@cubist-labs/cubesigner-sdk 0.4.231 → 0.4.237
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/dist/package.json +1 -1
- package/dist/src/bucket.d.ts +19 -0
- package/dist/src/bucket.d.ts.map +1 -0
- package/dist/src/bucket.js +17 -0
- package/dist/src/client/api_client.d.ts +39 -2
- package/dist/src/client/api_client.d.ts.map +1 -1
- package/dist/src/client/api_client.js +75 -9
- package/dist/src/index.d.ts +2 -0
- package/dist/src/index.d.ts.map +1 -1
- package/dist/src/index.js +3 -1
- package/dist/src/org.d.ts +11 -0
- package/dist/src/org.d.ts.map +1 -1
- package/dist/src/org.js +17 -1
- package/dist/src/policy.d.ts +5 -3
- package/dist/src/policy.d.ts.map +1 -1
- package/dist/src/policy.js +2 -2
- package/dist/src/role.d.ts +13 -1
- package/dist/src/role.d.ts.map +1 -1
- package/dist/src/role.js +1 -1
- package/dist/src/schema.d.ts +813 -67
- package/dist/src/schema.d.ts.map +1 -1
- package/dist/src/schema.js +1 -1
- package/dist/src/schema_types.d.ts +11 -0
- package/dist/src/schema_types.d.ts.map +1 -1
- package/dist/src/schema_types.js +11 -1
- package/dist/src/scopes.d.ts.map +1 -1
- package/dist/src/scopes.js +46 -6
- package/package.json +1 -1
- package/src/bucket.ts +30 -0
- package/src/client/api_client.ts +99 -13
- package/src/index.ts +2 -0
- package/src/org.ts +18 -0
- package/src/policy.ts +8 -5
- package/src/role.ts +12 -0
- package/src/schema.ts +1195 -350
- package/src/schema_types.ts +16 -1
- package/src/scopes.ts +45 -5
package/dist/src/schema.d.ts
CHANGED
|
@@ -399,7 +399,23 @@ export interface paths {
|
|
|
399
399
|
post: operations["diffieHellmanExchange"];
|
|
400
400
|
};
|
|
401
401
|
"/v0/org/{org_id}/emails/{purpose}": {
|
|
402
|
+
/**
|
|
403
|
+
* Get Email Template
|
|
404
|
+
* @description Get Email Template
|
|
405
|
+
*
|
|
406
|
+
* Returns the email template for a given purpose.
|
|
407
|
+
*/
|
|
408
|
+
get: operations["getEmailConfig"];
|
|
409
|
+
/**
|
|
410
|
+
* Configure Email Template
|
|
411
|
+
* @description Configure Email Template
|
|
412
|
+
*/
|
|
402
413
|
put: operations["configureEmail"];
|
|
414
|
+
/**
|
|
415
|
+
* Delete Email Template
|
|
416
|
+
* @description Delete Email Template
|
|
417
|
+
*/
|
|
418
|
+
delete: operations["deleteEmailConfig"];
|
|
403
419
|
};
|
|
404
420
|
"/v0/org/{org_id}/evm/eip191/sign/{pubkey}": {
|
|
405
421
|
/**
|
|
@@ -577,6 +593,23 @@ export interface paths {
|
|
|
577
593
|
*/
|
|
578
594
|
post: operations["invitationAccept"];
|
|
579
595
|
};
|
|
596
|
+
"/v0/org/{org_id}/invitations": {
|
|
597
|
+
/**
|
|
598
|
+
* List pending invitations
|
|
599
|
+
* @description List pending invitations
|
|
600
|
+
*
|
|
601
|
+
* Returns all pending (not yet accepted) invitations for the organization.
|
|
602
|
+
*/
|
|
603
|
+
get: operations["listInvitations"];
|
|
604
|
+
/**
|
|
605
|
+
* Cancel a pending invitation
|
|
606
|
+
* @description Cancel a pending invitation
|
|
607
|
+
*
|
|
608
|
+
* Removes a pending invitation from the organization. If no pending invitation
|
|
609
|
+
* exists for the given email address, a not-found error is returned.
|
|
610
|
+
*/
|
|
611
|
+
delete: operations["cancelInvitation"];
|
|
612
|
+
};
|
|
580
613
|
"/v0/org/{org_id}/invite": {
|
|
581
614
|
/**
|
|
582
615
|
* Invite User
|
|
@@ -998,6 +1031,31 @@ export interface paths {
|
|
|
998
1031
|
*/
|
|
999
1032
|
post: operations["invokePolicy"];
|
|
1000
1033
|
};
|
|
1034
|
+
"/v0/org/{org_id}/policy/buckets": {
|
|
1035
|
+
/**
|
|
1036
|
+
* List Buckets
|
|
1037
|
+
* @description List Buckets
|
|
1038
|
+
*
|
|
1039
|
+
* List available meta information about all policy KV store buckets in the org.
|
|
1040
|
+
*/
|
|
1041
|
+
get: operations["listPolicyBuckets"];
|
|
1042
|
+
};
|
|
1043
|
+
"/v0/org/{org_id}/policy/buckets/{bucket_name}": {
|
|
1044
|
+
/**
|
|
1045
|
+
* Get Bucket
|
|
1046
|
+
* @description Get Bucket
|
|
1047
|
+
*
|
|
1048
|
+
* Returns the meta information of a policy KV store bucket.
|
|
1049
|
+
*/
|
|
1050
|
+
get: operations["getPolicyBucket"];
|
|
1051
|
+
/**
|
|
1052
|
+
* Update Bucket
|
|
1053
|
+
* @description Update Bucket
|
|
1054
|
+
*
|
|
1055
|
+
* Updates meta information for an existing policy KV store bucket.
|
|
1056
|
+
*/
|
|
1057
|
+
patch: operations["updatePolicyBucket"];
|
|
1058
|
+
};
|
|
1001
1059
|
"/v0/org/{org_id}/policy/import_key": {
|
|
1002
1060
|
/**
|
|
1003
1061
|
* Create Policy Import Key
|
|
@@ -1013,7 +1071,7 @@ export interface paths {
|
|
|
1013
1071
|
* Get the org-wide policy secrets.
|
|
1014
1072
|
* @description Get the org-wide policy secrets.
|
|
1015
1073
|
*
|
|
1016
|
-
* Note that this only returns the keys for the secrets,
|
|
1074
|
+
* Note that this only returns the keys for the secrets, omitting the values.
|
|
1017
1075
|
* The values are secret and are not accessible outside Wasm policy execution.
|
|
1018
1076
|
*/
|
|
1019
1077
|
get: operations["getPolicySecrets"];
|
|
@@ -1023,18 +1081,22 @@ export interface paths {
|
|
|
1023
1081
|
*
|
|
1024
1082
|
* The provided secrets will replace any existing org-level secrets.
|
|
1025
1083
|
* It fails if the secrets weren't previously created.
|
|
1084
|
+
*
|
|
1085
|
+
* Must be permitted by the policy secret's edit policy if set, and the org's edit policy otherwise.
|
|
1026
1086
|
*/
|
|
1027
1087
|
patch: operations["updatePolicySecrets"];
|
|
1028
1088
|
};
|
|
1029
1089
|
"/v0/org/{org_id}/policy/secrets/{secret_name}": {
|
|
1030
1090
|
/**
|
|
1031
|
-
* Create or overwrite an org-level policy secret
|
|
1032
|
-
* @description Create or overwrite an org-level policy secret
|
|
1091
|
+
* Create or overwrite an org-level policy secret.
|
|
1092
|
+
* @description Create or overwrite an org-level policy secret.
|
|
1093
|
+
* Must be permitted by the policy secret's edit policy if set, and the org's edit policy otherwise.
|
|
1033
1094
|
*/
|
|
1034
1095
|
put: operations["setPolicySecret"];
|
|
1035
1096
|
/**
|
|
1036
|
-
* Delete an org-level policy secret
|
|
1037
|
-
* @description Delete an org-level policy secret
|
|
1097
|
+
* Delete an org-level policy secret.
|
|
1098
|
+
* @description Delete an org-level policy secret.
|
|
1099
|
+
* Must be permitted by the policy secret's edit policy if set, and the org's edit policy otherwise.
|
|
1038
1100
|
*/
|
|
1039
1101
|
delete: operations["deletePolicySecret"];
|
|
1040
1102
|
};
|
|
@@ -1205,6 +1267,13 @@ export interface paths {
|
|
|
1205
1267
|
*/
|
|
1206
1268
|
delete: operations["removeUserFromRole"];
|
|
1207
1269
|
};
|
|
1270
|
+
"/v0/org/{org_id}/rpc": {
|
|
1271
|
+
/**
|
|
1272
|
+
* High-level RPC endpoint.
|
|
1273
|
+
* @description High-level RPC endpoint.
|
|
1274
|
+
*/
|
|
1275
|
+
post: operations["rpcApi"];
|
|
1276
|
+
};
|
|
1208
1277
|
"/v0/org/{org_id}/session": {
|
|
1209
1278
|
/**
|
|
1210
1279
|
* List sessions
|
|
@@ -1520,14 +1589,6 @@ export interface paths {
|
|
|
1520
1589
|
*/
|
|
1521
1590
|
patch: operations["passkeyAuthComplete"];
|
|
1522
1591
|
};
|
|
1523
|
-
"/v0/private/policy-execute/{policy_name}": {
|
|
1524
|
-
/**
|
|
1525
|
-
* The policy_execute API endpoint is intended to demonstrate that the signer
|
|
1526
|
-
* @description The policy_execute API endpoint is intended to demonstrate that the signer
|
|
1527
|
-
* can use the policy engine, by way of the PolicyEngineClient.
|
|
1528
|
-
*/
|
|
1529
|
-
post: operations["policy-execute"];
|
|
1530
|
-
};
|
|
1531
1592
|
"/v0/user/me/fido": {
|
|
1532
1593
|
/**
|
|
1533
1594
|
* Initiate registration of a FIDO key
|
|
@@ -1817,8 +1878,7 @@ export interface components {
|
|
|
1817
1878
|
*/
|
|
1818
1879
|
Aud: string | string[];
|
|
1819
1880
|
AuditLogEntry: {
|
|
1820
|
-
|
|
1821
|
-
event: string;
|
|
1881
|
+
event: components["schemas"]["OrgEventDiscriminants"];
|
|
1822
1882
|
/** @description UUID of the event. Unique across all events. */
|
|
1823
1883
|
event_id: string;
|
|
1824
1884
|
org_id: components["schemas"]["Id"];
|
|
@@ -2640,7 +2700,7 @@ export interface components {
|
|
|
2640
2700
|
/** @enum {string} */
|
|
2641
2701
|
BadGatewayErrorCode: "Generic" | "CustomChainRpcError" | "EsploraApiError" | "SentryApiError" | "CallWebhookError" | "OAuthProviderError" | "OidcDisoveryFailed" | "OidcIssuerJwkEndpointUnavailable" | "SmtpServerUnavailable";
|
|
2642
2702
|
/** @enum {string} */
|
|
2643
|
-
BadRequestErrorCode: "GenericBadRequest" | "DisallowedAllowRuleReference" | "InvalidPaginationToken" | "InvalidEmail" | "InvalidEmailTemplate" | "QueryMetricsError" | "InvalidTelegramData" | "ValidationError" | "WebhookPolicyTimeoutOutOfBounds" | "WebhookPolicyDisallowedUrlScheme" | "WebhookPolicyDisallowedUrlHost" | "WebhookPolicyDisallowedHeaders" | "ReservedName" | "UserEmailNotConfigured" | "EmailPasswordNotFound" | "PasswordAuthNotAllowedByInvitation" | "OneTimeCodeExpired" | "InvalidBody" | "InvalidJwt" | "InvitationNoLongerValid" | "TokenRequestError" | "InvalidMfaReceipt" | "InvalidMfaPolicyCount" | "InvalidMfaPolicyNumAuthFactors" | "InvalidMfaPolicyNumAllowedApprovers" | "InvalidMfaPolicyGracePeriodTooLong" | "InvalidBabylonStakingPolicyParams" | "InvalidSuiTxReceiversEmptyAllowlist" | "InvalidBtcTxReceiversEmptyAllowlist" | "InvalidRequireRoleSessionAllowlist" | "InvalidCreateKeyCount" | "InvalidDiffieHellmanCount" | "OrgInviteExistingUser" | "OrgUserAlreadyExists" | "OrgNameTaken" | "KwkNotFoundInRegion" | "OrgIsNotOrgExport" | "RoleNameTaken" | "PolicyNameTaken" | "NameTaken" | "ContactNameInvalid" | "ContactAddressesInvalid" | "ContactLabelInvalid" | "ContactModified" | "PolicyNotFound" | "PolicyVersionNotFound" | "PolicyRuleDisallowedByType" | "PolicyTypeDisallowed" | "PolicyDuplicateError" | "PolicyStillAttached" | "PolicyModified" | "PolicyNotAttached" | "AddKeyToRoleCountTooHigh" | "InvalidKeyId" | "InvalidTimeLockAlreadyInThePast" | "InvalidRestrictedScopes" | "InvalidUpdate" | "InvalidMetadataLength" | "InvalidLength" | "InvalidKeyMaterialId" | "KeyNotFound" | "SiweChallengeNotFound" | "SiweInvalidRequest" | "UserExportDerivedKey" | "UserExportPublicKeyInvalid" | "NistP256PublicKeyInvalid" | "UnableToAccessSmtpRelay" | "UserExportInProgress" | "RoleNotFound" | "InvalidRoleNameOrId" | "InvalidMfaReceiptOrgIdMissing" | "InvalidMfaReceiptInvalidOrgId" | "MfaRequestNotFound" | "InvalidKeyType" | "InvalidKeyMaterial" | "InvalidHexValue" | "InvalidBase32Value" | "InvalidBase58Value" | "InvalidSs58Value" | "InvalidForkVersionLength" | "InvalidEthAddress" | "InvalidStellarAddress" | "InvalidOrgNameOrId" | "InvalidUpdateOrgRequestDisallowedMfaType" | "InvalidUpdateOrgRequestEmptyAllowedMfaTypes" | "EmailOtpDelayTooShortForRegisterMfa" | "InvalidStakeDeposit" | "InvalidBlobSignRequest" | "InvalidDiffieHellmanRequest" | "InvalidSolanaSignRequest" | "InvalidEip712SignRequest" | "OnlySpecifyOne" | "NoOidcDataInProof" | "InvalidEvmSignRequest" | "InvalidEth2SignRequest" | "InvalidDeriveKeyRequest" | "InvalidStakingAmount" | "CustomStakingAmountNotAllowedForWrapperContract" | "InvalidUnstakeRequest" | "InvalidCreateUserRequest" | "UserAlreadyExists" | "IdpUserAlreadyExists" | "CognitoUserAlreadyOrgMember" | "UserNotFound" | "UserWithEmailNotFound" | "PolicyKeyMismatch" | "EmptyScopes" | "InvalidScopesForRoleSession" | "InvalidLifetime" | "NoSingleKeyForUser" | "InvalidOrgPolicyRule" | "SourceIpAllowlistEmpty" | "LimitWindowTooLong" | "Erc20ContractDisallowed" | "EmptyRuleError" | "OptionalListEmpty" | "MultipleExclusiveFieldsProvided" | "DuplicateFieldEntry" | "InvalidRange" | "InvalidOrgPolicyRepeatedRule" | "InvalidSuiTransaction" | "SuiSenderMismatch" | "AvaSignHashError" | "AvaSignError" | "BtcSegwitHashError" | "BtcTaprootHashError" | "BtcSignError" | "TaprootSignError" | "Eip712SignError" | "InvalidMemberRoleInUserAdd" | "InvalidMemberRoleInRecipientAdd" | "ThirdPartyUserAlreadyExists" | "OidcIdentityAlreadyExists" | "UserAlreadyHasIdentity" | "ThirdPartyUserNotFound" | "DeleteOidcUserError" | "DeleteUserError" | "SessionRoleMismatch" | "InvalidOidcToken" | "InvalidOidcIdentity" | "OidcIssuerUnsupported" | "OidcIssuerNotAllowed" | "OidcIssuerNoApplicableJwk" | "FidoKeyAlreadyRegistered" | "FidoKeySignCountTooLow" | "FidoVerificationFailed" | "FidoChallengeMfaMismatch" | "UnsupportedLegacyCognitoSession" | "InvalidIdentityProof" | "PaginationDataExpired" | "ExistingKeysViolateExclusiveKeyAccess" | "ExportDelayTooShort" | "ExportWindowTooLong" | "InvalidTotpFailureLimit" | "InvalidEip191SignRequest" | "CannotResendUserInvitation" | "InvalidNotificationEndpointCount" | "CannotDeletePendingSubscription" | "InvalidNotificationUrlProtocol" | "EmptyOneOfOrgEventFilter" | "EmptyAllExceptOrgEventFilter" | "InvalidTapNodeHash" | "InvalidOneTimeCode" | "MessageNotFound" | "MessageAlreadySigned" | "MessageRejected" | "MessageReplaced" | "InvalidMessageType" | "EmptyAddress" | "InvalidEth2SigningPolicySlotRange" | "InvalidEth2SigningPolicyEpochRange" | "InvalidEth2SigningPolicyTimestampRange" | "InvalidEth2SigningPolicyOverlappingRule" | "RpcUrlMissing" | "MmiChainIdMissing" | "EthersInvalidRpcUrl" | "EthersGetTransactionCountError" | "InvalidPassword" | "BabylonStakingFeePlusDustOverflow" | "BabylonStaking" | "BabylonStakingIncorrectKey" | "BabylonStakingSegwitNonDeposit" | "BabylonStakingRegistrationRequiresTaproot" | "PsbtSigning" | "TooManyResets" | "TooManyRequests" | "TooManyFailedLogins" | "BadBtcMessageSignP2shFlag" | "InvalidTendermintRequest" | "PolicyVersionMaxReached" | "PolicyVersionInvalid" | "PolicySecretLimitReached" | "PolicySecretTooLarge" | "InvalidImportKey" | "AlienOwnerInvalid" | "EmptyUpdateRequest" | "InvalidPolicyReference" | "PolicyEngineDisabled" | "InvalidWasmPolicy" | "InvalidPolicy" | "RedundantDerivationPath" | "ImportKeyMissing" | "InvalidAbiMethods" | "BabylonCovSign" | "InvalidPolicyLogsRequest" | "UserProfileMigrationMultipleEntries" | "UserProfileMigrationTooManyItems" | "InputTooShort" | "InvalidTweakLength" | "InvalidCustomChains";
|
|
2703
|
+
BadRequestErrorCode: "GenericBadRequest" | "DisallowedAllowRuleReference" | "InvalidPaginationToken" | "InvalidEmail" | "InvalidEmailTemplate" | "QueryMetricsError" | "InvalidTelegramData" | "ValidationError" | "WebhookPolicyTimeoutOutOfBounds" | "WebhookPolicyDisallowedUrlScheme" | "WebhookPolicyDisallowedUrlHost" | "WebhookPolicyDisallowedHeaders" | "ReservedName" | "UserEmailNotConfigured" | "EmailPasswordNotFound" | "PasswordAuthNotAllowedByInvitation" | "OneTimeCodeExpired" | "InvalidBody" | "InvalidJwt" | "InvitationNoLongerValid" | "TokenRequestError" | "InvalidMfaReceipt" | "InvalidMfaPolicyCount" | "InvalidMfaPolicyNumAuthFactors" | "InvalidMfaPolicyNumAllowedApprovers" | "InvalidMfaPolicyGracePeriodTooLong" | "InvalidBabylonStakingPolicyParams" | "InvalidSuiTxReceiversEmptyAllowlist" | "InvalidBtcTxReceiversEmptyAllowlist" | "InvalidRequireRoleSessionAllowlist" | "InvalidCreateKeyCount" | "InvalidDiffieHellmanCount" | "OrgInviteExistingUser" | "OrgUserAlreadyExists" | "OrgNameTaken" | "KwkNotFoundInRegion" | "OrgIsNotOrgExport" | "RoleNameTaken" | "PolicyNameTaken" | "NameTaken" | "ContactNameInvalid" | "ContactAddressesInvalid" | "ContactLabelInvalid" | "ContactModified" | "PolicyNotFound" | "PolicyVersionNotFound" | "PolicyRuleDisallowedByType" | "PolicyTypeDisallowed" | "PolicyDuplicateError" | "PolicyStillAttached" | "PolicyModified" | "PolicyNotAttached" | "AddKeyToRoleCountTooHigh" | "InvalidKeyId" | "InvalidTimeLockAlreadyInThePast" | "InvalidRestrictedScopes" | "InvalidUpdate" | "InvalidMetadataLength" | "InvalidLength" | "InvalidKeyMaterialId" | "KeyNotFound" | "SiweChallengeNotFound" | "SiweInvalidRequest" | "UserExportDerivedKey" | "UserExportPublicKeyInvalid" | "NistP256PublicKeyInvalid" | "UnableToAccessSmtpRelay" | "UserExportInProgress" | "RoleNotFound" | "InvalidRoleNameOrId" | "InvalidMfaReceiptOrgIdMissing" | "InvalidMfaReceiptInvalidOrgId" | "MfaRequestNotFound" | "InvalidKeyType" | "InvalidKeyMaterial" | "InvalidHexValue" | "InvalidBase32Value" | "InvalidBase58Value" | "InvalidSs58Value" | "InvalidForkVersionLength" | "InvalidEthAddress" | "InvalidStellarAddress" | "InvalidOrgNameOrId" | "InvalidUpdateOrgRequestDisallowedMfaType" | "InvalidUpdateOrgRequestEmptyAllowedMfaTypes" | "EmailOtpDelayTooShortForRegisterMfa" | "InvalidStakeDeposit" | "InvalidBlobSignRequest" | "InvalidDiffieHellmanRequest" | "InvalidSolanaSignRequest" | "InvalidEip712SignRequest" | "OnlySpecifyOne" | "NoOidcDataInProof" | "InvalidEvmSignRequest" | "InvalidEth2SignRequest" | "InvalidDeriveKeyRequest" | "InvalidStakingAmount" | "CustomStakingAmountNotAllowedForWrapperContract" | "InvalidUnstakeRequest" | "InvalidCreateUserRequest" | "UserAlreadyExists" | "IdpUserAlreadyExists" | "CognitoUserAlreadyOrgMember" | "UserNotFound" | "UserWithEmailNotFound" | "PolicyKeyMismatch" | "EmptyScopes" | "InvalidScopesForRoleSession" | "InvalidLifetime" | "NoSingleKeyForUser" | "InvalidOrgPolicyRule" | "SourceIpAllowlistEmpty" | "LimitWindowTooLong" | "Erc20ContractDisallowed" | "EmptyRuleError" | "OptionalListEmpty" | "MultipleExclusiveFieldsProvided" | "DuplicateFieldEntry" | "InvalidRange" | "InvalidOrgPolicyRepeatedRule" | "InvalidSuiTransaction" | "SuiSenderMismatch" | "AvaSignHashError" | "AvaSignError" | "BtcSegwitHashError" | "BtcTaprootHashError" | "BtcSignError" | "TaprootSignError" | "Eip712SignError" | "InvalidMemberRoleInUserAdd" | "InvalidMemberRoleInRecipientAdd" | "ThirdPartyUserAlreadyExists" | "OidcIdentityAlreadyExists" | "UserAlreadyHasIdentity" | "ThirdPartyUserNotFound" | "DeleteOidcUserError" | "DeleteUserError" | "SessionRoleMismatch" | "InvalidOidcToken" | "InvalidOidcIdentity" | "OidcIssuerUnsupported" | "OidcIssuerNotAllowed" | "OidcIssuerNoApplicableJwk" | "FidoKeyAlreadyRegistered" | "FidoKeySignCountTooLow" | "FidoVerificationFailed" | "FidoChallengeMfaMismatch" | "UnsupportedLegacyCognitoSession" | "InvalidIdentityProof" | "PaginationDataExpired" | "ExistingKeysViolateExclusiveKeyAccess" | "ExportDelayTooShort" | "ExportWindowTooLong" | "InvalidTotpFailureLimit" | "InvalidEip191SignRequest" | "CannotResendUserInvitation" | "InvalidNotificationEndpointCount" | "CannotDeletePendingSubscription" | "InvalidNotificationUrlProtocol" | "EmptyOneOfOrgEventFilter" | "EmptyAllExceptOrgEventFilter" | "InvalidTapNodeHash" | "InvalidOneTimeCode" | "MessageNotFound" | "MessageAlreadySigned" | "MessageRejected" | "MessageReplaced" | "InvalidMessageType" | "EmptyAddress" | "InvalidEth2SigningPolicySlotRange" | "InvalidEth2SigningPolicyEpochRange" | "InvalidEth2SigningPolicyTimestampRange" | "InvalidEth2SigningPolicyOverlappingRule" | "RpcUrlMissing" | "MmiChainIdMissing" | "EthersInvalidRpcUrl" | "EthersGetTransactionCountError" | "InvalidPassword" | "BabylonStakingFeePlusDustOverflow" | "BabylonStaking" | "BabylonStakingIncorrectKey" | "BabylonStakingSegwitNonDeposit" | "BabylonStakingRegistrationRequiresTaproot" | "PsbtSigning" | "TooManyResets" | "TooManyRequests" | "TooManyFailedLogins" | "BadBtcMessageSignP2shFlag" | "InvalidTendermintRequest" | "PolicyVersionMaxReached" | "PolicyVersionInvalid" | "PolicySecretLimitReached" | "PolicySecretTooLarge" | "InvalidImportKey" | "AlienOwnerInvalid" | "EmptyUpdateRequest" | "InvalidPolicyReference" | "PolicyEngineDisabled" | "InvalidWasmPolicy" | "InvalidPolicy" | "RedundantDerivationPath" | "ImportKeyMissing" | "InvalidAbiMethods" | "BabylonCovSign" | "InvalidPolicyLogsRequest" | "UserProfileMigrationMultipleEntries" | "UserProfileMigrationTooManyItems" | "InputTooShort" | "InvalidTweakLength" | "InvalidCustomChains" | "InvalidRpcRequest";
|
|
2644
2704
|
BillingArgs: {
|
|
2645
2705
|
billing_org: components["schemas"]["Id"];
|
|
2646
2706
|
event_type: components["schemas"]["BillingEvent"];
|
|
@@ -2657,7 +2717,7 @@ export interface components {
|
|
|
2657
2717
|
* @description Billing event types.
|
|
2658
2718
|
* @enum {string}
|
|
2659
2719
|
*/
|
|
2660
|
-
BillingEvent: "Mmi" | "MmiMessageGet" | "MmiMessageList" | "MmiMessageSign" | "MmiMessageReject" | "MmiMessageDelete" | "AboutMe" | "UserResetEmailInit" | "UserResetEmailComplete" | "UserDeleteTotp" | "UserResetTotpInit" | "UserResetTotpComplete" | "UserVerifyTotp" | "UserRegisterFidoInit" | "UserRegisterFidoComplete" | "UserDeleteFido" | "CreateProofOidc" | "CreateProofCubeSigner" | "VerifyProof" | "AddOidcIdentity" | "RemoveOidcIdentity" | "ListOidcIdentities" | "GetOrg" | "UpdateOrg" | "GetOrgExport" | "CreateOrg" | "ListKeys" | "AttestKey" | "GetKey" | "GetKeyByMaterialId" | "ListKeyRoles" | "UpdateKey" | "ListHistoricalKeyTx" | "Invite" | "ListUsers" | "GetUser" | "GetUserByEmail" | "GetUserByOidc" | "UpdateMembership" | "ResetMemberMfa" | "CompleteResetMemberMfa" | "CreateRole" | "AttestRole" | "GetRole" | "ListTokenKeys" | "ListRoles" | "GetRoleKey" | "ListRoleKeys" | "ListRoleUsers" | "UpdateRole" | "DeleteRole" | "ConfigureEmail" | "ListHistoricalRoleTx" | "CreatePolicy" | "GetPolicy" | "ListPolicies" | "DeletePolicy" | "UpdatePolicy" | "InvokePolicy" | "GetPolicyLogs" | "UploadWasmPolicy" | "GetPolicySecrets" | "UpdatePolicySecrets" | "SetPolicySecret" | "DeletePolicySecret" | "CreatePolicyImportKey" | "UserExportDelete" | "UserExportList" | "UserExportInit" | "UserExportComplete" | "AddUserToRole" | "RemoveUserFromRole" | "MfaApproveCs" | "MfaRejectCs" | "MfaGet" | "MfaList" | "AddKeysToRole" | "RemoveKeyFromRole" | "CreateToken" | "CreateSession" | "RevokeSession" | "RevokeCurrentSession" | "RevokeSessions" | "ListSessions" | "GetSession" | "SignerSessionRefresh" | "MfaApproveTotp" | "MfaRejectTotp" | "MfaFidoInit" | "MfaApproveFidoComplete" | "MfaRejectFidoComplete" | "MfaEmailInit" | "MfaEmailComplete" | "Cube3signerHeartbeat" | "CreateContact" | "GetContact" | "ListContacts" | "DeleteContact" | "UpdateContact" | "LookupContactsByAddress" | "QueryMetrics" | "QueryAuditLog" | "Counts" | "CreateKey" | "ImportKey" | "CreateKeyImportKey" | "DeriveKey" | "DeleteKey" | "AvaSign" | "AvaSerializedTxSign" | "BabylonRegistration" | "BabylonStaking" | "BabylonCovSign" | "BlobSign" | "BtcMessageSign" | "BtcSign" | "DiffieHellmanExchange" | "PsbtSign" | "PsbtLegacyInputSign" | "PsbtSegwitInputSign" | "PsbtTaprootInputSign" | "TaprootSign" | "Eip712Sign" | "Eip191Sign" | "Eth1Sign" | "Eth2Sign" | "SolanaSign" | "SuiSign" | "TendermintSign" | "Stake" | "Unstake" | "PasskeyAuthInit" | "PasskeyAuthComplete" | "OidcAuth" | "Oauth2Twitter" | "OAuth2TokenRefresh" | "EmailOtpAuth" | "SiweInit" | "SiweComplete" | "TelegramAuth" | "CreateOidcUser" | "DeleteOidcUser" | "DeleteUser" | "CreateEotsNonces" | "EotsSign" | "AuthMigrationIdentityAdd" | "AuthMigrationIdentityRemove" | "AuthMigrationUserUpdate" | "KeyCreated" | "KeyImported" | "InvitationAccept" | "IdpAuthenticate" | "IdpPasswordResetRequest" | "IdpPasswordResetConfirm" | "
|
|
2720
|
+
BillingEvent: "Mmi" | "MmiMessageGet" | "MmiMessageList" | "MmiMessageSign" | "MmiMessageReject" | "MmiMessageDelete" | "AboutMe" | "UserResetEmailInit" | "UserResetEmailComplete" | "UserDeleteTotp" | "UserResetTotpInit" | "UserResetTotpComplete" | "UserVerifyTotp" | "UserRegisterFidoInit" | "UserRegisterFidoComplete" | "UserDeleteFido" | "CreateProofOidc" | "CreateProofCubeSigner" | "VerifyProof" | "AddOidcIdentity" | "RemoveOidcIdentity" | "ListOidcIdentities" | "GetOrg" | "UpdateOrg" | "GetOrgExport" | "CreateOrg" | "ListKeys" | "AttestKey" | "GetKey" | "GetKeyByMaterialId" | "ListKeyRoles" | "UpdateKey" | "ListHistoricalKeyTx" | "Invite" | "CancelInvitation" | "ListInvitations" | "ListUsers" | "GetUser" | "GetUserByEmail" | "GetUserByOidc" | "UpdateMembership" | "ResetMemberMfa" | "CompleteResetMemberMfa" | "CreateRole" | "AttestRole" | "GetRole" | "ListTokenKeys" | "ListRoles" | "GetRoleKey" | "ListRoleKeys" | "ListRoleUsers" | "UpdateRole" | "DeleteRole" | "ConfigureEmail" | "GetEmailConfig" | "DeleteEmailConfig" | "ListHistoricalRoleTx" | "CreatePolicy" | "GetPolicy" | "ListPolicies" | "DeletePolicy" | "UpdatePolicy" | "InvokePolicy" | "GetPolicyLogs" | "UploadWasmPolicy" | "GetPolicySecrets" | "UpdatePolicySecrets" | "SetPolicySecret" | "DeletePolicySecret" | "CreatePolicyImportKey" | "GetPolicyBucket" | "ListPolicyBuckets" | "UpdatePolicyBucket" | "UserExportDelete" | "UserExportList" | "UserExportInit" | "UserExportComplete" | "AddUserToRole" | "RemoveUserFromRole" | "MfaApproveCs" | "MfaRejectCs" | "MfaGet" | "MfaList" | "AddKeysToRole" | "RemoveKeyFromRole" | "CreateToken" | "CreateSession" | "RevokeSession" | "RevokeCurrentSession" | "RevokeSessions" | "ListSessions" | "GetSession" | "SignerSessionRefresh" | "MfaApproveTotp" | "MfaRejectTotp" | "MfaFidoInit" | "MfaApproveFidoComplete" | "MfaRejectFidoComplete" | "MfaEmailInit" | "MfaEmailComplete" | "Cube3signerHeartbeat" | "CreateContact" | "GetContact" | "ListContacts" | "DeleteContact" | "UpdateContact" | "LookupContactsByAddress" | "QueryMetrics" | "QueryAuditLog" | "Counts" | "CreateKey" | "ImportKey" | "CreateKeyImportKey" | "DeriveKey" | "DeleteKey" | "AvaSign" | "AvaSerializedTxSign" | "BabylonRegistration" | "BabylonStaking" | "BabylonCovSign" | "BlobSign" | "BtcMessageSign" | "BtcSign" | "DiffieHellmanExchange" | "PsbtSign" | "PsbtLegacyInputSign" | "PsbtSegwitInputSign" | "PsbtTaprootInputSign" | "TaprootSign" | "Eip712Sign" | "Eip191Sign" | "Eth1Sign" | "Eth2Sign" | "SolanaSign" | "SuiSign" | "TendermintSign" | "Stake" | "Unstake" | "PasskeyAuthInit" | "PasskeyAuthComplete" | "OidcAuth" | "Oauth2Twitter" | "OAuth2TokenRefresh" | "EmailOtpAuth" | "SiweInit" | "SiweComplete" | "TelegramAuth" | "CreateOidcUser" | "DeleteOidcUser" | "DeleteUser" | "CreateEotsNonces" | "EotsSign" | "AuthMigrationIdentityAdd" | "AuthMigrationIdentityRemove" | "AuthMigrationUserUpdate" | "KeyCreated" | "KeyImported" | "InvitationAccept" | "IdpAuthenticate" | "IdpPasswordResetRequest" | "IdpPasswordResetConfirm" | "RpcApi" | "RpcCreateTransaction" | "RpcGetTransaction" | "RpcListTransactions" | "CustomChainRpcCall" | "EsploraApiCall" | "SentryApiCall" | "SentryApiCallPublic" | "MmiJwkSet" | "AttestationJwkSet" | "UserOrgs" | "PublicOrgInfo" | "EmailMyOrgs";
|
|
2661
2721
|
/** @description A bitcoin address and its network. */
|
|
2662
2722
|
BitcoinAddressInfo: {
|
|
2663
2723
|
/**
|
|
@@ -2882,6 +2942,52 @@ export interface components {
|
|
|
2882
2942
|
*/
|
|
2883
2943
|
value: number;
|
|
2884
2944
|
};
|
|
2945
|
+
/**
|
|
2946
|
+
* @description The access-controlled actions that can be performed on a bucket
|
|
2947
|
+
* @enum {string}
|
|
2948
|
+
*/
|
|
2949
|
+
BucketAction: "read:key:value" | "read:key:exists" | "update:key:value" | "delete:key:value" | "scan:keys" | "update:bucket:owner" | "update:bucket:acl" | "update:bucket:metadata";
|
|
2950
|
+
/** @description Information about a policy KV store bucket. */
|
|
2951
|
+
BucketInfo: ({
|
|
2952
|
+
created?: components["schemas"]["EpochDateTime"] | null;
|
|
2953
|
+
last_modified?: components["schemas"]["EpochDateTime"] | null;
|
|
2954
|
+
/**
|
|
2955
|
+
* Format: int64
|
|
2956
|
+
* @description Version of this object
|
|
2957
|
+
*/
|
|
2958
|
+
version?: number;
|
|
2959
|
+
} & {
|
|
2960
|
+
/** @description The access-control entries for the bucket. */
|
|
2961
|
+
acl?: unknown[] | null;
|
|
2962
|
+
/** @description Arbitrary user-defined metadata. */
|
|
2963
|
+
metadata?: unknown;
|
|
2964
|
+
owner: components["schemas"]["Id"];
|
|
2965
|
+
}) & {
|
|
2966
|
+
/** @description The name of the bucket. */
|
|
2967
|
+
name: string;
|
|
2968
|
+
};
|
|
2969
|
+
/**
|
|
2970
|
+
* @description Sub-entity of org where per-bucket metadata (like ACL) is stored.
|
|
2971
|
+
* The [Id] of a [BucketMeta] must be the bucket name.
|
|
2972
|
+
*/
|
|
2973
|
+
BucketMeta: {
|
|
2974
|
+
created?: components["schemas"]["EpochDateTime"] | null;
|
|
2975
|
+
last_modified?: components["schemas"]["EpochDateTime"] | null;
|
|
2976
|
+
/**
|
|
2977
|
+
* Format: int64
|
|
2978
|
+
* @description Version of this object
|
|
2979
|
+
*/
|
|
2980
|
+
version?: number;
|
|
2981
|
+
} & {
|
|
2982
|
+
/** @description The access-control entries for the bucket. */
|
|
2983
|
+
acl?: unknown[] | null;
|
|
2984
|
+
/** @description Arbitrary user-defined metadata. */
|
|
2985
|
+
metadata?: unknown;
|
|
2986
|
+
owner: components["schemas"]["Id"];
|
|
2987
|
+
};
|
|
2988
|
+
CancelInvitationRequest: {
|
|
2989
|
+
email: components["schemas"]["Email"];
|
|
2990
|
+
};
|
|
2885
2991
|
/**
|
|
2886
2992
|
* @description Supported Canton environments.
|
|
2887
2993
|
* @enum {string}
|
|
@@ -3135,6 +3241,36 @@ export interface components {
|
|
|
3135
3241
|
*/
|
|
3136
3242
|
name: string;
|
|
3137
3243
|
};
|
|
3244
|
+
/** @description Parameters for creating an EVM transaction. */
|
|
3245
|
+
CreateEvmTransactionRequest: components["schemas"]["CreateEvmTransferRequest"] & {
|
|
3246
|
+
/** @enum {string} */
|
|
3247
|
+
type: "Transfer";
|
|
3248
|
+
};
|
|
3249
|
+
/** @description Parameters for creating an EVM transfer. */
|
|
3250
|
+
CreateEvmTransferRequest: {
|
|
3251
|
+
token: "CreateEvmTransferRequest";
|
|
3252
|
+
} & Omit<components["schemas"]["EvmToken"], "token"> & components["schemas"]["EvmTxCustomization"] & {
|
|
3253
|
+
/**
|
|
3254
|
+
* Format: int64
|
|
3255
|
+
* @description The EVM chain id this transaction is for.
|
|
3256
|
+
*/
|
|
3257
|
+
chain_id: number;
|
|
3258
|
+
/**
|
|
3259
|
+
* @description The address that the amount will be transferred from.
|
|
3260
|
+
*
|
|
3261
|
+
* Must match the material id of a key the session can access.
|
|
3262
|
+
*/
|
|
3263
|
+
from: string;
|
|
3264
|
+
/** @description The address that the amount will be transferred to. */
|
|
3265
|
+
to: string;
|
|
3266
|
+
/**
|
|
3267
|
+
* @description The amount being transferred, as a hex value.
|
|
3268
|
+
*
|
|
3269
|
+
* This value should be in WEI for native transfers, and in the token's denomination
|
|
3270
|
+
* for ERC-20 transfers.
|
|
3271
|
+
*/
|
|
3272
|
+
value: string;
|
|
3273
|
+
};
|
|
3138
3274
|
CreateKeyImportKeyResponse: components["schemas"]["KeyImportKey"] & {
|
|
3139
3275
|
/**
|
|
3140
3276
|
* @description An attestation document from a secure enclave, including an
|
|
@@ -3293,6 +3429,13 @@ export interface components {
|
|
|
3293
3429
|
*/
|
|
3294
3430
|
scopes?: components["schemas"]["Scope"][] | null;
|
|
3295
3431
|
};
|
|
3432
|
+
/** @description Parameters for the [`cs_createTransaction`](RpcMethod::CreateTransaction) method. */
|
|
3433
|
+
CreateTransactionRequest: {
|
|
3434
|
+
type: "CreateTransactionRequest";
|
|
3435
|
+
} & Omit<components["schemas"]["CreateEvmTransactionRequest"], "type"> & {
|
|
3436
|
+
/** @enum {string} */
|
|
3437
|
+
chain: "Evm";
|
|
3438
|
+
};
|
|
3296
3439
|
/**
|
|
3297
3440
|
* @description An extended form of `PublicKeyCredentialCreationOptions` that allows clients to derive the WebAuthn challenge
|
|
3298
3441
|
* from a structured preimage.
|
|
@@ -4035,6 +4178,33 @@ export interface components {
|
|
|
4035
4178
|
*/
|
|
4036
4179
|
rpc_url: string;
|
|
4037
4180
|
};
|
|
4181
|
+
/** @description An EVM token. */
|
|
4182
|
+
EvmToken: {
|
|
4183
|
+
/** @enum {string} */
|
|
4184
|
+
token: "Native";
|
|
4185
|
+
} | {
|
|
4186
|
+
/** @enum {string} */
|
|
4187
|
+
token: "Erc20";
|
|
4188
|
+
/** @description The ERC-20 token address. */
|
|
4189
|
+
token_address: string;
|
|
4190
|
+
};
|
|
4191
|
+
/** @description EVM-specific transaction details. */
|
|
4192
|
+
EvmTransactionDetails: {
|
|
4193
|
+
/**
|
|
4194
|
+
* @description The transaction hash, as submitted to the chain.
|
|
4195
|
+
*
|
|
4196
|
+
* Can be undefined if the transaction hasn't been signed or submitted yet.
|
|
4197
|
+
*/
|
|
4198
|
+
hash?: string;
|
|
4199
|
+
/**
|
|
4200
|
+
* @description The signature for the transaction.
|
|
4201
|
+
*
|
|
4202
|
+
* Can be undefined if the transaction hasn't been signed yet, or failed to be signed.
|
|
4203
|
+
*/
|
|
4204
|
+
signature?: string;
|
|
4205
|
+
/** @description The transaction itself. */
|
|
4206
|
+
tx: unknown;
|
|
4207
|
+
};
|
|
4038
4208
|
EvmTxCmp: {
|
|
4039
4209
|
/**
|
|
4040
4210
|
* Format: int64
|
|
@@ -4060,6 +4230,34 @@ export interface components {
|
|
|
4060
4230
|
/** @description Whether the 'nonce' property of the EVM transaction is allowed to be different. */
|
|
4061
4231
|
ignore_nonce?: boolean;
|
|
4062
4232
|
};
|
|
4233
|
+
/** @description Optional fields used to customize EVM transactions. */
|
|
4234
|
+
EvmTxCustomization: {
|
|
4235
|
+
/**
|
|
4236
|
+
* @description Optional gas limit.
|
|
4237
|
+
*
|
|
4238
|
+
* If not specified, estimated gas is used.
|
|
4239
|
+
*/
|
|
4240
|
+
gas_limit?: string | null;
|
|
4241
|
+
/**
|
|
4242
|
+
* @description Optional max fee for the transaction.
|
|
4243
|
+
*
|
|
4244
|
+
* If not specified, estimated fees are used.
|
|
4245
|
+
*/
|
|
4246
|
+
max_fee_per_gas?: string | null;
|
|
4247
|
+
/**
|
|
4248
|
+
* @description Optional max priority fee for the transaction.
|
|
4249
|
+
*
|
|
4250
|
+
* If not specified, estimated fees are used.
|
|
4251
|
+
*/
|
|
4252
|
+
max_priority_fee_per_gas?: string | null;
|
|
4253
|
+
/**
|
|
4254
|
+
* @description Optional nonce.
|
|
4255
|
+
*
|
|
4256
|
+
* If not specified, the sender's transaction count from the latest block is
|
|
4257
|
+
* used.
|
|
4258
|
+
*/
|
|
4259
|
+
nonce?: string | null;
|
|
4260
|
+
};
|
|
4063
4261
|
/** @enum {string} */
|
|
4064
4262
|
EvmTxDepositErrorCode: "EvmTxDepositReceiverMismatch" | "EvmTxDepositEmptyData" | "EvmTxDepositEmptyChainId" | "EvmTxDepositEmptyReceiver" | "EvmTxDepositUnexpectedValue" | "EvmTxDepositUnexpectedDataLength" | "EvmTxDepositNoAbi" | "EvmTxDepositNoDepositFunction" | "EvmTxDepositUnexpectedFunctionName" | "EvmTxDepositUnexpectedValidatorKey" | "EvmTxDepositInvalidValidatorKey" | "EvmTxDepositMissingDepositArg" | "EvmTxDepositWrongDepositArgType" | "EvmTxDepositValidatorKeyNotInRole" | "EvmTxDepositUnexpectedWithdrawalCredentials" | "EvmTxDepositUnresolvedRole" | "EvmTxDepositInvalidDepositEncoding";
|
|
4065
4263
|
/**
|
|
@@ -4072,7 +4270,7 @@ export interface components {
|
|
|
4072
4270
|
* @description Explicitly named scopes for accessing CubeSigner APIs
|
|
4073
4271
|
* @enum {string}
|
|
4074
4272
|
*/
|
|
4075
|
-
ExplicitScope: "sign:*" | "sign:ava" | "sign:blob" | "sign:diffieHellman" | "sign:btc:*" | "sign:btc:segwit" | "sign:btc:taproot" | "sign:btc:psbt:*" | "sign:btc:psbt:doge" | "sign:btc:psbt:legacy" | "sign:btc:psbt:segwit" | "sign:btc:psbt:taproot" | "sign:btc:psbt:ltcSegwit" | "sign:btc:message:*" | "sign:btc:message:segwit" | "sign:btc:message:legacy" | "sign:babylon:*" | "sign:babylon:eots:*" | "sign:babylon:eots:nonces" | "sign:babylon:eots:sign" | "sign:babylon:staking:*" | "sign:babylon:staking:deposit" | "sign:babylon:staking:unbond" | "sign:babylon:staking:withdraw" | "sign:babylon:staking:slash" | "sign:babylon:registration" | "sign:babylon:covenant" | "sign:evm:*" | "sign:evm:tx" | "sign:evm:eip191" | "sign:evm:eip712" | "sign:eth2:*" | "sign:eth2:validate" | "sign:eth2:stake" | "sign:eth2:unstake" | "sign:solana" | "sign:sui" | "sign:tendermint" | "sign:mmi" | "manage:*" | "manage:readonly" | "manage:email" | "manage:mfa:*" | "manage:mfa:readonly" | "manage:mfa:list" | "manage:mfa:vote:*" | "manage:mfa:vote:cs" | "manage:mfa:vote:email" | "manage:mfa:vote:fido" | "manage:mfa:vote:totp" | "manage:mfa:register:*" | "manage:mfa:register:fido" | "manage:mfa:register:totp" | "manage:mfa:register:email" | "manage:mfa:unregister:*" | "manage:mfa:unregister:fido" | "manage:mfa:unregister:totp" | "manage:mfa:verify:*" | "manage:mfa:verify:totp" | "manage:key:*" | "manage:key:readonly" | "manage:key:get" | "manage:key:attest" | "manage:key:listRoles" | "manage:key:list" | "manage:key:history:tx:list" | "manage:key:create" | "manage:key:import" | "manage:key:update:*" | "manage:key:update:owner" | "manage:key:update:policy" | "manage:key:update:enabled" | "manage:key:update:metadata" | "manage:key:update:editPolicy" | "manage:key:delete" | "manage:policy:*" | "manage:policy:readonly" | "manage:policy:create" | "manage:policy:get" | "manage:policy:list" | "manage:policy:delete" | "manage:policy:update:*" | "manage:policy:update:owner" | "manage:policy:update:name" | "manage:policy:update:acl" | "manage:policy:update:editPolicy" | "manage:policy:update:metadata" | "manage:policy:update:rule" | "manage:policy:invoke" | "manage:policy:wasm:*" | "manage:policy:wasm:upload" | "manage:policy:secrets:*" | "manage:policy:secrets:get" | "manage:policy:secrets:update:*" | "manage:policy:secrets:update:values" | "manage:policy:secrets:update:acl" | "manage:policy:secrets:update:editPolicy" | "manage:contact:*" | "manage:contact:readonly" | "manage:contact:create" | "manage:contact:get" | "manage:contact:list" | "manage:contact:delete" | "manage:contact:update:*" | "manage:contact:update:name" | "manage:contact:update:addresses" | "manage:contact:update:owner" | "manage:contact:update:labels" | "manage:contact:update:metadata" | "manage:contact:update:editPolicy" | "manage:contact:lookup:*" | "manage:contact:lookup:address" | "manage:policy:createImportKey" | "manage:role:*" | "manage:role:readonly" | "manage:role:create" | "manage:role:delete" | "manage:role:get:*" | "manage:role:attest" | "manage:role:get:keys" | "manage:role:get:keys:list" | "manage:role:get:keys:get" | "manage:role:get:users" | "manage:role:list" | "manage:role:update:*" | "manage:role:update:enabled" | "manage:role:update:policy" | "manage:role:update:editPolicy" | "manage:role:update:key:*" | "manage:role:update:key:add" | "manage:role:update:key:remove" | "manage:role:update:user:*" | "manage:role:update:user:add" | "manage:role:update:user:remove" | "manage:role:history:tx:list" | "manage:identity:*" | "manage:identity:readonly" | "manage:identity:verify" | "manage:identity:add" | "manage:identity:remove" | "manage:identity:list" | "manage:org:*" | "manage:org:create" | "manage:org:metrics:query" | "manage:org:audit:query" | "manage:org:readonly" | "manage:org:addUser" | "manage:org:inviteUser" | "manage:org:inviteAlien" | "manage:org:updateMembership" | "manage:org:listUsers" | "manage:org:user:get" | "manage:org:deleteUser" | "manage:org:get" | "manage:org:user:resetMfa" | "manage:session:*" | "manage:session:readonly" | "manage:session:get" | "manage:session:list" | "manage:session:create" | "manage:session:extend" | "manage:session:revoke" | "manage:export:*" | "manage:export:readonly" | "manage:export:org:*" | "manage:export:org:get" | "manage:export:user:*" | "manage:export:user:delete" | "manage:export:user:list" | "manage:authMigration:*" | "manage:authMigration:identity:add" | "manage:authMigration:identity:remove" | "manage:authMigration:user:update" | "manage:mmi:*" | "manage:mmi:readonly" | "manage:mmi:get" | "manage:mmi:list" | "manage:mmi:reject" | "manage:mmi:delete" | "export:*" | "export:user:*" | "export:user:init" | "export:user:complete" | "mmi:*" | "orgAccess:*" | "orgAccess:child:*";
|
|
4273
|
+
ExplicitScope: "sign:*" | "sign:ava" | "sign:blob" | "sign:diffieHellman" | "sign:btc:*" | "sign:btc:segwit" | "sign:btc:taproot" | "sign:btc:psbt:*" | "sign:btc:psbt:doge" | "sign:btc:psbt:legacy" | "sign:btc:psbt:segwit" | "sign:btc:psbt:taproot" | "sign:btc:psbt:ltcSegwit" | "sign:btc:message:*" | "sign:btc:message:segwit" | "sign:btc:message:legacy" | "sign:babylon:*" | "sign:babylon:eots:*" | "sign:babylon:eots:nonces" | "sign:babylon:eots:sign" | "sign:babylon:staking:*" | "sign:babylon:staking:deposit" | "sign:babylon:staking:unbond" | "sign:babylon:staking:withdraw" | "sign:babylon:staking:slash" | "sign:babylon:registration" | "sign:babylon:covenant" | "sign:evm:*" | "sign:evm:tx" | "sign:evm:eip191" | "sign:evm:eip712" | "sign:eth2:*" | "sign:eth2:validate" | "sign:eth2:stake" | "sign:eth2:unstake" | "sign:solana" | "sign:sui" | "sign:tendermint" | "sign:mmi" | "manage:*" | "manage:readonly" | "manage:email:*" | "manage:email:get" | "manage:email:update" | "manage:email:delete" | "manage:mfa:*" | "manage:mfa:readonly" | "manage:mfa:list" | "manage:mfa:vote:*" | "manage:mfa:vote:cs" | "manage:mfa:vote:email" | "manage:mfa:vote:fido" | "manage:mfa:vote:totp" | "manage:mfa:register:*" | "manage:mfa:register:fido" | "manage:mfa:register:totp" | "manage:mfa:register:email" | "manage:mfa:unregister:*" | "manage:mfa:unregister:fido" | "manage:mfa:unregister:totp" | "manage:mfa:verify:*" | "manage:mfa:verify:totp" | "manage:key:*" | "manage:key:readonly" | "manage:key:get" | "manage:key:attest" | "manage:key:listRoles" | "manage:key:list" | "manage:key:history:tx:list" | "manage:key:create" | "manage:key:import" | "manage:key:update:*" | "manage:key:update:owner" | "manage:key:update:policy" | "manage:key:update:enabled" | "manage:key:update:region" | "manage:key:update:metadata" | "manage:key:update:editPolicy" | "manage:key:delete" | "manage:policy:*" | "manage:policy:readonly" | "manage:policy:create" | "manage:policy:get" | "manage:policy:list" | "manage:policy:delete" | "manage:policy:update:*" | "manage:policy:update:owner" | "manage:policy:update:name" | "manage:policy:update:acl" | "manage:policy:update:editPolicy" | "manage:policy:update:metadata" | "manage:policy:update:rule" | "manage:policy:invoke" | "manage:policy:wasm:*" | "manage:policy:wasm:upload" | "manage:policy:secrets:*" | "manage:policy:secrets:get" | "manage:policy:secrets:update:*" | "manage:policy:secrets:update:values" | "manage:policy:secrets:update:acl" | "manage:policy:secrets:update:editPolicy" | "manage:policy:buckets:*" | "manage:policy:buckets:get" | "manage:policy:buckets:list" | "manage:policy:buckets:update:*" | "manage:policy:buckets:update:owner" | "manage:policy:buckets:update:acl" | "manage:policy:buckets:update:metadata" | "manage:contact:*" | "manage:contact:readonly" | "manage:contact:create" | "manage:contact:get" | "manage:contact:list" | "manage:contact:delete" | "manage:contact:update:*" | "manage:contact:update:name" | "manage:contact:update:addresses" | "manage:contact:update:owner" | "manage:contact:update:labels" | "manage:contact:update:metadata" | "manage:contact:update:editPolicy" | "manage:contact:lookup:*" | "manage:contact:lookup:address" | "manage:policy:createImportKey" | "manage:role:*" | "manage:role:readonly" | "manage:role:create" | "manage:role:delete" | "manage:role:get:*" | "manage:role:attest" | "manage:role:get:keys" | "manage:role:get:keys:list" | "manage:role:get:keys:get" | "manage:role:get:users" | "manage:role:list" | "manage:role:update:*" | "manage:role:update:enabled" | "manage:role:update:policy" | "manage:role:update:editPolicy" | "manage:role:update:actions" | "manage:role:update:key:*" | "manage:role:update:key:add" | "manage:role:update:key:remove" | "manage:role:update:user:*" | "manage:role:update:user:add" | "manage:role:update:user:remove" | "manage:role:history:tx:list" | "manage:identity:*" | "manage:identity:readonly" | "manage:identity:verify" | "manage:identity:add" | "manage:identity:remove" | "manage:identity:list" | "manage:org:*" | "manage:org:create" | "manage:org:metrics:query" | "manage:org:audit:query" | "manage:org:readonly" | "manage:org:addUser" | "manage:org:inviteUser" | "manage:org:inviteAlien" | "manage:org:invitation:list" | "manage:org:invitation:cancel" | "manage:org:updateMembership" | "manage:org:listUsers" | "manage:org:user:get" | "manage:org:deleteUser" | "manage:org:get" | "manage:org:update:*" | "manage:org:update:enabled" | "manage:org:update:policy" | "manage:org:update:signPolicy" | "manage:org:update:export" | "manage:org:update:totpFailureLimit" | "manage:org:update:notificationEndpoints" | "manage:org:update:defaultInviteKind" | "manage:org:update:idpConfiguration" | "manage:org:update:passkeyConfiguration" | "manage:org:update:emailPreferences" | "manage:org:update:historicalData" | "manage:org:update:requireScopeCeiling" | "manage:org:update:alienLoginRequirement" | "manage:org:update:memberLoginRequirement" | "manage:org:update:keyExportRequirement" | "manage:org:update:allowedMfaTypes" | "manage:org:update:policyEngineConf" | "manage:org:update:customChains" | "manage:org:update:extProps" | "manage:org:update:editPolicy" | "manage:org:user:resetMfa" | "manage:session:*" | "manage:session:readonly" | "manage:session:get" | "manage:session:list" | "manage:session:create" | "manage:session:extend" | "manage:session:revoke" | "manage:export:*" | "manage:export:readonly" | "manage:export:org:*" | "manage:export:org:get" | "manage:export:user:*" | "manage:export:user:delete" | "manage:export:user:list" | "manage:authMigration:*" | "manage:authMigration:identity:add" | "manage:authMigration:identity:remove" | "manage:authMigration:user:update" | "manage:mmi:*" | "manage:mmi:readonly" | "manage:mmi:get" | "manage:mmi:list" | "manage:mmi:reject" | "manage:mmi:delete" | "export:*" | "export:user:*" | "export:user:init" | "export:user:complete" | "mmi:*" | "orgAccess:*" | "orgAccess:child:*" | "rpc:*" | "rpc:createTransaction:*" | "rpc:createTransaction:evm" | "rpc:getTransaction" | "rpc:listTransactions";
|
|
4076
4274
|
/**
|
|
4077
4275
|
* @description This type specifies the interpretation of the `fee` field in Babylon
|
|
4078
4276
|
* staking requests. If `sats`, the field is intpreted as a fixed value
|
|
@@ -4128,7 +4326,7 @@ export interface components {
|
|
|
4128
4326
|
request_device_identifier?: boolean;
|
|
4129
4327
|
};
|
|
4130
4328
|
/** @enum {string} */
|
|
4131
|
-
ForbiddenErrorCode: "AlienKeyCreate" | "CannotAssumeIdentity" | "SentryDisallowed" | "PasskeyLoginDisabled" | "PasskeyNotRegistered" | "CannotCreateOrg" | "WrongMfaEmailOtpJwt" | "OrgFlagNotSet" | "FidoRequiredToRemoveTotp" | "OidcIdentityLimitReached" | "OidcScopeCeilingMissing" | "OidcIssuerNotAllowedForMemberRole" | "OidcNoMemberRolesAllowed" | "EmailOtpNotConfigured" | "MfaChallengeExpired" | "ChainIdNotAllowed" | "InvalidOrg" | "OrgIdMismatch" | "SessionForWrongOrg" | "SelfDelete" | "SelfDisable" | "InvalidOrgMembershipRoleChange" | "UserDisabled" | "OrgDisabled" | "OrgNotFound" | "OrgWithoutOwner" | "OrphanedUser" | "OidcUserNotFound" | "UserNotInOrg" | "UserNotOrgOwner" | "UserNotKeyOwner" | "InvalidRole" | "DisabledRole" | "KeyDisabled" | "KeyNotInRole" | "ContactNotInOrg" | "UserExportRequestNotInOrg" | "UserExportRequestInvalid" | "UserExportDisabled" | "UserNotOriginalKeyOwner" | "UserNotInRole" | "MustBeFullMember" | "SessionExpired" | "SessionChanged" | "SessionRevoked" | "ExpectedUserSession" | "SessionRoleChanged" | "ScopedNameNotFound" | "SessionInvalidEpochToken" | "SessionInvalidRefreshToken" | "SessionRefreshTokenExpired" | "InvalidAuthHeader" | "SessionNotFound" | "InvalidArn" | "SessionInvalidAuthToken" | "SessionAuthTokenExpired" | "SessionPossiblyStolenToken" | "MfaDisallowedIdentity" | "MfaDisallowedApprover" | "MfaTypeNotAllowed" | "MfaNotApprovedYet" | "MfaConfirmationCodeMismatch" | "MfaHttpRequestMismatch" | "MfaRemoveBelowMin" | "MfaOrgRequirementNotMet" | "MfaRegistrationDisallowed" | "TotpAlreadyConfigured" | "TotpConfigurationChanged" | "MfaTotpBadConfiguration" | "MfaTotpBadCode" | "MfaTotpRateLimit" | "ImproperSessionScope" | "FullSessionRequired" | "SessionWithoutAnyScopeUnder" | "UserRoleUnprivileged" | "MemberRoleForbidden" | "MfaNotConfigured" | "RemoveLastOidcIdentity" | "OperationNotAllowed" | "OrgExportRetrievalDisabled" | "ChangingKeyExportRequirementIsDisabled" | "AutoAddBlsKeyToProtectedRole" | "UserNotPolicyOwner" | "UserNotContactOwner" | "LegacySessionCannotHaveScopeCeiling" | "RoleInParentOrgNotAllowed" | "RemoveKeyFromRoleUserNotAllowed" | "SiweChallengeExpired" | "SiweMessageNotValid" | "SiweMessageInvalidSignature" | "Acl";
|
|
4329
|
+
ForbiddenErrorCode: "AlienKeyCreate" | "CannotAssumeIdentity" | "SentryDisallowed" | "PasskeyLoginDisabled" | "PasskeyNotRegistered" | "CannotCreateOrg" | "WrongMfaEmailOtpJwt" | "OrgFlagNotSet" | "FidoRequiredToRemoveTotp" | "OidcIdentityLimitReached" | "OidcScopeCeilingMissing" | "OidcIssuerNotAllowedForMemberRole" | "OidcNoMemberRolesAllowed" | "EmailOtpNotConfigured" | "MfaChallengeExpired" | "ChainIdNotAllowed" | "InvalidOrg" | "OrgIdMismatch" | "SessionForWrongOrg" | "SelfDelete" | "SelfDisable" | "InvalidOrgMembershipRoleChange" | "UserDisabled" | "OrgDisabled" | "OrgNotFound" | "OrgWithoutOwner" | "OrphanedUser" | "OidcUserNotFound" | "UserNotInOrg" | "UserNotOrgOwner" | "UserNotKeyOwner" | "InvalidRole" | "DisabledRole" | "KeyDisabled" | "KeyNotInRole" | "ContactNotInOrg" | "UserExportRequestNotInOrg" | "UserExportRequestInvalid" | "UserExportDisabled" | "UserNotOriginalKeyOwner" | "UserNotInRole" | "MustBeFullMember" | "SessionExpired" | "SessionChanged" | "SessionRevoked" | "ExpectedUserSession" | "SessionRoleChanged" | "ScopedNameNotFound" | "SessionInvalidEpochToken" | "SessionInvalidRefreshToken" | "SessionRefreshTokenExpired" | "InvalidAuthHeader" | "SessionNotFound" | "InvalidArn" | "SessionInvalidAuthToken" | "SessionAuthTokenExpired" | "SessionPossiblyStolenToken" | "MfaDisallowedIdentity" | "MfaDisallowedApprover" | "MfaTypeNotAllowed" | "MfaNotApprovedYet" | "MfaConfirmationCodeMismatch" | "MfaHttpRequestMismatch" | "MfaRemoveBelowMin" | "MfaOrgRequirementNotMet" | "MfaRegistrationDisallowed" | "TotpAlreadyConfigured" | "TotpConfigurationChanged" | "MfaTotpBadConfiguration" | "MfaTotpBadCode" | "MfaTotpRateLimit" | "ImproperSessionScope" | "FullSessionRequired" | "SessionWithoutAnyScopeUnder" | "UserRoleUnprivileged" | "MemberRoleForbidden" | "MfaNotConfigured" | "RemoveLastOidcIdentity" | "OperationNotAllowed" | "OrgExportRetrievalDisabled" | "ChangingKeyExportRequirementIsDisabled" | "AutoAddBlsKeyToProtectedRole" | "UserNotPolicyOwner" | "UserNotContactOwner" | "UserNotBucketOwner" | "LegacySessionCannotHaveScopeCeiling" | "RoleInParentOrgNotAllowed" | "RemoveKeyFromRoleUserNotAllowed" | "SiweChallengeExpired" | "SiweMessageNotValid" | "SiweMessageInvalidSignature" | "Acl";
|
|
4132
4330
|
/**
|
|
4133
4331
|
* @description Specifies a fork of the `BeaconChain`, to prevent replay attacks.
|
|
4134
4332
|
* The schema of `Fork` is defined in the [Beacon chain
|
|
@@ -4175,9 +4373,24 @@ export interface components {
|
|
|
4175
4373
|
*/
|
|
4176
4374
|
genesis_validators_root: string;
|
|
4177
4375
|
};
|
|
4376
|
+
/** @description The email sender configuration (without sensitive auth details) */
|
|
4377
|
+
GetEmailConfigResponse: {
|
|
4378
|
+
/** @description The email address that emails are sent from */
|
|
4379
|
+
sender: string;
|
|
4380
|
+
template?: {
|
|
4381
|
+
/** @description An HTML template to use for the body. */
|
|
4382
|
+
body_template: string;
|
|
4383
|
+
/** @description The subject line template */
|
|
4384
|
+
subject_template: string;
|
|
4385
|
+
} | null;
|
|
4386
|
+
};
|
|
4178
4387
|
GetKeysInOrgRequest: {
|
|
4179
4388
|
key_type?: components["schemas"]["KeyType"] | null;
|
|
4180
4389
|
};
|
|
4390
|
+
/** @description Parameters for the [`cs_getTransaction`](RpcMethod::GetTransaction) method. */
|
|
4391
|
+
GetTransactionRequest: {
|
|
4392
|
+
id: components["schemas"]["Id"];
|
|
4393
|
+
};
|
|
4181
4394
|
GetUserByEmailResponse: {
|
|
4182
4395
|
/**
|
|
4183
4396
|
* @description Typically, this array is either empty (if no user with a given email was found)
|
|
@@ -4352,12 +4565,23 @@ export interface components {
|
|
|
4352
4565
|
salt: string;
|
|
4353
4566
|
};
|
|
4354
4567
|
/** @enum {string} */
|
|
4355
|
-
InternalErrorCode: "NoMaterialId" | "InvalidAuditLogEntry" | "UnexpectedCheckerRule" | "UnresolvedPolicyReference" | "UnexpectedAclAction" | "FidoKeyAssociatedWithMultipleUsers" | "ClaimsParseError" | "InvalidThrottleId" | "InvalidEmailAddress" | "EmailTemplateRender" | "OidcIdentityHeaderMissing" | "OidcIdentityParseError" | "SystemTimeError" | "PasswordHashParseError" | "SendMailError" | "ReqwestError" | "EmailConstructionError" | "TsWriteError" | "TsQueryError" | "DbQueryError" | "DbGetError" | "DbDeleteError" | "DbPutError" | "DbUpdateError" | "SerdeError" | "TestAndSetError" | "DbGetItemsError" | "DbWriteError" | "CubistSignerError" | "CwListMetricsError" | "CwPutMetricDataError" | "GetAwsSecretError" | "SecretNotFound" | "KmsGenerateRandomError" | "MalformedTotpBytes" | "KmsGenerateRandomNoResponseError" | "CreateKeyError" | "ParseDerivationPathError" | "SplitSignerError" | "CreateImportKeyError" | "CreateEotsNoncesError" | "EotsSignError" | "BabylonCovSignError" | "CognitoDeleteUserError" | "CognitoListUsersError" | "CognitoGetUserError" | "MissingUserEmail" | "CognitoResendUserInvitation" | "CognitoSetUserPasswordError" | "GenericInternalError" | "AssumeRoleWithoutEvidence" | "OidcAuthWithoutOrg" | "MissingKeyMetadata" | "KmsEnableKeyError" | "KmsDisableKeyError" | "LambdaInvokeError" | "LambdaNoResponseError" | "LambdaFailure" | "LambdaUnparsableResponse" | "SerializeEncryptedExportKeyError" | "DeserializeEncryptedExportKeyError" | "ReEncryptUserExport" | "S3UploadError" | "S3DownloadError" | "S3CopyError" | "S3ListObjectsError" | "S3DeleteObjectsError" | "S3BuildError" | "S3PresignedUrlError" | "ManagedStateMissing" | "InternalHeaderMissing" | "InvalidInternalHeaderValue" | "RequestLocalStateAlreadySet" | "OidcOrgMismatch" | "OidcIssuerInvalidJwk" | "InvalidPkForMaterialId" | "SegwitTweakFailed" | "UncheckedOrg" | "SessionOrgIdMissing" | "AvaSignCredsMissing" | "AvaSignSignatureMissing" | "ExpectedRoleSession" | "InvalidThirdPartyIdentity" | "CognitoGetUser" | "SnsSubscribeError" | "SnsUnsubscribeError" | "SnsGetSubscriptionAttributesError" | "SnsSubscriptionAttributesMissing" | "SnsSetSubscriptionAttributesError" | "SnsPublishBatchError" | "InconsistentMultiValueTestAndSet" | "MaterialIdError" | "InvalidBtcAddress" | "HistoricalTxBodyMissing" | "InvalidOperation" | "ParentOrgNotFound" | "OrgParentLoop" | "ResolvedParentOrgWithNoScopeCeiling" | "InvalidUploadObjectId" | "PolicyEngineNotFound" | "PolicyEngineError" | "PolicySecretsEncryptionError" | "CreatePolicyImportKeyError" | "InvalidAlias" | "EmptyUpdateModifiedObject" | "EmptyUpdateModifiedActions" | "DbContactAddressesInvalid";
|
|
4568
|
+
InternalErrorCode: "NoMaterialId" | "InvalidAuditLogEntry" | "UnexpectedCheckerRule" | "UnresolvedPolicyReference" | "UnexpectedAclAction" | "FidoKeyAssociatedWithMultipleUsers" | "ClaimsParseError" | "InvalidThrottleId" | "InvalidEmailAddress" | "EmailTemplateRender" | "OidcIdentityHeaderMissing" | "OidcIdentityParseError" | "SystemTimeError" | "PasswordHashParseError" | "SendMailError" | "ReqwestError" | "EmailConstructionError" | "TsWriteError" | "TsQueryError" | "DbQueryError" | "DbGetError" | "DbDeleteError" | "DbPutError" | "DbUpdateError" | "SerdeError" | "TestAndSetError" | "DbGetItemsError" | "DbWriteError" | "CubistSignerError" | "CwListMetricsError" | "CwPutMetricDataError" | "GetAwsSecretError" | "SecretNotFound" | "KmsGenerateRandomError" | "MalformedTotpBytes" | "KmsGenerateRandomNoResponseError" | "CreateKeyError" | "ParseDerivationPathError" | "SplitSignerError" | "CreateImportKeyError" | "CreateEotsNoncesError" | "EotsSignError" | "BabylonCovSignError" | "CognitoDeleteUserError" | "CognitoListUsersError" | "CognitoGetUserError" | "MissingUserEmail" | "CognitoResendUserInvitation" | "CognitoSetUserPasswordError" | "GenericInternalError" | "AssumeRoleWithoutEvidence" | "OidcAuthWithoutOrg" | "MissingKeyMetadata" | "KmsEnableKeyError" | "KmsDisableKeyError" | "LambdaInvokeError" | "LambdaNoResponseError" | "LambdaFailure" | "LambdaUnparsableResponse" | "SerializeEncryptedExportKeyError" | "DeserializeEncryptedExportKeyError" | "ReEncryptUserExport" | "S3UploadError" | "S3DownloadError" | "S3CopyError" | "S3ListObjectsError" | "S3DeleteObjectsError" | "S3BuildError" | "S3PresignedUrlError" | "ManagedStateMissing" | "InternalHeaderMissing" | "InvalidInternalHeaderValue" | "RequestLocalStateAlreadySet" | "OidcOrgMismatch" | "OidcIssuerInvalidJwk" | "InvalidPkForMaterialId" | "SegwitTweakFailed" | "UncheckedOrg" | "SessionOrgIdMissing" | "AvaSignCredsMissing" | "AvaSignSignatureMissing" | "ExpectedRoleSession" | "InvalidThirdPartyIdentity" | "CognitoGetUser" | "SnsSubscribeError" | "SnsUnsubscribeError" | "SnsGetSubscriptionAttributesError" | "SnsSubscriptionAttributesMissing" | "SnsSetSubscriptionAttributesError" | "SnsPublishBatchError" | "InconsistentMultiValueTestAndSet" | "MaterialIdError" | "InvalidBtcAddress" | "HistoricalTxBodyMissing" | "InvalidOperation" | "ParentOrgNotFound" | "OrgParentLoop" | "ResolvedParentOrgWithNoScopeCeiling" | "InvalidUploadObjectId" | "PolicyEngineNotFound" | "PolicyEngineError" | "PolicySecretsEncryptionError" | "CreatePolicyImportKeyError" | "InvalidAlias" | "EmptyUpdateModifiedObject" | "EmptyUpdateModifiedActions" | "DbContactAddressesInvalid" | "InvalidEvmSigedRlp" | "InvalidErc20Data" | "InvalidRpcUrl";
|
|
4356
4569
|
InvitationAcceptRequest: {
|
|
4357
4570
|
auth: components["schemas"]["AuthSource"];
|
|
4358
4571
|
/** @description Invitation token */
|
|
4359
4572
|
token: string;
|
|
4360
4573
|
};
|
|
4574
|
+
/** @description Information about a pending invitation */
|
|
4575
|
+
InvitationInfo: {
|
|
4576
|
+
created: components["schemas"]["EpochDateTime"];
|
|
4577
|
+
/** @description The email address the invitation was sent to */
|
|
4578
|
+
email: string;
|
|
4579
|
+
expiration: components["schemas"]["EpochDateTime"];
|
|
4580
|
+
inviter?: components["schemas"]["Id"] | null;
|
|
4581
|
+
/** @description The invited user's name */
|
|
4582
|
+
name: string;
|
|
4583
|
+
role: components["schemas"]["MemberRole"];
|
|
4584
|
+
};
|
|
4361
4585
|
/**
|
|
4362
4586
|
* @description Indicates the auth sources allowed to an invited user
|
|
4363
4587
|
* @enum {string}
|
|
@@ -4502,6 +4726,27 @@ export interface components {
|
|
|
4502
4726
|
/** @description The type of key this package represents */
|
|
4503
4727
|
key_type: string;
|
|
4504
4728
|
};
|
|
4729
|
+
/** @description The top-level JSON-RPC request type. */
|
|
4730
|
+
JsonRpcRequest: {
|
|
4731
|
+
method: "JsonRpcRequest";
|
|
4732
|
+
} & Omit<components["schemas"]["RpcMethod"], "method"> & {
|
|
4733
|
+
/** @description Request ID */
|
|
4734
|
+
id?: string;
|
|
4735
|
+
/** @description JSON-RPC version. */
|
|
4736
|
+
jsonrpc: string;
|
|
4737
|
+
};
|
|
4738
|
+
/** @description The RPC API's response. */
|
|
4739
|
+
JsonRpcResponse: {
|
|
4740
|
+
error?: components["schemas"]["ErrorObj"] | null;
|
|
4741
|
+
/** @description ID from the corresponding request. */
|
|
4742
|
+
id?: unknown;
|
|
4743
|
+
/** @description Constant "2.0". */
|
|
4744
|
+
jsonrpc: string;
|
|
4745
|
+
/** @description Result, if success. */
|
|
4746
|
+
result?: Record<string, unknown> | null;
|
|
4747
|
+
};
|
|
4748
|
+
/** @description Valid `result` from the JSON-RPC API. */
|
|
4749
|
+
JsonRpcResult: components["schemas"]["TransactionInfo"] | components["schemas"]["ListTransactionsPaginatedResponse"];
|
|
4505
4750
|
JwkSetResponse: {
|
|
4506
4751
|
/** @description The keys included in this set */
|
|
4507
4752
|
keys: Record<string, never>[];
|
|
@@ -4664,6 +4909,11 @@ export interface components {
|
|
|
4664
4909
|
ListIdentitiesResponse: {
|
|
4665
4910
|
identities: components["schemas"]["IdentityInfo"][];
|
|
4666
4911
|
};
|
|
4912
|
+
/** @description List of pending invitations */
|
|
4913
|
+
ListInvitationsResponse: {
|
|
4914
|
+
/** @description Pending invitations */
|
|
4915
|
+
invitations: components["schemas"]["InvitationInfo"][];
|
|
4916
|
+
};
|
|
4667
4917
|
ListMfaResponse: {
|
|
4668
4918
|
/** @description All pending MFA requests */
|
|
4669
4919
|
mfa_requests: components["schemas"]["MfaRequestInfo"][];
|
|
@@ -4673,6 +4923,35 @@ export interface components {
|
|
|
4673
4923
|
/** @description All pending messages for a user. */
|
|
4674
4924
|
pending_messages: components["schemas"]["PendingMessageInfo"][];
|
|
4675
4925
|
};
|
|
4926
|
+
/**
|
|
4927
|
+
* @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
|
|
4928
|
+
* value (which can the user pass back to use as a url query parameter to continue pagination).
|
|
4929
|
+
*/
|
|
4930
|
+
ListTransactionsPaginatedResponse: {
|
|
4931
|
+
/** @description A list of transaction infos. */
|
|
4932
|
+
transactions: components["schemas"]["TransactionInfo"][];
|
|
4933
|
+
} & {
|
|
4934
|
+
/**
|
|
4935
|
+
* @description If set, the content of `response` does not contain the entire result set.
|
|
4936
|
+
* To fetch the next page of the result set, call the same endpoint
|
|
4937
|
+
* but specify this value as the 'page.start' query parameter.
|
|
4938
|
+
*/
|
|
4939
|
+
last_evaluated_key?: string | null;
|
|
4940
|
+
};
|
|
4941
|
+
/** @description Parameters for the [`cs_listTransactions`](RpcMethod::ListTransactions) method. */
|
|
4942
|
+
ListTransactionsRequest: components["schemas"]["Page"] & {
|
|
4943
|
+
/**
|
|
4944
|
+
* @description Optional user or role id.
|
|
4945
|
+
*
|
|
4946
|
+
* If defined, the response is filtered to transactions created by the given id.
|
|
4947
|
+
*/
|
|
4948
|
+
owner?: string | null;
|
|
4949
|
+
};
|
|
4950
|
+
/** @description The response to [`cs_listTransactions`](super::request::RpcMethod::ListTransactions) */
|
|
4951
|
+
ListTransactionsResponse: {
|
|
4952
|
+
/** @description A list of transaction infos. */
|
|
4953
|
+
transactions: components["schemas"]["TransactionInfo"][];
|
|
4954
|
+
};
|
|
4676
4955
|
LoginRequest: components["schemas"]["OidcLoginRequest"];
|
|
4677
4956
|
/**
|
|
4678
4957
|
* @description Describes whether a user in an org is an Owner or just a regular member
|
|
@@ -4737,7 +5016,7 @@ export interface components {
|
|
|
4737
5016
|
* @description MFA policy provenance
|
|
4738
5017
|
* @enum {string}
|
|
4739
5018
|
*/
|
|
4740
|
-
provenance: "Key" | "KeyInRole" | "Role" | "User" | "EditPolicy";
|
|
5019
|
+
provenance: "Org" | "Key" | "KeyInRole" | "Role" | "User" | "EditPolicy";
|
|
4741
5020
|
receipt?: components["schemas"]["Receipt"] | null;
|
|
4742
5021
|
/** @description The region this MFA request was created in. It can only be redeemed from the same region. */
|
|
4743
5022
|
region?: string;
|
|
@@ -4908,7 +5187,7 @@ export interface components {
|
|
|
4908
5187
|
/** Format: binary */
|
|
4909
5188
|
NonceValue: string;
|
|
4910
5189
|
/** @enum {string} */
|
|
4911
|
-
NotFoundErrorCode: "UriSegmentMissing" | "UriSegmentInvalid" | "TotpNotConfigured" | "FidoKeyNotFound" | "FidoChallengeNotFound" | "TotpChallengeNotFound" | "UserExportRequestNotFound" | "UserExportCiphertextNotFound" | "OrgExportCiphertextNotFound" | "UploadObjectNotFound" | "PolicySecretNotFound" | "TimestreamDisabled" | "CustomChainNotFound";
|
|
5190
|
+
NotFoundErrorCode: "UriSegmentMissing" | "UriSegmentInvalid" | "TotpNotConfigured" | "FidoKeyNotFound" | "FidoChallengeNotFound" | "TotpChallengeNotFound" | "UserExportRequestNotFound" | "UserExportCiphertextNotFound" | "OrgExportCiphertextNotFound" | "UploadObjectNotFound" | "PolicySecretNotFound" | "BucketMetaNotFound" | "TimestreamDisabled" | "CustomChainNotFound" | "InvitationNotFound" | "TransactionNotFound" | "EmailConfigNotFound";
|
|
4912
5191
|
/** @description The configuration and status of a notification endpoint */
|
|
4913
5192
|
NotificationEndpoint: components["schemas"]["NotificationEndpointSubscription"] & {
|
|
4914
5193
|
status: components["schemas"]["SubscriptionStatus"];
|
|
@@ -5202,6 +5481,17 @@ export interface components {
|
|
|
5202
5481
|
last_state: unknown;
|
|
5203
5482
|
/** @enum {string} */
|
|
5204
5483
|
org_event: "TendermintConcurrentSigning";
|
|
5484
|
+
} | {
|
|
5485
|
+
/** @description The email address of the invited user */
|
|
5486
|
+
email: string;
|
|
5487
|
+
/** @enum {string} */
|
|
5488
|
+
org_event: "InvitationCreated";
|
|
5489
|
+
role: components["schemas"]["MemberRole"];
|
|
5490
|
+
} | {
|
|
5491
|
+
/** @description The email address whose invitation was canceled */
|
|
5492
|
+
email: string;
|
|
5493
|
+
/** @enum {string} */
|
|
5494
|
+
org_event: "InvitationCanceled";
|
|
5205
5495
|
} | {
|
|
5206
5496
|
key_id: components["schemas"]["Id"];
|
|
5207
5497
|
/** @enum {string} */
|
|
@@ -5242,7 +5532,7 @@ export interface components {
|
|
|
5242
5532
|
* @description Auto-generated discriminant enum variants
|
|
5243
5533
|
* @enum {string}
|
|
5244
5534
|
*/
|
|
5245
|
-
OrgEventDiscriminants: "Billing" | "Response" | "OidcAuth" | "Signed" | "BabylonEotsConcurrentSigning" | "Eth2ConcurrentAttestationSigning" | "Eth2ConcurrentBlockSigning" | "Eth2InvalidBlockProposerSlotTooLow" | "Eth2InvalidAttestationSourceEpochTooLow" | "Eth2InvalidAttestationTargetEpochTooLow" | "Eth2Unstake" | "Eth2ExceededMaxUnstake" | "KeyCreated" | "MfaApproved" | "MfaRejected" | "PolicyChanged" | "TendermintConcurrentSigning" | "UserExportInit" | "UserExportComplete" | "WasmPolicyExecuted";
|
|
5535
|
+
OrgEventDiscriminants: "Billing" | "Response" | "OidcAuth" | "Signed" | "BabylonEotsConcurrentSigning" | "Eth2ConcurrentAttestationSigning" | "Eth2ConcurrentBlockSigning" | "Eth2InvalidBlockProposerSlotTooLow" | "Eth2InvalidAttestationSourceEpochTooLow" | "Eth2InvalidAttestationTargetEpochTooLow" | "Eth2Unstake" | "Eth2ExceededMaxUnstake" | "KeyCreated" | "MfaApproved" | "MfaRejected" | "PolicyChanged" | "TendermintConcurrentSigning" | "InvitationCreated" | "InvitationCanceled" | "UserExportInit" | "UserExportComplete" | "WasmPolicyExecuted";
|
|
5246
5536
|
/** @description Filter for org events */
|
|
5247
5537
|
OrgEventFilter: OneOf<[
|
|
5248
5538
|
"All",
|
|
@@ -5260,7 +5550,7 @@ export interface components {
|
|
|
5260
5550
|
/** @description A base64-encoded export ciphertext. */
|
|
5261
5551
|
ciphertext: string;
|
|
5262
5552
|
};
|
|
5263
|
-
OrgInfo: components["schemas"]["MfaRequirements"] & {
|
|
5553
|
+
OrgInfo: components["schemas"]["MfaRequirements"] & components["schemas"]["CommonFields"] & {
|
|
5264
5554
|
access_model: components["schemas"]["AccessModel"];
|
|
5265
5555
|
custom_chains?: components["schemas"]["CustomChainsData"] | null;
|
|
5266
5556
|
default_invite_kind?: components["schemas"]["InviteKind"];
|
|
@@ -5356,6 +5646,15 @@ export interface components {
|
|
|
5356
5646
|
*/
|
|
5357
5647
|
policy?: Record<string, never>[];
|
|
5358
5648
|
policy_engine_configuration?: components["schemas"]["PolicyEngineConfiguration"];
|
|
5649
|
+
/**
|
|
5650
|
+
* @description Global sign policy that applies to every sign operation (every key, every role) in the org
|
|
5651
|
+
* @example [
|
|
5652
|
+
* {
|
|
5653
|
+
* "TxReceiver": "0x0000000000000000000000000000000000000000"
|
|
5654
|
+
* }
|
|
5655
|
+
* ]
|
|
5656
|
+
*/
|
|
5657
|
+
sign_policy?: Record<string, never>[];
|
|
5359
5658
|
/**
|
|
5360
5659
|
* Format: int32
|
|
5361
5660
|
* @description The organization's currently configured TOTP failure limit, i.e., the number
|
|
@@ -5484,6 +5783,21 @@ export interface components {
|
|
|
5484
5783
|
*/
|
|
5485
5784
|
last_evaluated_key?: string | null;
|
|
5486
5785
|
};
|
|
5786
|
+
/**
|
|
5787
|
+
* @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
|
|
5788
|
+
* value (which can the user pass back to use as a url query parameter to continue pagination).
|
|
5789
|
+
*/
|
|
5790
|
+
PaginatedListBucketsResponse: {
|
|
5791
|
+
/** @description The buckets in the organization. */
|
|
5792
|
+
buckets: components["schemas"]["BucketInfo"][];
|
|
5793
|
+
} & {
|
|
5794
|
+
/**
|
|
5795
|
+
* @description If set, the content of `response` does not contain the entire result set.
|
|
5796
|
+
* To fetch the next page of the result set, call the same endpoint
|
|
5797
|
+
* but specify this value as the 'page.start' query parameter.
|
|
5798
|
+
*/
|
|
5799
|
+
last_evaluated_key?: string | null;
|
|
5800
|
+
};
|
|
5487
5801
|
/**
|
|
5488
5802
|
* @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
|
|
5489
5803
|
* value (which can the user pass back to use as a url query parameter to continue pagination).
|
|
@@ -5514,6 +5828,21 @@ export interface components {
|
|
|
5514
5828
|
*/
|
|
5515
5829
|
last_evaluated_key?: string | null;
|
|
5516
5830
|
};
|
|
5831
|
+
/**
|
|
5832
|
+
* @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
|
|
5833
|
+
* value (which can the user pass back to use as a url query parameter to continue pagination).
|
|
5834
|
+
*/
|
|
5835
|
+
PaginatedListInvitationsResponse: {
|
|
5836
|
+
/** @description Pending invitations */
|
|
5837
|
+
invitations: components["schemas"]["InvitationInfo"][];
|
|
5838
|
+
} & {
|
|
5839
|
+
/**
|
|
5840
|
+
* @description If set, the content of `response` does not contain the entire result set.
|
|
5841
|
+
* To fetch the next page of the result set, call the same endpoint
|
|
5842
|
+
* but specify this value as the 'page.start' query parameter.
|
|
5843
|
+
*/
|
|
5844
|
+
last_evaluated_key?: string | null;
|
|
5845
|
+
};
|
|
5517
5846
|
/**
|
|
5518
5847
|
* @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
|
|
5519
5848
|
* value (which can the user pass back to use as a url query parameter to continue pagination).
|
|
@@ -5788,12 +6117,10 @@ export interface components {
|
|
|
5788
6117
|
message_tx?: components["schemas"]["TypedTransaction"] | null;
|
|
5789
6118
|
}) & Record<string, never>;
|
|
5790
6119
|
/**
|
|
5791
|
-
* PolicyAction
|
|
5792
6120
|
* @description The access-controlled actions that can be performed on a named policy.
|
|
5793
|
-
* @example read:policy
|
|
5794
6121
|
* @enum {string}
|
|
5795
6122
|
*/
|
|
5796
|
-
PolicyAction: "read:*" | "read:policy" | "read:logs" | "update:*" | "update:name" | "update:rules" | "update:metadata" | "update:editPolicy" | "update:owner" | "update:acl" | "delete" | "attach" | "sign" | "invoke";
|
|
6123
|
+
PolicyAction: "read:*" | "read" | "read:policy" | "read:logs" | "update:*" | "update" | "update:name" | "update:rules" | "update:metadata" | "update:editPolicy" | "update:owner" | "update:acl" | "delete" | "attach" | "sign" | "invoke";
|
|
5797
6124
|
/** @description The id for attaching a named policy to a key, role, or key in role. */
|
|
5798
6125
|
PolicyAttachedToId: OneOf<[
|
|
5799
6126
|
{
|
|
@@ -5821,6 +6148,13 @@ export interface components {
|
|
|
5821
6148
|
* @example Role#bfe3eccb-731e-430d-b1e5-ac1363e6b06b
|
|
5822
6149
|
*/
|
|
5823
6150
|
role_id: string;
|
|
6151
|
+
},
|
|
6152
|
+
{
|
|
6153
|
+
/**
|
|
6154
|
+
* @description The id of the org the policy should be attached to.
|
|
6155
|
+
* @example Org#b0156abd-53bd-4043-8e55-57f7af9512d5
|
|
6156
|
+
*/
|
|
6157
|
+
org_id: string;
|
|
5824
6158
|
}
|
|
5825
6159
|
]>;
|
|
5826
6160
|
/** @description A struct containing Org-level configurations for the workings of the Policy Engine. */
|
|
@@ -6547,6 +6881,20 @@ export interface components {
|
|
|
6547
6881
|
/** @description A JSON Web Token whose claims contain the `RoleInfo` structure. */
|
|
6548
6882
|
jwt: string;
|
|
6549
6883
|
};
|
|
6884
|
+
/** @description The RPC API method and matching parameters. */
|
|
6885
|
+
RpcMethod: {
|
|
6886
|
+
/** @enum {string} */
|
|
6887
|
+
method: "cs_createTransaction";
|
|
6888
|
+
params: components["schemas"]["CreateTransactionRequest"];
|
|
6889
|
+
} | {
|
|
6890
|
+
/** @enum {string} */
|
|
6891
|
+
method: "cs_getTransaction";
|
|
6892
|
+
params: components["schemas"]["GetTransactionRequest"];
|
|
6893
|
+
} | {
|
|
6894
|
+
/** @enum {string} */
|
|
6895
|
+
method: "cs_listTransactions";
|
|
6896
|
+
params: components["schemas"]["ListTransactionsRequest"];
|
|
6897
|
+
};
|
|
6550
6898
|
/** @description All scopes for accessing CubeSigner APIs */
|
|
6551
6899
|
Scope: components["schemas"]["ExplicitScope"] | string;
|
|
6552
6900
|
/** @description A set of scopes. */
|
|
@@ -7101,6 +7449,16 @@ export interface components {
|
|
|
7101
7449
|
signedRawTransaction?: string | null;
|
|
7102
7450
|
status: components["schemas"]["MmiStatus"];
|
|
7103
7451
|
};
|
|
7452
|
+
/** @description Chain-specific transaction details. */
|
|
7453
|
+
TransactionDetails: components["schemas"]["EvmTransactionDetails"] & {
|
|
7454
|
+
/** @enum {string} */
|
|
7455
|
+
chain: "Evm";
|
|
7456
|
+
};
|
|
7457
|
+
/** @description Information about an existing transaction created by the RPC API. */
|
|
7458
|
+
TransactionInfo: components["schemas"]["Transaction"] & {
|
|
7459
|
+
/** @description The transaction id. */
|
|
7460
|
+
id: string;
|
|
7461
|
+
};
|
|
7104
7462
|
/**
|
|
7105
7463
|
* @description Supported queries
|
|
7106
7464
|
* @enum {string}
|
|
@@ -7316,6 +7674,23 @@ export interface components {
|
|
|
7316
7674
|
/** @description Optional policy evaluation tree. */
|
|
7317
7675
|
policy_eval_tree?: unknown;
|
|
7318
7676
|
} & Record<string, never>;
|
|
7677
|
+
/** @description The information needed to update a bucket. */
|
|
7678
|
+
UpdateBucketRequest: {
|
|
7679
|
+
/** @description Access-control entries defining how the bucket can be accessed. */
|
|
7680
|
+
acl?: unknown;
|
|
7681
|
+
/**
|
|
7682
|
+
* Format: int64
|
|
7683
|
+
* @description If set, updating only succeeds if the current version matches this value.
|
|
7684
|
+
*/
|
|
7685
|
+
expected_version?: number | null;
|
|
7686
|
+
/** @description Optional metadata. */
|
|
7687
|
+
metadata?: unknown;
|
|
7688
|
+
/**
|
|
7689
|
+
* @description Update the owner of the bucket
|
|
7690
|
+
* @example User#00000000-0000-0000-0000-000000000000
|
|
7691
|
+
*/
|
|
7692
|
+
owner?: string | null;
|
|
7693
|
+
};
|
|
7319
7694
|
/** @description The information needed to update a Contact. */
|
|
7320
7695
|
UpdateContactRequest: {
|
|
7321
7696
|
addresses?: components["schemas"]["AddressMap"] | null;
|
|
@@ -7388,6 +7763,7 @@ export interface components {
|
|
|
7388
7763
|
} | null;
|
|
7389
7764
|
custom_chains?: components["schemas"]["CustomChainsData"] | null;
|
|
7390
7765
|
default_invite_kind?: components["schemas"]["InviteKind"] | null;
|
|
7766
|
+
edit_policy?: components["schemas"]["EditPolicy"] | null;
|
|
7391
7767
|
email_preferences?: components["schemas"]["EmailPreferences"] | null;
|
|
7392
7768
|
/** @description If set, update this org's `enabled` field to this value. */
|
|
7393
7769
|
enabled?: boolean | null;
|
|
@@ -7480,6 +7856,18 @@ export interface components {
|
|
|
7480
7856
|
* Owners of the org are exempt from this requirement.
|
|
7481
7857
|
*/
|
|
7482
7858
|
require_scope_ceiling?: boolean | null;
|
|
7859
|
+
/**
|
|
7860
|
+
* @description If set, update this org's sign rule (old sign rules will be overwritten!).
|
|
7861
|
+
* Only "deny"-style rules may be set.
|
|
7862
|
+
* @example [
|
|
7863
|
+
* {
|
|
7864
|
+
* "TxReceiver": [
|
|
7865
|
+
* "0x0000000000000000000000000000000000000000"
|
|
7866
|
+
* ]
|
|
7867
|
+
* }
|
|
7868
|
+
* ]
|
|
7869
|
+
*/
|
|
7870
|
+
sign_policy?: unknown[] | null;
|
|
7483
7871
|
/**
|
|
7484
7872
|
* Format: int32
|
|
7485
7873
|
* @description If set, update this org's TOTP failure limit. After this many failures,
|
|
@@ -7517,6 +7905,7 @@ export interface components {
|
|
|
7517
7905
|
} | null;
|
|
7518
7906
|
custom_chains?: components["schemas"]["CustomChainsData"] | null;
|
|
7519
7907
|
default_invite_kind?: components["schemas"]["InviteKind"] | null;
|
|
7908
|
+
edit_policy?: components["schemas"]["EditPolicy"] | null;
|
|
7520
7909
|
email_preferences?: components["schemas"]["EmailPreferences"] | null;
|
|
7521
7910
|
/** @description The new value of the 'enabled' property */
|
|
7522
7911
|
enabled?: boolean | null;
|
|
@@ -7579,6 +7968,15 @@ export interface components {
|
|
|
7579
7968
|
policy_engine_configuration?: components["schemas"]["PolicyEngineConfiguration"] | null;
|
|
7580
7969
|
/** @description The new value of require_scope_ceiling */
|
|
7581
7970
|
require_scope_ceiling?: boolean | null;
|
|
7971
|
+
/**
|
|
7972
|
+
* @description The new value of the org-wide sign rules
|
|
7973
|
+
* @example [
|
|
7974
|
+
* {
|
|
7975
|
+
* "TxReceiver": "0x0000000000000000000000000000000000000000"
|
|
7976
|
+
* }
|
|
7977
|
+
* ]
|
|
7978
|
+
*/
|
|
7979
|
+
sign_policy?: Record<string, never>[] | null;
|
|
7582
7980
|
/**
|
|
7583
7981
|
* Format: int32
|
|
7584
7982
|
* @description The new value of the TOTP failure limit
|
|
@@ -7596,6 +7994,11 @@ export interface components {
|
|
|
7596
7994
|
* @description The new value of user-export window
|
|
7597
7995
|
*/
|
|
7598
7996
|
user_export_window?: number | null;
|
|
7997
|
+
/**
|
|
7998
|
+
* Format: int64
|
|
7999
|
+
* @description New org version
|
|
8000
|
+
*/
|
|
8001
|
+
version: number;
|
|
7599
8002
|
};
|
|
7600
8003
|
/** @description Request body for updating a named policy. */
|
|
7601
8004
|
UpdatePolicyRequest: {
|
|
@@ -8111,6 +8514,29 @@ export interface components {
|
|
|
8111
8514
|
};
|
|
8112
8515
|
};
|
|
8113
8516
|
};
|
|
8517
|
+
/** @description Information about a policy KV store bucket. */
|
|
8518
|
+
BucketInfo: {
|
|
8519
|
+
content: {
|
|
8520
|
+
"application/json": ({
|
|
8521
|
+
created?: components["schemas"]["EpochDateTime"] | null;
|
|
8522
|
+
last_modified?: components["schemas"]["EpochDateTime"] | null;
|
|
8523
|
+
/**
|
|
8524
|
+
* Format: int64
|
|
8525
|
+
* @description Version of this object
|
|
8526
|
+
*/
|
|
8527
|
+
version?: number;
|
|
8528
|
+
} & {
|
|
8529
|
+
/** @description The access-control entries for the bucket. */
|
|
8530
|
+
acl?: unknown[] | null;
|
|
8531
|
+
/** @description Arbitrary user-defined metadata. */
|
|
8532
|
+
metadata?: unknown;
|
|
8533
|
+
owner: components["schemas"]["Id"];
|
|
8534
|
+
}) & {
|
|
8535
|
+
/** @description The name of the bucket. */
|
|
8536
|
+
name: string;
|
|
8537
|
+
};
|
|
8538
|
+
};
|
|
8539
|
+
};
|
|
8114
8540
|
/** @description The number of users and keys in an org, organized by user role and key type */
|
|
8115
8541
|
ComputeCountsResponse: {
|
|
8116
8542
|
content: {
|
|
@@ -8328,6 +8754,21 @@ export interface components {
|
|
|
8328
8754
|
};
|
|
8329
8755
|
};
|
|
8330
8756
|
};
|
|
8757
|
+
/** @description The email sender configuration (without sensitive auth details) */
|
|
8758
|
+
GetEmailConfigResponse: {
|
|
8759
|
+
content: {
|
|
8760
|
+
"application/json": {
|
|
8761
|
+
/** @description The email address that emails are sent from */
|
|
8762
|
+
sender: string;
|
|
8763
|
+
template?: {
|
|
8764
|
+
/** @description An HTML template to use for the body. */
|
|
8765
|
+
body_template: string;
|
|
8766
|
+
/** @description The subject line template */
|
|
8767
|
+
subject_template: string;
|
|
8768
|
+
} | null;
|
|
8769
|
+
};
|
|
8770
|
+
};
|
|
8771
|
+
};
|
|
8331
8772
|
GetUserByEmailResponse: {
|
|
8332
8773
|
content: {
|
|
8333
8774
|
"application/json": {
|
|
@@ -8396,6 +8837,20 @@ export interface components {
|
|
|
8396
8837
|
"application/json": components["schemas"]["Response"] & Record<string, never>;
|
|
8397
8838
|
};
|
|
8398
8839
|
};
|
|
8840
|
+
/** @description The RPC API's response. */
|
|
8841
|
+
JsonRpcResponse: {
|
|
8842
|
+
content: {
|
|
8843
|
+
"application/json": {
|
|
8844
|
+
error?: components["schemas"]["ErrorObj"] | null;
|
|
8845
|
+
/** @description ID from the corresponding request. */
|
|
8846
|
+
id?: unknown;
|
|
8847
|
+
/** @description Constant "2.0". */
|
|
8848
|
+
jsonrpc: string;
|
|
8849
|
+
/** @description Result, if success. */
|
|
8850
|
+
result?: Record<string, unknown> | null;
|
|
8851
|
+
};
|
|
8852
|
+
};
|
|
8853
|
+
};
|
|
8399
8854
|
/** @description A JSON Web Key set describing the key used to sign JSON Web Tokens */
|
|
8400
8855
|
JwkSetResponse: {
|
|
8401
8856
|
content: {
|
|
@@ -8580,7 +9035,7 @@ export interface components {
|
|
|
8580
9035
|
* @description MFA policy provenance
|
|
8581
9036
|
* @enum {string}
|
|
8582
9037
|
*/
|
|
8583
|
-
provenance: "Key" | "KeyInRole" | "Role" | "User" | "EditPolicy";
|
|
9038
|
+
provenance: "Org" | "Key" | "KeyInRole" | "Role" | "User" | "EditPolicy";
|
|
8584
9039
|
receipt?: components["schemas"]["Receipt"] | null;
|
|
8585
9040
|
/** @description The region this MFA request was created in. It can only be redeemed from the same region. */
|
|
8586
9041
|
region?: string;
|
|
@@ -8632,7 +9087,7 @@ export interface components {
|
|
|
8632
9087
|
};
|
|
8633
9088
|
OrgInfo: {
|
|
8634
9089
|
content: {
|
|
8635
|
-
"application/json": components["schemas"]["MfaRequirements"] & {
|
|
9090
|
+
"application/json": components["schemas"]["MfaRequirements"] & components["schemas"]["CommonFields"] & {
|
|
8636
9091
|
access_model: components["schemas"]["AccessModel"];
|
|
8637
9092
|
custom_chains?: components["schemas"]["CustomChainsData"] | null;
|
|
8638
9093
|
default_invite_kind?: components["schemas"]["InviteKind"];
|
|
@@ -8729,10 +9184,19 @@ export interface components {
|
|
|
8729
9184
|
policy?: Record<string, never>[];
|
|
8730
9185
|
policy_engine_configuration?: components["schemas"]["PolicyEngineConfiguration"];
|
|
8731
9186
|
/**
|
|
8732
|
-
*
|
|
8733
|
-
* @
|
|
8734
|
-
*
|
|
8735
|
-
*
|
|
9187
|
+
* @description Global sign policy that applies to every sign operation (every key, every role) in the org
|
|
9188
|
+
* @example [
|
|
9189
|
+
* {
|
|
9190
|
+
* "TxReceiver": "0x0000000000000000000000000000000000000000"
|
|
9191
|
+
* }
|
|
9192
|
+
* ]
|
|
9193
|
+
*/
|
|
9194
|
+
sign_policy?: Record<string, never>[];
|
|
9195
|
+
/**
|
|
9196
|
+
* Format: int32
|
|
9197
|
+
* @description The organization's currently configured TOTP failure limit, i.e., the number
|
|
9198
|
+
* of times a user can provide an incorrect TOTP code before being rate limited.
|
|
9199
|
+
* This value can be between 1 and 5 (inclusive).
|
|
8736
9200
|
*/
|
|
8737
9201
|
totp_failure_limit: number;
|
|
8738
9202
|
/**
|
|
@@ -8788,6 +9252,21 @@ export interface components {
|
|
|
8788
9252
|
};
|
|
8789
9253
|
};
|
|
8790
9254
|
};
|
|
9255
|
+
PaginatedListBucketsResponse: {
|
|
9256
|
+
content: {
|
|
9257
|
+
"application/json": {
|
|
9258
|
+
/** @description The buckets in the organization. */
|
|
9259
|
+
buckets: components["schemas"]["BucketInfo"][];
|
|
9260
|
+
} & {
|
|
9261
|
+
/**
|
|
9262
|
+
* @description If set, the content of `response` does not contain the entire result set.
|
|
9263
|
+
* To fetch the next page of the result set, call the same endpoint
|
|
9264
|
+
* but specify this value as the 'page.start' query parameter.
|
|
9265
|
+
*/
|
|
9266
|
+
last_evaluated_key?: string | null;
|
|
9267
|
+
};
|
|
9268
|
+
};
|
|
9269
|
+
};
|
|
8791
9270
|
PaginatedListContactsResponse: {
|
|
8792
9271
|
content: {
|
|
8793
9272
|
"application/json": {
|
|
@@ -8818,6 +9297,21 @@ export interface components {
|
|
|
8818
9297
|
};
|
|
8819
9298
|
};
|
|
8820
9299
|
};
|
|
9300
|
+
PaginatedListInvitationsResponse: {
|
|
9301
|
+
content: {
|
|
9302
|
+
"application/json": {
|
|
9303
|
+
/** @description Pending invitations */
|
|
9304
|
+
invitations: components["schemas"]["InvitationInfo"][];
|
|
9305
|
+
} & {
|
|
9306
|
+
/**
|
|
9307
|
+
* @description If set, the content of `response` does not contain the entire result set.
|
|
9308
|
+
* To fetch the next page of the result set, call the same endpoint
|
|
9309
|
+
* but specify this value as the 'page.start' query parameter.
|
|
9310
|
+
*/
|
|
9311
|
+
last_evaluated_key?: string | null;
|
|
9312
|
+
};
|
|
9313
|
+
};
|
|
9314
|
+
};
|
|
8821
9315
|
PaginatedListKeyRolesResponse: {
|
|
8822
9316
|
content: {
|
|
8823
9317
|
"application/json": {
|
|
@@ -9439,6 +9933,7 @@ export interface components {
|
|
|
9439
9933
|
} | null;
|
|
9440
9934
|
custom_chains?: components["schemas"]["CustomChainsData"] | null;
|
|
9441
9935
|
default_invite_kind?: components["schemas"]["InviteKind"] | null;
|
|
9936
|
+
edit_policy?: components["schemas"]["EditPolicy"] | null;
|
|
9442
9937
|
email_preferences?: components["schemas"]["EmailPreferences"] | null;
|
|
9443
9938
|
/** @description The new value of the 'enabled' property */
|
|
9444
9939
|
enabled?: boolean | null;
|
|
@@ -9501,6 +9996,15 @@ export interface components {
|
|
|
9501
9996
|
policy_engine_configuration?: components["schemas"]["PolicyEngineConfiguration"] | null;
|
|
9502
9997
|
/** @description The new value of require_scope_ceiling */
|
|
9503
9998
|
require_scope_ceiling?: boolean | null;
|
|
9999
|
+
/**
|
|
10000
|
+
* @description The new value of the org-wide sign rules
|
|
10001
|
+
* @example [
|
|
10002
|
+
* {
|
|
10003
|
+
* "TxReceiver": "0x0000000000000000000000000000000000000000"
|
|
10004
|
+
* }
|
|
10005
|
+
* ]
|
|
10006
|
+
*/
|
|
10007
|
+
sign_policy?: Record<string, never>[] | null;
|
|
9504
10008
|
/**
|
|
9505
10009
|
* Format: int32
|
|
9506
10010
|
* @description The new value of the TOTP failure limit
|
|
@@ -9518,6 +10022,11 @@ export interface components {
|
|
|
9518
10022
|
* @description The new value of user-export window
|
|
9519
10023
|
*/
|
|
9520
10024
|
user_export_window?: number | null;
|
|
10025
|
+
/**
|
|
10026
|
+
* Format: int64
|
|
10027
|
+
* @description New org version
|
|
10028
|
+
*/
|
|
10029
|
+
version: number;
|
|
9521
10030
|
};
|
|
9522
10031
|
};
|
|
9523
10032
|
};
|
|
@@ -10822,6 +11331,37 @@ export interface operations {
|
|
|
10822
11331
|
};
|
|
10823
11332
|
};
|
|
10824
11333
|
};
|
|
11334
|
+
/**
|
|
11335
|
+
* Get Email Template
|
|
11336
|
+
* @description Get Email Template
|
|
11337
|
+
*
|
|
11338
|
+
* Returns the email template for a given purpose.
|
|
11339
|
+
*/
|
|
11340
|
+
getEmailConfig: {
|
|
11341
|
+
parameters: {
|
|
11342
|
+
path: {
|
|
11343
|
+
/**
|
|
11344
|
+
* @description Name or ID of the desired Org
|
|
11345
|
+
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
11346
|
+
*/
|
|
11347
|
+
org_id: string;
|
|
11348
|
+
/** @description Which email configuration to get */
|
|
11349
|
+
purpose: "otp" | "mfa_reset" | "otp_mfa" | "alien_password_reset" | "member_password_reset" | "alien_invite" | "member_invite" | "welcome";
|
|
11350
|
+
};
|
|
11351
|
+
};
|
|
11352
|
+
responses: {
|
|
11353
|
+
200: components["responses"]["GetEmailConfigResponse"];
|
|
11354
|
+
default: {
|
|
11355
|
+
content: {
|
|
11356
|
+
"application/json": components["schemas"]["ErrorResponse"];
|
|
11357
|
+
};
|
|
11358
|
+
};
|
|
11359
|
+
};
|
|
11360
|
+
};
|
|
11361
|
+
/**
|
|
11362
|
+
* Configure Email Template
|
|
11363
|
+
* @description Configure Email Template
|
|
11364
|
+
*/
|
|
10825
11365
|
configureEmail: {
|
|
10826
11366
|
parameters: {
|
|
10827
11367
|
path: {
|
|
@@ -10848,6 +11388,36 @@ export interface operations {
|
|
|
10848
11388
|
};
|
|
10849
11389
|
};
|
|
10850
11390
|
};
|
|
11391
|
+
/**
|
|
11392
|
+
* Delete Email Template
|
|
11393
|
+
* @description Delete Email Template
|
|
11394
|
+
*/
|
|
11395
|
+
deleteEmailConfig: {
|
|
11396
|
+
parameters: {
|
|
11397
|
+
path: {
|
|
11398
|
+
/**
|
|
11399
|
+
* @description Name or ID of the desired Org
|
|
11400
|
+
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
11401
|
+
*/
|
|
11402
|
+
org_id: string;
|
|
11403
|
+
/** @description Which email configuration to delete */
|
|
11404
|
+
purpose: "otp" | "mfa_reset" | "otp_mfa" | "alien_password_reset" | "member_password_reset" | "alien_invite" | "member_invite" | "welcome";
|
|
11405
|
+
};
|
|
11406
|
+
};
|
|
11407
|
+
requestBody: {
|
|
11408
|
+
content: {
|
|
11409
|
+
"application/json": components["schemas"]["Empty"];
|
|
11410
|
+
};
|
|
11411
|
+
};
|
|
11412
|
+
responses: {
|
|
11413
|
+
200: components["responses"]["EmptyImpl"];
|
|
11414
|
+
default: {
|
|
11415
|
+
content: {
|
|
11416
|
+
"application/json": components["schemas"]["ErrorResponse"];
|
|
11417
|
+
};
|
|
11418
|
+
};
|
|
11419
|
+
};
|
|
11420
|
+
};
|
|
10851
11421
|
/**
|
|
10852
11422
|
* Sign EIP-191 Data
|
|
10853
11423
|
* @description Sign EIP-191 Data
|
|
@@ -11417,6 +11987,77 @@ export interface operations {
|
|
|
11417
11987
|
};
|
|
11418
11988
|
responses: {};
|
|
11419
11989
|
};
|
|
11990
|
+
/**
|
|
11991
|
+
* List pending invitations
|
|
11992
|
+
* @description List pending invitations
|
|
11993
|
+
*
|
|
11994
|
+
* Returns all pending (not yet accepted) invitations for the organization.
|
|
11995
|
+
*/
|
|
11996
|
+
listInvitations: {
|
|
11997
|
+
parameters: {
|
|
11998
|
+
query?: {
|
|
11999
|
+
/**
|
|
12000
|
+
* @description Max number of items to return per page.
|
|
12001
|
+
*
|
|
12002
|
+
* If the actual number of returned items may be less that this, even if there exist more
|
|
12003
|
+
* data in the result set. To reliably determine if more data is left in the result set,
|
|
12004
|
+
* inspect the [UnencryptedLastEvalKey] value in the response object.
|
|
12005
|
+
*/
|
|
12006
|
+
"page.size"?: number;
|
|
12007
|
+
/**
|
|
12008
|
+
* @description The start of the page. Omit to start from the beginning; otherwise, only specify a
|
|
12009
|
+
* the exact value previously returned as 'last_evaluated_key' from the same endpoint.
|
|
12010
|
+
*/
|
|
12011
|
+
"page.start"?: string | null;
|
|
12012
|
+
};
|
|
12013
|
+
path: {
|
|
12014
|
+
/**
|
|
12015
|
+
* @description Name or ID of the desired Org
|
|
12016
|
+
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
12017
|
+
*/
|
|
12018
|
+
org_id: string;
|
|
12019
|
+
};
|
|
12020
|
+
};
|
|
12021
|
+
responses: {
|
|
12022
|
+
200: components["responses"]["PaginatedListInvitationsResponse"];
|
|
12023
|
+
default: {
|
|
12024
|
+
content: {
|
|
12025
|
+
"application/json": components["schemas"]["ErrorResponse"];
|
|
12026
|
+
};
|
|
12027
|
+
};
|
|
12028
|
+
};
|
|
12029
|
+
};
|
|
12030
|
+
/**
|
|
12031
|
+
* Cancel a pending invitation
|
|
12032
|
+
* @description Cancel a pending invitation
|
|
12033
|
+
*
|
|
12034
|
+
* Removes a pending invitation from the organization. If no pending invitation
|
|
12035
|
+
* exists for the given email address, a not-found error is returned.
|
|
12036
|
+
*/
|
|
12037
|
+
cancelInvitation: {
|
|
12038
|
+
parameters: {
|
|
12039
|
+
path: {
|
|
12040
|
+
/**
|
|
12041
|
+
* @description Name or ID of the desired Org
|
|
12042
|
+
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
12043
|
+
*/
|
|
12044
|
+
org_id: string;
|
|
12045
|
+
};
|
|
12046
|
+
};
|
|
12047
|
+
requestBody: {
|
|
12048
|
+
content: {
|
|
12049
|
+
"application/json": components["schemas"]["CancelInvitationRequest"];
|
|
12050
|
+
};
|
|
12051
|
+
};
|
|
12052
|
+
responses: {
|
|
12053
|
+
200: components["responses"]["EmptyImpl"];
|
|
12054
|
+
default: {
|
|
12055
|
+
content: {
|
|
12056
|
+
"application/json": components["schemas"]["ErrorResponse"];
|
|
12057
|
+
};
|
|
12058
|
+
};
|
|
12059
|
+
};
|
|
12060
|
+
};
|
|
11420
12061
|
/**
|
|
11421
12062
|
* Invite User
|
|
11422
12063
|
* @description Invite User
|
|
@@ -12852,6 +13493,108 @@ export interface operations {
|
|
|
12852
13493
|
};
|
|
12853
13494
|
};
|
|
12854
13495
|
};
|
|
13496
|
+
/**
|
|
13497
|
+
* List Buckets
|
|
13498
|
+
* @description List Buckets
|
|
13499
|
+
*
|
|
13500
|
+
* List available meta information about all policy KV store buckets in the org.
|
|
13501
|
+
*/
|
|
13502
|
+
listPolicyBuckets: {
|
|
13503
|
+
parameters: {
|
|
13504
|
+
query?: {
|
|
13505
|
+
/**
|
|
13506
|
+
* @description Max number of items to return per page.
|
|
13507
|
+
*
|
|
13508
|
+
* If the actual number of returned items may be less that this, even if there exist more
|
|
13509
|
+
* data in the result set. To reliably determine if more data is left in the result set,
|
|
13510
|
+
* inspect the [UnencryptedLastEvalKey] value in the response object.
|
|
13511
|
+
*/
|
|
13512
|
+
"page.size"?: number;
|
|
13513
|
+
/**
|
|
13514
|
+
* @description The start of the page. Omit to start from the beginning; otherwise, only specify a
|
|
13515
|
+
* the exact value previously returned as 'last_evaluated_key' from the same endpoint.
|
|
13516
|
+
*/
|
|
13517
|
+
"page.start"?: string | null;
|
|
13518
|
+
};
|
|
13519
|
+
path: {
|
|
13520
|
+
/**
|
|
13521
|
+
* @description Name or ID of the desired Org
|
|
13522
|
+
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
13523
|
+
*/
|
|
13524
|
+
org_id: string;
|
|
13525
|
+
};
|
|
13526
|
+
};
|
|
13527
|
+
responses: {
|
|
13528
|
+
200: components["responses"]["PaginatedListBucketsResponse"];
|
|
13529
|
+
default: {
|
|
13530
|
+
content: {
|
|
13531
|
+
"application/json": components["schemas"]["ErrorResponse"];
|
|
13532
|
+
};
|
|
13533
|
+
};
|
|
13534
|
+
};
|
|
13535
|
+
};
|
|
13536
|
+
/**
|
|
13537
|
+
* Get Bucket
|
|
13538
|
+
* @description Get Bucket
|
|
13539
|
+
*
|
|
13540
|
+
* Returns the meta information of a policy KV store bucket.
|
|
13541
|
+
*/
|
|
13542
|
+
getPolicyBucket: {
|
|
13543
|
+
parameters: {
|
|
13544
|
+
path: {
|
|
13545
|
+
/**
|
|
13546
|
+
* @description Name or ID of the desired Org
|
|
13547
|
+
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
13548
|
+
*/
|
|
13549
|
+
org_id: string;
|
|
13550
|
+
bucket_name: string;
|
|
13551
|
+
};
|
|
13552
|
+
};
|
|
13553
|
+
responses: {
|
|
13554
|
+
200: components["responses"]["BucketInfo"];
|
|
13555
|
+
default: {
|
|
13556
|
+
content: {
|
|
13557
|
+
"application/json": components["schemas"]["ErrorResponse"];
|
|
13558
|
+
};
|
|
13559
|
+
};
|
|
13560
|
+
};
|
|
13561
|
+
};
|
|
13562
|
+
/**
|
|
13563
|
+
* Update Bucket
|
|
13564
|
+
* @description Update Bucket
|
|
13565
|
+
*
|
|
13566
|
+
* Updates meta information for an existing policy KV store bucket.
|
|
13567
|
+
*/
|
|
13568
|
+
updatePolicyBucket: {
|
|
13569
|
+
parameters: {
|
|
13570
|
+
path: {
|
|
13571
|
+
/**
|
|
13572
|
+
* @description Name or ID of the desired Org
|
|
13573
|
+
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
13574
|
+
*/
|
|
13575
|
+
org_id: string;
|
|
13576
|
+
bucket_name: string;
|
|
13577
|
+
};
|
|
13578
|
+
};
|
|
13579
|
+
requestBody: {
|
|
13580
|
+
content: {
|
|
13581
|
+
"application/json": components["schemas"]["UpdateBucketRequest"];
|
|
13582
|
+
};
|
|
13583
|
+
};
|
|
13584
|
+
responses: {
|
|
13585
|
+
200: components["responses"]["BucketInfo"];
|
|
13586
|
+
202: {
|
|
13587
|
+
content: {
|
|
13588
|
+
"application/json": components["schemas"]["AcceptedResponse"];
|
|
13589
|
+
};
|
|
13590
|
+
};
|
|
13591
|
+
default: {
|
|
13592
|
+
content: {
|
|
13593
|
+
"application/json": components["schemas"]["ErrorResponse"];
|
|
13594
|
+
};
|
|
13595
|
+
};
|
|
13596
|
+
};
|
|
13597
|
+
};
|
|
12855
13598
|
/**
|
|
12856
13599
|
* Create Policy Import Key
|
|
12857
13600
|
* @description Create Policy Import Key
|
|
@@ -12882,7 +13625,7 @@ export interface operations {
|
|
|
12882
13625
|
* Get the org-wide policy secrets.
|
|
12883
13626
|
* @description Get the org-wide policy secrets.
|
|
12884
13627
|
*
|
|
12885
|
-
* Note that this only returns the keys for the secrets,
|
|
13628
|
+
* Note that this only returns the keys for the secrets, omitting the values.
|
|
12886
13629
|
* The values are secret and are not accessible outside Wasm policy execution.
|
|
12887
13630
|
*/
|
|
12888
13631
|
getPolicySecrets: {
|
|
@@ -12910,6 +13653,8 @@ export interface operations {
|
|
|
12910
13653
|
*
|
|
12911
13654
|
* The provided secrets will replace any existing org-level secrets.
|
|
12912
13655
|
* It fails if the secrets weren't previously created.
|
|
13656
|
+
*
|
|
13657
|
+
* Must be permitted by the policy secret's edit policy if set, and the org's edit policy otherwise.
|
|
12913
13658
|
*/
|
|
12914
13659
|
updatePolicySecrets: {
|
|
12915
13660
|
parameters: {
|
|
@@ -12941,8 +13686,9 @@ export interface operations {
|
|
|
12941
13686
|
};
|
|
12942
13687
|
};
|
|
12943
13688
|
/**
|
|
12944
|
-
* Create or overwrite an org-level policy secret
|
|
12945
|
-
* @description Create or overwrite an org-level policy secret
|
|
13689
|
+
* Create or overwrite an org-level policy secret.
|
|
13690
|
+
* @description Create or overwrite an org-level policy secret.
|
|
13691
|
+
* Must be permitted by the policy secret's edit policy if set, and the org's edit policy otherwise.
|
|
12946
13692
|
*/
|
|
12947
13693
|
setPolicySecret: {
|
|
12948
13694
|
parameters: {
|
|
@@ -12975,8 +13721,9 @@ export interface operations {
|
|
|
12975
13721
|
};
|
|
12976
13722
|
};
|
|
12977
13723
|
/**
|
|
12978
|
-
* Delete an org-level policy secret
|
|
12979
|
-
* @description Delete an org-level policy secret
|
|
13724
|
+
* Delete an org-level policy secret.
|
|
13725
|
+
* @description Delete an org-level policy secret.
|
|
13726
|
+
* Must be permitted by the policy secret's edit policy if set, and the org's edit policy otherwise.
|
|
12980
13727
|
*/
|
|
12981
13728
|
deletePolicySecret: {
|
|
12982
13729
|
parameters: {
|
|
@@ -13684,6 +14431,34 @@ export interface operations {
|
|
|
13684
14431
|
};
|
|
13685
14432
|
};
|
|
13686
14433
|
};
|
|
14434
|
+
/**
|
|
14435
|
+
* High-level RPC endpoint.
|
|
14436
|
+
* @description High-level RPC endpoint.
|
|
14437
|
+
*/
|
|
14438
|
+
rpcApi: {
|
|
14439
|
+
parameters: {
|
|
14440
|
+
path: {
|
|
14441
|
+
/**
|
|
14442
|
+
* @description Name or ID of the desired Org
|
|
14443
|
+
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
14444
|
+
*/
|
|
14445
|
+
org_id: string;
|
|
14446
|
+
};
|
|
14447
|
+
};
|
|
14448
|
+
requestBody: {
|
|
14449
|
+
content: {
|
|
14450
|
+
"application/json": components["schemas"]["JsonRpcRequest"];
|
|
14451
|
+
};
|
|
14452
|
+
};
|
|
14453
|
+
responses: {
|
|
14454
|
+
200: components["responses"]["JsonRpcResponse"];
|
|
14455
|
+
default: {
|
|
14456
|
+
content: {
|
|
14457
|
+
"application/json": components["schemas"]["ErrorResponse"];
|
|
14458
|
+
};
|
|
14459
|
+
};
|
|
14460
|
+
};
|
|
14461
|
+
};
|
|
13687
14462
|
/**
|
|
13688
14463
|
* List sessions
|
|
13689
14464
|
* @description List sessions
|
|
@@ -14883,35 +15658,6 @@ export interface operations {
|
|
|
14883
15658
|
};
|
|
14884
15659
|
};
|
|
14885
15660
|
};
|
|
14886
|
-
/**
|
|
14887
|
-
* The policy_execute API endpoint is intended to demonstrate that the signer
|
|
14888
|
-
* @description The policy_execute API endpoint is intended to demonstrate that the signer
|
|
14889
|
-
* can use the policy engine, by way of the PolicyEngineClient.
|
|
14890
|
-
*/
|
|
14891
|
-
"policy-execute": {
|
|
14892
|
-
parameters: {
|
|
14893
|
-
path: {
|
|
14894
|
-
/**
|
|
14895
|
-
* @description Base64Url-nopad of the sha256 digest of the policy binary
|
|
14896
|
-
* @example 123456
|
|
14897
|
-
*/
|
|
14898
|
-
policy_name: string;
|
|
14899
|
-
};
|
|
14900
|
-
};
|
|
14901
|
-
requestBody: {
|
|
14902
|
-
content: {
|
|
14903
|
-
"application/json": Record<string, never>;
|
|
14904
|
-
};
|
|
14905
|
-
};
|
|
14906
|
-
responses: {
|
|
14907
|
-
200: components["responses"]["PolicyResultResponse"];
|
|
14908
|
-
default: {
|
|
14909
|
-
content: {
|
|
14910
|
-
"application/json": components["schemas"]["ErrorResponse"];
|
|
14911
|
-
};
|
|
14912
|
-
};
|
|
14913
|
-
};
|
|
14914
|
-
};
|
|
14915
15661
|
/**
|
|
14916
15662
|
* Initiate registration of a FIDO key
|
|
14917
15663
|
* @deprecated
|