@cubist-labs/cubesigner-sdk 0.4.236 → 0.4.237

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1031,6 +1031,31 @@ export interface paths {
1031
1031
  */
1032
1032
  post: operations["invokePolicy"];
1033
1033
  };
1034
+ "/v0/org/{org_id}/policy/buckets": {
1035
+ /**
1036
+ * List Buckets
1037
+ * @description List Buckets
1038
+ *
1039
+ * List available meta information about all policy KV store buckets in the org.
1040
+ */
1041
+ get: operations["listPolicyBuckets"];
1042
+ };
1043
+ "/v0/org/{org_id}/policy/buckets/{bucket_name}": {
1044
+ /**
1045
+ * Get Bucket
1046
+ * @description Get Bucket
1047
+ *
1048
+ * Returns the meta information of a policy KV store bucket.
1049
+ */
1050
+ get: operations["getPolicyBucket"];
1051
+ /**
1052
+ * Update Bucket
1053
+ * @description Update Bucket
1054
+ *
1055
+ * Updates meta information for an existing policy KV store bucket.
1056
+ */
1057
+ patch: operations["updatePolicyBucket"];
1058
+ };
1034
1059
  "/v0/org/{org_id}/policy/import_key": {
1035
1060
  /**
1036
1061
  * Create Policy Import Key
@@ -1046,7 +1071,7 @@ export interface paths {
1046
1071
  * Get the org-wide policy secrets.
1047
1072
  * @description Get the org-wide policy secrets.
1048
1073
  *
1049
- * Note that this only returns the keys for the secrets, omiting the values.
1074
+ * Note that this only returns the keys for the secrets, omitting the values.
1050
1075
  * The values are secret and are not accessible outside Wasm policy execution.
1051
1076
  */
1052
1077
  get: operations["getPolicySecrets"];
@@ -1853,8 +1878,7 @@ export interface components {
1853
1878
  */
1854
1879
  Aud: string | string[];
1855
1880
  AuditLogEntry: {
1856
- /** @description The name of the event */
1857
- event: string;
1881
+ event: components["schemas"]["OrgEventDiscriminants"];
1858
1882
  /** @description UUID of the event. Unique across all events. */
1859
1883
  event_id: string;
1860
1884
  org_id: components["schemas"]["Id"];
@@ -2693,7 +2717,7 @@ export interface components {
2693
2717
  * @description Billing event types.
2694
2718
  * @enum {string}
2695
2719
  */
2696
- BillingEvent: "Mmi" | "MmiMessageGet" | "MmiMessageList" | "MmiMessageSign" | "MmiMessageReject" | "MmiMessageDelete" | "AboutMe" | "UserResetEmailInit" | "UserResetEmailComplete" | "UserDeleteTotp" | "UserResetTotpInit" | "UserResetTotpComplete" | "UserVerifyTotp" | "UserRegisterFidoInit" | "UserRegisterFidoComplete" | "UserDeleteFido" | "CreateProofOidc" | "CreateProofCubeSigner" | "VerifyProof" | "AddOidcIdentity" | "RemoveOidcIdentity" | "ListOidcIdentities" | "GetOrg" | "UpdateOrg" | "GetOrgExport" | "CreateOrg" | "ListKeys" | "AttestKey" | "GetKey" | "GetKeyByMaterialId" | "ListKeyRoles" | "UpdateKey" | "ListHistoricalKeyTx" | "Invite" | "CancelInvitation" | "ListInvitations" | "ListUsers" | "GetUser" | "GetUserByEmail" | "GetUserByOidc" | "UpdateMembership" | "ResetMemberMfa" | "CompleteResetMemberMfa" | "CreateRole" | "AttestRole" | "GetRole" | "ListTokenKeys" | "ListRoles" | "GetRoleKey" | "ListRoleKeys" | "ListRoleUsers" | "UpdateRole" | "DeleteRole" | "ConfigureEmail" | "GetEmailConfig" | "DeleteEmailConfig" | "ListHistoricalRoleTx" | "CreatePolicy" | "GetPolicy" | "ListPolicies" | "DeletePolicy" | "UpdatePolicy" | "InvokePolicy" | "GetPolicyLogs" | "UploadWasmPolicy" | "GetPolicySecrets" | "UpdatePolicySecrets" | "SetPolicySecret" | "DeletePolicySecret" | "CreatePolicyImportKey" | "UserExportDelete" | "UserExportList" | "UserExportInit" | "UserExportComplete" | "AddUserToRole" | "RemoveUserFromRole" | "MfaApproveCs" | "MfaRejectCs" | "MfaGet" | "MfaList" | "AddKeysToRole" | "RemoveKeyFromRole" | "CreateToken" | "CreateSession" | "RevokeSession" | "RevokeCurrentSession" | "RevokeSessions" | "ListSessions" | "GetSession" | "SignerSessionRefresh" | "MfaApproveTotp" | "MfaRejectTotp" | "MfaFidoInit" | "MfaApproveFidoComplete" | "MfaRejectFidoComplete" | "MfaEmailInit" | "MfaEmailComplete" | "Cube3signerHeartbeat" | "CreateContact" | "GetContact" | "ListContacts" | "DeleteContact" | "UpdateContact" | "LookupContactsByAddress" | "QueryMetrics" | "QueryAuditLog" | "Counts" | "CreateKey" | "ImportKey" | "CreateKeyImportKey" | "DeriveKey" | "DeleteKey" | "AvaSign" | "AvaSerializedTxSign" | "BabylonRegistration" | "BabylonStaking" | "BabylonCovSign" | "BlobSign" | "BtcMessageSign" | "BtcSign" | "DiffieHellmanExchange" | "PsbtSign" | "PsbtLegacyInputSign" | "PsbtSegwitInputSign" | "PsbtTaprootInputSign" | "TaprootSign" | "Eip712Sign" | "Eip191Sign" | "Eth1Sign" | "Eth2Sign" | "SolanaSign" | "SuiSign" | "TendermintSign" | "Stake" | "Unstake" | "PasskeyAuthInit" | "PasskeyAuthComplete" | "OidcAuth" | "Oauth2Twitter" | "OAuth2TokenRefresh" | "EmailOtpAuth" | "SiweInit" | "SiweComplete" | "TelegramAuth" | "CreateOidcUser" | "DeleteOidcUser" | "DeleteUser" | "CreateEotsNonces" | "EotsSign" | "AuthMigrationIdentityAdd" | "AuthMigrationIdentityRemove" | "AuthMigrationUserUpdate" | "KeyCreated" | "KeyImported" | "InvitationAccept" | "IdpAuthenticate" | "IdpPasswordResetRequest" | "IdpPasswordResetConfirm" | "RpcApi" | "RpcCreateTransaction" | "RpcGetTransaction" | "RpcListTransactions" | "CustomChainRpcCall" | "EsploraApiCall" | "SentryApiCall" | "SentryApiCallPublic" | "MmiJwkSet" | "AttestationJwkSet" | "UserOrgs" | "PublicOrgInfo" | "EmailMyOrgs";
2720
+ BillingEvent: "Mmi" | "MmiMessageGet" | "MmiMessageList" | "MmiMessageSign" | "MmiMessageReject" | "MmiMessageDelete" | "AboutMe" | "UserResetEmailInit" | "UserResetEmailComplete" | "UserDeleteTotp" | "UserResetTotpInit" | "UserResetTotpComplete" | "UserVerifyTotp" | "UserRegisterFidoInit" | "UserRegisterFidoComplete" | "UserDeleteFido" | "CreateProofOidc" | "CreateProofCubeSigner" | "VerifyProof" | "AddOidcIdentity" | "RemoveOidcIdentity" | "ListOidcIdentities" | "GetOrg" | "UpdateOrg" | "GetOrgExport" | "CreateOrg" | "ListKeys" | "AttestKey" | "GetKey" | "GetKeyByMaterialId" | "ListKeyRoles" | "UpdateKey" | "ListHistoricalKeyTx" | "Invite" | "CancelInvitation" | "ListInvitations" | "ListUsers" | "GetUser" | "GetUserByEmail" | "GetUserByOidc" | "UpdateMembership" | "ResetMemberMfa" | "CompleteResetMemberMfa" | "CreateRole" | "AttestRole" | "GetRole" | "ListTokenKeys" | "ListRoles" | "GetRoleKey" | "ListRoleKeys" | "ListRoleUsers" | "UpdateRole" | "DeleteRole" | "ConfigureEmail" | "GetEmailConfig" | "DeleteEmailConfig" | "ListHistoricalRoleTx" | "CreatePolicy" | "GetPolicy" | "ListPolicies" | "DeletePolicy" | "UpdatePolicy" | "InvokePolicy" | "GetPolicyLogs" | "UploadWasmPolicy" | "GetPolicySecrets" | "UpdatePolicySecrets" | "SetPolicySecret" | "DeletePolicySecret" | "CreatePolicyImportKey" | "GetPolicyBucket" | "ListPolicyBuckets" | "UpdatePolicyBucket" | "UserExportDelete" | "UserExportList" | "UserExportInit" | "UserExportComplete" | "AddUserToRole" | "RemoveUserFromRole" | "MfaApproveCs" | "MfaRejectCs" | "MfaGet" | "MfaList" | "AddKeysToRole" | "RemoveKeyFromRole" | "CreateToken" | "CreateSession" | "RevokeSession" | "RevokeCurrentSession" | "RevokeSessions" | "ListSessions" | "GetSession" | "SignerSessionRefresh" | "MfaApproveTotp" | "MfaRejectTotp" | "MfaFidoInit" | "MfaApproveFidoComplete" | "MfaRejectFidoComplete" | "MfaEmailInit" | "MfaEmailComplete" | "Cube3signerHeartbeat" | "CreateContact" | "GetContact" | "ListContacts" | "DeleteContact" | "UpdateContact" | "LookupContactsByAddress" | "QueryMetrics" | "QueryAuditLog" | "Counts" | "CreateKey" | "ImportKey" | "CreateKeyImportKey" | "DeriveKey" | "DeleteKey" | "AvaSign" | "AvaSerializedTxSign" | "BabylonRegistration" | "BabylonStaking" | "BabylonCovSign" | "BlobSign" | "BtcMessageSign" | "BtcSign" | "DiffieHellmanExchange" | "PsbtSign" | "PsbtLegacyInputSign" | "PsbtSegwitInputSign" | "PsbtTaprootInputSign" | "TaprootSign" | "Eip712Sign" | "Eip191Sign" | "Eth1Sign" | "Eth2Sign" | "SolanaSign" | "SuiSign" | "TendermintSign" | "Stake" | "Unstake" | "PasskeyAuthInit" | "PasskeyAuthComplete" | "OidcAuth" | "Oauth2Twitter" | "OAuth2TokenRefresh" | "EmailOtpAuth" | "SiweInit" | "SiweComplete" | "TelegramAuth" | "CreateOidcUser" | "DeleteOidcUser" | "DeleteUser" | "CreateEotsNonces" | "EotsSign" | "AuthMigrationIdentityAdd" | "AuthMigrationIdentityRemove" | "AuthMigrationUserUpdate" | "KeyCreated" | "KeyImported" | "InvitationAccept" | "IdpAuthenticate" | "IdpPasswordResetRequest" | "IdpPasswordResetConfirm" | "RpcApi" | "RpcCreateTransaction" | "RpcGetTransaction" | "RpcListTransactions" | "CustomChainRpcCall" | "EsploraApiCall" | "SentryApiCall" | "SentryApiCallPublic" | "MmiJwkSet" | "AttestationJwkSet" | "UserOrgs" | "PublicOrgInfo" | "EmailMyOrgs";
2697
2721
  /** @description A bitcoin address and its network. */
2698
2722
  BitcoinAddressInfo: {
2699
2723
  /**
@@ -2918,6 +2942,49 @@ export interface components {
2918
2942
  */
2919
2943
  value: number;
2920
2944
  };
2945
+ /**
2946
+ * @description The access-controlled actions that can be performed on a bucket
2947
+ * @enum {string}
2948
+ */
2949
+ BucketAction: "read:key:value" | "read:key:exists" | "update:key:value" | "delete:key:value" | "scan:keys" | "update:bucket:owner" | "update:bucket:acl" | "update:bucket:metadata";
2950
+ /** @description Information about a policy KV store bucket. */
2951
+ BucketInfo: ({
2952
+ created?: components["schemas"]["EpochDateTime"] | null;
2953
+ last_modified?: components["schemas"]["EpochDateTime"] | null;
2954
+ /**
2955
+ * Format: int64
2956
+ * @description Version of this object
2957
+ */
2958
+ version?: number;
2959
+ } & {
2960
+ /** @description The access-control entries for the bucket. */
2961
+ acl?: unknown[] | null;
2962
+ /** @description Arbitrary user-defined metadata. */
2963
+ metadata?: unknown;
2964
+ owner: components["schemas"]["Id"];
2965
+ }) & {
2966
+ /** @description The name of the bucket. */
2967
+ name: string;
2968
+ };
2969
+ /**
2970
+ * @description Sub-entity of org where per-bucket metadata (like ACL) is stored.
2971
+ * The [Id] of a [BucketMeta] must be the bucket name.
2972
+ */
2973
+ BucketMeta: {
2974
+ created?: components["schemas"]["EpochDateTime"] | null;
2975
+ last_modified?: components["schemas"]["EpochDateTime"] | null;
2976
+ /**
2977
+ * Format: int64
2978
+ * @description Version of this object
2979
+ */
2980
+ version?: number;
2981
+ } & {
2982
+ /** @description The access-control entries for the bucket. */
2983
+ acl?: unknown[] | null;
2984
+ /** @description Arbitrary user-defined metadata. */
2985
+ metadata?: unknown;
2986
+ owner: components["schemas"]["Id"];
2987
+ };
2921
2988
  CancelInvitationRequest: {
2922
2989
  email: components["schemas"]["Email"];
2923
2990
  };
@@ -4203,7 +4270,7 @@ export interface components {
4203
4270
  * @description Explicitly named scopes for accessing CubeSigner APIs
4204
4271
  * @enum {string}
4205
4272
  */
4206
- ExplicitScope: "sign:*" | "sign:ava" | "sign:blob" | "sign:diffieHellman" | "sign:btc:*" | "sign:btc:segwit" | "sign:btc:taproot" | "sign:btc:psbt:*" | "sign:btc:psbt:doge" | "sign:btc:psbt:legacy" | "sign:btc:psbt:segwit" | "sign:btc:psbt:taproot" | "sign:btc:psbt:ltcSegwit" | "sign:btc:message:*" | "sign:btc:message:segwit" | "sign:btc:message:legacy" | "sign:babylon:*" | "sign:babylon:eots:*" | "sign:babylon:eots:nonces" | "sign:babylon:eots:sign" | "sign:babylon:staking:*" | "sign:babylon:staking:deposit" | "sign:babylon:staking:unbond" | "sign:babylon:staking:withdraw" | "sign:babylon:staking:slash" | "sign:babylon:registration" | "sign:babylon:covenant" | "sign:evm:*" | "sign:evm:tx" | "sign:evm:eip191" | "sign:evm:eip712" | "sign:eth2:*" | "sign:eth2:validate" | "sign:eth2:stake" | "sign:eth2:unstake" | "sign:solana" | "sign:sui" | "sign:tendermint" | "sign:mmi" | "manage:*" | "manage:readonly" | "manage:email:*" | "manage:email:get" | "manage:email:update" | "manage:email:delete" | "manage:mfa:*" | "manage:mfa:readonly" | "manage:mfa:list" | "manage:mfa:vote:*" | "manage:mfa:vote:cs" | "manage:mfa:vote:email" | "manage:mfa:vote:fido" | "manage:mfa:vote:totp" | "manage:mfa:register:*" | "manage:mfa:register:fido" | "manage:mfa:register:totp" | "manage:mfa:register:email" | "manage:mfa:unregister:*" | "manage:mfa:unregister:fido" | "manage:mfa:unregister:totp" | "manage:mfa:verify:*" | "manage:mfa:verify:totp" | "manage:key:*" | "manage:key:readonly" | "manage:key:get" | "manage:key:attest" | "manage:key:listRoles" | "manage:key:list" | "manage:key:history:tx:list" | "manage:key:create" | "manage:key:import" | "manage:key:update:*" | "manage:key:update:owner" | "manage:key:update:policy" | "manage:key:update:enabled" | "manage:key:update:region" | "manage:key:update:metadata" | "manage:key:update:editPolicy" | "manage:key:delete" | "manage:policy:*" | "manage:policy:readonly" | "manage:policy:create" | "manage:policy:get" | "manage:policy:list" | "manage:policy:delete" | "manage:policy:update:*" | "manage:policy:update:owner" | "manage:policy:update:name" | "manage:policy:update:acl" | "manage:policy:update:editPolicy" | "manage:policy:update:metadata" | "manage:policy:update:rule" | "manage:policy:invoke" | "manage:policy:wasm:*" | "manage:policy:wasm:upload" | "manage:policy:secrets:*" | "manage:policy:secrets:get" | "manage:policy:secrets:update:*" | "manage:policy:secrets:update:values" | "manage:policy:secrets:update:acl" | "manage:policy:secrets:update:editPolicy" | "manage:contact:*" | "manage:contact:readonly" | "manage:contact:create" | "manage:contact:get" | "manage:contact:list" | "manage:contact:delete" | "manage:contact:update:*" | "manage:contact:update:name" | "manage:contact:update:addresses" | "manage:contact:update:owner" | "manage:contact:update:labels" | "manage:contact:update:metadata" | "manage:contact:update:editPolicy" | "manage:contact:lookup:*" | "manage:contact:lookup:address" | "manage:policy:createImportKey" | "manage:role:*" | "manage:role:readonly" | "manage:role:create" | "manage:role:delete" | "manage:role:get:*" | "manage:role:attest" | "manage:role:get:keys" | "manage:role:get:keys:list" | "manage:role:get:keys:get" | "manage:role:get:users" | "manage:role:list" | "manage:role:update:*" | "manage:role:update:enabled" | "manage:role:update:policy" | "manage:role:update:editPolicy" | "manage:role:update:actions" | "manage:role:update:key:*" | "manage:role:update:key:add" | "manage:role:update:key:remove" | "manage:role:update:user:*" | "manage:role:update:user:add" | "manage:role:update:user:remove" | "manage:role:history:tx:list" | "manage:identity:*" | "manage:identity:readonly" | "manage:identity:verify" | "manage:identity:add" | "manage:identity:remove" | "manage:identity:list" | "manage:org:*" | "manage:org:create" | "manage:org:metrics:query" | "manage:org:audit:query" | "manage:org:readonly" | "manage:org:addUser" | "manage:org:inviteUser" | "manage:org:inviteAlien" | "manage:org:invitation:list" | "manage:org:invitation:cancel" | "manage:org:updateMembership" | "manage:org:listUsers" | "manage:org:user:get" | "manage:org:deleteUser" | "manage:org:get" | "manage:org:update:*" | "manage:org:update:enabled" | "manage:org:update:policy" | "manage:org:update:signPolicy" | "manage:org:update:export" | "manage:org:update:totpFailureLimit" | "manage:org:update:notificationEndpoints" | "manage:org:update:defaultInviteKind" | "manage:org:update:idpConfiguration" | "manage:org:update:passkeyConfiguration" | "manage:org:update:emailPreferences" | "manage:org:update:historicalData" | "manage:org:update:requireScopeCeiling" | "manage:org:update:alienLoginRequirement" | "manage:org:update:memberLoginRequirement" | "manage:org:update:keyExportRequirement" | "manage:org:update:allowedMfaTypes" | "manage:org:update:policyEngineConf" | "manage:org:update:customChains" | "manage:org:update:extProps" | "manage:org:update:editPolicy" | "manage:org:user:resetMfa" | "manage:session:*" | "manage:session:readonly" | "manage:session:get" | "manage:session:list" | "manage:session:create" | "manage:session:extend" | "manage:session:revoke" | "manage:export:*" | "manage:export:readonly" | "manage:export:org:*" | "manage:export:org:get" | "manage:export:user:*" | "manage:export:user:delete" | "manage:export:user:list" | "manage:authMigration:*" | "manage:authMigration:identity:add" | "manage:authMigration:identity:remove" | "manage:authMigration:user:update" | "manage:mmi:*" | "manage:mmi:readonly" | "manage:mmi:get" | "manage:mmi:list" | "manage:mmi:reject" | "manage:mmi:delete" | "export:*" | "export:user:*" | "export:user:init" | "export:user:complete" | "mmi:*" | "orgAccess:*" | "orgAccess:child:*" | "rpc:*" | "rpc:createTransaction:*" | "rpc:createTransaction:evm" | "rpc:getTransaction" | "rpc:listTransactions";
4273
+ ExplicitScope: "sign:*" | "sign:ava" | "sign:blob" | "sign:diffieHellman" | "sign:btc:*" | "sign:btc:segwit" | "sign:btc:taproot" | "sign:btc:psbt:*" | "sign:btc:psbt:doge" | "sign:btc:psbt:legacy" | "sign:btc:psbt:segwit" | "sign:btc:psbt:taproot" | "sign:btc:psbt:ltcSegwit" | "sign:btc:message:*" | "sign:btc:message:segwit" | "sign:btc:message:legacy" | "sign:babylon:*" | "sign:babylon:eots:*" | "sign:babylon:eots:nonces" | "sign:babylon:eots:sign" | "sign:babylon:staking:*" | "sign:babylon:staking:deposit" | "sign:babylon:staking:unbond" | "sign:babylon:staking:withdraw" | "sign:babylon:staking:slash" | "sign:babylon:registration" | "sign:babylon:covenant" | "sign:evm:*" | "sign:evm:tx" | "sign:evm:eip191" | "sign:evm:eip712" | "sign:eth2:*" | "sign:eth2:validate" | "sign:eth2:stake" | "sign:eth2:unstake" | "sign:solana" | "sign:sui" | "sign:tendermint" | "sign:mmi" | "manage:*" | "manage:readonly" | "manage:email:*" | "manage:email:get" | "manage:email:update" | "manage:email:delete" | "manage:mfa:*" | "manage:mfa:readonly" | "manage:mfa:list" | "manage:mfa:vote:*" | "manage:mfa:vote:cs" | "manage:mfa:vote:email" | "manage:mfa:vote:fido" | "manage:mfa:vote:totp" | "manage:mfa:register:*" | "manage:mfa:register:fido" | "manage:mfa:register:totp" | "manage:mfa:register:email" | "manage:mfa:unregister:*" | "manage:mfa:unregister:fido" | "manage:mfa:unregister:totp" | "manage:mfa:verify:*" | "manage:mfa:verify:totp" | "manage:key:*" | "manage:key:readonly" | "manage:key:get" | "manage:key:attest" | "manage:key:listRoles" | "manage:key:list" | "manage:key:history:tx:list" | "manage:key:create" | "manage:key:import" | "manage:key:update:*" | "manage:key:update:owner" | "manage:key:update:policy" | "manage:key:update:enabled" | "manage:key:update:region" | "manage:key:update:metadata" | "manage:key:update:editPolicy" | "manage:key:delete" | "manage:policy:*" | "manage:policy:readonly" | "manage:policy:create" | "manage:policy:get" | "manage:policy:list" | "manage:policy:delete" | "manage:policy:update:*" | "manage:policy:update:owner" | "manage:policy:update:name" | "manage:policy:update:acl" | "manage:policy:update:editPolicy" | "manage:policy:update:metadata" | "manage:policy:update:rule" | "manage:policy:invoke" | "manage:policy:wasm:*" | "manage:policy:wasm:upload" | "manage:policy:secrets:*" | "manage:policy:secrets:get" | "manage:policy:secrets:update:*" | "manage:policy:secrets:update:values" | "manage:policy:secrets:update:acl" | "manage:policy:secrets:update:editPolicy" | "manage:policy:buckets:*" | "manage:policy:buckets:get" | "manage:policy:buckets:list" | "manage:policy:buckets:update:*" | "manage:policy:buckets:update:owner" | "manage:policy:buckets:update:acl" | "manage:policy:buckets:update:metadata" | "manage:contact:*" | "manage:contact:readonly" | "manage:contact:create" | "manage:contact:get" | "manage:contact:list" | "manage:contact:delete" | "manage:contact:update:*" | "manage:contact:update:name" | "manage:contact:update:addresses" | "manage:contact:update:owner" | "manage:contact:update:labels" | "manage:contact:update:metadata" | "manage:contact:update:editPolicy" | "manage:contact:lookup:*" | "manage:contact:lookup:address" | "manage:policy:createImportKey" | "manage:role:*" | "manage:role:readonly" | "manage:role:create" | "manage:role:delete" | "manage:role:get:*" | "manage:role:attest" | "manage:role:get:keys" | "manage:role:get:keys:list" | "manage:role:get:keys:get" | "manage:role:get:users" | "manage:role:list" | "manage:role:update:*" | "manage:role:update:enabled" | "manage:role:update:policy" | "manage:role:update:editPolicy" | "manage:role:update:actions" | "manage:role:update:key:*" | "manage:role:update:key:add" | "manage:role:update:key:remove" | "manage:role:update:user:*" | "manage:role:update:user:add" | "manage:role:update:user:remove" | "manage:role:history:tx:list" | "manage:identity:*" | "manage:identity:readonly" | "manage:identity:verify" | "manage:identity:add" | "manage:identity:remove" | "manage:identity:list" | "manage:org:*" | "manage:org:create" | "manage:org:metrics:query" | "manage:org:audit:query" | "manage:org:readonly" | "manage:org:addUser" | "manage:org:inviteUser" | "manage:org:inviteAlien" | "manage:org:invitation:list" | "manage:org:invitation:cancel" | "manage:org:updateMembership" | "manage:org:listUsers" | "manage:org:user:get" | "manage:org:deleteUser" | "manage:org:get" | "manage:org:update:*" | "manage:org:update:enabled" | "manage:org:update:policy" | "manage:org:update:signPolicy" | "manage:org:update:export" | "manage:org:update:totpFailureLimit" | "manage:org:update:notificationEndpoints" | "manage:org:update:defaultInviteKind" | "manage:org:update:idpConfiguration" | "manage:org:update:passkeyConfiguration" | "manage:org:update:emailPreferences" | "manage:org:update:historicalData" | "manage:org:update:requireScopeCeiling" | "manage:org:update:alienLoginRequirement" | "manage:org:update:memberLoginRequirement" | "manage:org:update:keyExportRequirement" | "manage:org:update:allowedMfaTypes" | "manage:org:update:policyEngineConf" | "manage:org:update:customChains" | "manage:org:update:extProps" | "manage:org:update:editPolicy" | "manage:org:user:resetMfa" | "manage:session:*" | "manage:session:readonly" | "manage:session:get" | "manage:session:list" | "manage:session:create" | "manage:session:extend" | "manage:session:revoke" | "manage:export:*" | "manage:export:readonly" | "manage:export:org:*" | "manage:export:org:get" | "manage:export:user:*" | "manage:export:user:delete" | "manage:export:user:list" | "manage:authMigration:*" | "manage:authMigration:identity:add" | "manage:authMigration:identity:remove" | "manage:authMigration:user:update" | "manage:mmi:*" | "manage:mmi:readonly" | "manage:mmi:get" | "manage:mmi:list" | "manage:mmi:reject" | "manage:mmi:delete" | "export:*" | "export:user:*" | "export:user:init" | "export:user:complete" | "mmi:*" | "orgAccess:*" | "orgAccess:child:*" | "rpc:*" | "rpc:createTransaction:*" | "rpc:createTransaction:evm" | "rpc:getTransaction" | "rpc:listTransactions";
4207
4274
  /**
4208
4275
  * @description This type specifies the interpretation of the `fee` field in Babylon
4209
4276
  * staking requests. If `sats`, the field is intpreted as a fixed value
@@ -4259,7 +4326,7 @@ export interface components {
4259
4326
  request_device_identifier?: boolean;
4260
4327
  };
4261
4328
  /** @enum {string} */
4262
- ForbiddenErrorCode: "AlienKeyCreate" | "CannotAssumeIdentity" | "SentryDisallowed" | "PasskeyLoginDisabled" | "PasskeyNotRegistered" | "CannotCreateOrg" | "WrongMfaEmailOtpJwt" | "OrgFlagNotSet" | "FidoRequiredToRemoveTotp" | "OidcIdentityLimitReached" | "OidcScopeCeilingMissing" | "OidcIssuerNotAllowedForMemberRole" | "OidcNoMemberRolesAllowed" | "EmailOtpNotConfigured" | "MfaChallengeExpired" | "ChainIdNotAllowed" | "InvalidOrg" | "OrgIdMismatch" | "SessionForWrongOrg" | "SelfDelete" | "SelfDisable" | "InvalidOrgMembershipRoleChange" | "UserDisabled" | "OrgDisabled" | "OrgNotFound" | "OrgWithoutOwner" | "OrphanedUser" | "OidcUserNotFound" | "UserNotInOrg" | "UserNotOrgOwner" | "UserNotKeyOwner" | "InvalidRole" | "DisabledRole" | "KeyDisabled" | "KeyNotInRole" | "ContactNotInOrg" | "UserExportRequestNotInOrg" | "UserExportRequestInvalid" | "UserExportDisabled" | "UserNotOriginalKeyOwner" | "UserNotInRole" | "MustBeFullMember" | "SessionExpired" | "SessionChanged" | "SessionRevoked" | "ExpectedUserSession" | "SessionRoleChanged" | "ScopedNameNotFound" | "SessionInvalidEpochToken" | "SessionInvalidRefreshToken" | "SessionRefreshTokenExpired" | "InvalidAuthHeader" | "SessionNotFound" | "InvalidArn" | "SessionInvalidAuthToken" | "SessionAuthTokenExpired" | "SessionPossiblyStolenToken" | "MfaDisallowedIdentity" | "MfaDisallowedApprover" | "MfaTypeNotAllowed" | "MfaNotApprovedYet" | "MfaConfirmationCodeMismatch" | "MfaHttpRequestMismatch" | "MfaRemoveBelowMin" | "MfaOrgRequirementNotMet" | "MfaRegistrationDisallowed" | "TotpAlreadyConfigured" | "TotpConfigurationChanged" | "MfaTotpBadConfiguration" | "MfaTotpBadCode" | "MfaTotpRateLimit" | "ImproperSessionScope" | "FullSessionRequired" | "SessionWithoutAnyScopeUnder" | "UserRoleUnprivileged" | "MemberRoleForbidden" | "MfaNotConfigured" | "RemoveLastOidcIdentity" | "OperationNotAllowed" | "OrgExportRetrievalDisabled" | "ChangingKeyExportRequirementIsDisabled" | "AutoAddBlsKeyToProtectedRole" | "UserNotPolicyOwner" | "UserNotContactOwner" | "LegacySessionCannotHaveScopeCeiling" | "RoleInParentOrgNotAllowed" | "RemoveKeyFromRoleUserNotAllowed" | "SiweChallengeExpired" | "SiweMessageNotValid" | "SiweMessageInvalidSignature" | "Acl";
4329
+ ForbiddenErrorCode: "AlienKeyCreate" | "CannotAssumeIdentity" | "SentryDisallowed" | "PasskeyLoginDisabled" | "PasskeyNotRegistered" | "CannotCreateOrg" | "WrongMfaEmailOtpJwt" | "OrgFlagNotSet" | "FidoRequiredToRemoveTotp" | "OidcIdentityLimitReached" | "OidcScopeCeilingMissing" | "OidcIssuerNotAllowedForMemberRole" | "OidcNoMemberRolesAllowed" | "EmailOtpNotConfigured" | "MfaChallengeExpired" | "ChainIdNotAllowed" | "InvalidOrg" | "OrgIdMismatch" | "SessionForWrongOrg" | "SelfDelete" | "SelfDisable" | "InvalidOrgMembershipRoleChange" | "UserDisabled" | "OrgDisabled" | "OrgNotFound" | "OrgWithoutOwner" | "OrphanedUser" | "OidcUserNotFound" | "UserNotInOrg" | "UserNotOrgOwner" | "UserNotKeyOwner" | "InvalidRole" | "DisabledRole" | "KeyDisabled" | "KeyNotInRole" | "ContactNotInOrg" | "UserExportRequestNotInOrg" | "UserExportRequestInvalid" | "UserExportDisabled" | "UserNotOriginalKeyOwner" | "UserNotInRole" | "MustBeFullMember" | "SessionExpired" | "SessionChanged" | "SessionRevoked" | "ExpectedUserSession" | "SessionRoleChanged" | "ScopedNameNotFound" | "SessionInvalidEpochToken" | "SessionInvalidRefreshToken" | "SessionRefreshTokenExpired" | "InvalidAuthHeader" | "SessionNotFound" | "InvalidArn" | "SessionInvalidAuthToken" | "SessionAuthTokenExpired" | "SessionPossiblyStolenToken" | "MfaDisallowedIdentity" | "MfaDisallowedApprover" | "MfaTypeNotAllowed" | "MfaNotApprovedYet" | "MfaConfirmationCodeMismatch" | "MfaHttpRequestMismatch" | "MfaRemoveBelowMin" | "MfaOrgRequirementNotMet" | "MfaRegistrationDisallowed" | "TotpAlreadyConfigured" | "TotpConfigurationChanged" | "MfaTotpBadConfiguration" | "MfaTotpBadCode" | "MfaTotpRateLimit" | "ImproperSessionScope" | "FullSessionRequired" | "SessionWithoutAnyScopeUnder" | "UserRoleUnprivileged" | "MemberRoleForbidden" | "MfaNotConfigured" | "RemoveLastOidcIdentity" | "OperationNotAllowed" | "OrgExportRetrievalDisabled" | "ChangingKeyExportRequirementIsDisabled" | "AutoAddBlsKeyToProtectedRole" | "UserNotPolicyOwner" | "UserNotContactOwner" | "UserNotBucketOwner" | "LegacySessionCannotHaveScopeCeiling" | "RoleInParentOrgNotAllowed" | "RemoveKeyFromRoleUserNotAllowed" | "SiweChallengeExpired" | "SiweMessageNotValid" | "SiweMessageInvalidSignature" | "Acl";
4263
4330
  /**
4264
4331
  * @description Specifies a fork of the `BeaconChain`, to prevent replay attacks.
4265
4332
  * The schema of `Fork` is defined in the [Beacon chain
@@ -5120,7 +5187,7 @@ export interface components {
5120
5187
  /** Format: binary */
5121
5188
  NonceValue: string;
5122
5189
  /** @enum {string} */
5123
- NotFoundErrorCode: "UriSegmentMissing" | "UriSegmentInvalid" | "TotpNotConfigured" | "FidoKeyNotFound" | "FidoChallengeNotFound" | "TotpChallengeNotFound" | "UserExportRequestNotFound" | "UserExportCiphertextNotFound" | "OrgExportCiphertextNotFound" | "UploadObjectNotFound" | "PolicySecretNotFound" | "TimestreamDisabled" | "CustomChainNotFound" | "InvitationNotFound" | "TransactionNotFound" | "EmailConfigNotFound";
5190
+ NotFoundErrorCode: "UriSegmentMissing" | "UriSegmentInvalid" | "TotpNotConfigured" | "FidoKeyNotFound" | "FidoChallengeNotFound" | "TotpChallengeNotFound" | "UserExportRequestNotFound" | "UserExportCiphertextNotFound" | "OrgExportCiphertextNotFound" | "UploadObjectNotFound" | "PolicySecretNotFound" | "BucketMetaNotFound" | "TimestreamDisabled" | "CustomChainNotFound" | "InvitationNotFound" | "TransactionNotFound" | "EmailConfigNotFound";
5124
5191
  /** @description The configuration and status of a notification endpoint */
5125
5192
  NotificationEndpoint: components["schemas"]["NotificationEndpointSubscription"] & {
5126
5193
  status: components["schemas"]["SubscriptionStatus"];
@@ -5716,6 +5783,21 @@ export interface components {
5716
5783
  */
5717
5784
  last_evaluated_key?: string | null;
5718
5785
  };
5786
+ /**
5787
+ * @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
5788
+ * value (which can the user pass back to use as a url query parameter to continue pagination).
5789
+ */
5790
+ PaginatedListBucketsResponse: {
5791
+ /** @description The buckets in the organization. */
5792
+ buckets: components["schemas"]["BucketInfo"][];
5793
+ } & {
5794
+ /**
5795
+ * @description If set, the content of `response` does not contain the entire result set.
5796
+ * To fetch the next page of the result set, call the same endpoint
5797
+ * but specify this value as the 'page.start' query parameter.
5798
+ */
5799
+ last_evaluated_key?: string | null;
5800
+ };
5719
5801
  /**
5720
5802
  * @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
5721
5803
  * value (which can the user pass back to use as a url query parameter to continue pagination).
@@ -6035,12 +6117,10 @@ export interface components {
6035
6117
  message_tx?: components["schemas"]["TypedTransaction"] | null;
6036
6118
  }) & Record<string, never>;
6037
6119
  /**
6038
- * PolicyAction
6039
6120
  * @description The access-controlled actions that can be performed on a named policy.
6040
- * @example read:policy
6041
6121
  * @enum {string}
6042
6122
  */
6043
- PolicyAction: "read:*" | "read:policy" | "read:logs" | "update:*" | "update:name" | "update:rules" | "update:metadata" | "update:editPolicy" | "update:owner" | "update:acl" | "delete" | "attach" | "sign" | "invoke";
6123
+ PolicyAction: "read:*" | "read" | "read:policy" | "read:logs" | "update:*" | "update" | "update:name" | "update:rules" | "update:metadata" | "update:editPolicy" | "update:owner" | "update:acl" | "delete" | "attach" | "sign" | "invoke";
6044
6124
  /** @description The id for attaching a named policy to a key, role, or key in role. */
6045
6125
  PolicyAttachedToId: OneOf<[
6046
6126
  {
@@ -7594,6 +7674,23 @@ export interface components {
7594
7674
  /** @description Optional policy evaluation tree. */
7595
7675
  policy_eval_tree?: unknown;
7596
7676
  } & Record<string, never>;
7677
+ /** @description The information needed to update a bucket. */
7678
+ UpdateBucketRequest: {
7679
+ /** @description Access-control entries defining how the bucket can be accessed. */
7680
+ acl?: unknown;
7681
+ /**
7682
+ * Format: int64
7683
+ * @description If set, updating only succeeds if the current version matches this value.
7684
+ */
7685
+ expected_version?: number | null;
7686
+ /** @description Optional metadata. */
7687
+ metadata?: unknown;
7688
+ /**
7689
+ * @description Update the owner of the bucket
7690
+ * @example User#00000000-0000-0000-0000-000000000000
7691
+ */
7692
+ owner?: string | null;
7693
+ };
7597
7694
  /** @description The information needed to update a Contact. */
7598
7695
  UpdateContactRequest: {
7599
7696
  addresses?: components["schemas"]["AddressMap"] | null;
@@ -8417,6 +8514,29 @@ export interface components {
8417
8514
  };
8418
8515
  };
8419
8516
  };
8517
+ /** @description Information about a policy KV store bucket. */
8518
+ BucketInfo: {
8519
+ content: {
8520
+ "application/json": ({
8521
+ created?: components["schemas"]["EpochDateTime"] | null;
8522
+ last_modified?: components["schemas"]["EpochDateTime"] | null;
8523
+ /**
8524
+ * Format: int64
8525
+ * @description Version of this object
8526
+ */
8527
+ version?: number;
8528
+ } & {
8529
+ /** @description The access-control entries for the bucket. */
8530
+ acl?: unknown[] | null;
8531
+ /** @description Arbitrary user-defined metadata. */
8532
+ metadata?: unknown;
8533
+ owner: components["schemas"]["Id"];
8534
+ }) & {
8535
+ /** @description The name of the bucket. */
8536
+ name: string;
8537
+ };
8538
+ };
8539
+ };
8420
8540
  /** @description The number of users and keys in an org, organized by user role and key type */
8421
8541
  ComputeCountsResponse: {
8422
8542
  content: {
@@ -9132,6 +9252,21 @@ export interface components {
9132
9252
  };
9133
9253
  };
9134
9254
  };
9255
+ PaginatedListBucketsResponse: {
9256
+ content: {
9257
+ "application/json": {
9258
+ /** @description The buckets in the organization. */
9259
+ buckets: components["schemas"]["BucketInfo"][];
9260
+ } & {
9261
+ /**
9262
+ * @description If set, the content of `response` does not contain the entire result set.
9263
+ * To fetch the next page of the result set, call the same endpoint
9264
+ * but specify this value as the 'page.start' query parameter.
9265
+ */
9266
+ last_evaluated_key?: string | null;
9267
+ };
9268
+ };
9269
+ };
9135
9270
  PaginatedListContactsResponse: {
9136
9271
  content: {
9137
9272
  "application/json": {
@@ -13358,6 +13493,108 @@ export interface operations {
13358
13493
  };
13359
13494
  };
13360
13495
  };
13496
+ /**
13497
+ * List Buckets
13498
+ * @description List Buckets
13499
+ *
13500
+ * List available meta information about all policy KV store buckets in the org.
13501
+ */
13502
+ listPolicyBuckets: {
13503
+ parameters: {
13504
+ query?: {
13505
+ /**
13506
+ * @description Max number of items to return per page.
13507
+ *
13508
+ * If the actual number of returned items may be less that this, even if there exist more
13509
+ * data in the result set. To reliably determine if more data is left in the result set,
13510
+ * inspect the [UnencryptedLastEvalKey] value in the response object.
13511
+ */
13512
+ "page.size"?: number;
13513
+ /**
13514
+ * @description The start of the page. Omit to start from the beginning; otherwise, only specify a
13515
+ * the exact value previously returned as 'last_evaluated_key' from the same endpoint.
13516
+ */
13517
+ "page.start"?: string | null;
13518
+ };
13519
+ path: {
13520
+ /**
13521
+ * @description Name or ID of the desired Org
13522
+ * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
13523
+ */
13524
+ org_id: string;
13525
+ };
13526
+ };
13527
+ responses: {
13528
+ 200: components["responses"]["PaginatedListBucketsResponse"];
13529
+ default: {
13530
+ content: {
13531
+ "application/json": components["schemas"]["ErrorResponse"];
13532
+ };
13533
+ };
13534
+ };
13535
+ };
13536
+ /**
13537
+ * Get Bucket
13538
+ * @description Get Bucket
13539
+ *
13540
+ * Returns the meta information of a policy KV store bucket.
13541
+ */
13542
+ getPolicyBucket: {
13543
+ parameters: {
13544
+ path: {
13545
+ /**
13546
+ * @description Name or ID of the desired Org
13547
+ * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
13548
+ */
13549
+ org_id: string;
13550
+ bucket_name: string;
13551
+ };
13552
+ };
13553
+ responses: {
13554
+ 200: components["responses"]["BucketInfo"];
13555
+ default: {
13556
+ content: {
13557
+ "application/json": components["schemas"]["ErrorResponse"];
13558
+ };
13559
+ };
13560
+ };
13561
+ };
13562
+ /**
13563
+ * Update Bucket
13564
+ * @description Update Bucket
13565
+ *
13566
+ * Updates meta information for an existing policy KV store bucket.
13567
+ */
13568
+ updatePolicyBucket: {
13569
+ parameters: {
13570
+ path: {
13571
+ /**
13572
+ * @description Name or ID of the desired Org
13573
+ * @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
13574
+ */
13575
+ org_id: string;
13576
+ bucket_name: string;
13577
+ };
13578
+ };
13579
+ requestBody: {
13580
+ content: {
13581
+ "application/json": components["schemas"]["UpdateBucketRequest"];
13582
+ };
13583
+ };
13584
+ responses: {
13585
+ 200: components["responses"]["BucketInfo"];
13586
+ 202: {
13587
+ content: {
13588
+ "application/json": components["schemas"]["AcceptedResponse"];
13589
+ };
13590
+ };
13591
+ default: {
13592
+ content: {
13593
+ "application/json": components["schemas"]["ErrorResponse"];
13594
+ };
13595
+ };
13596
+ };
13597
+ };
13361
13598
  /**
13362
13599
  * Create Policy Import Key
13363
13600
  * @description Create Policy Import Key
@@ -13388,7 +13625,7 @@ export interface operations {
13388
13625
  * Get the org-wide policy secrets.
13389
13626
  * @description Get the org-wide policy secrets.
13390
13627
  *
13391
- * Note that this only returns the keys for the secrets, omiting the values.
13628
+ * Note that this only returns the keys for the secrets, omitting the values.
13392
13629
  * The values are secret and are not accessible outside Wasm policy execution.
13393
13630
  */
13394
13631
  getPolicySecrets: {