@graphprotocol/hypergraph 0.0.1 → 0.0.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/connect/abis/MainVotingPlugin.json +1865 -0
- package/dist/connect/abis/PersonalSpaceAdminPlugin.json +531 -0
- package/dist/connect/abis.d.ts +115 -0
- package/dist/connect/abis.d.ts.map +1 -0
- package/dist/connect/abis.js +141 -0
- package/dist/connect/abis.js.map +1 -0
- package/dist/connect/auth-storage.d.ts +15 -0
- package/dist/connect/auth-storage.js +53 -0
- package/dist/connect/auth-storage.js.map +1 -0
- package/dist/connect/create-app-identity.d.ts +7 -0
- package/dist/connect/create-app-identity.js +15 -0
- package/dist/connect/create-app-identity.js.map +1 -0
- package/dist/connect/create-auth-url.d.ts +15 -0
- package/dist/connect/create-callback-params.d.ts +28 -0
- package/dist/connect/create-callback-params.d.ts.map +1 -1
- package/dist/connect/create-callback-params.js.map +1 -1
- package/dist/connect/create-identity-keys.d.ts +3 -0
- package/dist/connect/create-identity-keys.js +20 -0
- package/dist/connect/create-identity-keys.js.map +1 -0
- package/dist/connect/identity-encryption.d.ts +12 -0
- package/dist/connect/identity-encryption.d.ts.map +1 -1
- package/dist/connect/identity-encryption.js +187 -0
- package/dist/connect/identity-encryption.js.map +1 -0
- package/dist/connect/index.d.ts +11 -0
- package/dist/connect/index.d.ts.map +1 -1
- package/dist/connect/index.js +11 -0
- package/dist/connect/index.js.map +1 -0
- package/dist/connect/login.d.ts +22 -0
- package/dist/connect/login.d.ts.map +1 -1
- package/dist/connect/login.js +172 -0
- package/dist/connect/login.js.map +1 -0
- package/dist/connect/parse-auth-params.d.ts +14 -0
- package/dist/connect/parse-auth-params.d.ts.map +1 -0
- package/dist/connect/parse-auth-params.js +40 -0
- package/dist/connect/parse-auth-params.js.map +1 -0
- package/dist/connect/parse-callback-params.d.ts +13 -0
- package/dist/connect/parse-callback-params.d.ts.map +1 -1
- package/dist/connect/parse-callback-params.js +4 -1
- package/dist/connect/parse-callback-params.js.map +1 -1
- package/dist/connect/smart-account.d.ts +96 -0
- package/dist/connect/smart-account.d.ts.map +1 -0
- package/dist/connect/smart-account.js +761 -0
- package/dist/connect/smart-account.js.map +1 -0
- package/dist/connect/types.d.ts +2 -0
- package/dist/connect/types.d.ts.map +1 -1
- package/dist/connect/types.js.map +1 -1
- package/dist/entity/create.d.ts +8 -0
- package/dist/entity/create.js +51 -0
- package/dist/entity/create.js.map +1 -0
- package/dist/entity/decodedEntitiesCache.d.ts +23 -0
- package/dist/entity/decodedEntitiesCache.d.ts.map +1 -1
- package/dist/entity/decodedEntitiesCache.js +2 -0
- package/dist/entity/decodedEntitiesCache.js.map +1 -0
- package/dist/entity/delete.d.ts +12 -0
- package/dist/entity/delete.js +44 -0
- package/dist/entity/delete.js.map +1 -0
- package/dist/entity/entity.d.ts +18 -0
- package/dist/entity/entity.js +19 -0
- package/dist/entity/entity.js.map +1 -0
- package/dist/entity/entityRelationParentsMap.d.ts +4 -0
- package/dist/entity/entityRelationParentsMap.js +2 -0
- package/dist/entity/entityRelationParentsMap.js.map +1 -0
- package/dist/entity/findMany.d.ts +22 -0
- package/dist/entity/findMany.d.ts.map +1 -1
- package/dist/entity/findMany.js +8 -8
- package/dist/entity/findMany.js.map +1 -1
- package/dist/entity/findOne.d.ts +8 -0
- package/dist/entity/findOne.js +31 -0
- package/dist/entity/findOne.js.map +1 -0
- package/dist/entity/getEntityRelations.d.ts +4 -0
- package/dist/entity/getEntityRelations.d.ts.map +1 -1
- package/dist/entity/getEntityRelations.js +35 -0
- package/dist/entity/getEntityRelations.js.map +1 -0
- package/dist/entity/hasValidTypesProperty.d.ts +2 -0
- package/dist/entity/hasValidTypesProperty.d.ts.map +1 -0
- package/dist/entity/hasValidTypesProperty.js +4 -0
- package/dist/entity/hasValidTypesProperty.js.map +1 -0
- package/dist/entity/index.d.ts +9 -0
- package/dist/entity/index.js +9 -0
- package/dist/entity/index.js.map +1 -0
- package/dist/entity/relationParentsMap.d.ts +4 -0
- package/dist/entity/relationParentsMap.js +2 -0
- package/dist/entity/relationParentsMap.js.map +1 -0
- package/dist/entity/removeRelation.d.ts +7 -0
- package/dist/entity/removeRelation.js +17 -0
- package/dist/entity/removeRelation.js.map +1 -0
- package/dist/entity/test.d.ts +2 -0
- package/dist/entity/test.d.ts.map +1 -0
- package/dist/entity/test.js +2 -0
- package/dist/entity/test.js.map +1 -0
- package/dist/entity/types.d.ts +8 -8
- package/dist/entity/update.d.ts +8 -0
- package/dist/entity/update.js +58 -0
- package/dist/entity/update.js.map +1 -0
- package/dist/entity/variant-schema.d.ts +247 -0
- package/dist/entity/variant-schema.d.ts.map +1 -0
- package/dist/entity/variant-schema.js +204 -0
- package/dist/entity/variant-schema.js.map +1 -0
- package/dist/identity/auth-storage.d.ts +6 -0
- package/dist/identity/auth-storage.d.ts.map +1 -1
- package/dist/identity/auth-storage.js +52 -0
- package/dist/identity/auth-storage.js.map +1 -0
- package/dist/identity/get-verified-identity.d.ts +7 -0
- package/dist/identity/get-verified-identity.d.ts.map +1 -1
- package/dist/identity/get-verified-identity.js +37 -0
- package/dist/identity/get-verified-identity.js.map +1 -0
- package/dist/identity/identity-encryption.d.ts +7 -0
- package/dist/identity/identity-encryption.js +120 -0
- package/dist/identity/identity-encryption.js.map +1 -0
- package/dist/identity/index.d.ts +7 -0
- package/dist/identity/index.d.ts.map +1 -1
- package/dist/identity/index.js +7 -0
- package/dist/identity/index.js.map +1 -0
- package/dist/identity/logout.d.ts +3 -0
- package/dist/identity/logout.js +9 -0
- package/dist/identity/logout.js.map +1 -0
- package/dist/identity/prove-ownership.d.ts +15 -0
- package/dist/identity/prove-ownership.d.ts.map +1 -1
- package/dist/identity/prove-ownership.js +90 -0
- package/dist/identity/prove-ownership.js.map +1 -0
- package/dist/identity/types.d.ts +37 -0
- package/dist/identity/types.d.ts.map +1 -0
- package/dist/identity/types.js +11 -0
- package/dist/identity/types.js.map +1 -0
- package/dist/inboxes/create-inbox.d.ts +22 -0
- package/dist/inboxes/create-inbox.js +76 -0
- package/dist/inboxes/create-inbox.js.map +1 -0
- package/dist/inboxes/get-list-inboxes.d.ts +20 -0
- package/dist/inboxes/get-list-inboxes.js +45 -0
- package/dist/inboxes/get-list-inboxes.js.map +1 -0
- package/dist/inboxes/index.d.ts +11 -0
- package/dist/inboxes/index.js +11 -0
- package/dist/inboxes/index.js.map +1 -0
- package/dist/inboxes/merge-messages.d.ts +6 -0
- package/dist/inboxes/merge-messages.js +23 -0
- package/dist/inboxes/merge-messages.js.map +1 -0
- package/dist/inboxes/message-encryption.d.ts +15 -0
- package/dist/inboxes/message-encryption.js +29 -0
- package/dist/inboxes/message-encryption.js.map +1 -0
- package/dist/inboxes/message-validation.d.ts +6 -0
- package/dist/inboxes/message-validation.d.ts.map +1 -1
- package/dist/inboxes/message-validation.js +53 -0
- package/dist/inboxes/message-validation.js.map +1 -0
- package/dist/inboxes/prepare-message.d.ts +2 -2
- package/dist/inboxes/prepare-message.js +78 -0
- package/dist/inboxes/prepare-message.js.map +1 -0
- package/dist/inboxes/recover-inbox-creator.d.ts +5 -0
- package/dist/inboxes/recover-inbox-creator.js +24 -0
- package/dist/inboxes/recover-inbox-creator.js.map +1 -0
- package/dist/inboxes/recover-inbox-message-signer.d.ts +4 -0
- package/dist/inboxes/recover-inbox-message-signer.js +32 -0
- package/dist/inboxes/recover-inbox-message-signer.js.map +1 -0
- package/dist/inboxes/send-message.d.ts +19 -0
- package/dist/inboxes/send-message.js +58 -0
- package/dist/inboxes/send-message.js.map +1 -0
- package/dist/inboxes/types.d.ts +4 -0
- package/dist/inboxes/types.d.ts.map +1 -0
- package/dist/inboxes/types.js +3 -0
- package/dist/inboxes/types.js.map +1 -0
- package/dist/index.d.ts +14 -0
- package/dist/index.js +14 -0
- package/dist/index.js.map +1 -0
- package/dist/key/create-key.d.ts +11 -0
- package/dist/key/create-key.d.ts.map +1 -0
- package/dist/key/create-key.js +22 -0
- package/dist/key/create-key.js.map +1 -0
- package/dist/key/decrypt-key.d.ts +9 -0
- package/dist/key/decrypt-key.d.ts.map +1 -0
- package/dist/key/decrypt-key.js +16 -0
- package/dist/key/decrypt-key.js.map +1 -0
- package/dist/key/encrypt-key.d.ts +11 -0
- package/dist/key/encrypt-key.d.ts.map +1 -0
- package/dist/key/encrypt-key.js +20 -0
- package/dist/key/encrypt-key.js.map +1 -0
- package/dist/key/index.d.ts +5 -0
- package/dist/key/index.d.ts.map +1 -0
- package/dist/key/index.js +5 -0
- package/dist/key/index.js.map +1 -0
- package/dist/key/key-box.d.ts +19 -0
- package/dist/key/key-box.d.ts.map +1 -0
- package/dist/key/key-box.js +38 -0
- package/dist/key/key-box.js.map +1 -0
- package/dist/messages/decrypt-message.d.ts +7 -0
- package/dist/messages/decrypt-message.d.ts.map +1 -0
- package/dist/messages/decrypt-message.js +11 -0
- package/dist/messages/decrypt-message.js.map +1 -0
- package/dist/messages/encrypt-message.d.ts +7 -0
- package/dist/messages/encrypt-message.d.ts.map +1 -0
- package/dist/messages/encrypt-message.js +12 -0
- package/dist/messages/encrypt-message.js.map +1 -0
- package/dist/messages/index.d.ts +6 -0
- package/dist/messages/index.js +6 -0
- package/dist/messages/index.js.map +1 -0
- package/dist/messages/serialize.d.ts +3 -0
- package/dist/messages/serialize.d.ts.map +1 -0
- package/dist/messages/serialize.js +30 -0
- package/dist/messages/serialize.js.map +1 -0
- package/dist/messages/signed-update-message.d.ts +23 -0
- package/dist/messages/signed-update-message.js +56 -0
- package/dist/messages/signed-update-message.js.map +1 -0
- package/dist/messages/types.d.ts +1268 -0
- package/dist/messages/types.d.ts.map +1 -1
- package/dist/messages/types.js +312 -0
- package/dist/messages/types.js.map +1 -0
- package/dist/space-events/accept-invitation.d.ts +9 -0
- package/dist/space-events/accept-invitation.js +28 -0
- package/dist/space-events/accept-invitation.js.map +1 -0
- package/dist/space-events/apply-event.d.ts +11 -0
- package/dist/space-events/apply-event.js +130 -0
- package/dist/space-events/apply-event.js.map +1 -0
- package/dist/space-events/create-inbox.d.ts +14 -0
- package/dist/space-events/create-inbox.js +41 -0
- package/dist/space-events/create-inbox.js.map +1 -0
- package/dist/space-events/create-invitation.d.ts +12 -0
- package/dist/space-events/create-invitation.js +30 -0
- package/dist/space-events/create-invitation.js.map +1 -0
- package/dist/space-events/create-space.d.ts +9 -0
- package/dist/space-events/create-space.js +29 -0
- package/dist/space-events/create-space.js.map +1 -0
- package/dist/space-events/delete-space.d.ts +10 -0
- package/dist/space-events/delete-space.js +30 -0
- package/dist/space-events/delete-space.js.map +1 -0
- package/dist/space-events/hash-event.d.ts +3 -0
- package/dist/space-events/hash-event.js +7 -0
- package/dist/space-events/hash-event.js.map +1 -0
- package/dist/space-events/index.d.ts +9 -0
- package/dist/space-events/index.js +9 -0
- package/dist/space-events/index.js.map +1 -0
- package/dist/space-events/types.d.ts +222 -0
- package/dist/space-events/types.d.ts.map +1 -0
- package/dist/space-events/types.js +102 -0
- package/dist/space-events/types.js.map +1 -0
- package/dist/space-info/decrypt-space-info.d.ts +7 -0
- package/dist/space-info/decrypt-space-info.js +18 -0
- package/dist/space-info/decrypt-space-info.js.map +1 -0
- package/dist/space-info/encrypt-and-sign-space-info.d.ts +17 -0
- package/dist/space-info/encrypt-and-sign-space-info.js +39 -0
- package/dist/space-info/encrypt-and-sign-space-info.js.map +1 -0
- package/dist/space-info/index.d.ts +4 -0
- package/dist/space-info/index.js +4 -0
- package/dist/space-info/index.js.map +1 -0
- package/dist/space-info/types.d.ts +6 -0
- package/dist/space-info/types.d.ts.map +1 -0
- package/dist/space-info/types.js +5 -0
- package/dist/space-info/types.js.map +1 -0
- package/dist/store-connect.d.ts +149 -0
- package/dist/store-connect.d.ts.map +1 -1
- package/dist/store-connect.js +289 -0
- package/dist/store-connect.js.map +1 -0
- package/dist/store.d.ts +158 -0
- package/dist/store.d.ts.map +1 -1
- package/dist/store.js +354 -0
- package/dist/store.js.map +1 -0
- package/dist/type/type.d.ts +14 -0
- package/dist/type/type.d.ts.map +1 -1
- package/dist/type/type.js +25 -0
- package/dist/type/type.js.map +1 -0
- package/dist/types.d.ts +80 -0
- package/dist/types.d.ts.map +1 -0
- package/dist/types.js +37 -0
- package/dist/types.js.map +1 -0
- package/dist/utils/assertExhaustive.d.ts +2 -0
- package/dist/utils/assertExhaustive.d.ts.map +1 -0
- package/dist/utils/assertExhaustive.js +4 -0
- package/dist/utils/assertExhaustive.js.map +1 -0
- package/dist/utils/automergeId.d.ts +1 -1
- package/dist/utils/automergeId.d.ts.map +1 -1
- package/dist/utils/automergeId.js +1 -1
- package/dist/utils/automergeId.js.map +1 -1
- package/dist/utils/base58.d.ts +36 -0
- package/dist/utils/base58.d.ts.map +1 -0
- package/dist/utils/base58.js +62 -0
- package/dist/utils/base58.js.map +1 -0
- package/dist/utils/hexBytesAddressUtils.d.ts +4 -0
- package/dist/utils/hexBytesAddressUtils.d.ts.map +1 -0
- package/dist/utils/hexBytesAddressUtils.js +21 -0
- package/dist/utils/hexBytesAddressUtils.js.map +1 -0
- package/dist/utils/index.d.ts +9 -0
- package/dist/utils/index.js +9 -0
- package/dist/utils/index.js.map +1 -0
- package/dist/utils/internal/base58Utils.d.ts +4 -0
- package/dist/utils/internal/base58Utils.d.ts.map +1 -0
- package/dist/utils/internal/base58Utils.js +40 -0
- package/dist/utils/internal/base58Utils.js.map +1 -0
- package/dist/utils/internal/deep-merge.d.ts +7 -0
- package/dist/utils/internal/deep-merge.d.ts.map +1 -0
- package/dist/utils/internal/deep-merge.js +33 -0
- package/dist/utils/internal/deep-merge.js.map +1 -0
- package/dist/utils/isRelationField.d.ts +3 -0
- package/dist/utils/isRelationField.d.ts.map +1 -0
- package/dist/utils/isRelationField.js +8 -0
- package/dist/utils/isRelationField.js.map +1 -0
- package/dist/utils/jsc.d.ts +49 -0
- package/dist/utils/jsc.d.ts.map +1 -0
- package/dist/utils/jsc.js +88 -0
- package/dist/utils/jsc.js.map +1 -0
- package/dist/utils/stringToUint8Array.d.ts +3 -0
- package/dist/utils/stringToUint8Array.d.ts.map +1 -0
- package/dist/utils/stringToUint8Array.js +9 -0
- package/dist/utils/stringToUint8Array.js.map +1 -0
- package/package.json +5 -2
- package/src/connect/abis/MainVotingPlugin.json +1865 -0
- package/src/connect/abis/PersonalSpaceAdminPlugin.json +531 -0
- package/src/connect/abis.ts +183 -0
- package/src/connect/create-callback-params.ts +4 -1
- package/src/connect/identity-encryption.ts +10 -14
- package/src/connect/index.ts +1 -1
- package/src/connect/login.ts +106 -18
- package/src/connect/parse-callback-params.ts +4 -1
- package/src/connect/smart-account.ts +915 -0
- package/src/connect/types.ts +2 -0
- package/src/entity/decodedEntitiesCache.ts +1 -1
- package/src/entity/findMany.ts +16 -14
- package/src/entity/getEntityRelations.ts +1 -1
- package/src/entity/types.ts +8 -8
- package/src/identity/auth-storage.ts +11 -1
- package/src/identity/get-verified-identity.ts +6 -1
- package/src/identity/index.ts +1 -1
- package/src/identity/prove-ownership.ts +52 -8
- package/src/inboxes/message-validation.ts +17 -2
- package/src/messages/types.ts +6 -0
- package/src/store-connect.ts +1 -52
- package/src/store.ts +78 -48
- package/src/type/type.ts +4 -2
- package/src/types.ts +19 -1
- package/src/utils/automergeId.ts +1 -1
- package/dist/connect/prove-ownership.d.ts.map +0 -1
- package/src/connect/prove-ownership.ts +0 -58
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"variant-schema.js","names":["constUndefined","dual","Option","ParseResult","pipeArguments","Predicate","Schema","Struct_","TypeId","Symbol","for","cacheSymbol","isStruct","u","hasProperty","FieldTypeId","isField","extract","args","self","variant","options","cache","cacheKey","isDefault","undefined","fields","key","Object","keys","value","isSchema","schemas","Struct","make","Class","identifier","annotations","idField","Field","select","String","deletedField","Boolean","versionField","relationField","optional","id","extractFields","__deleted","__version","_relation","variantStruct","schema","defaultVariant","Base","variants","defineProperty","title","FieldOnly","obj","FieldExcept","includes","UnionVariants","members","Union","fieldEvolve","f","field","fromEntries","map","evolve","fieldFromKey","mapping","entries","renameFieldValue","extractVariants","Override","Overrideable","from","to","transformOrFail","Undefined","pipe","brand","decode","_","succeed","encode","dt","generate","none","some","propertySignature","withConstructorDefault","StructProto","arguments","create","FieldProto","VariantUnion","filter","member","isPropertySignature","fromKey"],"sources":["../../src/entity/variant-schema.ts"],"sourcesContent":[null],"mappings":"AAKA,SAASA,cAAc,EAAEC,IAAI,QAAQ,iBAAiB;AACtD,OAAO,KAAKC,MAAM,MAAM,eAAe;AACvC,OAAO,KAAKC,WAAW,MAAM,oBAAoB;AACjD,SAAwBC,aAAa,QAAQ,iBAAiB;AAC9D,OAAO,KAAKC,SAAS,MAAM,kBAAkB;AAC7C,OAAO,KAAKC,MAAM,MAAM,eAAe;AAEvC,OAAO,KAAKC,OAAO,MAAM,eAAe;AAExC;;;;AAIA,OAAO,MAAMC,MAAM,gBAAkBC,MAAM,CAACC,GAAG,CAAC,oCAAoC,CAAC;AAQrF,MAAMC,WAAW,gBAAGF,MAAM,CAACC,GAAG,CAAC,0CAA0C,CAAC;AAY1E;;;;AAIA,OAAO,MAAME,QAAQ,GAAIC,CAAU,IAAuBR,SAAS,CAACS,WAAW,CAACD,CAAC,EAAEL,MAAM,CAAC;AAoC1F;;;;AAIA,OAAO,MAAMO,WAAW,gBAAkBN,MAAM,CAACC,GAAG,CAAC,0CAA0C,CAAC;AAiBhG;;;;AAIA,OAAO,MAAMM,OAAO,GAAIH,CAAU,IAAsBR,SAAS,CAACS,WAAW,CAACD,CAAC,EAAEE,WAAW,CAAC;AA4E7F,MAAME,OAAO,gBAcThB,IAAI,CACLiB,IAAI,IAAKN,QAAQ,CAACM,IAAI,CAAC,CAAC,CAAC,CAAC,EAC3B,CACEC,IAAO,EACPC,OAAU,EACVC,OAEC,KACgB;EACjB,MAAMC,KAAK,GAAGH,IAAI,CAACR,WAAW,CAAC,KAAKQ,IAAI,CAACR,WAAW,CAAC,GAAG,EAAE,CAAC;EAC3D,MAAMY,QAAQ,GAAGF,OAAO,EAAEG,SAAS,KAAK,IAAI,GAAG,WAAW,GAAGJ,OAAO;EACpE,IAAIE,KAAK,CAACC,QAAQ,CAAC,KAAKE,SAAS,EAAE;IACjC,OAAOH,KAAK,CAACC,QAAQ,CAAQ;EAC/B;EACA,MAAMG,MAAM,GAAwB,EAAE;EACtC,KAAK,MAAMC,GAAG,IAAIC,MAAM,CAACC,IAAI,CAACV,IAAI,CAACX,MAAM,CAAC,CAAC,EAAE;IAC3C,MAAMsB,KAAK,GAAGX,IAAI,CAACX,MAAM,CAAC,CAACmB,GAAG,CAAC;IAC/B,IAAInB,MAAM,IAAIsB,KAAK,EAAE;MACnB,IAAIT,OAAO,EAAEG,SAAS,KAAK,IAAI,IAAIlB,MAAM,CAACyB,QAAQ,CAACD,KAAK,CAAC,EAAE;QACzDJ,MAAM,CAACC,GAAG,CAAC,GAAGG,KAAK;MACrB,CAAC,MAAM;QACLJ,MAAM,CAACC,GAAG,CAAC,GAAGV,OAAO,CAACa,KAAK,EAAEV,OAAO,CAAC;MACvC;IACF,CAAC,MAAM,IAAIL,WAAW,IAAIe,KAAK,EAAE;MAC/B,IAAIV,OAAO,IAAIU,KAAK,CAACE,OAAO,EAAE;QAC5BN,MAAM,CAACC,GAAG,CAAC,GAAGG,KAAK,CAACE,OAAO,CAACZ,OAAO,CAAC;MACtC;IACF,CAAC,MAAM;MACLM,MAAM,CAACC,GAAG,CAAC,GAAGG,KAAK;IACrB;EACF;EACA,OAAQR,KAAK,CAACC,QAAQ,CAAC,GAAGjB,MAAM,CAAC2B,MAAM,CAACP,MAAM,CAAQ;AACxD,CAAC,CACF;AAED;;;;AAIA,OAAO,MAAMA,MAAM,GAA2BP,IAAO,IAAgBA,IAAI,CAACX,MAAM,CAAC;AA0GjF;;;;AAIA,OAAO,MAAM0B,IAAI,GAA0Fb,OAG1G,IA6IG;EACF,SAASc,KAAKA,CAAOC,UAAkB;IACrC,OAAO,CAACV,MAAqB,EAAEW,WAA6C,KAAI;MAC9E,MAAMC,OAAO,GAAGC,KAAK,CAAC;QACpBC,MAAM,EAAElC,MAAM,CAACmC;OAChB,CAAC;MACF,MAAMC,YAAY,GAAGH,KAAK,CAAC;QACzBC,MAAM,EAAElC,MAAM,CAACqC;OAChB,CAAC;MACF,MAAMC,YAAY,GAAGL,KAAK,CAAC;QACzBC,MAAM,EAAElC,MAAM,CAACmC;OAChB,CAAC;MACF,MAAMI,aAAa,GAAGN,KAAK,CAAC;QAC1BC,MAAM,EAAElC,MAAM,CAACwC,QAAQ,CACrBxC,MAAM,CAAC2B,MAAM,CAAC;UACZc,EAAE,EAAEzC,MAAM,CAACmC;SACZ,CAAC;OAEL,CAAC;MAEF,MAAMO,aAAa,GAAkB;QACnC,GAAGtB,MAAM;QACTqB,EAAE,EAAET,OAAO;QACXW,SAAS,EAAEP,YAAY;QACvBQ,SAAS,EAAEN,YAAY;QACvBO,SAAS,EAAEN;OACZ;MACD,MAAMO,aAAa,GAAGnB,MAAM,CAACe,aAAa,CAAC;MAC3C,MAAMK,MAAM,GAAGpC,OAAO,CAACmC,aAAa,EAAE/B,OAAO,CAACiC,cAAc,EAAE;QAC5D9B,SAAS,EAAE;OACZ,CAAC;MACF,MAAM+B,IAAK,SAAQjD,MAAM,CAAC6B,KAAK,CAAMC,UAAU,CAAC,CAACiB,MAAM,CAAC3B,MAAM,EAAEW,WAAW,CAAC;QAC1E,QAAQ7B,MAAM,IAAIwC,aAAa;;MAEjC,KAAK,MAAM5B,OAAO,IAAIC,OAAO,CAACmC,QAAQ,EAAE;QACtC5B,MAAM,CAAC6B,cAAc,CAACF,IAAI,EAAEnC,OAAO,EAAE;UACnCU,KAAK,EAAEb,OAAO,CAACmC,aAAa,EAAEhC,OAAO,CAAC,CAACiB,WAAW,CAAC;YACjDD,UAAU,EAAE,GAAGA,UAAU,IAAIhB,OAAO,EAAE;YACtCsC,KAAK,EAAE,GAAGtB,UAAU,IAAIhB,OAAO;WAChC;SACF,CAAC;MACJ;MACA,OAAOmC,IAAI;IACb,CAAC;EACH;EACA,SAASI,SAASA,CAAwB,GAAG9B,IAAU;IACrD,OAAoEwB,MAAS,IAAI;MAC/E,MAAMO,GAAG,GAAsB,EAAE;MACjC,KAAK,MAAMjC,GAAG,IAAIE,IAAI,EAAE;QACtB+B,GAAG,CAACjC,GAAG,CAAC,GAAG0B,MAAM;MACnB;MACA,OAAOd,KAAK,CAACqB,GAAG,CAAC;IACnB,CAAC;EACH;EACA,SAASC,WAAWA,CAAwB,GAAGhC,IAAU;IACvD,OAAoEwB,MAAS,IAAI;MAC/E,MAAMO,GAAG,GAAsB,EAAE;MACjC,KAAK,MAAMxC,OAAO,IAAIC,OAAO,CAACmC,QAAQ,EAAE;QACtC,IAAI,CAAC3B,IAAI,CAACiC,QAAQ,CAAC1C,OAAO,CAAC,EAAE;UAC3BwC,GAAG,CAACxC,OAAO,CAAC,GAAGiC,MAAM;QACvB;MACF;MACA,OAAOd,KAAK,CAACqB,GAAG,CAAC;IACnB,CAAC;EACH;EACA,SAASG,aAAaA,CAAC,GAAGC,OAAmC;IAC3D,OAAOC,KAAK,CAACD,OAAO,EAAE3C,OAAO,CAACmC,QAAQ,CAAC;EACzC;EACA,MAAMU,WAAW,GAAGjE,IAAI,CACtB,CAAC,EACD,CACEkB,IAAmE,EACnEgD,CAA6D,KAC/C;IACd,MAAMC,KAAK,GAAGpD,OAAO,CAACG,IAAI,CAAC,GACvBA,IAAI,GACJoB,KAAK,CAACX,MAAM,CAACyC,WAAW,CAAChD,OAAO,CAACmC,QAAQ,CAACc,GAAG,CAAElD,OAAO,IAAK,CAACA,OAAO,EAAED,IAAI,CAAC,CAAC,CAAC,CAAC;IACjF,OAAOoB,KAAK,CAAChC,OAAO,CAACgE,MAAM,CAACH,KAAK,CAACpC,OAAO,EAAEmC,CAAC,CAAC,CAAC;EAChD,CAAC,CACF;EACD,MAAMK,YAAY,GAAGvE,IAAI,CACvB,CAAC,EACD,CACEkB,IAKgC,EAChCsD,OAA+B,KACjB;IACd,MAAMb,GAAG,GAAwB,EAAE;IACnC,IAAI5C,OAAO,CAACG,IAAI,CAAC,EAAE;MACjB,KAAK,MAAM,CAACQ,GAAG,EAAE0B,MAAM,CAAC,IAAIzB,MAAM,CAAC8C,OAAO,CAACvD,IAAI,CAACa,OAAO,CAAC,EAAE;QACxD4B,GAAG,CAACjC,GAAG,CAAC,GAAG8C,OAAO,CAAC9C,GAAG,CAAC,KAAKF,SAAS,GAAGkD,gBAAgB,CAACtB,MAAa,EAAEoB,OAAO,CAAC9C,GAAG,CAAC,CAAC,GAAG0B,MAAM;MAChG;IACF,CAAC,MAAM;MACL,KAAK,MAAM1B,GAAG,IAAIN,OAAO,CAACmC,QAAQ,EAAE;QAClCI,GAAG,CAACjC,GAAG,CAAC,GAAG8C,OAAO,CAAC9C,GAAG,CAAC,KAAKF,SAAS,GAAGkD,gBAAgB,CAACxD,IAAW,EAAEsD,OAAO,CAAC9C,GAAG,CAAC,CAAC,GAAGR,IAAI;MAC5F;IACF;IACA,OAAOoB,KAAK,CAACqB,GAAG,CAAC;EACnB,CAAC,CACF;EACD,MAAMgB,eAAe,GAAG3E,IAAI,CAAC,CAAC,EAAE,CAACkB,IAAiB,EAAEC,OAAe,KACjEH,OAAO,CAACE,IAAI,EAAEC,OAAO,EAAE;IACrBI,SAAS,EAAEJ,OAAO,KAAKC,OAAO,CAACiC;GAChC,CAAC,CACH;EACD,OAAO;IACLrB,MAAM;IACNM,KAAK;IACLoB,SAAS;IACTE,WAAW;IACX1B,KAAK;IACL8B,KAAK,EAAEF,aAAa;IACpBG,WAAW;IACXM,YAAY;IACZvD,OAAO,EAAE2D;GACH;AACV,CAAC;AAED;;;;AAIA,OAAO,MAAMC,QAAQ,GAAO/C,KAAQ,IAA4BA,KAAY;AAS5E;;;;AAIA,OAAO,MAAMgD,YAAY,GAAGA,CAC1BC,IAAuC,EACvCC,EAA0B,EAC1B3D,OAEC,KAEDf,MAAM,CAAC2E,eAAe,CAACF,IAAI,EAAEzE,MAAM,CAAC2D,KAAK,CAAC3D,MAAM,CAAC4E,SAAS,EAAEF,EAAE,CAACG,IAAI,CAAC7E,MAAM,CAAC8E,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,EAAE;EAC9FC,MAAM,EAAGC,CAAC,IAAKnF,WAAW,CAACoF,OAAO,CAAC9D,SAAS,CAAC;EAC7C+D,MAAM,EAAGC,EAAE,IAAKpE,OAAO,CAACqE,QAAQ,CAACD,EAAE,KAAKhE,SAAS,GAAGvB,MAAM,CAACyF,IAAI,EAAE,GAAGzF,MAAM,CAAC0F,IAAI,CAACH,EAAE,CAAC;CACpF,CAAC,CAACN,IAAI,CAAC7E,MAAM,CAACuF,iBAAiB,EAAEvF,MAAM,CAACwF,sBAAsB,CAAC9F,cAAc,CAAC,CAAC;AAElF,MAAM+F,WAAW,GAAG;EAClBZ,IAAIA,CAAA;IACF,OAAO/E,aAAa,CAAC,IAAI,EAAE4F,SAAS,CAAC;EACvC;CACD;AAED,MAAM/D,MAAM,GAAkCP,MAAS,IAAe;EACpE,MAAMP,IAAI,GAAGS,MAAM,CAACqE,MAAM,CAACF,WAAW,CAAC;EACvC5E,IAAI,CAACX,MAAM,CAAC,GAAGkB,MAAM;EACrB,OAAOP,IAAI;AACb,CAAC;AAED,MAAM+E,UAAU,GAAG;EACjB,CAACnF,WAAW,GAAGA,WAAW;EAC1BoE,IAAIA,CAAA;IACF,OAAO/E,aAAa,CAAC,IAAI,EAAE4F,SAAS,CAAC;EACvC;CACD;AAED,MAAMzD,KAAK,GAAkCP,OAAU,IAAc;EACnE,MAAMb,IAAI,GAAGS,MAAM,CAACqE,MAAM,CAACC,UAAU,CAAC;EACtC/E,IAAI,CAACa,OAAO,GAAGA,OAAO;EACtB,OAAOb,IAAI;AACb,CAAC;AAED,MAAM8C,KAAK,GAAGA,CACZD,OAAgB,EAChBR,QAAkB,KAChB;EACF,MAAM2C,YAAa,SAAS7F,MAAM,CAAC2D,KAAK,CAAC,GAAGD,OAAO,CAACoC,MAAM,CAAEC,MAAM,IAAK/F,MAAM,CAACyB,QAAQ,CAACsE,MAAM,CAAC,CAAC,CAAS;EACxG,KAAK,MAAMjF,OAAO,IAAIoC,QAAQ,EAAE;IAC9B5B,MAAM,CAAC6B,cAAc,CAAC0C,YAAY,EAAE/E,OAAO,EAAE;MAC3CU,KAAK,EAAExB,MAAM,CAAC2D,KAAK,CAAC,GAAGD,OAAO,CAACM,GAAG,CAAE+B,MAAM,IAAKpF,OAAO,CAACoF,MAAM,EAAEjF,OAAO,CAAC,CAAC;KACzE,CAAC;EACJ;EACA,OAAO+E,YAAY;AACrB,CAAC;AAED,MAAMxB,gBAAgB,GAAGA,CAA6DxD,IAAO,EAAEQ,GAAW,KACxGrB,MAAM,CAACgG,mBAAmB,CAACnF,IAAI,CAAC,GAAGb,MAAM,CAACiG,OAAO,CAACpF,IAAI,EAAEQ,GAAG,CAAC,GAAGrB,MAAM,CAACiG,OAAO,CAACjG,MAAM,CAACuF,iBAAiB,CAAC1E,IAAI,CAAC,EAAEQ,GAAG,CAAC","ignoreList":[]}
|
|
@@ -0,0 +1,6 @@
|
|
|
1
|
+
import type { PrivateAppIdentity } from '../connect/types.js';
|
|
2
|
+
import type { Storage } from './types.js';
|
|
3
|
+
export declare const storeIdentity: (storage: Storage, identity: PrivateAppIdentity) => void;
|
|
4
|
+
export declare const loadIdentity: (storage: Storage) => PrivateAppIdentity | null;
|
|
5
|
+
export declare const wipeIdentity: (storage: Storage) => void;
|
|
6
|
+
//# sourceMappingURL=auth-storage.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"auth-storage.d.ts","sourceRoot":"","sources":["../../src/identity/auth-storage.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,qBAAqB,CAAC;AAC9D,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,YAAY,CAAC;AAE1C,eAAO,MAAM,aAAa,GAAI,SAAS,OAAO,EAAE,UAAU,kBAAkB,
|
|
1
|
+
{"version":3,"file":"auth-storage.d.ts","sourceRoot":"","sources":["../../src/identity/auth-storage.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,qBAAqB,CAAC;AAC9D,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,YAAY,CAAC;AAE1C,eAAO,MAAM,aAAa,GAAI,SAAS,OAAO,EAAE,UAAU,kBAAkB,SAW3E,CAAC;AAEF,eAAO,MAAM,YAAY,GAAI,SAAS,OAAO,KAAG,kBAAkB,GAAG,IAqCpE,CAAC;AAEF,eAAO,MAAM,YAAY,GAAI,SAAS,OAAO,SAW5C,CAAC"}
|
|
@@ -0,0 +1,52 @@
|
|
|
1
|
+
export const storeIdentity = (storage, identity) => {
|
|
2
|
+
storage.setItem('hypergraph:app-identity-address', identity.address);
|
|
3
|
+
storage.setItem('hypergraph:app-identity-address-private-key', identity.addressPrivateKey);
|
|
4
|
+
storage.setItem('hypergraph:app-identity-account-address', identity.accountAddress);
|
|
5
|
+
storage.setItem('hypergraph:signature-public-key', identity.signaturePublicKey);
|
|
6
|
+
storage.setItem('hypergraph:signature-private-key', identity.signaturePrivateKey);
|
|
7
|
+
storage.setItem('hypergraph:encryption-public-key', identity.encryptionPublicKey);
|
|
8
|
+
storage.setItem('hypergraph:encryption-private-key', identity.encryptionPrivateKey);
|
|
9
|
+
storage.setItem('hypergraph:session-token', identity.sessionToken);
|
|
10
|
+
storage.setItem('hypergraph:session-token-expires', identity.sessionTokenExpires.toISOString());
|
|
11
|
+
storage.setItem('hypergraph:permission-id', identity.permissionId);
|
|
12
|
+
};
|
|
13
|
+
export const loadIdentity = storage => {
|
|
14
|
+
const address = storage.getItem('hypergraph:app-identity-address');
|
|
15
|
+
const addressPrivateKey = storage.getItem('hypergraph:app-identity-address-private-key');
|
|
16
|
+
const accountAddress = storage.getItem('hypergraph:app-identity-account-address');
|
|
17
|
+
const signaturePublicKey = storage.getItem('hypergraph:signature-public-key');
|
|
18
|
+
const signaturePrivateKey = storage.getItem('hypergraph:signature-private-key');
|
|
19
|
+
const encryptionPublicKey = storage.getItem('hypergraph:encryption-public-key');
|
|
20
|
+
const encryptionPrivateKey = storage.getItem('hypergraph:encryption-private-key');
|
|
21
|
+
const sessionToken = storage.getItem('hypergraph:session-token');
|
|
22
|
+
const sessionTokenExpires = storage.getItem('hypergraph:session-token-expires');
|
|
23
|
+
const permissionId = storage.getItem('hypergraph:permission-id');
|
|
24
|
+
if (!address || !addressPrivateKey || !accountAddress || !signaturePublicKey || !signaturePrivateKey || !encryptionPublicKey || !encryptionPrivateKey || !sessionToken || !sessionTokenExpires || !permissionId) {
|
|
25
|
+
return null;
|
|
26
|
+
}
|
|
27
|
+
return {
|
|
28
|
+
address,
|
|
29
|
+
addressPrivateKey,
|
|
30
|
+
accountAddress,
|
|
31
|
+
signaturePublicKey,
|
|
32
|
+
signaturePrivateKey,
|
|
33
|
+
encryptionPublicKey,
|
|
34
|
+
encryptionPrivateKey,
|
|
35
|
+
sessionToken,
|
|
36
|
+
sessionTokenExpires: new Date(sessionTokenExpires),
|
|
37
|
+
permissionId
|
|
38
|
+
};
|
|
39
|
+
};
|
|
40
|
+
export const wipeIdentity = storage => {
|
|
41
|
+
storage.removeItem('hypergraph:app-identity-address');
|
|
42
|
+
storage.removeItem('hypergraph:app-identity-address-private-key');
|
|
43
|
+
storage.removeItem('hypergraph:app-identity-account-address');
|
|
44
|
+
storage.removeItem('hypergraph:signature-public-key');
|
|
45
|
+
storage.removeItem('hypergraph:signature-private-key');
|
|
46
|
+
storage.removeItem('hypergraph:encryption-public-key');
|
|
47
|
+
storage.removeItem('hypergraph:encryption-private-key');
|
|
48
|
+
storage.removeItem('hypergraph:session-token');
|
|
49
|
+
storage.removeItem('hypergraph:session-token-expires');
|
|
50
|
+
storage.removeItem('hypergraph:permission-id');
|
|
51
|
+
};
|
|
52
|
+
//# sourceMappingURL=auth-storage.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"auth-storage.js","names":["storeIdentity","storage","identity","setItem","address","addressPrivateKey","accountAddress","signaturePublicKey","signaturePrivateKey","encryptionPublicKey","encryptionPrivateKey","sessionToken","sessionTokenExpires","toISOString","permissionId","loadIdentity","getItem","Date","wipeIdentity","removeItem"],"sources":["../../src/identity/auth-storage.ts"],"sourcesContent":[null],"mappings":"AAGA,OAAO,MAAMA,aAAa,GAAGA,CAACC,OAAgB,EAAEC,QAA4B,KAAI;EAC9ED,OAAO,CAACE,OAAO,CAAC,iCAAiC,EAAED,QAAQ,CAACE,OAAO,CAAC;EACpEH,OAAO,CAACE,OAAO,CAAC,6CAA6C,EAAED,QAAQ,CAACG,iBAAiB,CAAC;EAC1FJ,OAAO,CAACE,OAAO,CAAC,yCAAyC,EAAED,QAAQ,CAACI,cAAc,CAAC;EACnFL,OAAO,CAACE,OAAO,CAAC,iCAAiC,EAAED,QAAQ,CAACK,kBAAkB,CAAC;EAC/EN,OAAO,CAACE,OAAO,CAAC,kCAAkC,EAAED,QAAQ,CAACM,mBAAmB,CAAC;EACjFP,OAAO,CAACE,OAAO,CAAC,kCAAkC,EAAED,QAAQ,CAACO,mBAAmB,CAAC;EACjFR,OAAO,CAACE,OAAO,CAAC,mCAAmC,EAAED,QAAQ,CAACQ,oBAAoB,CAAC;EACnFT,OAAO,CAACE,OAAO,CAAC,0BAA0B,EAAED,QAAQ,CAACS,YAAY,CAAC;EAClEV,OAAO,CAACE,OAAO,CAAC,kCAAkC,EAAED,QAAQ,CAACU,mBAAmB,CAACC,WAAW,EAAE,CAAC;EAC/FZ,OAAO,CAACE,OAAO,CAAC,0BAA0B,EAAED,QAAQ,CAACY,YAAY,CAAC;AACpE,CAAC;AAED,OAAO,MAAMC,YAAY,GAAId,OAAgB,IAA+B;EAC1E,MAAMG,OAAO,GAAGH,OAAO,CAACe,OAAO,CAAC,iCAAiC,CAAC;EAClE,MAAMX,iBAAiB,GAAGJ,OAAO,CAACe,OAAO,CAAC,6CAA6C,CAAC;EACxF,MAAMV,cAAc,GAAGL,OAAO,CAACe,OAAO,CAAC,yCAAyC,CAAC;EACjF,MAAMT,kBAAkB,GAAGN,OAAO,CAACe,OAAO,CAAC,iCAAiC,CAAC;EAC7E,MAAMR,mBAAmB,GAAGP,OAAO,CAACe,OAAO,CAAC,kCAAkC,CAAC;EAC/E,MAAMP,mBAAmB,GAAGR,OAAO,CAACe,OAAO,CAAC,kCAAkC,CAAC;EAC/E,MAAMN,oBAAoB,GAAGT,OAAO,CAACe,OAAO,CAAC,mCAAmC,CAAC;EACjF,MAAML,YAAY,GAAGV,OAAO,CAACe,OAAO,CAAC,0BAA0B,CAAC;EAChE,MAAMJ,mBAAmB,GAAGX,OAAO,CAACe,OAAO,CAAC,kCAAkC,CAAC;EAC/E,MAAMF,YAAY,GAAGb,OAAO,CAACe,OAAO,CAAC,0BAA0B,CAAC;EAChE,IACE,CAACZ,OAAO,IACR,CAACC,iBAAiB,IAClB,CAACC,cAAc,IACf,CAACC,kBAAkB,IACnB,CAACC,mBAAmB,IACpB,CAACC,mBAAmB,IACpB,CAACC,oBAAoB,IACrB,CAACC,YAAY,IACb,CAACC,mBAAmB,IACpB,CAACE,YAAY,EACb;IACA,OAAO,IAAI;EACb;EACA,OAAO;IACLV,OAAO;IACPC,iBAAiB;IACjBC,cAAc;IACdC,kBAAkB;IAClBC,mBAAmB;IACnBC,mBAAmB;IACnBC,oBAAoB;IACpBC,YAAY;IACZC,mBAAmB,EAAE,IAAIK,IAAI,CAACL,mBAAmB,CAAC;IAClDE;GACD;AACH,CAAC;AAED,OAAO,MAAMI,YAAY,GAAIjB,OAAgB,IAAI;EAC/CA,OAAO,CAACkB,UAAU,CAAC,iCAAiC,CAAC;EACrDlB,OAAO,CAACkB,UAAU,CAAC,6CAA6C,CAAC;EACjElB,OAAO,CAACkB,UAAU,CAAC,yCAAyC,CAAC;EAC7DlB,OAAO,CAACkB,UAAU,CAAC,iCAAiC,CAAC;EACrDlB,OAAO,CAACkB,UAAU,CAAC,kCAAkC,CAAC;EACtDlB,OAAO,CAACkB,UAAU,CAAC,kCAAkC,CAAC;EACtDlB,OAAO,CAACkB,UAAU,CAAC,mCAAmC,CAAC;EACvDlB,OAAO,CAACkB,UAAU,CAAC,0BAA0B,CAAC;EAC9ClB,OAAO,CAACkB,UAAU,CAAC,kCAAkC,CAAC;EACtDlB,OAAO,CAACkB,UAAU,CAAC,0BAA0B,CAAC;AAChD,CAAC","ignoreList":[]}
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
import type { Chain } from 'viem';
|
|
2
|
+
export declare const getVerifiedIdentity: (accountAddress: string, syncServerUri: string, chain: Chain, rpcUrl: string) => Promise<{
|
|
3
|
+
accountAddress: string;
|
|
4
|
+
encryptionPublicKey: string;
|
|
5
|
+
signaturePublicKey: string;
|
|
6
|
+
}>;
|
|
7
|
+
//# sourceMappingURL=get-verified-identity.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"get-verified-identity.d.ts","sourceRoot":"","sources":["../../src/identity/get-verified-identity.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"get-verified-identity.d.ts","sourceRoot":"","sources":["../../src/identity/get-verified-identity.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,MAAM,CAAC;AAKlC,eAAO,MAAM,mBAAmB,GAC9B,gBAAgB,MAAM,EACtB,eAAe,MAAM,EACrB,OAAO,KAAK,EACZ,QAAQ,MAAM,KACb,OAAO,CAAC;IACT,cAAc,EAAE,MAAM,CAAC;IACvB,mBAAmB,EAAE,MAAM,CAAC;IAC5B,kBAAkB,EAAE,MAAM,CAAC;CAC5B,CA0CA,CAAC"}
|
|
@@ -0,0 +1,37 @@
|
|
|
1
|
+
import * as Schema from 'effect/Schema';
|
|
2
|
+
import * as Messages from '../messages/index.js';
|
|
3
|
+
import { store } from '../store.js';
|
|
4
|
+
import { verifyIdentityOwnership } from './prove-ownership.js';
|
|
5
|
+
export const getVerifiedIdentity = async (accountAddress, syncServerUri, chain, rpcUrl) => {
|
|
6
|
+
const storeState = store.getSnapshot();
|
|
7
|
+
const identity = storeState.context.identities[accountAddress];
|
|
8
|
+
if (identity) {
|
|
9
|
+
return {
|
|
10
|
+
accountAddress,
|
|
11
|
+
encryptionPublicKey: identity.encryptionPublicKey,
|
|
12
|
+
signaturePublicKey: identity.signaturePublicKey
|
|
13
|
+
};
|
|
14
|
+
}
|
|
15
|
+
const res = await fetch(`${syncServerUri}/identity?accountAddress=${accountAddress}`);
|
|
16
|
+
if (res.status !== 200) {
|
|
17
|
+
throw new Error('Failed to fetch identity');
|
|
18
|
+
}
|
|
19
|
+
const resDecoded = Schema.decodeUnknownSync(Messages.ResponseIdentity)(await res.json());
|
|
20
|
+
if (!(await verifyIdentityOwnership(resDecoded.accountAddress, resDecoded.signaturePublicKey, resDecoded.accountProof, resDecoded.keyProof, chain, rpcUrl))) {
|
|
21
|
+
throw new Error('Invalid identity in getVerifiedIdentity');
|
|
22
|
+
}
|
|
23
|
+
store.send({
|
|
24
|
+
type: 'addVerifiedIdentity',
|
|
25
|
+
accountAddress: resDecoded.accountAddress,
|
|
26
|
+
encryptionPublicKey: resDecoded.encryptionPublicKey,
|
|
27
|
+
signaturePublicKey: resDecoded.signaturePublicKey,
|
|
28
|
+
accountProof: resDecoded.accountProof,
|
|
29
|
+
keyProof: resDecoded.keyProof
|
|
30
|
+
});
|
|
31
|
+
return {
|
|
32
|
+
accountAddress: resDecoded.accountAddress,
|
|
33
|
+
encryptionPublicKey: resDecoded.encryptionPublicKey,
|
|
34
|
+
signaturePublicKey: resDecoded.signaturePublicKey
|
|
35
|
+
};
|
|
36
|
+
};
|
|
37
|
+
//# sourceMappingURL=get-verified-identity.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"get-verified-identity.js","names":["Schema","Messages","store","verifyIdentityOwnership","getVerifiedIdentity","accountAddress","syncServerUri","chain","rpcUrl","storeState","getSnapshot","identity","context","identities","encryptionPublicKey","signaturePublicKey","res","fetch","status","Error","resDecoded","decodeUnknownSync","ResponseIdentity","json","accountProof","keyProof","send","type"],"sources":["../../src/identity/get-verified-identity.ts"],"sourcesContent":[null],"mappings":"AAAA,OAAO,KAAKA,MAAM,MAAM,eAAe;AAEvC,OAAO,KAAKC,QAAQ,MAAM,sBAAsB;AAChD,SAASC,KAAK,QAAQ,aAAa;AACnC,SAASC,uBAAuB,QAAQ,sBAAsB;AAE9D,OAAO,MAAMC,mBAAmB,GAAG,MAAAA,CACjCC,cAAsB,EACtBC,aAAqB,EACrBC,KAAY,EACZC,MAAc,KAKX;EACH,MAAMC,UAAU,GAAGP,KAAK,CAACQ,WAAW,EAAE;EACtC,MAAMC,QAAQ,GAAGF,UAAU,CAACG,OAAO,CAACC,UAAU,CAACR,cAAc,CAAC;EAC9D,IAAIM,QAAQ,EAAE;IACZ,OAAO;MACLN,cAAc;MACdS,mBAAmB,EAAEH,QAAQ,CAACG,mBAAmB;MACjDC,kBAAkB,EAAEJ,QAAQ,CAACI;KAC9B;EACH;EACA,MAAMC,GAAG,GAAG,MAAMC,KAAK,CAAC,GAAGX,aAAa,4BAA4BD,cAAc,EAAE,CAAC;EACrF,IAAIW,GAAG,CAACE,MAAM,KAAK,GAAG,EAAE;IACtB,MAAM,IAAIC,KAAK,CAAC,0BAA0B,CAAC;EAC7C;EACA,MAAMC,UAAU,GAAGpB,MAAM,CAACqB,iBAAiB,CAACpB,QAAQ,CAACqB,gBAAgB,CAAC,CAAC,MAAMN,GAAG,CAACO,IAAI,EAAE,CAAC;EAExF,IACE,EAAE,MAAMpB,uBAAuB,CAC7BiB,UAAU,CAACf,cAAc,EACzBe,UAAU,CAACL,kBAAkB,EAC7BK,UAAU,CAACI,YAAY,EACvBJ,UAAU,CAACK,QAAQ,EACnBlB,KAAK,EACLC,MAAM,CACP,CAAC,EACF;IACA,MAAM,IAAIW,KAAK,CAAC,yCAAyC,CAAC;EAC5D;EAEAjB,KAAK,CAACwB,IAAI,CAAC;IACTC,IAAI,EAAE,qBAAqB;IAC3BtB,cAAc,EAAEe,UAAU,CAACf,cAAc;IACzCS,mBAAmB,EAAEM,UAAU,CAACN,mBAAmB;IACnDC,kBAAkB,EAAEK,UAAU,CAACL,kBAAkB;IACjDS,YAAY,EAAEJ,UAAU,CAACI,YAAY;IACrCC,QAAQ,EAAEL,UAAU,CAACK;GACtB,CAAC;EACF,OAAO;IACLpB,cAAc,EAAEe,UAAU,CAACf,cAAc;IACzCS,mBAAmB,EAAEM,UAAU,CAACN,mBAAmB;IACnDC,kBAAkB,EAAEK,UAAU,CAACL;GAChC;AACH,CAAC","ignoreList":[]}
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
import type { IdentityKeys, Signer } from './types.js';
|
|
2
|
+
export declare const encryptIdentity: (signer: Signer, accountAddress: string, keys: IdentityKeys) => Promise<{
|
|
3
|
+
ciphertext: string;
|
|
4
|
+
nonce: string;
|
|
5
|
+
}>;
|
|
6
|
+
export declare const decryptIdentity: (signer: Signer, accountAddress: string, ciphertext: string, nonce: string) => Promise<IdentityKeys>;
|
|
7
|
+
//# sourceMappingURL=identity-encryption.d.ts.map
|
|
@@ -0,0 +1,120 @@
|
|
|
1
|
+
import { gcm } from '@noble/ciphers/aes';
|
|
2
|
+
import { randomBytes } from '@noble/ciphers/webcrypto';
|
|
3
|
+
import { hkdf } from '@noble/hashes/hkdf';
|
|
4
|
+
import { sha256 } from '@noble/hashes/sha256';
|
|
5
|
+
import { verifyMessage } from 'viem';
|
|
6
|
+
import { bytesToHex, canonicalize, hexToBytes } from '../utils/index.js';
|
|
7
|
+
// Adapted from the XMTP approach to encrypt keys
|
|
8
|
+
// See: https://github.com/xmtp/xmtp-js/blob/8d6e5a65813902926baac8150a648587acbaad92/sdks/js-sdk/src/keystore/providers/NetworkKeyManager.ts#L79-L116
|
|
9
|
+
// (We reimplement their encrypt/decrypt functions using noble).
|
|
10
|
+
const hkdfDeriveKey = (secret, salt) => {
|
|
11
|
+
return hkdf(sha256, secret, salt, '', 32);
|
|
12
|
+
};
|
|
13
|
+
// This implements the same encryption as https://github.com/xmtp/xmtp-js/blob/336471de4ea95416ad0f4f9850d3f12bb0a13f1e/sdks/js-sdk/src/encryption/encryption.ts#L18
|
|
14
|
+
// But using @noble/ciphers instead of the WebCrypto API.
|
|
15
|
+
// The XMTP code was audited by Certik: https://skynet.certik.com/projects/xmtp
|
|
16
|
+
//
|
|
17
|
+
// Worth noting that GCM nonce collision would break the encryption,
|
|
18
|
+
// and 12 bytes is not a lot. So this function should not be used to encrypt
|
|
19
|
+
// a large number of messages with the same secret. In our case it should be okay
|
|
20
|
+
// as each secret is only used to encrypt a single identity. If we need
|
|
21
|
+
// something more secure for a larger number of messages we should use a
|
|
22
|
+
// different encryption scheme, e.g. XAES-256-GCM, see https://words.filippo.io/dispatches/xaes-256-gcm/
|
|
23
|
+
const encrypt = (msg, secret) => {
|
|
24
|
+
const hkdfSalt = randomBytes(32);
|
|
25
|
+
const gcmNonce = randomBytes(12);
|
|
26
|
+
const derivedKey = hkdfDeriveKey(secret, hkdfSalt);
|
|
27
|
+
const aes = gcm(derivedKey, gcmNonce);
|
|
28
|
+
const ciphertext = aes.encrypt(msg);
|
|
29
|
+
// TODO: Use Effect Schema and better serialization?
|
|
30
|
+
const ciphertextJson = canonicalize({
|
|
31
|
+
aes256GcmHkdfSha256: {
|
|
32
|
+
payload: bytesToHex(ciphertext),
|
|
33
|
+
hkdfSalt: bytesToHex(hkdfSalt),
|
|
34
|
+
gcmNonce: bytesToHex(gcmNonce)
|
|
35
|
+
}
|
|
36
|
+
});
|
|
37
|
+
return bytesToHex(new TextEncoder().encode(ciphertextJson));
|
|
38
|
+
};
|
|
39
|
+
// This implements the same decryption as https://github.com/xmtp/xmtp-js/blob/336471de4ea95416ad0f4f9850d3f12bb0a13f1e/sdks/js-sdk/src/encryption/encryption.ts#L41
|
|
40
|
+
// But using @noble/ciphers instead of the WebCrypto API
|
|
41
|
+
// The XMTP code was audited by Certik: https://skynet.certik.com/projects/xmtp
|
|
42
|
+
const decrypt = (ciphertext, secret) => {
|
|
43
|
+
const ciphertextJson = new TextDecoder().decode(hexToBytes(ciphertext));
|
|
44
|
+
const {
|
|
45
|
+
aes256GcmHkdfSha256
|
|
46
|
+
} = JSON.parse(ciphertextJson);
|
|
47
|
+
const hkdfSalt = hexToBytes(aes256GcmHkdfSha256.hkdfSalt);
|
|
48
|
+
const gcmNonce = hexToBytes(aes256GcmHkdfSha256.gcmNonce);
|
|
49
|
+
const derivedKey = hkdfDeriveKey(secret, hkdfSalt);
|
|
50
|
+
const aes = gcm(derivedKey, gcmNonce);
|
|
51
|
+
return aes.decrypt(hexToBytes(aes256GcmHkdfSha256.payload));
|
|
52
|
+
};
|
|
53
|
+
const signatureMessage = nonce => {
|
|
54
|
+
return `The Graph: sign to encrypt/decrypt identity keys.\nNonce: ${bytesToHex(nonce)}\n`;
|
|
55
|
+
};
|
|
56
|
+
export const encryptIdentity = async (signer, accountAddress, keys) => {
|
|
57
|
+
const nonce = randomBytes(32);
|
|
58
|
+
const message = signatureMessage(nonce);
|
|
59
|
+
const signature = await signer.signMessage(message);
|
|
60
|
+
// Check that the signature is valid
|
|
61
|
+
const valid = await verifyMessage({
|
|
62
|
+
address: accountAddress,
|
|
63
|
+
message,
|
|
64
|
+
signature
|
|
65
|
+
});
|
|
66
|
+
if (!valid) {
|
|
67
|
+
throw new Error('Invalid signature');
|
|
68
|
+
}
|
|
69
|
+
const secretKey = hexToBytes(signature);
|
|
70
|
+
// We use a simple plaintext encoding:
|
|
71
|
+
// Hex keys separated by newlines
|
|
72
|
+
const keysTxt = [keys.encryptionPublicKey, keys.encryptionPrivateKey, keys.signaturePublicKey, keys.signaturePrivateKey].join('\n');
|
|
73
|
+
const keysMsg = new TextEncoder().encode(keysTxt);
|
|
74
|
+
const ciphertext = encrypt(keysMsg, secretKey);
|
|
75
|
+
return {
|
|
76
|
+
ciphertext,
|
|
77
|
+
nonce: bytesToHex(nonce)
|
|
78
|
+
};
|
|
79
|
+
};
|
|
80
|
+
export const decryptIdentity = async (signer, accountAddress, ciphertext, nonce) => {
|
|
81
|
+
const message = signatureMessage(hexToBytes(nonce));
|
|
82
|
+
const signature = await signer.signMessage(message);
|
|
83
|
+
// Check that the signature is valid
|
|
84
|
+
const valid = await verifyMessage({
|
|
85
|
+
address: accountAddress,
|
|
86
|
+
message,
|
|
87
|
+
signature
|
|
88
|
+
});
|
|
89
|
+
if (!valid) {
|
|
90
|
+
throw new Error('Invalid signature');
|
|
91
|
+
}
|
|
92
|
+
const secretKey = hexToBytes(signature);
|
|
93
|
+
let keysMsg;
|
|
94
|
+
try {
|
|
95
|
+
keysMsg = await decrypt(ciphertext, secretKey);
|
|
96
|
+
} catch (e) {
|
|
97
|
+
// See https://github.com/xmtp/xmtp-js/blob/8d6e5a65813902926baac8150a648587acbaad92/sdks/js-sdk/src/keystore/providers/NetworkKeyManager.ts#L142-L146
|
|
98
|
+
if (secretKey.length !== 65) {
|
|
99
|
+
throw new Error('Expected 65 bytes before trying a different recovery byte');
|
|
100
|
+
}
|
|
101
|
+
// Try the other version of recovery byte, either +27 or -27
|
|
102
|
+
const lastByte = secretKey[secretKey.length - 1];
|
|
103
|
+
let newSecret = secretKey.slice(0, secretKey.length - 1);
|
|
104
|
+
if (lastByte < 27) {
|
|
105
|
+
newSecret = new Uint8Array([...newSecret, lastByte + 27]);
|
|
106
|
+
} else {
|
|
107
|
+
newSecret = new Uint8Array([...newSecret, lastByte - 27]);
|
|
108
|
+
}
|
|
109
|
+
keysMsg = await decrypt(ciphertext, newSecret);
|
|
110
|
+
}
|
|
111
|
+
const keysTxt = new TextDecoder().decode(keysMsg);
|
|
112
|
+
const [encryptionPublicKey, encryptionPrivateKey, signaturePublicKey, signaturePrivateKey] = keysTxt.split('\n');
|
|
113
|
+
return {
|
|
114
|
+
encryptionPublicKey,
|
|
115
|
+
encryptionPrivateKey,
|
|
116
|
+
signaturePublicKey,
|
|
117
|
+
signaturePrivateKey
|
|
118
|
+
};
|
|
119
|
+
};
|
|
120
|
+
//# sourceMappingURL=identity-encryption.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"identity-encryption.js","names":["gcm","randomBytes","hkdf","sha256","verifyMessage","bytesToHex","canonicalize","hexToBytes","hkdfDeriveKey","secret","salt","encrypt","msg","hkdfSalt","gcmNonce","derivedKey","aes","ciphertext","ciphertextJson","aes256GcmHkdfSha256","payload","TextEncoder","encode","decrypt","TextDecoder","decode","JSON","parse","signatureMessage","nonce","encryptIdentity","signer","accountAddress","keys","message","signature","signMessage","valid","address","Error","secretKey","keysTxt","encryptionPublicKey","encryptionPrivateKey","signaturePublicKey","signaturePrivateKey","join","keysMsg","decryptIdentity","e","length","lastByte","newSecret","slice","Uint8Array","split"],"sources":["../../src/identity/identity-encryption.ts"],"sourcesContent":[null],"mappings":"AAAA,SAASA,GAAG,QAAQ,oBAAoB;AACxC,SAASC,WAAW,QAAQ,0BAA0B;AACtD,SAASC,IAAI,QAAQ,oBAAoB;AACzC,SAASC,MAAM,QAAQ,sBAAsB;AAE7C,SAASC,aAAa,QAAQ,MAAM;AAEpC,SAASC,UAAU,EAAEC,YAAY,EAAEC,UAAU,QAAQ,mBAAmB;AAGxE;AACA;AACA;AAEA,MAAMC,aAAa,GAAGA,CAACC,MAAkB,EAAEC,IAAgB,KAAgB;EACzE,OAAOR,IAAI,CAACC,MAAM,EAAEM,MAAM,EAAEC,IAAI,EAAE,EAAE,EAAE,EAAE,CAAC;AAC3C,CAAC;AAED;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,MAAMC,OAAO,GAAGA,CAACC,GAAe,EAAEH,MAAkB,KAAY;EAC9D,MAAMI,QAAQ,GAAGZ,WAAW,CAAC,EAAE,CAAC;EAChC,MAAMa,QAAQ,GAAGb,WAAW,CAAC,EAAE,CAAC;EAChC,MAAMc,UAAU,GAAGP,aAAa,CAACC,MAAM,EAAEI,QAAQ,CAAC;EAElD,MAAMG,GAAG,GAAGhB,GAAG,CAACe,UAAU,EAAED,QAAQ,CAAC;EAErC,MAAMG,UAAU,GAAGD,GAAG,CAACL,OAAO,CAACC,GAAG,CAAC;EAEnC;EACA,MAAMM,cAAc,GAAGZ,YAAY,CAAC;IAClCa,mBAAmB,EAAE;MACnBC,OAAO,EAAEf,UAAU,CAACY,UAAU,CAAC;MAC/BJ,QAAQ,EAAER,UAAU,CAACQ,QAAQ,CAAC;MAC9BC,QAAQ,EAAET,UAAU,CAACS,QAAQ;;GAEhC,CAAC;EACF,OAAOT,UAAU,CAAC,IAAIgB,WAAW,EAAE,CAACC,MAAM,CAACJ,cAAc,CAAC,CAAC;AAC7D,CAAC;AAED;AACA;AACA;AACA,MAAMK,OAAO,GAAGA,CAACN,UAAkB,EAAER,MAAkB,KAAgB;EACrE,MAAMS,cAAc,GAAG,IAAIM,WAAW,EAAE,CAACC,MAAM,CAAClB,UAAU,CAACU,UAAU,CAAC,CAAC;EACvE,MAAM;IAAEE;EAAmB,CAAE,GAAGO,IAAI,CAACC,KAAK,CAACT,cAAc,CAAC;EAC1D,MAAML,QAAQ,GAAGN,UAAU,CAACY,mBAAmB,CAACN,QAAQ,CAAC;EACzD,MAAMC,QAAQ,GAAGP,UAAU,CAACY,mBAAmB,CAACL,QAAQ,CAAC;EACzD,MAAMC,UAAU,GAAGP,aAAa,CAACC,MAAM,EAAEI,QAAQ,CAAC;EAElD,MAAMG,GAAG,GAAGhB,GAAG,CAACe,UAAU,EAAED,QAAQ,CAAC;EAErC,OAAOE,GAAG,CAACO,OAAO,CAAChB,UAAU,CAACY,mBAAmB,CAACC,OAAO,CAAC,CAAC;AAC7D,CAAC;AAED,MAAMQ,gBAAgB,GAAIC,KAAiB,IAAY;EACrD,OAAO,6DAA6DxB,UAAU,CAACwB,KAAK,CAAC,IAAI;AAC3F,CAAC;AAED,OAAO,MAAMC,eAAe,GAAG,MAAAA,CAC7BC,MAAc,EACdC,cAAsB,EACtBC,IAAkB,KACgC;EAClD,MAAMJ,KAAK,GAAG5B,WAAW,CAAC,EAAE,CAAC;EAC7B,MAAMiC,OAAO,GAAGN,gBAAgB,CAACC,KAAK,CAAC;EACvC,MAAMM,SAAS,GAAI,MAAMJ,MAAM,CAACK,WAAW,CAACF,OAAO,CAAS;EAE5D;EACA,MAAMG,KAAK,GAAG,MAAMjC,aAAa,CAAC;IAChCkC,OAAO,EAAEN,cAAqB;IAC9BE,OAAO;IACPC;GACD,CAAC;EACF,IAAI,CAACE,KAAK,EAAE;IACV,MAAM,IAAIE,KAAK,CAAC,mBAAmB,CAAC;EACtC;EACA,MAAMC,SAAS,GAAGjC,UAAU,CAAC4B,SAAS,CAAC;EACvC;EACA;EACA,MAAMM,OAAO,GAAG,CACdR,IAAI,CAACS,mBAAmB,EACxBT,IAAI,CAACU,oBAAoB,EACzBV,IAAI,CAACW,kBAAkB,EACvBX,IAAI,CAACY,mBAAmB,CACzB,CAACC,IAAI,CAAC,IAAI,CAAC;EACZ,MAAMC,OAAO,GAAG,IAAI1B,WAAW,EAAE,CAACC,MAAM,CAACmB,OAAO,CAAC;EACjD,MAAMxB,UAAU,GAAGN,OAAO,CAACoC,OAAO,EAAEP,SAAS,CAAC;EAC9C,OAAO;IAAEvB,UAAU;IAAEY,KAAK,EAAExB,UAAU,CAACwB,KAAK;EAAC,CAAE;AACjD,CAAC;AAED,OAAO,MAAMmB,eAAe,GAAG,MAAAA,CAC7BjB,MAAc,EACdC,cAAsB,EACtBf,UAAkB,EAClBY,KAAa,KACY;EACzB,MAAMK,OAAO,GAAGN,gBAAgB,CAACrB,UAAU,CAACsB,KAAK,CAAC,CAAC;EACnD,MAAMM,SAAS,GAAI,MAAMJ,MAAM,CAACK,WAAW,CAACF,OAAO,CAAS;EAE5D;EACA,MAAMG,KAAK,GAAG,MAAMjC,aAAa,CAAC;IAChCkC,OAAO,EAAEN,cAAqB;IAC9BE,OAAO;IACPC;GACD,CAAC;EACF,IAAI,CAACE,KAAK,EAAE;IACV,MAAM,IAAIE,KAAK,CAAC,mBAAmB,CAAC;EACtC;EACA,MAAMC,SAAS,GAAGjC,UAAU,CAAC4B,SAAS,CAAC;EACvC,IAAIY,OAAmB;EACvB,IAAI;IACFA,OAAO,GAAG,MAAMxB,OAAO,CAACN,UAAU,EAAEuB,SAAS,CAAC;EAChD,CAAC,CAAC,OAAOS,CAAC,EAAE;IACV;IACA,IAAIT,SAAS,CAACU,MAAM,KAAK,EAAE,EAAE;MAC3B,MAAM,IAAIX,KAAK,CAAC,2DAA2D,CAAC;IAC9E;IACA;IACA,MAAMY,QAAQ,GAAGX,SAAS,CAACA,SAAS,CAACU,MAAM,GAAG,CAAC,CAAC;IAChD,IAAIE,SAAS,GAAGZ,SAAS,CAACa,KAAK,CAAC,CAAC,EAAEb,SAAS,CAACU,MAAM,GAAG,CAAC,CAAC;IACxD,IAAIC,QAAQ,GAAG,EAAE,EAAE;MACjBC,SAAS,GAAG,IAAIE,UAAU,CAAC,CAAC,GAAGF,SAAS,EAAED,QAAQ,GAAG,EAAE,CAAC,CAAC;IAC3D,CAAC,MAAM;MACLC,SAAS,GAAG,IAAIE,UAAU,CAAC,CAAC,GAAGF,SAAS,EAAED,QAAQ,GAAG,EAAE,CAAC,CAAC;IAC3D;IACAJ,OAAO,GAAG,MAAMxB,OAAO,CAACN,UAAU,EAAEmC,SAAS,CAAC;EAChD;EACA,MAAMX,OAAO,GAAG,IAAIjB,WAAW,EAAE,CAACC,MAAM,CAACsB,OAAO,CAAC;EACjD,MAAM,CAACL,mBAAmB,EAAEC,oBAAoB,EAAEC,kBAAkB,EAAEC,mBAAmB,CAAC,GAAGJ,OAAO,CAACc,KAAK,CAAC,IAAI,CAAC;EAChH,OAAO;IAAEb,mBAAmB;IAAEC,oBAAoB;IAAEC,kBAAkB;IAAEC;EAAmB,CAAE;AAC/F,CAAC","ignoreList":[]}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/identity/index.ts"],"names":[],"mappings":"AAAA,cAAc,mBAAmB,CAAC;AAClC,cAAc,4BAA4B,CAAC;AAC3C,cAAc,0BAA0B,CAAC;AACzC,cAAc,
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/identity/index.ts"],"names":[],"mappings":"AAAA,cAAc,mBAAmB,CAAC;AAClC,cAAc,4BAA4B,CAAC;AAC3C,cAAc,0BAA0B,CAAC;AACzC,cAAc,sBAAsB,CAAC;AACrC,cAAc,aAAa,CAAC;AAC5B,cAAc,YAAY,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","names":[],"sources":["../../src/identity/index.ts"],"sourcesContent":[null],"mappings":"AAAA,cAAc,mBAAmB;AACjC,cAAc,4BAA4B;AAC1C,cAAc,0BAA0B;AACxC,cAAc,sBAAsB;AACpC,cAAc,aAAa;AAC3B,cAAc,YAAY","ignoreList":[]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"logout.js","names":["store","wipeIdentity","logout","storage","send","type"],"sources":["../../src/identity/logout.ts"],"sourcesContent":[null],"mappings":"AAAA,SAASA,KAAK,QAAQ,eAAe;AACrC,SAASC,YAAY,QAAQ,mBAAmB;AAGhD,OAAM,SAAUC,MAAMA,CAACC,OAAgB;EACrCF,YAAY,CAACE,OAAO,CAAC;EACrBH,KAAK,CAACI,IAAI,CAAC;IAAEC,IAAI,EAAE;EAAW,CAAE,CAAC;AACnC","ignoreList":[]}
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
import { type Chain, type WalletClient } from 'viem';
|
|
2
|
+
import type { SmartAccountClient } from 'permissionless';
|
|
3
|
+
import type { IdentityKeys } from './types.js';
|
|
4
|
+
export declare const getAccountProofMessage: (accountAddress: string, publicKey: string) => string;
|
|
5
|
+
export declare const getKeyProofMessage: (accountAddress: string, publicKey: string) => string;
|
|
6
|
+
export declare const accountProofDomain: {
|
|
7
|
+
name: string;
|
|
8
|
+
version: string;
|
|
9
|
+
};
|
|
10
|
+
export declare const proveIdentityOwnership: (walletClient: WalletClient, smartAccountClient: SmartAccountClient, accountAddress: string, keys: IdentityKeys) => Promise<{
|
|
11
|
+
accountProof: string;
|
|
12
|
+
keyProof: string;
|
|
13
|
+
}>;
|
|
14
|
+
export declare const verifyIdentityOwnership: (accountAddress: string, publicKey: string, accountProof: string, keyProof: string, chain: Chain, rpcUrl: string) => Promise<boolean>;
|
|
15
|
+
//# sourceMappingURL=prove-ownership.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"prove-ownership.d.ts","sourceRoot":"","sources":["../../src/identity/prove-ownership.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"prove-ownership.d.ts","sourceRoot":"","sources":["../../src/identity/prove-ownership.ts"],"names":[],"mappings":"AAAA,OAAO,EAAQ,KAAK,KAAK,EAAY,KAAK,YAAY,EAAqC,MAAM,MAAM,CAAC;AAGxG,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,gBAAgB,CAAC;AAEzD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,YAAY,CAAC;AAE/C,eAAO,MAAM,sBAAsB,GAAI,gBAAgB,MAAM,EAAE,WAAW,MAAM,KAAG,MAElF,CAAC;AAEF,eAAO,MAAM,kBAAkB,GAAI,gBAAgB,MAAM,EAAE,WAAW,MAAM,KAAG,MAE9E,CAAC;AAEF,eAAO,MAAM,kBAAkB;;;CAG9B,CAAC;AAEF,eAAO,MAAM,sBAAsB,GACjC,cAAc,YAAY,EAC1B,oBAAoB,kBAAkB,EACtC,gBAAgB,MAAM,EACtB,MAAM,YAAY,KACjB,OAAO,CAAC;IAAE,YAAY,EAAE,MAAM,CAAC;IAAC,QAAQ,EAAE,MAAM,CAAA;CAAE,CAwBpD,CAAC;AAEF,eAAO,MAAM,uBAAuB,GAClC,gBAAgB,MAAM,EACtB,WAAW,MAAM,EACjB,cAAc,MAAM,EACpB,UAAU,MAAM,EAChB,OAAO,KAAK,EACZ,QAAQ,MAAM,KACb,OAAO,CAAC,OAAO,CA2CjB,CAAC"}
|
|
@@ -0,0 +1,90 @@
|
|
|
1
|
+
import { http, createPublicClient, verifyMessage } from 'viem';
|
|
2
|
+
import { privateKeyToAccount } from 'viem/accounts';
|
|
3
|
+
import { publicKeyToAddress } from '../utils/index.js';
|
|
4
|
+
export const getAccountProofMessage = (accountAddress, publicKey) => {
|
|
5
|
+
return `This message proves I am the owner of the account ${accountAddress} and the public key ${publicKey}`;
|
|
6
|
+
};
|
|
7
|
+
export const getKeyProofMessage = (accountAddress, publicKey) => {
|
|
8
|
+
return `The public key ${publicKey} is owned by the account ${accountAddress}`;
|
|
9
|
+
};
|
|
10
|
+
export const accountProofDomain = {
|
|
11
|
+
name: 'Hypergraph',
|
|
12
|
+
version: '1'
|
|
13
|
+
};
|
|
14
|
+
export const proveIdentityOwnership = async (walletClient, smartAccountClient, accountAddress, keys) => {
|
|
15
|
+
if (!smartAccountClient.account) {
|
|
16
|
+
throw new Error('Smart account client does not have an account');
|
|
17
|
+
}
|
|
18
|
+
if (!smartAccountClient.chain) {
|
|
19
|
+
throw new Error('Smart account client does not have a chain');
|
|
20
|
+
}
|
|
21
|
+
const publicKey = keys.signaturePublicKey;
|
|
22
|
+
const keyProofMessage = getKeyProofMessage(accountAddress, publicKey);
|
|
23
|
+
const accountProof = await smartAccountClient.account.signTypedData({
|
|
24
|
+
message: {
|
|
25
|
+
message: getAccountProofMessage(accountAddress, publicKey)
|
|
26
|
+
},
|
|
27
|
+
types: {
|
|
28
|
+
Message: [{
|
|
29
|
+
name: 'message',
|
|
30
|
+
type: 'string'
|
|
31
|
+
}]
|
|
32
|
+
},
|
|
33
|
+
domain: accountProofDomain,
|
|
34
|
+
primaryType: 'Message'
|
|
35
|
+
});
|
|
36
|
+
console.log('accountProof', accountProof);
|
|
37
|
+
const account = privateKeyToAccount(keys.signaturePrivateKey);
|
|
38
|
+
const keyProof = await account.signMessage({
|
|
39
|
+
message: keyProofMessage
|
|
40
|
+
});
|
|
41
|
+
return {
|
|
42
|
+
accountProof,
|
|
43
|
+
keyProof
|
|
44
|
+
};
|
|
45
|
+
};
|
|
46
|
+
export const verifyIdentityOwnership = async (accountAddress, publicKey, accountProof, keyProof, chain, rpcUrl) => {
|
|
47
|
+
const keyProofMessage = getKeyProofMessage(accountAddress, publicKey);
|
|
48
|
+
const publicClient = createPublicClient({
|
|
49
|
+
chain,
|
|
50
|
+
transport: http(rpcUrl)
|
|
51
|
+
});
|
|
52
|
+
// console.log('publicClient', publicClient);
|
|
53
|
+
// console.log('rpcUrl', rpcUrl);
|
|
54
|
+
// console.log('chain', chain);
|
|
55
|
+
// console.log('accountProof', accountProof);
|
|
56
|
+
// console.log('accountAddress', accountAddress);
|
|
57
|
+
// console.log('publicKey', publicKey);
|
|
58
|
+
const accountProofMessage = getAccountProofMessage(accountAddress, publicKey);
|
|
59
|
+
const validAccountProof = await publicClient.verifyTypedData({
|
|
60
|
+
address: accountAddress,
|
|
61
|
+
message: {
|
|
62
|
+
message: accountProofMessage
|
|
63
|
+
},
|
|
64
|
+
types: {
|
|
65
|
+
Message: [{
|
|
66
|
+
name: 'message',
|
|
67
|
+
type: 'string'
|
|
68
|
+
}]
|
|
69
|
+
},
|
|
70
|
+
domain: accountProofDomain,
|
|
71
|
+
primaryType: 'Message',
|
|
72
|
+
signature: accountProof
|
|
73
|
+
});
|
|
74
|
+
if (!validAccountProof) {
|
|
75
|
+
console.log('Invalid account proof');
|
|
76
|
+
return false;
|
|
77
|
+
}
|
|
78
|
+
const keyAddress = publicKeyToAddress(publicKey);
|
|
79
|
+
const validKeyProof = await verifyMessage({
|
|
80
|
+
address: keyAddress,
|
|
81
|
+
message: keyProofMessage,
|
|
82
|
+
signature: keyProof
|
|
83
|
+
});
|
|
84
|
+
if (!validKeyProof) {
|
|
85
|
+
console.log('Invalid key proof');
|
|
86
|
+
return false;
|
|
87
|
+
}
|
|
88
|
+
return true;
|
|
89
|
+
};
|
|
90
|
+
//# sourceMappingURL=prove-ownership.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"prove-ownership.js","names":["http","createPublicClient","verifyMessage","privateKeyToAccount","publicKeyToAddress","getAccountProofMessage","accountAddress","publicKey","getKeyProofMessage","accountProofDomain","name","version","proveIdentityOwnership","walletClient","smartAccountClient","keys","account","Error","chain","signaturePublicKey","keyProofMessage","accountProof","signTypedData","message","types","Message","type","domain","primaryType","console","log","signaturePrivateKey","keyProof","signMessage","verifyIdentityOwnership","rpcUrl","publicClient","transport","accountProofMessage","validAccountProof","verifyTypedData","address","signature","keyAddress","validKeyProof"],"sources":["../../src/identity/prove-ownership.ts"],"sourcesContent":[null],"mappings":"AAAA,SAASA,IAAI,EAA2CC,kBAAkB,EAAEC,aAAa,QAAQ,MAAM;AACvG,SAASC,mBAAmB,QAAQ,eAAe;AAGnD,SAASC,kBAAkB,QAAQ,mBAAmB;AAGtD,OAAO,MAAMC,sBAAsB,GAAGA,CAACC,cAAsB,EAAEC,SAAiB,KAAY;EAC1F,OAAO,qDAAqDD,cAAc,uBAAuBC,SAAS,EAAE;AAC9G,CAAC;AAED,OAAO,MAAMC,kBAAkB,GAAGA,CAACF,cAAsB,EAAEC,SAAiB,KAAY;EACtF,OAAO,kBAAkBA,SAAS,4BAA4BD,cAAc,EAAE;AAChF,CAAC;AAED,OAAO,MAAMG,kBAAkB,GAAG;EAChCC,IAAI,EAAE,YAAY;EAClBC,OAAO,EAAE;CACV;AAED,OAAO,MAAMC,sBAAsB,GAAG,MAAAA,CACpCC,YAA0B,EAC1BC,kBAAsC,EACtCR,cAAsB,EACtBS,IAAkB,KACqC;EACvD,IAAI,CAACD,kBAAkB,CAACE,OAAO,EAAE;IAC/B,MAAM,IAAIC,KAAK,CAAC,+CAA+C,CAAC;EAClE;EACA,IAAI,CAACH,kBAAkB,CAACI,KAAK,EAAE;IAC7B,MAAM,IAAID,KAAK,CAAC,4CAA4C,CAAC;EAC/D;EACA,MAAMV,SAAS,GAAGQ,IAAI,CAACI,kBAAkB;EACzC,MAAMC,eAAe,GAAGZ,kBAAkB,CAACF,cAAc,EAAEC,SAAS,CAAC;EAErE,MAAMc,YAAY,GAAG,MAAMP,kBAAkB,CAACE,OAAO,CAACM,aAAa,CAAC;IAClEC,OAAO,EAAE;MACPA,OAAO,EAAElB,sBAAsB,CAACC,cAAc,EAAEC,SAAS;KAC1D;IACDiB,KAAK,EAAE;MACLC,OAAO,EAAE,CAAC;QAAEf,IAAI,EAAE,SAAS;QAAEgB,IAAI,EAAE;MAAQ,CAAE;KAC9C;IACDC,MAAM,EAAElB,kBAAkB;IAC1BmB,WAAW,EAAE;GACd,CAAC;EACFC,OAAO,CAACC,GAAG,CAAC,cAAc,EAAET,YAAY,CAAC;EACzC,MAAML,OAAO,GAAGb,mBAAmB,CAACY,IAAI,CAACgB,mBAA0B,CAAC;EACpE,MAAMC,QAAQ,GAAG,MAAMhB,OAAO,CAACiB,WAAW,CAAC;IAAEV,OAAO,EAAEH;EAAe,CAAE,CAAC;EACxE,OAAO;IAAEC,YAAY;IAAEW;EAAQ,CAAE;AACnC,CAAC;AAED,OAAO,MAAME,uBAAuB,GAAG,MAAAA,CACrC5B,cAAsB,EACtBC,SAAiB,EACjBc,YAAoB,EACpBW,QAAgB,EAChBd,KAAY,EACZiB,MAAc,KACM;EACpB,MAAMf,eAAe,GAAGZ,kBAAkB,CAACF,cAAc,EAAEC,SAAS,CAAC;EACrE,MAAM6B,YAAY,GAAGnC,kBAAkB,CAAC;IACtCiB,KAAK;IACLmB,SAAS,EAAErC,IAAI,CAACmC,MAAM;GACvB,CAAC;EACF;EACA;EACA;EAEA;EACA;EACA;EAEA,MAAMG,mBAAmB,GAAGjC,sBAAsB,CAACC,cAAc,EAAEC,SAAS,CAAC;EAC7E,MAAMgC,iBAAiB,GAAG,MAAMH,YAAY,CAACI,eAAe,CAAC;IAC3DC,OAAO,EAAEnC,cAAqB;IAC9BiB,OAAO,EAAE;MACPA,OAAO,EAAEe;KACV;IACDd,KAAK,EAAE;MACLC,OAAO,EAAE,CAAC;QAAEf,IAAI,EAAE,SAAS;QAAEgB,IAAI,EAAE;MAAQ,CAAE;KAC9C;IACDC,MAAM,EAAElB,kBAAkB;IAC1BmB,WAAW,EAAE,SAAS;IACtBc,SAAS,EAAErB;GACZ,CAAC;EACF,IAAI,CAACkB,iBAAiB,EAAE;IACtBV,OAAO,CAACC,GAAG,CAAC,uBAAuB,CAAC;IACpC,OAAO,KAAK;EACd;EAEA,MAAMa,UAAU,GAAGvC,kBAAkB,CAACG,SAAS,CAAQ;EACvD,MAAMqC,aAAa,GAAG,MAAM1C,aAAa,CAAC;IACxCuC,OAAO,EAAEE,UAAU;IACnBpB,OAAO,EAAEH,eAAe;IACxBsB,SAAS,EAAEV;GACZ,CAAC;EACF,IAAI,CAACY,aAAa,EAAE;IAClBf,OAAO,CAACC,GAAG,CAAC,mBAAmB,CAAC;IAChC,OAAO,KAAK;EACd;EACA,OAAO,IAAI;AACb,CAAC","ignoreList":[]}
|
|
@@ -0,0 +1,37 @@
|
|
|
1
|
+
import { Schema } from 'effect';
|
|
2
|
+
export type Storage = {
|
|
3
|
+
getItem: (key: string) => string | null;
|
|
4
|
+
setItem: (key: string, value: string) => void;
|
|
5
|
+
removeItem: (key: string) => void;
|
|
6
|
+
};
|
|
7
|
+
export type SignMessage = (message: string) => Promise<string> | string;
|
|
8
|
+
export type GetAddress = () => Promise<string> | string;
|
|
9
|
+
export type Signer = {
|
|
10
|
+
getAddress: GetAddress;
|
|
11
|
+
signMessage: SignMessage;
|
|
12
|
+
};
|
|
13
|
+
export type IdentityKeys = {
|
|
14
|
+
encryptionPublicKey: string;
|
|
15
|
+
encryptionPrivateKey: string;
|
|
16
|
+
signaturePublicKey: string;
|
|
17
|
+
signaturePrivateKey: string;
|
|
18
|
+
};
|
|
19
|
+
export declare const KeysSchema: Schema.Struct<{
|
|
20
|
+
encryptionPublicKey: typeof Schema.String;
|
|
21
|
+
encryptionPrivateKey: typeof Schema.String;
|
|
22
|
+
signaturePublicKey: typeof Schema.String;
|
|
23
|
+
signaturePrivateKey: typeof Schema.String;
|
|
24
|
+
}>;
|
|
25
|
+
export type KeysSchema = Schema.Schema.Type<typeof KeysSchema>;
|
|
26
|
+
export type Identity = IdentityKeys & {
|
|
27
|
+
accountAddress: string;
|
|
28
|
+
};
|
|
29
|
+
export type PublicIdentity = {
|
|
30
|
+
accountAddress: string;
|
|
31
|
+
encryptionPublicKey: string;
|
|
32
|
+
signaturePublicKey: string;
|
|
33
|
+
};
|
|
34
|
+
export declare class InvalidIdentityError {
|
|
35
|
+
readonly _tag = "InvalidIdentityError";
|
|
36
|
+
}
|
|
37
|
+
//# sourceMappingURL=types.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../src/identity/types.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;AAEhC,MAAM,MAAM,OAAO,GAAG;IACpB,OAAO,EAAE,CAAC,GAAG,EAAE,MAAM,KAAK,MAAM,GAAG,IAAI,CAAC;IACxC,OAAO,EAAE,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,KAAK,IAAI,CAAC;IAC9C,UAAU,EAAE,CAAC,GAAG,EAAE,MAAM,KAAK,IAAI,CAAC;CACnC,CAAC;AAEF,MAAM,MAAM,WAAW,GAAG,CAAC,OAAO,EAAE,MAAM,KAAK,OAAO,CAAC,MAAM,CAAC,GAAG,MAAM,CAAC;AACxE,MAAM,MAAM,UAAU,GAAG,MAAM,OAAO,CAAC,MAAM,CAAC,GAAG,MAAM,CAAC;AACxD,MAAM,MAAM,MAAM,GAAG;IACnB,UAAU,EAAE,UAAU,CAAC;IACvB,WAAW,EAAE,WAAW,CAAC;CAC1B,CAAC;AAEF,MAAM,MAAM,YAAY,GAAG;IACzB,mBAAmB,EAAE,MAAM,CAAC;IAC5B,oBAAoB,EAAE,MAAM,CAAC;IAC7B,kBAAkB,EAAE,MAAM,CAAC;IAC3B,mBAAmB,EAAE,MAAM,CAAC;CAC7B,CAAC;AAEF,eAAO,MAAM,UAAU;;;;;EAKrB,CAAC;AAEH,MAAM,MAAM,UAAU,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,UAAU,CAAC,CAAC;AAE/D,MAAM,MAAM,QAAQ,GAAG,YAAY,GAAG;IACpC,cAAc,EAAE,MAAM,CAAC;CACxB,CAAC;AAEF,MAAM,MAAM,cAAc,GAAG;IAC3B,cAAc,EAAE,MAAM,CAAC;IACvB,mBAAmB,EAAE,MAAM,CAAC;IAC5B,kBAAkB,EAAE,MAAM,CAAC;CAC5B,CAAC;AAEF,qBAAa,oBAAoB;IAC/B,QAAQ,CAAC,IAAI,0BAA0B;CACxC"}
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
import { Schema } from 'effect';
|
|
2
|
+
export const KeysSchema = /*#__PURE__*/Schema.Struct({
|
|
3
|
+
encryptionPublicKey: Schema.String,
|
|
4
|
+
encryptionPrivateKey: Schema.String,
|
|
5
|
+
signaturePublicKey: Schema.String,
|
|
6
|
+
signaturePrivateKey: Schema.String
|
|
7
|
+
});
|
|
8
|
+
export class InvalidIdentityError {
|
|
9
|
+
_tag = 'InvalidIdentityError';
|
|
10
|
+
}
|
|
11
|
+
//# sourceMappingURL=types.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"types.js","names":["Schema","KeysSchema","Struct","encryptionPublicKey","String","encryptionPrivateKey","signaturePublicKey","signaturePrivateKey","InvalidIdentityError","_tag"],"sources":["../../src/identity/types.ts"],"sourcesContent":[null],"mappings":"AAAA,SAASA,MAAM,QAAQ,QAAQ;AAsB/B,OAAO,MAAMC,UAAU,gBAAGD,MAAM,CAACE,MAAM,CAAC;EACtCC,mBAAmB,EAAEH,MAAM,CAACI,MAAM;EAClCC,oBAAoB,EAAEL,MAAM,CAACI,MAAM;EACnCE,kBAAkB,EAAEN,MAAM,CAACI,MAAM;EACjCG,mBAAmB,EAAEP,MAAM,CAACI;CAC7B,CAAC;AAcF,OAAM,MAAOI,oBAAoB;EACtBC,IAAI,GAAG,sBAAsB","ignoreList":[]}
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
import * as Messages from '../messages/index.js';
|
|
2
|
+
import * as SpaceEvents from '../space-events/index.js';
|
|
3
|
+
import type * as Inboxes from './types.js';
|
|
4
|
+
type CreateAccountInboxParams = {
|
|
5
|
+
accountAddress: string;
|
|
6
|
+
isPublic: boolean;
|
|
7
|
+
authPolicy: Inboxes.InboxSenderAuthPolicy;
|
|
8
|
+
encryptionPublicKey: string;
|
|
9
|
+
signaturePrivateKey: string;
|
|
10
|
+
};
|
|
11
|
+
type CreateSpaceInboxParams = {
|
|
12
|
+
author: SpaceEvents.Author;
|
|
13
|
+
spaceId: string;
|
|
14
|
+
isPublic: boolean;
|
|
15
|
+
authPolicy: Inboxes.InboxSenderAuthPolicy;
|
|
16
|
+
spaceSecretKey: string;
|
|
17
|
+
previousEventHash: string;
|
|
18
|
+
};
|
|
19
|
+
export declare function createAccountInboxCreationMessage({ accountAddress, isPublic, authPolicy, encryptionPublicKey, signaturePrivateKey, }: CreateAccountInboxParams): Messages.RequestCreateAccountInbox;
|
|
20
|
+
export declare function createSpaceInboxCreationMessage({ author, spaceId, isPublic, authPolicy, spaceSecretKey, previousEventHash, }: CreateSpaceInboxParams): Promise<Messages.RequestCreateSpaceInboxEvent>;
|
|
21
|
+
export {};
|
|
22
|
+
//# sourceMappingURL=create-inbox.d.ts.map
|
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
import { secp256k1 } from '@noble/curves/secp256k1';
|
|
2
|
+
import { randomBytes } from '@noble/hashes/utils';
|
|
3
|
+
import { cryptoBoxKeyPair } from '@serenity-kit/noble-sodium';
|
|
4
|
+
import { Effect } from 'effect';
|
|
5
|
+
import * as Messages from '../messages/index.js';
|
|
6
|
+
import * as SpaceEvents from '../space-events/index.js';
|
|
7
|
+
import { bytesToHex, canonicalize, hexToBytes, stringToUint8Array } from '../utils/index.js';
|
|
8
|
+
// The caller should have already verified that the accountAddress, signaturePrivateKey and encryptionPublicKey belong to the same account
|
|
9
|
+
export function createAccountInboxCreationMessage({
|
|
10
|
+
accountAddress,
|
|
11
|
+
isPublic,
|
|
12
|
+
authPolicy,
|
|
13
|
+
encryptionPublicKey,
|
|
14
|
+
signaturePrivateKey
|
|
15
|
+
}) {
|
|
16
|
+
// Generate a 32 byte random inbox id
|
|
17
|
+
const inboxId = bytesToHex(randomBytes(32));
|
|
18
|
+
// This message can prove to anyone wanting to send a message to the inbox that it is indeed from the account
|
|
19
|
+
// and that the public key belongs to the account
|
|
20
|
+
const messageToSign = stringToUint8Array(canonicalize({
|
|
21
|
+
accountAddress,
|
|
22
|
+
inboxId,
|
|
23
|
+
encryptionPublicKey
|
|
24
|
+
}));
|
|
25
|
+
const signature = secp256k1.sign(messageToSign, hexToBytes(signaturePrivateKey), {
|
|
26
|
+
prehash: true
|
|
27
|
+
});
|
|
28
|
+
return {
|
|
29
|
+
type: 'create-account-inbox',
|
|
30
|
+
inboxId: inboxId,
|
|
31
|
+
accountAddress,
|
|
32
|
+
isPublic,
|
|
33
|
+
authPolicy,
|
|
34
|
+
encryptionPublicKey,
|
|
35
|
+
signature: {
|
|
36
|
+
hex: signature.toCompactHex(),
|
|
37
|
+
recovery: signature.recovery
|
|
38
|
+
}
|
|
39
|
+
};
|
|
40
|
+
}
|
|
41
|
+
export async function createSpaceInboxCreationMessage({
|
|
42
|
+
author,
|
|
43
|
+
spaceId,
|
|
44
|
+
isPublic,
|
|
45
|
+
authPolicy,
|
|
46
|
+
spaceSecretKey,
|
|
47
|
+
previousEventHash
|
|
48
|
+
}) {
|
|
49
|
+
// Same as createAccountInboxMessage but with spaceId instead of accountAddress, and generating a keypair for the inbox
|
|
50
|
+
const inboxId = bytesToHex(randomBytes(32));
|
|
51
|
+
const {
|
|
52
|
+
publicKey,
|
|
53
|
+
privateKey
|
|
54
|
+
} = cryptoBoxKeyPair();
|
|
55
|
+
// encrypt the inbox secret key with the space secret key
|
|
56
|
+
const encryptedInboxSecretKey = Messages.encryptMessage({
|
|
57
|
+
message: privateKey,
|
|
58
|
+
secretKey: hexToBytes(spaceSecretKey)
|
|
59
|
+
});
|
|
60
|
+
const spaceEvent = await Effect.runPromise(SpaceEvents.createInbox({
|
|
61
|
+
spaceId,
|
|
62
|
+
inboxId,
|
|
63
|
+
encryptionPublicKey: bytesToHex(publicKey),
|
|
64
|
+
secretKey: bytesToHex(encryptedInboxSecretKey),
|
|
65
|
+
isPublic,
|
|
66
|
+
authPolicy,
|
|
67
|
+
author,
|
|
68
|
+
previousEventHash
|
|
69
|
+
}));
|
|
70
|
+
return {
|
|
71
|
+
type: 'create-space-inbox-event',
|
|
72
|
+
spaceId,
|
|
73
|
+
event: spaceEvent
|
|
74
|
+
};
|
|
75
|
+
}
|
|
76
|
+
//# sourceMappingURL=create-inbox.js.map
|