@cubist-labs/cubesigner-sdk 0.2.28 → 0.3.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +30 -28
- package/dist/cjs/package.json +41 -0
- package/dist/cjs/spec/env/beta.json +9 -0
- package/dist/cjs/spec/env/gamma.json +9 -0
- package/dist/cjs/spec/env/prod.json +9 -0
- package/dist/cjs/src/api.d.ts +634 -0
- package/dist/cjs/src/api.js +1309 -0
- package/dist/cjs/src/client.d.ts +575 -0
- package/dist/cjs/src/client.js +378 -0
- package/dist/cjs/src/env.d.ts +15 -0
- package/dist/cjs/src/env.js +35 -0
- package/dist/cjs/src/error.d.ts +29 -0
- package/dist/cjs/src/error.js +36 -0
- package/dist/cjs/src/events.d.ts +84 -0
- package/dist/cjs/src/events.js +195 -0
- package/dist/cjs/src/index.d.ts +203 -0
- package/dist/cjs/src/index.js +298 -0
- package/dist/cjs/src/key.d.ts +152 -0
- package/dist/cjs/src/key.js +242 -0
- package/dist/{src/fido.d.ts → cjs/src/mfa.d.ts} +33 -15
- package/dist/cjs/src/mfa.js +169 -0
- package/dist/cjs/src/org.d.ts +99 -0
- package/dist/cjs/src/org.js +95 -0
- package/dist/cjs/src/paginator.d.ts +76 -0
- package/dist/cjs/src/paginator.js +99 -0
- package/dist/cjs/src/response.d.ts +101 -0
- package/dist/cjs/src/response.js +164 -0
- package/dist/cjs/src/role.d.ts +283 -0
- package/dist/cjs/src/role.js +253 -0
- package/dist/cjs/src/schema.d.ts +6209 -0
- package/dist/cjs/src/schema.js +7 -0
- package/dist/cjs/src/schema_types.d.ts +113 -0
- package/dist/cjs/src/schema_types.js +3 -0
- package/dist/cjs/src/session/session_storage.d.ts +27 -0
- package/dist/cjs/src/session/session_storage.js +47 -0
- package/dist/cjs/src/session/signer_session_manager.d.ts +125 -0
- package/dist/cjs/src/session/signer_session_manager.js +239 -0
- package/dist/cjs/src/signer_session.d.ts +41 -0
- package/dist/cjs/src/signer_session.js +77 -0
- package/dist/cjs/src/user_export.d.ts +52 -0
- package/dist/cjs/src/user_export.js +129 -0
- package/dist/cjs/src/util.d.ts +56 -0
- package/dist/cjs/src/util.js +86 -0
- package/dist/esm/package.json +41 -0
- package/dist/esm/spec/env/beta.json +9 -0
- package/dist/esm/spec/env/gamma.json +9 -0
- package/dist/esm/spec/env/prod.json +9 -0
- package/dist/esm/src/api.d.ts +634 -0
- package/dist/esm/src/api.js +1299 -0
- package/dist/esm/src/client.d.ts +575 -0
- package/dist/esm/src/client.js +374 -0
- package/dist/esm/src/env.d.ts +15 -0
- package/dist/esm/src/env.js +9 -0
- package/dist/esm/src/error.d.ts +29 -0
- package/dist/esm/src/error.js +31 -0
- package/dist/esm/src/events.d.ts +84 -0
- package/dist/esm/src/events.js +189 -0
- package/dist/esm/src/index.d.ts +203 -0
- package/dist/esm/src/index.js +276 -0
- package/dist/esm/src/key.d.ts +152 -0
- package/dist/esm/src/key.js +236 -0
- package/dist/esm/src/mfa.d.ts +94 -0
- package/dist/esm/src/mfa.js +163 -0
- package/dist/esm/src/org.d.ts +99 -0
- package/dist/esm/src/org.js +91 -0
- package/dist/esm/src/paginator.d.ts +76 -0
- package/dist/esm/src/paginator.js +94 -0
- package/dist/esm/src/response.d.ts +101 -0
- package/dist/esm/src/response.js +159 -0
- package/dist/esm/src/role.d.ts +283 -0
- package/dist/esm/src/role.js +248 -0
- package/dist/esm/src/schema.d.ts +6209 -0
- package/dist/esm/src/schema.js +6 -0
- package/dist/esm/src/schema_types.d.ts +113 -0
- package/dist/esm/src/schema_types.js +2 -0
- package/dist/esm/src/session/session_storage.d.ts +27 -0
- package/dist/esm/src/session/session_storage.js +43 -0
- package/dist/esm/src/session/signer_session_manager.d.ts +125 -0
- package/dist/esm/src/session/signer_session_manager.js +235 -0
- package/dist/esm/src/signer_session.d.ts +41 -0
- package/dist/esm/src/signer_session.js +72 -0
- package/dist/esm/src/user_export.d.ts +52 -0
- package/dist/esm/src/user_export.js +99 -0
- package/dist/esm/src/util.d.ts +56 -0
- package/dist/esm/src/util.js +76 -0
- package/dist/package.json +13 -45
- package/dist/src/api.d.ts +29 -1
- package/dist/src/api.js +66 -1
- package/dist/src/client.d.ts +35 -14
- package/dist/src/client.js +12 -8
- package/dist/src/events.js +1 -1
- package/dist/src/index.d.ts +6 -11
- package/dist/src/index.js +9 -25
- package/dist/src/key.d.ts +18 -7
- package/dist/src/key.js +52 -19
- package/dist/src/role.d.ts +46 -3
- package/dist/src/role.js +60 -8
- package/dist/src/schema.d.ts +206 -72
- package/dist/src/schema.js +1 -1
- package/dist/src/schema_types.d.ts +3 -0
- package/dist/src/schema_types.js +1 -1
- package/dist/src/session/signer_session_manager.d.ts +38 -14
- package/dist/src/session/signer_session_manager.js +93 -33
- package/dist/src/util.d.ts +14 -0
- package/dist/src/util.js +24 -27
- package/package.json +19 -46
- package/src/api.ts +79 -0
- package/src/client.ts +12 -8
- package/src/events.ts +2 -0
- package/src/index.ts +10 -24
- package/src/key.ts +36 -18
- package/src/role.ts +78 -7
- package/src/schema.ts +269 -110
- package/src/schema_types.ts +3 -0
- package/src/session/session_storage.ts +0 -32
- package/src/session/signer_session_manager.ts +124 -36
- package/src/util.ts +19 -10
- package/tsconfig.json +1 -21
- package/LICENSE-APACHE +0 -177
- package/LICENSE-MIT +0 -25
- package/NOTICE +0 -13
- package/dist/examples/ethers.d.ts +0 -1
- package/dist/examples/ethers.js +0 -142
- package/dist/src/ethers/index.d.ts +0 -95
- package/dist/src/ethers/index.js +0 -215
- package/dist/src/fido.js +0 -148
- package/dist/src/session/cognito_manager.d.ts +0 -71
- package/dist/src/session/cognito_manager.js +0 -129
- package/dist/src/session/generic.d.ts +0 -47
- package/dist/src/session/generic.js +0 -3
- package/dist/src/session/management_session_manager.d.ts +0 -59
- package/dist/src/session/management_session_manager.js +0 -111
- package/dist/src/session/oidc_session_manager.d.ts +0 -78
- package/dist/src/session/oidc_session_manager.js +0 -142
- package/dist/src/session/session_manager.d.ts +0 -99
- package/dist/src/session/session_manager.js +0 -136
- package/dist/src/sign.d.ts +0 -114
- package/dist/src/sign.js +0 -248
- package/dist/test/sessions.d.ts +0 -35
- package/dist/test/sessions.js +0 -56
- package/src/ethers/index.ts +0 -253
- package/src/session/cognito_manager.ts +0 -161
- package/src/session/session_manager.ts +0 -165
|
@@ -0,0 +1,298 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
14
|
+
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
15
|
+
};
|
|
16
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
17
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
18
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
19
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
20
|
+
};
|
|
21
|
+
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
22
|
+
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
23
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
24
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
25
|
+
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
26
|
+
};
|
|
27
|
+
var _CubeSigner_env, _CubeSigner_csc;
|
|
28
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
29
|
+
exports.VERSION = exports.NAME = exports.userExportKeygen = exports.userExportDecrypt = exports.GlobalEvents = exports.Events = exports.CubeSigner = void 0;
|
|
30
|
+
const env_1 = require("./env");
|
|
31
|
+
const api_1 = require("./api");
|
|
32
|
+
const client_1 = require("./client");
|
|
33
|
+
const org_1 = require("./org");
|
|
34
|
+
const signer_session_manager_1 = require("./session/signer_session_manager");
|
|
35
|
+
const signer_session_1 = require("./signer_session");
|
|
36
|
+
const package_json_1 = require("./../package.json");
|
|
37
|
+
/**
|
|
38
|
+
* CubeSigner client
|
|
39
|
+
*
|
|
40
|
+
* @deprecated Use {@link Org} or {@link CubeSignerClient} instead.
|
|
41
|
+
*/
|
|
42
|
+
class CubeSigner {
|
|
43
|
+
/**
|
|
44
|
+
* Underlying {@link CubeSignerClient} instance, if set; otherwise throws.
|
|
45
|
+
* @internal
|
|
46
|
+
*/
|
|
47
|
+
get csc() {
|
|
48
|
+
if (!__classPrivateFieldGet(this, _CubeSigner_csc, "f")) {
|
|
49
|
+
throw new Error("CubeSignerClient is not set");
|
|
50
|
+
}
|
|
51
|
+
return __classPrivateFieldGet(this, _CubeSigner_csc, "f");
|
|
52
|
+
}
|
|
53
|
+
/** @return {EnvInterface} The CubeSigner environment of this client */
|
|
54
|
+
get env() {
|
|
55
|
+
return __classPrivateFieldGet(this, _CubeSigner_env, "f");
|
|
56
|
+
}
|
|
57
|
+
/** Organization ID */
|
|
58
|
+
get orgId() {
|
|
59
|
+
return this.csc.orgId;
|
|
60
|
+
}
|
|
61
|
+
/**
|
|
62
|
+
* Set the organization ID
|
|
63
|
+
* @param {string} orgId The new organization id.
|
|
64
|
+
*/
|
|
65
|
+
setOrgId(orgId) {
|
|
66
|
+
__classPrivateFieldSet(this, _CubeSigner_csc, this.csc.withOrg(orgId), "f");
|
|
67
|
+
}
|
|
68
|
+
/**
|
|
69
|
+
* Loads an existing management session and creates a CubeSigner instance.
|
|
70
|
+
*
|
|
71
|
+
* @param {SignerSessionStorage} storage Session storage to load the session from.
|
|
72
|
+
* @return {Promise<CubeSigner>} New CubeSigner instance
|
|
73
|
+
*/
|
|
74
|
+
static async loadManagementSession(storage) {
|
|
75
|
+
return new CubeSigner({
|
|
76
|
+
sessionMgr: await signer_session_manager_1.SignerSessionManager.loadFromStorage(storage),
|
|
77
|
+
});
|
|
78
|
+
}
|
|
79
|
+
/**
|
|
80
|
+
* Loads a signer session from a session storage (e.g., session file).
|
|
81
|
+
* @param {SignerSessionStorage} storage Session storage to load the session from.
|
|
82
|
+
* @return {Promise<SignerSession>} New signer session
|
|
83
|
+
*/
|
|
84
|
+
static async loadSignerSession(storage) {
|
|
85
|
+
return await signer_session_1.SignerSession.loadSignerSession(storage);
|
|
86
|
+
}
|
|
87
|
+
/**
|
|
88
|
+
* Create a new CubeSigner instance.
|
|
89
|
+
* @param {CubeSignerOptions} options The optional configuration options for the CubeSigner instance.
|
|
90
|
+
*/
|
|
91
|
+
constructor(options) {
|
|
92
|
+
_CubeSigner_env.set(this, void 0);
|
|
93
|
+
_CubeSigner_csc.set(this, void 0);
|
|
94
|
+
let env = options?.env;
|
|
95
|
+
if (options?.sessionMgr) {
|
|
96
|
+
this.sessionMgr = options.sessionMgr;
|
|
97
|
+
env = env ?? this.sessionMgr.env;
|
|
98
|
+
}
|
|
99
|
+
__classPrivateFieldSet(this, _CubeSigner_env, env ?? env_1.envs["gamma"], "f");
|
|
100
|
+
__classPrivateFieldSet(this, _CubeSigner_csc, new client_1.CubeSignerClient(
|
|
101
|
+
// HACK: ignore that sessionMgr may be a CognitoSessionManager and pretend that it
|
|
102
|
+
// is a SignerSessionManager; that's fine because the CubeSignerClient will
|
|
103
|
+
// almost always just call `await token()` on it, which works in both cases.
|
|
104
|
+
//
|
|
105
|
+
// This is done here for backward compatibility reasons only; in the future,
|
|
106
|
+
// we should deprecate this class and people should start using `CubeSingerClient` directly.
|
|
107
|
+
options?.sessionMgr, options?.orgId), "f");
|
|
108
|
+
}
|
|
109
|
+
/**
|
|
110
|
+
* Authenticate an OIDC user and create a new session manager for them.
|
|
111
|
+
*
|
|
112
|
+
* @param {string} oidcToken The OIDC token
|
|
113
|
+
* @param {string} orgId The id of the organization that the user is in
|
|
114
|
+
* @param {List<string>} scopes The scopes of the resulting session
|
|
115
|
+
* @param {RatchetConfig} lifetimes Lifetimes of the new session.
|
|
116
|
+
* @param {SignerSessionStorage?} storage Optional signer session storage (defaults to in-memory storage)
|
|
117
|
+
* @return {Promise<SignerSessionManager>} The signer session manager
|
|
118
|
+
*/
|
|
119
|
+
async oidcAuth(oidcToken, orgId, scopes, lifetimes, storage) {
|
|
120
|
+
const resp = await this.oidcLogin(oidcToken, orgId, scopes, lifetimes);
|
|
121
|
+
return await signer_session_manager_1.SignerSessionManager.createFromSessionInfo(this.env, orgId, resp.data(), storage);
|
|
122
|
+
}
|
|
123
|
+
/**
|
|
124
|
+
* Retrieves information about the current user.
|
|
125
|
+
*
|
|
126
|
+
* @return {Promise<UserInfo>} User information.
|
|
127
|
+
*/
|
|
128
|
+
async aboutMe() {
|
|
129
|
+
return await this.csc.userGet();
|
|
130
|
+
}
|
|
131
|
+
/**
|
|
132
|
+
* Retrieves existing MFA request.
|
|
133
|
+
*
|
|
134
|
+
* @param {string} orgId Organization ID
|
|
135
|
+
* @param {string} mfaId MFA request ID
|
|
136
|
+
* @return {Promise<MfaRequestInfo>} MFA request information
|
|
137
|
+
*/
|
|
138
|
+
async mfaGet(orgId, mfaId) {
|
|
139
|
+
return await this.csc.withOrg(orgId).mfaGet(mfaId);
|
|
140
|
+
}
|
|
141
|
+
/**
|
|
142
|
+
* List pending MFA requests accessible to the current user.
|
|
143
|
+
* @param {string} orgId Organization ID
|
|
144
|
+
* @return {Promise<MfaRequestInfo[]>} The MFA requests.
|
|
145
|
+
*/
|
|
146
|
+
async mfaList(orgId) {
|
|
147
|
+
return await this.csc.withOrg(orgId).mfaList();
|
|
148
|
+
}
|
|
149
|
+
/**
|
|
150
|
+
* Approve a pending MFA request.
|
|
151
|
+
*
|
|
152
|
+
* @param {string} orgId The org id of the MFA request
|
|
153
|
+
* @param {string} mfaId The id of the MFA request
|
|
154
|
+
* @return {Promise<MfaRequestInfo>} The result of the MFA request
|
|
155
|
+
*/
|
|
156
|
+
async mfaApprove(orgId, mfaId) {
|
|
157
|
+
return await this.csc.withOrg(orgId).mfaApprove(mfaId);
|
|
158
|
+
}
|
|
159
|
+
/** Initiate adding a new FIDO device. MFA may be required. */
|
|
160
|
+
get addFidoStart() {
|
|
161
|
+
return this.csc.userFidoRegisterInit.bind(this.csc);
|
|
162
|
+
}
|
|
163
|
+
/**
|
|
164
|
+
* Creates a request to change user's TOTP. This request returns a new TOTP challenge
|
|
165
|
+
* that must be answered by calling `resetTotpComplete`
|
|
166
|
+
*/
|
|
167
|
+
get resetTotpStart() {
|
|
168
|
+
return this.csc.userTotpResetInit.bind(__classPrivateFieldGet(this, _CubeSigner_csc, "f"));
|
|
169
|
+
}
|
|
170
|
+
/**
|
|
171
|
+
* Answer the TOTP challenge issued by `resetTotpStart`. If successful, user's
|
|
172
|
+
* TOTP configuration will be updated to that of the TOTP challenge.he TOTP configuration from the challenge.
|
|
173
|
+
*/
|
|
174
|
+
get resetTotpComplete() {
|
|
175
|
+
return this.csc.userTotpResetComplete.bind(__classPrivateFieldGet(this, _CubeSigner_csc, "f"));
|
|
176
|
+
}
|
|
177
|
+
/**
|
|
178
|
+
* Verifies a given TOTP code against the current user's TOTP configuration.
|
|
179
|
+
* Throws an error if the verification fails.
|
|
180
|
+
*/
|
|
181
|
+
get verifyTotp() {
|
|
182
|
+
return this.csc.userTotpVerify.bind(__classPrivateFieldGet(this, _CubeSigner_csc, "f"));
|
|
183
|
+
}
|
|
184
|
+
/**
|
|
185
|
+
* Retrieve information about an organization.
|
|
186
|
+
* @param {string} orgId The ID or name of the organization.
|
|
187
|
+
* @return {Org} The organization.
|
|
188
|
+
*/
|
|
189
|
+
async getOrg(orgId) {
|
|
190
|
+
return new org_1.Org(this.csc.sessionMgr, orgId ?? this.csc.orgId);
|
|
191
|
+
}
|
|
192
|
+
/**
|
|
193
|
+
* Deletes a given key.
|
|
194
|
+
* @param {string} orgId - Organization id
|
|
195
|
+
* @param {string} keyId - Key id
|
|
196
|
+
*/
|
|
197
|
+
async deleteKey(orgId, keyId) {
|
|
198
|
+
await this.csc.withOrg(orgId).keyDelete(keyId);
|
|
199
|
+
}
|
|
200
|
+
/**
|
|
201
|
+
* Get the management client.
|
|
202
|
+
* @return {Client} The client.
|
|
203
|
+
* @internal
|
|
204
|
+
*/
|
|
205
|
+
async management() {
|
|
206
|
+
if (!this.sessionMgr) {
|
|
207
|
+
throw new Error("No management session loaded");
|
|
208
|
+
}
|
|
209
|
+
return await this.sessionMgr.client();
|
|
210
|
+
}
|
|
211
|
+
/**
|
|
212
|
+
* Obtain a proof of authentication.
|
|
213
|
+
*
|
|
214
|
+
* @param {string} orgId The id of the organization that the user is in
|
|
215
|
+
* @return {Promise<IdentityProof>} Proof of authentication
|
|
216
|
+
*/
|
|
217
|
+
async proveIdentity(orgId) {
|
|
218
|
+
return await this.csc.withOrg(orgId).identityProve();
|
|
219
|
+
}
|
|
220
|
+
/**
|
|
221
|
+
* Exchange an OIDC token for a proof of authentication.
|
|
222
|
+
*
|
|
223
|
+
* @param {string} oidcToken The OIDC token
|
|
224
|
+
* @param {string} orgId The id of the organization that the user is in
|
|
225
|
+
* @return {Promise<IdentityProof>} Proof of authentication
|
|
226
|
+
*/
|
|
227
|
+
async oidcProveIdentity(oidcToken, orgId) {
|
|
228
|
+
const oidcClient = new api_1.OidcClient(__classPrivateFieldGet(this, _CubeSigner_env, "f"), orgId, oidcToken);
|
|
229
|
+
return await oidcClient.identityProve();
|
|
230
|
+
}
|
|
231
|
+
/**
|
|
232
|
+
* Checks if a given identity proof is valid.
|
|
233
|
+
*
|
|
234
|
+
* @param {string} orgId The id of the organization that the user is in.
|
|
235
|
+
* @param {IdentityProof} identityProof The proof of authentication.
|
|
236
|
+
*/
|
|
237
|
+
async verifyIdentity(orgId, identityProof) {
|
|
238
|
+
await this.csc.withOrg(orgId).identityVerify(identityProof);
|
|
239
|
+
}
|
|
240
|
+
/**
|
|
241
|
+
* Exchange an OIDC token for a CubeSigner session token.
|
|
242
|
+
* @param {string} oidcToken The OIDC token
|
|
243
|
+
* @param {string} orgId The id of the organization that the user is in
|
|
244
|
+
* @param {List<string>} scopes The scopes of the resulting session
|
|
245
|
+
* @param {RatchetConfig} lifetimes Lifetimes of the new session.
|
|
246
|
+
* @param {MfaReceipt} mfaReceipt Optional MFA receipt (id + confirmation code)
|
|
247
|
+
* @return {Promise<CubeSignerResponse<SignerSessionData>>} The session data.
|
|
248
|
+
*/
|
|
249
|
+
async oidcLogin(oidcToken, orgId, scopes, lifetimes, mfaReceipt) {
|
|
250
|
+
const oidcClient = new api_1.OidcClient(__classPrivateFieldGet(this, _CubeSigner_env, "f"), orgId, oidcToken);
|
|
251
|
+
return await oidcClient.sessionCreate(scopes, lifetimes, mfaReceipt);
|
|
252
|
+
}
|
|
253
|
+
}
|
|
254
|
+
exports.CubeSigner = CubeSigner;
|
|
255
|
+
_CubeSigner_env = new WeakMap(), _CubeSigner_csc = new WeakMap();
|
|
256
|
+
/** Errors */
|
|
257
|
+
__exportStar(require("./error"), exports);
|
|
258
|
+
/** API */
|
|
259
|
+
__exportStar(require("./api"), exports);
|
|
260
|
+
/** Client */
|
|
261
|
+
__exportStar(require("./client"), exports);
|
|
262
|
+
/** Callbacks */
|
|
263
|
+
var events_1 = require("./events");
|
|
264
|
+
Object.defineProperty(exports, "Events", { enumerable: true, get: function () { return events_1.Events; } });
|
|
265
|
+
Object.defineProperty(exports, "GlobalEvents", { enumerable: true, get: function () { return events_1.GlobalEvents; } });
|
|
266
|
+
/** Organizations */
|
|
267
|
+
__exportStar(require("./org"), exports);
|
|
268
|
+
/** Keys */
|
|
269
|
+
__exportStar(require("./key"), exports);
|
|
270
|
+
/** Roles */
|
|
271
|
+
__exportStar(require("./role"), exports);
|
|
272
|
+
/** Env */
|
|
273
|
+
__exportStar(require("./env"), exports);
|
|
274
|
+
/** Fido */
|
|
275
|
+
__exportStar(require("./mfa"), exports);
|
|
276
|
+
/** Pagination */
|
|
277
|
+
__exportStar(require("./paginator"), exports);
|
|
278
|
+
/** Response */
|
|
279
|
+
__exportStar(require("./response"), exports);
|
|
280
|
+
/** Types */
|
|
281
|
+
__exportStar(require("./schema_types"), exports);
|
|
282
|
+
/** Sessions */
|
|
283
|
+
__exportStar(require("./signer_session"), exports);
|
|
284
|
+
/** Session storage */
|
|
285
|
+
__exportStar(require("./session/session_storage"), exports);
|
|
286
|
+
/** Signer session manager */
|
|
287
|
+
__exportStar(require("./session/signer_session_manager"), exports);
|
|
288
|
+
/** Utils */
|
|
289
|
+
__exportStar(require("./util"), exports);
|
|
290
|
+
/** User-export decryption helper */
|
|
291
|
+
var user_export_1 = require("./user_export");
|
|
292
|
+
Object.defineProperty(exports, "userExportDecrypt", { enumerable: true, get: function () { return user_export_1.userExportDecrypt; } });
|
|
293
|
+
Object.defineProperty(exports, "userExportKeygen", { enumerable: true, get: function () { return user_export_1.userExportKeygen; } });
|
|
294
|
+
/** CubeSigner SDK package name */
|
|
295
|
+
exports.NAME = package_json_1.name;
|
|
296
|
+
/** CubeSigner SDK version */
|
|
297
|
+
exports.VERSION = package_json_1.version;
|
|
298
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,+BAA2C;AAC3C,+BAA2C;AAC3C,qCAA4C;AAC5C,+BAA4B;AAE5B,6EAI0C;AAE1C,qDAAiD;AAEjD,oDAAkD;AAalD;;;;GAIG;AACH,MAAa,UAAU;IAKrB;;;OAGG;IACH,IAAI,GAAG;QACL,IAAI,CAAC,uBAAA,IAAI,uBAAK,EAAE,CAAC;YACf,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;QACjD,CAAC;QACD,OAAO,uBAAA,IAAI,uBAAK,CAAC;IACnB,CAAC;IAED,uEAAuE;IACvE,IAAI,GAAG;QACL,OAAO,uBAAA,IAAI,uBAAK,CAAC;IACnB,CAAC;IAED,sBAAsB;IACtB,IAAI,KAAK;QACP,OAAO,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC;IACxB,CAAC;IAED;;;OAGG;IACH,QAAQ,CAAC,KAAa;QACpB,uBAAA,IAAI,mBAAQ,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,MAAA,CAAC;IACtC,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,KAAK,CAAC,qBAAqB,CAAC,OAA6B;QAC9D,OAAO,IAAI,UAAU,CAAoB;YACvC,UAAU,EAAE,MAAM,6CAAoB,CAAC,eAAe,CAAC,OAAO,CAAC;SAChE,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAAC,OAA6B;QAC1D,OAAO,MAAM,8BAAa,CAAC,iBAAiB,CAAC,OAAO,CAAC,CAAC;IACxD,CAAC;IAED;;;OAGG;IACH,YAAY,OAA2B;QA1D9B,kCAAmB;QAE5B,kCAAwB;QAyDtB,IAAI,GAAG,GAAG,OAAO,EAAE,GAAG,CAAC;QACvB,IAAI,OAAO,EAAE,UAAU,EAAE,CAAC;YACxB,IAAI,CAAC,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC;YACrC,GAAG,GAAG,GAAG,IAAI,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC;QACnC,CAAC;QACD,uBAAA,IAAI,mBAAQ,GAAG,IAAI,UAAI,CAAC,OAAO,CAAC,MAAA,CAAC;QACjC,uBAAA,IAAI,mBAAQ,IAAI,yBAAgB;QAC9B,kFAAkF;QAClF,iFAAiF;QACjF,kFAAkF;QAClF,EAAE;QACF,4EAA4E;QAC5E,4FAA4F;QAC5F,OAAO,EAAE,UAA6C,EACtD,OAAO,EAAE,KAAK,CACf,MAAA,CAAC;IACJ,CAAC;IAED;;;;;;;;;OASG;IACH,KAAK,CAAC,QAAQ,CACZ,SAAiB,EACjB,KAAa,EACb,MAAqB,EACrB,SAAyB,EACzB,OAA8B;QAE9B,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,KAAK,EAAE,MAAM,EAAE,SAAS,CAAC,CAAC;QACvE,OAAO,MAAM,6CAAoB,CAAC,qBAAqB,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,EAAE,IAAI,CAAC,IAAI,EAAE,EAAE,OAAO,CAAC,CAAC;IACjG,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO;QACX,OAAO,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,CAAC;IAClC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,MAAM,CAAC,KAAa,EAAE,KAAa;QACvC,OAAO,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;IACrD,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO,CAAC,KAAa;QACzB,OAAO,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,OAAO,EAAE,CAAC;IACjD,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,UAAU,CAAC,KAAa,EAAE,KAAa;QAC3C,OAAO,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC;IACzD,CAAC;IAED,8DAA8D;IAC9D,IAAI,YAAY;QACd,OAAO,IAAI,CAAC,GAAG,CAAC,oBAAoB,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IACtD,CAAC;IAED;;;OAGG;IACH,IAAI,cAAc;QAChB,OAAO,IAAI,CAAC,GAAG,CAAC,iBAAiB,CAAC,IAAI,CAAC,uBAAA,IAAI,uBAAK,CAAC,CAAC;IACpD,CAAC;IAED;;;OAGG;IACH,IAAI,iBAAiB;QACnB,OAAO,IAAI,CAAC,GAAG,CAAC,qBAAqB,CAAC,IAAI,CAAC,uBAAA,IAAI,uBAAK,CAAC,CAAC;IACxD,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,IAAI,CAAC,GAAG,CAAC,cAAc,CAAC,IAAI,CAAC,uBAAA,IAAI,uBAAK,CAAC,CAAC;IACjD,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,MAAM,CAAC,KAAc;QACzB,OAAO,IAAI,SAAG,CAAC,IAAI,CAAC,GAAG,CAAC,UAAU,EAAE,KAAK,IAAI,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC;IAC/D,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,SAAS,CAAC,KAAa,EAAE,KAAa;QAC1C,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;IACjD,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,UAAU;QACd,IAAI,CAAC,IAAI,CAAC,UAAU,EAAE,CAAC;YACrB,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QACD,OAAO,MAAM,IAAI,CAAC,UAAU,CAAC,MAAM,EAAE,CAAC;IACxC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,aAAa,CAAC,KAAa;QAC/B,OAAO,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,aAAa,EAAE,CAAC;IACvD,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,iBAAiB,CAAC,SAAiB,EAAE,KAAa;QACtD,MAAM,UAAU,GAAG,IAAI,gBAAU,CAAC,uBAAA,IAAI,uBAAK,EAAE,KAAK,EAAE,SAAS,CAAC,CAAC;QAC/D,OAAO,MAAM,UAAU,CAAC,aAAa,EAAE,CAAC;IAC1C,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,cAAc,CAAC,KAAa,EAAE,aAA4B;QAC9D,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC;IAC9D,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,SAAS,CACb,SAAiB,EACjB,KAAa,EACb,MAAqB,EACrB,SAAyB,EACzB,UAAuB;QAEvB,MAAM,UAAU,GAAG,IAAI,gBAAU,CAAC,uBAAA,IAAI,uBAAK,EAAE,KAAK,EAAE,SAAS,CAAC,CAAC;QAC/D,OAAO,MAAM,UAAU,CAAC,aAAa,CAAC,MAAM,EAAE,SAAS,EAAE,UAAU,CAAC,CAAC;IACvE,CAAC;CACF;AAzPD,gCAyPC;;AAED,aAAa;AACb,0CAAwB;AACxB,UAAU;AACV,wCAAsB;AACtB,aAAa;AACb,2CAAyB;AACzB,gBAAgB;AAChB,mCAA+F;AAAtF,gGAAA,MAAM,OAAA;AAA4B,sGAAA,YAAY,OAAA;AACvD,oBAAoB;AACpB,wCAAsB;AACtB,WAAW;AACX,wCAAsB;AACtB,YAAY;AACZ,yCAAuB;AACvB,UAAU;AACV,wCAAsB;AACtB,WAAW;AACX,wCAAsB;AACtB,iBAAiB;AACjB,8CAA4B;AAC5B,eAAe;AACf,6CAA2B;AAC3B,YAAY;AACZ,iDAA+B;AAC/B,eAAe;AACf,mDAAiC;AACjC,sBAAsB;AACtB,4DAA0C;AAC1C,6BAA6B;AAC7B,mEAAiD;AACjD,YAAY;AACZ,yCAAuB;AACvB,oCAAoC;AACpC,6CAAoE;AAA3D,gHAAA,iBAAiB,OAAA;AAAE,+GAAA,gBAAgB,OAAA;AAE5C,kCAAkC;AACrB,QAAA,IAAI,GAAW,mBAAI,CAAC;AAEjC,6BAA6B;AAChB,QAAA,OAAO,GAAW,sBAAO,CAAC","sourcesContent":["import { envs, EnvInterface } from \"./env\";\nimport { Client, OidcClient } from \"./api\";\nimport { CubeSignerClient } from \"./client\";\nimport { Org } from \"./org\";\n\nimport {\n  SignerSessionStorage,\n  SignerSessionManager,\n  SignerSessionData,\n} from \"./session/signer_session_manager\";\nimport { CubeSignerResponse } from \"./response\";\nimport { SignerSession } from \"./signer_session\";\nimport { MfaReceipt } from \"./mfa\";\nimport { name, version } from \"./../package.json\";\nimport { IdentityProof, MfaRequestInfo, RatchetConfig, UserInfo } from \"./schema_types\";\n\n/** CubeSigner constructor options */\nexport interface CubeSignerOptions {\n  /** The environment to use */\n  env?: EnvInterface;\n  /** The management authorization token */\n  sessionMgr?: SignerSessionManager;\n  /** Optional organization id */\n  orgId?: string;\n}\n\n/**\n * CubeSigner client\n *\n * @deprecated Use {@link Org} or {@link CubeSignerClient} instead.\n */\nexport class CubeSigner {\n  readonly #env: EnvInterface;\n  readonly sessionMgr?: SignerSessionManager;\n  #csc?: CubeSignerClient;\n\n  /**\n   * Underlying {@link CubeSignerClient} instance, if set; otherwise throws.\n   * @internal\n   */\n  get csc(): CubeSignerClient {\n    if (!this.#csc) {\n      throw new Error(\"CubeSignerClient is not set\");\n    }\n    return this.#csc;\n  }\n\n  /** @return {EnvInterface} The CubeSigner environment of this client */\n  get env(): EnvInterface {\n    return this.#env;\n  }\n\n  /** Organization ID */\n  get orgId() {\n    return this.csc.orgId;\n  }\n\n  /**\n   * Set the organization ID\n   * @param {string} orgId The new organization id.\n   */\n  setOrgId(orgId: string) {\n    this.#csc = this.csc.withOrg(orgId);\n  }\n\n  /**\n   * Loads an existing management session and creates a CubeSigner instance.\n   *\n   * @param {SignerSessionStorage} storage Session storage to load the session from.\n   * @return {Promise<CubeSigner>} New CubeSigner instance\n   */\n  static async loadManagementSession(storage: SignerSessionStorage): Promise<CubeSigner> {\n    return new CubeSigner(<CubeSignerOptions>{\n      sessionMgr: await SignerSessionManager.loadFromStorage(storage),\n    });\n  }\n\n  /**\n   * Loads a signer session from a session storage (e.g., session file).\n   * @param {SignerSessionStorage} storage Session storage to load the session from.\n   * @return {Promise<SignerSession>} New signer session\n   */\n  static async loadSignerSession(storage: SignerSessionStorage): Promise<SignerSession> {\n    return await SignerSession.loadSignerSession(storage);\n  }\n\n  /**\n   * Create a new CubeSigner instance.\n   * @param {CubeSignerOptions} options The optional configuration options for the CubeSigner instance.\n   */\n  constructor(options?: CubeSignerOptions) {\n    let env = options?.env;\n    if (options?.sessionMgr) {\n      this.sessionMgr = options.sessionMgr;\n      env = env ?? this.sessionMgr.env;\n    }\n    this.#env = env ?? envs[\"gamma\"];\n    this.#csc = new CubeSignerClient(\n      // HACK: ignore that sessionMgr may be a CognitoSessionManager and pretend that it\n      //       is a SignerSessionManager; that's fine because the CubeSignerClient will\n      //       almost always just call `await token()` on it, which works in both cases.\n      //\n      // This is done here for backward compatibility reasons only; in the future,\n      // we should deprecate this class and people should start using `CubeSingerClient` directly.\n      options?.sessionMgr as unknown as SignerSessionManager,\n      options?.orgId,\n    );\n  }\n\n  /**\n   * Authenticate an OIDC user and create a new session manager for them.\n   *\n   * @param {string} oidcToken The OIDC token\n   * @param {string} orgId The id of the organization that the user is in\n   * @param {List<string>} scopes The scopes of the resulting session\n   * @param {RatchetConfig} lifetimes Lifetimes of the new session.\n   * @param {SignerSessionStorage?} storage Optional signer session storage (defaults to in-memory storage)\n   * @return {Promise<SignerSessionManager>} The signer session manager\n   */\n  async oidcAuth(\n    oidcToken: string,\n    orgId: string,\n    scopes: Array<string>,\n    lifetimes?: RatchetConfig,\n    storage?: SignerSessionStorage,\n  ): Promise<SignerSessionManager> {\n    const resp = await this.oidcLogin(oidcToken, orgId, scopes, lifetimes);\n    return await SignerSessionManager.createFromSessionInfo(this.env, orgId, resp.data(), storage);\n  }\n\n  /**\n   * Retrieves information about the current user.\n   *\n   * @return {Promise<UserInfo>} User information.\n   */\n  async aboutMe(): Promise<UserInfo> {\n    return await this.csc.userGet();\n  }\n\n  /**\n   * Retrieves existing MFA request.\n   *\n   * @param {string} orgId Organization ID\n   * @param {string} mfaId MFA request ID\n   * @return {Promise<MfaRequestInfo>} MFA request information\n   */\n  async mfaGet(orgId: string, mfaId: string): Promise<MfaRequestInfo> {\n    return await this.csc.withOrg(orgId).mfaGet(mfaId);\n  }\n\n  /**\n   * List pending MFA requests accessible to the current user.\n   * @param {string} orgId Organization ID\n   * @return {Promise<MfaRequestInfo[]>} The MFA requests.\n   */\n  async mfaList(orgId: string): Promise<MfaRequestInfo[]> {\n    return await this.csc.withOrg(orgId).mfaList();\n  }\n\n  /**\n   * Approve a pending MFA request.\n   *\n   * @param {string} orgId The org id of the MFA request\n   * @param {string} mfaId The id of the MFA request\n   * @return {Promise<MfaRequestInfo>} The result of the MFA request\n   */\n  async mfaApprove(orgId: string, mfaId: string): Promise<MfaRequestInfo> {\n    return await this.csc.withOrg(orgId).mfaApprove(mfaId);\n  }\n\n  /** Initiate adding a new FIDO device. MFA may be required. */\n  get addFidoStart() {\n    return this.csc.userFidoRegisterInit.bind(this.csc);\n  }\n\n  /**\n   * Creates a request to change user's TOTP. This request returns a new TOTP challenge\n   * that must be answered by calling `resetTotpComplete`\n   */\n  get resetTotpStart() {\n    return this.csc.userTotpResetInit.bind(this.#csc);\n  }\n\n  /**\n   * Answer the TOTP challenge issued by `resetTotpStart`. If successful, user's\n   * TOTP configuration will be updated to that of the TOTP challenge.he TOTP configuration from the challenge.\n   */\n  get resetTotpComplete() {\n    return this.csc.userTotpResetComplete.bind(this.#csc);\n  }\n\n  /**\n   * Verifies a given TOTP code against the current user's TOTP configuration.\n   * Throws an error if the verification fails.\n   */\n  get verifyTotp() {\n    return this.csc.userTotpVerify.bind(this.#csc);\n  }\n\n  /**\n   * Retrieve information about an organization.\n   * @param {string} orgId The ID or name of the organization.\n   * @return {Org} The organization.\n   */\n  async getOrg(orgId?: string): Promise<Org> {\n    return new Org(this.csc.sessionMgr, orgId ?? this.csc.orgId);\n  }\n\n  /**\n   * Deletes a given key.\n   * @param {string} orgId - Organization id\n   * @param {string} keyId - Key id\n   */\n  async deleteKey(orgId: string, keyId: string) {\n    await this.csc.withOrg(orgId).keyDelete(keyId);\n  }\n\n  /**\n   * Get the management client.\n   * @return {Client} The client.\n   * @internal\n   */\n  async management(): Promise<Client> {\n    if (!this.sessionMgr) {\n      throw new Error(\"No management session loaded\");\n    }\n    return await this.sessionMgr.client();\n  }\n\n  /**\n   * Obtain a proof of authentication.\n   *\n   * @param {string} orgId The id of the organization that the user is in\n   * @return {Promise<IdentityProof>} Proof of authentication\n   */\n  async proveIdentity(orgId: string): Promise<IdentityProof> {\n    return await this.csc.withOrg(orgId).identityProve();\n  }\n\n  /**\n   * Exchange an OIDC token for a proof of authentication.\n   *\n   * @param {string} oidcToken The OIDC token\n   * @param {string} orgId The id of the organization that the user is in\n   * @return {Promise<IdentityProof>} Proof of authentication\n   */\n  async oidcProveIdentity(oidcToken: string, orgId: string): Promise<IdentityProof> {\n    const oidcClient = new OidcClient(this.#env, orgId, oidcToken);\n    return await oidcClient.identityProve();\n  }\n\n  /**\n   * Checks if a given identity proof is valid.\n   *\n   * @param {string} orgId The id of the organization that the user is in.\n   * @param {IdentityProof} identityProof The proof of authentication.\n   */\n  async verifyIdentity(orgId: string, identityProof: IdentityProof) {\n    await this.csc.withOrg(orgId).identityVerify(identityProof);\n  }\n\n  /**\n   * Exchange an OIDC token for a CubeSigner session token.\n   * @param {string} oidcToken The OIDC token\n   * @param {string} orgId The id of the organization that the user is in\n   * @param {List<string>} scopes The scopes of the resulting session\n   * @param {RatchetConfig} lifetimes Lifetimes of the new session.\n   * @param {MfaReceipt} mfaReceipt Optional MFA receipt (id + confirmation code)\n   * @return {Promise<CubeSignerResponse<SignerSessionData>>} The session data.\n   */\n  async oidcLogin(\n    oidcToken: string,\n    orgId: string,\n    scopes: Array<string>,\n    lifetimes?: RatchetConfig,\n    mfaReceipt?: MfaReceipt,\n  ): Promise<CubeSignerResponse<SignerSessionData>> {\n    const oidcClient = new OidcClient(this.#env, orgId, oidcToken);\n    return await oidcClient.sessionCreate(scopes, lifetimes, mfaReceipt);\n  }\n}\n\n/** Errors */\nexport * from \"./error\";\n/** API */\nexport * from \"./api\";\n/** Client */\nexport * from \"./client\";\n/** Callbacks */\nexport { Events, EventHandler, ErrorEvent, GlobalEvents, SessionExpiredEvent } from \"./events\";\n/** Organizations */\nexport * from \"./org\";\n/** Keys */\nexport * from \"./key\";\n/** Roles */\nexport * from \"./role\";\n/** Env */\nexport * from \"./env\";\n/** Fido */\nexport * from \"./mfa\";\n/** Pagination */\nexport * from \"./paginator\";\n/** Response */\nexport * from \"./response\";\n/** Types */\nexport * from \"./schema_types\";\n/** Sessions */\nexport * from \"./signer_session\";\n/** Session storage */\nexport * from \"./session/session_storage\";\n/** Signer session manager */\nexport * from \"./session/signer_session_manager\";\n/** Utils */\nexport * from \"./util\";\n/** User-export decryption helper */\nexport { userExportDecrypt, userExportKeygen } from \"./user_export\";\n\n/** CubeSigner SDK package name */\nexport const NAME: string = name;\n\n/** CubeSigner SDK version */\nexport const VERSION: string = version;\n"]}
|
|
@@ -0,0 +1,152 @@
|
|
|
1
|
+
import { KeyPolicy } from "./role";
|
|
2
|
+
import { KeyInfoApi, KeyTypeApi, SchemaKeyType } from "./schema_types";
|
|
3
|
+
import { CubeSignerClient } from "./client";
|
|
4
|
+
/** Secp256k1 key type */
|
|
5
|
+
export declare enum Secp256k1 {
|
|
6
|
+
Evm = "SecpEthAddr",// eslint-disable-line no-unused-vars
|
|
7
|
+
Btc = "SecpBtc",// eslint-disable-line no-unused-vars
|
|
8
|
+
BtcTest = "SecpBtcTest",// eslint-disable-line no-unused-vars
|
|
9
|
+
Ava = "SecpAvaAddr",// eslint-disable-line no-unused-vars
|
|
10
|
+
AvaTest = "SecpAvaTestAddr"
|
|
11
|
+
}
|
|
12
|
+
/** BLS key type */
|
|
13
|
+
export declare enum Bls {
|
|
14
|
+
Eth2Deposited = "BlsPub",// eslint-disable-line no-unused-vars
|
|
15
|
+
Eth2Inactive = "BlsInactive"
|
|
16
|
+
}
|
|
17
|
+
/** Ed25519 key type */
|
|
18
|
+
export declare enum Ed25519 {
|
|
19
|
+
Solana = "Ed25519SolanaAddr",// eslint-disable-line no-unused-vars
|
|
20
|
+
Sui = "Ed25519SuiAddr",// eslint-disable-line no-unused-vars
|
|
21
|
+
Aptos = "Ed25519AptosAddr",// eslint-disable-line no-unused-vars
|
|
22
|
+
Cardano = "Ed25519CardanoAddrVk",// eslint-disable-line no-unused-vars
|
|
23
|
+
Stellar = "Ed25519StellarAddr"
|
|
24
|
+
}
|
|
25
|
+
/** Mnemonic key type */
|
|
26
|
+
export declare const Mnemonic: "Mnemonic";
|
|
27
|
+
export type Mnemonic = typeof Mnemonic;
|
|
28
|
+
/** Stark key type */
|
|
29
|
+
export declare const Stark: "Stark";
|
|
30
|
+
export type Stark = typeof Stark;
|
|
31
|
+
/** Key type */
|
|
32
|
+
export type KeyType = Secp256k1 | Bls | Ed25519 | Mnemonic | Stark;
|
|
33
|
+
/** Additional properties (for backward compatibility) */
|
|
34
|
+
export interface KeyInfo extends KeyInfoApi {
|
|
35
|
+
/** Alias for key_id */
|
|
36
|
+
id: string;
|
|
37
|
+
/** Alias for key_type */
|
|
38
|
+
type: KeyTypeApi;
|
|
39
|
+
/** Alias for material_id */
|
|
40
|
+
materialId: string;
|
|
41
|
+
/** Alias for public_key */
|
|
42
|
+
publicKey: string;
|
|
43
|
+
}
|
|
44
|
+
/**
|
|
45
|
+
* Define some additional (backward compatibility) properties
|
|
46
|
+
* on a `KeyInfoApi` object returned from the remote end.
|
|
47
|
+
*
|
|
48
|
+
* @param {KeyInfoApi} key Key information returned from the remote end
|
|
49
|
+
* @return {KeyInfo} The same `key` object extended with some derived properties.
|
|
50
|
+
*/
|
|
51
|
+
export declare function toKeyInfo(key: KeyInfoApi): KeyInfo;
|
|
52
|
+
/**
|
|
53
|
+
* A representation of a signing key.
|
|
54
|
+
*/
|
|
55
|
+
export declare class Key {
|
|
56
|
+
#private;
|
|
57
|
+
/** The CubeSigner instance that this key is associated with */
|
|
58
|
+
protected readonly csc: CubeSignerClient;
|
|
59
|
+
/** The organization that this key is in */
|
|
60
|
+
get orgId(): string;
|
|
61
|
+
/**
|
|
62
|
+
* The id of the key: "Key#" followed by a unique identifier specific to
|
|
63
|
+
* the type of key (such as a public key for BLS or an ethereum address for Secp)
|
|
64
|
+
* @example Key#0x8e3484687e66cdd26cf04c3647633ab4f3570148
|
|
65
|
+
*/
|
|
66
|
+
get id(): string;
|
|
67
|
+
/**
|
|
68
|
+
* A unique identifier specific to the type of key, such as a public key or an ethereum address
|
|
69
|
+
* @example 0x8e3484687e66cdd26cf04c3647633ab4f3570148
|
|
70
|
+
*/
|
|
71
|
+
get materialId(): string;
|
|
72
|
+
/**
|
|
73
|
+
* @description Hex-encoded, serialized public key. The format used depends on the key type:
|
|
74
|
+
* - secp256k1 keys use 65-byte uncompressed SECG format
|
|
75
|
+
* - BLS keys use 48-byte compressed BLS12-381 (ZCash) format
|
|
76
|
+
* @example 0x04d2688b6bc2ce7f9879b9e745f3c4dc177908c5cef0c1b64cff19ae7ff27dee623c64fe9d9c325c7fbbc748bbd5f607ce14dd83e28ebbbb7d3e7f2ffb70a79431
|
|
77
|
+
*/
|
|
78
|
+
get publicKey(): string;
|
|
79
|
+
/**
|
|
80
|
+
* Get the cached properties of this key. The cached properties reflect the
|
|
81
|
+
* state of the last fetch or update (e.g., after awaiting `Key.enabled()`
|
|
82
|
+
* or `Key.disable()`).
|
|
83
|
+
*/
|
|
84
|
+
get cached(): KeyInfo;
|
|
85
|
+
/** The type of key. */
|
|
86
|
+
type(): Promise<KeyType>;
|
|
87
|
+
/** Is the key enabled? */
|
|
88
|
+
enabled(): Promise<boolean>;
|
|
89
|
+
/** Enable the key. */
|
|
90
|
+
enable(): Promise<void>;
|
|
91
|
+
/** Disable the key. */
|
|
92
|
+
disable(): Promise<void>;
|
|
93
|
+
/**
|
|
94
|
+
* Set new policy (overwriting any policies previously set for this key)
|
|
95
|
+
* @param {KeyPolicy} policy The new policy to set
|
|
96
|
+
*/
|
|
97
|
+
setPolicy(policy: KeyPolicy): Promise<void>;
|
|
98
|
+
/**
|
|
99
|
+
* Append to existing key policy. This append is not atomic -- it uses {@link policy} to fetch the current policy and then {@link setPolicy} to set the policy -- and should not be used in across concurrent sessions.
|
|
100
|
+
* @param {KeyPolicy} policy The policy to append to the existing one.
|
|
101
|
+
*/
|
|
102
|
+
appendPolicy(policy: KeyPolicy): Promise<void>;
|
|
103
|
+
/**
|
|
104
|
+
* Get the policy for the key.
|
|
105
|
+
* @return {Promise<KeyPolicy>} The policy for the key.
|
|
106
|
+
*/
|
|
107
|
+
policy(): Promise<KeyPolicy>;
|
|
108
|
+
/**
|
|
109
|
+
* @description Owner of the key
|
|
110
|
+
* @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
|
|
111
|
+
*/
|
|
112
|
+
owner(): Promise<string>;
|
|
113
|
+
/**
|
|
114
|
+
* Set the owner of the key. Only the key (or org) owner can change the owner of the key.
|
|
115
|
+
* @param {string} owner The user-id of the new owner of the key.
|
|
116
|
+
*/
|
|
117
|
+
setOwner(owner: string): Promise<void>;
|
|
118
|
+
/**
|
|
119
|
+
* Delete this key.
|
|
120
|
+
*/
|
|
121
|
+
delete(): Promise<void>;
|
|
122
|
+
/**
|
|
123
|
+
* Create a new key.
|
|
124
|
+
*
|
|
125
|
+
* @param {CubeSignerClient} csc The CubeSigner instance to use for signing.
|
|
126
|
+
* @param {KeyInfoApi} data The JSON response from the API server.
|
|
127
|
+
* @internal
|
|
128
|
+
*/
|
|
129
|
+
constructor(csc: CubeSignerClient, data: KeyInfoApi);
|
|
130
|
+
/**
|
|
131
|
+
* Update the key.
|
|
132
|
+
* @param {UpdateKeyRequest} request The JSON request to send to the API server.
|
|
133
|
+
* @return {KeyInfo} The JSON response from the API server.
|
|
134
|
+
* @internal
|
|
135
|
+
*/
|
|
136
|
+
private update;
|
|
137
|
+
/**
|
|
138
|
+
* Fetch the key information.
|
|
139
|
+
*
|
|
140
|
+
* @return {KeyInfo} The key information.
|
|
141
|
+
* @internal
|
|
142
|
+
*/
|
|
143
|
+
private fetch;
|
|
144
|
+
}
|
|
145
|
+
/**
|
|
146
|
+
* Convert a schema key type to a key type.
|
|
147
|
+
*
|
|
148
|
+
* @param {SchemaKeyType} ty The schema key type.
|
|
149
|
+
* @return {KeyType} The key type.
|
|
150
|
+
* @internal
|
|
151
|
+
*/
|
|
152
|
+
export declare function fromSchemaKeyType(ty: SchemaKeyType): KeyType;
|