@veridex/sdk 1.0.0-beta.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +73 -0
- package/LICENSE +21 -0
- package/README.md +212 -0
- package/dist/chains/aptos/index.d.mts +140 -0
- package/dist/chains/aptos/index.d.ts +140 -0
- package/dist/chains/aptos/index.js +563 -0
- package/dist/chains/aptos/index.js.map +1 -0
- package/dist/chains/aptos/index.mjs +536 -0
- package/dist/chains/aptos/index.mjs.map +1 -0
- package/dist/chains/evm/index.d.mts +5 -0
- package/dist/chains/evm/index.d.ts +5 -0
- package/dist/chains/evm/index.js +1233 -0
- package/dist/chains/evm/index.js.map +1 -0
- package/dist/chains/evm/index.mjs +1205 -0
- package/dist/chains/evm/index.mjs.map +1 -0
- package/dist/chains/solana/index.d.mts +116 -0
- package/dist/chains/solana/index.d.ts +116 -0
- package/dist/chains/solana/index.js +513 -0
- package/dist/chains/solana/index.js.map +1 -0
- package/dist/chains/solana/index.mjs +491 -0
- package/dist/chains/solana/index.mjs.map +1 -0
- package/dist/chains/starknet/index.d.mts +172 -0
- package/dist/chains/starknet/index.d.ts +172 -0
- package/dist/chains/starknet/index.js +534 -0
- package/dist/chains/starknet/index.js.map +1 -0
- package/dist/chains/starknet/index.mjs +507 -0
- package/dist/chains/starknet/index.mjs.map +1 -0
- package/dist/chains/sui/index.d.mts +182 -0
- package/dist/chains/sui/index.d.ts +182 -0
- package/dist/chains/sui/index.js +560 -0
- package/dist/chains/sui/index.js.map +1 -0
- package/dist/chains/sui/index.mjs +533 -0
- package/dist/chains/sui/index.mjs.map +1 -0
- package/dist/constants.d.mts +150 -0
- package/dist/constants.d.ts +150 -0
- package/dist/constants.js +430 -0
- package/dist/constants.js.map +1 -0
- package/dist/constants.mjs +392 -0
- package/dist/constants.mjs.map +1 -0
- package/dist/index-0NXfbk0z.d.ts +637 -0
- package/dist/index-D0dLVjTA.d.mts +637 -0
- package/dist/index.d.mts +3101 -0
- package/dist/index.d.ts +3101 -0
- package/dist/index.js +13186 -0
- package/dist/index.js.map +1 -0
- package/dist/index.mjs +13011 -0
- package/dist/index.mjs.map +1 -0
- package/dist/payload.d.mts +125 -0
- package/dist/payload.d.ts +125 -0
- package/dist/payload.js +315 -0
- package/dist/payload.js.map +1 -0
- package/dist/payload.mjs +269 -0
- package/dist/payload.mjs.map +1 -0
- package/dist/queries/index.d.mts +148 -0
- package/dist/queries/index.d.ts +148 -0
- package/dist/queries/index.js +1533 -0
- package/dist/queries/index.js.map +1 -0
- package/dist/queries/index.mjs +1508 -0
- package/dist/queries/index.mjs.map +1 -0
- package/dist/types-ChIsqCiw.d.mts +565 -0
- package/dist/types-ChIsqCiw.d.ts +565 -0
- package/dist/types-FJL7j6gQ.d.mts +172 -0
- package/dist/types-FJL7j6gQ.d.ts +172 -0
- package/dist/types.d.mts +407 -0
- package/dist/types.d.ts +407 -0
- package/dist/types.js +19 -0
- package/dist/types.js.map +1 -0
- package/dist/types.mjs +1 -0
- package/dist/types.mjs.map +1 -0
- package/dist/utils.d.mts +81 -0
- package/dist/utils.d.ts +81 -0
- package/dist/utils.js +430 -0
- package/dist/utils.js.map +1 -0
- package/dist/utils.mjs +390 -0
- package/dist/utils.mjs.map +1 -0
- package/dist/wormhole.d.mts +167 -0
- package/dist/wormhole.d.ts +167 -0
- package/dist/wormhole.js +468 -0
- package/dist/wormhole.js.map +1 -0
- package/dist/wormhole.mjs +422 -0
- package/dist/wormhole.mjs.map +1 -0
- package/package.json +151 -0
package/dist/utils.mjs
ADDED
|
@@ -0,0 +1,390 @@
|
|
|
1
|
+
// src/utils.ts
|
|
2
|
+
import { ethers } from "ethers";
|
|
3
|
+
|
|
4
|
+
// src/constants.ts
|
|
5
|
+
var TESTNET_CHAINS = {
|
|
6
|
+
baseSepolia: {
|
|
7
|
+
name: "Base Sepolia",
|
|
8
|
+
chainId: 84532,
|
|
9
|
+
wormholeChainId: 10004,
|
|
10
|
+
rpcUrl: "https://sepolia.base.org",
|
|
11
|
+
// Public CORS-friendly RPC
|
|
12
|
+
explorerUrl: "https://sepolia.basescan.org",
|
|
13
|
+
isEvm: true,
|
|
14
|
+
contracts: {
|
|
15
|
+
hub: "0x66D87dE68327f48A099c5B9bE97020Feab9a7c82",
|
|
16
|
+
vaultFactory: "0x40D9B16094808Fa48e73598E31AB964Cf15b475f",
|
|
17
|
+
vaultImplementation: "0xcBEb49b0109E61c1C69C51D5D9483A3aD6D18258",
|
|
18
|
+
wormholeCoreBridge: "0x79A1027a6A159502049F10906D333EC57E95F083",
|
|
19
|
+
tokenBridge: "0x86F55A04690fd7815A3D802bD587e83eA888B239"
|
|
20
|
+
}
|
|
21
|
+
},
|
|
22
|
+
optimismSepolia: {
|
|
23
|
+
name: "Optimism Sepolia",
|
|
24
|
+
chainId: 11155420,
|
|
25
|
+
wormholeChainId: 10005,
|
|
26
|
+
rpcUrl: "https://sepolia.optimism.io",
|
|
27
|
+
explorerUrl: "https://sepolia-optimism.etherscan.io",
|
|
28
|
+
isEvm: true,
|
|
29
|
+
contracts: {
|
|
30
|
+
vaultFactory: "0xAbB421166E648953CDBE93c0078a0A794c56Fb84",
|
|
31
|
+
vaultImplementation: "0xDCD7daEf1AC06f4a8392957cca4834F7a16c058D",
|
|
32
|
+
wormholeCoreBridge: "0x31377888146f3253211EFEf5c676D41ECe7D58Fe",
|
|
33
|
+
tokenBridge: "0x99737Ec4B815d816c49A385943baf0380e75c0Ac"
|
|
34
|
+
}
|
|
35
|
+
},
|
|
36
|
+
arbitrumSepolia: {
|
|
37
|
+
name: "Arbitrum Sepolia",
|
|
38
|
+
chainId: 421614,
|
|
39
|
+
wormholeChainId: 10003,
|
|
40
|
+
rpcUrl: "https://sepolia-rollup.arbitrum.io/rpc",
|
|
41
|
+
explorerUrl: "https://sepolia.arbiscan.io",
|
|
42
|
+
isEvm: true,
|
|
43
|
+
contracts: {
|
|
44
|
+
vaultFactory: "0xd36D3D5DB59d78f1E33813490F72DABC15C9B07c",
|
|
45
|
+
vaultImplementation: "0xB10ACf39eBF17fc33F722cBD955b7aeCB0611bc4",
|
|
46
|
+
wormholeCoreBridge: "0x6b9C8671cdDC8dEab9c719bB87cBd3e782bA6a35",
|
|
47
|
+
tokenBridge: "0xC7A204bDBFe983FCD8d8E61D02b475D4073fF97e"
|
|
48
|
+
}
|
|
49
|
+
},
|
|
50
|
+
seiTestnet: {
|
|
51
|
+
name: "Sei Atlantic-2",
|
|
52
|
+
chainId: 1328,
|
|
53
|
+
wormholeChainId: 40,
|
|
54
|
+
rpcUrl: "https://evm-rpc-testnet.sei-apis.com",
|
|
55
|
+
explorerUrl: "https://seitrace.com/?chain=atlantic-2",
|
|
56
|
+
isEvm: true,
|
|
57
|
+
contracts: {
|
|
58
|
+
vaultFactory: "0x07F608AFf6d63b68029488b726d895c4Bb593038",
|
|
59
|
+
vaultImplementation: "0xD66153fccFB6731fB6c4944FbD607ba86A76a1f6",
|
|
60
|
+
wormholeCoreBridge: "0x0000000000000000000000000000000000000000"
|
|
61
|
+
// Mock - not yet deployed
|
|
62
|
+
}
|
|
63
|
+
},
|
|
64
|
+
solanaDevnet: {
|
|
65
|
+
name: "Solana Devnet",
|
|
66
|
+
chainId: 0,
|
|
67
|
+
wormholeChainId: 1,
|
|
68
|
+
rpcUrl: "https://api.devnet.solana.com",
|
|
69
|
+
explorerUrl: "https://explorer.solana.com",
|
|
70
|
+
isEvm: false,
|
|
71
|
+
contracts: {
|
|
72
|
+
hub: "AnyXHsqq9c2BiW4WgBcj6Aye7Ua7a7L7iSuwpfJxECJM",
|
|
73
|
+
wormholeCoreBridge: "3u8hJUVTA4jH1wYAyUur7FFZVQ8H635K3tSHHF4ssjQ5",
|
|
74
|
+
tokenBridge: "DZnkkTmCiFWfYTfT41X3Rd1kDgozqzxWaHqsw6W4x2oe"
|
|
75
|
+
}
|
|
76
|
+
},
|
|
77
|
+
aptosTestnet: {
|
|
78
|
+
name: "Aptos Testnet",
|
|
79
|
+
chainId: 0,
|
|
80
|
+
wormholeChainId: 22,
|
|
81
|
+
rpcUrl: "https://fullnode.testnet.aptoslabs.com/v1",
|
|
82
|
+
explorerUrl: "https://explorer.aptoslabs.com",
|
|
83
|
+
isEvm: false,
|
|
84
|
+
contracts: {
|
|
85
|
+
hub: "0x1a89da9e9f8f0bc90d8d492890bd55fb261c6277d2a95dfcac70c268d0c23dcc",
|
|
86
|
+
wormholeCoreBridge: "0x5bc11445584a763c1fa7ed39081f1b920954da14e04b32440cba863d03e19625",
|
|
87
|
+
tokenBridge: "0x576410486a2da45eee6c949c995670112ddf2fbeedab20350d506328eefc9d4f"
|
|
88
|
+
}
|
|
89
|
+
},
|
|
90
|
+
suiTestnet: {
|
|
91
|
+
name: "Sui Testnet",
|
|
92
|
+
chainId: 0,
|
|
93
|
+
wormholeChainId: 21,
|
|
94
|
+
rpcUrl: "https://fullnode.testnet.sui.io:443",
|
|
95
|
+
explorerUrl: "https://suiscan.xyz/testnet",
|
|
96
|
+
isEvm: false,
|
|
97
|
+
contracts: {
|
|
98
|
+
hub: "0x35e99fdbbc1cde7e093da6f9e758ba2c4a077904bd64caee2fa6db5e6c4e9e37",
|
|
99
|
+
wormholeCoreBridge: "0x31358d198147da50db32eda2562951d53973a0c0ad5ed738e9b17d88b213d790"
|
|
100
|
+
}
|
|
101
|
+
},
|
|
102
|
+
starknetSepolia: {
|
|
103
|
+
name: "Starknet Sepolia",
|
|
104
|
+
chainId: 0,
|
|
105
|
+
// Native Starknet chain ID (SN_SEPOLIA = 0x534e5f5345504f4c4941)
|
|
106
|
+
wormholeChainId: 50001,
|
|
107
|
+
// Custom chain ID (50000+ reserved for non-Wormhole chains)
|
|
108
|
+
rpcUrl: "https://starknet-sepolia.g.alchemy.com/starknet/version/rpc/v0_7/tsOnfTBZDKMXcUA26OED-",
|
|
109
|
+
explorerUrl: "https://sepolia.starkscan.co",
|
|
110
|
+
isEvm: false,
|
|
111
|
+
contracts: {
|
|
112
|
+
// Starknet spoke contract
|
|
113
|
+
hub: "0x68adcc730ed6c355200d00f763825448497b9cdf7936ca121711e078c88e811",
|
|
114
|
+
// Custom bridge contract (NOT Wormhole)
|
|
115
|
+
wormholeCoreBridge: "0x2c458c1ae64556482b05cc2d3ee5b032ed114d68429dda2062c9849a5a725f8"
|
|
116
|
+
},
|
|
117
|
+
// Hub chain ID that Starknet bridge validates (Base Sepolia = 10004)
|
|
118
|
+
hubChainId: 10004
|
|
119
|
+
}
|
|
120
|
+
};
|
|
121
|
+
var MAINNET_CHAINS = {
|
|
122
|
+
ethereum: {
|
|
123
|
+
name: "Ethereum",
|
|
124
|
+
chainId: 1,
|
|
125
|
+
wormholeChainId: 2,
|
|
126
|
+
rpcUrl: "https://eth.llamarpc.com",
|
|
127
|
+
explorerUrl: "https://etherscan.io",
|
|
128
|
+
isEvm: true,
|
|
129
|
+
contracts: {
|
|
130
|
+
wormholeCoreBridge: "0x98f3c9e6E3fAce36bAAd05FE09d375Ef1464288B",
|
|
131
|
+
tokenBridge: "0x3ee18B2214AFF97000D974cf647E7C347E8fa585"
|
|
132
|
+
}
|
|
133
|
+
},
|
|
134
|
+
base: {
|
|
135
|
+
name: "Base",
|
|
136
|
+
chainId: 8453,
|
|
137
|
+
wormholeChainId: 30,
|
|
138
|
+
rpcUrl: "https://mainnet.base.org",
|
|
139
|
+
explorerUrl: "https://basescan.org",
|
|
140
|
+
isEvm: true,
|
|
141
|
+
contracts: {
|
|
142
|
+
wormholeCoreBridge: "0xbebdb6C8ddC678FfA9f8748f85C815C556Dd8ac6",
|
|
143
|
+
tokenBridge: "0x8d2de8d2f73F1F4cAB472AC9A881C9b123C79627"
|
|
144
|
+
}
|
|
145
|
+
},
|
|
146
|
+
optimism: {
|
|
147
|
+
name: "Optimism",
|
|
148
|
+
chainId: 10,
|
|
149
|
+
wormholeChainId: 24,
|
|
150
|
+
rpcUrl: "https://mainnet.optimism.io",
|
|
151
|
+
explorerUrl: "https://optimistic.etherscan.io",
|
|
152
|
+
isEvm: true,
|
|
153
|
+
contracts: {
|
|
154
|
+
wormholeCoreBridge: "0xEe91C335eab126dF5fDB3797EA9d6aD93aeC9722",
|
|
155
|
+
tokenBridge: "0x1D68124e65faFC907325e3EDbF8c4d84499DAa8b"
|
|
156
|
+
}
|
|
157
|
+
},
|
|
158
|
+
arbitrum: {
|
|
159
|
+
name: "Arbitrum",
|
|
160
|
+
chainId: 42161,
|
|
161
|
+
wormholeChainId: 23,
|
|
162
|
+
rpcUrl: "https://arb1.arbitrum.io/rpc",
|
|
163
|
+
explorerUrl: "https://arbiscan.io",
|
|
164
|
+
isEvm: true,
|
|
165
|
+
contracts: {
|
|
166
|
+
wormholeCoreBridge: "0xa5f208e072434bC67592E4C49C1B991BA79BCA46",
|
|
167
|
+
tokenBridge: "0x0b2402144Bb366A632D14B83F244D2e0e21bD39c"
|
|
168
|
+
}
|
|
169
|
+
},
|
|
170
|
+
polygon: {
|
|
171
|
+
name: "Polygon",
|
|
172
|
+
chainId: 137,
|
|
173
|
+
wormholeChainId: 5,
|
|
174
|
+
rpcUrl: "https://polygon-rpc.com",
|
|
175
|
+
explorerUrl: "https://polygonscan.com",
|
|
176
|
+
isEvm: true,
|
|
177
|
+
contracts: {
|
|
178
|
+
wormholeCoreBridge: "0x7A4B5a56256163F07b2C80A7cA55aBE66c4ec4d7",
|
|
179
|
+
tokenBridge: "0x5a58505a96D1dbf8dF91cB21B54419FC36e93fdE"
|
|
180
|
+
}
|
|
181
|
+
},
|
|
182
|
+
solana: {
|
|
183
|
+
name: "Solana",
|
|
184
|
+
chainId: 0,
|
|
185
|
+
wormholeChainId: 1,
|
|
186
|
+
rpcUrl: "https://api.mainnet-beta.solana.com",
|
|
187
|
+
explorerUrl: "https://explorer.solana.com",
|
|
188
|
+
isEvm: false,
|
|
189
|
+
contracts: {
|
|
190
|
+
wormholeCoreBridge: "worm2ZoG2kUd4vFXhvjh93UUH596ayRfgQ2MgjNMTth",
|
|
191
|
+
tokenBridge: "wormDTUJ6AWPNvk59vGQbDvGJmqbDTdgWgAqcLBCgUb"
|
|
192
|
+
}
|
|
193
|
+
},
|
|
194
|
+
aptos: {
|
|
195
|
+
name: "Aptos",
|
|
196
|
+
chainId: 0,
|
|
197
|
+
wormholeChainId: 22,
|
|
198
|
+
rpcUrl: "https://fullnode.mainnet.aptoslabs.com/v1",
|
|
199
|
+
explorerUrl: "https://explorer.aptoslabs.com",
|
|
200
|
+
isEvm: false,
|
|
201
|
+
contracts: {
|
|
202
|
+
wormholeCoreBridge: "0x5bc11445584a763c1fa7ed39081f1b920954da14e04b32440cba863d03e19625",
|
|
203
|
+
tokenBridge: "0x576410486a2da45eee6c949c995670112ddf2fbeedab20350d506328eefc9d4f"
|
|
204
|
+
}
|
|
205
|
+
},
|
|
206
|
+
sui: {
|
|
207
|
+
name: "Sui",
|
|
208
|
+
chainId: 0,
|
|
209
|
+
wormholeChainId: 21,
|
|
210
|
+
rpcUrl: "https://fullnode.mainnet.sui.io:443",
|
|
211
|
+
explorerUrl: "https://suiscan.xyz/mainnet",
|
|
212
|
+
isEvm: false,
|
|
213
|
+
contracts: {
|
|
214
|
+
wormholeCoreBridge: "0xaeab97f96cf9877fee2883315d459552b2b921edc16d7ceac6eab944dd88919c"
|
|
215
|
+
}
|
|
216
|
+
}
|
|
217
|
+
};
|
|
218
|
+
|
|
219
|
+
// src/utils.ts
|
|
220
|
+
function base64URLEncode(buffer) {
|
|
221
|
+
const bytes = Array.from(buffer);
|
|
222
|
+
const binary = String.fromCharCode(...bytes);
|
|
223
|
+
const base64 = btoa(binary);
|
|
224
|
+
return base64.replace(/\+/g, "-").replace(/\//g, "_").replace(/=/g, "");
|
|
225
|
+
}
|
|
226
|
+
function base64URLDecode(str) {
|
|
227
|
+
const base64 = str.replace(/-/g, "+").replace(/_/g, "/");
|
|
228
|
+
const padded = base64 + "=".repeat((4 - base64.length % 4) % 4);
|
|
229
|
+
const binary = atob(padded);
|
|
230
|
+
const bytes = new Uint8Array(binary.length);
|
|
231
|
+
for (let i = 0; i < binary.length; i++) {
|
|
232
|
+
bytes[i] = binary.charCodeAt(i);
|
|
233
|
+
}
|
|
234
|
+
return bytes;
|
|
235
|
+
}
|
|
236
|
+
function parseDERSignature(signature) {
|
|
237
|
+
let offset = 0;
|
|
238
|
+
if (signature[offset++] !== 48) {
|
|
239
|
+
throw new Error("Invalid signature format");
|
|
240
|
+
}
|
|
241
|
+
offset++;
|
|
242
|
+
if (signature[offset++] !== 2) {
|
|
243
|
+
throw new Error("Invalid signature format");
|
|
244
|
+
}
|
|
245
|
+
const rLength = signature[offset++];
|
|
246
|
+
if (rLength === void 0) {
|
|
247
|
+
throw new Error("Invalid signature format: missing r length");
|
|
248
|
+
}
|
|
249
|
+
let r = signature.slice(offset, offset + rLength);
|
|
250
|
+
offset += rLength;
|
|
251
|
+
if (r[0] === 0 && r.length > 32) {
|
|
252
|
+
r = r.slice(1);
|
|
253
|
+
}
|
|
254
|
+
if (r.length < 32) {
|
|
255
|
+
const padded = new Uint8Array(32);
|
|
256
|
+
padded.set(r, 32 - r.length);
|
|
257
|
+
r = padded;
|
|
258
|
+
}
|
|
259
|
+
if (signature[offset++] !== 2) {
|
|
260
|
+
throw new Error("Invalid signature format");
|
|
261
|
+
}
|
|
262
|
+
const sLength = signature[offset++];
|
|
263
|
+
if (sLength === void 0) {
|
|
264
|
+
throw new Error("Invalid signature format: missing s length");
|
|
265
|
+
}
|
|
266
|
+
let s = signature.slice(offset, offset + sLength);
|
|
267
|
+
if (s[0] === 0 && s.length > 32) {
|
|
268
|
+
s = s.slice(1);
|
|
269
|
+
}
|
|
270
|
+
if (s.length < 32) {
|
|
271
|
+
const padded = new Uint8Array(32);
|
|
272
|
+
padded.set(s, 32 - s.length);
|
|
273
|
+
s = padded;
|
|
274
|
+
}
|
|
275
|
+
return { r, s };
|
|
276
|
+
}
|
|
277
|
+
function encodeSignatureForSolidity(r, s) {
|
|
278
|
+
return ethers.solidityPacked(["uint256", "uint256"], [r, s]);
|
|
279
|
+
}
|
|
280
|
+
function computeKeyHash(publicKeyX, publicKeyY) {
|
|
281
|
+
return ethers.keccak256(
|
|
282
|
+
ethers.solidityPacked(["uint256", "uint256"], [publicKeyX, publicKeyY])
|
|
283
|
+
);
|
|
284
|
+
}
|
|
285
|
+
function getChainConfig(chainName, testnet = true) {
|
|
286
|
+
const chains = testnet ? TESTNET_CHAINS : MAINNET_CHAINS;
|
|
287
|
+
return chains[chainName];
|
|
288
|
+
}
|
|
289
|
+
function getChainByWormholeId(wormholeChainId, testnet = true) {
|
|
290
|
+
const chains = testnet ? TESTNET_CHAINS : MAINNET_CHAINS;
|
|
291
|
+
return Object.values(chains).find((chain) => chain.wormholeChainId === wormholeChainId);
|
|
292
|
+
}
|
|
293
|
+
function getChainByEvmId(evmChainId, testnet = true) {
|
|
294
|
+
const chains = testnet ? TESTNET_CHAINS : MAINNET_CHAINS;
|
|
295
|
+
return Object.values(chains).find((chain) => chain.chainId === evmChainId);
|
|
296
|
+
}
|
|
297
|
+
function isEvmChain(wormholeChainId) {
|
|
298
|
+
const nonEvmChains = /* @__PURE__ */ new Set([1, 8, 15, 21, 22]);
|
|
299
|
+
return !nonEvmChains.has(wormholeChainId);
|
|
300
|
+
}
|
|
301
|
+
function getSupportedChains(testnet = true) {
|
|
302
|
+
const chains = testnet ? TESTNET_CHAINS : MAINNET_CHAINS;
|
|
303
|
+
return Object.values(chains);
|
|
304
|
+
}
|
|
305
|
+
function getTxExplorerUrl(chain, txHash) {
|
|
306
|
+
if (chain.isEvm) {
|
|
307
|
+
return `${chain.explorerUrl}/tx/${txHash}`;
|
|
308
|
+
}
|
|
309
|
+
switch (chain.wormholeChainId) {
|
|
310
|
+
case 1:
|
|
311
|
+
return `${chain.explorerUrl}/tx/${txHash}?cluster=devnet`;
|
|
312
|
+
case 21:
|
|
313
|
+
return `${chain.explorerUrl}/tx/${txHash}`;
|
|
314
|
+
case 22:
|
|
315
|
+
return `${chain.explorerUrl}/txn/${txHash}?network=testnet`;
|
|
316
|
+
default:
|
|
317
|
+
return `${chain.explorerUrl}/tx/${txHash}`;
|
|
318
|
+
}
|
|
319
|
+
}
|
|
320
|
+
function getAddressExplorerUrl(chain, address) {
|
|
321
|
+
if (chain.isEvm) {
|
|
322
|
+
return `${chain.explorerUrl}/address/${address}`;
|
|
323
|
+
}
|
|
324
|
+
switch (chain.wormholeChainId) {
|
|
325
|
+
case 1:
|
|
326
|
+
return `${chain.explorerUrl}/address/${address}?cluster=devnet`;
|
|
327
|
+
case 21:
|
|
328
|
+
return `${chain.explorerUrl}/account/${address}`;
|
|
329
|
+
case 22:
|
|
330
|
+
return `${chain.explorerUrl}/account/${address}?network=testnet`;
|
|
331
|
+
default:
|
|
332
|
+
return `${chain.explorerUrl}/address/${address}`;
|
|
333
|
+
}
|
|
334
|
+
}
|
|
335
|
+
function isValidEvmAddress(address) {
|
|
336
|
+
return ethers.isAddress(address);
|
|
337
|
+
}
|
|
338
|
+
function isValidBytes32(hex) {
|
|
339
|
+
const clean = hex.replace("0x", "");
|
|
340
|
+
return /^[0-9a-fA-F]{64}$/.test(clean);
|
|
341
|
+
}
|
|
342
|
+
function isValidWormholeChainId(chainId) {
|
|
343
|
+
return chainId >= 1 && chainId <= 5e4;
|
|
344
|
+
}
|
|
345
|
+
async function retryWithBackoff(fn, options = {}) {
|
|
346
|
+
const {
|
|
347
|
+
maxRetries = 5,
|
|
348
|
+
initialDelayMs = 1e3,
|
|
349
|
+
maxDelayMs = 3e4,
|
|
350
|
+
backoffMultiplier = 2,
|
|
351
|
+
onRetry
|
|
352
|
+
} = options;
|
|
353
|
+
let lastError;
|
|
354
|
+
let delay = initialDelayMs;
|
|
355
|
+
for (let attempt = 1; attempt <= maxRetries; attempt++) {
|
|
356
|
+
try {
|
|
357
|
+
return await fn();
|
|
358
|
+
} catch (error) {
|
|
359
|
+
lastError = error;
|
|
360
|
+
if (attempt < maxRetries) {
|
|
361
|
+
onRetry?.(attempt, lastError);
|
|
362
|
+
await sleep(delay);
|
|
363
|
+
delay = Math.min(delay * backoffMultiplier, maxDelayMs);
|
|
364
|
+
}
|
|
365
|
+
}
|
|
366
|
+
}
|
|
367
|
+
throw lastError ?? new Error("Retry failed");
|
|
368
|
+
}
|
|
369
|
+
function sleep(ms) {
|
|
370
|
+
return new Promise((resolve) => setTimeout(resolve, ms));
|
|
371
|
+
}
|
|
372
|
+
export {
|
|
373
|
+
base64URLDecode,
|
|
374
|
+
base64URLEncode,
|
|
375
|
+
computeKeyHash,
|
|
376
|
+
encodeSignatureForSolidity,
|
|
377
|
+
getAddressExplorerUrl,
|
|
378
|
+
getChainByEvmId,
|
|
379
|
+
getChainByWormholeId,
|
|
380
|
+
getChainConfig,
|
|
381
|
+
getSupportedChains,
|
|
382
|
+
getTxExplorerUrl,
|
|
383
|
+
isEvmChain,
|
|
384
|
+
isValidBytes32,
|
|
385
|
+
isValidEvmAddress,
|
|
386
|
+
isValidWormholeChainId,
|
|
387
|
+
parseDERSignature,
|
|
388
|
+
retryWithBackoff
|
|
389
|
+
};
|
|
390
|
+
//# sourceMappingURL=utils.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/utils.ts","../src/constants.ts"],"sourcesContent":["/**\n * Veridex Protocol SDK - Utility Functions\n */\n\nimport { ethers } from 'ethers';\nimport type { ChainConfig } from './types.js';\nimport { TESTNET_CHAINS, MAINNET_CHAINS } from './constants.js';\n\n// ============================================================================\n// Base64URL Encoding/Decoding (WebAuthn compatible)\n// ============================================================================\n\n/**\n * Base64URL encode a buffer\n */\nexport function base64URLEncode(buffer: Uint8Array): string {\n // Convert Uint8Array to base64 using browser APIs\n const bytes = Array.from(buffer);\n const binary = String.fromCharCode(...bytes);\n const base64 = btoa(binary);\n return base64.replace(/\\+/g, '-').replace(/\\//g, '_').replace(/=/g, '');\n}\n\n/**\n * Base64URL decode a string\n */\nexport function base64URLDecode(str: string): Uint8Array {\n const base64 = str.replace(/-/g, '+').replace(/_/g, '/');\n const padded = base64 + '='.repeat((4 - (base64.length % 4)) % 4);\n // Use browser's atob for base64 decoding\n const binary = atob(padded);\n const bytes = new Uint8Array(binary.length);\n for (let i = 0; i < binary.length; i++) {\n bytes[i] = binary.charCodeAt(i);\n }\n return bytes;\n}\n\n// ============================================================================\n// Signature Utilities\n// ============================================================================\n\n/**\n * Parse DER-encoded ECDSA signature to r and s values\n */\nexport function parseDERSignature(signature: Uint8Array): { r: Uint8Array; s: Uint8Array } {\n let offset = 0;\n\n if (signature[offset++] !== 0x30) {\n throw new Error('Invalid signature format');\n }\n\n // Skip total length\n offset++;\n\n if (signature[offset++] !== 0x02) {\n throw new Error('Invalid signature format');\n }\n\n const rLength = signature[offset++];\n if (rLength === undefined) {\n throw new Error('Invalid signature format: missing r length');\n }\n let r = signature.slice(offset, offset + rLength);\n offset += rLength;\n\n // Remove leading zero if present (for positive number representation)\n if (r[0] === 0x00 && r.length > 32) {\n r = r.slice(1);\n }\n // Pad to 32 bytes if needed\n if (r.length < 32) {\n const padded = new Uint8Array(32);\n padded.set(r, 32 - r.length);\n r = padded;\n }\n\n if (signature[offset++] !== 0x02) {\n throw new Error('Invalid signature format');\n }\n\n const sLength = signature[offset++];\n if (sLength === undefined) {\n throw new Error('Invalid signature format: missing s length');\n }\n let s = signature.slice(offset, offset + sLength);\n\n // Remove leading zero if present\n if (s[0] === 0x00 && s.length > 32) {\n s = s.slice(1);\n }\n // Pad to 32 bytes if needed\n if (s.length < 32) {\n const padded = new Uint8Array(32);\n padded.set(s, 32 - s.length);\n s = padded;\n }\n\n return { r, s };\n}\n\n/**\n * Encode signature for Solidity verification\n */\nexport function encodeSignatureForSolidity(r: bigint, s: bigint): string {\n return ethers.solidityPacked(['uint256', 'uint256'], [r, s]);\n}\n\n// ============================================================================\n// Key Hash Utilities\n// ============================================================================\n\n/**\n * Compute key hash from public key coordinates\n */\nexport function computeKeyHash(publicKeyX: bigint, publicKeyY: bigint): string {\n return ethers.keccak256(\n ethers.solidityPacked(['uint256', 'uint256'], [publicKeyX, publicKeyY])\n );\n}\n\n// ============================================================================\n// Chain Utilities\n// ============================================================================\n\n/**\n * Get chain config by name\n */\nexport function getChainConfig(chainName: string, testnet = true): ChainConfig | undefined {\n const chains = testnet ? TESTNET_CHAINS : MAINNET_CHAINS;\n return chains[chainName];\n}\n\n/**\n * Get chain config by Wormhole chain ID\n */\nexport function getChainByWormholeId(wormholeChainId: number, testnet = true): ChainConfig | undefined {\n const chains = testnet ? TESTNET_CHAINS : MAINNET_CHAINS;\n return Object.values(chains).find(chain => chain.wormholeChainId === wormholeChainId);\n}\n\n/**\n * Get chain config by EVM chain ID\n */\nexport function getChainByEvmId(evmChainId: number, testnet = true): ChainConfig | undefined {\n const chains = testnet ? TESTNET_CHAINS : MAINNET_CHAINS;\n return Object.values(chains).find(chain => chain.chainId === evmChainId);\n}\n\n/**\n * Check if a chain is EVM-compatible\n */\nexport function isEvmChain(wormholeChainId: number): boolean {\n // Non-EVM chains\n const nonEvmChains = new Set([1, 8, 15, 21, 22]); // Solana, Algorand, NEAR, Sui, Aptos\n return !nonEvmChains.has(wormholeChainId);\n}\n\n/**\n * Get all supported chains\n */\nexport function getSupportedChains(testnet = true): ChainConfig[] {\n const chains = testnet ? TESTNET_CHAINS : MAINNET_CHAINS;\n return Object.values(chains);\n}\n\n// ============================================================================\n// Explorer URL Utilities\n// ============================================================================\n\n/**\n * Get transaction explorer URL\n */\nexport function getTxExplorerUrl(chain: ChainConfig, txHash: string): string {\n if (chain.isEvm) {\n return `${chain.explorerUrl}/tx/${txHash}`;\n }\n\n // Non-EVM chains have different URL patterns\n switch (chain.wormholeChainId) {\n case 1: // Solana\n return `${chain.explorerUrl}/tx/${txHash}?cluster=devnet`;\n case 21: // Sui\n return `${chain.explorerUrl}/tx/${txHash}`;\n case 22: // Aptos\n return `${chain.explorerUrl}/txn/${txHash}?network=testnet`;\n default:\n return `${chain.explorerUrl}/tx/${txHash}`;\n }\n}\n\n/**\n * Get address explorer URL\n */\nexport function getAddressExplorerUrl(chain: ChainConfig, address: string): string {\n if (chain.isEvm) {\n return `${chain.explorerUrl}/address/${address}`;\n }\n\n switch (chain.wormholeChainId) {\n case 1: // Solana\n return `${chain.explorerUrl}/address/${address}?cluster=devnet`;\n case 21: // Sui\n return `${chain.explorerUrl}/account/${address}`;\n case 22: // Aptos\n return `${chain.explorerUrl}/account/${address}?network=testnet`;\n default:\n return `${chain.explorerUrl}/address/${address}`;\n }\n}\n\n// ============================================================================\n// Validation Utilities\n// ============================================================================\n\n/**\n * Validate an EVM address\n */\nexport function isValidEvmAddress(address: string): boolean {\n return ethers.isAddress(address);\n}\n\n/**\n * Validate a bytes32 hex string\n */\nexport function isValidBytes32(hex: string): boolean {\n const clean = hex.replace('0x', '');\n return /^[0-9a-fA-F]{64}$/.test(clean);\n}\n\n/**\n * Validate a Wormhole chain ID\n */\nexport function isValidWormholeChainId(chainId: number): boolean {\n // Valid Wormhole chain IDs range from 1 to ~10007 (testnets)\n return chainId >= 1 && chainId <= 50000;\n}\n\n// ============================================================================\n// Retry Utilities\n// ============================================================================\n\n/**\n * Retry a function with exponential backoff\n */\nexport async function retryWithBackoff<T>(\n fn: () => Promise<T>,\n options: {\n maxRetries?: number;\n initialDelayMs?: number;\n maxDelayMs?: number;\n backoffMultiplier?: number;\n onRetry?: (attempt: number, error: Error) => void;\n } = {}\n): Promise<T> {\n const {\n maxRetries = 5,\n initialDelayMs = 1000,\n maxDelayMs = 30000,\n backoffMultiplier = 2,\n onRetry,\n } = options;\n\n let lastError: Error | undefined;\n let delay = initialDelayMs;\n\n for (let attempt = 1; attempt <= maxRetries; attempt++) {\n try {\n return await fn();\n } catch (error) {\n lastError = error as Error;\n\n if (attempt < maxRetries) {\n onRetry?.(attempt, lastError);\n await sleep(delay);\n delay = Math.min(delay * backoffMultiplier, maxDelayMs);\n }\n }\n }\n\n throw lastError ?? new Error('Retry failed');\n}\n\n// ============================================================================\n// Helpers\n// ============================================================================\n\nfunction sleep(ms: number): Promise<void> {\n return new Promise(resolve => setTimeout(resolve, ms));\n}\n","/**\n * Veridex Protocol SDK - Constants and Chain Configurations\n */\n\nimport type { ChainConfig } from './types.js';\n\n// ============================================================================\n// Action Type Constants\n// ============================================================================\n\nexport const ACTION_TYPES = {\n TRANSFER: 1,\n EXECUTE: 2,\n CONFIG: 3,\n BRIDGE: 4,\n} as const;\n\nexport const ACTION_TRANSFER = 1;\nexport const ACTION_EXECUTE = 2;\nexport const ACTION_CONFIG = 3;\nexport const ACTION_BRIDGE = 4;\n\n// Protocol version\nexport const PROTOCOL_VERSION = 1;\n\n// ============================================================================\n// Wormhole Chain IDs\n// ============================================================================\n\n/**\n * Wormhole Chain IDs organized by network\n * @see https://docs.wormhole.com/wormhole/reference/constants\n */\nexport const WORMHOLE_CHAIN_IDS = {\n MAINNET: {\n SOLANA: 1,\n ETHEREUM: 2,\n TERRA: 3,\n BSC: 4,\n POLYGON: 5,\n AVALANCHE: 6,\n OASIS: 7,\n ALGORAND: 8,\n AURORA: 9,\n FANTOM: 10,\n KARURA: 11,\n ACALA: 12,\n KLAYTN: 13,\n CELO: 14,\n NEAR: 15,\n MOONBEAM: 16,\n NEON: 17,\n TERRA2: 18,\n INJECTIVE: 19,\n OSMOSIS: 20,\n SUI: 21,\n APTOS: 22,\n ARBITRUM: 23,\n OPTIMISM: 24,\n GNOSIS: 25,\n PYTHNET: 26,\n XPLA: 28,\n BASE: 30,\n SEI: 32,\n ROOTSTOCK: 33,\n SCROLL: 34,\n MANTLE: 35,\n BLAST: 36,\n XLAYER: 37,\n LINEA: 38,\n BERACHAIN: 39,\n SEIEVM: 40,\n },\n TESTNET: {\n SOLANA_DEVNET: 1,\n GOERLI: 2,\n BSC_TESTNET: 4,\n POLYGON_MUMBAI: 5,\n AVALANCHE_FUJI: 6,\n FANTOM_TESTNET: 10,\n CELO_ALFAJORES: 14,\n MOONBASE_ALPHA: 16,\n SUI_TESTNET: 21,\n APTOS_TESTNET: 22,\n SEPOLIA: 10002,\n ARBITRUM_SEPOLIA: 10003,\n BASE_SEPOLIA: 10004,\n OPTIMISM_SEPOLIA: 10005,\n HOLESKY: 10006,\n POLYGON_SEPOLIA: 10007,\n SEI_ATLANTIC_2: 10066, // Sei Arctic-1 testnet (EVM)\n STARKNET_SEPOLIA: 50001, // Custom bridge (non-Wormhole, relayer-attested)\n },\n} as const;\n\n// Legacy flat exports for backward compatibility\nexport const WORMHOLE_CHAIN_IDS_FLAT = {\n // Mainnets\n SOLANA: 1,\n ETHEREUM: 2,\n TERRA: 3,\n BSC: 4,\n POLYGON: 5,\n AVALANCHE: 6,\n OASIS: 7,\n ALGORAND: 8,\n AURORA: 9,\n FANTOM: 10,\n KARURA: 11,\n ACALA: 12,\n KLAYTN: 13,\n CELO: 14,\n NEAR: 15,\n MOONBEAM: 16,\n NEON: 17,\n TERRA2: 18,\n INJECTIVE: 19,\n OSMOSIS: 20,\n SUI: 21,\n APTOS: 22,\n ARBITRUM: 23,\n OPTIMISM: 24,\n GNOSIS: 25,\n PYTHNET: 26,\n XPLA: 28,\n BASE: 30,\n SEI: 32,\n ROOTSTOCK: 33,\n SCROLL: 34,\n MANTLE: 35,\n BLAST: 36,\n XLAYER: 37,\n LINEA: 38,\n BERACHAIN: 39,\n SEIEVM: 40,\n\n // Testnets\n SOLANA_DEVNET: 1,\n GOERLI: 2,\n BSC_TESTNET: 4,\n POLYGON_MUMBAI: 5,\n AVALANCHE_FUJI: 6,\n FANTOM_TESTNET: 10,\n CELO_ALFAJORES: 14,\n MOONBASE_ALPHA: 16,\n SUI_TESTNET: 21,\n APTOS_TESTNET: 22,\n ARBITRUM_SEPOLIA: 10003,\n BASE_SEPOLIA: 10004,\n OPTIMISM_SEPOLIA: 10005,\n POLYGON_SEPOLIA: 10007,\n HOLESKY: 10006,\n STARKNET_SEPOLIA: 50001, // Custom bridge (non-Wormhole)\n} as const;\n\n// ============================================================================\n// Testnet Chain Configurations\n// ============================================================================\n\nexport const TESTNET_CHAINS: Record<string, ChainConfig> = {\n baseSepolia: {\n name: 'Base Sepolia',\n chainId: 84532,\n wormholeChainId: 10004,\n rpcUrl: 'https://sepolia.base.org', // Public CORS-friendly RPC\n explorerUrl: 'https://sepolia.basescan.org',\n isEvm: true,\n contracts: {\n hub: '0x66D87dE68327f48A099c5B9bE97020Feab9a7c82',\n vaultFactory: '0x40D9B16094808Fa48e73598E31AB964Cf15b475f',\n vaultImplementation: '0xcBEb49b0109E61c1C69C51D5D9483A3aD6D18258',\n wormholeCoreBridge: '0x79A1027a6A159502049F10906D333EC57E95F083',\n tokenBridge: '0x86F55A04690fd7815A3D802bD587e83eA888B239',\n },\n },\n optimismSepolia: {\n name: 'Optimism Sepolia',\n chainId: 11155420,\n wormholeChainId: 10005,\n rpcUrl: 'https://sepolia.optimism.io',\n explorerUrl: 'https://sepolia-optimism.etherscan.io',\n isEvm: true,\n contracts: {\n vaultFactory: '0xAbB421166E648953CDBE93c0078a0A794c56Fb84',\n vaultImplementation: '0xDCD7daEf1AC06f4a8392957cca4834F7a16c058D',\n wormholeCoreBridge: '0x31377888146f3253211EFEf5c676D41ECe7D58Fe',\n tokenBridge: '0x99737Ec4B815d816c49A385943baf0380e75c0Ac',\n },\n },\n arbitrumSepolia: {\n name: 'Arbitrum Sepolia',\n chainId: 421614,\n wormholeChainId: 10003,\n rpcUrl: 'https://sepolia-rollup.arbitrum.io/rpc',\n explorerUrl: 'https://sepolia.arbiscan.io',\n isEvm: true,\n contracts: {\n vaultFactory: '0xd36D3D5DB59d78f1E33813490F72DABC15C9B07c',\n vaultImplementation: '0xB10ACf39eBF17fc33F722cBD955b7aeCB0611bc4',\n wormholeCoreBridge: '0x6b9C8671cdDC8dEab9c719bB87cBd3e782bA6a35',\n tokenBridge: '0xC7A204bDBFe983FCD8d8E61D02b475D4073fF97e',\n },\n },\n seiTestnet: {\n name: 'Sei Atlantic-2',\n chainId: 1328,\n wormholeChainId: 40,\n rpcUrl: 'https://evm-rpc-testnet.sei-apis.com',\n explorerUrl: 'https://seitrace.com/?chain=atlantic-2',\n isEvm: true,\n contracts: {\n vaultFactory: '0x07F608AFf6d63b68029488b726d895c4Bb593038',\n vaultImplementation: '0xD66153fccFB6731fB6c4944FbD607ba86A76a1f6',\n wormholeCoreBridge: '0x0000000000000000000000000000000000000000', // Mock - not yet deployed\n },\n },\n solanaDevnet: {\n name: 'Solana Devnet',\n chainId: 0,\n wormholeChainId: 1,\n rpcUrl: 'https://api.devnet.solana.com',\n explorerUrl: 'https://explorer.solana.com',\n isEvm: false,\n contracts: {\n hub: 'AnyXHsqq9c2BiW4WgBcj6Aye7Ua7a7L7iSuwpfJxECJM',\n wormholeCoreBridge: '3u8hJUVTA4jH1wYAyUur7FFZVQ8H635K3tSHHF4ssjQ5',\n tokenBridge: 'DZnkkTmCiFWfYTfT41X3Rd1kDgozqzxWaHqsw6W4x2oe',\n },\n },\n aptosTestnet: {\n name: 'Aptos Testnet',\n chainId: 0,\n wormholeChainId: 22,\n rpcUrl: 'https://fullnode.testnet.aptoslabs.com/v1',\n explorerUrl: 'https://explorer.aptoslabs.com',\n isEvm: false,\n contracts: {\n hub: '0x1a89da9e9f8f0bc90d8d492890bd55fb261c6277d2a95dfcac70c268d0c23dcc',\n wormholeCoreBridge: '0x5bc11445584a763c1fa7ed39081f1b920954da14e04b32440cba863d03e19625',\n tokenBridge: '0x576410486a2da45eee6c949c995670112ddf2fbeedab20350d506328eefc9d4f',\n },\n },\n suiTestnet: {\n name: 'Sui Testnet',\n chainId: 0,\n wormholeChainId: 21,\n rpcUrl: 'https://fullnode.testnet.sui.io:443',\n explorerUrl: 'https://suiscan.xyz/testnet',\n isEvm: false,\n contracts: {\n hub: '0x35e99fdbbc1cde7e093da6f9e758ba2c4a077904bd64caee2fa6db5e6c4e9e37',\n wormholeCoreBridge: '0x31358d198147da50db32eda2562951d53973a0c0ad5ed738e9b17d88b213d790',\n },\n },\n starknetSepolia: {\n name: 'Starknet Sepolia',\n chainId: 0, // Native Starknet chain ID (SN_SEPOLIA = 0x534e5f5345504f4c4941)\n wormholeChainId: 50001, // Custom chain ID (50000+ reserved for non-Wormhole chains)\n rpcUrl: 'https://starknet-sepolia.g.alchemy.com/starknet/version/rpc/v0_7/tsOnfTBZDKMXcUA26OED-',\n explorerUrl: 'https://sepolia.starkscan.co',\n isEvm: false,\n contracts: {\n // Starknet spoke contract\n hub: '0x68adcc730ed6c355200d00f763825448497b9cdf7936ca121711e078c88e811',\n // Custom bridge contract (NOT Wormhole)\n wormholeCoreBridge: '0x2c458c1ae64556482b05cc2d3ee5b032ed114d68429dda2062c9849a5a725f8',\n },\n // Hub chain ID that Starknet bridge validates (Base Sepolia = 10004)\n hubChainId: 10004,\n },\n};\n\n// ============================================================================\n// Mainnet Chain Configurations\n// ============================================================================\n\nexport const MAINNET_CHAINS: Record<string, ChainConfig> = {\n ethereum: {\n name: 'Ethereum',\n chainId: 1,\n wormholeChainId: 2,\n rpcUrl: 'https://eth.llamarpc.com',\n explorerUrl: 'https://etherscan.io',\n isEvm: true,\n contracts: {\n wormholeCoreBridge: '0x98f3c9e6E3fAce36bAAd05FE09d375Ef1464288B',\n tokenBridge: '0x3ee18B2214AFF97000D974cf647E7C347E8fa585',\n },\n },\n base: {\n name: 'Base',\n chainId: 8453,\n wormholeChainId: 30,\n rpcUrl: 'https://mainnet.base.org',\n explorerUrl: 'https://basescan.org',\n isEvm: true,\n contracts: {\n wormholeCoreBridge: '0xbebdb6C8ddC678FfA9f8748f85C815C556Dd8ac6',\n tokenBridge: '0x8d2de8d2f73F1F4cAB472AC9A881C9b123C79627',\n },\n },\n optimism: {\n name: 'Optimism',\n chainId: 10,\n wormholeChainId: 24,\n rpcUrl: 'https://mainnet.optimism.io',\n explorerUrl: 'https://optimistic.etherscan.io',\n isEvm: true,\n contracts: {\n wormholeCoreBridge: '0xEe91C335eab126dF5fDB3797EA9d6aD93aeC9722',\n tokenBridge: '0x1D68124e65faFC907325e3EDbF8c4d84499DAa8b',\n },\n },\n arbitrum: {\n name: 'Arbitrum',\n chainId: 42161,\n wormholeChainId: 23,\n rpcUrl: 'https://arb1.arbitrum.io/rpc',\n explorerUrl: 'https://arbiscan.io',\n isEvm: true,\n contracts: {\n wormholeCoreBridge: '0xa5f208e072434bC67592E4C49C1B991BA79BCA46',\n tokenBridge: '0x0b2402144Bb366A632D14B83F244D2e0e21bD39c',\n },\n },\n polygon: {\n name: 'Polygon',\n chainId: 137,\n wormholeChainId: 5,\n rpcUrl: 'https://polygon-rpc.com',\n explorerUrl: 'https://polygonscan.com',\n isEvm: true,\n contracts: {\n wormholeCoreBridge: '0x7A4B5a56256163F07b2C80A7cA55aBE66c4ec4d7',\n tokenBridge: '0x5a58505a96D1dbf8dF91cB21B54419FC36e93fdE',\n },\n },\n solana: {\n name: 'Solana',\n chainId: 0,\n wormholeChainId: 1,\n rpcUrl: 'https://api.mainnet-beta.solana.com',\n explorerUrl: 'https://explorer.solana.com',\n isEvm: false,\n contracts: {\n wormholeCoreBridge: 'worm2ZoG2kUd4vFXhvjh93UUH596ayRfgQ2MgjNMTth',\n tokenBridge: 'wormDTUJ6AWPNvk59vGQbDvGJmqbDTdgWgAqcLBCgUb',\n },\n },\n aptos: {\n name: 'Aptos',\n chainId: 0,\n wormholeChainId: 22,\n rpcUrl: 'https://fullnode.mainnet.aptoslabs.com/v1',\n explorerUrl: 'https://explorer.aptoslabs.com',\n isEvm: false,\n contracts: {\n wormholeCoreBridge: '0x5bc11445584a763c1fa7ed39081f1b920954da14e04b32440cba863d03e19625',\n tokenBridge: '0x576410486a2da45eee6c949c995670112ddf2fbeedab20350d506328eefc9d4f',\n },\n },\n sui: {\n name: 'Sui',\n chainId: 0,\n wormholeChainId: 21,\n rpcUrl: 'https://fullnode.mainnet.sui.io:443',\n explorerUrl: 'https://suiscan.xyz/mainnet',\n isEvm: false,\n contracts: {\n wormholeCoreBridge: '0xaeab97f96cf9877fee2883315d459552b2b921edc16d7ceac6eab944dd88919c',\n },\n },\n};\n\n// ============================================================================\n// Wormhole API Endpoints\n// ============================================================================\n\nexport const WORMHOLE_API = {\n MAINNET: 'https://api.wormholescan.io',\n TESTNET: 'https://api.testnet.wormholescan.io',\n GUARDIAN_RPC_MAINNET: 'https://wormhole-v2-mainnet-api.certus.one',\n GUARDIAN_RPC_TESTNET: 'https://wormhole-v2-testnet-api.certus.one',\n} as const;\n\n// ============================================================================\n// Hub Contract ABI (minimal)\n// ============================================================================\n\nexport const HUB_ABI = [\n 'function authenticateAndDispatch((bytes authenticatorData, string clientDataJSON, uint256 challengeIndex, uint256 typeIndex, uint256 r, uint256 s) auth, uint256 publicKeyX, uint256 publicKeyY, uint16 targetChain, bytes actionPayload) external payable returns (uint64 sequence)',\n 'function authenticateRawAndDispatch(uint256 r, uint256 s, bytes32 messageHash, uint256 publicKeyX, uint256 publicKeyY, uint16 targetChain, bytes actionPayload, uint256 nonce) external payable returns (uint64 sequence)',\n 'function getNonce(bytes32 userKeyHash) external view returns (uint256)',\n 'function encodeTransferAction(address token, address recipient, uint256 amount) external pure returns (bytes)',\n 'function encodeExecuteAction(address target, uint256 value, bytes data) external pure returns (bytes)',\n 'function encodeBridgeAction(bytes32 token, uint256 amount, uint16 targetChain, bytes32 recipient) external pure returns (bytes)',\n 'function messageFee() external view returns (uint256)',\n 'event Dispatched(bytes32 indexed userKeyHash, uint16 targetChain, uint256 nonce, uint64 sequence, bytes actionPayload)',\n] as const;\n\n// ============================================================================\n// Vault Factory ABI (minimal)\n// ============================================================================\n\nexport const VAULT_FACTORY_ABI = [\n 'function createVault(bytes32 userKeyHash) external returns (address)',\n 'function getVault(bytes32 userKeyHash) external view returns (address)',\n 'function vaultExists(bytes32 userKeyHash) external view returns (bool)',\n 'event VaultCreated(bytes32 indexed userKeyHash, address vault)',\n] as const;\n\n// ============================================================================\n// Vault ABI (minimal)\n// ============================================================================\n\nexport const VAULT_ABI = [\n 'function execute(address target, uint256 value, bytes data) external returns (bytes)',\n 'function executeFromHub(bytes32 vaaHash, uint16 emitterChain, bytes32 emitterAddress, bytes payload) external',\n 'function owner() external view returns (bytes32)',\n 'function hub() external view returns (address)',\n 'receive() external payable',\n] as const;\n"],"mappings":";AAIA,SAAS,cAAc;;;AC2JhB,IAAM,iBAA8C;AAAA,EACzD,aAAa;AAAA,IACX,MAAM;AAAA,IACN,SAAS;AAAA,IACT,iBAAiB;AAAA,IACjB,QAAQ;AAAA;AAAA,IACR,aAAa;AAAA,IACb,OAAO;AAAA,IACP,WAAW;AAAA,MACT,KAAK;AAAA,MACL,cAAc;AAAA,MACd,qBAAqB;AAAA,MACrB,oBAAoB;AAAA,MACpB,aAAa;AAAA,IACf;AAAA,EACF;AAAA,EACA,iBAAiB;AAAA,IACf,MAAM;AAAA,IACN,SAAS;AAAA,IACT,iBAAiB;AAAA,IACjB,QAAQ;AAAA,IACR,aAAa;AAAA,IACb,OAAO;AAAA,IACP,WAAW;AAAA,MACT,cAAc;AAAA,MACd,qBAAqB;AAAA,MACrB,oBAAoB;AAAA,MACpB,aAAa;AAAA,IACf;AAAA,EACF;AAAA,EACA,iBAAiB;AAAA,IACf,MAAM;AAAA,IACN,SAAS;AAAA,IACT,iBAAiB;AAAA,IACjB,QAAQ;AAAA,IACR,aAAa;AAAA,IACb,OAAO;AAAA,IACP,WAAW;AAAA,MACT,cAAc;AAAA,MACd,qBAAqB;AAAA,MACrB,oBAAoB;AAAA,MACpB,aAAa;AAAA,IACf;AAAA,EACF;AAAA,EACA,YAAY;AAAA,IACV,MAAM;AAAA,IACN,SAAS;AAAA,IACT,iBAAiB;AAAA,IACjB,QAAQ;AAAA,IACR,aAAa;AAAA,IACb,OAAO;AAAA,IACP,WAAW;AAAA,MACT,cAAc;AAAA,MACd,qBAAqB;AAAA,MACrB,oBAAoB;AAAA;AAAA,IACtB;AAAA,EACF;AAAA,EACA,cAAc;AAAA,IACZ,MAAM;AAAA,IACN,SAAS;AAAA,IACT,iBAAiB;AAAA,IACjB,QAAQ;AAAA,IACR,aAAa;AAAA,IACb,OAAO;AAAA,IACP,WAAW;AAAA,MACT,KAAK;AAAA,MACL,oBAAoB;AAAA,MACpB,aAAa;AAAA,IACf;AAAA,EACF;AAAA,EACA,cAAc;AAAA,IACZ,MAAM;AAAA,IACN,SAAS;AAAA,IACT,iBAAiB;AAAA,IACjB,QAAQ;AAAA,IACR,aAAa;AAAA,IACb,OAAO;AAAA,IACP,WAAW;AAAA,MACT,KAAK;AAAA,MACL,oBAAoB;AAAA,MACpB,aAAa;AAAA,IACf;AAAA,EACF;AAAA,EACA,YAAY;AAAA,IACV,MAAM;AAAA,IACN,SAAS;AAAA,IACT,iBAAiB;AAAA,IACjB,QAAQ;AAAA,IACR,aAAa;AAAA,IACb,OAAO;AAAA,IACP,WAAW;AAAA,MACT,KAAK;AAAA,MACL,oBAAoB;AAAA,IACtB;AAAA,EACF;AAAA,EACA,iBAAiB;AAAA,IACf,MAAM;AAAA,IACN,SAAS;AAAA;AAAA,IACT,iBAAiB;AAAA;AAAA,IACjB,QAAQ;AAAA,IACR,aAAa;AAAA,IACb,OAAO;AAAA,IACP,WAAW;AAAA;AAAA,MAET,KAAK;AAAA;AAAA,MAEL,oBAAoB;AAAA,IACtB;AAAA;AAAA,IAEA,YAAY;AAAA,EACd;AACF;AAMO,IAAM,iBAA8C;AAAA,EACzD,UAAU;AAAA,IACR,MAAM;AAAA,IACN,SAAS;AAAA,IACT,iBAAiB;AAAA,IACjB,QAAQ;AAAA,IACR,aAAa;AAAA,IACb,OAAO;AAAA,IACP,WAAW;AAAA,MACT,oBAAoB;AAAA,MACpB,aAAa;AAAA,IACf;AAAA,EACF;AAAA,EACA,MAAM;AAAA,IACJ,MAAM;AAAA,IACN,SAAS;AAAA,IACT,iBAAiB;AAAA,IACjB,QAAQ;AAAA,IACR,aAAa;AAAA,IACb,OAAO;AAAA,IACP,WAAW;AAAA,MACT,oBAAoB;AAAA,MACpB,aAAa;AAAA,IACf;AAAA,EACF;AAAA,EACA,UAAU;AAAA,IACR,MAAM;AAAA,IACN,SAAS;AAAA,IACT,iBAAiB;AAAA,IACjB,QAAQ;AAAA,IACR,aAAa;AAAA,IACb,OAAO;AAAA,IACP,WAAW;AAAA,MACT,oBAAoB;AAAA,MACpB,aAAa;AAAA,IACf;AAAA,EACF;AAAA,EACA,UAAU;AAAA,IACR,MAAM;AAAA,IACN,SAAS;AAAA,IACT,iBAAiB;AAAA,IACjB,QAAQ;AAAA,IACR,aAAa;AAAA,IACb,OAAO;AAAA,IACP,WAAW;AAAA,MACT,oBAAoB;AAAA,MACpB,aAAa;AAAA,IACf;AAAA,EACF;AAAA,EACA,SAAS;AAAA,IACP,MAAM;AAAA,IACN,SAAS;AAAA,IACT,iBAAiB;AAAA,IACjB,QAAQ;AAAA,IACR,aAAa;AAAA,IACb,OAAO;AAAA,IACP,WAAW;AAAA,MACT,oBAAoB;AAAA,MACpB,aAAa;AAAA,IACf;AAAA,EACF;AAAA,EACA,QAAQ;AAAA,IACN,MAAM;AAAA,IACN,SAAS;AAAA,IACT,iBAAiB;AAAA,IACjB,QAAQ;AAAA,IACR,aAAa;AAAA,IACb,OAAO;AAAA,IACP,WAAW;AAAA,MACT,oBAAoB;AAAA,MACpB,aAAa;AAAA,IACf;AAAA,EACF;AAAA,EACA,OAAO;AAAA,IACL,MAAM;AAAA,IACN,SAAS;AAAA,IACT,iBAAiB;AAAA,IACjB,QAAQ;AAAA,IACR,aAAa;AAAA,IACb,OAAO;AAAA,IACP,WAAW;AAAA,MACT,oBAAoB;AAAA,MACpB,aAAa;AAAA,IACf;AAAA,EACF;AAAA,EACA,KAAK;AAAA,IACH,MAAM;AAAA,IACN,SAAS;AAAA,IACT,iBAAiB;AAAA,IACjB,QAAQ;AAAA,IACR,aAAa;AAAA,IACb,OAAO;AAAA,IACP,WAAW;AAAA,MACT,oBAAoB;AAAA,IACtB;AAAA,EACF;AACF;;;ADrWO,SAAS,gBAAgB,QAA4B;AAE1D,QAAM,QAAQ,MAAM,KAAK,MAAM;AAC/B,QAAM,SAAS,OAAO,aAAa,GAAG,KAAK;AAC3C,QAAM,SAAS,KAAK,MAAM;AAC1B,SAAO,OAAO,QAAQ,OAAO,GAAG,EAAE,QAAQ,OAAO,GAAG,EAAE,QAAQ,MAAM,EAAE;AACxE;AAKO,SAAS,gBAAgB,KAAyB;AACvD,QAAM,SAAS,IAAI,QAAQ,MAAM,GAAG,EAAE,QAAQ,MAAM,GAAG;AACvD,QAAM,SAAS,SAAS,IAAI,QAAQ,IAAK,OAAO,SAAS,KAAM,CAAC;AAEhE,QAAM,SAAS,KAAK,MAAM;AAC1B,QAAM,QAAQ,IAAI,WAAW,OAAO,MAAM;AAC1C,WAAS,IAAI,GAAG,IAAI,OAAO,QAAQ,KAAK;AACtC,UAAM,CAAC,IAAI,OAAO,WAAW,CAAC;AAAA,EAChC;AACA,SAAO;AACT;AASO,SAAS,kBAAkB,WAAyD;AACzF,MAAI,SAAS;AAEb,MAAI,UAAU,QAAQ,MAAM,IAAM;AAChC,UAAM,IAAI,MAAM,0BAA0B;AAAA,EAC5C;AAGA;AAEA,MAAI,UAAU,QAAQ,MAAM,GAAM;AAChC,UAAM,IAAI,MAAM,0BAA0B;AAAA,EAC5C;AAEA,QAAM,UAAU,UAAU,QAAQ;AAClC,MAAI,YAAY,QAAW;AACzB,UAAM,IAAI,MAAM,4CAA4C;AAAA,EAC9D;AACA,MAAI,IAAI,UAAU,MAAM,QAAQ,SAAS,OAAO;AAChD,YAAU;AAGV,MAAI,EAAE,CAAC,MAAM,KAAQ,EAAE,SAAS,IAAI;AAClC,QAAI,EAAE,MAAM,CAAC;AAAA,EACf;AAEA,MAAI,EAAE,SAAS,IAAI;AACjB,UAAM,SAAS,IAAI,WAAW,EAAE;AAChC,WAAO,IAAI,GAAG,KAAK,EAAE,MAAM;AAC3B,QAAI;AAAA,EACN;AAEA,MAAI,UAAU,QAAQ,MAAM,GAAM;AAChC,UAAM,IAAI,MAAM,0BAA0B;AAAA,EAC5C;AAEA,QAAM,UAAU,UAAU,QAAQ;AAClC,MAAI,YAAY,QAAW;AACzB,UAAM,IAAI,MAAM,4CAA4C;AAAA,EAC9D;AACA,MAAI,IAAI,UAAU,MAAM,QAAQ,SAAS,OAAO;AAGhD,MAAI,EAAE,CAAC,MAAM,KAAQ,EAAE,SAAS,IAAI;AAClC,QAAI,EAAE,MAAM,CAAC;AAAA,EACf;AAEA,MAAI,EAAE,SAAS,IAAI;AACjB,UAAM,SAAS,IAAI,WAAW,EAAE;AAChC,WAAO,IAAI,GAAG,KAAK,EAAE,MAAM;AAC3B,QAAI;AAAA,EACN;AAEA,SAAO,EAAE,GAAG,EAAE;AAChB;AAKO,SAAS,2BAA2B,GAAW,GAAmB;AACvE,SAAO,OAAO,eAAe,CAAC,WAAW,SAAS,GAAG,CAAC,GAAG,CAAC,CAAC;AAC7D;AASO,SAAS,eAAe,YAAoB,YAA4B;AAC7E,SAAO,OAAO;AAAA,IACZ,OAAO,eAAe,CAAC,WAAW,SAAS,GAAG,CAAC,YAAY,UAAU,CAAC;AAAA,EACxE;AACF;AASO,SAAS,eAAe,WAAmB,UAAU,MAA+B;AACzF,QAAM,SAAS,UAAU,iBAAiB;AAC1C,SAAO,OAAO,SAAS;AACzB;AAKO,SAAS,qBAAqB,iBAAyB,UAAU,MAA+B;AACrG,QAAM,SAAS,UAAU,iBAAiB;AAC1C,SAAO,OAAO,OAAO,MAAM,EAAE,KAAK,WAAS,MAAM,oBAAoB,eAAe;AACtF;AAKO,SAAS,gBAAgB,YAAoB,UAAU,MAA+B;AAC3F,QAAM,SAAS,UAAU,iBAAiB;AAC1C,SAAO,OAAO,OAAO,MAAM,EAAE,KAAK,WAAS,MAAM,YAAY,UAAU;AACzE;AAKO,SAAS,WAAW,iBAAkC;AAE3D,QAAM,eAAe,oBAAI,IAAI,CAAC,GAAG,GAAG,IAAI,IAAI,EAAE,CAAC;AAC/C,SAAO,CAAC,aAAa,IAAI,eAAe;AAC1C;AAKO,SAAS,mBAAmB,UAAU,MAAqB;AAChE,QAAM,SAAS,UAAU,iBAAiB;AAC1C,SAAO,OAAO,OAAO,MAAM;AAC7B;AASO,SAAS,iBAAiB,OAAoB,QAAwB;AAC3E,MAAI,MAAM,OAAO;AACf,WAAO,GAAG,MAAM,WAAW,OAAO,MAAM;AAAA,EAC1C;AAGA,UAAQ,MAAM,iBAAiB;AAAA,IAC7B,KAAK;AACH,aAAO,GAAG,MAAM,WAAW,OAAO,MAAM;AAAA,IAC1C,KAAK;AACH,aAAO,GAAG,MAAM,WAAW,OAAO,MAAM;AAAA,IAC1C,KAAK;AACH,aAAO,GAAG,MAAM,WAAW,QAAQ,MAAM;AAAA,IAC3C;AACE,aAAO,GAAG,MAAM,WAAW,OAAO,MAAM;AAAA,EAC5C;AACF;AAKO,SAAS,sBAAsB,OAAoB,SAAyB;AACjF,MAAI,MAAM,OAAO;AACf,WAAO,GAAG,MAAM,WAAW,YAAY,OAAO;AAAA,EAChD;AAEA,UAAQ,MAAM,iBAAiB;AAAA,IAC7B,KAAK;AACH,aAAO,GAAG,MAAM,WAAW,YAAY,OAAO;AAAA,IAChD,KAAK;AACH,aAAO,GAAG,MAAM,WAAW,YAAY,OAAO;AAAA,IAChD,KAAK;AACH,aAAO,GAAG,MAAM,WAAW,YAAY,OAAO;AAAA,IAChD;AACE,aAAO,GAAG,MAAM,WAAW,YAAY,OAAO;AAAA,EAClD;AACF;AASO,SAAS,kBAAkB,SAA0B;AAC1D,SAAO,OAAO,UAAU,OAAO;AACjC;AAKO,SAAS,eAAe,KAAsB;AACnD,QAAM,QAAQ,IAAI,QAAQ,MAAM,EAAE;AAClC,SAAO,oBAAoB,KAAK,KAAK;AACvC;AAKO,SAAS,uBAAuB,SAA0B;AAE/D,SAAO,WAAW,KAAK,WAAW;AACpC;AASA,eAAsB,iBACpB,IACA,UAMI,CAAC,GACO;AACZ,QAAM;AAAA,IACJ,aAAa;AAAA,IACb,iBAAiB;AAAA,IACjB,aAAa;AAAA,IACb,oBAAoB;AAAA,IACpB;AAAA,EACF,IAAI;AAEJ,MAAI;AACJ,MAAI,QAAQ;AAEZ,WAAS,UAAU,GAAG,WAAW,YAAY,WAAW;AACtD,QAAI;AACF,aAAO,MAAM,GAAG;AAAA,IAClB,SAAS,OAAO;AACd,kBAAY;AAEZ,UAAI,UAAU,YAAY;AACxB,kBAAU,SAAS,SAAS;AAC5B,cAAM,MAAM,KAAK;AACjB,gBAAQ,KAAK,IAAI,QAAQ,mBAAmB,UAAU;AAAA,MACxD;AAAA,IACF;AAAA,EACF;AAEA,QAAM,aAAa,IAAI,MAAM,cAAc;AAC7C;AAMA,SAAS,MAAM,IAA2B;AACxC,SAAO,IAAI,QAAQ,aAAW,WAAW,SAAS,EAAE,CAAC;AACvD;","names":[]}
|
|
@@ -0,0 +1,167 @@
|
|
|
1
|
+
import { ethers } from 'ethers';
|
|
2
|
+
import { VAA, VeridexPayload } from './types.mjs';
|
|
3
|
+
|
|
4
|
+
/**
|
|
5
|
+
* Veridex Protocol SDK - Wormhole Utilities
|
|
6
|
+
*
|
|
7
|
+
* Functions for fetching VAAs, parsing messages, and interacting with Wormhole
|
|
8
|
+
*
|
|
9
|
+
* This module integrates with the official @wormhole-foundation/sdk patterns for
|
|
10
|
+
* better chain abstraction and reliability, while providing Veridex-specific
|
|
11
|
+
* utilities for payload handling and VAA management.
|
|
12
|
+
*/
|
|
13
|
+
|
|
14
|
+
/**
|
|
15
|
+
* Wormhole Consistency Levels
|
|
16
|
+
* @see https://docs.wormhole.com/wormhole/reference/glossary#consistency-level
|
|
17
|
+
*/
|
|
18
|
+
declare const CONSISTENCY_LEVELS: {
|
|
19
|
+
/** Finalized - Wait for block finality (most secure) */
|
|
20
|
+
readonly FINALIZED: 200;
|
|
21
|
+
/** Instant - No wait for finality (fastest, less secure) */
|
|
22
|
+
readonly INSTANT: 201;
|
|
23
|
+
/** Safe - Standard finality (deprecated, use FINALIZED) */
|
|
24
|
+
readonly SAFE: 200;
|
|
25
|
+
};
|
|
26
|
+
/**
|
|
27
|
+
* Guardian network configuration
|
|
28
|
+
*/
|
|
29
|
+
declare const GUARDIAN_CONFIG: {
|
|
30
|
+
/** Total number of guardians in mainnet */
|
|
31
|
+
readonly MAINNET_GUARDIAN_COUNT: 19;
|
|
32
|
+
/** Required signatures for mainnet quorum (13/19) */
|
|
33
|
+
readonly MAINNET_QUORUM: 13;
|
|
34
|
+
/** Total number of guardians in testnet */
|
|
35
|
+
readonly TESTNET_GUARDIAN_COUNT: 1;
|
|
36
|
+
/** Required signatures for testnet quorum */
|
|
37
|
+
readonly TESTNET_QUORUM: 1;
|
|
38
|
+
};
|
|
39
|
+
interface FetchVAAOptions {
|
|
40
|
+
testnet?: boolean;
|
|
41
|
+
maxRetries?: number;
|
|
42
|
+
retryDelayMs?: number;
|
|
43
|
+
onRetry?: (attempt: number, maxRetries: number) => void;
|
|
44
|
+
}
|
|
45
|
+
interface WaitForSignaturesOptions {
|
|
46
|
+
testnet?: boolean;
|
|
47
|
+
requiredSignatures?: number;
|
|
48
|
+
maxWaitMs?: number;
|
|
49
|
+
checkIntervalMs?: number;
|
|
50
|
+
onProgress?: (currentSignatures: number, required: number) => void;
|
|
51
|
+
}
|
|
52
|
+
/**
|
|
53
|
+
* Fetch a VAA from Wormhole guardians by sequence number
|
|
54
|
+
*
|
|
55
|
+
* @example
|
|
56
|
+
* ```ts
|
|
57
|
+
* const vaa = await fetchVAA(
|
|
58
|
+
* WORMHOLE_CHAIN_IDS.TESTNET.BASE_SEPOLIA,
|
|
59
|
+
* '0x000...hubAddress',
|
|
60
|
+
* 97n,
|
|
61
|
+
* { testnet: true }
|
|
62
|
+
* );
|
|
63
|
+
* ```
|
|
64
|
+
*/
|
|
65
|
+
declare function fetchVAA(emitterChain: number, emitterAddress: string, sequence: bigint, options?: FetchVAAOptions): Promise<string>;
|
|
66
|
+
/**
|
|
67
|
+
* Fetch VAA by transaction hash using operations API
|
|
68
|
+
* This is more reliable than the transactions API when sequence numbers don't match
|
|
69
|
+
*/
|
|
70
|
+
declare function fetchVAAByTxHash(txHash: string, options?: {
|
|
71
|
+
testnet?: boolean;
|
|
72
|
+
maxRetries?: number;
|
|
73
|
+
retryDelayMs?: number;
|
|
74
|
+
onRetry?: (attempt: number, maxRetries: number) => void;
|
|
75
|
+
}): Promise<string>;
|
|
76
|
+
/**
|
|
77
|
+
* Fetch VAA by transaction hash using transactions API (fallback)
|
|
78
|
+
*/
|
|
79
|
+
declare function fetchVAAByTxHashFallback(txHash: string, options?: {
|
|
80
|
+
testnet?: boolean;
|
|
81
|
+
maxRetries?: number;
|
|
82
|
+
retryDelayMs?: number;
|
|
83
|
+
onRetry?: (attempt: number, maxRetries: number) => void;
|
|
84
|
+
}): Promise<string>;
|
|
85
|
+
/**
|
|
86
|
+
* Parse a base64-encoded VAA into its components
|
|
87
|
+
*/
|
|
88
|
+
declare function parseVAA(vaaBase64: string): VAA;
|
|
89
|
+
/**
|
|
90
|
+
* Parse raw VAA bytes into its components
|
|
91
|
+
*/
|
|
92
|
+
declare function parseVAABytes(vaaBytes: Buffer): VAA;
|
|
93
|
+
/**
|
|
94
|
+
* Parse a Veridex-specific payload from a VAA
|
|
95
|
+
*/
|
|
96
|
+
declare function parseVeridexPayload(payloadHex: string): VeridexPayload;
|
|
97
|
+
/**
|
|
98
|
+
* Encode a VAA back to bytes for on-chain submission
|
|
99
|
+
*/
|
|
100
|
+
declare function encodeVAAToBytes(vaaBase64: string): string;
|
|
101
|
+
/**
|
|
102
|
+
* Encode VAA to bytes for Solana (returns Uint8Array)
|
|
103
|
+
*/
|
|
104
|
+
declare function encodeVAAForSolana(vaaBase64: string): Uint8Array;
|
|
105
|
+
/**
|
|
106
|
+
* Normalize an address to a 32-byte Wormhole emitter address format
|
|
107
|
+
*/
|
|
108
|
+
declare function normalizeEmitterAddress(address: string): string;
|
|
109
|
+
/**
|
|
110
|
+
* Convert a 32-byte emitter address back to a 20-byte EVM address
|
|
111
|
+
*/
|
|
112
|
+
declare function emitterToEvmAddress(emitterHex: string): string;
|
|
113
|
+
/**
|
|
114
|
+
* Extract the VAA sequence from a transaction receipt
|
|
115
|
+
*/
|
|
116
|
+
declare function getSequenceFromTxReceipt(provider: ethers.Provider, txHash: string, wormholeCoreBridge: string): Promise<bigint>;
|
|
117
|
+
/**
|
|
118
|
+
* Wait for a Wormhole message to be signed by guardians
|
|
119
|
+
*
|
|
120
|
+
* @example
|
|
121
|
+
* ```ts
|
|
122
|
+
* const vaa = await waitForGuardianSignatures(
|
|
123
|
+
* WORMHOLE_CHAIN_IDS.TESTNET.BASE_SEPOLIA,
|
|
124
|
+
* hubEmitter,
|
|
125
|
+
* 97n,
|
|
126
|
+
* {
|
|
127
|
+
* testnet: true,
|
|
128
|
+
* onProgress: (current, required) => console.log(`${current}/${required} signatures`)
|
|
129
|
+
* }
|
|
130
|
+
* );
|
|
131
|
+
* ```
|
|
132
|
+
*/
|
|
133
|
+
declare function waitForGuardianSignatures(emitterChain: number, emitterAddress: string, sequence: bigint, options?: WaitForSignaturesOptions): Promise<VAA>;
|
|
134
|
+
/**
|
|
135
|
+
* Get the Wormhole Core Bridge contract address for a chain
|
|
136
|
+
*/
|
|
137
|
+
declare function getWormholeCoreBridge(wormholeChainId: number, testnet?: boolean): string;
|
|
138
|
+
/**
|
|
139
|
+
* Get the Wormhole Token Bridge contract address for a chain
|
|
140
|
+
*/
|
|
141
|
+
declare function getWormholeTokenBridge(wormholeChainId: number, testnet?: boolean): string;
|
|
142
|
+
/**
|
|
143
|
+
* Get the Wormhole Relayer contract address for a chain
|
|
144
|
+
*/
|
|
145
|
+
declare function getWormholeRelayer(wormholeChainId: number, testnet?: boolean): string;
|
|
146
|
+
/**
|
|
147
|
+
* Check if a chain supports Wormhole Relayer
|
|
148
|
+
*/
|
|
149
|
+
declare function supportsRelayer(wormholeChainId: number, testnet?: boolean): boolean;
|
|
150
|
+
/**
|
|
151
|
+
* Get chain name from Wormhole chain ID
|
|
152
|
+
*/
|
|
153
|
+
declare function getChainName(wormholeChainId: number): string;
|
|
154
|
+
/**
|
|
155
|
+
* Validate that a VAA has sufficient signatures for the given network
|
|
156
|
+
*/
|
|
157
|
+
declare function hasQuorum(vaa: VAA, testnet?: boolean): boolean;
|
|
158
|
+
/**
|
|
159
|
+
* Validate VAA emitter matches expected source
|
|
160
|
+
*/
|
|
161
|
+
declare function validateEmitter(vaa: VAA, expectedChain: number, expectedAddress: string): boolean;
|
|
162
|
+
/**
|
|
163
|
+
* Convert an EVM address to bytes32 format (for Wormhole)
|
|
164
|
+
*/
|
|
165
|
+
declare function evmAddressToBytes32(address: string): string;
|
|
166
|
+
|
|
167
|
+
export { CONSISTENCY_LEVELS, type FetchVAAOptions, GUARDIAN_CONFIG, type WaitForSignaturesOptions, emitterToEvmAddress, encodeVAAForSolana, encodeVAAToBytes, evmAddressToBytes32, fetchVAA, fetchVAAByTxHash, fetchVAAByTxHashFallback, getChainName, getSequenceFromTxReceipt, getWormholeCoreBridge, getWormholeRelayer, getWormholeTokenBridge, hasQuorum, normalizeEmitterAddress, parseVAA, parseVAABytes, parseVeridexPayload, supportsRelayer, validateEmitter, waitForGuardianSignatures };
|