@aztec/wallet-sdk 4.0.0-devnet.2-patch.4 → 4.0.0-devnet.3-patch.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (57) hide show
  1. package/dest/base-wallet/base_wallet.d.ts +31 -20
  2. package/dest/base-wallet/base_wallet.d.ts.map +1 -1
  3. package/dest/base-wallet/base_wallet.js +108 -48
  4. package/dest/base-wallet/index.d.ts +2 -2
  5. package/dest/base-wallet/index.d.ts.map +1 -1
  6. package/dest/base-wallet/utils.d.ts +3 -2
  7. package/dest/base-wallet/utils.d.ts.map +1 -1
  8. package/dest/base-wallet/utils.js +6 -3
  9. package/dest/crypto.d.ts +39 -1
  10. package/dest/crypto.d.ts.map +1 -1
  11. package/dest/crypto.js +88 -0
  12. package/dest/extension/provider/extension_wallet.d.ts +2 -5
  13. package/dest/extension/provider/extension_wallet.d.ts.map +1 -1
  14. package/dest/extension/provider/index.d.ts +2 -2
  15. package/dest/extension/provider/index.d.ts.map +1 -1
  16. package/dest/iframe/handlers/iframe_connection_handler.d.ts +118 -0
  17. package/dest/iframe/handlers/iframe_connection_handler.d.ts.map +1 -0
  18. package/dest/iframe/handlers/iframe_connection_handler.js +228 -0
  19. package/dest/iframe/handlers/index.d.ts +2 -0
  20. package/dest/iframe/handlers/index.d.ts.map +1 -0
  21. package/dest/iframe/handlers/index.js +1 -0
  22. package/dest/iframe/provider/iframe_discovery.d.ts +25 -0
  23. package/dest/iframe/provider/iframe_discovery.d.ts.map +1 -0
  24. package/dest/iframe/provider/iframe_discovery.js +167 -0
  25. package/dest/iframe/provider/iframe_provider.d.ts +65 -0
  26. package/dest/iframe/provider/iframe_provider.d.ts.map +1 -0
  27. package/dest/iframe/provider/iframe_provider.js +257 -0
  28. package/dest/iframe/provider/iframe_wallet.d.ts +68 -0
  29. package/dest/iframe/provider/iframe_wallet.d.ts.map +1 -0
  30. package/dest/iframe/provider/iframe_wallet.js +200 -0
  31. package/dest/iframe/provider/index.d.ts +4 -0
  32. package/dest/iframe/provider/index.d.ts.map +1 -0
  33. package/dest/iframe/provider/index.js +3 -0
  34. package/dest/manager/types.d.ts +3 -2
  35. package/dest/manager/types.d.ts.map +1 -1
  36. package/dest/manager/wallet_manager.d.ts +1 -1
  37. package/dest/manager/wallet_manager.d.ts.map +1 -1
  38. package/dest/manager/wallet_manager.js +46 -16
  39. package/dest/types.d.ts +14 -2
  40. package/dest/types.d.ts.map +1 -1
  41. package/dest/types.js +4 -0
  42. package/package.json +12 -8
  43. package/src/base-wallet/base_wallet.ts +159 -82
  44. package/src/base-wallet/index.ts +1 -1
  45. package/src/base-wallet/utils.ts +8 -0
  46. package/src/crypto.ts +104 -0
  47. package/src/extension/provider/extension_wallet.ts +1 -6
  48. package/src/extension/provider/index.ts +1 -1
  49. package/src/iframe/handlers/iframe_connection_handler.ts +328 -0
  50. package/src/iframe/handlers/index.ts +7 -0
  51. package/src/iframe/provider/iframe_discovery.ts +185 -0
  52. package/src/iframe/provider/iframe_provider.ts +331 -0
  53. package/src/iframe/provider/iframe_wallet.ts +229 -0
  54. package/src/iframe/provider/index.ts +3 -0
  55. package/src/manager/types.ts +2 -1
  56. package/src/manager/wallet_manager.ts +48 -14
  57. package/src/types.ts +13 -0
package/dest/crypto.js CHANGED
@@ -392,3 +392,91 @@ const FINGERPRINT_DATA = new TextEncoder().encode('aztec-wallet-verification-ver
392
392
  }
393
393
  return emojis.join('');
394
394
  }
395
+ // ─── Passphrase-based encryption (PBKDF2 + AES-256-GCM) ───────────────────
396
+ /** Default PBKDF2 iteration count. High to compensate for short PINs (~1-2s on modern hardware). */ const DEFAULT_PBKDF2_ITERATIONS = 2_000_000;
397
+ const PBKDF2_SALT_BYTES = 16;
398
+ const PBKDF2_IV_BYTES = 12;
399
+ /**
400
+ * Derives an AES-256-GCM key from a passphrase using PBKDF2-SHA256.
401
+ *
402
+ * @param passphrase - The user-provided passphrase or PIN
403
+ * @param salt - Random salt bytes
404
+ * @param iterations - PBKDF2 iteration count (default: 2,000,000)
405
+ * @returns An AES-256-GCM CryptoKey
406
+ */ export async function deriveKeyFromPassphrase(passphrase, salt, iterations = DEFAULT_PBKDF2_ITERATIONS) {
407
+ const keyMaterial = await crypto.subtle.importKey('raw', new TextEncoder().encode(passphrase), 'PBKDF2', false, [
408
+ 'deriveKey'
409
+ ]);
410
+ return crypto.subtle.deriveKey({
411
+ name: 'PBKDF2',
412
+ salt: salt,
413
+ iterations,
414
+ hash: 'SHA-256'
415
+ }, keyMaterial, {
416
+ name: 'AES-GCM',
417
+ length: 256
418
+ }, false, [
419
+ 'encrypt',
420
+ 'decrypt'
421
+ ]);
422
+ }
423
+ /**
424
+ * Encrypts arbitrary bytes with a passphrase using PBKDF2 + AES-256-GCM.
425
+ *
426
+ * Output layout: `[salt (16)] [iv (12)] [ciphertext (...)]`
427
+ *
428
+ * @param plaintext - Data to encrypt
429
+ * @param passphrase - User passphrase or PIN
430
+ * @param iterations - PBKDF2 iteration count (default: 2,000,000)
431
+ * @returns A Uint8Array containing salt + iv + ciphertext
432
+ */ export async function encryptWithPassphrase(plaintext, passphrase, iterations = DEFAULT_PBKDF2_ITERATIONS) {
433
+ const salt = crypto.getRandomValues(new Uint8Array(PBKDF2_SALT_BYTES));
434
+ const iv = crypto.getRandomValues(new Uint8Array(PBKDF2_IV_BYTES));
435
+ const key = await deriveKeyFromPassphrase(passphrase, salt, iterations);
436
+ const ciphertext = new Uint8Array(await crypto.subtle.encrypt({
437
+ name: 'AES-GCM',
438
+ iv
439
+ }, key, plaintext));
440
+ const result = new Uint8Array(PBKDF2_SALT_BYTES + PBKDF2_IV_BYTES + ciphertext.length);
441
+ result.set(salt, 0);
442
+ result.set(iv, PBKDF2_SALT_BYTES);
443
+ result.set(ciphertext, PBKDF2_SALT_BYTES + PBKDF2_IV_BYTES);
444
+ return result;
445
+ }
446
+ /**
447
+ * Decrypts data produced by {@link encryptWithPassphrase}.
448
+ *
449
+ * @param data - The encrypted blob (salt + iv + ciphertext)
450
+ * @param passphrase - The passphrase used during encryption
451
+ * @param iterations - PBKDF2 iteration count (must match encryption)
452
+ * @returns The decrypted plaintext bytes
453
+ * @throws On wrong passphrase (AES-GCM auth tag mismatch)
454
+ */ export async function decryptWithPassphrase(data, passphrase, iterations = DEFAULT_PBKDF2_ITERATIONS) {
455
+ const salt = data.slice(0, PBKDF2_SALT_BYTES);
456
+ const iv = data.slice(PBKDF2_SALT_BYTES, PBKDF2_SALT_BYTES + PBKDF2_IV_BYTES);
457
+ const ciphertext = data.slice(PBKDF2_SALT_BYTES + PBKDF2_IV_BYTES);
458
+ const key = await deriveKeyFromPassphrase(passphrase, salt, iterations);
459
+ return new Uint8Array(await crypto.subtle.decrypt({
460
+ name: 'AES-GCM',
461
+ iv
462
+ }, key, ciphertext));
463
+ }
464
+ /**
465
+ * Converts a Uint8Array to a base64 string.
466
+ */ export function uint8ToBase64(bytes) {
467
+ let binary = '';
468
+ for (const b of bytes){
469
+ binary += String.fromCharCode(b);
470
+ }
471
+ return btoa(binary);
472
+ }
473
+ /**
474
+ * Converts a base64 string to a Uint8Array.
475
+ */ export function base64ToUint8(b64) {
476
+ const binary = atob(b64);
477
+ const bytes = new Uint8Array(binary.length);
478
+ for(let i = 0; i < binary.length; i++){
479
+ bytes[i] = binary.charCodeAt(i);
480
+ }
481
+ return bytes;
482
+ }
@@ -1,9 +1,6 @@
1
1
  import type { ChainInfo } from '@aztec/aztec.js/account';
2
2
  import { type Wallet } from '@aztec/aztec.js/wallet';
3
- /**
4
- * Callback type for wallet disconnect events.
5
- */
6
- export type DisconnectCallback = () => void;
3
+ import { type DisconnectCallback } from '../../types.js';
7
4
  /**
8
5
  * A wallet implementation that communicates with browser extension wallets
9
6
  * using an encrypted MessageChannel.
@@ -129,4 +126,4 @@ export declare class ExtensionWallet {
129
126
  */
130
127
  disconnect(): Promise<void>;
131
128
  }
132
- //# sourceMappingURL=data:application/json;base64,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
129
+ //# sourceMappingURL=data:application/json;base64,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
@@ -1 +1 @@
1
- {"version":3,"file":"extension_wallet.d.ts","sourceRoot":"","sources":["../../../src/extension/provider/extension_wallet.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,yBAAyB,CAAC;AACzD,OAAO,EAAE,KAAK,MAAM,EAAgB,MAAM,wBAAwB,CAAC;AAoBnE;;GAEG;AACH,MAAM,MAAM,kBAAkB,GAAG,MAAM,IAAI,CAAC;AAE5C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,qBAAa,eAAe;IAexB,OAAO,CAAC,SAAS;IACjB,OAAO,CAAC,KAAK;IACb,OAAO,CAAC,WAAW;IACnB,OAAO,CAAC,IAAI;IACZ,OAAO,CAAC,SAAS;IAlBnB,sEAAsE;IACtE,OAAO,CAAC,QAAQ,CAAoD;IACpE,OAAO,CAAC,YAAY,CAAS;IAC7B,OAAO,CAAC,mBAAmB,CAA4B;IAEvD;;;;;;;OAOG;IACH,OAAO,eAMH;IAEJ;;;;;;;;;;;;;;;;;;;;;;;;;OAyBG;IACH,MAAM,CAAC,MAAM,CACX,WAAW,EAAE,MAAM,EACnB,IAAI,EAAE,WAAW,EACjB,SAAS,EAAE,SAAS,EACpB,SAAS,EAAE,SAAS,EACpB,KAAK,EAAE,MAAM,GACZ,eAAe,CAkCjB;IAED,QAAQ,IAAI,MAAM,CAIjB;YAUa,uBAAuB;YA8CvB,WAAW;IA0BzB;;;;OAIG;IACH,OAAO,CAAC,gBAAgB;IA0BxB;;;;;;;;;;;;;;;OAeG;IACH,YAAY,CAAC,QAAQ,EAAE,kBAAkB,GAAG,MAAM,IAAI,CAQrD;IAED;;;;OAIG;IACH,cAAc,IAAI,OAAO,CAExB;IAED;;;;;;;;;;;;;OAaG;IAEG,UAAU,IAAI,OAAO,CAAC,IAAI,CAAC,CAahC;CACF"}
1
+ {"version":3,"file":"extension_wallet.d.ts","sourceRoot":"","sources":["../../../src/extension/provider/extension_wallet.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,yBAAyB,CAAC;AACzD,OAAO,EAAE,KAAK,MAAM,EAAgB,MAAM,wBAAwB,CAAC;AAOnE,OAAO,EAAE,KAAK,kBAAkB,EAA8D,MAAM,gBAAgB,CAAC;AAarH;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,qBAAa,eAAe;IAexB,OAAO,CAAC,SAAS;IACjB,OAAO,CAAC,KAAK;IACb,OAAO,CAAC,WAAW;IACnB,OAAO,CAAC,IAAI;IACZ,OAAO,CAAC,SAAS;IAlBnB,sEAAsE;IACtE,OAAO,CAAC,QAAQ,CAAoD;IACpE,OAAO,CAAC,YAAY,CAAS;IAC7B,OAAO,CAAC,mBAAmB,CAA4B;IAEvD;;;;;;;OAOG;IACH,OAAO,eAMH;IAEJ;;;;;;;;;;;;;;;;;;;;;;;;;OAyBG;IACH,MAAM,CAAC,MAAM,CACX,WAAW,EAAE,MAAM,EACnB,IAAI,EAAE,WAAW,EACjB,SAAS,EAAE,SAAS,EACpB,SAAS,EAAE,SAAS,EACpB,KAAK,EAAE,MAAM,GACZ,eAAe,CAkCjB;IAED,QAAQ,IAAI,MAAM,CAIjB;YAUa,uBAAuB;YA8CvB,WAAW;IA0BzB;;;;OAIG;IACH,OAAO,CAAC,gBAAgB;IA0BxB;;;;;;;;;;;;;;;OAeG;IACH,YAAY,CAAC,QAAQ,EAAE,kBAAkB,GAAG,MAAM,IAAI,CAQrD;IAED;;;;OAIG;IACH,cAAc,IAAI,OAAO,CAExB;IAED;;;;;;;;;;;;;OAaG;IAEG,UAAU,IAAI,OAAO,CAAC,IAAI,CAAC,CAahC;CACF"}
@@ -1,3 +1,3 @@
1
- export { ExtensionWallet, type DisconnectCallback } from './extension_wallet.js';
1
+ export { ExtensionWallet } from './extension_wallet.js';
2
2
  export { ExtensionProvider, type DiscoveredWallet, type ConnectedWallet, type DiscoveryOptions, } from './extension_provider.js';
3
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguZC50cyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9leHRlbnNpb24vcHJvdmlkZXIvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsT0FBTyxFQUFFLGVBQWUsRUFBRSxLQUFLLGtCQUFrQixFQUFFLE1BQU0sdUJBQXVCLENBQUM7QUFDakYsT0FBTyxFQUNMLGlCQUFpQixFQUNqQixLQUFLLGdCQUFnQixFQUNyQixLQUFLLGVBQWUsRUFDcEIsS0FBSyxnQkFBZ0IsR0FDdEIsTUFBTSx5QkFBeUIsQ0FBQyJ9
3
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguZC50cyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9leHRlbnNpb24vcHJvdmlkZXIvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsT0FBTyxFQUFFLGVBQWUsRUFBRSxNQUFNLHVCQUF1QixDQUFDO0FBQ3hELE9BQU8sRUFDTCxpQkFBaUIsRUFDakIsS0FBSyxnQkFBZ0IsRUFDckIsS0FBSyxlQUFlLEVBQ3BCLEtBQUssZ0JBQWdCLEdBQ3RCLE1BQU0seUJBQXlCLENBQUMifQ==
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/extension/provider/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,KAAK,kBAAkB,EAAE,MAAM,uBAAuB,CAAC;AACjF,OAAO,EACL,iBAAiB,EACjB,KAAK,gBAAgB,EACrB,KAAK,eAAe,EACpB,KAAK,gBAAgB,GACtB,MAAM,yBAAyB,CAAC"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/extension/provider/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,MAAM,uBAAuB,CAAC;AACxD,OAAO,EACL,iBAAiB,EACjB,KAAK,gBAAgB,EACrB,KAAK,eAAe,EACpB,KAAK,gBAAgB,GACtB,MAAM,yBAAyB,CAAC"}
@@ -0,0 +1,118 @@
1
+ /**
2
+ * IframeConnectionHandler — wallet-side of the cross-origin iframe protocol.
3
+ *
4
+ * This mirrors {@link BackgroundConnectionHandler} from `@aztec/wallet-sdk/extension/handlers`
5
+ * but uses `window.postMessage` instead of browser.runtime messaging.
6
+ *
7
+ * Message flow (wallet receives):
8
+ * parent → DISCOVERY → show approval UI → send DISCOVERY_RESPONSE
9
+ * parent → KEY_EXCHANGE_REQUEST → ECDH → send KEY_EXCHANGE_RESPONSE
10
+ * parent → SECURE_MESSAGE → decrypt → Wallet → encrypt → SECURE_RESPONSE
11
+ * parent → DISCONNECT → terminate session
12
+ *
13
+ * The wallet announces itself by posting WALLET_READY as soon as the handler starts,
14
+ * so the dApp knows it can send a discovery request.
15
+ */
16
+ import type { ChainInfo } from '@aztec/aztec.js/account';
17
+ import type { Wallet } from '@aztec/aztec.js/wallet';
18
+ /**
19
+ * A pending discovery request from a dApp (before user approval).
20
+ */
21
+ export interface PendingSession {
22
+ /** Unique request identifier */
23
+ requestId: string;
24
+ /** Application identifier */
25
+ appId: string;
26
+ /** Origin URL of the requesting page */
27
+ origin: string;
28
+ /** Approval status */
29
+ status: 'pending' | 'approved';
30
+ }
31
+ /**
32
+ * An active session (after key exchange).
33
+ */
34
+ export interface ActiveSession {
35
+ /** Session identifier (same as the discovery requestId) */
36
+ sessionId: string;
37
+ /** AES-256-GCM shared key for this session */
38
+ sharedKey: CryptoKey;
39
+ /** Verification hash for emoji display */
40
+ verificationHash: string;
41
+ /** Origin URL of the connected dApp */
42
+ origin: string;
43
+ /** Application identifier */
44
+ appId: string;
45
+ }
46
+ /**
47
+ * Configuration for the iframe connection handler.
48
+ */
49
+ export interface IframeConnectionConfig {
50
+ /** Unique wallet identifier */
51
+ walletId: string;
52
+ /** Display name for the wallet */
53
+ walletName: string;
54
+ /** Wallet version string */
55
+ walletVersion: string;
56
+ /** Optional wallet icon URL */
57
+ walletIcon?: string;
58
+ /** Origins allowed to connect. If empty or undefined, all origins are allowed (dev mode). */
59
+ allowedOrigins?: string[];
60
+ }
61
+ /**
62
+ * Event callbacks for the iframe connection handler.
63
+ */
64
+ export interface IframeConnectionCallbacks {
65
+ /** Called when a new discovery request arrives — wallet can show approval UI */
66
+ onPendingDiscovery?: (session: PendingSession) => void;
67
+ /** Called when a session is established (key exchange complete) */
68
+ onSessionEstablished?: (session: ActiveSession) => void;
69
+ /** Called when a session is terminated */
70
+ onSessionTerminated?: (sessionId: string) => void;
71
+ /** Called when a key exchange completes — show verificationHash as emojis to the user */
72
+ onVerificationHash?: (verificationHash: string) => void;
73
+ /**
74
+ * Resolves the Wallet instance to use for a given dApp and chain.
75
+ * Called when an encrypted message arrives and needs to be dispatched.
76
+ */
77
+ getWallet: (appId: string, chainInfo: ChainInfo) => Promise<Wallet>;
78
+ }
79
+ /**
80
+ * Handles the wallet side of the cross-origin iframe protocol.
81
+ *
82
+ * Manages the full lifecycle: discovery, ECDH key exchange, encrypted message
83
+ * dispatch to a {@link Wallet} instance, and session termination.
84
+ *
85
+ * @example
86
+ * ```typescript
87
+ * const handler = new IframeConnectionHandler(
88
+ * { walletId: 'my-wallet', walletName: 'My Wallet', walletVersion: '1.0.0' },
89
+ * {
90
+ * onPendingDiscovery: (session) => showApprovalUI(session),
91
+ * getWallet: (appId, chainInfo) => createWalletForApp(appId, chainInfo),
92
+ * },
93
+ * );
94
+ * handler.start();
95
+ * ```
96
+ */
97
+ export declare class IframeConnectionHandler {
98
+ private config;
99
+ private callbacks;
100
+ private pendingSessions;
101
+ private activeSessions;
102
+ private log;
103
+ constructor(config: IframeConnectionConfig, callbacks: IframeConnectionCallbacks);
104
+ start(): void;
105
+ stop(): void;
106
+ approveDiscovery(requestId: string): void;
107
+ rejectDiscovery(requestId: string): void;
108
+ terminateSession(sessionId: string): void;
109
+ getPendingSessions(): PendingSession[];
110
+ private handleMessage;
111
+ private handleMessageAsync;
112
+ private handleDiscoveryRequest;
113
+ private handleKeyExchangeRequest;
114
+ private handleSecureMessage;
115
+ private postToParent;
116
+ private postToOrigin;
117
+ }
118
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1 @@
1
+ {"version":3,"file":"iframe_connection_handler.d.ts","sourceRoot":"","sources":["../../../src/iframe/handlers/iframe_connection_handler.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;GAcG;AACH,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,yBAAyB,CAAC;AAEzD,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,wBAAwB,CAAC;AAgBrD;;GAEG;AACH,MAAM,WAAW,cAAc;IAC7B,gCAAgC;IAChC,SAAS,EAAE,MAAM,CAAC;IAClB,6BAA6B;IAC7B,KAAK,EAAE,MAAM,CAAC;IACd,wCAAwC;IACxC,MAAM,EAAE,MAAM,CAAC;IACf,sBAAsB;IACtB,MAAM,EAAE,SAAS,GAAG,UAAU,CAAC;CAChC;AAED;;GAEG;AACH,MAAM,WAAW,aAAa;IAC5B,2DAA2D;IAC3D,SAAS,EAAE,MAAM,CAAC;IAClB,8CAA8C;IAC9C,SAAS,EAAE,SAAS,CAAC;IACrB,0CAA0C;IAC1C,gBAAgB,EAAE,MAAM,CAAC;IACzB,uCAAuC;IACvC,MAAM,EAAE,MAAM,CAAC;IACf,6BAA6B;IAC7B,KAAK,EAAE,MAAM,CAAC;CACf;AAED;;GAEG;AACH,MAAM,WAAW,sBAAsB;IACrC,+BAA+B;IAC/B,QAAQ,EAAE,MAAM,CAAC;IACjB,kCAAkC;IAClC,UAAU,EAAE,MAAM,CAAC;IACnB,4BAA4B;IAC5B,aAAa,EAAE,MAAM,CAAC;IACtB,+BAA+B;IAC/B,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,6FAA6F;IAC7F,cAAc,CAAC,EAAE,MAAM,EAAE,CAAC;CAC3B;AAED;;GAEG;AACH,MAAM,WAAW,yBAAyB;IACxC,kFAAgF;IAChF,kBAAkB,CAAC,EAAE,CAAC,OAAO,EAAE,cAAc,KAAK,IAAI,CAAC;IACvD,mEAAmE;IACnE,oBAAoB,CAAC,EAAE,CAAC,OAAO,EAAE,aAAa,KAAK,IAAI,CAAC;IACxD,0CAA0C;IAC1C,mBAAmB,CAAC,EAAE,CAAC,SAAS,EAAE,MAAM,KAAK,IAAI,CAAC;IAClD,2FAAyF;IACzF,kBAAkB,CAAC,EAAE,CAAC,gBAAgB,EAAE,MAAM,KAAK,IAAI,CAAC;IACxD;;;OAGG;IACH,SAAS,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,SAAS,EAAE,SAAS,KAAK,OAAO,CAAC,MAAM,CAAC,CAAC;CACrE;AAED;;;;;;;;;;;;;;;;;GAiBG;AACH,qBAAa,uBAAuB;IAMhC,OAAO,CAAC,MAAM;IACd,OAAO,CAAC,SAAS;IANnB,OAAO,CAAC,eAAe,CAAqC;IAC5D,OAAO,CAAC,cAAc,CAAoC;IAC1D,OAAO,CAAC,GAAG,CAAyC;IAEpD,YACU,MAAM,EAAE,sBAAsB,EAC9B,SAAS,EAAE,yBAAyB,EAC1C;IAEJ,KAAK,IAAI,IAAI,CAIZ;IAED,IAAI,IAAI,IAAI,CAEX;IAED,gBAAgB,CAAC,SAAS,EAAE,MAAM,GAAG,IAAI,CAkBxC;IAED,eAAe,CAAC,SAAS,EAAE,MAAM,GAAG,IAAI,CAEvC;IAED,gBAAgB,CAAC,SAAS,EAAE,MAAM,GAAG,IAAI,CAUxC;IAED,kBAAkB,IAAI,cAAc,EAAE,CAErC;IAED,OAAO,CAAC,aAAa,CAEnB;YAEY,kBAAkB;IA4BhC,OAAO,CAAC,sBAAsB;YAShB,wBAAwB;YA6CxB,mBAAmB;IAsDjC,OAAO,CAAC,YAAY;IAMpB,OAAO,CAAC,YAAY;CAKrB"}
@@ -0,0 +1,228 @@
1
+ /**
2
+ * IframeConnectionHandler — wallet-side of the cross-origin iframe protocol.
3
+ *
4
+ * This mirrors {@link BackgroundConnectionHandler} from `@aztec/wallet-sdk/extension/handlers`
5
+ * but uses `window.postMessage` instead of browser.runtime messaging.
6
+ *
7
+ * Message flow (wallet receives):
8
+ * parent → DISCOVERY → show approval UI → send DISCOVERY_RESPONSE
9
+ * parent → KEY_EXCHANGE_REQUEST → ECDH → send KEY_EXCHANGE_RESPONSE
10
+ * parent → SECURE_MESSAGE → decrypt → Wallet → encrypt → SECURE_RESPONSE
11
+ * parent → DISCONNECT → terminate session
12
+ *
13
+ * The wallet announces itself by posting WALLET_READY as soon as the handler starts,
14
+ * so the dApp knows it can send a discovery request.
15
+ */ import { createLogger } from '@aztec/aztec.js/log';
16
+ import { WalletSchema } from '@aztec/aztec.js/wallet';
17
+ import { jsonStringify } from '@aztec/foundation/json-rpc';
18
+ import { parseWithOptionals, schemaHasMethod } from '@aztec/foundation/schemas';
19
+ import { decrypt, deriveSessionKeys, encrypt, exportPublicKey, generateKeyPair, importPublicKey } from '../../crypto.js';
20
+ import { WalletMessageType } from '../../types.js';
21
+ /**
22
+ * Handles the wallet side of the cross-origin iframe protocol.
23
+ *
24
+ * Manages the full lifecycle: discovery, ECDH key exchange, encrypted message
25
+ * dispatch to a {@link Wallet} instance, and session termination.
26
+ *
27
+ * @example
28
+ * ```typescript
29
+ * const handler = new IframeConnectionHandler(
30
+ * { walletId: 'my-wallet', walletName: 'My Wallet', walletVersion: '1.0.0' },
31
+ * {
32
+ * onPendingDiscovery: (session) => showApprovalUI(session),
33
+ * getWallet: (appId, chainInfo) => createWalletForApp(appId, chainInfo),
34
+ * },
35
+ * );
36
+ * handler.start();
37
+ * ```
38
+ */ export class IframeConnectionHandler {
39
+ config;
40
+ callbacks;
41
+ pendingSessions;
42
+ activeSessions;
43
+ log;
44
+ constructor(config, callbacks){
45
+ this.config = config;
46
+ this.callbacks = callbacks;
47
+ this.pendingSessions = new Map();
48
+ this.activeSessions = new Map();
49
+ this.log = createLogger('wallet:iframe-handler');
50
+ this.handleMessage = (event)=>{
51
+ void this.handleMessageAsync(event);
52
+ };
53
+ }
54
+ start() {
55
+ window.addEventListener('message', this.handleMessage);
56
+ this.postToParent({
57
+ type: WalletMessageType.WALLET_READY
58
+ });
59
+ this.log.info('IframeConnectionHandler started, posted WALLET_READY');
60
+ }
61
+ stop() {
62
+ window.removeEventListener('message', this.handleMessage);
63
+ }
64
+ approveDiscovery(requestId) {
65
+ const pending = this.pendingSessions.get(requestId);
66
+ if (!pending || pending.status !== 'pending') {
67
+ return;
68
+ }
69
+ pending.status = 'approved';
70
+ this.postToOrigin(pending.origin, {
71
+ type: WalletMessageType.DISCOVERY_RESPONSE,
72
+ requestId,
73
+ walletInfo: {
74
+ id: this.config.walletId,
75
+ name: this.config.walletName,
76
+ version: this.config.walletVersion,
77
+ icon: this.config.walletIcon
78
+ }
79
+ });
80
+ this.log.info(`Discovery approved for requestId=${requestId}`);
81
+ }
82
+ rejectDiscovery(requestId) {
83
+ this.pendingSessions.delete(requestId);
84
+ }
85
+ terminateSession(sessionId) {
86
+ const session = this.activeSessions.get(sessionId);
87
+ if (session) {
88
+ this.postToOrigin(session.origin, {
89
+ type: WalletMessageType.SESSION_DISCONNECTED,
90
+ sessionId
91
+ });
92
+ this.activeSessions.delete(sessionId);
93
+ this.callbacks.onSessionTerminated?.(sessionId);
94
+ }
95
+ }
96
+ getPendingSessions() {
97
+ return Array.from(this.pendingSessions.values()).filter((s)=>s.status === 'pending');
98
+ }
99
+ handleMessage;
100
+ async handleMessageAsync(event) {
101
+ if (this.config.allowedOrigins && this.config.allowedOrigins.length > 0) {
102
+ if (!this.config.allowedOrigins.includes(event.origin)) {
103
+ return;
104
+ }
105
+ }
106
+ const msg = event.data;
107
+ if (!msg || typeof msg !== 'object' || !msg.type) {
108
+ return;
109
+ }
110
+ switch(msg.type){
111
+ case WalletMessageType.DISCOVERY:
112
+ this.handleDiscoveryRequest(msg, event.origin);
113
+ break;
114
+ case WalletMessageType.KEY_EXCHANGE_REQUEST:
115
+ await this.handleKeyExchangeRequest(msg, event.origin);
116
+ break;
117
+ case WalletMessageType.SECURE_MESSAGE:
118
+ await this.handleSecureMessage(msg);
119
+ break;
120
+ case WalletMessageType.DISCONNECT:
121
+ this.terminateSession(msg.sessionId);
122
+ break;
123
+ }
124
+ }
125
+ handleDiscoveryRequest(msg, origin) {
126
+ // eslint-disable-next-line jsdoc/require-jsdoc
127
+ const { requestId, appId } = msg;
128
+ const pending = {
129
+ requestId,
130
+ appId,
131
+ origin,
132
+ status: 'pending'
133
+ };
134
+ this.pendingSessions.set(requestId, pending);
135
+ this.log.info(`Discovery request from appId=${appId} origin=${origin}`);
136
+ this.callbacks.onPendingDiscovery?.(pending);
137
+ }
138
+ async handleKeyExchangeRequest(msg, origin) {
139
+ const { requestId, publicKey: appPublicKeyRaw } = msg;
140
+ const pending = this.pendingSessions.get(requestId);
141
+ if (!pending || pending.status !== 'approved') {
142
+ this.log.warn(`Key exchange for unknown/unapproved requestId=${requestId}`);
143
+ return;
144
+ }
145
+ try {
146
+ const keyPair = await generateKeyPair();
147
+ const walletPublicKey = await exportPublicKey(keyPair.publicKey);
148
+ const appPublicKey = await importPublicKey(appPublicKeyRaw);
149
+ const sessionKeys = await deriveSessionKeys(keyPair, appPublicKey, false);
150
+ const session = {
151
+ sessionId: requestId,
152
+ sharedKey: sessionKeys.encryptionKey,
153
+ verificationHash: sessionKeys.verificationHash,
154
+ origin: pending.origin,
155
+ appId: pending.appId
156
+ };
157
+ this.activeSessions.set(requestId, session);
158
+ this.pendingSessions.delete(requestId);
159
+ this.postToOrigin(origin, {
160
+ type: WalletMessageType.KEY_EXCHANGE_RESPONSE,
161
+ requestId,
162
+ publicKey: walletPublicKey,
163
+ verificationHash: sessionKeys.verificationHash
164
+ });
165
+ this.callbacks.onVerificationHash?.(sessionKeys.verificationHash);
166
+ this.callbacks.onSessionEstablished?.(session);
167
+ this.log.info(`Key exchange complete, sessionId=${requestId}`);
168
+ } catch (err) {
169
+ this.log.error(`Key exchange failed: ${err}`);
170
+ }
171
+ }
172
+ async handleSecureMessage(msg) {
173
+ // eslint-disable-next-line jsdoc/require-jsdoc
174
+ const { sessionId, encrypted } = msg;
175
+ const session = this.activeSessions.get(sessionId);
176
+ if (!session) {
177
+ return;
178
+ }
179
+ let walletMessage;
180
+ try {
181
+ walletMessage = await decrypt(session.sharedKey, encrypted);
182
+ } catch {
183
+ this.log.warn(`Decryption failed for sessionId=${sessionId}`);
184
+ return;
185
+ }
186
+ const { messageId, type, args, chainInfo, appId } = walletMessage;
187
+ let result;
188
+ let error;
189
+ try {
190
+ const wallet = await this.callbacks.getWallet(appId, chainInfo);
191
+ if (!schemaHasMethod(WalletSchema, type)) {
192
+ throw new Error(`Unknown wallet method: ${type}`);
193
+ }
194
+ // Zod's AnyZodTuple rejects optional tuple items typed as `T | undefined`
195
+ const sanitizedArgs = await parseWithOptionals(args, WalletSchema[type].parameters());
196
+ result = await wallet[type](...sanitizedArgs);
197
+ } catch (err) {
198
+ error = err instanceof Error ? err.message : String(err);
199
+ this.log.error(`Error handling ${type}: ${error}`);
200
+ }
201
+ const response = {
202
+ messageId,
203
+ walletId: this.config.walletId,
204
+ result,
205
+ error
206
+ };
207
+ try {
208
+ const encryptedResponse = await encrypt(session.sharedKey, jsonStringify(response));
209
+ this.postToOrigin(session.origin, {
210
+ type: WalletMessageType.SECURE_RESPONSE,
211
+ sessionId,
212
+ encrypted: encryptedResponse
213
+ });
214
+ } catch (err) {
215
+ this.log.error(`Encryption of response failed: ${err}`);
216
+ }
217
+ }
218
+ postToParent(msg) {
219
+ if (window.parent !== window) {
220
+ window.parent.postMessage(msg, '*');
221
+ }
222
+ }
223
+ postToOrigin(origin, msg) {
224
+ if (window.parent !== window) {
225
+ window.parent.postMessage(msg, origin);
226
+ }
227
+ }
228
+ }
@@ -0,0 +1,2 @@
1
+ export { IframeConnectionHandler, type IframeConnectionConfig, type IframeConnectionCallbacks, type PendingSession, type ActiveSession, } from './iframe_connection_handler.js';
2
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguZC50cyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9pZnJhbWUvaGFuZGxlcnMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsT0FBTyxFQUNMLHVCQUF1QixFQUN2QixLQUFLLHNCQUFzQixFQUMzQixLQUFLLHlCQUF5QixFQUM5QixLQUFLLGNBQWMsRUFDbkIsS0FBSyxhQUFhLEdBQ25CLE1BQU0sZ0NBQWdDLENBQUMifQ==
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/iframe/handlers/index.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,uBAAuB,EACvB,KAAK,sBAAsB,EAC3B,KAAK,yBAAyB,EAC9B,KAAK,cAAc,EACnB,KAAK,aAAa,GACnB,MAAM,gCAAgC,CAAC"}
@@ -0,0 +1 @@
1
+ export { IframeConnectionHandler } from './iframe_connection_handler.js';
@@ -0,0 +1,25 @@
1
+ /**
2
+ * Web wallet discovery — creates {@link IframeWalletProvider} instances from a list of URLs.
3
+ *
4
+ * For each configured URL we probe the wallet by loading a tiny invisible iframe,
5
+ * waiting for WALLET_READY, then sending a DISCOVERY request. On a successful
6
+ * DISCOVERY_RESPONSE we emit an IframeWalletProvider to the caller.
7
+ *
8
+ * This is intentionally lightweight (no key exchange yet) — key exchange happens
9
+ * later when the user selects the wallet and calls `provider.establishSecureChannel()`.
10
+ */
11
+ import type { ChainInfo } from '@aztec/aztec.js/account';
12
+ import type { DiscoverySession } from '../../manager/types.js';
13
+ /**
14
+ * Probes a list of web wallet URLs and returns a {@link DiscoverySession} compatible
15
+ * with WalletManager's `getAvailableWallets()` interface.
16
+ *
17
+ * Discovered {@link IframeWalletProvider} instances are yielded asynchronously as each
18
+ * wallet responds to the probe.
19
+ *
20
+ * @param walletUrls - URLs of web wallets to probe
21
+ * @param chainInfo - Network information to pass during discovery
22
+ * @returns A cancellable discovery session
23
+ */
24
+ export declare function discoverWebWallets(walletUrls: string[], chainInfo: ChainInfo): DiscoverySession;
25
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaWZyYW1lX2Rpc2NvdmVyeS5kLnRzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vc3JjL2lmcmFtZS9wcm92aWRlci9pZnJhbWVfZGlzY292ZXJ5LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBOzs7Ozs7Ozs7R0FTRztBQUNILE9BQU8sS0FBSyxFQUFFLFNBQVMsRUFBRSxNQUFNLHlCQUF5QixDQUFDO0FBR3pELE9BQU8sS0FBSyxFQUFFLGdCQUFnQixFQUFrQixNQUFNLHdCQUF3QixDQUFDO0FBTS9FOzs7Ozs7Ozs7O0dBVUc7QUFDSCx3QkFBZ0Isa0JBQWtCLENBQUMsVUFBVSxFQUFFLE1BQU0sRUFBRSxFQUFFLFNBQVMsRUFBRSxTQUFTLEdBQUcsZ0JBQWdCLENBdUYvRiJ9
@@ -0,0 +1 @@
1
+ {"version":3,"file":"iframe_discovery.d.ts","sourceRoot":"","sources":["../../../src/iframe/provider/iframe_discovery.ts"],"names":[],"mappings":"AAAA;;;;;;;;;GASG;AACH,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,yBAAyB,CAAC;AAGzD,OAAO,KAAK,EAAE,gBAAgB,EAAkB,MAAM,wBAAwB,CAAC;AAM/E;;;;;;;;;;GAUG;AACH,wBAAgB,kBAAkB,CAAC,UAAU,EAAE,MAAM,EAAE,EAAE,SAAS,EAAE,SAAS,GAAG,gBAAgB,CAuF/F"}