@aztec/key-store 0.76.4-devnet-test-rc3 → 0.77.0-testnet-ignition.17

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dest/index.js CHANGED
@@ -1,2 +1 @@
1
1
  export * from './key_store.js';
2
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi9zcmMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsY0FBYyxnQkFBZ0IsQ0FBQyJ9
@@ -1,7 +1,10 @@
1
- import { type PublicKey } from '@aztec/circuit-types';
2
- import { AztecAddress, CompleteAddress, Fr, GrumpkinScalar, type KeyPrefix, KeyValidationRequest, type PartialAddress } from '@aztec/circuits.js';
1
+ import { Fr, GrumpkinScalar } from '@aztec/foundation/fields';
3
2
  import { type Bufferable } from '@aztec/foundation/serialize';
4
- import { type AztecAsyncKVStore } from '@aztec/kv-store';
3
+ import type { AztecAsyncKVStore } from '@aztec/kv-store';
4
+ import { AztecAddress } from '@aztec/stdlib/aztec-address';
5
+ import { CompleteAddress, type PartialAddress } from '@aztec/stdlib/contract';
6
+ import { KeyValidationRequest } from '@aztec/stdlib/kernel';
7
+ import { type KeyPrefix, type PublicKey } from '@aztec/stdlib/keys';
5
8
  /**
6
9
  * Used for managing keys. Can hold keys of multiple accounts.
7
10
  */
@@ -1 +1 @@
1
- {"version":3,"file":"key_store.d.ts","sourceRoot":"","sources":["../src/key_store.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EACL,YAAY,EACZ,eAAe,EACf,EAAE,EAEF,cAAc,EAEd,KAAK,SAAS,EACd,oBAAoB,EACpB,KAAK,cAAc,EAKpB,MAAM,oBAAoB,CAAC;AAG5B,OAAO,EAAE,KAAK,UAAU,EAAqB,MAAM,6BAA6B,CAAC;AACjF,OAAO,EAAE,KAAK,iBAAiB,EAAsB,MAAM,iBAAiB,CAAC;AAE7E;;GAEG;AACH,qBAAa,QAAQ;;gBAGP,QAAQ,EAAE,iBAAiB;IAIvC;;;OAGG;IACI,aAAa,IAAI,OAAO,CAAC,eAAe,CAAC;IAMhD;;;;;OAKG;IACU,UAAU,CAAC,EAAE,EAAE,EAAE,EAAE,cAAc,EAAE,cAAc,GAAG,OAAO,CAAC,eAAe,CAAC;IAsCzF;;;OAGG;IACU,WAAW,IAAI,OAAO,CAAC,YAAY,EAAE,CAAC;IAOnD;;;;;;OAMG;IACU,uBAAuB,CAAC,OAAO,EAAE,EAAE,EAAE,eAAe,EAAE,YAAY,GAAG,OAAO,CAAC,oBAAoB,CAAC;IAuC/G;;;;;OAKG;IACU,2BAA2B,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,SAAS,CAAC;IAUnF;;;;;OAKG;IACU,iCAAiC,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,SAAS,CAAC;IAUzF;;;;;OAKG;IACU,iCAAiC,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,SAAS,CAAC;IAUzF;;;;;OAKG;IACU,yBAAyB,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,SAAS,CAAC;IAUjF;;;;;OAKG;IACU,iCAAiC,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,cAAc,CAAC;IAU9F;;;;;;OAMG;IACU,8BAA8B,CAAC,OAAO,EAAE,YAAY,EAAE,GAAG,EAAE,YAAY,GAAG,OAAO,CAAC,EAAE,CAAC;IAelG;;;;;;OAMG;IACU,kBAAkB,CAAC,GAAG,EAAE,SAAS,GAAG,OAAO,CAAC,cAAc,CAAC;IAmBxE;;;;;OAKG;IACU,sBAAsB,CAAC,KAAK,EAAE,UAAU,GAAG,OAAO,CAAC,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;CAe3F"}
1
+ {"version":3,"file":"key_store.d.ts","sourceRoot":"","sources":["../src/key_store.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,EAAE,EAAE,cAAc,EAAS,MAAM,0BAA0B,CAAC;AAErE,OAAO,EAAE,KAAK,UAAU,EAAqB,MAAM,6BAA6B,CAAC;AACjF,OAAO,KAAK,EAAE,iBAAiB,EAAiB,MAAM,iBAAiB,CAAC;AACxE,OAAO,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAC3D,OAAO,EAAE,eAAe,EAAE,KAAK,cAAc,EAAE,MAAM,wBAAwB,CAAC;AAC9E,OAAO,EAAE,oBAAoB,EAAE,MAAM,sBAAsB,CAAC;AAC5D,OAAO,EAEL,KAAK,SAAS,EACd,KAAK,SAAS,EAIf,MAAM,oBAAoB,CAAC;AAE5B;;GAEG;AACH,qBAAa,QAAQ;;gBAGP,QAAQ,EAAE,iBAAiB;IAIvC;;;OAGG;IACI,aAAa,IAAI,OAAO,CAAC,eAAe,CAAC;IAMhD;;;;;OAKG;IACU,UAAU,CAAC,EAAE,EAAE,EAAE,EAAE,cAAc,EAAE,cAAc,GAAG,OAAO,CAAC,eAAe,CAAC;IAsCzF;;;OAGG;IACU,WAAW,IAAI,OAAO,CAAC,YAAY,EAAE,CAAC;IAOnD;;;;;;OAMG;IACU,uBAAuB,CAAC,OAAO,EAAE,EAAE,EAAE,eAAe,EAAE,YAAY,GAAG,OAAO,CAAC,oBAAoB,CAAC;IAuC/G;;;;;OAKG;IACU,2BAA2B,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,SAAS,CAAC;IAUnF;;;;;OAKG;IACU,iCAAiC,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,SAAS,CAAC;IAUzF;;;;;OAKG;IACU,iCAAiC,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,SAAS,CAAC;IAUzF;;;;;OAKG;IACU,yBAAyB,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,SAAS,CAAC;IAUjF;;;;;OAKG;IACU,iCAAiC,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,cAAc,CAAC;IAU9F;;;;;;OAMG;IACU,8BAA8B,CAAC,OAAO,EAAE,YAAY,EAAE,GAAG,EAAE,YAAY,GAAG,OAAO,CAAC,EAAE,CAAC;IAelG;;;;;;OAMG;IACU,kBAAkB,CAAC,GAAG,EAAE,SAAS,GAAG,OAAO,CAAC,cAAc,CAAC;IAmBxE;;;;;OAKG;IACU,sBAAsB,CAAC,KAAK,EAAE,UAAU,GAAG,OAAO,CAAC,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;CAe3F"}
package/dest/key_store.js CHANGED
@@ -1,79 +1,77 @@
1
- var _KeyStore_keys;
2
- import { __classPrivateFieldGet, __classPrivateFieldSet } from "tslib";
3
- import { AztecAddress, CompleteAddress, Fr, GeneratorIndex, GrumpkinScalar, KEY_PREFIXES, KeyValidationRequest, Point, computeAppSecretKey, deriveKeys, derivePublicKeyFromSecretKey, } from '@aztec/circuits.js';
1
+ import { GeneratorIndex } from '@aztec/constants';
4
2
  import { poseidon2HashWithSeparator } from '@aztec/foundation/crypto';
3
+ import { Fr, GrumpkinScalar, Point } from '@aztec/foundation/fields';
5
4
  import { toArray } from '@aztec/foundation/iterable';
6
5
  import { serializeToBuffer } from '@aztec/foundation/serialize';
6
+ import { AztecAddress } from '@aztec/stdlib/aztec-address';
7
+ import { CompleteAddress } from '@aztec/stdlib/contract';
8
+ import { KeyValidationRequest } from '@aztec/stdlib/kernel';
9
+ import { KEY_PREFIXES, computeAppSecretKey, deriveKeys, derivePublicKeyFromSecretKey } from '@aztec/stdlib/keys';
7
10
  /**
8
11
  * Used for managing keys. Can hold keys of multiple accounts.
9
- */
10
- export class KeyStore {
11
- constructor(database) {
12
- _KeyStore_keys.set(this, void 0);
13
- __classPrivateFieldSet(this, _KeyStore_keys, database.openMap('key_store'), "f");
12
+ */ export class KeyStore {
13
+ #keys;
14
+ constructor(database){
15
+ this.#keys = database.openMap('key_store');
14
16
  }
15
17
  /**
16
- * Creates a new account from a randomly generated secret key.
17
- * @returns A promise that resolves to the newly created account's CompleteAddress.
18
- */
19
- createAccount() {
18
+ * Creates a new account from a randomly generated secret key.
19
+ * @returns A promise that resolves to the newly created account's CompleteAddress.
20
+ */ createAccount() {
20
21
  const sk = Fr.random();
21
22
  const partialAddress = Fr.random();
22
23
  return this.addAccount(sk, partialAddress);
23
24
  }
24
25
  /**
25
- * Adds an account to the key store from the provided secret key.
26
- * @param sk - The secret key of the account.
27
- * @param partialAddress - The partial address of the account.
28
- * @returns The account's complete address.
29
- */
30
- async addAccount(sk, partialAddress) {
31
- const { masterNullifierSecretKey, masterIncomingViewingSecretKey, masterOutgoingViewingSecretKey, masterTaggingSecretKey, publicKeys, } = await deriveKeys(sk);
26
+ * Adds an account to the key store from the provided secret key.
27
+ * @param sk - The secret key of the account.
28
+ * @param partialAddress - The partial address of the account.
29
+ * @returns The account's complete address.
30
+ */ async addAccount(sk, partialAddress) {
31
+ const { masterNullifierSecretKey, masterIncomingViewingSecretKey, masterOutgoingViewingSecretKey, masterTaggingSecretKey, publicKeys } = await deriveKeys(sk);
32
32
  const completeAddress = await CompleteAddress.fromSecretKeyAndPartialAddress(sk, partialAddress);
33
33
  const { address: account } = completeAddress;
34
34
  // Naming of keys is as follows ${account}-${n/iv/ov/t}${sk/pk}_m
35
- await __classPrivateFieldGet(this, _KeyStore_keys, "f").set(`${account.toString()}-ivsk_m`, masterIncomingViewingSecretKey.toBuffer());
36
- await __classPrivateFieldGet(this, _KeyStore_keys, "f").set(`${account.toString()}-ovsk_m`, masterOutgoingViewingSecretKey.toBuffer());
37
- await __classPrivateFieldGet(this, _KeyStore_keys, "f").set(`${account.toString()}-tsk_m`, masterTaggingSecretKey.toBuffer());
38
- await __classPrivateFieldGet(this, _KeyStore_keys, "f").set(`${account.toString()}-nsk_m`, masterNullifierSecretKey.toBuffer());
39
- await __classPrivateFieldGet(this, _KeyStore_keys, "f").set(`${account.toString()}-npk_m`, publicKeys.masterNullifierPublicKey.toBuffer());
40
- await __classPrivateFieldGet(this, _KeyStore_keys, "f").set(`${account.toString()}-ivpk_m`, publicKeys.masterIncomingViewingPublicKey.toBuffer());
41
- await __classPrivateFieldGet(this, _KeyStore_keys, "f").set(`${account.toString()}-ovpk_m`, publicKeys.masterOutgoingViewingPublicKey.toBuffer());
42
- await __classPrivateFieldGet(this, _KeyStore_keys, "f").set(`${account.toString()}-tpk_m`, publicKeys.masterTaggingPublicKey.toBuffer());
35
+ await this.#keys.set(`${account.toString()}-ivsk_m`, masterIncomingViewingSecretKey.toBuffer());
36
+ await this.#keys.set(`${account.toString()}-ovsk_m`, masterOutgoingViewingSecretKey.toBuffer());
37
+ await this.#keys.set(`${account.toString()}-tsk_m`, masterTaggingSecretKey.toBuffer());
38
+ await this.#keys.set(`${account.toString()}-nsk_m`, masterNullifierSecretKey.toBuffer());
39
+ await this.#keys.set(`${account.toString()}-npk_m`, publicKeys.masterNullifierPublicKey.toBuffer());
40
+ await this.#keys.set(`${account.toString()}-ivpk_m`, publicKeys.masterIncomingViewingPublicKey.toBuffer());
41
+ await this.#keys.set(`${account.toString()}-ovpk_m`, publicKeys.masterOutgoingViewingPublicKey.toBuffer());
42
+ await this.#keys.set(`${account.toString()}-tpk_m`, publicKeys.masterTaggingPublicKey.toBuffer());
43
43
  // We store pk_m_hash under `account-{n/iv/ov/t}pk_m_hash` key to be able to obtain address and key prefix
44
44
  // using the #getKeyPrefixAndAccount function later on
45
45
  const masterNullifierPublicKeyHash = await publicKeys.masterNullifierPublicKey.hash();
46
- await __classPrivateFieldGet(this, _KeyStore_keys, "f").set(`${account.toString()}-npk_m_hash`, masterNullifierPublicKeyHash.toBuffer());
46
+ await this.#keys.set(`${account.toString()}-npk_m_hash`, masterNullifierPublicKeyHash.toBuffer());
47
47
  const masterIncomingViewingPublicKeyHash = await publicKeys.masterIncomingViewingPublicKey.hash();
48
- await __classPrivateFieldGet(this, _KeyStore_keys, "f").set(`${account.toString()}-ivpk_m_hash`, masterIncomingViewingPublicKeyHash.toBuffer());
48
+ await this.#keys.set(`${account.toString()}-ivpk_m_hash`, masterIncomingViewingPublicKeyHash.toBuffer());
49
49
  const masterOutgoingViewingPublicKeyHash = await publicKeys.masterOutgoingViewingPublicKey.hash();
50
- await __classPrivateFieldGet(this, _KeyStore_keys, "f").set(`${account.toString()}-ovpk_m_hash`, masterOutgoingViewingPublicKeyHash.toBuffer());
50
+ await this.#keys.set(`${account.toString()}-ovpk_m_hash`, masterOutgoingViewingPublicKeyHash.toBuffer());
51
51
  const masterTaggingPublicKeyHash = await publicKeys.masterTaggingPublicKey.hash();
52
- await __classPrivateFieldGet(this, _KeyStore_keys, "f").set(`${account.toString()}-tpk_m_hash`, masterTaggingPublicKeyHash.toBuffer());
52
+ await this.#keys.set(`${account.toString()}-tpk_m_hash`, masterTaggingPublicKeyHash.toBuffer());
53
53
  // At last, we return the newly derived account address
54
54
  return completeAddress;
55
55
  }
56
56
  /**
57
- * Retrieves addresses of accounts stored in the key store.
58
- * @returns A Promise that resolves to an array of account addresses.
59
- */
60
- async getAccounts() {
61
- const allMapKeys = await toArray(__classPrivateFieldGet(this, _KeyStore_keys, "f").keysAsync());
57
+ * Retrieves addresses of accounts stored in the key store.
58
+ * @returns A Promise that resolves to an array of account addresses.
59
+ */ async getAccounts() {
60
+ const allMapKeys = await toArray(this.#keys.keysAsync());
62
61
  // We return account addresses based on the map keys that end with '-ivsk_m'
63
- const accounts = allMapKeys.filter(key => key.endsWith('-ivsk_m')).map(key => key.split('-')[0]);
64
- return accounts.map(account => AztecAddress.fromString(account));
62
+ const accounts = allMapKeys.filter((key)=>key.endsWith('-ivsk_m')).map((key)=>key.split('-')[0]);
63
+ return accounts.map((account)=>AztecAddress.fromString(account));
65
64
  }
66
65
  /**
67
- * Gets the key validation request for a given master public key hash and contract address.
68
- * @throws If the account corresponding to the master public key hash does not exist in the key store.
69
- * @param pkMHash - The master public key hash.
70
- * @param contractAddress - The contract address to silo the secret key in the key validation request with.
71
- * @returns The key validation request.
72
- */
73
- async getKeyValidationRequest(pkMHash, contractAddress) {
66
+ * Gets the key validation request for a given master public key hash and contract address.
67
+ * @throws If the account corresponding to the master public key hash does not exist in the key store.
68
+ * @param pkMHash - The master public key hash.
69
+ * @param contractAddress - The contract address to silo the secret key in the key validation request with.
70
+ * @returns The key validation request.
71
+ */ async getKeyValidationRequest(pkMHash, contractAddress) {
74
72
  const [keyPrefix, account] = await this.getKeyPrefixAndAccount(pkMHash);
75
73
  // Now we find the master public key for the account
76
- const pkMBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-${keyPrefix}pk_m`);
74
+ const pkMBuffer = await this.#keys.getAsync(`${account.toString()}-${keyPrefix}pk_m`);
77
75
  if (!pkMBuffer) {
78
76
  throw new Error(`Could not find ${keyPrefix}pk_m for account ${account.toString()} whose address was successfully obtained with ${keyPrefix}pk_m_hash ${pkMHash.toString()}.`);
79
77
  }
@@ -83,7 +81,7 @@ export class KeyStore {
83
81
  throw new Error(`Could not find ${keyPrefix}pkM for ${keyPrefix}pk_m_hash ${pkMHash.toString()}.`);
84
82
  }
85
83
  // Now we find the secret key for the public key
86
- const skMBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-${keyPrefix}sk_m`);
84
+ const skMBuffer = await this.#keys.getAsync(`${account.toString()}-${keyPrefix}sk_m`);
87
85
  if (!skMBuffer) {
88
86
  throw new Error(`Could not find ${keyPrefix}sk_m for account ${account.toString()} whose address was successfully obtained with ${keyPrefix}pk_m_hash ${pkMHash.toString()}.`);
89
87
  }
@@ -98,95 +96,92 @@ export class KeyStore {
98
96
  return new KeyValidationRequest(pkM, skApp);
99
97
  }
100
98
  /**
101
- * Gets the master nullifier public key for a given account.
102
- * @throws If the account does not exist in the key store.
103
- * @param account - The account address for which to retrieve the master nullifier public key.
104
- * @returns The master nullifier public key for the account.
105
- */
106
- async getMasterNullifierPublicKey(account) {
107
- const masterNullifierPublicKeyBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-npk_m`);
99
+ * Gets the master nullifier public key for a given account.
100
+ * @throws If the account does not exist in the key store.
101
+ * @param account - The account address for which to retrieve the master nullifier public key.
102
+ * @returns The master nullifier public key for the account.
103
+ */ async getMasterNullifierPublicKey(account) {
104
+ const masterNullifierPublicKeyBuffer = await this.#keys.getAsync(`${account.toString()}-npk_m`);
108
105
  if (!masterNullifierPublicKeyBuffer) {
109
106
  throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
110
107
  }
111
108
  return Point.fromBuffer(masterNullifierPublicKeyBuffer);
112
109
  }
113
110
  /**
114
- * Gets the master incoming viewing public key for a given account.
115
- * @throws If the account does not exist in the key store.
116
- * @param account - The account address for which to retrieve the master incoming viewing public key.
117
- * @returns The master incoming viewing public key for the account.
118
- */
119
- async getMasterIncomingViewingPublicKey(account) {
120
- const masterIncomingViewingPublicKeyBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-ivpk_m`);
111
+ * Gets the master incoming viewing public key for a given account.
112
+ * @throws If the account does not exist in the key store.
113
+ * @param account - The account address for which to retrieve the master incoming viewing public key.
114
+ * @returns The master incoming viewing public key for the account.
115
+ */ async getMasterIncomingViewingPublicKey(account) {
116
+ const masterIncomingViewingPublicKeyBuffer = await this.#keys.getAsync(`${account.toString()}-ivpk_m`);
121
117
  if (!masterIncomingViewingPublicKeyBuffer) {
122
118
  throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
123
119
  }
124
120
  return Point.fromBuffer(masterIncomingViewingPublicKeyBuffer);
125
121
  }
126
122
  /**
127
- * Retrieves the master outgoing viewing public key.
128
- * @throws If the account does not exist in the key store.
129
- * @param account - The account to retrieve the master outgoing viewing key for.
130
- * @returns A Promise that resolves to the master outgoing viewing key.
131
- */
132
- async getMasterOutgoingViewingPublicKey(account) {
133
- const masterOutgoingViewingPublicKeyBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-ovpk_m`);
123
+ * Retrieves the master outgoing viewing public key.
124
+ * @throws If the account does not exist in the key store.
125
+ * @param account - The account to retrieve the master outgoing viewing key for.
126
+ * @returns A Promise that resolves to the master outgoing viewing key.
127
+ */ async getMasterOutgoingViewingPublicKey(account) {
128
+ const masterOutgoingViewingPublicKeyBuffer = await this.#keys.getAsync(`${account.toString()}-ovpk_m`);
134
129
  if (!masterOutgoingViewingPublicKeyBuffer) {
135
130
  throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
136
131
  }
137
132
  return Point.fromBuffer(masterOutgoingViewingPublicKeyBuffer);
138
133
  }
139
134
  /**
140
- * Retrieves the master tagging public key.
141
- * @throws If the account does not exist in the key store.
142
- * @param account - The account to retrieve the master tagging key for.
143
- * @returns A Promise that resolves to the master tagging key.
144
- */
145
- async getMasterTaggingPublicKey(account) {
146
- const masterTaggingPublicKeyBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-tpk_m`);
135
+ * Retrieves the master tagging public key.
136
+ * @throws If the account does not exist in the key store.
137
+ * @param account - The account to retrieve the master tagging key for.
138
+ * @returns A Promise that resolves to the master tagging key.
139
+ */ async getMasterTaggingPublicKey(account) {
140
+ const masterTaggingPublicKeyBuffer = await this.#keys.getAsync(`${account.toString()}-tpk_m`);
147
141
  if (!masterTaggingPublicKeyBuffer) {
148
142
  throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
149
143
  }
150
144
  return Point.fromBuffer(masterTaggingPublicKeyBuffer);
151
145
  }
152
146
  /**
153
- * Retrieves master incoming viewing secret key.
154
- * @throws If the account does not exist in the key store.
155
- * @param account - The account to retrieve the master incoming viewing secret key for.
156
- * @returns A Promise that resolves to the master incoming viewing secret key.
157
- */
158
- async getMasterIncomingViewingSecretKey(account) {
159
- const masterIncomingViewingSecretKeyBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-ivsk_m`);
147
+ * Retrieves master incoming viewing secret key.
148
+ * @throws If the account does not exist in the key store.
149
+ * @param account - The account to retrieve the master incoming viewing secret key for.
150
+ * @returns A Promise that resolves to the master incoming viewing secret key.
151
+ */ async getMasterIncomingViewingSecretKey(account) {
152
+ const masterIncomingViewingSecretKeyBuffer = await this.#keys.getAsync(`${account.toString()}-ivsk_m`);
160
153
  if (!masterIncomingViewingSecretKeyBuffer) {
161
154
  throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
162
155
  }
163
156
  return GrumpkinScalar.fromBuffer(masterIncomingViewingSecretKeyBuffer);
164
157
  }
165
158
  /**
166
- * Retrieves application outgoing viewing secret key.
167
- * @throws If the account does not exist in the key store.
168
- * @param account - The account to retrieve the application outgoing viewing secret key for.
169
- * @param app - The application address to retrieve the outgoing viewing secret key for.
170
- * @returns A Promise that resolves to the application outgoing viewing secret key.
171
- */
172
- async getAppOutgoingViewingSecretKey(account, app) {
173
- const masterOutgoingViewingSecretKeyBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-ovsk_m`);
159
+ * Retrieves application outgoing viewing secret key.
160
+ * @throws If the account does not exist in the key store.
161
+ * @param account - The account to retrieve the application outgoing viewing secret key for.
162
+ * @param app - The application address to retrieve the outgoing viewing secret key for.
163
+ * @returns A Promise that resolves to the application outgoing viewing secret key.
164
+ */ async getAppOutgoingViewingSecretKey(account, app) {
165
+ const masterOutgoingViewingSecretKeyBuffer = await this.#keys.getAsync(`${account.toString()}-ovsk_m`);
174
166
  if (!masterOutgoingViewingSecretKeyBuffer) {
175
167
  throw new Error(`Account ${account.toString()} does not exist. Registered accounts: ${await this.getAccounts()}.`);
176
168
  }
177
169
  const masterOutgoingViewingSecretKey = GrumpkinScalar.fromBuffer(masterOutgoingViewingSecretKeyBuffer);
178
- return poseidon2HashWithSeparator([masterOutgoingViewingSecretKey.hi, masterOutgoingViewingSecretKey.lo, app], GeneratorIndex.OVSK_M);
170
+ return poseidon2HashWithSeparator([
171
+ masterOutgoingViewingSecretKey.hi,
172
+ masterOutgoingViewingSecretKey.lo,
173
+ app
174
+ ], GeneratorIndex.OVSK_M);
179
175
  }
180
176
  /**
181
- * Retrieves the sk_m corresponding to the pk_m.
182
- * @throws If the provided public key is not associated with any of the registered accounts.
183
- * @param pkM - The master public key to get secret key for.
184
- * @returns A Promise that resolves to sk_m.
185
- * @dev Used when feeding the sk_m to the kernel circuit for keys verification.
186
- */
187
- async getMasterSecretKey(pkM) {
177
+ * Retrieves the sk_m corresponding to the pk_m.
178
+ * @throws If the provided public key is not associated with any of the registered accounts.
179
+ * @param pkM - The master public key to get secret key for.
180
+ * @returns A Promise that resolves to sk_m.
181
+ * @dev Used when feeding the sk_m to the kernel circuit for keys verification.
182
+ */ async getMasterSecretKey(pkM) {
188
183
  const [keyPrefix, account] = await this.getKeyPrefixAndAccount(pkM);
189
- const secretKeyBuffer = await __classPrivateFieldGet(this, _KeyStore_keys, "f").getAsync(`${account.toString()}-${keyPrefix}sk_m`);
184
+ const secretKeyBuffer = await this.#keys.getAsync(`${account.toString()}-${keyPrefix}sk_m`);
190
185
  if (!secretKeyBuffer) {
191
186
  throw new Error(`Could not find ${keyPrefix}sk_m for ${keyPrefix}pk_m ${pkM.toString()}. This should not happen.`);
192
187
  }
@@ -198,20 +193,22 @@ export class KeyStore {
198
193
  return Promise.resolve(skM);
199
194
  }
200
195
  /**
201
- * Gets the key prefix and account address for a given value.
202
- * @returns A tuple containing the key prefix and account address.
203
- * @dev Note that this is quite inefficient but it should not matter because there should never be too many keys
204
- * in the key store.
205
- */
206
- async getKeyPrefixAndAccount(value) {
196
+ * Gets the key prefix and account address for a given value.
197
+ * @returns A tuple containing the key prefix and account address.
198
+ * @dev Note that this is quite inefficient but it should not matter because there should never be too many keys
199
+ * in the key store.
200
+ */ async getKeyPrefixAndAccount(value) {
207
201
  const valueBuffer = serializeToBuffer(value);
208
- for await (const [key, val] of __classPrivateFieldGet(this, _KeyStore_keys, "f").entriesAsync()) {
202
+ for await (const [key, val] of this.#keys.entriesAsync()){
209
203
  // Browser returns Uint8Array, Node.js returns Buffer
210
204
  if (Buffer.from(val).equals(valueBuffer)) {
211
- for (const prefix of KEY_PREFIXES) {
205
+ for (const prefix of KEY_PREFIXES){
212
206
  if (key.includes(`-${prefix}`)) {
213
207
  const account = AztecAddress.fromString(key.split('-')[0]);
214
- return [prefix, account];
208
+ return [
209
+ prefix,
210
+ account
211
+ ];
215
212
  }
216
213
  }
217
214
  }
@@ -219,5 +216,3 @@ export class KeyStore {
219
216
  throw new Error(`Could not find key prefix.`);
220
217
  }
221
218
  }
222
- _KeyStore_keys = new WeakMap();
223
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key_store.js","sourceRoot":"","sources":["../src/key_store.ts"],"names":[],"mappings":";;AACA,OAAO,EACL,YAAY,EACZ,eAAe,EACf,EAAE,EACF,cAAc,EACd,cAAc,EACd,YAAY,EAEZ,oBAAoB,EAEpB,KAAK,EACL,mBAAmB,EACnB,UAAU,EACV,4BAA4B,GAC7B,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,0BAA0B,EAAE,MAAM,0BAA0B,CAAC;AACtE,OAAO,EAAE,OAAO,EAAE,MAAM,4BAA4B,CAAC;AACrD,OAAO,EAAmB,iBAAiB,EAAE,MAAM,6BAA6B,CAAC;AAGjF;;GAEG;AACH,MAAM,OAAO,QAAQ;IAGnB,YAAY,QAA2B;QAFvC,iCAAqC;QAGnC,uBAAA,IAAI,kBAAS,QAAQ,CAAC,OAAO,CAAC,WAAW,CAAC,MAAA,CAAC;IAC7C,CAAC;IAED;;;OAGG;IACI,aAAa;QAClB,MAAM,EAAE,GAAG,EAAE,CAAC,MAAM,EAAE,CAAC;QACvB,MAAM,cAAc,GAAG,EAAE,CAAC,MAAM,EAAE,CAAC;QACnC,OAAO,IAAI,CAAC,UAAU,CAAC,EAAE,EAAE,cAAc,CAAC,CAAC;IAC7C,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,UAAU,CAAC,EAAM,EAAE,cAA8B;QAC5D,MAAM,EACJ,wBAAwB,EACxB,8BAA8B,EAC9B,8BAA8B,EAC9B,sBAAsB,EACtB,UAAU,GACX,GAAG,MAAM,UAAU,CAAC,EAAE,CAAC,CAAC;QAEzB,MAAM,eAAe,GAAG,MAAM,eAAe,CAAC,8BAA8B,CAAC,EAAE,EAAE,cAAc,CAAC,CAAC;QACjG,MAAM,EAAE,OAAO,EAAE,OAAO,EAAE,GAAG,eAAe,CAAC;QAE7C,iEAAiE;QACjE,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,EAAE,8BAA8B,CAAC,QAAQ,EAAE,CAAC,CAAC;QAChG,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,EAAE,8BAA8B,CAAC,QAAQ,EAAE,CAAC,CAAC;QAChG,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,EAAE,sBAAsB,CAAC,QAAQ,EAAE,CAAC,CAAC;QACvF,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,EAAE,wBAAwB,CAAC,QAAQ,EAAE,CAAC,CAAC;QAEzF,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,EAAE,UAAU,CAAC,wBAAwB,CAAC,QAAQ,EAAE,CAAC,CAAC;QACpG,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,EAAE,UAAU,CAAC,8BAA8B,CAAC,QAAQ,EAAE,CAAC,CAAC;QAC3G,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,EAAE,UAAU,CAAC,8BAA8B,CAAC,QAAQ,EAAE,CAAC,CAAC;QAC3G,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,EAAE,UAAU,CAAC,sBAAsB,CAAC,QAAQ,EAAE,CAAC,CAAC;QAElG,0GAA0G;QAC1G,sDAAsD;QACtD,MAAM,4BAA4B,GAAG,MAAM,UAAU,CAAC,wBAAwB,CAAC,IAAI,EAAE,CAAC;QACtF,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,aAAa,EAAE,4BAA4B,CAAC,QAAQ,EAAE,CAAC,CAAC;QAClG,MAAM,kCAAkC,GAAG,MAAM,UAAU,CAAC,8BAA8B,CAAC,IAAI,EAAE,CAAC;QAClG,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,cAAc,EAAE,kCAAkC,CAAC,QAAQ,EAAE,CAAC,CAAC;QACzG,MAAM,kCAAkC,GAAG,MAAM,UAAU,CAAC,8BAA8B,CAAC,IAAI,EAAE,CAAC;QAClG,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,cAAc,EAAE,kCAAkC,CAAC,QAAQ,EAAE,CAAC,CAAC;QACzG,MAAM,0BAA0B,GAAG,MAAM,UAAU,CAAC,sBAAsB,CAAC,IAAI,EAAE,CAAC;QAClF,MAAM,uBAAA,IAAI,sBAAM,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,aAAa,EAAE,0BAA0B,CAAC,QAAQ,EAAE,CAAC,CAAC;QAEhG,uDAAuD;QACvD,OAAO,eAAe,CAAC;IACzB,CAAC;IAED;;;OAGG;IACI,KAAK,CAAC,WAAW;QACtB,MAAM,UAAU,GAAG,MAAM,OAAO,CAAC,uBAAA,IAAI,sBAAM,CAAC,SAAS,EAAE,CAAC,CAAC;QACzD,4EAA4E;QAC5E,MAAM,QAAQ,GAAG,UAAU,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QACjG,OAAO,QAAQ,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC;IACnE,CAAC;IAED;;;;;;OAMG;IACI,KAAK,CAAC,uBAAuB,CAAC,OAAW,EAAE,eAA6B;QAC7E,MAAM,CAAC,SAAS,EAAE,OAAO,CAAC,GAAG,MAAM,IAAI,CAAC,sBAAsB,CAAC,OAAO,CAAC,CAAC;QAExE,oDAAoD;QACpD,MAAM,SAAS,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,IAAI,SAAS,MAAM,CAAC,CAAC;QACtF,IAAI,CAAC,SAAS,EAAE,CAAC;YACf,MAAM,IAAI,KAAK,CACb,kBAAkB,SAAS,oBAAoB,OAAO,CAAC,QAAQ,EAAE,iDAAiD,SAAS,aAAa,OAAO,CAAC,QAAQ,EAAE,GAAG,CAC9J,CAAC;QACJ,CAAC;QAED,MAAM,GAAG,GAAG,KAAK,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC;QACxC,MAAM,eAAe,GAAG,MAAM,GAAG,CAAC,IAAI,EAAE,CAAC;QACzC,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,OAAO,CAAC,EAAE,CAAC;YACrC,MAAM,IAAI,KAAK,CAAC,kBAAkB,SAAS,WAAW,SAAS,aAAa,OAAO,CAAC,QAAQ,EAAE,GAAG,CAAC,CAAC;QACrG,CAAC;QAED,gDAAgD;QAChD,MAAM,SAAS,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,IAAI,SAAS,MAAM,CAAC,CAAC;QACtF,IAAI,CAAC,SAAS,EAAE,CAAC;YACf,MAAM,IAAI,KAAK,CACb,kBAAkB,SAAS,oBAAoB,OAAO,CAAC,QAAQ,EAAE,iDAAiD,SAAS,aAAa,OAAO,CAAC,QAAQ,EAAE,GAAG,CAC9J,CAAC;QACJ,CAAC;QAED,MAAM,GAAG,GAAG,cAAc,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC;QAEjD,kFAAkF;QAClF,MAAM,UAAU,GAAG,MAAM,4BAA4B,CAAC,GAAG,CAAC,CAAC;QAC3D,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC;YAC5B,MAAM,IAAI,KAAK,CAAC,oBAAoB,SAAS,YAAY,SAAS,MAAM,CAAC,CAAC;QAC5E,CAAC;QAED,uEAAuE;QACvE,MAAM,KAAK,GAAG,MAAM,mBAAmB,CAAC,GAAG,EAAE,eAAe,EAAE,SAAU,CAAC,CAAC;QAE1E,OAAO,IAAI,oBAAoB,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;IAC9C,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,2BAA2B,CAAC,OAAqB;QAC5D,MAAM,8BAA8B,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;QAChG,IAAI,CAAC,8BAA8B,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,KAAK,CAAC,UAAU,CAAC,8BAA8B,CAAC,CAAC;IAC1D,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,iCAAiC,CAAC,OAAqB;QAClE,MAAM,oCAAoC,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QACvG,IAAI,CAAC,oCAAoC,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,KAAK,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC;IAChE,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,iCAAiC,CAAC,OAAqB;QAClE,MAAM,oCAAoC,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QACvG,IAAI,CAAC,oCAAoC,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,KAAK,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC;IAChE,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,yBAAyB,CAAC,OAAqB;QAC1D,MAAM,4BAA4B,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;QAC9F,IAAI,CAAC,4BAA4B,EAAE,CAAC;YAClC,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,KAAK,CAAC,UAAU,CAAC,4BAA4B,CAAC,CAAC;IACxD,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,iCAAiC,CAAC,OAAqB;QAClE,MAAM,oCAAoC,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QACvG,IAAI,CAAC,oCAAoC,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,OAAO,cAAc,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC;IACzE,CAAC;IAED;;;;;;OAMG;IACI,KAAK,CAAC,8BAA8B,CAAC,OAAqB,EAAE,GAAiB;QAClF,MAAM,oCAAoC,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QACvG,IAAI,CAAC,oCAAoC,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CACb,WAAW,OAAO,CAAC,QAAQ,EAAE,yCAAyC,MAAM,IAAI,CAAC,WAAW,EAAE,GAAG,CAClG,CAAC;QACJ,CAAC;QACD,MAAM,8BAA8B,GAAG,cAAc,CAAC,UAAU,CAAC,oCAAoC,CAAC,CAAC;QAEvG,OAAO,0BAA0B,CAC/B,CAAC,8BAA8B,CAAC,EAAE,EAAE,8BAA8B,CAAC,EAAE,EAAE,GAAG,CAAC,EAC3E,cAAc,CAAC,MAAM,CACtB,CAAC;IACJ,CAAC;IAED;;;;;;OAMG;IACI,KAAK,CAAC,kBAAkB,CAAC,GAAc;QAC5C,MAAM,CAAC,SAAS,EAAE,OAAO,CAAC,GAAG,MAAM,IAAI,CAAC,sBAAsB,CAAC,GAAG,CAAC,CAAC;QAEpE,MAAM,eAAe,GAAG,MAAM,uBAAA,IAAI,sBAAM,CAAC,QAAQ,CAAC,GAAG,OAAO,CAAC,QAAQ,EAAE,IAAI,SAAS,MAAM,CAAC,CAAC;QAC5F,IAAI,CAAC,eAAe,EAAE,CAAC;YACrB,MAAM,IAAI,KAAK,CACb,kBAAkB,SAAS,YAAY,SAAS,QAAQ,GAAG,CAAC,QAAQ,EAAE,2BAA2B,CAClG,CAAC;QACJ,CAAC;QAED,MAAM,GAAG,GAAG,cAAc,CAAC,UAAU,CAAC,eAAe,CAAC,CAAC;QACvD,MAAM,UAAU,GAAG,MAAM,4BAA4B,CAAC,GAAG,CAAC,CAAC;QAC3D,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC;YAC5B,MAAM,IAAI,KAAK,CAAC,kBAAkB,SAAS,WAAW,SAAS,OAAO,GAAG,CAAC,QAAQ,EAAE,yBAAyB,CAAC,CAAC;QACjH,CAAC;QAED,OAAO,OAAO,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;IAC9B,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,sBAAsB,CAAC,KAAiB;QACnD,MAAM,WAAW,GAAG,iBAAiB,CAAC,KAAK,CAAC,CAAC;QAC7C,IAAI,KAAK,EAAE,MAAM,CAAC,GAAG,EAAE,GAAG,CAAC,IAAI,uBAAA,IAAI,sBAAM,CAAC,YAAY,EAAE,EAAE,CAAC;YACzD,qDAAqD;YACrD,IAAI,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC;gBACzC,KAAK,MAAM,MAAM,IAAI,YAAY,EAAE,CAAC;oBAClC,IAAI,GAAG,CAAC,QAAQ,CAAC,IAAI,MAAM,EAAE,CAAC,EAAE,CAAC;wBAC/B,MAAM,OAAO,GAAG,YAAY,CAAC,UAAU,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;wBAC3D,OAAO,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;oBAC3B,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QACD,MAAM,IAAI,KAAK,CAAC,4BAA4B,CAAC,CAAC;IAChD,CAAC;CACF"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aztec/key-store",
3
- "version": "0.76.4-devnet-test-rc3",
3
+ "version": "0.77.0-testnet-ignition.17",
4
4
  "type": "module",
5
5
  "exports": "./dest/index.js",
6
6
  "typedocOptions": {
@@ -16,7 +16,7 @@
16
16
  "clean": "rm -rf ./dest .tsbuildinfo",
17
17
  "formatting": "run -T prettier --check ./src && run -T eslint ./src",
18
18
  "formatting:fix": "run -T eslint --fix ./src && run -T prettier -w ./src",
19
- "test": "HARDWARE_CONCURRENCY=${HARDWARE_CONCURRENCY:-16} RAYON_NUM_THREADS=${RAYON_NUM_THREADS:-4} NODE_NO_WARNINGS=1 node --experimental-vm-modules ../node_modules/.bin/jest --passWithNoTests --maxWorkers=${JEST_MAX_WORKERS:-8}"
19
+ "test": "NODE_NO_WARNINGS=1 node --experimental-vm-modules ../node_modules/.bin/jest --passWithNoTests --maxWorkers=${JEST_MAX_WORKERS:-8}"
20
20
  },
21
21
  "inherits": [
22
22
  "../package.common.json"
@@ -49,16 +49,16 @@
49
49
  "reporters": [
50
50
  "default"
51
51
  ],
52
- "testTimeout": 30000,
52
+ "testTimeout": 120000,
53
53
  "setupFiles": [
54
54
  "../../foundation/src/jest/setup.mjs"
55
55
  ]
56
56
  },
57
57
  "dependencies": {
58
- "@aztec/circuit-types": "0.76.4-devnet-test-rc3",
59
- "@aztec/circuits.js": "0.76.4-devnet-test-rc3",
60
- "@aztec/foundation": "0.76.4-devnet-test-rc3",
61
- "@aztec/kv-store": "0.76.4-devnet-test-rc3",
58
+ "@aztec/constants": "0.77.0-testnet-ignition.17",
59
+ "@aztec/foundation": "0.77.0-testnet-ignition.17",
60
+ "@aztec/kv-store": "0.77.0-testnet-ignition.17",
61
+ "@aztec/stdlib": "0.77.0-testnet-ignition.17",
62
62
  "tslib": "^2.4.0"
63
63
  },
64
64
  "devDependencies": {
package/src/key_store.ts CHANGED
@@ -1,23 +1,20 @@
1
- import { type PublicKey } from '@aztec/circuit-types';
1
+ import { GeneratorIndex } from '@aztec/constants';
2
+ import { poseidon2HashWithSeparator } from '@aztec/foundation/crypto';
3
+ import { Fr, GrumpkinScalar, Point } from '@aztec/foundation/fields';
4
+ import { toArray } from '@aztec/foundation/iterable';
5
+ import { type Bufferable, serializeToBuffer } from '@aztec/foundation/serialize';
6
+ import type { AztecAsyncKVStore, AztecAsyncMap } from '@aztec/kv-store';
7
+ import { AztecAddress } from '@aztec/stdlib/aztec-address';
8
+ import { CompleteAddress, type PartialAddress } from '@aztec/stdlib/contract';
9
+ import { KeyValidationRequest } from '@aztec/stdlib/kernel';
2
10
  import {
3
- AztecAddress,
4
- CompleteAddress,
5
- Fr,
6
- GeneratorIndex,
7
- GrumpkinScalar,
8
11
  KEY_PREFIXES,
9
12
  type KeyPrefix,
10
- KeyValidationRequest,
11
- type PartialAddress,
12
- Point,
13
+ type PublicKey,
13
14
  computeAppSecretKey,
14
15
  deriveKeys,
15
16
  derivePublicKeyFromSecretKey,
16
- } from '@aztec/circuits.js';
17
- import { poseidon2HashWithSeparator } from '@aztec/foundation/crypto';
18
- import { toArray } from '@aztec/foundation/iterable';
19
- import { type Bufferable, serializeToBuffer } from '@aztec/foundation/serialize';
20
- import { type AztecAsyncKVStore, type AztecAsyncMap } from '@aztec/kv-store';
17
+ } from '@aztec/stdlib/keys';
21
18
 
22
19
  /**
23
20
  * Used for managing keys. Can hold keys of multiple accounts.