Updated dist files.

This commit is contained in:
Richard Moore 2020-02-27 19:58:05 +00:00
parent 6809c370c0
commit 7d34f73769
No known key found for this signature in database
GPG Key ID: 665176BE8E9DC651
51 changed files with 666 additions and 563 deletions

@ -3,6 +3,18 @@ Changelog
This change log is managed by `scripts/cmds/update-versions` but may be manually updated.
ethers/v5.0.0-beta.175 (2020-02-27 19:53)
-----------------------------------------
- Fix address-less filter listening in Provider. ([#741](https://github.com/ethers-io/ethers.js/issues/741); [64dccb2](https://github.com/ethers-io/ethers.js/commit/64dccb275c68ebb40328350d4ab5be0f29b8a02e))
- Added sync version of wallet decryption. ([0ad94cd](https://github.com/ethers-io/ethers.js/commit/0ad94cdf8137259bedb38c0dc949b61570bcdac0), [6809c37](https://github.com/ethers-io/ethers.js/commit/6809c370c027aea148466c00d3ce09c6d0ee6ddc))
ethers/v5.0.0-beta.175 (2020-02-27 19:38)
-----------------------------------------
- Fix address-less filter listening in Provider. ([#741](https://github.com/ethers-io/ethers.js/issues/741); [64dccb2](https://github.com/ethers-io/ethers.js/commit/64dccb275c68ebb40328350d4ab5be0f29b8a02e))
- Added sync version of wallet decryption. ([0ad94cd](https://github.com/ethers-io/ethers.js/commit/0ad94cdf8137259bedb38c0dc949b61570bcdac0))
ethers/v5.0.0-beta.174 (2020-02-25 14:57)
-----------------------------------------

@ -1 +1 @@
export declare const version = "asm/5.0.0-beta.150";
export declare const version = "asm/5.0.0-beta.151";

@ -1 +1 @@
export const version = "asm/5.0.0-beta.150";
export const version = "asm/5.0.0-beta.151";

@ -1 +1 @@
export declare const version = "asm/5.0.0-beta.150";
export declare const version = "asm/5.0.0-beta.151";

@ -1,3 +1,3 @@
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.version = "asm/5.0.0-beta.150";
exports.version = "asm/5.0.0-beta.151";

@ -29,7 +29,7 @@
"generate": "node ./generate.js",
"test": "echo \"Error: no test specified\" && exit 1"
},
"tarballHash": "0xcb545068ae8f11aa8ae48f849b1136553c08eebbaba814fa23ac29f6f8011e89",
"tarballHash": "0x365816acb3e61390e82f1aff465687c0216af2855d08ba1d46cbf147b1493b9b",
"types": "./lib/index.d.ts",
"version": "5.0.0-beta.150"
"version": "5.0.0-beta.151"
}

@ -1 +1 @@
export const version = "asm/5.0.0-beta.150";
export const version = "asm/5.0.0-beta.151";

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

@ -13958,7 +13958,7 @@ var aesJs = createCommonjsModule(function (module, exports) {
})(commonjsGlobal);
});
const version$f = "json-wallets/5.0.0-beta.136";
const version$f = "json-wallets/5.0.0-beta.137";
"use strict";
function looseArrayify(hexString) {
@ -14580,6 +14580,12 @@ var scrypt = createCommonjsModule(function (module, exports) {
});
var scrypt_1 = scrypt.scrypt;
var scrypt$1 = /*#__PURE__*/Object.freeze({
'default': scrypt,
__moduleExports: scrypt,
scrypt: scrypt_1
});
var rng;
if (commonjsGlobal.crypto && crypto.getRandomValues) {
@ -14814,11 +14820,7 @@ class KeystoreAccount extends Description {
return !!(value && value._isKeystoreAccount);
}
}
function decrypt$1(json, password, progressCallback) {
return __awaiter$1(this, void 0, void 0, function* () {
const data = JSON.parse(json);
const passwordBytes = getPassword(password);
const decrypt = function (key, ciphertext) {
function _decrypt(data, key, ciphertext) {
const cipher = searchPath(data, "crypto/cipher");
if (cipher === "aes-128-ctr") {
const iv = looseArrayify(searchPath(data, "crypto/cipherparams/iv"));
@ -14827,24 +14829,20 @@ function decrypt$1(json, password, progressCallback) {
return arrayify(aesCtr.decrypt(ciphertext));
}
return null;
};
const computeMAC = function (derivedHalf, ciphertext) {
return keccak256(concat([derivedHalf, ciphertext]));
};
const getAccount = function (key) {
return __awaiter$1(this, void 0, void 0, function* () {
}
function _getAccount(data, key) {
const ciphertext = looseArrayify(searchPath(data, "crypto/ciphertext"));
const computedMAC = hexlify(computeMAC(key.slice(16, 32), ciphertext)).substring(2);
const computedMAC = hexlify(keccak256(concat([key.slice(16, 32), ciphertext]))).substring(2);
if (computedMAC !== searchPath(data, "crypto/mac").toLowerCase()) {
throw new Error("invalid password");
}
const privateKey = decrypt(key.slice(0, 16), ciphertext);
const mnemonicKey = key.slice(32, 64);
const privateKey = _decrypt(data, key.slice(0, 16), ciphertext);
if (!privateKey) {
logger$j.throwError("unsupported cipher", Logger.errors.UNSUPPORTED_OPERATION, {
operation: "decrypt"
});
}
const mnemonicKey = key.slice(32, 64);
const address = computeAddress(privateKey);
if (data.address) {
let check = data.address.toLowerCase();
@ -14887,8 +14885,15 @@ function decrypt$1(json, password, progressCallback) {
}
}
return new KeystoreAccount(account);
});
};
}
function pbkdf2Sync(passwordBytes, salt, count, dkLen, prfFunc) {
return arrayify(browser_1$1(passwordBytes, salt, count, dkLen, prfFunc));
}
function pbkdf2(passwordBytes, salt, count, dkLen, prfFunc) {
return Promise.resolve(pbkdf2Sync(passwordBytes, salt, count, dkLen, prfFunc));
}
function _computeKdfKey(data, password, pbkdf2Func, scryptFunc, progressCallback) {
const passwordBytes = getPassword(password);
const kdf = searchPath(data, "crypto/kdf");
if (kdf && typeof (kdf) === "string") {
const throwError = function (name, value) {
@ -14911,9 +14916,7 @@ function decrypt$1(json, password, progressCallback) {
if (dkLen !== 32) {
throwError("dklen", dkLen);
}
const key = yield scrypt_1(passwordBytes, salt, N, r, p, 64, progressCallback);
//key = arrayify(key);
return getAccount(key);
return scryptFunc(passwordBytes, salt, N, r, p, 64, progressCallback);
}
else if (kdf.toLowerCase() === "pbkdf2") {
const salt = looseArrayify(searchPath(data, "crypto/kdfparams/salt"));
@ -14928,16 +14931,26 @@ function decrypt$1(json, password, progressCallback) {
else {
throwError("prf", prf);
}
const c = parseInt(searchPath(data, "crypto/kdfparams/c"));
const count = parseInt(searchPath(data, "crypto/kdfparams/c"));
const dkLen = parseInt(searchPath(data, "crypto/kdfparams/dklen"));
if (dkLen !== 32) {
throwError("dklen", dkLen);
}
const key = arrayify(browser_1$1(passwordBytes, salt, c, dkLen, prfFunc));
return getAccount(key);
return pbkdf2Func(passwordBytes, salt, count, dkLen, prfFunc);
}
}
return logger$j.throwArgumentError("unsupported key-derivation function", "kdf", kdf);
}
function decryptSync(json, password) {
const data = JSON.parse(json);
const key = _computeKdfKey(data, password, pbkdf2Sync, undefined);
return _getAccount(data, key);
}
function decrypt$1(json, password, progressCallback) {
return __awaiter$1(this, void 0, void 0, function* () {
const data = JSON.parse(json);
const key = yield _computeKdfKey(data, password, pbkdf2, scrypt_1, progressCallback);
return _getAccount(data, key);
});
}
function encrypt(account, password, options, progressCallback) {
@ -15107,8 +15120,17 @@ function decryptJsonWallet(json, password, progressCallback) {
}
return Promise.reject(new Error("invalid JSON wallet"));
}
function decryptJsonWalletSync(json, password) {
if (isCrowdsaleWallet(json)) {
return decrypt(json, password);
}
if (isKeystoreWallet(json)) {
return decryptSync(json, password);
}
throw new Error("invalid JSON wallet");
}
const version$g = "wallet/5.0.0-beta.137";
const version$g = "wallet/5.0.0-beta.138";
"use strict";
const logger$k = new Logger(version$g);
@ -15222,6 +15244,9 @@ class Wallet extends Signer {
return new Wallet(account);
});
}
static fromEncryptedJsonSync(json, password) {
return new Wallet(decryptJsonWalletSync(json, password));
}
static fromMnemonic(mnemonic, path, wordlist) {
if (!path) {
path = defaultPath;
@ -16248,7 +16273,7 @@ function poll(func, options) {
});
}
const version$j = "providers/5.0.0-beta.154";
const version$j = "providers/5.0.0-beta.155";
"use strict";
const logger$n = new Logger(version$j);
@ -16871,7 +16896,7 @@ class BaseProvider extends Provider {
toBlock: blockNumber,
topics: topics
};
if (!filter.address) {
if (!filter.address || filter.address === "*") {
delete filter.address;
}
const runner = this.getLogs(filter).then((logs) => {
@ -19345,7 +19370,7 @@ var utils$1 = /*#__PURE__*/Object.freeze({
Indexed: Indexed
});
const version$l = "ethers/5.0.0-beta.174";
const version$l = "ethers/5.0.0-beta.175";
"use strict";
const errors = Logger.errors;

File diff suppressed because one or more lines are too long

@ -15078,7 +15078,7 @@
var _version$y = createCommonjsModule(function (module, exports) {
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.version = "json-wallets/5.0.0-beta.136";
exports.version = "json-wallets/5.0.0-beta.137";
});
var _version$z = unwrapExports(_version$y);
@ -16077,15 +16077,7 @@
return KeystoreAccount;
}(lib$3.Description));
exports.KeystoreAccount = KeystoreAccount;
function decrypt(json, password, progressCallback) {
return __awaiter(this, void 0, void 0, function () {
var data, passwordBytes, decrypt, computeMAC, getAccount, kdf, throwError, salt, N, r, p, dkLen, key, salt, prfFunc, prf, c, dkLen, key;
return __generator(this, function (_a) {
switch (_a.label) {
case 0:
data = JSON.parse(json);
passwordBytes = utils$1.getPassword(password);
decrypt = function (key, ciphertext) {
function _decrypt(data, key, ciphertext) {
var cipher = utils$1.searchPath(data, "crypto/cipher");
if (cipher === "aes-128-ctr") {
var iv = utils$1.looseArrayify(utils$1.searchPath(data, "crypto/cipherparams/iv"));
@ -16094,29 +16086,23 @@
return lib$1.arrayify(aesCtr.decrypt(ciphertext));
}
return null;
};
computeMAC = function (derivedHalf, ciphertext) {
return lib$4.keccak256(lib$1.concat([derivedHalf, ciphertext]));
};
getAccount = function (key) {
return __awaiter(this, void 0, void 0, function () {
var ciphertext, computedMAC, privateKey, mnemonicKey, address, check, account, mnemonicCiphertext, mnemonicIv, mnemonicCounter, mnemonicAesCtr, path, locale, entropy, mnemonic, node;
return __generator(this, function (_a) {
ciphertext = utils$1.looseArrayify(utils$1.searchPath(data, "crypto/ciphertext"));
computedMAC = lib$1.hexlify(computeMAC(key.slice(16, 32), ciphertext)).substring(2);
}
function _getAccount(data, key) {
var ciphertext = utils$1.looseArrayify(utils$1.searchPath(data, "crypto/ciphertext"));
var computedMAC = lib$1.hexlify(lib$4.keccak256(lib$1.concat([key.slice(16, 32), ciphertext]))).substring(2);
if (computedMAC !== utils$1.searchPath(data, "crypto/mac").toLowerCase()) {
throw new Error("invalid password");
}
privateKey = decrypt(key.slice(0, 16), ciphertext);
mnemonicKey = key.slice(32, 64);
var privateKey = _decrypt(data, key.slice(0, 16), ciphertext);
if (!privateKey) {
logger.throwError("unsupported cipher", lib.Logger.errors.UNSUPPORTED_OPERATION, {
operation: "decrypt"
});
}
address = lib$g.computeAddress(privateKey);
var mnemonicKey = key.slice(32, 64);
var address = lib$g.computeAddress(privateKey);
if (data.address) {
check = data.address.toLowerCase();
var check = data.address.toLowerCase();
if (check.substring(0, 2) !== "0x") {
check = "0x" + check;
}
@ -16124,23 +16110,23 @@
throw new Error("address mismatch");
}
}
account = {
var account = {
_isKeystoreAccount: true,
address: address,
privateKey: lib$1.hexlify(privateKey)
};
// Version 0.1 x-ethers metadata must contain an encrypted mnemonic phrase
if (utils$1.searchPath(data, "x-ethers/version") === "0.1") {
mnemonicCiphertext = utils$1.looseArrayify(utils$1.searchPath(data, "x-ethers/mnemonicCiphertext"));
mnemonicIv = utils$1.looseArrayify(utils$1.searchPath(data, "x-ethers/mnemonicCounter"));
mnemonicCounter = new aes_js_1.default.Counter(mnemonicIv);
mnemonicAesCtr = new aes_js_1.default.ModeOfOperation.ctr(mnemonicKey, mnemonicCounter);
path = utils$1.searchPath(data, "x-ethers/path") || lib$h.defaultPath;
locale = utils$1.searchPath(data, "x-ethers/locale") || "en";
entropy = lib$1.arrayify(mnemonicAesCtr.decrypt(mnemonicCiphertext));
var mnemonicCiphertext = utils$1.looseArrayify(utils$1.searchPath(data, "x-ethers/mnemonicCiphertext"));
var mnemonicIv = utils$1.looseArrayify(utils$1.searchPath(data, "x-ethers/mnemonicCounter"));
var mnemonicCounter = new aes_js_1.default.Counter(mnemonicIv);
var mnemonicAesCtr = new aes_js_1.default.ModeOfOperation.ctr(mnemonicKey, mnemonicCounter);
var path = utils$1.searchPath(data, "x-ethers/path") || lib$h.defaultPath;
var locale = utils$1.searchPath(data, "x-ethers/locale") || "en";
var entropy = lib$1.arrayify(mnemonicAesCtr.decrypt(mnemonicCiphertext));
try {
mnemonic = lib$h.entropyToMnemonic(entropy, locale);
node = lib$h.HDNode.fromMnemonic(mnemonic, null, locale).derivePath(path);
var mnemonic = lib$h.entropyToMnemonic(entropy, locale);
var node = lib$h.HDNode.fromMnemonic(mnemonic, null, locale).derivePath(path);
if (node.privateKey != account.privateKey) {
throw new Error("mnemonic mismatch");
}
@ -16155,20 +16141,26 @@
}
}
}
return [2 /*return*/, new KeystoreAccount(account)];
});
});
};
kdf = utils$1.searchPath(data, "crypto/kdf");
if (!(kdf && typeof (kdf) === "string")) return [3 /*break*/, 3];
throwError = function (name, value) {
return new KeystoreAccount(account);
}
function pbkdf2Sync(passwordBytes, salt, count, dkLen, prfFunc) {
return lib$1.arrayify(browser$2.pbkdf2(passwordBytes, salt, count, dkLen, prfFunc));
}
function pbkdf2(passwordBytes, salt, count, dkLen, prfFunc) {
return Promise.resolve(pbkdf2Sync(passwordBytes, salt, count, dkLen, prfFunc));
}
function _computeKdfKey(data, password, pbkdf2Func, scryptFunc, progressCallback) {
var passwordBytes = utils$1.getPassword(password);
var kdf = utils$1.searchPath(data, "crypto/kdf");
if (kdf && typeof (kdf) === "string") {
var throwError = function (name, value) {
return logger.throwArgumentError("invalid key-derivation function parameters", name, value);
};
if (!(kdf.toLowerCase() === "scrypt")) return [3 /*break*/, 2];
salt = utils$1.looseArrayify(utils$1.searchPath(data, "crypto/kdfparams/salt"));
N = parseInt(utils$1.searchPath(data, "crypto/kdfparams/n"));
r = parseInt(utils$1.searchPath(data, "crypto/kdfparams/r"));
p = parseInt(utils$1.searchPath(data, "crypto/kdfparams/p"));
if (kdf.toLowerCase() === "scrypt") {
var salt = utils$1.looseArrayify(utils$1.searchPath(data, "crypto/kdfparams/salt"));
var N = parseInt(utils$1.searchPath(data, "crypto/kdfparams/n"));
var r = parseInt(utils$1.searchPath(data, "crypto/kdfparams/r"));
var p = parseInt(utils$1.searchPath(data, "crypto/kdfparams/p"));
// Check for all required parameters
if (!N || !r || !p) {
throwError("kdf", kdf);
@ -16177,20 +16169,16 @@
if ((N & (N - 1)) !== 0) {
throwError("N", N);
}
dkLen = parseInt(utils$1.searchPath(data, "crypto/kdfparams/dklen"));
var dkLen = parseInt(utils$1.searchPath(data, "crypto/kdfparams/dklen"));
if (dkLen !== 32) {
throwError("dklen", dkLen);
}
return [4 /*yield*/, scrypt$1.scrypt(passwordBytes, salt, N, r, p, 64, progressCallback)];
case 1:
key = _a.sent();
//key = arrayify(key);
return [2 /*return*/, getAccount(key)];
case 2:
if (kdf.toLowerCase() === "pbkdf2") {
salt = utils$1.looseArrayify(utils$1.searchPath(data, "crypto/kdfparams/salt"));
prfFunc = null;
prf = utils$1.searchPath(data, "crypto/kdfparams/prf");
return scryptFunc(passwordBytes, salt, N, r, p, 64, progressCallback);
}
else if (kdf.toLowerCase() === "pbkdf2") {
var salt = utils$1.looseArrayify(utils$1.searchPath(data, "crypto/kdfparams/salt"));
var prfFunc = null;
var prf = utils$1.searchPath(data, "crypto/kdfparams/prf");
if (prf === "hmac-sha256") {
prfFunc = "sha256";
}
@ -16200,16 +16188,33 @@
else {
throwError("prf", prf);
}
c = parseInt(utils$1.searchPath(data, "crypto/kdfparams/c"));
dkLen = parseInt(utils$1.searchPath(data, "crypto/kdfparams/dklen"));
var count = parseInt(utils$1.searchPath(data, "crypto/kdfparams/c"));
var dkLen = parseInt(utils$1.searchPath(data, "crypto/kdfparams/dklen"));
if (dkLen !== 32) {
throwError("dklen", dkLen);
}
key = lib$1.arrayify(browser$2.pbkdf2(passwordBytes, salt, c, dkLen, prfFunc));
return [2 /*return*/, getAccount(key)];
return pbkdf2Func(passwordBytes, salt, count, dkLen, prfFunc);
}
_a.label = 3;
case 3: return [2 /*return*/, logger.throwArgumentError("unsupported key-derivation function", "kdf", kdf)];
}
return logger.throwArgumentError("unsupported key-derivation function", "kdf", kdf);
}
function decryptSync(json, password) {
var data = JSON.parse(json);
var key = _computeKdfKey(data, password, pbkdf2Sync, scrypt$1.syncScrypt);
return _getAccount(data, key);
}
exports.decryptSync = decryptSync;
function decrypt(json, password, progressCallback) {
return __awaiter(this, void 0, void 0, function () {
var data, key;
return __generator(this, function (_a) {
switch (_a.label) {
case 0:
data = JSON.parse(json);
return [4 /*yield*/, _computeKdfKey(data, password, pbkdf2, scrypt$1.scrypt, progressCallback)];
case 1:
key = _a.sent();
return [2 /*return*/, _getAccount(data, key)];
}
});
});
@ -16369,8 +16374,9 @@
var keystore$1 = unwrapExports(keystore);
var keystore_1 = keystore.KeystoreAccount;
var keystore_2 = keystore.decrypt;
var keystore_3 = keystore.encrypt;
var keystore_2 = keystore.decryptSync;
var keystore_3 = keystore.decrypt;
var keystore_4 = keystore.encrypt;
var lib$i = createCommonjsModule(function (module, exports) {
"use strict";
@ -16383,6 +16389,7 @@
exports.isKeystoreWallet = inspect.isKeystoreWallet;
exports.decryptKeystore = keystore.decrypt;
exports.decryptKeystoreSync = keystore.decryptSync;
exports.encryptKeystore = keystore.encrypt;
function decryptJsonWallet(json, password, progressCallback) {
if (inspect.isCrowdsaleWallet(json)) {
@ -16401,6 +16408,16 @@
return Promise.reject(new Error("invalid JSON wallet"));
}
exports.decryptJsonWallet = decryptJsonWallet;
function decryptJsonWalletSync(json, password) {
if (inspect.isCrowdsaleWallet(json)) {
return crowdsale.decrypt(json, password);
}
if (inspect.isKeystoreWallet(json)) {
return keystore.decryptSync(json, password);
}
throw new Error("invalid JSON wallet");
}
exports.decryptJsonWalletSync = decryptJsonWalletSync;
});
var index$i = unwrapExports(lib$i);
@ -16409,13 +16426,15 @@
var lib_3$d = lib$i.isCrowdsaleWallet;
var lib_4$b = lib$i.isKeystoreWallet;
var lib_5$a = lib$i.decryptKeystore;
var lib_6$6 = lib$i.encryptKeystore;
var lib_7$5 = lib$i.decryptJsonWallet;
var lib_6$6 = lib$i.decryptKeystoreSync;
var lib_7$5 = lib$i.encryptKeystore;
var lib_8$4 = lib$i.decryptJsonWallet;
var lib_9$4 = lib$i.decryptJsonWalletSync;
var _version$A = createCommonjsModule(function (module, exports) {
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.version = "wallet/5.0.0-beta.137";
exports.version = "wallet/5.0.0-beta.138";
});
var _version$B = unwrapExports(_version$A);
@ -16579,6 +16598,9 @@
return new Wallet(account);
});
};
Wallet.fromEncryptedJsonSync = function (json, password) {
return new Wallet(lib$i.decryptJsonWalletSync(json, password));
};
Wallet.fromMnemonic = function (mnemonic, path, wordlist) {
if (!path) {
path = lib$h.defaultPath;
@ -17697,7 +17719,7 @@
var _version$G = createCommonjsModule(function (module, exports) {
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.version = "providers/5.0.0-beta.154";
exports.version = "providers/5.0.0-beta.155";
});
var _version$H = unwrapExports(_version$G);
@ -18419,7 +18441,7 @@
toBlock: blockNumber,
topics: topics
};
if (!filter_1.address) {
if (!filter_1.address || filter_1.address === "*") {
delete filter_1.address;
}
var runner = _this.getLogs(filter_1).then(function (logs) {
@ -21449,8 +21471,8 @@
var lib_5$b = lib$m.CloudflareProvider;
var lib_6$7 = lib$m.EtherscanProvider;
var lib_7$6 = lib$m.FallbackProvider;
var lib_8$4 = lib$m.IpcProvider;
var lib_9$4 = lib$m.InfuraProvider;
var lib_8$5 = lib$m.IpcProvider;
var lib_9$5 = lib$m.InfuraProvider;
var lib_10$3 = lib$m.JsonRpcProvider;
var lib_11$2 = lib$m.JsonRpcSigner;
var lib_12$2 = lib$m.NodesmithProvider;
@ -21862,7 +21884,7 @@
var _version$K = createCommonjsModule(function (module, exports) {
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.version = "ethers/5.0.0-beta.174";
exports.version = "ethers/5.0.0-beta.175";
});
var _version$L = unwrapExports(_version$K);
@ -21979,8 +22001,8 @@
var lib_5$d = lib$p.getDefaultProvider;
var lib_6$8 = lib$p.providers;
var lib_7$7 = lib$p.Contract;
var lib_8$5 = lib$p.ContractFactory;
var lib_9$5 = lib$p.BigNumber;
var lib_8$6 = lib$p.ContractFactory;
var lib_9$6 = lib$p.BigNumber;
var lib_10$4 = lib$p.FixedNumber;
var lib_11$3 = lib$p.constants;
var lib_12$3 = lib$p.errors;
@ -21990,9 +22012,9 @@
var lib_16$1 = lib$p.version;
var lib_17 = lib$p.Wordlist;
exports.BigNumber = lib_9$5;
exports.BigNumber = lib_9$6;
exports.Contract = lib_7$7;
exports.ContractFactory = lib_8$5;
exports.ContractFactory = lib_8$6;
exports.FixedNumber = lib_10$4;
exports.Signer = lib_2$m;
exports.VoidSigner = lib_4$e;

File diff suppressed because one or more lines are too long

@ -1 +1 @@
export declare const version = "ethers/5.0.0-beta.174";
export declare const version = "ethers/5.0.0-beta.175";

@ -1 +1 @@
export const version = "ethers/5.0.0-beta.174";
export const version = "ethers/5.0.0-beta.175";

@ -1 +1 @@
export declare const version = "ethers/5.0.0-beta.174";
export declare const version = "ethers/5.0.0-beta.175";

@ -1,3 +1,3 @@
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.version = "ethers/5.0.0-beta.174";
exports.version = "ethers/5.0.0-beta.175";

@ -52,7 +52,7 @@
"scripts": {
"test": "echo \"Error: no test specified\" && exit 1"
},
"tarballHash": "0x89962a1d50d4b8c82d9b9a90583f82f8c516d773ba897257ce30a9b849d035e0",
"tarballHash": "0x7ba56ea10adf6d45f1d98a1a6fb8c5b3b30410d264d4532cad263d1132baceb3",
"types": "./lib/index.d.ts",
"version": "5.0.0-beta.174"
"version": "5.0.0-beta.175"
}

@ -1 +1 @@
export const version = "ethers/5.0.0-beta.174";
export const version = "ethers/5.0.0-beta.175";

@ -1 +1 @@
export declare const version = "json-wallets/5.0.0-beta.136";
export declare const version = "json-wallets/5.0.0-beta.137";

@ -1 +1 @@
export const version = "json-wallets/5.0.0-beta.136";
export const version = "json-wallets/5.0.0-beta.137";

@ -2,6 +2,7 @@ import { Bytes } from "@ethersproject/bytes";
import { ExternallyOwnedAccount } from "@ethersproject/abstract-signer";
import { decrypt as decryptCrowdsale } from "./crowdsale";
import { getJsonWalletAddress, isCrowdsaleWallet, isKeystoreWallet } from "./inspect";
import { decrypt as decryptKeystore, encrypt as encryptKeystore, EncryptOptions, ProgressCallback } from "./keystore";
import { decrypt as decryptKeystore, decryptSync as decryptKeystoreSync, encrypt as encryptKeystore, EncryptOptions, ProgressCallback } from "./keystore";
declare function decryptJsonWallet(json: string, password: Bytes | string, progressCallback?: ProgressCallback): Promise<ExternallyOwnedAccount>;
export { decryptCrowdsale, decryptKeystore, encryptKeystore, isCrowdsaleWallet, isKeystoreWallet, getJsonWalletAddress, decryptJsonWallet, ProgressCallback, EncryptOptions, };
declare function decryptJsonWalletSync(json: string, password: Bytes | string): ExternallyOwnedAccount;
export { decryptCrowdsale, decryptKeystore, decryptKeystoreSync, encryptKeystore, isCrowdsaleWallet, isKeystoreWallet, getJsonWalletAddress, decryptJsonWallet, decryptJsonWalletSync, ProgressCallback, EncryptOptions, };

@ -1,7 +1,7 @@
"use strict";
import { decrypt as decryptCrowdsale } from "./crowdsale";
import { getJsonWalletAddress, isCrowdsaleWallet, isKeystoreWallet } from "./inspect";
import { decrypt as decryptKeystore, encrypt as encryptKeystore } from "./keystore";
import { decrypt as decryptKeystore, decryptSync as decryptKeystoreSync, encrypt as encryptKeystore } from "./keystore";
function decryptJsonWallet(json, password, progressCallback) {
if (isCrowdsaleWallet(json)) {
if (progressCallback) {
@ -18,4 +18,13 @@ function decryptJsonWallet(json, password, progressCallback) {
}
return Promise.reject(new Error("invalid JSON wallet"));
}
export { decryptCrowdsale, decryptKeystore, encryptKeystore, isCrowdsaleWallet, isKeystoreWallet, getJsonWalletAddress, decryptJsonWallet, };
function decryptJsonWalletSync(json, password) {
if (isCrowdsaleWallet(json)) {
return decryptCrowdsale(json, password);
}
if (isKeystoreWallet(json)) {
return decryptKeystoreSync(json, password);
}
throw new Error("invalid JSON wallet");
}
export { decryptCrowdsale, decryptKeystore, decryptKeystoreSync, encryptKeystore, isCrowdsaleWallet, isKeystoreWallet, getJsonWalletAddress, decryptJsonWallet, decryptJsonWalletSync, };

@ -28,6 +28,7 @@ export declare type EncryptOptions = {
p?: number;
};
};
export declare function decryptSync(json: string, password: Bytes | string): KeystoreAccount;
export declare function decrypt(json: string, password: Bytes | string, progressCallback?: ProgressCallback): Promise<KeystoreAccount>;
export declare function encrypt(account: ExternallyOwnedAccount, password: Bytes | string, options?: EncryptOptions, progressCallback?: ProgressCallback): Promise<string>;
export {};

@ -15,7 +15,7 @@ import { getAddress } from "@ethersproject/address";
import { arrayify, concat, hexlify } from "@ethersproject/bytes";
import { defaultPath, entropyToMnemonic, HDNode, mnemonicToEntropy } from "@ethersproject/hdnode";
import { keccak256 } from "@ethersproject/keccak256";
import { pbkdf2 } from "@ethersproject/pbkdf2";
import { pbkdf2 as _pbkdf2 } from "@ethersproject/pbkdf2";
import { randomBytes } from "@ethersproject/random";
import { Description } from "@ethersproject/properties";
import { computeAddress } from "@ethersproject/transactions";
@ -32,11 +32,7 @@ export class KeystoreAccount extends Description {
return !!(value && value._isKeystoreAccount);
}
}
export function decrypt(json, password, progressCallback) {
return __awaiter(this, void 0, void 0, function* () {
const data = JSON.parse(json);
const passwordBytes = getPassword(password);
const decrypt = function (key, ciphertext) {
function _decrypt(data, key, ciphertext) {
const cipher = searchPath(data, "crypto/cipher");
if (cipher === "aes-128-ctr") {
const iv = looseArrayify(searchPath(data, "crypto/cipherparams/iv"));
@ -45,24 +41,20 @@ export function decrypt(json, password, progressCallback) {
return arrayify(aesCtr.decrypt(ciphertext));
}
return null;
};
const computeMAC = function (derivedHalf, ciphertext) {
return keccak256(concat([derivedHalf, ciphertext]));
};
const getAccount = function (key) {
return __awaiter(this, void 0, void 0, function* () {
}
function _getAccount(data, key) {
const ciphertext = looseArrayify(searchPath(data, "crypto/ciphertext"));
const computedMAC = hexlify(computeMAC(key.slice(16, 32), ciphertext)).substring(2);
const computedMAC = hexlify(keccak256(concat([key.slice(16, 32), ciphertext]))).substring(2);
if (computedMAC !== searchPath(data, "crypto/mac").toLowerCase()) {
throw new Error("invalid password");
}
const privateKey = decrypt(key.slice(0, 16), ciphertext);
const mnemonicKey = key.slice(32, 64);
const privateKey = _decrypt(data, key.slice(0, 16), ciphertext);
if (!privateKey) {
logger.throwError("unsupported cipher", Logger.errors.UNSUPPORTED_OPERATION, {
operation: "decrypt"
});
}
const mnemonicKey = key.slice(32, 64);
const address = computeAddress(privateKey);
if (data.address) {
let check = data.address.toLowerCase();
@ -105,8 +97,15 @@ export function decrypt(json, password, progressCallback) {
}
}
return new KeystoreAccount(account);
});
};
}
function pbkdf2Sync(passwordBytes, salt, count, dkLen, prfFunc) {
return arrayify(_pbkdf2(passwordBytes, salt, count, dkLen, prfFunc));
}
function pbkdf2(passwordBytes, salt, count, dkLen, prfFunc) {
return Promise.resolve(pbkdf2Sync(passwordBytes, salt, count, dkLen, prfFunc));
}
function _computeKdfKey(data, password, pbkdf2Func, scryptFunc, progressCallback) {
const passwordBytes = getPassword(password);
const kdf = searchPath(data, "crypto/kdf");
if (kdf && typeof (kdf) === "string") {
const throwError = function (name, value) {
@ -129,9 +128,7 @@ export function decrypt(json, password, progressCallback) {
if (dkLen !== 32) {
throwError("dklen", dkLen);
}
const key = yield scrypt.scrypt(passwordBytes, salt, N, r, p, 64, progressCallback);
//key = arrayify(key);
return getAccount(key);
return scryptFunc(passwordBytes, salt, N, r, p, 64, progressCallback);
}
else if (kdf.toLowerCase() === "pbkdf2") {
const salt = looseArrayify(searchPath(data, "crypto/kdfparams/salt"));
@ -146,16 +143,26 @@ export function decrypt(json, password, progressCallback) {
else {
throwError("prf", prf);
}
const c = parseInt(searchPath(data, "crypto/kdfparams/c"));
const count = parseInt(searchPath(data, "crypto/kdfparams/c"));
const dkLen = parseInt(searchPath(data, "crypto/kdfparams/dklen"));
if (dkLen !== 32) {
throwError("dklen", dkLen);
}
const key = arrayify(pbkdf2(passwordBytes, salt, c, dkLen, prfFunc));
return getAccount(key);
return pbkdf2Func(passwordBytes, salt, count, dkLen, prfFunc);
}
}
return logger.throwArgumentError("unsupported key-derivation function", "kdf", kdf);
}
export function decryptSync(json, password) {
const data = JSON.parse(json);
const key = _computeKdfKey(data, password, pbkdf2Sync, scrypt.syncScrypt);
return _getAccount(data, key);
}
export function decrypt(json, password, progressCallback) {
return __awaiter(this, void 0, void 0, function* () {
const data = JSON.parse(json);
const key = yield _computeKdfKey(data, password, pbkdf2, scrypt.scrypt, progressCallback);
return _getAccount(data, key);
});
}
export function encrypt(account, password, options, progressCallback) {

@ -1 +1 @@
export declare const version = "json-wallets/5.0.0-beta.136";
export declare const version = "json-wallets/5.0.0-beta.137";

@ -1,3 +1,3 @@
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.version = "json-wallets/5.0.0-beta.136";
exports.version = "json-wallets/5.0.0-beta.137";

@ -2,6 +2,7 @@ import { Bytes } from "@ethersproject/bytes";
import { ExternallyOwnedAccount } from "@ethersproject/abstract-signer";
import { decrypt as decryptCrowdsale } from "./crowdsale";
import { getJsonWalletAddress, isCrowdsaleWallet, isKeystoreWallet } from "./inspect";
import { decrypt as decryptKeystore, encrypt as encryptKeystore, EncryptOptions, ProgressCallback } from "./keystore";
import { decrypt as decryptKeystore, decryptSync as decryptKeystoreSync, encrypt as encryptKeystore, EncryptOptions, ProgressCallback } from "./keystore";
declare function decryptJsonWallet(json: string, password: Bytes | string, progressCallback?: ProgressCallback): Promise<ExternallyOwnedAccount>;
export { decryptCrowdsale, decryptKeystore, encryptKeystore, isCrowdsaleWallet, isKeystoreWallet, getJsonWalletAddress, decryptJsonWallet, ProgressCallback, EncryptOptions, };
declare function decryptJsonWalletSync(json: string, password: Bytes | string): ExternallyOwnedAccount;
export { decryptCrowdsale, decryptKeystore, decryptKeystoreSync, encryptKeystore, isCrowdsaleWallet, isKeystoreWallet, getJsonWalletAddress, decryptJsonWallet, decryptJsonWalletSync, ProgressCallback, EncryptOptions, };

@ -8,6 +8,7 @@ exports.isCrowdsaleWallet = inspect_1.isCrowdsaleWallet;
exports.isKeystoreWallet = inspect_1.isKeystoreWallet;
var keystore_1 = require("./keystore");
exports.decryptKeystore = keystore_1.decrypt;
exports.decryptKeystoreSync = keystore_1.decryptSync;
exports.encryptKeystore = keystore_1.encrypt;
function decryptJsonWallet(json, password, progressCallback) {
if (inspect_1.isCrowdsaleWallet(json)) {
@ -26,3 +27,13 @@ function decryptJsonWallet(json, password, progressCallback) {
return Promise.reject(new Error("invalid JSON wallet"));
}
exports.decryptJsonWallet = decryptJsonWallet;
function decryptJsonWalletSync(json, password) {
if (inspect_1.isCrowdsaleWallet(json)) {
return crowdsale_1.decrypt(json, password);
}
if (inspect_1.isKeystoreWallet(json)) {
return keystore_1.decryptSync(json, password);
}
throw new Error("invalid JSON wallet");
}
exports.decryptJsonWalletSync = decryptJsonWalletSync;

@ -28,6 +28,7 @@ export declare type EncryptOptions = {
p?: number;
};
};
export declare function decryptSync(json: string, password: Bytes | string): KeystoreAccount;
export declare function decrypt(json: string, password: Bytes | string, progressCallback?: ProgressCallback): Promise<KeystoreAccount>;
export declare function encrypt(account: ExternallyOwnedAccount, password: Bytes | string, options?: EncryptOptions, progressCallback?: ProgressCallback): Promise<string>;
export {};

@ -89,15 +89,7 @@ var KeystoreAccount = /** @class */ (function (_super) {
return KeystoreAccount;
}(properties_1.Description));
exports.KeystoreAccount = KeystoreAccount;
function decrypt(json, password, progressCallback) {
return __awaiter(this, void 0, void 0, function () {
var data, passwordBytes, decrypt, computeMAC, getAccount, kdf, throwError, salt, N, r, p, dkLen, key, salt, prfFunc, prf, c, dkLen, key;
return __generator(this, function (_a) {
switch (_a.label) {
case 0:
data = JSON.parse(json);
passwordBytes = utils_1.getPassword(password);
decrypt = function (key, ciphertext) {
function _decrypt(data, key, ciphertext) {
var cipher = utils_1.searchPath(data, "crypto/cipher");
if (cipher === "aes-128-ctr") {
var iv = utils_1.looseArrayify(utils_1.searchPath(data, "crypto/cipherparams/iv"));
@ -106,29 +98,23 @@ function decrypt(json, password, progressCallback) {
return bytes_1.arrayify(aesCtr.decrypt(ciphertext));
}
return null;
};
computeMAC = function (derivedHalf, ciphertext) {
return keccak256_1.keccak256(bytes_1.concat([derivedHalf, ciphertext]));
};
getAccount = function (key) {
return __awaiter(this, void 0, void 0, function () {
var ciphertext, computedMAC, privateKey, mnemonicKey, address, check, account, mnemonicCiphertext, mnemonicIv, mnemonicCounter, mnemonicAesCtr, path, locale, entropy, mnemonic, node;
return __generator(this, function (_a) {
ciphertext = utils_1.looseArrayify(utils_1.searchPath(data, "crypto/ciphertext"));
computedMAC = bytes_1.hexlify(computeMAC(key.slice(16, 32), ciphertext)).substring(2);
}
function _getAccount(data, key) {
var ciphertext = utils_1.looseArrayify(utils_1.searchPath(data, "crypto/ciphertext"));
var computedMAC = bytes_1.hexlify(keccak256_1.keccak256(bytes_1.concat([key.slice(16, 32), ciphertext]))).substring(2);
if (computedMAC !== utils_1.searchPath(data, "crypto/mac").toLowerCase()) {
throw new Error("invalid password");
}
privateKey = decrypt(key.slice(0, 16), ciphertext);
mnemonicKey = key.slice(32, 64);
var privateKey = _decrypt(data, key.slice(0, 16), ciphertext);
if (!privateKey) {
logger.throwError("unsupported cipher", logger_1.Logger.errors.UNSUPPORTED_OPERATION, {
operation: "decrypt"
});
}
address = transactions_1.computeAddress(privateKey);
var mnemonicKey = key.slice(32, 64);
var address = transactions_1.computeAddress(privateKey);
if (data.address) {
check = data.address.toLowerCase();
var check = data.address.toLowerCase();
if (check.substring(0, 2) !== "0x") {
check = "0x" + check;
}
@ -136,23 +122,23 @@ function decrypt(json, password, progressCallback) {
throw new Error("address mismatch");
}
}
account = {
var account = {
_isKeystoreAccount: true,
address: address,
privateKey: bytes_1.hexlify(privateKey)
};
// Version 0.1 x-ethers metadata must contain an encrypted mnemonic phrase
if (utils_1.searchPath(data, "x-ethers/version") === "0.1") {
mnemonicCiphertext = utils_1.looseArrayify(utils_1.searchPath(data, "x-ethers/mnemonicCiphertext"));
mnemonicIv = utils_1.looseArrayify(utils_1.searchPath(data, "x-ethers/mnemonicCounter"));
mnemonicCounter = new aes_js_1.default.Counter(mnemonicIv);
mnemonicAesCtr = new aes_js_1.default.ModeOfOperation.ctr(mnemonicKey, mnemonicCounter);
path = utils_1.searchPath(data, "x-ethers/path") || hdnode_1.defaultPath;
locale = utils_1.searchPath(data, "x-ethers/locale") || "en";
entropy = bytes_1.arrayify(mnemonicAesCtr.decrypt(mnemonicCiphertext));
var mnemonicCiphertext = utils_1.looseArrayify(utils_1.searchPath(data, "x-ethers/mnemonicCiphertext"));
var mnemonicIv = utils_1.looseArrayify(utils_1.searchPath(data, "x-ethers/mnemonicCounter"));
var mnemonicCounter = new aes_js_1.default.Counter(mnemonicIv);
var mnemonicAesCtr = new aes_js_1.default.ModeOfOperation.ctr(mnemonicKey, mnemonicCounter);
var path = utils_1.searchPath(data, "x-ethers/path") || hdnode_1.defaultPath;
var locale = utils_1.searchPath(data, "x-ethers/locale") || "en";
var entropy = bytes_1.arrayify(mnemonicAesCtr.decrypt(mnemonicCiphertext));
try {
mnemonic = hdnode_1.entropyToMnemonic(entropy, locale);
node = hdnode_1.HDNode.fromMnemonic(mnemonic, null, locale).derivePath(path);
var mnemonic = hdnode_1.entropyToMnemonic(entropy, locale);
var node = hdnode_1.HDNode.fromMnemonic(mnemonic, null, locale).derivePath(path);
if (node.privateKey != account.privateKey) {
throw new Error("mnemonic mismatch");
}
@ -167,20 +153,26 @@ function decrypt(json, password, progressCallback) {
}
}
}
return [2 /*return*/, new KeystoreAccount(account)];
});
});
};
kdf = utils_1.searchPath(data, "crypto/kdf");
if (!(kdf && typeof (kdf) === "string")) return [3 /*break*/, 3];
throwError = function (name, value) {
return new KeystoreAccount(account);
}
function pbkdf2Sync(passwordBytes, salt, count, dkLen, prfFunc) {
return bytes_1.arrayify(pbkdf2_1.pbkdf2(passwordBytes, salt, count, dkLen, prfFunc));
}
function pbkdf2(passwordBytes, salt, count, dkLen, prfFunc) {
return Promise.resolve(pbkdf2Sync(passwordBytes, salt, count, dkLen, prfFunc));
}
function _computeKdfKey(data, password, pbkdf2Func, scryptFunc, progressCallback) {
var passwordBytes = utils_1.getPassword(password);
var kdf = utils_1.searchPath(data, "crypto/kdf");
if (kdf && typeof (kdf) === "string") {
var throwError = function (name, value) {
return logger.throwArgumentError("invalid key-derivation function parameters", name, value);
};
if (!(kdf.toLowerCase() === "scrypt")) return [3 /*break*/, 2];
salt = utils_1.looseArrayify(utils_1.searchPath(data, "crypto/kdfparams/salt"));
N = parseInt(utils_1.searchPath(data, "crypto/kdfparams/n"));
r = parseInt(utils_1.searchPath(data, "crypto/kdfparams/r"));
p = parseInt(utils_1.searchPath(data, "crypto/kdfparams/p"));
if (kdf.toLowerCase() === "scrypt") {
var salt = utils_1.looseArrayify(utils_1.searchPath(data, "crypto/kdfparams/salt"));
var N = parseInt(utils_1.searchPath(data, "crypto/kdfparams/n"));
var r = parseInt(utils_1.searchPath(data, "crypto/kdfparams/r"));
var p = parseInt(utils_1.searchPath(data, "crypto/kdfparams/p"));
// Check for all required parameters
if (!N || !r || !p) {
throwError("kdf", kdf);
@ -189,20 +181,16 @@ function decrypt(json, password, progressCallback) {
if ((N & (N - 1)) !== 0) {
throwError("N", N);
}
dkLen = parseInt(utils_1.searchPath(data, "crypto/kdfparams/dklen"));
var dkLen = parseInt(utils_1.searchPath(data, "crypto/kdfparams/dklen"));
if (dkLen !== 32) {
throwError("dklen", dkLen);
}
return [4 /*yield*/, scrypt.scrypt(passwordBytes, salt, N, r, p, 64, progressCallback)];
case 1:
key = _a.sent();
//key = arrayify(key);
return [2 /*return*/, getAccount(key)];
case 2:
if (kdf.toLowerCase() === "pbkdf2") {
salt = utils_1.looseArrayify(utils_1.searchPath(data, "crypto/kdfparams/salt"));
prfFunc = null;
prf = utils_1.searchPath(data, "crypto/kdfparams/prf");
return scryptFunc(passwordBytes, salt, N, r, p, 64, progressCallback);
}
else if (kdf.toLowerCase() === "pbkdf2") {
var salt = utils_1.looseArrayify(utils_1.searchPath(data, "crypto/kdfparams/salt"));
var prfFunc = null;
var prf = utils_1.searchPath(data, "crypto/kdfparams/prf");
if (prf === "hmac-sha256") {
prfFunc = "sha256";
}
@ -212,16 +200,33 @@ function decrypt(json, password, progressCallback) {
else {
throwError("prf", prf);
}
c = parseInt(utils_1.searchPath(data, "crypto/kdfparams/c"));
dkLen = parseInt(utils_1.searchPath(data, "crypto/kdfparams/dklen"));
var count = parseInt(utils_1.searchPath(data, "crypto/kdfparams/c"));
var dkLen = parseInt(utils_1.searchPath(data, "crypto/kdfparams/dklen"));
if (dkLen !== 32) {
throwError("dklen", dkLen);
}
key = bytes_1.arrayify(pbkdf2_1.pbkdf2(passwordBytes, salt, c, dkLen, prfFunc));
return [2 /*return*/, getAccount(key)];
return pbkdf2Func(passwordBytes, salt, count, dkLen, prfFunc);
}
_a.label = 3;
case 3: return [2 /*return*/, logger.throwArgumentError("unsupported key-derivation function", "kdf", kdf)];
}
return logger.throwArgumentError("unsupported key-derivation function", "kdf", kdf);
}
function decryptSync(json, password) {
var data = JSON.parse(json);
var key = _computeKdfKey(data, password, pbkdf2Sync, scrypt.syncScrypt);
return _getAccount(data, key);
}
exports.decryptSync = decryptSync;
function decrypt(json, password, progressCallback) {
return __awaiter(this, void 0, void 0, function () {
var data, key;
return __generator(this, function (_a) {
switch (_a.label) {
case 0:
data = JSON.parse(json);
return [4 /*yield*/, _computeKdfKey(data, password, pbkdf2, scrypt.scrypt, progressCallback)];
case 1:
key = _a.sent();
return [2 /*return*/, _getAccount(data, key)];
}
});
});

@ -36,7 +36,7 @@
"scripts": {
"test": "echo \"Error: no test specified\" && exit 1"
},
"tarballHash": "0x8090a7e2dad9b2fb916389e0c7796d9bde973caf1eb55600b6d817449905cd54",
"tarballHash": "0x444f5beaea128ad7f3894689177e2b70875b2ddd08fcae32a0dd09d499f6bf81",
"types": "./lib/index.d.ts",
"version": "5.0.0-beta.136"
"version": "5.0.0-beta.137"
}

@ -1 +1 @@
export const version = "json-wallets/5.0.0-beta.136";
export const version = "json-wallets/5.0.0-beta.137";

@ -1 +1 @@
export declare const version = "providers/5.0.0-beta.154";
export declare const version = "providers/5.0.0-beta.155";

@ -1 +1 @@
export const version = "providers/5.0.0-beta.154";
export const version = "providers/5.0.0-beta.155";

@ -247,7 +247,7 @@ export class BaseProvider extends Provider {
toBlock: blockNumber,
topics: topics
};
if (!filter.address) {
if (!filter.address || filter.address === "*") {
delete filter.address;
}
const runner = this.getLogs(filter).then((logs) => {

@ -1 +1 @@
export declare const version = "providers/5.0.0-beta.154";
export declare const version = "providers/5.0.0-beta.155";

@ -1,3 +1,3 @@
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.version = "providers/5.0.0-beta.154";
exports.version = "providers/5.0.0-beta.155";

@ -311,7 +311,7 @@ var BaseProvider = /** @class */ (function (_super) {
toBlock: blockNumber,
topics: topics
};
if (!filter_1.address) {
if (!filter_1.address || filter_1.address === "*") {
delete filter_1.address;
}
var runner = _this.getLogs(filter_1).then(function (logs) {

@ -44,7 +44,7 @@
"scripts": {
"test": "echo \"Error: no test specified\" && exit 1"
},
"tarballHash": "0xde98df2ddcf9668138d796b06aa2266794a33fd3b41dd89c27e4cd31001d6f22",
"tarballHash": "0xc767c5ec2d6ff95465d7c3618d0acc436a5ca169469e63f2ca63d783da619895",
"types": "./lib/index.d.ts",
"version": "5.0.0-beta.154"
"version": "5.0.0-beta.155"
}

@ -1 +1 @@
export const version = "providers/5.0.0-beta.154";
export const version = "providers/5.0.0-beta.155";

@ -1 +1 @@
export declare const version = "wallet/5.0.0-beta.137";
export declare const version = "wallet/5.0.0-beta.138";

@ -1 +1 @@
export const version = "wallet/5.0.0-beta.137";
export const version = "wallet/5.0.0-beta.138";

@ -24,6 +24,7 @@ export declare class Wallet extends Signer implements ExternallyOwnedAccount {
*/
static createRandom(options?: any): Wallet;
static fromEncryptedJson(json: string, password: Bytes | string, progressCallback?: ProgressCallback): Promise<Wallet>;
static fromEncryptedJsonSync(json: string, password: Bytes | string): Wallet;
static fromMnemonic(mnemonic: string, path?: string, wordlist?: Wordlist): Wallet;
}
export declare function verifyMessage(message: Bytes | string, signature: SignatureLike): string;

@ -9,7 +9,7 @@ import { keccak256 } from "@ethersproject/keccak256";
import { defineReadOnly, resolveProperties } from "@ethersproject/properties";
import { randomBytes } from "@ethersproject/random";
import { SigningKey } from "@ethersproject/signing-key";
import { decryptJsonWallet, encryptKeystore } from "@ethersproject/json-wallets";
import { decryptJsonWallet, decryptJsonWalletSync, encryptKeystore } from "@ethersproject/json-wallets";
import { computeAddress, recoverAddress, serialize } from "@ethersproject/transactions";
import { Logger } from "@ethersproject/logger";
import { version } from "./_version";
@ -124,6 +124,9 @@ export class Wallet extends Signer {
return new Wallet(account);
});
}
static fromEncryptedJsonSync(json, password) {
return new Wallet(decryptJsonWalletSync(json, password));
}
static fromMnemonic(mnemonic, path, wordlist) {
if (!path) {
path = defaultPath;

@ -1 +1 @@
export declare const version = "wallet/5.0.0-beta.137";
export declare const version = "wallet/5.0.0-beta.138";

@ -1,3 +1,3 @@
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.version = "wallet/5.0.0-beta.137";
exports.version = "wallet/5.0.0-beta.138";

@ -24,6 +24,7 @@ export declare class Wallet extends Signer implements ExternallyOwnedAccount {
*/
static createRandom(options?: any): Wallet;
static fromEncryptedJson(json: string, password: Bytes | string, progressCallback?: ProgressCallback): Promise<Wallet>;
static fromEncryptedJsonSync(json: string, password: Bytes | string): Wallet;
static fromMnemonic(mnemonic: string, path?: string, wordlist?: Wordlist): Wallet;
}
export declare function verifyMessage(message: Bytes | string, signature: SignatureLike): string;

@ -155,6 +155,9 @@ var Wallet = /** @class */ (function (_super) {
return new Wallet(account);
});
};
Wallet.fromEncryptedJsonSync = function (json, password) {
return new Wallet(json_wallets_1.decryptJsonWalletSync(json, password));
};
Wallet.fromMnemonic = function (mnemonic, path, wordlist) {
if (!path) {
path = hdnode_1.defaultPath;

@ -37,7 +37,7 @@
"scripts": {
"test": "echo \"Error: no test specified\" && exit 1"
},
"tarballHash": "0xa098db4b7fc243e61ce11b86b973f97c3663315cfeabc820a4eda8d6b80dd6d8",
"tarballHash": "0x6c595b55e197ee5284306c696556b3e1af92fe0482eeee654276add82025b5c6",
"types": "./lib/index.d.ts",
"version": "5.0.0-beta.137"
"version": "5.0.0-beta.138"
}

@ -1 +1 @@
export const version = "wallet/5.0.0-beta.137";
export const version = "wallet/5.0.0-beta.138";