@cubist-labs/cubesigner-sdk 0.2.28 → 0.3.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (143) hide show
  1. package/README.md +30 -28
  2. package/dist/cjs/package.json +41 -0
  3. package/dist/cjs/spec/env/beta.json +9 -0
  4. package/dist/cjs/spec/env/gamma.json +9 -0
  5. package/dist/cjs/spec/env/prod.json +9 -0
  6. package/dist/cjs/src/api.d.ts +634 -0
  7. package/dist/cjs/src/api.js +1309 -0
  8. package/dist/cjs/src/client.d.ts +575 -0
  9. package/dist/cjs/src/client.js +378 -0
  10. package/dist/cjs/src/env.d.ts +15 -0
  11. package/dist/cjs/src/env.js +35 -0
  12. package/dist/cjs/src/error.d.ts +29 -0
  13. package/dist/cjs/src/error.js +36 -0
  14. package/dist/cjs/src/events.d.ts +84 -0
  15. package/dist/cjs/src/events.js +195 -0
  16. package/dist/cjs/src/index.d.ts +203 -0
  17. package/dist/cjs/src/index.js +298 -0
  18. package/dist/cjs/src/key.d.ts +152 -0
  19. package/dist/cjs/src/key.js +242 -0
  20. package/dist/{src/fido.d.ts → cjs/src/mfa.d.ts} +33 -15
  21. package/dist/cjs/src/mfa.js +169 -0
  22. package/dist/cjs/src/org.d.ts +99 -0
  23. package/dist/cjs/src/org.js +95 -0
  24. package/dist/cjs/src/paginator.d.ts +76 -0
  25. package/dist/cjs/src/paginator.js +99 -0
  26. package/dist/cjs/src/response.d.ts +101 -0
  27. package/dist/cjs/src/response.js +164 -0
  28. package/dist/cjs/src/role.d.ts +283 -0
  29. package/dist/cjs/src/role.js +253 -0
  30. package/dist/cjs/src/schema.d.ts +6209 -0
  31. package/dist/cjs/src/schema.js +7 -0
  32. package/dist/cjs/src/schema_types.d.ts +113 -0
  33. package/dist/cjs/src/schema_types.js +3 -0
  34. package/dist/cjs/src/session/session_storage.d.ts +27 -0
  35. package/dist/cjs/src/session/session_storage.js +47 -0
  36. package/dist/cjs/src/session/signer_session_manager.d.ts +125 -0
  37. package/dist/cjs/src/session/signer_session_manager.js +239 -0
  38. package/dist/cjs/src/signer_session.d.ts +41 -0
  39. package/dist/cjs/src/signer_session.js +77 -0
  40. package/dist/cjs/src/user_export.d.ts +52 -0
  41. package/dist/cjs/src/user_export.js +129 -0
  42. package/dist/cjs/src/util.d.ts +56 -0
  43. package/dist/cjs/src/util.js +86 -0
  44. package/dist/esm/package.json +41 -0
  45. package/dist/esm/spec/env/beta.json +9 -0
  46. package/dist/esm/spec/env/gamma.json +9 -0
  47. package/dist/esm/spec/env/prod.json +9 -0
  48. package/dist/esm/src/api.d.ts +634 -0
  49. package/dist/esm/src/api.js +1299 -0
  50. package/dist/esm/src/client.d.ts +575 -0
  51. package/dist/esm/src/client.js +374 -0
  52. package/dist/esm/src/env.d.ts +15 -0
  53. package/dist/esm/src/env.js +9 -0
  54. package/dist/esm/src/error.d.ts +29 -0
  55. package/dist/esm/src/error.js +31 -0
  56. package/dist/esm/src/events.d.ts +84 -0
  57. package/dist/esm/src/events.js +189 -0
  58. package/dist/esm/src/index.d.ts +203 -0
  59. package/dist/esm/src/index.js +276 -0
  60. package/dist/esm/src/key.d.ts +152 -0
  61. package/dist/esm/src/key.js +236 -0
  62. package/dist/esm/src/mfa.d.ts +94 -0
  63. package/dist/esm/src/mfa.js +163 -0
  64. package/dist/esm/src/org.d.ts +99 -0
  65. package/dist/esm/src/org.js +91 -0
  66. package/dist/esm/src/paginator.d.ts +76 -0
  67. package/dist/esm/src/paginator.js +94 -0
  68. package/dist/esm/src/response.d.ts +101 -0
  69. package/dist/esm/src/response.js +159 -0
  70. package/dist/esm/src/role.d.ts +283 -0
  71. package/dist/esm/src/role.js +248 -0
  72. package/dist/esm/src/schema.d.ts +6209 -0
  73. package/dist/esm/src/schema.js +6 -0
  74. package/dist/esm/src/schema_types.d.ts +113 -0
  75. package/dist/esm/src/schema_types.js +2 -0
  76. package/dist/esm/src/session/session_storage.d.ts +27 -0
  77. package/dist/esm/src/session/session_storage.js +43 -0
  78. package/dist/esm/src/session/signer_session_manager.d.ts +125 -0
  79. package/dist/esm/src/session/signer_session_manager.js +235 -0
  80. package/dist/esm/src/signer_session.d.ts +41 -0
  81. package/dist/esm/src/signer_session.js +72 -0
  82. package/dist/esm/src/user_export.d.ts +52 -0
  83. package/dist/esm/src/user_export.js +99 -0
  84. package/dist/esm/src/util.d.ts +56 -0
  85. package/dist/esm/src/util.js +76 -0
  86. package/dist/package.json +13 -45
  87. package/dist/src/api.d.ts +29 -1
  88. package/dist/src/api.js +66 -1
  89. package/dist/src/client.d.ts +35 -14
  90. package/dist/src/client.js +12 -8
  91. package/dist/src/events.js +1 -1
  92. package/dist/src/index.d.ts +6 -11
  93. package/dist/src/index.js +9 -25
  94. package/dist/src/key.d.ts +18 -7
  95. package/dist/src/key.js +52 -19
  96. package/dist/src/role.d.ts +46 -3
  97. package/dist/src/role.js +60 -8
  98. package/dist/src/schema.d.ts +206 -72
  99. package/dist/src/schema.js +1 -1
  100. package/dist/src/schema_types.d.ts +3 -0
  101. package/dist/src/schema_types.js +1 -1
  102. package/dist/src/session/signer_session_manager.d.ts +38 -14
  103. package/dist/src/session/signer_session_manager.js +93 -33
  104. package/dist/src/util.d.ts +14 -0
  105. package/dist/src/util.js +24 -27
  106. package/package.json +19 -46
  107. package/src/api.ts +79 -0
  108. package/src/client.ts +12 -8
  109. package/src/events.ts +2 -0
  110. package/src/index.ts +10 -24
  111. package/src/key.ts +36 -18
  112. package/src/role.ts +78 -7
  113. package/src/schema.ts +269 -110
  114. package/src/schema_types.ts +3 -0
  115. package/src/session/session_storage.ts +0 -32
  116. package/src/session/signer_session_manager.ts +124 -36
  117. package/src/util.ts +19 -10
  118. package/tsconfig.json +1 -21
  119. package/LICENSE-APACHE +0 -177
  120. package/LICENSE-MIT +0 -25
  121. package/NOTICE +0 -13
  122. package/dist/examples/ethers.d.ts +0 -1
  123. package/dist/examples/ethers.js +0 -142
  124. package/dist/src/ethers/index.d.ts +0 -95
  125. package/dist/src/ethers/index.js +0 -215
  126. package/dist/src/fido.js +0 -148
  127. package/dist/src/session/cognito_manager.d.ts +0 -71
  128. package/dist/src/session/cognito_manager.js +0 -129
  129. package/dist/src/session/generic.d.ts +0 -47
  130. package/dist/src/session/generic.js +0 -3
  131. package/dist/src/session/management_session_manager.d.ts +0 -59
  132. package/dist/src/session/management_session_manager.js +0 -111
  133. package/dist/src/session/oidc_session_manager.d.ts +0 -78
  134. package/dist/src/session/oidc_session_manager.js +0 -142
  135. package/dist/src/session/session_manager.d.ts +0 -99
  136. package/dist/src/session/session_manager.js +0 -136
  137. package/dist/src/sign.d.ts +0 -114
  138. package/dist/src/sign.js +0 -248
  139. package/dist/test/sessions.d.ts +0 -35
  140. package/dist/test/sessions.js +0 -56
  141. package/src/ethers/index.ts +0 -253
  142. package/src/session/cognito_manager.ts +0 -161
  143. package/src/session/session_manager.ts +0 -165
@@ -0,0 +1,298 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __exportStar = (this && this.__exportStar) || function(m, exports) {
14
+ for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
15
+ };
16
+ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
17
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
18
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
19
+ return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
20
+ };
21
+ var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
22
+ if (kind === "m") throw new TypeError("Private method is not writable");
23
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
24
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
25
+ return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
26
+ };
27
+ var _CubeSigner_env, _CubeSigner_csc;
28
+ Object.defineProperty(exports, "__esModule", { value: true });
29
+ exports.VERSION = exports.NAME = exports.userExportKeygen = exports.userExportDecrypt = exports.GlobalEvents = exports.Events = exports.CubeSigner = void 0;
30
+ const env_1 = require("./env");
31
+ const api_1 = require("./api");
32
+ const client_1 = require("./client");
33
+ const org_1 = require("./org");
34
+ const signer_session_manager_1 = require("./session/signer_session_manager");
35
+ const signer_session_1 = require("./signer_session");
36
+ const package_json_1 = require("./../package.json");
37
+ /**
38
+ * CubeSigner client
39
+ *
40
+ * @deprecated Use {@link Org} or {@link CubeSignerClient} instead.
41
+ */
42
+ class CubeSigner {
43
+ /**
44
+ * Underlying {@link CubeSignerClient} instance, if set; otherwise throws.
45
+ * @internal
46
+ */
47
+ get csc() {
48
+ if (!__classPrivateFieldGet(this, _CubeSigner_csc, "f")) {
49
+ throw new Error("CubeSignerClient is not set");
50
+ }
51
+ return __classPrivateFieldGet(this, _CubeSigner_csc, "f");
52
+ }
53
+ /** @return {EnvInterface} The CubeSigner environment of this client */
54
+ get env() {
55
+ return __classPrivateFieldGet(this, _CubeSigner_env, "f");
56
+ }
57
+ /** Organization ID */
58
+ get orgId() {
59
+ return this.csc.orgId;
60
+ }
61
+ /**
62
+ * Set the organization ID
63
+ * @param {string} orgId The new organization id.
64
+ */
65
+ setOrgId(orgId) {
66
+ __classPrivateFieldSet(this, _CubeSigner_csc, this.csc.withOrg(orgId), "f");
67
+ }
68
+ /**
69
+ * Loads an existing management session and creates a CubeSigner instance.
70
+ *
71
+ * @param {SignerSessionStorage} storage Session storage to load the session from.
72
+ * @return {Promise<CubeSigner>} New CubeSigner instance
73
+ */
74
+ static async loadManagementSession(storage) {
75
+ return new CubeSigner({
76
+ sessionMgr: await signer_session_manager_1.SignerSessionManager.loadFromStorage(storage),
77
+ });
78
+ }
79
+ /**
80
+ * Loads a signer session from a session storage (e.g., session file).
81
+ * @param {SignerSessionStorage} storage Session storage to load the session from.
82
+ * @return {Promise<SignerSession>} New signer session
83
+ */
84
+ static async loadSignerSession(storage) {
85
+ return await signer_session_1.SignerSession.loadSignerSession(storage);
86
+ }
87
+ /**
88
+ * Create a new CubeSigner instance.
89
+ * @param {CubeSignerOptions} options The optional configuration options for the CubeSigner instance.
90
+ */
91
+ constructor(options) {
92
+ _CubeSigner_env.set(this, void 0);
93
+ _CubeSigner_csc.set(this, void 0);
94
+ let env = options?.env;
95
+ if (options?.sessionMgr) {
96
+ this.sessionMgr = options.sessionMgr;
97
+ env = env ?? this.sessionMgr.env;
98
+ }
99
+ __classPrivateFieldSet(this, _CubeSigner_env, env ?? env_1.envs["gamma"], "f");
100
+ __classPrivateFieldSet(this, _CubeSigner_csc, new client_1.CubeSignerClient(
101
+ // HACK: ignore that sessionMgr may be a CognitoSessionManager and pretend that it
102
+ // is a SignerSessionManager; that's fine because the CubeSignerClient will
103
+ // almost always just call `await token()` on it, which works in both cases.
104
+ //
105
+ // This is done here for backward compatibility reasons only; in the future,
106
+ // we should deprecate this class and people should start using `CubeSingerClient` directly.
107
+ options?.sessionMgr, options?.orgId), "f");
108
+ }
109
+ /**
110
+ * Authenticate an OIDC user and create a new session manager for them.
111
+ *
112
+ * @param {string} oidcToken The OIDC token
113
+ * @param {string} orgId The id of the organization that the user is in
114
+ * @param {List<string>} scopes The scopes of the resulting session
115
+ * @param {RatchetConfig} lifetimes Lifetimes of the new session.
116
+ * @param {SignerSessionStorage?} storage Optional signer session storage (defaults to in-memory storage)
117
+ * @return {Promise<SignerSessionManager>} The signer session manager
118
+ */
119
+ async oidcAuth(oidcToken, orgId, scopes, lifetimes, storage) {
120
+ const resp = await this.oidcLogin(oidcToken, orgId, scopes, lifetimes);
121
+ return await signer_session_manager_1.SignerSessionManager.createFromSessionInfo(this.env, orgId, resp.data(), storage);
122
+ }
123
+ /**
124
+ * Retrieves information about the current user.
125
+ *
126
+ * @return {Promise<UserInfo>} User information.
127
+ */
128
+ async aboutMe() {
129
+ return await this.csc.userGet();
130
+ }
131
+ /**
132
+ * Retrieves existing MFA request.
133
+ *
134
+ * @param {string} orgId Organization ID
135
+ * @param {string} mfaId MFA request ID
136
+ * @return {Promise<MfaRequestInfo>} MFA request information
137
+ */
138
+ async mfaGet(orgId, mfaId) {
139
+ return await this.csc.withOrg(orgId).mfaGet(mfaId);
140
+ }
141
+ /**
142
+ * List pending MFA requests accessible to the current user.
143
+ * @param {string} orgId Organization ID
144
+ * @return {Promise<MfaRequestInfo[]>} The MFA requests.
145
+ */
146
+ async mfaList(orgId) {
147
+ return await this.csc.withOrg(orgId).mfaList();
148
+ }
149
+ /**
150
+ * Approve a pending MFA request.
151
+ *
152
+ * @param {string} orgId The org id of the MFA request
153
+ * @param {string} mfaId The id of the MFA request
154
+ * @return {Promise<MfaRequestInfo>} The result of the MFA request
155
+ */
156
+ async mfaApprove(orgId, mfaId) {
157
+ return await this.csc.withOrg(orgId).mfaApprove(mfaId);
158
+ }
159
+ /** Initiate adding a new FIDO device. MFA may be required. */
160
+ get addFidoStart() {
161
+ return this.csc.userFidoRegisterInit.bind(this.csc);
162
+ }
163
+ /**
164
+ * Creates a request to change user's TOTP. This request returns a new TOTP challenge
165
+ * that must be answered by calling `resetTotpComplete`
166
+ */
167
+ get resetTotpStart() {
168
+ return this.csc.userTotpResetInit.bind(__classPrivateFieldGet(this, _CubeSigner_csc, "f"));
169
+ }
170
+ /**
171
+ * Answer the TOTP challenge issued by `resetTotpStart`. If successful, user's
172
+ * TOTP configuration will be updated to that of the TOTP challenge.he TOTP configuration from the challenge.
173
+ */
174
+ get resetTotpComplete() {
175
+ return this.csc.userTotpResetComplete.bind(__classPrivateFieldGet(this, _CubeSigner_csc, "f"));
176
+ }
177
+ /**
178
+ * Verifies a given TOTP code against the current user's TOTP configuration.
179
+ * Throws an error if the verification fails.
180
+ */
181
+ get verifyTotp() {
182
+ return this.csc.userTotpVerify.bind(__classPrivateFieldGet(this, _CubeSigner_csc, "f"));
183
+ }
184
+ /**
185
+ * Retrieve information about an organization.
186
+ * @param {string} orgId The ID or name of the organization.
187
+ * @return {Org} The organization.
188
+ */
189
+ async getOrg(orgId) {
190
+ return new org_1.Org(this.csc.sessionMgr, orgId ?? this.csc.orgId);
191
+ }
192
+ /**
193
+ * Deletes a given key.
194
+ * @param {string} orgId - Organization id
195
+ * @param {string} keyId - Key id
196
+ */
197
+ async deleteKey(orgId, keyId) {
198
+ await this.csc.withOrg(orgId).keyDelete(keyId);
199
+ }
200
+ /**
201
+ * Get the management client.
202
+ * @return {Client} The client.
203
+ * @internal
204
+ */
205
+ async management() {
206
+ if (!this.sessionMgr) {
207
+ throw new Error("No management session loaded");
208
+ }
209
+ return await this.sessionMgr.client();
210
+ }
211
+ /**
212
+ * Obtain a proof of authentication.
213
+ *
214
+ * @param {string} orgId The id of the organization that the user is in
215
+ * @return {Promise<IdentityProof>} Proof of authentication
216
+ */
217
+ async proveIdentity(orgId) {
218
+ return await this.csc.withOrg(orgId).identityProve();
219
+ }
220
+ /**
221
+ * Exchange an OIDC token for a proof of authentication.
222
+ *
223
+ * @param {string} oidcToken The OIDC token
224
+ * @param {string} orgId The id of the organization that the user is in
225
+ * @return {Promise<IdentityProof>} Proof of authentication
226
+ */
227
+ async oidcProveIdentity(oidcToken, orgId) {
228
+ const oidcClient = new api_1.OidcClient(__classPrivateFieldGet(this, _CubeSigner_env, "f"), orgId, oidcToken);
229
+ return await oidcClient.identityProve();
230
+ }
231
+ /**
232
+ * Checks if a given identity proof is valid.
233
+ *
234
+ * @param {string} orgId The id of the organization that the user is in.
235
+ * @param {IdentityProof} identityProof The proof of authentication.
236
+ */
237
+ async verifyIdentity(orgId, identityProof) {
238
+ await this.csc.withOrg(orgId).identityVerify(identityProof);
239
+ }
240
+ /**
241
+ * Exchange an OIDC token for a CubeSigner session token.
242
+ * @param {string} oidcToken The OIDC token
243
+ * @param {string} orgId The id of the organization that the user is in
244
+ * @param {List<string>} scopes The scopes of the resulting session
245
+ * @param {RatchetConfig} lifetimes Lifetimes of the new session.
246
+ * @param {MfaReceipt} mfaReceipt Optional MFA receipt (id + confirmation code)
247
+ * @return {Promise<CubeSignerResponse<SignerSessionData>>} The session data.
248
+ */
249
+ async oidcLogin(oidcToken, orgId, scopes, lifetimes, mfaReceipt) {
250
+ const oidcClient = new api_1.OidcClient(__classPrivateFieldGet(this, _CubeSigner_env, "f"), orgId, oidcToken);
251
+ return await oidcClient.sessionCreate(scopes, lifetimes, mfaReceipt);
252
+ }
253
+ }
254
+ exports.CubeSigner = CubeSigner;
255
+ _CubeSigner_env = new WeakMap(), _CubeSigner_csc = new WeakMap();
256
+ /** Errors */
257
+ __exportStar(require("./error"), exports);
258
+ /** API */
259
+ __exportStar(require("./api"), exports);
260
+ /** Client */
261
+ __exportStar(require("./client"), exports);
262
+ /** Callbacks */
263
+ var events_1 = require("./events");
264
+ Object.defineProperty(exports, "Events", { enumerable: true, get: function () { return events_1.Events; } });
265
+ Object.defineProperty(exports, "GlobalEvents", { enumerable: true, get: function () { return events_1.GlobalEvents; } });
266
+ /** Organizations */
267
+ __exportStar(require("./org"), exports);
268
+ /** Keys */
269
+ __exportStar(require("./key"), exports);
270
+ /** Roles */
271
+ __exportStar(require("./role"), exports);
272
+ /** Env */
273
+ __exportStar(require("./env"), exports);
274
+ /** Fido */
275
+ __exportStar(require("./mfa"), exports);
276
+ /** Pagination */
277
+ __exportStar(require("./paginator"), exports);
278
+ /** Response */
279
+ __exportStar(require("./response"), exports);
280
+ /** Types */
281
+ __exportStar(require("./schema_types"), exports);
282
+ /** Sessions */
283
+ __exportStar(require("./signer_session"), exports);
284
+ /** Session storage */
285
+ __exportStar(require("./session/session_storage"), exports);
286
+ /** Signer session manager */
287
+ __exportStar(require("./session/signer_session_manager"), exports);
288
+ /** Utils */
289
+ __exportStar(require("./util"), exports);
290
+ /** User-export decryption helper */
291
+ var user_export_1 = require("./user_export");
292
+ Object.defineProperty(exports, "userExportDecrypt", { enumerable: true, get: function () { return user_export_1.userExportDecrypt; } });
293
+ Object.defineProperty(exports, "userExportKeygen", { enumerable: true, get: function () { return user_export_1.userExportKeygen; } });
294
+ /** CubeSigner SDK package name */
295
+ exports.NAME = package_json_1.name;
296
+ /** CubeSigner SDK version */
297
+ exports.VERSION = package_json_1.version;
298
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,+BAA2C;AAC3C,+BAA2C;AAC3C,qCAA4C;AAC5C,+BAA4B;AAE5B,6EAI0C;AAE1C,qDAAiD;AAEjD,oDAAkD;AAalD;;;;GAIG;AACH,MAAa,UAAU;IAKrB;;;OAGG;IACH,IAAI,GAAG;QACL,IAAI,CAAC,uBAAA,IAAI,uBAAK,EAAE,CAAC;YACf,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;QACjD,CAAC;QACD,OAAO,uBAAA,IAAI,uBAAK,CAAC;IACnB,CAAC;IAED,uEAAuE;IACvE,IAAI,GAAG;QACL,OAAO,uBAAA,IAAI,uBAAK,CAAC;IACnB,CAAC;IAED,sBAAsB;IACtB,IAAI,KAAK;QACP,OAAO,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC;IACxB,CAAC;IAED;;;OAGG;IACH,QAAQ,CAAC,KAAa;QACpB,uBAAA,IAAI,mBAAQ,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,MAAA,CAAC;IACtC,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,KAAK,CAAC,qBAAqB,CAAC,OAA6B;QAC9D,OAAO,IAAI,UAAU,CAAoB;YACvC,UAAU,EAAE,MAAM,6CAAoB,CAAC,eAAe,CAAC,OAAO,CAAC;SAChE,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAAC,OAA6B;QAC1D,OAAO,MAAM,8BAAa,CAAC,iBAAiB,CAAC,OAAO,CAAC,CAAC;IACxD,CAAC;IAED;;;OAGG;IACH,YAAY,OAA2B;QA1D9B,kCAAmB;QAE5B,kCAAwB;QAyDtB,IAAI,GAAG,GAAG,OAAO,EAAE,GAAG,CAAC;QACvB,IAAI,OAAO,EAAE,UAAU,EAAE,CAAC;YACxB,IAAI,CAAC,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC;YACrC,GAAG,GAAG,GAAG,IAAI,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC;QACnC,CAAC;QACD,uBAAA,IAAI,mBAAQ,GAAG,IAAI,UAAI,CAAC,OAAO,CAAC,MAAA,CAAC;QACjC,uBAAA,IAAI,mBAAQ,IAAI,yBAAgB;QAC9B,kFAAkF;QAClF,iFAAiF;QACjF,kFAAkF;QAClF,EAAE;QACF,4EAA4E;QAC5E,4FAA4F;QAC5F,OAAO,EAAE,UAA6C,EACtD,OAAO,EAAE,KAAK,CACf,MAAA,CAAC;IACJ,CAAC;IAED;;;;;;;;;OASG;IACH,KAAK,CAAC,QAAQ,CACZ,SAAiB,EACjB,KAAa,EACb,MAAqB,EACrB,SAAyB,EACzB,OAA8B;QAE9B,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,KAAK,EAAE,MAAM,EAAE,SAAS,CAAC,CAAC;QACvE,OAAO,MAAM,6CAAoB,CAAC,qBAAqB,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,EAAE,IAAI,CAAC,IAAI,EAAE,EAAE,OAAO,CAAC,CAAC;IACjG,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO;QACX,OAAO,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,CAAC;IAClC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,MAAM,CAAC,KAAa,EAAE,KAAa;QACvC,OAAO,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;IACrD,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO,CAAC,KAAa;QACzB,OAAO,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,OAAO,EAAE,CAAC;IACjD,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,UAAU,CAAC,KAAa,EAAE,KAAa;QAC3C,OAAO,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC;IACzD,CAAC;IAED,8DAA8D;IAC9D,IAAI,YAAY;QACd,OAAO,IAAI,CAAC,GAAG,CAAC,oBAAoB,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IACtD,CAAC;IAED;;;OAGG;IACH,IAAI,cAAc;QAChB,OAAO,IAAI,CAAC,GAAG,CAAC,iBAAiB,CAAC,IAAI,CAAC,uBAAA,IAAI,uBAAK,CAAC,CAAC;IACpD,CAAC;IAED;;;OAGG;IACH,IAAI,iBAAiB;QACnB,OAAO,IAAI,CAAC,GAAG,CAAC,qBAAqB,CAAC,IAAI,CAAC,uBAAA,IAAI,uBAAK,CAAC,CAAC;IACxD,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,IAAI,CAAC,GAAG,CAAC,cAAc,CAAC,IAAI,CAAC,uBAAA,IAAI,uBAAK,CAAC,CAAC;IACjD,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,MAAM,CAAC,KAAc;QACzB,OAAO,IAAI,SAAG,CAAC,IAAI,CAAC,GAAG,CAAC,UAAU,EAAE,KAAK,IAAI,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC;IAC/D,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,SAAS,CAAC,KAAa,EAAE,KAAa;QAC1C,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;IACjD,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,UAAU;QACd,IAAI,CAAC,IAAI,CAAC,UAAU,EAAE,CAAC;YACrB,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QACD,OAAO,MAAM,IAAI,CAAC,UAAU,CAAC,MAAM,EAAE,CAAC;IACxC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,aAAa,CAAC,KAAa;QAC/B,OAAO,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,aAAa,EAAE,CAAC;IACvD,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,iBAAiB,CAAC,SAAiB,EAAE,KAAa;QACtD,MAAM,UAAU,GAAG,IAAI,gBAAU,CAAC,uBAAA,IAAI,uBAAK,EAAE,KAAK,EAAE,SAAS,CAAC,CAAC;QAC/D,OAAO,MAAM,UAAU,CAAC,aAAa,EAAE,CAAC;IAC1C,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,cAAc,CAAC,KAAa,EAAE,aAA4B;QAC9D,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC;IAC9D,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,SAAS,CACb,SAAiB,EACjB,KAAa,EACb,MAAqB,EACrB,SAAyB,EACzB,UAAuB;QAEvB,MAAM,UAAU,GAAG,IAAI,gBAAU,CAAC,uBAAA,IAAI,uBAAK,EAAE,KAAK,EAAE,SAAS,CAAC,CAAC;QAC/D,OAAO,MAAM,UAAU,CAAC,aAAa,CAAC,MAAM,EAAE,SAAS,EAAE,UAAU,CAAC,CAAC;IACvE,CAAC;CACF;AAzPD,gCAyPC;;AAED,aAAa;AACb,0CAAwB;AACxB,UAAU;AACV,wCAAsB;AACtB,aAAa;AACb,2CAAyB;AACzB,gBAAgB;AAChB,mCAA+F;AAAtF,gGAAA,MAAM,OAAA;AAA4B,sGAAA,YAAY,OAAA;AACvD,oBAAoB;AACpB,wCAAsB;AACtB,WAAW;AACX,wCAAsB;AACtB,YAAY;AACZ,yCAAuB;AACvB,UAAU;AACV,wCAAsB;AACtB,WAAW;AACX,wCAAsB;AACtB,iBAAiB;AACjB,8CAA4B;AAC5B,eAAe;AACf,6CAA2B;AAC3B,YAAY;AACZ,iDAA+B;AAC/B,eAAe;AACf,mDAAiC;AACjC,sBAAsB;AACtB,4DAA0C;AAC1C,6BAA6B;AAC7B,mEAAiD;AACjD,YAAY;AACZ,yCAAuB;AACvB,oCAAoC;AACpC,6CAAoE;AAA3D,gHAAA,iBAAiB,OAAA;AAAE,+GAAA,gBAAgB,OAAA;AAE5C,kCAAkC;AACrB,QAAA,IAAI,GAAW,mBAAI,CAAC;AAEjC,6BAA6B;AAChB,QAAA,OAAO,GAAW,sBAAO,CAAC","sourcesContent":["import { envs, EnvInterface } from \"./env\";\nimport { Client, OidcClient } from \"./api\";\nimport { CubeSignerClient } from \"./client\";\nimport { Org } from \"./org\";\n\nimport {\n  SignerSessionStorage,\n  SignerSessionManager,\n  SignerSessionData,\n} from \"./session/signer_session_manager\";\nimport { CubeSignerResponse } from \"./response\";\nimport { SignerSession } from \"./signer_session\";\nimport { MfaReceipt } from \"./mfa\";\nimport { name, version } from \"./../package.json\";\nimport { IdentityProof, MfaRequestInfo, RatchetConfig, UserInfo } from \"./schema_types\";\n\n/** CubeSigner constructor options */\nexport interface CubeSignerOptions {\n  /** The environment to use */\n  env?: EnvInterface;\n  /** The management authorization token */\n  sessionMgr?: SignerSessionManager;\n  /** Optional organization id */\n  orgId?: string;\n}\n\n/**\n * CubeSigner client\n *\n * @deprecated Use {@link Org} or {@link CubeSignerClient} instead.\n */\nexport class CubeSigner {\n  readonly #env: EnvInterface;\n  readonly sessionMgr?: SignerSessionManager;\n  #csc?: CubeSignerClient;\n\n  /**\n   * Underlying {@link CubeSignerClient} instance, if set; otherwise throws.\n   * @internal\n   */\n  get csc(): CubeSignerClient {\n    if (!this.#csc) {\n      throw new Error(\"CubeSignerClient is not set\");\n    }\n    return this.#csc;\n  }\n\n  /** @return {EnvInterface} The CubeSigner environment of this client */\n  get env(): EnvInterface {\n    return this.#env;\n  }\n\n  /** Organization ID */\n  get orgId() {\n    return this.csc.orgId;\n  }\n\n  /**\n   * Set the organization ID\n   * @param {string} orgId The new organization id.\n   */\n  setOrgId(orgId: string) {\n    this.#csc = this.csc.withOrg(orgId);\n  }\n\n  /**\n   * Loads an existing management session and creates a CubeSigner instance.\n   *\n   * @param {SignerSessionStorage} storage Session storage to load the session from.\n   * @return {Promise<CubeSigner>} New CubeSigner instance\n   */\n  static async loadManagementSession(storage: SignerSessionStorage): Promise<CubeSigner> {\n    return new CubeSigner(<CubeSignerOptions>{\n      sessionMgr: await SignerSessionManager.loadFromStorage(storage),\n    });\n  }\n\n  /**\n   * Loads a signer session from a session storage (e.g., session file).\n   * @param {SignerSessionStorage} storage Session storage to load the session from.\n   * @return {Promise<SignerSession>} New signer session\n   */\n  static async loadSignerSession(storage: SignerSessionStorage): Promise<SignerSession> {\n    return await SignerSession.loadSignerSession(storage);\n  }\n\n  /**\n   * Create a new CubeSigner instance.\n   * @param {CubeSignerOptions} options The optional configuration options for the CubeSigner instance.\n   */\n  constructor(options?: CubeSignerOptions) {\n    let env = options?.env;\n    if (options?.sessionMgr) {\n      this.sessionMgr = options.sessionMgr;\n      env = env ?? this.sessionMgr.env;\n    }\n    this.#env = env ?? envs[\"gamma\"];\n    this.#csc = new CubeSignerClient(\n      // HACK: ignore that sessionMgr may be a CognitoSessionManager and pretend that it\n      //       is a SignerSessionManager; that's fine because the CubeSignerClient will\n      //       almost always just call `await token()` on it, which works in both cases.\n      //\n      // This is done here for backward compatibility reasons only; in the future,\n      // we should deprecate this class and people should start using `CubeSingerClient` directly.\n      options?.sessionMgr as unknown as SignerSessionManager,\n      options?.orgId,\n    );\n  }\n\n  /**\n   * Authenticate an OIDC user and create a new session manager for them.\n   *\n   * @param {string} oidcToken The OIDC token\n   * @param {string} orgId The id of the organization that the user is in\n   * @param {List<string>} scopes The scopes of the resulting session\n   * @param {RatchetConfig} lifetimes Lifetimes of the new session.\n   * @param {SignerSessionStorage?} storage Optional signer session storage (defaults to in-memory storage)\n   * @return {Promise<SignerSessionManager>} The signer session manager\n   */\n  async oidcAuth(\n    oidcToken: string,\n    orgId: string,\n    scopes: Array<string>,\n    lifetimes?: RatchetConfig,\n    storage?: SignerSessionStorage,\n  ): Promise<SignerSessionManager> {\n    const resp = await this.oidcLogin(oidcToken, orgId, scopes, lifetimes);\n    return await SignerSessionManager.createFromSessionInfo(this.env, orgId, resp.data(), storage);\n  }\n\n  /**\n   * Retrieves information about the current user.\n   *\n   * @return {Promise<UserInfo>} User information.\n   */\n  async aboutMe(): Promise<UserInfo> {\n    return await this.csc.userGet();\n  }\n\n  /**\n   * Retrieves existing MFA request.\n   *\n   * @param {string} orgId Organization ID\n   * @param {string} mfaId MFA request ID\n   * @return {Promise<MfaRequestInfo>} MFA request information\n   */\n  async mfaGet(orgId: string, mfaId: string): Promise<MfaRequestInfo> {\n    return await this.csc.withOrg(orgId).mfaGet(mfaId);\n  }\n\n  /**\n   * List pending MFA requests accessible to the current user.\n   * @param {string} orgId Organization ID\n   * @return {Promise<MfaRequestInfo[]>} The MFA requests.\n   */\n  async mfaList(orgId: string): Promise<MfaRequestInfo[]> {\n    return await this.csc.withOrg(orgId).mfaList();\n  }\n\n  /**\n   * Approve a pending MFA request.\n   *\n   * @param {string} orgId The org id of the MFA request\n   * @param {string} mfaId The id of the MFA request\n   * @return {Promise<MfaRequestInfo>} The result of the MFA request\n   */\n  async mfaApprove(orgId: string, mfaId: string): Promise<MfaRequestInfo> {\n    return await this.csc.withOrg(orgId).mfaApprove(mfaId);\n  }\n\n  /** Initiate adding a new FIDO device. MFA may be required. */\n  get addFidoStart() {\n    return this.csc.userFidoRegisterInit.bind(this.csc);\n  }\n\n  /**\n   * Creates a request to change user's TOTP. This request returns a new TOTP challenge\n   * that must be answered by calling `resetTotpComplete`\n   */\n  get resetTotpStart() {\n    return this.csc.userTotpResetInit.bind(this.#csc);\n  }\n\n  /**\n   * Answer the TOTP challenge issued by `resetTotpStart`. If successful, user's\n   * TOTP configuration will be updated to that of the TOTP challenge.he TOTP configuration from the challenge.\n   */\n  get resetTotpComplete() {\n    return this.csc.userTotpResetComplete.bind(this.#csc);\n  }\n\n  /**\n   * Verifies a given TOTP code against the current user's TOTP configuration.\n   * Throws an error if the verification fails.\n   */\n  get verifyTotp() {\n    return this.csc.userTotpVerify.bind(this.#csc);\n  }\n\n  /**\n   * Retrieve information about an organization.\n   * @param {string} orgId The ID or name of the organization.\n   * @return {Org} The organization.\n   */\n  async getOrg(orgId?: string): Promise<Org> {\n    return new Org(this.csc.sessionMgr, orgId ?? this.csc.orgId);\n  }\n\n  /**\n   * Deletes a given key.\n   * @param {string} orgId - Organization id\n   * @param {string} keyId - Key id\n   */\n  async deleteKey(orgId: string, keyId: string) {\n    await this.csc.withOrg(orgId).keyDelete(keyId);\n  }\n\n  /**\n   * Get the management client.\n   * @return {Client} The client.\n   * @internal\n   */\n  async management(): Promise<Client> {\n    if (!this.sessionMgr) {\n      throw new Error(\"No management session loaded\");\n    }\n    return await this.sessionMgr.client();\n  }\n\n  /**\n   * Obtain a proof of authentication.\n   *\n   * @param {string} orgId The id of the organization that the user is in\n   * @return {Promise<IdentityProof>} Proof of authentication\n   */\n  async proveIdentity(orgId: string): Promise<IdentityProof> {\n    return await this.csc.withOrg(orgId).identityProve();\n  }\n\n  /**\n   * Exchange an OIDC token for a proof of authentication.\n   *\n   * @param {string} oidcToken The OIDC token\n   * @param {string} orgId The id of the organization that the user is in\n   * @return {Promise<IdentityProof>} Proof of authentication\n   */\n  async oidcProveIdentity(oidcToken: string, orgId: string): Promise<IdentityProof> {\n    const oidcClient = new OidcClient(this.#env, orgId, oidcToken);\n    return await oidcClient.identityProve();\n  }\n\n  /**\n   * Checks if a given identity proof is valid.\n   *\n   * @param {string} orgId The id of the organization that the user is in.\n   * @param {IdentityProof} identityProof The proof of authentication.\n   */\n  async verifyIdentity(orgId: string, identityProof: IdentityProof) {\n    await this.csc.withOrg(orgId).identityVerify(identityProof);\n  }\n\n  /**\n   * Exchange an OIDC token for a CubeSigner session token.\n   * @param {string} oidcToken The OIDC token\n   * @param {string} orgId The id of the organization that the user is in\n   * @param {List<string>} scopes The scopes of the resulting session\n   * @param {RatchetConfig} lifetimes Lifetimes of the new session.\n   * @param {MfaReceipt} mfaReceipt Optional MFA receipt (id + confirmation code)\n   * @return {Promise<CubeSignerResponse<SignerSessionData>>} The session data.\n   */\n  async oidcLogin(\n    oidcToken: string,\n    orgId: string,\n    scopes: Array<string>,\n    lifetimes?: RatchetConfig,\n    mfaReceipt?: MfaReceipt,\n  ): Promise<CubeSignerResponse<SignerSessionData>> {\n    const oidcClient = new OidcClient(this.#env, orgId, oidcToken);\n    return await oidcClient.sessionCreate(scopes, lifetimes, mfaReceipt);\n  }\n}\n\n/** Errors */\nexport * from \"./error\";\n/** API */\nexport * from \"./api\";\n/** Client */\nexport * from \"./client\";\n/** Callbacks */\nexport { Events, EventHandler, ErrorEvent, GlobalEvents, SessionExpiredEvent } from \"./events\";\n/** Organizations */\nexport * from \"./org\";\n/** Keys */\nexport * from \"./key\";\n/** Roles */\nexport * from \"./role\";\n/** Env */\nexport * from \"./env\";\n/** Fido */\nexport * from \"./mfa\";\n/** Pagination */\nexport * from \"./paginator\";\n/** Response */\nexport * from \"./response\";\n/** Types */\nexport * from \"./schema_types\";\n/** Sessions */\nexport * from \"./signer_session\";\n/** Session storage */\nexport * from \"./session/session_storage\";\n/** Signer session manager */\nexport * from \"./session/signer_session_manager\";\n/** Utils */\nexport * from \"./util\";\n/** User-export decryption helper */\nexport { userExportDecrypt, userExportKeygen } from \"./user_export\";\n\n/** CubeSigner SDK package name */\nexport const NAME: string = name;\n\n/** CubeSigner SDK version */\nexport const VERSION: string = version;\n"]}
@@ -0,0 +1,152 @@
1
+ import { KeyPolicy } from "./role";
2
+ import { KeyInfoApi, KeyTypeApi, SchemaKeyType } from "./schema_types";
3
+ import { CubeSignerClient } from "./client";
4
+ /** Secp256k1 key type */
5
+ export declare enum Secp256k1 {
6
+ Evm = "SecpEthAddr",// eslint-disable-line no-unused-vars
7
+ Btc = "SecpBtc",// eslint-disable-line no-unused-vars
8
+ BtcTest = "SecpBtcTest",// eslint-disable-line no-unused-vars
9
+ Ava = "SecpAvaAddr",// eslint-disable-line no-unused-vars
10
+ AvaTest = "SecpAvaTestAddr"
11
+ }
12
+ /** BLS key type */
13
+ export declare enum Bls {
14
+ Eth2Deposited = "BlsPub",// eslint-disable-line no-unused-vars
15
+ Eth2Inactive = "BlsInactive"
16
+ }
17
+ /** Ed25519 key type */
18
+ export declare enum Ed25519 {
19
+ Solana = "Ed25519SolanaAddr",// eslint-disable-line no-unused-vars
20
+ Sui = "Ed25519SuiAddr",// eslint-disable-line no-unused-vars
21
+ Aptos = "Ed25519AptosAddr",// eslint-disable-line no-unused-vars
22
+ Cardano = "Ed25519CardanoAddrVk",// eslint-disable-line no-unused-vars
23
+ Stellar = "Ed25519StellarAddr"
24
+ }
25
+ /** Mnemonic key type */
26
+ export declare const Mnemonic: "Mnemonic";
27
+ export type Mnemonic = typeof Mnemonic;
28
+ /** Stark key type */
29
+ export declare const Stark: "Stark";
30
+ export type Stark = typeof Stark;
31
+ /** Key type */
32
+ export type KeyType = Secp256k1 | Bls | Ed25519 | Mnemonic | Stark;
33
+ /** Additional properties (for backward compatibility) */
34
+ export interface KeyInfo extends KeyInfoApi {
35
+ /** Alias for key_id */
36
+ id: string;
37
+ /** Alias for key_type */
38
+ type: KeyTypeApi;
39
+ /** Alias for material_id */
40
+ materialId: string;
41
+ /** Alias for public_key */
42
+ publicKey: string;
43
+ }
44
+ /**
45
+ * Define some additional (backward compatibility) properties
46
+ * on a `KeyInfoApi` object returned from the remote end.
47
+ *
48
+ * @param {KeyInfoApi} key Key information returned from the remote end
49
+ * @return {KeyInfo} The same `key` object extended with some derived properties.
50
+ */
51
+ export declare function toKeyInfo(key: KeyInfoApi): KeyInfo;
52
+ /**
53
+ * A representation of a signing key.
54
+ */
55
+ export declare class Key {
56
+ #private;
57
+ /** The CubeSigner instance that this key is associated with */
58
+ protected readonly csc: CubeSignerClient;
59
+ /** The organization that this key is in */
60
+ get orgId(): string;
61
+ /**
62
+ * The id of the key: "Key#" followed by a unique identifier specific to
63
+ * the type of key (such as a public key for BLS or an ethereum address for Secp)
64
+ * @example Key#0x8e3484687e66cdd26cf04c3647633ab4f3570148
65
+ */
66
+ get id(): string;
67
+ /**
68
+ * A unique identifier specific to the type of key, such as a public key or an ethereum address
69
+ * @example 0x8e3484687e66cdd26cf04c3647633ab4f3570148
70
+ */
71
+ get materialId(): string;
72
+ /**
73
+ * @description Hex-encoded, serialized public key. The format used depends on the key type:
74
+ * - secp256k1 keys use 65-byte uncompressed SECG format
75
+ * - BLS keys use 48-byte compressed BLS12-381 (ZCash) format
76
+ * @example 0x04d2688b6bc2ce7f9879b9e745f3c4dc177908c5cef0c1b64cff19ae7ff27dee623c64fe9d9c325c7fbbc748bbd5f607ce14dd83e28ebbbb7d3e7f2ffb70a79431
77
+ */
78
+ get publicKey(): string;
79
+ /**
80
+ * Get the cached properties of this key. The cached properties reflect the
81
+ * state of the last fetch or update (e.g., after awaiting `Key.enabled()`
82
+ * or `Key.disable()`).
83
+ */
84
+ get cached(): KeyInfo;
85
+ /** The type of key. */
86
+ type(): Promise<KeyType>;
87
+ /** Is the key enabled? */
88
+ enabled(): Promise<boolean>;
89
+ /** Enable the key. */
90
+ enable(): Promise<void>;
91
+ /** Disable the key. */
92
+ disable(): Promise<void>;
93
+ /**
94
+ * Set new policy (overwriting any policies previously set for this key)
95
+ * @param {KeyPolicy} policy The new policy to set
96
+ */
97
+ setPolicy(policy: KeyPolicy): Promise<void>;
98
+ /**
99
+ * Append to existing key policy. This append is not atomic -- it uses {@link policy} to fetch the current policy and then {@link setPolicy} to set the policy -- and should not be used in across concurrent sessions.
100
+ * @param {KeyPolicy} policy The policy to append to the existing one.
101
+ */
102
+ appendPolicy(policy: KeyPolicy): Promise<void>;
103
+ /**
104
+ * Get the policy for the key.
105
+ * @return {Promise<KeyPolicy>} The policy for the key.
106
+ */
107
+ policy(): Promise<KeyPolicy>;
108
+ /**
109
+ * @description Owner of the key
110
+ * @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
111
+ */
112
+ owner(): Promise<string>;
113
+ /**
114
+ * Set the owner of the key. Only the key (or org) owner can change the owner of the key.
115
+ * @param {string} owner The user-id of the new owner of the key.
116
+ */
117
+ setOwner(owner: string): Promise<void>;
118
+ /**
119
+ * Delete this key.
120
+ */
121
+ delete(): Promise<void>;
122
+ /**
123
+ * Create a new key.
124
+ *
125
+ * @param {CubeSignerClient} csc The CubeSigner instance to use for signing.
126
+ * @param {KeyInfoApi} data The JSON response from the API server.
127
+ * @internal
128
+ */
129
+ constructor(csc: CubeSignerClient, data: KeyInfoApi);
130
+ /**
131
+ * Update the key.
132
+ * @param {UpdateKeyRequest} request The JSON request to send to the API server.
133
+ * @return {KeyInfo} The JSON response from the API server.
134
+ * @internal
135
+ */
136
+ private update;
137
+ /**
138
+ * Fetch the key information.
139
+ *
140
+ * @return {KeyInfo} The key information.
141
+ * @internal
142
+ */
143
+ private fetch;
144
+ }
145
+ /**
146
+ * Convert a schema key type to a key type.
147
+ *
148
+ * @param {SchemaKeyType} ty The schema key type.
149
+ * @return {KeyType} The key type.
150
+ * @internal
151
+ */
152
+ export declare function fromSchemaKeyType(ty: SchemaKeyType): KeyType;