UNPKG

binance

Version:

Professional Node.js & JavaScript SDK for Binance REST APIs & WebSockets, with TypeScript & end-to-end tests.

93 lines 4.37 kB
"use strict"; var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } return new (P || (P = Promise))(function (resolve, reject) { function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } step((generator = generator.apply(thisArg, _arguments || [])).next()); }); }; Object.defineProperty(exports, "__esModule", { value: true }); exports.getSignKeyType = getSignKeyType; exports.signMessage = signMessage; /* eslint-disable @typescript-eslint/no-unused-vars */ const typeGuards_1 = require("./typeGuards"); function bufferToB64(buffer) { let binary = ''; const bytes = new Uint8Array(buffer); const len = bytes.byteLength; for (let i = 0; i < len; i++) { binary += String.fromCharCode(bytes[i]); } return globalThis.btoa(binary); } function getSignKeyType(secret) { if (secret.includes('PRIVATE KEY')) { // Sometimes, not always, RSA keys include "RSA" in the header. That's a definite RSA key. if (secret.includes('RSA PRIVATE KEY')) { return 'RSASSA-PKCS1-v1_5'; } // RSA keys are significantly longer than Ed25519 keys. 150 accounts for length of header & footer if (secret.length <= 150) { return 'Ed25519'; } return 'RSASSA-PKCS1-v1_5'; } return 'HMAC'; } function importKey(pem, type, algorithm, encoder) { return __awaiter(this, void 0, void 0, function* () { switch (type) { case 'Ed25519': case 'RSASSA-PKCS1-v1_5': { // const prefixRSA = /-----BEGIN RSA PRIVATE KEY-----/; // const prefixEd25519 = /-----BEGIN PRIVATE KEY-----/; // const suffixRSA = /-----END RSA PRIVATE KEY-----/; // const suffixEd25519 = /-----END PRIVATE KEY-----/; // const base64Key = pem // .replace(prefixEd25519, '') // .replace(prefixRSA, '') // .replace(suffixEd25519, '') // .replace(suffixRSA, '') // .replace(/\s+/g, ''); // Remove spaces and newlines const base64Key = pem.replace(/(?:-----BEGIN RSA PRIVATE KEY-----|-----BEGIN PRIVATE KEY-----|-----END RSA PRIVATE KEY-----|-----END PRIVATE KEY-----|\s+)/g, ''); const binaryKey = Uint8Array.from(atob(base64Key), (c) => c.charCodeAt(0)); return crypto.subtle.importKey('pkcs8', binaryKey.buffer, { name: type, hash: { name: algorithm } }, false, ['sign']); } case 'HMAC': { return globalThis.crypto.subtle.importKey('raw', encoder.encode(pem), { name: type, hash: algorithm }, false, ['sign']); } default: { throw (0, typeGuards_1.neverGuard)(type, `Unhandled key type: "${type}"`); } } }); } /** * Sign a message, with a secret, using the Web Crypto API * * Ed25519 is stable as of v23.5.0, but also not available in all browsers */ function signMessage(message_1, secret_1, method_1, algorithm_1) { return __awaiter(this, arguments, void 0, function* (message, secret, method, algorithm, pemEncodeMethod = method) { const encoder = new TextEncoder(); const signKeyType = getSignKeyType(secret); const key = yield importKey(secret, signKeyType, algorithm, encoder); const buffer = yield globalThis.crypto.subtle.sign({ name: signKeyType }, key, encoder.encode(message)); switch (method) { case 'hex': { return Array.from(new Uint8Array(buffer)) .map((byte) => byte.toString(16).padStart(2, '0')) .join(''); } case 'base64': { return bufferToB64(buffer); } default: { throw (0, typeGuards_1.neverGuard)(method, `Unhandled sign method: "${method}"`); } } }); } //# sourceMappingURL=webCryptoAPI.js.map