@cubist-labs/cubesigner-sdk-ethers-v6 0.3.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +8 -0
- package/dist/index.d.ts +87 -0
- package/dist/index.js +212 -0
- package/package.json +31 -0
- package/src/index.ts +255 -0
- package/tsconfig.json +14 -0
package/README.md
ADDED
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
# Ethers.js Signer implementation for CubeSigner TypeScript SDK
|
|
2
|
+
|
|
3
|
+
This package provides a concrete implementation of the `AbstractSigner` abstract class
|
|
4
|
+
from the `ethers` package that offloads all signing tasks to a remote CubeSigner service.
|
|
5
|
+
|
|
6
|
+
For more information, check out the
|
|
7
|
+
[@cubist-labs/cubesigner-sdk](https://www.npmjs.com/package/@cubist-labs/cubesigner-sdk)
|
|
8
|
+
NPM package.
|
package/dist/index.d.ts
ADDED
|
@@ -0,0 +1,87 @@
|
|
|
1
|
+
import { TypedDataDomain, TypedDataField, ethers } from "ethers";
|
|
2
|
+
import { KeyInfo, EvmSignRequest, MfaRequestInfo, SignerSession } from "@cubist-labs/cubesigner-sdk";
|
|
3
|
+
/** Options for the signer */
|
|
4
|
+
export interface SignerOptions {
|
|
5
|
+
/** Optional provider to use */
|
|
6
|
+
provider?: null | ethers.Provider;
|
|
7
|
+
/**
|
|
8
|
+
* The function to call when MFA information is retrieved. If this callback
|
|
9
|
+
* throws, no transaction is broadcast.
|
|
10
|
+
*/
|
|
11
|
+
onMfaPoll?: (arg0: MfaRequestInfo) => void;
|
|
12
|
+
/**
|
|
13
|
+
* The amount of time (in milliseconds) to wait between checks for MFA
|
|
14
|
+
* updates. Default is 1000ms
|
|
15
|
+
*/
|
|
16
|
+
mfaPollIntervalMs?: number;
|
|
17
|
+
}
|
|
18
|
+
/**
|
|
19
|
+
* A ethers.js Signer using CubeSigner
|
|
20
|
+
*/
|
|
21
|
+
export declare class Signer extends ethers.AbstractSigner {
|
|
22
|
+
#private;
|
|
23
|
+
/**
|
|
24
|
+
* Create new Signer instance
|
|
25
|
+
* @param {KeyInfo | string} address The key or the eth address of the account to use.
|
|
26
|
+
* @param {SignerSession} signerSession The underlying Signer session.
|
|
27
|
+
* @param {SignerOptions} options The options to use for the Signer instance
|
|
28
|
+
*/
|
|
29
|
+
constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions);
|
|
30
|
+
/** Resolves to the signer address. */
|
|
31
|
+
getAddress(): Promise<string>;
|
|
32
|
+
/**
|
|
33
|
+
* Returns the signer connected to %%provider%%.
|
|
34
|
+
* @param {null | ethers.Provider} provider The optional provider instance to use.
|
|
35
|
+
* @return {Signer} The signer connected to signer.
|
|
36
|
+
*/
|
|
37
|
+
connect(provider: null | ethers.Provider): Signer;
|
|
38
|
+
/**
|
|
39
|
+
* Construct a signing request from a transaction. This populates the transaction
|
|
40
|
+
* type to `0x02` (EIP-1559) unless set.
|
|
41
|
+
*
|
|
42
|
+
* @param {ethers.TransactionRequest} tx The transaction
|
|
43
|
+
* @return {EvmSignRequest} The EVM sign request to be sent to CubeSigner
|
|
44
|
+
*/
|
|
45
|
+
evmSignRequestFromTx(tx: ethers.TransactionRequest): Promise<EvmSignRequest>;
|
|
46
|
+
/**
|
|
47
|
+
* Sign a transaction. This method will block if the key requires MFA approval.
|
|
48
|
+
* @param {ethers.TransactionRequest} tx The transaction to sign.
|
|
49
|
+
* @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
|
|
50
|
+
*/
|
|
51
|
+
signTransaction(tx: ethers.TransactionRequest): Promise<string>;
|
|
52
|
+
/**
|
|
53
|
+
* Signs arbitrary messages. This uses CubeSigner's EIP-191 signing endpoint.
|
|
54
|
+
* The key (for this session) must have the `"AllowRawBlobSigning"` or
|
|
55
|
+
* `"AllowEip191Signing"` policy attached.
|
|
56
|
+
* @param {string | Uint8Array} message The message to sign.
|
|
57
|
+
* @return {Promise<string>} The signature.
|
|
58
|
+
*/
|
|
59
|
+
signMessage(message: string | Uint8Array): Promise<string>;
|
|
60
|
+
/**
|
|
61
|
+
* Signs EIP-712 typed data. This uses CubeSigner's EIP-712 signing endpoint.
|
|
62
|
+
* The key (for this session) must have the `"AllowRawBlobSigning"` or
|
|
63
|
+
* `"AllowEip712Signing"` policy attached.
|
|
64
|
+
* @param {TypedDataDomain} domain The domain of the typed data.
|
|
65
|
+
* @param {Record<string, Array<TypedDataField>>} types The types of the typed data.
|
|
66
|
+
* @param {Record<string, any>} value The value of the typed data.
|
|
67
|
+
* @return {Promise<string>} The signature.
|
|
68
|
+
*/
|
|
69
|
+
signTypedData(domain: TypedDataDomain, types: Record<string, Array<TypedDataField>>, value: Record<string, any>): Promise<string>;
|
|
70
|
+
/** @return {KeyInfo} The key corresponding to this address */
|
|
71
|
+
private key;
|
|
72
|
+
/**
|
|
73
|
+
* Initialize the signing a message using MFA approvals. This method populates
|
|
74
|
+
* missing fields. If the signing does not require MFA, this method throws.
|
|
75
|
+
* @param {ethers.TransactionRequest} tx The transaction to send.
|
|
76
|
+
* @return {string} The MFA id associated with the signing request.
|
|
77
|
+
*/
|
|
78
|
+
sendTransactionMfaInit(tx: ethers.TransactionRequest): Promise<string>;
|
|
79
|
+
/**
|
|
80
|
+
* Send a transaction from an approved MFA request. The MFA request contains
|
|
81
|
+
* information about the approved signing request, which this method will
|
|
82
|
+
* execute.
|
|
83
|
+
* @param {MfaRequestInfo} mfaInfo The approved MFA request.
|
|
84
|
+
* @return {ethers.TransactionResponse} The result of submitting the transaction
|
|
85
|
+
*/
|
|
86
|
+
sendTransactionMfaApproved(mfaInfo: MfaRequestInfo): Promise<ethers.TransactionResponse>;
|
|
87
|
+
}
|
package/dist/index.js
ADDED
|
@@ -0,0 +1,212 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
3
|
+
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
4
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
5
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
6
|
+
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
7
|
+
};
|
|
8
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
9
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
10
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
11
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
12
|
+
};
|
|
13
|
+
var _Signer_instances, _Signer_address, _Signer_key, _Signer_signerSession, _Signer_onMfaPoll, _Signer_mfaPollIntervalMs, _Signer_handleMfa;
|
|
14
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
+
exports.Signer = void 0;
|
|
16
|
+
const ethers_1 = require("ethers");
|
|
17
|
+
const cubesigner_sdk_1 = require("@cubist-labs/cubesigner-sdk");
|
|
18
|
+
/**
|
|
19
|
+
* A ethers.js Signer using CubeSigner
|
|
20
|
+
*/
|
|
21
|
+
class Signer extends ethers_1.ethers.AbstractSigner {
|
|
22
|
+
/**
|
|
23
|
+
* Create new Signer instance
|
|
24
|
+
* @param {KeyInfo | string} address The key or the eth address of the account to use.
|
|
25
|
+
* @param {SignerSession} signerSession The underlying Signer session.
|
|
26
|
+
* @param {SignerOptions} options The options to use for the Signer instance
|
|
27
|
+
*/
|
|
28
|
+
constructor(address, signerSession, options) {
|
|
29
|
+
super(options?.provider);
|
|
30
|
+
_Signer_instances.add(this);
|
|
31
|
+
/** The address of the account */
|
|
32
|
+
_Signer_address.set(this, void 0);
|
|
33
|
+
/** The key to use for signing */
|
|
34
|
+
_Signer_key.set(this, void 0);
|
|
35
|
+
/** The underlying session */
|
|
36
|
+
_Signer_signerSession.set(this, void 0);
|
|
37
|
+
/**
|
|
38
|
+
* The function to call when MFA information is retrieved. If this callback
|
|
39
|
+
* throws, no transaction is broadcast.
|
|
40
|
+
*/
|
|
41
|
+
_Signer_onMfaPoll.set(this, void 0);
|
|
42
|
+
/** The amount of time to wait between checks for MFA updates */
|
|
43
|
+
_Signer_mfaPollIntervalMs.set(this, void 0);
|
|
44
|
+
if (typeof address === "string") {
|
|
45
|
+
__classPrivateFieldSet(this, _Signer_address, address, "f");
|
|
46
|
+
}
|
|
47
|
+
else {
|
|
48
|
+
__classPrivateFieldSet(this, _Signer_address, address.materialId, "f");
|
|
49
|
+
__classPrivateFieldSet(this, _Signer_key, address, "f");
|
|
50
|
+
}
|
|
51
|
+
__classPrivateFieldSet(this, _Signer_signerSession, signerSession, "f");
|
|
52
|
+
__classPrivateFieldSet(this, _Signer_onMfaPoll, options?.onMfaPoll ?? (( /* _mfaInfo: MfaRequestInfo */) => { }), "f"); // eslint-disable-line @typescript-eslint/no-empty-function
|
|
53
|
+
__classPrivateFieldSet(this, _Signer_mfaPollIntervalMs, options?.mfaPollIntervalMs ?? 1000, "f");
|
|
54
|
+
}
|
|
55
|
+
/** Resolves to the signer address. */
|
|
56
|
+
async getAddress() {
|
|
57
|
+
return __classPrivateFieldGet(this, _Signer_address, "f");
|
|
58
|
+
}
|
|
59
|
+
/**
|
|
60
|
+
* Returns the signer connected to %%provider%%.
|
|
61
|
+
* @param {null | ethers.Provider} provider The optional provider instance to use.
|
|
62
|
+
* @return {Signer} The signer connected to signer.
|
|
63
|
+
*/
|
|
64
|
+
connect(provider) {
|
|
65
|
+
return new Signer(__classPrivateFieldGet(this, _Signer_address, "f"), __classPrivateFieldGet(this, _Signer_signerSession, "f"), { provider });
|
|
66
|
+
}
|
|
67
|
+
/**
|
|
68
|
+
* Construct a signing request from a transaction. This populates the transaction
|
|
69
|
+
* type to `0x02` (EIP-1559) unless set.
|
|
70
|
+
*
|
|
71
|
+
* @param {ethers.TransactionRequest} tx The transaction
|
|
72
|
+
* @return {EvmSignRequest} The EVM sign request to be sent to CubeSigner
|
|
73
|
+
*/
|
|
74
|
+
async evmSignRequestFromTx(tx) {
|
|
75
|
+
// get the chain id from the network or tx
|
|
76
|
+
let chainId = tx.chainId;
|
|
77
|
+
if (chainId === undefined) {
|
|
78
|
+
const network = await this.provider?.getNetwork();
|
|
79
|
+
chainId = network?.chainId?.toString() ?? "1";
|
|
80
|
+
}
|
|
81
|
+
// Convert the transaction into a JSON-RPC transaction
|
|
82
|
+
const rpcTx = this.provider instanceof ethers_1.JsonRpcApiProvider
|
|
83
|
+
? this.provider.getRpcTransaction(tx)
|
|
84
|
+
: // We can just call the getRpcTransaction with a
|
|
85
|
+
// null receiver since it doesn't actually use it
|
|
86
|
+
// (and really should be declared static).
|
|
87
|
+
ethers_1.JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);
|
|
88
|
+
rpcTx.type = (0, ethers_1.toBeHex)(tx.type ?? 0x02, 1); // we expect 0x0[0-2]
|
|
89
|
+
return {
|
|
90
|
+
chain_id: Number(chainId),
|
|
91
|
+
tx: rpcTx,
|
|
92
|
+
};
|
|
93
|
+
}
|
|
94
|
+
/**
|
|
95
|
+
* Sign a transaction. This method will block if the key requires MFA approval.
|
|
96
|
+
* @param {ethers.TransactionRequest} tx The transaction to sign.
|
|
97
|
+
* @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
|
|
98
|
+
*/
|
|
99
|
+
async signTransaction(tx) {
|
|
100
|
+
const req = await this.evmSignRequestFromTx(tx);
|
|
101
|
+
const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEvm(__classPrivateFieldGet(this, _Signer_address, "f"), req);
|
|
102
|
+
const data = await __classPrivateFieldGet(this, _Signer_instances, "m", _Signer_handleMfa).call(this, res);
|
|
103
|
+
return data.rlp_signed_tx;
|
|
104
|
+
}
|
|
105
|
+
/**
|
|
106
|
+
* Signs arbitrary messages. This uses CubeSigner's EIP-191 signing endpoint.
|
|
107
|
+
* The key (for this session) must have the `"AllowRawBlobSigning"` or
|
|
108
|
+
* `"AllowEip191Signing"` policy attached.
|
|
109
|
+
* @param {string | Uint8Array} message The message to sign.
|
|
110
|
+
* @return {Promise<string>} The signature.
|
|
111
|
+
*/
|
|
112
|
+
async signMessage(message) {
|
|
113
|
+
const key = await this.key();
|
|
114
|
+
const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEip191(key.material_id, {
|
|
115
|
+
data: (0, cubesigner_sdk_1.encodeToHex)(message),
|
|
116
|
+
});
|
|
117
|
+
const data = await __classPrivateFieldGet(this, _Signer_instances, "m", _Signer_handleMfa).call(this, res);
|
|
118
|
+
return data.signature;
|
|
119
|
+
}
|
|
120
|
+
/**
|
|
121
|
+
* Signs EIP-712 typed data. This uses CubeSigner's EIP-712 signing endpoint.
|
|
122
|
+
* The key (for this session) must have the `"AllowRawBlobSigning"` or
|
|
123
|
+
* `"AllowEip712Signing"` policy attached.
|
|
124
|
+
* @param {TypedDataDomain} domain The domain of the typed data.
|
|
125
|
+
* @param {Record<string, Array<TypedDataField>>} types The types of the typed data.
|
|
126
|
+
* @param {Record<string, any>} value The value of the typed data.
|
|
127
|
+
* @return {Promise<string>} The signature.
|
|
128
|
+
*/
|
|
129
|
+
async signTypedData(domain, types, value) {
|
|
130
|
+
const key = await this.key();
|
|
131
|
+
const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEip712(key.material_id, {
|
|
132
|
+
chain_id: 1,
|
|
133
|
+
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
|
134
|
+
typed_data: {
|
|
135
|
+
domain,
|
|
136
|
+
types,
|
|
137
|
+
primaryType: ethers_1.TypedDataEncoder.getPrimaryType(types),
|
|
138
|
+
message: value,
|
|
139
|
+
},
|
|
140
|
+
});
|
|
141
|
+
const data = await __classPrivateFieldGet(this, _Signer_instances, "m", _Signer_handleMfa).call(this, res);
|
|
142
|
+
return data.signature;
|
|
143
|
+
}
|
|
144
|
+
/** @return {KeyInfo} The key corresponding to this address */
|
|
145
|
+
async key() {
|
|
146
|
+
if (__classPrivateFieldGet(this, _Signer_key, "f") === undefined) {
|
|
147
|
+
const key = (await __classPrivateFieldGet(this, _Signer_signerSession, "f").keys()).find((k) => k.material_id === __classPrivateFieldGet(this, _Signer_address, "f"));
|
|
148
|
+
if (key === undefined) {
|
|
149
|
+
throw new Error(`Cannot access key '${__classPrivateFieldGet(this, _Signer_address, "f")}'`);
|
|
150
|
+
}
|
|
151
|
+
__classPrivateFieldSet(this, _Signer_key, key, "f");
|
|
152
|
+
}
|
|
153
|
+
return __classPrivateFieldGet(this, _Signer_key, "f");
|
|
154
|
+
}
|
|
155
|
+
/**
|
|
156
|
+
* Initialize the signing a message using MFA approvals. This method populates
|
|
157
|
+
* missing fields. If the signing does not require MFA, this method throws.
|
|
158
|
+
* @param {ethers.TransactionRequest} tx The transaction to send.
|
|
159
|
+
* @return {string} The MFA id associated with the signing request.
|
|
160
|
+
*/
|
|
161
|
+
async sendTransactionMfaInit(tx) {
|
|
162
|
+
const popTx = await this.populateTransaction(tx);
|
|
163
|
+
const req = await this.evmSignRequestFromTx(popTx);
|
|
164
|
+
const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEvm(__classPrivateFieldGet(this, _Signer_address, "f"), req);
|
|
165
|
+
return res.mfaId();
|
|
166
|
+
}
|
|
167
|
+
/**
|
|
168
|
+
* Send a transaction from an approved MFA request. The MFA request contains
|
|
169
|
+
* information about the approved signing request, which this method will
|
|
170
|
+
* execute.
|
|
171
|
+
* @param {MfaRequestInfo} mfaInfo The approved MFA request.
|
|
172
|
+
* @return {ethers.TransactionResponse} The result of submitting the transaction
|
|
173
|
+
*/
|
|
174
|
+
async sendTransactionMfaApproved(mfaInfo) {
|
|
175
|
+
if (!mfaInfo.request.path.includes("/eth1/sign/")) {
|
|
176
|
+
throw new Error(`Expected EVM transaction signing request, got ${mfaInfo.request.path}`);
|
|
177
|
+
}
|
|
178
|
+
if (!mfaInfo.request.path.includes(__classPrivateFieldGet(this, _Signer_address, "f"))) {
|
|
179
|
+
throw new Error(`Expected signing request for ${__classPrivateFieldGet(this, _Signer_address, "f")} but got ${mfaInfo.request.path}`);
|
|
180
|
+
}
|
|
181
|
+
const signedTx = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEvm(__classPrivateFieldGet(this, _Signer_address, "f"), mfaInfo.request.body, {
|
|
182
|
+
mfaId: mfaInfo.id,
|
|
183
|
+
mfaOrgId: __classPrivateFieldGet(this, _Signer_signerSession, "f").orgId,
|
|
184
|
+
mfaConf: mfaInfo.receipt.confirmation,
|
|
185
|
+
});
|
|
186
|
+
return await this.provider.broadcastTransaction(signedTx.data().rlp_signed_tx);
|
|
187
|
+
}
|
|
188
|
+
}
|
|
189
|
+
exports.Signer = Signer;
|
|
190
|
+
_Signer_address = new WeakMap(), _Signer_key = new WeakMap(), _Signer_signerSession = new WeakMap(), _Signer_onMfaPoll = new WeakMap(), _Signer_mfaPollIntervalMs = new WeakMap(), _Signer_instances = new WeakSet(), _Signer_handleMfa =
|
|
191
|
+
/**
|
|
192
|
+
* If the sign request requires MFA, this method waits for approvals
|
|
193
|
+
* @param {CubeSignerResponse<U>} res The response of a sign request
|
|
194
|
+
* @return {Promise<U>} The sign data after MFA approvals
|
|
195
|
+
*/
|
|
196
|
+
async function _Signer_handleMfa(res) {
|
|
197
|
+
while (res.requiresMfa()) {
|
|
198
|
+
await new Promise((resolve) => setTimeout(resolve, __classPrivateFieldGet(this, _Signer_mfaPollIntervalMs, "f")));
|
|
199
|
+
const mfaId = res.mfaId();
|
|
200
|
+
const mfaInfo = await __classPrivateFieldGet(this, _Signer_signerSession, "f").getMfaInfo(mfaId);
|
|
201
|
+
__classPrivateFieldGet(this, _Signer_onMfaPoll, "f").call(this, mfaInfo);
|
|
202
|
+
if (mfaInfo.receipt) {
|
|
203
|
+
res = await res.signWithMfaApproval({
|
|
204
|
+
mfaId,
|
|
205
|
+
mfaOrgId: __classPrivateFieldGet(this, _Signer_signerSession, "f").orgId,
|
|
206
|
+
mfaConf: mfaInfo.receipt.confirmation,
|
|
207
|
+
});
|
|
208
|
+
}
|
|
209
|
+
}
|
|
210
|
+
return res.data();
|
|
211
|
+
};
|
|
212
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAOgB;AAChB,gEASqC;AAkBrC;;GAEG;AACH,MAAa,MAAO,SAAQ,eAAM,CAAC,cAAc;IAmB/C;;;;;OAKG;IACH,YAAY,OAAyB,EAAE,aAA4B,EAAE,OAAuB;QAC1F,KAAK,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;;QAzB3B,iCAAiC;QACxB,kCAAiB;QAE1B,iCAAiC;QACjC,8BAAe;QAEf,6BAA6B;QACpB,wCAA8B;QAEvC;;;WAGG;QACM,oCAA2C;QAEpD,gEAAgE;QACvD,4CAA2B;QAUlC,IAAI,OAAO,OAAO,KAAK,QAAQ,EAAE,CAAC;YAChC,uBAAA,IAAI,mBAAY,OAAO,MAAA,CAAC;QAC1B,CAAC;aAAM,CAAC;YACN,uBAAA,IAAI,mBAAY,OAAO,CAAC,UAAU,MAAA,CAAC;YACnC,uBAAA,IAAI,eAAQ,OAAkB,MAAA,CAAC;QACjC,CAAC;QACD,uBAAA,IAAI,yBAAkB,aAAa,MAAA,CAAC;QACpC,uBAAA,IAAI,qBAAc,OAAO,EAAE,SAAS,IAAI,CAAC,EAAC,8BAA8B,EAAE,EAAE,GAAE,CAAC,CAAC,MAAA,CAAC,CAAC,2DAA2D;QAC7I,uBAAA,IAAI,6BAAsB,OAAO,EAAE,iBAAiB,IAAI,IAAI,MAAA,CAAC;IAC/D,CAAC;IAED,sCAAsC;IACtC,KAAK,CAAC,UAAU;QACd,OAAO,uBAAA,IAAI,uBAAS,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACH,OAAO,CAAC,QAAgC;QACtC,OAAO,IAAI,MAAM,CAAC,uBAAA,IAAI,uBAAS,EAAE,uBAAA,IAAI,6BAAe,EAAE,EAAE,QAAQ,EAAE,CAAC,CAAC;IACtE,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,oBAAoB,CAAC,EAA6B;QACtD,0CAA0C;QAC1C,IAAI,OAAO,GAAG,EAAE,CAAC,OAAO,CAAC;QACzB,IAAI,OAAO,KAAK,SAAS,EAAE,CAAC;YAC1B,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,UAAU,EAAE,CAAC;YAClD,OAAO,GAAG,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,GAAG,CAAC;QAChD,CAAC;QAED,sDAAsD;QACtD,MAAM,KAAK,GACT,IAAI,CAAC,QAAQ,YAAY,2BAAkB;YACzC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACrC,CAAC,CAAC,gDAAgD;gBAChD,iDAAiD;gBACjD,0CAA0C;gBAC1C,2BAAkB,CAAC,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACpE,KAAK,CAAC,IAAI,GAAG,IAAA,gBAAO,EAAC,EAAE,CAAC,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,qBAAqB;QAE/D,OAAuB;YACrB,QAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;YACzB,EAAE,EAAE,KAAK;SACV,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe,CAAC,EAA6B;QACjD,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAAC,EAAE,CAAC,CAAC;QAChD,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,aAAa,CAAC;IAC5B,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,WAAW,CAAC,OAA4B;QAC5C,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,CAAC;QAC7B,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,UAAU,CAAC,GAAG,CAAC,WAAW,EAAqB;YACnF,IAAI,EAAE,IAAA,4BAAW,EAAC,OAAO,CAAC;SAC3B,CAAC,CAAC;QACH,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,SAAS,CAAC;IACxB,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,aAAa,CACjB,MAAuB,EACvB,KAA4C,EAC5C,KAA0B;QAE1B,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,CAAC;QAC7B,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,UAAU,CAAC,GAAG,CAAC,WAAW,EAAqB;YACnF,QAAQ,EAAE,CAAC;YACX,8DAA8D;YAC9D,UAAU,EAAO;gBACf,MAAM;gBACN,KAAK;gBACL,WAAW,EAAE,yBAAgB,CAAC,cAAc,CAAC,KAAK,CAAC;gBACnD,OAAO,EAAE,KAAK;aACf;SACF,CAAC,CAAC;QACH,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,SAAS,CAAC;IACxB,CAAC;IAED,8DAA8D;IACtD,KAAK,CAAC,GAAG;QACf,IAAI,uBAAA,IAAI,mBAAK,KAAK,SAAS,EAAE,CAAC;YAC5B,MAAM,GAAG,GAAG,CAAC,MAAM,uBAAA,IAAI,6BAAe,CAAC,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,WAAW,KAAK,uBAAA,IAAI,uBAAS,CAAC,CAAC;YAC5F,IAAI,GAAG,KAAK,SAAS,EAAE,CAAC;gBACtB,MAAM,IAAI,KAAK,CAAC,sBAAsB,uBAAA,IAAI,uBAAS,GAAG,CAAC,CAAC;YAC1D,CAAC;YACD,uBAAA,IAAI,eAAQ,GAAG,MAAA,CAAC;QAClB,CAAC;QACD,OAAO,uBAAA,IAAI,mBAAK,CAAC;IACnB,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,sBAAsB,CAAC,EAA6B;QACxD,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,EAAE,CAAC,CAAC;QACjD,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC;QACnD,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,OAAO,GAAG,CAAC,KAAK,EAAE,CAAC;IACrB,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,0BAA0B,CAAC,OAAuB;QACtD,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE,CAAC;YAClD,MAAM,IAAI,KAAK,CAAC,iDAAiD,OAAO,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC,CAAC;QAC3F,CAAC;QACD,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,uBAAA,IAAI,uBAAS,CAAC,EAAE,CAAC;YAClD,MAAM,IAAI,KAAK,CACb,gCAAgC,uBAAA,IAAI,uBAAS,YAAY,OAAO,CAAC,OAAO,CAAC,IAAI,EAAE,CAChF,CAAC;QACJ,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAChD,uBAAA,IAAI,uBAAS,EACb,OAAO,CAAC,OAAO,CAAC,IAAsB,EACtC;YACE,KAAK,EAAE,OAAO,CAAC,EAAE;YACjB,QAAQ,EAAE,uBAAA,IAAI,6BAAe,CAAC,KAAK;YACnC,OAAO,EAAE,OAAO,CAAC,OAAQ,CAAC,YAAY;SACvC,CACF,CAAC;QACF,OAAO,MAAM,IAAI,CAAC,QAAS,CAAC,oBAAoB,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC,aAAa,CAAC,CAAC;IAClF,CAAC;CAwBF;AAxND,wBAwNC;;AAtBC;;;;GAIG;AACH,KAAK,4BAAe,GAA0B;IAC5C,OAAO,GAAG,CAAC,WAAW,EAAE,EAAE,CAAC;QACzB,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,uBAAA,IAAI,iCAAmB,CAAC,CAAC,CAAC;QAE7E,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,EAAE,CAAC;QAC1B,MAAM,OAAO,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC;QAC5D,uBAAA,IAAI,yBAAW,MAAf,IAAI,EAAY,OAAO,CAAC,CAAC;QACzB,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;YACpB,GAAG,GAAG,MAAM,GAAG,CAAC,mBAAmB,CAAC;gBAClC,KAAK;gBACL,QAAQ,EAAE,uBAAA,IAAI,6BAAe,CAAC,KAAK;gBACnC,OAAO,EAAE,OAAO,CAAC,OAAO,CAAC,YAAY;aACtC,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IACD,OAAO,GAAG,CAAC,IAAI,EAAE,CAAC;AACpB,CAAC","sourcesContent":["import {\n  JsonRpcApiProvider,\n  TypedDataDomain,\n  TypedDataField,\n  TypedDataEncoder,\n  ethers,\n  toBeHex,\n} from \"ethers\";\nimport {\n  CubeSignerResponse,\n  KeyInfo,\n  Eip191SignRequest,\n  Eip712SignRequest,\n  EvmSignRequest,\n  MfaRequestInfo,\n  SignerSession,\n  encodeToHex,\n} from \"@cubist-labs/cubesigner-sdk\";\n\n/** Options for the signer */\nexport interface SignerOptions {\n  /** Optional provider to use */\n  provider?: null | ethers.Provider;\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  onMfaPoll?: (arg0: MfaRequestInfo) => void;\n  /**\n   * The amount of time (in milliseconds) to wait between checks for MFA\n   * updates. Default is 1000ms\n   */\n  mfaPollIntervalMs?: number;\n}\n\n/**\n * A ethers.js Signer using CubeSigner\n */\nexport class Signer extends ethers.AbstractSigner {\n  /** The address of the account */\n  readonly #address: string;\n\n  /** The key to use for signing */\n  #key?: KeyInfo;\n\n  /** The underlying session */\n  readonly #signerSession: SignerSession;\n\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  readonly #onMfaPoll: (arg0: MfaRequestInfo) => void;\n\n  /** The amount of time to wait between checks for MFA updates */\n  readonly #mfaPollIntervalMs: number;\n\n  /**\n   * Create new Signer instance\n   * @param {KeyInfo | string} address The key or the eth address of the account to use.\n   * @param {SignerSession} signerSession The underlying Signer session.\n   * @param {SignerOptions} options The options to use for the Signer instance\n   */\n  constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions) {\n    super(options?.provider);\n    if (typeof address === \"string\") {\n      this.#address = address;\n    } else {\n      this.#address = address.materialId;\n      this.#key = address as KeyInfo;\n    }\n    this.#signerSession = signerSession;\n    this.#onMfaPoll = options?.onMfaPoll ?? ((/* _mfaInfo: MfaRequestInfo */) => {}); // eslint-disable-line @typescript-eslint/no-empty-function\n    this.#mfaPollIntervalMs = options?.mfaPollIntervalMs ?? 1000;\n  }\n\n  /** Resolves to the signer address. */\n  async getAddress(): Promise<string> {\n    return this.#address;\n  }\n\n  /**\n   *  Returns the signer connected to %%provider%%.\n   *  @param {null | ethers.Provider} provider The optional provider instance to use.\n   *  @return {Signer} The signer connected to signer.\n   */\n  connect(provider: null | ethers.Provider): Signer {\n    return new Signer(this.#address, this.#signerSession, { provider });\n  }\n\n  /**\n   * Construct a signing request from a transaction. This populates the transaction\n   * type to `0x02` (EIP-1559) unless set.\n   *\n   * @param {ethers.TransactionRequest} tx The transaction\n   * @return {EvmSignRequest} The EVM sign request to be sent to CubeSigner\n   */\n  async evmSignRequestFromTx(tx: ethers.TransactionRequest): Promise<EvmSignRequest> {\n    // get the chain id from the network or tx\n    let chainId = tx.chainId;\n    if (chainId === undefined) {\n      const network = await this.provider?.getNetwork();\n      chainId = network?.chainId?.toString() ?? \"1\";\n    }\n\n    // Convert the transaction into a JSON-RPC transaction\n    const rpcTx =\n      this.provider instanceof JsonRpcApiProvider\n        ? this.provider.getRpcTransaction(tx)\n        : // We can just call the getRpcTransaction with a\n          // null receiver since it doesn't actually use it\n          // (and really should be declared static).\n          JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);\n    rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]\n\n    return <EvmSignRequest>{\n      chain_id: Number(chainId),\n      tx: rpcTx,\n    };\n  }\n\n  /**\n   * Sign a transaction. This method will block if the key requires MFA approval.\n   * @param {ethers.TransactionRequest} tx The transaction to sign.\n   * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.\n   */\n  async signTransaction(tx: ethers.TransactionRequest): Promise<string> {\n    const req = await this.evmSignRequestFromTx(tx);\n    const res = await this.#signerSession.signEvm(this.#address, req);\n    const data = await this.#handleMfa(res);\n    return data.rlp_signed_tx;\n  }\n\n  /**\n   * Signs arbitrary messages. This uses CubeSigner's EIP-191 signing endpoint.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` or\n   * `\"AllowEip191Signing\"` policy attached.\n   * @param {string | Uint8Array} message The message to sign.\n   * @return {Promise<string>} The signature.\n   */\n  async signMessage(message: string | Uint8Array): Promise<string> {\n    const key = await this.key();\n    const res = await this.#signerSession.signEip191(key.material_id, <Eip191SignRequest>{\n      data: encodeToHex(message),\n    });\n    const data = await this.#handleMfa(res);\n    return data.signature;\n  }\n\n  /**\n   * Signs EIP-712 typed data. This uses CubeSigner's EIP-712 signing endpoint.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` or\n   * `\"AllowEip712Signing\"` policy attached.\n   * @param {TypedDataDomain} domain The domain of the typed data.\n   * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.\n   * @param {Record<string, any>} value The value of the typed data.\n   * @return {Promise<string>} The signature.\n   */\n  async signTypedData(\n    domain: TypedDataDomain,\n    types: Record<string, Array<TypedDataField>>,\n    value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any\n  ): Promise<string> {\n    const key = await this.key();\n    const res = await this.#signerSession.signEip712(key.material_id, <Eip712SignRequest>{\n      chain_id: 1,\n      // eslint-disable-next-line @typescript-eslint/no-explicit-any\n      typed_data: <any>{\n        domain,\n        types,\n        primaryType: TypedDataEncoder.getPrimaryType(types),\n        message: value,\n      },\n    });\n    const data = await this.#handleMfa(res);\n    return data.signature;\n  }\n\n  /** @return {KeyInfo} The key corresponding to this address */\n  private async key(): Promise<KeyInfo> {\n    if (this.#key === undefined) {\n      const key = (await this.#signerSession.keys()).find((k) => k.material_id === this.#address);\n      if (key === undefined) {\n        throw new Error(`Cannot access key '${this.#address}'`);\n      }\n      this.#key = key;\n    }\n    return this.#key;\n  }\n\n  /**\n   * Initialize the signing a message using MFA approvals. This method populates\n   * missing fields. If the signing does not require MFA, this method throws.\n   * @param {ethers.TransactionRequest} tx The transaction to send.\n   * @return {string} The MFA id associated with the signing request.\n   */\n  async sendTransactionMfaInit(tx: ethers.TransactionRequest): Promise<string> {\n    const popTx = await this.populateTransaction(tx);\n    const req = await this.evmSignRequestFromTx(popTx);\n    const res = await this.#signerSession.signEvm(this.#address, req);\n    return res.mfaId();\n  }\n\n  /**\n   * Send a transaction from an approved MFA request. The MFA request contains\n   * information about the approved signing request, which this method will\n   * execute.\n   * @param {MfaRequestInfo} mfaInfo The approved MFA request.\n   * @return {ethers.TransactionResponse} The result of submitting the transaction\n   */\n  async sendTransactionMfaApproved(mfaInfo: MfaRequestInfo): Promise<ethers.TransactionResponse> {\n    if (!mfaInfo.request.path.includes(\"/eth1/sign/\")) {\n      throw new Error(`Expected EVM transaction signing request, got ${mfaInfo.request.path}`);\n    }\n    if (!mfaInfo.request.path.includes(this.#address)) {\n      throw new Error(\n        `Expected signing request for ${this.#address} but got ${mfaInfo.request.path}`,\n      );\n    }\n\n    const signedTx = await this.#signerSession.signEvm(\n      this.#address,\n      mfaInfo.request.body as EvmSignRequest,\n      {\n        mfaId: mfaInfo.id,\n        mfaOrgId: this.#signerSession.orgId,\n        mfaConf: mfaInfo.receipt!.confirmation,\n      },\n    );\n    return await this.provider!.broadcastTransaction(signedTx.data().rlp_signed_tx);\n  }\n\n  /**\n   * If the sign request requires MFA, this method waits for approvals\n   * @param {CubeSignerResponse<U>} res The response of a sign request\n   * @return {Promise<U>} The sign data after MFA approvals\n   */\n  async #handleMfa<U>(res: CubeSignerResponse<U>): Promise<U> {\n    while (res.requiresMfa()) {\n      await new Promise((resolve) => setTimeout(resolve, this.#mfaPollIntervalMs));\n\n      const mfaId = res.mfaId();\n      const mfaInfo = await this.#signerSession.getMfaInfo(mfaId);\n      this.#onMfaPoll(mfaInfo);\n      if (mfaInfo.receipt) {\n        res = await res.signWithMfaApproval({\n          mfaId,\n          mfaOrgId: this.#signerSession.orgId,\n          mfaConf: mfaInfo.receipt.confirmation,\n        });\n      }\n    }\n    return res.data();\n  }\n}\n"]}
|
package/package.json
ADDED
|
@@ -0,0 +1,31 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "@cubist-labs/cubesigner-sdk-ethers-v6",
|
|
3
|
+
"version": "0.3.1",
|
|
4
|
+
"description": "Ethers.js Signer implementation",
|
|
5
|
+
"license": "MIT OR Apache-2.0",
|
|
6
|
+
"author": "Cubist, Inc.",
|
|
7
|
+
"main": "dist/index.js",
|
|
8
|
+
"types": "dist/index.d.ts",
|
|
9
|
+
"files": [
|
|
10
|
+
"tsconfig.json",
|
|
11
|
+
"src/**",
|
|
12
|
+
"dist/**",
|
|
13
|
+
"../../NOTICE",
|
|
14
|
+
"../../LICENSE-APACHE",
|
|
15
|
+
"../../LICENSE-MIT"
|
|
16
|
+
],
|
|
17
|
+
"scripts": {
|
|
18
|
+
"build": "tsc",
|
|
19
|
+
"prepack": "tsc",
|
|
20
|
+
"test": "jest --maxWorkers=1"
|
|
21
|
+
},
|
|
22
|
+
"peerDependencies": {
|
|
23
|
+
"@cubist-labs/cubesigner-sdk": "^0.3.1"
|
|
24
|
+
},
|
|
25
|
+
"dependencies": {
|
|
26
|
+
"ethers": "6.7.1"
|
|
27
|
+
},
|
|
28
|
+
"directories": {
|
|
29
|
+
"test": "test"
|
|
30
|
+
}
|
|
31
|
+
}
|
package/src/index.ts
ADDED
|
@@ -0,0 +1,255 @@
|
|
|
1
|
+
import {
|
|
2
|
+
JsonRpcApiProvider,
|
|
3
|
+
TypedDataDomain,
|
|
4
|
+
TypedDataField,
|
|
5
|
+
TypedDataEncoder,
|
|
6
|
+
ethers,
|
|
7
|
+
toBeHex,
|
|
8
|
+
} from "ethers";
|
|
9
|
+
import {
|
|
10
|
+
CubeSignerResponse,
|
|
11
|
+
KeyInfo,
|
|
12
|
+
Eip191SignRequest,
|
|
13
|
+
Eip712SignRequest,
|
|
14
|
+
EvmSignRequest,
|
|
15
|
+
MfaRequestInfo,
|
|
16
|
+
SignerSession,
|
|
17
|
+
encodeToHex,
|
|
18
|
+
} from "@cubist-labs/cubesigner-sdk";
|
|
19
|
+
|
|
20
|
+
/** Options for the signer */
|
|
21
|
+
export interface SignerOptions {
|
|
22
|
+
/** Optional provider to use */
|
|
23
|
+
provider?: null | ethers.Provider;
|
|
24
|
+
/**
|
|
25
|
+
* The function to call when MFA information is retrieved. If this callback
|
|
26
|
+
* throws, no transaction is broadcast.
|
|
27
|
+
*/
|
|
28
|
+
onMfaPoll?: (arg0: MfaRequestInfo) => void;
|
|
29
|
+
/**
|
|
30
|
+
* The amount of time (in milliseconds) to wait between checks for MFA
|
|
31
|
+
* updates. Default is 1000ms
|
|
32
|
+
*/
|
|
33
|
+
mfaPollIntervalMs?: number;
|
|
34
|
+
}
|
|
35
|
+
|
|
36
|
+
/**
|
|
37
|
+
* A ethers.js Signer using CubeSigner
|
|
38
|
+
*/
|
|
39
|
+
export class Signer extends ethers.AbstractSigner {
|
|
40
|
+
/** The address of the account */
|
|
41
|
+
readonly #address: string;
|
|
42
|
+
|
|
43
|
+
/** The key to use for signing */
|
|
44
|
+
#key?: KeyInfo;
|
|
45
|
+
|
|
46
|
+
/** The underlying session */
|
|
47
|
+
readonly #signerSession: SignerSession;
|
|
48
|
+
|
|
49
|
+
/**
|
|
50
|
+
* The function to call when MFA information is retrieved. If this callback
|
|
51
|
+
* throws, no transaction is broadcast.
|
|
52
|
+
*/
|
|
53
|
+
readonly #onMfaPoll: (arg0: MfaRequestInfo) => void;
|
|
54
|
+
|
|
55
|
+
/** The amount of time to wait between checks for MFA updates */
|
|
56
|
+
readonly #mfaPollIntervalMs: number;
|
|
57
|
+
|
|
58
|
+
/**
|
|
59
|
+
* Create new Signer instance
|
|
60
|
+
* @param {KeyInfo | string} address The key or the eth address of the account to use.
|
|
61
|
+
* @param {SignerSession} signerSession The underlying Signer session.
|
|
62
|
+
* @param {SignerOptions} options The options to use for the Signer instance
|
|
63
|
+
*/
|
|
64
|
+
constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions) {
|
|
65
|
+
super(options?.provider);
|
|
66
|
+
if (typeof address === "string") {
|
|
67
|
+
this.#address = address;
|
|
68
|
+
} else {
|
|
69
|
+
this.#address = address.materialId;
|
|
70
|
+
this.#key = address as KeyInfo;
|
|
71
|
+
}
|
|
72
|
+
this.#signerSession = signerSession;
|
|
73
|
+
this.#onMfaPoll = options?.onMfaPoll ?? ((/* _mfaInfo: MfaRequestInfo */) => {}); // eslint-disable-line @typescript-eslint/no-empty-function
|
|
74
|
+
this.#mfaPollIntervalMs = options?.mfaPollIntervalMs ?? 1000;
|
|
75
|
+
}
|
|
76
|
+
|
|
77
|
+
/** Resolves to the signer address. */
|
|
78
|
+
async getAddress(): Promise<string> {
|
|
79
|
+
return this.#address;
|
|
80
|
+
}
|
|
81
|
+
|
|
82
|
+
/**
|
|
83
|
+
* Returns the signer connected to %%provider%%.
|
|
84
|
+
* @param {null | ethers.Provider} provider The optional provider instance to use.
|
|
85
|
+
* @return {Signer} The signer connected to signer.
|
|
86
|
+
*/
|
|
87
|
+
connect(provider: null | ethers.Provider): Signer {
|
|
88
|
+
return new Signer(this.#address, this.#signerSession, { provider });
|
|
89
|
+
}
|
|
90
|
+
|
|
91
|
+
/**
|
|
92
|
+
* Construct a signing request from a transaction. This populates the transaction
|
|
93
|
+
* type to `0x02` (EIP-1559) unless set.
|
|
94
|
+
*
|
|
95
|
+
* @param {ethers.TransactionRequest} tx The transaction
|
|
96
|
+
* @return {EvmSignRequest} The EVM sign request to be sent to CubeSigner
|
|
97
|
+
*/
|
|
98
|
+
async evmSignRequestFromTx(tx: ethers.TransactionRequest): Promise<EvmSignRequest> {
|
|
99
|
+
// get the chain id from the network or tx
|
|
100
|
+
let chainId = tx.chainId;
|
|
101
|
+
if (chainId === undefined) {
|
|
102
|
+
const network = await this.provider?.getNetwork();
|
|
103
|
+
chainId = network?.chainId?.toString() ?? "1";
|
|
104
|
+
}
|
|
105
|
+
|
|
106
|
+
// Convert the transaction into a JSON-RPC transaction
|
|
107
|
+
const rpcTx =
|
|
108
|
+
this.provider instanceof JsonRpcApiProvider
|
|
109
|
+
? this.provider.getRpcTransaction(tx)
|
|
110
|
+
: // We can just call the getRpcTransaction with a
|
|
111
|
+
// null receiver since it doesn't actually use it
|
|
112
|
+
// (and really should be declared static).
|
|
113
|
+
JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);
|
|
114
|
+
rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]
|
|
115
|
+
|
|
116
|
+
return <EvmSignRequest>{
|
|
117
|
+
chain_id: Number(chainId),
|
|
118
|
+
tx: rpcTx,
|
|
119
|
+
};
|
|
120
|
+
}
|
|
121
|
+
|
|
122
|
+
/**
|
|
123
|
+
* Sign a transaction. This method will block if the key requires MFA approval.
|
|
124
|
+
* @param {ethers.TransactionRequest} tx The transaction to sign.
|
|
125
|
+
* @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
|
|
126
|
+
*/
|
|
127
|
+
async signTransaction(tx: ethers.TransactionRequest): Promise<string> {
|
|
128
|
+
const req = await this.evmSignRequestFromTx(tx);
|
|
129
|
+
const res = await this.#signerSession.signEvm(this.#address, req);
|
|
130
|
+
const data = await this.#handleMfa(res);
|
|
131
|
+
return data.rlp_signed_tx;
|
|
132
|
+
}
|
|
133
|
+
|
|
134
|
+
/**
|
|
135
|
+
* Signs arbitrary messages. This uses CubeSigner's EIP-191 signing endpoint.
|
|
136
|
+
* The key (for this session) must have the `"AllowRawBlobSigning"` or
|
|
137
|
+
* `"AllowEip191Signing"` policy attached.
|
|
138
|
+
* @param {string | Uint8Array} message The message to sign.
|
|
139
|
+
* @return {Promise<string>} The signature.
|
|
140
|
+
*/
|
|
141
|
+
async signMessage(message: string | Uint8Array): Promise<string> {
|
|
142
|
+
const key = await this.key();
|
|
143
|
+
const res = await this.#signerSession.signEip191(key.material_id, <Eip191SignRequest>{
|
|
144
|
+
data: encodeToHex(message),
|
|
145
|
+
});
|
|
146
|
+
const data = await this.#handleMfa(res);
|
|
147
|
+
return data.signature;
|
|
148
|
+
}
|
|
149
|
+
|
|
150
|
+
/**
|
|
151
|
+
* Signs EIP-712 typed data. This uses CubeSigner's EIP-712 signing endpoint.
|
|
152
|
+
* The key (for this session) must have the `"AllowRawBlobSigning"` or
|
|
153
|
+
* `"AllowEip712Signing"` policy attached.
|
|
154
|
+
* @param {TypedDataDomain} domain The domain of the typed data.
|
|
155
|
+
* @param {Record<string, Array<TypedDataField>>} types The types of the typed data.
|
|
156
|
+
* @param {Record<string, any>} value The value of the typed data.
|
|
157
|
+
* @return {Promise<string>} The signature.
|
|
158
|
+
*/
|
|
159
|
+
async signTypedData(
|
|
160
|
+
domain: TypedDataDomain,
|
|
161
|
+
types: Record<string, Array<TypedDataField>>,
|
|
162
|
+
value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any
|
|
163
|
+
): Promise<string> {
|
|
164
|
+
const key = await this.key();
|
|
165
|
+
const res = await this.#signerSession.signEip712(key.material_id, <Eip712SignRequest>{
|
|
166
|
+
chain_id: 1,
|
|
167
|
+
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
|
168
|
+
typed_data: <any>{
|
|
169
|
+
domain,
|
|
170
|
+
types,
|
|
171
|
+
primaryType: TypedDataEncoder.getPrimaryType(types),
|
|
172
|
+
message: value,
|
|
173
|
+
},
|
|
174
|
+
});
|
|
175
|
+
const data = await this.#handleMfa(res);
|
|
176
|
+
return data.signature;
|
|
177
|
+
}
|
|
178
|
+
|
|
179
|
+
/** @return {KeyInfo} The key corresponding to this address */
|
|
180
|
+
private async key(): Promise<KeyInfo> {
|
|
181
|
+
if (this.#key === undefined) {
|
|
182
|
+
const key = (await this.#signerSession.keys()).find((k) => k.material_id === this.#address);
|
|
183
|
+
if (key === undefined) {
|
|
184
|
+
throw new Error(`Cannot access key '${this.#address}'`);
|
|
185
|
+
}
|
|
186
|
+
this.#key = key;
|
|
187
|
+
}
|
|
188
|
+
return this.#key;
|
|
189
|
+
}
|
|
190
|
+
|
|
191
|
+
/**
|
|
192
|
+
* Initialize the signing a message using MFA approvals. This method populates
|
|
193
|
+
* missing fields. If the signing does not require MFA, this method throws.
|
|
194
|
+
* @param {ethers.TransactionRequest} tx The transaction to send.
|
|
195
|
+
* @return {string} The MFA id associated with the signing request.
|
|
196
|
+
*/
|
|
197
|
+
async sendTransactionMfaInit(tx: ethers.TransactionRequest): Promise<string> {
|
|
198
|
+
const popTx = await this.populateTransaction(tx);
|
|
199
|
+
const req = await this.evmSignRequestFromTx(popTx);
|
|
200
|
+
const res = await this.#signerSession.signEvm(this.#address, req);
|
|
201
|
+
return res.mfaId();
|
|
202
|
+
}
|
|
203
|
+
|
|
204
|
+
/**
|
|
205
|
+
* Send a transaction from an approved MFA request. The MFA request contains
|
|
206
|
+
* information about the approved signing request, which this method will
|
|
207
|
+
* execute.
|
|
208
|
+
* @param {MfaRequestInfo} mfaInfo The approved MFA request.
|
|
209
|
+
* @return {ethers.TransactionResponse} The result of submitting the transaction
|
|
210
|
+
*/
|
|
211
|
+
async sendTransactionMfaApproved(mfaInfo: MfaRequestInfo): Promise<ethers.TransactionResponse> {
|
|
212
|
+
if (!mfaInfo.request.path.includes("/eth1/sign/")) {
|
|
213
|
+
throw new Error(`Expected EVM transaction signing request, got ${mfaInfo.request.path}`);
|
|
214
|
+
}
|
|
215
|
+
if (!mfaInfo.request.path.includes(this.#address)) {
|
|
216
|
+
throw new Error(
|
|
217
|
+
`Expected signing request for ${this.#address} but got ${mfaInfo.request.path}`,
|
|
218
|
+
);
|
|
219
|
+
}
|
|
220
|
+
|
|
221
|
+
const signedTx = await this.#signerSession.signEvm(
|
|
222
|
+
this.#address,
|
|
223
|
+
mfaInfo.request.body as EvmSignRequest,
|
|
224
|
+
{
|
|
225
|
+
mfaId: mfaInfo.id,
|
|
226
|
+
mfaOrgId: this.#signerSession.orgId,
|
|
227
|
+
mfaConf: mfaInfo.receipt!.confirmation,
|
|
228
|
+
},
|
|
229
|
+
);
|
|
230
|
+
return await this.provider!.broadcastTransaction(signedTx.data().rlp_signed_tx);
|
|
231
|
+
}
|
|
232
|
+
|
|
233
|
+
/**
|
|
234
|
+
* If the sign request requires MFA, this method waits for approvals
|
|
235
|
+
* @param {CubeSignerResponse<U>} res The response of a sign request
|
|
236
|
+
* @return {Promise<U>} The sign data after MFA approvals
|
|
237
|
+
*/
|
|
238
|
+
async #handleMfa<U>(res: CubeSignerResponse<U>): Promise<U> {
|
|
239
|
+
while (res.requiresMfa()) {
|
|
240
|
+
await new Promise((resolve) => setTimeout(resolve, this.#mfaPollIntervalMs));
|
|
241
|
+
|
|
242
|
+
const mfaId = res.mfaId();
|
|
243
|
+
const mfaInfo = await this.#signerSession.getMfaInfo(mfaId);
|
|
244
|
+
this.#onMfaPoll(mfaInfo);
|
|
245
|
+
if (mfaInfo.receipt) {
|
|
246
|
+
res = await res.signWithMfaApproval({
|
|
247
|
+
mfaId,
|
|
248
|
+
mfaOrgId: this.#signerSession.orgId,
|
|
249
|
+
mfaConf: mfaInfo.receipt.confirmation,
|
|
250
|
+
});
|
|
251
|
+
}
|
|
252
|
+
}
|
|
253
|
+
return res.data();
|
|
254
|
+
}
|
|
255
|
+
}
|
package/tsconfig.json
ADDED
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
{
|
|
2
|
+
"extends": "../../tsconfig.json",
|
|
3
|
+
"compilerOptions": {
|
|
4
|
+
"module": "Node16",
|
|
5
|
+
"moduleResolution": "node16",
|
|
6
|
+
"outDir": "./dist"
|
|
7
|
+
},
|
|
8
|
+
"typedocOptions": {
|
|
9
|
+
"out": "./docs",
|
|
10
|
+
"entryPoints": ["src/index.ts"]
|
|
11
|
+
},
|
|
12
|
+
"exclude": ["node_modules", "dist"],
|
|
13
|
+
"include": ["src/**/*.ts"]
|
|
14
|
+
}
|