ethers.js/lib.commonjs/wallet/wallet.js
2023-02-18 22:18:42 -05:00

148 lines
5.9 KiB
JavaScript

"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.Wallet = void 0;
const index_js_1 = require("../crypto/index.js");
const index_js_2 = require("../utils/index.js");
const base_wallet_js_1 = require("./base-wallet.js");
const hdwallet_js_1 = require("./hdwallet.js");
const json_crowdsale_js_1 = require("./json-crowdsale.js");
const json_keystore_js_1 = require("./json-keystore.js");
const mnemonic_js_1 = require("./mnemonic.js");
function stall(duration) {
return new Promise((resolve) => { setTimeout(() => { resolve(); }, duration); });
}
/**
* A **Wallet** manages a single private key which is used to sign
* transactions, messages and other common payloads.
*
* This class is generally the main entry point for developers
* that wish to use a private key directly, as it can create
* instances from a large variety of common sources, including
* raw private key, [[link-bip-39]] mnemonics and encrypte JSON
* wallets.
*/
class Wallet extends base_wallet_js_1.BaseWallet {
/**
* Create a new wallet for the %%privateKey%%, optionally connected
* to %%provider%%.
*/
constructor(key, provider) {
if (typeof (key) === "string" && !key.startsWith("0x")) {
key = "0x" + key;
}
let signingKey = (typeof (key) === "string") ? new index_js_1.SigningKey(key) : key;
super(signingKey, provider);
}
connect(provider) {
return new Wallet(this.signingKey, provider);
}
/**
* Resolves to a [JSON Keystore Wallet](json-wallets) encrypted with
* %%password%%.
*
* If %%progressCallback%% is specified, it will receive periodic
* updates as the encryption process progreses.
*/
async encrypt(password, progressCallback) {
const account = { address: this.address, privateKey: this.privateKey };
return await (0, json_keystore_js_1.encryptKeystoreJson)(account, password, { progressCallback });
}
/**
* Returns a [JSON Keystore Wallet](json-wallets) encryped with
* %%password%%.
*
* It is preferred to use the [async version](encrypt) instead,
* which allows a [[ProgressCallback]] to keep the user informed.
*
* This method will block the event loop (freezing all UI) until
* it is complete, which may be a non-trivial duration.
*/
encryptSync(password) {
const account = { address: this.address, privateKey: this.privateKey };
return (0, json_keystore_js_1.encryptKeystoreJsonSync)(account, password);
}
static #fromAccount(account) {
(0, index_js_2.assertArgument)(account, "invalid JSON wallet", "json", "[ REDACTED ]");
if ("mnemonic" in account && account.mnemonic && account.mnemonic.locale === "en") {
const mnemonic = mnemonic_js_1.Mnemonic.fromEntropy(account.mnemonic.entropy);
const wallet = hdwallet_js_1.HDNodeWallet.fromMnemonic(mnemonic, account.mnemonic.path);
if (wallet.address === account.address && wallet.privateKey === account.privateKey) {
return wallet;
}
console.log("WARNING: JSON mismatch address/privateKey != mnemonic; fallback onto private key");
}
const wallet = new Wallet(account.privateKey);
(0, index_js_2.assertArgument)(wallet.address === account.address, "address/privateKey mismatch", "json", "[ REDACTED ]");
return wallet;
}
/**
* Creates (asynchronously) a **Wallet** by decrypting the %%json%%
* with %%password%%.
*
* If %%progress%% is provided, it is called periodically during
* decryption so that any UI can be updated.
*/
static async fromEncryptedJson(json, password, progress) {
let account = null;
if ((0, json_keystore_js_1.isKeystoreJson)(json)) {
account = await (0, json_keystore_js_1.decryptKeystoreJson)(json, password, progress);
}
else if ((0, json_crowdsale_js_1.isCrowdsaleJson)(json)) {
if (progress) {
progress(0);
await stall(0);
}
account = (0, json_crowdsale_js_1.decryptCrowdsaleJson)(json, password);
if (progress) {
progress(1);
await stall(0);
}
}
return Wallet.#fromAccount(account);
}
/**
* Creates a **Wallet** by decrypting the %%json%% with %%password%%.
*
* The [[fromEncryptedJson]] method is preferred, as this method
* will lock up and freeze the UI during decryption, which may take
* some time.
*/
static fromEncryptedJsonSync(json, password) {
let account = null;
if ((0, json_keystore_js_1.isKeystoreJson)(json)) {
account = (0, json_keystore_js_1.decryptKeystoreJsonSync)(json, password);
}
else if ((0, json_crowdsale_js_1.isCrowdsaleJson)(json)) {
account = (0, json_crowdsale_js_1.decryptCrowdsaleJson)(json, password);
}
else {
(0, index_js_2.assertArgument)(false, "invalid JSON wallet", "json", "[ REDACTED ]");
}
return Wallet.#fromAccount(account);
}
/**
* Creates a new random [[HDNodeWallet]] using the avavilable
* [cryptographic random source](randomBytes).
*
* If there is no crytographic random source, this will throw.
*/
static createRandom(provider) {
const wallet = hdwallet_js_1.HDNodeWallet.createRandom();
if (provider) {
return wallet.connect(provider);
}
return wallet;
}
/**
* Creates a [[HDNodeWallet]] for %%phrase%%.
*/
static fromPhrase(phrase, provider) {
const wallet = hdwallet_js_1.HDNodeWallet.fromPhrase(phrase);
if (provider) {
return wallet.connect(provider);
}
return wallet;
}
}
exports.Wallet = Wallet;
//# sourceMappingURL=wallet.js.map