@cubist-labs/cubesigner-sdk 0.2.24 → 0.3.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (147) hide show
  1. package/README.md +30 -28
  2. package/dist/cjs/package.json +41 -0
  3. package/dist/cjs/spec/env/beta.json +9 -0
  4. package/dist/cjs/spec/env/gamma.json +9 -0
  5. package/dist/cjs/spec/env/prod.json +9 -0
  6. package/dist/cjs/src/api.d.ts +634 -0
  7. package/dist/cjs/src/api.js +1309 -0
  8. package/dist/cjs/src/client.d.ts +575 -0
  9. package/dist/cjs/src/client.js +378 -0
  10. package/dist/cjs/src/env.d.ts +15 -0
  11. package/dist/cjs/src/env.js +35 -0
  12. package/dist/cjs/src/error.d.ts +29 -0
  13. package/dist/cjs/src/error.js +36 -0
  14. package/dist/cjs/src/events.d.ts +84 -0
  15. package/dist/cjs/src/events.js +195 -0
  16. package/dist/cjs/src/index.d.ts +203 -0
  17. package/dist/cjs/src/index.js +298 -0
  18. package/dist/cjs/src/key.d.ts +152 -0
  19. package/dist/cjs/src/key.js +242 -0
  20. package/dist/{src/fido.d.ts → cjs/src/mfa.d.ts} +33 -15
  21. package/dist/cjs/src/mfa.js +169 -0
  22. package/dist/cjs/src/org.d.ts +99 -0
  23. package/dist/cjs/src/org.js +95 -0
  24. package/dist/cjs/src/paginator.d.ts +76 -0
  25. package/dist/cjs/src/paginator.js +99 -0
  26. package/dist/cjs/src/response.d.ts +101 -0
  27. package/dist/cjs/src/response.js +164 -0
  28. package/dist/cjs/src/role.d.ts +283 -0
  29. package/dist/cjs/src/role.js +253 -0
  30. package/dist/cjs/src/schema.d.ts +6209 -0
  31. package/dist/cjs/src/schema.js +7 -0
  32. package/dist/cjs/src/schema_types.d.ts +113 -0
  33. package/dist/cjs/src/schema_types.js +3 -0
  34. package/dist/cjs/src/session/session_storage.d.ts +27 -0
  35. package/dist/cjs/src/session/session_storage.js +47 -0
  36. package/dist/cjs/src/session/signer_session_manager.d.ts +125 -0
  37. package/dist/cjs/src/session/signer_session_manager.js +239 -0
  38. package/dist/cjs/src/signer_session.d.ts +41 -0
  39. package/dist/cjs/src/signer_session.js +77 -0
  40. package/dist/cjs/src/user_export.d.ts +52 -0
  41. package/dist/cjs/src/user_export.js +129 -0
  42. package/dist/cjs/src/util.d.ts +56 -0
  43. package/dist/cjs/src/util.js +86 -0
  44. package/dist/esm/package.json +41 -0
  45. package/dist/esm/spec/env/beta.json +9 -0
  46. package/dist/esm/spec/env/gamma.json +9 -0
  47. package/dist/esm/spec/env/prod.json +9 -0
  48. package/dist/esm/src/api.d.ts +634 -0
  49. package/dist/esm/src/api.js +1299 -0
  50. package/dist/esm/src/client.d.ts +575 -0
  51. package/dist/esm/src/client.js +374 -0
  52. package/dist/esm/src/env.d.ts +15 -0
  53. package/dist/esm/src/env.js +9 -0
  54. package/dist/esm/src/error.d.ts +29 -0
  55. package/dist/esm/src/error.js +31 -0
  56. package/dist/esm/src/events.d.ts +84 -0
  57. package/dist/esm/src/events.js +189 -0
  58. package/dist/esm/src/index.d.ts +203 -0
  59. package/dist/esm/src/index.js +276 -0
  60. package/dist/esm/src/key.d.ts +152 -0
  61. package/dist/esm/src/key.js +236 -0
  62. package/dist/esm/src/mfa.d.ts +94 -0
  63. package/dist/esm/src/mfa.js +163 -0
  64. package/dist/esm/src/org.d.ts +99 -0
  65. package/dist/esm/src/org.js +91 -0
  66. package/dist/esm/src/paginator.d.ts +76 -0
  67. package/dist/esm/src/paginator.js +94 -0
  68. package/dist/esm/src/response.d.ts +101 -0
  69. package/dist/esm/src/response.js +159 -0
  70. package/dist/esm/src/role.d.ts +283 -0
  71. package/dist/esm/src/role.js +248 -0
  72. package/dist/esm/src/schema.d.ts +6209 -0
  73. package/dist/esm/src/schema.js +6 -0
  74. package/dist/esm/src/schema_types.d.ts +113 -0
  75. package/dist/esm/src/schema_types.js +2 -0
  76. package/dist/esm/src/session/session_storage.d.ts +27 -0
  77. package/dist/esm/src/session/session_storage.js +43 -0
  78. package/dist/esm/src/session/signer_session_manager.d.ts +125 -0
  79. package/dist/esm/src/session/signer_session_manager.js +235 -0
  80. package/dist/esm/src/signer_session.d.ts +41 -0
  81. package/dist/esm/src/signer_session.js +72 -0
  82. package/dist/esm/src/user_export.d.ts +52 -0
  83. package/dist/esm/src/user_export.js +99 -0
  84. package/dist/esm/src/util.d.ts +56 -0
  85. package/dist/esm/src/util.js +76 -0
  86. package/dist/package.json +13 -45
  87. package/dist/src/api.d.ts +29 -18
  88. package/dist/src/api.js +70 -17
  89. package/dist/src/client.d.ts +35 -14
  90. package/dist/src/client.js +12 -8
  91. package/dist/src/error.d.ts +29 -0
  92. package/dist/src/error.js +36 -0
  93. package/dist/src/events.d.ts +1 -1
  94. package/dist/src/events.js +1 -1
  95. package/dist/src/index.d.ts +8 -11
  96. package/dist/src/index.js +11 -25
  97. package/dist/src/key.d.ts +18 -7
  98. package/dist/src/key.js +52 -19
  99. package/dist/src/role.d.ts +46 -3
  100. package/dist/src/role.js +60 -8
  101. package/dist/src/schema.d.ts +206 -72
  102. package/dist/src/schema.js +1 -1
  103. package/dist/src/schema_types.d.ts +3 -0
  104. package/dist/src/schema_types.js +1 -1
  105. package/dist/src/session/signer_session_manager.d.ts +49 -13
  106. package/dist/src/session/signer_session_manager.js +104 -26
  107. package/dist/src/util.d.ts +14 -0
  108. package/dist/src/util.js +24 -27
  109. package/package.json +19 -46
  110. package/src/api.ts +81 -23
  111. package/src/client.ts +12 -8
  112. package/src/error.ts +42 -0
  113. package/src/events.ts +3 -1
  114. package/src/index.ts +12 -24
  115. package/src/key.ts +36 -18
  116. package/src/role.ts +78 -7
  117. package/src/schema.ts +269 -110
  118. package/src/schema_types.ts +3 -0
  119. package/src/session/session_storage.ts +0 -32
  120. package/src/session/signer_session_manager.ts +137 -28
  121. package/src/util.ts +19 -10
  122. package/tsconfig.json +1 -21
  123. package/LICENSE-APACHE +0 -177
  124. package/LICENSE-MIT +0 -25
  125. package/NOTICE +0 -13
  126. package/dist/examples/ethers.d.ts +0 -1
  127. package/dist/examples/ethers.js +0 -142
  128. package/dist/src/ethers/index.d.ts +0 -95
  129. package/dist/src/ethers/index.js +0 -208
  130. package/dist/src/fido.js +0 -148
  131. package/dist/src/session/cognito_manager.d.ts +0 -71
  132. package/dist/src/session/cognito_manager.js +0 -129
  133. package/dist/src/session/generic.d.ts +0 -47
  134. package/dist/src/session/generic.js +0 -3
  135. package/dist/src/session/management_session_manager.d.ts +0 -59
  136. package/dist/src/session/management_session_manager.js +0 -111
  137. package/dist/src/session/oidc_session_manager.d.ts +0 -78
  138. package/dist/src/session/oidc_session_manager.js +0 -142
  139. package/dist/src/session/session_manager.d.ts +0 -99
  140. package/dist/src/session/session_manager.js +0 -136
  141. package/dist/src/sign.d.ts +0 -114
  142. package/dist/src/sign.js +0 -248
  143. package/dist/test/sessions.d.ts +0 -35
  144. package/dist/test/sessions.js +0 -56
  145. package/src/ethers/index.ts +0 -249
  146. package/src/session/cognito_manager.ts +0 -161
  147. package/src/session/session_manager.ts +0 -165
@@ -1,78 +0,0 @@
1
- import { Client } from "../client";
2
- import { EnvInterface } from "..";
3
- import { OrgSessionManager } from "./session_manager";
4
- import { SessionStorage } from "./session_storage";
5
- /** JSON representation of the OIDC token */
6
- export interface OidcSessionData {
7
- /** The environment that this token is for */
8
- env: EnvInterface;
9
- /** The organization ID */
10
- org_id: string;
11
- /** The OIDC token that this session was created from */
12
- oidc_token: string;
13
- /** The token to include in Authorization header */
14
- token: string;
15
- /** Token expiration timestamp */
16
- token_exp: number;
17
- /** The scopes of the token */
18
- scopes: Array<string>;
19
- }
20
- /** Type of storage required for OIDC sessions */
21
- export type OidcSessionStorage = SessionStorage<OidcSessionData>;
22
- /** Manager for OIDC sessions. */
23
- export declare class OidcSessionManager extends OrgSessionManager<OidcSessionData> {
24
- #private;
25
- /**
26
- * @return {string} The current auth token.
27
- * @internal
28
- */
29
- token(): Promise<string>;
30
- /**
31
- * Returns a client with the current session and refreshes the current
32
- * session. May **UPDATE/MUTATE** self.
33
- */
34
- client(): Promise<Client>;
35
- /** Revokes the session. */
36
- revoke(): Promise<void>;
37
- /**
38
- * Refreshes the session and **UPDATES/MUTATES** self.
39
- */
40
- refresh(): Promise<void>;
41
- /**
42
- * Returns whether it's time to refresh this token.
43
- * @return {boolean} Whether it's time to refresh this token.
44
- * @internal
45
- */
46
- isStale(): Promise<boolean>;
47
- /**
48
- * Refreshes the session if it is about to expire.
49
- * @return {boolean} Whether the session token was refreshed.
50
- * @internal
51
- */
52
- refreshIfNeeded(): Promise<boolean>;
53
- /**
54
- * Authenticate an OIDC user and create a new session for them.
55
- * @param {EnvInterface} env The environment of the session
56
- * @param {SessionStorage<SignerSessionObject>} storage The signer session storage
57
- * @param {string} oidcToken The OIDC token
58
- * @param {string} orgId The id of the organization that the user is in
59
- * @param {List<string>} scopes The scopes of the resulting session
60
- * @return {Promise<OidcSessionManager>} The signer session
61
- */
62
- static create(env: EnvInterface, storage: SessionStorage<OidcSessionData>, oidcToken: string, orgId: string, scopes: Array<string>): Promise<OidcSessionManager>;
63
- /**
64
- * Load from storage
65
- * @param {OidcSessionStorage} storage The storage to load from
66
- * @return {Promise<OidcSessionManager>} New OIDC session manager
67
- */
68
- static loadFromStorage(storage: OidcSessionStorage): Promise<OidcSessionManager>;
69
- /**
70
- * Constructor.
71
- * @param {EnvInterface} env The environment of the session
72
- * @param {string} orgId The id of the org associated with this session
73
- * @param {string} token The authorization token to use
74
- * @param {SessionStorage<U>} storage The storage back end to use for storing
75
- * session information
76
- */
77
- private constructor();
78
- }
@@ -1,142 +0,0 @@
1
- "use strict";
2
- var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
3
- if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
4
- if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
5
- return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
6
- };
7
- var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
8
- if (kind === "m") throw new TypeError("Private method is not writable");
9
- if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
10
- if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
11
- return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
12
- };
13
- var __importDefault = (this && this.__importDefault) || function (mod) {
14
- return (mod && mod.__esModule) ? mod : { "default": mod };
15
- };
16
- var _a, _OidcSessionManager_client, _OidcSessionManager_exchangeToken;
17
- Object.defineProperty(exports, "__esModule", { value: true });
18
- exports.OidcSessionManager = void 0;
19
- const util_1 = require("../util");
20
- const session_manager_1 = require("./session_manager");
21
- const openapi_fetch_1 = __importDefault(require("openapi-fetch"));
22
- // An token obtained from an OIDC token is valid for 5 minutes
23
- const OIDC_TOKEN_EXP_SECS = 300;
24
- /** Manager for OIDC sessions. */
25
- class OidcSessionManager extends session_manager_1.OrgSessionManager {
26
- /**
27
- * @return {string} The current auth token.
28
- * @internal
29
- */
30
- async token() {
31
- const session = await this.storage.retrieve();
32
- return session.token;
33
- }
34
- /**
35
- * Returns a client with the current session and refreshes the current
36
- * session. May **UPDATE/MUTATE** self.
37
- */
38
- async client() {
39
- await this.refreshIfNeeded();
40
- return __classPrivateFieldGet(this, _OidcSessionManager_client, "f");
41
- }
42
- /** Revokes the session. */
43
- async revoke() {
44
- this.unsupported("revoke");
45
- }
46
- /**
47
- * Refreshes the session and **UPDATES/MUTATES** self.
48
- */
49
- async refresh() {
50
- const session = await this.storage.retrieve();
51
- const [token, tokenExp] = await __classPrivateFieldGet(OidcSessionManager, _a, "m", _OidcSessionManager_exchangeToken).call(OidcSessionManager, session.env, session.oidc_token, session.org_id, session.scopes);
52
- await this.storage.save({
53
- ...session,
54
- token: token,
55
- token_exp: tokenExp,
56
- });
57
- __classPrivateFieldSet(this, _OidcSessionManager_client, this.createClient(token), "f");
58
- }
59
- /**
60
- * Returns whether it's time to refresh this token.
61
- * @return {boolean} Whether it's time to refresh this token.
62
- * @internal
63
- */
64
- async isStale() {
65
- const session = await this.storage.retrieve();
66
- return this.hasExpired(session.token_exp);
67
- }
68
- /**
69
- * Refreshes the session if it is about to expire.
70
- * @return {boolean} Whether the session token was refreshed.
71
- * @internal
72
- */
73
- async refreshIfNeeded() {
74
- if (await this.isStale()) {
75
- await this.refresh();
76
- return true;
77
- }
78
- return false;
79
- }
80
- /**
81
- * Authenticate an OIDC user and create a new session for them.
82
- * @param {EnvInterface} env The environment of the session
83
- * @param {SessionStorage<SignerSessionObject>} storage The signer session storage
84
- * @param {string} oidcToken The OIDC token
85
- * @param {string} orgId The id of the organization that the user is in
86
- * @param {List<string>} scopes The scopes of the resulting session
87
- * @return {Promise<OidcSessionManager>} The signer session
88
- */
89
- static async create(env, storage, oidcToken, orgId, scopes) {
90
- const [token, tokenExp] = await __classPrivateFieldGet(OidcSessionManager, _a, "m", _OidcSessionManager_exchangeToken).call(OidcSessionManager, env, oidcToken, orgId, scopes);
91
- await storage.save({
92
- env,
93
- org_id: orgId,
94
- oidc_token: oidcToken,
95
- token,
96
- token_exp: tokenExp,
97
- scopes,
98
- });
99
- return new OidcSessionManager(env, orgId, token, storage);
100
- }
101
- /**
102
- * Load from storage
103
- * @param {OidcSessionStorage} storage The storage to load from
104
- * @return {Promise<OidcSessionManager>} New OIDC session manager
105
- */
106
- static async loadFromStorage(storage) {
107
- const info = await storage.retrieve();
108
- return new OidcSessionManager(info.env, info.org_id, info.token, storage);
109
- }
110
- /**
111
- * Constructor.
112
- * @param {EnvInterface} env The environment of the session
113
- * @param {string} orgId The id of the org associated with this session
114
- * @param {string} token The authorization token to use
115
- * @param {SessionStorage<U>} storage The storage back end to use for storing
116
- * session information
117
- */
118
- constructor(env, orgId, token, storage) {
119
- super(env, orgId, storage);
120
- _OidcSessionManager_client.set(this, void 0);
121
- __classPrivateFieldSet(this, _OidcSessionManager_client, this.createClient(token), "f");
122
- }
123
- }
124
- exports.OidcSessionManager = OidcSessionManager;
125
- _a = OidcSessionManager, _OidcSessionManager_client = new WeakMap(), _OidcSessionManager_exchangeToken = async function _OidcSessionManager_exchangeToken(env, oidcToken, orgId, scopes) {
126
- const client = (0, openapi_fetch_1.default)({
127
- baseUrl: env.SignerApiRoot,
128
- headers: {
129
- Authorization: oidcToken,
130
- },
131
- });
132
- const resp = await client.post("/v0/org/{org_id}/oidc", {
133
- params: { path: { org_id: orgId } },
134
- body: {
135
- scopes,
136
- },
137
- parseAs: "json",
138
- });
139
- const data = (0, util_1.assertOk)(resp);
140
- return [data.token, new Date().getTime() / 1000 + OIDC_TOKEN_EXP_SECS];
141
- };
142
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"oidc_session_manager.js","sourceRoot":"","sources":["../../../src/session/oidc_session_manager.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;AAEA,kCAAmC;AACnC,uDAAsD;AAEtD,kEAAyC;AAEzC,8DAA8D;AAC9D,MAAM,mBAAmB,GAAG,GAAG,CAAC;AAwBhC,iCAAiC;AACjC,MAAa,kBAAmB,SAAQ,mCAAkC;IAGxE;;;OAGG;IACH,KAAK,CAAC,KAAK;QACT,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,OAAO,OAAO,CAAC,KAAK,CAAC;IACvB,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,MAAM;QACV,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;QAC7B,OAAO,uBAAA,IAAI,kCAAQ,CAAC;IACtB,CAAC;IAED,2BAA2B;IAC3B,KAAK,CAAC,MAAM;QACV,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC;IAC7B,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,MAAM,CAAC,KAAK,EAAE,QAAQ,CAAC,GAAG,MAAM,uBAAA,kBAAkB,6CAAe,MAAjC,kBAAkB,EAChD,OAAO,CAAC,GAAG,EACX,OAAO,CAAC,UAAU,EAClB,OAAO,CAAC,MAAM,EACd,OAAO,CAAC,MAAM,CACf,CAAC;QACF,MAAM,IAAI,CAAC,OAAO,CAAC,IAAI,CAAkB;YACvC,GAAG,OAAO;YACV,KAAK,EAAE,KAAK;YACZ,SAAS,EAAE,QAAQ;SACpB,CAAC,CAAC;QACH,uBAAA,IAAI,8BAAW,IAAI,CAAC,YAAY,CAAC,KAAK,CAAC,MAAA,CAAC;IAC1C,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,OAAO,IAAI,CAAC,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC;IAC5C,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe;QACnB,IAAI,MAAM,IAAI,CAAC,OAAO,EAAE,EAAE;YACxB,MAAM,IAAI,CAAC,OAAO,EAAE,CAAC;YACrB,OAAO,IAAI,CAAC;SACb;QACD,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;;;;;OAQG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,GAAiB,EACjB,OAAwC,EACxC,SAAiB,EACjB,KAAa,EACb,MAAqB;QAErB,MAAM,CAAC,KAAK,EAAE,QAAQ,CAAC,GAAG,MAAM,uBAAA,kBAAkB,6CAAe,MAAjC,kBAAkB,EAChD,GAAG,EACH,SAAS,EACT,KAAK,EACL,MAAM,CACP,CAAC;QACF,MAAM,OAAO,CAAC,IAAI,CAAkB;YAClC,GAAG;YACH,MAAM,EAAE,KAAK;YACb,UAAU,EAAE,SAAS;YACrB,KAAK;YACL,SAAS,EAAE,QAAQ;YACnB,MAAM;SACP,CAAC,CAAC;QACH,OAAO,IAAI,kBAAkB,CAAC,GAAG,EAAE,KAAK,EAAE,KAAK,EAAE,OAAO,CAAC,CAAC;IAC5D,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,eAAe,CAAC,OAA2B;QACtD,MAAM,IAAI,GAAG,MAAM,OAAO,CAAC,QAAQ,EAAE,CAAC;QACtC,OAAO,IAAI,kBAAkB,CAAC,IAAI,CAAC,GAAG,EAAE,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IAC5E,CAAC;IAED;;;;;;;OAOG;IACH,YACE,GAAiB,EACjB,KAAa,EACb,KAAa,EACb,OAAwC;QAExC,KAAK,CAAC,GAAG,EAAE,KAAK,EAAE,OAAO,CAAC,CAAC;QA5H7B,6CAAgB;QA6Hd,uBAAA,IAAI,8BAAW,IAAI,CAAC,YAAY,CAAC,KAAK,CAAC,MAAA,CAAC;IAC1C,CAAC;CAgCF;AA/JD,gDA+JC;yGAtBQ,KAAK,4CACV,GAAiB,EACjB,SAAiB,EACjB,KAAa,EACb,MAAqB;IAErB,MAAM,MAAM,GAAG,IAAA,uBAAY,EAAQ;QACjC,OAAO,EAAE,GAAG,CAAC,aAAa;QAC1B,OAAO,EAAE;YACP,aAAa,EAAE,SAAS;SACzB;KACF,CAAC,CAAC;IACH,MAAM,IAAI,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,uBAAuB,EAAE;QACtD,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,KAAK,EAAE,EAAE;QACnC,IAAI,EAAE;YACJ,MAAM;SACP;QACD,OAAO,EAAE,MAAM;KAChB,CAAC,CAAC;IACH,MAAM,IAAI,GAAG,IAAA,eAAQ,EAAC,IAAI,CAAqB,CAAC;IAChD,OAAO,CAAC,IAAI,CAAC,KAAK,EAAE,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,GAAG,IAAI,GAAG,mBAAmB,CAAC,CAAC;AACzE,CAAC","sourcesContent":["import { paths, Client } from \"../client\";\nimport { EnvInterface } from \"..\";\nimport { assertOk } from \"../util\";\nimport { OrgSessionManager } from \"./session_manager\";\nimport { SessionStorage } from \"./session_storage\";\nimport createClient from \"openapi-fetch\";\n\n// An token obtained from an OIDC token is valid for 5 minutes\nconst OIDC_TOKEN_EXP_SECS = 300;\n\ntype OidcAuthResponse =\n  paths[\"/v0/org/{org_id}/oidc\"][\"post\"][\"responses\"][\"200\"][\"content\"][\"application/json\"];\n\n/** JSON representation of the OIDC token */\nexport interface OidcSessionData {\n  /** The environment that this token is for */\n  env: EnvInterface;\n  /** The organization ID */\n  org_id: string;\n  /** The OIDC token that this session was created from */\n  oidc_token: string;\n  /** The token to include in Authorization header */\n  token: string;\n  /** Token expiration timestamp */\n  token_exp: number;\n  /** The scopes of the token */\n  scopes: Array<string>;\n}\n\n/** Type of storage required for OIDC sessions */\nexport type OidcSessionStorage = SessionStorage<OidcSessionData>;\n\n/** Manager for OIDC sessions. */\nexport class OidcSessionManager extends OrgSessionManager<OidcSessionData> {\n  #client: Client;\n\n  /**\n   * @return {string} The current auth token.\n   * @internal\n   */\n  async token(): Promise<string> {\n    const session = await this.storage.retrieve();\n    return session.token;\n  }\n\n  /**\n   * Returns a client with the current session and refreshes the current\n   * session. May **UPDATE/MUTATE** self.\n   */\n  async client(): Promise<Client> {\n    await this.refreshIfNeeded();\n    return this.#client;\n  }\n\n  /** Revokes the session. */\n  async revoke(): Promise<void> {\n    this.unsupported(\"revoke\");\n  }\n\n  /**\n   * Refreshes the session and **UPDATES/MUTATES** self.\n   */\n  async refresh(): Promise<void> {\n    const session = await this.storage.retrieve();\n    const [token, tokenExp] = await OidcSessionManager.#exchangeToken(\n      session.env,\n      session.oidc_token,\n      session.org_id,\n      session.scopes,\n    );\n    await this.storage.save(<OidcSessionData>{\n      ...session,\n      token: token,\n      token_exp: tokenExp,\n    });\n    this.#client = this.createClient(token);\n  }\n\n  /**\n   * Returns whether it's time to refresh this token.\n   * @return {boolean} Whether it's time to refresh this token.\n   * @internal\n   */\n  async isStale(): Promise<boolean> {\n    const session = await this.storage.retrieve();\n    return this.hasExpired(session.token_exp);\n  }\n\n  /**\n   * Refreshes the session if it is about to expire.\n   * @return {boolean} Whether the session token was refreshed.\n   * @internal\n   */\n  async refreshIfNeeded(): Promise<boolean> {\n    if (await this.isStale()) {\n      await this.refresh();\n      return true;\n    }\n    return false;\n  }\n\n  /**\n   * Authenticate an OIDC user and create a new session for them.\n   * @param {EnvInterface} env The environment of the session\n   * @param {SessionStorage<SignerSessionObject>} storage The signer session storage\n   * @param {string} oidcToken The OIDC token\n   * @param {string} orgId The id of the organization that the user is in\n   * @param {List<string>} scopes The scopes of the resulting session\n   * @return {Promise<OidcSessionManager>} The signer session\n   */\n  static async create(\n    env: EnvInterface,\n    storage: SessionStorage<OidcSessionData>,\n    oidcToken: string,\n    orgId: string,\n    scopes: Array<string>,\n  ): Promise<OidcSessionManager> {\n    const [token, tokenExp] = await OidcSessionManager.#exchangeToken(\n      env,\n      oidcToken,\n      orgId,\n      scopes,\n    );\n    await storage.save(<OidcSessionData>{\n      env,\n      org_id: orgId,\n      oidc_token: oidcToken,\n      token,\n      token_exp: tokenExp,\n      scopes,\n    });\n    return new OidcSessionManager(env, orgId, token, storage);\n  }\n\n  /**\n   * Load from storage\n   * @param {OidcSessionStorage} storage The storage to load from\n   * @return {Promise<OidcSessionManager>} New OIDC session manager\n   */\n  static async loadFromStorage(storage: OidcSessionStorage): Promise<OidcSessionManager> {\n    const info = await storage.retrieve();\n    return new OidcSessionManager(info.env, info.org_id, info.token, storage);\n  }\n\n  /**\n   * Constructor.\n   * @param {EnvInterface} env The environment of the session\n   * @param {string} orgId The id of the org associated with this session\n   * @param {string} token The authorization token to use\n   * @param {SessionStorage<U>} storage The storage back end to use for storing\n   *                                    session information\n   */\n  private constructor(\n    env: EnvInterface,\n    orgId: string,\n    token: string,\n    storage: SessionStorage<OidcSessionData>,\n  ) {\n    super(env, orgId, storage);\n    this.#client = this.createClient(token);\n  }\n\n  /**\n   * Exchange an OIDC token for a CubeSigner session token.\n   * @param {EnvInterface} env The CubeSigner environment\n   * @param {string} oidcToken The OIDC token\n   * @param {string} orgId The id of the organization that the user is in\n   * @param {List<string>} scopes The scopes of the resulting session\n   * @return {Promise<[string, number]>} The session token and its expiration time\n   */\n  static async #exchangeToken(\n    env: EnvInterface,\n    oidcToken: string,\n    orgId: string,\n    scopes: Array<string>,\n  ): Promise<[string, number]> {\n    const client = createClient<paths>({\n      baseUrl: env.SignerApiRoot,\n      headers: {\n        Authorization: oidcToken,\n      },\n    });\n    const resp = await client.post(\"/v0/org/{org_id}/oidc\", {\n      params: { path: { org_id: orgId } },\n      body: {\n        scopes,\n      },\n      parseAs: \"json\",\n    });\n    const data = assertOk(resp) as OidcAuthResponse;\n    return [data.token, new Date().getTime() / 1000 + OIDC_TOKEN_EXP_SECS];\n  }\n}\n"]}
@@ -1,99 +0,0 @@
1
- import { Events } from "../events";
2
- import { EnvInterface } from "../env";
3
- import { Client } from "../api";
4
- import { SessionStorage } from "./session_storage";
5
- /** Generic session manager interface. */
6
- export declare abstract class SessionManager<U> {
7
- #private;
8
- readonly env: EnvInterface;
9
- readonly storage: SessionStorage<U>;
10
- readonly events: Events;
11
- /**
12
- * @return {string} The current auth token.
13
- * @internal
14
- */
15
- abstract token(): Promise<string>;
16
- /** Returns a client instance that uses the token. */
17
- abstract client(): Promise<Client>;
18
- /** Revokes the session. */
19
- abstract revoke(): Promise<void>;
20
- /** Refreshes the session. */
21
- abstract refresh(): Promise<void>;
22
- /**
23
- * Returns whether it's time to refresh this token.
24
- * @return {boolean} Whether it's time to refresh this token.
25
- * @internal
26
- */
27
- abstract isStale(): Promise<boolean>;
28
- /**
29
- * Refreshes the session if it is about to expire.
30
- * @return {boolean} Whether the session token was refreshed.
31
- * @internal
32
- */
33
- refreshIfNeeded(): Promise<boolean>;
34
- /**
35
- * Automatically refreshes the session in the background.
36
- * The default implementation refreshes (if needed) every minute.
37
- * Base implementations can, instead use the token expirations timestamps
38
- * to refresh less often. This is a simple wrapper around `setInterval`.
39
- * @return {number} The interval ID of the refresh timer.
40
- */
41
- autoRefresh(): RefreshId;
42
- /**
43
- * Clears the auto refresh timer.
44
- * @param {number} timer The timer ID to clear.
45
- */
46
- clearAutoRefresh(timer: RefreshId): void;
47
- /**
48
- * Constructor.
49
- * @param {EnvInterface} env The environment of the session
50
- * @param {SessionStorage<U>} storage The storage back end to use for storing
51
- * session information
52
- */
53
- constructor(env: EnvInterface, storage: SessionStorage<U>);
54
- /**
55
- * Creates a new REST client with a given token
56
- * @param {string} token The authorization token to use for the client
57
- * @return {Client} The new REST client
58
- */
59
- protected createClient(token: string): Client;
60
- /**
61
- * Check if a timestamp is within {@link bufferSeconds} seconds from expiration.
62
- * @param {Date} exp The timestamp to check
63
- * @param {number} bufferSeconds Time buffer in seconds (defaults to 0s)
64
- * @return {boolean} True if the timestamp has expired
65
- */
66
- protected static hasExpired(exp: Date, bufferSeconds?: number): boolean;
67
- /**
68
- * Check if a timestamp is stale, i.e., it's within {@link bufferSeconds} seconds from expiration.
69
- * @param {Date} exp The timestamp to check
70
- * @param {number} bufferSeconds Time buffer in seconds (defaults to 30s)
71
- * @return {boolean} True if the timestamp is stale
72
- */
73
- protected static isStale(exp: Date, bufferSeconds?: number): boolean;
74
- /**
75
- * Throws an error that says that some feature is unsupported.
76
- * @param {string} name The name of the feature that is not supported
77
- */
78
- protected unsupported(name: string): never;
79
- }
80
- /** Interface for a session manager that knows about the org that the session is in. */
81
- export declare abstract class OrgSessionManager<U> extends SessionManager<U> {
82
- readonly orgId: string;
83
- /**
84
- * Constructor.
85
- * @param {EnvInterface} env The environment of the session
86
- * @param {string} orgId The id of the org associated with this session
87
- * @param {SessionStorage<U>} storage The storage back end to use for storing
88
- * session information
89
- */
90
- constructor(env: EnvInterface, orgId: string, storage: SessionStorage<U>);
91
- }
92
- export interface HasEnv {
93
- /** The environment */
94
- env: {
95
- ["Dev-CubeSignerStack"]: EnvInterface;
96
- };
97
- }
98
- /** Type of the refresh timer ID. */
99
- export type RefreshId = ReturnType<typeof setInterval>;
@@ -1,136 +0,0 @@
1
- "use strict";
2
- var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
3
- if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
4
- if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
5
- return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
6
- };
7
- var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
8
- if (kind === "m") throw new TypeError("Private method is not writable");
9
- if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
10
- if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
11
- return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
12
- };
13
- var _SessionManager_refreshing;
14
- Object.defineProperty(exports, "__esModule", { value: true });
15
- exports.OrgSessionManager = exports.SessionManager = void 0;
16
- const events_1 = require("../events");
17
- const api_1 = require("../api");
18
- const util_1 = require("../util");
19
- const DEFAULT_EXPIRATION_BUFFER_SECS = 30;
20
- /** Generic session manager interface. */
21
- class SessionManager {
22
- /**
23
- * Refreshes the session if it is about to expire.
24
- * @return {boolean} Whether the session token was refreshed.
25
- * @internal
26
- */
27
- async refreshIfNeeded() {
28
- if (await this.isStale()) {
29
- if (__classPrivateFieldGet(this, _SessionManager_refreshing, "f")) {
30
- // wait until done refreshing
31
- while (__classPrivateFieldGet(this, _SessionManager_refreshing, "f")) {
32
- await (0, util_1.delay)(100);
33
- }
34
- return false;
35
- }
36
- else {
37
- // refresh
38
- __classPrivateFieldSet(this, _SessionManager_refreshing, true, "f");
39
- try {
40
- await this.refresh();
41
- return true;
42
- }
43
- finally {
44
- __classPrivateFieldSet(this, _SessionManager_refreshing, false, "f");
45
- }
46
- }
47
- }
48
- return false;
49
- }
50
- /**
51
- * Automatically refreshes the session in the background.
52
- * The default implementation refreshes (if needed) every minute.
53
- * Base implementations can, instead use the token expirations timestamps
54
- * to refresh less often. This is a simple wrapper around `setInterval`.
55
- * @return {number} The interval ID of the refresh timer.
56
- */
57
- autoRefresh() {
58
- return setInterval(async () => {
59
- await this.refreshIfNeeded();
60
- }, 60 * 1000);
61
- }
62
- /**
63
- * Clears the auto refresh timer.
64
- * @param {number} timer The timer ID to clear.
65
- */
66
- clearAutoRefresh(timer) {
67
- clearInterval(timer);
68
- }
69
- /**
70
- * Constructor.
71
- * @param {EnvInterface} env The environment of the session
72
- * @param {SessionStorage<U>} storage The storage back end to use for storing
73
- * session information
74
- */
75
- constructor(env, storage) {
76
- this.events = new events_1.Events();
77
- _SessionManager_refreshing.set(this, false);
78
- this.env = env;
79
- this.storage = storage;
80
- }
81
- /**
82
- * Creates a new REST client with a given token
83
- * @param {string} token The authorization token to use for the client
84
- * @return {Client} The new REST client
85
- */
86
- createClient(token) {
87
- return (0, api_1.createHttpClient)(this.env.SignerApiRoot, token);
88
- }
89
- /**
90
- * Check if a timestamp is within {@link bufferSeconds} seconds from expiration.
91
- * @param {Date} exp The timestamp to check
92
- * @param {number} bufferSeconds Time buffer in seconds (defaults to 0s)
93
- * @return {boolean} True if the timestamp has expired
94
- */
95
- static hasExpired(exp, bufferSeconds) {
96
- bufferSeconds ??= 0;
97
- const expMsSinceEpoch = exp.getTime();
98
- const nowMsSinceEpoch = new Date().getTime();
99
- const bufferMs = bufferSeconds * 1000;
100
- return expMsSinceEpoch < nowMsSinceEpoch + bufferMs;
101
- }
102
- /**
103
- * Check if a timestamp is stale, i.e., it's within {@link bufferSeconds} seconds from expiration.
104
- * @param {Date} exp The timestamp to check
105
- * @param {number} bufferSeconds Time buffer in seconds (defaults to 30s)
106
- * @return {boolean} True if the timestamp is stale
107
- */
108
- static isStale(exp, bufferSeconds) {
109
- return this.hasExpired(exp, bufferSeconds ?? DEFAULT_EXPIRATION_BUFFER_SECS);
110
- }
111
- /**
112
- * Throws an error that says that some feature is unsupported.
113
- * @param {string} name The name of the feature that is not supported
114
- */
115
- unsupported(name) {
116
- throw new Error(`'${name}' not supported`);
117
- }
118
- }
119
- exports.SessionManager = SessionManager;
120
- _SessionManager_refreshing = new WeakMap();
121
- /** Interface for a session manager that knows about the org that the session is in. */
122
- class OrgSessionManager extends SessionManager {
123
- /**
124
- * Constructor.
125
- * @param {EnvInterface} env The environment of the session
126
- * @param {string} orgId The id of the org associated with this session
127
- * @param {SessionStorage<U>} storage The storage back end to use for storing
128
- * session information
129
- */
130
- constructor(env, orgId, storage) {
131
- super(env, storage);
132
- this.orgId = orgId;
133
- }
134
- }
135
- exports.OrgSessionManager = OrgSessionManager;
136
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"session_manager.js","sourceRoot":"","sources":["../../../src/session/session_manager.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,sCAAmC;AAEnC,gCAAkD;AAElD,kCAAgC;AAEhC,MAAM,8BAA8B,GAAG,EAAE,CAAC;AAE1C,yCAAyC;AACzC,MAAsB,cAAc;IA4BlC;;;;OAIG;IACH,KAAK,CAAC,eAAe;QACnB,IAAI,MAAM,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC;YACzB,IAAI,uBAAA,IAAI,kCAAY,EAAE,CAAC;gBACrB,6BAA6B;gBAC7B,OAAO,uBAAA,IAAI,kCAAY,EAAE,CAAC;oBACxB,MAAM,IAAA,YAAK,EAAC,GAAG,CAAC,CAAC;gBACnB,CAAC;gBACD,OAAO,KAAK,CAAC;YACf,CAAC;iBAAM,CAAC;gBACN,UAAU;gBACV,uBAAA,IAAI,8BAAe,IAAI,MAAA,CAAC;gBACxB,IAAI,CAAC;oBACH,MAAM,IAAI,CAAC,OAAO,EAAE,CAAC;oBACrB,OAAO,IAAI,CAAC;gBACd,CAAC;wBAAS,CAAC;oBACT,uBAAA,IAAI,8BAAe,KAAK,MAAA,CAAC;gBAC3B,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;;;OAMG;IACH,WAAW;QACT,OAAO,WAAW,CAAC,KAAK,IAAI,EAAE;YAC5B,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;QAC/B,CAAC,EAAE,EAAE,GAAG,IAAI,CAAC,CAAC;IAChB,CAAC;IAED;;;OAGG;IACH,gBAAgB,CAAC,KAAgB;QAC/B,aAAa,CAAC,KAAK,CAAC,CAAC;IACvB,CAAC;IAED;;;;;OAKG;IACH,YAAY,GAAiB,EAAE,OAA0B;QAhFhD,WAAM,GAAG,IAAI,eAAM,EAAE,CAAC;QAC/B,qCAAuB,KAAK,EAAC;QAgF3B,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;QACf,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;IACzB,CAAC;IAED;;;;OAIG;IACO,YAAY,CAAC,KAAa;QAClC,OAAO,IAAA,sBAAgB,EAAC,IAAI,CAAC,GAAG,CAAC,aAAa,EAAE,KAAK,CAAC,CAAC;IACzD,CAAC;IAED;;;;;OAKG;IACO,MAAM,CAAC,UAAU,CAAC,GAAS,EAAE,aAAsB;QAC3D,aAAa,KAAK,CAAC,CAAC;QACpB,MAAM,eAAe,GAAG,GAAG,CAAC,OAAO,EAAE,CAAC;QACtC,MAAM,eAAe,GAAG,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,CAAC;QAC7C,MAAM,QAAQ,GAAG,aAAa,GAAG,IAAI,CAAC;QACtC,OAAO,eAAe,GAAG,eAAe,GAAG,QAAQ,CAAC;IACtD,CAAC;IAED;;;;;OAKG;IACO,MAAM,CAAC,OAAO,CAAC,GAAS,EAAE,aAAsB;QACxD,OAAO,IAAI,CAAC,UAAU,CAAC,GAAG,EAAE,aAAa,IAAI,8BAA8B,CAAC,CAAC;IAC/E,CAAC;IAED;;;OAGG;IACO,WAAW,CAAC,IAAY;QAChC,MAAM,IAAI,KAAK,CAAC,IAAI,IAAI,iBAAiB,CAAC,CAAC;IAC7C,CAAC;CACF;AAhID,wCAgIC;;AAED,uFAAuF;AACvF,MAAsB,iBAAqB,SAAQ,cAAiB;IAGlE;;;;;;OAMG;IACH,YAAY,GAAiB,EAAE,KAAa,EAAE,OAA0B;QACtE,KAAK,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;QACpB,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;IACrB,CAAC;CACF;AAdD,8CAcC","sourcesContent":["import { Events } from \"../events\";\nimport { EnvInterface } from \"../env\";\nimport { Client, createHttpClient } from \"../api\";\nimport { SessionStorage } from \"./session_storage\";\nimport { delay } from \"../util\";\n\nconst DEFAULT_EXPIRATION_BUFFER_SECS = 30;\n\n/** Generic session manager interface. */\nexport abstract class SessionManager<U> {\n  readonly env: EnvInterface;\n  readonly storage: SessionStorage<U>;\n  readonly events = new Events();\n  #refreshing: boolean = false;\n\n  /**\n   * @return {string} The current auth token.\n   * @internal\n   */\n  abstract token(): Promise<string>;\n\n  /** Returns a client instance that uses the token. */\n  abstract client(): Promise<Client>;\n\n  /** Revokes the session. */\n  abstract revoke(): Promise<void>;\n\n  /** Refreshes the session. */\n  abstract refresh(): Promise<void>;\n\n  /**\n   * Returns whether it's time to refresh this token.\n   * @return {boolean} Whether it's time to refresh this token.\n   * @internal\n   */\n  abstract isStale(): Promise<boolean>;\n\n  /**\n   * Refreshes the session if it is about to expire.\n   * @return {boolean} Whether the session token was refreshed.\n   * @internal\n   */\n  async refreshIfNeeded(): Promise<boolean> {\n    if (await this.isStale()) {\n      if (this.#refreshing) {\n        // wait until done refreshing\n        while (this.#refreshing) {\n          await delay(100);\n        }\n        return false;\n      } else {\n        // refresh\n        this.#refreshing = true;\n        try {\n          await this.refresh();\n          return true;\n        } finally {\n          this.#refreshing = false;\n        }\n      }\n    }\n\n    return false;\n  }\n\n  /**\n   * Automatically refreshes the session in the background.\n   * The default implementation refreshes (if needed) every minute.\n   * Base implementations can, instead use the token expirations timestamps\n   * to refresh less often. This is a simple wrapper around `setInterval`.\n   * @return {number} The interval ID of the refresh timer.\n   */\n  autoRefresh(): RefreshId {\n    return setInterval(async () => {\n      await this.refreshIfNeeded();\n    }, 60 * 1000);\n  }\n\n  /**\n   * Clears the auto refresh timer.\n   * @param {number} timer The timer ID to clear.\n   */\n  clearAutoRefresh(timer: RefreshId): void {\n    clearInterval(timer);\n  }\n\n  /**\n   * Constructor.\n   * @param {EnvInterface} env The environment of the session\n   * @param {SessionStorage<U>} storage The storage back end to use for storing\n   *                                    session information\n   */\n  constructor(env: EnvInterface, storage: SessionStorage<U>) {\n    this.env = env;\n    this.storage = storage;\n  }\n\n  /**\n   * Creates a new REST client with a given token\n   * @param {string} token The authorization token to use for the client\n   * @return {Client} The new REST client\n   */\n  protected createClient(token: string): Client {\n    return createHttpClient(this.env.SignerApiRoot, token);\n  }\n\n  /**\n   * Check if a timestamp is within {@link bufferSeconds} seconds from expiration.\n   * @param {Date} exp The timestamp to check\n   * @param {number} bufferSeconds Time buffer in seconds (defaults to 0s)\n   * @return {boolean} True if the timestamp has expired\n   */\n  protected static hasExpired(exp: Date, bufferSeconds?: number): boolean {\n    bufferSeconds ??= 0;\n    const expMsSinceEpoch = exp.getTime();\n    const nowMsSinceEpoch = new Date().getTime();\n    const bufferMs = bufferSeconds * 1000;\n    return expMsSinceEpoch < nowMsSinceEpoch + bufferMs;\n  }\n\n  /**\n   * Check if a timestamp is stale, i.e., it's within {@link bufferSeconds} seconds from expiration.\n   * @param {Date} exp The timestamp to check\n   * @param {number} bufferSeconds Time buffer in seconds (defaults to 30s)\n   * @return {boolean} True if the timestamp is stale\n   */\n  protected static isStale(exp: Date, bufferSeconds?: number): boolean {\n    return this.hasExpired(exp, bufferSeconds ?? DEFAULT_EXPIRATION_BUFFER_SECS);\n  }\n\n  /**\n   * Throws an error that says that some feature is unsupported.\n   * @param {string} name The name of the feature that is not supported\n   */\n  protected unsupported(name: string): never {\n    throw new Error(`'${name}' not supported`);\n  }\n}\n\n/** Interface for a session manager that knows about the org that the session is in. */\nexport abstract class OrgSessionManager<U> extends SessionManager<U> {\n  readonly orgId: string;\n\n  /**\n   * Constructor.\n   * @param {EnvInterface} env The environment of the session\n   * @param {string} orgId The id of the org associated with this session\n   * @param {SessionStorage<U>} storage The storage back end to use for storing\n   *                                    session information\n   */\n  constructor(env: EnvInterface, orgId: string, storage: SessionStorage<U>) {\n    super(env, storage);\n    this.orgId = orgId;\n  }\n}\n\nexport interface HasEnv {\n  /** The environment */\n  env: {\n    [\"Dev-CubeSignerStack\"]: EnvInterface;\n  };\n}\n\n/** Type of the refresh timer ID. */\nexport type RefreshId = ReturnType<typeof setInterval>;\n"]}
@@ -1,114 +0,0 @@
1
- import { CubeSigner, Key, SignerSession } from ".";
2
- import { components, paths } from "./client";
3
- export type Eth1SignRequest = paths["/v1/org/{org_id}/eth1/sign/{pubkey}"]["post"]["requestBody"]["content"]["application/json"];
4
- export type Eth2SignRequest = paths["/v1/org/{org_id}/eth2/sign/{pubkey}"]["post"]["requestBody"]["content"]["application/json"];
5
- export type Eth2StakeRequest = paths["/v1/org/{org_id}/eth2/stake"]["post"]["requestBody"]["content"]["application/json"];
6
- export type Eth2UnstakeRequest = paths["/v1/org/{org_id}/eth2/unstake/{pubkey}"]["post"]["requestBody"]["content"]["application/json"];
7
- export type BlobSignRequest = paths["/v1/org/{org_id}/blob/sign/{key_id}"]["post"]["requestBody"]["content"]["application/json"];
8
- export type BtcSignRequest = paths["/v0/org/{org_id}/btc/sign/{pubkey}"]["post"]["requestBody"]["content"]["application/json"];
9
- export type SolanaSignRequest = paths["/v1/org/{org_id}/solana/sign/{pubkey}"]["post"]["requestBody"]["content"]["application/json"];
10
- export type Eth1SignResponse = components["responses"]["Eth1SignResponse"]["content"]["application/json"];
11
- export type Eth2SignResponse = components["responses"]["Eth2SignResponse"]["content"]["application/json"];
12
- export type Eth2StakeResponse = components["responses"]["StakeResponse"]["content"]["application/json"];
13
- export type Eth2UnstakeResponse = components["responses"]["UnstakeResponse"]["content"]["application/json"];
14
- export type BlobSignResponse = components["responses"]["BlobSignResponse"]["content"]["application/json"];
15
- export type BtcSignResponse = components["responses"]["BtcSignResponse"]["content"]["application/json"];
16
- export type SolanaSignResponse = components["responses"]["SolanaSignResponse"]["content"]["application/json"];
17
- export type MfaRequestInfo = components["responses"]["MfaRequestInfo"]["content"]["application/json"];
18
- export type AcceptedResponse = components["schemas"]["AcceptedResponse"];
19
- export type ErrorResponse = components["schemas"]["ErrorResponse"];
20
- export type BtcSignatureKind = components["schemas"]["BtcSignatureKind"];
21
- type SignFn<U> = (headers?: HeadersInit) => Promise<U | AcceptedResponse>;
22
- /**
23
- * A response of a signing request.
24
- */
25
- export declare class SignResponse<U> {
26
- #private;
27
- /** @return {boolean} True if this signing request requires an MFA approval */
28
- requiresMfa(): boolean;
29
- /** @return {U} The signed data */
30
- data(): U;
31
- /**
32
- * Approves the MFA request.
33
- *
34
- * Note: This only works for MFA requests that require a single approval.
35
- *
36
- * @return {SignResponse<U>} The result of signing with the approval
37
- */
38
- approve(): Promise<SignResponse<U>>;
39
- /**
40
- * Constructor.
41
- *
42
- * @param {CubeSigner} cs The CubeSigner instance to use for requests
43
- * @param {string} orgId The org id of the corresponding signing request
44
- * @param {string} roleId The role id of the corresponding signing request
45
- * @param {SignFn} signFn The signing function that this response is from.
46
- * This argument is used to resend requests with
47
- * different headers if needed.
48
- * @param {U | AcceptedResponse} resp The response as returned by the OpenAPI
49
- * client.
50
- */
51
- constructor(cs: CubeSigner, orgId: string, roleId: string, signFn: SignFn<U>, resp: U | AcceptedResponse);
52
- }
53
- /**
54
- * Wrapper around sign operations.
55
- */
56
- export declare class Sign {
57
- #private;
58
- /**
59
- * Submit an 'eth1' sign request.
60
- * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
61
- * @param {Eth1SignRequest} req What to sign.
62
- * @return {Promise<Eth1SignResponse | AcceptedResponse>} Signature
63
- */
64
- eth1(key: Key | string, req: Eth1SignRequest): Promise<SignResponse<Eth1SignResponse>>;
65
- /**
66
- * Submit an 'eth2' sign request.
67
- * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
68
- * @param {Eth2SignRequest} req What to sign.
69
- * @return {Promise<Eth2SignResponse | AcceptedResponse>} Signature
70
- */
71
- eth2(key: Key | string, req: Eth2SignRequest): Promise<SignResponse<Eth2SignResponse>>;
72
- /**
73
- * Sign a stake request.
74
- * @param {Eth2StakeRequest} req The request to sign.
75
- * @return {Promise<Eth2StakeResponse | AcceptedResponse>} The response.
76
- */
77
- stake(req: Eth2StakeRequest): Promise<SignResponse<Eth2StakeResponse>>;
78
- /**
79
- * Sign an unstake request.
80
- * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
81
- * @param {Eth2UnstakeRequest} req The request to sign.
82
- * @return {Promise<Eth2UnstakeResponse | AcceptedResponse>} The response.
83
- */
84
- unstake(key: Key | string, req: Eth2UnstakeRequest): Promise<SignResponse<Eth2UnstakeResponse>>;
85
- /**
86
- * Sign a raw blob.
87
- * @param {Key | string} key The key to sign with (either {@link Key} or its ID).
88
- * @param {BlobSignRequest} req What to sign
89
- * @return {Promise<BlobSignResponse | AcceptedResponse>} The response.
90
- */
91
- blob(key: Key | string, req: BlobSignRequest): Promise<SignResponse<BlobSignResponse>>;
92
- /**
93
- * Sign a bitcoin message.
94
- * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
95
- * @param {BtcSignRequest} req What to sign
96
- * @return {Promise<BtcSignResponse | AcceptedResponse>} The response.
97
- */
98
- btc(key: Key | string, req: BtcSignRequest): Promise<SignResponse<BtcSignResponse>>;
99
- /**
100
- * Sign a solana message.
101
- * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
102
- * @param {SolanaSignRequest} req What to sign
103
- * @return {Promise<SolanaSignResponse | AcceptedResponse>} The response.
104
- */
105
- solana(key: Key | string, req: SolanaSignRequest): Promise<SignResponse<SolanaSignResponse>>;
106
- /**
107
- * Constructor.
108
- *
109
- * @param {string} orgId Organization ID
110
- * @param {SignerSession} ss The signer session to use for signing requests
111
- */
112
- constructor(orgId: string, ss: SignerSession);
113
- }
114
- export {};