@cubist-labs/cubesigner-sdk-ethers-v6 0.3.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md ADDED
@@ -0,0 +1,8 @@
1
+ # Ethers.js Signer implementation for CubeSigner TypeScript SDK
2
+
3
+ This package provides a concrete implementation of the `AbstractSigner` abstract class
4
+ from the `ethers` package that offloads all signing tasks to a remote CubeSigner service.
5
+
6
+ For more information, check out the
7
+ [@cubist-labs/cubesigner-sdk](https://www.npmjs.com/package/@cubist-labs/cubesigner-sdk)
8
+ NPM package.
@@ -0,0 +1,87 @@
1
+ import { TypedDataDomain, TypedDataField, ethers } from "ethers";
2
+ import { KeyInfo, EvmSignRequest, MfaRequestInfo, SignerSession } from "@cubist-labs/cubesigner-sdk";
3
+ /** Options for the signer */
4
+ export interface SignerOptions {
5
+ /** Optional provider to use */
6
+ provider?: null | ethers.Provider;
7
+ /**
8
+ * The function to call when MFA information is retrieved. If this callback
9
+ * throws, no transaction is broadcast.
10
+ */
11
+ onMfaPoll?: (arg0: MfaRequestInfo) => void;
12
+ /**
13
+ * The amount of time (in milliseconds) to wait between checks for MFA
14
+ * updates. Default is 1000ms
15
+ */
16
+ mfaPollIntervalMs?: number;
17
+ }
18
+ /**
19
+ * A ethers.js Signer using CubeSigner
20
+ */
21
+ export declare class Signer extends ethers.AbstractSigner {
22
+ #private;
23
+ /**
24
+ * Create new Signer instance
25
+ * @param {KeyInfo | string} address The key or the eth address of the account to use.
26
+ * @param {SignerSession} signerSession The underlying Signer session.
27
+ * @param {SignerOptions} options The options to use for the Signer instance
28
+ */
29
+ constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions);
30
+ /** Resolves to the signer address. */
31
+ getAddress(): Promise<string>;
32
+ /**
33
+ * Returns the signer connected to %%provider%%.
34
+ * @param {null | ethers.Provider} provider The optional provider instance to use.
35
+ * @return {Signer} The signer connected to signer.
36
+ */
37
+ connect(provider: null | ethers.Provider): Signer;
38
+ /**
39
+ * Construct a signing request from a transaction. This populates the transaction
40
+ * type to `0x02` (EIP-1559) unless set.
41
+ *
42
+ * @param {ethers.TransactionRequest} tx The transaction
43
+ * @return {EvmSignRequest} The EVM sign request to be sent to CubeSigner
44
+ */
45
+ evmSignRequestFromTx(tx: ethers.TransactionRequest): Promise<EvmSignRequest>;
46
+ /**
47
+ * Sign a transaction. This method will block if the key requires MFA approval.
48
+ * @param {ethers.TransactionRequest} tx The transaction to sign.
49
+ * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
50
+ */
51
+ signTransaction(tx: ethers.TransactionRequest): Promise<string>;
52
+ /**
53
+ * Signs arbitrary messages. This uses CubeSigner's EIP-191 signing endpoint.
54
+ * The key (for this session) must have the `"AllowRawBlobSigning"` or
55
+ * `"AllowEip191Signing"` policy attached.
56
+ * @param {string | Uint8Array} message The message to sign.
57
+ * @return {Promise<string>} The signature.
58
+ */
59
+ signMessage(message: string | Uint8Array): Promise<string>;
60
+ /**
61
+ * Signs EIP-712 typed data. This uses CubeSigner's EIP-712 signing endpoint.
62
+ * The key (for this session) must have the `"AllowRawBlobSigning"` or
63
+ * `"AllowEip712Signing"` policy attached.
64
+ * @param {TypedDataDomain} domain The domain of the typed data.
65
+ * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.
66
+ * @param {Record<string, any>} value The value of the typed data.
67
+ * @return {Promise<string>} The signature.
68
+ */
69
+ signTypedData(domain: TypedDataDomain, types: Record<string, Array<TypedDataField>>, value: Record<string, any>): Promise<string>;
70
+ /** @return {KeyInfo} The key corresponding to this address */
71
+ private key;
72
+ /**
73
+ * Initialize the signing a message using MFA approvals. This method populates
74
+ * missing fields. If the signing does not require MFA, this method throws.
75
+ * @param {ethers.TransactionRequest} tx The transaction to send.
76
+ * @return {string} The MFA id associated with the signing request.
77
+ */
78
+ sendTransactionMfaInit(tx: ethers.TransactionRequest): Promise<string>;
79
+ /**
80
+ * Send a transaction from an approved MFA request. The MFA request contains
81
+ * information about the approved signing request, which this method will
82
+ * execute.
83
+ * @param {MfaRequestInfo} mfaInfo The approved MFA request.
84
+ * @return {ethers.TransactionResponse} The result of submitting the transaction
85
+ */
86
+ sendTransactionMfaApproved(mfaInfo: MfaRequestInfo): Promise<ethers.TransactionResponse>;
87
+ }
package/dist/index.js ADDED
@@ -0,0 +1,212 @@
1
+ "use strict";
2
+ var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
3
+ if (kind === "m") throw new TypeError("Private method is not writable");
4
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
5
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
6
+ return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
7
+ };
8
+ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
9
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
10
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
11
+ return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
12
+ };
13
+ var _Signer_instances, _Signer_address, _Signer_key, _Signer_signerSession, _Signer_onMfaPoll, _Signer_mfaPollIntervalMs, _Signer_handleMfa;
14
+ Object.defineProperty(exports, "__esModule", { value: true });
15
+ exports.Signer = void 0;
16
+ const ethers_1 = require("ethers");
17
+ const cubesigner_sdk_1 = require("@cubist-labs/cubesigner-sdk");
18
+ /**
19
+ * A ethers.js Signer using CubeSigner
20
+ */
21
+ class Signer extends ethers_1.ethers.AbstractSigner {
22
+ /**
23
+ * Create new Signer instance
24
+ * @param {KeyInfo | string} address The key or the eth address of the account to use.
25
+ * @param {SignerSession} signerSession The underlying Signer session.
26
+ * @param {SignerOptions} options The options to use for the Signer instance
27
+ */
28
+ constructor(address, signerSession, options) {
29
+ super(options?.provider);
30
+ _Signer_instances.add(this);
31
+ /** The address of the account */
32
+ _Signer_address.set(this, void 0);
33
+ /** The key to use for signing */
34
+ _Signer_key.set(this, void 0);
35
+ /** The underlying session */
36
+ _Signer_signerSession.set(this, void 0);
37
+ /**
38
+ * The function to call when MFA information is retrieved. If this callback
39
+ * throws, no transaction is broadcast.
40
+ */
41
+ _Signer_onMfaPoll.set(this, void 0);
42
+ /** The amount of time to wait between checks for MFA updates */
43
+ _Signer_mfaPollIntervalMs.set(this, void 0);
44
+ if (typeof address === "string") {
45
+ __classPrivateFieldSet(this, _Signer_address, address, "f");
46
+ }
47
+ else {
48
+ __classPrivateFieldSet(this, _Signer_address, address.materialId, "f");
49
+ __classPrivateFieldSet(this, _Signer_key, address, "f");
50
+ }
51
+ __classPrivateFieldSet(this, _Signer_signerSession, signerSession, "f");
52
+ __classPrivateFieldSet(this, _Signer_onMfaPoll, options?.onMfaPoll ?? (( /* _mfaInfo: MfaRequestInfo */) => { }), "f"); // eslint-disable-line @typescript-eslint/no-empty-function
53
+ __classPrivateFieldSet(this, _Signer_mfaPollIntervalMs, options?.mfaPollIntervalMs ?? 1000, "f");
54
+ }
55
+ /** Resolves to the signer address. */
56
+ async getAddress() {
57
+ return __classPrivateFieldGet(this, _Signer_address, "f");
58
+ }
59
+ /**
60
+ * Returns the signer connected to %%provider%%.
61
+ * @param {null | ethers.Provider} provider The optional provider instance to use.
62
+ * @return {Signer} The signer connected to signer.
63
+ */
64
+ connect(provider) {
65
+ return new Signer(__classPrivateFieldGet(this, _Signer_address, "f"), __classPrivateFieldGet(this, _Signer_signerSession, "f"), { provider });
66
+ }
67
+ /**
68
+ * Construct a signing request from a transaction. This populates the transaction
69
+ * type to `0x02` (EIP-1559) unless set.
70
+ *
71
+ * @param {ethers.TransactionRequest} tx The transaction
72
+ * @return {EvmSignRequest} The EVM sign request to be sent to CubeSigner
73
+ */
74
+ async evmSignRequestFromTx(tx) {
75
+ // get the chain id from the network or tx
76
+ let chainId = tx.chainId;
77
+ if (chainId === undefined) {
78
+ const network = await this.provider?.getNetwork();
79
+ chainId = network?.chainId?.toString() ?? "1";
80
+ }
81
+ // Convert the transaction into a JSON-RPC transaction
82
+ const rpcTx = this.provider instanceof ethers_1.JsonRpcApiProvider
83
+ ? this.provider.getRpcTransaction(tx)
84
+ : // We can just call the getRpcTransaction with a
85
+ // null receiver since it doesn't actually use it
86
+ // (and really should be declared static).
87
+ ethers_1.JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);
88
+ rpcTx.type = (0, ethers_1.toBeHex)(tx.type ?? 0x02, 1); // we expect 0x0[0-2]
89
+ return {
90
+ chain_id: Number(chainId),
91
+ tx: rpcTx,
92
+ };
93
+ }
94
+ /**
95
+ * Sign a transaction. This method will block if the key requires MFA approval.
96
+ * @param {ethers.TransactionRequest} tx The transaction to sign.
97
+ * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
98
+ */
99
+ async signTransaction(tx) {
100
+ const req = await this.evmSignRequestFromTx(tx);
101
+ const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEvm(__classPrivateFieldGet(this, _Signer_address, "f"), req);
102
+ const data = await __classPrivateFieldGet(this, _Signer_instances, "m", _Signer_handleMfa).call(this, res);
103
+ return data.rlp_signed_tx;
104
+ }
105
+ /**
106
+ * Signs arbitrary messages. This uses CubeSigner's EIP-191 signing endpoint.
107
+ * The key (for this session) must have the `"AllowRawBlobSigning"` or
108
+ * `"AllowEip191Signing"` policy attached.
109
+ * @param {string | Uint8Array} message The message to sign.
110
+ * @return {Promise<string>} The signature.
111
+ */
112
+ async signMessage(message) {
113
+ const key = await this.key();
114
+ const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEip191(key.material_id, {
115
+ data: (0, cubesigner_sdk_1.encodeToHex)(message),
116
+ });
117
+ const data = await __classPrivateFieldGet(this, _Signer_instances, "m", _Signer_handleMfa).call(this, res);
118
+ return data.signature;
119
+ }
120
+ /**
121
+ * Signs EIP-712 typed data. This uses CubeSigner's EIP-712 signing endpoint.
122
+ * The key (for this session) must have the `"AllowRawBlobSigning"` or
123
+ * `"AllowEip712Signing"` policy attached.
124
+ * @param {TypedDataDomain} domain The domain of the typed data.
125
+ * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.
126
+ * @param {Record<string, any>} value The value of the typed data.
127
+ * @return {Promise<string>} The signature.
128
+ */
129
+ async signTypedData(domain, types, value) {
130
+ const key = await this.key();
131
+ const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEip712(key.material_id, {
132
+ chain_id: 1,
133
+ // eslint-disable-next-line @typescript-eslint/no-explicit-any
134
+ typed_data: {
135
+ domain,
136
+ types,
137
+ primaryType: ethers_1.TypedDataEncoder.getPrimaryType(types),
138
+ message: value,
139
+ },
140
+ });
141
+ const data = await __classPrivateFieldGet(this, _Signer_instances, "m", _Signer_handleMfa).call(this, res);
142
+ return data.signature;
143
+ }
144
+ /** @return {KeyInfo} The key corresponding to this address */
145
+ async key() {
146
+ if (__classPrivateFieldGet(this, _Signer_key, "f") === undefined) {
147
+ const key = (await __classPrivateFieldGet(this, _Signer_signerSession, "f").keys()).find((k) => k.material_id === __classPrivateFieldGet(this, _Signer_address, "f"));
148
+ if (key === undefined) {
149
+ throw new Error(`Cannot access key '${__classPrivateFieldGet(this, _Signer_address, "f")}'`);
150
+ }
151
+ __classPrivateFieldSet(this, _Signer_key, key, "f");
152
+ }
153
+ return __classPrivateFieldGet(this, _Signer_key, "f");
154
+ }
155
+ /**
156
+ * Initialize the signing a message using MFA approvals. This method populates
157
+ * missing fields. If the signing does not require MFA, this method throws.
158
+ * @param {ethers.TransactionRequest} tx The transaction to send.
159
+ * @return {string} The MFA id associated with the signing request.
160
+ */
161
+ async sendTransactionMfaInit(tx) {
162
+ const popTx = await this.populateTransaction(tx);
163
+ const req = await this.evmSignRequestFromTx(popTx);
164
+ const res = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEvm(__classPrivateFieldGet(this, _Signer_address, "f"), req);
165
+ return res.mfaId();
166
+ }
167
+ /**
168
+ * Send a transaction from an approved MFA request. The MFA request contains
169
+ * information about the approved signing request, which this method will
170
+ * execute.
171
+ * @param {MfaRequestInfo} mfaInfo The approved MFA request.
172
+ * @return {ethers.TransactionResponse} The result of submitting the transaction
173
+ */
174
+ async sendTransactionMfaApproved(mfaInfo) {
175
+ if (!mfaInfo.request.path.includes("/eth1/sign/")) {
176
+ throw new Error(`Expected EVM transaction signing request, got ${mfaInfo.request.path}`);
177
+ }
178
+ if (!mfaInfo.request.path.includes(__classPrivateFieldGet(this, _Signer_address, "f"))) {
179
+ throw new Error(`Expected signing request for ${__classPrivateFieldGet(this, _Signer_address, "f")} but got ${mfaInfo.request.path}`);
180
+ }
181
+ const signedTx = await __classPrivateFieldGet(this, _Signer_signerSession, "f").signEvm(__classPrivateFieldGet(this, _Signer_address, "f"), mfaInfo.request.body, {
182
+ mfaId: mfaInfo.id,
183
+ mfaOrgId: __classPrivateFieldGet(this, _Signer_signerSession, "f").orgId,
184
+ mfaConf: mfaInfo.receipt.confirmation,
185
+ });
186
+ return await this.provider.broadcastTransaction(signedTx.data().rlp_signed_tx);
187
+ }
188
+ }
189
+ exports.Signer = Signer;
190
+ _Signer_address = new WeakMap(), _Signer_key = new WeakMap(), _Signer_signerSession = new WeakMap(), _Signer_onMfaPoll = new WeakMap(), _Signer_mfaPollIntervalMs = new WeakMap(), _Signer_instances = new WeakSet(), _Signer_handleMfa =
191
+ /**
192
+ * If the sign request requires MFA, this method waits for approvals
193
+ * @param {CubeSignerResponse<U>} res The response of a sign request
194
+ * @return {Promise<U>} The sign data after MFA approvals
195
+ */
196
+ async function _Signer_handleMfa(res) {
197
+ while (res.requiresMfa()) {
198
+ await new Promise((resolve) => setTimeout(resolve, __classPrivateFieldGet(this, _Signer_mfaPollIntervalMs, "f")));
199
+ const mfaId = res.mfaId();
200
+ const mfaInfo = await __classPrivateFieldGet(this, _Signer_signerSession, "f").getMfaInfo(mfaId);
201
+ __classPrivateFieldGet(this, _Signer_onMfaPoll, "f").call(this, mfaInfo);
202
+ if (mfaInfo.receipt) {
203
+ res = await res.signWithMfaApproval({
204
+ mfaId,
205
+ mfaOrgId: __classPrivateFieldGet(this, _Signer_signerSession, "f").orgId,
206
+ mfaConf: mfaInfo.receipt.confirmation,
207
+ });
208
+ }
209
+ }
210
+ return res.data();
211
+ };
212
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAOgB;AAChB,gEASqC;AAkBrC;;GAEG;AACH,MAAa,MAAO,SAAQ,eAAM,CAAC,cAAc;IAmB/C;;;;;OAKG;IACH,YAAY,OAAyB,EAAE,aAA4B,EAAE,OAAuB;QAC1F,KAAK,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;;QAzB3B,iCAAiC;QACxB,kCAAiB;QAE1B,iCAAiC;QACjC,8BAAe;QAEf,6BAA6B;QACpB,wCAA8B;QAEvC;;;WAGG;QACM,oCAA2C;QAEpD,gEAAgE;QACvD,4CAA2B;QAUlC,IAAI,OAAO,OAAO,KAAK,QAAQ,EAAE,CAAC;YAChC,uBAAA,IAAI,mBAAY,OAAO,MAAA,CAAC;QAC1B,CAAC;aAAM,CAAC;YACN,uBAAA,IAAI,mBAAY,OAAO,CAAC,UAAU,MAAA,CAAC;YACnC,uBAAA,IAAI,eAAQ,OAAkB,MAAA,CAAC;QACjC,CAAC;QACD,uBAAA,IAAI,yBAAkB,aAAa,MAAA,CAAC;QACpC,uBAAA,IAAI,qBAAc,OAAO,EAAE,SAAS,IAAI,CAAC,EAAC,8BAA8B,EAAE,EAAE,GAAE,CAAC,CAAC,MAAA,CAAC,CAAC,2DAA2D;QAC7I,uBAAA,IAAI,6BAAsB,OAAO,EAAE,iBAAiB,IAAI,IAAI,MAAA,CAAC;IAC/D,CAAC;IAED,sCAAsC;IACtC,KAAK,CAAC,UAAU;QACd,OAAO,uBAAA,IAAI,uBAAS,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACH,OAAO,CAAC,QAAgC;QACtC,OAAO,IAAI,MAAM,CAAC,uBAAA,IAAI,uBAAS,EAAE,uBAAA,IAAI,6BAAe,EAAE,EAAE,QAAQ,EAAE,CAAC,CAAC;IACtE,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,oBAAoB,CAAC,EAA6B;QACtD,0CAA0C;QAC1C,IAAI,OAAO,GAAG,EAAE,CAAC,OAAO,CAAC;QACzB,IAAI,OAAO,KAAK,SAAS,EAAE,CAAC;YAC1B,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,UAAU,EAAE,CAAC;YAClD,OAAO,GAAG,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,GAAG,CAAC;QAChD,CAAC;QAED,sDAAsD;QACtD,MAAM,KAAK,GACT,IAAI,CAAC,QAAQ,YAAY,2BAAkB;YACzC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACrC,CAAC,CAAC,gDAAgD;gBAChD,iDAAiD;gBACjD,0CAA0C;gBAC1C,2BAAkB,CAAC,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACpE,KAAK,CAAC,IAAI,GAAG,IAAA,gBAAO,EAAC,EAAE,CAAC,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,qBAAqB;QAE/D,OAAuB;YACrB,QAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;YACzB,EAAE,EAAE,KAAK;SACV,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,eAAe,CAAC,EAA6B;QACjD,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAAC,EAAE,CAAC,CAAC;QAChD,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,aAAa,CAAC;IAC5B,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,WAAW,CAAC,OAA4B;QAC5C,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,CAAC;QAC7B,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,UAAU,CAAC,GAAG,CAAC,WAAW,EAAqB;YACnF,IAAI,EAAE,IAAA,4BAAW,EAAC,OAAO,CAAC;SAC3B,CAAC,CAAC;QACH,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,SAAS,CAAC;IACxB,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,aAAa,CACjB,MAAuB,EACvB,KAA4C,EAC5C,KAA0B;QAE1B,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,CAAC;QAC7B,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,UAAU,CAAC,GAAG,CAAC,WAAW,EAAqB;YACnF,QAAQ,EAAE,CAAC;YACX,8DAA8D;YAC9D,UAAU,EAAO;gBACf,MAAM;gBACN,KAAK;gBACL,WAAW,EAAE,yBAAgB,CAAC,cAAc,CAAC,KAAK,CAAC;gBACnD,OAAO,EAAE,KAAK;aACf;SACF,CAAC,CAAC;QACH,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,4CAAW,MAAf,IAAI,EAAY,GAAG,CAAC,CAAC;QACxC,OAAO,IAAI,CAAC,SAAS,CAAC;IACxB,CAAC;IAED,8DAA8D;IACtD,KAAK,CAAC,GAAG;QACf,IAAI,uBAAA,IAAI,mBAAK,KAAK,SAAS,EAAE,CAAC;YAC5B,MAAM,GAAG,GAAG,CAAC,MAAM,uBAAA,IAAI,6BAAe,CAAC,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,WAAW,KAAK,uBAAA,IAAI,uBAAS,CAAC,CAAC;YAC5F,IAAI,GAAG,KAAK,SAAS,EAAE,CAAC;gBACtB,MAAM,IAAI,KAAK,CAAC,sBAAsB,uBAAA,IAAI,uBAAS,GAAG,CAAC,CAAC;YAC1D,CAAC;YACD,uBAAA,IAAI,eAAQ,GAAG,MAAA,CAAC;QAClB,CAAC;QACD,OAAO,uBAAA,IAAI,mBAAK,CAAC;IACnB,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,sBAAsB,CAAC,EAA6B;QACxD,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,EAAE,CAAC,CAAC;QACjD,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC;QACnD,MAAM,GAAG,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAAC,uBAAA,IAAI,uBAAS,EAAE,GAAG,CAAC,CAAC;QAClE,OAAO,GAAG,CAAC,KAAK,EAAE,CAAC;IACrB,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,0BAA0B,CAAC,OAAuB;QACtD,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE,CAAC;YAClD,MAAM,IAAI,KAAK,CAAC,iDAAiD,OAAO,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC,CAAC;QAC3F,CAAC;QACD,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,uBAAA,IAAI,uBAAS,CAAC,EAAE,CAAC;YAClD,MAAM,IAAI,KAAK,CACb,gCAAgC,uBAAA,IAAI,uBAAS,YAAY,OAAO,CAAC,OAAO,CAAC,IAAI,EAAE,CAChF,CAAC;QACJ,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,OAAO,CAChD,uBAAA,IAAI,uBAAS,EACb,OAAO,CAAC,OAAO,CAAC,IAAsB,EACtC;YACE,KAAK,EAAE,OAAO,CAAC,EAAE;YACjB,QAAQ,EAAE,uBAAA,IAAI,6BAAe,CAAC,KAAK;YACnC,OAAO,EAAE,OAAO,CAAC,OAAQ,CAAC,YAAY;SACvC,CACF,CAAC;QACF,OAAO,MAAM,IAAI,CAAC,QAAS,CAAC,oBAAoB,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC,aAAa,CAAC,CAAC;IAClF,CAAC;CAwBF;AAxND,wBAwNC;;AAtBC;;;;GAIG;AACH,KAAK,4BAAe,GAA0B;IAC5C,OAAO,GAAG,CAAC,WAAW,EAAE,EAAE,CAAC;QACzB,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,uBAAA,IAAI,iCAAmB,CAAC,CAAC,CAAC;QAE7E,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,EAAE,CAAC;QAC1B,MAAM,OAAO,GAAG,MAAM,uBAAA,IAAI,6BAAe,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC;QAC5D,uBAAA,IAAI,yBAAW,MAAf,IAAI,EAAY,OAAO,CAAC,CAAC;QACzB,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;YACpB,GAAG,GAAG,MAAM,GAAG,CAAC,mBAAmB,CAAC;gBAClC,KAAK;gBACL,QAAQ,EAAE,uBAAA,IAAI,6BAAe,CAAC,KAAK;gBACnC,OAAO,EAAE,OAAO,CAAC,OAAO,CAAC,YAAY;aACtC,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IACD,OAAO,GAAG,CAAC,IAAI,EAAE,CAAC;AACpB,CAAC","sourcesContent":["import {\n  JsonRpcApiProvider,\n  TypedDataDomain,\n  TypedDataField,\n  TypedDataEncoder,\n  ethers,\n  toBeHex,\n} from \"ethers\";\nimport {\n  CubeSignerResponse,\n  KeyInfo,\n  Eip191SignRequest,\n  Eip712SignRequest,\n  EvmSignRequest,\n  MfaRequestInfo,\n  SignerSession,\n  encodeToHex,\n} from \"@cubist-labs/cubesigner-sdk\";\n\n/** Options for the signer */\nexport interface SignerOptions {\n  /** Optional provider to use */\n  provider?: null | ethers.Provider;\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  onMfaPoll?: (arg0: MfaRequestInfo) => void;\n  /**\n   * The amount of time (in milliseconds) to wait between checks for MFA\n   * updates. Default is 1000ms\n   */\n  mfaPollIntervalMs?: number;\n}\n\n/**\n * A ethers.js Signer using CubeSigner\n */\nexport class Signer extends ethers.AbstractSigner {\n  /** The address of the account */\n  readonly #address: string;\n\n  /** The key to use for signing */\n  #key?: KeyInfo;\n\n  /** The underlying session */\n  readonly #signerSession: SignerSession;\n\n  /**\n   * The function to call when MFA information is retrieved. If this callback\n   * throws, no transaction is broadcast.\n   */\n  readonly #onMfaPoll: (arg0: MfaRequestInfo) => void;\n\n  /** The amount of time to wait between checks for MFA updates */\n  readonly #mfaPollIntervalMs: number;\n\n  /**\n   * Create new Signer instance\n   * @param {KeyInfo | string} address The key or the eth address of the account to use.\n   * @param {SignerSession} signerSession The underlying Signer session.\n   * @param {SignerOptions} options The options to use for the Signer instance\n   */\n  constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions) {\n    super(options?.provider);\n    if (typeof address === \"string\") {\n      this.#address = address;\n    } else {\n      this.#address = address.materialId;\n      this.#key = address as KeyInfo;\n    }\n    this.#signerSession = signerSession;\n    this.#onMfaPoll = options?.onMfaPoll ?? ((/* _mfaInfo: MfaRequestInfo */) => {}); // eslint-disable-line @typescript-eslint/no-empty-function\n    this.#mfaPollIntervalMs = options?.mfaPollIntervalMs ?? 1000;\n  }\n\n  /** Resolves to the signer address. */\n  async getAddress(): Promise<string> {\n    return this.#address;\n  }\n\n  /**\n   *  Returns the signer connected to %%provider%%.\n   *  @param {null | ethers.Provider} provider The optional provider instance to use.\n   *  @return {Signer} The signer connected to signer.\n   */\n  connect(provider: null | ethers.Provider): Signer {\n    return new Signer(this.#address, this.#signerSession, { provider });\n  }\n\n  /**\n   * Construct a signing request from a transaction. This populates the transaction\n   * type to `0x02` (EIP-1559) unless set.\n   *\n   * @param {ethers.TransactionRequest} tx The transaction\n   * @return {EvmSignRequest} The EVM sign request to be sent to CubeSigner\n   */\n  async evmSignRequestFromTx(tx: ethers.TransactionRequest): Promise<EvmSignRequest> {\n    // get the chain id from the network or tx\n    let chainId = tx.chainId;\n    if (chainId === undefined) {\n      const network = await this.provider?.getNetwork();\n      chainId = network?.chainId?.toString() ?? \"1\";\n    }\n\n    // Convert the transaction into a JSON-RPC transaction\n    const rpcTx =\n      this.provider instanceof JsonRpcApiProvider\n        ? this.provider.getRpcTransaction(tx)\n        : // We can just call the getRpcTransaction with a\n          // null receiver since it doesn't actually use it\n          // (and really should be declared static).\n          JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);\n    rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]\n\n    return <EvmSignRequest>{\n      chain_id: Number(chainId),\n      tx: rpcTx,\n    };\n  }\n\n  /**\n   * Sign a transaction. This method will block if the key requires MFA approval.\n   * @param {ethers.TransactionRequest} tx The transaction to sign.\n   * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.\n   */\n  async signTransaction(tx: ethers.TransactionRequest): Promise<string> {\n    const req = await this.evmSignRequestFromTx(tx);\n    const res = await this.#signerSession.signEvm(this.#address, req);\n    const data = await this.#handleMfa(res);\n    return data.rlp_signed_tx;\n  }\n\n  /**\n   * Signs arbitrary messages. This uses CubeSigner's EIP-191 signing endpoint.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` or\n   * `\"AllowEip191Signing\"` policy attached.\n   * @param {string | Uint8Array} message The message to sign.\n   * @return {Promise<string>} The signature.\n   */\n  async signMessage(message: string | Uint8Array): Promise<string> {\n    const key = await this.key();\n    const res = await this.#signerSession.signEip191(key.material_id, <Eip191SignRequest>{\n      data: encodeToHex(message),\n    });\n    const data = await this.#handleMfa(res);\n    return data.signature;\n  }\n\n  /**\n   * Signs EIP-712 typed data. This uses CubeSigner's EIP-712 signing endpoint.\n   * The key (for this session) must have the `\"AllowRawBlobSigning\"` or\n   * `\"AllowEip712Signing\"` policy attached.\n   * @param {TypedDataDomain} domain The domain of the typed data.\n   * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.\n   * @param {Record<string, any>} value The value of the typed data.\n   * @return {Promise<string>} The signature.\n   */\n  async signTypedData(\n    domain: TypedDataDomain,\n    types: Record<string, Array<TypedDataField>>,\n    value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any\n  ): Promise<string> {\n    const key = await this.key();\n    const res = await this.#signerSession.signEip712(key.material_id, <Eip712SignRequest>{\n      chain_id: 1,\n      // eslint-disable-next-line @typescript-eslint/no-explicit-any\n      typed_data: <any>{\n        domain,\n        types,\n        primaryType: TypedDataEncoder.getPrimaryType(types),\n        message: value,\n      },\n    });\n    const data = await this.#handleMfa(res);\n    return data.signature;\n  }\n\n  /** @return {KeyInfo} The key corresponding to this address */\n  private async key(): Promise<KeyInfo> {\n    if (this.#key === undefined) {\n      const key = (await this.#signerSession.keys()).find((k) => k.material_id === this.#address);\n      if (key === undefined) {\n        throw new Error(`Cannot access key '${this.#address}'`);\n      }\n      this.#key = key;\n    }\n    return this.#key;\n  }\n\n  /**\n   * Initialize the signing a message using MFA approvals. This method populates\n   * missing fields. If the signing does not require MFA, this method throws.\n   * @param {ethers.TransactionRequest} tx The transaction to send.\n   * @return {string} The MFA id associated with the signing request.\n   */\n  async sendTransactionMfaInit(tx: ethers.TransactionRequest): Promise<string> {\n    const popTx = await this.populateTransaction(tx);\n    const req = await this.evmSignRequestFromTx(popTx);\n    const res = await this.#signerSession.signEvm(this.#address, req);\n    return res.mfaId();\n  }\n\n  /**\n   * Send a transaction from an approved MFA request. The MFA request contains\n   * information about the approved signing request, which this method will\n   * execute.\n   * @param {MfaRequestInfo} mfaInfo The approved MFA request.\n   * @return {ethers.TransactionResponse} The result of submitting the transaction\n   */\n  async sendTransactionMfaApproved(mfaInfo: MfaRequestInfo): Promise<ethers.TransactionResponse> {\n    if (!mfaInfo.request.path.includes(\"/eth1/sign/\")) {\n      throw new Error(`Expected EVM transaction signing request, got ${mfaInfo.request.path}`);\n    }\n    if (!mfaInfo.request.path.includes(this.#address)) {\n      throw new Error(\n        `Expected signing request for ${this.#address} but got ${mfaInfo.request.path}`,\n      );\n    }\n\n    const signedTx = await this.#signerSession.signEvm(\n      this.#address,\n      mfaInfo.request.body as EvmSignRequest,\n      {\n        mfaId: mfaInfo.id,\n        mfaOrgId: this.#signerSession.orgId,\n        mfaConf: mfaInfo.receipt!.confirmation,\n      },\n    );\n    return await this.provider!.broadcastTransaction(signedTx.data().rlp_signed_tx);\n  }\n\n  /**\n   * If the sign request requires MFA, this method waits for approvals\n   * @param {CubeSignerResponse<U>} res The response of a sign request\n   * @return {Promise<U>} The sign data after MFA approvals\n   */\n  async #handleMfa<U>(res: CubeSignerResponse<U>): Promise<U> {\n    while (res.requiresMfa()) {\n      await new Promise((resolve) => setTimeout(resolve, this.#mfaPollIntervalMs));\n\n      const mfaId = res.mfaId();\n      const mfaInfo = await this.#signerSession.getMfaInfo(mfaId);\n      this.#onMfaPoll(mfaInfo);\n      if (mfaInfo.receipt) {\n        res = await res.signWithMfaApproval({\n          mfaId,\n          mfaOrgId: this.#signerSession.orgId,\n          mfaConf: mfaInfo.receipt.confirmation,\n        });\n      }\n    }\n    return res.data();\n  }\n}\n"]}
package/package.json ADDED
@@ -0,0 +1,31 @@
1
+ {
2
+ "name": "@cubist-labs/cubesigner-sdk-ethers-v6",
3
+ "version": "0.3.1",
4
+ "description": "Ethers.js Signer implementation",
5
+ "license": "MIT OR Apache-2.0",
6
+ "author": "Cubist, Inc.",
7
+ "main": "dist/index.js",
8
+ "types": "dist/index.d.ts",
9
+ "files": [
10
+ "tsconfig.json",
11
+ "src/**",
12
+ "dist/**",
13
+ "../../NOTICE",
14
+ "../../LICENSE-APACHE",
15
+ "../../LICENSE-MIT"
16
+ ],
17
+ "scripts": {
18
+ "build": "tsc",
19
+ "prepack": "tsc",
20
+ "test": "jest --maxWorkers=1"
21
+ },
22
+ "peerDependencies": {
23
+ "@cubist-labs/cubesigner-sdk": "^0.3.1"
24
+ },
25
+ "dependencies": {
26
+ "ethers": "6.7.1"
27
+ },
28
+ "directories": {
29
+ "test": "test"
30
+ }
31
+ }
package/src/index.ts ADDED
@@ -0,0 +1,255 @@
1
+ import {
2
+ JsonRpcApiProvider,
3
+ TypedDataDomain,
4
+ TypedDataField,
5
+ TypedDataEncoder,
6
+ ethers,
7
+ toBeHex,
8
+ } from "ethers";
9
+ import {
10
+ CubeSignerResponse,
11
+ KeyInfo,
12
+ Eip191SignRequest,
13
+ Eip712SignRequest,
14
+ EvmSignRequest,
15
+ MfaRequestInfo,
16
+ SignerSession,
17
+ encodeToHex,
18
+ } from "@cubist-labs/cubesigner-sdk";
19
+
20
+ /** Options for the signer */
21
+ export interface SignerOptions {
22
+ /** Optional provider to use */
23
+ provider?: null | ethers.Provider;
24
+ /**
25
+ * The function to call when MFA information is retrieved. If this callback
26
+ * throws, no transaction is broadcast.
27
+ */
28
+ onMfaPoll?: (arg0: MfaRequestInfo) => void;
29
+ /**
30
+ * The amount of time (in milliseconds) to wait between checks for MFA
31
+ * updates. Default is 1000ms
32
+ */
33
+ mfaPollIntervalMs?: number;
34
+ }
35
+
36
+ /**
37
+ * A ethers.js Signer using CubeSigner
38
+ */
39
+ export class Signer extends ethers.AbstractSigner {
40
+ /** The address of the account */
41
+ readonly #address: string;
42
+
43
+ /** The key to use for signing */
44
+ #key?: KeyInfo;
45
+
46
+ /** The underlying session */
47
+ readonly #signerSession: SignerSession;
48
+
49
+ /**
50
+ * The function to call when MFA information is retrieved. If this callback
51
+ * throws, no transaction is broadcast.
52
+ */
53
+ readonly #onMfaPoll: (arg0: MfaRequestInfo) => void;
54
+
55
+ /** The amount of time to wait between checks for MFA updates */
56
+ readonly #mfaPollIntervalMs: number;
57
+
58
+ /**
59
+ * Create new Signer instance
60
+ * @param {KeyInfo | string} address The key or the eth address of the account to use.
61
+ * @param {SignerSession} signerSession The underlying Signer session.
62
+ * @param {SignerOptions} options The options to use for the Signer instance
63
+ */
64
+ constructor(address: KeyInfo | string, signerSession: SignerSession, options?: SignerOptions) {
65
+ super(options?.provider);
66
+ if (typeof address === "string") {
67
+ this.#address = address;
68
+ } else {
69
+ this.#address = address.materialId;
70
+ this.#key = address as KeyInfo;
71
+ }
72
+ this.#signerSession = signerSession;
73
+ this.#onMfaPoll = options?.onMfaPoll ?? ((/* _mfaInfo: MfaRequestInfo */) => {}); // eslint-disable-line @typescript-eslint/no-empty-function
74
+ this.#mfaPollIntervalMs = options?.mfaPollIntervalMs ?? 1000;
75
+ }
76
+
77
+ /** Resolves to the signer address. */
78
+ async getAddress(): Promise<string> {
79
+ return this.#address;
80
+ }
81
+
82
+ /**
83
+ * Returns the signer connected to %%provider%%.
84
+ * @param {null | ethers.Provider} provider The optional provider instance to use.
85
+ * @return {Signer} The signer connected to signer.
86
+ */
87
+ connect(provider: null | ethers.Provider): Signer {
88
+ return new Signer(this.#address, this.#signerSession, { provider });
89
+ }
90
+
91
+ /**
92
+ * Construct a signing request from a transaction. This populates the transaction
93
+ * type to `0x02` (EIP-1559) unless set.
94
+ *
95
+ * @param {ethers.TransactionRequest} tx The transaction
96
+ * @return {EvmSignRequest} The EVM sign request to be sent to CubeSigner
97
+ */
98
+ async evmSignRequestFromTx(tx: ethers.TransactionRequest): Promise<EvmSignRequest> {
99
+ // get the chain id from the network or tx
100
+ let chainId = tx.chainId;
101
+ if (chainId === undefined) {
102
+ const network = await this.provider?.getNetwork();
103
+ chainId = network?.chainId?.toString() ?? "1";
104
+ }
105
+
106
+ // Convert the transaction into a JSON-RPC transaction
107
+ const rpcTx =
108
+ this.provider instanceof JsonRpcApiProvider
109
+ ? this.provider.getRpcTransaction(tx)
110
+ : // We can just call the getRpcTransaction with a
111
+ // null receiver since it doesn't actually use it
112
+ // (and really should be declared static).
113
+ JsonRpcApiProvider.prototype.getRpcTransaction.call(null, tx);
114
+ rpcTx.type = toBeHex(tx.type ?? 0x02, 1); // we expect 0x0[0-2]
115
+
116
+ return <EvmSignRequest>{
117
+ chain_id: Number(chainId),
118
+ tx: rpcTx,
119
+ };
120
+ }
121
+
122
+ /**
123
+ * Sign a transaction. This method will block if the key requires MFA approval.
124
+ * @param {ethers.TransactionRequest} tx The transaction to sign.
125
+ * @return {Promise<string>} Hex-encoded RLP encoding of the transaction and its signature.
126
+ */
127
+ async signTransaction(tx: ethers.TransactionRequest): Promise<string> {
128
+ const req = await this.evmSignRequestFromTx(tx);
129
+ const res = await this.#signerSession.signEvm(this.#address, req);
130
+ const data = await this.#handleMfa(res);
131
+ return data.rlp_signed_tx;
132
+ }
133
+
134
+ /**
135
+ * Signs arbitrary messages. This uses CubeSigner's EIP-191 signing endpoint.
136
+ * The key (for this session) must have the `"AllowRawBlobSigning"` or
137
+ * `"AllowEip191Signing"` policy attached.
138
+ * @param {string | Uint8Array} message The message to sign.
139
+ * @return {Promise<string>} The signature.
140
+ */
141
+ async signMessage(message: string | Uint8Array): Promise<string> {
142
+ const key = await this.key();
143
+ const res = await this.#signerSession.signEip191(key.material_id, <Eip191SignRequest>{
144
+ data: encodeToHex(message),
145
+ });
146
+ const data = await this.#handleMfa(res);
147
+ return data.signature;
148
+ }
149
+
150
+ /**
151
+ * Signs EIP-712 typed data. This uses CubeSigner's EIP-712 signing endpoint.
152
+ * The key (for this session) must have the `"AllowRawBlobSigning"` or
153
+ * `"AllowEip712Signing"` policy attached.
154
+ * @param {TypedDataDomain} domain The domain of the typed data.
155
+ * @param {Record<string, Array<TypedDataField>>} types The types of the typed data.
156
+ * @param {Record<string, any>} value The value of the typed data.
157
+ * @return {Promise<string>} The signature.
158
+ */
159
+ async signTypedData(
160
+ domain: TypedDataDomain,
161
+ types: Record<string, Array<TypedDataField>>,
162
+ value: Record<string, any>, // eslint-disable-line @typescript-eslint/no-explicit-any
163
+ ): Promise<string> {
164
+ const key = await this.key();
165
+ const res = await this.#signerSession.signEip712(key.material_id, <Eip712SignRequest>{
166
+ chain_id: 1,
167
+ // eslint-disable-next-line @typescript-eslint/no-explicit-any
168
+ typed_data: <any>{
169
+ domain,
170
+ types,
171
+ primaryType: TypedDataEncoder.getPrimaryType(types),
172
+ message: value,
173
+ },
174
+ });
175
+ const data = await this.#handleMfa(res);
176
+ return data.signature;
177
+ }
178
+
179
+ /** @return {KeyInfo} The key corresponding to this address */
180
+ private async key(): Promise<KeyInfo> {
181
+ if (this.#key === undefined) {
182
+ const key = (await this.#signerSession.keys()).find((k) => k.material_id === this.#address);
183
+ if (key === undefined) {
184
+ throw new Error(`Cannot access key '${this.#address}'`);
185
+ }
186
+ this.#key = key;
187
+ }
188
+ return this.#key;
189
+ }
190
+
191
+ /**
192
+ * Initialize the signing a message using MFA approvals. This method populates
193
+ * missing fields. If the signing does not require MFA, this method throws.
194
+ * @param {ethers.TransactionRequest} tx The transaction to send.
195
+ * @return {string} The MFA id associated with the signing request.
196
+ */
197
+ async sendTransactionMfaInit(tx: ethers.TransactionRequest): Promise<string> {
198
+ const popTx = await this.populateTransaction(tx);
199
+ const req = await this.evmSignRequestFromTx(popTx);
200
+ const res = await this.#signerSession.signEvm(this.#address, req);
201
+ return res.mfaId();
202
+ }
203
+
204
+ /**
205
+ * Send a transaction from an approved MFA request. The MFA request contains
206
+ * information about the approved signing request, which this method will
207
+ * execute.
208
+ * @param {MfaRequestInfo} mfaInfo The approved MFA request.
209
+ * @return {ethers.TransactionResponse} The result of submitting the transaction
210
+ */
211
+ async sendTransactionMfaApproved(mfaInfo: MfaRequestInfo): Promise<ethers.TransactionResponse> {
212
+ if (!mfaInfo.request.path.includes("/eth1/sign/")) {
213
+ throw new Error(`Expected EVM transaction signing request, got ${mfaInfo.request.path}`);
214
+ }
215
+ if (!mfaInfo.request.path.includes(this.#address)) {
216
+ throw new Error(
217
+ `Expected signing request for ${this.#address} but got ${mfaInfo.request.path}`,
218
+ );
219
+ }
220
+
221
+ const signedTx = await this.#signerSession.signEvm(
222
+ this.#address,
223
+ mfaInfo.request.body as EvmSignRequest,
224
+ {
225
+ mfaId: mfaInfo.id,
226
+ mfaOrgId: this.#signerSession.orgId,
227
+ mfaConf: mfaInfo.receipt!.confirmation,
228
+ },
229
+ );
230
+ return await this.provider!.broadcastTransaction(signedTx.data().rlp_signed_tx);
231
+ }
232
+
233
+ /**
234
+ * If the sign request requires MFA, this method waits for approvals
235
+ * @param {CubeSignerResponse<U>} res The response of a sign request
236
+ * @return {Promise<U>} The sign data after MFA approvals
237
+ */
238
+ async #handleMfa<U>(res: CubeSignerResponse<U>): Promise<U> {
239
+ while (res.requiresMfa()) {
240
+ await new Promise((resolve) => setTimeout(resolve, this.#mfaPollIntervalMs));
241
+
242
+ const mfaId = res.mfaId();
243
+ const mfaInfo = await this.#signerSession.getMfaInfo(mfaId);
244
+ this.#onMfaPoll(mfaInfo);
245
+ if (mfaInfo.receipt) {
246
+ res = await res.signWithMfaApproval({
247
+ mfaId,
248
+ mfaOrgId: this.#signerSession.orgId,
249
+ mfaConf: mfaInfo.receipt.confirmation,
250
+ });
251
+ }
252
+ }
253
+ return res.data();
254
+ }
255
+ }
package/tsconfig.json ADDED
@@ -0,0 +1,14 @@
1
+ {
2
+ "extends": "../../tsconfig.json",
3
+ "compilerOptions": {
4
+ "module": "Node16",
5
+ "moduleResolution": "node16",
6
+ "outDir": "./dist"
7
+ },
8
+ "typedocOptions": {
9
+ "out": "./docs",
10
+ "entryPoints": ["src/index.ts"]
11
+ },
12
+ "exclude": ["node_modules", "dist"],
13
+ "include": ["src/**/*.ts"]
14
+ }