@notabene/pii-sdk
Advanced tools
var $iyY9t$ethersprojectbytes = require("@ethersproject/bytes"); | ||
var $iyY9t$noblecurvesed25519 = require("@noble/curves/ed25519"); | ||
var $iyY9t$stablelibed25519 = require("@stablelib/ed25519"); | ||
var $iyY9t$transmutedidkeyed25519 = require("@transmute/did-key-ed25519"); | ||
var $iyY9t$base64url = require("base64url"); | ||
var $iyY9t$bs58 = require("bs58"); | ||
var $iyY9t$crypto = require("crypto"); | ||
var $iyY9t$didjwt = require("did-jwt"); | ||
@@ -56,3 +55,2 @@ var $iyY9t$multibase = require("multibase"); | ||
class $a9e8dc10b29de72d$export$7a95228d63ff9c73 extends Error { | ||
@@ -64,7 +62,2 @@ constructor(message){ | ||
} | ||
class $a9e8dc10b29de72d$export$965207dcc8e85742 extends $a9e8dc10b29de72d$export$7a95228d63ff9c73 { | ||
constructor(){ | ||
super("Failed to generate private keypair"); | ||
} | ||
} | ||
class $a9e8dc10b29de72d$export$6056393a42e6200 extends $a9e8dc10b29de72d$export$7a95228d63ff9c73 { | ||
@@ -92,5 +85,2 @@ constructor(){ | ||
function $cfd6274aae82b2e8$var$base58ToBytes(s) { | ||
return (0, ($parcel$interopDefault($iyY9t$bs58))).decode(s); | ||
} | ||
function $cfd6274aae82b2e8$var$decodeJoseBlob(blob) { | ||
@@ -105,7 +95,7 @@ return JSON.parse(Buffer.from((0, ($parcel$interopDefault($iyY9t$base64url))).decode(blob), "utf-8").toString()); | ||
async function $cfd6274aae82b2e8$var$computeRecipient(didkey) { | ||
const { didDocument: didDocument } = await $iyY9t$transmutedidkeyed25519.resolve(didkey); | ||
const pubk = didDocument.verificationMethod[0].publicKeyBase58; | ||
const publicKeyBytes = await $cfd6274aae82b2e8$var$base58ToBytes(pubk); | ||
const publicKeyHex = Buffer.from(await $cfd6274aae82b2e8$var$base58ToBytes(pubk)).toString("hex"); | ||
const kid = didDocument.id + "#" + $cfd6274aae82b2e8$var$convertPublicKeyToX25519Kid(publicKeyHex); | ||
// decode did:key public key | ||
didkey = didkey.split("#")[0]; // sanitize potential anchors | ||
const publicKeyBytes = (0, ($parcel$interopDefault($iyY9t$bs58))).decode(didkey.replace("did:key:z", "")).slice(2); | ||
const publicKeyHex = Buffer.from(publicKeyBytes).toString("hex"); | ||
const kid = didkey + "#" + $cfd6274aae82b2e8$var$convertPublicKeyToX25519Kid(publicKeyHex); | ||
return { | ||
@@ -119,9 +109,13 @@ kid: kid, | ||
async createKey() { | ||
const kp = await $iyY9t$transmutedidkeyed25519.Ed25519KeyPair.generate({ | ||
secureRandom: ()=>(0, ($parcel$interopDefault($iyY9t$crypto))).randomBytes(32) | ||
}); | ||
if (!kp.privateKey) throw new (0, $a9e8dc10b29de72d$export$965207dcc8e85742)(); | ||
const did = kp.controller; | ||
const publicKeyHex = Buffer.from(kp.publicKey).toString("hex"); | ||
const privateKeyHex = Buffer.from(kp.privateKey).toString("hex"); | ||
// We replaced "@transmute/did-key-ed25519" by "@noble/curves/ed25519", below is the did:key generation part | ||
const priv = (0, $iyY9t$noblecurvesed25519.ed25519).utils.randomPrivateKey(); | ||
const privateKeyHex = Buffer.from(priv).toString("hex"); | ||
const pub = (0, $iyY9t$noblecurvesed25519.ed25519).getPublicKey(priv); | ||
const publicKeyHex = Buffer.from(pub).toString("hex"); | ||
const buffer = new Uint8Array(2 + pub.length); | ||
buffer[0] = 237; // ED25519_MULTICODEC_IDENTIFIER; | ||
buffer[1] = 1; // VARIABLE_INTEGER_TRAILING_BYTE; | ||
buffer.set(pub, 2); | ||
const fingerprint = `z${(0, ($parcel$interopDefault($iyY9t$bs58))).encode(buffer)}`; | ||
const did = `did:key:${fingerprint}`; | ||
return { | ||
@@ -142,3 +136,3 @@ did: did, | ||
kms: "local", | ||
privateKeyHex: privateKeyHex | ||
privateKeyHex: privateKeyHex + publicKeyHex | ||
} | ||
@@ -145,0 +139,0 @@ ], |
@@ -11,3 +11,3 @@ { | ||
"license": "MIT", | ||
"version": "1.16.1", | ||
"version": "1.16.2", | ||
"packageManager": "yarn@3.2.2", | ||
@@ -87,4 +87,4 @@ "source": "./src/index.ts", | ||
"@ethersproject/bytes": "5.7.0", | ||
"@noble/curves": "^1.1.0", | ||
"@stablelib/ed25519": "1.0.3", | ||
"@transmute/did-key-ed25519": "0.3.0-unstable.10", | ||
"axios": "^0.27.2", | ||
@@ -91,0 +91,0 @@ "axios-oauth-client": "^1.5.0", |
34093
-0.35%484
-1.02%