@cubist-labs/cubesigner-sdk 0.3.19 → 0.3.23

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (52) hide show
  1. package/dist/cjs/package.json +1 -1
  2. package/dist/cjs/spec/env/beta.json +2 -1
  3. package/dist/cjs/spec/env/gamma.json +2 -1
  4. package/dist/cjs/spec/env/prod.json +2 -1
  5. package/dist/cjs/src/api.d.ts +3 -1
  6. package/dist/cjs/src/api.js +5 -3
  7. package/dist/cjs/src/client.d.ts +11 -2
  8. package/dist/cjs/src/client.js +5 -3
  9. package/dist/cjs/src/env.d.ts +1 -0
  10. package/dist/cjs/src/env.js +1 -1
  11. package/dist/cjs/src/error.js +7 -2
  12. package/dist/cjs/src/index.d.ts +2 -0
  13. package/dist/cjs/src/index.js +3 -1
  14. package/dist/cjs/src/org.d.ts +13 -1
  15. package/dist/cjs/src/org.js +2 -2
  16. package/dist/cjs/src/org_event_processor.d.ts +57 -0
  17. package/dist/cjs/src/org_event_processor.js +137 -0
  18. package/dist/cjs/src/schema.d.ts +94 -26
  19. package/dist/cjs/src/schema.js +1 -1
  20. package/dist/cjs/src/schema_types.d.ts +3 -0
  21. package/dist/cjs/src/schema_types.js +1 -1
  22. package/dist/esm/package.json +1 -1
  23. package/dist/esm/spec/env/beta.json +2 -1
  24. package/dist/esm/spec/env/gamma.json +2 -1
  25. package/dist/esm/spec/env/prod.json +2 -1
  26. package/dist/esm/src/api.d.ts +3 -1
  27. package/dist/esm/src/api.js +5 -3
  28. package/dist/esm/src/client.d.ts +11 -2
  29. package/dist/esm/src/client.js +5 -3
  30. package/dist/esm/src/env.d.ts +1 -0
  31. package/dist/esm/src/env.js +1 -1
  32. package/dist/esm/src/error.js +7 -2
  33. package/dist/esm/src/index.d.ts +2 -0
  34. package/dist/esm/src/index.js +3 -1
  35. package/dist/esm/src/org.d.ts +13 -1
  36. package/dist/esm/src/org.js +2 -2
  37. package/dist/esm/src/org_event_processor.d.ts +57 -0
  38. package/dist/esm/src/org_event_processor.js +133 -0
  39. package/dist/esm/src/schema.d.ts +94 -26
  40. package/dist/esm/src/schema.js +1 -1
  41. package/dist/esm/src/schema_types.d.ts +3 -0
  42. package/dist/esm/src/schema_types.js +1 -1
  43. package/package.json +1 -1
  44. package/src/api.ts +10 -3
  45. package/src/client.ts +11 -3
  46. package/src/env.ts +1 -0
  47. package/src/error.ts +6 -1
  48. package/src/index.ts +2 -0
  49. package/src/org.ts +1 -1
  50. package/src/org_event_processor.ts +173 -0
  51. package/src/schema.ts +100 -23
  52. package/src/schema_types.ts +3 -0
@@ -0,0 +1,137 @@
1
+ "use strict";
2
+ var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
3
+ if (kind === "m") throw new TypeError("Private method is not writable");
4
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
5
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
6
+ return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
7
+ };
8
+ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
9
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
10
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
11
+ return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
12
+ };
13
+ var _OrgEventProcessor_instances, _OrgEventProcessor_topicArn, _OrgEventProcessor_orgId, _OrgEventProcessor_cachedCertificates, _OrgEventProcessor_fetchAndValidateCertificate;
14
+ Object.defineProperty(exports, "__esModule", { value: true });
15
+ exports.OrgEventProcessor = void 0;
16
+ const crypto_1 = require("crypto");
17
+ const _1 = require(".");
18
+ // URLs that are safe to retrieve certificates from
19
+ const SNS_CERTIFICATE_URL_HOSTS = ["sns.us-east-1.amazonaws.com"];
20
+ const SNS_CERTIFICATE_HOST = "sns.amazonaws.com";
21
+ /** A utility for processing org event messages */
22
+ class OrgEventProcessor {
23
+ /**
24
+ * Constructor.
25
+ * @param {string} orgId The org id
26
+ * @param {OrgEventProcessorOptions} options Additional options for the processor
27
+ */
28
+ constructor(orgId, options) {
29
+ _OrgEventProcessor_instances.add(this);
30
+ _OrgEventProcessor_topicArn.set(this, void 0);
31
+ _OrgEventProcessor_orgId.set(this, void 0);
32
+ _OrgEventProcessor_cachedCertificates.set(this, void 0);
33
+ __classPrivateFieldSet(this, _OrgEventProcessor_topicArn, _1.envs[options?.env ?? "prod"].OrgEventsTopicArn, "f");
34
+ __classPrivateFieldSet(this, _OrgEventProcessor_orgId, orgId, "f");
35
+ __classPrivateFieldSet(this, _OrgEventProcessor_cachedCertificates, new Map(), "f");
36
+ }
37
+ /**
38
+ * Checks an SNS message and its signature. Throws an error if the message
39
+ * invalid or the signature is invalid.
40
+ *
41
+ * @param {SnsMessage} message The SNS message to check
42
+ */
43
+ async checkMessage(message) {
44
+ // Check the topic ARN
45
+ if (message.TopicArn !== __classPrivateFieldGet(this, _OrgEventProcessor_topicArn, "f")) {
46
+ throw new Error(`Expected topic ARN '${__classPrivateFieldGet(this, _OrgEventProcessor_topicArn, "f")}', found '${message.TopicArn}'`);
47
+ }
48
+ // Both subscription confirmations and org event messages should have no subject
49
+ if ("Subject" in message) {
50
+ throw new Error("Expected a message without a subject");
51
+ }
52
+ // The org events topic uses signature version 2 (SHA256)
53
+ if (message.SignatureVersion !== "2") {
54
+ throw new Error("Expected signature version 2");
55
+ }
56
+ // Retrieve the certificate and sanity check it
57
+ const certificate = await __classPrivateFieldGet(this, _OrgEventProcessor_instances, "m", _OrgEventProcessor_fetchAndValidateCertificate).call(this, new URL(message.SigningCertURL));
58
+ // Extract fields specific to subscription confirmations
59
+ const subscribeUrl = message.SubscribeURL;
60
+ const token = message.Token;
61
+ // Check the signature
62
+ const fields = ["Message", message.Message, "MessageId", message.MessageId]
63
+ .concat(subscribeUrl !== undefined ? ["SubscribeURL", subscribeUrl] : [])
64
+ .concat(["Timestamp", message.Timestamp])
65
+ .concat(token !== undefined ? ["Token", token] : [])
66
+ .concat(["TopicArn", message.TopicArn, "Type", message.Type]);
67
+ const verify = (0, crypto_1.createVerify)("RSA-SHA256");
68
+ verify.update(fields.join("\n") + "\n");
69
+ const isValid = verify.verify(certificate.publicKey, message.Signature, "base64");
70
+ if (!isValid) {
71
+ throw new Error("The org event has an invalid signature");
72
+ }
73
+ }
74
+ /**
75
+ * Parse an org event and check its signature. Throws an error if the
76
+ * message is not a valid org event or the signature is invalid.
77
+ *
78
+ * @param {OrgEventMessage} message The org event message to check
79
+ * @return {OrgEventBase} The org event
80
+ */
81
+ async parse(message) {
82
+ await this.checkMessage(message);
83
+ // Check that the event is for the expected org
84
+ const orgEvent = JSON.parse(message.Message);
85
+ if (orgEvent.org !== __classPrivateFieldGet(this, _OrgEventProcessor_orgId, "f")) {
86
+ throw new Error(`Expected org to be '${__classPrivateFieldGet(this, _OrgEventProcessor_orgId, "f")}', found '${orgEvent.org}'`);
87
+ }
88
+ return orgEvent;
89
+ }
90
+ }
91
+ exports.OrgEventProcessor = OrgEventProcessor;
92
+ _OrgEventProcessor_topicArn = new WeakMap(), _OrgEventProcessor_orgId = new WeakMap(), _OrgEventProcessor_cachedCertificates = new WeakMap(), _OrgEventProcessor_instances = new WeakSet(), _OrgEventProcessor_fetchAndValidateCertificate =
93
+ /**
94
+ * Fetches a certificate from a given URL or from the certificate cache.
95
+ * Throws an error if the URL does not correspond to an SNS certificate URL.
96
+ *
97
+ * Note: Ideally, this method would verify the certificate chain, but there
98
+ * is no obvious chain. Instead, this method only fetches certificates from
99
+ * a small set of allowlisted URLs.
100
+ *
101
+ * @param {URL} url The URL of the certificate
102
+ * @return {X509Certificate} The certificate
103
+ */
104
+ async function _OrgEventProcessor_fetchAndValidateCertificate(url) {
105
+ const currTime = new Date().getTime();
106
+ const cachedCertificate = __classPrivateFieldGet(this, _OrgEventProcessor_cachedCertificates, "f").get(url);
107
+ if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {
108
+ return cachedCertificate;
109
+ }
110
+ // Only fetch certificates from HTTPS URLs
111
+ if (url.protocol !== "https:") {
112
+ throw new Error("Expected signing certificate URL to use HTTPS");
113
+ }
114
+ // Only fetch certificate URLs for SNS
115
+ if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {
116
+ throw new Error("Expected signing certificate URL for SNS in us-east-1");
117
+ }
118
+ const response = await fetch(url);
119
+ if (!response.ok) {
120
+ throw new Error(`Unable to download certificate. Status: ${response.status}`);
121
+ }
122
+ const blob = await response.blob();
123
+ const certificate = new crypto_1.X509Certificate(await blob.text());
124
+ if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {
125
+ throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);
126
+ }
127
+ // Check validity times
128
+ if (currTime < new Date(certificate.validFrom).getTime()) {
129
+ throw new Error("Certificate not valid yet");
130
+ }
131
+ if (new Date(certificate.validTo).getTime() < currTime) {
132
+ throw new Error("Certificate expired");
133
+ }
134
+ __classPrivateFieldGet(this, _OrgEventProcessor_cachedCertificates, "f").set(url, certificate);
135
+ return certificate;
136
+ };
137
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"org_event_processor.js","sourceRoot":"","sources":["../../../src/org_event_processor.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAAuD;AACvD,wBAAsC;AAEtC,mDAAmD;AACnD,MAAM,yBAAyB,GAAG,CAAC,6BAA6B,CAAC,CAAC;AAElE,MAAM,oBAAoB,GAAG,mBAAmB,CAAC;AAsCjD,kDAAkD;AAClD,MAAa,iBAAiB;IAK5B;;;;OAIG;IACH,YAAY,KAAa,EAAE,OAAkC;;QATpD,8CAAkB;QAClB,2CAAe;QACxB,wDAA+C;QAQ7C,uBAAA,IAAI,+BAAa,OAAI,CAAC,OAAO,EAAE,GAAG,IAAI,MAAM,CAAC,CAAC,iBAAiB,MAAA,CAAC;QAChE,uBAAA,IAAI,4BAAU,KAAK,MAAA,CAAC;QACpB,uBAAA,IAAI,yCAAuB,IAAI,GAAG,EAAE,MAAA,CAAC;IACvC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,YAAY,CAAC,OAAmB;QACpC,sBAAsB;QACtB,IAAI,OAAO,CAAC,QAAQ,KAAK,uBAAA,IAAI,mCAAU,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CAAC,uBAAuB,uBAAA,IAAI,mCAAU,aAAa,OAAO,CAAC,QAAQ,GAAG,CAAC,CAAC;QACzF,CAAC;QAED,gFAAgF;QAChF,IAAI,SAAS,IAAI,OAAO,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;QAC1D,CAAC;QAED,yDAAyD;QACzD,IAAI,OAAO,CAAC,gBAAgB,KAAK,GAAG,EAAE,CAAC;YACrC,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QAED,+CAA+C;QAC/C,MAAM,WAAW,GAAG,MAAM,uBAAA,IAAI,oFAA6B,MAAjC,IAAI,EAA8B,IAAI,GAAG,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC;QAE7F,wDAAwD;QACxD,MAAM,YAAY,GAAI,OAA2C,CAAC,YAAY,CAAC;QAC/E,MAAM,KAAK,GAAI,OAA2C,CAAC,KAAK,CAAC;QAEjE,sBAAsB;QACtB,MAAM,MAAM,GAAG,CAAC,SAAS,EAAE,OAAO,CAAC,OAAO,EAAE,WAAW,EAAE,OAAO,CAAC,SAAS,CAAC;aACxE,MAAM,CAAC,YAAY,KAAK,SAAS,CAAC,CAAC,CAAC,CAAC,cAAc,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;aACxE,MAAM,CAAC,CAAC,WAAW,EAAE,OAAO,CAAC,SAAS,CAAC,CAAC;aACxC,MAAM,CAAC,KAAK,KAAK,SAAS,CAAC,CAAC,CAAC,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;aACnD,MAAM,CAAC,CAAC,UAAU,EAAE,OAAO,CAAC,QAAQ,EAAE,MAAM,EAAE,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC;QAChE,MAAM,MAAM,GAAG,IAAA,qBAAY,EAAC,YAAY,CAAC,CAAC;QAC1C,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,IAAI,CAAC,CAAC;QACxC,MAAM,OAAO,GAAG,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,OAAO,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;QAClF,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC5D,CAAC;IACH,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,KAAK,CAAC,OAAwB;QAClC,MAAM,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAEjC,+CAA+C;QAC/C,MAAM,QAAQ,GAAiB,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;QAC3D,IAAI,QAAQ,CAAC,GAAG,KAAK,uBAAA,IAAI,gCAAO,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CAAC,uBAAuB,uBAAA,IAAI,gCAAO,aAAa,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;QAClF,CAAC;QAED,OAAO,QAAQ,CAAC;IAClB,CAAC;CAmDF;AA/HD,8CA+HC;;AAjDC;;;;;;;;;;GAUG;AACH,KAAK,yDAA8B,GAAQ;IACzC,MAAM,QAAQ,GAAG,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,CAAC;IACtC,MAAM,iBAAiB,GAAG,uBAAA,IAAI,6CAAoB,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;IAC5D,IAAI,iBAAiB,IAAI,QAAQ,GAAG,IAAI,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;QAClF,OAAO,iBAAiB,CAAC;IAC3B,CAAC;IAED,0CAA0C;IAC1C,IAAI,GAAG,CAAC,QAAQ,KAAK,QAAQ,EAAE,CAAC;QAC9B,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;IACnE,CAAC;IAED,sCAAsC;IACtC,IAAI,yBAAyB,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC;QACvD,MAAM,IAAI,KAAK,CAAC,uDAAuD,CAAC,CAAC;IAC3E,CAAC;IAED,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;IAClC,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE,CAAC;QACjB,MAAM,IAAI,KAAK,CAAC,2CAA2C,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC;IAChF,CAAC;IACD,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;IACnC,MAAM,WAAW,GAAG,IAAI,wBAAe,CAAC,MAAM,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC;IAC3D,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,oBAAoB,CAAC,EAAE,CAAC;QACjD,MAAM,IAAI,KAAK,CAAC,mCAAmC,oBAAoB,GAAG,CAAC,CAAC;IAC9E,CAAC;IAED,uBAAuB;IACvB,IAAI,QAAQ,GAAG,IAAI,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;QACzD,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;IAC/C,CAAC;IACD,IAAI,IAAI,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,GAAG,QAAQ,EAAE,CAAC;QACvD,MAAM,IAAI,KAAK,CAAC,qBAAqB,CAAC,CAAC;IACzC,CAAC;IAED,uBAAA,IAAI,6CAAoB,CAAC,GAAG,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;IAC/C,OAAO,WAAW,CAAC;AACrB,CAAC","sourcesContent":["import { X509Certificate, createVerify } from \"crypto\";\nimport { Environment, envs } from \".\";\n\n// URLs that are safe to retrieve certificates from\nconst SNS_CERTIFICATE_URL_HOSTS = [\"sns.us-east-1.amazonaws.com\"];\n\nconst SNS_CERTIFICATE_HOST = \"sns.amazonaws.com\";\n\n/** The common fields of SNS messages */\nexport interface SnsMessage {\n  Type: string;\n  MessageId: string;\n  TopicArn: string;\n  Message: string;\n  Timestamp: string;\n  SignatureVersion: string;\n  Signature: string;\n  SigningCertURL: string;\n}\n\n/** The format of a subscription confirmation sent by SNS */\nexport interface SubscriptionConfirmationMessage extends SnsMessage {\n  Token: string;\n  SubscribeURL: string;\n}\n\n/** Common fields for an org event */\nexport interface OrgEventBase {\n  org: string;\n  utc_timestamp: number;\n  org_event: string;\n}\n\n/** The format of an event message sent by SNS */\nexport interface OrgEventMessage extends SnsMessage {\n  Subject?: string;\n  UnsubscribeURL: string;\n}\n\n/** Options for the processor */\nexport interface OrgEventProcessorOptions {\n  env: Environment;\n}\n\n/** A utility for processing org event messages */\nexport class OrgEventProcessor {\n  readonly #topicArn: string;\n  readonly #orgId: string;\n  #cachedCertificates: Map<URL, X509Certificate>;\n\n  /**\n   * Constructor.\n   * @param {string} orgId The org id\n   * @param {OrgEventProcessorOptions} options Additional options for the processor\n   */\n  constructor(orgId: string, options?: OrgEventProcessorOptions) {\n    this.#topicArn = envs[options?.env ?? \"prod\"].OrgEventsTopicArn;\n    this.#orgId = orgId;\n    this.#cachedCertificates = new Map();\n  }\n\n  /**\n   * Checks an SNS message and its signature. Throws an error if the message\n   * invalid or the signature is invalid.\n   *\n   * @param {SnsMessage} message The SNS message to check\n   */\n  async checkMessage(message: SnsMessage) {\n    // Check the topic ARN\n    if (message.TopicArn !== this.#topicArn) {\n      throw new Error(`Expected topic ARN '${this.#topicArn}', found '${message.TopicArn}'`);\n    }\n\n    // Both subscription confirmations and org event messages should have no subject\n    if (\"Subject\" in message) {\n      throw new Error(\"Expected a message without a subject\");\n    }\n\n    // The org events topic uses signature version 2 (SHA256)\n    if (message.SignatureVersion !== \"2\") {\n      throw new Error(\"Expected signature version 2\");\n    }\n\n    // Retrieve the certificate and sanity check it\n    const certificate = await this.#fetchAndValidateCertificate(new URL(message.SigningCertURL));\n\n    // Extract fields specific to subscription confirmations\n    const subscribeUrl = (message as SubscriptionConfirmationMessage).SubscribeURL;\n    const token = (message as SubscriptionConfirmationMessage).Token;\n\n    // Check the signature\n    const fields = [\"Message\", message.Message, \"MessageId\", message.MessageId]\n      .concat(subscribeUrl !== undefined ? [\"SubscribeURL\", subscribeUrl] : [])\n      .concat([\"Timestamp\", message.Timestamp])\n      .concat(token !== undefined ? [\"Token\", token] : [])\n      .concat([\"TopicArn\", message.TopicArn, \"Type\", message.Type]);\n    const verify = createVerify(\"RSA-SHA256\");\n    verify.update(fields.join(\"\\n\") + \"\\n\");\n    const isValid = verify.verify(certificate.publicKey, message.Signature, \"base64\");\n    if (!isValid) {\n      throw new Error(\"The org event has an invalid signature\");\n    }\n  }\n\n  /**\n   * Parse an org event and check its signature. Throws an error if the\n   * message is not a valid org event or the signature is invalid.\n   *\n   * @param {OrgEventMessage} message The org event message to check\n   * @return {OrgEventBase} The org event\n   */\n  async parse(message: OrgEventMessage): Promise<OrgEventBase> {\n    await this.checkMessage(message);\n\n    // Check that the event is for the expected org\n    const orgEvent: OrgEventBase = JSON.parse(message.Message);\n    if (orgEvent.org !== this.#orgId) {\n      throw new Error(`Expected org to be '${this.#orgId}', found '${orgEvent.org}'`);\n    }\n\n    return orgEvent;\n  }\n\n  /**\n   * Fetches a certificate from a given URL or from the certificate cache.\n   * Throws an error if the URL does not correspond to an SNS certificate URL.\n   *\n   * Note: Ideally, this method would verify the certificate chain, but there\n   * is no obvious chain. Instead, this method only fetches certificates from\n   * a small set of allowlisted URLs.\n   *\n   * @param {URL} url The URL of the certificate\n   * @return {X509Certificate} The certificate\n   */\n  async #fetchAndValidateCertificate(url: URL): Promise<X509Certificate> {\n    const currTime = new Date().getTime();\n    const cachedCertificate = this.#cachedCertificates.get(url);\n    if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {\n      return cachedCertificate;\n    }\n\n    // Only fetch certificates from HTTPS URLs\n    if (url.protocol !== \"https:\") {\n      throw new Error(\"Expected signing certificate URL to use HTTPS\");\n    }\n\n    // Only fetch certificate URLs for SNS\n    if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {\n      throw new Error(\"Expected signing certificate URL for SNS in us-east-1\");\n    }\n\n    const response = await fetch(url);\n    if (!response.ok) {\n      throw new Error(`Unable to download certificate. Status: ${response.status}`);\n    }\n    const blob = await response.blob();\n    const certificate = new X509Certificate(await blob.text());\n    if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {\n      throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);\n    }\n\n    // Check validity times\n    if (currTime < new Date(certificate.validFrom).getTime()) {\n      throw new Error(\"Certificate not valid yet\");\n    }\n    if (new Date(certificate.validTo).getTime() < currTime) {\n      throw new Error(\"Certificate expired\");\n    }\n\n    this.#cachedCertificates.set(url, certificate);\n    return certificate;\n  }\n}\n"]}
@@ -1005,7 +1005,7 @@ export interface components {
1005
1005
  /** @enum {string} */
1006
1006
  BadGatewayErrorCode: "OAuthProviderError";
1007
1007
  /** @enum {string} */
1008
- BadRequestErrorCode: "GenericBadRequest" | "InvalidBody" | "TokenRequestError" | "InvalidMfaReceipt" | "InvalidMfaPolicyCount" | "InvalidMfaPolicyNumAuthFactors" | "InvalidMfaPolicyNumAllowedApprovers" | "InvalidMfaPolicyRedundantRule" | "InvalidCreateKeyCount" | "OrgInviteExistingUser" | "OrgNameTaken" | "RoleNameTaken" | "AddKeyToRoleCountTooHigh" | "InvalidKeyId" | "InvalidKeyMetadataLength" | "InvalidKeyMetadata" | "InvalidKeyMaterialId" | "KeyNotFound" | "UserExportDerivedKey" | "UserExportPublicKeyInvalid" | "UserExportInProgress" | "RoleNotFound" | "InvalidMfaReceiptOrgIdMissing" | "InvalidMfaReceiptInvalidOrgId" | "MfaRequestNotFound" | "InvalidKeyType" | "InvalidKeyMaterial" | "InvalidHexValue" | "InvalidBase32Value" | "InvalidBase58Value" | "InvalidForkVersionLength" | "InvalidEthAddress" | "InvalidStellarAddress" | "InvalidOrgNameOrId" | "InvalidStakeDeposit" | "InvalidBlobSignRequest" | "InvalidSolanaSignRequest" | "InvalidEip712SignRequest" | "InvalidEvmSignRequest" | "InvalidEth2SignRequest" | "InvalidDeriveKeyRequest" | "InvalidStakingAmount" | "CustomStakingAmountNotAllowedForWrapperContract" | "InvalidUnstakeRequest" | "InvalidCreateUserRequest" | "UserAlreadyExists" | "UserNotFound" | "PolicyRuleKeyMismatch" | "EmptyScopes" | "InvalidScopesForRoleSession" | "InvalidLifetime" | "NoSingleKeyForUser" | "InvalidOrgPolicyRule" | "SourceIpAllowlistEmpty" | "InvalidOrgPolicyRepeatedRule" | "AvaSignHashError" | "AvaSignError" | "BtcSegwitHashError" | "BtcSignError" | "Eip712SignError" | "InvalidMemberRoleInUserAdd" | "ThirdPartyUserAlreadyExists" | "ThirdPartyUserNotFound" | "DeleteOidcUserError" | "SessionRoleMismatch" | "InvalidOidcToken" | "OidcIssuerUnsupported" | "OidcIssuerNotAllowed" | "OidcIssuerNoApplicableJwk" | "FidoKeyAlreadyRegistered" | "FidoKeySignCountTooLow" | "FidoVerificationFailed" | "FidoChallengeMfaMismatch" | "UnsupportedLegacyCognitoSession" | "InvalidIdentityProof" | "PaginationDataExpired" | "ExistingKeysViolateExclusiveKeyAccess" | "ExportDelayTooShort" | "ExportWindowTooLong" | "InvalidTotpFailureLimit" | "InvalidEip191SignRequest" | "CannotResendUserInvitation" | "InvalidNotificationEndpointCount" | "InvalidNotificationUrlProtocol" | "EmptyOneOfOrgEventFilter";
1008
+ BadRequestErrorCode: "GenericBadRequest" | "InvalidBody" | "TokenRequestError" | "InvalidMfaReceipt" | "InvalidMfaPolicyCount" | "InvalidMfaPolicyNumAuthFactors" | "InvalidMfaPolicyNumAllowedApprovers" | "InvalidMfaPolicyRedundantRule" | "InvalidCreateKeyCount" | "OrgInviteExistingUser" | "OrgNameTaken" | "RoleNameTaken" | "AddKeyToRoleCountTooHigh" | "InvalidKeyId" | "InvalidKeyMetadataLength" | "InvalidKeyMetadata" | "InvalidKeyMaterialId" | "KeyNotFound" | "UserExportDerivedKey" | "UserExportPublicKeyInvalid" | "UserExportInProgress" | "RoleNotFound" | "InvalidMfaReceiptOrgIdMissing" | "InvalidMfaReceiptInvalidOrgId" | "MfaRequestNotFound" | "InvalidKeyType" | "InvalidKeyMaterial" | "InvalidHexValue" | "InvalidBase32Value" | "InvalidBase58Value" | "InvalidForkVersionLength" | "InvalidEthAddress" | "InvalidStellarAddress" | "InvalidOrgNameOrId" | "InvalidStakeDeposit" | "InvalidBlobSignRequest" | "InvalidSolanaSignRequest" | "InvalidEip712SignRequest" | "InvalidEvmSignRequest" | "InvalidEth2SignRequest" | "InvalidDeriveKeyRequest" | "InvalidStakingAmount" | "CustomStakingAmountNotAllowedForWrapperContract" | "InvalidUnstakeRequest" | "InvalidCreateUserRequest" | "UserAlreadyExists" | "UserNotFound" | "PolicyRuleKeyMismatch" | "EmptyScopes" | "InvalidScopesForRoleSession" | "InvalidLifetime" | "NoSingleKeyForUser" | "InvalidOrgPolicyRule" | "SourceIpAllowlistEmpty" | "InvalidOrgPolicyRepeatedRule" | "AvaSignHashError" | "AvaSignError" | "BtcSegwitHashError" | "BtcSignError" | "Eip712SignError" | "InvalidMemberRoleInUserAdd" | "ThirdPartyUserAlreadyExists" | "ThirdPartyUserNotFound" | "DeleteOidcUserError" | "SessionRoleMismatch" | "InvalidOidcToken" | "OidcIssuerUnsupported" | "OidcIssuerNotAllowed" | "OidcIssuerNoApplicableJwk" | "FidoKeyAlreadyRegistered" | "FidoKeySignCountTooLow" | "FidoVerificationFailed" | "FidoChallengeMfaMismatch" | "UnsupportedLegacyCognitoSession" | "InvalidIdentityProof" | "PaginationDataExpired" | "ExistingKeysViolateExclusiveKeyAccess" | "ExportDelayTooShort" | "ExportWindowTooLong" | "InvalidTotpFailureLimit" | "InvalidEip191SignRequest" | "CannotResendUserInvitation" | "InvalidNotificationEndpointCount" | "CannotDeletePendingSubscription" | "InvalidNotificationUrlProtocol" | "EmptyOneOfOrgEventFilter" | "EmptyAllExceptOrgEventFilter";
1009
1009
  /**
1010
1010
  * @example {
1011
1011
  * "message_base64": "YWJjZGVmZ2hpamtsbW5vcHFyc3R1dnd4eXoxMjM0NTYK"
@@ -1116,7 +1116,7 @@ export interface components {
1116
1116
  */
1117
1117
  enclave_signature: string;
1118
1118
  };
1119
- CreateKeyRequest: {
1119
+ CreateKeyRequest: components["schemas"]["UpdateKeyProperties"] & {
1120
1120
  /**
1121
1121
  * Format: int64
1122
1122
  * @description Chain id for which the key is allowed to sign messages
@@ -1130,11 +1130,6 @@ export interface components {
1130
1130
  */
1131
1131
  count: number;
1132
1132
  key_type: components["schemas"]["KeyType"];
1133
- /**
1134
- * @description Allows users to specify a user other than themselves to receive the key
1135
- * @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
1136
- */
1137
- owner?: string | null;
1138
1133
  };
1139
1134
  CreateKeyResponse: {
1140
1135
  /** @description The info about the created keys */
@@ -1501,7 +1496,7 @@ export interface components {
1501
1496
  name: string;
1502
1497
  };
1503
1498
  /** @enum {string} */
1504
- ForbiddenErrorCode: "FidoRequiredToRemoveTotp" | "MfaChallengeExpired" | "ChainIdNotAllowed" | "InvalidOrg" | "SessionForWrongOrg" | "OrgDisabled" | "OrgNotFound" | "OrgWithoutOwner" | "OrphanedUser" | "OidcUserNotFound" | "UserNotInOrg" | "UserNotOrgOwner" | "UserNotKeyOwner" | "InvalidRole" | "DisabledRole" | "KeyDisabled" | "RoleNotInOrg" | "KeyNotInRole" | "KeyNotInOrg" | "UserExportRequestNotInOrg" | "UserExportRequestInvalid" | "UserNotOriginalKeyOwner" | "UserNotInRole" | "MustBeFullMember" | "SessionExpired" | "SessionRevoked" | "ExpectedUserSession" | "SessionRoleChanged" | "ScopedNameNotFound" | "SessionInvalidEpochToken" | "SessionInvalidRefreshToken" | "SessionRefreshTokenExpired" | "InvalidAuthHeader" | "SessionNotFound" | "InvalidArn" | "SessionInvalidAuthToken" | "SessionAuthTokenExpired" | "SessionPossiblyStolenToken" | "MfaDisallowedIdentity" | "MfaDisallowedApprover" | "MfaTypeNotAllowed" | "MfaNotApprovedYet" | "MfaConfirmationCodeMismatch" | "MfaHttpRequestMismatch" | "MfaRemoveBelowMin" | "TotpAlreadyConfigured" | "TotpConfigurationChanged" | "MfaTotpBadConfiguration" | "MfaTotpBadCode" | "MfaTotpRateLimit" | "ImproperSessionScope" | "FullSessionRequired" | "SessionWithoutAnyScopeUnder" | "UserRoleUnprivileged" | "MfaNotConfigured";
1499
+ ForbiddenErrorCode: "FidoRequiredToRemoveTotp" | "MfaChallengeExpired" | "ChainIdNotAllowed" | "InvalidOrg" | "SessionForWrongOrg" | "OrgDisabled" | "OrgNotFound" | "OrgWithoutOwner" | "OrphanedUser" | "OidcUserNotFound" | "UserNotInOrg" | "UserNotOrgOwner" | "UserNotKeyOwner" | "InvalidRole" | "DisabledRole" | "KeyDisabled" | "RoleNotInOrg" | "KeyNotInRole" | "KeyNotInOrg" | "UserExportRequestNotInOrg" | "UserExportRequestInvalid" | "UserNotOriginalKeyOwner" | "UserNotInRole" | "MustBeFullMember" | "SessionExpired" | "SessionChanged" | "SessionRevoked" | "ExpectedUserSession" | "SessionRoleChanged" | "ScopedNameNotFound" | "SessionInvalidEpochToken" | "SessionInvalidRefreshToken" | "SessionRefreshTokenExpired" | "InvalidAuthHeader" | "SessionNotFound" | "InvalidArn" | "SessionInvalidAuthToken" | "SessionAuthTokenExpired" | "SessionPossiblyStolenToken" | "MfaDisallowedIdentity" | "MfaDisallowedApprover" | "MfaTypeNotAllowed" | "MfaNotApprovedYet" | "MfaConfirmationCodeMismatch" | "MfaHttpRequestMismatch" | "MfaRemoveBelowMin" | "TotpAlreadyConfigured" | "TotpConfigurationChanged" | "MfaTotpBadConfiguration" | "MfaTotpBadCode" | "MfaTotpRateLimit" | "ImproperSessionScope" | "FullSessionRequired" | "SessionWithoutAnyScopeUnder" | "UserRoleUnprivileged" | "MfaNotConfigured";
1505
1500
  /**
1506
1501
  * @description Specifies a fork of the `BeaconChain`, to prevent replay attacks.
1507
1502
  * The schema of `Fork` is defined in the [Beacon chain
@@ -1672,7 +1667,7 @@ export interface components {
1672
1667
  salt: string;
1673
1668
  };
1674
1669
  /** @enum {string} */
1675
- InternalErrorCode: "SystemTimeError" | "ReqwestError" | "DbQueryError" | "DbGetError" | "DbDeleteError" | "DbPutError" | "DbUpdateError" | "SerdeError" | "TestAndSetError" | "DbGetItemsError" | "DbWriteError" | "CubistSignerError" | "CwPutMetricDataError" | "KmsGenerateRandomError" | "MalformedTotpBytes" | "KmsGenerateRandomNoResponseError" | "CreateKeyError" | "ParseDerivationPathError" | "SplitSignerError" | "CreateImportKeyError" | "CognitoDeleteUserError" | "CognitoListUsersError" | "CognitoGetUserError" | "MissingUserEmail" | "CognitoResendUserInvitation" | "CognitoSetUserPasswordError" | "GenericInternalError" | "OidcAuthWithoutOrg" | "MissingKeyMetadata" | "KmsKeyWithoutId" | "KmsEnableKeyError" | "KmsDisableKeyError" | "SerializeEncryptedExportKeyError" | "DeserializeEncryptedExportKeyError" | "ReEncryptUserExport" | "S3UploadError" | "S3DownloadError" | "ManagedStateMissing" | "InternalHeaderMissing" | "InvalidInternalHeaderValue" | "RequestLocalStateAlreadySet" | "OidcOrgMismatch" | "OrphanedRoleKeyId" | "OidcIssuerJwkEndpointUnavailable" | "OidcIssuerInvalidJwk" | "InvalidPkForMaterialId" | "UncheckedOrg" | "AvaSignCredsMissing" | "AvaSignSignatureMissing" | "ExpectedRoleSession" | "InvalidThirdPartyIdentity" | "CognitoGetUser" | "SnsSubscribeError" | "SnsUnsubscribeError" | "SnsPublishBatchError";
1670
+ InternalErrorCode: "SystemTimeError" | "ReqwestError" | "DbQueryError" | "DbGetError" | "DbDeleteError" | "DbPutError" | "DbUpdateError" | "SerdeError" | "TestAndSetError" | "DbGetItemsError" | "DbWriteError" | "CubistSignerError" | "CwPutMetricDataError" | "KmsGenerateRandomError" | "MalformedTotpBytes" | "KmsGenerateRandomNoResponseError" | "CreateKeyError" | "ParseDerivationPathError" | "SplitSignerError" | "CreateImportKeyError" | "CognitoDeleteUserError" | "CognitoListUsersError" | "CognitoGetUserError" | "MissingUserEmail" | "CognitoResendUserInvitation" | "CognitoSetUserPasswordError" | "GenericInternalError" | "OidcAuthWithoutOrg" | "MissingKeyMetadata" | "KmsKeyWithoutId" | "KmsEnableKeyError" | "KmsDisableKeyError" | "SerializeEncryptedExportKeyError" | "DeserializeEncryptedExportKeyError" | "ReEncryptUserExport" | "S3UploadError" | "S3DownloadError" | "ManagedStateMissing" | "InternalHeaderMissing" | "InvalidInternalHeaderValue" | "RequestLocalStateAlreadySet" | "OidcOrgMismatch" | "OrphanedRoleKeyId" | "OidcIssuerJwkEndpointUnavailable" | "OidcIssuerInvalidJwk" | "InvalidPkForMaterialId" | "UncheckedOrg" | "AvaSignCredsMissing" | "AvaSignSignatureMissing" | "ExpectedRoleSession" | "InvalidThirdPartyIdentity" | "CognitoGetUser" | "SnsSubscribeError" | "SnsUnsubscribeError" | "SnsGetSubscriptionAttributesError" | "SnsSubscriptionAttributesMissing" | "SnsSetSubscriptionAttributesError" | "SnsPublishBatchError";
1676
1671
  InviteRequest: {
1677
1672
  /**
1678
1673
  * @description The user's email address
@@ -1961,12 +1956,22 @@ export interface components {
1961
1956
  };
1962
1957
  /** @enum {string} */
1963
1958
  NotFoundErrorCode: "UriSegmentMissing" | "UriSegmentInvalid" | "TotpNotConfigured" | "FidoKeyNotFound" | "FidoChallengeNotFound" | "TotpChallengeNotFound" | "UserExportRequestNotFound" | "UserExportCiphertextNotFound";
1959
+ /** @description The configuration and status of a notification endpoint */
1960
+ NotificationEndpoint: components["schemas"]["NotificationEndpointSubscription"] & {
1961
+ status: components["schemas"]["SubscriptionStatus"];
1962
+ };
1964
1963
  /** @description The configuration for an org event endpoint */
1965
1964
  NotificationEndpointConfiguration: {
1966
1965
  filter?: components["schemas"]["OrgEventFilter"];
1967
1966
  /** @description URL of the endpoint */
1968
1967
  url: string;
1969
1968
  };
1969
+ /** @description A notification endpoint subscription */
1970
+ NotificationEndpointSubscription: {
1971
+ /** @description The ARN of the subscription */
1972
+ arn: string;
1973
+ config: components["schemas"]["NotificationEndpointConfiguration"];
1974
+ };
1970
1975
  /**
1971
1976
  * @description Represents a globally unique OIDC-authorized user by expressing the full "path" to a user. That is:
1972
1977
  *
@@ -2011,10 +2016,14 @@ export interface components {
2011
2016
  * @description Auto-generated discriminant enum variants
2012
2017
  * @enum {string}
2013
2018
  */
2014
- OrgEventDiscriminants: "OidcAuth" | "Eth2ConcurrentAttestationSigning" | "Eth2ConcurrentBlockSigning" | "Eth2InvalidBlockProposerSlotTooLow" | "Eth2InvalidAttestationSourceEpochTooLow" | "Eth2InvalidAttestationTargetEpochTooLow" | "Eth2Unstake" | "Eth2ExceededMaxUnstake" | "MfaRejected";
2019
+ OrgEventDiscriminants: "Billing" | "OidcAuth" | "Eth2ConcurrentAttestationSigning" | "Eth2ConcurrentBlockSigning" | "Eth2InvalidBlockProposerSlotTooLow" | "Eth2InvalidAttestationSourceEpochTooLow" | "Eth2InvalidAttestationTargetEpochTooLow" | "Eth2Unstake" | "Eth2ExceededMaxUnstake" | "MfaRejected";
2015
2020
  /** @description Filter for org events */
2016
2021
  OrgEventFilter: OneOf<[
2017
2022
  "All",
2023
+ {
2024
+ /** @description Accepts all org events other than the ones listed */
2025
+ AllExcept: components["schemas"]["OrgEventDiscriminants"][];
2026
+ },
2018
2027
  {
2019
2028
  /** @description Only accepts org events that are one of the listed events */
2020
2029
  OneOf: components["schemas"]["OrgEventDiscriminants"][];
@@ -2052,11 +2061,28 @@ export interface components {
2052
2061
  * request with a JSON-formatted body that contains the event details.
2053
2062
  * @example [
2054
2063
  * {
2055
- * "url": "https://example.com/endpoint"
2064
+ * "arn": "arn:aws:sns:us-east-1:012345678901:OrgEventsTopic:12345678-0000-0000-0000-000000000001",
2065
+ * "config": {
2066
+ * "url": "https://example.com/endpoint1"
2067
+ * },
2068
+ * "status": "Confirmed"
2069
+ * },
2070
+ * {
2071
+ * "arn": "arn:aws:sns:us-east-1:012345678901:OrgEventsTopic:12345678-0000-0000-0000-000000000002",
2072
+ * "config": {
2073
+ * "filter": {
2074
+ * "OneOf": [
2075
+ * "Eth2ConcurrentAttestationSigning",
2076
+ * "Eth2ConcurrentBlockSigning"
2077
+ * ]
2078
+ * },
2079
+ * "url": "https://example.com/endpoint2"
2080
+ * },
2081
+ * "status": "Pending"
2056
2082
  * }
2057
2083
  * ]
2058
2084
  */
2059
- notification_endpoints?: Record<string, never>[];
2085
+ notification_endpoints?: components["schemas"]["NotificationEndpoint"][];
2060
2086
  /**
2061
2087
  * @description The ID of the organization
2062
2088
  * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
@@ -2720,6 +2746,11 @@ export interface components {
2720
2746
  */
2721
2747
  num_auth_factors: number;
2722
2748
  };
2749
+ /**
2750
+ * @description The status of a subscription
2751
+ * @enum {string}
2752
+ */
2753
+ SubscriptionStatus: "Confirmed" | "Pending";
2723
2754
  TokenInfo: {
2724
2755
  /** @description Session ID. Use it to revoke a session. Cannot be used for auth. */
2725
2756
  hash: string;
@@ -2833,19 +2864,14 @@ export interface components {
2833
2864
  */
2834
2865
  signature: string;
2835
2866
  };
2836
- UpdateKeyRequest: {
2837
- /**
2838
- * @description If set, updates the keys's `enabled` property to this value.
2839
- * Once disabled, a key cannot be used for signing.
2840
- */
2841
- enabled?: boolean | null;
2867
+ UpdateKeyProperties: {
2842
2868
  /**
2843
2869
  * @description If set, update this key's metadata. Validation regex: ^[A-Za-z0-9_=+/ \-\.\,]{0,1024}$
2844
2870
  * @example Contract admin key
2845
2871
  */
2846
2872
  metadata?: string | null;
2847
2873
  /**
2848
- * @description If set, updates key's owner to this value.
2874
+ * @description Allows users to specify a user other than themselves to receive the key
2849
2875
  * The new owner must be an existing user who is a member of the same org.
2850
2876
  * @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
2851
2877
  */
@@ -2863,6 +2889,13 @@ export interface components {
2863
2889
  */
2864
2890
  policy?: Record<string, never>[] | null;
2865
2891
  };
2892
+ UpdateKeyRequest: components["schemas"]["UpdateKeyProperties"] & {
2893
+ /**
2894
+ * @description If set, updates the keys's `enabled` property to this value.
2895
+ * Once disabled, a key cannot be used for signing.
2896
+ */
2897
+ enabled?: boolean | null;
2898
+ };
2866
2899
  UpdateOrgRequest: {
2867
2900
  /** @description If set, update this org's `enabled` field to this value. */
2868
2901
  enabled?: boolean | null;
@@ -2908,7 +2941,7 @@ export interface components {
2908
2941
  * }
2909
2942
  * ]
2910
2943
  */
2911
- notification_endpoints?: Record<string, never>[] | null;
2944
+ notification_endpoints?: components["schemas"]["NotificationEndpointConfiguration"][] | null;
2912
2945
  /**
2913
2946
  * @description If set, update this org's policies (old policies will be overwritten!).
2914
2947
  * @example [
@@ -2969,7 +3002,7 @@ export interface components {
2969
3002
  * }
2970
3003
  * ]
2971
3004
  */
2972
- notification_endpoints?: Record<string, never>[];
3005
+ notification_endpoints?: components["schemas"]["NotificationEndpointConfiguration"][] | null;
2973
3006
  /**
2974
3007
  * @description The ID of the organization
2975
3008
  * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
@@ -3132,6 +3165,18 @@ export interface components {
3132
3165
  /** @description Optional user name. */
3133
3166
  name?: string | null;
3134
3167
  };
3168
+ /**
3169
+ * @description Information about a user's membership in an organization
3170
+ * (without including any info about the user)
3171
+ */
3172
+ UserInOrgMembership: {
3173
+ membership: components["schemas"]["MemberRole"];
3174
+ /**
3175
+ * @description Organization id
3176
+ * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
3177
+ */
3178
+ org_id: string;
3179
+ };
3135
3180
  UserInRoleInfo: {
3136
3181
  user_id: string;
3137
3182
  };
@@ -3151,12 +3196,15 @@ export interface components {
3151
3196
  */
3152
3197
  name?: string | null;
3153
3198
  /**
3154
- * @description All organizations the user belongs to
3199
+ * @deprecated
3200
+ * @description All organizations the user belongs to. Deprecated in favor of 'orgs'.
3155
3201
  * @example [
3156
3202
  * "Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a"
3157
3203
  * ]
3158
3204
  */
3159
3205
  org_ids: string[];
3206
+ /** @description All organizations the user belongs to, including the membership role in each. */
3207
+ orgs: components["schemas"]["UserInOrgMembership"][];
3160
3208
  /**
3161
3209
  * @description The id of the currently logged in user
3162
3210
  * @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
@@ -3546,11 +3594,28 @@ export interface components {
3546
3594
  * request with a JSON-formatted body that contains the event details.
3547
3595
  * @example [
3548
3596
  * {
3549
- * "url": "https://example.com/endpoint"
3597
+ * "arn": "arn:aws:sns:us-east-1:012345678901:OrgEventsTopic:12345678-0000-0000-0000-000000000001",
3598
+ * "config": {
3599
+ * "url": "https://example.com/endpoint1"
3600
+ * },
3601
+ * "status": "Confirmed"
3602
+ * },
3603
+ * {
3604
+ * "arn": "arn:aws:sns:us-east-1:012345678901:OrgEventsTopic:12345678-0000-0000-0000-000000000002",
3605
+ * "config": {
3606
+ * "filter": {
3607
+ * "OneOf": [
3608
+ * "Eth2ConcurrentAttestationSigning",
3609
+ * "Eth2ConcurrentBlockSigning"
3610
+ * ]
3611
+ * },
3612
+ * "url": "https://example.com/endpoint2"
3613
+ * },
3614
+ * "status": "Pending"
3550
3615
  * }
3551
3616
  * ]
3552
3617
  */
3553
- notification_endpoints?: Record<string, never>[];
3618
+ notification_endpoints?: components["schemas"]["NotificationEndpoint"][];
3554
3619
  /**
3555
3620
  * @description The ID of the organization
3556
3621
  * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
@@ -3878,7 +3943,7 @@ export interface components {
3878
3943
  * }
3879
3944
  * ]
3880
3945
  */
3881
- notification_endpoints?: Record<string, never>[];
3946
+ notification_endpoints?: components["schemas"]["NotificationEndpointConfiguration"][] | null;
3882
3947
  /**
3883
3948
  * @description The ID of the organization
3884
3949
  * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
@@ -3966,12 +4031,15 @@ export interface components {
3966
4031
  */
3967
4032
  name?: string | null;
3968
4033
  /**
3969
- * @description All organizations the user belongs to
4034
+ * @deprecated
4035
+ * @description All organizations the user belongs to. Deprecated in favor of 'orgs'.
3970
4036
  * @example [
3971
4037
  * "Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a"
3972
4038
  * ]
3973
4039
  */
3974
4040
  org_ids: string[];
4041
+ /** @description All organizations the user belongs to, including the membership role in each. */
4042
+ orgs: components["schemas"]["UserInOrgMembership"][];
3975
4043
  /**
3976
4044
  * @description The id of the currently logged in user
3977
4045
  * @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f