@haneullabs/signers 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (88) hide show
  1. package/CHANGELOG.md +555 -0
  2. package/README.md +200 -0
  3. package/aws/package.json +6 -0
  4. package/dist/cjs/aws/aws-client.d.ts +43 -0
  5. package/dist/cjs/aws/aws-client.js +79 -0
  6. package/dist/cjs/aws/aws-client.js.map +7 -0
  7. package/dist/cjs/aws/aws-kms-signer.d.ts +61 -0
  8. package/dist/cjs/aws/aws-kms-signer.js +114 -0
  9. package/dist/cjs/aws/aws-kms-signer.js.map +7 -0
  10. package/dist/cjs/aws/aws4fetch.d.ts +125 -0
  11. package/dist/cjs/aws/aws4fetch.js +382 -0
  12. package/dist/cjs/aws/aws4fetch.js.map +7 -0
  13. package/dist/cjs/aws/index.d.ts +5 -0
  14. package/dist/cjs/aws/index.js +25 -0
  15. package/dist/cjs/aws/index.js.map +7 -0
  16. package/dist/cjs/gcp/gcp-kms-client.d.ts +68 -0
  17. package/dist/cjs/gcp/gcp-kms-client.js +147 -0
  18. package/dist/cjs/gcp/gcp-kms-client.js.map +7 -0
  19. package/dist/cjs/gcp/index.d.ts +4 -0
  20. package/dist/cjs/gcp/index.js +25 -0
  21. package/dist/cjs/gcp/index.js.map +7 -0
  22. package/dist/cjs/ledger/bcs.d.ts +14 -0
  23. package/dist/cjs/ledger/bcs.js +85 -0
  24. package/dist/cjs/ledger/bcs.js.map +7 -0
  25. package/dist/cjs/ledger/index.d.ts +66 -0
  26. package/dist/cjs/ledger/index.js +158 -0
  27. package/dist/cjs/ledger/index.js.map +7 -0
  28. package/dist/cjs/ledger/objects.d.ts +5 -0
  29. package/dist/cjs/ledger/objects.js +60 -0
  30. package/dist/cjs/ledger/objects.js.map +7 -0
  31. package/dist/cjs/package.json +5 -0
  32. package/dist/cjs/utils/utils.d.ts +18 -0
  33. package/dist/cjs/utils/utils.js +85 -0
  34. package/dist/cjs/utils/utils.js.map +7 -0
  35. package/dist/cjs/webcrypto/index.d.ts +26 -0
  36. package/dist/cjs/webcrypto/index.js +112 -0
  37. package/dist/cjs/webcrypto/index.js.map +7 -0
  38. package/dist/esm/aws/aws-client.d.ts +43 -0
  39. package/dist/esm/aws/aws-client.js +59 -0
  40. package/dist/esm/aws/aws-client.js.map +7 -0
  41. package/dist/esm/aws/aws-kms-signer.d.ts +61 -0
  42. package/dist/esm/aws/aws-kms-signer.js +94 -0
  43. package/dist/esm/aws/aws-kms-signer.js.map +7 -0
  44. package/dist/esm/aws/aws4fetch.d.ts +125 -0
  45. package/dist/esm/aws/aws4fetch.js +362 -0
  46. package/dist/esm/aws/aws4fetch.js.map +7 -0
  47. package/dist/esm/aws/index.d.ts +5 -0
  48. package/dist/esm/aws/index.js +5 -0
  49. package/dist/esm/aws/index.js.map +7 -0
  50. package/dist/esm/gcp/gcp-kms-client.d.ts +68 -0
  51. package/dist/esm/gcp/gcp-kms-client.js +127 -0
  52. package/dist/esm/gcp/gcp-kms-client.js.map +7 -0
  53. package/dist/esm/gcp/index.d.ts +4 -0
  54. package/dist/esm/gcp/index.js +5 -0
  55. package/dist/esm/gcp/index.js.map +7 -0
  56. package/dist/esm/ledger/bcs.d.ts +14 -0
  57. package/dist/esm/ledger/bcs.js +70 -0
  58. package/dist/esm/ledger/bcs.js.map +7 -0
  59. package/dist/esm/ledger/index.d.ts +66 -0
  60. package/dist/esm/ledger/index.js +138 -0
  61. package/dist/esm/ledger/index.js.map +7 -0
  62. package/dist/esm/ledger/objects.d.ts +5 -0
  63. package/dist/esm/ledger/objects.js +40 -0
  64. package/dist/esm/ledger/objects.js.map +7 -0
  65. package/dist/esm/package.json +5 -0
  66. package/dist/esm/utils/utils.d.ts +18 -0
  67. package/dist/esm/utils/utils.js +65 -0
  68. package/dist/esm/utils/utils.js.map +7 -0
  69. package/dist/esm/webcrypto/index.d.ts +26 -0
  70. package/dist/esm/webcrypto/index.js +92 -0
  71. package/dist/esm/webcrypto/index.js.map +7 -0
  72. package/dist/tsconfig.esm.tsbuildinfo +1 -0
  73. package/dist/tsconfig.tsbuildinfo +1 -0
  74. package/gcp/package.json +6 -0
  75. package/ledger/package.json +6 -0
  76. package/package.json +76 -0
  77. package/src/aws/aws-client.ts +107 -0
  78. package/src/aws/aws-kms-signer.ts +111 -0
  79. package/src/aws/aws4fetch.ts +502 -0
  80. package/src/aws/index.ts +9 -0
  81. package/src/gcp/gcp-kms-client.ts +165 -0
  82. package/src/gcp/index.ts +9 -0
  83. package/src/ledger/bcs.ts +87 -0
  84. package/src/ledger/index.ts +164 -0
  85. package/src/ledger/objects.ts +56 -0
  86. package/src/utils/utils.ts +119 -0
  87. package/src/webcrypto/index.ts +108 -0
  88. package/webcrypto/package.json +6 -0
@@ -0,0 +1,127 @@
1
+ var __typeError = (msg) => {
2
+ throw TypeError(msg);
3
+ };
4
+ var __accessCheck = (obj, member, msg) => member.has(obj) || __typeError("Cannot " + msg);
5
+ var __privateGet = (obj, member, getter) => (__accessCheck(obj, member, "read from private field"), getter ? getter.call(obj) : member.get(obj));
6
+ var __privateAdd = (obj, member, value) => member.has(obj) ? __typeError("Cannot add the same private member more than once") : member instanceof WeakSet ? member.add(obj) : member.set(obj, value);
7
+ var __privateSet = (obj, member, value, setter) => (__accessCheck(obj, member, "write to private field"), setter ? setter.call(obj, value) : member.set(obj, value), value);
8
+ var _publicKey, _client, _versionName;
9
+ import { KeyManagementServiceClient } from "@google-cloud/kms";
10
+ import { SIGNATURE_FLAG_TO_SCHEME, Signer } from "@haneullabs/haneul/cryptography";
11
+ import { Secp256k1PublicKey } from "@haneullabs/haneul/keypairs/secp256k1";
12
+ import { Secp256r1PublicKey } from "@haneullabs/haneul/keypairs/secp256r1";
13
+ import { fromBase64 } from "@haneullabs/haneul/utils";
14
+ import { getConcatenatedSignature, publicKeyFromDER } from "../utils/utils.js";
15
+ const _GcpKmsSigner = class _GcpKmsSigner extends Signer {
16
+ /**
17
+ * Creates an instance of GcpKmsSigner. It's expected to call the static `fromOptions`
18
+ * or `fromVersionName` method to create an instance.
19
+ * For example:
20
+ * ```
21
+ * const signer = await GcpKmsSigner.fromVersionName(versionName);
22
+ * ```
23
+ * @throws Will throw an error if required GCP credentials are not provided.
24
+ */
25
+ constructor({ versionName, client, publicKey }) {
26
+ super();
27
+ __privateAdd(this, _publicKey);
28
+ /** GCP KMS client instance */
29
+ __privateAdd(this, _client);
30
+ /** GCP KMS version name (generated from `client.cryptoKeyVersionPath()`) */
31
+ __privateAdd(this, _versionName);
32
+ if (!versionName) throw new Error("Version name is required");
33
+ __privateSet(this, _client, client);
34
+ __privateSet(this, _versionName, versionName);
35
+ __privateSet(this, _publicKey, publicKey);
36
+ }
37
+ /**
38
+ * Retrieves the key scheme used by this signer.
39
+ * @returns GCP supports only `Secp256k1` and `Secp256r1` schemes.
40
+ */
41
+ getKeyScheme() {
42
+ return SIGNATURE_FLAG_TO_SCHEME[__privateGet(this, _publicKey).flag()];
43
+ }
44
+ /**
45
+ * Retrieves the public key associated with this signer.
46
+ * @returns The Secp256k1PublicKey instance.
47
+ * @throws Will throw an error if the public key has not been initialized.
48
+ */
49
+ getPublicKey() {
50
+ return __privateGet(this, _publicKey);
51
+ }
52
+ /**
53
+ * Signs the given data using GCP KMS.
54
+ * @param bytes - The data to be signed as a Uint8Array.
55
+ * @returns A promise that resolves to the signature as a Uint8Array.
56
+ * @throws Will throw an error if the public key is not initialized or if signing fails.
57
+ */
58
+ async sign(bytes) {
59
+ const [signResponse] = await __privateGet(this, _client).asymmetricSign({
60
+ name: __privateGet(this, _versionName),
61
+ data: bytes
62
+ });
63
+ if (!signResponse.signature) {
64
+ throw new Error("No signature returned from GCP KMS");
65
+ }
66
+ return getConcatenatedSignature(signResponse.signature, this.getKeyScheme());
67
+ }
68
+ /**
69
+ * Synchronous signing is not supported by GCP KMS.
70
+ * @throws Always throws an error indicating synchronous signing is unsupported.
71
+ * @deprecated use `sign` instead
72
+ */
73
+ signData() {
74
+ throw new Error("GCP Signer does not support sync signing");
75
+ }
76
+ /**
77
+ * Creates a GCP KMS signer from the provided options.
78
+ * Expects the credentials file to be set as an env variable
79
+ * (GOOGLE_APPLICATION_CREDENTIALS).
80
+ */
81
+ static async fromOptions(options) {
82
+ const client = new KeyManagementServiceClient();
83
+ const versionName = client.cryptoKeyVersionPath(
84
+ options.projectId,
85
+ options.location,
86
+ options.keyRing,
87
+ options.cryptoKey,
88
+ options.cryptoKeyVersion
89
+ );
90
+ return new _GcpKmsSigner({
91
+ versionName,
92
+ client,
93
+ publicKey: await getPublicKey(client, versionName)
94
+ });
95
+ }
96
+ static async fromVersionName(versionName) {
97
+ const client = new KeyManagementServiceClient();
98
+ return new _GcpKmsSigner({
99
+ versionName,
100
+ client,
101
+ publicKey: await getPublicKey(client, versionName)
102
+ });
103
+ }
104
+ };
105
+ _publicKey = new WeakMap();
106
+ _client = new WeakMap();
107
+ _versionName = new WeakMap();
108
+ let GcpKmsSigner = _GcpKmsSigner;
109
+ async function getPublicKey(client, versionName) {
110
+ const [publicKey] = await client.getPublicKey({ name: versionName });
111
+ const { algorithm, pem } = publicKey;
112
+ if (!pem) throw new Error("No PEM key returned from GCP KMS");
113
+ const base64 = pem.replace("-----BEGIN PUBLIC KEY-----", "").replace("-----END PUBLIC KEY-----", "").replace(/\s/g, "");
114
+ const compressedKey = publicKeyFromDER(fromBase64(base64));
115
+ switch (algorithm) {
116
+ case "EC_SIGN_SECP256K1_SHA256":
117
+ return new Secp256k1PublicKey(compressedKey);
118
+ case "EC_SIGN_P256_SHA256":
119
+ return new Secp256r1PublicKey(compressedKey);
120
+ default:
121
+ throw new Error(`Unsupported algorithm: ${algorithm}`);
122
+ }
123
+ }
124
+ export {
125
+ GcpKmsSigner
126
+ };
127
+ //# sourceMappingURL=gcp-kms-client.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../src/gcp/gcp-kms-client.ts"],
4
+ "sourcesContent": ["// Copyright (c) Mysten Labs, Inc.\n// SPDX-License-Identifier: Apache-2.0\nimport { KeyManagementServiceClient } from '@google-cloud/kms';\nimport type { PublicKey, SignatureFlag } from '@haneullabs/haneul/cryptography';\nimport { SIGNATURE_FLAG_TO_SCHEME, Signer } from '@haneullabs/haneul/cryptography';\nimport { Secp256k1PublicKey } from '@haneullabs/haneul/keypairs/secp256k1';\nimport { Secp256r1PublicKey } from '@haneullabs/haneul/keypairs/secp256r1';\nimport { fromBase64 } from '@haneullabs/haneul/utils';\n\nimport { getConcatenatedSignature, publicKeyFromDER } from '../utils/utils.js';\n\n/**\n * Configuration options for initializing the GcpKmsSigner.\n */\nexport interface GcpKmsSignerOptions {\n\t/** The version name generated from `client.cryptoKeyVersionPath()` */\n\tversionName: string;\n\t/** Options for setting up the GCP KMS client */\n\tclient: KeyManagementServiceClient;\n\t/** Public key */\n\tpublicKey: PublicKey;\n}\n\n/**\n * GCP KMS Signer integrates GCP Key Management Service (KMS) with the Haneul blockchain\n * to provide signing capabilities using GCP-managed cryptographic keys.\n */\nexport class GcpKmsSigner extends Signer {\n\t#publicKey: PublicKey;\n\t/** GCP KMS client instance */\n\t#client: KeyManagementServiceClient;\n\t/** GCP KMS version name (generated from `client.cryptoKeyVersionPath()`) */\n\t#versionName: string;\n\n\t/**\n\t * Creates an instance of GcpKmsSigner. It's expected to call the static `fromOptions`\n\t * or `fromVersionName` method to create an instance.\n\t * For example:\n\t * ```\n\t * const signer = await GcpKmsSigner.fromVersionName(versionName);\n\t * ```\n\t * @throws Will throw an error if required GCP credentials are not provided.\n\t */\n\tconstructor({ versionName, client, publicKey }: GcpKmsSignerOptions) {\n\t\tsuper();\n\t\tif (!versionName) throw new Error('Version name is required');\n\n\t\tthis.#client = client;\n\t\tthis.#versionName = versionName;\n\t\tthis.#publicKey = publicKey;\n\t}\n\n\t/**\n\t * Retrieves the key scheme used by this signer.\n\t * @returns GCP supports only `Secp256k1` and `Secp256r1` schemes.\n\t */\n\tgetKeyScheme() {\n\t\treturn SIGNATURE_FLAG_TO_SCHEME[this.#publicKey.flag() as SignatureFlag];\n\t}\n\n\t/**\n\t * Retrieves the public key associated with this signer.\n\t * @returns The Secp256k1PublicKey instance.\n\t * @throws Will throw an error if the public key has not been initialized.\n\t */\n\tgetPublicKey() {\n\t\treturn this.#publicKey;\n\t}\n\n\t/**\n\t * Signs the given data using GCP KMS.\n\t * @param bytes - The data to be signed as a Uint8Array.\n\t * @returns A promise that resolves to the signature as a Uint8Array.\n\t * @throws Will throw an error if the public key is not initialized or if signing fails.\n\t */\n\tasync sign(bytes: Uint8Array): Promise<Uint8Array<ArrayBuffer>> {\n\t\tconst [signResponse] = await this.#client.asymmetricSign({\n\t\t\tname: this.#versionName,\n\t\t\tdata: bytes,\n\t\t});\n\n\t\tif (!signResponse.signature) {\n\t\t\tthrow new Error('No signature returned from GCP KMS');\n\t\t}\n\n\t\treturn getConcatenatedSignature(signResponse.signature as Uint8Array, this.getKeyScheme());\n\t}\n\n\t/**\n\t * Synchronous signing is not supported by GCP KMS.\n\t * @throws Always throws an error indicating synchronous signing is unsupported.\n\t * @deprecated use `sign` instead\n\t */\n\tsignData(): never {\n\t\tthrow new Error('GCP Signer does not support sync signing');\n\t}\n\n\t/**\n\t * Creates a GCP KMS signer from the provided options.\n\t * Expects the credentials file to be set as an env variable\n\t * (GOOGLE_APPLICATION_CREDENTIALS).\n\t */\n\tstatic async fromOptions(options: {\n\t\tprojectId: string;\n\t\tlocation: string;\n\t\tkeyRing: string;\n\t\tcryptoKey: string;\n\t\tcryptoKeyVersion: string;\n\t}) {\n\t\tconst client = new KeyManagementServiceClient();\n\n\t\tconst versionName = client.cryptoKeyVersionPath(\n\t\t\toptions.projectId,\n\t\t\toptions.location,\n\t\t\toptions.keyRing,\n\t\t\toptions.cryptoKey,\n\t\t\toptions.cryptoKeyVersion,\n\t\t);\n\n\t\treturn new GcpKmsSigner({\n\t\t\tversionName,\n\t\t\tclient,\n\t\t\tpublicKey: await getPublicKey(client, versionName),\n\t\t});\n\t}\n\n\tstatic async fromVersionName(versionName: string) {\n\t\tconst client = new KeyManagementServiceClient();\n\t\treturn new GcpKmsSigner({\n\t\t\tversionName,\n\t\t\tclient,\n\t\t\tpublicKey: await getPublicKey(client, versionName),\n\t\t});\n\t}\n}\n\n/**\n * Retrieves the public key associated with the given version name.\n */\nasync function getPublicKey(\n\tclient: KeyManagementServiceClient,\n\tversionName: string,\n): Promise<PublicKey> {\n\tconst [publicKey] = await client.getPublicKey({ name: versionName });\n\n\tconst { algorithm, pem } = publicKey;\n\n\tif (!pem) throw new Error('No PEM key returned from GCP KMS');\n\n\tconst base64 = pem\n\t\t.replace('-----BEGIN PUBLIC KEY-----', '')\n\t\t.replace('-----END PUBLIC KEY-----', '')\n\t\t.replace(/\\s/g, '');\n\n\tconst compressedKey = publicKeyFromDER(fromBase64(base64));\n\n\tswitch (algorithm) {\n\t\tcase 'EC_SIGN_SECP256K1_SHA256':\n\t\t\treturn new Secp256k1PublicKey(compressedKey);\n\t\tcase 'EC_SIGN_P256_SHA256':\n\t\t\treturn new Secp256r1PublicKey(compressedKey);\n\t\tdefault:\n\t\t\tthrow new Error(`Unsupported algorithm: ${algorithm}`);\n\t}\n}\n"],
5
+ "mappings": ";;;;;;;AAAA;AAEA,SAAS,kCAAkC;AAE3C,SAAS,0BAA0B,cAAc;AACjD,SAAS,0BAA0B;AACnC,SAAS,0BAA0B;AACnC,SAAS,kBAAkB;AAE3B,SAAS,0BAA0B,wBAAwB;AAkBpD,MAAM,gBAAN,MAAM,sBAAqB,OAAO;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAgBxC,YAAY,EAAE,aAAa,QAAQ,UAAU,GAAwB;AACpE,UAAM;AAhBP;AAEA;AAAA;AAEA;AAAA;AAaC,QAAI,CAAC,YAAa,OAAM,IAAI,MAAM,0BAA0B;AAE5D,uBAAK,SAAU;AACf,uBAAK,cAAe;AACpB,uBAAK,YAAa;AAAA,EACnB;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,eAAe;AACd,WAAO,yBAAyB,mBAAK,YAAW,KAAK,CAAkB;AAAA,EACxE;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,eAAe;AACd,WAAO,mBAAK;AAAA,EACb;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,MAAM,KAAK,OAAqD;AAC/D,UAAM,CAAC,YAAY,IAAI,MAAM,mBAAK,SAAQ,eAAe;AAAA,MACxD,MAAM,mBAAK;AAAA,MACX,MAAM;AAAA,IACP,CAAC;AAED,QAAI,CAAC,aAAa,WAAW;AAC5B,YAAM,IAAI,MAAM,oCAAoC;AAAA,IACrD;AAEA,WAAO,yBAAyB,aAAa,WAAyB,KAAK,aAAa,CAAC;AAAA,EAC1F;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,WAAkB;AACjB,UAAM,IAAI,MAAM,0CAA0C;AAAA,EAC3D;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,aAAa,YAAY,SAMtB;AACF,UAAM,SAAS,IAAI,2BAA2B;AAE9C,UAAM,cAAc,OAAO;AAAA,MAC1B,QAAQ;AAAA,MACR,QAAQ;AAAA,MACR,QAAQ;AAAA,MACR,QAAQ;AAAA,MACR,QAAQ;AAAA,IACT;AAEA,WAAO,IAAI,cAAa;AAAA,MACvB;AAAA,MACA;AAAA,MACA,WAAW,MAAM,aAAa,QAAQ,WAAW;AAAA,IAClD,CAAC;AAAA,EACF;AAAA,EAEA,aAAa,gBAAgB,aAAqB;AACjD,UAAM,SAAS,IAAI,2BAA2B;AAC9C,WAAO,IAAI,cAAa;AAAA,MACvB;AAAA,MACA;AAAA,MACA,WAAW,MAAM,aAAa,QAAQ,WAAW;AAAA,IAClD,CAAC;AAAA,EACF;AACD;AA1GC;AAEA;AAEA;AALM,IAAM,eAAN;AAgHP,eAAe,aACd,QACA,aACqB;AACrB,QAAM,CAAC,SAAS,IAAI,MAAM,OAAO,aAAa,EAAE,MAAM,YAAY,CAAC;AAEnE,QAAM,EAAE,WAAW,IAAI,IAAI;AAE3B,MAAI,CAAC,IAAK,OAAM,IAAI,MAAM,kCAAkC;AAE5D,QAAM,SAAS,IACb,QAAQ,8BAA8B,EAAE,EACxC,QAAQ,4BAA4B,EAAE,EACtC,QAAQ,OAAO,EAAE;AAEnB,QAAM,gBAAgB,iBAAiB,WAAW,MAAM,CAAC;AAEzD,UAAQ,WAAW;AAAA,IAClB,KAAK;AACJ,aAAO,IAAI,mBAAmB,aAAa;AAAA,IAC5C,KAAK;AACJ,aAAO,IAAI,mBAAmB,aAAa;AAAA,IAC5C;AACC,YAAM,IAAI,MAAM,0BAA0B,SAAS,EAAE;AAAA,EACvD;AACD;",
6
+ "names": []
7
+ }
@@ -0,0 +1,4 @@
1
+ import type { GcpKmsSignerOptions } from './gcp-kms-client.js';
2
+ import { GcpKmsSigner } from './gcp-kms-client.js';
3
+ export { GcpKmsSigner };
4
+ export type { GcpKmsSignerOptions };
@@ -0,0 +1,5 @@
1
+ import { GcpKmsSigner } from "./gcp-kms-client.js";
2
+ export {
3
+ GcpKmsSigner
4
+ };
5
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../src/gcp/index.ts"],
4
+ "sourcesContent": ["// Copyright (c) Mysten Labs, Inc.\n// SPDX-License-Identifier: Apache-2.0\n\nimport type { GcpKmsSignerOptions } from './gcp-kms-client.js';\nimport { GcpKmsSigner } from './gcp-kms-client.js';\n\nexport { GcpKmsSigner };\n\nexport type { GcpKmsSignerOptions };\n"],
5
+ "mappings": "AAIA,SAAS,oBAAoB;",
6
+ "names": []
7
+ }
@@ -0,0 +1,14 @@
1
+ import type { ObjectOwner } from '@haneullabs/haneul/client';
2
+ export declare const HaneulMoveObject: import("@haneullabs/haneul/bcs").BcsStruct<{
3
+ data: import("@haneullabs/haneul/bcs").BcsEnum<{
4
+ MoveObject: import("@haneullabs/haneul/bcs").BcsStruct<{
5
+ type: import("@haneullabs/haneul/bcs").BcsType<any, string, string>;
6
+ hasPublicTransfer: import("@haneullabs/haneul/bcs").BcsType<boolean, boolean, "bool">;
7
+ version: import("@haneullabs/haneul/bcs").BcsType<string, string | number | bigint, "u64">;
8
+ contents: import("@haneullabs/haneul/bcs").BcsType<any, string, string>;
9
+ }, string>;
10
+ }, "Data">;
11
+ owner: import("@haneullabs/haneul/bcs").BcsType<any, ObjectOwner, string>;
12
+ previousTransaction: import("@haneullabs/haneul/bcs").BcsType<string, string, "ObjectDigest">;
13
+ storageRebate: import("@haneullabs/haneul/bcs").BcsType<string, string | number | bigint, "u64">;
14
+ }, string>;
@@ -0,0 +1,70 @@
1
+ import { bcs, TypeTagSerializer } from "@haneullabs/haneul/bcs";
2
+ import {
3
+ fromBase64,
4
+ normalizeStructTag,
5
+ normalizeHaneulAddress,
6
+ parseStructTag
7
+ } from "@haneullabs/haneul/utils";
8
+ const HANEUL_FRAMEWORK_ADDRESS = normalizeHaneulAddress("0x2");
9
+ const HANEUL_SYSTEM_ADDRESS = normalizeHaneulAddress("0x3");
10
+ const MoveObjectType = bcs.enum("MoveObjectType", {
11
+ Other: bcs.StructTag,
12
+ GasCoin: null,
13
+ StakedSui: null,
14
+ Coin: bcs.TypeTag
15
+ });
16
+ const HaneulMoveObject = bcs.struct("HaneulMoveObject", {
17
+ data: bcs.enum("Data", {
18
+ MoveObject: bcs.struct("MoveObject", {
19
+ type: MoveObjectType.transform({
20
+ input: (objectType) => {
21
+ const structTag = parseStructTag(objectType);
22
+ if (structTag.address === HANEUL_FRAMEWORK_ADDRESS && structTag.module === "coin" && structTag.name === "Coin" && typeof structTag.typeParams[0] === "object") {
23
+ const innerStructTag = structTag.typeParams[0];
24
+ if (innerStructTag.address === HANEUL_FRAMEWORK_ADDRESS && innerStructTag.module === "haneul" && innerStructTag.name === "SUI") {
25
+ return { GasCoin: true, $kind: "GasCoin" };
26
+ }
27
+ return { Coin: normalizeStructTag(innerStructTag), $kind: "Coin" };
28
+ } else if (structTag.address === HANEUL_SYSTEM_ADDRESS && structTag.module === "staking_pool" && structTag.name === "StakedSui") {
29
+ return { StakedSui: true, $kind: "StakedSui" };
30
+ }
31
+ return {
32
+ Other: {
33
+ ...structTag,
34
+ typeParams: structTag.typeParams.map((typeParam) => {
35
+ return TypeTagSerializer.parseFromStr(normalizeStructTag(typeParam));
36
+ })
37
+ },
38
+ $kind: "Other"
39
+ };
40
+ }
41
+ }),
42
+ hasPublicTransfer: bcs.bool(),
43
+ version: bcs.u64(),
44
+ contents: bcs.byteVector().transform({ input: fromBase64 })
45
+ })
46
+ }),
47
+ owner: bcs.Owner.transform({
48
+ input: (objectOwner) => {
49
+ if (objectOwner === "Immutable") {
50
+ return { Immutable: null };
51
+ } else if ("Shared" in objectOwner) {
52
+ return { Shared: { initialSharedVersion: objectOwner.Shared.initial_shared_version } };
53
+ } else if ("ConsensusAddressOwner" in objectOwner) {
54
+ return {
55
+ ConsensusAddressOwner: {
56
+ owner: objectOwner.ConsensusAddressOwner.owner,
57
+ startVersion: objectOwner.ConsensusAddressOwner.start_version
58
+ }
59
+ };
60
+ }
61
+ return objectOwner;
62
+ }
63
+ }),
64
+ previousTransaction: bcs.ObjectDigest,
65
+ storageRebate: bcs.u64()
66
+ });
67
+ export {
68
+ HaneulMoveObject
69
+ };
70
+ //# sourceMappingURL=bcs.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../src/ledger/bcs.ts"],
4
+ "sourcesContent": ["// Copyright (c) Mysten Labs, Inc.\n// SPDX-License-Identifier: Apache-2.0\n\nimport { bcs, TypeTagSerializer } from '@haneullabs/haneul/bcs';\nimport type { ObjectOwner } from '@haneullabs/haneul/client';\nimport {\n\tfromBase64,\n\tnormalizeStructTag,\n\tnormalizeHaneulAddress,\n\tparseStructTag,\n} from '@haneullabs/haneul/utils';\n\nconst HANEUL_FRAMEWORK_ADDRESS = normalizeHaneulAddress('0x2');\nconst HANEUL_SYSTEM_ADDRESS = normalizeHaneulAddress('0x3');\n\nconst MoveObjectType = bcs.enum('MoveObjectType', {\n\tOther: bcs.StructTag,\n\tGasCoin: null,\n\tStakedSui: null,\n\tCoin: bcs.TypeTag,\n});\n\nexport const HaneulMoveObject = bcs.struct('HaneulMoveObject', {\n\tdata: bcs.enum('Data', {\n\t\tMoveObject: bcs.struct('MoveObject', {\n\t\t\ttype: MoveObjectType.transform({\n\t\t\t\tinput: (objectType: string): typeof MoveObjectType.$inferType => {\n\t\t\t\t\tconst structTag = parseStructTag(objectType);\n\n\t\t\t\t\tif (\n\t\t\t\t\t\tstructTag.address === HANEUL_FRAMEWORK_ADDRESS &&\n\t\t\t\t\t\tstructTag.module === 'coin' &&\n\t\t\t\t\t\tstructTag.name === 'Coin' &&\n\t\t\t\t\t\ttypeof structTag.typeParams[0] === 'object'\n\t\t\t\t\t) {\n\t\t\t\t\t\tconst innerStructTag = structTag.typeParams[0];\n\t\t\t\t\t\tif (\n\t\t\t\t\t\t\tinnerStructTag.address === HANEUL_FRAMEWORK_ADDRESS &&\n\t\t\t\t\t\t\tinnerStructTag.module === 'haneul' &&\n\t\t\t\t\t\t\tinnerStructTag.name === 'SUI'\n\t\t\t\t\t\t) {\n\t\t\t\t\t\t\treturn { GasCoin: true, $kind: 'GasCoin' };\n\t\t\t\t\t\t}\n\t\t\t\t\t\treturn { Coin: normalizeStructTag(innerStructTag), $kind: 'Coin' };\n\t\t\t\t\t} else if (\n\t\t\t\t\t\tstructTag.address === HANEUL_SYSTEM_ADDRESS &&\n\t\t\t\t\t\tstructTag.module === 'staking_pool' &&\n\t\t\t\t\t\tstructTag.name === 'StakedSui'\n\t\t\t\t\t) {\n\t\t\t\t\t\treturn { StakedSui: true, $kind: 'StakedSui' };\n\t\t\t\t\t}\n\t\t\t\t\treturn {\n\t\t\t\t\t\tOther: {\n\t\t\t\t\t\t\t...structTag,\n\t\t\t\t\t\t\ttypeParams: structTag.typeParams.map((typeParam) => {\n\t\t\t\t\t\t\t\treturn TypeTagSerializer.parseFromStr(normalizeStructTag(typeParam));\n\t\t\t\t\t\t\t}),\n\t\t\t\t\t\t},\n\t\t\t\t\t\t$kind: 'Other',\n\t\t\t\t\t};\n\t\t\t\t},\n\t\t\t}),\n\t\t\thasPublicTransfer: bcs.bool(),\n\t\t\tversion: bcs.u64(),\n\t\t\tcontents: bcs.byteVector().transform({ input: fromBase64 }),\n\t\t}),\n\t}),\n\towner: bcs.Owner.transform({\n\t\tinput: (objectOwner: ObjectOwner) => {\n\t\t\tif (objectOwner === 'Immutable') {\n\t\t\t\treturn { Immutable: null };\n\t\t\t} else if ('Shared' in objectOwner) {\n\t\t\t\treturn { Shared: { initialSharedVersion: objectOwner.Shared.initial_shared_version } };\n\t\t\t} else if ('ConsensusAddressOwner' in objectOwner) {\n\t\t\t\treturn {\n\t\t\t\t\tConsensusAddressOwner: {\n\t\t\t\t\t\towner: objectOwner.ConsensusAddressOwner.owner,\n\t\t\t\t\t\tstartVersion: objectOwner.ConsensusAddressOwner.start_version,\n\t\t\t\t\t},\n\t\t\t\t};\n\t\t\t}\n\t\t\treturn objectOwner;\n\t\t},\n\t}),\n\tpreviousTransaction: bcs.ObjectDigest,\n\tstorageRebate: bcs.u64(),\n});\n"],
5
+ "mappings": "AAGA,SAAS,KAAK,yBAAyB;AAEvC;AAAA,EACC;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,OACM;AAEP,MAAM,2BAA2B,uBAAuB,KAAK;AAC7D,MAAM,wBAAwB,uBAAuB,KAAK;AAE1D,MAAM,iBAAiB,IAAI,KAAK,kBAAkB;AAAA,EACjD,OAAO,IAAI;AAAA,EACX,SAAS;AAAA,EACT,WAAW;AAAA,EACX,MAAM,IAAI;AACX,CAAC;AAEM,MAAM,mBAAmB,IAAI,OAAO,oBAAoB;AAAA,EAC9D,MAAM,IAAI,KAAK,QAAQ;AAAA,IACtB,YAAY,IAAI,OAAO,cAAc;AAAA,MACpC,MAAM,eAAe,UAAU;AAAA,QAC9B,OAAO,CAAC,eAAyD;AAChE,gBAAM,YAAY,eAAe,UAAU;AAE3C,cACC,UAAU,YAAY,4BACtB,UAAU,WAAW,UACrB,UAAU,SAAS,UACnB,OAAO,UAAU,WAAW,CAAC,MAAM,UAClC;AACD,kBAAM,iBAAiB,UAAU,WAAW,CAAC;AAC7C,gBACC,eAAe,YAAY,4BAC3B,eAAe,WAAW,YAC1B,eAAe,SAAS,OACvB;AACD,qBAAO,EAAE,SAAS,MAAM,OAAO,UAAU;AAAA,YAC1C;AACA,mBAAO,EAAE,MAAM,mBAAmB,cAAc,GAAG,OAAO,OAAO;AAAA,UAClE,WACC,UAAU,YAAY,yBACtB,UAAU,WAAW,kBACrB,UAAU,SAAS,aAClB;AACD,mBAAO,EAAE,WAAW,MAAM,OAAO,YAAY;AAAA,UAC9C;AACA,iBAAO;AAAA,YACN,OAAO;AAAA,cACN,GAAG;AAAA,cACH,YAAY,UAAU,WAAW,IAAI,CAAC,cAAc;AACnD,uBAAO,kBAAkB,aAAa,mBAAmB,SAAS,CAAC;AAAA,cACpE,CAAC;AAAA,YACF;AAAA,YACA,OAAO;AAAA,UACR;AAAA,QACD;AAAA,MACD,CAAC;AAAA,MACD,mBAAmB,IAAI,KAAK;AAAA,MAC5B,SAAS,IAAI,IAAI;AAAA,MACjB,UAAU,IAAI,WAAW,EAAE,UAAU,EAAE,OAAO,WAAW,CAAC;AAAA,IAC3D,CAAC;AAAA,EACF,CAAC;AAAA,EACD,OAAO,IAAI,MAAM,UAAU;AAAA,IAC1B,OAAO,CAAC,gBAA6B;AACpC,UAAI,gBAAgB,aAAa;AAChC,eAAO,EAAE,WAAW,KAAK;AAAA,MAC1B,WAAW,YAAY,aAAa;AACnC,eAAO,EAAE,QAAQ,EAAE,sBAAsB,YAAY,OAAO,uBAAuB,EAAE;AAAA,MACtF,WAAW,2BAA2B,aAAa;AAClD,eAAO;AAAA,UACN,uBAAuB;AAAA,YACtB,OAAO,YAAY,sBAAsB;AAAA,YACzC,cAAc,YAAY,sBAAsB;AAAA,UACjD;AAAA,QACD;AAAA,MACD;AACA,aAAO;AAAA,IACR;AAAA,EACD,CAAC;AAAA,EACD,qBAAqB,IAAI;AAAA,EACzB,eAAe,IAAI,IAAI;AACxB,CAAC;",
6
+ "names": []
7
+ }
@@ -0,0 +1,66 @@
1
+ import type HaneulLedgerClient from '@haneullabs/ledgerjs-hw-app-haneul';
2
+ import type { HaneulClient } from '@haneullabs/haneul/client';
3
+ import type { SignatureWithBytes } from '@haneullabs/haneul/cryptography';
4
+ import { Signer } from '@haneullabs/haneul/cryptography';
5
+ import { Ed25519PublicKey } from '@haneullabs/haneul/keypairs/ed25519';
6
+ import type { Resolution } from '@haneullabs/ledgerjs-hw-app-haneul';
7
+ export { HaneulMoveObject } from './bcs.js';
8
+ export { getInputObjects } from './objects.js';
9
+ /**
10
+ * Configuration options for initializing the LedgerSigner.
11
+ */
12
+ export interface LedgerSignerOptions {
13
+ publicKey: Ed25519PublicKey;
14
+ derivationPath: string;
15
+ ledgerClient: HaneulLedgerClient;
16
+ haneulClient: HaneulClient;
17
+ }
18
+ /**
19
+ * Ledger integrates with the Haneul blockchain to provide signing capabilities using Ledger devices.
20
+ */
21
+ export declare class LedgerSigner extends Signer {
22
+ #private;
23
+ /**
24
+ * Creates an instance of LedgerSigner. It's expected to call the static `fromDerivationPath` method to create an instance.
25
+ * @example
26
+ * ```
27
+ * const signer = await LedgerSigner.fromDerivationPath(derivationPath, options);
28
+ * ```
29
+ */
30
+ constructor({ publicKey, derivationPath, ledgerClient, haneulClient }: LedgerSignerOptions);
31
+ /**
32
+ * Retrieves the key scheme used by this signer.
33
+ */
34
+ getKeyScheme(): "ED25519";
35
+ /**
36
+ * Retrieves the public key associated with this signer.
37
+ * @returns The Ed25519PublicKey instance.
38
+ */
39
+ getPublicKey(): Ed25519PublicKey;
40
+ /**
41
+ * Signs the provided transaction bytes.
42
+ * @returns The signed transaction bytes and signature.
43
+ */
44
+ signTransaction(bytes: Uint8Array, bcsObjects?: Uint8Array[], resolution?: Resolution): Promise<SignatureWithBytes>;
45
+ /**
46
+ * Signs the provided personal message.
47
+ * @returns The signed message bytes and signature.
48
+ */
49
+ signPersonalMessage(bytes: Uint8Array): Promise<SignatureWithBytes>;
50
+ /**
51
+ * Prepares the signer by fetching and setting the public key from a Ledger device.
52
+ * It is recommended to initialize an `LedgerSigner` instance using this function.
53
+ * @returns A promise that resolves once a `LedgerSigner` instance is prepared (public key is set).
54
+ */
55
+ static fromDerivationPath(derivationPath: string, ledgerClient: HaneulLedgerClient, haneulClient: HaneulClient): Promise<LedgerSigner>;
56
+ /**
57
+ * Generic signing is not supported by Ledger.
58
+ * @throws Always throws an error indicating generic signing is unsupported.
59
+ */
60
+ sign(): never;
61
+ /**
62
+ * Generic signing is not supported by Ledger.
63
+ * @throws Always throws an error indicating generic signing is unsupported.
64
+ */
65
+ signWithIntent(): never;
66
+ }
@@ -0,0 +1,138 @@
1
+ var __typeError = (msg) => {
2
+ throw TypeError(msg);
3
+ };
4
+ var __accessCheck = (obj, member, msg) => member.has(obj) || __typeError("Cannot " + msg);
5
+ var __privateGet = (obj, member, getter) => (__accessCheck(obj, member, "read from private field"), getter ? getter.call(obj) : member.get(obj));
6
+ var __privateAdd = (obj, member, value) => member.has(obj) ? __typeError("Cannot add the same private member more than once") : member instanceof WeakSet ? member.add(obj) : member.set(obj, value);
7
+ var __privateSet = (obj, member, value, setter) => (__accessCheck(obj, member, "write to private field"), setter ? setter.call(obj, value) : member.set(obj, value), value);
8
+ var _derivationPath, _publicKey, _ledgerClient, _haneulClient;
9
+ import { messageWithIntent, Signer, toSerializedSignature } from "@haneullabs/haneul/cryptography";
10
+ import { Ed25519PublicKey } from "@haneullabs/haneul/keypairs/ed25519";
11
+ import { Transaction } from "@haneullabs/haneul/transactions";
12
+ import { toBase64 } from "@haneullabs/haneul/utils";
13
+ import { bcs } from "@haneullabs/haneul/bcs";
14
+ import { getInputObjects } from "./objects.js";
15
+ import { HaneulMoveObject } from "./bcs.js";
16
+ import { getInputObjects as getInputObjects2 } from "./objects.js";
17
+ const _LedgerSigner = class _LedgerSigner extends Signer {
18
+ /**
19
+ * Creates an instance of LedgerSigner. It's expected to call the static `fromDerivationPath` method to create an instance.
20
+ * @example
21
+ * ```
22
+ * const signer = await LedgerSigner.fromDerivationPath(derivationPath, options);
23
+ * ```
24
+ */
25
+ constructor({ publicKey, derivationPath, ledgerClient, haneulClient }) {
26
+ super();
27
+ __privateAdd(this, _derivationPath);
28
+ __privateAdd(this, _publicKey);
29
+ __privateAdd(this, _ledgerClient);
30
+ __privateAdd(this, _haneulClient);
31
+ __privateSet(this, _publicKey, publicKey);
32
+ __privateSet(this, _derivationPath, derivationPath);
33
+ __privateSet(this, _ledgerClient, ledgerClient);
34
+ __privateSet(this, _haneulClient, haneulClient);
35
+ }
36
+ /**
37
+ * Retrieves the key scheme used by this signer.
38
+ */
39
+ getKeyScheme() {
40
+ return "ED25519";
41
+ }
42
+ /**
43
+ * Retrieves the public key associated with this signer.
44
+ * @returns The Ed25519PublicKey instance.
45
+ */
46
+ getPublicKey() {
47
+ return __privateGet(this, _publicKey);
48
+ }
49
+ /**
50
+ * Signs the provided transaction bytes.
51
+ * @returns The signed transaction bytes and signature.
52
+ */
53
+ async signTransaction(bytes, bcsObjects, resolution) {
54
+ const transactionOptions = bcsObjects ? { bcsObjects } : await getInputObjects(Transaction.from(bytes), __privateGet(this, _haneulClient)).catch(() => ({
55
+ // Fail gracefully so network errors or serialization issues don't break transaction signing:
56
+ bcsObjects: []
57
+ }));
58
+ const intentMessage = messageWithIntent("TransactionData", bytes);
59
+ const { signature } = await __privateGet(this, _ledgerClient).signTransaction(
60
+ __privateGet(this, _derivationPath),
61
+ intentMessage,
62
+ transactionOptions,
63
+ resolution
64
+ );
65
+ return {
66
+ bytes: toBase64(bytes),
67
+ signature: toSerializedSignature({
68
+ signature,
69
+ signatureScheme: this.getKeyScheme(),
70
+ publicKey: __privateGet(this, _publicKey)
71
+ })
72
+ };
73
+ }
74
+ /**
75
+ * Signs the provided personal message.
76
+ * @returns The signed message bytes and signature.
77
+ */
78
+ async signPersonalMessage(bytes) {
79
+ const intentMessage = messageWithIntent(
80
+ "PersonalMessage",
81
+ bcs.byteVector().serialize(bytes).toBytes()
82
+ );
83
+ const { signature } = await __privateGet(this, _ledgerClient).signTransaction(
84
+ __privateGet(this, _derivationPath),
85
+ intentMessage
86
+ );
87
+ return {
88
+ bytes: toBase64(bytes),
89
+ signature: toSerializedSignature({
90
+ signature,
91
+ signatureScheme: this.getKeyScheme(),
92
+ publicKey: __privateGet(this, _publicKey)
93
+ })
94
+ };
95
+ }
96
+ /**
97
+ * Prepares the signer by fetching and setting the public key from a Ledger device.
98
+ * It is recommended to initialize an `LedgerSigner` instance using this function.
99
+ * @returns A promise that resolves once a `LedgerSigner` instance is prepared (public key is set).
100
+ */
101
+ static async fromDerivationPath(derivationPath, ledgerClient, haneulClient) {
102
+ const { publicKey } = await ledgerClient.getPublicKey(derivationPath);
103
+ if (!publicKey) {
104
+ throw new Error("Failed to get public key from Ledger.");
105
+ }
106
+ return new _LedgerSigner({
107
+ derivationPath,
108
+ publicKey: new Ed25519PublicKey(publicKey),
109
+ ledgerClient,
110
+ haneulClient
111
+ });
112
+ }
113
+ /**
114
+ * Generic signing is not supported by Ledger.
115
+ * @throws Always throws an error indicating generic signing is unsupported.
116
+ */
117
+ sign() {
118
+ throw new Error("Ledger Signer does not support generic signing.");
119
+ }
120
+ /**
121
+ * Generic signing is not supported by Ledger.
122
+ * @throws Always throws an error indicating generic signing is unsupported.
123
+ */
124
+ signWithIntent() {
125
+ throw new Error("Ledger Signer does not support generic signing.");
126
+ }
127
+ };
128
+ _derivationPath = new WeakMap();
129
+ _publicKey = new WeakMap();
130
+ _ledgerClient = new WeakMap();
131
+ _haneulClient = new WeakMap();
132
+ let LedgerSigner = _LedgerSigner;
133
+ export {
134
+ HaneulMoveObject,
135
+ LedgerSigner,
136
+ getInputObjects2 as getInputObjects
137
+ };
138
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../src/ledger/index.ts"],
4
+ "sourcesContent": ["// Copyright (c) Mysten Labs, Inc.\n// SPDX-License-Identifier: Apache-2.0\n\nimport type HaneulLedgerClient from '@haneullabs/ledgerjs-hw-app-haneul';\nimport type { HaneulClient } from '@haneullabs/haneul/client';\nimport type { SignatureWithBytes } from '@haneullabs/haneul/cryptography';\nimport { messageWithIntent, Signer, toSerializedSignature } from '@haneullabs/haneul/cryptography';\nimport { Ed25519PublicKey } from '@haneullabs/haneul/keypairs/ed25519';\nimport { Transaction } from '@haneullabs/haneul/transactions';\nimport { toBase64 } from '@haneullabs/haneul/utils';\n\nimport { bcs } from '@haneullabs/haneul/bcs';\nimport { getInputObjects } from './objects.js';\nimport type { Resolution } from '@haneullabs/ledgerjs-hw-app-haneul';\n\nexport { HaneulMoveObject } from './bcs.js';\nexport { getInputObjects } from './objects.js';\n\n/**\n * Configuration options for initializing the LedgerSigner.\n */\nexport interface LedgerSignerOptions {\n\tpublicKey: Ed25519PublicKey;\n\tderivationPath: string;\n\tledgerClient: HaneulLedgerClient;\n\thaneulClient: HaneulClient;\n}\n\n/**\n * Ledger integrates with the Haneul blockchain to provide signing capabilities using Ledger devices.\n */\nexport class LedgerSigner extends Signer {\n\t#derivationPath: string;\n\t#publicKey: Ed25519PublicKey;\n\t#ledgerClient: HaneulLedgerClient;\n\t#haneulClient: HaneulClient;\n\n\t/**\n\t * Creates an instance of LedgerSigner. It's expected to call the static `fromDerivationPath` method to create an instance.\n\t * @example\n\t * ```\n\t * const signer = await LedgerSigner.fromDerivationPath(derivationPath, options);\n\t * ```\n\t */\n\tconstructor({ publicKey, derivationPath, ledgerClient, haneulClient }: LedgerSignerOptions) {\n\t\tsuper();\n\t\tthis.#publicKey = publicKey;\n\t\tthis.#derivationPath = derivationPath;\n\t\tthis.#ledgerClient = ledgerClient;\n\t\tthis.#haneulClient = haneulClient;\n\t}\n\n\t/**\n\t * Retrieves the key scheme used by this signer.\n\t */\n\toverride getKeyScheme() {\n\t\treturn 'ED25519' as const;\n\t}\n\n\t/**\n\t * Retrieves the public key associated with this signer.\n\t * @returns The Ed25519PublicKey instance.\n\t */\n\toverride getPublicKey() {\n\t\treturn this.#publicKey;\n\t}\n\n\t/**\n\t * Signs the provided transaction bytes.\n\t * @returns The signed transaction bytes and signature.\n\t */\n\toverride async signTransaction(\n\t\tbytes: Uint8Array,\n\t\tbcsObjects?: Uint8Array[],\n\t\tresolution?: Resolution,\n\t): Promise<SignatureWithBytes> {\n\t\tconst transactionOptions = bcsObjects\n\t\t\t? { bcsObjects }\n\t\t\t: await getInputObjects(Transaction.from(bytes), this.#haneulClient).catch(() => ({\n\t\t\t\t\t// Fail gracefully so network errors or serialization issues don't break transaction signing:\n\t\t\t\t\tbcsObjects: [],\n\t\t\t\t}));\n\n\t\tconst intentMessage = messageWithIntent('TransactionData', bytes);\n\t\tconst { signature } = await this.#ledgerClient.signTransaction(\n\t\t\tthis.#derivationPath,\n\t\t\tintentMessage,\n\t\t\ttransactionOptions,\n\t\t\tresolution,\n\t\t);\n\n\t\treturn {\n\t\t\tbytes: toBase64(bytes),\n\t\t\tsignature: toSerializedSignature({\n\t\t\t\tsignature,\n\t\t\t\tsignatureScheme: this.getKeyScheme(),\n\t\t\t\tpublicKey: this.#publicKey,\n\t\t\t}),\n\t\t};\n\t}\n\n\t/**\n\t * Signs the provided personal message.\n\t * @returns The signed message bytes and signature.\n\t */\n\toverride async signPersonalMessage(bytes: Uint8Array): Promise<SignatureWithBytes> {\n\t\tconst intentMessage = messageWithIntent(\n\t\t\t'PersonalMessage',\n\t\t\tbcs.byteVector().serialize(bytes).toBytes(),\n\t\t);\n\t\tconst { signature } = await this.#ledgerClient.signTransaction(\n\t\t\tthis.#derivationPath,\n\t\t\tintentMessage,\n\t\t);\n\n\t\treturn {\n\t\t\tbytes: toBase64(bytes),\n\t\t\tsignature: toSerializedSignature({\n\t\t\t\tsignature,\n\t\t\t\tsignatureScheme: this.getKeyScheme(),\n\t\t\t\tpublicKey: this.#publicKey,\n\t\t\t}),\n\t\t};\n\t}\n\n\t/**\n\t * Prepares the signer by fetching and setting the public key from a Ledger device.\n\t * It is recommended to initialize an `LedgerSigner` instance using this function.\n\t * @returns A promise that resolves once a `LedgerSigner` instance is prepared (public key is set).\n\t */\n\tstatic async fromDerivationPath(\n\t\tderivationPath: string,\n\t\tledgerClient: HaneulLedgerClient,\n\t\thaneulClient: HaneulClient,\n\t) {\n\t\tconst { publicKey } = await ledgerClient.getPublicKey(derivationPath);\n\t\tif (!publicKey) {\n\t\t\tthrow new Error('Failed to get public key from Ledger.');\n\t\t}\n\n\t\treturn new LedgerSigner({\n\t\t\tderivationPath,\n\t\t\tpublicKey: new Ed25519PublicKey(publicKey),\n\t\t\tledgerClient,\n\t\t\thaneulClient,\n\t\t});\n\t}\n\n\t/**\n\t * Generic signing is not supported by Ledger.\n\t * @throws Always throws an error indicating generic signing is unsupported.\n\t */\n\toverride sign(): never {\n\t\tthrow new Error('Ledger Signer does not support generic signing.');\n\t}\n\n\t/**\n\t * Generic signing is not supported by Ledger.\n\t * @throws Always throws an error indicating generic signing is unsupported.\n\t */\n\toverride signWithIntent(): never {\n\t\tthrow new Error('Ledger Signer does not support generic signing.');\n\t}\n}\n"],
5
+ "mappings": ";;;;;;;AAAA;AAMA,SAAS,mBAAmB,QAAQ,6BAA6B;AACjE,SAAS,wBAAwB;AACjC,SAAS,mBAAmB;AAC5B,SAAS,gBAAgB;AAEzB,SAAS,WAAW;AACpB,SAAS,uBAAuB;AAGhC,SAAS,wBAAwB;AACjC,SAAS,mBAAAA,wBAAuB;AAezB,MAAM,gBAAN,MAAM,sBAAqB,OAAO;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAaxC,YAAY,EAAE,WAAW,gBAAgB,cAAc,aAAa,GAAwB;AAC3F,UAAM;AAbP;AACA;AACA;AACA;AAWC,uBAAK,YAAa;AAClB,uBAAK,iBAAkB;AACvB,uBAAK,eAAgB;AACrB,uBAAK,eAAgB;AAAA,EACtB;AAAA;AAAA;AAAA;AAAA,EAKS,eAAe;AACvB,WAAO;AAAA,EACR;AAAA;AAAA;AAAA;AAAA;AAAA,EAMS,eAAe;AACvB,WAAO,mBAAK;AAAA,EACb;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,MAAe,gBACd,OACA,YACA,YAC8B;AAC9B,UAAM,qBAAqB,aACxB,EAAE,WAAW,IACb,MAAM,gBAAgB,YAAY,KAAK,KAAK,GAAG,mBAAK,cAAa,EAAE,MAAM,OAAO;AAAA;AAAA,MAEhF,YAAY,CAAC;AAAA,IACd,EAAE;AAEJ,UAAM,gBAAgB,kBAAkB,mBAAmB,KAAK;AAChE,UAAM,EAAE,UAAU,IAAI,MAAM,mBAAK,eAAc;AAAA,MAC9C,mBAAK;AAAA,MACL;AAAA,MACA;AAAA,MACA;AAAA,IACD;AAEA,WAAO;AAAA,MACN,OAAO,SAAS,KAAK;AAAA,MACrB,WAAW,sBAAsB;AAAA,QAChC;AAAA,QACA,iBAAiB,KAAK,aAAa;AAAA,QACnC,WAAW,mBAAK;AAAA,MACjB,CAAC;AAAA,IACF;AAAA,EACD;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,MAAe,oBAAoB,OAAgD;AAClF,UAAM,gBAAgB;AAAA,MACrB;AAAA,MACA,IAAI,WAAW,EAAE,UAAU,KAAK,EAAE,QAAQ;AAAA,IAC3C;AACA,UAAM,EAAE,UAAU,IAAI,MAAM,mBAAK,eAAc;AAAA,MAC9C,mBAAK;AAAA,MACL;AAAA,IACD;AAEA,WAAO;AAAA,MACN,OAAO,SAAS,KAAK;AAAA,MACrB,WAAW,sBAAsB;AAAA,QAChC;AAAA,QACA,iBAAiB,KAAK,aAAa;AAAA,QACnC,WAAW,mBAAK;AAAA,MACjB,CAAC;AAAA,IACF;AAAA,EACD;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,aAAa,mBACZ,gBACA,cACA,cACC;AACD,UAAM,EAAE,UAAU,IAAI,MAAM,aAAa,aAAa,cAAc;AACpE,QAAI,CAAC,WAAW;AACf,YAAM,IAAI,MAAM,uCAAuC;AAAA,IACxD;AAEA,WAAO,IAAI,cAAa;AAAA,MACvB;AAAA,MACA,WAAW,IAAI,iBAAiB,SAAS;AAAA,MACzC;AAAA,MACA;AAAA,IACD,CAAC;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA,EAMS,OAAc;AACtB,UAAM,IAAI,MAAM,iDAAiD;AAAA,EAClE;AAAA;AAAA;AAAA;AAAA;AAAA,EAMS,iBAAwB;AAChC,UAAM,IAAI,MAAM,iDAAiD;AAAA,EAClE;AACD;AAnIC;AACA;AACA;AACA;AAJM,IAAM,eAAN;",
6
+ "names": ["getInputObjects"]
7
+ }
@@ -0,0 +1,5 @@
1
+ import type { Transaction } from '@haneullabs/haneul/transactions';
2
+ import type { HaneulClient } from '@haneullabs/haneul/client';
3
+ export declare const getInputObjects: (transaction: Transaction, client: HaneulClient) => Promise<{
4
+ bcsObjects: Uint8Array<ArrayBuffer>[];
5
+ }>;
@@ -0,0 +1,40 @@
1
+ import { HaneulMoveObject } from "./bcs.js";
2
+ const getInputObjects = async (transaction, client) => {
3
+ const data = transaction.getData();
4
+ const gasObjectIds = data.gasData.payment?.map((object) => object.objectId) ?? [];
5
+ const inputObjectIds = data.inputs.map((input) => {
6
+ return input.$kind === "Object" && input.Object.$kind === "ImmOrOwnedObject" ? input.Object.ImmOrOwnedObject.objectId : null;
7
+ }).filter((objectId) => !!objectId);
8
+ const objects = await client.multiGetObjects({
9
+ ids: [...gasObjectIds, ...inputObjectIds],
10
+ options: {
11
+ showBcs: true,
12
+ showPreviousTransaction: true,
13
+ showStorageRebate: true,
14
+ showOwner: true
15
+ }
16
+ });
17
+ const bcsObjects = objects.map((object) => {
18
+ if (object.error || !object.data || object.data.bcs?.dataType !== "moveObject") {
19
+ return null;
20
+ }
21
+ return HaneulMoveObject.serialize({
22
+ data: {
23
+ MoveObject: {
24
+ type: object.data.bcs.type,
25
+ hasPublicTransfer: object.data.bcs.hasPublicTransfer,
26
+ version: object.data.bcs.version,
27
+ contents: object.data.bcs.bcsBytes
28
+ }
29
+ },
30
+ owner: object.data.owner,
31
+ previousTransaction: object.data.previousTransaction,
32
+ storageRebate: object.data.storageRebate
33
+ }).toBytes();
34
+ }).filter((bcsBytes) => !!bcsBytes);
35
+ return { bcsObjects };
36
+ };
37
+ export {
38
+ getInputObjects
39
+ };
40
+ //# sourceMappingURL=objects.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../src/ledger/objects.ts"],
4
+ "sourcesContent": ["// Copyright (c) Mysten Labs, Inc.\n// SPDX-License-Identifier: Apache-2.0\n\nimport type { Transaction } from '@haneullabs/haneul/transactions';\nimport type { HaneulClient } from '@haneullabs/haneul/client';\nimport { HaneulMoveObject } from './bcs.js';\n\nexport const getInputObjects = async (transaction: Transaction, client: HaneulClient) => {\n\tconst data = transaction.getData();\n\n\tconst gasObjectIds = data.gasData.payment?.map((object) => object.objectId) ?? [];\n\tconst inputObjectIds = data.inputs\n\t\t.map((input) => {\n\t\t\treturn input.$kind === 'Object' && input.Object.$kind === 'ImmOrOwnedObject'\n\t\t\t\t? input.Object.ImmOrOwnedObject.objectId\n\t\t\t\t: null;\n\t\t})\n\t\t.filter((objectId): objectId is string => !!objectId);\n\n\tconst objects = await client.multiGetObjects({\n\t\tids: [...gasObjectIds, ...inputObjectIds],\n\t\toptions: {\n\t\t\tshowBcs: true,\n\t\t\tshowPreviousTransaction: true,\n\t\t\tshowStorageRebate: true,\n\t\t\tshowOwner: true,\n\t\t},\n\t});\n\n\t// NOTE: We should probably get rid of this manual serialization logic in favor of using the\n\t// already serialized object bytes from the GraphQL API once there is more mainstream support\n\t// for it + we can enforce the transport type on the Haneul client.\n\tconst bcsObjects = objects\n\t\t.map((object) => {\n\t\t\tif (object.error || !object.data || object.data.bcs?.dataType !== 'moveObject') {\n\t\t\t\treturn null;\n\t\t\t}\n\n\t\t\treturn HaneulMoveObject.serialize({\n\t\t\t\tdata: {\n\t\t\t\t\tMoveObject: {\n\t\t\t\t\t\ttype: object.data.bcs.type,\n\t\t\t\t\t\thasPublicTransfer: object.data.bcs.hasPublicTransfer,\n\t\t\t\t\t\tversion: object.data.bcs.version,\n\t\t\t\t\t\tcontents: object.data.bcs.bcsBytes,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\towner: object.data.owner!,\n\t\t\t\tpreviousTransaction: object.data.previousTransaction!,\n\t\t\t\tstorageRebate: object.data.storageRebate!,\n\t\t\t}).toBytes();\n\t\t})\n\t\t.filter((bcsBytes): bcsBytes is Uint8Array<ArrayBuffer> => !!bcsBytes);\n\n\treturn { bcsObjects };\n};\n"],
5
+ "mappings": "AAKA,SAAS,wBAAwB;AAE1B,MAAM,kBAAkB,OAAO,aAA0B,WAAyB;AACxF,QAAM,OAAO,YAAY,QAAQ;AAEjC,QAAM,eAAe,KAAK,QAAQ,SAAS,IAAI,CAAC,WAAW,OAAO,QAAQ,KAAK,CAAC;AAChF,QAAM,iBAAiB,KAAK,OAC1B,IAAI,CAAC,UAAU;AACf,WAAO,MAAM,UAAU,YAAY,MAAM,OAAO,UAAU,qBACvD,MAAM,OAAO,iBAAiB,WAC9B;AAAA,EACJ,CAAC,EACA,OAAO,CAAC,aAAiC,CAAC,CAAC,QAAQ;AAErD,QAAM,UAAU,MAAM,OAAO,gBAAgB;AAAA,IAC5C,KAAK,CAAC,GAAG,cAAc,GAAG,cAAc;AAAA,IACxC,SAAS;AAAA,MACR,SAAS;AAAA,MACT,yBAAyB;AAAA,MACzB,mBAAmB;AAAA,MACnB,WAAW;AAAA,IACZ;AAAA,EACD,CAAC;AAKD,QAAM,aAAa,QACjB,IAAI,CAAC,WAAW;AAChB,QAAI,OAAO,SAAS,CAAC,OAAO,QAAQ,OAAO,KAAK,KAAK,aAAa,cAAc;AAC/E,aAAO;AAAA,IACR;AAEA,WAAO,iBAAiB,UAAU;AAAA,MACjC,MAAM;AAAA,QACL,YAAY;AAAA,UACX,MAAM,OAAO,KAAK,IAAI;AAAA,UACtB,mBAAmB,OAAO,KAAK,IAAI;AAAA,UACnC,SAAS,OAAO,KAAK,IAAI;AAAA,UACzB,UAAU,OAAO,KAAK,IAAI;AAAA,QAC3B;AAAA,MACD;AAAA,MACA,OAAO,OAAO,KAAK;AAAA,MACnB,qBAAqB,OAAO,KAAK;AAAA,MACjC,eAAe,OAAO,KAAK;AAAA,IAC5B,CAAC,EAAE,QAAQ;AAAA,EACZ,CAAC,EACA,OAAO,CAAC,aAAkD,CAAC,CAAC,QAAQ;AAEtE,SAAO,EAAE,WAAW;AACrB;",
6
+ "names": []
7
+ }
@@ -0,0 +1,5 @@
1
+ {
2
+ "private": true,
3
+ "type": "module",
4
+ "sideEffects": false
5
+ }
@@ -0,0 +1,18 @@
1
+ /** The total number of bits in the DER bit string for the uncompressed public key. */
2
+ export declare const DER_BIT_STRING_LENGTH = 520;
3
+ /** The total number of bytes corresponding to the DER bit string length. */
4
+ export declare const DER_BYTES_LENGTH: number;
5
+ export declare function publicKeyFromDER(derBytes: Uint8Array): Uint8Array<ArrayBufferLike>;
6
+ export declare function getConcatenatedSignature(signature: Uint8Array, keyScheme: string): Uint8Array<ArrayBuffer>;
7
+ /**
8
+ * Compresses an uncompressed public key into its compressed form.
9
+ *
10
+ * The uncompressed key must follow the DER bit string format as specified in [RFC 5480](https://datatracker.ietf.org/doc/html/rfc5480#section-2.2)
11
+ * and [SEC 1: Elliptic Curve Cryptography](https://www.secg.org/sec1-v2.pdf).
12
+ *
13
+ * @param uncompressedKey - A `Uint8ClampedArray` representing the uncompressed public key bits.
14
+ * @returns A `Uint8Array` containing the compressed public key.
15
+ *
16
+ * @throws {Error} If the uncompressed key has an unexpected length or does not start with the expected prefix.
17
+ */
18
+ export declare function compressPublicKeyClamped(uncompressedKey: Uint8ClampedArray): Uint8Array;
@@ -0,0 +1,65 @@
1
+ import { secp256r1 } from "@noble/curves/p256";
2
+ import { secp256k1 } from "@noble/curves/secp256k1";
3
+ import { ASN1Construction, ASN1TagClass, DERElement } from "asn1-ts";
4
+ const DER_BIT_STRING_LENGTH = 520;
5
+ const DER_BYTES_LENGTH = DER_BIT_STRING_LENGTH / 8;
6
+ function bitsToBytes(bitsArray) {
7
+ const bytes = new Uint8Array(DER_BYTES_LENGTH);
8
+ for (let i = 0; i < DER_BIT_STRING_LENGTH; i++) {
9
+ if (bitsArray[i] === 1) {
10
+ bytes[Math.floor(i / 8)] |= 1 << 7 - i % 8;
11
+ }
12
+ }
13
+ return bytes;
14
+ }
15
+ function publicKeyFromDER(derBytes) {
16
+ const encodedData = derBytes;
17
+ const derElement = new DERElement();
18
+ derElement.fromBytes(encodedData);
19
+ if (!(derElement.tagClass === ASN1TagClass.universal && derElement.construction === ASN1Construction.constructed)) {
20
+ throw new Error("Unexpected ASN.1 structure");
21
+ }
22
+ const components = derElement.components;
23
+ const publicKeyElement = components[1];
24
+ if (!publicKeyElement) {
25
+ throw new Error("Public Key not found in the DER structure");
26
+ }
27
+ return compressPublicKeyClamped(publicKeyElement.bitString);
28
+ }
29
+ function getConcatenatedSignature(signature, keyScheme) {
30
+ if (!signature || signature.length === 0) {
31
+ throw new Error("Invalid signature");
32
+ }
33
+ const derElement = new DERElement();
34
+ derElement.fromBytes(signature);
35
+ const [r, s] = derElement.toJSON();
36
+ switch (keyScheme) {
37
+ case "Secp256k1":
38
+ return new secp256k1.Signature(BigInt(r), BigInt(s)).normalizeS().toCompactRawBytes();
39
+ case "Secp256r1":
40
+ return new secp256r1.Signature(BigInt(r), BigInt(s)).normalizeS().toCompactRawBytes();
41
+ default:
42
+ throw new Error("Unsupported key scheme");
43
+ }
44
+ }
45
+ function compressPublicKeyClamped(uncompressedKey) {
46
+ if (uncompressedKey.length !== DER_BIT_STRING_LENGTH) {
47
+ throw new Error("Unexpected length for an uncompressed public key");
48
+ }
49
+ const uncompressedBytes = bitsToBytes(uncompressedKey);
50
+ if (uncompressedBytes[0] !== 4) {
51
+ throw new Error("Public key does not start with 0x04");
52
+ }
53
+ const xCoord = uncompressedBytes.slice(1, 33);
54
+ const yCoordLastByte = uncompressedBytes[64];
55
+ const parityByte = yCoordLastByte % 2 === 0 ? 2 : 3;
56
+ return new Uint8Array([parityByte, ...xCoord]);
57
+ }
58
+ export {
59
+ DER_BIT_STRING_LENGTH,
60
+ DER_BYTES_LENGTH,
61
+ compressPublicKeyClamped,
62
+ getConcatenatedSignature,
63
+ publicKeyFromDER
64
+ };
65
+ //# sourceMappingURL=utils.js.map