wowok 2.2.3 → 2.2.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (297) hide show
  1. package/dist/cjs/bcs/bcs.d.ts +30 -68
  2. package/dist/cjs/bcs/bcs.js +1 -1
  3. package/dist/cjs/bcs/index.js +1 -1
  4. package/dist/cjs/cryptography/index.d.ts +1 -1
  5. package/dist/cjs/cryptography/index.js +1 -1
  6. package/dist/cjs/cryptography/intent.js +1 -1
  7. package/dist/cjs/cryptography/keypair.d.ts +2 -2
  8. package/dist/cjs/cryptography/keypair.js +1 -1
  9. package/dist/cjs/cryptography/publickey.d.ts +1 -1
  10. package/dist/cjs/cryptography/publickey.js +1 -1
  11. package/dist/cjs/cryptography/signature-scheme.d.ts +4 -15
  12. package/dist/cjs/cryptography/signature-scheme.js +1 -1
  13. package/dist/cjs/cryptography/signature.d.ts +1 -9
  14. package/dist/cjs/cryptography/signature.js +1 -1
  15. package/dist/cjs/grpc/client.d.ts +0 -2
  16. package/dist/cjs/grpc/client.js +1 -1
  17. package/dist/cjs/grpc/proto/google/protobuf/any.d.ts +7 -0
  18. package/dist/cjs/grpc/proto/google/protobuf/any.js +1 -1
  19. package/dist/cjs/grpc/proto/google/protobuf/duration.d.ts +8 -0
  20. package/dist/cjs/grpc/proto/google/protobuf/duration.js +1 -1
  21. package/dist/cjs/grpc/proto/google/protobuf/empty.d.ts +8 -0
  22. package/dist/cjs/grpc/proto/google/protobuf/empty.js +1 -1
  23. package/dist/cjs/grpc/proto/google/protobuf/field_mask.d.ts +8 -0
  24. package/dist/cjs/grpc/proto/google/protobuf/field_mask.js +1 -1
  25. package/dist/cjs/grpc/proto/google/protobuf/struct.d.ts +15 -0
  26. package/dist/cjs/grpc/proto/google/protobuf/struct.js +1 -1
  27. package/dist/cjs/grpc/proto/google/protobuf/timestamp.d.ts +8 -0
  28. package/dist/cjs/grpc/proto/google/protobuf/timestamp.js +1 -1
  29. package/dist/cjs/grpc/proto/google/rpc/error_details.d.ts +48 -0
  30. package/dist/cjs/grpc/proto/google/rpc/error_details.js +1 -1
  31. package/dist/cjs/grpc/proto/google/rpc/status.d.ts +8 -0
  32. package/dist/cjs/grpc/proto/google/rpc/status.js +1 -1
  33. package/dist/cjs/grpc/proto/sui/rpc/v2/checkpoint.js +1 -1
  34. package/dist/cjs/grpc/proto/sui/rpc/v2/checkpoint_contents.js +1 -1
  35. package/dist/cjs/grpc/proto/sui/rpc/v2/checkpoint_summary.js +1 -1
  36. package/dist/cjs/grpc/proto/sui/rpc/v2/effects.js +1 -1
  37. package/dist/cjs/grpc/proto/sui/rpc/v2/event.js +1 -1
  38. package/dist/cjs/grpc/proto/sui/rpc/v2/executed_transaction.js +1 -1
  39. package/dist/cjs/grpc/proto/sui/rpc/v2/execution_status.d.ts +2 -2
  40. package/dist/cjs/grpc/proto/sui/rpc/v2/execution_status.js +1 -1
  41. package/dist/cjs/grpc/proto/sui/rpc/v2/ledger_service.js +1 -1
  42. package/dist/cjs/grpc/proto/sui/rpc/v2/move_package.js +1 -1
  43. package/dist/cjs/grpc/proto/sui/rpc/v2/move_package_service.js +1 -1
  44. package/dist/cjs/grpc/proto/sui/rpc/v2/object.js +1 -1
  45. package/dist/cjs/grpc/proto/sui/rpc/v2/signature.d.ts +9 -87
  46. package/dist/cjs/grpc/proto/sui/rpc/v2/signature.js +1 -1
  47. package/dist/cjs/grpc/proto/sui/rpc/v2/signature_scheme.d.ts +2 -6
  48. package/dist/cjs/grpc/proto/sui/rpc/v2/signature_scheme.js +1 -1
  49. package/dist/cjs/grpc/proto/sui/rpc/v2/signature_verification_service.d.ts +0 -2
  50. package/dist/cjs/grpc/proto/sui/rpc/v2/signature_verification_service.js +1 -1
  51. package/dist/cjs/grpc/proto/sui/rpc/v2/state_service.js +1 -1
  52. package/dist/cjs/grpc/proto/sui/rpc/v2/system_state.d.ts +2 -2
  53. package/dist/cjs/grpc/proto/sui/rpc/v2/system_state.js +1 -1
  54. package/dist/cjs/grpc/proto/sui/rpc/v2/transaction.d.ts +13 -51
  55. package/dist/cjs/grpc/proto/sui/rpc/v2/transaction.js +1 -1
  56. package/dist/cjs/grpc/proto/sui/rpc/v2/transaction_execution_service.js +1 -1
  57. package/dist/cjs/index.d.ts +1 -1
  58. package/dist/cjs/index.js +1 -1
  59. package/dist/cjs/jsonRpc/types/chain.d.ts +0 -5
  60. package/dist/cjs/jsonRpc/types/generated.d.ts +5 -57
  61. package/dist/cjs/jsonRpc/types/params.d.ts +0 -17
  62. package/dist/cjs/keypairs/falcon512/index.d.ts +2 -0
  63. package/dist/cjs/keypairs/falcon512/index.js +1 -0
  64. package/dist/cjs/keypairs/falcon512/keypair.d.ts +19 -0
  65. package/dist/cjs/keypairs/falcon512/keypair.js +1 -0
  66. package/dist/{esm/keypairs/ed25519 → cjs/keypairs/falcon512}/publickey.d.ts +2 -2
  67. package/dist/cjs/keypairs/falcon512/publickey.js +1 -0
  68. package/dist/cjs/keypairs/index.d.ts +1 -4
  69. package/dist/cjs/keypairs/index.js +1 -1
  70. package/dist/cjs/utils/move-registry.js +1 -1
  71. package/dist/cjs/utils/sui-types.js +1 -1
  72. package/dist/cjs/verify/verify.js +1 -1
  73. package/dist/cjs/w/call/arbitration.js +1 -1
  74. package/dist/cjs/w/call/base.js +1 -1
  75. package/dist/cjs/w/call/contact.js +1 -1
  76. package/dist/cjs/w/call/demand.js +1 -1
  77. package/dist/cjs/w/call/guard.js +1 -1
  78. package/dist/cjs/w/call/machine.js +1 -1
  79. package/dist/cjs/w/call/personal.js +1 -1
  80. package/dist/cjs/w/call/proof.d.ts +3 -3
  81. package/dist/cjs/w/call/proof.js +1 -1
  82. package/dist/cjs/w/call/repository.js +1 -1
  83. package/dist/cjs/w/call/reward.js +1 -1
  84. package/dist/cjs/w/call/service.js +1 -1
  85. package/dist/cjs/w/call/treasury.js +1 -1
  86. package/dist/cjs/w/local/account.d.ts +11 -4
  87. package/dist/cjs/w/local/account.js +1 -1
  88. package/dist/cjs/w/local/storage.js +1 -1
  89. package/dist/cjs/w/local/util.js +1 -1
  90. package/dist/cjs/w/local/wip.d.ts +1 -1
  91. package/dist/cjs/w/local/wip.js +1 -1
  92. package/dist/cjs/w/messenger/crypto.d.ts +1 -3
  93. package/dist/cjs/w/messenger/crypto.js +1 -1
  94. package/dist/cjs/w/messenger/messenger-api.js +1 -1
  95. package/dist/cjs/w/messenger/messenger-manager.js +1 -1
  96. package/dist/cjs/w/messenger/messenger.js +1 -1
  97. package/dist/cjs/w/messenger/pq/crypto.d.ts +6 -6
  98. package/dist/cjs/w/messenger/pq/crypto.js +1 -1
  99. package/dist/cjs/w/messenger/pq/pqxdh.d.ts +3 -6
  100. package/dist/cjs/w/messenger/pq/pqxdh.js +1 -1
  101. package/dist/cjs/w/messenger/pq/session.d.ts +6 -4
  102. package/dist/cjs/w/messenger/pq/session.js +1 -1
  103. package/dist/cjs/w/messenger/pq/spqr.js +1 -1
  104. package/dist/cjs/w/messenger/pq/store-adapter.d.ts +1 -3
  105. package/dist/cjs/w/messenger/pq/store-adapter.js +1 -1
  106. package/dist/cjs/w/messenger/pq/types.d.ts +4 -5
  107. package/dist/cjs/w/messenger/pq/types.js +1 -1
  108. package/dist/cjs/w/messenger/session.d.ts +4 -5
  109. package/dist/cjs/w/messenger/session.js +1 -1
  110. package/dist/cjs/w/messenger/storage.js +1 -1
  111. package/dist/cjs/w/messenger/types.d.ts +7 -10
  112. package/dist/cjs/w/messenger/types.js +1 -1
  113. package/dist/cjs/w/query/object.js +1 -1
  114. package/dist/esm/bcs/bcs.d.ts +30 -68
  115. package/dist/esm/bcs/bcs.js +1 -1
  116. package/dist/esm/bcs/index.js +1 -1
  117. package/dist/esm/cryptography/index.d.ts +1 -1
  118. package/dist/esm/cryptography/index.js +1 -1
  119. package/dist/esm/cryptography/intent.js +1 -1
  120. package/dist/esm/cryptography/keypair.d.ts +2 -2
  121. package/dist/esm/cryptography/keypair.js +1 -1
  122. package/dist/esm/cryptography/publickey.d.ts +1 -1
  123. package/dist/esm/cryptography/publickey.js +1 -1
  124. package/dist/esm/cryptography/signature-scheme.d.ts +4 -15
  125. package/dist/esm/cryptography/signature-scheme.js +1 -1
  126. package/dist/esm/cryptography/signature.d.ts +1 -9
  127. package/dist/esm/cryptography/signature.js +1 -1
  128. package/dist/esm/grpc/client.d.ts +0 -2
  129. package/dist/esm/grpc/client.js +1 -1
  130. package/dist/esm/grpc/proto/google/protobuf/any.d.ts +7 -0
  131. package/dist/esm/grpc/proto/google/protobuf/any.js +1 -1
  132. package/dist/esm/grpc/proto/google/protobuf/duration.d.ts +8 -0
  133. package/dist/esm/grpc/proto/google/protobuf/duration.js +1 -1
  134. package/dist/esm/grpc/proto/google/protobuf/empty.d.ts +8 -0
  135. package/dist/esm/grpc/proto/google/protobuf/empty.js +1 -1
  136. package/dist/esm/grpc/proto/google/protobuf/field_mask.d.ts +8 -0
  137. package/dist/esm/grpc/proto/google/protobuf/field_mask.js +1 -1
  138. package/dist/esm/grpc/proto/google/protobuf/struct.d.ts +15 -0
  139. package/dist/esm/grpc/proto/google/protobuf/struct.js +1 -1
  140. package/dist/esm/grpc/proto/google/protobuf/timestamp.d.ts +8 -0
  141. package/dist/esm/grpc/proto/google/protobuf/timestamp.js +1 -1
  142. package/dist/esm/grpc/proto/google/rpc/error_details.d.ts +48 -0
  143. package/dist/esm/grpc/proto/google/rpc/error_details.js +1 -1
  144. package/dist/esm/grpc/proto/google/rpc/status.d.ts +8 -0
  145. package/dist/esm/grpc/proto/google/rpc/status.js +1 -1
  146. package/dist/esm/grpc/proto/sui/rpc/v2/checkpoint.js +1 -1
  147. package/dist/esm/grpc/proto/sui/rpc/v2/checkpoint_contents.js +1 -1
  148. package/dist/esm/grpc/proto/sui/rpc/v2/checkpoint_summary.js +1 -1
  149. package/dist/esm/grpc/proto/sui/rpc/v2/effects.js +1 -1
  150. package/dist/esm/grpc/proto/sui/rpc/v2/event.js +1 -1
  151. package/dist/esm/grpc/proto/sui/rpc/v2/executed_transaction.js +1 -1
  152. package/dist/esm/grpc/proto/sui/rpc/v2/execution_status.d.ts +2 -2
  153. package/dist/esm/grpc/proto/sui/rpc/v2/execution_status.js +1 -1
  154. package/dist/esm/grpc/proto/sui/rpc/v2/ledger_service.js +1 -1
  155. package/dist/esm/grpc/proto/sui/rpc/v2/move_package.js +1 -1
  156. package/dist/esm/grpc/proto/sui/rpc/v2/move_package_service.js +1 -1
  157. package/dist/esm/grpc/proto/sui/rpc/v2/object.js +1 -1
  158. package/dist/esm/grpc/proto/sui/rpc/v2/signature.d.ts +9 -87
  159. package/dist/esm/grpc/proto/sui/rpc/v2/signature.js +1 -1
  160. package/dist/esm/grpc/proto/sui/rpc/v2/signature_scheme.d.ts +2 -6
  161. package/dist/esm/grpc/proto/sui/rpc/v2/signature_scheme.js +1 -1
  162. package/dist/esm/grpc/proto/sui/rpc/v2/signature_verification_service.d.ts +0 -2
  163. package/dist/esm/grpc/proto/sui/rpc/v2/signature_verification_service.js +1 -1
  164. package/dist/esm/grpc/proto/sui/rpc/v2/state_service.js +1 -1
  165. package/dist/esm/grpc/proto/sui/rpc/v2/system_state.d.ts +2 -2
  166. package/dist/esm/grpc/proto/sui/rpc/v2/system_state.js +1 -1
  167. package/dist/esm/grpc/proto/sui/rpc/v2/transaction.d.ts +13 -51
  168. package/dist/esm/grpc/proto/sui/rpc/v2/transaction.js +1 -1
  169. package/dist/esm/grpc/proto/sui/rpc/v2/transaction_execution_service.js +1 -1
  170. package/dist/esm/index.d.ts +1 -1
  171. package/dist/esm/index.js +1 -1
  172. package/dist/esm/jsonRpc/types/chain.d.ts +0 -5
  173. package/dist/esm/jsonRpc/types/generated.d.ts +5 -57
  174. package/dist/esm/jsonRpc/types/params.d.ts +0 -17
  175. package/dist/esm/keypairs/falcon512/index.d.ts +2 -0
  176. package/dist/esm/keypairs/falcon512/index.js +1 -0
  177. package/dist/esm/keypairs/falcon512/keypair.d.ts +19 -0
  178. package/dist/esm/keypairs/falcon512/keypair.js +1 -0
  179. package/dist/{cjs/keypairs/ed25519 → esm/keypairs/falcon512}/publickey.d.ts +2 -2
  180. package/dist/esm/keypairs/falcon512/publickey.js +1 -0
  181. package/dist/esm/keypairs/index.d.ts +1 -4
  182. package/dist/esm/keypairs/index.js +1 -1
  183. package/dist/esm/utils/move-registry.js +1 -1
  184. package/dist/esm/utils/sui-types.js +1 -1
  185. package/dist/esm/verify/verify.js +1 -1
  186. package/dist/esm/w/call/arbitration.js +1 -1
  187. package/dist/esm/w/call/base.js +1 -1
  188. package/dist/esm/w/call/contact.js +1 -1
  189. package/dist/esm/w/call/demand.js +1 -1
  190. package/dist/esm/w/call/guard.js +1 -1
  191. package/dist/esm/w/call/machine.js +1 -1
  192. package/dist/esm/w/call/personal.js +1 -1
  193. package/dist/esm/w/call/proof.d.ts +3 -3
  194. package/dist/esm/w/call/proof.js +1 -1
  195. package/dist/esm/w/call/repository.js +1 -1
  196. package/dist/esm/w/call/reward.js +1 -1
  197. package/dist/esm/w/call/service.js +1 -1
  198. package/dist/esm/w/call/treasury.js +1 -1
  199. package/dist/esm/w/local/account.d.ts +11 -4
  200. package/dist/esm/w/local/account.js +1 -1
  201. package/dist/esm/w/local/storage.js +1 -1
  202. package/dist/esm/w/local/util.js +1 -1
  203. package/dist/esm/w/local/wip.d.ts +1 -1
  204. package/dist/esm/w/local/wip.js +1 -1
  205. package/dist/esm/w/messenger/crypto.d.ts +1 -3
  206. package/dist/esm/w/messenger/crypto.js +1 -1
  207. package/dist/esm/w/messenger/messenger-api.js +1 -1
  208. package/dist/esm/w/messenger/messenger-manager.js +1 -1
  209. package/dist/esm/w/messenger/messenger.js +1 -1
  210. package/dist/esm/w/messenger/pq/crypto.d.ts +6 -6
  211. package/dist/esm/w/messenger/pq/crypto.js +1 -1
  212. package/dist/esm/w/messenger/pq/pqxdh.d.ts +3 -6
  213. package/dist/esm/w/messenger/pq/pqxdh.js +1 -1
  214. package/dist/esm/w/messenger/pq/session.d.ts +6 -4
  215. package/dist/esm/w/messenger/pq/session.js +1 -1
  216. package/dist/esm/w/messenger/pq/spqr.js +1 -1
  217. package/dist/esm/w/messenger/pq/store-adapter.d.ts +1 -3
  218. package/dist/esm/w/messenger/pq/store-adapter.js +1 -1
  219. package/dist/esm/w/messenger/pq/types.d.ts +4 -5
  220. package/dist/esm/w/messenger/pq/types.js +1 -1
  221. package/dist/esm/w/messenger/session.d.ts +4 -5
  222. package/dist/esm/w/messenger/session.js +1 -1
  223. package/dist/esm/w/messenger/storage.js +1 -1
  224. package/dist/esm/w/messenger/types.d.ts +7 -10
  225. package/dist/esm/w/messenger/types.js +1 -1
  226. package/dist/esm/w/query/object.js +1 -1
  227. package/package.json +24 -24
  228. package/dist/cjs/grpc/proto/sui/rpc/v2/jwk.d.ts +0 -20
  229. package/dist/cjs/grpc/proto/sui/rpc/v2/jwk.js +0 -1
  230. package/dist/cjs/grpc/proto/sui/rpc/v2/name_service.client.d.ts +0 -23
  231. package/dist/cjs/grpc/proto/sui/rpc/v2/name_service.client.js +0 -1
  232. package/dist/cjs/grpc/proto/sui/rpc/v2/name_service.d.ts +0 -47
  233. package/dist/cjs/grpc/proto/sui/rpc/v2/name_service.js +0 -1
  234. package/dist/cjs/keypairs/ed25519/ed25519-hd-key.d.ts +0 -8
  235. package/dist/cjs/keypairs/ed25519/ed25519-hd-key.js +0 -1
  236. package/dist/cjs/keypairs/ed25519/index.d.ts +0 -2
  237. package/dist/cjs/keypairs/ed25519/index.js +0 -1
  238. package/dist/cjs/keypairs/ed25519/keypair.d.ts +0 -22
  239. package/dist/cjs/keypairs/ed25519/keypair.js +0 -1
  240. package/dist/cjs/keypairs/ed25519/publickey.js +0 -1
  241. package/dist/cjs/keypairs/passkey/index.d.ts +0 -3
  242. package/dist/cjs/keypairs/passkey/index.js +0 -1
  243. package/dist/cjs/keypairs/passkey/keypair.d.ts +0 -33
  244. package/dist/cjs/keypairs/passkey/keypair.js +0 -1
  245. package/dist/cjs/keypairs/passkey/publickey.d.ts +0 -25
  246. package/dist/cjs/keypairs/passkey/publickey.js +0 -1
  247. package/dist/cjs/keypairs/passkey/types.d.ts +0 -6
  248. package/dist/cjs/keypairs/passkey/types.js +0 -1
  249. package/dist/cjs/keypairs/secp256k1/index.d.ts +0 -2
  250. package/dist/cjs/keypairs/secp256k1/index.js +0 -1
  251. package/dist/cjs/keypairs/secp256k1/keypair.d.ts +0 -22
  252. package/dist/cjs/keypairs/secp256k1/keypair.js +0 -1
  253. package/dist/cjs/keypairs/secp256k1/publickey.d.ts +0 -11
  254. package/dist/cjs/keypairs/secp256k1/publickey.js +0 -1
  255. package/dist/cjs/keypairs/secp256r1/index.d.ts +0 -2
  256. package/dist/cjs/keypairs/secp256r1/index.js +0 -1
  257. package/dist/cjs/keypairs/secp256r1/keypair.d.ts +0 -22
  258. package/dist/cjs/keypairs/secp256r1/keypair.js +0 -1
  259. package/dist/cjs/keypairs/secp256r1/publickey.d.ts +0 -11
  260. package/dist/cjs/keypairs/secp256r1/publickey.js +0 -1
  261. package/dist/cjs/utils/suins.d.ts +0 -2
  262. package/dist/cjs/utils/suins.js +0 -1
  263. package/dist/esm/grpc/proto/sui/rpc/v2/jwk.d.ts +0 -20
  264. package/dist/esm/grpc/proto/sui/rpc/v2/jwk.js +0 -1
  265. package/dist/esm/grpc/proto/sui/rpc/v2/name_service.client.d.ts +0 -23
  266. package/dist/esm/grpc/proto/sui/rpc/v2/name_service.client.js +0 -1
  267. package/dist/esm/grpc/proto/sui/rpc/v2/name_service.d.ts +0 -47
  268. package/dist/esm/grpc/proto/sui/rpc/v2/name_service.js +0 -1
  269. package/dist/esm/keypairs/ed25519/ed25519-hd-key.d.ts +0 -8
  270. package/dist/esm/keypairs/ed25519/ed25519-hd-key.js +0 -1
  271. package/dist/esm/keypairs/ed25519/index.d.ts +0 -2
  272. package/dist/esm/keypairs/ed25519/index.js +0 -1
  273. package/dist/esm/keypairs/ed25519/keypair.d.ts +0 -22
  274. package/dist/esm/keypairs/ed25519/keypair.js +0 -1
  275. package/dist/esm/keypairs/ed25519/publickey.js +0 -1
  276. package/dist/esm/keypairs/passkey/index.d.ts +0 -3
  277. package/dist/esm/keypairs/passkey/index.js +0 -1
  278. package/dist/esm/keypairs/passkey/keypair.d.ts +0 -33
  279. package/dist/esm/keypairs/passkey/keypair.js +0 -1
  280. package/dist/esm/keypairs/passkey/publickey.d.ts +0 -25
  281. package/dist/esm/keypairs/passkey/publickey.js +0 -1
  282. package/dist/esm/keypairs/passkey/types.d.ts +0 -6
  283. package/dist/esm/keypairs/passkey/types.js +0 -1
  284. package/dist/esm/keypairs/secp256k1/index.d.ts +0 -2
  285. package/dist/esm/keypairs/secp256k1/index.js +0 -1
  286. package/dist/esm/keypairs/secp256k1/keypair.d.ts +0 -22
  287. package/dist/esm/keypairs/secp256k1/keypair.js +0 -1
  288. package/dist/esm/keypairs/secp256k1/publickey.d.ts +0 -11
  289. package/dist/esm/keypairs/secp256k1/publickey.js +0 -1
  290. package/dist/esm/keypairs/secp256r1/index.d.ts +0 -2
  291. package/dist/esm/keypairs/secp256r1/index.js +0 -1
  292. package/dist/esm/keypairs/secp256r1/keypair.d.ts +0 -22
  293. package/dist/esm/keypairs/secp256r1/keypair.js +0 -1
  294. package/dist/esm/keypairs/secp256r1/publickey.d.ts +0 -11
  295. package/dist/esm/keypairs/secp256r1/publickey.js +0 -1
  296. package/dist/esm/utils/suins.d.ts +0 -2
  297. package/dist/esm/utils/suins.js +0 -1
package/package.json CHANGED
@@ -3,8 +3,8 @@
3
3
  "author": "wowok <build@wowok.net>",
4
4
  "description": "Wowok Blockchain TypeScript API",
5
5
  "homepage": "https://wowok.net",
6
- "version": "2.2.3",
7
- "license": "SEE LICENSE IN LICENSE",
6
+ "version": "2.2.4",
7
+ "license": "IN LICENSE",
8
8
  "sideEffects": false,
9
9
  "files": [
10
10
  "dist",
@@ -65,22 +65,6 @@
65
65
  "import": "./dist/esm/jsonRpc/index.js",
66
66
  "require": "./dist/cjs/jsonRpc/index.js"
67
67
  },
68
- "./keypairs/ed25519": {
69
- "import": "./dist/esm/keypairs/ed25519/index.js",
70
- "require": "./dist/cjs/keypairs/ed25519/index.js"
71
- },
72
- "./keypairs/secp256k1": {
73
- "import": "./dist/esm/keypairs/secp256k1/index.js",
74
- "require": "./dist/cjs/keypairs/secp256k1/index.js"
75
- },
76
- "./keypairs/secp256r1": {
77
- "import": "./dist/esm/keypairs/secp256r1/index.js",
78
- "require": "./dist/cjs/keypairs/secp256r1/index.js"
79
- },
80
- "./keypairs/passkey": {
81
- "import": "./dist/esm/keypairs/passkey/index.js",
82
- "require": "./dist/cjs/keypairs/passkey/index.js"
83
- },
84
68
  "./multisig": {
85
69
  "import": "./dist/esm/multisig/index.js",
86
70
  "require": "./dist/cjs/multisig/index.js"
@@ -193,6 +177,10 @@
193
177
  "import": "./dist/esm/w/local/cache.js",
194
178
  "require": "./dist/cjs/w/local/cache.js"
195
179
  },
180
+ "./w/local/token": {
181
+ "import": "./dist/esm/w/local/token.js",
182
+ "require": "./dist/cjs/w/local/token.js"
183
+ },
196
184
  "./w/local/wts": {
197
185
  "import": "./dist/esm/w/local/wts.js",
198
186
  "require": "./dist/cjs/w/local/wts.js"
@@ -284,10 +272,13 @@
284
272
  },
285
273
  "scripts": {
286
274
  "clean": "rm -rf tsconfig.tsbuildinfo ./dist",
287
- "codegen": "pnpm codegen:grpc && pnpm lint:fix",
288
- "codegen:grpc": "rm -rf src/grpc/proto && mkdir src/grpc/proto && pnpm codegen:grpc-protoc && pnpm codegen:grpc-header",
289
- "codegen:grpc-protoc": "protoc --ts_out ./src/grpc/proto --ts_opt force_server_none --ts_opt optimize_code_size --ts_opt ts_nocheck -I ../../../sui-apis/proto -I ../../../sui-apis/proto ../../../sui-apis/proto/sui/rpc/v2/*.proto ../../../sui-apis/proto/google/*/*.proto",
290
- "codegen:grpc-header": "find src/grpc/proto -type f -exec sh -c 'echo \"// Copyright (c) Mysten Labs, Inc.\\n// SPDX-License-Identifier: Apache-2.0\\n\" | cat - {} > temp && mv temp {}' \\;",
275
+ "codegen": "pnpm codegen:grpc && pnpm codegen:graphql && pnpm lint:fix",
276
+ "codegen:grpc": "node tooling/codegen-grpc.mjs",
277
+ "codegen:graphql": "graphql-codegen --config graphql-codegen.ts",
278
+ "verify-protos": "node tooling/verify-protos.mjs",
279
+ "sync-protos": "node tooling/sync-protos.mjs",
280
+ "verify-graphql-schema": "node tooling/verify-graphql-schema.mjs",
281
+ "sync-graphql-schema": "node tooling/sync-graphql-schema.mjs",
291
282
  "build": "tsc --project tsconfig.json && tsc --project tsconfig.esm.json && pnpm obfuscate",
292
283
  "build:test": "tsc --project tsconfig.json && tsc --project tsconfig.esm.json",
293
284
  "obfuscate": "javascript-obfuscator dist/cjs --output dist/cjs --config obfuscator.json && javascript-obfuscator dist/esm --output dist/esm --config obfuscator.json",
@@ -308,13 +299,21 @@
308
299
  "prebuilds:download": "node scripts/download-prebuilds.js"
309
300
  },
310
301
  "devDependencies": {
302
+ "@graphql-codegen/add": "^7.0.0",
303
+ "@graphql-codegen/cli": "^7.0.0",
304
+ "@graphql-codegen/typed-document-node": "^7.0.0",
305
+ "@graphql-codegen/typescript": "^6.0.1",
306
+ "@graphql-codegen/typescript-operations": "^6.0.1",
307
+ "@graphql-typed-document-node/core": "^3.2.0",
311
308
  "@parcel/watcher": "^2.5.1",
309
+ "@protobuf-ts/plugin": "^2.11.1",
312
310
  "@sudocode-ai/better-sqlite3-win32-x64": "^11.10.0",
313
311
  "@types/better-sqlite3": "^7.6.13",
314
312
  "@types/node": "^24.10.1",
315
313
  "@types/tmp": "^0.2.6",
316
314
  "@types/ws": "^8.18.1",
317
315
  "cross-env": "^10.1.0",
316
+ "gql.tada": "^1.8.0",
318
317
  "javascript-obfuscator": "^4.1.1",
319
318
  "moc-better-sqlite3": "^7.1.1",
320
319
  "msw": "^2.12.3",
@@ -329,8 +328,8 @@
329
328
  "ws": "^8.18.3"
330
329
  },
331
330
  "dependencies": {
332
- "@mysten/bcs": "^1.9.2",
333
- "@mysten/utils": "^0.2.0",
331
+ "@mysten/bcs": "file:../bcs",
332
+ "@mysten/utils": "file:../utils",
334
333
  "@noble/curves": "=1.9.4",
335
334
  "@noble/hashes": "^1.8.0",
336
335
  "@noble/post-quantum": "^0.6.1",
@@ -343,6 +342,7 @@
343
342
  "@types/lodash": "^4.17.21",
344
343
  "@zip.js/zip.js": "^2.7.57",
345
344
  "better-sqlite3": "^12.6.2",
345
+ "graphql": "^16.12.0",
346
346
  "lodash": "^4.17.21",
347
347
  "valibot": "^1.2.0"
348
348
  }
@@ -1,20 +0,0 @@
1
- import { MessageType } from "@protobuf-ts/runtime";
2
- export interface JwkId {
3
- iss?: string;
4
- kid?: string;
5
- }
6
- export interface Jwk {
7
- kty?: string;
8
- e?: string;
9
- n?: string;
10
- alg?: string;
11
- }
12
- declare class JwkId$Type extends MessageType<JwkId> {
13
- constructor();
14
- }
15
- export declare const JwkId: JwkId$Type;
16
- declare class Jwk$Type extends MessageType<Jwk> {
17
- constructor();
18
- }
19
- export declare const Jwk: Jwk$Type;
20
- export {};
@@ -1 +0,0 @@
1
- import{MessageType}from'@protobuf-ts/runtime';class JwkId$Type extends MessageType{constructor(){super('sui.rpc.v2.JwkId',[{'no':0x1,'name':'iss','kind':'scalar','opt':!![],'T':0x9},{'no':0x2,'name':'kid','kind':'scalar','opt':!![],'T':0x9}]);}}export const JwkId=new JwkId$Type();class Jwk$Type extends MessageType{constructor(){super('sui.rpc.v2.Jwk',[{'no':0x1,'name':'kty','kind':'scalar','opt':!![],'T':0x9},{'no':0x2,'name':'e','kind':'scalar','opt':!![],'T':0x9},{'no':0x3,'name':'n','kind':'scalar','opt':!![],'T':0x9},{'no':0x4,'name':'alg','kind':'scalar','opt':!![],'T':0x9}]);}}export const Jwk=new Jwk$Type();
@@ -1,23 +0,0 @@
1
- import type { RpcTransport } from "@protobuf-ts/runtime-rpc";
2
- import type { ServiceInfo } from "@protobuf-ts/runtime-rpc";
3
- import type { ReverseLookupNameResponse } from "./name_service.js";
4
- import type { ReverseLookupNameRequest } from "./name_service.js";
5
- import type { LookupNameResponse } from "./name_service.js";
6
- import type { LookupNameRequest } from "./name_service.js";
7
- import type { UnaryCall } from "@protobuf-ts/runtime-rpc";
8
- import type { RpcOptions } from "@protobuf-ts/runtime-rpc";
9
- export interface INameServiceClient {
10
- lookupName(input: LookupNameRequest, options?: RpcOptions): UnaryCall<LookupNameRequest, LookupNameResponse>;
11
- reverseLookupName(input: ReverseLookupNameRequest, options?: RpcOptions): UnaryCall<ReverseLookupNameRequest, ReverseLookupNameResponse>;
12
- }
13
- export declare class NameServiceClient implements INameServiceClient, ServiceInfo {
14
- private readonly _transport;
15
- typeName: string;
16
- methods: import("@protobuf-ts/runtime-rpc").MethodInfo<any, any>[];
17
- options: {
18
- [extensionName: string]: import("@protobuf-ts/runtime").JsonValue;
19
- };
20
- constructor(_transport: RpcTransport);
21
- lookupName(input: LookupNameRequest, options?: RpcOptions): UnaryCall<LookupNameRequest, LookupNameResponse>;
22
- reverseLookupName(input: ReverseLookupNameRequest, options?: RpcOptions): UnaryCall<ReverseLookupNameRequest, ReverseLookupNameResponse>;
23
- }
@@ -1 +0,0 @@
1
- import{NameService}from'./name_service.js';import{stackIntercept}from'@protobuf-ts/runtime-rpc';export class NameServiceClient{['_transport'];['typeName']=NameService['typeName'];['methods']=NameService['methods'];['options']=NameService['options'];constructor(a){this['_transport']=a;}['lookupName'](a,b){const c=this['methods'][0x0],d=this['_transport']['mergeOptions'](b);return stackIntercept('unary',this['_transport'],c,d,a);}['reverseLookupName'](a,b){const c=this['methods'][0x1],d=this['_transport']['mergeOptions'](b);return stackIntercept('unary',this['_transport'],c,d,a);}}
@@ -1,47 +0,0 @@
1
- import { ServiceType } from "@protobuf-ts/runtime-rpc";
2
- import { MessageType } from "@protobuf-ts/runtime";
3
- import { Timestamp } from "../../../google/protobuf/timestamp.js";
4
- export interface LookupNameRequest {
5
- name?: string;
6
- }
7
- export interface LookupNameResponse {
8
- record?: NameRecord;
9
- }
10
- export interface ReverseLookupNameRequest {
11
- address?: string;
12
- }
13
- export interface ReverseLookupNameResponse {
14
- record?: NameRecord;
15
- }
16
- export interface NameRecord {
17
- id?: string;
18
- name?: string;
19
- registrationNftId?: string;
20
- expirationTimestamp?: Timestamp;
21
- targetAddress?: string;
22
- data: {
23
- [key: string]: string;
24
- };
25
- }
26
- declare class LookupNameRequest$Type extends MessageType<LookupNameRequest> {
27
- constructor();
28
- }
29
- export declare const LookupNameRequest: LookupNameRequest$Type;
30
- declare class LookupNameResponse$Type extends MessageType<LookupNameResponse> {
31
- constructor();
32
- }
33
- export declare const LookupNameResponse: LookupNameResponse$Type;
34
- declare class ReverseLookupNameRequest$Type extends MessageType<ReverseLookupNameRequest> {
35
- constructor();
36
- }
37
- export declare const ReverseLookupNameRequest: ReverseLookupNameRequest$Type;
38
- declare class ReverseLookupNameResponse$Type extends MessageType<ReverseLookupNameResponse> {
39
- constructor();
40
- }
41
- export declare const ReverseLookupNameResponse: ReverseLookupNameResponse$Type;
42
- declare class NameRecord$Type extends MessageType<NameRecord> {
43
- constructor();
44
- }
45
- export declare const NameRecord: NameRecord$Type;
46
- export declare const NameService: ServiceType;
47
- export {};
@@ -1 +0,0 @@
1
- import{ServiceType}from'@protobuf-ts/runtime-rpc';import{MessageType}from'@protobuf-ts/runtime';import{Timestamp}from'../../../google/protobuf/timestamp.js';class LookupNameRequest$Type extends MessageType{constructor(){super('sui.rpc.v2.LookupNameRequest',[{'no':0x1,'name':'name','kind':'scalar','opt':!![],'T':0x9}]);}}export const LookupNameRequest=new LookupNameRequest$Type();class LookupNameResponse$Type extends MessageType{constructor(){super('sui.rpc.v2.LookupNameResponse',[{'no':0x1,'name':'record','kind':'message','T':()=>NameRecord}]);}}export const LookupNameResponse=new LookupNameResponse$Type();class ReverseLookupNameRequest$Type extends MessageType{constructor(){super('sui.rpc.v2.ReverseLookupNameRequest',[{'no':0x1,'name':'address','kind':'scalar','opt':!![],'T':0x9}]);}}export const ReverseLookupNameRequest=new ReverseLookupNameRequest$Type();class ReverseLookupNameResponse$Type extends MessageType{constructor(){super('sui.rpc.v2.ReverseLookupNameResponse',[{'no':0x1,'name':'record','kind':'message','T':()=>NameRecord}]);}}export const ReverseLookupNameResponse=new ReverseLookupNameResponse$Type();class NameRecord$Type extends MessageType{constructor(){super('sui.rpc.v2.NameRecord',[{'no':0x1,'name':'id','kind':'scalar','opt':!![],'T':0x9},{'no':0x2,'name':'name','kind':'scalar','opt':!![],'T':0x9},{'no':0x3,'name':'registration_nft_id','kind':'scalar','opt':!![],'T':0x9},{'no':0x4,'name':'expiration_timestamp','kind':'message','T':()=>Timestamp},{'no':0x5,'name':'target_address','kind':'scalar','opt':!![],'T':0x9},{'no':0x6,'name':'data','kind':'map','K':0x9,'V':{'kind':'scalar','T':0x9}}]);}}export const NameRecord=new NameRecord$Type();export const NameService=new ServiceType('sui.rpc.v2.NameService',[{'name':'LookupName','options':{},'I':LookupNameRequest,'O':LookupNameResponse},{'name':'ReverseLookupName','options':{},'I':ReverseLookupNameRequest,'O':ReverseLookupNameResponse}]);
@@ -1,8 +0,0 @@
1
- type Hex = string;
2
- type Path = string;
3
- type Keys = {
4
- key: Uint8Array;
5
- chainCode: Uint8Array;
6
- };
7
- export declare const derivePath: (path: Path, seed: Hex, offset?: number) => Keys;
8
- export {};
@@ -1 +0,0 @@
1
- import{fromHex}from'@mysten/bcs';import{hmac}from'@noble/hashes/hmac';import{sha512}from'@noble/hashes/sha512';const ED25519_CURVE='ed25519\x20seed',HARDENED_OFFSET=0x80000000,pathRegex=new RegExp('^m(\x5c/[0-9]+\x27)+$'),replaceDerive=a=>a['replace']('\x27',''),getMasterKeyFromSeed=a=>{const b=hmac['create'](sha512,ED25519_CURVE),c=b['update'](fromHex(a))['digest'](),d=c['slice'](0x0,0x20),e=c['slice'](0x20);return{'key':d,'chainCode':e};},CKDPriv=({key:a,chainCode:b},c)=>{const d=new ArrayBuffer(0x4),e=new DataView(d);e['setUint32'](0x0,c);const f=new Uint8Array(0x1+a['length']+d['byteLength']);f['set'](new Uint8Array(0x1)['fill'](0x0)),f['set'](a,0x1),f['set'](new Uint8Array(d,0x0,d['byteLength']),a['length']+0x1);const g=hmac['create'](sha512,b)['update'](f)['digest'](),h=g['slice'](0x0,0x20),i=g['slice'](0x20);return{'key':h,'chainCode':i};},isValidPath=a=>{if(!pathRegex['test'](a))return![];return!a['split']('/')['slice'](0x1)['map'](replaceDerive)['some'](isNaN);};export const derivePath=(a,b,c=HARDENED_OFFSET)=>{if(!isValidPath(a))throw new Error('Invalid\x20derivation\x20path');const {key:d,chainCode:e}=getMasterKeyFromSeed(b),f=a['split']('/')['slice'](0x1)['map'](replaceDerive)['map'](g=>parseInt(g,0xa));return f['reduce']((g,h)=>CKDPriv(g,h+c),{'key':d,'chainCode':e});};
@@ -1,2 +0,0 @@
1
- export { DEFAULT_ED25519_DERIVATION_PATH, Ed25519Keypair, type Ed25519KeypairData, } from "./keypair.js";
2
- export { Ed25519PublicKey } from "./publickey.js";
@@ -1 +0,0 @@
1
- export{DEFAULT_ED25519_DERIVATION_PATH,Ed25519Keypair}from'./keypair.js';export{Ed25519PublicKey}from'./publickey.js';
@@ -1,22 +0,0 @@
1
- import { Keypair } from "../../cryptography/keypair.js";
2
- import type { SignatureScheme } from "../../cryptography/signature-scheme.js";
3
- import { Ed25519PublicKey } from "./publickey.js";
4
- export declare const DEFAULT_ED25519_DERIVATION_PATH = "m/44'/784'/0'/0'/0'";
5
- export interface Ed25519KeypairData {
6
- publicKey: Uint8Array;
7
- secretKey: Uint8Array;
8
- }
9
- export declare class Ed25519Keypair extends Keypair {
10
- private keypair;
11
- constructor(keypair?: Ed25519KeypairData);
12
- getKeyScheme(): SignatureScheme;
13
- static generate(): Ed25519Keypair;
14
- static fromSecretKey(secretKey: Uint8Array | string, options?: {
15
- skipValidation?: boolean;
16
- }): Ed25519Keypair;
17
- getPublicKey(): Ed25519PublicKey;
18
- getSecretKey(): string;
19
- sign(data: Uint8Array): Promise<Uint8Array<ArrayBuffer>>;
20
- static deriveKeypair(mnemonics: string, path?: string): Ed25519Keypair;
21
- static deriveKeypairFromSeed(seedHex: string, path?: string): Ed25519Keypair;
22
- }
@@ -1 +0,0 @@
1
- import{ed25519}from'@noble/curves/ed25519';import{decodeWowPrivateKey,encodeWowPrivateKey,Keypair,PRIVATE_KEY_SIZE}from'../../cryptography/keypair.js';import{isValidHardenedPath,mnemonicToSeedHex}from'../../cryptography/mnemonics.js';import{derivePath}from'./ed25519-hd-key.js';import{Ed25519PublicKey}from'./publickey.js';export const DEFAULT_ED25519_DERIVATION_PATH='m/44\x27/784\x27/0\x27/0\x27/0\x27';export class Ed25519Keypair extends Keypair{['keypair'];constructor(a){super();if(a)this['keypair']={'publicKey':a['publicKey'],'secretKey':a['secretKey']['slice'](0x0,0x20)};else{const b=ed25519['utils']['randomPrivateKey']();this['keypair']={'publicKey':ed25519['getPublicKey'](b),'secretKey':b};}}['getKeyScheme'](){return'ED25519';}static['generate'](){const a=ed25519['utils']['randomPrivateKey']();return new Ed25519Keypair({'publicKey':ed25519['getPublicKey'](a),'secretKey':a});}static['fromSecretKey'](a,b){if(typeof a==='string'){const e=decodeWowPrivateKey(a);if(e['scheme']!=='ED25519')throw new Error('Expected\x20a\x20ED25519\x20keypair,\x20got\x20'+e['scheme']);return this['fromSecretKey'](e['secretKey'],b);}const c=a['length'];if(c!==PRIVATE_KEY_SIZE)throw new Error('Wrong\x20secretKey\x20size.\x20Expected\x20'+PRIVATE_KEY_SIZE+'\x20bytes,\x20got\x20'+c+'.');const d={'publicKey':ed25519['getPublicKey'](a),'secretKey':a};if(!b||!b['skipValidation']){const f=new TextEncoder(),g=f['encode']('sui\x20validation'),h=ed25519['sign'](g,a);if(!ed25519['verify'](h,g,d['publicKey']))throw new Error('provided\x20secretKey\x20is\x20invalid');}return new Ed25519Keypair(d);}['getPublicKey'](){return new Ed25519PublicKey(this['keypair']['publicKey']);}['getSecretKey'](){return encodeWowPrivateKey(this['keypair']['secretKey']['slice'](0x0,PRIVATE_KEY_SIZE),this['getKeyScheme']());}async['sign'](a){return ed25519['sign'](a,this['keypair']['secretKey']);}static['deriveKeypair'](a,b){b==null&&(b=DEFAULT_ED25519_DERIVATION_PATH);if(!isValidHardenedPath(b))throw new Error('Invalid\x20derivation\x20path');const {key:c}=derivePath(b,mnemonicToSeedHex(a));return Ed25519Keypair['fromSecretKey'](c);}static['deriveKeypairFromSeed'](a,b){b==null&&(b=DEFAULT_ED25519_DERIVATION_PATH);if(!isValidHardenedPath(b))throw new Error('Invalid\x20derivation\x20path');const {key:c}=derivePath(b,a);return Ed25519Keypair['fromSecretKey'](c);}}
@@ -1 +0,0 @@
1
- import{fromBase64}from'@mysten/bcs';import{ed25519}from'@noble/curves/ed25519';import{bytesEqual,parseSerializedKeypairSignature,PublicKey}from'../../cryptography/publickey.js';import{SIGNATURE_SCHEME_TO_FLAG}from'../../cryptography/signature-scheme.js';const PUBLIC_KEY_SIZE=0x20;export class Ed25519PublicKey extends PublicKey{static ['SIZE']=PUBLIC_KEY_SIZE;['data'];constructor(a){super();if(typeof a==='string')this['data']=fromBase64(a);else a instanceof Uint8Array?this['data']=a:this['data']=Uint8Array['from'](a);if(this['data']['length']!==PUBLIC_KEY_SIZE)throw new Error('Invalid\x20public\x20key\x20input.\x20Expected\x20'+PUBLIC_KEY_SIZE+'\x20bytes,\x20got\x20'+this['data']['length']);}['equals'](a){return super['equals'](a);}['toRawBytes'](){return this['data'];}['flag'](){return SIGNATURE_SCHEME_TO_FLAG['ED25519'];}async['verify'](a,b){let c;if(typeof b==='string'){const d=parseSerializedKeypairSignature(b);if(d['signatureScheme']!=='ED25519')throw new Error('Invalid\x20signature\x20scheme');if(!bytesEqual(this['toRawBytes'](),d['publicKey']))throw new Error('Signature\x20does\x20not\x20match\x20public\x20key');c=d['signature'];}else c=b;return ed25519['verify'](c,a,this['toRawBytes']());}}
@@ -1,3 +0,0 @@
1
- export { PasskeyKeypair, BrowserPasskeyProvider, findCommonPublicKey, } from "./keypair.js";
2
- export type { PasskeyProvider, BrowserPasswordProviderOptions, } from "./keypair.js";
3
- export { PasskeyPublicKey } from "./publickey.js";
@@ -1 +0,0 @@
1
- export{PasskeyKeypair,BrowserPasskeyProvider,findCommonPublicKey}from'./keypair.js';export{PasskeyPublicKey}from'./publickey.js';
@@ -1,33 +0,0 @@
1
- import type { IntentScope, SignatureWithBytes } from "../../cryptography/index.js";
2
- import { Signer } from "../../cryptography/index.js";
3
- import type { PublicKey } from "../../cryptography/publickey.js";
4
- import type { SignatureScheme } from "../../cryptography/signature-scheme.js";
5
- import type { AuthenticationCredential, RegistrationCredential } from "./types.js";
6
- type DeepPartialConfigKeys = "rp" | "user" | "authenticatorSelection";
7
- type DeepPartial<T> = T extends object ? {
8
- [P in keyof T]?: DeepPartial<T[P]>;
9
- } : T;
10
- export type BrowserPasswordProviderOptions = Pick<DeepPartial<PublicKeyCredentialCreationOptions>, DeepPartialConfigKeys> & Omit<Partial<PublicKeyCredentialCreationOptions>, DeepPartialConfigKeys | "pubKeyCredParams" | "challenge">;
11
- export interface PasskeyProvider {
12
- create(): Promise<RegistrationCredential>;
13
- get(challenge: Uint8Array): Promise<AuthenticationCredential>;
14
- }
15
- export declare class BrowserPasskeyProvider implements PasskeyProvider {
16
- #private;
17
- constructor(name: string, options: BrowserPasswordProviderOptions);
18
- create(): Promise<RegistrationCredential>;
19
- get(challenge: Uint8Array): Promise<AuthenticationCredential>;
20
- }
21
- export declare class PasskeyKeypair extends Signer {
22
- private publicKey;
23
- private provider;
24
- getKeyScheme(): SignatureScheme;
25
- constructor(publicKey: Uint8Array, provider: PasskeyProvider);
26
- static getPasskeyInstance(provider: PasskeyProvider): Promise<PasskeyKeypair>;
27
- getPublicKey(): PublicKey;
28
- sign(data: Uint8Array): Promise<Uint8Array<ArrayBuffer>>;
29
- signWithIntent(bytes: Uint8Array, intent: IntentScope): Promise<SignatureWithBytes>;
30
- static signAndRecover(provider: PasskeyProvider, message: Uint8Array): Promise<PublicKey[]>;
31
- }
32
- export declare function findCommonPublicKey(arr1: PublicKey[], arr2: PublicKey[]): PublicKey;
33
- export {};
@@ -1 +0,0 @@
1
- import{toBase64}from'@mysten/bcs';import{secp256r1}from'@noble/curves/p256';import{blake2b}from'@noble/hashes/blake2b';import{sha256}from'@noble/hashes/sha256';import{randomBytes}from'@noble/hashes/utils';import{PasskeyAuthenticator}from'../../bcs/bcs.js';import{messageWithIntent,SIGNATURE_SCHEME_TO_FLAG,Signer}from'../../cryptography/index.js';import{parseDerSPKI,PASSKEY_PUBLIC_KEY_SIZE,PASSKEY_SIGNATURE_SIZE,PasskeyPublicKey}from'./publickey.js';export class BrowserPasskeyProvider{#name;#options;constructor(a,b){this.#name=a,this.#options=b;}async['create'](){return await navigator['credentials']['create']({'publicKey':{'timeout':this.#options['timeout']??0xea60,...this.#options,'rp':{'name':this.#name,...this.#options['rp']},'user':{'name':this.#name,'displayName':this.#name,...this.#options['user'],'id':randomBytes(0xa)},'challenge':new TextEncoder()['encode']('Create\x20passkey\x20wallet\x20on\x20Sui'),'pubKeyCredParams':[{'alg':-0x7,'type':'public-key'}],'authenticatorSelection':{'authenticatorAttachment':'cross-platform','residentKey':'required','requireResidentKey':!![],'userVerification':'required',...this.#options['authenticatorSelection']}}});}async['get'](a){return await navigator['credentials']['get']({'publicKey':{'challenge':a,'userVerification':this.#options['authenticatorSelection']?.['userVerification']||'required','timeout':this.#options['timeout']??0xea60}});}}export class PasskeyKeypair extends Signer{['publicKey'];['provider'];['getKeyScheme'](){return'Passkey';}constructor(a,b){super(),this['publicKey']=a,this['provider']=b;}static async['getPasskeyInstance'](a){const b=await a['create']();if(!b['response']['getPublicKey']())throw new Error('Invalid\x20credential\x20create\x20response');else{const c=b['response']['getPublicKey'](),d=parseDerSPKI(new Uint8Array(c)),e=secp256r1['ProjectivePoint']['fromHex'](d),f=e['toRawBytes'](!![]);return new PasskeyKeypair(f,a);}}['getPublicKey'](){return new PasskeyPublicKey(this['publicKey']);}async['sign'](a){const b=await this['provider']['get'](a),c=new Uint8Array(b['response']['authenticatorData']),d=new Uint8Array(b['response']['clientDataJSON']),e=new TextDecoder(),f=e['decode'](d),g=secp256r1['Signature']['fromDER'](new Uint8Array(b['response']['signature'])),h=g['normalizeS']()['toCompactRawBytes']();if(h['length']!==PASSKEY_SIGNATURE_SIZE||this['publicKey']['length']!==PASSKEY_PUBLIC_KEY_SIZE)throw new Error('Invalid\x20signature\x20or\x20public\x20key\x20length');const i=new Uint8Array(0x1+h['length']+this['publicKey']['length']);return i['set']([SIGNATURE_SCHEME_TO_FLAG['Secp256r1']]),i['set'](h,0x1),i['set'](this['publicKey'],0x1+h['length']),PasskeyAuthenticator['serialize']({'authenticatorData':c,'clientDataJson':f,'userSignature':i})['toBytes']();}async['signWithIntent'](a,b){const c=messageWithIntent(b,a),d=blake2b(c,{'dkLen':0x20}),e=await this['sign'](d),f=new Uint8Array(0x1+e['length']);return f['set']([SIGNATURE_SCHEME_TO_FLAG[this['getKeyScheme']()]]),f['set'](e,0x1),{'signature':toBase64(f),'bytes':toBase64(a)};}static async['signAndRecover'](a,b){const c=await a['get'](b),d=messageFromAssertionResponse(c['response']),e=secp256r1['Signature']['fromDER'](new Uint8Array(c['response']['signature'])),f=[];for(let g=0x0;g<0x4;g++){const h=e['addRecoveryBit'](g);try{const j=h['recoverPublicKey'](sha256(d)),k=new PasskeyPublicKey(j['toRawBytes'](!![]));f['push'](k);}catch{continue;}}return f;}}export function findCommonPublicKey(a,b){const c=[];for(const d of a){for(const e of b){d['equals'](e)&&c['push'](d);}}if(c['length']!==0x1)throw new Error('No\x20unique\x20public\x20key\x20found');return c[0x0];}function messageFromAssertionResponse(a){const b=new Uint8Array(a['authenticatorData']),c=new Uint8Array(a['clientDataJSON']),d=sha256(c);return new Uint8Array([...b,...d]);}
@@ -1,25 +0,0 @@
1
- import { PublicKey } from "../../cryptography/publickey.js";
2
- import type { PublicKeyInitData } from "../../cryptography/publickey.js";
3
- export declare const PASSKEY_PUBLIC_KEY_SIZE = 33;
4
- export declare const PASSKEY_UNCOMPRESSED_PUBLIC_KEY_SIZE = 65;
5
- export declare const PASSKEY_SIGNATURE_SIZE = 64;
6
- export declare const SECP256R1_SPKI_HEADER: Uint8Array<ArrayBuffer>;
7
- export declare class PasskeyPublicKey extends PublicKey {
8
- static SIZE: number;
9
- private data;
10
- constructor(value: PublicKeyInitData);
11
- equals(publicKey: PasskeyPublicKey): boolean;
12
- toRawBytes(): Uint8Array<ArrayBuffer>;
13
- flag(): number;
14
- verify(message: Uint8Array, signature: Uint8Array | string): Promise<boolean>;
15
- }
16
- export declare function parseDerSPKI(derBytes: Uint8Array): Uint8Array;
17
- export declare function parseSerializedPasskeySignature(signature: Uint8Array | string): {
18
- signatureScheme: "Passkey";
19
- serializedSignature: string;
20
- signature: Uint8Array<ArrayBufferLike>;
21
- authenticatorData: Uint8Array<ArrayBufferLike>;
22
- clientDataJson: string;
23
- userSignature: Uint8Array<ArrayBuffer>;
24
- publicKey: Uint8Array<ArrayBuffer>;
25
- };
@@ -1 +0,0 @@
1
- import{fromBase64,toBase64}from'@mysten/bcs';import{secp256r1}from'@noble/curves/p256';import{sha256}from'@noble/hashes/sha256';import{PasskeyAuthenticator}from'../../bcs/bcs.js';import{bytesEqual,PublicKey}from'../../cryptography/publickey.js';import{SIGNATURE_SCHEME_TO_FLAG}from'../../cryptography/signature-scheme.js';export const PASSKEY_PUBLIC_KEY_SIZE=0x21;export const PASSKEY_UNCOMPRESSED_PUBLIC_KEY_SIZE=0x41;export const PASSKEY_SIGNATURE_SIZE=0x40;export const SECP256R1_SPKI_HEADER=new Uint8Array([0x30,0x59,0x30,0x13,0x6,0x7,0x2a,0x86,0x48,0xce,0x3d,0x2,0x1,0x6,0x8,0x2a,0x86,0x48,0xce,0x3d,0x3,0x1,0x7,0x3,0x42,0x0]);export class PasskeyPublicKey extends PublicKey{static ['SIZE']=PASSKEY_PUBLIC_KEY_SIZE;['data'];constructor(a){super();if(typeof a==='string')this['data']=fromBase64(a);else a instanceof Uint8Array?this['data']=a:this['data']=Uint8Array['from'](a);if(this['data']['length']!==PASSKEY_PUBLIC_KEY_SIZE)throw new Error('Invalid\x20public\x20key\x20input.\x20Expected\x20'+PASSKEY_PUBLIC_KEY_SIZE+'\x20bytes,\x20got\x20'+this['data']['length']);}['equals'](a){return super['equals'](a);}['toRawBytes'](){return this['data'];}['flag'](){return SIGNATURE_SCHEME_TO_FLAG['Passkey'];}async['verify'](a,b){const c=parseSerializedPasskeySignature(b),d=JSON['parse'](c['clientDataJson']);if(d['type']!=='webauthn.get')return![];const e=fromBase64(d['challenge']['replace'](/-/g,'+')['replace'](/_/g,'/'));if(!bytesEqual(a,e))return![];const f=c['userSignature']['slice'](0x1+PASSKEY_SIGNATURE_SIZE);if(!bytesEqual(this['toRawBytes'](),f))return![];const g=new Uint8Array([...c['authenticatorData'],...sha256(c['clientDataJson'])]),h=c['userSignature']['slice'](0x1,PASSKEY_SIGNATURE_SIZE+0x1);return secp256r1['verify'](h,sha256(g),f);}}export function parseDerSPKI(a){if(a['length']!==SECP256R1_SPKI_HEADER['length']+PASSKEY_UNCOMPRESSED_PUBLIC_KEY_SIZE)throw new Error('Invalid\x20DER\x20length');for(let b=0x0;b<SECP256R1_SPKI_HEADER['length'];b++){if(a[b]!==SECP256R1_SPKI_HEADER[b])throw new Error('Invalid\x20spki\x20header');}if(a[SECP256R1_SPKI_HEADER['length']]!==0x4)throw new Error('Invalid\x20point\x20marker');return a['slice'](SECP256R1_SPKI_HEADER['length']);}export function parseSerializedPasskeySignature(a){const b=typeof a==='string'?fromBase64(a):a;if(b[0x0]!==SIGNATURE_SCHEME_TO_FLAG['Passkey'])throw new Error('Invalid\x20signature\x20scheme');const c=PasskeyAuthenticator['parse'](b['slice'](0x1));return{'signatureScheme':'Passkey','serializedSignature':toBase64(b),'signature':b,'authenticatorData':c['authenticatorData'],'clientDataJson':c['clientDataJson'],'userSignature':new Uint8Array(c['userSignature']),'publicKey':new Uint8Array(c['userSignature']['slice'](0x1+PASSKEY_SIGNATURE_SIZE))};}
@@ -1,6 +0,0 @@
1
- export interface AuthenticationCredential extends PublicKeyCredential {
2
- response: AuthenticatorAssertionResponse;
3
- }
4
- export interface RegistrationCredential extends PublicKeyCredential {
5
- response: AuthenticatorAttestationResponse;
6
- }
@@ -1 +0,0 @@
1
- export{};
@@ -1,2 +0,0 @@
1
- export { DEFAULT_SECP256K1_DERIVATION_PATH, Secp256k1Keypair, type Secp256k1KeypairData, } from "./keypair.js";
2
- export { Secp256k1PublicKey } from "./publickey.js";
@@ -1 +0,0 @@
1
- export{DEFAULT_SECP256K1_DERIVATION_PATH,Secp256k1Keypair}from'./keypair.js';export{Secp256k1PublicKey}from'./publickey.js';
@@ -1,22 +0,0 @@
1
- import { Keypair } from "../../cryptography/keypair.js";
2
- import type { PublicKey } from "../../cryptography/publickey.js";
3
- import type { SignatureScheme } from "../../cryptography/signature-scheme.js";
4
- export declare const DEFAULT_SECP256K1_DERIVATION_PATH = "m/54'/784'/0'/0/0";
5
- export interface Secp256k1KeypairData {
6
- publicKey: Uint8Array;
7
- secretKey: Uint8Array;
8
- }
9
- export declare class Secp256k1Keypair extends Keypair {
10
- private keypair;
11
- constructor(keypair?: Secp256k1KeypairData);
12
- getKeyScheme(): SignatureScheme;
13
- static generate(): Secp256k1Keypair;
14
- static fromSecretKey(secretKey: Uint8Array | string, options?: {
15
- skipValidation?: boolean;
16
- }): Secp256k1Keypair;
17
- static fromSeed(seed: Uint8Array): Secp256k1Keypair;
18
- getPublicKey(): PublicKey;
19
- getSecretKey(): string;
20
- sign(data: Uint8Array): Promise<Uint8Array<ArrayBuffer>>;
21
- static deriveKeypair(mnemonics: string, path?: string): Secp256k1Keypair;
22
- }
@@ -1 +0,0 @@
1
- import{secp256k1}from'@noble/curves/secp256k1';import{blake2b}from'@noble/hashes/blake2b';import{sha256}from'@noble/hashes/sha256';import{bytesToHex}from'@noble/hashes/utils';import{HDKey}from'@scure/bip32';import{decodeWowPrivateKey,encodeWowPrivateKey,Keypair}from'../../cryptography/keypair.js';import{isValidBIP32Path,mnemonicToSeed}from'../../cryptography/mnemonics.js';import{Secp256k1PublicKey}from'./publickey.js';export const DEFAULT_SECP256K1_DERIVATION_PATH='m/54\x27/784\x27/0\x27/0/0';export class Secp256k1Keypair extends Keypair{['keypair'];constructor(a){super();if(a)this['keypair']=a;else{const b=secp256k1['utils']['randomPrivateKey'](),c=secp256k1['getPublicKey'](b,!![]);this['keypair']={'publicKey':c,'secretKey':b};}}['getKeyScheme'](){return'Secp256k1';}static['generate'](){return new Secp256k1Keypair();}static['fromSecretKey'](a,b){if(typeof a==='string'){const d=decodeWowPrivateKey(a);if(d['scheme']!=='Secp256k1')throw new Error('Expected\x20a\x20Secp256k1\x20keypair,\x20got\x20'+d['scheme']);return this['fromSecretKey'](d['secretKey'],b);}const c=secp256k1['getPublicKey'](a,!![]);if(!b||!b['skipValidation']){const e=new TextEncoder(),f=e['encode']('sui\x20validation'),g=bytesToHex(blake2b(f,{'dkLen':0x20})),h=secp256k1['sign'](g,a);if(!secp256k1['verify'](h,g,c,{'lowS':!![]}))throw new Error('Provided\x20secretKey\x20is\x20invalid');}return new Secp256k1Keypair({'publicKey':c,'secretKey':a});}static['fromSeed'](a){const b=secp256k1['getPublicKey'](a,!![]);return new Secp256k1Keypair({'publicKey':b,'secretKey':a});}['getPublicKey'](){return new Secp256k1PublicKey(this['keypair']['publicKey']);}['getSecretKey'](){return encodeWowPrivateKey(this['keypair']['secretKey'],this['getKeyScheme']());}async['sign'](a){const b=sha256(a),c=secp256k1['sign'](b,this['keypair']['secretKey'],{'lowS':!![]});return c['toCompactRawBytes']();}static['deriveKeypair'](a,b){b==null&&(b=DEFAULT_SECP256K1_DERIVATION_PATH);if(!isValidBIP32Path(b))throw new Error('Invalid\x20derivation\x20path');const c=HDKey['fromMasterSeed'](mnemonicToSeed(a))['derive'](b);if(c['publicKey']==null||c['privateKey']==null)throw new Error('Invalid\x20key');return new Secp256k1Keypair({'publicKey':c['publicKey'],'secretKey':c['privateKey']});}}
@@ -1,11 +0,0 @@
1
- import { PublicKey } from "../../cryptography/publickey.js";
2
- import type { PublicKeyInitData } from "../../cryptography/publickey.js";
3
- export declare class Secp256k1PublicKey extends PublicKey {
4
- static SIZE: number;
5
- private data;
6
- constructor(value: PublicKeyInitData);
7
- equals(publicKey: Secp256k1PublicKey): boolean;
8
- toRawBytes(): Uint8Array<ArrayBuffer>;
9
- flag(): number;
10
- verify(message: Uint8Array, signature: Uint8Array | string): Promise<boolean>;
11
- }
@@ -1 +0,0 @@
1
- import{fromBase64}from'@mysten/bcs';import{secp256k1}from'@noble/curves/secp256k1';import{sha256}from'@noble/hashes/sha256';import{bytesEqual,parseSerializedKeypairSignature,PublicKey}from'../../cryptography/publickey.js';import{SIGNATURE_SCHEME_TO_FLAG}from'../../cryptography/signature-scheme.js';const SECP256K1_PUBLIC_KEY_SIZE=0x21;export class Secp256k1PublicKey extends PublicKey{static ['SIZE']=SECP256K1_PUBLIC_KEY_SIZE;['data'];constructor(a){super();if(typeof a==='string')this['data']=fromBase64(a);else a instanceof Uint8Array?this['data']=a:this['data']=Uint8Array['from'](a);if(this['data']['length']!==SECP256K1_PUBLIC_KEY_SIZE)throw new Error('Invalid\x20public\x20key\x20input.\x20Expected\x20'+SECP256K1_PUBLIC_KEY_SIZE+'\x20bytes,\x20got\x20'+this['data']['length']);}['equals'](a){return super['equals'](a);}['toRawBytes'](){return this['data'];}['flag'](){return SIGNATURE_SCHEME_TO_FLAG['Secp256k1'];}async['verify'](a,b){let c;if(typeof b==='string'){const d=parseSerializedKeypairSignature(b);if(d['signatureScheme']!=='Secp256k1')throw new Error('Invalid\x20signature\x20scheme');if(!bytesEqual(this['toRawBytes'](),d['publicKey']))throw new Error('Signature\x20does\x20not\x20match\x20public\x20key');c=d['signature'];}else c=b;return secp256k1['verify'](secp256k1['Signature']['fromCompact'](c),sha256(a),this['toRawBytes']());}}
@@ -1,2 +0,0 @@
1
- export { DEFAULT_SECP256R1_DERIVATION_PATH, Secp256r1Keypair, type Secp256r1KeypairData, } from "./keypair.js";
2
- export { Secp256r1PublicKey } from "./publickey.js";
@@ -1 +0,0 @@
1
- export{DEFAULT_SECP256R1_DERIVATION_PATH,Secp256r1Keypair}from'./keypair.js';export{Secp256r1PublicKey}from'./publickey.js';
@@ -1,22 +0,0 @@
1
- import { Keypair } from "../../cryptography/keypair.js";
2
- import type { PublicKey } from "../../cryptography/publickey.js";
3
- import type { SignatureScheme } from "../../cryptography/signature-scheme.js";
4
- export declare const DEFAULT_SECP256R1_DERIVATION_PATH = "m/74'/784'/0'/0/0";
5
- export interface Secp256r1KeypairData {
6
- publicKey: Uint8Array;
7
- secretKey: Uint8Array;
8
- }
9
- export declare class Secp256r1Keypair extends Keypair {
10
- private keypair;
11
- constructor(keypair?: Secp256r1KeypairData);
12
- getKeyScheme(): SignatureScheme;
13
- static generate(): Secp256r1Keypair;
14
- static fromSecretKey(secretKey: Uint8Array | string, options?: {
15
- skipValidation?: boolean;
16
- }): Secp256r1Keypair;
17
- static fromSeed(seed: Uint8Array): Secp256r1Keypair;
18
- getPublicKey(): PublicKey;
19
- getSecretKey(): string;
20
- sign(data: Uint8Array): Promise<Uint8Array<ArrayBuffer>>;
21
- static deriveKeypair(mnemonics: string, path?: string): Secp256r1Keypair;
22
- }
@@ -1 +0,0 @@
1
- import{secp256r1}from'@noble/curves/p256';import{blake2b}from'@noble/hashes/blake2b';import{sha256}from'@noble/hashes/sha256';import{bytesToHex}from'@noble/hashes/utils';import{HDKey}from'@scure/bip32';import{decodeWowPrivateKey,encodeWowPrivateKey,Keypair}from'../../cryptography/keypair.js';import{isValidBIP32Path,mnemonicToSeed}from'../../cryptography/mnemonics.js';import{Secp256r1PublicKey}from'./publickey.js';export const DEFAULT_SECP256R1_DERIVATION_PATH='m/74\x27/784\x27/0\x27/0/0';export class Secp256r1Keypair extends Keypair{['keypair'];constructor(a){super();if(a)this['keypair']=a;else{const b=secp256r1['utils']['randomPrivateKey'](),c=secp256r1['getPublicKey'](b,!![]);this['keypair']={'publicKey':c,'secretKey':b};}}['getKeyScheme'](){return'Secp256r1';}static['generate'](){return new Secp256r1Keypair();}static['fromSecretKey'](a,b){if(typeof a==='string'){const d=decodeWowPrivateKey(a);if(d['scheme']!=='Secp256r1')throw new Error('Expected\x20a\x20Secp256r1\x20keypair,\x20got\x20'+d['scheme']);return this['fromSecretKey'](d['secretKey'],b);}const c=secp256r1['getPublicKey'](a,!![]);if(!b||!b['skipValidation']){const e=new TextEncoder(),f=e['encode']('sui\x20validation'),g=bytesToHex(blake2b(f,{'dkLen':0x20})),h=secp256r1['sign'](g,a,{'lowS':!![]});if(!secp256r1['verify'](h,g,c,{'lowS':!![]}))throw new Error('Provided\x20secretKey\x20is\x20invalid');}return new Secp256r1Keypair({'publicKey':c,'secretKey':a});}static['fromSeed'](a){const b=secp256r1['getPublicKey'](a,!![]);return new Secp256r1Keypair({'publicKey':b,'secretKey':a});}['getPublicKey'](){return new Secp256r1PublicKey(this['keypair']['publicKey']);}['getSecretKey'](){return encodeWowPrivateKey(this['keypair']['secretKey'],this['getKeyScheme']());}async['sign'](a){const b=sha256(a),c=secp256r1['sign'](b,this['keypair']['secretKey'],{'lowS':!![]});return c['toCompactRawBytes']();}static['deriveKeypair'](a,b){b==null&&(b=DEFAULT_SECP256R1_DERIVATION_PATH);if(!isValidBIP32Path(b))throw new Error('Invalid\x20derivation\x20path');const c=HDKey['fromMasterSeed'](mnemonicToSeed(a))['derive'](b)['privateKey'];return Secp256r1Keypair['fromSecretKey'](c);}}
@@ -1,11 +0,0 @@
1
- import { PublicKey } from "../../cryptography/publickey.js";
2
- import type { PublicKeyInitData } from "../../cryptography/publickey.js";
3
- export declare class Secp256r1PublicKey extends PublicKey {
4
- static SIZE: number;
5
- private data;
6
- constructor(value: PublicKeyInitData);
7
- equals(publicKey: Secp256r1PublicKey): boolean;
8
- toRawBytes(): Uint8Array<ArrayBuffer>;
9
- flag(): number;
10
- verify(message: Uint8Array, signature: Uint8Array | string): Promise<boolean>;
11
- }
@@ -1 +0,0 @@
1
- import{fromBase64}from'@mysten/bcs';import{secp256r1}from'@noble/curves/p256';import{sha256}from'@noble/hashes/sha256';import{bytesEqual,PublicKey}from'../../cryptography/publickey.js';import{SIGNATURE_SCHEME_TO_FLAG}from'../../cryptography/signature-scheme.js';import{parseSerializedSignature}from'../../cryptography/signature.js';const SECP256R1_PUBLIC_KEY_SIZE=0x21;export class Secp256r1PublicKey extends PublicKey{static ['SIZE']=SECP256R1_PUBLIC_KEY_SIZE;['data'];constructor(a){super();if(typeof a==='string')this['data']=fromBase64(a);else a instanceof Uint8Array?this['data']=a:this['data']=Uint8Array['from'](a);if(this['data']['length']!==SECP256R1_PUBLIC_KEY_SIZE)throw new Error('Invalid\x20public\x20key\x20input.\x20Expected\x20'+SECP256R1_PUBLIC_KEY_SIZE+'\x20bytes,\x20got\x20'+this['data']['length']);}['equals'](a){return super['equals'](a);}['toRawBytes'](){return this['data'];}['flag'](){return SIGNATURE_SCHEME_TO_FLAG['Secp256r1'];}async['verify'](a,b){let c;if(typeof b==='string'){const d=parseSerializedSignature(b);if(d['signatureScheme']!=='Secp256r1')throw new Error('Invalid\x20signature\x20scheme');if(!bytesEqual(this['toRawBytes'](),d['publicKey']))throw new Error('Signature\x20does\x20not\x20match\x20public\x20key');c=d['signature'];}else c=b;return secp256r1['verify'](secp256r1['Signature']['fromCompact'](c),sha256(a),this['toRawBytes']());}}
@@ -1,2 +0,0 @@
1
- export declare function isValidSuiNSName(name: string): boolean;
2
- export declare function normalizeSuiNSName(name: string, format?: "at" | "dot"): string;
@@ -1 +0,0 @@
1
- const SUI_NS_NAME_REGEX=/^(?!.*(^(?!@)|[-.@])($|[-.@]))(?:[a-z0-9-]{0,63}(?:\.[a-z0-9-]{0,63})*)?@[a-z0-9-]{0,63}$/i,SUI_NS_DOMAIN_REGEX=/^(?!.*(^|[-.])($|[-.]))(?:[a-z0-9-]{0,63}\.)+sui$/i,MAX_SUI_NS_NAME_LENGTH=0xeb;export function isValidSuiNSName(a){if(a['length']>MAX_SUI_NS_NAME_LENGTH)return![];if(a['includes']('@'))return SUI_NS_NAME_REGEX['test'](a);return SUI_NS_DOMAIN_REGEX['test'](a);}export function normalizeSuiNSName(a,b='at'){const c=a['toLowerCase']();let d;if(c['includes']('@')){if(!SUI_NS_NAME_REGEX['test'](c))throw new Error('Invalid\x20SuiNS\x20name\x20'+a);const [e,f]=c['split']('@');d=[...e?e['split']('.'):[],f];}else{if(!SUI_NS_DOMAIN_REGEX['test'](c))throw new Error('Invalid\x20SuiNS\x20name\x20'+a);d=c['split']('.')['slice'](0x0,-0x1);}if(b==='dot')return d['join']('.')+'.sui';return d['slice'](0x0,-0x1)['join']('.')+'@'+d[d['length']-0x1];}
@@ -1,20 +0,0 @@
1
- import { MessageType } from "@protobuf-ts/runtime";
2
- export interface JwkId {
3
- iss?: string;
4
- kid?: string;
5
- }
6
- export interface Jwk {
7
- kty?: string;
8
- e?: string;
9
- n?: string;
10
- alg?: string;
11
- }
12
- declare class JwkId$Type extends MessageType<JwkId> {
13
- constructor();
14
- }
15
- export declare const JwkId: JwkId$Type;
16
- declare class Jwk$Type extends MessageType<Jwk> {
17
- constructor();
18
- }
19
- export declare const Jwk: Jwk$Type;
20
- export {};
@@ -1 +0,0 @@
1
- import{MessageType}from'@protobuf-ts/runtime';class JwkId$Type extends MessageType{constructor(){super('sui.rpc.v2.JwkId',[{'no':0x1,'name':'iss','kind':'scalar','opt':!![],'T':0x9},{'no':0x2,'name':'kid','kind':'scalar','opt':!![],'T':0x9}]);}}export const JwkId=new JwkId$Type();class Jwk$Type extends MessageType{constructor(){super('sui.rpc.v2.Jwk',[{'no':0x1,'name':'kty','kind':'scalar','opt':!![],'T':0x9},{'no':0x2,'name':'e','kind':'scalar','opt':!![],'T':0x9},{'no':0x3,'name':'n','kind':'scalar','opt':!![],'T':0x9},{'no':0x4,'name':'alg','kind':'scalar','opt':!![],'T':0x9}]);}}export const Jwk=new Jwk$Type();
@@ -1,23 +0,0 @@
1
- import type { RpcTransport } from "@protobuf-ts/runtime-rpc";
2
- import type { ServiceInfo } from "@protobuf-ts/runtime-rpc";
3
- import type { ReverseLookupNameResponse } from "./name_service.js";
4
- import type { ReverseLookupNameRequest } from "./name_service.js";
5
- import type { LookupNameResponse } from "./name_service.js";
6
- import type { LookupNameRequest } from "./name_service.js";
7
- import type { UnaryCall } from "@protobuf-ts/runtime-rpc";
8
- import type { RpcOptions } from "@protobuf-ts/runtime-rpc";
9
- export interface INameServiceClient {
10
- lookupName(input: LookupNameRequest, options?: RpcOptions): UnaryCall<LookupNameRequest, LookupNameResponse>;
11
- reverseLookupName(input: ReverseLookupNameRequest, options?: RpcOptions): UnaryCall<ReverseLookupNameRequest, ReverseLookupNameResponse>;
12
- }
13
- export declare class NameServiceClient implements INameServiceClient, ServiceInfo {
14
- private readonly _transport;
15
- typeName: string;
16
- methods: import("@protobuf-ts/runtime-rpc").MethodInfo<any, any>[];
17
- options: {
18
- [extensionName: string]: import("@protobuf-ts/runtime").JsonValue;
19
- };
20
- constructor(_transport: RpcTransport);
21
- lookupName(input: LookupNameRequest, options?: RpcOptions): UnaryCall<LookupNameRequest, LookupNameResponse>;
22
- reverseLookupName(input: ReverseLookupNameRequest, options?: RpcOptions): UnaryCall<ReverseLookupNameRequest, ReverseLookupNameResponse>;
23
- }
@@ -1 +0,0 @@
1
- import{NameService}from'./name_service.js';import{stackIntercept}from'@protobuf-ts/runtime-rpc';export class NameServiceClient{['_transport'];['typeName']=NameService['typeName'];['methods']=NameService['methods'];['options']=NameService['options'];constructor(a){this['_transport']=a;}['lookupName'](a,b){const c=this['methods'][0x0],d=this['_transport']['mergeOptions'](b);return stackIntercept('unary',this['_transport'],c,d,a);}['reverseLookupName'](a,b){const c=this['methods'][0x1],d=this['_transport']['mergeOptions'](b);return stackIntercept('unary',this['_transport'],c,d,a);}}
@@ -1,47 +0,0 @@
1
- import { ServiceType } from "@protobuf-ts/runtime-rpc";
2
- import { MessageType } from "@protobuf-ts/runtime";
3
- import { Timestamp } from "../../../google/protobuf/timestamp.js";
4
- export interface LookupNameRequest {
5
- name?: string;
6
- }
7
- export interface LookupNameResponse {
8
- record?: NameRecord;
9
- }
10
- export interface ReverseLookupNameRequest {
11
- address?: string;
12
- }
13
- export interface ReverseLookupNameResponse {
14
- record?: NameRecord;
15
- }
16
- export interface NameRecord {
17
- id?: string;
18
- name?: string;
19
- registrationNftId?: string;
20
- expirationTimestamp?: Timestamp;
21
- targetAddress?: string;
22
- data: {
23
- [key: string]: string;
24
- };
25
- }
26
- declare class LookupNameRequest$Type extends MessageType<LookupNameRequest> {
27
- constructor();
28
- }
29
- export declare const LookupNameRequest: LookupNameRequest$Type;
30
- declare class LookupNameResponse$Type extends MessageType<LookupNameResponse> {
31
- constructor();
32
- }
33
- export declare const LookupNameResponse: LookupNameResponse$Type;
34
- declare class ReverseLookupNameRequest$Type extends MessageType<ReverseLookupNameRequest> {
35
- constructor();
36
- }
37
- export declare const ReverseLookupNameRequest: ReverseLookupNameRequest$Type;
38
- declare class ReverseLookupNameResponse$Type extends MessageType<ReverseLookupNameResponse> {
39
- constructor();
40
- }
41
- export declare const ReverseLookupNameResponse: ReverseLookupNameResponse$Type;
42
- declare class NameRecord$Type extends MessageType<NameRecord> {
43
- constructor();
44
- }
45
- export declare const NameRecord: NameRecord$Type;
46
- export declare const NameService: ServiceType;
47
- export {};