@cubist-labs/cubesigner-sdk 0.3.26 → 0.3.27

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (52) hide show
  1. package/dist/cjs/package.json +1 -1
  2. package/dist/cjs/src/index.js +7 -4
  3. package/dist/cjs/src/org_event_processor.d.ts +57 -0
  4. package/dist/cjs/src/org_event_processor.js +137 -0
  5. package/dist/esm/package.json +1 -1
  6. package/dist/esm/src/index.js +4 -4
  7. package/dist/esm/src/org_event_processor.d.ts +57 -0
  8. package/dist/esm/src/org_event_processor.js +133 -0
  9. package/dist/package.json +36 -0
  10. package/dist/spec/env/beta.json +9 -0
  11. package/dist/spec/env/gamma.json +9 -0
  12. package/dist/spec/env/prod.json +9 -0
  13. package/dist/src/api.d.ts +634 -0
  14. package/dist/src/api.js +1309 -0
  15. package/dist/src/client.d.ts +575 -0
  16. package/dist/src/client.js +381 -0
  17. package/dist/src/env.d.ts +15 -0
  18. package/dist/src/env.js +35 -0
  19. package/dist/src/error.d.ts +29 -0
  20. package/dist/src/error.js +36 -0
  21. package/dist/src/events.d.ts +84 -0
  22. package/dist/src/events.js +195 -0
  23. package/dist/src/index.d.ts +207 -0
  24. package/dist/src/index.js +308 -0
  25. package/dist/src/key.d.ts +152 -0
  26. package/dist/src/key.js +242 -0
  27. package/dist/src/mfa.d.ts +94 -0
  28. package/dist/src/mfa.js +169 -0
  29. package/dist/src/org.d.ts +99 -0
  30. package/dist/src/org.js +95 -0
  31. package/dist/src/paginator.d.ts +76 -0
  32. package/dist/src/paginator.js +99 -0
  33. package/dist/src/response.d.ts +101 -0
  34. package/dist/src/response.js +164 -0
  35. package/dist/src/role.d.ts +283 -0
  36. package/dist/src/role.js +253 -0
  37. package/dist/src/schema.d.ts +6209 -0
  38. package/dist/src/schema.js +7 -0
  39. package/dist/src/schema_types.d.ts +113 -0
  40. package/dist/src/schema_types.js +3 -0
  41. package/dist/src/session/session_storage.d.ts +47 -0
  42. package/dist/src/session/session_storage.js +76 -0
  43. package/dist/src/session/signer_session_manager.d.ts +125 -0
  44. package/dist/src/session/signer_session_manager.js +239 -0
  45. package/dist/src/signer_session.d.ts +41 -0
  46. package/dist/src/signer_session.js +77 -0
  47. package/dist/src/user_export.d.ts +52 -0
  48. package/dist/src/user_export.js +129 -0
  49. package/dist/src/util.d.ts +61 -0
  50. package/dist/src/util.js +97 -0
  51. package/package.json +1 -1
  52. package/src/index.ts +3 -3
@@ -0,0 +1,133 @@
1
+ var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
2
+ if (kind === "m") throw new TypeError("Private method is not writable");
3
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
4
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
5
+ return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
6
+ };
7
+ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
8
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
9
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
10
+ return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
11
+ };
12
+ var _OrgEventProcessor_instances, _OrgEventProcessor_topicArn, _OrgEventProcessor_orgId, _OrgEventProcessor_cachedCertificates, _OrgEventProcessor_fetchAndValidateCertificate;
13
+ import { X509Certificate, createVerify } from "crypto";
14
+ import { envs } from ".";
15
+ // URLs that are safe to retrieve certificates from
16
+ const SNS_CERTIFICATE_URL_HOSTS = ["sns.us-east-1.amazonaws.com"];
17
+ const SNS_CERTIFICATE_HOST = "sns.amazonaws.com";
18
+ /** A utility for processing org event messages */
19
+ export class OrgEventProcessor {
20
+ /**
21
+ * Constructor.
22
+ * @param {string} orgId The org id
23
+ * @param {OrgEventProcessorOptions} options Additional options for the processor
24
+ */
25
+ constructor(orgId, options) {
26
+ _OrgEventProcessor_instances.add(this);
27
+ _OrgEventProcessor_topicArn.set(this, void 0);
28
+ _OrgEventProcessor_orgId.set(this, void 0);
29
+ _OrgEventProcessor_cachedCertificates.set(this, void 0);
30
+ __classPrivateFieldSet(this, _OrgEventProcessor_topicArn, envs[options?.env ?? "prod"].OrgEventsTopicArn, "f");
31
+ __classPrivateFieldSet(this, _OrgEventProcessor_orgId, orgId, "f");
32
+ __classPrivateFieldSet(this, _OrgEventProcessor_cachedCertificates, new Map(), "f");
33
+ }
34
+ /**
35
+ * Checks an SNS message and its signature. Throws an error if the message
36
+ * invalid or the signature is invalid.
37
+ *
38
+ * @param {SnsMessage} message The SNS message to check
39
+ */
40
+ async checkMessage(message) {
41
+ // Check the topic ARN
42
+ if (message.TopicArn !== __classPrivateFieldGet(this, _OrgEventProcessor_topicArn, "f")) {
43
+ throw new Error(`Expected topic ARN '${__classPrivateFieldGet(this, _OrgEventProcessor_topicArn, "f")}', found '${message.TopicArn}'`);
44
+ }
45
+ // Both subscription confirmations and org event messages should have no subject
46
+ if ("Subject" in message) {
47
+ throw new Error("Expected a message without a subject");
48
+ }
49
+ // The org events topic uses signature version 2 (SHA256)
50
+ if (message.SignatureVersion !== "2") {
51
+ throw new Error("Expected signature version 2");
52
+ }
53
+ // Retrieve the certificate and sanity check it
54
+ const certificate = await __classPrivateFieldGet(this, _OrgEventProcessor_instances, "m", _OrgEventProcessor_fetchAndValidateCertificate).call(this, new URL(message.SigningCertURL));
55
+ // Extract fields specific to subscription confirmations
56
+ const subscribeUrl = message.SubscribeURL;
57
+ const token = message.Token;
58
+ // Check the signature
59
+ const fields = ["Message", message.Message, "MessageId", message.MessageId]
60
+ .concat(subscribeUrl !== undefined ? ["SubscribeURL", subscribeUrl] : [])
61
+ .concat(["Timestamp", message.Timestamp])
62
+ .concat(token !== undefined ? ["Token", token] : [])
63
+ .concat(["TopicArn", message.TopicArn, "Type", message.Type]);
64
+ const verify = createVerify("RSA-SHA256");
65
+ verify.update(fields.join("\n") + "\n");
66
+ const isValid = verify.verify(certificate.publicKey, message.Signature, "base64");
67
+ if (!isValid) {
68
+ throw new Error("The org event has an invalid signature");
69
+ }
70
+ }
71
+ /**
72
+ * Parse an org event and check its signature. Throws an error if the
73
+ * message is not a valid org event or the signature is invalid.
74
+ *
75
+ * @param {OrgEventMessage} message The org event message to check
76
+ * @return {OrgEventBase} The org event
77
+ */
78
+ async parse(message) {
79
+ await this.checkMessage(message);
80
+ // Check that the event is for the expected org
81
+ const orgEvent = JSON.parse(message.Message);
82
+ if (orgEvent.org !== __classPrivateFieldGet(this, _OrgEventProcessor_orgId, "f")) {
83
+ throw new Error(`Expected org to be '${__classPrivateFieldGet(this, _OrgEventProcessor_orgId, "f")}', found '${orgEvent.org}'`);
84
+ }
85
+ return orgEvent;
86
+ }
87
+ }
88
+ _OrgEventProcessor_topicArn = new WeakMap(), _OrgEventProcessor_orgId = new WeakMap(), _OrgEventProcessor_cachedCertificates = new WeakMap(), _OrgEventProcessor_instances = new WeakSet(), _OrgEventProcessor_fetchAndValidateCertificate =
89
+ /**
90
+ * Fetches a certificate from a given URL or from the certificate cache.
91
+ * Throws an error if the URL does not correspond to an SNS certificate URL.
92
+ *
93
+ * Note: Ideally, this method would verify the certificate chain, but there
94
+ * is no obvious chain. Instead, this method only fetches certificates from
95
+ * a small set of allowlisted URLs.
96
+ *
97
+ * @param {URL} url The URL of the certificate
98
+ * @return {X509Certificate} The certificate
99
+ */
100
+ async function _OrgEventProcessor_fetchAndValidateCertificate(url) {
101
+ const currTime = new Date().getTime();
102
+ const cachedCertificate = __classPrivateFieldGet(this, _OrgEventProcessor_cachedCertificates, "f").get(url);
103
+ if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {
104
+ return cachedCertificate;
105
+ }
106
+ // Only fetch certificates from HTTPS URLs
107
+ if (url.protocol !== "https:") {
108
+ throw new Error("Expected signing certificate URL to use HTTPS");
109
+ }
110
+ // Only fetch certificate URLs for SNS
111
+ if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {
112
+ throw new Error("Expected signing certificate URL for SNS in us-east-1");
113
+ }
114
+ const response = await fetch(url);
115
+ if (!response.ok) {
116
+ throw new Error(`Unable to download certificate. Status: ${response.status}`);
117
+ }
118
+ const blob = await response.blob();
119
+ const certificate = new X509Certificate(await blob.text());
120
+ if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {
121
+ throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);
122
+ }
123
+ // Check validity times
124
+ if (currTime < new Date(certificate.validFrom).getTime()) {
125
+ throw new Error("Certificate not valid yet");
126
+ }
127
+ if (new Date(certificate.validTo).getTime() < currTime) {
128
+ throw new Error("Certificate expired");
129
+ }
130
+ __classPrivateFieldGet(this, _OrgEventProcessor_cachedCertificates, "f").set(url, certificate);
131
+ return certificate;
132
+ };
133
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"org_event_processor.js","sourceRoot":"","sources":["../../../src/org_event_processor.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,OAAO,EAAE,eAAe,EAAE,YAAY,EAAE,MAAM,QAAQ,CAAC;AACvD,OAAO,EAAe,IAAI,EAAE,MAAM,GAAG,CAAC;AAEtC,mDAAmD;AACnD,MAAM,yBAAyB,GAAG,CAAC,6BAA6B,CAAC,CAAC;AAElE,MAAM,oBAAoB,GAAG,mBAAmB,CAAC;AAsCjD,kDAAkD;AAClD,MAAM,OAAO,iBAAiB;IAK5B;;;;OAIG;IACH,YAAY,KAAa,EAAE,OAAkC;;QATpD,8CAAkB;QAClB,2CAAe;QACxB,wDAA+C;QAQ7C,uBAAA,IAAI,+BAAa,IAAI,CAAC,OAAO,EAAE,GAAG,IAAI,MAAM,CAAC,CAAC,iBAAiB,MAAA,CAAC;QAChE,uBAAA,IAAI,4BAAU,KAAK,MAAA,CAAC;QACpB,uBAAA,IAAI,yCAAuB,IAAI,GAAG,EAAE,MAAA,CAAC;IACvC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,YAAY,CAAC,OAAmB;QACpC,sBAAsB;QACtB,IAAI,OAAO,CAAC,QAAQ,KAAK,uBAAA,IAAI,mCAAU,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CAAC,uBAAuB,uBAAA,IAAI,mCAAU,aAAa,OAAO,CAAC,QAAQ,GAAG,CAAC,CAAC;QACzF,CAAC;QAED,gFAAgF;QAChF,IAAI,SAAS,IAAI,OAAO,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;QAC1D,CAAC;QAED,yDAAyD;QACzD,IAAI,OAAO,CAAC,gBAAgB,KAAK,GAAG,EAAE,CAAC;YACrC,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QAED,+CAA+C;QAC/C,MAAM,WAAW,GAAG,MAAM,uBAAA,IAAI,oFAA6B,MAAjC,IAAI,EAA8B,IAAI,GAAG,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC;QAE7F,wDAAwD;QACxD,MAAM,YAAY,GAAI,OAA2C,CAAC,YAAY,CAAC;QAC/E,MAAM,KAAK,GAAI,OAA2C,CAAC,KAAK,CAAC;QAEjE,sBAAsB;QACtB,MAAM,MAAM,GAAG,CAAC,SAAS,EAAE,OAAO,CAAC,OAAO,EAAE,WAAW,EAAE,OAAO,CAAC,SAAS,CAAC;aACxE,MAAM,CAAC,YAAY,KAAK,SAAS,CAAC,CAAC,CAAC,CAAC,cAAc,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;aACxE,MAAM,CAAC,CAAC,WAAW,EAAE,OAAO,CAAC,SAAS,CAAC,CAAC;aACxC,MAAM,CAAC,KAAK,KAAK,SAAS,CAAC,CAAC,CAAC,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;aACnD,MAAM,CAAC,CAAC,UAAU,EAAE,OAAO,CAAC,QAAQ,EAAE,MAAM,EAAE,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC;QAChE,MAAM,MAAM,GAAG,YAAY,CAAC,YAAY,CAAC,CAAC;QAC1C,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,IAAI,CAAC,CAAC;QACxC,MAAM,OAAO,GAAG,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,OAAO,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;QAClF,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC5D,CAAC;IACH,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,KAAK,CAAC,OAAwB;QAClC,MAAM,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAEjC,+CAA+C;QAC/C,MAAM,QAAQ,GAAiB,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;QAC3D,IAAI,QAAQ,CAAC,GAAG,KAAK,uBAAA,IAAI,gCAAO,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CAAC,uBAAuB,uBAAA,IAAI,gCAAO,aAAa,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;QAClF,CAAC;QAED,OAAO,QAAQ,CAAC;IAClB,CAAC;CAmDF;;AAjDC;;;;;;;;;;GAUG;AACH,KAAK,yDAA8B,GAAQ;IACzC,MAAM,QAAQ,GAAG,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,CAAC;IACtC,MAAM,iBAAiB,GAAG,uBAAA,IAAI,6CAAoB,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;IAC5D,IAAI,iBAAiB,IAAI,QAAQ,GAAG,IAAI,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;QAClF,OAAO,iBAAiB,CAAC;IAC3B,CAAC;IAED,0CAA0C;IAC1C,IAAI,GAAG,CAAC,QAAQ,KAAK,QAAQ,EAAE,CAAC;QAC9B,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;IACnE,CAAC;IAED,sCAAsC;IACtC,IAAI,yBAAyB,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC;QACvD,MAAM,IAAI,KAAK,CAAC,uDAAuD,CAAC,CAAC;IAC3E,CAAC;IAED,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;IAClC,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE,CAAC;QACjB,MAAM,IAAI,KAAK,CAAC,2CAA2C,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC;IAChF,CAAC;IACD,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;IACnC,MAAM,WAAW,GAAG,IAAI,eAAe,CAAC,MAAM,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC;IAC3D,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,oBAAoB,CAAC,EAAE,CAAC;QACjD,MAAM,IAAI,KAAK,CAAC,mCAAmC,oBAAoB,GAAG,CAAC,CAAC;IAC9E,CAAC;IAED,uBAAuB;IACvB,IAAI,QAAQ,GAAG,IAAI,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;QACzD,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;IAC/C,CAAC;IACD,IAAI,IAAI,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,GAAG,QAAQ,EAAE,CAAC;QACvD,MAAM,IAAI,KAAK,CAAC,qBAAqB,CAAC,CAAC;IACzC,CAAC;IAED,uBAAA,IAAI,6CAAoB,CAAC,GAAG,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;IAC/C,OAAO,WAAW,CAAC;AACrB,CAAC","sourcesContent":["import { X509Certificate, createVerify } from \"crypto\";\nimport { Environment, envs } from \".\";\n\n// URLs that are safe to retrieve certificates from\nconst SNS_CERTIFICATE_URL_HOSTS = [\"sns.us-east-1.amazonaws.com\"];\n\nconst SNS_CERTIFICATE_HOST = \"sns.amazonaws.com\";\n\n/** The common fields of SNS messages */\nexport interface SnsMessage {\n  Type: string;\n  MessageId: string;\n  TopicArn: string;\n  Message: string;\n  Timestamp: string;\n  SignatureVersion: string;\n  Signature: string;\n  SigningCertURL: string;\n}\n\n/** The format of a subscription confirmation sent by SNS */\nexport interface SubscriptionConfirmationMessage extends SnsMessage {\n  Token: string;\n  SubscribeURL: string;\n}\n\n/** Common fields for an org event */\nexport interface OrgEventBase {\n  org: string;\n  utc_timestamp: number;\n  org_event: string;\n}\n\n/** The format of an event message sent by SNS */\nexport interface OrgEventMessage extends SnsMessage {\n  Subject?: string;\n  UnsubscribeURL: string;\n}\n\n/** Options for the processor */\nexport interface OrgEventProcessorOptions {\n  env: Environment;\n}\n\n/** A utility for processing org event messages */\nexport class OrgEventProcessor {\n  readonly #topicArn: string;\n  readonly #orgId: string;\n  #cachedCertificates: Map<URL, X509Certificate>;\n\n  /**\n   * Constructor.\n   * @param {string} orgId The org id\n   * @param {OrgEventProcessorOptions} options Additional options for the processor\n   */\n  constructor(orgId: string, options?: OrgEventProcessorOptions) {\n    this.#topicArn = envs[options?.env ?? \"prod\"].OrgEventsTopicArn;\n    this.#orgId = orgId;\n    this.#cachedCertificates = new Map();\n  }\n\n  /**\n   * Checks an SNS message and its signature. Throws an error if the message\n   * invalid or the signature is invalid.\n   *\n   * @param {SnsMessage} message The SNS message to check\n   */\n  async checkMessage(message: SnsMessage) {\n    // Check the topic ARN\n    if (message.TopicArn !== this.#topicArn) {\n      throw new Error(`Expected topic ARN '${this.#topicArn}', found '${message.TopicArn}'`);\n    }\n\n    // Both subscription confirmations and org event messages should have no subject\n    if (\"Subject\" in message) {\n      throw new Error(\"Expected a message without a subject\");\n    }\n\n    // The org events topic uses signature version 2 (SHA256)\n    if (message.SignatureVersion !== \"2\") {\n      throw new Error(\"Expected signature version 2\");\n    }\n\n    // Retrieve the certificate and sanity check it\n    const certificate = await this.#fetchAndValidateCertificate(new URL(message.SigningCertURL));\n\n    // Extract fields specific to subscription confirmations\n    const subscribeUrl = (message as SubscriptionConfirmationMessage).SubscribeURL;\n    const token = (message as SubscriptionConfirmationMessage).Token;\n\n    // Check the signature\n    const fields = [\"Message\", message.Message, \"MessageId\", message.MessageId]\n      .concat(subscribeUrl !== undefined ? [\"SubscribeURL\", subscribeUrl] : [])\n      .concat([\"Timestamp\", message.Timestamp])\n      .concat(token !== undefined ? [\"Token\", token] : [])\n      .concat([\"TopicArn\", message.TopicArn, \"Type\", message.Type]);\n    const verify = createVerify(\"RSA-SHA256\");\n    verify.update(fields.join(\"\\n\") + \"\\n\");\n    const isValid = verify.verify(certificate.publicKey, message.Signature, \"base64\");\n    if (!isValid) {\n      throw new Error(\"The org event has an invalid signature\");\n    }\n  }\n\n  /**\n   * Parse an org event and check its signature. Throws an error if the\n   * message is not a valid org event or the signature is invalid.\n   *\n   * @param {OrgEventMessage} message The org event message to check\n   * @return {OrgEventBase} The org event\n   */\n  async parse(message: OrgEventMessage): Promise<OrgEventBase> {\n    await this.checkMessage(message);\n\n    // Check that the event is for the expected org\n    const orgEvent: OrgEventBase = JSON.parse(message.Message);\n    if (orgEvent.org !== this.#orgId) {\n      throw new Error(`Expected org to be '${this.#orgId}', found '${orgEvent.org}'`);\n    }\n\n    return orgEvent;\n  }\n\n  /**\n   * Fetches a certificate from a given URL or from the certificate cache.\n   * Throws an error if the URL does not correspond to an SNS certificate URL.\n   *\n   * Note: Ideally, this method would verify the certificate chain, but there\n   * is no obvious chain. Instead, this method only fetches certificates from\n   * a small set of allowlisted URLs.\n   *\n   * @param {URL} url The URL of the certificate\n   * @return {X509Certificate} The certificate\n   */\n  async #fetchAndValidateCertificate(url: URL): Promise<X509Certificate> {\n    const currTime = new Date().getTime();\n    const cachedCertificate = this.#cachedCertificates.get(url);\n    if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {\n      return cachedCertificate;\n    }\n\n    // Only fetch certificates from HTTPS URLs\n    if (url.protocol !== \"https:\") {\n      throw new Error(\"Expected signing certificate URL to use HTTPS\");\n    }\n\n    // Only fetch certificate URLs for SNS\n    if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {\n      throw new Error(\"Expected signing certificate URL for SNS in us-east-1\");\n    }\n\n    const response = await fetch(url);\n    if (!response.ok) {\n      throw new Error(`Unable to download certificate. Status: ${response.status}`);\n    }\n    const blob = await response.blob();\n    const certificate = new X509Certificate(await blob.text());\n    if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {\n      throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);\n    }\n\n    // Check validity times\n    if (currTime < new Date(certificate.validFrom).getTime()) {\n      throw new Error(\"Certificate not valid yet\");\n    }\n    if (new Date(certificate.validTo).getTime() < currTime) {\n      throw new Error(\"Certificate expired\");\n    }\n\n    this.#cachedCertificates.set(url, certificate);\n    return certificate;\n  }\n}\n"]}
@@ -0,0 +1,36 @@
1
+ {
2
+ "name": "@cubist-labs/cubesigner-sdk",
3
+ "version": "0.2.42",
4
+ "description": "CubeSigner TypeScript SDK",
5
+ "license": "MIT OR Apache-2.0",
6
+ "author": "Cubist, Inc.",
7
+ "main": "dist/src/index.js",
8
+ "types": "dist/src/index.d.ts",
9
+ "files": [
10
+ "tsconfig.json",
11
+ "src/**",
12
+ "dist/**",
13
+ "../..NOTICE",
14
+ "../..LICENSE-APACHE",
15
+ "../..LICENSE-MIT"
16
+ ],
17
+ "scripts": {
18
+ "build": "tsc",
19
+ "gen-schema": "openapi-typescript ./spec/openapi.json --output ./src/schema.ts",
20
+ "prepack": "tsc",
21
+ "test": "jest --maxWorkers=1",
22
+ "typedoc": "typedoc"
23
+ },
24
+ "dependencies": {
25
+ "openapi-fetch": "0.6.1"
26
+ },
27
+ "optionalDependencies": {
28
+ "@hpke/core": "^1.2.5"
29
+ },
30
+ "engines": {
31
+ "node": ">=18.0.0"
32
+ },
33
+ "directories": {
34
+ "test": "test"
35
+ }
36
+ }
@@ -0,0 +1,9 @@
1
+ {
2
+ "Dev-CubeSignerStack": {
3
+ "ClientId": "405mhvv13llufju1ruvnq42rdc",
4
+ "LongLivedClientId": "6he1bnm17s0dv8bb4hjim6fs6i",
5
+ "Region": "us-east-1",
6
+ "UserPoolId": "us-east-1_79ljlRRfX",
7
+ "SignerApiRoot": "https://beta.signer.cubist.dev"
8
+ }
9
+ }
@@ -0,0 +1,9 @@
1
+ {
2
+ "Dev-CubeSignerStack": {
3
+ "ClientId": "1tiou9ecj058khiidmhj4ds4rj",
4
+ "LongLivedClientId": "4jiuai7mtl5164of3drmvej234",
5
+ "Region": "us-east-1",
6
+ "UserPoolId": "us-east-1_RU7HEslOW",
7
+ "SignerApiRoot": "https://gamma.signer.cubist.dev"
8
+ }
9
+ }
@@ -0,0 +1,9 @@
1
+ {
2
+ "Dev-CubeSignerStack": {
3
+ "ClientId": "2saesgbmeu8p981sk33sr6nq1j",
4
+ "LongLivedClientId": "79qoe43lbiphd7jv0emqadtoia",
5
+ "Region": "us-east-1",
6
+ "UserPoolId": "us-east-1_lLLal8vGd",
7
+ "SignerApiRoot": "https://prod.signer.cubist.dev"
8
+ }
9
+ }