clawntenna 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +74 -0
- package/dist/cli/index.js +3695 -0
- package/dist/index.cjs +697 -0
- package/dist/index.cjs.map +1 -0
- package/dist/index.d.cts +301 -0
- package/dist/index.d.ts +301 -0
- package/dist/index.js +635 -0
- package/dist/index.js.map +1 -0
- package/package.json +64 -0
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/client.ts","../src/chains.ts","../src/contracts.ts","../src/crypto/encrypt.ts","../src/types.ts","../src/constants.ts","../src/crypto/ecdh.ts"],"sourcesContent":["import { ethers } from 'ethers';\nimport { CHAINS } from './chains.js';\nimport { REGISTRY_ABI, KEY_MANAGER_ABI } from './contracts.js';\nimport {\n derivePublicTopicKey,\n deriveKeyFromPassphrase,\n encryptMessage,\n decryptMessage,\n} from './crypto/encrypt.js';\nimport {\n deriveKeypairFromSignature,\n keypairFromPrivateKey,\n computeSharedSecret,\n deriveAESKeyFromSecret,\n encryptTopicKeyForUser,\n decryptTopicKey,\n bytesToHex,\n hexToBytes,\n} from './crypto/ecdh.js';\nimport { AccessLevel } from './types.js';\nimport type {\n ClawtennaOptions,\n ReadOptions,\n SendOptions,\n Message,\n Topic,\n Application,\n Member,\n TopicMessageFee,\n ChainName,\n} from './types.js';\n\nexport class Clawntenna {\n readonly provider: ethers.JsonRpcProvider;\n readonly wallet: ethers.Wallet | null;\n readonly registry: ethers.Contract;\n readonly keyManager: ethers.Contract;\n readonly chainName: ChainName;\n\n // In-memory ECDH state\n private ecdhPrivateKey: Uint8Array | null = null;\n private ecdhPublicKey: Uint8Array | null = null;\n private topicKeys: Map<number, Uint8Array> = new Map();\n\n constructor(options: ClawtennaOptions = {}) {\n const chainName = options.chain ?? 'base';\n const chain = CHAINS[chainName];\n if (!chain) throw new Error(`Unsupported chain: ${chainName}`);\n this.chainName = chainName;\n\n const rpcUrl = options.rpcUrl ?? chain.rpc;\n this.provider = new ethers.JsonRpcProvider(rpcUrl);\n\n const registryAddr = options.registryAddress ?? chain.registry;\n const keyManagerAddr = options.keyManagerAddress ?? chain.keyManager;\n\n if (options.privateKey) {\n this.wallet = new ethers.Wallet(options.privateKey, this.provider);\n this.registry = new ethers.Contract(registryAddr, REGISTRY_ABI, this.wallet);\n this.keyManager = new ethers.Contract(keyManagerAddr, KEY_MANAGER_ABI, this.wallet);\n } else {\n this.wallet = null;\n this.registry = new ethers.Contract(registryAddr, REGISTRY_ABI, this.provider);\n this.keyManager = new ethers.Contract(keyManagerAddr, KEY_MANAGER_ABI, this.provider);\n }\n }\n\n get address(): string | null {\n return this.wallet?.address ?? null;\n }\n\n // ===== MESSAGING =====\n\n /**\n * Send an encrypted message to a topic.\n * Automatically determines encryption key based on topic access level.\n */\n async sendMessage(topicId: number, text: string, options?: SendOptions): Promise<ethers.TransactionResponse> {\n if (!this.wallet) throw new Error('Wallet required to send messages');\n\n const key = await this.getEncryptionKey(topicId);\n const encrypted = encryptMessage(text, key, {\n replyTo: options?.replyTo,\n mentions: options?.mentions,\n });\n\n return this.registry.sendMessage(topicId, ethers.toUtf8Bytes(encrypted));\n }\n\n /**\n * Read and decrypt recent messages from a topic.\n */\n async readMessages(topicId: number, options?: ReadOptions): Promise<Message[]> {\n const limit = options?.limit ?? 50;\n const fromBlock = options?.fromBlock ?? -100_000;\n\n const key = await this.getEncryptionKey(topicId);\n const filter = this.registry.filters.MessageSent(topicId);\n const events = await this.registry.queryFilter(filter, fromBlock);\n\n const messages: Message[] = [];\n const recent = events.slice(-limit);\n\n for (const event of recent) {\n const log = event as ethers.EventLog;\n const payloadStr = ethers.toUtf8String(log.args.payload);\n const parsed = decryptMessage(payloadStr, key);\n\n messages.push({\n topicId: BigInt(topicId),\n sender: log.args.sender,\n text: parsed?.text ?? '[decryption failed]',\n replyTo: parsed?.replyTo ?? null,\n mentions: parsed?.mentions ?? null,\n timestamp: log.args.timestamp,\n txHash: log.transactionHash,\n blockNumber: log.blockNumber,\n });\n }\n\n return messages;\n }\n\n /**\n * Subscribe to real-time messages on a topic.\n * Returns an unsubscribe function.\n */\n onMessage(\n topicId: number,\n callback: (msg: Message) => void\n ): () => void {\n let key: Uint8Array | null = null;\n\n // Pre-derive key, then start listening\n this.getEncryptionKey(topicId).then((k) => {\n key = k;\n });\n\n const handler = (\n tId: bigint,\n sender: string,\n payload: string,\n timestamp: bigint,\n event: ethers.EventLog\n ) => {\n if (!key) return;\n const payloadStr = ethers.toUtf8String(payload);\n const parsed = decryptMessage(payloadStr, key);\n\n callback({\n topicId: tId,\n sender,\n text: parsed?.text ?? '[decryption failed]',\n replyTo: parsed?.replyTo ?? null,\n mentions: parsed?.mentions ?? null,\n timestamp,\n txHash: event.transactionHash,\n blockNumber: event.blockNumber,\n });\n };\n\n this.registry.on(this.registry.filters.MessageSent(topicId), handler);\n return () => {\n this.registry.off(this.registry.filters.MessageSent(topicId), handler);\n };\n }\n\n // ===== NICKNAMES =====\n\n async setNickname(appId: number, nickname: string): Promise<ethers.TransactionResponse> {\n if (!this.wallet) throw new Error('Wallet required');\n return this.registry.setNickname(appId, nickname);\n }\n\n async getNickname(appId: number, address: string): Promise<string> {\n return this.registry.getNickname(appId, address);\n }\n\n // ===== TOPICS =====\n\n async createTopic(\n appId: number,\n name: string,\n description: string,\n accessLevel: AccessLevel\n ): Promise<ethers.TransactionResponse> {\n if (!this.wallet) throw new Error('Wallet required');\n return this.registry.createTopic(appId, name, description, accessLevel);\n }\n\n async getTopic(topicId: number): Promise<Topic> {\n const t = await this.registry.getTopic(topicId);\n return {\n id: t.id,\n applicationId: t.applicationId,\n name: t.name,\n description: t.description,\n owner: t.owner,\n creator: t.creator,\n createdAt: t.createdAt,\n lastMessageAt: t.lastMessageAt,\n messageCount: t.messageCount,\n accessLevel: Number(t.accessLevel),\n active: t.active,\n };\n }\n\n async getApplicationTopics(appId: number): Promise<bigint[]> {\n return this.registry.getApplicationTopics(appId);\n }\n\n async setTopicPermission(\n topicId: number,\n user: string,\n permission: number\n ): Promise<ethers.TransactionResponse> {\n if (!this.wallet) throw new Error('Wallet required');\n return this.registry.setTopicPermission(topicId, user, permission);\n }\n\n // ===== MEMBERS =====\n\n async addMember(\n appId: number,\n address: string,\n nickname: string,\n roles: number\n ): Promise<ethers.TransactionResponse> {\n if (!this.wallet) throw new Error('Wallet required');\n return this.registry.addMember(appId, address, nickname, roles);\n }\n\n async removeMember(appId: number, address: string): Promise<ethers.TransactionResponse> {\n if (!this.wallet) throw new Error('Wallet required');\n return this.registry.removeMember(appId, address);\n }\n\n async updateMemberRoles(\n appId: number,\n address: string,\n roles: number\n ): Promise<ethers.TransactionResponse> {\n if (!this.wallet) throw new Error('Wallet required');\n return this.registry.updateMemberRoles(appId, address, roles);\n }\n\n async getMember(appId: number, address: string): Promise<Member> {\n const m = await this.registry.getMember(appId, address);\n return {\n account: m.account,\n nickname: m.nickname,\n roles: Number(m.roles),\n joinedAt: m.joinedAt,\n };\n }\n\n async isMember(appId: number, address: string): Promise<boolean> {\n return this.registry.isMember(appId, address);\n }\n\n async getApplicationMembers(appId: number): Promise<string[]> {\n return this.registry.getApplicationMembers(appId);\n }\n\n // ===== ACCESS CHECKS =====\n\n async canRead(topicId: number, address: string): Promise<boolean> {\n return this.registry.canReadTopic(topicId, address);\n }\n\n async canWrite(topicId: number, address: string): Promise<boolean> {\n return this.registry.canWriteToTopic(topicId, address);\n }\n\n // ===== APPLICATIONS =====\n\n async createApplication(\n name: string,\n description: string,\n frontendUrl: string,\n allowPublicTopicCreation: boolean\n ): Promise<ethers.TransactionResponse> {\n if (!this.wallet) throw new Error('Wallet required');\n return this.registry.createApplication(name, description, frontendUrl, allowPublicTopicCreation);\n }\n\n async getApplication(appId: number): Promise<Application> {\n const a = await this.registry.getApplication(appId);\n return {\n id: a.id,\n name: a.name,\n description: a.description,\n frontendUrl: a.frontendUrl,\n owner: a.owner,\n createdAt: a.createdAt,\n memberCount: Number(a.memberCount),\n topicCount: Number(a.topicCount),\n active: a.active,\n allowPublicTopicCreation: a.allowPublicTopicCreation,\n topicCreationFeeToken: a.topicCreationFeeToken,\n topicCreationFeeAmount: a.topicCreationFeeAmount,\n };\n }\n\n // ===== FEES =====\n\n async getTopicMessageFee(topicId: number): Promise<TopicMessageFee> {\n const [token, amount] = await this.registry.getTopicMessageFee(topicId);\n return { token, amount };\n }\n\n // ===== ECDH (Private Topics) =====\n\n /**\n * Derive ECDH keypair from wallet signature (deterministic).\n * Requires a signer capable of signing messages.\n */\n async deriveECDHFromWallet(appId: number = 1): Promise<{ publicKey: Uint8Array }> {\n if (!this.wallet) throw new Error('Wallet required');\n\n const { privateKey, publicKey } = await deriveKeypairFromSignature(\n this.wallet.address,\n (msg) => this.wallet!.signMessage(msg),\n appId\n );\n\n this.ecdhPrivateKey = privateKey;\n this.ecdhPublicKey = publicKey;\n return { publicKey };\n }\n\n /**\n * Load ECDH keypair from a hex private key (e.g. from credentials file).\n */\n loadECDHKeypair(privateKeyHex: string): void {\n const { privateKey, publicKey } = keypairFromPrivateKey(privateKeyHex);\n this.ecdhPrivateKey = privateKey;\n this.ecdhPublicKey = publicKey;\n }\n\n /**\n * Register ECDH public key on-chain.\n */\n async registerPublicKey(): Promise<ethers.TransactionResponse> {\n if (!this.wallet) throw new Error('Wallet required');\n if (!this.ecdhPublicKey) throw new Error('ECDH key not derived yet');\n\n const hasKey = await this.keyManager.hasPublicKey(this.wallet.address);\n if (hasKey) {\n throw new Error('Public key already registered on-chain');\n }\n\n return this.keyManager.registerPublicKey(this.ecdhPublicKey);\n }\n\n /**\n * Fetch and decrypt the topic symmetric key from an on-chain ECDH grant.\n */\n async fetchAndDecryptTopicKey(topicId: number): Promise<Uint8Array> {\n if (!this.ecdhPrivateKey) throw new Error('ECDH key not derived yet');\n\n const grant = await this.keyManager.getMyKey(topicId);\n const encryptedKey = ethers.getBytes(grant.encryptedKey);\n const granterPubKey = ethers.getBytes(grant.granterPublicKey);\n\n const topicKey = decryptTopicKey(encryptedKey, this.ecdhPrivateKey, granterPubKey);\n this.topicKeys.set(topicId, topicKey);\n return topicKey;\n }\n\n /**\n * Grant a user access to a private topic's symmetric key.\n */\n async grantKeyAccess(\n topicId: number,\n userAddress: string,\n topicKey: Uint8Array\n ): Promise<ethers.TransactionResponse> {\n if (!this.wallet) throw new Error('Wallet required');\n if (!this.ecdhPrivateKey) throw new Error('ECDH key not derived yet');\n\n const userPubKeyBytes = ethers.getBytes(await this.keyManager.getPublicKey(userAddress));\n const encrypted = encryptTopicKeyForUser(topicKey, this.ecdhPrivateKey, userPubKeyBytes);\n return this.keyManager.grantKeyAccess(topicId, userAddress, encrypted);\n }\n\n /**\n * Store a pre-known topic key (e.g. loaded from credentials).\n */\n setTopicKey(topicId: number, key: Uint8Array): void {\n this.topicKeys.set(topicId, key);\n }\n\n // ===== INTERNAL =====\n\n /**\n * Get the encryption key for a topic, determining the type automatically.\n */\n private async getEncryptionKey(topicId: number): Promise<Uint8Array> {\n // Check for a stored private topic key first\n const storedKey = this.topicKeys.get(topicId);\n if (storedKey) return storedKey;\n\n // Fetch topic metadata to determine access level\n const topic = await this.getTopic(topicId);\n\n if (topic.accessLevel === AccessLevel.PRIVATE) {\n throw new Error(\n `Topic ${topicId} is PRIVATE. Call fetchAndDecryptTopicKey() or setTopicKey() first.`\n );\n }\n\n // Public or public_limited: derive deterministic key\n return derivePublicTopicKey(topicId);\n }\n}\n","import type { ChainConfig, ChainName } from './types.js';\n\nexport const CHAINS: Record<ChainName, ChainConfig> = {\n base: {\n chainId: 8453,\n name: 'Base',\n shortName: 'Base',\n rpc: 'https://base.publicnode.com',\n explorer: 'https://basescan.org',\n registry: '0x5fF6BF04F1B5A78ae884D977a3C80A0D8E2072bF',\n keyManager: '0xdc302ff43a34F6aEa19426D60C9D150e0661E4f4',\n },\n avalanche: {\n chainId: 43114,\n name: 'Avalanche C-Chain',\n shortName: 'Avalanche',\n rpc: 'https://api.avax.network/ext/bc/C/rpc',\n explorer: 'https://snowtrace.io',\n registry: '0x3Ca2FF0bD1b3633513299EB5d3e2d63e058b0713',\n keyManager: '0x5a5ea9D408FBA984fFf6e243Dcc71ff6E00C73E4',\n },\n};\n\nexport const CHAIN_IDS: Record<number, ChainName> = {\n 8453: 'base',\n 43114: 'avalanche',\n};\n\nexport function getChain(nameOrId: ChainName | number): ChainConfig {\n if (typeof nameOrId === 'number') {\n const name = CHAIN_IDS[nameOrId];\n if (!name) throw new Error(`Unsupported chain ID: ${nameOrId}`);\n return CHAINS[name];\n }\n const chain = CHAINS[nameOrId];\n if (!chain) throw new Error(`Unsupported chain: ${nameOrId}`);\n return chain;\n}\n","export const REGISTRY_ABI = [\n // ===== READ FUNCTIONS =====\n\n // Applications\n 'function applications(uint256) view returns (uint256 id, string name, string description, string frontendUrl, address owner, uint64 createdAt, uint32 memberCount, uint32 topicCount, bool active, bool allowPublicTopicCreation)',\n 'function getApplication(uint256 appId) view returns (tuple(uint256 id, string name, string description, string frontendUrl, address owner, uint64 createdAt, uint32 memberCount, uint32 topicCount, bool active, bool allowPublicTopicCreation, address topicCreationFeeToken, uint256 topicCreationFeeAmount))',\n 'function applicationCount() view returns (uint256)',\n 'function applicationNames(string) view returns (uint256)',\n\n // Topics\n 'function topics(uint256) view returns (uint256 id, uint256 applicationId, string name, string description, address owner, address creator, uint64 createdAt, uint64 lastMessageAt, uint256 messageCount, uint8 accessLevel, bool active)',\n 'function getTopic(uint256 topicId) view returns (tuple(uint256 id, uint256 applicationId, string name, string description, address owner, address creator, uint64 createdAt, uint64 lastMessageAt, uint256 messageCount, uint8 accessLevel, bool active))',\n 'function topicCount() view returns (uint256)',\n 'function getApplicationTopics(uint256 appId) view returns (uint256[])',\n\n // Members\n 'function members(uint256 appId, address user) view returns (address account, string nickname, uint8 roles, uint64 joinedAt)',\n 'function getMember(uint256 appId, address account) view returns (tuple(address account, string nickname, uint8 roles, uint64 joinedAt))',\n 'function isMember(uint256 appId, address account) view returns (bool)',\n 'function getApplicationMembers(uint256 appId) view returns (address[])',\n\n // Permissions\n 'function canReadTopic(uint256 topicId, address user) view returns (bool)',\n 'function canWriteToTopic(uint256 topicId, address user) view returns (bool)',\n 'function getTopicPermission(uint256 topicId, address user) view returns (uint8)',\n 'function topicPermissions(uint256, address) view returns (uint8)',\n\n // Nicknames\n 'function getNickname(uint256 appId, address user) view returns (string)',\n 'function hasNickname(uint256 appId, address user) view returns (bool)',\n 'function canChangeNickname(uint256 appId, address user) view returns (bool canChange, uint256 timeRemaining)',\n 'function appNicknameCooldown(uint256 appId) view returns (uint256)',\n\n // Fees\n 'function getTopicMessageFee(uint256 topicId) view returns (address token, uint256 amount)',\n\n // ===== WRITE FUNCTIONS =====\n\n // Applications\n 'function createApplication(string name, string description, string frontendUrl, bool allowPublicTopicCreation) returns (uint256)',\n 'function updateApplicationFrontendUrl(uint256 appId, string frontendUrl)',\n\n // Topics\n 'function createTopic(uint256 appId, string name, string description, uint8 accessLevel) returns (uint256)',\n 'function setTopicPermission(uint256 topicId, address user, uint8 permission)',\n\n // Members\n 'function addMember(uint256 appId, address member, string nickname, uint8 roles)',\n 'function removeMember(uint256 appId, address member)',\n 'function updateMemberRoles(uint256 appId, address member, uint8 roles)',\n 'function updateMemberNickname(uint256 appId, string nickname)',\n\n // Nicknames (V3)\n 'function setNickname(uint256 appId, string nickname)',\n 'function clearNickname(uint256 appId)',\n 'function setNicknameCooldown(uint256 appId, uint256 cooldownSeconds)',\n\n // Messaging\n 'function sendMessage(uint256 topicId, bytes payload)',\n\n // Fees\n 'function setTopicCreationFee(uint256 appId, address feeTokenAddr, uint256 feeAmount)',\n 'function setTopicMessageFee(uint256 topicId, address feeTokenAddr, uint256 feeAmount)',\n\n // ===== EVENTS =====\n 'event ApplicationCreated(uint256 indexed applicationId, string name, address indexed owner)',\n 'event TopicCreated(uint256 indexed topicId, uint256 indexed applicationId, string name, address indexed creator, uint8 accessLevel)',\n 'event MemberAdded(uint256 indexed applicationId, address indexed member, string nickname, uint8 roles)',\n 'event MemberRemoved(uint256 indexed applicationId, address indexed member)',\n 'event MemberRolesUpdated(uint256 indexed applicationId, address indexed member, uint8 roles)',\n 'event NicknameUpdated(uint256 indexed applicationId, address indexed member, string nickname)',\n 'event UserNicknameSet(uint256 indexed applicationId, address indexed user, string nickname)',\n 'event TopicPermissionSet(uint256 indexed topicId, address indexed user, uint8 permission)',\n 'event MessageSent(uint256 indexed topicId, address indexed sender, bytes payload, uint256 timestamp)',\n 'event TopicMessageFeeUpdated(uint256 indexed topicId, address token, uint256 amount)',\n] as const;\n\nexport const KEY_MANAGER_ABI = [\n // ===== READ FUNCTIONS =====\n 'function hasPublicKey(address user) view returns (bool)',\n 'function getPublicKey(address user) view returns (bytes)',\n 'function publicKeys(address) view returns (bytes)',\n 'function hasKeyAccess(uint256 topicId, address user) view returns (bool)',\n 'function getMyKey(uint256 topicId) view returns (bytes encryptedKey, bytes granterPublicKey, address granter, uint256 keyVersion, uint256 currentVersion)',\n 'function getKeyGrant(uint256 topicId, address user) view returns (tuple(bytes encryptedKey, bytes granterPublicKey, address granter, uint256 keyVersion, uint64 grantedAt))',\n 'function keyVersions(uint256 topicId) view returns (uint256)',\n\n // ===== WRITE FUNCTIONS =====\n 'function registerPublicKey(bytes publicKey)',\n 'function grantKeyAccess(uint256 topicId, address user, bytes encryptedKey)',\n 'function batchGrantKeyAccess(uint256 topicId, address[] users, bytes[] encryptedKeys)',\n 'function revokeKeyAccess(uint256 topicId, address user)',\n 'function rotateKey(uint256 topicId)',\n\n // ===== EVENTS =====\n 'event PublicKeyRegistered(address indexed user, bytes publicKey)',\n 'event PublicKeyUpdated(address indexed user, bytes publicKey)',\n 'event KeyAccessGranted(uint256 indexed topicId, address indexed user, address indexed granter, uint256 version)',\n 'event KeyAccessRevoked(uint256 indexed topicId, address indexed user)',\n 'event KeyRotated(uint256 indexed topicId, uint256 newVersion)',\n] as const;\n","import { pbkdf2 } from '@noble/hashes/pbkdf2';\nimport { sha256 } from '@noble/hashes/sha256';\nimport { gcm } from '@noble/ciphers/aes';\nimport { randomBytes } from '@noble/hashes/utils';\nimport {\n PUBLIC_KEY_MATERIAL_PREFIX,\n SALT_PREFIX,\n PBKDF2_ITERATIONS,\n} from '../constants.js';\nimport type { EncryptedPayload, MessageContent } from '../types.js';\n\nconst encoder = new TextEncoder();\nconst decoder = new TextDecoder();\n\n/**\n * Derive AES-256 key for a public/public_limited topic.\n * Uses PBKDF2 with SHA-256, matching the web frontend exactly.\n */\nexport function derivePublicTopicKey(topicId: number | bigint): Uint8Array {\n const keyMaterial = PUBLIC_KEY_MATERIAL_PREFIX + topicId;\n const salt = encoder.encode(SALT_PREFIX + topicId);\n return pbkdf2(sha256, keyMaterial, salt, { c: PBKDF2_ITERATIONS, dkLen: 32 });\n}\n\n/**\n * Derive AES-256 key from arbitrary passphrase (for private topics with manual passphrase).\n */\nexport function deriveKeyFromPassphrase(passphrase: string, topicId: number | bigint): Uint8Array {\n const salt = encoder.encode(SALT_PREFIX + topicId);\n return pbkdf2(sha256, passphrase, salt, { c: PBKDF2_ITERATIONS, dkLen: 32 });\n}\n\n/**\n * Encrypt a message payload with AES-256-GCM.\n * Output format: `{ e: true, v: 2, iv: base64, ct: base64 }`\n * The ciphertext includes the GCM auth tag (last 16 bytes).\n */\nexport function encrypt(plaintext: string, key: Uint8Array): string {\n const iv = randomBytes(12);\n const aes = gcm(key, iv);\n const ciphertext = aes.encrypt(encoder.encode(plaintext));\n\n const payload: EncryptedPayload = {\n e: true,\n v: 2,\n iv: toBase64(iv),\n ct: toBase64(ciphertext),\n };\n return JSON.stringify(payload);\n}\n\n/**\n * Decrypt a message payload. Handles both v1 and v2 formats.\n * Returns the decrypted string or null on failure.\n */\nexport function decrypt(jsonStr: string, key: Uint8Array): string | null {\n try {\n const data = JSON.parse(jsonStr) as EncryptedPayload;\n if (!data.e) {\n // Not encrypted — return raw for caller to parse\n return jsonStr;\n }\n\n const iv = fromBase64(data.iv);\n const ct = fromBase64(data.ct);\n\n const aes = gcm(key, iv);\n const decrypted = aes.decrypt(ct);\n return decoder.decode(decrypted);\n } catch {\n return null;\n }\n}\n\n/**\n * Encrypt a structured message (text + optional replyTo/mentions).\n */\nexport function encryptMessage(\n text: string,\n key: Uint8Array,\n options?: { replyTo?: string; mentions?: string[] }\n): string {\n const content: MessageContent = { text };\n if (options?.replyTo) content.replyTo = options.replyTo;\n if (options?.mentions) content.mentions = options.mentions;\n return encrypt(JSON.stringify(content), key);\n}\n\n/**\n * Decrypt and parse a message payload into structured content.\n */\nexport function decryptMessage(\n jsonStr: string,\n key: Uint8Array\n): { text: string; replyTo: string | null; mentions: string[] | null } | null {\n const decrypted = decrypt(jsonStr, key);\n if (!decrypted) return null;\n\n try {\n const content = JSON.parse(decrypted);\n if (typeof content === 'object' && content.text) {\n return {\n text: content.text,\n replyTo: content.replyTo || null,\n mentions: content.mentions || null,\n };\n }\n // Plain text string was JSON-stringified\n return { text: decrypted, replyTo: null, mentions: null };\n } catch {\n // Raw string, not JSON\n return { text: decrypted, replyTo: null, mentions: null };\n }\n}\n\n// ===== Base64 helpers (isomorphic) =====\n\nfunction toBase64(bytes: Uint8Array): string {\n if (typeof Buffer !== 'undefined') {\n return Buffer.from(bytes).toString('base64');\n }\n return btoa(String.fromCharCode(...bytes));\n}\n\nfunction fromBase64(str: string): Uint8Array {\n if (typeof Buffer !== 'undefined') {\n return new Uint8Array(Buffer.from(str, 'base64'));\n }\n return Uint8Array.from(atob(str), (c) => c.charCodeAt(0));\n}\n","// ===== Enums =====\n\nexport enum AccessLevel {\n PUBLIC = 0,\n PUBLIC_LIMITED = 1,\n PRIVATE = 2,\n}\n\nexport enum Permission {\n NONE = 0,\n READ = 1,\n WRITE = 2,\n READ_WRITE = 3,\n ADMIN = 4,\n}\n\nexport enum Role {\n MEMBER = 1,\n SUPPORT_MANAGER = 2,\n TOPIC_MANAGER = 4,\n ADMIN = 8,\n OWNER_DELEGATE = 16,\n}\n\n// ===== Chain types =====\n\nexport interface ChainConfig {\n chainId: number;\n name: string;\n shortName: string;\n rpc: string;\n explorer: string;\n registry: string;\n keyManager: string;\n}\n\nexport type ChainName = 'base' | 'avalanche';\n\n// ===== Contract return types =====\n\nexport interface Application {\n id: bigint;\n name: string;\n description: string;\n frontendUrl: string;\n owner: string;\n createdAt: bigint;\n memberCount: number;\n topicCount: number;\n active: boolean;\n allowPublicTopicCreation: boolean;\n topicCreationFeeToken?: string;\n topicCreationFeeAmount?: bigint;\n}\n\nexport interface Topic {\n id: bigint;\n applicationId: bigint;\n name: string;\n description: string;\n owner: string;\n creator: string;\n createdAt: bigint;\n lastMessageAt: bigint;\n messageCount: bigint;\n accessLevel: number;\n active: boolean;\n}\n\nexport interface Member {\n account: string;\n nickname: string;\n roles: number;\n joinedAt: bigint;\n}\n\nexport interface KeyGrant {\n encryptedKey: Uint8Array;\n granterPublicKey: Uint8Array;\n granter: string;\n keyVersion: bigint;\n grantedAt?: bigint;\n currentVersion?: bigint;\n}\n\n// ===== Message types =====\n\nexport interface MessageContent {\n text: string;\n replyTo?: string;\n mentions?: string[];\n}\n\nexport interface EncryptedPayload {\n e: boolean;\n v: number;\n iv: string;\n ct: string;\n}\n\nexport interface Message {\n topicId: bigint;\n sender: string;\n text: string;\n replyTo: string | null;\n mentions: string[] | null;\n timestamp: bigint;\n txHash: string;\n blockNumber: number;\n}\n\nexport interface TopicMessageFee {\n token: string;\n amount: bigint;\n}\n\n// ===== Client options =====\n\nexport interface ClawtennaOptions {\n chain?: ChainName;\n chainId?: number;\n rpcUrl?: string;\n privateKey?: string;\n registryAddress?: string;\n keyManagerAddress?: string;\n}\n\nexport interface ReadOptions {\n limit?: number;\n fromBlock?: number;\n}\n\nexport interface SendOptions {\n replyTo?: string;\n mentions?: string[];\n}\n\n// ===== Credentials =====\n\nexport interface Credentials {\n wallet: {\n address: string;\n privateKey: string;\n };\n apps: Record<string, CredentialApp>;\n}\n\nexport interface CredentialApp {\n name: string;\n nickname: string;\n ecdh: {\n privateKey: string;\n publicKey: string;\n registeredOnChain: boolean;\n topicKeys: Record<string, string>;\n } | null;\n}\n","import { AccessLevel, Permission, Role } from './types.js';\n\n// Re-export enums as individual constants for convenience\nexport const ACCESS_PUBLIC = AccessLevel.PUBLIC;\nexport const ACCESS_PUBLIC_LIMITED = AccessLevel.PUBLIC_LIMITED;\nexport const ACCESS_PRIVATE = AccessLevel.PRIVATE;\n\nexport const PERMISSION_NONE = Permission.NONE;\nexport const PERMISSION_READ = Permission.READ;\nexport const PERMISSION_WRITE = Permission.WRITE;\nexport const PERMISSION_READ_WRITE = Permission.READ_WRITE;\nexport const PERMISSION_ADMIN = Permission.ADMIN;\n\nexport const ROLE_MEMBER = Role.MEMBER;\nexport const ROLE_SUPPORT_MANAGER = Role.SUPPORT_MANAGER;\nexport const ROLE_TOPIC_MANAGER = Role.TOPIC_MANAGER;\nexport const ROLE_ADMIN = Role.ADMIN;\nexport const ROLE_OWNER_DELEGATE = Role.OWNER_DELEGATE;\n\n// Encryption constants\nexport const PUBLIC_KEY_MATERIAL_PREFIX = 'antenna-public-topic-';\nexport const SALT_PREFIX = 'antenna-v2-salt-';\nexport const PBKDF2_ITERATIONS = 100_000;\nexport const ECDH_HKDF_SALT = 'antenna-ecdh-v1';\nexport const ECDH_HKDF_INFO = 'topic-key-encryption';\nexport const ECDH_DERIVATION_MESSAGE = (address: string, appId: number) =>\n `Clawntenna ECDH Key Derivation\\n\\nThis signature generates your encryption key.\\nIt never leaves your device.\\n\\nWallet: ${address}\\nApp: ${appId}\\nChain: Base (8453)`;\n","import { secp256k1 } from '@noble/curves/secp256k1';\nimport { hkdf } from '@noble/hashes/hkdf';\nimport { sha256 } from '@noble/hashes/sha256';\nimport { gcm } from '@noble/ciphers/aes';\nimport { randomBytes } from '@noble/hashes/utils';\nimport { ECDH_HKDF_SALT, ECDH_HKDF_INFO, ECDH_DERIVATION_MESSAGE } from '../constants.js';\n\nconst encoder = new TextEncoder();\n\n/**\n * Derive an ECDH keypair deterministically from a wallet signature.\n * This produces the same keypair as the web frontend for the same wallet + app.\n */\nexport async function deriveKeypairFromSignature(\n walletAddress: string,\n signMessage: (message: string) => Promise<string>,\n appId: number = 1\n): Promise<{ privateKey: Uint8Array; publicKey: Uint8Array }> {\n const message = ECDH_DERIVATION_MESSAGE(walletAddress, appId);\n const signature = await signMessage(message);\n\n // Hash the signature string (as UTF-8 bytes) to get private key\n const sigBytes = encoder.encode(signature);\n const hashBuffer = sha256(sigBytes);\n const privateKey = new Uint8Array(hashBuffer);\n\n // Derive compressed public key\n const publicKey = secp256k1.getPublicKey(privateKey, true);\n\n return { privateKey, publicKey };\n}\n\n/**\n * Derive ECDH keypair from a raw private key (e.g. from stored credentials).\n */\nexport function keypairFromPrivateKey(privateKeyHex: string): {\n privateKey: Uint8Array;\n publicKey: Uint8Array;\n} {\n const cleaned = privateKeyHex.startsWith('0x') ? privateKeyHex.slice(2) : privateKeyHex;\n const privateKey = hexToBytes(cleaned);\n const publicKey = secp256k1.getPublicKey(privateKey, true);\n return { privateKey, publicKey };\n}\n\n/**\n * Compute ECDH shared secret (x-coordinate of shared point).\n */\nexport function computeSharedSecret(\n ourPrivateKey: Uint8Array,\n theirPublicKey: Uint8Array\n): Uint8Array {\n const sharedPoint = secp256k1.getSharedSecret(ourPrivateKey, theirPublicKey);\n // Return x-coordinate only (skip the 0x04 prefix byte)\n return sharedPoint.slice(1, 33);\n}\n\n/**\n * Derive AES-256 key from an ECDH shared secret using HKDF.\n * Matches the web frontend: salt='antenna-ecdh-v1', info='topic-key-encryption'.\n */\nexport function deriveAESKeyFromSecret(\n sharedSecret: Uint8Array,\n info: string = ECDH_HKDF_INFO\n): Uint8Array {\n return hkdf(sha256, sharedSecret, encoder.encode(ECDH_HKDF_SALT), info, 32);\n}\n\n/**\n * Encrypt a topic symmetric key for a recipient using ECDH.\n * Returns IV (12 bytes) + ciphertext (includes GCM auth tag).\n */\nexport function encryptTopicKeyForUser(\n topicKey: Uint8Array,\n ourPrivateKey: Uint8Array,\n recipientPublicKey: Uint8Array\n): Uint8Array {\n const shared = computeSharedSecret(ourPrivateKey, recipientPublicKey);\n const aesKey = deriveAESKeyFromSecret(shared);\n const iv = randomBytes(12);\n const aes = gcm(aesKey, iv);\n const ciphertext = aes.encrypt(topicKey);\n\n // Combine: IV + ciphertext\n const result = new Uint8Array(iv.length + ciphertext.length);\n result.set(iv);\n result.set(ciphertext, iv.length);\n return result;\n}\n\n/**\n * Decrypt a topic symmetric key received via ECDH grant.\n * Input format: IV (12 bytes) + ciphertext (includes GCM auth tag).\n */\nexport function decryptTopicKey(\n encryptedKey: Uint8Array,\n ourPrivateKey: Uint8Array,\n granterPublicKey: Uint8Array\n): Uint8Array {\n const shared = computeSharedSecret(ourPrivateKey, granterPublicKey);\n const aesKey = deriveAESKeyFromSecret(shared);\n const iv = encryptedKey.slice(0, 12);\n const ciphertext = encryptedKey.slice(12);\n const aes = gcm(aesKey, iv);\n return aes.decrypt(ciphertext);\n}\n\n// ===== Hex helpers =====\n\nexport function bytesToHex(bytes: Uint8Array): string {\n return '0x' + Array.from(bytes).map((b) => b.toString(16).padStart(2, '0')).join('');\n}\n\nexport function hexToBytes(hex: string): Uint8Array {\n const cleaned = hex.startsWith('0x') ? hex.slice(2) : hex;\n return new Uint8Array(cleaned.match(/.{1,2}/g)!.map((b) => parseInt(b, 16)));\n}\n"],"mappings":";AAAA,SAAS,cAAc;;;ACEhB,IAAM,SAAyC;AAAA,EACpD,MAAM;AAAA,IACJ,SAAS;AAAA,IACT,MAAM;AAAA,IACN,WAAW;AAAA,IACX,KAAK;AAAA,IACL,UAAU;AAAA,IACV,UAAU;AAAA,IACV,YAAY;AAAA,EACd;AAAA,EACA,WAAW;AAAA,IACT,SAAS;AAAA,IACT,MAAM;AAAA,IACN,WAAW;AAAA,IACX,KAAK;AAAA,IACL,UAAU;AAAA,IACV,UAAU;AAAA,IACV,YAAY;AAAA,EACd;AACF;AAEO,IAAM,YAAuC;AAAA,EAClD,MAAM;AAAA,EACN,OAAO;AACT;AAEO,SAAS,SAAS,UAA2C;AAClE,MAAI,OAAO,aAAa,UAAU;AAChC,UAAM,OAAO,UAAU,QAAQ;AAC/B,QAAI,CAAC,KAAM,OAAM,IAAI,MAAM,yBAAyB,QAAQ,EAAE;AAC9D,WAAO,OAAO,IAAI;AAAA,EACpB;AACA,QAAM,QAAQ,OAAO,QAAQ;AAC7B,MAAI,CAAC,MAAO,OAAM,IAAI,MAAM,sBAAsB,QAAQ,EAAE;AAC5D,SAAO;AACT;;;ACrCO,IAAM,eAAe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kBAAkB;AAAA;AAAA,EAE7B;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA;AAAA,EAGA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA;AAAA,EAGA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;;;ACpGA,SAAS,cAAc;AACvB,SAAS,cAAc;AACvB,SAAS,WAAW;AACpB,SAAS,mBAAmB;;;ACDrB,IAAK,cAAL,kBAAKA,iBAAL;AACL,EAAAA,0BAAA,YAAS,KAAT;AACA,EAAAA,0BAAA,oBAAiB,KAAjB;AACA,EAAAA,0BAAA,aAAU,KAAV;AAHU,SAAAA;AAAA,GAAA;AAML,IAAK,aAAL,kBAAKC,gBAAL;AACL,EAAAA,wBAAA,UAAO,KAAP;AACA,EAAAA,wBAAA,UAAO,KAAP;AACA,EAAAA,wBAAA,WAAQ,KAAR;AACA,EAAAA,wBAAA,gBAAa,KAAb;AACA,EAAAA,wBAAA,WAAQ,KAAR;AALU,SAAAA;AAAA,GAAA;AAQL,IAAK,OAAL,kBAAKC,UAAL;AACL,EAAAA,YAAA,YAAS,KAAT;AACA,EAAAA,YAAA,qBAAkB,KAAlB;AACA,EAAAA,YAAA,mBAAgB,KAAhB;AACA,EAAAA,YAAA,WAAQ,KAAR;AACA,EAAAA,YAAA,oBAAiB,MAAjB;AALU,SAAAA;AAAA,GAAA;;;ACbL,IAAM;AACN,IAAM;AACN,IAAM;AAEN,IAAM;AACN,IAAM;AACN,IAAM;AACN,IAAM;AACN,IAAM;AAEN,IAAM;AACN,IAAM;AACN,IAAM;AACN,IAAM;AACN,IAAM;AAGN,IAAM,6BAA6B;AACnC,IAAM,cAAc;AACpB,IAAM,oBAAoB;AAC1B,IAAM,iBAAiB;AACvB,IAAM,iBAAiB;AACvB,IAAM,0BAA0B,CAAC,SAAiB,UACvD;AAAA;AAAA;AAAA;AAAA;AAAA,UAA4H,OAAO;AAAA,OAAU,KAAK;AAAA;;;AFfpJ,IAAM,UAAU,IAAI,YAAY;AAChC,IAAM,UAAU,IAAI,YAAY;AAMzB,SAAS,qBAAqB,SAAsC;AACzE,QAAM,cAAc,6BAA6B;AACjD,QAAM,OAAO,QAAQ,OAAO,cAAc,OAAO;AACjD,SAAO,OAAO,QAAQ,aAAa,MAAM,EAAE,GAAG,mBAAmB,OAAO,GAAG,CAAC;AAC9E;AAKO,SAAS,wBAAwB,YAAoB,SAAsC;AAChG,QAAM,OAAO,QAAQ,OAAO,cAAc,OAAO;AACjD,SAAO,OAAO,QAAQ,YAAY,MAAM,EAAE,GAAG,mBAAmB,OAAO,GAAG,CAAC;AAC7E;AAOO,SAAS,QAAQ,WAAmB,KAAyB;AAClE,QAAM,KAAK,YAAY,EAAE;AACzB,QAAM,MAAM,IAAI,KAAK,EAAE;AACvB,QAAM,aAAa,IAAI,QAAQ,QAAQ,OAAO,SAAS,CAAC;AAExD,QAAM,UAA4B;AAAA,IAChC,GAAG;AAAA,IACH,GAAG;AAAA,IACH,IAAI,SAAS,EAAE;AAAA,IACf,IAAI,SAAS,UAAU;AAAA,EACzB;AACA,SAAO,KAAK,UAAU,OAAO;AAC/B;AAMO,SAAS,QAAQ,SAAiB,KAAgC;AACvE,MAAI;AACF,UAAM,OAAO,KAAK,MAAM,OAAO;AAC/B,QAAI,CAAC,KAAK,GAAG;AAEX,aAAO;AAAA,IACT;AAEA,UAAM,KAAK,WAAW,KAAK,EAAE;AAC7B,UAAM,KAAK,WAAW,KAAK,EAAE;AAE7B,UAAM,MAAM,IAAI,KAAK,EAAE;AACvB,UAAM,YAAY,IAAI,QAAQ,EAAE;AAChC,WAAO,QAAQ,OAAO,SAAS;AAAA,EACjC,QAAQ;AACN,WAAO;AAAA,EACT;AACF;AAKO,SAAS,eACd,MACA,KACA,SACQ;AACR,QAAM,UAA0B,EAAE,KAAK;AACvC,MAAI,SAAS,QAAS,SAAQ,UAAU,QAAQ;AAChD,MAAI,SAAS,SAAU,SAAQ,WAAW,QAAQ;AAClD,SAAO,QAAQ,KAAK,UAAU,OAAO,GAAG,GAAG;AAC7C;AAKO,SAAS,eACd,SACA,KAC4E;AAC5E,QAAM,YAAY,QAAQ,SAAS,GAAG;AACtC,MAAI,CAAC,UAAW,QAAO;AAEvB,MAAI;AACF,UAAM,UAAU,KAAK,MAAM,SAAS;AACpC,QAAI,OAAO,YAAY,YAAY,QAAQ,MAAM;AAC/C,aAAO;AAAA,QACL,MAAM,QAAQ;AAAA,QACd,SAAS,QAAQ,WAAW;AAAA,QAC5B,UAAU,QAAQ,YAAY;AAAA,MAChC;AAAA,IACF;AAEA,WAAO,EAAE,MAAM,WAAW,SAAS,MAAM,UAAU,KAAK;AAAA,EAC1D,QAAQ;AAEN,WAAO,EAAE,MAAM,WAAW,SAAS,MAAM,UAAU,KAAK;AAAA,EAC1D;AACF;AAIA,SAAS,SAAS,OAA2B;AAC3C,MAAI,OAAO,WAAW,aAAa;AACjC,WAAO,OAAO,KAAK,KAAK,EAAE,SAAS,QAAQ;AAAA,EAC7C;AACA,SAAO,KAAK,OAAO,aAAa,GAAG,KAAK,CAAC;AAC3C;AAEA,SAAS,WAAW,KAAyB;AAC3C,MAAI,OAAO,WAAW,aAAa;AACjC,WAAO,IAAI,WAAW,OAAO,KAAK,KAAK,QAAQ,CAAC;AAAA,EAClD;AACA,SAAO,WAAW,KAAK,KAAK,GAAG,GAAG,CAAC,MAAM,EAAE,WAAW,CAAC,CAAC;AAC1D;;;AGjIA,SAAS,iBAAiB;AAC1B,SAAS,YAAY;AACrB,SAAS,UAAAC,eAAc;AACvB,SAAS,OAAAC,YAAW;AACpB,SAAS,eAAAC,oBAAmB;AAG5B,IAAMC,WAAU,IAAI,YAAY;AAMhC,eAAsB,2BACpB,eACA,aACA,QAAgB,GAC4C;AAC5D,QAAM,UAAU,wBAAwB,eAAe,KAAK;AAC5D,QAAM,YAAY,MAAM,YAAY,OAAO;AAG3C,QAAM,WAAWA,SAAQ,OAAO,SAAS;AACzC,QAAM,aAAaC,QAAO,QAAQ;AAClC,QAAM,aAAa,IAAI,WAAW,UAAU;AAG5C,QAAM,YAAY,UAAU,aAAa,YAAY,IAAI;AAEzD,SAAO,EAAE,YAAY,UAAU;AACjC;AAKO,SAAS,sBAAsB,eAGpC;AACA,QAAM,UAAU,cAAc,WAAW,IAAI,IAAI,cAAc,MAAM,CAAC,IAAI;AAC1E,QAAM,aAAa,WAAW,OAAO;AACrC,QAAM,YAAY,UAAU,aAAa,YAAY,IAAI;AACzD,SAAO,EAAE,YAAY,UAAU;AACjC;AAKO,SAAS,oBACd,eACA,gBACY;AACZ,QAAM,cAAc,UAAU,gBAAgB,eAAe,cAAc;AAE3E,SAAO,YAAY,MAAM,GAAG,EAAE;AAChC;AAMO,SAAS,uBACd,cACA,OAAe,gBACH;AACZ,SAAO,KAAKA,SAAQ,cAAcD,SAAQ,OAAO,cAAc,GAAG,MAAM,EAAE;AAC5E;AAMO,SAAS,uBACd,UACA,eACA,oBACY;AACZ,QAAM,SAAS,oBAAoB,eAAe,kBAAkB;AACpE,QAAM,SAAS,uBAAuB,MAAM;AAC5C,QAAM,KAAKE,aAAY,EAAE;AACzB,QAAM,MAAMC,KAAI,QAAQ,EAAE;AAC1B,QAAM,aAAa,IAAI,QAAQ,QAAQ;AAGvC,QAAM,SAAS,IAAI,WAAW,GAAG,SAAS,WAAW,MAAM;AAC3D,SAAO,IAAI,EAAE;AACb,SAAO,IAAI,YAAY,GAAG,MAAM;AAChC,SAAO;AACT;AAMO,SAAS,gBACd,cACA,eACA,kBACY;AACZ,QAAM,SAAS,oBAAoB,eAAe,gBAAgB;AAClE,QAAM,SAAS,uBAAuB,MAAM;AAC5C,QAAM,KAAK,aAAa,MAAM,GAAG,EAAE;AACnC,QAAM,aAAa,aAAa,MAAM,EAAE;AACxC,QAAM,MAAMA,KAAI,QAAQ,EAAE;AAC1B,SAAO,IAAI,QAAQ,UAAU;AAC/B;AAIO,SAAS,WAAW,OAA2B;AACpD,SAAO,OAAO,MAAM,KAAK,KAAK,EAAE,IAAI,CAAC,MAAM,EAAE,SAAS,EAAE,EAAE,SAAS,GAAG,GAAG,CAAC,EAAE,KAAK,EAAE;AACrF;AAEO,SAAS,WAAW,KAAyB;AAClD,QAAM,UAAU,IAAI,WAAW,IAAI,IAAI,IAAI,MAAM,CAAC,IAAI;AACtD,SAAO,IAAI,WAAW,QAAQ,MAAM,SAAS,EAAG,IAAI,CAAC,MAAM,SAAS,GAAG,EAAE,CAAC,CAAC;AAC7E;;;ANpFO,IAAM,aAAN,MAAiB;AAAA,EACb;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA;AAAA,EAGD,iBAAoC;AAAA,EACpC,gBAAmC;AAAA,EACnC,YAAqC,oBAAI,IAAI;AAAA,EAErD,YAAY,UAA4B,CAAC,GAAG;AAC1C,UAAM,YAAY,QAAQ,SAAS;AACnC,UAAM,QAAQ,OAAO,SAAS;AAC9B,QAAI,CAAC,MAAO,OAAM,IAAI,MAAM,sBAAsB,SAAS,EAAE;AAC7D,SAAK,YAAY;AAEjB,UAAM,SAAS,QAAQ,UAAU,MAAM;AACvC,SAAK,WAAW,IAAI,OAAO,gBAAgB,MAAM;AAEjD,UAAM,eAAe,QAAQ,mBAAmB,MAAM;AACtD,UAAM,iBAAiB,QAAQ,qBAAqB,MAAM;AAE1D,QAAI,QAAQ,YAAY;AACtB,WAAK,SAAS,IAAI,OAAO,OAAO,QAAQ,YAAY,KAAK,QAAQ;AACjE,WAAK,WAAW,IAAI,OAAO,SAAS,cAAc,cAAc,KAAK,MAAM;AAC3E,WAAK,aAAa,IAAI,OAAO,SAAS,gBAAgB,iBAAiB,KAAK,MAAM;AAAA,IACpF,OAAO;AACL,WAAK,SAAS;AACd,WAAK,WAAW,IAAI,OAAO,SAAS,cAAc,cAAc,KAAK,QAAQ;AAC7E,WAAK,aAAa,IAAI,OAAO,SAAS,gBAAgB,iBAAiB,KAAK,QAAQ;AAAA,IACtF;AAAA,EACF;AAAA,EAEA,IAAI,UAAyB;AAC3B,WAAO,KAAK,QAAQ,WAAW;AAAA,EACjC;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,MAAM,YAAY,SAAiB,MAAc,SAA4D;AAC3G,QAAI,CAAC,KAAK,OAAQ,OAAM,IAAI,MAAM,kCAAkC;AAEpE,UAAM,MAAM,MAAM,KAAK,iBAAiB,OAAO;AAC/C,UAAM,YAAY,eAAe,MAAM,KAAK;AAAA,MAC1C,SAAS,SAAS;AAAA,MAClB,UAAU,SAAS;AAAA,IACrB,CAAC;AAED,WAAO,KAAK,SAAS,YAAY,SAAS,OAAO,YAAY,SAAS,CAAC;AAAA,EACzE;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,aAAa,SAAiB,SAA2C;AAC7E,UAAM,QAAQ,SAAS,SAAS;AAChC,UAAM,YAAY,SAAS,aAAa;AAExC,UAAM,MAAM,MAAM,KAAK,iBAAiB,OAAO;AAC/C,UAAM,SAAS,KAAK,SAAS,QAAQ,YAAY,OAAO;AACxD,UAAM,SAAS,MAAM,KAAK,SAAS,YAAY,QAAQ,SAAS;AAEhE,UAAM,WAAsB,CAAC;AAC7B,UAAM,SAAS,OAAO,MAAM,CAAC,KAAK;AAElC,eAAW,SAAS,QAAQ;AAC1B,YAAM,MAAM;AACZ,YAAM,aAAa,OAAO,aAAa,IAAI,KAAK,OAAO;AACvD,YAAM,SAAS,eAAe,YAAY,GAAG;AAE7C,eAAS,KAAK;AAAA,QACZ,SAAS,OAAO,OAAO;AAAA,QACvB,QAAQ,IAAI,KAAK;AAAA,QACjB,MAAM,QAAQ,QAAQ;AAAA,QACtB,SAAS,QAAQ,WAAW;AAAA,QAC5B,UAAU,QAAQ,YAAY;AAAA,QAC9B,WAAW,IAAI,KAAK;AAAA,QACpB,QAAQ,IAAI;AAAA,QACZ,aAAa,IAAI;AAAA,MACnB,CAAC;AAAA,IACH;AAEA,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,UACE,SACA,UACY;AACZ,QAAI,MAAyB;AAG7B,SAAK,iBAAiB,OAAO,EAAE,KAAK,CAAC,MAAM;AACzC,YAAM;AAAA,IACR,CAAC;AAED,UAAM,UAAU,CACd,KACA,QACA,SACA,WACA,UACG;AACH,UAAI,CAAC,IAAK;AACV,YAAM,aAAa,OAAO,aAAa,OAAO;AAC9C,YAAM,SAAS,eAAe,YAAY,GAAG;AAE7C,eAAS;AAAA,QACP,SAAS;AAAA,QACT;AAAA,QACA,MAAM,QAAQ,QAAQ;AAAA,QACtB,SAAS,QAAQ,WAAW;AAAA,QAC5B,UAAU,QAAQ,YAAY;AAAA,QAC9B;AAAA,QACA,QAAQ,MAAM;AAAA,QACd,aAAa,MAAM;AAAA,MACrB,CAAC;AAAA,IACH;AAEA,SAAK,SAAS,GAAG,KAAK,SAAS,QAAQ,YAAY,OAAO,GAAG,OAAO;AACpE,WAAO,MAAM;AACX,WAAK,SAAS,IAAI,KAAK,SAAS,QAAQ,YAAY,OAAO,GAAG,OAAO;AAAA,IACvE;AAAA,EACF;AAAA;AAAA,EAIA,MAAM,YAAY,OAAe,UAAuD;AACtF,QAAI,CAAC,KAAK,OAAQ,OAAM,IAAI,MAAM,iBAAiB;AACnD,WAAO,KAAK,SAAS,YAAY,OAAO,QAAQ;AAAA,EAClD;AAAA,EAEA,MAAM,YAAY,OAAe,SAAkC;AACjE,WAAO,KAAK,SAAS,YAAY,OAAO,OAAO;AAAA,EACjD;AAAA;AAAA,EAIA,MAAM,YACJ,OACA,MACA,aACA,aACqC;AACrC,QAAI,CAAC,KAAK,OAAQ,OAAM,IAAI,MAAM,iBAAiB;AACnD,WAAO,KAAK,SAAS,YAAY,OAAO,MAAM,aAAa,WAAW;AAAA,EACxE;AAAA,EAEA,MAAM,SAAS,SAAiC;AAC9C,UAAM,IAAI,MAAM,KAAK,SAAS,SAAS,OAAO;AAC9C,WAAO;AAAA,MACL,IAAI,EAAE;AAAA,MACN,eAAe,EAAE;AAAA,MACjB,MAAM,EAAE;AAAA,MACR,aAAa,EAAE;AAAA,MACf,OAAO,EAAE;AAAA,MACT,SAAS,EAAE;AAAA,MACX,WAAW,EAAE;AAAA,MACb,eAAe,EAAE;AAAA,MACjB,cAAc,EAAE;AAAA,MAChB,aAAa,OAAO,EAAE,WAAW;AAAA,MACjC,QAAQ,EAAE;AAAA,IACZ;AAAA,EACF;AAAA,EAEA,MAAM,qBAAqB,OAAkC;AAC3D,WAAO,KAAK,SAAS,qBAAqB,KAAK;AAAA,EACjD;AAAA,EAEA,MAAM,mBACJ,SACA,MACA,YACqC;AACrC,QAAI,CAAC,KAAK,OAAQ,OAAM,IAAI,MAAM,iBAAiB;AACnD,WAAO,KAAK,SAAS,mBAAmB,SAAS,MAAM,UAAU;AAAA,EACnE;AAAA;AAAA,EAIA,MAAM,UACJ,OACA,SACA,UACA,OACqC;AACrC,QAAI,CAAC,KAAK,OAAQ,OAAM,IAAI,MAAM,iBAAiB;AACnD,WAAO,KAAK,SAAS,UAAU,OAAO,SAAS,UAAU,KAAK;AAAA,EAChE;AAAA,EAEA,MAAM,aAAa,OAAe,SAAsD;AACtF,QAAI,CAAC,KAAK,OAAQ,OAAM,IAAI,MAAM,iBAAiB;AACnD,WAAO,KAAK,SAAS,aAAa,OAAO,OAAO;AAAA,EAClD;AAAA,EAEA,MAAM,kBACJ,OACA,SACA,OACqC;AACrC,QAAI,CAAC,KAAK,OAAQ,OAAM,IAAI,MAAM,iBAAiB;AACnD,WAAO,KAAK,SAAS,kBAAkB,OAAO,SAAS,KAAK;AAAA,EAC9D;AAAA,EAEA,MAAM,UAAU,OAAe,SAAkC;AAC/D,UAAM,IAAI,MAAM,KAAK,SAAS,UAAU,OAAO,OAAO;AACtD,WAAO;AAAA,MACL,SAAS,EAAE;AAAA,MACX,UAAU,EAAE;AAAA,MACZ,OAAO,OAAO,EAAE,KAAK;AAAA,MACrB,UAAU,EAAE;AAAA,IACd;AAAA,EACF;AAAA,EAEA,MAAM,SAAS,OAAe,SAAmC;AAC/D,WAAO,KAAK,SAAS,SAAS,OAAO,OAAO;AAAA,EAC9C;AAAA,EAEA,MAAM,sBAAsB,OAAkC;AAC5D,WAAO,KAAK,SAAS,sBAAsB,KAAK;AAAA,EAClD;AAAA;AAAA,EAIA,MAAM,QAAQ,SAAiB,SAAmC;AAChE,WAAO,KAAK,SAAS,aAAa,SAAS,OAAO;AAAA,EACpD;AAAA,EAEA,MAAM,SAAS,SAAiB,SAAmC;AACjE,WAAO,KAAK,SAAS,gBAAgB,SAAS,OAAO;AAAA,EACvD;AAAA;AAAA,EAIA,MAAM,kBACJ,MACA,aACA,aACA,0BACqC;AACrC,QAAI,CAAC,KAAK,OAAQ,OAAM,IAAI,MAAM,iBAAiB;AACnD,WAAO,KAAK,SAAS,kBAAkB,MAAM,aAAa,aAAa,wBAAwB;AAAA,EACjG;AAAA,EAEA,MAAM,eAAe,OAAqC;AACxD,UAAM,IAAI,MAAM,KAAK,SAAS,eAAe,KAAK;AAClD,WAAO;AAAA,MACL,IAAI,EAAE;AAAA,MACN,MAAM,EAAE;AAAA,MACR,aAAa,EAAE;AAAA,MACf,aAAa,EAAE;AAAA,MACf,OAAO,EAAE;AAAA,MACT,WAAW,EAAE;AAAA,MACb,aAAa,OAAO,EAAE,WAAW;AAAA,MACjC,YAAY,OAAO,EAAE,UAAU;AAAA,MAC/B,QAAQ,EAAE;AAAA,MACV,0BAA0B,EAAE;AAAA,MAC5B,uBAAuB,EAAE;AAAA,MACzB,wBAAwB,EAAE;AAAA,IAC5B;AAAA,EACF;AAAA;AAAA,EAIA,MAAM,mBAAmB,SAA2C;AAClE,UAAM,CAAC,OAAO,MAAM,IAAI,MAAM,KAAK,SAAS,mBAAmB,OAAO;AACtE,WAAO,EAAE,OAAO,OAAO;AAAA,EACzB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,MAAM,qBAAqB,QAAgB,GAAuC;AAChF,QAAI,CAAC,KAAK,OAAQ,OAAM,IAAI,MAAM,iBAAiB;AAEnD,UAAM,EAAE,YAAY,UAAU,IAAI,MAAM;AAAA,MACtC,KAAK,OAAO;AAAA,MACZ,CAAC,QAAQ,KAAK,OAAQ,YAAY,GAAG;AAAA,MACrC;AAAA,IACF;AAEA,SAAK,iBAAiB;AACtB,SAAK,gBAAgB;AACrB,WAAO,EAAE,UAAU;AAAA,EACrB;AAAA;AAAA;AAAA;AAAA,EAKA,gBAAgB,eAA6B;AAC3C,UAAM,EAAE,YAAY,UAAU,IAAI,sBAAsB,aAAa;AACrE,SAAK,iBAAiB;AACtB,SAAK,gBAAgB;AAAA,EACvB;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,oBAAyD;AAC7D,QAAI,CAAC,KAAK,OAAQ,OAAM,IAAI,MAAM,iBAAiB;AACnD,QAAI,CAAC,KAAK,cAAe,OAAM,IAAI,MAAM,0BAA0B;AAEnE,UAAM,SAAS,MAAM,KAAK,WAAW,aAAa,KAAK,OAAO,OAAO;AACrE,QAAI,QAAQ;AACV,YAAM,IAAI,MAAM,wCAAwC;AAAA,IAC1D;AAEA,WAAO,KAAK,WAAW,kBAAkB,KAAK,aAAa;AAAA,EAC7D;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,wBAAwB,SAAsC;AAClE,QAAI,CAAC,KAAK,eAAgB,OAAM,IAAI,MAAM,0BAA0B;AAEpE,UAAM,QAAQ,MAAM,KAAK,WAAW,SAAS,OAAO;AACpD,UAAM,eAAe,OAAO,SAAS,MAAM,YAAY;AACvD,UAAM,gBAAgB,OAAO,SAAS,MAAM,gBAAgB;AAE5D,UAAM,WAAW,gBAAgB,cAAc,KAAK,gBAAgB,aAAa;AACjF,SAAK,UAAU,IAAI,SAAS,QAAQ;AACpC,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,eACJ,SACA,aACA,UACqC;AACrC,QAAI,CAAC,KAAK,OAAQ,OAAM,IAAI,MAAM,iBAAiB;AACnD,QAAI,CAAC,KAAK,eAAgB,OAAM,IAAI,MAAM,0BAA0B;AAEpE,UAAM,kBAAkB,OAAO,SAAS,MAAM,KAAK,WAAW,aAAa,WAAW,CAAC;AACvF,UAAM,YAAY,uBAAuB,UAAU,KAAK,gBAAgB,eAAe;AACvF,WAAO,KAAK,WAAW,eAAe,SAAS,aAAa,SAAS;AAAA,EACvE;AAAA;AAAA;AAAA;AAAA,EAKA,YAAY,SAAiB,KAAuB;AAClD,SAAK,UAAU,IAAI,SAAS,GAAG;AAAA,EACjC;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,MAAc,iBAAiB,SAAsC;AAEnE,UAAM,YAAY,KAAK,UAAU,IAAI,OAAO;AAC5C,QAAI,UAAW,QAAO;AAGtB,UAAM,QAAQ,MAAM,KAAK,SAAS,OAAO;AAEzC,QAAI,MAAM,iCAAqC;AAC7C,YAAM,IAAI;AAAA,QACR,SAAS,OAAO;AAAA,MAClB;AAAA,IACF;AAGA,WAAO,qBAAqB,OAAO;AAAA,EACrC;AACF;","names":["AccessLevel","Permission","Role","sha256","gcm","randomBytes","encoder","sha256","randomBytes","gcm"]}
|
package/package.json
ADDED
|
@@ -0,0 +1,64 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "clawntenna",
|
|
3
|
+
"version": "0.1.0",
|
|
4
|
+
"description": "On-chain encrypted messaging SDK for AI agents. Permissionless public channels, ECDH-secured private channels.",
|
|
5
|
+
"type": "module",
|
|
6
|
+
"main": "./dist/index.cjs",
|
|
7
|
+
"module": "./dist/index.js",
|
|
8
|
+
"types": "./dist/index.d.ts",
|
|
9
|
+
"bin": {
|
|
10
|
+
"clawntenna": "./dist/cli/index.js"
|
|
11
|
+
},
|
|
12
|
+
"exports": {
|
|
13
|
+
".": {
|
|
14
|
+
"import": {
|
|
15
|
+
"types": "./dist/index.d.ts",
|
|
16
|
+
"default": "./dist/index.js"
|
|
17
|
+
},
|
|
18
|
+
"require": {
|
|
19
|
+
"types": "./dist/index.d.cts",
|
|
20
|
+
"default": "./dist/index.cjs"
|
|
21
|
+
}
|
|
22
|
+
}
|
|
23
|
+
},
|
|
24
|
+
"files": [
|
|
25
|
+
"dist",
|
|
26
|
+
"README.md"
|
|
27
|
+
],
|
|
28
|
+
"scripts": {
|
|
29
|
+
"build": "tsup",
|
|
30
|
+
"dev": "tsup --watch",
|
|
31
|
+
"typecheck": "tsc --noEmit"
|
|
32
|
+
},
|
|
33
|
+
"peerDependencies": {
|
|
34
|
+
"ethers": "^6.0.0"
|
|
35
|
+
},
|
|
36
|
+
"dependencies": {
|
|
37
|
+
"@noble/curves": "^1.8.0",
|
|
38
|
+
"@noble/hashes": "^1.7.0",
|
|
39
|
+
"@noble/ciphers": "^1.2.0"
|
|
40
|
+
},
|
|
41
|
+
"devDependencies": {
|
|
42
|
+
"ethers": "^6.16.0",
|
|
43
|
+
"tsup": "^8.4.0",
|
|
44
|
+
"typescript": "^5.7.0"
|
|
45
|
+
},
|
|
46
|
+
"keywords": [
|
|
47
|
+
"clawntenna",
|
|
48
|
+
"on-chain",
|
|
49
|
+
"messaging",
|
|
50
|
+
"encrypted",
|
|
51
|
+
"agents",
|
|
52
|
+
"ethereum",
|
|
53
|
+
"base",
|
|
54
|
+
"avalanche",
|
|
55
|
+
"ecdh",
|
|
56
|
+
"aes-gcm"
|
|
57
|
+
],
|
|
58
|
+
"license": "MIT",
|
|
59
|
+
"repository": {
|
|
60
|
+
"type": "git",
|
|
61
|
+
"url": "https://github.com/clawntenna/clawntenna-js-sdk"
|
|
62
|
+
},
|
|
63
|
+
"homepage": "https://clawntenna.com"
|
|
64
|
+
}
|