@cubist-labs/cubesigner-sdk 0.2.28 → 0.3.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +30 -28
- package/dist/cjs/package.json +41 -0
- package/dist/cjs/spec/env/beta.json +9 -0
- package/dist/cjs/spec/env/gamma.json +9 -0
- package/dist/cjs/spec/env/prod.json +9 -0
- package/dist/cjs/src/api.d.ts +634 -0
- package/dist/cjs/src/api.js +1309 -0
- package/dist/cjs/src/client.d.ts +575 -0
- package/dist/cjs/src/client.js +378 -0
- package/dist/cjs/src/env.d.ts +15 -0
- package/dist/cjs/src/env.js +35 -0
- package/dist/cjs/src/error.d.ts +29 -0
- package/dist/cjs/src/error.js +36 -0
- package/dist/cjs/src/events.d.ts +84 -0
- package/dist/cjs/src/events.js +195 -0
- package/dist/cjs/src/index.d.ts +203 -0
- package/dist/cjs/src/index.js +298 -0
- package/dist/cjs/src/key.d.ts +152 -0
- package/dist/cjs/src/key.js +242 -0
- package/dist/{src/fido.d.ts → cjs/src/mfa.d.ts} +33 -15
- package/dist/cjs/src/mfa.js +169 -0
- package/dist/cjs/src/org.d.ts +99 -0
- package/dist/cjs/src/org.js +95 -0
- package/dist/cjs/src/paginator.d.ts +76 -0
- package/dist/cjs/src/paginator.js +99 -0
- package/dist/cjs/src/response.d.ts +101 -0
- package/dist/cjs/src/response.js +164 -0
- package/dist/cjs/src/role.d.ts +283 -0
- package/dist/cjs/src/role.js +253 -0
- package/dist/cjs/src/schema.d.ts +6209 -0
- package/dist/cjs/src/schema.js +7 -0
- package/dist/cjs/src/schema_types.d.ts +113 -0
- package/dist/cjs/src/schema_types.js +3 -0
- package/dist/cjs/src/session/session_storage.d.ts +27 -0
- package/dist/cjs/src/session/session_storage.js +47 -0
- package/dist/cjs/src/session/signer_session_manager.d.ts +125 -0
- package/dist/cjs/src/session/signer_session_manager.js +239 -0
- package/dist/cjs/src/signer_session.d.ts +41 -0
- package/dist/cjs/src/signer_session.js +77 -0
- package/dist/cjs/src/user_export.d.ts +52 -0
- package/dist/cjs/src/user_export.js +129 -0
- package/dist/cjs/src/util.d.ts +56 -0
- package/dist/cjs/src/util.js +86 -0
- package/dist/esm/package.json +41 -0
- package/dist/esm/spec/env/beta.json +9 -0
- package/dist/esm/spec/env/gamma.json +9 -0
- package/dist/esm/spec/env/prod.json +9 -0
- package/dist/esm/src/api.d.ts +634 -0
- package/dist/esm/src/api.js +1299 -0
- package/dist/esm/src/client.d.ts +575 -0
- package/dist/esm/src/client.js +374 -0
- package/dist/esm/src/env.d.ts +15 -0
- package/dist/esm/src/env.js +9 -0
- package/dist/esm/src/error.d.ts +29 -0
- package/dist/esm/src/error.js +31 -0
- package/dist/esm/src/events.d.ts +84 -0
- package/dist/esm/src/events.js +189 -0
- package/dist/esm/src/index.d.ts +203 -0
- package/dist/esm/src/index.js +276 -0
- package/dist/esm/src/key.d.ts +152 -0
- package/dist/esm/src/key.js +236 -0
- package/dist/esm/src/mfa.d.ts +94 -0
- package/dist/esm/src/mfa.js +163 -0
- package/dist/esm/src/org.d.ts +99 -0
- package/dist/esm/src/org.js +91 -0
- package/dist/esm/src/paginator.d.ts +76 -0
- package/dist/esm/src/paginator.js +94 -0
- package/dist/esm/src/response.d.ts +101 -0
- package/dist/esm/src/response.js +159 -0
- package/dist/esm/src/role.d.ts +283 -0
- package/dist/esm/src/role.js +248 -0
- package/dist/esm/src/schema.d.ts +6209 -0
- package/dist/esm/src/schema.js +6 -0
- package/dist/esm/src/schema_types.d.ts +113 -0
- package/dist/esm/src/schema_types.js +2 -0
- package/dist/esm/src/session/session_storage.d.ts +27 -0
- package/dist/esm/src/session/session_storage.js +43 -0
- package/dist/esm/src/session/signer_session_manager.d.ts +125 -0
- package/dist/esm/src/session/signer_session_manager.js +235 -0
- package/dist/esm/src/signer_session.d.ts +41 -0
- package/dist/esm/src/signer_session.js +72 -0
- package/dist/esm/src/user_export.d.ts +52 -0
- package/dist/esm/src/user_export.js +99 -0
- package/dist/esm/src/util.d.ts +56 -0
- package/dist/esm/src/util.js +76 -0
- package/dist/package.json +13 -45
- package/dist/src/api.d.ts +29 -1
- package/dist/src/api.js +66 -1
- package/dist/src/client.d.ts +35 -14
- package/dist/src/client.js +12 -8
- package/dist/src/events.js +1 -1
- package/dist/src/index.d.ts +6 -11
- package/dist/src/index.js +9 -25
- package/dist/src/key.d.ts +18 -7
- package/dist/src/key.js +52 -19
- package/dist/src/role.d.ts +46 -3
- package/dist/src/role.js +60 -8
- package/dist/src/schema.d.ts +206 -72
- package/dist/src/schema.js +1 -1
- package/dist/src/schema_types.d.ts +3 -0
- package/dist/src/schema_types.js +1 -1
- package/dist/src/session/signer_session_manager.d.ts +38 -14
- package/dist/src/session/signer_session_manager.js +93 -33
- package/dist/src/util.d.ts +14 -0
- package/dist/src/util.js +24 -27
- package/package.json +19 -46
- package/src/api.ts +79 -0
- package/src/client.ts +12 -8
- package/src/events.ts +2 -0
- package/src/index.ts +10 -24
- package/src/key.ts +36 -18
- package/src/role.ts +78 -7
- package/src/schema.ts +269 -110
- package/src/schema_types.ts +3 -0
- package/src/session/session_storage.ts +0 -32
- package/src/session/signer_session_manager.ts +124 -36
- package/src/util.ts +19 -10
- package/tsconfig.json +1 -21
- package/LICENSE-APACHE +0 -177
- package/LICENSE-MIT +0 -25
- package/NOTICE +0 -13
- package/dist/examples/ethers.d.ts +0 -1
- package/dist/examples/ethers.js +0 -142
- package/dist/src/ethers/index.d.ts +0 -95
- package/dist/src/ethers/index.js +0 -215
- package/dist/src/fido.js +0 -148
- package/dist/src/session/cognito_manager.d.ts +0 -71
- package/dist/src/session/cognito_manager.js +0 -129
- package/dist/src/session/generic.d.ts +0 -47
- package/dist/src/session/generic.js +0 -3
- package/dist/src/session/management_session_manager.d.ts +0 -59
- package/dist/src/session/management_session_manager.js +0 -111
- package/dist/src/session/oidc_session_manager.d.ts +0 -78
- package/dist/src/session/oidc_session_manager.js +0 -142
- package/dist/src/session/session_manager.d.ts +0 -99
- package/dist/src/session/session_manager.js +0 -136
- package/dist/src/sign.d.ts +0 -114
- package/dist/src/sign.js +0 -248
- package/dist/test/sessions.d.ts +0 -35
- package/dist/test/sessions.js +0 -56
- package/src/ethers/index.ts +0 -253
- package/src/session/cognito_manager.ts +0 -161
- package/src/session/session_manager.ts +0 -165
package/dist/src/sign.js
DELETED
|
@@ -1,248 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
3
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
4
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
5
|
-
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
6
|
-
};
|
|
7
|
-
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
8
|
-
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
9
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
10
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
11
|
-
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
12
|
-
};
|
|
13
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
14
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
15
|
-
};
|
|
16
|
-
var _SignResponse_cs, _SignResponse_orgId, _SignResponse_roleId, _SignResponse_signFn, _SignResponse_resp, _Sign_orgId, _Sign_ss;
|
|
17
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
18
|
-
exports.Sign = exports.SignResponse = void 0;
|
|
19
|
-
const assert_1 = __importDefault(require("assert"));
|
|
20
|
-
const _1 = require(".");
|
|
21
|
-
const env_1 = require("./env");
|
|
22
|
-
/**
|
|
23
|
-
* A response of a signing request.
|
|
24
|
-
*/
|
|
25
|
-
class SignResponse {
|
|
26
|
-
/** @return {boolean} True if this signing request requires an MFA approval */
|
|
27
|
-
requiresMfa() {
|
|
28
|
-
return __classPrivateFieldGet(this, _SignResponse_resp, "f").accepted?.MfaRequired !== undefined;
|
|
29
|
-
}
|
|
30
|
-
/** @return {U} The signed data */
|
|
31
|
-
data() {
|
|
32
|
-
return __classPrivateFieldGet(this, _SignResponse_resp, "f");
|
|
33
|
-
}
|
|
34
|
-
/**
|
|
35
|
-
* Approves the MFA request.
|
|
36
|
-
*
|
|
37
|
-
* Note: This only works for MFA requests that require a single approval.
|
|
38
|
-
*
|
|
39
|
-
* @return {SignResponse<U>} The result of signing with the approval
|
|
40
|
-
*/
|
|
41
|
-
async approve() {
|
|
42
|
-
const mfaRequired = __classPrivateFieldGet(this, _SignResponse_resp, "f").accepted?.MfaRequired;
|
|
43
|
-
if (!mfaRequired) {
|
|
44
|
-
throw new Error("Request does not require MFA approval");
|
|
45
|
-
}
|
|
46
|
-
const mfaId = mfaRequired.id;
|
|
47
|
-
const mfaApproval = await _1.Role.mfaApprove(__classPrivateFieldGet(this, _SignResponse_cs, "f"), __classPrivateFieldGet(this, _SignResponse_orgId, "f"), __classPrivateFieldGet(this, _SignResponse_roleId, "f"), mfaId);
|
|
48
|
-
(0, assert_1.default)(mfaApproval.id === mfaId);
|
|
49
|
-
(0, assert_1.default)(mfaApproval.receipt);
|
|
50
|
-
const mfaConf = mfaApproval.receipt?.confirmation;
|
|
51
|
-
if (!mfaConf) {
|
|
52
|
-
throw new Error("MfaRequest has not been approved yet");
|
|
53
|
-
}
|
|
54
|
-
const headers = {
|
|
55
|
-
"x-cubist-mfa-id": mfaId,
|
|
56
|
-
"x-cubist-mfa-confirmation": mfaConf,
|
|
57
|
-
};
|
|
58
|
-
return new SignResponse(__classPrivateFieldGet(this, _SignResponse_cs, "f"), __classPrivateFieldGet(this, _SignResponse_orgId, "f"), __classPrivateFieldGet(this, _SignResponse_roleId, "f"), __classPrivateFieldGet(this, _SignResponse_signFn, "f"), await __classPrivateFieldGet(this, _SignResponse_signFn, "f").call(this, headers));
|
|
59
|
-
}
|
|
60
|
-
// --------------------------------------------------------------------------
|
|
61
|
-
// -- INTERNAL --------------------------------------------------------------
|
|
62
|
-
// --------------------------------------------------------------------------
|
|
63
|
-
/**
|
|
64
|
-
* Constructor.
|
|
65
|
-
*
|
|
66
|
-
* @param {CubeSigner} cs The CubeSigner instance to use for requests
|
|
67
|
-
* @param {string} orgId The org id of the corresponding signing request
|
|
68
|
-
* @param {string} roleId The role id of the corresponding signing request
|
|
69
|
-
* @param {SignFn} signFn The signing function that this response is from.
|
|
70
|
-
* This argument is used to resend requests with
|
|
71
|
-
* different headers if needed.
|
|
72
|
-
* @param {U | AcceptedResponse} resp The response as returned by the OpenAPI
|
|
73
|
-
* client.
|
|
74
|
-
*/
|
|
75
|
-
constructor(cs, orgId, roleId, signFn, resp) {
|
|
76
|
-
_SignResponse_cs.set(this, void 0);
|
|
77
|
-
_SignResponse_orgId.set(this, void 0);
|
|
78
|
-
_SignResponse_roleId.set(this, void 0);
|
|
79
|
-
_SignResponse_signFn.set(this, void 0);
|
|
80
|
-
_SignResponse_resp.set(this, void 0);
|
|
81
|
-
__classPrivateFieldSet(this, _SignResponse_cs, cs, "f");
|
|
82
|
-
__classPrivateFieldSet(this, _SignResponse_orgId, orgId, "f");
|
|
83
|
-
__classPrivateFieldSet(this, _SignResponse_roleId, roleId, "f");
|
|
84
|
-
__classPrivateFieldSet(this, _SignResponse_signFn, signFn, "f");
|
|
85
|
-
__classPrivateFieldSet(this, _SignResponse_resp, resp, "f");
|
|
86
|
-
}
|
|
87
|
-
}
|
|
88
|
-
exports.SignResponse = SignResponse;
|
|
89
|
-
_SignResponse_cs = new WeakMap(), _SignResponse_orgId = new WeakMap(), _SignResponse_roleId = new WeakMap(), _SignResponse_signFn = new WeakMap(), _SignResponse_resp = new WeakMap();
|
|
90
|
-
/**
|
|
91
|
-
* Wrapper around sign operations.
|
|
92
|
-
*/
|
|
93
|
-
class Sign {
|
|
94
|
-
/**
|
|
95
|
-
* Submit an 'eth1' sign request.
|
|
96
|
-
* @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
|
|
97
|
-
* @param {Eth1SignRequest} req What to sign.
|
|
98
|
-
* @return {Promise<Eth1SignResponse | AcceptedResponse>} Signature
|
|
99
|
-
*/
|
|
100
|
-
async eth1(key, req) {
|
|
101
|
-
const pubkey = typeof key === "string" ? key : key.materialId;
|
|
102
|
-
const sign = async (headers) => {
|
|
103
|
-
const resp = await (await __classPrivateFieldGet(this, _Sign_ss, "f").client()).post("/v1/org/{org_id}/eth1/sign/{pubkey}", {
|
|
104
|
-
params: { path: { org_id: __classPrivateFieldGet(this, _Sign_orgId, "f"), pubkey } },
|
|
105
|
-
body: req,
|
|
106
|
-
headers: headers,
|
|
107
|
-
parseAs: "json",
|
|
108
|
-
});
|
|
109
|
-
return (0, env_1.assertOk)(resp);
|
|
110
|
-
};
|
|
111
|
-
return new SignResponse(__classPrivateFieldGet(this, _Sign_ss, "f").cs, __classPrivateFieldGet(this, _Sign_orgId, "f"), __classPrivateFieldGet(this, _Sign_ss, "f").roleId, sign, await sign());
|
|
112
|
-
}
|
|
113
|
-
/**
|
|
114
|
-
* Submit an 'eth2' sign request.
|
|
115
|
-
* @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
|
|
116
|
-
* @param {Eth2SignRequest} req What to sign.
|
|
117
|
-
* @return {Promise<Eth2SignResponse | AcceptedResponse>} Signature
|
|
118
|
-
*/
|
|
119
|
-
async eth2(key, req) {
|
|
120
|
-
const pubkey = typeof key === "string" ? key : key.materialId;
|
|
121
|
-
const sign = async (headers) => {
|
|
122
|
-
const resp = await (await __classPrivateFieldGet(this, _Sign_ss, "f").client()).post("/v1/org/{org_id}/eth2/sign/{pubkey}", {
|
|
123
|
-
params: { path: { org_id: __classPrivateFieldGet(this, _Sign_orgId, "f"), pubkey } },
|
|
124
|
-
body: req,
|
|
125
|
-
headers: headers,
|
|
126
|
-
parseAs: "json",
|
|
127
|
-
});
|
|
128
|
-
return (0, env_1.assertOk)(resp);
|
|
129
|
-
};
|
|
130
|
-
return new SignResponse(__classPrivateFieldGet(this, _Sign_ss, "f").cs, __classPrivateFieldGet(this, _Sign_orgId, "f"), __classPrivateFieldGet(this, _Sign_ss, "f").roleId, sign, await sign());
|
|
131
|
-
}
|
|
132
|
-
/**
|
|
133
|
-
* Sign a stake request.
|
|
134
|
-
* @param {Eth2StakeRequest} req The request to sign.
|
|
135
|
-
* @return {Promise<Eth2StakeResponse | AcceptedResponse>} The response.
|
|
136
|
-
*/
|
|
137
|
-
async stake(req) {
|
|
138
|
-
const sign = async (headers) => {
|
|
139
|
-
const resp = await (await __classPrivateFieldGet(this, _Sign_ss, "f").client()).post("/v1/org/{org_id}/eth2/stake", {
|
|
140
|
-
params: { path: { org_id: __classPrivateFieldGet(this, _Sign_orgId, "f") } },
|
|
141
|
-
body: req,
|
|
142
|
-
headers: headers,
|
|
143
|
-
parseAs: "json",
|
|
144
|
-
});
|
|
145
|
-
return (0, env_1.assertOk)(resp);
|
|
146
|
-
};
|
|
147
|
-
return new SignResponse(__classPrivateFieldGet(this, _Sign_ss, "f").cs, __classPrivateFieldGet(this, _Sign_orgId, "f"), __classPrivateFieldGet(this, _Sign_ss, "f").roleId, sign, await sign());
|
|
148
|
-
}
|
|
149
|
-
/**
|
|
150
|
-
* Sign an unstake request.
|
|
151
|
-
* @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
|
|
152
|
-
* @param {Eth2UnstakeRequest} req The request to sign.
|
|
153
|
-
* @return {Promise<Eth2UnstakeResponse | AcceptedResponse>} The response.
|
|
154
|
-
*/
|
|
155
|
-
async unstake(key, req) {
|
|
156
|
-
const pubkey = typeof key === "string" ? key : key.materialId;
|
|
157
|
-
const sign = async (headers) => {
|
|
158
|
-
const resp = await (await __classPrivateFieldGet(this, _Sign_ss, "f").client()).post("/v1/org/{org_id}/eth2/unstake/{pubkey}", {
|
|
159
|
-
params: { path: { org_id: __classPrivateFieldGet(this, _Sign_orgId, "f"), pubkey } },
|
|
160
|
-
body: req,
|
|
161
|
-
headers: headers,
|
|
162
|
-
parseAs: "json",
|
|
163
|
-
});
|
|
164
|
-
return (0, env_1.assertOk)(resp);
|
|
165
|
-
};
|
|
166
|
-
return new SignResponse(__classPrivateFieldGet(this, _Sign_ss, "f").cs, __classPrivateFieldGet(this, _Sign_orgId, "f"), __classPrivateFieldGet(this, _Sign_ss, "f").roleId, sign, await sign());
|
|
167
|
-
}
|
|
168
|
-
/**
|
|
169
|
-
* Sign a raw blob.
|
|
170
|
-
* @param {Key | string} key The key to sign with (either {@link Key} or its ID).
|
|
171
|
-
* @param {BlobSignRequest} req What to sign
|
|
172
|
-
* @return {Promise<BlobSignResponse | AcceptedResponse>} The response.
|
|
173
|
-
*/
|
|
174
|
-
async blob(key, req) {
|
|
175
|
-
const key_id = typeof key === "string" ? key : key.id;
|
|
176
|
-
const sign = async (headers) => {
|
|
177
|
-
const resp = await (await __classPrivateFieldGet(this, _Sign_ss, "f").client()).post("/v1/org/{org_id}/blob/sign/{key_id}", {
|
|
178
|
-
params: {
|
|
179
|
-
path: { org_id: __classPrivateFieldGet(this, _Sign_orgId, "f"), key_id },
|
|
180
|
-
},
|
|
181
|
-
body: req,
|
|
182
|
-
headers: headers,
|
|
183
|
-
parseAs: "json",
|
|
184
|
-
});
|
|
185
|
-
return (0, env_1.assertOk)(resp);
|
|
186
|
-
};
|
|
187
|
-
return new SignResponse(__classPrivateFieldGet(this, _Sign_ss, "f").cs, __classPrivateFieldGet(this, _Sign_orgId, "f"), __classPrivateFieldGet(this, _Sign_ss, "f").roleId, sign, await sign());
|
|
188
|
-
}
|
|
189
|
-
/**
|
|
190
|
-
* Sign a bitcoin message.
|
|
191
|
-
* @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
|
|
192
|
-
* @param {BtcSignRequest} req What to sign
|
|
193
|
-
* @return {Promise<BtcSignResponse | AcceptedResponse>} The response.
|
|
194
|
-
*/
|
|
195
|
-
async btc(key, req) {
|
|
196
|
-
const pubkey = typeof key === "string" ? key : key.materialId;
|
|
197
|
-
const sign = async (headers) => {
|
|
198
|
-
const resp = await (await __classPrivateFieldGet(this, _Sign_ss, "f").client()).post("/v0/org/{org_id}/btc/sign/{pubkey}", {
|
|
199
|
-
params: {
|
|
200
|
-
path: { org_id: __classPrivateFieldGet(this, _Sign_orgId, "f"), pubkey },
|
|
201
|
-
},
|
|
202
|
-
body: req,
|
|
203
|
-
headers: headers,
|
|
204
|
-
parseAs: "json",
|
|
205
|
-
});
|
|
206
|
-
return (0, env_1.assertOk)(resp);
|
|
207
|
-
};
|
|
208
|
-
return new SignResponse(__classPrivateFieldGet(this, _Sign_ss, "f").cs, __classPrivateFieldGet(this, _Sign_orgId, "f"), __classPrivateFieldGet(this, _Sign_ss, "f").roleId, sign, await sign());
|
|
209
|
-
}
|
|
210
|
-
/**
|
|
211
|
-
* Sign a solana message.
|
|
212
|
-
* @param {Key | string} key The key to sign with (either {@link Key} or its material ID).
|
|
213
|
-
* @param {SolanaSignRequest} req What to sign
|
|
214
|
-
* @return {Promise<SolanaSignResponse | AcceptedResponse>} The response.
|
|
215
|
-
*/
|
|
216
|
-
async solana(key, req) {
|
|
217
|
-
const pubkey = typeof key === "string" ? key : key.materialId;
|
|
218
|
-
const sign = async (headers) => {
|
|
219
|
-
const resp = await (await __classPrivateFieldGet(this, _Sign_ss, "f").client()).post("/v1/org/{org_id}/solana/sign/{pubkey}", {
|
|
220
|
-
params: { path: { org_id: __classPrivateFieldGet(this, _Sign_orgId, "f"), pubkey } },
|
|
221
|
-
body: req,
|
|
222
|
-
headers: headers,
|
|
223
|
-
parseAs: "json",
|
|
224
|
-
});
|
|
225
|
-
return (0, env_1.assertOk)(resp);
|
|
226
|
-
};
|
|
227
|
-
return new SignResponse(__classPrivateFieldGet(this, _Sign_ss, "f").cs, __classPrivateFieldGet(this, _Sign_orgId, "f"), __classPrivateFieldGet(this, _Sign_ss, "f").roleId, sign, await sign());
|
|
228
|
-
}
|
|
229
|
-
// --------------------------------------------------------------------------
|
|
230
|
-
// -- INTERNAL --------------------------------------------------------------
|
|
231
|
-
// --------------------------------------------------------------------------
|
|
232
|
-
/* eslint-disable require-jsdoc */
|
|
233
|
-
/**
|
|
234
|
-
* Constructor.
|
|
235
|
-
*
|
|
236
|
-
* @param {string} orgId Organization ID
|
|
237
|
-
* @param {SignerSession} ss The signer session to use for signing requests
|
|
238
|
-
*/
|
|
239
|
-
constructor(orgId, ss) {
|
|
240
|
-
_Sign_orgId.set(this, void 0);
|
|
241
|
-
_Sign_ss.set(this, void 0);
|
|
242
|
-
__classPrivateFieldSet(this, _Sign_orgId, orgId, "f");
|
|
243
|
-
__classPrivateFieldSet(this, _Sign_ss, ss, "f");
|
|
244
|
-
}
|
|
245
|
-
}
|
|
246
|
-
exports.Sign = Sign;
|
|
247
|
-
_Sign_orgId = new WeakMap(), _Sign_ss = new WeakMap();
|
|
248
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"sign.js","sourceRoot":"","sources":["../../src/sign.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;AAAA,oDAA4B;AAC5B,wBAAyD;AAEzD,+BAAiC;AA0CjC;;GAEG;AACH,MAAa,YAAY;IAOvB,8EAA8E;IAC9E,WAAW;QACT,OAAQ,uBAAA,IAAI,0BAA2B,CAAC,QAAQ,EAAE,WAAW,KAAK,SAAS,CAAC;IAC9E,CAAC;IAED,kCAAkC;IAClC,IAAI;QACF,OAAO,uBAAA,IAAI,0BAAW,CAAC;IACzB,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,WAAW,GAAI,uBAAA,IAAI,0BAA2B,CAAC,QAAQ,EAAE,WAAW,CAAC;QAC3E,IAAI,CAAC,WAAW,EAAE;YAChB,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;SAC1D;QAED,MAAM,KAAK,GAAG,WAAW,CAAC,EAAE,CAAC;QAC7B,MAAM,WAAW,GAAG,MAAM,OAAI,CAAC,UAAU,CAAC,uBAAA,IAAI,wBAAI,EAAE,uBAAA,IAAI,2BAAO,EAAE,uBAAA,IAAI,4BAAQ,EAAE,KAAK,CAAC,CAAC;QACtF,IAAA,gBAAM,EAAC,WAAW,CAAC,EAAE,KAAK,KAAK,CAAC,CAAC;QACjC,IAAA,gBAAM,EAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE5B,MAAM,OAAO,GAAG,WAAW,CAAC,OAAO,EAAE,YAAY,CAAC;QAClD,IAAI,CAAC,OAAO,EAAE;YACZ,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;SACzD;QAED,MAAM,OAAO,GAAG;YACd,iBAAiB,EAAE,KAAK;YACxB,2BAA2B,EAAE,OAAO;SACrC,CAAC;QACF,OAAO,IAAI,YAAY,CACrB,uBAAA,IAAI,wBAAI,EACR,uBAAA,IAAI,2BAAO,EACX,uBAAA,IAAI,4BAAQ,EACZ,uBAAA,IAAI,4BAAQ,EACZ,MAAM,uBAAA,IAAI,4BAAQ,MAAZ,IAAI,EAAS,OAAO,CAAC,CAC5B,CAAC;IACJ,CAAC;IAED,6EAA6E;IAC7E,6EAA6E;IAC7E,6EAA6E;IAE7E;;;;;;;;;;;OAWG;IACH,YACE,EAAc,EACd,KAAa,EACb,MAAc,EACd,MAAiB,EACjB,IAA0B;QAzEnB,mCAAgB;QAChB,sCAAe;QACf,uCAAgB;QAChB,uCAAmB;QACnB,qCAA4B;QAuEnC,uBAAA,IAAI,oBAAO,EAAE,MAAA,CAAC;QACd,uBAAA,IAAI,uBAAU,KAAK,MAAA,CAAC;QACpB,uBAAA,IAAI,wBAAW,MAAM,MAAA,CAAC;QACtB,uBAAA,IAAI,wBAAW,MAAM,MAAA,CAAC;QACtB,uBAAA,IAAI,sBAAS,IAAI,MAAA,CAAC;IACpB,CAAC;CACF;AAlFD,oCAkFC;;AAED;;GAEG;AACH,MAAa,IAAI;IAIf;;;;;OAKG;IACH,KAAK,CAAC,IAAI,CAAC,GAAiB,EAAE,GAAoB;QAChD,MAAM,MAAM,GAAG,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC,CAAE,GAAc,CAAC,CAAC,CAAC,GAAG,CAAC,UAAU,CAAC;QAC1E,MAAM,IAAI,GAAG,KAAK,EAAE,OAAqB,EAAE,EAAE;YAC3C,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,CACxB,CAAC,IAAI,CAAC,qCAAqC,EAAE;gBAC5C,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,uBAAA,IAAI,mBAAO,EAAE,MAAM,EAAE,EAAE;gBACjD,IAAI,EAAE,GAAG;gBACT,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,MAAM;aAChB,CAAC,CAAC;YACH,OAAO,IAAA,cAAQ,EAAC,IAAI,CAAC,CAAC;QACxB,CAAC,CAAC;QACF,OAAO,IAAI,YAAY,CAAC,uBAAA,IAAI,gBAAI,CAAC,EAAE,EAAE,uBAAA,IAAI,mBAAO,EAAE,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,IAAI,EAAE,MAAM,IAAI,EAAE,CAAC,CAAC;IACzF,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,IAAI,CAAC,GAAiB,EAAE,GAAoB;QAChD,MAAM,MAAM,GAAG,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC,CAAE,GAAc,CAAC,CAAC,CAAC,GAAG,CAAC,UAAU,CAAC;QAC1E,MAAM,IAAI,GAAG,KAAK,EAAE,OAAqB,EAAE,EAAE;YAC3C,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,CACxB,CAAC,IAAI,CAAC,qCAAqC,EAAE;gBAC5C,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,uBAAA,IAAI,mBAAO,EAAE,MAAM,EAAE,EAAE;gBACjD,IAAI,EAAE,GAAG;gBACT,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,MAAM;aAChB,CAAC,CAAC;YACH,OAAO,IAAA,cAAQ,EAAC,IAAI,CAAC,CAAC;QACxB,CAAC,CAAC;QACF,OAAO,IAAI,YAAY,CAAC,uBAAA,IAAI,gBAAI,CAAC,EAAE,EAAE,uBAAA,IAAI,mBAAO,EAAE,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,IAAI,EAAE,MAAM,IAAI,EAAE,CAAC,CAAC;IACzF,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,KAAK,CAAC,GAAqB;QAC/B,MAAM,IAAI,GAAG,KAAK,EAAE,OAAqB,EAAE,EAAE;YAC3C,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,CACxB,CAAC,IAAI,CAAC,6BAA6B,EAAE;gBACpC,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,uBAAA,IAAI,mBAAO,EAAE,EAAE;gBACzC,IAAI,EAAE,GAAG;gBACT,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,MAAM;aAChB,CAAC,CAAC;YACH,OAAO,IAAA,cAAQ,EAAC,IAAI,CAAC,CAAC;QACxB,CAAC,CAAC;QACF,OAAO,IAAI,YAAY,CAAC,uBAAA,IAAI,gBAAI,CAAC,EAAE,EAAE,uBAAA,IAAI,mBAAO,EAAE,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,IAAI,EAAE,MAAM,IAAI,EAAE,CAAC,CAAC;IACzF,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,OAAO,CACX,GAAiB,EACjB,GAAuB;QAEvB,MAAM,MAAM,GAAG,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC,CAAE,GAAc,CAAC,CAAC,CAAC,GAAG,CAAC,UAAU,CAAC;QAC1E,MAAM,IAAI,GAAG,KAAK,EAAE,OAAqB,EAAE,EAAE;YAC3C,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,CACxB,CAAC,IAAI,CAAC,wCAAwC,EAAE;gBAC/C,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,uBAAA,IAAI,mBAAO,EAAE,MAAM,EAAE,EAAE;gBACjD,IAAI,EAAE,GAAG;gBACT,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,MAAM;aAChB,CAAC,CAAC;YACH,OAAO,IAAA,cAAQ,EAAC,IAAI,CAAC,CAAC;QACxB,CAAC,CAAC;QACF,OAAO,IAAI,YAAY,CAAC,uBAAA,IAAI,gBAAI,CAAC,EAAE,EAAE,uBAAA,IAAI,mBAAO,EAAE,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,IAAI,EAAE,MAAM,IAAI,EAAE,CAAC,CAAC;IACzF,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,IAAI,CAAC,GAAiB,EAAE,GAAoB;QAChD,MAAM,MAAM,GAAG,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC,CAAE,GAAc,CAAC,CAAC,CAAC,GAAG,CAAC,EAAE,CAAC;QAClE,MAAM,IAAI,GAAG,KAAK,EAAE,OAAqB,EAAE,EAAE;YAC3C,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,CACxB,CAAC,IAAI,CAAC,qCAAqC,EAAE;gBAC5C,MAAM,EAAE;oBACN,IAAI,EAAE,EAAE,MAAM,EAAE,uBAAA,IAAI,mBAAO,EAAE,MAAM,EAAE;iBACtC;gBACD,IAAI,EAAE,GAAG;gBACT,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,MAAM;aAChB,CAAC,CAAC;YACH,OAAO,IAAA,cAAQ,EAAC,IAAI,CAAC,CAAC;QACxB,CAAC,CAAC;QACF,OAAO,IAAI,YAAY,CAAC,uBAAA,IAAI,gBAAI,CAAC,EAAE,EAAE,uBAAA,IAAI,mBAAO,EAAE,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,IAAI,EAAE,MAAM,IAAI,EAAE,CAAC,CAAC;IACzF,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,GAAG,CAAC,GAAiB,EAAE,GAAmB;QAC9C,MAAM,MAAM,GAAG,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC,CAAE,GAAc,CAAC,CAAC,CAAC,GAAG,CAAC,UAAU,CAAC;QAC1E,MAAM,IAAI,GAAG,KAAK,EAAE,OAAqB,EAAE,EAAE;YAC3C,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,CACxB,CAAC,IAAI,CAAC,oCAAoC,EAAE;gBAC3C,MAAM,EAAE;oBACN,IAAI,EAAE,EAAE,MAAM,EAAE,uBAAA,IAAI,mBAAO,EAAE,MAAM,EAAE;iBACtC;gBACD,IAAI,EAAE,GAAG;gBACT,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,MAAM;aAChB,CAAC,CAAC;YACH,OAAO,IAAA,cAAQ,EAAC,IAAI,CAAC,CAAC;QACxB,CAAC,CAAC;QACF,OAAO,IAAI,YAAY,CAAC,uBAAA,IAAI,gBAAI,CAAC,EAAE,EAAE,uBAAA,IAAI,mBAAO,EAAE,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,IAAI,EAAE,MAAM,IAAI,EAAE,CAAC,CAAC;IACzF,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,MAAM,CACV,GAAiB,EACjB,GAAsB;QAEtB,MAAM,MAAM,GAAG,OAAO,GAAG,KAAK,QAAQ,CAAC,CAAC,CAAE,GAAc,CAAC,CAAC,CAAC,GAAG,CAAC,UAAU,CAAC;QAC1E,MAAM,IAAI,GAAG,KAAK,EAAE,OAAqB,EAAE,EAAE;YAC3C,MAAM,IAAI,GAAG,MAAM,CACjB,MAAM,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,CACxB,CAAC,IAAI,CAAC,uCAAuC,EAAE;gBAC9C,MAAM,EAAE,EAAE,IAAI,EAAE,EAAE,MAAM,EAAE,uBAAA,IAAI,mBAAO,EAAE,MAAM,EAAE,EAAE;gBACjD,IAAI,EAAE,GAAG;gBACT,OAAO,EAAE,OAAO;gBAChB,OAAO,EAAE,MAAM;aAChB,CAAC,CAAC;YACH,OAAO,IAAA,cAAQ,EAAC,IAAI,CAAC,CAAC;QACxB,CAAC,CAAC;QACF,OAAO,IAAI,YAAY,CAAC,uBAAA,IAAI,gBAAI,CAAC,EAAE,EAAE,uBAAA,IAAI,mBAAO,EAAE,uBAAA,IAAI,gBAAI,CAAC,MAAM,EAAE,IAAI,EAAE,MAAM,IAAI,EAAE,CAAC,CAAC;IACzF,CAAC;IAED,6EAA6E;IAC7E,6EAA6E;IAC7E,6EAA6E;IAE7E,kCAAkC;IAElC;;;;;OAKG;IACH,YAAY,KAAa,EAAE,EAAiB;QAjLnC,8BAAe;QACf,2BAAmB;QAiL1B,uBAAA,IAAI,eAAU,KAAK,MAAA,CAAC;QACpB,uBAAA,IAAI,YAAO,EAAE,MAAA,CAAC;IAChB,CAAC;CACF;AAtLD,oBAsLC","sourcesContent":["import assert from \"assert\";\nimport { CubeSigner, Key, Role, SignerSession } from \".\";\nimport { components, paths } from \"./client\";\nimport { assertOk } from \"./env\";\n\n/* eslint-disable */\nexport type Eth1SignRequest =\n  paths[\"/v1/org/{org_id}/eth1/sign/{pubkey}\"][\"post\"][\"requestBody\"][\"content\"][\"application/json\"];\nexport type Eth2SignRequest =\n  paths[\"/v1/org/{org_id}/eth2/sign/{pubkey}\"][\"post\"][\"requestBody\"][\"content\"][\"application/json\"];\nexport type Eth2StakeRequest =\n  paths[\"/v1/org/{org_id}/eth2/stake\"][\"post\"][\"requestBody\"][\"content\"][\"application/json\"];\nexport type Eth2UnstakeRequest =\n  paths[\"/v1/org/{org_id}/eth2/unstake/{pubkey}\"][\"post\"][\"requestBody\"][\"content\"][\"application/json\"];\nexport type BlobSignRequest =\n  paths[\"/v1/org/{org_id}/blob/sign/{key_id}\"][\"post\"][\"requestBody\"][\"content\"][\"application/json\"];\nexport type BtcSignRequest =\n  paths[\"/v0/org/{org_id}/btc/sign/{pubkey}\"][\"post\"][\"requestBody\"][\"content\"][\"application/json\"];\nexport type SolanaSignRequest =\n  paths[\"/v1/org/{org_id}/solana/sign/{pubkey}\"][\"post\"][\"requestBody\"][\"content\"][\"application/json\"];\n\nexport type Eth1SignResponse =\n  components[\"responses\"][\"Eth1SignResponse\"][\"content\"][\"application/json\"];\nexport type Eth2SignResponse =\n  components[\"responses\"][\"Eth2SignResponse\"][\"content\"][\"application/json\"];\nexport type Eth2StakeResponse =\n  components[\"responses\"][\"StakeResponse\"][\"content\"][\"application/json\"];\nexport type Eth2UnstakeResponse =\n  components[\"responses\"][\"UnstakeResponse\"][\"content\"][\"application/json\"];\nexport type BlobSignResponse =\n  components[\"responses\"][\"BlobSignResponse\"][\"content\"][\"application/json\"];\nexport type BtcSignResponse =\n  components[\"responses\"][\"BtcSignResponse\"][\"content\"][\"application/json\"];\nexport type SolanaSignResponse =\n  components[\"responses\"][\"SolanaSignResponse\"][\"content\"][\"application/json\"];\nexport type MfaRequestInfo =\n  components[\"responses\"][\"MfaRequestInfo\"][\"content\"][\"application/json\"];\n\nexport type AcceptedResponse = components[\"schemas\"][\"AcceptedResponse\"];\nexport type ErrorResponse = components[\"schemas\"][\"ErrorResponse\"];\nexport type BtcSignatureKind = components[\"schemas\"][\"BtcSignatureKind\"];\n/* eslint-enable */\n\ntype SignFn<U> = (headers?: HeadersInit) => Promise<U | AcceptedResponse>;\n\n/**\n * A response of a signing request.\n */\nexport class SignResponse<U> {\n  readonly #cs: CubeSigner;\n  readonly #orgId: string;\n  readonly #roleId: string;\n  readonly #signFn: SignFn<U>;\n  readonly #resp: U | AcceptedResponse;\n\n  /** @return {boolean} True if this signing request requires an MFA approval */\n  requiresMfa(): boolean {\n    return (this.#resp as AcceptedResponse).accepted?.MfaRequired !== undefined;\n  }\n\n  /** @return {U} The signed data */\n  data(): U {\n    return this.#resp as U;\n  }\n\n  /**\n   * Approves the MFA request.\n   *\n   * Note: This only works for MFA requests that require a single approval.\n   *\n   * @return {SignResponse<U>} The result of signing with the approval\n   */\n  async approve(): Promise<SignResponse<U>> {\n    const mfaRequired = (this.#resp as AcceptedResponse).accepted?.MfaRequired;\n    if (!mfaRequired) {\n      throw new Error(\"Request does not require MFA approval\");\n    }\n\n    const mfaId = mfaRequired.id;\n    const mfaApproval = await Role.mfaApprove(this.#cs, this.#orgId, this.#roleId, mfaId);\n    assert(mfaApproval.id === mfaId);\n    assert(mfaApproval.receipt);\n\n    const mfaConf = mfaApproval.receipt?.confirmation;\n    if (!mfaConf) {\n      throw new Error(\"MfaRequest has not been approved yet\");\n    }\n\n    const headers = {\n      \"x-cubist-mfa-id\": mfaId,\n      \"x-cubist-mfa-confirmation\": mfaConf,\n    };\n    return new SignResponse(\n      this.#cs,\n      this.#orgId,\n      this.#roleId,\n      this.#signFn,\n      await this.#signFn(headers),\n    );\n  }\n\n  // --------------------------------------------------------------------------\n  // -- INTERNAL --------------------------------------------------------------\n  // --------------------------------------------------------------------------\n\n  /**\n   * Constructor.\n   *\n   * @param {CubeSigner} cs The CubeSigner instance to use for requests\n   * @param {string} orgId The org id of the corresponding signing request\n   * @param {string} roleId The role id of the corresponding signing request\n   * @param {SignFn} signFn The signing function that this response is from.\n   *                        This argument is used to resend requests with\n   *                        different headers if needed.\n   * @param {U | AcceptedResponse} resp The response as returned by the OpenAPI\n   *                                    client.\n   */\n  constructor(\n    cs: CubeSigner,\n    orgId: string,\n    roleId: string,\n    signFn: SignFn<U>,\n    resp: U | AcceptedResponse,\n  ) {\n    this.#cs = cs;\n    this.#orgId = orgId;\n    this.#roleId = roleId;\n    this.#signFn = signFn;\n    this.#resp = resp;\n  }\n}\n\n/**\n * Wrapper around sign operations.\n */\nexport class Sign {\n  readonly #orgId: string;\n  readonly #ss: SignerSession;\n\n  /**\n   * Submit an 'eth1' sign request.\n   * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).\n   * @param {Eth1SignRequest} req What to sign.\n   * @return {Promise<Eth1SignResponse | AcceptedResponse>} Signature\n   */\n  async eth1(key: Key | string, req: Eth1SignRequest): Promise<SignResponse<Eth1SignResponse>> {\n    const pubkey = typeof key === \"string\" ? (key as string) : key.materialId;\n    const sign = async (headers?: HeadersInit) => {\n      const resp = await (\n        await this.#ss.client()\n      ).post(\"/v1/org/{org_id}/eth1/sign/{pubkey}\", {\n        params: { path: { org_id: this.#orgId, pubkey } },\n        body: req,\n        headers: headers,\n        parseAs: \"json\",\n      });\n      return assertOk(resp);\n    };\n    return new SignResponse(this.#ss.cs, this.#orgId, this.#ss.roleId, sign, await sign());\n  }\n\n  /**\n   * Submit an 'eth2' sign request.\n   * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).\n   * @param {Eth2SignRequest} req What to sign.\n   * @return {Promise<Eth2SignResponse | AcceptedResponse>} Signature\n   */\n  async eth2(key: Key | string, req: Eth2SignRequest): Promise<SignResponse<Eth2SignResponse>> {\n    const pubkey = typeof key === \"string\" ? (key as string) : key.materialId;\n    const sign = async (headers?: HeadersInit) => {\n      const resp = await (\n        await this.#ss.client()\n      ).post(\"/v1/org/{org_id}/eth2/sign/{pubkey}\", {\n        params: { path: { org_id: this.#orgId, pubkey } },\n        body: req,\n        headers: headers,\n        parseAs: \"json\",\n      });\n      return assertOk(resp);\n    };\n    return new SignResponse(this.#ss.cs, this.#orgId, this.#ss.roleId, sign, await sign());\n  }\n\n  /**\n   * Sign a stake request.\n   * @param {Eth2StakeRequest} req The request to sign.\n   * @return {Promise<Eth2StakeResponse | AcceptedResponse>} The response.\n   */\n  async stake(req: Eth2StakeRequest): Promise<SignResponse<Eth2StakeResponse>> {\n    const sign = async (headers?: HeadersInit) => {\n      const resp = await (\n        await this.#ss.client()\n      ).post(\"/v1/org/{org_id}/eth2/stake\", {\n        params: { path: { org_id: this.#orgId } },\n        body: req,\n        headers: headers,\n        parseAs: \"json\",\n      });\n      return assertOk(resp);\n    };\n    return new SignResponse(this.#ss.cs, this.#orgId, this.#ss.roleId, sign, await sign());\n  }\n\n  /**\n   * Sign an unstake request.\n   * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).\n   * @param {Eth2UnstakeRequest} req The request to sign.\n   * @return {Promise<Eth2UnstakeResponse | AcceptedResponse>} The response.\n   */\n  async unstake(\n    key: Key | string,\n    req: Eth2UnstakeRequest,\n  ): Promise<SignResponse<Eth2UnstakeResponse>> {\n    const pubkey = typeof key === \"string\" ? (key as string) : key.materialId;\n    const sign = async (headers?: HeadersInit) => {\n      const resp = await (\n        await this.#ss.client()\n      ).post(\"/v1/org/{org_id}/eth2/unstake/{pubkey}\", {\n        params: { path: { org_id: this.#orgId, pubkey } },\n        body: req,\n        headers: headers,\n        parseAs: \"json\",\n      });\n      return assertOk(resp);\n    };\n    return new SignResponse(this.#ss.cs, this.#orgId, this.#ss.roleId, sign, await sign());\n  }\n\n  /**\n   * Sign a raw blob.\n   * @param {Key | string} key The key to sign with (either {@link Key} or its ID).\n   * @param {BlobSignRequest} req What to sign\n   * @return {Promise<BlobSignResponse | AcceptedResponse>} The response.\n   */\n  async blob(key: Key | string, req: BlobSignRequest): Promise<SignResponse<BlobSignResponse>> {\n    const key_id = typeof key === \"string\" ? (key as string) : key.id;\n    const sign = async (headers?: HeadersInit) => {\n      const resp = await (\n        await this.#ss.client()\n      ).post(\"/v1/org/{org_id}/blob/sign/{key_id}\", {\n        params: {\n          path: { org_id: this.#orgId, key_id },\n        },\n        body: req,\n        headers: headers,\n        parseAs: \"json\",\n      });\n      return assertOk(resp);\n    };\n    return new SignResponse(this.#ss.cs, this.#orgId, this.#ss.roleId, sign, await sign());\n  }\n\n  /**\n   * Sign a bitcoin message.\n   * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).\n   * @param {BtcSignRequest} req What to sign\n   * @return {Promise<BtcSignResponse | AcceptedResponse>} The response.\n   */\n  async btc(key: Key | string, req: BtcSignRequest): Promise<SignResponse<BtcSignResponse>> {\n    const pubkey = typeof key === \"string\" ? (key as string) : key.materialId;\n    const sign = async (headers?: HeadersInit) => {\n      const resp = await (\n        await this.#ss.client()\n      ).post(\"/v0/org/{org_id}/btc/sign/{pubkey}\", {\n        params: {\n          path: { org_id: this.#orgId, pubkey },\n        },\n        body: req,\n        headers: headers,\n        parseAs: \"json\",\n      });\n      return assertOk(resp);\n    };\n    return new SignResponse(this.#ss.cs, this.#orgId, this.#ss.roleId, sign, await sign());\n  }\n\n  /**\n   * Sign a solana message.\n   * @param {Key | string} key The key to sign with (either {@link Key} or its material ID).\n   * @param {SolanaSignRequest} req What to sign\n   * @return {Promise<SolanaSignResponse | AcceptedResponse>} The response.\n   */\n  async solana(\n    key: Key | string,\n    req: SolanaSignRequest,\n  ): Promise<SignResponse<SolanaSignResponse>> {\n    const pubkey = typeof key === \"string\" ? (key as string) : key.materialId;\n    const sign = async (headers?: HeadersInit) => {\n      const resp = await (\n        await this.#ss.client()\n      ).post(\"/v1/org/{org_id}/solana/sign/{pubkey}\", {\n        params: { path: { org_id: this.#orgId, pubkey } },\n        body: req,\n        headers: headers,\n        parseAs: \"json\",\n      });\n      return assertOk(resp);\n    };\n    return new SignResponse(this.#ss.cs, this.#orgId, this.#ss.roleId, sign, await sign());\n  }\n\n  // --------------------------------------------------------------------------\n  // -- INTERNAL --------------------------------------------------------------\n  // --------------------------------------------------------------------------\n\n  /* eslint-disable require-jsdoc */\n\n  /**\n   * Constructor.\n   *\n   * @param {string} orgId Organization ID\n   * @param {SignerSession} ss The signer session to use for signing requests\n   */\n  constructor(orgId: string, ss: SignerSession) {\n    this.#orgId = orgId;\n    this.#ss = ss;\n  }\n}\n"]}
|
package/dist/test/sessions.d.ts
DELETED
|
@@ -1,35 +0,0 @@
|
|
|
1
|
-
import { EnvInterface } from "../src/env";
|
|
2
|
-
/**
|
|
3
|
-
* Defaults.
|
|
4
|
-
*/
|
|
5
|
-
export declare class CubeSignerDefaults {
|
|
6
|
-
/** Default signer-session.json file path
|
|
7
|
-
* @return {string} Default signer-session.json file path
|
|
8
|
-
*/
|
|
9
|
-
static signerSessionFile(): string;
|
|
10
|
-
/** Default management-session.json file path
|
|
11
|
-
* @return {string} Default management-session.json file path
|
|
12
|
-
*/
|
|
13
|
-
static managementSessionFile(): string;
|
|
14
|
-
}
|
|
15
|
-
/** JSON representation of our "management session" file format */
|
|
16
|
-
export interface ManagementSession {
|
|
17
|
-
email: string;
|
|
18
|
-
id_token: string;
|
|
19
|
-
access_token: string;
|
|
20
|
-
refresh_token: string;
|
|
21
|
-
expiration: string;
|
|
22
|
-
env: {
|
|
23
|
-
["Dev-CubeSignerStack"]: EnvInterface;
|
|
24
|
-
};
|
|
25
|
-
}
|
|
26
|
-
/** JSON representation of our "signer session" file format */
|
|
27
|
-
export interface SignerSession {
|
|
28
|
-
org_id: string;
|
|
29
|
-
role_id: string;
|
|
30
|
-
purpose: string;
|
|
31
|
-
token: string;
|
|
32
|
-
env: {
|
|
33
|
-
["Dev-CubeSignerStack"]: EnvInterface;
|
|
34
|
-
};
|
|
35
|
-
}
|
package/dist/test/sessions.js
DELETED
|
@@ -1,56 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
-
}) : function(o, v) {
|
|
16
|
-
o["default"] = v;
|
|
17
|
-
});
|
|
18
|
-
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
-
if (mod && mod.__esModule) return mod;
|
|
20
|
-
var result = {};
|
|
21
|
-
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
-
__setModuleDefault(result, mod);
|
|
23
|
-
return result;
|
|
24
|
-
};
|
|
25
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
26
|
-
exports.CubeSignerDefaults = void 0;
|
|
27
|
-
const path = __importStar(require("path"));
|
|
28
|
-
/**
|
|
29
|
-
* Directory where CubeSigner stores config files.
|
|
30
|
-
* @return {string} Config dir
|
|
31
|
-
*/
|
|
32
|
-
function configDir() {
|
|
33
|
-
const configDir = process.platform === "darwin"
|
|
34
|
-
? `${process.env.HOME}/Library/Application Support`
|
|
35
|
-
: `${process.env.HOME}/.config`;
|
|
36
|
-
return path.join(configDir, "cubesigner");
|
|
37
|
-
}
|
|
38
|
-
/**
|
|
39
|
-
* Defaults.
|
|
40
|
-
*/
|
|
41
|
-
class CubeSignerDefaults {
|
|
42
|
-
/** Default signer-session.json file path
|
|
43
|
-
* @return {string} Default signer-session.json file path
|
|
44
|
-
*/
|
|
45
|
-
static signerSessionFile() {
|
|
46
|
-
return path.join(configDir(), "signer-session.json");
|
|
47
|
-
}
|
|
48
|
-
/** Default management-session.json file path
|
|
49
|
-
* @return {string} Default management-session.json file path
|
|
50
|
-
*/
|
|
51
|
-
static managementSessionFile() {
|
|
52
|
-
return path.join(configDir(), "management-session.json");
|
|
53
|
-
}
|
|
54
|
-
}
|
|
55
|
-
exports.CubeSignerDefaults = CubeSignerDefaults;
|
|
56
|
-
//# sourceMappingURL=data:application/json;base64,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
|
package/src/ethers/index.ts
DELETED
|
@@ -1,253 +0,0 @@
|
|
|
1
|
-
import {
|
|
2
|
-
JsonRpcApiProvider,
|
|
3
|
-
TypedDataDomain,
|
|
4
|
-
TypedDataEncoder,
|
|
5
|
-
TypedDataField,
|
|
6
|
-
ethers,
|
|
7
|
-
getBytes,
|
|
8
|
-
toBeHex,
|
|
9
|
-
} from "ethers";
|
|
10
|
-
import { SignerSession } from "../signer_session";
|
|
11
|
-
import { CubeSignerResponse } from "../response";
|
|
12
|
-
import { BlobSignRequest, EvmSignRequest, MfaRequestInfo } from "../schema_types";
|
|
13
|
-
import { KeyInfo } from "../key";
|
|
14
|
-
import assert from "assert";
|
|
15
|
-
|
|
16
|
-
/** Options for the signer */
|
|
17
|
-
interface SignerOptions {
|
|
18
|
-
/** Optional provider to use */
|
|
19
|
-
provider?: null | ethers.Provider;
|
|
20
|
-
/**
|
|
21
|
-
* The function to call when MFA information is retrieved. If this callback
|
|
22
|
-
* throws, no transaction is broadcast.
|
|
23
|
-
*/
|
|
24
|
-
onMfaPoll?: (arg0: MfaRequestInfo) => void;
|
|
25
|
-
/**
|
|
26
|
-
* The amount of time (in milliseconds) to wait between checks for MFA
|
|
27
|
-
* updates. Default is 1000ms
|
|
28
|
-
*/
|
|
29
|
-
mfaPollIntervalMs?: number;
|
|
30
|
-
}
|
|
31
|
-
|
|
32
|
-
/**
|
|
33
|
-
* A ethers.js Signer using CubeSigner
|
|
34
|
-
*/
|
|
35
|
-
export class Signer extends ethers.AbstractSigner {
|
|
36
|
-
/** The address of the account */
|
|
37
|
-
readonly #address: string;
|
|
38
|
-
|
|
39
|
-
/** The key to use for signing */
|
|
40
|
-
#key?: KeyInfo;
|
|
41
|
-
|
|
42
|
-
/** The underlying session */
|
|
43
|
-
readonly #signerSession: SignerSession;
|
|
44
|
-
|
|
45
|
-
/**
|
|
46
|
-
* The function to call when MFA information is retrieved. If this callback
|
|
47
|
-
* throws, no transaction is broadcast.
|
|
48
|
-
*/
|
|
49
|
-
readonly #onMfaPoll: (arg0: MfaRequestInfo) => void;
|
|
50
|
-
|
|
51
|
-
/** The amount of time to wait between checks for MFA updates */
|
|
52
|
-
readonly #mfaPollIntervalMs: number;
|
|
53
|
-
|
|
54
|
-
/**
|
|
55
|
-
* Create new Signer instance
|
|
56
|
-
* @param {KeyInfo | string} address The key or the eth address of the account to use.
|
|
57
|
-
* @param {SignerSession} signerSession The underlying Signer session.
|
|
58
|
-
* @param {SignerOptions} options The options to use for the Signer instance
|
|
59
|
-
*/
|
|
60
|
-
constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions) {
|
|
61
|
-
super(options?.provider);
|
|
62
|
-
if (typeof address === "string") {
|
|
63
|
-
this.#address = address;
|
|
64
|
-
} else {
|
|
65
|
-
this.#address = address.materialId;
|
|
66
|
-
this.#key = address as KeyInfo;
|
|
67
|
-
}
|
|
68
|
-
this.#signerSession = signerSession;
|
|
69
|
-
this.#onMfaPoll = options?.onMfaPoll ?? ((/* _mfaInfo: MfaRequestInfo */) => {}); // eslint-disable-line @typescript-eslint/no-empty-function
|
|
70
|
-
this.#mfaPollIntervalMs = options?.mfaPollIntervalMs ?? 1000;
|
|
71
|
-
}
|
|
72
|
-
|
|
73
|
-
/** Resolves to the signer address. */
|
|
74
|
-
async getAddress(): Promise<string> {
|
|
75
|
-
return this.#address;
|
|
76
|
-
}
|
|
77
|
-
|
|
78
|
-
/**
|
|
79
|
-
* Returns the signer connected to %%provider%%.
|
|
80
|
-
* @param {null | ethers.Provider} provider The optional provider instance to use.
|
|
81
|
-
* @return {Signer} The signer connected to signer.
|
|
82
|
-
*/
|
|
83
|
-
connect(provider: null | ethers.Provider): Signer {
|
|
84
|
-
return new Signer(this.#address, this.#signerSession, { provider });
|
|
85
|
-
}
|
|
86
|
-
|
|
87
|
-
/**
|
|
88
|
-
* Construct a signing request from a transaction. This populates the transaction
|
|
89
|
-
* type to `0x02` (EIP-1559) unless set.
|
|
90
|
-
*
|
|
91
|
-
* @param {ethers.TransactionRequest} tx The transaction
|
|
92
|
-
* @return {EvmSignRequest} The EVM sign request to be sent to CubeSigner
|
|
93
|
-
*/
|
|
94
|
-
async evmSignRequestFromTx(tx: ethers.TransactionRequest): Promise<EvmSignRequest> {
|
|
95
|
-
// get the chain id from the network or tx
|
|
96
|
-
let chainId = tx.chainId;
|
|
97
|
-
if (chainId === undefined) {
|
|
98
|
-
const network = await this.provider?.getNetwork();
|
|
99
|
-
chainId = network?.chainId?.toString() ?? "1";
|
|
100
|
-
}
|
|
101
|
-
|
|
102
|
-
// Convert the transaction into a JSON-RPC transaction
|
|
103
|
-
const rpcTx =
|
|
104
|
-
this.provider instanceof JsonRpcApiProvider
|
|
105
|
-
? this.provider.getRpcTransaction(tx)
|
|
106
|
-
: // We can just call the getRpcTransaction with a
|
|
107
|
-
// null receiver since it doesn't actually use it
|
|
108
|
-
// (and really should be declared static).
|
|
109
|
-
JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);
|
|
110
|
-
rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]
|
|
111
|
-
|
|
112
|
-
return <EvmSignRequest>{
|
|
113
|
-
chain_id: Number(chainId),
|
|
114
|
-
tx: rpcTx,
|
|
115
|
-
};
|
|
116
|
-
}
|
|
117
|
-
|
|
118
|
-
/**
|
|
119
|
-
* Sign a transaction. This method will block if the key requires MFA approval.
|
|
120
|
-
* @param {ethers.TransactionRequest} tx The transaction to sign.
|
|
121
|
-
* @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
|
|
122
|
-
*/
|
|
123
|
-
async signTransaction(tx: ethers.TransactionRequest): Promise<string> {
|
|
124
|
-
const req = await this.evmSignRequestFromTx(tx);
|
|
125
|
-
const res = await this.#signerSession.signEvm(this.#address, req);
|
|
126
|
-
const data = await this.#handleMfa(res);
|
|
127
|
-
return data.rlp_signed_tx;
|
|
128
|
-
}
|
|
129
|
-
|
|
130
|
-
/**
|
|
131
|
-
* Signs arbitrary messages. This uses ethers.js's [hashMessage](https://docs.ethers.org/v6/api/hashing/#hashMessage)
|
|
132
|
-
* to compute the EIP-191 digest and signs this digest using {@link Key#signBlob}.
|
|
133
|
-
* The key (for this session) must have the `"AllowRawBlobSigning"` policy attached.
|
|
134
|
-
* @param {string | Uint8Array} message The message to sign.
|
|
135
|
-
* @return {Promise<string>} The signature.
|
|
136
|
-
*/
|
|
137
|
-
async signMessage(message: string | Uint8Array): Promise<string> {
|
|
138
|
-
const digest = ethers.hashMessage(message);
|
|
139
|
-
return this.signBlob(digest);
|
|
140
|
-
}
|
|
141
|
-
|
|
142
|
-
/**
|
|
143
|
-
* Signs EIP-712 typed data. This uses ethers.js's
|
|
144
|
-
* [TypedDataEncoder.hash](https://docs.ethers.org/v6/api/hashing/#TypedDataEncoder_hash)
|
|
145
|
-
* to compute the EIP-712 digest and signs this digest using {@link Key#signBlob}.
|
|
146
|
-
* The key (for this session) must have the `"AllowRawBlobSigning"` policy attached.
|
|
147
|
-
* @param {TypedDataDomain} domain The domain of the typed data.
|
|
148
|
-
* @param {Record<string, Array<TypedDataField>>} types The types of the typed data.
|
|
149
|
-
* @param {Record<string, any>} value The value of the typed data.
|
|
150
|
-
* @return {Promise<string>} The signature.
|
|
151
|
-
*/
|
|
152
|
-
async signTypedData(
|
|
153
|
-
domain: TypedDataDomain,
|
|
154
|
-
types: Record<string, Array<TypedDataField>>,
|
|
155
|
-
value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any
|
|
156
|
-
): Promise<string> {
|
|
157
|
-
const digest = TypedDataEncoder.hash(domain, types, value);
|
|
158
|
-
return this.signBlob(digest);
|
|
159
|
-
}
|
|
160
|
-
|
|
161
|
-
/**
|
|
162
|
-
* Sign arbitrary digest. This uses {@link Key#signBlob}.
|
|
163
|
-
* @param {string} digest The digest to sign.
|
|
164
|
-
* @return {Promise<string>} The signature.
|
|
165
|
-
*/
|
|
166
|
-
private async signBlob(digest: string): Promise<string> {
|
|
167
|
-
const blobReq = <BlobSignRequest>{
|
|
168
|
-
message_base64: Buffer.from(getBytes(digest)).toString("base64"),
|
|
169
|
-
};
|
|
170
|
-
// Get the key corresponding to this address
|
|
171
|
-
if (this.#key === undefined) {
|
|
172
|
-
const key = (await this.#signerSession.keys()).find((k) => k.material_id === this.#address);
|
|
173
|
-
if (key === undefined) {
|
|
174
|
-
throw new Error(`Cannot access key '${this.#address}'`);
|
|
175
|
-
}
|
|
176
|
-
this.#key = key;
|
|
177
|
-
}
|
|
178
|
-
|
|
179
|
-
const res = await this.#signerSession.signBlob(this.#key.key_id, blobReq);
|
|
180
|
-
const data = await this.#handleMfa(res);
|
|
181
|
-
|
|
182
|
-
const signature = data.signature;
|
|
183
|
-
assert(signature.startsWith("0x"));
|
|
184
|
-
assert(signature.length == 132);
|
|
185
|
-
const vAdj = (parseInt(signature.slice(130), 16) + 27).toString(16);
|
|
186
|
-
return signature.slice(0, 130) + vAdj;
|
|
187
|
-
}
|
|
188
|
-
|
|
189
|
-
/**
|
|
190
|
-
* Initialize the signing a message using MFA approvals. This method populates
|
|
191
|
-
* missing fields. If the signing does not require MFA, this method throws.
|
|
192
|
-
* @param {ethers.TransactionRequest} tx The transaction to send.
|
|
193
|
-
* @return {string} The MFA id associated with the signing request.
|
|
194
|
-
*/
|
|
195
|
-
async sendTransactionMfaInit(tx: ethers.TransactionRequest): Promise<string> {
|
|
196
|
-
const popTx = await this.populateTransaction(tx);
|
|
197
|
-
const req = await this.evmSignRequestFromTx(popTx);
|
|
198
|
-
const res = await this.#signerSession.signEvm(this.#address, req);
|
|
199
|
-
return res.mfaId();
|
|
200
|
-
}
|
|
201
|
-
|
|
202
|
-
/**
|
|
203
|
-
* Send a transaction from an approved MFA request. The MFA request contains
|
|
204
|
-
* information about the approved signing request, which this method will
|
|
205
|
-
* execute.
|
|
206
|
-
* @param {MfaRequestInfo} mfaInfo The approved MFA request.
|
|
207
|
-
* @return {ethers.TransactionResponse} The result of submitting the transaction
|
|
208
|
-
*/
|
|
209
|
-
async sendTransactionMfaApproved(mfaInfo: MfaRequestInfo): Promise<ethers.TransactionResponse> {
|
|
210
|
-
if (!mfaInfo.request.path.includes("/eth1/sign/")) {
|
|
211
|
-
throw new Error(`Expected EVM transaction signing request, got ${mfaInfo.request.path}`);
|
|
212
|
-
}
|
|
213
|
-
if (!mfaInfo.request.path.includes(this.#address)) {
|
|
214
|
-
throw new Error(
|
|
215
|
-
`Expected signing request for ${this.#address} but got ${mfaInfo.request.path}`,
|
|
216
|
-
);
|
|
217
|
-
}
|
|
218
|
-
|
|
219
|
-
const signedTx = await this.#signerSession.signEvm(
|
|
220
|
-
this.#address,
|
|
221
|
-
mfaInfo.request.body as EvmSignRequest,
|
|
222
|
-
{
|
|
223
|
-
mfaId: mfaInfo.id,
|
|
224
|
-
mfaOrgId: this.#signerSession.orgId,
|
|
225
|
-
mfaConf: mfaInfo.receipt!.confirmation,
|
|
226
|
-
},
|
|
227
|
-
);
|
|
228
|
-
return await this.provider!.broadcastTransaction(signedTx.data().rlp_signed_tx);
|
|
229
|
-
}
|
|
230
|
-
|
|
231
|
-
/**
|
|
232
|
-
* If the sign request requires MFA, this method waits for approvals
|
|
233
|
-
* @param {CubeSignerResponse<U>} res The response of a sign request
|
|
234
|
-
* @return {Promise<U>} The sign data after MFA approvals
|
|
235
|
-
*/
|
|
236
|
-
async #handleMfa<U>(res: CubeSignerResponse<U>): Promise<U> {
|
|
237
|
-
while (res.requiresMfa()) {
|
|
238
|
-
await new Promise((resolve) => setTimeout(resolve, this.#mfaPollIntervalMs));
|
|
239
|
-
|
|
240
|
-
const mfaId = res.mfaId();
|
|
241
|
-
const mfaInfo = await this.#signerSession.getMfaInfo(mfaId);
|
|
242
|
-
this.#onMfaPoll(mfaInfo);
|
|
243
|
-
if (mfaInfo.receipt) {
|
|
244
|
-
res = await res.signWithMfaApproval({
|
|
245
|
-
mfaId,
|
|
246
|
-
mfaOrgId: this.#signerSession.orgId,
|
|
247
|
-
mfaConf: mfaInfo.receipt.confirmation,
|
|
248
|
-
});
|
|
249
|
-
}
|
|
250
|
-
}
|
|
251
|
-
return res.data();
|
|
252
|
-
}
|
|
253
|
-
}
|