@bsv/wallet-toolbox 1.1.23 → 1.1.25

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (201) hide show
  1. package/docs/client.md +2404 -870
  2. package/docs/setup.md +102 -134
  3. package/docs/wallet.md +2404 -870
  4. package/out/src/CWIStyleWalletManager.d.ts +411 -0
  5. package/out/src/CWIStyleWalletManager.d.ts.map +1 -0
  6. package/out/src/CWIStyleWalletManager.js +1131 -0
  7. package/out/src/CWIStyleWalletManager.js.map +1 -0
  8. package/out/src/Setup.d.ts +252 -8
  9. package/out/src/Setup.d.ts.map +1 -1
  10. package/out/src/Setup.js +299 -5
  11. package/out/src/Setup.js.map +1 -1
  12. package/out/src/SetupClient.d.ts +2 -16
  13. package/out/src/SetupClient.d.ts.map +1 -1
  14. package/out/src/SetupClient.js +8 -72
  15. package/out/src/SetupClient.js.map +1 -1
  16. package/out/src/SimpleWalletManager.d.ts +169 -0
  17. package/out/src/SimpleWalletManager.d.ts.map +1 -0
  18. package/out/src/SimpleWalletManager.js +315 -0
  19. package/out/src/SimpleWalletManager.js.map +1 -0
  20. package/out/src/Wallet.d.ts +6 -1
  21. package/out/src/Wallet.d.ts.map +1 -1
  22. package/out/src/Wallet.js +29 -2
  23. package/out/src/Wallet.js.map +1 -1
  24. package/out/src/WalletAuthenticationManager.d.ts +33 -0
  25. package/out/src/WalletAuthenticationManager.d.ts.map +1 -0
  26. package/out/src/WalletAuthenticationManager.js +107 -0
  27. package/out/src/WalletAuthenticationManager.js.map +1 -0
  28. package/out/src/WalletPermissionsManager.d.ts +575 -0
  29. package/out/src/WalletPermissionsManager.d.ts.map +1 -0
  30. package/out/src/WalletPermissionsManager.js +1807 -0
  31. package/out/src/WalletPermissionsManager.js.map +1 -0
  32. package/out/src/WalletSettingsManager.d.ts +59 -0
  33. package/out/src/WalletSettingsManager.d.ts.map +1 -0
  34. package/out/src/WalletSettingsManager.js +168 -0
  35. package/out/src/WalletSettingsManager.js.map +1 -0
  36. package/out/src/__tests/CWIStyleWalletManager.test.d.ts +2 -0
  37. package/out/src/__tests/CWIStyleWalletManager.test.d.ts.map +1 -0
  38. package/out/src/__tests/CWIStyleWalletManager.test.js +472 -0
  39. package/out/src/__tests/CWIStyleWalletManager.test.js.map +1 -0
  40. package/out/src/__tests/WalletPermissionsManager.callbacks.test.d.ts +2 -0
  41. package/out/src/__tests/WalletPermissionsManager.callbacks.test.d.ts.map +1 -0
  42. package/out/src/__tests/WalletPermissionsManager.callbacks.test.js +239 -0
  43. package/out/src/__tests/WalletPermissionsManager.callbacks.test.js.map +1 -0
  44. package/out/src/__tests/WalletPermissionsManager.checks.test.d.ts +2 -0
  45. package/out/src/__tests/WalletPermissionsManager.checks.test.d.ts.map +1 -0
  46. package/out/src/__tests/WalletPermissionsManager.checks.test.js +644 -0
  47. package/out/src/__tests/WalletPermissionsManager.checks.test.js.map +1 -0
  48. package/out/src/__tests/WalletPermissionsManager.encryption.test.d.ts +2 -0
  49. package/out/src/__tests/WalletPermissionsManager.encryption.test.d.ts.map +1 -0
  50. package/out/src/__tests/WalletPermissionsManager.encryption.test.js +295 -0
  51. package/out/src/__tests/WalletPermissionsManager.encryption.test.js.map +1 -0
  52. package/out/src/__tests/WalletPermissionsManager.fixtures.d.ts +82 -0
  53. package/out/src/__tests/WalletPermissionsManager.fixtures.d.ts.map +1 -0
  54. package/out/src/__tests/WalletPermissionsManager.fixtures.js +260 -0
  55. package/out/src/__tests/WalletPermissionsManager.fixtures.js.map +1 -0
  56. package/out/src/__tests/WalletPermissionsManager.flows.test.d.ts +2 -0
  57. package/out/src/__tests/WalletPermissionsManager.flows.test.d.ts.map +1 -0
  58. package/out/src/__tests/WalletPermissionsManager.flows.test.js +389 -0
  59. package/out/src/__tests/WalletPermissionsManager.flows.test.js.map +1 -0
  60. package/out/src/__tests/WalletPermissionsManager.initialization.test.d.ts +2 -0
  61. package/out/src/__tests/WalletPermissionsManager.initialization.test.d.ts.map +1 -0
  62. package/out/src/__tests/WalletPermissionsManager.initialization.test.js +227 -0
  63. package/out/src/__tests/WalletPermissionsManager.initialization.test.js.map +1 -0
  64. package/out/src/__tests/WalletPermissionsManager.proxying.test.d.ts +2 -0
  65. package/out/src/__tests/WalletPermissionsManager.proxying.test.d.ts.map +1 -0
  66. package/out/src/__tests/WalletPermissionsManager.proxying.test.js +566 -0
  67. package/out/src/__tests/WalletPermissionsManager.proxying.test.js.map +1 -0
  68. package/out/src/__tests/WalletPermissionsManager.tokens.test.d.ts +2 -0
  69. package/out/src/__tests/WalletPermissionsManager.tokens.test.d.ts.map +1 -0
  70. package/out/src/__tests/WalletPermissionsManager.tokens.test.js +460 -0
  71. package/out/src/__tests/WalletPermissionsManager.tokens.test.js.map +1 -0
  72. package/out/src/index.all.d.ts +9 -1
  73. package/out/src/index.all.d.ts.map +1 -1
  74. package/out/src/index.all.js +10 -3
  75. package/out/src/index.all.js.map +1 -1
  76. package/out/src/index.client.d.ts +9 -1
  77. package/out/src/index.client.d.ts.map +1 -1
  78. package/out/src/index.client.js +10 -3
  79. package/out/src/index.client.js.map +1 -1
  80. package/out/src/utility/identityUtils.d.ts +31 -0
  81. package/out/src/utility/identityUtils.d.ts.map +1 -0
  82. package/out/src/utility/identityUtils.js +114 -0
  83. package/out/src/utility/identityUtils.js.map +1 -0
  84. package/out/src/wab-client/WABClient.d.ts +38 -0
  85. package/out/src/wab-client/WABClient.d.ts.map +1 -0
  86. package/out/src/wab-client/WABClient.js +95 -0
  87. package/out/src/wab-client/WABClient.js.map +1 -0
  88. package/out/src/wab-client/__tests/WABClient.test.d.ts +2 -0
  89. package/out/src/wab-client/__tests/WABClient.test.d.ts.map +1 -0
  90. package/out/src/wab-client/__tests/WABClient.test.js +47 -0
  91. package/out/src/wab-client/__tests/WABClient.test.js.map +1 -0
  92. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts +34 -0
  93. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts.map +1 -0
  94. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js +16 -0
  95. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js.map +1 -0
  96. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts +7 -0
  97. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts.map +1 -0
  98. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js +40 -0
  99. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js.map +1 -0
  100. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts +28 -0
  101. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts.map +1 -0
  102. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js +73 -0
  103. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js.map +1 -0
  104. package/out/test/Wallet/action/abortAction.test.d.ts.map +1 -0
  105. package/out/test/{wallet → Wallet}/action/abortAction.test.js.map +1 -1
  106. package/out/test/Wallet/action/createAction.test.d.ts.map +1 -0
  107. package/out/test/{wallet → Wallet}/action/createAction.test.js.map +1 -1
  108. package/out/test/{wallet → Wallet}/action/createAction2.test.d.ts.map +1 -1
  109. package/out/test/{wallet → Wallet}/action/createAction2.test.js.map +1 -1
  110. package/out/test/Wallet/action/createActionToGenerateBeefs.man.test.d.ts.map +1 -0
  111. package/out/test/{wallet → Wallet}/action/createActionToGenerateBeefs.man.test.js.map +1 -1
  112. package/out/test/Wallet/action/internalizeAction.test.d.ts.map +1 -0
  113. package/out/test/{wallet → Wallet}/action/internalizeAction.test.js.map +1 -1
  114. package/out/test/Wallet/action/relinquishOutput.test.d.ts.map +1 -0
  115. package/out/test/{wallet → Wallet}/action/relinquishOutput.test.js.map +1 -1
  116. package/out/test/Wallet/construct/Wallet.constructor.test.d.ts.map +1 -0
  117. package/out/test/{wallet → Wallet}/construct/Wallet.constructor.test.js.map +1 -1
  118. package/out/test/Wallet/list/listActions.test.d.ts.map +1 -0
  119. package/out/test/{wallet → Wallet}/list/listActions.test.js.map +1 -1
  120. package/out/test/Wallet/list/listActions2.test.d.ts.map +1 -0
  121. package/out/test/{wallet → Wallet}/list/listActions2.test.js.map +1 -1
  122. package/out/test/Wallet/list/listCertificates.test.d.ts.map +1 -0
  123. package/out/test/{wallet → Wallet}/list/listCertificates.test.js.map +1 -1
  124. package/out/test/Wallet/list/listOutputs.test.d.ts.map +1 -0
  125. package/out/test/{wallet → Wallet}/list/listOutputs.test.js.map +1 -1
  126. package/out/test/Wallet/sync/Wallet.sync.test.d.ts.map +1 -0
  127. package/out/test/{wallet → Wallet}/sync/Wallet.sync.test.js.map +1 -1
  128. package/out/tsconfig.all.tsbuildinfo +1 -1
  129. package/package.json +3 -3
  130. package/src/CWIStyleWalletManager.ts +1891 -0
  131. package/src/Setup.ts +514 -8
  132. package/src/SimpleWalletManager.ts +553 -0
  133. package/src/Wallet.ts +47 -3
  134. package/src/WalletAuthenticationManager.ts +183 -0
  135. package/src/WalletPermissionsManager.ts +2639 -0
  136. package/src/WalletSettingsManager.ts +241 -0
  137. package/src/__tests/CWIStyleWalletManager.test.ts +709 -0
  138. package/src/__tests/WalletPermissionsManager.callbacks.test.ts +328 -0
  139. package/src/__tests/WalletPermissionsManager.checks.test.ts +857 -0
  140. package/src/__tests/WalletPermissionsManager.encryption.test.ts +407 -0
  141. package/src/__tests/WalletPermissionsManager.fixtures.ts +283 -0
  142. package/src/__tests/WalletPermissionsManager.flows.test.ts +490 -0
  143. package/src/__tests/WalletPermissionsManager.initialization.test.ts +333 -0
  144. package/src/__tests/WalletPermissionsManager.proxying.test.ts +753 -0
  145. package/src/__tests/WalletPermissionsManager.tokens.test.ts +584 -0
  146. package/src/index.all.ts +9 -9
  147. package/src/index.client.ts +9 -1
  148. package/src/utility/identityUtils.ts +170 -0
  149. package/src/wab-client/WABClient.ts +103 -0
  150. package/src/wab-client/__tests/WABClient.test.ts +58 -0
  151. package/src/wab-client/auth-method-interactors/AuthMethodInteractor.ts +47 -0
  152. package/src/wab-client/auth-method-interactors/PersonaIDInteractor.ts +45 -0
  153. package/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.ts +82 -0
  154. package/out/test/wallet/action/abortAction.test.d.ts.map +0 -1
  155. package/out/test/wallet/action/createAction.test.d.ts.map +0 -1
  156. package/out/test/wallet/action/createActionToGenerateBeefs.man.test.d.ts.map +0 -1
  157. package/out/test/wallet/action/internalizeAction.test.d.ts.map +0 -1
  158. package/out/test/wallet/action/relinquishOutput.test.d.ts.map +0 -1
  159. package/out/test/wallet/construct/Wallet.constructor.test.d.ts.map +0 -1
  160. package/out/test/wallet/list/listActions.test.d.ts.map +0 -1
  161. package/out/test/wallet/list/listActions2.test.d.ts.map +0 -1
  162. package/out/test/wallet/list/listCertificates.test.d.ts.map +0 -1
  163. package/out/test/wallet/list/listOutputs.test.d.ts.map +0 -1
  164. package/out/test/wallet/sync/Wallet.sync.test.d.ts.map +0 -1
  165. package/src/SetupClient.ts +0 -532
  166. /package/out/test/{wallet → Wallet}/action/abortAction.test.d.ts +0 -0
  167. /package/out/test/{wallet → Wallet}/action/abortAction.test.js +0 -0
  168. /package/out/test/{wallet → Wallet}/action/createAction.test.d.ts +0 -0
  169. /package/out/test/{wallet → Wallet}/action/createAction.test.js +0 -0
  170. /package/out/test/{wallet → Wallet}/action/createAction2.test.d.ts +0 -0
  171. /package/out/test/{wallet → Wallet}/action/createAction2.test.js +0 -0
  172. /package/out/test/{wallet → Wallet}/action/createActionToGenerateBeefs.man.test.d.ts +0 -0
  173. /package/out/test/{wallet → Wallet}/action/createActionToGenerateBeefs.man.test.js +0 -0
  174. /package/out/test/{wallet → Wallet}/action/internalizeAction.test.d.ts +0 -0
  175. /package/out/test/{wallet → Wallet}/action/internalizeAction.test.js +0 -0
  176. /package/out/test/{wallet → Wallet}/action/relinquishOutput.test.d.ts +0 -0
  177. /package/out/test/{wallet → Wallet}/action/relinquishOutput.test.js +0 -0
  178. /package/out/test/{wallet → Wallet}/construct/Wallet.constructor.test.d.ts +0 -0
  179. /package/out/test/{wallet → Wallet}/construct/Wallet.constructor.test.js +0 -0
  180. /package/out/test/{wallet → Wallet}/list/listActions.test.d.ts +0 -0
  181. /package/out/test/{wallet → Wallet}/list/listActions.test.js +0 -0
  182. /package/out/test/{wallet → Wallet}/list/listActions2.test.d.ts +0 -0
  183. /package/out/test/{wallet → Wallet}/list/listActions2.test.js +0 -0
  184. /package/out/test/{wallet → Wallet}/list/listCertificates.test.d.ts +0 -0
  185. /package/out/test/{wallet → Wallet}/list/listCertificates.test.js +0 -0
  186. /package/out/test/{wallet → Wallet}/list/listOutputs.test.d.ts +0 -0
  187. /package/out/test/{wallet → Wallet}/list/listOutputs.test.js +0 -0
  188. /package/out/test/{wallet → Wallet}/sync/Wallet.sync.test.d.ts +0 -0
  189. /package/out/test/{wallet → Wallet}/sync/Wallet.sync.test.js +0 -0
  190. /package/test/{wallet → Wallet}/action/abortAction.test.ts +0 -0
  191. /package/test/{wallet → Wallet}/action/createAction.test.ts +0 -0
  192. /package/test/{wallet → Wallet}/action/createAction2.test.ts +0 -0
  193. /package/test/{wallet → Wallet}/action/createActionToGenerateBeefs.man.test.ts +0 -0
  194. /package/test/{wallet → Wallet}/action/internalizeAction.test.ts +0 -0
  195. /package/test/{wallet → Wallet}/action/relinquishOutput.test.ts +0 -0
  196. /package/test/{wallet → Wallet}/construct/Wallet.constructor.test.ts +0 -0
  197. /package/test/{wallet → Wallet}/list/listActions.test.ts +0 -0
  198. /package/test/{wallet → Wallet}/list/listActions2.test.ts +0 -0
  199. /package/test/{wallet → Wallet}/list/listCertificates.test.ts +0 -0
  200. /package/test/{wallet → Wallet}/list/listOutputs.test.ts +0 -0
  201. /package/test/{wallet → Wallet}/sync/Wallet.sync.test.ts +0 -0
@@ -0,0 +1,490 @@
1
+ import {
2
+ mockUnderlyingWallet,
3
+ MockedBSV_SDK
4
+ } from './WalletPermissionsManager.fixtures'
5
+ import {
6
+ WalletPermissionsManager,
7
+ PermissionToken
8
+ } from '../WalletPermissionsManager'
9
+
10
+ import { jest } from '@jest/globals'
11
+
12
+ // We mock the underlying @bsv/sdk references with our test fixtures:
13
+ jest.mock('@bsv/sdk', () => MockedBSV_SDK)
14
+
15
+ /**
16
+ * A lightweight helper that forces the manager to never find any on-chain token.
17
+ * We do this so we can reliably test the request flow (i.e., that it truly initiates
18
+ * a new permission request if no token is found).
19
+ */
20
+ function mockNoTokensFound(manager: WalletPermissionsManager) {
21
+ jest.spyOn(manager as any, 'findProtocolToken').mockResolvedValue(undefined)
22
+ jest.spyOn(manager as any, 'findBasketToken').mockResolvedValue(undefined)
23
+ jest
24
+ .spyOn(manager as any, 'findCertificateToken')
25
+ .mockResolvedValue(undefined)
26
+ jest.spyOn(manager as any, 'findSpendingToken').mockResolvedValue(undefined)
27
+ }
28
+
29
+ describe('WalletPermissionsManager - Permission Request Flow & Active Requests', () => {
30
+ let underlying: ReturnType<typeof mockUnderlyingWallet>
31
+ let manager: WalletPermissionsManager
32
+
33
+ beforeEach(() => {
34
+ underlying = mockUnderlyingWallet()
35
+ manager = new WalletPermissionsManager(underlying, 'admin.test.com')
36
+ })
37
+
38
+ afterEach(() => {
39
+ jest.clearAllMocks()
40
+ })
41
+
42
+ /**
43
+ * UNIT TESTS
44
+ */
45
+ describe('Unit Tests: requestPermissionFlow & activeRequests map', () => {
46
+ it('should coalesce parallel requests for the same resource into a single user prompt', async () => {
47
+ // We want to test the underlying private method "requestPermissionFlow" indirectly
48
+ // or we can test it via a public method that calls it. We'll do so via ensureProtocolPermission.
49
+
50
+ // Force no token found => triggers a request flow
51
+ mockNoTokensFound(manager)
52
+
53
+ // Spy on the manager's "onProtocolPermissionRequested" callbacks
54
+ const requestCallback = jest.fn(() => {})
55
+ manager.bindCallback('onProtocolPermissionRequested', requestCallback)
56
+
57
+ // Make two parallel calls for the same resource
58
+ const callA = manager.ensureProtocolPermission({
59
+ originator: 'example.com',
60
+ privileged: false,
61
+ protocolID: [1, 'someproto'],
62
+ counterparty: 'self',
63
+ reason: 'UnitTest - same resource A',
64
+ seekPermission: true,
65
+ usageType: 'signing'
66
+ })
67
+
68
+ const callB = manager.ensureProtocolPermission({
69
+ originator: 'example.com',
70
+ privileged: false,
71
+ protocolID: [1, 'someproto'],
72
+ counterparty: 'self',
73
+ reason: 'UnitTest - same resource B',
74
+ seekPermission: true,
75
+ usageType: 'signing'
76
+ })
77
+
78
+ // Wait a short moment for the async request flow to trigger
79
+ await new Promise(res => setTimeout(res, 5))
80
+
81
+ // We expect only one "onProtocolPermissionRequested" event for both calls
82
+ expect(requestCallback).toHaveBeenCalledTimes(1)
83
+
84
+ // Now let's deny the request:
85
+ // Grab the requestID that the manager gave us from the callback param
86
+ const callbackArg = (requestCallback.mock as any).calls[0][0]
87
+ const requestID = callbackArg.requestID
88
+ expect(typeof requestID).toBe('string') // manager-generated
89
+
90
+ // Deny the request
91
+ await manager.denyPermission(requestID)
92
+
93
+ // Both calls should reject
94
+ await expect(callA).rejects.toThrow(/Permission denied/)
95
+ await expect(callB).rejects.toThrow(/Permission denied/)
96
+
97
+ // Confirm activeRequests map is empty after denial
98
+ const activeRequests = (manager as any).activeRequests as Map<
99
+ string,
100
+ any[]
101
+ >
102
+ expect(activeRequests.size).toBe(0)
103
+ })
104
+
105
+ it('should generate two distinct user prompts for two different permission requests', async () => {
106
+ // Force no tokens
107
+ mockNoTokensFound(manager)
108
+
109
+ // Spy on basket & protocol request callbacks
110
+ const protocolRequestCb = jest.fn(() => {})
111
+ const basketRequestCb = jest.fn(() => {})
112
+ manager.bindCallback('onProtocolPermissionRequested', protocolRequestCb)
113
+ manager.bindCallback('onBasketAccessRequested', basketRequestCb)
114
+
115
+ // Make one call for protocol usage
116
+ const pCall = manager.ensureProtocolPermission({
117
+ originator: 'example.com',
118
+ privileged: false,
119
+ protocolID: [1, 'proto-A'],
120
+ counterparty: 'self',
121
+ reason: 'Different request A',
122
+ seekPermission: true,
123
+ usageType: 'signing'
124
+ })
125
+
126
+ // Make a second call for basket usage
127
+ const bCall = manager.ensureBasketAccess({
128
+ originator: 'example.com',
129
+ basket: 'some-basket',
130
+ reason: 'Different request B',
131
+ seekPermission: true,
132
+ usageType: 'insertion'
133
+ })
134
+
135
+ // Wait a moment for them to trigger
136
+ await new Promise(res => setTimeout(res, 5))
137
+
138
+ // We expect one protocol request AND one basket request
139
+ expect(protocolRequestCb).toHaveBeenCalledTimes(1)
140
+ expect(basketRequestCb).toHaveBeenCalledTimes(1)
141
+
142
+ // Deny protocol request
143
+ const pReqID = (protocolRequestCb.mock as any).calls[0][0].requestID
144
+ await manager.denyPermission(pReqID)
145
+
146
+ // Deny basket request
147
+ const bReqID = (basketRequestCb.mock as any).calls[0][0].requestID
148
+ await manager.denyPermission(bReqID)
149
+
150
+ // Both calls should have rejected
151
+ await expect(pCall).rejects.toThrow(/Permission denied/)
152
+ await expect(bCall).rejects.toThrow(/Permission denied/)
153
+
154
+ // activeRequests is empty
155
+ const activeRequests = (manager as any).activeRequests as Map<
156
+ string,
157
+ any[]
158
+ >
159
+ expect(activeRequests.size).toBe(0)
160
+ })
161
+
162
+ it('should resolve all parallel requests when permission is granted, referencing the same requestID', async () => {
163
+ // No tokens => triggers request flow
164
+ mockNoTokensFound(manager)
165
+
166
+ const requestCb = jest.fn(() => {})
167
+ manager.bindCallback('onProtocolPermissionRequested', requestCb)
168
+
169
+ // Parallel calls
170
+ const promiseA = manager.ensureProtocolPermission({
171
+ originator: 'example.com',
172
+ privileged: false,
173
+ protocolID: [1, 'proto-X'],
174
+ counterparty: 'anyone',
175
+ reason: 'Test parallel grant A',
176
+ seekPermission: true,
177
+ usageType: 'encrypting'
178
+ })
179
+
180
+ const promiseB = manager.ensureProtocolPermission({
181
+ originator: 'example.com',
182
+ privileged: false,
183
+ protocolID: [1, 'proto-X'],
184
+ counterparty: 'anyone',
185
+ reason: 'Test parallel grant B',
186
+ seekPermission: true,
187
+ usageType: 'encrypting'
188
+ })
189
+
190
+ // Let the request event fire
191
+ await new Promise(res => setTimeout(res, 5))
192
+ expect(requestCb).toHaveBeenCalledTimes(1)
193
+
194
+ // Extract the requestID from the callback
195
+ const { requestID } = (requestCb.mock as any).calls[0][0]
196
+ // Now we grant permission for that same requestID
197
+ // Because ephemeral is false by default, the manager will attempt to create on-chain tokens
198
+ // We'll mock the internal createPermissionOnChain so it doesn't blow up
199
+ const createOnChainSpy = jest
200
+ .spyOn(manager as any, 'createPermissionOnChain')
201
+ .mockResolvedValue(undefined)
202
+
203
+ await manager.grantPermission({ requestID })
204
+
205
+ // Both calls should resolve with `true` (the manager returns a boolean)
206
+ await expect(promiseA).resolves.toBe(true)
207
+ await expect(promiseB).resolves.toBe(true)
208
+
209
+ // activeRequests map is empty
210
+ const activeRequests = (manager as any).activeRequests as Map<
211
+ string,
212
+ any[]
213
+ >
214
+ expect(activeRequests.size).toBe(0)
215
+
216
+ // The manager tried to create an on-chain permission token once
217
+ expect(createOnChainSpy).toHaveBeenCalledTimes(1)
218
+ })
219
+
220
+ it('should reject only the matching request queue on deny if requestID is specified', async () => {
221
+ // This scenario tests the manager's partial denial logic where we pass { requestID }
222
+ // to only reject the queued requests with that ID, leaving others (with a different requestID)
223
+ // in the queue.
224
+
225
+ mockNoTokensFound(manager)
226
+
227
+ // We do two separate calls for the same resource but at different times, resulting in separate queues.
228
+ // Actually, the manager normally merges them into one queue if the resource is the same.
229
+ // So let's do two different resources to ensure we get two separate keys.
230
+ const protoCb = jest.fn(() => {})
231
+ manager.bindCallback('onProtocolPermissionRequested', protoCb)
232
+
233
+ // Resource 1
234
+ const p1Promise = manager.ensureProtocolPermission({
235
+ originator: 'siteA.com',
236
+ privileged: false,
237
+ protocolID: [1, 'proto-siteA'],
238
+ counterparty: 'self',
239
+ usageType: 'encrypting'
240
+ })
241
+ await new Promise(res => setTimeout(res, 5))
242
+ const p1ReqID = (protoCb.mock as any).calls[0][0].requestID
243
+ // At this point, resource 1 is pending in activeRequests. We'll not resolve it yet.
244
+
245
+ // Resource 2
246
+ const p2Promise = manager.ensureProtocolPermission({
247
+ originator: 'siteB.com',
248
+ privileged: false,
249
+ protocolID: [1, 'proto-siteB'],
250
+ counterparty: 'self',
251
+ usageType: 'encrypting'
252
+ })
253
+ await new Promise(res => setTimeout(res, 5))
254
+ // the second call triggers a second onProtocolPermissionRequested callback
255
+ expect(protoCb).toHaveBeenCalledTimes(2)
256
+ const p2ReqID = (protoCb.mock as any).calls[1][0].requestID
257
+
258
+ // Deny the second request only
259
+ await manager.denyPermission(p2ReqID)
260
+ await expect(p2Promise).rejects.toThrow(/Permission denied/)
261
+
262
+ // But the first request is still waiting
263
+ const activeRequests = (manager as any).activeRequests as Map<
264
+ string,
265
+ any[]
266
+ >
267
+ expect(activeRequests.size).toBe(1)
268
+
269
+ // Now let's deny the first request too
270
+ await manager.denyPermission(p1ReqID)
271
+ await expect(p1Promise).rejects.toThrow(/Permission denied/)
272
+
273
+ // The queue is empty now
274
+ expect(activeRequests.size).toBe(0)
275
+ })
276
+ })
277
+
278
+ /**
279
+ * INTEGRATION TESTS
280
+ */
281
+ describe('Integration Tests: ephemeral vs. persistent tokens', () => {
282
+ it('should not create a token if ephemeral=true, so subsequent calls re-trigger the request', async () => {
283
+ // We'll do a "protocol" permission scenario:
284
+ mockNoTokensFound(manager)
285
+
286
+ // Bind the request callback
287
+ const requestCb = jest.fn(() => {})
288
+ manager.bindCallback('onProtocolPermissionRequested', requestCb)
289
+
290
+ // Force any on-chain creation attempt to be spied on
291
+ const createTokenSpy = jest.spyOn(
292
+ manager as any,
293
+ 'createPermissionOnChain'
294
+ )
295
+
296
+ // 1) Call ensureProtocolPermission => triggers request
297
+ const pCall1 = manager.ensureProtocolPermission({
298
+ originator: 'appdomain.com',
299
+ privileged: false,
300
+ protocolID: [1, 'ephemeral-proto'],
301
+ counterparty: 'self',
302
+ reason: 'test ephemeral #1',
303
+ usageType: 'signing'
304
+ })
305
+
306
+ // Wait for request callback
307
+ await new Promise(res => setTimeout(res, 5))
308
+ expect(requestCb).toHaveBeenCalledTimes(1)
309
+ const reqID1 = (requestCb.mock as any).calls[0][0].requestID
310
+
311
+ // Grant ephemeral
312
+ await manager.grantPermission({
313
+ requestID: reqID1,
314
+ ephemeral: true
315
+ })
316
+
317
+ // pCall1 is resolved
318
+ await expect(pCall1).resolves.toBe(true)
319
+
320
+ // Because ephemeral=true, we do NOT create an on-chain token
321
+ expect(createTokenSpy).not.toHaveBeenCalled()
322
+
323
+ // 2) Immediately call ensureProtocolPermission again for the same resource
324
+ // Because ephemeral usage didn't store a token, it should re-prompt.
325
+ const pCall2 = manager.ensureProtocolPermission({
326
+ originator: 'appdomain.com',
327
+ privileged: false,
328
+ protocolID: [1, 'ephemeral-proto'],
329
+ counterparty: 'self',
330
+ reason: 'test ephemeral #2',
331
+ usageType: 'signing'
332
+ })
333
+
334
+ await new Promise(res => setTimeout(res, 5))
335
+ // We expect a new request callback
336
+ expect(requestCb).toHaveBeenCalledTimes(2)
337
+
338
+ // We'll deny the second request
339
+ const reqID2 = (requestCb.mock as any).calls[1][0].requestID
340
+ await manager.denyPermission(reqID2)
341
+
342
+ await expect(pCall2).rejects.toThrow(/Permission denied/)
343
+ })
344
+
345
+ it('should create a token if ephemeral=false, so subsequent calls do not re-trigger if unexpired', async () => {
346
+ // We want the manager to truly create a token. We'll confirm that
347
+ // subsequent calls for the same resource skip user prompt.
348
+
349
+ mockNoTokensFound(manager)
350
+ // We'll also ensure no token is found "the first time."
351
+ // But on subsequent calls, we can mock that the manager sees the newly created token.
352
+
353
+ // Let's spy on "createPermissionOnChain" so we can intercept the new token
354
+ const createTokenSpy = jest
355
+ .spyOn(manager as any, 'createPermissionOnChain')
356
+ .mockResolvedValue(undefined) // no real on-chain creation
357
+
358
+ // Spy on "findProtocolToken" so we can simulate that the second time it's called,
359
+ // there's a valid token. We'll do this by setting the mock to return undefined the first time,
360
+ // and a valid token the second time (or we can just rely on the manager's logic).
361
+ let firstFindCall = true
362
+ jest
363
+ .spyOn(manager as any, 'findProtocolToken')
364
+ .mockImplementation(async () => {
365
+ if (firstFindCall) {
366
+ firstFindCall = false
367
+ return undefined // first time triggers request
368
+ }
369
+ // second time => pretend we found a valid token
370
+ const mockToken: PermissionToken = {
371
+ txid: 'abcdef',
372
+ outputIndex: 0,
373
+ outputScript: '00',
374
+ satoshis: 1,
375
+ originator: 'persistentdomain.com',
376
+ expiry: Math.floor(Date.now() / 1000) + 3600, // unexpired
377
+ privileged: false,
378
+ protocol: 'persist-proto',
379
+ securityLevel: 1,
380
+ counterparty: 'self'
381
+ }
382
+ return mockToken
383
+ })
384
+
385
+ // We'll observe the request callback
386
+ const requestCb = jest.fn(() => {})
387
+ manager.bindCallback('onProtocolPermissionRequested', requestCb)
388
+
389
+ // 1) First call => no token => triggers request
390
+ const call1 = manager.ensureProtocolPermission({
391
+ originator: 'persistentdomain.com',
392
+ privileged: false,
393
+ protocolID: [1, 'persist-proto'],
394
+ counterparty: 'self',
395
+ reason: 'test persistent #1',
396
+ usageType: 'signing'
397
+ })
398
+ await new Promise(res => setTimeout(res, 5))
399
+ expect(requestCb).toHaveBeenCalledTimes(1)
400
+
401
+ // Grant ephemeral=false => triggers createPermissionOnChain
402
+ const reqID = (requestCb.mock as any).calls[0][0].requestID
403
+ await manager.grantPermission({ requestID: reqID, ephemeral: false })
404
+ await expect(call1).resolves.toBe(true)
405
+
406
+ expect(createTokenSpy).toHaveBeenCalledTimes(1)
407
+
408
+ // 2) Second call => the manager should find the token we just "created" => no request prompt
409
+ const call2 = manager.ensureProtocolPermission({
410
+ originator: 'persistentdomain.com',
411
+ privileged: false,
412
+ protocolID: [1, 'persist-proto'],
413
+ counterparty: 'self',
414
+ reason: 'test persistent #2',
415
+ usageType: 'signing'
416
+ })
417
+
418
+ // We do not expect a new user prompt => requestCb remains at 1
419
+ await new Promise(res => setTimeout(res, 5))
420
+ expect(requestCb).toHaveBeenCalledTimes(1)
421
+
422
+ // The second call should resolve immediately, no prompt
423
+ await expect(call2).resolves.toBe(true)
424
+ })
425
+
426
+ it('should handle renewal if the found token is expired, passing previousToken in the request', async () => {
427
+ // We'll test the "renewal" flow:
428
+ // If the manager finds a token but it's expired, it sets { renewal: true, previousToken } in the request.
429
+
430
+ // We'll mock findProtocolToken to return an expired token
431
+ const expiredToken: PermissionToken = {
432
+ txid: 'expiredTxid123',
433
+ outputIndex: 0,
434
+ outputScript: '76a914xxxx...88ac',
435
+ satoshis: 1,
436
+ originator: 'renewme.com',
437
+ expiry: Math.floor(Date.now() / 1000) - 100, // in the past
438
+ privileged: false,
439
+ protocol: 'renew-proto',
440
+ securityLevel: 1,
441
+ counterparty: 'self'
442
+ }
443
+ jest
444
+ .spyOn(manager as any, 'findProtocolToken')
445
+ .mockResolvedValue(expiredToken)
446
+
447
+ // Spy on request callback
448
+ const requestCb = jest.fn(() => {})
449
+ manager.bindCallback('onProtocolPermissionRequested', requestCb)
450
+
451
+ // We'll also spy on "renewPermissionOnChain" to see if it's called
452
+ const renewSpy = jest
453
+ .spyOn(manager as any, 'renewPermissionOnChain')
454
+ .mockResolvedValue(undefined)
455
+
456
+ // Call ensureProtocolPermission => sees expired token => triggers request with renewal
457
+ const promise = manager.ensureProtocolPermission({
458
+ originator: 'renewme.com',
459
+ privileged: false,
460
+ protocolID: [1, 'renew-proto'],
461
+ counterparty: 'self',
462
+ reason: 'test renewal',
463
+ usageType: 'encrypting'
464
+ })
465
+
466
+ // Wait for request callback
467
+ await new Promise(res => setTimeout(res, 10))
468
+ expect(requestCb).toHaveBeenCalledTimes(1)
469
+
470
+ // Confirm the callback param includes `renewal=true` and `previousToken=expiredToken`
471
+ const { renewal, previousToken } = (requestCb.mock as any).calls[0][0]
472
+ expect(renewal).toBe(true)
473
+ expect(previousToken.txid).toBe('expiredTxid123')
474
+
475
+ // Grant ephemeral=false => manager calls renewPermissionOnChain
476
+ const { requestID } = (requestCb.mock as any).calls[0][0]
477
+ await manager.grantPermission({ requestID, ephemeral: false })
478
+
479
+ await expect(promise).resolves.toBe(true)
480
+ expect(renewSpy).toHaveBeenCalledTimes(1)
481
+ // The first arg is the old token, second is request, etc.
482
+ expect(renewSpy).toHaveBeenCalledWith(
483
+ expiredToken,
484
+ expect.objectContaining({ originator: 'renewme.com' }),
485
+ expect.any(Number),
486
+ undefined
487
+ )
488
+ })
489
+ })
490
+ })