@canton-network/core-signing-fireblocks 0.9.0 → 0.11.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/fireblocks.d.ts.map +1 -1
- package/dist/index.cjs +458 -0
- package/dist/index.cjs.map +1 -0
- package/dist/index.js +443 -155
- package/dist/index.js.map +1 -0
- package/package.json +17 -6
- package/dist/fireblocks.js +0 -288
- package/dist/fireblocks.test.d.ts +0 -2
- package/dist/fireblocks.test.d.ts.map +0 -1
- package/dist/fireblocks.test.js +0 -54
- package/dist/index.test.d.ts +0 -3
- package/dist/index.test.d.ts.map +0 -1
- package/dist/index.test.js +0 -190
package/dist/fireblocks.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"fireblocks.d.ts","sourceRoot":"","sources":["../src/fireblocks.ts"],"names":[],"mappings":"AAGA,OAAO,EAEH,iCAAiC,EAGpC,MAAM,oBAAoB,CAAA;AAE3B,OAAO,EAAE,aAAa,EAAgB,MAAM,kCAAkC,CAAA;AAiB9E,UAAU,aAAa;IACnB,IAAI,EAAE,MAAM,CAAA;IACZ,SAAS,EAAE,MAAM,CAAA;IACjB,cAAc,EAAE,MAAM,EAAE,CAAA;IACxB,SAAS,EAAE,iCAAiC,CAAA;CAC/C;AAED,MAAM,WAAW,qBAAqB;IAClC,IAAI,EAAE,MAAM,CAAA;IACZ,MAAM,EAAE,aAAa,CAAA;IACrB,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,SAAS,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAC9B,SAAS,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAC9B,cAAc,EAAE,MAAM,EAAE,CAAA;CAC3B;AAED,MAAM,WAAW,oBAAoB;IACjC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CACpB;AAID,qBAAa,iBAAiB;IAC1B,OAAO,CAAC,aAAa,CAAoC;IACzD,OAAO,CAAC,OAAO,CAAqC;IAEpD,OAAO,CAAC,kBAAkB,CAAwC;IAClE,OAAO,CAAC,yBAAyB,CAAiC;IAElE,OAAO,CAAC,SAAS,CAQhB;gBAGG,UAAU,EAAE,oBAAoB,GAAG,SAAS,EAC5C,QAAQ,EAAE,GAAG,CAAC,MAAM,EAAE,oBAAoB,CAAC,EAC3C,OAAO,GAAE,MAAuC;IAmBpD;;;;OAIG;IACU,aAAa,CACtB,MAAM,EAAE,MAAM,GAAG,SAAS,GAC3B,OAAO,CAAC,aAAa,EAAE,CAAC;IA+C3B;;;;;OAKG;YACW,iBAAiB;
|
|
1
|
+
{"version":3,"file":"fireblocks.d.ts","sourceRoot":"","sources":["../src/fireblocks.ts"],"names":[],"mappings":"AAGA,OAAO,EAEH,iCAAiC,EAGpC,MAAM,oBAAoB,CAAA;AAE3B,OAAO,EAAE,aAAa,EAAgB,MAAM,kCAAkC,CAAA;AAiB9E,UAAU,aAAa;IACnB,IAAI,EAAE,MAAM,CAAA;IACZ,SAAS,EAAE,MAAM,CAAA;IACjB,cAAc,EAAE,MAAM,EAAE,CAAA;IACxB,SAAS,EAAE,iCAAiC,CAAA;CAC/C;AAED,MAAM,WAAW,qBAAqB;IAClC,IAAI,EAAE,MAAM,CAAA;IACZ,MAAM,EAAE,aAAa,CAAA;IACrB,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,SAAS,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAC9B,SAAS,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAC9B,cAAc,EAAE,MAAM,EAAE,CAAA;CAC3B;AAED,MAAM,WAAW,oBAAoB;IACjC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CACpB;AAID,qBAAa,iBAAiB;IAC1B,OAAO,CAAC,aAAa,CAAoC;IACzD,OAAO,CAAC,OAAO,CAAqC;IAEpD,OAAO,CAAC,kBAAkB,CAAwC;IAClE,OAAO,CAAC,yBAAyB,CAAiC;IAElE,OAAO,CAAC,SAAS,CAQhB;gBAGG,UAAU,EAAE,oBAAoB,GAAG,SAAS,EAC5C,QAAQ,EAAE,GAAG,CAAC,MAAM,EAAE,oBAAoB,CAAC,EAC3C,OAAO,GAAE,MAAuC;IAmBpD;;;;OAIG;IACU,aAAa,CACtB,MAAM,EAAE,MAAM,GAAG,SAAS,GAC3B,OAAO,CAAC,aAAa,EAAE,CAAC;IA+C3B;;;;;OAKG;YACW,iBAAiB;IAqD/B;;;OAGG;YACW,eAAe;IA+B7B;;;OAGG;IACU,cAAc,CACvB,MAAM,EAAE,MAAM,GAAG,SAAS,EAC1B,IAAI,EAAE,MAAM,GACb,OAAO,CAAC,qBAAqB,GAAG,SAAS,CAAC;IAa7C;;;;;OAKG;IACW,eAAe,CACzB,MAAM,EAAE,MAAM,GAAG,SAAS,EAC1B,EACI,KAAW,EACX,MAAM,GACT,GAAE;QACC,KAAK,CAAC,EAAE,MAAM,CAAA;QACd,MAAM,CAAC,EAAE,MAAM,CAAA;KACb,GACP,cAAc,CAAC,qBAAqB,CAAC;IAmCxC;;;;;;OAMG;IACU,eAAe,CACxB,MAAM,EAAE,MAAM,GAAG,SAAS,EAC1B,EAAE,EAAE,MAAM,EACV,SAAS,EAAE,MAAM,EACjB,YAAY,CAAC,EAAE,MAAM,GACtB,OAAO,CAAC,qBAAqB,CAAC;CAwDpC"}
|
package/dist/index.cjs
ADDED
|
@@ -0,0 +1,458 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
var coreSigningLib = require('@canton-network/core-signing-lib');
|
|
4
|
+
var tsSdk = require('@fireblocks/ts-sdk');
|
|
5
|
+
var pino = require('pino');
|
|
6
|
+
var zod = require('zod');
|
|
7
|
+
var _ = require('lodash');
|
|
8
|
+
|
|
9
|
+
function _interopDefault (e) { return e && e.__esModule ? e : { default: e }; }
|
|
10
|
+
|
|
11
|
+
var ___default = /*#__PURE__*/_interopDefault(_);
|
|
12
|
+
|
|
13
|
+
var __defProp = Object.defineProperty;
|
|
14
|
+
var __defNormalProp = (obj, key, value) => key in obj ? __defProp(obj, key, { enumerable: true, configurable: true, writable: true, value }) : obj[key] = value;
|
|
15
|
+
var __publicField = (obj, key, value) => __defNormalProp(obj, typeof key !== "symbol" ? key + "" : key, value);
|
|
16
|
+
var RawMessageSchema = zod.z.object({
|
|
17
|
+
content: zod.z.string(),
|
|
18
|
+
derivationPath: zod.z.array(zod.z.number())
|
|
19
|
+
});
|
|
20
|
+
var RawMessageDataSchema = zod.z.object({
|
|
21
|
+
messages: zod.z.array(RawMessageSchema),
|
|
22
|
+
algorithm: zod.z.string()
|
|
23
|
+
});
|
|
24
|
+
var RawMessageExtraParametersSchema = zod.z.object({
|
|
25
|
+
rawMessageData: RawMessageDataSchema
|
|
26
|
+
});
|
|
27
|
+
var logger = pino.pino({ name: "main", level: "debug" });
|
|
28
|
+
var FireblocksHandler = class {
|
|
29
|
+
constructor(defaultKey, userKeys, apiPath = "https://api.fireblocks.io/v1") {
|
|
30
|
+
__publicField(this, "defaultClient");
|
|
31
|
+
__publicField(this, "clients", /* @__PURE__ */ new Map());
|
|
32
|
+
__publicField(this, "keyInfoByPublicKey", /* @__PURE__ */ new Map());
|
|
33
|
+
__publicField(this, "publicKeyByDerivationPath", /* @__PURE__ */ new Map());
|
|
34
|
+
__publicField(this, "getClient", (userId) => {
|
|
35
|
+
if (userId !== void 0 && this.clients.has(userId)) {
|
|
36
|
+
return this.clients.get(userId);
|
|
37
|
+
} else if (this.defaultClient) {
|
|
38
|
+
return this.defaultClient;
|
|
39
|
+
} else {
|
|
40
|
+
throw new Error("No Fireblocks client available for this user.");
|
|
41
|
+
}
|
|
42
|
+
});
|
|
43
|
+
if (defaultKey) {
|
|
44
|
+
this.defaultClient = new tsSdk.Fireblocks({
|
|
45
|
+
apiKey: defaultKey.apiKey,
|
|
46
|
+
basePath: apiPath,
|
|
47
|
+
secretKey: defaultKey.apiSecret
|
|
48
|
+
});
|
|
49
|
+
}
|
|
50
|
+
userKeys.forEach((keyInfo, userId) => {
|
|
51
|
+
const client = new tsSdk.Fireblocks({
|
|
52
|
+
apiKey: keyInfo.apiKey,
|
|
53
|
+
basePath: apiPath,
|
|
54
|
+
secretKey: keyInfo.apiSecret
|
|
55
|
+
});
|
|
56
|
+
this.clients.set(userId, client);
|
|
57
|
+
});
|
|
58
|
+
}
|
|
59
|
+
/**
|
|
60
|
+
* Get all public keys which correspond to Fireblocks vault accounts. This will
|
|
61
|
+
* also refresh the key cache.
|
|
62
|
+
* @returns List of Fireblocks public key information
|
|
63
|
+
*/
|
|
64
|
+
async getPublicKeys(userId) {
|
|
65
|
+
const keys = [];
|
|
66
|
+
try {
|
|
67
|
+
const client = this.getClient(userId);
|
|
68
|
+
const vaultAccounts = [];
|
|
69
|
+
let after = void 0;
|
|
70
|
+
do {
|
|
71
|
+
const resp = await client.vaults.getPagedVaultAccounts(
|
|
72
|
+
after ? { after } : {}
|
|
73
|
+
);
|
|
74
|
+
after = resp.data.paging?.after;
|
|
75
|
+
vaultAccounts.push(...resp.data.accounts || []);
|
|
76
|
+
} while (after !== void 0);
|
|
77
|
+
for (const vault of vaultAccounts) {
|
|
78
|
+
if (vault.id) {
|
|
79
|
+
const derivationPath = [
|
|
80
|
+
44,
|
|
81
|
+
coreSigningLib.CC_COIN_TYPE,
|
|
82
|
+
Number(vault.id) || 0,
|
|
83
|
+
0,
|
|
84
|
+
0
|
|
85
|
+
];
|
|
86
|
+
const publicKey = await this.lookupPublicKey(
|
|
87
|
+
userId,
|
|
88
|
+
derivationPath
|
|
89
|
+
);
|
|
90
|
+
const storedKey = {
|
|
91
|
+
derivationPath,
|
|
92
|
+
publicKey,
|
|
93
|
+
name: vault.name || vault.id,
|
|
94
|
+
algorithm: tsSdk.PublicKeyInformationAlgorithmEnum.EddsaEd25519
|
|
95
|
+
};
|
|
96
|
+
keys.push(storedKey);
|
|
97
|
+
this.keyInfoByPublicKey.set(storedKey.publicKey, storedKey);
|
|
98
|
+
}
|
|
99
|
+
}
|
|
100
|
+
} catch (error) {
|
|
101
|
+
logger.error(error, "Error fetching vault accounts:");
|
|
102
|
+
throw error;
|
|
103
|
+
}
|
|
104
|
+
return keys;
|
|
105
|
+
}
|
|
106
|
+
/**
|
|
107
|
+
* Takes a Fireblocks response from a transactions call and extracts the transaction information
|
|
108
|
+
* relevant to the Wallet Gateway. This will potentially fetch the public key since unsigned transactions
|
|
109
|
+
* do not include it
|
|
110
|
+
* @returns FireblocksTransaction
|
|
111
|
+
*/
|
|
112
|
+
async formatTransaction(userId, tx) {
|
|
113
|
+
if (tx.signedMessages && tx.signedMessages.length > 0) {
|
|
114
|
+
const signedMessage = tx.signedMessages[0];
|
|
115
|
+
if (!signedMessage.publicKey || !signedMessage.content || !signedMessage.signature) {
|
|
116
|
+
return void 0;
|
|
117
|
+
}
|
|
118
|
+
return {
|
|
119
|
+
txId: tx.id,
|
|
120
|
+
status: "signed",
|
|
121
|
+
createdAt: tx.createdAt,
|
|
122
|
+
publicKey: signedMessage.publicKey,
|
|
123
|
+
signature: signedMessage.signature.fullSig,
|
|
124
|
+
derivationPath: signedMessage.derivationPath
|
|
125
|
+
};
|
|
126
|
+
} else {
|
|
127
|
+
const rawMessageData = RawMessageExtraParametersSchema.safeParse(
|
|
128
|
+
tx.extraParameters
|
|
129
|
+
);
|
|
130
|
+
if (!rawMessageData.success) {
|
|
131
|
+
return void 0;
|
|
132
|
+
}
|
|
133
|
+
const message = rawMessageData.data.rawMessageData.messages[0];
|
|
134
|
+
const publicKey = await this.lookupPublicKey(
|
|
135
|
+
userId,
|
|
136
|
+
message.derivationPath
|
|
137
|
+
);
|
|
138
|
+
const status = tx.status === "REJECTED" || tx.status === "BLOCKED" || tx.status === "CANCELLED" ? "rejected" : tx.status === "FAILED" ? "failed" : "pending";
|
|
139
|
+
return {
|
|
140
|
+
txId: tx.id,
|
|
141
|
+
status,
|
|
142
|
+
createdAt: tx.createdAt,
|
|
143
|
+
publicKey,
|
|
144
|
+
derivationPath: message.derivationPath
|
|
145
|
+
};
|
|
146
|
+
}
|
|
147
|
+
}
|
|
148
|
+
/**
|
|
149
|
+
* Looks up or fetches the public key (only) for a given derivation path
|
|
150
|
+
* @returns The public key as a string
|
|
151
|
+
*/
|
|
152
|
+
async lookupPublicKey(userId, derivationPath) {
|
|
153
|
+
const derivationPathString = JSON.stringify(derivationPath);
|
|
154
|
+
if (this.publicKeyByDerivationPath.has(derivationPathString)) {
|
|
155
|
+
return this.publicKeyByDerivationPath.get(derivationPathString);
|
|
156
|
+
} else {
|
|
157
|
+
try {
|
|
158
|
+
const client = this.getClient(userId);
|
|
159
|
+
const key = await client.vaults.getPublicKeyInfo({
|
|
160
|
+
algorithm: tsSdk.PublicKeyInformationAlgorithmEnum.EddsaEd25519,
|
|
161
|
+
derivationPath: derivationPathString
|
|
162
|
+
});
|
|
163
|
+
if (key.data.publicKey) {
|
|
164
|
+
this.publicKeyByDerivationPath.set(
|
|
165
|
+
derivationPathString,
|
|
166
|
+
key.data.publicKey
|
|
167
|
+
);
|
|
168
|
+
return key.data.publicKey;
|
|
169
|
+
} else {
|
|
170
|
+
throw new Error(
|
|
171
|
+
"Malformed public key response from Fireblocks"
|
|
172
|
+
);
|
|
173
|
+
}
|
|
174
|
+
} catch (error) {
|
|
175
|
+
throw new Error(`Error looking up public key: ${error}`);
|
|
176
|
+
}
|
|
177
|
+
}
|
|
178
|
+
}
|
|
179
|
+
/**
|
|
180
|
+
* Fetch a single RAW transaction from Fireblocks by its transaction ID
|
|
181
|
+
* @returns FireblocksTransaction or undefined if not found
|
|
182
|
+
*/
|
|
183
|
+
async getTransaction(userId, txId) {
|
|
184
|
+
try {
|
|
185
|
+
const client = this.getClient(userId);
|
|
186
|
+
const transaction = await client.transactions.getTransaction({
|
|
187
|
+
txId
|
|
188
|
+
});
|
|
189
|
+
return await this.formatTransaction(userId, transaction.data);
|
|
190
|
+
} catch {
|
|
191
|
+
return void 0;
|
|
192
|
+
}
|
|
193
|
+
}
|
|
194
|
+
/**
|
|
195
|
+
* Get all RAW transactions from Fireblocks. Returns an async generator as
|
|
196
|
+
* this may return a large number of transactions and will occasionally need to
|
|
197
|
+
* refresh the key cache.
|
|
198
|
+
* @returns AsyncGenerator of FireblocksTransactions
|
|
199
|
+
*/
|
|
200
|
+
async *getTransactions(userId, {
|
|
201
|
+
limit = 200,
|
|
202
|
+
before
|
|
203
|
+
} = {}) {
|
|
204
|
+
let fetchedLength = 0;
|
|
205
|
+
let beforeQuery = before;
|
|
206
|
+
try {
|
|
207
|
+
const client = this.getClient(userId);
|
|
208
|
+
do {
|
|
209
|
+
const transactions = await client.transactions.getTransactions({
|
|
210
|
+
sourceType: "VAULT_ACCOUNT",
|
|
211
|
+
limit,
|
|
212
|
+
...beforeQuery ? { before: beforeQuery.toString() } : {}
|
|
213
|
+
});
|
|
214
|
+
fetchedLength = transactions.data.length;
|
|
215
|
+
for (const tx of transactions.data) {
|
|
216
|
+
beforeQuery = tx.createdAt - 1;
|
|
217
|
+
const formatTransaction = await this.formatTransaction(
|
|
218
|
+
userId,
|
|
219
|
+
tx
|
|
220
|
+
);
|
|
221
|
+
if (formatTransaction) {
|
|
222
|
+
yield formatTransaction;
|
|
223
|
+
} else {
|
|
224
|
+
continue;
|
|
225
|
+
}
|
|
226
|
+
}
|
|
227
|
+
} while (fetchedLength > 0);
|
|
228
|
+
} catch (error) {
|
|
229
|
+
logger.error(error, "Error fetching signatures");
|
|
230
|
+
throw error;
|
|
231
|
+
}
|
|
232
|
+
}
|
|
233
|
+
/**
|
|
234
|
+
* Sign a transaction using a public key
|
|
235
|
+
* @param tx - The transaction to sign, as a string
|
|
236
|
+
* @param publicKey - The public key to use for signing
|
|
237
|
+
* @param externalTxId - The transaction ID assigned by the Wallet Gateway
|
|
238
|
+
* @return The transaction object from Fireblocks
|
|
239
|
+
*/
|
|
240
|
+
async signTransaction(userId, tx, publicKey, externalTxId) {
|
|
241
|
+
try {
|
|
242
|
+
const client = this.getClient(userId);
|
|
243
|
+
if (!this.keyInfoByPublicKey.has(publicKey)) {
|
|
244
|
+
await this.getPublicKeys(userId);
|
|
245
|
+
}
|
|
246
|
+
const key = this.keyInfoByPublicKey.get(publicKey);
|
|
247
|
+
if (!key) {
|
|
248
|
+
throw new Error(`Public key ${publicKey} not found in vaults`);
|
|
249
|
+
}
|
|
250
|
+
const transaction = await client.transactions.createTransaction({
|
|
251
|
+
transactionRequest: {
|
|
252
|
+
operation: "RAW",
|
|
253
|
+
note: `Signing transaction with public key ${publicKey}`,
|
|
254
|
+
externalTxId,
|
|
255
|
+
extraParameters: {
|
|
256
|
+
rawMessageData: {
|
|
257
|
+
messages: [
|
|
258
|
+
{
|
|
259
|
+
content: tx,
|
|
260
|
+
derivationPath: key.derivationPath
|
|
261
|
+
}
|
|
262
|
+
],
|
|
263
|
+
algorithm: key.algorithm
|
|
264
|
+
}
|
|
265
|
+
}
|
|
266
|
+
}
|
|
267
|
+
});
|
|
268
|
+
let status = "pending";
|
|
269
|
+
switch (transaction.data.status) {
|
|
270
|
+
case "REJECTED":
|
|
271
|
+
status = "rejected";
|
|
272
|
+
break;
|
|
273
|
+
case "COMPLETED":
|
|
274
|
+
status = "signed";
|
|
275
|
+
break;
|
|
276
|
+
case "CANCELLED":
|
|
277
|
+
case "FAILED":
|
|
278
|
+
case "BLOCKED":
|
|
279
|
+
status = "failed";
|
|
280
|
+
break;
|
|
281
|
+
}
|
|
282
|
+
return {
|
|
283
|
+
txId: transaction.data.id,
|
|
284
|
+
status,
|
|
285
|
+
publicKey: key.publicKey,
|
|
286
|
+
derivationPath: key.derivationPath
|
|
287
|
+
};
|
|
288
|
+
} catch (error) {
|
|
289
|
+
logger.error(error, "Error signing transaction:");
|
|
290
|
+
throw error;
|
|
291
|
+
}
|
|
292
|
+
}
|
|
293
|
+
};
|
|
294
|
+
var FireblocksApiKeyInfoSchema = zod.z.object({
|
|
295
|
+
apiKey: zod.z.string(),
|
|
296
|
+
apiSecret: zod.z.string()
|
|
297
|
+
});
|
|
298
|
+
var FireblocksConfigSchema = zod.z.object({
|
|
299
|
+
defaultApiKey: FireblocksApiKeyInfoSchema.optional(),
|
|
300
|
+
userApiKeys: zod.z.map(zod.z.string(), FireblocksApiKeyInfoSchema),
|
|
301
|
+
apiPath: zod.z.string().optional()
|
|
302
|
+
});
|
|
303
|
+
var createFireblocksHandler = (config) => {
|
|
304
|
+
return new FireblocksHandler(
|
|
305
|
+
config.defaultKeyInfo ? {
|
|
306
|
+
apiKey: config.defaultKeyInfo.apiKey,
|
|
307
|
+
apiSecret: config.defaultKeyInfo.apiSecret
|
|
308
|
+
} : void 0,
|
|
309
|
+
config.userApiKeys,
|
|
310
|
+
config.apiPath || "https://api.fireblocks.io/v1"
|
|
311
|
+
);
|
|
312
|
+
};
|
|
313
|
+
var FireblocksSigningDriver = class {
|
|
314
|
+
constructor(config) {
|
|
315
|
+
__publicField(this, "fireblocks");
|
|
316
|
+
__publicField(this, "config");
|
|
317
|
+
__publicField(this, "partyMode", coreSigningLib.PartyMode.EXTERNAL);
|
|
318
|
+
__publicField(this, "signingProvider", coreSigningLib.SigningProvider.FIREBLOCKS);
|
|
319
|
+
__publicField(this, "controller", (userId) => coreSigningLib.buildController({
|
|
320
|
+
signTransaction: async (params) => {
|
|
321
|
+
try {
|
|
322
|
+
const tx = await this.fireblocks.signTransaction(
|
|
323
|
+
userId,
|
|
324
|
+
params.txHash,
|
|
325
|
+
params.publicKey,
|
|
326
|
+
params.internalTxId
|
|
327
|
+
);
|
|
328
|
+
return {
|
|
329
|
+
txId: tx.txId,
|
|
330
|
+
status: tx.status,
|
|
331
|
+
signature: tx.signature,
|
|
332
|
+
publicKey: tx.publicKey
|
|
333
|
+
};
|
|
334
|
+
} catch (error) {
|
|
335
|
+
return {
|
|
336
|
+
error: "signing_error",
|
|
337
|
+
error_description: error.message
|
|
338
|
+
};
|
|
339
|
+
}
|
|
340
|
+
},
|
|
341
|
+
getTransaction: async (params) => {
|
|
342
|
+
const tx = await this.fireblocks.getTransaction(
|
|
343
|
+
userId,
|
|
344
|
+
params.txId
|
|
345
|
+
);
|
|
346
|
+
if (tx) {
|
|
347
|
+
return {
|
|
348
|
+
txId: tx.txId,
|
|
349
|
+
status: tx.status,
|
|
350
|
+
signature: tx.signature,
|
|
351
|
+
publicKey: tx.publicKey
|
|
352
|
+
};
|
|
353
|
+
} else {
|
|
354
|
+
return {
|
|
355
|
+
error: "transaction_not_found",
|
|
356
|
+
error_description: "The requested transaction does not exist."
|
|
357
|
+
};
|
|
358
|
+
}
|
|
359
|
+
},
|
|
360
|
+
getTransactions: async (params) => {
|
|
361
|
+
const transactions = [];
|
|
362
|
+
if (params.publicKeys || params.txIds) {
|
|
363
|
+
const txIds = new Set(params.txIds);
|
|
364
|
+
const publicKeys = new Set(params.publicKeys);
|
|
365
|
+
for await (const tx of this.fireblocks.getTransactions(
|
|
366
|
+
userId
|
|
367
|
+
)) {
|
|
368
|
+
if (txIds.has(tx.txId) || publicKeys.has(tx.publicKey || "")) {
|
|
369
|
+
transactions.push({
|
|
370
|
+
txId: tx.txId,
|
|
371
|
+
status: tx.status,
|
|
372
|
+
signature: tx.signature,
|
|
373
|
+
publicKey: tx.publicKey
|
|
374
|
+
});
|
|
375
|
+
}
|
|
376
|
+
if (params.txIds && !params.publicKeys && transactions.length == txIds.size) {
|
|
377
|
+
break;
|
|
378
|
+
}
|
|
379
|
+
}
|
|
380
|
+
return {
|
|
381
|
+
transactions
|
|
382
|
+
};
|
|
383
|
+
} else {
|
|
384
|
+
return {
|
|
385
|
+
error: "bad_arguments",
|
|
386
|
+
error_description: "either public key or txIds must be supplied"
|
|
387
|
+
};
|
|
388
|
+
}
|
|
389
|
+
},
|
|
390
|
+
getKeys: async () => {
|
|
391
|
+
try {
|
|
392
|
+
const keys = await this.fireblocks.getPublicKeys(userId);
|
|
393
|
+
return {
|
|
394
|
+
keys: keys.map((k) => ({
|
|
395
|
+
id: k.derivationPath.join("-"),
|
|
396
|
+
name: k.name,
|
|
397
|
+
publicKey: k.publicKey
|
|
398
|
+
}))
|
|
399
|
+
};
|
|
400
|
+
} catch (error) {
|
|
401
|
+
return {
|
|
402
|
+
error: "fetch_error",
|
|
403
|
+
error_description: error.message
|
|
404
|
+
};
|
|
405
|
+
}
|
|
406
|
+
},
|
|
407
|
+
createKey: async (_params) => {
|
|
408
|
+
return {
|
|
409
|
+
error: "not_allowed",
|
|
410
|
+
error_description: "Creating a Fireblocks key through the Wallet Gateway is not allowed, please create new keys directly in Fireblocks."
|
|
411
|
+
};
|
|
412
|
+
},
|
|
413
|
+
getConfiguration: async () => {
|
|
414
|
+
const hideFireblocksKeySecret = (keyInfo) => {
|
|
415
|
+
return keyInfo ? {
|
|
416
|
+
apiKey: keyInfo.apiKey,
|
|
417
|
+
apiSecret: "***HIDDEN***"
|
|
418
|
+
} : void 0;
|
|
419
|
+
};
|
|
420
|
+
return {
|
|
421
|
+
...this.config,
|
|
422
|
+
defaultKeyInfo: hideFireblocksKeySecret(
|
|
423
|
+
this.config.defaultKeyInfo
|
|
424
|
+
),
|
|
425
|
+
userApiKeys: new Map(
|
|
426
|
+
[...this.config.userApiKeys].map(([k, v]) => [
|
|
427
|
+
k,
|
|
428
|
+
hideFireblocksKeySecret(v)
|
|
429
|
+
])
|
|
430
|
+
)
|
|
431
|
+
};
|
|
432
|
+
},
|
|
433
|
+
setConfiguration: async (params) => {
|
|
434
|
+
const validated = FireblocksConfigSchema.safeParse(params);
|
|
435
|
+
if (!validated.success) {
|
|
436
|
+
return {
|
|
437
|
+
error: "bad_arguments",
|
|
438
|
+
error_description: validated.error.message
|
|
439
|
+
};
|
|
440
|
+
}
|
|
441
|
+
if (!___default.default.isEqual(validated.data, this.config)) {
|
|
442
|
+
this.config = validated.data;
|
|
443
|
+
this.fireblocks = createFireblocksHandler(this.config);
|
|
444
|
+
}
|
|
445
|
+
return params;
|
|
446
|
+
},
|
|
447
|
+
// TODO: implement subscribeTransactions - we will need to figure out how to handle subscriptions
|
|
448
|
+
// when the controller is not running in a server context
|
|
449
|
+
subscribeTransactions: async (params) => Promise.resolve({})
|
|
450
|
+
}));
|
|
451
|
+
this.config = config;
|
|
452
|
+
this.fireblocks = createFireblocksHandler(config);
|
|
453
|
+
}
|
|
454
|
+
};
|
|
455
|
+
|
|
456
|
+
module.exports = FireblocksSigningDriver;
|
|
457
|
+
//# sourceMappingURL=index.cjs.map
|
|
458
|
+
//# sourceMappingURL=index.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/fireblocks.ts","../src/index.ts"],"names":["z","pino","Fireblocks","CC_COIN_TYPE","PublicKeyInformationAlgorithmEnum","PartyMode","SigningProvider","buildController","_"],"mappings":";;;;;;;;;;;;;;;AAaA,IAAM,gBAAA,GAAmBA,MAAE,MAAA,CAAO;AAAA,EAC9B,OAAA,EAASA,MAAE,MAAA,EAAO;AAAA,EAClB,cAAA,EAAgBA,KAAA,CAAE,KAAA,CAAMA,KAAA,CAAE,QAAQ;AACtC,CAAC,CAAA;AAED,IAAM,oBAAA,GAAuBA,MAAE,MAAA,CAAO;AAAA,EAClC,QAAA,EAAUA,KAAA,CAAE,KAAA,CAAM,gBAAgB,CAAA;AAAA,EAClC,SAAA,EAAWA,MAAE,MAAA;AACjB,CAAC,CAAA;AAED,IAAM,+BAAA,GAAkCA,MAAE,MAAA,CAAO;AAAA,EAC7C,cAAA,EAAgB;AACpB,CAAC,CAAA;AAuBD,IAAM,SAASC,SAAA,CAAK,EAAE,MAAM,MAAA,EAAQ,KAAA,EAAO,SAAS,CAAA;AAE7C,IAAM,oBAAN,MAAwB;AAAA,EAiB3B,WAAA,CACI,UAAA,EACA,QAAA,EACA,OAAA,GAAkB,8BAAA,EACpB;AApBF,IAAA,aAAA,CAAA,IAAA,EAAQ,eAAA,CAAA;AACR,IAAA,aAAA,CAAA,IAAA,EAAQ,SAAA,sBAAuC,GAAA,EAAI,CAAA;AAEnD,IAAA,aAAA,CAAA,IAAA,EAAQ,oBAAA,sBAAqD,GAAA,EAAI,CAAA;AACjE,IAAA,aAAA,CAAA,IAAA,EAAQ,2BAAA,sBAAqD,GAAA,EAAI,CAAA;AAEjE,IAAA,aAAA,CAAA,IAAA,EAAQ,WAAA,EAAY,CAAC,MAAA,KAA2C;AAC5D,MAAA,IAAI,WAAW,MAAA,IAAa,IAAA,CAAK,OAAA,CAAQ,GAAA,CAAI,MAAM,CAAA,EAAG;AAClD,QAAA,OAAO,IAAA,CAAK,OAAA,CAAQ,GAAA,CAAI,MAAM,CAAA;AAAA,MAClC,CAAA,MAAA,IAAW,KAAK,aAAA,EAAe;AAC3B,QAAA,OAAO,IAAA,CAAK,aAAA;AAAA,MAChB,CAAA,MAAO;AACH,QAAA,MAAM,IAAI,MAAM,+CAA+C,CAAA;AAAA,MACnE;AAAA,IACJ,CAAA,CAAA;AAOI,IAAA,IAAI,UAAA,EAAY;AACZ,MAAA,IAAA,CAAK,aAAA,GAAgB,IAAIC,gBAAA,CAAW;AAAA,QAChC,QAAQ,UAAA,CAAW,MAAA;AAAA,QACnB,QAAA,EAAU,OAAA;AAAA,QACV,WAAW,UAAA,CAAW;AAAA,OACzB,CAAA;AAAA,IACL;AACA,IAAA,QAAA,CAAS,OAAA,CAAQ,CAAC,OAAA,EAAS,MAAA,KAAW;AAClC,MAAA,MAAM,MAAA,GAAS,IAAIA,gBAAA,CAAW;AAAA,QAC1B,QAAQ,OAAA,CAAQ,MAAA;AAAA,QAChB,QAAA,EAAU,OAAA;AAAA,QACV,WAAW,OAAA,CAAQ;AAAA,OACtB,CAAA;AACD,MAAA,IAAA,CAAK,OAAA,CAAQ,GAAA,CAAI,MAAA,EAAQ,MAAM,CAAA;AAAA,IACnC,CAAC,CAAA;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,MAAa,cACT,MAAA,EACwB;AACxB,IAAA,MAAM,OAAwB,EAAC;AAC/B,IAAA,IAAI;AACA,MAAA,MAAM,MAAA,GAAS,IAAA,CAAK,SAAA,CAAU,MAAM,CAAA;AACpC,MAAA,MAAM,gBAAgC,EAAC;AACvC,MAAA,IAAI,KAAA,GAA4B,KAAA,CAAA;AAEhC,MAAA,GAAG;AACC,QAAA,MAAM,IAAA,GAAO,MAAM,MAAA,CAAO,MAAA,CAAO,qBAAA;AAAA,UAC7B,KAAA,GAAQ,EAAE,KAAA,EAAM,GAAI;AAAC,SACzB;AACA,QAAA,KAAA,GAAQ,IAAA,CAAK,KAAK,MAAA,EAAQ,KAAA;AAC1B,QAAA,aAAA,CAAc,KAAK,GAAI,IAAA,CAAK,IAAA,CAAK,QAAA,IAAY,EAAG,CAAA;AAAA,MACpD,SAAS,KAAA,KAAU,KAAA,CAAA;AAEnB,MAAA,KAAA,MAAW,SAAS,aAAA,EAAe;AAC/B,QAAA,IAAI,MAAM,EAAA,EAAI;AACV,UAAA,MAAM,cAAA,GAAiB;AAAA,YACnB,EAAA;AAAA,YACAC,2BAAA;AAAA,YACA,MAAA,CAAO,KAAA,CAAM,EAAE,CAAA,IAAK,CAAA;AAAA,YACpB,CAAA;AAAA,YACA;AAAA,WACJ;AACA,UAAA,MAAM,SAAA,GAAY,MAAM,IAAA,CAAK,eAAA;AAAA,YACzB,MAAA;AAAA,YACA;AAAA,WACJ;AAEA,UAAA,MAAM,SAAA,GAAY;AAAA,YACd,cAAA;AAAA,YACA,SAAA;AAAA,YACA,IAAA,EAAM,KAAA,CAAM,IAAA,IAAQ,KAAA,CAAM,EAAA;AAAA,YAC1B,WACIC,uCAAA,CAAkC;AAAA,WAC1C;AACA,UAAA,IAAA,CAAK,KAAK,SAAS,CAAA;AACnB,UAAA,IAAA,CAAK,kBAAA,CAAmB,GAAA,CAAI,SAAA,CAAU,SAAA,EAAW,SAAS,CAAA;AAAA,QAC9D;AAAA,MACJ;AAAA,IACJ,SAAS,KAAA,EAAO;AACZ,MAAA,MAAA,CAAO,KAAA,CAAM,OAAO,gCAAgC,CAAA;AACpD,MAAA,MAAM,KAAA;AAAA,IACV;AACA,IAAA,OAAO,IAAA;AAAA,EACX;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,MAAc,iBAAA,CACV,MAAA,EACA,EAAA,EAC0C;AAC1C,IAAA,IAAI,EAAA,CAAG,cAAA,IAAkB,EAAA,CAAG,cAAA,CAAe,SAAS,CAAA,EAAG;AACnD,MAAA,MAAM,aAAA,GAAgB,EAAA,CAAG,cAAA,CAAe,CAAC,CAAA;AACzC,MAAA,IACI,CAAC,cAAc,SAAA,IACf,CAAC,cAAc,OAAA,IACf,CAAC,cAAc,SAAA,EACjB;AACE,QAAA,OAAO,MAAA;AAAA,MACX;AACA,MAAA,OAAO;AAAA,QACH,MAAM,EAAA,CAAG,EAAA;AAAA,QACT,MAAA,EAAQ,QAAA;AAAA,QACR,WAAW,EAAA,CAAG,SAAA;AAAA,QACd,WAAW,aAAA,CAAc,SAAA;AAAA,QACzB,SAAA,EAAW,cAAc,SAAA,CAAU,OAAA;AAAA,QACnC,gBAAgB,aAAA,CAAc;AAAA,OAClC;AAAA,IACJ,CAAA,MAAO;AACH,MAAA,MAAM,iBAAiB,+BAAA,CAAgC,SAAA;AAAA,QACnD,EAAA,CAAG;AAAA,OACP;AACA,MAAA,IAAI,CAAC,eAAe,OAAA,EAAS;AAEzB,QAAA,OAAO,MAAA;AAAA,MACX;AACA,MAAA,MAAM,OAAA,GAAU,cAAA,CAAe,IAAA,CAAK,cAAA,CAAe,SAAS,CAAC,CAAA;AAC7D,MAAA,MAAM,SAAA,GAAY,MAAM,IAAA,CAAK,eAAA;AAAA,QACzB,MAAA;AAAA,QACA,OAAA,CAAQ;AAAA,OACZ;AAEA,MAAA,MAAM,MAAA,GACF,EAAA,CAAG,MAAA,KAAW,UAAA,IACd,GAAG,MAAA,KAAW,SAAA,IACd,EAAA,CAAG,MAAA,KAAW,WAAA,GACR,UAAA,GACA,EAAA,CAAG,MAAA,KAAW,WACZ,QAAA,GACA,SAAA;AACZ,MAAA,OAAO;AAAA,QACH,MAAM,EAAA,CAAG,EAAA;AAAA,QACT,MAAA;AAAA,QACA,WAAW,EAAA,CAAG,SAAA;AAAA,QACd,SAAA;AAAA,QACA,gBAAgB,OAAA,CAAQ;AAAA,OAC5B;AAAA,IACJ;AAAA,EACJ;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,MAAc,eAAA,CACV,MAAA,EACA,cAAA,EACe;AACf,IAAA,MAAM,oBAAA,GAAuB,IAAA,CAAK,SAAA,CAAU,cAAc,CAAA;AAC1D,IAAA,IAAI,IAAA,CAAK,yBAAA,CAA0B,GAAA,CAAI,oBAAoB,CAAA,EAAG;AAC1D,MAAA,OAAO,IAAA,CAAK,yBAAA,CAA0B,GAAA,CAAI,oBAAoB,CAAA;AAAA,IAClE,CAAA,MAAO;AACH,MAAA,IAAI;AACA,QAAA,MAAM,MAAA,GAAS,IAAA,CAAK,SAAA,CAAU,MAAM,CAAA;AACpC,QAAA,MAAM,GAAA,GAAM,MAAM,MAAA,CAAO,MAAA,CAAO,gBAAA,CAAiB;AAAA,UAC7C,WAAWA,uCAAA,CAAkC,YAAA;AAAA,UAC7C,cAAA,EAAgB;AAAA,SACnB,CAAA;AACD,QAAA,IAAI,GAAA,CAAI,KAAK,SAAA,EAAW;AACpB,UAAA,IAAA,CAAK,yBAAA,CAA0B,GAAA;AAAA,YAC3B,oBAAA;AAAA,YACA,IAAI,IAAA,CAAK;AAAA,WACb;AACA,UAAA,OAAO,IAAI,IAAA,CAAK,SAAA;AAAA,QACpB,CAAA,MAAO;AACH,UAAA,MAAM,IAAI,KAAA;AAAA,YACN;AAAA,WACJ;AAAA,QACJ;AAAA,MACJ,SAAS,KAAA,EAAO;AACZ,QAAA,MAAM,IAAI,KAAA,CAAM,CAAA,6BAAA,EAAgC,KAAK,CAAA,CAAE,CAAA;AAAA,MAC3D;AAAA,IACJ;AAAA,EACJ;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,MAAa,cAAA,CACT,MAAA,EACA,IAAA,EAC0C;AAC1C,IAAA,IAAI;AACA,MAAA,MAAM,MAAA,GAAS,IAAA,CAAK,SAAA,CAAU,MAAM,CAAA;AACpC,MAAA,MAAM,WAAA,GAAc,MAAM,MAAA,CAAO,YAAA,CAAa,cAAA,CAAe;AAAA,QACzD;AAAA,OACH,CAAA;AACD,MAAA,OAAO,MAAM,IAAA,CAAK,iBAAA,CAAkB,MAAA,EAAQ,YAAY,IAAI,CAAA;AAAA,IAChE,CAAA,CAAA,MAAQ;AAEJ,MAAA,OAAO,MAAA;AAAA,IACX;AAAA,EACJ;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,OAAc,gBACV,MAAA,EACA;AAAA,IACI,KAAA,GAAQ,GAAA;AAAA,IACR;AAAA,GACJ,GAGI,EAAC,EACgC;AACrC,IAAA,IAAI,aAAA,GAAgB,CAAA;AACpB,IAAA,IAAI,WAAA,GAAkC,MAAA;AACtC,IAAA,IAAI;AACA,MAAA,MAAM,MAAA,GAAS,IAAA,CAAK,SAAA,CAAU,MAAM,CAAA;AACpC,MAAA,GAAG;AACC,QAAA,MAAM,YAAA,GAAe,MAAM,MAAA,CAAO,YAAA,CAAa,eAAA,CAAgB;AAAA,UAC3D,UAAA,EAAY,eAAA;AAAA,UACZ,KAAA;AAAA,UACA,GAAI,cAAc,EAAE,MAAA,EAAQ,YAAY,QAAA,EAAS,KAAM;AAAC,SAC3D,CAAA;AACD,QAAA,aAAA,GAAgB,aAAa,IAAA,CAAK,MAAA;AAClC,QAAA,KAAA,MAAW,EAAA,IAAM,aAAa,IAAA,EAAM;AAGhC,UAAA,WAAA,GAAc,GAAG,SAAA,GAAa,CAAA;AAC9B,UAAA,MAAM,iBAAA,GAAoB,MAAM,IAAA,CAAK,iBAAA;AAAA,YACjC,MAAA;AAAA,YACA;AAAA,WACJ;AACA,UAAA,IAAI,iBAAA,EAAmB;AACnB,YAAA,MAAM,iBAAA;AAAA,UACV,CAAA,MAAO;AAEH,YAAA;AAAA,UACJ;AAAA,QACJ;AAAA,MAGJ,SAAS,aAAA,GAAgB,CAAA;AAAA,IAC7B,SAAS,KAAA,EAAO;AACZ,MAAA,MAAA,CAAO,KAAA,CAAM,OAAO,2BAA2B,CAAA;AAC/C,MAAA,MAAM,KAAA;AAAA,IACV;AAAA,EACJ;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,MAAa,eAAA,CACT,MAAA,EACA,EAAA,EACA,WACA,YAAA,EAC8B;AAC9B,IAAA,IAAI;AACA,MAAA,MAAM,MAAA,GAAS,IAAA,CAAK,SAAA,CAAU,MAAM,CAAA;AACpC,MAAA,IAAI,CAAC,IAAA,CAAK,kBAAA,CAAmB,GAAA,CAAI,SAAS,CAAA,EAAG;AAEzC,QAAA,MAAM,IAAA,CAAK,cAAc,MAAM,CAAA;AAAA,MACnC;AACA,MAAA,MAAM,GAAA,GAAM,IAAA,CAAK,kBAAA,CAAmB,GAAA,CAAI,SAAS,CAAA;AACjD,MAAA,IAAI,CAAC,GAAA,EAAK;AACN,QAAA,MAAM,IAAI,KAAA,CAAM,CAAA,WAAA,EAAc,SAAS,CAAA,oBAAA,CAAsB,CAAA;AAAA,MACjE;AAEA,MAAA,MAAM,WAAA,GAAc,MAAM,MAAA,CAAO,YAAA,CAAa,iBAAA,CAAkB;AAAA,QAC5D,kBAAA,EAAoB;AAAA,UAChB,SAAA,EAAW,KAAA;AAAA,UACX,IAAA,EAAM,uCAAuC,SAAS,CAAA,CAAA;AAAA,UACtD,YAAA;AAAA,UACA,eAAA,EAAiB;AAAA,YACb,cAAA,EAAgB;AAAA,cACZ,QAAA,EAAU;AAAA,gBACN;AAAA,kBACI,OAAA,EAAS,EAAA;AAAA,kBACT,gBAAgB,GAAA,CAAI;AAAA;AACxB,eACJ;AAAA,cACA,WAAW,GAAA,CAAI;AAAA;AACnB;AACJ;AACJ,OACH,CAAA;AACD,MAAA,IAAI,MAAA,GAAwB,SAAA;AAC5B,MAAA,QAAQ,WAAA,CAAY,KAAK,MAAA;AAAQ,QAC7B,KAAK,UAAA;AACD,UAAA,MAAA,GAAS,UAAA;AACT,UAAA;AAAA,QACJ,KAAK,WAAA;AACD,UAAA,MAAA,GAAS,QAAA;AACT,UAAA;AAAA,QACJ,KAAK,WAAA;AAAA,QACL,KAAK,QAAA;AAAA,QACL,KAAK,SAAA;AACD,UAAA,MAAA,GAAS,QAAA;AACT,UAAA;AAAA;AAGR,MAAA,OAAO;AAAA,QACH,IAAA,EAAM,YAAY,IAAA,CAAK,EAAA;AAAA,QACvB,MAAA;AAAA,QACA,WAAW,GAAA,CAAI,SAAA;AAAA,QACf,gBAAgB,GAAA,CAAI;AAAA,OACxB;AAAA,IACJ,SAAS,KAAA,EAAO;AACZ,MAAA,MAAA,CAAO,KAAA,CAAM,OAAO,4BAA4B,CAAA;AAChD,MAAA,MAAM,KAAA;AAAA,IACV;AAAA,EACJ;AACJ,CAAA;AC/UA,IAAM,0BAAA,GAA6BJ,MAAE,MAAA,CAAO;AAAA,EACxC,MAAA,EAAQA,MAAE,MAAA,EAAO;AAAA,EACjB,SAAA,EAAWA,MAAE,MAAA;AACjB,CAAC,CAAA;AAED,IAAM,sBAAA,GAAyBA,MAAE,MAAA,CAAO;AAAA,EACpC,aAAA,EAAe,2BAA2B,QAAA,EAAS;AAAA,EACnD,aAAaA,KAAAA,CAAE,GAAA,CAAIA,KAAAA,CAAE,MAAA,IAAU,0BAA0B,CAAA;AAAA,EACzD,OAAA,EAASA,KAAAA,CAAE,MAAA,EAAO,CAAE,QAAA;AACxB,CAAC,CAAA;AAED,IAAM,uBAAA,GAA0B,CAC5B,MAAA,KACoB;AACpB,EAAA,OAAO,IAAI,iBAAA;AAAA,IACP,OAAO,cAAA,GACD;AAAA,MACI,MAAA,EAAQ,OAAO,cAAA,CAAe,MAAA;AAAA,MAC9B,SAAA,EAAW,OAAO,cAAA,CAAe;AAAA,KACrC,GACA,MAAA;AAAA,IACN,MAAA,CAAO,WAAA;AAAA,IACP,OAAO,OAAA,IAAW;AAAA,GACtB;AACJ,CAAA;AAEA,IAAqB,0BAArB,MAA+E;AAAA,EAI3E,YAAY,MAAA,EAA0B;AAHtC,IAAA,aAAA,CAAA,IAAA,EAAQ,YAAA,CAAA;AACR,IAAA,aAAA,CAAA,IAAA,EAAQ,QAAA,CAAA;AAMR,IAAA,aAAA,CAAA,IAAA,EAAO,aAAYK,wBAAA,CAAU,QAAA,CAAA;AAC7B,IAAA,aAAA,CAAA,IAAA,EAAO,mBAAkBC,8BAAA,CAAgB,UAAA,CAAA;AACzC,IAAA,aAAA,CAAA,IAAA,EAAO,YAAA,EAAa,CAAC,MAAA,KACjBC,8BAAA,CAAgB;AAAA,MACZ,eAAA,EAAiB,OACb,MAAA,KACiC;AAGjC,QAAA,IAAI;AACA,UAAA,MAAM,EAAA,GAAK,MAAM,IAAA,CAAK,UAAA,CAAW,eAAA;AAAA,YAC7B,MAAA;AAAA,YACA,MAAA,CAAO,MAAA;AAAA,YACP,MAAA,CAAO,SAAA;AAAA,YACP,MAAA,CAAO;AAAA,WACX;AACA,UAAA,OAAO;AAAA,YACH,MAAM,EAAA,CAAG,IAAA;AAAA,YACT,QAAQ,EAAA,CAAG,MAAA;AAAA,YACX,WAAW,EAAA,CAAG,SAAA;AAAA,YACd,WAAW,EAAA,CAAG;AAAA,WAClB;AAAA,QACJ,SAAS,KAAA,EAAO;AACZ,UAAA,OAAO;AAAA,YACH,KAAA,EAAO,eAAA;AAAA,YACP,mBAAoB,KAAA,CAAgB;AAAA,WACxC;AAAA,QACJ;AAAA,MACJ,CAAA;AAAA,MAEA,cAAA,EAAgB,OACZ,MAAA,KACgC;AAChC,QAAA,MAAM,EAAA,GAAK,MAAM,IAAA,CAAK,UAAA,CAAW,cAAA;AAAA,UAC7B,MAAA;AAAA,UACA,MAAA,CAAO;AAAA,SACX;AACA,QAAA,IAAI,EAAA,EAAI;AACJ,UAAA,OAAO;AAAA,YACH,MAAM,EAAA,CAAG,IAAA;AAAA,YACT,QAAQ,EAAA,CAAG,MAAA;AAAA,YACX,WAAW,EAAA,CAAG,SAAA;AAAA,YACd,WAAW,EAAA,CAAG;AAAA,WAClB;AAAA,QACJ,CAAA,MAAO;AACH,UAAA,OAAO;AAAA,YACH,KAAA,EAAO,uBAAA;AAAA,YACP,iBAAA,EACI;AAAA,WACR;AAAA,QACJ;AAAA,MACJ,CAAA;AAAA,MAEA,eAAA,EAAiB,OACb,MAAA,KACiC;AACjC,QAAA,MAAM,eAA8B,EAAC;AACrC,QAAA,IAAI,MAAA,CAAO,UAAA,IAAc,MAAA,CAAO,KAAA,EAAO;AACnC,UAAA,MAAM,KAAA,GAAQ,IAAI,GAAA,CAAI,MAAA,CAAO,KAAK,CAAA;AAClC,UAAA,MAAM,UAAA,GAAa,IAAI,GAAA,CAAI,MAAA,CAAO,UAAU,CAAA;AAC5C,UAAA,WAAA,MAAiB,EAAA,IAAM,KAAK,UAAA,CAAW,eAAA;AAAA,YACnC;AAAA,WACJ,EAAG;AACC,YAAA,IACI,KAAA,CAAM,GAAA,CAAI,EAAA,CAAG,IAAI,CAAA,IACjB,WAAW,GAAA,CAAI,EAAA,CAAG,SAAA,IAAa,EAAE,CAAA,EACnC;AACE,cAAA,YAAA,CAAa,IAAA,CAAK;AAAA,gBACd,MAAM,EAAA,CAAG,IAAA;AAAA,gBACT,QAAQ,EAAA,CAAG,MAAA;AAAA,gBACX,WAAW,EAAA,CAAG,SAAA;AAAA,gBACd,WAAW,EAAA,CAAG;AAAA,eACjB,CAAA;AAAA,YACL;AACA,YAAA,IACI,MAAA,CAAO,SACP,CAAC,MAAA,CAAO,cACR,YAAA,CAAa,MAAA,IAAU,MAAM,IAAA,EAC/B;AAEE,cAAA;AAAA,YACJ;AAAA,UACJ;AACA,UAAA,OAAO;AAAA,YACH;AAAA,WACJ;AAAA,QACJ,CAAA,MAAO;AACH,UAAA,OAAO;AAAA,YACH,KAAA,EAAO,eAAA;AAAA,YACP,iBAAA,EACI;AAAA,WACR;AAAA,QACJ;AAAA,MACJ,CAAA;AAAA,MAEA,SAAS,YAAoC;AACzC,QAAA,IAAI;AACA,UAAA,MAAM,IAAA,GAAO,MAAM,IAAA,CAAK,UAAA,CAAW,cAAc,MAAM,CAAA;AACvD,UAAA,OAAO;AAAA,YACH,IAAA,EAAM,IAAA,CAAK,GAAA,CAAI,CAAC,CAAA,MAAO;AAAA,cACnB,EAAA,EAAI,CAAA,CAAE,cAAA,CAAe,IAAA,CAAK,GAAG,CAAA;AAAA,cAC7B,MAAM,CAAA,CAAE,IAAA;AAAA,cACR,WAAW,CAAA,CAAE;AAAA,aACjB,CAAE;AAAA,WACN;AAAA,QACJ,SAAS,KAAA,EAAO;AACZ,UAAA,OAAO;AAAA,YACH,KAAA,EAAO,aAAA;AAAA,YACP,mBAAoB,KAAA,CAAgB;AAAA,WACxC;AAAA,QACJ;AAAA,MACJ,CAAA;AAAA,MAEA,SAAA,EAAW,OACP,OAAA,KAC2B;AAC3B,QAAA,OAAO;AAAA,UACH,KAAA,EAAO,aAAA;AAAA,UACP,iBAAA,EACI;AAAA,SACR;AAAA,MACJ,CAAA;AAAA,MAEA,kBAAkB,YAA6C;AAC3D,QAAA,MAAM,uBAAA,GAA0B,CAC5B,OAAA,KACmC;AACnC,UAAA,OAAO,OAAA,GACD;AAAA,YACI,QAAQ,OAAA,CAAQ,MAAA;AAAA,YAChB,SAAA,EAAW;AAAA,WACf,GACA,MAAA;AAAA,QACV,CAAA;AAEA,QAAA,OAAO;AAAA,UACH,GAAG,IAAA,CAAK,MAAA;AAAA,UACR,cAAA,EAAgB,uBAAA;AAAA,YACZ,KAAK,MAAA,CAAO;AAAA,WAChB;AAAA,UACA,aAAa,IAAI,GAAA;AAAA,YACb,CAAC,GAAG,IAAA,CAAK,MAAA,CAAO,WAAW,CAAA,CAAE,GAAA,CAAI,CAAC,CAAC,CAAA,EAAG,CAAC,CAAA,KAAM;AAAA,cACzC,CAAA;AAAA,cACA,wBAAwB,CAAC;AAAA,aAC5B;AAAA;AACL,SACJ;AAAA,MACJ,CAAA;AAAA,MAEA,gBAAA,EAAkB,OACd,MAAA,KACkC;AAClC,QAAA,MAAM,SAAA,GAAY,sBAAA,CAAuB,SAAA,CAAU,MAAM,CAAA;AACzD,QAAA,IAAI,CAAC,UAAU,OAAA,EAAS;AACpB,UAAA,OAAO;AAAA,YACH,KAAA,EAAO,eAAA;AAAA,YACP,iBAAA,EAAmB,UAAU,KAAA,CAAM;AAAA,WACvC;AAAA,QACJ;AACA,QAAA,IAAI,CAACC,kBAAA,CAAE,OAAA,CAAQ,UAAU,IAAA,EAAM,IAAA,CAAK,MAAM,CAAA,EAAG;AACzC,UAAA,IAAA,CAAK,SAAS,SAAA,CAAU,IAAA;AACxB,UAAA,IAAA,CAAK,UAAA,GAAa,uBAAA,CAAwB,IAAA,CAAK,MAAM,CAAA;AAAA,QACzD;AACA,QAAA,OAAO,MAAA;AAAA,MACX,CAAA;AAAA;AAAA;AAAA,MAIA,uBAAuB,OACnB,MAAA,KAEA,OAAA,CAAQ,OAAA,CAAQ,EAAiC;AAAA,KACxD,CAAA,CAAA;AA/KD,IAAA,IAAA,CAAK,MAAA,GAAS,MAAA;AACd,IAAA,IAAA,CAAK,UAAA,GAAa,wBAAwB,MAAM,CAAA;AAAA,EACpD;AA8KJ","file":"index.cjs","sourcesContent":["// Copyright (c) 2025 Digital Asset (Switzerland) GmbH and/or its affiliates. All rights reserved.\n// SPDX-License-Identifier: Apache-2.0\n\nimport {\n Fireblocks,\n PublicKeyInformationAlgorithmEnum,\n TransactionResponse,\n VaultAccount,\n} from '@fireblocks/ts-sdk'\nimport { pino } from 'pino'\nimport { SigningStatus, CC_COIN_TYPE } from '@canton-network/core-signing-lib'\nimport { z } from 'zod'\n\nconst RawMessageSchema = z.object({\n content: z.string(),\n derivationPath: z.array(z.number()),\n})\n\nconst RawMessageDataSchema = z.object({\n messages: z.array(RawMessageSchema),\n algorithm: z.string(),\n})\n\nconst RawMessageExtraParametersSchema = z.object({\n rawMessageData: RawMessageDataSchema,\n})\n\ninterface FireblocksKey {\n name: string\n publicKey: string\n derivationPath: number[]\n algorithm: PublicKeyInformationAlgorithmEnum\n}\n\nexport interface FireblocksTransaction {\n txId: string\n status: SigningStatus\n createdAt?: number\n signature?: string | undefined\n publicKey?: string | undefined\n derivationPath: number[]\n}\n\nexport interface FireblocksApiKeyInfo {\n apiKey: string\n apiSecret: string\n}\n\nconst logger = pino({ name: 'main', level: 'debug' })\n\nexport class FireblocksHandler {\n private defaultClient: Fireblocks | undefined = undefined\n private clients: Map<string, Fireblocks> = new Map()\n\n private keyInfoByPublicKey: Map<string, FireblocksKey> = new Map()\n private publicKeyByDerivationPath: Map<string, string> = new Map()\n\n private getClient = (userId: string | undefined): Fireblocks => {\n if (userId !== undefined && this.clients.has(userId)) {\n return this.clients.get(userId)!\n } else if (this.defaultClient) {\n return this.defaultClient\n } else {\n throw new Error('No Fireblocks client available for this user.')\n }\n }\n\n constructor(\n defaultKey: FireblocksApiKeyInfo | undefined,\n userKeys: Map<string, FireblocksApiKeyInfo>,\n apiPath: string = 'https://api.fireblocks.io/v1'\n ) {\n if (defaultKey) {\n this.defaultClient = new Fireblocks({\n apiKey: defaultKey.apiKey,\n basePath: apiPath,\n secretKey: defaultKey.apiSecret,\n })\n }\n userKeys.forEach((keyInfo, userId) => {\n const client = new Fireblocks({\n apiKey: keyInfo.apiKey,\n basePath: apiPath,\n secretKey: keyInfo.apiSecret,\n })\n this.clients.set(userId, client)\n })\n }\n\n /**\n * Get all public keys which correspond to Fireblocks vault accounts. This will\n * also refresh the key cache.\n * @returns List of Fireblocks public key information\n */\n public async getPublicKeys(\n userId: string | undefined\n ): Promise<FireblocksKey[]> {\n const keys: FireblocksKey[] = []\n try {\n const client = this.getClient(userId)\n const vaultAccounts: VaultAccount[] = []\n let after: string | undefined = undefined\n\n do {\n const resp = await client.vaults.getPagedVaultAccounts(\n after ? { after } : {}\n )\n after = resp.data.paging?.after\n vaultAccounts.push(...(resp.data.accounts || []))\n } while (after !== undefined)\n\n for (const vault of vaultAccounts) {\n if (vault.id) {\n const derivationPath = [\n 44,\n CC_COIN_TYPE,\n Number(vault.id) || 0,\n 0,\n 0,\n ]\n const publicKey = await this.lookupPublicKey(\n userId,\n derivationPath\n )\n\n const storedKey = {\n derivationPath,\n publicKey,\n name: vault.name || vault.id,\n algorithm:\n PublicKeyInformationAlgorithmEnum.EddsaEd25519,\n }\n keys.push(storedKey)\n this.keyInfoByPublicKey.set(storedKey.publicKey, storedKey)\n }\n }\n } catch (error) {\n logger.error(error, 'Error fetching vault accounts:')\n throw error\n }\n return keys\n }\n\n /**\n * Takes a Fireblocks response from a transactions call and extracts the transaction information\n * relevant to the Wallet Gateway. This will potentially fetch the public key since unsigned transactions\n * do not include it\n * @returns FireblocksTransaction\n */\n private async formatTransaction(\n userId: string | undefined,\n tx: TransactionResponse\n ): Promise<FireblocksTransaction | undefined> {\n if (tx.signedMessages && tx.signedMessages.length > 0) {\n const signedMessage = tx.signedMessages[0]\n if (\n !signedMessage.publicKey ||\n !signedMessage.content ||\n !signedMessage.signature\n ) {\n return undefined\n }\n return {\n txId: tx.id!,\n status: 'signed',\n createdAt: tx.createdAt!,\n publicKey: signedMessage.publicKey,\n signature: signedMessage.signature.fullSig,\n derivationPath: signedMessage.derivationPath!,\n }\n } else {\n const rawMessageData = RawMessageExtraParametersSchema.safeParse(\n tx.extraParameters\n )\n if (!rawMessageData.success) {\n // Skip transactions with invalid rawMessageData\n return undefined\n }\n const message = rawMessageData.data.rawMessageData.messages[0]\n const publicKey = await this.lookupPublicKey(\n userId,\n message.derivationPath\n )\n\n const status =\n tx.status === 'REJECTED' ||\n tx.status === 'BLOCKED' ||\n tx.status === 'CANCELLED'\n ? 'rejected'\n : tx.status === 'FAILED'\n ? 'failed'\n : 'pending'\n return {\n txId: tx.id!,\n status: status,\n createdAt: tx.createdAt!,\n publicKey: publicKey,\n derivationPath: message.derivationPath,\n }\n }\n }\n\n /**\n * Looks up or fetches the public key (only) for a given derivation path\n * @returns The public key as a string\n */\n private async lookupPublicKey(\n userId: string | undefined,\n derivationPath: number[]\n ): Promise<string> {\n const derivationPathString = JSON.stringify(derivationPath)\n if (this.publicKeyByDerivationPath.has(derivationPathString)) {\n return this.publicKeyByDerivationPath.get(derivationPathString)!\n } else {\n try {\n const client = this.getClient(userId)\n const key = await client.vaults.getPublicKeyInfo({\n algorithm: PublicKeyInformationAlgorithmEnum.EddsaEd25519,\n derivationPath: derivationPathString,\n })\n if (key.data.publicKey) {\n this.publicKeyByDerivationPath.set(\n derivationPathString,\n key.data.publicKey\n )\n return key.data.publicKey\n } else {\n throw new Error(\n 'Malformed public key response from Fireblocks'\n )\n }\n } catch (error) {\n throw new Error(`Error looking up public key: ${error}`)\n }\n }\n }\n\n /**\n * Fetch a single RAW transaction from Fireblocks by its transaction ID\n * @returns FireblocksTransaction or undefined if not found\n */\n public async getTransaction(\n userId: string | undefined,\n txId: string\n ): Promise<FireblocksTransaction | undefined> {\n try {\n const client = this.getClient(userId)\n const transaction = await client.transactions.getTransaction({\n txId: txId,\n })\n return await this.formatTransaction(userId, transaction.data)\n } catch {\n // if the transaction was not found for any reason, return undefined\n return undefined\n }\n }\n\n /**\n * Get all RAW transactions from Fireblocks. Returns an async generator as\n * this may return a large number of transactions and will occasionally need to\n * refresh the key cache.\n * @returns AsyncGenerator of FireblocksTransactions\n */\n public async *getTransactions(\n userId: string | undefined,\n {\n limit = 200,\n before,\n }: {\n limit?: number\n before?: number\n } = {}\n ): AsyncGenerator<FireblocksTransaction> {\n let fetchedLength = 0\n let beforeQuery: number | undefined = before\n try {\n const client = this.getClient(userId)\n do {\n const transactions = await client.transactions.getTransactions({\n sourceType: 'VAULT_ACCOUNT',\n limit,\n ...(beforeQuery ? { before: beforeQuery.toString() } : {}),\n })\n fetchedLength = transactions.data.length\n for (const tx of transactions.data) {\n // set next before to createdAt - 1 as before is inclusive of any transaction exactly at that\n // timestamp\n beforeQuery = tx.createdAt! - 1\n const formatTransaction = await this.formatTransaction(\n userId,\n tx\n )\n if (formatTransaction) {\n yield formatTransaction\n } else {\n // if the transaction failed to format, continue so we do not skip remaining valid transactions\n continue\n }\n }\n // once the fetched length is 0 before our last createdAt tx,\n // there will be no transactions to fetch\n } while (fetchedLength > 0)\n } catch (error) {\n logger.error(error, 'Error fetching signatures')\n throw error\n }\n }\n /**\n * Sign a transaction using a public key\n * @param tx - The transaction to sign, as a string\n * @param publicKey - The public key to use for signing\n * @param externalTxId - The transaction ID assigned by the Wallet Gateway\n * @return The transaction object from Fireblocks\n */\n public async signTransaction(\n userId: string | undefined,\n tx: string,\n publicKey: string,\n externalTxId?: string\n ): Promise<FireblocksTransaction> {\n try {\n const client = this.getClient(userId)\n if (!this.keyInfoByPublicKey.has(publicKey)) {\n // refresh the keycache\n await this.getPublicKeys(userId)\n }\n const key = this.keyInfoByPublicKey.get(publicKey)\n if (!key) {\n throw new Error(`Public key ${publicKey} not found in vaults`)\n }\n\n const transaction = await client.transactions.createTransaction({\n transactionRequest: {\n operation: 'RAW',\n note: `Signing transaction with public key ${publicKey}`,\n externalTxId,\n extraParameters: {\n rawMessageData: {\n messages: [\n {\n content: tx,\n derivationPath: key.derivationPath,\n },\n ],\n algorithm: key.algorithm,\n },\n },\n },\n })\n let status: SigningStatus = 'pending'\n switch (transaction.data.status) {\n case 'REJECTED':\n status = 'rejected'\n break\n case 'COMPLETED':\n status = 'signed'\n break\n case 'CANCELLED':\n case 'FAILED':\n case 'BLOCKED':\n status = 'failed'\n break\n }\n\n return {\n txId: transaction.data.id!,\n status,\n publicKey: key.publicKey,\n derivationPath: key.derivationPath,\n }\n } catch (error) {\n logger.error(error, 'Error signing transaction:')\n throw error\n }\n }\n}\n","// Copyright (c) 2025 Digital Asset (Switzerland) GmbH and/or its affiliates. All rights reserved.\n// SPDX-License-Identifier: Apache-2.0\n// Disabled unused vars rule to allow for future implementations\n\n/* eslint-disable @typescript-eslint/no-unused-vars */\nimport {\n buildController,\n PartyMode,\n SigningDriverInterface,\n SigningProvider,\n} from '@canton-network/core-signing-lib'\n\nimport {\n SignTransactionParams,\n SignTransactionResult,\n GetTransactionParams,\n GetTransactionResult,\n GetTransactionsResult,\n GetTransactionsParams,\n GetKeysResult,\n CreateKeyParams,\n CreateKeyResult,\n GetConfigurationResult,\n SetConfigurationParams,\n SubscribeTransactionsParams,\n SubscribeTransactionsResult,\n SetConfigurationResult,\n Transaction,\n} from '@canton-network/core-signing-lib'\nimport { FireblocksHandler, FireblocksApiKeyInfo } from './fireblocks.js'\nimport _ from 'lodash'\nimport { z } from 'zod'\nimport { AuthContext } from '@canton-network/core-wallet-auth'\n\nexport interface FireblocksConfig {\n defaultKeyInfo?: FireblocksApiKeyInfo\n userApiKeys: Map<string, FireblocksApiKeyInfo>\n apiPath?: string\n}\n\nconst FireblocksApiKeyInfoSchema = z.object({\n apiKey: z.string(),\n apiSecret: z.string(),\n})\n\nconst FireblocksConfigSchema = z.object({\n defaultApiKey: FireblocksApiKeyInfoSchema.optional(),\n userApiKeys: z.map(z.string(), FireblocksApiKeyInfoSchema),\n apiPath: z.string().optional(),\n})\n\nconst createFireblocksHandler = (\n config: FireblocksConfig\n): FireblocksHandler => {\n return new FireblocksHandler(\n config.defaultKeyInfo\n ? {\n apiKey: config.defaultKeyInfo.apiKey,\n apiSecret: config.defaultKeyInfo.apiSecret,\n }\n : undefined,\n config.userApiKeys,\n config.apiPath || 'https://api.fireblocks.io/v1'\n )\n}\n\nexport default class FireblocksSigningDriver implements SigningDriverInterface {\n private fireblocks: FireblocksHandler\n private config: FireblocksConfig\n\n constructor(config: FireblocksConfig) {\n this.config = config\n this.fireblocks = createFireblocksHandler(config)\n }\n public partyMode = PartyMode.EXTERNAL\n public signingProvider = SigningProvider.FIREBLOCKS\n public controller = (userId: AuthContext['userId'] | undefined) =>\n buildController({\n signTransaction: async (\n params: SignTransactionParams\n ): Promise<SignTransactionResult> => {\n // TODO: validate transaction here\n\n try {\n const tx = await this.fireblocks.signTransaction(\n userId,\n params.txHash,\n params.publicKey,\n params.internalTxId\n )\n return {\n txId: tx.txId,\n status: tx.status,\n signature: tx.signature,\n publicKey: tx.publicKey,\n }\n } catch (error) {\n return {\n error: 'signing_error',\n error_description: (error as Error).message,\n }\n }\n },\n\n getTransaction: async (\n params: GetTransactionParams\n ): Promise<GetTransactionResult> => {\n const tx = await this.fireblocks.getTransaction(\n userId,\n params.txId\n )\n if (tx) {\n return {\n txId: tx.txId,\n status: tx.status,\n signature: tx.signature,\n publicKey: tx.publicKey,\n } as GetTransactionResult\n } else {\n return {\n error: 'transaction_not_found',\n error_description:\n 'The requested transaction does not exist.',\n }\n }\n },\n\n getTransactions: async (\n params: GetTransactionsParams\n ): Promise<GetTransactionsResult> => {\n const transactions: Transaction[] = []\n if (params.publicKeys || params.txIds) {\n const txIds = new Set(params.txIds)\n const publicKeys = new Set(params.publicKeys)\n for await (const tx of this.fireblocks.getTransactions(\n userId\n )) {\n if (\n txIds.has(tx.txId) ||\n publicKeys.has(tx.publicKey || '')\n ) {\n transactions.push({\n txId: tx.txId,\n status: tx.status,\n signature: tx.signature,\n publicKey: tx.publicKey,\n })\n }\n if (\n params.txIds &&\n !params.publicKeys &&\n transactions.length == txIds.size\n ) {\n // stop if we are filtering by only txIds and have found all requested transactions\n break\n }\n }\n return {\n transactions: transactions,\n }\n } else {\n return {\n error: 'bad_arguments',\n error_description:\n 'either public key or txIds must be supplied',\n }\n }\n },\n\n getKeys: async (): Promise<GetKeysResult> => {\n try {\n const keys = await this.fireblocks.getPublicKeys(userId)\n return {\n keys: keys.map((k) => ({\n id: k.derivationPath.join('-'),\n name: k.name,\n publicKey: k.publicKey,\n })),\n }\n } catch (error) {\n return {\n error: 'fetch_error',\n error_description: (error as Error).message,\n }\n }\n },\n\n createKey: async (\n _params: CreateKeyParams\n ): Promise<CreateKeyResult> => {\n return {\n error: 'not_allowed',\n error_description:\n 'Creating a Fireblocks key through the Wallet Gateway is not allowed, please create new keys directly in Fireblocks.',\n }\n },\n\n getConfiguration: async (): Promise<GetConfigurationResult> => {\n const hideFireblocksKeySecret = (\n keyInfo: FireblocksApiKeyInfo | undefined\n ): FireblocksApiKeyInfo | undefined => {\n return keyInfo\n ? {\n apiKey: keyInfo.apiKey,\n apiSecret: '***HIDDEN***',\n }\n : undefined\n }\n\n return {\n ...this.config,\n defaultKeyInfo: hideFireblocksKeySecret(\n this.config.defaultKeyInfo\n ),\n userApiKeys: new Map(\n [...this.config.userApiKeys].map(([k, v]) => [\n k,\n hideFireblocksKeySecret(v),\n ])\n ),\n }\n },\n\n setConfiguration: async (\n params: SetConfigurationParams\n ): Promise<SetConfigurationResult> => {\n const validated = FireblocksConfigSchema.safeParse(params)\n if (!validated.success) {\n return {\n error: 'bad_arguments',\n error_description: validated.error.message,\n }\n }\n if (!_.isEqual(validated.data, this.config)) {\n this.config = validated.data\n this.fireblocks = createFireblocksHandler(this.config)\n }\n return params\n },\n\n // TODO: implement subscribeTransactions - we will need to figure out how to handle subscriptions\n // when the controller is not running in a server context\n subscribeTransactions: async (\n params: SubscribeTransactionsParams\n ): Promise<SubscribeTransactionsResult> =>\n Promise.resolve({} as SubscribeTransactionsResult),\n })\n}\n"]}
|