@cubist-labs/cubesigner-sdk 0.4.201 → 0.4.204

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -20,6 +20,15 @@ export interface paths {
20
20
  */
21
21
  get: operations["aboutMeLegacy"];
22
22
  };
23
+ "/v0/attestation/.well-known/jwks.json": {
24
+ /**
25
+ * JWKS endpoint for the attestation key
26
+ * @description JWKS endpoint for the attestation key
27
+ *
28
+ * Returns the public key used to sign Key info attestations.
29
+ */
30
+ get: operations["attestationJwkSet"];
31
+ };
23
32
  "/v0/email/orgs": {
24
33
  /**
25
34
  * List accessible organizations.
@@ -607,6 +616,15 @@ export interface paths {
607
616
  */
608
617
  patch: operations["updateKey"];
609
618
  };
619
+ "/v0/org/{org_id}/keys/{key_id}/attest": {
620
+ /**
621
+ * Attest to Key Properties
622
+ * @description Attest to Key Properties
623
+ *
624
+ * The response is a JWT whose claims are the key properties.
625
+ */
626
+ get: operations["attestKey"];
627
+ };
610
628
  "/v0/org/{org_id}/keys/{key_id}/roles": {
611
629
  /**
612
630
  * List Key Roles
@@ -1650,6 +1668,8 @@ export interface components {
1650
1668
  ids: string[];
1651
1669
  /** @description Organization id */
1652
1670
  org_id: string;
1671
+ /** @description Optional policy evaluation tree (included in signer responses, when requested) */
1672
+ policy_eval_tree?: unknown;
1653
1673
  session?: components["schemas"]["NewSessionResponse"] | null;
1654
1674
  };
1655
1675
  };
@@ -1908,6 +1928,12 @@ export interface components {
1908
1928
  AuthenticatorTransport: "usb" | "nfc" | "ble" | "internal";
1909
1929
  /** @description Request to sign a serialized Avalanche transaction */
1910
1930
  AvaSerializedTxSignRequest: {
1931
+ /**
1932
+ * @description Request additional information to be included in the response, explaining
1933
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
1934
+ * Defaults to false.
1935
+ */
1936
+ explain?: boolean;
1911
1937
  /**
1912
1938
  * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
1913
1939
  * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
@@ -1919,6 +1945,12 @@ export interface components {
1919
1945
  };
1920
1946
  /** @description Request to sign an Avalanche transaction */
1921
1947
  AvaSignRequest: {
1948
+ /**
1949
+ * @description Request additional information to be included in the response, explaining
1950
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
1951
+ * Defaults to false.
1952
+ */
1953
+ explain?: boolean;
1922
1954
  /**
1923
1955
  * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
1924
1956
  * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
@@ -1945,6 +1977,18 @@ export interface components {
1945
1977
  /** @description Wrapper around a zeroizing 32-byte fixed-size array */
1946
1978
  B32: string;
1947
1979
  BabylonCovSignRequest: {
1980
+ /**
1981
+ * @description Request additional information to be included in the response, explaining
1982
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
1983
+ * Defaults to false.
1984
+ */
1985
+ explain?: boolean;
1986
+ /**
1987
+ * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
1988
+ * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
1989
+ */
1990
+ metadata?: unknown;
1991
+ } & {
1948
1992
  /**
1949
1993
  * @description The keys for the finality providers to which this transaction is being staked.
1950
1994
  * Each key is a hex string containing a SEC1-encoded secp256k1 public key.
@@ -2004,6 +2048,9 @@ export interface components {
2004
2048
  unbonding_tx: string;
2005
2049
  };
2006
2050
  BabylonCovSignResponse: {
2051
+ /** @description Optional policy evaluation tree. */
2052
+ policy_eval_tree?: unknown;
2053
+ } & {
2007
2054
  /**
2008
2055
  * @description The slash-unbonding transaction signatures as an array of hex strings with no 0x prefix
2009
2056
  * @example [
@@ -2118,6 +2165,18 @@ export interface components {
2118
2165
  */
2119
2166
  value: number;
2120
2167
  }) & {
2168
+ /**
2169
+ * @description Request additional information to be included in the response, explaining
2170
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
2171
+ * Defaults to false.
2172
+ */
2173
+ explain?: boolean;
2174
+ /**
2175
+ * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
2176
+ * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
2177
+ */
2178
+ metadata?: unknown;
2179
+ } & {
2121
2180
  /**
2122
2181
  * @description The Babylon address that will receive the staking rewards for this deposit.
2123
2182
  * Babylon requires this to be the same address that registers the deposit on
@@ -2131,6 +2190,9 @@ export interface components {
2131
2190
  bbn_addr: string;
2132
2191
  };
2133
2192
  BabylonRegistrationResponse: {
2193
+ /** @description Optional policy evaluation tree. */
2194
+ policy_eval_tree?: unknown;
2195
+ } & {
2134
2196
  /**
2135
2197
  * @description The Babylon address that will receive the staking rewards for this deposit.
2136
2198
  *
@@ -2398,6 +2460,9 @@ export interface components {
2398
2460
  action: "slash_early_unbond";
2399
2461
  });
2400
2462
  BabylonStakingResponse: {
2463
+ /** @description Optional policy evaluation tree. */
2464
+ policy_eval_tree?: unknown;
2465
+ } & {
2401
2466
  /**
2402
2467
  * Format: int64
2403
2468
  * @description The transaction fee in sats
@@ -2474,7 +2539,7 @@ export interface components {
2474
2539
  /** @enum {string} */
2475
2540
  BadGatewayErrorCode: "EsploraApiError" | "SentryApiError" | "CallWebhookError" | "OAuthProviderError" | "OidcDisoveryFailed" | "OidcIssuerJwkEndpointUnavailable" | "SmtpServerUnavailable";
2476
2541
  /** @enum {string} */
2477
- BadRequestErrorCode: "GenericBadRequest" | "DisallowedAllowRuleReference" | "InvalidPaginationToken" | "InvalidEmail" | "InvalidEmailTemplate" | "QueryMetricsError" | "InvalidTelegramData" | "QueryMetricsValidationError" | "WebhookPolicyTimeoutOutOfBounds" | "WebhookPolicyDisallowedUrlScheme" | "WebhookPolicyDisallowedUrlHost" | "WebhookPolicyDisallowedHeaders" | "ReservedName" | "UserEmailNotConfigured" | "EmailPasswordNotFound" | "PasswordAuthNotAllowedByInvitation" | "OneTimeCodeExpired" | "InvalidBody" | "InvalidJwt" | "InvitationNoLongerValid" | "TokenRequestError" | "InvalidMfaReceipt" | "InvalidMfaPolicyCount" | "InvalidMfaPolicyNumAuthFactors" | "InvalidMfaPolicyNumAllowedApprovers" | "InvalidMfaPolicyGracePeriodTooLong" | "InvalidBabylonStakingPolicyParams" | "InvalidSuiTxReceiversEmptyAllowlist" | "InvalidBtcTxReceiversEmptyAllowlist" | "InvalidRequireRoleSessionAllowlist" | "InvalidCreateKeyCount" | "InvalidDiffieHellmanCount" | "OrgInviteExistingUser" | "OrgUserAlreadyExists" | "OrgNameTaken" | "OrgIsNotOrgExport" | "RoleNameTaken" | "PolicyNameTaken" | "NameTaken" | "ContactNameInvalid" | "ContactAddressesInvalid" | "ContactModified" | "PolicyNotFound" | "PolicyVersionNotFound" | "PolicyRuleDisallowedByType" | "PolicyTypeDisallowed" | "PolicyDuplicateError" | "PolicyStillAttached" | "PolicyModified" | "PolicyNotAttached" | "AddKeyToRoleCountTooHigh" | "InvalidKeyId" | "InvalidTimeLockAlreadyInThePast" | "InvalidRestrictedScopes" | "InvalidUpdate" | "InvalidMetadataLength" | "InvalidLength" | "InvalidKeyMaterialId" | "KeyNotFound" | "SiweChallengeNotFound" | "SiweInvalidRequest" | "UserExportDerivedKey" | "UserExportPublicKeyInvalid" | "NistP256PublicKeyInvalid" | "UnableToAccessSmtpRelay" | "UserExportInProgress" | "RoleNotFound" | "InvalidRoleNameOrId" | "InvalidMfaReceiptOrgIdMissing" | "InvalidMfaReceiptInvalidOrgId" | "MfaRequestNotFound" | "InvalidKeyType" | "InvalidKeyMaterial" | "InvalidHexValue" | "InvalidBase32Value" | "InvalidBase58Value" | "InvalidSs58Value" | "InvalidForkVersionLength" | "InvalidEthAddress" | "InvalidStellarAddress" | "InvalidOrgNameOrId" | "InvalidUpdateOrgRequestDisallowedMfaType" | "InvalidUpdateOrgRequestEmptyAllowedMfaTypes" | "EmailOtpDelayTooShortForRegisterMfa" | "InvalidStakeDeposit" | "InvalidBlobSignRequest" | "InvalidDiffieHellmanRequest" | "InvalidSolanaSignRequest" | "InvalidEip712SignRequest" | "OnlySpecifyOne" | "NoOidcDataInProof" | "InvalidEvmSignRequest" | "InvalidEth2SignRequest" | "InvalidDeriveKeyRequest" | "InvalidStakingAmount" | "CustomStakingAmountNotAllowedForWrapperContract" | "InvalidUnstakeRequest" | "InvalidCreateUserRequest" | "UserAlreadyExists" | "IdpUserAlreadyExists" | "CognitoUserAlreadyOrgMember" | "UserNotFound" | "UserWithEmailNotFound" | "PolicyKeyMismatch" | "PolicyRuleKeyMismatch" | "EmptyScopes" | "InvalidScopesForRoleSession" | "InvalidLifetime" | "NoSingleKeyForUser" | "InvalidOrgPolicyRule" | "SourceIpAllowlistEmpty" | "LimitWindowTooLong" | "Erc20ContractDisallowed" | "EmptyRuleError" | "OptionalListEmpty" | "MultipleExclusiveFieldsProvided" | "DuplicateFieldEntry" | "InvalidRange" | "InvalidOrgPolicyRepeatedRule" | "InvalidSuiTransaction" | "SuiSenderMismatch" | "AvaSignHashError" | "AvaSignError" | "BtcSegwitHashError" | "BtcTaprootHashError" | "BtcSignError" | "TaprootSignError" | "Eip712SignError" | "InvalidMemberRoleInUserAdd" | "InvalidMemberRoleInRecipientAdd" | "ThirdPartyUserAlreadyExists" | "OidcIdentityAlreadyExists" | "ThirdPartyUserNotFound" | "DeleteOidcUserError" | "DeleteUserError" | "SessionRoleMismatch" | "InvalidOidcToken" | "InvalidOidcIdentity" | "OidcIssuerUnsupported" | "OidcIssuerNotAllowed" | "OidcIssuerNoApplicableJwk" | "FidoKeyAlreadyRegistered" | "FidoKeySignCountTooLow" | "FidoVerificationFailed" | "FidoChallengeMfaMismatch" | "UnsupportedLegacyCognitoSession" | "InvalidIdentityProof" | "PaginationDataExpired" | "ExistingKeysViolateExclusiveKeyAccess" | "ExportDelayTooShort" | "ExportWindowTooLong" | "InvalidTotpFailureLimit" | "InvalidEip191SignRequest" | "CannotResendUserInvitation" | "InvalidNotificationEndpointCount" | "CannotDeletePendingSubscription" | "InvalidNotificationUrlProtocol" | "EmptyOneOfOrgEventFilter" | "EmptyAllExceptOrgEventFilter" | "InvalidTapNodeHash" | "InvalidOneTimeCode" | "MessageNotFound" | "MessageAlreadySigned" | "MessageRejected" | "MessageReplaced" | "InvalidMessageType" | "EmptyAddress" | "InvalidEth2SigningPolicySlotRange" | "InvalidEth2SigningPolicyEpochRange" | "InvalidEth2SigningPolicyTimestampRange" | "InvalidEth2SigningPolicyOverlappingRule" | "RpcUrlMissing" | "MmiChainIdMissing" | "EthersInvalidRpcUrl" | "EthersGetTransactionCountError" | "InvalidPassword" | "BabylonStakingFeePlusDustOverflow" | "BabylonStaking" | "BabylonStakingIncorrectKey" | "BabylonStakingSegwitNonDeposit" | "BabylonStakingRegistrationRequiresTaproot" | "PsbtSigning" | "TooManyResets" | "TooManyRequests" | "TooManyFailedLogins" | "BadBtcMessageSignP2shFlag" | "InvalidTendermintRequest" | "PolicyVersionMaxReached" | "PolicyVersionInvalid" | "AlienOwnerInvalid" | "EmptyUpdateRequest" | "InvalidPolicyReference" | "PolicyEngineDisabled" | "InvalidWasmPolicy" | "RedundantDerivationPath" | "ImportKeyMissing" | "InvalidAbiMethods" | "BabylonCovSign" | "InvalidPolicyLogsRequest" | "UserProfileMigrationMultipleEntries" | "UserProfileMigrationTooManyItems" | "InputTooShort";
2542
+ BadRequestErrorCode: "GenericBadRequest" | "DisallowedAllowRuleReference" | "InvalidPaginationToken" | "InvalidEmail" | "InvalidEmailTemplate" | "QueryMetricsError" | "InvalidTelegramData" | "QueryMetricsValidationError" | "WebhookPolicyTimeoutOutOfBounds" | "WebhookPolicyDisallowedUrlScheme" | "WebhookPolicyDisallowedUrlHost" | "WebhookPolicyDisallowedHeaders" | "ReservedName" | "UserEmailNotConfigured" | "EmailPasswordNotFound" | "PasswordAuthNotAllowedByInvitation" | "OneTimeCodeExpired" | "InvalidBody" | "InvalidJwt" | "InvitationNoLongerValid" | "TokenRequestError" | "InvalidMfaReceipt" | "InvalidMfaPolicyCount" | "InvalidMfaPolicyNumAuthFactors" | "InvalidMfaPolicyNumAllowedApprovers" | "InvalidMfaPolicyGracePeriodTooLong" | "InvalidBabylonStakingPolicyParams" | "InvalidSuiTxReceiversEmptyAllowlist" | "InvalidBtcTxReceiversEmptyAllowlist" | "InvalidRequireRoleSessionAllowlist" | "InvalidCreateKeyCount" | "InvalidDiffieHellmanCount" | "OrgInviteExistingUser" | "OrgUserAlreadyExists" | "OrgNameTaken" | "KwkNotFoundInRegion" | "OrgIsNotOrgExport" | "RoleNameTaken" | "PolicyNameTaken" | "NameTaken" | "ContactNameInvalid" | "ContactAddressesInvalid" | "ContactModified" | "PolicyNotFound" | "PolicyVersionNotFound" | "PolicyRuleDisallowedByType" | "PolicyTypeDisallowed" | "PolicyDuplicateError" | "PolicyStillAttached" | "PolicyModified" | "PolicyNotAttached" | "AddKeyToRoleCountTooHigh" | "InvalidKeyId" | "InvalidTimeLockAlreadyInThePast" | "InvalidRestrictedScopes" | "InvalidUpdate" | "InvalidMetadataLength" | "InvalidLength" | "InvalidKeyMaterialId" | "KeyNotFound" | "SiweChallengeNotFound" | "SiweInvalidRequest" | "UserExportDerivedKey" | "UserExportPublicKeyInvalid" | "NistP256PublicKeyInvalid" | "UnableToAccessSmtpRelay" | "UserExportInProgress" | "RoleNotFound" | "InvalidRoleNameOrId" | "InvalidMfaReceiptOrgIdMissing" | "InvalidMfaReceiptInvalidOrgId" | "MfaRequestNotFound" | "InvalidKeyType" | "InvalidKeyMaterial" | "InvalidHexValue" | "InvalidBase32Value" | "InvalidBase58Value" | "InvalidSs58Value" | "InvalidForkVersionLength" | "InvalidEthAddress" | "InvalidStellarAddress" | "InvalidOrgNameOrId" | "InvalidUpdateOrgRequestDisallowedMfaType" | "InvalidUpdateOrgRequestEmptyAllowedMfaTypes" | "EmailOtpDelayTooShortForRegisterMfa" | "InvalidStakeDeposit" | "InvalidBlobSignRequest" | "InvalidDiffieHellmanRequest" | "InvalidSolanaSignRequest" | "InvalidEip712SignRequest" | "OnlySpecifyOne" | "NoOidcDataInProof" | "InvalidEvmSignRequest" | "InvalidEth2SignRequest" | "InvalidDeriveKeyRequest" | "InvalidStakingAmount" | "CustomStakingAmountNotAllowedForWrapperContract" | "InvalidUnstakeRequest" | "InvalidCreateUserRequest" | "UserAlreadyExists" | "IdpUserAlreadyExists" | "CognitoUserAlreadyOrgMember" | "UserNotFound" | "UserWithEmailNotFound" | "PolicyKeyMismatch" | "EmptyScopes" | "InvalidScopesForRoleSession" | "InvalidLifetime" | "NoSingleKeyForUser" | "InvalidOrgPolicyRule" | "SourceIpAllowlistEmpty" | "LimitWindowTooLong" | "Erc20ContractDisallowed" | "EmptyRuleError" | "OptionalListEmpty" | "MultipleExclusiveFieldsProvided" | "DuplicateFieldEntry" | "InvalidRange" | "InvalidOrgPolicyRepeatedRule" | "InvalidSuiTransaction" | "SuiSenderMismatch" | "AvaSignHashError" | "AvaSignError" | "BtcSegwitHashError" | "BtcTaprootHashError" | "BtcSignError" | "TaprootSignError" | "Eip712SignError" | "InvalidMemberRoleInUserAdd" | "InvalidMemberRoleInRecipientAdd" | "ThirdPartyUserAlreadyExists" | "OidcIdentityAlreadyExists" | "ThirdPartyUserNotFound" | "DeleteOidcUserError" | "DeleteUserError" | "SessionRoleMismatch" | "InvalidOidcToken" | "InvalidOidcIdentity" | "OidcIssuerUnsupported" | "OidcIssuerNotAllowed" | "OidcIssuerNoApplicableJwk" | "FidoKeyAlreadyRegistered" | "FidoKeySignCountTooLow" | "FidoVerificationFailed" | "FidoChallengeMfaMismatch" | "UnsupportedLegacyCognitoSession" | "InvalidIdentityProof" | "PaginationDataExpired" | "ExistingKeysViolateExclusiveKeyAccess" | "ExportDelayTooShort" | "ExportWindowTooLong" | "InvalidTotpFailureLimit" | "InvalidEip191SignRequest" | "CannotResendUserInvitation" | "InvalidNotificationEndpointCount" | "CannotDeletePendingSubscription" | "InvalidNotificationUrlProtocol" | "EmptyOneOfOrgEventFilter" | "EmptyAllExceptOrgEventFilter" | "InvalidTapNodeHash" | "InvalidOneTimeCode" | "MessageNotFound" | "MessageAlreadySigned" | "MessageRejected" | "MessageReplaced" | "InvalidMessageType" | "EmptyAddress" | "InvalidEth2SigningPolicySlotRange" | "InvalidEth2SigningPolicyEpochRange" | "InvalidEth2SigningPolicyTimestampRange" | "InvalidEth2SigningPolicyOverlappingRule" | "RpcUrlMissing" | "MmiChainIdMissing" | "EthersInvalidRpcUrl" | "EthersGetTransactionCountError" | "InvalidPassword" | "BabylonStakingFeePlusDustOverflow" | "BabylonStaking" | "BabylonStakingIncorrectKey" | "BabylonStakingSegwitNonDeposit" | "BabylonStakingRegistrationRequiresTaproot" | "PsbtSigning" | "TooManyResets" | "TooManyRequests" | "TooManyFailedLogins" | "BadBtcMessageSignP2shFlag" | "InvalidTendermintRequest" | "PolicyVersionMaxReached" | "PolicyVersionInvalid" | "AlienOwnerInvalid" | "EmptyUpdateRequest" | "InvalidPolicyReference" | "PolicyEngineDisabled" | "InvalidWasmPolicy" | "RedundantDerivationPath" | "ImportKeyMissing" | "InvalidAbiMethods" | "BabylonCovSign" | "InvalidPolicyLogsRequest" | "UserProfileMigrationMultipleEntries" | "UserProfileMigrationTooManyItems" | "InputTooShort" | "InvalidTweakLength";
2478
2543
  BillingArgs: {
2479
2544
  billing_org: components["schemas"]["Id"];
2480
2545
  event_type: components["schemas"]["BillingEvent"];
@@ -2491,7 +2556,7 @@ export interface components {
2491
2556
  * @description Billing event types.
2492
2557
  * @enum {string}
2493
2558
  */
2494
- BillingEvent: "Mmi" | "MmiMessageGet" | "MmiMessageList" | "MmiMessageSign" | "MmiMessageReject" | "MmiMessageDelete" | "AboutMe" | "UserResetEmailInit" | "UserResetEmailComplete" | "UserDeleteTotp" | "UserResetTotpInit" | "UserResetTotpComplete" | "UserVerifyTotp" | "UserRegisterFidoInit" | "UserRegisterFidoComplete" | "UserDeleteFido" | "CreateProofOidc" | "CreateProofCubeSigner" | "VerifyProof" | "AddOidcIdentity" | "RemoveOidcIdentity" | "ListOidcIdentities" | "GetOrg" | "UpdateOrg" | "GetOrgExport" | "CreateOrg" | "ListKeys" | "GetKey" | "GetKeyByMaterialId" | "ListKeyRoles" | "UpdateKey" | "ListHistoricalKeyTx" | "Invite" | "ListUsers" | "GetUser" | "GetUserByEmail" | "GetUserByOidc" | "UpdateMembership" | "ResetMemberMfa" | "CompleteResetMemberMfa" | "CreateRole" | "GetRole" | "ListTokenKeys" | "ListRoles" | "GetRoleKey" | "ListRoleKeys" | "ListRoleUsers" | "UpdateRole" | "DeleteRole" | "ConfigureEmail" | "ListHistoricalRoleTx" | "CreatePolicy" | "GetPolicy" | "ListPolicies" | "DeletePolicy" | "UpdatePolicy" | "InvokePolicy" | "GetPolicyLogs" | "UploadWasmPolicy" | "GetPolicySecrets" | "UpdatePolicySecrets" | "SetPolicySecret" | "DeletePolicySecret" | "CreatePolicyImportKey" | "UserExportDelete" | "UserExportList" | "UserExportInit" | "UserExportComplete" | "AddUserToRole" | "RemoveUserFromRole" | "MfaApproveCs" | "MfaRejectCs" | "MfaGet" | "MfaList" | "AddKeysToRole" | "RemoveKeyFromRole" | "CreateToken" | "CreateSession" | "RevokeSession" | "RevokeCurrentSession" | "RevokeSessions" | "ListSessions" | "GetSession" | "SignerSessionRefresh" | "MfaApproveTotp" | "MfaRejectTotp" | "MfaFidoInit" | "MfaApproveFidoComplete" | "MfaRejectFidoComplete" | "MfaEmailInit" | "MfaEmailComplete" | "Cube3signerHeartbeat" | "CreateContact" | "GetContact" | "ListContacts" | "DeleteContact" | "UpdateContact" | "LookupContactsByAddress" | "QueryMetrics" | "Counts" | "CreateKey" | "ImportKey" | "CreateKeyImportKey" | "DeriveKey" | "DeleteKey" | "AvaSign" | "AvaSerializedTxSign" | "BabylonRegistration" | "BabylonStaking" | "BabylonCovSign" | "BlobSign" | "BtcMessageSign" | "BtcSign" | "DiffieHellmanExchange" | "PsbtSign" | "PsbtLegacyInputSign" | "PsbtSegwitInputSign" | "PsbtTaprootInputSign" | "TaprootSign" | "Eip712Sign" | "Eip191Sign" | "Eth1Sign" | "Eth2Sign" | "SolanaSign" | "SuiSign" | "TendermintSign" | "Stake" | "Unstake" | "PasskeyAuthInit" | "PasskeyAuthComplete" | "OidcAuth" | "Oauth2Twitter" | "OAuth2TokenRefresh" | "EmailOtpAuth" | "SiweInit" | "SiweComplete" | "TelegramAuth" | "CreateOidcUser" | "DeleteOidcUser" | "DeleteUser" | "CreateEotsNonces" | "EotsSign" | "AuthMigrationIdentityAdd" | "AuthMigrationIdentityRemove" | "AuthMigrationUserUpdate" | "KeyCreated" | "KeyImported" | "InvitationAccept" | "IdpAuthenticate" | "IdpPasswordResetRequest" | "IdpPasswordResetConfirm" | "EsploraApiCall" | "ExecutePolicy" | "SentryApiCall" | "SentryApiCallPublic" | "MmiJwkSet" | "UserOrgs" | "PublicOrgInfo" | "EmailMyOrgs";
2559
+ BillingEvent: "Mmi" | "MmiMessageGet" | "MmiMessageList" | "MmiMessageSign" | "MmiMessageReject" | "MmiMessageDelete" | "AboutMe" | "UserResetEmailInit" | "UserResetEmailComplete" | "UserDeleteTotp" | "UserResetTotpInit" | "UserResetTotpComplete" | "UserVerifyTotp" | "UserRegisterFidoInit" | "UserRegisterFidoComplete" | "UserDeleteFido" | "CreateProofOidc" | "CreateProofCubeSigner" | "VerifyProof" | "AddOidcIdentity" | "RemoveOidcIdentity" | "ListOidcIdentities" | "GetOrg" | "UpdateOrg" | "GetOrgExport" | "CreateOrg" | "ListKeys" | "AttestKey" | "GetKey" | "GetKeyByMaterialId" | "ListKeyRoles" | "UpdateKey" | "ListHistoricalKeyTx" | "Invite" | "ListUsers" | "GetUser" | "GetUserByEmail" | "GetUserByOidc" | "UpdateMembership" | "ResetMemberMfa" | "CompleteResetMemberMfa" | "CreateRole" | "GetRole" | "ListTokenKeys" | "ListRoles" | "GetRoleKey" | "ListRoleKeys" | "ListRoleUsers" | "UpdateRole" | "DeleteRole" | "ConfigureEmail" | "ListHistoricalRoleTx" | "CreatePolicy" | "GetPolicy" | "ListPolicies" | "DeletePolicy" | "UpdatePolicy" | "InvokePolicy" | "GetPolicyLogs" | "UploadWasmPolicy" | "GetPolicySecrets" | "UpdatePolicySecrets" | "SetPolicySecret" | "DeletePolicySecret" | "CreatePolicyImportKey" | "UserExportDelete" | "UserExportList" | "UserExportInit" | "UserExportComplete" | "AddUserToRole" | "RemoveUserFromRole" | "MfaApproveCs" | "MfaRejectCs" | "MfaGet" | "MfaList" | "AddKeysToRole" | "RemoveKeyFromRole" | "CreateToken" | "CreateSession" | "RevokeSession" | "RevokeCurrentSession" | "RevokeSessions" | "ListSessions" | "GetSession" | "SignerSessionRefresh" | "MfaApproveTotp" | "MfaRejectTotp" | "MfaFidoInit" | "MfaApproveFidoComplete" | "MfaRejectFidoComplete" | "MfaEmailInit" | "MfaEmailComplete" | "Cube3signerHeartbeat" | "CreateContact" | "GetContact" | "ListContacts" | "DeleteContact" | "UpdateContact" | "LookupContactsByAddress" | "QueryMetrics" | "Counts" | "CreateKey" | "ImportKey" | "CreateKeyImportKey" | "DeriveKey" | "DeleteKey" | "AvaSign" | "AvaSerializedTxSign" | "BabylonRegistration" | "BabylonStaking" | "BabylonCovSign" | "BlobSign" | "BtcMessageSign" | "BtcSign" | "DiffieHellmanExchange" | "PsbtSign" | "PsbtLegacyInputSign" | "PsbtSegwitInputSign" | "PsbtTaprootInputSign" | "TaprootSign" | "Eip712Sign" | "Eip191Sign" | "Eth1Sign" | "Eth2Sign" | "SolanaSign" | "SuiSign" | "TendermintSign" | "Stake" | "Unstake" | "PasskeyAuthInit" | "PasskeyAuthComplete" | "OidcAuth" | "Oauth2Twitter" | "OAuth2TokenRefresh" | "EmailOtpAuth" | "SiweInit" | "SiweComplete" | "TelegramAuth" | "CreateOidcUser" | "DeleteOidcUser" | "DeleteUser" | "CreateEotsNonces" | "EotsSign" | "AuthMigrationIdentityAdd" | "AuthMigrationIdentityRemove" | "AuthMigrationUserUpdate" | "KeyCreated" | "KeyImported" | "InvitationAccept" | "IdpAuthenticate" | "IdpPasswordResetRequest" | "IdpPasswordResetConfirm" | "EsploraApiCall" | "ExecutePolicy" | "SentryApiCall" | "SentryApiCallPublic" | "MmiJwkSet" | "AttestationJwkSet" | "UserOrgs" | "PublicOrgInfo" | "EmailMyOrgs";
2495
2560
  /** @description A bitcoin address and its network. */
2496
2561
  BitcoinAddressInfo: {
2497
2562
  /**
@@ -2507,6 +2572,12 @@ export interface components {
2507
2572
  * }
2508
2573
  */
2509
2574
  BlobSignRequest: {
2575
+ /**
2576
+ * @description Request additional information to be included in the response, explaining
2577
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
2578
+ * Defaults to false.
2579
+ */
2580
+ explain?: boolean;
2510
2581
  /**
2511
2582
  * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
2512
2583
  * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
@@ -2546,8 +2617,8 @@ export interface components {
2546
2617
  */
2547
2618
  message_base64: string;
2548
2619
  /**
2549
- * @description An optional tweak value for use *only* with Segwit (i.e., SecpBtc and SecpBtcTest)
2550
- * keys. This field must not be supplied for requests involving any other key type.
2620
+ * @description An optional tweak value for use only with (some) secp256k1 key types.
2621
+ * This field must not be supplied for requests involving any other key type.
2551
2622
  *
2552
2623
  * If this field is not present or null, no tweak is applied. Otherwise, this field
2553
2624
  * must contain a base-64 string encoding a vector of exactly 32 bytes. See the
@@ -2584,6 +2655,12 @@ export interface components {
2584
2655
  };
2585
2656
  /** @description Data to sign */
2586
2657
  BtcMessageSignRequest: {
2658
+ /**
2659
+ * @description Request additional information to be included in the response, explaining
2660
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
2661
+ * Defaults to false.
2662
+ */
2663
+ explain?: boolean;
2587
2664
  /**
2588
2665
  * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
2589
2666
  * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
@@ -2600,12 +2677,21 @@ export interface components {
2600
2677
  };
2601
2678
  /** @description BTC message signing response */
2602
2679
  BtcMessageSignResponse: {
2680
+ /** @description Optional policy evaluation tree. */
2681
+ policy_eval_tree?: unknown;
2682
+ } & {
2603
2683
  /** @description The base64-encoded signature in BIP137 format. */
2604
2684
  sig: string;
2605
2685
  };
2606
2686
  /** @enum {string} */
2607
2687
  BtcSighashType: "All" | "None" | "Single" | "AllPlusAnyoneCanPay" | "NonePlusAnyoneCanPay" | "SinglePlusAnyoneCanPay";
2608
2688
  BtcSignRequest: {
2689
+ /**
2690
+ * @description Request additional information to be included in the response, explaining
2691
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
2692
+ * Defaults to false.
2693
+ */
2694
+ explain?: boolean;
2609
2695
  /**
2610
2696
  * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
2611
2697
  * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
@@ -2948,6 +3034,27 @@ export interface components {
2948
3034
  };
2949
3035
  /** @description Request for creating a named policy */
2950
3036
  CreatePolicyRequest: {
3037
+ /**
3038
+ * @description Access-control entries defining how the policy can be accessed, modified,
3039
+ * attached and executed.
3040
+ * @example [
3041
+ * {
3042
+ * "action": "attach",
3043
+ * "resources": [
3044
+ * {
3045
+ * "key_id": "*",
3046
+ * "role_id": "Role#e427c28a-9c5b-49cc-a257-878aea58a22c"
3047
+ * }
3048
+ * ],
3049
+ * "subjects": "*"
3050
+ * },
3051
+ * {
3052
+ * "action": "sign",
3053
+ * "subjects": "Role#e427c28a-9c5b-49cc-a257-878aea58a22c"
3054
+ * }
3055
+ * ]
3056
+ */
3057
+ acl?: unknown[] | null;
2951
3058
  edit_policy?: components["schemas"]["EditPolicy"] | null;
2952
3059
  /** @description Optional metadata. */
2953
3060
  metadata?: unknown;
@@ -3132,6 +3239,12 @@ export interface components {
3132
3239
  mnemonic_id?: string | null;
3133
3240
  };
3134
3241
  DiffieHellmanRequest: {
3242
+ /**
3243
+ * @description Request additional information to be included in the response, explaining
3244
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
3245
+ * Defaults to false.
3246
+ */
3247
+ explain?: boolean;
3135
3248
  /**
3136
3249
  * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
3137
3250
  * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
@@ -3159,7 +3272,7 @@ export interface components {
3159
3272
  public_key?: string | null;
3160
3273
  };
3161
3274
  /** @description The result of a Diffie Hellman key exchange */
3162
- DiffieHellmanResponse: {
3275
+ DiffieHellmanResponse: ({
3163
3276
  /** @description The resulting points as base64-encoded byte strings in a key-type--dependent format. */
3164
3277
  points: string[];
3165
3278
  /** @enum {string} */
@@ -3177,7 +3290,10 @@ export interface components {
3177
3290
  ephemeral_public_key: string;
3178
3291
  /** @enum {string} */
3179
3292
  response_type: "encrypted";
3180
- };
3293
+ }) & {
3294
+ /** @description Optional policy evaluation tree. */
3295
+ policy_eval_tree?: unknown;
3296
+ } & Record<string, never>;
3181
3297
  /**
3182
3298
  * @description A policy which governs when and who is allowed to update the entity this policy is
3183
3299
  * attached to (e.g., a role or a key).
@@ -3198,6 +3314,12 @@ export interface components {
3198
3314
  time_lock_until?: components["schemas"]["EpochDateTime"] | null;
3199
3315
  };
3200
3316
  Eip191SignRequest: {
3317
+ /**
3318
+ * @description Request additional information to be included in the response, explaining
3319
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
3320
+ * Defaults to false.
3321
+ */
3322
+ explain?: boolean;
3201
3323
  /**
3202
3324
  * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
3203
3325
  * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
@@ -3209,6 +3331,13 @@ export interface components {
3209
3331
  * @example 0xdeadbeef13c0ffee
3210
3332
  */
3211
3333
  data: string;
3334
+ /**
3335
+ * @description An optional tweak value that will be applied to the secret key before signing.
3336
+ * This field must contain a base-64 string encoding a vector of exactly 32 bytes.
3337
+ * See the CubeSigner documentation for more information on the tweaking procedure.
3338
+ * @example F41HAy2q5Gn8laF2CuMsZbRAQTmD+4Ob3VUMZ7TBGK4=
3339
+ */
3340
+ tweak?: string | null;
3212
3341
  };
3213
3342
  /**
3214
3343
  * @example {
@@ -3302,6 +3431,12 @@ export interface components {
3302
3431
  * }
3303
3432
  */
3304
3433
  Eip712SignRequest: {
3434
+ /**
3435
+ * @description Request additional information to be included in the response, explaining
3436
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
3437
+ * Defaults to false.
3438
+ */
3439
+ explain?: boolean;
3305
3440
  /**
3306
3441
  * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
3307
3442
  * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
@@ -3313,6 +3448,13 @@ export interface components {
3313
3448
  * @description The chain-id to which this typed data will be sent
3314
3449
  */
3315
3450
  chain_id: number;
3451
+ /**
3452
+ * @description An optional tweak value that will be applied to the secret key before signing.
3453
+ * This field must contain a base-64 string encoding a vector of exactly 32 bytes.
3454
+ * See the CubeSigner documentation for more information on the tweaking procedure.
3455
+ * @example F41HAy2q5Gn8laF2CuMsZbRAQTmD+4Ob3VUMZ7TBGK4=
3456
+ */
3457
+ tweak?: string | null;
3316
3458
  typed_data: components["schemas"]["TypedData"];
3317
3459
  };
3318
3460
  Email: string;
@@ -3379,6 +3521,12 @@ export interface components {
3379
3521
  * at a specified block height.
3380
3522
  */
3381
3523
  EotsCreateNonceRequest: {
3524
+ /**
3525
+ * @description Request additional information to be included in the response, explaining
3526
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
3527
+ * Defaults to false.
3528
+ */
3529
+ explain?: boolean;
3382
3530
  /**
3383
3531
  * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
3384
3532
  * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
@@ -3404,6 +3552,9 @@ export interface components {
3404
3552
  };
3405
3553
  /** @description Response generated when creating EOTS nonces */
3406
3554
  EotsCreateNonceResponse: {
3555
+ /** @description Optional policy evaluation tree. */
3556
+ policy_eval_tree?: unknown;
3557
+ } & {
3407
3558
  /**
3408
3559
  * @description The generated nonces as an array of 0x-prefixed hex strings
3409
3560
  * @example [
@@ -3415,6 +3566,12 @@ export interface components {
3415
3566
  };
3416
3567
  /** @description Request for an EOTS signature on a specified message, chain-id, block-height triple */
3417
3568
  EotsSignRequest: {
3569
+ /**
3570
+ * @description Request additional information to be included in the response, explaining
3571
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
3572
+ * Defaults to false.
3573
+ */
3574
+ explain?: boolean;
3418
3575
  /**
3419
3576
  * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
3420
3577
  * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
@@ -3466,6 +3623,8 @@ export interface components {
3466
3623
  error_code: components["schemas"]["SignerErrorCode"];
3467
3624
  /** @description Error message */
3468
3625
  message: string;
3626
+ /** @description Optional policy evaluation tree (included in signer responses, when requested) */
3627
+ policy_eval_tree?: unknown;
3469
3628
  /** @description Optional request identifier */
3470
3629
  request_id?: string;
3471
3630
  };
@@ -3498,6 +3657,12 @@ export interface components {
3498
3657
  * }
3499
3658
  */
3500
3659
  Eth1SignRequest: {
3660
+ /**
3661
+ * @description Request additional information to be included in the response, explaining
3662
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
3663
+ * Defaults to false.
3664
+ */
3665
+ explain?: boolean;
3501
3666
  /**
3502
3667
  * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
3503
3668
  * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
@@ -3509,9 +3674,19 @@ export interface components {
3509
3674
  * @description The chain id to set in the given transaction.
3510
3675
  */
3511
3676
  chain_id: number;
3677
+ /**
3678
+ * @description An optional tweak value that will be applied to the secret key before signing.
3679
+ * This field must contain a base-64 string encoding a vector of exactly 32 bytes.
3680
+ * See the CubeSigner documentation for more information on the tweaking procedure.
3681
+ * @example F41HAy2q5Gn8laF2CuMsZbRAQTmD+4Ob3VUMZ7TBGK4=
3682
+ */
3683
+ tweak?: string | null;
3512
3684
  tx: components["schemas"]["Transaction"];
3513
3685
  };
3514
3686
  Eth1SignResponse: {
3687
+ /** @description Optional policy evaluation tree. */
3688
+ policy_eval_tree?: unknown;
3689
+ } & {
3515
3690
  /**
3516
3691
  * @description Hex-encoded RLP encoding of the transaction and its signature
3517
3692
  * @example 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
@@ -3539,6 +3714,18 @@ export interface components {
3539
3714
  * }
3540
3715
  */
3541
3716
  Eth2SignRequest: {
3717
+ /**
3718
+ * @description Request additional information to be included in the response, explaining
3719
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
3720
+ * Defaults to false.
3721
+ */
3722
+ explain?: boolean;
3723
+ /**
3724
+ * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
3725
+ * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
3726
+ */
3727
+ metadata?: unknown;
3728
+ } & {
3542
3729
  /**
3543
3730
  * @description Subset of the Web3Signer Eth2 BLS signing request whose schema is defined
3544
3731
  * [here](https://consensys.github.io/web3signer/web3signer-eth2.html#tag/Signing/operation/ETH2_SIGN).
@@ -3547,13 +3734,6 @@ export interface components {
3547
3734
  eth2_sign_request: Record<string, never>;
3548
3735
  network: components["schemas"]["Network"];
3549
3736
  };
3550
- Eth2SignResponse: {
3551
- /**
3552
- * @description Hex encoded signature prefixed with 0x e.g. "0x0000..."
3553
- * @example 0xb4f2ef9d12a54e1f569596c07c97d6d730535b6ffc0d287761dc78103a86326782471a04c75ce7a6faea08ca9a4a0830031cdcb893da8711d54aa22619f1a7e71b8185ddf4c6bfd9babbd735960e35e56bd6eeb89625b04850e7a9ef8846e549
3554
- */
3555
- signature: string;
3556
- };
3557
3737
  /**
3558
3738
  * @description Representation of an event. This type is used to serialize events to CloudWatch Logs and to
3559
3739
  * deserialize them when analyzing the logs.
@@ -3633,6 +3813,12 @@ export interface components {
3633
3813
  * @enum {string}
3634
3814
  */
3635
3815
  ExecutionSource: "SignRequest" | "UserInvocation";
3816
+ /**
3817
+ * ExplicitScope
3818
+ * @description Explicitly named scopes for accessing CubeSigner APIs
3819
+ * @enum {string}
3820
+ */
3821
+ ExplicitScope: "sign:*" | "sign:ava" | "sign:blob" | "sign:diffieHellman" | "sign:btc:*" | "sign:btc:segwit" | "sign:btc:taproot" | "sign:btc:psbt:*" | "sign:btc:psbt:doge" | "sign:btc:psbt:legacy" | "sign:btc:psbt:segwit" | "sign:btc:psbt:taproot" | "sign:btc:psbt:ltcSegwit" | "sign:btc:message:*" | "sign:btc:message:segwit" | "sign:btc:message:legacy" | "sign:babylon:*" | "sign:babylon:eots:*" | "sign:babylon:eots:nonces" | "sign:babylon:eots:sign" | "sign:babylon:staking:*" | "sign:babylon:staking:deposit" | "sign:babylon:staking:unbond" | "sign:babylon:staking:withdraw" | "sign:babylon:staking:slash" | "sign:babylon:registration" | "sign:babylon:covenant" | "sign:evm:*" | "sign:evm:tx" | "sign:evm:eip191" | "sign:evm:eip712" | "sign:eth2:*" | "sign:eth2:validate" | "sign:eth2:stake" | "sign:eth2:unstake" | "sign:solana" | "sign:sui" | "sign:tendermint" | "sign:mmi" | "manage:*" | "manage:readonly" | "manage:email" | "manage:mfa:*" | "manage:mfa:readonly" | "manage:mfa:list" | "manage:mfa:vote:*" | "manage:mfa:vote:cs" | "manage:mfa:vote:email" | "manage:mfa:vote:fido" | "manage:mfa:vote:totp" | "manage:mfa:register:*" | "manage:mfa:register:fido" | "manage:mfa:register:totp" | "manage:mfa:register:email" | "manage:mfa:unregister:*" | "manage:mfa:unregister:fido" | "manage:mfa:unregister:totp" | "manage:mfa:verify:*" | "manage:mfa:verify:totp" | "manage:key:*" | "manage:key:readonly" | "manage:key:get" | "manage:key:attest" | "manage:key:listRoles" | "manage:key:list" | "manage:key:history:tx:list" | "manage:key:create" | "manage:key:import" | "manage:key:update:*" | "manage:key:update:owner" | "manage:key:update:policy" | "manage:key:update:enabled" | "manage:key:update:metadata" | "manage:key:update:editPolicy" | "manage:key:delete" | "manage:policy:*" | "manage:policy:create" | "manage:policy:get" | "manage:policy:list" | "manage:policy:delete" | "manage:policy:update:*" | "manage:policy:update:owner" | "manage:policy:update:name" | "manage:policy:update:acl" | "manage:policy:update:editPolicy" | "manage:policy:update:metadata" | "manage:policy:update:rule" | "manage:policy:invoke" | "manage:policy:wasm:*" | "manage:policy:wasm:upload" | "manage:policy:secrets:*" | "manage:policy:secrets:get" | "manage:policy:secrets:update:*" | "manage:policy:secrets:update:values" | "manage:policy:secrets:update:editPolicy" | "manage:contact:*" | "manage:contact:create" | "manage:contact:get" | "manage:contact:list" | "manage:contact:delete" | "manage:contact:update:*" | "manage:contact:update:name" | "manage:contact:update:addresses" | "manage:contact:update:owner" | "manage:contact:update:metadata" | "manage:contact:update:editPolicy" | "manage:contact:lookup:*" | "manage:contact:lookup:address" | "manage:policy:createImportKey" | "manage:role:*" | "manage:role:readonly" | "manage:role:create" | "manage:role:delete" | "manage:role:get:*" | "manage:role:get:keys" | "manage:role:get:keys:list" | "manage:role:get:keys:get" | "manage:role:get:users" | "manage:role:list" | "manage:role:update:*" | "manage:role:update:enabled" | "manage:role:update:policy" | "manage:role:update:editPolicy" | "manage:role:update:key:*" | "manage:role:update:key:add" | "manage:role:update:key:remove" | "manage:role:update:user:*" | "manage:role:update:user:add" | "manage:role:update:user:remove" | "manage:role:history:tx:list" | "manage:identity:*" | "manage:identity:verify" | "manage:identity:add" | "manage:identity:remove" | "manage:identity:list" | "manage:org:*" | "manage:org:create" | "manage:org:metrics:query" | "manage:org:readonly" | "manage:org:addUser" | "manage:org:inviteUser" | "manage:org:inviteAlien" | "manage:org:updateMembership" | "manage:org:listUsers" | "manage:org:user:get" | "manage:org:deleteUser" | "manage:org:get" | "manage:org:user:resetMfa" | "manage:session:*" | "manage:session:readonly" | "manage:session:get" | "manage:session:list" | "manage:session:create" | "manage:session:extend" | "manage:session:revoke" | "manage:export:*" | "manage:export:org:*" | "manage:export:org:get" | "manage:export:user:*" | "manage:export:user:delete" | "manage:export:user:list" | "manage:authMigration:*" | "manage:authMigration:identity:add" | "manage:authMigration:identity:remove" | "manage:authMigration:user:update" | "manage:mmi:*" | "manage:mmi:readonly" | "manage:mmi:get" | "manage:mmi:list" | "manage:mmi:reject" | "manage:mmi:delete" | "export:*" | "export:user:*" | "export:user:init" | "export:user:complete" | "mmi:*" | "orgAccess:*" | "orgAccess:child:*";
3636
3822
  /**
3637
3823
  * @description This type specifies the interpretation of the `fee` field in Babylon
3638
3824
  * staking requests. If `sats`, the field is intpreted as a fixed value
@@ -3688,7 +3874,7 @@ export interface components {
3688
3874
  request_device_identifier?: boolean;
3689
3875
  };
3690
3876
  /** @enum {string} */
3691
- ForbiddenErrorCode: "CannotAssumeIdentity" | "SentryDisallowed" | "PasskeyLoginDisabled" | "PasskeyNotRegistered" | "CannotCreateOrg" | "WrongMfaEmailOtpJwt" | "OrgFlagNotSet" | "FidoRequiredToRemoveTotp" | "OidcIdentityLimitReached" | "OidcScopeCeilingMissing" | "OidcIssuerNotAllowedForMemberRole" | "OidcNoMemberRolesAllowed" | "EmailOtpNotConfigured" | "MfaChallengeExpired" | "ChainIdNotAllowed" | "InvalidOrg" | "OrgIdMismatch" | "SessionForWrongOrg" | "SelfDelete" | "SelfDisable" | "InvalidOrgMembershipRoleChange" | "UserDisabled" | "OrgDisabled" | "OrgNotFound" | "OrgWithoutOwner" | "OrphanedUser" | "OidcUserNotFound" | "UserNotInOrg" | "UserNotOrgOwner" | "UserNotKeyOwner" | "InvalidRole" | "DisabledRole" | "KeyDisabled" | "KeyNotInRole" | "ContactNotInOrg" | "UserExportRequestNotInOrg" | "UserExportRequestInvalid" | "UserExportDisabled" | "UserNotOriginalKeyOwner" | "UserNotInRole" | "MustBeFullMember" | "SessionExpired" | "SessionChanged" | "SessionRevoked" | "ExpectedUserSession" | "SessionRoleChanged" | "ScopedNameNotFound" | "SessionInvalidEpochToken" | "SessionInvalidRefreshToken" | "SessionRefreshTokenExpired" | "InvalidAuthHeader" | "SessionNotFound" | "InvalidArn" | "SessionInvalidAuthToken" | "SessionAuthTokenExpired" | "SessionPossiblyStolenToken" | "MfaDisallowedIdentity" | "MfaDisallowedApprover" | "MfaTypeNotAllowed" | "MfaNotApprovedYet" | "MfaConfirmationCodeMismatch" | "MfaHttpRequestMismatch" | "MfaRemoveBelowMin" | "MfaOrgRequirementNotMet" | "MfaRegistrationDisallowed" | "TotpAlreadyConfigured" | "TotpConfigurationChanged" | "MfaTotpBadConfiguration" | "MfaTotpBadCode" | "MfaTotpRateLimit" | "ImproperSessionScope" | "FullSessionRequired" | "SessionWithoutAnyScopeUnder" | "UserRoleUnprivileged" | "MemberRoleForbidden" | "MfaNotConfigured" | "RemoveLastOidcIdentity" | "OperationNotAllowed" | "OrgExportRetrievalDisabled" | "AutoAddBlsKeyToProtectedRole" | "UserNotPolicyOwner" | "UserNotContactOwner" | "LegacySessionCannotHaveScopeCeiling" | "RoleInParentOrgNotAllowed" | "RemoveKeyFromRoleUserNotAllowed" | "SiweChallengeExpired" | "SiweMessageNotValid" | "SiweMessageInvalidSignature";
3877
+ ForbiddenErrorCode: "CannotAssumeIdentity" | "SentryDisallowed" | "PasskeyLoginDisabled" | "PasskeyNotRegistered" | "CannotCreateOrg" | "WrongMfaEmailOtpJwt" | "OrgFlagNotSet" | "FidoRequiredToRemoveTotp" | "OidcIdentityLimitReached" | "OidcScopeCeilingMissing" | "OidcIssuerNotAllowedForMemberRole" | "OidcNoMemberRolesAllowed" | "EmailOtpNotConfigured" | "MfaChallengeExpired" | "ChainIdNotAllowed" | "InvalidOrg" | "OrgIdMismatch" | "SessionForWrongOrg" | "SelfDelete" | "SelfDisable" | "InvalidOrgMembershipRoleChange" | "UserDisabled" | "OrgDisabled" | "OrgNotFound" | "OrgWithoutOwner" | "OrphanedUser" | "OidcUserNotFound" | "UserNotInOrg" | "UserNotOrgOwner" | "UserNotKeyOwner" | "InvalidRole" | "DisabledRole" | "KeyDisabled" | "KeyNotInRole" | "ContactNotInOrg" | "UserExportRequestNotInOrg" | "UserExportRequestInvalid" | "UserExportDisabled" | "UserNotOriginalKeyOwner" | "UserNotInRole" | "MustBeFullMember" | "SessionExpired" | "SessionChanged" | "SessionRevoked" | "ExpectedUserSession" | "SessionRoleChanged" | "ScopedNameNotFound" | "SessionInvalidEpochToken" | "SessionInvalidRefreshToken" | "SessionRefreshTokenExpired" | "InvalidAuthHeader" | "SessionNotFound" | "InvalidArn" | "SessionInvalidAuthToken" | "SessionAuthTokenExpired" | "SessionPossiblyStolenToken" | "MfaDisallowedIdentity" | "MfaDisallowedApprover" | "MfaTypeNotAllowed" | "MfaNotApprovedYet" | "MfaConfirmationCodeMismatch" | "MfaHttpRequestMismatch" | "MfaRemoveBelowMin" | "MfaOrgRequirementNotMet" | "MfaRegistrationDisallowed" | "TotpAlreadyConfigured" | "TotpConfigurationChanged" | "MfaTotpBadConfiguration" | "MfaTotpBadCode" | "MfaTotpRateLimit" | "ImproperSessionScope" | "FullSessionRequired" | "SessionWithoutAnyScopeUnder" | "UserRoleUnprivileged" | "MemberRoleForbidden" | "MfaNotConfigured" | "RemoveLastOidcIdentity" | "OperationNotAllowed" | "OrgExportRetrievalDisabled" | "AutoAddBlsKeyToProtectedRole" | "UserNotPolicyOwner" | "UserNotContactOwner" | "LegacySessionCannotHaveScopeCeiling" | "RoleInParentOrgNotAllowed" | "RemoveKeyFromRoleUserNotAllowed" | "SiweChallengeExpired" | "SiweMessageNotValid" | "SiweMessageInvalidSignature" | "Acl";
3692
3878
  /**
3693
3879
  * @description Specifies a fork of the `BeaconChain`, to prevent replay attacks.
3694
3880
  * The schema of `Fork` is defined in the [Beacon chain
@@ -3920,7 +4106,7 @@ export interface components {
3920
4106
  } | null;
3921
4107
  };
3922
4108
  /** @enum {string} */
3923
- InternalErrorCode: "NoMaterialId" | "UnresolvedPolicyReference" | "FidoKeyAssociatedWithMultipleUsers" | "ClaimsParseError" | "InvalidThrottleId" | "InvalidEmailAddress" | "EmailTemplateRender" | "OidcIdentityHeaderMissing" | "OidcIdentityParseError" | "SystemTimeError" | "PasswordHashParseError" | "SendMailError" | "ReqwestError" | "EmailConstructionError" | "TsWriteError" | "TsQueryError" | "DbQueryError" | "DbGetError" | "DbDeleteError" | "DbPutError" | "DbUpdateError" | "SerdeError" | "TestAndSetError" | "DbGetItemsError" | "DbWriteError" | "CubistSignerError" | "CwListMetricsError" | "CwPutMetricDataError" | "GetAwsSecretError" | "SecretNotFound" | "KmsGenerateRandomError" | "MalformedTotpBytes" | "KmsGenerateRandomNoResponseError" | "CreateKeyError" | "ParseDerivationPathError" | "SplitSignerError" | "CreateImportKeyError" | "CreateEotsNoncesError" | "EotsSignError" | "BabylonCovSignError" | "CognitoDeleteUserError" | "CognitoListUsersError" | "CognitoGetUserError" | "MissingUserEmail" | "CognitoResendUserInvitation" | "CognitoSetUserPasswordError" | "GenericInternalError" | "OidcAuthWithoutOrg" | "MissingKeyMetadata" | "KmsEnableKeyError" | "KmsDisableKeyError" | "LambdaInvokeError" | "LambdaNoResponseError" | "LambdaFailure" | "LambdaUnparsableResponse" | "SerializeEncryptedExportKeyError" | "DeserializeEncryptedExportKeyError" | "ReEncryptUserExport" | "S3UploadError" | "S3DownloadError" | "S3CopyError" | "S3ListObjectsError" | "S3DeleteObjectsError" | "S3BuildError" | "S3PresignedUrlError" | "ManagedStateMissing" | "InternalHeaderMissing" | "InvalidInternalHeaderValue" | "RequestLocalStateAlreadySet" | "OidcOrgMismatch" | "OidcIssuerInvalidJwk" | "InvalidPkForMaterialId" | "UncheckedOrg" | "SessionOrgIdMissing" | "AvaSignCredsMissing" | "AvaSignSignatureMissing" | "ExpectedRoleSession" | "InvalidThirdPartyIdentity" | "CognitoGetUser" | "SnsSubscribeError" | "SnsUnsubscribeError" | "SnsGetSubscriptionAttributesError" | "SnsSubscriptionAttributesMissing" | "SnsSetSubscriptionAttributesError" | "SnsPublishBatchError" | "InconsistentMultiValueTestAndSet" | "MaterialIdError" | "InvalidBtcAddress" | "HistoricalTxBodyMissing" | "InvalidOperation" | "ParentOrgNotFound" | "OrgParentLoop" | "ResolvedParentOrgWithNoScopeCeiling" | "InvalidUploadObjectId" | "PolicyEngineNotFound" | "PolicyEngineError" | "PolicySecretsEncryptionError" | "CreatePolicyImportKeyError" | "InvalidAlias" | "EmptyUpdateModifiedObject" | "EmptyUpdateModifiedActions" | "DbContactAddressesInvalid";
4109
+ InternalErrorCode: "NoMaterialId" | "UnexpectedCheckerRule" | "UnresolvedPolicyReference" | "FidoKeyAssociatedWithMultipleUsers" | "ClaimsParseError" | "InvalidThrottleId" | "InvalidEmailAddress" | "EmailTemplateRender" | "OidcIdentityHeaderMissing" | "OidcIdentityParseError" | "SystemTimeError" | "PasswordHashParseError" | "SendMailError" | "ReqwestError" | "EmailConstructionError" | "TsWriteError" | "TsQueryError" | "DbQueryError" | "DbGetError" | "DbDeleteError" | "DbPutError" | "DbUpdateError" | "SerdeError" | "TestAndSetError" | "DbGetItemsError" | "DbWriteError" | "CubistSignerError" | "CwListMetricsError" | "CwPutMetricDataError" | "GetAwsSecretError" | "SecretNotFound" | "KmsGenerateRandomError" | "MalformedTotpBytes" | "KmsGenerateRandomNoResponseError" | "CreateKeyError" | "ParseDerivationPathError" | "SplitSignerError" | "CreateImportKeyError" | "CreateEotsNoncesError" | "EotsSignError" | "BabylonCovSignError" | "CognitoDeleteUserError" | "CognitoListUsersError" | "CognitoGetUserError" | "MissingUserEmail" | "CognitoResendUserInvitation" | "CognitoSetUserPasswordError" | "GenericInternalError" | "OidcAuthWithoutOrg" | "MissingKeyMetadata" | "KmsEnableKeyError" | "KmsDisableKeyError" | "LambdaInvokeError" | "LambdaNoResponseError" | "LambdaFailure" | "LambdaUnparsableResponse" | "SerializeEncryptedExportKeyError" | "DeserializeEncryptedExportKeyError" | "ReEncryptUserExport" | "S3UploadError" | "S3DownloadError" | "S3CopyError" | "S3ListObjectsError" | "S3DeleteObjectsError" | "S3BuildError" | "S3PresignedUrlError" | "ManagedStateMissing" | "InternalHeaderMissing" | "InvalidInternalHeaderValue" | "RequestLocalStateAlreadySet" | "OidcOrgMismatch" | "OidcIssuerInvalidJwk" | "InvalidPkForMaterialId" | "SegwitTweakFailed" | "UncheckedOrg" | "SessionOrgIdMissing" | "AvaSignCredsMissing" | "AvaSignSignatureMissing" | "ExpectedRoleSession" | "InvalidThirdPartyIdentity" | "CognitoGetUser" | "SnsSubscribeError" | "SnsUnsubscribeError" | "SnsGetSubscriptionAttributesError" | "SnsSubscriptionAttributesMissing" | "SnsSetSubscriptionAttributesError" | "SnsPublishBatchError" | "InconsistentMultiValueTestAndSet" | "MaterialIdError" | "InvalidBtcAddress" | "HistoricalTxBodyMissing" | "InvalidOperation" | "ParentOrgNotFound" | "OrgParentLoop" | "ResolvedParentOrgWithNoScopeCeiling" | "InvalidUploadObjectId" | "PolicyEngineNotFound" | "PolicyEngineError" | "PolicySecretsEncryptionError" | "CreatePolicyImportKeyError" | "InvalidAlias" | "EmptyUpdateModifiedObject" | "EmptyUpdateModifiedActions" | "DbContactAddressesInvalid";
3924
4110
  InvitationAcceptRequest: {
3925
4111
  auth: components["schemas"]["AuthSource"];
3926
4112
  /** @description Invitation token */
@@ -4070,7 +4256,10 @@ export interface components {
4070
4256
  /** @description The type of key this package represents */
4071
4257
  key_type: string;
4072
4258
  };
4073
- JwkSetResponse: Record<string, never>;
4259
+ JwkSetResponse: {
4260
+ /** @description The keys included in this set */
4261
+ keys: Record<string, never>[];
4262
+ };
4074
4263
  KeyCountDimensions: {
4075
4264
  /** @description The key type */
4076
4265
  key_type: string;
@@ -4161,6 +4350,8 @@ export interface components {
4161
4350
  * ]
4162
4351
  */
4163
4352
  policy: unknown[];
4353
+ /** @description The key provenance. */
4354
+ provenance?: string | null;
4164
4355
  /**
4165
4356
  * @description Hex-encoded, serialized public key. The format used depends on the key type:
4166
4357
  * - Secp256k1 keys use 65-byte uncompressed SECG format;
@@ -4178,6 +4369,11 @@ export interface components {
4178
4369
  /** @description The region affinity for this key */
4179
4370
  region?: string;
4180
4371
  };
4372
+ /** @description Response returned when requesting a key attestation. */
4373
+ KeyInfoJwt: {
4374
+ /** @description A JSON Web Token whose claims contain the `KeyInfo` structure. */
4375
+ jwt: string;
4376
+ };
4181
4377
  KeyInfos: {
4182
4378
  keys: components["schemas"]["KeyInfo"][];
4183
4379
  };
@@ -5295,6 +5491,11 @@ export interface components {
5295
5491
  } | null;
5296
5492
  message_tx?: components["schemas"]["TypedTransaction"] | null;
5297
5493
  }) & Record<string, never>;
5494
+ /**
5495
+ * @description The possible actions that can be performed on a [NamedPolicy] that are restricted by ACL.
5496
+ * @enum {string}
5497
+ */
5498
+ PolicyAction: "ReadAll" | "ReadPolicy" | "ReadLogs" | "UpdateAll" | "UpdateName" | "UpdateRules" | "UpdateMetadata" | "UpdateEditPolicy" | "UpdateOwner" | "UpdateAcl" | "Delete" | "Attach" | "Sign" | "Invoke";
5298
5499
  /** @description The id for attaching a named policy to a key, role, or key in role. */
5299
5500
  PolicyAttachedToId: OneOf<[
5300
5501
  {
@@ -5339,6 +5540,8 @@ export interface components {
5339
5540
  PolicyErrorOwnCodes: "SuiTxReceiversDisallowedTransactionKind" | "SuiTxReceiversDisallowedTransferAddress" | "SuiTxReceiversDisallowedCommand" | "BtcTxDisallowedOutputs" | "BtcSignatureExceededValue" | "BtcValueOverflow" | "BtcSighashTypeDisallowed" | "EvmTxReceiverMismatch" | "EvmTxSenderMismatch" | "EvmTxExceededValue" | "EvmTxExceededGasCost" | "EvmTxGasCostUndefined" | "EvmDataDisallowed" | "Erc20DataInvalid" | "EvmContractAddressUndefined" | "EvmContractChainIdUndefined" | "EvmDataNotDefined" | "EvmDataInvalid" | "EvmContractNotInAllowlist" | "Erc20ExceededTransferLimit" | "Erc20ReceiverMismatch" | "Erc20ExceededApproveLimit" | "Erc20SpenderMismatch" | "EvmFunctionNotInAllowlist" | "EvmFunctionCallInvalid" | "PolicyDisjunctionError" | "PolicyNegationError" | "Eth2ExceededMaxUnstake" | "Eth2ConcurrentUnstaking" | "NotInIpv4Allowlist" | "NotInOriginAllowlist" | "InvalidSourceIp" | "RawSigningNotAllowed" | "DiffieHellmanExchangeNotAllowed" | "Eip712SigningNotAllowed" | "OidcSourceNotAllowed" | "NoOidcAuthSourcesDefined" | "AddKeyToRoleDisallowed" | "KeysAlreadyInRole" | "KeyInMultipleRoles" | "KeyAccessError" | "RequireRoleSessionKeyAccessError" | "BtcMessageSigningNotAllowed" | "Eip191SigningNotAllowed" | "TaprootSigningDisallowed" | "SegwitSigningDisallowed" | "PsbtSigningDisallowed" | "BabylonStakingDisallowed" | "TimeLocked" | "BabylonStakingNetwork" | "BabylonStakingParamsVersion" | "BabylonStakingExplicitParams" | "BabylonStakingStakerPk" | "BabylonStakingFinalityProviderPk" | "BabylonStakingLockTime" | "BabylonStakingValue" | "BabylonStakingChangeAddress" | "BabylonStakingFee" | "BabylonStakingWithdrawalAddress" | "BabylonStakingBbnAddress" | "SolanaInstructionCountLow" | "SolanaInstructionCountHigh" | "SolanaNotInInstructionAllowlist" | "SolanaInstructionMismatch" | "WasmPoliciesDisabled" | "WasmPolicyDenied" | "WasmPolicyFailed" | "WebhookPoliciesDisabled" | "DeniedByWebhook";
5340
5541
  /** @description A struct containing all the information about a specific version of a policy. */
5341
5542
  PolicyInfo: {
5543
+ /** @description The access-control entries for the policy. */
5544
+ acl?: unknown[] | null;
5342
5545
  /** @description A list of entities (keys, roles, etc.) the policy is attached to. */
5343
5546
  attached_to: components["schemas"]["PolicyAttachedToId"][];
5344
5547
  created: components["schemas"]["EpochDateTime"];
@@ -5411,7 +5614,7 @@ export interface components {
5411
5614
  PolicyType: "Key" | "Role" | "Wasm";
5412
5615
  PreconditionErrorCode: components["schemas"]["PreconditionErrorOwnCodes"] | components["schemas"]["PolicyErrorCode"];
5413
5616
  /** @enum {string} */
5414
- PreconditionErrorOwnCodes: "KeyRegionLocked" | "MfaRegionLocked" | "Eth2ProposerSlotTooLow" | "Eth2AttestationSourceEpochTooLow" | "Eth2AttestationTargetEpochTooLow" | "Eth2ConcurrentBlockSigning" | "Eth2ConcurrentAttestationSigning" | "Eth2MultiDepositToNonGeneratedKey" | "Eth2MultiDepositUnknownInitialDeposit" | "Eth2MultiDepositWithdrawalAddressMismatch" | "ConcurrentSigningWhenTimeLimitPolicyIsDefined" | "BabylonEotsConcurrentSigning" | "TendermintStateError" | "TendermintConcurrentSigning" | "MfaApprovalsNotYetValid";
5617
+ PreconditionErrorOwnCodes: "KeyRegionLocked" | "KeyRegionChangedRecently" | "MfaRegionLocked" | "Eth2ProposerSlotTooLow" | "Eth2AttestationSourceEpochTooLow" | "Eth2AttestationTargetEpochTooLow" | "Eth2ConcurrentBlockSigning" | "Eth2ConcurrentAttestationSigning" | "Eth2MultiDepositToNonGeneratedKey" | "Eth2MultiDepositUnknownInitialDeposit" | "Eth2MultiDepositWithdrawalAddressMismatch" | "ConcurrentSigningWhenTimeLimitPolicyIsDefined" | "BabylonEotsConcurrentSigning" | "TendermintStateError" | "TendermintConcurrentSigning" | "MfaApprovalsNotYetValid";
5415
5618
  /** @description Contains outputs of previous transactions. */
5416
5619
  PrevOutputs: OneOf<[
5417
5620
  {
@@ -5436,6 +5639,12 @@ export interface components {
5436
5639
  ]>;
5437
5640
  /** @description A request to sign a PSBT */
5438
5641
  PsbtSignRequest: {
5642
+ /**
5643
+ * @description Request additional information to be included in the response, explaining
5644
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
5645
+ * Defaults to false.
5646
+ */
5647
+ explain?: boolean;
5439
5648
  /**
5440
5649
  * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
5441
5650
  * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
@@ -5457,6 +5666,9 @@ export interface components {
5457
5666
  };
5458
5667
  /** @description Response to a PSBT signing request */
5459
5668
  PsbtSignResponse: {
5669
+ /** @description Optional policy evaluation tree. */
5670
+ policy_eval_tree?: unknown;
5671
+ } & {
5460
5672
  /**
5461
5673
  * @description The PSBT in standard hex serialization, without leading "0x".
5462
5674
  * @example 70736274ff01005e...
@@ -6002,7 +6214,7 @@ export interface components {
6002
6214
  users?: string[] | null;
6003
6215
  };
6004
6216
  /** @description All scopes for accessing CubeSigner APIs */
6005
- Scope: ("sign:*" | "sign:ava" | "sign:blob" | "sign:diffieHellman" | "sign:btc:*" | "sign:btc:segwit" | "sign:btc:taproot" | "sign:btc:psbt:*" | "sign:btc:psbt:doge" | "sign:btc:psbt:legacy" | "sign:btc:psbt:segwit" | "sign:btc:psbt:taproot" | "sign:btc:psbt:ltcSegwit" | "sign:btc:message:*" | "sign:btc:message:segwit" | "sign:btc:message:legacy" | "sign:babylon:*" | "sign:babylon:eots:*" | "sign:babylon:eots:nonces" | "sign:babylon:eots:sign" | "sign:babylon:staking:*" | "sign:babylon:staking:deposit" | "sign:babylon:staking:unbond" | "sign:babylon:staking:withdraw" | "sign:babylon:staking:slash" | "sign:babylon:registration" | "sign:babylon:covenant" | "sign:evm:*" | "sign:evm:tx" | "sign:evm:eip191" | "sign:evm:eip712" | "sign:eth2:*" | "sign:eth2:validate" | "sign:eth2:stake" | "sign:eth2:unstake" | "sign:solana" | "sign:sui" | "sign:tendermint" | "sign:mmi" | "manage:*" | "manage:readonly" | "manage:email" | "manage:mfa:*" | "manage:mfa:readonly" | "manage:mfa:list" | "manage:mfa:vote:*" | "manage:mfa:vote:cs" | "manage:mfa:vote:email" | "manage:mfa:vote:fido" | "manage:mfa:vote:totp" | "manage:mfa:register:*" | "manage:mfa:register:fido" | "manage:mfa:register:totp" | "manage:mfa:register:email" | "manage:mfa:unregister:*" | "manage:mfa:unregister:fido" | "manage:mfa:unregister:totp" | "manage:mfa:verify:*" | "manage:mfa:verify:totp" | "manage:key:*" | "manage:key:readonly" | "manage:key:get" | "manage:key:listRoles" | "manage:key:list" | "manage:key:history:tx:list" | "manage:key:create" | "manage:key:import" | "manage:key:update:*" | "manage:key:update:owner" | "manage:key:update:policy" | "manage:key:update:enabled" | "manage:key:update:metadata" | "manage:key:update:editPolicy" | "manage:key:delete" | "manage:policy:*" | "manage:policy:create" | "manage:policy:get" | "manage:policy:list" | "manage:policy:delete" | "manage:policy:update:*" | "manage:policy:update:owner" | "manage:policy:update:name" | "manage:policy:update:editPolicy" | "manage:policy:update:metadata" | "manage:policy:update:rule" | "manage:policy:invoke" | "manage:policy:wasm:*" | "manage:policy:wasm:upload" | "manage:policy:secrets:*" | "manage:policy:secrets:get" | "manage:policy:secrets:update:*" | "manage:policy:secrets:update:values" | "manage:policy:secrets:update:editPolicy" | "manage:contact:*" | "manage:contact:create" | "manage:contact:get" | "manage:contact:list" | "manage:contact:delete" | "manage:contact:update:*" | "manage:contact:update:name" | "manage:contact:update:addresses" | "manage:contact:update:owner" | "manage:contact:update:metadata" | "manage:contact:update:editPolicy" | "manage:contact:lookup:*" | "manage:contact:lookup:address" | "manage:policy:createImportKey" | "manage:role:*" | "manage:role:readonly" | "manage:role:create" | "manage:role:delete" | "manage:role:get:*" | "manage:role:get:keys" | "manage:role:get:keys:list" | "manage:role:get:keys:get" | "manage:role:get:users" | "manage:role:list" | "manage:role:update:*" | "manage:role:update:enabled" | "manage:role:update:policy" | "manage:role:update:editPolicy" | "manage:role:update:key:*" | "manage:role:update:key:add" | "manage:role:update:key:remove" | "manage:role:update:user:*" | "manage:role:update:user:add" | "manage:role:update:user:remove" | "manage:role:history:tx:list" | "manage:identity:*" | "manage:identity:verify" | "manage:identity:add" | "manage:identity:remove" | "manage:identity:list" | "manage:org:*" | "manage:org:create" | "manage:org:metrics:query" | "manage:org:readonly" | "manage:org:addUser" | "manage:org:inviteUser" | "manage:org:inviteAlien" | "manage:org:updateMembership" | "manage:org:listUsers" | "manage:org:user:get" | "manage:org:deleteUser" | "manage:org:get" | "manage:org:user:resetMfa" | "manage:session:*" | "manage:session:readonly" | "manage:session:get" | "manage:session:list" | "manage:session:create" | "manage:session:extend" | "manage:session:revoke" | "manage:export:*" | "manage:export:org:*" | "manage:export:org:get" | "manage:export:user:*" | "manage:export:user:delete" | "manage:export:user:list" | "manage:authMigration" | "manage:authMigration:identity:add" | "manage:authMigration:identity:remove" | "manage:authMigration:user:update" | "manage:mmi:*" | "manage:mmi:readonly" | "manage:mmi:get" | "manage:mmi:list" | "manage:mmi:reject" | "manage:mmi:delete" | "export:*" | "export:user:*" | "export:user:init" | "export:user:complete" | "mmi:*" | "orgAccess:*" | "orgAccess:child:*") | string;
6217
+ Scope: components["schemas"]["ExplicitScope"] | string;
6006
6218
  /** @description A set of scopes. */
6007
6219
  ScopeSet: OneOf<[
6008
6220
  "All",
@@ -6118,6 +6330,9 @@ export interface components {
6118
6330
  org_id: string;
6119
6331
  };
6120
6332
  SignResponse: {
6333
+ /** @description Optional policy evaluation tree. */
6334
+ policy_eval_tree?: unknown;
6335
+ } & {
6121
6336
  /** @description The hex-encoded resulting signature. */
6122
6337
  signature: string;
6123
6338
  };
@@ -6138,7 +6353,7 @@ export interface components {
6138
6353
  };
6139
6354
  SignerErrorCode: components["schemas"]["SignerErrorOwnCodes"] | components["schemas"]["AcceptedValueCode"] | components["schemas"]["BadRequestErrorCode"] | components["schemas"]["BadGatewayErrorCode"] | components["schemas"]["NotFoundErrorCode"] | components["schemas"]["ForbiddenErrorCode"] | components["schemas"]["UnauthorizedErrorCode"] | components["schemas"]["PreconditionErrorCode"] | components["schemas"]["TimeoutErrorCode"] | components["schemas"]["ConflictErrorCode"] | components["schemas"]["InternalErrorCode"];
6140
6355
  /** @enum {string} */
6141
- SignerErrorOwnCodes: "PreComputed" | "StatusCodeWithMessage" | "JrpcError" | "UnhandledError" | "ProxyStartError" | "EnclaveError";
6356
+ SignerErrorOwnCodes: "PreComputed" | "StatusCodeWithMessage" | "JrpcError" | "UnhandledError" | "ProxyStartError" | "EnclaveError" | "PolicyErrorWithEvalTree";
6142
6357
  /** @description Answer to a Sign-in with Ethereum challenge. */
6143
6358
  SiweCompleteRequest: {
6144
6359
  challenge_id: components["schemas"]["Id"];
@@ -6194,6 +6409,12 @@ export interface components {
6194
6409
  * }
6195
6410
  */
6196
6411
  SolanaSignRequest: {
6412
+ /**
6413
+ * @description Request additional information to be included in the response, explaining
6414
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
6415
+ * Defaults to false.
6416
+ */
6417
+ explain?: boolean;
6197
6418
  /**
6198
6419
  * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
6199
6420
  * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
@@ -6212,6 +6433,18 @@ export interface components {
6212
6433
  source_ip: string;
6213
6434
  };
6214
6435
  StakeRequest: {
6436
+ /**
6437
+ * @description Request additional information to be included in the response, explaining
6438
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
6439
+ * Defaults to false.
6440
+ */
6441
+ explain?: boolean;
6442
+ /**
6443
+ * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
6444
+ * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
6445
+ */
6446
+ metadata?: unknown;
6447
+ } & {
6215
6448
  /**
6216
6449
  * Format: int64
6217
6450
  * @description The chain on which we will deposit
@@ -6239,13 +6472,17 @@ export interface components {
6239
6472
  */
6240
6473
  withdrawal_addr: string;
6241
6474
  };
6242
- StakeResponse: {
6475
+ StakeResponse: ({
6476
+ /** @description Optional policy evaluation tree. */
6477
+ policy_eval_tree?: unknown;
6478
+ } & {
6479
+ deposit_tx: components["schemas"]["DepositTxn"];
6480
+ }) & {
6243
6481
  /**
6244
6482
  * @description The validator key id ("Key#...")
6245
6483
  * @example Key#db1731f8-3659-45c0-885b-e11e1f5b7be2
6246
6484
  */
6247
6485
  created_validator_key_id: string;
6248
- deposit_tx: components["schemas"]["DepositTxn"];
6249
6486
  };
6250
6487
  Status: {
6251
6488
  /** @description Users who are allowed to approve. Must be non-empty. */
@@ -6291,6 +6528,12 @@ export interface components {
6291
6528
  SuiChain: "mainnet" | "devnet" | "testnet";
6292
6529
  /** @description Request to sign a serialized SUI transaction */
6293
6530
  SuiSignRequest: {
6531
+ /**
6532
+ * @description Request additional information to be included in the response, explaining
6533
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
6534
+ * Defaults to false.
6535
+ */
6536
+ explain?: boolean;
6294
6537
  /**
6295
6538
  * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
6296
6539
  * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
@@ -6306,6 +6549,12 @@ export interface components {
6306
6549
  tx: string;
6307
6550
  };
6308
6551
  TaprootSignRequest: {
6552
+ /**
6553
+ * @description Request additional information to be included in the response, explaining
6554
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
6555
+ * Defaults to false.
6556
+ */
6557
+ explain?: boolean;
6309
6558
  /**
6310
6559
  * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
6311
6560
  * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
@@ -6367,6 +6616,12 @@ export interface components {
6367
6616
  TelegramEnvironment: "production" | "test";
6368
6617
  /** @description The request for using the Tendermint sign endpoint. */
6369
6618
  TendermintSignRequest: {
6619
+ /**
6620
+ * @description Request additional information to be included in the response, explaining
6621
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
6622
+ * Defaults to false.
6623
+ */
6624
+ explain?: boolean;
6370
6625
  /**
6371
6626
  * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
6372
6627
  * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
@@ -6620,7 +6875,6 @@ export interface components {
6620
6875
  */
6621
6876
  genesis_fork_version?: string | null;
6622
6877
  };
6623
- /** @description Unstake message request. */
6624
6878
  UnstakeRequest: {
6625
6879
  epoch?: components["schemas"]["Epoch"] | null;
6626
6880
  fork: components["schemas"]["Fork"];
@@ -6635,15 +6889,20 @@ export interface components {
6635
6889
  * @example 31337
6636
6890
  */
6637
6891
  validator_index: string;
6638
- };
6639
- /**
6640
- * @description Unstake responses are signed voluntary exit messages.
6641
- * The schema for this message is defined
6642
- * [here](https://github.com/ethereum/consensus-specs/blob/v1.0.1/specs/phase0/beacon-chain.md#signedvoluntaryexit).
6643
- * This message can be directly POSTed to the Beacon node's
6644
- * `/eth/v1/beacon/pool/voluntary_exits` end-point (see expected schema
6645
- * [here](https://ethereum.github.io/beacon-APIs/#/Beacon/submitPoolVoluntaryExit)).
6646
- */
6892
+ } & {
6893
+ /**
6894
+ * @description Request additional information to be included in the response, explaining
6895
+ * the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
6896
+ * Defaults to false.
6897
+ */
6898
+ explain?: boolean;
6899
+ /**
6900
+ * @description Optional metadata. Passing additional information as metadata can be used to make reviewing
6901
+ * of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
6902
+ */
6903
+ metadata?: unknown;
6904
+ } & Record<string, never>;
6905
+ /** @description A response to sign an eth2 unstake request. */
6647
6906
  UnstakeResponse: {
6648
6907
  message: components["schemas"]["VoluntaryExit"];
6649
6908
  /**
@@ -6651,7 +6910,10 @@ export interface components {
6651
6910
  * @example 0x910c7cd537ed91cc8c4a82f3cbd832e9be8c24a22e9c86df479f7ce42025ea6a09619b418b666a060e260d2aae31b8e50e9d05ca3442c7eed3b507e5207e14674275f68c2ba84c4bf6b8dd364a304acac8cfab3681e2514b4400f9242bc61164
6652
6911
  */
6653
6912
  signature: string;
6654
- };
6913
+ } & {
6914
+ /** @description Optional policy evaluation tree. */
6915
+ policy_eval_tree?: unknown;
6916
+ } & Record<string, never>;
6655
6917
  /** @description The information needed to update a Contact. */
6656
6918
  UpdateContactRequest: {
6657
6919
  addresses?: components["schemas"]["AddressMap"] | null;
@@ -6673,6 +6935,13 @@ export interface components {
6673
6935
  * Once disabled, a key cannot be used for signing.
6674
6936
  */
6675
6937
  enabled?: boolean | null;
6938
+ /**
6939
+ * @description If set, change the key's region affinity to this value.
6940
+ *
6941
+ * This is a region-locked operation, i.e., it can only be performed
6942
+ * from the region matching the key's current region affinity
6943
+ */
6944
+ region?: string;
6676
6945
  /**
6677
6946
  * Format: int64
6678
6947
  * @description If set, updating the metadata only succeeds if the version matches this value.
@@ -6873,6 +7142,26 @@ export interface components {
6873
7142
  };
6874
7143
  /** @description Request body for updating a named policy. */
6875
7144
  UpdatePolicyRequest: {
7145
+ /**
7146
+ * @description New Access-control entries.
7147
+ * @example [
7148
+ * {
7149
+ * "action": "attach",
7150
+ * "resources": [
7151
+ * {
7152
+ * "key_id": "*",
7153
+ * "role_id": "Role#e427c28a-9c5b-49cc-a257-878aea58a22c"
7154
+ * }
7155
+ * ],
7156
+ * "subjects": "*"
7157
+ * },
7158
+ * {
7159
+ * "action": "sign",
7160
+ * "subjects": "Role#e427c28a-9c5b-49cc-a257-878aea58a22c"
7161
+ * }
7162
+ * ]
7163
+ */
7164
+ acl?: unknown[] | null;
6876
7165
  edit_policy?: components["schemas"]["EditPolicy"] | null;
6877
7166
  /** @description A new metadata. */
6878
7167
  metadata?: unknown;
@@ -7250,6 +7539,9 @@ export interface components {
7250
7539
  BabylonCovSignResponse: {
7251
7540
  content: {
7252
7541
  "application/json": {
7542
+ /** @description Optional policy evaluation tree. */
7543
+ policy_eval_tree?: unknown;
7544
+ } & {
7253
7545
  /**
7254
7546
  * @description The slash-unbonding transaction signatures as an array of hex strings with no 0x prefix
7255
7547
  * @example [
@@ -7283,6 +7575,9 @@ export interface components {
7283
7575
  BabylonRegistrationResponse: {
7284
7576
  content: {
7285
7577
  "application/json": {
7578
+ /** @description Optional policy evaluation tree. */
7579
+ policy_eval_tree?: unknown;
7580
+ } & {
7286
7581
  /**
7287
7582
  * @description The Babylon address that will receive the staking rewards for this deposit.
7288
7583
  *
@@ -7330,6 +7625,9 @@ export interface components {
7330
7625
  BabylonStakingResponse: {
7331
7626
  content: {
7332
7627
  "application/json": {
7628
+ /** @description Optional policy evaluation tree. */
7629
+ policy_eval_tree?: unknown;
7630
+ } & {
7333
7631
  /**
7334
7632
  * Format: int64
7335
7633
  * @description The transaction fee in sats
@@ -7348,6 +7646,9 @@ export interface components {
7348
7646
  BtcMessageSignResponse: {
7349
7647
  content: {
7350
7648
  "application/json": {
7649
+ /** @description Optional policy evaluation tree. */
7650
+ policy_eval_tree?: unknown;
7651
+ } & {
7351
7652
  /** @description The base64-encoded signature in BIP137 format. */
7352
7653
  sig: string;
7353
7654
  };
@@ -7453,7 +7754,7 @@ export interface components {
7453
7754
  /** @description The result of a Diffie Hellman key exchange */
7454
7755
  DiffieHellmanResponse: {
7455
7756
  content: {
7456
- "application/json": {
7757
+ "application/json": ({
7457
7758
  /** @description The resulting points as base64-encoded byte strings in a key-type--dependent format. */
7458
7759
  points: string[];
7459
7760
  /** @enum {string} */
@@ -7471,7 +7772,10 @@ export interface components {
7471
7772
  ephemeral_public_key: string;
7472
7773
  /** @enum {string} */
7473
7774
  response_type: "encrypted";
7474
- };
7775
+ }) & {
7776
+ /** @description Optional policy evaluation tree. */
7777
+ policy_eval_tree?: unknown;
7778
+ } & Record<string, never>;
7475
7779
  };
7476
7780
  };
7477
7781
  /**
@@ -7503,6 +7807,9 @@ export interface components {
7503
7807
  EotsCreateNonceResponse: {
7504
7808
  content: {
7505
7809
  "application/json": {
7810
+ /** @description Optional policy evaluation tree. */
7811
+ policy_eval_tree?: unknown;
7812
+ } & {
7506
7813
  /**
7507
7814
  * @description The generated nonces as an array of 0x-prefixed hex strings
7508
7815
  * @example [
@@ -7523,6 +7830,9 @@ export interface components {
7523
7830
  Eth1SignResponse: {
7524
7831
  content: {
7525
7832
  "application/json": {
7833
+ /** @description Optional policy evaluation tree. */
7834
+ policy_eval_tree?: unknown;
7835
+ } & {
7526
7836
  /**
7527
7837
  * @description Hex-encoded RLP encoding of the transaction and its signature
7528
7838
  * @example 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
@@ -7531,17 +7841,6 @@ export interface components {
7531
7841
  };
7532
7842
  };
7533
7843
  };
7534
- Eth2SignResponse: {
7535
- content: {
7536
- "application/json": {
7537
- /**
7538
- * @description Hex encoded signature prefixed with 0x e.g. "0x0000..."
7539
- * @example 0xb4f2ef9d12a54e1f569596c07c97d6d730535b6ffc0d287761dc78103a86326782471a04c75ce7a6faea08ca9a4a0830031cdcb893da8711d54aa22619f1a7e71b8185ddf4c6bfd9babbd735960e35e56bd6eeb89625b04850e7a9ef8846e549
7540
- */
7541
- signature: string;
7542
- };
7543
- };
7544
- };
7545
7844
  FidoAssertChallenge: {
7546
7845
  content: {
7547
7846
  "application/json": (components["schemas"]["ChallengePieces"] & {
@@ -7634,10 +7933,13 @@ export interface components {
7634
7933
  "application/json": components["schemas"]["Response"] & Record<string, never>;
7635
7934
  };
7636
7935
  };
7637
- /** @description A JSON Web Key set describing the key used to sign JSON Web Tokens for MMI */
7936
+ /** @description A JSON Web Key set describing the key used to sign JSON Web Tokens */
7638
7937
  JwkSetResponse: {
7639
7938
  content: {
7640
- "application/json": Record<string, never>;
7939
+ "application/json": {
7940
+ /** @description The keys included in this set */
7941
+ keys: Record<string, never>[];
7942
+ };
7641
7943
  };
7642
7944
  };
7643
7945
  /** @description Derivation-related metadata for keys derived from a long-lived mnemonic */
@@ -7738,6 +8040,8 @@ export interface components {
7738
8040
  * ]
7739
8041
  */
7740
8042
  policy: unknown[];
8043
+ /** @description The key provenance. */
8044
+ provenance?: string | null;
7741
8045
  /**
7742
8046
  * @description Hex-encoded, serialized public key. The format used depends on the key type:
7743
8047
  * - Secp256k1 keys use 65-byte uncompressed SECG format;
@@ -7757,6 +8061,15 @@ export interface components {
7757
8061
  };
7758
8062
  };
7759
8063
  };
8064
+ /** @description Response returned when requesting a key attestation. */
8065
+ KeyInfoJwt: {
8066
+ content: {
8067
+ "application/json": {
8068
+ /** @description A JSON Web Token whose claims contain the `KeyInfo` structure. */
8069
+ jwt: string;
8070
+ };
8071
+ };
8072
+ };
7760
8073
  KeyInfos: {
7761
8074
  content: {
7762
8075
  "application/json": {
@@ -8268,6 +8581,8 @@ export interface components {
8268
8581
  PolicyInfo: {
8269
8582
  content: {
8270
8583
  "application/json": {
8584
+ /** @description The access-control entries for the policy. */
8585
+ acl?: unknown[] | null;
8271
8586
  /** @description A list of entities (keys, roles, etc.) the policy is attached to. */
8272
8587
  attached_to: components["schemas"]["PolicyAttachedToId"][];
8273
8588
  created: components["schemas"]["EpochDateTime"];
@@ -8326,6 +8641,9 @@ export interface components {
8326
8641
  PsbtSignResponse: {
8327
8642
  content: {
8328
8643
  "application/json": {
8644
+ /** @description Optional policy evaluation tree. */
8645
+ policy_eval_tree?: unknown;
8646
+ } & {
8329
8647
  /**
8330
8648
  * @description The PSBT in standard hex serialization, without leading "0x".
8331
8649
  * @example 70736274ff01005e...
@@ -8485,6 +8803,9 @@ export interface components {
8485
8803
  SignResponse: {
8486
8804
  content: {
8487
8805
  "application/json": {
8806
+ /** @description Optional policy evaluation tree. */
8807
+ policy_eval_tree?: unknown;
8808
+ } & {
8488
8809
  /** @description The hex-encoded resulting signature. */
8489
8810
  signature: string;
8490
8811
  };
@@ -8519,13 +8840,17 @@ export interface components {
8519
8840
  };
8520
8841
  StakeResponse: {
8521
8842
  content: {
8522
- "application/json": {
8843
+ "application/json": ({
8844
+ /** @description Optional policy evaluation tree. */
8845
+ policy_eval_tree?: unknown;
8846
+ } & {
8847
+ deposit_tx: components["schemas"]["DepositTxn"];
8848
+ }) & {
8523
8849
  /**
8524
8850
  * @description The validator key id ("Key#...")
8525
8851
  * @example Key#db1731f8-3659-45c0-885b-e11e1f5b7be2
8526
8852
  */
8527
8853
  created_validator_key_id: string;
8528
- deposit_tx: components["schemas"]["DepositTxn"];
8529
8854
  };
8530
8855
  };
8531
8856
  };
@@ -8574,14 +8899,7 @@ export interface components {
8574
8899
  };
8575
8900
  };
8576
8901
  };
8577
- /**
8578
- * @description Unstake responses are signed voluntary exit messages.
8579
- * The schema for this message is defined
8580
- * [here](https://github.com/ethereum/consensus-specs/blob/v1.0.1/specs/phase0/beacon-chain.md#signedvoluntaryexit).
8581
- * This message can be directly POSTed to the Beacon node's
8582
- * `/eth/v1/beacon/pool/voluntary_exits` end-point (see expected schema
8583
- * [here](https://ethereum.github.io/beacon-APIs/#/Beacon/submitPoolVoluntaryExit)).
8584
- */
8902
+ /** @description A response to sign an eth2 unstake request. */
8585
8903
  UnstakeResponse: {
8586
8904
  content: {
8587
8905
  "application/json": {
@@ -8591,7 +8909,10 @@ export interface components {
8591
8909
  * @example 0x910c7cd537ed91cc8c4a82f3cbd832e9be8c24a22e9c86df479f7ce42025ea6a09619b418b666a060e260d2aae31b8e50e9d05ca3442c7eed3b507e5207e14674275f68c2ba84c4bf6b8dd364a304acac8cfab3681e2514b4400f9242bc61164
8592
8910
  */
8593
8911
  signature: string;
8594
- };
8912
+ } & {
8913
+ /** @description Optional policy evaluation tree. */
8914
+ policy_eval_tree?: unknown;
8915
+ } & Record<string, never>;
8595
8916
  };
8596
8917
  };
8597
8918
  UpdateOrgResponse: {
@@ -8804,6 +9125,22 @@ export interface operations {
8804
9125
  };
8805
9126
  };
8806
9127
  };
9128
+ /**
9129
+ * JWKS endpoint for the attestation key
9130
+ * @description JWKS endpoint for the attestation key
9131
+ *
9132
+ * Returns the public key used to sign Key info attestations.
9133
+ */
9134
+ attestationJwkSet: {
9135
+ responses: {
9136
+ 200: components["responses"]["JwkSetResponse"];
9137
+ default: {
9138
+ content: {
9139
+ "application/json": components["schemas"]["ErrorResponse"];
9140
+ };
9141
+ };
9142
+ };
9143
+ };
8807
9144
  /**
8808
9145
  * List accessible organizations.
8809
9146
  * @description List accessible organizations.
@@ -10708,6 +11045,36 @@ export interface operations {
10708
11045
  };
10709
11046
  };
10710
11047
  };
11048
+ /**
11049
+ * Attest to Key Properties
11050
+ * @description Attest to Key Properties
11051
+ *
11052
+ * The response is a JWT whose claims are the key properties.
11053
+ */
11054
+ attestKey: {
11055
+ parameters: {
11056
+ path: {
11057
+ /**
11058
+ * @description Name or ID of the desired Org
11059
+ * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
11060
+ */
11061
+ org_id: string;
11062
+ /**
11063
+ * @description ID of the desired Key
11064
+ * @example Key#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
11065
+ */
11066
+ key_id: string;
11067
+ };
11068
+ };
11069
+ responses: {
11070
+ 200: components["responses"]["KeyInfoJwt"];
11071
+ default: {
11072
+ content: {
11073
+ "application/json": components["schemas"]["ErrorResponse"];
11074
+ };
11075
+ };
11076
+ };
11077
+ };
10711
11078
  /**
10712
11079
  * List Key Roles
10713
11080
  * @description List Key Roles
@@ -14182,7 +14549,7 @@ export interface operations {
14182
14549
  };
14183
14550
  };
14184
14551
  responses: {
14185
- 200: components["responses"]["Eth2SignResponse"];
14552
+ 200: components["responses"]["SignResponse"];
14186
14553
  202: {
14187
14554
  content: {
14188
14555
  "application/json": components["schemas"]["AcceptedResponse"];