@cubist-labs/cubesigner-sdk 0.2.24 → 0.3.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +30 -28
- package/dist/cjs/package.json +41 -0
- package/dist/cjs/spec/env/beta.json +9 -0
- package/dist/cjs/spec/env/gamma.json +9 -0
- package/dist/cjs/spec/env/prod.json +9 -0
- package/dist/cjs/src/api.d.ts +634 -0
- package/dist/cjs/src/api.js +1309 -0
- package/dist/cjs/src/client.d.ts +575 -0
- package/dist/cjs/src/client.js +378 -0
- package/dist/cjs/src/env.d.ts +15 -0
- package/dist/cjs/src/env.js +35 -0
- package/dist/cjs/src/error.d.ts +29 -0
- package/dist/cjs/src/error.js +36 -0
- package/dist/cjs/src/events.d.ts +84 -0
- package/dist/cjs/src/events.js +195 -0
- package/dist/cjs/src/index.d.ts +203 -0
- package/dist/cjs/src/index.js +298 -0
- package/dist/cjs/src/key.d.ts +152 -0
- package/dist/cjs/src/key.js +242 -0
- package/dist/{src/fido.d.ts → cjs/src/mfa.d.ts} +33 -15
- package/dist/cjs/src/mfa.js +169 -0
- package/dist/cjs/src/org.d.ts +99 -0
- package/dist/cjs/src/org.js +95 -0
- package/dist/cjs/src/paginator.d.ts +76 -0
- package/dist/cjs/src/paginator.js +99 -0
- package/dist/cjs/src/response.d.ts +101 -0
- package/dist/cjs/src/response.js +164 -0
- package/dist/cjs/src/role.d.ts +283 -0
- package/dist/cjs/src/role.js +253 -0
- package/dist/cjs/src/schema.d.ts +6209 -0
- package/dist/cjs/src/schema.js +7 -0
- package/dist/cjs/src/schema_types.d.ts +113 -0
- package/dist/cjs/src/schema_types.js +3 -0
- package/dist/cjs/src/session/session_storage.d.ts +27 -0
- package/dist/cjs/src/session/session_storage.js +47 -0
- package/dist/cjs/src/session/signer_session_manager.d.ts +125 -0
- package/dist/cjs/src/session/signer_session_manager.js +239 -0
- package/dist/cjs/src/signer_session.d.ts +41 -0
- package/dist/cjs/src/signer_session.js +77 -0
- package/dist/cjs/src/user_export.d.ts +52 -0
- package/dist/cjs/src/user_export.js +129 -0
- package/dist/cjs/src/util.d.ts +56 -0
- package/dist/cjs/src/util.js +86 -0
- package/dist/esm/package.json +41 -0
- package/dist/esm/spec/env/beta.json +9 -0
- package/dist/esm/spec/env/gamma.json +9 -0
- package/dist/esm/spec/env/prod.json +9 -0
- package/dist/esm/src/api.d.ts +634 -0
- package/dist/esm/src/api.js +1299 -0
- package/dist/esm/src/client.d.ts +575 -0
- package/dist/esm/src/client.js +374 -0
- package/dist/esm/src/env.d.ts +15 -0
- package/dist/esm/src/env.js +9 -0
- package/dist/esm/src/error.d.ts +29 -0
- package/dist/esm/src/error.js +31 -0
- package/dist/esm/src/events.d.ts +84 -0
- package/dist/esm/src/events.js +189 -0
- package/dist/esm/src/index.d.ts +203 -0
- package/dist/esm/src/index.js +276 -0
- package/dist/esm/src/key.d.ts +152 -0
- package/dist/esm/src/key.js +236 -0
- package/dist/esm/src/mfa.d.ts +94 -0
- package/dist/esm/src/mfa.js +163 -0
- package/dist/esm/src/org.d.ts +99 -0
- package/dist/esm/src/org.js +91 -0
- package/dist/esm/src/paginator.d.ts +76 -0
- package/dist/esm/src/paginator.js +94 -0
- package/dist/esm/src/response.d.ts +101 -0
- package/dist/esm/src/response.js +159 -0
- package/dist/esm/src/role.d.ts +283 -0
- package/dist/esm/src/role.js +248 -0
- package/dist/esm/src/schema.d.ts +6209 -0
- package/dist/esm/src/schema.js +6 -0
- package/dist/esm/src/schema_types.d.ts +113 -0
- package/dist/esm/src/schema_types.js +2 -0
- package/dist/esm/src/session/session_storage.d.ts +27 -0
- package/dist/esm/src/session/session_storage.js +43 -0
- package/dist/esm/src/session/signer_session_manager.d.ts +125 -0
- package/dist/esm/src/session/signer_session_manager.js +235 -0
- package/dist/esm/src/signer_session.d.ts +41 -0
- package/dist/esm/src/signer_session.js +72 -0
- package/dist/esm/src/user_export.d.ts +52 -0
- package/dist/esm/src/user_export.js +99 -0
- package/dist/esm/src/util.d.ts +56 -0
- package/dist/esm/src/util.js +76 -0
- package/dist/package.json +13 -45
- package/dist/src/api.d.ts +29 -18
- package/dist/src/api.js +70 -17
- package/dist/src/client.d.ts +35 -14
- package/dist/src/client.js +12 -8
- package/dist/src/error.d.ts +29 -0
- package/dist/src/error.js +36 -0
- package/dist/src/events.d.ts +1 -1
- package/dist/src/events.js +1 -1
- package/dist/src/index.d.ts +8 -11
- package/dist/src/index.js +11 -25
- package/dist/src/key.d.ts +18 -7
- package/dist/src/key.js +52 -19
- package/dist/src/role.d.ts +46 -3
- package/dist/src/role.js +60 -8
- package/dist/src/schema.d.ts +206 -72
- package/dist/src/schema.js +1 -1
- package/dist/src/schema_types.d.ts +3 -0
- package/dist/src/schema_types.js +1 -1
- package/dist/src/session/signer_session_manager.d.ts +49 -13
- package/dist/src/session/signer_session_manager.js +104 -26
- package/dist/src/util.d.ts +14 -0
- package/dist/src/util.js +24 -27
- package/package.json +19 -46
- package/src/api.ts +81 -23
- package/src/client.ts +12 -8
- package/src/error.ts +42 -0
- package/src/events.ts +3 -1
- package/src/index.ts +12 -24
- package/src/key.ts +36 -18
- package/src/role.ts +78 -7
- package/src/schema.ts +269 -110
- package/src/schema_types.ts +3 -0
- package/src/session/session_storage.ts +0 -32
- package/src/session/signer_session_manager.ts +137 -28
- package/src/util.ts +19 -10
- package/tsconfig.json +1 -21
- package/LICENSE-APACHE +0 -177
- package/LICENSE-MIT +0 -25
- package/NOTICE +0 -13
- package/dist/examples/ethers.d.ts +0 -1
- package/dist/examples/ethers.js +0 -142
- package/dist/src/ethers/index.d.ts +0 -95
- package/dist/src/ethers/index.js +0 -208
- package/dist/src/fido.js +0 -148
- package/dist/src/session/cognito_manager.d.ts +0 -71
- package/dist/src/session/cognito_manager.js +0 -129
- package/dist/src/session/generic.d.ts +0 -47
- package/dist/src/session/generic.js +0 -3
- package/dist/src/session/management_session_manager.d.ts +0 -59
- package/dist/src/session/management_session_manager.js +0 -111
- package/dist/src/session/oidc_session_manager.d.ts +0 -78
- package/dist/src/session/oidc_session_manager.js +0 -142
- package/dist/src/session/session_manager.d.ts +0 -99
- package/dist/src/session/session_manager.js +0 -136
- package/dist/src/sign.d.ts +0 -114
- package/dist/src/sign.js +0 -248
- package/dist/test/sessions.d.ts +0 -35
- package/dist/test/sessions.js +0 -56
- package/src/ethers/index.ts +0 -249
- package/src/session/cognito_manager.ts +0 -161
- package/src/session/session_manager.ts +0 -165
|
@@ -1,78 +0,0 @@
|
|
|
1
|
-
import { Client } from "../client";
|
|
2
|
-
import { EnvInterface } from "..";
|
|
3
|
-
import { OrgSessionManager } from "./session_manager";
|
|
4
|
-
import { SessionStorage } from "./session_storage";
|
|
5
|
-
/** JSON representation of the OIDC token */
|
|
6
|
-
export interface OidcSessionData {
|
|
7
|
-
/** The environment that this token is for */
|
|
8
|
-
env: EnvInterface;
|
|
9
|
-
/** The organization ID */
|
|
10
|
-
org_id: string;
|
|
11
|
-
/** The OIDC token that this session was created from */
|
|
12
|
-
oidc_token: string;
|
|
13
|
-
/** The token to include in Authorization header */
|
|
14
|
-
token: string;
|
|
15
|
-
/** Token expiration timestamp */
|
|
16
|
-
token_exp: number;
|
|
17
|
-
/** The scopes of the token */
|
|
18
|
-
scopes: Array<string>;
|
|
19
|
-
}
|
|
20
|
-
/** Type of storage required for OIDC sessions */
|
|
21
|
-
export type OidcSessionStorage = SessionStorage<OidcSessionData>;
|
|
22
|
-
/** Manager for OIDC sessions. */
|
|
23
|
-
export declare class OidcSessionManager extends OrgSessionManager<OidcSessionData> {
|
|
24
|
-
#private;
|
|
25
|
-
/**
|
|
26
|
-
* @return {string} The current auth token.
|
|
27
|
-
* @internal
|
|
28
|
-
*/
|
|
29
|
-
token(): Promise<string>;
|
|
30
|
-
/**
|
|
31
|
-
* Returns a client with the current session and refreshes the current
|
|
32
|
-
* session. May **UPDATE/MUTATE** self.
|
|
33
|
-
*/
|
|
34
|
-
client(): Promise<Client>;
|
|
35
|
-
/** Revokes the session. */
|
|
36
|
-
revoke(): Promise<void>;
|
|
37
|
-
/**
|
|
38
|
-
* Refreshes the session and **UPDATES/MUTATES** self.
|
|
39
|
-
*/
|
|
40
|
-
refresh(): Promise<void>;
|
|
41
|
-
/**
|
|
42
|
-
* Returns whether it's time to refresh this token.
|
|
43
|
-
* @return {boolean} Whether it's time to refresh this token.
|
|
44
|
-
* @internal
|
|
45
|
-
*/
|
|
46
|
-
isStale(): Promise<boolean>;
|
|
47
|
-
/**
|
|
48
|
-
* Refreshes the session if it is about to expire.
|
|
49
|
-
* @return {boolean} Whether the session token was refreshed.
|
|
50
|
-
* @internal
|
|
51
|
-
*/
|
|
52
|
-
refreshIfNeeded(): Promise<boolean>;
|
|
53
|
-
/**
|
|
54
|
-
* Authenticate an OIDC user and create a new session for them.
|
|
55
|
-
* @param {EnvInterface} env The environment of the session
|
|
56
|
-
* @param {SessionStorage<SignerSessionObject>} storage The signer session storage
|
|
57
|
-
* @param {string} oidcToken The OIDC token
|
|
58
|
-
* @param {string} orgId The id of the organization that the user is in
|
|
59
|
-
* @param {List<string>} scopes The scopes of the resulting session
|
|
60
|
-
* @return {Promise<OidcSessionManager>} The signer session
|
|
61
|
-
*/
|
|
62
|
-
static create(env: EnvInterface, storage: SessionStorage<OidcSessionData>, oidcToken: string, orgId: string, scopes: Array<string>): Promise<OidcSessionManager>;
|
|
63
|
-
/**
|
|
64
|
-
* Load from storage
|
|
65
|
-
* @param {OidcSessionStorage} storage The storage to load from
|
|
66
|
-
* @return {Promise<OidcSessionManager>} New OIDC session manager
|
|
67
|
-
*/
|
|
68
|
-
static loadFromStorage(storage: OidcSessionStorage): Promise<OidcSessionManager>;
|
|
69
|
-
/**
|
|
70
|
-
* Constructor.
|
|
71
|
-
* @param {EnvInterface} env The environment of the session
|
|
72
|
-
* @param {string} orgId The id of the org associated with this session
|
|
73
|
-
* @param {string} token The authorization token to use
|
|
74
|
-
* @param {SessionStorage<U>} storage The storage back end to use for storing
|
|
75
|
-
* session information
|
|
76
|
-
*/
|
|
77
|
-
private constructor();
|
|
78
|
-
}
|
|
@@ -1,142 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
3
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
4
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
5
|
-
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
6
|
-
};
|
|
7
|
-
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
8
|
-
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
9
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
10
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
11
|
-
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
12
|
-
};
|
|
13
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
14
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
15
|
-
};
|
|
16
|
-
var _a, _OidcSessionManager_client, _OidcSessionManager_exchangeToken;
|
|
17
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
18
|
-
exports.OidcSessionManager = void 0;
|
|
19
|
-
const util_1 = require("../util");
|
|
20
|
-
const session_manager_1 = require("./session_manager");
|
|
21
|
-
const openapi_fetch_1 = __importDefault(require("openapi-fetch"));
|
|
22
|
-
// An token obtained from an OIDC token is valid for 5 minutes
|
|
23
|
-
const OIDC_TOKEN_EXP_SECS = 300;
|
|
24
|
-
/** Manager for OIDC sessions. */
|
|
25
|
-
class OidcSessionManager extends session_manager_1.OrgSessionManager {
|
|
26
|
-
/**
|
|
27
|
-
* @return {string} The current auth token.
|
|
28
|
-
* @internal
|
|
29
|
-
*/
|
|
30
|
-
async token() {
|
|
31
|
-
const session = await this.storage.retrieve();
|
|
32
|
-
return session.token;
|
|
33
|
-
}
|
|
34
|
-
/**
|
|
35
|
-
* Returns a client with the current session and refreshes the current
|
|
36
|
-
* session. May **UPDATE/MUTATE** self.
|
|
37
|
-
*/
|
|
38
|
-
async client() {
|
|
39
|
-
await this.refreshIfNeeded();
|
|
40
|
-
return __classPrivateFieldGet(this, _OidcSessionManager_client, "f");
|
|
41
|
-
}
|
|
42
|
-
/** Revokes the session. */
|
|
43
|
-
async revoke() {
|
|
44
|
-
this.unsupported("revoke");
|
|
45
|
-
}
|
|
46
|
-
/**
|
|
47
|
-
* Refreshes the session and **UPDATES/MUTATES** self.
|
|
48
|
-
*/
|
|
49
|
-
async refresh() {
|
|
50
|
-
const session = await this.storage.retrieve();
|
|
51
|
-
const [token, tokenExp] = await __classPrivateFieldGet(OidcSessionManager, _a, "m", _OidcSessionManager_exchangeToken).call(OidcSessionManager, session.env, session.oidc_token, session.org_id, session.scopes);
|
|
52
|
-
await this.storage.save({
|
|
53
|
-
...session,
|
|
54
|
-
token: token,
|
|
55
|
-
token_exp: tokenExp,
|
|
56
|
-
});
|
|
57
|
-
__classPrivateFieldSet(this, _OidcSessionManager_client, this.createClient(token), "f");
|
|
58
|
-
}
|
|
59
|
-
/**
|
|
60
|
-
* Returns whether it's time to refresh this token.
|
|
61
|
-
* @return {boolean} Whether it's time to refresh this token.
|
|
62
|
-
* @internal
|
|
63
|
-
*/
|
|
64
|
-
async isStale() {
|
|
65
|
-
const session = await this.storage.retrieve();
|
|
66
|
-
return this.hasExpired(session.token_exp);
|
|
67
|
-
}
|
|
68
|
-
/**
|
|
69
|
-
* Refreshes the session if it is about to expire.
|
|
70
|
-
* @return {boolean} Whether the session token was refreshed.
|
|
71
|
-
* @internal
|
|
72
|
-
*/
|
|
73
|
-
async refreshIfNeeded() {
|
|
74
|
-
if (await this.isStale()) {
|
|
75
|
-
await this.refresh();
|
|
76
|
-
return true;
|
|
77
|
-
}
|
|
78
|
-
return false;
|
|
79
|
-
}
|
|
80
|
-
/**
|
|
81
|
-
* Authenticate an OIDC user and create a new session for them.
|
|
82
|
-
* @param {EnvInterface} env The environment of the session
|
|
83
|
-
* @param {SessionStorage<SignerSessionObject>} storage The signer session storage
|
|
84
|
-
* @param {string} oidcToken The OIDC token
|
|
85
|
-
* @param {string} orgId The id of the organization that the user is in
|
|
86
|
-
* @param {List<string>} scopes The scopes of the resulting session
|
|
87
|
-
* @return {Promise<OidcSessionManager>} The signer session
|
|
88
|
-
*/
|
|
89
|
-
static async create(env, storage, oidcToken, orgId, scopes) {
|
|
90
|
-
const [token, tokenExp] = await __classPrivateFieldGet(OidcSessionManager, _a, "m", _OidcSessionManager_exchangeToken).call(OidcSessionManager, env, oidcToken, orgId, scopes);
|
|
91
|
-
await storage.save({
|
|
92
|
-
env,
|
|
93
|
-
org_id: orgId,
|
|
94
|
-
oidc_token: oidcToken,
|
|
95
|
-
token,
|
|
96
|
-
token_exp: tokenExp,
|
|
97
|
-
scopes,
|
|
98
|
-
});
|
|
99
|
-
return new OidcSessionManager(env, orgId, token, storage);
|
|
100
|
-
}
|
|
101
|
-
/**
|
|
102
|
-
* Load from storage
|
|
103
|
-
* @param {OidcSessionStorage} storage The storage to load from
|
|
104
|
-
* @return {Promise<OidcSessionManager>} New OIDC session manager
|
|
105
|
-
*/
|
|
106
|
-
static async loadFromStorage(storage) {
|
|
107
|
-
const info = await storage.retrieve();
|
|
108
|
-
return new OidcSessionManager(info.env, info.org_id, info.token, storage);
|
|
109
|
-
}
|
|
110
|
-
/**
|
|
111
|
-
* Constructor.
|
|
112
|
-
* @param {EnvInterface} env The environment of the session
|
|
113
|
-
* @param {string} orgId The id of the org associated with this session
|
|
114
|
-
* @param {string} token The authorization token to use
|
|
115
|
-
* @param {SessionStorage<U>} storage The storage back end to use for storing
|
|
116
|
-
* session information
|
|
117
|
-
*/
|
|
118
|
-
constructor(env, orgId, token, storage) {
|
|
119
|
-
super(env, orgId, storage);
|
|
120
|
-
_OidcSessionManager_client.set(this, void 0);
|
|
121
|
-
__classPrivateFieldSet(this, _OidcSessionManager_client, this.createClient(token), "f");
|
|
122
|
-
}
|
|
123
|
-
}
|
|
124
|
-
exports.OidcSessionManager = OidcSessionManager;
|
|
125
|
-
_a = OidcSessionManager, _OidcSessionManager_client = new WeakMap(), _OidcSessionManager_exchangeToken = async function _OidcSessionManager_exchangeToken(env, oidcToken, orgId, scopes) {
|
|
126
|
-
const client = (0, openapi_fetch_1.default)({
|
|
127
|
-
baseUrl: env.SignerApiRoot,
|
|
128
|
-
headers: {
|
|
129
|
-
Authorization: oidcToken,
|
|
130
|
-
},
|
|
131
|
-
});
|
|
132
|
-
const resp = await client.post("/v0/org/{org_id}/oidc", {
|
|
133
|
-
params: { path: { org_id: orgId } },
|
|
134
|
-
body: {
|
|
135
|
-
scopes,
|
|
136
|
-
},
|
|
137
|
-
parseAs: "json",
|
|
138
|
-
});
|
|
139
|
-
const data = (0, util_1.assertOk)(resp);
|
|
140
|
-
return [data.token, new Date().getTime() / 1000 + OIDC_TOKEN_EXP_SECS];
|
|
141
|
-
};
|
|
142
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"oidc_session_manager.js","sourceRoot":"","sources":["../../../src/session/oidc_session_manager.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;AAEA,kCAAmC;AACnC,uDAAsD;AAEtD,kEAAyC;AAEzC,8DAA8D;AAC9D,MAAM,mBAAmB,GAAG,GAAG,CAAC;AAwBhC,iCAAiC;AACjC,MAAa,kBAAmB,SAAQ,mCAAkC;IAGxE;;;OAGG;IACH,KAAK,CAAC,KAAK;QACT,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,OAAO,OAAO,CAAC,KAAK,CAAC;IACvB,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,MAAM;QACV,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;QAC7B,OAAO,uBAAA,IAAI,kCAAQ,CAAC;IACtB,CAAC;IAED,2BAA2B;IAC3B,KAAK,CAAC,MAAM;QACV,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC;IAC7B,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,MAAM,CAAC,KAAK,EAAE,QAAQ,CAAC,GAAG,MAAM,uBAAA,kBAAkB,6CAAe,MAAjC,kBAAkB,EAChD,OAAO,CAAC,GAAG,EACX,OAAO,CAAC,UAAU,EAClB,OAAO,CAAC,MAAM,EACd,OAAO,CAAC,MAAM,CACf,CAAC;QACF,MAAM,IAAI,CAAC,OAAO,CAAC,IAAI,CAAkB;YACvC,GAAG,OAAO;YACV,KAAK,EAAE,KAAK;YACZ,SAAS,EAAE,QAAQ;SACpB,CAAC,CAAC;QACH,uBAAA,IAAI,8BAAW,IAAI,CAAC,YAAY,CAAC,KAAK,CAAC,MAAA,CAAC;IAC1C,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,OAAO,IAAI,CAAC,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC;IAC5C,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe;QACnB,IAAI,MAAM,IAAI,CAAC,OAAO,EAAE,EAAE;YACxB,MAAM,IAAI,CAAC,OAAO,EAAE,CAAC;YACrB,OAAO,IAAI,CAAC;SACb;QACD,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;;;;;OAQG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,GAAiB,EACjB,OAAwC,EACxC,SAAiB,EACjB,KAAa,EACb,MAAqB;QAErB,MAAM,CAAC,KAAK,EAAE,QAAQ,CAAC,GAAG,MAAM,uBAAA,kBAAkB,6CAAe,MAAjC,kBAAkB,EAChD,GAAG,EACH,SAAS,EACT,KAAK,EACL,MAAM,CACP,CAAC;QACF,MAAM,OAAO,CAAC,IAAI,CAAkB;YAClC,GAAG;YACH,MAAM,EAAE,KAAK;YACb,UAAU,EAAE,SAAS;YACrB,KAAK;YACL,SAAS,EAAE,QAAQ;YACnB,MAAM;SACP,CAAC,CAAC;QACH,OAAO,IAAI,kBAAkB,CAAC,GAAG,EAAE,KAAK,EAAE,KAAK,EAAE,OAAO,CAAC,CAAC;IAC5D,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,eAAe,CAAC,OAA2B;QACtD,MAAM,IAAI,GAAG,MAAM,OAAO,CAAC,QAAQ,EAAE,CAAC;QACtC,OAAO,IAAI,kBAAkB,CAAC,IAAI,CAAC,GAAG,EAAE,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IAC5E,CAAC;IAED;;;;;;;OAOG;IACH,YACE,GAAiB,EACjB,KAAa,EACb,KAAa,EACb,OAAwC;QAExC,KAAK,CAAC,GAAG,EAAE,KAAK,EAAE,OAAO,CAAC,CAAC;QA5H7B,6CAAgB;QA6Hd,uBAAA,IAAI,8BAAW,IAAI,CAAC,YAAY,CAAC,KAAK,CAAC,MAAA,CAAC;IAC1C,CAAC;CAgCF;AA/JD,gDA+JC;yGAtBQ,KAAK,4CACV,GAAiB,EACjB,SAAiB,EACjB,KAAa,EACb,MAAqB;IAErB,MAAM,MAAM,GAAG,IAAA,uBAAY,EAAQ;QACjC,OAAO,EAAE,GAAG,CAAC,aAAa;QAC1B,OAAO,EAAE;YACP,aAAa,EAAE,SAAS;SACzB;KACF,CAAC,CAAC;IACH,MAAM,IAAI,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,uBAAuB,EAAE;QACtD,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,KAAK,EAAE,EAAE;QACnC,IAAI,EAAE;YACJ,MAAM;SACP;QACD,OAAO,EAAE,MAAM;KAChB,CAAC,CAAC;IACH,MAAM,IAAI,GAAG,IAAA,eAAQ,EAAC,IAAI,CAAqB,CAAC;IAChD,OAAO,CAAC,IAAI,CAAC,KAAK,EAAE,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,GAAG,IAAI,GAAG,mBAAmB,CAAC,CAAC;AACzE,CAAC","sourcesContent":["import { paths, Client } from \"../client\";\nimport { EnvInterface } from \"..\";\nimport { assertOk } from \"../util\";\nimport { OrgSessionManager } from \"./session_manager\";\nimport { SessionStorage } from \"./session_storage\";\nimport createClient from \"openapi-fetch\";\n\n// An token obtained from an OIDC token is valid for 5 minutes\nconst OIDC_TOKEN_EXP_SECS = 300;\n\ntype OidcAuthResponse =\n  paths[\"/v0/org/{org_id}/oidc\"][\"post\"][\"responses\"][\"200\"][\"content\"][\"application/json\"];\n\n/** JSON representation of the OIDC token */\nexport interface OidcSessionData {\n  /** The environment that this token is for */\n  env: EnvInterface;\n  /** The organization ID */\n  org_id: string;\n  /** The OIDC token that this session was created from */\n  oidc_token: string;\n  /** The token to include in Authorization header */\n  token: string;\n  /** Token expiration timestamp */\n  token_exp: number;\n  /** The scopes of the token */\n  scopes: Array<string>;\n}\n\n/** Type of storage required for OIDC sessions */\nexport type OidcSessionStorage = SessionStorage<OidcSessionData>;\n\n/** Manager for OIDC sessions. */\nexport class OidcSessionManager extends OrgSessionManager<OidcSessionData> {\n  #client: Client;\n\n  /**\n   * @return {string} The current auth token.\n   * @internal\n   */\n  async token(): Promise<string> {\n    const session = await this.storage.retrieve();\n    return session.token;\n  }\n\n  /**\n   * Returns a client with the current session and refreshes the current\n   * session. May **UPDATE/MUTATE** self.\n   */\n  async client(): Promise<Client> {\n    await this.refreshIfNeeded();\n    return this.#client;\n  }\n\n  /** Revokes the session. */\n  async revoke(): Promise<void> {\n    this.unsupported(\"revoke\");\n  }\n\n  /**\n   * Refreshes the session and **UPDATES/MUTATES** self.\n   */\n  async refresh(): Promise<void> {\n    const session = await this.storage.retrieve();\n    const [token, tokenExp] = await OidcSessionManager.#exchangeToken(\n      session.env,\n      session.oidc_token,\n      session.org_id,\n      session.scopes,\n    );\n    await this.storage.save(<OidcSessionData>{\n      ...session,\n      token: token,\n      token_exp: tokenExp,\n    });\n    this.#client = this.createClient(token);\n  }\n\n  /**\n   * Returns whether it's time to refresh this token.\n   * @return {boolean} Whether it's time to refresh this token.\n   * @internal\n   */\n  async isStale(): Promise<boolean> {\n    const session = await this.storage.retrieve();\n    return this.hasExpired(session.token_exp);\n  }\n\n  /**\n   * Refreshes the session if it is about to expire.\n   * @return {boolean} Whether the session token was refreshed.\n   * @internal\n   */\n  async refreshIfNeeded(): Promise<boolean> {\n    if (await this.isStale()) {\n      await this.refresh();\n      return true;\n    }\n    return false;\n  }\n\n  /**\n   * Authenticate an OIDC user and create a new session for them.\n   * @param {EnvInterface} env The environment of the session\n   * @param {SessionStorage<SignerSessionObject>} storage The signer session storage\n   * @param {string} oidcToken The OIDC token\n   * @param {string} orgId The id of the organization that the user is in\n   * @param {List<string>} scopes The scopes of the resulting session\n   * @return {Promise<OidcSessionManager>} The signer session\n   */\n  static async create(\n    env: EnvInterface,\n    storage: SessionStorage<OidcSessionData>,\n    oidcToken: string,\n    orgId: string,\n    scopes: Array<string>,\n  ): Promise<OidcSessionManager> {\n    const [token, tokenExp] = await OidcSessionManager.#exchangeToken(\n      env,\n      oidcToken,\n      orgId,\n      scopes,\n    );\n    await storage.save(<OidcSessionData>{\n      env,\n      org_id: orgId,\n      oidc_token: oidcToken,\n      token,\n      token_exp: tokenExp,\n      scopes,\n    });\n    return new OidcSessionManager(env, orgId, token, storage);\n  }\n\n  /**\n   * Load from storage\n   * @param {OidcSessionStorage} storage The storage to load from\n   * @return {Promise<OidcSessionManager>} New OIDC session manager\n   */\n  static async loadFromStorage(storage: OidcSessionStorage): Promise<OidcSessionManager> {\n    const info = await storage.retrieve();\n    return new OidcSessionManager(info.env, info.org_id, info.token, storage);\n  }\n\n  /**\n   * Constructor.\n   * @param {EnvInterface} env The environment of the session\n   * @param {string} orgId The id of the org associated with this session\n   * @param {string} token The authorization token to use\n   * @param {SessionStorage<U>} storage The storage back end to use for storing\n   *                                    session information\n   */\n  private constructor(\n    env: EnvInterface,\n    orgId: string,\n    token: string,\n    storage: SessionStorage<OidcSessionData>,\n  ) {\n    super(env, orgId, storage);\n    this.#client = this.createClient(token);\n  }\n\n  /**\n   * Exchange an OIDC token for a CubeSigner session token.\n   * @param {EnvInterface} env The CubeSigner environment\n   * @param {string} oidcToken The OIDC token\n   * @param {string} orgId The id of the organization that the user is in\n   * @param {List<string>} scopes The scopes of the resulting session\n   * @return {Promise<[string, number]>} The session token and its expiration time\n   */\n  static async #exchangeToken(\n    env: EnvInterface,\n    oidcToken: string,\n    orgId: string,\n    scopes: Array<string>,\n  ): Promise<[string, number]> {\n    const client = createClient<paths>({\n      baseUrl: env.SignerApiRoot,\n      headers: {\n        Authorization: oidcToken,\n      },\n    });\n    const resp = await client.post(\"/v0/org/{org_id}/oidc\", {\n      params: { path: { org_id: orgId } },\n      body: {\n        scopes,\n      },\n      parseAs: \"json\",\n    });\n    const data = assertOk(resp) as OidcAuthResponse;\n    return [data.token, new Date().getTime() / 1000 + OIDC_TOKEN_EXP_SECS];\n  }\n}\n"]}
|
|
@@ -1,99 +0,0 @@
|
|
|
1
|
-
import { Events } from "../events";
|
|
2
|
-
import { EnvInterface } from "../env";
|
|
3
|
-
import { Client } from "../api";
|
|
4
|
-
import { SessionStorage } from "./session_storage";
|
|
5
|
-
/** Generic session manager interface. */
|
|
6
|
-
export declare abstract class SessionManager<U> {
|
|
7
|
-
#private;
|
|
8
|
-
readonly env: EnvInterface;
|
|
9
|
-
readonly storage: SessionStorage<U>;
|
|
10
|
-
readonly events: Events;
|
|
11
|
-
/**
|
|
12
|
-
* @return {string} The current auth token.
|
|
13
|
-
* @internal
|
|
14
|
-
*/
|
|
15
|
-
abstract token(): Promise<string>;
|
|
16
|
-
/** Returns a client instance that uses the token. */
|
|
17
|
-
abstract client(): Promise<Client>;
|
|
18
|
-
/** Revokes the session. */
|
|
19
|
-
abstract revoke(): Promise<void>;
|
|
20
|
-
/** Refreshes the session. */
|
|
21
|
-
abstract refresh(): Promise<void>;
|
|
22
|
-
/**
|
|
23
|
-
* Returns whether it's time to refresh this token.
|
|
24
|
-
* @return {boolean} Whether it's time to refresh this token.
|
|
25
|
-
* @internal
|
|
26
|
-
*/
|
|
27
|
-
abstract isStale(): Promise<boolean>;
|
|
28
|
-
/**
|
|
29
|
-
* Refreshes the session if it is about to expire.
|
|
30
|
-
* @return {boolean} Whether the session token was refreshed.
|
|
31
|
-
* @internal
|
|
32
|
-
*/
|
|
33
|
-
refreshIfNeeded(): Promise<boolean>;
|
|
34
|
-
/**
|
|
35
|
-
* Automatically refreshes the session in the background.
|
|
36
|
-
* The default implementation refreshes (if needed) every minute.
|
|
37
|
-
* Base implementations can, instead use the token expirations timestamps
|
|
38
|
-
* to refresh less often. This is a simple wrapper around `setInterval`.
|
|
39
|
-
* @return {number} The interval ID of the refresh timer.
|
|
40
|
-
*/
|
|
41
|
-
autoRefresh(): RefreshId;
|
|
42
|
-
/**
|
|
43
|
-
* Clears the auto refresh timer.
|
|
44
|
-
* @param {number} timer The timer ID to clear.
|
|
45
|
-
*/
|
|
46
|
-
clearAutoRefresh(timer: RefreshId): void;
|
|
47
|
-
/**
|
|
48
|
-
* Constructor.
|
|
49
|
-
* @param {EnvInterface} env The environment of the session
|
|
50
|
-
* @param {SessionStorage<U>} storage The storage back end to use for storing
|
|
51
|
-
* session information
|
|
52
|
-
*/
|
|
53
|
-
constructor(env: EnvInterface, storage: SessionStorage<U>);
|
|
54
|
-
/**
|
|
55
|
-
* Creates a new REST client with a given token
|
|
56
|
-
* @param {string} token The authorization token to use for the client
|
|
57
|
-
* @return {Client} The new REST client
|
|
58
|
-
*/
|
|
59
|
-
protected createClient(token: string): Client;
|
|
60
|
-
/**
|
|
61
|
-
* Check if a timestamp is within {@link bufferSeconds} seconds from expiration.
|
|
62
|
-
* @param {Date} exp The timestamp to check
|
|
63
|
-
* @param {number} bufferSeconds Time buffer in seconds (defaults to 0s)
|
|
64
|
-
* @return {boolean} True if the timestamp has expired
|
|
65
|
-
*/
|
|
66
|
-
protected static hasExpired(exp: Date, bufferSeconds?: number): boolean;
|
|
67
|
-
/**
|
|
68
|
-
* Check if a timestamp is stale, i.e., it's within {@link bufferSeconds} seconds from expiration.
|
|
69
|
-
* @param {Date} exp The timestamp to check
|
|
70
|
-
* @param {number} bufferSeconds Time buffer in seconds (defaults to 30s)
|
|
71
|
-
* @return {boolean} True if the timestamp is stale
|
|
72
|
-
*/
|
|
73
|
-
protected static isStale(exp: Date, bufferSeconds?: number): boolean;
|
|
74
|
-
/**
|
|
75
|
-
* Throws an error that says that some feature is unsupported.
|
|
76
|
-
* @param {string} name The name of the feature that is not supported
|
|
77
|
-
*/
|
|
78
|
-
protected unsupported(name: string): never;
|
|
79
|
-
}
|
|
80
|
-
/** Interface for a session manager that knows about the org that the session is in. */
|
|
81
|
-
export declare abstract class OrgSessionManager<U> extends SessionManager<U> {
|
|
82
|
-
readonly orgId: string;
|
|
83
|
-
/**
|
|
84
|
-
* Constructor.
|
|
85
|
-
* @param {EnvInterface} env The environment of the session
|
|
86
|
-
* @param {string} orgId The id of the org associated with this session
|
|
87
|
-
* @param {SessionStorage<U>} storage The storage back end to use for storing
|
|
88
|
-
* session information
|
|
89
|
-
*/
|
|
90
|
-
constructor(env: EnvInterface, orgId: string, storage: SessionStorage<U>);
|
|
91
|
-
}
|
|
92
|
-
export interface HasEnv {
|
|
93
|
-
/** The environment */
|
|
94
|
-
env: {
|
|
95
|
-
["Dev-CubeSignerStack"]: EnvInterface;
|
|
96
|
-
};
|
|
97
|
-
}
|
|
98
|
-
/** Type of the refresh timer ID. */
|
|
99
|
-
export type RefreshId = ReturnType<typeof setInterval>;
|
|
@@ -1,136 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
3
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
4
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
5
|
-
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
6
|
-
};
|
|
7
|
-
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
8
|
-
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
9
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
10
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
11
|
-
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
12
|
-
};
|
|
13
|
-
var _SessionManager_refreshing;
|
|
14
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
-
exports.OrgSessionManager = exports.SessionManager = void 0;
|
|
16
|
-
const events_1 = require("../events");
|
|
17
|
-
const api_1 = require("../api");
|
|
18
|
-
const util_1 = require("../util");
|
|
19
|
-
const DEFAULT_EXPIRATION_BUFFER_SECS = 30;
|
|
20
|
-
/** Generic session manager interface. */
|
|
21
|
-
class SessionManager {
|
|
22
|
-
/**
|
|
23
|
-
* Refreshes the session if it is about to expire.
|
|
24
|
-
* @return {boolean} Whether the session token was refreshed.
|
|
25
|
-
* @internal
|
|
26
|
-
*/
|
|
27
|
-
async refreshIfNeeded() {
|
|
28
|
-
if (await this.isStale()) {
|
|
29
|
-
if (__classPrivateFieldGet(this, _SessionManager_refreshing, "f")) {
|
|
30
|
-
// wait until done refreshing
|
|
31
|
-
while (__classPrivateFieldGet(this, _SessionManager_refreshing, "f")) {
|
|
32
|
-
await (0, util_1.delay)(100);
|
|
33
|
-
}
|
|
34
|
-
return false;
|
|
35
|
-
}
|
|
36
|
-
else {
|
|
37
|
-
// refresh
|
|
38
|
-
__classPrivateFieldSet(this, _SessionManager_refreshing, true, "f");
|
|
39
|
-
try {
|
|
40
|
-
await this.refresh();
|
|
41
|
-
return true;
|
|
42
|
-
}
|
|
43
|
-
finally {
|
|
44
|
-
__classPrivateFieldSet(this, _SessionManager_refreshing, false, "f");
|
|
45
|
-
}
|
|
46
|
-
}
|
|
47
|
-
}
|
|
48
|
-
return false;
|
|
49
|
-
}
|
|
50
|
-
/**
|
|
51
|
-
* Automatically refreshes the session in the background.
|
|
52
|
-
* The default implementation refreshes (if needed) every minute.
|
|
53
|
-
* Base implementations can, instead use the token expirations timestamps
|
|
54
|
-
* to refresh less often. This is a simple wrapper around `setInterval`.
|
|
55
|
-
* @return {number} The interval ID of the refresh timer.
|
|
56
|
-
*/
|
|
57
|
-
autoRefresh() {
|
|
58
|
-
return setInterval(async () => {
|
|
59
|
-
await this.refreshIfNeeded();
|
|
60
|
-
}, 60 * 1000);
|
|
61
|
-
}
|
|
62
|
-
/**
|
|
63
|
-
* Clears the auto refresh timer.
|
|
64
|
-
* @param {number} timer The timer ID to clear.
|
|
65
|
-
*/
|
|
66
|
-
clearAutoRefresh(timer) {
|
|
67
|
-
clearInterval(timer);
|
|
68
|
-
}
|
|
69
|
-
/**
|
|
70
|
-
* Constructor.
|
|
71
|
-
* @param {EnvInterface} env The environment of the session
|
|
72
|
-
* @param {SessionStorage<U>} storage The storage back end to use for storing
|
|
73
|
-
* session information
|
|
74
|
-
*/
|
|
75
|
-
constructor(env, storage) {
|
|
76
|
-
this.events = new events_1.Events();
|
|
77
|
-
_SessionManager_refreshing.set(this, false);
|
|
78
|
-
this.env = env;
|
|
79
|
-
this.storage = storage;
|
|
80
|
-
}
|
|
81
|
-
/**
|
|
82
|
-
* Creates a new REST client with a given token
|
|
83
|
-
* @param {string} token The authorization token to use for the client
|
|
84
|
-
* @return {Client} The new REST client
|
|
85
|
-
*/
|
|
86
|
-
createClient(token) {
|
|
87
|
-
return (0, api_1.createHttpClient)(this.env.SignerApiRoot, token);
|
|
88
|
-
}
|
|
89
|
-
/**
|
|
90
|
-
* Check if a timestamp is within {@link bufferSeconds} seconds from expiration.
|
|
91
|
-
* @param {Date} exp The timestamp to check
|
|
92
|
-
* @param {number} bufferSeconds Time buffer in seconds (defaults to 0s)
|
|
93
|
-
* @return {boolean} True if the timestamp has expired
|
|
94
|
-
*/
|
|
95
|
-
static hasExpired(exp, bufferSeconds) {
|
|
96
|
-
bufferSeconds ??= 0;
|
|
97
|
-
const expMsSinceEpoch = exp.getTime();
|
|
98
|
-
const nowMsSinceEpoch = new Date().getTime();
|
|
99
|
-
const bufferMs = bufferSeconds * 1000;
|
|
100
|
-
return expMsSinceEpoch < nowMsSinceEpoch + bufferMs;
|
|
101
|
-
}
|
|
102
|
-
/**
|
|
103
|
-
* Check if a timestamp is stale, i.e., it's within {@link bufferSeconds} seconds from expiration.
|
|
104
|
-
* @param {Date} exp The timestamp to check
|
|
105
|
-
* @param {number} bufferSeconds Time buffer in seconds (defaults to 30s)
|
|
106
|
-
* @return {boolean} True if the timestamp is stale
|
|
107
|
-
*/
|
|
108
|
-
static isStale(exp, bufferSeconds) {
|
|
109
|
-
return this.hasExpired(exp, bufferSeconds ?? DEFAULT_EXPIRATION_BUFFER_SECS);
|
|
110
|
-
}
|
|
111
|
-
/**
|
|
112
|
-
* Throws an error that says that some feature is unsupported.
|
|
113
|
-
* @param {string} name The name of the feature that is not supported
|
|
114
|
-
*/
|
|
115
|
-
unsupported(name) {
|
|
116
|
-
throw new Error(`'${name}' not supported`);
|
|
117
|
-
}
|
|
118
|
-
}
|
|
119
|
-
exports.SessionManager = SessionManager;
|
|
120
|
-
_SessionManager_refreshing = new WeakMap();
|
|
121
|
-
/** Interface for a session manager that knows about the org that the session is in. */
|
|
122
|
-
class OrgSessionManager extends SessionManager {
|
|
123
|
-
/**
|
|
124
|
-
* Constructor.
|
|
125
|
-
* @param {EnvInterface} env The environment of the session
|
|
126
|
-
* @param {string} orgId The id of the org associated with this session
|
|
127
|
-
* @param {SessionStorage<U>} storage The storage back end to use for storing
|
|
128
|
-
* session information
|
|
129
|
-
*/
|
|
130
|
-
constructor(env, orgId, storage) {
|
|
131
|
-
super(env, storage);
|
|
132
|
-
this.orgId = orgId;
|
|
133
|
-
}
|
|
134
|
-
}
|
|
135
|
-
exports.OrgSessionManager = OrgSessionManager;
|
|
136
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"session_manager.js","sourceRoot":"","sources":["../../../src/session/session_manager.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,sCAAmC;AAEnC,gCAAkD;AAElD,kCAAgC;AAEhC,MAAM,8BAA8B,GAAG,EAAE,CAAC;AAE1C,yCAAyC;AACzC,MAAsB,cAAc;IA4BlC;;;;OAIG;IACH,KAAK,CAAC,eAAe;QACnB,IAAI,MAAM,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC;YACzB,IAAI,uBAAA,IAAI,kCAAY,EAAE,CAAC;gBACrB,6BAA6B;gBAC7B,OAAO,uBAAA,IAAI,kCAAY,EAAE,CAAC;oBACxB,MAAM,IAAA,YAAK,EAAC,GAAG,CAAC,CAAC;gBACnB,CAAC;gBACD,OAAO,KAAK,CAAC;YACf,CAAC;iBAAM,CAAC;gBACN,UAAU;gBACV,uBAAA,IAAI,8BAAe,IAAI,MAAA,CAAC;gBACxB,IAAI,CAAC;oBACH,MAAM,IAAI,CAAC,OAAO,EAAE,CAAC;oBACrB,OAAO,IAAI,CAAC;gBACd,CAAC;wBAAS,CAAC;oBACT,uBAAA,IAAI,8BAAe,KAAK,MAAA,CAAC;gBAC3B,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;;;OAMG;IACH,WAAW;QACT,OAAO,WAAW,CAAC,KAAK,IAAI,EAAE;YAC5B,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;QAC/B,CAAC,EAAE,EAAE,GAAG,IAAI,CAAC,CAAC;IAChB,CAAC;IAED;;;OAGG;IACH,gBAAgB,CAAC,KAAgB;QAC/B,aAAa,CAAC,KAAK,CAAC,CAAC;IACvB,CAAC;IAED;;;;;OAKG;IACH,YAAY,GAAiB,EAAE,OAA0B;QAhFhD,WAAM,GAAG,IAAI,eAAM,EAAE,CAAC;QAC/B,qCAAuB,KAAK,EAAC;QAgF3B,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;QACf,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;IACzB,CAAC;IAED;;;;OAIG;IACO,YAAY,CAAC,KAAa;QAClC,OAAO,IAAA,sBAAgB,EAAC,IAAI,CAAC,GAAG,CAAC,aAAa,EAAE,KAAK,CAAC,CAAC;IACzD,CAAC;IAED;;;;;OAKG;IACO,MAAM,CAAC,UAAU,CAAC,GAAS,EAAE,aAAsB;QAC3D,aAAa,KAAK,CAAC,CAAC;QACpB,MAAM,eAAe,GAAG,GAAG,CAAC,OAAO,EAAE,CAAC;QACtC,MAAM,eAAe,GAAG,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,CAAC;QAC7C,MAAM,QAAQ,GAAG,aAAa,GAAG,IAAI,CAAC;QACtC,OAAO,eAAe,GAAG,eAAe,GAAG,QAAQ,CAAC;IACtD,CAAC;IAED;;;;;OAKG;IACO,MAAM,CAAC,OAAO,CAAC,GAAS,EAAE,aAAsB;QACxD,OAAO,IAAI,CAAC,UAAU,CAAC,GAAG,EAAE,aAAa,IAAI,8BAA8B,CAAC,CAAC;IAC/E,CAAC;IAED;;;OAGG;IACO,WAAW,CAAC,IAAY;QAChC,MAAM,IAAI,KAAK,CAAC,IAAI,IAAI,iBAAiB,CAAC,CAAC;IAC7C,CAAC;CACF;AAhID,wCAgIC;;AAED,uFAAuF;AACvF,MAAsB,iBAAqB,SAAQ,cAAiB;IAGlE;;;;;;OAMG;IACH,YAAY,GAAiB,EAAE,KAAa,EAAE,OAA0B;QACtE,KAAK,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;QACpB,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;IACrB,CAAC;CACF;AAdD,8CAcC","sourcesContent":["import { Events } from \"../events\";\nimport { EnvInterface } from \"../env\";\nimport { Client, createHttpClient } from \"../api\";\nimport { SessionStorage } from \"./session_storage\";\nimport { delay } from \"../util\";\n\nconst DEFAULT_EXPIRATION_BUFFER_SECS = 30;\n\n/** Generic session manager interface. */\nexport abstract class SessionManager<U> {\n  readonly env: EnvInterface;\n  readonly storage: SessionStorage<U>;\n  readonly events = new Events();\n  #refreshing: boolean = false;\n\n  /**\n   * @return {string} The current auth token.\n   * @internal\n   */\n  abstract token(): Promise<string>;\n\n  /** Returns a client instance that uses the token. */\n  abstract client(): Promise<Client>;\n\n  /** Revokes the session. */\n  abstract revoke(): Promise<void>;\n\n  /** Refreshes the session. */\n  abstract refresh(): Promise<void>;\n\n  /**\n   * Returns whether it's time to refresh this token.\n   * @return {boolean} Whether it's time to refresh this token.\n   * @internal\n   */\n  abstract isStale(): Promise<boolean>;\n\n  /**\n   * Refreshes the session if it is about to expire.\n   * @return {boolean} Whether the session token was refreshed.\n   * @internal\n   */\n  async refreshIfNeeded(): Promise<boolean> {\n    if (await this.isStale()) {\n      if (this.#refreshing) {\n        // wait until done refreshing\n        while (this.#refreshing) {\n          await delay(100);\n        }\n        return false;\n      } else {\n        // refresh\n        this.#refreshing = true;\n        try {\n          await this.refresh();\n          return true;\n        } finally {\n          this.#refreshing = false;\n        }\n      }\n    }\n\n    return false;\n  }\n\n  /**\n   * Automatically refreshes the session in the background.\n   * The default implementation refreshes (if needed) every minute.\n   * Base implementations can, instead use the token expirations timestamps\n   * to refresh less often. This is a simple wrapper around `setInterval`.\n   * @return {number} The interval ID of the refresh timer.\n   */\n  autoRefresh(): RefreshId {\n    return setInterval(async () => {\n      await this.refreshIfNeeded();\n    }, 60 * 1000);\n  }\n\n  /**\n   * Clears the auto refresh timer.\n   * @param {number} timer The timer ID to clear.\n   */\n  clearAutoRefresh(timer: RefreshId): void {\n    clearInterval(timer);\n  }\n\n  /**\n   * Constructor.\n   * @param {EnvInterface} env The environment of the session\n   * @param {SessionStorage<U>} storage The storage back end to use for storing\n   *                                    session information\n   */\n  constructor(env: EnvInterface, storage: SessionStorage<U>) {\n    this.env = env;\n    this.storage = storage;\n  }\n\n  /**\n   * Creates a new REST client with a given token\n   * @param {string} token The authorization token to use for the client\n   * @return {Client} The new REST client\n   */\n  protected createClient(token: string): Client {\n    return createHttpClient(this.env.SignerApiRoot, token);\n  }\n\n  /**\n   * Check if a timestamp is within {@link bufferSeconds} seconds from expiration.\n   * @param {Date} exp The timestamp to check\n   * @param {number} bufferSeconds Time buffer in seconds (defaults to 0s)\n   * @return {boolean} True if the timestamp has expired\n   */\n  protected static hasExpired(exp: Date, bufferSeconds?: number): boolean {\n    bufferSeconds ??= 0;\n    const expMsSinceEpoch = exp.getTime();\n    const nowMsSinceEpoch = new Date().getTime();\n    const bufferMs = bufferSeconds * 1000;\n    return expMsSinceEpoch < nowMsSinceEpoch + bufferMs;\n  }\n\n  /**\n   * Check if a timestamp is stale, i.e., it's within {@link bufferSeconds} seconds from expiration.\n   * @param {Date} exp The timestamp to check\n   * @param {number} bufferSeconds Time buffer in seconds (defaults to 30s)\n   * @return {boolean} True if the timestamp is stale\n   */\n  protected static isStale(exp: Date, bufferSeconds?: number): boolean {\n    return this.hasExpired(exp, bufferSeconds ?? DEFAULT_EXPIRATION_BUFFER_SECS);\n  }\n\n  /**\n   * Throws an error that says that some feature is unsupported.\n   * @param {string} name The name of the feature that is not supported\n   */\n  protected unsupported(name: string): never {\n    throw new Error(`'${name}' not supported`);\n  }\n}\n\n/** Interface for a session manager that knows about the org that the session is in. */\nexport abstract class OrgSessionManager<U> extends SessionManager<U> {\n  readonly orgId: string;\n\n  /**\n   * Constructor.\n   * @param {EnvInterface} env The environment of the session\n   * @param {string} orgId The id of the org associated with this session\n   * @param {SessionStorage<U>} storage The storage back end to use for storing\n   *                                    session information\n   */\n  constructor(env: EnvInterface, orgId: string, storage: SessionStorage<U>) {\n    super(env, storage);\n    this.orgId = orgId;\n  }\n}\n\nexport interface HasEnv {\n  /** The environment */\n  env: {\n    [\"Dev-CubeSignerStack\"]: EnvInterface;\n  };\n}\n\n/** Type of the refresh timer ID. */\nexport type RefreshId = ReturnType<typeof setInterval>;\n"]}
|
package/dist/src/sign.d.ts
DELETED
|
@@ -1,114 +0,0 @@
|
|
|
1
|
-
import { CubeSigner, Key, SignerSession } from ".";
|
|
2
|
-
import { components, paths } from "./client";
|
|
3
|
-
export type Eth1SignRequest = paths["/v1/org/{org_id}/eth1/sign/{pubkey}"]["post"]["requestBody"]["content"]["application/json"];
|
|
4
|
-
export type Eth2SignRequest = paths["/v1/org/{org_id}/eth2/sign/{pubkey}"]["post"]["requestBody"]["content"]["application/json"];
|
|
5
|
-
export type Eth2StakeRequest = paths["/v1/org/{org_id}/eth2/stake"]["post"]["requestBody"]["content"]["application/json"];
|
|
6
|
-
export type Eth2UnstakeRequest = paths["/v1/org/{org_id}/eth2/unstake/{pubkey}"]["post"]["requestBody"]["content"]["application/json"];
|
|
7
|
-
export type BlobSignRequest = paths["/v1/org/{org_id}/blob/sign/{key_id}"]["post"]["requestBody"]["content"]["application/json"];
|
|
8
|
-
export type BtcSignRequest = paths["/v0/org/{org_id}/btc/sign/{pubkey}"]["post"]["requestBody"]["content"]["application/json"];
|
|
9
|
-
export type SolanaSignRequest = paths["/v1/org/{org_id}/solana/sign/{pubkey}"]["post"]["requestBody"]["content"]["application/json"];
|
|
10
|
-
export type Eth1SignResponse = components["responses"]["Eth1SignResponse"]["content"]["application/json"];
|
|
11
|
-
export type Eth2SignResponse = components["responses"]["Eth2SignResponse"]["content"]["application/json"];
|
|
12
|
-
export type Eth2StakeResponse = components["responses"]["StakeResponse"]["content"]["application/json"];
|
|
13
|
-
export type Eth2UnstakeResponse = components["responses"]["UnstakeResponse"]["content"]["application/json"];
|
|
14
|
-
export type BlobSignResponse = components["responses"]["BlobSignResponse"]["content"]["application/json"];
|
|
15
|
-
export type BtcSignResponse = components["responses"]["BtcSignResponse"]["content"]["application/json"];
|
|
16
|
-
export type SolanaSignResponse = components["responses"]["SolanaSignResponse"]["content"]["application/json"];
|
|
17
|
-
export type MfaRequestInfo = components["responses"]["MfaRequestInfo"]["content"]["application/json"];
|
|
18
|
-
export type AcceptedResponse = components["schemas"]["AcceptedResponse"];
|
|
19
|
-
export type ErrorResponse = components["schemas"]["ErrorResponse"];
|
|
20
|
-
export type BtcSignatureKind = components["schemas"]["BtcSignatureKind"];
|
|
21
|
-
type SignFn<U> = (headers?: HeadersInit) => Promise<U | AcceptedResponse>;
|
|
22
|
-
/**
|
|
23
|
-
* A response of a signing request.
|
|
24
|
-
*/
|
|
25
|
-
export declare class SignResponse<U> {
|
|
26
|
-
#private;
|
|
27
|
-
/** @return {boolean} True if this signing request requires an MFA approval */
|
|
28
|
-
requiresMfa(): boolean;
|
|
29
|
-
/** @return {U} The signed data */
|
|
30
|
-
data(): U;
|
|
31
|
-
/**
|
|
32
|
-
* Approves the MFA request.
|
|
33
|
-
*
|
|
34
|
-
* Note: This only works for MFA requests that require a single approval.
|
|
35
|
-
*
|
|
36
|
-
* @return {SignResponse<U>} The result of signing with the approval
|
|
37
|
-
*/
|
|
38
|
-
approve(): Promise<SignResponse<U>>;
|
|
39
|
-
/**
|
|
40
|
-
* Constructor.
|
|
41
|
-
*
|
|
42
|
-
* @param {CubeSigner} cs The CubeSigner instance to use for requests
|
|
43
|
-
* @param {string} orgId The org id of the corresponding signing request
|
|
44
|
-
* @param {string} roleId The role id of the corresponding signing request
|
|
45
|
-
* @param {SignFn} signFn The signing function that this response is from.
|
|
46
|
-
* This argument is used to resend requests with
|
|
47
|
-
* different headers if needed.
|
|
48
|
-
* @param {U | AcceptedResponse} resp The response as returned by the OpenAPI
|
|
49
|
-
* client.
|
|
50
|
-
*/
|
|
51
|
-
constructor(cs: CubeSigner, orgId: string, roleId: string, signFn: SignFn<U>, resp: U | AcceptedResponse);
|
|
52
|
-
}
|
|
53
|
-
/**
|
|
54
|
-
* Wrapper around sign operations.
|
|
55
|
-
*/
|
|
56
|
-
export declare class Sign {
|
|
57
|
-
#private;
|
|
58
|
-
/**
|
|
59
|
-
* Submit an 'eth1' sign request.
|
|
60
|
-
* @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
|
|
61
|
-
* @param {Eth1SignRequest} req What to sign.
|
|
62
|
-
* @return {Promise<Eth1SignResponse | AcceptedResponse>} Signature
|
|
63
|
-
*/
|
|
64
|
-
eth1(key: Key | string, req: Eth1SignRequest): Promise<SignResponse<Eth1SignResponse>>;
|
|
65
|
-
/**
|
|
66
|
-
* Submit an 'eth2' sign request.
|
|
67
|
-
* @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
|
|
68
|
-
* @param {Eth2SignRequest} req What to sign.
|
|
69
|
-
* @return {Promise<Eth2SignResponse | AcceptedResponse>} Signature
|
|
70
|
-
*/
|
|
71
|
-
eth2(key: Key | string, req: Eth2SignRequest): Promise<SignResponse<Eth2SignResponse>>;
|
|
72
|
-
/**
|
|
73
|
-
* Sign a stake request.
|
|
74
|
-
* @param {Eth2StakeRequest} req The request to sign.
|
|
75
|
-
* @return {Promise<Eth2StakeResponse | AcceptedResponse>} The response.
|
|
76
|
-
*/
|
|
77
|
-
stake(req: Eth2StakeRequest): Promise<SignResponse<Eth2StakeResponse>>;
|
|
78
|
-
/**
|
|
79
|
-
* Sign an unstake request.
|
|
80
|
-
* @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
|
|
81
|
-
* @param {Eth2UnstakeRequest} req The request to sign.
|
|
82
|
-
* @return {Promise<Eth2UnstakeResponse | AcceptedResponse>} The response.
|
|
83
|
-
*/
|
|
84
|
-
unstake(key: Key | string, req: Eth2UnstakeRequest): Promise<SignResponse<Eth2UnstakeResponse>>;
|
|
85
|
-
/**
|
|
86
|
-
* Sign a raw blob.
|
|
87
|
-
* @param {Key | string} key The key to sign with (either {@link Key} or its ID).
|
|
88
|
-
* @param {BlobSignRequest} req What to sign
|
|
89
|
-
* @return {Promise<BlobSignResponse | AcceptedResponse>} The response.
|
|
90
|
-
*/
|
|
91
|
-
blob(key: Key | string, req: BlobSignRequest): Promise<SignResponse<BlobSignResponse>>;
|
|
92
|
-
/**
|
|
93
|
-
* Sign a bitcoin message.
|
|
94
|
-
* @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
|
|
95
|
-
* @param {BtcSignRequest} req What to sign
|
|
96
|
-
* @return {Promise<BtcSignResponse | AcceptedResponse>} The response.
|
|
97
|
-
*/
|
|
98
|
-
btc(key: Key | string, req: BtcSignRequest): Promise<SignResponse<BtcSignResponse>>;
|
|
99
|
-
/**
|
|
100
|
-
* Sign a solana message.
|
|
101
|
-
* @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
|
|
102
|
-
* @param {SolanaSignRequest} req What to sign
|
|
103
|
-
* @return {Promise<SolanaSignResponse | AcceptedResponse>} The response.
|
|
104
|
-
*/
|
|
105
|
-
solana(key: Key | string, req: SolanaSignRequest): Promise<SignResponse<SolanaSignResponse>>;
|
|
106
|
-
/**
|
|
107
|
-
* Constructor.
|
|
108
|
-
*
|
|
109
|
-
* @param {string} orgId Organization ID
|
|
110
|
-
* @param {SignerSession} ss The signer session to use for signing requests
|
|
111
|
-
*/
|
|
112
|
-
constructor(orgId: string, ss: SignerSession);
|
|
113
|
-
}
|
|
114
|
-
export {};
|