@cubist-labs/cubesigner-sdk 0.2.28 → 0.3.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (143) hide show
  1. package/README.md +30 -28
  2. package/dist/cjs/package.json +41 -0
  3. package/dist/cjs/spec/env/beta.json +9 -0
  4. package/dist/cjs/spec/env/gamma.json +9 -0
  5. package/dist/cjs/spec/env/prod.json +9 -0
  6. package/dist/cjs/src/api.d.ts +634 -0
  7. package/dist/cjs/src/api.js +1309 -0
  8. package/dist/cjs/src/client.d.ts +575 -0
  9. package/dist/cjs/src/client.js +378 -0
  10. package/dist/cjs/src/env.d.ts +15 -0
  11. package/dist/cjs/src/env.js +35 -0
  12. package/dist/cjs/src/error.d.ts +29 -0
  13. package/dist/cjs/src/error.js +36 -0
  14. package/dist/cjs/src/events.d.ts +84 -0
  15. package/dist/cjs/src/events.js +195 -0
  16. package/dist/cjs/src/index.d.ts +203 -0
  17. package/dist/cjs/src/index.js +298 -0
  18. package/dist/cjs/src/key.d.ts +152 -0
  19. package/dist/cjs/src/key.js +242 -0
  20. package/dist/{src/fido.d.ts → cjs/src/mfa.d.ts} +33 -15
  21. package/dist/cjs/src/mfa.js +169 -0
  22. package/dist/cjs/src/org.d.ts +99 -0
  23. package/dist/cjs/src/org.js +95 -0
  24. package/dist/cjs/src/paginator.d.ts +76 -0
  25. package/dist/cjs/src/paginator.js +99 -0
  26. package/dist/cjs/src/response.d.ts +101 -0
  27. package/dist/cjs/src/response.js +164 -0
  28. package/dist/cjs/src/role.d.ts +283 -0
  29. package/dist/cjs/src/role.js +253 -0
  30. package/dist/cjs/src/schema.d.ts +6209 -0
  31. package/dist/cjs/src/schema.js +7 -0
  32. package/dist/cjs/src/schema_types.d.ts +113 -0
  33. package/dist/cjs/src/schema_types.js +3 -0
  34. package/dist/cjs/src/session/session_storage.d.ts +27 -0
  35. package/dist/cjs/src/session/session_storage.js +47 -0
  36. package/dist/cjs/src/session/signer_session_manager.d.ts +125 -0
  37. package/dist/cjs/src/session/signer_session_manager.js +239 -0
  38. package/dist/cjs/src/signer_session.d.ts +41 -0
  39. package/dist/cjs/src/signer_session.js +77 -0
  40. package/dist/cjs/src/user_export.d.ts +52 -0
  41. package/dist/cjs/src/user_export.js +129 -0
  42. package/dist/cjs/src/util.d.ts +56 -0
  43. package/dist/cjs/src/util.js +86 -0
  44. package/dist/esm/package.json +41 -0
  45. package/dist/esm/spec/env/beta.json +9 -0
  46. package/dist/esm/spec/env/gamma.json +9 -0
  47. package/dist/esm/spec/env/prod.json +9 -0
  48. package/dist/esm/src/api.d.ts +634 -0
  49. package/dist/esm/src/api.js +1299 -0
  50. package/dist/esm/src/client.d.ts +575 -0
  51. package/dist/esm/src/client.js +374 -0
  52. package/dist/esm/src/env.d.ts +15 -0
  53. package/dist/esm/src/env.js +9 -0
  54. package/dist/esm/src/error.d.ts +29 -0
  55. package/dist/esm/src/error.js +31 -0
  56. package/dist/esm/src/events.d.ts +84 -0
  57. package/dist/esm/src/events.js +189 -0
  58. package/dist/esm/src/index.d.ts +203 -0
  59. package/dist/esm/src/index.js +276 -0
  60. package/dist/esm/src/key.d.ts +152 -0
  61. package/dist/esm/src/key.js +236 -0
  62. package/dist/esm/src/mfa.d.ts +94 -0
  63. package/dist/esm/src/mfa.js +163 -0
  64. package/dist/esm/src/org.d.ts +99 -0
  65. package/dist/esm/src/org.js +91 -0
  66. package/dist/esm/src/paginator.d.ts +76 -0
  67. package/dist/esm/src/paginator.js +94 -0
  68. package/dist/esm/src/response.d.ts +101 -0
  69. package/dist/esm/src/response.js +159 -0
  70. package/dist/esm/src/role.d.ts +283 -0
  71. package/dist/esm/src/role.js +248 -0
  72. package/dist/esm/src/schema.d.ts +6209 -0
  73. package/dist/esm/src/schema.js +6 -0
  74. package/dist/esm/src/schema_types.d.ts +113 -0
  75. package/dist/esm/src/schema_types.js +2 -0
  76. package/dist/esm/src/session/session_storage.d.ts +27 -0
  77. package/dist/esm/src/session/session_storage.js +43 -0
  78. package/dist/esm/src/session/signer_session_manager.d.ts +125 -0
  79. package/dist/esm/src/session/signer_session_manager.js +235 -0
  80. package/dist/esm/src/signer_session.d.ts +41 -0
  81. package/dist/esm/src/signer_session.js +72 -0
  82. package/dist/esm/src/user_export.d.ts +52 -0
  83. package/dist/esm/src/user_export.js +99 -0
  84. package/dist/esm/src/util.d.ts +56 -0
  85. package/dist/esm/src/util.js +76 -0
  86. package/dist/package.json +13 -45
  87. package/dist/src/api.d.ts +29 -1
  88. package/dist/src/api.js +66 -1
  89. package/dist/src/client.d.ts +35 -14
  90. package/dist/src/client.js +12 -8
  91. package/dist/src/events.js +1 -1
  92. package/dist/src/index.d.ts +6 -11
  93. package/dist/src/index.js +9 -25
  94. package/dist/src/key.d.ts +18 -7
  95. package/dist/src/key.js +52 -19
  96. package/dist/src/role.d.ts +46 -3
  97. package/dist/src/role.js +60 -8
  98. package/dist/src/schema.d.ts +206 -72
  99. package/dist/src/schema.js +1 -1
  100. package/dist/src/schema_types.d.ts +3 -0
  101. package/dist/src/schema_types.js +1 -1
  102. package/dist/src/session/signer_session_manager.d.ts +38 -14
  103. package/dist/src/session/signer_session_manager.js +93 -33
  104. package/dist/src/util.d.ts +14 -0
  105. package/dist/src/util.js +24 -27
  106. package/package.json +19 -46
  107. package/src/api.ts +79 -0
  108. package/src/client.ts +12 -8
  109. package/src/events.ts +2 -0
  110. package/src/index.ts +10 -24
  111. package/src/key.ts +36 -18
  112. package/src/role.ts +78 -7
  113. package/src/schema.ts +269 -110
  114. package/src/schema_types.ts +3 -0
  115. package/src/session/session_storage.ts +0 -32
  116. package/src/session/signer_session_manager.ts +124 -36
  117. package/src/util.ts +19 -10
  118. package/tsconfig.json +1 -21
  119. package/LICENSE-APACHE +0 -177
  120. package/LICENSE-MIT +0 -25
  121. package/NOTICE +0 -13
  122. package/dist/examples/ethers.d.ts +0 -1
  123. package/dist/examples/ethers.js +0 -142
  124. package/dist/src/ethers/index.d.ts +0 -95
  125. package/dist/src/ethers/index.js +0 -215
  126. package/dist/src/fido.js +0 -148
  127. package/dist/src/session/cognito_manager.d.ts +0 -71
  128. package/dist/src/session/cognito_manager.js +0 -129
  129. package/dist/src/session/generic.d.ts +0 -47
  130. package/dist/src/session/generic.js +0 -3
  131. package/dist/src/session/management_session_manager.d.ts +0 -59
  132. package/dist/src/session/management_session_manager.js +0 -111
  133. package/dist/src/session/oidc_session_manager.d.ts +0 -78
  134. package/dist/src/session/oidc_session_manager.js +0 -142
  135. package/dist/src/session/session_manager.d.ts +0 -99
  136. package/dist/src/session/session_manager.js +0 -136
  137. package/dist/src/sign.d.ts +0 -114
  138. package/dist/src/sign.js +0 -248
  139. package/dist/test/sessions.d.ts +0 -35
  140. package/dist/test/sessions.js +0 -56
  141. package/src/ethers/index.ts +0 -253
  142. package/src/session/cognito_manager.ts +0 -161
  143. package/src/session/session_manager.ts +0 -165
package/dist/src/sign.js DELETED
@@ -1,248 +0,0 @@
1
- "use strict";
2
- var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
3
- if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
4
- if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
5
- return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
6
- };
7
- var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
8
- if (kind === "m") throw new TypeError("Private method is not writable");
9
- if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
10
- if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
11
- return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
12
- };
13
- var __importDefault = (this && this.__importDefault) || function (mod) {
14
- return (mod && mod.__esModule) ? mod : { "default": mod };
15
- };
16
- var _SignResponse_cs, _SignResponse_orgId, _SignResponse_roleId, _SignResponse_signFn, _SignResponse_resp, _Sign_orgId, _Sign_ss;
17
- Object.defineProperty(exports, "__esModule", { value: true });
18
- exports.Sign = exports.SignResponse = void 0;
19
- const assert_1 = __importDefault(require("assert"));
20
- const _1 = require(".");
21
- const env_1 = require("./env");
22
- /**
23
- * A response of a signing request.
24
- */
25
- class SignResponse {
26
- /** @return {boolean} True if this signing request requires an MFA approval */
27
- requiresMfa() {
28
- return __classPrivateFieldGet(this, _SignResponse_resp, "f").accepted?.MfaRequired !== undefined;
29
- }
30
- /** @return {U} The signed data */
31
- data() {
32
- return __classPrivateFieldGet(this, _SignResponse_resp, "f");
33
- }
34
- /**
35
- * Approves the MFA request.
36
- *
37
- * Note: This only works for MFA requests that require a single approval.
38
- *
39
- * @return {SignResponse<U>} The result of signing with the approval
40
- */
41
- async approve() {
42
- const mfaRequired = __classPrivateFieldGet(this, _SignResponse_resp, "f").accepted?.MfaRequired;
43
- if (!mfaRequired) {
44
- throw new Error("Request does not require MFA approval");
45
- }
46
- const mfaId = mfaRequired.id;
47
- const mfaApproval = await _1.Role.mfaApprove(__classPrivateFieldGet(this, _SignResponse_cs, "f"), __classPrivateFieldGet(this, _SignResponse_orgId, "f"), __classPrivateFieldGet(this, _SignResponse_roleId, "f"), mfaId);
48
- (0, assert_1.default)(mfaApproval.id === mfaId);
49
- (0, assert_1.default)(mfaApproval.receipt);
50
- const mfaConf = mfaApproval.receipt?.confirmation;
51
- if (!mfaConf) {
52
- throw new Error("MfaRequest has not been approved yet");
53
- }
54
- const headers = {
55
- "x-cubist-mfa-id": mfaId,
56
- "x-cubist-mfa-confirmation": mfaConf,
57
- };
58
- return new SignResponse(__classPrivateFieldGet(this, _SignResponse_cs, "f"), __classPrivateFieldGet(this, _SignResponse_orgId, "f"), __classPrivateFieldGet(this, _SignResponse_roleId, "f"), __classPrivateFieldGet(this, _SignResponse_signFn, "f"), await __classPrivateFieldGet(this, _SignResponse_signFn, "f").call(this, headers));
59
- }
60
- // --------------------------------------------------------------------------
61
- // -- INTERNAL --------------------------------------------------------------
62
- // --------------------------------------------------------------------------
63
- /**
64
- * Constructor.
65
- *
66
- * @param {CubeSigner} cs The CubeSigner instance to use for requests
67
- * @param {string} orgId The org id of the corresponding signing request
68
- * @param {string} roleId The role id of the corresponding signing request
69
- * @param {SignFn} signFn The signing function that this response is from.
70
- * This argument is used to resend requests with
71
- * different headers if needed.
72
- * @param {U | AcceptedResponse} resp The response as returned by the OpenAPI
73
- * client.
74
- */
75
- constructor(cs, orgId, roleId, signFn, resp) {
76
- _SignResponse_cs.set(this, void 0);
77
- _SignResponse_orgId.set(this, void 0);
78
- _SignResponse_roleId.set(this, void 0);
79
- _SignResponse_signFn.set(this, void 0);
80
- _SignResponse_resp.set(this, void 0);
81
- __classPrivateFieldSet(this, _SignResponse_cs, cs, "f");
82
- __classPrivateFieldSet(this, _SignResponse_orgId, orgId, "f");
83
- __classPrivateFieldSet(this, _SignResponse_roleId, roleId, "f");
84
- __classPrivateFieldSet(this, _SignResponse_signFn, signFn, "f");
85
- __classPrivateFieldSet(this, _SignResponse_resp, resp, "f");
86
- }
87
- }
88
- exports.SignResponse = SignResponse;
89
- _SignResponse_cs = new WeakMap(), _SignResponse_orgId = new WeakMap(), _SignResponse_roleId = new WeakMap(), _SignResponse_signFn = new WeakMap(), _SignResponse_resp = new WeakMap();
90
- /**
91
- * Wrapper around sign operations.
92
- */
93
- class Sign {
94
- /**
95
- * Submit an 'eth1' sign request.
96
- * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
97
- * @param {Eth1SignRequest} req What to sign.
98
- * @return {Promise<Eth1SignResponse | AcceptedResponse>} Signature
99
- */
100
- async eth1(key, req) {
101
- const pubkey = typeof key === "string" ? key : key.materialId;
102
- const sign = async (headers) => {
103
- const resp = await (await __classPrivateFieldGet(this, _Sign_ss, "f").client()).post("/v1/org/{org_id}/eth1/sign/{pubkey}", {
104
- params: { path: { org_id: __classPrivateFieldGet(this, _Sign_orgId, "f"), pubkey } },
105
- body: req,
106
- headers: headers,
107
- parseAs: "json",
108
- });
109
- return (0, env_1.assertOk)(resp);
110
- };
111
- return new SignResponse(__classPrivateFieldGet(this, _Sign_ss, "f").cs, __classPrivateFieldGet(this, _Sign_orgId, "f"), __classPrivateFieldGet(this, _Sign_ss, "f").roleId, sign, await sign());
112
- }
113
- /**
114
- * Submit an 'eth2' sign request.
115
- * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
116
- * @param {Eth2SignRequest} req What to sign.
117
- * @return {Promise<Eth2SignResponse | AcceptedResponse>} Signature
118
- */
119
- async eth2(key, req) {
120
- const pubkey = typeof key === "string" ? key : key.materialId;
121
- const sign = async (headers) => {
122
- const resp = await (await __classPrivateFieldGet(this, _Sign_ss, "f").client()).post("/v1/org/{org_id}/eth2/sign/{pubkey}", {
123
- params: { path: { org_id: __classPrivateFieldGet(this, _Sign_orgId, "f"), pubkey } },
124
- body: req,
125
- headers: headers,
126
- parseAs: "json",
127
- });
128
- return (0, env_1.assertOk)(resp);
129
- };
130
- return new SignResponse(__classPrivateFieldGet(this, _Sign_ss, "f").cs, __classPrivateFieldGet(this, _Sign_orgId, "f"), __classPrivateFieldGet(this, _Sign_ss, "f").roleId, sign, await sign());
131
- }
132
- /**
133
- * Sign a stake request.
134
- * @param {Eth2StakeRequest} req The request to sign.
135
- * @return {Promise<Eth2StakeResponse | AcceptedResponse>} The response.
136
- */
137
- async stake(req) {
138
- const sign = async (headers) => {
139
- const resp = await (await __classPrivateFieldGet(this, _Sign_ss, "f").client()).post("/v1/org/{org_id}/eth2/stake", {
140
- params: { path: { org_id: __classPrivateFieldGet(this, _Sign_orgId, "f") } },
141
- body: req,
142
- headers: headers,
143
- parseAs: "json",
144
- });
145
- return (0, env_1.assertOk)(resp);
146
- };
147
- return new SignResponse(__classPrivateFieldGet(this, _Sign_ss, "f").cs, __classPrivateFieldGet(this, _Sign_orgId, "f"), __classPrivateFieldGet(this, _Sign_ss, "f").roleId, sign, await sign());
148
- }
149
- /**
150
- * Sign an unstake request.
151
- * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
152
- * @param {Eth2UnstakeRequest} req The request to sign.
153
- * @return {Promise<Eth2UnstakeResponse | AcceptedResponse>} The response.
154
- */
155
- async unstake(key, req) {
156
- const pubkey = typeof key === "string" ? key : key.materialId;
157
- const sign = async (headers) => {
158
- const resp = await (await __classPrivateFieldGet(this, _Sign_ss, "f").client()).post("/v1/org/{org_id}/eth2/unstake/{pubkey}", {
159
- params: { path: { org_id: __classPrivateFieldGet(this, _Sign_orgId, "f"), pubkey } },
160
- body: req,
161
- headers: headers,
162
- parseAs: "json",
163
- });
164
- return (0, env_1.assertOk)(resp);
165
- };
166
- return new SignResponse(__classPrivateFieldGet(this, _Sign_ss, "f").cs, __classPrivateFieldGet(this, _Sign_orgId, "f"), __classPrivateFieldGet(this, _Sign_ss, "f").roleId, sign, await sign());
167
- }
168
- /**
169
- * Sign a raw blob.
170
- * @param {Key | string} key The key to sign with (either {@link Key} or its ID).
171
- * @param {BlobSignRequest} req What to sign
172
- * @return {Promise<BlobSignResponse | AcceptedResponse>} The response.
173
- */
174
- async blob(key, req) {
175
- const key_id = typeof key === "string" ? key : key.id;
176
- const sign = async (headers) => {
177
- const resp = await (await __classPrivateFieldGet(this, _Sign_ss, "f").client()).post("/v1/org/{org_id}/blob/sign/{key_id}", {
178
- params: {
179
- path: { org_id: __classPrivateFieldGet(this, _Sign_orgId, "f"), key_id },
180
- },
181
- body: req,
182
- headers: headers,
183
- parseAs: "json",
184
- });
185
- return (0, env_1.assertOk)(resp);
186
- };
187
- return new SignResponse(__classPrivateFieldGet(this, _Sign_ss, "f").cs, __classPrivateFieldGet(this, _Sign_orgId, "f"), __classPrivateFieldGet(this, _Sign_ss, "f").roleId, sign, await sign());
188
- }
189
- /**
190
- * Sign a bitcoin message.
191
- * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
192
- * @param {BtcSignRequest} req What to sign
193
- * @return {Promise<BtcSignResponse | AcceptedResponse>} The response.
194
- */
195
- async btc(key, req) {
196
- const pubkey = typeof key === "string" ? key : key.materialId;
197
- const sign = async (headers) => {
198
- const resp = await (await __classPrivateFieldGet(this, _Sign_ss, "f").client()).post("/v0/org/{org_id}/btc/sign/{pubkey}", {
199
- params: {
200
- path: { org_id: __classPrivateFieldGet(this, _Sign_orgId, "f"), pubkey },
201
- },
202
- body: req,
203
- headers: headers,
204
- parseAs: "json",
205
- });
206
- return (0, env_1.assertOk)(resp);
207
- };
208
- return new SignResponse(__classPrivateFieldGet(this, _Sign_ss, "f").cs, __classPrivateFieldGet(this, _Sign_orgId, "f"), __classPrivateFieldGet(this, _Sign_ss, "f").roleId, sign, await sign());
209
- }
210
- /**
211
- * Sign a solana message.
212
- * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
213
- * @param {SolanaSignRequest} req What to sign
214
- * @return {Promise<SolanaSignResponse | AcceptedResponse>} The response.
215
- */
216
- async solana(key, req) {
217
- const pubkey = typeof key === "string" ? key : key.materialId;
218
- const sign = async (headers) => {
219
- const resp = await (await __classPrivateFieldGet(this, _Sign_ss, "f").client()).post("/v1/org/{org_id}/solana/sign/{pubkey}", {
220
- params: { path: { org_id: __classPrivateFieldGet(this, _Sign_orgId, "f"), pubkey } },
221
- body: req,
222
- headers: headers,
223
- parseAs: "json",
224
- });
225
- return (0, env_1.assertOk)(resp);
226
- };
227
- return new SignResponse(__classPrivateFieldGet(this, _Sign_ss, "f").cs, __classPrivateFieldGet(this, _Sign_orgId, "f"), __classPrivateFieldGet(this, _Sign_ss, "f").roleId, sign, await sign());
228
- }
229
- // --------------------------------------------------------------------------
230
- // -- INTERNAL --------------------------------------------------------------
231
- // --------------------------------------------------------------------------
232
- /* eslint-disable require-jsdoc */
233
- /**
234
- * Constructor.
235
- *
236
- * @param {string} orgId Organization ID
237
- * @param {SignerSession} ss The signer session to use for signing requests
238
- */
239
- constructor(orgId, ss) {
240
- _Sign_orgId.set(this, void 0);
241
- _Sign_ss.set(this, void 0);
242
- __classPrivateFieldSet(this, _Sign_orgId, orgId, "f");
243
- __classPrivateFieldSet(this, _Sign_ss, ss, "f");
244
- }
245
- }
246
- exports.Sign = Sign;
247
- _Sign_orgId = new WeakMap(), _Sign_ss = new WeakMap();
248
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"sign.js","sourceRoot":"","sources":["../../src/sign.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;AAAA,oDAA4B;AAC5B,wBAAyD;AAEzD,+BAAiC;AA0CjC;;GAEG;AACH,MAAa,YAAY;IAOvB,8EAA8E;IAC9E,WAAW;QACT,OAAQ,uBAAA,IAAI,0BAA2B,CAAC,QAAQ,EAAE,WAAW,KAAK,SAAS,CAAC;IAC9E,CAAC;IAED,kCAAkC;IAClC,IAAI;QACF,OAAO,uBAAA,IAAI,0BAAW,CAAC;IACzB,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,WAAW,GAAI,uBAAA,IAAI,0BAA2B,CAAC,QAAQ,EAAE,WAAW,CAAC;QAC3E,IAAI,CAAC,WAAW,EAAE;YAChB,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;SAC1D;QAED,MAAM,KAAK,GAAG,WAAW,CAAC,EAAE,CAAC;QAC7B,MAAM,WAAW,GAAG,MAAM,OAAI,CAAC,UAAU,CAAC,uBAAA,IAAI,wBAAI,EAAE,uBAAA,IAAI,2BAAO,EAAE,uBAAA,IAAI,4BAAQ,EAAE,KAAK,CAAC,CAAC;QACtF,IAAA,gBAAM,EAAC,WAAW,CAAC,EAAE,KAAK,KAAK,CAAC,CAAC;QACjC,IAAA,gBAAM,EAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE5B,MAAM,OAAO,GAAG,WAAW,CAAC,OAAO,EAAE,YAAY,CAAC;QAClD,IAAI,CAAC,OAAO,EAAE;YACZ,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;SACzD;QAED,MAAM,OAAO,GAAG;YACd,iBAAiB,EAAE,KAAK;YACxB,2BAA2B,EAAE,OAAO;SACrC,CAAC;QACF,OAAO,IAAI,YAAY,CACrB,uBAAA,IAAI,wBAAI,EACR,uBAAA,IAAI,2BAAO,EACX,uBAAA,IAAI,4BAAQ,EACZ,uBAAA,IAAI,4BAAQ,EACZ,MAAM,uBAAA,IAAI,4BAAQ,MAAZ,IAAI,EAAS,OAAO,CAAC,CAC5B,CAAC;IACJ,CAAC;IAED,6EAA6E;IAC7E,6EAA6E;IAC7E,6EAA6E;IAE7E;;;;;;;;;;;OAWG;IACH,YACE,EAAc,EACd,KAAa,EACb,MAAc,EACd,MAAiB,EACjB,IAA0B;QAzEnB,mCAAgB;QAChB,sCAAe;QACf,uCAAgB;QAChB,uCAAmB;QACnB,qCAA4B;QAuEnC,uBAAA,IAAI,oBAAO,EAAE,MAAA,CAAC;QACd,uBAAA,IAAI,uBAAU,KAAK,MAAA,CAAC;QACpB,uBAAA,IAAI,wBAAW,MAAM,MAAA,CAAC;QACtB,uBAAA,IAAI,wBAAW,MAAM,MAAA,CAAC;QACtB,uBAAA,IAAI,sBAAS,IAAI,MAAA,CAAC;IACpB,CAAC;CACF;AAlFD,oCAkFC;;AAED;;GAEG;AACH,MAAa,IAAI;IAIf;;;;;OAKG;IACH,KAAK,CAAC,IAAI,CAAC,GAAiB,EAAE,GAAoB;QAChD,MAAM,MAAM,GAAG,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC,CAAE,GAAc,CAAC,CAAC,CAAC,GAAG,CAAC,UAAU,CAAC;QAC1E,MAAM,IAAI,GAAG,KAAK,EAAE,OAAqB,EAAE,EAAE;YAC3C,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,CACxB,CAAC,IAAI,CAAC,qCAAqC,EAAE;gBAC5C,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,uBAAA,IAAI,mBAAO,EAAE,MAAM,EAAE,EAAE;gBACjD,IAAI,EAAE,GAAG;gBACT,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,MAAM;aAChB,CAAC,CAAC;YACH,OAAO,IAAA,cAAQ,EAAC,IAAI,CAAC,CAAC;QACxB,CAAC,CAAC;QACF,OAAO,IAAI,YAAY,CAAC,uBAAA,IAAI,gBAAI,CAAC,EAAE,EAAE,uBAAA,IAAI,mBAAO,EAAE,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,IAAI,EAAE,MAAM,IAAI,EAAE,CAAC,CAAC;IACzF,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,IAAI,CAAC,GAAiB,EAAE,GAAoB;QAChD,MAAM,MAAM,GAAG,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC,CAAE,GAAc,CAAC,CAAC,CAAC,GAAG,CAAC,UAAU,CAAC;QAC1E,MAAM,IAAI,GAAG,KAAK,EAAE,OAAqB,EAAE,EAAE;YAC3C,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,CACxB,CAAC,IAAI,CAAC,qCAAqC,EAAE;gBAC5C,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,uBAAA,IAAI,mBAAO,EAAE,MAAM,EAAE,EAAE;gBACjD,IAAI,EAAE,GAAG;gBACT,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,MAAM;aAChB,CAAC,CAAC;YACH,OAAO,IAAA,cAAQ,EAAC,IAAI,CAAC,CAAC;QACxB,CAAC,CAAC;QACF,OAAO,IAAI,YAAY,CAAC,uBAAA,IAAI,gBAAI,CAAC,EAAE,EAAE,uBAAA,IAAI,mBAAO,EAAE,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,IAAI,EAAE,MAAM,IAAI,EAAE,CAAC,CAAC;IACzF,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,KAAK,CAAC,GAAqB;QAC/B,MAAM,IAAI,GAAG,KAAK,EAAE,OAAqB,EAAE,EAAE;YAC3C,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,CACxB,CAAC,IAAI,CAAC,6BAA6B,EAAE;gBACpC,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,uBAAA,IAAI,mBAAO,EAAE,EAAE;gBACzC,IAAI,EAAE,GAAG;gBACT,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,MAAM;aAChB,CAAC,CAAC;YACH,OAAO,IAAA,cAAQ,EAAC,IAAI,CAAC,CAAC;QACxB,CAAC,CAAC;QACF,OAAO,IAAI,YAAY,CAAC,uBAAA,IAAI,gBAAI,CAAC,EAAE,EAAE,uBAAA,IAAI,mBAAO,EAAE,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,IAAI,EAAE,MAAM,IAAI,EAAE,CAAC,CAAC;IACzF,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,OAAO,CACX,GAAiB,EACjB,GAAuB;QAEvB,MAAM,MAAM,GAAG,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC,CAAE,GAAc,CAAC,CAAC,CAAC,GAAG,CAAC,UAAU,CAAC;QAC1E,MAAM,IAAI,GAAG,KAAK,EAAE,OAAqB,EAAE,EAAE;YAC3C,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,CACxB,CAAC,IAAI,CAAC,wCAAwC,EAAE;gBAC/C,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,uBAAA,IAAI,mBAAO,EAAE,MAAM,EAAE,EAAE;gBACjD,IAAI,EAAE,GAAG;gBACT,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,MAAM;aAChB,CAAC,CAAC;YACH,OAAO,IAAA,cAAQ,EAAC,IAAI,CAAC,CAAC;QACxB,CAAC,CAAC;QACF,OAAO,IAAI,YAAY,CAAC,uBAAA,IAAI,gBAAI,CAAC,EAAE,EAAE,uBAAA,IAAI,mBAAO,EAAE,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,IAAI,EAAE,MAAM,IAAI,EAAE,CAAC,CAAC;IACzF,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,IAAI,CAAC,GAAiB,EAAE,GAAoB;QAChD,MAAM,MAAM,GAAG,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC,CAAE,GAAc,CAAC,CAAC,CAAC,GAAG,CAAC,EAAE,CAAC;QAClE,MAAM,IAAI,GAAG,KAAK,EAAE,OAAqB,EAAE,EAAE;YAC3C,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,CACxB,CAAC,IAAI,CAAC,qCAAqC,EAAE;gBAC5C,MAAM,EAAE;oBACN,IAAI,EAAE,EAAE,MAAM,EAAE,uBAAA,IAAI,mBAAO,EAAE,MAAM,EAAE;iBACtC;gBACD,IAAI,EAAE,GAAG;gBACT,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,MAAM;aAChB,CAAC,CAAC;YACH,OAAO,IAAA,cAAQ,EAAC,IAAI,CAAC,CAAC;QACxB,CAAC,CAAC;QACF,OAAO,IAAI,YAAY,CAAC,uBAAA,IAAI,gBAAI,CAAC,EAAE,EAAE,uBAAA,IAAI,mBAAO,EAAE,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,IAAI,EAAE,MAAM,IAAI,EAAE,CAAC,CAAC;IACzF,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,GAAG,CAAC,GAAiB,EAAE,GAAmB;QAC9C,MAAM,MAAM,GAAG,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC,CAAE,GAAc,CAAC,CAAC,CAAC,GAAG,CAAC,UAAU,CAAC;QAC1E,MAAM,IAAI,GAAG,KAAK,EAAE,OAAqB,EAAE,EAAE;YAC3C,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,CACxB,CAAC,IAAI,CAAC,oCAAoC,EAAE;gBAC3C,MAAM,EAAE;oBACN,IAAI,EAAE,EAAE,MAAM,EAAE,uBAAA,IAAI,mBAAO,EAAE,MAAM,EAAE;iBACtC;gBACD,IAAI,EAAE,GAAG;gBACT,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,MAAM;aAChB,CAAC,CAAC;YACH,OAAO,IAAA,cAAQ,EAAC,IAAI,CAAC,CAAC;QACxB,CAAC,CAAC;QACF,OAAO,IAAI,YAAY,CAAC,uBAAA,IAAI,gBAAI,CAAC,EAAE,EAAE,uBAAA,IAAI,mBAAO,EAAE,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,IAAI,EAAE,MAAM,IAAI,EAAE,CAAC,CAAC;IACzF,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,MAAM,CACV,GAAiB,EACjB,GAAsB;QAEtB,MAAM,MAAM,GAAG,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC,CAAE,GAAc,CAAC,CAAC,CAAC,GAAG,CAAC,UAAU,CAAC;QAC1E,MAAM,IAAI,GAAG,KAAK,EAAE,OAAqB,EAAE,EAAE;YAC3C,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,CACxB,CAAC,IAAI,CAAC,uCAAuC,EAAE;gBAC9C,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,uBAAA,IAAI,mBAAO,EAAE,MAAM,EAAE,EAAE;gBACjD,IAAI,EAAE,GAAG;gBACT,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,MAAM;aAChB,CAAC,CAAC;YACH,OAAO,IAAA,cAAQ,EAAC,IAAI,CAAC,CAAC;QACxB,CAAC,CAAC;QACF,OAAO,IAAI,YAAY,CAAC,uBAAA,IAAI,gBAAI,CAAC,EAAE,EAAE,uBAAA,IAAI,mBAAO,EAAE,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,IAAI,EAAE,MAAM,IAAI,EAAE,CAAC,CAAC;IACzF,CAAC;IAED,6EAA6E;IAC7E,6EAA6E;IAC7E,6EAA6E;IAE7E,kCAAkC;IAElC;;;;;OAKG;IACH,YAAY,KAAa,EAAE,EAAiB;QAjLnC,8BAAe;QACf,2BAAmB;QAiL1B,uBAAA,IAAI,eAAU,KAAK,MAAA,CAAC;QACpB,uBAAA,IAAI,YAAO,EAAE,MAAA,CAAC;IAChB,CAAC;CACF;AAtLD,oBAsLC","sourcesContent":["import assert from \"assert\";\nimport { CubeSigner, Key, Role, SignerSession } from \".\";\nimport { components, paths } from \"./client\";\nimport { assertOk } from \"./env\";\n\n/* eslint-disable */\nexport type Eth1SignRequest =\n  paths[\"/v1/org/{org_id}/eth1/sign/{pubkey}\"][\"post\"][\"requestBody\"][\"content\"][\"application/json\"];\nexport type Eth2SignRequest =\n  paths[\"/v1/org/{org_id}/eth2/sign/{pubkey}\"][\"post\"][\"requestBody\"][\"content\"][\"application/json\"];\nexport type Eth2StakeRequest =\n  paths[\"/v1/org/{org_id}/eth2/stake\"][\"post\"][\"requestBody\"][\"content\"][\"application/json\"];\nexport type Eth2UnstakeRequest =\n  paths[\"/v1/org/{org_id}/eth2/unstake/{pubkey}\"][\"post\"][\"requestBody\"][\"content\"][\"application/json\"];\nexport type BlobSignRequest =\n  paths[\"/v1/org/{org_id}/blob/sign/{key_id}\"][\"post\"][\"requestBody\"][\"content\"][\"application/json\"];\nexport type BtcSignRequest =\n  paths[\"/v0/org/{org_id}/btc/sign/{pubkey}\"][\"post\"][\"requestBody\"][\"content\"][\"application/json\"];\nexport type SolanaSignRequest =\n  paths[\"/v1/org/{org_id}/solana/sign/{pubkey}\"][\"post\"][\"requestBody\"][\"content\"][\"application/json\"];\n\nexport type Eth1SignResponse =\n  components[\"responses\"][\"Eth1SignResponse\"][\"content\"][\"application/json\"];\nexport type Eth2SignResponse =\n  components[\"responses\"][\"Eth2SignResponse\"][\"content\"][\"application/json\"];\nexport type Eth2StakeResponse =\n  components[\"responses\"][\"StakeResponse\"][\"content\"][\"application/json\"];\nexport type Eth2UnstakeResponse =\n  components[\"responses\"][\"UnstakeResponse\"][\"content\"][\"application/json\"];\nexport type BlobSignResponse =\n  components[\"responses\"][\"BlobSignResponse\"][\"content\"][\"application/json\"];\nexport type BtcSignResponse =\n  components[\"responses\"][\"BtcSignResponse\"][\"content\"][\"application/json\"];\nexport type SolanaSignResponse =\n  components[\"responses\"][\"SolanaSignResponse\"][\"content\"][\"application/json\"];\nexport type MfaRequestInfo =\n  components[\"responses\"][\"MfaRequestInfo\"][\"content\"][\"application/json\"];\n\nexport type AcceptedResponse = components[\"schemas\"][\"AcceptedResponse\"];\nexport type ErrorResponse = components[\"schemas\"][\"ErrorResponse\"];\nexport type BtcSignatureKind = components[\"schemas\"][\"BtcSignatureKind\"];\n/* eslint-enable */\n\ntype SignFn<U> = (headers?: HeadersInit) => Promise<U | AcceptedResponse>;\n\n/**\n * A response of a signing request.\n */\nexport class SignResponse<U> {\n  readonly #cs: CubeSigner;\n  readonly #orgId: string;\n  readonly #roleId: string;\n  readonly #signFn: SignFn<U>;\n  readonly #resp: U | AcceptedResponse;\n\n  /** @return {boolean} True if this signing request requires an MFA approval */\n  requiresMfa(): boolean {\n    return (this.#resp as AcceptedResponse).accepted?.MfaRequired !== undefined;\n  }\n\n  /** @return {U} The signed data */\n  data(): U {\n    return this.#resp as U;\n  }\n\n  /**\n   * Approves the MFA request.\n   *\n   * Note: This only works for MFA requests that require a single approval.\n   *\n   * @return {SignResponse<U>} The result of signing with the approval\n   */\n  async approve(): Promise<SignResponse<U>> {\n    const mfaRequired = (this.#resp as AcceptedResponse).accepted?.MfaRequired;\n    if (!mfaRequired) {\n      throw new Error(\"Request does not require MFA approval\");\n    }\n\n    const mfaId = mfaRequired.id;\n    const mfaApproval = await Role.mfaApprove(this.#cs, this.#orgId, this.#roleId, mfaId);\n    assert(mfaApproval.id === mfaId);\n    assert(mfaApproval.receipt);\n\n    const mfaConf = mfaApproval.receipt?.confirmation;\n    if (!mfaConf) {\n      throw new Error(\"MfaRequest has not been approved yet\");\n    }\n\n    const headers = {\n      \"x-cubist-mfa-id\": mfaId,\n      \"x-cubist-mfa-confirmation\": mfaConf,\n    };\n    return new SignResponse(\n      this.#cs,\n      this.#orgId,\n      this.#roleId,\n      this.#signFn,\n      await this.#signFn(headers),\n    );\n  }\n\n  // --------------------------------------------------------------------------\n  // -- INTERNAL --------------------------------------------------------------\n  // --------------------------------------------------------------------------\n\n  /**\n   * Constructor.\n   *\n   * @param {CubeSigner} cs The CubeSigner instance to use for requests\n   * @param {string} orgId The org id of the corresponding signing request\n   * @param {string} roleId The role id of the corresponding signing request\n   * @param {SignFn} signFn The signing function that this response is from.\n   *                        This argument is used to resend requests with\n   *                        different headers if needed.\n   * @param {U | AcceptedResponse} resp The response as returned by the OpenAPI\n   *                                    client.\n   */\n  constructor(\n    cs: CubeSigner,\n    orgId: string,\n    roleId: string,\n    signFn: SignFn<U>,\n    resp: U | AcceptedResponse,\n  ) {\n    this.#cs = cs;\n    this.#orgId = orgId;\n    this.#roleId = roleId;\n    this.#signFn = signFn;\n    this.#resp = resp;\n  }\n}\n\n/**\n * Wrapper around sign operations.\n */\nexport class Sign {\n  readonly #orgId: string;\n  readonly #ss: SignerSession;\n\n  /**\n   * Submit an 'eth1' sign request.\n   * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).\n   * @param {Eth1SignRequest} req What to sign.\n   * @return {Promise<Eth1SignResponse | AcceptedResponse>} Signature\n   */\n  async eth1(key: Key | string, req: Eth1SignRequest): Promise<SignResponse<Eth1SignResponse>> {\n    const pubkey = typeof key === \"string\" ? (key as string) : key.materialId;\n    const sign = async (headers?: HeadersInit) => {\n      const resp = await (\n        await this.#ss.client()\n      ).post(\"/v1/org/{org_id}/eth1/sign/{pubkey}\", {\n        params: { path: { org_id: this.#orgId, pubkey } },\n        body: req,\n        headers: headers,\n        parseAs: \"json\",\n      });\n      return assertOk(resp);\n    };\n    return new SignResponse(this.#ss.cs, this.#orgId, this.#ss.roleId, sign, await sign());\n  }\n\n  /**\n   * Submit an 'eth2' sign request.\n   * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).\n   * @param {Eth2SignRequest} req What to sign.\n   * @return {Promise<Eth2SignResponse | AcceptedResponse>} Signature\n   */\n  async eth2(key: Key | string, req: Eth2SignRequest): Promise<SignResponse<Eth2SignResponse>> {\n    const pubkey = typeof key === \"string\" ? (key as string) : key.materialId;\n    const sign = async (headers?: HeadersInit) => {\n      const resp = await (\n        await this.#ss.client()\n      ).post(\"/v1/org/{org_id}/eth2/sign/{pubkey}\", {\n        params: { path: { org_id: this.#orgId, pubkey } },\n        body: req,\n        headers: headers,\n        parseAs: \"json\",\n      });\n      return assertOk(resp);\n    };\n    return new SignResponse(this.#ss.cs, this.#orgId, this.#ss.roleId, sign, await sign());\n  }\n\n  /**\n   * Sign a stake request.\n   * @param {Eth2StakeRequest} req The request to sign.\n   * @return {Promise<Eth2StakeResponse | AcceptedResponse>} The response.\n   */\n  async stake(req: Eth2StakeRequest): Promise<SignResponse<Eth2StakeResponse>> {\n    const sign = async (headers?: HeadersInit) => {\n      const resp = await (\n        await this.#ss.client()\n      ).post(\"/v1/org/{org_id}/eth2/stake\", {\n        params: { path: { org_id: this.#orgId } },\n        body: req,\n        headers: headers,\n        parseAs: \"json\",\n      });\n      return assertOk(resp);\n    };\n    return new SignResponse(this.#ss.cs, this.#orgId, this.#ss.roleId, sign, await sign());\n  }\n\n  /**\n   * Sign an unstake request.\n   * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).\n   * @param {Eth2UnstakeRequest} req The request to sign.\n   * @return {Promise<Eth2UnstakeResponse | AcceptedResponse>} The response.\n   */\n  async unstake(\n    key: Key | string,\n    req: Eth2UnstakeRequest,\n  ): Promise<SignResponse<Eth2UnstakeResponse>> {\n    const pubkey = typeof key === \"string\" ? (key as string) : key.materialId;\n    const sign = async (headers?: HeadersInit) => {\n      const resp = await (\n        await this.#ss.client()\n      ).post(\"/v1/org/{org_id}/eth2/unstake/{pubkey}\", {\n        params: { path: { org_id: this.#orgId, pubkey } },\n        body: req,\n        headers: headers,\n        parseAs: \"json\",\n      });\n      return assertOk(resp);\n    };\n    return new SignResponse(this.#ss.cs, this.#orgId, this.#ss.roleId, sign, await sign());\n  }\n\n  /**\n   * Sign a raw blob.\n   * @param {Key | string} key The key to sign with (either {@link Key} or its ID).\n   * @param {BlobSignRequest} req What to sign\n   * @return {Promise<BlobSignResponse | AcceptedResponse>} The response.\n   */\n  async blob(key: Key | string, req: BlobSignRequest): Promise<SignResponse<BlobSignResponse>> {\n    const key_id = typeof key === \"string\" ? (key as string) : key.id;\n    const sign = async (headers?: HeadersInit) => {\n      const resp = await (\n        await this.#ss.client()\n      ).post(\"/v1/org/{org_id}/blob/sign/{key_id}\", {\n        params: {\n          path: { org_id: this.#orgId, key_id },\n        },\n        body: req,\n        headers: headers,\n        parseAs: \"json\",\n      });\n      return assertOk(resp);\n    };\n    return new SignResponse(this.#ss.cs, this.#orgId, this.#ss.roleId, sign, await sign());\n  }\n\n  /**\n   * Sign a bitcoin message.\n   * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).\n   * @param {BtcSignRequest} req What to sign\n   * @return {Promise<BtcSignResponse | AcceptedResponse>} The response.\n   */\n  async btc(key: Key | string, req: BtcSignRequest): Promise<SignResponse<BtcSignResponse>> {\n    const pubkey = typeof key === \"string\" ? (key as string) : key.materialId;\n    const sign = async (headers?: HeadersInit) => {\n      const resp = await (\n        await this.#ss.client()\n      ).post(\"/v0/org/{org_id}/btc/sign/{pubkey}\", {\n        params: {\n          path: { org_id: this.#orgId, pubkey },\n        },\n        body: req,\n        headers: headers,\n        parseAs: \"json\",\n      });\n      return assertOk(resp);\n    };\n    return new SignResponse(this.#ss.cs, this.#orgId, this.#ss.roleId, sign, await sign());\n  }\n\n  /**\n   * Sign a solana message.\n   * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).\n   * @param {SolanaSignRequest} req What to sign\n   * @return {Promise<SolanaSignResponse | AcceptedResponse>} The response.\n   */\n  async solana(\n    key: Key | string,\n    req: SolanaSignRequest,\n  ): Promise<SignResponse<SolanaSignResponse>> {\n    const pubkey = typeof key === \"string\" ? (key as string) : key.materialId;\n    const sign = async (headers?: HeadersInit) => {\n      const resp = await (\n        await this.#ss.client()\n      ).post(\"/v1/org/{org_id}/solana/sign/{pubkey}\", {\n        params: { path: { org_id: this.#orgId, pubkey } },\n        body: req,\n        headers: headers,\n        parseAs: \"json\",\n      });\n      return assertOk(resp);\n    };\n    return new SignResponse(this.#ss.cs, this.#orgId, this.#ss.roleId, sign, await sign());\n  }\n\n  // --------------------------------------------------------------------------\n  // -- INTERNAL --------------------------------------------------------------\n  // --------------------------------------------------------------------------\n\n  /* eslint-disable require-jsdoc */\n\n  /**\n   * Constructor.\n   *\n   * @param {string} orgId Organization ID\n   * @param {SignerSession} ss The signer session to use for signing requests\n   */\n  constructor(orgId: string, ss: SignerSession) {\n    this.#orgId = orgId;\n    this.#ss = ss;\n  }\n}\n"]}
@@ -1,35 +0,0 @@
1
- import { EnvInterface } from "../src/env";
2
- /**
3
- * Defaults.
4
- */
5
- export declare class CubeSignerDefaults {
6
- /** Default signer-session.json file path
7
- * @return {string} Default signer-session.json file path
8
- */
9
- static signerSessionFile(): string;
10
- /** Default management-session.json file path
11
- * @return {string} Default management-session.json file path
12
- */
13
- static managementSessionFile(): string;
14
- }
15
- /** JSON representation of our "management session" file format */
16
- export interface ManagementSession {
17
- email: string;
18
- id_token: string;
19
- access_token: string;
20
- refresh_token: string;
21
- expiration: string;
22
- env: {
23
- ["Dev-CubeSignerStack"]: EnvInterface;
24
- };
25
- }
26
- /** JSON representation of our "signer session" file format */
27
- export interface SignerSession {
28
- org_id: string;
29
- role_id: string;
30
- purpose: string;
31
- token: string;
32
- env: {
33
- ["Dev-CubeSignerStack"]: EnvInterface;
34
- };
35
- }
@@ -1,56 +0,0 @@
1
- "use strict";
2
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
- if (k2 === undefined) k2 = k;
4
- var desc = Object.getOwnPropertyDescriptor(m, k);
5
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
- desc = { enumerable: true, get: function() { return m[k]; } };
7
- }
8
- Object.defineProperty(o, k2, desc);
9
- }) : (function(o, m, k, k2) {
10
- if (k2 === undefined) k2 = k;
11
- o[k2] = m[k];
12
- }));
13
- var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
- Object.defineProperty(o, "default", { enumerable: true, value: v });
15
- }) : function(o, v) {
16
- o["default"] = v;
17
- });
18
- var __importStar = (this && this.__importStar) || function (mod) {
19
- if (mod && mod.__esModule) return mod;
20
- var result = {};
21
- if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
- __setModuleDefault(result, mod);
23
- return result;
24
- };
25
- Object.defineProperty(exports, "__esModule", { value: true });
26
- exports.CubeSignerDefaults = void 0;
27
- const path = __importStar(require("path"));
28
- /**
29
- * Directory where CubeSigner stores config files.
30
- * @return {string} Config dir
31
- */
32
- function configDir() {
33
- const configDir = process.platform === "darwin"
34
- ? `${process.env.HOME}/Library/Application Support`
35
- : `${process.env.HOME}/.config`;
36
- return path.join(configDir, "cubesigner");
37
- }
38
- /**
39
- * Defaults.
40
- */
41
- class CubeSignerDefaults {
42
- /** Default signer-session.json file path
43
- * @return {string} Default signer-session.json file path
44
- */
45
- static signerSessionFile() {
46
- return path.join(configDir(), "signer-session.json");
47
- }
48
- /** Default management-session.json file path
49
- * @return {string} Default management-session.json file path
50
- */
51
- static managementSessionFile() {
52
- return path.join(configDir(), "management-session.json");
53
- }
54
- }
55
- exports.CubeSignerDefaults = CubeSignerDefaults;
56
- //# sourceMappingURL=data:application/json;base64,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
@@ -1,253 +0,0 @@
1
- import {
2
- JsonRpcApiProvider,
3
- TypedDataDomain,
4
- TypedDataEncoder,
5
- TypedDataField,
6
- ethers,
7
- getBytes,
8
- toBeHex,
9
- } from "ethers";
10
- import { SignerSession } from "../signer_session";
11
- import { CubeSignerResponse } from "../response";
12
- import { BlobSignRequest, EvmSignRequest, MfaRequestInfo } from "../schema_types";
13
- import { KeyInfo } from "../key";
14
- import assert from "assert";
15
-
16
- /** Options for the signer */
17
- interface SignerOptions {
18
- /** Optional provider to use */
19
- provider?: null | ethers.Provider;
20
- /**
21
- * The function to call when MFA information is retrieved. If this callback
22
- * throws, no transaction is broadcast.
23
- */
24
- onMfaPoll?: (arg0: MfaRequestInfo) => void;
25
- /**
26
- * The amount of time (in milliseconds) to wait between checks for MFA
27
- * updates. Default is 1000ms
28
- */
29
- mfaPollIntervalMs?: number;
30
- }
31
-
32
- /**
33
- * A ethers.js Signer using CubeSigner
34
- */
35
- export class Signer extends ethers.AbstractSigner {
36
- /** The address of the account */
37
- readonly #address: string;
38
-
39
- /** The key to use for signing */
40
- #key?: KeyInfo;
41
-
42
- /** The underlying session */
43
- readonly #signerSession: SignerSession;
44
-
45
- /**
46
- * The function to call when MFA information is retrieved. If this callback
47
- * throws, no transaction is broadcast.
48
- */
49
- readonly #onMfaPoll: (arg0: MfaRequestInfo) => void;
50
-
51
- /** The amount of time to wait between checks for MFA updates */
52
- readonly #mfaPollIntervalMs: number;
53
-
54
- /**
55
- * Create new Signer instance
56
- * @param {KeyInfo | string} address The key or the eth address of the account to use.
57
- * @param {SignerSession} signerSession The underlying Signer session.
58
- * @param {SignerOptions} options The options to use for the Signer instance
59
- */
60
- constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions) {
61
- super(options?.provider);
62
- if (typeof address === "string") {
63
- this.#address = address;
64
- } else {
65
- this.#address = address.materialId;
66
- this.#key = address as KeyInfo;
67
- }
68
- this.#signerSession = signerSession;
69
- this.#onMfaPoll = options?.onMfaPoll ?? ((/* _mfaInfo: MfaRequestInfo */) => {}); // eslint-disable-line @typescript-eslint/no-empty-function
70
- this.#mfaPollIntervalMs = options?.mfaPollIntervalMs ?? 1000;
71
- }
72
-
73
- /** Resolves to the signer address. */
74
- async getAddress(): Promise<string> {
75
- return this.#address;
76
- }
77
-
78
- /**
79
- * Returns the signer connected to %%provider%%.
80
- * @param {null | ethers.Provider} provider The optional provider instance to use.
81
- * @return {Signer} The signer connected to signer.
82
- */
83
- connect(provider: null | ethers.Provider): Signer {
84
- return new Signer(this.#address, this.#signerSession, { provider });
85
- }
86
-
87
- /**
88
- * Construct a signing request from a transaction. This populates the transaction
89
- * type to `0x02` (EIP-1559) unless set.
90
- *
91
- * @param {ethers.TransactionRequest} tx The transaction
92
- * @return {EvmSignRequest} The EVM sign request to be sent to CubeSigner
93
- */
94
- async evmSignRequestFromTx(tx: ethers.TransactionRequest): Promise<EvmSignRequest> {
95
- // get the chain id from the network or tx
96
- let chainId = tx.chainId;
97
- if (chainId === undefined) {
98
- const network = await this.provider?.getNetwork();
99
- chainId = network?.chainId?.toString() ?? "1";
100
- }
101
-
102
- // Convert the transaction into a JSON-RPC transaction
103
- const rpcTx =
104
- this.provider instanceof JsonRpcApiProvider
105
- ? this.provider.getRpcTransaction(tx)
106
- : // We can just call the getRpcTransaction with a
107
- // null receiver since it doesn't actually use it
108
- // (and really should be declared static).
109
- JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);
110
- rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]
111
-
112
- return <EvmSignRequest>{
113
- chain_id: Number(chainId),
114
- tx: rpcTx,
115
- };
116
- }
117
-
118
- /**
119
- * Sign a transaction. This method will block if the key requires MFA approval.
120
- * @param {ethers.TransactionRequest} tx The transaction to sign.
121
- * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
122
- */
123
- async signTransaction(tx: ethers.TransactionRequest): Promise<string> {
124
- const req = await this.evmSignRequestFromTx(tx);
125
- const res = await this.#signerSession.signEvm(this.#address, req);
126
- const data = await this.#handleMfa(res);
127
- return data.rlp_signed_tx;
128
- }
129
-
130
- /**
131
- * Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)
132
- * to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.
133
- * The key (for this session) must have the `"AllowRawBlobSigning"` policy attached.
134
- * @param {string | Uint8Array} message The message to sign.
135
- * @return {Promise<string>} The signature.
136
- */
137
- async signMessage(message: string | Uint8Array): Promise<string> {
138
- const digest = ethers.hashMessage(message);
139
- return this.signBlob(digest);
140
- }
141
-
142
- /**
143
- * Signs EIP-712 typed data. This uses ethers.js's
144
- * [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)
145
- * to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.
146
- * The key (for this session) must have the `"AllowRawBlobSigning"` policy attached.
147
- * @param {TypedDataDomain} domain The domain of the typed data.
148
- * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.
149
- * @param {Record<string, any>} value The value of the typed data.
150
- * @return {Promise<string>} The signature.
151
- */
152
- async signTypedData(
153
- domain: TypedDataDomain,
154
- types: Record<string, Array<TypedDataField>>,
155
- value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any
156
- ): Promise<string> {
157
- const digest = TypedDataEncoder.hash(domain, types, value);
158
- return this.signBlob(digest);
159
- }
160
-
161
- /**
162
- * Sign arbitrary digest. This uses {@link Key#signBlob}.
163
- * @param {string} digest The digest to sign.
164
- * @return {Promise<string>} The signature.
165
- */
166
- private async signBlob(digest: string): Promise<string> {
167
- const blobReq = <BlobSignRequest>{
168
- message_base64: Buffer.from(getBytes(digest)).toString("base64"),
169
- };
170
- // Get the key corresponding to this address
171
- if (this.#key === undefined) {
172
- const key = (await this.#signerSession.keys()).find((k) => k.material_id === this.#address);
173
- if (key === undefined) {
174
- throw new Error(`Cannot access key '${this.#address}'`);
175
- }
176
- this.#key = key;
177
- }
178
-
179
- const res = await this.#signerSession.signBlob(this.#key.key_id, blobReq);
180
- const data = await this.#handleMfa(res);
181
-
182
- const signature = data.signature;
183
- assert(signature.startsWith("0x"));
184
- assert(signature.length == 132);
185
- const vAdj = (parseInt(signature.slice(130), 16) + 27).toString(16);
186
- return signature.slice(0, 130) + vAdj;
187
- }
188
-
189
- /**
190
- * Initialize the signing a message using MFA approvals. This method populates
191
- * missing fields. If the signing does not require MFA, this method throws.
192
- * @param {ethers.TransactionRequest} tx The transaction to send.
193
- * @return {string} The MFA id associated with the signing request.
194
- */
195
- async sendTransactionMfaInit(tx: ethers.TransactionRequest): Promise<string> {
196
- const popTx = await this.populateTransaction(tx);
197
- const req = await this.evmSignRequestFromTx(popTx);
198
- const res = await this.#signerSession.signEvm(this.#address, req);
199
- return res.mfaId();
200
- }
201
-
202
- /**
203
- * Send a transaction from an approved MFA request. The MFA request contains
204
- * information about the approved signing request, which this method will
205
- * execute.
206
- * @param {MfaRequestInfo} mfaInfo The approved MFA request.
207
- * @return {ethers.TransactionResponse} The result of submitting the transaction
208
- */
209
- async sendTransactionMfaApproved(mfaInfo: MfaRequestInfo): Promise<ethers.TransactionResponse> {
210
- if (!mfaInfo.request.path.includes("/eth1/sign/")) {
211
- throw new Error(`Expected EVM transaction signing request, got ${mfaInfo.request.path}`);
212
- }
213
- if (!mfaInfo.request.path.includes(this.#address)) {
214
- throw new Error(
215
- `Expected signing request for ${this.#address} but got ${mfaInfo.request.path}`,
216
- );
217
- }
218
-
219
- const signedTx = await this.#signerSession.signEvm(
220
- this.#address,
221
- mfaInfo.request.body as EvmSignRequest,
222
- {
223
- mfaId: mfaInfo.id,
224
- mfaOrgId: this.#signerSession.orgId,
225
- mfaConf: mfaInfo.receipt!.confirmation,
226
- },
227
- );
228
- return await this.provider!.broadcastTransaction(signedTx.data().rlp_signed_tx);
229
- }
230
-
231
- /**
232
- * If the sign request requires MFA, this method waits for approvals
233
- * @param {CubeSignerResponse<U>} res The response of a sign request
234
- * @return {Promise<U>} The sign data after MFA approvals
235
- */
236
- async #handleMfa<U>(res: CubeSignerResponse<U>): Promise<U> {
237
- while (res.requiresMfa()) {
238
- await new Promise((resolve) => setTimeout(resolve, this.#mfaPollIntervalMs));
239
-
240
- const mfaId = res.mfaId();
241
- const mfaInfo = await this.#signerSession.getMfaInfo(mfaId);
242
- this.#onMfaPoll(mfaInfo);
243
- if (mfaInfo.receipt) {
244
- res = await res.signWithMfaApproval({
245
- mfaId,
246
- mfaOrgId: this.#signerSession.orgId,
247
- mfaConf: mfaInfo.receipt.confirmation,
248
- });
249
- }
250
- }
251
- return res.data();
252
- }
253
- }