@cubist-labs/cubesigner-sdk 0.3.26 → 0.3.28

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (69) hide show
  1. package/dist/cjs/package.json +1 -1
  2. package/dist/cjs/src/client.d.ts +4 -4
  3. package/dist/cjs/src/index.js +7 -4
  4. package/dist/cjs/src/key.d.ts +35 -2
  5. package/dist/cjs/src/key.js +79 -5
  6. package/dist/cjs/src/org_event_processor.d.ts +57 -0
  7. package/dist/cjs/src/org_event_processor.js +137 -0
  8. package/dist/cjs/src/schema.d.ts +41 -24
  9. package/dist/cjs/src/schema.js +1 -1
  10. package/dist/cjs/src/util.d.ts +2 -0
  11. package/dist/cjs/src/util.js +1 -1
  12. package/dist/esm/package.json +1 -1
  13. package/dist/esm/src/client.d.ts +4 -4
  14. package/dist/esm/src/index.js +4 -4
  15. package/dist/esm/src/key.d.ts +35 -2
  16. package/dist/esm/src/key.js +79 -5
  17. package/dist/esm/src/org_event_processor.d.ts +57 -0
  18. package/dist/esm/src/org_event_processor.js +133 -0
  19. package/dist/esm/src/schema.d.ts +41 -24
  20. package/dist/esm/src/schema.js +1 -1
  21. package/dist/esm/src/util.d.ts +2 -0
  22. package/dist/esm/src/util.js +1 -1
  23. package/dist/package.json +36 -0
  24. package/dist/spec/env/beta.json +9 -0
  25. package/dist/spec/env/gamma.json +9 -0
  26. package/dist/spec/env/prod.json +9 -0
  27. package/dist/src/api.d.ts +634 -0
  28. package/dist/src/api.js +1309 -0
  29. package/dist/src/client.d.ts +575 -0
  30. package/dist/src/client.js +381 -0
  31. package/dist/src/env.d.ts +15 -0
  32. package/dist/src/env.js +35 -0
  33. package/dist/src/error.d.ts +29 -0
  34. package/dist/src/error.js +36 -0
  35. package/dist/src/events.d.ts +84 -0
  36. package/dist/src/events.js +195 -0
  37. package/dist/src/index.d.ts +207 -0
  38. package/dist/src/index.js +308 -0
  39. package/dist/src/key.d.ts +152 -0
  40. package/dist/src/key.js +242 -0
  41. package/dist/src/mfa.d.ts +94 -0
  42. package/dist/src/mfa.js +169 -0
  43. package/dist/src/org.d.ts +99 -0
  44. package/dist/src/org.js +95 -0
  45. package/dist/src/paginator.d.ts +76 -0
  46. package/dist/src/paginator.js +99 -0
  47. package/dist/src/response.d.ts +101 -0
  48. package/dist/src/response.js +164 -0
  49. package/dist/src/role.d.ts +283 -0
  50. package/dist/src/role.js +253 -0
  51. package/dist/src/schema.d.ts +6209 -0
  52. package/dist/src/schema.js +7 -0
  53. package/dist/src/schema_types.d.ts +113 -0
  54. package/dist/src/schema_types.js +3 -0
  55. package/dist/src/session/session_storage.d.ts +47 -0
  56. package/dist/src/session/session_storage.js +76 -0
  57. package/dist/src/session/signer_session_manager.d.ts +125 -0
  58. package/dist/src/session/signer_session_manager.js +239 -0
  59. package/dist/src/signer_session.d.ts +41 -0
  60. package/dist/src/signer_session.js +77 -0
  61. package/dist/src/user_export.d.ts +52 -0
  62. package/dist/src/user_export.js +129 -0
  63. package/dist/src/util.d.ts +61 -0
  64. package/dist/src/util.js +97 -0
  65. package/package.json +1 -1
  66. package/src/index.ts +3 -3
  67. package/src/key.ts +83 -4
  68. package/src/schema.ts +42 -25
  69. package/src/util.ts +3 -0
@@ -0,0 +1,137 @@
1
+ "use strict";
2
+ var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
3
+ if (kind === "m") throw new TypeError("Private method is not writable");
4
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
5
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
6
+ return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
7
+ };
8
+ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
9
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
10
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
11
+ return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
12
+ };
13
+ var _OrgEventProcessor_instances, _OrgEventProcessor_topicArn, _OrgEventProcessor_orgId, _OrgEventProcessor_cachedCertificates, _OrgEventProcessor_fetchAndValidateCertificate;
14
+ Object.defineProperty(exports, "__esModule", { value: true });
15
+ exports.OrgEventProcessor = void 0;
16
+ const crypto_1 = require("crypto");
17
+ const _1 = require(".");
18
+ // URLs that are safe to retrieve certificates from
19
+ const SNS_CERTIFICATE_URL_HOSTS = ["sns.us-east-1.amazonaws.com"];
20
+ const SNS_CERTIFICATE_HOST = "sns.amazonaws.com";
21
+ /** A utility for processing org event messages */
22
+ class OrgEventProcessor {
23
+ /**
24
+ * Constructor.
25
+ * @param {string} orgId The org id
26
+ * @param {OrgEventProcessorOptions} options Additional options for the processor
27
+ */
28
+ constructor(orgId, options) {
29
+ _OrgEventProcessor_instances.add(this);
30
+ _OrgEventProcessor_topicArn.set(this, void 0);
31
+ _OrgEventProcessor_orgId.set(this, void 0);
32
+ _OrgEventProcessor_cachedCertificates.set(this, void 0);
33
+ __classPrivateFieldSet(this, _OrgEventProcessor_topicArn, _1.envs[options?.env ?? "prod"].OrgEventsTopicArn, "f");
34
+ __classPrivateFieldSet(this, _OrgEventProcessor_orgId, orgId, "f");
35
+ __classPrivateFieldSet(this, _OrgEventProcessor_cachedCertificates, new Map(), "f");
36
+ }
37
+ /**
38
+ * Checks an SNS message and its signature. Throws an error if the message
39
+ * invalid or the signature is invalid.
40
+ *
41
+ * @param {SnsMessage} message The SNS message to check
42
+ */
43
+ async checkMessage(message) {
44
+ // Check the topic ARN
45
+ if (message.TopicArn !== __classPrivateFieldGet(this, _OrgEventProcessor_topicArn, "f")) {
46
+ throw new Error(`Expected topic ARN '${__classPrivateFieldGet(this, _OrgEventProcessor_topicArn, "f")}', found '${message.TopicArn}'`);
47
+ }
48
+ // Both subscription confirmations and org event messages should have no subject
49
+ if ("Subject" in message) {
50
+ throw new Error("Expected a message without a subject");
51
+ }
52
+ // The org events topic uses signature version 2 (SHA256)
53
+ if (message.SignatureVersion !== "2") {
54
+ throw new Error("Expected signature version 2");
55
+ }
56
+ // Retrieve the certificate and sanity check it
57
+ const certificate = await __classPrivateFieldGet(this, _OrgEventProcessor_instances, "m", _OrgEventProcessor_fetchAndValidateCertificate).call(this, new URL(message.SigningCertURL));
58
+ // Extract fields specific to subscription confirmations
59
+ const subscribeUrl = message.SubscribeURL;
60
+ const token = message.Token;
61
+ // Check the signature
62
+ const fields = ["Message", message.Message, "MessageId", message.MessageId]
63
+ .concat(subscribeUrl !== undefined ? ["SubscribeURL", subscribeUrl] : [])
64
+ .concat(["Timestamp", message.Timestamp])
65
+ .concat(token !== undefined ? ["Token", token] : [])
66
+ .concat(["TopicArn", message.TopicArn, "Type", message.Type]);
67
+ const verify = (0, crypto_1.createVerify)("RSA-SHA256");
68
+ verify.update(fields.join("\n") + "\n");
69
+ const isValid = verify.verify(certificate.publicKey, message.Signature, "base64");
70
+ if (!isValid) {
71
+ throw new Error("The org event has an invalid signature");
72
+ }
73
+ }
74
+ /**
75
+ * Parse an org event and check its signature. Throws an error if the
76
+ * message is not a valid org event or the signature is invalid.
77
+ *
78
+ * @param {OrgEventMessage} message The org event message to check
79
+ * @return {OrgEventBase} The org event
80
+ */
81
+ async parse(message) {
82
+ await this.checkMessage(message);
83
+ // Check that the event is for the expected org
84
+ const orgEvent = JSON.parse(message.Message);
85
+ if (orgEvent.org !== __classPrivateFieldGet(this, _OrgEventProcessor_orgId, "f")) {
86
+ throw new Error(`Expected org to be '${__classPrivateFieldGet(this, _OrgEventProcessor_orgId, "f")}', found '${orgEvent.org}'`);
87
+ }
88
+ return orgEvent;
89
+ }
90
+ }
91
+ exports.OrgEventProcessor = OrgEventProcessor;
92
+ _OrgEventProcessor_topicArn = new WeakMap(), _OrgEventProcessor_orgId = new WeakMap(), _OrgEventProcessor_cachedCertificates = new WeakMap(), _OrgEventProcessor_instances = new WeakSet(), _OrgEventProcessor_fetchAndValidateCertificate =
93
+ /**
94
+ * Fetches a certificate from a given URL or from the certificate cache.
95
+ * Throws an error if the URL does not correspond to an SNS certificate URL.
96
+ *
97
+ * Note: Ideally, this method would verify the certificate chain, but there
98
+ * is no obvious chain. Instead, this method only fetches certificates from
99
+ * a small set of allowlisted URLs.
100
+ *
101
+ * @param {URL} url The URL of the certificate
102
+ * @return {X509Certificate} The certificate
103
+ */
104
+ async function _OrgEventProcessor_fetchAndValidateCertificate(url) {
105
+ const currTime = new Date().getTime();
106
+ const cachedCertificate = __classPrivateFieldGet(this, _OrgEventProcessor_cachedCertificates, "f").get(url);
107
+ if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {
108
+ return cachedCertificate;
109
+ }
110
+ // Only fetch certificates from HTTPS URLs
111
+ if (url.protocol !== "https:") {
112
+ throw new Error("Expected signing certificate URL to use HTTPS");
113
+ }
114
+ // Only fetch certificate URLs for SNS
115
+ if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {
116
+ throw new Error("Expected signing certificate URL for SNS in us-east-1");
117
+ }
118
+ const response = await fetch(url);
119
+ if (!response.ok) {
120
+ throw new Error(`Unable to download certificate. Status: ${response.status}`);
121
+ }
122
+ const blob = await response.blob();
123
+ const certificate = new crypto_1.X509Certificate(await blob.text());
124
+ if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {
125
+ throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);
126
+ }
127
+ // Check validity times
128
+ if (currTime < new Date(certificate.validFrom).getTime()) {
129
+ throw new Error("Certificate not valid yet");
130
+ }
131
+ if (new Date(certificate.validTo).getTime() < currTime) {
132
+ throw new Error("Certificate expired");
133
+ }
134
+ __classPrivateFieldGet(this, _OrgEventProcessor_cachedCertificates, "f").set(url, certificate);
135
+ return certificate;
136
+ };
137
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"org_event_processor.js","sourceRoot":"","sources":["../../../src/org_event_processor.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAAuD;AACvD,wBAAsC;AAEtC,mDAAmD;AACnD,MAAM,yBAAyB,GAAG,CAAC,6BAA6B,CAAC,CAAC;AAElE,MAAM,oBAAoB,GAAG,mBAAmB,CAAC;AAsCjD,kDAAkD;AAClD,MAAa,iBAAiB;IAK5B;;;;OAIG;IACH,YAAY,KAAa,EAAE,OAAkC;;QATpD,8CAAkB;QAClB,2CAAe;QACxB,wDAA+C;QAQ7C,uBAAA,IAAI,+BAAa,OAAI,CAAC,OAAO,EAAE,GAAG,IAAI,MAAM,CAAC,CAAC,iBAAiB,MAAA,CAAC;QAChE,uBAAA,IAAI,4BAAU,KAAK,MAAA,CAAC;QACpB,uBAAA,IAAI,yCAAuB,IAAI,GAAG,EAAE,MAAA,CAAC;IACvC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,YAAY,CAAC,OAAmB;QACpC,sBAAsB;QACtB,IAAI,OAAO,CAAC,QAAQ,KAAK,uBAAA,IAAI,mCAAU,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CAAC,uBAAuB,uBAAA,IAAI,mCAAU,aAAa,OAAO,CAAC,QAAQ,GAAG,CAAC,CAAC;QACzF,CAAC;QAED,gFAAgF;QAChF,IAAI,SAAS,IAAI,OAAO,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;QAC1D,CAAC;QAED,yDAAyD;QACzD,IAAI,OAAO,CAAC,gBAAgB,KAAK,GAAG,EAAE,CAAC;YACrC,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QAED,+CAA+C;QAC/C,MAAM,WAAW,GAAG,MAAM,uBAAA,IAAI,oFAA6B,MAAjC,IAAI,EAA8B,IAAI,GAAG,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC;QAE7F,wDAAwD;QACxD,MAAM,YAAY,GAAI,OAA2C,CAAC,YAAY,CAAC;QAC/E,MAAM,KAAK,GAAI,OAA2C,CAAC,KAAK,CAAC;QAEjE,sBAAsB;QACtB,MAAM,MAAM,GAAG,CAAC,SAAS,EAAE,OAAO,CAAC,OAAO,EAAE,WAAW,EAAE,OAAO,CAAC,SAAS,CAAC;aACxE,MAAM,CAAC,YAAY,KAAK,SAAS,CAAC,CAAC,CAAC,CAAC,cAAc,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;aACxE,MAAM,CAAC,CAAC,WAAW,EAAE,OAAO,CAAC,SAAS,CAAC,CAAC;aACxC,MAAM,CAAC,KAAK,KAAK,SAAS,CAAC,CAAC,CAAC,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;aACnD,MAAM,CAAC,CAAC,UAAU,EAAE,OAAO,CAAC,QAAQ,EAAE,MAAM,EAAE,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC;QAChE,MAAM,MAAM,GAAG,IAAA,qBAAY,EAAC,YAAY,CAAC,CAAC;QAC1C,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,IAAI,CAAC,CAAC;QACxC,MAAM,OAAO,GAAG,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,OAAO,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;QAClF,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC5D,CAAC;IACH,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,KAAK,CAAC,OAAwB;QAClC,MAAM,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAEjC,+CAA+C;QAC/C,MAAM,QAAQ,GAAiB,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;QAC3D,IAAI,QAAQ,CAAC,GAAG,KAAK,uBAAA,IAAI,gCAAO,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CAAC,uBAAuB,uBAAA,IAAI,gCAAO,aAAa,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;QAClF,CAAC;QAED,OAAO,QAAQ,CAAC;IAClB,CAAC;CAmDF;AA/HD,8CA+HC;;AAjDC;;;;;;;;;;GAUG;AACH,KAAK,yDAA8B,GAAQ;IACzC,MAAM,QAAQ,GAAG,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,CAAC;IACtC,MAAM,iBAAiB,GAAG,uBAAA,IAAI,6CAAoB,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;IAC5D,IAAI,iBAAiB,IAAI,QAAQ,GAAG,IAAI,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;QAClF,OAAO,iBAAiB,CAAC;IAC3B,CAAC;IAED,0CAA0C;IAC1C,IAAI,GAAG,CAAC,QAAQ,KAAK,QAAQ,EAAE,CAAC;QAC9B,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;IACnE,CAAC;IAED,sCAAsC;IACtC,IAAI,yBAAyB,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC;QACvD,MAAM,IAAI,KAAK,CAAC,uDAAuD,CAAC,CAAC;IAC3E,CAAC;IAED,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;IAClC,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE,CAAC;QACjB,MAAM,IAAI,KAAK,CAAC,2CAA2C,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC;IAChF,CAAC;IACD,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;IACnC,MAAM,WAAW,GAAG,IAAI,wBAAe,CAAC,MAAM,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC;IAC3D,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,oBAAoB,CAAC,EAAE,CAAC;QACjD,MAAM,IAAI,KAAK,CAAC,mCAAmC,oBAAoB,GAAG,CAAC,CAAC;IAC9E,CAAC;IAED,uBAAuB;IACvB,IAAI,QAAQ,GAAG,IAAI,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;QACzD,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;IAC/C,CAAC;IACD,IAAI,IAAI,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,GAAG,QAAQ,EAAE,CAAC;QACvD,MAAM,IAAI,KAAK,CAAC,qBAAqB,CAAC,CAAC;IACzC,CAAC;IAED,uBAAA,IAAI,6CAAoB,CAAC,GAAG,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;IAC/C,OAAO,WAAW,CAAC;AACrB,CAAC","sourcesContent":["import { X509Certificate, createVerify } from \"crypto\";\nimport { Environment, envs } from \".\";\n\n// URLs that are safe to retrieve certificates from\nconst SNS_CERTIFICATE_URL_HOSTS = [\"sns.us-east-1.amazonaws.com\"];\n\nconst SNS_CERTIFICATE_HOST = \"sns.amazonaws.com\";\n\n/** The common fields of SNS messages */\nexport interface SnsMessage {\n  Type: string;\n  MessageId: string;\n  TopicArn: string;\n  Message: string;\n  Timestamp: string;\n  SignatureVersion: string;\n  Signature: string;\n  SigningCertURL: string;\n}\n\n/** The format of a subscription confirmation sent by SNS */\nexport interface SubscriptionConfirmationMessage extends SnsMessage {\n  Token: string;\n  SubscribeURL: string;\n}\n\n/** Common fields for an org event */\nexport interface OrgEventBase {\n  org: string;\n  utc_timestamp: number;\n  org_event: string;\n}\n\n/** The format of an event message sent by SNS */\nexport interface OrgEventMessage extends SnsMessage {\n  Subject?: string;\n  UnsubscribeURL: string;\n}\n\n/** Options for the processor */\nexport interface OrgEventProcessorOptions {\n  env: Environment;\n}\n\n/** A utility for processing org event messages */\nexport class OrgEventProcessor {\n  readonly #topicArn: string;\n  readonly #orgId: string;\n  #cachedCertificates: Map<URL, X509Certificate>;\n\n  /**\n   * Constructor.\n   * @param {string} orgId The org id\n   * @param {OrgEventProcessorOptions} options Additional options for the processor\n   */\n  constructor(orgId: string, options?: OrgEventProcessorOptions) {\n    this.#topicArn = envs[options?.env ?? \"prod\"].OrgEventsTopicArn;\n    this.#orgId = orgId;\n    this.#cachedCertificates = new Map();\n  }\n\n  /**\n   * Checks an SNS message and its signature. Throws an error if the message\n   * invalid or the signature is invalid.\n   *\n   * @param {SnsMessage} message The SNS message to check\n   */\n  async checkMessage(message: SnsMessage) {\n    // Check the topic ARN\n    if (message.TopicArn !== this.#topicArn) {\n      throw new Error(`Expected topic ARN '${this.#topicArn}', found '${message.TopicArn}'`);\n    }\n\n    // Both subscription confirmations and org event messages should have no subject\n    if (\"Subject\" in message) {\n      throw new Error(\"Expected a message without a subject\");\n    }\n\n    // The org events topic uses signature version 2 (SHA256)\n    if (message.SignatureVersion !== \"2\") {\n      throw new Error(\"Expected signature version 2\");\n    }\n\n    // Retrieve the certificate and sanity check it\n    const certificate = await this.#fetchAndValidateCertificate(new URL(message.SigningCertURL));\n\n    // Extract fields specific to subscription confirmations\n    const subscribeUrl = (message as SubscriptionConfirmationMessage).SubscribeURL;\n    const token = (message as SubscriptionConfirmationMessage).Token;\n\n    // Check the signature\n    const fields = [\"Message\", message.Message, \"MessageId\", message.MessageId]\n      .concat(subscribeUrl !== undefined ? [\"SubscribeURL\", subscribeUrl] : [])\n      .concat([\"Timestamp\", message.Timestamp])\n      .concat(token !== undefined ? [\"Token\", token] : [])\n      .concat([\"TopicArn\", message.TopicArn, \"Type\", message.Type]);\n    const verify = createVerify(\"RSA-SHA256\");\n    verify.update(fields.join(\"\\n\") + \"\\n\");\n    const isValid = verify.verify(certificate.publicKey, message.Signature, \"base64\");\n    if (!isValid) {\n      throw new Error(\"The org event has an invalid signature\");\n    }\n  }\n\n  /**\n   * Parse an org event and check its signature. Throws an error if the\n   * message is not a valid org event or the signature is invalid.\n   *\n   * @param {OrgEventMessage} message The org event message to check\n   * @return {OrgEventBase} The org event\n   */\n  async parse(message: OrgEventMessage): Promise<OrgEventBase> {\n    await this.checkMessage(message);\n\n    // Check that the event is for the expected org\n    const orgEvent: OrgEventBase = JSON.parse(message.Message);\n    if (orgEvent.org !== this.#orgId) {\n      throw new Error(`Expected org to be '${this.#orgId}', found '${orgEvent.org}'`);\n    }\n\n    return orgEvent;\n  }\n\n  /**\n   * Fetches a certificate from a given URL or from the certificate cache.\n   * Throws an error if the URL does not correspond to an SNS certificate URL.\n   *\n   * Note: Ideally, this method would verify the certificate chain, but there\n   * is no obvious chain. Instead, this method only fetches certificates from\n   * a small set of allowlisted URLs.\n   *\n   * @param {URL} url The URL of the certificate\n   * @return {X509Certificate} The certificate\n   */\n  async #fetchAndValidateCertificate(url: URL): Promise<X509Certificate> {\n    const currTime = new Date().getTime();\n    const cachedCertificate = this.#cachedCertificates.get(url);\n    if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {\n      return cachedCertificate;\n    }\n\n    // Only fetch certificates from HTTPS URLs\n    if (url.protocol !== \"https:\") {\n      throw new Error(\"Expected signing certificate URL to use HTTPS\");\n    }\n\n    // Only fetch certificate URLs for SNS\n    if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {\n      throw new Error(\"Expected signing certificate URL for SNS in us-east-1\");\n    }\n\n    const response = await fetch(url);\n    if (!response.ok) {\n      throw new Error(`Unable to download certificate. Status: ${response.status}`);\n    }\n    const blob = await response.blob();\n    const certificate = new X509Certificate(await blob.text());\n    if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {\n      throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);\n    }\n\n    // Check validity times\n    if (currTime < new Date(certificate.validFrom).getTime()) {\n      throw new Error(\"Certificate not valid yet\");\n    }\n    if (new Date(certificate.validTo).getTime() < currTime) {\n      throw new Error(\"Certificate expired\");\n    }\n\n    this.#cachedCertificates.set(url, certificate);\n    return certificate;\n  }\n}\n"]}
@@ -184,7 +184,11 @@ export interface paths {
184
184
  * Update Key
185
185
  * @description Update Key
186
186
  *
187
- * Enable or disable a key. The user must be the owner of the key or organization to perform this action.
187
+ * Enable or disable a key. The user must be the owner of the key or
188
+ * organization to perform this action.
189
+ *
190
+ * For each requested update, the session must have the corresponding 'manage:key:update:_' scope;
191
+ * if no updates are requested, the session must have 'manage:key:get'.
188
192
  */
189
193
  patch: operations["updateKey"];
190
194
  };
@@ -1005,7 +1009,7 @@ export interface components {
1005
1009
  /** @enum {string} */
1006
1010
  BadGatewayErrorCode: "OAuthProviderError";
1007
1011
  /** @enum {string} */
1008
- BadRequestErrorCode: "GenericBadRequest" | "InvalidBody" | "TokenRequestError" | "InvalidMfaReceipt" | "InvalidMfaPolicyCount" | "InvalidMfaPolicyNumAuthFactors" | "InvalidMfaPolicyNumAllowedApprovers" | "InvalidMfaPolicyRedundantRule" | "InvalidCreateKeyCount" | "OrgInviteExistingUser" | "OrgNameTaken" | "RoleNameTaken" | "AddKeyToRoleCountTooHigh" | "InvalidKeyId" | "InvalidKeyMetadataLength" | "InvalidKeyMetadata" | "InvalidKeyMaterialId" | "KeyNotFound" | "UserExportDerivedKey" | "UserExportPublicKeyInvalid" | "UserExportInProgress" | "RoleNotFound" | "InvalidMfaReceiptOrgIdMissing" | "InvalidMfaReceiptInvalidOrgId" | "MfaRequestNotFound" | "InvalidKeyType" | "InvalidKeyMaterial" | "InvalidHexValue" | "InvalidBase32Value" | "InvalidBase58Value" | "InvalidForkVersionLength" | "InvalidEthAddress" | "InvalidStellarAddress" | "InvalidOrgNameOrId" | "InvalidStakeDeposit" | "InvalidBlobSignRequest" | "InvalidSolanaSignRequest" | "InvalidEip712SignRequest" | "InvalidEvmSignRequest" | "InvalidEth2SignRequest" | "InvalidDeriveKeyRequest" | "InvalidStakingAmount" | "CustomStakingAmountNotAllowedForWrapperContract" | "InvalidUnstakeRequest" | "InvalidCreateUserRequest" | "UserAlreadyExists" | "UserNotFound" | "PolicyRuleKeyMismatch" | "EmptyScopes" | "InvalidScopesForRoleSession" | "InvalidLifetime" | "NoSingleKeyForUser" | "InvalidOrgPolicyRule" | "SourceIpAllowlistEmpty" | "InvalidOrgPolicyRepeatedRule" | "AvaSignHashError" | "AvaSignError" | "BtcSegwitHashError" | "BtcSignError" | "Eip712SignError" | "InvalidMemberRoleInUserAdd" | "ThirdPartyUserAlreadyExists" | "ThirdPartyUserNotFound" | "DeleteOidcUserError" | "SessionRoleMismatch" | "InvalidOidcToken" | "OidcIssuerUnsupported" | "OidcIssuerNotAllowed" | "OidcIssuerNoApplicableJwk" | "FidoKeyAlreadyRegistered" | "FidoKeySignCountTooLow" | "FidoVerificationFailed" | "FidoChallengeMfaMismatch" | "UnsupportedLegacyCognitoSession" | "InvalidIdentityProof" | "PaginationDataExpired" | "ExistingKeysViolateExclusiveKeyAccess" | "ExportDelayTooShort" | "ExportWindowTooLong" | "InvalidTotpFailureLimit" | "InvalidEip191SignRequest" | "CannotResendUserInvitation" | "InvalidNotificationEndpointCount" | "CannotDeletePendingSubscription" | "InvalidNotificationUrlProtocol" | "EmptyOneOfOrgEventFilter" | "EmptyAllExceptOrgEventFilter";
1012
+ BadRequestErrorCode: "GenericBadRequest" | "InvalidBody" | "TokenRequestError" | "InvalidMfaReceipt" | "InvalidMfaPolicyCount" | "InvalidMfaPolicyNumAuthFactors" | "InvalidMfaPolicyNumAllowedApprovers" | "InvalidMfaPolicyRedundantRule" | "InvalidCreateKeyCount" | "OrgInviteExistingUser" | "OrgNameTaken" | "RoleNameTaken" | "AddKeyToRoleCountTooHigh" | "InvalidKeyId" | "InvalidUpdate" | "InvalidMetadataLength" | "InvalidKeyMaterialId" | "KeyNotFound" | "UserExportDerivedKey" | "UserExportPublicKeyInvalid" | "UserExportInProgress" | "RoleNotFound" | "InvalidMfaReceiptOrgIdMissing" | "InvalidMfaReceiptInvalidOrgId" | "MfaRequestNotFound" | "InvalidKeyType" | "InvalidKeyMaterial" | "InvalidHexValue" | "InvalidBase32Value" | "InvalidBase58Value" | "InvalidForkVersionLength" | "InvalidEthAddress" | "InvalidStellarAddress" | "InvalidOrgNameOrId" | "InvalidStakeDeposit" | "InvalidBlobSignRequest" | "InvalidSolanaSignRequest" | "InvalidEip712SignRequest" | "InvalidEvmSignRequest" | "InvalidEth2SignRequest" | "InvalidDeriveKeyRequest" | "InvalidStakingAmount" | "CustomStakingAmountNotAllowedForWrapperContract" | "InvalidUnstakeRequest" | "InvalidCreateUserRequest" | "UserAlreadyExists" | "UserNotFound" | "PolicyRuleKeyMismatch" | "EmptyScopes" | "InvalidScopesForRoleSession" | "InvalidLifetime" | "NoSingleKeyForUser" | "InvalidOrgPolicyRule" | "SourceIpAllowlistEmpty" | "InvalidOrgPolicyRepeatedRule" | "AvaSignHashError" | "AvaSignError" | "BtcSegwitHashError" | "BtcSignError" | "Eip712SignError" | "InvalidMemberRoleInUserAdd" | "ThirdPartyUserAlreadyExists" | "ThirdPartyUserNotFound" | "DeleteOidcUserError" | "SessionRoleMismatch" | "InvalidOidcToken" | "OidcIssuerUnsupported" | "OidcIssuerNotAllowed" | "OidcIssuerNoApplicableJwk" | "FidoKeyAlreadyRegistered" | "FidoKeySignCountTooLow" | "FidoVerificationFailed" | "FidoChallengeMfaMismatch" | "UnsupportedLegacyCognitoSession" | "InvalidIdentityProof" | "PaginationDataExpired" | "ExistingKeysViolateExclusiveKeyAccess" | "ExportDelayTooShort" | "ExportWindowTooLong" | "InvalidTotpFailureLimit" | "InvalidEip191SignRequest" | "CannotResendUserInvitation" | "InvalidNotificationEndpointCount" | "CannotDeletePendingSubscription" | "InvalidNotificationUrlProtocol" | "EmptyOneOfOrgEventFilter" | "EmptyAllExceptOrgEventFilter";
1009
1013
  /**
1010
1014
  * @example {
1011
1015
  * "message_base64": "YWJjZGVmZ2hpamtsbW5vcHFyc3R1dnd4eXoxMjM0NTYK"
@@ -1093,6 +1097,22 @@ export interface components {
1093
1097
  /** @description Session ID */
1094
1098
  session_id: string;
1095
1099
  };
1100
+ /** @description Fields that are common to different types of resources such as keys */
1101
+ CommonFields: {
1102
+ created?: components["schemas"]["EpochDateTime"] | null;
1103
+ last_modified?: components["schemas"]["EpochDateTime"] | null;
1104
+ /**
1105
+ * @description User-defined metadata. When rendering (e.g., in the browser) you should treat
1106
+ * it as untrusted user data (and avoid injecting metadata into HTML directly) if
1107
+ * untrusted users can create/update keys (or their metadata).
1108
+ */
1109
+ metadata?: unknown;
1110
+ /**
1111
+ * Format: int64
1112
+ * @description Version of this object
1113
+ */
1114
+ version?: number;
1115
+ };
1096
1116
  ConfiguredMfa: {
1097
1117
  /** @enum {string} */
1098
1118
  type: "totp";
@@ -1106,10 +1126,10 @@ export interface components {
1106
1126
  };
1107
1127
  CreateAndUpdateKeyProperties: {
1108
1128
  /**
1109
- * @description Set this key's metadata. Validation regex: ^[A-Za-z0-9_=+/ \-\.\,]{0,1024}$
1110
- * @example Contract admin key
1129
+ * @description Set this key's metadata. If this value is `null`, the metadata is erased. If the field is
1130
+ * missing, the metadata remains unchanged.
1111
1131
  */
1112
- metadata?: string | null;
1132
+ metadata?: unknown;
1113
1133
  /**
1114
1134
  * @description Specify a user other than themselves to be the (potentially new) owner of the key.
1115
1135
  * The specified owner must be an existing user who is a member of the same org.
@@ -1854,7 +1874,7 @@ export interface components {
1854
1874
  */
1855
1875
  role_id: string;
1856
1876
  };
1857
- KeyInfo: {
1877
+ KeyInfo: components["schemas"]["CommonFields"] & {
1858
1878
  derivation_info?: components["schemas"]["KeyDerivationInfo"] | null;
1859
1879
  /** @description Whether the key is enabled (only enabled keys may be used for signing) */
1860
1880
  enabled: boolean;
@@ -1870,12 +1890,6 @@ export interface components {
1870
1890
  * @example 0x8e3484687e66cdd26cf04c3647633ab4f3570148
1871
1891
  */
1872
1892
  material_id: string;
1873
- /**
1874
- * @description User-defined metadata. When rendering (e.g., in the browser) you should treat
1875
- * it as untrusted user data (and avoid injecting metadata into HTML directly) if
1876
- * untrusted users can create/update keys (or their metadata).
1877
- */
1878
- metadata?: string;
1879
1893
  /**
1880
1894
  * @description Owner of the key
1881
1895
  * @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
@@ -2895,6 +2909,11 @@ export interface components {
2895
2909
  * Once disabled, a key cannot be used for signing.
2896
2910
  */
2897
2911
  enabled?: boolean | null;
2912
+ /**
2913
+ * Format: int64
2914
+ * @description If set, updating the metadata only succeeds if the version matches this value.
2915
+ */
2916
+ version?: number | null;
2898
2917
  };
2899
2918
  UpdateOrgRequest: {
2900
2919
  /** @description If set, update this org's `enabled` field to this value. */
@@ -3152,10 +3171,10 @@ export interface components {
3152
3171
  };
3153
3172
  UserInOrgInfo: {
3154
3173
  /**
3155
- * @description The user's email
3174
+ * @description The user's email (optional)
3156
3175
  * @example alice@example.com
3157
3176
  */
3158
- email: string;
3177
+ email?: string | null;
3159
3178
  /**
3160
3179
  * @description The id of the user
3161
3180
  * @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
@@ -3185,7 +3204,7 @@ export interface components {
3185
3204
  * @description Optional email
3186
3205
  * @example alice@example.com
3187
3206
  */
3188
- email: string;
3207
+ email?: string | null;
3189
3208
  /** @description All multi-factor authentication methods configured for this user */
3190
3209
  mfa: components["schemas"]["ConfiguredMfa"][];
3191
3210
  /** @description MFA policy, applies before logging in and other sensitive operations */
@@ -3450,7 +3469,7 @@ export interface components {
3450
3469
  };
3451
3470
  KeyInfo: {
3452
3471
  content: {
3453
- "application/json": {
3472
+ "application/json": components["schemas"]["CommonFields"] & {
3454
3473
  derivation_info?: components["schemas"]["KeyDerivationInfo"] | null;
3455
3474
  /** @description Whether the key is enabled (only enabled keys may be used for signing) */
3456
3475
  enabled: boolean;
@@ -3466,12 +3485,6 @@ export interface components {
3466
3485
  * @example 0x8e3484687e66cdd26cf04c3647633ab4f3570148
3467
3486
  */
3468
3487
  material_id: string;
3469
- /**
3470
- * @description User-defined metadata. When rendering (e.g., in the browser) you should treat
3471
- * it as untrusted user data (and avoid injecting metadata into HTML directly) if
3472
- * untrusted users can create/update keys (or their metadata).
3473
- */
3474
- metadata?: string;
3475
3488
  /**
3476
3489
  * @description Owner of the key
3477
3490
  * @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
@@ -4020,7 +4033,7 @@ export interface components {
4020
4033
  * @description Optional email
4021
4034
  * @example alice@example.com
4022
4035
  */
4023
- email: string;
4036
+ email?: string | null;
4024
4037
  /** @description All multi-factor authentication methods configured for this user */
4025
4038
  mfa: components["schemas"]["ConfiguredMfa"][];
4026
4039
  /** @description MFA policy, applies before logging in and other sensitive operations */
@@ -4633,7 +4646,11 @@ export interface operations {
4633
4646
  * Update Key
4634
4647
  * @description Update Key
4635
4648
  *
4636
- * Enable or disable a key. The user must be the owner of the key or organization to perform this action.
4649
+ * Enable or disable a key. The user must be the owner of the key or
4650
+ * organization to perform this action.
4651
+ *
4652
+ * For each requested update, the session must have the corresponding 'manage:key:update:_' scope;
4653
+ * if no updates are requested, the session must have 'manage:key:get'.
4637
4654
  */
4638
4655
  updateKey: {
4639
4656
  parameters: {