@aztec/wallet-sdk 0.0.1-commit.7d4e6cd β 0.0.1-commit.8afd444
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +218 -355
- package/dest/base-wallet/base_wallet.d.ts +33 -10
- package/dest/base-wallet/base_wallet.d.ts.map +1 -1
- package/dest/base-wallet/base_wallet.js +53 -16
- package/dest/crypto.d.ts +73 -27
- package/dest/crypto.d.ts.map +1 -1
- package/dest/crypto.js +219 -41
- package/dest/emoji_alphabet.d.ts +35 -0
- package/dest/emoji_alphabet.d.ts.map +1 -0
- package/dest/emoji_alphabet.js +299 -0
- package/dest/extension/handlers/background_connection_handler.d.ts +158 -0
- package/dest/extension/handlers/background_connection_handler.d.ts.map +1 -0
- package/dest/extension/handlers/background_connection_handler.js +258 -0
- package/dest/extension/handlers/content_script_connection_handler.d.ts +56 -0
- package/dest/extension/handlers/content_script_connection_handler.d.ts.map +1 -0
- package/dest/extension/handlers/content_script_connection_handler.js +174 -0
- package/dest/extension/handlers/index.d.ts +12 -0
- package/dest/extension/handlers/index.d.ts.map +1 -0
- package/dest/extension/handlers/index.js +10 -0
- package/dest/extension/handlers/internal_message_types.d.ts +63 -0
- package/dest/extension/handlers/internal_message_types.d.ts.map +1 -0
- package/dest/extension/handlers/internal_message_types.js +22 -0
- package/dest/extension/provider/extension_provider.d.ts +107 -0
- package/dest/extension/provider/extension_provider.d.ts.map +1 -0
- package/dest/extension/provider/extension_provider.js +160 -0
- package/dest/extension/provider/extension_wallet.d.ts +131 -0
- package/dest/extension/provider/extension_wallet.d.ts.map +1 -0
- package/dest/extension/provider/extension_wallet.js +271 -0
- package/dest/extension/provider/index.d.ts +3 -0
- package/dest/extension/provider/index.d.ts.map +1 -0
- package/dest/{providers/extension β extension/provider}/index.js +0 -1
- package/dest/manager/index.d.ts +2 -7
- package/dest/manager/index.d.ts.map +1 -1
- package/dest/manager/index.js +0 -4
- package/dest/manager/types.d.ts +108 -5
- package/dest/manager/types.d.ts.map +1 -1
- package/dest/manager/types.js +17 -1
- package/dest/manager/wallet_manager.d.ts +50 -7
- package/dest/manager/wallet_manager.d.ts.map +1 -1
- package/dest/manager/wallet_manager.js +178 -29
- package/dest/types.d.ts +55 -15
- package/dest/types.d.ts.map +1 -1
- package/dest/types.js +10 -2
- package/package.json +11 -10
- package/src/base-wallet/base_wallet.ts +74 -28
- package/src/crypto.ts +263 -47
- package/src/emoji_alphabet.ts +317 -0
- package/src/extension/handlers/background_connection_handler.ts +423 -0
- package/src/extension/handlers/content_script_connection_handler.ts +246 -0
- package/src/extension/handlers/index.ts +25 -0
- package/src/extension/handlers/internal_message_types.ts +69 -0
- package/src/extension/provider/extension_provider.ts +233 -0
- package/src/extension/provider/extension_wallet.ts +321 -0
- package/src/extension/provider/index.ts +7 -0
- package/src/manager/index.ts +3 -9
- package/src/manager/types.ts +112 -4
- package/src/manager/wallet_manager.ts +204 -31
- package/src/types.ts +57 -14
- package/dest/providers/extension/extension_provider.d.ts +0 -17
- package/dest/providers/extension/extension_provider.d.ts.map +0 -1
- package/dest/providers/extension/extension_provider.js +0 -56
- package/dest/providers/extension/extension_wallet.d.ts +0 -95
- package/dest/providers/extension/extension_wallet.d.ts.map +0 -1
- package/dest/providers/extension/extension_wallet.js +0 -225
- package/dest/providers/extension/index.d.ts +0 -5
- package/dest/providers/extension/index.d.ts.map +0 -1
- package/src/providers/extension/extension_provider.ts +0 -72
- package/src/providers/extension/extension_wallet.ts +0 -275
- package/src/providers/extension/index.ts +0 -11
|
@@ -1,7 +1,8 @@
|
|
|
1
1
|
import type { Account } from '@aztec/aztec.js/account';
|
|
2
2
|
import type { CallIntent, IntentInnerHash } from '@aztec/aztec.js/authorization';
|
|
3
|
+
import { type InteractionWaitOptions, type SendReturn } from '@aztec/aztec.js/contracts';
|
|
3
4
|
import type { FeePaymentMethod } from '@aztec/aztec.js/fee';
|
|
4
|
-
import type { Aliased,
|
|
5
|
+
import type { Aliased, AppCapabilities, BatchResults, BatchedMethod, PrivateEvent, PrivateEventFilter, ProfileOptions, SendOptions, SimulateOptions, Wallet, WalletCapabilities } from '@aztec/aztec.js/wallet';
|
|
5
6
|
import { AccountFeePaymentMethodOptions } from '@aztec/entrypoints/account';
|
|
6
7
|
import type { ChainInfo } from '@aztec/entrypoints/interfaces';
|
|
7
8
|
import { Fr } from '@aztec/foundation/curves/bn254';
|
|
@@ -10,10 +11,10 @@ import type { PXE } from '@aztec/pxe/server';
|
|
|
10
11
|
import { type ContractArtifact, type EventMetadataDefinition, type FunctionCall } from '@aztec/stdlib/abi';
|
|
11
12
|
import type { AuthWitness } from '@aztec/stdlib/auth-witness';
|
|
12
13
|
import type { AztecAddress } from '@aztec/stdlib/aztec-address';
|
|
13
|
-
import { type
|
|
14
|
+
import { type ContractInstanceWithAddress } from '@aztec/stdlib/contract';
|
|
14
15
|
import { GasSettings } from '@aztec/stdlib/gas';
|
|
15
16
|
import type { AztecNode } from '@aztec/stdlib/interfaces/client';
|
|
16
|
-
import type { TxExecutionRequest,
|
|
17
|
+
import type { TxExecutionRequest, TxProfileResult, TxSimulationResult, UtilitySimulationResult } from '@aztec/stdlib/tx';
|
|
17
18
|
import { ExecutionPayload } from '@aztec/stdlib/tx';
|
|
18
19
|
/**
|
|
19
20
|
* Options to configure fee payment for a transaction
|
|
@@ -51,8 +52,22 @@ export declare abstract class BaseWallet implements Wallet {
|
|
|
51
52
|
getAddressBook(): Promise<Aliased<AztecAddress>[]>;
|
|
52
53
|
getChainInfo(): Promise<ChainInfo>;
|
|
53
54
|
protected createTxExecutionRequestFromPayloadAndFee(executionPayload: ExecutionPayload, from: AztecAddress, feeOptions: FeeOptions): Promise<TxExecutionRequest>;
|
|
54
|
-
createAuthWit(from: AztecAddress, messageHashOrIntent:
|
|
55
|
-
|
|
55
|
+
createAuthWit(from: AztecAddress, messageHashOrIntent: IntentInnerHash | CallIntent): Promise<AuthWitness>;
|
|
56
|
+
/**
|
|
57
|
+
* Request capabilities from the wallet.
|
|
58
|
+
*
|
|
59
|
+
* This method is wallet-implementation-dependent and must be provided by classes extending BaseWallet.
|
|
60
|
+
* Embedded wallets typically don't support capability-based authorization (no user authorization flow),
|
|
61
|
+
* while external wallets (browser extensions, hardware wallets) implement this to reduce authorization
|
|
62
|
+
* friction by allowing apps to request permissions upfront.
|
|
63
|
+
*
|
|
64
|
+
* TODO: Consider making it abstract so implementing it is a conscious decision. Leaving it as-is
|
|
65
|
+
* while the feature stabilizes.
|
|
66
|
+
*
|
|
67
|
+
* @param _manifest - Application capability manifest declaring what operations the app needs
|
|
68
|
+
*/
|
|
69
|
+
requestCapabilities(_manifest: AppCapabilities): Promise<WalletCapabilities>;
|
|
70
|
+
batch<const T extends readonly BatchedMethod[]>(methods: T): Promise<BatchResults<T>>;
|
|
56
71
|
/**
|
|
57
72
|
* Completes partial user-provided fee options with wallet defaults.
|
|
58
73
|
* @param from - The address where the transaction is being sent from
|
|
@@ -83,12 +98,20 @@ export declare abstract class BaseWallet implements Wallet {
|
|
|
83
98
|
registerContract(instance: ContractInstanceWithAddress, artifact?: ContractArtifact, secretKey?: Fr): Promise<ContractInstanceWithAddress>;
|
|
84
99
|
simulateTx(executionPayload: ExecutionPayload, opts: SimulateOptions): Promise<TxSimulationResult>;
|
|
85
100
|
profileTx(executionPayload: ExecutionPayload, opts: ProfileOptions): Promise<TxProfileResult>;
|
|
86
|
-
sendTx(executionPayload: ExecutionPayload, opts: SendOptions): Promise<
|
|
101
|
+
sendTx<W extends InteractionWaitOptions = undefined>(executionPayload: ExecutionPayload, opts: SendOptions<W>): Promise<SendReturn<W>>;
|
|
87
102
|
protected contextualizeError(err: Error, ...context: string[]): Error;
|
|
88
103
|
simulateUtility(call: FunctionCall, authwits?: AuthWitness[]): Promise<UtilitySimulationResult>;
|
|
89
|
-
getContractClassMetadata(id: Fr, includeArtifact?: boolean): Promise<ContractClassMetadata>;
|
|
90
|
-
getContractMetadata(address: AztecAddress): Promise<ContractMetadata>;
|
|
91
|
-
getTxReceipt(txHash: TxHash): Promise<TxReceipt>;
|
|
92
104
|
getPrivateEvents<T>(eventDef: EventMetadataDefinition, eventFilter: PrivateEventFilter): Promise<PrivateEvent<T>[]>;
|
|
105
|
+
getContractMetadata(address: AztecAddress): Promise<{
|
|
106
|
+
instance: ContractInstanceWithAddress | undefined;
|
|
107
|
+
isContractInitialized: boolean;
|
|
108
|
+
isContractPublished: boolean;
|
|
109
|
+
isContractUpdated: boolean;
|
|
110
|
+
updatedContractClassId: Fr | undefined;
|
|
111
|
+
}>;
|
|
112
|
+
getContractClassMetadata(id: Fr): Promise<{
|
|
113
|
+
isArtifactRegistered: boolean;
|
|
114
|
+
isContractClassPubliclyRegistered: boolean;
|
|
115
|
+
}>;
|
|
93
116
|
}
|
|
94
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
117
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"base_wallet.d.ts","sourceRoot":"","sources":["../../src/base-wallet/base_wallet.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,yBAAyB,CAAC;AACvD,OAAO,KAAK,EAAE,UAAU,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AACjF,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,qBAAqB,CAAC;
|
|
1
|
+
{"version":3,"file":"base_wallet.d.ts","sourceRoot":"","sources":["../../src/base-wallet/base_wallet.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,yBAAyB,CAAC;AACvD,OAAO,KAAK,EAAE,UAAU,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AACjF,OAAO,EAAE,KAAK,sBAAsB,EAAW,KAAK,UAAU,EAAE,MAAM,2BAA2B,CAAC;AAClG,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,qBAAqB,CAAC;AAE5D,OAAO,KAAK,EACV,OAAO,EACP,eAAe,EACf,YAAY,EACZ,aAAa,EACb,YAAY,EACZ,kBAAkB,EAClB,cAAc,EACd,WAAW,EACX,eAAe,EACf,MAAM,EACN,kBAAkB,EACnB,MAAM,wBAAwB,CAAC;AAOhC,OAAO,EAAE,8BAA8B,EAAwC,MAAM,4BAA4B,CAAC;AAClH,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,+BAA+B,CAAC;AAC/D,OAAO,EAAE,EAAE,EAAE,MAAM,gCAAgC,CAAC;AAEpD,OAAO,KAAK,EAAE,QAAQ,EAAE,MAAM,yBAAyB,CAAC;AACxD,OAAO,KAAK,EAAE,GAAG,EAAsB,MAAM,mBAAmB,CAAC;AACjE,OAAO,EACL,KAAK,gBAAgB,EACrB,KAAK,uBAAuB,EAC5B,KAAK,YAAY,EAElB,MAAM,mBAAmB,CAAC;AAC3B,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,4BAA4B,CAAC;AAC9D,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAChE,OAAO,EACL,KAAK,2BAA2B,EAGjC,MAAM,wBAAwB,CAAC;AAEhC,OAAO,EAAO,WAAW,EAAE,MAAM,mBAAmB,CAAC;AAErD,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,iCAAiC,CAAC;AACjE,OAAO,KAAK,EACV,kBAAkB,EAClB,eAAe,EACf,kBAAkB,EAClB,uBAAuB,EACxB,MAAM,kBAAkB,CAAC;AAC1B,OAAO,EAAE,gBAAgB,EAA0B,MAAM,kBAAkB,CAAC;AAI5E;;GAEG;AACH,MAAM,MAAM,UAAU,GAAG;IACvB;;;OAGG;IACH,sBAAsB,CAAC,EAAE,gBAAgB,CAAC;IAC1C,+FAA+F;IAC/F,8BAA8B,EAAE,8BAA8B,CAAC;IAC/D,kDAAkD;IAClD,WAAW,EAAE,WAAW,CAAC;CAC1B,CAAC;AAEF;;GAEG;AACH,8BAAsB,UAAW,YAAW,MAAM;IAQ9C,SAAS,CAAC,QAAQ,CAAC,GAAG,EAAE,GAAG;IAC3B,SAAS,CAAC,QAAQ,CAAC,SAAS,EAAE,SAAS;IARzC,SAAS,CAAC,GAAG,yCAA0C;IAEvD,SAAS,CAAC,aAAa,SAAO;IAC9B,SAAS,CAAC,uBAAuB,UAAS;IAG1C,SAAS,aACY,GAAG,EAAE,GAAG,EACR,SAAS,EAAE,SAAS,EACrC;IAEJ,SAAS,CAAC,QAAQ,CAAC,qBAAqB,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,OAAO,CAAC,CAAC;IAElF,QAAQ,CAAC,WAAW,IAAI,OAAO,CAAC,OAAO,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC;IAEzD;;;;;;OAMG;IACG,cAAc,IAAI,OAAO,CAAC,OAAO,CAAC,YAAY,CAAC,EAAE,CAAC,CAGvD;IAEK,YAAY,IAAI,OAAO,CAAC,SAAS,CAAC,CAGvC;IAED,UAAgB,yCAAyC,CACvD,gBAAgB,EAAE,gBAAgB,EAClC,IAAI,EAAE,YAAY,EAClB,UAAU,EAAE,UAAU,GACrB,OAAO,CAAC,kBAAkB,CAAC,CAkB7B;IAEY,aAAa,CACxB,IAAI,EAAE,YAAY,EAClB,mBAAmB,EAAE,eAAe,GAAG,UAAU,GAChD,OAAO,CAAC,WAAW,CAAC,CAItB;IAED;;;;;;;;;;;;OAYG;IACI,mBAAmB,CAAC,SAAS,EAAE,eAAe,GAAG,OAAO,CAAC,kBAAkB,CAAC,CAElF;IAEY,KAAK,CAAC,KAAK,CAAC,CAAC,SAAS,SAAS,aAAa,EAAE,EAAE,OAAO,EAAE,CAAC,GAAG,OAAO,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,CAgBjG;IAED;;;;;;OAMG;IACH,UAAgB,kBAAkB,CAChC,IAAI,EAAE,YAAY,EAClB,QAAQ,CAAC,EAAE,YAAY,EACvB,WAAW,CAAC,EAAE,OAAO,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC,GAC3C,OAAO,CAAC,UAAU,CAAC,CAsBrB;IAED;;;;;;;OAOG;IACH,UAAgB,+BAA+B,CAC7C,IAAI,EAAE,YAAY,EAClB,QAAQ,CAAC,EAAE,YAAY,EACvB,WAAW,CAAC,EAAE,OAAO,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC;QAjK9C;;;WAGG;;QAEH,+FAA+F;;;OA8K9F;IAED,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE,MAAM,GAAE,MAAW,GAAG,OAAO,CAAC,YAAY,CAAC,CAEhF;IAEK,gBAAgB,CACpB,QAAQ,EAAE,2BAA2B,EACrC,QAAQ,CAAC,EAAE,gBAAgB,EAC3B,SAAS,CAAC,EAAE,EAAE,GACb,OAAO,CAAC,2BAA2B,CAAC,CAgCtC;IAEK,UAAU,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,IAAI,EAAE,eAAe,GAAG,OAAO,CAAC,kBAAkB,CAAC,CAWvG;IAEK,SAAS,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,IAAI,EAAE,cAAc,GAAG,OAAO,CAAC,eAAe,CAAC,CAIlG;IAEY,MAAM,CAAC,CAAC,SAAS,sBAAsB,GAAG,SAAS,EAC9D,gBAAgB,EAAE,gBAAgB,EAClC,IAAI,EAAE,WAAW,CAAC,CAAC,CAAC,GACnB,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAuBxB;IAED,SAAS,CAAC,kBAAkB,CAAC,GAAG,EAAE,KAAK,EAAE,GAAG,OAAO,EAAE,MAAM,EAAE,GAAG,KAAK,CAYpE;IAED,eAAe,CAAC,IAAI,EAAE,YAAY,EAAE,QAAQ,CAAC,EAAE,WAAW,EAAE,GAAG,OAAO,CAAC,uBAAuB,CAAC,CAE9F;IAEK,gBAAgB,CAAC,CAAC,EACtB,QAAQ,EAAE,uBAAuB,EACjC,WAAW,EAAE,kBAAkB,GAC9B,OAAO,CAAC,YAAY,CAAC,CAAC,CAAC,EAAE,CAAC,CAe5B;IAEK,mBAAmB,CAAC,OAAO,EAAE,YAAY;;;;;;OAe9C;IAEK,wBAAwB,CAAC,EAAE,EAAE,EAAE;;;OAMpC;CACF"}
|
|
@@ -1,3 +1,5 @@
|
|
|
1
|
+
import { NO_WAIT } from '@aztec/aztec.js/contracts';
|
|
2
|
+
import { waitForTx } from '@aztec/aztec.js/node';
|
|
1
3
|
import { GAS_ESTIMATION_DA_GAS_LIMIT, GAS_ESTIMATION_L2_GAS_LIMIT, GAS_ESTIMATION_TEARDOWN_DA_GAS_LIMIT, GAS_ESTIMATION_TEARDOWN_L2_GAS_LIMIT } from '@aztec/constants';
|
|
2
4
|
import { AccountFeePaymentMethodOptions } from '@aztec/entrypoints/account';
|
|
3
5
|
import { Fr } from '@aztec/foundation/curves/bn254';
|
|
@@ -6,6 +8,7 @@ import { decodeFromAbi } from '@aztec/stdlib/abi';
|
|
|
6
8
|
import { computePartialAddress, getContractClassFromArtifact } from '@aztec/stdlib/contract';
|
|
7
9
|
import { SimulationError } from '@aztec/stdlib/errors';
|
|
8
10
|
import { Gas, GasSettings } from '@aztec/stdlib/gas';
|
|
11
|
+
import { siloNullifier } from '@aztec/stdlib/hash';
|
|
9
12
|
import { mergeExecutionPayloads } from '@aztec/stdlib/tx';
|
|
10
13
|
import { inspect } from 'util';
|
|
11
14
|
/**
|
|
@@ -56,11 +59,28 @@ import { inspect } from 'util';
|
|
|
56
59
|
executionPayload
|
|
57
60
|
]) : executionPayload;
|
|
58
61
|
const fromAccount = await this.getAccountFromAddress(from);
|
|
59
|
-
|
|
62
|
+
const chainInfo = await this.getChainInfo();
|
|
63
|
+
return fromAccount.createTxExecutionRequest(finalExecutionPayload, feeOptions.gasSettings, chainInfo, executionOptions);
|
|
60
64
|
}
|
|
61
65
|
async createAuthWit(from, messageHashOrIntent) {
|
|
62
66
|
const account = await this.getAccountFromAddress(from);
|
|
63
|
-
|
|
67
|
+
const chainInfo = await this.getChainInfo();
|
|
68
|
+
return account.createAuthWit(messageHashOrIntent, chainInfo);
|
|
69
|
+
}
|
|
70
|
+
/**
|
|
71
|
+
* Request capabilities from the wallet.
|
|
72
|
+
*
|
|
73
|
+
* This method is wallet-implementation-dependent and must be provided by classes extending BaseWallet.
|
|
74
|
+
* Embedded wallets typically don't support capability-based authorization (no user authorization flow),
|
|
75
|
+
* while external wallets (browser extensions, hardware wallets) implement this to reduce authorization
|
|
76
|
+
* friction by allowing apps to request permissions upfront.
|
|
77
|
+
*
|
|
78
|
+
* TODO: Consider making it abstract so implementing it is a conscious decision. Leaving it as-is
|
|
79
|
+
* while the feature stabilizes.
|
|
80
|
+
*
|
|
81
|
+
* @param _manifest - Application capability manifest declaring what operations the app needs
|
|
82
|
+
*/ requestCapabilities(_manifest) {
|
|
83
|
+
throw new Error('Not implemented');
|
|
64
84
|
}
|
|
65
85
|
async batch(methods) {
|
|
66
86
|
const results = [];
|
|
@@ -132,7 +152,7 @@ import { inspect } from 'util';
|
|
|
132
152
|
return this.pxe.registerSender(address);
|
|
133
153
|
}
|
|
134
154
|
async registerContract(instance, artifact, secretKey) {
|
|
135
|
-
const
|
|
155
|
+
const existingInstance = await this.pxe.getContractInstance(instance.address);
|
|
136
156
|
if (existingInstance) {
|
|
137
157
|
// Instance already registered in the wallet
|
|
138
158
|
if (artifact) {
|
|
@@ -148,11 +168,10 @@ import { inspect } from 'util';
|
|
|
148
168
|
// Instance not registered yet
|
|
149
169
|
if (!artifact) {
|
|
150
170
|
// Try to get the artifact from the wallet's contract class storage
|
|
151
|
-
|
|
152
|
-
if (!
|
|
171
|
+
artifact = await this.pxe.getContractArtifact(instance.currentContractClassId);
|
|
172
|
+
if (!artifact) {
|
|
153
173
|
throw new Error(`Cannot register contract at ${instance.address.toString()}: artifact is required but not provided, and wallet does not have the artifact for contract class ${instance.currentContractClassId.toString()}`);
|
|
154
174
|
}
|
|
155
|
-
artifact = classMetadata.artifact;
|
|
156
175
|
}
|
|
157
176
|
await this.pxe.registerContract({
|
|
158
177
|
artifact,
|
|
@@ -188,7 +207,13 @@ import { inspect } from 'util';
|
|
|
188
207
|
throw this.contextualizeError(err, inspect(tx));
|
|
189
208
|
});
|
|
190
209
|
this.log.info(`Sent transaction ${txHash}`);
|
|
191
|
-
return txHash
|
|
210
|
+
// If wait is NO_WAIT, return txHash immediately
|
|
211
|
+
if (opts.wait === NO_WAIT) {
|
|
212
|
+
return txHash;
|
|
213
|
+
}
|
|
214
|
+
// Otherwise, wait for the full receipt (default behavior on wait: undefined)
|
|
215
|
+
const waitOpts = typeof opts.wait === 'object' ? opts.wait : undefined;
|
|
216
|
+
return await waitForTx(this.aztecNode, txHash, waitOpts);
|
|
192
217
|
}
|
|
193
218
|
contextualizeError(err, ...context) {
|
|
194
219
|
let contextStr = '';
|
|
@@ -206,15 +231,6 @@ import { inspect } from 'util';
|
|
|
206
231
|
simulateUtility(call, authwits) {
|
|
207
232
|
return this.pxe.simulateUtility(call, authwits);
|
|
208
233
|
}
|
|
209
|
-
getContractClassMetadata(id, includeArtifact = false) {
|
|
210
|
-
return this.pxe.getContractClassMetadata(id, includeArtifact);
|
|
211
|
-
}
|
|
212
|
-
getContractMetadata(address) {
|
|
213
|
-
return this.pxe.getContractMetadata(address);
|
|
214
|
-
}
|
|
215
|
-
getTxReceipt(txHash) {
|
|
216
|
-
return this.aztecNode.getTxReceipt(txHash);
|
|
217
|
-
}
|
|
218
234
|
async getPrivateEvents(eventDef, eventFilter) {
|
|
219
235
|
const pxeEvents = await this.pxe.getPrivateEvents(eventDef.eventSelector, eventFilter);
|
|
220
236
|
const decodedEvents = pxeEvents.map((pxeEvent)=>{
|
|
@@ -231,4 +247,25 @@ import { inspect } from 'util';
|
|
|
231
247
|
});
|
|
232
248
|
return decodedEvents;
|
|
233
249
|
}
|
|
250
|
+
async getContractMetadata(address) {
|
|
251
|
+
const instance = await this.pxe.getContractInstance(address);
|
|
252
|
+
const initNullifier = await siloNullifier(address, address.toField());
|
|
253
|
+
const publiclyRegisteredContract = await this.aztecNode.getContract(address);
|
|
254
|
+
const initNullifierMembershipWitness = await this.aztecNode.getNullifierMembershipWitness('latest', initNullifier);
|
|
255
|
+
const isContractUpdated = publiclyRegisteredContract && !publiclyRegisteredContract.currentContractClassId.equals(publiclyRegisteredContract.originalContractClassId);
|
|
256
|
+
return {
|
|
257
|
+
instance: instance ?? undefined,
|
|
258
|
+
isContractInitialized: !!initNullifierMembershipWitness,
|
|
259
|
+
isContractPublished: !!publiclyRegisteredContract,
|
|
260
|
+
isContractUpdated: !!isContractUpdated,
|
|
261
|
+
updatedContractClassId: isContractUpdated ? publiclyRegisteredContract.currentContractClassId : undefined
|
|
262
|
+
};
|
|
263
|
+
}
|
|
264
|
+
async getContractClassMetadata(id) {
|
|
265
|
+
const publiclyRegisteredContractClass = await this.aztecNode.getContractClass(id);
|
|
266
|
+
return {
|
|
267
|
+
isArtifactRegistered: !!await this.pxe.getContractArtifact(id),
|
|
268
|
+
isContractClassPubliclyRegistered: !!publiclyRegisteredContractClass
|
|
269
|
+
};
|
|
270
|
+
}
|
|
234
271
|
}
|
package/dest/crypto.d.ts
CHANGED
|
@@ -36,11 +36,23 @@ export interface SecureKeyPair {
|
|
|
36
36
|
/** Private key - keep secret, used for key derivation */
|
|
37
37
|
privateKey: CryptoKey;
|
|
38
38
|
}
|
|
39
|
+
/**
|
|
40
|
+
* Session keys derived from ECDH key exchange.
|
|
41
|
+
*
|
|
42
|
+
* Contains both the encryption key and the verification hash (verificationHash)
|
|
43
|
+
* computed from a separate HMAC key.
|
|
44
|
+
*/
|
|
45
|
+
export interface SessionKeys {
|
|
46
|
+
/** AES-256-GCM key for message encryption/decryption */
|
|
47
|
+
encryptionKey: CryptoKey;
|
|
48
|
+
/** Hex-encoded verificationHash for verification */
|
|
49
|
+
verificationHash: string;
|
|
50
|
+
}
|
|
39
51
|
/**
|
|
40
52
|
* Generates an ECDH P-256 key pair for key exchange.
|
|
41
53
|
*
|
|
42
|
-
* The generated key pair can be used to derive
|
|
43
|
-
* party's public key using {@link
|
|
54
|
+
* The generated key pair can be used to derive session keys with another
|
|
55
|
+
* party's public key using {@link deriveSessionKeys}.
|
|
44
56
|
*
|
|
45
57
|
* @returns A new ECDH key pair
|
|
46
58
|
*
|
|
@@ -72,65 +84,71 @@ export declare function exportPublicKey(publicKey: CryptoKey): Promise<ExportedP
|
|
|
72
84
|
/**
|
|
73
85
|
* Imports a public key from JWK format.
|
|
74
86
|
*
|
|
75
|
-
* Used to import the other party's public key for deriving
|
|
87
|
+
* Used to import the other party's public key for deriving session keys.
|
|
76
88
|
*
|
|
77
89
|
* @param exported - The public key in JWK format
|
|
78
|
-
* @returns A CryptoKey that can be used with {@link
|
|
90
|
+
* @returns A CryptoKey that can be used with {@link deriveSessionKeys}
|
|
79
91
|
*
|
|
80
92
|
* @example
|
|
81
93
|
* ```typescript
|
|
82
|
-
* //
|
|
83
|
-
* const
|
|
84
|
-
* const
|
|
94
|
+
* // App side: receive wallet's public key and derive session
|
|
95
|
+
* const walletPublicKey = await importPublicKey(receivedWalletKey);
|
|
96
|
+
* const session = await deriveSessionKeys(appKeyPair, walletPublicKey, true);
|
|
85
97
|
* ```
|
|
86
98
|
*/
|
|
87
99
|
export declare function importPublicKey(exported: ExportedPublicKey): Promise<CryptoKey>;
|
|
88
100
|
/**
|
|
89
|
-
* Derives
|
|
101
|
+
* Derives session keys from ECDH key exchange using HKDF.
|
|
90
102
|
*
|
|
91
|
-
*
|
|
92
|
-
*
|
|
103
|
+
* This is the main key derivation function that produces:
|
|
104
|
+
* 1. An AES-256-GCM encryption key (first 256 bits)
|
|
105
|
+
* 2. An HMAC key for verificationHash computation (second 256 bits)
|
|
106
|
+
* 3. A verificationHash computed as HMAC(hmacKey, "aztec-wallet-verification-verificationHash")
|
|
93
107
|
*
|
|
94
|
-
*
|
|
95
|
-
*
|
|
96
|
-
*
|
|
108
|
+
* The keys are derived using a single HKDF call that produces 512 bits,
|
|
109
|
+
* then split into the two keys.
|
|
110
|
+
*
|
|
111
|
+
* @param ownKeyPair - The caller's ECDH key pair (private for ECDH, public for salt)
|
|
112
|
+
* @param peerPublicKey - The peer's ECDH public key (for ECDH and salt)
|
|
113
|
+
* @param isApp - true if caller is the app, false if caller is the wallet
|
|
114
|
+
* @returns Session keys containing encryption key and verificationHash
|
|
97
115
|
*
|
|
98
116
|
* @example
|
|
99
117
|
* ```typescript
|
|
100
|
-
* //
|
|
101
|
-
* const
|
|
102
|
-
*
|
|
103
|
-
*
|
|
118
|
+
* // App side
|
|
119
|
+
* const sessionA = await deriveSessionKeys(appKeyPair, walletPublicKey, true);
|
|
120
|
+
* // Wallet side
|
|
121
|
+
* const sessionB = await deriveSessionKeys(walletKeyPair, appPublicKey, false);
|
|
122
|
+
* // sessionA.verificationHash === sessionB.verificationHash
|
|
104
123
|
* ```
|
|
105
124
|
*/
|
|
106
|
-
export declare function
|
|
125
|
+
export declare function deriveSessionKeys(ownKeyPair: SecureKeyPair, peerPublicKey: CryptoKey, isApp: boolean): Promise<SessionKeys>;
|
|
107
126
|
/**
|
|
108
127
|
* Encrypts data using AES-256-GCM.
|
|
109
128
|
*
|
|
110
|
-
*
|
|
111
|
-
* generated for each encryption operation.
|
|
129
|
+
* A random 12-byte IV is generated for each encryption operation.
|
|
112
130
|
*
|
|
113
131
|
* AES-GCM provides both confidentiality and authenticity - any tampering
|
|
114
132
|
* with the ciphertext will cause decryption to fail.
|
|
115
133
|
*
|
|
116
|
-
* @param key - The AES-GCM key (from {@link
|
|
117
|
-
* @param data - The data to encrypt (
|
|
134
|
+
* @param key - The AES-GCM key (from {@link deriveSessionKeys})
|
|
135
|
+
* @param data - The string data to encrypt (caller is responsible for serialization)
|
|
118
136
|
* @returns The encrypted payload with IV and ciphertext
|
|
119
137
|
*
|
|
120
138
|
* @example
|
|
121
139
|
* ```typescript
|
|
122
|
-
* const encrypted = await encrypt(
|
|
140
|
+
* const encrypted = await encrypt(session.encryptionKey, JSON.stringify({ action: 'transfer', amount: 100 }));
|
|
123
141
|
* // encrypted.iv and encrypted.ciphertext are base64 strings
|
|
124
142
|
* ```
|
|
125
143
|
*/
|
|
126
|
-
export declare function encrypt(key: CryptoKey, data:
|
|
144
|
+
export declare function encrypt(key: CryptoKey, data: string): Promise<EncryptedPayload>;
|
|
127
145
|
/**
|
|
128
146
|
* Decrypts data using AES-256-GCM.
|
|
129
147
|
*
|
|
130
148
|
* The decrypted data is JSON parsed before returning.
|
|
131
149
|
*
|
|
132
150
|
* @typeParam T - The expected type of the decrypted data
|
|
133
|
-
* @param key - The AES-GCM key (from {@link
|
|
151
|
+
* @param key - The AES-GCM key (from {@link deriveSessionKeys})
|
|
134
152
|
* @param payload - The encrypted payload from {@link encrypt}
|
|
135
153
|
* @returns The decrypted and parsed data
|
|
136
154
|
*
|
|
@@ -138,9 +156,37 @@ export declare function encrypt(key: CryptoKey, data: unknown): Promise<Encrypte
|
|
|
138
156
|
*
|
|
139
157
|
* @example
|
|
140
158
|
* ```typescript
|
|
141
|
-
* const decrypted = await decrypt<{ action: string; amount: number }>(
|
|
159
|
+
* const decrypted = await decrypt<{ action: string; amount: number }>(session.encryptionKey, encrypted);
|
|
142
160
|
* console.log(decrypted.action); // 'transfer'
|
|
143
161
|
* ```
|
|
144
162
|
*/
|
|
145
163
|
export declare function decrypt<T = unknown>(key: CryptoKey, payload: EncryptedPayload): Promise<T>;
|
|
146
|
-
|
|
164
|
+
/**
|
|
165
|
+
* Default grid size for emoji verification display.
|
|
166
|
+
* 3x3 grid = 9 emojis = 72 bits of security.
|
|
167
|
+
*/
|
|
168
|
+
export declare const DEFAULT_EMOJI_GRID_SIZE = 9;
|
|
169
|
+
/**
|
|
170
|
+
* Converts a hex hash to an emoji sequence for visual verification.
|
|
171
|
+
*
|
|
172
|
+
* This is used for verification - both the dApp and wallet
|
|
173
|
+
* independently compute the same emoji sequence from the derived keys.
|
|
174
|
+
* Users can visually compare the sequences to detect interception.
|
|
175
|
+
*
|
|
176
|
+
* With a 256-emoji alphabet and 9 emojis (3x3 grid), this provides
|
|
177
|
+
* 72 bits of security (9 * 8 = 72 bits), making brute-force attacks
|
|
178
|
+
* computationally infeasible.
|
|
179
|
+
*
|
|
180
|
+
* @param hash - Hex string from verification hash (64 chars = 32 bytes)
|
|
181
|
+
* @param count - Number of emojis to generate (default: 9 for 3x3 grid)
|
|
182
|
+
* @returns A string of emojis representing the hash
|
|
183
|
+
*
|
|
184
|
+
* @example
|
|
185
|
+
* ```typescript
|
|
186
|
+
* const session = await deriveSessionKeys(...);
|
|
187
|
+
* const emoji = hashToEmoji(session.verificationHash); // e.g., "π΅π¦π―πΌππ²π¦πΈπ"
|
|
188
|
+
* // Display as 3x3 grid to user for verification
|
|
189
|
+
* ```
|
|
190
|
+
*/
|
|
191
|
+
export declare function hashToEmoji(hash: string, count?: number): string;
|
|
192
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dest/crypto.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"crypto.d.ts","sourceRoot":"","sources":["../src/crypto.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"crypto.d.ts","sourceRoot":"","sources":["../src/crypto.ts"],"names":[],"mappings":"AA8DA;;;;GAIG;AACH,MAAM,WAAW,iBAAiB;IAChC,gDAAgD;IAChD,GAAG,EAAE,MAAM,CAAC;IACZ,kCAAkC;IAClC,GAAG,EAAE,MAAM,CAAC;IACZ,uCAAuC;IACvC,CAAC,EAAE,MAAM,CAAC;IACV,uCAAuC;IACvC,CAAC,EAAE,MAAM,CAAC;CACX;AAED;;;;GAIG;AACH,MAAM,WAAW,gBAAgB;IAC/B,uDAAuD;IACvD,EAAE,EAAE,MAAM,CAAC;IACX,kCAAkC;IAClC,UAAU,EAAE,MAAM,CAAC;CACpB;AAED;;;;;GAKG;AACH,MAAM,WAAW,aAAa;IAC5B,iCAAiC;IACjC,SAAS,EAAE,SAAS,CAAC;IACrB,yDAAyD;IACzD,UAAU,EAAE,SAAS,CAAC;CACvB;AAED;;;;;GAKG;AACH,MAAM,WAAW,WAAW;IAC1B,wDAAwD;IACxD,aAAa,EAAE,SAAS,CAAC;IACzB,oDAAoD;IACpD,gBAAgB,EAAE,MAAM,CAAC;CAC1B;AASD;;;;;;;;;;;;;;GAcG;AACH,wBAAsB,eAAe,IAAI,OAAO,CAAC,aAAa,CAAC,CAa9D;AAED;;;;;;;;;;;;;;;GAeG;AACH,wBAAsB,eAAe,CAAC,SAAS,EAAE,SAAS,GAAG,OAAO,CAAC,iBAAiB,CAAC,CAQtF;AAED;;;;;;;;;;;;;;GAcG;AACH,wBAAgB,eAAe,CAAC,QAAQ,EAAE,iBAAiB,GAAG,OAAO,CAAC,SAAS,CAAC,CAgB/E;AAsDD;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,wBAAsB,iBAAiB,CACrC,UAAU,EAAE,aAAa,EACzB,aAAa,EAAE,SAAS,EACxB,KAAK,EAAE,OAAO,GACb,OAAO,CAAC,WAAW,CAAC,CAwDtB;AAED;;;;;;;;;;;;;;;;;GAiBG;AACH,wBAAsB,OAAO,CAAC,GAAG,EAAE,SAAS,EAAE,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,gBAAgB,CAAC,CAUrF;AAED;;;;;;;;;;;;;;;;;GAiBG;AACH,wBAAsB,OAAO,CAAC,CAAC,GAAG,OAAO,EAAE,GAAG,EAAE,SAAS,EAAE,OAAO,EAAE,gBAAgB,GAAG,OAAO,CAAC,CAAC,CAAC,CAQhG;AAwDD;;;GAGG;AACH,eAAO,MAAM,uBAAuB,IAAI,CAAC;AAEzC;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,wBAAgB,WAAW,CAAC,IAAI,EAAE,MAAM,EAAE,KAAK,GAAE,MAAgC,GAAG,MAAM,CAOzF"}
|