@cubist-labs/cubesigner-sdk 0.4.231 → 0.4.237

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -399,7 +399,23 @@ export interface paths {
399
399
  post: operations["diffieHellmanExchange"];
400
400
  };
401
401
  "/v0/org/{org_id}/emails/{purpose}": {
402
+ /**
403
+ * Get Email Template
404
+ * @description Get Email Template
405
+ *
406
+ * Returns the email template for a given purpose.
407
+ */
408
+ get: operations["getEmailConfig"];
409
+ /**
410
+ * Configure Email Template
411
+ * @description Configure Email Template
412
+ */
402
413
  put: operations["configureEmail"];
414
+ /**
415
+ * Delete Email Template
416
+ * @description Delete Email Template
417
+ */
418
+ delete: operations["deleteEmailConfig"];
403
419
  };
404
420
  "/v0/org/{org_id}/evm/eip191/sign/{pubkey}": {
405
421
  /**
@@ -577,6 +593,23 @@ export interface paths {
577
593
  */
578
594
  post: operations["invitationAccept"];
579
595
  };
596
+ "/v0/org/{org_id}/invitations": {
597
+ /**
598
+ * List pending invitations
599
+ * @description List pending invitations
600
+ *
601
+ * Returns all pending (not yet accepted) invitations for the organization.
602
+ */
603
+ get: operations["listInvitations"];
604
+ /**
605
+ * Cancel a pending invitation
606
+ * @description Cancel a pending invitation
607
+ *
608
+ * Removes a pending invitation from the organization. If no pending invitation
609
+ * exists for the given email address, a not-found error is returned.
610
+ */
611
+ delete: operations["cancelInvitation"];
612
+ };
580
613
  "/v0/org/{org_id}/invite": {
581
614
  /**
582
615
  * Invite User
@@ -998,6 +1031,31 @@ export interface paths {
998
1031
  */
999
1032
  post: operations["invokePolicy"];
1000
1033
  };
1034
+ "/v0/org/{org_id}/policy/buckets": {
1035
+ /**
1036
+ * List Buckets
1037
+ * @description List Buckets
1038
+ *
1039
+ * List available meta information about all policy KV store buckets in the org.
1040
+ */
1041
+ get: operations["listPolicyBuckets"];
1042
+ };
1043
+ "/v0/org/{org_id}/policy/buckets/{bucket_name}": {
1044
+ /**
1045
+ * Get Bucket
1046
+ * @description Get Bucket
1047
+ *
1048
+ * Returns the meta information of a policy KV store bucket.
1049
+ */
1050
+ get: operations["getPolicyBucket"];
1051
+ /**
1052
+ * Update Bucket
1053
+ * @description Update Bucket
1054
+ *
1055
+ * Updates meta information for an existing policy KV store bucket.
1056
+ */
1057
+ patch: operations["updatePolicyBucket"];
1058
+ };
1001
1059
  "/v0/org/{org_id}/policy/import_key": {
1002
1060
  /**
1003
1061
  * Create Policy Import Key
@@ -1013,7 +1071,7 @@ export interface paths {
1013
1071
  * Get the org-wide policy secrets.
1014
1072
  * @description Get the org-wide policy secrets.
1015
1073
  *
1016
- * Note that this only returns the keys for the secrets, omiting the values.
1074
+ * Note that this only returns the keys for the secrets, omitting the values.
1017
1075
  * The values are secret and are not accessible outside Wasm policy execution.
1018
1076
  */
1019
1077
  get: operations["getPolicySecrets"];
@@ -1023,18 +1081,22 @@ export interface paths {
1023
1081
  *
1024
1082
  * The provided secrets will replace any existing org-level secrets.
1025
1083
  * It fails if the secrets weren't previously created.
1084
+ *
1085
+ * Must be permitted by the policy secret's edit policy if set, and the org's edit policy otherwise.
1026
1086
  */
1027
1087
  patch: operations["updatePolicySecrets"];
1028
1088
  };
1029
1089
  "/v0/org/{org_id}/policy/secrets/{secret_name}": {
1030
1090
  /**
1031
- * Create or overwrite an org-level policy secret
1032
- * @description Create or overwrite an org-level policy secret
1091
+ * Create or overwrite an org-level policy secret.
1092
+ * @description Create or overwrite an org-level policy secret.
1093
+ * Must be permitted by the policy secret's edit policy if set, and the org's edit policy otherwise.
1033
1094
  */
1034
1095
  put: operations["setPolicySecret"];
1035
1096
  /**
1036
- * Delete an org-level policy secret
1037
- * @description Delete an org-level policy secret
1097
+ * Delete an org-level policy secret.
1098
+ * @description Delete an org-level policy secret.
1099
+ * Must be permitted by the policy secret's edit policy if set, and the org's edit policy otherwise.
1038
1100
  */
1039
1101
  delete: operations["deletePolicySecret"];
1040
1102
  };
@@ -1205,6 +1267,13 @@ export interface paths {
1205
1267
  */
1206
1268
  delete: operations["removeUserFromRole"];
1207
1269
  };
1270
+ "/v0/org/{org_id}/rpc": {
1271
+ /**
1272
+ * High-level RPC endpoint.
1273
+ * @description High-level RPC endpoint.
1274
+ */
1275
+ post: operations["rpcApi"];
1276
+ };
1208
1277
  "/v0/org/{org_id}/session": {
1209
1278
  /**
1210
1279
  * List sessions
@@ -1520,14 +1589,6 @@ export interface paths {
1520
1589
  */
1521
1590
  patch: operations["passkeyAuthComplete"];
1522
1591
  };
1523
- "/v0/private/policy-execute/{policy_name}": {
1524
- /**
1525
- * The policy_execute API endpoint is intended to demonstrate that the signer
1526
- * @description The policy_execute API endpoint is intended to demonstrate that the signer
1527
- * can use the policy engine, by way of the PolicyEngineClient.
1528
- */
1529
- post: operations["policy-execute"];
1530
- };
1531
1592
  "/v0/user/me/fido": {
1532
1593
  /**
1533
1594
  * Initiate registration of a FIDO key
@@ -1817,8 +1878,7 @@ export interface components {
1817
1878
  */
1818
1879
  Aud: string | string[];
1819
1880
  AuditLogEntry: {
1820
- /** @description The name of the event */
1821
- event: string;
1881
+ event: components["schemas"]["OrgEventDiscriminants"];
1822
1882
  /** @description UUID of the event. Unique across all events. */
1823
1883
  event_id: string;
1824
1884
  org_id: components["schemas"]["Id"];
@@ -2640,7 +2700,7 @@ export interface components {
2640
2700
  /** @enum {string} */
2641
2701
  BadGatewayErrorCode: "Generic" | "CustomChainRpcError" | "EsploraApiError" | "SentryApiError" | "CallWebhookError" | "OAuthProviderError" | "OidcDisoveryFailed" | "OidcIssuerJwkEndpointUnavailable" | "SmtpServerUnavailable";
2642
2702
  /** @enum {string} */
2643
- BadRequestErrorCode: "GenericBadRequest" | "DisallowedAllowRuleReference" | "InvalidPaginationToken" | "InvalidEmail" | "InvalidEmailTemplate" | "QueryMetricsError" | "InvalidTelegramData" | "ValidationError" | "WebhookPolicyTimeoutOutOfBounds" | "WebhookPolicyDisallowedUrlScheme" | "WebhookPolicyDisallowedUrlHost" | "WebhookPolicyDisallowedHeaders" | "ReservedName" | "UserEmailNotConfigured" | "EmailPasswordNotFound" | "PasswordAuthNotAllowedByInvitation" | "OneTimeCodeExpired" | "InvalidBody" | "InvalidJwt" | "InvitationNoLongerValid" | "TokenRequestError" | "InvalidMfaReceipt" | "InvalidMfaPolicyCount" | "InvalidMfaPolicyNumAuthFactors" | "InvalidMfaPolicyNumAllowedApprovers" | "InvalidMfaPolicyGracePeriodTooLong" | "InvalidBabylonStakingPolicyParams" | "InvalidSuiTxReceiversEmptyAllowlist" | "InvalidBtcTxReceiversEmptyAllowlist" | "InvalidRequireRoleSessionAllowlist" | "InvalidCreateKeyCount" | "InvalidDiffieHellmanCount" | "OrgInviteExistingUser" | "OrgUserAlreadyExists" | "OrgNameTaken" | "KwkNotFoundInRegion" | "OrgIsNotOrgExport" | "RoleNameTaken" | "PolicyNameTaken" | "NameTaken" | "ContactNameInvalid" | "ContactAddressesInvalid" | "ContactLabelInvalid" | "ContactModified" | "PolicyNotFound" | "PolicyVersionNotFound" | "PolicyRuleDisallowedByType" | "PolicyTypeDisallowed" | "PolicyDuplicateError" | "PolicyStillAttached" | "PolicyModified" | "PolicyNotAttached" | "AddKeyToRoleCountTooHigh" | "InvalidKeyId" | "InvalidTimeLockAlreadyInThePast" | "InvalidRestrictedScopes" | "InvalidUpdate" | "InvalidMetadataLength" | "InvalidLength" | "InvalidKeyMaterialId" | "KeyNotFound" | "SiweChallengeNotFound" | "SiweInvalidRequest" | "UserExportDerivedKey" | "UserExportPublicKeyInvalid" | "NistP256PublicKeyInvalid" | "UnableToAccessSmtpRelay" | "UserExportInProgress" | "RoleNotFound" | "InvalidRoleNameOrId" | "InvalidMfaReceiptOrgIdMissing" | "InvalidMfaReceiptInvalidOrgId" | "MfaRequestNotFound" | "InvalidKeyType" | "InvalidKeyMaterial" | "InvalidHexValue" | "InvalidBase32Value" | "InvalidBase58Value" | "InvalidSs58Value" | "InvalidForkVersionLength" | "InvalidEthAddress" | "InvalidStellarAddress" | "InvalidOrgNameOrId" | "InvalidUpdateOrgRequestDisallowedMfaType" | "InvalidUpdateOrgRequestEmptyAllowedMfaTypes" | "EmailOtpDelayTooShortForRegisterMfa" | "InvalidStakeDeposit" | "InvalidBlobSignRequest" | "InvalidDiffieHellmanRequest" | "InvalidSolanaSignRequest" | "InvalidEip712SignRequest" | "OnlySpecifyOne" | "NoOidcDataInProof" | "InvalidEvmSignRequest" | "InvalidEth2SignRequest" | "InvalidDeriveKeyRequest" | "InvalidStakingAmount" | "CustomStakingAmountNotAllowedForWrapperContract" | "InvalidUnstakeRequest" | "InvalidCreateUserRequest" | "UserAlreadyExists" | "IdpUserAlreadyExists" | "CognitoUserAlreadyOrgMember" | "UserNotFound" | "UserWithEmailNotFound" | "PolicyKeyMismatch" | "EmptyScopes" | "InvalidScopesForRoleSession" | "InvalidLifetime" | "NoSingleKeyForUser" | "InvalidOrgPolicyRule" | "SourceIpAllowlistEmpty" | "LimitWindowTooLong" | "Erc20ContractDisallowed" | "EmptyRuleError" | "OptionalListEmpty" | "MultipleExclusiveFieldsProvided" | "DuplicateFieldEntry" | "InvalidRange" | "InvalidOrgPolicyRepeatedRule" | "InvalidSuiTransaction" | "SuiSenderMismatch" | "AvaSignHashError" | "AvaSignError" | "BtcSegwitHashError" | "BtcTaprootHashError" | "BtcSignError" | "TaprootSignError" | "Eip712SignError" | "InvalidMemberRoleInUserAdd" | "InvalidMemberRoleInRecipientAdd" | "ThirdPartyUserAlreadyExists" | "OidcIdentityAlreadyExists" | "UserAlreadyHasIdentity" | "ThirdPartyUserNotFound" | "DeleteOidcUserError" | "DeleteUserError" | "SessionRoleMismatch" | "InvalidOidcToken" | "InvalidOidcIdentity" | "OidcIssuerUnsupported" | "OidcIssuerNotAllowed" | "OidcIssuerNoApplicableJwk" | "FidoKeyAlreadyRegistered" | "FidoKeySignCountTooLow" | "FidoVerificationFailed" | "FidoChallengeMfaMismatch" | "UnsupportedLegacyCognitoSession" | "InvalidIdentityProof" | "PaginationDataExpired" | "ExistingKeysViolateExclusiveKeyAccess" | "ExportDelayTooShort" | "ExportWindowTooLong" | "InvalidTotpFailureLimit" | "InvalidEip191SignRequest" | "CannotResendUserInvitation" | "InvalidNotificationEndpointCount" | "CannotDeletePendingSubscription" | "InvalidNotificationUrlProtocol" | "EmptyOneOfOrgEventFilter" | "EmptyAllExceptOrgEventFilter" | "InvalidTapNodeHash" | "InvalidOneTimeCode" | "MessageNotFound" | "MessageAlreadySigned" | "MessageRejected" | "MessageReplaced" | "InvalidMessageType" | "EmptyAddress" | "InvalidEth2SigningPolicySlotRange" | "InvalidEth2SigningPolicyEpochRange" | "InvalidEth2SigningPolicyTimestampRange" | "InvalidEth2SigningPolicyOverlappingRule" | "RpcUrlMissing" | "MmiChainIdMissing" | "EthersInvalidRpcUrl" | "EthersGetTransactionCountError" | "InvalidPassword" | "BabylonStakingFeePlusDustOverflow" | "BabylonStaking" | "BabylonStakingIncorrectKey" | "BabylonStakingSegwitNonDeposit" | "BabylonStakingRegistrationRequiresTaproot" | "PsbtSigning" | "TooManyResets" | "TooManyRequests" | "TooManyFailedLogins" | "BadBtcMessageSignP2shFlag" | "InvalidTendermintRequest" | "PolicyVersionMaxReached" | "PolicyVersionInvalid" | "PolicySecretLimitReached" | "PolicySecretTooLarge" | "InvalidImportKey" | "AlienOwnerInvalid" | "EmptyUpdateRequest" | "InvalidPolicyReference" | "PolicyEngineDisabled" | "InvalidWasmPolicy" | "InvalidPolicy" | "RedundantDerivationPath" | "ImportKeyMissing" | "InvalidAbiMethods" | "BabylonCovSign" | "InvalidPolicyLogsRequest" | "UserProfileMigrationMultipleEntries" | "UserProfileMigrationTooManyItems" | "InputTooShort" | "InvalidTweakLength" | "InvalidCustomChains";
2703
+ BadRequestErrorCode: "GenericBadRequest" | "DisallowedAllowRuleReference" | "InvalidPaginationToken" | "InvalidEmail" | "InvalidEmailTemplate" | "QueryMetricsError" | "InvalidTelegramData" | "ValidationError" | "WebhookPolicyTimeoutOutOfBounds" | "WebhookPolicyDisallowedUrlScheme" | "WebhookPolicyDisallowedUrlHost" | "WebhookPolicyDisallowedHeaders" | "ReservedName" | "UserEmailNotConfigured" | "EmailPasswordNotFound" | "PasswordAuthNotAllowedByInvitation" | "OneTimeCodeExpired" | "InvalidBody" | "InvalidJwt" | "InvitationNoLongerValid" | "TokenRequestError" | "InvalidMfaReceipt" | "InvalidMfaPolicyCount" | "InvalidMfaPolicyNumAuthFactors" | "InvalidMfaPolicyNumAllowedApprovers" | "InvalidMfaPolicyGracePeriodTooLong" | "InvalidBabylonStakingPolicyParams" | "InvalidSuiTxReceiversEmptyAllowlist" | "InvalidBtcTxReceiversEmptyAllowlist" | "InvalidRequireRoleSessionAllowlist" | "InvalidCreateKeyCount" | "InvalidDiffieHellmanCount" | "OrgInviteExistingUser" | "OrgUserAlreadyExists" | "OrgNameTaken" | "KwkNotFoundInRegion" | "OrgIsNotOrgExport" | "RoleNameTaken" | "PolicyNameTaken" | "NameTaken" | "ContactNameInvalid" | "ContactAddressesInvalid" | "ContactLabelInvalid" | "ContactModified" | "PolicyNotFound" | "PolicyVersionNotFound" | "PolicyRuleDisallowedByType" | "PolicyTypeDisallowed" | "PolicyDuplicateError" | "PolicyStillAttached" | "PolicyModified" | "PolicyNotAttached" | "AddKeyToRoleCountTooHigh" | "InvalidKeyId" | "InvalidTimeLockAlreadyInThePast" | "InvalidRestrictedScopes" | "InvalidUpdate" | "InvalidMetadataLength" | "InvalidLength" | "InvalidKeyMaterialId" | "KeyNotFound" | "SiweChallengeNotFound" | "SiweInvalidRequest" | "UserExportDerivedKey" | "UserExportPublicKeyInvalid" | "NistP256PublicKeyInvalid" | "UnableToAccessSmtpRelay" | "UserExportInProgress" | "RoleNotFound" | "InvalidRoleNameOrId" | "InvalidMfaReceiptOrgIdMissing" | "InvalidMfaReceiptInvalidOrgId" | "MfaRequestNotFound" | "InvalidKeyType" | "InvalidKeyMaterial" | "InvalidHexValue" | "InvalidBase32Value" | "InvalidBase58Value" | "InvalidSs58Value" | "InvalidForkVersionLength" | "InvalidEthAddress" | "InvalidStellarAddress" | "InvalidOrgNameOrId" | "InvalidUpdateOrgRequestDisallowedMfaType" | "InvalidUpdateOrgRequestEmptyAllowedMfaTypes" | "EmailOtpDelayTooShortForRegisterMfa" | "InvalidStakeDeposit" | "InvalidBlobSignRequest" | "InvalidDiffieHellmanRequest" | "InvalidSolanaSignRequest" | "InvalidEip712SignRequest" | "OnlySpecifyOne" | "NoOidcDataInProof" | "InvalidEvmSignRequest" | "InvalidEth2SignRequest" | "InvalidDeriveKeyRequest" | "InvalidStakingAmount" | "CustomStakingAmountNotAllowedForWrapperContract" | "InvalidUnstakeRequest" | "InvalidCreateUserRequest" | "UserAlreadyExists" | "IdpUserAlreadyExists" | "CognitoUserAlreadyOrgMember" | "UserNotFound" | "UserWithEmailNotFound" | "PolicyKeyMismatch" | "EmptyScopes" | "InvalidScopesForRoleSession" | "InvalidLifetime" | "NoSingleKeyForUser" | "InvalidOrgPolicyRule" | "SourceIpAllowlistEmpty" | "LimitWindowTooLong" | "Erc20ContractDisallowed" | "EmptyRuleError" | "OptionalListEmpty" | "MultipleExclusiveFieldsProvided" | "DuplicateFieldEntry" | "InvalidRange" | "InvalidOrgPolicyRepeatedRule" | "InvalidSuiTransaction" | "SuiSenderMismatch" | "AvaSignHashError" | "AvaSignError" | "BtcSegwitHashError" | "BtcTaprootHashError" | "BtcSignError" | "TaprootSignError" | "Eip712SignError" | "InvalidMemberRoleInUserAdd" | "InvalidMemberRoleInRecipientAdd" | "ThirdPartyUserAlreadyExists" | "OidcIdentityAlreadyExists" | "UserAlreadyHasIdentity" | "ThirdPartyUserNotFound" | "DeleteOidcUserError" | "DeleteUserError" | "SessionRoleMismatch" | "InvalidOidcToken" | "InvalidOidcIdentity" | "OidcIssuerUnsupported" | "OidcIssuerNotAllowed" | "OidcIssuerNoApplicableJwk" | "FidoKeyAlreadyRegistered" | "FidoKeySignCountTooLow" | "FidoVerificationFailed" | "FidoChallengeMfaMismatch" | "UnsupportedLegacyCognitoSession" | "InvalidIdentityProof" | "PaginationDataExpired" | "ExistingKeysViolateExclusiveKeyAccess" | "ExportDelayTooShort" | "ExportWindowTooLong" | "InvalidTotpFailureLimit" | "InvalidEip191SignRequest" | "CannotResendUserInvitation" | "InvalidNotificationEndpointCount" | "CannotDeletePendingSubscription" | "InvalidNotificationUrlProtocol" | "EmptyOneOfOrgEventFilter" | "EmptyAllExceptOrgEventFilter" | "InvalidTapNodeHash" | "InvalidOneTimeCode" | "MessageNotFound" | "MessageAlreadySigned" | "MessageRejected" | "MessageReplaced" | "InvalidMessageType" | "EmptyAddress" | "InvalidEth2SigningPolicySlotRange" | "InvalidEth2SigningPolicyEpochRange" | "InvalidEth2SigningPolicyTimestampRange" | "InvalidEth2SigningPolicyOverlappingRule" | "RpcUrlMissing" | "MmiChainIdMissing" | "EthersInvalidRpcUrl" | "EthersGetTransactionCountError" | "InvalidPassword" | "BabylonStakingFeePlusDustOverflow" | "BabylonStaking" | "BabylonStakingIncorrectKey" | "BabylonStakingSegwitNonDeposit" | "BabylonStakingRegistrationRequiresTaproot" | "PsbtSigning" | "TooManyResets" | "TooManyRequests" | "TooManyFailedLogins" | "BadBtcMessageSignP2shFlag" | "InvalidTendermintRequest" | "PolicyVersionMaxReached" | "PolicyVersionInvalid" | "PolicySecretLimitReached" | "PolicySecretTooLarge" | "InvalidImportKey" | "AlienOwnerInvalid" | "EmptyUpdateRequest" | "InvalidPolicyReference" | "PolicyEngineDisabled" | "InvalidWasmPolicy" | "InvalidPolicy" | "RedundantDerivationPath" | "ImportKeyMissing" | "InvalidAbiMethods" | "BabylonCovSign" | "InvalidPolicyLogsRequest" | "UserProfileMigrationMultipleEntries" | "UserProfileMigrationTooManyItems" | "InputTooShort" | "InvalidTweakLength" | "InvalidCustomChains" | "InvalidRpcRequest";
2644
2704
  BillingArgs: {
2645
2705
  billing_org: components["schemas"]["Id"];
2646
2706
  event_type: components["schemas"]["BillingEvent"];
@@ -2657,7 +2717,7 @@ export interface components {
2657
2717
  * @description Billing event types.
2658
2718
  * @enum {string}
2659
2719
  */
2660
- BillingEvent: "Mmi" | "MmiMessageGet" | "MmiMessageList" | "MmiMessageSign" | "MmiMessageReject" | "MmiMessageDelete" | "AboutMe" | "UserResetEmailInit" | "UserResetEmailComplete" | "UserDeleteTotp" | "UserResetTotpInit" | "UserResetTotpComplete" | "UserVerifyTotp" | "UserRegisterFidoInit" | "UserRegisterFidoComplete" | "UserDeleteFido" | "CreateProofOidc" | "CreateProofCubeSigner" | "VerifyProof" | "AddOidcIdentity" | "RemoveOidcIdentity" | "ListOidcIdentities" | "GetOrg" | "UpdateOrg" | "GetOrgExport" | "CreateOrg" | "ListKeys" | "AttestKey" | "GetKey" | "GetKeyByMaterialId" | "ListKeyRoles" | "UpdateKey" | "ListHistoricalKeyTx" | "Invite" | "ListUsers" | "GetUser" | "GetUserByEmail" | "GetUserByOidc" | "UpdateMembership" | "ResetMemberMfa" | "CompleteResetMemberMfa" | "CreateRole" | "AttestRole" | "GetRole" | "ListTokenKeys" | "ListRoles" | "GetRoleKey" | "ListRoleKeys" | "ListRoleUsers" | "UpdateRole" | "DeleteRole" | "ConfigureEmail" | "ListHistoricalRoleTx" | "CreatePolicy" | "GetPolicy" | "ListPolicies" | "DeletePolicy" | "UpdatePolicy" | "InvokePolicy" | "GetPolicyLogs" | "UploadWasmPolicy" | "GetPolicySecrets" | "UpdatePolicySecrets" | "SetPolicySecret" | "DeletePolicySecret" | "CreatePolicyImportKey" | "UserExportDelete" | "UserExportList" | "UserExportInit" | "UserExportComplete" | "AddUserToRole" | "RemoveUserFromRole" | "MfaApproveCs" | "MfaRejectCs" | "MfaGet" | "MfaList" | "AddKeysToRole" | "RemoveKeyFromRole" | "CreateToken" | "CreateSession" | "RevokeSession" | "RevokeCurrentSession" | "RevokeSessions" | "ListSessions" | "GetSession" | "SignerSessionRefresh" | "MfaApproveTotp" | "MfaRejectTotp" | "MfaFidoInit" | "MfaApproveFidoComplete" | "MfaRejectFidoComplete" | "MfaEmailInit" | "MfaEmailComplete" | "Cube3signerHeartbeat" | "CreateContact" | "GetContact" | "ListContacts" | "DeleteContact" | "UpdateContact" | "LookupContactsByAddress" | "QueryMetrics" | "QueryAuditLog" | "Counts" | "CreateKey" | "ImportKey" | "CreateKeyImportKey" | "DeriveKey" | "DeleteKey" | "AvaSign" | "AvaSerializedTxSign" | "BabylonRegistration" | "BabylonStaking" | "BabylonCovSign" | "BlobSign" | "BtcMessageSign" | "BtcSign" | "DiffieHellmanExchange" | "PsbtSign" | "PsbtLegacyInputSign" | "PsbtSegwitInputSign" | "PsbtTaprootInputSign" | "TaprootSign" | "Eip712Sign" | "Eip191Sign" | "Eth1Sign" | "Eth2Sign" | "SolanaSign" | "SuiSign" | "TendermintSign" | "Stake" | "Unstake" | "PasskeyAuthInit" | "PasskeyAuthComplete" | "OidcAuth" | "Oauth2Twitter" | "OAuth2TokenRefresh" | "EmailOtpAuth" | "SiweInit" | "SiweComplete" | "TelegramAuth" | "CreateOidcUser" | "DeleteOidcUser" | "DeleteUser" | "CreateEotsNonces" | "EotsSign" | "AuthMigrationIdentityAdd" | "AuthMigrationIdentityRemove" | "AuthMigrationUserUpdate" | "KeyCreated" | "KeyImported" | "InvitationAccept" | "IdpAuthenticate" | "IdpPasswordResetRequest" | "IdpPasswordResetConfirm" | "CustomChainRpcCall" | "EsploraApiCall" | "ExecutePolicy" | "SentryApiCall" | "SentryApiCallPublic" | "MmiJwkSet" | "AttestationJwkSet" | "UserOrgs" | "PublicOrgInfo" | "EmailMyOrgs";
2720
+ BillingEvent: "Mmi" | "MmiMessageGet" | "MmiMessageList" | "MmiMessageSign" | "MmiMessageReject" | "MmiMessageDelete" | "AboutMe" | "UserResetEmailInit" | "UserResetEmailComplete" | "UserDeleteTotp" | "UserResetTotpInit" | "UserResetTotpComplete" | "UserVerifyTotp" | "UserRegisterFidoInit" | "UserRegisterFidoComplete" | "UserDeleteFido" | "CreateProofOidc" | "CreateProofCubeSigner" | "VerifyProof" | "AddOidcIdentity" | "RemoveOidcIdentity" | "ListOidcIdentities" | "GetOrg" | "UpdateOrg" | "GetOrgExport" | "CreateOrg" | "ListKeys" | "AttestKey" | "GetKey" | "GetKeyByMaterialId" | "ListKeyRoles" | "UpdateKey" | "ListHistoricalKeyTx" | "Invite" | "CancelInvitation" | "ListInvitations" | "ListUsers" | "GetUser" | "GetUserByEmail" | "GetUserByOidc" | "UpdateMembership" | "ResetMemberMfa" | "CompleteResetMemberMfa" | "CreateRole" | "AttestRole" | "GetRole" | "ListTokenKeys" | "ListRoles" | "GetRoleKey" | "ListRoleKeys" | "ListRoleUsers" | "UpdateRole" | "DeleteRole" | "ConfigureEmail" | "GetEmailConfig" | "DeleteEmailConfig" | "ListHistoricalRoleTx" | "CreatePolicy" | "GetPolicy" | "ListPolicies" | "DeletePolicy" | "UpdatePolicy" | "InvokePolicy" | "GetPolicyLogs" | "UploadWasmPolicy" | "GetPolicySecrets" | "UpdatePolicySecrets" | "SetPolicySecret" | "DeletePolicySecret" | "CreatePolicyImportKey" | "GetPolicyBucket" | "ListPolicyBuckets" | "UpdatePolicyBucket" | "UserExportDelete" | "UserExportList" | "UserExportInit" | "UserExportComplete" | "AddUserToRole" | "RemoveUserFromRole" | "MfaApproveCs" | "MfaRejectCs" | "MfaGet" | "MfaList" | "AddKeysToRole" | "RemoveKeyFromRole" | "CreateToken" | "CreateSession" | "RevokeSession" | "RevokeCurrentSession" | "RevokeSessions" | "ListSessions" | "GetSession" | "SignerSessionRefresh" | "MfaApproveTotp" | "MfaRejectTotp" | "MfaFidoInit" | "MfaApproveFidoComplete" | "MfaRejectFidoComplete" | "MfaEmailInit" | "MfaEmailComplete" | "Cube3signerHeartbeat" | "CreateContact" | "GetContact" | "ListContacts" | "DeleteContact" | "UpdateContact" | "LookupContactsByAddress" | "QueryMetrics" | "QueryAuditLog" | "Counts" | "CreateKey" | "ImportKey" | "CreateKeyImportKey" | "DeriveKey" | "DeleteKey" | "AvaSign" | "AvaSerializedTxSign" | "BabylonRegistration" | "BabylonStaking" | "BabylonCovSign" | "BlobSign" | "BtcMessageSign" | "BtcSign" | "DiffieHellmanExchange" | "PsbtSign" | "PsbtLegacyInputSign" | "PsbtSegwitInputSign" | "PsbtTaprootInputSign" | "TaprootSign" | "Eip712Sign" | "Eip191Sign" | "Eth1Sign" | "Eth2Sign" | "SolanaSign" | "SuiSign" | "TendermintSign" | "Stake" | "Unstake" | "PasskeyAuthInit" | "PasskeyAuthComplete" | "OidcAuth" | "Oauth2Twitter" | "OAuth2TokenRefresh" | "EmailOtpAuth" | "SiweInit" | "SiweComplete" | "TelegramAuth" | "CreateOidcUser" | "DeleteOidcUser" | "DeleteUser" | "CreateEotsNonces" | "EotsSign" | "AuthMigrationIdentityAdd" | "AuthMigrationIdentityRemove" | "AuthMigrationUserUpdate" | "KeyCreated" | "KeyImported" | "InvitationAccept" | "IdpAuthenticate" | "IdpPasswordResetRequest" | "IdpPasswordResetConfirm" | "RpcApi" | "RpcCreateTransaction" | "RpcGetTransaction" | "RpcListTransactions" | "CustomChainRpcCall" | "EsploraApiCall" | "SentryApiCall" | "SentryApiCallPublic" | "MmiJwkSet" | "AttestationJwkSet" | "UserOrgs" | "PublicOrgInfo" | "EmailMyOrgs";
2661
2721
  /** @description A bitcoin address and its network. */
2662
2722
  BitcoinAddressInfo: {
2663
2723
  /**
@@ -2882,6 +2942,52 @@ export interface components {
2882
2942
  */
2883
2943
  value: number;
2884
2944
  };
2945
+ /**
2946
+ * @description The access-controlled actions that can be performed on a bucket
2947
+ * @enum {string}
2948
+ */
2949
+ BucketAction: "read:key:value" | "read:key:exists" | "update:key:value" | "delete:key:value" | "scan:keys" | "update:bucket:owner" | "update:bucket:acl" | "update:bucket:metadata";
2950
+ /** @description Information about a policy KV store bucket. */
2951
+ BucketInfo: ({
2952
+ created?: components["schemas"]["EpochDateTime"] | null;
2953
+ last_modified?: components["schemas"]["EpochDateTime"] | null;
2954
+ /**
2955
+ * Format: int64
2956
+ * @description Version of this object
2957
+ */
2958
+ version?: number;
2959
+ } & {
2960
+ /** @description The access-control entries for the bucket. */
2961
+ acl?: unknown[] | null;
2962
+ /** @description Arbitrary user-defined metadata. */
2963
+ metadata?: unknown;
2964
+ owner: components["schemas"]["Id"];
2965
+ }) & {
2966
+ /** @description The name of the bucket. */
2967
+ name: string;
2968
+ };
2969
+ /**
2970
+ * @description Sub-entity of org where per-bucket metadata (like ACL) is stored.
2971
+ * The [Id] of a [BucketMeta] must be the bucket name.
2972
+ */
2973
+ BucketMeta: {
2974
+ created?: components["schemas"]["EpochDateTime"] | null;
2975
+ last_modified?: components["schemas"]["EpochDateTime"] | null;
2976
+ /**
2977
+ * Format: int64
2978
+ * @description Version of this object
2979
+ */
2980
+ version?: number;
2981
+ } & {
2982
+ /** @description The access-control entries for the bucket. */
2983
+ acl?: unknown[] | null;
2984
+ /** @description Arbitrary user-defined metadata. */
2985
+ metadata?: unknown;
2986
+ owner: components["schemas"]["Id"];
2987
+ };
2988
+ CancelInvitationRequest: {
2989
+ email: components["schemas"]["Email"];
2990
+ };
2885
2991
  /**
2886
2992
  * @description Supported Canton environments.
2887
2993
  * @enum {string}
@@ -3135,6 +3241,36 @@ export interface components {
3135
3241
  */
3136
3242
  name: string;
3137
3243
  };
3244
+ /** @description Parameters for creating an EVM transaction. */
3245
+ CreateEvmTransactionRequest: components["schemas"]["CreateEvmTransferRequest"] & {
3246
+ /** @enum {string} */
3247
+ type: "Transfer";
3248
+ };
3249
+ /** @description Parameters for creating an EVM transfer. */
3250
+ CreateEvmTransferRequest: {
3251
+ token: "CreateEvmTransferRequest";
3252
+ } & Omit<components["schemas"]["EvmToken"], "token"> & components["schemas"]["EvmTxCustomization"] & {
3253
+ /**
3254
+ * Format: int64
3255
+ * @description The EVM chain id this transaction is for.
3256
+ */
3257
+ chain_id: number;
3258
+ /**
3259
+ * @description The address that the amount will be transferred from.
3260
+ *
3261
+ * Must match the material id of a key the session can access.
3262
+ */
3263
+ from: string;
3264
+ /** @description The address that the amount will be transferred to. */
3265
+ to: string;
3266
+ /**
3267
+ * @description The amount being transferred, as a hex value.
3268
+ *
3269
+ * This value should be in WEI for native transfers, and in the token's denomination
3270
+ * for ERC-20 transfers.
3271
+ */
3272
+ value: string;
3273
+ };
3138
3274
  CreateKeyImportKeyResponse: components["schemas"]["KeyImportKey"] & {
3139
3275
  /**
3140
3276
  * @description An attestation document from a secure enclave, including an
@@ -3293,6 +3429,13 @@ export interface components {
3293
3429
  */
3294
3430
  scopes?: components["schemas"]["Scope"][] | null;
3295
3431
  };
3432
+ /** @description Parameters for the [`cs_createTransaction`](RpcMethod::CreateTransaction) method. */
3433
+ CreateTransactionRequest: {
3434
+ type: "CreateTransactionRequest";
3435
+ } & Omit<components["schemas"]["CreateEvmTransactionRequest"], "type"> & {
3436
+ /** @enum {string} */
3437
+ chain: "Evm";
3438
+ };
3296
3439
  /**
3297
3440
  * @description An extended form of `PublicKeyCredentialCreationOptions` that allows clients to derive the WebAuthn challenge
3298
3441
  * from a structured preimage.
@@ -4035,6 +4178,33 @@ export interface components {
4035
4178
  */
4036
4179
  rpc_url: string;
4037
4180
  };
4181
+ /** @description An EVM token. */
4182
+ EvmToken: {
4183
+ /** @enum {string} */
4184
+ token: "Native";
4185
+ } | {
4186
+ /** @enum {string} */
4187
+ token: "Erc20";
4188
+ /** @description The ERC-20 token address. */
4189
+ token_address: string;
4190
+ };
4191
+ /** @description EVM-specific transaction details. */
4192
+ EvmTransactionDetails: {
4193
+ /**
4194
+ * @description The transaction hash, as submitted to the chain.
4195
+ *
4196
+ * Can be undefined if the transaction hasn't been signed or submitted yet.
4197
+ */
4198
+ hash?: string;
4199
+ /**
4200
+ * @description The signature for the transaction.
4201
+ *
4202
+ * Can be undefined if the transaction hasn't been signed yet, or failed to be signed.
4203
+ */
4204
+ signature?: string;
4205
+ /** @description The transaction itself. */
4206
+ tx: unknown;
4207
+ };
4038
4208
  EvmTxCmp: {
4039
4209
  /**
4040
4210
  * Format: int64
@@ -4060,6 +4230,34 @@ export interface components {
4060
4230
  /** @description Whether the 'nonce' property of the EVM transaction is allowed to be different. */
4061
4231
  ignore_nonce?: boolean;
4062
4232
  };
4233
+ /** @description Optional fields used to customize EVM transactions. */
4234
+ EvmTxCustomization: {
4235
+ /**
4236
+ * @description Optional gas limit.
4237
+ *
4238
+ * If not specified, estimated gas is used.
4239
+ */
4240
+ gas_limit?: string | null;
4241
+ /**
4242
+ * @description Optional max fee for the transaction.
4243
+ *
4244
+ * If not specified, estimated fees are used.
4245
+ */
4246
+ max_fee_per_gas?: string | null;
4247
+ /**
4248
+ * @description Optional max priority fee for the transaction.
4249
+ *
4250
+ * If not specified, estimated fees are used.
4251
+ */
4252
+ max_priority_fee_per_gas?: string | null;
4253
+ /**
4254
+ * @description Optional nonce.
4255
+ *
4256
+ * If not specified, the sender's transaction count from the latest block is
4257
+ * used.
4258
+ */
4259
+ nonce?: string | null;
4260
+ };
4063
4261
  /** @enum {string} */
4064
4262
  EvmTxDepositErrorCode: "EvmTxDepositReceiverMismatch" | "EvmTxDepositEmptyData" | "EvmTxDepositEmptyChainId" | "EvmTxDepositEmptyReceiver" | "EvmTxDepositUnexpectedValue" | "EvmTxDepositUnexpectedDataLength" | "EvmTxDepositNoAbi" | "EvmTxDepositNoDepositFunction" | "EvmTxDepositUnexpectedFunctionName" | "EvmTxDepositUnexpectedValidatorKey" | "EvmTxDepositInvalidValidatorKey" | "EvmTxDepositMissingDepositArg" | "EvmTxDepositWrongDepositArgType" | "EvmTxDepositValidatorKeyNotInRole" | "EvmTxDepositUnexpectedWithdrawalCredentials" | "EvmTxDepositUnresolvedRole" | "EvmTxDepositInvalidDepositEncoding";
4065
4263
  /**
@@ -4072,7 +4270,7 @@ export interface components {
4072
4270
  * @description Explicitly named scopes for accessing CubeSigner APIs
4073
4271
  * @enum {string}
4074
4272
  */
4075
- ExplicitScope: "sign:*" | "sign:ava" | "sign:blob" | "sign:diffieHellman" | "sign:btc:*" | "sign:btc:segwit" | "sign:btc:taproot" | "sign:btc:psbt:*" | "sign:btc:psbt:doge" | "sign:btc:psbt:legacy" | "sign:btc:psbt:segwit" | "sign:btc:psbt:taproot" | "sign:btc:psbt:ltcSegwit" | "sign:btc:message:*" | "sign:btc:message:segwit" | "sign:btc:message:legacy" | "sign:babylon:*" | "sign:babylon:eots:*" | "sign:babylon:eots:nonces" | "sign:babylon:eots:sign" | "sign:babylon:staking:*" | "sign:babylon:staking:deposit" | "sign:babylon:staking:unbond" | "sign:babylon:staking:withdraw" | "sign:babylon:staking:slash" | "sign:babylon:registration" | "sign:babylon:covenant" | "sign:evm:*" | "sign:evm:tx" | "sign:evm:eip191" | "sign:evm:eip712" | "sign:eth2:*" | "sign:eth2:validate" | "sign:eth2:stake" | "sign:eth2:unstake" | "sign:solana" | "sign:sui" | "sign:tendermint" | "sign:mmi" | "manage:*" | "manage:readonly" | "manage:email" | "manage:mfa:*" | "manage:mfa:readonly" | "manage:mfa:list" | "manage:mfa:vote:*" | "manage:mfa:vote:cs" | "manage:mfa:vote:email" | "manage:mfa:vote:fido" | "manage:mfa:vote:totp" | "manage:mfa:register:*" | "manage:mfa:register:fido" | "manage:mfa:register:totp" | "manage:mfa:register:email" | "manage:mfa:unregister:*" | "manage:mfa:unregister:fido" | "manage:mfa:unregister:totp" | "manage:mfa:verify:*" | "manage:mfa:verify:totp" | "manage:key:*" | "manage:key:readonly" | "manage:key:get" | "manage:key:attest" | "manage:key:listRoles" | "manage:key:list" | "manage:key:history:tx:list" | "manage:key:create" | "manage:key:import" | "manage:key:update:*" | "manage:key:update:owner" | "manage:key:update:policy" | "manage:key:update:enabled" | "manage:key:update:metadata" | "manage:key:update:editPolicy" | "manage:key:delete" | "manage:policy:*" | "manage:policy:readonly" | "manage:policy:create" | "manage:policy:get" | "manage:policy:list" | "manage:policy:delete" | "manage:policy:update:*" | "manage:policy:update:owner" | "manage:policy:update:name" | "manage:policy:update:acl" | "manage:policy:update:editPolicy" | "manage:policy:update:metadata" | "manage:policy:update:rule" | "manage:policy:invoke" | "manage:policy:wasm:*" | "manage:policy:wasm:upload" | "manage:policy:secrets:*" | "manage:policy:secrets:get" | "manage:policy:secrets:update:*" | "manage:policy:secrets:update:values" | "manage:policy:secrets:update:acl" | "manage:policy:secrets:update:editPolicy" | "manage:contact:*" | "manage:contact:readonly" | "manage:contact:create" | "manage:contact:get" | "manage:contact:list" | "manage:contact:delete" | "manage:contact:update:*" | "manage:contact:update:name" | "manage:contact:update:addresses" | "manage:contact:update:owner" | "manage:contact:update:labels" | "manage:contact:update:metadata" | "manage:contact:update:editPolicy" | "manage:contact:lookup:*" | "manage:contact:lookup:address" | "manage:policy:createImportKey" | "manage:role:*" | "manage:role:readonly" | "manage:role:create" | "manage:role:delete" | "manage:role:get:*" | "manage:role:attest" | "manage:role:get:keys" | "manage:role:get:keys:list" | "manage:role:get:keys:get" | "manage:role:get:users" | "manage:role:list" | "manage:role:update:*" | "manage:role:update:enabled" | "manage:role:update:policy" | "manage:role:update:editPolicy" | "manage:role:update:key:*" | "manage:role:update:key:add" | "manage:role:update:key:remove" | "manage:role:update:user:*" | "manage:role:update:user:add" | "manage:role:update:user:remove" | "manage:role:history:tx:list" | "manage:identity:*" | "manage:identity:readonly" | "manage:identity:verify" | "manage:identity:add" | "manage:identity:remove" | "manage:identity:list" | "manage:org:*" | "manage:org:create" | "manage:org:metrics:query" | "manage:org:audit:query" | "manage:org:readonly" | "manage:org:addUser" | "manage:org:inviteUser" | "manage:org:inviteAlien" | "manage:org:updateMembership" | "manage:org:listUsers" | "manage:org:user:get" | "manage:org:deleteUser" | "manage:org:get" | "manage:org:user:resetMfa" | "manage:session:*" | "manage:session:readonly" | "manage:session:get" | "manage:session:list" | "manage:session:create" | "manage:session:extend" | "manage:session:revoke" | "manage:export:*" | "manage:export:readonly" | "manage:export:org:*" | "manage:export:org:get" | "manage:export:user:*" | "manage:export:user:delete" | "manage:export:user:list" | "manage:authMigration:*" | "manage:authMigration:identity:add" | "manage:authMigration:identity:remove" | "manage:authMigration:user:update" | "manage:mmi:*" | "manage:mmi:readonly" | "manage:mmi:get" | "manage:mmi:list" | "manage:mmi:reject" | "manage:mmi:delete" | "export:*" | "export:user:*" | "export:user:init" | "export:user:complete" | "mmi:*" | "orgAccess:*" | "orgAccess:child:*";
4273
+ ExplicitScope: "sign:*" | "sign:ava" | "sign:blob" | "sign:diffieHellman" | "sign:btc:*" | "sign:btc:segwit" | "sign:btc:taproot" | "sign:btc:psbt:*" | "sign:btc:psbt:doge" | "sign:btc:psbt:legacy" | "sign:btc:psbt:segwit" | "sign:btc:psbt:taproot" | "sign:btc:psbt:ltcSegwit" | "sign:btc:message:*" | "sign:btc:message:segwit" | "sign:btc:message:legacy" | "sign:babylon:*" | "sign:babylon:eots:*" | "sign:babylon:eots:nonces" | "sign:babylon:eots:sign" | "sign:babylon:staking:*" | "sign:babylon:staking:deposit" | "sign:babylon:staking:unbond" | "sign:babylon:staking:withdraw" | "sign:babylon:staking:slash" | "sign:babylon:registration" | "sign:babylon:covenant" | "sign:evm:*" | "sign:evm:tx" | "sign:evm:eip191" | "sign:evm:eip712" | "sign:eth2:*" | "sign:eth2:validate" | "sign:eth2:stake" | "sign:eth2:unstake" | "sign:solana" | "sign:sui" | "sign:tendermint" | "sign:mmi" | "manage:*" | "manage:readonly" | "manage:email:*" | "manage:email:get" | "manage:email:update" | "manage:email:delete" | "manage:mfa:*" | "manage:mfa:readonly" | "manage:mfa:list" | "manage:mfa:vote:*" | "manage:mfa:vote:cs" | "manage:mfa:vote:email" | "manage:mfa:vote:fido" | "manage:mfa:vote:totp" | "manage:mfa:register:*" | "manage:mfa:register:fido" | "manage:mfa:register:totp" | "manage:mfa:register:email" | "manage:mfa:unregister:*" | "manage:mfa:unregister:fido" | "manage:mfa:unregister:totp" | "manage:mfa:verify:*" | "manage:mfa:verify:totp" | "manage:key:*" | "manage:key:readonly" | "manage:key:get" | "manage:key:attest" | "manage:key:listRoles" | "manage:key:list" | "manage:key:history:tx:list" | "manage:key:create" | "manage:key:import" | "manage:key:update:*" | "manage:key:update:owner" | "manage:key:update:policy" | "manage:key:update:enabled" | "manage:key:update:region" | "manage:key:update:metadata" | "manage:key:update:editPolicy" | "manage:key:delete" | "manage:policy:*" | "manage:policy:readonly" | "manage:policy:create" | "manage:policy:get" | "manage:policy:list" | "manage:policy:delete" | "manage:policy:update:*" | "manage:policy:update:owner" | "manage:policy:update:name" | "manage:policy:update:acl" | "manage:policy:update:editPolicy" | "manage:policy:update:metadata" | "manage:policy:update:rule" | "manage:policy:invoke" | "manage:policy:wasm:*" | "manage:policy:wasm:upload" | "manage:policy:secrets:*" | "manage:policy:secrets:get" | "manage:policy:secrets:update:*" | "manage:policy:secrets:update:values" | "manage:policy:secrets:update:acl" | "manage:policy:secrets:update:editPolicy" | "manage:policy:buckets:*" | "manage:policy:buckets:get" | "manage:policy:buckets:list" | "manage:policy:buckets:update:*" | "manage:policy:buckets:update:owner" | "manage:policy:buckets:update:acl" | "manage:policy:buckets:update:metadata" | "manage:contact:*" | "manage:contact:readonly" | "manage:contact:create" | "manage:contact:get" | "manage:contact:list" | "manage:contact:delete" | "manage:contact:update:*" | "manage:contact:update:name" | "manage:contact:update:addresses" | "manage:contact:update:owner" | "manage:contact:update:labels" | "manage:contact:update:metadata" | "manage:contact:update:editPolicy" | "manage:contact:lookup:*" | "manage:contact:lookup:address" | "manage:policy:createImportKey" | "manage:role:*" | "manage:role:readonly" | "manage:role:create" | "manage:role:delete" | "manage:role:get:*" | "manage:role:attest" | "manage:role:get:keys" | "manage:role:get:keys:list" | "manage:role:get:keys:get" | "manage:role:get:users" | "manage:role:list" | "manage:role:update:*" | "manage:role:update:enabled" | "manage:role:update:policy" | "manage:role:update:editPolicy" | "manage:role:update:actions" | "manage:role:update:key:*" | "manage:role:update:key:add" | "manage:role:update:key:remove" | "manage:role:update:user:*" | "manage:role:update:user:add" | "manage:role:update:user:remove" | "manage:role:history:tx:list" | "manage:identity:*" | "manage:identity:readonly" | "manage:identity:verify" | "manage:identity:add" | "manage:identity:remove" | "manage:identity:list" | "manage:org:*" | "manage:org:create" | "manage:org:metrics:query" | "manage:org:audit:query" | "manage:org:readonly" | "manage:org:addUser" | "manage:org:inviteUser" | "manage:org:inviteAlien" | "manage:org:invitation:list" | "manage:org:invitation:cancel" | "manage:org:updateMembership" | "manage:org:listUsers" | "manage:org:user:get" | "manage:org:deleteUser" | "manage:org:get" | "manage:org:update:*" | "manage:org:update:enabled" | "manage:org:update:policy" | "manage:org:update:signPolicy" | "manage:org:update:export" | "manage:org:update:totpFailureLimit" | "manage:org:update:notificationEndpoints" | "manage:org:update:defaultInviteKind" | "manage:org:update:idpConfiguration" | "manage:org:update:passkeyConfiguration" | "manage:org:update:emailPreferences" | "manage:org:update:historicalData" | "manage:org:update:requireScopeCeiling" | "manage:org:update:alienLoginRequirement" | "manage:org:update:memberLoginRequirement" | "manage:org:update:keyExportRequirement" | "manage:org:update:allowedMfaTypes" | "manage:org:update:policyEngineConf" | "manage:org:update:customChains" | "manage:org:update:extProps" | "manage:org:update:editPolicy" | "manage:org:user:resetMfa" | "manage:session:*" | "manage:session:readonly" | "manage:session:get" | "manage:session:list" | "manage:session:create" | "manage:session:extend" | "manage:session:revoke" | "manage:export:*" | "manage:export:readonly" | "manage:export:org:*" | "manage:export:org:get" | "manage:export:user:*" | "manage:export:user:delete" | "manage:export:user:list" | "manage:authMigration:*" | "manage:authMigration:identity:add" | "manage:authMigration:identity:remove" | "manage:authMigration:user:update" | "manage:mmi:*" | "manage:mmi:readonly" | "manage:mmi:get" | "manage:mmi:list" | "manage:mmi:reject" | "manage:mmi:delete" | "export:*" | "export:user:*" | "export:user:init" | "export:user:complete" | "mmi:*" | "orgAccess:*" | "orgAccess:child:*" | "rpc:*" | "rpc:createTransaction:*" | "rpc:createTransaction:evm" | "rpc:getTransaction" | "rpc:listTransactions";
4076
4274
  /**
4077
4275
  * @description This type specifies the interpretation of the `fee` field in Babylon
4078
4276
  * staking requests. If `sats`, the field is intpreted as a fixed value
@@ -4128,7 +4326,7 @@ export interface components {
4128
4326
  request_device_identifier?: boolean;
4129
4327
  };
4130
4328
  /** @enum {string} */
4131
- ForbiddenErrorCode: "AlienKeyCreate" | "CannotAssumeIdentity" | "SentryDisallowed" | "PasskeyLoginDisabled" | "PasskeyNotRegistered" | "CannotCreateOrg" | "WrongMfaEmailOtpJwt" | "OrgFlagNotSet" | "FidoRequiredToRemoveTotp" | "OidcIdentityLimitReached" | "OidcScopeCeilingMissing" | "OidcIssuerNotAllowedForMemberRole" | "OidcNoMemberRolesAllowed" | "EmailOtpNotConfigured" | "MfaChallengeExpired" | "ChainIdNotAllowed" | "InvalidOrg" | "OrgIdMismatch" | "SessionForWrongOrg" | "SelfDelete" | "SelfDisable" | "InvalidOrgMembershipRoleChange" | "UserDisabled" | "OrgDisabled" | "OrgNotFound" | "OrgWithoutOwner" | "OrphanedUser" | "OidcUserNotFound" | "UserNotInOrg" | "UserNotOrgOwner" | "UserNotKeyOwner" | "InvalidRole" | "DisabledRole" | "KeyDisabled" | "KeyNotInRole" | "ContactNotInOrg" | "UserExportRequestNotInOrg" | "UserExportRequestInvalid" | "UserExportDisabled" | "UserNotOriginalKeyOwner" | "UserNotInRole" | "MustBeFullMember" | "SessionExpired" | "SessionChanged" | "SessionRevoked" | "ExpectedUserSession" | "SessionRoleChanged" | "ScopedNameNotFound" | "SessionInvalidEpochToken" | "SessionInvalidRefreshToken" | "SessionRefreshTokenExpired" | "InvalidAuthHeader" | "SessionNotFound" | "InvalidArn" | "SessionInvalidAuthToken" | "SessionAuthTokenExpired" | "SessionPossiblyStolenToken" | "MfaDisallowedIdentity" | "MfaDisallowedApprover" | "MfaTypeNotAllowed" | "MfaNotApprovedYet" | "MfaConfirmationCodeMismatch" | "MfaHttpRequestMismatch" | "MfaRemoveBelowMin" | "MfaOrgRequirementNotMet" | "MfaRegistrationDisallowed" | "TotpAlreadyConfigured" | "TotpConfigurationChanged" | "MfaTotpBadConfiguration" | "MfaTotpBadCode" | "MfaTotpRateLimit" | "ImproperSessionScope" | "FullSessionRequired" | "SessionWithoutAnyScopeUnder" | "UserRoleUnprivileged" | "MemberRoleForbidden" | "MfaNotConfigured" | "RemoveLastOidcIdentity" | "OperationNotAllowed" | "OrgExportRetrievalDisabled" | "ChangingKeyExportRequirementIsDisabled" | "AutoAddBlsKeyToProtectedRole" | "UserNotPolicyOwner" | "UserNotContactOwner" | "LegacySessionCannotHaveScopeCeiling" | "RoleInParentOrgNotAllowed" | "RemoveKeyFromRoleUserNotAllowed" | "SiweChallengeExpired" | "SiweMessageNotValid" | "SiweMessageInvalidSignature" | "Acl";
4329
+ ForbiddenErrorCode: "AlienKeyCreate" | "CannotAssumeIdentity" | "SentryDisallowed" | "PasskeyLoginDisabled" | "PasskeyNotRegistered" | "CannotCreateOrg" | "WrongMfaEmailOtpJwt" | "OrgFlagNotSet" | "FidoRequiredToRemoveTotp" | "OidcIdentityLimitReached" | "OidcScopeCeilingMissing" | "OidcIssuerNotAllowedForMemberRole" | "OidcNoMemberRolesAllowed" | "EmailOtpNotConfigured" | "MfaChallengeExpired" | "ChainIdNotAllowed" | "InvalidOrg" | "OrgIdMismatch" | "SessionForWrongOrg" | "SelfDelete" | "SelfDisable" | "InvalidOrgMembershipRoleChange" | "UserDisabled" | "OrgDisabled" | "OrgNotFound" | "OrgWithoutOwner" | "OrphanedUser" | "OidcUserNotFound" | "UserNotInOrg" | "UserNotOrgOwner" | "UserNotKeyOwner" | "InvalidRole" | "DisabledRole" | "KeyDisabled" | "KeyNotInRole" | "ContactNotInOrg" | "UserExportRequestNotInOrg" | "UserExportRequestInvalid" | "UserExportDisabled" | "UserNotOriginalKeyOwner" | "UserNotInRole" | "MustBeFullMember" | "SessionExpired" | "SessionChanged" | "SessionRevoked" | "ExpectedUserSession" | "SessionRoleChanged" | "ScopedNameNotFound" | "SessionInvalidEpochToken" | "SessionInvalidRefreshToken" | "SessionRefreshTokenExpired" | "InvalidAuthHeader" | "SessionNotFound" | "InvalidArn" | "SessionInvalidAuthToken" | "SessionAuthTokenExpired" | "SessionPossiblyStolenToken" | "MfaDisallowedIdentity" | "MfaDisallowedApprover" | "MfaTypeNotAllowed" | "MfaNotApprovedYet" | "MfaConfirmationCodeMismatch" | "MfaHttpRequestMismatch" | "MfaRemoveBelowMin" | "MfaOrgRequirementNotMet" | "MfaRegistrationDisallowed" | "TotpAlreadyConfigured" | "TotpConfigurationChanged" | "MfaTotpBadConfiguration" | "MfaTotpBadCode" | "MfaTotpRateLimit" | "ImproperSessionScope" | "FullSessionRequired" | "SessionWithoutAnyScopeUnder" | "UserRoleUnprivileged" | "MemberRoleForbidden" | "MfaNotConfigured" | "RemoveLastOidcIdentity" | "OperationNotAllowed" | "OrgExportRetrievalDisabled" | "ChangingKeyExportRequirementIsDisabled" | "AutoAddBlsKeyToProtectedRole" | "UserNotPolicyOwner" | "UserNotContactOwner" | "UserNotBucketOwner" | "LegacySessionCannotHaveScopeCeiling" | "RoleInParentOrgNotAllowed" | "RemoveKeyFromRoleUserNotAllowed" | "SiweChallengeExpired" | "SiweMessageNotValid" | "SiweMessageInvalidSignature" | "Acl";
4132
4330
  /**
4133
4331
  * @description Specifies a fork of the `BeaconChain`, to prevent replay attacks.
4134
4332
  * The schema of `Fork` is defined in the [Beacon chain
@@ -4175,9 +4373,24 @@ export interface components {
4175
4373
  */
4176
4374
  genesis_validators_root: string;
4177
4375
  };
4376
+ /** @description The email sender configuration (without sensitive auth details) */
4377
+ GetEmailConfigResponse: {
4378
+ /** @description The email address that emails are sent from */
4379
+ sender: string;
4380
+ template?: {
4381
+ /** @description An HTML template to use for the body. */
4382
+ body_template: string;
4383
+ /** @description The subject line template */
4384
+ subject_template: string;
4385
+ } | null;
4386
+ };
4178
4387
  GetKeysInOrgRequest: {
4179
4388
  key_type?: components["schemas"]["KeyType"] | null;
4180
4389
  };
4390
+ /** @description Parameters for the [`cs_getTransaction`](RpcMethod::GetTransaction) method. */
4391
+ GetTransactionRequest: {
4392
+ id: components["schemas"]["Id"];
4393
+ };
4181
4394
  GetUserByEmailResponse: {
4182
4395
  /**
4183
4396
  * @description Typically, this array is either empty (if no user with a given email was found)
@@ -4352,12 +4565,23 @@ export interface components {
4352
4565
  salt: string;
4353
4566
  };
4354
4567
  /** @enum {string} */
4355
- InternalErrorCode: "NoMaterialId" | "InvalidAuditLogEntry" | "UnexpectedCheckerRule" | "UnresolvedPolicyReference" | "UnexpectedAclAction" | "FidoKeyAssociatedWithMultipleUsers" | "ClaimsParseError" | "InvalidThrottleId" | "InvalidEmailAddress" | "EmailTemplateRender" | "OidcIdentityHeaderMissing" | "OidcIdentityParseError" | "SystemTimeError" | "PasswordHashParseError" | "SendMailError" | "ReqwestError" | "EmailConstructionError" | "TsWriteError" | "TsQueryError" | "DbQueryError" | "DbGetError" | "DbDeleteError" | "DbPutError" | "DbUpdateError" | "SerdeError" | "TestAndSetError" | "DbGetItemsError" | "DbWriteError" | "CubistSignerError" | "CwListMetricsError" | "CwPutMetricDataError" | "GetAwsSecretError" | "SecretNotFound" | "KmsGenerateRandomError" | "MalformedTotpBytes" | "KmsGenerateRandomNoResponseError" | "CreateKeyError" | "ParseDerivationPathError" | "SplitSignerError" | "CreateImportKeyError" | "CreateEotsNoncesError" | "EotsSignError" | "BabylonCovSignError" | "CognitoDeleteUserError" | "CognitoListUsersError" | "CognitoGetUserError" | "MissingUserEmail" | "CognitoResendUserInvitation" | "CognitoSetUserPasswordError" | "GenericInternalError" | "AssumeRoleWithoutEvidence" | "OidcAuthWithoutOrg" | "MissingKeyMetadata" | "KmsEnableKeyError" | "KmsDisableKeyError" | "LambdaInvokeError" | "LambdaNoResponseError" | "LambdaFailure" | "LambdaUnparsableResponse" | "SerializeEncryptedExportKeyError" | "DeserializeEncryptedExportKeyError" | "ReEncryptUserExport" | "S3UploadError" | "S3DownloadError" | "S3CopyError" | "S3ListObjectsError" | "S3DeleteObjectsError" | "S3BuildError" | "S3PresignedUrlError" | "ManagedStateMissing" | "InternalHeaderMissing" | "InvalidInternalHeaderValue" | "RequestLocalStateAlreadySet" | "OidcOrgMismatch" | "OidcIssuerInvalidJwk" | "InvalidPkForMaterialId" | "SegwitTweakFailed" | "UncheckedOrg" | "SessionOrgIdMissing" | "AvaSignCredsMissing" | "AvaSignSignatureMissing" | "ExpectedRoleSession" | "InvalidThirdPartyIdentity" | "CognitoGetUser" | "SnsSubscribeError" | "SnsUnsubscribeError" | "SnsGetSubscriptionAttributesError" | "SnsSubscriptionAttributesMissing" | "SnsSetSubscriptionAttributesError" | "SnsPublishBatchError" | "InconsistentMultiValueTestAndSet" | "MaterialIdError" | "InvalidBtcAddress" | "HistoricalTxBodyMissing" | "InvalidOperation" | "ParentOrgNotFound" | "OrgParentLoop" | "ResolvedParentOrgWithNoScopeCeiling" | "InvalidUploadObjectId" | "PolicyEngineNotFound" | "PolicyEngineError" | "PolicySecretsEncryptionError" | "CreatePolicyImportKeyError" | "InvalidAlias" | "EmptyUpdateModifiedObject" | "EmptyUpdateModifiedActions" | "DbContactAddressesInvalid";
4568
+ InternalErrorCode: "NoMaterialId" | "InvalidAuditLogEntry" | "UnexpectedCheckerRule" | "UnresolvedPolicyReference" | "UnexpectedAclAction" | "FidoKeyAssociatedWithMultipleUsers" | "ClaimsParseError" | "InvalidThrottleId" | "InvalidEmailAddress" | "EmailTemplateRender" | "OidcIdentityHeaderMissing" | "OidcIdentityParseError" | "SystemTimeError" | "PasswordHashParseError" | "SendMailError" | "ReqwestError" | "EmailConstructionError" | "TsWriteError" | "TsQueryError" | "DbQueryError" | "DbGetError" | "DbDeleteError" | "DbPutError" | "DbUpdateError" | "SerdeError" | "TestAndSetError" | "DbGetItemsError" | "DbWriteError" | "CubistSignerError" | "CwListMetricsError" | "CwPutMetricDataError" | "GetAwsSecretError" | "SecretNotFound" | "KmsGenerateRandomError" | "MalformedTotpBytes" | "KmsGenerateRandomNoResponseError" | "CreateKeyError" | "ParseDerivationPathError" | "SplitSignerError" | "CreateImportKeyError" | "CreateEotsNoncesError" | "EotsSignError" | "BabylonCovSignError" | "CognitoDeleteUserError" | "CognitoListUsersError" | "CognitoGetUserError" | "MissingUserEmail" | "CognitoResendUserInvitation" | "CognitoSetUserPasswordError" | "GenericInternalError" | "AssumeRoleWithoutEvidence" | "OidcAuthWithoutOrg" | "MissingKeyMetadata" | "KmsEnableKeyError" | "KmsDisableKeyError" | "LambdaInvokeError" | "LambdaNoResponseError" | "LambdaFailure" | "LambdaUnparsableResponse" | "SerializeEncryptedExportKeyError" | "DeserializeEncryptedExportKeyError" | "ReEncryptUserExport" | "S3UploadError" | "S3DownloadError" | "S3CopyError" | "S3ListObjectsError" | "S3DeleteObjectsError" | "S3BuildError" | "S3PresignedUrlError" | "ManagedStateMissing" | "InternalHeaderMissing" | "InvalidInternalHeaderValue" | "RequestLocalStateAlreadySet" | "OidcOrgMismatch" | "OidcIssuerInvalidJwk" | "InvalidPkForMaterialId" | "SegwitTweakFailed" | "UncheckedOrg" | "SessionOrgIdMissing" | "AvaSignCredsMissing" | "AvaSignSignatureMissing" | "ExpectedRoleSession" | "InvalidThirdPartyIdentity" | "CognitoGetUser" | "SnsSubscribeError" | "SnsUnsubscribeError" | "SnsGetSubscriptionAttributesError" | "SnsSubscriptionAttributesMissing" | "SnsSetSubscriptionAttributesError" | "SnsPublishBatchError" | "InconsistentMultiValueTestAndSet" | "MaterialIdError" | "InvalidBtcAddress" | "HistoricalTxBodyMissing" | "InvalidOperation" | "ParentOrgNotFound" | "OrgParentLoop" | "ResolvedParentOrgWithNoScopeCeiling" | "InvalidUploadObjectId" | "PolicyEngineNotFound" | "PolicyEngineError" | "PolicySecretsEncryptionError" | "CreatePolicyImportKeyError" | "InvalidAlias" | "EmptyUpdateModifiedObject" | "EmptyUpdateModifiedActions" | "DbContactAddressesInvalid" | "InvalidEvmSigedRlp" | "InvalidErc20Data" | "InvalidRpcUrl";
4356
4569
  InvitationAcceptRequest: {
4357
4570
  auth: components["schemas"]["AuthSource"];
4358
4571
  /** @description Invitation token */
4359
4572
  token: string;
4360
4573
  };
4574
+ /** @description Information about a pending invitation */
4575
+ InvitationInfo: {
4576
+ created: components["schemas"]["EpochDateTime"];
4577
+ /** @description The email address the invitation was sent to */
4578
+ email: string;
4579
+ expiration: components["schemas"]["EpochDateTime"];
4580
+ inviter?: components["schemas"]["Id"] | null;
4581
+ /** @description The invited user's name */
4582
+ name: string;
4583
+ role: components["schemas"]["MemberRole"];
4584
+ };
4361
4585
  /**
4362
4586
  * @description Indicates the auth sources allowed to an invited user
4363
4587
  * @enum {string}
@@ -4502,6 +4726,27 @@ export interface components {
4502
4726
  /** @description The type of key this package represents */
4503
4727
  key_type: string;
4504
4728
  };
4729
+ /** @description The top-level JSON-RPC request type. */
4730
+ JsonRpcRequest: {
4731
+ method: "JsonRpcRequest";
4732
+ } & Omit<components["schemas"]["RpcMethod"], "method"> & {
4733
+ /** @description Request ID */
4734
+ id?: string;
4735
+ /** @description JSON-RPC version. */
4736
+ jsonrpc: string;
4737
+ };
4738
+ /** @description The RPC API's response. */
4739
+ JsonRpcResponse: {
4740
+ error?: components["schemas"]["ErrorObj"] | null;
4741
+ /** @description ID from the corresponding request. */
4742
+ id?: unknown;
4743
+ /** @description Constant "2.0". */
4744
+ jsonrpc: string;
4745
+ /** @description Result, if success. */
4746
+ result?: Record<string, unknown> | null;
4747
+ };
4748
+ /** @description Valid `result` from the JSON-RPC API. */
4749
+ JsonRpcResult: components["schemas"]["TransactionInfo"] | components["schemas"]["ListTransactionsPaginatedResponse"];
4505
4750
  JwkSetResponse: {
4506
4751
  /** @description The keys included in this set */
4507
4752
  keys: Record<string, never>[];
@@ -4664,6 +4909,11 @@ export interface components {
4664
4909
  ListIdentitiesResponse: {
4665
4910
  identities: components["schemas"]["IdentityInfo"][];
4666
4911
  };
4912
+ /** @description List of pending invitations */
4913
+ ListInvitationsResponse: {
4914
+ /** @description Pending invitations */
4915
+ invitations: components["schemas"]["InvitationInfo"][];
4916
+ };
4667
4917
  ListMfaResponse: {
4668
4918
  /** @description All pending MFA requests */
4669
4919
  mfa_requests: components["schemas"]["MfaRequestInfo"][];
@@ -4673,6 +4923,35 @@ export interface components {
4673
4923
  /** @description All pending messages for a user. */
4674
4924
  pending_messages: components["schemas"]["PendingMessageInfo"][];
4675
4925
  };
4926
+ /**
4927
+ * @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
4928
+ * value (which can the user pass back to use as a url query parameter to continue pagination).
4929
+ */
4930
+ ListTransactionsPaginatedResponse: {
4931
+ /** @description A list of transaction infos. */
4932
+ transactions: components["schemas"]["TransactionInfo"][];
4933
+ } & {
4934
+ /**
4935
+ * @description If set, the content of `response` does not contain the entire result set.
4936
+ * To fetch the next page of the result set, call the same endpoint
4937
+ * but specify this value as the 'page.start' query parameter.
4938
+ */
4939
+ last_evaluated_key?: string | null;
4940
+ };
4941
+ /** @description Parameters for the [`cs_listTransactions`](RpcMethod::ListTransactions) method. */
4942
+ ListTransactionsRequest: components["schemas"]["Page"] & {
4943
+ /**
4944
+ * @description Optional user or role id.
4945
+ *
4946
+ * If defined, the response is filtered to transactions created by the given id.
4947
+ */
4948
+ owner?: string | null;
4949
+ };
4950
+ /** @description The response to [`cs_listTransactions`](super::request::RpcMethod::ListTransactions) */
4951
+ ListTransactionsResponse: {
4952
+ /** @description A list of transaction infos. */
4953
+ transactions: components["schemas"]["TransactionInfo"][];
4954
+ };
4676
4955
  LoginRequest: components["schemas"]["OidcLoginRequest"];
4677
4956
  /**
4678
4957
  * @description Describes whether a user in an org is an Owner or just a regular member
@@ -4737,7 +5016,7 @@ export interface components {
4737
5016
  * @description MFA policy provenance
4738
5017
  * @enum {string}
4739
5018
  */
4740
- provenance: "Key" | "KeyInRole" | "Role" | "User" | "EditPolicy";
5019
+ provenance: "Org" | "Key" | "KeyInRole" | "Role" | "User" | "EditPolicy";
4741
5020
  receipt?: components["schemas"]["Receipt"] | null;
4742
5021
  /** @description The region this MFA request was created in. It can only be redeemed from the same region. */
4743
5022
  region?: string;
@@ -4908,7 +5187,7 @@ export interface components {
4908
5187
  /** Format: binary */
4909
5188
  NonceValue: string;
4910
5189
  /** @enum {string} */
4911
- NotFoundErrorCode: "UriSegmentMissing" | "UriSegmentInvalid" | "TotpNotConfigured" | "FidoKeyNotFound" | "FidoChallengeNotFound" | "TotpChallengeNotFound" | "UserExportRequestNotFound" | "UserExportCiphertextNotFound" | "OrgExportCiphertextNotFound" | "UploadObjectNotFound" | "PolicySecretNotFound" | "TimestreamDisabled" | "CustomChainNotFound";
5190
+ NotFoundErrorCode: "UriSegmentMissing" | "UriSegmentInvalid" | "TotpNotConfigured" | "FidoKeyNotFound" | "FidoChallengeNotFound" | "TotpChallengeNotFound" | "UserExportRequestNotFound" | "UserExportCiphertextNotFound" | "OrgExportCiphertextNotFound" | "UploadObjectNotFound" | "PolicySecretNotFound" | "BucketMetaNotFound" | "TimestreamDisabled" | "CustomChainNotFound" | "InvitationNotFound" | "TransactionNotFound" | "EmailConfigNotFound";
4912
5191
  /** @description The configuration and status of a notification endpoint */
4913
5192
  NotificationEndpoint: components["schemas"]["NotificationEndpointSubscription"] & {
4914
5193
  status: components["schemas"]["SubscriptionStatus"];
@@ -5202,6 +5481,17 @@ export interface components {
5202
5481
  last_state: unknown;
5203
5482
  /** @enum {string} */
5204
5483
  org_event: "TendermintConcurrentSigning";
5484
+ } | {
5485
+ /** @description The email address of the invited user */
5486
+ email: string;
5487
+ /** @enum {string} */
5488
+ org_event: "InvitationCreated";
5489
+ role: components["schemas"]["MemberRole"];
5490
+ } | {
5491
+ /** @description The email address whose invitation was canceled */
5492
+ email: string;
5493
+ /** @enum {string} */
5494
+ org_event: "InvitationCanceled";
5205
5495
  } | {
5206
5496
  key_id: components["schemas"]["Id"];
5207
5497
  /** @enum {string} */
@@ -5242,7 +5532,7 @@ export interface components {
5242
5532
  * @description Auto-generated discriminant enum variants
5243
5533
  * @enum {string}
5244
5534
  */
5245
- OrgEventDiscriminants: "Billing" | "Response" | "OidcAuth" | "Signed" | "BabylonEotsConcurrentSigning" | "Eth2ConcurrentAttestationSigning" | "Eth2ConcurrentBlockSigning" | "Eth2InvalidBlockProposerSlotTooLow" | "Eth2InvalidAttestationSourceEpochTooLow" | "Eth2InvalidAttestationTargetEpochTooLow" | "Eth2Unstake" | "Eth2ExceededMaxUnstake" | "KeyCreated" | "MfaApproved" | "MfaRejected" | "PolicyChanged" | "TendermintConcurrentSigning" | "UserExportInit" | "UserExportComplete" | "WasmPolicyExecuted";
5535
+ OrgEventDiscriminants: "Billing" | "Response" | "OidcAuth" | "Signed" | "BabylonEotsConcurrentSigning" | "Eth2ConcurrentAttestationSigning" | "Eth2ConcurrentBlockSigning" | "Eth2InvalidBlockProposerSlotTooLow" | "Eth2InvalidAttestationSourceEpochTooLow" | "Eth2InvalidAttestationTargetEpochTooLow" | "Eth2Unstake" | "Eth2ExceededMaxUnstake" | "KeyCreated" | "MfaApproved" | "MfaRejected" | "PolicyChanged" | "TendermintConcurrentSigning" | "InvitationCreated" | "InvitationCanceled" | "UserExportInit" | "UserExportComplete" | "WasmPolicyExecuted";
5246
5536
  /** @description Filter for org events */
5247
5537
  OrgEventFilter: OneOf<[
5248
5538
  "All",
@@ -5260,7 +5550,7 @@ export interface components {
5260
5550
  /** @description A base64-encoded export ciphertext. */
5261
5551
  ciphertext: string;
5262
5552
  };
5263
- OrgInfo: components["schemas"]["MfaRequirements"] & {
5553
+ OrgInfo: components["schemas"]["MfaRequirements"] & components["schemas"]["CommonFields"] & {
5264
5554
  access_model: components["schemas"]["AccessModel"];
5265
5555
  custom_chains?: components["schemas"]["CustomChainsData"] | null;
5266
5556
  default_invite_kind?: components["schemas"]["InviteKind"];
@@ -5356,6 +5646,15 @@ export interface components {
5356
5646
  */
5357
5647
  policy?: Record<string, never>[];
5358
5648
  policy_engine_configuration?: components["schemas"]["PolicyEngineConfiguration"];
5649
+ /**
5650
+ * @description Global sign policy that applies to every sign operation (every key, every role) in the org
5651
+ * @example [
5652
+ * {
5653
+ * "TxReceiver": "0x0000000000000000000000000000000000000000"
5654
+ * }
5655
+ * ]
5656
+ */
5657
+ sign_policy?: Record<string, never>[];
5359
5658
  /**
5360
5659
  * Format: int32
5361
5660
  * @description The organization's currently configured TOTP failure limit, i.e., the number
@@ -5484,6 +5783,21 @@ export interface components {
5484
5783
  */
5485
5784
  last_evaluated_key?: string | null;
5486
5785
  };
5786
+ /**
5787
+ * @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
5788
+ * value (which can the user pass back to use as a url query parameter to continue pagination).
5789
+ */
5790
+ PaginatedListBucketsResponse: {
5791
+ /** @description The buckets in the organization. */
5792
+ buckets: components["schemas"]["BucketInfo"][];
5793
+ } & {
5794
+ /**
5795
+ * @description If set, the content of `response` does not contain the entire result set.
5796
+ * To fetch the next page of the result set, call the same endpoint
5797
+ * but specify this value as the 'page.start' query parameter.
5798
+ */
5799
+ last_evaluated_key?: string | null;
5800
+ };
5487
5801
  /**
5488
5802
  * @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
5489
5803
  * value (which can the user pass back to use as a url query parameter to continue pagination).
@@ -5514,6 +5828,21 @@ export interface components {
5514
5828
  */
5515
5829
  last_evaluated_key?: string | null;
5516
5830
  };
5831
+ /**
5832
+ * @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
5833
+ * value (which can the user pass back to use as a url query parameter to continue pagination).
5834
+ */
5835
+ PaginatedListInvitationsResponse: {
5836
+ /** @description Pending invitations */
5837
+ invitations: components["schemas"]["InvitationInfo"][];
5838
+ } & {
5839
+ /**
5840
+ * @description If set, the content of `response` does not contain the entire result set.
5841
+ * To fetch the next page of the result set, call the same endpoint
5842
+ * but specify this value as the 'page.start' query parameter.
5843
+ */
5844
+ last_evaluated_key?: string | null;
5845
+ };
5517
5846
  /**
5518
5847
  * @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
5519
5848
  * value (which can the user pass back to use as a url query parameter to continue pagination).
@@ -5788,12 +6117,10 @@ export interface components {
5788
6117
  message_tx?: components["schemas"]["TypedTransaction"] | null;
5789
6118
  }) & Record<string, never>;
5790
6119
  /**
5791
- * PolicyAction
5792
6120
  * @description The access-controlled actions that can be performed on a named policy.
5793
- * @example read:policy
5794
6121
  * @enum {string}
5795
6122
  */
5796
- PolicyAction: "read:*" | "read:policy" | "read:logs" | "update:*" | "update:name" | "update:rules" | "update:metadata" | "update:editPolicy" | "update:owner" | "update:acl" | "delete" | "attach" | "sign" | "invoke";
6123
+ PolicyAction: "read:*" | "read" | "read:policy" | "read:logs" | "update:*" | "update" | "update:name" | "update:rules" | "update:metadata" | "update:editPolicy" | "update:owner" | "update:acl" | "delete" | "attach" | "sign" | "invoke";
5797
6124
  /** @description The id for attaching a named policy to a key, role, or key in role. */
5798
6125
  PolicyAttachedToId: OneOf<[
5799
6126
  {
@@ -5821,6 +6148,13 @@ export interface components {
5821
6148
  * @example Role#bfe3eccb-731e-430d-b1e5-ac1363e6b06b
5822
6149
  */
5823
6150
  role_id: string;
6151
+ },
6152
+ {
6153
+ /**
6154
+ * @description The id of the org the policy should be attached to.
6155
+ * @example Org#b0156abd-53bd-4043-8e55-57f7af9512d5
6156
+ */
6157
+ org_id: string;
5824
6158
  }
5825
6159
  ]>;
5826
6160
  /** @description A struct containing Org-level configurations for the workings of the Policy Engine. */
@@ -6547,6 +6881,20 @@ export interface components {
6547
6881
  /** @description A JSON Web Token whose claims contain the `RoleInfo` structure. */
6548
6882
  jwt: string;
6549
6883
  };
6884
+ /** @description The RPC API method and matching parameters. */
6885
+ RpcMethod: {
6886
+ /** @enum {string} */
6887
+ method: "cs_createTransaction";
6888
+ params: components["schemas"]["CreateTransactionRequest"];
6889
+ } | {
6890
+ /** @enum {string} */
6891
+ method: "cs_getTransaction";
6892
+ params: components["schemas"]["GetTransactionRequest"];
6893
+ } | {
6894
+ /** @enum {string} */
6895
+ method: "cs_listTransactions";
6896
+ params: components["schemas"]["ListTransactionsRequest"];
6897
+ };
6550
6898
  /** @description All scopes for accessing CubeSigner APIs */
6551
6899
  Scope: components["schemas"]["ExplicitScope"] | string;
6552
6900
  /** @description A set of scopes. */
@@ -7101,6 +7449,16 @@ export interface components {
7101
7449
  signedRawTransaction?: string | null;
7102
7450
  status: components["schemas"]["MmiStatus"];
7103
7451
  };
7452
+ /** @description Chain-specific transaction details. */
7453
+ TransactionDetails: components["schemas"]["EvmTransactionDetails"] & {
7454
+ /** @enum {string} */
7455
+ chain: "Evm";
7456
+ };
7457
+ /** @description Information about an existing transaction created by the RPC API. */
7458
+ TransactionInfo: components["schemas"]["Transaction"] & {
7459
+ /** @description The transaction id. */
7460
+ id: string;
7461
+ };
7104
7462
  /**
7105
7463
  * @description Supported queries
7106
7464
  * @enum {string}
@@ -7316,6 +7674,23 @@ export interface components {
7316
7674
  /** @description Optional policy evaluation tree. */
7317
7675
  policy_eval_tree?: unknown;
7318
7676
  } & Record<string, never>;
7677
+ /** @description The information needed to update a bucket. */
7678
+ UpdateBucketRequest: {
7679
+ /** @description Access-control entries defining how the bucket can be accessed. */
7680
+ acl?: unknown;
7681
+ /**
7682
+ * Format: int64
7683
+ * @description If set, updating only succeeds if the current version matches this value.
7684
+ */
7685
+ expected_version?: number | null;
7686
+ /** @description Optional metadata. */
7687
+ metadata?: unknown;
7688
+ /**
7689
+ * @description Update the owner of the bucket
7690
+ * @example User#00000000-0000-0000-0000-000000000000
7691
+ */
7692
+ owner?: string | null;
7693
+ };
7319
7694
  /** @description The information needed to update a Contact. */
7320
7695
  UpdateContactRequest: {
7321
7696
  addresses?: components["schemas"]["AddressMap"] | null;
@@ -7388,6 +7763,7 @@ export interface components {
7388
7763
  } | null;
7389
7764
  custom_chains?: components["schemas"]["CustomChainsData"] | null;
7390
7765
  default_invite_kind?: components["schemas"]["InviteKind"] | null;
7766
+ edit_policy?: components["schemas"]["EditPolicy"] | null;
7391
7767
  email_preferences?: components["schemas"]["EmailPreferences"] | null;
7392
7768
  /** @description If set, update this org's `enabled` field to this value. */
7393
7769
  enabled?: boolean | null;
@@ -7480,6 +7856,18 @@ export interface components {
7480
7856
  * Owners of the org are exempt from this requirement.
7481
7857
  */
7482
7858
  require_scope_ceiling?: boolean | null;
7859
+ /**
7860
+ * @description If set, update this org's sign rule (old sign rules will be overwritten!).
7861
+ * Only "deny"-style rules may be set.
7862
+ * @example [
7863
+ * {
7864
+ * "TxReceiver": [
7865
+ * "0x0000000000000000000000000000000000000000"
7866
+ * ]
7867
+ * }
7868
+ * ]
7869
+ */
7870
+ sign_policy?: unknown[] | null;
7483
7871
  /**
7484
7872
  * Format: int32
7485
7873
  * @description If set, update this org's TOTP failure limit. After this many failures,
@@ -7517,6 +7905,7 @@ export interface components {
7517
7905
  } | null;
7518
7906
  custom_chains?: components["schemas"]["CustomChainsData"] | null;
7519
7907
  default_invite_kind?: components["schemas"]["InviteKind"] | null;
7908
+ edit_policy?: components["schemas"]["EditPolicy"] | null;
7520
7909
  email_preferences?: components["schemas"]["EmailPreferences"] | null;
7521
7910
  /** @description The new value of the 'enabled' property */
7522
7911
  enabled?: boolean | null;
@@ -7579,6 +7968,15 @@ export interface components {
7579
7968
  policy_engine_configuration?: components["schemas"]["PolicyEngineConfiguration"] | null;
7580
7969
  /** @description The new value of require_scope_ceiling */
7581
7970
  require_scope_ceiling?: boolean | null;
7971
+ /**
7972
+ * @description The new value of the org-wide sign rules
7973
+ * @example [
7974
+ * {
7975
+ * "TxReceiver": "0x0000000000000000000000000000000000000000"
7976
+ * }
7977
+ * ]
7978
+ */
7979
+ sign_policy?: Record<string, never>[] | null;
7582
7980
  /**
7583
7981
  * Format: int32
7584
7982
  * @description The new value of the TOTP failure limit
@@ -7596,6 +7994,11 @@ export interface components {
7596
7994
  * @description The new value of user-export window
7597
7995
  */
7598
7996
  user_export_window?: number | null;
7997
+ /**
7998
+ * Format: int64
7999
+ * @description New org version
8000
+ */
8001
+ version: number;
7599
8002
  };
7600
8003
  /** @description Request body for updating a named policy. */
7601
8004
  UpdatePolicyRequest: {
@@ -8111,6 +8514,29 @@ export interface components {
8111
8514
  };
8112
8515
  };
8113
8516
  };
8517
+ /** @description Information about a policy KV store bucket. */
8518
+ BucketInfo: {
8519
+ content: {
8520
+ "application/json": ({
8521
+ created?: components["schemas"]["EpochDateTime"] | null;
8522
+ last_modified?: components["schemas"]["EpochDateTime"] | null;
8523
+ /**
8524
+ * Format: int64
8525
+ * @description Version of this object
8526
+ */
8527
+ version?: number;
8528
+ } & {
8529
+ /** @description The access-control entries for the bucket. */
8530
+ acl?: unknown[] | null;
8531
+ /** @description Arbitrary user-defined metadata. */
8532
+ metadata?: unknown;
8533
+ owner: components["schemas"]["Id"];
8534
+ }) & {
8535
+ /** @description The name of the bucket. */
8536
+ name: string;
8537
+ };
8538
+ };
8539
+ };
8114
8540
  /** @description The number of users and keys in an org, organized by user role and key type */
8115
8541
  ComputeCountsResponse: {
8116
8542
  content: {
@@ -8328,6 +8754,21 @@ export interface components {
8328
8754
  };
8329
8755
  };
8330
8756
  };
8757
+ /** @description The email sender configuration (without sensitive auth details) */
8758
+ GetEmailConfigResponse: {
8759
+ content: {
8760
+ "application/json": {
8761
+ /** @description The email address that emails are sent from */
8762
+ sender: string;
8763
+ template?: {
8764
+ /** @description An HTML template to use for the body. */
8765
+ body_template: string;
8766
+ /** @description The subject line template */
8767
+ subject_template: string;
8768
+ } | null;
8769
+ };
8770
+ };
8771
+ };
8331
8772
  GetUserByEmailResponse: {
8332
8773
  content: {
8333
8774
  "application/json": {
@@ -8396,6 +8837,20 @@ export interface components {
8396
8837
  "application/json": components["schemas"]["Response"] & Record<string, never>;
8397
8838
  };
8398
8839
  };
8840
+ /** @description The RPC API's response. */
8841
+ JsonRpcResponse: {
8842
+ content: {
8843
+ "application/json": {
8844
+ error?: components["schemas"]["ErrorObj"] | null;
8845
+ /** @description ID from the corresponding request. */
8846
+ id?: unknown;
8847
+ /** @description Constant "2.0". */
8848
+ jsonrpc: string;
8849
+ /** @description Result, if success. */
8850
+ result?: Record<string, unknown> | null;
8851
+ };
8852
+ };
8853
+ };
8399
8854
  /** @description A JSON Web Key set describing the key used to sign JSON Web Tokens */
8400
8855
  JwkSetResponse: {
8401
8856
  content: {
@@ -8580,7 +9035,7 @@ export interface components {
8580
9035
  * @description MFA policy provenance
8581
9036
  * @enum {string}
8582
9037
  */
8583
- provenance: "Key" | "KeyInRole" | "Role" | "User" | "EditPolicy";
9038
+ provenance: "Org" | "Key" | "KeyInRole" | "Role" | "User" | "EditPolicy";
8584
9039
  receipt?: components["schemas"]["Receipt"] | null;
8585
9040
  /** @description The region this MFA request was created in. It can only be redeemed from the same region. */
8586
9041
  region?: string;
@@ -8632,7 +9087,7 @@ export interface components {
8632
9087
  };
8633
9088
  OrgInfo: {
8634
9089
  content: {
8635
- "application/json": components["schemas"]["MfaRequirements"] & {
9090
+ "application/json": components["schemas"]["MfaRequirements"] & components["schemas"]["CommonFields"] & {
8636
9091
  access_model: components["schemas"]["AccessModel"];
8637
9092
  custom_chains?: components["schemas"]["CustomChainsData"] | null;
8638
9093
  default_invite_kind?: components["schemas"]["InviteKind"];
@@ -8729,10 +9184,19 @@ export interface components {
8729
9184
  policy?: Record<string, never>[];
8730
9185
  policy_engine_configuration?: components["schemas"]["PolicyEngineConfiguration"];
8731
9186
  /**
8732
- * Format: int32
8733
- * @description The organization's currently configured TOTP failure limit, i.e., the number
8734
- * of times a user can provide an incorrect TOTP code before being rate limited.
8735
- * This value can be between 1 and 5 (inclusive).
9187
+ * @description Global sign policy that applies to every sign operation (every key, every role) in the org
9188
+ * @example [
9189
+ * {
9190
+ * "TxReceiver": "0x0000000000000000000000000000000000000000"
9191
+ * }
9192
+ * ]
9193
+ */
9194
+ sign_policy?: Record<string, never>[];
9195
+ /**
9196
+ * Format: int32
9197
+ * @description The organization's currently configured TOTP failure limit, i.e., the number
9198
+ * of times a user can provide an incorrect TOTP code before being rate limited.
9199
+ * This value can be between 1 and 5 (inclusive).
8736
9200
  */
8737
9201
  totp_failure_limit: number;
8738
9202
  /**
@@ -8788,6 +9252,21 @@ export interface components {
8788
9252
  };
8789
9253
  };
8790
9254
  };
9255
+ PaginatedListBucketsResponse: {
9256
+ content: {
9257
+ "application/json": {
9258
+ /** @description The buckets in the organization. */
9259
+ buckets: components["schemas"]["BucketInfo"][];
9260
+ } & {
9261
+ /**
9262
+ * @description If set, the content of `response` does not contain the entire result set.
9263
+ * To fetch the next page of the result set, call the same endpoint
9264
+ * but specify this value as the 'page.start' query parameter.
9265
+ */
9266
+ last_evaluated_key?: string | null;
9267
+ };
9268
+ };
9269
+ };
8791
9270
  PaginatedListContactsResponse: {
8792
9271
  content: {
8793
9272
  "application/json": {
@@ -8818,6 +9297,21 @@ export interface components {
8818
9297
  };
8819
9298
  };
8820
9299
  };
9300
+ PaginatedListInvitationsResponse: {
9301
+ content: {
9302
+ "application/json": {
9303
+ /** @description Pending invitations */
9304
+ invitations: components["schemas"]["InvitationInfo"][];
9305
+ } & {
9306
+ /**
9307
+ * @description If set, the content of `response` does not contain the entire result set.
9308
+ * To fetch the next page of the result set, call the same endpoint
9309
+ * but specify this value as the 'page.start' query parameter.
9310
+ */
9311
+ last_evaluated_key?: string | null;
9312
+ };
9313
+ };
9314
+ };
8821
9315
  PaginatedListKeyRolesResponse: {
8822
9316
  content: {
8823
9317
  "application/json": {
@@ -9439,6 +9933,7 @@ export interface components {
9439
9933
  } | null;
9440
9934
  custom_chains?: components["schemas"]["CustomChainsData"] | null;
9441
9935
  default_invite_kind?: components["schemas"]["InviteKind"] | null;
9936
+ edit_policy?: components["schemas"]["EditPolicy"] | null;
9442
9937
  email_preferences?: components["schemas"]["EmailPreferences"] | null;
9443
9938
  /** @description The new value of the 'enabled' property */
9444
9939
  enabled?: boolean | null;
@@ -9501,6 +9996,15 @@ export interface components {
9501
9996
  policy_engine_configuration?: components["schemas"]["PolicyEngineConfiguration"] | null;
9502
9997
  /** @description The new value of require_scope_ceiling */
9503
9998
  require_scope_ceiling?: boolean | null;
9999
+ /**
10000
+ * @description The new value of the org-wide sign rules
10001
+ * @example [
10002
+ * {
10003
+ * "TxReceiver": "0x0000000000000000000000000000000000000000"
10004
+ * }
10005
+ * ]
10006
+ */
10007
+ sign_policy?: Record<string, never>[] | null;
9504
10008
  /**
9505
10009
  * Format: int32
9506
10010
  * @description The new value of the TOTP failure limit
@@ -9518,6 +10022,11 @@ export interface components {
9518
10022
  * @description The new value of user-export window
9519
10023
  */
9520
10024
  user_export_window?: number | null;
10025
+ /**
10026
+ * Format: int64
10027
+ * @description New org version
10028
+ */
10029
+ version: number;
9521
10030
  };
9522
10031
  };
9523
10032
  };
@@ -10822,6 +11331,37 @@ export interface operations {
10822
11331
  };
10823
11332
  };
10824
11333
  };
11334
+ /**
11335
+ * Get Email Template
11336
+ * @description Get Email Template
11337
+ *
11338
+ * Returns the email template for a given purpose.
11339
+ */
11340
+ getEmailConfig: {
11341
+ parameters: {
11342
+ path: {
11343
+ /**
11344
+ * @description Name or ID of the desired Org
11345
+ * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
11346
+ */
11347
+ org_id: string;
11348
+ /** @description Which email configuration to get */
11349
+ purpose: "otp" | "mfa_reset" | "otp_mfa" | "alien_password_reset" | "member_password_reset" | "alien_invite" | "member_invite" | "welcome";
11350
+ };
11351
+ };
11352
+ responses: {
11353
+ 200: components["responses"]["GetEmailConfigResponse"];
11354
+ default: {
11355
+ content: {
11356
+ "application/json": components["schemas"]["ErrorResponse"];
11357
+ };
11358
+ };
11359
+ };
11360
+ };
11361
+ /**
11362
+ * Configure Email Template
11363
+ * @description Configure Email Template
11364
+ */
10825
11365
  configureEmail: {
10826
11366
  parameters: {
10827
11367
  path: {
@@ -10848,6 +11388,36 @@ export interface operations {
10848
11388
  };
10849
11389
  };
10850
11390
  };
11391
+ /**
11392
+ * Delete Email Template
11393
+ * @description Delete Email Template
11394
+ */
11395
+ deleteEmailConfig: {
11396
+ parameters: {
11397
+ path: {
11398
+ /**
11399
+ * @description Name or ID of the desired Org
11400
+ * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
11401
+ */
11402
+ org_id: string;
11403
+ /** @description Which email configuration to delete */
11404
+ purpose: "otp" | "mfa_reset" | "otp_mfa" | "alien_password_reset" | "member_password_reset" | "alien_invite" | "member_invite" | "welcome";
11405
+ };
11406
+ };
11407
+ requestBody: {
11408
+ content: {
11409
+ "application/json": components["schemas"]["Empty"];
11410
+ };
11411
+ };
11412
+ responses: {
11413
+ 200: components["responses"]["EmptyImpl"];
11414
+ default: {
11415
+ content: {
11416
+ "application/json": components["schemas"]["ErrorResponse"];
11417
+ };
11418
+ };
11419
+ };
11420
+ };
10851
11421
  /**
10852
11422
  * Sign EIP-191 Data
10853
11423
  * @description Sign EIP-191 Data
@@ -11417,6 +11987,77 @@ export interface operations {
11417
11987
  };
11418
11988
  responses: {};
11419
11989
  };
11990
+ /**
11991
+ * List pending invitations
11992
+ * @description List pending invitations
11993
+ *
11994
+ * Returns all pending (not yet accepted) invitations for the organization.
11995
+ */
11996
+ listInvitations: {
11997
+ parameters: {
11998
+ query?: {
11999
+ /**
12000
+ * @description Max number of items to return per page.
12001
+ *
12002
+ * If the actual number of returned items may be less that this, even if there exist more
12003
+ * data in the result set. To reliably determine if more data is left in the result set,
12004
+ * inspect the [UnencryptedLastEvalKey] value in the response object.
12005
+ */
12006
+ "page.size"?: number;
12007
+ /**
12008
+ * @description The start of the page. Omit to start from the beginning; otherwise, only specify a
12009
+ * the exact value previously returned as 'last_evaluated_key' from the same endpoint.
12010
+ */
12011
+ "page.start"?: string | null;
12012
+ };
12013
+ path: {
12014
+ /**
12015
+ * @description Name or ID of the desired Org
12016
+ * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
12017
+ */
12018
+ org_id: string;
12019
+ };
12020
+ };
12021
+ responses: {
12022
+ 200: components["responses"]["PaginatedListInvitationsResponse"];
12023
+ default: {
12024
+ content: {
12025
+ "application/json": components["schemas"]["ErrorResponse"];
12026
+ };
12027
+ };
12028
+ };
12029
+ };
12030
+ /**
12031
+ * Cancel a pending invitation
12032
+ * @description Cancel a pending invitation
12033
+ *
12034
+ * Removes a pending invitation from the organization. If no pending invitation
12035
+ * exists for the given email address, a not-found error is returned.
12036
+ */
12037
+ cancelInvitation: {
12038
+ parameters: {
12039
+ path: {
12040
+ /**
12041
+ * @description Name or ID of the desired Org
12042
+ * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
12043
+ */
12044
+ org_id: string;
12045
+ };
12046
+ };
12047
+ requestBody: {
12048
+ content: {
12049
+ "application/json": components["schemas"]["CancelInvitationRequest"];
12050
+ };
12051
+ };
12052
+ responses: {
12053
+ 200: components["responses"]["EmptyImpl"];
12054
+ default: {
12055
+ content: {
12056
+ "application/json": components["schemas"]["ErrorResponse"];
12057
+ };
12058
+ };
12059
+ };
12060
+ };
11420
12061
  /**
11421
12062
  * Invite User
11422
12063
  * @description Invite User
@@ -12852,6 +13493,108 @@ export interface operations {
12852
13493
  };
12853
13494
  };
12854
13495
  };
13496
+ /**
13497
+ * List Buckets
13498
+ * @description List Buckets
13499
+ *
13500
+ * List available meta information about all policy KV store buckets in the org.
13501
+ */
13502
+ listPolicyBuckets: {
13503
+ parameters: {
13504
+ query?: {
13505
+ /**
13506
+ * @description Max number of items to return per page.
13507
+ *
13508
+ * If the actual number of returned items may be less that this, even if there exist more
13509
+ * data in the result set. To reliably determine if more data is left in the result set,
13510
+ * inspect the [UnencryptedLastEvalKey] value in the response object.
13511
+ */
13512
+ "page.size"?: number;
13513
+ /**
13514
+ * @description The start of the page. Omit to start from the beginning; otherwise, only specify a
13515
+ * the exact value previously returned as 'last_evaluated_key' from the same endpoint.
13516
+ */
13517
+ "page.start"?: string | null;
13518
+ };
13519
+ path: {
13520
+ /**
13521
+ * @description Name or ID of the desired Org
13522
+ * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
13523
+ */
13524
+ org_id: string;
13525
+ };
13526
+ };
13527
+ responses: {
13528
+ 200: components["responses"]["PaginatedListBucketsResponse"];
13529
+ default: {
13530
+ content: {
13531
+ "application/json": components["schemas"]["ErrorResponse"];
13532
+ };
13533
+ };
13534
+ };
13535
+ };
13536
+ /**
13537
+ * Get Bucket
13538
+ * @description Get Bucket
13539
+ *
13540
+ * Returns the meta information of a policy KV store bucket.
13541
+ */
13542
+ getPolicyBucket: {
13543
+ parameters: {
13544
+ path: {
13545
+ /**
13546
+ * @description Name or ID of the desired Org
13547
+ * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
13548
+ */
13549
+ org_id: string;
13550
+ bucket_name: string;
13551
+ };
13552
+ };
13553
+ responses: {
13554
+ 200: components["responses"]["BucketInfo"];
13555
+ default: {
13556
+ content: {
13557
+ "application/json": components["schemas"]["ErrorResponse"];
13558
+ };
13559
+ };
13560
+ };
13561
+ };
13562
+ /**
13563
+ * Update Bucket
13564
+ * @description Update Bucket
13565
+ *
13566
+ * Updates meta information for an existing policy KV store bucket.
13567
+ */
13568
+ updatePolicyBucket: {
13569
+ parameters: {
13570
+ path: {
13571
+ /**
13572
+ * @description Name or ID of the desired Org
13573
+ * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
13574
+ */
13575
+ org_id: string;
13576
+ bucket_name: string;
13577
+ };
13578
+ };
13579
+ requestBody: {
13580
+ content: {
13581
+ "application/json": components["schemas"]["UpdateBucketRequest"];
13582
+ };
13583
+ };
13584
+ responses: {
13585
+ 200: components["responses"]["BucketInfo"];
13586
+ 202: {
13587
+ content: {
13588
+ "application/json": components["schemas"]["AcceptedResponse"];
13589
+ };
13590
+ };
13591
+ default: {
13592
+ content: {
13593
+ "application/json": components["schemas"]["ErrorResponse"];
13594
+ };
13595
+ };
13596
+ };
13597
+ };
12855
13598
  /**
12856
13599
  * Create Policy Import Key
12857
13600
  * @description Create Policy Import Key
@@ -12882,7 +13625,7 @@ export interface operations {
12882
13625
  * Get the org-wide policy secrets.
12883
13626
  * @description Get the org-wide policy secrets.
12884
13627
  *
12885
- * Note that this only returns the keys for the secrets, omiting the values.
13628
+ * Note that this only returns the keys for the secrets, omitting the values.
12886
13629
  * The values are secret and are not accessible outside Wasm policy execution.
12887
13630
  */
12888
13631
  getPolicySecrets: {
@@ -12910,6 +13653,8 @@ export interface operations {
12910
13653
  *
12911
13654
  * The provided secrets will replace any existing org-level secrets.
12912
13655
  * It fails if the secrets weren't previously created.
13656
+ *
13657
+ * Must be permitted by the policy secret's edit policy if set, and the org's edit policy otherwise.
12913
13658
  */
12914
13659
  updatePolicySecrets: {
12915
13660
  parameters: {
@@ -12941,8 +13686,9 @@ export interface operations {
12941
13686
  };
12942
13687
  };
12943
13688
  /**
12944
- * Create or overwrite an org-level policy secret
12945
- * @description Create or overwrite an org-level policy secret
13689
+ * Create or overwrite an org-level policy secret.
13690
+ * @description Create or overwrite an org-level policy secret.
13691
+ * Must be permitted by the policy secret's edit policy if set, and the org's edit policy otherwise.
12946
13692
  */
12947
13693
  setPolicySecret: {
12948
13694
  parameters: {
@@ -12975,8 +13721,9 @@ export interface operations {
12975
13721
  };
12976
13722
  };
12977
13723
  /**
12978
- * Delete an org-level policy secret
12979
- * @description Delete an org-level policy secret
13724
+ * Delete an org-level policy secret.
13725
+ * @description Delete an org-level policy secret.
13726
+ * Must be permitted by the policy secret's edit policy if set, and the org's edit policy otherwise.
12980
13727
  */
12981
13728
  deletePolicySecret: {
12982
13729
  parameters: {
@@ -13684,6 +14431,34 @@ export interface operations {
13684
14431
  };
13685
14432
  };
13686
14433
  };
14434
+ /**
14435
+ * High-level RPC endpoint.
14436
+ * @description High-level RPC endpoint.
14437
+ */
14438
+ rpcApi: {
14439
+ parameters: {
14440
+ path: {
14441
+ /**
14442
+ * @description Name or ID of the desired Org
14443
+ * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
14444
+ */
14445
+ org_id: string;
14446
+ };
14447
+ };
14448
+ requestBody: {
14449
+ content: {
14450
+ "application/json": components["schemas"]["JsonRpcRequest"];
14451
+ };
14452
+ };
14453
+ responses: {
14454
+ 200: components["responses"]["JsonRpcResponse"];
14455
+ default: {
14456
+ content: {
14457
+ "application/json": components["schemas"]["ErrorResponse"];
14458
+ };
14459
+ };
14460
+ };
14461
+ };
13687
14462
  /**
13688
14463
  * List sessions
13689
14464
  * @description List sessions
@@ -14883,35 +15658,6 @@ export interface operations {
14883
15658
  };
14884
15659
  };
14885
15660
  };
14886
- /**
14887
- * The policy_execute API endpoint is intended to demonstrate that the signer
14888
- * @description The policy_execute API endpoint is intended to demonstrate that the signer
14889
- * can use the policy engine, by way of the PolicyEngineClient.
14890
- */
14891
- "policy-execute": {
14892
- parameters: {
14893
- path: {
14894
- /**
14895
- * @description Base64Url-nopad of the sha256 digest of the policy binary
14896
- * @example 123456
14897
- */
14898
- policy_name: string;
14899
- };
14900
- };
14901
- requestBody: {
14902
- content: {
14903
- "application/json": Record<string, never>;
14904
- };
14905
- };
14906
- responses: {
14907
- 200: components["responses"]["PolicyResultResponse"];
14908
- default: {
14909
- content: {
14910
- "application/json": components["schemas"]["ErrorResponse"];
14911
- };
14912
- };
14913
- };
14914
- };
14915
15661
  /**
14916
15662
  * Initiate registration of a FIDO key
14917
15663
  * @deprecated