123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184 |
- const {
- AbiCoder,
- AbstractSigner,
- Signature,
- TypedDataEncoder,
- assert,
- assertArgument,
- concat,
- dataLength,
- decodeBase64,
- getBytes,
- getBytesCopy,
- hashMessage,
- hexlify,
- sha256,
- toBeHex,
- keccak256,
- } = require('ethers');
- const { secp256r1 } = require('@noble/curves/p256');
- const { generateKeyPairSync, privateEncrypt } = require('crypto');
- // Lightweight version of BaseWallet
- class NonNativeSigner extends AbstractSigner {
- #signingKey;
- constructor(privateKey, provider) {
- super(provider);
- assertArgument(
- privateKey && typeof privateKey.sign === 'function',
- 'invalid private key',
- 'privateKey',
- '[ REDACTED ]',
- );
- this.#signingKey = privateKey;
- }
- get signingKey() {
- return this.#signingKey;
- }
- get privateKey() {
- return this.signingKey.privateKey;
- }
- async getAddress() {
- throw new Error("NonNativeSigner doesn't have an address");
- }
- connect(provider) {
- return new NonNativeSigner(this.#signingKey, provider);
- }
- async signTransaction(/*tx: TransactionRequest*/) {
- throw new Error('NonNativeSigner cannot send transactions');
- }
- async signMessage(message /*: string | Uint8Array*/) /*: Promise<string>*/ {
- return this.signingKey.sign(hashMessage(message)).serialized;
- }
- async signTypedData(
- domain /*: TypedDataDomain*/,
- types /*: Record<string, Array<TypedDataField>>*/,
- value /*: Record<string, any>*/,
- ) /*: Promise<string>*/ {
- // Populate any ENS names
- const populated = await TypedDataEncoder.resolveNames(domain, types, value, async name => {
- assert(this.provider != null, 'cannot resolve ENS names without a provider', 'UNSUPPORTED_OPERATION', {
- operation: 'resolveName',
- info: { name },
- });
- const address = await this.provider.resolveName(name);
- assert(address != null, 'unconfigured ENS name', 'UNCONFIGURED_NAME', { value: name });
- return address;
- });
- return this.signingKey.sign(TypedDataEncoder.hash(populated.domain, types, populated.value)).serialized;
- }
- }
- class P256SigningKey {
- #privateKey;
- constructor(privateKey) {
- this.#privateKey = getBytes(privateKey);
- }
- static random() {
- return new this(secp256r1.utils.randomPrivateKey());
- }
- get privateKey() {
- return hexlify(this.#privateKey);
- }
- get publicKey() {
- const publicKeyBytes = secp256r1.getPublicKey(this.#privateKey, false);
- return { qx: hexlify(publicKeyBytes.slice(0x01, 0x21)), qy: hexlify(publicKeyBytes.slice(0x21, 0x41)) };
- }
- sign(digest /*: BytesLike*/) /*: Signature*/ {
- assertArgument(dataLength(digest) === 32, 'invalid digest length', 'digest', digest);
- const sig = secp256r1.sign(getBytesCopy(digest), getBytesCopy(this.#privateKey), { lowS: true });
- return Signature.from({ r: toBeHex(sig.r, 32), s: toBeHex(sig.s, 32), v: sig.recovery ? 0x1c : 0x1b });
- }
- }
- class RSASigningKey {
- #privateKey;
- #publicKey;
- constructor(keyPair) {
- const jwk = keyPair.publicKey.export({ format: 'jwk' });
- this.#privateKey = keyPair.privateKey;
- this.#publicKey = { e: decodeBase64(jwk.e), n: decodeBase64(jwk.n) };
- }
- static random(modulusLength = 2048) {
- return new this(generateKeyPairSync('rsa', { modulusLength }));
- }
- get privateKey() {
- return hexlify(this.#privateKey);
- }
- get publicKey() {
- return { e: hexlify(this.#publicKey.e), n: hexlify(this.#publicKey.n) };
- }
- sign(digest /*: BytesLike*/) /*: Signature*/ {
- assertArgument(dataLength(digest) === 32, 'invalid digest length', 'digest', digest);
- // SHA256 OID = 608648016503040201 (9 bytes) | NULL = 0500 (2 bytes) (explicit) | OCTET_STRING length (0x20) = 0420 (2 bytes)
- return {
- serialized: hexlify(
- privateEncrypt(this.#privateKey, getBytes(concat(['0x3031300d060960864801650304020105000420', digest]))),
- ),
- };
- }
- }
- class RSASHA256SigningKey extends RSASigningKey {
- sign(digest /*: BytesLike*/) /*: Signature*/ {
- assertArgument(dataLength(digest) === 32, 'invalid digest length', 'digest', digest);
- return super.sign(sha256(getBytes(digest)));
- }
- }
- class MultiERC7913SigningKey {
- // this is a sorted array of objects that contain {signer, weight}
- #signers;
- constructor(signers) {
- assertArgument(
- Array.isArray(signers) && signers.length > 0,
- 'signers must be a non-empty array',
- 'signers',
- signers.length,
- );
- // Sorting is done at construction so that it doesn't have to be done in sign()
- this.#signers = signers.sort((s1, s2) => keccak256(s1.bytes ?? s1.address) - keccak256(s2.bytes ?? s2.address));
- }
- get signers() {
- return this.#signers;
- }
- sign(digest /*: BytesLike*/ /*: Signature*/) {
- assertArgument(dataLength(digest) === 32, 'invalid digest length', 'digest', digest);
- return {
- serialized: AbiCoder.defaultAbiCoder().encode(
- ['bytes[]', 'bytes[]'],
- [
- this.#signers.map(signer => signer.bytes ?? signer.address),
- this.#signers.map(signer => signer.signingKey.sign(digest).serialized),
- ],
- ),
- };
- }
- }
- module.exports = { NonNativeSigner, P256SigningKey, RSASigningKey, RSASHA256SigningKey, MultiERC7913SigningKey };
|