@cubist-labs/cubesigner-sdk 0.2.28 → 0.3.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (143) hide show
  1. package/README.md +30 -28
  2. package/dist/cjs/package.json +41 -0
  3. package/dist/cjs/spec/env/beta.json +9 -0
  4. package/dist/cjs/spec/env/gamma.json +9 -0
  5. package/dist/cjs/spec/env/prod.json +9 -0
  6. package/dist/cjs/src/api.d.ts +634 -0
  7. package/dist/cjs/src/api.js +1309 -0
  8. package/dist/cjs/src/client.d.ts +575 -0
  9. package/dist/cjs/src/client.js +378 -0
  10. package/dist/cjs/src/env.d.ts +15 -0
  11. package/dist/cjs/src/env.js +35 -0
  12. package/dist/cjs/src/error.d.ts +29 -0
  13. package/dist/cjs/src/error.js +36 -0
  14. package/dist/cjs/src/events.d.ts +84 -0
  15. package/dist/cjs/src/events.js +195 -0
  16. package/dist/cjs/src/index.d.ts +203 -0
  17. package/dist/cjs/src/index.js +298 -0
  18. package/dist/cjs/src/key.d.ts +152 -0
  19. package/dist/cjs/src/key.js +242 -0
  20. package/dist/{src/fido.d.ts → cjs/src/mfa.d.ts} +33 -15
  21. package/dist/cjs/src/mfa.js +169 -0
  22. package/dist/cjs/src/org.d.ts +99 -0
  23. package/dist/cjs/src/org.js +95 -0
  24. package/dist/cjs/src/paginator.d.ts +76 -0
  25. package/dist/cjs/src/paginator.js +99 -0
  26. package/dist/cjs/src/response.d.ts +101 -0
  27. package/dist/cjs/src/response.js +164 -0
  28. package/dist/cjs/src/role.d.ts +283 -0
  29. package/dist/cjs/src/role.js +253 -0
  30. package/dist/cjs/src/schema.d.ts +6209 -0
  31. package/dist/cjs/src/schema.js +7 -0
  32. package/dist/cjs/src/schema_types.d.ts +113 -0
  33. package/dist/cjs/src/schema_types.js +3 -0
  34. package/dist/cjs/src/session/session_storage.d.ts +27 -0
  35. package/dist/cjs/src/session/session_storage.js +47 -0
  36. package/dist/cjs/src/session/signer_session_manager.d.ts +125 -0
  37. package/dist/cjs/src/session/signer_session_manager.js +239 -0
  38. package/dist/cjs/src/signer_session.d.ts +41 -0
  39. package/dist/cjs/src/signer_session.js +77 -0
  40. package/dist/cjs/src/user_export.d.ts +52 -0
  41. package/dist/cjs/src/user_export.js +129 -0
  42. package/dist/cjs/src/util.d.ts +56 -0
  43. package/dist/cjs/src/util.js +86 -0
  44. package/dist/esm/package.json +41 -0
  45. package/dist/esm/spec/env/beta.json +9 -0
  46. package/dist/esm/spec/env/gamma.json +9 -0
  47. package/dist/esm/spec/env/prod.json +9 -0
  48. package/dist/esm/src/api.d.ts +634 -0
  49. package/dist/esm/src/api.js +1299 -0
  50. package/dist/esm/src/client.d.ts +575 -0
  51. package/dist/esm/src/client.js +374 -0
  52. package/dist/esm/src/env.d.ts +15 -0
  53. package/dist/esm/src/env.js +9 -0
  54. package/dist/esm/src/error.d.ts +29 -0
  55. package/dist/esm/src/error.js +31 -0
  56. package/dist/esm/src/events.d.ts +84 -0
  57. package/dist/esm/src/events.js +189 -0
  58. package/dist/esm/src/index.d.ts +203 -0
  59. package/dist/esm/src/index.js +276 -0
  60. package/dist/esm/src/key.d.ts +152 -0
  61. package/dist/esm/src/key.js +236 -0
  62. package/dist/esm/src/mfa.d.ts +94 -0
  63. package/dist/esm/src/mfa.js +163 -0
  64. package/dist/esm/src/org.d.ts +99 -0
  65. package/dist/esm/src/org.js +91 -0
  66. package/dist/esm/src/paginator.d.ts +76 -0
  67. package/dist/esm/src/paginator.js +94 -0
  68. package/dist/esm/src/response.d.ts +101 -0
  69. package/dist/esm/src/response.js +159 -0
  70. package/dist/esm/src/role.d.ts +283 -0
  71. package/dist/esm/src/role.js +248 -0
  72. package/dist/esm/src/schema.d.ts +6209 -0
  73. package/dist/esm/src/schema.js +6 -0
  74. package/dist/esm/src/schema_types.d.ts +113 -0
  75. package/dist/esm/src/schema_types.js +2 -0
  76. package/dist/esm/src/session/session_storage.d.ts +27 -0
  77. package/dist/esm/src/session/session_storage.js +43 -0
  78. package/dist/esm/src/session/signer_session_manager.d.ts +125 -0
  79. package/dist/esm/src/session/signer_session_manager.js +235 -0
  80. package/dist/esm/src/signer_session.d.ts +41 -0
  81. package/dist/esm/src/signer_session.js +72 -0
  82. package/dist/esm/src/user_export.d.ts +52 -0
  83. package/dist/esm/src/user_export.js +99 -0
  84. package/dist/esm/src/util.d.ts +56 -0
  85. package/dist/esm/src/util.js +76 -0
  86. package/dist/package.json +13 -45
  87. package/dist/src/api.d.ts +29 -1
  88. package/dist/src/api.js +66 -1
  89. package/dist/src/client.d.ts +35 -14
  90. package/dist/src/client.js +12 -8
  91. package/dist/src/events.js +1 -1
  92. package/dist/src/index.d.ts +6 -11
  93. package/dist/src/index.js +9 -25
  94. package/dist/src/key.d.ts +18 -7
  95. package/dist/src/key.js +52 -19
  96. package/dist/src/role.d.ts +46 -3
  97. package/dist/src/role.js +60 -8
  98. package/dist/src/schema.d.ts +206 -72
  99. package/dist/src/schema.js +1 -1
  100. package/dist/src/schema_types.d.ts +3 -0
  101. package/dist/src/schema_types.js +1 -1
  102. package/dist/src/session/signer_session_manager.d.ts +38 -14
  103. package/dist/src/session/signer_session_manager.js +93 -33
  104. package/dist/src/util.d.ts +14 -0
  105. package/dist/src/util.js +24 -27
  106. package/package.json +19 -46
  107. package/src/api.ts +79 -0
  108. package/src/client.ts +12 -8
  109. package/src/events.ts +2 -0
  110. package/src/index.ts +10 -24
  111. package/src/key.ts +36 -18
  112. package/src/role.ts +78 -7
  113. package/src/schema.ts +269 -110
  114. package/src/schema_types.ts +3 -0
  115. package/src/session/session_storage.ts +0 -32
  116. package/src/session/signer_session_manager.ts +124 -36
  117. package/src/util.ts +19 -10
  118. package/tsconfig.json +1 -21
  119. package/LICENSE-APACHE +0 -177
  120. package/LICENSE-MIT +0 -25
  121. package/NOTICE +0 -13
  122. package/dist/examples/ethers.d.ts +0 -1
  123. package/dist/examples/ethers.js +0 -142
  124. package/dist/src/ethers/index.d.ts +0 -95
  125. package/dist/src/ethers/index.js +0 -215
  126. package/dist/src/fido.js +0 -148
  127. package/dist/src/session/cognito_manager.d.ts +0 -71
  128. package/dist/src/session/cognito_manager.js +0 -129
  129. package/dist/src/session/generic.d.ts +0 -47
  130. package/dist/src/session/generic.js +0 -3
  131. package/dist/src/session/management_session_manager.d.ts +0 -59
  132. package/dist/src/session/management_session_manager.js +0 -111
  133. package/dist/src/session/oidc_session_manager.d.ts +0 -78
  134. package/dist/src/session/oidc_session_manager.js +0 -142
  135. package/dist/src/session/session_manager.d.ts +0 -99
  136. package/dist/src/session/session_manager.js +0 -136
  137. package/dist/src/sign.d.ts +0 -114
  138. package/dist/src/sign.js +0 -248
  139. package/dist/test/sessions.d.ts +0 -35
  140. package/dist/test/sessions.js +0 -56
  141. package/src/ethers/index.ts +0 -253
  142. package/src/session/cognito_manager.ts +0 -161
  143. package/src/session/session_manager.ts +0 -165
@@ -0,0 +1,113 @@
1
+ import { MfaPolicy } from "./role";
2
+ import { components } from "./schema";
3
+ import { JsonMap } from "./util";
4
+ type schemas = components["schemas"];
5
+ export type UserInfo = schemas["UserInfo"];
6
+ export type ConfiguredMfa = schemas["ConfiguredMfa"];
7
+ export type RatchetConfig = schemas["RatchetConfig"];
8
+ export type IdentityProof = schemas["IdentityProof"];
9
+ export type TotpInfo = schemas["TotpInfo"];
10
+ export type OidcAuthResponse = schemas["NewSessionResponse"];
11
+ export type ApiAddFidoChallenge = schemas["FidoCreateChallengeResponse"];
12
+ export type ApiMfaFidoChallenge = schemas["FidoAssertChallenge"];
13
+ export type PublicKeyCredentialCreationOptions = schemas["PublicKeyCredentialCreationOptions"];
14
+ export type PublicKeyCredentialRequestOptions = schemas["PublicKeyCredentialRequestOptions"];
15
+ export type PublicKeyCredentialParameters = schemas["PublicKeyCredentialParameters"];
16
+ export type PublicKeyCredentialDescriptor = schemas["PublicKeyCredentialDescriptor"];
17
+ export type AuthenticatorSelectionCriteria = schemas["AuthenticatorSelectionCriteria"];
18
+ export type PublicKeyCredentialUserEntity = schemas["PublicKeyCredentialUserEntity"];
19
+ export type PublicKeyCredential = schemas["PublicKeyCredential"];
20
+ export type OrgInfo = schemas["OrgInfo"];
21
+ export type UserIdInfo = schemas["UserIdInfo"];
22
+ export type UpdateOrgRequest = schemas["UpdateOrgRequest"];
23
+ export type UpdateOrgResponse = schemas["UpdateOrgResponse"];
24
+ export type OidcIdentity = schemas["OIDCIdentity"];
25
+ export type MemberRole = schemas["MemberRole"];
26
+ export type SchemaKeyType = schemas["KeyType"];
27
+ export type ListKeysResponse = schemas["PaginatedListKeysResponse"];
28
+ export type UpdateKeyRequest = schemas["UpdateKeyRequest"];
29
+ export type KeyInfoApi = schemas["KeyInfo"];
30
+ export type KeyInRoleInfo = schemas["KeyInRoleInfo"];
31
+ export type UserInRoleInfo = schemas["UserInRoleInfo"];
32
+ export type KeyTypeApi = schemas["KeyType"];
33
+ export type ListRolesResponse = schemas["PaginatedListRolesResponse"];
34
+ export type ListRoleKeysResponse = schemas["PaginatedListRoleKeysResponse"];
35
+ export type ListRoleUsersResponse = schemas["PaginatedListRoleUsersResponse"];
36
+ export type UpdateRoleRequest = schemas["UpdateRoleRequest"];
37
+ export type KeyWithPoliciesInfo = schemas["KeyInRoleInfo"];
38
+ export type RoleInfo = schemas["RoleInfo"];
39
+ export type SessionInfo = schemas["SessionInfo"];
40
+ export type ClientSessionInfo = schemas["ClientSessionInfo"];
41
+ export type NewSessionResponse = schemas["NewSessionResponse"];
42
+ export type SessionsResponse = schemas["PaginatedSessionsResponse"];
43
+ export type CreateSignerSessionRequest = schemas["CreateTokenRequest"];
44
+ export type RefreshSignerSessionRequest = schemas["AuthData"];
45
+ export type EvmSignRequest = schemas["Eth1SignRequest"];
46
+ export type EvmSignResponse = schemas["Eth1SignResponse"];
47
+ export type Eip191SignRequest = schemas["Eip191SignRequest"];
48
+ export type Eip712SignRequest = schemas["Eip712SignRequest"];
49
+ export type Eip191Or712SignResponse = schemas["Eip191Or712SignResponse"];
50
+ export type Eth2SignRequest = schemas["Eth2SignRequest"];
51
+ export type Eth2SignResponse = schemas["Eth2SignResponse"];
52
+ export type Eth2StakeRequest = schemas["StakeRequest"];
53
+ export type Eth2StakeResponse = schemas["StakeResponse"];
54
+ export type Eth2UnstakeRequest = schemas["UnstakeRequest"];
55
+ export type Eth2UnstakeResponse = schemas["UnstakeResponse"];
56
+ export type BlobSignRequest = schemas["BlobSignRequest"];
57
+ export type BlobSignResponse = schemas["BlobSignResponse"];
58
+ export type BtcSignRequest = schemas["BtcSignRequest"];
59
+ export type BtcSignResponse = schemas["BtcSignResponse"];
60
+ export type SolanaSignRequest = schemas["SolanaSignRequest"];
61
+ export type SolanaSignResponse = schemas["SolanaSignResponse"];
62
+ export type AvaSignRequest = schemas["AvaSignRequest"];
63
+ export type AvaSignResponse = schemas["AvaSignResponse"];
64
+ export type AcceptedResponse = schemas["AcceptedResponse"];
65
+ export type ErrorResponse = schemas["ErrorResponse"];
66
+ export type BtcSignatureKind = schemas["BtcSignatureKind"];
67
+ export type MfaType = schemas["MfaType"];
68
+ export type MfaRequestInfo = schemas["MfaRequestInfo"];
69
+ export type UserExportInitRequest = schemas["UserExportInitRequest"];
70
+ export type UserExportInitResponse = schemas["UserExportInitResponse"];
71
+ export type UserExportCompleteRequest = schemas["UserExportCompleteRequest"];
72
+ export type UserExportCompleteResponse = schemas["UserExportCompleteResponse"];
73
+ export type UserExportListResponse = schemas["PaginatedUserExportListResponse"];
74
+ export type UserExportKeyMaterial = schemas["JsonKeyPackage"];
75
+ export type Empty = schemas["EmptyImpl"];
76
+ /** Options for a new OIDC user */
77
+ export interface CreateOidcUserOptions {
78
+ /** The role of an OIDC user, default is "Alien" */
79
+ memberRole?: MemberRole;
80
+ /** Optional MFA policy to associate with the user account */
81
+ mfaPolicy?: MfaPolicy;
82
+ }
83
+ /** Ava P- or X-chain transaction */
84
+ export type AvaTx = {
85
+ P: AvaPChainTx;
86
+ } | {
87
+ X: AvaXChainTx;
88
+ };
89
+ /** Ava P-chain transaction */
90
+ export type AvaPChainTx = {
91
+ AddPermissionlessValidator: JsonMap;
92
+ } | {
93
+ AddSubnetValidator: JsonMap;
94
+ } | {
95
+ AddValidator: JsonMap;
96
+ } | {
97
+ CreateChain: JsonMap;
98
+ } | {
99
+ CreateSubnet: JsonMap;
100
+ } | {
101
+ Export: JsonMap;
102
+ } | {
103
+ Import: JsonMap;
104
+ };
105
+ /** Ava X-chain transaction */
106
+ export type AvaXChainTx = {
107
+ Base: JsonMap;
108
+ } | {
109
+ Export: JsonMap;
110
+ } | {
111
+ Import: JsonMap;
112
+ };
113
+ export {};
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,27 @@
1
+ /** Interface for storing sessions. */
2
+ export interface SessionStorage<U> {
3
+ /** Store session information */
4
+ save(data: U): Promise<void>;
5
+ /** Retrieve session information */
6
+ retrieve(): Promise<U>;
7
+ }
8
+ /** Stores session information in memory */
9
+ export declare class MemorySessionStorage<U> implements SessionStorage<U> {
10
+ #private;
11
+ /**
12
+ * Store session information.
13
+ * @param {U} data The session information to store
14
+ * @return {Promise<void>}
15
+ */
16
+ save(data: U): Promise<void>;
17
+ /**
18
+ * Retrieve session information.
19
+ * @return {Promise<U>} The session information
20
+ */
21
+ retrieve(): Promise<U>;
22
+ /**
23
+ * Constructor.
24
+ * @param {U?} data The initial data
25
+ */
26
+ constructor(data?: U);
27
+ }
@@ -0,0 +1,43 @@
1
+ var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
2
+ if (kind === "m") throw new TypeError("Private method is not writable");
3
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
4
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
5
+ return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
6
+ };
7
+ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
8
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
9
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
10
+ return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
11
+ };
12
+ var _MemorySessionStorage_data;
13
+ /** Stores session information in memory */
14
+ export class MemorySessionStorage {
15
+ /**
16
+ * Store session information.
17
+ * @param {U} data The session information to store
18
+ * @return {Promise<void>}
19
+ */
20
+ async save(data) {
21
+ __classPrivateFieldSet(this, _MemorySessionStorage_data, data, "f");
22
+ }
23
+ /**
24
+ * Retrieve session information.
25
+ * @return {Promise<U>} The session information
26
+ */
27
+ async retrieve() {
28
+ if (!__classPrivateFieldGet(this, _MemorySessionStorage_data, "f")) {
29
+ throw new Error("Missing session information");
30
+ }
31
+ return __classPrivateFieldGet(this, _MemorySessionStorage_data, "f");
32
+ }
33
+ /**
34
+ * Constructor.
35
+ * @param {U?} data The initial data
36
+ */
37
+ constructor(data) {
38
+ _MemorySessionStorage_data.set(this, void 0);
39
+ __classPrivateFieldSet(this, _MemorySessionStorage_data, data, "f");
40
+ }
41
+ }
42
+ _MemorySessionStorage_data = new WeakMap();
43
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,125 @@
1
+ import { Events } from "../events";
2
+ import { EnvInterface } from "../env";
3
+ import { Client } from "../api";
4
+ import { SessionStorage } from "./session_storage";
5
+ import { ClientSessionInfo, NewSessionResponse } from "../schema_types";
6
+ import { operations } from "../schema";
7
+ /** JSON representation of our "signer session" file format */
8
+ export interface SignerSessionData {
9
+ /** The organization ID */
10
+ org_id: string;
11
+ /** The role ID */
12
+ role_id?: string;
13
+ /** The purpose of the session token */
14
+ purpose?: string;
15
+ /** The token to include in Authorization header */
16
+ token: string;
17
+ /** Session info */
18
+ session_info: ClientSessionInfo;
19
+ /** Session expiration (in seconds since UNIX epoch) beyond which it cannot be refreshed */
20
+ session_exp: number | undefined;
21
+ /** The environment */
22
+ env: {
23
+ ["Dev-CubeSignerStack"]: EnvInterface;
24
+ };
25
+ }
26
+ /** Type of storage required for signer sessions */
27
+ export type SignerSessionStorage = SessionStorage<SignerSessionData>;
28
+ export interface SignerSessionLifetime {
29
+ /** Session lifetime (in seconds). Defaults to one week (604800). */
30
+ session?: number;
31
+ /** Auth token lifetime (in seconds). Defaults to five minutes (300). */
32
+ auth: number;
33
+ /** Refresh token lifetime (in seconds). Defaults to one day (86400). */
34
+ refresh?: number;
35
+ /** Grace lifetime (in seconds). Defaults to 30 seconds (30). */
36
+ grace?: number;
37
+ }
38
+ /** Generic session manager interface. */
39
+ export declare class SignerSessionManager {
40
+ #private;
41
+ readonly env: EnvInterface;
42
+ readonly orgId: string;
43
+ readonly storage: SignerSessionStorage;
44
+ readonly events: Events;
45
+ /**
46
+ * @return {string} The current auth token.
47
+ * @internal
48
+ */
49
+ token(): Promise<string>;
50
+ /**
51
+ * Refreshes the current session if needed, then returns a client using the current session.
52
+ *
53
+ * May **UPDATE/MUTATE** self.
54
+ *
55
+ * @param {operations} operation The operation that this client will be
56
+ * used for. This parameter is used exclusively for more accurate error
57
+ * reporting and does not affect functionality.
58
+ * @return {Client} The client with the current session
59
+ */
60
+ client(operation?: keyof operations): Promise<Client>;
61
+ /** Revokes the session. */
62
+ revoke(): Promise<void>;
63
+ /**
64
+ * Refreshes the session and **UPDATES/MUTATES** self.
65
+ */
66
+ refresh(): Promise<void>;
67
+ /**
68
+ * Returns whether it's time to refresh this token.
69
+ * @return {boolean} Whether it's time to refresh this token.
70
+ * @internal
71
+ */
72
+ isStale(): Promise<boolean>;
73
+ /**
74
+ * Return whether this session has expired and cannot be refreshed anymore.
75
+ * @return {boolean} Whether this session has expired.
76
+ * @internal
77
+ */
78
+ hasExpired(): boolean;
79
+ /**
80
+ * Refreshes the session if it is about to expire.
81
+ * @return {boolean} Whether the session token was refreshed.
82
+ * @internal
83
+ */
84
+ refreshIfNeeded(): Promise<boolean>;
85
+ /**
86
+ * Automatically refreshes the session in the background (if needed) every
87
+ * minute. This is a simple wrapper around `setInterval`.
88
+ * @return {number} The interval ID of the refresh timer.
89
+ */
90
+ autoRefresh(): RefreshId;
91
+ /**
92
+ * Clears the auto refresh timer.
93
+ * @param {number} timer The timer ID to clear.
94
+ */
95
+ clearAutoRefresh(timer: RefreshId): void;
96
+ /**
97
+ * @param {EnvInterface} env The CubeSigner environment
98
+ * @param {string} orgId The organization ID
99
+ * @param {NewSessionResponse} session The session information.
100
+ * @param {SignerSessionStorage} storage The storage to use for saving the session.
101
+ * @return {Promise<SignerSessionManager>} New signer session manager.
102
+ */
103
+ static createFromSessionInfo(env: EnvInterface, orgId: string, session: NewSessionResponse, storage?: SignerSessionStorage): Promise<SignerSessionManager>;
104
+ /**
105
+ * @param {SignerSessionData} sessionData The session information.
106
+ * @param {SignerSessionStorage} storage The storage to use for saving the session.
107
+ * @return {Promise<SignerSessionManager>} New signer session manager.
108
+ */
109
+ static createFromSessionData(sessionData: SignerSessionData, storage?: SignerSessionStorage): Promise<SignerSessionManager>;
110
+ /**
111
+ * Uses an existing session to create a new signer session manager.
112
+ *
113
+ * @param {SignerSessionStorage} storage The session storage to use
114
+ * @return {Promise<SingerSession>} New signer session manager
115
+ */
116
+ static loadFromStorage(storage: SignerSessionStorage): Promise<SignerSessionManager>;
117
+ /**
118
+ * Constructor.
119
+ * @param {SignerSessionData} sessionData Session data
120
+ * @param {SignerSessionStorage} storage The session storage to use.
121
+ */
122
+ constructor(sessionData: SignerSessionData, storage: SignerSessionStorage);
123
+ }
124
+ /** Type of the refresh timer ID. */
125
+ export type RefreshId = ReturnType<typeof setInterval>;
@@ -0,0 +1,235 @@
1
+ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
2
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
3
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
4
+ return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
5
+ };
6
+ var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
7
+ if (kind === "m") throw new TypeError("Private method is not writable");
8
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
9
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
10
+ return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
11
+ };
12
+ var _SignerSessionManager_instances, _a, _SignerSessionManager_eventEmitter, _SignerSessionManager_refreshing, _SignerSessionManager_client, _SignerSessionManager_createClient, _SignerSessionManager_hasTimestampExpired;
13
+ import { Events } from "../events";
14
+ import { createHttpClient, OpClient } from "../api";
15
+ import { MemorySessionStorage } from "./session_storage";
16
+ import { delay } from "../util";
17
+ import { EventEmitter } from "../events";
18
+ import { SessionExpiredError } from "../error";
19
+ const DEFAULT_EXPIRATION_BUFFER_SECS = 30;
20
+ /**
21
+ * Constructs {@link Date} from a number representing seconds since unix epoch.
22
+ * @param {number} secs Seconds since unix epoch.
23
+ * @return {Date} The equivalent date.
24
+ */
25
+ function secondsSinceEpochToDate(secs) {
26
+ return new Date(secs * 1000);
27
+ }
28
+ /** Generic session manager interface. */
29
+ export class SignerSessionManager {
30
+ /**
31
+ * @return {string} The current auth token.
32
+ * @internal
33
+ */
34
+ async token() {
35
+ const session = await this.storage.retrieve();
36
+ return session.token;
37
+ }
38
+ /**
39
+ * Refreshes the current session if needed, then returns a client using the current session.
40
+ *
41
+ * May **UPDATE/MUTATE** self.
42
+ *
43
+ * @param {operations} operation The operation that this client will be
44
+ * used for. This parameter is used exclusively for more accurate error
45
+ * reporting and does not affect functionality.
46
+ * @return {Client} The client with the current session
47
+ */
48
+ async client(operation) {
49
+ await this.refreshIfNeeded();
50
+ // trigger "session expired" if the session as a whole has expired
51
+ // or if (for whatever reason) the token is still stale
52
+ if (__classPrivateFieldGet(_a, _a, "m", _SignerSessionManager_hasTimestampExpired).call(_a, __classPrivateFieldGet(this, _SignerSessionManager_client, "f").token_exp) || this.hasExpired()) {
53
+ await __classPrivateFieldGet(this, _SignerSessionManager_eventEmitter, "f").emitSessionExpired();
54
+ throw new SessionExpiredError(operation);
55
+ }
56
+ return __classPrivateFieldGet(this, _SignerSessionManager_client, "f").client;
57
+ }
58
+ /** Revokes the session. */
59
+ async revoke() {
60
+ const client = new OpClient("revokeCurrentSession", await this.client(), __classPrivateFieldGet(this, _SignerSessionManager_eventEmitter, "f"));
61
+ await client.del("/v0/org/{org_id}/session/self", {
62
+ params: { path: { org_id: this.orgId } },
63
+ });
64
+ }
65
+ /**
66
+ * Refreshes the session and **UPDATES/MUTATES** self.
67
+ */
68
+ async refresh() {
69
+ if (this.hasExpired()) {
70
+ await __classPrivateFieldGet(this, _SignerSessionManager_eventEmitter, "f").emitSessionExpired();
71
+ throw new SessionExpiredError("signerSessionRefresh");
72
+ }
73
+ const currSession = await this.storage.retrieve();
74
+ const client = new OpClient("signerSessionRefresh", __classPrivateFieldGet(this, _SignerSessionManager_client, "f").client, __classPrivateFieldGet(this, _SignerSessionManager_eventEmitter, "f"));
75
+ const csi = currSession.session_info;
76
+ const data = await client.patch("/v1/org/{org_id}/token/refresh", {
77
+ params: { path: { org_id: this.orgId } },
78
+ body: {
79
+ epoch_num: csi.epoch,
80
+ epoch_token: csi.epoch_token,
81
+ other_token: csi.refresh_token,
82
+ },
83
+ });
84
+ const newSession = {
85
+ ...currSession,
86
+ session_info: data.session_info,
87
+ token: data.token,
88
+ };
89
+ await this.storage.save(newSession);
90
+ __classPrivateFieldSet(this, _SignerSessionManager_client, {
91
+ client: __classPrivateFieldGet(this, _SignerSessionManager_instances, "m", _SignerSessionManager_createClient).call(this, newSession.token),
92
+ token_exp: secondsSinceEpochToDate(newSession.session_info.auth_token_exp),
93
+ session_exp: newSession.session_exp
94
+ ? secondsSinceEpochToDate(newSession.session_exp)
95
+ : undefined,
96
+ }, "f");
97
+ }
98
+ /**
99
+ * Returns whether it's time to refresh this token.
100
+ * @return {boolean} Whether it's time to refresh this token.
101
+ * @internal
102
+ */
103
+ async isStale() {
104
+ return __classPrivateFieldGet(_a, _a, "m", _SignerSessionManager_hasTimestampExpired).call(_a, __classPrivateFieldGet(this, _SignerSessionManager_client, "f").token_exp, DEFAULT_EXPIRATION_BUFFER_SECS);
105
+ }
106
+ /**
107
+ * Return whether this session has expired and cannot be refreshed anymore.
108
+ * @return {boolean} Whether this session has expired.
109
+ * @internal
110
+ */
111
+ hasExpired() {
112
+ return ((__classPrivateFieldGet(this, _SignerSessionManager_client, "f").session_exp || false) &&
113
+ __classPrivateFieldGet(_a, _a, "m", _SignerSessionManager_hasTimestampExpired).call(_a, __classPrivateFieldGet(this, _SignerSessionManager_client, "f").session_exp));
114
+ }
115
+ /**
116
+ * Refreshes the session if it is about to expire.
117
+ * @return {boolean} Whether the session token was refreshed.
118
+ * @internal
119
+ */
120
+ async refreshIfNeeded() {
121
+ if (await this.isStale()) {
122
+ if (__classPrivateFieldGet(this, _SignerSessionManager_refreshing, "f")) {
123
+ // wait until done refreshing
124
+ while (__classPrivateFieldGet(this, _SignerSessionManager_refreshing, "f")) {
125
+ await delay(100);
126
+ }
127
+ return false;
128
+ }
129
+ else {
130
+ // refresh
131
+ __classPrivateFieldSet(this, _SignerSessionManager_refreshing, true, "f");
132
+ try {
133
+ await this.refresh();
134
+ return true;
135
+ }
136
+ finally {
137
+ __classPrivateFieldSet(this, _SignerSessionManager_refreshing, false, "f");
138
+ }
139
+ }
140
+ }
141
+ return false;
142
+ }
143
+ /**
144
+ * Automatically refreshes the session in the background (if needed) every
145
+ * minute. This is a simple wrapper around `setInterval`.
146
+ * @return {number} The interval ID of the refresh timer.
147
+ */
148
+ autoRefresh() {
149
+ return setInterval(async () => {
150
+ await this.refreshIfNeeded();
151
+ }, 60 * 1000);
152
+ }
153
+ /**
154
+ * Clears the auto refresh timer.
155
+ * @param {number} timer The timer ID to clear.
156
+ */
157
+ clearAutoRefresh(timer) {
158
+ clearInterval(timer);
159
+ }
160
+ /**
161
+ * @param {EnvInterface} env The CubeSigner environment
162
+ * @param {string} orgId The organization ID
163
+ * @param {NewSessionResponse} session The session information.
164
+ * @param {SignerSessionStorage} storage The storage to use for saving the session.
165
+ * @return {Promise<SignerSessionManager>} New signer session manager.
166
+ */
167
+ static async createFromSessionInfo(env, orgId, session, storage) {
168
+ const sessionData = {
169
+ env: {
170
+ ["Dev-CubeSignerStack"]: env,
171
+ },
172
+ org_id: orgId,
173
+ token: session.token,
174
+ purpose: "sign via oidc",
175
+ session_info: session.session_info,
176
+ session_exp: session.expiration,
177
+ };
178
+ storage ??= new MemorySessionStorage();
179
+ await storage.save(sessionData);
180
+ return await _a.loadFromStorage(storage);
181
+ }
182
+ /**
183
+ * @param {SignerSessionData} sessionData The session information.
184
+ * @param {SignerSessionStorage} storage The storage to use for saving the session.
185
+ * @return {Promise<SignerSessionManager>} New signer session manager.
186
+ */
187
+ static async createFromSessionData(sessionData, storage) {
188
+ storage ??= new MemorySessionStorage();
189
+ await storage.save(sessionData);
190
+ return await _a.loadFromStorage(storage);
191
+ }
192
+ /**
193
+ * Uses an existing session to create a new signer session manager.
194
+ *
195
+ * @param {SignerSessionStorage} storage The session storage to use
196
+ * @return {Promise<SingerSession>} New signer session manager
197
+ */
198
+ static async loadFromStorage(storage) {
199
+ const session = await storage.retrieve();
200
+ return new _a(session, storage);
201
+ }
202
+ /**
203
+ * Constructor.
204
+ * @param {SignerSessionData} sessionData Session data
205
+ * @param {SignerSessionStorage} storage The session storage to use.
206
+ */
207
+ constructor(sessionData, storage) {
208
+ _SignerSessionManager_instances.add(this);
209
+ this.events = new Events();
210
+ _SignerSessionManager_eventEmitter.set(this, void 0);
211
+ _SignerSessionManager_refreshing.set(this, false);
212
+ _SignerSessionManager_client.set(this, void 0);
213
+ this.env = sessionData.env["Dev-CubeSignerStack"];
214
+ this.orgId = sessionData.org_id;
215
+ this.storage = storage;
216
+ __classPrivateFieldSet(this, _SignerSessionManager_eventEmitter, new EventEmitter([this.events]), "f");
217
+ __classPrivateFieldSet(this, _SignerSessionManager_client, {
218
+ client: __classPrivateFieldGet(this, _SignerSessionManager_instances, "m", _SignerSessionManager_createClient).call(this, sessionData.token),
219
+ token_exp: secondsSinceEpochToDate(sessionData.session_info.auth_token_exp),
220
+ session_exp: sessionData.session_exp
221
+ ? secondsSinceEpochToDate(sessionData.session_exp)
222
+ : undefined,
223
+ }, "f");
224
+ }
225
+ }
226
+ _a = SignerSessionManager, _SignerSessionManager_eventEmitter = new WeakMap(), _SignerSessionManager_refreshing = new WeakMap(), _SignerSessionManager_client = new WeakMap(), _SignerSessionManager_instances = new WeakSet(), _SignerSessionManager_createClient = function _SignerSessionManager_createClient(token) {
227
+ return createHttpClient(this.env.SignerApiRoot, token);
228
+ }, _SignerSessionManager_hasTimestampExpired = function _SignerSessionManager_hasTimestampExpired(exp, bufferSeconds) {
229
+ bufferSeconds ??= 0;
230
+ const expMsSinceEpoch = exp.getTime();
231
+ const nowMsSinceEpoch = new Date().getTime();
232
+ const bufferMs = bufferSeconds * 1000;
233
+ return expMsSinceEpoch < nowMsSinceEpoch + bufferMs;
234
+ };
235
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"signer_session_manager.js","sourceRoot":"","sources":["../../../../src/session/signer_session_manager.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,WAAW,CAAC;AAEnC,OAAO,EAAU,gBAAgB,EAAE,QAAQ,EAAE,MAAM,QAAQ,CAAC;AAC5D,OAAO,EAAE,oBAAoB,EAAkB,MAAM,mBAAmB,CAAC;AACzE,OAAO,EAAE,KAAK,EAAE,MAAM,SAAS,CAAC;AAMhC,OAAO,EAAE,YAAY,EAAE,MAAM,WAAW,CAAC;AACzC,OAAO,EAAE,mBAAmB,EAAE,MAAM,UAAU,CAAC;AAG/C,MAAM,8BAA8B,GAAG,EAAE,CAAC;AAsB1C;;;;GAIG;AACH,SAAS,uBAAuB,CAAC,IAAY;IAC3C,OAAO,IAAI,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC,CAAC;AAC/B,CAAC;AAgBD,yCAAyC;AACzC,MAAM,OAAO,oBAAoB;IAS/B;;;OAGG;IACH,KAAK,CAAC,KAAK;QACT,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,OAAO,OAAO,CAAC,KAAK,CAAC;IACvB,CAAC;IAED;;;;;;;;;OASG;IACH,KAAK,CAAC,MAAM,CAAC,SAA4B;QACvC,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;QAE7B,kEAAkE;QAClE,uDAAuD;QACvD,IAAI,uBAAA,EAAoB,qDAAqB,MAAzC,EAAoB,EAAsB,uBAAA,IAAI,oCAAQ,CAAC,SAAS,CAAC,IAAI,IAAI,CAAC,UAAU,EAAE,EAAE,CAAC;YAC3F,MAAM,uBAAA,IAAI,0CAAc,CAAC,kBAAkB,EAAE,CAAC;YAC9C,MAAM,IAAI,mBAAmB,CAAC,SAAS,CAAC,CAAC;QAC3C,CAAC;QAED,OAAO,uBAAA,IAAI,oCAAQ,CAAC,MAAM,CAAC;IAC7B,CAAC;IAED,2BAA2B;IAC3B,KAAK,CAAC,MAAM;QACV,MAAM,MAAM,GAAG,IAAI,QAAQ,CAAC,sBAAsB,EAAE,MAAM,IAAI,CAAC,MAAM,EAAE,EAAE,uBAAA,IAAI,0CAAc,CAAC,CAAC;QAC7F,MAAM,MAAM,CAAC,GAAG,CAAC,+BAA+B,EAAE;YAChD,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,IAAI,CAAC,KAAK,EAAE,EAAE;SACzC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,OAAO;QACX,IAAI,IAAI,CAAC,UAAU,EAAE,EAAE,CAAC;YACtB,MAAM,uBAAA,IAAI,0CAAc,CAAC,kBAAkB,EAAE,CAAC;YAC9C,MAAM,IAAI,mBAAmB,CAAC,sBAAsB,CAAC,CAAC;QACxD,CAAC;QAED,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAElD,MAAM,MAAM,GAAG,IAAI,QAAQ,CAAC,sBAAsB,EAAE,uBAAA,IAAI,oCAAQ,CAAC,MAAM,EAAE,uBAAA,IAAI,0CAAc,CAAC,CAAC;QAC7F,MAAM,GAAG,GAAG,WAAW,CAAC,YAAY,CAAC;QACrC,MAAM,IAAI,GAAG,MAAM,MAAM,CAAC,KAAK,CAAC,gCAAgC,EAAE;YAChE,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,IAAI,CAAC,KAAK,EAAE,EAAE;YACxC,IAAI,EAA+B;gBACjC,SAAS,EAAE,GAAG,CAAC,KAAK;gBACpB,WAAW,EAAE,GAAG,CAAC,WAAW;gBAC5B,WAAW,EAAE,GAAG,CAAC,aAAa;aAC/B;SACF,CAAC,CAAC;QACH,MAAM,UAAU,GAAsB;YACpC,GAAG,WAAW;YACd,YAAY,EAAE,IAAI,CAAC,YAAY;YAC/B,KAAK,EAAE,IAAI,CAAC,KAAK;SAClB,CAAC;QAEF,MAAM,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;QACpC,uBAAA,IAAI,gCAAW;YACb,MAAM,EAAE,uBAAA,IAAI,2EAAc,MAAlB,IAAI,EAAe,UAAU,CAAC,KAAK,CAAC;YAC5C,SAAS,EAAE,uBAAuB,CAAC,UAAU,CAAC,YAAY,CAAC,cAAc,CAAC;YAC1E,WAAW,EAAE,UAAU,CAAC,WAAW;gBACjC,CAAC,CAAC,uBAAuB,CAAC,UAAU,CAAC,WAAW,CAAC;gBACjD,CAAC,CAAC,SAAS;SACd,MAAA,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO;QACX,OAAO,uBAAA,EAAoB,qDAAqB,MAAzC,EAAoB,EACzB,uBAAA,IAAI,oCAAQ,CAAC,SAAS,EACtB,8BAA8B,CAC/B,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACH,UAAU;QACR,OAAO,CACL,CAAC,uBAAA,IAAI,oCAAQ,CAAC,WAAW,IAAI,KAAK,CAAC;YACnC,uBAAA,EAAoB,qDAAqB,MAAzC,EAAoB,EAAsB,uBAAA,IAAI,oCAAQ,CAAC,WAAW,CAAC,CACpE,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe;QACnB,IAAI,MAAM,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC;YACzB,IAAI,uBAAA,IAAI,wCAAY,EAAE,CAAC;gBACrB,6BAA6B;gBAC7B,OAAO,uBAAA,IAAI,wCAAY,EAAE,CAAC;oBACxB,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;gBACnB,CAAC;gBACD,OAAO,KAAK,CAAC;YACf,CAAC;iBAAM,CAAC;gBACN,UAAU;gBACV,uBAAA,IAAI,oCAAe,IAAI,MAAA,CAAC;gBACxB,IAAI,CAAC;oBACH,MAAM,IAAI,CAAC,OAAO,EAAE,CAAC;oBACrB,OAAO,IAAI,CAAC;gBACd,CAAC;wBAAS,CAAC;oBACT,uBAAA,IAAI,oCAAe,KAAK,MAAA,CAAC;gBAC3B,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;OAIG;IACH,WAAW;QACT,OAAO,WAAW,CAAC,KAAK,IAAI,EAAE;YAC5B,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;QAC/B,CAAC,EAAE,EAAE,GAAG,IAAI,CAAC,CAAC;IAChB,CAAC;IAED;;;OAGG;IACH,gBAAgB,CAAC,KAAgB;QAC/B,aAAa,CAAC,KAAK,CAAC,CAAC;IACvB,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,KAAK,CAAC,qBAAqB,CAChC,GAAiB,EACjB,KAAa,EACb,OAA2B,EAC3B,OAA8B;QAE9B,MAAM,WAAW,GAAG;YAClB,GAAG,EAAE;gBACH,CAAC,qBAAqB,CAAC,EAAE,GAAG;aAC7B;YACD,MAAM,EAAE,KAAK;YACb,KAAK,EAAE,OAAO,CAAC,KAAK;YACpB,OAAO,EAAE,eAAe;YACxB,YAAY,EAAE,OAAO,CAAC,YAAY;YAClC,WAAW,EAAE,OAAO,CAAC,UAAW;SACjC,CAAC;QACF,OAAO,KAAK,IAAI,oBAAoB,EAAE,CAAC;QACvC,MAAM,OAAO,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;QAChC,OAAO,MAAM,EAAoB,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;IAC7D,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,qBAAqB,CAChC,WAA8B,EAC9B,OAA8B;QAE9B,OAAO,KAAK,IAAI,oBAAoB,EAAE,CAAC;QACvC,MAAM,OAAO,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;QAChC,OAAO,MAAM,EAAoB,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;IAC7D,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,KAAK,CAAC,eAAe,CAAC,OAA6B;QACxD,MAAM,OAAO,GAAG,MAAM,OAAO,CAAC,QAAQ,EAAE,CAAC;QACzC,OAAO,IAAI,EAAoB,CAAC,OAAO,EAAE,OAAO,CAAC,CAAC;IACpD,CAAC;IAED;;;;OAIG;IACH,YAAY,WAA8B,EAAE,OAA6B;;QAnNhE,WAAM,GAAG,IAAI,MAAM,EAAE,CAAC;QACtB,qDAA4B;QACrC,2CAAuB,KAAK,EAAC;QAC7B,+CAAiE;QAiN/D,IAAI,CAAC,GAAG,GAAG,WAAW,CAAC,GAAG,CAAC,qBAAqB,CAAC,CAAC;QAClD,IAAI,CAAC,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC;QAChC,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QACvB,uBAAA,IAAI,sCAAiB,IAAI,YAAY,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,MAAA,CAAC;QACrD,uBAAA,IAAI,gCAAW;YACb,MAAM,EAAE,uBAAA,IAAI,2EAAc,MAAlB,IAAI,EAAe,WAAW,CAAC,KAAK,CAAC;YAC7C,SAAS,EAAE,uBAAuB,CAAC,WAAW,CAAC,YAAY,CAAC,cAAc,CAAC;YAC3E,WAAW,EAAE,WAAW,CAAC,WAAW;gBAClC,CAAC,CAAC,uBAAuB,CAAC,WAAW,CAAC,WAAW,CAAC;gBAClD,CAAC,CAAC,SAAS;SACd,MAAA,CAAC;IACJ,CAAC;CAwBF;iTAjBe,KAAa;IACzB,OAAO,gBAAgB,CAAC,IAAI,CAAC,GAAG,CAAC,aAAa,EAAE,KAAK,CAAC,CAAC;AACzD,CAAC,iGAQ2B,GAAS,EAAE,aAAsB;IAC3D,aAAa,KAAK,CAAC,CAAC;IACpB,MAAM,eAAe,GAAG,GAAG,CAAC,OAAO,EAAE,CAAC;IACtC,MAAM,eAAe,GAAG,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,CAAC;IAC7C,MAAM,QAAQ,GAAG,aAAa,GAAG,IAAI,CAAC;IACtC,OAAO,eAAe,GAAG,eAAe,GAAG,QAAQ,CAAC;AACtD,CAAC","sourcesContent":["import { Events } from \"../events\";\nimport { EnvInterface } from \"../env\";\nimport { Client, createHttpClient, OpClient } from \"../api\";\nimport { MemorySessionStorage, SessionStorage } from \"./session_storage\";\nimport { delay } from \"../util\";\nimport {\n  ClientSessionInfo,\n  NewSessionResponse,\n  RefreshSignerSessionRequest,\n} from \"../schema_types\";\nimport { EventEmitter } from \"../events\";\nimport { SessionExpiredError } from \"../error\";\nimport { operations } from \"../schema\";\n\nconst DEFAULT_EXPIRATION_BUFFER_SECS = 30;\n\n/** JSON representation of our \"signer session\" file format */\nexport interface SignerSessionData {\n  /** The organization ID */\n  org_id: string;\n  /** The role ID */\n  role_id?: string;\n  /** The purpose of the session token */\n  purpose?: string;\n  /** The token to include in Authorization header */\n  token: string;\n  /** Session info */\n  session_info: ClientSessionInfo;\n  /** Session expiration (in seconds since UNIX epoch) beyond which it cannot be refreshed */\n  session_exp: number | undefined; // may be missing in legacy session files\n  /** The environment */\n  env: {\n    [\"Dev-CubeSignerStack\"]: EnvInterface;\n  };\n}\n\n/**\n * Constructs {@link Date} from a number representing seconds since unix epoch.\n * @param {number} secs Seconds since unix epoch.\n * @return {Date} The equivalent date.\n */\nfunction secondsSinceEpochToDate(secs: number): Date {\n  return new Date(secs * 1000);\n}\n\n/** Type of storage required for signer sessions */\nexport type SignerSessionStorage = SessionStorage<SignerSessionData>;\n\nexport interface SignerSessionLifetime {\n  /** Session lifetime (in seconds). Defaults to one week (604800). */\n  session?: number;\n  /** Auth token lifetime (in seconds). Defaults to five minutes (300). */\n  auth: number;\n  /** Refresh token lifetime (in seconds). Defaults to one day (86400). */\n  refresh?: number;\n  /** Grace lifetime (in seconds). Defaults to 30 seconds (30). */\n  grace?: number;\n}\n\n/** Generic session manager interface. */\nexport class SignerSessionManager {\n  readonly env: EnvInterface;\n  readonly orgId: string;\n  readonly storage: SignerSessionStorage;\n  readonly events = new Events();\n  readonly #eventEmitter: EventEmitter;\n  #refreshing: boolean = false;\n  #client: { client: Client; token_exp: Date; session_exp?: Date };\n\n  /**\n   * @return {string} The current auth token.\n   * @internal\n   */\n  async token(): Promise<string> {\n    const session = await this.storage.retrieve();\n    return session.token;\n  }\n\n  /**\n   * Refreshes the current session if needed, then returns a client using the current session.\n   *\n   * May **UPDATE/MUTATE** self.\n   *\n   * @param {operations} operation The operation that this client will be\n   *   used for. This parameter is used exclusively for more accurate error\n   *   reporting and does not affect functionality.\n   * @return {Client} The client with the current session\n   */\n  async client(operation?: keyof operations): Promise<Client> {\n    await this.refreshIfNeeded();\n\n    // trigger \"session expired\" if the session as a whole has expired\n    // or if (for whatever reason) the token is still stale\n    if (SignerSessionManager.#hasTimestampExpired(this.#client.token_exp) || this.hasExpired()) {\n      await this.#eventEmitter.emitSessionExpired();\n      throw new SessionExpiredError(operation);\n    }\n\n    return this.#client.client;\n  }\n\n  /** Revokes the session. */\n  async revoke(): Promise<void> {\n    const client = new OpClient(\"revokeCurrentSession\", await this.client(), this.#eventEmitter);\n    await client.del(\"/v0/org/{org_id}/session/self\", {\n      params: { path: { org_id: this.orgId } },\n    });\n  }\n\n  /**\n   * Refreshes the session and **UPDATES/MUTATES** self.\n   */\n  async refresh(): Promise<void> {\n    if (this.hasExpired()) {\n      await this.#eventEmitter.emitSessionExpired();\n      throw new SessionExpiredError(\"signerSessionRefresh\");\n    }\n\n    const currSession = await this.storage.retrieve();\n\n    const client = new OpClient(\"signerSessionRefresh\", this.#client.client, this.#eventEmitter);\n    const csi = currSession.session_info;\n    const data = await client.patch(\"/v1/org/{org_id}/token/refresh\", {\n      params: { path: { org_id: this.orgId } },\n      body: <RefreshSignerSessionRequest>{\n        epoch_num: csi.epoch,\n        epoch_token: csi.epoch_token,\n        other_token: csi.refresh_token,\n      },\n    });\n    const newSession = <SignerSessionData>{\n      ...currSession,\n      session_info: data.session_info,\n      token: data.token,\n    };\n\n    await this.storage.save(newSession);\n    this.#client = {\n      client: this.#createClient(newSession.token),\n      token_exp: secondsSinceEpochToDate(newSession.session_info.auth_token_exp),\n      session_exp: newSession.session_exp\n        ? secondsSinceEpochToDate(newSession.session_exp)\n        : undefined,\n    };\n  }\n\n  /**\n   * Returns whether it's time to refresh this token.\n   * @return {boolean} Whether it's time to refresh this token.\n   * @internal\n   */\n  async isStale(): Promise<boolean> {\n    return SignerSessionManager.#hasTimestampExpired(\n      this.#client.token_exp,\n      DEFAULT_EXPIRATION_BUFFER_SECS,\n    );\n  }\n\n  /**\n   * Return whether this session has expired and cannot be refreshed anymore.\n   * @return {boolean} Whether this session has expired.\n   * @internal\n   */\n  hasExpired(): boolean {\n    return (\n      (this.#client.session_exp || false) &&\n      SignerSessionManager.#hasTimestampExpired(this.#client.session_exp)\n    );\n  }\n\n  /**\n   * Refreshes the session if it is about to expire.\n   * @return {boolean} Whether the session token was refreshed.\n   * @internal\n   */\n  async refreshIfNeeded(): Promise<boolean> {\n    if (await this.isStale()) {\n      if (this.#refreshing) {\n        // wait until done refreshing\n        while (this.#refreshing) {\n          await delay(100);\n        }\n        return false;\n      } else {\n        // refresh\n        this.#refreshing = true;\n        try {\n          await this.refresh();\n          return true;\n        } finally {\n          this.#refreshing = false;\n        }\n      }\n    }\n\n    return false;\n  }\n\n  /**\n   * Automatically refreshes the session in the background (if needed) every\n   * minute. This is a simple wrapper around `setInterval`.\n   * @return {number} The interval ID of the refresh timer.\n   */\n  autoRefresh(): RefreshId {\n    return setInterval(async () => {\n      await this.refreshIfNeeded();\n    }, 60 * 1000);\n  }\n\n  /**\n   * Clears the auto refresh timer.\n   * @param {number} timer The timer ID to clear.\n   */\n  clearAutoRefresh(timer: RefreshId): void {\n    clearInterval(timer);\n  }\n\n  /**\n   * @param {EnvInterface} env The CubeSigner environment\n   * @param {string} orgId The organization ID\n   * @param {NewSessionResponse} session The session information.\n   * @param {SignerSessionStorage} storage The storage to use for saving the session.\n   * @return {Promise<SignerSessionManager>} New signer session manager.\n   */\n  static async createFromSessionInfo(\n    env: EnvInterface,\n    orgId: string,\n    session: NewSessionResponse,\n    storage?: SignerSessionStorage,\n  ): Promise<SignerSessionManager> {\n    const sessionData = {\n      env: {\n        [\"Dev-CubeSignerStack\"]: env,\n      },\n      org_id: orgId,\n      token: session.token,\n      purpose: \"sign via oidc\",\n      session_info: session.session_info,\n      session_exp: session.expiration!,\n    };\n    storage ??= new MemorySessionStorage();\n    await storage.save(sessionData);\n    return await SignerSessionManager.loadFromStorage(storage);\n  }\n\n  /**\n   * @param {SignerSessionData} sessionData The session information.\n   * @param {SignerSessionStorage} storage The storage to use for saving the session.\n   * @return {Promise<SignerSessionManager>} New signer session manager.\n   */\n  static async createFromSessionData(\n    sessionData: SignerSessionData,\n    storage?: SignerSessionStorage,\n  ): Promise<SignerSessionManager> {\n    storage ??= new MemorySessionStorage();\n    await storage.save(sessionData);\n    return await SignerSessionManager.loadFromStorage(storage);\n  }\n\n  /**\n   * Uses an existing session to create a new signer session manager.\n   *\n   * @param {SignerSessionStorage} storage The session storage to use\n   * @return {Promise<SingerSession>} New signer session manager\n   */\n  static async loadFromStorage(storage: SignerSessionStorage): Promise<SignerSessionManager> {\n    const session = await storage.retrieve();\n    return new SignerSessionManager(session, storage);\n  }\n\n  /**\n   * Constructor.\n   * @param {SignerSessionData} sessionData Session data\n   * @param {SignerSessionStorage} storage The session storage to use.\n   */\n  constructor(sessionData: SignerSessionData, storage: SignerSessionStorage) {\n    this.env = sessionData.env[\"Dev-CubeSignerStack\"];\n    this.orgId = sessionData.org_id;\n    this.storage = storage;\n    this.#eventEmitter = new EventEmitter([this.events]);\n    this.#client = {\n      client: this.#createClient(sessionData.token),\n      token_exp: secondsSinceEpochToDate(sessionData.session_info.auth_token_exp),\n      session_exp: sessionData.session_exp\n        ? secondsSinceEpochToDate(sessionData.session_exp)\n        : undefined,\n    };\n  }\n\n  /**\n   * Creates a new REST client with a given token\n   * @param {string} token The authorization token to use for the client\n   * @return {Client} The new REST client\n   */\n  #createClient(token: string): Client {\n    return createHttpClient(this.env.SignerApiRoot, token);\n  }\n\n  /**\n   * Check if a timestamp is within {@link bufferSeconds} seconds from expiration.\n   * @param {Date} exp The timestamp to check\n   * @param {number} bufferSeconds Time buffer in seconds (defaults to 0s)\n   * @return {boolean} True if the timestamp has expired\n   */\n  static #hasTimestampExpired(exp: Date, bufferSeconds?: number): boolean {\n    bufferSeconds ??= 0;\n    const expMsSinceEpoch = exp.getTime();\n    const nowMsSinceEpoch = new Date().getTime();\n    const bufferMs = bufferSeconds * 1000;\n    return expMsSinceEpoch < nowMsSinceEpoch + bufferMs;\n  }\n}\n\n/** Type of the refresh timer ID. */\nexport type RefreshId = ReturnType<typeof setInterval>;\n"]}
@@ -0,0 +1,41 @@
1
+ import { CubeSignerClient } from "./client";
2
+ import { KeyInfo } from "./key";
3
+ import { SignerSessionManager, SignerSessionStorage } from "./session/signer_session_manager";
4
+ /** Signer session info. Can only be used to revoke a token, but not for authentication. */
5
+ export declare class SignerSessionInfo {
6
+ #private;
7
+ readonly purpose: string;
8
+ /** Revoke this session */
9
+ revoke(): Promise<void>;
10
+ /**
11
+ * Internal constructor.
12
+ * @param {CubeSignerClient} cs CubeSigner instance to use when calling `revoke`
13
+ * @param {string} sessionId The ID of the session; can be used for revocation but not for auth
14
+ * @param {string} purpose Session purpose
15
+ * @internal
16
+ */
17
+ constructor(cs: CubeSignerClient, sessionId: string, purpose: string);
18
+ }
19
+ /**
20
+ * Signer session.
21
+ * Extends {@link CubeSignerClient} and provides a few convenience methods on top.
22
+ */
23
+ export declare class SignerSession extends CubeSignerClient {
24
+ /**
25
+ * Loads an existing signer session from storage.
26
+ * @param {SignerSessionStorage} storage The session storage to use
27
+ * @return {Promise<SingerSession>} New signer session
28
+ */
29
+ static loadSignerSession(storage: SignerSessionStorage): Promise<SignerSession>;
30
+ /**
31
+ * Constructor.
32
+ * @param {SignerSessionManager} sessionMgr The session manager to use
33
+ * @internal
34
+ */
35
+ constructor(sessionMgr: SignerSessionManager);
36
+ /**
37
+ * Returns the list of keys that this token grants access to.
38
+ * @return {KeyInfo[]} The list of keys.
39
+ */
40
+ keys(): Promise<KeyInfo[]>;
41
+ }