@cubist-labs/cubesigner-sdk 0.2.28 → 0.3.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (143) hide show
  1. package/README.md +30 -28
  2. package/dist/cjs/package.json +41 -0
  3. package/dist/cjs/spec/env/beta.json +9 -0
  4. package/dist/cjs/spec/env/gamma.json +9 -0
  5. package/dist/cjs/spec/env/prod.json +9 -0
  6. package/dist/cjs/src/api.d.ts +634 -0
  7. package/dist/cjs/src/api.js +1309 -0
  8. package/dist/cjs/src/client.d.ts +575 -0
  9. package/dist/cjs/src/client.js +378 -0
  10. package/dist/cjs/src/env.d.ts +15 -0
  11. package/dist/cjs/src/env.js +35 -0
  12. package/dist/cjs/src/error.d.ts +29 -0
  13. package/dist/cjs/src/error.js +36 -0
  14. package/dist/cjs/src/events.d.ts +84 -0
  15. package/dist/cjs/src/events.js +195 -0
  16. package/dist/cjs/src/index.d.ts +203 -0
  17. package/dist/cjs/src/index.js +298 -0
  18. package/dist/cjs/src/key.d.ts +152 -0
  19. package/dist/cjs/src/key.js +242 -0
  20. package/dist/{src/fido.d.ts → cjs/src/mfa.d.ts} +33 -15
  21. package/dist/cjs/src/mfa.js +169 -0
  22. package/dist/cjs/src/org.d.ts +99 -0
  23. package/dist/cjs/src/org.js +95 -0
  24. package/dist/cjs/src/paginator.d.ts +76 -0
  25. package/dist/cjs/src/paginator.js +99 -0
  26. package/dist/cjs/src/response.d.ts +101 -0
  27. package/dist/cjs/src/response.js +164 -0
  28. package/dist/cjs/src/role.d.ts +283 -0
  29. package/dist/cjs/src/role.js +253 -0
  30. package/dist/cjs/src/schema.d.ts +6209 -0
  31. package/dist/cjs/src/schema.js +7 -0
  32. package/dist/cjs/src/schema_types.d.ts +113 -0
  33. package/dist/cjs/src/schema_types.js +3 -0
  34. package/dist/cjs/src/session/session_storage.d.ts +27 -0
  35. package/dist/cjs/src/session/session_storage.js +47 -0
  36. package/dist/cjs/src/session/signer_session_manager.d.ts +125 -0
  37. package/dist/cjs/src/session/signer_session_manager.js +239 -0
  38. package/dist/cjs/src/signer_session.d.ts +41 -0
  39. package/dist/cjs/src/signer_session.js +77 -0
  40. package/dist/cjs/src/user_export.d.ts +52 -0
  41. package/dist/cjs/src/user_export.js +129 -0
  42. package/dist/cjs/src/util.d.ts +56 -0
  43. package/dist/cjs/src/util.js +86 -0
  44. package/dist/esm/package.json +41 -0
  45. package/dist/esm/spec/env/beta.json +9 -0
  46. package/dist/esm/spec/env/gamma.json +9 -0
  47. package/dist/esm/spec/env/prod.json +9 -0
  48. package/dist/esm/src/api.d.ts +634 -0
  49. package/dist/esm/src/api.js +1299 -0
  50. package/dist/esm/src/client.d.ts +575 -0
  51. package/dist/esm/src/client.js +374 -0
  52. package/dist/esm/src/env.d.ts +15 -0
  53. package/dist/esm/src/env.js +9 -0
  54. package/dist/esm/src/error.d.ts +29 -0
  55. package/dist/esm/src/error.js +31 -0
  56. package/dist/esm/src/events.d.ts +84 -0
  57. package/dist/esm/src/events.js +189 -0
  58. package/dist/esm/src/index.d.ts +203 -0
  59. package/dist/esm/src/index.js +276 -0
  60. package/dist/esm/src/key.d.ts +152 -0
  61. package/dist/esm/src/key.js +236 -0
  62. package/dist/esm/src/mfa.d.ts +94 -0
  63. package/dist/esm/src/mfa.js +163 -0
  64. package/dist/esm/src/org.d.ts +99 -0
  65. package/dist/esm/src/org.js +91 -0
  66. package/dist/esm/src/paginator.d.ts +76 -0
  67. package/dist/esm/src/paginator.js +94 -0
  68. package/dist/esm/src/response.d.ts +101 -0
  69. package/dist/esm/src/response.js +159 -0
  70. package/dist/esm/src/role.d.ts +283 -0
  71. package/dist/esm/src/role.js +248 -0
  72. package/dist/esm/src/schema.d.ts +6209 -0
  73. package/dist/esm/src/schema.js +6 -0
  74. package/dist/esm/src/schema_types.d.ts +113 -0
  75. package/dist/esm/src/schema_types.js +2 -0
  76. package/dist/esm/src/session/session_storage.d.ts +27 -0
  77. package/dist/esm/src/session/session_storage.js +43 -0
  78. package/dist/esm/src/session/signer_session_manager.d.ts +125 -0
  79. package/dist/esm/src/session/signer_session_manager.js +235 -0
  80. package/dist/esm/src/signer_session.d.ts +41 -0
  81. package/dist/esm/src/signer_session.js +72 -0
  82. package/dist/esm/src/user_export.d.ts +52 -0
  83. package/dist/esm/src/user_export.js +99 -0
  84. package/dist/esm/src/util.d.ts +56 -0
  85. package/dist/esm/src/util.js +76 -0
  86. package/dist/package.json +13 -45
  87. package/dist/src/api.d.ts +29 -1
  88. package/dist/src/api.js +66 -1
  89. package/dist/src/client.d.ts +35 -14
  90. package/dist/src/client.js +12 -8
  91. package/dist/src/events.js +1 -1
  92. package/dist/src/index.d.ts +6 -11
  93. package/dist/src/index.js +9 -25
  94. package/dist/src/key.d.ts +18 -7
  95. package/dist/src/key.js +52 -19
  96. package/dist/src/role.d.ts +46 -3
  97. package/dist/src/role.js +60 -8
  98. package/dist/src/schema.d.ts +206 -72
  99. package/dist/src/schema.js +1 -1
  100. package/dist/src/schema_types.d.ts +3 -0
  101. package/dist/src/schema_types.js +1 -1
  102. package/dist/src/session/signer_session_manager.d.ts +38 -14
  103. package/dist/src/session/signer_session_manager.js +93 -33
  104. package/dist/src/util.d.ts +14 -0
  105. package/dist/src/util.js +24 -27
  106. package/package.json +19 -46
  107. package/src/api.ts +79 -0
  108. package/src/client.ts +12 -8
  109. package/src/events.ts +2 -0
  110. package/src/index.ts +10 -24
  111. package/src/key.ts +36 -18
  112. package/src/role.ts +78 -7
  113. package/src/schema.ts +269 -110
  114. package/src/schema_types.ts +3 -0
  115. package/src/session/session_storage.ts +0 -32
  116. package/src/session/signer_session_manager.ts +124 -36
  117. package/src/util.ts +19 -10
  118. package/tsconfig.json +1 -21
  119. package/LICENSE-APACHE +0 -177
  120. package/LICENSE-MIT +0 -25
  121. package/NOTICE +0 -13
  122. package/dist/examples/ethers.d.ts +0 -1
  123. package/dist/examples/ethers.js +0 -142
  124. package/dist/src/ethers/index.d.ts +0 -95
  125. package/dist/src/ethers/index.js +0 -215
  126. package/dist/src/fido.js +0 -148
  127. package/dist/src/session/cognito_manager.d.ts +0 -71
  128. package/dist/src/session/cognito_manager.js +0 -129
  129. package/dist/src/session/generic.d.ts +0 -47
  130. package/dist/src/session/generic.js +0 -3
  131. package/dist/src/session/management_session_manager.d.ts +0 -59
  132. package/dist/src/session/management_session_manager.js +0 -111
  133. package/dist/src/session/oidc_session_manager.d.ts +0 -78
  134. package/dist/src/session/oidc_session_manager.js +0 -142
  135. package/dist/src/session/session_manager.d.ts +0 -99
  136. package/dist/src/session/session_manager.js +0 -136
  137. package/dist/src/sign.d.ts +0 -114
  138. package/dist/src/sign.js +0 -248
  139. package/dist/test/sessions.d.ts +0 -35
  140. package/dist/test/sessions.js +0 -56
  141. package/src/ethers/index.ts +0 -253
  142. package/src/session/cognito_manager.ts +0 -161
  143. package/src/session/session_manager.ts +0 -165
@@ -0,0 +1,72 @@
1
+ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
2
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
3
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
4
+ return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
5
+ };
6
+ var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
7
+ if (kind === "m") throw new TypeError("Private method is not writable");
8
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
9
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
10
+ return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
11
+ };
12
+ var _SignerSessionInfo_csc, _SignerSessionInfo_sessionId;
13
+ import { CubeSignerClient } from "./client";
14
+ import { toKeyInfo } from "./key";
15
+ import { SignerSessionManager } from "./session/signer_session_manager";
16
+ /** Signer session info. Can only be used to revoke a token, but not for authentication. */
17
+ export class SignerSessionInfo {
18
+ /** Revoke this session */
19
+ async revoke() {
20
+ await __classPrivateFieldGet(this, _SignerSessionInfo_csc, "f").sessionRevoke(__classPrivateFieldGet(this, _SignerSessionInfo_sessionId, "f"));
21
+ }
22
+ // --------------------------------------------------------------------------
23
+ // -- INTERNAL --------------------------------------------------------------
24
+ // --------------------------------------------------------------------------
25
+ /**
26
+ * Internal constructor.
27
+ * @param {CubeSignerClient} cs CubeSigner instance to use when calling `revoke`
28
+ * @param {string} sessionId The ID of the session; can be used for revocation but not for auth
29
+ * @param {string} purpose Session purpose
30
+ * @internal
31
+ */
32
+ constructor(cs, sessionId, purpose) {
33
+ _SignerSessionInfo_csc.set(this, void 0);
34
+ _SignerSessionInfo_sessionId.set(this, void 0);
35
+ __classPrivateFieldSet(this, _SignerSessionInfo_csc, cs, "f");
36
+ __classPrivateFieldSet(this, _SignerSessionInfo_sessionId, sessionId, "f");
37
+ this.purpose = purpose;
38
+ }
39
+ }
40
+ _SignerSessionInfo_csc = new WeakMap(), _SignerSessionInfo_sessionId = new WeakMap();
41
+ /**
42
+ * Signer session.
43
+ * Extends {@link CubeSignerClient} and provides a few convenience methods on top.
44
+ */
45
+ export class SignerSession extends CubeSignerClient {
46
+ /**
47
+ * Loads an existing signer session from storage.
48
+ * @param {SignerSessionStorage} storage The session storage to use
49
+ * @return {Promise<SingerSession>} New signer session
50
+ */
51
+ static async loadSignerSession(storage) {
52
+ const manager = await SignerSessionManager.loadFromStorage(storage);
53
+ return new SignerSession(manager);
54
+ }
55
+ /**
56
+ * Constructor.
57
+ * @param {SignerSessionManager} sessionMgr The session manager to use
58
+ * @internal
59
+ */
60
+ constructor(sessionMgr) {
61
+ super(sessionMgr);
62
+ }
63
+ /**
64
+ * Returns the list of keys that this token grants access to.
65
+ * @return {KeyInfo[]} The list of keys.
66
+ */
67
+ async keys() {
68
+ const keys = await this.sessionKeysList();
69
+ return keys.map((k) => toKeyInfo(k));
70
+ }
71
+ }
72
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,52 @@
1
+ import { UserExportCompleteResponse, UserExportKeyMaterial } from "./schema_types";
2
+ import type { CipherSuite } from "@hpke/core";
3
+ /** Get the HPKE ciphersuite for user-export decryption.
4
+ *
5
+ * @return {any} The HPKE ciphersuite for user export.
6
+ */
7
+ export declare function userExportCipherSuite(): Promise<CipherSuite>;
8
+ /**
9
+ * Generate a key pair for user export.
10
+ *
11
+ * @return {Promise<CryptoKeyPair>} The newly generated key pair.
12
+ */
13
+ export declare function userExportKeygen(): Promise<CryptoKeyPair>;
14
+ /**
15
+ * Decrypt a user export.
16
+ *
17
+ * @param {CryptoKey} recipientKey The NIST P-256 secret key corresponding to the `publicKey` argument to the `userExportComplete` invocation that returned `response`.
18
+ * @param {UserExportCompleteResponse} response The response from a successful `userExportComplete` request.
19
+ * @return {Promise<UserExportKeyMaterial>} The decrypted key material.
20
+ */
21
+ export declare function userExportDecrypt(recipientKey: CryptoKey, response: UserExportCompleteResponse): Promise<UserExportKeyMaterial>;
22
+ /**
23
+ * Figure out how to load SubtleCrypto in the current environment.
24
+ *
25
+ * This functionality is reproduced from the hpke-js package,
26
+ * https://github.com/dajiaji/hpke-js/
27
+ * which is Copyright (C) 2022 Ajitomi Daisuke and licensed
28
+ * under the MIT License, which follows:
29
+ *
30
+ * MIT License
31
+ *
32
+ * Copyright (c) 2022 Ajitomi Daisuke
33
+ *
34
+ * Permission is hereby granted, free of charge, to any person obtaining a copy
35
+ * of this software and associated documentation files (the "Software"), to deal
36
+ * in the Software without restriction, including without limitation the rights
37
+ * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
38
+ * copies of the Software, and to permit persons to whom the Software is
39
+ * furnished to do so, subject to the following conditions:
40
+ *
41
+ * The above copyright notice and this permission notice shall be included in all
42
+ * copies or substantial portions of the Software.
43
+ *
44
+ * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
45
+ * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
46
+ * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
47
+ * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
48
+ * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
49
+ * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
50
+ * SOFTWARE.
51
+ */
52
+ export declare function loadSubtleCrypto(): Promise<SubtleCrypto>;
@@ -0,0 +1,99 @@
1
+ import { decodeBase64 } from "./util";
2
+ /** Get the HPKE ciphersuite for user-export decryption.
3
+ *
4
+ * @return {any} The HPKE ciphersuite for user export.
5
+ */
6
+ export async function userExportCipherSuite() {
7
+ const hpke = await import("@hpke/core"); // eslint-disable-line @typescript-eslint/no-var-requires
8
+ const suite = new hpke.CipherSuite({
9
+ kem: new hpke.DhkemP256HkdfSha256(),
10
+ kdf: new hpke.HkdfSha256(),
11
+ aead: new hpke.Aes256Gcm(),
12
+ });
13
+ return suite;
14
+ }
15
+ /**
16
+ * Generate a key pair for user export.
17
+ *
18
+ * @return {Promise<CryptoKeyPair>} The newly generated key pair.
19
+ */
20
+ export async function userExportKeygen() {
21
+ return (await userExportCipherSuite()).kem.generateKeyPair();
22
+ }
23
+ /**
24
+ * Get the ArrayBuffer slice represented by a Buffer
25
+ *
26
+ * @param {Uint8Array} b The buffer to convert
27
+ * @return {ArrayBuffer} The resulting ArrayBuffer
28
+ */
29
+ function toArrayBuffer(b) {
30
+ return b.buffer.slice(b.byteOffset, b.byteOffset + b.byteLength);
31
+ }
32
+ /**
33
+ * Decrypt a user export.
34
+ *
35
+ * @param {CryptoKey} recipientKey The NIST P-256 secret key corresponding to the `publicKey` argument to the `userExportComplete` invocation that returned `response`.
36
+ * @param {UserExportCompleteResponse} response The response from a successful `userExportComplete` request.
37
+ * @return {Promise<UserExportKeyMaterial>} The decrypted key material.
38
+ */
39
+ export async function userExportDecrypt(recipientKey, response) {
40
+ // The ciphersuite we use for decryption
41
+ const suite = await userExportCipherSuite();
42
+ // decrypt the export ciphertext using the HPKE one-shot API
43
+ const tenc = new TextEncoder();
44
+ const tdec = new TextDecoder();
45
+ const info = toArrayBuffer(tenc.encode(`cubist-signer::UserExportOwner::${response.user_id}`));
46
+ const public_key = toArrayBuffer(decodeBase64(response.ephemeral_public_key));
47
+ const ctxt = toArrayBuffer(decodeBase64(response.encrypted_key_material));
48
+ const decrypted = JSON.parse(tdec.decode(await suite.open({
49
+ recipientKey,
50
+ enc: public_key,
51
+ info: info,
52
+ }, ctxt)));
53
+ return decrypted;
54
+ }
55
+ /**
56
+ * Figure out how to load SubtleCrypto in the current environment.
57
+ *
58
+ * This functionality is reproduced from the hpke-js package,
59
+ * https://github.com/dajiaji/hpke-js/
60
+ * which is Copyright (C) 2022 Ajitomi Daisuke and licensed
61
+ * under the MIT License, which follows:
62
+ *
63
+ * MIT License
64
+ *
65
+ * Copyright (c) 2022 Ajitomi Daisuke
66
+ *
67
+ * Permission is hereby granted, free of charge, to any person obtaining a copy
68
+ * of this software and associated documentation files (the "Software"), to deal
69
+ * in the Software without restriction, including without limitation the rights
70
+ * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
71
+ * copies of the Software, and to permit persons to whom the Software is
72
+ * furnished to do so, subject to the following conditions:
73
+ *
74
+ * The above copyright notice and this permission notice shall be included in all
75
+ * copies or substantial portions of the Software.
76
+ *
77
+ * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
78
+ * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
79
+ * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
80
+ * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
81
+ * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
82
+ * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
83
+ * SOFTWARE.
84
+ */
85
+ export async function loadSubtleCrypto() {
86
+ if (globalThis !== undefined && globalThis.crypto !== undefined) {
87
+ // Browsers, Node.js >= v19, Cloudflare Workers, Bun, etc.
88
+ return globalThis.crypto.subtle;
89
+ }
90
+ // Node.js <= v18
91
+ try {
92
+ const { webcrypto } = await import("crypto"); // node:crypto
93
+ return webcrypto.subtle;
94
+ }
95
+ catch (e) {
96
+ throw new Error("subtle crypto not supported");
97
+ }
98
+ }
99
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"user_export.js","sourceRoot":"","sources":["../../../src/user_export.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,YAAY,EAAE,MAAM,QAAQ,CAAC;AAGtC;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,qBAAqB;IACzC,MAAM,IAAI,GAAG,MAAM,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,yDAAyD;IAClG,MAAM,KAAK,GAAG,IAAI,IAAI,CAAC,WAAW,CAAC;QACjC,GAAG,EAAE,IAAI,IAAI,CAAC,mBAAmB,EAAE;QACnC,GAAG,EAAE,IAAI,IAAI,CAAC,UAAU,EAAE;QAC1B,IAAI,EAAE,IAAI,IAAI,CAAC,SAAS,EAAE;KAC3B,CAAC,CAAC;IACH,OAAO,KAAK,CAAC;AACf,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,gBAAgB;IACpC,OAAO,CAAC,MAAM,qBAAqB,EAAE,CAAC,CAAC,GAAG,CAAC,eAAe,EAAE,CAAC;AAC/D,CAAC;AAED;;;;;GAKG;AACH,SAAS,aAAa,CAAC,CAAa;IAClC,OAAO,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,UAAU,EAAE,CAAC,CAAC,UAAU,GAAG,CAAC,CAAC,UAAU,CAAC,CAAC;AACnE,CAAC;AAED;;;;;;GAMG;AACH,MAAM,CAAC,KAAK,UAAU,iBAAiB,CACrC,YAAuB,EACvB,QAAoC;IAEpC,wCAAwC;IACxC,MAAM,KAAK,GAAG,MAAM,qBAAqB,EAAE,CAAC;IAE5C,4DAA4D;IAC5D,MAAM,IAAI,GAAG,IAAI,WAAW,EAAE,CAAC;IAC/B,MAAM,IAAI,GAAG,IAAI,WAAW,EAAE,CAAC;IAC/B,MAAM,IAAI,GAAG,aAAa,CAAC,IAAI,CAAC,MAAM,CAAC,mCAAmC,QAAQ,CAAC,OAAO,EAAE,CAAC,CAAC,CAAC;IAC/F,MAAM,UAAU,GAAG,aAAa,CAAC,YAAY,CAAC,QAAQ,CAAC,oBAAoB,CAAC,CAAC,CAAC;IAC9E,MAAM,IAAI,GAAG,aAAa,CAAC,YAAY,CAAC,QAAQ,CAAC,sBAAsB,CAAC,CAAC,CAAC;IAC1E,MAAM,SAAS,GAA0B,IAAI,CAAC,KAAK,CACjD,IAAI,CAAC,MAAM,CACT,MAAM,KAAK,CAAC,IAAI,CACd;QACE,YAAY;QACZ,GAAG,EAAE,UAAU;QACf,IAAI,EAAE,IAAI;KACX,EACD,IAAI,CACL,CACF,CACF,CAAC;IAEF,OAAO,SAAS,CAAC;AACnB,CAAC;AAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAM,CAAC,KAAK,UAAU,gBAAgB;IACpC,IAAI,UAAU,KAAK,SAAS,IAAI,UAAU,CAAC,MAAM,KAAK,SAAS,EAAE,CAAC;QAChE,0DAA0D;QAC1D,OAAO,UAAU,CAAC,MAAM,CAAC,MAAM,CAAC;IAClC,CAAC;IACD,iBAAiB;IACjB,IAAI,CAAC;QACH,MAAM,EAAE,SAAS,EAAE,GAAG,MAAM,MAAM,CAAC,QAAQ,CAAC,CAAC,CAAC,cAAc;QAC5D,OAAQ,SAA+B,CAAC,MAAM,CAAC;IACjD,CAAC;IAAC,OAAO,CAAU,EAAE,CAAC;QACpB,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;IACjD,CAAC;AACH,CAAC","sourcesContent":["import { UserExportCompleteResponse, UserExportKeyMaterial } from \"./schema_types\";\nimport { decodeBase64 } from \"./util\";\nimport type { CipherSuite } from \"@hpke/core\";\n\n/** Get the HPKE ciphersuite for user-export decryption.\n *\n * @return {any} The HPKE ciphersuite for user export.\n */\nexport async function userExportCipherSuite(): Promise<CipherSuite> {\n  const hpke = await import(\"@hpke/core\"); // eslint-disable-line @typescript-eslint/no-var-requires\n  const suite = new hpke.CipherSuite({\n    kem: new hpke.DhkemP256HkdfSha256(),\n    kdf: new hpke.HkdfSha256(),\n    aead: new hpke.Aes256Gcm(),\n  });\n  return suite;\n}\n\n/**\n * Generate a key pair for user export.\n *\n * @return {Promise<CryptoKeyPair>} The newly generated key pair.\n */\nexport async function userExportKeygen(): Promise<CryptoKeyPair> {\n  return (await userExportCipherSuite()).kem.generateKeyPair();\n}\n\n/**\n * Get the ArrayBuffer slice represented by a Buffer\n *\n * @param {Uint8Array} b The buffer to convert\n * @return {ArrayBuffer} The resulting ArrayBuffer\n */\nfunction toArrayBuffer(b: Uint8Array): ArrayBuffer {\n  return b.buffer.slice(b.byteOffset, b.byteOffset + b.byteLength);\n}\n\n/**\n * Decrypt a user export.\n *\n * @param {CryptoKey} recipientKey The NIST P-256 secret key corresponding to the `publicKey` argument to the `userExportComplete` invocation that returned `response`.\n * @param {UserExportCompleteResponse} response The response from a successful `userExportComplete` request.\n * @return {Promise<UserExportKeyMaterial>} The decrypted key material.\n */\nexport async function userExportDecrypt(\n  recipientKey: CryptoKey,\n  response: UserExportCompleteResponse,\n): Promise<UserExportKeyMaterial> {\n  // The ciphersuite we use for decryption\n  const suite = await userExportCipherSuite();\n\n  // decrypt the export ciphertext using the HPKE one-shot API\n  const tenc = new TextEncoder();\n  const tdec = new TextDecoder();\n  const info = toArrayBuffer(tenc.encode(`cubist-signer::UserExportOwner::${response.user_id}`));\n  const public_key = toArrayBuffer(decodeBase64(response.ephemeral_public_key));\n  const ctxt = toArrayBuffer(decodeBase64(response.encrypted_key_material));\n  const decrypted: UserExportKeyMaterial = JSON.parse(\n    tdec.decode(\n      await suite.open(\n        {\n          recipientKey,\n          enc: public_key,\n          info: info,\n        },\n        ctxt,\n      ),\n    ),\n  );\n\n  return decrypted;\n}\n\n/**\n * Figure out how to load SubtleCrypto in the current environment.\n *\n * This functionality is reproduced from the hpke-js package,\n *   https://github.com/dajiaji/hpke-js/\n * which is Copyright (C) 2022 Ajitomi Daisuke and licensed\n * under the MIT License, which follows:\n *\n * MIT License\n *\n * Copyright (c) 2022 Ajitomi Daisuke\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell\n * copies of the Software, and to permit persons to whom the Software is\n * furnished to do so, subject to the following conditions:\n *\n * The above copyright notice and this permission notice shall be included in all\n * copies or substantial portions of the Software.\n *\n * THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\n * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\n * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\n * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\n * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\n * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\n * SOFTWARE.\n */\nexport async function loadSubtleCrypto() {\n  if (globalThis !== undefined && globalThis.crypto !== undefined) {\n    // Browsers, Node.js >= v19, Cloudflare Workers, Bun, etc.\n    return globalThis.crypto.subtle;\n  }\n  // Node.js <= v18\n  try {\n    const { webcrypto } = await import(\"crypto\"); // node:crypto\n    return (webcrypto as unknown as Crypto).subtle;\n  } catch (e: unknown) {\n    throw new Error(\"subtle crypto not supported\");\n  }\n}\n"]}
@@ -0,0 +1,56 @@
1
+ /** JSON map type */
2
+ export interface JsonMap {
3
+ [member: string]: string | number | boolean | null | JsonArray | JsonMap;
4
+ }
5
+ /** JSON array type */
6
+ export type JsonArray = Array<string | number | boolean | null | JsonArray | JsonMap>;
7
+ /**
8
+ * Path join
9
+ * @param {string} dir Parent directory
10
+ * @param {string} file Pathname
11
+ * @return {string} New pathname
12
+ */
13
+ export declare function pathJoin(dir: string, file: string): string;
14
+ /**
15
+ * Browser-friendly helper for decoding a 'base64'-encoded string into a byte array.
16
+ *
17
+ * @param {string} b64 The 'base64'-encoded string to decode
18
+ * @return {Uint8Array} Decoded byte array
19
+ */
20
+ export declare function decodeBase64(b64: string): Uint8Array;
21
+ /**
22
+ * Browser-friendly helper for decoding a 'base64url'-encoded string into a byte array.
23
+ *
24
+ * @param {string} b64url The 'base64url'-encoded string to decode
25
+ * @return {Uint8Array} Decoded byte array
26
+ */
27
+ export declare function decodeBase64Url(b64url: string): Uint8Array;
28
+ /**
29
+ *
30
+ * Browser-friendly helper for encoding a byte array into a padded `base64`-encoded string.
31
+ *
32
+ * @param {Iterable<number>} buffer The byte array to encode
33
+ * @return {string} The 'base64' encoding of the byte array.
34
+ */
35
+ export declare function encodeToBase64(buffer: Iterable<number>): string;
36
+ /**
37
+ * Browser-friendly helper for encoding a byte array into a 'base64url`-encoded string.
38
+ *
39
+ * @param {Iterable<number>} buffer The byte array to encode
40
+ * @return {string} The 'base64url' encoding of the byte array.
41
+ */
42
+ export declare function encodeToBase64Url(buffer: Iterable<number>): string;
43
+ /**
44
+ * Sleeps for `ms` milliseconds.
45
+ *
46
+ * @param {number} ms Milliseconds to sleep
47
+ * @return {Promise<void>} A promise that is resolved after `ms` milliseconds.
48
+ */
49
+ export declare function delay(ms: number): Promise<void>;
50
+ /**
51
+ * Converts a string or a uint8 array into a hex string. Strings are encoded in UTF-8 before
52
+ * being converted to hex.
53
+ * @param {string | Uint8Array} message The input
54
+ * @return {string} Hex string prefixed with "0x"
55
+ */
56
+ export declare function encodeToHex(message: string | Uint8Array): string;
@@ -0,0 +1,76 @@
1
+ /**
2
+ * Path join
3
+ * @param {string} dir Parent directory
4
+ * @param {string} file Pathname
5
+ * @return {string} New pathname
6
+ */
7
+ export function pathJoin(dir, file) {
8
+ const sep = globalThis?.process?.platform === "win32" ? "\\" : "/";
9
+ return `${dir}${sep}${file}`;
10
+ }
11
+ /**
12
+ * Browser-friendly helper for decoding a 'base64'-encoded string into a byte array.
13
+ *
14
+ * @param {string} b64 The 'base64'-encoded string to decode
15
+ * @return {Uint8Array} Decoded byte array
16
+ */
17
+ export function decodeBase64(b64) {
18
+ return typeof Buffer === "function"
19
+ ? Buffer.from(b64, "base64")
20
+ : Uint8Array.from(atob(b64), (c) => c.charCodeAt(0));
21
+ }
22
+ /**
23
+ * Browser-friendly helper for decoding a 'base64url'-encoded string into a byte array.
24
+ *
25
+ * @param {string} b64url The 'base64url'-encoded string to decode
26
+ * @return {Uint8Array} Decoded byte array
27
+ */
28
+ export function decodeBase64Url(b64url) {
29
+ // NOTE: there is no "base64url" encoding in the "buffer" module for the browser (unlike in node.js)
30
+ const b64 = b64url.replace(/-/g, "+").replace(/_/g, "/").replace(/=*$/g, "");
31
+ return decodeBase64(b64);
32
+ }
33
+ /**
34
+ *
35
+ * Browser-friendly helper for encoding a byte array into a padded `base64`-encoded string.
36
+ *
37
+ * @param {Iterable<number>} buffer The byte array to encode
38
+ * @return {string} The 'base64' encoding of the byte array.
39
+ */
40
+ export function encodeToBase64(buffer) {
41
+ const bytes = new Uint8Array(buffer);
42
+ const b64 = typeof Buffer === "function"
43
+ ? Buffer.from(bytes).toString("base64")
44
+ : btoa(bytes.reduce((s, b) => s + String.fromCharCode(b), ""));
45
+ return b64;
46
+ }
47
+ /**
48
+ * Browser-friendly helper for encoding a byte array into a 'base64url`-encoded string.
49
+ *
50
+ * @param {Iterable<number>} buffer The byte array to encode
51
+ * @return {string} The 'base64url' encoding of the byte array.
52
+ */
53
+ export function encodeToBase64Url(buffer) {
54
+ const b64 = encodeToBase64(buffer);
55
+ // NOTE: there is no "base64url" encoding in the "buffer" module for the browser (unlike in node.js)
56
+ return b64.replace(/\+/g, "-").replace(/\//g, "_").replace(/=*$/g, "");
57
+ }
58
+ /**
59
+ * Sleeps for `ms` milliseconds.
60
+ *
61
+ * @param {number} ms Milliseconds to sleep
62
+ * @return {Promise<void>} A promise that is resolved after `ms` milliseconds.
63
+ */
64
+ export function delay(ms) {
65
+ return new Promise((resolve) => setTimeout(resolve, ms));
66
+ }
67
+ /**
68
+ * Converts a string or a uint8 array into a hex string. Strings are encoded in UTF-8 before
69
+ * being converted to hex.
70
+ * @param {string | Uint8Array} message The input
71
+ * @return {string} Hex string prefixed with "0x"
72
+ */
73
+ export function encodeToHex(message) {
74
+ return ("0x" + (typeof message === "string" ? Buffer.from(message, "utf8") : message).toString("hex"));
75
+ }
76
+ //# sourceMappingURL=data:application/json;base64,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
package/dist/package.json CHANGED
@@ -1,68 +1,36 @@
1
1
  {
2
2
  "name": "@cubist-labs/cubesigner-sdk",
3
- "author": "Cubist, Inc.",
4
- "version": "0.2.28",
3
+ "version": "0.2.42",
5
4
  "description": "CubeSigner TypeScript SDK",
6
- "homepage": "https://github.com/cubist-labs/CubeSigner-TypeScript-SDK",
7
- "bugs": "https://github.com/cubist-labs/CubeSigner-TypeScript-SDK/issues",
8
5
  "license": "MIT OR Apache-2.0",
6
+ "author": "Cubist, Inc.",
7
+ "main": "dist/src/index.js",
8
+ "types": "dist/src/index.d.ts",
9
9
  "files": [
10
10
  "tsconfig.json",
11
11
  "src/**",
12
12
  "dist/**",
13
- "NOTICE",
14
- "LICENSE-APACHE",
15
- "LICENSE-MIT"
13
+ "../..NOTICE",
14
+ "../..LICENSE-APACHE",
15
+ "../..LICENSE-MIT"
16
16
  ],
17
- "main": "dist/src/index.js",
18
- "types": "dist/src/index.d.ts",
19
17
  "scripts": {
20
18
  "build": "tsc",
21
- "test": "jest --maxWorkers=1",
19
+ "gen-schema": "openapi-typescript ./spec/openapi.json --output ./src/schema.ts",
22
20
  "prepack": "tsc",
23
- "typedoc": "typedoc",
24
- "fix": "eslint . --ext .ts --fix",
25
- "lint": "eslint . --ext .ts",
26
- "fmt": "prettier --write .",
27
- "fmt-check": "prettier --check .",
28
- "gen-schema": "npx openapi-typescript ./spec/openapi.json --output ./src/schema.ts"
21
+ "test": "jest --maxWorkers=1",
22
+ "typedoc": "typedoc"
29
23
  },
30
24
  "dependencies": {
31
- "ethers": "6.7.1",
32
25
  "openapi-fetch": "0.6.1"
33
26
  },
34
- "devDependencies": {
35
- "@hpke/core": "^1.2.5",
36
- "@types/chai": "^4.3.11",
37
- "@types/chai-as-promised": "^7.1.8",
38
- "@types/jest": "^29.5.10",
39
- "@types/node": "^20.10.4",
40
- "@types/node-fetch": "^2.6.9",
41
- "@types/tmp": "^0.2.6",
42
- "@typescript-eslint/eslint-plugin": "^6.13.2",
43
- "chai": "^4.3.10",
44
- "chai-as-promised": "^7.1.1",
45
- "dotenv": "^16.3.1",
46
- "eslint": "^8.55.0",
47
- "eslint-config-google": "^0.14.0",
48
- "eslint-config-prettier": "^9.1.0",
49
- "jest": "^29.7.0",
50
- "openapi-typescript": "^6.7.1",
51
- "otplib": "^12.0.1",
52
- "prettier": "3.1.1",
53
- "tmp": "^0.2.1",
54
- "ts-jest": "^29.1.0",
55
- "ts-node": "^10.9.1",
56
- "typescript": "^5.3.3"
57
- },
58
27
  "optionalDependencies": {
59
- "@aws-sdk/client-cognito-identity-provider": "^3.470.0",
60
28
  "@hpke/core": "^1.2.5"
61
29
  },
62
- "prettier": {
63
- "printWidth": 100
64
- },
65
30
  "engines": {
66
31
  "node": ">=18.0.0"
32
+ },
33
+ "directories": {
34
+ "test": "test"
67
35
  }
68
36
  }
package/dist/src/api.d.ts CHANGED
@@ -1,7 +1,7 @@
1
1
  import createClient, { FetchOptions, FetchResponse, FilterKeys, HttpMethod, PathsWith } from "openapi-fetch";
2
2
  import { paths, operations } from "./schema";
3
3
  import { SignerSessionData, SignerSessionLifetime, SignerSessionManager } from "./session/signer_session_manager";
4
- import { CreateOidcUserOptions, IdentityProof, KeyInRoleInfo, KeyInfoApi, ListKeysResponse, ListRoleKeysResponse, ListRoleUsersResponse, ListRolesResponse, OidcIdentity, SessionsResponse, PublicKeyCredential, RoleInfo, UpdateKeyRequest, UpdateOrgRequest, UpdateOrgResponse, UpdateRoleRequest, UserIdInfo, UserInRoleInfo, UserInfo, SessionInfo, OrgInfo, RatchetConfig, EvmSignRequest, EvmSignResponse, Eth2SignRequest, Eth2SignResponse, Eth2StakeRequest, Eth2StakeResponse, Eth2UnstakeRequest, Eth2UnstakeResponse, BlobSignRequest, BlobSignResponse, BtcSignResponse, BtcSignRequest, SolanaSignRequest, SolanaSignResponse, AvaSignResponse, AvaTx, MfaRequestInfo, MemberRole, UserExportCompleteResponse, UserExportInitResponse, UserExportListResponse, Empty } from "./schema_types";
4
+ import { CreateOidcUserOptions, IdentityProof, KeyInRoleInfo, KeyInfoApi, ListKeysResponse, ListRoleKeysResponse, ListRoleUsersResponse, ListRolesResponse, OidcIdentity, SessionsResponse, PublicKeyCredential, RoleInfo, UpdateKeyRequest, UpdateOrgRequest, UpdateOrgResponse, UpdateRoleRequest, UserIdInfo, UserInRoleInfo, UserInfo, SessionInfo, OrgInfo, RatchetConfig, Eip191SignRequest, Eip712SignRequest, Eip191Or712SignResponse, EvmSignRequest, EvmSignResponse, Eth2SignRequest, Eth2SignResponse, Eth2StakeRequest, Eth2StakeResponse, Eth2UnstakeRequest, Eth2UnstakeResponse, BlobSignRequest, BlobSignResponse, BtcSignResponse, BtcSignRequest, SolanaSignRequest, SolanaSignResponse, AvaSignResponse, AvaTx, MfaRequestInfo, MemberRole, UserExportCompleteResponse, UserExportInitResponse, UserExportListResponse, Empty } from "./schema_types";
5
5
  import { AddFidoChallenge, MfaFidoChallenge, MfaReceipt, TotpChallenge } from "./mfa";
6
6
  import { CubeSignerResponse } from "./response";
7
7
  import { Key, KeyType } from "./key";
@@ -460,6 +460,28 @@ export declare class CubeSignerApi {
460
460
  * @return {Promise<EvmSignResponse | AcceptedResponse>} Signature (or MFA approval request).
461
461
  */
462
462
  signEvm(key: Key | string, req: EvmSignRequest, mfaReceipt?: MfaReceipt): Promise<CubeSignerResponse<EvmSignResponse>>;
463
+ /**
464
+ * Sign EIP-191 typed data.
465
+ *
466
+ * This requires the key to have a '"AllowEip191Signing"' {@link KeyPolicy}.
467
+ *
468
+ * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
469
+ * @param {BlobSignRequest} req What to sign
470
+ * @param {MfaReceipt} mfaReceipt Optional MFA receipt
471
+ * @return {Promise<EvmSignResponse | AcceptedResponse>} Signature (or MFA approval request).
472
+ */
473
+ signEip191(key: Key | string, req: Eip191SignRequest, mfaReceipt?: MfaReceipt): Promise<CubeSignerResponse<Eip191Or712SignResponse>>;
474
+ /**
475
+ * Sign EIP-712 typed data.
476
+ *
477
+ * This requires the key to have a '"AllowEip712Signing"' {@link KeyPolicy}.
478
+ *
479
+ * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
480
+ * @param {BlobSignRequest} req What to sign
481
+ * @param {MfaReceipt} mfaReceipt Optional MFA receipt
482
+ * @return {Promise<EvmSignResponse | AcceptedResponse>} Signature (or MFA approval request).
483
+ */
484
+ signEip712(key: Key | string, req: Eip712SignRequest, mfaReceipt?: MfaReceipt): Promise<CubeSignerResponse<Eip191Or712SignResponse>>;
463
485
  /**
464
486
  * Sign an Eth2/Beacon-chain validation message.
465
487
  *
@@ -569,6 +591,12 @@ export declare class CubeSignerApi {
569
591
  * @return {Promise<UserExportCompleteResponse | AcceptedResponse>} The response.
570
592
  */
571
593
  userExportComplete(keyId: string, publicKey: CryptoKey, mfaReceipt?: MfaReceipt): Promise<CubeSignerResponse<UserExportCompleteResponse>>;
594
+ /**
595
+ * Send a heartbeat / upcheck request.
596
+ *
597
+ * @return { Promise<void> } The response.
598
+ */
599
+ heartbeat(): Promise<void>;
572
600
  }
573
601
  /**
574
602
  * Client to use to send requests to CubeSigner services