSignerClient.mfaList}\n   */\n  get listMfaInfos() {\n    return this.mfaList.bind(this);\n  }\n\n  /**\n   * Obtain a proof of authentication.\n   *\n   * Same as {@link CubeSignerClient.identityProve}\n   */\n  get proveIdentity() {\n    return this.identityProve.bind(this);\n  }\n\n  /**\n   * Check if a given proof of OIDC authentication is valid.\n   *\n   * Same as {@link CubeSignerClient.identityVerify}\n   */\n  get verifyIdentity() {\n    return this.identityVerify.bind(this);\n  }\n\n  /**\n   * Creates a request to add a new FIDO device.\n   *\n   * Returns a {@link AddFidoChallenge} that must be answered by calling {@link AddFidoChallenge.answer}.\n   *\n   * MFA may be required.\n   *\n   * Same as {@link CubeSignerClient.userRegisterFidoInit}\n   */\n  get addFidoStart() {\n    return this.userRegisterFidoInit.bind(this);\n  }\n\n  /**\n   * Creates a request to change user's TOTP. Returns a {@link TotpChallenge}\n   * that must be answered by calling {@link TotpChallenge.answer} or\n   * {@link resetTotpComplete}.\n   *\n   * Same as {@link userResetTotpInit}\n   */\n  get resetTotpStart() {\n    return this.userResetTotpInit.bind(this);\n  }\n\n  /**\n   * Answer the TOTP challenge issued by {@link resetTotpStart}. If successful,\n   * user's TOTP configuration will be updated to that of the TOTP challenge.\n   *\n   * Same as {@link userResetTotpComplete}\n   */\n  get resetTotpComplete() {\n    return this.userResetTotpComplete.bind(this);\n  }\n\n  /**\n   * Verifies a given TOTP code against the current user's TOTP configuration.\n   * Throws an error if the verification fails.\n   *\n   * Same as {@link userVerifyTotp}\n   */\n  get verifyTotp() {\n    return this.userVerifyTotp.bind(this);\n  }\n\n  /**\n   * Sign a stake request.\n   *\n   * Same as {@link signStake}\n   */\n  get stake() {\n    return this.signStake.bind(this);\n  }\n\n  /**\n   * Sign an unstake request.\n   *\n   * Same as {@link signUnstake}\n   */\n  get unstake() {\n    return this.signUnstake.bind(this);\n  }\n}\n"]}
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { TypedDataDomain, TypedDataField, ethers } from "ethers";
|
|
2
|
-
import {
|
|
2
|
+
import { SignerSession } from "../signer_session";
|
|
3
|
+
import { EvmSignRequest, MfaRequestInfo } from "../schema_types";
|
|
3
4
|
import { KeyInfo } from "../key";
|
|
4
|
-
import { CubeSigner } from "..";
|
|
5
5
|
/** Options for the signer */
|
|
6
6
|
interface SignerOptions {
|
|
7
7
|
/** Optional provider to use */
|
|
@@ -16,15 +16,14 @@ interface SignerOptions {
|
|
|
16
16
|
* updates. Default is 1000ms
|
|
17
17
|
*/
|
|
18
18
|
mfaPollIntervalMs?: number;
|
|
19
|
-
/** Optional management session. Used to check for MFA updates */
|
|
20
|
-
managementSession?: CubeSigner;
|
|
21
19
|
}
|
|
22
20
|
/**
|
|
23
21
|
* A ethers.js Signer using CubeSigner
|
|
24
22
|
*/
|
|
25
23
|
export declare class Signer extends ethers.AbstractSigner {
|
|
26
24
|
#private;
|
|
27
|
-
/**
|
|
25
|
+
/**
|
|
26
|
+
* Create new Signer instance
|
|
28
27
|
* @param {KeyInfo | string} address The key or the eth address of the account to use.
|
|
29
28
|
* @param {SignerSession} signerSession The underlying Signer session.
|
|
30
29
|
* @param {SignerOptions} options The options to use for the Signer instance
|
|
@@ -39,19 +38,29 @@ export declare class Signer extends ethers.AbstractSigner {
|
|
|
39
38
|
*/
|
|
40
39
|
connect(provider: null | ethers.Provider): Signer;
|
|
41
40
|
/**
|
|
42
|
-
*
|
|
41
|
+
* Construct a signing request from a transaction. This populates the transaction
|
|
42
|
+
* type to `0x02` (EIP-1559) unless set.
|
|
43
|
+
*
|
|
44
|
+
* @param {ethers.TransactionRequest} tx The transaction
|
|
45
|
+
* @return {EvmSignRequest} The EVM sign request to be sent to CubeSigner
|
|
46
|
+
*/
|
|
47
|
+
evmSignRequestFromTx(tx: ethers.TransactionRequest): Promise<EvmSignRequest>;
|
|
48
|
+
/**
|
|
49
|
+
* Sign a transaction. This method will block if the key requires MFA approval.
|
|
43
50
|
* @param {ethers.TransactionRequest} tx The transaction to sign.
|
|
44
51
|
* @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
|
|
45
52
|
*/
|
|
46
53
|
signTransaction(tx: ethers.TransactionRequest): Promise<string>;
|
|
47
|
-
/**
|
|
54
|
+
/**
|
|
55
|
+
* Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)
|
|
48
56
|
* to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.
|
|
49
57
|
* The key (for this session) must have the `"AllowRawBlobSigning"` policy attached.
|
|
50
58
|
* @param {string | Uint8Array} message The message to sign.
|
|
51
59
|
* @return {Promise<string>} The signature.
|
|
52
60
|
*/
|
|
53
61
|
signMessage(message: string | Uint8Array): Promise<string>;
|
|
54
|
-
/**
|
|
62
|
+
/**
|
|
63
|
+
* Signs EIP-712 typed data. This uses ethers.js's
|
|
55
64
|
* [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)
|
|
56
65
|
* to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.
|
|
57
66
|
* The key (for this session) must have the `"AllowRawBlobSigning"` policy attached.
|
|
@@ -61,10 +70,26 @@ export declare class Signer extends ethers.AbstractSigner {
|
|
|
61
70
|
* @return {Promise<string>} The signature.
|
|
62
71
|
*/
|
|
63
72
|
signTypedData(domain: TypedDataDomain, types: Record<string, Array<TypedDataField>>, value: Record<string, any>): Promise<string>;
|
|
64
|
-
/**
|
|
73
|
+
/**
|
|
74
|
+
* Sign arbitrary digest. This uses {@link Key#signBlob}.
|
|
65
75
|
* @param {string} digest The digest to sign.
|
|
66
76
|
* @return {Promise<string>} The signature.
|
|
67
77
|
*/
|
|
68
78
|
private signBlob;
|
|
79
|
+
/**
|
|
80
|
+
* Initialize the signing a message using MFA approvals. This method populates
|
|
81
|
+
* missing fields. If the signing does not require MFA, this method throws.
|
|
82
|
+
* @param {ethers.TransactionRequest} tx The transaction to send.
|
|
83
|
+
* @return {string} The MFA id associated with the signing request.
|
|
84
|
+
*/
|
|
85
|
+
sendTransactionMfaInit(tx: ethers.TransactionRequest): Promise<string>;
|
|
86
|
+
/**
|
|
87
|
+
* Send a transaction from an approved MFA request. The MFA request contains
|
|
88
|
+
* information about the approved signing request, which this method will
|
|
89
|
+
* execute.
|
|
90
|
+
* @param {MfaRequestInfo} mfaInfo The approved MFA request.
|
|
91
|
+
* @return {ethers.TransactionResponse} The result of submitting the transaction
|
|
92
|
+
*/
|
|
93
|
+
sendTransactionMfaApproved(mfaInfo: MfaRequestInfo): Promise<ethers.TransactionResponse>;
|
|
69
94
|
}
|
|
70
95
|
export {};
|