@cubist-labs/cubesigner-sdk 0.2.28 → 0.3.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +30 -28
- package/dist/cjs/package.json +41 -0
- package/dist/cjs/spec/env/beta.json +9 -0
- package/dist/cjs/spec/env/gamma.json +9 -0
- package/dist/cjs/spec/env/prod.json +9 -0
- package/dist/cjs/src/api.d.ts +634 -0
- package/dist/cjs/src/api.js +1309 -0
- package/dist/cjs/src/client.d.ts +575 -0
- package/dist/cjs/src/client.js +378 -0
- package/dist/cjs/src/env.d.ts +15 -0
- package/dist/cjs/src/env.js +35 -0
- package/dist/cjs/src/error.d.ts +29 -0
- package/dist/cjs/src/error.js +36 -0
- package/dist/cjs/src/events.d.ts +84 -0
- package/dist/cjs/src/events.js +195 -0
- package/dist/cjs/src/index.d.ts +203 -0
- package/dist/cjs/src/index.js +298 -0
- package/dist/cjs/src/key.d.ts +152 -0
- package/dist/cjs/src/key.js +242 -0
- package/dist/{src/fido.d.ts → cjs/src/mfa.d.ts} +33 -15
- package/dist/cjs/src/mfa.js +169 -0
- package/dist/cjs/src/org.d.ts +99 -0
- package/dist/cjs/src/org.js +95 -0
- package/dist/cjs/src/paginator.d.ts +76 -0
- package/dist/cjs/src/paginator.js +99 -0
- package/dist/cjs/src/response.d.ts +101 -0
- package/dist/cjs/src/response.js +164 -0
- package/dist/cjs/src/role.d.ts +283 -0
- package/dist/cjs/src/role.js +253 -0
- package/dist/cjs/src/schema.d.ts +6209 -0
- package/dist/cjs/src/schema.js +7 -0
- package/dist/cjs/src/schema_types.d.ts +113 -0
- package/dist/cjs/src/schema_types.js +3 -0
- package/dist/cjs/src/session/session_storage.d.ts +27 -0
- package/dist/cjs/src/session/session_storage.js +47 -0
- package/dist/cjs/src/session/signer_session_manager.d.ts +125 -0
- package/dist/cjs/src/session/signer_session_manager.js +239 -0
- package/dist/cjs/src/signer_session.d.ts +41 -0
- package/dist/cjs/src/signer_session.js +77 -0
- package/dist/cjs/src/user_export.d.ts +52 -0
- package/dist/cjs/src/user_export.js +129 -0
- package/dist/cjs/src/util.d.ts +56 -0
- package/dist/cjs/src/util.js +86 -0
- package/dist/esm/package.json +41 -0
- package/dist/esm/spec/env/beta.json +9 -0
- package/dist/esm/spec/env/gamma.json +9 -0
- package/dist/esm/spec/env/prod.json +9 -0
- package/dist/esm/src/api.d.ts +634 -0
- package/dist/esm/src/api.js +1299 -0
- package/dist/esm/src/client.d.ts +575 -0
- package/dist/esm/src/client.js +374 -0
- package/dist/esm/src/env.d.ts +15 -0
- package/dist/esm/src/env.js +9 -0
- package/dist/esm/src/error.d.ts +29 -0
- package/dist/esm/src/error.js +31 -0
- package/dist/esm/src/events.d.ts +84 -0
- package/dist/esm/src/events.js +189 -0
- package/dist/esm/src/index.d.ts +203 -0
- package/dist/esm/src/index.js +276 -0
- package/dist/esm/src/key.d.ts +152 -0
- package/dist/esm/src/key.js +236 -0
- package/dist/esm/src/mfa.d.ts +94 -0
- package/dist/esm/src/mfa.js +163 -0
- package/dist/esm/src/org.d.ts +99 -0
- package/dist/esm/src/org.js +91 -0
- package/dist/esm/src/paginator.d.ts +76 -0
- package/dist/esm/src/paginator.js +94 -0
- package/dist/esm/src/response.d.ts +101 -0
- package/dist/esm/src/response.js +159 -0
- package/dist/esm/src/role.d.ts +283 -0
- package/dist/esm/src/role.js +248 -0
- package/dist/esm/src/schema.d.ts +6209 -0
- package/dist/esm/src/schema.js +6 -0
- package/dist/esm/src/schema_types.d.ts +113 -0
- package/dist/esm/src/schema_types.js +2 -0
- package/dist/esm/src/session/session_storage.d.ts +27 -0
- package/dist/esm/src/session/session_storage.js +43 -0
- package/dist/esm/src/session/signer_session_manager.d.ts +125 -0
- package/dist/esm/src/session/signer_session_manager.js +235 -0
- package/dist/esm/src/signer_session.d.ts +41 -0
- package/dist/esm/src/signer_session.js +72 -0
- package/dist/esm/src/user_export.d.ts +52 -0
- package/dist/esm/src/user_export.js +99 -0
- package/dist/esm/src/util.d.ts +56 -0
- package/dist/esm/src/util.js +76 -0
- package/dist/package.json +13 -45
- package/dist/src/api.d.ts +29 -1
- package/dist/src/api.js +66 -1
- package/dist/src/client.d.ts +35 -14
- package/dist/src/client.js +12 -8
- package/dist/src/events.js +1 -1
- package/dist/src/index.d.ts +6 -11
- package/dist/src/index.js +9 -25
- package/dist/src/key.d.ts +18 -7
- package/dist/src/key.js +52 -19
- package/dist/src/role.d.ts +46 -3
- package/dist/src/role.js +60 -8
- package/dist/src/schema.d.ts +206 -72
- package/dist/src/schema.js +1 -1
- package/dist/src/schema_types.d.ts +3 -0
- package/dist/src/schema_types.js +1 -1
- package/dist/src/session/signer_session_manager.d.ts +38 -14
- package/dist/src/session/signer_session_manager.js +93 -33
- package/dist/src/util.d.ts +14 -0
- package/dist/src/util.js +24 -27
- package/package.json +19 -46
- package/src/api.ts +79 -0
- package/src/client.ts +12 -8
- package/src/events.ts +2 -0
- package/src/index.ts +10 -24
- package/src/key.ts +36 -18
- package/src/role.ts +78 -7
- package/src/schema.ts +269 -110
- package/src/schema_types.ts +3 -0
- package/src/session/session_storage.ts +0 -32
- package/src/session/signer_session_manager.ts +124 -36
- package/src/util.ts +19 -10
- package/tsconfig.json +1 -21
- package/LICENSE-APACHE +0 -177
- package/LICENSE-MIT +0 -25
- package/NOTICE +0 -13
- package/dist/examples/ethers.d.ts +0 -1
- package/dist/examples/ethers.js +0 -142
- package/dist/src/ethers/index.d.ts +0 -95
- package/dist/src/ethers/index.js +0 -215
- package/dist/src/fido.js +0 -148
- package/dist/src/session/cognito_manager.d.ts +0 -71
- package/dist/src/session/cognito_manager.js +0 -129
- package/dist/src/session/generic.d.ts +0 -47
- package/dist/src/session/generic.js +0 -3
- package/dist/src/session/management_session_manager.d.ts +0 -59
- package/dist/src/session/management_session_manager.js +0 -111
- package/dist/src/session/oidc_session_manager.d.ts +0 -78
- package/dist/src/session/oidc_session_manager.js +0 -142
- package/dist/src/session/session_manager.d.ts +0 -99
- package/dist/src/session/session_manager.js +0 -136
- package/dist/src/sign.d.ts +0 -114
- package/dist/src/sign.js +0 -248
- package/dist/test/sessions.d.ts +0 -35
- package/dist/test/sessions.js +0 -56
- package/src/ethers/index.ts +0 -253
- package/src/session/cognito_manager.ts +0 -161
- package/src/session/session_manager.ts +0 -165
package/dist/src/fido.js
DELETED
|
@@ -1,148 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
/* eslint-disable @typescript-eslint/no-explicit-any */
|
|
3
|
-
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
4
|
-
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
5
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
6
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
7
|
-
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
8
|
-
};
|
|
9
|
-
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
10
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
11
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
12
|
-
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
13
|
-
};
|
|
14
|
-
var _AddFidoChallenge_cs, _MfaFidoChallenge_ss;
|
|
15
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
|
-
exports.MfaFidoChallenge = exports.AddFidoChallenge = void 0;
|
|
17
|
-
const util_1 = require("./util");
|
|
18
|
-
/**
|
|
19
|
-
* Returned after creating a request to add a new FIDO device.
|
|
20
|
-
* Provides some helper methods for answering this challenge.
|
|
21
|
-
*/
|
|
22
|
-
class AddFidoChallenge {
|
|
23
|
-
/**
|
|
24
|
-
* Constructor
|
|
25
|
-
* @param {CubeSigner} cs CubeSigner instance used to request to add a FIDO device
|
|
26
|
-
* @param {ApiAddFidoChallenge} challenge The challenge returned by the remote end.
|
|
27
|
-
*/
|
|
28
|
-
constructor(cs, challenge) {
|
|
29
|
-
_AddFidoChallenge_cs.set(this, void 0);
|
|
30
|
-
__classPrivateFieldSet(this, _AddFidoChallenge_cs, cs, "f");
|
|
31
|
-
this.challengeId = challenge.challenge_id;
|
|
32
|
-
// fix options returned from the server: rename fields and decode base64 fields to uint8[]
|
|
33
|
-
this.options = {
|
|
34
|
-
...challenge.options,
|
|
35
|
-
challenge: (0, util_1.decodeBase64Url)(challenge.options.challenge),
|
|
36
|
-
};
|
|
37
|
-
this.options.pubKeyCredParams ??= challenge.options.pub_key_cred_params;
|
|
38
|
-
this.options.excludeCredentials ??= challenge.options.exclude_credentials;
|
|
39
|
-
this.options.authenticatorSelection ??= challenge.options.authenticator_selection;
|
|
40
|
-
delete this.options.pub_key_cred_params;
|
|
41
|
-
delete this.options.exclude_credentials;
|
|
42
|
-
delete this.options.authenticator_selection;
|
|
43
|
-
if (challenge.options.user) {
|
|
44
|
-
this.options.user.id = (0, util_1.decodeBase64Url)(challenge.options.user.id);
|
|
45
|
-
}
|
|
46
|
-
for (const credential of this.options.excludeCredentials ?? []) {
|
|
47
|
-
credential.id = (0, util_1.decodeBase64Url)(credential.id);
|
|
48
|
-
}
|
|
49
|
-
}
|
|
50
|
-
/**
|
|
51
|
-
* Answers this challenge by using the `CredentialsContainer` API to create a credential
|
|
52
|
-
* based on the the public key credential creation options from this challenge.
|
|
53
|
-
*/
|
|
54
|
-
async createCredentialAndAnswer() {
|
|
55
|
-
const cred = await navigator.credentials.create({ publicKey: this.options });
|
|
56
|
-
await this.answer(cred);
|
|
57
|
-
}
|
|
58
|
-
/**
|
|
59
|
-
* Answers this challenge using a given credential `cred`;
|
|
60
|
-
* the credential should be obtained by calling
|
|
61
|
-
*
|
|
62
|
-
* ```
|
|
63
|
-
* const cred = await navigator.credentials.create({ publicKey: this.options });
|
|
64
|
-
* ```
|
|
65
|
-
*
|
|
66
|
-
* @param {any} cred Credential created by calling the `CredentialContainer`'s `create` method
|
|
67
|
-
* based on the public key creation options from this challenge.
|
|
68
|
-
*/
|
|
69
|
-
async answer(cred) {
|
|
70
|
-
const answer = {
|
|
71
|
-
id: cred.id,
|
|
72
|
-
response: {
|
|
73
|
-
clientDataJSON: (0, util_1.encodeToBase64Url)(cred.response.clientDataJSON),
|
|
74
|
-
attestationObject: (0, util_1.encodeToBase64Url)(cred.response.attestationObject),
|
|
75
|
-
},
|
|
76
|
-
};
|
|
77
|
-
await __classPrivateFieldGet(this, _AddFidoChallenge_cs, "f").addFidoComplete(this.challengeId, answer);
|
|
78
|
-
}
|
|
79
|
-
}
|
|
80
|
-
exports.AddFidoChallenge = AddFidoChallenge;
|
|
81
|
-
_AddFidoChallenge_cs = new WeakMap();
|
|
82
|
-
/**
|
|
83
|
-
* Returned after initiating MFA approval using FIDO.
|
|
84
|
-
* Provides some helper methods for answering this challenge.
|
|
85
|
-
*/
|
|
86
|
-
class MfaFidoChallenge {
|
|
87
|
-
/**
|
|
88
|
-
* @param {SignerSession} ss The session used to initiate MFA approval using FIDO
|
|
89
|
-
* @param {string} mfaId The MFA request id.
|
|
90
|
-
* @param {ApiMfaFidoChallenge} challenge The challenge returned by the remote end
|
|
91
|
-
*/
|
|
92
|
-
constructor(ss, mfaId, challenge) {
|
|
93
|
-
_MfaFidoChallenge_ss.set(this, void 0);
|
|
94
|
-
__classPrivateFieldSet(this, _MfaFidoChallenge_ss, ss, "f");
|
|
95
|
-
this.mfaId = mfaId;
|
|
96
|
-
this.challengeId = challenge.challenge_id;
|
|
97
|
-
// fix options returned from the server: rename fields and decode base64 fields into uint8[]
|
|
98
|
-
this.options = {
|
|
99
|
-
...challenge.options,
|
|
100
|
-
challenge: (0, util_1.decodeBase64Url)(challenge.options.challenge),
|
|
101
|
-
};
|
|
102
|
-
this.options.rpId ??= challenge.options.rp_id;
|
|
103
|
-
this.options.allowCredentials ??= challenge.options.allow_credentials;
|
|
104
|
-
this.options.userVerification ??= challenge.options.user_verification;
|
|
105
|
-
delete this.options.rp_id;
|
|
106
|
-
delete this.options.allow_credentials;
|
|
107
|
-
delete this.options.user_verification;
|
|
108
|
-
for (const credential of this.options.allowCredentials ?? []) {
|
|
109
|
-
credential.id = (0, util_1.decodeBase64Url)(credential.id);
|
|
110
|
-
if (credential.transports === null) {
|
|
111
|
-
delete credential.transports;
|
|
112
|
-
}
|
|
113
|
-
}
|
|
114
|
-
}
|
|
115
|
-
/**
|
|
116
|
-
* Answers this challenge by using the `CredentialsContainer` API to get a credential
|
|
117
|
-
* based on the the public key credential request options from this challenge.
|
|
118
|
-
*/
|
|
119
|
-
async createCredentialAndAnswer() {
|
|
120
|
-
const cred = await navigator.credentials.get({ publicKey: this.options });
|
|
121
|
-
return await this.answer(cred);
|
|
122
|
-
}
|
|
123
|
-
/**
|
|
124
|
-
* Answers this challenge using a given credential `cred`.
|
|
125
|
-
* To obtain this credential, for example, call
|
|
126
|
-
*
|
|
127
|
-
* ```
|
|
128
|
-
* const cred = await navigator.credentials.get({ publicKey: this.options });
|
|
129
|
-
* ```
|
|
130
|
-
*
|
|
131
|
-
* @param {any} cred Credential created by calling the `CredentialContainer`'s `get` method
|
|
132
|
-
* based on the public key credential request options from this challenge.
|
|
133
|
-
*/
|
|
134
|
-
async answer(cred) {
|
|
135
|
-
const answer = {
|
|
136
|
-
id: cred.id,
|
|
137
|
-
response: {
|
|
138
|
-
clientDataJSON: (0, util_1.encodeToBase64Url)(cred.response.clientDataJSON),
|
|
139
|
-
authenticatorData: (0, util_1.encodeToBase64Url)(cred.response.authenticatorData),
|
|
140
|
-
signature: (0, util_1.encodeToBase64Url)(cred.response.signature),
|
|
141
|
-
},
|
|
142
|
-
};
|
|
143
|
-
return await __classPrivateFieldGet(this, _MfaFidoChallenge_ss, "f").fidoApproveComplete(this.mfaId, this.challengeId, answer);
|
|
144
|
-
}
|
|
145
|
-
}
|
|
146
|
-
exports.MfaFidoChallenge = MfaFidoChallenge;
|
|
147
|
-
_MfaFidoChallenge_ss = new WeakMap();
|
|
148
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"fido.js","sourceRoot":"","sources":["../../src/fido.ts"],"names":[],"mappings":";AAAA,uDAAuD;;;;;;;;;;;;;;;AAIvD,iCAA4D;AAmB5D;;;GAGG;AACH,MAAa,gBAAgB;IAK3B;;;;OAIG;IACH,YAAY,EAAc,EAAE,SAA8B;QATjD,uCAAgB;QAUvB,uBAAA,IAAI,wBAAO,EAAE,MAAA,CAAC;QACd,IAAI,CAAC,WAAW,GAAG,SAAS,CAAC,YAAY,CAAC;QAE1C,0FAA0F;QAC1F,IAAI,CAAC,OAAO,GAAG;YACb,GAAG,SAAS,CAAC,OAAO;YACpB,SAAS,EAAE,IAAA,sBAAe,EAAC,SAAS,CAAC,OAAO,CAAC,SAAS,CAAC;SACxD,CAAC;QACF,IAAI,CAAC,OAAO,CAAC,gBAAgB,KAAK,SAAS,CAAC,OAAO,CAAC,mBAAmB,CAAC;QACxE,IAAI,CAAC,OAAO,CAAC,kBAAkB,KAAK,SAAS,CAAC,OAAO,CAAC,mBAAmB,CAAC;QAC1E,IAAI,CAAC,OAAO,CAAC,sBAAsB,KAAK,SAAS,CAAC,OAAO,CAAC,uBAAuB,CAAC;QAClF,OAAO,IAAI,CAAC,OAAO,CAAC,mBAAmB,CAAC;QACxC,OAAO,IAAI,CAAC,OAAO,CAAC,mBAAmB,CAAC;QACxC,OAAO,IAAI,CAAC,OAAO,CAAC,uBAAuB,CAAC;QAE5C,IAAI,SAAS,CAAC,OAAO,CAAC,IAAI,EAAE;YAC1B,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,GAAG,IAAA,sBAAe,EAAC,SAAS,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;SACnE;QAED,KAAK,MAAM,UAAU,IAAI,IAAI,CAAC,OAAO,CAAC,kBAAkB,IAAI,EAAE,EAAE;YAC9D,UAAU,CAAC,EAAE,GAAG,IAAA,sBAAe,EAAC,UAAU,CAAC,EAAE,CAAC,CAAC;SAChD;IACH,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,yBAAyB;QAC7B,MAAM,IAAI,GAAG,MAAM,SAAS,CAAC,WAAW,CAAC,MAAM,CAAC,EAAE,SAAS,EAAE,IAAI,CAAC,OAAO,EAAE,CAAC,CAAC;QAC7E,MAAM,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;IAC1B,CAAC;IAED;;;;;;;;;;OAUG;IACH,KAAK,CAAC,MAAM,CAAC,IAAS;QACpB,MAAM,MAAM,GAAwB;YAClC,EAAE,EAAE,IAAI,CAAC,EAAE;YACX,QAAQ,EAAE;gBACR,cAAc,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,cAAc,CAAC;gBAC/D,iBAAiB,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC;aACtE;SACF,CAAC;QACF,MAAM,uBAAA,IAAI,4BAAI,CAAC,eAAe,CAAC,IAAI,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;IAC3D,CAAC;CACF;AAjED,4CAiEC;;AAED;;;GAGG;AACH,MAAa,gBAAgB;IAM3B;;;;OAIG;IACH,YAAY,EAAiB,EAAE,KAAa,EAAE,SAA8B;QAVnE,uCAAmB;QAW1B,uBAAA,IAAI,wBAAO,EAAE,MAAA,CAAC;QACd,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;QACnB,IAAI,CAAC,WAAW,GAAG,SAAS,CAAC,YAAY,CAAC;QAE1C,4FAA4F;QAC5F,IAAI,CAAC,OAAO,GAAG;YACb,GAAG,SAAS,CAAC,OAAO;YACpB,SAAS,EAAE,IAAA,sBAAe,EAAC,SAAS,CAAC,OAAO,CAAC,SAAS,CAAC;SACxD,CAAC;QACF,IAAI,CAAC,OAAO,CAAC,IAAI,KAAK,SAAS,CAAC,OAAO,CAAC,KAAK,CAAC;QAC9C,IAAI,CAAC,OAAO,CAAC,gBAAgB,KAAK,SAAS,CAAC,OAAO,CAAC,iBAAiB,CAAC;QACtE,IAAI,CAAC,OAAO,CAAC,gBAAgB,KAAK,SAAS,CAAC,OAAO,CAAC,iBAAiB,CAAC;QACtE,OAAO,IAAI,CAAC,OAAO,CAAC,KAAK,CAAC;QAC1B,OAAO,IAAI,CAAC,OAAO,CAAC,iBAAiB,CAAC;QACtC,OAAO,IAAI,CAAC,OAAO,CAAC,iBAAiB,CAAC;QAEtC,KAAK,MAAM,UAAU,IAAI,IAAI,CAAC,OAAO,CAAC,gBAAgB,IAAI,EAAE,EAAE;YAC5D,UAAU,CAAC,EAAE,GAAG,IAAA,sBAAe,EAAC,UAAU,CAAC,EAAE,CAAC,CAAC;YAC/C,IAAI,UAAU,CAAC,UAAU,KAAK,IAAI,EAAE;gBAClC,OAAO,UAAU,CAAC,UAAU,CAAC;aAC9B;SACF;IACH,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,yBAAyB;QAC7B,MAAM,IAAI,GAAG,MAAM,SAAS,CAAC,WAAW,CAAC,GAAG,CAAC,EAAE,SAAS,EAAE,IAAI,CAAC,OAAO,EAAE,CAAC,CAAC;QAC1E,OAAO,MAAM,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;IACjC,CAAC;IAED;;;;;;;;;;OAUG;IACH,KAAK,CAAC,MAAM,CAAC,IAAS;QACpB,MAAM,MAAM,GAAwB;YAClC,EAAE,EAAE,IAAI,CAAC,EAAE;YACX,QAAQ,EAAE;gBACR,cAAc,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,cAAc,CAAC;gBAC/D,iBAAiB,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC;gBACrE,SAAS,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC;aACtD;SACF,CAAC;QACF,OAAO,MAAM,uBAAA,IAAI,4BAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,KAAK,EAAE,IAAI,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;IAClF,CAAC;CACF;AAnED,4CAmEC","sourcesContent":["/* eslint-disable @typescript-eslint/no-explicit-any */\n\nimport { CubeSigner, MfaRequestInfo, SignerSession } from \".\";\nimport { components } from \"./schema\";\nimport { decodeBase64Url, encodeToBase64Url } from \"./util\";\n\nexport type ApiAddFidoChallenge =\n  components[\"responses\"][\"FidoCreateChallengeResponse\"][\"content\"][\"application/json\"];\n\nexport type ApiMfaFidoChallenge =\n  components[\"responses\"][\"FidoAssertChallenge\"][\"content\"][\"application/json\"];\n\nexport type PublicKeyCredentialCreationOptions =\n  components[\"schemas\"][\"PublicKeyCredentialCreationOptions\"];\nexport type PublicKeyCredentialRequestOptions =\n  components[\"schemas\"][\"PublicKeyCredentialRequestOptions\"];\nexport type PublicKeyCredentialParameters = components[\"schemas\"][\"PublicKeyCredentialParameters\"];\nexport type PublicKeyCredentialDescriptor = components[\"schemas\"][\"PublicKeyCredentialDescriptor\"];\nexport type AuthenticatorSelectionCriteria =\n  components[\"schemas\"][\"AuthenticatorSelectionCriteria\"];\nexport type PublicKeyCredentialUserEntity = components[\"schemas\"][\"PublicKeyCredentialUserEntity\"];\nexport type PublicKeyCredential = components[\"schemas\"][\"PublicKeyCredential\"];\n\n/**\n * Returned after creating a request to add a new FIDO device.\n * Provides some helper methods for answering this challenge.\n */\nexport class AddFidoChallenge {\n  readonly #cs: CubeSigner;\n  readonly challengeId: string;\n  readonly options: any;\n\n  /**\n   * Constructor\n   * @param {CubeSigner} cs CubeSigner instance used to request to add a FIDO device\n   * @param {ApiAddFidoChallenge} challenge The challenge returned by the remote end.\n   */\n  constructor(cs: CubeSigner, challenge: ApiAddFidoChallenge) {\n    this.#cs = cs;\n    this.challengeId = challenge.challenge_id;\n\n    // fix options returned from the server: rename fields and decode base64 fields to uint8[]\n    this.options = {\n      ...challenge.options,\n      challenge: decodeBase64Url(challenge.options.challenge),\n    };\n    this.options.pubKeyCredParams ??= challenge.options.pub_key_cred_params;\n    this.options.excludeCredentials ??= challenge.options.exclude_credentials;\n    this.options.authenticatorSelection ??= challenge.options.authenticator_selection;\n    delete this.options.pub_key_cred_params;\n    delete this.options.exclude_credentials;\n    delete this.options.authenticator_selection;\n\n    if (challenge.options.user) {\n      this.options.user.id = decodeBase64Url(challenge.options.user.id);\n    }\n\n    for (const credential of this.options.excludeCredentials ?? []) {\n      credential.id = decodeBase64Url(credential.id);\n    }\n  }\n\n  /**\n   * Answers this challenge by using the `CredentialsContainer` API to create a credential\n   * based on the the public key credential creation options from this challenge.\n   */\n  async createCredentialAndAnswer() {\n    const cred = await navigator.credentials.create({ publicKey: this.options });\n    await this.answer(cred);\n  }\n\n  /**\n   * Answers this challenge using a given credential `cred`;\n   * the credential should be obtained by calling\n   *\n   * ```\n   * const cred = await navigator.credentials.create({ publicKey: this.options });\n   * ```\n   *\n   * @param {any} cred Credential created by calling the `CredentialContainer`'s `create` method\n   *                   based on the public key creation options from this challenge.\n   */\n  async answer(cred: any) {\n    const answer = <PublicKeyCredential>{\n      id: cred.id,\n      response: {\n        clientDataJSON: encodeToBase64Url(cred.response.clientDataJSON),\n        attestationObject: encodeToBase64Url(cred.response.attestationObject),\n      },\n    };\n    await this.#cs.addFidoComplete(this.challengeId, answer);\n  }\n}\n\n/**\n * Returned after initiating MFA approval using FIDO.\n * Provides some helper methods for answering this challenge.\n */\nexport class MfaFidoChallenge {\n  readonly #ss: SignerSession;\n  readonly mfaId: string;\n  readonly challengeId: string;\n  readonly options: any;\n\n  /**\n   * @param {SignerSession} ss The session used to initiate MFA approval using FIDO\n   * @param {string} mfaId The MFA request id.\n   * @param {ApiMfaFidoChallenge} challenge The challenge returned by the remote end\n   */\n  constructor(ss: SignerSession, mfaId: string, challenge: ApiMfaFidoChallenge) {\n    this.#ss = ss;\n    this.mfaId = mfaId;\n    this.challengeId = challenge.challenge_id;\n\n    // fix options returned from the server: rename fields and decode base64 fields into uint8[]\n    this.options = {\n      ...challenge.options,\n      challenge: decodeBase64Url(challenge.options.challenge),\n    };\n    this.options.rpId ??= challenge.options.rp_id;\n    this.options.allowCredentials ??= challenge.options.allow_credentials;\n    this.options.userVerification ??= challenge.options.user_verification;\n    delete this.options.rp_id;\n    delete this.options.allow_credentials;\n    delete this.options.user_verification;\n\n    for (const credential of this.options.allowCredentials ?? []) {\n      credential.id = decodeBase64Url(credential.id);\n      if (credential.transports === null) {\n        delete credential.transports;\n      }\n    }\n  }\n\n  /**\n   * Answers this challenge by using the `CredentialsContainer` API to get a credential\n   * based on the the public key credential request options from this challenge.\n   */\n  async createCredentialAndAnswer(): Promise<MfaRequestInfo> {\n    const cred = await navigator.credentials.get({ publicKey: this.options });\n    return await this.answer(cred);\n  }\n\n  /**\n   * Answers this challenge using a given credential `cred`.\n   * To obtain this credential, for example, call\n   *\n   * ```\n   * const cred = await navigator.credentials.get({ publicKey: this.options });\n   * ```\n   *\n   * @param {any} cred Credential created by calling the `CredentialContainer`'s `get` method\n   *                   based on the public key credential request options from this challenge.\n   */\n  async answer(cred: any): Promise<MfaRequestInfo> {\n    const answer = <PublicKeyCredential>{\n      id: cred.id,\n      response: {\n        clientDataJSON: encodeToBase64Url(cred.response.clientDataJSON),\n        authenticatorData: encodeToBase64Url(cred.response.authenticatorData),\n        signature: encodeToBase64Url(cred.response.signature),\n      },\n    };\n    return await this.#ss.fidoApproveComplete(this.mfaId, this.challengeId, answer);\n  }\n}\n"]}
|
|
@@ -1,71 +0,0 @@
|
|
|
1
|
-
import { Client } from "../api";
|
|
2
|
-
import { HasEnv, OrgSessionManager } from "./session_manager";
|
|
3
|
-
import { SessionStorage } from "./session_storage";
|
|
4
|
-
/** JSON representation of our "management session" file format */
|
|
5
|
-
export interface CognitoSessionObject {
|
|
6
|
-
/** The organization ID */
|
|
7
|
-
org_id: string;
|
|
8
|
-
/** The email address of the user */
|
|
9
|
-
email: string;
|
|
10
|
-
/** The ID token */
|
|
11
|
-
id_token: string;
|
|
12
|
-
/** The access token */
|
|
13
|
-
access_token: string;
|
|
14
|
-
/** The refresh token */
|
|
15
|
-
refresh_token: string;
|
|
16
|
-
/** The expiration time of the access token */
|
|
17
|
-
expiration: string;
|
|
18
|
-
}
|
|
19
|
-
export interface CognitoSessionInfo extends CognitoSessionObject, HasEnv {
|
|
20
|
-
}
|
|
21
|
-
/** Type of storage required for cognito (management) sessions */
|
|
22
|
-
export type CognitoSessionStorage = SessionStorage<CognitoSessionInfo>;
|
|
23
|
-
/** The session manager for cognito (management) sessions */
|
|
24
|
-
export declare class CognitoSessionManager extends OrgSessionManager<CognitoSessionInfo> {
|
|
25
|
-
#private;
|
|
26
|
-
/**
|
|
27
|
-
* @return {string} The current auth token.
|
|
28
|
-
* @internal
|
|
29
|
-
*/
|
|
30
|
-
token(): Promise<string>;
|
|
31
|
-
/**
|
|
32
|
-
* Returns a client with the current session and refreshes the current
|
|
33
|
-
* session.
|
|
34
|
-
*/
|
|
35
|
-
client(): Promise<Client>;
|
|
36
|
-
/** Revokes the session. */
|
|
37
|
-
revoke(): Promise<void>;
|
|
38
|
-
/**
|
|
39
|
-
* Returns whether it's time to refresh this token.
|
|
40
|
-
* @return {boolean} Whether it's time to refresh this token.
|
|
41
|
-
* @internal
|
|
42
|
-
*/
|
|
43
|
-
isStale(): Promise<boolean>;
|
|
44
|
-
/**
|
|
45
|
-
* Refreshes the session and **UPDATES/MUTATES** self.
|
|
46
|
-
*/
|
|
47
|
-
refresh(): Promise<void>;
|
|
48
|
-
/**
|
|
49
|
-
* Loads an existing cognito (management) session from storage.
|
|
50
|
-
* @param {CognitoSessionStorage} storage The storage back end to use
|
|
51
|
-
* @return {Promise<SingerSession>} New token
|
|
52
|
-
*/
|
|
53
|
-
static loadFromStorage(storage: CognitoSessionStorage): Promise<CognitoSessionManager>;
|
|
54
|
-
/**
|
|
55
|
-
* Loads an existing management session and creates a Cognito session manager for it.
|
|
56
|
-
*
|
|
57
|
-
* @param {CognitoSessionStorage} storage Optional session storage to load
|
|
58
|
-
* the session from. If not specified, the management session from the config
|
|
59
|
-
* directory will be loaded.
|
|
60
|
-
* @return {Promise<CognitoSessionManager>} Cognito session manager
|
|
61
|
-
*/
|
|
62
|
-
static loadManagementSession(storage?: CognitoSessionStorage): Promise<CognitoSessionManager>;
|
|
63
|
-
/**
|
|
64
|
-
* Constructor.
|
|
65
|
-
* @param {EnvInterface} env The environment of the session
|
|
66
|
-
* @param {string} orgId The id of the org associated with this session
|
|
67
|
-
* @param {string} token The current token of the session
|
|
68
|
-
* @param {CognitoSessionStorage} storage The storage back end to use
|
|
69
|
-
*/
|
|
70
|
-
private constructor();
|
|
71
|
-
}
|
|
@@ -1,129 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
3
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
4
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
5
|
-
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
6
|
-
};
|
|
7
|
-
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
8
|
-
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
9
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
10
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
11
|
-
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
12
|
-
};
|
|
13
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
14
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
15
|
-
};
|
|
16
|
-
var _CognitoSessionManager_client;
|
|
17
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
18
|
-
exports.CognitoSessionManager = void 0;
|
|
19
|
-
const path_1 = __importDefault(require("path"));
|
|
20
|
-
const session_manager_1 = require("./session_manager");
|
|
21
|
-
const session_storage_1 = require("./session_storage");
|
|
22
|
-
const util_1 = require("../util");
|
|
23
|
-
/** The session manager for cognito (management) sessions */
|
|
24
|
-
class CognitoSessionManager extends session_manager_1.OrgSessionManager {
|
|
25
|
-
/**
|
|
26
|
-
* @return {string} The current auth token.
|
|
27
|
-
* @internal
|
|
28
|
-
*/
|
|
29
|
-
async token() {
|
|
30
|
-
const session = await this.storage.retrieve();
|
|
31
|
-
return session.id_token;
|
|
32
|
-
}
|
|
33
|
-
/**
|
|
34
|
-
* Returns a client with the current session and refreshes the current
|
|
35
|
-
* session.
|
|
36
|
-
*/
|
|
37
|
-
async client() {
|
|
38
|
-
this.refreshIfNeeded();
|
|
39
|
-
return __classPrivateFieldGet(this, _CognitoSessionManager_client, "f");
|
|
40
|
-
}
|
|
41
|
-
/** Revokes the session. */
|
|
42
|
-
async revoke() {
|
|
43
|
-
const idp = require("@aws-sdk/client-cognito-identity-provider"); // eslint-disable-line @typescript-eslint/no-var-requires
|
|
44
|
-
const session = await this.storage.retrieve();
|
|
45
|
-
const client = new idp.CognitoIdentityProviderClient({
|
|
46
|
-
region: this.env.Region,
|
|
47
|
-
signer: { sign: async (request) => request }, // eslint-disable-line @typescript-eslint/no-explicit-any
|
|
48
|
-
});
|
|
49
|
-
const input = {
|
|
50
|
-
Token: session.refresh_token,
|
|
51
|
-
ClientId: this.env.ClientId,
|
|
52
|
-
};
|
|
53
|
-
await client.send(new idp.RevokeTokenCommand(input));
|
|
54
|
-
}
|
|
55
|
-
/**
|
|
56
|
-
* Returns whether it's time to refresh this token.
|
|
57
|
-
* @return {boolean} Whether it's time to refresh this token.
|
|
58
|
-
* @internal
|
|
59
|
-
*/
|
|
60
|
-
async isStale() {
|
|
61
|
-
const session = await this.storage.retrieve();
|
|
62
|
-
return session_manager_1.SessionManager.isStale(new Date(session.expiration));
|
|
63
|
-
}
|
|
64
|
-
/**
|
|
65
|
-
* Refreshes the session and **UPDATES/MUTATES** self.
|
|
66
|
-
*/
|
|
67
|
-
async refresh() {
|
|
68
|
-
const idp = require("@aws-sdk/client-cognito-identity-provider"); // eslint-disable-line @typescript-eslint/no-var-requires
|
|
69
|
-
const session = await this.storage.retrieve();
|
|
70
|
-
const client = new idp.CognitoIdentityProviderClient({ region: this.env.Region });
|
|
71
|
-
const resp = await client.send(new idp.InitiateAuthCommand({
|
|
72
|
-
AuthFlow: "REFRESH_TOKEN_AUTH",
|
|
73
|
-
AuthParameters: {
|
|
74
|
-
REFRESH_TOKEN: session.refresh_token,
|
|
75
|
-
},
|
|
76
|
-
ClientId: this.env.ClientId,
|
|
77
|
-
}));
|
|
78
|
-
if (!resp.AuthenticationResult ||
|
|
79
|
-
!resp.AuthenticationResult.ExpiresIn ||
|
|
80
|
-
!resp.AuthenticationResult.IdToken) {
|
|
81
|
-
throw new Error("Refresh failed");
|
|
82
|
-
}
|
|
83
|
-
const expiresInMs = resp.AuthenticationResult.ExpiresIn * 1000;
|
|
84
|
-
const expiration = new Date(new Date().getTime() + expiresInMs).toISOString();
|
|
85
|
-
const idToken = resp.AuthenticationResult.IdToken;
|
|
86
|
-
await this.storage.save({
|
|
87
|
-
...session,
|
|
88
|
-
id_token: idToken,
|
|
89
|
-
access_token: resp.AuthenticationResult.AccessToken,
|
|
90
|
-
expiration,
|
|
91
|
-
});
|
|
92
|
-
__classPrivateFieldSet(this, _CognitoSessionManager_client, this.createClient(idToken), "f");
|
|
93
|
-
}
|
|
94
|
-
/**
|
|
95
|
-
* Loads an existing cognito (management) session from storage.
|
|
96
|
-
* @param {CognitoSessionStorage} storage The storage back end to use
|
|
97
|
-
* @return {Promise<SingerSession>} New token
|
|
98
|
-
*/
|
|
99
|
-
static async loadFromStorage(storage) {
|
|
100
|
-
const sessionInfo = await storage.retrieve();
|
|
101
|
-
return new CognitoSessionManager(sessionInfo.env["Dev-CubeSignerStack"], sessionInfo.org_id, sessionInfo.id_token, storage);
|
|
102
|
-
}
|
|
103
|
-
/**
|
|
104
|
-
* Loads an existing management session and creates a Cognito session manager for it.
|
|
105
|
-
*
|
|
106
|
-
* @param {CognitoSessionStorage} storage Optional session storage to load
|
|
107
|
-
* the session from. If not specified, the management session from the config
|
|
108
|
-
* directory will be loaded.
|
|
109
|
-
* @return {Promise<CognitoSessionManager>} Cognito session manager
|
|
110
|
-
*/
|
|
111
|
-
static async loadManagementSession(storage) {
|
|
112
|
-
return await CognitoSessionManager.loadFromStorage(storage ?? new session_storage_1.JsonFileSessionStorage(path_1.default.join((0, util_1.configDir)(), "management-session.json")));
|
|
113
|
-
}
|
|
114
|
-
/**
|
|
115
|
-
* Constructor.
|
|
116
|
-
* @param {EnvInterface} env The environment of the session
|
|
117
|
-
* @param {string} orgId The id of the org associated with this session
|
|
118
|
-
* @param {string} token The current token of the session
|
|
119
|
-
* @param {CognitoSessionStorage} storage The storage back end to use
|
|
120
|
-
*/
|
|
121
|
-
constructor(env, orgId, token, storage) {
|
|
122
|
-
super(env, orgId, storage);
|
|
123
|
-
_CognitoSessionManager_client.set(this, void 0);
|
|
124
|
-
__classPrivateFieldSet(this, _CognitoSessionManager_client, this.createClient(token), "f");
|
|
125
|
-
}
|
|
126
|
-
}
|
|
127
|
-
exports.CognitoSessionManager = CognitoSessionManager;
|
|
128
|
-
_CognitoSessionManager_client = new WeakMap();
|
|
129
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"cognito_manager.js","sourceRoot":"","sources":["../../../src/session/cognito_manager.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;AAAA,gDAAwB;AAGxB,uDAA8E;AAC9E,uDAA2E;AAC3E,kCAAoC;AAuBpC,4DAA4D;AAC5D,MAAa,qBAAsB,SAAQ,mCAAqC;IAG9E;;;OAGG;IACH,KAAK,CAAC,KAAK;QACT,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,OAAO,OAAO,CAAC,QAAQ,CAAC;IAC1B,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,MAAM;QACV,IAAI,CAAC,eAAe,EAAE,CAAC;QACvB,OAAO,uBAAA,IAAI,qCAAQ,CAAC;IACtB,CAAC;IAED,2BAA2B;IAC3B,KAAK,CAAC,MAAM;QACV,MAAM,GAAG,GAAG,OAAO,CAAC,2CAA2C,CAAC,CAAC,CAAC,yDAAyD;QAC3H,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,MAAM,MAAM,GAAG,IAAI,GAAG,CAAC,6BAA6B,CAAC;YACnD,MAAM,EAAE,IAAI,CAAC,GAAG,CAAC,MAAM;YACvB,MAAM,EAAE,EAAE,IAAI,EAAE,KAAK,EAAE,OAAY,EAAE,EAAE,CAAC,OAAO,EAAE,EAAE,yDAAyD;SAC7G,CAAC,CAAC;QACH,MAAM,KAAK,GAAG;YACZ,KAAK,EAAE,OAAO,CAAC,aAAa;YAC5B,QAAQ,EAAE,IAAI,CAAC,GAAG,CAAC,QAAQ;SAC5B,CAAC;QACF,MAAM,MAAM,CAAC,IAAI,CAAC,IAAI,GAAG,CAAC,kBAAkB,CAAC,KAAK,CAAC,CAAC,CAAC;IACvD,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,OAAO,gCAAc,CAAC,OAAO,CAAC,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC;IAC9D,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,GAAG,GAAG,OAAO,CAAC,2CAA2C,CAAC,CAAC,CAAC,yDAAyD;QAC3H,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,MAAM,MAAM,GAAG,IAAI,GAAG,CAAC,6BAA6B,CAAC,EAAE,MAAM,EAAE,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,CAAC,CAAC;QAClF,MAAM,IAAI,GAAG,MAAM,MAAM,CAAC,IAAI,CAC5B,IAAI,GAAG,CAAC,mBAAmB,CAAC;YAC1B,QAAQ,EAAE,oBAAoB;YAC9B,cAAc,EAAE;gBACd,aAAa,EAAE,OAAO,CAAC,aAAa;aACrC;YACD,QAAQ,EAAE,IAAI,CAAC,GAAG,CAAC,QAAQ;SAC5B,CAAC,CACH,CAAC;QAEF,IACE,CAAC,IAAI,CAAC,oBAAoB;YAC1B,CAAC,IAAI,CAAC,oBAAoB,CAAC,SAAS;YACpC,CAAC,IAAI,CAAC,oBAAoB,CAAC,OAAO,EAClC,CAAC;YACD,MAAM,IAAI,KAAK,CAAC,gBAAgB,CAAC,CAAC;QACpC,CAAC;QAED,MAAM,WAAW,GAAG,IAAI,CAAC,oBAAoB,CAAC,SAAS,GAAG,IAAI,CAAC;QAC/D,MAAM,UAAU,GAAG,IAAI,IAAI,CAAC,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,GAAG,WAAW,CAAC,CAAC,WAAW,EAAE,CAAC;QAC9E,MAAM,OAAO,GAAG,IAAI,CAAC,oBAAoB,CAAC,OAAO,CAAC;QAElD,MAAM,IAAI,CAAC,OAAO,CAAC,IAAI,CAAqB;YAC1C,GAAG,OAAO;YACV,QAAQ,EAAE,OAAO;YACjB,YAAY,EAAE,IAAI,CAAC,oBAAoB,CAAC,WAAW;YACnD,UAAU;SACX,CAAC,CAAC;QACH,uBAAA,IAAI,iCAAW,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,MAAA,CAAC;IAC5C,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,eAAe,CAAC,OAA8B;QACzD,MAAM,WAAW,GAAG,MAAM,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC7C,OAAO,IAAI,qBAAqB,CAC9B,WAAW,CAAC,GAAG,CAAC,qBAAqB,CAAC,EACtC,WAAW,CAAC,MAAM,EAClB,WAAW,CAAC,QAAQ,EACpB,OAAO,CACR,CAAC;IACJ,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,KAAK,CAAC,qBAAqB,CAChC,OAA+B;QAE/B,OAAO,MAAM,qBAAqB,CAAC,eAAe,CAChD,OAAO,IAAI,IAAI,wCAAsB,CAAC,cAAI,CAAC,IAAI,CAAC,IAAA,gBAAS,GAAE,EAAE,yBAAyB,CAAC,CAAC,CACzF,CAAC;IACJ,CAAC;IAED;;;;;;OAMG;IACH,YACE,GAAiB,EACjB,KAAa,EACb,KAAa,EACb,OAA8B;QAE9B,KAAK,CAAC,GAAG,EAAE,KAAK,EAAE,OAAO,CAAC,CAAC;QA/H7B,gDAAgB;QAgId,uBAAA,IAAI,iCAAW,IAAI,CAAC,YAAY,CAAC,KAAK,CAAC,MAAA,CAAC;IAC1C,CAAC;CACF;AAnID,sDAmIC","sourcesContent":["import path from \"path\";\nimport { Client } from \"../api\";\nimport { EnvInterface } from \"../env\";\nimport { HasEnv, OrgSessionManager, SessionManager } from \"./session_manager\";\nimport { JsonFileSessionStorage, SessionStorage } from \"./session_storage\";\nimport { configDir } from \"../util\";\n\n/** JSON representation of our \"management session\" file format */\nexport interface CognitoSessionObject {\n  /** The organization ID */\n  org_id: string;\n  /** The email address of the user */\n  email: string;\n  /** The ID token */\n  id_token: string;\n  /** The access token */\n  access_token: string;\n  /** The refresh token */\n  refresh_token: string;\n  /** The expiration time of the access token */\n  expiration: string;\n}\n\nexport interface CognitoSessionInfo extends CognitoSessionObject, HasEnv {}\n\n/** Type of storage required for cognito (management) sessions */\nexport type CognitoSessionStorage = SessionStorage<CognitoSessionInfo>;\n\n/** The session manager for cognito (management) sessions */\nexport class CognitoSessionManager extends OrgSessionManager<CognitoSessionInfo> {\n  #client: Client;\n\n  /**\n   * @return {string} The current auth token.\n   * @internal\n   */\n  async token(): Promise<string> {\n    const session = await this.storage.retrieve();\n    return session.id_token;\n  }\n\n  /**\n   * Returns a client with the current session and refreshes the current\n   * session.\n   */\n  async client(): Promise<Client> {\n    this.refreshIfNeeded();\n    return this.#client;\n  }\n\n  /** Revokes the session. */\n  async revoke(): Promise<void> {\n    const idp = require(\"@aws-sdk/client-cognito-identity-provider\"); // eslint-disable-line @typescript-eslint/no-var-requires\n    const session = await this.storage.retrieve();\n    const client = new idp.CognitoIdentityProviderClient({\n      region: this.env.Region,\n      signer: { sign: async (request: any) => request }, // eslint-disable-line @typescript-eslint/no-explicit-any\n    });\n    const input = {\n      Token: session.refresh_token,\n      ClientId: this.env.ClientId,\n    };\n    await client.send(new idp.RevokeTokenCommand(input));\n  }\n\n  /**\n   * Returns whether it's time to refresh this token.\n   * @return {boolean} Whether it's time to refresh this token.\n   * @internal\n   */\n  async isStale(): Promise<boolean> {\n    const session = await this.storage.retrieve();\n    return SessionManager.isStale(new Date(session.expiration));\n  }\n\n  /**\n   * Refreshes the session and **UPDATES/MUTATES** self.\n   */\n  async refresh(): Promise<void> {\n    const idp = require(\"@aws-sdk/client-cognito-identity-provider\"); // eslint-disable-line @typescript-eslint/no-var-requires\n    const session = await this.storage.retrieve();\n    const client = new idp.CognitoIdentityProviderClient({ region: this.env.Region });\n    const resp = await client.send(\n      new idp.InitiateAuthCommand({\n        AuthFlow: \"REFRESH_TOKEN_AUTH\",\n        AuthParameters: {\n          REFRESH_TOKEN: session.refresh_token,\n        },\n        ClientId: this.env.ClientId,\n      }),\n    );\n\n    if (\n      !resp.AuthenticationResult ||\n      !resp.AuthenticationResult.ExpiresIn ||\n      !resp.AuthenticationResult.IdToken\n    ) {\n      throw new Error(\"Refresh failed\");\n    }\n\n    const expiresInMs = resp.AuthenticationResult.ExpiresIn * 1000;\n    const expiration = new Date(new Date().getTime() + expiresInMs).toISOString();\n    const idToken = resp.AuthenticationResult.IdToken;\n\n    await this.storage.save(<CognitoSessionInfo>{\n      ...session,\n      id_token: idToken,\n      access_token: resp.AuthenticationResult.AccessToken,\n      expiration,\n    });\n    this.#client = this.createClient(idToken);\n  }\n\n  /**\n   * Loads an existing cognito (management) session from storage.\n   * @param {CognitoSessionStorage} storage The storage back end to use\n   * @return {Promise<SingerSession>} New token\n   */\n  static async loadFromStorage(storage: CognitoSessionStorage): Promise<CognitoSessionManager> {\n    const sessionInfo = await storage.retrieve();\n    return new CognitoSessionManager(\n      sessionInfo.env[\"Dev-CubeSignerStack\"],\n      sessionInfo.org_id,\n      sessionInfo.id_token,\n      storage,\n    );\n  }\n\n  /**\n   * Loads an existing management session and creates a Cognito session manager for it.\n   *\n   * @param {CognitoSessionStorage} storage Optional session storage to load\n   * the session from. If not specified, the management session from the config\n   * directory will be loaded.\n   * @return {Promise<CognitoSessionManager>} Cognito session manager\n   */\n  static async loadManagementSession(\n    storage?: CognitoSessionStorage,\n  ): Promise<CognitoSessionManager> {\n    return await CognitoSessionManager.loadFromStorage(\n      storage ?? new JsonFileSessionStorage(path.join(configDir(), \"management-session.json\")),\n    );\n  }\n\n  /**\n   * Constructor.\n   * @param {EnvInterface} env The environment of the session\n   * @param {string} orgId The id of the org associated with this session\n   * @param {string} token The current token of the session\n   * @param {CognitoSessionStorage} storage The storage back end to use\n   */\n  private constructor(\n    env: EnvInterface,\n    orgId: string,\n    token: string,\n    storage: CognitoSessionStorage,\n  ) {\n    super(env, orgId, storage);\n    this.#client = this.createClient(token);\n  }\n}\n"]}
|
|
@@ -1,47 +0,0 @@
|
|
|
1
|
-
import { EnvInterface } from "../env";
|
|
2
|
-
import { ClientSessionInfo } from "../signer_session";
|
|
3
|
-
/** Generic session interface. */
|
|
4
|
-
export interface Session {
|
|
5
|
-
/** Revoke the session. */
|
|
6
|
-
revoke: () => Promise<void>;
|
|
7
|
-
/** Refresh the session token. */
|
|
8
|
-
refresh: () => Promise<void>;
|
|
9
|
-
/** Get the authorization token. */
|
|
10
|
-
getAuthToken: () => Promise<string>;
|
|
11
|
-
}
|
|
12
|
-
/** JSON representation of our "management session" file format */
|
|
13
|
-
export interface ManagementSessionObject {
|
|
14
|
-
/** The email address of the user */
|
|
15
|
-
email: string;
|
|
16
|
-
/** The ID token */
|
|
17
|
-
id_token: string;
|
|
18
|
-
/** The access token */
|
|
19
|
-
access_token: string;
|
|
20
|
-
/** The refresh token */
|
|
21
|
-
refresh_token: string;
|
|
22
|
-
/** The expiration time of the access token */
|
|
23
|
-
expiration: string;
|
|
24
|
-
}
|
|
25
|
-
/** JSON representation of our "signer session" file format */
|
|
26
|
-
export interface SignerSessionObject {
|
|
27
|
-
/** The organization ID */
|
|
28
|
-
org_id: string;
|
|
29
|
-
/** The role ID */
|
|
30
|
-
role_id: string;
|
|
31
|
-
/** The purpose of the session token */
|
|
32
|
-
purpose: string;
|
|
33
|
-
/** The token to include in Authorization header */
|
|
34
|
-
token: string;
|
|
35
|
-
/** Session info */
|
|
36
|
-
session_info: ClientSessionInfo;
|
|
37
|
-
}
|
|
38
|
-
export interface HasEnv {
|
|
39
|
-
/** The environment */
|
|
40
|
-
env: {
|
|
41
|
-
["Dev-CubeSignerStack"]: EnvInterface;
|
|
42
|
-
};
|
|
43
|
-
}
|
|
44
|
-
export interface ManagementSessionFile extends ManagementSessionObject, HasEnv {
|
|
45
|
-
}
|
|
46
|
-
export interface SignerSessionFile extends SignerSessionObject, HasEnv {
|
|
47
|
-
}
|
|
@@ -1,3 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,59 +0,0 @@
|
|
|
1
|
-
import { Client } from "../client";
|
|
2
|
-
import { HasEnv, SessionManager } from "./session_manager";
|
|
3
|
-
import { SessionStorage } from "./session_storage";
|
|
4
|
-
/** JSON representation of our "management session" file format */
|
|
5
|
-
export interface ManagementSessionObject {
|
|
6
|
-
/** The email address of the user */
|
|
7
|
-
email: string;
|
|
8
|
-
/** The ID token */
|
|
9
|
-
id_token: string;
|
|
10
|
-
/** The access token */
|
|
11
|
-
access_token: string;
|
|
12
|
-
/** The refresh token */
|
|
13
|
-
refresh_token: string;
|
|
14
|
-
/** The expiration time of the access token */
|
|
15
|
-
expiration: string;
|
|
16
|
-
}
|
|
17
|
-
export interface ManagementSessionInfo extends ManagementSessionObject, HasEnv {
|
|
18
|
-
}
|
|
19
|
-
/** Type of storage required for management sessions */
|
|
20
|
-
export type ManagementSessionStorage = SessionStorage<ManagementSessionInfo>;
|
|
21
|
-
/** The session manager for management sessions */
|
|
22
|
-
export declare class ManagementSessionManager extends SessionManager<ManagementSessionInfo> {
|
|
23
|
-
#private;
|
|
24
|
-
/**
|
|
25
|
-
* @return {string} The current auth token.
|
|
26
|
-
* @internal
|
|
27
|
-
*/
|
|
28
|
-
token(): Promise<string>;
|
|
29
|
-
/**
|
|
30
|
-
* Returns a client with the current session and refreshes the current
|
|
31
|
-
* session.
|
|
32
|
-
*/
|
|
33
|
-
client(): Promise<Client>;
|
|
34
|
-
/** Revokes the session. */
|
|
35
|
-
revoke(): Promise<void>;
|
|
36
|
-
/**
|
|
37
|
-
* Returns whether it's time to refresh this token.
|
|
38
|
-
* @return {boolean} Whether it's time to refresh this token.
|
|
39
|
-
* @internal
|
|
40
|
-
*/
|
|
41
|
-
isStale(): Promise<boolean>;
|
|
42
|
-
/**
|
|
43
|
-
* Refreshes the session and **UPDATES/MUTATES** self.
|
|
44
|
-
*/
|
|
45
|
-
refresh(): Promise<void>;
|
|
46
|
-
/**
|
|
47
|
-
* Loads an existing management session from storage.
|
|
48
|
-
* @param {ManagementSessionStorage} storage The storage back end to use
|
|
49
|
-
* @return {Promise<SingerSession>} New token
|
|
50
|
-
*/
|
|
51
|
-
static loadFromStorage(storage: ManagementSessionStorage): Promise<ManagementSessionManager>;
|
|
52
|
-
/**
|
|
53
|
-
* Constructor.
|
|
54
|
-
* @param {EnvInterface} env The environment of the session
|
|
55
|
-
* @param {string} token The current token of the session
|
|
56
|
-
* @param {ManagementSessionStorage} storage The storage back end to use
|
|
57
|
-
*/
|
|
58
|
-
private constructor();
|
|
59
|
-
}
|
|
@@ -1,111 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
3
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
4
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
5
|
-
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
6
|
-
};
|
|
7
|
-
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
8
|
-
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
9
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
10
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
11
|
-
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
12
|
-
};
|
|
13
|
-
var _ManagementSessionManager_client;
|
|
14
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
-
exports.ManagementSessionManager = void 0;
|
|
16
|
-
const session_manager_1 = require("./session_manager");
|
|
17
|
-
/** The session manager for management sessions */
|
|
18
|
-
class ManagementSessionManager extends session_manager_1.SessionManager {
|
|
19
|
-
/**
|
|
20
|
-
* @return {string} The current auth token.
|
|
21
|
-
* @internal
|
|
22
|
-
*/
|
|
23
|
-
async token() {
|
|
24
|
-
const session = await this.storage.retrieve();
|
|
25
|
-
return session.id_token;
|
|
26
|
-
}
|
|
27
|
-
/**
|
|
28
|
-
* Returns a client with the current session and refreshes the current
|
|
29
|
-
* session.
|
|
30
|
-
*/
|
|
31
|
-
async client() {
|
|
32
|
-
this.refreshIfNeeded();
|
|
33
|
-
return __classPrivateFieldGet(this, _ManagementSessionManager_client, "f");
|
|
34
|
-
}
|
|
35
|
-
/** Revokes the session. */
|
|
36
|
-
async revoke() {
|
|
37
|
-
const idp = require("@aws-sdk/client-cognito-identity-provider"); // eslint-disable-line @typescript-eslint/no-var-requires
|
|
38
|
-
const session = await this.storage.retrieve();
|
|
39
|
-
const client = new idp.CognitoIdentityProviderClient({
|
|
40
|
-
region: this.env.Region,
|
|
41
|
-
signer: { sign: async (request) => request }, // eslint-disable-line @typescript-eslint/no-explicit-any
|
|
42
|
-
});
|
|
43
|
-
const input = {
|
|
44
|
-
Token: session.refresh_token,
|
|
45
|
-
ClientId: this.env.ClientId,
|
|
46
|
-
};
|
|
47
|
-
await client.send(new idp.RevokeTokenCommand(input));
|
|
48
|
-
}
|
|
49
|
-
/**
|
|
50
|
-
* Returns whether it's time to refresh this token.
|
|
51
|
-
* @return {boolean} Whether it's time to refresh this token.
|
|
52
|
-
* @internal
|
|
53
|
-
*/
|
|
54
|
-
async isStale() {
|
|
55
|
-
const session = await this.storage.retrieve();
|
|
56
|
-
return this.hasExpired(new Date(session.expiration).getTime());
|
|
57
|
-
}
|
|
58
|
-
/**
|
|
59
|
-
* Refreshes the session and **UPDATES/MUTATES** self.
|
|
60
|
-
*/
|
|
61
|
-
async refresh() {
|
|
62
|
-
const idp = require("@aws-sdk/client-cognito-identity-provider"); // eslint-disable-line @typescript-eslint/no-var-requires
|
|
63
|
-
const session = await this.storage.retrieve();
|
|
64
|
-
const client = new idp.CognitoIdentityProviderClient({ region: this.env.Region });
|
|
65
|
-
const resp = await client.send(new idp.InitiateAuthCommand({
|
|
66
|
-
AuthFlow: "REFRESH_TOKEN_AUTH",
|
|
67
|
-
AuthParameters: {
|
|
68
|
-
REFRESH_TOKEN: session.refresh_token,
|
|
69
|
-
},
|
|
70
|
-
ClientId: this.env.ClientId,
|
|
71
|
-
}));
|
|
72
|
-
if (!resp.AuthenticationResult ||
|
|
73
|
-
!resp.AuthenticationResult.ExpiresIn ||
|
|
74
|
-
!resp.AuthenticationResult.IdToken) {
|
|
75
|
-
throw new Error("Refresh failed");
|
|
76
|
-
}
|
|
77
|
-
const expiresInMs = resp.AuthenticationResult.ExpiresIn * 1000;
|
|
78
|
-
const expiration = new Date(new Date().getTime() + expiresInMs).toISOString();
|
|
79
|
-
const idToken = resp.AuthenticationResult.IdToken;
|
|
80
|
-
await this.storage.save({
|
|
81
|
-
...session,
|
|
82
|
-
id_token: idToken,
|
|
83
|
-
access_token: resp.AuthenticationResult.AccessToken,
|
|
84
|
-
expiration,
|
|
85
|
-
});
|
|
86
|
-
__classPrivateFieldSet(this, _ManagementSessionManager_client, this.createClient(idToken), "f");
|
|
87
|
-
}
|
|
88
|
-
/**
|
|
89
|
-
* Loads an existing management session from storage.
|
|
90
|
-
* @param {ManagementSessionStorage} storage The storage back end to use
|
|
91
|
-
* @return {Promise<SingerSession>} New token
|
|
92
|
-
*/
|
|
93
|
-
static async loadFromStorage(storage) {
|
|
94
|
-
const sessionInfo = await storage.retrieve();
|
|
95
|
-
return new ManagementSessionManager(sessionInfo.env["Dev-CubeSignerStack"], sessionInfo.id_token, storage);
|
|
96
|
-
}
|
|
97
|
-
/**
|
|
98
|
-
* Constructor.
|
|
99
|
-
* @param {EnvInterface} env The environment of the session
|
|
100
|
-
* @param {string} token The current token of the session
|
|
101
|
-
* @param {ManagementSessionStorage} storage The storage back end to use
|
|
102
|
-
*/
|
|
103
|
-
constructor(env, token, storage) {
|
|
104
|
-
super(env, storage);
|
|
105
|
-
_ManagementSessionManager_client.set(this, void 0);
|
|
106
|
-
__classPrivateFieldSet(this, _ManagementSessionManager_client, this.createClient(token), "f");
|
|
107
|
-
}
|
|
108
|
-
}
|
|
109
|
-
exports.ManagementSessionManager = ManagementSessionManager;
|
|
110
|
-
_ManagementSessionManager_client = new WeakMap();
|
|
111
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"management_session_manager.js","sourceRoot":"","sources":["../../../src/session/management_session_manager.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAEA,uDAA2D;AAsB3D,kDAAkD;AAClD,MAAa,wBAAyB,SAAQ,gCAAqC;IAGjF;;;OAGG;IACH,KAAK,CAAC,KAAK;QACT,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,OAAO,OAAO,CAAC,QAAQ,CAAC;IAC1B,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,MAAM;QACV,IAAI,CAAC,eAAe,EAAE,CAAC;QACvB,OAAO,uBAAA,IAAI,wCAAQ,CAAC;IACtB,CAAC;IAED,2BAA2B;IAC3B,KAAK,CAAC,MAAM;QACV,MAAM,GAAG,GAAG,OAAO,CAAC,2CAA2C,CAAC,CAAC,CAAC,yDAAyD;QAC3H,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,MAAM,MAAM,GAAG,IAAI,GAAG,CAAC,6BAA6B,CAAC;YACnD,MAAM,EAAE,IAAI,CAAC,GAAG,CAAC,MAAM;YACvB,MAAM,EAAE,EAAE,IAAI,EAAE,KAAK,EAAE,OAAY,EAAE,EAAE,CAAC,OAAO,EAAE,EAAE,yDAAyD;SAC7G,CAAC,CAAC;QACH,MAAM,KAAK,GAAG;YACZ,KAAK,EAAE,OAAO,CAAC,aAAa;YAC5B,QAAQ,EAAE,IAAI,CAAC,GAAG,CAAC,QAAQ;SAC5B,CAAC;QACF,MAAM,MAAM,CAAC,IAAI,CAAC,IAAI,GAAG,CAAC,kBAAkB,CAAC,KAAK,CAAC,CAAC,CAAC;IACvD,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,OAAO,IAAI,CAAC,UAAU,CAAC,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,OAAO,EAAE,CAAC,CAAC;IACjE,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,GAAG,GAAG,OAAO,CAAC,2CAA2C,CAAC,CAAC,CAAC,yDAAyD;QAC3H,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC9C,MAAM,MAAM,GAAG,IAAI,GAAG,CAAC,6BAA6B,CAAC,EAAE,MAAM,EAAE,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,CAAC,CAAC;QAClF,MAAM,IAAI,GAAG,MAAM,MAAM,CAAC,IAAI,CAC5B,IAAI,GAAG,CAAC,mBAAmB,CAAC;YAC1B,QAAQ,EAAE,oBAAoB;YAC9B,cAAc,EAAE;gBACd,aAAa,EAAE,OAAO,CAAC,aAAa;aACrC;YACD,QAAQ,EAAE,IAAI,CAAC,GAAG,CAAC,QAAQ;SAC5B,CAAC,CACH,CAAC;QAEF,IACE,CAAC,IAAI,CAAC,oBAAoB;YAC1B,CAAC,IAAI,CAAC,oBAAoB,CAAC,SAAS;YACpC,CAAC,IAAI,CAAC,oBAAoB,CAAC,OAAO,EAClC;YACA,MAAM,IAAI,KAAK,CAAC,gBAAgB,CAAC,CAAC;SACnC;QAED,MAAM,WAAW,GAAG,IAAI,CAAC,oBAAoB,CAAC,SAAS,GAAG,IAAI,CAAC;QAC/D,MAAM,UAAU,GAAG,IAAI,IAAI,CAAC,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,GAAG,WAAW,CAAC,CAAC,WAAW,EAAE,CAAC;QAC9E,MAAM,OAAO,GAAG,IAAI,CAAC,oBAAoB,CAAC,OAAO,CAAC;QAElD,MAAM,IAAI,CAAC,OAAO,CAAC,IAAI,CAAwB;YAC7C,GAAG,OAAO;YACV,QAAQ,EAAE,OAAO;YACjB,YAAY,EAAE,IAAI,CAAC,oBAAoB,CAAC,WAAW;YACnD,UAAU;SACX,CAAC,CAAC;QACH,uBAAA,IAAI,oCAAW,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,MAAA,CAAC;IAC5C,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,eAAe,CAC1B,OAAiC;QAEjC,MAAM,WAAW,GAAG,MAAM,OAAO,CAAC,QAAQ,EAAE,CAAC;QAC7C,OAAO,IAAI,wBAAwB,CACjC,WAAW,CAAC,GAAG,CAAC,qBAAqB,CAAC,EACtC,WAAW,CAAC,QAAQ,EACpB,OAAO,CACR,CAAC;IACJ,CAAC;IAED;;;;;OAKG;IACH,YAAoB,GAAiB,EAAE,KAAa,EAAE,OAAiC;QACrF,KAAK,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;QA1GtB,mDAAgB;QA2Gd,uBAAA,IAAI,oCAAW,IAAI,CAAC,YAAY,CAAC,KAAK,CAAC,MAAA,CAAC;IAC1C,CAAC;CACF;AA9GD,4DA8GC","sourcesContent":["import { Client } from \"../client\";\nimport { EnvInterface } from \"../env\";\nimport { HasEnv, SessionManager } from \"./session_manager\";\nimport { SessionStorage } from \"./session_storage\";\n\n/** JSON representation of our \"management session\" file format */\nexport interface ManagementSessionObject {\n  /** The email address of the user */\n  email: string;\n  /** The ID token */\n  id_token: string;\n  /** The access token */\n  access_token: string;\n  /** The refresh token */\n  refresh_token: string;\n  /** The expiration time of the access token */\n  expiration: string;\n}\n\nexport interface ManagementSessionInfo extends ManagementSessionObject, HasEnv {}\n\n/** Type of storage required for management sessions */\nexport type ManagementSessionStorage = SessionStorage<ManagementSessionInfo>;\n\n/** The session manager for management sessions */\nexport class ManagementSessionManager extends SessionManager<ManagementSessionInfo> {\n  #client: Client;\n\n  /**\n   * @return {string} The current auth token.\n   * @internal\n   */\n  async token(): Promise<string> {\n    const session = await this.storage.retrieve();\n    return session.id_token;\n  }\n\n  /**\n   * Returns a client with the current session and refreshes the current\n   * session.\n   */\n  async client(): Promise<Client> {\n    this.refreshIfNeeded();\n    return this.#client;\n  }\n\n  /** Revokes the session. */\n  async revoke(): Promise<void> {\n    const idp = require(\"@aws-sdk/client-cognito-identity-provider\"); // eslint-disable-line @typescript-eslint/no-var-requires\n    const session = await this.storage.retrieve();\n    const client = new idp.CognitoIdentityProviderClient({\n      region: this.env.Region,\n      signer: { sign: async (request: any) => request }, // eslint-disable-line @typescript-eslint/no-explicit-any\n    });\n    const input = {\n      Token: session.refresh_token,\n      ClientId: this.env.ClientId,\n    };\n    await client.send(new idp.RevokeTokenCommand(input));\n  }\n\n  /**\n   * Returns whether it's time to refresh this token.\n   * @return {boolean} Whether it's time to refresh this token.\n   * @internal\n   */\n  async isStale(): Promise<boolean> {\n    const session = await this.storage.retrieve();\n    return this.hasExpired(new Date(session.expiration).getTime());\n  }\n\n  /**\n   * Refreshes the session and **UPDATES/MUTATES** self.\n   */\n  async refresh(): Promise<void> {\n    const idp = require(\"@aws-sdk/client-cognito-identity-provider\"); // eslint-disable-line @typescript-eslint/no-var-requires\n    const session = await this.storage.retrieve();\n    const client = new idp.CognitoIdentityProviderClient({ region: this.env.Region });\n    const resp = await client.send(\n      new idp.InitiateAuthCommand({\n        AuthFlow: \"REFRESH_TOKEN_AUTH\",\n        AuthParameters: {\n          REFRESH_TOKEN: session.refresh_token,\n        },\n        ClientId: this.env.ClientId,\n      }),\n    );\n\n    if (\n      !resp.AuthenticationResult ||\n      !resp.AuthenticationResult.ExpiresIn ||\n      !resp.AuthenticationResult.IdToken\n    ) {\n      throw new Error(\"Refresh failed\");\n    }\n\n    const expiresInMs = resp.AuthenticationResult.ExpiresIn * 1000;\n    const expiration = new Date(new Date().getTime() + expiresInMs).toISOString();\n    const idToken = resp.AuthenticationResult.IdToken;\n\n    await this.storage.save(<ManagementSessionInfo>{\n      ...session,\n      id_token: idToken,\n      access_token: resp.AuthenticationResult.AccessToken,\n      expiration,\n    });\n    this.#client = this.createClient(idToken);\n  }\n\n  /**\n   * Loads an existing management session from storage.\n   * @param {ManagementSessionStorage} storage The storage back end to use\n   * @return {Promise<SingerSession>} New token\n   */\n  static async loadFromStorage(\n    storage: ManagementSessionStorage,\n  ): Promise<ManagementSessionManager> {\n    const sessionInfo = await storage.retrieve();\n    return new ManagementSessionManager(\n      sessionInfo.env[\"Dev-CubeSignerStack\"],\n      sessionInfo.id_token,\n      storage,\n    );\n  }\n\n  /**\n   * Constructor.\n   * @param {EnvInterface} env The environment of the session\n   * @param {string} token The current token of the session\n   * @param {ManagementSessionStorage} storage The storage back end to use\n   */\n  private constructor(env: EnvInterface, token: string, storage: ManagementSessionStorage) {\n    super(env, storage);\n    this.#client = this.createClient(token);\n  }\n}\n"]}
|