Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Add Multichain API to @metamask/multichain #4813

Open
wants to merge 176 commits into
base: main
Choose a base branch
from

Conversation

jiexi
Copy link
Contributor

@jiexi jiexi commented Oct 17, 2024

Explanation

This PR updates @metamask/multichain to add method handlers and middleware specific to the new Multichain API and which can be shared across the extension & mobile clients. The package includes implementations for managing multichain sessions, handling multichain RPC methods, and integrating multichain functionalities into the MetaMask extension. Key features of this package include:

  • Method Handlers: Implementations of the new RPC method handlers like wallet_createSession, wallet_invokeMethod, wallet_revokeSession, and wallet_getSession.
  • ScopesObject Transforms: Adds helpers that transform between NormalizedScopesObject and InternalScopesObject
  • Concurrent Eth Subscriptions: Adds helpers that orchestrate eth_subscriptions to numerous chains concurrently

These tools and utilities will be used in both clients (mobile + extension)'s multichain API implementations.

File Overview

  • packages/multichain/src/adapters/caip-permission-adapter-middleware.ts: Middleware for the EIP-1193 API that enforces a CAIP-25 permission for each request if that CAIP-25 permission was granted via wallet_createSession
  • packages/multichain/src/handlers/wallet-getSession.ts: Handlers for CAIP Multichain lifecycle methods except for wallet_createSession which seemed a little too platform specific to belong in a shared package currently
  • packages/multichain/src/middlewares/: Middleware for the Multichain API that helps facilitate concurrent eth subscriptions and for using @metamask/api-specs for method param validation for new CAIP Multichain methods
  • packages/multichain/src/scope/authorization.ts: Adds helpers that sort scopes based on if they are currently supported by the wallet (i.e. a network already exists the eip155 scope), if they could be supported by the wallet (i.e. the network does not already exist for the eip155 scope, but the dapp has provided EIP-3085 details for adding the network in the scopedProperties property of the wallet_createSession request), or if they cannot be served.
  • packages/multichain/src/scope/filter.ts: provides helpers used for the bucketing above in authorization.ts
  • types/@metamask/eth-json-rpc-filters.d.ts: Typedef for missing types in @metamask/eth-json-rpc-filters/subscriptionManager

References

Upstream: #4784
Downstream: None. This is the end.

Key Multichain API Standards implemented here:

Open PR that uses this new package for exposing the multichain API in the extension: MetaMask/metamask-extension#27782

Changelog

@metamask/multichain

  • ADDED: Adds getInternalScopesObject and getSessionScopes helpers for transforming between NormalizedScopesObject and InternalScopesObject.
  • ADDED: Adds caipPermissionAdapterMiddleware for enforcing CAIP-25 permission on the EIP-1193 API.
  • ADDED: Adds walletGetSession, walletInvokeMethod, and walletRevokeSession handlers.
  • ADDED: Adds multichainMethodCallValidatorMiddleware for validating Multichain API method params as defined in @metamask/api-specs.
  • ADDED: Adds MultichainMiddlewareManager to multiplex a request to other middleware based on requested scope.
  • ADDED: Adds MultichainSubscriptionManager to handle concurrent subscriptions across multiple scopes.
  • ADDED: Adds bucketScopes which groups the scopes in a NormalizedScopesObject based on if the scopes are already supported, could be supported, or are not supportable.
  • ADDED: Adds getSupportedScopeObjects helper for getting only the supported methods and notifications from each NormalizedScopeObject in a NormalizedScopesObject.

Checklist

  • I've updated the test suite for new or updated code as appropriate
  • I've updated documentation (JSDoc, Markdown, etc.) for new or updated code as appropriate
  • I've highlighted breaking changes using the "BREAKING" category above as appropriate
  • I've prepared draft pull requests for clients and consumer packages to resolve any breaking changes

jiexi and others added 30 commits October 10, 2024 14:02
## Explanation
This PR fixes a lot of the linting and typescript errors. still some
left but this covers a lot of it.


<!--
Thanks for your contribution! Take a moment to answer these questions so
that reviewers have the information they need to properly understand
your changes:

* What is the current state of things and why does it need to change?
* What is the solution your changes offer and how does it work?
* Are there any changes whose purpose might not obvious to those
unfamiliar with the domain?
* If your primary goal was to update one package but you found you had
to update another one along the way, why did you do so?
* If you had to upgrade a dependency, why did you do so?
-->

## References

<!--
Are there any issues that this pull request is tied to?
Are there other links that reviewers should consult to understand these
changes better?
Are there client or consumer pull requests to adopt any breaking
changes?

For example:

* Fixes #12345
* Related to #67890
-->

## Changelog

<!--
If you're making any consumer-facing changes, list those changes here as
if you were updating a changelog, using the template below as a guide.

(CATEGORY is one of BREAKING, ADDED, CHANGED, DEPRECATED, REMOVED, or
FIXED. For security-related issues, follow the Security Advisory
process.)

Please take care to name the exact pieces of the API you've added or
changed (e.g. types, interfaces, functions, or methods).

If there are any breaking changes, make sure to offer a solution for
consumers to follow once they upgrade to the changes.

Finally, if you're only making changes to development scripts or tests,
you may replace the template below with "None".
-->

### `@metamask/package-a`

- **<CATEGORY>**: Your change here
- **<CATEGORY>**: Your change here

### `@metamask/package-b`

- **<CATEGORY>**: Your change here
- **<CATEGORY>**: Your change here

## Checklist

- [ ] I've updated the test suite for new or updated code as appropriate
- [ ] I've updated documentation (JSDoc, Markdown, etc.) for new or
updated code as appropriate
- [ ] I've highlighted breaking changes using the "BREAKING" category
above as appropriate
- [ ] I've prepared draft pull requests for clients and consumer
packages to resolve any breaking changes

---------

Co-authored-by: Jiexi Luan <[email protected]>
## Explanation

<!--
Thanks for your contribution! Take a moment to answer these questions so
that reviewers have the information they need to properly understand
your changes:

* What is the current state of things and why does it need to change?
* What is the solution your changes offer and how does it work?
* Are there any changes whose purpose might not obvious to those
unfamiliar with the domain?
* If your primary goal was to update one package but you found you had
to update another one along the way, why did you do so?
* If you had to upgrade a dependency, why did you do so?
-->
Added ESM exports for multichain package

## References

<!--
Are there any issues that this pull request is tied to?
Are there other links that reviewers should consult to understand these
changes better?
Are there client or consumer pull requests to adopt any breaking
changes?

For example:

* Fixes #12345
* Related to #67890
-->

## Changelog

<!--
If you're making any consumer-facing changes, list those changes here as
if you were updating a changelog, using the template below as a guide.

(CATEGORY is one of BREAKING, ADDED, CHANGED, DEPRECATED, REMOVED, or
FIXED. For security-related issues, follow the Security Advisory
process.)

Please take care to name the exact pieces of the API you've added or
changed (e.g. types, interfaces, functions, or methods).

If there are any breaking changes, make sure to offer a solution for
consumers to follow once they upgrade to the changes.

Finally, if you're only making changes to development scripts or tests,
you may replace the template below with "None".
-->

### `@metamask/package-a`

- **<CATEGORY>**: Your change here
- **<CATEGORY>**: Your change here

### `@metamask/package-b`

- **<CATEGORY>**: Your change here
- **<CATEGORY>**: Your change here

## Checklist

- [ ] I've updated the test suite for new or updated code as appropriate
- [ ] I've updated documentation (JSDoc, Markdown, etc.) for new or
updated code as appropriate
- [ ] I've highlighted breaking changes using the "BREAKING" category
above as appropriate
- [ ] I've prepared draft pull requests for clients and consumer
packages to resolve any breaking changes
@jiexi jiexi requested review from a team as code owners January 6, 2025 18:19
@jiexi
Copy link
Contributor Author

jiexi commented Jan 6, 2025

@metamaskbot publish-preview

Copy link
Contributor

github-actions bot commented Jan 6, 2025

Preview builds have been published. See these instructions for more information about preview builds.

Expand for full list of packages and versions.
{
  "@metamask-previews/accounts-controller": "20.0.2-preview-5c79a548",
  "@metamask-previews/address-book-controller": "6.0.2-preview-5c79a548",
  "@metamask-previews/announcement-controller": "7.0.2-preview-5c79a548",
  "@metamask-previews/approval-controller": "7.1.1-preview-5c79a548",
  "@metamask-previews/assets-controllers": "45.1.2-preview-5c79a548",
  "@metamask-previews/base-controller": "7.1.0-preview-5c79a548",
  "@metamask-previews/build-utils": "3.0.2-preview-5c79a548",
  "@metamask-previews/chain-controller": "0.2.2-preview-5c79a548",
  "@metamask-previews/composable-controller": "10.0.0-preview-5c79a548",
  "@metamask-previews/controller-utils": "11.4.4-preview-5c79a548",
  "@metamask-previews/ens-controller": "15.0.1-preview-5c79a548",
  "@metamask-previews/eth-json-rpc-provider": "4.1.7-preview-5c79a548",
  "@metamask-previews/gas-fee-controller": "22.0.2-preview-5c79a548",
  "@metamask-previews/json-rpc-engine": "10.0.2-preview-5c79a548",
  "@metamask-previews/json-rpc-middleware-stream": "8.0.6-preview-5c79a548",
  "@metamask-previews/keyring-controller": "19.0.2-preview-5c79a548",
  "@metamask-previews/logging-controller": "6.0.3-preview-5c79a548",
  "@metamask-previews/message-manager": "11.0.3-preview-5c79a548",
  "@metamask-previews/multichain": "2.0.0-preview-5c79a548",
  "@metamask-previews/name-controller": "8.0.2-preview-5c79a548",
  "@metamask-previews/network-controller": "22.1.1-preview-5c79a548",
  "@metamask-previews/notification-services-controller": "0.15.0-preview-5c79a548",
  "@metamask-previews/permission-controller": "11.0.4-preview-5c79a548",
  "@metamask-previews/permission-log-controller": "3.0.2-preview-5c79a548",
  "@metamask-previews/phishing-controller": "12.3.1-preview-5c79a548",
  "@metamask-previews/polling-controller": "12.0.2-preview-5c79a548",
  "@metamask-previews/preferences-controller": "15.0.1-preview-5c79a548",
  "@metamask-previews/profile-sync-controller": "3.1.1-preview-5c79a548",
  "@metamask-previews/queued-request-controller": "8.0.2-preview-5c79a548",
  "@metamask-previews/rate-limit-controller": "6.0.2-preview-5c79a548",
  "@metamask-previews/remote-feature-flag-controller": "1.2.0-preview-5c79a548",
  "@metamask-previews/selected-network-controller": "20.0.2-preview-5c79a548",
  "@metamask-previews/signature-controller": "23.2.0-preview-5c79a548",
  "@metamask-previews/transaction-controller": "42.1.0-preview-5c79a548",
  "@metamask-previews/user-operation-controller": "21.0.0-preview-5c79a548"
}

@@ -43,6 +43,9 @@
"pre-push": "yarn lint"
},
"resolutions": {
"cross-spawn@^7.0.0": "^7.0.5",
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These resolutions seems unnecessary - deduping should do the same thing, right?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

unless these are very specific versions (and there are other versions in the dep tree) that we want to force resolve...? But I'll defer to Jiexi on this!

_next: JsonRpcEngineNextCallback,
end: JsonRpcEngineEndCallback,
hooks: {
revokePermission: (origin: string, permissionName: string) => void;
Copy link
Member

@FrederikBolding FrederikBolding Jan 9, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Usually we bind all hooks to the origin for unrestricted RPC methods, would recommend we do that here too

(this applies to multiple files here)

if (
!methodToCheck ||
!isObject(methodToCheck) ||
!('params' in methodToCheck)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Generally I would say that hasProperty() is preferred over 'key' in object unless the types don't permit it in rare instances or if we are actually interested in the prototype.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It seems that Typescript prefers 'key' in object in this case

) {
return [
{
code: -32601,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we use rpcErrors so we use the standard codes, error messages etc and don't have to duplicate those?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

pushing a PR to address this

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/**
* All MetaMask methods, except for ones we have specified in the constants above.
*/
const Eip155Methods = MetaMaskOpenRPCDocument.methods
.map(({ name }: { name: string }) => name)
.filter((method: string) => !WalletEip155Methods.includes(method))
.filter((method: string) => !KnownWalletRpcMethods.includes(method));
.filter((method: string) => !KnownWalletRpcMethods.includes(method))
.filter((method: string) => !Eip1193OnlyMethods.includes(method));
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I thought we wanted to include some of these in the multichain via the wallet:eip155 scope?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

currently the only method that lives in the wallet:eip155 scope is wallet_addEthereumChain and this const is just substractively deriving the methods that should go in all eip155:<chain_id> scopes

* @param hooks.isChainIdSupported - A helper that returns true if an eth chainId is currently supported by the wallet.
* @returns a NormalizedScopesObject with only scopes that are currently supported.
*/
export const getSupportedScopes = (
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I can't find any uses of this 🤔

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This function was going to be used for helping to organize different categories of scopes in the wallet_createSession connection flow for when we enable adding scopes as part of the flow. Though looking at it now I'm not sure if its been superceded by getSupportedScopeObject... cc @jiexi ?

return next();
}

const { chainId } =
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This adapter warrants more explanation, especially because it seems incompatible with non-EVM

Copy link
Contributor

@adonesky1 adonesky1 Jan 10, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

When we were doing this work the non-EVM milestones felt like a long ways off.

I suppose its worth considering whether we should make this more agnostic at this point.

My feeling though is this could be a fast(ish) follow since our first targeted release is evm only.

WDYT @jiexi

const scopeString = _scopeString as keyof typeof normalizedScopesObject;

internalScopes[scopeString] = {
accounts,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Wait, so we are throwing away all of the methods etc? What is the plan then if we want to do more granular permissioning down the line, then we will require another potentially tricky migration?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So we originally were including the methods in the serialized permission itself (and granularly enforcing each metho), but after discussions w/ @Gudahtt we realized that approach would

  1. actually require a migration for each and any new methods added.
  2. doesn't really match how we represent permissions (in connections flows) to users. We don't represent good "buckets" of types of permissions currently. We considered creating these kinds of buckets as we removed the individual methods but decided we probably weren't going to get it exactly right the first time and so would probably need a later migration no matter what. Getting these "buckets" right requires more in depth discussion and we didn't want to make that a blocker for this work

if (middlewareEntry) {
middlewareEntry.middleware(req, res, next, end);
} else {
return next();
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there actually a use-case for calling next here? That would lead to sending the request to the node. But if only multichain API requests are allowed in this pipeline anyway, will that ever be a real use-case?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'll defer to @jiexi on this one

isChainIdSupported,
isChainIdSupportable,
}: {
isChainIdSupported: (chainId: Hex) => boolean;
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What's the plan for making this non-EVM compatible?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this will merit some conversation. We will possibly/probably want to figure out the right strategy for giving dapps the same capability of suggesting the user add EVM networks for non EVM networks (by handing us the snap information as part of the CAIP-25 request). But since this feature itself is not part of V1 I think its okay to leave it as TBD for now?

}
} else {
methods =
KnownRpcMethods[namespace as NonWalletKnownCaipNamespace] ?? [];
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Seems incompatible with non-EVM as well? 🤔

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

request.params,
);
if (errors.length > 0) {
throw rpcErrors.invalidParams<JsonRpcError[]>({ data: errors });
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I understand the reasoning for wrapping the errors here, but it might be more ergonomic API-wise to not require the unwrapping on the dapp side? 🤔

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yeah I feel that. Kindof nice that we can batch send a bunch of errors though

@desi desi assigned Gudahtt and mikesposito and unassigned Gudahtt and mikesposito Jan 9, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

8 participants