@renown/sdk 6.0.0-dev.16 → 6.0.0-dev.160

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (197) hide show
  1. package/README.md +47 -437
  2. package/dist/index.d.ts +67 -0
  3. package/dist/index.d.ts.map +1 -0
  4. package/dist/index.js +173 -0
  5. package/dist/index.js.map +1 -0
  6. package/dist/node.d.ts +67 -0
  7. package/dist/node.d.ts.map +1 -0
  8. package/dist/node.js +151 -0
  9. package/dist/node.js.map +1 -0
  10. package/dist/renown-builder-C5Y9S3o2.js +825 -0
  11. package/dist/renown-builder-C5Y9S3o2.js.map +1 -0
  12. package/dist/utils-CFyCudfg.d.ts +549 -0
  13. package/dist/utils-CFyCudfg.d.ts.map +1 -0
  14. package/package.json +16 -37
  15. package/dist/e2e/fixtures/main.d.ts +0 -2
  16. package/dist/e2e/fixtures/main.d.ts.map +0 -1
  17. package/dist/e2e/fixtures/main.js +0 -97
  18. package/dist/e2e/fixtures/main.js.map +0 -1
  19. package/dist/e2e/fixtures/vite.config.d.ts +0 -3
  20. package/dist/e2e/fixtures/vite.config.d.ts.map +0 -1
  21. package/dist/e2e/fixtures/vite.config.js +0 -10
  22. package/dist/e2e/fixtures/vite.config.js.map +0 -1
  23. package/dist/e2e/renown-components.spec.d.ts +0 -2
  24. package/dist/e2e/renown-components.spec.d.ts.map +0 -1
  25. package/dist/e2e/renown-components.spec.js +0 -155
  26. package/dist/e2e/renown-components.spec.js.map +0 -1
  27. package/dist/playwright.config.d.ts +0 -3
  28. package/dist/playwright.config.d.ts.map +0 -1
  29. package/dist/playwright.config.js +0 -25
  30. package/dist/playwright.config.js.map +0 -1
  31. package/dist/src/assets/assets.d.ts +0 -19
  32. package/dist/src/assets/renown-hover.svg +0 -17
  33. package/dist/src/assets/renown-light.svg +0 -15
  34. package/dist/src/assets/renown-short-hover.png +0 -0
  35. package/dist/src/assets/renown-short.png +0 -0
  36. package/dist/src/assets/renown.svg +0 -16
  37. package/dist/src/common.d.ts +0 -15
  38. package/dist/src/common.d.ts.map +0 -1
  39. package/dist/src/common.js +0 -105
  40. package/dist/src/common.js.map +0 -1
  41. package/dist/src/components/RenownAuthButton.d.ts +0 -62
  42. package/dist/src/components/RenownAuthButton.d.ts.map +0 -1
  43. package/dist/src/components/RenownAuthButton.js +0 -82
  44. package/dist/src/components/RenownAuthButton.js.map +0 -1
  45. package/dist/src/components/RenownLoginButton.d.ts +0 -48
  46. package/dist/src/components/RenownLoginButton.d.ts.map +0 -1
  47. package/dist/src/components/RenownLoginButton.js +0 -175
  48. package/dist/src/components/RenownLoginButton.js.map +0 -1
  49. package/dist/src/components/RenownUserButton.d.ts +0 -66
  50. package/dist/src/components/RenownUserButton.d.ts.map +0 -1
  51. package/dist/src/components/RenownUserButton.js +0 -216
  52. package/dist/src/components/RenownUserButton.js.map +0 -1
  53. package/dist/src/components/icons.d.ts +0 -25
  54. package/dist/src/components/icons.d.ts.map +0 -1
  55. package/dist/src/components/icons.js +0 -24
  56. package/dist/src/components/icons.js.map +0 -1
  57. package/dist/src/components/image-data.d.ts +0 -3
  58. package/dist/src/components/image-data.d.ts.map +0 -1
  59. package/dist/src/components/image-data.js +0 -4
  60. package/dist/src/components/image-data.js.map +0 -1
  61. package/dist/src/components/index.d.ts +0 -8
  62. package/dist/src/components/index.d.ts.map +0 -1
  63. package/dist/src/components/index.js +0 -5
  64. package/dist/src/components/index.js.map +0 -1
  65. package/dist/src/constants.d.ts +0 -130
  66. package/dist/src/constants.d.ts.map +0 -1
  67. package/dist/src/constants.js +0 -40
  68. package/dist/src/constants.js.map +0 -1
  69. package/dist/src/crypto/browser-key-storage.d.ts +0 -8
  70. package/dist/src/crypto/browser-key-storage.d.ts.map +0 -1
  71. package/dist/src/crypto/browser-key-storage.js +0 -73
  72. package/dist/src/crypto/browser-key-storage.js.map +0 -1
  73. package/dist/src/crypto/index.d.ts +0 -36
  74. package/dist/src/crypto/index.d.ts.map +0 -1
  75. package/dist/src/crypto/index.js +0 -130
  76. package/dist/src/crypto/index.js.map +0 -1
  77. package/dist/src/crypto/node-key-storage.d.ts +0 -8
  78. package/dist/src/crypto/node-key-storage.d.ts.map +0 -1
  79. package/dist/src/crypto/node-key-storage.js +0 -67
  80. package/dist/src/crypto/node-key-storage.js.map +0 -1
  81. package/dist/src/crypto/node.d.ts +0 -2
  82. package/dist/src/crypto/node.d.ts.map +0 -1
  83. package/dist/src/crypto/node.js +0 -3
  84. package/dist/src/crypto/node.js.map +0 -1
  85. package/dist/src/crypto/signer.d.ts +0 -21
  86. package/dist/src/crypto/signer.d.ts.map +0 -1
  87. package/dist/src/crypto/signer.js +0 -236
  88. package/dist/src/crypto/signer.js.map +0 -1
  89. package/dist/src/event/event.browser.d.ts +0 -10
  90. package/dist/src/event/event.browser.d.ts.map +0 -1
  91. package/dist/src/event/event.browser.js +0 -24
  92. package/dist/src/event/event.browser.js.map +0 -1
  93. package/dist/src/event/event.node.d.ts +0 -8
  94. package/dist/src/event/event.node.d.ts.map +0 -1
  95. package/dist/src/event/event.node.js +0 -17
  96. package/dist/src/event/event.node.js.map +0 -1
  97. package/dist/src/event/types.d.ts +0 -16
  98. package/dist/src/event/types.d.ts.map +0 -1
  99. package/dist/src/event/types.js +0 -2
  100. package/dist/src/event/types.js.map +0 -1
  101. package/dist/src/hooks/index.d.ts +0 -2
  102. package/dist/src/hooks/index.d.ts.map +0 -1
  103. package/dist/src/hooks/index.js +0 -2
  104. package/dist/src/hooks/index.js.map +0 -1
  105. package/dist/src/hooks/use-user.d.ts +0 -21
  106. package/dist/src/hooks/use-user.d.ts.map +0 -1
  107. package/dist/src/hooks/use-user.js +0 -30
  108. package/dist/src/hooks/use-user.js.map +0 -1
  109. package/dist/src/index.browser.d.ts +0 -4
  110. package/dist/src/index.browser.d.ts.map +0 -1
  111. package/dist/src/index.browser.js +0 -4
  112. package/dist/src/index.browser.js.map +0 -1
  113. package/dist/src/index.d.ts +0 -13
  114. package/dist/src/index.d.ts.map +0 -1
  115. package/dist/src/index.js +0 -13
  116. package/dist/src/index.js.map +0 -1
  117. package/dist/src/index.node.d.ts +0 -4
  118. package/dist/src/index.node.d.ts.map +0 -1
  119. package/dist/src/index.node.js +0 -4
  120. package/dist/src/index.node.js.map +0 -1
  121. package/dist/src/init.browser.d.ts +0 -3
  122. package/dist/src/init.browser.d.ts.map +0 -1
  123. package/dist/src/init.browser.js +0 -7
  124. package/dist/src/init.browser.js.map +0 -1
  125. package/dist/src/init.node.d.ts +0 -3
  126. package/dist/src/init.node.d.ts.map +0 -1
  127. package/dist/src/init.node.js +0 -8
  128. package/dist/src/init.node.js.map +0 -1
  129. package/dist/src/lib/crypto/browser.d.ts +0 -8
  130. package/dist/src/lib/crypto/browser.d.ts.map +0 -1
  131. package/dist/src/lib/crypto/browser.js +0 -73
  132. package/dist/src/lib/crypto/browser.js.map +0 -1
  133. package/dist/src/lib/crypto/index.d.ts +0 -36
  134. package/dist/src/lib/crypto/index.d.ts.map +0 -1
  135. package/dist/src/lib/crypto/index.js +0 -150
  136. package/dist/src/lib/crypto/index.js.map +0 -1
  137. package/dist/src/lib/crypto/node.d.ts +0 -8
  138. package/dist/src/lib/crypto/node.d.ts.map +0 -1
  139. package/dist/src/lib/crypto/node.js +0 -67
  140. package/dist/src/lib/crypto/node.js.map +0 -1
  141. package/dist/src/lib/renown/constants.d.ts +0 -130
  142. package/dist/src/lib/renown/constants.d.ts.map +0 -1
  143. package/dist/src/lib/renown/constants.js +0 -40
  144. package/dist/src/lib/renown/constants.js.map +0 -1
  145. package/dist/src/lib/renown/did-parser.d.ts +0 -28
  146. package/dist/src/lib/renown/did-parser.d.ts.map +0 -1
  147. package/dist/src/lib/renown/did-parser.js +0 -57
  148. package/dist/src/lib/renown/did-parser.js.map +0 -1
  149. package/dist/src/lib/renown/index.d.ts +0 -4
  150. package/dist/src/lib/renown/index.d.ts.map +0 -1
  151. package/dist/src/lib/renown/index.js +0 -4
  152. package/dist/src/lib/renown/index.js.map +0 -1
  153. package/dist/src/lib/renown/utils.d.ts +0 -33
  154. package/dist/src/lib/renown/utils.d.ts.map +0 -1
  155. package/dist/src/lib/renown/utils.js +0 -207
  156. package/dist/src/lib/renown/utils.js.map +0 -1
  157. package/dist/src/lib/session-storage.d.ts +0 -40
  158. package/dist/src/lib/session-storage.d.ts.map +0 -1
  159. package/dist/src/lib/session-storage.js +0 -107
  160. package/dist/src/lib/session-storage.js.map +0 -1
  161. package/dist/src/node.d.ts +0 -6
  162. package/dist/src/node.d.ts.map +0 -1
  163. package/dist/src/node.js +0 -6
  164. package/dist/src/node.js.map +0 -1
  165. package/dist/src/providers/index.d.ts +0 -3
  166. package/dist/src/providers/index.d.ts.map +0 -1
  167. package/dist/src/providers/index.js +0 -2
  168. package/dist/src/providers/index.js.map +0 -1
  169. package/dist/src/providers/renown-user-provider.d.ts +0 -72
  170. package/dist/src/providers/renown-user-provider.d.ts.map +0 -1
  171. package/dist/src/providers/renown-user-provider.js +0 -171
  172. package/dist/src/providers/renown-user-provider.js.map +0 -1
  173. package/dist/src/storage/common.d.ts +0 -13
  174. package/dist/src/storage/common.d.ts.map +0 -1
  175. package/dist/src/storage/common.js +0 -7
  176. package/dist/src/storage/common.js.map +0 -1
  177. package/dist/src/storage/storage.browser.d.ts +0 -9
  178. package/dist/src/storage/storage.browser.d.ts.map +0 -1
  179. package/dist/src/storage/storage.browser.js +0 -25
  180. package/dist/src/storage/storage.browser.js.map +0 -1
  181. package/dist/src/storage/storage.node.d.ts +0 -11
  182. package/dist/src/storage/storage.node.d.ts.map +0 -1
  183. package/dist/src/storage/storage.node.js +0 -40
  184. package/dist/src/storage/storage.node.js.map +0 -1
  185. package/dist/src/types.d.ts +0 -80
  186. package/dist/src/types.d.ts.map +0 -1
  187. package/dist/src/types.js +0 -2
  188. package/dist/src/types.js.map +0 -1
  189. package/dist/src/utils.d.ts +0 -17
  190. package/dist/src/utils.d.ts.map +0 -1
  191. package/dist/src/utils.js +0 -80
  192. package/dist/src/utils.js.map +0 -1
  193. package/dist/tests/auth.test.d.ts +0 -2
  194. package/dist/tests/auth.test.d.ts.map +0 -1
  195. package/dist/tests/auth.test.js +0 -13
  196. package/dist/tests/auth.test.js.map +0 -1
  197. package/dist/tsconfig.tsbuildinfo +0 -1
@@ -0,0 +1,825 @@
1
+ import { EdDSASigner, bytesToBase64url } from "did-jwt";
2
+ import { fromString } from "uint8arrays";
3
+ import { getAuthenticatedDID } from "@didtools/key-did";
4
+ import { createVerifiableCredentialJwt, verifyCredential } from "did-jwt-vc";
5
+ import { Resolver } from "did-resolver";
6
+ import { getResolver } from "key-did-resolver";
7
+ import { compressedKeyInHexfromRaw, encodeDIDfromHexString, rawKeyInHexfromUncompressed } from "did-key-creator";
8
+ //#region src/constants.ts
9
+ const DEFAULT_RENOWN_URL = "https://www.renown.id";
10
+ const DEFAULT_RENOWN_NETWORK_ID = "eip155";
11
+ const DEFAULT_RENOWN_CHAIN_ID = "1";
12
+ const DOMAIN_TYPE = [
13
+ {
14
+ name: "name",
15
+ type: "string"
16
+ },
17
+ {
18
+ name: "version",
19
+ type: "string"
20
+ },
21
+ {
22
+ name: "chainId",
23
+ type: "uint256"
24
+ },
25
+ {
26
+ name: "verifyingContract",
27
+ type: "address"
28
+ }
29
+ ];
30
+ const VERIFIABLE_CREDENTIAL_EIP712_TYPE = [
31
+ {
32
+ name: "@context",
33
+ type: "string[]"
34
+ },
35
+ {
36
+ name: "type",
37
+ type: "string[]"
38
+ },
39
+ {
40
+ name: "id",
41
+ type: "string"
42
+ },
43
+ {
44
+ name: "issuer",
45
+ type: "Issuer"
46
+ },
47
+ {
48
+ name: "credentialSubject",
49
+ type: "CredentialSubject"
50
+ },
51
+ {
52
+ name: "credentialSchema",
53
+ type: "CredentialSchema"
54
+ },
55
+ {
56
+ name: "issuanceDate",
57
+ type: "string"
58
+ },
59
+ {
60
+ name: "expirationDate",
61
+ type: "string"
62
+ }
63
+ ];
64
+ const CREDENTIAL_SCHEMA_EIP712_TYPE = [{
65
+ name: "id",
66
+ type: "string"
67
+ }, {
68
+ name: "type",
69
+ type: "string"
70
+ }];
71
+ const CREDENTIAL_SUBJECT_TYPE = [
72
+ {
73
+ name: "app",
74
+ type: "string"
75
+ },
76
+ {
77
+ name: "id",
78
+ type: "string"
79
+ },
80
+ {
81
+ name: "name",
82
+ type: "string"
83
+ }
84
+ ];
85
+ const ISSUER_TYPE = [{
86
+ name: "id",
87
+ type: "string"
88
+ }, {
89
+ name: "ethereumAddress",
90
+ type: "string"
91
+ }];
92
+ const CREDENTIAL_TYPES = {
93
+ EIP712Domain: DOMAIN_TYPE,
94
+ VerifiableCredential: VERIFIABLE_CREDENTIAL_EIP712_TYPE,
95
+ CredentialSchema: CREDENTIAL_SCHEMA_EIP712_TYPE,
96
+ CredentialSubject: CREDENTIAL_SUBJECT_TYPE,
97
+ Issuer: ISSUER_TYPE
98
+ };
99
+ //#endregion
100
+ //#region src/utils.ts
101
+ /**
102
+ * Parse a DID:pkh string to extract network, chain ID, and address information
103
+ * @param did - The DID string in format "did:pkh:networkId:chainId:address"
104
+ * @returns Parsed DID information
105
+ * @throws Error if the DID format is invalid
106
+ */
107
+ function parsePkhDid(did) {
108
+ const parts = did.split(":");
109
+ if (!did.startsWith("did:pkh:") || parts.length !== 5) throw new Error("Invalid pkh did");
110
+ const [, , networkId, chainIdStr, address] = parts;
111
+ if (!address.startsWith("0x")) throw new Error(`Invalid address: ${address}`);
112
+ const chainId = Number(chainIdStr);
113
+ if (isNaN(chainId)) throw new Error(`Invalid chain id: ${chainIdStr}`);
114
+ return {
115
+ chainId,
116
+ networkId,
117
+ address
118
+ };
119
+ }
120
+ async function verifyAuthBearerToken(jwt) {
121
+ try {
122
+ const now = parseInt(String(Date.now() / 1e3));
123
+ const verified = await verifyCredential(jwt, getResolver$1(), { policies: {
124
+ now: parseInt(String(Date.now() / 1e3)),
125
+ expirationDate: true,
126
+ issuanceDate: true
127
+ } });
128
+ if (verified.payload.exp && verified.payload.exp < now) return false;
129
+ assertIsAuthCredential(verified);
130
+ return verified;
131
+ } catch (e) {
132
+ console.error(e);
133
+ return false;
134
+ }
135
+ }
136
+ function assertIsAuthCredential(credential) {
137
+ const subjectKeys = Object.keys(credential.verifiableCredential.credentialSubject);
138
+ if (![
139
+ "address",
140
+ "chainId",
141
+ "networkId"
142
+ ].every((key) => subjectKeys.includes(key))) throw new Error("Invalid Auth Credential Subject:" + JSON.stringify(credential.verifiableCredential.credentialSubject, null, 2));
143
+ }
144
+ async function createAuthBearerToken(chainId, networkId, address, issuer, options) {
145
+ return await createVerifiableCredentialJwt({
146
+ sub: issuer.did,
147
+ vc: {
148
+ "@context": ["https://www.w3.org/2018/credentials/v1"],
149
+ type: ["VerifiableCredential"],
150
+ credentialSubject: {
151
+ chainId,
152
+ networkId,
153
+ address
154
+ }
155
+ },
156
+ aud: options?.aud
157
+ }, issuer, { expiresIn: options?.expiresIn });
158
+ }
159
+ const getResolver$1 = () => {
160
+ const keyResolver = getResolver();
161
+ if (!keyResolver) throw new Error("Failed to get key resolver");
162
+ return new Resolver(keyResolver);
163
+ };
164
+ async function getIssuer(privateKey) {
165
+ const signer = EdDSASigner(privateKey);
166
+ return {
167
+ did: (await getAuthenticatedDID(privateKey)).id,
168
+ signer,
169
+ alg: "EdDSA"
170
+ };
171
+ }
172
+ //#endregion
173
+ //#region src/crypto/utils.ts
174
+ const ECDSA_ALGORITHM = {
175
+ name: "ECDSA",
176
+ namedCurve: "P-256"
177
+ };
178
+ const ECDSA_SIGN_ALGORITHM = {
179
+ name: "ECDSA",
180
+ namedCurve: "P-256",
181
+ hash: "SHA-256"
182
+ };
183
+ function ab2hex(ab) {
184
+ return Array.prototype.map.call(new Uint8Array(ab), (x) => ("00" + x.toString(16)).slice(-2)).join("");
185
+ }
186
+ async function parseDid(keyPair, subtleCrypto) {
187
+ return encodeDIDfromHexString("p256-pub", compressedKeyInHexfromRaw(rawKeyInHexfromUncompressed(ab2hex(await subtleCrypto.exportKey("raw", keyPair.publicKey)))));
188
+ }
189
+ async function exportKeyPair(keyPair, subtleCrypto) {
190
+ return {
191
+ publicKey: await subtleCrypto.exportKey("jwk", keyPair.publicKey),
192
+ privateKey: await subtleCrypto.exportKey("jwk", keyPair.privateKey)
193
+ };
194
+ }
195
+ async function importKeyPair(jwkKeyPair, subtleCrypto, algorithm = ECDSA_ALGORITHM) {
196
+ return {
197
+ publicKey: await subtleCrypto.importKey("jwk", jwkKeyPair.publicKey, algorithm, true, ["verify"]),
198
+ privateKey: await subtleCrypto.importKey("jwk", jwkKeyPair.privateKey, algorithm, true, ["sign"])
199
+ };
200
+ }
201
+ async function generateKeyPair(subtleCrypto, algorithm = ECDSA_ALGORITHM) {
202
+ return subtleCrypto.generateKey(algorithm, true, ["sign", "verify"]);
203
+ }
204
+ //#endregion
205
+ //#region src/crypto/renown-crypto.ts
206
+ const RENOWN_NETWORK_ID = "eip155";
207
+ const RENOWN_CHAIN_ID = 1;
208
+ var RenownCrypto = class RenownCrypto {
209
+ #subtleCrypto;
210
+ #keyPair;
211
+ #keyPairStorage;
212
+ did;
213
+ static algorithm = ECDSA_ALGORITHM;
214
+ static signAlgorithm = ECDSA_SIGN_ALGORITHM;
215
+ constructor(keyPairStorage, crypto, keyPair, did) {
216
+ this.#keyPairStorage = keyPairStorage;
217
+ this.#subtleCrypto = crypto;
218
+ this.#keyPair = keyPair;
219
+ this.did = did;
220
+ }
221
+ get publicKey() {
222
+ return this.#keyPair.publicKey;
223
+ }
224
+ async getBearerToken(address, options) {
225
+ return await createAuthBearerToken(Number(RENOWN_CHAIN_ID), RENOWN_NETWORK_ID, address || this.did, this.issuer, options);
226
+ }
227
+ async removeDid() {
228
+ await this.#keyPairStorage.removeKeyPair();
229
+ }
230
+ #stringToBytes(s) {
231
+ return fromString(s, "utf-8");
232
+ }
233
+ async sign(data) {
234
+ const dataBytes = typeof data === "string" ? this.#stringToBytes(data) : data;
235
+ const arrayBuffer = await this.#subtleCrypto.sign(RenownCrypto.signAlgorithm, this.#keyPair.privateKey, dataBytes.buffer);
236
+ return new Uint8Array(arrayBuffer);
237
+ }
238
+ async verify(data, signature) {
239
+ return this.#subtleCrypto.verify({
240
+ name: "ECDSA",
241
+ hash: "SHA-256"
242
+ }, this.#keyPair.publicKey, signature.buffer, data.buffer);
243
+ }
244
+ get issuer() {
245
+ return {
246
+ did: this.did,
247
+ signer: async (data) => {
248
+ return bytesToBase64url(await this.sign(typeof data === "string" ? new TextEncoder().encode(data) : data));
249
+ },
250
+ alg: "ES256"
251
+ };
252
+ }
253
+ };
254
+ /**
255
+ * @deprecated Use RenownCrypto instead
256
+ */
257
+ var ConnectCrypto = class extends RenownCrypto {};
258
+ //#endregion
259
+ //#region src/crypto/renown-crypto-builder.ts
260
+ var RenownCryptoBuilder = class {
261
+ keyPairStorage;
262
+ subtleCrypto;
263
+ withKeyPairStorage(storage) {
264
+ this.keyPairStorage = storage;
265
+ return this;
266
+ }
267
+ withSubtleCrypto(crypto) {
268
+ this.subtleCrypto = crypto;
269
+ return this;
270
+ }
271
+ async build() {
272
+ if (!this.keyPairStorage) throw new Error("KeyPairStorage is required. Use withKeyPairStorage() to set it.");
273
+ const subtleCrypto = this.subtleCrypto ?? globalThis.crypto.subtle;
274
+ const keyPair = await this.#initializeKeyPair(subtleCrypto, this.keyPairStorage);
275
+ const did = await parseDid(keyPair, subtleCrypto);
276
+ return new RenownCrypto(this.keyPairStorage, subtleCrypto, keyPair, did);
277
+ }
278
+ async #initializeKeyPair(subtleCrypto, keyPairStorage) {
279
+ const loadedKeyPair = await keyPairStorage.loadKeyPair();
280
+ if (loadedKeyPair) return importKeyPair(loadedKeyPair, subtleCrypto);
281
+ const keyPair = await generateKeyPair(subtleCrypto);
282
+ const exported = await exportKeyPair(keyPair, subtleCrypto);
283
+ await keyPairStorage.saveKeyPair(exported);
284
+ return keyPair;
285
+ }
286
+ };
287
+ //#endregion
288
+ //#region src/crypto/memory-key-storage.ts
289
+ var MemoryKeyStorage = class {
290
+ keyPair;
291
+ constructor(keyPair) {
292
+ this.keyPair = keyPair;
293
+ }
294
+ loadKeyPair() {
295
+ return Promise.resolve(this.keyPair);
296
+ }
297
+ saveKeyPair(keyPair) {
298
+ this.keyPair = keyPair;
299
+ return Promise.resolve();
300
+ }
301
+ removeKeyPair() {
302
+ this.keyPair = void 0;
303
+ return Promise.resolve();
304
+ }
305
+ };
306
+ //#endregion
307
+ //#region src/crypto/signer.ts
308
+ var InvalidSignatureError = class extends Error {
309
+ constructor() {
310
+ super("Invalid signature");
311
+ }
312
+ };
313
+ var RenownCryptoSigner = class {
314
+ app;
315
+ constructor(crypto, appName, user) {
316
+ this.crypto = crypto;
317
+ this.appName = appName;
318
+ this.user = user;
319
+ this.app = {
320
+ key: this.crypto.did,
321
+ name: this.appName
322
+ };
323
+ }
324
+ get publicKey() {
325
+ return this.crypto.publicKey;
326
+ }
327
+ async sign(data) {
328
+ return this.crypto.sign(data);
329
+ }
330
+ async verify(data, signature) {
331
+ if (!await this.crypto.verify(data, signature)) throw new InvalidSignatureError();
332
+ }
333
+ async signAction(action, abortSignal) {
334
+ const hashField = action.context?.prevOpHash ?? "";
335
+ return this._signAction(action, hashField, abortSignal);
336
+ }
337
+ /**
338
+ * Signs an action including a predicted resulting state hash.
339
+ *
340
+ * The resulting hash is packed into the signature tuple's 4th element (index 3)
341
+ * using the format: `${prevStateHash}:${resultingStateHash}`
342
+ *
343
+ * This allows offline verification of documents without reducer logic:
344
+ * - Verifier can check that the signature is valid for the claimed resulting state
345
+ * - Verifier can compare claimed resulting state to actual operation.hash
346
+ *
347
+ * @param action - The action to sign
348
+ * @param resultingStateHash - The predicted hash of document state AFTER this action runs
349
+ * @param abortSignal - Optional abort signal
350
+ * @returns A Signature tuple with the resulting hash encoded in element [3]
351
+ */
352
+ async signActionWithResultingState(action, resultingStateHash, abortSignal) {
353
+ const hashField = `${action.context?.prevOpHash ?? ""}:${resultingStateHash}`;
354
+ return this._signAction(action, hashField, abortSignal);
355
+ }
356
+ /**
357
+ * Internal signing implementation shared by signAction and signActionWithResultingState.
358
+ */
359
+ async _signAction(action, hashField, abortSignal) {
360
+ if (abortSignal?.aborted) throw new Error("Signing aborted");
361
+ const timestamp = ((/* @__PURE__ */ new Date()).getTime() / 1e3).toFixed(0);
362
+ const hash = await this.hashAction(action);
363
+ if (abortSignal?.aborted) throw new Error("Signing aborted");
364
+ const params = [
365
+ timestamp,
366
+ this.crypto.did,
367
+ hash,
368
+ hashField
369
+ ];
370
+ const message = this.buildSignatureMessage(params);
371
+ const signatureBytes = await this.crypto.sign(message);
372
+ const signatureHex = `0x${this.arrayBufferToHex(signatureBytes)}`;
373
+ if (abortSignal?.aborted) throw new Error("Signing aborted");
374
+ return [...params, signatureHex];
375
+ }
376
+ async hashAction(action) {
377
+ const payload = [
378
+ action.scope,
379
+ action.type,
380
+ JSON.stringify(action.input)
381
+ ].join("");
382
+ const data = new TextEncoder().encode(payload);
383
+ const hashBuffer = await crypto.subtle.digest("SHA-256", data);
384
+ return this.arrayBufferToBase64(hashBuffer);
385
+ }
386
+ buildSignatureMessage(params) {
387
+ const message = params.join("");
388
+ const prefix = "Signed Operation:\n" + message.length.toString();
389
+ return new TextEncoder().encode(prefix + message);
390
+ }
391
+ arrayBufferToHex(buffer) {
392
+ const bytes = buffer instanceof Uint8Array ? buffer : new Uint8Array(buffer);
393
+ return Array.from(bytes).map((byte) => byte.toString(16).padStart(2, "0")).join("");
394
+ }
395
+ arrayBufferToBase64(buffer) {
396
+ const bytes = new Uint8Array(buffer);
397
+ let binary = "";
398
+ for (let i = 0; i < bytes.length; i++) binary += String.fromCharCode(bytes[i]);
399
+ return btoa(binary);
400
+ }
401
+ };
402
+ /**
403
+ * Creates a signature verification handler that verifies signatures using the Web Crypto API.
404
+ * The verification uses ECDSA with P-256 curve and SHA-256 hash, matching the RenownCrypto signing algorithm.
405
+ */
406
+ function createSignatureVerifier(requireSignature = false) {
407
+ return async (operation, publicKey) => {
408
+ const signer = operation.action.context?.signer;
409
+ if (!signer || !publicKey) return !requireSignature;
410
+ const signatures = signer.signatures;
411
+ if (signatures.length === 0) return false;
412
+ const [timestamp, signerKey, hash, prevStateHash, signatureHex] = signatures[signatures.length - 1];
413
+ if (signerKey !== publicKey) return false;
414
+ const message = buildSignatureMessage([
415
+ timestamp,
416
+ signerKey,
417
+ hash,
418
+ prevStateHash
419
+ ]);
420
+ const signatureBytes = hexToUint8Array(signatureHex);
421
+ const cryptoKey = await importPublicKey(publicKey);
422
+ return await crypto.subtle.verify({
423
+ name: "ECDSA",
424
+ hash: "SHA-256"
425
+ }, cryptoKey, signatureBytes.buffer, message.buffer);
426
+ };
427
+ }
428
+ function buildSignatureMessage(params) {
429
+ const message = params.join("");
430
+ const prefix = "Signed Operation:\n" + message.length.toString();
431
+ return new TextEncoder().encode(prefix + message);
432
+ }
433
+ function hexToUint8Array(hex) {
434
+ const cleanHex = hex.startsWith("0x") ? hex.slice(2) : hex;
435
+ const bytes = new Uint8Array(cleanHex.length / 2);
436
+ for (let i = 0; i < cleanHex.length; i += 2) bytes[i / 2] = parseInt(cleanHex.substring(i, i + 2), 16);
437
+ return bytes;
438
+ }
439
+ async function importPublicKey(did) {
440
+ const keyData = extractKeyFromDid(did);
441
+ return crypto.subtle.importKey("raw", keyData.buffer, {
442
+ name: "ECDSA",
443
+ namedCurve: "P-256"
444
+ }, true, ["verify"]);
445
+ }
446
+ function extractKeyFromDid(did) {
447
+ const parts = did.split(":");
448
+ if (parts.length < 3 || parts[0] !== "did" || parts[1] !== "key") throw new Error(`Invalid DID format: ${did}`);
449
+ const multibaseKey = parts[2];
450
+ if (!multibaseKey.startsWith("z")) throw new Error(`Unsupported multibase encoding: ${multibaseKey[0]}`);
451
+ const decoded = base58Decode(multibaseKey.slice(1));
452
+ if (decoded[0] !== 128 || decoded[1] !== 36) throw new Error("Not a P-256 public key multicodec");
453
+ return decompressP256PublicKey(decoded.slice(2));
454
+ }
455
+ function base58Decode(input) {
456
+ const ALPHABET = "123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz";
457
+ const ALPHABET_MAP = /* @__PURE__ */ new Map();
458
+ for (let i = 0; i < 58; i++) ALPHABET_MAP.set(ALPHABET[i], i);
459
+ if (input.length === 0) return new Uint8Array(0);
460
+ const bytes = [0];
461
+ for (const char of input) {
462
+ const value = ALPHABET_MAP.get(char);
463
+ if (value === void 0) throw new Error(`Invalid base58 character: ${char}`);
464
+ let carry = value;
465
+ for (let j = 0; j < bytes.length; j++) {
466
+ carry += bytes[j] * 58;
467
+ bytes[j] = carry & 255;
468
+ carry >>= 8;
469
+ }
470
+ while (carry > 0) {
471
+ bytes.push(carry & 255);
472
+ carry >>= 8;
473
+ }
474
+ }
475
+ for (const char of input) {
476
+ if (char !== "1") break;
477
+ bytes.push(0);
478
+ }
479
+ return new Uint8Array(bytes.reverse());
480
+ }
481
+ function decompressP256PublicKey(compressed) {
482
+ if (compressed.length !== 33) throw new Error(`Invalid compressed key length: ${compressed.length}`);
483
+ const prefix = compressed[0];
484
+ if (prefix !== 2 && prefix !== 3) throw new Error(`Invalid compression prefix: ${prefix}`);
485
+ const p = BigInt("0xffffffff00000001000000000000000000000000ffffffffffffffffffffffff");
486
+ const a = BigInt("0xffffffff00000001000000000000000000000000fffffffffffffffffffffffc");
487
+ const b = BigInt("0x5ac635d8aa3a93e7b3ebbd55769886bc651d06b0cc53b0f63bce3c3e27d2604b");
488
+ let x = BigInt(0);
489
+ for (let i = 1; i < compressed.length; i++) x = x << BigInt(8) | BigInt(compressed[i]);
490
+ let y = modPow((modPow(x, BigInt(3), p) + a * x + b) % p, (p + BigInt(1)) / BigInt(4), p);
491
+ if (y % BigInt(2) === BigInt(0) !== (prefix === 2)) y = p - y;
492
+ const uncompressed = new Uint8Array(65);
493
+ uncompressed[0] = 4;
494
+ const xBytes = bigIntToBytes(x, 32);
495
+ const yBytes = bigIntToBytes(y, 32);
496
+ uncompressed.set(xBytes, 1);
497
+ uncompressed.set(yBytes, 33);
498
+ return uncompressed;
499
+ }
500
+ function modPow(base, exp, mod) {
501
+ let result = BigInt(1);
502
+ base = base % mod;
503
+ while (exp > BigInt(0)) {
504
+ if (exp % BigInt(2) === BigInt(1)) result = result * base % mod;
505
+ exp = exp >> BigInt(1);
506
+ base = base * base % mod;
507
+ }
508
+ return result;
509
+ }
510
+ function bigIntToBytes(n, length) {
511
+ const bytes = new Uint8Array(length);
512
+ for (let i = length - 1; i >= 0; i--) {
513
+ bytes[i] = Number(n & BigInt(255));
514
+ n = n >> BigInt(8);
515
+ }
516
+ return bytes;
517
+ }
518
+ /**
519
+ * Parses the hash field (element [3]) from a signature tuple.
520
+ *
521
+ * Supports two formats:
522
+ * - Old format: just `prevStateHash` (no colon)
523
+ * - New format: `prevStateHash:resultingStateHash` (colon-separated)
524
+ *
525
+ * @param hashField - The 4th element of a Signature tuple
526
+ * @returns Object with prevStateHash and optional resultingStateHash
527
+ */
528
+ function parseSignatureHashField(hashField) {
529
+ const colonIndex = hashField.indexOf(":");
530
+ if (colonIndex === -1) return {
531
+ prevStateHash: hashField,
532
+ resultingStateHash: void 0
533
+ };
534
+ return {
535
+ prevStateHash: hashField.substring(0, colonIndex),
536
+ resultingStateHash: hashField.substring(colonIndex + 1)
537
+ };
538
+ }
539
+ /**
540
+ * Extracts the resulting state hash from a signature, if present.
541
+ *
542
+ * @param signature - A Signature tuple
543
+ * @returns The resulting state hash, or undefined if not present
544
+ */
545
+ function extractResultingHashFromSignature(signature) {
546
+ const hashField = signature[3];
547
+ const { resultingStateHash } = parseSignatureHashField(hashField);
548
+ return resultingStateHash;
549
+ }
550
+ /**
551
+ * Checks if a signature includes a resulting state hash.
552
+ *
553
+ * @param signature - A Signature tuple
554
+ * @returns true if the signature includes a resulting state hash
555
+ */
556
+ function signatureHasResultingHash(signature) {
557
+ return extractResultingHashFromSignature(signature) !== void 0;
558
+ }
559
+ //#endregion
560
+ //#region src/storage/common.ts
561
+ var BaseStorage = class {};
562
+ var MemoryStorage = class extends BaseStorage {
563
+ data = /* @__PURE__ */ new Map();
564
+ get(key) {
565
+ return this.data.get(key);
566
+ }
567
+ set(key, value) {
568
+ if (value === void 0) this.data.delete(key);
569
+ else this.data.set(key, value);
570
+ }
571
+ delete(key) {
572
+ this.data.delete(key);
573
+ }
574
+ };
575
+ //#endregion
576
+ //#region src/common.ts
577
+ var RenownMemoryStorage = class extends MemoryStorage {};
578
+ var Renown = class {
579
+ #baseUrl;
580
+ #store;
581
+ #eventEmitter;
582
+ #appName;
583
+ #crypto;
584
+ #signer;
585
+ #profileFetcher;
586
+ #status = "initial";
587
+ constructor(store, eventEmitter, crypto, appName, baseUrl = DEFAULT_RENOWN_URL, profileFetcher) {
588
+ this.#store = store;
589
+ this.#eventEmitter = eventEmitter;
590
+ this.#baseUrl = baseUrl;
591
+ this.#crypto = crypto;
592
+ this.#appName = appName;
593
+ this.#profileFetcher = profileFetcher;
594
+ this.#signer = new RenownCryptoSigner(crypto, this.#appName, this.user);
595
+ this.on("user", (user) => {
596
+ this.#signer.user = user;
597
+ });
598
+ }
599
+ get baseUrl() {
600
+ return this.#baseUrl;
601
+ }
602
+ get user() {
603
+ return this.#store.get("user");
604
+ }
605
+ get status() {
606
+ return this.#status;
607
+ }
608
+ get signer() {
609
+ return this.#signer;
610
+ }
611
+ get crypto() {
612
+ return this.#crypto;
613
+ }
614
+ get did() {
615
+ return this.#crypto.did;
616
+ }
617
+ get profileFetcher() {
618
+ return this.#profileFetcher;
619
+ }
620
+ #updateStatus(status) {
621
+ this.#status = status;
622
+ this.#eventEmitter.emit("status", status);
623
+ }
624
+ #updateUser(user) {
625
+ if (user) this.#store.set("user", user);
626
+ else this.#store.delete("user");
627
+ this.#eventEmitter.emit("user", user);
628
+ }
629
+ async login(userDid) {
630
+ this.#updateStatus("checking");
631
+ try {
632
+ const result = parsePkhDid(userDid);
633
+ const credential = await this.#getCredential(result.address, result.chainId, this.#crypto.did);
634
+ if (!credential) {
635
+ this.#updateUser(void 0);
636
+ throw new Error("Credential not found");
637
+ }
638
+ if (!(credential.issuer.id === userDid && credential.credentialSubject.id === this.did)) throw new Error("Invalid credential");
639
+ const user = {
640
+ ...result,
641
+ address: credential.issuer.ethereumAddress,
642
+ did: userDid,
643
+ credential
644
+ };
645
+ this.#updateUser(user);
646
+ this.#updateStatus("authorized");
647
+ if (this.#profileFetcher) this.#profileFetcher(user, this.#baseUrl).then((profile) => {
648
+ if (profile && this.user?.address === user.address && this.user.chainId === user.chainId) this.#updateUser({
649
+ ...this.user,
650
+ profile,
651
+ ens: {
652
+ name: profile.username ?? void 0,
653
+ avatarUrl: profile.userImage ?? void 0
654
+ }
655
+ });
656
+ }).catch(console.error);
657
+ return user;
658
+ } catch (error) {
659
+ this.#updateUser(void 0);
660
+ this.#updateStatus("not-authorized");
661
+ throw error;
662
+ }
663
+ }
664
+ logout() {
665
+ this.#updateUser(void 0);
666
+ this.#updateStatus("initial");
667
+ return Promise.resolve();
668
+ }
669
+ on(event, listener) {
670
+ return this.#eventEmitter.on(event, listener);
671
+ }
672
+ async #getCredential(address, chainId, appDid) {
673
+ if (!this.#baseUrl) throw new Error("RENOWN_URL is not set");
674
+ const url = new URL(`/api/auth/credential?address=${encodeURIComponent(address)}&chainId=${encodeURIComponent(chainId)}&connectId=${encodeURIComponent(appDid)}`, this.#baseUrl);
675
+ const response = await fetch(url, { method: "GET" });
676
+ if (response.ok) return (await response.json()).credential;
677
+ else throw new Error(`Failed to get credential: ${response.status}`);
678
+ }
679
+ async verifyBearerToken(token) {
680
+ return verifyAuthBearerToken(token);
681
+ }
682
+ async getBearerToken(options) {
683
+ if (!this.user) throw new Error("User not found");
684
+ return this.#crypto.getBearerToken(this.user.address, options);
685
+ }
686
+ };
687
+ //#endregion
688
+ //#region src/event/memory.ts
689
+ var MemoryEventEmitter = class {
690
+ #listeners = /* @__PURE__ */ new Map();
691
+ on(event, listener) {
692
+ if (!this.#listeners.has(event)) this.#listeners.set(event, /* @__PURE__ */ new Set());
693
+ this.#listeners.get(event).add(listener);
694
+ return () => {
695
+ this.#listeners.get(event)?.delete(listener);
696
+ };
697
+ }
698
+ emit(event, data) {
699
+ this.#listeners.get(event)?.forEach((listener) => listener(data));
700
+ }
701
+ };
702
+ //#endregion
703
+ //#region src/profile.ts
704
+ const fetchRenownProfile = async (user, baseUrl) => {
705
+ try {
706
+ const response = await fetch(`${baseUrl}/api/profile`, {
707
+ method: "POST",
708
+ headers: { "Content-Type": "application/json" },
709
+ body: JSON.stringify({ ethAddress: user.address })
710
+ });
711
+ if (!response.ok) return;
712
+ return (await response.json()).profile ?? void 0;
713
+ } catch {
714
+ return;
715
+ }
716
+ };
717
+ //#endregion
718
+ //#region src/renown-builder.ts
719
+ /**
720
+ * Base builder for creating Renown instances.
721
+ * Use platform-specific builders (RenownBuilder from init.browser.js or init.node.js)
722
+ * for pre-configured defaults.
723
+ */
724
+ var BaseRenownBuilder = class BaseRenownBuilder {
725
+ #appName;
726
+ #storage;
727
+ #eventEmitter;
728
+ #crypto;
729
+ #keyPairStorage;
730
+ #baseUrl;
731
+ #profileFetcher;
732
+ /**
733
+ * @param appName - Application name used for signing context
734
+ */
735
+ constructor(appName) {
736
+ this.#appName = appName;
737
+ }
738
+ /**
739
+ * Set custom storage for user data persistence.
740
+ * Defaults to in-memory storage if not set.
741
+ */
742
+ withStorage(storage) {
743
+ this.#storage = storage;
744
+ return this;
745
+ }
746
+ /**
747
+ * Set custom event emitter for user state changes.
748
+ * Defaults to in-memory event emitter if not set.
749
+ */
750
+ withEventEmitter(eventEmitter) {
751
+ this.#eventEmitter = eventEmitter;
752
+ return this;
753
+ }
754
+ /**
755
+ * Set a pre-built crypto instance.
756
+ * Either crypto or keyPairStorage must be provided.
757
+ */
758
+ withCrypto(crypto) {
759
+ this.#crypto = crypto;
760
+ return this;
761
+ }
762
+ /**
763
+ * Set key pair storage for cryptographic keys.
764
+ * A crypto instance will be built from this storage.
765
+ * Either crypto or keyPairStorage must be provided.
766
+ */
767
+ withKeyPairStorage(keyPairStorage) {
768
+ this.#keyPairStorage = keyPairStorage;
769
+ return this;
770
+ }
771
+ /**
772
+ * Set the Renown server URL for credential verification.
773
+ * Defaults to https://www.renown.id
774
+ */
775
+ withBaseUrl(baseUrl) {
776
+ this.#baseUrl = baseUrl;
777
+ return this;
778
+ }
779
+ /**
780
+ * Set a profile fetcher strategy for enriching user data after login.
781
+ * The fetcher receives the authenticated user and the base URL,
782
+ * and returns a RenownProfile. Called in the background after each login.
783
+ * Defaults to fetchRenownProfile which calls the Renown API.
784
+ */
785
+ withProfileFetcher(profileFetcher) {
786
+ this.#profileFetcher = profileFetcher;
787
+ return this;
788
+ }
789
+ /**
790
+ * Build and initialize the Renown instance.
791
+ * If a user is stored, attempts to re-authenticate them.
792
+ * @throws Error if neither crypto nor keyPairStorage is provided
793
+ */
794
+ async build() {
795
+ if (!this.#crypto && !this.#keyPairStorage) throw new Error("Either crypto or keyPairStorage is required. Use withCrypto() or withKeyPairStorage() to set one.");
796
+ const crypto = this.#crypto ?? await new RenownCryptoBuilder().withKeyPairStorage(this.#keyPairStorage).build();
797
+ const storage = this.#storage ?? new RenownMemoryStorage();
798
+ const eventEmitter = this.#eventEmitter ?? new MemoryEventEmitter();
799
+ const baseUrl = this.#baseUrl ?? "https://www.renown.id";
800
+ const renown = new Renown(storage, eventEmitter, crypto, this.#appName, baseUrl, this.#profileFetcher ?? fetchRenownProfile);
801
+ if (renown.user) try {
802
+ await renown.login(renown.user.did);
803
+ } catch (error) {
804
+ console.error("Failed to re-authenticate user:", error);
805
+ }
806
+ return renown;
807
+ }
808
+ /**
809
+ * Create a BaseRenownBuilder from options object for a more concise API
810
+ */
811
+ static from(options) {
812
+ const builder = new BaseRenownBuilder(options.appName);
813
+ if (options.storage) builder.withStorage(options.storage);
814
+ if (options.eventEmitter) builder.withEventEmitter(options.eventEmitter);
815
+ if (options.crypto) builder.withCrypto(options.crypto);
816
+ if (options.keyPairStorage) builder.withKeyPairStorage(options.keyPairStorage);
817
+ if (options.baseUrl) builder.withBaseUrl(options.baseUrl);
818
+ if (options.profileFetcher) builder.withProfileFetcher(options.profileFetcher);
819
+ return builder;
820
+ }
821
+ };
822
+ //#endregion
823
+ export { CREDENTIAL_TYPES as C, DOMAIN_TYPE as D, DEFAULT_RENOWN_URL as E, ISSUER_TYPE as O, CREDENTIAL_SUBJECT_TYPE as S, DEFAULT_RENOWN_NETWORK_ID as T, getIssuer as _, BaseStorage as a, verifyAuthBearerToken as b, extractResultingHashFromSignature as c, MemoryKeyStorage as d, RenownCryptoBuilder as f, createAuthBearerToken as g, assertIsAuthCredential as h, RenownMemoryStorage as i, VERIFIABLE_CREDENTIAL_EIP712_TYPE as k, parseSignatureHashField as l, RenownCrypto as m, fetchRenownProfile as n, RenownCryptoSigner as o, ConnectCrypto as p, Renown as r, createSignatureVerifier as s, BaseRenownBuilder as t, signatureHasResultingHash as u, getResolver$1 as v, DEFAULT_RENOWN_CHAIN_ID as w, CREDENTIAL_SCHEMA_EIP712_TYPE as x, parsePkhDid as y };
824
+
825
+ //# sourceMappingURL=renown-builder-C5Y9S3o2.js.map