@cubist-labs/cubesigner-sdk 0.4.201 → 0.4.204
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/package.json +1 -1
- package/dist/src/client/api_client.d.ts +17 -1
- package/dist/src/client/api_client.d.ts.map +1 -1
- package/dist/src/client/api_client.js +26 -2
- package/dist/src/index.d.ts +2 -0
- package/dist/src/index.d.ts.map +1 -1
- package/dist/src/index.js +3 -1
- package/dist/src/key.d.ts +7 -1
- package/dist/src/key.d.ts.map +1 -1
- package/dist/src/key.js +9 -1
- package/dist/src/schema.d.ts +426 -59
- package/dist/src/schema.d.ts.map +1 -1
- package/dist/src/schema.js +1 -1
- package/dist/src/schema_types.d.ts +4 -1
- package/dist/src/schema_types.d.ts.map +1 -1
- package/dist/src/schema_types.js +31 -1
- package/dist/src/scopes.d.ts +73 -0
- package/dist/src/scopes.d.ts.map +1 -0
- package/dist/src/scopes.js +322 -0
- package/package.json +1 -1
- package/src/client/api_client.ts +28 -1
- package/src/index.ts +2 -0
- package/src/key.ts +10 -0
- package/src/schema.ts +626 -236
- package/src/schema_types.ts +33 -1
- package/src/scopes.ts +338 -0
package/dist/src/schema.d.ts
CHANGED
|
@@ -20,6 +20,15 @@ export interface paths {
|
|
|
20
20
|
*/
|
|
21
21
|
get: operations["aboutMeLegacy"];
|
|
22
22
|
};
|
|
23
|
+
"/v0/attestation/.well-known/jwks.json": {
|
|
24
|
+
/**
|
|
25
|
+
* JWKS endpoint for the attestation key
|
|
26
|
+
* @description JWKS endpoint for the attestation key
|
|
27
|
+
*
|
|
28
|
+
* Returns the public key used to sign Key info attestations.
|
|
29
|
+
*/
|
|
30
|
+
get: operations["attestationJwkSet"];
|
|
31
|
+
};
|
|
23
32
|
"/v0/email/orgs": {
|
|
24
33
|
/**
|
|
25
34
|
* List accessible organizations.
|
|
@@ -607,6 +616,15 @@ export interface paths {
|
|
|
607
616
|
*/
|
|
608
617
|
patch: operations["updateKey"];
|
|
609
618
|
};
|
|
619
|
+
"/v0/org/{org_id}/keys/{key_id}/attest": {
|
|
620
|
+
/**
|
|
621
|
+
* Attest to Key Properties
|
|
622
|
+
* @description Attest to Key Properties
|
|
623
|
+
*
|
|
624
|
+
* The response is a JWT whose claims are the key properties.
|
|
625
|
+
*/
|
|
626
|
+
get: operations["attestKey"];
|
|
627
|
+
};
|
|
610
628
|
"/v0/org/{org_id}/keys/{key_id}/roles": {
|
|
611
629
|
/**
|
|
612
630
|
* List Key Roles
|
|
@@ -1650,6 +1668,8 @@ export interface components {
|
|
|
1650
1668
|
ids: string[];
|
|
1651
1669
|
/** @description Organization id */
|
|
1652
1670
|
org_id: string;
|
|
1671
|
+
/** @description Optional policy evaluation tree (included in signer responses, when requested) */
|
|
1672
|
+
policy_eval_tree?: unknown;
|
|
1653
1673
|
session?: components["schemas"]["NewSessionResponse"] | null;
|
|
1654
1674
|
};
|
|
1655
1675
|
};
|
|
@@ -1908,6 +1928,12 @@ export interface components {
|
|
|
1908
1928
|
AuthenticatorTransport: "usb" | "nfc" | "ble" | "internal";
|
|
1909
1929
|
/** @description Request to sign a serialized Avalanche transaction */
|
|
1910
1930
|
AvaSerializedTxSignRequest: {
|
|
1931
|
+
/**
|
|
1932
|
+
* @description Request additional information to be included in the response, explaining
|
|
1933
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
1934
|
+
* Defaults to false.
|
|
1935
|
+
*/
|
|
1936
|
+
explain?: boolean;
|
|
1911
1937
|
/**
|
|
1912
1938
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
1913
1939
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -1919,6 +1945,12 @@ export interface components {
|
|
|
1919
1945
|
};
|
|
1920
1946
|
/** @description Request to sign an Avalanche transaction */
|
|
1921
1947
|
AvaSignRequest: {
|
|
1948
|
+
/**
|
|
1949
|
+
* @description Request additional information to be included in the response, explaining
|
|
1950
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
1951
|
+
* Defaults to false.
|
|
1952
|
+
*/
|
|
1953
|
+
explain?: boolean;
|
|
1922
1954
|
/**
|
|
1923
1955
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
1924
1956
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -1945,6 +1977,18 @@ export interface components {
|
|
|
1945
1977
|
/** @description Wrapper around a zeroizing 32-byte fixed-size array */
|
|
1946
1978
|
B32: string;
|
|
1947
1979
|
BabylonCovSignRequest: {
|
|
1980
|
+
/**
|
|
1981
|
+
* @description Request additional information to be included in the response, explaining
|
|
1982
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
1983
|
+
* Defaults to false.
|
|
1984
|
+
*/
|
|
1985
|
+
explain?: boolean;
|
|
1986
|
+
/**
|
|
1987
|
+
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
1988
|
+
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
1989
|
+
*/
|
|
1990
|
+
metadata?: unknown;
|
|
1991
|
+
} & {
|
|
1948
1992
|
/**
|
|
1949
1993
|
* @description The keys for the finality providers to which this transaction is being staked.
|
|
1950
1994
|
* Each key is a hex string containing a SEC1-encoded secp256k1 public key.
|
|
@@ -2004,6 +2048,9 @@ export interface components {
|
|
|
2004
2048
|
unbonding_tx: string;
|
|
2005
2049
|
};
|
|
2006
2050
|
BabylonCovSignResponse: {
|
|
2051
|
+
/** @description Optional policy evaluation tree. */
|
|
2052
|
+
policy_eval_tree?: unknown;
|
|
2053
|
+
} & {
|
|
2007
2054
|
/**
|
|
2008
2055
|
* @description The slash-unbonding transaction signatures as an array of hex strings with no 0x prefix
|
|
2009
2056
|
* @example [
|
|
@@ -2118,6 +2165,18 @@ export interface components {
|
|
|
2118
2165
|
*/
|
|
2119
2166
|
value: number;
|
|
2120
2167
|
}) & {
|
|
2168
|
+
/**
|
|
2169
|
+
* @description Request additional information to be included in the response, explaining
|
|
2170
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
2171
|
+
* Defaults to false.
|
|
2172
|
+
*/
|
|
2173
|
+
explain?: boolean;
|
|
2174
|
+
/**
|
|
2175
|
+
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
2176
|
+
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
2177
|
+
*/
|
|
2178
|
+
metadata?: unknown;
|
|
2179
|
+
} & {
|
|
2121
2180
|
/**
|
|
2122
2181
|
* @description The Babylon address that will receive the staking rewards for this deposit.
|
|
2123
2182
|
* Babylon requires this to be the same address that registers the deposit on
|
|
@@ -2131,6 +2190,9 @@ export interface components {
|
|
|
2131
2190
|
bbn_addr: string;
|
|
2132
2191
|
};
|
|
2133
2192
|
BabylonRegistrationResponse: {
|
|
2193
|
+
/** @description Optional policy evaluation tree. */
|
|
2194
|
+
policy_eval_tree?: unknown;
|
|
2195
|
+
} & {
|
|
2134
2196
|
/**
|
|
2135
2197
|
* @description The Babylon address that will receive the staking rewards for this deposit.
|
|
2136
2198
|
*
|
|
@@ -2398,6 +2460,9 @@ export interface components {
|
|
|
2398
2460
|
action: "slash_early_unbond";
|
|
2399
2461
|
});
|
|
2400
2462
|
BabylonStakingResponse: {
|
|
2463
|
+
/** @description Optional policy evaluation tree. */
|
|
2464
|
+
policy_eval_tree?: unknown;
|
|
2465
|
+
} & {
|
|
2401
2466
|
/**
|
|
2402
2467
|
* Format: int64
|
|
2403
2468
|
* @description The transaction fee in sats
|
|
@@ -2474,7 +2539,7 @@ export interface components {
|
|
|
2474
2539
|
/** @enum {string} */
|
|
2475
2540
|
BadGatewayErrorCode: "EsploraApiError" | "SentryApiError" | "CallWebhookError" | "OAuthProviderError" | "OidcDisoveryFailed" | "OidcIssuerJwkEndpointUnavailable" | "SmtpServerUnavailable";
|
|
2476
2541
|
/** @enum {string} */
|
|
2477
|
-
BadRequestErrorCode: "GenericBadRequest" | "DisallowedAllowRuleReference" | "InvalidPaginationToken" | "InvalidEmail" | "InvalidEmailTemplate" | "QueryMetricsError" | "InvalidTelegramData" | "QueryMetricsValidationError" | "WebhookPolicyTimeoutOutOfBounds" | "WebhookPolicyDisallowedUrlScheme" | "WebhookPolicyDisallowedUrlHost" | "WebhookPolicyDisallowedHeaders" | "ReservedName" | "UserEmailNotConfigured" | "EmailPasswordNotFound" | "PasswordAuthNotAllowedByInvitation" | "OneTimeCodeExpired" | "InvalidBody" | "InvalidJwt" | "InvitationNoLongerValid" | "TokenRequestError" | "InvalidMfaReceipt" | "InvalidMfaPolicyCount" | "InvalidMfaPolicyNumAuthFactors" | "InvalidMfaPolicyNumAllowedApprovers" | "InvalidMfaPolicyGracePeriodTooLong" | "InvalidBabylonStakingPolicyParams" | "InvalidSuiTxReceiversEmptyAllowlist" | "InvalidBtcTxReceiversEmptyAllowlist" | "InvalidRequireRoleSessionAllowlist" | "InvalidCreateKeyCount" | "InvalidDiffieHellmanCount" | "OrgInviteExistingUser" | "OrgUserAlreadyExists" | "OrgNameTaken" | "OrgIsNotOrgExport" | "RoleNameTaken" | "PolicyNameTaken" | "NameTaken" | "ContactNameInvalid" | "ContactAddressesInvalid" | "ContactModified" | "PolicyNotFound" | "PolicyVersionNotFound" | "PolicyRuleDisallowedByType" | "PolicyTypeDisallowed" | "PolicyDuplicateError" | "PolicyStillAttached" | "PolicyModified" | "PolicyNotAttached" | "AddKeyToRoleCountTooHigh" | "InvalidKeyId" | "InvalidTimeLockAlreadyInThePast" | "InvalidRestrictedScopes" | "InvalidUpdate" | "InvalidMetadataLength" | "InvalidLength" | "InvalidKeyMaterialId" | "KeyNotFound" | "SiweChallengeNotFound" | "SiweInvalidRequest" | "UserExportDerivedKey" | "UserExportPublicKeyInvalid" | "NistP256PublicKeyInvalid" | "UnableToAccessSmtpRelay" | "UserExportInProgress" | "RoleNotFound" | "InvalidRoleNameOrId" | "InvalidMfaReceiptOrgIdMissing" | "InvalidMfaReceiptInvalidOrgId" | "MfaRequestNotFound" | "InvalidKeyType" | "InvalidKeyMaterial" | "InvalidHexValue" | "InvalidBase32Value" | "InvalidBase58Value" | "InvalidSs58Value" | "InvalidForkVersionLength" | "InvalidEthAddress" | "InvalidStellarAddress" | "InvalidOrgNameOrId" | "InvalidUpdateOrgRequestDisallowedMfaType" | "InvalidUpdateOrgRequestEmptyAllowedMfaTypes" | "EmailOtpDelayTooShortForRegisterMfa" | "InvalidStakeDeposit" | "InvalidBlobSignRequest" | "InvalidDiffieHellmanRequest" | "InvalidSolanaSignRequest" | "InvalidEip712SignRequest" | "OnlySpecifyOne" | "NoOidcDataInProof" | "InvalidEvmSignRequest" | "InvalidEth2SignRequest" | "InvalidDeriveKeyRequest" | "InvalidStakingAmount" | "CustomStakingAmountNotAllowedForWrapperContract" | "InvalidUnstakeRequest" | "InvalidCreateUserRequest" | "UserAlreadyExists" | "IdpUserAlreadyExists" | "CognitoUserAlreadyOrgMember" | "UserNotFound" | "UserWithEmailNotFound" | "PolicyKeyMismatch" | "
|
|
2542
|
+
BadRequestErrorCode: "GenericBadRequest" | "DisallowedAllowRuleReference" | "InvalidPaginationToken" | "InvalidEmail" | "InvalidEmailTemplate" | "QueryMetricsError" | "InvalidTelegramData" | "QueryMetricsValidationError" | "WebhookPolicyTimeoutOutOfBounds" | "WebhookPolicyDisallowedUrlScheme" | "WebhookPolicyDisallowedUrlHost" | "WebhookPolicyDisallowedHeaders" | "ReservedName" | "UserEmailNotConfigured" | "EmailPasswordNotFound" | "PasswordAuthNotAllowedByInvitation" | "OneTimeCodeExpired" | "InvalidBody" | "InvalidJwt" | "InvitationNoLongerValid" | "TokenRequestError" | "InvalidMfaReceipt" | "InvalidMfaPolicyCount" | "InvalidMfaPolicyNumAuthFactors" | "InvalidMfaPolicyNumAllowedApprovers" | "InvalidMfaPolicyGracePeriodTooLong" | "InvalidBabylonStakingPolicyParams" | "InvalidSuiTxReceiversEmptyAllowlist" | "InvalidBtcTxReceiversEmptyAllowlist" | "InvalidRequireRoleSessionAllowlist" | "InvalidCreateKeyCount" | "InvalidDiffieHellmanCount" | "OrgInviteExistingUser" | "OrgUserAlreadyExists" | "OrgNameTaken" | "KwkNotFoundInRegion" | "OrgIsNotOrgExport" | "RoleNameTaken" | "PolicyNameTaken" | "NameTaken" | "ContactNameInvalid" | "ContactAddressesInvalid" | "ContactModified" | "PolicyNotFound" | "PolicyVersionNotFound" | "PolicyRuleDisallowedByType" | "PolicyTypeDisallowed" | "PolicyDuplicateError" | "PolicyStillAttached" | "PolicyModified" | "PolicyNotAttached" | "AddKeyToRoleCountTooHigh" | "InvalidKeyId" | "InvalidTimeLockAlreadyInThePast" | "InvalidRestrictedScopes" | "InvalidUpdate" | "InvalidMetadataLength" | "InvalidLength" | "InvalidKeyMaterialId" | "KeyNotFound" | "SiweChallengeNotFound" | "SiweInvalidRequest" | "UserExportDerivedKey" | "UserExportPublicKeyInvalid" | "NistP256PublicKeyInvalid" | "UnableToAccessSmtpRelay" | "UserExportInProgress" | "RoleNotFound" | "InvalidRoleNameOrId" | "InvalidMfaReceiptOrgIdMissing" | "InvalidMfaReceiptInvalidOrgId" | "MfaRequestNotFound" | "InvalidKeyType" | "InvalidKeyMaterial" | "InvalidHexValue" | "InvalidBase32Value" | "InvalidBase58Value" | "InvalidSs58Value" | "InvalidForkVersionLength" | "InvalidEthAddress" | "InvalidStellarAddress" | "InvalidOrgNameOrId" | "InvalidUpdateOrgRequestDisallowedMfaType" | "InvalidUpdateOrgRequestEmptyAllowedMfaTypes" | "EmailOtpDelayTooShortForRegisterMfa" | "InvalidStakeDeposit" | "InvalidBlobSignRequest" | "InvalidDiffieHellmanRequest" | "InvalidSolanaSignRequest" | "InvalidEip712SignRequest" | "OnlySpecifyOne" | "NoOidcDataInProof" | "InvalidEvmSignRequest" | "InvalidEth2SignRequest" | "InvalidDeriveKeyRequest" | "InvalidStakingAmount" | "CustomStakingAmountNotAllowedForWrapperContract" | "InvalidUnstakeRequest" | "InvalidCreateUserRequest" | "UserAlreadyExists" | "IdpUserAlreadyExists" | "CognitoUserAlreadyOrgMember" | "UserNotFound" | "UserWithEmailNotFound" | "PolicyKeyMismatch" | "EmptyScopes" | "InvalidScopesForRoleSession" | "InvalidLifetime" | "NoSingleKeyForUser" | "InvalidOrgPolicyRule" | "SourceIpAllowlistEmpty" | "LimitWindowTooLong" | "Erc20ContractDisallowed" | "EmptyRuleError" | "OptionalListEmpty" | "MultipleExclusiveFieldsProvided" | "DuplicateFieldEntry" | "InvalidRange" | "InvalidOrgPolicyRepeatedRule" | "InvalidSuiTransaction" | "SuiSenderMismatch" | "AvaSignHashError" | "AvaSignError" | "BtcSegwitHashError" | "BtcTaprootHashError" | "BtcSignError" | "TaprootSignError" | "Eip712SignError" | "InvalidMemberRoleInUserAdd" | "InvalidMemberRoleInRecipientAdd" | "ThirdPartyUserAlreadyExists" | "OidcIdentityAlreadyExists" | "ThirdPartyUserNotFound" | "DeleteOidcUserError" | "DeleteUserError" | "SessionRoleMismatch" | "InvalidOidcToken" | "InvalidOidcIdentity" | "OidcIssuerUnsupported" | "OidcIssuerNotAllowed" | "OidcIssuerNoApplicableJwk" | "FidoKeyAlreadyRegistered" | "FidoKeySignCountTooLow" | "FidoVerificationFailed" | "FidoChallengeMfaMismatch" | "UnsupportedLegacyCognitoSession" | "InvalidIdentityProof" | "PaginationDataExpired" | "ExistingKeysViolateExclusiveKeyAccess" | "ExportDelayTooShort" | "ExportWindowTooLong" | "InvalidTotpFailureLimit" | "InvalidEip191SignRequest" | "CannotResendUserInvitation" | "InvalidNotificationEndpointCount" | "CannotDeletePendingSubscription" | "InvalidNotificationUrlProtocol" | "EmptyOneOfOrgEventFilter" | "EmptyAllExceptOrgEventFilter" | "InvalidTapNodeHash" | "InvalidOneTimeCode" | "MessageNotFound" | "MessageAlreadySigned" | "MessageRejected" | "MessageReplaced" | "InvalidMessageType" | "EmptyAddress" | "InvalidEth2SigningPolicySlotRange" | "InvalidEth2SigningPolicyEpochRange" | "InvalidEth2SigningPolicyTimestampRange" | "InvalidEth2SigningPolicyOverlappingRule" | "RpcUrlMissing" | "MmiChainIdMissing" | "EthersInvalidRpcUrl" | "EthersGetTransactionCountError" | "InvalidPassword" | "BabylonStakingFeePlusDustOverflow" | "BabylonStaking" | "BabylonStakingIncorrectKey" | "BabylonStakingSegwitNonDeposit" | "BabylonStakingRegistrationRequiresTaproot" | "PsbtSigning" | "TooManyResets" | "TooManyRequests" | "TooManyFailedLogins" | "BadBtcMessageSignP2shFlag" | "InvalidTendermintRequest" | "PolicyVersionMaxReached" | "PolicyVersionInvalid" | "AlienOwnerInvalid" | "EmptyUpdateRequest" | "InvalidPolicyReference" | "PolicyEngineDisabled" | "InvalidWasmPolicy" | "RedundantDerivationPath" | "ImportKeyMissing" | "InvalidAbiMethods" | "BabylonCovSign" | "InvalidPolicyLogsRequest" | "UserProfileMigrationMultipleEntries" | "UserProfileMigrationTooManyItems" | "InputTooShort" | "InvalidTweakLength";
|
|
2478
2543
|
BillingArgs: {
|
|
2479
2544
|
billing_org: components["schemas"]["Id"];
|
|
2480
2545
|
event_type: components["schemas"]["BillingEvent"];
|
|
@@ -2491,7 +2556,7 @@ export interface components {
|
|
|
2491
2556
|
* @description Billing event types.
|
|
2492
2557
|
* @enum {string}
|
|
2493
2558
|
*/
|
|
2494
|
-
BillingEvent: "Mmi" | "MmiMessageGet" | "MmiMessageList" | "MmiMessageSign" | "MmiMessageReject" | "MmiMessageDelete" | "AboutMe" | "UserResetEmailInit" | "UserResetEmailComplete" | "UserDeleteTotp" | "UserResetTotpInit" | "UserResetTotpComplete" | "UserVerifyTotp" | "UserRegisterFidoInit" | "UserRegisterFidoComplete" | "UserDeleteFido" | "CreateProofOidc" | "CreateProofCubeSigner" | "VerifyProof" | "AddOidcIdentity" | "RemoveOidcIdentity" | "ListOidcIdentities" | "GetOrg" | "UpdateOrg" | "GetOrgExport" | "CreateOrg" | "ListKeys" | "GetKey" | "GetKeyByMaterialId" | "ListKeyRoles" | "UpdateKey" | "ListHistoricalKeyTx" | "Invite" | "ListUsers" | "GetUser" | "GetUserByEmail" | "GetUserByOidc" | "UpdateMembership" | "ResetMemberMfa" | "CompleteResetMemberMfa" | "CreateRole" | "GetRole" | "ListTokenKeys" | "ListRoles" | "GetRoleKey" | "ListRoleKeys" | "ListRoleUsers" | "UpdateRole" | "DeleteRole" | "ConfigureEmail" | "ListHistoricalRoleTx" | "CreatePolicy" | "GetPolicy" | "ListPolicies" | "DeletePolicy" | "UpdatePolicy" | "InvokePolicy" | "GetPolicyLogs" | "UploadWasmPolicy" | "GetPolicySecrets" | "UpdatePolicySecrets" | "SetPolicySecret" | "DeletePolicySecret" | "CreatePolicyImportKey" | "UserExportDelete" | "UserExportList" | "UserExportInit" | "UserExportComplete" | "AddUserToRole" | "RemoveUserFromRole" | "MfaApproveCs" | "MfaRejectCs" | "MfaGet" | "MfaList" | "AddKeysToRole" | "RemoveKeyFromRole" | "CreateToken" | "CreateSession" | "RevokeSession" | "RevokeCurrentSession" | "RevokeSessions" | "ListSessions" | "GetSession" | "SignerSessionRefresh" | "MfaApproveTotp" | "MfaRejectTotp" | "MfaFidoInit" | "MfaApproveFidoComplete" | "MfaRejectFidoComplete" | "MfaEmailInit" | "MfaEmailComplete" | "Cube3signerHeartbeat" | "CreateContact" | "GetContact" | "ListContacts" | "DeleteContact" | "UpdateContact" | "LookupContactsByAddress" | "QueryMetrics" | "Counts" | "CreateKey" | "ImportKey" | "CreateKeyImportKey" | "DeriveKey" | "DeleteKey" | "AvaSign" | "AvaSerializedTxSign" | "BabylonRegistration" | "BabylonStaking" | "BabylonCovSign" | "BlobSign" | "BtcMessageSign" | "BtcSign" | "DiffieHellmanExchange" | "PsbtSign" | "PsbtLegacyInputSign" | "PsbtSegwitInputSign" | "PsbtTaprootInputSign" | "TaprootSign" | "Eip712Sign" | "Eip191Sign" | "Eth1Sign" | "Eth2Sign" | "SolanaSign" | "SuiSign" | "TendermintSign" | "Stake" | "Unstake" | "PasskeyAuthInit" | "PasskeyAuthComplete" | "OidcAuth" | "Oauth2Twitter" | "OAuth2TokenRefresh" | "EmailOtpAuth" | "SiweInit" | "SiweComplete" | "TelegramAuth" | "CreateOidcUser" | "DeleteOidcUser" | "DeleteUser" | "CreateEotsNonces" | "EotsSign" | "AuthMigrationIdentityAdd" | "AuthMigrationIdentityRemove" | "AuthMigrationUserUpdate" | "KeyCreated" | "KeyImported" | "InvitationAccept" | "IdpAuthenticate" | "IdpPasswordResetRequest" | "IdpPasswordResetConfirm" | "EsploraApiCall" | "ExecutePolicy" | "SentryApiCall" | "SentryApiCallPublic" | "MmiJwkSet" | "UserOrgs" | "PublicOrgInfo" | "EmailMyOrgs";
|
|
2559
|
+
BillingEvent: "Mmi" | "MmiMessageGet" | "MmiMessageList" | "MmiMessageSign" | "MmiMessageReject" | "MmiMessageDelete" | "AboutMe" | "UserResetEmailInit" | "UserResetEmailComplete" | "UserDeleteTotp" | "UserResetTotpInit" | "UserResetTotpComplete" | "UserVerifyTotp" | "UserRegisterFidoInit" | "UserRegisterFidoComplete" | "UserDeleteFido" | "CreateProofOidc" | "CreateProofCubeSigner" | "VerifyProof" | "AddOidcIdentity" | "RemoveOidcIdentity" | "ListOidcIdentities" | "GetOrg" | "UpdateOrg" | "GetOrgExport" | "CreateOrg" | "ListKeys" | "AttestKey" | "GetKey" | "GetKeyByMaterialId" | "ListKeyRoles" | "UpdateKey" | "ListHistoricalKeyTx" | "Invite" | "ListUsers" | "GetUser" | "GetUserByEmail" | "GetUserByOidc" | "UpdateMembership" | "ResetMemberMfa" | "CompleteResetMemberMfa" | "CreateRole" | "GetRole" | "ListTokenKeys" | "ListRoles" | "GetRoleKey" | "ListRoleKeys" | "ListRoleUsers" | "UpdateRole" | "DeleteRole" | "ConfigureEmail" | "ListHistoricalRoleTx" | "CreatePolicy" | "GetPolicy" | "ListPolicies" | "DeletePolicy" | "UpdatePolicy" | "InvokePolicy" | "GetPolicyLogs" | "UploadWasmPolicy" | "GetPolicySecrets" | "UpdatePolicySecrets" | "SetPolicySecret" | "DeletePolicySecret" | "CreatePolicyImportKey" | "UserExportDelete" | "UserExportList" | "UserExportInit" | "UserExportComplete" | "AddUserToRole" | "RemoveUserFromRole" | "MfaApproveCs" | "MfaRejectCs" | "MfaGet" | "MfaList" | "AddKeysToRole" | "RemoveKeyFromRole" | "CreateToken" | "CreateSession" | "RevokeSession" | "RevokeCurrentSession" | "RevokeSessions" | "ListSessions" | "GetSession" | "SignerSessionRefresh" | "MfaApproveTotp" | "MfaRejectTotp" | "MfaFidoInit" | "MfaApproveFidoComplete" | "MfaRejectFidoComplete" | "MfaEmailInit" | "MfaEmailComplete" | "Cube3signerHeartbeat" | "CreateContact" | "GetContact" | "ListContacts" | "DeleteContact" | "UpdateContact" | "LookupContactsByAddress" | "QueryMetrics" | "Counts" | "CreateKey" | "ImportKey" | "CreateKeyImportKey" | "DeriveKey" | "DeleteKey" | "AvaSign" | "AvaSerializedTxSign" | "BabylonRegistration" | "BabylonStaking" | "BabylonCovSign" | "BlobSign" | "BtcMessageSign" | "BtcSign" | "DiffieHellmanExchange" | "PsbtSign" | "PsbtLegacyInputSign" | "PsbtSegwitInputSign" | "PsbtTaprootInputSign" | "TaprootSign" | "Eip712Sign" | "Eip191Sign" | "Eth1Sign" | "Eth2Sign" | "SolanaSign" | "SuiSign" | "TendermintSign" | "Stake" | "Unstake" | "PasskeyAuthInit" | "PasskeyAuthComplete" | "OidcAuth" | "Oauth2Twitter" | "OAuth2TokenRefresh" | "EmailOtpAuth" | "SiweInit" | "SiweComplete" | "TelegramAuth" | "CreateOidcUser" | "DeleteOidcUser" | "DeleteUser" | "CreateEotsNonces" | "EotsSign" | "AuthMigrationIdentityAdd" | "AuthMigrationIdentityRemove" | "AuthMigrationUserUpdate" | "KeyCreated" | "KeyImported" | "InvitationAccept" | "IdpAuthenticate" | "IdpPasswordResetRequest" | "IdpPasswordResetConfirm" | "EsploraApiCall" | "ExecutePolicy" | "SentryApiCall" | "SentryApiCallPublic" | "MmiJwkSet" | "AttestationJwkSet" | "UserOrgs" | "PublicOrgInfo" | "EmailMyOrgs";
|
|
2495
2560
|
/** @description A bitcoin address and its network. */
|
|
2496
2561
|
BitcoinAddressInfo: {
|
|
2497
2562
|
/**
|
|
@@ -2507,6 +2572,12 @@ export interface components {
|
|
|
2507
2572
|
* }
|
|
2508
2573
|
*/
|
|
2509
2574
|
BlobSignRequest: {
|
|
2575
|
+
/**
|
|
2576
|
+
* @description Request additional information to be included in the response, explaining
|
|
2577
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
2578
|
+
* Defaults to false.
|
|
2579
|
+
*/
|
|
2580
|
+
explain?: boolean;
|
|
2510
2581
|
/**
|
|
2511
2582
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
2512
2583
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -2546,8 +2617,8 @@ export interface components {
|
|
|
2546
2617
|
*/
|
|
2547
2618
|
message_base64: string;
|
|
2548
2619
|
/**
|
|
2549
|
-
* @description An optional tweak value for use
|
|
2550
|
-
*
|
|
2620
|
+
* @description An optional tweak value for use only with (some) secp256k1 key types.
|
|
2621
|
+
* This field must not be supplied for requests involving any other key type.
|
|
2551
2622
|
*
|
|
2552
2623
|
* If this field is not present or null, no tweak is applied. Otherwise, this field
|
|
2553
2624
|
* must contain a base-64 string encoding a vector of exactly 32 bytes. See the
|
|
@@ -2584,6 +2655,12 @@ export interface components {
|
|
|
2584
2655
|
};
|
|
2585
2656
|
/** @description Data to sign */
|
|
2586
2657
|
BtcMessageSignRequest: {
|
|
2658
|
+
/**
|
|
2659
|
+
* @description Request additional information to be included in the response, explaining
|
|
2660
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
2661
|
+
* Defaults to false.
|
|
2662
|
+
*/
|
|
2663
|
+
explain?: boolean;
|
|
2587
2664
|
/**
|
|
2588
2665
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
2589
2666
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -2600,12 +2677,21 @@ export interface components {
|
|
|
2600
2677
|
};
|
|
2601
2678
|
/** @description BTC message signing response */
|
|
2602
2679
|
BtcMessageSignResponse: {
|
|
2680
|
+
/** @description Optional policy evaluation tree. */
|
|
2681
|
+
policy_eval_tree?: unknown;
|
|
2682
|
+
} & {
|
|
2603
2683
|
/** @description The base64-encoded signature in BIP137 format. */
|
|
2604
2684
|
sig: string;
|
|
2605
2685
|
};
|
|
2606
2686
|
/** @enum {string} */
|
|
2607
2687
|
BtcSighashType: "All" | "None" | "Single" | "AllPlusAnyoneCanPay" | "NonePlusAnyoneCanPay" | "SinglePlusAnyoneCanPay";
|
|
2608
2688
|
BtcSignRequest: {
|
|
2689
|
+
/**
|
|
2690
|
+
* @description Request additional information to be included in the response, explaining
|
|
2691
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
2692
|
+
* Defaults to false.
|
|
2693
|
+
*/
|
|
2694
|
+
explain?: boolean;
|
|
2609
2695
|
/**
|
|
2610
2696
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
2611
2697
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -2948,6 +3034,27 @@ export interface components {
|
|
|
2948
3034
|
};
|
|
2949
3035
|
/** @description Request for creating a named policy */
|
|
2950
3036
|
CreatePolicyRequest: {
|
|
3037
|
+
/**
|
|
3038
|
+
* @description Access-control entries defining how the policy can be accessed, modified,
|
|
3039
|
+
* attached and executed.
|
|
3040
|
+
* @example [
|
|
3041
|
+
* {
|
|
3042
|
+
* "action": "attach",
|
|
3043
|
+
* "resources": [
|
|
3044
|
+
* {
|
|
3045
|
+
* "key_id": "*",
|
|
3046
|
+
* "role_id": "Role#e427c28a-9c5b-49cc-a257-878aea58a22c"
|
|
3047
|
+
* }
|
|
3048
|
+
* ],
|
|
3049
|
+
* "subjects": "*"
|
|
3050
|
+
* },
|
|
3051
|
+
* {
|
|
3052
|
+
* "action": "sign",
|
|
3053
|
+
* "subjects": "Role#e427c28a-9c5b-49cc-a257-878aea58a22c"
|
|
3054
|
+
* }
|
|
3055
|
+
* ]
|
|
3056
|
+
*/
|
|
3057
|
+
acl?: unknown[] | null;
|
|
2951
3058
|
edit_policy?: components["schemas"]["EditPolicy"] | null;
|
|
2952
3059
|
/** @description Optional metadata. */
|
|
2953
3060
|
metadata?: unknown;
|
|
@@ -3132,6 +3239,12 @@ export interface components {
|
|
|
3132
3239
|
mnemonic_id?: string | null;
|
|
3133
3240
|
};
|
|
3134
3241
|
DiffieHellmanRequest: {
|
|
3242
|
+
/**
|
|
3243
|
+
* @description Request additional information to be included in the response, explaining
|
|
3244
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
3245
|
+
* Defaults to false.
|
|
3246
|
+
*/
|
|
3247
|
+
explain?: boolean;
|
|
3135
3248
|
/**
|
|
3136
3249
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
3137
3250
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -3159,7 +3272,7 @@ export interface components {
|
|
|
3159
3272
|
public_key?: string | null;
|
|
3160
3273
|
};
|
|
3161
3274
|
/** @description The result of a Diffie Hellman key exchange */
|
|
3162
|
-
DiffieHellmanResponse: {
|
|
3275
|
+
DiffieHellmanResponse: ({
|
|
3163
3276
|
/** @description The resulting points as base64-encoded byte strings in a key-type--dependent format. */
|
|
3164
3277
|
points: string[];
|
|
3165
3278
|
/** @enum {string} */
|
|
@@ -3177,7 +3290,10 @@ export interface components {
|
|
|
3177
3290
|
ephemeral_public_key: string;
|
|
3178
3291
|
/** @enum {string} */
|
|
3179
3292
|
response_type: "encrypted";
|
|
3180
|
-
}
|
|
3293
|
+
}) & {
|
|
3294
|
+
/** @description Optional policy evaluation tree. */
|
|
3295
|
+
policy_eval_tree?: unknown;
|
|
3296
|
+
} & Record<string, never>;
|
|
3181
3297
|
/**
|
|
3182
3298
|
* @description A policy which governs when and who is allowed to update the entity this policy is
|
|
3183
3299
|
* attached to (e.g., a role or a key).
|
|
@@ -3198,6 +3314,12 @@ export interface components {
|
|
|
3198
3314
|
time_lock_until?: components["schemas"]["EpochDateTime"] | null;
|
|
3199
3315
|
};
|
|
3200
3316
|
Eip191SignRequest: {
|
|
3317
|
+
/**
|
|
3318
|
+
* @description Request additional information to be included in the response, explaining
|
|
3319
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
3320
|
+
* Defaults to false.
|
|
3321
|
+
*/
|
|
3322
|
+
explain?: boolean;
|
|
3201
3323
|
/**
|
|
3202
3324
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
3203
3325
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -3209,6 +3331,13 @@ export interface components {
|
|
|
3209
3331
|
* @example 0xdeadbeef13c0ffee
|
|
3210
3332
|
*/
|
|
3211
3333
|
data: string;
|
|
3334
|
+
/**
|
|
3335
|
+
* @description An optional tweak value that will be applied to the secret key before signing.
|
|
3336
|
+
* This field must contain a base-64 string encoding a vector of exactly 32 bytes.
|
|
3337
|
+
* See the CubeSigner documentation for more information on the tweaking procedure.
|
|
3338
|
+
* @example F41HAy2q5Gn8laF2CuMsZbRAQTmD+4Ob3VUMZ7TBGK4=
|
|
3339
|
+
*/
|
|
3340
|
+
tweak?: string | null;
|
|
3212
3341
|
};
|
|
3213
3342
|
/**
|
|
3214
3343
|
* @example {
|
|
@@ -3302,6 +3431,12 @@ export interface components {
|
|
|
3302
3431
|
* }
|
|
3303
3432
|
*/
|
|
3304
3433
|
Eip712SignRequest: {
|
|
3434
|
+
/**
|
|
3435
|
+
* @description Request additional information to be included in the response, explaining
|
|
3436
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
3437
|
+
* Defaults to false.
|
|
3438
|
+
*/
|
|
3439
|
+
explain?: boolean;
|
|
3305
3440
|
/**
|
|
3306
3441
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
3307
3442
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -3313,6 +3448,13 @@ export interface components {
|
|
|
3313
3448
|
* @description The chain-id to which this typed data will be sent
|
|
3314
3449
|
*/
|
|
3315
3450
|
chain_id: number;
|
|
3451
|
+
/**
|
|
3452
|
+
* @description An optional tweak value that will be applied to the secret key before signing.
|
|
3453
|
+
* This field must contain a base-64 string encoding a vector of exactly 32 bytes.
|
|
3454
|
+
* See the CubeSigner documentation for more information on the tweaking procedure.
|
|
3455
|
+
* @example F41HAy2q5Gn8laF2CuMsZbRAQTmD+4Ob3VUMZ7TBGK4=
|
|
3456
|
+
*/
|
|
3457
|
+
tweak?: string | null;
|
|
3316
3458
|
typed_data: components["schemas"]["TypedData"];
|
|
3317
3459
|
};
|
|
3318
3460
|
Email: string;
|
|
@@ -3379,6 +3521,12 @@ export interface components {
|
|
|
3379
3521
|
* at a specified block height.
|
|
3380
3522
|
*/
|
|
3381
3523
|
EotsCreateNonceRequest: {
|
|
3524
|
+
/**
|
|
3525
|
+
* @description Request additional information to be included in the response, explaining
|
|
3526
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
3527
|
+
* Defaults to false.
|
|
3528
|
+
*/
|
|
3529
|
+
explain?: boolean;
|
|
3382
3530
|
/**
|
|
3383
3531
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
3384
3532
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -3404,6 +3552,9 @@ export interface components {
|
|
|
3404
3552
|
};
|
|
3405
3553
|
/** @description Response generated when creating EOTS nonces */
|
|
3406
3554
|
EotsCreateNonceResponse: {
|
|
3555
|
+
/** @description Optional policy evaluation tree. */
|
|
3556
|
+
policy_eval_tree?: unknown;
|
|
3557
|
+
} & {
|
|
3407
3558
|
/**
|
|
3408
3559
|
* @description The generated nonces as an array of 0x-prefixed hex strings
|
|
3409
3560
|
* @example [
|
|
@@ -3415,6 +3566,12 @@ export interface components {
|
|
|
3415
3566
|
};
|
|
3416
3567
|
/** @description Request for an EOTS signature on a specified message, chain-id, block-height triple */
|
|
3417
3568
|
EotsSignRequest: {
|
|
3569
|
+
/**
|
|
3570
|
+
* @description Request additional information to be included in the response, explaining
|
|
3571
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
3572
|
+
* Defaults to false.
|
|
3573
|
+
*/
|
|
3574
|
+
explain?: boolean;
|
|
3418
3575
|
/**
|
|
3419
3576
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
3420
3577
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -3466,6 +3623,8 @@ export interface components {
|
|
|
3466
3623
|
error_code: components["schemas"]["SignerErrorCode"];
|
|
3467
3624
|
/** @description Error message */
|
|
3468
3625
|
message: string;
|
|
3626
|
+
/** @description Optional policy evaluation tree (included in signer responses, when requested) */
|
|
3627
|
+
policy_eval_tree?: unknown;
|
|
3469
3628
|
/** @description Optional request identifier */
|
|
3470
3629
|
request_id?: string;
|
|
3471
3630
|
};
|
|
@@ -3498,6 +3657,12 @@ export interface components {
|
|
|
3498
3657
|
* }
|
|
3499
3658
|
*/
|
|
3500
3659
|
Eth1SignRequest: {
|
|
3660
|
+
/**
|
|
3661
|
+
* @description Request additional information to be included in the response, explaining
|
|
3662
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
3663
|
+
* Defaults to false.
|
|
3664
|
+
*/
|
|
3665
|
+
explain?: boolean;
|
|
3501
3666
|
/**
|
|
3502
3667
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
3503
3668
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -3509,9 +3674,19 @@ export interface components {
|
|
|
3509
3674
|
* @description The chain id to set in the given transaction.
|
|
3510
3675
|
*/
|
|
3511
3676
|
chain_id: number;
|
|
3677
|
+
/**
|
|
3678
|
+
* @description An optional tweak value that will be applied to the secret key before signing.
|
|
3679
|
+
* This field must contain a base-64 string encoding a vector of exactly 32 bytes.
|
|
3680
|
+
* See the CubeSigner documentation for more information on the tweaking procedure.
|
|
3681
|
+
* @example F41HAy2q5Gn8laF2CuMsZbRAQTmD+4Ob3VUMZ7TBGK4=
|
|
3682
|
+
*/
|
|
3683
|
+
tweak?: string | null;
|
|
3512
3684
|
tx: components["schemas"]["Transaction"];
|
|
3513
3685
|
};
|
|
3514
3686
|
Eth1SignResponse: {
|
|
3687
|
+
/** @description Optional policy evaluation tree. */
|
|
3688
|
+
policy_eval_tree?: unknown;
|
|
3689
|
+
} & {
|
|
3515
3690
|
/**
|
|
3516
3691
|
* @description Hex-encoded RLP encoding of the transaction and its signature
|
|
3517
3692
|
* @example 0x22895118000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000e000000000000000000000000000000000000000000000000000000000000001201d58656b0e22aaa68fdc692db41979098c3886ed33015d7467de9211609cdac000000000000000000000000000000000000000000000000000000000000000308b0c2900324d3ff9adfba7fdfe5af3f9b2cdbeef7b280437bbf1b1c59a093d615afe3e5dfed9622b540cdd9b49b3c5ad00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000000000000000000000049011adbcc3bc9c0307bb07f37dda1a1a9c69d2e0000000000000000000000000000000000000000000000000000000000000060903db8525674b8e7904f9b7d7d9ec55a0a42d33cf58be25469b0c21bbb6d06172bc5bb5fd1aed8e4f35936968958116b0619553c2cb1c52e7323074c6f8eb3d5a7074fc6580148df907837fa3b164ad7fbc2288dad1e8a5b021095b57c8a36d4
|
|
@@ -3539,6 +3714,18 @@ export interface components {
|
|
|
3539
3714
|
* }
|
|
3540
3715
|
*/
|
|
3541
3716
|
Eth2SignRequest: {
|
|
3717
|
+
/**
|
|
3718
|
+
* @description Request additional information to be included in the response, explaining
|
|
3719
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
3720
|
+
* Defaults to false.
|
|
3721
|
+
*/
|
|
3722
|
+
explain?: boolean;
|
|
3723
|
+
/**
|
|
3724
|
+
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
3725
|
+
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
3726
|
+
*/
|
|
3727
|
+
metadata?: unknown;
|
|
3728
|
+
} & {
|
|
3542
3729
|
/**
|
|
3543
3730
|
* @description Subset of the Web3Signer Eth2 BLS signing request whose schema is defined
|
|
3544
3731
|
* [here](https://consensys.github.io/web3signer/web3signer-eth2.html#tag/Signing/operation/ETH2_SIGN).
|
|
@@ -3547,13 +3734,6 @@ export interface components {
|
|
|
3547
3734
|
eth2_sign_request: Record<string, never>;
|
|
3548
3735
|
network: components["schemas"]["Network"];
|
|
3549
3736
|
};
|
|
3550
|
-
Eth2SignResponse: {
|
|
3551
|
-
/**
|
|
3552
|
-
* @description Hex encoded signature prefixed with 0x e.g. "0x0000..."
|
|
3553
|
-
* @example 0xb4f2ef9d12a54e1f569596c07c97d6d730535b6ffc0d287761dc78103a86326782471a04c75ce7a6faea08ca9a4a0830031cdcb893da8711d54aa22619f1a7e71b8185ddf4c6bfd9babbd735960e35e56bd6eeb89625b04850e7a9ef8846e549
|
|
3554
|
-
*/
|
|
3555
|
-
signature: string;
|
|
3556
|
-
};
|
|
3557
3737
|
/**
|
|
3558
3738
|
* @description Representation of an event. This type is used to serialize events to CloudWatch Logs and to
|
|
3559
3739
|
* deserialize them when analyzing the logs.
|
|
@@ -3633,6 +3813,12 @@ export interface components {
|
|
|
3633
3813
|
* @enum {string}
|
|
3634
3814
|
*/
|
|
3635
3815
|
ExecutionSource: "SignRequest" | "UserInvocation";
|
|
3816
|
+
/**
|
|
3817
|
+
* ExplicitScope
|
|
3818
|
+
* @description Explicitly named scopes for accessing CubeSigner APIs
|
|
3819
|
+
* @enum {string}
|
|
3820
|
+
*/
|
|
3821
|
+
ExplicitScope: "sign:*" | "sign:ava" | "sign:blob" | "sign:diffieHellman" | "sign:btc:*" | "sign:btc:segwit" | "sign:btc:taproot" | "sign:btc:psbt:*" | "sign:btc:psbt:doge" | "sign:btc:psbt:legacy" | "sign:btc:psbt:segwit" | "sign:btc:psbt:taproot" | "sign:btc:psbt:ltcSegwit" | "sign:btc:message:*" | "sign:btc:message:segwit" | "sign:btc:message:legacy" | "sign:babylon:*" | "sign:babylon:eots:*" | "sign:babylon:eots:nonces" | "sign:babylon:eots:sign" | "sign:babylon:staking:*" | "sign:babylon:staking:deposit" | "sign:babylon:staking:unbond" | "sign:babylon:staking:withdraw" | "sign:babylon:staking:slash" | "sign:babylon:registration" | "sign:babylon:covenant" | "sign:evm:*" | "sign:evm:tx" | "sign:evm:eip191" | "sign:evm:eip712" | "sign:eth2:*" | "sign:eth2:validate" | "sign:eth2:stake" | "sign:eth2:unstake" | "sign:solana" | "sign:sui" | "sign:tendermint" | "sign:mmi" | "manage:*" | "manage:readonly" | "manage:email" | "manage:mfa:*" | "manage:mfa:readonly" | "manage:mfa:list" | "manage:mfa:vote:*" | "manage:mfa:vote:cs" | "manage:mfa:vote:email" | "manage:mfa:vote:fido" | "manage:mfa:vote:totp" | "manage:mfa:register:*" | "manage:mfa:register:fido" | "manage:mfa:register:totp" | "manage:mfa:register:email" | "manage:mfa:unregister:*" | "manage:mfa:unregister:fido" | "manage:mfa:unregister:totp" | "manage:mfa:verify:*" | "manage:mfa:verify:totp" | "manage:key:*" | "manage:key:readonly" | "manage:key:get" | "manage:key:attest" | "manage:key:listRoles" | "manage:key:list" | "manage:key:history:tx:list" | "manage:key:create" | "manage:key:import" | "manage:key:update:*" | "manage:key:update:owner" | "manage:key:update:policy" | "manage:key:update:enabled" | "manage:key:update:metadata" | "manage:key:update:editPolicy" | "manage:key:delete" | "manage:policy:*" | "manage:policy:create" | "manage:policy:get" | "manage:policy:list" | "manage:policy:delete" | "manage:policy:update:*" | "manage:policy:update:owner" | "manage:policy:update:name" | "manage:policy:update:acl" | "manage:policy:update:editPolicy" | "manage:policy:update:metadata" | "manage:policy:update:rule" | "manage:policy:invoke" | "manage:policy:wasm:*" | "manage:policy:wasm:upload" | "manage:policy:secrets:*" | "manage:policy:secrets:get" | "manage:policy:secrets:update:*" | "manage:policy:secrets:update:values" | "manage:policy:secrets:update:editPolicy" | "manage:contact:*" | "manage:contact:create" | "manage:contact:get" | "manage:contact:list" | "manage:contact:delete" | "manage:contact:update:*" | "manage:contact:update:name" | "manage:contact:update:addresses" | "manage:contact:update:owner" | "manage:contact:update:metadata" | "manage:contact:update:editPolicy" | "manage:contact:lookup:*" | "manage:contact:lookup:address" | "manage:policy:createImportKey" | "manage:role:*" | "manage:role:readonly" | "manage:role:create" | "manage:role:delete" | "manage:role:get:*" | "manage:role:get:keys" | "manage:role:get:keys:list" | "manage:role:get:keys:get" | "manage:role:get:users" | "manage:role:list" | "manage:role:update:*" | "manage:role:update:enabled" | "manage:role:update:policy" | "manage:role:update:editPolicy" | "manage:role:update:key:*" | "manage:role:update:key:add" | "manage:role:update:key:remove" | "manage:role:update:user:*" | "manage:role:update:user:add" | "manage:role:update:user:remove" | "manage:role:history:tx:list" | "manage:identity:*" | "manage:identity:verify" | "manage:identity:add" | "manage:identity:remove" | "manage:identity:list" | "manage:org:*" | "manage:org:create" | "manage:org:metrics:query" | "manage:org:readonly" | "manage:org:addUser" | "manage:org:inviteUser" | "manage:org:inviteAlien" | "manage:org:updateMembership" | "manage:org:listUsers" | "manage:org:user:get" | "manage:org:deleteUser" | "manage:org:get" | "manage:org:user:resetMfa" | "manage:session:*" | "manage:session:readonly" | "manage:session:get" | "manage:session:list" | "manage:session:create" | "manage:session:extend" | "manage:session:revoke" | "manage:export:*" | "manage:export:org:*" | "manage:export:org:get" | "manage:export:user:*" | "manage:export:user:delete" | "manage:export:user:list" | "manage:authMigration:*" | "manage:authMigration:identity:add" | "manage:authMigration:identity:remove" | "manage:authMigration:user:update" | "manage:mmi:*" | "manage:mmi:readonly" | "manage:mmi:get" | "manage:mmi:list" | "manage:mmi:reject" | "manage:mmi:delete" | "export:*" | "export:user:*" | "export:user:init" | "export:user:complete" | "mmi:*" | "orgAccess:*" | "orgAccess:child:*";
|
|
3636
3822
|
/**
|
|
3637
3823
|
* @description This type specifies the interpretation of the `fee` field in Babylon
|
|
3638
3824
|
* staking requests. If `sats`, the field is intpreted as a fixed value
|
|
@@ -3688,7 +3874,7 @@ export interface components {
|
|
|
3688
3874
|
request_device_identifier?: boolean;
|
|
3689
3875
|
};
|
|
3690
3876
|
/** @enum {string} */
|
|
3691
|
-
ForbiddenErrorCode: "CannotAssumeIdentity" | "SentryDisallowed" | "PasskeyLoginDisabled" | "PasskeyNotRegistered" | "CannotCreateOrg" | "WrongMfaEmailOtpJwt" | "OrgFlagNotSet" | "FidoRequiredToRemoveTotp" | "OidcIdentityLimitReached" | "OidcScopeCeilingMissing" | "OidcIssuerNotAllowedForMemberRole" | "OidcNoMemberRolesAllowed" | "EmailOtpNotConfigured" | "MfaChallengeExpired" | "ChainIdNotAllowed" | "InvalidOrg" | "OrgIdMismatch" | "SessionForWrongOrg" | "SelfDelete" | "SelfDisable" | "InvalidOrgMembershipRoleChange" | "UserDisabled" | "OrgDisabled" | "OrgNotFound" | "OrgWithoutOwner" | "OrphanedUser" | "OidcUserNotFound" | "UserNotInOrg" | "UserNotOrgOwner" | "UserNotKeyOwner" | "InvalidRole" | "DisabledRole" | "KeyDisabled" | "KeyNotInRole" | "ContactNotInOrg" | "UserExportRequestNotInOrg" | "UserExportRequestInvalid" | "UserExportDisabled" | "UserNotOriginalKeyOwner" | "UserNotInRole" | "MustBeFullMember" | "SessionExpired" | "SessionChanged" | "SessionRevoked" | "ExpectedUserSession" | "SessionRoleChanged" | "ScopedNameNotFound" | "SessionInvalidEpochToken" | "SessionInvalidRefreshToken" | "SessionRefreshTokenExpired" | "InvalidAuthHeader" | "SessionNotFound" | "InvalidArn" | "SessionInvalidAuthToken" | "SessionAuthTokenExpired" | "SessionPossiblyStolenToken" | "MfaDisallowedIdentity" | "MfaDisallowedApprover" | "MfaTypeNotAllowed" | "MfaNotApprovedYet" | "MfaConfirmationCodeMismatch" | "MfaHttpRequestMismatch" | "MfaRemoveBelowMin" | "MfaOrgRequirementNotMet" | "MfaRegistrationDisallowed" | "TotpAlreadyConfigured" | "TotpConfigurationChanged" | "MfaTotpBadConfiguration" | "MfaTotpBadCode" | "MfaTotpRateLimit" | "ImproperSessionScope" | "FullSessionRequired" | "SessionWithoutAnyScopeUnder" | "UserRoleUnprivileged" | "MemberRoleForbidden" | "MfaNotConfigured" | "RemoveLastOidcIdentity" | "OperationNotAllowed" | "OrgExportRetrievalDisabled" | "AutoAddBlsKeyToProtectedRole" | "UserNotPolicyOwner" | "UserNotContactOwner" | "LegacySessionCannotHaveScopeCeiling" | "RoleInParentOrgNotAllowed" | "RemoveKeyFromRoleUserNotAllowed" | "SiweChallengeExpired" | "SiweMessageNotValid" | "SiweMessageInvalidSignature";
|
|
3877
|
+
ForbiddenErrorCode: "CannotAssumeIdentity" | "SentryDisallowed" | "PasskeyLoginDisabled" | "PasskeyNotRegistered" | "CannotCreateOrg" | "WrongMfaEmailOtpJwt" | "OrgFlagNotSet" | "FidoRequiredToRemoveTotp" | "OidcIdentityLimitReached" | "OidcScopeCeilingMissing" | "OidcIssuerNotAllowedForMemberRole" | "OidcNoMemberRolesAllowed" | "EmailOtpNotConfigured" | "MfaChallengeExpired" | "ChainIdNotAllowed" | "InvalidOrg" | "OrgIdMismatch" | "SessionForWrongOrg" | "SelfDelete" | "SelfDisable" | "InvalidOrgMembershipRoleChange" | "UserDisabled" | "OrgDisabled" | "OrgNotFound" | "OrgWithoutOwner" | "OrphanedUser" | "OidcUserNotFound" | "UserNotInOrg" | "UserNotOrgOwner" | "UserNotKeyOwner" | "InvalidRole" | "DisabledRole" | "KeyDisabled" | "KeyNotInRole" | "ContactNotInOrg" | "UserExportRequestNotInOrg" | "UserExportRequestInvalid" | "UserExportDisabled" | "UserNotOriginalKeyOwner" | "UserNotInRole" | "MustBeFullMember" | "SessionExpired" | "SessionChanged" | "SessionRevoked" | "ExpectedUserSession" | "SessionRoleChanged" | "ScopedNameNotFound" | "SessionInvalidEpochToken" | "SessionInvalidRefreshToken" | "SessionRefreshTokenExpired" | "InvalidAuthHeader" | "SessionNotFound" | "InvalidArn" | "SessionInvalidAuthToken" | "SessionAuthTokenExpired" | "SessionPossiblyStolenToken" | "MfaDisallowedIdentity" | "MfaDisallowedApprover" | "MfaTypeNotAllowed" | "MfaNotApprovedYet" | "MfaConfirmationCodeMismatch" | "MfaHttpRequestMismatch" | "MfaRemoveBelowMin" | "MfaOrgRequirementNotMet" | "MfaRegistrationDisallowed" | "TotpAlreadyConfigured" | "TotpConfigurationChanged" | "MfaTotpBadConfiguration" | "MfaTotpBadCode" | "MfaTotpRateLimit" | "ImproperSessionScope" | "FullSessionRequired" | "SessionWithoutAnyScopeUnder" | "UserRoleUnprivileged" | "MemberRoleForbidden" | "MfaNotConfigured" | "RemoveLastOidcIdentity" | "OperationNotAllowed" | "OrgExportRetrievalDisabled" | "AutoAddBlsKeyToProtectedRole" | "UserNotPolicyOwner" | "UserNotContactOwner" | "LegacySessionCannotHaveScopeCeiling" | "RoleInParentOrgNotAllowed" | "RemoveKeyFromRoleUserNotAllowed" | "SiweChallengeExpired" | "SiweMessageNotValid" | "SiweMessageInvalidSignature" | "Acl";
|
|
3692
3878
|
/**
|
|
3693
3879
|
* @description Specifies a fork of the `BeaconChain`, to prevent replay attacks.
|
|
3694
3880
|
* The schema of `Fork` is defined in the [Beacon chain
|
|
@@ -3920,7 +4106,7 @@ export interface components {
|
|
|
3920
4106
|
} | null;
|
|
3921
4107
|
};
|
|
3922
4108
|
/** @enum {string} */
|
|
3923
|
-
InternalErrorCode: "NoMaterialId" | "UnresolvedPolicyReference" | "FidoKeyAssociatedWithMultipleUsers" | "ClaimsParseError" | "InvalidThrottleId" | "InvalidEmailAddress" | "EmailTemplateRender" | "OidcIdentityHeaderMissing" | "OidcIdentityParseError" | "SystemTimeError" | "PasswordHashParseError" | "SendMailError" | "ReqwestError" | "EmailConstructionError" | "TsWriteError" | "TsQueryError" | "DbQueryError" | "DbGetError" | "DbDeleteError" | "DbPutError" | "DbUpdateError" | "SerdeError" | "TestAndSetError" | "DbGetItemsError" | "DbWriteError" | "CubistSignerError" | "CwListMetricsError" | "CwPutMetricDataError" | "GetAwsSecretError" | "SecretNotFound" | "KmsGenerateRandomError" | "MalformedTotpBytes" | "KmsGenerateRandomNoResponseError" | "CreateKeyError" | "ParseDerivationPathError" | "SplitSignerError" | "CreateImportKeyError" | "CreateEotsNoncesError" | "EotsSignError" | "BabylonCovSignError" | "CognitoDeleteUserError" | "CognitoListUsersError" | "CognitoGetUserError" | "MissingUserEmail" | "CognitoResendUserInvitation" | "CognitoSetUserPasswordError" | "GenericInternalError" | "OidcAuthWithoutOrg" | "MissingKeyMetadata" | "KmsEnableKeyError" | "KmsDisableKeyError" | "LambdaInvokeError" | "LambdaNoResponseError" | "LambdaFailure" | "LambdaUnparsableResponse" | "SerializeEncryptedExportKeyError" | "DeserializeEncryptedExportKeyError" | "ReEncryptUserExport" | "S3UploadError" | "S3DownloadError" | "S3CopyError" | "S3ListObjectsError" | "S3DeleteObjectsError" | "S3BuildError" | "S3PresignedUrlError" | "ManagedStateMissing" | "InternalHeaderMissing" | "InvalidInternalHeaderValue" | "RequestLocalStateAlreadySet" | "OidcOrgMismatch" | "OidcIssuerInvalidJwk" | "InvalidPkForMaterialId" | "UncheckedOrg" | "SessionOrgIdMissing" | "AvaSignCredsMissing" | "AvaSignSignatureMissing" | "ExpectedRoleSession" | "InvalidThirdPartyIdentity" | "CognitoGetUser" | "SnsSubscribeError" | "SnsUnsubscribeError" | "SnsGetSubscriptionAttributesError" | "SnsSubscriptionAttributesMissing" | "SnsSetSubscriptionAttributesError" | "SnsPublishBatchError" | "InconsistentMultiValueTestAndSet" | "MaterialIdError" | "InvalidBtcAddress" | "HistoricalTxBodyMissing" | "InvalidOperation" | "ParentOrgNotFound" | "OrgParentLoop" | "ResolvedParentOrgWithNoScopeCeiling" | "InvalidUploadObjectId" | "PolicyEngineNotFound" | "PolicyEngineError" | "PolicySecretsEncryptionError" | "CreatePolicyImportKeyError" | "InvalidAlias" | "EmptyUpdateModifiedObject" | "EmptyUpdateModifiedActions" | "DbContactAddressesInvalid";
|
|
4109
|
+
InternalErrorCode: "NoMaterialId" | "UnexpectedCheckerRule" | "UnresolvedPolicyReference" | "FidoKeyAssociatedWithMultipleUsers" | "ClaimsParseError" | "InvalidThrottleId" | "InvalidEmailAddress" | "EmailTemplateRender" | "OidcIdentityHeaderMissing" | "OidcIdentityParseError" | "SystemTimeError" | "PasswordHashParseError" | "SendMailError" | "ReqwestError" | "EmailConstructionError" | "TsWriteError" | "TsQueryError" | "DbQueryError" | "DbGetError" | "DbDeleteError" | "DbPutError" | "DbUpdateError" | "SerdeError" | "TestAndSetError" | "DbGetItemsError" | "DbWriteError" | "CubistSignerError" | "CwListMetricsError" | "CwPutMetricDataError" | "GetAwsSecretError" | "SecretNotFound" | "KmsGenerateRandomError" | "MalformedTotpBytes" | "KmsGenerateRandomNoResponseError" | "CreateKeyError" | "ParseDerivationPathError" | "SplitSignerError" | "CreateImportKeyError" | "CreateEotsNoncesError" | "EotsSignError" | "BabylonCovSignError" | "CognitoDeleteUserError" | "CognitoListUsersError" | "CognitoGetUserError" | "MissingUserEmail" | "CognitoResendUserInvitation" | "CognitoSetUserPasswordError" | "GenericInternalError" | "OidcAuthWithoutOrg" | "MissingKeyMetadata" | "KmsEnableKeyError" | "KmsDisableKeyError" | "LambdaInvokeError" | "LambdaNoResponseError" | "LambdaFailure" | "LambdaUnparsableResponse" | "SerializeEncryptedExportKeyError" | "DeserializeEncryptedExportKeyError" | "ReEncryptUserExport" | "S3UploadError" | "S3DownloadError" | "S3CopyError" | "S3ListObjectsError" | "S3DeleteObjectsError" | "S3BuildError" | "S3PresignedUrlError" | "ManagedStateMissing" | "InternalHeaderMissing" | "InvalidInternalHeaderValue" | "RequestLocalStateAlreadySet" | "OidcOrgMismatch" | "OidcIssuerInvalidJwk" | "InvalidPkForMaterialId" | "SegwitTweakFailed" | "UncheckedOrg" | "SessionOrgIdMissing" | "AvaSignCredsMissing" | "AvaSignSignatureMissing" | "ExpectedRoleSession" | "InvalidThirdPartyIdentity" | "CognitoGetUser" | "SnsSubscribeError" | "SnsUnsubscribeError" | "SnsGetSubscriptionAttributesError" | "SnsSubscriptionAttributesMissing" | "SnsSetSubscriptionAttributesError" | "SnsPublishBatchError" | "InconsistentMultiValueTestAndSet" | "MaterialIdError" | "InvalidBtcAddress" | "HistoricalTxBodyMissing" | "InvalidOperation" | "ParentOrgNotFound" | "OrgParentLoop" | "ResolvedParentOrgWithNoScopeCeiling" | "InvalidUploadObjectId" | "PolicyEngineNotFound" | "PolicyEngineError" | "PolicySecretsEncryptionError" | "CreatePolicyImportKeyError" | "InvalidAlias" | "EmptyUpdateModifiedObject" | "EmptyUpdateModifiedActions" | "DbContactAddressesInvalid";
|
|
3924
4110
|
InvitationAcceptRequest: {
|
|
3925
4111
|
auth: components["schemas"]["AuthSource"];
|
|
3926
4112
|
/** @description Invitation token */
|
|
@@ -4070,7 +4256,10 @@ export interface components {
|
|
|
4070
4256
|
/** @description The type of key this package represents */
|
|
4071
4257
|
key_type: string;
|
|
4072
4258
|
};
|
|
4073
|
-
JwkSetResponse:
|
|
4259
|
+
JwkSetResponse: {
|
|
4260
|
+
/** @description The keys included in this set */
|
|
4261
|
+
keys: Record<string, never>[];
|
|
4262
|
+
};
|
|
4074
4263
|
KeyCountDimensions: {
|
|
4075
4264
|
/** @description The key type */
|
|
4076
4265
|
key_type: string;
|
|
@@ -4161,6 +4350,8 @@ export interface components {
|
|
|
4161
4350
|
* ]
|
|
4162
4351
|
*/
|
|
4163
4352
|
policy: unknown[];
|
|
4353
|
+
/** @description The key provenance. */
|
|
4354
|
+
provenance?: string | null;
|
|
4164
4355
|
/**
|
|
4165
4356
|
* @description Hex-encoded, serialized public key. The format used depends on the key type:
|
|
4166
4357
|
* - Secp256k1 keys use 65-byte uncompressed SECG format;
|
|
@@ -4178,6 +4369,11 @@ export interface components {
|
|
|
4178
4369
|
/** @description The region affinity for this key */
|
|
4179
4370
|
region?: string;
|
|
4180
4371
|
};
|
|
4372
|
+
/** @description Response returned when requesting a key attestation. */
|
|
4373
|
+
KeyInfoJwt: {
|
|
4374
|
+
/** @description A JSON Web Token whose claims contain the `KeyInfo` structure. */
|
|
4375
|
+
jwt: string;
|
|
4376
|
+
};
|
|
4181
4377
|
KeyInfos: {
|
|
4182
4378
|
keys: components["schemas"]["KeyInfo"][];
|
|
4183
4379
|
};
|
|
@@ -5295,6 +5491,11 @@ export interface components {
|
|
|
5295
5491
|
} | null;
|
|
5296
5492
|
message_tx?: components["schemas"]["TypedTransaction"] | null;
|
|
5297
5493
|
}) & Record<string, never>;
|
|
5494
|
+
/**
|
|
5495
|
+
* @description The possible actions that can be performed on a [NamedPolicy] that are restricted by ACL.
|
|
5496
|
+
* @enum {string}
|
|
5497
|
+
*/
|
|
5498
|
+
PolicyAction: "ReadAll" | "ReadPolicy" | "ReadLogs" | "UpdateAll" | "UpdateName" | "UpdateRules" | "UpdateMetadata" | "UpdateEditPolicy" | "UpdateOwner" | "UpdateAcl" | "Delete" | "Attach" | "Sign" | "Invoke";
|
|
5298
5499
|
/** @description The id for attaching a named policy to a key, role, or key in role. */
|
|
5299
5500
|
PolicyAttachedToId: OneOf<[
|
|
5300
5501
|
{
|
|
@@ -5339,6 +5540,8 @@ export interface components {
|
|
|
5339
5540
|
PolicyErrorOwnCodes: "SuiTxReceiversDisallowedTransactionKind" | "SuiTxReceiversDisallowedTransferAddress" | "SuiTxReceiversDisallowedCommand" | "BtcTxDisallowedOutputs" | "BtcSignatureExceededValue" | "BtcValueOverflow" | "BtcSighashTypeDisallowed" | "EvmTxReceiverMismatch" | "EvmTxSenderMismatch" | "EvmTxExceededValue" | "EvmTxExceededGasCost" | "EvmTxGasCostUndefined" | "EvmDataDisallowed" | "Erc20DataInvalid" | "EvmContractAddressUndefined" | "EvmContractChainIdUndefined" | "EvmDataNotDefined" | "EvmDataInvalid" | "EvmContractNotInAllowlist" | "Erc20ExceededTransferLimit" | "Erc20ReceiverMismatch" | "Erc20ExceededApproveLimit" | "Erc20SpenderMismatch" | "EvmFunctionNotInAllowlist" | "EvmFunctionCallInvalid" | "PolicyDisjunctionError" | "PolicyNegationError" | "Eth2ExceededMaxUnstake" | "Eth2ConcurrentUnstaking" | "NotInIpv4Allowlist" | "NotInOriginAllowlist" | "InvalidSourceIp" | "RawSigningNotAllowed" | "DiffieHellmanExchangeNotAllowed" | "Eip712SigningNotAllowed" | "OidcSourceNotAllowed" | "NoOidcAuthSourcesDefined" | "AddKeyToRoleDisallowed" | "KeysAlreadyInRole" | "KeyInMultipleRoles" | "KeyAccessError" | "RequireRoleSessionKeyAccessError" | "BtcMessageSigningNotAllowed" | "Eip191SigningNotAllowed" | "TaprootSigningDisallowed" | "SegwitSigningDisallowed" | "PsbtSigningDisallowed" | "BabylonStakingDisallowed" | "TimeLocked" | "BabylonStakingNetwork" | "BabylonStakingParamsVersion" | "BabylonStakingExplicitParams" | "BabylonStakingStakerPk" | "BabylonStakingFinalityProviderPk" | "BabylonStakingLockTime" | "BabylonStakingValue" | "BabylonStakingChangeAddress" | "BabylonStakingFee" | "BabylonStakingWithdrawalAddress" | "BabylonStakingBbnAddress" | "SolanaInstructionCountLow" | "SolanaInstructionCountHigh" | "SolanaNotInInstructionAllowlist" | "SolanaInstructionMismatch" | "WasmPoliciesDisabled" | "WasmPolicyDenied" | "WasmPolicyFailed" | "WebhookPoliciesDisabled" | "DeniedByWebhook";
|
|
5340
5541
|
/** @description A struct containing all the information about a specific version of a policy. */
|
|
5341
5542
|
PolicyInfo: {
|
|
5543
|
+
/** @description The access-control entries for the policy. */
|
|
5544
|
+
acl?: unknown[] | null;
|
|
5342
5545
|
/** @description A list of entities (keys, roles, etc.) the policy is attached to. */
|
|
5343
5546
|
attached_to: components["schemas"]["PolicyAttachedToId"][];
|
|
5344
5547
|
created: components["schemas"]["EpochDateTime"];
|
|
@@ -5411,7 +5614,7 @@ export interface components {
|
|
|
5411
5614
|
PolicyType: "Key" | "Role" | "Wasm";
|
|
5412
5615
|
PreconditionErrorCode: components["schemas"]["PreconditionErrorOwnCodes"] | components["schemas"]["PolicyErrorCode"];
|
|
5413
5616
|
/** @enum {string} */
|
|
5414
|
-
PreconditionErrorOwnCodes: "KeyRegionLocked" | "MfaRegionLocked" | "Eth2ProposerSlotTooLow" | "Eth2AttestationSourceEpochTooLow" | "Eth2AttestationTargetEpochTooLow" | "Eth2ConcurrentBlockSigning" | "Eth2ConcurrentAttestationSigning" | "Eth2MultiDepositToNonGeneratedKey" | "Eth2MultiDepositUnknownInitialDeposit" | "Eth2MultiDepositWithdrawalAddressMismatch" | "ConcurrentSigningWhenTimeLimitPolicyIsDefined" | "BabylonEotsConcurrentSigning" | "TendermintStateError" | "TendermintConcurrentSigning" | "MfaApprovalsNotYetValid";
|
|
5617
|
+
PreconditionErrorOwnCodes: "KeyRegionLocked" | "KeyRegionChangedRecently" | "MfaRegionLocked" | "Eth2ProposerSlotTooLow" | "Eth2AttestationSourceEpochTooLow" | "Eth2AttestationTargetEpochTooLow" | "Eth2ConcurrentBlockSigning" | "Eth2ConcurrentAttestationSigning" | "Eth2MultiDepositToNonGeneratedKey" | "Eth2MultiDepositUnknownInitialDeposit" | "Eth2MultiDepositWithdrawalAddressMismatch" | "ConcurrentSigningWhenTimeLimitPolicyIsDefined" | "BabylonEotsConcurrentSigning" | "TendermintStateError" | "TendermintConcurrentSigning" | "MfaApprovalsNotYetValid";
|
|
5415
5618
|
/** @description Contains outputs of previous transactions. */
|
|
5416
5619
|
PrevOutputs: OneOf<[
|
|
5417
5620
|
{
|
|
@@ -5436,6 +5639,12 @@ export interface components {
|
|
|
5436
5639
|
]>;
|
|
5437
5640
|
/** @description A request to sign a PSBT */
|
|
5438
5641
|
PsbtSignRequest: {
|
|
5642
|
+
/**
|
|
5643
|
+
* @description Request additional information to be included in the response, explaining
|
|
5644
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
5645
|
+
* Defaults to false.
|
|
5646
|
+
*/
|
|
5647
|
+
explain?: boolean;
|
|
5439
5648
|
/**
|
|
5440
5649
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
5441
5650
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -5457,6 +5666,9 @@ export interface components {
|
|
|
5457
5666
|
};
|
|
5458
5667
|
/** @description Response to a PSBT signing request */
|
|
5459
5668
|
PsbtSignResponse: {
|
|
5669
|
+
/** @description Optional policy evaluation tree. */
|
|
5670
|
+
policy_eval_tree?: unknown;
|
|
5671
|
+
} & {
|
|
5460
5672
|
/**
|
|
5461
5673
|
* @description The PSBT in standard hex serialization, without leading "0x".
|
|
5462
5674
|
* @example 70736274ff01005e...
|
|
@@ -6002,7 +6214,7 @@ export interface components {
|
|
|
6002
6214
|
users?: string[] | null;
|
|
6003
6215
|
};
|
|
6004
6216
|
/** @description All scopes for accessing CubeSigner APIs */
|
|
6005
|
-
Scope:
|
|
6217
|
+
Scope: components["schemas"]["ExplicitScope"] | string;
|
|
6006
6218
|
/** @description A set of scopes. */
|
|
6007
6219
|
ScopeSet: OneOf<[
|
|
6008
6220
|
"All",
|
|
@@ -6118,6 +6330,9 @@ export interface components {
|
|
|
6118
6330
|
org_id: string;
|
|
6119
6331
|
};
|
|
6120
6332
|
SignResponse: {
|
|
6333
|
+
/** @description Optional policy evaluation tree. */
|
|
6334
|
+
policy_eval_tree?: unknown;
|
|
6335
|
+
} & {
|
|
6121
6336
|
/** @description The hex-encoded resulting signature. */
|
|
6122
6337
|
signature: string;
|
|
6123
6338
|
};
|
|
@@ -6138,7 +6353,7 @@ export interface components {
|
|
|
6138
6353
|
};
|
|
6139
6354
|
SignerErrorCode: components["schemas"]["SignerErrorOwnCodes"] | components["schemas"]["AcceptedValueCode"] | components["schemas"]["BadRequestErrorCode"] | components["schemas"]["BadGatewayErrorCode"] | components["schemas"]["NotFoundErrorCode"] | components["schemas"]["ForbiddenErrorCode"] | components["schemas"]["UnauthorizedErrorCode"] | components["schemas"]["PreconditionErrorCode"] | components["schemas"]["TimeoutErrorCode"] | components["schemas"]["ConflictErrorCode"] | components["schemas"]["InternalErrorCode"];
|
|
6140
6355
|
/** @enum {string} */
|
|
6141
|
-
SignerErrorOwnCodes: "PreComputed" | "StatusCodeWithMessage" | "JrpcError" | "UnhandledError" | "ProxyStartError" | "EnclaveError";
|
|
6356
|
+
SignerErrorOwnCodes: "PreComputed" | "StatusCodeWithMessage" | "JrpcError" | "UnhandledError" | "ProxyStartError" | "EnclaveError" | "PolicyErrorWithEvalTree";
|
|
6142
6357
|
/** @description Answer to a Sign-in with Ethereum challenge. */
|
|
6143
6358
|
SiweCompleteRequest: {
|
|
6144
6359
|
challenge_id: components["schemas"]["Id"];
|
|
@@ -6194,6 +6409,12 @@ export interface components {
|
|
|
6194
6409
|
* }
|
|
6195
6410
|
*/
|
|
6196
6411
|
SolanaSignRequest: {
|
|
6412
|
+
/**
|
|
6413
|
+
* @description Request additional information to be included in the response, explaining
|
|
6414
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
6415
|
+
* Defaults to false.
|
|
6416
|
+
*/
|
|
6417
|
+
explain?: boolean;
|
|
6197
6418
|
/**
|
|
6198
6419
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
6199
6420
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -6212,6 +6433,18 @@ export interface components {
|
|
|
6212
6433
|
source_ip: string;
|
|
6213
6434
|
};
|
|
6214
6435
|
StakeRequest: {
|
|
6436
|
+
/**
|
|
6437
|
+
* @description Request additional information to be included in the response, explaining
|
|
6438
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
6439
|
+
* Defaults to false.
|
|
6440
|
+
*/
|
|
6441
|
+
explain?: boolean;
|
|
6442
|
+
/**
|
|
6443
|
+
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
6444
|
+
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
6445
|
+
*/
|
|
6446
|
+
metadata?: unknown;
|
|
6447
|
+
} & {
|
|
6215
6448
|
/**
|
|
6216
6449
|
* Format: int64
|
|
6217
6450
|
* @description The chain on which we will deposit
|
|
@@ -6239,13 +6472,17 @@ export interface components {
|
|
|
6239
6472
|
*/
|
|
6240
6473
|
withdrawal_addr: string;
|
|
6241
6474
|
};
|
|
6242
|
-
StakeResponse: {
|
|
6475
|
+
StakeResponse: ({
|
|
6476
|
+
/** @description Optional policy evaluation tree. */
|
|
6477
|
+
policy_eval_tree?: unknown;
|
|
6478
|
+
} & {
|
|
6479
|
+
deposit_tx: components["schemas"]["DepositTxn"];
|
|
6480
|
+
}) & {
|
|
6243
6481
|
/**
|
|
6244
6482
|
* @description The validator key id ("Key#...")
|
|
6245
6483
|
* @example Key#db1731f8-3659-45c0-885b-e11e1f5b7be2
|
|
6246
6484
|
*/
|
|
6247
6485
|
created_validator_key_id: string;
|
|
6248
|
-
deposit_tx: components["schemas"]["DepositTxn"];
|
|
6249
6486
|
};
|
|
6250
6487
|
Status: {
|
|
6251
6488
|
/** @description Users who are allowed to approve. Must be non-empty. */
|
|
@@ -6291,6 +6528,12 @@ export interface components {
|
|
|
6291
6528
|
SuiChain: "mainnet" | "devnet" | "testnet";
|
|
6292
6529
|
/** @description Request to sign a serialized SUI transaction */
|
|
6293
6530
|
SuiSignRequest: {
|
|
6531
|
+
/**
|
|
6532
|
+
* @description Request additional information to be included in the response, explaining
|
|
6533
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
6534
|
+
* Defaults to false.
|
|
6535
|
+
*/
|
|
6536
|
+
explain?: boolean;
|
|
6294
6537
|
/**
|
|
6295
6538
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
6296
6539
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -6306,6 +6549,12 @@ export interface components {
|
|
|
6306
6549
|
tx: string;
|
|
6307
6550
|
};
|
|
6308
6551
|
TaprootSignRequest: {
|
|
6552
|
+
/**
|
|
6553
|
+
* @description Request additional information to be included in the response, explaining
|
|
6554
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
6555
|
+
* Defaults to false.
|
|
6556
|
+
*/
|
|
6557
|
+
explain?: boolean;
|
|
6309
6558
|
/**
|
|
6310
6559
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
6311
6560
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -6367,6 +6616,12 @@ export interface components {
|
|
|
6367
6616
|
TelegramEnvironment: "production" | "test";
|
|
6368
6617
|
/** @description The request for using the Tendermint sign endpoint. */
|
|
6369
6618
|
TendermintSignRequest: {
|
|
6619
|
+
/**
|
|
6620
|
+
* @description Request additional information to be included in the response, explaining
|
|
6621
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
6622
|
+
* Defaults to false.
|
|
6623
|
+
*/
|
|
6624
|
+
explain?: boolean;
|
|
6370
6625
|
/**
|
|
6371
6626
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
6372
6627
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -6620,7 +6875,6 @@ export interface components {
|
|
|
6620
6875
|
*/
|
|
6621
6876
|
genesis_fork_version?: string | null;
|
|
6622
6877
|
};
|
|
6623
|
-
/** @description Unstake message request. */
|
|
6624
6878
|
UnstakeRequest: {
|
|
6625
6879
|
epoch?: components["schemas"]["Epoch"] | null;
|
|
6626
6880
|
fork: components["schemas"]["Fork"];
|
|
@@ -6635,15 +6889,20 @@ export interface components {
|
|
|
6635
6889
|
* @example 31337
|
|
6636
6890
|
*/
|
|
6637
6891
|
validator_index: string;
|
|
6638
|
-
}
|
|
6639
|
-
|
|
6640
|
-
|
|
6641
|
-
|
|
6642
|
-
|
|
6643
|
-
|
|
6644
|
-
|
|
6645
|
-
|
|
6646
|
-
|
|
6892
|
+
} & {
|
|
6893
|
+
/**
|
|
6894
|
+
* @description Request additional information to be included in the response, explaining
|
|
6895
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
6896
|
+
* Defaults to false.
|
|
6897
|
+
*/
|
|
6898
|
+
explain?: boolean;
|
|
6899
|
+
/**
|
|
6900
|
+
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
6901
|
+
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
6902
|
+
*/
|
|
6903
|
+
metadata?: unknown;
|
|
6904
|
+
} & Record<string, never>;
|
|
6905
|
+
/** @description A response to sign an eth2 unstake request. */
|
|
6647
6906
|
UnstakeResponse: {
|
|
6648
6907
|
message: components["schemas"]["VoluntaryExit"];
|
|
6649
6908
|
/**
|
|
@@ -6651,7 +6910,10 @@ export interface components {
|
|
|
6651
6910
|
* @example 0x910c7cd537ed91cc8c4a82f3cbd832e9be8c24a22e9c86df479f7ce42025ea6a09619b418b666a060e260d2aae31b8e50e9d05ca3442c7eed3b507e5207e14674275f68c2ba84c4bf6b8dd364a304acac8cfab3681e2514b4400f9242bc61164
|
|
6652
6911
|
*/
|
|
6653
6912
|
signature: string;
|
|
6654
|
-
}
|
|
6913
|
+
} & {
|
|
6914
|
+
/** @description Optional policy evaluation tree. */
|
|
6915
|
+
policy_eval_tree?: unknown;
|
|
6916
|
+
} & Record<string, never>;
|
|
6655
6917
|
/** @description The information needed to update a Contact. */
|
|
6656
6918
|
UpdateContactRequest: {
|
|
6657
6919
|
addresses?: components["schemas"]["AddressMap"] | null;
|
|
@@ -6673,6 +6935,13 @@ export interface components {
|
|
|
6673
6935
|
* Once disabled, a key cannot be used for signing.
|
|
6674
6936
|
*/
|
|
6675
6937
|
enabled?: boolean | null;
|
|
6938
|
+
/**
|
|
6939
|
+
* @description If set, change the key's region affinity to this value.
|
|
6940
|
+
*
|
|
6941
|
+
* This is a region-locked operation, i.e., it can only be performed
|
|
6942
|
+
* from the region matching the key's current region affinity
|
|
6943
|
+
*/
|
|
6944
|
+
region?: string;
|
|
6676
6945
|
/**
|
|
6677
6946
|
* Format: int64
|
|
6678
6947
|
* @description If set, updating the metadata only succeeds if the version matches this value.
|
|
@@ -6873,6 +7142,26 @@ export interface components {
|
|
|
6873
7142
|
};
|
|
6874
7143
|
/** @description Request body for updating a named policy. */
|
|
6875
7144
|
UpdatePolicyRequest: {
|
|
7145
|
+
/**
|
|
7146
|
+
* @description New Access-control entries.
|
|
7147
|
+
* @example [
|
|
7148
|
+
* {
|
|
7149
|
+
* "action": "attach",
|
|
7150
|
+
* "resources": [
|
|
7151
|
+
* {
|
|
7152
|
+
* "key_id": "*",
|
|
7153
|
+
* "role_id": "Role#e427c28a-9c5b-49cc-a257-878aea58a22c"
|
|
7154
|
+
* }
|
|
7155
|
+
* ],
|
|
7156
|
+
* "subjects": "*"
|
|
7157
|
+
* },
|
|
7158
|
+
* {
|
|
7159
|
+
* "action": "sign",
|
|
7160
|
+
* "subjects": "Role#e427c28a-9c5b-49cc-a257-878aea58a22c"
|
|
7161
|
+
* }
|
|
7162
|
+
* ]
|
|
7163
|
+
*/
|
|
7164
|
+
acl?: unknown[] | null;
|
|
6876
7165
|
edit_policy?: components["schemas"]["EditPolicy"] | null;
|
|
6877
7166
|
/** @description A new metadata. */
|
|
6878
7167
|
metadata?: unknown;
|
|
@@ -7250,6 +7539,9 @@ export interface components {
|
|
|
7250
7539
|
BabylonCovSignResponse: {
|
|
7251
7540
|
content: {
|
|
7252
7541
|
"application/json": {
|
|
7542
|
+
/** @description Optional policy evaluation tree. */
|
|
7543
|
+
policy_eval_tree?: unknown;
|
|
7544
|
+
} & {
|
|
7253
7545
|
/**
|
|
7254
7546
|
* @description The slash-unbonding transaction signatures as an array of hex strings with no 0x prefix
|
|
7255
7547
|
* @example [
|
|
@@ -7283,6 +7575,9 @@ export interface components {
|
|
|
7283
7575
|
BabylonRegistrationResponse: {
|
|
7284
7576
|
content: {
|
|
7285
7577
|
"application/json": {
|
|
7578
|
+
/** @description Optional policy evaluation tree. */
|
|
7579
|
+
policy_eval_tree?: unknown;
|
|
7580
|
+
} & {
|
|
7286
7581
|
/**
|
|
7287
7582
|
* @description The Babylon address that will receive the staking rewards for this deposit.
|
|
7288
7583
|
*
|
|
@@ -7330,6 +7625,9 @@ export interface components {
|
|
|
7330
7625
|
BabylonStakingResponse: {
|
|
7331
7626
|
content: {
|
|
7332
7627
|
"application/json": {
|
|
7628
|
+
/** @description Optional policy evaluation tree. */
|
|
7629
|
+
policy_eval_tree?: unknown;
|
|
7630
|
+
} & {
|
|
7333
7631
|
/**
|
|
7334
7632
|
* Format: int64
|
|
7335
7633
|
* @description The transaction fee in sats
|
|
@@ -7348,6 +7646,9 @@ export interface components {
|
|
|
7348
7646
|
BtcMessageSignResponse: {
|
|
7349
7647
|
content: {
|
|
7350
7648
|
"application/json": {
|
|
7649
|
+
/** @description Optional policy evaluation tree. */
|
|
7650
|
+
policy_eval_tree?: unknown;
|
|
7651
|
+
} & {
|
|
7351
7652
|
/** @description The base64-encoded signature in BIP137 format. */
|
|
7352
7653
|
sig: string;
|
|
7353
7654
|
};
|
|
@@ -7453,7 +7754,7 @@ export interface components {
|
|
|
7453
7754
|
/** @description The result of a Diffie Hellman key exchange */
|
|
7454
7755
|
DiffieHellmanResponse: {
|
|
7455
7756
|
content: {
|
|
7456
|
-
"application/json": {
|
|
7757
|
+
"application/json": ({
|
|
7457
7758
|
/** @description The resulting points as base64-encoded byte strings in a key-type--dependent format. */
|
|
7458
7759
|
points: string[];
|
|
7459
7760
|
/** @enum {string} */
|
|
@@ -7471,7 +7772,10 @@ export interface components {
|
|
|
7471
7772
|
ephemeral_public_key: string;
|
|
7472
7773
|
/** @enum {string} */
|
|
7473
7774
|
response_type: "encrypted";
|
|
7474
|
-
}
|
|
7775
|
+
}) & {
|
|
7776
|
+
/** @description Optional policy evaluation tree. */
|
|
7777
|
+
policy_eval_tree?: unknown;
|
|
7778
|
+
} & Record<string, never>;
|
|
7475
7779
|
};
|
|
7476
7780
|
};
|
|
7477
7781
|
/**
|
|
@@ -7503,6 +7807,9 @@ export interface components {
|
|
|
7503
7807
|
EotsCreateNonceResponse: {
|
|
7504
7808
|
content: {
|
|
7505
7809
|
"application/json": {
|
|
7810
|
+
/** @description Optional policy evaluation tree. */
|
|
7811
|
+
policy_eval_tree?: unknown;
|
|
7812
|
+
} & {
|
|
7506
7813
|
/**
|
|
7507
7814
|
* @description The generated nonces as an array of 0x-prefixed hex strings
|
|
7508
7815
|
* @example [
|
|
@@ -7523,6 +7830,9 @@ export interface components {
|
|
|
7523
7830
|
Eth1SignResponse: {
|
|
7524
7831
|
content: {
|
|
7525
7832
|
"application/json": {
|
|
7833
|
+
/** @description Optional policy evaluation tree. */
|
|
7834
|
+
policy_eval_tree?: unknown;
|
|
7835
|
+
} & {
|
|
7526
7836
|
/**
|
|
7527
7837
|
* @description Hex-encoded RLP encoding of the transaction and its signature
|
|
7528
7838
|
* @example 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
|
|
@@ -7531,17 +7841,6 @@ export interface components {
|
|
|
7531
7841
|
};
|
|
7532
7842
|
};
|
|
7533
7843
|
};
|
|
7534
|
-
Eth2SignResponse: {
|
|
7535
|
-
content: {
|
|
7536
|
-
"application/json": {
|
|
7537
|
-
/**
|
|
7538
|
-
* @description Hex encoded signature prefixed with 0x e.g. "0x0000..."
|
|
7539
|
-
* @example 0xb4f2ef9d12a54e1f569596c07c97d6d730535b6ffc0d287761dc78103a86326782471a04c75ce7a6faea08ca9a4a0830031cdcb893da8711d54aa22619f1a7e71b8185ddf4c6bfd9babbd735960e35e56bd6eeb89625b04850e7a9ef8846e549
|
|
7540
|
-
*/
|
|
7541
|
-
signature: string;
|
|
7542
|
-
};
|
|
7543
|
-
};
|
|
7544
|
-
};
|
|
7545
7844
|
FidoAssertChallenge: {
|
|
7546
7845
|
content: {
|
|
7547
7846
|
"application/json": (components["schemas"]["ChallengePieces"] & {
|
|
@@ -7634,10 +7933,13 @@ export interface components {
|
|
|
7634
7933
|
"application/json": components["schemas"]["Response"] & Record<string, never>;
|
|
7635
7934
|
};
|
|
7636
7935
|
};
|
|
7637
|
-
/** @description A JSON Web Key set describing the key used to sign JSON Web Tokens
|
|
7936
|
+
/** @description A JSON Web Key set describing the key used to sign JSON Web Tokens */
|
|
7638
7937
|
JwkSetResponse: {
|
|
7639
7938
|
content: {
|
|
7640
|
-
"application/json":
|
|
7939
|
+
"application/json": {
|
|
7940
|
+
/** @description The keys included in this set */
|
|
7941
|
+
keys: Record<string, never>[];
|
|
7942
|
+
};
|
|
7641
7943
|
};
|
|
7642
7944
|
};
|
|
7643
7945
|
/** @description Derivation-related metadata for keys derived from a long-lived mnemonic */
|
|
@@ -7738,6 +8040,8 @@ export interface components {
|
|
|
7738
8040
|
* ]
|
|
7739
8041
|
*/
|
|
7740
8042
|
policy: unknown[];
|
|
8043
|
+
/** @description The key provenance. */
|
|
8044
|
+
provenance?: string | null;
|
|
7741
8045
|
/**
|
|
7742
8046
|
* @description Hex-encoded, serialized public key. The format used depends on the key type:
|
|
7743
8047
|
* - Secp256k1 keys use 65-byte uncompressed SECG format;
|
|
@@ -7757,6 +8061,15 @@ export interface components {
|
|
|
7757
8061
|
};
|
|
7758
8062
|
};
|
|
7759
8063
|
};
|
|
8064
|
+
/** @description Response returned when requesting a key attestation. */
|
|
8065
|
+
KeyInfoJwt: {
|
|
8066
|
+
content: {
|
|
8067
|
+
"application/json": {
|
|
8068
|
+
/** @description A JSON Web Token whose claims contain the `KeyInfo` structure. */
|
|
8069
|
+
jwt: string;
|
|
8070
|
+
};
|
|
8071
|
+
};
|
|
8072
|
+
};
|
|
7760
8073
|
KeyInfos: {
|
|
7761
8074
|
content: {
|
|
7762
8075
|
"application/json": {
|
|
@@ -8268,6 +8581,8 @@ export interface components {
|
|
|
8268
8581
|
PolicyInfo: {
|
|
8269
8582
|
content: {
|
|
8270
8583
|
"application/json": {
|
|
8584
|
+
/** @description The access-control entries for the policy. */
|
|
8585
|
+
acl?: unknown[] | null;
|
|
8271
8586
|
/** @description A list of entities (keys, roles, etc.) the policy is attached to. */
|
|
8272
8587
|
attached_to: components["schemas"]["PolicyAttachedToId"][];
|
|
8273
8588
|
created: components["schemas"]["EpochDateTime"];
|
|
@@ -8326,6 +8641,9 @@ export interface components {
|
|
|
8326
8641
|
PsbtSignResponse: {
|
|
8327
8642
|
content: {
|
|
8328
8643
|
"application/json": {
|
|
8644
|
+
/** @description Optional policy evaluation tree. */
|
|
8645
|
+
policy_eval_tree?: unknown;
|
|
8646
|
+
} & {
|
|
8329
8647
|
/**
|
|
8330
8648
|
* @description The PSBT in standard hex serialization, without leading "0x".
|
|
8331
8649
|
* @example 70736274ff01005e...
|
|
@@ -8485,6 +8803,9 @@ export interface components {
|
|
|
8485
8803
|
SignResponse: {
|
|
8486
8804
|
content: {
|
|
8487
8805
|
"application/json": {
|
|
8806
|
+
/** @description Optional policy evaluation tree. */
|
|
8807
|
+
policy_eval_tree?: unknown;
|
|
8808
|
+
} & {
|
|
8488
8809
|
/** @description The hex-encoded resulting signature. */
|
|
8489
8810
|
signature: string;
|
|
8490
8811
|
};
|
|
@@ -8519,13 +8840,17 @@ export interface components {
|
|
|
8519
8840
|
};
|
|
8520
8841
|
StakeResponse: {
|
|
8521
8842
|
content: {
|
|
8522
|
-
"application/json": {
|
|
8843
|
+
"application/json": ({
|
|
8844
|
+
/** @description Optional policy evaluation tree. */
|
|
8845
|
+
policy_eval_tree?: unknown;
|
|
8846
|
+
} & {
|
|
8847
|
+
deposit_tx: components["schemas"]["DepositTxn"];
|
|
8848
|
+
}) & {
|
|
8523
8849
|
/**
|
|
8524
8850
|
* @description The validator key id ("Key#...")
|
|
8525
8851
|
* @example Key#db1731f8-3659-45c0-885b-e11e1f5b7be2
|
|
8526
8852
|
*/
|
|
8527
8853
|
created_validator_key_id: string;
|
|
8528
|
-
deposit_tx: components["schemas"]["DepositTxn"];
|
|
8529
8854
|
};
|
|
8530
8855
|
};
|
|
8531
8856
|
};
|
|
@@ -8574,14 +8899,7 @@ export interface components {
|
|
|
8574
8899
|
};
|
|
8575
8900
|
};
|
|
8576
8901
|
};
|
|
8577
|
-
/**
|
|
8578
|
-
* @description Unstake responses are signed voluntary exit messages.
|
|
8579
|
-
* The schema for this message is defined
|
|
8580
|
-
* [here](https://github.com/ethereum/consensus-specs/blob/v1.0.1/specs/phase0/beacon-chain.md#signedvoluntaryexit).
|
|
8581
|
-
* This message can be directly POSTed to the Beacon node's
|
|
8582
|
-
* `/eth/v1/beacon/pool/voluntary_exits` end-point (see expected schema
|
|
8583
|
-
* [here](https://ethereum.github.io/beacon-APIs/#/Beacon/submitPoolVoluntaryExit)).
|
|
8584
|
-
*/
|
|
8902
|
+
/** @description A response to sign an eth2 unstake request. */
|
|
8585
8903
|
UnstakeResponse: {
|
|
8586
8904
|
content: {
|
|
8587
8905
|
"application/json": {
|
|
@@ -8591,7 +8909,10 @@ export interface components {
|
|
|
8591
8909
|
* @example 0x910c7cd537ed91cc8c4a82f3cbd832e9be8c24a22e9c86df479f7ce42025ea6a09619b418b666a060e260d2aae31b8e50e9d05ca3442c7eed3b507e5207e14674275f68c2ba84c4bf6b8dd364a304acac8cfab3681e2514b4400f9242bc61164
|
|
8592
8910
|
*/
|
|
8593
8911
|
signature: string;
|
|
8594
|
-
}
|
|
8912
|
+
} & {
|
|
8913
|
+
/** @description Optional policy evaluation tree. */
|
|
8914
|
+
policy_eval_tree?: unknown;
|
|
8915
|
+
} & Record<string, never>;
|
|
8595
8916
|
};
|
|
8596
8917
|
};
|
|
8597
8918
|
UpdateOrgResponse: {
|
|
@@ -8804,6 +9125,22 @@ export interface operations {
|
|
|
8804
9125
|
};
|
|
8805
9126
|
};
|
|
8806
9127
|
};
|
|
9128
|
+
/**
|
|
9129
|
+
* JWKS endpoint for the attestation key
|
|
9130
|
+
* @description JWKS endpoint for the attestation key
|
|
9131
|
+
*
|
|
9132
|
+
* Returns the public key used to sign Key info attestations.
|
|
9133
|
+
*/
|
|
9134
|
+
attestationJwkSet: {
|
|
9135
|
+
responses: {
|
|
9136
|
+
200: components["responses"]["JwkSetResponse"];
|
|
9137
|
+
default: {
|
|
9138
|
+
content: {
|
|
9139
|
+
"application/json": components["schemas"]["ErrorResponse"];
|
|
9140
|
+
};
|
|
9141
|
+
};
|
|
9142
|
+
};
|
|
9143
|
+
};
|
|
8807
9144
|
/**
|
|
8808
9145
|
* List accessible organizations.
|
|
8809
9146
|
* @description List accessible organizations.
|
|
@@ -10708,6 +11045,36 @@ export interface operations {
|
|
|
10708
11045
|
};
|
|
10709
11046
|
};
|
|
10710
11047
|
};
|
|
11048
|
+
/**
|
|
11049
|
+
* Attest to Key Properties
|
|
11050
|
+
* @description Attest to Key Properties
|
|
11051
|
+
*
|
|
11052
|
+
* The response is a JWT whose claims are the key properties.
|
|
11053
|
+
*/
|
|
11054
|
+
attestKey: {
|
|
11055
|
+
parameters: {
|
|
11056
|
+
path: {
|
|
11057
|
+
/**
|
|
11058
|
+
* @description Name or ID of the desired Org
|
|
11059
|
+
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
11060
|
+
*/
|
|
11061
|
+
org_id: string;
|
|
11062
|
+
/**
|
|
11063
|
+
* @description ID of the desired Key
|
|
11064
|
+
* @example Key#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
11065
|
+
*/
|
|
11066
|
+
key_id: string;
|
|
11067
|
+
};
|
|
11068
|
+
};
|
|
11069
|
+
responses: {
|
|
11070
|
+
200: components["responses"]["KeyInfoJwt"];
|
|
11071
|
+
default: {
|
|
11072
|
+
content: {
|
|
11073
|
+
"application/json": components["schemas"]["ErrorResponse"];
|
|
11074
|
+
};
|
|
11075
|
+
};
|
|
11076
|
+
};
|
|
11077
|
+
};
|
|
10711
11078
|
/**
|
|
10712
11079
|
* List Key Roles
|
|
10713
11080
|
* @description List Key Roles
|
|
@@ -14182,7 +14549,7 @@ export interface operations {
|
|
|
14182
14549
|
};
|
|
14183
14550
|
};
|
|
14184
14551
|
responses: {
|
|
14185
|
-
200: components["responses"]["
|
|
14552
|
+
200: components["responses"]["SignResponse"];
|
|
14186
14553
|
202: {
|
|
14187
14554
|
content: {
|
|
14188
14555
|
"application/json": components["schemas"]["AcceptedResponse"];
|