@cubist-labs/cubesigner-sdk 0.3.26 → 0.3.28
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/package.json +1 -1
- package/dist/cjs/src/client.d.ts +4 -4
- package/dist/cjs/src/index.js +7 -4
- package/dist/cjs/src/key.d.ts +35 -2
- package/dist/cjs/src/key.js +79 -5
- package/dist/cjs/src/org_event_processor.d.ts +57 -0
- package/dist/cjs/src/org_event_processor.js +137 -0
- package/dist/cjs/src/schema.d.ts +41 -24
- package/dist/cjs/src/schema.js +1 -1
- package/dist/cjs/src/util.d.ts +2 -0
- package/dist/cjs/src/util.js +1 -1
- package/dist/esm/package.json +1 -1
- package/dist/esm/src/client.d.ts +4 -4
- package/dist/esm/src/index.js +4 -4
- package/dist/esm/src/key.d.ts +35 -2
- package/dist/esm/src/key.js +79 -5
- package/dist/esm/src/org_event_processor.d.ts +57 -0
- package/dist/esm/src/org_event_processor.js +133 -0
- package/dist/esm/src/schema.d.ts +41 -24
- package/dist/esm/src/schema.js +1 -1
- package/dist/esm/src/util.d.ts +2 -0
- package/dist/esm/src/util.js +1 -1
- package/dist/package.json +36 -0
- package/dist/spec/env/beta.json +9 -0
- package/dist/spec/env/gamma.json +9 -0
- package/dist/spec/env/prod.json +9 -0
- package/dist/src/api.d.ts +634 -0
- package/dist/src/api.js +1309 -0
- package/dist/src/client.d.ts +575 -0
- package/dist/src/client.js +381 -0
- package/dist/src/env.d.ts +15 -0
- package/dist/src/env.js +35 -0
- package/dist/src/error.d.ts +29 -0
- package/dist/src/error.js +36 -0
- package/dist/src/events.d.ts +84 -0
- package/dist/src/events.js +195 -0
- package/dist/src/index.d.ts +207 -0
- package/dist/src/index.js +308 -0
- package/dist/src/key.d.ts +152 -0
- package/dist/src/key.js +242 -0
- package/dist/src/mfa.d.ts +94 -0
- package/dist/src/mfa.js +169 -0
- package/dist/src/org.d.ts +99 -0
- package/dist/src/org.js +95 -0
- package/dist/src/paginator.d.ts +76 -0
- package/dist/src/paginator.js +99 -0
- package/dist/src/response.d.ts +101 -0
- package/dist/src/response.js +164 -0
- package/dist/src/role.d.ts +283 -0
- package/dist/src/role.js +253 -0
- package/dist/src/schema.d.ts +6209 -0
- package/dist/src/schema.js +7 -0
- package/dist/src/schema_types.d.ts +113 -0
- package/dist/src/schema_types.js +3 -0
- package/dist/src/session/session_storage.d.ts +47 -0
- package/dist/src/session/session_storage.js +76 -0
- package/dist/src/session/signer_session_manager.d.ts +125 -0
- package/dist/src/session/signer_session_manager.js +239 -0
- package/dist/src/signer_session.d.ts +41 -0
- package/dist/src/signer_session.js +77 -0
- package/dist/src/user_export.d.ts +52 -0
- package/dist/src/user_export.js +129 -0
- package/dist/src/util.d.ts +61 -0
- package/dist/src/util.js +97 -0
- package/package.json +1 -1
- package/src/index.ts +3 -3
- package/src/key.ts +83 -4
- package/src/schema.ts +42 -25
- package/src/util.ts +3 -0
|
@@ -0,0 +1,137 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
3
|
+
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
4
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
5
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
6
|
+
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
7
|
+
};
|
|
8
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
9
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
10
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
11
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
12
|
+
};
|
|
13
|
+
var _OrgEventProcessor_instances, _OrgEventProcessor_topicArn, _OrgEventProcessor_orgId, _OrgEventProcessor_cachedCertificates, _OrgEventProcessor_fetchAndValidateCertificate;
|
|
14
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
+
exports.OrgEventProcessor = void 0;
|
|
16
|
+
const crypto_1 = require("crypto");
|
|
17
|
+
const _1 = require(".");
|
|
18
|
+
// URLs that are safe to retrieve certificates from
|
|
19
|
+
const SNS_CERTIFICATE_URL_HOSTS = ["sns.us-east-1.amazonaws.com"];
|
|
20
|
+
const SNS_CERTIFICATE_HOST = "sns.amazonaws.com";
|
|
21
|
+
/** A utility for processing org event messages */
|
|
22
|
+
class OrgEventProcessor {
|
|
23
|
+
/**
|
|
24
|
+
* Constructor.
|
|
25
|
+
* @param {string} orgId The org id
|
|
26
|
+
* @param {OrgEventProcessorOptions} options Additional options for the processor
|
|
27
|
+
*/
|
|
28
|
+
constructor(orgId, options) {
|
|
29
|
+
_OrgEventProcessor_instances.add(this);
|
|
30
|
+
_OrgEventProcessor_topicArn.set(this, void 0);
|
|
31
|
+
_OrgEventProcessor_orgId.set(this, void 0);
|
|
32
|
+
_OrgEventProcessor_cachedCertificates.set(this, void 0);
|
|
33
|
+
__classPrivateFieldSet(this, _OrgEventProcessor_topicArn, _1.envs[options?.env ?? "prod"].OrgEventsTopicArn, "f");
|
|
34
|
+
__classPrivateFieldSet(this, _OrgEventProcessor_orgId, orgId, "f");
|
|
35
|
+
__classPrivateFieldSet(this, _OrgEventProcessor_cachedCertificates, new Map(), "f");
|
|
36
|
+
}
|
|
37
|
+
/**
|
|
38
|
+
* Checks an SNS message and its signature. Throws an error if the message
|
|
39
|
+
* invalid or the signature is invalid.
|
|
40
|
+
*
|
|
41
|
+
* @param {SnsMessage} message The SNS message to check
|
|
42
|
+
*/
|
|
43
|
+
async checkMessage(message) {
|
|
44
|
+
// Check the topic ARN
|
|
45
|
+
if (message.TopicArn !== __classPrivateFieldGet(this, _OrgEventProcessor_topicArn, "f")) {
|
|
46
|
+
throw new Error(`Expected topic ARN '${__classPrivateFieldGet(this, _OrgEventProcessor_topicArn, "f")}', found '${message.TopicArn}'`);
|
|
47
|
+
}
|
|
48
|
+
// Both subscription confirmations and org event messages should have no subject
|
|
49
|
+
if ("Subject" in message) {
|
|
50
|
+
throw new Error("Expected a message without a subject");
|
|
51
|
+
}
|
|
52
|
+
// The org events topic uses signature version 2 (SHA256)
|
|
53
|
+
if (message.SignatureVersion !== "2") {
|
|
54
|
+
throw new Error("Expected signature version 2");
|
|
55
|
+
}
|
|
56
|
+
// Retrieve the certificate and sanity check it
|
|
57
|
+
const certificate = await __classPrivateFieldGet(this, _OrgEventProcessor_instances, "m", _OrgEventProcessor_fetchAndValidateCertificate).call(this, new URL(message.SigningCertURL));
|
|
58
|
+
// Extract fields specific to subscription confirmations
|
|
59
|
+
const subscribeUrl = message.SubscribeURL;
|
|
60
|
+
const token = message.Token;
|
|
61
|
+
// Check the signature
|
|
62
|
+
const fields = ["Message", message.Message, "MessageId", message.MessageId]
|
|
63
|
+
.concat(subscribeUrl !== undefined ? ["SubscribeURL", subscribeUrl] : [])
|
|
64
|
+
.concat(["Timestamp", message.Timestamp])
|
|
65
|
+
.concat(token !== undefined ? ["Token", token] : [])
|
|
66
|
+
.concat(["TopicArn", message.TopicArn, "Type", message.Type]);
|
|
67
|
+
const verify = (0, crypto_1.createVerify)("RSA-SHA256");
|
|
68
|
+
verify.update(fields.join("\n") + "\n");
|
|
69
|
+
const isValid = verify.verify(certificate.publicKey, message.Signature, "base64");
|
|
70
|
+
if (!isValid) {
|
|
71
|
+
throw new Error("The org event has an invalid signature");
|
|
72
|
+
}
|
|
73
|
+
}
|
|
74
|
+
/**
|
|
75
|
+
* Parse an org event and check its signature. Throws an error if the
|
|
76
|
+
* message is not a valid org event or the signature is invalid.
|
|
77
|
+
*
|
|
78
|
+
* @param {OrgEventMessage} message The org event message to check
|
|
79
|
+
* @return {OrgEventBase} The org event
|
|
80
|
+
*/
|
|
81
|
+
async parse(message) {
|
|
82
|
+
await this.checkMessage(message);
|
|
83
|
+
// Check that the event is for the expected org
|
|
84
|
+
const orgEvent = JSON.parse(message.Message);
|
|
85
|
+
if (orgEvent.org !== __classPrivateFieldGet(this, _OrgEventProcessor_orgId, "f")) {
|
|
86
|
+
throw new Error(`Expected org to be '${__classPrivateFieldGet(this, _OrgEventProcessor_orgId, "f")}', found '${orgEvent.org}'`);
|
|
87
|
+
}
|
|
88
|
+
return orgEvent;
|
|
89
|
+
}
|
|
90
|
+
}
|
|
91
|
+
exports.OrgEventProcessor = OrgEventProcessor;
|
|
92
|
+
_OrgEventProcessor_topicArn = new WeakMap(), _OrgEventProcessor_orgId = new WeakMap(), _OrgEventProcessor_cachedCertificates = new WeakMap(), _OrgEventProcessor_instances = new WeakSet(), _OrgEventProcessor_fetchAndValidateCertificate =
|
|
93
|
+
/**
|
|
94
|
+
* Fetches a certificate from a given URL or from the certificate cache.
|
|
95
|
+
* Throws an error if the URL does not correspond to an SNS certificate URL.
|
|
96
|
+
*
|
|
97
|
+
* Note: Ideally, this method would verify the certificate chain, but there
|
|
98
|
+
* is no obvious chain. Instead, this method only fetches certificates from
|
|
99
|
+
* a small set of allowlisted URLs.
|
|
100
|
+
*
|
|
101
|
+
* @param {URL} url The URL of the certificate
|
|
102
|
+
* @return {X509Certificate} The certificate
|
|
103
|
+
*/
|
|
104
|
+
async function _OrgEventProcessor_fetchAndValidateCertificate(url) {
|
|
105
|
+
const currTime = new Date().getTime();
|
|
106
|
+
const cachedCertificate = __classPrivateFieldGet(this, _OrgEventProcessor_cachedCertificates, "f").get(url);
|
|
107
|
+
if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {
|
|
108
|
+
return cachedCertificate;
|
|
109
|
+
}
|
|
110
|
+
// Only fetch certificates from HTTPS URLs
|
|
111
|
+
if (url.protocol !== "https:") {
|
|
112
|
+
throw new Error("Expected signing certificate URL to use HTTPS");
|
|
113
|
+
}
|
|
114
|
+
// Only fetch certificate URLs for SNS
|
|
115
|
+
if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {
|
|
116
|
+
throw new Error("Expected signing certificate URL for SNS in us-east-1");
|
|
117
|
+
}
|
|
118
|
+
const response = await fetch(url);
|
|
119
|
+
if (!response.ok) {
|
|
120
|
+
throw new Error(`Unable to download certificate. Status: ${response.status}`);
|
|
121
|
+
}
|
|
122
|
+
const blob = await response.blob();
|
|
123
|
+
const certificate = new crypto_1.X509Certificate(await blob.text());
|
|
124
|
+
if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {
|
|
125
|
+
throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);
|
|
126
|
+
}
|
|
127
|
+
// Check validity times
|
|
128
|
+
if (currTime < new Date(certificate.validFrom).getTime()) {
|
|
129
|
+
throw new Error("Certificate not valid yet");
|
|
130
|
+
}
|
|
131
|
+
if (new Date(certificate.validTo).getTime() < currTime) {
|
|
132
|
+
throw new Error("Certificate expired");
|
|
133
|
+
}
|
|
134
|
+
__classPrivateFieldGet(this, _OrgEventProcessor_cachedCertificates, "f").set(url, certificate);
|
|
135
|
+
return certificate;
|
|
136
|
+
};
|
|
137
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"org_event_processor.js","sourceRoot":"","sources":["../../../src/org_event_processor.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAAuD;AACvD,wBAAsC;AAEtC,mDAAmD;AACnD,MAAM,yBAAyB,GAAG,CAAC,6BAA6B,CAAC,CAAC;AAElE,MAAM,oBAAoB,GAAG,mBAAmB,CAAC;AAsCjD,kDAAkD;AAClD,MAAa,iBAAiB;IAK5B;;;;OAIG;IACH,YAAY,KAAa,EAAE,OAAkC;;QATpD,8CAAkB;QAClB,2CAAe;QACxB,wDAA+C;QAQ7C,uBAAA,IAAI,+BAAa,OAAI,CAAC,OAAO,EAAE,GAAG,IAAI,MAAM,CAAC,CAAC,iBAAiB,MAAA,CAAC;QAChE,uBAAA,IAAI,4BAAU,KAAK,MAAA,CAAC;QACpB,uBAAA,IAAI,yCAAuB,IAAI,GAAG,EAAE,MAAA,CAAC;IACvC,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,YAAY,CAAC,OAAmB;QACpC,sBAAsB;QACtB,IAAI,OAAO,CAAC,QAAQ,KAAK,uBAAA,IAAI,mCAAU,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CAAC,uBAAuB,uBAAA,IAAI,mCAAU,aAAa,OAAO,CAAC,QAAQ,GAAG,CAAC,CAAC;QACzF,CAAC;QAED,gFAAgF;QAChF,IAAI,SAAS,IAAI,OAAO,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;QAC1D,CAAC;QAED,yDAAyD;QACzD,IAAI,OAAO,CAAC,gBAAgB,KAAK,GAAG,EAAE,CAAC;YACrC,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QAED,+CAA+C;QAC/C,MAAM,WAAW,GAAG,MAAM,uBAAA,IAAI,oFAA6B,MAAjC,IAAI,EAA8B,IAAI,GAAG,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC;QAE7F,wDAAwD;QACxD,MAAM,YAAY,GAAI,OAA2C,CAAC,YAAY,CAAC;QAC/E,MAAM,KAAK,GAAI,OAA2C,CAAC,KAAK,CAAC;QAEjE,sBAAsB;QACtB,MAAM,MAAM,GAAG,CAAC,SAAS,EAAE,OAAO,CAAC,OAAO,EAAE,WAAW,EAAE,OAAO,CAAC,SAAS,CAAC;aACxE,MAAM,CAAC,YAAY,KAAK,SAAS,CAAC,CAAC,CAAC,CAAC,cAAc,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;aACxE,MAAM,CAAC,CAAC,WAAW,EAAE,OAAO,CAAC,SAAS,CAAC,CAAC;aACxC,MAAM,CAAC,KAAK,KAAK,SAAS,CAAC,CAAC,CAAC,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;aACnD,MAAM,CAAC,CAAC,UAAU,EAAE,OAAO,CAAC,QAAQ,EAAE,MAAM,EAAE,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC;QAChE,MAAM,MAAM,GAAG,IAAA,qBAAY,EAAC,YAAY,CAAC,CAAC;QAC1C,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,IAAI,CAAC,CAAC;QACxC,MAAM,OAAO,GAAG,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,OAAO,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;QAClF,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC5D,CAAC;IACH,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,KAAK,CAAC,OAAwB;QAClC,MAAM,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAEjC,+CAA+C;QAC/C,MAAM,QAAQ,GAAiB,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;QAC3D,IAAI,QAAQ,CAAC,GAAG,KAAK,uBAAA,IAAI,gCAAO,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CAAC,uBAAuB,uBAAA,IAAI,gCAAO,aAAa,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;QAClF,CAAC;QAED,OAAO,QAAQ,CAAC;IAClB,CAAC;CAmDF;AA/HD,8CA+HC;;AAjDC;;;;;;;;;;GAUG;AACH,KAAK,yDAA8B,GAAQ;IACzC,MAAM,QAAQ,GAAG,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,CAAC;IACtC,MAAM,iBAAiB,GAAG,uBAAA,IAAI,6CAAoB,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;IAC5D,IAAI,iBAAiB,IAAI,QAAQ,GAAG,IAAI,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;QAClF,OAAO,iBAAiB,CAAC;IAC3B,CAAC;IAED,0CAA0C;IAC1C,IAAI,GAAG,CAAC,QAAQ,KAAK,QAAQ,EAAE,CAAC;QAC9B,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;IACnE,CAAC;IAED,sCAAsC;IACtC,IAAI,yBAAyB,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC;QACvD,MAAM,IAAI,KAAK,CAAC,uDAAuD,CAAC,CAAC;IAC3E,CAAC;IAED,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;IAClC,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE,CAAC;QACjB,MAAM,IAAI,KAAK,CAAC,2CAA2C,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC;IAChF,CAAC;IACD,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;IACnC,MAAM,WAAW,GAAG,IAAI,wBAAe,CAAC,MAAM,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC;IAC3D,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,oBAAoB,CAAC,EAAE,CAAC;QACjD,MAAM,IAAI,KAAK,CAAC,mCAAmC,oBAAoB,GAAG,CAAC,CAAC;IAC9E,CAAC;IAED,uBAAuB;IACvB,IAAI,QAAQ,GAAG,IAAI,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;QACzD,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;IAC/C,CAAC;IACD,IAAI,IAAI,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,GAAG,QAAQ,EAAE,CAAC;QACvD,MAAM,IAAI,KAAK,CAAC,qBAAqB,CAAC,CAAC;IACzC,CAAC;IAED,uBAAA,IAAI,6CAAoB,CAAC,GAAG,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;IAC/C,OAAO,WAAW,CAAC;AACrB,CAAC","sourcesContent":["import { X509Certificate, createVerify } from \"crypto\";\nimport { Environment, envs } from \".\";\n\n// URLs that are safe to retrieve certificates from\nconst SNS_CERTIFICATE_URL_HOSTS = [\"sns.us-east-1.amazonaws.com\"];\n\nconst SNS_CERTIFICATE_HOST = \"sns.amazonaws.com\";\n\n/** The common fields of SNS messages */\nexport interface SnsMessage {\n  Type: string;\n  MessageId: string;\n  TopicArn: string;\n  Message: string;\n  Timestamp: string;\n  SignatureVersion: string;\n  Signature: string;\n  SigningCertURL: string;\n}\n\n/** The format of a subscription confirmation sent by SNS */\nexport interface SubscriptionConfirmationMessage extends SnsMessage {\n  Token: string;\n  SubscribeURL: string;\n}\n\n/** Common fields for an org event */\nexport interface OrgEventBase {\n  org: string;\n  utc_timestamp: number;\n  org_event: string;\n}\n\n/** The format of an event message sent by SNS */\nexport interface OrgEventMessage extends SnsMessage {\n  Subject?: string;\n  UnsubscribeURL: string;\n}\n\n/** Options for the processor */\nexport interface OrgEventProcessorOptions {\n  env: Environment;\n}\n\n/** A utility for processing org event messages */\nexport class OrgEventProcessor {\n  readonly #topicArn: string;\n  readonly #orgId: string;\n  #cachedCertificates: Map<URL, X509Certificate>;\n\n  /**\n   * Constructor.\n   * @param {string} orgId The org id\n   * @param {OrgEventProcessorOptions} options Additional options for the processor\n   */\n  constructor(orgId: string, options?: OrgEventProcessorOptions) {\n    this.#topicArn = envs[options?.env ?? \"prod\"].OrgEventsTopicArn;\n    this.#orgId = orgId;\n    this.#cachedCertificates = new Map();\n  }\n\n  /**\n   * Checks an SNS message and its signature. Throws an error if the message\n   * invalid or the signature is invalid.\n   *\n   * @param {SnsMessage} message The SNS message to check\n   */\n  async checkMessage(message: SnsMessage) {\n    // Check the topic ARN\n    if (message.TopicArn !== this.#topicArn) {\n      throw new Error(`Expected topic ARN '${this.#topicArn}', found '${message.TopicArn}'`);\n    }\n\n    // Both subscription confirmations and org event messages should have no subject\n    if (\"Subject\" in message) {\n      throw new Error(\"Expected a message without a subject\");\n    }\n\n    // The org events topic uses signature version 2 (SHA256)\n    if (message.SignatureVersion !== \"2\") {\n      throw new Error(\"Expected signature version 2\");\n    }\n\n    // Retrieve the certificate and sanity check it\n    const certificate = await this.#fetchAndValidateCertificate(new URL(message.SigningCertURL));\n\n    // Extract fields specific to subscription confirmations\n    const subscribeUrl = (message as SubscriptionConfirmationMessage).SubscribeURL;\n    const token = (message as SubscriptionConfirmationMessage).Token;\n\n    // Check the signature\n    const fields = [\"Message\", message.Message, \"MessageId\", message.MessageId]\n      .concat(subscribeUrl !== undefined ? [\"SubscribeURL\", subscribeUrl] : [])\n      .concat([\"Timestamp\", message.Timestamp])\n      .concat(token !== undefined ? [\"Token\", token] : [])\n      .concat([\"TopicArn\", message.TopicArn, \"Type\", message.Type]);\n    const verify = createVerify(\"RSA-SHA256\");\n    verify.update(fields.join(\"\\n\") + \"\\n\");\n    const isValid = verify.verify(certificate.publicKey, message.Signature, \"base64\");\n    if (!isValid) {\n      throw new Error(\"The org event has an invalid signature\");\n    }\n  }\n\n  /**\n   * Parse an org event and check its signature. Throws an error if the\n   * message is not a valid org event or the signature is invalid.\n   *\n   * @param {OrgEventMessage} message The org event message to check\n   * @return {OrgEventBase} The org event\n   */\n  async parse(message: OrgEventMessage): Promise<OrgEventBase> {\n    await this.checkMessage(message);\n\n    // Check that the event is for the expected org\n    const orgEvent: OrgEventBase = JSON.parse(message.Message);\n    if (orgEvent.org !== this.#orgId) {\n      throw new Error(`Expected org to be '${this.#orgId}', found '${orgEvent.org}'`);\n    }\n\n    return orgEvent;\n  }\n\n  /**\n   * Fetches a certificate from a given URL or from the certificate cache.\n   * Throws an error if the URL does not correspond to an SNS certificate URL.\n   *\n   * Note: Ideally, this method would verify the certificate chain, but there\n   * is no obvious chain. Instead, this method only fetches certificates from\n   * a small set of allowlisted URLs.\n   *\n   * @param {URL} url The URL of the certificate\n   * @return {X509Certificate} The certificate\n   */\n  async #fetchAndValidateCertificate(url: URL): Promise<X509Certificate> {\n    const currTime = new Date().getTime();\n    const cachedCertificate = this.#cachedCertificates.get(url);\n    if (cachedCertificate && currTime < new Date(cachedCertificate.validTo).getTime()) {\n      return cachedCertificate;\n    }\n\n    // Only fetch certificates from HTTPS URLs\n    if (url.protocol !== \"https:\") {\n      throw new Error(\"Expected signing certificate URL to use HTTPS\");\n    }\n\n    // Only fetch certificate URLs for SNS\n    if (SNS_CERTIFICATE_URL_HOSTS.indexOf(url.host) === -1) {\n      throw new Error(\"Expected signing certificate URL for SNS in us-east-1\");\n    }\n\n    const response = await fetch(url);\n    if (!response.ok) {\n      throw new Error(`Unable to download certificate. Status: ${response.status}`);\n    }\n    const blob = await response.blob();\n    const certificate = new X509Certificate(await blob.text());\n    if (!certificate.checkHost(SNS_CERTIFICATE_HOST)) {\n      throw new Error(`Expected certificate to be for '${SNS_CERTIFICATE_HOST}'`);\n    }\n\n    // Check validity times\n    if (currTime < new Date(certificate.validFrom).getTime()) {\n      throw new Error(\"Certificate not valid yet\");\n    }\n    if (new Date(certificate.validTo).getTime() < currTime) {\n      throw new Error(\"Certificate expired\");\n    }\n\n    this.#cachedCertificates.set(url, certificate);\n    return certificate;\n  }\n}\n"]}
|
package/dist/cjs/src/schema.d.ts
CHANGED
|
@@ -184,7 +184,11 @@ export interface paths {
|
|
|
184
184
|
* Update Key
|
|
185
185
|
* @description Update Key
|
|
186
186
|
*
|
|
187
|
-
* Enable or disable a key. The user must be the owner of the key or
|
|
187
|
+
* Enable or disable a key. The user must be the owner of the key or
|
|
188
|
+
* organization to perform this action.
|
|
189
|
+
*
|
|
190
|
+
* For each requested update, the session must have the corresponding 'manage:key:update:_' scope;
|
|
191
|
+
* if no updates are requested, the session must have 'manage:key:get'.
|
|
188
192
|
*/
|
|
189
193
|
patch: operations["updateKey"];
|
|
190
194
|
};
|
|
@@ -1005,7 +1009,7 @@ export interface components {
|
|
|
1005
1009
|
/** @enum {string} */
|
|
1006
1010
|
BadGatewayErrorCode: "OAuthProviderError";
|
|
1007
1011
|
/** @enum {string} */
|
|
1008
|
-
BadRequestErrorCode: "GenericBadRequest" | "InvalidBody" | "TokenRequestError" | "InvalidMfaReceipt" | "InvalidMfaPolicyCount" | "InvalidMfaPolicyNumAuthFactors" | "InvalidMfaPolicyNumAllowedApprovers" | "InvalidMfaPolicyRedundantRule" | "InvalidCreateKeyCount" | "OrgInviteExistingUser" | "OrgNameTaken" | "RoleNameTaken" | "AddKeyToRoleCountTooHigh" | "InvalidKeyId" | "
|
|
1012
|
+
BadRequestErrorCode: "GenericBadRequest" | "InvalidBody" | "TokenRequestError" | "InvalidMfaReceipt" | "InvalidMfaPolicyCount" | "InvalidMfaPolicyNumAuthFactors" | "InvalidMfaPolicyNumAllowedApprovers" | "InvalidMfaPolicyRedundantRule" | "InvalidCreateKeyCount" | "OrgInviteExistingUser" | "OrgNameTaken" | "RoleNameTaken" | "AddKeyToRoleCountTooHigh" | "InvalidKeyId" | "InvalidUpdate" | "InvalidMetadataLength" | "InvalidKeyMaterialId" | "KeyNotFound" | "UserExportDerivedKey" | "UserExportPublicKeyInvalid" | "UserExportInProgress" | "RoleNotFound" | "InvalidMfaReceiptOrgIdMissing" | "InvalidMfaReceiptInvalidOrgId" | "MfaRequestNotFound" | "InvalidKeyType" | "InvalidKeyMaterial" | "InvalidHexValue" | "InvalidBase32Value" | "InvalidBase58Value" | "InvalidForkVersionLength" | "InvalidEthAddress" | "InvalidStellarAddress" | "InvalidOrgNameOrId" | "InvalidStakeDeposit" | "InvalidBlobSignRequest" | "InvalidSolanaSignRequest" | "InvalidEip712SignRequest" | "InvalidEvmSignRequest" | "InvalidEth2SignRequest" | "InvalidDeriveKeyRequest" | "InvalidStakingAmount" | "CustomStakingAmountNotAllowedForWrapperContract" | "InvalidUnstakeRequest" | "InvalidCreateUserRequest" | "UserAlreadyExists" | "UserNotFound" | "PolicyRuleKeyMismatch" | "EmptyScopes" | "InvalidScopesForRoleSession" | "InvalidLifetime" | "NoSingleKeyForUser" | "InvalidOrgPolicyRule" | "SourceIpAllowlistEmpty" | "InvalidOrgPolicyRepeatedRule" | "AvaSignHashError" | "AvaSignError" | "BtcSegwitHashError" | "BtcSignError" | "Eip712SignError" | "InvalidMemberRoleInUserAdd" | "ThirdPartyUserAlreadyExists" | "ThirdPartyUserNotFound" | "DeleteOidcUserError" | "SessionRoleMismatch" | "InvalidOidcToken" | "OidcIssuerUnsupported" | "OidcIssuerNotAllowed" | "OidcIssuerNoApplicableJwk" | "FidoKeyAlreadyRegistered" | "FidoKeySignCountTooLow" | "FidoVerificationFailed" | "FidoChallengeMfaMismatch" | "UnsupportedLegacyCognitoSession" | "InvalidIdentityProof" | "PaginationDataExpired" | "ExistingKeysViolateExclusiveKeyAccess" | "ExportDelayTooShort" | "ExportWindowTooLong" | "InvalidTotpFailureLimit" | "InvalidEip191SignRequest" | "CannotResendUserInvitation" | "InvalidNotificationEndpointCount" | "CannotDeletePendingSubscription" | "InvalidNotificationUrlProtocol" | "EmptyOneOfOrgEventFilter" | "EmptyAllExceptOrgEventFilter";
|
|
1009
1013
|
/**
|
|
1010
1014
|
* @example {
|
|
1011
1015
|
* "message_base64": "YWJjZGVmZ2hpamtsbW5vcHFyc3R1dnd4eXoxMjM0NTYK"
|
|
@@ -1093,6 +1097,22 @@ export interface components {
|
|
|
1093
1097
|
/** @description Session ID */
|
|
1094
1098
|
session_id: string;
|
|
1095
1099
|
};
|
|
1100
|
+
/** @description Fields that are common to different types of resources such as keys */
|
|
1101
|
+
CommonFields: {
|
|
1102
|
+
created?: components["schemas"]["EpochDateTime"] | null;
|
|
1103
|
+
last_modified?: components["schemas"]["EpochDateTime"] | null;
|
|
1104
|
+
/**
|
|
1105
|
+
* @description User-defined metadata. When rendering (e.g., in the browser) you should treat
|
|
1106
|
+
* it as untrusted user data (and avoid injecting metadata into HTML directly) if
|
|
1107
|
+
* untrusted users can create/update keys (or their metadata).
|
|
1108
|
+
*/
|
|
1109
|
+
metadata?: unknown;
|
|
1110
|
+
/**
|
|
1111
|
+
* Format: int64
|
|
1112
|
+
* @description Version of this object
|
|
1113
|
+
*/
|
|
1114
|
+
version?: number;
|
|
1115
|
+
};
|
|
1096
1116
|
ConfiguredMfa: {
|
|
1097
1117
|
/** @enum {string} */
|
|
1098
1118
|
type: "totp";
|
|
@@ -1106,10 +1126,10 @@ export interface components {
|
|
|
1106
1126
|
};
|
|
1107
1127
|
CreateAndUpdateKeyProperties: {
|
|
1108
1128
|
/**
|
|
1109
|
-
* @description Set this key's metadata.
|
|
1110
|
-
*
|
|
1129
|
+
* @description Set this key's metadata. If this value is `null`, the metadata is erased. If the field is
|
|
1130
|
+
* missing, the metadata remains unchanged.
|
|
1111
1131
|
*/
|
|
1112
|
-
metadata?:
|
|
1132
|
+
metadata?: unknown;
|
|
1113
1133
|
/**
|
|
1114
1134
|
* @description Specify a user other than themselves to be the (potentially new) owner of the key.
|
|
1115
1135
|
* The specified owner must be an existing user who is a member of the same org.
|
|
@@ -1854,7 +1874,7 @@ export interface components {
|
|
|
1854
1874
|
*/
|
|
1855
1875
|
role_id: string;
|
|
1856
1876
|
};
|
|
1857
|
-
KeyInfo: {
|
|
1877
|
+
KeyInfo: components["schemas"]["CommonFields"] & {
|
|
1858
1878
|
derivation_info?: components["schemas"]["KeyDerivationInfo"] | null;
|
|
1859
1879
|
/** @description Whether the key is enabled (only enabled keys may be used for signing) */
|
|
1860
1880
|
enabled: boolean;
|
|
@@ -1870,12 +1890,6 @@ export interface components {
|
|
|
1870
1890
|
* @example 0x8e3484687e66cdd26cf04c3647633ab4f3570148
|
|
1871
1891
|
*/
|
|
1872
1892
|
material_id: string;
|
|
1873
|
-
/**
|
|
1874
|
-
* @description User-defined metadata. When rendering (e.g., in the browser) you should treat
|
|
1875
|
-
* it as untrusted user data (and avoid injecting metadata into HTML directly) if
|
|
1876
|
-
* untrusted users can create/update keys (or their metadata).
|
|
1877
|
-
*/
|
|
1878
|
-
metadata?: string;
|
|
1879
1893
|
/**
|
|
1880
1894
|
* @description Owner of the key
|
|
1881
1895
|
* @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
|
|
@@ -2895,6 +2909,11 @@ export interface components {
|
|
|
2895
2909
|
* Once disabled, a key cannot be used for signing.
|
|
2896
2910
|
*/
|
|
2897
2911
|
enabled?: boolean | null;
|
|
2912
|
+
/**
|
|
2913
|
+
* Format: int64
|
|
2914
|
+
* @description If set, updating the metadata only succeeds if the version matches this value.
|
|
2915
|
+
*/
|
|
2916
|
+
version?: number | null;
|
|
2898
2917
|
};
|
|
2899
2918
|
UpdateOrgRequest: {
|
|
2900
2919
|
/** @description If set, update this org's `enabled` field to this value. */
|
|
@@ -3152,10 +3171,10 @@ export interface components {
|
|
|
3152
3171
|
};
|
|
3153
3172
|
UserInOrgInfo: {
|
|
3154
3173
|
/**
|
|
3155
|
-
* @description The user's email
|
|
3174
|
+
* @description The user's email (optional)
|
|
3156
3175
|
* @example alice@example.com
|
|
3157
3176
|
*/
|
|
3158
|
-
email
|
|
3177
|
+
email?: string | null;
|
|
3159
3178
|
/**
|
|
3160
3179
|
* @description The id of the user
|
|
3161
3180
|
* @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
|
|
@@ -3185,7 +3204,7 @@ export interface components {
|
|
|
3185
3204
|
* @description Optional email
|
|
3186
3205
|
* @example alice@example.com
|
|
3187
3206
|
*/
|
|
3188
|
-
email
|
|
3207
|
+
email?: string | null;
|
|
3189
3208
|
/** @description All multi-factor authentication methods configured for this user */
|
|
3190
3209
|
mfa: components["schemas"]["ConfiguredMfa"][];
|
|
3191
3210
|
/** @description MFA policy, applies before logging in and other sensitive operations */
|
|
@@ -3450,7 +3469,7 @@ export interface components {
|
|
|
3450
3469
|
};
|
|
3451
3470
|
KeyInfo: {
|
|
3452
3471
|
content: {
|
|
3453
|
-
"application/json": {
|
|
3472
|
+
"application/json": components["schemas"]["CommonFields"] & {
|
|
3454
3473
|
derivation_info?: components["schemas"]["KeyDerivationInfo"] | null;
|
|
3455
3474
|
/** @description Whether the key is enabled (only enabled keys may be used for signing) */
|
|
3456
3475
|
enabled: boolean;
|
|
@@ -3466,12 +3485,6 @@ export interface components {
|
|
|
3466
3485
|
* @example 0x8e3484687e66cdd26cf04c3647633ab4f3570148
|
|
3467
3486
|
*/
|
|
3468
3487
|
material_id: string;
|
|
3469
|
-
/**
|
|
3470
|
-
* @description User-defined metadata. When rendering (e.g., in the browser) you should treat
|
|
3471
|
-
* it as untrusted user data (and avoid injecting metadata into HTML directly) if
|
|
3472
|
-
* untrusted users can create/update keys (or their metadata).
|
|
3473
|
-
*/
|
|
3474
|
-
metadata?: string;
|
|
3475
3488
|
/**
|
|
3476
3489
|
* @description Owner of the key
|
|
3477
3490
|
* @example User#c3b9379c-4e8c-4216-bd0a-65ace53cf98f
|
|
@@ -4020,7 +4033,7 @@ export interface components {
|
|
|
4020
4033
|
* @description Optional email
|
|
4021
4034
|
* @example alice@example.com
|
|
4022
4035
|
*/
|
|
4023
|
-
email
|
|
4036
|
+
email?: string | null;
|
|
4024
4037
|
/** @description All multi-factor authentication methods configured for this user */
|
|
4025
4038
|
mfa: components["schemas"]["ConfiguredMfa"][];
|
|
4026
4039
|
/** @description MFA policy, applies before logging in and other sensitive operations */
|
|
@@ -4633,7 +4646,11 @@ export interface operations {
|
|
|
4633
4646
|
* Update Key
|
|
4634
4647
|
* @description Update Key
|
|
4635
4648
|
*
|
|
4636
|
-
* Enable or disable a key. The user must be the owner of the key or
|
|
4649
|
+
* Enable or disable a key. The user must be the owner of the key or
|
|
4650
|
+
* organization to perform this action.
|
|
4651
|
+
*
|
|
4652
|
+
* For each requested update, the session must have the corresponding 'manage:key:update:_' scope;
|
|
4653
|
+
* if no updates are requested, the session must have 'manage:key:get'.
|
|
4637
4654
|
*/
|
|
4638
4655
|
updateKey: {
|
|
4639
4656
|
parameters: {
|