@veridex/sdk 1.0.0-beta.21 → 1.0.0-beta.23

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (113) hide show
  1. package/dist/EVMClient-CoOR_ywD.d.mts +332 -0
  2. package/dist/auth/prepareAuth.d.mts +1 -1
  3. package/dist/auth/prepareAuth.js +749 -3
  4. package/dist/auth/prepareAuth.js.map +1 -1
  5. package/dist/auth/prepareAuth.mjs +25 -1404
  6. package/dist/auth/prepareAuth.mjs.map +1 -1
  7. package/dist/chains/aptos/index.d.mts +1 -1
  8. package/dist/chains/aptos/index.mjs +5 -574
  9. package/dist/chains/aptos/index.mjs.map +1 -1
  10. package/dist/chains/avalanche/index.d.mts +137 -0
  11. package/dist/chains/avalanche/index.js +1407 -0
  12. package/dist/chains/avalanche/index.js.map +1 -0
  13. package/dist/chains/avalanche/index.mjs +10 -0
  14. package/dist/chains/avalanche/index.mjs.map +1 -0
  15. package/dist/chains/evm/index.d.mts +4 -2
  16. package/dist/chains/evm/index.mjs +8 -1200
  17. package/dist/chains/evm/index.mjs.map +1 -1
  18. package/dist/chains/solana/index.d.mts +1 -1
  19. package/dist/chains/solana/index.mjs +4 -486
  20. package/dist/chains/solana/index.mjs.map +1 -1
  21. package/dist/chains/stacks/index.d.mts +1 -1
  22. package/dist/chains/stacks/index.mjs +36 -1114
  23. package/dist/chains/stacks/index.mjs.map +1 -1
  24. package/dist/chains/starknet/index.d.mts +1 -1
  25. package/dist/chains/starknet/index.mjs +5 -503
  26. package/dist/chains/starknet/index.mjs.map +1 -1
  27. package/dist/chains/sui/index.d.mts +1 -1
  28. package/dist/chains/sui/index.mjs +5 -529
  29. package/dist/chains/sui/index.mjs.map +1 -1
  30. package/dist/chunk-3Q34PMHU.mjs +840 -0
  31. package/dist/chunk-3Q34PMHU.mjs.map +1 -0
  32. package/dist/chunk-72ZA3OYQ.mjs +20 -0
  33. package/dist/chunk-72ZA3OYQ.mjs.map +1 -0
  34. package/dist/chunk-7IEUU6LD.mjs +549 -0
  35. package/dist/chunk-7IEUU6LD.mjs.map +1 -0
  36. package/dist/chunk-ABLEEC5N.mjs +38 -0
  37. package/dist/chunk-ABLEEC5N.mjs.map +1 -0
  38. package/dist/chunk-AORSW75A.mjs +1101 -0
  39. package/dist/chunk-AORSW75A.mjs.map +1 -0
  40. package/dist/chunk-BKTCPT7P.mjs +269 -0
  41. package/dist/chunk-BKTCPT7P.mjs.map +1 -0
  42. package/dist/chunk-CCHASDAI.mjs +330 -0
  43. package/dist/chunk-CCHASDAI.mjs.map +1 -0
  44. package/dist/chunk-FQ2WU7PX.mjs +509 -0
  45. package/dist/chunk-FQ2WU7PX.mjs.map +1 -0
  46. package/dist/chunk-JO74ENTF.mjs +417 -0
  47. package/dist/chunk-JO74ENTF.mjs.map +1 -0
  48. package/dist/chunk-K73Y36KS.mjs +407 -0
  49. package/dist/chunk-K73Y36KS.mjs.map +1 -0
  50. package/dist/chunk-KHV3EP3I.mjs +179 -0
  51. package/dist/chunk-KHV3EP3I.mjs.map +1 -0
  52. package/dist/chunk-MMSTOW4F.mjs +722 -0
  53. package/dist/chunk-MMSTOW4F.mjs.map +1 -0
  54. package/dist/chunk-MWZ5UHCF.mjs +1082 -0
  55. package/dist/chunk-MWZ5UHCF.mjs.map +1 -0
  56. package/dist/chunk-NU6JGI7L.mjs +565 -0
  57. package/dist/chunk-NU6JGI7L.mjs.map +1 -0
  58. package/dist/chunk-PIC2Y5DF.mjs +422 -0
  59. package/dist/chunk-PIC2Y5DF.mjs.map +1 -0
  60. package/dist/chunk-PPN7BG3A.mjs +464 -0
  61. package/dist/chunk-PPN7BG3A.mjs.map +1 -0
  62. package/dist/chunk-RSV7J43V.mjs +438 -0
  63. package/dist/chunk-RSV7J43V.mjs.map +1 -0
  64. package/dist/chunk-UTT6KI7N.mjs +216 -0
  65. package/dist/chunk-UTT6KI7N.mjs.map +1 -0
  66. package/dist/constants.mjs +16 -389
  67. package/dist/constants.mjs.map +1 -1
  68. package/dist/index-Du1PoZqu.d.mts +216 -0
  69. package/dist/index.d.mts +131 -9
  70. package/dist/index.js +12064 -11594
  71. package/dist/index.js.map +1 -1
  72. package/dist/index.mjs +4407 -12273
  73. package/dist/index.mjs.map +1 -1
  74. package/dist/passkey.d.mts +142 -0
  75. package/dist/passkey.js +807 -0
  76. package/dist/passkey.js.map +1 -0
  77. package/dist/passkey.mjs +15 -0
  78. package/dist/passkey.mjs.map +1 -0
  79. package/dist/payload.mjs +25 -244
  80. package/dist/payload.mjs.map +1 -1
  81. package/dist/portfolio-UV3LLWKI.mjs +13 -0
  82. package/dist/portfolio-UV3LLWKI.mjs.map +1 -0
  83. package/dist/queries/index.js +39 -1
  84. package/dist/queries/index.js.map +1 -1
  85. package/dist/queries/index.mjs +14 -1591
  86. package/dist/queries/index.mjs.map +1 -1
  87. package/dist/{types-DakHNZIP.d.ts → types-Bmk689Lw.d.mts} +1 -1
  88. package/dist/types.d.mts +10 -0
  89. package/dist/types.js.map +1 -1
  90. package/dist/utils.mjs +19 -385
  91. package/dist/utils.mjs.map +1 -1
  92. package/dist/wormhole.mjs +25 -397
  93. package/dist/wormhole.mjs.map +1 -1
  94. package/package.json +17 -3
  95. package/scripts/patch-noble-curves.js +78 -0
  96. package/dist/auth/prepareAuth.d.ts +0 -25
  97. package/dist/chains/aptos/index.d.ts +0 -146
  98. package/dist/chains/evm/index.d.ts +0 -5
  99. package/dist/chains/solana/index.d.ts +0 -116
  100. package/dist/chains/stacks/index.d.ts +0 -559
  101. package/dist/chains/starknet/index.d.ts +0 -172
  102. package/dist/chains/sui/index.d.ts +0 -182
  103. package/dist/constants.d.ts +0 -150
  104. package/dist/index-Dy29mvBf.d.mts +0 -683
  105. package/dist/index-eXXqodd0.d.ts +0 -683
  106. package/dist/index.d.ts +0 -3442
  107. package/dist/payload.d.ts +0 -125
  108. package/dist/queries/index.d.ts +0 -148
  109. package/dist/types-DakHNZIP.d.mts +0 -571
  110. package/dist/types-DvFRnIBd.d.ts +0 -172
  111. package/dist/types.d.ts +0 -413
  112. package/dist/utils.d.ts +0 -81
  113. package/dist/wormhole.d.ts +0 -167
@@ -0,0 +1,1101 @@
1
+ import {
2
+ encodeBridgeAction,
3
+ encodeExecuteAction,
4
+ encodeTransferAction
5
+ } from "./chunk-BKTCPT7P.mjs";
6
+
7
+ // src/chains/evm/EVMClient.ts
8
+ import { ethers } from "ethers";
9
+ var PROXY_BYTECODE_PREFIX = "0x3d602d80600a3d3981f3363d3d373d3d3d363d73";
10
+ var PROXY_BYTECODE_SUFFIX = "5af43d82803e903d91602b57fd5bf3";
11
+ var ERC20_ABI = [
12
+ "function balanceOf(address owner) view returns (uint256)",
13
+ "function decimals() view returns (uint8)",
14
+ "function symbol() view returns (string)",
15
+ "function name() view returns (string)",
16
+ "function allowance(address owner, address spender) view returns (uint256)",
17
+ "function transfer(address to, uint256 amount) returns (bool)",
18
+ "function approve(address spender, uint256 amount) returns (bool)"
19
+ ];
20
+ var HUB_ABI = [
21
+ "function dispatch(tuple(bytes authenticatorData, string clientDataJSON, uint256 challengeIndex, uint256 typeIndex, uint256 r, uint256 s) signature, uint256 publicKeyX, uint256 publicKeyY, uint16 targetChain, bytes actionPayload, uint256 nonce) payable returns (uint64 sequence)",
22
+ "function userNonces(bytes32 userKeyHash) view returns (uint256)",
23
+ "function getMessageFee() view returns (uint256)",
24
+ "function getVaultAddress(bytes32 userKeyHash) view returns (address)",
25
+ "function vaultExists(bytes32 userKeyHash) view returns (bool)",
26
+ "function createVault(bytes32 userKeyHash) returns (address)",
27
+ // Issue #9/#10: New Hub methods for Query-based execution
28
+ "function getUserState(bytes32 userKeyHash) view returns (bytes32 keyHash, uint256 nonce, bytes32 lastActionHash)",
29
+ "function getUserLastActionHash(bytes32 userKeyHash) view returns (bytes32)",
30
+ // Issue #13: Session key management
31
+ "function registerSession(tuple(bytes authenticatorData, string clientDataJSON, uint256 challengeIndex, uint256 typeIndex, uint256 r, uint256 s) auth, uint256 publicKeyX, uint256 publicKeyY, bytes32 sessionKeyHash, uint256 duration, uint256 maxValue, bool requireUV) external",
32
+ "function isSessionActive(bytes32 userKeyHash, bytes32 sessionKeyHash) view returns (bool active, uint256 expiry, uint256 maxValue, uint256 sessionIndex)",
33
+ "function revokeSession(tuple(bytes authenticatorData, string clientDataJSON, uint256 challengeIndex, uint256 typeIndex, uint256 r, uint256 s) auth, uint256 publicKeyX, uint256 publicKeyY, bytes32 sessionKeyHash, bool requireUV) external",
34
+ "function getUserSessions(bytes32 userKeyHash) view returns (tuple(bytes32 sessionKeyHash, uint256 expiry, uint256 maxValue, bool revoked)[])",
35
+ "function getUserSessionCount(bytes32 userKeyHash) view returns (uint256)",
36
+ // Issue #22: Backup Passkey / Multi-Key Identity management
37
+ "function registerIdentity(tuple(bytes authenticatorData, string clientDataJSON, uint256 challengeIndex, uint256 typeIndex, uint256 r, uint256 s) auth, uint256 publicKeyX, uint256 publicKeyY) external",
38
+ "function addBackupKey(tuple(bytes authenticatorData, string clientDataJSON, uint256 challengeIndex, uint256 typeIndex, uint256 r, uint256 s) auth, uint256 publicKeyX, uint256 publicKeyY, uint256 newPublicKeyX, uint256 newPublicKeyY, uint256 nonce) external payable returns (uint64 sequence)",
39
+ "function removeKey(tuple(bytes authenticatorData, string clientDataJSON, uint256 challengeIndex, uint256 typeIndex, uint256 r, uint256 s) auth, uint256 publicKeyX, uint256 publicKeyY, bytes32 keyToRemove, uint256 nonce) external payable returns (uint64 sequence)",
40
+ "function getIdentityForKey(bytes32 keyHash) view returns (bytes32)",
41
+ "function getAuthorizedKeys(bytes32 identity) view returns (bytes32[])",
42
+ "function getAuthorizedKeyCount(bytes32 identity) view returns (uint256)",
43
+ "function isAuthorizedForIdentity(bytes32 identity, bytes32 keyHash) view returns (bool)",
44
+ "function isIdentityRoot(bytes32 keyHash) view returns (bool)",
45
+ "function getIdentityState(bytes32 keyHash) view returns (bytes32 identity, uint256 keyCount, uint256 maxKeys, bool isRoot)",
46
+ // Issue #23: Social Recovery / Guardian Management
47
+ "function setupGuardians(tuple(bytes authenticatorData, string clientDataJSON, uint256 challengeIndex, uint256 typeIndex, uint256 r, uint256 s) auth, uint256 publicKeyX, uint256 publicKeyY, bytes32[] guardians, uint256 threshold) external payable returns (uint64 sequence)",
48
+ "function addGuardian(tuple(bytes authenticatorData, string clientDataJSON, uint256 challengeIndex, uint256 typeIndex, uint256 r, uint256 s) auth, uint256 publicKeyX, uint256 publicKeyY, bytes32 guardianKeyHash) external payable returns (uint64 sequence)",
49
+ "function removeGuardian(tuple(bytes authenticatorData, string clientDataJSON, uint256 challengeIndex, uint256 typeIndex, uint256 r, uint256 s) auth, uint256 publicKeyX, uint256 publicKeyY, bytes32 guardianKeyHash) external payable returns (uint64 sequence)",
50
+ "function initiateRecovery(tuple(bytes authenticatorData, string clientDataJSON, uint256 challengeIndex, uint256 typeIndex, uint256 r, uint256 s) auth, uint256 publicKeyX, uint256 publicKeyY, bytes32 identityToRecover, bytes32 newOwnerKeyHash) external payable returns (uint64 sequence)",
51
+ "function approveRecovery(tuple(bytes authenticatorData, string clientDataJSON, uint256 challengeIndex, uint256 typeIndex, uint256 r, uint256 s) auth, uint256 publicKeyX, uint256 publicKeyY, bytes32 identityToRecover) external payable returns (uint64 sequence)",
52
+ "function executeRecovery(bytes32 identityToRecover, uint256 newPublicKeyX, uint256 newPublicKeyY) external payable returns (uint64 sequence)",
53
+ "function cancelRecovery(tuple(bytes authenticatorData, string clientDataJSON, uint256 challengeIndex, uint256 typeIndex, uint256 r, uint256 s) auth, uint256 publicKeyX, uint256 publicKeyY) external payable returns (uint64 sequence)",
54
+ "function getGuardians(bytes32 identityKeyHash) view returns (bytes32[] guardians, uint256 threshold, bool isConfigured)",
55
+ "function getRecoveryStatus(bytes32 identityKeyHash) view returns (bool isActive, bytes32 newOwnerKeyHash, uint256 initiatedAt, uint256 approvalCount, uint256 threshold, uint256 canExecuteAt, uint256 expiresAt)",
56
+ "function hasGuardianApproved(bytes32 identityKeyHash, bytes32 guardianKeyHash) view returns (bool hasApproved)"
57
+ ];
58
+ var FACTORY_ABI = [
59
+ "function createVault(bytes32 ownerKeyHash) returns (address vault)",
60
+ "function getVault(bytes32 ownerKeyHash) view returns (address)",
61
+ "function computeVaultAddress(bytes32 ownerKeyHash) view returns (address vault)",
62
+ "function vaultExists(bytes32 ownerKeyHash) view returns (bool)",
63
+ "function implementation() view returns (address)"
64
+ ];
65
+ var EVMClient = class {
66
+ config;
67
+ provider;
68
+ hubContract;
69
+ factoryContract = null;
70
+ cachedImplementation = null;
71
+ constructor(config) {
72
+ this.config = {
73
+ name: config.name ?? `EVM Chain ${config.chainId}`,
74
+ chainId: config.chainId,
75
+ wormholeChainId: config.wormholeChainId,
76
+ rpcUrl: config.rpcUrl,
77
+ explorerUrl: config.explorerUrl ?? "",
78
+ isEvm: true,
79
+ contracts: {
80
+ hub: config.hubContractAddress,
81
+ vaultFactory: config.vaultFactory,
82
+ vaultImplementation: config.vaultImplementation,
83
+ wormholeCoreBridge: config.wormholeCoreBridge,
84
+ tokenBridge: config.tokenBridge
85
+ }
86
+ };
87
+ this.provider = new ethers.JsonRpcProvider(config.rpcUrl);
88
+ this.hubContract = new ethers.Contract(
89
+ config.hubContractAddress,
90
+ HUB_ABI,
91
+ this.provider
92
+ );
93
+ if (config.vaultFactory) {
94
+ this.factoryContract = new ethers.Contract(
95
+ config.vaultFactory,
96
+ FACTORY_ABI,
97
+ this.provider
98
+ );
99
+ }
100
+ if (config.vaultImplementation) {
101
+ this.cachedImplementation = config.vaultImplementation;
102
+ }
103
+ }
104
+ getConfig() {
105
+ return this.config;
106
+ }
107
+ async getNonce(userKeyHash) {
108
+ const nonce = await this.hubContract.userNonces(userKeyHash);
109
+ return BigInt(nonce.toString());
110
+ }
111
+ /**
112
+ * Get user state from Hub (Issue #9/#10)
113
+ * Returns comprehensive state including last action hash
114
+ */
115
+ async getUserState(userKeyHash) {
116
+ try {
117
+ const result = await this.hubContract.getUserState(userKeyHash);
118
+ return {
119
+ keyHash: result[0],
120
+ nonce: BigInt(result[1].toString()),
121
+ lastActionHash: result[2]
122
+ };
123
+ } catch (error) {
124
+ const nonce = await this.getNonce(userKeyHash);
125
+ return {
126
+ keyHash: userKeyHash,
127
+ nonce,
128
+ lastActionHash: ethers.ZeroHash
129
+ };
130
+ }
131
+ }
132
+ /**
133
+ * Get user's last action hash from Hub (Issue #9/#10)
134
+ * Returns zero hash if user has no actions yet
135
+ */
136
+ async getUserLastActionHash(userKeyHash) {
137
+ try {
138
+ return await this.hubContract.getUserLastActionHash(userKeyHash);
139
+ } catch (error) {
140
+ return ethers.ZeroHash;
141
+ }
142
+ }
143
+ // ==========================================================================
144
+ // Session Management Methods (Issue #13)
145
+ // ==========================================================================
146
+ /**
147
+ * Register a new session key for temporary authentication
148
+ * Enables native L1 speed for repeat transactions without biometric auth
149
+ *
150
+ * @param params Session registration parameters
151
+ * @param signer Ethereum signer to pay gas
152
+ * @returns Transaction receipt
153
+ */
154
+ async registerSession(params, signer) {
155
+ const hubWithSigner = this.hubContract.connect(signer);
156
+ const authTuple = {
157
+ authenticatorData: params.signature.authenticatorData,
158
+ clientDataJSON: params.signature.clientDataJSON,
159
+ challengeIndex: params.signature.challengeIndex,
160
+ typeIndex: params.signature.typeIndex,
161
+ r: params.signature.r,
162
+ s: params.signature.s
163
+ };
164
+ const tx = await hubWithSigner.registerSession(
165
+ authTuple,
166
+ params.publicKeyX,
167
+ params.publicKeyY,
168
+ params.sessionKeyHash,
169
+ params.duration,
170
+ params.maxValue,
171
+ params.requireUV
172
+ );
173
+ return await tx.wait();
174
+ }
175
+ /**
176
+ * Check if a session is currently active (queryable via Wormhole CCQ)
177
+ *
178
+ * @param userKeyHash Hash of the user's Passkey public key
179
+ * @param sessionKeyHash Hash of the session key to check
180
+ * @returns Session validation result
181
+ */
182
+ async isSessionActive(userKeyHash, sessionKeyHash) {
183
+ const result = await this.hubContract.isSessionActive(userKeyHash, sessionKeyHash);
184
+ return {
185
+ active: result[0],
186
+ expiry: Number(result[1]),
187
+ maxValue: BigInt(result[2].toString()),
188
+ sessionIndex: Number(result[3])
189
+ };
190
+ }
191
+ /**
192
+ * Revoke a session key immediately
193
+ *
194
+ * @param params Session revocation parameters
195
+ * @param signer Ethereum signer to pay gas
196
+ * @returns Transaction receipt
197
+ */
198
+ async revokeSession(params, signer) {
199
+ const hubWithSigner = this.hubContract.connect(signer);
200
+ const authTuple = {
201
+ authenticatorData: params.signature.authenticatorData,
202
+ clientDataJSON: params.signature.clientDataJSON,
203
+ challengeIndex: params.signature.challengeIndex,
204
+ typeIndex: params.signature.typeIndex,
205
+ r: params.signature.r,
206
+ s: params.signature.s
207
+ };
208
+ const tx = await hubWithSigner.revokeSession(
209
+ authTuple,
210
+ params.publicKeyX,
211
+ params.publicKeyY,
212
+ params.sessionKeyHash,
213
+ params.requireUV
214
+ );
215
+ return await tx.wait();
216
+ }
217
+ /**
218
+ * Get all sessions for a user
219
+ *
220
+ * @param userKeyHash Hash of the user's Passkey public key
221
+ * @returns Array of all sessions (active and expired/revoked)
222
+ */
223
+ async getUserSessions(userKeyHash) {
224
+ const sessions = await this.hubContract.getUserSessions(userKeyHash);
225
+ return sessions.map((s) => ({
226
+ sessionKeyHash: s.sessionKeyHash,
227
+ expiry: Number(s.expiry),
228
+ maxValue: BigInt(s.maxValue.toString()),
229
+ revoked: s.revoked
230
+ }));
231
+ }
232
+ /**
233
+ * Get the number of sessions for a user
234
+ *
235
+ * @param userKeyHash Hash of the user's Passkey public key
236
+ * @returns Number of sessions
237
+ */
238
+ async getUserSessionCount(userKeyHash) {
239
+ const count = await this.hubContract.getUserSessionCount(userKeyHash);
240
+ return Number(count);
241
+ }
242
+ async getMessageFee() {
243
+ const fee = await this.hubContract.getMessageFee();
244
+ return BigInt(fee.toString());
245
+ }
246
+ async buildTransferPayload(params) {
247
+ return encodeTransferAction(
248
+ params.token,
249
+ params.recipient,
250
+ params.amount
251
+ );
252
+ }
253
+ async buildExecutePayload(params) {
254
+ return encodeExecuteAction(
255
+ params.target,
256
+ params.value,
257
+ params.data
258
+ );
259
+ }
260
+ async buildBridgePayload(params) {
261
+ return encodeBridgeAction(
262
+ params.token,
263
+ params.amount,
264
+ params.destinationChain,
265
+ params.recipient
266
+ );
267
+ }
268
+ async dispatch(signature, publicKeyX, publicKeyY, targetChain, actionPayload, nonce, signer) {
269
+ const hubWithSigner = this.hubContract.connect(signer);
270
+ const signatureTuple = {
271
+ authenticatorData: signature.authenticatorData,
272
+ clientDataJSON: signature.clientDataJSON,
273
+ challengeIndex: signature.challengeIndex,
274
+ typeIndex: signature.typeIndex,
275
+ r: signature.r,
276
+ s: signature.s
277
+ };
278
+ const messageFee = await this.getMessageFee();
279
+ const tx = await hubWithSigner.dispatch(
280
+ signatureTuple,
281
+ publicKeyX,
282
+ publicKeyY,
283
+ targetChain,
284
+ actionPayload,
285
+ nonce,
286
+ { value: messageFee }
287
+ );
288
+ const receipt = await tx.wait();
289
+ const dispatchEvent = receipt.logs.find((log) => {
290
+ try {
291
+ const parsed = hubWithSigner.interface.parseLog(log);
292
+ return parsed?.name === "ActionDispatched";
293
+ } catch {
294
+ return false;
295
+ }
296
+ });
297
+ let sequence = 0n;
298
+ if (dispatchEvent) {
299
+ const parsed = hubWithSigner.interface.parseLog(dispatchEvent);
300
+ sequence = BigInt(parsed?.args?.sequence?.toString() ?? "0");
301
+ }
302
+ const keyHash = ethers.keccak256(
303
+ ethers.AbiCoder.defaultAbiCoder().encode(
304
+ ["uint256", "uint256"],
305
+ [publicKeyX, publicKeyY]
306
+ )
307
+ );
308
+ return {
309
+ transactionHash: receipt.hash,
310
+ sequence,
311
+ userKeyHash: keyHash,
312
+ targetChain,
313
+ blockNumber: receipt.blockNumber
314
+ };
315
+ }
316
+ /**
317
+ * Dispatch an action to the Hub via relayer (gasless)
318
+ * The relayer pays for gas and submits the transaction on behalf of the user
319
+ */
320
+ async dispatchGasless(signature, publicKeyX, publicKeyY, targetChain, actionPayload, nonce, relayerUrl) {
321
+ const keyHash = ethers.keccak256(
322
+ ethers.AbiCoder.defaultAbiCoder().encode(
323
+ ["uint256", "uint256"],
324
+ [publicKeyX, publicKeyY]
325
+ )
326
+ );
327
+ const message = ethers.keccak256(
328
+ ethers.AbiCoder.defaultAbiCoder().encode(
329
+ ["bytes32", "uint16", "bytes", "uint256"],
330
+ [keyHash, targetChain, actionPayload, nonce]
331
+ )
332
+ );
333
+ const request = {
334
+ messageHash: message,
335
+ r: "0x" + signature.r.toString(16).padStart(64, "0"),
336
+ s: "0x" + signature.s.toString(16).padStart(64, "0"),
337
+ publicKeyX: "0x" + publicKeyX.toString(16).padStart(64, "0"),
338
+ publicKeyY: "0x" + publicKeyY.toString(16).padStart(64, "0"),
339
+ targetChain,
340
+ actionPayload,
341
+ nonce: Number(nonce)
342
+ };
343
+ const response = await fetch(`${relayerUrl}/api/v1/submit`, {
344
+ method: "POST",
345
+ headers: {
346
+ "Content-Type": "application/json"
347
+ },
348
+ body: JSON.stringify(request)
349
+ });
350
+ if (!response.ok) {
351
+ const error = await response.json().catch(() => ({ error: response.statusText }));
352
+ throw new Error(`Relayer submission failed: ${error.error || response.statusText}`);
353
+ }
354
+ const result = await response.json();
355
+ if (!result.success) {
356
+ throw new Error(`Relayer submission failed: ${result.error}`);
357
+ }
358
+ return {
359
+ transactionHash: result.txHash,
360
+ sequence: BigInt(result.sequence || "0"),
361
+ userKeyHash: keyHash,
362
+ targetChain
363
+ };
364
+ }
365
+ async getVaultAddress(userKeyHash) {
366
+ try {
367
+ if (this.factoryContract) {
368
+ const address2 = await this.factoryContract.getVault(userKeyHash);
369
+ if (address2 !== ethers.ZeroAddress) {
370
+ return address2;
371
+ }
372
+ }
373
+ const address = await this.hubContract.getVaultAddress(userKeyHash);
374
+ if (address === ethers.ZeroAddress) {
375
+ return null;
376
+ }
377
+ return address;
378
+ } catch (error) {
379
+ console.error("Error getting vault address:", error);
380
+ return null;
381
+ }
382
+ }
383
+ /**
384
+ * Compute vault address deterministically without querying the chain
385
+ * Uses CREATE2 with EIP-1167 minimal proxy pattern
386
+ */
387
+ computeVaultAddress(userKeyHash) {
388
+ const factoryAddress = this.getFactoryAddress();
389
+ const implementationAddress = this.getImplementationAddress();
390
+ if (!factoryAddress || !implementationAddress) {
391
+ throw new Error("Factory and implementation addresses required for address computation");
392
+ }
393
+ const salt = ethers.keccak256(
394
+ ethers.solidityPacked(
395
+ ["address", "bytes32"],
396
+ [factoryAddress, userKeyHash]
397
+ )
398
+ );
399
+ const initCode = this.buildProxyInitCode(implementationAddress);
400
+ const initCodeHash = ethers.keccak256(initCode);
401
+ const create2Data = ethers.solidityPacked(
402
+ ["bytes1", "address", "bytes32", "bytes32"],
403
+ ["0xff", factoryAddress, salt, initCodeHash]
404
+ );
405
+ const hash = ethers.keccak256(create2Data);
406
+ return ethers.getAddress("0x" + hash.slice(26));
407
+ }
408
+ /**
409
+ * Build EIP-1167 minimal proxy initcode
410
+ */
411
+ buildProxyInitCode(implementationAddress) {
412
+ const impl = implementationAddress.toLowerCase().replace("0x", "");
413
+ return PROXY_BYTECODE_PREFIX + impl + PROXY_BYTECODE_SUFFIX;
414
+ }
415
+ async vaultExists(userKeyHash) {
416
+ try {
417
+ if (this.factoryContract) {
418
+ return await this.factoryContract.vaultExists(userKeyHash);
419
+ }
420
+ if (this.hubContract.vaultExists) {
421
+ try {
422
+ return await this.hubContract.vaultExists(userKeyHash);
423
+ } catch {
424
+ return false;
425
+ }
426
+ }
427
+ return false;
428
+ } catch {
429
+ return false;
430
+ }
431
+ }
432
+ async createVault(userKeyHash, signer) {
433
+ const exists = await this.vaultExists(userKeyHash);
434
+ if (exists) {
435
+ const address = await this.getVaultAddress(userKeyHash);
436
+ if (address) {
437
+ return {
438
+ address,
439
+ transactionHash: "",
440
+ blockNumber: 0,
441
+ gasUsed: 0n,
442
+ alreadyExisted: true
443
+ };
444
+ }
445
+ }
446
+ let tx;
447
+ if (this.factoryContract) {
448
+ const factoryWithSigner = this.factoryContract.connect(signer);
449
+ tx = await factoryWithSigner.createVault(userKeyHash);
450
+ } else {
451
+ const hubWithSigner = this.hubContract.connect(signer);
452
+ tx = await hubWithSigner.createVault(userKeyHash);
453
+ }
454
+ const receipt = await tx.wait();
455
+ if (!receipt) {
456
+ throw new Error("Transaction failed - no receipt");
457
+ }
458
+ const vaultAddress = await this.getVaultAddress(userKeyHash);
459
+ if (!vaultAddress) {
460
+ throw new Error("Failed to create vault - address not found after creation");
461
+ }
462
+ return {
463
+ address: vaultAddress,
464
+ transactionHash: receipt.hash,
465
+ blockNumber: receipt.blockNumber,
466
+ gasUsed: receipt.gasUsed,
467
+ alreadyExisted: false
468
+ };
469
+ }
470
+ /**
471
+ * Create a vault with a sponsor wallet paying for gas
472
+ *
473
+ * @param userKeyHash - The user's passkey hash
474
+ * @param sponsorPrivateKey - Private key of the wallet that will pay gas
475
+ * @param rpcUrl - Optional RPC URL to use (defaults to client's RPC)
476
+ * @returns VaultCreationResult with address and transaction details
477
+ */
478
+ async createVaultSponsored(userKeyHash, sponsorPrivateKey, rpcUrl) {
479
+ const exists = await this.vaultExists(userKeyHash);
480
+ if (exists) {
481
+ const address = await this.getVaultAddress(userKeyHash);
482
+ if (address) {
483
+ return {
484
+ address,
485
+ transactionHash: "",
486
+ blockNumber: 0,
487
+ gasUsed: 0n,
488
+ alreadyExisted: true
489
+ };
490
+ }
491
+ }
492
+ const provider = rpcUrl ? new ethers.JsonRpcProvider(rpcUrl) : this.provider;
493
+ const sponsorWallet = new ethers.Wallet(sponsorPrivateKey, provider);
494
+ const sponsorBalance = await provider.getBalance(sponsorWallet.address);
495
+ const estimatedGas = await this.estimateVaultCreationGas(userKeyHash);
496
+ const feeData = await provider.getFeeData();
497
+ const estimatedCost = estimatedGas * (feeData.gasPrice ?? 1000000000n);
498
+ if (sponsorBalance < estimatedCost) {
499
+ throw new Error(
500
+ `Sponsor wallet has insufficient funds. Balance: ${ethers.formatEther(sponsorBalance)} ETH, Estimated cost: ${ethers.formatEther(estimatedCost)} ETH`
501
+ );
502
+ }
503
+ let tx;
504
+ if (this.factoryContract) {
505
+ const factoryWithSponsor = this.factoryContract.connect(sponsorWallet);
506
+ tx = await factoryWithSponsor.createVault(userKeyHash);
507
+ } else {
508
+ const hubWithSponsor = this.hubContract.connect(sponsorWallet);
509
+ tx = await hubWithSponsor.createVault(userKeyHash);
510
+ }
511
+ const receipt = await tx.wait();
512
+ if (!receipt) {
513
+ throw new Error("Transaction failed - no receipt");
514
+ }
515
+ const vaultAddress = await this.getVaultAddress(userKeyHash);
516
+ if (!vaultAddress) {
517
+ throw new Error("Failed to create vault - address not found after creation");
518
+ }
519
+ return {
520
+ address: vaultAddress,
521
+ transactionHash: receipt.hash,
522
+ blockNumber: receipt.blockNumber,
523
+ gasUsed: receipt.gasUsed,
524
+ alreadyExisted: false,
525
+ sponsoredBy: sponsorWallet.address
526
+ };
527
+ }
528
+ async estimateVaultCreationGas(userKeyHash) {
529
+ try {
530
+ if (this.factoryContract) {
531
+ return await this.factoryContract.createVault.estimateGas(userKeyHash);
532
+ }
533
+ return await this.hubContract.createVault.estimateGas(userKeyHash);
534
+ } catch (error) {
535
+ console.warn("Gas estimation failed, returning default:", error);
536
+ return 150000n;
537
+ }
538
+ }
539
+ getFactoryAddress() {
540
+ return this.config.contracts.vaultFactory;
541
+ }
542
+ getImplementationAddress() {
543
+ return this.config.contracts.vaultImplementation ?? this.cachedImplementation ?? void 0;
544
+ }
545
+ /**
546
+ * Fetch implementation address from factory contract
547
+ */
548
+ async fetchImplementationAddress() {
549
+ if (this.cachedImplementation) {
550
+ return this.cachedImplementation;
551
+ }
552
+ if (!this.factoryContract) {
553
+ return null;
554
+ }
555
+ try {
556
+ this.cachedImplementation = await this.factoryContract.implementation();
557
+ return this.cachedImplementation;
558
+ } catch (error) {
559
+ console.error("Error fetching implementation address:", error);
560
+ return null;
561
+ }
562
+ }
563
+ /**
564
+ * Get the provider instance
565
+ */
566
+ getProvider() {
567
+ return this.provider;
568
+ }
569
+ // ========================================================================
570
+ // Balance Methods (Phase 2)
571
+ // ========================================================================
572
+ /**
573
+ * Get native token balance for an address
574
+ */
575
+ async getNativeBalance(address) {
576
+ return await this.provider.getBalance(address);
577
+ }
578
+ /**
579
+ * Get ERC20 token balance for an address
580
+ */
581
+ async getTokenBalance(tokenAddress, ownerAddress) {
582
+ const contract = new ethers.Contract(tokenAddress, ERC20_ABI, this.provider);
583
+ return await contract.balanceOf(ownerAddress);
584
+ }
585
+ /**
586
+ * Get token allowance
587
+ */
588
+ async getTokenAllowance(tokenAddress, ownerAddress, spenderAddress) {
589
+ const contract = new ethers.Contract(tokenAddress, ERC20_ABI, this.provider);
590
+ return await contract.allowance(ownerAddress, spenderAddress);
591
+ }
592
+ /**
593
+ * Estimate gas for a dispatch transaction
594
+ */
595
+ async estimateDispatchGas(signature, publicKeyX, publicKeyY, targetChain, actionPayload, nonce) {
596
+ const signatureTuple = {
597
+ authenticatorData: signature.authenticatorData,
598
+ clientDataJSON: signature.clientDataJSON,
599
+ challengeIndex: signature.challengeIndex,
600
+ typeIndex: signature.typeIndex,
601
+ r: signature.r,
602
+ s: signature.s
603
+ };
604
+ const messageFee = await this.getMessageFee();
605
+ try {
606
+ const gasEstimate = await this.hubContract.dispatch.estimateGas(
607
+ signatureTuple,
608
+ publicKeyX,
609
+ publicKeyY,
610
+ targetChain,
611
+ actionPayload,
612
+ nonce,
613
+ { value: messageFee }
614
+ );
615
+ return gasEstimate;
616
+ } catch (error) {
617
+ console.warn("Gas estimation failed, using default:", error);
618
+ return 500000n;
619
+ }
620
+ }
621
+ /**
622
+ * Get current gas price
623
+ */
624
+ async getGasPrice() {
625
+ const feeData = await this.provider.getFeeData();
626
+ return feeData.gasPrice ?? feeData.maxFeePerGas ?? 0n;
627
+ }
628
+ /**
629
+ * Get current block number
630
+ */
631
+ async getBlockNumber() {
632
+ return await this.provider.getBlockNumber();
633
+ }
634
+ /**
635
+ * Get transaction receipt
636
+ */
637
+ async getTransactionReceipt(hash) {
638
+ return await this.provider.getTransactionReceipt(hash);
639
+ }
640
+ /**
641
+ * Wait for transaction confirmation
642
+ */
643
+ async waitForTransaction(hash, confirmations = 1) {
644
+ return await this.provider.waitForTransaction(hash, confirmations);
645
+ }
646
+ // ==========================================================================
647
+ // Backup Passkey / Multi-Key Identity Methods (Issue #22)
648
+ // ==========================================================================
649
+ /**
650
+ * Get the identity for a given key hash
651
+ * Returns zero hash if key is not registered to any identity
652
+ *
653
+ * @param keyHash Hash of the passkey to look up
654
+ * @returns Identity (first passkey's keyHash) or zero hash
655
+ */
656
+ async getIdentityForKey(keyHash) {
657
+ try {
658
+ return await this.hubContract.getIdentityForKey(keyHash);
659
+ } catch (error) {
660
+ return ethers.ZeroHash;
661
+ }
662
+ }
663
+ /**
664
+ * Get all authorized keys for an identity
665
+ *
666
+ * @param identity The identity key hash (first passkey's keyHash)
667
+ * @returns Array of authorized key hashes
668
+ */
669
+ async getAuthorizedKeys(identity) {
670
+ try {
671
+ return await this.hubContract.getAuthorizedKeys(identity);
672
+ } catch (error) {
673
+ return [];
674
+ }
675
+ }
676
+ /**
677
+ * Get count of authorized keys for an identity
678
+ *
679
+ * @param identity The identity key hash
680
+ * @returns Number of authorized keys
681
+ */
682
+ async getAuthorizedKeyCount(identity) {
683
+ try {
684
+ const count = await this.hubContract.getAuthorizedKeyCount(identity);
685
+ return Number(count);
686
+ } catch (error) {
687
+ return 0;
688
+ }
689
+ }
690
+ /**
691
+ * Check if a key is authorized for an identity
692
+ *
693
+ * @param identity The identity key hash
694
+ * @param keyHash The key hash to check
695
+ * @returns Whether the key is authorized
696
+ */
697
+ async isAuthorizedForIdentity(identity, keyHash) {
698
+ try {
699
+ return await this.hubContract.isAuthorizedForIdentity(identity, keyHash);
700
+ } catch (error) {
701
+ return false;
702
+ }
703
+ }
704
+ /**
705
+ * Check if a key is the root identity key
706
+ *
707
+ * @param keyHash The key hash to check
708
+ * @returns Whether the key is a root identity
709
+ */
710
+ async isIdentityRootKey(keyHash) {
711
+ try {
712
+ return await this.hubContract.isIdentityRoot(keyHash);
713
+ } catch (error) {
714
+ return false;
715
+ }
716
+ }
717
+ /**
718
+ * Get comprehensive identity state for a key
719
+ *
720
+ * @param keyHash Hash of any key in the identity
721
+ * @returns Identity state including count, max, and root status
722
+ */
723
+ async getIdentityState(keyHash) {
724
+ try {
725
+ const result = await this.hubContract.getIdentityState(keyHash);
726
+ return {
727
+ identity: result[0],
728
+ keyCount: Number(result[1]),
729
+ maxKeys: Number(result[2]),
730
+ isRoot: result[3]
731
+ };
732
+ } catch (error) {
733
+ return {
734
+ identity: ethers.ZeroHash,
735
+ keyCount: 0,
736
+ maxKeys: 5,
737
+ isRoot: false
738
+ };
739
+ }
740
+ }
741
+ /**
742
+ * Register a new identity with the first passkey
743
+ * This makes the passkey the root identity key
744
+ *
745
+ * @param signature WebAuthn signature
746
+ * @param publicKeyX Passkey public key X coordinate
747
+ * @param publicKeyY Passkey public key Y coordinate
748
+ * @param signer Ethereum signer to pay gas
749
+ * @returns Transaction receipt and identity hash
750
+ */
751
+ async registerIdentity(signature, publicKeyX, publicKeyY, signer) {
752
+ const hubWithSigner = this.hubContract.connect(signer);
753
+ const authTuple = {
754
+ authenticatorData: signature.authenticatorData,
755
+ clientDataJSON: signature.clientDataJSON,
756
+ challengeIndex: signature.challengeIndex,
757
+ typeIndex: signature.typeIndex,
758
+ r: signature.r,
759
+ s: signature.s
760
+ };
761
+ const tx = await hubWithSigner.registerIdentity(
762
+ authTuple,
763
+ publicKeyX,
764
+ publicKeyY
765
+ );
766
+ const receipt = await tx.wait();
767
+ const keyHash = ethers.keccak256(
768
+ ethers.solidityPacked(["uint256", "uint256"], [publicKeyX, publicKeyY])
769
+ );
770
+ return { receipt, identity: keyHash };
771
+ }
772
+ /**
773
+ * Add a backup passkey to an existing identity
774
+ * Requires WebAuthn signature from an authorized key
775
+ *
776
+ * @param signature WebAuthn signature from existing authorized key
777
+ * @param publicKeyX Existing key's X coordinate
778
+ * @param publicKeyY Existing key's Y coordinate
779
+ * @param newPublicKeyX New backup key's X coordinate
780
+ * @param newPublicKeyY New backup key's Y coordinate
781
+ * @param nonce Current nonce for the signing key
782
+ * @param signer Ethereum signer to pay gas
783
+ * @returns Transaction receipt and sequence number
784
+ */
785
+ async addBackupKey(signature, publicKeyX, publicKeyY, newPublicKeyX, newPublicKeyY, nonce, signer) {
786
+ const hubWithSigner = this.hubContract.connect(signer);
787
+ const authTuple = {
788
+ authenticatorData: signature.authenticatorData,
789
+ clientDataJSON: signature.clientDataJSON,
790
+ challengeIndex: signature.challengeIndex,
791
+ typeIndex: signature.typeIndex,
792
+ r: signature.r,
793
+ s: signature.s
794
+ };
795
+ const messageFee = await this.getMessageFee();
796
+ const tx = await hubWithSigner.addBackupKey(
797
+ authTuple,
798
+ publicKeyX,
799
+ publicKeyY,
800
+ newPublicKeyX,
801
+ newPublicKeyY,
802
+ nonce,
803
+ { value: messageFee }
804
+ );
805
+ const receipt = await tx.wait();
806
+ let sequence = 0n;
807
+ for (const log of receipt.logs) {
808
+ try {
809
+ const parsed = this.hubContract.interface.parseLog({
810
+ topics: log.topics,
811
+ data: log.data
812
+ });
813
+ if (parsed?.name === "Dispatched") {
814
+ sequence = BigInt(parsed.args[3]);
815
+ break;
816
+ }
817
+ } catch {
818
+ }
819
+ }
820
+ return { receipt, sequence };
821
+ }
822
+ /**
823
+ * Remove a passkey from an identity
824
+ * Cannot remove the last remaining key
825
+ *
826
+ * @param signature WebAuthn signature from an authorized key
827
+ * @param publicKeyX Signing key's X coordinate
828
+ * @param publicKeyY Signing key's Y coordinate
829
+ * @param keyToRemove Hash of the key to remove
830
+ * @param nonce Current nonce for the signing key
831
+ * @param signer Ethereum signer to pay gas
832
+ * @returns Transaction receipt and sequence number
833
+ */
834
+ async removeKey(signature, publicKeyX, publicKeyY, keyToRemove, nonce, signer) {
835
+ const hubWithSigner = this.hubContract.connect(signer);
836
+ const authTuple = {
837
+ authenticatorData: signature.authenticatorData,
838
+ clientDataJSON: signature.clientDataJSON,
839
+ challengeIndex: signature.challengeIndex,
840
+ typeIndex: signature.typeIndex,
841
+ r: signature.r,
842
+ s: signature.s
843
+ };
844
+ const messageFee = await this.getMessageFee();
845
+ const tx = await hubWithSigner.removeKey(
846
+ authTuple,
847
+ publicKeyX,
848
+ publicKeyY,
849
+ keyToRemove,
850
+ nonce,
851
+ { value: messageFee }
852
+ );
853
+ const receipt = await tx.wait();
854
+ let sequence = 0n;
855
+ for (const log of receipt.logs) {
856
+ try {
857
+ const parsed = this.hubContract.interface.parseLog({
858
+ topics: log.topics,
859
+ data: log.data
860
+ });
861
+ if (parsed?.name === "Dispatched") {
862
+ sequence = BigInt(parsed.args[3]);
863
+ break;
864
+ }
865
+ } catch {
866
+ }
867
+ }
868
+ return { receipt, sequence };
869
+ }
870
+ // =========================================================================
871
+ // SOCIAL RECOVERY METHODS (Issue #23)
872
+ // =========================================================================
873
+ /**
874
+ * Setup guardians for an identity
875
+ * @param signature WebAuthn signature from owner
876
+ * @param publicKeyX Owner's public key X coordinate
877
+ * @param publicKeyY Owner's public key Y coordinate
878
+ * @param guardians Array of guardian key hashes
879
+ * @param threshold Required approvals for recovery
880
+ * @param signer Ethers signer for transaction
881
+ */
882
+ async setupGuardians(signature, publicKeyX, publicKeyY, guardians, threshold, signer) {
883
+ const hubWithSigner = this.hubContract.connect(signer);
884
+ const authTuple = {
885
+ authenticatorData: signature.authenticatorData,
886
+ clientDataJSON: signature.clientDataJSON,
887
+ challengeIndex: signature.challengeIndex,
888
+ typeIndex: signature.typeIndex,
889
+ r: signature.r,
890
+ s: signature.s
891
+ };
892
+ const messageFee = await this.getMessageFee();
893
+ const tx = await hubWithSigner.setupGuardians(
894
+ authTuple,
895
+ publicKeyX,
896
+ publicKeyY,
897
+ guardians,
898
+ threshold,
899
+ { value: messageFee }
900
+ );
901
+ const receipt = await tx.wait();
902
+ const sequence = this._extractSequenceFromReceipt(receipt);
903
+ return { receipt, sequence };
904
+ }
905
+ /**
906
+ * Add a guardian to an identity
907
+ */
908
+ async addGuardian(signature, publicKeyX, publicKeyY, guardianKeyHash, signer) {
909
+ const hubWithSigner = this.hubContract.connect(signer);
910
+ const authTuple = {
911
+ authenticatorData: signature.authenticatorData,
912
+ clientDataJSON: signature.clientDataJSON,
913
+ challengeIndex: signature.challengeIndex,
914
+ typeIndex: signature.typeIndex,
915
+ r: signature.r,
916
+ s: signature.s
917
+ };
918
+ const messageFee = await this.getMessageFee();
919
+ const tx = await hubWithSigner.addGuardian(
920
+ authTuple,
921
+ publicKeyX,
922
+ publicKeyY,
923
+ guardianKeyHash,
924
+ { value: messageFee }
925
+ );
926
+ const receipt = await tx.wait();
927
+ const sequence = this._extractSequenceFromReceipt(receipt);
928
+ return { receipt, sequence };
929
+ }
930
+ /**
931
+ * Remove a guardian from an identity
932
+ */
933
+ async removeGuardian(signature, publicKeyX, publicKeyY, guardianKeyHash, signer) {
934
+ const hubWithSigner = this.hubContract.connect(signer);
935
+ const authTuple = {
936
+ authenticatorData: signature.authenticatorData,
937
+ clientDataJSON: signature.clientDataJSON,
938
+ challengeIndex: signature.challengeIndex,
939
+ typeIndex: signature.typeIndex,
940
+ r: signature.r,
941
+ s: signature.s
942
+ };
943
+ const messageFee = await this.getMessageFee();
944
+ const tx = await hubWithSigner.removeGuardian(
945
+ authTuple,
946
+ publicKeyX,
947
+ publicKeyY,
948
+ guardianKeyHash,
949
+ { value: messageFee }
950
+ );
951
+ const receipt = await tx.wait();
952
+ const sequence = this._extractSequenceFromReceipt(receipt);
953
+ return { receipt, sequence };
954
+ }
955
+ /**
956
+ * Initiate recovery as a guardian
957
+ */
958
+ async initiateRecovery(signature, publicKeyX, publicKeyY, identityToRecover, newOwnerKeyHash, signer) {
959
+ const hubWithSigner = this.hubContract.connect(signer);
960
+ const authTuple = {
961
+ authenticatorData: signature.authenticatorData,
962
+ clientDataJSON: signature.clientDataJSON,
963
+ challengeIndex: signature.challengeIndex,
964
+ typeIndex: signature.typeIndex,
965
+ r: signature.r,
966
+ s: signature.s
967
+ };
968
+ const messageFee = await this.getMessageFee();
969
+ const tx = await hubWithSigner.initiateRecovery(
970
+ authTuple,
971
+ publicKeyX,
972
+ publicKeyY,
973
+ identityToRecover,
974
+ newOwnerKeyHash,
975
+ { value: messageFee }
976
+ );
977
+ const receipt = await tx.wait();
978
+ const sequence = this._extractSequenceFromReceipt(receipt);
979
+ return { receipt, sequence };
980
+ }
981
+ /**
982
+ * Approve recovery as a guardian
983
+ */
984
+ async approveRecovery(signature, publicKeyX, publicKeyY, identityToRecover, signer) {
985
+ const hubWithSigner = this.hubContract.connect(signer);
986
+ const authTuple = {
987
+ authenticatorData: signature.authenticatorData,
988
+ clientDataJSON: signature.clientDataJSON,
989
+ challengeIndex: signature.challengeIndex,
990
+ typeIndex: signature.typeIndex,
991
+ r: signature.r,
992
+ s: signature.s
993
+ };
994
+ const messageFee = await this.getMessageFee();
995
+ const tx = await hubWithSigner.approveRecovery(
996
+ authTuple,
997
+ publicKeyX,
998
+ publicKeyY,
999
+ identityToRecover,
1000
+ { value: messageFee }
1001
+ );
1002
+ const receipt = await tx.wait();
1003
+ const sequence = this._extractSequenceFromReceipt(receipt);
1004
+ return { receipt, sequence };
1005
+ }
1006
+ /**
1007
+ * Execute recovery after timelock (anyone can call)
1008
+ */
1009
+ async executeRecovery(identityToRecover, newPublicKeyX, newPublicKeyY, signer) {
1010
+ const hubWithSigner = this.hubContract.connect(signer);
1011
+ const messageFee = await this.getMessageFee();
1012
+ const tx = await hubWithSigner.executeRecovery(
1013
+ identityToRecover,
1014
+ newPublicKeyX,
1015
+ newPublicKeyY,
1016
+ { value: messageFee }
1017
+ );
1018
+ const receipt = await tx.wait();
1019
+ const sequence = this._extractSequenceFromReceipt(receipt);
1020
+ return { receipt, sequence };
1021
+ }
1022
+ /**
1023
+ * Cancel recovery as owner
1024
+ */
1025
+ async cancelRecovery(signature, publicKeyX, publicKeyY, signer) {
1026
+ const hubWithSigner = this.hubContract.connect(signer);
1027
+ const authTuple = {
1028
+ authenticatorData: signature.authenticatorData,
1029
+ clientDataJSON: signature.clientDataJSON,
1030
+ challengeIndex: signature.challengeIndex,
1031
+ typeIndex: signature.typeIndex,
1032
+ r: signature.r,
1033
+ s: signature.s
1034
+ };
1035
+ const messageFee = await this.getMessageFee();
1036
+ const tx = await hubWithSigner.cancelRecovery(
1037
+ authTuple,
1038
+ publicKeyX,
1039
+ publicKeyY,
1040
+ { value: messageFee }
1041
+ );
1042
+ const receipt = await tx.wait();
1043
+ const sequence = this._extractSequenceFromReceipt(receipt);
1044
+ return { receipt, sequence };
1045
+ }
1046
+ /**
1047
+ * Get guardians for an identity
1048
+ */
1049
+ async getGuardians(identityKeyHash) {
1050
+ const result = await this.hubContract.getGuardians(identityKeyHash);
1051
+ return {
1052
+ guardians: result.guardians,
1053
+ threshold: result.threshold,
1054
+ isConfigured: result.isConfigured
1055
+ };
1056
+ }
1057
+ /**
1058
+ * Get recovery status for an identity
1059
+ */
1060
+ async getRecoveryStatus(identityKeyHash) {
1061
+ const result = await this.hubContract.getRecoveryStatus(identityKeyHash);
1062
+ return {
1063
+ isActive: result.isActive,
1064
+ newOwnerKeyHash: result.newOwnerKeyHash,
1065
+ initiatedAt: result.initiatedAt,
1066
+ approvalCount: result.approvalCount,
1067
+ threshold: result.threshold,
1068
+ canExecuteAt: result.canExecuteAt,
1069
+ expiresAt: result.expiresAt
1070
+ };
1071
+ }
1072
+ /**
1073
+ * Check if a guardian has approved recovery
1074
+ */
1075
+ async hasGuardianApproved(identityKeyHash, guardianKeyHash) {
1076
+ return this.hubContract.hasGuardianApproved(identityKeyHash, guardianKeyHash);
1077
+ }
1078
+ /**
1079
+ * Helper to extract sequence from transaction receipt
1080
+ */
1081
+ _extractSequenceFromReceipt(receipt) {
1082
+ for (const log of receipt.logs) {
1083
+ try {
1084
+ const parsed = this.hubContract.interface.parseLog({
1085
+ topics: log.topics,
1086
+ data: log.data
1087
+ });
1088
+ if (parsed?.name === "Dispatch") {
1089
+ return BigInt(parsed.args.sequence);
1090
+ }
1091
+ } catch {
1092
+ }
1093
+ }
1094
+ return 0n;
1095
+ }
1096
+ };
1097
+
1098
+ export {
1099
+ EVMClient
1100
+ };
1101
+ //# sourceMappingURL=chunk-AORSW75A.mjs.map