@cubist-labs/cubesigner-sdk 0.3.25 → 0.3.26
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/package.json +1 -1
- package/dist/cjs/src/env.js +9 -29
- package/dist/esm/package.json +1 -1
- package/dist/esm/src/env.js +4 -4
- package/package.json +1 -1
- package/src/env.ts +3 -3
- package/dist/cjs/src/org_event_processor.d.ts +0 -57
- package/dist/cjs/src/org_event_processor.js +0 -137
- package/dist/esm/src/org_event_processor.d.ts +0 -57
- package/dist/esm/src/org_event_processor.js +0 -133
- package/dist/package.json +0 -36
- package/dist/spec/env/beta.json +0 -9
- package/dist/spec/env/gamma.json +0 -9
- package/dist/spec/env/prod.json +0 -9
- package/dist/src/api.d.ts +0 -634
- package/dist/src/api.js +0 -1309
- package/dist/src/client.d.ts +0 -575
- package/dist/src/client.js +0 -381
- package/dist/src/env.d.ts +0 -15
- package/dist/src/env.js +0 -35
- package/dist/src/error.d.ts +0 -29
- package/dist/src/error.js +0 -36
- package/dist/src/events.d.ts +0 -84
- package/dist/src/events.js +0 -195
- package/dist/src/index.d.ts +0 -207
- package/dist/src/index.js +0 -308
- package/dist/src/key.d.ts +0 -152
- package/dist/src/key.js +0 -242
- package/dist/src/mfa.d.ts +0 -94
- package/dist/src/mfa.js +0 -169
- package/dist/src/org.d.ts +0 -99
- package/dist/src/org.js +0 -95
- package/dist/src/paginator.d.ts +0 -76
- package/dist/src/paginator.js +0 -99
- package/dist/src/response.d.ts +0 -101
- package/dist/src/response.js +0 -164
- package/dist/src/role.d.ts +0 -283
- package/dist/src/role.js +0 -253
- package/dist/src/schema.d.ts +0 -6209
- package/dist/src/schema.js +0 -7
- package/dist/src/schema_types.d.ts +0 -113
- package/dist/src/schema_types.js +0 -3
- package/dist/src/session/session_storage.d.ts +0 -47
- package/dist/src/session/session_storage.js +0 -76
- package/dist/src/session/signer_session_manager.d.ts +0 -125
- package/dist/src/session/signer_session_manager.js +0 -239
- package/dist/src/signer_session.d.ts +0 -41
- package/dist/src/signer_session.js +0 -77
- package/dist/src/user_export.d.ts +0 -52
- package/dist/src/user_export.js +0 -129
- package/dist/src/util.d.ts +0 -61
- package/dist/src/util.js +0 -97
package/dist/cjs/package.json
CHANGED
package/dist/cjs/src/env.js
CHANGED
|
@@ -1,35 +1,15 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
-
var
|
|
3
|
-
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
-
}) : function(o, v) {
|
|
16
|
-
o["default"] = v;
|
|
17
|
-
});
|
|
18
|
-
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
-
if (mod && mod.__esModule) return mod;
|
|
20
|
-
var result = {};
|
|
21
|
-
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
-
__setModuleDefault(result, mod);
|
|
23
|
-
return result;
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
24
4
|
};
|
|
25
5
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
26
6
|
exports.envs = void 0;
|
|
27
|
-
const
|
|
28
|
-
const
|
|
29
|
-
const
|
|
7
|
+
const prod_json_1 = __importDefault(require("../spec/env/prod.json"));
|
|
8
|
+
const gamma_json_1 = __importDefault(require("../spec/env/gamma.json"));
|
|
9
|
+
const beta_json_1 = __importDefault(require("../spec/env/beta.json"));
|
|
30
10
|
exports.envs = {
|
|
31
|
-
prod:
|
|
32
|
-
gamma:
|
|
33
|
-
beta:
|
|
11
|
+
prod: prod_json_1.default["Dev-CubeSignerStack"],
|
|
12
|
+
gamma: gamma_json_1.default["Dev-CubeSignerStack"],
|
|
13
|
+
beta: beta_json_1.default["Dev-CubeSignerStack"],
|
|
34
14
|
};
|
|
35
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
15
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dist/esm/package.json
CHANGED
package/dist/esm/src/env.js
CHANGED
|
@@ -1,9 +1,9 @@
|
|
|
1
|
-
import
|
|
2
|
-
import
|
|
3
|
-
import
|
|
1
|
+
import prodSpec from "../spec/env/prod.json";
|
|
2
|
+
import gammaSpec from "../spec/env/gamma.json";
|
|
3
|
+
import betaSpec from "../spec/env/beta.json";
|
|
4
4
|
export const envs = {
|
|
5
5
|
prod: prodSpec["Dev-CubeSignerStack"],
|
|
6
6
|
gamma: gammaSpec["Dev-CubeSignerStack"],
|
|
7
7
|
beta: betaSpec["Dev-CubeSignerStack"],
|
|
8
8
|
};
|
|
9
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
9
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/package.json
CHANGED
package/src/env.ts
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import
|
|
2
|
-
import
|
|
3
|
-
import
|
|
1
|
+
import prodSpec from "../spec/env/prod.json";
|
|
2
|
+
import gammaSpec from "../spec/env/gamma.json";
|
|
3
|
+
import betaSpec from "../spec/env/beta.json";
|
|
4
4
|
|
|
5
5
|
export type Environment =
|
|
6
6
|
/** Production environment */
|
|
@@ -1,57 +0,0 @@
|
|
|
1
|
-
import { Environment } from ".";
|
|
2
|
-
/** The common fields of SNS messages */
|
|
3
|
-
export interface SnsMessage {
|
|
4
|
-
Type: string;
|
|
5
|
-
MessageId: string;
|
|
6
|
-
TopicArn: string;
|
|
7
|
-
Message: string;
|
|
8
|
-
Timestamp: string;
|
|
9
|
-
SignatureVersion: string;
|
|
10
|
-
Signature: string;
|
|
11
|
-
SigningCertURL: string;
|
|
12
|
-
}
|
|
13
|
-
/** The format of a subscription confirmation sent by SNS */
|
|
14
|
-
export interface SubscriptionConfirmationMessage extends SnsMessage {
|
|
15
|
-
Token: string;
|
|
16
|
-
SubscribeURL: string;
|
|
17
|
-
}
|
|
18
|
-
/** Common fields for an org event */
|
|
19
|
-
export interface OrgEventBase {
|
|
20
|
-
org: string;
|
|
21
|
-
utc_timestamp: number;
|
|
22
|
-
org_event: string;
|
|
23
|
-
}
|
|
24
|
-
/** The format of an event message sent by SNS */
|
|
25
|
-
export interface OrgEventMessage extends SnsMessage {
|
|
26
|
-
Subject?: string;
|
|
27
|
-
UnsubscribeURL: string;
|
|
28
|
-
}
|
|
29
|
-
/** Options for the processor */
|
|
30
|
-
export interface OrgEventProcessorOptions {
|
|
31
|
-
env: Environment;
|
|
32
|
-
}
|
|
33
|
-
/** A utility for processing org event messages */
|
|
34
|
-
export declare class OrgEventProcessor {
|
|
35
|
-
#private;
|
|
36
|
-
/**
|
|
37
|
-
* Constructor.
|
|
38
|
-
* @param {string} orgId The org id
|
|
39
|
-
* @param {OrgEventProcessorOptions} options Additional options for the processor
|
|
40
|
-
*/
|
|
41
|
-
constructor(orgId: string, options?: OrgEventProcessorOptions);
|
|
42
|
-
/**
|
|
43
|
-
* Checks an SNS message and its signature. Throws an error if the message
|
|
44
|
-
* invalid or the signature is invalid.
|
|
45
|
-
*
|
|
46
|
-
* @param {SnsMessage} message The SNS message to check
|
|
47
|
-
*/
|
|
48
|
-
checkMessage(message: SnsMessage): Promise<void>;
|
|
49
|
-
/**
|
|
50
|
-
* Parse an org event and check its signature. Throws an error if the
|
|
51
|
-
* message is not a valid org event or the signature is invalid.
|
|
52
|
-
*
|
|
53
|
-
* @param {OrgEventMessage} message The org event message to check
|
|
54
|
-
* @return {OrgEventBase} The org event
|
|
55
|
-
*/
|
|
56
|
-
parse(message: OrgEventMessage): Promise<OrgEventBase>;
|
|
57
|
-
}
|
|
@@ -1,137 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
3
|
-
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
4
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
5
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
6
|
-
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
7
|
-
};
|
|
8
|
-
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
9
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
10
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
11
|
-
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
12
|
-
};
|
|
13
|
-
var _OrgEventProcessor_instances, _OrgEventProcessor_topicArn, _OrgEventProcessor_orgId, _OrgEventProcessor_cachedCertificates, _OrgEventProcessor_fetchAndValidateCertificate;
|
|
14
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
-
exports.OrgEventProcessor = void 0;
|
|
16
|
-
const crypto_1 = require("crypto");
|
|
17
|
-
const _1 = require(".");
|
|
18
|
-
// URLs that are safe to retrieve certificates from
|
|
19
|
-
const SNS_CERTIFICATE_URL_HOSTS = ["sns.us-east-1.amazonaws.com"];
|
|
20
|
-
const SNS_CERTIFICATE_HOST = "sns.amazonaws.com";
|
|
21
|
-
/** A utility for processing org event messages */
|
|
22
|
-
class OrgEventProcessor {
|
|
23
|
-
/**
|
|
24
|
-
* Constructor.
|
|
25
|
-
* @param {string} orgId The org id
|
|
26
|
-
* @param {OrgEventProcessorOptions} options Additional options for the processor
|
|
27
|
-
*/
|
|
28
|
-
constructor(orgId, options) {
|
|
29
|
-
_OrgEventProcessor_instances.add(this);
|
|
30
|
-
_OrgEventProcessor_topicArn.set(this, void 0);
|
|
31
|
-
_OrgEventProcessor_orgId.set(this, void 0);
|
|
32
|
-
_OrgEventProcessor_cachedCertificates.set(this, void 0);
|
|
33
|
-
__classPrivateFieldSet(this, _OrgEventProcessor_topicArn, _1.envs[options?.env ?? "prod"].OrgEventsTopicArn, "f");
|
|
34
|
-
__classPrivateFieldSet(this, _OrgEventProcessor_orgId, orgId, "f");
|
|
35
|
-
__classPrivateFieldSet(this, _OrgEventProcessor_cachedCertificates, new Map(), "f");
|
|
36
|
-
}
|
|
37
|
-
/**
|
|
38
|
-
* Checks an SNS message and its signature. Throws an error if the message
|
|
39
|
-
* invalid or the signature is invalid.
|
|
40
|
-
*
|
|
41
|
-
* @param {SnsMessage} message The SNS message to check
|
|
42
|
-
*/
|
|
43
|
-
async checkMessage(message) {
|
|
44
|
-
// Check the topic ARN
|
|
45
|
-
if (message.TopicArn !== __classPrivateFieldGet(this, _OrgEventProcessor_topicArn, "f")) {
|
|
46
|
-
throw new Error(`Expected topic ARN '${__classPrivateFieldGet(this, _OrgEventProcessor_topicArn, "f")}', found '${message.TopicArn}'`);
|
|
47
|
-
}
|
|
48
|
-
// Both subscription confirmations and org event messages should have no subject
|
|
49
|
-
if ("Subject" in message) {
|
|
50
|
-
throw new Error("Expected a message without a subject");
|
|
51
|
-
}
|
|
52
|
-
// The org events topic uses signature version 2 (SHA256)
|
|
53
|
-
if (message.SignatureVersion !== "2") {
|
|
54
|
-
throw new Error("Expected signature version 2");
|
|
55
|
-
}
|
|
56
|
-
// Retrieve the certificate and sanity check it
|
|
57
|
-
const certificate = await __classPrivateFieldGet(this, _OrgEventProcessor_instances, "m", _OrgEventProcessor_fetchAndValidateCertificate).call(this, new URL(message.SigningCertURL));
|
|
58
|
-
// Extract fields specific to subscription confirmations
|
|
59
|
-
const subscribeUrl = message.SubscribeURL;
|
|
60
|
-
const token = message.Token;
|
|
61
|
-
// Check the signature
|
|
62
|
-
const fields = ["Message", message.Message, "MessageId", message.MessageId]
|
|
63
|
-
.concat(subscribeUrl !== undefined ? ["SubscribeURL", subscribeUrl] : [])
|
|
64
|
-
.concat(["Timestamp", message.Timestamp])
|
|
65
|
-
.concat(token !== undefined ? ["Token", token] : [])
|
|
66
|
-
.concat(["TopicArn", message.TopicArn, "Type", message.Type]);
|
|
67
|
-
const verify = (0, crypto_1.createVerify)("RSA-SHA256");
|
|
68
|
-
verify.update(fields.join("\n") + "\n");
|
|
69
|
-
const isValid = verify.verify(certificate.publicKey, message.Signature, "base64");
|
|
70
|
-
if (!isValid) {
|
|
71
|
-
throw new Error("The org event has an invalid signature");
|
|
72
|
-
}
|
|
73
|
-
}
|
|
74
|
-
/**
|
|
75
|
-
* Parse an org event and check its signature. Throws an error if the
|
|
76
|
-
* message is not a valid org event or the signature is invalid.
|
|
77
|
-
*
|
|
78
|
-
* @param {OrgEventMessage} message The org event message to check
|
|
79
|
-
* @return {OrgEventBase} The org event
|
|
80
|
-
*/
|
|
81
|
-
async parse(message) {
|
|
82
|
-
await this.checkMessage(message);
|
|
83
|
-
// Check that the event is for the expected org
|
|
84
|
-
const orgEvent = JSON.parse(message.Message);
|
|
85
|
-
if (orgEvent.org !== __classPrivateFieldGet(this, _OrgEventProcessor_orgId, "f")) {
|
|
86
|
-
throw new Error(`Expected org to be '${__classPrivateFieldGet(this, _OrgEventProcessor_orgId, "f")}', found '${orgEvent.org}'`);
|
|
87
|
-
}
|
|
88
|
-
return orgEvent;
|
|
89
|
-
}
|
|
90
|
-
}
|
|
91
|
-
exports.OrgEventProcessor = OrgEventProcessor;
|
|
92
|
-
_OrgEventProcessor_topicArn = new WeakMap(), _OrgEventProcessor_orgId = new WeakMap(), _OrgEventProcessor_cachedCertificates = new WeakMap(), _OrgEventProcessor_instances = new WeakSet(), _OrgEventProcessor_fetchAndValidateCertificate =
|
|
93
|
-
/**
|
|
94
|
-
* Fetches a certificate from a given URL or from the certificate cache.
|
|
95
|
-
* Throws an error if the URL does not correspond to an SNS certificate URL.
|
|
96
|
-
*
|
|
97
|
-
* Note: Ideally, this method would verify the certificate chain, but there
|
|
98
|
-
* is no obvious chain. Instead, this method only fetches certificates from
|
|
99
|
-
* a small set of allowlisted URLs.
|
|
100
|
-
*
|
|
101
|
-
* @param {URL} url The URL of the certificate
|
|
102
|
-
* @return {X509Certificate} The certificate
|
|
103
|
-
*/
|
|
104
|
-
async function _OrgEventProcessor_fetchAndValidateCertificate(url) {
|
|
105
|
-
const currTime = new Date().getTime();
|
|
106
|
-
const cachedCertificate = __classPrivateFieldGet(this, _OrgEventProcessor_cachedCertificates, "f").get(url);
|
|
107
|
-
if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {
|
|
108
|
-
return cachedCertificate;
|
|
109
|
-
}
|
|
110
|
-
// Only fetch certificates from HTTPS URLs
|
|
111
|
-
if (url.protocol !== "https:") {
|
|
112
|
-
throw new Error("Expected signing certificate URL to use HTTPS");
|
|
113
|
-
}
|
|
114
|
-
// Only fetch certificate URLs for SNS
|
|
115
|
-
if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {
|
|
116
|
-
throw new Error("Expected signing certificate URL for SNS in us-east-1");
|
|
117
|
-
}
|
|
118
|
-
const response = await fetch(url);
|
|
119
|
-
if (!response.ok) {
|
|
120
|
-
throw new Error(`Unable to download certificate. Status: ${response.status}`);
|
|
121
|
-
}
|
|
122
|
-
const blob = await response.blob();
|
|
123
|
-
const certificate = new crypto_1.X509Certificate(await blob.text());
|
|
124
|
-
if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {
|
|
125
|
-
throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);
|
|
126
|
-
}
|
|
127
|
-
// Check validity times
|
|
128
|
-
if (currTime < new Date(certificate.validFrom).getTime()) {
|
|
129
|
-
throw new Error("Certificate not valid yet");
|
|
130
|
-
}
|
|
131
|
-
if (new Date(certificate.validTo).getTime() < currTime) {
|
|
132
|
-
throw new Error("Certificate expired");
|
|
133
|
-
}
|
|
134
|
-
__classPrivateFieldGet(this, _OrgEventProcessor_cachedCertificates, "f").set(url, certificate);
|
|
135
|
-
return certificate;
|
|
136
|
-
};
|
|
137
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"org_event_processor.js","sourceRoot":"","sources":["../../../src/org_event_processor.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAAuD;AACvD,wBAAsC;AAEtC,mDAAmD;AACnD,MAAM,yBAAyB,GAAG,CAAC,6BAA6B,CAAC,CAAC;AAElE,MAAM,oBAAoB,GAAG,mBAAmB,CAAC;AAsCjD,kDAAkD;AAClD,MAAa,iBAAiB;IAK5B;;;;OAIG;IACH,YAAY,KAAa,EAAE,OAAkC;;QATpD,8CAAkB;QAClB,2CAAe;QACxB,wDAA+C;QAQ7C,uBAAA,IAAI,+BAAa,OAAI,CAAC,OAAO,EAAE,GAAG,IAAI,MAAM,CAAC,CAAC,iBAAiB,MAAA,CAAC;QAChE,uBAAA,IAAI,4BAAU,KAAK,MAAA,CAAC;QACpB,uBAAA,IAAI,yCAAuB,IAAI,GAAG,EAAE,MAAA,CAAC;IACvC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,YAAY,CAAC,OAAmB;QACpC,sBAAsB;QACtB,IAAI,OAAO,CAAC,QAAQ,KAAK,uBAAA,IAAI,mCAAU,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CAAC,uBAAuB,uBAAA,IAAI,mCAAU,aAAa,OAAO,CAAC,QAAQ,GAAG,CAAC,CAAC;QACzF,CAAC;QAED,gFAAgF;QAChF,IAAI,SAAS,IAAI,OAAO,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;QAC1D,CAAC;QAED,yDAAyD;QACzD,IAAI,OAAO,CAAC,gBAAgB,KAAK,GAAG,EAAE,CAAC;YACrC,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QAED,+CAA+C;QAC/C,MAAM,WAAW,GAAG,MAAM,uBAAA,IAAI,oFAA6B,MAAjC,IAAI,EAA8B,IAAI,GAAG,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC;QAE7F,wDAAwD;QACxD,MAAM,YAAY,GAAI,OAA2C,CAAC,YAAY,CAAC;QAC/E,MAAM,KAAK,GAAI,OAA2C,CAAC,KAAK,CAAC;QAEjE,sBAAsB;QACtB,MAAM,MAAM,GAAG,CAAC,SAAS,EAAE,OAAO,CAAC,OAAO,EAAE,WAAW,EAAE,OAAO,CAAC,SAAS,CAAC;aACxE,MAAM,CAAC,YAAY,KAAK,SAAS,CAAC,CAAC,CAAC,CAAC,cAAc,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;aACxE,MAAM,CAAC,CAAC,WAAW,EAAE,OAAO,CAAC,SAAS,CAAC,CAAC;aACxC,MAAM,CAAC,KAAK,KAAK,SAAS,CAAC,CAAC,CAAC,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;aACnD,MAAM,CAAC,CAAC,UAAU,EAAE,OAAO,CAAC,QAAQ,EAAE,MAAM,EAAE,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC;QAChE,MAAM,MAAM,GAAG,IAAA,qBAAY,EAAC,YAAY,CAAC,CAAC;QAC1C,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,IAAI,CAAC,CAAC;QACxC,MAAM,OAAO,GAAG,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,OAAO,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;QAClF,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC5D,CAAC;IACH,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,KAAK,CAAC,OAAwB;QAClC,MAAM,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAEjC,+CAA+C;QAC/C,MAAM,QAAQ,GAAiB,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;QAC3D,IAAI,QAAQ,CAAC,GAAG,KAAK,uBAAA,IAAI,gCAAO,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CAAC,uBAAuB,uBAAA,IAAI,gCAAO,aAAa,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;QAClF,CAAC;QAED,OAAO,QAAQ,CAAC;IAClB,CAAC;CAmDF;AA/HD,8CA+HC;;AAjDC;;;;;;;;;;GAUG;AACH,KAAK,yDAA8B,GAAQ;IACzC,MAAM,QAAQ,GAAG,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,CAAC;IACtC,MAAM,iBAAiB,GAAG,uBAAA,IAAI,6CAAoB,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;IAC5D,IAAI,iBAAiB,IAAI,QAAQ,GAAG,IAAI,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;QAClF,OAAO,iBAAiB,CAAC;IAC3B,CAAC;IAED,0CAA0C;IAC1C,IAAI,GAAG,CAAC,QAAQ,KAAK,QAAQ,EAAE,CAAC;QAC9B,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;IACnE,CAAC;IAED,sCAAsC;IACtC,IAAI,yBAAyB,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC;QACvD,MAAM,IAAI,KAAK,CAAC,uDAAuD,CAAC,CAAC;IAC3E,CAAC;IAED,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;IAClC,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE,CAAC;QACjB,MAAM,IAAI,KAAK,CAAC,2CAA2C,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC;IAChF,CAAC;IACD,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;IACnC,MAAM,WAAW,GAAG,IAAI,wBAAe,CAAC,MAAM,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC;IAC3D,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,oBAAoB,CAAC,EAAE,CAAC;QACjD,MAAM,IAAI,KAAK,CAAC,mCAAmC,oBAAoB,GAAG,CAAC,CAAC;IAC9E,CAAC;IAED,uBAAuB;IACvB,IAAI,QAAQ,GAAG,IAAI,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;QACzD,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;IAC/C,CAAC;IACD,IAAI,IAAI,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,GAAG,QAAQ,EAAE,CAAC;QACvD,MAAM,IAAI,KAAK,CAAC,qBAAqB,CAAC,CAAC;IACzC,CAAC;IAED,uBAAA,IAAI,6CAAoB,CAAC,GAAG,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;IAC/C,OAAO,WAAW,CAAC;AACrB,CAAC","sourcesContent":["import { X509Certificate, createVerify } from \"crypto\";\nimport { Environment, envs } from \".\";\n\n// URLs that are safe to retrieve certificates from\nconst SNS_CERTIFICATE_URL_HOSTS = [\"sns.us-east-1.amazonaws.com\"];\n\nconst SNS_CERTIFICATE_HOST = \"sns.amazonaws.com\";\n\n/** The common fields of SNS messages */\nexport interface SnsMessage {\n  Type: string;\n  MessageId: string;\n  TopicArn: string;\n  Message: string;\n  Timestamp: string;\n  SignatureVersion: string;\n  Signature: string;\n  SigningCertURL: string;\n}\n\n/** The format of a subscription confirmation sent by SNS */\nexport interface SubscriptionConfirmationMessage extends SnsMessage {\n  Token: string;\n  SubscribeURL: string;\n}\n\n/** Common fields for an org event */\nexport interface OrgEventBase {\n  org: string;\n  utc_timestamp: number;\n  org_event: string;\n}\n\n/** The format of an event message sent by SNS */\nexport interface OrgEventMessage extends SnsMessage {\n  Subject?: string;\n  UnsubscribeURL: string;\n}\n\n/** Options for the processor */\nexport interface OrgEventProcessorOptions {\n  env: Environment;\n}\n\n/** A utility for processing org event messages */\nexport class OrgEventProcessor {\n  readonly #topicArn: string;\n  readonly #orgId: string;\n  #cachedCertificates: Map<URL, X509Certificate>;\n\n  /**\n   * Constructor.\n   * @param {string} orgId The org id\n   * @param {OrgEventProcessorOptions} options Additional options for the processor\n   */\n  constructor(orgId: string, options?: OrgEventProcessorOptions) {\n    this.#topicArn = envs[options?.env ?? \"prod\"].OrgEventsTopicArn;\n    this.#orgId = orgId;\n    this.#cachedCertificates = new Map();\n  }\n\n  /**\n   * Checks an SNS message and its signature. Throws an error if the message\n   * invalid or the signature is invalid.\n   *\n   * @param {SnsMessage} message The SNS message to check\n   */\n  async checkMessage(message: SnsMessage) {\n    // Check the topic ARN\n    if (message.TopicArn !== this.#topicArn) {\n      throw new Error(`Expected topic ARN '${this.#topicArn}', found '${message.TopicArn}'`);\n    }\n\n    // Both subscription confirmations and org event messages should have no subject\n    if (\"Subject\" in message) {\n      throw new Error(\"Expected a message without a subject\");\n    }\n\n    // The org events topic uses signature version 2 (SHA256)\n    if (message.SignatureVersion !== \"2\") {\n      throw new Error(\"Expected signature version 2\");\n    }\n\n    // Retrieve the certificate and sanity check it\n    const certificate = await this.#fetchAndValidateCertificate(new URL(message.SigningCertURL));\n\n    // Extract fields specific to subscription confirmations\n    const subscribeUrl = (message as SubscriptionConfirmationMessage).SubscribeURL;\n    const token = (message as SubscriptionConfirmationMessage).Token;\n\n    // Check the signature\n    const fields = [\"Message\", message.Message, \"MessageId\", message.MessageId]\n      .concat(subscribeUrl !== undefined ? [\"SubscribeURL\", subscribeUrl] : [])\n      .concat([\"Timestamp\", message.Timestamp])\n      .concat(token !== undefined ? [\"Token\", token] : [])\n      .concat([\"TopicArn\", message.TopicArn, \"Type\", message.Type]);\n    const verify = createVerify(\"RSA-SHA256\");\n    verify.update(fields.join(\"\\n\") + \"\\n\");\n    const isValid = verify.verify(certificate.publicKey, message.Signature, \"base64\");\n    if (!isValid) {\n      throw new Error(\"The org event has an invalid signature\");\n    }\n  }\n\n  /**\n   * Parse an org event and check its signature. Throws an error if the\n   * message is not a valid org event or the signature is invalid.\n   *\n   * @param {OrgEventMessage} message The org event message to check\n   * @return {OrgEventBase} The org event\n   */\n  async parse(message: OrgEventMessage): Promise<OrgEventBase> {\n    await this.checkMessage(message);\n\n    // Check that the event is for the expected org\n    const orgEvent: OrgEventBase = JSON.parse(message.Message);\n    if (orgEvent.org !== this.#orgId) {\n      throw new Error(`Expected org to be '${this.#orgId}', found '${orgEvent.org}'`);\n    }\n\n    return orgEvent;\n  }\n\n  /**\n   * Fetches a certificate from a given URL or from the certificate cache.\n   * Throws an error if the URL does not correspond to an SNS certificate URL.\n   *\n   * Note: Ideally, this method would verify the certificate chain, but there\n   * is no obvious chain. Instead, this method only fetches certificates from\n   * a small set of allowlisted URLs.\n   *\n   * @param {URL} url The URL of the certificate\n   * @return {X509Certificate} The certificate\n   */\n  async #fetchAndValidateCertificate(url: URL): Promise<X509Certificate> {\n    const currTime = new Date().getTime();\n    const cachedCertificate = this.#cachedCertificates.get(url);\n    if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {\n      return cachedCertificate;\n    }\n\n    // Only fetch certificates from HTTPS URLs\n    if (url.protocol !== \"https:\") {\n      throw new Error(\"Expected signing certificate URL to use HTTPS\");\n    }\n\n    // Only fetch certificate URLs for SNS\n    if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {\n      throw new Error(\"Expected signing certificate URL for SNS in us-east-1\");\n    }\n\n    const response = await fetch(url);\n    if (!response.ok) {\n      throw new Error(`Unable to download certificate. Status: ${response.status}`);\n    }\n    const blob = await response.blob();\n    const certificate = new X509Certificate(await blob.text());\n    if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {\n      throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);\n    }\n\n    // Check validity times\n    if (currTime < new Date(certificate.validFrom).getTime()) {\n      throw new Error(\"Certificate not valid yet\");\n    }\n    if (new Date(certificate.validTo).getTime() < currTime) {\n      throw new Error(\"Certificate expired\");\n    }\n\n    this.#cachedCertificates.set(url, certificate);\n    return certificate;\n  }\n}\n"]}
|
|
@@ -1,57 +0,0 @@
|
|
|
1
|
-
import { Environment } from ".";
|
|
2
|
-
/** The common fields of SNS messages */
|
|
3
|
-
export interface SnsMessage {
|
|
4
|
-
Type: string;
|
|
5
|
-
MessageId: string;
|
|
6
|
-
TopicArn: string;
|
|
7
|
-
Message: string;
|
|
8
|
-
Timestamp: string;
|
|
9
|
-
SignatureVersion: string;
|
|
10
|
-
Signature: string;
|
|
11
|
-
SigningCertURL: string;
|
|
12
|
-
}
|
|
13
|
-
/** The format of a subscription confirmation sent by SNS */
|
|
14
|
-
export interface SubscriptionConfirmationMessage extends SnsMessage {
|
|
15
|
-
Token: string;
|
|
16
|
-
SubscribeURL: string;
|
|
17
|
-
}
|
|
18
|
-
/** Common fields for an org event */
|
|
19
|
-
export interface OrgEventBase {
|
|
20
|
-
org: string;
|
|
21
|
-
utc_timestamp: number;
|
|
22
|
-
org_event: string;
|
|
23
|
-
}
|
|
24
|
-
/** The format of an event message sent by SNS */
|
|
25
|
-
export interface OrgEventMessage extends SnsMessage {
|
|
26
|
-
Subject?: string;
|
|
27
|
-
UnsubscribeURL: string;
|
|
28
|
-
}
|
|
29
|
-
/** Options for the processor */
|
|
30
|
-
export interface OrgEventProcessorOptions {
|
|
31
|
-
env: Environment;
|
|
32
|
-
}
|
|
33
|
-
/** A utility for processing org event messages */
|
|
34
|
-
export declare class OrgEventProcessor {
|
|
35
|
-
#private;
|
|
36
|
-
/**
|
|
37
|
-
* Constructor.
|
|
38
|
-
* @param {string} orgId The org id
|
|
39
|
-
* @param {OrgEventProcessorOptions} options Additional options for the processor
|
|
40
|
-
*/
|
|
41
|
-
constructor(orgId: string, options?: OrgEventProcessorOptions);
|
|
42
|
-
/**
|
|
43
|
-
* Checks an SNS message and its signature. Throws an error if the message
|
|
44
|
-
* invalid or the signature is invalid.
|
|
45
|
-
*
|
|
46
|
-
* @param {SnsMessage} message The SNS message to check
|
|
47
|
-
*/
|
|
48
|
-
checkMessage(message: SnsMessage): Promise<void>;
|
|
49
|
-
/**
|
|
50
|
-
* Parse an org event and check its signature. Throws an error if the
|
|
51
|
-
* message is not a valid org event or the signature is invalid.
|
|
52
|
-
*
|
|
53
|
-
* @param {OrgEventMessage} message The org event message to check
|
|
54
|
-
* @return {OrgEventBase} The org event
|
|
55
|
-
*/
|
|
56
|
-
parse(message: OrgEventMessage): Promise<OrgEventBase>;
|
|
57
|
-
}
|
|
@@ -1,133 +0,0 @@
|
|
|
1
|
-
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
2
|
-
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
3
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
4
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
5
|
-
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
6
|
-
};
|
|
7
|
-
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
8
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
9
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
10
|
-
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
11
|
-
};
|
|
12
|
-
var _OrgEventProcessor_instances, _OrgEventProcessor_topicArn, _OrgEventProcessor_orgId, _OrgEventProcessor_cachedCertificates, _OrgEventProcessor_fetchAndValidateCertificate;
|
|
13
|
-
import { X509Certificate, createVerify } from "crypto";
|
|
14
|
-
import { envs } from ".";
|
|
15
|
-
// URLs that are safe to retrieve certificates from
|
|
16
|
-
const SNS_CERTIFICATE_URL_HOSTS = ["sns.us-east-1.amazonaws.com"];
|
|
17
|
-
const SNS_CERTIFICATE_HOST = "sns.amazonaws.com";
|
|
18
|
-
/** A utility for processing org event messages */
|
|
19
|
-
export class OrgEventProcessor {
|
|
20
|
-
/**
|
|
21
|
-
* Constructor.
|
|
22
|
-
* @param {string} orgId The org id
|
|
23
|
-
* @param {OrgEventProcessorOptions} options Additional options for the processor
|
|
24
|
-
*/
|
|
25
|
-
constructor(orgId, options) {
|
|
26
|
-
_OrgEventProcessor_instances.add(this);
|
|
27
|
-
_OrgEventProcessor_topicArn.set(this, void 0);
|
|
28
|
-
_OrgEventProcessor_orgId.set(this, void 0);
|
|
29
|
-
_OrgEventProcessor_cachedCertificates.set(this, void 0);
|
|
30
|
-
__classPrivateFieldSet(this, _OrgEventProcessor_topicArn, envs[options?.env ?? "prod"].OrgEventsTopicArn, "f");
|
|
31
|
-
__classPrivateFieldSet(this, _OrgEventProcessor_orgId, orgId, "f");
|
|
32
|
-
__classPrivateFieldSet(this, _OrgEventProcessor_cachedCertificates, new Map(), "f");
|
|
33
|
-
}
|
|
34
|
-
/**
|
|
35
|
-
* Checks an SNS message and its signature. Throws an error if the message
|
|
36
|
-
* invalid or the signature is invalid.
|
|
37
|
-
*
|
|
38
|
-
* @param {SnsMessage} message The SNS message to check
|
|
39
|
-
*/
|
|
40
|
-
async checkMessage(message) {
|
|
41
|
-
// Check the topic ARN
|
|
42
|
-
if (message.TopicArn !== __classPrivateFieldGet(this, _OrgEventProcessor_topicArn, "f")) {
|
|
43
|
-
throw new Error(`Expected topic ARN '${__classPrivateFieldGet(this, _OrgEventProcessor_topicArn, "f")}', found '${message.TopicArn}'`);
|
|
44
|
-
}
|
|
45
|
-
// Both subscription confirmations and org event messages should have no subject
|
|
46
|
-
if ("Subject" in message) {
|
|
47
|
-
throw new Error("Expected a message without a subject");
|
|
48
|
-
}
|
|
49
|
-
// The org events topic uses signature version 2 (SHA256)
|
|
50
|
-
if (message.SignatureVersion !== "2") {
|
|
51
|
-
throw new Error("Expected signature version 2");
|
|
52
|
-
}
|
|
53
|
-
// Retrieve the certificate and sanity check it
|
|
54
|
-
const certificate = await __classPrivateFieldGet(this, _OrgEventProcessor_instances, "m", _OrgEventProcessor_fetchAndValidateCertificate).call(this, new URL(message.SigningCertURL));
|
|
55
|
-
// Extract fields specific to subscription confirmations
|
|
56
|
-
const subscribeUrl = message.SubscribeURL;
|
|
57
|
-
const token = message.Token;
|
|
58
|
-
// Check the signature
|
|
59
|
-
const fields = ["Message", message.Message, "MessageId", message.MessageId]
|
|
60
|
-
.concat(subscribeUrl !== undefined ? ["SubscribeURL", subscribeUrl] : [])
|
|
61
|
-
.concat(["Timestamp", message.Timestamp])
|
|
62
|
-
.concat(token !== undefined ? ["Token", token] : [])
|
|
63
|
-
.concat(["TopicArn", message.TopicArn, "Type", message.Type]);
|
|
64
|
-
const verify = createVerify("RSA-SHA256");
|
|
65
|
-
verify.update(fields.join("\n") + "\n");
|
|
66
|
-
const isValid = verify.verify(certificate.publicKey, message.Signature, "base64");
|
|
67
|
-
if (!isValid) {
|
|
68
|
-
throw new Error("The org event has an invalid signature");
|
|
69
|
-
}
|
|
70
|
-
}
|
|
71
|
-
/**
|
|
72
|
-
* Parse an org event and check its signature. Throws an error if the
|
|
73
|
-
* message is not a valid org event or the signature is invalid.
|
|
74
|
-
*
|
|
75
|
-
* @param {OrgEventMessage} message The org event message to check
|
|
76
|
-
* @return {OrgEventBase} The org event
|
|
77
|
-
*/
|
|
78
|
-
async parse(message) {
|
|
79
|
-
await this.checkMessage(message);
|
|
80
|
-
// Check that the event is for the expected org
|
|
81
|
-
const orgEvent = JSON.parse(message.Message);
|
|
82
|
-
if (orgEvent.org !== __classPrivateFieldGet(this, _OrgEventProcessor_orgId, "f")) {
|
|
83
|
-
throw new Error(`Expected org to be '${__classPrivateFieldGet(this, _OrgEventProcessor_orgId, "f")}', found '${orgEvent.org}'`);
|
|
84
|
-
}
|
|
85
|
-
return orgEvent;
|
|
86
|
-
}
|
|
87
|
-
}
|
|
88
|
-
_OrgEventProcessor_topicArn = new WeakMap(), _OrgEventProcessor_orgId = new WeakMap(), _OrgEventProcessor_cachedCertificates = new WeakMap(), _OrgEventProcessor_instances = new WeakSet(), _OrgEventProcessor_fetchAndValidateCertificate =
|
|
89
|
-
/**
|
|
90
|
-
* Fetches a certificate from a given URL or from the certificate cache.
|
|
91
|
-
* Throws an error if the URL does not correspond to an SNS certificate URL.
|
|
92
|
-
*
|
|
93
|
-
* Note: Ideally, this method would verify the certificate chain, but there
|
|
94
|
-
* is no obvious chain. Instead, this method only fetches certificates from
|
|
95
|
-
* a small set of allowlisted URLs.
|
|
96
|
-
*
|
|
97
|
-
* @param {URL} url The URL of the certificate
|
|
98
|
-
* @return {X509Certificate} The certificate
|
|
99
|
-
*/
|
|
100
|
-
async function _OrgEventProcessor_fetchAndValidateCertificate(url) {
|
|
101
|
-
const currTime = new Date().getTime();
|
|
102
|
-
const cachedCertificate = __classPrivateFieldGet(this, _OrgEventProcessor_cachedCertificates, "f").get(url);
|
|
103
|
-
if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {
|
|
104
|
-
return cachedCertificate;
|
|
105
|
-
}
|
|
106
|
-
// Only fetch certificates from HTTPS URLs
|
|
107
|
-
if (url.protocol !== "https:") {
|
|
108
|
-
throw new Error("Expected signing certificate URL to use HTTPS");
|
|
109
|
-
}
|
|
110
|
-
// Only fetch certificate URLs for SNS
|
|
111
|
-
if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {
|
|
112
|
-
throw new Error("Expected signing certificate URL for SNS in us-east-1");
|
|
113
|
-
}
|
|
114
|
-
const response = await fetch(url);
|
|
115
|
-
if (!response.ok) {
|
|
116
|
-
throw new Error(`Unable to download certificate. Status: ${response.status}`);
|
|
117
|
-
}
|
|
118
|
-
const blob = await response.blob();
|
|
119
|
-
const certificate = new X509Certificate(await blob.text());
|
|
120
|
-
if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {
|
|
121
|
-
throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);
|
|
122
|
-
}
|
|
123
|
-
// Check validity times
|
|
124
|
-
if (currTime < new Date(certificate.validFrom).getTime()) {
|
|
125
|
-
throw new Error("Certificate not valid yet");
|
|
126
|
-
}
|
|
127
|
-
if (new Date(certificate.validTo).getTime() < currTime) {
|
|
128
|
-
throw new Error("Certificate expired");
|
|
129
|
-
}
|
|
130
|
-
__classPrivateFieldGet(this, _OrgEventProcessor_cachedCertificates, "f").set(url, certificate);
|
|
131
|
-
return certificate;
|
|
132
|
-
};
|
|
133
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"org_event_processor.js","sourceRoot":"","sources":["../../../src/org_event_processor.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,OAAO,EAAE,eAAe,EAAE,YAAY,EAAE,MAAM,QAAQ,CAAC;AACvD,OAAO,EAAe,IAAI,EAAE,MAAM,GAAG,CAAC;AAEtC,mDAAmD;AACnD,MAAM,yBAAyB,GAAG,CAAC,6BAA6B,CAAC,CAAC;AAElE,MAAM,oBAAoB,GAAG,mBAAmB,CAAC;AAsCjD,kDAAkD;AAClD,MAAM,OAAO,iBAAiB;IAK5B;;;;OAIG;IACH,YAAY,KAAa,EAAE,OAAkC;;QATpD,8CAAkB;QAClB,2CAAe;QACxB,wDAA+C;QAQ7C,uBAAA,IAAI,+BAAa,IAAI,CAAC,OAAO,EAAE,GAAG,IAAI,MAAM,CAAC,CAAC,iBAAiB,MAAA,CAAC;QAChE,uBAAA,IAAI,4BAAU,KAAK,MAAA,CAAC;QACpB,uBAAA,IAAI,yCAAuB,IAAI,GAAG,EAAE,MAAA,CAAC;IACvC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,YAAY,CAAC,OAAmB;QACpC,sBAAsB;QACtB,IAAI,OAAO,CAAC,QAAQ,KAAK,uBAAA,IAAI,mCAAU,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CAAC,uBAAuB,uBAAA,IAAI,mCAAU,aAAa,OAAO,CAAC,QAAQ,GAAG,CAAC,CAAC;QACzF,CAAC;QAED,gFAAgF;QAChF,IAAI,SAAS,IAAI,OAAO,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;QAC1D,CAAC;QAED,yDAAyD;QACzD,IAAI,OAAO,CAAC,gBAAgB,KAAK,GAAG,EAAE,CAAC;YACrC,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QAED,+CAA+C;QAC/C,MAAM,WAAW,GAAG,MAAM,uBAAA,IAAI,oFAA6B,MAAjC,IAAI,EAA8B,IAAI,GAAG,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC;QAE7F,wDAAwD;QACxD,MAAM,YAAY,GAAI,OAA2C,CAAC,YAAY,CAAC;QAC/E,MAAM,KAAK,GAAI,OAA2C,CAAC,KAAK,CAAC;QAEjE,sBAAsB;QACtB,MAAM,MAAM,GAAG,CAAC,SAAS,EAAE,OAAO,CAAC,OAAO,EAAE,WAAW,EAAE,OAAO,CAAC,SAAS,CAAC;aACxE,MAAM,CAAC,YAAY,KAAK,SAAS,CAAC,CAAC,CAAC,CAAC,cAAc,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;aACxE,MAAM,CAAC,CAAC,WAAW,EAAE,OAAO,CAAC,SAAS,CAAC,CAAC;aACxC,MAAM,CAAC,KAAK,KAAK,SAAS,CAAC,CAAC,CAAC,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;aACnD,MAAM,CAAC,CAAC,UAAU,EAAE,OAAO,CAAC,QAAQ,EAAE,MAAM,EAAE,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC;QAChE,MAAM,MAAM,GAAG,YAAY,CAAC,YAAY,CAAC,CAAC;QAC1C,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,IAAI,CAAC,CAAC;QACxC,MAAM,OAAO,GAAG,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,OAAO,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;QAClF,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC5D,CAAC;IACH,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,KAAK,CAAC,OAAwB;QAClC,MAAM,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAEjC,+CAA+C;QAC/C,MAAM,QAAQ,GAAiB,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;QAC3D,IAAI,QAAQ,CAAC,GAAG,KAAK,uBAAA,IAAI,gCAAO,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CAAC,uBAAuB,uBAAA,IAAI,gCAAO,aAAa,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;QAClF,CAAC;QAED,OAAO,QAAQ,CAAC;IAClB,CAAC;CAmDF;;AAjDC;;;;;;;;;;GAUG;AACH,KAAK,yDAA8B,GAAQ;IACzC,MAAM,QAAQ,GAAG,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,CAAC;IACtC,MAAM,iBAAiB,GAAG,uBAAA,IAAI,6CAAoB,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;IAC5D,IAAI,iBAAiB,IAAI,QAAQ,GAAG,IAAI,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;QAClF,OAAO,iBAAiB,CAAC;IAC3B,CAAC;IAED,0CAA0C;IAC1C,IAAI,GAAG,CAAC,QAAQ,KAAK,QAAQ,EAAE,CAAC;QAC9B,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;IACnE,CAAC;IAED,sCAAsC;IACtC,IAAI,yBAAyB,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC;QACvD,MAAM,IAAI,KAAK,CAAC,uDAAuD,CAAC,CAAC;IAC3E,CAAC;IAED,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;IAClC,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE,CAAC;QACjB,MAAM,IAAI,KAAK,CAAC,2CAA2C,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC;IAChF,CAAC;IACD,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;IACnC,MAAM,WAAW,GAAG,IAAI,eAAe,CAAC,MAAM,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC;IAC3D,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,oBAAoB,CAAC,EAAE,CAAC;QACjD,MAAM,IAAI,KAAK,CAAC,mCAAmC,oBAAoB,GAAG,CAAC,CAAC;IAC9E,CAAC;IAED,uBAAuB;IACvB,IAAI,QAAQ,GAAG,IAAI,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;QACzD,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;IAC/C,CAAC;IACD,IAAI,IAAI,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,GAAG,QAAQ,EAAE,CAAC;QACvD,MAAM,IAAI,KAAK,CAAC,qBAAqB,CAAC,CAAC;IACzC,CAAC;IAED,uBAAA,IAAI,6CAAoB,CAAC,GAAG,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;IAC/C,OAAO,WAAW,CAAC;AACrB,CAAC","sourcesContent":["import { X509Certificate, createVerify } from \"crypto\";\nimport { Environment, envs } from \".\";\n\n// URLs that are safe to retrieve certificates from\nconst SNS_CERTIFICATE_URL_HOSTS = [\"sns.us-east-1.amazonaws.com\"];\n\nconst SNS_CERTIFICATE_HOST = \"sns.amazonaws.com\";\n\n/** The common fields of SNS messages */\nexport interface SnsMessage {\n  Type: string;\n  MessageId: string;\n  TopicArn: string;\n  Message: string;\n  Timestamp: string;\n  SignatureVersion: string;\n  Signature: string;\n  SigningCertURL: string;\n}\n\n/** The format of a subscription confirmation sent by SNS */\nexport interface SubscriptionConfirmationMessage extends SnsMessage {\n  Token: string;\n  SubscribeURL: string;\n}\n\n/** Common fields for an org event */\nexport interface OrgEventBase {\n  org: string;\n  utc_timestamp: number;\n  org_event: string;\n}\n\n/** The format of an event message sent by SNS */\nexport interface OrgEventMessage extends SnsMessage {\n  Subject?: string;\n  UnsubscribeURL: string;\n}\n\n/** Options for the processor */\nexport interface OrgEventProcessorOptions {\n  env: Environment;\n}\n\n/** A utility for processing org event messages */\nexport class OrgEventProcessor {\n  readonly #topicArn: string;\n  readonly #orgId: string;\n  #cachedCertificates: Map<URL, X509Certificate>;\n\n  /**\n   * Constructor.\n   * @param {string} orgId The org id\n   * @param {OrgEventProcessorOptions} options Additional options for the processor\n   */\n  constructor(orgId: string, options?: OrgEventProcessorOptions) {\n    this.#topicArn = envs[options?.env ?? \"prod\"].OrgEventsTopicArn;\n    this.#orgId = orgId;\n    this.#cachedCertificates = new Map();\n  }\n\n  /**\n   * Checks an SNS message and its signature. Throws an error if the message\n   * invalid or the signature is invalid.\n   *\n   * @param {SnsMessage} message The SNS message to check\n   */\n  async checkMessage(message: SnsMessage) {\n    // Check the topic ARN\n    if (message.TopicArn !== this.#topicArn) {\n      throw new Error(`Expected topic ARN '${this.#topicArn}', found '${message.TopicArn}'`);\n    }\n\n    // Both subscription confirmations and org event messages should have no subject\n    if (\"Subject\" in message) {\n      throw new Error(\"Expected a message without a subject\");\n    }\n\n    // The org events topic uses signature version 2 (SHA256)\n    if (message.SignatureVersion !== \"2\") {\n      throw new Error(\"Expected signature version 2\");\n    }\n\n    // Retrieve the certificate and sanity check it\n    const certificate = await this.#fetchAndValidateCertificate(new URL(message.SigningCertURL));\n\n    // Extract fields specific to subscription confirmations\n    const subscribeUrl = (message as SubscriptionConfirmationMessage).SubscribeURL;\n    const token = (message as SubscriptionConfirmationMessage).Token;\n\n    // Check the signature\n    const fields = [\"Message\", message.Message, \"MessageId\", message.MessageId]\n      .concat(subscribeUrl !== undefined ? [\"SubscribeURL\", subscribeUrl] : [])\n      .concat([\"Timestamp\", message.Timestamp])\n      .concat(token !== undefined ? [\"Token\", token] : [])\n      .concat([\"TopicArn\", message.TopicArn, \"Type\", message.Type]);\n    const verify = createVerify(\"RSA-SHA256\");\n    verify.update(fields.join(\"\\n\") + \"\\n\");\n    const isValid = verify.verify(certificate.publicKey, message.Signature, \"base64\");\n    if (!isValid) {\n      throw new Error(\"The org event has an invalid signature\");\n    }\n  }\n\n  /**\n   * Parse an org event and check its signature. Throws an error if the\n   * message is not a valid org event or the signature is invalid.\n   *\n   * @param {OrgEventMessage} message The org event message to check\n   * @return {OrgEventBase} The org event\n   */\n  async parse(message: OrgEventMessage): Promise<OrgEventBase> {\n    await this.checkMessage(message);\n\n    // Check that the event is for the expected org\n    const orgEvent: OrgEventBase = JSON.parse(message.Message);\n    if (orgEvent.org !== this.#orgId) {\n      throw new Error(`Expected org to be '${this.#orgId}', found '${orgEvent.org}'`);\n    }\n\n    return orgEvent;\n  }\n\n  /**\n   * Fetches a certificate from a given URL or from the certificate cache.\n   * Throws an error if the URL does not correspond to an SNS certificate URL.\n   *\n   * Note: Ideally, this method would verify the certificate chain, but there\n   * is no obvious chain. Instead, this method only fetches certificates from\n   * a small set of allowlisted URLs.\n   *\n   * @param {URL} url The URL of the certificate\n   * @return {X509Certificate} The certificate\n   */\n  async #fetchAndValidateCertificate(url: URL): Promise<X509Certificate> {\n    const currTime = new Date().getTime();\n    const cachedCertificate = this.#cachedCertificates.get(url);\n    if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {\n      return cachedCertificate;\n    }\n\n    // Only fetch certificates from HTTPS URLs\n    if (url.protocol !== \"https:\") {\n      throw new Error(\"Expected signing certificate URL to use HTTPS\");\n    }\n\n    // Only fetch certificate URLs for SNS\n    if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {\n      throw new Error(\"Expected signing certificate URL for SNS in us-east-1\");\n    }\n\n    const response = await fetch(url);\n    if (!response.ok) {\n      throw new Error(`Unable to download certificate. Status: ${response.status}`);\n    }\n    const blob = await response.blob();\n    const certificate = new X509Certificate(await blob.text());\n    if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {\n      throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);\n    }\n\n    // Check validity times\n    if (currTime < new Date(certificate.validFrom).getTime()) {\n      throw new Error(\"Certificate not valid yet\");\n    }\n    if (new Date(certificate.validTo).getTime() < currTime) {\n      throw new Error(\"Certificate expired\");\n    }\n\n    this.#cachedCertificates.set(url, certificate);\n    return certificate;\n  }\n}\n"]}
|
package/dist/package.json
DELETED
|
@@ -1,36 +0,0 @@
|
|
|
1
|
-
{
|
|
2
|
-
"name": "@cubist-labs/cubesigner-sdk",
|
|
3
|
-
"version": "0.2.42",
|
|
4
|
-
"description": "CubeSigner TypeScript SDK",
|
|
5
|
-
"license": "MIT OR Apache-2.0",
|
|
6
|
-
"author": "Cubist, Inc.",
|
|
7
|
-
"main": "dist/src/index.js",
|
|
8
|
-
"types": "dist/src/index.d.ts",
|
|
9
|
-
"files": [
|
|
10
|
-
"tsconfig.json",
|
|
11
|
-
"src/**",
|
|
12
|
-
"dist/**",
|
|
13
|
-
"../..NOTICE",
|
|
14
|
-
"../..LICENSE-APACHE",
|
|
15
|
-
"../..LICENSE-MIT"
|
|
16
|
-
],
|
|
17
|
-
"scripts": {
|
|
18
|
-
"build": "tsc",
|
|
19
|
-
"gen-schema": "openapi-typescript ./spec/openapi.json --output ./src/schema.ts",
|
|
20
|
-
"prepack": "tsc",
|
|
21
|
-
"test": "jest --maxWorkers=1",
|
|
22
|
-
"typedoc": "typedoc"
|
|
23
|
-
},
|
|
24
|
-
"dependencies": {
|
|
25
|
-
"openapi-fetch": "0.6.1"
|
|
26
|
-
},
|
|
27
|
-
"optionalDependencies": {
|
|
28
|
-
"@hpke/core": "^1.2.5"
|
|
29
|
-
},
|
|
30
|
-
"engines": {
|
|
31
|
-
"node": ">=18.0.0"
|
|
32
|
-
},
|
|
33
|
-
"directories": {
|
|
34
|
-
"test": "test"
|
|
35
|
-
}
|
|
36
|
-
}
|
package/dist/spec/env/beta.json
DELETED
package/dist/spec/env/gamma.json
DELETED
package/dist/spec/env/prod.json
DELETED