@aztec/wallet-sdk 4.0.0-devnet.2-patch.3 → 4.0.0-devnet.3-patch.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/base-wallet/base_wallet.d.ts +31 -20
- package/dest/base-wallet/base_wallet.d.ts.map +1 -1
- package/dest/base-wallet/base_wallet.js +108 -48
- package/dest/base-wallet/index.d.ts +2 -2
- package/dest/base-wallet/index.d.ts.map +1 -1
- package/dest/base-wallet/utils.d.ts +3 -2
- package/dest/base-wallet/utils.d.ts.map +1 -1
- package/dest/base-wallet/utils.js +6 -3
- package/dest/crypto.d.ts +39 -1
- package/dest/crypto.d.ts.map +1 -1
- package/dest/crypto.js +88 -0
- package/dest/extension/provider/extension_wallet.d.ts +2 -5
- package/dest/extension/provider/extension_wallet.d.ts.map +1 -1
- package/dest/extension/provider/index.d.ts +2 -2
- package/dest/extension/provider/index.d.ts.map +1 -1
- package/dest/iframe/handlers/iframe_connection_handler.d.ts +118 -0
- package/dest/iframe/handlers/iframe_connection_handler.d.ts.map +1 -0
- package/dest/iframe/handlers/iframe_connection_handler.js +228 -0
- package/dest/iframe/handlers/index.d.ts +2 -0
- package/dest/iframe/handlers/index.d.ts.map +1 -0
- package/dest/iframe/handlers/index.js +1 -0
- package/dest/iframe/provider/iframe_discovery.d.ts +25 -0
- package/dest/iframe/provider/iframe_discovery.d.ts.map +1 -0
- package/dest/iframe/provider/iframe_discovery.js +167 -0
- package/dest/iframe/provider/iframe_provider.d.ts +65 -0
- package/dest/iframe/provider/iframe_provider.d.ts.map +1 -0
- package/dest/iframe/provider/iframe_provider.js +257 -0
- package/dest/iframe/provider/iframe_wallet.d.ts +68 -0
- package/dest/iframe/provider/iframe_wallet.d.ts.map +1 -0
- package/dest/iframe/provider/iframe_wallet.js +200 -0
- package/dest/iframe/provider/index.d.ts +4 -0
- package/dest/iframe/provider/index.d.ts.map +1 -0
- package/dest/iframe/provider/index.js +3 -0
- package/dest/manager/types.d.ts +3 -2
- package/dest/manager/types.d.ts.map +1 -1
- package/dest/manager/wallet_manager.d.ts +1 -1
- package/dest/manager/wallet_manager.d.ts.map +1 -1
- package/dest/manager/wallet_manager.js +46 -16
- package/dest/types.d.ts +14 -2
- package/dest/types.d.ts.map +1 -1
- package/dest/types.js +4 -0
- package/package.json +12 -8
- package/src/base-wallet/base_wallet.ts +159 -82
- package/src/base-wallet/index.ts +1 -1
- package/src/base-wallet/utils.ts +8 -0
- package/src/crypto.ts +104 -0
- package/src/extension/provider/extension_wallet.ts +1 -6
- package/src/extension/provider/index.ts +1 -1
- package/src/iframe/handlers/iframe_connection_handler.ts +328 -0
- package/src/iframe/handlers/index.ts +7 -0
- package/src/iframe/provider/iframe_discovery.ts +185 -0
- package/src/iframe/provider/iframe_provider.ts +331 -0
- package/src/iframe/provider/iframe_wallet.ts +229 -0
- package/src/iframe/provider/index.ts +3 -0
- package/src/manager/types.ts +2 -1
- package/src/manager/wallet_manager.ts +48 -14
- package/src/types.ts +13 -0
package/dest/crypto.js
CHANGED
|
@@ -392,3 +392,91 @@ const FINGERPRINT_DATA = new TextEncoder().encode('aztec-wallet-verification-ver
|
|
|
392
392
|
}
|
|
393
393
|
return emojis.join('');
|
|
394
394
|
}
|
|
395
|
+
// ─── Passphrase-based encryption (PBKDF2 + AES-256-GCM) ───────────────────
|
|
396
|
+
/** Default PBKDF2 iteration count. High to compensate for short PINs (~1-2s on modern hardware). */ const DEFAULT_PBKDF2_ITERATIONS = 2_000_000;
|
|
397
|
+
const PBKDF2_SALT_BYTES = 16;
|
|
398
|
+
const PBKDF2_IV_BYTES = 12;
|
|
399
|
+
/**
|
|
400
|
+
* Derives an AES-256-GCM key from a passphrase using PBKDF2-SHA256.
|
|
401
|
+
*
|
|
402
|
+
* @param passphrase - The user-provided passphrase or PIN
|
|
403
|
+
* @param salt - Random salt bytes
|
|
404
|
+
* @param iterations - PBKDF2 iteration count (default: 2,000,000)
|
|
405
|
+
* @returns An AES-256-GCM CryptoKey
|
|
406
|
+
*/ export async function deriveKeyFromPassphrase(passphrase, salt, iterations = DEFAULT_PBKDF2_ITERATIONS) {
|
|
407
|
+
const keyMaterial = await crypto.subtle.importKey('raw', new TextEncoder().encode(passphrase), 'PBKDF2', false, [
|
|
408
|
+
'deriveKey'
|
|
409
|
+
]);
|
|
410
|
+
return crypto.subtle.deriveKey({
|
|
411
|
+
name: 'PBKDF2',
|
|
412
|
+
salt: salt,
|
|
413
|
+
iterations,
|
|
414
|
+
hash: 'SHA-256'
|
|
415
|
+
}, keyMaterial, {
|
|
416
|
+
name: 'AES-GCM',
|
|
417
|
+
length: 256
|
|
418
|
+
}, false, [
|
|
419
|
+
'encrypt',
|
|
420
|
+
'decrypt'
|
|
421
|
+
]);
|
|
422
|
+
}
|
|
423
|
+
/**
|
|
424
|
+
* Encrypts arbitrary bytes with a passphrase using PBKDF2 + AES-256-GCM.
|
|
425
|
+
*
|
|
426
|
+
* Output layout: `[salt (16)] [iv (12)] [ciphertext (...)]`
|
|
427
|
+
*
|
|
428
|
+
* @param plaintext - Data to encrypt
|
|
429
|
+
* @param passphrase - User passphrase or PIN
|
|
430
|
+
* @param iterations - PBKDF2 iteration count (default: 2,000,000)
|
|
431
|
+
* @returns A Uint8Array containing salt + iv + ciphertext
|
|
432
|
+
*/ export async function encryptWithPassphrase(plaintext, passphrase, iterations = DEFAULT_PBKDF2_ITERATIONS) {
|
|
433
|
+
const salt = crypto.getRandomValues(new Uint8Array(PBKDF2_SALT_BYTES));
|
|
434
|
+
const iv = crypto.getRandomValues(new Uint8Array(PBKDF2_IV_BYTES));
|
|
435
|
+
const key = await deriveKeyFromPassphrase(passphrase, salt, iterations);
|
|
436
|
+
const ciphertext = new Uint8Array(await crypto.subtle.encrypt({
|
|
437
|
+
name: 'AES-GCM',
|
|
438
|
+
iv
|
|
439
|
+
}, key, plaintext));
|
|
440
|
+
const result = new Uint8Array(PBKDF2_SALT_BYTES + PBKDF2_IV_BYTES + ciphertext.length);
|
|
441
|
+
result.set(salt, 0);
|
|
442
|
+
result.set(iv, PBKDF2_SALT_BYTES);
|
|
443
|
+
result.set(ciphertext, PBKDF2_SALT_BYTES + PBKDF2_IV_BYTES);
|
|
444
|
+
return result;
|
|
445
|
+
}
|
|
446
|
+
/**
|
|
447
|
+
* Decrypts data produced by {@link encryptWithPassphrase}.
|
|
448
|
+
*
|
|
449
|
+
* @param data - The encrypted blob (salt + iv + ciphertext)
|
|
450
|
+
* @param passphrase - The passphrase used during encryption
|
|
451
|
+
* @param iterations - PBKDF2 iteration count (must match encryption)
|
|
452
|
+
* @returns The decrypted plaintext bytes
|
|
453
|
+
* @throws On wrong passphrase (AES-GCM auth tag mismatch)
|
|
454
|
+
*/ export async function decryptWithPassphrase(data, passphrase, iterations = DEFAULT_PBKDF2_ITERATIONS) {
|
|
455
|
+
const salt = data.slice(0, PBKDF2_SALT_BYTES);
|
|
456
|
+
const iv = data.slice(PBKDF2_SALT_BYTES, PBKDF2_SALT_BYTES + PBKDF2_IV_BYTES);
|
|
457
|
+
const ciphertext = data.slice(PBKDF2_SALT_BYTES + PBKDF2_IV_BYTES);
|
|
458
|
+
const key = await deriveKeyFromPassphrase(passphrase, salt, iterations);
|
|
459
|
+
return new Uint8Array(await crypto.subtle.decrypt({
|
|
460
|
+
name: 'AES-GCM',
|
|
461
|
+
iv
|
|
462
|
+
}, key, ciphertext));
|
|
463
|
+
}
|
|
464
|
+
/**
|
|
465
|
+
* Converts a Uint8Array to a base64 string.
|
|
466
|
+
*/ export function uint8ToBase64(bytes) {
|
|
467
|
+
let binary = '';
|
|
468
|
+
for (const b of bytes){
|
|
469
|
+
binary += String.fromCharCode(b);
|
|
470
|
+
}
|
|
471
|
+
return btoa(binary);
|
|
472
|
+
}
|
|
473
|
+
/**
|
|
474
|
+
* Converts a base64 string to a Uint8Array.
|
|
475
|
+
*/ export function base64ToUint8(b64) {
|
|
476
|
+
const binary = atob(b64);
|
|
477
|
+
const bytes = new Uint8Array(binary.length);
|
|
478
|
+
for(let i = 0; i < binary.length; i++){
|
|
479
|
+
bytes[i] = binary.charCodeAt(i);
|
|
480
|
+
}
|
|
481
|
+
return bytes;
|
|
482
|
+
}
|
|
@@ -1,9 +1,6 @@
|
|
|
1
1
|
import type { ChainInfo } from '@aztec/aztec.js/account';
|
|
2
2
|
import { type Wallet } from '@aztec/aztec.js/wallet';
|
|
3
|
-
|
|
4
|
-
* Callback type for wallet disconnect events.
|
|
5
|
-
*/
|
|
6
|
-
export type DisconnectCallback = () => void;
|
|
3
|
+
import { type DisconnectCallback } from '../../types.js';
|
|
7
4
|
/**
|
|
8
5
|
* A wallet implementation that communicates with browser extension wallets
|
|
9
6
|
* using an encrypted MessageChannel.
|
|
@@ -129,4 +126,4 @@ export declare class ExtensionWallet {
|
|
|
129
126
|
*/
|
|
130
127
|
disconnect(): Promise<void>;
|
|
131
128
|
}
|
|
132
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
129
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"extension_wallet.d.ts","sourceRoot":"","sources":["../../../src/extension/provider/extension_wallet.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,yBAAyB,CAAC;AACzD,OAAO,EAAE,KAAK,MAAM,EAAgB,MAAM,wBAAwB,CAAC;
|
|
1
|
+
{"version":3,"file":"extension_wallet.d.ts","sourceRoot":"","sources":["../../../src/extension/provider/extension_wallet.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,yBAAyB,CAAC;AACzD,OAAO,EAAE,KAAK,MAAM,EAAgB,MAAM,wBAAwB,CAAC;AAOnE,OAAO,EAAE,KAAK,kBAAkB,EAA8D,MAAM,gBAAgB,CAAC;AAarH;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,qBAAa,eAAe;IAexB,OAAO,CAAC,SAAS;IACjB,OAAO,CAAC,KAAK;IACb,OAAO,CAAC,WAAW;IACnB,OAAO,CAAC,IAAI;IACZ,OAAO,CAAC,SAAS;IAlBnB,sEAAsE;IACtE,OAAO,CAAC,QAAQ,CAAoD;IACpE,OAAO,CAAC,YAAY,CAAS;IAC7B,OAAO,CAAC,mBAAmB,CAA4B;IAEvD;;;;;;;OAOG;IACH,OAAO,eAMH;IAEJ;;;;;;;;;;;;;;;;;;;;;;;;;OAyBG;IACH,MAAM,CAAC,MAAM,CACX,WAAW,EAAE,MAAM,EACnB,IAAI,EAAE,WAAW,EACjB,SAAS,EAAE,SAAS,EACpB,SAAS,EAAE,SAAS,EACpB,KAAK,EAAE,MAAM,GACZ,eAAe,CAkCjB;IAED,QAAQ,IAAI,MAAM,CAIjB;YAUa,uBAAuB;YA8CvB,WAAW;IA0BzB;;;;OAIG;IACH,OAAO,CAAC,gBAAgB;IA0BxB;;;;;;;;;;;;;;;OAeG;IACH,YAAY,CAAC,QAAQ,EAAE,kBAAkB,GAAG,MAAM,IAAI,CAQrD;IAED;;;;OAIG;IACH,cAAc,IAAI,OAAO,CAExB;IAED;;;;;;;;;;;;;OAaG;IAEG,UAAU,IAAI,OAAO,CAAC,IAAI,CAAC,CAahC;CACF"}
|
|
@@ -1,3 +1,3 @@
|
|
|
1
|
-
export { ExtensionWallet
|
|
1
|
+
export { ExtensionWallet } from './extension_wallet.js';
|
|
2
2
|
export { ExtensionProvider, type DiscoveredWallet, type ConnectedWallet, type DiscoveryOptions, } from './extension_provider.js';
|
|
3
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
3
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguZC50cyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9leHRlbnNpb24vcHJvdmlkZXIvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsT0FBTyxFQUFFLGVBQWUsRUFBRSxNQUFNLHVCQUF1QixDQUFDO0FBQ3hELE9BQU8sRUFDTCxpQkFBaUIsRUFDakIsS0FBSyxnQkFBZ0IsRUFDckIsS0FBSyxlQUFlLEVBQ3BCLEtBQUssZ0JBQWdCLEdBQ3RCLE1BQU0seUJBQXlCLENBQUMifQ==
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/extension/provider/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/extension/provider/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,MAAM,uBAAuB,CAAC;AACxD,OAAO,EACL,iBAAiB,EACjB,KAAK,gBAAgB,EACrB,KAAK,eAAe,EACpB,KAAK,gBAAgB,GACtB,MAAM,yBAAyB,CAAC"}
|
|
@@ -0,0 +1,118 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* IframeConnectionHandler — wallet-side of the cross-origin iframe protocol.
|
|
3
|
+
*
|
|
4
|
+
* This mirrors {@link BackgroundConnectionHandler} from `@aztec/wallet-sdk/extension/handlers`
|
|
5
|
+
* but uses `window.postMessage` instead of browser.runtime messaging.
|
|
6
|
+
*
|
|
7
|
+
* Message flow (wallet receives):
|
|
8
|
+
* parent → DISCOVERY → show approval UI → send DISCOVERY_RESPONSE
|
|
9
|
+
* parent → KEY_EXCHANGE_REQUEST → ECDH → send KEY_EXCHANGE_RESPONSE
|
|
10
|
+
* parent → SECURE_MESSAGE → decrypt → Wallet → encrypt → SECURE_RESPONSE
|
|
11
|
+
* parent → DISCONNECT → terminate session
|
|
12
|
+
*
|
|
13
|
+
* The wallet announces itself by posting WALLET_READY as soon as the handler starts,
|
|
14
|
+
* so the dApp knows it can send a discovery request.
|
|
15
|
+
*/
|
|
16
|
+
import type { ChainInfo } from '@aztec/aztec.js/account';
|
|
17
|
+
import type { Wallet } from '@aztec/aztec.js/wallet';
|
|
18
|
+
/**
|
|
19
|
+
* A pending discovery request from a dApp (before user approval).
|
|
20
|
+
*/
|
|
21
|
+
export interface PendingSession {
|
|
22
|
+
/** Unique request identifier */
|
|
23
|
+
requestId: string;
|
|
24
|
+
/** Application identifier */
|
|
25
|
+
appId: string;
|
|
26
|
+
/** Origin URL of the requesting page */
|
|
27
|
+
origin: string;
|
|
28
|
+
/** Approval status */
|
|
29
|
+
status: 'pending' | 'approved';
|
|
30
|
+
}
|
|
31
|
+
/**
|
|
32
|
+
* An active session (after key exchange).
|
|
33
|
+
*/
|
|
34
|
+
export interface ActiveSession {
|
|
35
|
+
/** Session identifier (same as the discovery requestId) */
|
|
36
|
+
sessionId: string;
|
|
37
|
+
/** AES-256-GCM shared key for this session */
|
|
38
|
+
sharedKey: CryptoKey;
|
|
39
|
+
/** Verification hash for emoji display */
|
|
40
|
+
verificationHash: string;
|
|
41
|
+
/** Origin URL of the connected dApp */
|
|
42
|
+
origin: string;
|
|
43
|
+
/** Application identifier */
|
|
44
|
+
appId: string;
|
|
45
|
+
}
|
|
46
|
+
/**
|
|
47
|
+
* Configuration for the iframe connection handler.
|
|
48
|
+
*/
|
|
49
|
+
export interface IframeConnectionConfig {
|
|
50
|
+
/** Unique wallet identifier */
|
|
51
|
+
walletId: string;
|
|
52
|
+
/** Display name for the wallet */
|
|
53
|
+
walletName: string;
|
|
54
|
+
/** Wallet version string */
|
|
55
|
+
walletVersion: string;
|
|
56
|
+
/** Optional wallet icon URL */
|
|
57
|
+
walletIcon?: string;
|
|
58
|
+
/** Origins allowed to connect. If empty or undefined, all origins are allowed (dev mode). */
|
|
59
|
+
allowedOrigins?: string[];
|
|
60
|
+
}
|
|
61
|
+
/**
|
|
62
|
+
* Event callbacks for the iframe connection handler.
|
|
63
|
+
*/
|
|
64
|
+
export interface IframeConnectionCallbacks {
|
|
65
|
+
/** Called when a new discovery request arrives — wallet can show approval UI */
|
|
66
|
+
onPendingDiscovery?: (session: PendingSession) => void;
|
|
67
|
+
/** Called when a session is established (key exchange complete) */
|
|
68
|
+
onSessionEstablished?: (session: ActiveSession) => void;
|
|
69
|
+
/** Called when a session is terminated */
|
|
70
|
+
onSessionTerminated?: (sessionId: string) => void;
|
|
71
|
+
/** Called when a key exchange completes — show verificationHash as emojis to the user */
|
|
72
|
+
onVerificationHash?: (verificationHash: string) => void;
|
|
73
|
+
/**
|
|
74
|
+
* Resolves the Wallet instance to use for a given dApp and chain.
|
|
75
|
+
* Called when an encrypted message arrives and needs to be dispatched.
|
|
76
|
+
*/
|
|
77
|
+
getWallet: (appId: string, chainInfo: ChainInfo) => Promise<Wallet>;
|
|
78
|
+
}
|
|
79
|
+
/**
|
|
80
|
+
* Handles the wallet side of the cross-origin iframe protocol.
|
|
81
|
+
*
|
|
82
|
+
* Manages the full lifecycle: discovery, ECDH key exchange, encrypted message
|
|
83
|
+
* dispatch to a {@link Wallet} instance, and session termination.
|
|
84
|
+
*
|
|
85
|
+
* @example
|
|
86
|
+
* ```typescript
|
|
87
|
+
* const handler = new IframeConnectionHandler(
|
|
88
|
+
* { walletId: 'my-wallet', walletName: 'My Wallet', walletVersion: '1.0.0' },
|
|
89
|
+
* {
|
|
90
|
+
* onPendingDiscovery: (session) => showApprovalUI(session),
|
|
91
|
+
* getWallet: (appId, chainInfo) => createWalletForApp(appId, chainInfo),
|
|
92
|
+
* },
|
|
93
|
+
* );
|
|
94
|
+
* handler.start();
|
|
95
|
+
* ```
|
|
96
|
+
*/
|
|
97
|
+
export declare class IframeConnectionHandler {
|
|
98
|
+
private config;
|
|
99
|
+
private callbacks;
|
|
100
|
+
private pendingSessions;
|
|
101
|
+
private activeSessions;
|
|
102
|
+
private log;
|
|
103
|
+
constructor(config: IframeConnectionConfig, callbacks: IframeConnectionCallbacks);
|
|
104
|
+
start(): void;
|
|
105
|
+
stop(): void;
|
|
106
|
+
approveDiscovery(requestId: string): void;
|
|
107
|
+
rejectDiscovery(requestId: string): void;
|
|
108
|
+
terminateSession(sessionId: string): void;
|
|
109
|
+
getPendingSessions(): PendingSession[];
|
|
110
|
+
private handleMessage;
|
|
111
|
+
private handleMessageAsync;
|
|
112
|
+
private handleDiscoveryRequest;
|
|
113
|
+
private handleKeyExchangeRequest;
|
|
114
|
+
private handleSecureMessage;
|
|
115
|
+
private postToParent;
|
|
116
|
+
private postToOrigin;
|
|
117
|
+
}
|
|
118
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"iframe_connection_handler.d.ts","sourceRoot":"","sources":["../../../src/iframe/handlers/iframe_connection_handler.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;GAcG;AACH,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,yBAAyB,CAAC;AAEzD,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,wBAAwB,CAAC;AAgBrD;;GAEG;AACH,MAAM,WAAW,cAAc;IAC7B,gCAAgC;IAChC,SAAS,EAAE,MAAM,CAAC;IAClB,6BAA6B;IAC7B,KAAK,EAAE,MAAM,CAAC;IACd,wCAAwC;IACxC,MAAM,EAAE,MAAM,CAAC;IACf,sBAAsB;IACtB,MAAM,EAAE,SAAS,GAAG,UAAU,CAAC;CAChC;AAED;;GAEG;AACH,MAAM,WAAW,aAAa;IAC5B,2DAA2D;IAC3D,SAAS,EAAE,MAAM,CAAC;IAClB,8CAA8C;IAC9C,SAAS,EAAE,SAAS,CAAC;IACrB,0CAA0C;IAC1C,gBAAgB,EAAE,MAAM,CAAC;IACzB,uCAAuC;IACvC,MAAM,EAAE,MAAM,CAAC;IACf,6BAA6B;IAC7B,KAAK,EAAE,MAAM,CAAC;CACf;AAED;;GAEG;AACH,MAAM,WAAW,sBAAsB;IACrC,+BAA+B;IAC/B,QAAQ,EAAE,MAAM,CAAC;IACjB,kCAAkC;IAClC,UAAU,EAAE,MAAM,CAAC;IACnB,4BAA4B;IAC5B,aAAa,EAAE,MAAM,CAAC;IACtB,+BAA+B;IAC/B,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,6FAA6F;IAC7F,cAAc,CAAC,EAAE,MAAM,EAAE,CAAC;CAC3B;AAED;;GAEG;AACH,MAAM,WAAW,yBAAyB;IACxC,kFAAgF;IAChF,kBAAkB,CAAC,EAAE,CAAC,OAAO,EAAE,cAAc,KAAK,IAAI,CAAC;IACvD,mEAAmE;IACnE,oBAAoB,CAAC,EAAE,CAAC,OAAO,EAAE,aAAa,KAAK,IAAI,CAAC;IACxD,0CAA0C;IAC1C,mBAAmB,CAAC,EAAE,CAAC,SAAS,EAAE,MAAM,KAAK,IAAI,CAAC;IAClD,2FAAyF;IACzF,kBAAkB,CAAC,EAAE,CAAC,gBAAgB,EAAE,MAAM,KAAK,IAAI,CAAC;IACxD;;;OAGG;IACH,SAAS,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,SAAS,EAAE,SAAS,KAAK,OAAO,CAAC,MAAM,CAAC,CAAC;CACrE;AAED;;;;;;;;;;;;;;;;;GAiBG;AACH,qBAAa,uBAAuB;IAMhC,OAAO,CAAC,MAAM;IACd,OAAO,CAAC,SAAS;IANnB,OAAO,CAAC,eAAe,CAAqC;IAC5D,OAAO,CAAC,cAAc,CAAoC;IAC1D,OAAO,CAAC,GAAG,CAAyC;IAEpD,YACU,MAAM,EAAE,sBAAsB,EAC9B,SAAS,EAAE,yBAAyB,EAC1C;IAEJ,KAAK,IAAI,IAAI,CAIZ;IAED,IAAI,IAAI,IAAI,CAEX;IAED,gBAAgB,CAAC,SAAS,EAAE,MAAM,GAAG,IAAI,CAkBxC;IAED,eAAe,CAAC,SAAS,EAAE,MAAM,GAAG,IAAI,CAEvC;IAED,gBAAgB,CAAC,SAAS,EAAE,MAAM,GAAG,IAAI,CAUxC;IAED,kBAAkB,IAAI,cAAc,EAAE,CAErC;IAED,OAAO,CAAC,aAAa,CAEnB;YAEY,kBAAkB;IA4BhC,OAAO,CAAC,sBAAsB;YAShB,wBAAwB;YA6CxB,mBAAmB;IAsDjC,OAAO,CAAC,YAAY;IAMpB,OAAO,CAAC,YAAY;CAKrB"}
|
|
@@ -0,0 +1,228 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* IframeConnectionHandler — wallet-side of the cross-origin iframe protocol.
|
|
3
|
+
*
|
|
4
|
+
* This mirrors {@link BackgroundConnectionHandler} from `@aztec/wallet-sdk/extension/handlers`
|
|
5
|
+
* but uses `window.postMessage` instead of browser.runtime messaging.
|
|
6
|
+
*
|
|
7
|
+
* Message flow (wallet receives):
|
|
8
|
+
* parent → DISCOVERY → show approval UI → send DISCOVERY_RESPONSE
|
|
9
|
+
* parent → KEY_EXCHANGE_REQUEST → ECDH → send KEY_EXCHANGE_RESPONSE
|
|
10
|
+
* parent → SECURE_MESSAGE → decrypt → Wallet → encrypt → SECURE_RESPONSE
|
|
11
|
+
* parent → DISCONNECT → terminate session
|
|
12
|
+
*
|
|
13
|
+
* The wallet announces itself by posting WALLET_READY as soon as the handler starts,
|
|
14
|
+
* so the dApp knows it can send a discovery request.
|
|
15
|
+
*/ import { createLogger } from '@aztec/aztec.js/log';
|
|
16
|
+
import { WalletSchema } from '@aztec/aztec.js/wallet';
|
|
17
|
+
import { jsonStringify } from '@aztec/foundation/json-rpc';
|
|
18
|
+
import { parseWithOptionals, schemaHasMethod } from '@aztec/foundation/schemas';
|
|
19
|
+
import { decrypt, deriveSessionKeys, encrypt, exportPublicKey, generateKeyPair, importPublicKey } from '../../crypto.js';
|
|
20
|
+
import { WalletMessageType } from '../../types.js';
|
|
21
|
+
/**
|
|
22
|
+
* Handles the wallet side of the cross-origin iframe protocol.
|
|
23
|
+
*
|
|
24
|
+
* Manages the full lifecycle: discovery, ECDH key exchange, encrypted message
|
|
25
|
+
* dispatch to a {@link Wallet} instance, and session termination.
|
|
26
|
+
*
|
|
27
|
+
* @example
|
|
28
|
+
* ```typescript
|
|
29
|
+
* const handler = new IframeConnectionHandler(
|
|
30
|
+
* { walletId: 'my-wallet', walletName: 'My Wallet', walletVersion: '1.0.0' },
|
|
31
|
+
* {
|
|
32
|
+
* onPendingDiscovery: (session) => showApprovalUI(session),
|
|
33
|
+
* getWallet: (appId, chainInfo) => createWalletForApp(appId, chainInfo),
|
|
34
|
+
* },
|
|
35
|
+
* );
|
|
36
|
+
* handler.start();
|
|
37
|
+
* ```
|
|
38
|
+
*/ export class IframeConnectionHandler {
|
|
39
|
+
config;
|
|
40
|
+
callbacks;
|
|
41
|
+
pendingSessions;
|
|
42
|
+
activeSessions;
|
|
43
|
+
log;
|
|
44
|
+
constructor(config, callbacks){
|
|
45
|
+
this.config = config;
|
|
46
|
+
this.callbacks = callbacks;
|
|
47
|
+
this.pendingSessions = new Map();
|
|
48
|
+
this.activeSessions = new Map();
|
|
49
|
+
this.log = createLogger('wallet:iframe-handler');
|
|
50
|
+
this.handleMessage = (event)=>{
|
|
51
|
+
void this.handleMessageAsync(event);
|
|
52
|
+
};
|
|
53
|
+
}
|
|
54
|
+
start() {
|
|
55
|
+
window.addEventListener('message', this.handleMessage);
|
|
56
|
+
this.postToParent({
|
|
57
|
+
type: WalletMessageType.WALLET_READY
|
|
58
|
+
});
|
|
59
|
+
this.log.info('IframeConnectionHandler started, posted WALLET_READY');
|
|
60
|
+
}
|
|
61
|
+
stop() {
|
|
62
|
+
window.removeEventListener('message', this.handleMessage);
|
|
63
|
+
}
|
|
64
|
+
approveDiscovery(requestId) {
|
|
65
|
+
const pending = this.pendingSessions.get(requestId);
|
|
66
|
+
if (!pending || pending.status !== 'pending') {
|
|
67
|
+
return;
|
|
68
|
+
}
|
|
69
|
+
pending.status = 'approved';
|
|
70
|
+
this.postToOrigin(pending.origin, {
|
|
71
|
+
type: WalletMessageType.DISCOVERY_RESPONSE,
|
|
72
|
+
requestId,
|
|
73
|
+
walletInfo: {
|
|
74
|
+
id: this.config.walletId,
|
|
75
|
+
name: this.config.walletName,
|
|
76
|
+
version: this.config.walletVersion,
|
|
77
|
+
icon: this.config.walletIcon
|
|
78
|
+
}
|
|
79
|
+
});
|
|
80
|
+
this.log.info(`Discovery approved for requestId=${requestId}`);
|
|
81
|
+
}
|
|
82
|
+
rejectDiscovery(requestId) {
|
|
83
|
+
this.pendingSessions.delete(requestId);
|
|
84
|
+
}
|
|
85
|
+
terminateSession(sessionId) {
|
|
86
|
+
const session = this.activeSessions.get(sessionId);
|
|
87
|
+
if (session) {
|
|
88
|
+
this.postToOrigin(session.origin, {
|
|
89
|
+
type: WalletMessageType.SESSION_DISCONNECTED,
|
|
90
|
+
sessionId
|
|
91
|
+
});
|
|
92
|
+
this.activeSessions.delete(sessionId);
|
|
93
|
+
this.callbacks.onSessionTerminated?.(sessionId);
|
|
94
|
+
}
|
|
95
|
+
}
|
|
96
|
+
getPendingSessions() {
|
|
97
|
+
return Array.from(this.pendingSessions.values()).filter((s)=>s.status === 'pending');
|
|
98
|
+
}
|
|
99
|
+
handleMessage;
|
|
100
|
+
async handleMessageAsync(event) {
|
|
101
|
+
if (this.config.allowedOrigins && this.config.allowedOrigins.length > 0) {
|
|
102
|
+
if (!this.config.allowedOrigins.includes(event.origin)) {
|
|
103
|
+
return;
|
|
104
|
+
}
|
|
105
|
+
}
|
|
106
|
+
const msg = event.data;
|
|
107
|
+
if (!msg || typeof msg !== 'object' || !msg.type) {
|
|
108
|
+
return;
|
|
109
|
+
}
|
|
110
|
+
switch(msg.type){
|
|
111
|
+
case WalletMessageType.DISCOVERY:
|
|
112
|
+
this.handleDiscoveryRequest(msg, event.origin);
|
|
113
|
+
break;
|
|
114
|
+
case WalletMessageType.KEY_EXCHANGE_REQUEST:
|
|
115
|
+
await this.handleKeyExchangeRequest(msg, event.origin);
|
|
116
|
+
break;
|
|
117
|
+
case WalletMessageType.SECURE_MESSAGE:
|
|
118
|
+
await this.handleSecureMessage(msg);
|
|
119
|
+
break;
|
|
120
|
+
case WalletMessageType.DISCONNECT:
|
|
121
|
+
this.terminateSession(msg.sessionId);
|
|
122
|
+
break;
|
|
123
|
+
}
|
|
124
|
+
}
|
|
125
|
+
handleDiscoveryRequest(msg, origin) {
|
|
126
|
+
// eslint-disable-next-line jsdoc/require-jsdoc
|
|
127
|
+
const { requestId, appId } = msg;
|
|
128
|
+
const pending = {
|
|
129
|
+
requestId,
|
|
130
|
+
appId,
|
|
131
|
+
origin,
|
|
132
|
+
status: 'pending'
|
|
133
|
+
};
|
|
134
|
+
this.pendingSessions.set(requestId, pending);
|
|
135
|
+
this.log.info(`Discovery request from appId=${appId} origin=${origin}`);
|
|
136
|
+
this.callbacks.onPendingDiscovery?.(pending);
|
|
137
|
+
}
|
|
138
|
+
async handleKeyExchangeRequest(msg, origin) {
|
|
139
|
+
const { requestId, publicKey: appPublicKeyRaw } = msg;
|
|
140
|
+
const pending = this.pendingSessions.get(requestId);
|
|
141
|
+
if (!pending || pending.status !== 'approved') {
|
|
142
|
+
this.log.warn(`Key exchange for unknown/unapproved requestId=${requestId}`);
|
|
143
|
+
return;
|
|
144
|
+
}
|
|
145
|
+
try {
|
|
146
|
+
const keyPair = await generateKeyPair();
|
|
147
|
+
const walletPublicKey = await exportPublicKey(keyPair.publicKey);
|
|
148
|
+
const appPublicKey = await importPublicKey(appPublicKeyRaw);
|
|
149
|
+
const sessionKeys = await deriveSessionKeys(keyPair, appPublicKey, false);
|
|
150
|
+
const session = {
|
|
151
|
+
sessionId: requestId,
|
|
152
|
+
sharedKey: sessionKeys.encryptionKey,
|
|
153
|
+
verificationHash: sessionKeys.verificationHash,
|
|
154
|
+
origin: pending.origin,
|
|
155
|
+
appId: pending.appId
|
|
156
|
+
};
|
|
157
|
+
this.activeSessions.set(requestId, session);
|
|
158
|
+
this.pendingSessions.delete(requestId);
|
|
159
|
+
this.postToOrigin(origin, {
|
|
160
|
+
type: WalletMessageType.KEY_EXCHANGE_RESPONSE,
|
|
161
|
+
requestId,
|
|
162
|
+
publicKey: walletPublicKey,
|
|
163
|
+
verificationHash: sessionKeys.verificationHash
|
|
164
|
+
});
|
|
165
|
+
this.callbacks.onVerificationHash?.(sessionKeys.verificationHash);
|
|
166
|
+
this.callbacks.onSessionEstablished?.(session);
|
|
167
|
+
this.log.info(`Key exchange complete, sessionId=${requestId}`);
|
|
168
|
+
} catch (err) {
|
|
169
|
+
this.log.error(`Key exchange failed: ${err}`);
|
|
170
|
+
}
|
|
171
|
+
}
|
|
172
|
+
async handleSecureMessage(msg) {
|
|
173
|
+
// eslint-disable-next-line jsdoc/require-jsdoc
|
|
174
|
+
const { sessionId, encrypted } = msg;
|
|
175
|
+
const session = this.activeSessions.get(sessionId);
|
|
176
|
+
if (!session) {
|
|
177
|
+
return;
|
|
178
|
+
}
|
|
179
|
+
let walletMessage;
|
|
180
|
+
try {
|
|
181
|
+
walletMessage = await decrypt(session.sharedKey, encrypted);
|
|
182
|
+
} catch {
|
|
183
|
+
this.log.warn(`Decryption failed for sessionId=${sessionId}`);
|
|
184
|
+
return;
|
|
185
|
+
}
|
|
186
|
+
const { messageId, type, args, chainInfo, appId } = walletMessage;
|
|
187
|
+
let result;
|
|
188
|
+
let error;
|
|
189
|
+
try {
|
|
190
|
+
const wallet = await this.callbacks.getWallet(appId, chainInfo);
|
|
191
|
+
if (!schemaHasMethod(WalletSchema, type)) {
|
|
192
|
+
throw new Error(`Unknown wallet method: ${type}`);
|
|
193
|
+
}
|
|
194
|
+
// Zod's AnyZodTuple rejects optional tuple items typed as `T | undefined`
|
|
195
|
+
const sanitizedArgs = await parseWithOptionals(args, WalletSchema[type].parameters());
|
|
196
|
+
result = await wallet[type](...sanitizedArgs);
|
|
197
|
+
} catch (err) {
|
|
198
|
+
error = err instanceof Error ? err.message : String(err);
|
|
199
|
+
this.log.error(`Error handling ${type}: ${error}`);
|
|
200
|
+
}
|
|
201
|
+
const response = {
|
|
202
|
+
messageId,
|
|
203
|
+
walletId: this.config.walletId,
|
|
204
|
+
result,
|
|
205
|
+
error
|
|
206
|
+
};
|
|
207
|
+
try {
|
|
208
|
+
const encryptedResponse = await encrypt(session.sharedKey, jsonStringify(response));
|
|
209
|
+
this.postToOrigin(session.origin, {
|
|
210
|
+
type: WalletMessageType.SECURE_RESPONSE,
|
|
211
|
+
sessionId,
|
|
212
|
+
encrypted: encryptedResponse
|
|
213
|
+
});
|
|
214
|
+
} catch (err) {
|
|
215
|
+
this.log.error(`Encryption of response failed: ${err}`);
|
|
216
|
+
}
|
|
217
|
+
}
|
|
218
|
+
postToParent(msg) {
|
|
219
|
+
if (window.parent !== window) {
|
|
220
|
+
window.parent.postMessage(msg, '*');
|
|
221
|
+
}
|
|
222
|
+
}
|
|
223
|
+
postToOrigin(origin, msg) {
|
|
224
|
+
if (window.parent !== window) {
|
|
225
|
+
window.parent.postMessage(msg, origin);
|
|
226
|
+
}
|
|
227
|
+
}
|
|
228
|
+
}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
export { IframeConnectionHandler, type IframeConnectionConfig, type IframeConnectionCallbacks, type PendingSession, type ActiveSession, } from './iframe_connection_handler.js';
|
|
2
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguZC50cyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9pZnJhbWUvaGFuZGxlcnMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsT0FBTyxFQUNMLHVCQUF1QixFQUN2QixLQUFLLHNCQUFzQixFQUMzQixLQUFLLHlCQUF5QixFQUM5QixLQUFLLGNBQWMsRUFDbkIsS0FBSyxhQUFhLEdBQ25CLE1BQU0sZ0NBQWdDLENBQUMifQ==
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/iframe/handlers/index.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,uBAAuB,EACvB,KAAK,sBAAsB,EAC3B,KAAK,yBAAyB,EAC9B,KAAK,cAAc,EACnB,KAAK,aAAa,GACnB,MAAM,gCAAgC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export { IframeConnectionHandler } from './iframe_connection_handler.js';
|
|
@@ -0,0 +1,25 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Web wallet discovery — creates {@link IframeWalletProvider} instances from a list of URLs.
|
|
3
|
+
*
|
|
4
|
+
* For each configured URL we probe the wallet by loading a tiny invisible iframe,
|
|
5
|
+
* waiting for WALLET_READY, then sending a DISCOVERY request. On a successful
|
|
6
|
+
* DISCOVERY_RESPONSE we emit an IframeWalletProvider to the caller.
|
|
7
|
+
*
|
|
8
|
+
* This is intentionally lightweight (no key exchange yet) — key exchange happens
|
|
9
|
+
* later when the user selects the wallet and calls `provider.establishSecureChannel()`.
|
|
10
|
+
*/
|
|
11
|
+
import type { ChainInfo } from '@aztec/aztec.js/account';
|
|
12
|
+
import type { DiscoverySession } from '../../manager/types.js';
|
|
13
|
+
/**
|
|
14
|
+
* Probes a list of web wallet URLs and returns a {@link DiscoverySession} compatible
|
|
15
|
+
* with WalletManager's `getAvailableWallets()` interface.
|
|
16
|
+
*
|
|
17
|
+
* Discovered {@link IframeWalletProvider} instances are yielded asynchronously as each
|
|
18
|
+
* wallet responds to the probe.
|
|
19
|
+
*
|
|
20
|
+
* @param walletUrls - URLs of web wallets to probe
|
|
21
|
+
* @param chainInfo - Network information to pass during discovery
|
|
22
|
+
* @returns A cancellable discovery session
|
|
23
|
+
*/
|
|
24
|
+
export declare function discoverWebWallets(walletUrls: string[], chainInfo: ChainInfo): DiscoverySession;
|
|
25
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaWZyYW1lX2Rpc2NvdmVyeS5kLnRzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vc3JjL2lmcmFtZS9wcm92aWRlci9pZnJhbWVfZGlzY292ZXJ5LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBOzs7Ozs7Ozs7R0FTRztBQUNILE9BQU8sS0FBSyxFQUFFLFNBQVMsRUFBRSxNQUFNLHlCQUF5QixDQUFDO0FBR3pELE9BQU8sS0FBSyxFQUFFLGdCQUFnQixFQUFrQixNQUFNLHdCQUF3QixDQUFDO0FBTS9FOzs7Ozs7Ozs7O0dBVUc7QUFDSCx3QkFBZ0Isa0JBQWtCLENBQUMsVUFBVSxFQUFFLE1BQU0sRUFBRSxFQUFFLFNBQVMsRUFBRSxTQUFTLEdBQUcsZ0JBQWdCLENBdUYvRiJ9
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"iframe_discovery.d.ts","sourceRoot":"","sources":["../../../src/iframe/provider/iframe_discovery.ts"],"names":[],"mappings":"AAAA;;;;;;;;;GASG;AACH,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,yBAAyB,CAAC;AAGzD,OAAO,KAAK,EAAE,gBAAgB,EAAkB,MAAM,wBAAwB,CAAC;AAM/E;;;;;;;;;;GAUG;AACH,wBAAgB,kBAAkB,CAAC,UAAU,EAAE,MAAM,EAAE,EAAE,SAAS,EAAE,SAAS,GAAG,gBAAgB,CAuF/F"}
|