@cardano-sdk/key-management 0.11.0 → 0.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/InMemoryKeyAgent.d.ts.map +1 -1
- package/dist/cjs/InMemoryKeyAgent.js +11 -10
- package/dist/cjs/InMemoryKeyAgent.js.map +1 -1
- package/dist/cjs/tsconfig.tsbuildinfo +1 -1
- package/dist/cjs/util/ownSignatureKeyPaths.d.ts +23 -1
- package/dist/cjs/util/ownSignatureKeyPaths.d.ts.map +1 -1
- package/dist/cjs/util/ownSignatureKeyPaths.js +186 -46
- package/dist/cjs/util/ownSignatureKeyPaths.js.map +1 -1
- package/dist/cjs/util/stubSignTransaction.d.ts +10 -1
- package/dist/cjs/util/stubSignTransaction.d.ts.map +1 -1
- package/dist/cjs/util/stubSignTransaction.js +4 -2
- package/dist/cjs/util/stubSignTransaction.js.map +1 -1
- package/dist/esm/InMemoryKeyAgent.d.ts.map +1 -1
- package/dist/esm/InMemoryKeyAgent.js +3 -2
- package/dist/esm/InMemoryKeyAgent.js.map +1 -1
- package/dist/esm/tsconfig.tsbuildinfo +1 -1
- package/dist/esm/util/ownSignatureKeyPaths.d.ts +23 -1
- package/dist/esm/util/ownSignatureKeyPaths.d.ts.map +1 -1
- package/dist/esm/util/ownSignatureKeyPaths.js +182 -45
- package/dist/esm/util/ownSignatureKeyPaths.js.map +1 -1
- package/dist/esm/util/stubSignTransaction.d.ts +10 -1
- package/dist/esm/util/stubSignTransaction.d.ts.map +1 -1
- package/dist/esm/util/stubSignTransaction.js +4 -2
- package/dist/esm/util/stubSignTransaction.js.map +1 -1
- package/package.json +7 -8
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"InMemoryKeyAgent.d.ts","sourceRoot":"","sources":["../../src/InMemoryKeyAgent.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,MAAM,MAAM,qBAAqB,CAAC;AAE9C,OAAO,EACL,wBAAwB,EACxB,aAAa,EACb,QAAQ,EACR,oBAAoB,EAEpB,OAAO,EACP,gCAAgC,EAChC,cAAc,EACd,sBAAsB,EACvB,MAAM,SAAS,CAAC;AACjB,OAAO,EAAE,OAAO,EAAE,MAAM,mBAAmB,CAAC;
|
|
1
|
+
{"version":3,"file":"InMemoryKeyAgent.d.ts","sourceRoot":"","sources":["../../src/InMemoryKeyAgent.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,MAAM,MAAM,qBAAqB,CAAC;AAE9C,OAAO,EACL,wBAAwB,EACxB,aAAa,EACb,QAAQ,EACR,oBAAoB,EAEpB,OAAO,EACP,gCAAgC,EAChC,cAAc,EACd,sBAAsB,EACvB,MAAM,SAAS,CAAC;AACjB,OAAO,EAAE,OAAO,EAAE,MAAM,mBAAmB,CAAC;AAU5C,OAAO,EAAE,OAAO,EAAE,MAAM,mBAAmB,CAAC;AAC5C,OAAO,EAAE,YAAY,EAAE,MAAM,gBAAgB,CAAC;AAI9C,MAAM,WAAW,qBAAsB,SAAQ,IAAI,CAAC,gCAAgC,EAAE,YAAY,CAAC;IACjG,aAAa,EAAE,aAAa,CAAC;CAC9B;AAED,MAAM,WAAW,2BAA2B;IAC1C,OAAO,EAAE,OAAO,CAAC,OAAO,CAAC;IACzB,aAAa,EAAE,MAAM,EAAE,CAAC;IACxB,2BAA2B,CAAC,EAAE,MAAM,CAAC;IACrC,aAAa,EAAE,aAAa,CAAC;IAC7B,YAAY,CAAC,EAAE,MAAM,CAAC;CACvB;AAUD,qBAAa,gBAAiB,SAAQ,YAAa,YAAW,QAAQ;;gBAGxD,EAAE,aAAa,EAAE,GAAG,gBAAgB,EAAE,EAAE,qBAAqB,EAAE,YAAY,EAAE,oBAAoB;IAKvG,QAAQ,CAAC,EAAE,KAAK,EAAE,IAAI,EAAE,IAAI,EAAE,EAAE,wBAAwB,EAAE,IAAI,EAAE,OAAO,GAAG,OAAO,CAAC,cAAc,CAAC;IAqBjG,oBAAoB,IAAI,OAAO,CAAC,MAAM,CAAC,kBAAkB,CAAC;WAOnD,sBAAsB,CACjC,EACE,OAAO,EACP,aAAa,EACb,aAAa,EACb,2BAAgC,EAChC,YAAgB,EACjB,EAAE,2BAA2B,EAC9B,YAAY,EAAE,oBAAoB,GACjC,OAAO,CAAC,gBAAgB,CAAC;IA6BtB,eAAe,CACnB,EAAE,IAAI,EAAE,IAAI,EAAE,EAAE,OAAO,CAAC,cAAc,EACtC,EAAE,kBAAuB,EAAE,GAAE,sBAAsB,GAAG,SAAc,GACnE,OAAO,CAAC,OAAO,CAAC,UAAU,CAAC;IAyBxB,qBAAqB,CAAC,cAAc,EAAE,MAAM,EAAE,GAAG,OAAO,CAAC,OAAO,CAAC;CAwBxE"}
|
|
@@ -42,9 +42,9 @@ exports.InMemoryKeyAgent = void 0;
|
|
|
42
42
|
const Crypto = __importStar(require("@cardano-sdk/crypto"));
|
|
43
43
|
const errors = __importStar(require("./errors"));
|
|
44
44
|
const types_1 = require("./types");
|
|
45
|
-
const util_1 = require("
|
|
45
|
+
const util_1 = require("./util");
|
|
46
|
+
const util_2 = require("@cardano-sdk/util");
|
|
46
47
|
const KeyAgentBase_1 = require("./KeyAgentBase");
|
|
47
|
-
const util_2 = require("./util");
|
|
48
48
|
const emip3_1 = require("./emip3");
|
|
49
49
|
const uniqBy_1 = __importDefault(require("lodash/uniqBy"));
|
|
50
50
|
const getPassphraseRethrowTypedError = async (getPassphrase) => {
|
|
@@ -64,7 +64,7 @@ class InMemoryKeyAgent extends KeyAgentBase_1.KeyAgentBase {
|
|
|
64
64
|
}
|
|
65
65
|
async signBlob({ index, role: type }, blob) {
|
|
66
66
|
const rootPrivateKey = await __classPrivateFieldGet(this, _InMemoryKeyAgent_instances, "m", _InMemoryKeyAgent_decryptRootPrivateKey).call(this);
|
|
67
|
-
const accountKey = await (0,
|
|
67
|
+
const accountKey = await (0, util_1.deriveAccountPrivateKey)({
|
|
68
68
|
accountIndex: this.accountIndex,
|
|
69
69
|
bip32Ed25519: this.bip32Ed25519,
|
|
70
70
|
rootPrivateKey
|
|
@@ -79,15 +79,15 @@ class InMemoryKeyAgent extends KeyAgentBase_1.KeyAgentBase {
|
|
|
79
79
|
return await __classPrivateFieldGet(this, _InMemoryKeyAgent_instances, "m", _InMemoryKeyAgent_decryptRootPrivateKey).call(this, true);
|
|
80
80
|
}
|
|
81
81
|
static async fromBip39MnemonicWords({ chainId, getPassphrase, mnemonicWords, mnemonic2ndFactorPassphrase = '', accountIndex = 0 }, dependencies) {
|
|
82
|
-
const mnemonic = (0,
|
|
83
|
-
const validMnemonic = (0,
|
|
82
|
+
const mnemonic = (0, util_1.joinMnemonicWords)(mnemonicWords);
|
|
83
|
+
const validMnemonic = (0, util_1.validateMnemonic)(mnemonic);
|
|
84
84
|
if (!validMnemonic)
|
|
85
85
|
throw new errors.InvalidMnemonicError();
|
|
86
|
-
const entropy = Buffer.from((0,
|
|
86
|
+
const entropy = Buffer.from((0, util_1.mnemonicWordsToEntropy)(mnemonicWords), 'hex');
|
|
87
87
|
const rootPrivateKey = await dependencies.bip32Ed25519.fromBip39Entropy(entropy, mnemonic2ndFactorPassphrase);
|
|
88
88
|
const passphrase = await getPassphraseRethrowTypedError(getPassphrase);
|
|
89
89
|
const encryptedRootPrivateKey = await (0, emip3_1.emip3encrypt)(Buffer.from(rootPrivateKey, 'hex'), passphrase);
|
|
90
|
-
const accountPrivateKey = await (0,
|
|
90
|
+
const accountPrivateKey = await (0, util_1.deriveAccountPrivateKey)({
|
|
91
91
|
accountIndex,
|
|
92
92
|
bip32Ed25519: dependencies.bip32Ed25519,
|
|
93
93
|
rootPrivateKey
|
|
@@ -103,8 +103,9 @@ class InMemoryKeyAgent extends KeyAgentBase_1.KeyAgentBase {
|
|
|
103
103
|
}, dependencies);
|
|
104
104
|
}
|
|
105
105
|
async signTransaction({ body, hash }, { additionalKeyPaths = [] } = {}) {
|
|
106
|
-
const blob = (0,
|
|
107
|
-
const
|
|
106
|
+
const blob = (0, util_2.HexBlob)(hash);
|
|
107
|
+
const dRepKeyHash = (await Crypto.Ed25519PublicKey.fromHex(await this.derivePublicKey(util_1.DREP_KEY_DERIVATION_PATH)).hash()).hex();
|
|
108
|
+
const derivationPaths = await (0, util_1.ownSignatureKeyPaths)(body, this.knownAddresses, this.inputResolver, dRepKeyHash);
|
|
108
109
|
const keyPaths = (0, uniqBy_1.default)([...derivationPaths, ...additionalKeyPaths], ({ role, index }) => `${role}.${index}`);
|
|
109
110
|
return new Map(await Promise.all(keyPaths.map(async ({ role, index }) => {
|
|
110
111
|
const { publicKey, signature } = await this.signBlob({ index, role }, blob);
|
|
@@ -113,7 +114,7 @@ class InMemoryKeyAgent extends KeyAgentBase_1.KeyAgentBase {
|
|
|
113
114
|
}
|
|
114
115
|
async exportExtendedKeyPair(derivationPath) {
|
|
115
116
|
const rootPrivateKey = await this.exportRootPrivateKey();
|
|
116
|
-
const hardenedIndices = derivationPath.map((index) => (0,
|
|
117
|
+
const hardenedIndices = derivationPath.map((index) => (0, util_1.harden)(index));
|
|
117
118
|
const childKey = await this.bip32Ed25519.derivePrivateKey(rootPrivateKey, hardenedIndices);
|
|
118
119
|
return {
|
|
119
120
|
skey: childKey,
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"InMemoryKeyAgent.js","sourceRoot":"","sources":["../../src/InMemoryKeyAgent.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,4DAA8C;AAC9C,iDAAmC;AACnC,mCAUiB;AAEjB,4CAA4C;AAC5C,iDAA8C;AAC9C,
|
|
1
|
+
{"version":3,"file":"InMemoryKeyAgent.js","sourceRoot":"","sources":["../../src/InMemoryKeyAgent.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,4DAA8C;AAC9C,iDAAmC;AACnC,mCAUiB;AAEjB,iCAQgB;AAChB,4CAA4C;AAC5C,iDAA8C;AAC9C,mCAAqD;AACrD,2DAAmC;AAcnC,MAAM,8BAA8B,GAAG,KAAK,EAAE,aAA4B,EAAE,EAAE;IAC5E,IAAI;QACF,OAAO,MAAM,aAAa,EAAE,CAAC;KAC9B;IAAC,OAAO,KAAK,EAAE;QACd,MAAM,IAAI,MAAM,CAAC,mBAAmB,CAAC,4BAA4B,EAAE,KAAK,CAAC,CAAC;KAC3E;AACH,CAAC,CAAC;AAEF,MAAa,gBAAiB,SAAQ,2BAAY;IAGhD,YAAY,EAAE,aAAa,EAAE,GAAG,gBAAgB,EAAyB,EAAE,YAAkC;QAC3G,KAAK,CAAC,EAAE,GAAG,gBAAgB,EAAE,UAAU,EAAE,oBAAY,CAAC,QAAQ,EAAE,EAAE,YAAY,CAAC,CAAC;;QAHlF,kDAAuC;QAIrC,uBAAA,IAAI,mCAAkB,aAAa,MAAA,CAAC;IACtC,CAAC;IAED,KAAK,CAAC,QAAQ,CAAC,EAAE,KAAK,EAAE,IAAI,EAAE,IAAI,EAA4B,EAAE,IAAa;QAC3E,MAAM,cAAc,GAAG,MAAM,uBAAA,IAAI,4EAAuB,MAA3B,IAAI,CAAyB,CAAC;QAC3D,MAAM,UAAU,GAAG,MAAM,IAAA,8BAAuB,EAAC;YAC/C,YAAY,EAAE,IAAI,CAAC,YAAY;YAC/B,YAAY,EAAE,IAAI,CAAC,YAAY;YAC/B,cAAc;SACf,CAAC,CAAC;QAEH,MAAM,eAAe,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,gBAAgB,CAAC,UAAU,EAAE,CAAC,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC;QAC5F,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,gBAAgB,CAAC,eAAe,CAAC,CAAC;QAC7E,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,IAAI,CAAC,UAAU,EAAE,IAAI,CAAC,CAAC;QACjE,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,YAAY,CAAC,UAAU,CAAC,CAAC;QAEnE,OAAO,EAAE,SAAS,EAAE,SAAS,EAAE,CAAC;IAClC,CAAC;IAOD,KAAK,CAAC,oBAAoB;QACxB,OAAO,MAAM,uBAAA,IAAI,4EAAuB,MAA3B,IAAI,EAAwB,IAAI,CAAC,CAAC;IACjD,CAAC;IAKD,MAAM,CAAC,KAAK,CAAC,sBAAsB,CACjC,EACE,OAAO,EACP,aAAa,EACb,aAAa,EACb,2BAA2B,GAAG,EAAE,EAChC,YAAY,GAAG,CAAC,EACY,EAC9B,YAAkC;QAElC,MAAM,QAAQ,GAAG,IAAA,wBAAiB,EAAC,aAAa,CAAC,CAAC;QAClD,MAAM,aAAa,GAAG,IAAA,uBAAgB,EAAC,QAAQ,CAAC,CAAC;QACjD,IAAI,CAAC,aAAa;YAAE,MAAM,IAAI,MAAM,CAAC,oBAAoB,EAAE,CAAC;QAC5D,MAAM,OAAO,GAAG,MAAM,CAAC,IAAI,CAAC,IAAA,6BAAsB,EAAC,aAAa,CAAC,EAAE,KAAK,CAAC,CAAC;QAC1E,MAAM,cAAc,GAAG,MAAM,YAAY,CAAC,YAAY,CAAC,gBAAgB,CAAC,OAAO,EAAE,2BAA2B,CAAC,CAAC;QAC9G,MAAM,UAAU,GAAG,MAAM,8BAA8B,CAAC,aAAa,CAAC,CAAC;QACvE,MAAM,uBAAuB,GAAG,MAAM,IAAA,oBAAY,EAAC,MAAM,CAAC,IAAI,CAAC,cAAc,EAAE,KAAK,CAAC,EAAE,UAAU,CAAC,CAAC;QACnG,MAAM,iBAAiB,GAAG,MAAM,IAAA,8BAAuB,EAAC;YACtD,YAAY;YACZ,YAAY,EAAE,YAAY,CAAC,YAAY;YACvC,cAAc;SACf,CAAC,CAAC;QAEH,MAAM,wBAAwB,GAAG,MAAM,YAAY,CAAC,YAAY,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,CAAC;QAEtG,OAAO,IAAI,gBAAgB,CACzB;YACE,YAAY;YACZ,OAAO;YACP,4BAA4B,EAAE,CAAC,GAAG,uBAAuB,CAAC;YAC1D,wBAAwB;YACxB,aAAa;YACb,cAAc,EAAE,EAAE;SACnB,EACD,YAAY,CACb,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,EAAE,IAAI,EAAE,IAAI,EAA0B,EACtC,EAAE,kBAAkB,GAAG,EAAE,KAAyC,EAAE;QAGpE,MAAM,IAAI,GAAG,IAAA,cAAO,EAAC,IAAI,CAAC,CAAC;QAC3B,MAAM,WAAW,GAAG,CAClB,MAAM,MAAM,CAAC,gBAAgB,CAAC,OAAO,CAAC,MAAM,IAAI,CAAC,eAAe,CAAC,+BAAwB,CAAC,CAAC,CAAC,IAAI,EAAE,CACnG,CAAC,GAAG,EAAE,CAAC;QACR,MAAM,eAAe,GAAG,MAAM,IAAA,2BAAoB,EAAC,IAAI,EAAE,IAAI,CAAC,cAAc,EAAE,IAAI,CAAC,aAAa,EAAE,WAAW,CAAC,CAAC;QAC/G,MAAM,QAAQ,GAAG,IAAA,gBAAM,EAAC,CAAC,GAAG,eAAe,EAAE,GAAG,kBAAkB,CAAC,EAAE,CAAC,EAAE,IAAI,EAAE,KAAK,EAAE,EAAE,EAAE,CAAC,GAAG,IAAI,IAAI,KAAK,EAAE,CAAC,CAAC;QAK9G,OAAO,IAAI,GAAG,CACZ,MAAM,OAAO,CAAC,GAAG,CACf,QAAQ,CAAC,GAAG,CAAC,KAAK,EAAE,EAAE,IAAI,EAAE,KAAK,EAAE,EAAE,EAAE;YACrC,MAAM,EAAE,SAAS,EAAE,SAAS,EAAE,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,EAAE,KAAK,EAAE,IAAI,EAAE,EAAE,IAAI,CAAC,CAAC;YAC5E,OAAO,CAAC,SAAS,EAAE,SAAS,CAAU,CAAC;QACzC,CAAC,CAAC,CACH,CACF,CAAC;IACJ,CAAC;IAKD,KAAK,CAAC,qBAAqB,CAAC,cAAwB;QAClD,MAAM,cAAc,GAAG,MAAM,IAAI,CAAC,oBAAoB,EAAE,CAAC;QACzD,MAAM,eAAe,GAAG,cAAc,CAAC,GAAG,CAAC,CAAC,KAAa,EAAE,EAAE,CAAC,IAAA,aAAM,EAAC,KAAK,CAAC,CAAC,CAAC;QAC7E,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,gBAAgB,CAAC,cAAc,EAAE,eAAe,CAAC,CAAC;QAE3F,OAAO;YACL,IAAI,EAAE,QAAQ;YACd,IAAI,EAAE,MAAM,IAAI,CAAC,YAAY,CAAC,iBAAiB,CAAC,QAAQ,CAAC;SAC1D,CAAC;IACJ,CAAC;CAeF;AA9HD,4CA8HC;wIAbC,KAAK,kDAAwB,OAAc;IACzC,MAAM,UAAU,GAAG,MAAM,8BAA8B,CAAC,GAAG,EAAE,CAAC,uBAAA,IAAI,uCAAe,MAAnB,IAAI,EAAgB,OAAO,CAAC,CAAC,CAAC;IAC5F,IAAI,qBAAiC,CAAC;IACtC,IAAI;QACF,qBAAqB,GAAG,MAAM,IAAA,oBAAY,EACxC,IAAI,UAAU,CAAE,IAAI,CAAC,gBAAqD,CAAC,4BAA4B,CAAC,EACxG,UAAU,CACX,CAAC;KACH;IAAC,OAAO,KAAK,EAAE;QACd,MAAM,IAAI,MAAM,CAAC,mBAAmB,CAAC,oCAAoC,EAAE,KAAK,CAAC,CAAC;KACnF;IACD,OAAO,MAAM,CAAC,kBAAkB,CAAC,MAAM,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC;AACvF,CAAC"}
|