@powerhousedao/connect 1.0.24-dev.0 → 1.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/.env +1 -1
- package/dist/assets/{app-B5yYl0zv.js → app-CZSKsD-w.js} +11239 -12745
- package/dist/assets/{app-DWlDE8AF.css → app-W_mH4m8_.css} +182 -241
- package/dist/assets/{app-loader-NDVZu4bS.css → app-loader-4GyeoNTc.css} +229 -239
- package/dist/assets/{app-loader-CmEZOj3m.js → app-loader-CyUyHxMC.js} +436 -745
- package/dist/assets/{ccip-KtRjx9vh.js → ccip-BPO0EeBI.js} +8 -6
- package/dist/assets/{content-2lJzkjLx.js → content-fzZoyU8t.js} +466 -1103
- package/dist/assets/{index-BVVRVlZN.js → index-C3PlmBGF.js} +3 -4
- package/dist/assets/{index-dSMCpjcQ.js → index-DFiZ2Eug.js} +171 -23
- package/dist/assets/{index-BhHOiwFw.js → index-D_CfC9G5.js} +3702 -3517
- package/dist/assets/{main.DA6nl4Ov.js → main.8RNzWcZO.js} +12 -3
- package/dist/assets/{style-CdxGKc2g.css → style-U7Kx3_hE.css} +95 -39
- package/dist/external-packages.js +0 -1
- package/dist/hmr.js +0 -1
- package/dist/index.html +1 -1
- package/dist/service-worker.js +0 -1
- package/dist/vite-envs.sh +1 -1
- package/package.json +20 -21
- package/dist/assets/app-B5yYl0zv.js.map +0 -1
- package/dist/assets/app-loader-CmEZOj3m.js.map +0 -1
- package/dist/assets/browser-D5LEpLBa.js +0 -27224
- package/dist/assets/browser-D5LEpLBa.js.map +0 -1
- package/dist/assets/ccip-KtRjx9vh.js.map +0 -1
- package/dist/assets/content-2lJzkjLx.js.map +0 -1
- package/dist/assets/index-BVVRVlZN.js.map +0 -1
- package/dist/assets/index-BhHOiwFw.js.map +0 -1
- package/dist/assets/index-DZiF5od7.js +0 -208
- package/dist/assets/index-DZiF5od7.js.map +0 -1
- package/dist/assets/index-dSMCpjcQ.js.map +0 -1
- package/dist/assets/main.DA6nl4Ov.js.map +0 -1
- package/dist/assets/reactor-analytics-CF_JKt8H.js +0 -42
- package/dist/assets/reactor-analytics-CF_JKt8H.js.map +0 -1
- package/dist/assets/router-Ch1WZD-6.js +0 -1585
- package/dist/assets/router-Ch1WZD-6.js.map +0 -1
- package/dist/external-packages.js.map +0 -1
- package/dist/hmr.js.map +0 -1
- package/dist/service-worker.js.map +0 -1
|
@@ -1,8 +1,8 @@
|
|
|
1
|
-
const __vite__mapDeps=(i,m=__vite__mapDeps,d=(m.f||(m.f=["assets/app-loader-
|
|
2
|
-
import { _ as __vitePreload } from "./main.
|
|
1
|
+
const __vite__mapDeps=(i,m=__vite__mapDeps,d=(m.f||(m.f=["assets/app-loader-CyUyHxMC.js","assets/main.8RNzWcZO.js","assets/app-loader-4GyeoNTc.css"])))=>i.map(i=>d[i]);
|
|
2
|
+
import { _ as __vitePreload } from "./main.8RNzWcZO.js";
|
|
3
3
|
import { createRoot } from "react-dom/client";
|
|
4
4
|
async function renderApp(element) {
|
|
5
|
-
const AppLoader = await __vitePreload(() => import("./app-loader-
|
|
5
|
+
const AppLoader = await __vitePreload(() => import("./app-loader-CyUyHxMC.js").then((n) => n.ca), true ? __vite__mapDeps([0,1,2]) : void 0);
|
|
6
6
|
createRoot(element).render(AppLoader.default);
|
|
7
7
|
}
|
|
8
8
|
const AppElement = document.getElementById("app");
|
|
@@ -10,4 +10,3 @@ if (!AppElement) {
|
|
|
10
10
|
throw new Error("#app element not found!");
|
|
11
11
|
}
|
|
12
12
|
renderApp(AppElement).catch(console.error);
|
|
13
|
-
//# sourceMappingURL=index-BVVRVlZN.js.map
|
|
@@ -1,16 +1,19 @@
|
|
|
1
|
+
var __defProp = Object.defineProperty;
|
|
1
2
|
var __typeError = (msg) => {
|
|
2
3
|
throw TypeError(msg);
|
|
3
4
|
};
|
|
5
|
+
var __defNormalProp = (obj, key, value) => key in obj ? __defProp(obj, key, { enumerable: true, configurable: true, writable: true, value }) : obj[key] = value;
|
|
6
|
+
var __publicField = (obj, key, value) => __defNormalProp(obj, typeof key !== "symbol" ? key + "" : key, value);
|
|
4
7
|
var __accessCheck = (obj, member, msg) => member.has(obj) || __typeError("Cannot " + msg);
|
|
5
8
|
var __privateGet = (obj, member, getter) => (__accessCheck(obj, member, "read from private field"), getter ? getter.call(obj) : member.get(obj));
|
|
6
9
|
var __privateAdd = (obj, member, value) => member.has(obj) ? __typeError("Cannot add the same private member more than once") : member instanceof WeakSet ? member.add(obj) : member.set(obj, value);
|
|
7
10
|
var __privateSet = (obj, member, value, setter) => (__accessCheck(obj, member, "write to private field"), setter ? setter.call(obj, value) : member.set(obj, value), value);
|
|
8
11
|
var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "access private method"), method);
|
|
9
|
-
var _DB_NAME, _STORE_NAME, _KEY, _db, _BrowserKeyStorage_instances, useStore_fn, _store, _namespace, _BaseStorage_instances, buildKey_fn, _baseUrl, _store2, _connectId, _eventEmitter, _Renown_instances, updateUser_fn, getCredential_fn;
|
|
10
|
-
import {
|
|
11
|
-
import {
|
|
12
|
-
import {
|
|
13
|
-
import "./
|
|
12
|
+
var _DB_NAME, _STORE_NAME, _KEY, _db, _BrowserKeyStorage_instances, useStore_fn, _subtleCrypto, _keyPair, _keyPairStorage, _did, _ConnectCrypto_instances, initCrypto_fn, initialize_fn, parseDid_fn, generateECDSAKeyPair_fn, exportKeyPair_fn, importKeyPair_fn, _sign, _verify, _store, _namespace, _BaseStorage_instances, buildKey_fn, _baseUrl, _store2, _connectId, _eventEmitter, _Renown_instances, updateUser_fn, getCredential_fn;
|
|
13
|
+
import { _ as __vitePreload } from "./main.8RNzWcZO.js";
|
|
14
|
+
import { r as rawKeyInHexfromUncompressed, c as compressedKeyInHexfromRaw, e as encodeDIDfromHexString, a as eventsExports, R as RENOWN_URL, g as getEnsInfo } from "./app-CZSKsD-w.js";
|
|
15
|
+
import { i, h, d, j, b, f, s } from "./app-CZSKsD-w.js";
|
|
16
|
+
import { ah as connectConfig, ac as logger } from "./app-loader-CyUyHxMC.js";
|
|
14
17
|
import "react/jsx-runtime";
|
|
15
18
|
import "react";
|
|
16
19
|
import "react-dom";
|
|
@@ -71,6 +74,157 @@ __privateAdd(_BrowserKeyStorage, _DB_NAME, "browserKeyDB");
|
|
|
71
74
|
__privateAdd(_BrowserKeyStorage, _STORE_NAME, "keyPairs");
|
|
72
75
|
__privateAdd(_BrowserKeyStorage, _KEY, "keyPair");
|
|
73
76
|
let BrowserKeyStorage = _BrowserKeyStorage;
|
|
77
|
+
function ab2hex(ab) {
|
|
78
|
+
return Array.prototype.map.call(
|
|
79
|
+
new Uint8Array(ab),
|
|
80
|
+
(x) => ("00" + x.toString(16)).slice(-2)
|
|
81
|
+
).join("");
|
|
82
|
+
}
|
|
83
|
+
const _ConnectCrypto = class _ConnectCrypto {
|
|
84
|
+
constructor(keyPairStorage) {
|
|
85
|
+
__privateAdd(this, _ConnectCrypto_instances);
|
|
86
|
+
__privateAdd(this, _subtleCrypto);
|
|
87
|
+
__privateAdd(this, _keyPair);
|
|
88
|
+
__privateAdd(this, _keyPairStorage);
|
|
89
|
+
__privateAdd(this, _did);
|
|
90
|
+
__privateAdd(this, _sign, async (...args) => {
|
|
91
|
+
return (await __privateGet(this, _subtleCrypto)).sign(...args);
|
|
92
|
+
});
|
|
93
|
+
__privateAdd(this, _verify, async (...args) => {
|
|
94
|
+
return (await __privateGet(this, _subtleCrypto)).verify(...args);
|
|
95
|
+
});
|
|
96
|
+
__privateSet(this, _keyPairStorage, keyPairStorage);
|
|
97
|
+
__privateSet(this, _subtleCrypto, __privateMethod(this, _ConnectCrypto_instances, initCrypto_fn).call(this));
|
|
98
|
+
__privateSet(this, _did, __privateMethod(this, _ConnectCrypto_instances, initialize_fn).call(this));
|
|
99
|
+
}
|
|
100
|
+
did() {
|
|
101
|
+
return __privateGet(this, _did);
|
|
102
|
+
}
|
|
103
|
+
async regenerateDid() {
|
|
104
|
+
__privateSet(this, _keyPair, await __privateMethod(this, _ConnectCrypto_instances, generateECDSAKeyPair_fn).call(this));
|
|
105
|
+
await __privateGet(this, _keyPairStorage).saveKeyPair(await __privateMethod(this, _ConnectCrypto_instances, exportKeyPair_fn).call(this));
|
|
106
|
+
}
|
|
107
|
+
async sign(data) {
|
|
108
|
+
var _a;
|
|
109
|
+
if ((_a = __privateGet(this, _keyPair)) == null ? void 0 : _a.privateKey) {
|
|
110
|
+
const subtleCrypto = await __privateGet(this, _subtleCrypto);
|
|
111
|
+
const arrayBuffer = await subtleCrypto.sign(
|
|
112
|
+
_ConnectCrypto.signAlgorithm,
|
|
113
|
+
__privateGet(this, _keyPair).privateKey,
|
|
114
|
+
data.buffer
|
|
115
|
+
);
|
|
116
|
+
return new Uint8Array(arrayBuffer);
|
|
117
|
+
} else {
|
|
118
|
+
throw new Error("No private key available");
|
|
119
|
+
}
|
|
120
|
+
}
|
|
121
|
+
};
|
|
122
|
+
_subtleCrypto = new WeakMap();
|
|
123
|
+
_keyPair = new WeakMap();
|
|
124
|
+
_keyPairStorage = new WeakMap();
|
|
125
|
+
_did = new WeakMap();
|
|
126
|
+
_ConnectCrypto_instances = new WeakSet();
|
|
127
|
+
initCrypto_fn = function() {
|
|
128
|
+
return new Promise((resolve, reject) => {
|
|
129
|
+
var _a;
|
|
130
|
+
if (typeof window === "undefined") {
|
|
131
|
+
__vitePreload(() => import("node:crypto"), true ? [] : void 0).then((module) => {
|
|
132
|
+
resolve(module.webcrypto.subtle);
|
|
133
|
+
}).catch(reject);
|
|
134
|
+
} else {
|
|
135
|
+
if (!((_a = window.crypto) == null ? void 0 : _a.subtle)) {
|
|
136
|
+
reject(new Error("Crypto module not available"));
|
|
137
|
+
}
|
|
138
|
+
resolve(window.crypto.subtle);
|
|
139
|
+
}
|
|
140
|
+
});
|
|
141
|
+
};
|
|
142
|
+
initialize_fn = async function() {
|
|
143
|
+
const loadedKeyPair = await __privateGet(this, _keyPairStorage).loadKeyPair();
|
|
144
|
+
if (loadedKeyPair) {
|
|
145
|
+
__privateSet(this, _keyPair, await __privateMethod(this, _ConnectCrypto_instances, importKeyPair_fn).call(this, loadedKeyPair));
|
|
146
|
+
console.log("Found key pair");
|
|
147
|
+
} else {
|
|
148
|
+
__privateSet(this, _keyPair, await __privateMethod(this, _ConnectCrypto_instances, generateECDSAKeyPair_fn).call(this));
|
|
149
|
+
console.log("Created key pair");
|
|
150
|
+
await __privateGet(this, _keyPairStorage).saveKeyPair(await __privateMethod(this, _ConnectCrypto_instances, exportKeyPair_fn).call(this));
|
|
151
|
+
}
|
|
152
|
+
const did = await __privateMethod(this, _ConnectCrypto_instances, parseDid_fn).call(this);
|
|
153
|
+
console.log("Connect DID:", did);
|
|
154
|
+
return did;
|
|
155
|
+
};
|
|
156
|
+
parseDid_fn = async function() {
|
|
157
|
+
if (!__privateGet(this, _keyPair)) {
|
|
158
|
+
throw new Error("No key pair available");
|
|
159
|
+
}
|
|
160
|
+
const subtleCrypto = await __privateGet(this, _subtleCrypto);
|
|
161
|
+
const publicKeyRaw = await subtleCrypto.exportKey(
|
|
162
|
+
"raw",
|
|
163
|
+
__privateGet(this, _keyPair).publicKey
|
|
164
|
+
);
|
|
165
|
+
const multicodecName = "p256-pub";
|
|
166
|
+
const rawKey = rawKeyInHexfromUncompressed(ab2hex(publicKeyRaw));
|
|
167
|
+
const compressedKey = compressedKeyInHexfromRaw(rawKey);
|
|
168
|
+
const did = encodeDIDfromHexString(multicodecName, compressedKey);
|
|
169
|
+
return did;
|
|
170
|
+
};
|
|
171
|
+
generateECDSAKeyPair_fn = async function() {
|
|
172
|
+
const subtleCrypto = await __privateGet(this, _subtleCrypto);
|
|
173
|
+
const keyPair = await subtleCrypto.generateKey(
|
|
174
|
+
_ConnectCrypto.algorithm,
|
|
175
|
+
true,
|
|
176
|
+
["sign", "verify"]
|
|
177
|
+
);
|
|
178
|
+
return keyPair;
|
|
179
|
+
};
|
|
180
|
+
exportKeyPair_fn = async function() {
|
|
181
|
+
if (!__privateGet(this, _keyPair)) {
|
|
182
|
+
throw new Error("No key pair available");
|
|
183
|
+
}
|
|
184
|
+
const subtleCrypto = await __privateGet(this, _subtleCrypto);
|
|
185
|
+
const jwkKeyPair = {
|
|
186
|
+
publicKey: await subtleCrypto.exportKey(
|
|
187
|
+
"jwk",
|
|
188
|
+
__privateGet(this, _keyPair).publicKey
|
|
189
|
+
),
|
|
190
|
+
privateKey: await subtleCrypto.exportKey(
|
|
191
|
+
"jwk",
|
|
192
|
+
__privateGet(this, _keyPair).privateKey
|
|
193
|
+
)
|
|
194
|
+
};
|
|
195
|
+
return jwkKeyPair;
|
|
196
|
+
};
|
|
197
|
+
importKeyPair_fn = async function(jwkKeyPair) {
|
|
198
|
+
const subtleCrypto = await __privateGet(this, _subtleCrypto);
|
|
199
|
+
return {
|
|
200
|
+
publicKey: await subtleCrypto.importKey(
|
|
201
|
+
"jwk",
|
|
202
|
+
jwkKeyPair.publicKey,
|
|
203
|
+
_ConnectCrypto.algorithm,
|
|
204
|
+
true,
|
|
205
|
+
["verify"]
|
|
206
|
+
),
|
|
207
|
+
privateKey: await subtleCrypto.importKey(
|
|
208
|
+
"jwk",
|
|
209
|
+
jwkKeyPair.privateKey,
|
|
210
|
+
_ConnectCrypto.algorithm,
|
|
211
|
+
true,
|
|
212
|
+
["sign"]
|
|
213
|
+
)
|
|
214
|
+
};
|
|
215
|
+
};
|
|
216
|
+
_sign = new WeakMap();
|
|
217
|
+
_verify = new WeakMap();
|
|
218
|
+
__publicField(_ConnectCrypto, "algorithm", {
|
|
219
|
+
name: "ECDSA",
|
|
220
|
+
namedCurve: "P-256"
|
|
221
|
+
});
|
|
222
|
+
__publicField(_ConnectCrypto, "signAlgorithm", {
|
|
223
|
+
name: "ECDSA",
|
|
224
|
+
namedCurve: "P-256",
|
|
225
|
+
hash: "SHA-256"
|
|
226
|
+
});
|
|
227
|
+
let ConnectCrypto = _ConnectCrypto;
|
|
74
228
|
function parsePkhDid(did) {
|
|
75
229
|
const parts = did.split(":");
|
|
76
230
|
if (!did.startsWith("did:pkh:") || parts.length !== 5) {
|
|
@@ -146,7 +300,7 @@ class Renown {
|
|
|
146
300
|
__privateAdd(this, _baseUrl);
|
|
147
301
|
__privateAdd(this, _store2);
|
|
148
302
|
__privateAdd(this, _connectId);
|
|
149
|
-
__privateAdd(this, _eventEmitter, new
|
|
303
|
+
__privateAdd(this, _eventEmitter, new eventsExports.EventEmitter());
|
|
150
304
|
__privateSet(this, _store2, store2);
|
|
151
305
|
__privateSet(this, _connectId, connectId);
|
|
152
306
|
__privateSet(this, _baseUrl, baseUrl);
|
|
@@ -198,12 +352,9 @@ class Renown {
|
|
|
198
352
|
__privateMethod(this, _Renown_instances, updateUser_fn).call(this, void 0);
|
|
199
353
|
}
|
|
200
354
|
on(event, listener) {
|
|
201
|
-
|
|
202
|
-
listener(e.detail);
|
|
203
|
-
};
|
|
204
|
-
__privateGet(this, _eventEmitter).addEventListener(event, eventListener);
|
|
355
|
+
__privateGet(this, _eventEmitter).on(event, listener);
|
|
205
356
|
return () => {
|
|
206
|
-
__privateGet(this, _eventEmitter).
|
|
357
|
+
__privateGet(this, _eventEmitter).removeListener(event, listener);
|
|
207
358
|
};
|
|
208
359
|
}
|
|
209
360
|
}
|
|
@@ -214,9 +365,7 @@ _eventEmitter = new WeakMap();
|
|
|
214
365
|
_Renown_instances = new WeakSet();
|
|
215
366
|
updateUser_fn = function(user) {
|
|
216
367
|
user ? __privateGet(this, _store2).set("user", user) : __privateGet(this, _store2).delete("user");
|
|
217
|
-
__privateGet(this, _eventEmitter).
|
|
218
|
-
new CustomEvent("user", { detail: user })
|
|
219
|
-
);
|
|
368
|
+
__privateGet(this, _eventEmitter).emit("user", user);
|
|
220
369
|
};
|
|
221
370
|
getCredential_fn = async function(address, chainId, connectId) {
|
|
222
371
|
if (!__privateGet(this, _baseUrl)) {
|
|
@@ -239,18 +388,17 @@ getCredential_fn = async function(address, chainId, connectId) {
|
|
|
239
388
|
export {
|
|
240
389
|
BaseStorage,
|
|
241
390
|
BrowserKeyStorage,
|
|
242
|
-
|
|
243
|
-
|
|
244
|
-
|
|
391
|
+
ConnectCrypto,
|
|
392
|
+
i as RENOWN_CHAIN_ID,
|
|
393
|
+
h as RENOWN_NETWORK_ID,
|
|
245
394
|
RENOWN_URL,
|
|
246
395
|
Renown,
|
|
247
|
-
|
|
248
|
-
|
|
396
|
+
d as addExternalPackage,
|
|
397
|
+
j as getChain,
|
|
249
398
|
getEnsInfo,
|
|
250
|
-
|
|
399
|
+
b as getHMRModule,
|
|
251
400
|
initRenownBrowser,
|
|
252
401
|
parsePkhDid,
|
|
253
|
-
|
|
254
|
-
|
|
402
|
+
f as removeExternalPackage,
|
|
403
|
+
s as subscribeExternalPackages
|
|
255
404
|
};
|
|
256
|
-
//# sourceMappingURL=index-dSMCpjcQ.js.map
|