@rhinestone/sdk 0.7.9 → 0.8.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (138) hide show
  1. package/dist/{src/accounts → accounts}/index.d.ts +2 -2
  2. package/dist/accounts/index.d.ts.map +1 -0
  3. package/dist/{src/accounts → accounts}/index.js +55 -45
  4. package/dist/accounts/nexus.d.ts.map +1 -0
  5. package/dist/{src/accounts → accounts}/nexus.js +48 -42
  6. package/dist/accounts/safe.d.ts.map +1 -0
  7. package/dist/{src/accounts → accounts}/safe.js +35 -29
  8. package/dist/accounts/utils.d.ts.map +1 -0
  9. package/dist/{src/accounts → accounts}/utils.js +23 -19
  10. package/dist/execution/index.d.ts.map +1 -0
  11. package/dist/{src/execution → execution}/index.js +69 -65
  12. package/dist/execution/smart-session.d.ts.map +1 -0
  13. package/dist/execution/smart-session.js +85 -0
  14. package/dist/index.d.ts.map +1 -0
  15. package/dist/{src/index.js → index.js} +10 -8
  16. package/dist/modules/abi/smart-sessions.d.ts.map +1 -0
  17. package/dist/modules/common.d.ts.map +1 -0
  18. package/dist/modules/index.d.ts.map +1 -0
  19. package/dist/modules/omni-account.d.ts.map +1 -0
  20. package/dist/modules/validators/core.d.ts.map +1 -0
  21. package/dist/modules/validators/index.d.ts.map +1 -0
  22. package/dist/modules/validators/smart-sessions.d.ts.map +1 -0
  23. package/dist/orchestrator/client.d.ts.map +1 -0
  24. package/dist/orchestrator/consts.d.ts.map +1 -0
  25. package/dist/orchestrator/error.d.ts.map +1 -0
  26. package/dist/orchestrator/index.d.ts.map +1 -0
  27. package/dist/orchestrator/registry.d.ts.map +1 -0
  28. package/dist/orchestrator/types.d.ts.map +1 -0
  29. package/dist/orchestrator/utils.d.ts.map +1 -0
  30. package/dist/types.d.ts.map +1 -0
  31. package/package.json +13 -13
  32. package/dist/cjs/modules/abi/smart-sessions.d.ts.map +0 -1
  33. package/dist/cjs/modules/common.d.ts.map +0 -1
  34. package/dist/cjs/modules/index.d.ts.map +0 -1
  35. package/dist/cjs/modules/omni-account.d.ts.map +0 -1
  36. package/dist/cjs/modules/validators/core.d.ts.map +0 -1
  37. package/dist/cjs/modules/validators/index.d.ts.map +0 -1
  38. package/dist/cjs/modules/validators/smart-sessions.d.ts.map +0 -1
  39. package/dist/cjs/orchestrator/client.d.ts.map +0 -1
  40. package/dist/cjs/orchestrator/consts.d.ts.map +0 -1
  41. package/dist/cjs/orchestrator/error.d.ts.map +0 -1
  42. package/dist/cjs/orchestrator/index.d.ts.map +0 -1
  43. package/dist/cjs/orchestrator/registry.d.ts.map +0 -1
  44. package/dist/cjs/orchestrator/types.d.ts.map +0 -1
  45. package/dist/cjs/orchestrator/utils.d.ts.map +0 -1
  46. package/dist/cjs/types.d.ts.map +0 -1
  47. package/dist/src/accounts/index.d.ts.map +0 -1
  48. package/dist/src/accounts/nexus.d.ts.map +0 -1
  49. package/dist/src/accounts/safe.d.ts.map +0 -1
  50. package/dist/src/accounts/utils.d.ts.map +0 -1
  51. package/dist/src/execution/index.d.ts.map +0 -1
  52. package/dist/src/execution/smart-session.d.ts.map +0 -1
  53. package/dist/src/execution/smart-session.js +0 -81
  54. package/dist/src/index.d.ts.map +0 -1
  55. package/dist/src/modules/abi/smart-sessions.d.ts +0 -42
  56. package/dist/src/modules/abi/smart-sessions.d.ts.map +0 -1
  57. package/dist/src/modules/abi/smart-sessions.js +0 -128
  58. package/dist/src/modules/common.d.ts +0 -16
  59. package/dist/src/modules/common.d.ts.map +0 -1
  60. package/dist/src/modules/common.js +0 -5
  61. package/dist/src/modules/index.d.ts +0 -33
  62. package/dist/src/modules/index.d.ts.map +0 -1
  63. package/dist/src/modules/index.js +0 -146
  64. package/dist/src/modules/omni-account.d.ts +0 -9
  65. package/dist/src/modules/omni-account.d.ts.map +0 -1
  66. package/dist/src/modules/omni-account.js +0 -7
  67. package/dist/src/modules/validators/core.d.ts +0 -23
  68. package/dist/src/modules/validators/core.d.ts.map +0 -1
  69. package/dist/src/modules/validators/core.js +0 -112
  70. package/dist/src/modules/validators/index.d.ts +0 -4
  71. package/dist/src/modules/validators/index.d.ts.map +0 -1
  72. package/dist/src/modules/validators/index.js +0 -3
  73. package/dist/src/modules/validators/smart-sessions.d.ts +0 -29
  74. package/dist/src/modules/validators/smart-sessions.d.ts.map +0 -1
  75. package/dist/src/modules/validators/smart-sessions.js +0 -414
  76. package/dist/src/orchestrator/client.d.ts +0 -29
  77. package/dist/src/orchestrator/client.d.ts.map +0 -1
  78. package/dist/src/orchestrator/client.js +0 -243
  79. package/dist/src/orchestrator/consts.d.ts +0 -5
  80. package/dist/src/orchestrator/consts.d.ts.map +0 -1
  81. package/dist/src/orchestrator/consts.js +0 -4
  82. package/dist/src/orchestrator/error.d.ts +0 -18
  83. package/dist/src/orchestrator/error.d.ts.map +0 -1
  84. package/dist/src/orchestrator/error.js +0 -28
  85. package/dist/src/orchestrator/index.d.ts +0 -11
  86. package/dist/src/orchestrator/index.d.ts.map +0 -1
  87. package/dist/src/orchestrator/index.js +0 -10
  88. package/dist/src/orchestrator/registry.d.ts +0 -17
  89. package/dist/src/orchestrator/registry.d.ts.map +0 -1
  90. package/dist/src/orchestrator/registry.js +0 -344
  91. package/dist/src/orchestrator/types.d.ts +0 -222
  92. package/dist/src/orchestrator/types.d.ts.map +0 -1
  93. package/dist/src/orchestrator/types.js +0 -9
  94. package/dist/src/orchestrator/utils.d.ts +0 -29
  95. package/dist/src/orchestrator/utils.d.ts.map +0 -1
  96. package/dist/src/orchestrator/utils.js +0 -303
  97. package/dist/src/types.d.ts +0 -113
  98. package/dist/src/types.d.ts.map +0 -1
  99. package/dist/src/types.js +0 -1
  100. package/dist/test/modules/validators/smart-sessions.test.d.ts +0 -2
  101. package/dist/test/modules/validators/smart-sessions.test.d.ts.map +0 -1
  102. package/dist/test/modules/validators/smart-sessions.test.js +0 -20
  103. /package/dist/{src/accounts → accounts}/nexus.d.ts +0 -0
  104. /package/dist/{src/accounts → accounts}/safe.d.ts +0 -0
  105. /package/dist/{src/accounts → accounts}/utils.d.ts +0 -0
  106. /package/dist/{src/execution → execution}/index.d.ts +0 -0
  107. /package/dist/{src/execution → execution}/smart-session.d.ts +0 -0
  108. /package/dist/{src/index.d.ts → index.d.ts} +0 -0
  109. /package/dist/{cjs/modules → modules}/abi/smart-sessions.d.ts +0 -0
  110. /package/dist/{cjs/modules → modules}/abi/smart-sessions.js +0 -0
  111. /package/dist/{cjs/modules → modules}/common.d.ts +0 -0
  112. /package/dist/{cjs/modules → modules}/common.js +0 -0
  113. /package/dist/{cjs/modules → modules}/index.d.ts +0 -0
  114. /package/dist/{cjs/modules → modules}/index.js +0 -0
  115. /package/dist/{cjs/modules → modules}/omni-account.d.ts +0 -0
  116. /package/dist/{cjs/modules → modules}/omni-account.js +0 -0
  117. /package/dist/{cjs/modules → modules}/validators/core.d.ts +0 -0
  118. /package/dist/{cjs/modules → modules}/validators/core.js +0 -0
  119. /package/dist/{cjs/modules → modules}/validators/index.d.ts +0 -0
  120. /package/dist/{cjs/modules → modules}/validators/index.js +0 -0
  121. /package/dist/{cjs/modules → modules}/validators/smart-sessions.d.ts +0 -0
  122. /package/dist/{cjs/modules → modules}/validators/smart-sessions.js +0 -0
  123. /package/dist/{cjs/orchestrator → orchestrator}/client.d.ts +0 -0
  124. /package/dist/{cjs/orchestrator → orchestrator}/client.js +0 -0
  125. /package/dist/{cjs/orchestrator → orchestrator}/consts.d.ts +0 -0
  126. /package/dist/{cjs/orchestrator → orchestrator}/consts.js +0 -0
  127. /package/dist/{cjs/orchestrator → orchestrator}/error.d.ts +0 -0
  128. /package/dist/{cjs/orchestrator → orchestrator}/error.js +0 -0
  129. /package/dist/{cjs/orchestrator → orchestrator}/index.d.ts +0 -0
  130. /package/dist/{cjs/orchestrator → orchestrator}/index.js +0 -0
  131. /package/dist/{cjs/orchestrator → orchestrator}/registry.d.ts +0 -0
  132. /package/dist/{cjs/orchestrator → orchestrator}/registry.js +0 -0
  133. /package/dist/{cjs/orchestrator → orchestrator}/types.d.ts +0 -0
  134. /package/dist/{cjs/orchestrator → orchestrator}/types.js +0 -0
  135. /package/dist/{cjs/orchestrator → orchestrator}/utils.d.ts +0 -0
  136. /package/dist/{cjs/orchestrator → orchestrator}/utils.js +0 -0
  137. /package/dist/{cjs/types.d.ts → types.d.ts} +0 -0
  138. /package/dist/{cjs/types.js → types.js} +0 -0
@@ -1,9 +0,0 @@
1
- import type { Address } from 'viem';
2
- declare const OMNI_ACCOUNT_MOCK_ATTESTER_ADDRESS: Address;
3
- declare const RHINESTONE_MODULE_REGISTRY_ADDRESS: Address;
4
- declare const RHINESTONE_ATTESTER_ADDRESS: Address;
5
- declare const HOOK_ADDRESS: Address;
6
- declare const TARGET_MODULE_ADDRESS: Address;
7
- declare const SAME_CHAIN_MODULE_ADDRESS: Address;
8
- export { OMNI_ACCOUNT_MOCK_ATTESTER_ADDRESS, RHINESTONE_MODULE_REGISTRY_ADDRESS, RHINESTONE_ATTESTER_ADDRESS, HOOK_ADDRESS, TARGET_MODULE_ADDRESS, SAME_CHAIN_MODULE_ADDRESS, };
9
- //# sourceMappingURL=omni-account.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"omni-account.d.ts","sourceRoot":"","sources":["../../../modules/omni-account.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,MAAM,CAAA;AAEnC,QAAA,MAAM,kCAAkC,EAAE,OACI,CAAA;AAE9C,QAAA,MAAM,kCAAkC,EAAE,OACI,CAAA;AAC9C,QAAA,MAAM,2BAA2B,EAAE,OACW,CAAA;AAE9C,QAAA,MAAM,YAAY,EAAE,OAAsD,CAAA;AAC1E,QAAA,MAAM,qBAAqB,EAAE,OACiB,CAAA;AAC9C,QAAA,MAAM,yBAAyB,EAAE,OACa,CAAA;AAE9C,OAAO,EACL,kCAAkC,EAClC,kCAAkC,EAClC,2BAA2B,EAC3B,YAAY,EACZ,qBAAqB,EACrB,yBAAyB,GAC1B,CAAA"}
@@ -1,7 +0,0 @@
1
- const OMNI_ACCOUNT_MOCK_ATTESTER_ADDRESS = '0x6D0515e8E499468DCe9583626f0cA15b887f9d03';
2
- const RHINESTONE_MODULE_REGISTRY_ADDRESS = '0x000000000069e2a187aeffb852bf3ccdc95151b2';
3
- const RHINESTONE_ATTESTER_ADDRESS = '0x000000333034E9f539ce08819E12c1b8Cb29084d';
4
- const HOOK_ADDRESS = '0x0000000000f6Ed8Be424d673c63eeFF8b9267420';
5
- const TARGET_MODULE_ADDRESS = '0x0000000000E5a37279A001301A837a91b5de1D5E';
6
- const SAME_CHAIN_MODULE_ADDRESS = '0x000000000043ff16d5776c7F0f65Ec485C17Ca04';
7
- export { OMNI_ACCOUNT_MOCK_ATTESTER_ADDRESS, RHINESTONE_MODULE_REGISTRY_ADDRESS, RHINESTONE_ATTESTER_ADDRESS, HOOK_ADDRESS, TARGET_MODULE_ADDRESS, SAME_CHAIN_MODULE_ADDRESS, };
@@ -1,23 +0,0 @@
1
- import { type Address, type Hex } from 'viem';
2
- import type { OwnerSet, RhinestoneAccountConfig } from '../../types';
3
- import { type Module } from '../common';
4
- interface PublicKey {
5
- prefix?: number | undefined;
6
- x: bigint;
7
- y: bigint;
8
- }
9
- interface WebauthnCredential {
10
- pubKey: PublicKey | Hex | Uint8Array;
11
- authenticatorId: string;
12
- hook?: Address;
13
- }
14
- declare function getOwnerValidator(config: RhinestoneAccountConfig): Module;
15
- declare function getMockSignature(ownerSet: OwnerSet): Hex;
16
- declare function getValidator(owners: OwnerSet): Module;
17
- declare function getOwnableValidator({ threshold, owners, }: {
18
- threshold: number;
19
- owners: Address[];
20
- }): Module;
21
- declare function getWebAuthnValidator(webAuthnCredential: WebauthnCredential): Module;
22
- export { getOwnerValidator, getValidator, getOwnableValidator, getWebAuthnValidator, getMockSignature, };
23
- //# sourceMappingURL=core.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"core.d.ts","sourceRoot":"","sources":["../../../../modules/validators/core.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,OAAO,EAIZ,KAAK,GAAG,EAIT,MAAM,MAAM,CAAA;AAEb,OAAO,KAAK,EAAE,QAAQ,EAAE,uBAAuB,EAAE,MAAM,aAAa,CAAA;AAEpE,OAAO,EAA4B,KAAK,MAAM,EAAE,MAAM,WAAW,CAAA;AAEjE,UAAU,SAAS;IACjB,MAAM,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAC3B,CAAC,EAAE,MAAM,CAAA;IACT,CAAC,EAAE,MAAM,CAAA;CACV;AAED,UAAU,kBAAkB;IAC1B,MAAM,EAAE,SAAS,GAAG,GAAG,GAAG,UAAU,CAAA;IACpC,eAAe,EAAE,MAAM,CAAA;IACvB,IAAI,CAAC,EAAE,OAAO,CAAA;CACf;AAYD,iBAAS,iBAAiB,CAAC,MAAM,EAAE,uBAAuB,UAEzD;AAED,iBAAS,gBAAgB,CAAC,QAAQ,EAAE,QAAQ,GAAG,GAAG,CAUjD;AAED,iBAAS,YAAY,CAAC,MAAM,EAAE,QAAQ,UAarC;AAED,iBAAS,mBAAmB,CAAC,EAC3B,SAAS,EACT,MAAM,GACP,EAAE;IACD,SAAS,EAAE,MAAM,CAAA;IACjB,MAAM,EAAE,OAAO,EAAE,CAAA;CAClB,GAAG,MAAM,CAiBT;AAED,iBAAS,oBAAoB,CAAC,kBAAkB,EAAE,kBAAkB,GAAG,MAAM,CAwD5E;AAeD,OAAO,EACL,iBAAiB,EACjB,YAAY,EACZ,mBAAmB,EACnB,oBAAoB,EACpB,gBAAgB,GACjB,CAAA"}
@@ -1,112 +0,0 @@
1
- import { bytesToHex, concat, encodeAbiParameters, hexToBytes, keccak256, toHex, } from 'viem';
2
- import { MODULE_TYPE_ID_VALIDATOR } from '../common.js';
3
- const OWNABLE_VALIDATOR_ADDRESS = '0x2483DA3A338895199E5e538530213157e931Bf06';
4
- const WEBAUTHN_VALIDATOR_ADDRESS = '0x2f167e55d42584f65e2e30a748f41ee75a311414';
5
- const ECDSA_MOCK_SIGNATURE = '0x81d4b4981670cb18f99f0b4a66446df1bf5b204d24cfcb659bf38ba27a4359b5711649ec2423c5e1247245eba2964679b6a1dbb85c992ae40b9b00c6935b02ff1b';
6
- const WEBAUTHN_MOCK_SIGNATURE = '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';
7
- function getOwnerValidator(config) {
8
- return getValidator(config.owners);
9
- }
10
- function getMockSignature(ownerSet) {
11
- switch (ownerSet.type) {
12
- case 'ecdsa': {
13
- const owners = ownerSet.accounts.map((account) => account.address);
14
- const signatures = owners.map(() => ECDSA_MOCK_SIGNATURE);
15
- return concat(signatures);
16
- }
17
- case 'passkey':
18
- return WEBAUTHN_MOCK_SIGNATURE;
19
- }
20
- }
21
- function getValidator(owners) {
22
- switch (owners.type) {
23
- case 'ecdsa':
24
- return getOwnableValidator({
25
- threshold: owners.threshold ?? 1,
26
- owners: owners.accounts.map((account) => account.address),
27
- });
28
- case 'passkey':
29
- return getWebAuthnValidator({
30
- pubKey: owners.account.publicKey,
31
- authenticatorId: owners.account.id,
32
- });
33
- }
34
- }
35
- function getOwnableValidator({ threshold, owners, }) {
36
- return {
37
- address: OWNABLE_VALIDATOR_ADDRESS,
38
- initData: encodeAbiParameters([
39
- { name: 'threshold', type: 'uint256' },
40
- { name: 'owners', type: 'address[]' },
41
- ], [
42
- BigInt(threshold),
43
- owners.map((owner) => owner.toLowerCase()).sort(),
44
- ]),
45
- deInitData: '0x',
46
- additionalContext: '0x',
47
- type: MODULE_TYPE_ID_VALIDATOR,
48
- };
49
- }
50
- function getWebAuthnValidator(webAuthnCredential) {
51
- let pubKeyX;
52
- let pubKeyY;
53
- // Distinguish between PublicKey and Hex / byte encoded public key
54
- if (typeof webAuthnCredential.pubKey === 'string' ||
55
- webAuthnCredential.pubKey instanceof Uint8Array) {
56
- // It's a P256Credential
57
- const { x, y, prefix } = parsePublicKey(webAuthnCredential.pubKey);
58
- pubKeyX = x;
59
- pubKeyY = y;
60
- if (prefix && prefix !== 4) {
61
- throw new Error('Only uncompressed public keys are supported');
62
- }
63
- }
64
- else {
65
- // It's already a PublicKey
66
- pubKeyX = webAuthnCredential.pubKey.x;
67
- pubKeyY = webAuthnCredential.pubKey.y;
68
- }
69
- return {
70
- address: WEBAUTHN_VALIDATOR_ADDRESS,
71
- initData: encodeAbiParameters([
72
- {
73
- components: [
74
- {
75
- name: 'pubKeyX',
76
- type: 'uint256',
77
- },
78
- {
79
- name: 'pubKeyY',
80
- type: 'uint256',
81
- },
82
- ],
83
- type: 'tuple',
84
- },
85
- {
86
- type: 'bytes32',
87
- name: 'authenticatorIdHash',
88
- },
89
- ], [
90
- {
91
- pubKeyX,
92
- pubKeyY,
93
- },
94
- keccak256(toHex(webAuthnCredential.authenticatorId)),
95
- ]),
96
- deInitData: '0x',
97
- additionalContext: '0x',
98
- type: MODULE_TYPE_ID_VALIDATOR,
99
- };
100
- }
101
- function parsePublicKey(publicKey) {
102
- const bytes = typeof publicKey === 'string' ? hexToBytes(publicKey) : publicKey;
103
- const offset = bytes.length === 65 ? 1 : 0;
104
- const x = bytes.slice(offset, 32 + offset);
105
- const y = bytes.slice(32 + offset, 64 + offset);
106
- return {
107
- prefix: bytes.length === 65 ? bytes[0] : undefined,
108
- x: BigInt(bytesToHex(x)),
109
- y: BigInt(bytesToHex(y)),
110
- };
111
- }
112
- export { getOwnerValidator, getValidator, getOwnableValidator, getWebAuthnValidator, getMockSignature, };
@@ -1,4 +0,0 @@
1
- import { getMockSignature, getOwnerValidator } from './core';
2
- import { encodeSmartSessionSignature, getAccountEIP712Domain, getEnableSessionCall, getPermissionId, getSessionAllowedERC7739Content, getSmartSessionValidator, isSessionEnabled, SMART_SESSION_MODE_ENABLE, SMART_SESSION_MODE_USE, SMART_SESSIONS_VALIDATOR_ADDRESS } from './smart-sessions';
3
- export { SMART_SESSION_MODE_USE, SMART_SESSION_MODE_ENABLE, SMART_SESSIONS_VALIDATOR_ADDRESS, getOwnerValidator, getSmartSessionValidator, getEnableSessionCall, encodeSmartSessionSignature, getPermissionId, getMockSignature, getAccountEIP712Domain, isSessionEnabled, getSessionAllowedERC7739Content, };
4
- //# sourceMappingURL=index.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../modules/validators/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,gBAAgB,EAAE,iBAAiB,EAAE,MAAM,QAAQ,CAAA;AAC5D,OAAO,EACL,2BAA2B,EAC3B,sBAAsB,EACtB,oBAAoB,EACpB,eAAe,EACf,+BAA+B,EAC/B,wBAAwB,EACxB,gBAAgB,EAChB,yBAAyB,EACzB,sBAAsB,EACtB,gCAAgC,EACjC,MAAM,kBAAkB,CAAA;AAEzB,OAAO,EACL,sBAAsB,EACtB,yBAAyB,EACzB,gCAAgC,EAChC,iBAAiB,EACjB,wBAAwB,EACxB,oBAAoB,EACpB,2BAA2B,EAC3B,eAAe,EACf,gBAAgB,EAChB,sBAAsB,EACtB,gBAAgB,EAChB,+BAA+B,GAChC,CAAA"}
@@ -1,3 +0,0 @@
1
- import { getMockSignature, getOwnerValidator } from './core.js';
2
- import { encodeSmartSessionSignature, getAccountEIP712Domain, getEnableSessionCall, getPermissionId, getSessionAllowedERC7739Content, getSmartSessionValidator, isSessionEnabled, SMART_SESSION_MODE_ENABLE, SMART_SESSION_MODE_USE, SMART_SESSIONS_VALIDATOR_ADDRESS, } from './smart-sessions.js';
3
- export { SMART_SESSION_MODE_USE, SMART_SESSION_MODE_ENABLE, SMART_SESSIONS_VALIDATOR_ADDRESS, getOwnerValidator, getSmartSessionValidator, getEnableSessionCall, encodeSmartSessionSignature, getPermissionId, getMockSignature, getAccountEIP712Domain, isSessionEnabled, getSessionAllowedERC7739Content, };
@@ -1,29 +0,0 @@
1
- import { type Address, type Chain, type Hex, type PublicClient } from 'viem';
2
- import type { RhinestoneAccountConfig, Session } from '../../types';
3
- import { type Module } from '../common';
4
- type SmartSessionModeType = typeof SMART_SESSION_MODE_USE | typeof SMART_SESSION_MODE_ENABLE | typeof SMART_SESSION_MODE_UNSAFE_ENABLE;
5
- declare const SMART_SESSIONS_VALIDATOR_ADDRESS: Address;
6
- declare const SMART_SESSION_MODE_USE = "0x00";
7
- declare const SMART_SESSION_MODE_ENABLE = "0x01";
8
- declare const SMART_SESSION_MODE_UNSAFE_ENABLE = "0x02";
9
- declare function getEnableSessionCall(chain: Chain, session: Session): Promise<{
10
- to: `0x${string}`;
11
- data: `0x${string}`;
12
- }>;
13
- declare function getSessionAllowedERC7739Content(chain: Chain): Promise<{
14
- appDomainSeparator: `0x${string}`;
15
- contentsType: string;
16
- }>;
17
- declare function getSmartSessionValidator(config: RhinestoneAccountConfig): Module | null;
18
- declare function isSessionEnabled(client: PublicClient, address: Address, permissionId: Hex): Promise<boolean>;
19
- declare function encodeSmartSessionSignature(mode: SmartSessionModeType, permissionId: Hex, signature: Hex): `0x${string}`;
20
- declare function getPermissionId(session: Session): `0x${string}`;
21
- declare function getAccountEIP712Domain(client: PublicClient, account: Address): Promise<{
22
- name: string;
23
- version: string;
24
- chainId: bigint;
25
- verifyingContract: `0x${string}`;
26
- salt: `0x${string}`;
27
- }>;
28
- export { SMART_SESSION_MODE_USE, SMART_SESSION_MODE_ENABLE, SMART_SESSIONS_VALIDATOR_ADDRESS, getSmartSessionValidator, getEnableSessionCall, encodeSmartSessionSignature, getPermissionId, getAccountEIP712Domain, isSessionEnabled, getSessionAllowedERC7739Content, };
29
- //# sourceMappingURL=smart-sessions.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"smart-sessions.d.ts","sourceRoot":"","sources":["../../../../modules/validators/smart-sessions.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,OAAO,EACZ,KAAK,KAAK,EAKV,KAAK,GAAG,EAIR,KAAK,YAAY,EAKlB,MAAM,MAAM,CAAA;AAMb,OAAO,KAAK,EAEV,uBAAuB,EACvB,OAAO,EAER,MAAM,aAAa,CAAA;AAEpB,OAAO,EAA4B,KAAK,MAAM,EAAE,MAAM,WAAW,CAAA;AA6DjE,KAAK,oBAAoB,GACrB,OAAO,sBAAsB,GAC7B,OAAO,yBAAyB,GAChC,OAAO,gCAAgC,CAAA;AAE3C,QAAA,MAAM,gCAAgC,EAAE,OACM,CAAA;AAE9C,QAAA,MAAM,sBAAsB,SAAS,CAAA;AACrC,QAAA,MAAM,yBAAyB,SAAS,CAAA;AACxC,QAAA,MAAM,gCAAgC,SAAS,CAAA;AAyB/C,iBAAe,oBAAoB,CAAC,KAAK,EAAE,KAAK,EAAE,OAAO,EAAE,OAAO;;;GAsBjE;AA6BD,iBAAe,+BAA+B,CAAC,KAAK,EAAE,KAAK;;;GAgB1D;AA0DD,iBAAS,wBAAwB,CAC/B,MAAM,EAAE,uBAAuB,GAC9B,MAAM,GAAG,IAAI,CAWf;AA8KD,iBAAe,gBAAgB,CAC7B,MAAM,EAAE,YAAY,EACpB,OAAO,EAAE,OAAO,EAChB,YAAY,EAAE,GAAG,oBAiClB;AAED,iBAAS,2BAA2B,CAClC,IAAI,EAAE,oBAAoB,EAC1B,YAAY,EAAE,GAAG,EACjB,SAAS,EAAE,GAAG,iBAcf;AAED,iBAAS,eAAe,CAAC,OAAO,EAAE,OAAO,iBAyBxC;AAED,iBAAe,sBAAsB,CAAC,MAAM,EAAE,YAAY,EAAE,OAAO,EAAE,OAAO;;;;;;GAoD3E;AAED,OAAO,EACL,sBAAsB,EACtB,yBAAyB,EACzB,gCAAgC,EAChC,wBAAwB,EACxB,oBAAoB,EACpB,2BAA2B,EAC3B,eAAe,EACf,sBAAsB,EACtB,gBAAgB,EAChB,+BAA+B,GAChC,CAAA"}
@@ -1,414 +0,0 @@
1
- import { createPublicClient, encodeAbiParameters, encodeFunctionData, encodePacked, http, isHex, keccak256, padHex, parseAbi, toHex, zeroHash, } from 'viem';
2
- import { getWethAddress, RHINESTONE_SPOKE_POOL_ADDRESS, } from '../../orchestrator/index.js';
3
- import { enableSessionsAbi } from '../abi/smart-sessions.js';
4
- import { MODULE_TYPE_ID_VALIDATOR } from '../common.js';
5
- import { HOOK_ADDRESS } from '../omni-account.js';
6
- import { getValidator } from './core.js';
7
- const SMART_SESSIONS_VALIDATOR_ADDRESS = '0x00000000002b0ecfbd0496ee71e01257da0e37de';
8
- const SMART_SESSION_MODE_USE = '0x00';
9
- const SMART_SESSION_MODE_ENABLE = '0x01';
10
- const SMART_SESSION_MODE_UNSAFE_ENABLE = '0x02';
11
- const SPENDING_LIMITS_POLICY_ADDRESS = '0x00000088D48cF102A8Cdb0137A9b173f957c6343';
12
- const TIME_FRAME_POLICY_ADDRESS = '0x8177451511dE0577b911C254E9551D981C26dc72';
13
- const SUDO_POLICY_ADDRESS = '0x0000003111cD8e92337C100F22B7A9dbf8DEE301';
14
- const UNIVERSAL_ACTION_POLICY_ADDRESS = '0x0000006DDA6c463511C4e9B05CFc34C1247fCF1F';
15
- const USAGE_LIMIT_POLICY_ADDRESS = '0x1F34eF8311345A3A4a4566aF321b313052F51493';
16
- const VALUE_LIMIT_POLICY_ADDRESS = '0x730DA93267E7E513e932301B47F2ac7D062abC83';
17
- const SMART_SESSIONS_FALLBACK_TARGET_FLAG = '0x0000000000000000000000000000000000000001';
18
- const SMART_SESSIONS_FALLBACK_TARGET_SELECTOR_FLAG = '0x00000001';
19
- const ACTION_CONDITION_EQUAL = 0;
20
- const ACTION_CONDITION_GREATER_THAN = 1;
21
- const ACTION_CONDITION_LESS_THAN = 2;
22
- const ACTION_CONDITION_GREATER_THAN_OR_EQUAL = 3;
23
- const ACTION_CONDITION_LESS_THAN_OR_EQUAL = 4;
24
- const ACTION_CONDITION_NOT_EQUAL = 5;
25
- const ACTION_CONDITION_IN_RANGE = 6;
26
- async function getEnableSessionCall(chain, session) {
27
- const { appDomainSeparator, contentsType } = await getSessionAllowedERC7739Content(chain);
28
- const allowedERC7739Content = [
29
- {
30
- appDomainSeparator,
31
- contentName: [contentsType],
32
- },
33
- ];
34
- const sessionData = await getSmartSessionData(chain, session, allowedERC7739Content);
35
- return {
36
- to: SMART_SESSIONS_VALIDATOR_ADDRESS,
37
- data: encodeFunctionData({
38
- abi: enableSessionsAbi,
39
- functionName: 'enableSessions',
40
- args: [[sessionData]],
41
- }),
42
- };
43
- }
44
- function getOmniAccountActions(chain) {
45
- const wethAddress = getWethAddress(chain);
46
- const omniActions = [
47
- {
48
- actionTarget: RHINESTONE_SPOKE_POOL_ADDRESS,
49
- actionTargetSelector: '0xa2418864', // injected execution
50
- actionPolicies: [getPolicyData({ type: 'sudo' })],
51
- },
52
- {
53
- actionTarget: HOOK_ADDRESS,
54
- actionTargetSelector: '0x27c777a9', // injected execution
55
- actionPolicies: [getPolicyData({ type: 'sudo' })],
56
- },
57
- {
58
- actionTarget: wethAddress,
59
- actionTargetSelector: '0xd0e30db0', // deposit
60
- actionPolicies: [getPolicyData({ type: 'sudo' })],
61
- },
62
- {
63
- actionTarget: wethAddress,
64
- actionTargetSelector: '0x2e1a7d4d', // widthdraw
65
- actionPolicies: [getPolicyData({ type: 'sudo' })],
66
- },
67
- ];
68
- return omniActions;
69
- }
70
- async function getSessionAllowedERC7739Content(chain) {
71
- const publicClient = createPublicClient({
72
- chain,
73
- transport: http(),
74
- });
75
- const appDomainSeparator = await publicClient.readContract({
76
- address: HOOK_ADDRESS,
77
- abi: parseAbi(['function DOMAIN_SEPARATOR() view returns (bytes32)']),
78
- functionName: 'DOMAIN_SEPARATOR',
79
- });
80
- const contentsType = 'MultichainCompact(address sponsor,uint256 nonce,uint256 expires,Segment[] segments)Segment(address arbiter,uint256 chainId,uint256[2][] idsAndAmounts,Witness witness)Witness(address recipient,uint256[2][] tokenOut,uint256 depositId,uint256 targetChain,uint32 fillDeadline,XchainExec[] execs,bytes32 userOpHash,uint32 maxFeeBps)XchainExec(address to,uint256 value,bytes data)';
81
- return {
82
- appDomainSeparator,
83
- contentsType,
84
- };
85
- }
86
- async function getSmartSessionData(chain, session, allowedERC7739Content) {
87
- const omniActions = getOmniAccountActions(chain);
88
- const sessionValidator = getValidator(session.owners);
89
- const userOpPolicies = (session.policies || [
90
- {
91
- type: 'sudo',
92
- },
93
- ]).map((policy) => {
94
- return getPolicyData(policy);
95
- });
96
- return {
97
- sessionValidator: sessionValidator.address,
98
- sessionValidatorInitData: sessionValidator.initData,
99
- salt: session.salt ?? zeroHash,
100
- userOpPolicies,
101
- // Using the fallback action by default (any transaction will pass)
102
- actions: (session.actions || [
103
- {
104
- target: SMART_SESSIONS_FALLBACK_TARGET_FLAG,
105
- selector: SMART_SESSIONS_FALLBACK_TARGET_SELECTOR_FLAG,
106
- },
107
- ])
108
- .map((action) => {
109
- const actionPolicies = (action.policies || [
110
- {
111
- type: 'sudo',
112
- },
113
- ]).map((policy) => {
114
- return getPolicyData(policy);
115
- });
116
- return {
117
- actionTargetSelector: action.selector,
118
- actionTarget: action.target,
119
- actionPolicies,
120
- };
121
- })
122
- .concat(omniActions),
123
- erc7739Policies: {
124
- allowedERC7739Content,
125
- erc1271Policies: [getPolicyData({ type: 'sudo' })],
126
- },
127
- permitERC4337Paymaster: true,
128
- };
129
- }
130
- function getSmartSessionValidator(config) {
131
- if (!config.sessions) {
132
- return null;
133
- }
134
- return {
135
- address: SMART_SESSIONS_VALIDATOR_ADDRESS,
136
- initData: '0x',
137
- deInitData: '0x',
138
- additionalContext: '0x',
139
- type: MODULE_TYPE_ID_VALIDATOR,
140
- };
141
- }
142
- function getPolicyData(policy) {
143
- switch (policy.type) {
144
- case 'sudo':
145
- return {
146
- policy: SUDO_POLICY_ADDRESS,
147
- initData: '0x',
148
- };
149
- case 'universal-action': {
150
- function getCondition(condition) {
151
- switch (condition) {
152
- case 'equal':
153
- return ACTION_CONDITION_EQUAL;
154
- case 'greaterThan':
155
- return ACTION_CONDITION_GREATER_THAN;
156
- case 'lessThan':
157
- return ACTION_CONDITION_LESS_THAN;
158
- case 'greaterThanOrEqual':
159
- return ACTION_CONDITION_GREATER_THAN_OR_EQUAL;
160
- case 'lessThanOrEqual':
161
- return ACTION_CONDITION_LESS_THAN_OR_EQUAL;
162
- case 'notEqual':
163
- return ACTION_CONDITION_NOT_EQUAL;
164
- case 'inRange':
165
- return ACTION_CONDITION_IN_RANGE;
166
- }
167
- }
168
- const MAX_RULES = 16;
169
- const rules = createFixedArray(MAX_RULES, () => ({
170
- condition: ACTION_CONDITION_EQUAL,
171
- offset: 0n,
172
- isLimited: false,
173
- ref: zeroHash,
174
- usage: { limit: 0n, used: 0n },
175
- }));
176
- for (let i = 0; i < policy.rules.length; i++) {
177
- const rule = policy.rules[i];
178
- const ref = isHex(rule.referenceValue)
179
- ? padHex(rule.referenceValue)
180
- : toHex(rule.referenceValue, { size: 32 });
181
- rules[i] = {
182
- condition: getCondition(rule.condition),
183
- offset: rule.calldataOffset,
184
- isLimited: rule.usageLimit !== undefined,
185
- ref,
186
- usage: {
187
- limit: rule.usageLimit ? rule.usageLimit : 0n,
188
- used: 0n,
189
- },
190
- };
191
- }
192
- return {
193
- policy: UNIVERSAL_ACTION_POLICY_ADDRESS,
194
- initData: encodeAbiParameters([
195
- {
196
- components: [
197
- {
198
- name: 'valueLimitPerUse',
199
- type: 'uint256',
200
- },
201
- {
202
- components: [
203
- {
204
- name: 'length',
205
- type: 'uint256',
206
- },
207
- {
208
- components: [
209
- {
210
- name: 'condition',
211
- type: 'uint8',
212
- },
213
- {
214
- name: 'offset',
215
- type: 'uint64',
216
- },
217
- {
218
- name: 'isLimited',
219
- type: 'bool',
220
- },
221
- {
222
- name: 'ref',
223
- type: 'bytes32',
224
- },
225
- {
226
- components: [
227
- {
228
- name: 'limit',
229
- type: 'uint256',
230
- },
231
- {
232
- name: 'used',
233
- type: 'uint256',
234
- },
235
- ],
236
- name: 'usage',
237
- type: 'tuple',
238
- },
239
- ],
240
- name: 'rules',
241
- type: 'tuple[16]',
242
- },
243
- ],
244
- name: 'paramRules',
245
- type: 'tuple',
246
- },
247
- ],
248
- name: 'ActionConfig',
249
- type: 'tuple',
250
- },
251
- ], [
252
- {
253
- valueLimitPerUse: policy.valueLimitPerUse ?? 0n,
254
- paramRules: {
255
- length: BigInt(policy.rules.length),
256
- rules: rules,
257
- },
258
- },
259
- ]),
260
- };
261
- }
262
- case 'spending-limits': {
263
- const tokens = policy.limits.map(({ token }) => token);
264
- const limits = policy.limits.map(({ amount }) => amount);
265
- return {
266
- policy: SPENDING_LIMITS_POLICY_ADDRESS,
267
- initData: encodeAbiParameters([{ type: 'address[]' }, { type: 'uint256[]' }], [tokens, limits]),
268
- };
269
- }
270
- case 'time-frame': {
271
- return {
272
- policy: TIME_FRAME_POLICY_ADDRESS,
273
- initData: encodePacked(['uint128', 'uint128'], [
274
- BigInt(policy.validUntil) / 1000n,
275
- BigInt(policy.validAfter) / 1000n,
276
- ]),
277
- };
278
- }
279
- case 'usage-limit': {
280
- return {
281
- policy: USAGE_LIMIT_POLICY_ADDRESS,
282
- initData: encodePacked(['uint128'], [policy.limit]),
283
- };
284
- }
285
- case 'value-limit': {
286
- return {
287
- policy: VALUE_LIMIT_POLICY_ADDRESS,
288
- initData: encodeAbiParameters([{ type: 'uint256' }], [policy.limit]),
289
- };
290
- }
291
- }
292
- }
293
- function createFixedArray(length, getValue) {
294
- return Array.from({ length }, (_, i) => getValue(i));
295
- }
296
- async function isSessionEnabled(client, address, permissionId) {
297
- return await client.readContract({
298
- address: SMART_SESSIONS_VALIDATOR_ADDRESS,
299
- abi: [
300
- {
301
- inputs: [
302
- {
303
- internalType: 'PermissionId',
304
- name: 'permissionId',
305
- type: 'bytes32',
306
- },
307
- {
308
- internalType: 'address',
309
- name: 'account',
310
- type: 'address',
311
- },
312
- ],
313
- name: 'isPermissionEnabled',
314
- outputs: [
315
- {
316
- internalType: 'bool',
317
- name: '',
318
- type: 'bool',
319
- },
320
- ],
321
- stateMutability: 'view',
322
- type: 'function',
323
- },
324
- ],
325
- functionName: 'isPermissionEnabled',
326
- args: [permissionId, address],
327
- });
328
- }
329
- function encodeSmartSessionSignature(mode, permissionId, signature) {
330
- switch (mode) {
331
- case SMART_SESSION_MODE_USE:
332
- return encodePacked(['bytes1', 'bytes32', 'bytes'], [mode, permissionId, signature]);
333
- case SMART_SESSION_MODE_ENABLE:
334
- case SMART_SESSION_MODE_UNSAFE_ENABLE:
335
- throw new Error('Enable mode not implemented');
336
- default:
337
- throw new Error(`Unknown mode ${mode}`);
338
- }
339
- }
340
- function getPermissionId(session) {
341
- const sessionValidator = getValidator(session.owners);
342
- return keccak256(encodeAbiParameters([
343
- {
344
- type: 'address',
345
- name: 'sessionValidator',
346
- },
347
- {
348
- type: 'bytes',
349
- name: 'sessionValidatorInitData',
350
- },
351
- {
352
- type: 'bytes32',
353
- name: 'salt',
354
- },
355
- ], [
356
- sessionValidator.address,
357
- sessionValidator.initData,
358
- session.salt ?? zeroHash,
359
- ]));
360
- }
361
- async function getAccountEIP712Domain(client, account) {
362
- const data = await client.readContract({
363
- address: account,
364
- abi: [
365
- {
366
- type: 'function',
367
- name: 'eip712Domain',
368
- inputs: [],
369
- outputs: [
370
- {
371
- type: 'bytes1',
372
- name: 'fields,',
373
- },
374
- {
375
- type: 'string',
376
- name: 'name',
377
- },
378
- {
379
- type: 'string',
380
- name: 'version',
381
- },
382
- {
383
- type: 'uint256',
384
- name: 'chainId',
385
- },
386
- {
387
- type: 'address',
388
- name: 'verifyingContract',
389
- },
390
- {
391
- type: 'bytes32',
392
- name: 'salt',
393
- },
394
- {
395
- type: 'uint256[]',
396
- name: 'extensions',
397
- },
398
- ],
399
- stateMutability: 'view',
400
- constant: true,
401
- },
402
- ],
403
- functionName: 'eip712Domain',
404
- args: [],
405
- });
406
- return {
407
- name: data[1],
408
- version: data[2],
409
- chainId: data[3],
410
- verifyingContract: data[4],
411
- salt: data[5],
412
- };
413
- }
414
- export { SMART_SESSION_MODE_USE, SMART_SESSION_MODE_ENABLE, SMART_SESSIONS_VALIDATOR_ADDRESS, getSmartSessionValidator, getEnableSessionCall, encodeSmartSessionSignature, getPermissionId, getAccountEIP712Domain, isSessionEnabled, getSessionAllowedERC7739Content, };
@@ -1,29 +0,0 @@
1
- import { type Address, type Hex } from 'viem';
2
- import type { UserOperation } from 'viem/account-abstraction';
3
- import type { BundleEvent, BundleResult, MetaIntent, OrderCostResult, OrderFeeInput, OrderPath, PostOrderBundleResult, SignedMultiChainCompact, UserTokenBalance } from './types';
4
- export declare class Orchestrator {
5
- private serverUrl;
6
- private apiKey;
7
- constructor(serverUrl: string, apiKey: string);
8
- getPortfolio(userAddress: Address, filter?: {
9
- chainIds?: number[];
10
- tokens?: {
11
- [chainId: number]: Address[];
12
- };
13
- }): Promise<UserTokenBalance[]>;
14
- getMaxTokenAmount(userAddress: Address, targetChainId: number, targetTokenAddress: Address, targetGasUnits: bigint): Promise<bigint>;
15
- getIntentCost(intent: OrderFeeInput, userAddress: Address): Promise<OrderCostResult>;
16
- getOrderPath(intent: MetaIntent, userAddress: Address): Promise<OrderPath>;
17
- postSignedOrderBundle(signedOrderBundles: {
18
- signedOrderBundle: SignedMultiChainCompact;
19
- initCode?: Hex;
20
- userOp?: UserOperation;
21
- }[]): Promise<PostOrderBundleResult>;
22
- getBundleStatus(bundleId: bigint): Promise<BundleResult>;
23
- getPendingBundles(count?: number, offset?: number): Promise<{
24
- pendingBundles: BundleEvent[];
25
- nextOffset?: number;
26
- }>;
27
- private parseError;
28
- }
29
- //# sourceMappingURL=client.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../../orchestrator/client.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,KAAK,OAAO,EAAU,KAAK,GAAG,EAAE,MAAM,MAAM,CAAA;AACrD,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAA;AAG7D,OAAO,KAAK,EACV,WAAW,EACX,YAAY,EACZ,UAAU,EACV,eAAe,EACf,aAAa,EACb,SAAS,EACT,qBAAqB,EACrB,uBAAuB,EACvB,gBAAgB,EACjB,MAAM,SAAS,CAAA;AAShB,qBAAa,YAAY;IACvB,OAAO,CAAC,SAAS,CAAQ;IACzB,OAAO,CAAC,MAAM,CAAQ;gBAEV,SAAS,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM;IAKvC,YAAY,CAChB,WAAW,EAAE,OAAO,EACpB,MAAM,CAAC,EAAE;QACP,QAAQ,CAAC,EAAE,MAAM,EAAE,CAAA;QACnB,MAAM,CAAC,EAAE;YACP,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,EAAE,CAAA;SAC7B,CAAA;KACF,GACA,OAAO,CAAC,gBAAgB,EAAE,CAAC;IAwCxB,iBAAiB,CACrB,WAAW,EAAE,OAAO,EACpB,aAAa,EAAE,MAAM,EACrB,kBAAkB,EAAE,OAAO,EAC3B,cAAc,EAAE,MAAM,GACrB,OAAO,CAAC,MAAM,CAAC;IAgCZ,aAAa,CACjB,MAAM,EAAE,aAAa,EACrB,WAAW,EAAE,OAAO,GACnB,OAAO,CAAC,eAAe,CAAC;IAqBrB,YAAY,CAChB,MAAM,EAAE,UAAU,EAClB,WAAW,EAAE,OAAO,GACnB,OAAO,CAAC,SAAS,CAAC;IAgCf,qBAAqB,CACzB,kBAAkB,EAAE;QAClB,iBAAiB,EAAE,uBAAuB,CAAA;QAC1C,QAAQ,CAAC,EAAE,GAAG,CAAA;QACd,MAAM,CAAC,EAAE,aAAa,CAAA;KACvB,EAAE,GACF,OAAO,CAAC,qBAAqB,CAAC;IA2C3B,eAAe,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,YAAY,CAAC;IAyBxD,iBAAiB,CACrB,KAAK,GAAE,MAAW,EAClB,MAAM,GAAE,MAAU,GACjB,OAAO,CAAC;QAAE,cAAc,EAAE,WAAW,EAAE,CAAC;QAAC,UAAU,CAAC,EAAE,MAAM,CAAA;KAAE,CAAC;IAuBlE,OAAO,CAAC,UAAU;CA6DnB"}