@solana/web3.js 1.30.2 → 1.31.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/lib/index.cjs.js CHANGED
@@ -15,7 +15,7 @@ var RpcClient = require('jayson/lib/client/browser');
15
15
  var http = require('http');
16
16
  var https = require('https');
17
17
  var secp256k1 = require('secp256k1');
18
- var jsSha3 = require('js-sha3');
18
+ var sha3 = require('js-sha3');
19
19
 
20
20
  function _interopDefaultLegacy (e) { return e && typeof e === 'object' && 'default' in e ? e : { 'default': e }; }
21
21
 
@@ -38,7 +38,6 @@ function _interopNamespace(e) {
38
38
  }
39
39
 
40
40
  var nacl__default = /*#__PURE__*/_interopDefaultLegacy(nacl);
41
- var nacl__namespace = /*#__PURE__*/_interopNamespace(nacl);
42
41
  var BN__default = /*#__PURE__*/_interopDefaultLegacy(BN);
43
42
  var bs58__default = /*#__PURE__*/_interopDefaultLegacy(bs58);
44
43
  var BufferLayout__namespace = /*#__PURE__*/_interopNamespace(BufferLayout);
@@ -47,6 +46,7 @@ var RpcClient__default = /*#__PURE__*/_interopDefaultLegacy(RpcClient);
47
46
  var http__default = /*#__PURE__*/_interopDefaultLegacy(http);
48
47
  var https__default = /*#__PURE__*/_interopDefaultLegacy(https);
49
48
  var secp256k1__default = /*#__PURE__*/_interopDefaultLegacy(secp256k1);
49
+ var sha3__default = /*#__PURE__*/_interopDefaultLegacy(sha3);
50
50
 
51
51
  const toBuffer = arr => {
52
52
  if (buffer.Buffer.isBuffer(arr)) {
@@ -2029,9 +2029,9 @@ class Account {
2029
2029
  this._keypair = void 0;
2030
2030
 
2031
2031
  if (secretKey) {
2032
- this._keypair = nacl__namespace.sign.keyPair.fromSecretKey(toBuffer(secretKey));
2032
+ this._keypair = nacl__default["default"].sign.keyPair.fromSecretKey(toBuffer(secretKey));
2033
2033
  } else {
2034
- this._keypair = nacl__namespace.sign.keyPair();
2034
+ this._keypair = nacl__default["default"].sign.keyPair();
2035
2035
  }
2036
2036
  }
2037
2037
  /**
@@ -7288,7 +7288,7 @@ class Keypair {
7288
7288
  if (keypair) {
7289
7289
  this._keypair = keypair;
7290
7290
  } else {
7291
- this._keypair = nacl__namespace.sign.keyPair();
7291
+ this._keypair = nacl__default["default"].sign.keyPair();
7292
7292
  }
7293
7293
  }
7294
7294
  /**
@@ -7297,7 +7297,7 @@ class Keypair {
7297
7297
 
7298
7298
 
7299
7299
  static generate() {
7300
- return new Keypair(nacl__namespace.sign.keyPair());
7300
+ return new Keypair(nacl__default["default"].sign.keyPair());
7301
7301
  }
7302
7302
  /**
7303
7303
  * Create a keypair from a raw secret key byte array.
@@ -7314,14 +7314,14 @@ class Keypair {
7314
7314
 
7315
7315
 
7316
7316
  static fromSecretKey(secretKey, options) {
7317
- const keypair = nacl__namespace.sign.keyPair.fromSecretKey(secretKey);
7317
+ const keypair = nacl__default["default"].sign.keyPair.fromSecretKey(secretKey);
7318
7318
 
7319
7319
  if (!options || !options.skipValidation) {
7320
7320
  const encoder = new TextEncoder();
7321
7321
  const signData = encoder.encode('@solana/web3.js-validation-v1');
7322
- const signature = nacl__namespace.sign.detached(signData, keypair.secretKey);
7322
+ const signature = nacl__default["default"].sign.detached(signData, keypair.secretKey);
7323
7323
 
7324
- if (!nacl__namespace.sign.detached.verify(signData, signature, keypair.publicKey)) {
7324
+ if (!nacl__default["default"].sign.detached.verify(signData, signature, keypair.publicKey)) {
7325
7325
  throw new Error('provided secretKey is invalid');
7326
7326
  }
7327
7327
  }
@@ -7336,7 +7336,7 @@ class Keypair {
7336
7336
 
7337
7337
 
7338
7338
  static fromSeed(seed) {
7339
- return new Keypair(nacl__namespace.sign.keyPair.fromSeed(seed));
7339
+ return new Keypair(nacl__default["default"].sign.keyPair.fromSeed(seed));
7340
7340
  }
7341
7341
  /**
7342
7342
  * The public key for this keypair
@@ -8228,7 +8228,7 @@ class Secp256k1Program {
8228
8228
  assert(publicKey.length === PUBLIC_KEY_BYTES, `Public key must be ${PUBLIC_KEY_BYTES} bytes but received ${publicKey.length} bytes`);
8229
8229
 
8230
8230
  try {
8231
- return buffer.Buffer.from(jsSha3.keccak_256.update(toBuffer(publicKey)).digest()).slice(-ETHEREUM_ADDRESS_BYTES);
8231
+ return buffer.Buffer.from(sha3__default["default"].keccak_256.update(toBuffer(publicKey)).digest()).slice(-ETHEREUM_ADDRESS_BYTES);
8232
8232
  } catch (error) {
8233
8233
  throw new Error(`Error constructing Ethereum address: ${error}`);
8234
8234
  }
@@ -8326,7 +8326,7 @@ class Secp256k1Program {
8326
8326
  const privateKey = toBuffer(pkey);
8327
8327
  const publicKey = publicKeyCreate(privateKey, false).slice(1); // throw away leading byte
8328
8328
 
8329
- const messageHash = buffer.Buffer.from(jsSha3.keccak_256.update(toBuffer(message)).digest());
8329
+ const messageHash = buffer.Buffer.from(sha3__default["default"].keccak_256.update(toBuffer(message)).digest());
8330
8330
  const {
8331
8331
  signature,
8332
8332
  recid: recoveryId