@cubist-labs/cubesigner-sdk 0.2.28 → 0.3.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (143) hide show
  1. package/README.md +30 -28
  2. package/dist/cjs/package.json +41 -0
  3. package/dist/cjs/spec/env/beta.json +9 -0
  4. package/dist/cjs/spec/env/gamma.json +9 -0
  5. package/dist/cjs/spec/env/prod.json +9 -0
  6. package/dist/cjs/src/api.d.ts +634 -0
  7. package/dist/cjs/src/api.js +1309 -0
  8. package/dist/cjs/src/client.d.ts +575 -0
  9. package/dist/cjs/src/client.js +378 -0
  10. package/dist/cjs/src/env.d.ts +15 -0
  11. package/dist/cjs/src/env.js +35 -0
  12. package/dist/cjs/src/error.d.ts +29 -0
  13. package/dist/cjs/src/error.js +36 -0
  14. package/dist/cjs/src/events.d.ts +84 -0
  15. package/dist/cjs/src/events.js +195 -0
  16. package/dist/cjs/src/index.d.ts +203 -0
  17. package/dist/cjs/src/index.js +298 -0
  18. package/dist/cjs/src/key.d.ts +152 -0
  19. package/dist/cjs/src/key.js +242 -0
  20. package/dist/{src/fido.d.ts → cjs/src/mfa.d.ts} +33 -15
  21. package/dist/cjs/src/mfa.js +169 -0
  22. package/dist/cjs/src/org.d.ts +99 -0
  23. package/dist/cjs/src/org.js +95 -0
  24. package/dist/cjs/src/paginator.d.ts +76 -0
  25. package/dist/cjs/src/paginator.js +99 -0
  26. package/dist/cjs/src/response.d.ts +101 -0
  27. package/dist/cjs/src/response.js +164 -0
  28. package/dist/cjs/src/role.d.ts +283 -0
  29. package/dist/cjs/src/role.js +253 -0
  30. package/dist/cjs/src/schema.d.ts +6209 -0
  31. package/dist/cjs/src/schema.js +7 -0
  32. package/dist/cjs/src/schema_types.d.ts +113 -0
  33. package/dist/cjs/src/schema_types.js +3 -0
  34. package/dist/cjs/src/session/session_storage.d.ts +27 -0
  35. package/dist/cjs/src/session/session_storage.js +47 -0
  36. package/dist/cjs/src/session/signer_session_manager.d.ts +125 -0
  37. package/dist/cjs/src/session/signer_session_manager.js +239 -0
  38. package/dist/cjs/src/signer_session.d.ts +41 -0
  39. package/dist/cjs/src/signer_session.js +77 -0
  40. package/dist/cjs/src/user_export.d.ts +52 -0
  41. package/dist/cjs/src/user_export.js +129 -0
  42. package/dist/cjs/src/util.d.ts +56 -0
  43. package/dist/cjs/src/util.js +86 -0
  44. package/dist/esm/package.json +41 -0
  45. package/dist/esm/spec/env/beta.json +9 -0
  46. package/dist/esm/spec/env/gamma.json +9 -0
  47. package/dist/esm/spec/env/prod.json +9 -0
  48. package/dist/esm/src/api.d.ts +634 -0
  49. package/dist/esm/src/api.js +1299 -0
  50. package/dist/esm/src/client.d.ts +575 -0
  51. package/dist/esm/src/client.js +374 -0
  52. package/dist/esm/src/env.d.ts +15 -0
  53. package/dist/esm/src/env.js +9 -0
  54. package/dist/esm/src/error.d.ts +29 -0
  55. package/dist/esm/src/error.js +31 -0
  56. package/dist/esm/src/events.d.ts +84 -0
  57. package/dist/esm/src/events.js +189 -0
  58. package/dist/esm/src/index.d.ts +203 -0
  59. package/dist/esm/src/index.js +276 -0
  60. package/dist/esm/src/key.d.ts +152 -0
  61. package/dist/esm/src/key.js +236 -0
  62. package/dist/esm/src/mfa.d.ts +94 -0
  63. package/dist/esm/src/mfa.js +163 -0
  64. package/dist/esm/src/org.d.ts +99 -0
  65. package/dist/esm/src/org.js +91 -0
  66. package/dist/esm/src/paginator.d.ts +76 -0
  67. package/dist/esm/src/paginator.js +94 -0
  68. package/dist/esm/src/response.d.ts +101 -0
  69. package/dist/esm/src/response.js +159 -0
  70. package/dist/esm/src/role.d.ts +283 -0
  71. package/dist/esm/src/role.js +248 -0
  72. package/dist/esm/src/schema.d.ts +6209 -0
  73. package/dist/esm/src/schema.js +6 -0
  74. package/dist/esm/src/schema_types.d.ts +113 -0
  75. package/dist/esm/src/schema_types.js +2 -0
  76. package/dist/esm/src/session/session_storage.d.ts +27 -0
  77. package/dist/esm/src/session/session_storage.js +43 -0
  78. package/dist/esm/src/session/signer_session_manager.d.ts +125 -0
  79. package/dist/esm/src/session/signer_session_manager.js +235 -0
  80. package/dist/esm/src/signer_session.d.ts +41 -0
  81. package/dist/esm/src/signer_session.js +72 -0
  82. package/dist/esm/src/user_export.d.ts +52 -0
  83. package/dist/esm/src/user_export.js +99 -0
  84. package/dist/esm/src/util.d.ts +56 -0
  85. package/dist/esm/src/util.js +76 -0
  86. package/dist/package.json +13 -45
  87. package/dist/src/api.d.ts +29 -1
  88. package/dist/src/api.js +66 -1
  89. package/dist/src/client.d.ts +35 -14
  90. package/dist/src/client.js +12 -8
  91. package/dist/src/events.js +1 -1
  92. package/dist/src/index.d.ts +6 -11
  93. package/dist/src/index.js +9 -25
  94. package/dist/src/key.d.ts +18 -7
  95. package/dist/src/key.js +52 -19
  96. package/dist/src/role.d.ts +46 -3
  97. package/dist/src/role.js +60 -8
  98. package/dist/src/schema.d.ts +206 -72
  99. package/dist/src/schema.js +1 -1
  100. package/dist/src/schema_types.d.ts +3 -0
  101. package/dist/src/schema_types.js +1 -1
  102. package/dist/src/session/signer_session_manager.d.ts +38 -14
  103. package/dist/src/session/signer_session_manager.js +93 -33
  104. package/dist/src/util.d.ts +14 -0
  105. package/dist/src/util.js +24 -27
  106. package/package.json +19 -46
  107. package/src/api.ts +79 -0
  108. package/src/client.ts +12 -8
  109. package/src/events.ts +2 -0
  110. package/src/index.ts +10 -24
  111. package/src/key.ts +36 -18
  112. package/src/role.ts +78 -7
  113. package/src/schema.ts +269 -110
  114. package/src/schema_types.ts +3 -0
  115. package/src/session/session_storage.ts +0 -32
  116. package/src/session/signer_session_manager.ts +124 -36
  117. package/src/util.ts +19 -10
  118. package/tsconfig.json +1 -21
  119. package/LICENSE-APACHE +0 -177
  120. package/LICENSE-MIT +0 -25
  121. package/NOTICE +0 -13
  122. package/dist/examples/ethers.d.ts +0 -1
  123. package/dist/examples/ethers.js +0 -142
  124. package/dist/src/ethers/index.d.ts +0 -95
  125. package/dist/src/ethers/index.js +0 -215
  126. package/dist/src/fido.js +0 -148
  127. package/dist/src/session/cognito_manager.d.ts +0 -71
  128. package/dist/src/session/cognito_manager.js +0 -129
  129. package/dist/src/session/generic.d.ts +0 -47
  130. package/dist/src/session/generic.js +0 -3
  131. package/dist/src/session/management_session_manager.d.ts +0 -59
  132. package/dist/src/session/management_session_manager.js +0 -111
  133. package/dist/src/session/oidc_session_manager.d.ts +0 -78
  134. package/dist/src/session/oidc_session_manager.js +0 -142
  135. package/dist/src/session/session_manager.d.ts +0 -99
  136. package/dist/src/session/session_manager.js +0 -136
  137. package/dist/src/sign.d.ts +0 -114
  138. package/dist/src/sign.js +0 -248
  139. package/dist/test/sessions.d.ts +0 -35
  140. package/dist/test/sessions.js +0 -56
  141. package/src/ethers/index.ts +0 -253
  142. package/src/session/cognito_manager.ts +0 -161
  143. package/src/session/session_manager.ts +0 -165
package/dist/src/fido.js DELETED
@@ -1,148 +0,0 @@
1
- "use strict";
2
- /* eslint-disable @typescript-eslint/no-explicit-any */
3
- var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
4
- if (kind === "m") throw new TypeError("Private method is not writable");
5
- if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
6
- if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
7
- return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
8
- };
9
- var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
10
- if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
11
- if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
12
- return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
13
- };
14
- var _AddFidoChallenge_cs, _MfaFidoChallenge_ss;
15
- Object.defineProperty(exports, "__esModule", { value: true });
16
- exports.MfaFidoChallenge = exports.AddFidoChallenge = void 0;
17
- const util_1 = require("./util");
18
- /**
19
- * Returned after creating a request to add a new FIDO device.
20
- * Provides some helper methods for answering this challenge.
21
- */
22
- class AddFidoChallenge {
23
- /**
24
- * Constructor
25
- * @param {CubeSigner} cs CubeSigner instance used to request to add a FIDO device
26
- * @param {ApiAddFidoChallenge} challenge The challenge returned by the remote end.
27
- */
28
- constructor(cs, challenge) {
29
- _AddFidoChallenge_cs.set(this, void 0);
30
- __classPrivateFieldSet(this, _AddFidoChallenge_cs, cs, "f");
31
- this.challengeId = challenge.challenge_id;
32
- // fix options returned from the server: rename fields and decode base64 fields to uint8[]
33
- this.options = {
34
- ...challenge.options,
35
- challenge: (0, util_1.decodeBase64Url)(challenge.options.challenge),
36
- };
37
- this.options.pubKeyCredParams ??= challenge.options.pub_key_cred_params;
38
- this.options.excludeCredentials ??= challenge.options.exclude_credentials;
39
- this.options.authenticatorSelection ??= challenge.options.authenticator_selection;
40
- delete this.options.pub_key_cred_params;
41
- delete this.options.exclude_credentials;
42
- delete this.options.authenticator_selection;
43
- if (challenge.options.user) {
44
- this.options.user.id = (0, util_1.decodeBase64Url)(challenge.options.user.id);
45
- }
46
- for (const credential of this.options.excludeCredentials ?? []) {
47
- credential.id = (0, util_1.decodeBase64Url)(credential.id);
48
- }
49
- }
50
- /**
51
- * Answers this challenge by using the `CredentialsContainer` API to create a credential
52
- * based on the the public key credential creation options from this challenge.
53
- */
54
- async createCredentialAndAnswer() {
55
- const cred = await navigator.credentials.create({ publicKey: this.options });
56
- await this.answer(cred);
57
- }
58
- /**
59
- * Answers this challenge using a given credential `cred`;
60
- * the credential should be obtained by calling
61
- *
62
- * ```
63
- * const cred = await navigator.credentials.create({ publicKey: this.options });
64
- * ```
65
- *
66
- * @param {any} cred Credential created by calling the `CredentialContainer`'s `create` method
67
- * based on the public key creation options from this challenge.
68
- */
69
- async answer(cred) {
70
- const answer = {
71
- id: cred.id,
72
- response: {
73
- clientDataJSON: (0, util_1.encodeToBase64Url)(cred.response.clientDataJSON),
74
- attestationObject: (0, util_1.encodeToBase64Url)(cred.response.attestationObject),
75
- },
76
- };
77
- await __classPrivateFieldGet(this, _AddFidoChallenge_cs, "f").addFidoComplete(this.challengeId, answer);
78
- }
79
- }
80
- exports.AddFidoChallenge = AddFidoChallenge;
81
- _AddFidoChallenge_cs = new WeakMap();
82
- /**
83
- * Returned after initiating MFA approval using FIDO.
84
- * Provides some helper methods for answering this challenge.
85
- */
86
- class MfaFidoChallenge {
87
- /**
88
- * @param {SignerSession} ss The session used to initiate MFA approval using FIDO
89
- * @param {string} mfaId The MFA request id.
90
- * @param {ApiMfaFidoChallenge} challenge The challenge returned by the remote end
91
- */
92
- constructor(ss, mfaId, challenge) {
93
- _MfaFidoChallenge_ss.set(this, void 0);
94
- __classPrivateFieldSet(this, _MfaFidoChallenge_ss, ss, "f");
95
- this.mfaId = mfaId;
96
- this.challengeId = challenge.challenge_id;
97
- // fix options returned from the server: rename fields and decode base64 fields into uint8[]
98
- this.options = {
99
- ...challenge.options,
100
- challenge: (0, util_1.decodeBase64Url)(challenge.options.challenge),
101
- };
102
- this.options.rpId ??= challenge.options.rp_id;
103
- this.options.allowCredentials ??= challenge.options.allow_credentials;
104
- this.options.userVerification ??= challenge.options.user_verification;
105
- delete this.options.rp_id;
106
- delete this.options.allow_credentials;
107
- delete this.options.user_verification;
108
- for (const credential of this.options.allowCredentials ?? []) {
109
- credential.id = (0, util_1.decodeBase64Url)(credential.id);
110
- if (credential.transports === null) {
111
- delete credential.transports;
112
- }
113
- }
114
- }
115
- /**
116
- * Answers this challenge by using the `CredentialsContainer` API to get a credential
117
- * based on the the public key credential request options from this challenge.
118
- */
119
- async createCredentialAndAnswer() {
120
- const cred = await navigator.credentials.get({ publicKey: this.options });
121
- return await this.answer(cred);
122
- }
123
- /**
124
- * Answers this challenge using a given credential `cred`.
125
- * To obtain this credential, for example, call
126
- *
127
- * ```
128
- * const cred = await navigator.credentials.get({ publicKey: this.options });
129
- * ```
130
- *
131
- * @param {any} cred Credential created by calling the `CredentialContainer`'s `get` method
132
- * based on the public key credential request options from this challenge.
133
- */
134
- async answer(cred) {
135
- const answer = {
136
- id: cred.id,
137
- response: {
138
- clientDataJSON: (0, util_1.encodeToBase64Url)(cred.response.clientDataJSON),
139
- authenticatorData: (0, util_1.encodeToBase64Url)(cred.response.authenticatorData),
140
- signature: (0, util_1.encodeToBase64Url)(cred.response.signature),
141
- },
142
- };
143
- return await __classPrivateFieldGet(this, _MfaFidoChallenge_ss, "f").fidoApproveComplete(this.mfaId, this.challengeId, answer);
144
- }
145
- }
146
- exports.MfaFidoChallenge = MfaFidoChallenge;
147
- _MfaFidoChallenge_ss = new WeakMap();
148
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"fido.js","sourceRoot":"","sources":["../../src/fido.ts"],"names":[],"mappings":";AAAA,uDAAuD;;;;;;;;;;;;;;;AAIvD,iCAA4D;AAmB5D;;;GAGG;AACH,MAAa,gBAAgB;IAK3B;;;;OAIG;IACH,YAAY,EAAc,EAAE,SAA8B;QATjD,uCAAgB;QAUvB,uBAAA,IAAI,wBAAO,EAAE,MAAA,CAAC;QACd,IAAI,CAAC,WAAW,GAAG,SAAS,CAAC,YAAY,CAAC;QAE1C,0FAA0F;QAC1F,IAAI,CAAC,OAAO,GAAG;YACb,GAAG,SAAS,CAAC,OAAO;YACpB,SAAS,EAAE,IAAA,sBAAe,EAAC,SAAS,CAAC,OAAO,CAAC,SAAS,CAAC;SACxD,CAAC;QACF,IAAI,CAAC,OAAO,CAAC,gBAAgB,KAAK,SAAS,CAAC,OAAO,CAAC,mBAAmB,CAAC;QACxE,IAAI,CAAC,OAAO,CAAC,kBAAkB,KAAK,SAAS,CAAC,OAAO,CAAC,mBAAmB,CAAC;QAC1E,IAAI,CAAC,OAAO,CAAC,sBAAsB,KAAK,SAAS,CAAC,OAAO,CAAC,uBAAuB,CAAC;QAClF,OAAO,IAAI,CAAC,OAAO,CAAC,mBAAmB,CAAC;QACxC,OAAO,IAAI,CAAC,OAAO,CAAC,mBAAmB,CAAC;QACxC,OAAO,IAAI,CAAC,OAAO,CAAC,uBAAuB,CAAC;QAE5C,IAAI,SAAS,CAAC,OAAO,CAAC,IAAI,EAAE;YAC1B,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,GAAG,IAAA,sBAAe,EAAC,SAAS,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;SACnE;QAED,KAAK,MAAM,UAAU,IAAI,IAAI,CAAC,OAAO,CAAC,kBAAkB,IAAI,EAAE,EAAE;YAC9D,UAAU,CAAC,EAAE,GAAG,IAAA,sBAAe,EAAC,UAAU,CAAC,EAAE,CAAC,CAAC;SAChD;IACH,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,yBAAyB;QAC7B,MAAM,IAAI,GAAG,MAAM,SAAS,CAAC,WAAW,CAAC,MAAM,CAAC,EAAE,SAAS,EAAE,IAAI,CAAC,OAAO,EAAE,CAAC,CAAC;QAC7E,MAAM,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;IAC1B,CAAC;IAED;;;;;;;;;;OAUG;IACH,KAAK,CAAC,MAAM,CAAC,IAAS;QACpB,MAAM,MAAM,GAAwB;YAClC,EAAE,EAAE,IAAI,CAAC,EAAE;YACX,QAAQ,EAAE;gBACR,cAAc,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,cAAc,CAAC;gBAC/D,iBAAiB,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC;aACtE;SACF,CAAC;QACF,MAAM,uBAAA,IAAI,4BAAI,CAAC,eAAe,CAAC,IAAI,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;IAC3D,CAAC;CACF;AAjED,4CAiEC;;AAED;;;GAGG;AACH,MAAa,gBAAgB;IAM3B;;;;OAIG;IACH,YAAY,EAAiB,EAAE,KAAa,EAAE,SAA8B;QAVnE,uCAAmB;QAW1B,uBAAA,IAAI,wBAAO,EAAE,MAAA,CAAC;QACd,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;QACnB,IAAI,CAAC,WAAW,GAAG,SAAS,CAAC,YAAY,CAAC;QAE1C,4FAA4F;QAC5F,IAAI,CAAC,OAAO,GAAG;YACb,GAAG,SAAS,CAAC,OAAO;YACpB,SAAS,EAAE,IAAA,sBAAe,EAAC,SAAS,CAAC,OAAO,CAAC,SAAS,CAAC;SACxD,CAAC;QACF,IAAI,CAAC,OAAO,CAAC,IAAI,KAAK,SAAS,CAAC,OAAO,CAAC,KAAK,CAAC;QAC9C,IAAI,CAAC,OAAO,CAAC,gBAAgB,KAAK,SAAS,CAAC,OAAO,CAAC,iBAAiB,CAAC;QACtE,IAAI,CAAC,OAAO,CAAC,gBAAgB,KAAK,SAAS,CAAC,OAAO,CAAC,iBAAiB,CAAC;QACtE,OAAO,IAAI,CAAC,OAAO,CAAC,KAAK,CAAC;QAC1B,OAAO,IAAI,CAAC,OAAO,CAAC,iBAAiB,CAAC;QACtC,OAAO,IAAI,CAAC,OAAO,CAAC,iBAAiB,CAAC;QAEtC,KAAK,MAAM,UAAU,IAAI,IAAI,CAAC,OAAO,CAAC,gBAAgB,IAAI,EAAE,EAAE;YAC5D,UAAU,CAAC,EAAE,GAAG,IAAA,sBAAe,EAAC,UAAU,CAAC,EAAE,CAAC,CAAC;YAC/C,IAAI,UAAU,CAAC,UAAU,KAAK,IAAI,EAAE;gBAClC,OAAO,UAAU,CAAC,UAAU,CAAC;aAC9B;SACF;IACH,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,yBAAyB;QAC7B,MAAM,IAAI,GAAG,MAAM,SAAS,CAAC,WAAW,CAAC,GAAG,CAAC,EAAE,SAAS,EAAE,IAAI,CAAC,OAAO,EAAE,CAAC,CAAC;QAC1E,OAAO,MAAM,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;IACjC,CAAC;IAED;;;;;;;;;;OAUG;IACH,KAAK,CAAC,MAAM,CAAC,IAAS;QACpB,MAAM,MAAM,GAAwB;YAClC,EAAE,EAAE,IAAI,CAAC,EAAE;YACX,QAAQ,EAAE;gBACR,cAAc,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,cAAc,CAAC;gBAC/D,iBAAiB,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC;gBACrE,SAAS,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC;aACtD;SACF,CAAC;QACF,OAAO,MAAM,uBAAA,IAAI,4BAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,KAAK,EAAE,IAAI,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;IAClF,CAAC;CACF;AAnED,4CAmEC","sourcesContent":["/* eslint-disable @typescript-eslint/no-explicit-any */\n\nimport { CubeSigner, MfaRequestInfo, SignerSession } from \".\";\nimport { components } from \"./schema\";\nimport { decodeBase64Url, encodeToBase64Url } from \"./util\";\n\nexport type ApiAddFidoChallenge =\n  components[\"responses\"][\"FidoCreateChallengeResponse\"][\"content\"][\"application/json\"];\n\nexport type ApiMfaFidoChallenge =\n  components[\"responses\"][\"FidoAssertChallenge\"][\"content\"][\"application/json\"];\n\nexport type PublicKeyCredentialCreationOptions =\n  components[\"schemas\"][\"PublicKeyCredentialCreationOptions\"];\nexport type PublicKeyCredentialRequestOptions =\n  components[\"schemas\"][\"PublicKeyCredentialRequestOptions\"];\nexport type PublicKeyCredentialParameters = components[\"schemas\"][\"PublicKeyCredentialParameters\"];\nexport type PublicKeyCredentialDescriptor = components[\"schemas\"][\"PublicKeyCredentialDescriptor\"];\nexport type AuthenticatorSelectionCriteria =\n  components[\"schemas\"][\"AuthenticatorSelectionCriteria\"];\nexport type PublicKeyCredentialUserEntity = components[\"schemas\"][\"PublicKeyCredentialUserEntity\"];\nexport type PublicKeyCredential = components[\"schemas\"][\"PublicKeyCredential\"];\n\n/**\n * Returned after creating a request to add a new FIDO device.\n * Provides some helper methods for answering this challenge.\n */\nexport class AddFidoChallenge {\n  readonly #cs: CubeSigner;\n  readonly challengeId: string;\n  readonly options: any;\n\n  /**\n   * Constructor\n   * @param {CubeSigner} cs CubeSigner instance used to request to add a FIDO device\n   * @param {ApiAddFidoChallenge} challenge The challenge returned by the remote end.\n   */\n  constructor(cs: CubeSigner, challenge: ApiAddFidoChallenge) {\n    this.#cs = cs;\n    this.challengeId = challenge.challenge_id;\n\n    // fix options returned from the server: rename fields and decode base64 fields to uint8[]\n    this.options = {\n      ...challenge.options,\n      challenge: decodeBase64Url(challenge.options.challenge),\n    };\n    this.options.pubKeyCredParams ??= challenge.options.pub_key_cred_params;\n    this.options.excludeCredentials ??= challenge.options.exclude_credentials;\n    this.options.authenticatorSelection ??= challenge.options.authenticator_selection;\n    delete this.options.pub_key_cred_params;\n    delete this.options.exclude_credentials;\n    delete this.options.authenticator_selection;\n\n    if (challenge.options.user) {\n      this.options.user.id = decodeBase64Url(challenge.options.user.id);\n    }\n\n    for (const credential of this.options.excludeCredentials ?? []) {\n      credential.id = decodeBase64Url(credential.id);\n    }\n  }\n\n  /**\n   * Answers this challenge by using the `CredentialsContainer` API to create a credential\n   * based on the the public key credential creation options from this challenge.\n   */\n  async createCredentialAndAnswer() {\n    const cred = await navigator.credentials.create({ publicKey: this.options });\n    await this.answer(cred);\n  }\n\n  /**\n   * Answers this challenge using a given credential `cred`;\n   * the credential should be obtained by calling\n   *\n   * ```\n   * const cred = await navigator.credentials.create({ publicKey: this.options });\n   * ```\n   *\n   * @param {any} cred Credential created by calling the `CredentialContainer`'s `create` method\n   *                   based on the public key creation options from this challenge.\n   */\n  async answer(cred: any) {\n    const answer = <PublicKeyCredential>{\n      id: cred.id,\n      response: {\n        clientDataJSON: encodeToBase64Url(cred.response.clientDataJSON),\n        attestationObject: encodeToBase64Url(cred.response.attestationObject),\n      },\n    };\n    await this.#cs.addFidoComplete(this.challengeId, answer);\n  }\n}\n\n/**\n * Returned after initiating MFA approval using FIDO.\n * Provides some helper methods for answering this challenge.\n */\nexport class MfaFidoChallenge {\n  readonly #ss: SignerSession;\n  readonly mfaId: string;\n  readonly challengeId: string;\n  readonly options: any;\n\n  /**\n   * @param {SignerSession} ss The session used to initiate MFA approval using FIDO\n   * @param {string} mfaId The MFA request id.\n   * @param {ApiMfaFidoChallenge} challenge The challenge returned by the remote end\n   */\n  constructor(ss: SignerSession, mfaId: string, challenge: ApiMfaFidoChallenge) {\n    this.#ss = ss;\n    this.mfaId = mfaId;\n    this.challengeId = challenge.challenge_id;\n\n    // fix options returned from the server: rename fields and decode base64 fields into uint8[]\n    this.options = {\n      ...challenge.options,\n      challenge: decodeBase64Url(challenge.options.challenge),\n    };\n    this.options.rpId ??= challenge.options.rp_id;\n    this.options.allowCredentials ??= challenge.options.allow_credentials;\n    this.options.userVerification ??= challenge.options.user_verification;\n    delete this.options.rp_id;\n    delete this.options.allow_credentials;\n    delete this.options.user_verification;\n\n    for (const credential of this.options.allowCredentials ?? []) {\n      credential.id = decodeBase64Url(credential.id);\n      if (credential.transports === null) {\n        delete credential.transports;\n      }\n    }\n  }\n\n  /**\n   * Answers this challenge by using the `CredentialsContainer` API to get a credential\n   * based on the the public key credential request options from this challenge.\n   */\n  async createCredentialAndAnswer(): Promise<MfaRequestInfo> {\n    const cred = await navigator.credentials.get({ publicKey: this.options });\n    return await this.answer(cred);\n  }\n\n  /**\n   * Answers this challenge using a given credential `cred`.\n   * To obtain this credential, for example, call\n   *\n   * ```\n   * const cred = await navigator.credentials.get({ publicKey: this.options });\n   * ```\n   *\n   * @param {any} cred Credential created by calling the `CredentialContainer`'s `get` method\n   *                   based on the public key credential request options from this challenge.\n   */\n  async answer(cred: any): Promise<MfaRequestInfo> {\n    const answer = <PublicKeyCredential>{\n      id: cred.id,\n      response: {\n        clientDataJSON: encodeToBase64Url(cred.response.clientDataJSON),\n        authenticatorData: encodeToBase64Url(cred.response.authenticatorData),\n        signature: encodeToBase64Url(cred.response.signature),\n      },\n    };\n    return await this.#ss.fidoApproveComplete(this.mfaId, this.challengeId, answer);\n  }\n}\n"]}
@@ -1,71 +0,0 @@
1
- import { Client } from "../api";
2
- import { HasEnv, OrgSessionManager } from "./session_manager";
3
- import { SessionStorage } from "./session_storage";
4
- /** JSON representation of our "management session" file format */
5
- export interface CognitoSessionObject {
6
- /** The organization ID */
7
- org_id: string;
8
- /** The email address of the user */
9
- email: string;
10
- /** The ID token */
11
- id_token: string;
12
- /** The access token */
13
- access_token: string;
14
- /** The refresh token */
15
- refresh_token: string;
16
- /** The expiration time of the access token */
17
- expiration: string;
18
- }
19
- export interface CognitoSessionInfo extends CognitoSessionObject, HasEnv {
20
- }
21
- /** Type of storage required for cognito (management) sessions */
22
- export type CognitoSessionStorage = SessionStorage<CognitoSessionInfo>;
23
- /** The session manager for cognito (management) sessions */
24
- export declare class CognitoSessionManager extends OrgSessionManager<CognitoSessionInfo> {
25
- #private;
26
- /**
27
- * @return {string} The current auth token.
28
- * @internal
29
- */
30
- token(): Promise<string>;
31
- /**
32
- * Returns a client with the current session and refreshes the current
33
- * session.
34
- */
35
- client(): Promise<Client>;
36
- /** Revokes the session. */
37
- revoke(): Promise<void>;
38
- /**
39
- * Returns whether it's time to refresh this token.
40
- * @return {boolean} Whether it's time to refresh this token.
41
- * @internal
42
- */
43
- isStale(): Promise<boolean>;
44
- /**
45
- * Refreshes the session and **UPDATES/MUTATES** self.
46
- */
47
- refresh(): Promise<void>;
48
- /**
49
- * Loads an existing cognito (management) session from storage.
50
- * @param {CognitoSessionStorage} storage The storage back end to use
51
- * @return {Promise<SingerSession>} New token
52
- */
53
- static loadFromStorage(storage: CognitoSessionStorage): Promise<CognitoSessionManager>;
54
- /**
55
- * Loads an existing management session and creates a Cognito session manager for it.
56
- *
57
- * @param {CognitoSessionStorage} storage Optional session storage to load
58
- * the session from. If not specified, the management session from the config
59
- * directory will be loaded.
60
- * @return {Promise<CognitoSessionManager>} Cognito session manager
61
- */
62
- static loadManagementSession(storage?: CognitoSessionStorage): Promise<CognitoSessionManager>;
63
- /**
64
- * Constructor.
65
- * @param {EnvInterface} env The environment of the session
66
- * @param {string} orgId The id of the org associated with this session
67
- * @param {string} token The current token of the session
68
- * @param {CognitoSessionStorage} storage The storage back end to use
69
- */
70
- private constructor();
71
- }
@@ -1,129 +0,0 @@
1
- "use strict";
2
- var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
3
- if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
4
- if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
5
- return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
6
- };
7
- var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
8
- if (kind === "m") throw new TypeError("Private method is not writable");
9
- if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
10
- if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
11
- return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
12
- };
13
- var __importDefault = (this && this.__importDefault) || function (mod) {
14
- return (mod && mod.__esModule) ? mod : { "default": mod };
15
- };
16
- var _CognitoSessionManager_client;
17
- Object.defineProperty(exports, "__esModule", { value: true });
18
- exports.CognitoSessionManager = void 0;
19
- const path_1 = __importDefault(require("path"));
20
- const session_manager_1 = require("./session_manager");
21
- const session_storage_1 = require("./session_storage");
22
- const util_1 = require("../util");
23
- /** The session manager for cognito (management) sessions */
24
- class CognitoSessionManager extends session_manager_1.OrgSessionManager {
25
- /**
26
- * @return {string} The current auth token.
27
- * @internal
28
- */
29
- async token() {
30
- const session = await this.storage.retrieve();
31
- return session.id_token;
32
- }
33
- /**
34
- * Returns a client with the current session and refreshes the current
35
- * session.
36
- */
37
- async client() {
38
- this.refreshIfNeeded();
39
- return __classPrivateFieldGet(this, _CognitoSessionManager_client, "f");
40
- }
41
- /** Revokes the session. */
42
- async revoke() {
43
- const idp = require("@aws-sdk/client-cognito-identity-provider"); // eslint-disable-line @typescript-eslint/no-var-requires
44
- const session = await this.storage.retrieve();
45
- const client = new idp.CognitoIdentityProviderClient({
46
- region: this.env.Region,
47
- signer: { sign: async (request) => request }, // eslint-disable-line @typescript-eslint/no-explicit-any
48
- });
49
- const input = {
50
- Token: session.refresh_token,
51
- ClientId: this.env.ClientId,
52
- };
53
- await client.send(new idp.RevokeTokenCommand(input));
54
- }
55
- /**
56
- * Returns whether it's time to refresh this token.
57
- * @return {boolean} Whether it's time to refresh this token.
58
- * @internal
59
- */
60
- async isStale() {
61
- const session = await this.storage.retrieve();
62
- return session_manager_1.SessionManager.isStale(new Date(session.expiration));
63
- }
64
- /**
65
- * Refreshes the session and **UPDATES/MUTATES** self.
66
- */
67
- async refresh() {
68
- const idp = require("@aws-sdk/client-cognito-identity-provider"); // eslint-disable-line @typescript-eslint/no-var-requires
69
- const session = await this.storage.retrieve();
70
- const client = new idp.CognitoIdentityProviderClient({ region: this.env.Region });
71
- const resp = await client.send(new idp.InitiateAuthCommand({
72
- AuthFlow: "REFRESH_TOKEN_AUTH",
73
- AuthParameters: {
74
- REFRESH_TOKEN: session.refresh_token,
75
- },
76
- ClientId: this.env.ClientId,
77
- }));
78
- if (!resp.AuthenticationResult ||
79
- !resp.AuthenticationResult.ExpiresIn ||
80
- !resp.AuthenticationResult.IdToken) {
81
- throw new Error("Refresh failed");
82
- }
83
- const expiresInMs = resp.AuthenticationResult.ExpiresIn * 1000;
84
- const expiration = new Date(new Date().getTime() + expiresInMs).toISOString();
85
- const idToken = resp.AuthenticationResult.IdToken;
86
- await this.storage.save({
87
- ...session,
88
- id_token: idToken,
89
- access_token: resp.AuthenticationResult.AccessToken,
90
- expiration,
91
- });
92
- __classPrivateFieldSet(this, _CognitoSessionManager_client, this.createClient(idToken), "f");
93
- }
94
- /**
95
- * Loads an existing cognito (management) session from storage.
96
- * @param {CognitoSessionStorage} storage The storage back end to use
97
- * @return {Promise<SingerSession>} New token
98
- */
99
- static async loadFromStorage(storage) {
100
- const sessionInfo = await storage.retrieve();
101
- return new CognitoSessionManager(sessionInfo.env["Dev-CubeSignerStack"], sessionInfo.org_id, sessionInfo.id_token, storage);
102
- }
103
- /**
104
- * Loads an existing management session and creates a Cognito session manager for it.
105
- *
106
- * @param {CognitoSessionStorage} storage Optional session storage to load
107
- * the session from. If not specified, the management session from the config
108
- * directory will be loaded.
109
- * @return {Promise<CognitoSessionManager>} Cognito session manager
110
- */
111
- static async loadManagementSession(storage) {
112
- return await CognitoSessionManager.loadFromStorage(storage ?? new session_storage_1.JsonFileSessionStorage(path_1.default.join((0, util_1.configDir)(), "management-session.json")));
113
- }
114
- /**
115
- * Constructor.
116
- * @param {EnvInterface} env The environment of the session
117
- * @param {string} orgId The id of the org associated with this session
118
- * @param {string} token The current token of the session
119
- * @param {CognitoSessionStorage} storage The storage back end to use
120
- */
121
- constructor(env, orgId, token, storage) {
122
- super(env, orgId, storage);
123
- _CognitoSessionManager_client.set(this, void 0);
124
- __classPrivateFieldSet(this, _CognitoSessionManager_client, this.createClient(token), "f");
125
- }
126
- }
127
- exports.CognitoSessionManager = CognitoSessionManager;
128
- _CognitoSessionManager_client = new WeakMap();
129
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"cognito_manager.js","sourceRoot":"","sources":["../../../src/session/cognito_manager.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;AAAA,gDAAwB;AAGxB,uDAA8E;AAC9E,uDAA2E;AAC3E,kCAAoC;AAuBpC,4DAA4D;AAC5D,MAAa,qBAAsB,SAAQ,mCAAqC;IAG9E;;;OAGG;IACH,KAAK,CAAC,KAAK;QACT,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,OAAO,OAAO,CAAC,QAAQ,CAAC;IAC1B,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,MAAM;QACV,IAAI,CAAC,eAAe,EAAE,CAAC;QACvB,OAAO,uBAAA,IAAI,qCAAQ,CAAC;IACtB,CAAC;IAED,2BAA2B;IAC3B,KAAK,CAAC,MAAM;QACV,MAAM,GAAG,GAAG,OAAO,CAAC,2CAA2C,CAAC,CAAC,CAAC,yDAAyD;QAC3H,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,MAAM,MAAM,GAAG,IAAI,GAAG,CAAC,6BAA6B,CAAC;YACnD,MAAM,EAAE,IAAI,CAAC,GAAG,CAAC,MAAM;YACvB,MAAM,EAAE,EAAE,IAAI,EAAE,KAAK,EAAE,OAAY,EAAE,EAAE,CAAC,OAAO,EAAE,EAAE,yDAAyD;SAC7G,CAAC,CAAC;QACH,MAAM,KAAK,GAAG;YACZ,KAAK,EAAE,OAAO,CAAC,aAAa;YAC5B,QAAQ,EAAE,IAAI,CAAC,GAAG,CAAC,QAAQ;SAC5B,CAAC;QACF,MAAM,MAAM,CAAC,IAAI,CAAC,IAAI,GAAG,CAAC,kBAAkB,CAAC,KAAK,CAAC,CAAC,CAAC;IACvD,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,OAAO,gCAAc,CAAC,OAAO,CAAC,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC;IAC9D,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,GAAG,GAAG,OAAO,CAAC,2CAA2C,CAAC,CAAC,CAAC,yDAAyD;QAC3H,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,MAAM,MAAM,GAAG,IAAI,GAAG,CAAC,6BAA6B,CAAC,EAAE,MAAM,EAAE,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,CAAC,CAAC;QAClF,MAAM,IAAI,GAAG,MAAM,MAAM,CAAC,IAAI,CAC5B,IAAI,GAAG,CAAC,mBAAmB,CAAC;YAC1B,QAAQ,EAAE,oBAAoB;YAC9B,cAAc,EAAE;gBACd,aAAa,EAAE,OAAO,CAAC,aAAa;aACrC;YACD,QAAQ,EAAE,IAAI,CAAC,GAAG,CAAC,QAAQ;SAC5B,CAAC,CACH,CAAC;QAEF,IACE,CAAC,IAAI,CAAC,oBAAoB;YAC1B,CAAC,IAAI,CAAC,oBAAoB,CAAC,SAAS;YACpC,CAAC,IAAI,CAAC,oBAAoB,CAAC,OAAO,EAClC,CAAC;YACD,MAAM,IAAI,KAAK,CAAC,gBAAgB,CAAC,CAAC;QACpC,CAAC;QAED,MAAM,WAAW,GAAG,IAAI,CAAC,oBAAoB,CAAC,SAAS,GAAG,IAAI,CAAC;QAC/D,MAAM,UAAU,GAAG,IAAI,IAAI,CAAC,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,GAAG,WAAW,CAAC,CAAC,WAAW,EAAE,CAAC;QAC9E,MAAM,OAAO,GAAG,IAAI,CAAC,oBAAoB,CAAC,OAAO,CAAC;QAElD,MAAM,IAAI,CAAC,OAAO,CAAC,IAAI,CAAqB;YAC1C,GAAG,OAAO;YACV,QAAQ,EAAE,OAAO;YACjB,YAAY,EAAE,IAAI,CAAC,oBAAoB,CAAC,WAAW;YACnD,UAAU;SACX,CAAC,CAAC;QACH,uBAAA,IAAI,iCAAW,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,MAAA,CAAC;IAC5C,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,eAAe,CAAC,OAA8B;QACzD,MAAM,WAAW,GAAG,MAAM,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC7C,OAAO,IAAI,qBAAqB,CAC9B,WAAW,CAAC,GAAG,CAAC,qBAAqB,CAAC,EACtC,WAAW,CAAC,MAAM,EAClB,WAAW,CAAC,QAAQ,EACpB,OAAO,CACR,CAAC;IACJ,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,KAAK,CAAC,qBAAqB,CAChC,OAA+B;QAE/B,OAAO,MAAM,qBAAqB,CAAC,eAAe,CAChD,OAAO,IAAI,IAAI,wCAAsB,CAAC,cAAI,CAAC,IAAI,CAAC,IAAA,gBAAS,GAAE,EAAE,yBAAyB,CAAC,CAAC,CACzF,CAAC;IACJ,CAAC;IAED;;;;;;OAMG;IACH,YACE,GAAiB,EACjB,KAAa,EACb,KAAa,EACb,OAA8B;QAE9B,KAAK,CAAC,GAAG,EAAE,KAAK,EAAE,OAAO,CAAC,CAAC;QA/H7B,gDAAgB;QAgId,uBAAA,IAAI,iCAAW,IAAI,CAAC,YAAY,CAAC,KAAK,CAAC,MAAA,CAAC;IAC1C,CAAC;CACF;AAnID,sDAmIC","sourcesContent":["import path from \"path\";\nimport { Client } from \"../api\";\nimport { EnvInterface } from \"../env\";\nimport { HasEnv, OrgSessionManager, SessionManager } from \"./session_manager\";\nimport { JsonFileSessionStorage, SessionStorage } from \"./session_storage\";\nimport { configDir } from \"../util\";\n\n/** JSON representation of our \"management session\" file format */\nexport interface CognitoSessionObject {\n  /** The organization ID */\n  org_id: string;\n  /** The email address of the user */\n  email: string;\n  /** The ID token */\n  id_token: string;\n  /** The access token */\n  access_token: string;\n  /** The refresh token */\n  refresh_token: string;\n  /** The expiration time of the access token */\n  expiration: string;\n}\n\nexport interface CognitoSessionInfo extends CognitoSessionObject, HasEnv {}\n\n/** Type of storage required for cognito (management) sessions */\nexport type CognitoSessionStorage = SessionStorage<CognitoSessionInfo>;\n\n/** The session manager for cognito (management) sessions */\nexport class CognitoSessionManager extends OrgSessionManager<CognitoSessionInfo> {\n  #client: Client;\n\n  /**\n   * @return {string} The current auth token.\n   * @internal\n   */\n  async token(): Promise<string> {\n    const session = await this.storage.retrieve();\n    return session.id_token;\n  }\n\n  /**\n   * Returns a client with the current session and refreshes the current\n   * session.\n   */\n  async client(): Promise<Client> {\n    this.refreshIfNeeded();\n    return this.#client;\n  }\n\n  /** Revokes the session. */\n  async revoke(): Promise<void> {\n    const idp = require(\"@aws-sdk/client-cognito-identity-provider\"); // eslint-disable-line @typescript-eslint/no-var-requires\n    const session = await this.storage.retrieve();\n    const client = new idp.CognitoIdentityProviderClient({\n      region: this.env.Region,\n      signer: { sign: async (request: any) => request }, // eslint-disable-line @typescript-eslint/no-explicit-any\n    });\n    const input = {\n      Token: session.refresh_token,\n      ClientId: this.env.ClientId,\n    };\n    await client.send(new idp.RevokeTokenCommand(input));\n  }\n\n  /**\n   * Returns whether it's time to refresh this token.\n   * @return {boolean} Whether it's time to refresh this token.\n   * @internal\n   */\n  async isStale(): Promise<boolean> {\n    const session = await this.storage.retrieve();\n    return SessionManager.isStale(new Date(session.expiration));\n  }\n\n  /**\n   * Refreshes the session and **UPDATES/MUTATES** self.\n   */\n  async refresh(): Promise<void> {\n    const idp = require(\"@aws-sdk/client-cognito-identity-provider\"); // eslint-disable-line @typescript-eslint/no-var-requires\n    const session = await this.storage.retrieve();\n    const client = new idp.CognitoIdentityProviderClient({ region: this.env.Region });\n    const resp = await client.send(\n      new idp.InitiateAuthCommand({\n        AuthFlow: \"REFRESH_TOKEN_AUTH\",\n        AuthParameters: {\n          REFRESH_TOKEN: session.refresh_token,\n        },\n        ClientId: this.env.ClientId,\n      }),\n    );\n\n    if (\n      !resp.AuthenticationResult ||\n      !resp.AuthenticationResult.ExpiresIn ||\n      !resp.AuthenticationResult.IdToken\n    ) {\n      throw new Error(\"Refresh failed\");\n    }\n\n    const expiresInMs = resp.AuthenticationResult.ExpiresIn * 1000;\n    const expiration = new Date(new Date().getTime() + expiresInMs).toISOString();\n    const idToken = resp.AuthenticationResult.IdToken;\n\n    await this.storage.save(<CognitoSessionInfo>{\n      ...session,\n      id_token: idToken,\n      access_token: resp.AuthenticationResult.AccessToken,\n      expiration,\n    });\n    this.#client = this.createClient(idToken);\n  }\n\n  /**\n   * Loads an existing cognito (management) session from storage.\n   * @param {CognitoSessionStorage} storage The storage back end to use\n   * @return {Promise<SingerSession>} New token\n   */\n  static async loadFromStorage(storage: CognitoSessionStorage): Promise<CognitoSessionManager> {\n    const sessionInfo = await storage.retrieve();\n    return new CognitoSessionManager(\n      sessionInfo.env[\"Dev-CubeSignerStack\"],\n      sessionInfo.org_id,\n      sessionInfo.id_token,\n      storage,\n    );\n  }\n\n  /**\n   * Loads an existing management session and creates a Cognito session manager for it.\n   *\n   * @param {CognitoSessionStorage} storage Optional session storage to load\n   * the session from. If not specified, the management session from the config\n   * directory will be loaded.\n   * @return {Promise<CognitoSessionManager>} Cognito session manager\n   */\n  static async loadManagementSession(\n    storage?: CognitoSessionStorage,\n  ): Promise<CognitoSessionManager> {\n    return await CognitoSessionManager.loadFromStorage(\n      storage ?? new JsonFileSessionStorage(path.join(configDir(), \"management-session.json\")),\n    );\n  }\n\n  /**\n   * Constructor.\n   * @param {EnvInterface} env The environment of the session\n   * @param {string} orgId The id of the org associated with this session\n   * @param {string} token The current token of the session\n   * @param {CognitoSessionStorage} storage The storage back end to use\n   */\n  private constructor(\n    env: EnvInterface,\n    orgId: string,\n    token: string,\n    storage: CognitoSessionStorage,\n  ) {\n    super(env, orgId, storage);\n    this.#client = this.createClient(token);\n  }\n}\n"]}
@@ -1,47 +0,0 @@
1
- import { EnvInterface } from "../env";
2
- import { ClientSessionInfo } from "../signer_session";
3
- /** Generic session interface. */
4
- export interface Session {
5
- /** Revoke the session. */
6
- revoke: () => Promise<void>;
7
- /** Refresh the session token. */
8
- refresh: () => Promise<void>;
9
- /** Get the authorization token. */
10
- getAuthToken: () => Promise<string>;
11
- }
12
- /** JSON representation of our "management session" file format */
13
- export interface ManagementSessionObject {
14
- /** The email address of the user */
15
- email: string;
16
- /** The ID token */
17
- id_token: string;
18
- /** The access token */
19
- access_token: string;
20
- /** The refresh token */
21
- refresh_token: string;
22
- /** The expiration time of the access token */
23
- expiration: string;
24
- }
25
- /** JSON representation of our "signer session" file format */
26
- export interface SignerSessionObject {
27
- /** The organization ID */
28
- org_id: string;
29
- /** The role ID */
30
- role_id: string;
31
- /** The purpose of the session token */
32
- purpose: string;
33
- /** The token to include in Authorization header */
34
- token: string;
35
- /** Session info */
36
- session_info: ClientSessionInfo;
37
- }
38
- export interface HasEnv {
39
- /** The environment */
40
- env: {
41
- ["Dev-CubeSignerStack"]: EnvInterface;
42
- };
43
- }
44
- export interface ManagementSessionFile extends ManagementSessionObject, HasEnv {
45
- }
46
- export interface SignerSessionFile extends SignerSessionObject, HasEnv {
47
- }
@@ -1,3 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- //# sourceMappingURL=data:application/json;base64,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
@@ -1,59 +0,0 @@
1
- import { Client } from "../client";
2
- import { HasEnv, SessionManager } from "./session_manager";
3
- import { SessionStorage } from "./session_storage";
4
- /** JSON representation of our "management session" file format */
5
- export interface ManagementSessionObject {
6
- /** The email address of the user */
7
- email: string;
8
- /** The ID token */
9
- id_token: string;
10
- /** The access token */
11
- access_token: string;
12
- /** The refresh token */
13
- refresh_token: string;
14
- /** The expiration time of the access token */
15
- expiration: string;
16
- }
17
- export interface ManagementSessionInfo extends ManagementSessionObject, HasEnv {
18
- }
19
- /** Type of storage required for management sessions */
20
- export type ManagementSessionStorage = SessionStorage<ManagementSessionInfo>;
21
- /** The session manager for management sessions */
22
- export declare class ManagementSessionManager extends SessionManager<ManagementSessionInfo> {
23
- #private;
24
- /**
25
- * @return {string} The current auth token.
26
- * @internal
27
- */
28
- token(): Promise<string>;
29
- /**
30
- * Returns a client with the current session and refreshes the current
31
- * session.
32
- */
33
- client(): Promise<Client>;
34
- /** Revokes the session. */
35
- revoke(): Promise<void>;
36
- /**
37
- * Returns whether it's time to refresh this token.
38
- * @return {boolean} Whether it's time to refresh this token.
39
- * @internal
40
- */
41
- isStale(): Promise<boolean>;
42
- /**
43
- * Refreshes the session and **UPDATES/MUTATES** self.
44
- */
45
- refresh(): Promise<void>;
46
- /**
47
- * Loads an existing management session from storage.
48
- * @param {ManagementSessionStorage} storage The storage back end to use
49
- * @return {Promise<SingerSession>} New token
50
- */
51
- static loadFromStorage(storage: ManagementSessionStorage): Promise<ManagementSessionManager>;
52
- /**
53
- * Constructor.
54
- * @param {EnvInterface} env The environment of the session
55
- * @param {string} token The current token of the session
56
- * @param {ManagementSessionStorage} storage The storage back end to use
57
- */
58
- private constructor();
59
- }
@@ -1,111 +0,0 @@
1
- "use strict";
2
- var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
3
- if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
4
- if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
5
- return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
6
- };
7
- var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
8
- if (kind === "m") throw new TypeError("Private method is not writable");
9
- if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
10
- if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
11
- return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
12
- };
13
- var _ManagementSessionManager_client;
14
- Object.defineProperty(exports, "__esModule", { value: true });
15
- exports.ManagementSessionManager = void 0;
16
- const session_manager_1 = require("./session_manager");
17
- /** The session manager for management sessions */
18
- class ManagementSessionManager extends session_manager_1.SessionManager {
19
- /**
20
- * @return {string} The current auth token.
21
- * @internal
22
- */
23
- async token() {
24
- const session = await this.storage.retrieve();
25
- return session.id_token;
26
- }
27
- /**
28
- * Returns a client with the current session and refreshes the current
29
- * session.
30
- */
31
- async client() {
32
- this.refreshIfNeeded();
33
- return __classPrivateFieldGet(this, _ManagementSessionManager_client, "f");
34
- }
35
- /** Revokes the session. */
36
- async revoke() {
37
- const idp = require("@aws-sdk/client-cognito-identity-provider"); // eslint-disable-line @typescript-eslint/no-var-requires
38
- const session = await this.storage.retrieve();
39
- const client = new idp.CognitoIdentityProviderClient({
40
- region: this.env.Region,
41
- signer: { sign: async (request) => request }, // eslint-disable-line @typescript-eslint/no-explicit-any
42
- });
43
- const input = {
44
- Token: session.refresh_token,
45
- ClientId: this.env.ClientId,
46
- };
47
- await client.send(new idp.RevokeTokenCommand(input));
48
- }
49
- /**
50
- * Returns whether it's time to refresh this token.
51
- * @return {boolean} Whether it's time to refresh this token.
52
- * @internal
53
- */
54
- async isStale() {
55
- const session = await this.storage.retrieve();
56
- return this.hasExpired(new Date(session.expiration).getTime());
57
- }
58
- /**
59
- * Refreshes the session and **UPDATES/MUTATES** self.
60
- */
61
- async refresh() {
62
- const idp = require("@aws-sdk/client-cognito-identity-provider"); // eslint-disable-line @typescript-eslint/no-var-requires
63
- const session = await this.storage.retrieve();
64
- const client = new idp.CognitoIdentityProviderClient({ region: this.env.Region });
65
- const resp = await client.send(new idp.InitiateAuthCommand({
66
- AuthFlow: "REFRESH_TOKEN_AUTH",
67
- AuthParameters: {
68
- REFRESH_TOKEN: session.refresh_token,
69
- },
70
- ClientId: this.env.ClientId,
71
- }));
72
- if (!resp.AuthenticationResult ||
73
- !resp.AuthenticationResult.ExpiresIn ||
74
- !resp.AuthenticationResult.IdToken) {
75
- throw new Error("Refresh failed");
76
- }
77
- const expiresInMs = resp.AuthenticationResult.ExpiresIn * 1000;
78
- const expiration = new Date(new Date().getTime() + expiresInMs).toISOString();
79
- const idToken = resp.AuthenticationResult.IdToken;
80
- await this.storage.save({
81
- ...session,
82
- id_token: idToken,
83
- access_token: resp.AuthenticationResult.AccessToken,
84
- expiration,
85
- });
86
- __classPrivateFieldSet(this, _ManagementSessionManager_client, this.createClient(idToken), "f");
87
- }
88
- /**
89
- * Loads an existing management session from storage.
90
- * @param {ManagementSessionStorage} storage The storage back end to use
91
- * @return {Promise<SingerSession>} New token
92
- */
93
- static async loadFromStorage(storage) {
94
- const sessionInfo = await storage.retrieve();
95
- return new ManagementSessionManager(sessionInfo.env["Dev-CubeSignerStack"], sessionInfo.id_token, storage);
96
- }
97
- /**
98
- * Constructor.
99
- * @param {EnvInterface} env The environment of the session
100
- * @param {string} token The current token of the session
101
- * @param {ManagementSessionStorage} storage The storage back end to use
102
- */
103
- constructor(env, token, storage) {
104
- super(env, storage);
105
- _ManagementSessionManager_client.set(this, void 0);
106
- __classPrivateFieldSet(this, _ManagementSessionManager_client, this.createClient(token), "f");
107
- }
108
- }
109
- exports.ManagementSessionManager = ManagementSessionManager;
110
- _ManagementSessionManager_client = new WeakMap();
111
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"management_session_manager.js","sourceRoot":"","sources":["../../../src/session/management_session_manager.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAEA,uDAA2D;AAsB3D,kDAAkD;AAClD,MAAa,wBAAyB,SAAQ,gCAAqC;IAGjF;;;OAGG;IACH,KAAK,CAAC,KAAK;QACT,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,OAAO,OAAO,CAAC,QAAQ,CAAC;IAC1B,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,MAAM;QACV,IAAI,CAAC,eAAe,EAAE,CAAC;QACvB,OAAO,uBAAA,IAAI,wCAAQ,CAAC;IACtB,CAAC;IAED,2BAA2B;IAC3B,KAAK,CAAC,MAAM;QACV,MAAM,GAAG,GAAG,OAAO,CAAC,2CAA2C,CAAC,CAAC,CAAC,yDAAyD;QAC3H,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,MAAM,MAAM,GAAG,IAAI,GAAG,CAAC,6BAA6B,CAAC;YACnD,MAAM,EAAE,IAAI,CAAC,GAAG,CAAC,MAAM;YACvB,MAAM,EAAE,EAAE,IAAI,EAAE,KAAK,EAAE,OAAY,EAAE,EAAE,CAAC,OAAO,EAAE,EAAE,yDAAyD;SAC7G,CAAC,CAAC;QACH,MAAM,KAAK,GAAG;YACZ,KAAK,EAAE,OAAO,CAAC,aAAa;YAC5B,QAAQ,EAAE,IAAI,CAAC,GAAG,CAAC,QAAQ;SAC5B,CAAC;QACF,MAAM,MAAM,CAAC,IAAI,CAAC,IAAI,GAAG,CAAC,kBAAkB,CAAC,KAAK,CAAC,CAAC,CAAC;IACvD,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,OAAO,IAAI,CAAC,UAAU,CAAC,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,OAAO,EAAE,CAAC,CAAC;IACjE,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,GAAG,GAAG,OAAO,CAAC,2CAA2C,CAAC,CAAC,CAAC,yDAAyD;QAC3H,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,MAAM,MAAM,GAAG,IAAI,GAAG,CAAC,6BAA6B,CAAC,EAAE,MAAM,EAAE,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,CAAC,CAAC;QAClF,MAAM,IAAI,GAAG,MAAM,MAAM,CAAC,IAAI,CAC5B,IAAI,GAAG,CAAC,mBAAmB,CAAC;YAC1B,QAAQ,EAAE,oBAAoB;YAC9B,cAAc,EAAE;gBACd,aAAa,EAAE,OAAO,CAAC,aAAa;aACrC;YACD,QAAQ,EAAE,IAAI,CAAC,GAAG,CAAC,QAAQ;SAC5B,CAAC,CACH,CAAC;QAEF,IACE,CAAC,IAAI,CAAC,oBAAoB;YAC1B,CAAC,IAAI,CAAC,oBAAoB,CAAC,SAAS;YACpC,CAAC,IAAI,CAAC,oBAAoB,CAAC,OAAO,EAClC;YACA,MAAM,IAAI,KAAK,CAAC,gBAAgB,CAAC,CAAC;SACnC;QAED,MAAM,WAAW,GAAG,IAAI,CAAC,oBAAoB,CAAC,SAAS,GAAG,IAAI,CAAC;QAC/D,MAAM,UAAU,GAAG,IAAI,IAAI,CAAC,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,GAAG,WAAW,CAAC,CAAC,WAAW,EAAE,CAAC;QAC9E,MAAM,OAAO,GAAG,IAAI,CAAC,oBAAoB,CAAC,OAAO,CAAC;QAElD,MAAM,IAAI,CAAC,OAAO,CAAC,IAAI,CAAwB;YAC7C,GAAG,OAAO;YACV,QAAQ,EAAE,OAAO;YACjB,YAAY,EAAE,IAAI,CAAC,oBAAoB,CAAC,WAAW;YACnD,UAAU;SACX,CAAC,CAAC;QACH,uBAAA,IAAI,oCAAW,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,MAAA,CAAC;IAC5C,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,eAAe,CAC1B,OAAiC;QAEjC,MAAM,WAAW,GAAG,MAAM,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC7C,OAAO,IAAI,wBAAwB,CACjC,WAAW,CAAC,GAAG,CAAC,qBAAqB,CAAC,EACtC,WAAW,CAAC,QAAQ,EACpB,OAAO,CACR,CAAC;IACJ,CAAC;IAED;;;;;OAKG;IACH,YAAoB,GAAiB,EAAE,KAAa,EAAE,OAAiC;QACrF,KAAK,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;QA1GtB,mDAAgB;QA2Gd,uBAAA,IAAI,oCAAW,IAAI,CAAC,YAAY,CAAC,KAAK,CAAC,MAAA,CAAC;IAC1C,CAAC;CACF;AA9GD,4DA8GC","sourcesContent":["import { Client } from \"../client\";\nimport { EnvInterface } from \"../env\";\nimport { HasEnv, SessionManager } from \"./session_manager\";\nimport { SessionStorage } from \"./session_storage\";\n\n/** JSON representation of our \"management session\" file format */\nexport interface ManagementSessionObject {\n  /** The email address of the user */\n  email: string;\n  /** The ID token */\n  id_token: string;\n  /** The access token */\n  access_token: string;\n  /** The refresh token */\n  refresh_token: string;\n  /** The expiration time of the access token */\n  expiration: string;\n}\n\nexport interface ManagementSessionInfo extends ManagementSessionObject, HasEnv {}\n\n/** Type of storage required for management sessions */\nexport type ManagementSessionStorage = SessionStorage<ManagementSessionInfo>;\n\n/** The session manager for management sessions */\nexport class ManagementSessionManager extends SessionManager<ManagementSessionInfo> {\n  #client: Client;\n\n  /**\n   * @return {string} The current auth token.\n   * @internal\n   */\n  async token(): Promise<string> {\n    const session = await this.storage.retrieve();\n    return session.id_token;\n  }\n\n  /**\n   * Returns a client with the current session and refreshes the current\n   * session.\n   */\n  async client(): Promise<Client> {\n    this.refreshIfNeeded();\n    return this.#client;\n  }\n\n  /** Revokes the session. */\n  async revoke(): Promise<void> {\n    const idp = require(\"@aws-sdk/client-cognito-identity-provider\"); // eslint-disable-line @typescript-eslint/no-var-requires\n    const session = await this.storage.retrieve();\n    const client = new idp.CognitoIdentityProviderClient({\n      region: this.env.Region,\n      signer: { sign: async (request: any) => request }, // eslint-disable-line @typescript-eslint/no-explicit-any\n    });\n    const input = {\n      Token: session.refresh_token,\n      ClientId: this.env.ClientId,\n    };\n    await client.send(new idp.RevokeTokenCommand(input));\n  }\n\n  /**\n   * Returns whether it's time to refresh this token.\n   * @return {boolean} Whether it's time to refresh this token.\n   * @internal\n   */\n  async isStale(): Promise<boolean> {\n    const session = await this.storage.retrieve();\n    return this.hasExpired(new Date(session.expiration).getTime());\n  }\n\n  /**\n   * Refreshes the session and **UPDATES/MUTATES** self.\n   */\n  async refresh(): Promise<void> {\n    const idp = require(\"@aws-sdk/client-cognito-identity-provider\"); // eslint-disable-line @typescript-eslint/no-var-requires\n    const session = await this.storage.retrieve();\n    const client = new idp.CognitoIdentityProviderClient({ region: this.env.Region });\n    const resp = await client.send(\n      new idp.InitiateAuthCommand({\n        AuthFlow: \"REFRESH_TOKEN_AUTH\",\n        AuthParameters: {\n          REFRESH_TOKEN: session.refresh_token,\n        },\n        ClientId: this.env.ClientId,\n      }),\n    );\n\n    if (\n      !resp.AuthenticationResult ||\n      !resp.AuthenticationResult.ExpiresIn ||\n      !resp.AuthenticationResult.IdToken\n    ) {\n      throw new Error(\"Refresh failed\");\n    }\n\n    const expiresInMs = resp.AuthenticationResult.ExpiresIn * 1000;\n    const expiration = new Date(new Date().getTime() + expiresInMs).toISOString();\n    const idToken = resp.AuthenticationResult.IdToken;\n\n    await this.storage.save(<ManagementSessionInfo>{\n      ...session,\n      id_token: idToken,\n      access_token: resp.AuthenticationResult.AccessToken,\n      expiration,\n    });\n    this.#client = this.createClient(idToken);\n  }\n\n  /**\n   * Loads an existing management session from storage.\n   * @param {ManagementSessionStorage} storage The storage back end to use\n   * @return {Promise<SingerSession>} New token\n   */\n  static async loadFromStorage(\n    storage: ManagementSessionStorage,\n  ): Promise<ManagementSessionManager> {\n    const sessionInfo = await storage.retrieve();\n    return new ManagementSessionManager(\n      sessionInfo.env[\"Dev-CubeSignerStack\"],\n      sessionInfo.id_token,\n      storage,\n    );\n  }\n\n  /**\n   * Constructor.\n   * @param {EnvInterface} env The environment of the session\n   * @param {string} token The current token of the session\n   * @param {ManagementSessionStorage} storage The storage back end to use\n   */\n  private constructor(env: EnvInterface, token: string, storage: ManagementSessionStorage) {\n    super(env, storage);\n    this.#client = this.createClient(token);\n  }\n}\n"]}