@cubist-labs/cubesigner-sdk 0.2.28 → 0.3.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +30 -28
- package/dist/cjs/package.json +41 -0
- package/dist/cjs/spec/env/beta.json +9 -0
- package/dist/cjs/spec/env/gamma.json +9 -0
- package/dist/cjs/spec/env/prod.json +9 -0
- package/dist/cjs/src/api.d.ts +634 -0
- package/dist/cjs/src/api.js +1309 -0
- package/dist/cjs/src/client.d.ts +575 -0
- package/dist/cjs/src/client.js +378 -0
- package/dist/cjs/src/env.d.ts +15 -0
- package/dist/cjs/src/env.js +35 -0
- package/dist/cjs/src/error.d.ts +29 -0
- package/dist/cjs/src/error.js +36 -0
- package/dist/cjs/src/events.d.ts +84 -0
- package/dist/cjs/src/events.js +195 -0
- package/dist/cjs/src/index.d.ts +203 -0
- package/dist/cjs/src/index.js +298 -0
- package/dist/cjs/src/key.d.ts +152 -0
- package/dist/cjs/src/key.js +242 -0
- package/dist/{src/fido.d.ts → cjs/src/mfa.d.ts} +33 -15
- package/dist/cjs/src/mfa.js +169 -0
- package/dist/cjs/src/org.d.ts +99 -0
- package/dist/cjs/src/org.js +95 -0
- package/dist/cjs/src/paginator.d.ts +76 -0
- package/dist/cjs/src/paginator.js +99 -0
- package/dist/cjs/src/response.d.ts +101 -0
- package/dist/cjs/src/response.js +164 -0
- package/dist/cjs/src/role.d.ts +283 -0
- package/dist/cjs/src/role.js +253 -0
- package/dist/cjs/src/schema.d.ts +6209 -0
- package/dist/cjs/src/schema.js +7 -0
- package/dist/cjs/src/schema_types.d.ts +113 -0
- package/dist/cjs/src/schema_types.js +3 -0
- package/dist/cjs/src/session/session_storage.d.ts +27 -0
- package/dist/cjs/src/session/session_storage.js +47 -0
- package/dist/cjs/src/session/signer_session_manager.d.ts +125 -0
- package/dist/cjs/src/session/signer_session_manager.js +239 -0
- package/dist/cjs/src/signer_session.d.ts +41 -0
- package/dist/cjs/src/signer_session.js +77 -0
- package/dist/cjs/src/user_export.d.ts +52 -0
- package/dist/cjs/src/user_export.js +129 -0
- package/dist/cjs/src/util.d.ts +56 -0
- package/dist/cjs/src/util.js +86 -0
- package/dist/esm/package.json +41 -0
- package/dist/esm/spec/env/beta.json +9 -0
- package/dist/esm/spec/env/gamma.json +9 -0
- package/dist/esm/spec/env/prod.json +9 -0
- package/dist/esm/src/api.d.ts +634 -0
- package/dist/esm/src/api.js +1299 -0
- package/dist/esm/src/client.d.ts +575 -0
- package/dist/esm/src/client.js +374 -0
- package/dist/esm/src/env.d.ts +15 -0
- package/dist/esm/src/env.js +9 -0
- package/dist/esm/src/error.d.ts +29 -0
- package/dist/esm/src/error.js +31 -0
- package/dist/esm/src/events.d.ts +84 -0
- package/dist/esm/src/events.js +189 -0
- package/dist/esm/src/index.d.ts +203 -0
- package/dist/esm/src/index.js +276 -0
- package/dist/esm/src/key.d.ts +152 -0
- package/dist/esm/src/key.js +236 -0
- package/dist/esm/src/mfa.d.ts +94 -0
- package/dist/esm/src/mfa.js +163 -0
- package/dist/esm/src/org.d.ts +99 -0
- package/dist/esm/src/org.js +91 -0
- package/dist/esm/src/paginator.d.ts +76 -0
- package/dist/esm/src/paginator.js +94 -0
- package/dist/esm/src/response.d.ts +101 -0
- package/dist/esm/src/response.js +159 -0
- package/dist/esm/src/role.d.ts +283 -0
- package/dist/esm/src/role.js +248 -0
- package/dist/esm/src/schema.d.ts +6209 -0
- package/dist/esm/src/schema.js +6 -0
- package/dist/esm/src/schema_types.d.ts +113 -0
- package/dist/esm/src/schema_types.js +2 -0
- package/dist/esm/src/session/session_storage.d.ts +27 -0
- package/dist/esm/src/session/session_storage.js +43 -0
- package/dist/esm/src/session/signer_session_manager.d.ts +125 -0
- package/dist/esm/src/session/signer_session_manager.js +235 -0
- package/dist/esm/src/signer_session.d.ts +41 -0
- package/dist/esm/src/signer_session.js +72 -0
- package/dist/esm/src/user_export.d.ts +52 -0
- package/dist/esm/src/user_export.js +99 -0
- package/dist/esm/src/util.d.ts +56 -0
- package/dist/esm/src/util.js +76 -0
- package/dist/package.json +13 -45
- package/dist/src/api.d.ts +29 -1
- package/dist/src/api.js +66 -1
- package/dist/src/client.d.ts +35 -14
- package/dist/src/client.js +12 -8
- package/dist/src/events.js +1 -1
- package/dist/src/index.d.ts +6 -11
- package/dist/src/index.js +9 -25
- package/dist/src/key.d.ts +18 -7
- package/dist/src/key.js +52 -19
- package/dist/src/role.d.ts +46 -3
- package/dist/src/role.js +60 -8
- package/dist/src/schema.d.ts +206 -72
- package/dist/src/schema.js +1 -1
- package/dist/src/schema_types.d.ts +3 -0
- package/dist/src/schema_types.js +1 -1
- package/dist/src/session/signer_session_manager.d.ts +38 -14
- package/dist/src/session/signer_session_manager.js +93 -33
- package/dist/src/util.d.ts +14 -0
- package/dist/src/util.js +24 -27
- package/package.json +19 -46
- package/src/api.ts +79 -0
- package/src/client.ts +12 -8
- package/src/events.ts +2 -0
- package/src/index.ts +10 -24
- package/src/key.ts +36 -18
- package/src/role.ts +78 -7
- package/src/schema.ts +269 -110
- package/src/schema_types.ts +3 -0
- package/src/session/session_storage.ts +0 -32
- package/src/session/signer_session_manager.ts +124 -36
- package/src/util.ts +19 -10
- package/tsconfig.json +1 -21
- package/LICENSE-APACHE +0 -177
- package/LICENSE-MIT +0 -25
- package/NOTICE +0 -13
- package/dist/examples/ethers.d.ts +0 -1
- package/dist/examples/ethers.js +0 -142
- package/dist/src/ethers/index.d.ts +0 -95
- package/dist/src/ethers/index.js +0 -215
- package/dist/src/fido.js +0 -148
- package/dist/src/session/cognito_manager.d.ts +0 -71
- package/dist/src/session/cognito_manager.js +0 -129
- package/dist/src/session/generic.d.ts +0 -47
- package/dist/src/session/generic.js +0 -3
- package/dist/src/session/management_session_manager.d.ts +0 -59
- package/dist/src/session/management_session_manager.js +0 -111
- package/dist/src/session/oidc_session_manager.d.ts +0 -78
- package/dist/src/session/oidc_session_manager.js +0 -142
- package/dist/src/session/session_manager.d.ts +0 -99
- package/dist/src/session/session_manager.js +0 -136
- package/dist/src/sign.d.ts +0 -114
- package/dist/src/sign.js +0 -248
- package/dist/test/sessions.d.ts +0 -35
- package/dist/test/sessions.js +0 -56
- package/src/ethers/index.ts +0 -253
- package/src/session/cognito_manager.ts +0 -161
- package/src/session/session_manager.ts +0 -165
|
@@ -0,0 +1,283 @@
|
|
|
1
|
+
import { Key, KeyWithPoliciesInfo, MfaType, PageOpts, RoleInfo, SignerSession, SignerSessionInfo, SignerSessionLifetime, SignerSessionStorage } from ".";
|
|
2
|
+
import { CubeSignerClient } from "./client";
|
|
3
|
+
/**
|
|
4
|
+
* Restrict transaction receiver.
|
|
5
|
+
*
|
|
6
|
+
* @example { TxReceiver: "0x8c594691c0e592ffa21f153a16ae41db5befcaaa" }
|
|
7
|
+
*/
|
|
8
|
+
export type TxReceiver = {
|
|
9
|
+
TxReceiver: string;
|
|
10
|
+
};
|
|
11
|
+
/** The kind of deposit contracts. */
|
|
12
|
+
export declare enum DepositContract {
|
|
13
|
+
/** Canonical deposit contract */
|
|
14
|
+
Canonical = 0,// eslint-disable-line no-unused-vars
|
|
15
|
+
/** Wrapper deposit contract */
|
|
16
|
+
Wrapper = 1
|
|
17
|
+
}
|
|
18
|
+
/** Restrict transactions to calls to deposit contract. */
|
|
19
|
+
export type TxDeposit = TxDepositBase | TxDepositPubkey | TxDepositRole;
|
|
20
|
+
/** Restrict transactions to calls to deposit contract*/
|
|
21
|
+
export type TxDepositBase = {
|
|
22
|
+
TxDeposit: {
|
|
23
|
+
kind: DepositContract;
|
|
24
|
+
};
|
|
25
|
+
};
|
|
26
|
+
/**
|
|
27
|
+
* Restrict transactions to calls to deposit contract with fixed validator (pubkey):
|
|
28
|
+
*
|
|
29
|
+
* @example { TxDeposit: { kind: DespositContract.Canonical, validator: { pubkey: "8879...8"} }}
|
|
30
|
+
*/
|
|
31
|
+
export type TxDepositPubkey = {
|
|
32
|
+
TxDeposit: {
|
|
33
|
+
kind: DepositContract;
|
|
34
|
+
pubkey: string;
|
|
35
|
+
};
|
|
36
|
+
};
|
|
37
|
+
/**
|
|
38
|
+
* Restrict transactions to calls to deposit contract with any validator key in a role:
|
|
39
|
+
*
|
|
40
|
+
* @example { TxDeposit: { kind: DespositContract.Canonical, validator: { role_id: "Role#c63...af"} }}
|
|
41
|
+
*/
|
|
42
|
+
export type TxDepositRole = {
|
|
43
|
+
TxDeposit: {
|
|
44
|
+
kind: DepositContract;
|
|
45
|
+
role_id: string;
|
|
46
|
+
};
|
|
47
|
+
};
|
|
48
|
+
/**
|
|
49
|
+
* Only allow connections from clients whose IP addresses match any of these IPv4 CIDR blocks.
|
|
50
|
+
*
|
|
51
|
+
* @example { SourceIpAllowlist: [ "123.456.78.9/16" ] }
|
|
52
|
+
*/
|
|
53
|
+
export type SourceIpAllowlist = {
|
|
54
|
+
SourceIpAllowlist: string[];
|
|
55
|
+
};
|
|
56
|
+
/** All different kinds of sensitive operations. */
|
|
57
|
+
export declare enum OperationKind {
|
|
58
|
+
BlobSign = "BlobSign",// eslint-disable-line no-unused-vars
|
|
59
|
+
EvmSign = "Eth1Sign",// eslint-disable-line no-unused-vars
|
|
60
|
+
Eth2Sign = "Eth2Sign",// eslint-disable-line no-unused-vars
|
|
61
|
+
Eth2Stake = "Eth2Stake",// eslint-disable-line no-unused-vars
|
|
62
|
+
Eth2Unstake = "Eth2Unstake",// eslint-disable-line no-unused-vars
|
|
63
|
+
SolanaSign = "SolanaSign"
|
|
64
|
+
}
|
|
65
|
+
/**
|
|
66
|
+
* MFA policy
|
|
67
|
+
*
|
|
68
|
+
* @example {
|
|
69
|
+
* {
|
|
70
|
+
* count: 1,
|
|
71
|
+
* num_auth_factors: 1,
|
|
72
|
+
* allowed_mfa_types: [ "Totp" ],
|
|
73
|
+
* allowed_approvers: [ "User#123" ],
|
|
74
|
+
* }
|
|
75
|
+
*/
|
|
76
|
+
export type MfaPolicy = {
|
|
77
|
+
count?: number;
|
|
78
|
+
num_auth_factors?: number;
|
|
79
|
+
allowed_approvers?: string[];
|
|
80
|
+
allowed_mfa_types?: MfaType[];
|
|
81
|
+
restricted_operations?: OperationKind[];
|
|
82
|
+
};
|
|
83
|
+
/**
|
|
84
|
+
* Require MFA for transactions.
|
|
85
|
+
*
|
|
86
|
+
* @example {
|
|
87
|
+
* RequireMfa: {
|
|
88
|
+
* count: 1,
|
|
89
|
+
* allowed_mfa_types: [ "Totp" ],
|
|
90
|
+
* allowed_approvers: [ "User#123" ],
|
|
91
|
+
* restricted_operations: [
|
|
92
|
+
* "Eth1Sign",
|
|
93
|
+
* "BlobSign"
|
|
94
|
+
* ]
|
|
95
|
+
* }
|
|
96
|
+
* }
|
|
97
|
+
*/
|
|
98
|
+
export type RequireMfa = {
|
|
99
|
+
RequireMfa: MfaPolicy;
|
|
100
|
+
};
|
|
101
|
+
/** Allow raw blob signing */
|
|
102
|
+
export declare const AllowRawBlobSigning: "AllowRawBlobSigning";
|
|
103
|
+
export type AllowRawBlobSigning = typeof AllowRawBlobSigning;
|
|
104
|
+
/** Allow EIP-191 signing */
|
|
105
|
+
export declare const AllowEip191Signing: "AllowEip191Signing";
|
|
106
|
+
export type AllowEip191Signing = typeof AllowEip191Signing;
|
|
107
|
+
/** Allow EIP-712 signing */
|
|
108
|
+
export declare const AllowEip712Signing: "AllowEip712Signing";
|
|
109
|
+
export type AllowEip712Signing = typeof AllowEip712Signing;
|
|
110
|
+
/** Key policies that restrict the requests that the signing endpoints accept */
|
|
111
|
+
type KeyDenyPolicy = TxReceiver | TxDeposit | SourceIpAllowlist | RequireMfa;
|
|
112
|
+
/**
|
|
113
|
+
* Key policy
|
|
114
|
+
*
|
|
115
|
+
* @example [
|
|
116
|
+
* {
|
|
117
|
+
* "TxReceiver": "0x8c594691c0e592ffa21f153a16ae41db5befcaaa"
|
|
118
|
+
* },
|
|
119
|
+
* {
|
|
120
|
+
* "TxDeposit": {
|
|
121
|
+
* "kind": "Canonical"
|
|
122
|
+
* }
|
|
123
|
+
* },
|
|
124
|
+
* {
|
|
125
|
+
* "RequireMfa": {
|
|
126
|
+
* "count": 1,
|
|
127
|
+
* "allowed_mfa_types": ["CubeSigner"],
|
|
128
|
+
* "restricted_operations": [
|
|
129
|
+
* "Eth1Sign",
|
|
130
|
+
* "BlobSign"
|
|
131
|
+
* ]
|
|
132
|
+
* }
|
|
133
|
+
* }
|
|
134
|
+
* ]
|
|
135
|
+
*/
|
|
136
|
+
export type KeyPolicy = (KeyDenyPolicy | AllowRawBlobSigning | AllowEip191Signing | AllowEip712Signing)[];
|
|
137
|
+
/** Role policy */
|
|
138
|
+
export type RolePolicy = KeyDenyPolicy[];
|
|
139
|
+
/** A key guarded by a policy. */
|
|
140
|
+
export declare class KeyWithPolicies {
|
|
141
|
+
#private;
|
|
142
|
+
readonly keyId: string;
|
|
143
|
+
readonly policy?: KeyPolicy;
|
|
144
|
+
/** @return {Promise<Key>} The key */
|
|
145
|
+
getKey(): Promise<Key>;
|
|
146
|
+
/**
|
|
147
|
+
* Constructor.
|
|
148
|
+
* @param {CubeSignerClient} csc The CubeSigner instance to use for signing.
|
|
149
|
+
* @param {KeyWithPoliciesInfo} keyWithPolicies The key and its policies
|
|
150
|
+
* @internal
|
|
151
|
+
*/
|
|
152
|
+
constructor(csc: CubeSignerClient, keyWithPolicies: KeyWithPoliciesInfo);
|
|
153
|
+
}
|
|
154
|
+
/** Roles. */
|
|
155
|
+
export declare class Role {
|
|
156
|
+
#private;
|
|
157
|
+
/** Human-readable name for the role */
|
|
158
|
+
get name(): string | undefined;
|
|
159
|
+
/**
|
|
160
|
+
* The ID of the role.
|
|
161
|
+
* @example Role#bfe3eccb-731e-430d-b1e5-ac1363e6b06b
|
|
162
|
+
*/
|
|
163
|
+
get id(): string;
|
|
164
|
+
/**
|
|
165
|
+
* @return {RoleInfo} the cached properties of this role. The cached properties
|
|
166
|
+
* reflect the state of the last fetch or update (e.g., after awaiting
|
|
167
|
+
* `Role.enabled()` or `Role.disable()`).
|
|
168
|
+
*/
|
|
169
|
+
get cached(): RoleInfo;
|
|
170
|
+
/** Delete the role. */
|
|
171
|
+
delete(): Promise<void>;
|
|
172
|
+
/** Is the role enabled? */
|
|
173
|
+
enabled(): Promise<boolean>;
|
|
174
|
+
/** Enable the role. */
|
|
175
|
+
enable(): Promise<void>;
|
|
176
|
+
/** Disable the role. */
|
|
177
|
+
disable(): Promise<void>;
|
|
178
|
+
/**
|
|
179
|
+
* Set new policy (overwriting any policies previously set for this role)
|
|
180
|
+
* @param {RolePolicy} policy The new policy to set
|
|
181
|
+
*/
|
|
182
|
+
setPolicy(policy: RolePolicy): Promise<void>;
|
|
183
|
+
/**
|
|
184
|
+
* Append to existing role policy. This append is not atomic---it uses
|
|
185
|
+
* {@link policy} to fetch the current policy and then {@link setPolicy}
|
|
186
|
+
* to set the policy---and should not be used in across concurrent sessions.
|
|
187
|
+
*
|
|
188
|
+
* @param {RolePolicy} policy The policy to append to the existing one.
|
|
189
|
+
*/
|
|
190
|
+
appendPolicy(policy: RolePolicy): Promise<void>;
|
|
191
|
+
/**
|
|
192
|
+
* Get the policy for the role.
|
|
193
|
+
* @return {Promise<RolePolicy>} The policy for the role.
|
|
194
|
+
*/
|
|
195
|
+
policy(): Promise<RolePolicy>;
|
|
196
|
+
/**
|
|
197
|
+
* The list of all users with access to the role.
|
|
198
|
+
* @example [
|
|
199
|
+
* "User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f",
|
|
200
|
+
* "User#5593c25b-52e2-4fb5-b39b-96d41d681d82"
|
|
201
|
+
* ]
|
|
202
|
+
*
|
|
203
|
+
* @param {PageOpts} page Optional pagination options; by default, retrieves all users.
|
|
204
|
+
*/
|
|
205
|
+
users(page?: PageOpts): Promise<string[]>;
|
|
206
|
+
/**
|
|
207
|
+
* Add an existing user to an existing role.
|
|
208
|
+
*
|
|
209
|
+
* @param {string} userId The user-id of the user to add to the role.
|
|
210
|
+
*/
|
|
211
|
+
addUser(userId: string): Promise<void>;
|
|
212
|
+
/**
|
|
213
|
+
* The list of keys in the role.
|
|
214
|
+
* @example [
|
|
215
|
+
* {
|
|
216
|
+
* id: "Key#bfe3eccb-731e-430d-b1e5-ac1363e6b06b",
|
|
217
|
+
* policy: { TxReceiver: "0x8c594691c0e592ffa21f153a16ae41db5befcaaa" }
|
|
218
|
+
* },
|
|
219
|
+
* ]
|
|
220
|
+
*
|
|
221
|
+
* @param {PageOpts} page Optional pagination options; by default, retrieves all keys in this role.
|
|
222
|
+
*/
|
|
223
|
+
keys(page?: PageOpts): Promise<KeyWithPolicies[]>;
|
|
224
|
+
/**
|
|
225
|
+
* Add a list of existing keys to an existing role.
|
|
226
|
+
*
|
|
227
|
+
* @param {Key[]} keys The list of keys to add to the role.
|
|
228
|
+
* @param {KeyPolicy?} policy The optional policy to apply to each key.
|
|
229
|
+
*/
|
|
230
|
+
addKeys(keys: Key[], policy?: KeyPolicy): Promise<void>;
|
|
231
|
+
/**
|
|
232
|
+
* Add an existing key to an existing role.
|
|
233
|
+
*
|
|
234
|
+
* @param {Key} key The key to add to the role.
|
|
235
|
+
* @param {KeyPolicy?} policy The optional policy to apply to the key.
|
|
236
|
+
*/
|
|
237
|
+
addKey(key: Key, policy?: KeyPolicy): Promise<void>;
|
|
238
|
+
/**
|
|
239
|
+
* Remove an existing key from an existing role.
|
|
240
|
+
*
|
|
241
|
+
* @param {Key} key The key to remove from the role.
|
|
242
|
+
*/
|
|
243
|
+
removeKey(key: Key): Promise<void>;
|
|
244
|
+
/**
|
|
245
|
+
* Create a new session for this role.
|
|
246
|
+
* @param {SignerSessionStorage} storage The session storage to use
|
|
247
|
+
* @param {string} purpose Descriptive purpose.
|
|
248
|
+
* @param {SignerSessionLifetime} lifetimes Optional session lifetimes.
|
|
249
|
+
* @param {string[]} scopes Session scopes. Only `sign:*` scopes are allowed.
|
|
250
|
+
* @return {Promise<SignerSession>} New signer session.
|
|
251
|
+
*/
|
|
252
|
+
createSession(storage: SignerSessionStorage, purpose: string, lifetimes?: SignerSessionLifetime, scopes?: string[]): Promise<SignerSession>;
|
|
253
|
+
/**
|
|
254
|
+
* List all signer sessions for this role. Returned objects can be used to
|
|
255
|
+
* revoke individual sessions, but they cannot be used for authentication.
|
|
256
|
+
*
|
|
257
|
+
* @param {PageOpts} page Optional pagination options; by default, retrieves all sessions.
|
|
258
|
+
* @return {Promise<SignerSessionInfo[]>} Signer sessions for this role.
|
|
259
|
+
*/
|
|
260
|
+
sessions(page?: PageOpts): Promise<SignerSessionInfo[]>;
|
|
261
|
+
/**
|
|
262
|
+
* Constructor.
|
|
263
|
+
* @param {CubeSignerClient} csc The CubeSigner instance to use for signing.
|
|
264
|
+
* @param {RoleInfo} data The JSON response from the API server.
|
|
265
|
+
* @internal
|
|
266
|
+
*/
|
|
267
|
+
constructor(csc: CubeSignerClient, data: RoleInfo);
|
|
268
|
+
/**
|
|
269
|
+
* Update the role.
|
|
270
|
+
*
|
|
271
|
+
* @param {UpdateRoleRequest} request The JSON request to send to the API server.
|
|
272
|
+
* @return {Promise<RoleInfo>} The updated role information.
|
|
273
|
+
*/
|
|
274
|
+
private update;
|
|
275
|
+
/**
|
|
276
|
+
* Fetches the role information.
|
|
277
|
+
*
|
|
278
|
+
* @return {RoleInfo} The role information.
|
|
279
|
+
* @internal
|
|
280
|
+
*/
|
|
281
|
+
private fetch;
|
|
282
|
+
}
|
|
283
|
+
export {};
|
|
@@ -0,0 +1,248 @@
|
|
|
1
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
2
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
3
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
4
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
5
|
+
};
|
|
6
|
+
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
7
|
+
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
8
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
9
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
10
|
+
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
11
|
+
};
|
|
12
|
+
var _KeyWithPolicies_csc, _Role_csc, _Role_data;
|
|
13
|
+
import { Key, SignerSession, SignerSessionInfo, SignerSessionManager, } from ".";
|
|
14
|
+
/** The kind of deposit contracts. */
|
|
15
|
+
export var DepositContract;
|
|
16
|
+
(function (DepositContract) {
|
|
17
|
+
/** Canonical deposit contract */
|
|
18
|
+
DepositContract[DepositContract["Canonical"] = 0] = "Canonical";
|
|
19
|
+
/** Wrapper deposit contract */
|
|
20
|
+
DepositContract[DepositContract["Wrapper"] = 1] = "Wrapper";
|
|
21
|
+
})(DepositContract || (DepositContract = {}));
|
|
22
|
+
/** All different kinds of sensitive operations. */
|
|
23
|
+
export var OperationKind;
|
|
24
|
+
(function (OperationKind) {
|
|
25
|
+
OperationKind["BlobSign"] = "BlobSign";
|
|
26
|
+
OperationKind["EvmSign"] = "Eth1Sign";
|
|
27
|
+
OperationKind["Eth2Sign"] = "Eth2Sign";
|
|
28
|
+
OperationKind["Eth2Stake"] = "Eth2Stake";
|
|
29
|
+
OperationKind["Eth2Unstake"] = "Eth2Unstake";
|
|
30
|
+
OperationKind["SolanaSign"] = "SolanaSign";
|
|
31
|
+
})(OperationKind || (OperationKind = {}));
|
|
32
|
+
/** Allow raw blob signing */
|
|
33
|
+
export const AllowRawBlobSigning = "AllowRawBlobSigning";
|
|
34
|
+
/** Allow EIP-191 signing */
|
|
35
|
+
export const AllowEip191Signing = "AllowEip191Signing";
|
|
36
|
+
/** Allow EIP-712 signing */
|
|
37
|
+
export const AllowEip712Signing = "AllowEip712Signing";
|
|
38
|
+
/** A key guarded by a policy. */
|
|
39
|
+
export class KeyWithPolicies {
|
|
40
|
+
/** @return {Promise<Key>} The key */
|
|
41
|
+
async getKey() {
|
|
42
|
+
const keyInfo = await __classPrivateFieldGet(this, _KeyWithPolicies_csc, "f").keyGet(this.keyId);
|
|
43
|
+
return new Key(__classPrivateFieldGet(this, _KeyWithPolicies_csc, "f"), keyInfo);
|
|
44
|
+
}
|
|
45
|
+
/**
|
|
46
|
+
* Constructor.
|
|
47
|
+
* @param {CubeSignerClient} csc The CubeSigner instance to use for signing.
|
|
48
|
+
* @param {KeyWithPoliciesInfo} keyWithPolicies The key and its policies
|
|
49
|
+
* @internal
|
|
50
|
+
*/
|
|
51
|
+
constructor(csc, keyWithPolicies) {
|
|
52
|
+
_KeyWithPolicies_csc.set(this, void 0);
|
|
53
|
+
__classPrivateFieldSet(this, _KeyWithPolicies_csc, csc, "f");
|
|
54
|
+
this.keyId = keyWithPolicies.key_id;
|
|
55
|
+
this.policy = keyWithPolicies.policy;
|
|
56
|
+
}
|
|
57
|
+
}
|
|
58
|
+
_KeyWithPolicies_csc = new WeakMap();
|
|
59
|
+
/** Roles. */
|
|
60
|
+
export class Role {
|
|
61
|
+
/** Human-readable name for the role */
|
|
62
|
+
get name() {
|
|
63
|
+
return __classPrivateFieldGet(this, _Role_data, "f").name ?? undefined;
|
|
64
|
+
}
|
|
65
|
+
/**
|
|
66
|
+
* The ID of the role.
|
|
67
|
+
* @example Role#bfe3eccb-731e-430d-b1e5-ac1363e6b06b
|
|
68
|
+
*/
|
|
69
|
+
get id() {
|
|
70
|
+
return __classPrivateFieldGet(this, _Role_data, "f").role_id;
|
|
71
|
+
}
|
|
72
|
+
/**
|
|
73
|
+
* @return {RoleInfo} the cached properties of this role. The cached properties
|
|
74
|
+
* reflect the state of the last fetch or update (e.g., after awaiting
|
|
75
|
+
* `Role.enabled()` or `Role.disable()`).
|
|
76
|
+
*/
|
|
77
|
+
get cached() {
|
|
78
|
+
return __classPrivateFieldGet(this, _Role_data, "f");
|
|
79
|
+
}
|
|
80
|
+
/** Delete the role. */
|
|
81
|
+
async delete() {
|
|
82
|
+
await __classPrivateFieldGet(this, _Role_csc, "f").roleDelete(this.id);
|
|
83
|
+
}
|
|
84
|
+
/** Is the role enabled? */
|
|
85
|
+
async enabled() {
|
|
86
|
+
const data = await this.fetch();
|
|
87
|
+
return data.enabled;
|
|
88
|
+
}
|
|
89
|
+
/** Enable the role. */
|
|
90
|
+
async enable() {
|
|
91
|
+
await this.update({ enabled: true });
|
|
92
|
+
}
|
|
93
|
+
/** Disable the role. */
|
|
94
|
+
async disable() {
|
|
95
|
+
await this.update({ enabled: false });
|
|
96
|
+
}
|
|
97
|
+
/**
|
|
98
|
+
* Set new policy (overwriting any policies previously set for this role)
|
|
99
|
+
* @param {RolePolicy} policy The new policy to set
|
|
100
|
+
*/
|
|
101
|
+
async setPolicy(policy) {
|
|
102
|
+
await this.update({ policy: policy });
|
|
103
|
+
}
|
|
104
|
+
/**
|
|
105
|
+
* Append to existing role policy. This append is not atomic---it uses
|
|
106
|
+
* {@link policy} to fetch the current policy and then {@link setPolicy}
|
|
107
|
+
* to set the policy---and should not be used in across concurrent sessions.
|
|
108
|
+
*
|
|
109
|
+
* @param {RolePolicy} policy The policy to append to the existing one.
|
|
110
|
+
*/
|
|
111
|
+
async appendPolicy(policy) {
|
|
112
|
+
const existing = await this.policy();
|
|
113
|
+
await this.setPolicy([...existing, ...policy]);
|
|
114
|
+
}
|
|
115
|
+
/**
|
|
116
|
+
* Get the policy for the role.
|
|
117
|
+
* @return {Promise<RolePolicy>} The policy for the role.
|
|
118
|
+
*/
|
|
119
|
+
async policy() {
|
|
120
|
+
const data = await this.fetch();
|
|
121
|
+
return (data.policy ?? []);
|
|
122
|
+
}
|
|
123
|
+
/**
|
|
124
|
+
* The list of all users with access to the role.
|
|
125
|
+
* @example [
|
|
126
|
+
* "User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f",
|
|
127
|
+
* "User#5593c25b-52e2-4fb5-b39b-96d41d681d82"
|
|
128
|
+
* ]
|
|
129
|
+
*
|
|
130
|
+
* @param {PageOpts} page Optional pagination options; by default, retrieves all users.
|
|
131
|
+
*/
|
|
132
|
+
async users(page) {
|
|
133
|
+
const users = await __classPrivateFieldGet(this, _Role_csc, "f").roleUsersList(this.id, page).fetch();
|
|
134
|
+
return (users || []).map((u) => u.user_id);
|
|
135
|
+
}
|
|
136
|
+
/**
|
|
137
|
+
* Add an existing user to an existing role.
|
|
138
|
+
*
|
|
139
|
+
* @param {string} userId The user-id of the user to add to the role.
|
|
140
|
+
*/
|
|
141
|
+
async addUser(userId) {
|
|
142
|
+
await __classPrivateFieldGet(this, _Role_csc, "f").roleUserAdd(this.id, userId);
|
|
143
|
+
}
|
|
144
|
+
/**
|
|
145
|
+
* The list of keys in the role.
|
|
146
|
+
* @example [
|
|
147
|
+
* {
|
|
148
|
+
* id: "Key#bfe3eccb-731e-430d-b1e5-ac1363e6b06b",
|
|
149
|
+
* policy: { TxReceiver: "0x8c594691c0e592ffa21f153a16ae41db5befcaaa" }
|
|
150
|
+
* },
|
|
151
|
+
* ]
|
|
152
|
+
*
|
|
153
|
+
* @param {PageOpts} page Optional pagination options; by default, retrieves all keys in this role.
|
|
154
|
+
*/
|
|
155
|
+
async keys(page) {
|
|
156
|
+
const keysInRole = await __classPrivateFieldGet(this, _Role_csc, "f").roleKeysList(this.id, page).fetch();
|
|
157
|
+
return keysInRole.map((k) => new KeyWithPolicies(__classPrivateFieldGet(this, _Role_csc, "f"), k));
|
|
158
|
+
}
|
|
159
|
+
/**
|
|
160
|
+
* Add a list of existing keys to an existing role.
|
|
161
|
+
*
|
|
162
|
+
* @param {Key[]} keys The list of keys to add to the role.
|
|
163
|
+
* @param {KeyPolicy?} policy The optional policy to apply to each key.
|
|
164
|
+
*/
|
|
165
|
+
async addKeys(keys, policy) {
|
|
166
|
+
await __classPrivateFieldGet(this, _Role_csc, "f").roleKeysAdd(this.id, keys.map((k) => k.id), policy);
|
|
167
|
+
}
|
|
168
|
+
/**
|
|
169
|
+
* Add an existing key to an existing role.
|
|
170
|
+
*
|
|
171
|
+
* @param {Key} key The key to add to the role.
|
|
172
|
+
* @param {KeyPolicy?} policy The optional policy to apply to the key.
|
|
173
|
+
*/
|
|
174
|
+
async addKey(key, policy) {
|
|
175
|
+
await this.addKeys([key], policy);
|
|
176
|
+
}
|
|
177
|
+
/**
|
|
178
|
+
* Remove an existing key from an existing role.
|
|
179
|
+
*
|
|
180
|
+
* @param {Key} key The key to remove from the role.
|
|
181
|
+
*/
|
|
182
|
+
async removeKey(key) {
|
|
183
|
+
await __classPrivateFieldGet(this, _Role_csc, "f").roleKeysRemove(this.id, key.id);
|
|
184
|
+
}
|
|
185
|
+
/**
|
|
186
|
+
* Create a new session for this role.
|
|
187
|
+
* @param {SignerSessionStorage} storage The session storage to use
|
|
188
|
+
* @param {string} purpose Descriptive purpose.
|
|
189
|
+
* @param {SignerSessionLifetime} lifetimes Optional session lifetimes.
|
|
190
|
+
* @param {string[]} scopes Session scopes. Only `sign:*` scopes are allowed.
|
|
191
|
+
* @return {Promise<SignerSession>} New signer session.
|
|
192
|
+
*/
|
|
193
|
+
async createSession(storage, purpose, lifetimes, scopes) {
|
|
194
|
+
const sessionData = await __classPrivateFieldGet(this, _Role_csc, "f").sessionCreateForRole(this.id, purpose, scopes, lifetimes);
|
|
195
|
+
await storage.save(sessionData);
|
|
196
|
+
const manager = await SignerSessionManager.loadFromStorage(storage);
|
|
197
|
+
return new SignerSession(manager);
|
|
198
|
+
}
|
|
199
|
+
/**
|
|
200
|
+
* List all signer sessions for this role. Returned objects can be used to
|
|
201
|
+
* revoke individual sessions, but they cannot be used for authentication.
|
|
202
|
+
*
|
|
203
|
+
* @param {PageOpts} page Optional pagination options; by default, retrieves all sessions.
|
|
204
|
+
* @return {Promise<SignerSessionInfo[]>} Signer sessions for this role.
|
|
205
|
+
*/
|
|
206
|
+
async sessions(page) {
|
|
207
|
+
const sessions = await __classPrivateFieldGet(this, _Role_csc, "f").sessionsList(this.id, page).fetch();
|
|
208
|
+
return sessions.map((t) => new SignerSessionInfo(__classPrivateFieldGet(this, _Role_csc, "f"), t.session_id, t.purpose));
|
|
209
|
+
}
|
|
210
|
+
// --------------------------------------------------------------------------
|
|
211
|
+
// -- INTERNAL --------------------------------------------------------------
|
|
212
|
+
// --------------------------------------------------------------------------
|
|
213
|
+
/**
|
|
214
|
+
* Constructor.
|
|
215
|
+
* @param {CubeSignerClient} csc The CubeSigner instance to use for signing.
|
|
216
|
+
* @param {RoleInfo} data The JSON response from the API server.
|
|
217
|
+
* @internal
|
|
218
|
+
*/
|
|
219
|
+
constructor(csc, data) {
|
|
220
|
+
_Role_csc.set(this, void 0);
|
|
221
|
+
/** The role information */
|
|
222
|
+
_Role_data.set(this, void 0);
|
|
223
|
+
__classPrivateFieldSet(this, _Role_csc, csc, "f");
|
|
224
|
+
__classPrivateFieldSet(this, _Role_data, data, "f");
|
|
225
|
+
}
|
|
226
|
+
/**
|
|
227
|
+
* Update the role.
|
|
228
|
+
*
|
|
229
|
+
* @param {UpdateRoleRequest} request The JSON request to send to the API server.
|
|
230
|
+
* @return {Promise<RoleInfo>} The updated role information.
|
|
231
|
+
*/
|
|
232
|
+
async update(request) {
|
|
233
|
+
__classPrivateFieldSet(this, _Role_data, await __classPrivateFieldGet(this, _Role_csc, "f").roleUpdate(this.id, request), "f");
|
|
234
|
+
return __classPrivateFieldGet(this, _Role_data, "f");
|
|
235
|
+
}
|
|
236
|
+
/**
|
|
237
|
+
* Fetches the role information.
|
|
238
|
+
*
|
|
239
|
+
* @return {RoleInfo} The role information.
|
|
240
|
+
* @internal
|
|
241
|
+
*/
|
|
242
|
+
async fetch() {
|
|
243
|
+
__classPrivateFieldSet(this, _Role_data, await __classPrivateFieldGet(this, _Role_csc, "f").roleGet(this.id), "f");
|
|
244
|
+
return __classPrivateFieldGet(this, _Role_data, "f");
|
|
245
|
+
}
|
|
246
|
+
}
|
|
247
|
+
_Role_csc = new WeakMap(), _Role_data = new WeakMap();
|
|
248
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"role.js","sourceRoot":"","sources":["../../../src/role.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,OAAO,EACL,GAAG,EAKH,aAAa,EACb,iBAAiB,EAEjB,oBAAoB,GAGrB,MAAM,GAAG,CAAC;AAUX,qCAAqC;AACrC,MAAM,CAAN,IAAY,eAKX;AALD,WAAY,eAAe;IACzB,iCAAiC;IACjC,+DAAS,CAAA;IACT,+BAA+B;IAC/B,2DAAO,CAAA;AACT,CAAC,EALW,eAAe,KAAf,eAAe,QAK1B;AA6BD,mDAAmD;AACnD,MAAM,CAAN,IAAY,aAOX;AAPD,WAAY,aAAa;IACvB,sCAAqB,CAAA;IACrB,qCAAoB,CAAA;IACpB,sCAAqB,CAAA;IACrB,wCAAuB,CAAA;IACvB,4CAA2B,CAAA;IAC3B,0CAAyB,CAAA;AAC3B,CAAC,EAPW,aAAa,KAAb,aAAa,QAOxB;AAwCD,6BAA6B;AAC7B,MAAM,CAAC,MAAM,mBAAmB,GAAG,qBAA8B,CAAC;AAGlE,4BAA4B;AAC5B,MAAM,CAAC,MAAM,kBAAkB,GAAG,oBAA6B,CAAC;AAGhE,4BAA4B;AAC5B,MAAM,CAAC,MAAM,kBAAkB,GAAG,oBAA6B,CAAC;AAwChE,iCAAiC;AACjC,MAAM,OAAO,eAAe;IAK1B,qCAAqC;IACrC,KAAK,CAAC,MAAM;QACV,MAAM,OAAO,GAAG,MAAM,uBAAA,IAAI,4BAAK,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QACnD,OAAO,IAAI,GAAG,CAAC,uBAAA,IAAI,4BAAK,EAAE,OAAO,CAAC,CAAC;IACrC,CAAC;IAED;;;;;OAKG;IACH,YAAY,GAAqB,EAAE,eAAoC;QAhB9D,uCAAuB;QAiB9B,uBAAA,IAAI,wBAAQ,GAAG,MAAA,CAAC;QAChB,IAAI,CAAC,KAAK,GAAG,eAAe,CAAC,MAAM,CAAC;QACpC,IAAI,CAAC,MAAM,GAAG,eAAe,CAAC,MAA8B,CAAC;IAC/D,CAAC;CACF;;AAED,aAAa;AACb,MAAM,OAAO,IAAI;IAKf,uCAAuC;IACvC,IAAI,IAAI;QACN,OAAO,uBAAA,IAAI,kBAAM,CAAC,IAAI,IAAI,SAAS,CAAC;IACtC,CAAC;IAED;;;OAGG;IACH,IAAI,EAAE;QACJ,OAAO,uBAAA,IAAI,kBAAM,CAAC,OAAO,CAAC;IAC5B,CAAC;IAED;;;;OAIG;IACH,IAAI,MAAM;QACR,OAAO,uBAAA,IAAI,kBAAM,CAAC;IACpB,CAAC;IAED,uBAAuB;IACvB,KAAK,CAAC,MAAM;QACV,MAAM,uBAAA,IAAI,iBAAK,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;IACtC,CAAC;IAED,2BAA2B;IAC3B,KAAK,CAAC,OAAO;QACX,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,KAAK,EAAE,CAAC;QAChC,OAAO,IAAI,CAAC,OAAO,CAAC;IACtB,CAAC;IAED,uBAAuB;IACvB,KAAK,CAAC,MAAM;QACV,MAAM,IAAI,CAAC,MAAM,CAAC,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC,CAAC;IACvC,CAAC;IAED,wBAAwB;IACxB,KAAK,CAAC,OAAO;QACX,MAAM,IAAI,CAAC,MAAM,CAAC,EAAE,OAAO,EAAE,KAAK,EAAE,CAAC,CAAC;IACxC,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,SAAS,CAAC,MAAkB;QAChC,MAAM,IAAI,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,MAA4C,EAAE,CAAC,CAAC;IAC9E,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,YAAY,CAAC,MAAkB;QACnC,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,EAAE,CAAC;QACrC,MAAM,IAAI,CAAC,SAAS,CAAC,CAAC,GAAG,QAAQ,EAAE,GAAG,MAAM,CAAC,CAAC,CAAC;IACjD,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,MAAM;QACV,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,KAAK,EAAE,CAAC;QAChC,OAAO,CAAC,IAAI,CAAC,MAAM,IAAI,EAAE,CAA0B,CAAC;IACtD,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,KAAK,CAAC,IAAe;QACzB,MAAM,KAAK,GAAG,MAAM,uBAAA,IAAI,iBAAK,CAAC,aAAa,CAAC,IAAI,CAAC,EAAE,EAAE,IAAI,CAAC,CAAC,KAAK,EAAE,CAAC;QACnE,OAAO,CAAC,KAAK,IAAI,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC;IAC7C,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO,CAAC,MAAc;QAC1B,MAAM,uBAAA,IAAI,iBAAK,CAAC,WAAW,CAAC,IAAI,CAAC,EAAE,EAAE,MAAM,CAAC,CAAC;IAC/C,CAAC;IAED;;;;;;;;;;OAUG;IACH,KAAK,CAAC,IAAI,CAAC,IAAe;QACxB,MAAM,UAAU,GAAG,MAAM,uBAAA,IAAI,iBAAK,CAAC,YAAY,CAAC,IAAI,CAAC,EAAE,EAAE,IAAI,CAAC,CAAC,KAAK,EAAE,CAAC;QACvE,OAAO,UAAU,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,IAAI,eAAe,CAAC,uBAAA,IAAI,iBAAK,EAAE,CAAC,CAAC,CAAC,CAAC;IAClE,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,OAAO,CAAC,IAAW,EAAE,MAAkB;QAC3C,MAAM,uBAAA,IAAI,iBAAK,CAAC,WAAW,CACzB,IAAI,CAAC,EAAE,EACP,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC,EACrB,MAAM,CACP,CAAC;IACJ,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,MAAM,CAAC,GAAQ,EAAE,MAAkB;QACvC,MAAM,IAAI,CAAC,OAAO,CAAC,CAAC,GAAG,CAAC,EAAE,MAAM,CAAC,CAAC;IACpC,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,SAAS,CAAC,GAAQ;QACtB,MAAM,uBAAA,IAAI,iBAAK,CAAC,cAAc,CAAC,IAAI,CAAC,EAAE,EAAE,GAAG,CAAC,EAAE,CAAC,CAAC;IAClD,CAAC;IAED;;;;;;;OAOG;IACH,KAAK,CAAC,aAAa,CACjB,OAA6B,EAC7B,OAAe,EACf,SAAiC,EACjC,MAAiB;QAEjB,MAAM,WAAW,GAAG,MAAM,uBAAA,IAAI,iBAAK,CAAC,oBAAoB,CAAC,IAAI,CAAC,EAAE,EAAE,OAAO,EAAE,MAAM,EAAE,SAAS,CAAC,CAAC;QAC9F,MAAM,OAAO,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;QAChC,MAAM,OAAO,GAAG,MAAM,oBAAoB,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACpE,OAAO,IAAI,aAAa,CAAC,OAAO,CAAC,CAAC;IACpC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,QAAQ,CAAC,IAAe;QAC5B,MAAM,QAAQ,GAAG,MAAM,uBAAA,IAAI,iBAAK,CAAC,YAAY,CAAC,IAAI,CAAC,EAAE,EAAE,IAAI,CAAC,CAAC,KAAK,EAAE,CAAC;QACrE,OAAO,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,IAAI,iBAAiB,CAAC,uBAAA,IAAI,iBAAK,EAAE,CAAC,CAAC,UAAU,EAAE,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC;IACxF,CAAC;IAED,6EAA6E;IAC7E,6EAA6E;IAC7E,6EAA6E;IAE7E;;;;;OAKG;IACH,YAAY,GAAqB,EAAE,IAAc;QA9LxC,4BAAuB;QAChC,2BAA2B;QAC3B,6BAAgB;QA6Ld,uBAAA,IAAI,aAAQ,GAAG,MAAA,CAAC;QAChB,uBAAA,IAAI,cAAS,IAAI,MAAA,CAAC;IACpB,CAAC;IAED;;;;;OAKG;IACK,KAAK,CAAC,MAAM,CAAC,OAA0B;QAC7C,uBAAA,IAAI,cAAS,MAAM,uBAAA,IAAI,iBAAK,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,EAAE,OAAO,CAAC,MAAA,CAAC;QAC1D,OAAO,uBAAA,IAAI,kBAAM,CAAC;IACpB,CAAC;IAED;;;;;OAKG;IACK,KAAK,CAAC,KAAK;QACjB,uBAAA,IAAI,cAAS,MAAM,uBAAA,IAAI,iBAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC,MAAA,CAAC;QAC9C,OAAO,uBAAA,IAAI,kBAAM,CAAC;IACpB,CAAC;CACF","sourcesContent":["import {\n  Key,\n  KeyWithPoliciesInfo,\n  MfaType,\n  PageOpts,\n  RoleInfo,\n  SignerSession,\n  SignerSessionInfo,\n  SignerSessionLifetime,\n  SignerSessionManager,\n  SignerSessionStorage,\n  UpdateRoleRequest,\n} from \".\";\nimport { CubeSignerClient } from \"./client\";\n\n/**\n * Restrict transaction receiver.\n *\n * @example { TxReceiver: \"0x8c594691c0e592ffa21f153a16ae41db5befcaaa\" }\n */\nexport type TxReceiver = { TxReceiver: string };\n\n/** The kind of deposit contracts. */\nexport enum DepositContract {\n  /** Canonical deposit contract */\n  Canonical, // eslint-disable-line no-unused-vars\n  /** Wrapper deposit contract */\n  Wrapper, // eslint-disable-line no-unused-vars\n}\n\n/** Restrict transactions to calls to deposit contract. */\nexport type TxDeposit = TxDepositBase | TxDepositPubkey | TxDepositRole;\n\n/** Restrict transactions to calls to deposit contract*/\nexport type TxDepositBase = { TxDeposit: { kind: DepositContract } };\n\n/**\n * Restrict transactions to calls to deposit contract with fixed validator (pubkey):\n *\n * @example { TxDeposit: { kind: DespositContract.Canonical, validator: { pubkey: \"8879...8\"} }}\n */\nexport type TxDepositPubkey = { TxDeposit: { kind: DepositContract; pubkey: string } };\n\n/**\n * Restrict transactions to calls to deposit contract with any validator key in a role:\n *\n * @example { TxDeposit: { kind: DespositContract.Canonical, validator: { role_id: \"Role#c63...af\"} }}\n */\nexport type TxDepositRole = { TxDeposit: { kind: DepositContract; role_id: string } };\n\n/**\n * Only allow connections from clients whose IP addresses match any of these IPv4 CIDR blocks.\n *\n * @example { SourceIpAllowlist: [ \"123.456.78.9/16\" ] }\n */\nexport type SourceIpAllowlist = { SourceIpAllowlist: string[] };\n\n/** All different kinds of sensitive operations. */\nexport enum OperationKind {\n  BlobSign = \"BlobSign\", // eslint-disable-line no-unused-vars\n  EvmSign = \"Eth1Sign\", // eslint-disable-line no-unused-vars\n  Eth2Sign = \"Eth2Sign\", // eslint-disable-line no-unused-vars\n  Eth2Stake = \"Eth2Stake\", // eslint-disable-line no-unused-vars\n  Eth2Unstake = \"Eth2Unstake\", // eslint-disable-line no-unused-vars\n  SolanaSign = \"SolanaSign\", // eslint-disable-line no-unused-vars\n}\n\n/**\n * MFA policy\n *\n * @example {\n * {\n *   count: 1,\n *   num_auth_factors: 1,\n *   allowed_mfa_types: [ \"Totp\" ],\n *   allowed_approvers: [ \"User#123\" ],\n * }\n */\nexport type MfaPolicy = {\n  count?: number;\n  num_auth_factors?: number;\n  allowed_approvers?: string[];\n  allowed_mfa_types?: MfaType[];\n  restricted_operations?: OperationKind[];\n};\n\n/**\n * Require MFA for transactions.\n *\n * @example {\n *     RequireMfa: {\n *       count: 1,\n *       allowed_mfa_types: [ \"Totp\" ],\n *       allowed_approvers: [ \"User#123\" ],\n *       restricted_operations: [\n *         \"Eth1Sign\",\n *         \"BlobSign\"\n *       ]\n *     }\n *   }\n */\nexport type RequireMfa = {\n  RequireMfa: MfaPolicy;\n};\n\n/** Allow raw blob signing */\nexport const AllowRawBlobSigning = \"AllowRawBlobSigning\" as const;\nexport type AllowRawBlobSigning = typeof AllowRawBlobSigning;\n\n/** Allow EIP-191 signing */\nexport const AllowEip191Signing = \"AllowEip191Signing\" as const;\nexport type AllowEip191Signing = typeof AllowEip191Signing;\n\n/** Allow EIP-712 signing */\nexport const AllowEip712Signing = \"AllowEip712Signing\" as const;\nexport type AllowEip712Signing = typeof AllowEip712Signing;\n\n/** Key policies that restrict the requests that the signing endpoints accept */\ntype KeyDenyPolicy = TxReceiver | TxDeposit | SourceIpAllowlist | RequireMfa;\n\n/**\n * Key policy\n *\n * @example [\n *   {\n *     \"TxReceiver\": \"0x8c594691c0e592ffa21f153a16ae41db5befcaaa\"\n *   },\n *   {\n *     \"TxDeposit\": {\n *       \"kind\": \"Canonical\"\n *     }\n *   },\n *   {\n *     \"RequireMfa\": {\n *       \"count\": 1,\n *       \"allowed_mfa_types\": [\"CubeSigner\"],\n *       \"restricted_operations\": [\n *         \"Eth1Sign\",\n *         \"BlobSign\"\n *       ]\n *     }\n *   }\n * ]\n */\nexport type KeyPolicy = (\n  | KeyDenyPolicy\n  | AllowRawBlobSigning\n  | AllowEip191Signing\n  | AllowEip712Signing\n)[];\n\n/** Role policy */\nexport type RolePolicy = KeyDenyPolicy[];\n\n/** A key guarded by a policy. */\nexport class KeyWithPolicies {\n  readonly #csc: CubeSignerClient;\n  readonly keyId: string;\n  readonly policy?: KeyPolicy;\n\n  /** @return {Promise<Key>} The key */\n  async getKey(): Promise<Key> {\n    const keyInfo = await this.#csc.keyGet(this.keyId);\n    return new Key(this.#csc, keyInfo);\n  }\n\n  /**\n   * Constructor.\n   * @param {CubeSignerClient} csc The CubeSigner instance to use for signing.\n   * @param {KeyWithPoliciesInfo} keyWithPolicies The key and its policies\n   * @internal\n   */\n  constructor(csc: CubeSignerClient, keyWithPolicies: KeyWithPoliciesInfo) {\n    this.#csc = csc;\n    this.keyId = keyWithPolicies.key_id;\n    this.policy = keyWithPolicies.policy as unknown as KeyPolicy;\n  }\n}\n\n/** Roles. */\nexport class Role {\n  readonly #csc: CubeSignerClient;\n  /** The role information */\n  #data: RoleInfo;\n\n  /** Human-readable name for the role */\n  get name(): string | undefined {\n    return this.#data.name ?? undefined;\n  }\n\n  /**\n   * The ID of the role.\n   * @example Role#bfe3eccb-731e-430d-b1e5-ac1363e6b06b\n   */\n  get id(): string {\n    return this.#data.role_id;\n  }\n\n  /**\n   * @return {RoleInfo} the cached properties of this role. The cached properties\n   * reflect the state of the last fetch or update (e.g., after awaiting\n   * `Role.enabled()` or `Role.disable()`).\n   */\n  get cached(): RoleInfo {\n    return this.#data;\n  }\n\n  /** Delete the role. */\n  async delete(): Promise<void> {\n    await this.#csc.roleDelete(this.id);\n  }\n\n  /** Is the role enabled? */\n  async enabled(): Promise<boolean> {\n    const data = await this.fetch();\n    return data.enabled;\n  }\n\n  /** Enable the role. */\n  async enable() {\n    await this.update({ enabled: true });\n  }\n\n  /** Disable the role. */\n  async disable() {\n    await this.update({ enabled: false });\n  }\n\n  /**\n   * Set new policy (overwriting any policies previously set for this role)\n   * @param {RolePolicy} policy The new policy to set\n   */\n  async setPolicy(policy: RolePolicy) {\n    await this.update({ policy: policy as unknown as Record<string, never>[] });\n  }\n\n  /**\n   * Append to existing role policy. This append is not atomic---it uses\n   * {@link policy} to fetch the current policy and then {@link setPolicy}\n   * to set the policy---and should not be used in across concurrent sessions.\n   *\n   * @param {RolePolicy} policy The policy to append to the existing one.\n   */\n  async appendPolicy(policy: RolePolicy) {\n    const existing = await this.policy();\n    await this.setPolicy([...existing, ...policy]);\n  }\n\n  /**\n   * Get the policy for the role.\n   * @return {Promise<RolePolicy>} The policy for the role.\n   */\n  async policy(): Promise<RolePolicy> {\n    const data = await this.fetch();\n    return (data.policy ?? []) as unknown as RolePolicy;\n  }\n\n  /**\n   * The list of all users with access to the role.\n   * @example [\n   *   \"User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f\",\n   *   \"User#5593c25b-52e2-4fb5-b39b-96d41d681d82\"\n   * ]\n   *\n   * @param {PageOpts} page Optional pagination options; by default, retrieves all users.\n   */\n  async users(page?: PageOpts): Promise<string[]> {\n    const users = await this.#csc.roleUsersList(this.id, page).fetch();\n    return (users || []).map((u) => u.user_id);\n  }\n\n  /**\n   * Add an existing user to an existing role.\n   *\n   * @param {string} userId The user-id of the user to add to the role.\n   */\n  async addUser(userId: string) {\n    await this.#csc.roleUserAdd(this.id, userId);\n  }\n\n  /**\n   * The list of keys in the role.\n   * @example [\n   *    {\n   *     id: \"Key#bfe3eccb-731e-430d-b1e5-ac1363e6b06b\",\n   *     policy: { TxReceiver: \"0x8c594691c0e592ffa21f153a16ae41db5befcaaa\" }\n   *    },\n   *  ]\n   *\n   * @param {PageOpts} page Optional pagination options; by default, retrieves all keys in this role.\n   */\n  async keys(page?: PageOpts): Promise<KeyWithPolicies[]> {\n    const keysInRole = await this.#csc.roleKeysList(this.id, page).fetch();\n    return keysInRole.map((k) => new KeyWithPolicies(this.#csc, k));\n  }\n\n  /**\n   * Add a list of existing keys to an existing role.\n   *\n   * @param {Key[]} keys The list of keys to add to the role.\n   * @param {KeyPolicy?} policy The optional policy to apply to each key.\n   */\n  async addKeys(keys: Key[], policy?: KeyPolicy) {\n    await this.#csc.roleKeysAdd(\n      this.id,\n      keys.map((k) => k.id),\n      policy,\n    );\n  }\n\n  /**\n   * Add an existing key to an existing role.\n   *\n   * @param {Key} key The key to add to the role.\n   * @param {KeyPolicy?} policy The optional policy to apply to the key.\n   */\n  async addKey(key: Key, policy?: KeyPolicy) {\n    await this.addKeys([key], policy);\n  }\n\n  /**\n   * Remove an existing key from an existing role.\n   *\n   * @param {Key} key The key to remove from the role.\n   */\n  async removeKey(key: Key) {\n    await this.#csc.roleKeysRemove(this.id, key.id);\n  }\n\n  /**\n   * Create a new session for this role.\n   * @param {SignerSessionStorage} storage The session storage to use\n   * @param {string} purpose Descriptive purpose.\n   * @param {SignerSessionLifetime} lifetimes Optional session lifetimes.\n   * @param {string[]} scopes Session scopes. Only `sign:*` scopes are allowed.\n   * @return {Promise<SignerSession>} New signer session.\n   */\n  async createSession(\n    storage: SignerSessionStorage,\n    purpose: string,\n    lifetimes?: SignerSessionLifetime,\n    scopes?: string[],\n  ): Promise<SignerSession> {\n    const sessionData = await this.#csc.sessionCreateForRole(this.id, purpose, scopes, lifetimes);\n    await storage.save(sessionData);\n    const manager = await SignerSessionManager.loadFromStorage(storage);\n    return new SignerSession(manager);\n  }\n\n  /**\n   * List all signer sessions for this role. Returned objects can be used to\n   * revoke individual sessions, but they cannot be used for authentication.\n   *\n   * @param {PageOpts} page Optional pagination options; by default, retrieves all sessions.\n   * @return {Promise<SignerSessionInfo[]>} Signer sessions for this role.\n   */\n  async sessions(page?: PageOpts): Promise<SignerSessionInfo[]> {\n    const sessions = await this.#csc.sessionsList(this.id, page).fetch();\n    return sessions.map((t) => new SignerSessionInfo(this.#csc, t.session_id, t.purpose));\n  }\n\n  // --------------------------------------------------------------------------\n  // -- INTERNAL --------------------------------------------------------------\n  // --------------------------------------------------------------------------\n\n  /**\n   * Constructor.\n   * @param {CubeSignerClient} csc The CubeSigner instance to use for signing.\n   * @param {RoleInfo} data The JSON response from the API server.\n   * @internal\n   */\n  constructor(csc: CubeSignerClient, data: RoleInfo) {\n    this.#csc = csc;\n    this.#data = data;\n  }\n\n  /**\n   * Update the role.\n   *\n   * @param {UpdateRoleRequest} request The JSON request to send to the API server.\n   * @return {Promise<RoleInfo>} The updated role information.\n   */\n  private async update(request: UpdateRoleRequest): Promise<RoleInfo> {\n    this.#data = await this.#csc.roleUpdate(this.id, request);\n    return this.#data;\n  }\n\n  /**\n   * Fetches the role information.\n   *\n   * @return {RoleInfo} The role information.\n   * @internal\n   */\n  private async fetch(): Promise<RoleInfo> {\n    this.#data = await this.#csc.roleGet(this.id);\n    return this.#data;\n  }\n}\n"]}
|