@mysten/sui
Version:
Sui TypeScript API(Work in Progress)
131 lines (115 loc) • 3.95 kB
text/typescript
// Copyright (c) Mysten Labs, Inc.
// SPDX-License-Identifier: Apache-2.0
import { bcs, toB64 } from '@mysten/bcs';
import { blake2b } from '@noble/hashes/blake2b';
import { bech32 } from 'bech32';
import type { IntentScope } from './intent.js';
import { messageWithIntent } from './intent.js';
import type { PublicKey } from './publickey.js';
import { SIGNATURE_FLAG_TO_SCHEME, SIGNATURE_SCHEME_TO_FLAG } from './signature-scheme.js';
import type { SignatureScheme } from './signature-scheme.js';
import { toSerializedSignature } from './signature.js';
export const PRIVATE_KEY_SIZE = 32;
export const LEGACY_PRIVATE_KEY_SIZE = 64;
export const SUI_PRIVATE_KEY_PREFIX = 'suiprivkey';
export type ParsedKeypair = {
schema: SignatureScheme;
secretKey: Uint8Array;
};
export interface SignatureWithBytes {
bytes: string;
signature: string;
}
/**
* TODO: Document
*/
export abstract class Signer {
abstract sign(bytes: Uint8Array): Promise<Uint8Array>;
/**
* Sign messages with a specific intent. By combining the message bytes with the intent before hashing and signing,
* it ensures that a signed message is tied to a specific purpose and domain separator is provided
*/
async signWithIntent(bytes: Uint8Array, intent: IntentScope): Promise<SignatureWithBytes> {
const intentMessage = messageWithIntent(intent, bytes);
const digest = blake2b(intentMessage, { dkLen: 32 });
const signature = toSerializedSignature({
signature: await this.sign(digest),
signatureScheme: this.getKeyScheme(),
publicKey: this.getPublicKey(),
});
return {
signature,
bytes: toB64(bytes),
};
}
/**
* Signs provided transaction by calling `signWithIntent()` with a `TransactionData` provided as intent scope
*/
async signTransaction(bytes: Uint8Array) {
return this.signWithIntent(bytes, 'TransactionData');
}
/**
* Signs provided personal message by calling `signWithIntent()` with a `PersonalMessage` provided as intent scope
*/
async signPersonalMessage(bytes: Uint8Array) {
const { signature } = await this.signWithIntent(
bcs.vector(bcs.u8()).serialize(bytes).toBytes(),
'PersonalMessage',
);
return {
bytes: toB64(bytes),
signature,
};
}
toSuiAddress(): string {
return this.getPublicKey().toSuiAddress();
}
/**
* Get the key scheme of the keypair: Secp256k1 or ED25519
*/
abstract getKeyScheme(): SignatureScheme;
/**
* The public key for this keypair
*/
abstract getPublicKey(): PublicKey;
}
export abstract class Keypair extends Signer {
/**
* This returns the Bech32 secret key string for this keypair.
*/
abstract getSecretKey(): string;
}
/**
* This returns an ParsedKeypair object based by validating the
* 33-byte Bech32 encoded string starting with `suiprivkey`, and
* parse out the signature scheme and the private key in bytes.
*/
export function decodeSuiPrivateKey(value: string): ParsedKeypair {
const { prefix, words } = bech32.decode(value);
if (prefix !== SUI_PRIVATE_KEY_PREFIX) {
throw new Error('invalid private key prefix');
}
const extendedSecretKey = new Uint8Array(bech32.fromWords(words));
const secretKey = extendedSecretKey.slice(1);
const signatureScheme =
SIGNATURE_FLAG_TO_SCHEME[extendedSecretKey[0] as keyof typeof SIGNATURE_FLAG_TO_SCHEME];
return {
schema: signatureScheme,
secretKey: secretKey,
};
}
/**
* This returns a Bech32 encoded string starting with `suiprivkey`,
* encoding 33-byte `flag || bytes` for the given the 32-byte private
* key and its signature scheme.
*/
export function encodeSuiPrivateKey(bytes: Uint8Array, scheme: SignatureScheme): string {
if (bytes.length !== PRIVATE_KEY_SIZE) {
throw new Error('Invalid bytes length');
}
const flag = SIGNATURE_SCHEME_TO_FLAG[scheme];
const privKeyBytes = new Uint8Array(bytes.length + 1);
privKeyBytes.set([flag]);
privKeyBytes.set(bytes, 1);
return bech32.encode(SUI_PRIVATE_KEY_PREFIX, bech32.toWords(privKeyBytes));
}