@cubist-labs/cubesigner-sdk 0.3.19 → 0.3.23
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/package.json +1 -1
- package/dist/cjs/spec/env/beta.json +2 -1
- package/dist/cjs/spec/env/gamma.json +2 -1
- package/dist/cjs/spec/env/prod.json +2 -1
- package/dist/cjs/src/api.d.ts +3 -1
- package/dist/cjs/src/api.js +5 -3
- package/dist/cjs/src/client.d.ts +11 -2
- package/dist/cjs/src/client.js +5 -3
- package/dist/cjs/src/env.d.ts +1 -0
- package/dist/cjs/src/env.js +1 -1
- package/dist/cjs/src/error.js +7 -2
- package/dist/cjs/src/index.d.ts +2 -0
- package/dist/cjs/src/index.js +3 -1
- package/dist/cjs/src/org.d.ts +13 -1
- package/dist/cjs/src/org.js +2 -2
- package/dist/cjs/src/org_event_processor.d.ts +57 -0
- package/dist/cjs/src/org_event_processor.js +137 -0
- package/dist/cjs/src/schema.d.ts +94 -26
- package/dist/cjs/src/schema.js +1 -1
- package/dist/cjs/src/schema_types.d.ts +3 -0
- package/dist/cjs/src/schema_types.js +1 -1
- package/dist/esm/package.json +1 -1
- package/dist/esm/spec/env/beta.json +2 -1
- package/dist/esm/spec/env/gamma.json +2 -1
- package/dist/esm/spec/env/prod.json +2 -1
- package/dist/esm/src/api.d.ts +3 -1
- package/dist/esm/src/api.js +5 -3
- package/dist/esm/src/client.d.ts +11 -2
- package/dist/esm/src/client.js +5 -3
- package/dist/esm/src/env.d.ts +1 -0
- package/dist/esm/src/env.js +1 -1
- package/dist/esm/src/error.js +7 -2
- package/dist/esm/src/index.d.ts +2 -0
- package/dist/esm/src/index.js +3 -1
- package/dist/esm/src/org.d.ts +13 -1
- package/dist/esm/src/org.js +2 -2
- package/dist/esm/src/org_event_processor.d.ts +57 -0
- package/dist/esm/src/org_event_processor.js +133 -0
- package/dist/esm/src/schema.d.ts +94 -26
- package/dist/esm/src/schema.js +1 -1
- package/dist/esm/src/schema_types.d.ts +3 -0
- package/dist/esm/src/schema_types.js +1 -1
- package/package.json +1 -1
- package/src/api.ts +10 -3
- package/src/client.ts +11 -3
- package/src/env.ts +1 -0
- package/src/error.ts +6 -1
- package/src/index.ts +2 -0
- package/src/org.ts +1 -1
- package/src/org_event_processor.ts +173 -0
- package/src/schema.ts +100 -23
- package/src/schema_types.ts +3 -0
|
@@ -3,6 +3,7 @@ import { components } from "./schema";
|
|
|
3
3
|
import { JsonMap } from "./util";
|
|
4
4
|
type schemas = components["schemas"];
|
|
5
5
|
export type UserInfo = schemas["UserInfo"];
|
|
6
|
+
export type UserInOrgMembership = schemas["UserInOrgMembership"];
|
|
6
7
|
export type ConfiguredMfa = schemas["ConfiguredMfa"];
|
|
7
8
|
export type RatchetConfig = schemas["RatchetConfig"];
|
|
8
9
|
export type IdentityProof = schemas["IdentityProof"];
|
|
@@ -28,6 +29,8 @@ export type MemberRole = schemas["MemberRole"];
|
|
|
28
29
|
export type SchemaKeyType = schemas["KeyType"];
|
|
29
30
|
export type ListKeysResponse = schemas["PaginatedListKeysResponse"];
|
|
30
31
|
export type UpdateKeyRequest = schemas["UpdateKeyRequest"];
|
|
32
|
+
export type UpdateKeyProperties = schemas["UpdateKeyProperties"];
|
|
33
|
+
export type CreateKeyRequest = schemas["CreateKeyRequest"];
|
|
31
34
|
export type KeyInfoApi = schemas["KeyInfo"];
|
|
32
35
|
export type KeyInRoleInfo = schemas["KeyInRoleInfo"];
|
|
33
36
|
export type UserInRoleInfo = schemas["UserInRoleInfo"];
|
|
@@ -1,2 +1,2 @@
|
|
|
1
1
|
export {};
|
|
2
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
2
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"schema_types.js","sourceRoot":"","sources":["../../../src/schema_types.ts"],"names":[],"mappings":"","sourcesContent":["import { MfaPolicy } from \"./role\";\nimport { components } from \"./schema\";\nimport { JsonMap } from \"./util\";\n\ntype schemas = components[\"schemas\"];\n\nexport type UserInfo = schemas[\"UserInfo\"];\nexport type UserInOrgMembership = schemas[\"UserInOrgMembership\"];\nexport type ConfiguredMfa = schemas[\"ConfiguredMfa\"];\nexport type RatchetConfig = schemas[\"RatchetConfig\"];\nexport type IdentityProof = schemas[\"IdentityProof\"];\nexport type TotpInfo = schemas[\"TotpInfo\"];\n\nexport type OidcAuthResponse = schemas[\"NewSessionResponse\"];\nexport type ApiAddFidoChallenge = schemas[\"FidoCreateChallengeResponse\"];\nexport type ApiMfaFidoChallenge = schemas[\"FidoAssertChallenge\"];\n\nexport type PublicKeyCredentialCreationOptions = schemas[\"PublicKeyCredentialCreationOptions\"];\nexport type PublicKeyCredentialRequestOptions = schemas[\"PublicKeyCredentialRequestOptions\"];\nexport type PublicKeyCredentialParameters = schemas[\"PublicKeyCredentialParameters\"];\nexport type PublicKeyCredentialDescriptor = schemas[\"PublicKeyCredentialDescriptor\"];\nexport type AuthenticatorSelectionCriteria = schemas[\"AuthenticatorSelectionCriteria\"];\nexport type PublicKeyCredentialUserEntity = schemas[\"PublicKeyCredentialUserEntity\"];\nexport type PublicKeyCredential = schemas[\"PublicKeyCredential\"];\n\nexport type OrgInfo = schemas[\"OrgInfo\"];\nexport type UserInOrgInfo = schemas[\"UserInOrgInfo\"];\nexport type UpdateOrgRequest = schemas[\"UpdateOrgRequest\"];\nexport type UpdateOrgResponse = schemas[\"UpdateOrgResponse\"];\nexport type NotificationEndpointConfiguration = schemas[\"NotificationEndpointConfiguration\"];\nexport type OrgEvents = schemas[\"OrgEventDiscriminants\"];\n\nexport type OidcIdentity = schemas[\"OIDCIdentity\"];\nexport type MemberRole = schemas[\"MemberRole\"];\n\nexport type SchemaKeyType = schemas[\"KeyType\"];\n\nexport type ListKeysResponse = schemas[\"PaginatedListKeysResponse\"];\nexport type UpdateKeyRequest = schemas[\"UpdateKeyRequest\"];\nexport type UpdateKeyProperties = schemas[\"UpdateKeyProperties\"];\nexport type CreateKeyRequest = schemas[\"CreateKeyRequest\"];\nexport type KeyInfoApi = schemas[\"KeyInfo\"];\nexport type KeyInRoleInfo = schemas[\"KeyInRoleInfo\"];\nexport type UserInRoleInfo = schemas[\"UserInRoleInfo\"];\nexport type KeyTypeApi = schemas[\"KeyType\"];\n\nexport type ListKeyRolesResponse = schemas[\"PaginatedListKeyRolesResponse\"];\nexport type ListRolesResponse = schemas[\"PaginatedListRolesResponse\"];\nexport type ListRoleKeysResponse = schemas[\"PaginatedListRoleKeysResponse\"];\nexport type ListRoleUsersResponse = schemas[\"PaginatedListRoleUsersResponse\"];\nexport type UpdateRoleRequest = schemas[\"UpdateRoleRequest\"];\nexport type KeyWithPoliciesInfo = schemas[\"KeyInRoleInfo\"];\nexport type RoleInfo = schemas[\"RoleInfo\"];\n\nexport type SessionInfo = schemas[\"SessionInfo\"];\nexport type ClientSessionInfo = schemas[\"ClientSessionInfo\"];\nexport type NewSessionResponse = schemas[\"NewSessionResponse\"];\nexport type SessionsResponse = schemas[\"PaginatedSessionsResponse\"];\n\nexport type CreateSignerSessionRequest = schemas[\"CreateTokenRequest\"];\nexport type RefreshSignerSessionRequest = schemas[\"AuthData\"];\n\nexport type EvmSignRequest = schemas[\"Eth1SignRequest\"];\nexport type EvmSignResponse = schemas[\"Eth1SignResponse\"];\nexport type Eip191SignRequest = schemas[\"Eip191SignRequest\"];\nexport type Eip712SignRequest = schemas[\"Eip712SignRequest\"];\nexport type Eip191Or712SignResponse = schemas[\"Eip191Or712SignResponse\"];\nexport type Eth2SignRequest = schemas[\"Eth2SignRequest\"];\nexport type Eth2SignResponse = schemas[\"Eth2SignResponse\"];\nexport type Eth2StakeRequest = schemas[\"StakeRequest\"];\nexport type Eth2StakeResponse = schemas[\"StakeResponse\"];\nexport type Eth2UnstakeRequest = schemas[\"UnstakeRequest\"];\nexport type Eth2UnstakeResponse = schemas[\"UnstakeResponse\"];\nexport type BlobSignRequest = schemas[\"BlobSignRequest\"];\nexport type BlobSignResponse = schemas[\"BlobSignResponse\"];\nexport type BtcSignRequest = schemas[\"BtcSignRequest\"];\nexport type BtcSignResponse = schemas[\"BtcSignResponse\"];\nexport type SolanaSignRequest = schemas[\"SolanaSignRequest\"];\nexport type SolanaSignResponse = schemas[\"SolanaSignResponse\"];\nexport type AvaSignRequest = schemas[\"AvaSignRequest\"];\nexport type AvaSignResponse = schemas[\"AvaSignResponse\"];\n\nexport type AcceptedResponse = schemas[\"AcceptedResponse\"];\nexport type ErrorResponse = schemas[\"ErrorResponse\"];\nexport type BtcSignatureKind = schemas[\"BtcSignatureKind\"];\nexport type CsErrCode = schemas[\"SignerErrorCode\"];\n\nexport type MfaType = schemas[\"MfaType\"];\nexport type MfaVote = schemas[\"MfaVote\"];\nexport type MfaRequestInfo = schemas[\"MfaRequestInfo\"];\n\nexport type UserExportInitRequest = schemas[\"UserExportInitRequest\"];\nexport type UserExportInitResponse = schemas[\"UserExportInitResponse\"];\nexport type UserExportCompleteRequest = schemas[\"UserExportCompleteRequest\"];\nexport type UserExportCompleteResponse = schemas[\"UserExportCompleteResponse\"];\nexport type UserExportListResponse = schemas[\"PaginatedUserExportListResponse\"];\nexport type UserExportKeyMaterial = schemas[\"JsonKeyPackage\"];\n\nexport type Empty = schemas[\"EmptyImpl\"];\n\n/** Options for a new OIDC user */\nexport interface CreateOidcUserOptions {\n  /** The role of an OIDC user, default is \"Alien\" */\n  memberRole?: MemberRole;\n  /** Optional MFA policy to associate with the user account */\n  mfaPolicy?: MfaPolicy;\n}\n\n/** Ava P- or X-chain transaction */\nexport type AvaTx = { P: AvaPChainTx } | { X: AvaXChainTx };\n\n/** Ava P-chain transaction */\nexport type AvaPChainTx =\n  | { AddPermissionlessValidator: JsonMap }\n  | { AddSubnetValidator: JsonMap }\n  | { AddValidator: JsonMap }\n  | { CreateChain: JsonMap }\n  | { CreateSubnet: JsonMap }\n  | { Export: JsonMap }\n  | { Import: JsonMap };\n\n/** Ava X-chain transaction */\nexport type AvaXChainTx = { Base: JsonMap } | { Export: JsonMap } | { Import: JsonMap };\n"]}
|
package/package.json
CHANGED
package/src/api.ts
CHANGED
|
@@ -74,7 +74,7 @@ import { KeyPolicy } from "./role";
|
|
|
74
74
|
import { EnvInterface } from "./env";
|
|
75
75
|
import { loadSubtleCrypto } from "./user_export";
|
|
76
76
|
import { EventEmitter } from "./events";
|
|
77
|
-
import { NAME, VERSION } from "./index";
|
|
77
|
+
import { NAME, UpdateKeyProperties, VERSION } from "./index";
|
|
78
78
|
|
|
79
79
|
/** @internal */
|
|
80
80
|
export type Client = ReturnType<typeof createClient<paths>>;
|
|
@@ -712,9 +712,15 @@ export class CubeSignerApi {
|
|
|
712
712
|
* @param {KeyType} keyType The type of key to create.
|
|
713
713
|
* @param {number} count The number of keys to create.
|
|
714
714
|
* @param {string?} ownerId The owner of the keys. Defaults to the session's user.
|
|
715
|
+
* @param {UpdateKeyProperties?} props Additional key properties
|
|
715
716
|
* @return {KeyInfoApi[]} The new keys.
|
|
716
717
|
*/
|
|
717
|
-
async keysCreate(
|
|
718
|
+
async keysCreate(
|
|
719
|
+
keyType: KeyType,
|
|
720
|
+
count: number,
|
|
721
|
+
ownerId?: string,
|
|
722
|
+
props?: UpdateKeyProperties,
|
|
723
|
+
): Promise<KeyInfoApi[]> {
|
|
718
724
|
const chain_id = 0; // not used anymore
|
|
719
725
|
const client = await this.client("createKey");
|
|
720
726
|
const data = await client.post("/v0/org/{org_id}/keys", {
|
|
@@ -723,7 +729,8 @@ export class CubeSignerApi {
|
|
|
723
729
|
count,
|
|
724
730
|
chain_id,
|
|
725
731
|
key_type: keyType,
|
|
726
|
-
|
|
732
|
+
...props,
|
|
733
|
+
owner: props?.owner ?? ownerId,
|
|
727
734
|
},
|
|
728
735
|
});
|
|
729
736
|
return data.keys;
|
package/src/client.ts
CHANGED
|
@@ -1,7 +1,13 @@
|
|
|
1
1
|
import { SignerSessionManager, SignerSessionStorage } from "./session/signer_session_manager";
|
|
2
2
|
import { CubeSignerApi, OidcClient } from "./api";
|
|
3
3
|
import { KeyType, Key } from "./key";
|
|
4
|
-
import {
|
|
4
|
+
import {
|
|
5
|
+
MfaRequestInfo,
|
|
6
|
+
OrgInfo,
|
|
7
|
+
PublicKeyCredential,
|
|
8
|
+
RatchetConfig,
|
|
9
|
+
UpdateKeyProperties,
|
|
10
|
+
} from "./schema_types";
|
|
5
11
|
import { MfaReceipt } from "./mfa";
|
|
6
12
|
import { PageOpts } from "./paginator";
|
|
7
13
|
import { Role } from "./role";
|
|
@@ -68,10 +74,12 @@ export class CubeSignerClient extends CubeSignerApi {
|
|
|
68
74
|
* Create a new signing key.
|
|
69
75
|
* @param {KeyType} type The type of key to create.
|
|
70
76
|
* @param {string?} ownerId The owner of the key. Defaults to the session's user.
|
|
77
|
+
* @param {UpdateKeyProperties?} props Additional key properties
|
|
71
78
|
* @return {Key[]} The new keys.
|
|
72
79
|
*/
|
|
73
|
-
async createKey(type: KeyType, ownerId?: string): Promise<Key> {
|
|
74
|
-
|
|
80
|
+
async createKey(type: KeyType, ownerId?: string, props?: UpdateKeyProperties): Promise<Key> {
|
|
81
|
+
const keys = await this.keysCreate(type, 1, ownerId, props);
|
|
82
|
+
return new Key(this, keys[0]);
|
|
75
83
|
}
|
|
76
84
|
|
|
77
85
|
/**
|
package/src/env.ts
CHANGED
package/src/error.ts
CHANGED
|
@@ -20,7 +20,12 @@ const mfaErrorCodes: CsErrCode[] = [
|
|
|
20
20
|
/**
|
|
21
21
|
* Opcodes corresponding to all different MFA approve/reject requests
|
|
22
22
|
*/
|
|
23
|
-
const mfaOpCodes: (keyof operations)[] = [
|
|
23
|
+
const mfaOpCodes: (keyof operations)[] = [
|
|
24
|
+
"mfaVoteCs",
|
|
25
|
+
"userResetTotpComplete",
|
|
26
|
+
"mfaVoteTotp",
|
|
27
|
+
"mfaVoteFidoComplete",
|
|
28
|
+
];
|
|
24
29
|
|
|
25
30
|
/**
|
|
26
31
|
* Error response type, thrown on non-successful responses.
|
package/src/index.ts
CHANGED
|
@@ -298,6 +298,8 @@ export * from "./role";
|
|
|
298
298
|
export * from "./env";
|
|
299
299
|
/** Fido */
|
|
300
300
|
export * from "./mfa";
|
|
301
|
+
/** Utils for processing org events */
|
|
302
|
+
export * from "./org_event_processor";
|
|
301
303
|
/** Pagination */
|
|
302
304
|
export * from "./paginator";
|
|
303
305
|
/** Response */
|
package/src/org.ts
CHANGED
|
@@ -132,7 +132,7 @@ export class Org extends CubeSignerClient {
|
|
|
132
132
|
*/
|
|
133
133
|
async setNotificationEndpoints(notification_endpoints: NotificationEndpointConfiguration[]) {
|
|
134
134
|
await this.orgUpdate({
|
|
135
|
-
notification_endpoints
|
|
135
|
+
notification_endpoints,
|
|
136
136
|
});
|
|
137
137
|
}
|
|
138
138
|
|
|
@@ -0,0 +1,173 @@
|
|
|
1
|
+
import { X509Certificate, createVerify } from "crypto";
|
|
2
|
+
import { Environment, envs } from ".";
|
|
3
|
+
|
|
4
|
+
// URLs that are safe to retrieve certificates from
|
|
5
|
+
const SNS_CERTIFICATE_URL_HOSTS = ["sns.us-east-1.amazonaws.com"];
|
|
6
|
+
|
|
7
|
+
const SNS_CERTIFICATE_HOST = "sns.amazonaws.com";
|
|
8
|
+
|
|
9
|
+
/** The common fields of SNS messages */
|
|
10
|
+
export interface SnsMessage {
|
|
11
|
+
Type: string;
|
|
12
|
+
MessageId: string;
|
|
13
|
+
TopicArn: string;
|
|
14
|
+
Message: string;
|
|
15
|
+
Timestamp: string;
|
|
16
|
+
SignatureVersion: string;
|
|
17
|
+
Signature: string;
|
|
18
|
+
SigningCertURL: string;
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
/** The format of a subscription confirmation sent by SNS */
|
|
22
|
+
export interface SubscriptionConfirmationMessage extends SnsMessage {
|
|
23
|
+
Token: string;
|
|
24
|
+
SubscribeURL: string;
|
|
25
|
+
}
|
|
26
|
+
|
|
27
|
+
/** Common fields for an org event */
|
|
28
|
+
export interface OrgEventBase {
|
|
29
|
+
org: string;
|
|
30
|
+
utc_timestamp: number;
|
|
31
|
+
org_event: string;
|
|
32
|
+
}
|
|
33
|
+
|
|
34
|
+
/** The format of an event message sent by SNS */
|
|
35
|
+
export interface OrgEventMessage extends SnsMessage {
|
|
36
|
+
Subject?: string;
|
|
37
|
+
UnsubscribeURL: string;
|
|
38
|
+
}
|
|
39
|
+
|
|
40
|
+
/** Options for the processor */
|
|
41
|
+
export interface OrgEventProcessorOptions {
|
|
42
|
+
env: Environment;
|
|
43
|
+
}
|
|
44
|
+
|
|
45
|
+
/** A utility for processing org event messages */
|
|
46
|
+
export class OrgEventProcessor {
|
|
47
|
+
readonly #topicArn: string;
|
|
48
|
+
readonly #orgId: string;
|
|
49
|
+
#cachedCertificates: Map<URL, X509Certificate>;
|
|
50
|
+
|
|
51
|
+
/**
|
|
52
|
+
* Constructor.
|
|
53
|
+
* @param {string} orgId The org id
|
|
54
|
+
* @param {OrgEventProcessorOptions} options Additional options for the processor
|
|
55
|
+
*/
|
|
56
|
+
constructor(orgId: string, options?: OrgEventProcessorOptions) {
|
|
57
|
+
this.#topicArn = envs[options?.env ?? "prod"].OrgEventsTopicArn;
|
|
58
|
+
this.#orgId = orgId;
|
|
59
|
+
this.#cachedCertificates = new Map();
|
|
60
|
+
}
|
|
61
|
+
|
|
62
|
+
/**
|
|
63
|
+
* Checks an SNS message and its signature. Throws an error if the message
|
|
64
|
+
* invalid or the signature is invalid.
|
|
65
|
+
*
|
|
66
|
+
* @param {SnsMessage} message The SNS message to check
|
|
67
|
+
*/
|
|
68
|
+
async checkMessage(message: SnsMessage) {
|
|
69
|
+
// Check the topic ARN
|
|
70
|
+
if (message.TopicArn !== this.#topicArn) {
|
|
71
|
+
throw new Error(`Expected topic ARN '${this.#topicArn}', found '${message.TopicArn}'`);
|
|
72
|
+
}
|
|
73
|
+
|
|
74
|
+
// Both subscription confirmations and org event messages should have no subject
|
|
75
|
+
if ("Subject" in message) {
|
|
76
|
+
throw new Error("Expected a message without a subject");
|
|
77
|
+
}
|
|
78
|
+
|
|
79
|
+
// The org events topic uses signature version 2 (SHA256)
|
|
80
|
+
if (message.SignatureVersion !== "2") {
|
|
81
|
+
throw new Error("Expected signature version 2");
|
|
82
|
+
}
|
|
83
|
+
|
|
84
|
+
// Retrieve the certificate and sanity check it
|
|
85
|
+
const certificate = await this.#fetchAndValidateCertificate(new URL(message.SigningCertURL));
|
|
86
|
+
|
|
87
|
+
// Extract fields specific to subscription confirmations
|
|
88
|
+
const subscribeUrl = (message as SubscriptionConfirmationMessage).SubscribeURL;
|
|
89
|
+
const token = (message as SubscriptionConfirmationMessage).Token;
|
|
90
|
+
|
|
91
|
+
// Check the signature
|
|
92
|
+
const fields = ["Message", message.Message, "MessageId", message.MessageId]
|
|
93
|
+
.concat(subscribeUrl !== undefined ? ["SubscribeURL", subscribeUrl] : [])
|
|
94
|
+
.concat(["Timestamp", message.Timestamp])
|
|
95
|
+
.concat(token !== undefined ? ["Token", token] : [])
|
|
96
|
+
.concat(["TopicArn", message.TopicArn, "Type", message.Type]);
|
|
97
|
+
const verify = createVerify("RSA-SHA256");
|
|
98
|
+
verify.update(fields.join("\n") + "\n");
|
|
99
|
+
const isValid = verify.verify(certificate.publicKey, message.Signature, "base64");
|
|
100
|
+
if (!isValid) {
|
|
101
|
+
throw new Error("The org event has an invalid signature");
|
|
102
|
+
}
|
|
103
|
+
}
|
|
104
|
+
|
|
105
|
+
/**
|
|
106
|
+
* Parse an org event and check its signature. Throws an error if the
|
|
107
|
+
* message is not a valid org event or the signature is invalid.
|
|
108
|
+
*
|
|
109
|
+
* @param {OrgEventMessage} message The org event message to check
|
|
110
|
+
* @return {OrgEventBase} The org event
|
|
111
|
+
*/
|
|
112
|
+
async parse(message: OrgEventMessage): Promise<OrgEventBase> {
|
|
113
|
+
await this.checkMessage(message);
|
|
114
|
+
|
|
115
|
+
// Check that the event is for the expected org
|
|
116
|
+
const orgEvent: OrgEventBase = JSON.parse(message.Message);
|
|
117
|
+
if (orgEvent.org !== this.#orgId) {
|
|
118
|
+
throw new Error(`Expected org to be '${this.#orgId}', found '${orgEvent.org}'`);
|
|
119
|
+
}
|
|
120
|
+
|
|
121
|
+
return orgEvent;
|
|
122
|
+
}
|
|
123
|
+
|
|
124
|
+
/**
|
|
125
|
+
* Fetches a certificate from a given URL or from the certificate cache.
|
|
126
|
+
* Throws an error if the URL does not correspond to an SNS certificate URL.
|
|
127
|
+
*
|
|
128
|
+
* Note: Ideally, this method would verify the certificate chain, but there
|
|
129
|
+
* is no obvious chain. Instead, this method only fetches certificates from
|
|
130
|
+
* a small set of allowlisted URLs.
|
|
131
|
+
*
|
|
132
|
+
* @param {URL} url The URL of the certificate
|
|
133
|
+
* @return {X509Certificate} The certificate
|
|
134
|
+
*/
|
|
135
|
+
async #fetchAndValidateCertificate(url: URL): Promise<X509Certificate> {
|
|
136
|
+
const currTime = new Date().getTime();
|
|
137
|
+
const cachedCertificate = this.#cachedCertificates.get(url);
|
|
138
|
+
if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {
|
|
139
|
+
return cachedCertificate;
|
|
140
|
+
}
|
|
141
|
+
|
|
142
|
+
// Only fetch certificates from HTTPS URLs
|
|
143
|
+
if (url.protocol !== "https:") {
|
|
144
|
+
throw new Error("Expected signing certificate URL to use HTTPS");
|
|
145
|
+
}
|
|
146
|
+
|
|
147
|
+
// Only fetch certificate URLs for SNS
|
|
148
|
+
if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {
|
|
149
|
+
throw new Error("Expected signing certificate URL for SNS in us-east-1");
|
|
150
|
+
}
|
|
151
|
+
|
|
152
|
+
const response = await fetch(url);
|
|
153
|
+
if (!response.ok) {
|
|
154
|
+
throw new Error(`Unable to download certificate. Status: ${response.status}`);
|
|
155
|
+
}
|
|
156
|
+
const blob = await response.blob();
|
|
157
|
+
const certificate = new X509Certificate(await blob.text());
|
|
158
|
+
if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {
|
|
159
|
+
throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);
|
|
160
|
+
}
|
|
161
|
+
|
|
162
|
+
// Check validity times
|
|
163
|
+
if (currTime < new Date(certificate.validFrom).getTime()) {
|
|
164
|
+
throw new Error("Certificate not valid yet");
|
|
165
|
+
}
|
|
166
|
+
if (new Date(certificate.validTo).getTime() < currTime) {
|
|
167
|
+
throw new Error("Certificate expired");
|
|
168
|
+
}
|
|
169
|
+
|
|
170
|
+
this.#cachedCertificates.set(url, certificate);
|
|
171
|
+
return certificate;
|
|
172
|
+
}
|
|
173
|
+
}
|
package/src/schema.ts
CHANGED
|
@@ -1095,8 +1095,10 @@ export interface components {
|
|
|
1095
1095
|
| "InvalidEip191SignRequest"
|
|
1096
1096
|
| "CannotResendUserInvitation"
|
|
1097
1097
|
| "InvalidNotificationEndpointCount"
|
|
1098
|
+
| "CannotDeletePendingSubscription"
|
|
1098
1099
|
| "InvalidNotificationUrlProtocol"
|
|
1099
|
-
| "EmptyOneOfOrgEventFilter"
|
|
1100
|
+
| "EmptyOneOfOrgEventFilter"
|
|
1101
|
+
| "EmptyAllExceptOrgEventFilter";
|
|
1100
1102
|
/**
|
|
1101
1103
|
* @example {
|
|
1102
1104
|
* "message_base64": "YWJjZGVmZ2hpamtsbW5vcHFyc3R1dnd4eXoxMjM0NTYK"
|
|
@@ -1215,7 +1217,7 @@ export interface components {
|
|
|
1215
1217
|
*/
|
|
1216
1218
|
enclave_signature: string;
|
|
1217
1219
|
};
|
|
1218
|
-
CreateKeyRequest: {
|
|
1220
|
+
CreateKeyRequest: components["schemas"]["UpdateKeyProperties"] & {
|
|
1219
1221
|
/**
|
|
1220
1222
|
* Format: int64
|
|
1221
1223
|
* @description Chain id for which the key is allowed to sign messages
|
|
@@ -1229,11 +1231,6 @@ export interface components {
|
|
|
1229
1231
|
*/
|
|
1230
1232
|
count: number;
|
|
1231
1233
|
key_type: components["schemas"]["KeyType"];
|
|
1232
|
-
/**
|
|
1233
|
-
* @description Allows users to specify a user other than themselves to receive the key
|
|
1234
|
-
* @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
|
|
1235
|
-
*/
|
|
1236
|
-
owner?: string | null;
|
|
1237
1234
|
};
|
|
1238
1235
|
CreateKeyResponse: {
|
|
1239
1236
|
/** @description The info about the created keys */
|
|
@@ -1644,6 +1641,7 @@ export interface components {
|
|
|
1644
1641
|
| "UserNotInRole"
|
|
1645
1642
|
| "MustBeFullMember"
|
|
1646
1643
|
| "SessionExpired"
|
|
1644
|
+
| "SessionChanged"
|
|
1647
1645
|
| "SessionRevoked"
|
|
1648
1646
|
| "ExpectedUserSession"
|
|
1649
1647
|
| "SessionRoleChanged"
|
|
@@ -1899,6 +1897,9 @@ export interface components {
|
|
|
1899
1897
|
| "CognitoGetUser"
|
|
1900
1898
|
| "SnsSubscribeError"
|
|
1901
1899
|
| "SnsUnsubscribeError"
|
|
1900
|
+
| "SnsGetSubscriptionAttributesError"
|
|
1901
|
+
| "SnsSubscriptionAttributesMissing"
|
|
1902
|
+
| "SnsSetSubscriptionAttributesError"
|
|
1902
1903
|
| "SnsPublishBatchError";
|
|
1903
1904
|
InviteRequest: {
|
|
1904
1905
|
/**
|
|
@@ -2215,12 +2216,22 @@ export interface components {
|
|
|
2215
2216
|
| "TotpChallengeNotFound"
|
|
2216
2217
|
| "UserExportRequestNotFound"
|
|
2217
2218
|
| "UserExportCiphertextNotFound";
|
|
2219
|
+
/** @description The configuration and status of a notification endpoint */
|
|
2220
|
+
NotificationEndpoint: components["schemas"]["NotificationEndpointSubscription"] & {
|
|
2221
|
+
status: components["schemas"]["SubscriptionStatus"];
|
|
2222
|
+
};
|
|
2218
2223
|
/** @description The configuration for an org event endpoint */
|
|
2219
2224
|
NotificationEndpointConfiguration: {
|
|
2220
2225
|
filter?: components["schemas"]["OrgEventFilter"];
|
|
2221
2226
|
/** @description URL of the endpoint */
|
|
2222
2227
|
url: string;
|
|
2223
2228
|
};
|
|
2229
|
+
/** @description A notification endpoint subscription */
|
|
2230
|
+
NotificationEndpointSubscription: {
|
|
2231
|
+
/** @description The ARN of the subscription */
|
|
2232
|
+
arn: string;
|
|
2233
|
+
config: components["schemas"]["NotificationEndpointConfiguration"];
|
|
2234
|
+
};
|
|
2224
2235
|
/**
|
|
2225
2236
|
* @description Represents a globally unique OIDC-authorized user by expressing the full "path" to a user. That is:
|
|
2226
2237
|
*
|
|
@@ -2266,6 +2277,7 @@ export interface components {
|
|
|
2266
2277
|
* @enum {string}
|
|
2267
2278
|
*/
|
|
2268
2279
|
OrgEventDiscriminants:
|
|
2280
|
+
| "Billing"
|
|
2269
2281
|
| "OidcAuth"
|
|
2270
2282
|
| "Eth2ConcurrentAttestationSigning"
|
|
2271
2283
|
| "Eth2ConcurrentBlockSigning"
|
|
@@ -2279,6 +2291,10 @@ export interface components {
|
|
|
2279
2291
|
OrgEventFilter: OneOf<
|
|
2280
2292
|
[
|
|
2281
2293
|
"All",
|
|
2294
|
+
{
|
|
2295
|
+
/** @description Accepts all org events other than the ones listed */
|
|
2296
|
+
AllExcept: components["schemas"]["OrgEventDiscriminants"][];
|
|
2297
|
+
},
|
|
2282
2298
|
{
|
|
2283
2299
|
/** @description Only accepts org events that are one of the listed events */
|
|
2284
2300
|
OneOf: components["schemas"]["OrgEventDiscriminants"][];
|
|
@@ -2317,11 +2333,28 @@ export interface components {
|
|
|
2317
2333
|
* request with a JSON-formatted body that contains the event details.
|
|
2318
2334
|
* @example [
|
|
2319
2335
|
* {
|
|
2320
|
-
* "
|
|
2336
|
+
* "arn": "arn:aws:sns:us-east-1:012345678901:OrgEventsTopic:12345678-0000-0000-0000-000000000001",
|
|
2337
|
+
* "config": {
|
|
2338
|
+
* "url": "https://example.com/endpoint1"
|
|
2339
|
+
* },
|
|
2340
|
+
* "status": "Confirmed"
|
|
2341
|
+
* },
|
|
2342
|
+
* {
|
|
2343
|
+
* "arn": "arn:aws:sns:us-east-1:012345678901:OrgEventsTopic:12345678-0000-0000-0000-000000000002",
|
|
2344
|
+
* "config": {
|
|
2345
|
+
* "filter": {
|
|
2346
|
+
* "OneOf": [
|
|
2347
|
+
* "Eth2ConcurrentAttestationSigning",
|
|
2348
|
+
* "Eth2ConcurrentBlockSigning"
|
|
2349
|
+
* ]
|
|
2350
|
+
* },
|
|
2351
|
+
* "url": "https://example.com/endpoint2"
|
|
2352
|
+
* },
|
|
2353
|
+
* "status": "Pending"
|
|
2321
2354
|
* }
|
|
2322
2355
|
* ]
|
|
2323
2356
|
*/
|
|
2324
|
-
notification_endpoints?:
|
|
2357
|
+
notification_endpoints?: components["schemas"]["NotificationEndpoint"][];
|
|
2325
2358
|
/**
|
|
2326
2359
|
* @description The ID of the organization
|
|
2327
2360
|
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
@@ -3026,6 +3059,11 @@ export interface components {
|
|
|
3026
3059
|
*/
|
|
3027
3060
|
num_auth_factors: number;
|
|
3028
3061
|
};
|
|
3062
|
+
/**
|
|
3063
|
+
* @description The status of a subscription
|
|
3064
|
+
* @enum {string}
|
|
3065
|
+
*/
|
|
3066
|
+
SubscriptionStatus: "Confirmed" | "Pending";
|
|
3029
3067
|
TokenInfo: {
|
|
3030
3068
|
/** @description Session ID. Use it to revoke a session. Cannot be used for auth. */
|
|
3031
3069
|
hash: string;
|
|
@@ -3143,19 +3181,14 @@ export interface components {
|
|
|
3143
3181
|
*/
|
|
3144
3182
|
signature: string;
|
|
3145
3183
|
};
|
|
3146
|
-
|
|
3147
|
-
/**
|
|
3148
|
-
* @description If set, updates the keys's `enabled` property to this value.
|
|
3149
|
-
* Once disabled, a key cannot be used for signing.
|
|
3150
|
-
*/
|
|
3151
|
-
enabled?: boolean | null;
|
|
3184
|
+
UpdateKeyProperties: {
|
|
3152
3185
|
/**
|
|
3153
3186
|
* @description If set, update this key's metadata. Validation regex: ^[A-Za-z0-9_=+/ \-\.\,]{0,1024}$
|
|
3154
3187
|
* @example Contract admin key
|
|
3155
3188
|
*/
|
|
3156
3189
|
metadata?: string | null;
|
|
3157
3190
|
/**
|
|
3158
|
-
* @description
|
|
3191
|
+
* @description Allows users to specify a user other than themselves to receive the key
|
|
3159
3192
|
* The new owner must be an existing user who is a member of the same org.
|
|
3160
3193
|
* @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
|
|
3161
3194
|
*/
|
|
@@ -3173,6 +3206,13 @@ export interface components {
|
|
|
3173
3206
|
*/
|
|
3174
3207
|
policy?: Record<string, never>[] | null;
|
|
3175
3208
|
};
|
|
3209
|
+
UpdateKeyRequest: components["schemas"]["UpdateKeyProperties"] & {
|
|
3210
|
+
/**
|
|
3211
|
+
* @description If set, updates the keys's `enabled` property to this value.
|
|
3212
|
+
* Once disabled, a key cannot be used for signing.
|
|
3213
|
+
*/
|
|
3214
|
+
enabled?: boolean | null;
|
|
3215
|
+
};
|
|
3176
3216
|
UpdateOrgRequest: {
|
|
3177
3217
|
/** @description If set, update this org's `enabled` field to this value. */
|
|
3178
3218
|
enabled?: boolean | null;
|
|
@@ -3218,7 +3258,7 @@ export interface components {
|
|
|
3218
3258
|
* }
|
|
3219
3259
|
* ]
|
|
3220
3260
|
*/
|
|
3221
|
-
notification_endpoints?:
|
|
3261
|
+
notification_endpoints?: components["schemas"]["NotificationEndpointConfiguration"][] | null;
|
|
3222
3262
|
/**
|
|
3223
3263
|
* @description If set, update this org's policies (old policies will be overwritten!).
|
|
3224
3264
|
* @example [
|
|
@@ -3279,7 +3319,7 @@ export interface components {
|
|
|
3279
3319
|
* }
|
|
3280
3320
|
* ]
|
|
3281
3321
|
*/
|
|
3282
|
-
notification_endpoints?:
|
|
3322
|
+
notification_endpoints?: components["schemas"]["NotificationEndpointConfiguration"][] | null;
|
|
3283
3323
|
/**
|
|
3284
3324
|
* @description The ID of the organization
|
|
3285
3325
|
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
@@ -3442,6 +3482,18 @@ export interface components {
|
|
|
3442
3482
|
/** @description Optional user name. */
|
|
3443
3483
|
name?: string | null;
|
|
3444
3484
|
};
|
|
3485
|
+
/**
|
|
3486
|
+
* @description Information about a user's membership in an organization
|
|
3487
|
+
* (without including any info about the user)
|
|
3488
|
+
*/
|
|
3489
|
+
UserInOrgMembership: {
|
|
3490
|
+
membership: components["schemas"]["MemberRole"];
|
|
3491
|
+
/**
|
|
3492
|
+
* @description Organization id
|
|
3493
|
+
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
3494
|
+
*/
|
|
3495
|
+
org_id: string;
|
|
3496
|
+
};
|
|
3445
3497
|
UserInRoleInfo: {
|
|
3446
3498
|
user_id: string;
|
|
3447
3499
|
};
|
|
@@ -3461,12 +3513,15 @@ export interface components {
|
|
|
3461
3513
|
*/
|
|
3462
3514
|
name?: string | null;
|
|
3463
3515
|
/**
|
|
3464
|
-
* @
|
|
3516
|
+
* @deprecated
|
|
3517
|
+
* @description All organizations the user belongs to. Deprecated in favor of 'orgs'.
|
|
3465
3518
|
* @example [
|
|
3466
3519
|
* "Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a"
|
|
3467
3520
|
* ]
|
|
3468
3521
|
*/
|
|
3469
3522
|
org_ids: string[];
|
|
3523
|
+
/** @description All organizations the user belongs to, including the membership role in each. */
|
|
3524
|
+
orgs: components["schemas"]["UserInOrgMembership"][];
|
|
3470
3525
|
/**
|
|
3471
3526
|
* @description The id of the currently logged in user
|
|
3472
3527
|
* @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
|
|
@@ -3856,11 +3911,28 @@ export interface components {
|
|
|
3856
3911
|
* request with a JSON-formatted body that contains the event details.
|
|
3857
3912
|
* @example [
|
|
3858
3913
|
* {
|
|
3859
|
-
* "
|
|
3914
|
+
* "arn": "arn:aws:sns:us-east-1:012345678901:OrgEventsTopic:12345678-0000-0000-0000-000000000001",
|
|
3915
|
+
* "config": {
|
|
3916
|
+
* "url": "https://example.com/endpoint1"
|
|
3917
|
+
* },
|
|
3918
|
+
* "status": "Confirmed"
|
|
3919
|
+
* },
|
|
3920
|
+
* {
|
|
3921
|
+
* "arn": "arn:aws:sns:us-east-1:012345678901:OrgEventsTopic:12345678-0000-0000-0000-000000000002",
|
|
3922
|
+
* "config": {
|
|
3923
|
+
* "filter": {
|
|
3924
|
+
* "OneOf": [
|
|
3925
|
+
* "Eth2ConcurrentAttestationSigning",
|
|
3926
|
+
* "Eth2ConcurrentBlockSigning"
|
|
3927
|
+
* ]
|
|
3928
|
+
* },
|
|
3929
|
+
* "url": "https://example.com/endpoint2"
|
|
3930
|
+
* },
|
|
3931
|
+
* "status": "Pending"
|
|
3860
3932
|
* }
|
|
3861
3933
|
* ]
|
|
3862
3934
|
*/
|
|
3863
|
-
notification_endpoints?:
|
|
3935
|
+
notification_endpoints?: components["schemas"]["NotificationEndpoint"][];
|
|
3864
3936
|
/**
|
|
3865
3937
|
* @description The ID of the organization
|
|
3866
3938
|
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
@@ -4188,7 +4260,9 @@ export interface components {
|
|
|
4188
4260
|
* }
|
|
4189
4261
|
* ]
|
|
4190
4262
|
*/
|
|
4191
|
-
notification_endpoints?:
|
|
4263
|
+
notification_endpoints?:
|
|
4264
|
+
| components["schemas"]["NotificationEndpointConfiguration"][]
|
|
4265
|
+
| null;
|
|
4192
4266
|
/**
|
|
4193
4267
|
* @description The ID of the organization
|
|
4194
4268
|
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
@@ -4276,12 +4350,15 @@ export interface components {
|
|
|
4276
4350
|
*/
|
|
4277
4351
|
name?: string | null;
|
|
4278
4352
|
/**
|
|
4279
|
-
* @
|
|
4353
|
+
* @deprecated
|
|
4354
|
+
* @description All organizations the user belongs to. Deprecated in favor of 'orgs'.
|
|
4280
4355
|
* @example [
|
|
4281
4356
|
* "Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a"
|
|
4282
4357
|
* ]
|
|
4283
4358
|
*/
|
|
4284
4359
|
org_ids: string[];
|
|
4360
|
+
/** @description All organizations the user belongs to, including the membership role in each. */
|
|
4361
|
+
orgs: components["schemas"]["UserInOrgMembership"][];
|
|
4285
4362
|
/**
|
|
4286
4363
|
* @description The id of the currently logged in user
|
|
4287
4364
|
* @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
|
package/src/schema_types.ts
CHANGED
|
@@ -5,6 +5,7 @@ import { JsonMap } from "./util";
|
|
|
5
5
|
type schemas = components["schemas"];
|
|
6
6
|
|
|
7
7
|
export type UserInfo = schemas["UserInfo"];
|
|
8
|
+
export type UserInOrgMembership = schemas["UserInOrgMembership"];
|
|
8
9
|
export type ConfiguredMfa = schemas["ConfiguredMfa"];
|
|
9
10
|
export type RatchetConfig = schemas["RatchetConfig"];
|
|
10
11
|
export type IdentityProof = schemas["IdentityProof"];
|
|
@@ -36,6 +37,8 @@ export type SchemaKeyType = schemas["KeyType"];
|
|
|
36
37
|
|
|
37
38
|
export type ListKeysResponse = schemas["PaginatedListKeysResponse"];
|
|
38
39
|
export type UpdateKeyRequest = schemas["UpdateKeyRequest"];
|
|
40
|
+
export type UpdateKeyProperties = schemas["UpdateKeyProperties"];
|
|
41
|
+
export type CreateKeyRequest = schemas["CreateKeyRequest"];
|
|
39
42
|
export type KeyInfoApi = schemas["KeyInfo"];
|
|
40
43
|
export type KeyInRoleInfo = schemas["KeyInRoleInfo"];
|
|
41
44
|
export type UserInRoleInfo = schemas["UserInRoleInfo"];
|