@taquito/signer 23.0.3 → 24.0.0-RC.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/lib/derivation-tools/ecdsa.js +43 -22
- package/dist/lib/derivation-tools/ed25519.js +2 -2
- package/dist/lib/derivation-tools/index.js +18 -3
- package/dist/lib/derivation-tools/types.js +4 -0
- package/dist/lib/ec-key.js +78 -61
- package/dist/lib/helpers.js +1 -1
- package/dist/lib/in-memory-signer.js +216 -0
- package/dist/lib/taquito-signer.js +4 -217
- package/dist/lib/version.js +2 -2
- package/dist/taquito-signer.es6.js +197 -208
- package/dist/taquito-signer.es6.js.map +1 -1
- package/dist/taquito-signer.umd.js +196 -209
- package/dist/taquito-signer.umd.js.map +1 -1
- package/dist/types/derivation-tools/ecdsa.d.ts +15 -10
- package/dist/types/derivation-tools/ed25519.d.ts +1 -1
- package/dist/types/derivation-tools/index.d.ts +1 -10
- package/dist/types/derivation-tools/types.d.ts +10 -0
- package/dist/types/ec-key.d.ts +5 -9
- package/dist/types/in-memory-signer.d.ts +60 -0
- package/dist/types/key-interface.d.ts +20 -0
- package/dist/types/taquito-signer.d.ts +5 -61
- package/package.json +8 -10
- package/dist/lib/import-key.js +0 -51
- package/dist/types/import-key.d.ts +0 -13
|
@@ -13,229 +13,16 @@ var __createBinding = (this && this.__createBinding) || (Object.create ? (functi
|
|
|
13
13
|
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
14
14
|
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
15
15
|
};
|
|
16
|
-
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
17
|
-
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
18
|
-
return new (P || (P = Promise))(function (resolve, reject) {
|
|
19
|
-
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
20
|
-
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
21
|
-
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
22
|
-
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
23
|
-
});
|
|
24
|
-
};
|
|
25
|
-
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
26
|
-
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
27
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
28
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
29
|
-
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
30
|
-
};
|
|
31
|
-
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
32
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
33
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
34
|
-
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
35
|
-
};
|
|
36
|
-
var _InMemorySigner_key;
|
|
37
16
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
38
|
-
exports.
|
|
39
|
-
exports.publicKeyFromString = publicKeyFromString;
|
|
17
|
+
exports.InvalidPassphraseError = exports.VERSION = void 0;
|
|
40
18
|
/**
|
|
41
19
|
* @packageDocumentation
|
|
42
20
|
* @module @taquito/signer
|
|
43
21
|
*/
|
|
44
|
-
|
|
45
|
-
const utils_1 = require("@taquito/utils");
|
|
46
|
-
const typedarray_to_buffer_1 = require("typedarray-to-buffer");
|
|
47
|
-
const ed_key_1 = require("./ed-key");
|
|
48
|
-
const ec_key_1 = require("./ec-key");
|
|
49
|
-
const pbkdf2_1 = require("pbkdf2");
|
|
50
|
-
const Bip39 = require("bip39");
|
|
51
|
-
const helpers_1 = require("./helpers");
|
|
52
|
-
const errors_1 = require("./errors");
|
|
53
|
-
const core_1 = require("@taquito/core");
|
|
54
|
-
const key_interface_1 = require("./key-interface");
|
|
55
|
-
const bls_key_1 = require("./bls-key");
|
|
56
|
-
__exportStar(require("./import-key"), exports);
|
|
22
|
+
__exportStar(require("./in-memory-signer"), exports);
|
|
57
23
|
var version_1 = require("./version");
|
|
58
24
|
Object.defineProperty(exports, "VERSION", { enumerable: true, get: function () { return version_1.VERSION; } });
|
|
59
25
|
__exportStar(require("./derivation-tools"), exports);
|
|
60
26
|
__exportStar(require("./helpers"), exports);
|
|
61
|
-
var
|
|
62
|
-
Object.defineProperty(exports, "InvalidPassphraseError", { enumerable: true, get: function () { return
|
|
63
|
-
/**
|
|
64
|
-
* @description A local implementation of the signer. Will represent a Tezos account and be able to produce signature in its behalf
|
|
65
|
-
*
|
|
66
|
-
* @warn If running in production and dealing with tokens that have real value, it is strongly recommended to use a HSM backed signer so that private key material is not stored in memory or on disk
|
|
67
|
-
* @throws {@link InvalidMnemonicError}
|
|
68
|
-
*/
|
|
69
|
-
class InMemorySigner {
|
|
70
|
-
static fromFundraiser(email, password, mnemonic) {
|
|
71
|
-
if (!Bip39.validateMnemonic(mnemonic)) {
|
|
72
|
-
throw new errors_1.InvalidMnemonicError(mnemonic);
|
|
73
|
-
}
|
|
74
|
-
const seed = Bip39.mnemonicToSeedSync(mnemonic, `${email}${password}`);
|
|
75
|
-
const key = (0, utils_1.b58Encode)(seed.subarray(0, 32), utils_1.PrefixV2.Ed25519Seed);
|
|
76
|
-
return new InMemorySigner(key);
|
|
77
|
-
}
|
|
78
|
-
static fromSecretKey(key, passphrase) {
|
|
79
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
80
|
-
return new InMemorySigner(key, passphrase);
|
|
81
|
-
});
|
|
82
|
-
}
|
|
83
|
-
/**
|
|
84
|
-
*
|
|
85
|
-
* @description Instantiation of an InMemorySigner instance from a mnemonic
|
|
86
|
-
* @param mnemonic 12-24 word mnemonic
|
|
87
|
-
* @param password password used to encrypt the mnemonic to seed value
|
|
88
|
-
* @param derivationPath default 44'/1729'/0'/0' (44'/1729' mandatory)
|
|
89
|
-
* @param curve currently only supported for tz1, tz2, tz3 addresses. soon bip25519
|
|
90
|
-
* @returns InMemorySigner
|
|
91
|
-
* @throws {@link InvalidMnemonicError}
|
|
92
|
-
*/
|
|
93
|
-
static fromMnemonic({ mnemonic, password = '', derivationPath = "44'/1729'/0'/0'", curve = 'ed25519', }) {
|
|
94
|
-
// check if curve is defined if not default tz1
|
|
95
|
-
if (!Bip39.validateMnemonic(mnemonic)) {
|
|
96
|
-
// avoiding exposing mnemonic again in case of mistake making invalid
|
|
97
|
-
throw new errors_1.InvalidMnemonicError(mnemonic);
|
|
98
|
-
}
|
|
99
|
-
const seed = Bip39.mnemonicToSeedSync(mnemonic, password);
|
|
100
|
-
const sk = (0, helpers_1.generateSecretKey)(seed, derivationPath, curve);
|
|
101
|
-
return new InMemorySigner(sk);
|
|
102
|
-
}
|
|
103
|
-
/**
|
|
104
|
-
*
|
|
105
|
-
* @param key Encoded private key
|
|
106
|
-
* @param passphrase Passphrase to decrypt the private key if it is encrypted
|
|
107
|
-
* @throws {@link InvalidKeyError}
|
|
108
|
-
*
|
|
109
|
-
*/
|
|
110
|
-
constructor(key, passphrase) {
|
|
111
|
-
_InMemorySigner_key.set(this, void 0);
|
|
112
|
-
const keyPrefixes = [
|
|
113
|
-
utils_1.PrefixV2.Ed25519EncryptedSeed,
|
|
114
|
-
utils_1.PrefixV2.Ed25519Seed,
|
|
115
|
-
utils_1.PrefixV2.Ed25519SecretKey,
|
|
116
|
-
utils_1.PrefixV2.Secp256k1EncryptedSecretKey,
|
|
117
|
-
utils_1.PrefixV2.Secp256k1SecretKey,
|
|
118
|
-
utils_1.PrefixV2.P256EncryptedSecretKey,
|
|
119
|
-
utils_1.PrefixV2.P256SecretKey,
|
|
120
|
-
utils_1.PrefixV2.BLS12_381EncryptedSecretKey,
|
|
121
|
-
utils_1.PrefixV2.BLS12_381SecretKey,
|
|
122
|
-
];
|
|
123
|
-
const pre = (() => {
|
|
124
|
-
try {
|
|
125
|
-
const [, pre] = (0, utils_1.b58DecodeAndCheckPrefix)(key, keyPrefixes);
|
|
126
|
-
return pre;
|
|
127
|
-
}
|
|
128
|
-
catch (_a) {
|
|
129
|
-
throw new core_1.InvalidKeyError(`Invalid private key, expecting one of the following prefixes '${keyPrefixes}'.`);
|
|
130
|
-
}
|
|
131
|
-
})();
|
|
132
|
-
const encrypted = pre === utils_1.PrefixV2.Ed25519EncryptedSeed ||
|
|
133
|
-
pre === utils_1.PrefixV2.Secp256k1EncryptedSecretKey ||
|
|
134
|
-
pre === utils_1.PrefixV2.P256EncryptedSecretKey ||
|
|
135
|
-
pre === utils_1.PrefixV2.BLS12_381EncryptedSecretKey;
|
|
136
|
-
let decrypt;
|
|
137
|
-
if (encrypted) {
|
|
138
|
-
if (!passphrase) {
|
|
139
|
-
throw new errors_1.InvalidPassphraseError('No passphrase provided to decrypt encrypted key');
|
|
140
|
-
}
|
|
141
|
-
decrypt = (data) => {
|
|
142
|
-
const salt = (0, typedarray_to_buffer_1.default)(data.slice(0, 8));
|
|
143
|
-
const encryptedSk = data.slice(8);
|
|
144
|
-
const encryptionKey = pbkdf2_1.default.pbkdf2Sync(passphrase, salt, 32768, 32, 'sha512');
|
|
145
|
-
const res = (0, nacl_1.openSecretBox)(new Uint8Array(encryptionKey), new Uint8Array(24), new Uint8Array(encryptedSk));
|
|
146
|
-
if (!res) {
|
|
147
|
-
throw new Error("can't decrypt secret key");
|
|
148
|
-
}
|
|
149
|
-
return res;
|
|
150
|
-
};
|
|
151
|
-
}
|
|
152
|
-
switch (pre) {
|
|
153
|
-
case utils_1.PrefixV2.Ed25519EncryptedSeed:
|
|
154
|
-
case utils_1.PrefixV2.Ed25519Seed:
|
|
155
|
-
case utils_1.PrefixV2.Ed25519SecretKey:
|
|
156
|
-
__classPrivateFieldSet(this, _InMemorySigner_key, new ed_key_1.EdKey(key, decrypt), "f");
|
|
157
|
-
break;
|
|
158
|
-
case utils_1.PrefixV2.Secp256k1EncryptedSecretKey:
|
|
159
|
-
case utils_1.PrefixV2.Secp256k1SecretKey:
|
|
160
|
-
case utils_1.PrefixV2.P256EncryptedSecretKey:
|
|
161
|
-
case utils_1.PrefixV2.P256SecretKey:
|
|
162
|
-
__classPrivateFieldSet(this, _InMemorySigner_key, new ec_key_1.ECKey(key, decrypt), "f");
|
|
163
|
-
break;
|
|
164
|
-
case utils_1.PrefixV2.BLS12_381EncryptedSecretKey:
|
|
165
|
-
case utils_1.PrefixV2.BLS12_381SecretKey:
|
|
166
|
-
__classPrivateFieldSet(this, _InMemorySigner_key, new bls_key_1.BLSKey(key, decrypt), "f");
|
|
167
|
-
break;
|
|
168
|
-
}
|
|
169
|
-
}
|
|
170
|
-
/**
|
|
171
|
-
*
|
|
172
|
-
* @param bytes Bytes to sign
|
|
173
|
-
* @param watermark Watermark to append to the bytes
|
|
174
|
-
*/
|
|
175
|
-
sign(message, watermark) {
|
|
176
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
177
|
-
const msg = typeof message == 'string' ? (0, utils_1.hex2buf)(message) : message;
|
|
178
|
-
const watermarkMsg = watermark !== undefined ? (0, utils_1.mergebuf)(watermark, msg) : msg;
|
|
179
|
-
const { rawSignature, sig: signature, prefixSig: prefixedSignature, } = yield __classPrivateFieldGet(this, _InMemorySigner_key, "f").sign(watermarkMsg);
|
|
180
|
-
return {
|
|
181
|
-
bytes: (0, utils_1.buf2hex)(msg),
|
|
182
|
-
sig: signature,
|
|
183
|
-
prefixSig: prefixedSignature,
|
|
184
|
-
sbytes: (0, utils_1.buf2hex)((0, utils_1.mergebuf)(msg,
|
|
185
|
-
// bls only Signature_prefix ff03 ref:https://octez.tezos.com/docs/shell/p2p_api.html#signature-prefix-tag-255 & https://octez.tezos.com/docs/shell/p2p_api.html#bls-prefix-tag-3
|
|
186
|
-
(0, key_interface_1.isPOP)(__classPrivateFieldGet(this, _InMemorySigner_key, "f")) ? (0, utils_1.mergebuf)(new Uint8Array([255, 3]), rawSignature) : rawSignature)),
|
|
187
|
-
};
|
|
188
|
-
});
|
|
189
|
-
}
|
|
190
|
-
provePossession() {
|
|
191
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
192
|
-
if ((0, key_interface_1.isPOP)(__classPrivateFieldGet(this, _InMemorySigner_key, "f"))) {
|
|
193
|
-
return __classPrivateFieldGet(this, _InMemorySigner_key, "f").provePossession();
|
|
194
|
-
}
|
|
195
|
-
else {
|
|
196
|
-
throw new core_1.ProhibitedActionError('Only BLS keys can prove possession');
|
|
197
|
-
}
|
|
198
|
-
});
|
|
199
|
-
}
|
|
200
|
-
get canProvePossession() {
|
|
201
|
-
return (0, key_interface_1.isPOP)(__classPrivateFieldGet(this, _InMemorySigner_key, "f"));
|
|
202
|
-
}
|
|
203
|
-
/**
|
|
204
|
-
* @returns Encoded public key
|
|
205
|
-
*/
|
|
206
|
-
publicKey() {
|
|
207
|
-
return Promise.resolve(String(__classPrivateFieldGet(this, _InMemorySigner_key, "f").publicKey()));
|
|
208
|
-
}
|
|
209
|
-
/**
|
|
210
|
-
* @returns Encoded public key hash
|
|
211
|
-
*/
|
|
212
|
-
publicKeyHash() {
|
|
213
|
-
return Promise.resolve(__classPrivateFieldGet(this, _InMemorySigner_key, "f").publicKey().hash());
|
|
214
|
-
}
|
|
215
|
-
/**
|
|
216
|
-
* @returns Encoded private key
|
|
217
|
-
*/
|
|
218
|
-
secretKey() {
|
|
219
|
-
return Promise.resolve(__classPrivateFieldGet(this, _InMemorySigner_key, "f").secretKey());
|
|
220
|
-
}
|
|
221
|
-
}
|
|
222
|
-
exports.InMemorySigner = InMemorySigner;
|
|
223
|
-
_InMemorySigner_key = new WeakMap();
|
|
224
|
-
function publicKeyFromString(src) {
|
|
225
|
-
const [keyData, pre] = (0, utils_1.b58DecodeAndCheckPrefix)(src, [
|
|
226
|
-
utils_1.PrefixV2.Ed25519PublicKey,
|
|
227
|
-
utils_1.PrefixV2.Secp256k1PublicKey,
|
|
228
|
-
utils_1.PrefixV2.P256PublicKey,
|
|
229
|
-
utils_1.PrefixV2.BLS12_381PublicKey,
|
|
230
|
-
]);
|
|
231
|
-
switch (pre) {
|
|
232
|
-
case utils_1.PrefixV2.Ed25519PublicKey:
|
|
233
|
-
return new ed_key_1.EdPublicKey(keyData);
|
|
234
|
-
case utils_1.PrefixV2.Secp256k1PublicKey:
|
|
235
|
-
return new ec_key_1.ECPublicKey(keyData, 'secp256k1');
|
|
236
|
-
case utils_1.PrefixV2.P256PublicKey:
|
|
237
|
-
return new ec_key_1.ECPublicKey(keyData, 'p256');
|
|
238
|
-
case utils_1.PrefixV2.BLS12_381PublicKey:
|
|
239
|
-
return new bls_key_1.BLSPublicKey(keyData);
|
|
240
|
-
}
|
|
241
|
-
}
|
|
27
|
+
var errors_1 = require("./errors");
|
|
28
|
+
Object.defineProperty(exports, "InvalidPassphraseError", { enumerable: true, get: function () { return errors_1.InvalidPassphraseError; } });
|
package/dist/lib/version.js
CHANGED
|
@@ -3,6 +3,6 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
3
3
|
exports.VERSION = void 0;
|
|
4
4
|
// IMPORTANT: THIS FILE IS AUTO GENERATED! DO NOT MANUALLY EDIT OR CHECKIN!
|
|
5
5
|
exports.VERSION = {
|
|
6
|
-
"commitHash": "
|
|
7
|
-
"version": "
|
|
6
|
+
"commitHash": "0e66f21b0164a7add990b5c0d60698086daece99",
|
|
7
|
+
"version": "24.0.0-RC.0"
|
|
8
8
|
};
|