@cubist-labs/cubesigner-sdk 0.2.21 → 0.2.24

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -882,7 +882,7 @@ export interface components {
882
882
  * https://www.w3.org/TR/webauthn-2/#dictdef-authenticatorselectioncriteria
883
883
  */
884
884
  AuthenticatorSelectionCriteria: {
885
- authenticator_attachment?: components["schemas"]["AuthenticatorAttachment"] | null;
885
+ authenticatorAttachment?: components["schemas"]["AuthenticatorAttachment"] | null;
886
886
  /**
887
887
  * @description This member is retained for backwards compatibility with WebAuthn Level
888
888
  * 1 and, for historical reasons, its naming retains the deprecated
@@ -891,9 +891,9 @@ export interface components {
891
891
  *
892
892
  * https://www.w3.org/TR/webauthn-2/#dom-authenticatorselectioncriteria-requireresidentkey
893
893
  */
894
- require_resident_key?: boolean;
895
- resident_key?: components["schemas"]["ResidentKeyRequirement"] | null;
896
- user_verification?: components["schemas"]["UserVerificationRequirement"];
894
+ requireResidentKey?: boolean;
895
+ residentKey?: components["schemas"]["ResidentKeyRequirement"] | null;
896
+ userVerification?: components["schemas"]["UserVerificationRequirement"];
897
897
  };
898
898
  /**
899
899
  * @description Authenticators may implement various transports for communicating with
@@ -1576,25 +1576,6 @@ export interface components {
1576
1576
  */
1577
1577
  skip_email: boolean;
1578
1578
  };
1579
- /**
1580
- * @description Key material contained inside a [`JsonKeyPackage`], which can be either
1581
- * a raw secret or a mnemonic, password, and derivation path.
1582
- */
1583
- JsonKeyMaterial: {
1584
- /** @enum {string} */
1585
- material_type: "raw_secret";
1586
- /** @description The value of the raw secret */
1587
- secret: string;
1588
- } | {
1589
- /** @description The derivation path */
1590
- derivation_path: string;
1591
- /** @enum {string} */
1592
- material_type: "english_mnemonic";
1593
- /** @description The mnemonic */
1594
- mnemonic: string;
1595
- /** @description The password (which may be empty) */
1596
- password: string;
1597
- };
1598
1579
  /**
1599
1580
  * @description A [`KeyPackage`] serialized into a format that gives a tidier JSON
1600
1581
  * representation suitable for encryption in the user-export flow.
@@ -1665,9 +1646,21 @@ export interface components {
1665
1646
  * );
1666
1647
  * ```
1667
1648
  */
1668
- JsonKeyPackage: {
1669
- material_type: "JsonKeyPackage";
1670
- } & Omit<components["schemas"]["JsonKeyMaterial"], "material_type"> & {
1649
+ JsonKeyPackage: ({
1650
+ /** @enum {string} */
1651
+ material_type: "raw_secret";
1652
+ /** @description The value of the raw secret */
1653
+ secret: string;
1654
+ } | {
1655
+ /** @description The derivation path */
1656
+ derivation_path: string;
1657
+ /** @enum {string} */
1658
+ material_type: "english_mnemonic";
1659
+ /** @description The mnemonic */
1660
+ mnemonic: string;
1661
+ /** @description The password (which may be empty) */
1662
+ password: string;
1663
+ }) & {
1671
1664
  /** @description The type of key this package represents */
1672
1665
  key_type: string;
1673
1666
  };
@@ -1807,6 +1800,12 @@ export interface components {
1807
1800
  Network: "mainnet" | "prater" | "goerli" | "holesky";
1808
1801
  /** @description Information about a new session, returned from multiple endpoints (e.g., login, refresh, etc.). */
1809
1802
  NewSessionResponse: {
1803
+ /**
1804
+ * Format: int64
1805
+ * @description Session expiration (in seconds since UNIX epoch), beyond which it cannot be refreshed.
1806
+ * @example 1701879640
1807
+ */
1808
+ expiration?: number;
1810
1809
  session_info: components["schemas"]["ClientSessionInfo"];
1811
1810
  /**
1812
1811
  * @description New token to be used for authentication. Requests to signing endpoints
@@ -1897,6 +1896,13 @@ export interface components {
1897
1896
  * ]
1898
1897
  */
1899
1898
  policy?: Record<string, never>[];
1899
+ /**
1900
+ * Format: int32
1901
+ * @description The organization's currently configured TOTP failure limit, i.e., the number
1902
+ * of times a user can provide an incorrect TOTP code before being rate limited.
1903
+ * This value can be between 1 and 5 (inclusive).
1904
+ */
1905
+ totp_failure_limit: number;
1900
1906
  /**
1901
1907
  * Format: int64
1902
1908
  * @description The organization's currently configured user-export delay, i.e., the minimum
@@ -2655,6 +2661,12 @@ export interface components {
2655
2661
  * ]
2656
2662
  */
2657
2663
  policy?: Record<string, never>[] | null;
2664
+ /**
2665
+ * Format: int32
2666
+ * @description If set, update this org's TOTP failure limit. After this many failures,
2667
+ * the user is rate limited until the next 30-second TOTP window.
2668
+ */
2669
+ totp_failure_limit?: number | null;
2658
2670
  /**
2659
2671
  * Format: int64
2660
2672
  * @description If set, update this org's user-export delay, i.e., the amount of time
@@ -2700,6 +2712,11 @@ export interface components {
2700
2712
  * ]
2701
2713
  */
2702
2714
  policy?: Record<string, never>[] | null;
2715
+ /**
2716
+ * Format: int32
2717
+ * @description The new value of the TOTP failure limit
2718
+ */
2719
+ totp_failure_limit?: number | null;
2703
2720
  /**
2704
2721
  * Format: int64
2705
2722
  * @description The new value of user-export delay
@@ -3179,6 +3196,12 @@ export interface components {
3179
3196
  NewSessionResponse: {
3180
3197
  content: {
3181
3198
  "application/json": {
3199
+ /**
3200
+ * Format: int64
3201
+ * @description Session expiration (in seconds since UNIX epoch), beyond which it cannot be refreshed.
3202
+ * @example 1701879640
3203
+ */
3204
+ expiration?: number;
3182
3205
  session_info: components["schemas"]["ClientSessionInfo"];
3183
3206
  /**
3184
3207
  * @description New token to be used for authentication. Requests to signing endpoints
@@ -3230,6 +3253,13 @@ export interface components {
3230
3253
  * ]
3231
3254
  */
3232
3255
  policy?: Record<string, never>[];
3256
+ /**
3257
+ * Format: int32
3258
+ * @description The organization's currently configured TOTP failure limit, i.e., the number
3259
+ * of times a user can provide an incorrect TOTP code before being rate limited.
3260
+ * This value can be between 1 and 5 (inclusive).
3261
+ */
3262
+ totp_failure_limit: number;
3233
3263
  /**
3234
3264
  * Format: int64
3235
3265
  * @description The organization's currently configured user-export delay, i.e., the minimum
@@ -3513,6 +3543,11 @@ export interface components {
3513
3543
  * ]
3514
3544
  */
3515
3545
  policy?: Record<string, never>[] | null;
3546
+ /**
3547
+ * Format: int32
3548
+ * @description The new value of the TOTP failure limit
3549
+ */
3550
+ totp_failure_limit?: number | null;
3516
3551
  /**
3517
3552
  * Format: int64
3518
3553
  * @description The new value of user-export delay