@cubist-labs/cubesigner-sdk 0.2.2 → 0.2.15
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/package.json +68 -0
- package/dist/src/api.d.ts +493 -0
- package/dist/src/api.js +1166 -0
- package/dist/src/client.d.ts +432 -335
- package/dist/src/client.js +195 -863
- package/dist/src/ethers/index.d.ts +33 -6
- package/dist/src/ethers/index.js +59 -12
- package/dist/src/index.d.ts +31 -26
- package/dist/src/index.js +51 -32
- package/dist/src/key.d.ts +28 -21
- package/dist/src/key.js +17 -10
- package/dist/src/mfa.d.ts +7 -7
- package/dist/src/mfa.js +20 -32
- package/dist/src/org.d.ts +37 -279
- package/dist/src/org.js +48 -194
- package/dist/src/paginator.js +1 -1
- package/dist/src/response.d.ts +101 -0
- package/dist/src/response.js +164 -0
- package/dist/src/role.d.ts +11 -9
- package/dist/src/role.js +1 -1
- package/dist/src/schema.d.ts +586 -10
- package/dist/src/schema.js +1 -1
- package/dist/src/schema_types.d.ts +6 -0
- package/dist/src/schema_types.js +1 -1
- package/dist/src/session/cognito_manager.d.ts +15 -3
- package/dist/src/session/cognito_manager.js +23 -5
- package/dist/src/session/session_manager.d.ts +1 -1
- package/dist/src/session/session_manager.js +3 -11
- package/dist/src/session/session_storage.js +1 -1
- package/dist/src/session/signer_session_manager.d.ts +3 -7
- package/dist/src/session/signer_session_manager.js +2 -8
- package/dist/src/signer_session.d.ts +8 -266
- package/dist/src/signer_session.js +15 -221
- package/dist/src/user_export.d.ts +52 -0
- package/dist/src/user_export.js +129 -0
- package/dist/src/util.d.ts +15 -0
- package/dist/src/util.js +33 -11
- package/package.json +12 -10
- package/src/api.ts +1395 -0
- package/src/client.ts +216 -1025
- package/src/ethers/index.ts +70 -12
- package/src/index.ts +59 -43
- package/src/key.ts +19 -12
- package/src/mfa.ts +16 -28
- package/src/org.ts +49 -204
- package/src/response.ts +196 -0
- package/src/role.ts +5 -3
- package/src/schema.ts +586 -10
- package/src/schema_types.ts +7 -0
- package/src/session/cognito_manager.ts +33 -6
- package/src/session/session_manager.ts +2 -8
- package/src/session/signer_session_manager.ts +3 -10
- package/src/signer_session.ts +13 -261
- package/src/user_export.ts +116 -0
- package/src/util.ts +29 -10
|
@@ -1,89 +1,6 @@
|
|
|
1
|
-
import { CubeSigner, MfaReceipt, KeyInfo } from ".";
|
|
2
1
|
import { CubeSignerClient } from "./client";
|
|
3
|
-
import {
|
|
2
|
+
import { KeyInfo } from "./key";
|
|
4
3
|
import { SignerSessionManager, SignerSessionStorage } from "./session/signer_session_manager";
|
|
5
|
-
type Response<U> = U | AcceptedResponse;
|
|
6
|
-
type RequestFn<U> = (headers?: HeadersInit) => Promise<Response<U>>;
|
|
7
|
-
type MapFn<U, V> = (u: U) => V;
|
|
8
|
-
/**
|
|
9
|
-
* Takes a {@link Response<U>} and a {@link MapFn<U, V>} function and returns
|
|
10
|
-
* a {@link Response<V>} that maps the value of the original response when its status code is 200.
|
|
11
|
-
*
|
|
12
|
-
* @param {Response<U>} resp Original response
|
|
13
|
-
* @param {Map<U, V>} mapFn Map to apply to the response value when its status code is 200.
|
|
14
|
-
* @return {Response<V>} Response whose value for status code 200 is mapped from U to V
|
|
15
|
-
*/
|
|
16
|
-
export declare function mapResponse<U, V>(resp: Response<U>, mapFn: MapFn<U, V>): Response<V>;
|
|
17
|
-
export interface MfaRequired {
|
|
18
|
-
/** Org id */
|
|
19
|
-
org_id: string;
|
|
20
|
-
/** MFA request id */
|
|
21
|
-
id: string;
|
|
22
|
-
/** Optional MFA session */
|
|
23
|
-
session?: NewSessionResponse | null;
|
|
24
|
-
}
|
|
25
|
-
/**
|
|
26
|
-
* A response of a CubeSigner request.
|
|
27
|
-
*/
|
|
28
|
-
export declare class CubeSignerResponse<U> {
|
|
29
|
-
#private;
|
|
30
|
-
/** @return {string} The MFA id associated with this request */
|
|
31
|
-
mfaId(): string;
|
|
32
|
-
/** @return {boolean} True if this request requires an MFA approval */
|
|
33
|
-
requiresMfa(): boolean;
|
|
34
|
-
/**
|
|
35
|
-
* Returns session information to use for any MFA approval requests (if any was included in the response).
|
|
36
|
-
* @return {ClientSessionInfo | undefined}
|
|
37
|
-
*/
|
|
38
|
-
mfaSessionInfo(): NewSessionResponse | undefined;
|
|
39
|
-
/** @return {U} The response data, if no MFA is required */
|
|
40
|
-
data(): U;
|
|
41
|
-
/**
|
|
42
|
-
* Approves the MFA request using a given session and a TOTP code.
|
|
43
|
-
*
|
|
44
|
-
* @param {SignerSession} session Signer session to use
|
|
45
|
-
* @param {string} code 6-digit TOTP code
|
|
46
|
-
* @return {CubeSignerResponse<U>} The result of signing with the approval
|
|
47
|
-
*/
|
|
48
|
-
approveTotp(session: SignerSession, code: string): Promise<CubeSignerResponse<U>>;
|
|
49
|
-
/**
|
|
50
|
-
* Approves the MFA request using a given `CubeSignerClient` instance (i.e., its session).
|
|
51
|
-
*
|
|
52
|
-
* @param {CubeSigner} cs CubeSigner whose session to use
|
|
53
|
-
* @return {CubeSignerResponse<U>} The result of signing with the approval
|
|
54
|
-
*/
|
|
55
|
-
approve(cs: CubeSigner): Promise<CubeSignerResponse<U>>;
|
|
56
|
-
/**
|
|
57
|
-
* @param {MfaReceipt} mfaReceipt The MFA receipt
|
|
58
|
-
* @return {Promise<CubeSignerResponse<U>>} The result of signing after MFA approval
|
|
59
|
-
*/
|
|
60
|
-
signWithMfaApproval(mfaReceipt: MfaReceipt): Promise<CubeSignerResponse<U>>;
|
|
61
|
-
/**
|
|
62
|
-
* Constructor.
|
|
63
|
-
*
|
|
64
|
-
* @param {RequestFn} requestFn
|
|
65
|
-
* The signing function that this response is from.
|
|
66
|
-
* This argument is used to resend requests with different headers if needed.
|
|
67
|
-
* @param {U | AcceptedResponse} resp The response as returned by the OpenAPI client.
|
|
68
|
-
*/
|
|
69
|
-
constructor(requestFn: RequestFn<U>, resp: U | AcceptedResponse);
|
|
70
|
-
/**
|
|
71
|
-
* Static constructor.
|
|
72
|
-
* @param {RequestFn} requestFn
|
|
73
|
-
* The request function that this response is from.
|
|
74
|
-
* This argument is used to resend requests with different headers if needed.
|
|
75
|
-
* @param {MfaReceipt} mfaReceipt Optional MFA receipt
|
|
76
|
-
* @return {Promise<CubeSignerResponse<U>>} New instance of this class.
|
|
77
|
-
*/
|
|
78
|
-
static create<U>(requestFn: RequestFn<U>, mfaReceipt?: MfaReceipt): Promise<CubeSignerResponse<U>>;
|
|
79
|
-
/**
|
|
80
|
-
* Returns HTTP headers containing a given MFA receipt.
|
|
81
|
-
*
|
|
82
|
-
* @param {MfaReceipt} mfaReceipt MFA receipt
|
|
83
|
-
* @return {HeadersInit} Headers including that receipt
|
|
84
|
-
*/
|
|
85
|
-
static getMfaHeaders(mfaReceipt?: MfaReceipt): HeadersInit | undefined;
|
|
86
|
-
}
|
|
87
4
|
/** Signer session info. Can only be used to revoke a token, but not for authentication. */
|
|
88
5
|
export declare class SignerSessionInfo {
|
|
89
6
|
#private;
|
|
@@ -101,188 +18,9 @@ export declare class SignerSessionInfo {
|
|
|
101
18
|
}
|
|
102
19
|
/**
|
|
103
20
|
* Signer session.
|
|
104
|
-
*
|
|
105
|
-
* @deprecated Use {@link CubeSignerClient} instead.
|
|
21
|
+
* Extends {@link CubeSignerClient} and provides a few convenience methods on top.
|
|
106
22
|
*/
|
|
107
|
-
export declare class SignerSession {
|
|
108
|
-
#private;
|
|
109
|
-
/** Deprecated */
|
|
110
|
-
get sessionMgr(): SignerSessionManager;
|
|
111
|
-
/** Org id */
|
|
112
|
-
get orgId(): string;
|
|
113
|
-
/**
|
|
114
|
-
* Returns the list of keys that this token grants access to.
|
|
115
|
-
* @return {KeyInfo[]} The list of keys.
|
|
116
|
-
*/
|
|
117
|
-
keys(): Promise<KeyInfo[]>;
|
|
118
|
-
/** Approve a pending MFA request using TOTP. */
|
|
119
|
-
get totpApprove(): (mfaId: string, code: string) => Promise<{
|
|
120
|
-
expires_at: number;
|
|
121
|
-
id: string;
|
|
122
|
-
receipt?: {
|
|
123
|
-
confirmation: string;
|
|
124
|
-
final_approver: string;
|
|
125
|
-
timestamp: number;
|
|
126
|
-
} | null | undefined;
|
|
127
|
-
request: {
|
|
128
|
-
body?: Record<string, unknown> | null | undefined;
|
|
129
|
-
method: string;
|
|
130
|
-
path: string;
|
|
131
|
-
};
|
|
132
|
-
status: {
|
|
133
|
-
allowed_approvers: string[];
|
|
134
|
-
allowed_mfa_types?: ("CubeSigner" | "Totp" | "Fido")[] | null | undefined;
|
|
135
|
-
approved_by: {
|
|
136
|
-
[key: string]: {
|
|
137
|
-
[key: string]: {
|
|
138
|
-
timestamp: number;
|
|
139
|
-
};
|
|
140
|
-
};
|
|
141
|
-
};
|
|
142
|
-
count: number;
|
|
143
|
-
num_auth_factors: number;
|
|
144
|
-
};
|
|
145
|
-
}>;
|
|
146
|
-
/** Initiate approval of an existing MFA request using FIDO. */
|
|
147
|
-
get fidoApproveStart(): (mfaId: string) => Promise<import("./mfa").MfaFidoChallenge>;
|
|
148
|
-
/** Get a pending MFA request by its id. */
|
|
149
|
-
get getMfaInfo(): (mfaId: string) => Promise<{
|
|
150
|
-
expires_at: number;
|
|
151
|
-
id: string;
|
|
152
|
-
receipt?: {
|
|
153
|
-
confirmation: string;
|
|
154
|
-
final_approver: string;
|
|
155
|
-
timestamp: number;
|
|
156
|
-
} | null | undefined;
|
|
157
|
-
request: {
|
|
158
|
-
body?: Record<string, unknown> | null | undefined;
|
|
159
|
-
method: string;
|
|
160
|
-
path: string;
|
|
161
|
-
};
|
|
162
|
-
status: {
|
|
163
|
-
allowed_approvers: string[];
|
|
164
|
-
allowed_mfa_types?: ("CubeSigner" | "Totp" | "Fido")[] | null | undefined;
|
|
165
|
-
approved_by: {
|
|
166
|
-
[key: string]: {
|
|
167
|
-
[key: string]: {
|
|
168
|
-
timestamp: number;
|
|
169
|
-
};
|
|
170
|
-
};
|
|
171
|
-
};
|
|
172
|
-
count: number;
|
|
173
|
-
num_auth_factors: number;
|
|
174
|
-
};
|
|
175
|
-
}>;
|
|
176
|
-
/** Submit an EVM sign request. */
|
|
177
|
-
get signEvm(): (key: string | import("./key").Key, req: {
|
|
178
|
-
chain_id: number;
|
|
179
|
-
tx: Record<string, never>;
|
|
180
|
-
}, mfaReceipt?: MfaReceipt | undefined) => Promise<CubeSignerResponse<{
|
|
181
|
-
rlp_signed_tx: string;
|
|
182
|
-
}>>;
|
|
183
|
-
/** Submit an 'eth2' sign request. */
|
|
184
|
-
get signEth2(): (key: string | import("./key").Key, req: {
|
|
185
|
-
eth2_sign_request: Record<string, never>;
|
|
186
|
-
network: "mainnet" | "prater" | "goerli" | "holesky";
|
|
187
|
-
}, mfaReceipt?: MfaReceipt | undefined) => Promise<CubeSignerResponse<{
|
|
188
|
-
signature: string;
|
|
189
|
-
}>>;
|
|
190
|
-
/** Sign a stake request. */
|
|
191
|
-
get stake(): (req: {
|
|
192
|
-
chain_id: number;
|
|
193
|
-
deposit_type: "Canonical" | "Wrapper";
|
|
194
|
-
staking_amount_gwei?: number | undefined;
|
|
195
|
-
unsafe_conf?: {
|
|
196
|
-
deposit_contract_addr?: string | null | undefined;
|
|
197
|
-
genesis_fork_version?: string | null | undefined;
|
|
198
|
-
} | null | undefined;
|
|
199
|
-
validator_key?: string | null | undefined;
|
|
200
|
-
withdrawal_addr: string;
|
|
201
|
-
}, mfaReceipt?: MfaReceipt | undefined) => Promise<CubeSignerResponse<{
|
|
202
|
-
created_validator_key_id: string;
|
|
203
|
-
deposit_tx: {
|
|
204
|
-
chain_id: number;
|
|
205
|
-
deposit_txn: Record<string, never>;
|
|
206
|
-
new_validator_pk: string;
|
|
207
|
-
};
|
|
208
|
-
}>>;
|
|
209
|
-
/** Sign an unstake request. */
|
|
210
|
-
get unstake(): (key: string | import("./key").Key, req: {
|
|
211
|
-
epoch?: string | null | undefined;
|
|
212
|
-
fork: {
|
|
213
|
-
current_version: string;
|
|
214
|
-
epoch: string;
|
|
215
|
-
previous_version: string;
|
|
216
|
-
};
|
|
217
|
-
genesis_data: {
|
|
218
|
-
genesis_fork_version: string;
|
|
219
|
-
genesis_time: string;
|
|
220
|
-
genesis_validators_root: string;
|
|
221
|
-
};
|
|
222
|
-
network: "mainnet" | "prater" | "goerli" | "holesky";
|
|
223
|
-
validator_index: string;
|
|
224
|
-
}, mfaReceipt?: MfaReceipt | undefined) => Promise<CubeSignerResponse<{
|
|
225
|
-
message: {
|
|
226
|
-
epoch: string;
|
|
227
|
-
validator_index: string;
|
|
228
|
-
};
|
|
229
|
-
signature: string;
|
|
230
|
-
}>>;
|
|
231
|
-
/** Sign a raw blob.*/
|
|
232
|
-
get signBlob(): (key: string | import("./key").Key, req: {
|
|
233
|
-
message_base64: string;
|
|
234
|
-
}, mfaReceipt?: MfaReceipt | undefined) => Promise<CubeSignerResponse<{
|
|
235
|
-
signature: string;
|
|
236
|
-
}>>;
|
|
237
|
-
/** Sign a bitcoin message. */
|
|
238
|
-
get signBtc(): (key: string | import("./key").Key, req: {
|
|
239
|
-
sig_kind: {
|
|
240
|
-
Segwit: {
|
|
241
|
-
input_index: number;
|
|
242
|
-
script_code: string;
|
|
243
|
-
sighash_type: "All" | "None" | "Single" | "AllPlusAnyoneCanPay" | "NonePlusAnyoneCanPay" | "SinglePlusAnyoneCanPay";
|
|
244
|
-
value: number;
|
|
245
|
-
};
|
|
246
|
-
};
|
|
247
|
-
tx: Record<string, never>;
|
|
248
|
-
}, mfaReceipt?: MfaReceipt | undefined) => Promise<CubeSignerResponse<{
|
|
249
|
-
signature: string;
|
|
250
|
-
}>>;
|
|
251
|
-
/** Sign a solana message. */
|
|
252
|
-
get signSolana(): (key: string | import("./key").Key, req: {
|
|
253
|
-
message_base64: string;
|
|
254
|
-
}, mfaReceipt?: MfaReceipt | undefined) => Promise<CubeSignerResponse<{
|
|
255
|
-
signature: string;
|
|
256
|
-
}>>;
|
|
257
|
-
/** Sign an Avalanche P- or X-chain message. */
|
|
258
|
-
get signAva(): (key: string | import("./key").Key, tx: import("./schema_types").AvaTx, mfaReceipt?: MfaReceipt | undefined) => Promise<CubeSignerResponse<{
|
|
259
|
-
signature: string;
|
|
260
|
-
}>>;
|
|
261
|
-
/**
|
|
262
|
-
* Obtain a proof of authentication.
|
|
263
|
-
*/
|
|
264
|
-
get proveIdentity(): () => Promise<{
|
|
265
|
-
aud?: string | null | undefined;
|
|
266
|
-
email: string;
|
|
267
|
-
exp_epoch: number;
|
|
268
|
-
identity?: {
|
|
269
|
-
iss: string;
|
|
270
|
-
sub: string;
|
|
271
|
-
} | null | undefined;
|
|
272
|
-
user_info?: {
|
|
273
|
-
configured_mfa: ({
|
|
274
|
-
type: "totp";
|
|
275
|
-
} | {
|
|
276
|
-
id: string;
|
|
277
|
-
name: string;
|
|
278
|
-
type: "fido";
|
|
279
|
-
})[];
|
|
280
|
-
initialized: boolean;
|
|
281
|
-
user_id: string;
|
|
282
|
-
} | null | undefined;
|
|
283
|
-
} & {
|
|
284
|
-
id: string;
|
|
285
|
-
}>;
|
|
23
|
+
export declare class SignerSession extends CubeSignerClient {
|
|
286
24
|
/**
|
|
287
25
|
* Loads an existing signer session from storage.
|
|
288
26
|
* @param {SignerSessionStorage} storage The session storage to use
|
|
@@ -295,5 +33,9 @@ export declare class SignerSession {
|
|
|
295
33
|
* @internal
|
|
296
34
|
*/
|
|
297
35
|
constructor(sessionMgr: SignerSessionManager);
|
|
36
|
+
/**
|
|
37
|
+
* Returns the list of keys that this token grants access to.
|
|
38
|
+
* @return {KeyInfo[]} The list of keys.
|
|
39
|
+
*/
|
|
40
|
+
keys(): Promise<KeyInfo[]>;
|
|
298
41
|
}
|
|
299
|
-
export {};
|
|
@@ -10,157 +10,12 @@ var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (
|
|
|
10
10
|
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
11
11
|
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
12
12
|
};
|
|
13
|
-
var
|
|
14
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
15
|
-
};
|
|
16
|
-
var _CubeSignerResponse_requestFn, _CubeSignerResponse_resp, _CubeSignerResponse_mfaRequired, _SignerSessionInfo_csc, _SignerSessionInfo_sessionId, _SignerSession_csc;
|
|
13
|
+
var _SignerSessionInfo_csc, _SignerSessionInfo_sessionId;
|
|
17
14
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
18
|
-
exports.SignerSession = exports.SignerSessionInfo =
|
|
19
|
-
const assert_1 = __importDefault(require("assert"));
|
|
20
|
-
const _1 = require(".");
|
|
15
|
+
exports.SignerSession = exports.SignerSessionInfo = void 0;
|
|
21
16
|
const client_1 = require("./client");
|
|
17
|
+
const key_1 = require("./key");
|
|
22
18
|
const signer_session_manager_1 = require("./session/signer_session_manager");
|
|
23
|
-
/**
|
|
24
|
-
* Takes a {@link Response<U>} and a {@link MapFn<U, V>} function and returns
|
|
25
|
-
* a {@link Response<V>} that maps the value of the original response when its status code is 200.
|
|
26
|
-
*
|
|
27
|
-
* @param {Response<U>} resp Original response
|
|
28
|
-
* @param {Map<U, V>} mapFn Map to apply to the response value when its status code is 200.
|
|
29
|
-
* @return {Response<V>} Response whose value for status code 200 is mapped from U to V
|
|
30
|
-
*/
|
|
31
|
-
function mapResponse(resp, mapFn) {
|
|
32
|
-
if (resp.accepted?.MfaRequired) {
|
|
33
|
-
return resp;
|
|
34
|
-
}
|
|
35
|
-
else {
|
|
36
|
-
return mapFn(resp);
|
|
37
|
-
}
|
|
38
|
-
}
|
|
39
|
-
exports.mapResponse = mapResponse;
|
|
40
|
-
/**
|
|
41
|
-
* A response of a CubeSigner request.
|
|
42
|
-
*/
|
|
43
|
-
class CubeSignerResponse {
|
|
44
|
-
/** @return {string} The MFA id associated with this request */
|
|
45
|
-
mfaId() {
|
|
46
|
-
return __classPrivateFieldGet(this, _CubeSignerResponse_mfaRequired, "f").id;
|
|
47
|
-
}
|
|
48
|
-
/** @return {boolean} True if this request requires an MFA approval */
|
|
49
|
-
requiresMfa() {
|
|
50
|
-
return __classPrivateFieldGet(this, _CubeSignerResponse_mfaRequired, "f") !== undefined;
|
|
51
|
-
}
|
|
52
|
-
/**
|
|
53
|
-
* Returns session information to use for any MFA approval requests (if any was included in the response).
|
|
54
|
-
* @return {ClientSessionInfo | undefined}
|
|
55
|
-
*/
|
|
56
|
-
mfaSessionInfo() {
|
|
57
|
-
return __classPrivateFieldGet(this, _CubeSignerResponse_resp, "f").accepted?.MfaRequired?.session ?? undefined;
|
|
58
|
-
}
|
|
59
|
-
/** @return {U} The response data, if no MFA is required */
|
|
60
|
-
data() {
|
|
61
|
-
if (this.requiresMfa()) {
|
|
62
|
-
throw new Error("Cannot call `data()` while MFA is required");
|
|
63
|
-
}
|
|
64
|
-
return __classPrivateFieldGet(this, _CubeSignerResponse_resp, "f");
|
|
65
|
-
}
|
|
66
|
-
/**
|
|
67
|
-
* Approves the MFA request using a given session and a TOTP code.
|
|
68
|
-
*
|
|
69
|
-
* @param {SignerSession} session Signer session to use
|
|
70
|
-
* @param {string} code 6-digit TOTP code
|
|
71
|
-
* @return {CubeSignerResponse<U>} The result of signing with the approval
|
|
72
|
-
*/
|
|
73
|
-
async approveTotp(session, code) {
|
|
74
|
-
(0, assert_1.default)(this.requiresMfa());
|
|
75
|
-
const mfaId = this.mfaId();
|
|
76
|
-
const mfaOrgId = __classPrivateFieldGet(this, _CubeSignerResponse_mfaRequired, "f").org_id;
|
|
77
|
-
const mfaApproval = await session.totpApprove(mfaId, code);
|
|
78
|
-
(0, assert_1.default)(mfaApproval.id === mfaId);
|
|
79
|
-
const mfaConf = mfaApproval.receipt?.confirmation;
|
|
80
|
-
if (!mfaConf) {
|
|
81
|
-
return this;
|
|
82
|
-
}
|
|
83
|
-
return await this.signWithMfaApproval({ mfaId, mfaOrgId, mfaConf });
|
|
84
|
-
}
|
|
85
|
-
/**
|
|
86
|
-
* Approves the MFA request using a given `CubeSignerClient` instance (i.e., its session).
|
|
87
|
-
*
|
|
88
|
-
* @param {CubeSigner} cs CubeSigner whose session to use
|
|
89
|
-
* @return {CubeSignerResponse<U>} The result of signing with the approval
|
|
90
|
-
*/
|
|
91
|
-
async approve(cs) {
|
|
92
|
-
(0, assert_1.default)(this.requiresMfa());
|
|
93
|
-
const mfaId = __classPrivateFieldGet(this, _CubeSignerResponse_mfaRequired, "f").id;
|
|
94
|
-
const mfaOrgId = __classPrivateFieldGet(this, _CubeSignerResponse_mfaRequired, "f").org_id;
|
|
95
|
-
const mfaApproval = await cs.mfaApprove(mfaOrgId, mfaId);
|
|
96
|
-
(0, assert_1.default)(mfaApproval.id === mfaId);
|
|
97
|
-
const mfaConf = mfaApproval.receipt?.confirmation;
|
|
98
|
-
if (!mfaConf) {
|
|
99
|
-
return this;
|
|
100
|
-
}
|
|
101
|
-
return await this.signWithMfaApproval({ mfaId, mfaOrgId, mfaConf });
|
|
102
|
-
}
|
|
103
|
-
/**
|
|
104
|
-
* @param {MfaReceipt} mfaReceipt The MFA receipt
|
|
105
|
-
* @return {Promise<CubeSignerResponse<U>>} The result of signing after MFA approval
|
|
106
|
-
*/
|
|
107
|
-
async signWithMfaApproval(mfaReceipt) {
|
|
108
|
-
const headers = CubeSignerResponse.getMfaHeaders(mfaReceipt);
|
|
109
|
-
return new CubeSignerResponse(__classPrivateFieldGet(this, _CubeSignerResponse_requestFn, "f"), await __classPrivateFieldGet(this, _CubeSignerResponse_requestFn, "f").call(this, headers));
|
|
110
|
-
}
|
|
111
|
-
// --------------------------------------------------------------------------
|
|
112
|
-
// -- INTERNAL --------------------------------------------------------------
|
|
113
|
-
// --------------------------------------------------------------------------
|
|
114
|
-
/**
|
|
115
|
-
* Constructor.
|
|
116
|
-
*
|
|
117
|
-
* @param {RequestFn} requestFn
|
|
118
|
-
* The signing function that this response is from.
|
|
119
|
-
* This argument is used to resend requests with different headers if needed.
|
|
120
|
-
* @param {U | AcceptedResponse} resp The response as returned by the OpenAPI client.
|
|
121
|
-
*/
|
|
122
|
-
constructor(requestFn, resp) {
|
|
123
|
-
_CubeSignerResponse_requestFn.set(this, void 0);
|
|
124
|
-
_CubeSignerResponse_resp.set(this, void 0);
|
|
125
|
-
/**
|
|
126
|
-
* Optional MFA id. Only set if there is an MFA request associated with the
|
|
127
|
-
* signing request
|
|
128
|
-
*/
|
|
129
|
-
_CubeSignerResponse_mfaRequired.set(this, void 0);
|
|
130
|
-
__classPrivateFieldSet(this, _CubeSignerResponse_requestFn, requestFn, "f");
|
|
131
|
-
__classPrivateFieldSet(this, _CubeSignerResponse_resp, resp, "f");
|
|
132
|
-
__classPrivateFieldSet(this, _CubeSignerResponse_mfaRequired, __classPrivateFieldGet(this, _CubeSignerResponse_resp, "f").accepted?.MfaRequired, "f");
|
|
133
|
-
}
|
|
134
|
-
/**
|
|
135
|
-
* Static constructor.
|
|
136
|
-
* @param {RequestFn} requestFn
|
|
137
|
-
* The request function that this response is from.
|
|
138
|
-
* This argument is used to resend requests with different headers if needed.
|
|
139
|
-
* @param {MfaReceipt} mfaReceipt Optional MFA receipt
|
|
140
|
-
* @return {Promise<CubeSignerResponse<U>>} New instance of this class.
|
|
141
|
-
*/
|
|
142
|
-
static async create(requestFn, mfaReceipt) {
|
|
143
|
-
const seed = await requestFn(this.getMfaHeaders(mfaReceipt));
|
|
144
|
-
return new CubeSignerResponse(requestFn, seed);
|
|
145
|
-
}
|
|
146
|
-
/**
|
|
147
|
-
* Returns HTTP headers containing a given MFA receipt.
|
|
148
|
-
*
|
|
149
|
-
* @param {MfaReceipt} mfaReceipt MFA receipt
|
|
150
|
-
* @return {HeadersInit} Headers including that receipt
|
|
151
|
-
*/
|
|
152
|
-
static getMfaHeaders(mfaReceipt) {
|
|
153
|
-
return mfaReceipt
|
|
154
|
-
? {
|
|
155
|
-
"x-cubist-mfa-id": mfaReceipt.mfaId,
|
|
156
|
-
"x-cubist-mfa-org-id": mfaReceipt.mfaOrgId,
|
|
157
|
-
"x-cubist-mfa-confirmation": mfaReceipt.mfaConf,
|
|
158
|
-
}
|
|
159
|
-
: undefined;
|
|
160
|
-
}
|
|
161
|
-
}
|
|
162
|
-
exports.CubeSignerResponse = CubeSignerResponse;
|
|
163
|
-
_CubeSignerResponse_requestFn = new WeakMap(), _CubeSignerResponse_resp = new WeakMap(), _CubeSignerResponse_mfaRequired = new WeakMap();
|
|
164
19
|
/** Signer session info. Can only be used to revoke a token, but not for authentication. */
|
|
165
20
|
class SignerSessionInfo {
|
|
166
21
|
/** Revoke this session */
|
|
@@ -189,76 +44,9 @@ exports.SignerSessionInfo = SignerSessionInfo;
|
|
|
189
44
|
_SignerSessionInfo_csc = new WeakMap(), _SignerSessionInfo_sessionId = new WeakMap();
|
|
190
45
|
/**
|
|
191
46
|
* Signer session.
|
|
192
|
-
*
|
|
193
|
-
* @deprecated Use {@link CubeSignerClient} instead.
|
|
47
|
+
* Extends {@link CubeSignerClient} and provides a few convenience methods on top.
|
|
194
48
|
*/
|
|
195
|
-
class SignerSession {
|
|
196
|
-
/** Deprecated */
|
|
197
|
-
get sessionMgr() {
|
|
198
|
-
return __classPrivateFieldGet(this, _SignerSession_csc, "f").sessionMgr;
|
|
199
|
-
}
|
|
200
|
-
/** Org id */
|
|
201
|
-
get orgId() {
|
|
202
|
-
return __classPrivateFieldGet(this, _SignerSession_csc, "f").orgId;
|
|
203
|
-
}
|
|
204
|
-
/**
|
|
205
|
-
* Returns the list of keys that this token grants access to.
|
|
206
|
-
* @return {KeyInfo[]} The list of keys.
|
|
207
|
-
*/
|
|
208
|
-
async keys() {
|
|
209
|
-
const keys = await __classPrivateFieldGet(this, _SignerSession_csc, "f").sessionKeysList();
|
|
210
|
-
return keys.map((k) => (0, _1.toKeyInfo)(k));
|
|
211
|
-
}
|
|
212
|
-
/** Approve a pending MFA request using TOTP. */
|
|
213
|
-
get totpApprove() {
|
|
214
|
-
return __classPrivateFieldGet(this, _SignerSession_csc, "f").mfaApproveTotp.bind(__classPrivateFieldGet(this, _SignerSession_csc, "f"));
|
|
215
|
-
}
|
|
216
|
-
/** Initiate approval of an existing MFA request using FIDO. */
|
|
217
|
-
get fidoApproveStart() {
|
|
218
|
-
return __classPrivateFieldGet(this, _SignerSession_csc, "f").mfaApproveFidoInit.bind(__classPrivateFieldGet(this, _SignerSession_csc, "f"));
|
|
219
|
-
}
|
|
220
|
-
/** Get a pending MFA request by its id. */
|
|
221
|
-
get getMfaInfo() {
|
|
222
|
-
return __classPrivateFieldGet(this, _SignerSession_csc, "f").mfaGet.bind(__classPrivateFieldGet(this, _SignerSession_csc, "f"));
|
|
223
|
-
}
|
|
224
|
-
/** Submit an EVM sign request. */
|
|
225
|
-
get signEvm() {
|
|
226
|
-
return __classPrivateFieldGet(this, _SignerSession_csc, "f").signEvm.bind(__classPrivateFieldGet(this, _SignerSession_csc, "f"));
|
|
227
|
-
}
|
|
228
|
-
/** Submit an 'eth2' sign request. */
|
|
229
|
-
get signEth2() {
|
|
230
|
-
return __classPrivateFieldGet(this, _SignerSession_csc, "f").signEth2.bind(__classPrivateFieldGet(this, _SignerSession_csc, "f"));
|
|
231
|
-
}
|
|
232
|
-
/** Sign a stake request. */
|
|
233
|
-
get stake() {
|
|
234
|
-
return __classPrivateFieldGet(this, _SignerSession_csc, "f").signStake.bind(__classPrivateFieldGet(this, _SignerSession_csc, "f"));
|
|
235
|
-
}
|
|
236
|
-
/** Sign an unstake request. */
|
|
237
|
-
get unstake() {
|
|
238
|
-
return __classPrivateFieldGet(this, _SignerSession_csc, "f").signUnstake.bind(__classPrivateFieldGet(this, _SignerSession_csc, "f"));
|
|
239
|
-
}
|
|
240
|
-
/** Sign a raw blob.*/
|
|
241
|
-
get signBlob() {
|
|
242
|
-
return __classPrivateFieldGet(this, _SignerSession_csc, "f").signBlob.bind(__classPrivateFieldGet(this, _SignerSession_csc, "f"));
|
|
243
|
-
}
|
|
244
|
-
/** Sign a bitcoin message. */
|
|
245
|
-
get signBtc() {
|
|
246
|
-
return __classPrivateFieldGet(this, _SignerSession_csc, "f").signBtc.bind(__classPrivateFieldGet(this, _SignerSession_csc, "f"));
|
|
247
|
-
}
|
|
248
|
-
/** Sign a solana message. */
|
|
249
|
-
get signSolana() {
|
|
250
|
-
return __classPrivateFieldGet(this, _SignerSession_csc, "f").signSolana.bind(__classPrivateFieldGet(this, _SignerSession_csc, "f"));
|
|
251
|
-
}
|
|
252
|
-
/** Sign an Avalanche P- or X-chain message. */
|
|
253
|
-
get signAva() {
|
|
254
|
-
return __classPrivateFieldGet(this, _SignerSession_csc, "f").signAva.bind(__classPrivateFieldGet(this, _SignerSession_csc, "f"));
|
|
255
|
-
}
|
|
256
|
-
/**
|
|
257
|
-
* Obtain a proof of authentication.
|
|
258
|
-
*/
|
|
259
|
-
get proveIdentity() {
|
|
260
|
-
return __classPrivateFieldGet(this, _SignerSession_csc, "f").identityProve.bind(__classPrivateFieldGet(this, _SignerSession_csc, "f"));
|
|
261
|
-
}
|
|
49
|
+
class SignerSession extends client_1.CubeSignerClient {
|
|
262
50
|
/**
|
|
263
51
|
* Loads an existing signer session from storage.
|
|
264
52
|
* @param {SignerSessionStorage} storage The session storage to use
|
|
@@ -274,10 +62,16 @@ class SignerSession {
|
|
|
274
62
|
* @internal
|
|
275
63
|
*/
|
|
276
64
|
constructor(sessionMgr) {
|
|
277
|
-
|
|
278
|
-
|
|
65
|
+
super(sessionMgr);
|
|
66
|
+
}
|
|
67
|
+
/**
|
|
68
|
+
* Returns the list of keys that this token grants access to.
|
|
69
|
+
* @return {KeyInfo[]} The list of keys.
|
|
70
|
+
*/
|
|
71
|
+
async keys() {
|
|
72
|
+
const keys = await this.sessionKeysList();
|
|
73
|
+
return keys.map((k) => (0, key_1.toKeyInfo)(k));
|
|
279
74
|
}
|
|
280
75
|
}
|
|
281
76
|
exports.SignerSession = SignerSession;
|
|
282
|
-
|
|
283
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"signer_session.js","sourceRoot":"","sources":["../../src/signer_session.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;AAAA,oDAA4B;AAC5B,wBAA+D;AAC/D,qCAA4C;AAE5C,6EAA8F;AAM9F;;;;;;;GAOG;AACH,SAAgB,WAAW,CAAO,IAAiB,EAAE,KAAkB;IACrE,IAAK,IAAyB,CAAC,QAAQ,EAAE,WAAW,EAAE;QACpD,OAAO,IAAwB,CAAC;KACjC;SAAM;QACL,OAAO,KAAK,CAAC,IAAS,CAAC,CAAC;KACzB;AACH,CAAC;AAND,kCAMC;AAWD;;GAEG;AACH,MAAa,kBAAkB;IAS7B,+DAA+D;IAC/D,KAAK;QACH,OAAO,uBAAA,IAAI,uCAAc,CAAC,EAAE,CAAC;IAC/B,CAAC;IAED,sEAAsE;IACtE,WAAW;QACT,OAAO,uBAAA,IAAI,uCAAa,KAAK,SAAS,CAAC;IACzC,CAAC;IAED;;;OAGG;IACH,cAAc;QACZ,OAAQ,uBAAA,IAAI,gCAA2B,CAAC,QAAQ,EAAE,WAAW,EAAE,OAAO,IAAI,SAAS,CAAC;IACtF,CAAC;IAED,2DAA2D;IAC3D,IAAI;QACF,IAAI,IAAI,CAAC,WAAW,EAAE,EAAE;YACtB,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAC;SAC/D;QACD,OAAO,uBAAA,IAAI,gCAAW,CAAC;IACzB,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,WAAW,CAAC,OAAsB,EAAE,IAAY;QACpD,IAAA,gBAAM,EAAC,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;QAC3B,MAAM,KAAK,GAAG,IAAI,CAAC,KAAK,EAAE,CAAC;QAC3B,MAAM,QAAQ,GAAG,uBAAA,IAAI,uCAAc,CAAC,MAAM,CAAC;QAC3C,MAAM,WAAW,GAAG,MAAM,OAAO,CAAC,WAAW,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;QAC3D,IAAA,gBAAM,EAAC,WAAW,CAAC,EAAE,KAAK,KAAK,CAAC,CAAC;QACjC,MAAM,OAAO,GAAG,WAAW,CAAC,OAAO,EAAE,YAAY,CAAC;QAElD,IAAI,CAAC,OAAO,EAAE;YACZ,OAAO,IAAI,CAAC;SACb;QAED,OAAO,MAAM,IAAI,CAAC,mBAAmB,CAAC,EAAE,KAAK,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC,CAAC;IACtE,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,OAAO,CAAC,EAAc;QAC1B,IAAA,gBAAM,EAAC,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;QAC3B,MAAM,KAAK,GAAG,uBAAA,IAAI,uCAAc,CAAC,EAAE,CAAC;QACpC,MAAM,QAAQ,GAAG,uBAAA,IAAI,uCAAc,CAAC,MAAM,CAAC;QAE3C,MAAM,WAAW,GAAG,MAAM,EAAE,CAAC,UAAU,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC;QACzD,IAAA,gBAAM,EAAC,WAAW,CAAC,EAAE,KAAK,KAAK,CAAC,CAAC;QACjC,MAAM,OAAO,GAAG,WAAW,CAAC,OAAO,EAAE,YAAY,CAAC;QAElD,IAAI,CAAC,OAAO,EAAE;YACZ,OAAO,IAAI,CAAC;SACb;QAED,OAAO,MAAM,IAAI,CAAC,mBAAmB,CAAC,EAAE,KAAK,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC,CAAC;IACtE,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,mBAAmB,CAAC,UAAsB;QAC9C,MAAM,OAAO,GAAG,kBAAkB,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC;QAC7D,OAAO,IAAI,kBAAkB,CAAC,uBAAA,IAAI,qCAAW,EAAE,MAAM,uBAAA,IAAI,qCAAW,MAAf,IAAI,EAAY,OAAO,CAAC,CAAC,CAAC;IACjF,CAAC;IAED,6EAA6E;IAC7E,6EAA6E;IAC7E,6EAA6E;IAE7E;;;;;;;OAOG;IACH,YAAY,SAAuB,EAAE,IAA0B;QAnGtD,gDAAyB;QACzB,2CAA4B;QACrC;;;WAGG;QACM,kDAA2B;QA8FlC,uBAAA,IAAI,iCAAc,SAAS,MAAA,CAAC;QAC5B,uBAAA,IAAI,4BAAS,IAAI,MAAA,CAAC;QAClB,uBAAA,IAAI,mCAAiB,uBAAA,IAAI,gCAA2B,CAAC,QAAQ,EAAE,WAAW,MAAA,CAAC;IAC7E,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,SAAuB,EACvB,UAAuB;QAEvB,MAAM,IAAI,GAAG,MAAM,SAAS,CAAC,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC,CAAC;QAC7D,OAAO,IAAI,kBAAkB,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;IACjD,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,aAAa,CAAC,UAAuB;QAC1C,OAAO,UAAU;YACf,CAAC,CAAC;gBACE,iBAAiB,EAAE,UAAU,CAAC,KAAK;gBACnC,qBAAqB,EAAE,UAAU,CAAC,QAAQ;gBAC1C,2BAA2B,EAAE,UAAU,CAAC,OAAO;aAChD;YACH,CAAC,CAAC,SAAS,CAAC;IAChB,CAAC;CACF;AAzID,gDAyIC;;AAED,2FAA2F;AAC3F,MAAa,iBAAiB;IAK5B,0BAA0B;IAC1B,KAAK,CAAC,MAAM;QACV,MAAM,uBAAA,IAAI,8BAAK,CAAC,aAAa,CAAC,uBAAA,IAAI,oCAAW,CAAC,CAAC;IACjD,CAAC;IAED,6EAA6E;IAC7E,6EAA6E;IAC7E,6EAA6E;IAE7E;;;;;;OAMG;IACH,YAAY,EAAoB,EAAE,SAAiB,EAAE,OAAe;QApB3D,yCAAuB;QACvB,+CAAmB;QAoB1B,uBAAA,IAAI,0BAAQ,EAAE,MAAA,CAAC;QACf,uBAAA,IAAI,gCAAc,SAAS,MAAA,CAAC;QAC5B,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;IACzB,CAAC;CACF;AA1BD,8CA0BC;;AAED;;;;GAIG;AACH,MAAa,aAAa;IAGxB,iBAAiB;IACjB,IAAI,UAAU;QACZ,OAAO,uBAAA,IAAI,0BAAK,CAAC,UAAU,CAAC;IAC9B,CAAC;IAED,aAAa;IACb,IAAI,KAAK;QACP,OAAO,uBAAA,IAAI,0BAAK,CAAC,KAAK,CAAC;IACzB,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,IAAI;QACR,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,0BAAK,CAAC,eAAe,EAAE,CAAC;QAC/C,OAAO,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,IAAA,YAAS,EAAC,CAAC,CAAC,CAAC,CAAC;IACvC,CAAC;IAED,gDAAgD;IAChD,IAAI,WAAW;QACb,OAAO,uBAAA,IAAI,0BAAK,CAAC,cAAc,CAAC,IAAI,CAAC,uBAAA,IAAI,0BAAK,CAAC,CAAC;IAClD,CAAC;IAED,+DAA+D;IAC/D,IAAI,gBAAgB;QAClB,OAAO,uBAAA,IAAI,0BAAK,CAAC,kBAAkB,CAAC,IAAI,CAAC,uBAAA,IAAI,0BAAK,CAAC,CAAC;IACtD,CAAC;IAED,2CAA2C;IAC3C,IAAI,UAAU;QACZ,OAAO,uBAAA,IAAI,0BAAK,CAAC,MAAM,CAAC,IAAI,CAAC,uBAAA,IAAI,0BAAK,CAAC,CAAC;IAC1C,CAAC;IAED,kCAAkC;IAClC,IAAI,OAAO;QACT,OAAO,uBAAA,IAAI,0BAAK,CAAC,OAAO,CAAC,IAAI,CAAC,uBAAA,IAAI,0BAAK,CAAC,CAAC;IAC3C,CAAC;IAED,qCAAqC;IACrC,IAAI,QAAQ;QACV,OAAO,uBAAA,IAAI,0BAAK,CAAC,QAAQ,CAAC,IAAI,CAAC,uBAAA,IAAI,0BAAK,CAAC,CAAC;IAC5C,CAAC;IAED,4BAA4B;IAC5B,IAAI,KAAK;QACP,OAAO,uBAAA,IAAI,0BAAK,CAAC,SAAS,CAAC,IAAI,CAAC,uBAAA,IAAI,0BAAK,CAAC,CAAC;IAC7C,CAAC;IAED,+BAA+B;IAC/B,IAAI,OAAO;QACT,OAAO,uBAAA,IAAI,0BAAK,CAAC,WAAW,CAAC,IAAI,CAAC,uBAAA,IAAI,0BAAK,CAAC,CAAC;IAC/C,CAAC;IAED,sBAAsB;IACtB,IAAI,QAAQ;QACV,OAAO,uBAAA,IAAI,0BAAK,CAAC,QAAQ,CAAC,IAAI,CAAC,uBAAA,IAAI,0BAAK,CAAC,CAAC;IAC5C,CAAC;IAED,8BAA8B;IAC9B,IAAI,OAAO;QACT,OAAO,uBAAA,IAAI,0BAAK,CAAC,OAAO,CAAC,IAAI,CAAC,uBAAA,IAAI,0BAAK,CAAC,CAAC;IAC3C,CAAC;IAED,6BAA6B;IAC7B,IAAI,UAAU;QACZ,OAAO,uBAAA,IAAI,0BAAK,CAAC,UAAU,CAAC,IAAI,CAAC,uBAAA,IAAI,0BAAK,CAAC,CAAC;IAC9C,CAAC;IAED,+CAA+C;IAC/C,IAAI,OAAO;QACT,OAAO,uBAAA,IAAI,0BAAK,CAAC,OAAO,CAAC,IAAI,CAAC,uBAAA,IAAI,0BAAK,CAAC,CAAC;IAC3C,CAAC;IAED;;OAEG;IACH,IAAI,aAAa;QACf,OAAO,uBAAA,IAAI,0BAAK,CAAC,aAAa,CAAC,IAAI,CAAC,uBAAA,IAAI,0BAAK,CAAC,CAAC;IACjD,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAAC,OAA6B;QAC1D,MAAM,OAAO,GAAG,MAAM,6CAAoB,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACpE,OAAO,IAAI,aAAa,CAAC,OAAO,CAAC,CAAC;IACpC,CAAC;IAED;;;;OAIG;IACH,YAAY,UAAgC;QAlGnC,qCAAuB;QAmG9B,uBAAA,IAAI,sBAAQ,IAAI,yBAAgB,CAAC,UAAU,CAAC,MAAA,CAAC;IAC/C,CAAC;CACF;AAtGD,sCAsGC","sourcesContent":["import assert from \"assert\";\nimport { CubeSigner, toKeyInfo, MfaReceipt, KeyInfo } from \".\";\nimport { CubeSignerClient } from \"./client\";\nimport { AcceptedResponse, NewSessionResponse } from \"./schema_types\";\nimport { SignerSessionManager, SignerSessionStorage } from \"./session/signer_session_manager\";\n\ntype Response<U> = U | AcceptedResponse;\ntype RequestFn<U> = (headers?: HeadersInit) => Promise<Response<U>>;\ntype MapFn<U, V> = (u: U) => V;\n\n/**\n * Takes a {@link Response<U>} and a {@link MapFn<U, V>} function and returns\n * a {@link Response<V>} that maps the value of the original response when its status code is 200.\n *\n * @param {Response<U>} resp Original response\n * @param {Map<U, V>} mapFn Map to apply to the response value when its status code is 200.\n * @return {Response<V>} Response whose value for status code 200 is mapped from U to V\n */\nexport function mapResponse<U, V>(resp: Response<U>, mapFn: MapFn<U, V>): Response<V> {\n  if ((resp as AcceptedResponse).accepted?.MfaRequired) {\n    return resp as AcceptedResponse;\n  } else {\n    return mapFn(resp as U);\n  }\n}\n\nexport interface MfaRequired {\n  /** Org id */\n  org_id: string;\n  /** MFA request id */\n  id: string;\n  /** Optional MFA session */\n  session?: NewSessionResponse | null;\n}\n\n/**\n * A response of a CubeSigner request.\n */\nexport class CubeSignerResponse<U> {\n  readonly #requestFn: RequestFn<U>;\n  readonly #resp: U | AcceptedResponse;\n  /**\n   * Optional MFA id. Only set if there is an MFA request associated with the\n   * signing request\n   */\n  readonly #mfaRequired?: MfaRequired;\n\n  /** @return {string} The MFA id associated with this request */\n  mfaId(): string {\n    return this.#mfaRequired!.id;\n  }\n\n  /** @return {boolean} True if this request requires an MFA approval */\n  requiresMfa(): boolean {\n    return this.#mfaRequired !== undefined;\n  }\n\n  /**\n   * Returns session information to use for any MFA approval requests (if any was included in the response).\n   * @return {ClientSessionInfo | undefined}\n   */\n  mfaSessionInfo(): NewSessionResponse | undefined {\n    return (this.#resp as AcceptedResponse).accepted?.MfaRequired?.session ?? undefined;\n  }\n\n  /** @return {U} The response data, if no MFA is required */\n  data(): U {\n    if (this.requiresMfa()) {\n      throw new Error(\"Cannot call `data()` while MFA is required\");\n    }\n    return this.#resp as U;\n  }\n\n  /**\n   * Approves the MFA request using a given session and a TOTP code.\n   *\n   * @param {SignerSession} session Signer session to use\n   * @param {string} code 6-digit TOTP code\n   * @return {CubeSignerResponse<U>} The result of signing with the approval\n   */\n  async approveTotp(session: SignerSession, code: string): Promise<CubeSignerResponse<U>> {\n    assert(this.requiresMfa());\n    const mfaId = this.mfaId();\n    const mfaOrgId = this.#mfaRequired!.org_id;\n    const mfaApproval = await session.totpApprove(mfaId, code);\n    assert(mfaApproval.id === mfaId);\n    const mfaConf = mfaApproval.receipt?.confirmation;\n\n    if (!mfaConf) {\n      return this;\n    }\n\n    return await this.signWithMfaApproval({ mfaId, mfaOrgId, mfaConf });\n  }\n\n  /**\n   * Approves the MFA request using a given `CubeSignerClient` instance (i.e., its session).\n   *\n   * @param {CubeSigner} cs CubeSigner whose session to use\n   * @return {CubeSignerResponse<U>} The result of signing with the approval\n   */\n  async approve(cs: CubeSigner): Promise<CubeSignerResponse<U>> {\n    assert(this.requiresMfa());\n    const mfaId = this.#mfaRequired!.id;\n    const mfaOrgId = this.#mfaRequired!.org_id;\n\n    const mfaApproval = await cs.mfaApprove(mfaOrgId, mfaId);\n    assert(mfaApproval.id === mfaId);\n    const mfaConf = mfaApproval.receipt?.confirmation;\n\n    if (!mfaConf) {\n      return this;\n    }\n\n    return await this.signWithMfaApproval({ mfaId, mfaOrgId, mfaConf });\n  }\n\n  /**\n   * @param {MfaReceipt} mfaReceipt The MFA receipt\n   * @return {Promise<CubeSignerResponse<U>>} The result of signing after MFA approval\n   */\n  async signWithMfaApproval(mfaReceipt: MfaReceipt): Promise<CubeSignerResponse<U>> {\n    const headers = CubeSignerResponse.getMfaHeaders(mfaReceipt);\n    return new CubeSignerResponse(this.#requestFn, await this.#requestFn(headers));\n  }\n\n  // --------------------------------------------------------------------------\n  // -- INTERNAL --------------------------------------------------------------\n  // --------------------------------------------------------------------------\n\n  /**\n   * Constructor.\n   *\n   * @param {RequestFn} requestFn\n   *    The signing function that this response is from.\n   *    This argument is used to resend requests with different headers if needed.\n   * @param {U | AcceptedResponse} resp The response as returned by the OpenAPI client.\n   */\n  constructor(requestFn: RequestFn<U>, resp: U | AcceptedResponse) {\n    this.#requestFn = requestFn;\n    this.#resp = resp;\n    this.#mfaRequired = (this.#resp as AcceptedResponse).accepted?.MfaRequired;\n  }\n\n  /**\n   * Static constructor.\n   * @param {RequestFn} requestFn\n   *    The request function that this response is from.\n   *    This argument is used to resend requests with different headers if needed.\n   * @param {MfaReceipt} mfaReceipt Optional MFA receipt\n   * @return {Promise<CubeSignerResponse<U>>} New instance of this class.\n   */\n  static async create<U>(\n    requestFn: RequestFn<U>,\n    mfaReceipt?: MfaReceipt,\n  ): Promise<CubeSignerResponse<U>> {\n    const seed = await requestFn(this.getMfaHeaders(mfaReceipt));\n    return new CubeSignerResponse(requestFn, seed);\n  }\n\n  /**\n   * Returns HTTP headers containing a given MFA receipt.\n   *\n   * @param {MfaReceipt} mfaReceipt MFA receipt\n   * @return {HeadersInit} Headers including that receipt\n   */\n  static getMfaHeaders(mfaReceipt?: MfaReceipt): HeadersInit | undefined {\n    return mfaReceipt\n      ? {\n          \"x-cubist-mfa-id\": mfaReceipt.mfaId,\n          \"x-cubist-mfa-org-id\": mfaReceipt.mfaOrgId,\n          \"x-cubist-mfa-confirmation\": mfaReceipt.mfaConf,\n        }\n      : undefined;\n  }\n}\n\n/** Signer session info. Can only be used to revoke a token, but not for authentication. */\nexport class SignerSessionInfo {\n  readonly #csc: CubeSignerClient;\n  readonly #sessionId: string;\n  public readonly purpose: string;\n\n  /** Revoke this session */\n  async revoke() {\n    await this.#csc.sessionRevoke(this.#sessionId);\n  }\n\n  // --------------------------------------------------------------------------\n  // -- INTERNAL --------------------------------------------------------------\n  // --------------------------------------------------------------------------\n\n  /**\n   * Internal constructor.\n   * @param {CubeSignerClient} cs CubeSigner instance to use when calling `revoke`\n   * @param {string} sessionId The ID of the session; can be used for revocation but not for auth\n   * @param {string} purpose Session purpose\n   * @internal\n   */\n  constructor(cs: CubeSignerClient, sessionId: string, purpose: string) {\n    this.#csc = cs;\n    this.#sessionId = sessionId;\n    this.purpose = purpose;\n  }\n}\n\n/**\n * Signer session.\n *\n * @deprecated Use {@link CubeSignerClient} instead.\n */\nexport class SignerSession {\n  readonly #csc: CubeSignerClient;\n\n  /** Deprecated */\n  get sessionMgr() {\n    return this.#csc.sessionMgr;\n  }\n\n  /** Org id */\n  get orgId() {\n    return this.#csc.orgId;\n  }\n\n  /**\n   * Returns the list of keys that this token grants access to.\n   * @return {KeyInfo[]} The list of keys.\n   */\n  async keys(): Promise<KeyInfo[]> {\n    const keys = await this.#csc.sessionKeysList();\n    return keys.map((k) => toKeyInfo(k));\n  }\n\n  /** Approve a pending MFA request using TOTP. */\n  get totpApprove() {\n    return this.#csc.mfaApproveTotp.bind(this.#csc);\n  }\n\n  /** Initiate approval of an existing MFA request using FIDO. */\n  get fidoApproveStart() {\n    return this.#csc.mfaApproveFidoInit.bind(this.#csc);\n  }\n\n  /** Get a pending MFA request by its id. */\n  get getMfaInfo() {\n    return this.#csc.mfaGet.bind(this.#csc);\n  }\n\n  /** Submit an EVM sign request. */\n  get signEvm() {\n    return this.#csc.signEvm.bind(this.#csc);\n  }\n\n  /** Submit an 'eth2' sign request. */\n  get signEth2() {\n    return this.#csc.signEth2.bind(this.#csc);\n  }\n\n  /** Sign a stake request. */\n  get stake() {\n    return this.#csc.signStake.bind(this.#csc);\n  }\n\n  /** Sign an unstake request. */\n  get unstake() {\n    return this.#csc.signUnstake.bind(this.#csc);\n  }\n\n  /** Sign a raw blob.*/\n  get signBlob() {\n    return this.#csc.signBlob.bind(this.#csc);\n  }\n\n  /** Sign a bitcoin message. */\n  get signBtc() {\n    return this.#csc.signBtc.bind(this.#csc);\n  }\n\n  /** Sign a solana message. */\n  get signSolana() {\n    return this.#csc.signSolana.bind(this.#csc);\n  }\n\n  /** Sign an Avalanche P- or X-chain message. */\n  get signAva() {\n    return this.#csc.signAva.bind(this.#csc);\n  }\n\n  /**\n   * Obtain a proof of authentication.\n   */\n  get proveIdentity() {\n    return this.#csc.identityProve.bind(this.#csc);\n  }\n\n  /**\n   * Loads an existing signer session from storage.\n   * @param {SignerSessionStorage} storage The session storage to use\n   * @return {Promise<SingerSession>} New signer session\n   */\n  static async loadSignerSession(storage: SignerSessionStorage): Promise<SignerSession> {\n    const manager = await SignerSessionManager.loadFromStorage(storage);\n    return new SignerSession(manager);\n  }\n\n  /**\n   * Constructor.\n   * @param {SignerSessionManager} sessionMgr The session manager to use\n   * @internal\n   */\n  constructor(sessionMgr: SignerSessionManager) {\n    this.#csc = new CubeSignerClient(sessionMgr);\n  }\n}\n"]}
|
|
77
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoic2lnbmVyX3Nlc3Npb24uanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvc2lnbmVyX3Nlc3Npb24udHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7Ozs7Ozs7Ozs7Ozs7O0FBQUEscUNBQTRDO0FBQzVDLCtCQUEyQztBQUMzQyw2RUFBOEY7QUFFOUYsMkZBQTJGO0FBQzNGLE1BQWEsaUJBQWlCO0lBSzVCLDBCQUEwQjtJQUMxQixLQUFLLENBQUMsTUFBTTtRQUNWLE1BQU0sdUJBQUEsSUFBSSw4QkFBSyxDQUFDLGFBQWEsQ0FBQyx1QkFBQSxJQUFJLG9DQUFXLENBQUMsQ0FBQztJQUNqRCxDQUFDO0lBRUQsNkVBQTZFO0lBQzdFLDZFQUE2RTtJQUM3RSw2RUFBNkU7SUFFN0U7Ozs7OztPQU1HO0lBQ0gsWUFBWSxFQUFvQixFQUFFLFNBQWlCLEVBQUUsT0FBZTtRQXBCM0QseUNBQXVCO1FBQ3ZCLCtDQUFtQjtRQW9CMUIsdUJBQUEsSUFBSSwwQkFBUSxFQUFFLE1BQUEsQ0FBQztRQUNmLHVCQUFBLElBQUksZ0NBQWMsU0FBUyxNQUFBLENBQUM7UUFDNUIsSUFBSSxDQUFDLE9BQU8sR0FBRyxPQUFPLENBQUM7SUFDekIsQ0FBQztDQUNGO0FBMUJELDhDQTBCQzs7QUFFRDs7O0dBR0c7QUFDSCxNQUFhLGFBQWMsU0FBUSx5QkFBZ0I7SUFDakQ7Ozs7T0FJRztJQUNILE1BQU0sQ0FBQyxLQUFLLENBQUMsaUJBQWlCLENBQUMsT0FBNkI7UUFDMUQsTUFBTSxPQUFPLEdBQUcsTUFBTSw2Q0FBb0IsQ0FBQyxlQUFlLENBQUMsT0FBTyxDQUFDLENBQUM7UUFDcEUsT0FBTyxJQUFJLGFBQWEsQ0FBQyxPQUFPLENBQUMsQ0FBQztJQUNwQyxDQUFDO0lBRUQ7Ozs7T0FJRztJQUNILFlBQVksVUFBZ0M7UUFDMUMsS0FBSyxDQUFDLFVBQVUsQ0FBQyxDQUFDO0lBQ3BCLENBQUM7SUFFRDs7O09BR0c7SUFDSCxLQUFLLENBQUMsSUFBSTtRQUNSLE1BQU0sSUFBSSxHQUFHLE1BQU0sSUFBSSxDQUFDLGVBQWUsRUFBRSxDQUFDO1FBQzFDLE9BQU8sSUFBSSxDQUFDLEdBQUcsQ0FBQyxDQUFDLENBQUMsRUFBRSxFQUFFLENBQUMsSUFBQSxlQUFTLEVBQUMsQ0FBQyxDQUFDLENBQUMsQ0FBQztJQUN2QyxDQUFDO0NBQ0Y7QUE1QkQsc0NBNEJDIiwic291cmNlc0NvbnRlbnQiOlsiaW1wb3J0IHsgQ3ViZVNpZ25lckNsaWVudCB9IGZyb20gXCIuL2NsaWVudFwiO1xuaW1wb3J0IHsgS2V5SW5mbywgdG9LZXlJbmZvIH0gZnJvbSBcIi4va2V5XCI7XG5pbXBvcnQgeyBTaWduZXJTZXNzaW9uTWFuYWdlciwgU2lnbmVyU2Vzc2lvblN0b3JhZ2UgfSBmcm9tIFwiLi9zZXNzaW9uL3NpZ25lcl9zZXNzaW9uX21hbmFnZXJcIjtcblxuLyoqIFNpZ25lciBzZXNzaW9uIGluZm8uIENhbiBvbmx5IGJlIHVzZWQgdG8gcmV2b2tlIGEgdG9rZW4sIGJ1dCBub3QgZm9yIGF1dGhlbnRpY2F0aW9uLiAqL1xuZXhwb3J0IGNsYXNzIFNpZ25lclNlc3Npb25JbmZvIHtcbiAgcmVhZG9ubHkgI2NzYzogQ3ViZVNpZ25lckNsaWVudDtcbiAgcmVhZG9ubHkgI3Nlc3Npb25JZDogc3RyaW5nO1xuICBwdWJsaWMgcmVhZG9ubHkgcHVycG9zZTogc3RyaW5nO1xuXG4gIC8qKiBSZXZva2UgdGhpcyBzZXNzaW9uICovXG4gIGFzeW5jIHJldm9rZSgpIHtcbiAgICBhd2FpdCB0aGlzLiNjc2Muc2Vzc2lvblJldm9rZSh0aGlzLiNzZXNzaW9uSWQpO1xuICB9XG5cbiAgLy8gLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS1cbiAgLy8gLS0gSU5URVJOQUwgLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS1cbiAgLy8gLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS1cblxuICAvKipcbiAgICogSW50ZXJuYWwgY29uc3RydWN0b3IuXG4gICAqIEBwYXJhbSB7Q3ViZVNpZ25lckNsaWVudH0gY3MgQ3ViZVNpZ25lciBpbnN0YW5jZSB0byB1c2Ugd2hlbiBjYWxsaW5nIGByZXZva2VgXG4gICAqIEBwYXJhbSB7c3RyaW5nfSBzZXNzaW9uSWQgVGhlIElEIG9mIHRoZSBzZXNzaW9uOyBjYW4gYmUgdXNlZCBmb3IgcmV2b2NhdGlvbiBidXQgbm90IGZvciBhdXRoXG4gICAqIEBwYXJhbSB7c3RyaW5nfSBwdXJwb3NlIFNlc3Npb24gcHVycG9zZVxuICAgKiBAaW50ZXJuYWxcbiAgICovXG4gIGNvbnN0cnVjdG9yKGNzOiBDdWJlU2lnbmVyQ2xpZW50LCBzZXNzaW9uSWQ6IHN0cmluZywgcHVycG9zZTogc3RyaW5nKSB7XG4gICAgdGhpcy4jY3NjID0gY3M7XG4gICAgdGhpcy4jc2Vzc2lvbklkID0gc2Vzc2lvbklkO1xuICAgIHRoaXMucHVycG9zZSA9IHB1cnBvc2U7XG4gIH1cbn1cblxuLyoqXG4gKiBTaWduZXIgc2Vzc2lvbi5cbiAqIEV4dGVuZHMge0BsaW5rIEN1YmVTaWduZXJDbGllbnR9IGFuZCBwcm92aWRlcyBhIGZldyBjb252ZW5pZW5jZSBtZXRob2RzIG9uIHRvcC5cbiAqL1xuZXhwb3J0IGNsYXNzIFNpZ25lclNlc3Npb24gZXh0ZW5kcyBDdWJlU2lnbmVyQ2xpZW50IHtcbiAgLyoqXG4gICAqIExvYWRzIGFuIGV4aXN0aW5nIHNpZ25lciBzZXNzaW9uIGZyb20gc3RvcmFnZS5cbiAgICogQHBhcmFtIHtTaWduZXJTZXNzaW9uU3RvcmFnZX0gc3RvcmFnZSBUaGUgc2Vzc2lvbiBzdG9yYWdlIHRvIHVzZVxuICAgKiBAcmV0dXJuIHtQcm9taXNlPFNpbmdlclNlc3Npb24+fSBOZXcgc2lnbmVyIHNlc3Npb25cbiAgICovXG4gIHN0YXRpYyBhc3luYyBsb2FkU2lnbmVyU2Vzc2lvbihzdG9yYWdlOiBTaWduZXJTZXNzaW9uU3RvcmFnZSk6IFByb21pc2U8U2lnbmVyU2Vzc2lvbj4ge1xuICAgIGNvbnN0IG1hbmFnZXIgPSBhd2FpdCBTaWduZXJTZXNzaW9uTWFuYWdlci5sb2FkRnJvbVN0b3JhZ2Uoc3RvcmFnZSk7XG4gICAgcmV0dXJuIG5ldyBTaWduZXJTZXNzaW9uKG1hbmFnZXIpO1xuICB9XG5cbiAgLyoqXG4gICAqIENvbnN0cnVjdG9yLlxuICAgKiBAcGFyYW0ge1NpZ25lclNlc3Npb25NYW5hZ2VyfSBzZXNzaW9uTWdyIFRoZSBzZXNzaW9uIG1hbmFnZXIgdG8gdXNlXG4gICAqIEBpbnRlcm5hbFxuICAgKi9cbiAgY29uc3RydWN0b3Ioc2Vzc2lvbk1ncjogU2lnbmVyU2Vzc2lvbk1hbmFnZXIpIHtcbiAgICBzdXBlcihzZXNzaW9uTWdyKTtcbiAgfVxuXG4gIC8qKlxuICAgKiBSZXR1cm5zIHRoZSBsaXN0IG9mIGtleXMgdGhhdCB0aGlzIHRva2VuIGdyYW50cyBhY2Nlc3MgdG8uXG4gICAqIEByZXR1cm4ge0tleUluZm9bXX0gVGhlIGxpc3Qgb2Yga2V5cy5cbiAgICovXG4gIGFzeW5jIGtleXMoKTogUHJvbWlzZTxLZXlJbmZvW10+IHtcbiAgICBjb25zdCBrZXlzID0gYXdhaXQgdGhpcy5zZXNzaW9uS2V5c0xpc3QoKTtcbiAgICByZXR1cm4ga2V5cy5tYXAoKGspID0+IHRvS2V5SW5mbyhrKSk7XG4gIH1cbn1cbiJdfQ==
|
|
@@ -0,0 +1,52 @@
|
|
|
1
|
+
import { UserExportCompleteResponse, UserExportKeyMaterial } from "./schema_types";
|
|
2
|
+
import type { CipherSuite } from "@hpke/core";
|
|
3
|
+
/** Get the HPKE ciphersuite for user-export decryption.
|
|
4
|
+
*
|
|
5
|
+
* @return {any} The HPKE ciphersuite for user export.
|
|
6
|
+
*/
|
|
7
|
+
export declare function userExportCipherSuite(): Promise<CipherSuite>;
|
|
8
|
+
/**
|
|
9
|
+
* Generate a key pair for user export.
|
|
10
|
+
*
|
|
11
|
+
* @return {Promise<CryptoKeyPair>} The newly generated key pair.
|
|
12
|
+
*/
|
|
13
|
+
export declare function userExportKeygen(): Promise<CryptoKeyPair>;
|
|
14
|
+
/**
|
|
15
|
+
* Decrypt a user export.
|
|
16
|
+
*
|
|
17
|
+
* @param {CryptoKey} recipientKey The NIST P-256 secret key corresponding to the `publicKey` argument to the `userExportComplete` invocation that returned `response`.
|
|
18
|
+
* @param {UserExportCompleteResponse} response The response from a successful `userExportComplete` request.
|
|
19
|
+
* @return {Promise<UserExportKeyMaterial>} The decrypted key material.
|
|
20
|
+
*/
|
|
21
|
+
export declare function userExportDecrypt(recipientKey: CryptoKey, response: UserExportCompleteResponse): Promise<UserExportKeyMaterial>;
|
|
22
|
+
/**
|
|
23
|
+
* Figure out how to load SubtleCrypto in the current environment.
|
|
24
|
+
*
|
|
25
|
+
* This functionality is reproduced from the hpke-js package,
|
|
26
|
+
* https://github.com/dajiaji/hpke-js/
|
|
27
|
+
* which is Copyright (C) 2022 Ajitomi Daisuke and licensed
|
|
28
|
+
* under the MIT License, which follows:
|
|
29
|
+
*
|
|
30
|
+
* MIT License
|
|
31
|
+
*
|
|
32
|
+
* Copyright (c) 2022 Ajitomi Daisuke
|
|
33
|
+
*
|
|
34
|
+
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
35
|
+
* of this software and associated documentation files (the "Software"), to deal
|
|
36
|
+
* in the Software without restriction, including without limitation the rights
|
|
37
|
+
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
38
|
+
* copies of the Software, and to permit persons to whom the Software is
|
|
39
|
+
* furnished to do so, subject to the following conditions:
|
|
40
|
+
*
|
|
41
|
+
* The above copyright notice and this permission notice shall be included in all
|
|
42
|
+
* copies or substantial portions of the Software.
|
|
43
|
+
*
|
|
44
|
+
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
45
|
+
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
46
|
+
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
47
|
+
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
48
|
+
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
49
|
+
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
50
|
+
* SOFTWARE.
|
|
51
|
+
*/
|
|
52
|
+
export declare function loadSubtleCrypto(): Promise<SubtleCrypto>;
|