UNPKG

@biconomy/abstractjs

Version:

SDK for Biconomy integration with support for account abstraction, smart accounts, ERC-4337.

145 lines 9.31 kB
import { concatHex, validateTypedData } from "viem"; import { erc7739Actions } from "viem/experimental"; import { DUMMY_SIGNATURE } from "../smartSessions/index.js"; import { toValidator } from "../toValidator.js"; const MOCK_SUPERTXN_HASH_AND_TIMESTAMPS = "0x9e1cce57126e9205fe085888ed6b5ca0033f168e26b8927adb1c6da566cf7c5100000000000000000000000000000000000000000000000000000000642622800000000000000000000000000000000000000000000000000000000064262668"; export const toMeeK1Module = (parameters) => { const { signatureType = "no-mee", superTxEntriesCount = 3 } = parameters; if (!parameters.walletClient.account) { throw new Error("Account should be defined in the wallet client provided to the module"); } const walletClient7739 = parameters.walletClient.extend(erc7739Actions()); /** * Signs a message using ERC-7739 PersonalSign flow * @param message - The message to sign * @param verifierDomain - The EIP-712 domain of the verifier (smart account) * @returns The ERC-7739 wrapped signature */ const signMessageErc7739 = async (message, verifierDomain) => { return await walletClient7739.signMessage({ account: parameters.walletClient.account, message, verifierDomain: verifierDomain }); }; /** * Signs typed data using ERC-7739 TypedDataSign flow * @param typedData - The typed data to sign * @param verifierDomain - The EIP-712 domain of the verifier (smart account) * @returns The ERC-7739 wrapped signature */ const signTypedDataErc7739 = async (typedData, verifierDomain) => { const { domain, types, primaryType, message } = typedData; // Validate typed data before signing validateTypedData({ domain, types, primaryType, message }); return await walletClient7739.signTypedData({ account: parameters.walletClient.account, domain: domain, types: types, primaryType: primaryType, message: message, verifierDomain: verifierDomain }); }; return toValidator({ initData: parameters.walletClient.account.address, data: parameters.walletClient.account.address, deInitData: "0x", ...parameters, address: parameters.module, module: parameters.module, type: "validator", signMessageErc7739, signTypedDataErc7739, getStubSignature: async () => getMeeK1ModuleStubSignature(signatureType, superTxEntriesCount), erc7739VersionSupported_: 1 }); }; export const getMeeK1ModuleStubSignature = (signatureType, superTxEntriesCount) => { // get the proof size for a given merkle tree size const leafCount = superTxEntriesCount + 1; const proofSize = Math.ceil(Math.log2(leafCount)); let prefix = "0x"; let mockModePayload = "0x"; if (signatureType === "no-mee") { return DUMMY_SIGNATURE; } if (signatureType === "simple") { prefix = "0x177eee00"; mockModePayload = concatHex([ MOCK_SUPERTXN_HASH_AND_TIMESTAMPS, "0x00000000000000000000000000000000000000000000000000000000000000a0", // offsets "0x0000000000000000000000000000000000000000000000000000000000000100" ]); } // for permit mode, on-chain mode, and mm-dtk mode, we imitate the sig structure // hex values are taken from a real signature for an according fusion mode // stub signatures are used to estimate gas and are not expected to be valid // here and below sample data from some random actual userOp encoding with preserved length are used to imitate the signature structure if (signatureType === "permit") { prefix = "0x177eee01"; mockModePayload = concatHex([ "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", MOCK_SUPERTXN_HASH_AND_TIMESTAMPS, "0x00000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000250e2ad6bd90d6121dc5166dc6968f23ba43497594de5c7ca655f58e96d31775d" ]); } if (signatureType === "on-chain") { prefix = "0x177eee02"; mockModePayload = concatHex([ "0x00000000000000000000000000000000000000000000000000000000000000200000000000000000000000001d1499e622d69689cdf9004d05ec547d650ff211000000000000000000000000a0cb889707d426a7a386870a03bc70d1b0697598fe8244a8453f6a5a1623e38a7117cfcadf84d670fe741a32e447cd5f5671a68b000000000000000000000000000000000000000000000001158e460913d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", MOCK_SUPERTXN_HASH_AND_TIMESTAMPS, "0x000000000000000000000000000000000000000000000000000000000000000568f7d0137aa459fc3d87c0405f9df08008c9b97b3da85ef4f663b0e4fc910b518146837426fd3167918049cae2bc9fdf90aabc1e9db16244b56a12463711c2d500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000" ]); } // TODO: adjust this to the actual mm-dtk payload if (signatureType === "mm-dtk") { prefix = "0x177eee03"; mockModePayload = concatHex([ "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", MOCK_SUPERTXN_HASH_AND_TIMESTAMPS, "0x00000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000250e2ad6bd90d6121dc5166dc6968f23ba43497594de5c7ca655f58e96d31775d" ]); } // Safe Smart Account mode stub signature if (signatureType === "safe-sa") { prefix = "0x177eee04"; // Mock SafeTxnData encoding with domain separator, transaction params, and signatures mockModePayload = concatHex([ "0x0000000000000000000000000000000000000000000000000000000000000020", // offset for tuple "0x47e79534a245952e8b16893a336b85a3d9ea9fa8fa568c00004d05ec547d0001", // ogDomainSeparator (mock) "0x000000000000000000000000a0b86991c6218b36c1d19d4a2e9eb0ce3606eb48", // to (mock token address) "0x0000000000000000000000000000000000000000000000000000000000000000", // value (0) "0x0000000000000000000000000000000000000000000000000000000000000180", // data offset "0x0000000000000000000000000000000000000000000000000000000000000000", // operation (Call) "0x0000000000000000000000000000000000000000000000000000000000000000", // safeTxGas "0x0000000000000000000000000000000000000000000000000000000000000000", // baseGas "0x0000000000000000000000000000000000000000000000000000000000000000", // gasPrice "0x0000000000000000000000000000000000000000000000000000000000000000", // gasToken "0x0000000000000000000000000000000000000000000000000000000000000000", // refundReceiver "0x0000000000000000000000000000000000000000000000000000000000000000", // nonce "0x00000000000000000000000000000000000000000000000000000000000001c0", // signatures offset "0x0000000000000000000000000000000000000000000000000000000000000001", // executeTrigger (true) "0x0000000000000000000000000000000000000000000000000000000000000001", // chainId "0x0000000000000000000000000000000000000000000000000000000000000044", // data length "0x095ea7b3000000000000000000000000a0cb889707d426a7a386870a03bc70d1", // approve calldata (partial) "0x0b6975980000000000000000000000000000000000000000000000003782dace", // approve calldata + hash "0x0000000000000000000000000000000000000000000000000000000000000041", // signatures length DUMMY_SIGNATURE // mock signature ]); } // use random 32 bytes as leaves const leaves = Array.from({ length: proofSize }, () => "0x3239aa7c79368121ae1a0e73b662a9fd8f0c7f6aa1a7dfdc2eebdbeb2f9b070c"); const proofPayload = concatHex([ `0x${proofSize.toString(16).padStart(64, "0")}`, ...leaves ]); return concatHex([ prefix, mockModePayload, proofPayload, "0x0000000000000000000000000000000000000000000000000000000000000041", // length DUMMY_SIGNATURE ]); }; //# sourceMappingURL=toMeeK1Module.js.map