@cubist-labs/cubesigner-sdk 0.3.26 → 0.3.28
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/package.json +1 -1
- package/dist/cjs/src/client.d.ts +4 -4
- package/dist/cjs/src/index.js +7 -4
- package/dist/cjs/src/key.d.ts +35 -2
- package/dist/cjs/src/key.js +79 -5
- package/dist/cjs/src/org_event_processor.d.ts +57 -0
- package/dist/cjs/src/org_event_processor.js +137 -0
- package/dist/cjs/src/schema.d.ts +41 -24
- package/dist/cjs/src/schema.js +1 -1
- package/dist/cjs/src/util.d.ts +2 -0
- package/dist/cjs/src/util.js +1 -1
- package/dist/esm/package.json +1 -1
- package/dist/esm/src/client.d.ts +4 -4
- package/dist/esm/src/index.js +4 -4
- package/dist/esm/src/key.d.ts +35 -2
- package/dist/esm/src/key.js +79 -5
- package/dist/esm/src/org_event_processor.d.ts +57 -0
- package/dist/esm/src/org_event_processor.js +133 -0
- package/dist/esm/src/schema.d.ts +41 -24
- package/dist/esm/src/schema.js +1 -1
- package/dist/esm/src/util.d.ts +2 -0
- package/dist/esm/src/util.js +1 -1
- package/dist/package.json +36 -0
- package/dist/spec/env/beta.json +9 -0
- package/dist/spec/env/gamma.json +9 -0
- package/dist/spec/env/prod.json +9 -0
- package/dist/src/api.d.ts +634 -0
- package/dist/src/api.js +1309 -0
- package/dist/src/client.d.ts +575 -0
- package/dist/src/client.js +381 -0
- package/dist/src/env.d.ts +15 -0
- package/dist/src/env.js +35 -0
- package/dist/src/error.d.ts +29 -0
- package/dist/src/error.js +36 -0
- package/dist/src/events.d.ts +84 -0
- package/dist/src/events.js +195 -0
- package/dist/src/index.d.ts +207 -0
- package/dist/src/index.js +308 -0
- package/dist/src/key.d.ts +152 -0
- package/dist/src/key.js +242 -0
- package/dist/src/mfa.d.ts +94 -0
- package/dist/src/mfa.js +169 -0
- package/dist/src/org.d.ts +99 -0
- package/dist/src/org.js +95 -0
- package/dist/src/paginator.d.ts +76 -0
- package/dist/src/paginator.js +99 -0
- package/dist/src/response.d.ts +101 -0
- package/dist/src/response.js +164 -0
- package/dist/src/role.d.ts +283 -0
- package/dist/src/role.js +253 -0
- package/dist/src/schema.d.ts +6209 -0
- package/dist/src/schema.js +7 -0
- package/dist/src/schema_types.d.ts +113 -0
- package/dist/src/schema_types.js +3 -0
- package/dist/src/session/session_storage.d.ts +47 -0
- package/dist/src/session/session_storage.js +76 -0
- package/dist/src/session/signer_session_manager.d.ts +125 -0
- package/dist/src/session/signer_session_manager.js +239 -0
- package/dist/src/signer_session.d.ts +41 -0
- package/dist/src/signer_session.js +77 -0
- package/dist/src/user_export.d.ts +52 -0
- package/dist/src/user_export.js +129 -0
- package/dist/src/util.d.ts +61 -0
- package/dist/src/util.js +97 -0
- package/package.json +1 -1
- package/src/index.ts +3 -3
- package/src/key.ts +83 -4
- package/src/schema.ts +42 -25
- package/src/util.ts +3 -0
package/dist/src/key.js
ADDED
|
@@ -0,0 +1,242 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
3
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
4
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
5
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
6
|
+
};
|
|
7
|
+
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
8
|
+
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
9
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
10
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
11
|
+
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
12
|
+
};
|
|
13
|
+
var _Key_data;
|
|
14
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
+
exports.fromSchemaKeyType = exports.Key = exports.toKeyInfo = exports.Stark = exports.Mnemonic = exports.Ed25519 = exports.Bls = exports.Secp256k1 = void 0;
|
|
16
|
+
/** Secp256k1 key type */
|
|
17
|
+
var Secp256k1;
|
|
18
|
+
(function (Secp256k1) {
|
|
19
|
+
Secp256k1["Evm"] = "SecpEthAddr";
|
|
20
|
+
Secp256k1["Btc"] = "SecpBtc";
|
|
21
|
+
Secp256k1["BtcTest"] = "SecpBtcTest";
|
|
22
|
+
Secp256k1["Ava"] = "SecpAvaAddr";
|
|
23
|
+
Secp256k1["AvaTest"] = "SecpAvaTestAddr";
|
|
24
|
+
})(Secp256k1 || (exports.Secp256k1 = Secp256k1 = {}));
|
|
25
|
+
/** BLS key type */
|
|
26
|
+
var Bls;
|
|
27
|
+
(function (Bls) {
|
|
28
|
+
Bls["Eth2Deposited"] = "BlsPub";
|
|
29
|
+
Bls["Eth2Inactive"] = "BlsInactive";
|
|
30
|
+
})(Bls || (exports.Bls = Bls = {}));
|
|
31
|
+
/** Ed25519 key type */
|
|
32
|
+
var Ed25519;
|
|
33
|
+
(function (Ed25519) {
|
|
34
|
+
Ed25519["Solana"] = "Ed25519SolanaAddr";
|
|
35
|
+
Ed25519["Sui"] = "Ed25519SuiAddr";
|
|
36
|
+
Ed25519["Aptos"] = "Ed25519AptosAddr";
|
|
37
|
+
Ed25519["Cardano"] = "Ed25519CardanoAddrVk";
|
|
38
|
+
Ed25519["Stellar"] = "Ed25519StellarAddr";
|
|
39
|
+
})(Ed25519 || (exports.Ed25519 = Ed25519 = {}));
|
|
40
|
+
/** Mnemonic key type */
|
|
41
|
+
exports.Mnemonic = "Mnemonic";
|
|
42
|
+
/** Stark key type */
|
|
43
|
+
exports.Stark = "Stark";
|
|
44
|
+
/**
|
|
45
|
+
* Define some additional (backward compatibility) properties
|
|
46
|
+
* on a `KeyInfoApi` object returned from the remote end.
|
|
47
|
+
*
|
|
48
|
+
* @param {KeyInfoApi} key Key information returned from the remote end
|
|
49
|
+
* @return {KeyInfo} The same `key` object extended with some derived properties.
|
|
50
|
+
*/
|
|
51
|
+
function toKeyInfo(key) {
|
|
52
|
+
return {
|
|
53
|
+
...key,
|
|
54
|
+
id: key.key_id,
|
|
55
|
+
type: key.key_type,
|
|
56
|
+
publicKey: key.public_key,
|
|
57
|
+
materialId: key.material_id,
|
|
58
|
+
};
|
|
59
|
+
}
|
|
60
|
+
exports.toKeyInfo = toKeyInfo;
|
|
61
|
+
/**
|
|
62
|
+
* A representation of a signing key.
|
|
63
|
+
*/
|
|
64
|
+
class Key {
|
|
65
|
+
/** The organization that this key is in */
|
|
66
|
+
get orgId() {
|
|
67
|
+
return this.csc.orgId;
|
|
68
|
+
}
|
|
69
|
+
/**
|
|
70
|
+
* The id of the key: "Key#" followed by a unique identifier specific to
|
|
71
|
+
* the type of key (such as a public key for BLS or an ethereum address for Secp)
|
|
72
|
+
* @example Key#0x8e3484687e66cdd26cf04c3647633ab4f3570148
|
|
73
|
+
*/
|
|
74
|
+
get id() {
|
|
75
|
+
return __classPrivateFieldGet(this, _Key_data, "f").key_id;
|
|
76
|
+
}
|
|
77
|
+
/**
|
|
78
|
+
* A unique identifier specific to the type of key, such as a public key or an ethereum address
|
|
79
|
+
* @example 0x8e3484687e66cdd26cf04c3647633ab4f3570148
|
|
80
|
+
*/
|
|
81
|
+
get materialId() {
|
|
82
|
+
return __classPrivateFieldGet(this, _Key_data, "f").material_id;
|
|
83
|
+
}
|
|
84
|
+
/**
|
|
85
|
+
* @description Hex-encoded, serialized public key. The format used depends on the key type:
|
|
86
|
+
* - secp256k1 keys use 65-byte uncompressed SECG format
|
|
87
|
+
* - BLS keys use 48-byte compressed BLS12-381 (ZCash) format
|
|
88
|
+
* @example 0x04d2688b6bc2ce7f9879b9e745f3c4dc177908c5cef0c1b64cff19ae7ff27dee623c64fe9d9c325c7fbbc748bbd5f607ce14dd83e28ebbbb7d3e7f2ffb70a79431
|
|
89
|
+
*/
|
|
90
|
+
get publicKey() {
|
|
91
|
+
return __classPrivateFieldGet(this, _Key_data, "f").public_key;
|
|
92
|
+
}
|
|
93
|
+
/**
|
|
94
|
+
* Get the cached properties of this key. The cached properties reflect the
|
|
95
|
+
* state of the last fetch or update (e.g., after awaiting `Key.enabled()`
|
|
96
|
+
* or `Key.disable()`).
|
|
97
|
+
*/
|
|
98
|
+
get cached() {
|
|
99
|
+
return __classPrivateFieldGet(this, _Key_data, "f");
|
|
100
|
+
}
|
|
101
|
+
/** The type of key. */
|
|
102
|
+
async type() {
|
|
103
|
+
const data = await this.fetch();
|
|
104
|
+
return fromSchemaKeyType(data.key_type);
|
|
105
|
+
}
|
|
106
|
+
/** Is the key enabled? */
|
|
107
|
+
async enabled() {
|
|
108
|
+
const data = await this.fetch();
|
|
109
|
+
return data.enabled;
|
|
110
|
+
}
|
|
111
|
+
/** Enable the key. */
|
|
112
|
+
async enable() {
|
|
113
|
+
await this.update({ enabled: true });
|
|
114
|
+
}
|
|
115
|
+
/** Disable the key. */
|
|
116
|
+
async disable() {
|
|
117
|
+
await this.update({ enabled: false });
|
|
118
|
+
}
|
|
119
|
+
/**
|
|
120
|
+
* Set new policy (overwriting any policies previously set for this key)
|
|
121
|
+
* @param {KeyPolicy} policy The new policy to set
|
|
122
|
+
*/
|
|
123
|
+
async setPolicy(policy) {
|
|
124
|
+
await this.update({ policy: policy });
|
|
125
|
+
}
|
|
126
|
+
/**
|
|
127
|
+
* Append to existing key policy. This append is not atomic -- it uses {@link policy} to fetch the current policy and then {@link setPolicy} to set the policy -- and should not be used in across concurrent sessions.
|
|
128
|
+
* @param {KeyPolicy} policy The policy to append to the existing one.
|
|
129
|
+
*/
|
|
130
|
+
async appendPolicy(policy) {
|
|
131
|
+
const existing = await this.policy();
|
|
132
|
+
await this.setPolicy([...existing, ...policy]);
|
|
133
|
+
}
|
|
134
|
+
/**
|
|
135
|
+
* Get the policy for the key.
|
|
136
|
+
* @return {Promise<KeyPolicy>} The policy for the key.
|
|
137
|
+
*/
|
|
138
|
+
async policy() {
|
|
139
|
+
const data = await this.fetch();
|
|
140
|
+
return (data.policy ?? []);
|
|
141
|
+
}
|
|
142
|
+
/**
|
|
143
|
+
* @description Owner of the key
|
|
144
|
+
* @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
|
|
145
|
+
*/
|
|
146
|
+
async owner() {
|
|
147
|
+
const data = await this.fetch();
|
|
148
|
+
return data.owner;
|
|
149
|
+
}
|
|
150
|
+
/**
|
|
151
|
+
* Set the owner of the key. Only the key (or org) owner can change the owner of the key.
|
|
152
|
+
* @param {string} owner The user-id of the new owner of the key.
|
|
153
|
+
*/
|
|
154
|
+
async setOwner(owner) {
|
|
155
|
+
await this.update({ owner });
|
|
156
|
+
}
|
|
157
|
+
/**
|
|
158
|
+
* Delete this key.
|
|
159
|
+
*/
|
|
160
|
+
async delete() {
|
|
161
|
+
await this.csc.keyDelete(this.id);
|
|
162
|
+
}
|
|
163
|
+
// --------------------------------------------------------------------------
|
|
164
|
+
// -- INTERNAL --------------------------------------------------------------
|
|
165
|
+
// --------------------------------------------------------------------------
|
|
166
|
+
/**
|
|
167
|
+
* Create a new key.
|
|
168
|
+
*
|
|
169
|
+
* @param {CubeSignerClient} csc The CubeSigner instance to use for signing.
|
|
170
|
+
* @param {KeyInfoApi} data The JSON response from the API server.
|
|
171
|
+
* @internal
|
|
172
|
+
*/
|
|
173
|
+
constructor(csc, data) {
|
|
174
|
+
/** The key information */
|
|
175
|
+
_Key_data.set(this, void 0);
|
|
176
|
+
this.csc = csc;
|
|
177
|
+
__classPrivateFieldSet(this, _Key_data, toKeyInfo(data), "f");
|
|
178
|
+
}
|
|
179
|
+
/**
|
|
180
|
+
* Update the key.
|
|
181
|
+
* @param {UpdateKeyRequest} request The JSON request to send to the API server.
|
|
182
|
+
* @return {KeyInfo} The JSON response from the API server.
|
|
183
|
+
* @internal
|
|
184
|
+
*/
|
|
185
|
+
async update(request) {
|
|
186
|
+
__classPrivateFieldSet(this, _Key_data, await this.csc.keyUpdate(this.id, request).then(toKeyInfo), "f");
|
|
187
|
+
return __classPrivateFieldGet(this, _Key_data, "f");
|
|
188
|
+
}
|
|
189
|
+
/**
|
|
190
|
+
* Fetch the key information.
|
|
191
|
+
*
|
|
192
|
+
* @return {KeyInfo} The key information.
|
|
193
|
+
* @internal
|
|
194
|
+
*/
|
|
195
|
+
async fetch() {
|
|
196
|
+
__classPrivateFieldSet(this, _Key_data, await this.csc.keyGet(this.id).then(toKeyInfo), "f");
|
|
197
|
+
return __classPrivateFieldGet(this, _Key_data, "f");
|
|
198
|
+
}
|
|
199
|
+
}
|
|
200
|
+
exports.Key = Key;
|
|
201
|
+
_Key_data = new WeakMap();
|
|
202
|
+
/**
|
|
203
|
+
* Convert a schema key type to a key type.
|
|
204
|
+
*
|
|
205
|
+
* @param {SchemaKeyType} ty The schema key type.
|
|
206
|
+
* @return {KeyType} The key type.
|
|
207
|
+
* @internal
|
|
208
|
+
*/
|
|
209
|
+
function fromSchemaKeyType(ty) {
|
|
210
|
+
switch (ty) {
|
|
211
|
+
case "SecpEthAddr":
|
|
212
|
+
return Secp256k1.Evm;
|
|
213
|
+
case "SecpBtc":
|
|
214
|
+
return Secp256k1.Btc;
|
|
215
|
+
case "SecpBtcTest":
|
|
216
|
+
return Secp256k1.BtcTest;
|
|
217
|
+
case "SecpAvaAddr":
|
|
218
|
+
return Secp256k1.Ava;
|
|
219
|
+
case "SecpAvaTestAddr":
|
|
220
|
+
return Secp256k1.AvaTest;
|
|
221
|
+
case "BlsPub":
|
|
222
|
+
return Bls.Eth2Deposited;
|
|
223
|
+
case "BlsInactive":
|
|
224
|
+
return Bls.Eth2Inactive;
|
|
225
|
+
case "Ed25519SolanaAddr":
|
|
226
|
+
return Ed25519.Solana;
|
|
227
|
+
case "Ed25519SuiAddr":
|
|
228
|
+
return Ed25519.Sui;
|
|
229
|
+
case "Ed25519AptosAddr":
|
|
230
|
+
return Ed25519.Aptos;
|
|
231
|
+
case "Ed25519CardanoAddrVk":
|
|
232
|
+
return Ed25519.Cardano;
|
|
233
|
+
case "Ed25519StellarAddr":
|
|
234
|
+
return Ed25519.Stellar;
|
|
235
|
+
case "Stark":
|
|
236
|
+
return exports.Stark;
|
|
237
|
+
case "Mnemonic":
|
|
238
|
+
return exports.Mnemonic;
|
|
239
|
+
}
|
|
240
|
+
}
|
|
241
|
+
exports.fromSchemaKeyType = fromSchemaKeyType;
|
|
242
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key.js","sourceRoot":"","sources":["../../src/key.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAIA,yBAAyB;AACzB,IAAY,SAMX;AAND,WAAY,SAAS;IACnB,gCAAmB,CAAA;IACnB,4BAAe,CAAA;IACf,oCAAuB,CAAA;IACvB,gCAAmB,CAAA;IACnB,wCAA2B,CAAA;AAC7B,CAAC,EANW,SAAS,yBAAT,SAAS,QAMpB;AAED,mBAAmB;AACnB,IAAY,GAGX;AAHD,WAAY,GAAG;IACb,+BAAwB,CAAA;IACxB,mCAA4B,CAAA;AAC9B,CAAC,EAHW,GAAG,mBAAH,GAAG,QAGd;AAED,uBAAuB;AACvB,IAAY,OAMX;AAND,WAAY,OAAO;IACjB,uCAA4B,CAAA;IAC5B,iCAAsB,CAAA;IACtB,qCAA0B,CAAA;IAC1B,2CAAgC,CAAA;IAChC,yCAA8B,CAAA;AAChC,CAAC,EANW,OAAO,uBAAP,OAAO,QAMlB;AAED,wBAAwB;AACX,QAAA,QAAQ,GAAG,UAAmB,CAAC;AAG5C,qBAAqB;AACR,QAAA,KAAK,GAAG,OAAgB,CAAC;AAkBtC;;;;;;GAMG;AACH,SAAgB,SAAS,CAAC,GAAe;IACvC,OAAO;QACL,GAAG,GAAG;QACN,EAAE,EAAE,GAAG,CAAC,MAAM;QACd,IAAI,EAAE,GAAG,CAAC,QAAQ;QAClB,SAAS,EAAE,GAAG,CAAC,UAAU;QACzB,UAAU,EAAE,GAAG,CAAC,WAAW;KAC5B,CAAC;AACJ,CAAC;AARD,8BAQC;AAED;;GAEG;AACH,MAAa,GAAG;IAMd,2CAA2C;IAC3C,IAAI,KAAK;QACP,OAAO,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC;IACxB,CAAC;IAED;;;;OAIG;IACH,IAAI,EAAE;QACJ,OAAO,uBAAA,IAAI,iBAAM,CAAC,MAAM,CAAC;IAC3B,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,uBAAA,IAAI,iBAAM,CAAC,WAAW,CAAC;IAChC,CAAC;IAED;;;;;OAKG;IACH,IAAI,SAAS;QACX,OAAO,uBAAA,IAAI,iBAAM,CAAC,UAAU,CAAC;IAC/B,CAAC;IAED;;;;OAIG;IACH,IAAI,MAAM;QACR,OAAO,uBAAA,IAAI,iBAAM,CAAC;IACpB,CAAC;IAED,uBAAuB;IACvB,KAAK,CAAC,IAAI;QACR,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,KAAK,EAAE,CAAC;QAChC,OAAO,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;IAC1C,CAAC;IAED,0BAA0B;IAC1B,KAAK,CAAC,OAAO;QACX,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,KAAK,EAAE,CAAC;QAChC,OAAO,IAAI,CAAC,OAAO,CAAC;IACtB,CAAC;IAED,sBAAsB;IACtB,KAAK,CAAC,MAAM;QACV,MAAM,IAAI,CAAC,MAAM,CAAC,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC,CAAC;IACvC,CAAC;IAED,uBAAuB;IACvB,KAAK,CAAC,OAAO;QACX,MAAM,IAAI,CAAC,MAAM,CAAC,EAAE,OAAO,EAAE,KAAK,EAAE,CAAC,CAAC;IACxC,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,SAAS,CAAC,MAAiB;QAC/B,MAAM,IAAI,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,MAA4C,EAAE,CAAC,CAAC;IAC9E,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,YAAY,CAAC,MAAiB;QAClC,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,EAAE,CAAC;QACrC,MAAM,IAAI,CAAC,SAAS,CAAC,CAAC,GAAG,QAAQ,EAAE,GAAG,MAAM,CAAC,CAAC,CAAC;IACjD,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,MAAM;QACV,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,KAAK,EAAE,CAAC;QAChC,OAAO,CAAC,IAAI,CAAC,MAAM,IAAI,EAAE,CAAyB,CAAC;IACrD,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,KAAK;QACT,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,KAAK,EAAE,CAAC;QAChC,OAAO,IAAI,CAAC,KAAK,CAAC;IACpB,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,QAAQ,CAAC,KAAa;QAC1B,MAAM,IAAI,CAAC,MAAM,CAAC,EAAE,KAAK,EAAE,CAAC,CAAC;IAC/B,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,MAAM;QACV,MAAM,IAAI,CAAC,GAAG,CAAC,SAAS,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;IACpC,CAAC;IAED,6EAA6E;IAC7E,6EAA6E;IAC7E,6EAA6E;IAE7E;;;;;;OAMG;IACH,YAAY,GAAqB,EAAE,IAAgB;QA/HnD,0BAA0B;QAC1B,4BAAe;QA+Hb,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;QACf,uBAAA,IAAI,aAAS,SAAS,CAAC,IAAI,CAAC,MAAA,CAAC;IAC/B,CAAC;IAED;;;;;OAKG;IACK,KAAK,CAAC,MAAM,CAAC,OAAyB;QAC5C,uBAAA,IAAI,aAAS,MAAM,IAAI,CAAC,GAAG,CAAC,SAAS,CAAC,IAAI,CAAC,EAAE,EAAE,OAAO,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,MAAA,CAAC;QACxE,OAAO,uBAAA,IAAI,iBAAM,CAAC;IACpB,CAAC;IAED;;;;;OAKG;IACK,KAAK,CAAC,KAAK;QACjB,uBAAA,IAAI,aAAS,MAAM,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,MAAA,CAAC;QAC5D,OAAO,uBAAA,IAAI,iBAAM,CAAC;IACpB,CAAC;CACF;AA5JD,kBA4JC;;AAED;;;;;;GAMG;AACH,SAAgB,iBAAiB,CAAC,EAAiB;IACjD,QAAQ,EAAE,EAAE,CAAC;QACX,KAAK,aAAa;YAChB,OAAO,SAAS,CAAC,GAAG,CAAC;QACvB,KAAK,SAAS;YACZ,OAAO,SAAS,CAAC,GAAG,CAAC;QACvB,KAAK,aAAa;YAChB,OAAO,SAAS,CAAC,OAAO,CAAC;QAC3B,KAAK,aAAa;YAChB,OAAO,SAAS,CAAC,GAAG,CAAC;QACvB,KAAK,iBAAiB;YACpB,OAAO,SAAS,CAAC,OAAO,CAAC;QAC3B,KAAK,QAAQ;YACX,OAAO,GAAG,CAAC,aAAa,CAAC;QAC3B,KAAK,aAAa;YAChB,OAAO,GAAG,CAAC,YAAY,CAAC;QAC1B,KAAK,mBAAmB;YACtB,OAAO,OAAO,CAAC,MAAM,CAAC;QACxB,KAAK,gBAAgB;YACnB,OAAO,OAAO,CAAC,GAAG,CAAC;QACrB,KAAK,kBAAkB;YACrB,OAAO,OAAO,CAAC,KAAK,CAAC;QACvB,KAAK,sBAAsB;YACzB,OAAO,OAAO,CAAC,OAAO,CAAC;QACzB,KAAK,oBAAoB;YACvB,OAAO,OAAO,CAAC,OAAO,CAAC;QACzB,KAAK,OAAO;YACV,OAAO,aAAK,CAAC;QACf,KAAK,UAAU;YACb,OAAO,gBAAQ,CAAC;IACpB,CAAC;AACH,CAAC;AA/BD,8CA+BC","sourcesContent":["import { KeyPolicy } from \"./role\";\nimport { KeyInfoApi, KeyTypeApi, UpdateKeyRequest, SchemaKeyType } from \"./schema_types\";\nimport { CubeSignerClient } from \"./client\";\n\n/** Secp256k1 key type */\nexport enum Secp256k1 {\n  Evm = \"SecpEthAddr\", // eslint-disable-line no-unused-vars\n  Btc = \"SecpBtc\", // eslint-disable-line no-unused-vars\n  BtcTest = \"SecpBtcTest\", // eslint-disable-line no-unused-vars\n  Ava = \"SecpAvaAddr\", // eslint-disable-line no-unused-vars\n  AvaTest = \"SecpAvaTestAddr\", // eslint-disable-line no-unused-vars\n}\n\n/** BLS key type */\nexport enum Bls {\n  Eth2Deposited = \"BlsPub\", // eslint-disable-line no-unused-vars\n  Eth2Inactive = \"BlsInactive\", // eslint-disable-line no-unused-vars\n}\n\n/** Ed25519 key type */\nexport enum Ed25519 {\n  Solana = \"Ed25519SolanaAddr\", // eslint-disable-line no-unused-vars\n  Sui = \"Ed25519SuiAddr\", // eslint-disable-line no-unused-vars\n  Aptos = \"Ed25519AptosAddr\", // eslint-disable-line no-unused-vars\n  Cardano = \"Ed25519CardanoAddrVk\", // eslint-disable-line no-unused-vars\n  Stellar = \"Ed25519StellarAddr\", // eslint-disable-line no-unused-vars\n}\n\n/** Mnemonic key type */\nexport const Mnemonic = \"Mnemonic\" as const;\nexport type Mnemonic = typeof Mnemonic;\n\n/** Stark key type */\nexport const Stark = \"Stark\" as const;\nexport type Stark = typeof Stark;\n\n/** Key type */\nexport type KeyType = Secp256k1 | Bls | Ed25519 | Mnemonic | Stark;\n\n/** Additional properties (for backward compatibility) */\nexport interface KeyInfo extends KeyInfoApi {\n  /** Alias for key_id */\n  id: string;\n  /** Alias for key_type */\n  type: KeyTypeApi;\n  /** Alias for material_id */\n  materialId: string;\n  /** Alias for public_key */\n  publicKey: string;\n}\n\n/**\n * Define some additional (backward compatibility) properties\n * on a `KeyInfoApi` object returned from the remote end.\n *\n * @param {KeyInfoApi} key Key information returned from the remote end\n * @return {KeyInfo} The same `key` object extended with some derived properties.\n */\nexport function toKeyInfo(key: KeyInfoApi): KeyInfo {\n  return {\n    ...key,\n    id: key.key_id,\n    type: key.key_type,\n    publicKey: key.public_key,\n    materialId: key.material_id,\n  };\n}\n\n/**\n * A representation of a signing key.\n */\nexport class Key {\n  /** The CubeSigner instance that this key is associated with */\n  protected readonly csc: CubeSignerClient;\n  /** The key information */\n  #data: KeyInfo;\n\n  /** The organization that this key is in */\n  get orgId() {\n    return this.csc.orgId;\n  }\n\n  /**\n   * The id of the key: \"Key#\" followed by a unique identifier specific to\n   * the type of key (such as a public key for BLS or an ethereum address for Secp)\n   * @example Key#0x8e3484687e66cdd26cf04c3647633ab4f3570148\n   */\n  get id(): string {\n    return this.#data.key_id;\n  }\n\n  /**\n   * A unique identifier specific to the type of key, such as a public key or an ethereum address\n   * @example 0x8e3484687e66cdd26cf04c3647633ab4f3570148\n   */\n  get materialId(): string {\n    return this.#data.material_id;\n  }\n\n  /**\n   * @description Hex-encoded, serialized public key. The format used depends on the key type:\n   * - secp256k1 keys use 65-byte uncompressed SECG format\n   * - BLS keys use 48-byte compressed BLS12-381 (ZCash) format\n   * @example 0x04d2688b6bc2ce7f9879b9e745f3c4dc177908c5cef0c1b64cff19ae7ff27dee623c64fe9d9c325c7fbbc748bbd5f607ce14dd83e28ebbbb7d3e7f2ffb70a79431\n   */\n  get publicKey(): string {\n    return this.#data.public_key;\n  }\n\n  /**\n   * Get the cached properties of this key. The cached properties reflect the\n   * state of the last fetch or update (e.g., after awaiting `Key.enabled()`\n   * or `Key.disable()`).\n   */\n  get cached(): KeyInfo {\n    return this.#data;\n  }\n\n  /** The type of key. */\n  async type(): Promise<KeyType> {\n    const data = await this.fetch();\n    return fromSchemaKeyType(data.key_type);\n  }\n\n  /** Is the key enabled? */\n  async enabled(): Promise<boolean> {\n    const data = await this.fetch();\n    return data.enabled;\n  }\n\n  /** Enable the key. */\n  async enable() {\n    await this.update({ enabled: true });\n  }\n\n  /** Disable the key. */\n  async disable() {\n    await this.update({ enabled: false });\n  }\n\n  /**\n   * Set new policy (overwriting any policies previously set for this key)\n   * @param {KeyPolicy} policy The new policy to set\n   */\n  async setPolicy(policy: KeyPolicy) {\n    await this.update({ policy: policy as unknown as Record<string, never>[] });\n  }\n\n  /**\n   * Append to existing key policy. This append is not atomic -- it uses {@link policy} to fetch the current policy and then {@link setPolicy} to set the policy -- and should not be used in across concurrent sessions.\n   * @param {KeyPolicy} policy The policy to append to the existing one.\n   */\n  async appendPolicy(policy: KeyPolicy) {\n    const existing = await this.policy();\n    await this.setPolicy([...existing, ...policy]);\n  }\n\n  /**\n   * Get the policy for the key.\n   * @return {Promise<KeyPolicy>} The policy for the key.\n   */\n  async policy(): Promise<KeyPolicy> {\n    const data = await this.fetch();\n    return (data.policy ?? []) as unknown as KeyPolicy;\n  }\n\n  /**\n   * @description Owner of the key\n   * @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f\n   */\n  async owner(): Promise<string> {\n    const data = await this.fetch();\n    return data.owner;\n  }\n\n  /**\n   * Set the owner of the key. Only the key (or org) owner can change the owner of the key.\n   * @param {string} owner The user-id of the new owner of the key.\n   */\n  async setOwner(owner: string) {\n    await this.update({ owner });\n  }\n\n  /**\n   * Delete this key.\n   */\n  async delete() {\n    await this.csc.keyDelete(this.id);\n  }\n\n  // --------------------------------------------------------------------------\n  // -- INTERNAL --------------------------------------------------------------\n  // --------------------------------------------------------------------------\n\n  /**\n   * Create a new key.\n   *\n   * @param {CubeSignerClient} csc The CubeSigner instance to use for signing.\n   * @param {KeyInfoApi} data The JSON response from the API server.\n   * @internal\n   */\n  constructor(csc: CubeSignerClient, data: KeyInfoApi) {\n    this.csc = csc;\n    this.#data = toKeyInfo(data);\n  }\n\n  /**\n   * Update the key.\n   * @param {UpdateKeyRequest} request The JSON request to send to the API server.\n   * @return {KeyInfo} The JSON response from the API server.\n   * @internal\n   */\n  private async update(request: UpdateKeyRequest): Promise<KeyInfo> {\n    this.#data = await this.csc.keyUpdate(this.id, request).then(toKeyInfo);\n    return this.#data;\n  }\n\n  /**\n   * Fetch the key information.\n   *\n   * @return {KeyInfo} The key information.\n   * @internal\n   */\n  private async fetch(): Promise<KeyInfo> {\n    this.#data = await this.csc.keyGet(this.id).then(toKeyInfo);\n    return this.#data;\n  }\n}\n\n/**\n * Convert a schema key type to a key type.\n *\n * @param {SchemaKeyType} ty The schema key type.\n * @return {KeyType} The key type.\n * @internal\n */\nexport function fromSchemaKeyType(ty: SchemaKeyType): KeyType {\n  switch (ty) {\n    case \"SecpEthAddr\":\n      return Secp256k1.Evm;\n    case \"SecpBtc\":\n      return Secp256k1.Btc;\n    case \"SecpBtcTest\":\n      return Secp256k1.BtcTest;\n    case \"SecpAvaAddr\":\n      return Secp256k1.Ava;\n    case \"SecpAvaTestAddr\":\n      return Secp256k1.AvaTest;\n    case \"BlsPub\":\n      return Bls.Eth2Deposited;\n    case \"BlsInactive\":\n      return Bls.Eth2Inactive;\n    case \"Ed25519SolanaAddr\":\n      return Ed25519.Solana;\n    case \"Ed25519SuiAddr\":\n      return Ed25519.Sui;\n    case \"Ed25519AptosAddr\":\n      return Ed25519.Aptos;\n    case \"Ed25519CardanoAddrVk\":\n      return Ed25519.Cardano;\n    case \"Ed25519StellarAddr\":\n      return Ed25519.Stellar;\n    case \"Stark\":\n      return Stark;\n    case \"Mnemonic\":\n      return Mnemonic;\n  }\n}\n"]}
|
|
@@ -0,0 +1,94 @@
|
|
|
1
|
+
import { ApiAddFidoChallenge, ApiMfaFidoChallenge, MfaRequestInfo, TotpInfo } from "./schema_types";
|
|
2
|
+
import { CubeSignerApi } from "./api";
|
|
3
|
+
/** MFA receipt */
|
|
4
|
+
export interface MfaReceipt {
|
|
5
|
+
/** MFA request ID */
|
|
6
|
+
mfaId: string;
|
|
7
|
+
/** Corresponding org ID */
|
|
8
|
+
mfaOrgId: string;
|
|
9
|
+
/** MFA confirmation code */
|
|
10
|
+
mfaConf: string;
|
|
11
|
+
}
|
|
12
|
+
/** TOTP challenge that must be answered before user's TOTP is updated */
|
|
13
|
+
export declare class TotpChallenge {
|
|
14
|
+
#private;
|
|
15
|
+
/** The id of the challenge */
|
|
16
|
+
get totpId(): string;
|
|
17
|
+
/** The new TOTP configuration */
|
|
18
|
+
get totpUrl(): string;
|
|
19
|
+
/**
|
|
20
|
+
* @param {CubeSignerApi} api Used when answering the challenge.
|
|
21
|
+
* @param {TotpInfo} totpInfo TOTP challenge information.
|
|
22
|
+
*/
|
|
23
|
+
constructor(api: CubeSignerApi, totpInfo: TotpInfo);
|
|
24
|
+
/**
|
|
25
|
+
* Answer the challenge with the code that corresponds to `this.totpUrl`.
|
|
26
|
+
* @param {string} code 6-digit code that corresponds to `this.totpUrl`.
|
|
27
|
+
*/
|
|
28
|
+
answer(code: string): Promise<void>;
|
|
29
|
+
}
|
|
30
|
+
/**
|
|
31
|
+
* Returned after creating a request to add a new FIDO device.
|
|
32
|
+
* Provides some helper methods for answering this challenge.
|
|
33
|
+
*/
|
|
34
|
+
export declare class AddFidoChallenge {
|
|
35
|
+
#private;
|
|
36
|
+
readonly challengeId: string;
|
|
37
|
+
readonly options: any;
|
|
38
|
+
/**
|
|
39
|
+
* Constructor
|
|
40
|
+
* @param {CubeSignerApi} api The API client used to request to add a FIDO device
|
|
41
|
+
* @param {ApiAddFidoChallenge} challenge The challenge returned by the remote end.
|
|
42
|
+
*/
|
|
43
|
+
constructor(api: CubeSignerApi, challenge: ApiAddFidoChallenge);
|
|
44
|
+
/**
|
|
45
|
+
* Answers this challenge by using the `CredentialsContainer` API to create a credential
|
|
46
|
+
* based on the the public key credential creation options from this challenge.
|
|
47
|
+
*/
|
|
48
|
+
createCredentialAndAnswer(): Promise<void>;
|
|
49
|
+
/**
|
|
50
|
+
* Answers this challenge using a given credential `cred`;
|
|
51
|
+
* the credential should be obtained by calling
|
|
52
|
+
*
|
|
53
|
+
* ```
|
|
54
|
+
* const cred = await navigator.credentials.create({ publicKey: this.options });
|
|
55
|
+
* ```
|
|
56
|
+
*
|
|
57
|
+
* @param {any} cred Credential created by calling the `CredentialContainer`'s `create` method
|
|
58
|
+
* based on the public key creation options from this challenge.
|
|
59
|
+
*/
|
|
60
|
+
answer(cred: any): Promise<void>;
|
|
61
|
+
}
|
|
62
|
+
/**
|
|
63
|
+
* Returned after initiating MFA approval using FIDO.
|
|
64
|
+
* Provides some helper methods for answering this challenge.
|
|
65
|
+
*/
|
|
66
|
+
export declare class MfaFidoChallenge {
|
|
67
|
+
#private;
|
|
68
|
+
readonly mfaId: string;
|
|
69
|
+
readonly challengeId: string;
|
|
70
|
+
readonly options: any;
|
|
71
|
+
/**
|
|
72
|
+
* @param {CubeSignerApi} api The API client used to initiate MFA approval using FIDO
|
|
73
|
+
* @param {string} mfaId The MFA request id.
|
|
74
|
+
* @param {ApiMfaFidoChallenge} challenge The challenge returned by the remote end
|
|
75
|
+
*/
|
|
76
|
+
constructor(api: CubeSignerApi, mfaId: string, challenge: ApiMfaFidoChallenge);
|
|
77
|
+
/**
|
|
78
|
+
* Answers this challenge by using the `CredentialsContainer` API to get a credential
|
|
79
|
+
* based on the the public key credential request options from this challenge.
|
|
80
|
+
*/
|
|
81
|
+
createCredentialAndAnswer(): Promise<MfaRequestInfo>;
|
|
82
|
+
/**
|
|
83
|
+
* Answers this challenge using a given credential `cred`.
|
|
84
|
+
* To obtain this credential, for example, call
|
|
85
|
+
*
|
|
86
|
+
* ```
|
|
87
|
+
* const cred = await navigator.credentials.get({ publicKey: this.options });
|
|
88
|
+
* ```
|
|
89
|
+
*
|
|
90
|
+
* @param {any} cred Credential created by calling the `CredentialContainer`'s `get` method
|
|
91
|
+
* based on the public key credential request options from this challenge.
|
|
92
|
+
*/
|
|
93
|
+
answer(cred: any): Promise<MfaRequestInfo>;
|
|
94
|
+
}
|
package/dist/src/mfa.js
ADDED
|
@@ -0,0 +1,169 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/* eslint-disable @typescript-eslint/no-explicit-any */
|
|
3
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
4
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
5
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
6
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
7
|
+
};
|
|
8
|
+
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
9
|
+
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
10
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
11
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
12
|
+
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
13
|
+
};
|
|
14
|
+
var _TotpChallenge_api, _TotpChallenge_totpInfo, _AddFidoChallenge_api, _MfaFidoChallenge_api;
|
|
15
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
|
+
exports.MfaFidoChallenge = exports.AddFidoChallenge = exports.TotpChallenge = void 0;
|
|
17
|
+
const util_1 = require("./util");
|
|
18
|
+
/** TOTP challenge that must be answered before user's TOTP is updated */
|
|
19
|
+
class TotpChallenge {
|
|
20
|
+
/** The id of the challenge */
|
|
21
|
+
get totpId() {
|
|
22
|
+
return __classPrivateFieldGet(this, _TotpChallenge_totpInfo, "f").totp_id;
|
|
23
|
+
}
|
|
24
|
+
/** The new TOTP configuration */
|
|
25
|
+
get totpUrl() {
|
|
26
|
+
return __classPrivateFieldGet(this, _TotpChallenge_totpInfo, "f").totp_url;
|
|
27
|
+
}
|
|
28
|
+
/**
|
|
29
|
+
* @param {CubeSignerApi} api Used when answering the challenge.
|
|
30
|
+
* @param {TotpInfo} totpInfo TOTP challenge information.
|
|
31
|
+
*/
|
|
32
|
+
constructor(api, totpInfo) {
|
|
33
|
+
_TotpChallenge_api.set(this, void 0);
|
|
34
|
+
_TotpChallenge_totpInfo.set(this, void 0);
|
|
35
|
+
__classPrivateFieldSet(this, _TotpChallenge_api, api, "f");
|
|
36
|
+
__classPrivateFieldSet(this, _TotpChallenge_totpInfo, totpInfo, "f");
|
|
37
|
+
}
|
|
38
|
+
/**
|
|
39
|
+
* Answer the challenge with the code that corresponds to `this.totpUrl`.
|
|
40
|
+
* @param {string} code 6-digit code that corresponds to `this.totpUrl`.
|
|
41
|
+
*/
|
|
42
|
+
async answer(code) {
|
|
43
|
+
if (!/^\d{1,6}$/.test(code)) {
|
|
44
|
+
throw new Error(`Invalid TOTP code: ${code}; it must be a 6-digit string`);
|
|
45
|
+
}
|
|
46
|
+
await __classPrivateFieldGet(this, _TotpChallenge_api, "f").userTotpResetComplete(this.totpId, code);
|
|
47
|
+
}
|
|
48
|
+
}
|
|
49
|
+
exports.TotpChallenge = TotpChallenge;
|
|
50
|
+
_TotpChallenge_api = new WeakMap(), _TotpChallenge_totpInfo = new WeakMap();
|
|
51
|
+
/**
|
|
52
|
+
* Returned after creating a request to add a new FIDO device.
|
|
53
|
+
* Provides some helper methods for answering this challenge.
|
|
54
|
+
*/
|
|
55
|
+
class AddFidoChallenge {
|
|
56
|
+
/**
|
|
57
|
+
* Constructor
|
|
58
|
+
* @param {CubeSignerApi} api The API client used to request to add a FIDO device
|
|
59
|
+
* @param {ApiAddFidoChallenge} challenge The challenge returned by the remote end.
|
|
60
|
+
*/
|
|
61
|
+
constructor(api, challenge) {
|
|
62
|
+
_AddFidoChallenge_api.set(this, void 0);
|
|
63
|
+
__classPrivateFieldSet(this, _AddFidoChallenge_api, api, "f");
|
|
64
|
+
this.challengeId = challenge.challenge_id;
|
|
65
|
+
// fix options returned from the server: rename fields and decode base64 fields to uint8[]
|
|
66
|
+
this.options = {
|
|
67
|
+
...challenge.options,
|
|
68
|
+
challenge: (0, util_1.decodeBase64Url)(challenge.options.challenge),
|
|
69
|
+
};
|
|
70
|
+
if (challenge.options.user) {
|
|
71
|
+
this.options.user.id = (0, util_1.decodeBase64Url)(challenge.options.user.id);
|
|
72
|
+
}
|
|
73
|
+
for (const credential of this.options.excludeCredentials ?? []) {
|
|
74
|
+
credential.id = (0, util_1.decodeBase64Url)(credential.id);
|
|
75
|
+
}
|
|
76
|
+
}
|
|
77
|
+
/**
|
|
78
|
+
* Answers this challenge by using the `CredentialsContainer` API to create a credential
|
|
79
|
+
* based on the the public key credential creation options from this challenge.
|
|
80
|
+
*/
|
|
81
|
+
async createCredentialAndAnswer() {
|
|
82
|
+
const cred = await navigator.credentials.create({ publicKey: this.options });
|
|
83
|
+
await this.answer(cred);
|
|
84
|
+
}
|
|
85
|
+
/**
|
|
86
|
+
* Answers this challenge using a given credential `cred`;
|
|
87
|
+
* the credential should be obtained by calling
|
|
88
|
+
*
|
|
89
|
+
* ```
|
|
90
|
+
* const cred = await navigator.credentials.create({ publicKey: this.options });
|
|
91
|
+
* ```
|
|
92
|
+
*
|
|
93
|
+
* @param {any} cred Credential created by calling the `CredentialContainer`'s `create` method
|
|
94
|
+
* based on the public key creation options from this challenge.
|
|
95
|
+
*/
|
|
96
|
+
async answer(cred) {
|
|
97
|
+
const answer = {
|
|
98
|
+
id: cred.id,
|
|
99
|
+
response: {
|
|
100
|
+
clientDataJSON: (0, util_1.encodeToBase64Url)(cred.response.clientDataJSON),
|
|
101
|
+
attestationObject: (0, util_1.encodeToBase64Url)(cred.response.attestationObject),
|
|
102
|
+
},
|
|
103
|
+
};
|
|
104
|
+
await __classPrivateFieldGet(this, _AddFidoChallenge_api, "f").userFidoRegisterComplete(this.challengeId, answer);
|
|
105
|
+
}
|
|
106
|
+
}
|
|
107
|
+
exports.AddFidoChallenge = AddFidoChallenge;
|
|
108
|
+
_AddFidoChallenge_api = new WeakMap();
|
|
109
|
+
/**
|
|
110
|
+
* Returned after initiating MFA approval using FIDO.
|
|
111
|
+
* Provides some helper methods for answering this challenge.
|
|
112
|
+
*/
|
|
113
|
+
class MfaFidoChallenge {
|
|
114
|
+
/**
|
|
115
|
+
* @param {CubeSignerApi} api The API client used to initiate MFA approval using FIDO
|
|
116
|
+
* @param {string} mfaId The MFA request id.
|
|
117
|
+
* @param {ApiMfaFidoChallenge} challenge The challenge returned by the remote end
|
|
118
|
+
*/
|
|
119
|
+
constructor(api, mfaId, challenge) {
|
|
120
|
+
_MfaFidoChallenge_api.set(this, void 0);
|
|
121
|
+
__classPrivateFieldSet(this, _MfaFidoChallenge_api, api, "f");
|
|
122
|
+
this.mfaId = mfaId;
|
|
123
|
+
this.challengeId = challenge.challenge_id;
|
|
124
|
+
// fix options returned from the server: rename fields and decode base64 fields into uint8[]
|
|
125
|
+
this.options = {
|
|
126
|
+
...challenge.options,
|
|
127
|
+
challenge: (0, util_1.decodeBase64Url)(challenge.options.challenge),
|
|
128
|
+
};
|
|
129
|
+
for (const credential of this.options.allowCredentials ?? []) {
|
|
130
|
+
credential.id = (0, util_1.decodeBase64Url)(credential.id);
|
|
131
|
+
if (credential.transports === null) {
|
|
132
|
+
delete credential.transports;
|
|
133
|
+
}
|
|
134
|
+
}
|
|
135
|
+
}
|
|
136
|
+
/**
|
|
137
|
+
* Answers this challenge by using the `CredentialsContainer` API to get a credential
|
|
138
|
+
* based on the the public key credential request options from this challenge.
|
|
139
|
+
*/
|
|
140
|
+
async createCredentialAndAnswer() {
|
|
141
|
+
const cred = await navigator.credentials.get({ publicKey: this.options });
|
|
142
|
+
return await this.answer(cred);
|
|
143
|
+
}
|
|
144
|
+
/**
|
|
145
|
+
* Answers this challenge using a given credential `cred`.
|
|
146
|
+
* To obtain this credential, for example, call
|
|
147
|
+
*
|
|
148
|
+
* ```
|
|
149
|
+
* const cred = await navigator.credentials.get({ publicKey: this.options });
|
|
150
|
+
* ```
|
|
151
|
+
*
|
|
152
|
+
* @param {any} cred Credential created by calling the `CredentialContainer`'s `get` method
|
|
153
|
+
* based on the public key credential request options from this challenge.
|
|
154
|
+
*/
|
|
155
|
+
async answer(cred) {
|
|
156
|
+
const answer = {
|
|
157
|
+
id: cred.id,
|
|
158
|
+
response: {
|
|
159
|
+
clientDataJSON: (0, util_1.encodeToBase64Url)(cred.response.clientDataJSON),
|
|
160
|
+
authenticatorData: (0, util_1.encodeToBase64Url)(cred.response.authenticatorData),
|
|
161
|
+
signature: (0, util_1.encodeToBase64Url)(cred.response.signature),
|
|
162
|
+
},
|
|
163
|
+
};
|
|
164
|
+
return await __classPrivateFieldGet(this, _MfaFidoChallenge_api, "f").mfaApproveFidoComplete(this.mfaId, this.challengeId, answer);
|
|
165
|
+
}
|
|
166
|
+
}
|
|
167
|
+
exports.MfaFidoChallenge = MfaFidoChallenge;
|
|
168
|
+
_MfaFidoChallenge_api = new WeakMap();
|
|
169
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"mfa.js","sourceRoot":"","sources":["../../src/mfa.ts"],"names":[],"mappings":";AAAA,uDAAuD;;;;;;;;;;;;;;;AASvD,iCAA4D;AAa5D,yEAAyE;AACzE,MAAa,aAAa;IAIxB,8BAA8B;IAC9B,IAAI,MAAM;QACR,OAAO,uBAAA,IAAI,+BAAU,CAAC,OAAO,CAAC;IAChC,CAAC;IAED,iCAAiC;IACjC,IAAI,OAAO;QACT,OAAO,uBAAA,IAAI,+BAAU,CAAC,QAAQ,CAAC;IACjC,CAAC;IAED;;;OAGG;IACH,YAAY,GAAkB,EAAE,QAAkB;QAjBzC,qCAAoB;QACpB,0CAAoB;QAiB3B,uBAAA,IAAI,sBAAQ,GAAG,MAAA,CAAC;QAChB,uBAAA,IAAI,2BAAa,QAAQ,MAAA,CAAC;IAC5B,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,MAAM,CAAC,IAAY;QACvB,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;YAC5B,MAAM,IAAI,KAAK,CAAC,sBAAsB,IAAI,+BAA+B,CAAC,CAAC;QAC7E,CAAC;QAED,MAAM,uBAAA,IAAI,0BAAK,CAAC,qBAAqB,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;IAC3D,CAAC;CACF;AAlCD,sCAkCC;;AAED;;;GAGG;AACH,MAAa,gBAAgB;IAK3B;;;;OAIG;IACH,YAAY,GAAkB,EAAE,SAA8B;QATrD,wCAAoB;QAU3B,uBAAA,IAAI,yBAAQ,GAAG,MAAA,CAAC;QAChB,IAAI,CAAC,WAAW,GAAG,SAAS,CAAC,YAAY,CAAC;QAE1C,0FAA0F;QAC1F,IAAI,CAAC,OAAO,GAAG;YACb,GAAG,SAAS,CAAC,OAAO;YACpB,SAAS,EAAE,IAAA,sBAAe,EAAC,SAAS,CAAC,OAAO,CAAC,SAAS,CAAC;SACxD,CAAC;QAEF,IAAI,SAAS,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC;YAC3B,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,GAAG,IAAA,sBAAe,EAAC,SAAS,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QACpE,CAAC;QAED,KAAK,MAAM,UAAU,IAAI,IAAI,CAAC,OAAO,CAAC,kBAAkB,IAAI,EAAE,EAAE,CAAC;YAC/D,UAAU,CAAC,EAAE,GAAG,IAAA,sBAAe,EAAC,UAAU,CAAC,EAAE,CAAC,CAAC;QACjD,CAAC;IACH,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,yBAAyB;QAC7B,MAAM,IAAI,GAAG,MAAM,SAAS,CAAC,WAAW,CAAC,MAAM,CAAC,EAAE,SAAS,EAAE,IAAI,CAAC,OAAO,EAAE,CAAC,CAAC;QAC7E,MAAM,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;IAC1B,CAAC;IAED;;;;;;;;;;OAUG;IACH,KAAK,CAAC,MAAM,CAAC,IAAS;QACpB,MAAM,MAAM,GAAwB;YAClC,EAAE,EAAE,IAAI,CAAC,EAAE;YACX,QAAQ,EAAE;gBACR,cAAc,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,cAAc,CAAC;gBAC/D,iBAAiB,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC;aACtE;SACF,CAAC;QACF,MAAM,uBAAA,IAAI,6BAAK,CAAC,wBAAwB,CAAC,IAAI,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;IACrE,CAAC;CACF;AA3DD,4CA2DC;;AAED;;;GAGG;AACH,MAAa,gBAAgB;IAM3B;;;;OAIG;IACH,YAAY,GAAkB,EAAE,KAAa,EAAE,SAA8B;QAVpE,wCAAoB;QAW3B,uBAAA,IAAI,yBAAQ,GAAG,MAAA,CAAC;QAChB,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;QACnB,IAAI,CAAC,WAAW,GAAG,SAAS,CAAC,YAAY,CAAC;QAE1C,4FAA4F;QAC5F,IAAI,CAAC,OAAO,GAAG;YACb,GAAG,SAAS,CAAC,OAAO;YACpB,SAAS,EAAE,IAAA,sBAAe,EAAC,SAAS,CAAC,OAAO,CAAC,SAAS,CAAC;SACxD,CAAC;QAEF,KAAK,MAAM,UAAU,IAAI,IAAI,CAAC,OAAO,CAAC,gBAAgB,IAAI,EAAE,EAAE,CAAC;YAC7D,UAAU,CAAC,EAAE,GAAG,IAAA,sBAAe,EAAC,UAAU,CAAC,EAAE,CAAC,CAAC;YAC/C,IAAI,UAAU,CAAC,UAAU,KAAK,IAAI,EAAE,CAAC;gBACnC,OAAO,UAAU,CAAC,UAAU,CAAC;YAC/B,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,yBAAyB;QAC7B,MAAM,IAAI,GAAG,MAAM,SAAS,CAAC,WAAW,CAAC,GAAG,CAAC,EAAE,SAAS,EAAE,IAAI,CAAC,OAAO,EAAE,CAAC,CAAC;QAC1E,OAAO,MAAM,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;IACjC,CAAC;IAED;;;;;;;;;;OAUG;IACH,KAAK,CAAC,MAAM,CAAC,IAAS;QACpB,MAAM,MAAM,GAAwB;YAClC,EAAE,EAAE,IAAI,CAAC,EAAE;YACX,QAAQ,EAAE;gBACR,cAAc,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,cAAc,CAAC;gBAC/D,iBAAiB,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC;gBACrE,SAAS,EAAE,IAAA,wBAAiB,EAAC,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC;aACtD;SACF,CAAC;QACF,OAAO,MAAM,uBAAA,IAAI,6BAAK,CAAC,sBAAsB,CAAC,IAAI,CAAC,KAAK,EAAE,IAAI,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;IACtF,CAAC;CACF;AA7DD,4CA6DC","sourcesContent":["/* eslint-disable @typescript-eslint/no-explicit-any */\n\nimport {\n  ApiAddFidoChallenge,\n  ApiMfaFidoChallenge,\n  MfaRequestInfo,\n  PublicKeyCredential,\n  TotpInfo,\n} from \"./schema_types\";\nimport { decodeBase64Url, encodeToBase64Url } from \"./util\";\nimport { CubeSignerApi } from \"./api\";\n\n/** MFA receipt */\nexport interface MfaReceipt {\n  /** MFA request ID */\n  mfaId: string;\n  /** Corresponding org ID */\n  mfaOrgId: string;\n  /** MFA confirmation code */\n  mfaConf: string;\n}\n\n/** TOTP challenge that must be answered before user's TOTP is updated */\nexport class TotpChallenge {\n  readonly #api: CubeSignerApi;\n  readonly #totpInfo: TotpInfo;\n\n  /** The id of the challenge */\n  get totpId() {\n    return this.#totpInfo.totp_id;\n  }\n\n  /** The new TOTP configuration */\n  get totpUrl() {\n    return this.#totpInfo.totp_url;\n  }\n\n  /**\n   * @param {CubeSignerApi} api Used when answering the challenge.\n   * @param {TotpInfo} totpInfo TOTP challenge information.\n   */\n  constructor(api: CubeSignerApi, totpInfo: TotpInfo) {\n    this.#api = api;\n    this.#totpInfo = totpInfo;\n  }\n\n  /**\n   * Answer the challenge with the code that corresponds to `this.totpUrl`.\n   * @param {string} code 6-digit code that corresponds to `this.totpUrl`.\n   */\n  async answer(code: string) {\n    if (!/^\\d{1,6}$/.test(code)) {\n      throw new Error(`Invalid TOTP code: ${code}; it must be a 6-digit string`);\n    }\n\n    await this.#api.userTotpResetComplete(this.totpId, code);\n  }\n}\n\n/**\n * Returned after creating a request to add a new FIDO device.\n * Provides some helper methods for answering this challenge.\n */\nexport class AddFidoChallenge {\n  readonly #api: CubeSignerApi;\n  readonly challengeId: string;\n  readonly options: any;\n\n  /**\n   * Constructor\n   * @param {CubeSignerApi} api The API client used to request to add a FIDO device\n   * @param {ApiAddFidoChallenge} challenge The challenge returned by the remote end.\n   */\n  constructor(api: CubeSignerApi, challenge: ApiAddFidoChallenge) {\n    this.#api = api;\n    this.challengeId = challenge.challenge_id;\n\n    // fix options returned from the server: rename fields and decode base64 fields to uint8[]\n    this.options = {\n      ...challenge.options,\n      challenge: decodeBase64Url(challenge.options.challenge),\n    };\n\n    if (challenge.options.user) {\n      this.options.user.id = decodeBase64Url(challenge.options.user.id);\n    }\n\n    for (const credential of this.options.excludeCredentials ?? []) {\n      credential.id = decodeBase64Url(credential.id);\n    }\n  }\n\n  /**\n   * Answers this challenge by using the `CredentialsContainer` API to create a credential\n   * based on the the public key credential creation options from this challenge.\n   */\n  async createCredentialAndAnswer() {\n    const cred = await navigator.credentials.create({ publicKey: this.options });\n    await this.answer(cred);\n  }\n\n  /**\n   * Answers this challenge using a given credential `cred`;\n   * the credential should be obtained by calling\n   *\n   * ```\n   * const cred = await navigator.credentials.create({ publicKey: this.options });\n   * ```\n   *\n   * @param {any} cred Credential created by calling the `CredentialContainer`'s `create` method\n   *                   based on the public key creation options from this challenge.\n   */\n  async answer(cred: any) {\n    const answer = <PublicKeyCredential>{\n      id: cred.id,\n      response: {\n        clientDataJSON: encodeToBase64Url(cred.response.clientDataJSON),\n        attestationObject: encodeToBase64Url(cred.response.attestationObject),\n      },\n    };\n    await this.#api.userFidoRegisterComplete(this.challengeId, answer);\n  }\n}\n\n/**\n * Returned after initiating MFA approval using FIDO.\n * Provides some helper methods for answering this challenge.\n */\nexport class MfaFidoChallenge {\n  readonly #api: CubeSignerApi;\n  readonly mfaId: string;\n  readonly challengeId: string;\n  readonly options: any;\n\n  /**\n   * @param {CubeSignerApi} api The API client used to initiate MFA approval using FIDO\n   * @param {string} mfaId The MFA request id.\n   * @param {ApiMfaFidoChallenge} challenge The challenge returned by the remote end\n   */\n  constructor(api: CubeSignerApi, mfaId: string, challenge: ApiMfaFidoChallenge) {\n    this.#api = api;\n    this.mfaId = mfaId;\n    this.challengeId = challenge.challenge_id;\n\n    // fix options returned from the server: rename fields and decode base64 fields into uint8[]\n    this.options = {\n      ...challenge.options,\n      challenge: decodeBase64Url(challenge.options.challenge),\n    };\n\n    for (const credential of this.options.allowCredentials ?? []) {\n      credential.id = decodeBase64Url(credential.id);\n      if (credential.transports === null) {\n        delete credential.transports;\n      }\n    }\n  }\n\n  /**\n   * Answers this challenge by using the `CredentialsContainer` API to get a credential\n   * based on the the public key credential request options from this challenge.\n   */\n  async createCredentialAndAnswer(): Promise<MfaRequestInfo> {\n    const cred = await navigator.credentials.get({ publicKey: this.options });\n    return await this.answer(cred);\n  }\n\n  /**\n   * Answers this challenge using a given credential `cred`.\n   * To obtain this credential, for example, call\n   *\n   * ```\n   * const cred = await navigator.credentials.get({ publicKey: this.options });\n   * ```\n   *\n   * @param {any} cred Credential created by calling the `CredentialContainer`'s `get` method\n   *                   based on the public key credential request options from this challenge.\n   */\n  async answer(cred: any): Promise<MfaRequestInfo> {\n    const answer = <PublicKeyCredential>{\n      id: cred.id,\n      response: {\n        clientDataJSON: encodeToBase64Url(cred.response.clientDataJSON),\n        authenticatorData: encodeToBase64Url(cred.response.authenticatorData),\n        signature: encodeToBase64Url(cred.response.signature),\n      },\n    };\n    return await this.#api.mfaApproveFidoComplete(this.mfaId, this.challengeId, answer);\n  }\n}\n"]}
|
|
@@ -0,0 +1,99 @@
|
|
|
1
|
+
import { CubeSignerClient } from "./client";
|
|
2
|
+
import { OrgInfo, SignerSessionManager, SignerSessionStorage } from ".";
|
|
3
|
+
/** Organization id */
|
|
4
|
+
export type OrgId = string;
|
|
5
|
+
/** Org-wide policy */
|
|
6
|
+
export type OrgPolicy = SourceIpAllowlistPolicy | OidcAuthSourcesPolicy | OriginAllowlistPolicy | MaxDailyUnstakePolicy;
|
|
7
|
+
/**
|
|
8
|
+
* Provides an allowlist of OIDC Issuers and audiences that are allowed to authenticate into this org.
|
|
9
|
+
* @example {"OidcAuthSources": { "https://accounts.google.com": [ "1234.apps.googleusercontent.com" ]}}
|
|
10
|
+
*/
|
|
11
|
+
export interface OidcAuthSourcesPolicy {
|
|
12
|
+
OidcAuthSources: Record<string, string[]>;
|
|
13
|
+
}
|
|
14
|
+
/**
|
|
15
|
+
* Only allow requests from the specified origins.
|
|
16
|
+
* @example {"OriginAllowlist": "*"}
|
|
17
|
+
*/
|
|
18
|
+
export interface OriginAllowlistPolicy {
|
|
19
|
+
OriginAllowlist: string[] | "*";
|
|
20
|
+
}
|
|
21
|
+
/**
|
|
22
|
+
* Restrict signing to specific source IP addresses.
|
|
23
|
+
* @example {"SourceIpAllowlist": ["10.1.2.3/8", "169.254.17.1/16"]}
|
|
24
|
+
*/
|
|
25
|
+
export interface SourceIpAllowlistPolicy {
|
|
26
|
+
SourceIpAllowlist: string[];
|
|
27
|
+
}
|
|
28
|
+
/**
|
|
29
|
+
* Restrict the number of unstakes per day.
|
|
30
|
+
* @example {"MaxDailyUnstake": 5 }
|
|
31
|
+
*/
|
|
32
|
+
export interface MaxDailyUnstakePolicy {
|
|
33
|
+
MaxDailyUnstake: number;
|
|
34
|
+
}
|
|
35
|
+
/**
|
|
36
|
+
* An organization.
|
|
37
|
+
*
|
|
38
|
+
* Extends {@link CubeSignerClient} and provides a few org-specific methods on top.
|
|
39
|
+
*/
|
|
40
|
+
export declare class Org extends CubeSignerClient {
|
|
41
|
+
/**
|
|
42
|
+
* @description The org id
|
|
43
|
+
* @example Org#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
|
|
44
|
+
*/
|
|
45
|
+
get id(): OrgId;
|
|
46
|
+
/**
|
|
47
|
+
* Obtain information about the current organization.
|
|
48
|
+
*
|
|
49
|
+
* Same as {@link orgGet}.
|
|
50
|
+
*/
|
|
51
|
+
get info(): () => Promise<{
|
|
52
|
+
enabled: boolean;
|
|
53
|
+
key_import_key?: string | null | undefined;
|
|
54
|
+
kwk_id: string;
|
|
55
|
+
last_unstake: string;
|
|
56
|
+
last_unstake_day_count: number;
|
|
57
|
+
name?: string | null | undefined;
|
|
58
|
+
org_id: string;
|
|
59
|
+
policy?: Record<string, never>[] | undefined;
|
|
60
|
+
totp_failure_limit: number;
|
|
61
|
+
user_export_delay: number;
|
|
62
|
+
user_export_window: number;
|
|
63
|
+
}>;
|
|
64
|
+
/** Human-readable name for the org */
|
|
65
|
+
name(): Promise<string | undefined>;
|
|
66
|
+
/** Get all keys in the org. */
|
|
67
|
+
get keys(): (type?: import("./key").KeyType | undefined, page?: import("./paginator").PageOpts | undefined) => Promise<import("./key").Key[]>;
|
|
68
|
+
/**
|
|
69
|
+
* Set the human-readable name for the org.
|
|
70
|
+
* @param {string} name The new human-readable name for the org (must be alphanumeric).
|
|
71
|
+
* @example my_org_name
|
|
72
|
+
*/
|
|
73
|
+
setName(name: string): Promise<void>;
|
|
74
|
+
/** Is the org enabled? */
|
|
75
|
+
enabled(): Promise<boolean>;
|
|
76
|
+
/** Enable the org. */
|
|
77
|
+
enable(): Promise<void>;
|
|
78
|
+
/** Disable the org. */
|
|
79
|
+
disable(): Promise<void>;
|
|
80
|
+
/** Get the policy for the org. */
|
|
81
|
+
policy(): Promise<OrgPolicy[]>;
|
|
82
|
+
/**
|
|
83
|
+
* Set the policy for the org.
|
|
84
|
+
* @param {OrgPolicy[]} policy The new policy for the org.
|
|
85
|
+
*/
|
|
86
|
+
setPolicy(policy: OrgPolicy[]): Promise<void>;
|
|
87
|
+
/**
|
|
88
|
+
* Retrieve the org associated with a session.
|
|
89
|
+
* @param {SessionStorage} storage The session
|
|
90
|
+
* @return {Org} An {@link Org} instance for the org associated with this session.
|
|
91
|
+
*/
|
|
92
|
+
static retrieveFromStorage(storage: SignerSessionStorage): Promise<Org>;
|
|
93
|
+
/**
|
|
94
|
+
* Constructor.
|
|
95
|
+
* @param {CubeSignerClient | SignerSessionManager} csc The CubeSigner instance.
|
|
96
|
+
* @param {OrgInfo| string} data Either org id or name or {@link OrgInfo}.
|
|
97
|
+
*/
|
|
98
|
+
constructor(csc: CubeSignerClient | SignerSessionManager, data?: OrgInfo | string);
|
|
99
|
+
}
|