@cubist-labs/cubesigner-sdk 0.4.201 → 0.4.204
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/package.json +1 -1
- package/dist/src/client/api_client.d.ts +17 -1
- package/dist/src/client/api_client.d.ts.map +1 -1
- package/dist/src/client/api_client.js +26 -2
- package/dist/src/index.d.ts +2 -0
- package/dist/src/index.d.ts.map +1 -1
- package/dist/src/index.js +3 -1
- package/dist/src/key.d.ts +7 -1
- package/dist/src/key.d.ts.map +1 -1
- package/dist/src/key.js +9 -1
- package/dist/src/schema.d.ts +426 -59
- package/dist/src/schema.d.ts.map +1 -1
- package/dist/src/schema.js +1 -1
- package/dist/src/schema_types.d.ts +4 -1
- package/dist/src/schema_types.d.ts.map +1 -1
- package/dist/src/schema_types.js +31 -1
- package/dist/src/scopes.d.ts +73 -0
- package/dist/src/scopes.d.ts.map +1 -0
- package/dist/src/scopes.js +322 -0
- package/package.json +1 -1
- package/src/client/api_client.ts +28 -1
- package/src/index.ts +2 -0
- package/src/key.ts +10 -0
- package/src/schema.ts +626 -236
- package/src/schema_types.ts +33 -1
- package/src/scopes.ts +338 -0
package/src/schema.ts
CHANGED
|
@@ -24,6 +24,15 @@ export interface paths {
|
|
|
24
24
|
*/
|
|
25
25
|
get: operations["aboutMeLegacy"];
|
|
26
26
|
};
|
|
27
|
+
"/v0/attestation/.well-known/jwks.json": {
|
|
28
|
+
/**
|
|
29
|
+
* JWKS endpoint for the attestation key
|
|
30
|
+
* @description JWKS endpoint for the attestation key
|
|
31
|
+
*
|
|
32
|
+
* Returns the public key used to sign Key info attestations.
|
|
33
|
+
*/
|
|
34
|
+
get: operations["attestationJwkSet"];
|
|
35
|
+
};
|
|
27
36
|
"/v0/email/orgs": {
|
|
28
37
|
/**
|
|
29
38
|
* List accessible organizations.
|
|
@@ -611,6 +620,15 @@ export interface paths {
|
|
|
611
620
|
*/
|
|
612
621
|
patch: operations["updateKey"];
|
|
613
622
|
};
|
|
623
|
+
"/v0/org/{org_id}/keys/{key_id}/attest": {
|
|
624
|
+
/**
|
|
625
|
+
* Attest to Key Properties
|
|
626
|
+
* @description Attest to Key Properties
|
|
627
|
+
*
|
|
628
|
+
* The response is a JWT whose claims are the key properties.
|
|
629
|
+
*/
|
|
630
|
+
get: operations["attestKey"];
|
|
631
|
+
};
|
|
614
632
|
"/v0/org/{org_id}/keys/{key_id}/roles": {
|
|
615
633
|
/**
|
|
616
634
|
* List Key Roles
|
|
@@ -1656,6 +1674,8 @@ export interface components {
|
|
|
1656
1674
|
ids: string[];
|
|
1657
1675
|
/** @description Organization id */
|
|
1658
1676
|
org_id: string;
|
|
1677
|
+
/** @description Optional policy evaluation tree (included in signer responses, when requested) */
|
|
1678
|
+
policy_eval_tree?: unknown;
|
|
1659
1679
|
session?: components["schemas"]["NewSessionResponse"] | null;
|
|
1660
1680
|
};
|
|
1661
1681
|
};
|
|
@@ -1914,6 +1934,12 @@ export interface components {
|
|
|
1914
1934
|
AuthenticatorTransport: "usb" | "nfc" | "ble" | "internal";
|
|
1915
1935
|
/** @description Request to sign a serialized Avalanche transaction */
|
|
1916
1936
|
AvaSerializedTxSignRequest: {
|
|
1937
|
+
/**
|
|
1938
|
+
* @description Request additional information to be included in the response, explaining
|
|
1939
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
1940
|
+
* Defaults to false.
|
|
1941
|
+
*/
|
|
1942
|
+
explain?: boolean;
|
|
1917
1943
|
/**
|
|
1918
1944
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
1919
1945
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -1925,6 +1951,12 @@ export interface components {
|
|
|
1925
1951
|
};
|
|
1926
1952
|
/** @description Request to sign an Avalanche transaction */
|
|
1927
1953
|
AvaSignRequest: {
|
|
1954
|
+
/**
|
|
1955
|
+
* @description Request additional information to be included in the response, explaining
|
|
1956
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
1957
|
+
* Defaults to false.
|
|
1958
|
+
*/
|
|
1959
|
+
explain?: boolean;
|
|
1928
1960
|
/**
|
|
1929
1961
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
1930
1962
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -1951,6 +1983,18 @@ export interface components {
|
|
|
1951
1983
|
/** @description Wrapper around a zeroizing 32-byte fixed-size array */
|
|
1952
1984
|
B32: string;
|
|
1953
1985
|
BabylonCovSignRequest: {
|
|
1986
|
+
/**
|
|
1987
|
+
* @description Request additional information to be included in the response, explaining
|
|
1988
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
1989
|
+
* Defaults to false.
|
|
1990
|
+
*/
|
|
1991
|
+
explain?: boolean;
|
|
1992
|
+
/**
|
|
1993
|
+
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
1994
|
+
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
1995
|
+
*/
|
|
1996
|
+
metadata?: unknown;
|
|
1997
|
+
} & {
|
|
1954
1998
|
/**
|
|
1955
1999
|
* @description The keys for the finality providers to which this transaction is being staked.
|
|
1956
2000
|
* Each key is a hex string containing a SEC1-encoded secp256k1 public key.
|
|
@@ -2010,6 +2054,9 @@ export interface components {
|
|
|
2010
2054
|
unbonding_tx: string;
|
|
2011
2055
|
};
|
|
2012
2056
|
BabylonCovSignResponse: {
|
|
2057
|
+
/** @description Optional policy evaluation tree. */
|
|
2058
|
+
policy_eval_tree?: unknown;
|
|
2059
|
+
} & {
|
|
2013
2060
|
/**
|
|
2014
2061
|
* @description The slash-unbonding transaction signatures as an array of hex strings with no 0x prefix
|
|
2015
2062
|
* @example [
|
|
@@ -2124,6 +2171,18 @@ export interface components {
|
|
|
2124
2171
|
*/
|
|
2125
2172
|
value: number;
|
|
2126
2173
|
}) & {
|
|
2174
|
+
/**
|
|
2175
|
+
* @description Request additional information to be included in the response, explaining
|
|
2176
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
2177
|
+
* Defaults to false.
|
|
2178
|
+
*/
|
|
2179
|
+
explain?: boolean;
|
|
2180
|
+
/**
|
|
2181
|
+
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
2182
|
+
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
2183
|
+
*/
|
|
2184
|
+
metadata?: unknown;
|
|
2185
|
+
} & {
|
|
2127
2186
|
/**
|
|
2128
2187
|
* @description The Babylon address that will receive the staking rewards for this deposit.
|
|
2129
2188
|
* Babylon requires this to be the same address that registers the deposit on
|
|
@@ -2137,6 +2196,9 @@ export interface components {
|
|
|
2137
2196
|
bbn_addr: string;
|
|
2138
2197
|
};
|
|
2139
2198
|
BabylonRegistrationResponse: {
|
|
2199
|
+
/** @description Optional policy evaluation tree. */
|
|
2200
|
+
policy_eval_tree?: unknown;
|
|
2201
|
+
} & {
|
|
2140
2202
|
/**
|
|
2141
2203
|
* @description The Babylon address that will receive the staking rewards for this deposit.
|
|
2142
2204
|
*
|
|
@@ -2411,6 +2473,9 @@ export interface components {
|
|
|
2411
2473
|
action: "slash_early_unbond";
|
|
2412
2474
|
});
|
|
2413
2475
|
BabylonStakingResponse: {
|
|
2476
|
+
/** @description Optional policy evaluation tree. */
|
|
2477
|
+
policy_eval_tree?: unknown;
|
|
2478
|
+
} & {
|
|
2414
2479
|
/**
|
|
2415
2480
|
* Format: int64
|
|
2416
2481
|
* @description The transaction fee in sats
|
|
@@ -2530,6 +2595,7 @@ export interface components {
|
|
|
2530
2595
|
| "OrgInviteExistingUser"
|
|
2531
2596
|
| "OrgUserAlreadyExists"
|
|
2532
2597
|
| "OrgNameTaken"
|
|
2598
|
+
| "KwkNotFoundInRegion"
|
|
2533
2599
|
| "OrgIsNotOrgExport"
|
|
2534
2600
|
| "RoleNameTaken"
|
|
2535
2601
|
| "PolicyNameTaken"
|
|
@@ -2599,7 +2665,6 @@ export interface components {
|
|
|
2599
2665
|
| "UserNotFound"
|
|
2600
2666
|
| "UserWithEmailNotFound"
|
|
2601
2667
|
| "PolicyKeyMismatch"
|
|
2602
|
-
| "PolicyRuleKeyMismatch"
|
|
2603
2668
|
| "EmptyScopes"
|
|
2604
2669
|
| "InvalidScopesForRoleSession"
|
|
2605
2670
|
| "InvalidLifetime"
|
|
@@ -2696,7 +2761,8 @@ export interface components {
|
|
|
2696
2761
|
| "InvalidPolicyLogsRequest"
|
|
2697
2762
|
| "UserProfileMigrationMultipleEntries"
|
|
2698
2763
|
| "UserProfileMigrationTooManyItems"
|
|
2699
|
-
| "InputTooShort"
|
|
2764
|
+
| "InputTooShort"
|
|
2765
|
+
| "InvalidTweakLength";
|
|
2700
2766
|
BillingArgs: {
|
|
2701
2767
|
billing_org: components["schemas"]["Id"];
|
|
2702
2768
|
event_type: components["schemas"]["BillingEvent"];
|
|
@@ -2741,6 +2807,7 @@ export interface components {
|
|
|
2741
2807
|
| "GetOrgExport"
|
|
2742
2808
|
| "CreateOrg"
|
|
2743
2809
|
| "ListKeys"
|
|
2810
|
+
| "AttestKey"
|
|
2744
2811
|
| "GetKey"
|
|
2745
2812
|
| "GetKeyByMaterialId"
|
|
2746
2813
|
| "ListKeyRoles"
|
|
@@ -2870,6 +2937,7 @@ export interface components {
|
|
|
2870
2937
|
| "SentryApiCall"
|
|
2871
2938
|
| "SentryApiCallPublic"
|
|
2872
2939
|
| "MmiJwkSet"
|
|
2940
|
+
| "AttestationJwkSet"
|
|
2873
2941
|
| "UserOrgs"
|
|
2874
2942
|
| "PublicOrgInfo"
|
|
2875
2943
|
| "EmailMyOrgs";
|
|
@@ -2888,6 +2956,12 @@ export interface components {
|
|
|
2888
2956
|
* }
|
|
2889
2957
|
*/
|
|
2890
2958
|
BlobSignRequest: {
|
|
2959
|
+
/**
|
|
2960
|
+
* @description Request additional information to be included in the response, explaining
|
|
2961
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
2962
|
+
* Defaults to false.
|
|
2963
|
+
*/
|
|
2964
|
+
explain?: boolean;
|
|
2891
2965
|
/**
|
|
2892
2966
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
2893
2967
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -2927,8 +3001,8 @@ export interface components {
|
|
|
2927
3001
|
*/
|
|
2928
3002
|
message_base64: string;
|
|
2929
3003
|
/**
|
|
2930
|
-
* @description An optional tweak value for use
|
|
2931
|
-
*
|
|
3004
|
+
* @description An optional tweak value for use only with (some) secp256k1 key types.
|
|
3005
|
+
* This field must not be supplied for requests involving any other key type.
|
|
2932
3006
|
*
|
|
2933
3007
|
* If this field is not present or null, no tweak is applied. Otherwise, this field
|
|
2934
3008
|
* must contain a base-64 string encoding a vector of exactly 32 bytes. See the
|
|
@@ -2965,6 +3039,12 @@ export interface components {
|
|
|
2965
3039
|
};
|
|
2966
3040
|
/** @description Data to sign */
|
|
2967
3041
|
BtcMessageSignRequest: {
|
|
3042
|
+
/**
|
|
3043
|
+
* @description Request additional information to be included in the response, explaining
|
|
3044
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
3045
|
+
* Defaults to false.
|
|
3046
|
+
*/
|
|
3047
|
+
explain?: boolean;
|
|
2968
3048
|
/**
|
|
2969
3049
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
2970
3050
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -2981,6 +3061,9 @@ export interface components {
|
|
|
2981
3061
|
};
|
|
2982
3062
|
/** @description BTC message signing response */
|
|
2983
3063
|
BtcMessageSignResponse: {
|
|
3064
|
+
/** @description Optional policy evaluation tree. */
|
|
3065
|
+
policy_eval_tree?: unknown;
|
|
3066
|
+
} & {
|
|
2984
3067
|
/** @description The base64-encoded signature in BIP137 format. */
|
|
2985
3068
|
sig: string;
|
|
2986
3069
|
};
|
|
@@ -2993,6 +3076,12 @@ export interface components {
|
|
|
2993
3076
|
| "NonePlusAnyoneCanPay"
|
|
2994
3077
|
| "SinglePlusAnyoneCanPay";
|
|
2995
3078
|
BtcSignRequest: {
|
|
3079
|
+
/**
|
|
3080
|
+
* @description Request additional information to be included in the response, explaining
|
|
3081
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
3082
|
+
* Defaults to false.
|
|
3083
|
+
*/
|
|
3084
|
+
explain?: boolean;
|
|
2996
3085
|
/**
|
|
2997
3086
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
2998
3087
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -3340,6 +3429,27 @@ export interface components {
|
|
|
3340
3429
|
};
|
|
3341
3430
|
/** @description Request for creating a named policy */
|
|
3342
3431
|
CreatePolicyRequest: {
|
|
3432
|
+
/**
|
|
3433
|
+
* @description Access-control entries defining how the policy can be accessed, modified,
|
|
3434
|
+
* attached and executed.
|
|
3435
|
+
* @example [
|
|
3436
|
+
* {
|
|
3437
|
+
* "action": "attach",
|
|
3438
|
+
* "resources": [
|
|
3439
|
+
* {
|
|
3440
|
+
* "key_id": "*",
|
|
3441
|
+
* "role_id": "Role#e427c28a-9c5b-49cc-a257-878aea58a22c"
|
|
3442
|
+
* }
|
|
3443
|
+
* ],
|
|
3444
|
+
* "subjects": "*"
|
|
3445
|
+
* },
|
|
3446
|
+
* {
|
|
3447
|
+
* "action": "sign",
|
|
3448
|
+
* "subjects": "Role#e427c28a-9c5b-49cc-a257-878aea58a22c"
|
|
3449
|
+
* }
|
|
3450
|
+
* ]
|
|
3451
|
+
*/
|
|
3452
|
+
acl?: unknown[] | null;
|
|
3343
3453
|
edit_policy?: components["schemas"]["EditPolicy"] | null;
|
|
3344
3454
|
/** @description Optional metadata. */
|
|
3345
3455
|
metadata?: unknown;
|
|
@@ -3526,6 +3636,12 @@ export interface components {
|
|
|
3526
3636
|
mnemonic_id?: string | null;
|
|
3527
3637
|
};
|
|
3528
3638
|
DiffieHellmanRequest: {
|
|
3639
|
+
/**
|
|
3640
|
+
* @description Request additional information to be included in the response, explaining
|
|
3641
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
3642
|
+
* Defaults to false.
|
|
3643
|
+
*/
|
|
3644
|
+
explain?: boolean;
|
|
3529
3645
|
/**
|
|
3530
3646
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
3531
3647
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -3553,7 +3669,7 @@ export interface components {
|
|
|
3553
3669
|
public_key?: string | null;
|
|
3554
3670
|
};
|
|
3555
3671
|
/** @description The result of a Diffie Hellman key exchange */
|
|
3556
|
-
DiffieHellmanResponse:
|
|
3672
|
+
DiffieHellmanResponse: (
|
|
3557
3673
|
| {
|
|
3558
3674
|
/** @description The resulting points as base64-encoded byte strings in a key-type--dependent format. */
|
|
3559
3675
|
points: string[];
|
|
@@ -3573,7 +3689,11 @@ export interface components {
|
|
|
3573
3689
|
ephemeral_public_key: string;
|
|
3574
3690
|
/** @enum {string} */
|
|
3575
3691
|
response_type: "encrypted";
|
|
3576
|
-
}
|
|
3692
|
+
}
|
|
3693
|
+
) & {
|
|
3694
|
+
/** @description Optional policy evaluation tree. */
|
|
3695
|
+
policy_eval_tree?: unknown;
|
|
3696
|
+
} & Record<string, never>;
|
|
3577
3697
|
/**
|
|
3578
3698
|
* @description A policy which governs when and who is allowed to update the entity this policy is
|
|
3579
3699
|
* attached to (e.g., a role or a key).
|
|
@@ -3594,6 +3714,12 @@ export interface components {
|
|
|
3594
3714
|
time_lock_until?: components["schemas"]["EpochDateTime"] | null;
|
|
3595
3715
|
};
|
|
3596
3716
|
Eip191SignRequest: {
|
|
3717
|
+
/**
|
|
3718
|
+
* @description Request additional information to be included in the response, explaining
|
|
3719
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
3720
|
+
* Defaults to false.
|
|
3721
|
+
*/
|
|
3722
|
+
explain?: boolean;
|
|
3597
3723
|
/**
|
|
3598
3724
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
3599
3725
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -3605,6 +3731,13 @@ export interface components {
|
|
|
3605
3731
|
* @example 0xdeadbeef13c0ffee
|
|
3606
3732
|
*/
|
|
3607
3733
|
data: string;
|
|
3734
|
+
/**
|
|
3735
|
+
* @description An optional tweak value that will be applied to the secret key before signing.
|
|
3736
|
+
* This field must contain a base-64 string encoding a vector of exactly 32 bytes.
|
|
3737
|
+
* See the CubeSigner documentation for more information on the tweaking procedure.
|
|
3738
|
+
* @example F41HAy2q5Gn8laF2CuMsZbRAQTmD+4Ob3VUMZ7TBGK4=
|
|
3739
|
+
*/
|
|
3740
|
+
tweak?: string | null;
|
|
3608
3741
|
};
|
|
3609
3742
|
/**
|
|
3610
3743
|
* @example {
|
|
@@ -3698,6 +3831,12 @@ export interface components {
|
|
|
3698
3831
|
* }
|
|
3699
3832
|
*/
|
|
3700
3833
|
Eip712SignRequest: {
|
|
3834
|
+
/**
|
|
3835
|
+
* @description Request additional information to be included in the response, explaining
|
|
3836
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
3837
|
+
* Defaults to false.
|
|
3838
|
+
*/
|
|
3839
|
+
explain?: boolean;
|
|
3701
3840
|
/**
|
|
3702
3841
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
3703
3842
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -3709,6 +3848,13 @@ export interface components {
|
|
|
3709
3848
|
* @description The chain-id to which this typed data will be sent
|
|
3710
3849
|
*/
|
|
3711
3850
|
chain_id: number;
|
|
3851
|
+
/**
|
|
3852
|
+
* @description An optional tweak value that will be applied to the secret key before signing.
|
|
3853
|
+
* This field must contain a base-64 string encoding a vector of exactly 32 bytes.
|
|
3854
|
+
* See the CubeSigner documentation for more information on the tweaking procedure.
|
|
3855
|
+
* @example F41HAy2q5Gn8laF2CuMsZbRAQTmD+4Ob3VUMZ7TBGK4=
|
|
3856
|
+
*/
|
|
3857
|
+
tweak?: string | null;
|
|
3712
3858
|
typed_data: components["schemas"]["TypedData"];
|
|
3713
3859
|
};
|
|
3714
3860
|
Email: string;
|
|
@@ -3775,6 +3921,12 @@ export interface components {
|
|
|
3775
3921
|
* at a specified block height.
|
|
3776
3922
|
*/
|
|
3777
3923
|
EotsCreateNonceRequest: {
|
|
3924
|
+
/**
|
|
3925
|
+
* @description Request additional information to be included in the response, explaining
|
|
3926
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
3927
|
+
* Defaults to false.
|
|
3928
|
+
*/
|
|
3929
|
+
explain?: boolean;
|
|
3778
3930
|
/**
|
|
3779
3931
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
3780
3932
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -3800,6 +3952,9 @@ export interface components {
|
|
|
3800
3952
|
};
|
|
3801
3953
|
/** @description Response generated when creating EOTS nonces */
|
|
3802
3954
|
EotsCreateNonceResponse: {
|
|
3955
|
+
/** @description Optional policy evaluation tree. */
|
|
3956
|
+
policy_eval_tree?: unknown;
|
|
3957
|
+
} & {
|
|
3803
3958
|
/**
|
|
3804
3959
|
* @description The generated nonces as an array of 0x-prefixed hex strings
|
|
3805
3960
|
* @example [
|
|
@@ -3811,6 +3966,12 @@ export interface components {
|
|
|
3811
3966
|
};
|
|
3812
3967
|
/** @description Request for an EOTS signature on a specified message, chain-id, block-height triple */
|
|
3813
3968
|
EotsSignRequest: {
|
|
3969
|
+
/**
|
|
3970
|
+
* @description Request additional information to be included in the response, explaining
|
|
3971
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
3972
|
+
* Defaults to false.
|
|
3973
|
+
*/
|
|
3974
|
+
explain?: boolean;
|
|
3814
3975
|
/**
|
|
3815
3976
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
3816
3977
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -3862,6 +4023,8 @@ export interface components {
|
|
|
3862
4023
|
error_code: components["schemas"]["SignerErrorCode"];
|
|
3863
4024
|
/** @description Error message */
|
|
3864
4025
|
message: string;
|
|
4026
|
+
/** @description Optional policy evaluation tree (included in signer responses, when requested) */
|
|
4027
|
+
policy_eval_tree?: unknown;
|
|
3865
4028
|
/** @description Optional request identifier */
|
|
3866
4029
|
request_id?: string;
|
|
3867
4030
|
};
|
|
@@ -3894,6 +4057,12 @@ export interface components {
|
|
|
3894
4057
|
* }
|
|
3895
4058
|
*/
|
|
3896
4059
|
Eth1SignRequest: {
|
|
4060
|
+
/**
|
|
4061
|
+
* @description Request additional information to be included in the response, explaining
|
|
4062
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
4063
|
+
* Defaults to false.
|
|
4064
|
+
*/
|
|
4065
|
+
explain?: boolean;
|
|
3897
4066
|
/**
|
|
3898
4067
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
3899
4068
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -3905,9 +4074,19 @@ export interface components {
|
|
|
3905
4074
|
* @description The chain id to set in the given transaction.
|
|
3906
4075
|
*/
|
|
3907
4076
|
chain_id: number;
|
|
4077
|
+
/**
|
|
4078
|
+
* @description An optional tweak value that will be applied to the secret key before signing.
|
|
4079
|
+
* This field must contain a base-64 string encoding a vector of exactly 32 bytes.
|
|
4080
|
+
* See the CubeSigner documentation for more information on the tweaking procedure.
|
|
4081
|
+
* @example F41HAy2q5Gn8laF2CuMsZbRAQTmD+4Ob3VUMZ7TBGK4=
|
|
4082
|
+
*/
|
|
4083
|
+
tweak?: string | null;
|
|
3908
4084
|
tx: components["schemas"]["Transaction"];
|
|
3909
4085
|
};
|
|
3910
4086
|
Eth1SignResponse: {
|
|
4087
|
+
/** @description Optional policy evaluation tree. */
|
|
4088
|
+
policy_eval_tree?: unknown;
|
|
4089
|
+
} & {
|
|
3911
4090
|
/**
|
|
3912
4091
|
* @description Hex-encoded RLP encoding of the transaction and its signature
|
|
3913
4092
|
* @example 0x22895118000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000e000000000000000000000000000000000000000000000000000000000000001201d58656b0e22aaa68fdc692db41979098c3886ed33015d7467de9211609cdac000000000000000000000000000000000000000000000000000000000000000308b0c2900324d3ff9adfba7fdfe5af3f9b2cdbeef7b280437bbf1b1c59a093d615afe3e5dfed9622b540cdd9b49b3c5ad00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000000000000000000000049011adbcc3bc9c0307bb07f37dda1a1a9c69d2e0000000000000000000000000000000000000000000000000000000000000060903db8525674b8e7904f9b7d7d9ec55a0a42d33cf58be25469b0c21bbb6d06172bc5bb5fd1aed8e4f35936968958116b0619553c2cb1c52e7323074c6f8eb3d5a7074fc6580148df907837fa3b164ad7fbc2288dad1e8a5b021095b57c8a36d4
|
|
@@ -3935,6 +4114,18 @@ export interface components {
|
|
|
3935
4114
|
* }
|
|
3936
4115
|
*/
|
|
3937
4116
|
Eth2SignRequest: {
|
|
4117
|
+
/**
|
|
4118
|
+
* @description Request additional information to be included in the response, explaining
|
|
4119
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
4120
|
+
* Defaults to false.
|
|
4121
|
+
*/
|
|
4122
|
+
explain?: boolean;
|
|
4123
|
+
/**
|
|
4124
|
+
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
4125
|
+
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
4126
|
+
*/
|
|
4127
|
+
metadata?: unknown;
|
|
4128
|
+
} & {
|
|
3938
4129
|
/**
|
|
3939
4130
|
* @description Subset of the Web3Signer Eth2 BLS signing request whose schema is defined
|
|
3940
4131
|
* [here](https://consensys.github.io/web3signer/web3signer-eth2.html#tag/Signing/operation/ETH2_SIGN).
|
|
@@ -3943,13 +4134,6 @@ export interface components {
|
|
|
3943
4134
|
eth2_sign_request: Record<string, never>;
|
|
3944
4135
|
network: components["schemas"]["Network"];
|
|
3945
4136
|
};
|
|
3946
|
-
Eth2SignResponse: {
|
|
3947
|
-
/**
|
|
3948
|
-
* @description Hex encoded signature prefixed with 0x e.g. "0x0000..."
|
|
3949
|
-
* @example 0xb4f2ef9d12a54e1f569596c07c97d6d730535b6ffc0d287761dc78103a86326782471a04c75ce7a6faea08ca9a4a0830031cdcb893da8711d54aa22619f1a7e71b8185ddf4c6bfd9babbd735960e35e56bd6eeb89625b04850e7a9ef8846e549
|
|
3950
|
-
*/
|
|
3951
|
-
signature: string;
|
|
3952
|
-
};
|
|
3953
4137
|
/**
|
|
3954
4138
|
* @description Representation of an event. This type is used to serialize events to CloudWatch Logs and to
|
|
3955
4139
|
* deserialize them when analyzing the logs.
|
|
@@ -4048,6 +4232,190 @@ export interface components {
|
|
|
4048
4232
|
* @enum {string}
|
|
4049
4233
|
*/
|
|
4050
4234
|
ExecutionSource: "SignRequest" | "UserInvocation";
|
|
4235
|
+
/**
|
|
4236
|
+
* ExplicitScope
|
|
4237
|
+
* @description Explicitly named scopes for accessing CubeSigner APIs
|
|
4238
|
+
* @enum {string}
|
|
4239
|
+
*/
|
|
4240
|
+
ExplicitScope:
|
|
4241
|
+
| "sign:*"
|
|
4242
|
+
| "sign:ava"
|
|
4243
|
+
| "sign:blob"
|
|
4244
|
+
| "sign:diffieHellman"
|
|
4245
|
+
| "sign:btc:*"
|
|
4246
|
+
| "sign:btc:segwit"
|
|
4247
|
+
| "sign:btc:taproot"
|
|
4248
|
+
| "sign:btc:psbt:*"
|
|
4249
|
+
| "sign:btc:psbt:doge"
|
|
4250
|
+
| "sign:btc:psbt:legacy"
|
|
4251
|
+
| "sign:btc:psbt:segwit"
|
|
4252
|
+
| "sign:btc:psbt:taproot"
|
|
4253
|
+
| "sign:btc:psbt:ltcSegwit"
|
|
4254
|
+
| "sign:btc:message:*"
|
|
4255
|
+
| "sign:btc:message:segwit"
|
|
4256
|
+
| "sign:btc:message:legacy"
|
|
4257
|
+
| "sign:babylon:*"
|
|
4258
|
+
| "sign:babylon:eots:*"
|
|
4259
|
+
| "sign:babylon:eots:nonces"
|
|
4260
|
+
| "sign:babylon:eots:sign"
|
|
4261
|
+
| "sign:babylon:staking:*"
|
|
4262
|
+
| "sign:babylon:staking:deposit"
|
|
4263
|
+
| "sign:babylon:staking:unbond"
|
|
4264
|
+
| "sign:babylon:staking:withdraw"
|
|
4265
|
+
| "sign:babylon:staking:slash"
|
|
4266
|
+
| "sign:babylon:registration"
|
|
4267
|
+
| "sign:babylon:covenant"
|
|
4268
|
+
| "sign:evm:*"
|
|
4269
|
+
| "sign:evm:tx"
|
|
4270
|
+
| "sign:evm:eip191"
|
|
4271
|
+
| "sign:evm:eip712"
|
|
4272
|
+
| "sign:eth2:*"
|
|
4273
|
+
| "sign:eth2:validate"
|
|
4274
|
+
| "sign:eth2:stake"
|
|
4275
|
+
| "sign:eth2:unstake"
|
|
4276
|
+
| "sign:solana"
|
|
4277
|
+
| "sign:sui"
|
|
4278
|
+
| "sign:tendermint"
|
|
4279
|
+
| "sign:mmi"
|
|
4280
|
+
| "manage:*"
|
|
4281
|
+
| "manage:readonly"
|
|
4282
|
+
| "manage:email"
|
|
4283
|
+
| "manage:mfa:*"
|
|
4284
|
+
| "manage:mfa:readonly"
|
|
4285
|
+
| "manage:mfa:list"
|
|
4286
|
+
| "manage:mfa:vote:*"
|
|
4287
|
+
| "manage:mfa:vote:cs"
|
|
4288
|
+
| "manage:mfa:vote:email"
|
|
4289
|
+
| "manage:mfa:vote:fido"
|
|
4290
|
+
| "manage:mfa:vote:totp"
|
|
4291
|
+
| "manage:mfa:register:*"
|
|
4292
|
+
| "manage:mfa:register:fido"
|
|
4293
|
+
| "manage:mfa:register:totp"
|
|
4294
|
+
| "manage:mfa:register:email"
|
|
4295
|
+
| "manage:mfa:unregister:*"
|
|
4296
|
+
| "manage:mfa:unregister:fido"
|
|
4297
|
+
| "manage:mfa:unregister:totp"
|
|
4298
|
+
| "manage:mfa:verify:*"
|
|
4299
|
+
| "manage:mfa:verify:totp"
|
|
4300
|
+
| "manage:key:*"
|
|
4301
|
+
| "manage:key:readonly"
|
|
4302
|
+
| "manage:key:get"
|
|
4303
|
+
| "manage:key:attest"
|
|
4304
|
+
| "manage:key:listRoles"
|
|
4305
|
+
| "manage:key:list"
|
|
4306
|
+
| "manage:key:history:tx:list"
|
|
4307
|
+
| "manage:key:create"
|
|
4308
|
+
| "manage:key:import"
|
|
4309
|
+
| "manage:key:update:*"
|
|
4310
|
+
| "manage:key:update:owner"
|
|
4311
|
+
| "manage:key:update:policy"
|
|
4312
|
+
| "manage:key:update:enabled"
|
|
4313
|
+
| "manage:key:update:metadata"
|
|
4314
|
+
| "manage:key:update:editPolicy"
|
|
4315
|
+
| "manage:key:delete"
|
|
4316
|
+
| "manage:policy:*"
|
|
4317
|
+
| "manage:policy:create"
|
|
4318
|
+
| "manage:policy:get"
|
|
4319
|
+
| "manage:policy:list"
|
|
4320
|
+
| "manage:policy:delete"
|
|
4321
|
+
| "manage:policy:update:*"
|
|
4322
|
+
| "manage:policy:update:owner"
|
|
4323
|
+
| "manage:policy:update:name"
|
|
4324
|
+
| "manage:policy:update:acl"
|
|
4325
|
+
| "manage:policy:update:editPolicy"
|
|
4326
|
+
| "manage:policy:update:metadata"
|
|
4327
|
+
| "manage:policy:update:rule"
|
|
4328
|
+
| "manage:policy:invoke"
|
|
4329
|
+
| "manage:policy:wasm:*"
|
|
4330
|
+
| "manage:policy:wasm:upload"
|
|
4331
|
+
| "manage:policy:secrets:*"
|
|
4332
|
+
| "manage:policy:secrets:get"
|
|
4333
|
+
| "manage:policy:secrets:update:*"
|
|
4334
|
+
| "manage:policy:secrets:update:values"
|
|
4335
|
+
| "manage:policy:secrets:update:editPolicy"
|
|
4336
|
+
| "manage:contact:*"
|
|
4337
|
+
| "manage:contact:create"
|
|
4338
|
+
| "manage:contact:get"
|
|
4339
|
+
| "manage:contact:list"
|
|
4340
|
+
| "manage:contact:delete"
|
|
4341
|
+
| "manage:contact:update:*"
|
|
4342
|
+
| "manage:contact:update:name"
|
|
4343
|
+
| "manage:contact:update:addresses"
|
|
4344
|
+
| "manage:contact:update:owner"
|
|
4345
|
+
| "manage:contact:update:metadata"
|
|
4346
|
+
| "manage:contact:update:editPolicy"
|
|
4347
|
+
| "manage:contact:lookup:*"
|
|
4348
|
+
| "manage:contact:lookup:address"
|
|
4349
|
+
| "manage:policy:createImportKey"
|
|
4350
|
+
| "manage:role:*"
|
|
4351
|
+
| "manage:role:readonly"
|
|
4352
|
+
| "manage:role:create"
|
|
4353
|
+
| "manage:role:delete"
|
|
4354
|
+
| "manage:role:get:*"
|
|
4355
|
+
| "manage:role:get:keys"
|
|
4356
|
+
| "manage:role:get:keys:list"
|
|
4357
|
+
| "manage:role:get:keys:get"
|
|
4358
|
+
| "manage:role:get:users"
|
|
4359
|
+
| "manage:role:list"
|
|
4360
|
+
| "manage:role:update:*"
|
|
4361
|
+
| "manage:role:update:enabled"
|
|
4362
|
+
| "manage:role:update:policy"
|
|
4363
|
+
| "manage:role:update:editPolicy"
|
|
4364
|
+
| "manage:role:update:key:*"
|
|
4365
|
+
| "manage:role:update:key:add"
|
|
4366
|
+
| "manage:role:update:key:remove"
|
|
4367
|
+
| "manage:role:update:user:*"
|
|
4368
|
+
| "manage:role:update:user:add"
|
|
4369
|
+
| "manage:role:update:user:remove"
|
|
4370
|
+
| "manage:role:history:tx:list"
|
|
4371
|
+
| "manage:identity:*"
|
|
4372
|
+
| "manage:identity:verify"
|
|
4373
|
+
| "manage:identity:add"
|
|
4374
|
+
| "manage:identity:remove"
|
|
4375
|
+
| "manage:identity:list"
|
|
4376
|
+
| "manage:org:*"
|
|
4377
|
+
| "manage:org:create"
|
|
4378
|
+
| "manage:org:metrics:query"
|
|
4379
|
+
| "manage:org:readonly"
|
|
4380
|
+
| "manage:org:addUser"
|
|
4381
|
+
| "manage:org:inviteUser"
|
|
4382
|
+
| "manage:org:inviteAlien"
|
|
4383
|
+
| "manage:org:updateMembership"
|
|
4384
|
+
| "manage:org:listUsers"
|
|
4385
|
+
| "manage:org:user:get"
|
|
4386
|
+
| "manage:org:deleteUser"
|
|
4387
|
+
| "manage:org:get"
|
|
4388
|
+
| "manage:org:user:resetMfa"
|
|
4389
|
+
| "manage:session:*"
|
|
4390
|
+
| "manage:session:readonly"
|
|
4391
|
+
| "manage:session:get"
|
|
4392
|
+
| "manage:session:list"
|
|
4393
|
+
| "manage:session:create"
|
|
4394
|
+
| "manage:session:extend"
|
|
4395
|
+
| "manage:session:revoke"
|
|
4396
|
+
| "manage:export:*"
|
|
4397
|
+
| "manage:export:org:*"
|
|
4398
|
+
| "manage:export:org:get"
|
|
4399
|
+
| "manage:export:user:*"
|
|
4400
|
+
| "manage:export:user:delete"
|
|
4401
|
+
| "manage:export:user:list"
|
|
4402
|
+
| "manage:authMigration:*"
|
|
4403
|
+
| "manage:authMigration:identity:add"
|
|
4404
|
+
| "manage:authMigration:identity:remove"
|
|
4405
|
+
| "manage:authMigration:user:update"
|
|
4406
|
+
| "manage:mmi:*"
|
|
4407
|
+
| "manage:mmi:readonly"
|
|
4408
|
+
| "manage:mmi:get"
|
|
4409
|
+
| "manage:mmi:list"
|
|
4410
|
+
| "manage:mmi:reject"
|
|
4411
|
+
| "manage:mmi:delete"
|
|
4412
|
+
| "export:*"
|
|
4413
|
+
| "export:user:*"
|
|
4414
|
+
| "export:user:init"
|
|
4415
|
+
| "export:user:complete"
|
|
4416
|
+
| "mmi:*"
|
|
4417
|
+
| "orgAccess:*"
|
|
4418
|
+
| "orgAccess:child:*";
|
|
4051
4419
|
/**
|
|
4052
4420
|
* @description This type specifies the interpretation of the `fee` field in Babylon
|
|
4053
4421
|
* staking requests. If `sats`, the field is intpreted as a fixed value
|
|
@@ -4191,7 +4559,8 @@ export interface components {
|
|
|
4191
4559
|
| "RemoveKeyFromRoleUserNotAllowed"
|
|
4192
4560
|
| "SiweChallengeExpired"
|
|
4193
4561
|
| "SiweMessageNotValid"
|
|
4194
|
-
| "SiweMessageInvalidSignature"
|
|
4562
|
+
| "SiweMessageInvalidSignature"
|
|
4563
|
+
| "Acl";
|
|
4195
4564
|
/**
|
|
4196
4565
|
* @description Specifies a fork of the `BeaconChain`, to prevent replay attacks.
|
|
4197
4566
|
* The schema of `Fork` is defined in the [Beacon chain
|
|
@@ -4430,6 +4799,7 @@ export interface components {
|
|
|
4430
4799
|
/** @enum {string} */
|
|
4431
4800
|
InternalErrorCode:
|
|
4432
4801
|
| "NoMaterialId"
|
|
4802
|
+
| "UnexpectedCheckerRule"
|
|
4433
4803
|
| "UnresolvedPolicyReference"
|
|
4434
4804
|
| "FidoKeyAssociatedWithMultipleUsers"
|
|
4435
4805
|
| "ClaimsParseError"
|
|
@@ -4501,6 +4871,7 @@ export interface components {
|
|
|
4501
4871
|
| "OidcOrgMismatch"
|
|
4502
4872
|
| "OidcIssuerInvalidJwk"
|
|
4503
4873
|
| "InvalidPkForMaterialId"
|
|
4874
|
+
| "SegwitTweakFailed"
|
|
4504
4875
|
| "UncheckedOrg"
|
|
4505
4876
|
| "SessionOrgIdMissing"
|
|
4506
4877
|
| "AvaSignCredsMissing"
|
|
@@ -4683,7 +5054,10 @@ export interface components {
|
|
|
4683
5054
|
/** @description The type of key this package represents */
|
|
4684
5055
|
key_type: string;
|
|
4685
5056
|
};
|
|
4686
|
-
JwkSetResponse:
|
|
5057
|
+
JwkSetResponse: {
|
|
5058
|
+
/** @description The keys included in this set */
|
|
5059
|
+
keys: Record<string, never>[];
|
|
5060
|
+
};
|
|
4687
5061
|
KeyCountDimensions: {
|
|
4688
5062
|
/** @description The key type */
|
|
4689
5063
|
key_type: string;
|
|
@@ -4774,6 +5148,8 @@ export interface components {
|
|
|
4774
5148
|
* ]
|
|
4775
5149
|
*/
|
|
4776
5150
|
policy: unknown[];
|
|
5151
|
+
/** @description The key provenance. */
|
|
5152
|
+
provenance?: string | null;
|
|
4777
5153
|
/**
|
|
4778
5154
|
* @description Hex-encoded, serialized public key. The format used depends on the key type:
|
|
4779
5155
|
* - Secp256k1 keys use 65-byte uncompressed SECG format;
|
|
@@ -4791,6 +5167,11 @@ export interface components {
|
|
|
4791
5167
|
/** @description The region affinity for this key */
|
|
4792
5168
|
region?: string;
|
|
4793
5169
|
};
|
|
5170
|
+
/** @description Response returned when requesting a key attestation. */
|
|
5171
|
+
KeyInfoJwt: {
|
|
5172
|
+
/** @description A JSON Web Token whose claims contain the `KeyInfo` structure. */
|
|
5173
|
+
jwt: string;
|
|
5174
|
+
};
|
|
4794
5175
|
KeyInfos: {
|
|
4795
5176
|
keys: components["schemas"]["KeyInfo"][];
|
|
4796
5177
|
};
|
|
@@ -6045,6 +6426,25 @@ export interface components {
|
|
|
6045
6426
|
message_tx?: components["schemas"]["TypedTransaction"] | null;
|
|
6046
6427
|
}) &
|
|
6047
6428
|
Record<string, never>;
|
|
6429
|
+
/**
|
|
6430
|
+
* @description The possible actions that can be performed on a [NamedPolicy] that are restricted by ACL.
|
|
6431
|
+
* @enum {string}
|
|
6432
|
+
*/
|
|
6433
|
+
PolicyAction:
|
|
6434
|
+
| "ReadAll"
|
|
6435
|
+
| "ReadPolicy"
|
|
6436
|
+
| "ReadLogs"
|
|
6437
|
+
| "UpdateAll"
|
|
6438
|
+
| "UpdateName"
|
|
6439
|
+
| "UpdateRules"
|
|
6440
|
+
| "UpdateMetadata"
|
|
6441
|
+
| "UpdateEditPolicy"
|
|
6442
|
+
| "UpdateOwner"
|
|
6443
|
+
| "UpdateAcl"
|
|
6444
|
+
| "Delete"
|
|
6445
|
+
| "Attach"
|
|
6446
|
+
| "Sign"
|
|
6447
|
+
| "Invoke";
|
|
6048
6448
|
/** @description The id for attaching a named policy to a key, role, or key in role. */
|
|
6049
6449
|
PolicyAttachedToId: OneOf<
|
|
6050
6450
|
[
|
|
@@ -6162,6 +6562,8 @@ export interface components {
|
|
|
6162
6562
|
| "DeniedByWebhook";
|
|
6163
6563
|
/** @description A struct containing all the information about a specific version of a policy. */
|
|
6164
6564
|
PolicyInfo: {
|
|
6565
|
+
/** @description The access-control entries for the policy. */
|
|
6566
|
+
acl?: unknown[] | null;
|
|
6165
6567
|
/** @description A list of entities (keys, roles, etc.) the policy is attached to. */
|
|
6166
6568
|
attached_to: components["schemas"]["PolicyAttachedToId"][];
|
|
6167
6569
|
created: components["schemas"]["EpochDateTime"];
|
|
@@ -6238,6 +6640,7 @@ export interface components {
|
|
|
6238
6640
|
/** @enum {string} */
|
|
6239
6641
|
PreconditionErrorOwnCodes:
|
|
6240
6642
|
| "KeyRegionLocked"
|
|
6643
|
+
| "KeyRegionChangedRecently"
|
|
6241
6644
|
| "MfaRegionLocked"
|
|
6242
6645
|
| "Eth2ProposerSlotTooLow"
|
|
6243
6646
|
| "Eth2AttestationSourceEpochTooLow"
|
|
@@ -6278,6 +6681,12 @@ export interface components {
|
|
|
6278
6681
|
>;
|
|
6279
6682
|
/** @description A request to sign a PSBT */
|
|
6280
6683
|
PsbtSignRequest: {
|
|
6684
|
+
/**
|
|
6685
|
+
* @description Request additional information to be included in the response, explaining
|
|
6686
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
6687
|
+
* Defaults to false.
|
|
6688
|
+
*/
|
|
6689
|
+
explain?: boolean;
|
|
6281
6690
|
/**
|
|
6282
6691
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
6283
6692
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -6299,6 +6708,9 @@ export interface components {
|
|
|
6299
6708
|
};
|
|
6300
6709
|
/** @description Response to a PSBT signing request */
|
|
6301
6710
|
PsbtSignResponse: {
|
|
6711
|
+
/** @description Optional policy evaluation tree. */
|
|
6712
|
+
policy_eval_tree?: unknown;
|
|
6713
|
+
} & {
|
|
6302
6714
|
/**
|
|
6303
6715
|
* @description The PSBT in standard hex serialization, without leading "0x".
|
|
6304
6716
|
* @example 70736274ff01005e...
|
|
@@ -6846,186 +7258,7 @@ export interface components {
|
|
|
6846
7258
|
users?: string[] | null;
|
|
6847
7259
|
};
|
|
6848
7260
|
/** @description All scopes for accessing CubeSigner APIs */
|
|
6849
|
-
Scope:
|
|
6850
|
-
| (
|
|
6851
|
-
| "sign:*"
|
|
6852
|
-
| "sign:ava"
|
|
6853
|
-
| "sign:blob"
|
|
6854
|
-
| "sign:diffieHellman"
|
|
6855
|
-
| "sign:btc:*"
|
|
6856
|
-
| "sign:btc:segwit"
|
|
6857
|
-
| "sign:btc:taproot"
|
|
6858
|
-
| "sign:btc:psbt:*"
|
|
6859
|
-
| "sign:btc:psbt:doge"
|
|
6860
|
-
| "sign:btc:psbt:legacy"
|
|
6861
|
-
| "sign:btc:psbt:segwit"
|
|
6862
|
-
| "sign:btc:psbt:taproot"
|
|
6863
|
-
| "sign:btc:psbt:ltcSegwit"
|
|
6864
|
-
| "sign:btc:message:*"
|
|
6865
|
-
| "sign:btc:message:segwit"
|
|
6866
|
-
| "sign:btc:message:legacy"
|
|
6867
|
-
| "sign:babylon:*"
|
|
6868
|
-
| "sign:babylon:eots:*"
|
|
6869
|
-
| "sign:babylon:eots:nonces"
|
|
6870
|
-
| "sign:babylon:eots:sign"
|
|
6871
|
-
| "sign:babylon:staking:*"
|
|
6872
|
-
| "sign:babylon:staking:deposit"
|
|
6873
|
-
| "sign:babylon:staking:unbond"
|
|
6874
|
-
| "sign:babylon:staking:withdraw"
|
|
6875
|
-
| "sign:babylon:staking:slash"
|
|
6876
|
-
| "sign:babylon:registration"
|
|
6877
|
-
| "sign:babylon:covenant"
|
|
6878
|
-
| "sign:evm:*"
|
|
6879
|
-
| "sign:evm:tx"
|
|
6880
|
-
| "sign:evm:eip191"
|
|
6881
|
-
| "sign:evm:eip712"
|
|
6882
|
-
| "sign:eth2:*"
|
|
6883
|
-
| "sign:eth2:validate"
|
|
6884
|
-
| "sign:eth2:stake"
|
|
6885
|
-
| "sign:eth2:unstake"
|
|
6886
|
-
| "sign:solana"
|
|
6887
|
-
| "sign:sui"
|
|
6888
|
-
| "sign:tendermint"
|
|
6889
|
-
| "sign:mmi"
|
|
6890
|
-
| "manage:*"
|
|
6891
|
-
| "manage:readonly"
|
|
6892
|
-
| "manage:email"
|
|
6893
|
-
| "manage:mfa:*"
|
|
6894
|
-
| "manage:mfa:readonly"
|
|
6895
|
-
| "manage:mfa:list"
|
|
6896
|
-
| "manage:mfa:vote:*"
|
|
6897
|
-
| "manage:mfa:vote:cs"
|
|
6898
|
-
| "manage:mfa:vote:email"
|
|
6899
|
-
| "manage:mfa:vote:fido"
|
|
6900
|
-
| "manage:mfa:vote:totp"
|
|
6901
|
-
| "manage:mfa:register:*"
|
|
6902
|
-
| "manage:mfa:register:fido"
|
|
6903
|
-
| "manage:mfa:register:totp"
|
|
6904
|
-
| "manage:mfa:register:email"
|
|
6905
|
-
| "manage:mfa:unregister:*"
|
|
6906
|
-
| "manage:mfa:unregister:fido"
|
|
6907
|
-
| "manage:mfa:unregister:totp"
|
|
6908
|
-
| "manage:mfa:verify:*"
|
|
6909
|
-
| "manage:mfa:verify:totp"
|
|
6910
|
-
| "manage:key:*"
|
|
6911
|
-
| "manage:key:readonly"
|
|
6912
|
-
| "manage:key:get"
|
|
6913
|
-
| "manage:key:listRoles"
|
|
6914
|
-
| "manage:key:list"
|
|
6915
|
-
| "manage:key:history:tx:list"
|
|
6916
|
-
| "manage:key:create"
|
|
6917
|
-
| "manage:key:import"
|
|
6918
|
-
| "manage:key:update:*"
|
|
6919
|
-
| "manage:key:update:owner"
|
|
6920
|
-
| "manage:key:update:policy"
|
|
6921
|
-
| "manage:key:update:enabled"
|
|
6922
|
-
| "manage:key:update:metadata"
|
|
6923
|
-
| "manage:key:update:editPolicy"
|
|
6924
|
-
| "manage:key:delete"
|
|
6925
|
-
| "manage:policy:*"
|
|
6926
|
-
| "manage:policy:create"
|
|
6927
|
-
| "manage:policy:get"
|
|
6928
|
-
| "manage:policy:list"
|
|
6929
|
-
| "manage:policy:delete"
|
|
6930
|
-
| "manage:policy:update:*"
|
|
6931
|
-
| "manage:policy:update:owner"
|
|
6932
|
-
| "manage:policy:update:name"
|
|
6933
|
-
| "manage:policy:update:editPolicy"
|
|
6934
|
-
| "manage:policy:update:metadata"
|
|
6935
|
-
| "manage:policy:update:rule"
|
|
6936
|
-
| "manage:policy:invoke"
|
|
6937
|
-
| "manage:policy:wasm:*"
|
|
6938
|
-
| "manage:policy:wasm:upload"
|
|
6939
|
-
| "manage:policy:secrets:*"
|
|
6940
|
-
| "manage:policy:secrets:get"
|
|
6941
|
-
| "manage:policy:secrets:update:*"
|
|
6942
|
-
| "manage:policy:secrets:update:values"
|
|
6943
|
-
| "manage:policy:secrets:update:editPolicy"
|
|
6944
|
-
| "manage:contact:*"
|
|
6945
|
-
| "manage:contact:create"
|
|
6946
|
-
| "manage:contact:get"
|
|
6947
|
-
| "manage:contact:list"
|
|
6948
|
-
| "manage:contact:delete"
|
|
6949
|
-
| "manage:contact:update:*"
|
|
6950
|
-
| "manage:contact:update:name"
|
|
6951
|
-
| "manage:contact:update:addresses"
|
|
6952
|
-
| "manage:contact:update:owner"
|
|
6953
|
-
| "manage:contact:update:metadata"
|
|
6954
|
-
| "manage:contact:update:editPolicy"
|
|
6955
|
-
| "manage:contact:lookup:*"
|
|
6956
|
-
| "manage:contact:lookup:address"
|
|
6957
|
-
| "manage:policy:createImportKey"
|
|
6958
|
-
| "manage:role:*"
|
|
6959
|
-
| "manage:role:readonly"
|
|
6960
|
-
| "manage:role:create"
|
|
6961
|
-
| "manage:role:delete"
|
|
6962
|
-
| "manage:role:get:*"
|
|
6963
|
-
| "manage:role:get:keys"
|
|
6964
|
-
| "manage:role:get:keys:list"
|
|
6965
|
-
| "manage:role:get:keys:get"
|
|
6966
|
-
| "manage:role:get:users"
|
|
6967
|
-
| "manage:role:list"
|
|
6968
|
-
| "manage:role:update:*"
|
|
6969
|
-
| "manage:role:update:enabled"
|
|
6970
|
-
| "manage:role:update:policy"
|
|
6971
|
-
| "manage:role:update:editPolicy"
|
|
6972
|
-
| "manage:role:update:key:*"
|
|
6973
|
-
| "manage:role:update:key:add"
|
|
6974
|
-
| "manage:role:update:key:remove"
|
|
6975
|
-
| "manage:role:update:user:*"
|
|
6976
|
-
| "manage:role:update:user:add"
|
|
6977
|
-
| "manage:role:update:user:remove"
|
|
6978
|
-
| "manage:role:history:tx:list"
|
|
6979
|
-
| "manage:identity:*"
|
|
6980
|
-
| "manage:identity:verify"
|
|
6981
|
-
| "manage:identity:add"
|
|
6982
|
-
| "manage:identity:remove"
|
|
6983
|
-
| "manage:identity:list"
|
|
6984
|
-
| "manage:org:*"
|
|
6985
|
-
| "manage:org:create"
|
|
6986
|
-
| "manage:org:metrics:query"
|
|
6987
|
-
| "manage:org:readonly"
|
|
6988
|
-
| "manage:org:addUser"
|
|
6989
|
-
| "manage:org:inviteUser"
|
|
6990
|
-
| "manage:org:inviteAlien"
|
|
6991
|
-
| "manage:org:updateMembership"
|
|
6992
|
-
| "manage:org:listUsers"
|
|
6993
|
-
| "manage:org:user:get"
|
|
6994
|
-
| "manage:org:deleteUser"
|
|
6995
|
-
| "manage:org:get"
|
|
6996
|
-
| "manage:org:user:resetMfa"
|
|
6997
|
-
| "manage:session:*"
|
|
6998
|
-
| "manage:session:readonly"
|
|
6999
|
-
| "manage:session:get"
|
|
7000
|
-
| "manage:session:list"
|
|
7001
|
-
| "manage:session:create"
|
|
7002
|
-
| "manage:session:extend"
|
|
7003
|
-
| "manage:session:revoke"
|
|
7004
|
-
| "manage:export:*"
|
|
7005
|
-
| "manage:export:org:*"
|
|
7006
|
-
| "manage:export:org:get"
|
|
7007
|
-
| "manage:export:user:*"
|
|
7008
|
-
| "manage:export:user:delete"
|
|
7009
|
-
| "manage:export:user:list"
|
|
7010
|
-
| "manage:authMigration"
|
|
7011
|
-
| "manage:authMigration:identity:add"
|
|
7012
|
-
| "manage:authMigration:identity:remove"
|
|
7013
|
-
| "manage:authMigration:user:update"
|
|
7014
|
-
| "manage:mmi:*"
|
|
7015
|
-
| "manage:mmi:readonly"
|
|
7016
|
-
| "manage:mmi:get"
|
|
7017
|
-
| "manage:mmi:list"
|
|
7018
|
-
| "manage:mmi:reject"
|
|
7019
|
-
| "manage:mmi:delete"
|
|
7020
|
-
| "export:*"
|
|
7021
|
-
| "export:user:*"
|
|
7022
|
-
| "export:user:init"
|
|
7023
|
-
| "export:user:complete"
|
|
7024
|
-
| "mmi:*"
|
|
7025
|
-
| "orgAccess:*"
|
|
7026
|
-
| "orgAccess:child:*"
|
|
7027
|
-
)
|
|
7028
|
-
| string;
|
|
7261
|
+
Scope: components["schemas"]["ExplicitScope"] | string;
|
|
7029
7262
|
/** @description A set of scopes. */
|
|
7030
7263
|
ScopeSet: OneOf<
|
|
7031
7264
|
[
|
|
@@ -7145,6 +7378,9 @@ export interface components {
|
|
|
7145
7378
|
org_id: string;
|
|
7146
7379
|
};
|
|
7147
7380
|
SignResponse: {
|
|
7381
|
+
/** @description Optional policy evaluation tree. */
|
|
7382
|
+
policy_eval_tree?: unknown;
|
|
7383
|
+
} & {
|
|
7148
7384
|
/** @description The hex-encoded resulting signature. */
|
|
7149
7385
|
signature: string;
|
|
7150
7386
|
};
|
|
@@ -7182,7 +7418,8 @@ export interface components {
|
|
|
7182
7418
|
| "JrpcError"
|
|
7183
7419
|
| "UnhandledError"
|
|
7184
7420
|
| "ProxyStartError"
|
|
7185
|
-
| "EnclaveError"
|
|
7421
|
+
| "EnclaveError"
|
|
7422
|
+
| "PolicyErrorWithEvalTree";
|
|
7186
7423
|
/** @description Answer to a Sign-in with Ethereum challenge. */
|
|
7187
7424
|
SiweCompleteRequest: {
|
|
7188
7425
|
challenge_id: components["schemas"]["Id"];
|
|
@@ -7238,6 +7475,12 @@ export interface components {
|
|
|
7238
7475
|
* }
|
|
7239
7476
|
*/
|
|
7240
7477
|
SolanaSignRequest: {
|
|
7478
|
+
/**
|
|
7479
|
+
* @description Request additional information to be included in the response, explaining
|
|
7480
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
7481
|
+
* Defaults to false.
|
|
7482
|
+
*/
|
|
7483
|
+
explain?: boolean;
|
|
7241
7484
|
/**
|
|
7242
7485
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
7243
7486
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -7256,6 +7499,18 @@ export interface components {
|
|
|
7256
7499
|
source_ip: string;
|
|
7257
7500
|
};
|
|
7258
7501
|
StakeRequest: {
|
|
7502
|
+
/**
|
|
7503
|
+
* @description Request additional information to be included in the response, explaining
|
|
7504
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
7505
|
+
* Defaults to false.
|
|
7506
|
+
*/
|
|
7507
|
+
explain?: boolean;
|
|
7508
|
+
/**
|
|
7509
|
+
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
7510
|
+
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
7511
|
+
*/
|
|
7512
|
+
metadata?: unknown;
|
|
7513
|
+
} & {
|
|
7259
7514
|
/**
|
|
7260
7515
|
* Format: int64
|
|
7261
7516
|
* @description The chain on which we will deposit
|
|
@@ -7283,13 +7538,17 @@ export interface components {
|
|
|
7283
7538
|
*/
|
|
7284
7539
|
withdrawal_addr: string;
|
|
7285
7540
|
};
|
|
7286
|
-
StakeResponse: {
|
|
7541
|
+
StakeResponse: ({
|
|
7542
|
+
/** @description Optional policy evaluation tree. */
|
|
7543
|
+
policy_eval_tree?: unknown;
|
|
7544
|
+
} & {
|
|
7545
|
+
deposit_tx: components["schemas"]["DepositTxn"];
|
|
7546
|
+
}) & {
|
|
7287
7547
|
/**
|
|
7288
7548
|
* @description The validator key id ("Key#...")
|
|
7289
7549
|
* @example Key#db1731f8-3659-45c0-885b-e11e1f5b7be2
|
|
7290
7550
|
*/
|
|
7291
7551
|
created_validator_key_id: string;
|
|
7292
|
-
deposit_tx: components["schemas"]["DepositTxn"];
|
|
7293
7552
|
};
|
|
7294
7553
|
Status: {
|
|
7295
7554
|
/** @description Users who are allowed to approve. Must be non-empty. */
|
|
@@ -7335,6 +7594,12 @@ export interface components {
|
|
|
7335
7594
|
SuiChain: "mainnet" | "devnet" | "testnet";
|
|
7336
7595
|
/** @description Request to sign a serialized SUI transaction */
|
|
7337
7596
|
SuiSignRequest: {
|
|
7597
|
+
/**
|
|
7598
|
+
* @description Request additional information to be included in the response, explaining
|
|
7599
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
7600
|
+
* Defaults to false.
|
|
7601
|
+
*/
|
|
7602
|
+
explain?: boolean;
|
|
7338
7603
|
/**
|
|
7339
7604
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
7340
7605
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -7350,6 +7615,12 @@ export interface components {
|
|
|
7350
7615
|
tx: string;
|
|
7351
7616
|
};
|
|
7352
7617
|
TaprootSignRequest: {
|
|
7618
|
+
/**
|
|
7619
|
+
* @description Request additional information to be included in the response, explaining
|
|
7620
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
7621
|
+
* Defaults to false.
|
|
7622
|
+
*/
|
|
7623
|
+
explain?: boolean;
|
|
7353
7624
|
/**
|
|
7354
7625
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
7355
7626
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -7411,6 +7682,12 @@ export interface components {
|
|
|
7411
7682
|
TelegramEnvironment: "production" | "test";
|
|
7412
7683
|
/** @description The request for using the Tendermint sign endpoint. */
|
|
7413
7684
|
TendermintSignRequest: {
|
|
7685
|
+
/**
|
|
7686
|
+
* @description Request additional information to be included in the response, explaining
|
|
7687
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
7688
|
+
* Defaults to false.
|
|
7689
|
+
*/
|
|
7690
|
+
explain?: boolean;
|
|
7414
7691
|
/**
|
|
7415
7692
|
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
7416
7693
|
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
@@ -7682,7 +7959,6 @@ export interface components {
|
|
|
7682
7959
|
*/
|
|
7683
7960
|
genesis_fork_version?: string | null;
|
|
7684
7961
|
};
|
|
7685
|
-
/** @description Unstake message request. */
|
|
7686
7962
|
UnstakeRequest: {
|
|
7687
7963
|
epoch?: components["schemas"]["Epoch"] | null;
|
|
7688
7964
|
fork: components["schemas"]["Fork"];
|
|
@@ -7697,15 +7973,20 @@ export interface components {
|
|
|
7697
7973
|
* @example 31337
|
|
7698
7974
|
*/
|
|
7699
7975
|
validator_index: string;
|
|
7700
|
-
}
|
|
7701
|
-
|
|
7702
|
-
|
|
7703
|
-
|
|
7704
|
-
|
|
7705
|
-
|
|
7706
|
-
|
|
7707
|
-
|
|
7708
|
-
|
|
7976
|
+
} & {
|
|
7977
|
+
/**
|
|
7978
|
+
* @description Request additional information to be included in the response, explaining
|
|
7979
|
+
* the outcome (i.e., permitted vs. denied vs. MFA required) of the sign request.
|
|
7980
|
+
* Defaults to false.
|
|
7981
|
+
*/
|
|
7982
|
+
explain?: boolean;
|
|
7983
|
+
/**
|
|
7984
|
+
* @description Optional metadata. Passing additional information as metadata can be used to make reviewing
|
|
7985
|
+
* of pending MFA requests and/or historical key transactions more transparent. It can also be used e.g., to carry additional data to WebHook policies.
|
|
7986
|
+
*/
|
|
7987
|
+
metadata?: unknown;
|
|
7988
|
+
} & Record<string, never>;
|
|
7989
|
+
/** @description A response to sign an eth2 unstake request. */
|
|
7709
7990
|
UnstakeResponse: {
|
|
7710
7991
|
message: components["schemas"]["VoluntaryExit"];
|
|
7711
7992
|
/**
|
|
@@ -7713,7 +7994,10 @@ export interface components {
|
|
|
7713
7994
|
* @example 0x910c7cd537ed91cc8c4a82f3cbd832e9be8c24a22e9c86df479f7ce42025ea6a09619b418b666a060e260d2aae31b8e50e9d05ca3442c7eed3b507e5207e14674275f68c2ba84c4bf6b8dd364a304acac8cfab3681e2514b4400f9242bc61164
|
|
7714
7995
|
*/
|
|
7715
7996
|
signature: string;
|
|
7716
|
-
}
|
|
7997
|
+
} & {
|
|
7998
|
+
/** @description Optional policy evaluation tree. */
|
|
7999
|
+
policy_eval_tree?: unknown;
|
|
8000
|
+
} & Record<string, never>;
|
|
7717
8001
|
/** @description The information needed to update a Contact. */
|
|
7718
8002
|
UpdateContactRequest: {
|
|
7719
8003
|
addresses?: components["schemas"]["AddressMap"] | null;
|
|
@@ -7735,6 +8019,13 @@ export interface components {
|
|
|
7735
8019
|
* Once disabled, a key cannot be used for signing.
|
|
7736
8020
|
*/
|
|
7737
8021
|
enabled?: boolean | null;
|
|
8022
|
+
/**
|
|
8023
|
+
* @description If set, change the key's region affinity to this value.
|
|
8024
|
+
*
|
|
8025
|
+
* This is a region-locked operation, i.e., it can only be performed
|
|
8026
|
+
* from the region matching the key's current region affinity
|
|
8027
|
+
*/
|
|
8028
|
+
region?: string;
|
|
7738
8029
|
/**
|
|
7739
8030
|
* Format: int64
|
|
7740
8031
|
* @description If set, updating the metadata only succeeds if the version matches this value.
|
|
@@ -7935,6 +8226,26 @@ export interface components {
|
|
|
7935
8226
|
};
|
|
7936
8227
|
/** @description Request body for updating a named policy. */
|
|
7937
8228
|
UpdatePolicyRequest: {
|
|
8229
|
+
/**
|
|
8230
|
+
* @description New Access-control entries.
|
|
8231
|
+
* @example [
|
|
8232
|
+
* {
|
|
8233
|
+
* "action": "attach",
|
|
8234
|
+
* "resources": [
|
|
8235
|
+
* {
|
|
8236
|
+
* "key_id": "*",
|
|
8237
|
+
* "role_id": "Role#e427c28a-9c5b-49cc-a257-878aea58a22c"
|
|
8238
|
+
* }
|
|
8239
|
+
* ],
|
|
8240
|
+
* "subjects": "*"
|
|
8241
|
+
* },
|
|
8242
|
+
* {
|
|
8243
|
+
* "action": "sign",
|
|
8244
|
+
* "subjects": "Role#e427c28a-9c5b-49cc-a257-878aea58a22c"
|
|
8245
|
+
* }
|
|
8246
|
+
* ]
|
|
8247
|
+
*/
|
|
8248
|
+
acl?: unknown[] | null;
|
|
7938
8249
|
edit_policy?: components["schemas"]["EditPolicy"] | null;
|
|
7939
8250
|
/** @description A new metadata. */
|
|
7940
8251
|
metadata?: unknown;
|
|
@@ -8315,6 +8626,9 @@ export interface components {
|
|
|
8315
8626
|
BabylonCovSignResponse: {
|
|
8316
8627
|
content: {
|
|
8317
8628
|
"application/json": {
|
|
8629
|
+
/** @description Optional policy evaluation tree. */
|
|
8630
|
+
policy_eval_tree?: unknown;
|
|
8631
|
+
} & {
|
|
8318
8632
|
/**
|
|
8319
8633
|
* @description The slash-unbonding transaction signatures as an array of hex strings with no 0x prefix
|
|
8320
8634
|
* @example [
|
|
@@ -8348,6 +8662,9 @@ export interface components {
|
|
|
8348
8662
|
BabylonRegistrationResponse: {
|
|
8349
8663
|
content: {
|
|
8350
8664
|
"application/json": {
|
|
8665
|
+
/** @description Optional policy evaluation tree. */
|
|
8666
|
+
policy_eval_tree?: unknown;
|
|
8667
|
+
} & {
|
|
8351
8668
|
/**
|
|
8352
8669
|
* @description The Babylon address that will receive the staking rewards for this deposit.
|
|
8353
8670
|
*
|
|
@@ -8395,6 +8712,9 @@ export interface components {
|
|
|
8395
8712
|
BabylonStakingResponse: {
|
|
8396
8713
|
content: {
|
|
8397
8714
|
"application/json": {
|
|
8715
|
+
/** @description Optional policy evaluation tree. */
|
|
8716
|
+
policy_eval_tree?: unknown;
|
|
8717
|
+
} & {
|
|
8398
8718
|
/**
|
|
8399
8719
|
* Format: int64
|
|
8400
8720
|
* @description The transaction fee in sats
|
|
@@ -8413,6 +8733,9 @@ export interface components {
|
|
|
8413
8733
|
BtcMessageSignResponse: {
|
|
8414
8734
|
content: {
|
|
8415
8735
|
"application/json": {
|
|
8736
|
+
/** @description Optional policy evaluation tree. */
|
|
8737
|
+
policy_eval_tree?: unknown;
|
|
8738
|
+
} & {
|
|
8416
8739
|
/** @description The base64-encoded signature in BIP137 format. */
|
|
8417
8740
|
sig: string;
|
|
8418
8741
|
};
|
|
@@ -8518,7 +8841,7 @@ export interface components {
|
|
|
8518
8841
|
/** @description The result of a Diffie Hellman key exchange */
|
|
8519
8842
|
DiffieHellmanResponse: {
|
|
8520
8843
|
content: {
|
|
8521
|
-
"application/json":
|
|
8844
|
+
"application/json": (
|
|
8522
8845
|
| {
|
|
8523
8846
|
/** @description The resulting points as base64-encoded byte strings in a key-type--dependent format. */
|
|
8524
8847
|
points: string[];
|
|
@@ -8538,7 +8861,11 @@ export interface components {
|
|
|
8538
8861
|
ephemeral_public_key: string;
|
|
8539
8862
|
/** @enum {string} */
|
|
8540
8863
|
response_type: "encrypted";
|
|
8541
|
-
}
|
|
8864
|
+
}
|
|
8865
|
+
) & {
|
|
8866
|
+
/** @description Optional policy evaluation tree. */
|
|
8867
|
+
policy_eval_tree?: unknown;
|
|
8868
|
+
} & Record<string, never>;
|
|
8542
8869
|
};
|
|
8543
8870
|
};
|
|
8544
8871
|
/**
|
|
@@ -8570,6 +8897,9 @@ export interface components {
|
|
|
8570
8897
|
EotsCreateNonceResponse: {
|
|
8571
8898
|
content: {
|
|
8572
8899
|
"application/json": {
|
|
8900
|
+
/** @description Optional policy evaluation tree. */
|
|
8901
|
+
policy_eval_tree?: unknown;
|
|
8902
|
+
} & {
|
|
8573
8903
|
/**
|
|
8574
8904
|
* @description The generated nonces as an array of 0x-prefixed hex strings
|
|
8575
8905
|
* @example [
|
|
@@ -8590,6 +8920,9 @@ export interface components {
|
|
|
8590
8920
|
Eth1SignResponse: {
|
|
8591
8921
|
content: {
|
|
8592
8922
|
"application/json": {
|
|
8923
|
+
/** @description Optional policy evaluation tree. */
|
|
8924
|
+
policy_eval_tree?: unknown;
|
|
8925
|
+
} & {
|
|
8593
8926
|
/**
|
|
8594
8927
|
* @description Hex-encoded RLP encoding of the transaction and its signature
|
|
8595
8928
|
* @example 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
|
|
@@ -8598,17 +8931,6 @@ export interface components {
|
|
|
8598
8931
|
};
|
|
8599
8932
|
};
|
|
8600
8933
|
};
|
|
8601
|
-
Eth2SignResponse: {
|
|
8602
|
-
content: {
|
|
8603
|
-
"application/json": {
|
|
8604
|
-
/**
|
|
8605
|
-
* @description Hex encoded signature prefixed with 0x e.g. "0x0000..."
|
|
8606
|
-
* @example 0xb4f2ef9d12a54e1f569596c07c97d6d730535b6ffc0d287761dc78103a86326782471a04c75ce7a6faea08ca9a4a0830031cdcb893da8711d54aa22619f1a7e71b8185ddf4c6bfd9babbd735960e35e56bd6eeb89625b04850e7a9ef8846e549
|
|
8607
|
-
*/
|
|
8608
|
-
signature: string;
|
|
8609
|
-
};
|
|
8610
|
-
};
|
|
8611
|
-
};
|
|
8612
8934
|
FidoAssertChallenge: {
|
|
8613
8935
|
content: {
|
|
8614
8936
|
"application/json": (components["schemas"]["ChallengePieces"] & {
|
|
@@ -8701,10 +9023,13 @@ export interface components {
|
|
|
8701
9023
|
"application/json": components["schemas"]["Response"] & Record<string, never>;
|
|
8702
9024
|
};
|
|
8703
9025
|
};
|
|
8704
|
-
/** @description A JSON Web Key set describing the key used to sign JSON Web Tokens
|
|
9026
|
+
/** @description A JSON Web Key set describing the key used to sign JSON Web Tokens */
|
|
8705
9027
|
JwkSetResponse: {
|
|
8706
9028
|
content: {
|
|
8707
|
-
"application/json":
|
|
9029
|
+
"application/json": {
|
|
9030
|
+
/** @description The keys included in this set */
|
|
9031
|
+
keys: Record<string, never>[];
|
|
9032
|
+
};
|
|
8708
9033
|
};
|
|
8709
9034
|
};
|
|
8710
9035
|
/** @description Derivation-related metadata for keys derived from a long-lived mnemonic */
|
|
@@ -8805,6 +9130,8 @@ export interface components {
|
|
|
8805
9130
|
* ]
|
|
8806
9131
|
*/
|
|
8807
9132
|
policy: unknown[];
|
|
9133
|
+
/** @description The key provenance. */
|
|
9134
|
+
provenance?: string | null;
|
|
8808
9135
|
/**
|
|
8809
9136
|
* @description Hex-encoded, serialized public key. The format used depends on the key type:
|
|
8810
9137
|
* - Secp256k1 keys use 65-byte uncompressed SECG format;
|
|
@@ -8824,6 +9151,15 @@ export interface components {
|
|
|
8824
9151
|
};
|
|
8825
9152
|
};
|
|
8826
9153
|
};
|
|
9154
|
+
/** @description Response returned when requesting a key attestation. */
|
|
9155
|
+
KeyInfoJwt: {
|
|
9156
|
+
content: {
|
|
9157
|
+
"application/json": {
|
|
9158
|
+
/** @description A JSON Web Token whose claims contain the `KeyInfo` structure. */
|
|
9159
|
+
jwt: string;
|
|
9160
|
+
};
|
|
9161
|
+
};
|
|
9162
|
+
};
|
|
8827
9163
|
KeyInfos: {
|
|
8828
9164
|
content: {
|
|
8829
9165
|
"application/json": {
|
|
@@ -9336,6 +9672,8 @@ export interface components {
|
|
|
9336
9672
|
PolicyInfo: {
|
|
9337
9673
|
content: {
|
|
9338
9674
|
"application/json": {
|
|
9675
|
+
/** @description The access-control entries for the policy. */
|
|
9676
|
+
acl?: unknown[] | null;
|
|
9339
9677
|
/** @description A list of entities (keys, roles, etc.) the policy is attached to. */
|
|
9340
9678
|
attached_to: components["schemas"]["PolicyAttachedToId"][];
|
|
9341
9679
|
created: components["schemas"]["EpochDateTime"];
|
|
@@ -9394,6 +9732,9 @@ export interface components {
|
|
|
9394
9732
|
PsbtSignResponse: {
|
|
9395
9733
|
content: {
|
|
9396
9734
|
"application/json": {
|
|
9735
|
+
/** @description Optional policy evaluation tree. */
|
|
9736
|
+
policy_eval_tree?: unknown;
|
|
9737
|
+
} & {
|
|
9397
9738
|
/**
|
|
9398
9739
|
* @description The PSBT in standard hex serialization, without leading "0x".
|
|
9399
9740
|
* @example 70736274ff01005e...
|
|
@@ -9553,6 +9894,9 @@ export interface components {
|
|
|
9553
9894
|
SignResponse: {
|
|
9554
9895
|
content: {
|
|
9555
9896
|
"application/json": {
|
|
9897
|
+
/** @description Optional policy evaluation tree. */
|
|
9898
|
+
policy_eval_tree?: unknown;
|
|
9899
|
+
} & {
|
|
9556
9900
|
/** @description The hex-encoded resulting signature. */
|
|
9557
9901
|
signature: string;
|
|
9558
9902
|
};
|
|
@@ -9587,13 +9931,17 @@ export interface components {
|
|
|
9587
9931
|
};
|
|
9588
9932
|
StakeResponse: {
|
|
9589
9933
|
content: {
|
|
9590
|
-
"application/json": {
|
|
9934
|
+
"application/json": ({
|
|
9935
|
+
/** @description Optional policy evaluation tree. */
|
|
9936
|
+
policy_eval_tree?: unknown;
|
|
9937
|
+
} & {
|
|
9938
|
+
deposit_tx: components["schemas"]["DepositTxn"];
|
|
9939
|
+
}) & {
|
|
9591
9940
|
/**
|
|
9592
9941
|
* @description The validator key id ("Key#...")
|
|
9593
9942
|
* @example Key#db1731f8-3659-45c0-885b-e11e1f5b7be2
|
|
9594
9943
|
*/
|
|
9595
9944
|
created_validator_key_id: string;
|
|
9596
|
-
deposit_tx: components["schemas"]["DepositTxn"];
|
|
9597
9945
|
};
|
|
9598
9946
|
};
|
|
9599
9947
|
};
|
|
@@ -9642,14 +9990,7 @@ export interface components {
|
|
|
9642
9990
|
};
|
|
9643
9991
|
};
|
|
9644
9992
|
};
|
|
9645
|
-
/**
|
|
9646
|
-
* @description Unstake responses are signed voluntary exit messages.
|
|
9647
|
-
* The schema for this message is defined
|
|
9648
|
-
* [here](https://github.com/ethereum/consensus-specs/blob/v1.0.1/specs/phase0/beacon-chain.md#signedvoluntaryexit).
|
|
9649
|
-
* This message can be directly POSTed to the Beacon node's
|
|
9650
|
-
* `/eth/v1/beacon/pool/voluntary_exits` end-point (see expected schema
|
|
9651
|
-
* [here](https://ethereum.github.io/beacon-APIs/#/Beacon/submitPoolVoluntaryExit)).
|
|
9652
|
-
*/
|
|
9993
|
+
/** @description A response to sign an eth2 unstake request. */
|
|
9653
9994
|
UnstakeResponse: {
|
|
9654
9995
|
content: {
|
|
9655
9996
|
"application/json": {
|
|
@@ -9659,7 +10000,10 @@ export interface components {
|
|
|
9659
10000
|
* @example 0x910c7cd537ed91cc8c4a82f3cbd832e9be8c24a22e9c86df479f7ce42025ea6a09619b418b666a060e260d2aae31b8e50e9d05ca3442c7eed3b507e5207e14674275f68c2ba84c4bf6b8dd364a304acac8cfab3681e2514b4400f9242bc61164
|
|
9660
10001
|
*/
|
|
9661
10002
|
signature: string;
|
|
9662
|
-
}
|
|
10003
|
+
} & {
|
|
10004
|
+
/** @description Optional policy evaluation tree. */
|
|
10005
|
+
policy_eval_tree?: unknown;
|
|
10006
|
+
} & Record<string, never>;
|
|
9663
10007
|
};
|
|
9664
10008
|
};
|
|
9665
10009
|
UpdateOrgResponse: {
|
|
@@ -9879,6 +10223,22 @@ export interface operations {
|
|
|
9879
10223
|
};
|
|
9880
10224
|
};
|
|
9881
10225
|
};
|
|
10226
|
+
/**
|
|
10227
|
+
* JWKS endpoint for the attestation key
|
|
10228
|
+
* @description JWKS endpoint for the attestation key
|
|
10229
|
+
*
|
|
10230
|
+
* Returns the public key used to sign Key info attestations.
|
|
10231
|
+
*/
|
|
10232
|
+
attestationJwkSet: {
|
|
10233
|
+
responses: {
|
|
10234
|
+
200: components["responses"]["JwkSetResponse"];
|
|
10235
|
+
default: {
|
|
10236
|
+
content: {
|
|
10237
|
+
"application/json": components["schemas"]["ErrorResponse"];
|
|
10238
|
+
};
|
|
10239
|
+
};
|
|
10240
|
+
};
|
|
10241
|
+
};
|
|
9882
10242
|
/**
|
|
9883
10243
|
* List accessible organizations.
|
|
9884
10244
|
* @description List accessible organizations.
|
|
@@ -11783,6 +12143,36 @@ export interface operations {
|
|
|
11783
12143
|
};
|
|
11784
12144
|
};
|
|
11785
12145
|
};
|
|
12146
|
+
/**
|
|
12147
|
+
* Attest to Key Properties
|
|
12148
|
+
* @description Attest to Key Properties
|
|
12149
|
+
*
|
|
12150
|
+
* The response is a JWT whose claims are the key properties.
|
|
12151
|
+
*/
|
|
12152
|
+
attestKey: {
|
|
12153
|
+
parameters: {
|
|
12154
|
+
path: {
|
|
12155
|
+
/**
|
|
12156
|
+
* @description Name or ID of the desired Org
|
|
12157
|
+
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
12158
|
+
*/
|
|
12159
|
+
org_id: string;
|
|
12160
|
+
/**
|
|
12161
|
+
* @description ID of the desired Key
|
|
12162
|
+
* @example Key#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
12163
|
+
*/
|
|
12164
|
+
key_id: string;
|
|
12165
|
+
};
|
|
12166
|
+
};
|
|
12167
|
+
responses: {
|
|
12168
|
+
200: components["responses"]["KeyInfoJwt"];
|
|
12169
|
+
default: {
|
|
12170
|
+
content: {
|
|
12171
|
+
"application/json": components["schemas"]["ErrorResponse"];
|
|
12172
|
+
};
|
|
12173
|
+
};
|
|
12174
|
+
};
|
|
12175
|
+
};
|
|
11786
12176
|
/**
|
|
11787
12177
|
* List Key Roles
|
|
11788
12178
|
* @description List Key Roles
|
|
@@ -15257,7 +15647,7 @@ export interface operations {
|
|
|
15257
15647
|
};
|
|
15258
15648
|
};
|
|
15259
15649
|
responses: {
|
|
15260
|
-
200: components["responses"]["
|
|
15650
|
+
200: components["responses"]["SignResponse"];
|
|
15261
15651
|
202: {
|
|
15262
15652
|
content: {
|
|
15263
15653
|
"application/json": components["schemas"]["AcceptedResponse"];
|