@cubist-labs/cubesigner-sdk 0.3.25 → 0.3.26
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/package.json +1 -1
- package/dist/cjs/src/env.js +9 -29
- package/dist/esm/package.json +1 -1
- package/dist/esm/src/env.js +4 -4
- package/package.json +1 -1
- package/src/env.ts +3 -3
- package/dist/cjs/src/org_event_processor.d.ts +0 -57
- package/dist/cjs/src/org_event_processor.js +0 -137
- package/dist/esm/src/org_event_processor.d.ts +0 -57
- package/dist/esm/src/org_event_processor.js +0 -133
- package/dist/package.json +0 -36
- package/dist/spec/env/beta.json +0 -9
- package/dist/spec/env/gamma.json +0 -9
- package/dist/spec/env/prod.json +0 -9
- package/dist/src/api.d.ts +0 -634
- package/dist/src/api.js +0 -1309
- package/dist/src/client.d.ts +0 -575
- package/dist/src/client.js +0 -381
- package/dist/src/env.d.ts +0 -15
- package/dist/src/env.js +0 -35
- package/dist/src/error.d.ts +0 -29
- package/dist/src/error.js +0 -36
- package/dist/src/events.d.ts +0 -84
- package/dist/src/events.js +0 -195
- package/dist/src/index.d.ts +0 -207
- package/dist/src/index.js +0 -308
- package/dist/src/key.d.ts +0 -152
- package/dist/src/key.js +0 -242
- package/dist/src/mfa.d.ts +0 -94
- package/dist/src/mfa.js +0 -169
- package/dist/src/org.d.ts +0 -99
- package/dist/src/org.js +0 -95
- package/dist/src/paginator.d.ts +0 -76
- package/dist/src/paginator.js +0 -99
- package/dist/src/response.d.ts +0 -101
- package/dist/src/response.js +0 -164
- package/dist/src/role.d.ts +0 -283
- package/dist/src/role.js +0 -253
- package/dist/src/schema.d.ts +0 -6209
- package/dist/src/schema.js +0 -7
- package/dist/src/schema_types.d.ts +0 -113
- package/dist/src/schema_types.js +0 -3
- package/dist/src/session/session_storage.d.ts +0 -47
- package/dist/src/session/session_storage.js +0 -76
- package/dist/src/session/signer_session_manager.d.ts +0 -125
- package/dist/src/session/signer_session_manager.js +0 -239
- package/dist/src/signer_session.d.ts +0 -41
- package/dist/src/signer_session.js +0 -77
- package/dist/src/user_export.d.ts +0 -52
- package/dist/src/user_export.js +0 -129
- package/dist/src/util.d.ts +0 -61
- package/dist/src/util.js +0 -97
package/dist/src/events.js
DELETED
|
@@ -1,195 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
3
|
-
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
4
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
5
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
6
|
-
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
7
|
-
};
|
|
8
|
-
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
9
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
10
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
11
|
-
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
12
|
-
};
|
|
13
|
-
var _EventDispatcher_handlers, _Events_onError, _Events_onSessionExpired, _EventEmitter_events;
|
|
14
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
-
exports.GlobalEvents = exports.EventEmitter = exports.Events = exports.messageMatchesSessionExpired = void 0;
|
|
16
|
-
/**
|
|
17
|
-
* Dispatcher for a single event type.
|
|
18
|
-
*
|
|
19
|
-
* Provides methods for registering and unregistering handlers,
|
|
20
|
-
* as well as dispatching events to all registered handlers.
|
|
21
|
-
*/
|
|
22
|
-
class EventDispatcher {
|
|
23
|
-
/**
|
|
24
|
-
* Constructor.
|
|
25
|
-
*/
|
|
26
|
-
constructor() {
|
|
27
|
-
_EventDispatcher_handlers.set(this, void 0);
|
|
28
|
-
__classPrivateFieldSet(this, _EventDispatcher_handlers, [], "f");
|
|
29
|
-
}
|
|
30
|
-
/**
|
|
31
|
-
* Register a new handler.
|
|
32
|
-
*
|
|
33
|
-
* @param {EventHandler<T>} handler Event handler to register
|
|
34
|
-
* @return {EventDispatcher<T>} This instance to allow for chaining.
|
|
35
|
-
*/
|
|
36
|
-
register(handler) {
|
|
37
|
-
__classPrivateFieldGet(this, _EventDispatcher_handlers, "f").push(handler);
|
|
38
|
-
return this;
|
|
39
|
-
}
|
|
40
|
-
/**
|
|
41
|
-
* Unregister a handler. If {@link handler} is not already registered, it's a no-op.
|
|
42
|
-
*
|
|
43
|
-
* @param {EventHandler<T>} handler Event handler to unregister
|
|
44
|
-
* @return {boolean} Whether the handler was found (and unregistered).
|
|
45
|
-
*/
|
|
46
|
-
unregister(handler) {
|
|
47
|
-
const idx = __classPrivateFieldGet(this, _EventDispatcher_handlers, "f").indexOf(handler);
|
|
48
|
-
if (idx >= 0) {
|
|
49
|
-
__classPrivateFieldGet(this, _EventDispatcher_handlers, "f").splice(idx, 1);
|
|
50
|
-
return true;
|
|
51
|
-
}
|
|
52
|
-
else {
|
|
53
|
-
return false;
|
|
54
|
-
}
|
|
55
|
-
}
|
|
56
|
-
/**
|
|
57
|
-
* Dispatch an event to all registered handlers.
|
|
58
|
-
* @param {T} event Event to dispatch.
|
|
59
|
-
*/
|
|
60
|
-
async dispatch(event) {
|
|
61
|
-
await Promise.all(__classPrivateFieldGet(this, _EventDispatcher_handlers, "f").map((h) => h(event)));
|
|
62
|
-
}
|
|
63
|
-
}
|
|
64
|
-
_EventDispatcher_handlers = new WeakMap();
|
|
65
|
-
const SessionExpiredRegexes = [
|
|
66
|
-
/^Session '(?<purpose>[^']*)' for '(?<identity>[^']*)' has expired$/,
|
|
67
|
-
/^Session '(?<purpose>[^']*)' for '(?<identity>[^']*)' has been revoked$/,
|
|
68
|
-
/^Auth token for epoch (?<epoch>\d+) has expired$/,
|
|
69
|
-
/^Refresh token for epoch (?<epoch_num>\d+) has expired$/,
|
|
70
|
-
/^Outdated session$/,
|
|
71
|
-
];
|
|
72
|
-
/**
|
|
73
|
-
* Whether an error message matches one of several different "session expired" responses.
|
|
74
|
-
*
|
|
75
|
-
* @param {string} msg The string to test.
|
|
76
|
-
* @return {boolean} Whether the string matches.
|
|
77
|
-
* @internal Exported only so that it can be called from a unit test
|
|
78
|
-
*/
|
|
79
|
-
function messageMatchesSessionExpired(msg) {
|
|
80
|
-
return SessionExpiredRegexes.some((re) => re.test(msg));
|
|
81
|
-
}
|
|
82
|
-
exports.messageMatchesSessionExpired = messageMatchesSessionExpired;
|
|
83
|
-
/**
|
|
84
|
-
* Class for registering and unregistering event handlers.
|
|
85
|
-
*/
|
|
86
|
-
class Events {
|
|
87
|
-
constructor() {
|
|
88
|
-
_Events_onError.set(this, new EventDispatcher());
|
|
89
|
-
_Events_onSessionExpired.set(this, new EventDispatcher());
|
|
90
|
-
}
|
|
91
|
-
/**
|
|
92
|
-
* Register a handler for {@link ErrorEvent}: triggered every time a request to
|
|
93
|
-
* a CubeSigner API endpoint returns a non-success response.
|
|
94
|
-
*
|
|
95
|
-
* @param {EventHandler<ErrorEvent>} handler The handler to register.
|
|
96
|
-
*/
|
|
97
|
-
onError(handler) {
|
|
98
|
-
__classPrivateFieldGet(this, _Events_onError, "f").register(handler);
|
|
99
|
-
}
|
|
100
|
-
/**
|
|
101
|
-
* Register a handler for {@link SessionExpiredEvent}: triggered every time a
|
|
102
|
-
* request to a CubeSigner API endpoint fails because of an expired session.
|
|
103
|
-
*
|
|
104
|
-
* @param {EventHandler<SessionExpiredEvent>} handler The handler to register.
|
|
105
|
-
*/
|
|
106
|
-
onSessionExpired(handler) {
|
|
107
|
-
__classPrivateFieldGet(this, _Events_onSessionExpired, "f").register(handler);
|
|
108
|
-
}
|
|
109
|
-
/**
|
|
110
|
-
* Unregister a handler for {@link ErrorEvent}.
|
|
111
|
-
*
|
|
112
|
-
* @param {EventHandler<ErrorEvent>} handler The handler to unregister.
|
|
113
|
-
* @return {boolean} Whether the handler was found (and unregistered).
|
|
114
|
-
*/
|
|
115
|
-
unregisterOnError(handler) {
|
|
116
|
-
return __classPrivateFieldGet(this, _Events_onError, "f").unregister(handler);
|
|
117
|
-
}
|
|
118
|
-
/**
|
|
119
|
-
* Unregister a handler for {@link SessionExpiredEvent}.
|
|
120
|
-
*
|
|
121
|
-
* @param {EventHandler<SessionExpiredEvent>} handler The handler to unregister.
|
|
122
|
-
* @return {boolean} Whether the handler was found (and unregistered).
|
|
123
|
-
*/
|
|
124
|
-
unregisterOnSessionExpired(handler) {
|
|
125
|
-
return __classPrivateFieldGet(this, _Events_onSessionExpired, "f").unregister(handler);
|
|
126
|
-
}
|
|
127
|
-
/** @internal */
|
|
128
|
-
async triggerSessionExpired() {
|
|
129
|
-
await __classPrivateFieldGet(this, _Events_onSessionExpired, "f").dispatch({});
|
|
130
|
-
}
|
|
131
|
-
/**
|
|
132
|
-
* @param {ErrorEvent} event Event to trigger
|
|
133
|
-
* @internal
|
|
134
|
-
*/
|
|
135
|
-
async triggerErrorEvent(event) {
|
|
136
|
-
await __classPrivateFieldGet(this, _Events_onError, "f").dispatch(event);
|
|
137
|
-
}
|
|
138
|
-
}
|
|
139
|
-
exports.Events = Events;
|
|
140
|
-
_Events_onError = new WeakMap(), _Events_onSessionExpired = new WeakMap();
|
|
141
|
-
/**
|
|
142
|
-
* Used to classify and emit events to one or more {@link Events} instances.
|
|
143
|
-
*/
|
|
144
|
-
class EventEmitter {
|
|
145
|
-
/**
|
|
146
|
-
*
|
|
147
|
-
* @param {Events[]} events Instances to which to emit events
|
|
148
|
-
* @param {boolean} skipGlobal Whether to include the global events instance {@link GlobalEvents}
|
|
149
|
-
*/
|
|
150
|
-
constructor(events, skipGlobal) {
|
|
151
|
-
_EventEmitter_events.set(this, void 0);
|
|
152
|
-
skipGlobal ??= false;
|
|
153
|
-
__classPrivateFieldSet(this, _EventEmitter_events, events, "f");
|
|
154
|
-
if (!skipGlobal) {
|
|
155
|
-
__classPrivateFieldGet(this, _EventEmitter_events, "f").push(exports.GlobalEvents);
|
|
156
|
-
}
|
|
157
|
-
}
|
|
158
|
-
/**
|
|
159
|
-
* Called by {@link CubeSignerApi} when an API response indicates an error.
|
|
160
|
-
*
|
|
161
|
-
* @param {ErrorEvent} err The error to dispatch.
|
|
162
|
-
* @internal
|
|
163
|
-
*/
|
|
164
|
-
async classifyAndEmitError(err) {
|
|
165
|
-
for (const ev of __classPrivateFieldGet(this, _EventEmitter_events, "f")) {
|
|
166
|
-
await ev.triggerErrorEvent(err);
|
|
167
|
-
}
|
|
168
|
-
// if status is 403 and error matches one of the SessionExpiredRegexes trigger onSessionExpired
|
|
169
|
-
//
|
|
170
|
-
// TODO: because errors returned by the authorizer lambda are not forwarded to the client
|
|
171
|
-
// we also trigger onSessionExpired when "signerSessionRefresh" fails
|
|
172
|
-
if (err.status === 403 &&
|
|
173
|
-
(messageMatchesSessionExpired(err.message) || err.operation == "signerSessionRefresh")) {
|
|
174
|
-
await this.emitSessionExpired();
|
|
175
|
-
}
|
|
176
|
-
}
|
|
177
|
-
/**
|
|
178
|
-
* Called by {@link SignerSessionManager} to notify that the session is expired
|
|
179
|
-
* beyond the possibility of refreshing, meaning that full re-login is required.
|
|
180
|
-
*
|
|
181
|
-
* @internal
|
|
182
|
-
*/
|
|
183
|
-
async emitSessionExpired() {
|
|
184
|
-
for (const e of __classPrivateFieldGet(this, _EventEmitter_events, "f")) {
|
|
185
|
-
await e.triggerSessionExpired();
|
|
186
|
-
}
|
|
187
|
-
}
|
|
188
|
-
}
|
|
189
|
-
exports.EventEmitter = EventEmitter;
|
|
190
|
-
_EventEmitter_events = new WeakMap();
|
|
191
|
-
/**
|
|
192
|
-
* Global events.
|
|
193
|
-
*/
|
|
194
|
-
exports.GlobalEvents = new Events();
|
|
195
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"events.js","sourceRoot":"","sources":["../../src/events.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAQA;;;;;GAKG;AACH,MAAM,eAAe;IAGnB;;OAEG;IACH;QALS,4CAA6B;QAMpC,uBAAA,IAAI,6BAAa,EAAE,MAAA,CAAC;IACtB,CAAC;IAED;;;;;OAKG;IACH,QAAQ,CAAC,OAAwB;QAC/B,uBAAA,IAAI,iCAAU,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAC7B,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;OAKG;IACH,UAAU,CAAC,OAAwB;QACjC,MAAM,GAAG,GAAG,uBAAA,IAAI,iCAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;QAC5C,IAAI,GAAG,IAAI,CAAC,EAAE,CAAC;YACb,uBAAA,IAAI,iCAAU,CAAC,MAAM,CAAC,GAAG,EAAE,CAAC,CAAC,CAAC;YAC9B,OAAO,IAAI,CAAC;QACd,CAAC;aAAM,CAAC;YACN,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,QAAQ,CAAC,KAAQ;QACrB,MAAM,OAAO,CAAC,GAAG,CAAC,uBAAA,IAAI,iCAAU,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IACzD,CAAC;CACF;;AAED,MAAM,qBAAqB,GAAG;IAC5B,oEAAoE;IACpE,yEAAyE;IACzE,kDAAkD;IAClD,yDAAyD;IACzD,oBAAoB;CACrB,CAAC;AAEF;;;;;;GAMG;AACH,SAAgB,4BAA4B,CAAC,GAAW;IACtD,OAAO,qBAAqB,CAAC,IAAI,CAAC,CAAC,EAAE,EAAE,EAAE,CAAC,EAAE,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC;AAC1D,CAAC;AAFD,oEAEC;AAED;;GAEG;AACH,MAAa,MAAM;IAAnB;QACW,0BAAW,IAAI,eAAe,EAAc,EAAC;QAC7C,mCAAoB,IAAI,eAAe,EAAuB,EAAC;IAsD1E,CAAC;IApDC;;;;;OAKG;IACH,OAAO,CAAC,OAAiC;QACvC,uBAAA,IAAI,uBAAS,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;IAClC,CAAC;IAED;;;;;OAKG;IACH,gBAAgB,CAAC,OAA0C;QACzD,uBAAA,IAAI,gCAAkB,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;IAC3C,CAAC;IAED;;;;;OAKG;IACH,iBAAiB,CAAC,OAAiC;QACjD,OAAO,uBAAA,IAAI,uBAAS,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;IAC3C,CAAC;IAED;;;;;OAKG;IACH,0BAA0B,CAAC,OAA0C;QACnE,OAAO,uBAAA,IAAI,gCAAkB,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;IACpD,CAAC;IAED,gBAAgB;IAChB,KAAK,CAAC,qBAAqB;QACzB,MAAM,uBAAA,IAAI,gCAAkB,CAAC,QAAQ,CAAsB,EAAE,CAAC,CAAC;IACjE,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,iBAAiB,CAAC,KAAiB;QACvC,MAAM,uBAAA,IAAI,uBAAS,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;IACtC,CAAC;CACF;AAxDD,wBAwDC;;AAED;;GAEG;AACH,MAAa,YAAY;IAGvB;;;;OAIG;IACH,YAAY,MAAgB,EAAE,UAAoB;QAPzC,uCAAkB;QAQzB,UAAU,KAAK,KAAK,CAAC;QACrB,uBAAA,IAAI,wBAAW,MAAM,MAAA,CAAC;QACtB,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,uBAAA,IAAI,4BAAQ,CAAC,IAAI,CAAC,oBAAY,CAAC,CAAC;QAClC,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,oBAAoB,CAAC,GAAe;QACxC,KAAK,MAAM,EAAE,IAAI,uBAAA,IAAI,4BAAQ,EAAE,CAAC;YAC9B,MAAM,EAAE,CAAC,iBAAiB,CAAC,GAAG,CAAC,CAAC;QAClC,CAAC;QAED,+FAA+F;QAC/F,EAAE;QACF,yFAAyF;QACzF,2EAA2E;QAC3E,IACE,GAAG,CAAC,MAAM,KAAK,GAAG;YAClB,CAAC,4BAA4B,CAAC,GAAG,CAAC,OAAO,CAAC,IAAI,GAAG,CAAC,SAAS,IAAI,sBAAsB,CAAC,EACtF,CAAC;YACD,MAAM,IAAI,CAAC,kBAAkB,EAAE,CAAC;QAClC,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,kBAAkB;QACtB,KAAK,MAAM,CAAC,IAAI,uBAAA,IAAI,4BAAQ,EAAE,CAAC;YAC7B,MAAM,CAAC,CAAC,qBAAqB,EAAE,CAAC;QAClC,CAAC;IACH,CAAC;CACF;AAlDD,oCAkDC;;AAED;;GAEG;AACU,QAAA,YAAY,GAAG,IAAI,MAAM,EAAE,CAAC","sourcesContent":["import { ErrResponse } from \"./error\";\n\nexport type EventHandler<T> = (event: T) => Promise<void>;\nexport type ErrorEvent = ErrResponse;\n\n/* eslint-disable-next-line @typescript-eslint/no-empty-interface */\nexport interface SessionExpiredEvent {}\n\n/**\n * Dispatcher for a single event type.\n *\n * Provides methods for registering and unregistering handlers,\n * as well as dispatching events to all registered handlers.\n */\nclass EventDispatcher<T> {\n  readonly #handlers: EventHandler<T>[];\n\n  /**\n   * Constructor.\n   */\n  constructor() {\n    this.#handlers = [];\n  }\n\n  /**\n   * Register a new handler.\n   *\n   * @param {EventHandler<T>} handler Event handler to register\n   * @return {EventDispatcher<T>} This instance to allow for chaining.\n   */\n  register(handler: EventHandler<T>): EventDispatcher<T> {\n    this.#handlers.push(handler);\n    return this;\n  }\n\n  /**\n   * Unregister a handler. If {@link handler} is not already registered, it's a no-op.\n   *\n   * @param {EventHandler<T>} handler Event handler to unregister\n   * @return {boolean} Whether the handler was found (and unregistered).\n   */\n  unregister(handler: EventHandler<T>): boolean {\n    const idx = this.#handlers.indexOf(handler);\n    if (idx >= 0) {\n      this.#handlers.splice(idx, 1);\n      return true;\n    } else {\n      return false;\n    }\n  }\n\n  /**\n   * Dispatch an event to all registered handlers.\n   * @param {T} event Event to dispatch.\n   */\n  async dispatch(event: T): Promise<void> {\n    await Promise.all(this.#handlers.map((h) => h(event)));\n  }\n}\n\nconst SessionExpiredRegexes = [\n  /^Session '(?<purpose>[^']*)' for '(?<identity>[^']*)' has expired$/,\n  /^Session '(?<purpose>[^']*)' for '(?<identity>[^']*)' has been revoked$/,\n  /^Auth token for epoch (?<epoch>\\d+) has expired$/,\n  /^Refresh token for epoch (?<epoch_num>\\d+) has expired$/,\n  /^Outdated session$/,\n];\n\n/**\n * Whether an error message matches one of several different \"session expired\" responses.\n *\n * @param {string} msg The string to test.\n * @return {boolean} Whether the string matches.\n * @internal Exported only so that it can be called from a unit test\n */\nexport function messageMatchesSessionExpired(msg: string): boolean {\n  return SessionExpiredRegexes.some((re) => re.test(msg));\n}\n\n/**\n * Class for registering and unregistering event handlers.\n */\nexport class Events {\n  readonly #onError = new EventDispatcher<ErrorEvent>();\n  readonly #onSessionExpired = new EventDispatcher<SessionExpiredEvent>();\n\n  /**\n   * Register a handler for {@link ErrorEvent}: triggered every time a request to\n   * a CubeSigner API endpoint returns a non-success response.\n   *\n   * @param {EventHandler<ErrorEvent>} handler The handler to register.\n   */\n  onError(handler: EventHandler<ErrorEvent>) {\n    this.#onError.register(handler);\n  }\n\n  /**\n   * Register a handler for {@link SessionExpiredEvent}: triggered every time a\n   * request to a CubeSigner API endpoint fails because of an expired session.\n   *\n   * @param {EventHandler<SessionExpiredEvent>} handler The handler to register.\n   */\n  onSessionExpired(handler: EventHandler<SessionExpiredEvent>) {\n    this.#onSessionExpired.register(handler);\n  }\n\n  /**\n   * Unregister a handler for {@link ErrorEvent}.\n   *\n   * @param {EventHandler<ErrorEvent>} handler The handler to unregister.\n   * @return {boolean} Whether the handler was found (and unregistered).\n   */\n  unregisterOnError(handler: EventHandler<ErrorEvent>): boolean {\n    return this.#onError.unregister(handler);\n  }\n\n  /**\n   * Unregister a handler for {@link SessionExpiredEvent}.\n   *\n   * @param {EventHandler<SessionExpiredEvent>} handler The handler to unregister.\n   * @return {boolean} Whether the handler was found (and unregistered).\n   */\n  unregisterOnSessionExpired(handler: EventHandler<SessionExpiredEvent>): boolean {\n    return this.#onSessionExpired.unregister(handler);\n  }\n\n  /** @internal */\n  async triggerSessionExpired() {\n    await this.#onSessionExpired.dispatch(<SessionExpiredEvent>{});\n  }\n\n  /**\n   * @param {ErrorEvent} event Event to trigger\n   * @internal\n   */\n  async triggerErrorEvent(event: ErrorEvent) {\n    await this.#onError.dispatch(event);\n  }\n}\n\n/**\n * Used to classify and emit events to one or more {@link Events} instances.\n */\nexport class EventEmitter {\n  readonly #events: Events[];\n\n  /**\n   *\n   * @param {Events[]} events Instances to which to emit events\n   * @param {boolean} skipGlobal Whether to include the global events instance {@link GlobalEvents}\n   */\n  constructor(events: Events[], skipGlobal?: boolean) {\n    skipGlobal ??= false;\n    this.#events = events;\n    if (!skipGlobal) {\n      this.#events.push(GlobalEvents);\n    }\n  }\n\n  /**\n   * Called by {@link CubeSignerApi} when an API response indicates an error.\n   *\n   * @param {ErrorEvent} err The error to dispatch.\n   * @internal\n   */\n  async classifyAndEmitError(err: ErrorEvent) {\n    for (const ev of this.#events) {\n      await ev.triggerErrorEvent(err);\n    }\n\n    // if status is 403 and error matches one of the SessionExpiredRegexes trigger onSessionExpired\n    //\n    // TODO: because errors returned by the authorizer lambda are not forwarded to the client\n    //       we also trigger onSessionExpired when \"signerSessionRefresh\" fails\n    if (\n      err.status === 403 &&\n      (messageMatchesSessionExpired(err.message) || err.operation == \"signerSessionRefresh\")\n    ) {\n      await this.emitSessionExpired();\n    }\n  }\n\n  /**\n   * Called by {@link SignerSessionManager} to notify that the session is expired\n   * beyond the possibility of refreshing, meaning that full re-login is required.\n   *\n   * @internal\n   */\n  async emitSessionExpired() {\n    for (const e of this.#events) {\n      await e.triggerSessionExpired();\n    }\n  }\n}\n\n/**\n * Global events.\n */\nexport const GlobalEvents = new Events();\n"]}
|
package/dist/src/index.d.ts
DELETED
|
@@ -1,207 +0,0 @@
|
|
|
1
|
-
import { EnvInterface } from "./env";
|
|
2
|
-
import { Client } from "./api";
|
|
3
|
-
import { CubeSignerClient } from "./client";
|
|
4
|
-
import { Org } from "./org";
|
|
5
|
-
import { SignerSessionStorage, SignerSessionManager, SignerSessionData } from "./session/signer_session_manager";
|
|
6
|
-
import { CubeSignerResponse } from "./response";
|
|
7
|
-
import { SignerSession } from "./signer_session";
|
|
8
|
-
import { MfaReceipt } from "./mfa";
|
|
9
|
-
import { IdentityProof, MfaRequestInfo, RatchetConfig, UserInfo } from "./schema_types";
|
|
10
|
-
/** CubeSigner constructor options */
|
|
11
|
-
export interface CubeSignerOptions {
|
|
12
|
-
/** The environment to use */
|
|
13
|
-
env?: EnvInterface;
|
|
14
|
-
/** The management authorization token */
|
|
15
|
-
sessionMgr?: SignerSessionManager;
|
|
16
|
-
/** Optional organization id */
|
|
17
|
-
orgId?: string;
|
|
18
|
-
}
|
|
19
|
-
/**
|
|
20
|
-
* CubeSigner client
|
|
21
|
-
*
|
|
22
|
-
* @deprecated Use {@link Org} or {@link CubeSignerClient} instead.
|
|
23
|
-
*/
|
|
24
|
-
export declare class CubeSigner {
|
|
25
|
-
#private;
|
|
26
|
-
readonly sessionMgr?: SignerSessionManager;
|
|
27
|
-
/**
|
|
28
|
-
* Underlying {@link CubeSignerClient} instance, if set; otherwise throws.
|
|
29
|
-
* @internal
|
|
30
|
-
*/
|
|
31
|
-
get csc(): CubeSignerClient;
|
|
32
|
-
/** @return {EnvInterface} The CubeSigner environment of this client */
|
|
33
|
-
get env(): EnvInterface;
|
|
34
|
-
/** Organization ID */
|
|
35
|
-
get orgId(): string;
|
|
36
|
-
/**
|
|
37
|
-
* Set the organization ID
|
|
38
|
-
* @param {string} orgId The new organization id.
|
|
39
|
-
*/
|
|
40
|
-
setOrgId(orgId: string): void;
|
|
41
|
-
/**
|
|
42
|
-
* Loads an existing management session and creates a CubeSigner instance.
|
|
43
|
-
*
|
|
44
|
-
* @param {SignerSessionStorage} storage Optional session storage to load
|
|
45
|
-
* the session from. If not specified, the management session from the config
|
|
46
|
-
* directory will be loaded.
|
|
47
|
-
* @return {Promise<CubeSigner>} New CubeSigner instance
|
|
48
|
-
*/
|
|
49
|
-
static loadManagementSession(storage?: SignerSessionStorage): Promise<CubeSigner>;
|
|
50
|
-
/**
|
|
51
|
-
* Loads a signer session from a session storage (e.g., session file).
|
|
52
|
-
* @param {SignerSessionStorage} storage Optional session storage to load
|
|
53
|
-
* the session from. If not specified, the signer session from the config
|
|
54
|
-
* directory will be loaded.
|
|
55
|
-
* @return {Promise<SignerSession>} New signer session
|
|
56
|
-
*/
|
|
57
|
-
static loadSignerSession(storage?: SignerSessionStorage): Promise<SignerSession>;
|
|
58
|
-
/**
|
|
59
|
-
* Create a new CubeSigner instance.
|
|
60
|
-
* @param {CubeSignerOptions} options The optional configuration options for the CubeSigner instance.
|
|
61
|
-
*/
|
|
62
|
-
constructor(options?: CubeSignerOptions);
|
|
63
|
-
/**
|
|
64
|
-
* Authenticate an OIDC user and create a new session manager for them.
|
|
65
|
-
*
|
|
66
|
-
* @param {string} oidcToken The OIDC token
|
|
67
|
-
* @param {string} orgId The id of the organization that the user is in
|
|
68
|
-
* @param {List<string>} scopes The scopes of the resulting session
|
|
69
|
-
* @param {RatchetConfig} lifetimes Lifetimes of the new session.
|
|
70
|
-
* @param {SignerSessionStorage?} storage Optional signer session storage (defaults to in-memory storage)
|
|
71
|
-
* @return {Promise<SignerSessionManager>} The signer session manager
|
|
72
|
-
*/
|
|
73
|
-
oidcAuth(oidcToken: string, orgId: string, scopes: Array<string>, lifetimes?: RatchetConfig, storage?: SignerSessionStorage): Promise<SignerSessionManager>;
|
|
74
|
-
/**
|
|
75
|
-
* Retrieves information about the current user.
|
|
76
|
-
*
|
|
77
|
-
* @return {Promise<UserInfo>} User information.
|
|
78
|
-
*/
|
|
79
|
-
aboutMe(): Promise<UserInfo>;
|
|
80
|
-
/**
|
|
81
|
-
* Retrieves existing MFA request.
|
|
82
|
-
*
|
|
83
|
-
* @param {string} orgId Organization ID
|
|
84
|
-
* @param {string} mfaId MFA request ID
|
|
85
|
-
* @return {Promise<MfaRequestInfo>} MFA request information
|
|
86
|
-
*/
|
|
87
|
-
mfaGet(orgId: string, mfaId: string): Promise<MfaRequestInfo>;
|
|
88
|
-
/**
|
|
89
|
-
* List pending MFA requests accessible to the current user.
|
|
90
|
-
* @param {string} orgId Organization ID
|
|
91
|
-
* @return {Promise<MfaRequestInfo[]>} The MFA requests.
|
|
92
|
-
*/
|
|
93
|
-
mfaList(orgId: string): Promise<MfaRequestInfo[]>;
|
|
94
|
-
/**
|
|
95
|
-
* Approve a pending MFA request.
|
|
96
|
-
*
|
|
97
|
-
* @param {string} orgId The org id of the MFA request
|
|
98
|
-
* @param {string} mfaId The id of the MFA request
|
|
99
|
-
* @return {Promise<MfaRequestInfo>} The result of the MFA request
|
|
100
|
-
*/
|
|
101
|
-
mfaApprove(orgId: string, mfaId: string): Promise<MfaRequestInfo>;
|
|
102
|
-
/** Initiate adding a new FIDO device. MFA may be required. */
|
|
103
|
-
get addFidoStart(): (name: string, mfaReceipt?: MfaReceipt | undefined) => Promise<CubeSignerResponse<import("./mfa").AddFidoChallenge>>;
|
|
104
|
-
/**
|
|
105
|
-
* Creates a request to change user's TOTP. This request returns a new TOTP challenge
|
|
106
|
-
* that must be answered by calling `resetTotpComplete`
|
|
107
|
-
*/
|
|
108
|
-
get resetTotpStart(): (issuer?: string | undefined, mfaReceipt?: MfaReceipt | undefined) => Promise<CubeSignerResponse<import("./mfa").TotpChallenge>>;
|
|
109
|
-
/**
|
|
110
|
-
* Answer the TOTP challenge issued by `resetTotpStart`. If successful, user's
|
|
111
|
-
* TOTP configuration will be updated to that of the TOTP challenge.he TOTP configuration from the challenge.
|
|
112
|
-
*/
|
|
113
|
-
get resetTotpComplete(): (totpId: string, code: string) => Promise<void>;
|
|
114
|
-
/**
|
|
115
|
-
* Verifies a given TOTP code against the current user's TOTP configuration.
|
|
116
|
-
* Throws an error if the verification fails.
|
|
117
|
-
*/
|
|
118
|
-
get verifyTotp(): (code: string) => Promise<void>;
|
|
119
|
-
/**
|
|
120
|
-
* Retrieve information about an organization.
|
|
121
|
-
* @param {string} orgId The ID or name of the organization.
|
|
122
|
-
* @return {Org} The organization.
|
|
123
|
-
*/
|
|
124
|
-
getOrg(orgId?: string): Promise<Org>;
|
|
125
|
-
/**
|
|
126
|
-
* Deletes a given key.
|
|
127
|
-
* @param {string} orgId - Organization id
|
|
128
|
-
* @param {string} keyId - Key id
|
|
129
|
-
*/
|
|
130
|
-
deleteKey(orgId: string, keyId: string): Promise<void>;
|
|
131
|
-
/**
|
|
132
|
-
* Get the management client.
|
|
133
|
-
* @return {Client} The client.
|
|
134
|
-
* @internal
|
|
135
|
-
*/
|
|
136
|
-
management(): Promise<Client>;
|
|
137
|
-
/**
|
|
138
|
-
* Obtain a proof of authentication.
|
|
139
|
-
*
|
|
140
|
-
* @param {string} orgId The id of the organization that the user is in
|
|
141
|
-
* @return {Promise<IdentityProof>} Proof of authentication
|
|
142
|
-
*/
|
|
143
|
-
proveIdentity(orgId: string): Promise<IdentityProof>;
|
|
144
|
-
/**
|
|
145
|
-
* Exchange an OIDC token for a proof of authentication.
|
|
146
|
-
*
|
|
147
|
-
* @param {string} oidcToken The OIDC token
|
|
148
|
-
* @param {string} orgId The id of the organization that the user is in
|
|
149
|
-
* @return {Promise<IdentityProof>} Proof of authentication
|
|
150
|
-
*/
|
|
151
|
-
oidcProveIdentity(oidcToken: string, orgId: string): Promise<IdentityProof>;
|
|
152
|
-
/**
|
|
153
|
-
* Checks if a given identity proof is valid.
|
|
154
|
-
*
|
|
155
|
-
* @param {string} orgId The id of the organization that the user is in.
|
|
156
|
-
* @param {IdentityProof} identityProof The proof of authentication.
|
|
157
|
-
*/
|
|
158
|
-
verifyIdentity(orgId: string, identityProof: IdentityProof): Promise<void>;
|
|
159
|
-
/**
|
|
160
|
-
* Exchange an OIDC token for a CubeSigner session token.
|
|
161
|
-
* @param {string} oidcToken The OIDC token
|
|
162
|
-
* @param {string} orgId The id of the organization that the user is in
|
|
163
|
-
* @param {List<string>} scopes The scopes of the resulting session
|
|
164
|
-
* @param {RatchetConfig} lifetimes Lifetimes of the new session.
|
|
165
|
-
* @param {MfaReceipt} mfaReceipt Optional MFA receipt (id + confirmation code)
|
|
166
|
-
* @return {Promise<CubeSignerResponse<SignerSessionData>>} The session data.
|
|
167
|
-
*/
|
|
168
|
-
oidcLogin(oidcToken: string, orgId: string, scopes: Array<string>, lifetimes?: RatchetConfig, mfaReceipt?: MfaReceipt): Promise<CubeSignerResponse<SignerSessionData>>;
|
|
169
|
-
}
|
|
170
|
-
/** Errors */
|
|
171
|
-
export * from "./error";
|
|
172
|
-
/** API */
|
|
173
|
-
export * from "./api";
|
|
174
|
-
/** Client */
|
|
175
|
-
export * from "./client";
|
|
176
|
-
/** Callbacks */
|
|
177
|
-
export { Events, EventHandler, ErrorEvent, GlobalEvents, SessionExpiredEvent } from "./events";
|
|
178
|
-
/** Organizations */
|
|
179
|
-
export * from "./org";
|
|
180
|
-
/** Keys */
|
|
181
|
-
export * from "./key";
|
|
182
|
-
/** Roles */
|
|
183
|
-
export * from "./role";
|
|
184
|
-
/** Env */
|
|
185
|
-
export * from "./env";
|
|
186
|
-
/** Fido */
|
|
187
|
-
export * from "./mfa";
|
|
188
|
-
/** Pagination */
|
|
189
|
-
export * from "./paginator";
|
|
190
|
-
/** Response */
|
|
191
|
-
export * from "./response";
|
|
192
|
-
/** Types */
|
|
193
|
-
export * from "./schema_types";
|
|
194
|
-
/** Sessions */
|
|
195
|
-
export * from "./signer_session";
|
|
196
|
-
/** Session storage */
|
|
197
|
-
export * from "./session/session_storage";
|
|
198
|
-
/** Signer session manager */
|
|
199
|
-
export * from "./session/signer_session_manager";
|
|
200
|
-
/** Utils */
|
|
201
|
-
export * from "./util";
|
|
202
|
-
/** User-export decryption helper */
|
|
203
|
-
export { userExportDecrypt, userExportKeygen } from "./user_export";
|
|
204
|
-
/** CubeSigner SDK package name */
|
|
205
|
-
export declare const NAME: string;
|
|
206
|
-
/** CubeSigner SDK version */
|
|
207
|
-
export declare const VERSION: string;
|