@aztec/key-store 0.35.0 → 0.36.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/index.d.ts +0 -1
- package/dest/index.d.ts.map +1 -1
- package/dest/index.js +1 -2
- package/dest/test_key_store.d.ts +96 -22
- package/dest/test_key_store.d.ts.map +1 -1
- package/dest/test_key_store.js +203 -50
- package/package.json +13 -5
- package/src/index.ts +0 -1
- package/src/test_key_store.ts +254 -55
- package/dest/key_pair.d.ts +0 -35
- package/dest/key_pair.d.ts.map +0 -1
- package/dest/key_pair.js +0 -45
- package/dest/new_test_key_store.d.ts +0 -92
- package/dest/new_test_key_store.d.ts.map +0 -1
- package/dest/new_test_key_store.js +0 -210
- package/src/key_pair.ts +0 -48
- package/src/new_test_key_store.ts +0 -245
package/dest/index.d.ts
CHANGED
package/dest/index.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,qBAAqB,CAAC"}
|
package/dest/index.js
CHANGED
|
@@ -1,3 +1,2 @@
|
|
|
1
|
-
export * from './key_pair.js';
|
|
2
1
|
export * from './test_key_store.js';
|
|
3
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
2
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi9zcmMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsY0FBYyxxQkFBcUIsQ0FBQyJ9
|
package/dest/test_key_store.d.ts
CHANGED
|
@@ -1,32 +1,106 @@
|
|
|
1
1
|
import { type KeyStore, type PublicKey } from '@aztec/circuit-types';
|
|
2
|
-
import {
|
|
3
|
-
import { type Grumpkin } from '@aztec/circuits.js/barretenberg';
|
|
2
|
+
import { AztecAddress, Fr, type GrumpkinPrivateKey, type PartialAddress } from '@aztec/circuits.js';
|
|
4
3
|
import { type AztecKVStore } from '@aztec/kv-store';
|
|
5
4
|
/**
|
|
6
5
|
* TestKeyStore is an implementation of the KeyStore interface, used for managing key pairs in a testing environment.
|
|
7
6
|
* It should be utilized in testing scenarios where secure key management is not required, and ease-of-use is prioritized.
|
|
8
|
-
* TODO(#5627): 💣💣💣
|
|
9
7
|
*/
|
|
10
8
|
export declare class TestKeyStore implements KeyStore {
|
|
11
9
|
#private;
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
*
|
|
27
|
-
* @
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
10
|
+
constructor(database: AztecKVStore);
|
|
11
|
+
/**
|
|
12
|
+
* Creates a new account from a randomly generated secret key.
|
|
13
|
+
* @returns A promise that resolves to the newly created account's AztecAddress.
|
|
14
|
+
*/
|
|
15
|
+
createAccount(): Promise<AztecAddress>;
|
|
16
|
+
/**
|
|
17
|
+
* Adds an account to the key store from the provided secret key.
|
|
18
|
+
* @param sk - The secret key of the account.
|
|
19
|
+
* @param partialAddress - The partial address of the account.
|
|
20
|
+
* @returns The account's address.
|
|
21
|
+
*/
|
|
22
|
+
addAccount(sk: Fr, partialAddress: PartialAddress): Promise<AztecAddress>;
|
|
23
|
+
/**
|
|
24
|
+
* Retrieves addresses of accounts stored in the key store.
|
|
25
|
+
* @returns A Promise that resolves to an array of account addresses.
|
|
26
|
+
*/
|
|
27
|
+
getAccounts(): Promise<AztecAddress[]>;
|
|
28
|
+
/**
|
|
29
|
+
* Gets the master nullifier public key for a given account.
|
|
30
|
+
* @throws If the account does not exist in the key store.
|
|
31
|
+
* @param account - The account address for which to retrieve the master nullifier public key.
|
|
32
|
+
* @returns The master nullifier public key for the account.
|
|
33
|
+
*/
|
|
34
|
+
getMasterNullifierPublicKey(account: AztecAddress): Promise<PublicKey>;
|
|
35
|
+
/**
|
|
36
|
+
* Gets the master incoming viewing public key for a given account.
|
|
37
|
+
* @throws If the account does not exist in the key store.
|
|
38
|
+
* @param account - The account address for which to retrieve the master incoming viewing public key.
|
|
39
|
+
* @returns The master incoming viewing public key for the account.
|
|
40
|
+
*/
|
|
41
|
+
getMasterIncomingViewingPublicKey(account: AztecAddress): Promise<PublicKey>;
|
|
42
|
+
/**
|
|
43
|
+
* Retrieves the master outgoing viewing public key.
|
|
44
|
+
* @throws If the account does not exist in the key store.
|
|
45
|
+
* @param account - The account to retrieve the master outgoing viewing key for.
|
|
46
|
+
* @returns A Promise that resolves to the master outgoing viewing key.
|
|
47
|
+
*/
|
|
48
|
+
getMasterOutgoingViewingPublicKey(account: AztecAddress): Promise<PublicKey>;
|
|
49
|
+
/**
|
|
50
|
+
* Retrieves the master tagging public key.
|
|
51
|
+
* @throws If the account does not exist in the key store.
|
|
52
|
+
* @param account - The account to retrieve the master tagging key for.
|
|
53
|
+
* @returns A Promise that resolves to the master tagging key.
|
|
54
|
+
*/
|
|
55
|
+
getMasterTaggingPublicKey(account: AztecAddress): Promise<PublicKey>;
|
|
56
|
+
/**
|
|
57
|
+
* Retrieves application nullifier secret key.
|
|
58
|
+
* @throws If the account does not exist in the key store.
|
|
59
|
+
* @param account - The account to retrieve the application nullifier secret key for.
|
|
60
|
+
* @param app - The application address to retrieve the nullifier secret key for.
|
|
61
|
+
* @returns A Promise that resolves to the application nullifier secret key.
|
|
62
|
+
*/
|
|
63
|
+
getAppNullifierSecretKey(account: AztecAddress, app: AztecAddress): Promise<Fr>;
|
|
64
|
+
/**
|
|
65
|
+
* Retrieves application incoming viewing secret key.
|
|
66
|
+
* @throws If the account does not exist in the key store.
|
|
67
|
+
* @param account - The account to retrieve the application incoming viewing secret key for.
|
|
68
|
+
* @param app - The application address to retrieve the incoming viewing secret key for.
|
|
69
|
+
* @returns A Promise that resolves to the application incoming viewing secret key.
|
|
70
|
+
*/
|
|
71
|
+
getAppIncomingViewingSecretKey(account: AztecAddress, app: AztecAddress): Promise<Fr>;
|
|
72
|
+
/**
|
|
73
|
+
* Retrieves application outgoing viewing secret key.
|
|
74
|
+
* @throws If the account does not exist in the key store.
|
|
75
|
+
* @param account - The account to retrieve the application outgoing viewing secret key for.
|
|
76
|
+
* @param app - The application address to retrieve the outgoing viewing secret key for.
|
|
77
|
+
* @returns A Promise that resolves to the application outgoing viewing secret key.
|
|
78
|
+
*/
|
|
79
|
+
getAppOutgoingViewingSecretKey(account: AztecAddress, app: AztecAddress): Promise<Fr>;
|
|
80
|
+
/**
|
|
81
|
+
* Retrieves the master nullifier secret key (nsk_m) corresponding to the specified master nullifier public key
|
|
82
|
+
* (Npk_m).
|
|
83
|
+
* @throws If the provided public key is not associated with any of the registered accounts.
|
|
84
|
+
* @param masterNullifierPublicKey - The master nullifier public key to get secret key for.
|
|
85
|
+
* @returns A Promise that resolves to the master nullifier secret key.
|
|
86
|
+
* @dev Used when feeding the master nullifier secret key to the kernel circuit for nullifier keys verification.
|
|
87
|
+
*/
|
|
88
|
+
getMasterNullifierSecretKeyForPublicKey(masterNullifierPublicKey: PublicKey): Promise<GrumpkinPrivateKey>;
|
|
89
|
+
/**
|
|
90
|
+
* Retrieves the master incoming viewing secret key (ivsk_m) corresponding to the specified master incoming viewing
|
|
91
|
+
* public key (Ivpk_m).
|
|
92
|
+
* @throws If the provided public key is not associated with any of the registered accounts.
|
|
93
|
+
* @param masterIncomingViewingPublicKey - The master nullifier public key to get secret key for.
|
|
94
|
+
* @returns A Promise that resolves to the master nullifier secret key.
|
|
95
|
+
* @dev Used when feeding the master nullifier secret key to the kernel circuit for nullifier keys verification.
|
|
96
|
+
*/
|
|
97
|
+
getMasterIncomingViewingSecretKeyForPublicKey(masterIncomingViewingPublicKey: PublicKey): Promise<GrumpkinPrivateKey>;
|
|
98
|
+
/**
|
|
99
|
+
* Retrieves public keys hash of the account
|
|
100
|
+
* @throws If the provided account address is not associated with any of the registered accounts.
|
|
101
|
+
* @param account - The account address to get public keys hash for.
|
|
102
|
+
* @returns A Promise that resolves to the public keys hash.
|
|
103
|
+
*/
|
|
104
|
+
getPublicKeysHash(account: AztecAddress): Promise<Fr>;
|
|
31
105
|
}
|
|
32
106
|
//# sourceMappingURL=test_key_store.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"test_key_store.d.ts","sourceRoot":"","sources":["../src/test_key_store.ts"],"names":[],"mappings":"AAAA,OAAO,
|
|
1
|
+
{"version":3,"file":"test_key_store.d.ts","sourceRoot":"","sources":["../src/test_key_store.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,QAAQ,EAAE,KAAK,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACrE,OAAO,EACL,YAAY,EACZ,EAAE,EAEF,KAAK,kBAAkB,EAEvB,KAAK,cAAc,EAIpB,MAAM,oBAAoB,CAAC;AAE5B,OAAO,EAAE,KAAK,YAAY,EAAiB,MAAM,iBAAiB,CAAC;AAEnE;;;GAGG;AACH,qBAAa,YAAa,YAAW,QAAQ;;gBAG/B,QAAQ,EAAE,YAAY;IAIlC;;;OAGG;IACI,aAAa,IAAI,OAAO,CAAC,YAAY,CAAC;IAM7C;;;;;OAKG;IACU,UAAU,CAAC,EAAE,EAAE,EAAE,EAAE,cAAc,EAAE,cAAc,GAAG,OAAO,CAAC,YAAY,CAAC;IAmCtF;;;OAGG;IACI,WAAW,IAAI,OAAO,CAAC,YAAY,EAAE,CAAC;IAO7C;;;;;OAKG;IACU,2BAA2B,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,SAAS,CAAC;IAUnF;;;;;OAKG;IACU,iCAAiC,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,SAAS,CAAC;IAUzF;;;;;OAKG;IACU,iCAAiC,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,SAAS,CAAC;IAUzF;;;;;OAKG;IACU,yBAAyB,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,SAAS,CAAC;IAUjF;;;;;;OAMG;IACU,wBAAwB,CAAC,OAAO,EAAE,YAAY,EAAE,GAAG,EAAE,YAAY,GAAG,OAAO,CAAC,EAAE,CAAC;IAY5F;;;;;;OAMG;IACU,8BAA8B,CAAC,OAAO,EAAE,YAAY,EAAE,GAAG,EAAE,YAAY,GAAG,OAAO,CAAC,EAAE,CAAC;IAmBlG;;;;;;OAMG;IACU,8BAA8B,CAAC,OAAO,EAAE,YAAY,EAAE,GAAG,EAAE,YAAY,GAAG,OAAO,CAAC,EAAE,CAAC;IAmBlG;;;;;;;OAOG;IACI,uCAAuC,CAAC,wBAAwB,EAAE,SAAS,GAAG,OAAO,CAAC,kBAAkB,CAAC;IAkBhH;;;;;;;OAOG;IACI,6CAA6C,CAClD,8BAA8B,EAAE,SAAS,GACxC,OAAO,CAAC,kBAAkB,CAAC;IAoB9B;;;;;OAKG;IACU,iBAAiB,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,EAAE,CAAC;CASnE"}
|
package/dest/test_key_store.js
CHANGED
|
@@ -1,76 +1,229 @@
|
|
|
1
1
|
var _TestKeyStore_keys;
|
|
2
2
|
import { __classPrivateFieldGet, __classPrivateFieldSet } from "tslib";
|
|
3
|
-
import { GrumpkinScalar, Point,
|
|
4
|
-
import {
|
|
3
|
+
import { AztecAddress, Fr, GeneratorIndex, GrumpkinScalar, Point, computeAppNullifierSecretKey, deriveKeys, } from '@aztec/circuits.js';
|
|
4
|
+
import { poseidon2Hash } from '@aztec/foundation/crypto';
|
|
5
5
|
/**
|
|
6
6
|
* TestKeyStore is an implementation of the KeyStore interface, used for managing key pairs in a testing environment.
|
|
7
7
|
* It should be utilized in testing scenarios where secure key management is not required, and ease-of-use is prioritized.
|
|
8
|
-
* TODO(#5627): 💣💣💣
|
|
9
8
|
*/
|
|
10
9
|
export class TestKeyStore {
|
|
11
|
-
constructor(
|
|
12
|
-
this.curve = curve;
|
|
10
|
+
constructor(database) {
|
|
13
11
|
_TestKeyStore_keys.set(this, void 0);
|
|
14
12
|
__classPrivateFieldSet(this, _TestKeyStore_keys, database.openMap('key_store'), "f");
|
|
15
13
|
}
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
14
|
+
/**
|
|
15
|
+
* Creates a new account from a randomly generated secret key.
|
|
16
|
+
* @returns A promise that resolves to the newly created account's AztecAddress.
|
|
17
|
+
*/
|
|
18
|
+
createAccount() {
|
|
19
|
+
const sk = Fr.random();
|
|
20
|
+
const partialAddress = Fr.random();
|
|
21
|
+
return this.addAccount(sk, partialAddress);
|
|
20
22
|
}
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
23
|
+
/**
|
|
24
|
+
* Adds an account to the key store from the provided secret key.
|
|
25
|
+
* @param sk - The secret key of the account.
|
|
26
|
+
* @param partialAddress - The partial address of the account.
|
|
27
|
+
* @returns The account's address.
|
|
28
|
+
*/
|
|
29
|
+
async addAccount(sk, partialAddress) {
|
|
30
|
+
const { publicKeysHash, masterNullifierSecretKey, masterIncomingViewingSecretKey, masterOutgoingViewingSecretKey, masterTaggingSecretKey, masterNullifierPublicKey, masterIncomingViewingPublicKey, masterOutgoingViewingPublicKey, masterTaggingPublicKey, } = deriveKeys(sk);
|
|
31
|
+
// We hash the partial address and the public keys hash to get the account address
|
|
32
|
+
// TODO(#5726): Move the following line to AztecAddress class?
|
|
33
|
+
const accountAddressFr = poseidon2Hash([publicKeysHash, partialAddress, GeneratorIndex.CONTRACT_ADDRESS_V1]);
|
|
34
|
+
const accountAddress = AztecAddress.fromField(accountAddressFr);
|
|
35
|
+
// We save the keys to db
|
|
36
|
+
await __classPrivateFieldGet(this, _TestKeyStore_keys, "f").set(`${accountAddress.toString()}-public_keys_hash`, publicKeysHash.toBuffer());
|
|
37
|
+
await __classPrivateFieldGet(this, _TestKeyStore_keys, "f").set(`${accountAddress.toString()}-nsk_m`, masterNullifierSecretKey.toBuffer());
|
|
38
|
+
await __classPrivateFieldGet(this, _TestKeyStore_keys, "f").set(`${accountAddress.toString()}-ivsk_m`, masterIncomingViewingSecretKey.toBuffer());
|
|
39
|
+
await __classPrivateFieldGet(this, _TestKeyStore_keys, "f").set(`${accountAddress.toString()}-ovsk_m`, masterOutgoingViewingSecretKey.toBuffer());
|
|
40
|
+
await __classPrivateFieldGet(this, _TestKeyStore_keys, "f").set(`${accountAddress.toString()}-tsk_m`, masterTaggingSecretKey.toBuffer());
|
|
41
|
+
await __classPrivateFieldGet(this, _TestKeyStore_keys, "f").set(`${accountAddress.toString()}-npk_m`, masterNullifierPublicKey.toBuffer());
|
|
42
|
+
await __classPrivateFieldGet(this, _TestKeyStore_keys, "f").set(`${accountAddress.toString()}-ivpk_m`, masterIncomingViewingPublicKey.toBuffer());
|
|
43
|
+
await __classPrivateFieldGet(this, _TestKeyStore_keys, "f").set(`${accountAddress.toString()}-ovpk_m`, masterOutgoingViewingPublicKey.toBuffer());
|
|
44
|
+
await __classPrivateFieldGet(this, _TestKeyStore_keys, "f").set(`${accountAddress.toString()}-tpk_m`, masterTaggingPublicKey.toBuffer());
|
|
45
|
+
// At last, we return the newly derived account address
|
|
46
|
+
return Promise.resolve(accountAddress);
|
|
25
47
|
}
|
|
48
|
+
/**
|
|
49
|
+
* Retrieves addresses of accounts stored in the key store.
|
|
50
|
+
* @returns A Promise that resolves to an array of account addresses.
|
|
51
|
+
*/
|
|
26
52
|
getAccounts() {
|
|
27
|
-
const
|
|
28
|
-
return
|
|
53
|
+
const allMapKeys = Array.from(__classPrivateFieldGet(this, _TestKeyStore_keys, "f").keys());
|
|
54
|
+
// We return account addresses based on the map keys that end with '-nsk_m'
|
|
55
|
+
const accounts = allMapKeys.filter(key => key.endsWith('-nsk_m')).map(key => key.split('-')[0]);
|
|
56
|
+
return Promise.resolve(accounts.map(account => AztecAddress.fromString(account)));
|
|
29
57
|
}
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
58
|
+
/**
|
|
59
|
+
* Gets the master nullifier public key for a given account.
|
|
60
|
+
* @throws If the account does not exist in the key store.
|
|
61
|
+
* @param account - The account address for which to retrieve the master nullifier public key.
|
|
62
|
+
* @returns The master nullifier public key for the account.
|
|
63
|
+
*/
|
|
64
|
+
async getMasterNullifierPublicKey(account) {
|
|
65
|
+
const masterNullifierPublicKeyBuffer = __classPrivateFieldGet(this, _TestKeyStore_keys, "f").get(`${account.toString()}-npk_m`);
|
|
66
|
+
if (!masterNullifierPublicKeyBuffer) {
|
|
67
|
+
throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
|
|
68
|
+
}
|
|
69
|
+
return Promise.resolve(Point.fromBuffer(masterNullifierPublicKeyBuffer));
|
|
33
70
|
}
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
71
|
+
/**
|
|
72
|
+
* Gets the master incoming viewing public key for a given account.
|
|
73
|
+
* @throws If the account does not exist in the key store.
|
|
74
|
+
* @param account - The account address for which to retrieve the master incoming viewing public key.
|
|
75
|
+
* @returns The master incoming viewing public key for the account.
|
|
76
|
+
*/
|
|
77
|
+
async getMasterIncomingViewingPublicKey(account) {
|
|
78
|
+
const masterIncomingViewingPublicKeyBuffer = __classPrivateFieldGet(this, _TestKeyStore_keys, "f").get(`${account.toString()}-ivpk_m`);
|
|
79
|
+
if (!masterIncomingViewingPublicKeyBuffer) {
|
|
80
|
+
throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
|
|
81
|
+
}
|
|
82
|
+
return Promise.resolve(Point.fromBuffer(masterIncomingViewingPublicKeyBuffer));
|
|
37
83
|
}
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
}
|
|
84
|
+
/**
|
|
85
|
+
* Retrieves the master outgoing viewing public key.
|
|
86
|
+
* @throws If the account does not exist in the key store.
|
|
87
|
+
* @param account - The account to retrieve the master outgoing viewing key for.
|
|
88
|
+
* @returns A Promise that resolves to the master outgoing viewing key.
|
|
89
|
+
*/
|
|
90
|
+
async getMasterOutgoingViewingPublicKey(account) {
|
|
91
|
+
const masterOutgoingViewingPublicKeyBuffer = __classPrivateFieldGet(this, _TestKeyStore_keys, "f").get(`${account.toString()}-ovpk_m`);
|
|
92
|
+
if (!masterOutgoingViewingPublicKeyBuffer) {
|
|
93
|
+
throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
|
|
48
94
|
}
|
|
49
|
-
|
|
95
|
+
return Promise.resolve(Point.fromBuffer(masterOutgoingViewingPublicKeyBuffer));
|
|
50
96
|
}
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
97
|
+
/**
|
|
98
|
+
* Retrieves the master tagging public key.
|
|
99
|
+
* @throws If the account does not exist in the key store.
|
|
100
|
+
* @param account - The account to retrieve the master tagging key for.
|
|
101
|
+
* @returns A Promise that resolves to the master tagging key.
|
|
102
|
+
*/
|
|
103
|
+
async getMasterTaggingPublicKey(account) {
|
|
104
|
+
const masterTaggingPublicKeyBuffer = __classPrivateFieldGet(this, _TestKeyStore_keys, "f").get(`${account.toString()}-tpk_m`);
|
|
105
|
+
if (!masterTaggingPublicKeyBuffer) {
|
|
106
|
+
throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
|
|
107
|
+
}
|
|
108
|
+
return Promise.resolve(Point.fromBuffer(masterTaggingPublicKeyBuffer));
|
|
54
109
|
}
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
110
|
+
/**
|
|
111
|
+
* Retrieves application nullifier secret key.
|
|
112
|
+
* @throws If the account does not exist in the key store.
|
|
113
|
+
* @param account - The account to retrieve the application nullifier secret key for.
|
|
114
|
+
* @param app - The application address to retrieve the nullifier secret key for.
|
|
115
|
+
* @returns A Promise that resolves to the application nullifier secret key.
|
|
116
|
+
*/
|
|
117
|
+
async getAppNullifierSecretKey(account, app) {
|
|
118
|
+
const masterNullifierSecretKeyBuffer = __classPrivateFieldGet(this, _TestKeyStore_keys, "f").get(`${account.toString()}-nsk_m`);
|
|
119
|
+
if (!masterNullifierSecretKeyBuffer) {
|
|
120
|
+
throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
|
|
121
|
+
}
|
|
122
|
+
const masterNullifierSecretKey = GrumpkinScalar.fromBuffer(masterNullifierSecretKeyBuffer);
|
|
123
|
+
const appNullifierSecretKey = computeAppNullifierSecretKey(masterNullifierSecretKey, app);
|
|
124
|
+
return Promise.resolve(appNullifierSecretKey);
|
|
125
|
+
}
|
|
126
|
+
/**
|
|
127
|
+
* Retrieves application incoming viewing secret key.
|
|
128
|
+
* @throws If the account does not exist in the key store.
|
|
129
|
+
* @param account - The account to retrieve the application incoming viewing secret key for.
|
|
130
|
+
* @param app - The application address to retrieve the incoming viewing secret key for.
|
|
131
|
+
* @returns A Promise that resolves to the application incoming viewing secret key.
|
|
132
|
+
*/
|
|
133
|
+
async getAppIncomingViewingSecretKey(account, app) {
|
|
134
|
+
const masterIncomingViewingSecretKeyBuffer = __classPrivateFieldGet(this, _TestKeyStore_keys, "f").get(`${account.toString()}-ivsk_m`);
|
|
135
|
+
if (!masterIncomingViewingSecretKeyBuffer) {
|
|
136
|
+
throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
|
|
137
|
+
}
|
|
138
|
+
const masterIncomingViewingSecretKey = GrumpkinScalar.fromBuffer(masterIncomingViewingSecretKeyBuffer);
|
|
139
|
+
return Promise.resolve(poseidon2Hash([
|
|
140
|
+
masterIncomingViewingSecretKey.high,
|
|
141
|
+
masterIncomingViewingSecretKey.low,
|
|
142
|
+
app,
|
|
143
|
+
GeneratorIndex.IVSK_M,
|
|
144
|
+
]));
|
|
145
|
+
}
|
|
146
|
+
/**
|
|
147
|
+
* Retrieves application outgoing viewing secret key.
|
|
148
|
+
* @throws If the account does not exist in the key store.
|
|
149
|
+
* @param account - The account to retrieve the application outgoing viewing secret key for.
|
|
150
|
+
* @param app - The application address to retrieve the outgoing viewing secret key for.
|
|
151
|
+
* @returns A Promise that resolves to the application outgoing viewing secret key.
|
|
152
|
+
*/
|
|
153
|
+
async getAppOutgoingViewingSecretKey(account, app) {
|
|
154
|
+
const masterOutgoingViewingSecretKeyBuffer = __classPrivateFieldGet(this, _TestKeyStore_keys, "f").get(`${account.toString()}-ovsk_m`);
|
|
155
|
+
if (!masterOutgoingViewingSecretKeyBuffer) {
|
|
156
|
+
throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
|
|
157
|
+
}
|
|
158
|
+
const masterOutgoingViewingSecretKey = GrumpkinScalar.fromBuffer(masterOutgoingViewingSecretKeyBuffer);
|
|
159
|
+
return Promise.resolve(poseidon2Hash([
|
|
160
|
+
masterOutgoingViewingSecretKey.high,
|
|
161
|
+
masterOutgoingViewingSecretKey.low,
|
|
162
|
+
app,
|
|
163
|
+
GeneratorIndex.OVSK_M,
|
|
164
|
+
]));
|
|
165
|
+
}
|
|
166
|
+
/**
|
|
167
|
+
* Retrieves the master nullifier secret key (nsk_m) corresponding to the specified master nullifier public key
|
|
168
|
+
* (Npk_m).
|
|
169
|
+
* @throws If the provided public key is not associated with any of the registered accounts.
|
|
170
|
+
* @param masterNullifierPublicKey - The master nullifier public key to get secret key for.
|
|
171
|
+
* @returns A Promise that resolves to the master nullifier secret key.
|
|
172
|
+
* @dev Used when feeding the master nullifier secret key to the kernel circuit for nullifier keys verification.
|
|
173
|
+
*/
|
|
174
|
+
getMasterNullifierSecretKeyForPublicKey(masterNullifierPublicKey) {
|
|
175
|
+
// We iterate over the map keys to find the account address that corresponds to the provided public key
|
|
176
|
+
for (const [key, value] of __classPrivateFieldGet(this, _TestKeyStore_keys, "f").entries()) {
|
|
177
|
+
if (value.equals(masterNullifierPublicKey.toBuffer())) {
|
|
178
|
+
// We extract the account address from the map key
|
|
179
|
+
const accountAddress = key.split('-')[0];
|
|
180
|
+
// We fetch the secret key and return it
|
|
181
|
+
const masterNullifierSecretKeyBuffer = __classPrivateFieldGet(this, _TestKeyStore_keys, "f").get(`${accountAddress.toString()}-nsk_m`);
|
|
182
|
+
if (!masterNullifierSecretKeyBuffer) {
|
|
183
|
+
throw new Error(`Could not find master nullifier secret key for account ${accountAddress.toString()}`);
|
|
184
|
+
}
|
|
185
|
+
return Promise.resolve(GrumpkinScalar.fromBuffer(masterNullifierSecretKeyBuffer));
|
|
186
|
+
}
|
|
187
|
+
}
|
|
188
|
+
throw new Error(`Could not find master nullifier secret key for public key ${masterNullifierPublicKey.toString()}`);
|
|
189
|
+
}
|
|
190
|
+
/**
|
|
191
|
+
* Retrieves the master incoming viewing secret key (ivsk_m) corresponding to the specified master incoming viewing
|
|
192
|
+
* public key (Ivpk_m).
|
|
193
|
+
* @throws If the provided public key is not associated with any of the registered accounts.
|
|
194
|
+
* @param masterIncomingViewingPublicKey - The master nullifier public key to get secret key for.
|
|
195
|
+
* @returns A Promise that resolves to the master nullifier secret key.
|
|
196
|
+
* @dev Used when feeding the master nullifier secret key to the kernel circuit for nullifier keys verification.
|
|
197
|
+
*/
|
|
198
|
+
getMasterIncomingViewingSecretKeyForPublicKey(masterIncomingViewingPublicKey) {
|
|
199
|
+
// We iterate over the map keys to find the account address that corresponds to the provided public key
|
|
200
|
+
for (const [key, value] of __classPrivateFieldGet(this, _TestKeyStore_keys, "f").entries()) {
|
|
201
|
+
if (value.equals(masterIncomingViewingPublicKey.toBuffer())) {
|
|
202
|
+
// We extract the account address from the map key
|
|
203
|
+
const accountAddress = key.split('-')[0];
|
|
204
|
+
// We fetch the secret key and return it
|
|
205
|
+
const masterIncomingViewingSecretKeyBuffer = __classPrivateFieldGet(this, _TestKeyStore_keys, "f").get(`${accountAddress.toString()}-ivsk_m`);
|
|
206
|
+
if (!masterIncomingViewingSecretKeyBuffer) {
|
|
207
|
+
throw new Error(`Could not find master incoming viewing secret key for account ${accountAddress.toString()}`);
|
|
208
|
+
}
|
|
209
|
+
return Promise.resolve(GrumpkinScalar.fromBuffer(masterIncomingViewingSecretKeyBuffer));
|
|
210
|
+
}
|
|
211
|
+
}
|
|
212
|
+
throw new Error(`Could not find master incoming viewing secret key for public key ${masterIncomingViewingPublicKey.toString()}`);
|
|
58
213
|
}
|
|
59
214
|
/**
|
|
60
|
-
*
|
|
61
|
-
*
|
|
62
|
-
*
|
|
63
|
-
*
|
|
64
|
-
* @param pubKey - The public key of the account to retrieve.
|
|
65
|
-
* @returns The KeyPair object associated with the provided key.
|
|
215
|
+
* Retrieves public keys hash of the account
|
|
216
|
+
* @throws If the provided account address is not associated with any of the registered accounts.
|
|
217
|
+
* @param account - The account address to get public keys hash for.
|
|
218
|
+
* @returns A Promise that resolves to the public keys hash.
|
|
66
219
|
*/
|
|
67
|
-
|
|
68
|
-
const
|
|
69
|
-
if (!
|
|
70
|
-
throw new Error(
|
|
220
|
+
async getPublicKeysHash(account) {
|
|
221
|
+
const publicKeysHashBuffer = __classPrivateFieldGet(this, _TestKeyStore_keys, "f").get(`${account.toString()}-public_keys_hash`);
|
|
222
|
+
if (!publicKeysHashBuffer) {
|
|
223
|
+
throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
|
|
71
224
|
}
|
|
72
|
-
return
|
|
225
|
+
return Promise.resolve(Fr.fromBuffer(publicKeysHashBuffer));
|
|
73
226
|
}
|
|
74
227
|
}
|
|
75
228
|
_TestKeyStore_keys = new WeakMap();
|
|
76
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
229
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"test_key_store.js","sourceRoot":"","sources":["../src/test_key_store.ts"],"names":[],"mappings":";;AACA,OAAO,EACL,YAAY,EACZ,EAAE,EACF,cAAc,EAEd,cAAc,EAEd,KAAK,EACL,4BAA4B,EAC5B,UAAU,GACX,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAGzD;;;GAGG;AACH,MAAM,OAAO,YAAY;IAGvB,YAAY,QAAsB;QAFlC,qCAAgC;QAG9B,uBAAA,IAAI,sBAAS,QAAQ,CAAC,OAAO,CAAC,WAAW,CAAC,MAAA,CAAC;IAC7C,CAAC;IAED;;;OAGG;IACI,aAAa;QAClB,MAAM,EAAE,GAAG,EAAE,CAAC,MAAM,EAAE,CAAC;QACvB,MAAM,cAAc,GAAG,EAAE,CAAC,MAAM,EAAE,CAAC;QACnC,OAAO,IAAI,CAAC,UAAU,CAAC,EAAE,EAAE,cAAc,CAAC,CAAC;IAC7C,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,UAAU,CAAC,EAAM,EAAE,cAA8B;QAC5D,MAAM,EACJ,cAAc,EACd,wBAAwB,EACxB,8BAA8B,EAC9B,8BAA8B,EAC9B,sBAAsB,EACtB,wBAAwB,EACxB,8BAA8B,EAC9B,8BAA8B,EAC9B,sBAAsB,GACvB,GAAG,UAAU,CAAC,EAAE,CAAC,CAAC;QAEnB,kFAAkF;QAClF,8DAA8D;QAC9D,MAAM,gBAAgB,GAAG,aAAa,CAAC,CAAC,cAAc,EAAE,cAAc,EAAE,cAAc,CAAC,mBAAmB,CAAC,CAAC,CAAC;QAC7G,MAAM,cAAc,GAAG,YAAY,CAAC,SAAS,CAAC,gBAAgB,CAAC,CAAC;QAEhE,yBAAyB;QACzB,MAAM,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,cAAc,CAAC,QAAQ,EAAE,mBAAmB,EAAE,cAAc,CAAC,QAAQ,EAAE,CAAC,CAAC;QAEjG,MAAM,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,cAAc,CAAC,QAAQ,EAAE,QAAQ,EAAE,wBAAwB,CAAC,QAAQ,EAAE,CAAC,CAAC;QAChG,MAAM,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,cAAc,CAAC,QAAQ,EAAE,SAAS,EAAE,8BAA8B,CAAC,QAAQ,EAAE,CAAC,CAAC;QACvG,MAAM,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,cAAc,CAAC,QAAQ,EAAE,SAAS,EAAE,8BAA8B,CAAC,QAAQ,EAAE,CAAC,CAAC;QACvG,MAAM,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,cAAc,CAAC,QAAQ,EAAE,QAAQ,EAAE,sBAAsB,CAAC,QAAQ,EAAE,CAAC,CAAC;QAE9F,MAAM,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,cAAc,CAAC,QAAQ,EAAE,QAAQ,EAAE,wBAAwB,CAAC,QAAQ,EAAE,CAAC,CAAC;QAChG,MAAM,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,cAAc,CAAC,QAAQ,EAAE,SAAS,EAAE,8BAA8B,CAAC,QAAQ,EAAE,CAAC,CAAC;QACvG,MAAM,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,cAAc,CAAC,QAAQ,EAAE,SAAS,EAAE,8BAA8B,CAAC,QAAQ,EAAE,CAAC,CAAC;QACvG,MAAM,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,cAAc,CAAC,QAAQ,EAAE,QAAQ,EAAE,sBAAsB,CAAC,QAAQ,EAAE,CAAC,CAAC;QAE9F,uDAAuD;QACvD,OAAO,OAAO,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC;IACzC,CAAC;IAED;;;OAGG;IACI,WAAW;QAChB,MAAM,UAAU,GAAG,KAAK,CAAC,IAAI,CAAC,uBAAA,IAAI,0BAAM,CAAC,IAAI,EAAE,CAAC,CAAC;QACjD,2EAA2E;QAC3E,MAAM,QAAQ,GAAG,UAAU,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QAChG,OAAO,OAAO,CAAC,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;IACpF,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,2BAA2B,CAAC,OAAqB;QAC5D,MAAM,8BAA8B,GAAG,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;QACrF,IAAI,CAAC,8BAA8B,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,UAAU,CAAC,8BAA8B,CAAC,CAAC,CAAC;IAC3E,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,iCAAiC,CAAC,OAAqB;QAClE,MAAM,oCAAoC,GAAG,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QAC5F,IAAI,CAAC,oCAAoC,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC,CAAC;IACjF,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,iCAAiC,CAAC,OAAqB;QAClE,MAAM,oCAAoC,GAAG,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QAC5F,IAAI,CAAC,oCAAoC,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC,CAAC;IACjF,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,yBAAyB,CAAC,OAAqB;QAC1D,MAAM,4BAA4B,GAAG,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;QACnF,IAAI,CAAC,4BAA4B,EAAE,CAAC;YAClC,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,UAAU,CAAC,4BAA4B,CAAC,CAAC,CAAC;IACzE,CAAC;IAED;;;;;;OAMG;IACI,KAAK,CAAC,wBAAwB,CAAC,OAAqB,EAAE,GAAiB;QAC5E,MAAM,8BAA8B,GAAG,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;QACrF,IAAI,CAAC,8BAA8B,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,MAAM,wBAAwB,GAAG,cAAc,CAAC,UAAU,CAAC,8BAA8B,CAAC,CAAC;QAC3F,MAAM,qBAAqB,GAAG,4BAA4B,CAAC,wBAAwB,EAAE,GAAG,CAAC,CAAC;QAC1F,OAAO,OAAO,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC;IAChD,CAAC;IAED;;;;;;OAMG;IACI,KAAK,CAAC,8BAA8B,CAAC,OAAqB,EAAE,GAAiB;QAClF,MAAM,oCAAoC,GAAG,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QAC5F,IAAI,CAAC,oCAAoC,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,MAAM,8BAA8B,GAAG,cAAc,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC;QAEvG,OAAO,OAAO,CAAC,OAAO,CACpB,aAAa,CAAC;YACZ,8BAA8B,CAAC,IAAI;YACnC,8BAA8B,CAAC,GAAG;YAClC,GAAG;YACH,cAAc,CAAC,MAAM;SACtB,CAAC,CACH,CAAC;IACJ,CAAC;IAED;;;;;;OAMG;IACI,KAAK,CAAC,8BAA8B,CAAC,OAAqB,EAAE,GAAiB;QAClF,MAAM,oCAAoC,GAAG,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QAC5F,IAAI,CAAC,oCAAoC,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,MAAM,8BAA8B,GAAG,cAAc,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC;QAEvG,OAAO,OAAO,CAAC,OAAO,CACpB,aAAa,CAAC;YACZ,8BAA8B,CAAC,IAAI;YACnC,8BAA8B,CAAC,GAAG;YAClC,GAAG;YACH,cAAc,CAAC,MAAM;SACtB,CAAC,CACH,CAAC;IACJ,CAAC;IAED;;;;;;;OAOG;IACI,uCAAuC,CAAC,wBAAmC;QAChF,uGAAuG;QACvG,KAAK,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,uBAAA,IAAI,0BAAM,CAAC,OAAO,EAAE,EAAE,CAAC;YAChD,IAAI,KAAK,CAAC,MAAM,CAAC,wBAAwB,CAAC,QAAQ,EAAE,CAAC,EAAE,CAAC;gBACtD,kDAAkD;gBAClD,MAAM,cAAc,GAAG,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;gBACzC,wCAAwC;gBACxC,MAAM,8BAA8B,GAAG,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,cAAc,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;gBAC5F,IAAI,CAAC,8BAA8B,EAAE,CAAC;oBACpC,MAAM,IAAI,KAAK,CAAC,0DAA0D,cAAc,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;gBACzG,CAAC;gBACD,OAAO,OAAO,CAAC,OAAO,CAAC,cAAc,CAAC,UAAU,CAAC,8BAA8B,CAAC,CAAC,CAAC;YACpF,CAAC;QACH,CAAC;QAED,MAAM,IAAI,KAAK,CAAC,6DAA6D,wBAAwB,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;IACtH,CAAC;IAED;;;;;;;OAOG;IACI,6CAA6C,CAClD,8BAAyC;QAEzC,uGAAuG;QACvG,KAAK,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,uBAAA,IAAI,0BAAM,CAAC,OAAO,EAAE,EAAE,CAAC;YAChD,IAAI,KAAK,CAAC,MAAM,CAAC,8BAA8B,CAAC,QAAQ,EAAE,CAAC,EAAE,CAAC;gBAC5D,kDAAkD;gBAClD,MAAM,cAAc,GAAG,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;gBACzC,wCAAwC;gBACxC,MAAM,oCAAoC,GAAG,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,cAAc,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;gBACnG,IAAI,CAAC,oCAAoC,EAAE,CAAC;oBAC1C,MAAM,IAAI,KAAK,CAAC,iEAAiE,cAAc,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;gBAChH,CAAC;gBACD,OAAO,OAAO,CAAC,OAAO,CAAC,cAAc,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC,CAAC;YAC1F,CAAC;QACH,CAAC;QAED,MAAM,IAAI,KAAK,CACb,oEAAoE,8BAA8B,CAAC,QAAQ,EAAE,EAAE,CAChH,CAAC;IACJ,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,iBAAiB,CAAC,OAAqB;QAClD,MAAM,oBAAoB,GAAG,uBAAA,IAAI,0BAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,mBAAmB,CAAC,CAAC;QACtF,IAAI,CAAC,oBAAoB,EAAE,CAAC;YAC1B,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,OAAO,CAAC,OAAO,CAAC,EAAE,CAAC,UAAU,CAAC,oBAAoB,CAAC,CAAC,CAAC;IAC9D,CAAC;CACF"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aztec/key-store",
|
|
3
|
-
"version": "0.
|
|
3
|
+
"version": "0.36.0",
|
|
4
4
|
"type": "module",
|
|
5
5
|
"exports": "./dest/index.js",
|
|
6
6
|
"typedocOptions": {
|
|
@@ -34,13 +34,21 @@
|
|
|
34
34
|
},
|
|
35
35
|
"extensionsToTreatAsEsm": [
|
|
36
36
|
".ts"
|
|
37
|
+
],
|
|
38
|
+
"reporters": [
|
|
39
|
+
[
|
|
40
|
+
"default",
|
|
41
|
+
{
|
|
42
|
+
"summaryThreshold": 9999
|
|
43
|
+
}
|
|
44
|
+
]
|
|
37
45
|
]
|
|
38
46
|
},
|
|
39
47
|
"dependencies": {
|
|
40
|
-
"@aztec/circuit-types": "0.
|
|
41
|
-
"@aztec/circuits.js": "0.
|
|
42
|
-
"@aztec/foundation": "0.
|
|
43
|
-
"@aztec/kv-store": "0.
|
|
48
|
+
"@aztec/circuit-types": "0.36.0",
|
|
49
|
+
"@aztec/circuits.js": "0.36.0",
|
|
50
|
+
"@aztec/foundation": "0.36.0",
|
|
51
|
+
"@aztec/kv-store": "0.36.0",
|
|
44
52
|
"tslib": "^2.4.0"
|
|
45
53
|
},
|
|
46
54
|
"devDependencies": {
|
package/src/index.ts
CHANGED