@aztec/wallet-sdk 0.0.1-commit.21caa21 → 0.0.1-commit.3469e52
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +240 -266
- package/dest/base-wallet/base_wallet.d.ts +20 -10
- package/dest/base-wallet/base_wallet.d.ts.map +1 -1
- package/dest/base-wallet/base_wallet.js +51 -21
- package/dest/crypto.d.ts +183 -0
- package/dest/crypto.d.ts.map +1 -0
- package/dest/crypto.js +300 -0
- package/dest/manager/index.d.ts +4 -3
- package/dest/manager/index.d.ts.map +1 -1
- package/dest/manager/index.js +2 -0
- package/dest/manager/types.d.ts +22 -1
- package/dest/manager/types.d.ts.map +1 -1
- package/dest/manager/wallet_manager.d.ts +1 -1
- package/dest/manager/wallet_manager.d.ts.map +1 -1
- package/dest/manager/wallet_manager.js +34 -15
- package/dest/providers/extension/extension_provider.d.ts +53 -7
- package/dest/providers/extension/extension_provider.d.ts.map +1 -1
- package/dest/providers/extension/extension_provider.js +81 -13
- package/dest/providers/extension/extension_wallet.d.ts +140 -8
- package/dest/providers/extension/extension_wallet.d.ts.map +1 -1
- package/dest/providers/extension/extension_wallet.js +268 -46
- package/dest/providers/extension/index.d.ts +6 -4
- package/dest/providers/extension/index.d.ts.map +1 -1
- package/dest/providers/extension/index.js +2 -0
- package/dest/types.d.ts +92 -0
- package/dest/types.d.ts.map +1 -0
- package/dest/types.js +10 -0
- package/package.json +13 -11
- package/src/base-wallet/base_wallet.ts +67 -33
- package/src/crypto.ts +375 -0
- package/src/manager/index.ts +4 -8
- package/src/manager/types.ts +22 -0
- package/src/manager/wallet_manager.ts +43 -16
- package/src/providers/extension/extension_provider.ts +112 -17
- package/src/providers/extension/extension_wallet.ts +310 -55
- package/src/providers/extension/index.ts +5 -3
- package/src/{providers/types.ts → types.ts} +33 -6
- package/dest/providers/types.d.ts +0 -67
- package/dest/providers/types.d.ts.map +0 -1
- package/dest/providers/types.js +0 -3
|
@@ -1,16 +1,16 @@
|
|
|
1
1
|
import type { Account } from '@aztec/aztec.js/account';
|
|
2
2
|
import type { CallIntent, IntentInnerHash } from '@aztec/aztec.js/authorization';
|
|
3
3
|
import type { FeePaymentMethod } from '@aztec/aztec.js/fee';
|
|
4
|
-
import type { Aliased, BatchResults,
|
|
4
|
+
import type { Aliased, BatchResults, BatchedMethod, PrivateEvent, PrivateEventFilter, ProfileOptions, SendOptions, SimulateOptions, Wallet } from '@aztec/aztec.js/wallet';
|
|
5
5
|
import { AccountFeePaymentMethodOptions } from '@aztec/entrypoints/account';
|
|
6
6
|
import type { ChainInfo } from '@aztec/entrypoints/interfaces';
|
|
7
|
-
import { Fr } from '@aztec/foundation/
|
|
7
|
+
import { Fr } from '@aztec/foundation/curves/bn254';
|
|
8
8
|
import type { FieldsOf } from '@aztec/foundation/types';
|
|
9
9
|
import type { PXE } from '@aztec/pxe/server';
|
|
10
10
|
import { type ContractArtifact, type EventMetadataDefinition, type FunctionCall } from '@aztec/stdlib/abi';
|
|
11
11
|
import type { AuthWitness } from '@aztec/stdlib/auth-witness';
|
|
12
12
|
import type { AztecAddress } from '@aztec/stdlib/aztec-address';
|
|
13
|
-
import { type
|
|
13
|
+
import { type ContractInstanceWithAddress } from '@aztec/stdlib/contract';
|
|
14
14
|
import { GasSettings } from '@aztec/stdlib/gas';
|
|
15
15
|
import type { AztecNode } from '@aztec/stdlib/interfaces/client';
|
|
16
16
|
import type { TxExecutionRequest, TxHash, TxProfileResult, TxReceipt, TxSimulationResult, UtilitySimulationResult } from '@aztec/stdlib/tx';
|
|
@@ -36,7 +36,7 @@ export declare abstract class BaseWallet implements Wallet {
|
|
|
36
36
|
protected readonly pxe: PXE;
|
|
37
37
|
protected readonly aztecNode: AztecNode;
|
|
38
38
|
protected log: import("@aztec/foundation/log").Logger;
|
|
39
|
-
protected
|
|
39
|
+
protected minFeePadding: number;
|
|
40
40
|
protected cancellableTransactions: boolean;
|
|
41
41
|
protected constructor(pxe: PXE, aztecNode: AztecNode);
|
|
42
42
|
protected abstract getAccountFromAddress(address: AztecAddress): Promise<Account>;
|
|
@@ -51,8 +51,8 @@ export declare abstract class BaseWallet implements Wallet {
|
|
|
51
51
|
getAddressBook(): Promise<Aliased<AztecAddress>[]>;
|
|
52
52
|
getChainInfo(): Promise<ChainInfo>;
|
|
53
53
|
protected createTxExecutionRequestFromPayloadAndFee(executionPayload: ExecutionPayload, from: AztecAddress, feeOptions: FeeOptions): Promise<TxExecutionRequest>;
|
|
54
|
-
createAuthWit(from: AztecAddress, messageHashOrIntent:
|
|
55
|
-
batch<const T extends readonly BatchedMethod
|
|
54
|
+
createAuthWit(from: AztecAddress, messageHashOrIntent: IntentInnerHash | CallIntent): Promise<AuthWitness>;
|
|
55
|
+
batch<const T extends readonly BatchedMethod[]>(methods: T): Promise<BatchResults<T>>;
|
|
56
56
|
/**
|
|
57
57
|
* Completes partial user-provided fee options with wallet defaults.
|
|
58
58
|
* @param from - The address where the transaction is being sent from
|
|
@@ -86,9 +86,19 @@ export declare abstract class BaseWallet implements Wallet {
|
|
|
86
86
|
sendTx(executionPayload: ExecutionPayload, opts: SendOptions): Promise<TxHash>;
|
|
87
87
|
protected contextualizeError(err: Error, ...context: string[]): Error;
|
|
88
88
|
simulateUtility(call: FunctionCall, authwits?: AuthWitness[]): Promise<UtilitySimulationResult>;
|
|
89
|
-
getContractClassMetadata(id: Fr, includeArtifact?: boolean): Promise<ContractClassMetadata>;
|
|
90
|
-
getContractMetadata(address: AztecAddress): Promise<ContractMetadata>;
|
|
91
89
|
getTxReceipt(txHash: TxHash): Promise<TxReceipt>;
|
|
92
|
-
getPrivateEvents<T>(
|
|
90
|
+
getPrivateEvents<T>(eventDef: EventMetadataDefinition, eventFilter: PrivateEventFilter): Promise<PrivateEvent<T>[]>;
|
|
91
|
+
getContractMetadata(address: AztecAddress): Promise<{
|
|
92
|
+
instance: ContractInstanceWithAddress | undefined;
|
|
93
|
+
isContractInitialized: boolean;
|
|
94
|
+
isContractPublished: boolean;
|
|
95
|
+
isContractClassPubliclyRegistered: boolean;
|
|
96
|
+
isContractUpdated: boolean;
|
|
97
|
+
updatedContractClassId: Fr | undefined;
|
|
98
|
+
}>;
|
|
99
|
+
getContractClassMetadata(id: Fr): Promise<{
|
|
100
|
+
isArtifactRegistered: boolean;
|
|
101
|
+
isContractClassPubliclyRegistered: boolean;
|
|
102
|
+
}>;
|
|
93
103
|
}
|
|
94
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
104
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"base_wallet.d.ts","sourceRoot":"","sources":["../../src/base-wallet/base_wallet.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,yBAAyB,CAAC;AACvD,OAAO,KAAK,EAAE,UAAU,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AACjF,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,qBAAqB,CAAC;AAC5D,OAAO,KAAK,EACV,OAAO,EACP,YAAY,EACZ,
|
|
1
|
+
{"version":3,"file":"base_wallet.d.ts","sourceRoot":"","sources":["../../src/base-wallet/base_wallet.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,yBAAyB,CAAC;AACvD,OAAO,KAAK,EAAE,UAAU,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AACjF,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,qBAAqB,CAAC;AAC5D,OAAO,KAAK,EACV,OAAO,EACP,YAAY,EACZ,aAAa,EACb,YAAY,EACZ,kBAAkB,EAClB,cAAc,EACd,WAAW,EACX,eAAe,EACf,MAAM,EACP,MAAM,wBAAwB,CAAC;AAOhC,OAAO,EAAE,8BAA8B,EAAwC,MAAM,4BAA4B,CAAC;AAClH,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,+BAA+B,CAAC;AAC/D,OAAO,EAAE,EAAE,EAAE,MAAM,gCAAgC,CAAC;AAEpD,OAAO,KAAK,EAAE,QAAQ,EAAE,MAAM,yBAAyB,CAAC;AACxD,OAAO,KAAK,EAAE,GAAG,EAAsB,MAAM,mBAAmB,CAAC;AACjE,OAAO,EACL,KAAK,gBAAgB,EACrB,KAAK,uBAAuB,EAC5B,KAAK,YAAY,EAElB,MAAM,mBAAmB,CAAC;AAC3B,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,4BAA4B,CAAC;AAC9D,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAChE,OAAO,EACL,KAAK,2BAA2B,EAGjC,MAAM,wBAAwB,CAAC;AAEhC,OAAO,EAAO,WAAW,EAAE,MAAM,mBAAmB,CAAC;AAErD,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,iCAAiC,CAAC;AACjE,OAAO,KAAK,EACV,kBAAkB,EAClB,MAAM,EACN,eAAe,EACf,SAAS,EACT,kBAAkB,EAClB,uBAAuB,EACxB,MAAM,kBAAkB,CAAC;AAC1B,OAAO,EAAE,gBAAgB,EAA0B,MAAM,kBAAkB,CAAC;AAI5E;;GAEG;AACH,MAAM,MAAM,UAAU,GAAG;IACvB;;;OAGG;IACH,sBAAsB,CAAC,EAAE,gBAAgB,CAAC;IAC1C,+FAA+F;IAC/F,8BAA8B,EAAE,8BAA8B,CAAC;IAC/D,kDAAkD;IAClD,WAAW,EAAE,WAAW,CAAC;CAC1B,CAAC;AAEF;;GAEG;AACH,8BAAsB,UAAW,YAAW,MAAM;IAQ9C,SAAS,CAAC,QAAQ,CAAC,GAAG,EAAE,GAAG;IAC3B,SAAS,CAAC,QAAQ,CAAC,SAAS,EAAE,SAAS;IARzC,SAAS,CAAC,GAAG,yCAA0C;IAEvD,SAAS,CAAC,aAAa,SAAO;IAC9B,SAAS,CAAC,uBAAuB,UAAS;IAG1C,SAAS,aACY,GAAG,EAAE,GAAG,EACR,SAAS,EAAE,SAAS,EACrC;IAEJ,SAAS,CAAC,QAAQ,CAAC,qBAAqB,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,OAAO,CAAC,CAAC;IAElF,QAAQ,CAAC,WAAW,IAAI,OAAO,CAAC,OAAO,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC;IAEzD;;;;;;OAMG;IACG,cAAc,IAAI,OAAO,CAAC,OAAO,CAAC,YAAY,CAAC,EAAE,CAAC,CAGvD;IAEK,YAAY,IAAI,OAAO,CAAC,SAAS,CAAC,CAGvC;IAED,UAAgB,yCAAyC,CACvD,gBAAgB,EAAE,gBAAgB,EAClC,IAAI,EAAE,YAAY,EAClB,UAAU,EAAE,UAAU,GACrB,OAAO,CAAC,kBAAkB,CAAC,CAkB7B;IAEY,aAAa,CACxB,IAAI,EAAE,YAAY,EAClB,mBAAmB,EAAE,eAAe,GAAG,UAAU,GAChD,OAAO,CAAC,WAAW,CAAC,CAItB;IAEY,KAAK,CAAC,KAAK,CAAC,CAAC,SAAS,SAAS,aAAa,EAAE,EAAE,OAAO,EAAE,CAAC,GAAG,OAAO,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,CAgBjG;IAED;;;;;;OAMG;IACH,UAAgB,kBAAkB,CAChC,IAAI,EAAE,YAAY,EAClB,QAAQ,CAAC,EAAE,YAAY,EACvB,WAAW,CAAC,EAAE,OAAO,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC,GAC3C,OAAO,CAAC,UAAU,CAAC,CAsBrB;IAED;;;;;;;OAOG;IACH,UAAgB,+BAA+B,CAC7C,IAAI,EAAE,YAAY,EAClB,QAAQ,CAAC,EAAE,YAAY,EACvB,WAAW,CAAC,EAAE,OAAO,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC;QAhJ9C;;;WAGG;;QAEH,+FAA+F;;;OA6J9F;IAED,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE,MAAM,GAAE,MAAW,GAAG,OAAO,CAAC,YAAY,CAAC,CAEhF;IAEK,gBAAgB,CACpB,QAAQ,EAAE,2BAA2B,EACrC,QAAQ,CAAC,EAAE,gBAAgB,EAC3B,SAAS,CAAC,EAAE,EAAE,GACb,OAAO,CAAC,2BAA2B,CAAC,CAgCtC;IAEK,UAAU,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,IAAI,EAAE,eAAe,GAAG,OAAO,CAAC,kBAAkB,CAAC,CAWvG;IAEK,SAAS,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,IAAI,EAAE,cAAc,GAAG,OAAO,CAAC,eAAe,CAAC,CAIlG;IAEK,MAAM,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,IAAI,EAAE,WAAW,GAAG,OAAO,CAAC,MAAM,CAAC,CAenF;IAED,SAAS,CAAC,kBAAkB,CAAC,GAAG,EAAE,KAAK,EAAE,GAAG,OAAO,EAAE,MAAM,EAAE,GAAG,KAAK,CAYpE;IAED,eAAe,CAAC,IAAI,EAAE,YAAY,EAAE,QAAQ,CAAC,EAAE,WAAW,EAAE,GAAG,OAAO,CAAC,uBAAuB,CAAC,CAE9F;IAED,YAAY,CAAC,MAAM,EAAE,MAAM,GAAG,OAAO,CAAC,SAAS,CAAC,CAE/C;IAEK,gBAAgB,CAAC,CAAC,EACtB,QAAQ,EAAE,uBAAuB,EACjC,WAAW,EAAE,kBAAkB,GAC9B,OAAO,CAAC,YAAY,CAAC,CAAC,CAAC,EAAE,CAAC,CAe5B;IAEK,mBAAmB,CAAC,OAAO,EAAE,YAAY;;;;;;;OAuB9C;IAEK,wBAAwB,CAAC,EAAE,EAAE,EAAE;;;OAMpC;CACF"}
|
|
@@ -1,11 +1,12 @@
|
|
|
1
1
|
import { GAS_ESTIMATION_DA_GAS_LIMIT, GAS_ESTIMATION_L2_GAS_LIMIT, GAS_ESTIMATION_TEARDOWN_DA_GAS_LIMIT, GAS_ESTIMATION_TEARDOWN_L2_GAS_LIMIT } from '@aztec/constants';
|
|
2
2
|
import { AccountFeePaymentMethodOptions } from '@aztec/entrypoints/account';
|
|
3
|
-
import { Fr } from '@aztec/foundation/
|
|
3
|
+
import { Fr } from '@aztec/foundation/curves/bn254';
|
|
4
4
|
import { createLogger } from '@aztec/foundation/log';
|
|
5
5
|
import { decodeFromAbi } from '@aztec/stdlib/abi';
|
|
6
6
|
import { computePartialAddress, getContractClassFromArtifact } from '@aztec/stdlib/contract';
|
|
7
7
|
import { SimulationError } from '@aztec/stdlib/errors';
|
|
8
8
|
import { Gas, GasSettings } from '@aztec/stdlib/gas';
|
|
9
|
+
import { siloNullifier } from '@aztec/stdlib/hash';
|
|
9
10
|
import { mergeExecutionPayloads } from '@aztec/stdlib/tx';
|
|
10
11
|
import { inspect } from 'util';
|
|
11
12
|
/**
|
|
@@ -14,14 +15,14 @@ import { inspect } from 'util';
|
|
|
14
15
|
pxe;
|
|
15
16
|
aztecNode;
|
|
16
17
|
log;
|
|
17
|
-
|
|
18
|
+
minFeePadding;
|
|
18
19
|
cancellableTransactions;
|
|
19
20
|
// Protected because we want to force wallets to instantiate their own PXE.
|
|
20
21
|
constructor(pxe, aztecNode){
|
|
21
22
|
this.pxe = pxe;
|
|
22
23
|
this.aztecNode = aztecNode;
|
|
23
24
|
this.log = createLogger('wallet-sdk:base_wallet');
|
|
24
|
-
this.
|
|
25
|
+
this.minFeePadding = 0.5;
|
|
25
26
|
this.cancellableTransactions = false;
|
|
26
27
|
}
|
|
27
28
|
/**
|
|
@@ -56,11 +57,13 @@ import { inspect } from 'util';
|
|
|
56
57
|
executionPayload
|
|
57
58
|
]) : executionPayload;
|
|
58
59
|
const fromAccount = await this.getAccountFromAddress(from);
|
|
59
|
-
|
|
60
|
+
const chainInfo = await this.getChainInfo();
|
|
61
|
+
return fromAccount.createTxExecutionRequest(finalExecutionPayload, feeOptions.gasSettings, chainInfo, executionOptions);
|
|
60
62
|
}
|
|
61
63
|
async createAuthWit(from, messageHashOrIntent) {
|
|
62
64
|
const account = await this.getAccountFromAddress(from);
|
|
63
|
-
|
|
65
|
+
const chainInfo = await this.getChainInfo();
|
|
66
|
+
return account.createAuthWit(messageHashOrIntent, chainInfo);
|
|
64
67
|
}
|
|
65
68
|
async batch(methods) {
|
|
66
69
|
const results = [];
|
|
@@ -88,7 +91,7 @@ import { inspect } from 'util';
|
|
|
88
91
|
* @param gasSettings - User-provided partial gas settings
|
|
89
92
|
* @returns - Complete fee options that can be used to create a transaction execution request
|
|
90
93
|
*/ async completeFeeOptions(from, feePayer, gasSettings) {
|
|
91
|
-
const maxFeesPerGas = gasSettings?.maxFeesPerGas ?? (await this.aztecNode.
|
|
94
|
+
const maxFeesPerGas = gasSettings?.maxFeesPerGas ?? (await this.aztecNode.getCurrentMinFees()).mul(1 + this.minFeePadding);
|
|
92
95
|
let accountFeePaymentMethodOptions;
|
|
93
96
|
// The transaction does not include a fee payment method, so we set the flag
|
|
94
97
|
// for the account to use its fee juice balance
|
|
@@ -132,7 +135,7 @@ import { inspect } from 'util';
|
|
|
132
135
|
return this.pxe.registerSender(address);
|
|
133
136
|
}
|
|
134
137
|
async registerContract(instance, artifact, secretKey) {
|
|
135
|
-
const
|
|
138
|
+
const existingInstance = await this.pxe.getContractInstance(instance.address);
|
|
136
139
|
if (existingInstance) {
|
|
137
140
|
// Instance already registered in the wallet
|
|
138
141
|
if (artifact) {
|
|
@@ -148,11 +151,10 @@ import { inspect } from 'util';
|
|
|
148
151
|
// Instance not registered yet
|
|
149
152
|
if (!artifact) {
|
|
150
153
|
// Try to get the artifact from the wallet's contract class storage
|
|
151
|
-
|
|
152
|
-
if (!
|
|
154
|
+
artifact = await this.pxe.getContractArtifact(instance.currentContractClassId);
|
|
155
|
+
if (!artifact) {
|
|
153
156
|
throw new Error(`Cannot register contract at ${instance.address.toString()}: artifact is required but not provided, and wallet does not have the artifact for contract class ${instance.currentContractClassId.toString()}`);
|
|
154
157
|
}
|
|
155
|
-
artifact = classMetadata.artifact;
|
|
156
158
|
}
|
|
157
159
|
await this.pxe.registerContract({
|
|
158
160
|
artifact,
|
|
@@ -206,20 +208,48 @@ import { inspect } from 'util';
|
|
|
206
208
|
simulateUtility(call, authwits) {
|
|
207
209
|
return this.pxe.simulateUtility(call, authwits);
|
|
208
210
|
}
|
|
209
|
-
getContractClassMetadata(id, includeArtifact = false) {
|
|
210
|
-
return this.pxe.getContractClassMetadata(id, includeArtifact);
|
|
211
|
-
}
|
|
212
|
-
getContractMetadata(address) {
|
|
213
|
-
return this.pxe.getContractMetadata(address);
|
|
214
|
-
}
|
|
215
211
|
getTxReceipt(txHash) {
|
|
216
212
|
return this.aztecNode.getTxReceipt(txHash);
|
|
217
213
|
}
|
|
218
|
-
async getPrivateEvents(
|
|
219
|
-
const
|
|
220
|
-
const decodedEvents =
|
|
221
|
-
|
|
222
|
-
|
|
214
|
+
async getPrivateEvents(eventDef, eventFilter) {
|
|
215
|
+
const pxeEvents = await this.pxe.getPrivateEvents(eventDef.eventSelector, eventFilter);
|
|
216
|
+
const decodedEvents = pxeEvents.map((pxeEvent)=>{
|
|
217
|
+
return {
|
|
218
|
+
event: decodeFromAbi([
|
|
219
|
+
eventDef.abiType
|
|
220
|
+
], pxeEvent.packedEvent),
|
|
221
|
+
metadata: {
|
|
222
|
+
l2BlockNumber: pxeEvent.l2BlockNumber,
|
|
223
|
+
l2BlockHash: pxeEvent.l2BlockHash,
|
|
224
|
+
txHash: pxeEvent.txHash
|
|
225
|
+
}
|
|
226
|
+
};
|
|
227
|
+
});
|
|
223
228
|
return decodedEvents;
|
|
224
229
|
}
|
|
230
|
+
async getContractMetadata(address) {
|
|
231
|
+
const instance = await this.pxe.getContractInstance(address);
|
|
232
|
+
const initNullifier = await siloNullifier(address, address.toField());
|
|
233
|
+
const publiclyRegisteredContract = await this.aztecNode.getContract(address);
|
|
234
|
+
const [initNullifierMembershipWitness, publiclyRegisteredContractClass] = await Promise.all([
|
|
235
|
+
this.aztecNode.getNullifierMembershipWitness('latest', initNullifier),
|
|
236
|
+
publiclyRegisteredContract ? this.aztecNode.getContractClass(publiclyRegisteredContract.currentContractClassId || instance?.currentContractClassId) : undefined
|
|
237
|
+
]);
|
|
238
|
+
const isContractUpdated = publiclyRegisteredContract && !publiclyRegisteredContract.currentContractClassId.equals(publiclyRegisteredContract.originalContractClassId);
|
|
239
|
+
return {
|
|
240
|
+
instance: instance ?? undefined,
|
|
241
|
+
isContractInitialized: !!initNullifierMembershipWitness,
|
|
242
|
+
isContractPublished: !!publiclyRegisteredContract,
|
|
243
|
+
isContractClassPubliclyRegistered: !!publiclyRegisteredContractClass,
|
|
244
|
+
isContractUpdated: !!isContractUpdated,
|
|
245
|
+
updatedContractClassId: isContractUpdated ? publiclyRegisteredContract.currentContractClassId : undefined
|
|
246
|
+
};
|
|
247
|
+
}
|
|
248
|
+
async getContractClassMetadata(id) {
|
|
249
|
+
const publiclyRegisteredContractClass = await this.aztecNode.getContractClass(id);
|
|
250
|
+
return {
|
|
251
|
+
isArtifactRegistered: !!await this.pxe.getContractArtifact(id),
|
|
252
|
+
isContractClassPubliclyRegistered: !!publiclyRegisteredContractClass
|
|
253
|
+
};
|
|
254
|
+
}
|
|
225
255
|
}
|
package/dest/crypto.d.ts
ADDED
|
@@ -0,0 +1,183 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Exported public key in JWK format for transmission over untrusted channels.
|
|
3
|
+
*
|
|
4
|
+
* Contains only the public components of an ECDH P-256 key, safe to share.
|
|
5
|
+
*/
|
|
6
|
+
export interface ExportedPublicKey {
|
|
7
|
+
/** Key type - always "EC" for elliptic curve */
|
|
8
|
+
kty: string;
|
|
9
|
+
/** Curve name - always "P-256" */
|
|
10
|
+
crv: string;
|
|
11
|
+
/** X coordinate (base64url encoded) */
|
|
12
|
+
x: string;
|
|
13
|
+
/** Y coordinate (base64url encoded) */
|
|
14
|
+
y: string;
|
|
15
|
+
}
|
|
16
|
+
/**
|
|
17
|
+
* Encrypted message payload containing ciphertext and initialization vector.
|
|
18
|
+
*
|
|
19
|
+
* Both fields are base64-encoded for safe transmission as JSON.
|
|
20
|
+
*/
|
|
21
|
+
export interface EncryptedPayload {
|
|
22
|
+
/** Initialization vector (base64 encoded, 12 bytes) */
|
|
23
|
+
iv: string;
|
|
24
|
+
/** Ciphertext (base64 encoded) */
|
|
25
|
+
ciphertext: string;
|
|
26
|
+
}
|
|
27
|
+
/**
|
|
28
|
+
* ECDH key pair for secure communication.
|
|
29
|
+
*
|
|
30
|
+
* The private key should never be exported or transmitted.
|
|
31
|
+
* The public key can be exported via {@link exportPublicKey} for exchange.
|
|
32
|
+
*/
|
|
33
|
+
export interface SecureKeyPair {
|
|
34
|
+
/** Public key - safe to share */
|
|
35
|
+
publicKey: CryptoKey;
|
|
36
|
+
/** Private key - keep secret, used for key derivation */
|
|
37
|
+
privateKey: CryptoKey;
|
|
38
|
+
}
|
|
39
|
+
/**
|
|
40
|
+
* Generates an ECDH P-256 key pair for key exchange.
|
|
41
|
+
*
|
|
42
|
+
* The generated key pair can be used to derive a shared secret with another
|
|
43
|
+
* party's public key using {@link deriveSharedKey}.
|
|
44
|
+
*
|
|
45
|
+
* @returns A new ECDH key pair
|
|
46
|
+
*
|
|
47
|
+
* @example
|
|
48
|
+
* ```typescript
|
|
49
|
+
* const keyPair = await generateKeyPair();
|
|
50
|
+
* const publicKey = await exportPublicKey(keyPair.publicKey);
|
|
51
|
+
* // Send publicKey to the other party
|
|
52
|
+
* ```
|
|
53
|
+
*/
|
|
54
|
+
export declare function generateKeyPair(): Promise<SecureKeyPair>;
|
|
55
|
+
/**
|
|
56
|
+
* Exports a public key to JWK format for transmission.
|
|
57
|
+
*
|
|
58
|
+
* The exported key contains only public components and is safe to transmit
|
|
59
|
+
* over untrusted channels.
|
|
60
|
+
*
|
|
61
|
+
* @param publicKey - The CryptoKey public key to export
|
|
62
|
+
* @returns The public key in JWK format
|
|
63
|
+
*
|
|
64
|
+
* @example
|
|
65
|
+
* ```typescript
|
|
66
|
+
* const keyPair = await generateKeyPair();
|
|
67
|
+
* const exported = await exportPublicKey(keyPair.publicKey);
|
|
68
|
+
* // exported can be JSON serialized and sent to another party
|
|
69
|
+
* ```
|
|
70
|
+
*/
|
|
71
|
+
export declare function exportPublicKey(publicKey: CryptoKey): Promise<ExportedPublicKey>;
|
|
72
|
+
/**
|
|
73
|
+
* Imports a public key from JWK format.
|
|
74
|
+
*
|
|
75
|
+
* Used to import the other party's public key for deriving a shared secret.
|
|
76
|
+
*
|
|
77
|
+
* @param exported - The public key in JWK format
|
|
78
|
+
* @returns A CryptoKey that can be used with {@link deriveSharedKey}
|
|
79
|
+
*
|
|
80
|
+
* @example
|
|
81
|
+
* ```typescript
|
|
82
|
+
* // Receive exported public key from other party
|
|
83
|
+
* const theirPublicKey = await importPublicKey(receivedPublicKey);
|
|
84
|
+
* const sharedKey = await deriveSharedKey(myPrivateKey, theirPublicKey);
|
|
85
|
+
* ```
|
|
86
|
+
*/
|
|
87
|
+
export declare function importPublicKey(exported: ExportedPublicKey): Promise<CryptoKey>;
|
|
88
|
+
/**
|
|
89
|
+
* Derives a shared AES-256-GCM key from ECDH key exchange.
|
|
90
|
+
*
|
|
91
|
+
* Both parties will derive the same shared key when using their own private key
|
|
92
|
+
* and the other party's public key. This is the core of ECDH key agreement.
|
|
93
|
+
*
|
|
94
|
+
* @param privateKey - Your ECDH private key
|
|
95
|
+
* @param publicKey - The other party's ECDH public key
|
|
96
|
+
* @returns An AES-256-GCM key for encryption/decryption
|
|
97
|
+
*
|
|
98
|
+
* @example
|
|
99
|
+
* ```typescript
|
|
100
|
+
* // Both parties derive the same key
|
|
101
|
+
* const sharedKeyA = await deriveSharedKey(privateKeyA, publicKeyB);
|
|
102
|
+
* const sharedKeyB = await deriveSharedKey(privateKeyB, publicKeyA);
|
|
103
|
+
* // sharedKeyA and sharedKeyB are equivalent
|
|
104
|
+
* ```
|
|
105
|
+
*/
|
|
106
|
+
export declare function deriveSharedKey(privateKey: CryptoKey, publicKey: CryptoKey): Promise<CryptoKey>;
|
|
107
|
+
/**
|
|
108
|
+
* Encrypts data using AES-256-GCM.
|
|
109
|
+
*
|
|
110
|
+
* The data is JSON serialized before encryption. A random 12-byte IV is
|
|
111
|
+
* generated for each encryption operation.
|
|
112
|
+
*
|
|
113
|
+
* AES-GCM provides both confidentiality and authenticity - any tampering
|
|
114
|
+
* with the ciphertext will cause decryption to fail.
|
|
115
|
+
*
|
|
116
|
+
* @param key - The AES-GCM key (from {@link deriveSharedKey})
|
|
117
|
+
* @param data - The data to encrypt (will be JSON serialized)
|
|
118
|
+
* @returns The encrypted payload with IV and ciphertext
|
|
119
|
+
*
|
|
120
|
+
* @example
|
|
121
|
+
* ```typescript
|
|
122
|
+
* const encrypted = await encrypt(sharedKey, { action: 'transfer', amount: 100 });
|
|
123
|
+
* // encrypted.iv and encrypted.ciphertext are base64 strings
|
|
124
|
+
* ```
|
|
125
|
+
*/
|
|
126
|
+
export declare function encrypt(key: CryptoKey, data: unknown): Promise<EncryptedPayload>;
|
|
127
|
+
/**
|
|
128
|
+
* Decrypts data using AES-256-GCM.
|
|
129
|
+
*
|
|
130
|
+
* The decrypted data is JSON parsed before returning.
|
|
131
|
+
*
|
|
132
|
+
* @typeParam T - The expected type of the decrypted data
|
|
133
|
+
* @param key - The AES-GCM key (from {@link deriveSharedKey})
|
|
134
|
+
* @param payload - The encrypted payload from {@link encrypt}
|
|
135
|
+
* @returns The decrypted and parsed data
|
|
136
|
+
*
|
|
137
|
+
* @throws Error if decryption fails (wrong key or tampered ciphertext)
|
|
138
|
+
*
|
|
139
|
+
* @example
|
|
140
|
+
* ```typescript
|
|
141
|
+
* const decrypted = await decrypt<{ action: string; amount: number }>(sharedKey, encrypted);
|
|
142
|
+
* console.log(decrypted.action); // 'transfer'
|
|
143
|
+
* ```
|
|
144
|
+
*/
|
|
145
|
+
export declare function decrypt<T = unknown>(key: CryptoKey, payload: EncryptedPayload): Promise<T>;
|
|
146
|
+
/**
|
|
147
|
+
* Hashes a shared AES key to a hex string for verification.
|
|
148
|
+
*
|
|
149
|
+
* This extracts the raw key material and hashes it with SHA-256,
|
|
150
|
+
* returning the first 16 bytes as a hex string.
|
|
151
|
+
*
|
|
152
|
+
* @param sharedKey - The AES-GCM shared key (must be extractable)
|
|
153
|
+
* @returns A hex string representation of the hash
|
|
154
|
+
*
|
|
155
|
+
* @example
|
|
156
|
+
* ```typescript
|
|
157
|
+
* const hash = await hashSharedSecret(sharedKey);
|
|
158
|
+
* const emoji = hashToEmoji(hash);
|
|
159
|
+
* ```
|
|
160
|
+
*/
|
|
161
|
+
export declare function hashSharedSecret(sharedKey: CryptoKey): Promise<string>;
|
|
162
|
+
/**
|
|
163
|
+
* Converts a hex hash to an emoji sequence for visual verification.
|
|
164
|
+
*
|
|
165
|
+
* This is used for anti-MITM verification - both the dApp and wallet
|
|
166
|
+
* independently compute the same emoji sequence from the shared secret.
|
|
167
|
+
* Users can visually compare the sequences to detect interception.
|
|
168
|
+
*
|
|
169
|
+
* Similar to SAS (Short Authentication String) in ZRTP/Signal.
|
|
170
|
+
*
|
|
171
|
+
* @param hash - Hex string from {@link hashSharedSecret}
|
|
172
|
+
* @param length - Number of emojis to generate (default: 4)
|
|
173
|
+
* @returns A string of emojis representing the hash
|
|
174
|
+
*
|
|
175
|
+
* @example
|
|
176
|
+
* ```typescript
|
|
177
|
+
* const hash = await hashSharedSecret(sharedKey);
|
|
178
|
+
* const emoji = hashToEmoji(hash); // e.g., "🔵🦋🎯🐼"
|
|
179
|
+
* // Display to user for verification
|
|
180
|
+
* ```
|
|
181
|
+
*/
|
|
182
|
+
export declare function hashToEmoji(hash: string, length?: number): string;
|
|
183
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"crypto.d.ts","sourceRoot":"","sources":["../src/crypto.ts"],"names":[],"mappings":"AAmCA;;;;GAIG;AACH,MAAM,WAAW,iBAAiB;IAChC,gDAAgD;IAChD,GAAG,EAAE,MAAM,CAAC;IACZ,kCAAkC;IAClC,GAAG,EAAE,MAAM,CAAC;IACZ,uCAAuC;IACvC,CAAC,EAAE,MAAM,CAAC;IACV,uCAAuC;IACvC,CAAC,EAAE,MAAM,CAAC;CACX;AAED;;;;GAIG;AACH,MAAM,WAAW,gBAAgB;IAC/B,uDAAuD;IACvD,EAAE,EAAE,MAAM,CAAC;IACX,kCAAkC;IAClC,UAAU,EAAE,MAAM,CAAC;CACpB;AAED;;;;;GAKG;AACH,MAAM,WAAW,aAAa;IAC5B,iCAAiC;IACjC,SAAS,EAAE,SAAS,CAAC;IACrB,yDAAyD;IACzD,UAAU,EAAE,SAAS,CAAC;CACvB;AAED;;;;;;;;;;;;;;GAcG;AACH,wBAAsB,eAAe,IAAI,OAAO,CAAC,aAAa,CAAC,CAa9D;AAED;;;;;;;;;;;;;;;GAeG;AACH,wBAAsB,eAAe,CAAC,SAAS,EAAE,SAAS,GAAG,OAAO,CAAC,iBAAiB,CAAC,CAQtF;AAED;;;;;;;;;;;;;;GAcG;AACH,wBAAgB,eAAe,CAAC,QAAQ,EAAE,iBAAiB,GAAG,OAAO,CAAC,SAAS,CAAC,CAgB/E;AAED;;;;;;;;;;;;;;;;;GAiBG;AACH,wBAAgB,eAAe,CAAC,UAAU,EAAE,SAAS,EAAE,SAAS,EAAE,SAAS,GAAG,OAAO,CAAC,SAAS,CAAC,CAc/F;AAED;;;;;;;;;;;;;;;;;;GAkBG;AACH,wBAAsB,OAAO,CAAC,GAAG,EAAE,SAAS,EAAE,IAAI,EAAE,OAAO,GAAG,OAAO,CAAC,gBAAgB,CAAC,CAUtF;AAED;;;;;;;;;;;;;;;;;GAiBG;AACH,wBAAsB,OAAO,CAAC,CAAC,GAAG,OAAO,EAAE,GAAG,EAAE,SAAS,EAAE,OAAO,EAAE,gBAAgB,GAAG,OAAO,CAAC,CAAC,CAAC,CAQhG;AAoED;;;;;;;;;;;;;;GAcG;AACH,wBAAsB,gBAAgB,CAAC,SAAS,EAAE,SAAS,GAAG,OAAO,CAAC,MAAM,CAAC,CAO5E;AAED;;;;;;;;;;;;;;;;;;;GAmBG;AACH,wBAAgB,WAAW,CAAC,IAAI,EAAE,MAAM,EAAE,MAAM,GAAE,MAAU,GAAG,MAAM,CAMpE"}
|