@cubist-labs/cubesigner-sdk 0.1.77 → 0.2.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/src/client.d.ts +434 -7
- package/dist/src/client.js +1022 -18
- package/dist/src/ethers/index.d.ts +2 -4
- package/dist/src/ethers/index.js +5 -8
- package/dist/src/index.d.ts +41 -65
- package/dist/src/index.js +58 -231
- package/dist/src/key.d.ts +9 -45
- package/dist/src/key.js +18 -89
- package/dist/src/mfa.d.ts +85 -14
- package/dist/src/mfa.js +158 -40
- package/dist/src/org.d.ts +217 -127
- package/dist/src/org.js +94 -232
- package/dist/src/role.d.ts +76 -74
- package/dist/src/role.js +79 -136
- package/dist/src/schema.d.ts +345 -13
- package/dist/src/schema.js +1 -1
- package/dist/src/schema_types.d.ts +103 -0
- package/dist/src/schema_types.js +3 -0
- package/dist/src/session/session_manager.js +1 -1
- package/dist/src/session/signer_session_manager.d.ts +14 -29
- package/dist/src/session/signer_session_manager.js +26 -79
- package/dist/src/signer_session.d.ts +212 -191
- package/dist/src/signer_session.js +120 -313
- package/package.json +6 -6
- package/src/client.ts +1217 -7
- package/src/ethers/index.ts +5 -17
- package/src/index.ts +69 -262
- package/src/key.ts +19 -121
- package/src/{fido.ts → mfa.ts} +62 -26
- package/src/org.ts +96 -292
- package/src/role.ts +108 -181
- package/src/schema.ts +345 -13
- package/src/schema_types.ts +103 -0
- package/src/session/session_manager.ts +1 -1
- package/src/session/signer_session_manager.ts +35 -109
- package/src/signer_session.ts +115 -442
package/dist/src/schema.d.ts
CHANGED
|
@@ -6,7 +6,6 @@ export interface paths {
|
|
|
6
6
|
"/v0/about_me": {
|
|
7
7
|
/**
|
|
8
8
|
* User Info
|
|
9
|
-
* @deprecated
|
|
10
9
|
* @description User Info
|
|
11
10
|
*
|
|
12
11
|
* Retrieves information about the current user.
|
|
@@ -393,6 +392,15 @@ export interface paths {
|
|
|
393
392
|
*/
|
|
394
393
|
delete: operations["revokeSessions"];
|
|
395
394
|
};
|
|
395
|
+
"/v0/org/{org_id}/session/self": {
|
|
396
|
+
/**
|
|
397
|
+
* Revoke current session
|
|
398
|
+
* @description Revoke current session
|
|
399
|
+
*
|
|
400
|
+
* Immediately revokes the current session, preventing it from being used or refreshed
|
|
401
|
+
*/
|
|
402
|
+
delete: operations["revokeCurrentSession"];
|
|
403
|
+
};
|
|
396
404
|
"/v0/org/{org_id}/session/{session_id}": {
|
|
397
405
|
/**
|
|
398
406
|
* Get session information
|
|
@@ -707,6 +715,10 @@ export interface components {
|
|
|
707
715
|
mfa_policy?: Record<string, unknown> | null;
|
|
708
716
|
role: components["schemas"]["MemberRole"];
|
|
709
717
|
};
|
|
718
|
+
AddThirdPartyUserResponse: {
|
|
719
|
+
/** @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f */
|
|
720
|
+
user_id: string;
|
|
721
|
+
};
|
|
710
722
|
ApprovalInfo: {
|
|
711
723
|
timestamp: components["schemas"]["EpochDateTime"];
|
|
712
724
|
};
|
|
@@ -856,6 +868,10 @@ export interface components {
|
|
|
856
868
|
*/
|
|
857
869
|
tx: Record<string, never>;
|
|
858
870
|
};
|
|
871
|
+
AvaSignResponse: {
|
|
872
|
+
/** @description The hex-encoded signature. */
|
|
873
|
+
signature: string;
|
|
874
|
+
};
|
|
859
875
|
/** @description Wrapper around a zeroizing 32-byte fixed-size array */
|
|
860
876
|
B32: string;
|
|
861
877
|
/**
|
|
@@ -872,6 +888,10 @@ export interface components {
|
|
|
872
888
|
*/
|
|
873
889
|
message_base64: string;
|
|
874
890
|
};
|
|
891
|
+
BlobSignResponse: {
|
|
892
|
+
/** @description The hex-encoded signature. */
|
|
893
|
+
signature: string;
|
|
894
|
+
};
|
|
875
895
|
/** @enum {string} */
|
|
876
896
|
BtcSighashType: "All" | "None" | "Single" | "AllPlusAnyoneCanPay" | "NonePlusAnyoneCanPay" | "SinglePlusAnyoneCanPay";
|
|
877
897
|
BtcSignRequest: {
|
|
@@ -879,6 +899,13 @@ export interface components {
|
|
|
879
899
|
/** @description The bitcoin transaction to sign */
|
|
880
900
|
tx: Record<string, never>;
|
|
881
901
|
};
|
|
902
|
+
BtcSignResponse: {
|
|
903
|
+
/**
|
|
904
|
+
* @description The hex-encoded signature in compact format.
|
|
905
|
+
* @example 0x454aef27c21df7dd8f537dc869f4cd65286ce239a52d36470f4d85be85a891b02789e5ffd8560b32a98110e5d0096802e4c14145cf6c44f10a768c87755eaa4800
|
|
906
|
+
*/
|
|
907
|
+
signature: string;
|
|
908
|
+
};
|
|
882
909
|
BtcSignatureKind: {
|
|
883
910
|
/** @description Segregated Witness */
|
|
884
911
|
Segwit: {
|
|
@@ -932,6 +959,18 @@ export interface components {
|
|
|
932
959
|
/** @enum {string} */
|
|
933
960
|
type: "fido";
|
|
934
961
|
};
|
|
962
|
+
CreateKeyImportKeyResponse: components["schemas"]["KeyImportKey"] & {
|
|
963
|
+
/**
|
|
964
|
+
* @description An attestation document from a secure enclave, including an
|
|
965
|
+
* RSA signing key used to sign the contents of this message.
|
|
966
|
+
*/
|
|
967
|
+
enclave_attestation: string;
|
|
968
|
+
/**
|
|
969
|
+
* @description An RSA-PSS-SHA256 signature on the public key and encrypted
|
|
970
|
+
* secrets attesting to their generation inside a secure enclave.
|
|
971
|
+
*/
|
|
972
|
+
enclave_signature: string;
|
|
973
|
+
};
|
|
935
974
|
CreateKeyRequest: {
|
|
936
975
|
/**
|
|
937
976
|
* Format: int64
|
|
@@ -952,6 +991,10 @@ export interface components {
|
|
|
952
991
|
*/
|
|
953
992
|
owner?: string | null;
|
|
954
993
|
};
|
|
994
|
+
CreateKeyResponse: {
|
|
995
|
+
/** @description The info about the created keys */
|
|
996
|
+
keys: components["schemas"]["KeyInfo"][];
|
|
997
|
+
};
|
|
955
998
|
/** @description Optional create role request body */
|
|
956
999
|
CreateRoleRequest: {
|
|
957
1000
|
/**
|
|
@@ -960,6 +1003,19 @@ export interface components {
|
|
|
960
1003
|
*/
|
|
961
1004
|
name: string;
|
|
962
1005
|
};
|
|
1006
|
+
/** @description The newly created role information */
|
|
1007
|
+
CreateRoleResponse: {
|
|
1008
|
+
/**
|
|
1009
|
+
* @description A human-readable name for the role.
|
|
1010
|
+
* @example my_role
|
|
1011
|
+
*/
|
|
1012
|
+
name?: string | null;
|
|
1013
|
+
/**
|
|
1014
|
+
* @description The id of the newly created role
|
|
1015
|
+
* @example Role#bfe3eccb-731e-430d-b1e5-ac1363e6b06b
|
|
1016
|
+
*/
|
|
1017
|
+
role_id: string;
|
|
1018
|
+
};
|
|
963
1019
|
CreateTokenRequest: components["schemas"]["RatchetConfig"] & ({
|
|
964
1020
|
/**
|
|
965
1021
|
* @description A human readable description of the purpose of the key
|
|
@@ -1122,8 +1178,20 @@ export interface components {
|
|
|
1122
1178
|
/** @description EIP-712 typed data. Refer to the JSON schema defined in EIP-712. */
|
|
1123
1179
|
typed_data: Record<string, never>;
|
|
1124
1180
|
};
|
|
1181
|
+
Eip712SignResponse: {
|
|
1182
|
+
/**
|
|
1183
|
+
* @description Hex-encoded signature comprising 65 bytes in the format required
|
|
1184
|
+
* by ecrecover: 32-byte r, 32-byte s, and one-byte recovery-id v
|
|
1185
|
+
* which is either 27 or 28.
|
|
1186
|
+
* @example 0x4355c47d63924e8a72e509b65029052eb6c299d53a04e167c5775fd466751c9d07299936d304c153f6443dfa05f40ff007d72911b6f72307f996231605b915621c
|
|
1187
|
+
*/
|
|
1188
|
+
signature: string;
|
|
1189
|
+
};
|
|
1125
1190
|
/** @default null */
|
|
1126
1191
|
Empty: Record<string, unknown> | null;
|
|
1192
|
+
EmptyImpl: {
|
|
1193
|
+
status: string;
|
|
1194
|
+
};
|
|
1127
1195
|
/**
|
|
1128
1196
|
* @description Epoch is a quoted `uint64`.
|
|
1129
1197
|
* @example 256
|
|
@@ -1173,6 +1241,13 @@ export interface components {
|
|
|
1173
1241
|
*/
|
|
1174
1242
|
tx: Record<string, never>;
|
|
1175
1243
|
};
|
|
1244
|
+
Eth1SignResponse: {
|
|
1245
|
+
/**
|
|
1246
|
+
* @description Hex-encoded RLP encoding of the transaction and its signature
|
|
1247
|
+
* @example 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
|
|
1248
|
+
*/
|
|
1249
|
+
rlp_signed_tx: string;
|
|
1250
|
+
};
|
|
1176
1251
|
/**
|
|
1177
1252
|
* @example {
|
|
1178
1253
|
* "eth2_sign_request": {
|
|
@@ -1202,18 +1277,39 @@ export interface components {
|
|
|
1202
1277
|
eth2_sign_request: Record<string, never>;
|
|
1203
1278
|
network: components["schemas"]["Network"];
|
|
1204
1279
|
};
|
|
1280
|
+
Eth2SignResponse: {
|
|
1281
|
+
/**
|
|
1282
|
+
* @description Hex encoded signature prefixed with 0x e.g. "0x0000..."
|
|
1283
|
+
* @example 0xb4f2ef9d12a54e1f569596c07c97d6d730535b6ffc0d287761dc78103a86326782471a04c75ce7a6faea08ca9a4a0830031cdcb893da8711d54aa22619f1a7e71b8185ddf4c6bfd9babbd735960e35e56bd6eeb89625b04850e7a9ef8846e549
|
|
1284
|
+
*/
|
|
1285
|
+
signature: string;
|
|
1286
|
+
};
|
|
1205
1287
|
/** @description Sent from the client to the server to answer a fido challenge */
|
|
1206
1288
|
FidoAssertAnswer: {
|
|
1207
1289
|
/** @description The ID of the challenge that was returned from the POST endpoint */
|
|
1208
1290
|
challenge_id: string;
|
|
1209
1291
|
credential: components["schemas"]["PublicKeyCredential"];
|
|
1210
1292
|
};
|
|
1293
|
+
FidoAssertChallenge: {
|
|
1294
|
+
/** @description The id of the challenge. Must be supplied when answering the challenge. */
|
|
1295
|
+
challenge_id: string;
|
|
1296
|
+
options: components["schemas"]["PublicKeyCredentialRequestOptions"];
|
|
1297
|
+
};
|
|
1211
1298
|
/** @description Sent from the client to the server to answer a fido challenge */
|
|
1212
1299
|
FidoCreateChallengeAnswer: {
|
|
1213
1300
|
/** @description The ID of the challenge that was returned from the POST endpoint */
|
|
1214
1301
|
challenge_id: string;
|
|
1215
1302
|
credential: components["schemas"]["PublicKeyCredential"];
|
|
1216
1303
|
};
|
|
1304
|
+
/**
|
|
1305
|
+
* @description Sent by the server to the client. Contains the challenge data that must be
|
|
1306
|
+
* used to generate a new credential
|
|
1307
|
+
*/
|
|
1308
|
+
FidoCreateChallengeResponse: {
|
|
1309
|
+
/** @description The id of the challenge. Must be supplied when answering the challenge. */
|
|
1310
|
+
challenge_id: string;
|
|
1311
|
+
options: components["schemas"]["PublicKeyCredentialCreationOptions"];
|
|
1312
|
+
};
|
|
1217
1313
|
/** @description Declares intent to register a new FIDO key */
|
|
1218
1314
|
FidoCreateRequest: {
|
|
1219
1315
|
/**
|
|
@@ -1271,6 +1367,10 @@ export interface components {
|
|
|
1271
1367
|
GetKeysInOrgRequest: {
|
|
1272
1368
|
key_type?: components["schemas"]["KeyType"] | null;
|
|
1273
1369
|
};
|
|
1370
|
+
GetUsersInOrgResponse: {
|
|
1371
|
+
/** @description The list of users in the org */
|
|
1372
|
+
users: components["schemas"]["UserIdInfo"][];
|
|
1373
|
+
};
|
|
1274
1374
|
/** @description Stats pertaining the the sender `cube3signer` instance */
|
|
1275
1375
|
HeartbeatRequest: {
|
|
1276
1376
|
/**
|
|
@@ -1496,6 +1596,9 @@ export interface components {
|
|
|
1496
1596
|
*/
|
|
1497
1597
|
purpose: string;
|
|
1498
1598
|
};
|
|
1599
|
+
KeyInfos: {
|
|
1600
|
+
keys: components["schemas"]["KeyInfo"][];
|
|
1601
|
+
};
|
|
1499
1602
|
/** @enum {string} */
|
|
1500
1603
|
KeyType: "SecpEthAddr" | "SecpBtc" | "SecpBtcTest" | "SecpAvaAddr" | "SecpAvaTestAddr" | "BlsPub" | "BlsInactive" | "Ed25519SolanaAddr" | "Ed25519SuiAddr" | "Ed25519AptosAddr" | "Ed25519CardanoAddrVk" | "Ed25519StellarAddr" | "Mnemonic" | "Stark";
|
|
1501
1604
|
/**
|
|
@@ -1505,6 +1608,13 @@ export interface components {
|
|
|
1505
1608
|
* so that they can pass this back to us as a url query parameter.
|
|
1506
1609
|
*/
|
|
1507
1610
|
LastEvalKey: string;
|
|
1611
|
+
ListMfaResponse: {
|
|
1612
|
+
/** @description All pending MFA requests */
|
|
1613
|
+
mfa_requests: components["schemas"]["MfaRequestInfo"][];
|
|
1614
|
+
};
|
|
1615
|
+
ListTokensResponse: {
|
|
1616
|
+
tokens: components["schemas"]["TokenInfo"][];
|
|
1617
|
+
};
|
|
1508
1618
|
/**
|
|
1509
1619
|
* @description Describes whether a user in an org is an Owner or just a regular member
|
|
1510
1620
|
* @enum {string}
|
|
@@ -1546,11 +1656,6 @@ export interface components {
|
|
|
1546
1656
|
* a single OIDC user to multiple `User`s in CubeSigner
|
|
1547
1657
|
*/
|
|
1548
1658
|
OIDCIdentity: {
|
|
1549
|
-
/**
|
|
1550
|
-
* @description Free-form additional user info.
|
|
1551
|
-
* @example null
|
|
1552
|
-
*/
|
|
1553
|
-
disambiguator?: string | null;
|
|
1554
1659
|
/**
|
|
1555
1660
|
* @description The root-level issuer who administrates this user. Frome the OIDC spec:
|
|
1556
1661
|
* Issuer Identifier for the Issuer of the response. The iss
|
|
@@ -1644,6 +1749,80 @@ export interface components {
|
|
|
1644
1749
|
*/
|
|
1645
1750
|
"page.start"?: string | null;
|
|
1646
1751
|
};
|
|
1752
|
+
/**
|
|
1753
|
+
* @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
|
|
1754
|
+
* value (which can the user pass back to use as a url query parameter to continue pagination).
|
|
1755
|
+
*/
|
|
1756
|
+
PaginatedListKeysResponse: {
|
|
1757
|
+
keys: components["schemas"]["KeyInfo"][];
|
|
1758
|
+
} & ({
|
|
1759
|
+
/**
|
|
1760
|
+
* @description If set, the content of `response` does not contain the entire result set.
|
|
1761
|
+
* To fetch the next page of the result set, call the same endpoint
|
|
1762
|
+
* but specify this value as the 'page.start' query parameter.
|
|
1763
|
+
*/
|
|
1764
|
+
last_evaluated_key?: string | null;
|
|
1765
|
+
});
|
|
1766
|
+
/**
|
|
1767
|
+
* @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
|
|
1768
|
+
* value (which can the user pass back to use as a url query parameter to continue pagination).
|
|
1769
|
+
*/
|
|
1770
|
+
PaginatedListRoleKeysResponse: {
|
|
1771
|
+
/** @description All keys in a role */
|
|
1772
|
+
keys: components["schemas"]["KeyInRoleInfo"][];
|
|
1773
|
+
} & ({
|
|
1774
|
+
/**
|
|
1775
|
+
* @description If set, the content of `response` does not contain the entire result set.
|
|
1776
|
+
* To fetch the next page of the result set, call the same endpoint
|
|
1777
|
+
* but specify this value as the 'page.start' query parameter.
|
|
1778
|
+
*/
|
|
1779
|
+
last_evaluated_key?: string | null;
|
|
1780
|
+
});
|
|
1781
|
+
/**
|
|
1782
|
+
* @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
|
|
1783
|
+
* value (which can the user pass back to use as a url query parameter to continue pagination).
|
|
1784
|
+
*/
|
|
1785
|
+
PaginatedListRoleUsersResponse: {
|
|
1786
|
+
/** @description All users in a role */
|
|
1787
|
+
users: components["schemas"]["UserInRoleInfo"][];
|
|
1788
|
+
} & ({
|
|
1789
|
+
/**
|
|
1790
|
+
* @description If set, the content of `response` does not contain the entire result set.
|
|
1791
|
+
* To fetch the next page of the result set, call the same endpoint
|
|
1792
|
+
* but specify this value as the 'page.start' query parameter.
|
|
1793
|
+
*/
|
|
1794
|
+
last_evaluated_key?: string | null;
|
|
1795
|
+
});
|
|
1796
|
+
/**
|
|
1797
|
+
* @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
|
|
1798
|
+
* value (which can the user pass back to use as a url query parameter to continue pagination).
|
|
1799
|
+
*/
|
|
1800
|
+
PaginatedListRolesResponse: {
|
|
1801
|
+
/** @description All roles in an organization. */
|
|
1802
|
+
roles: components["schemas"]["RoleInfo"][];
|
|
1803
|
+
} & ({
|
|
1804
|
+
/**
|
|
1805
|
+
* @description If set, the content of `response` does not contain the entire result set.
|
|
1806
|
+
* To fetch the next page of the result set, call the same endpoint
|
|
1807
|
+
* but specify this value as the 'page.start' query parameter.
|
|
1808
|
+
*/
|
|
1809
|
+
last_evaluated_key?: string | null;
|
|
1810
|
+
});
|
|
1811
|
+
/**
|
|
1812
|
+
* @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
|
|
1813
|
+
* value (which can the user pass back to use as a url query parameter to continue pagination).
|
|
1814
|
+
*/
|
|
1815
|
+
PaginatedSessionsResponse: {
|
|
1816
|
+
/** @description The list of sessions */
|
|
1817
|
+
sessions: components["schemas"]["SessionInfo"][];
|
|
1818
|
+
} & ({
|
|
1819
|
+
/**
|
|
1820
|
+
* @description If set, the content of `response` does not contain the entire result set.
|
|
1821
|
+
* To fetch the next page of the result set, call the same endpoint
|
|
1822
|
+
* but specify this value as the 'page.start' query parameter.
|
|
1823
|
+
*/
|
|
1824
|
+
last_evaluated_key?: string | null;
|
|
1825
|
+
});
|
|
1647
1826
|
/**
|
|
1648
1827
|
* @description This type represents a wire-encodable form of the PublicKeyCredential interface
|
|
1649
1828
|
* Clients may need to manually encode into this format to communicate with the server
|
|
@@ -1739,7 +1918,7 @@ export interface components {
|
|
|
1739
1918
|
* https://www.w3.org/TR/webauthn-2/#dom-publickeycredentialcreationoptions-timeout
|
|
1740
1919
|
*/
|
|
1741
1920
|
timeout?: number | null;
|
|
1742
|
-
user
|
|
1921
|
+
user: components["schemas"]["PublicKeyCredentialUserEntity"];
|
|
1743
1922
|
};
|
|
1744
1923
|
/**
|
|
1745
1924
|
* @description This dictionary contains the attributes that are specified by a caller when
|
|
@@ -1845,7 +2024,7 @@ export interface components {
|
|
|
1845
2024
|
*
|
|
1846
2025
|
* https://www.w3.org/TR/webauthn-2/#dom-publickeycredentialrpentity-id
|
|
1847
2026
|
*/
|
|
1848
|
-
id
|
|
2027
|
+
id?: string | null;
|
|
1849
2028
|
/**
|
|
1850
2029
|
* @description A human-palatable name for the entity. Its function depends on what the
|
|
1851
2030
|
* PublicKeyCredentialEntity represents: When inherited by
|
|
@@ -1989,6 +2168,13 @@ export interface components {
|
|
|
1989
2168
|
* @enum {string}
|
|
1990
2169
|
*/
|
|
1991
2170
|
ResidentKeyRequirement: "discouraged" | "preferred" | "required";
|
|
2171
|
+
RevokeTokenResponse: {
|
|
2172
|
+
token?: components["schemas"]["TokenInfo"] | null;
|
|
2173
|
+
};
|
|
2174
|
+
RevokeTokensResponse: {
|
|
2175
|
+
/** @description Tokens that were revoked. */
|
|
2176
|
+
revoked: components["schemas"]["TokenInfo"][];
|
|
2177
|
+
};
|
|
1992
2178
|
RoleInfo: {
|
|
1993
2179
|
/**
|
|
1994
2180
|
* @description Whether the role is enabled
|
|
@@ -2002,6 +2188,22 @@ export interface components {
|
|
|
2002
2188
|
* @example my_role
|
|
2003
2189
|
*/
|
|
2004
2190
|
name?: string | null;
|
|
2191
|
+
/**
|
|
2192
|
+
* @description Policy that is checked whenever a key is accessed for signing via this role.
|
|
2193
|
+
* @example [
|
|
2194
|
+
* {
|
|
2195
|
+
* "SourceIpAllowlist": [
|
|
2196
|
+
* "123.456.78.9/16"
|
|
2197
|
+
* ]
|
|
2198
|
+
* },
|
|
2199
|
+
* {
|
|
2200
|
+
* "RequireMfa": {
|
|
2201
|
+
* "count": 1
|
|
2202
|
+
* }
|
|
2203
|
+
* }
|
|
2204
|
+
* ]
|
|
2205
|
+
*/
|
|
2206
|
+
policy?: Record<string, never>[];
|
|
2005
2207
|
/**
|
|
2006
2208
|
* @description The ID of the role
|
|
2007
2209
|
* @example Role#bfe3eccb-731e-430d-b1e5-ac1363e6b06b
|
|
@@ -2028,10 +2230,24 @@ export interface components {
|
|
|
2028
2230
|
*/
|
|
2029
2231
|
session_id: string;
|
|
2030
2232
|
};
|
|
2031
|
-
|
|
2032
|
-
|
|
2233
|
+
/** @description The response from any operation operating on multiple sessions */
|
|
2234
|
+
SessionsResponse: {
|
|
2235
|
+
/** @description The list of sessions */
|
|
2236
|
+
sessions: components["schemas"]["SessionInfo"][];
|
|
2237
|
+
};
|
|
2238
|
+
/**
|
|
2239
|
+
* @example {
|
|
2240
|
+
* "message_base64": "AQABA8OKVzLEjststN4xXr39kLKHT8d58eQY1QEs6MeXwEFBrxTAlULX1troLbWxuAXQqgbQofGi6z8fJi7KAAIf7YMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJK0tn39k28s+X86W47EvbRRKnYBVQ8Q/l2m1EbfT7+vAQICAAEMAgAAAGQAAAAAAAAA"
|
|
2241
|
+
* }
|
|
2242
|
+
*/
|
|
2243
|
+
SolanaSignRequest: {
|
|
2244
|
+
/** @description Solana base64-encoded serialized Message */
|
|
2245
|
+
message_base64: string;
|
|
2246
|
+
};
|
|
2247
|
+
SolanaSignResponse: {
|
|
2248
|
+
/** @description The hex-encoded signature. */
|
|
2249
|
+
signature: string;
|
|
2033
2250
|
};
|
|
2034
|
-
SolanaSignRequest: components["schemas"]["SignRequest"] & Record<string, never>;
|
|
2035
2251
|
StakeRequest: {
|
|
2036
2252
|
/**
|
|
2037
2253
|
* Format: int64
|
|
@@ -2060,6 +2276,14 @@ export interface components {
|
|
|
2060
2276
|
*/
|
|
2061
2277
|
withdrawal_addr: string;
|
|
2062
2278
|
};
|
|
2279
|
+
StakeResponse: {
|
|
2280
|
+
/**
|
|
2281
|
+
* @description The validator key id ("Key#...")
|
|
2282
|
+
* @example Key#db1731f8-3659-45c0-885b-e11e1f5b7be2
|
|
2283
|
+
*/
|
|
2284
|
+
created_validator_key_id: string;
|
|
2285
|
+
deposit_tx: components["schemas"]["DepositTxn"];
|
|
2286
|
+
};
|
|
2063
2287
|
Status: {
|
|
2064
2288
|
/** @description Users who are allowed to approve. Must be non-empty. */
|
|
2065
2289
|
allowed_approvers: string[];
|
|
@@ -2099,6 +2323,18 @@ export interface components {
|
|
|
2099
2323
|
/** @description The ID of the challenge that was returned from the POST endpoint */
|
|
2100
2324
|
totp_id: string;
|
|
2101
2325
|
};
|
|
2326
|
+
TotpInfo: {
|
|
2327
|
+
/**
|
|
2328
|
+
* @description The ID of the TOTP challenge.
|
|
2329
|
+
* @example TotpChallenge#7892ebba-563e-485b-bb7d-e26267363286
|
|
2330
|
+
*/
|
|
2331
|
+
totp_id: string;
|
|
2332
|
+
/**
|
|
2333
|
+
* @description Standard TOTP url which includes everything needed to initialize TOTP.
|
|
2334
|
+
* @example otpauth://totp/Cubist:alice-%40example.com?secret=DAHF7KCOTQWSOMK4XFEMNHXO4J433OD7&issuer=Cubist
|
|
2335
|
+
*/
|
|
2336
|
+
totp_url: string;
|
|
2337
|
+
};
|
|
2102
2338
|
/** @description Options that should be set only for local devnet testing. */
|
|
2103
2339
|
UnsafeConf: {
|
|
2104
2340
|
/**
|
|
@@ -2145,6 +2381,22 @@ export interface components {
|
|
|
2145
2381
|
*/
|
|
2146
2382
|
validator_index: string;
|
|
2147
2383
|
};
|
|
2384
|
+
/**
|
|
2385
|
+
* @description Unstake responses are signed voluntary exit messages.
|
|
2386
|
+
* The schema for this message is defined
|
|
2387
|
+
* [here](https://github.com/ethereum/consensus-specs/blob/v1.0.1/specs/phase0/beacon-chain.md#signedvoluntaryexit).
|
|
2388
|
+
* This message can be directly POSTed to the Beacon node's
|
|
2389
|
+
* `/eth/v1/beacon/pool/voluntary_exits` end-point (see expected schema
|
|
2390
|
+
* [here](https://ethereum.github.io/beacon-APIs/#/Beacon/submitPoolVoluntaryExit)).
|
|
2391
|
+
*/
|
|
2392
|
+
UnstakeResponse: {
|
|
2393
|
+
message: components["schemas"]["VoluntaryExit"];
|
|
2394
|
+
/**
|
|
2395
|
+
* @description BLS signature.
|
|
2396
|
+
* @example 0x910c7cd537ed91cc8c4a82f3cbd832e9be8c24a22e9c86df479f7ce42025ea6a09619b418b666a060e260d2aae31b8e50e9d05ca3442c7eed3b507e5207e14674275f68c2ba84c4bf6b8dd364a304acac8cfab3681e2514b4400f9242bc61164
|
|
2397
|
+
*/
|
|
2398
|
+
signature: string;
|
|
2399
|
+
};
|
|
2148
2400
|
UpdateKeyRequest: {
|
|
2149
2401
|
/**
|
|
2150
2402
|
* @description If set, updates the keys's `enabled` property to this value.
|
|
@@ -2199,12 +2451,52 @@ export interface components {
|
|
|
2199
2451
|
*/
|
|
2200
2452
|
policy?: Record<string, never>[] | null;
|
|
2201
2453
|
};
|
|
2454
|
+
UpdateOrgResponse: {
|
|
2455
|
+
/** @description The new value of the 'enabled' property */
|
|
2456
|
+
enabled?: boolean | null;
|
|
2457
|
+
/**
|
|
2458
|
+
* @description The new human-readable name for the org (must be alphanumeric)
|
|
2459
|
+
* @example my_org_name
|
|
2460
|
+
*/
|
|
2461
|
+
name?: string | null;
|
|
2462
|
+
/**
|
|
2463
|
+
* @description The ID of the organization
|
|
2464
|
+
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
2465
|
+
*/
|
|
2466
|
+
org_id: string;
|
|
2467
|
+
/**
|
|
2468
|
+
* @description The new value of org-wide policies
|
|
2469
|
+
* @example [
|
|
2470
|
+
* {
|
|
2471
|
+
* "MaxDailyUnstake": 5
|
|
2472
|
+
* },
|
|
2473
|
+
* {
|
|
2474
|
+
* "OriginAllowlist": [
|
|
2475
|
+
* "https://example.com"
|
|
2476
|
+
* ]
|
|
2477
|
+
* }
|
|
2478
|
+
* ]
|
|
2479
|
+
*/
|
|
2480
|
+
policy?: Record<string, never>[] | null;
|
|
2481
|
+
};
|
|
2202
2482
|
UpdateRoleRequest: {
|
|
2203
2483
|
/**
|
|
2204
2484
|
* @description If set, updates the role's `enabled` property to this value.
|
|
2205
2485
|
* Once disabled, a role cannot be used; and it's tokens cannot be used for signing.
|
|
2206
2486
|
*/
|
|
2207
2487
|
enabled?: boolean | null;
|
|
2488
|
+
/**
|
|
2489
|
+
* @description If set, update this role's key policies (old policies will be overwritten!).
|
|
2490
|
+
* Only "deny" style policies may be set.
|
|
2491
|
+
* @example [
|
|
2492
|
+
* {
|
|
2493
|
+
* "SourceIpAllowlist": [
|
|
2494
|
+
* "123.456.78.9/16"
|
|
2495
|
+
* ]
|
|
2496
|
+
* }
|
|
2497
|
+
* ]
|
|
2498
|
+
*/
|
|
2499
|
+
policy?: Record<string, never>[] | null;
|
|
2208
2500
|
};
|
|
2209
2501
|
UserIdInfo: {
|
|
2210
2502
|
/**
|
|
@@ -2720,6 +3012,22 @@ export interface components {
|
|
|
2720
3012
|
* @example my_role
|
|
2721
3013
|
*/
|
|
2722
3014
|
name?: string | null;
|
|
3015
|
+
/**
|
|
3016
|
+
* @description Policy that is checked whenever a key is accessed for signing via this role.
|
|
3017
|
+
* @example [
|
|
3018
|
+
* {
|
|
3019
|
+
* "SourceIpAllowlist": [
|
|
3020
|
+
* "123.456.78.9/16"
|
|
3021
|
+
* ]
|
|
3022
|
+
* },
|
|
3023
|
+
* {
|
|
3024
|
+
* "RequireMfa": {
|
|
3025
|
+
* "count": 1
|
|
3026
|
+
* }
|
|
3027
|
+
* }
|
|
3028
|
+
* ]
|
|
3029
|
+
*/
|
|
3030
|
+
policy?: Record<string, never>[];
|
|
2723
3031
|
/**
|
|
2724
3032
|
* @description The ID of the role
|
|
2725
3033
|
* @example Role#bfe3eccb-731e-430d-b1e5-ac1363e6b06b
|
|
@@ -2888,7 +3196,6 @@ export type external = Record<string, never>;
|
|
|
2888
3196
|
export interface operations {
|
|
2889
3197
|
/**
|
|
2890
3198
|
* User Info
|
|
2891
|
-
* @deprecated
|
|
2892
3199
|
* @description User Info
|
|
2893
3200
|
*
|
|
2894
3201
|
* Retrieves information about the current user.
|
|
@@ -3847,7 +4154,7 @@ export interface operations {
|
|
|
3847
4154
|
};
|
|
3848
4155
|
};
|
|
3849
4156
|
responses: {
|
|
3850
|
-
200: components["responses"]["
|
|
4157
|
+
200: components["responses"]["RoleInfo"];
|
|
3851
4158
|
default: {
|
|
3852
4159
|
content: {
|
|
3853
4160
|
"application/json": components["schemas"]["ErrorResponse"];
|
|
@@ -4251,6 +4558,31 @@ export interface operations {
|
|
|
4251
4558
|
};
|
|
4252
4559
|
};
|
|
4253
4560
|
};
|
|
4561
|
+
/**
|
|
4562
|
+
* Revoke current session
|
|
4563
|
+
* @description Revoke current session
|
|
4564
|
+
*
|
|
4565
|
+
* Immediately revokes the current session, preventing it from being used or refreshed
|
|
4566
|
+
*/
|
|
4567
|
+
revokeCurrentSession: {
|
|
4568
|
+
parameters: {
|
|
4569
|
+
path: {
|
|
4570
|
+
/**
|
|
4571
|
+
* @description Name or ID of the desired Org
|
|
4572
|
+
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
4573
|
+
*/
|
|
4574
|
+
org_id: string;
|
|
4575
|
+
};
|
|
4576
|
+
};
|
|
4577
|
+
responses: {
|
|
4578
|
+
200: components["responses"]["EmptyImpl"];
|
|
4579
|
+
default: {
|
|
4580
|
+
content: {
|
|
4581
|
+
"application/json": components["schemas"]["ErrorResponse"];
|
|
4582
|
+
};
|
|
4583
|
+
};
|
|
4584
|
+
};
|
|
4585
|
+
};
|
|
4254
4586
|
/**
|
|
4255
4587
|
* Get session information
|
|
4256
4588
|
* @description Get session information
|