@cubist-labs/cubesigner-sdk 0.1.77 → 0.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -6,7 +6,6 @@ export interface paths {
6
6
  "/v0/about_me": {
7
7
  /**
8
8
  * User Info
9
- * @deprecated
10
9
  * @description User Info
11
10
  *
12
11
  * Retrieves information about the current user.
@@ -393,6 +392,15 @@ export interface paths {
393
392
  */
394
393
  delete: operations["revokeSessions"];
395
394
  };
395
+ "/v0/org/{org_id}/session/self": {
396
+ /**
397
+ * Revoke current session
398
+ * @description Revoke current session
399
+ *
400
+ * Immediately revokes the current session, preventing it from being used or refreshed
401
+ */
402
+ delete: operations["revokeCurrentSession"];
403
+ };
396
404
  "/v0/org/{org_id}/session/{session_id}": {
397
405
  /**
398
406
  * Get session information
@@ -707,6 +715,10 @@ export interface components {
707
715
  mfa_policy?: Record<string, unknown> | null;
708
716
  role: components["schemas"]["MemberRole"];
709
717
  };
718
+ AddThirdPartyUserResponse: {
719
+ /** @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f */
720
+ user_id: string;
721
+ };
710
722
  ApprovalInfo: {
711
723
  timestamp: components["schemas"]["EpochDateTime"];
712
724
  };
@@ -856,6 +868,10 @@ export interface components {
856
868
  */
857
869
  tx: Record<string, never>;
858
870
  };
871
+ AvaSignResponse: {
872
+ /** @description The hex-encoded signature. */
873
+ signature: string;
874
+ };
859
875
  /** @description Wrapper around a zeroizing 32-byte fixed-size array */
860
876
  B32: string;
861
877
  /**
@@ -872,6 +888,10 @@ export interface components {
872
888
  */
873
889
  message_base64: string;
874
890
  };
891
+ BlobSignResponse: {
892
+ /** @description The hex-encoded signature. */
893
+ signature: string;
894
+ };
875
895
  /** @enum {string} */
876
896
  BtcSighashType: "All" | "None" | "Single" | "AllPlusAnyoneCanPay" | "NonePlusAnyoneCanPay" | "SinglePlusAnyoneCanPay";
877
897
  BtcSignRequest: {
@@ -879,6 +899,13 @@ export interface components {
879
899
  /** @description The bitcoin transaction to sign */
880
900
  tx: Record<string, never>;
881
901
  };
902
+ BtcSignResponse: {
903
+ /**
904
+ * @description The hex-encoded signature in compact format.
905
+ * @example 0x454aef27c21df7dd8f537dc869f4cd65286ce239a52d36470f4d85be85a891b02789e5ffd8560b32a98110e5d0096802e4c14145cf6c44f10a768c87755eaa4800
906
+ */
907
+ signature: string;
908
+ };
882
909
  BtcSignatureKind: {
883
910
  /** @description Segregated Witness */
884
911
  Segwit: {
@@ -932,6 +959,18 @@ export interface components {
932
959
  /** @enum {string} */
933
960
  type: "fido";
934
961
  };
962
+ CreateKeyImportKeyResponse: components["schemas"]["KeyImportKey"] & {
963
+ /**
964
+ * @description An attestation document from a secure enclave, including an
965
+ * RSA signing key used to sign the contents of this message.
966
+ */
967
+ enclave_attestation: string;
968
+ /**
969
+ * @description An RSA-PSS-SHA256 signature on the public key and encrypted
970
+ * secrets attesting to their generation inside a secure enclave.
971
+ */
972
+ enclave_signature: string;
973
+ };
935
974
  CreateKeyRequest: {
936
975
  /**
937
976
  * Format: int64
@@ -952,6 +991,10 @@ export interface components {
952
991
  */
953
992
  owner?: string | null;
954
993
  };
994
+ CreateKeyResponse: {
995
+ /** @description The info about the created keys */
996
+ keys: components["schemas"]["KeyInfo"][];
997
+ };
955
998
  /** @description Optional create role request body */
956
999
  CreateRoleRequest: {
957
1000
  /**
@@ -960,6 +1003,19 @@ export interface components {
960
1003
  */
961
1004
  name: string;
962
1005
  };
1006
+ /** @description The newly created role information */
1007
+ CreateRoleResponse: {
1008
+ /**
1009
+ * @description A human-readable name for the role.
1010
+ * @example my_role
1011
+ */
1012
+ name?: string | null;
1013
+ /**
1014
+ * @description The id of the newly created role
1015
+ * @example Role#bfe3eccb-731e-430d-b1e5-ac1363e6b06b
1016
+ */
1017
+ role_id: string;
1018
+ };
963
1019
  CreateTokenRequest: components["schemas"]["RatchetConfig"] & ({
964
1020
  /**
965
1021
  * @description A human readable description of the purpose of the key
@@ -1122,8 +1178,20 @@ export interface components {
1122
1178
  /** @description EIP-712 typed data. Refer to the JSON schema defined in EIP-712. */
1123
1179
  typed_data: Record<string, never>;
1124
1180
  };
1181
+ Eip712SignResponse: {
1182
+ /**
1183
+ * @description Hex-encoded signature comprising 65 bytes in the format required
1184
+ * by ecrecover: 32-byte r, 32-byte s, and one-byte recovery-id v
1185
+ * which is either 27 or 28.
1186
+ * @example 0x4355c47d63924e8a72e509b65029052eb6c299d53a04e167c5775fd466751c9d07299936d304c153f6443dfa05f40ff007d72911b6f72307f996231605b915621c
1187
+ */
1188
+ signature: string;
1189
+ };
1125
1190
  /** @default null */
1126
1191
  Empty: Record<string, unknown> | null;
1192
+ EmptyImpl: {
1193
+ status: string;
1194
+ };
1127
1195
  /**
1128
1196
  * @description Epoch is a quoted `uint64`.
1129
1197
  * @example 256
@@ -1173,6 +1241,13 @@ export interface components {
1173
1241
  */
1174
1242
  tx: Record<string, never>;
1175
1243
  };
1244
+ Eth1SignResponse: {
1245
+ /**
1246
+ * @description Hex-encoded RLP encoding of the transaction and its signature
1247
+ * @example 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
1248
+ */
1249
+ rlp_signed_tx: string;
1250
+ };
1176
1251
  /**
1177
1252
  * @example {
1178
1253
  * "eth2_sign_request": {
@@ -1202,18 +1277,39 @@ export interface components {
1202
1277
  eth2_sign_request: Record<string, never>;
1203
1278
  network: components["schemas"]["Network"];
1204
1279
  };
1280
+ Eth2SignResponse: {
1281
+ /**
1282
+ * @description Hex encoded signature prefixed with 0x e.g. "0x0000..."
1283
+ * @example 0xb4f2ef9d12a54e1f569596c07c97d6d730535b6ffc0d287761dc78103a86326782471a04c75ce7a6faea08ca9a4a0830031cdcb893da8711d54aa22619f1a7e71b8185ddf4c6bfd9babbd735960e35e56bd6eeb89625b04850e7a9ef8846e549
1284
+ */
1285
+ signature: string;
1286
+ };
1205
1287
  /** @description Sent from the client to the server to answer a fido challenge */
1206
1288
  FidoAssertAnswer: {
1207
1289
  /** @description The ID of the challenge that was returned from the POST endpoint */
1208
1290
  challenge_id: string;
1209
1291
  credential: components["schemas"]["PublicKeyCredential"];
1210
1292
  };
1293
+ FidoAssertChallenge: {
1294
+ /** @description The id of the challenge. Must be supplied when answering the challenge. */
1295
+ challenge_id: string;
1296
+ options: components["schemas"]["PublicKeyCredentialRequestOptions"];
1297
+ };
1211
1298
  /** @description Sent from the client to the server to answer a fido challenge */
1212
1299
  FidoCreateChallengeAnswer: {
1213
1300
  /** @description The ID of the challenge that was returned from the POST endpoint */
1214
1301
  challenge_id: string;
1215
1302
  credential: components["schemas"]["PublicKeyCredential"];
1216
1303
  };
1304
+ /**
1305
+ * @description Sent by the server to the client. Contains the challenge data that must be
1306
+ * used to generate a new credential
1307
+ */
1308
+ FidoCreateChallengeResponse: {
1309
+ /** @description The id of the challenge. Must be supplied when answering the challenge. */
1310
+ challenge_id: string;
1311
+ options: components["schemas"]["PublicKeyCredentialCreationOptions"];
1312
+ };
1217
1313
  /** @description Declares intent to register a new FIDO key */
1218
1314
  FidoCreateRequest: {
1219
1315
  /**
@@ -1271,6 +1367,10 @@ export interface components {
1271
1367
  GetKeysInOrgRequest: {
1272
1368
  key_type?: components["schemas"]["KeyType"] | null;
1273
1369
  };
1370
+ GetUsersInOrgResponse: {
1371
+ /** @description The list of users in the org */
1372
+ users: components["schemas"]["UserIdInfo"][];
1373
+ };
1274
1374
  /** @description Stats pertaining the the sender `cube3signer` instance */
1275
1375
  HeartbeatRequest: {
1276
1376
  /**
@@ -1496,6 +1596,9 @@ export interface components {
1496
1596
  */
1497
1597
  purpose: string;
1498
1598
  };
1599
+ KeyInfos: {
1600
+ keys: components["schemas"]["KeyInfo"][];
1601
+ };
1499
1602
  /** @enum {string} */
1500
1603
  KeyType: "SecpEthAddr" | "SecpBtc" | "SecpBtcTest" | "SecpAvaAddr" | "SecpAvaTestAddr" | "BlsPub" | "BlsInactive" | "Ed25519SolanaAddr" | "Ed25519SuiAddr" | "Ed25519AptosAddr" | "Ed25519CardanoAddrVk" | "Ed25519StellarAddr" | "Mnemonic" | "Stark";
1501
1604
  /**
@@ -1505,6 +1608,13 @@ export interface components {
1505
1608
  * so that they can pass this back to us as a url query parameter.
1506
1609
  */
1507
1610
  LastEvalKey: string;
1611
+ ListMfaResponse: {
1612
+ /** @description All pending MFA requests */
1613
+ mfa_requests: components["schemas"]["MfaRequestInfo"][];
1614
+ };
1615
+ ListTokensResponse: {
1616
+ tokens: components["schemas"]["TokenInfo"][];
1617
+ };
1508
1618
  /**
1509
1619
  * @description Describes whether a user in an org is an Owner or just a regular member
1510
1620
  * @enum {string}
@@ -1546,11 +1656,6 @@ export interface components {
1546
1656
  * a single OIDC user to multiple `User`s in CubeSigner
1547
1657
  */
1548
1658
  OIDCIdentity: {
1549
- /**
1550
- * @description Free-form additional user info.
1551
- * @example null
1552
- */
1553
- disambiguator?: string | null;
1554
1659
  /**
1555
1660
  * @description The root-level issuer who administrates this user. Frome the OIDC spec:
1556
1661
  * Issuer Identifier for the Issuer of the response. The iss
@@ -1644,6 +1749,80 @@ export interface components {
1644
1749
  */
1645
1750
  "page.start"?: string | null;
1646
1751
  };
1752
+ /**
1753
+ * @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
1754
+ * value (which can the user pass back to use as a url query parameter to continue pagination).
1755
+ */
1756
+ PaginatedListKeysResponse: {
1757
+ keys: components["schemas"]["KeyInfo"][];
1758
+ } & ({
1759
+ /**
1760
+ * @description If set, the content of `response` does not contain the entire result set.
1761
+ * To fetch the next page of the result set, call the same endpoint
1762
+ * but specify this value as the 'page.start' query parameter.
1763
+ */
1764
+ last_evaluated_key?: string | null;
1765
+ });
1766
+ /**
1767
+ * @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
1768
+ * value (which can the user pass back to use as a url query parameter to continue pagination).
1769
+ */
1770
+ PaginatedListRoleKeysResponse: {
1771
+ /** @description All keys in a role */
1772
+ keys: components["schemas"]["KeyInRoleInfo"][];
1773
+ } & ({
1774
+ /**
1775
+ * @description If set, the content of `response` does not contain the entire result set.
1776
+ * To fetch the next page of the result set, call the same endpoint
1777
+ * but specify this value as the 'page.start' query parameter.
1778
+ */
1779
+ last_evaluated_key?: string | null;
1780
+ });
1781
+ /**
1782
+ * @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
1783
+ * value (which can the user pass back to use as a url query parameter to continue pagination).
1784
+ */
1785
+ PaginatedListRoleUsersResponse: {
1786
+ /** @description All users in a role */
1787
+ users: components["schemas"]["UserInRoleInfo"][];
1788
+ } & ({
1789
+ /**
1790
+ * @description If set, the content of `response` does not contain the entire result set.
1791
+ * To fetch the next page of the result set, call the same endpoint
1792
+ * but specify this value as the 'page.start' query parameter.
1793
+ */
1794
+ last_evaluated_key?: string | null;
1795
+ });
1796
+ /**
1797
+ * @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
1798
+ * value (which can the user pass back to use as a url query parameter to continue pagination).
1799
+ */
1800
+ PaginatedListRolesResponse: {
1801
+ /** @description All roles in an organization. */
1802
+ roles: components["schemas"]["RoleInfo"][];
1803
+ } & ({
1804
+ /**
1805
+ * @description If set, the content of `response` does not contain the entire result set.
1806
+ * To fetch the next page of the result set, call the same endpoint
1807
+ * but specify this value as the 'page.start' query parameter.
1808
+ */
1809
+ last_evaluated_key?: string | null;
1810
+ });
1811
+ /**
1812
+ * @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
1813
+ * value (which can the user pass back to use as a url query parameter to continue pagination).
1814
+ */
1815
+ PaginatedSessionsResponse: {
1816
+ /** @description The list of sessions */
1817
+ sessions: components["schemas"]["SessionInfo"][];
1818
+ } & ({
1819
+ /**
1820
+ * @description If set, the content of `response` does not contain the entire result set.
1821
+ * To fetch the next page of the result set, call the same endpoint
1822
+ * but specify this value as the 'page.start' query parameter.
1823
+ */
1824
+ last_evaluated_key?: string | null;
1825
+ });
1647
1826
  /**
1648
1827
  * @description This type represents a wire-encodable form of the PublicKeyCredential interface
1649
1828
  * Clients may need to manually encode into this format to communicate with the server
@@ -1739,7 +1918,7 @@ export interface components {
1739
1918
  * https://www.w3.org/TR/webauthn-2/#dom-publickeycredentialcreationoptions-timeout
1740
1919
  */
1741
1920
  timeout?: number | null;
1742
- user?: components["schemas"]["PublicKeyCredentialUserEntity"] | null;
1921
+ user: components["schemas"]["PublicKeyCredentialUserEntity"];
1743
1922
  };
1744
1923
  /**
1745
1924
  * @description This dictionary contains the attributes that are specified by a caller when
@@ -1845,7 +2024,7 @@ export interface components {
1845
2024
  *
1846
2025
  * https://www.w3.org/TR/webauthn-2/#dom-publickeycredentialrpentity-id
1847
2026
  */
1848
- id: string;
2027
+ id?: string | null;
1849
2028
  /**
1850
2029
  * @description A human-palatable name for the entity. Its function depends on what the
1851
2030
  * PublicKeyCredentialEntity represents: When inherited by
@@ -1989,6 +2168,13 @@ export interface components {
1989
2168
  * @enum {string}
1990
2169
  */
1991
2170
  ResidentKeyRequirement: "discouraged" | "preferred" | "required";
2171
+ RevokeTokenResponse: {
2172
+ token?: components["schemas"]["TokenInfo"] | null;
2173
+ };
2174
+ RevokeTokensResponse: {
2175
+ /** @description Tokens that were revoked. */
2176
+ revoked: components["schemas"]["TokenInfo"][];
2177
+ };
1992
2178
  RoleInfo: {
1993
2179
  /**
1994
2180
  * @description Whether the role is enabled
@@ -2002,6 +2188,22 @@ export interface components {
2002
2188
  * @example my_role
2003
2189
  */
2004
2190
  name?: string | null;
2191
+ /**
2192
+ * @description Policy that is checked whenever a key is accessed for signing via this role.
2193
+ * @example [
2194
+ * {
2195
+ * "SourceIpAllowlist": [
2196
+ * "123.456.78.9/16"
2197
+ * ]
2198
+ * },
2199
+ * {
2200
+ * "RequireMfa": {
2201
+ * "count": 1
2202
+ * }
2203
+ * }
2204
+ * ]
2205
+ */
2206
+ policy?: Record<string, never>[];
2005
2207
  /**
2006
2208
  * @description The ID of the role
2007
2209
  * @example Role#bfe3eccb-731e-430d-b1e5-ac1363e6b06b
@@ -2028,10 +2230,24 @@ export interface components {
2028
2230
  */
2029
2231
  session_id: string;
2030
2232
  };
2031
- SignRequest: {
2032
- message: Record<string, never>;
2233
+ /** @description The response from any operation operating on multiple sessions */
2234
+ SessionsResponse: {
2235
+ /** @description The list of sessions */
2236
+ sessions: components["schemas"]["SessionInfo"][];
2237
+ };
2238
+ /**
2239
+ * @example {
2240
+ * "message_base64": "AQABA8OKVzLEjststN4xXr39kLKHT8d58eQY1QEs6MeXwEFBrxTAlULX1troLbWxuAXQqgbQofGi6z8fJi7KAAIf7YMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJK0tn39k28s+X86W47EvbRRKnYBVQ8Q/l2m1EbfT7+vAQICAAEMAgAAAGQAAAAAAAAA"
2241
+ * }
2242
+ */
2243
+ SolanaSignRequest: {
2244
+ /** @description Solana base64-encoded serialized Message */
2245
+ message_base64: string;
2246
+ };
2247
+ SolanaSignResponse: {
2248
+ /** @description The hex-encoded signature. */
2249
+ signature: string;
2033
2250
  };
2034
- SolanaSignRequest: components["schemas"]["SignRequest"] & Record<string, never>;
2035
2251
  StakeRequest: {
2036
2252
  /**
2037
2253
  * Format: int64
@@ -2060,6 +2276,14 @@ export interface components {
2060
2276
  */
2061
2277
  withdrawal_addr: string;
2062
2278
  };
2279
+ StakeResponse: {
2280
+ /**
2281
+ * @description The validator key id ("Key#...")
2282
+ * @example Key#db1731f8-3659-45c0-885b-e11e1f5b7be2
2283
+ */
2284
+ created_validator_key_id: string;
2285
+ deposit_tx: components["schemas"]["DepositTxn"];
2286
+ };
2063
2287
  Status: {
2064
2288
  /** @description Users who are allowed to approve. Must be non-empty. */
2065
2289
  allowed_approvers: string[];
@@ -2099,6 +2323,18 @@ export interface components {
2099
2323
  /** @description The ID of the challenge that was returned from the POST endpoint */
2100
2324
  totp_id: string;
2101
2325
  };
2326
+ TotpInfo: {
2327
+ /**
2328
+ * @description The ID of the TOTP challenge.
2329
+ * @example TotpChallenge#7892ebba-563e-485b-bb7d-e26267363286
2330
+ */
2331
+ totp_id: string;
2332
+ /**
2333
+ * @description Standard TOTP url which includes everything needed to initialize TOTP.
2334
+ * @example otpauth://totp/Cubist:alice-%40example.com?secret=DAHF7KCOTQWSOMK4XFEMNHXO4J433OD7&issuer=Cubist
2335
+ */
2336
+ totp_url: string;
2337
+ };
2102
2338
  /** @description Options that should be set only for local devnet testing. */
2103
2339
  UnsafeConf: {
2104
2340
  /**
@@ -2145,6 +2381,22 @@ export interface components {
2145
2381
  */
2146
2382
  validator_index: string;
2147
2383
  };
2384
+ /**
2385
+ * @description Unstake responses are signed voluntary exit messages.
2386
+ * The schema for this message is defined
2387
+ * [here](https://github.com/ethereum/consensus-specs/blob/v1.0.1/specs/phase0/beacon-chain.md#signedvoluntaryexit).
2388
+ * This message can be directly POSTed to the Beacon node's
2389
+ * `/eth/v1/beacon/pool/voluntary_exits` end-point (see expected schema
2390
+ * [here](https://ethereum.github.io/beacon-APIs/#/Beacon/submitPoolVoluntaryExit)).
2391
+ */
2392
+ UnstakeResponse: {
2393
+ message: components["schemas"]["VoluntaryExit"];
2394
+ /**
2395
+ * @description BLS signature.
2396
+ * @example 0x910c7cd537ed91cc8c4a82f3cbd832e9be8c24a22e9c86df479f7ce42025ea6a09619b418b666a060e260d2aae31b8e50e9d05ca3442c7eed3b507e5207e14674275f68c2ba84c4bf6b8dd364a304acac8cfab3681e2514b4400f9242bc61164
2397
+ */
2398
+ signature: string;
2399
+ };
2148
2400
  UpdateKeyRequest: {
2149
2401
  /**
2150
2402
  * @description If set, updates the keys's `enabled` property to this value.
@@ -2199,12 +2451,52 @@ export interface components {
2199
2451
  */
2200
2452
  policy?: Record<string, never>[] | null;
2201
2453
  };
2454
+ UpdateOrgResponse: {
2455
+ /** @description The new value of the 'enabled' property */
2456
+ enabled?: boolean | null;
2457
+ /**
2458
+ * @description The new human-readable name for the org (must be alphanumeric)
2459
+ * @example my_org_name
2460
+ */
2461
+ name?: string | null;
2462
+ /**
2463
+ * @description The ID of the organization
2464
+ * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
2465
+ */
2466
+ org_id: string;
2467
+ /**
2468
+ * @description The new value of org-wide policies
2469
+ * @example [
2470
+ * {
2471
+ * "MaxDailyUnstake": 5
2472
+ * },
2473
+ * {
2474
+ * "OriginAllowlist": [
2475
+ * "https://example.com"
2476
+ * ]
2477
+ * }
2478
+ * ]
2479
+ */
2480
+ policy?: Record<string, never>[] | null;
2481
+ };
2202
2482
  UpdateRoleRequest: {
2203
2483
  /**
2204
2484
  * @description If set, updates the role's `enabled` property to this value.
2205
2485
  * Once disabled, a role cannot be used; and it's tokens cannot be used for signing.
2206
2486
  */
2207
2487
  enabled?: boolean | null;
2488
+ /**
2489
+ * @description If set, update this role's key policies (old policies will be overwritten!).
2490
+ * Only "deny" style policies may be set.
2491
+ * @example [
2492
+ * {
2493
+ * "SourceIpAllowlist": [
2494
+ * "123.456.78.9/16"
2495
+ * ]
2496
+ * }
2497
+ * ]
2498
+ */
2499
+ policy?: Record<string, never>[] | null;
2208
2500
  };
2209
2501
  UserIdInfo: {
2210
2502
  /**
@@ -2720,6 +3012,22 @@ export interface components {
2720
3012
  * @example my_role
2721
3013
  */
2722
3014
  name?: string | null;
3015
+ /**
3016
+ * @description Policy that is checked whenever a key is accessed for signing via this role.
3017
+ * @example [
3018
+ * {
3019
+ * "SourceIpAllowlist": [
3020
+ * "123.456.78.9/16"
3021
+ * ]
3022
+ * },
3023
+ * {
3024
+ * "RequireMfa": {
3025
+ * "count": 1
3026
+ * }
3027
+ * }
3028
+ * ]
3029
+ */
3030
+ policy?: Record<string, never>[];
2723
3031
  /**
2724
3032
  * @description The ID of the role
2725
3033
  * @example Role#bfe3eccb-731e-430d-b1e5-ac1363e6b06b
@@ -2888,7 +3196,6 @@ export type external = Record<string, never>;
2888
3196
  export interface operations {
2889
3197
  /**
2890
3198
  * User Info
2891
- * @deprecated
2892
3199
  * @description User Info
2893
3200
  *
2894
3201
  * Retrieves information about the current user.
@@ -3847,7 +4154,7 @@ export interface operations {
3847
4154
  };
3848
4155
  };
3849
4156
  responses: {
3850
- 200: components["responses"]["EmptyImpl"];
4157
+ 200: components["responses"]["RoleInfo"];
3851
4158
  default: {
3852
4159
  content: {
3853
4160
  "application/json": components["schemas"]["ErrorResponse"];
@@ -4251,6 +4558,31 @@ export interface operations {
4251
4558
  };
4252
4559
  };
4253
4560
  };
4561
+ /**
4562
+ * Revoke current session
4563
+ * @description Revoke current session
4564
+ *
4565
+ * Immediately revokes the current session, preventing it from being used or refreshed
4566
+ */
4567
+ revokeCurrentSession: {
4568
+ parameters: {
4569
+ path: {
4570
+ /**
4571
+ * @description Name or ID of the desired Org
4572
+ * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
4573
+ */
4574
+ org_id: string;
4575
+ };
4576
+ };
4577
+ responses: {
4578
+ 200: components["responses"]["EmptyImpl"];
4579
+ default: {
4580
+ content: {
4581
+ "application/json": components["schemas"]["ErrorResponse"];
4582
+ };
4583
+ };
4584
+ };
4585
+ };
4254
4586
  /**
4255
4587
  * Get session information
4256
4588
  * @description Get session information