@bsv/wallet-toolbox 1.1.61 → 1.2.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (199) hide show
  1. package/docs/client.md +2339 -182
  2. package/docs/wallet.md +2339 -182
  3. package/out/src/CWIStyleWalletManager.d.ts +417 -0
  4. package/out/src/CWIStyleWalletManager.d.ts.map +1 -0
  5. package/out/src/CWIStyleWalletManager.js +1153 -0
  6. package/out/src/CWIStyleWalletManager.js.map +1 -0
  7. package/out/src/SimpleWalletManager.d.ts +169 -0
  8. package/out/src/SimpleWalletManager.d.ts.map +1 -0
  9. package/out/src/SimpleWalletManager.js +315 -0
  10. package/out/src/SimpleWalletManager.js.map +1 -0
  11. package/out/src/Wallet.d.ts +6 -1
  12. package/out/src/Wallet.d.ts.map +1 -1
  13. package/out/src/Wallet.js +39 -7
  14. package/out/src/Wallet.js.map +1 -1
  15. package/out/src/WalletAuthenticationManager.d.ts +33 -0
  16. package/out/src/WalletAuthenticationManager.d.ts.map +1 -0
  17. package/out/src/WalletAuthenticationManager.js +110 -0
  18. package/out/src/WalletAuthenticationManager.js.map +1 -0
  19. package/out/src/WalletPermissionsManager.d.ts +575 -0
  20. package/out/src/WalletPermissionsManager.d.ts.map +1 -0
  21. package/out/src/WalletPermissionsManager.js +1789 -0
  22. package/out/src/WalletPermissionsManager.js.map +1 -0
  23. package/out/src/WalletSettingsManager.d.ts +59 -0
  24. package/out/src/WalletSettingsManager.d.ts.map +1 -0
  25. package/out/src/WalletSettingsManager.js +189 -0
  26. package/out/src/WalletSettingsManager.js.map +1 -0
  27. package/out/src/__tests/CWIStyleWalletManager.test.d.ts +2 -0
  28. package/out/src/__tests/CWIStyleWalletManager.test.d.ts.map +1 -0
  29. package/out/src/__tests/CWIStyleWalletManager.test.js +471 -0
  30. package/out/src/__tests/CWIStyleWalletManager.test.js.map +1 -0
  31. package/out/src/__tests/WalletPermissionsManager.callbacks.test.d.ts +2 -0
  32. package/out/src/__tests/WalletPermissionsManager.callbacks.test.d.ts.map +1 -0
  33. package/out/src/__tests/WalletPermissionsManager.callbacks.test.js +239 -0
  34. package/out/src/__tests/WalletPermissionsManager.callbacks.test.js.map +1 -0
  35. package/out/src/__tests/WalletPermissionsManager.checks.test.d.ts +2 -0
  36. package/out/src/__tests/WalletPermissionsManager.checks.test.d.ts.map +1 -0
  37. package/out/src/__tests/WalletPermissionsManager.checks.test.js +637 -0
  38. package/out/src/__tests/WalletPermissionsManager.checks.test.js.map +1 -0
  39. package/out/src/__tests/WalletPermissionsManager.encryption.test.d.ts +2 -0
  40. package/out/src/__tests/WalletPermissionsManager.encryption.test.d.ts.map +1 -0
  41. package/out/src/__tests/WalletPermissionsManager.encryption.test.js +295 -0
  42. package/out/src/__tests/WalletPermissionsManager.encryption.test.js.map +1 -0
  43. package/out/src/__tests/WalletPermissionsManager.fixtures.d.ts +83 -0
  44. package/out/src/__tests/WalletPermissionsManager.fixtures.d.ts.map +1 -0
  45. package/out/src/__tests/WalletPermissionsManager.fixtures.js +261 -0
  46. package/out/src/__tests/WalletPermissionsManager.fixtures.js.map +1 -0
  47. package/out/src/__tests/WalletPermissionsManager.flows.test.d.ts +2 -0
  48. package/out/src/__tests/WalletPermissionsManager.flows.test.d.ts.map +1 -0
  49. package/out/src/__tests/WalletPermissionsManager.flows.test.js +377 -0
  50. package/out/src/__tests/WalletPermissionsManager.flows.test.js.map +1 -0
  51. package/out/src/__tests/WalletPermissionsManager.initialization.test.d.ts +2 -0
  52. package/out/src/__tests/WalletPermissionsManager.initialization.test.d.ts.map +1 -0
  53. package/out/src/__tests/WalletPermissionsManager.initialization.test.js +227 -0
  54. package/out/src/__tests/WalletPermissionsManager.initialization.test.js.map +1 -0
  55. package/out/src/__tests/WalletPermissionsManager.proxying.test.d.ts +2 -0
  56. package/out/src/__tests/WalletPermissionsManager.proxying.test.d.ts.map +1 -0
  57. package/out/src/__tests/WalletPermissionsManager.proxying.test.js +566 -0
  58. package/out/src/__tests/WalletPermissionsManager.proxying.test.js.map +1 -0
  59. package/out/src/__tests/WalletPermissionsManager.tokens.test.d.ts +2 -0
  60. package/out/src/__tests/WalletPermissionsManager.tokens.test.d.ts.map +1 -0
  61. package/out/src/__tests/WalletPermissionsManager.tokens.test.js +454 -0
  62. package/out/src/__tests/WalletPermissionsManager.tokens.test.js.map +1 -0
  63. package/out/src/index.all.d.ts +9 -0
  64. package/out/src/index.all.d.ts.map +1 -1
  65. package/out/src/index.all.js +9 -0
  66. package/out/src/index.all.js.map +1 -1
  67. package/out/src/index.client.d.ts +9 -0
  68. package/out/src/index.client.d.ts.map +1 -1
  69. package/out/src/index.client.js +9 -0
  70. package/out/src/index.client.js.map +1 -1
  71. package/out/src/sdk/CertOpsWallet.d.ts +7 -0
  72. package/out/src/sdk/CertOpsWallet.d.ts.map +1 -0
  73. package/out/src/sdk/CertOpsWallet.js +3 -0
  74. package/out/src/sdk/CertOpsWallet.js.map +1 -0
  75. package/out/src/sdk/__test/CertificateLifeCycle.test.js +19 -82
  76. package/out/src/sdk/__test/CertificateLifeCycle.test.js.map +1 -1
  77. package/out/src/sdk/index.d.ts +1 -1
  78. package/out/src/sdk/index.d.ts.map +1 -1
  79. package/out/src/sdk/index.js +1 -1
  80. package/out/src/sdk/index.js.map +1 -1
  81. package/out/src/sdk/validationHelpers.d.ts.map +1 -1
  82. package/out/src/sdk/validationHelpers.js +13 -12
  83. package/out/src/sdk/validationHelpers.js.map +1 -1
  84. package/out/src/services/__tests/ARC.test.js +9 -0
  85. package/out/src/services/__tests/ARC.test.js.map +1 -1
  86. package/out/src/services/__tests/bitrails.test.js +7 -2
  87. package/out/src/services/__tests/bitrails.test.js.map +1 -1
  88. package/out/src/services/providers/ARC.js +1 -1
  89. package/out/src/services/providers/ARC.js.map +1 -1
  90. package/out/src/services/providers/__tests/WhatsOnChain.test.js +3 -3
  91. package/out/src/services/providers/__tests/WhatsOnChain.test.js.map +1 -1
  92. package/out/src/signer/methods/proveCertificate.d.ts.map +1 -1
  93. package/out/src/signer/methods/proveCertificate.js +3 -19
  94. package/out/src/signer/methods/proveCertificate.js.map +1 -1
  95. package/out/src/storage/__test/WalletStorageManager.test.js +1 -1
  96. package/out/src/storage/__test/WalletStorageManager.test.js.map +1 -1
  97. package/out/src/storage/methods/listOutputs.js +1 -1
  98. package/out/src/storage/methods/listOutputs.js.map +1 -1
  99. package/out/src/storage/remoting/StorageClient.d.ts +2 -2
  100. package/out/src/storage/remoting/StorageClient.d.ts.map +1 -1
  101. package/out/src/storage/remoting/StorageClient.js +1 -1
  102. package/out/src/storage/remoting/StorageClient.js.map +1 -1
  103. package/out/src/utility/identityUtils.d.ts +31 -0
  104. package/out/src/utility/identityUtils.d.ts.map +1 -0
  105. package/out/src/utility/identityUtils.js +116 -0
  106. package/out/src/utility/identityUtils.js.map +1 -0
  107. package/out/src/wab-client/WABClient.d.ts +49 -0
  108. package/out/src/wab-client/WABClient.d.ts.map +1 -0
  109. package/out/src/wab-client/WABClient.js +83 -0
  110. package/out/src/wab-client/WABClient.js.map +1 -0
  111. package/out/src/wab-client/__tests/WABClient.man.test.d.ts +2 -0
  112. package/out/src/wab-client/__tests/WABClient.man.test.d.ts.map +1 -0
  113. package/out/src/wab-client/__tests/WABClient.man.test.js +52 -0
  114. package/out/src/wab-client/__tests/WABClient.man.test.js.map +1 -0
  115. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts +34 -0
  116. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts.map +1 -0
  117. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js +16 -0
  118. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js.map +1 -0
  119. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts +7 -0
  120. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts.map +1 -0
  121. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js +36 -0
  122. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js.map +1 -0
  123. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts +28 -0
  124. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts.map +1 -0
  125. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js +69 -0
  126. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js.map +1 -0
  127. package/out/test/Wallet/action/internalizeAction.a.test.js +1 -1
  128. package/out/test/Wallet/action/internalizeAction.a.test.js.map +1 -1
  129. package/out/test/Wallet/certificate/acquireCertificate.test.js +26 -29
  130. package/out/test/Wallet/certificate/acquireCertificate.test.js.map +1 -1
  131. package/out/test/Wallet/local/localWallet.man.test.d.ts.map +1 -1
  132. package/out/test/Wallet/local/localWallet.man.test.js +25 -10
  133. package/out/test/Wallet/local/localWallet.man.test.js.map +1 -1
  134. package/out/test/storage/KnexMigrations.test.js +1 -1
  135. package/out/test/storage/KnexMigrations.test.js.map +1 -1
  136. package/out/test/storage/update.test.js +1 -1
  137. package/out/test/storage/update.test.js.map +1 -1
  138. package/out/test/utils/TestUtilsWalletStorage.d.ts +9 -5
  139. package/out/test/utils/TestUtilsWalletStorage.d.ts.map +1 -1
  140. package/out/test/utils/TestUtilsWalletStorage.js +15 -9
  141. package/out/test/utils/TestUtilsWalletStorage.js.map +1 -1
  142. package/out/test/wallet/action/internalizeAction.test.js +1 -1
  143. package/out/test/wallet/action/internalizeAction.test.js.map +1 -1
  144. package/out/test/wallet/list/listActions2.test.js +1 -1
  145. package/out/test/wallet/list/listActions2.test.js.map +1 -1
  146. package/out/test/wallet/sync/Wallet.sync.test.js +1 -1
  147. package/out/test/wallet/sync/Wallet.sync.test.js.map +1 -1
  148. package/out/tsconfig.all.tsbuildinfo +1 -1
  149. package/package.json +3 -4
  150. package/src/CWIStyleWalletManager.ts +1738 -0
  151. package/src/SimpleWalletManager.ts +526 -0
  152. package/src/Wallet.ts +70 -7
  153. package/src/WalletAuthenticationManager.ts +150 -0
  154. package/src/WalletPermissionsManager.ts +2424 -0
  155. package/src/WalletSettingsManager.ts +243 -0
  156. package/src/__tests/CWIStyleWalletManager.test.ts +604 -0
  157. package/src/__tests/WalletPermissionsManager.callbacks.test.ts +323 -0
  158. package/src/__tests/WalletPermissionsManager.checks.test.ts +839 -0
  159. package/src/__tests/WalletPermissionsManager.encryption.test.ts +370 -0
  160. package/src/__tests/WalletPermissionsManager.fixtures.ts +284 -0
  161. package/src/__tests/WalletPermissionsManager.flows.test.ts +457 -0
  162. package/src/__tests/WalletPermissionsManager.initialization.test.ts +300 -0
  163. package/src/__tests/WalletPermissionsManager.proxying.test.ts +706 -0
  164. package/src/__tests/WalletPermissionsManager.tokens.test.ts +546 -0
  165. package/src/index.all.ts +9 -0
  166. package/src/index.client.ts +9 -0
  167. package/src/sdk/CertOpsWallet.ts +18 -0
  168. package/src/sdk/__test/CertificateLifeCycle.test.ts +66 -113
  169. package/src/sdk/index.ts +1 -1
  170. package/src/sdk/validationHelpers.ts +12 -11
  171. package/src/services/__tests/ARC.test.ts +14 -1
  172. package/src/services/__tests/bitrails.test.ts +7 -2
  173. package/src/services/processingErrors/arcSuccessError.json +76 -0
  174. package/src/services/providers/ARC.ts +1 -1
  175. package/src/services/providers/__tests/WhatsOnChain.test.ts +3 -3
  176. package/src/signer/methods/proveCertificate.ts +14 -21
  177. package/src/storage/__test/WalletStorageManager.test.ts +1 -1
  178. package/src/storage/methods/listOutputs.ts +1 -1
  179. package/src/storage/remoting/StorageClient.ts +4 -4
  180. package/src/utility/identityUtils.ts +159 -0
  181. package/src/wab-client/WABClient.ts +94 -0
  182. package/src/wab-client/__tests/WABClient.man.test.ts +59 -0
  183. package/src/wab-client/auth-method-interactors/AuthMethodInteractor.ts +47 -0
  184. package/src/wab-client/auth-method-interactors/PersonaIDInteractor.ts +35 -0
  185. package/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.ts +72 -0
  186. package/test/Wallet/action/internalizeAction.a.test.ts +1 -1
  187. package/test/Wallet/certificate/acquireCertificate.test.ts +89 -30
  188. package/test/Wallet/local/localWallet.man.test.ts +20 -4
  189. package/test/storage/KnexMigrations.test.ts +1 -1
  190. package/test/storage/update.test.ts +1 -1
  191. package/test/utils/TestUtilsWalletStorage.ts +24 -13
  192. package/test/wallet/action/internalizeAction.test.ts +1 -1
  193. package/test/wallet/list/listActions2.test.ts +1 -1
  194. package/test/wallet/sync/Wallet.sync.test.ts +1 -1
  195. package/out/src/sdk/CertOps.d.ts +0 -66
  196. package/out/src/sdk/CertOps.d.ts.map +0 -1
  197. package/out/src/sdk/CertOps.js +0 -190
  198. package/out/src/sdk/CertOps.js.map +0 -1
  199. package/src/sdk/CertOps.ts +0 -274
@@ -0,0 +1,454 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ const globals_1 = require("@jest/globals");
4
+ const WalletPermissionsManager_fixtures_1 = require("./WalletPermissionsManager.fixtures");
5
+ const WalletPermissionsManager_1 = require("../WalletPermissionsManager");
6
+ // Re-mock @bsv/sdk with our fixture classes (MockTransaction, MockLockingScript, etc.)
7
+ globals_1.jest.mock('@bsv/sdk', () => WalletPermissionsManager_fixtures_1.MockedBSV_SDK);
8
+ (0, globals_1.describe)('WalletPermissionsManager - On-Chain Token Creation, Renewal & Revocation', () => {
9
+ let underlying;
10
+ let manager;
11
+ (0, globals_1.beforeEach)(() => {
12
+ // Fresh mock wallet before each test
13
+ underlying = (0, WalletPermissionsManager_fixtures_1.mockUnderlyingWallet)();
14
+ manager = new WalletPermissionsManager_1.WalletPermissionsManager(underlying, 'admin.domain.com');
15
+ });
16
+ (0, globals_1.afterEach)(() => {
17
+ globals_1.jest.clearAllMocks();
18
+ });
19
+ /* ------------------------------------------------------------------------
20
+ * 1) UNIT TESTS: buildPushdropFields() correctness
21
+ * ------------------------------------------------------------------------
22
+ * We directly call the manager’s internal buildPushdropFields(...) via
23
+ * a cast to "any" so we can test each permission type’s field ordering,
24
+ * encryption calls, and final arrays.
25
+ * ------------------------------------------------------------------------
26
+ */
27
+ (0, globals_1.describe)('buildPushdropFields() - unit tests for each permission type', () => {
28
+ // We’ll cast the manager to `any` to access the private method.
29
+ const privateManager = () => manager;
30
+ (0, globals_1.it)('should build correct fields for a protocol token (DPACP)', async () => {
31
+ const request = {
32
+ type: 'protocol',
33
+ originator: 'some-app.com',
34
+ privileged: true,
35
+ protocolID: [2, 'myProto'],
36
+ counterparty: 'some-other-pubkey',
37
+ reason: 'test-protocol-creation'
38
+ };
39
+ const expiry = 1234567890;
40
+ // Because manager.encryptPermissionTokenField calls underlying.encrypt,
41
+ // we can observe how many times it's called & with what plaintext.
42
+ underlying.encrypt.mockClear();
43
+ const fields = await privateManager().buildPushdropFields(request, expiry);
44
+ // We expect 6 encryption calls (domain, expiry, privileged, secLevel, protoName, cpty).
45
+ (0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(6);
46
+ // The final array must have length=6
47
+ (0, globals_1.expect)(fields).toHaveLength(6);
48
+ // Confirm the 1st call was the domain
49
+ (0, globals_1.expect)(underlying.encrypt.mock.calls[0][0].plaintext).toEqual(globals_1.expect.arrayContaining([...'some-app.com'].map(c => c.charCodeAt(0))));
50
+ // Confirm the 2nd call was the expiry, as a string
51
+ (0, globals_1.expect)(underlying.encrypt.mock.calls[1][0].plaintext).toEqual(globals_1.expect.arrayContaining([...'1234567890'].map(c => c.charCodeAt(0))));
52
+ // 3rd => privileged? 'true'
53
+ (0, globals_1.expect)(underlying.encrypt.mock.calls[2][0].plaintext).toEqual(globals_1.expect.arrayContaining([...'true'].map(c => c.charCodeAt(0))));
54
+ // 4th => security level => '2'
55
+ (0, globals_1.expect)(underlying.encrypt.mock.calls[3][0].plaintext).toEqual(globals_1.expect.arrayContaining([...'2'].map(c => c.charCodeAt(0))));
56
+ // 5th => protoName => 'myProto'
57
+ (0, globals_1.expect)(underlying.encrypt.mock.calls[4][0].plaintext).toEqual(globals_1.expect.arrayContaining([...'myProto'].map(c => c.charCodeAt(0))));
58
+ // 6th => counterparty => 'some-other-pubkey'
59
+ (0, globals_1.expect)(underlying.encrypt.mock.calls[5][0].plaintext).toEqual(globals_1.expect.arrayContaining([...'some-other-pubkey'].map(c => c.charCodeAt(0))));
60
+ });
61
+ (0, globals_1.it)('should build correct fields for a basket token (DBAP)', async () => {
62
+ const request = {
63
+ type: 'basket',
64
+ originator: 'origin.example',
65
+ basket: 'someBasket',
66
+ reason: 'basket usage'
67
+ };
68
+ const expiry = 999999999;
69
+ underlying.encrypt.mockClear();
70
+ const fields = await privateManager().buildPushdropFields(request, expiry);
71
+ // We expect 3 encryption calls: domain, expiry, basket
72
+ (0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(3);
73
+ (0, globals_1.expect)(fields).toHaveLength(3);
74
+ });
75
+ (0, globals_1.it)('should build correct fields for a certificate token (DCAP)', async () => {
76
+ const request = {
77
+ type: 'certificate',
78
+ originator: 'cert-user.org',
79
+ privileged: false,
80
+ certificate: {
81
+ verifier: '02abcdef...',
82
+ certType: 'KYC',
83
+ fields: ['name', 'dob']
84
+ },
85
+ reason: 'certificate usage'
86
+ };
87
+ const expiry = 2222222222;
88
+ underlying.encrypt.mockClear();
89
+ const fields = await privateManager().buildPushdropFields(request, expiry);
90
+ // DP = domain, expiry, privileged, certType, fieldsJson, verifier
91
+ (0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(6);
92
+ (0, globals_1.expect)(fields).toHaveLength(6);
93
+ // 5th encryption call is the fields JSON => ["name","dob"]
94
+ const fifthCallPlaintext = underlying.encrypt.mock.calls[4][0].plaintext;
95
+ const str = String.fromCharCode(...fifthCallPlaintext);
96
+ (0, globals_1.expect)(str).toContain('"name"');
97
+ (0, globals_1.expect)(str).toContain('"dob"');
98
+ });
99
+ (0, globals_1.it)('should build correct fields for a spending token (DSAP)', async () => {
100
+ const request = {
101
+ type: 'spending',
102
+ originator: 'money-spender.com',
103
+ spending: { satoshis: 5000 },
104
+ reason: 'monthly spending'
105
+ };
106
+ const expiry = 0; // DSAP typically not time-limited, but manager can pass 0.
107
+ underlying.encrypt.mockClear();
108
+ const fields = await privateManager().buildPushdropFields(request, expiry, /*amount=*/ 10000);
109
+ // For DSAP: domain + authorizedAmount (2 fields)
110
+ (0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(2);
111
+ (0, globals_1.expect)(fields).toHaveLength(2);
112
+ // The second encryption call is '10000'
113
+ const secondPlaintext = underlying.encrypt.mock.calls[1][0].plaintext;
114
+ const asString = String.fromCharCode(...secondPlaintext);
115
+ (0, globals_1.expect)(asString).toBe('10000');
116
+ });
117
+ });
118
+ /* ------------------------------------------------------------------------
119
+ * 2) INTEGRATION TESTS: Token Creation
120
+ * ------------------------------------------------------------------------
121
+ * We'll simulate a user request flow, then call `grantPermission` with
122
+ * ephemeral=false to see if createAction is called with the correct script,
123
+ * basket name, tags, etc. We also decode the script to confirm it has the
124
+ * correct (encrypted) fields.
125
+ * ------------------------------------------------------------------------
126
+ */
127
+ (0, globals_1.describe)('Token Creation - integration tests', () => {
128
+ (0, globals_1.it)('should create a new protocol token with the correct basket, script, and tags', async () => {
129
+ // 1) Simulate the manager having an active request for a protocol token.
130
+ const request = {
131
+ type: 'protocol',
132
+ originator: 'app.example',
133
+ privileged: false,
134
+ protocolID: [1, 'testProto'],
135
+ counterparty: 'self',
136
+ reason: 'Need protocol usage'
137
+ };
138
+ // We'll emulate that the manager queued it:
139
+ const key = manager.buildRequestKey(request);
140
+ manager.activeRequests.set(key, {
141
+ request,
142
+ pending: [{ resolve: () => { }, reject: () => { } }]
143
+ });
144
+ // 2) Grant the permission with ephemeral=false => must create the token
145
+ underlying.createAction.mockClear();
146
+ await manager.grantPermission({
147
+ requestID: key,
148
+ expiry: 999999, // set some expiry
149
+ ephemeral: false
150
+ });
151
+ // 3) Expect createAction to have been called once with a single output
152
+ (0, globals_1.expect)(underlying.createAction).toHaveBeenCalledTimes(1);
153
+ const actionArgs = underlying.createAction.mock.calls[0][0];
154
+ (0, globals_1.expect)(actionArgs.outputs).toHaveLength(1);
155
+ // The basket name must be "admin protocol-permission" as per BASKET_MAP
156
+ (0, globals_1.expect)(actionArgs.outputs[0].basket).toBe('admin protocol-permission');
157
+ // The tags must contain e.g. "originator app.example", "protocolName testProto", etc.
158
+ const outputTags = actionArgs.outputs[0].tags;
159
+ (0, globals_1.expect)(outputTags).toEqual(globals_1.expect.arrayContaining([
160
+ 'originator app.example',
161
+ 'privileged false',
162
+ 'protocolName testProto',
163
+ 'protocolSecurityLevel 1',
164
+ 'counterparty self'
165
+ ]));
166
+ // The lockingScript is built by "PushDrop.lock(...)" with 6 fields
167
+ const lockingScriptHex = actionArgs.outputs[0].lockingScript;
168
+ (0, globals_1.expect)(lockingScriptHex).toBeTruthy();
169
+ // Because we’re using our mock pushdrop, we might see an empty decode.
170
+ // In a real environment, you would decode and confirm the fields. Here we just confirm
171
+ // that the manager called the underlying encrypt 6 times, plus the script creation.
172
+ // Two more encrypt calls should have been made within createAction (metadata encryption
173
+ // of the top-level Action description, and the output's description) for a total of 8.
174
+ (0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(8);
175
+ });
176
+ (0, globals_1.it)('should create a new basket token (DBAP)', async () => {
177
+ const request = {
178
+ type: 'basket',
179
+ originator: 'shopper.com',
180
+ basket: 'myBasket',
181
+ reason: 'I want to store items'
182
+ };
183
+ const key = manager.buildRequestKey(request);
184
+ manager.activeRequests.set(key, {
185
+ request,
186
+ pending: [{ resolve() { }, reject() { } }]
187
+ });
188
+ underlying.createAction.mockClear();
189
+ await manager.grantPermission({
190
+ requestID: key,
191
+ ephemeral: false,
192
+ expiry: 123456789
193
+ });
194
+ (0, globals_1.expect)(underlying.createAction).toHaveBeenCalledTimes(1);
195
+ const { outputs } = underlying.createAction.mock.calls[0][0];
196
+ (0, globals_1.expect)(outputs).toHaveLength(1);
197
+ // "admin basket-access"
198
+ (0, globals_1.expect)(outputs[0].basket).toBe('admin basket-access');
199
+ (0, globals_1.expect)(outputs[0].tags).toEqual(globals_1.expect.arrayContaining(['originator shopper.com', 'basket myBasket']));
200
+ // 3 fields => domain, expiry, basket, plus two metadata calls (description, outputDescription)
201
+ (0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(5);
202
+ });
203
+ (0, globals_1.it)('should create a new certificate token (DCAP)', async () => {
204
+ const request = {
205
+ type: 'certificate',
206
+ originator: 'org.certs',
207
+ privileged: true,
208
+ certificate: {
209
+ verifier: '02cccccc',
210
+ certType: 'KYC',
211
+ fields: ['name', 'id', 'photo']
212
+ },
213
+ reason: 'Present KYC docs'
214
+ };
215
+ const key = manager.buildRequestKey(request);
216
+ manager.activeRequests.set(key, {
217
+ request,
218
+ pending: [{ resolve() { }, reject() { } }]
219
+ });
220
+ underlying.createAction.mockClear();
221
+ await manager.grantPermission({
222
+ requestID: key,
223
+ ephemeral: false,
224
+ expiry: 44444444
225
+ });
226
+ (0, globals_1.expect)(underlying.createAction).toHaveBeenCalledTimes(1);
227
+ const { outputs } = underlying.createAction.mock.calls[0][0];
228
+ (0, globals_1.expect)(outputs[0].basket).toBe('admin certificate-access');
229
+ (0, globals_1.expect)(outputs[0].tags).toEqual(globals_1.expect.arrayContaining(['originator org.certs', 'privileged true', 'type KYC', 'verifier 02cccccc']));
230
+ // DP = domain, expiry, privileged, certType, fieldsJson, verifier => 6 encryption calls
231
+ // Two additional ones for metadata encryption (action description, output description) for 8 total.
232
+ (0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(8);
233
+ });
234
+ (0, globals_1.it)('should create a new spending authorization token (DSAP)', async () => {
235
+ const request = {
236
+ type: 'spending',
237
+ originator: 'spender.com',
238
+ spending: {
239
+ satoshis: 9999
240
+ }
241
+ };
242
+ const key = manager.buildRequestKey(request);
243
+ manager.activeRequests.set(key, {
244
+ request,
245
+ pending: [{ resolve() { }, reject() { } }]
246
+ });
247
+ underlying.createAction.mockClear();
248
+ // We'll set "amount=20000" as the monthly limit
249
+ await manager.grantPermission({
250
+ requestID: key,
251
+ ephemeral: false,
252
+ amount: 20000
253
+ });
254
+ (0, globals_1.expect)(underlying.createAction).toHaveBeenCalledTimes(1);
255
+ const { outputs } = underlying.createAction.mock.calls[0][0];
256
+ // "admin spending-authorization"
257
+ (0, globals_1.expect)(outputs[0].basket).toBe('admin spending-authorization');
258
+ (0, globals_1.expect)(outputs[0].tags).toEqual(globals_1.expect.arrayContaining(['originator spender.com']));
259
+ // domain, amount => 2 calls, plus two metadata encryption calls (description, outputDescription)
260
+ (0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(4);
261
+ });
262
+ });
263
+ /* ------------------------------------------------------------------------
264
+ * 3) INTEGRATION TESTS: Token Renewal
265
+ * ------------------------------------------------------------------------
266
+ * We test that renewing a token:
267
+ * - Spends the old token with createAction input referencing oldToken.txid/index
268
+ * - Produces a new token output in the same transaction with updated fields
269
+ * ------------------------------------------------------------------------
270
+ */
271
+ (0, globals_1.describe)('Token Renewal - integration tests', () => {
272
+ (0, globals_1.it)('should spend the old token input and create a new protocol token output with updated expiry', async () => {
273
+ // Suppose the user has an old protocol token:
274
+ const oldToken = {
275
+ txid: 'oldTokenTX',
276
+ outputIndex: 2,
277
+ outputScript: '76a914...ac', // not used by the mock
278
+ satoshis: 1,
279
+ originator: 'some-site.io',
280
+ expiry: 222222,
281
+ privileged: false,
282
+ securityLevel: 1,
283
+ protocol: 'coolProto',
284
+ counterparty: 'self'
285
+ };
286
+ // The user’s request to renew:
287
+ const request = {
288
+ type: 'protocol',
289
+ originator: 'some-site.io',
290
+ privileged: false,
291
+ protocolID: [1, 'coolProto'],
292
+ counterparty: 'self',
293
+ renewal: true,
294
+ previousToken: oldToken
295
+ };
296
+ // Manager normally calls requestPermissionFlow, but let's skip ahead:
297
+ // We'll place the request in activeRequests:
298
+ const key = manager.buildRequestKey(request);
299
+ manager.activeRequests.set(key, {
300
+ request,
301
+ pending: [{ resolve() { }, reject() { } }]
302
+ });
303
+ // Clear the mock calls, then renew with ephemeral=false
304
+ underlying.createAction.mockClear();
305
+ await manager.grantPermission({
306
+ requestID: key,
307
+ ephemeral: false,
308
+ expiry: 999999 // new expiry
309
+ });
310
+ // We expect createAction with:
311
+ // - 1 input referencing oldToken "oldTokenTX.2"
312
+ // - 1 output with the new script
313
+ (0, globals_1.expect)(underlying.createAction).toHaveBeenCalledTimes(1);
314
+ const createArgs = underlying.createAction.mock.calls[0][0];
315
+ (0, globals_1.expect)(createArgs.inputs).toHaveLength(1);
316
+ (0, globals_1.expect)(createArgs.inputs[0].outpoint).toBe('oldTokenTX.2');
317
+ (0, globals_1.expect)(createArgs.outputs).toHaveLength(1);
318
+ // The new basket is still "admin protocol-permission"
319
+ (0, globals_1.expect)(createArgs.outputs[0].basket).toBe('admin protocol-permission');
320
+ // And we must confirm "renew" means 6 encryption calls again
321
+ // Metadata encryption means three extra calls (inputDescription, outputDescription, and Action description)
322
+ // this means a total of 9.
323
+ (0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(9);
324
+ });
325
+ (0, globals_1.it)('should allow updating the authorizedAmount in DSAP renewal', async () => {
326
+ const oldToken = {
327
+ txid: 'dsap-old-tx',
328
+ outputIndex: 0,
329
+ outputScript: 'sample script',
330
+ satoshis: 1,
331
+ originator: 'spenderX.com',
332
+ authorizedAmount: 10000,
333
+ expiry: 0
334
+ };
335
+ const request = {
336
+ type: 'spending',
337
+ originator: 'spenderX.com',
338
+ spending: { satoshis: 3000 },
339
+ renewal: true,
340
+ previousToken: oldToken
341
+ };
342
+ const key = manager.buildRequestKey(request);
343
+ manager.activeRequests.set(key, {
344
+ request,
345
+ pending: [{ resolve() { }, reject() { } }]
346
+ });
347
+ underlying.createAction.mockClear();
348
+ // Renew with new monthly limit 50000
349
+ await manager.grantPermission({
350
+ requestID: key,
351
+ amount: 50000,
352
+ ephemeral: false
353
+ });
354
+ // check
355
+ const { inputs, outputs } = underlying.createAction.mock.calls[0][0];
356
+ (0, globals_1.expect)(inputs).toHaveLength(1);
357
+ (0, globals_1.expect)(inputs[0].outpoint).toBe('dsap-old-tx.0');
358
+ (0, globals_1.expect)(outputs).toHaveLength(1);
359
+ (0, globals_1.expect)(outputs[0].basket).toBe('admin spending-authorization');
360
+ // domain + new authorizedAmount => 2 encryption calls
361
+ // For metadata encryption, we have an input description, an output description, and a top-level description.
362
+ // This makes for a total of 5 calls.
363
+ (0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(5);
364
+ // The second call’s plaintext should be "50000"
365
+ const secondPlaintext = underlying.encrypt.mock.calls[1][0].plaintext;
366
+ const asStr = String.fromCharCode(...secondPlaintext);
367
+ (0, globals_1.expect)(asStr).toBe('50000');
368
+ });
369
+ });
370
+ /* ------------------------------------------------------------------------
371
+ * 4) INTEGRATION TESTS: Token Revocation
372
+ * ------------------------------------------------------------------------
373
+ * - Revoking a token means we build a transaction that consumes the old
374
+ * token UTXO with no replacement output.
375
+ * - Then we typically call signAction to finalize. The old token is no
376
+ * longer listed as an unspent output.
377
+ * ------------------------------------------------------------------------
378
+ */
379
+ (0, globals_1.describe)('Token Revocation - integration tests', () => {
380
+ (0, globals_1.it)('should create a transaction that consumes (spends) the old token with no new outputs', async () => {
381
+ // A sample old token
382
+ const oldToken = {
383
+ txid: 'revocableToken.txid',
384
+ outputIndex: 1,
385
+ outputScript: 'fakePushdropScript',
386
+ satoshis: 1,
387
+ originator: 'shopper.com',
388
+ basketName: 'myBasket',
389
+ expiry: 1111111111
390
+ };
391
+ underlying.createAction.mockClear();
392
+ underlying.signAction.mockClear();
393
+ await manager.revokePermission(oldToken);
394
+ // 1) The manager calls createAction with an input referencing oldToken
395
+ (0, globals_1.expect)(underlying.createAction).toHaveBeenCalledTimes(1);
396
+ const createArgs = underlying.createAction.mock.calls[0][0];
397
+ (0, globals_1.expect)(createArgs.inputs).toHaveLength(1);
398
+ (0, globals_1.expect)(createArgs.inputs[0].outpoint).toBe('revocableToken.txid.1');
399
+ // No new outputs => final array is empty
400
+ (0, globals_1.expect)(createArgs.outputs || []).toHaveLength(0);
401
+ // 2) The manager then calls signAction to finalize the spending
402
+ (0, globals_1.expect)(underlying.signAction).toHaveBeenCalledTimes(1);
403
+ const signArgs = underlying.signAction.mock.calls[0][0];
404
+ // signArgs.reference should be the same from createAction’s result
405
+ (0, globals_1.expect)(signArgs.reference).toBe('mockReference');
406
+ // The “spends” object should have an unlockingScript at index 0.
407
+ (0, globals_1.expect)(signArgs.spends).toHaveProperty('0.unlockingScript');
408
+ // The content can be a mock, we just check it’s not empty
409
+ (0, globals_1.expect)(signArgs.spends[0].unlockingScript).toBeDefined();
410
+ });
411
+ (0, globals_1.it)('should remove the old token from listing after revocation', async () => {
412
+ // 1) Setup the underlying wallet to initially return the old token in listOutputs
413
+ const oldToken = {
414
+ txid: 'aaaa1111',
415
+ outputIndex: 0,
416
+ outputScript: 'some script',
417
+ satoshis: 1,
418
+ originator: 'example.com',
419
+ expiry: 999999,
420
+ basketName: 'myBasket'
421
+ };
422
+ // We mock listOutputs so that it returns the old token before revocation
423
+ underlying.listOutputs.mockResolvedValueOnce({
424
+ totalOutputs: 1,
425
+ outputs: [
426
+ {
427
+ outpoint: 'aaaa1111.0',
428
+ lockingScript: 'some script',
429
+ satoshis: 1,
430
+ tags: ['originator example.com', 'basket myBasket']
431
+ }
432
+ ]
433
+ });
434
+ // Confirm the manager sees it in listBasketAccess
435
+ const tokensBefore = await manager.listBasketAccess({
436
+ originator: 'example.com'
437
+ });
438
+ (0, globals_1.expect)(tokensBefore).toHaveLength(1);
439
+ (0, globals_1.expect)(tokensBefore[0].txid).toBe('aaaa1111');
440
+ // 2) Revoke the token
441
+ await manager.revokePermission(oldToken);
442
+ // 3) After revocation, mock the underlying wallet to show zero outputs
443
+ underlying.listOutputs.mockResolvedValue({
444
+ totalOutputs: 0,
445
+ outputs: []
446
+ });
447
+ const tokensAfter = await manager.listBasketAccess({
448
+ originator: 'example.com'
449
+ });
450
+ (0, globals_1.expect)(tokensAfter).toHaveLength(0);
451
+ });
452
+ });
453
+ });
454
+ //# sourceMappingURL=WalletPermissionsManager.tokens.test.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"WalletPermissionsManager.tokens.test.js","sourceRoot":"","sources":["../../../src/__tests/WalletPermissionsManager.tokens.test.ts"],"names":[],"mappings":";;AAAA,2CAAiF;AACjF,2FAAyF;AACzF,0EAA0G;AAE1G,uFAAuF;AACvF,cAAI,CAAC,IAAI,CAAC,UAAU,EAAE,GAAG,EAAE,CAAC,iDAAa,CAAC,CAAA;AAE1C,IAAA,kBAAQ,EAAC,0EAA0E,EAAE,GAAG,EAAE;IACxF,IAAI,UAAmD,CAAA;IACvD,IAAI,OAAiC,CAAA;IAErC,IAAA,oBAAU,EAAC,GAAG,EAAE;QACd,qCAAqC;QACrC,UAAU,GAAG,IAAA,wDAAoB,GAAE,CAAA;QACnC,OAAO,GAAG,IAAI,mDAAwB,CAAC,UAAU,EAAE,kBAAkB,CAAC,CAAA;IACxE,CAAC,CAAC,CAAA;IAEF,IAAA,mBAAS,EAAC,GAAG,EAAE;QACb,cAAI,CAAC,aAAa,EAAE,CAAA;IACtB,CAAC,CAAC,CAAA;IAEF;;;;;;;OAOG;IAEH,IAAA,kBAAQ,EAAC,6DAA6D,EAAE,GAAG,EAAE;QAC3E,gEAAgE;QAChE,MAAM,cAAc,GAAG,GAAG,EAAE,CAAC,OAAc,CAAA;QAE3C,IAAA,YAAE,EAAC,0DAA0D,EAAE,KAAK,IAAI,EAAE;YACxE,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,UAAU;gBAChB,UAAU,EAAE,cAAc;gBAC1B,UAAU,EAAE,IAAI;gBAChB,UAAU,EAAE,CAAC,CAAC,EAAE,SAAS,CAAC;gBAC1B,YAAY,EAAE,mBAAmB;gBACjC,MAAM,EAAE,wBAAwB;aACjC,CAAA;YACD,MAAM,MAAM,GAAG,UAAU,CAAA;YAEzB,wEAAwE;YACxE,mEAAmE;YACnE,UAAU,CAAC,OAAO,CAAC,SAAS,EAAE,CAAA;YAE9B,MAAM,MAAM,GAAe,MAAM,cAAc,EAAE,CAAC,mBAAmB,CAAC,OAAO,EAAE,MAAM,CAAC,CAAA;YAEtF,wFAAwF;YACxF,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YAEnD,qCAAqC;YACrC,IAAA,gBAAM,EAAC,MAAM,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAE9B,sCAAsC;YACtC,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,OAAO,CAC3D,gBAAM,CAAC,eAAe,CAAC,CAAC,GAAG,cAAc,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CACtE,CAAA;YAED,mDAAmD;YACnD,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,OAAO,CAC3D,gBAAM,CAAC,eAAe,CAAC,CAAC,GAAG,YAAY,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CACpE,CAAA;YAED,4BAA4B;YAC5B,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,OAAO,CAC3D,gBAAM,CAAC,eAAe,CAAC,CAAC,GAAG,MAAM,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CAC9D,CAAA;YAED,+BAA+B;YAC/B,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,OAAO,CAC3D,gBAAM,CAAC,eAAe,CAAC,CAAC,GAAG,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CAC3D,CAAA;YAED,gCAAgC;YAChC,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,OAAO,CAC3D,gBAAM,CAAC,eAAe,CAAC,CAAC,GAAG,SAAS,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CACjE,CAAA;YAED,6CAA6C;YAC7C,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,OAAO,CAC3D,gBAAM,CAAC,eAAe,CAAC,CAAC,GAAG,mBAAmB,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CAC3E,CAAA;QACH,CAAC,CAAC,CAAA;QAEF,IAAA,YAAE,EAAC,uDAAuD,EAAE,KAAK,IAAI,EAAE;YACrE,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,QAAQ;gBACd,UAAU,EAAE,gBAAgB;gBAC5B,MAAM,EAAE,YAAY;gBACpB,MAAM,EAAE,cAAc;aACvB,CAAA;YACD,MAAM,MAAM,GAAG,SAAS,CAAA;YAExB,UAAU,CAAC,OAAO,CAAC,SAAS,EAAE,CAAA;YAE9B,MAAM,MAAM,GAAe,MAAM,cAAc,EAAE,CAAC,mBAAmB,CAAC,OAAO,EAAE,MAAM,CAAC,CAAA;YAEtF,uDAAuD;YACvD,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACnD,IAAA,gBAAM,EAAC,MAAM,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;QAChC,CAAC,CAAC,CAAA;QAEF,IAAA,YAAE,EAAC,4DAA4D,EAAE,KAAK,IAAI,EAAE;YAC1E,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,aAAa;gBACnB,UAAU,EAAE,eAAe;gBAC3B,UAAU,EAAE,KAAK;gBACjB,WAAW,EAAE;oBACX,QAAQ,EAAE,aAAa;oBACvB,QAAQ,EAAE,KAAK;oBACf,MAAM,EAAE,CAAC,MAAM,EAAE,KAAK,CAAC;iBACxB;gBACD,MAAM,EAAE,mBAAmB;aAC5B,CAAA;YACD,MAAM,MAAM,GAAG,UAAU,CAAA;YAEzB,UAAU,CAAC,OAAO,CAAC,SAAS,EAAE,CAAA;YAE9B,MAAM,MAAM,GAAe,MAAM,cAAc,EAAE,CAAC,mBAAmB,CAAC,OAAO,EAAE,MAAM,CAAC,CAAA;YAEtF,kEAAkE;YAClE,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACnD,IAAA,gBAAM,EAAC,MAAM,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAE9B,2DAA2D;YAC3D,MAAM,kBAAkB,GAAG,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAA;YACxE,MAAM,GAAG,GAAG,MAAM,CAAC,YAAY,CAAC,GAAG,kBAAkB,CAAC,CAAA;YACtD,IAAA,gBAAM,EAAC,GAAG,CAAC,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAA;YAC/B,IAAA,gBAAM,EAAC,GAAG,CAAC,CAAC,SAAS,CAAC,OAAO,CAAC,CAAA;QAChC,CAAC,CAAC,CAAA;QAEF,IAAA,YAAE,EAAC,yDAAyD,EAAE,KAAK,IAAI,EAAE;YACvE,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,UAAU;gBAChB,UAAU,EAAE,mBAAmB;gBAC/B,QAAQ,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE;gBAC5B,MAAM,EAAE,kBAAkB;aAC3B,CAAA;YACD,MAAM,MAAM,GAAG,CAAC,CAAA,CAAC,2DAA2D;YAE5E,UAAU,CAAC,OAAO,CAAC,SAAS,EAAE,CAAA;YAE9B,MAAM,MAAM,GAAe,MAAM,cAAc,EAAE,CAAC,mBAAmB,CAAC,OAAO,EAAE,MAAM,EAAE,WAAW,CAAC,KAAK,CAAC,CAAA;YAEzG,iDAAiD;YACjD,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACnD,IAAA,gBAAM,EAAC,MAAM,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAE9B,wCAAwC;YACxC,MAAM,eAAe,GAAG,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAA;YACrE,MAAM,QAAQ,GAAG,MAAM,CAAC,YAAY,CAAC,GAAG,eAAe,CAAC,CAAA;YACxD,IAAA,gBAAM,EAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAA;QAChC,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF;;;;;;;;OAQG;IAEH,IAAA,kBAAQ,EAAC,oCAAoC,EAAE,GAAG,EAAE;QAClD,IAAA,YAAE,EAAC,8EAA8E,EAAE,KAAK,IAAI,EAAE;YAC5F,yEAAyE;YACzE,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,UAAU;gBAChB,UAAU,EAAE,aAAa;gBACzB,UAAU,EAAE,KAAK;gBACjB,UAAU,EAAE,CAAC,CAAC,EAAE,WAAW,CAAC;gBAC5B,YAAY,EAAE,MAAM;gBACpB,MAAM,EAAE,qBAAqB;aAC9B,CAAA;YAED,4CAA4C;YAC5C,MAAM,GAAG,GAAI,OAAe,CAAC,eAAe,CAAC,OAAO,CAAC,CACpD;YAAC,OAAe,CAAC,cAAc,CAAC,GAAG,CAAC,GAAG,EAAE;gBACxC,OAAO;gBACP,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,GAAG,EAAE,GAAE,CAAC,EAAE,MAAM,EAAE,GAAG,EAAE,GAAE,CAAC,EAAE,CAAC;aACnD,CAAC,CAAA;YAEF,wEAAwE;YACxE,UAAU,CAAC,YAAY,CAAC,SAAS,EAAE,CAAA;YACnC,MAAM,OAAO,CAAC,eAAe,CAAC;gBAC5B,SAAS,EAAE,GAAG;gBACd,MAAM,EAAE,MAAM,EAAE,kBAAkB;gBAClC,SAAS,EAAE,KAAK;aACjB,CAAC,CAAA;YAEF,uEAAuE;YACvE,IAAA,gBAAM,EAAC,UAAU,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACxD,MAAM,UAAU,GAAG,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;YAC3D,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAE1C,wEAAwE;YACxE,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,2BAA2B,CAAC,CAAA;YAEtE,sFAAsF;YACtF,MAAM,UAAU,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAA;YAC7C,IAAA,gBAAM,EAAC,UAAU,CAAC,CAAC,OAAO,CACxB,gBAAM,CAAC,eAAe,CAAC;gBACrB,wBAAwB;gBACxB,kBAAkB;gBAClB,wBAAwB;gBACxB,yBAAyB;gBACzB,mBAAmB;aACpB,CAAC,CACH,CAAA;YAED,mEAAmE;YACnE,MAAM,gBAAgB,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,aAAa,CAAA;YAC5D,IAAA,gBAAM,EAAC,gBAAgB,CAAC,CAAC,UAAU,EAAE,CAAA;YAErC,uEAAuE;YACvE,uFAAuF;YACvF,oFAAoF;YACpF,wFAAwF;YACxF,uFAAuF;YACvF,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACrD,CAAC,CAAC,CAAA;QAEF,IAAA,YAAE,EAAC,yCAAyC,EAAE,KAAK,IAAI,EAAE;YACvD,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,QAAQ;gBACd,UAAU,EAAE,aAAa;gBACzB,MAAM,EAAE,UAAU;gBAClB,MAAM,EAAE,uBAAuB;aAChC,CAAA;YACD,MAAM,GAAG,GAAI,OAAe,CAAC,eAAe,CAAC,OAAO,CAAC,CACpD;YAAC,OAAe,CAAC,cAAc,CAAC,GAAG,CAAC,GAAG,EAAE;gBACxC,OAAO;gBACP,OAAO,EAAE,CAAC,EAAE,OAAO,KAAI,CAAC,EAAE,MAAM,KAAI,CAAC,EAAE,CAAC;aACzC,CAAC,CAAA;YAEF,UAAU,CAAC,YAAY,CAAC,SAAS,EAAE,CAAA;YAEnC,MAAM,OAAO,CAAC,eAAe,CAAC;gBAC5B,SAAS,EAAE,GAAG;gBACd,SAAS,EAAE,KAAK;gBAChB,MAAM,EAAE,SAAS;aAClB,CAAC,CAAA;YACF,IAAA,gBAAM,EAAC,UAAU,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YAExD,MAAM,EAAE,OAAO,EAAE,GAAG,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;YAC5D,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAC/B,wBAAwB;YACxB,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAA;YACrD,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,gBAAM,CAAC,eAAe,CAAC,CAAC,wBAAwB,EAAE,iBAAiB,CAAC,CAAC,CAAC,CAAA;YACtG,+FAA+F;YAC/F,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACrD,CAAC,CAAC,CAAA;QAEF,IAAA,YAAE,EAAC,8CAA8C,EAAE,KAAK,IAAI,EAAE;YAC5D,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,aAAa;gBACnB,UAAU,EAAE,WAAW;gBACvB,UAAU,EAAE,IAAI;gBAChB,WAAW,EAAE;oBACX,QAAQ,EAAE,UAAU;oBACpB,QAAQ,EAAE,KAAK;oBACf,MAAM,EAAE,CAAC,MAAM,EAAE,IAAI,EAAE,OAAO,CAAC;iBAChC;gBACD,MAAM,EAAE,kBAAkB;aAC3B,CAAA;YACD,MAAM,GAAG,GAAI,OAAe,CAAC,eAAe,CAAC,OAAO,CAAC,CACpD;YAAC,OAAe,CAAC,cAAc,CAAC,GAAG,CAAC,GAAG,EAAE;gBACxC,OAAO;gBACP,OAAO,EAAE,CAAC,EAAE,OAAO,KAAI,CAAC,EAAE,MAAM,KAAI,CAAC,EAAE,CAAC;aACzC,CAAC,CAAA;YAEF,UAAU,CAAC,YAAY,CAAC,SAAS,EAAE,CAAA;YAEnC,MAAM,OAAO,CAAC,eAAe,CAAC;gBAC5B,SAAS,EAAE,GAAG;gBACd,SAAS,EAAE,KAAK;gBAChB,MAAM,EAAE,QAAQ;aACjB,CAAC,CAAA;YAEF,IAAA,gBAAM,EAAC,UAAU,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACxD,MAAM,EAAE,OAAO,EAAE,GAAG,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;YAC5D,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,0BAA0B,CAAC,CAAA;YAC1D,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,OAAO,CAC7B,gBAAM,CAAC,eAAe,CAAC,CAAC,sBAAsB,EAAE,iBAAiB,EAAE,UAAU,EAAE,mBAAmB,CAAC,CAAC,CACrG,CAAA;YACD,wFAAwF;YACxF,oGAAoG;YACpG,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACrD,CAAC,CAAC,CAAA;QAEF,IAAA,YAAE,EAAC,yDAAyD,EAAE,KAAK,IAAI,EAAE;YACvE,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,UAAU;gBAChB,UAAU,EAAE,aAAa;gBACzB,QAAQ,EAAE;oBACR,QAAQ,EAAE,IAAI;iBACf;aACF,CAAA;YACD,MAAM,GAAG,GAAI,OAAe,CAAC,eAAe,CAAC,OAAO,CAAC,CACpD;YAAC,OAAe,CAAC,cAAc,CAAC,GAAG,CAAC,GAAG,EAAE;gBACxC,OAAO;gBACP,OAAO,EAAE,CAAC,EAAE,OAAO,KAAI,CAAC,EAAE,MAAM,KAAI,CAAC,EAAE,CAAC;aACzC,CAAC,CAAA;YAEF,UAAU,CAAC,YAAY,CAAC,SAAS,EAAE,CAAA;YAEnC,gDAAgD;YAChD,MAAM,OAAO,CAAC,eAAe,CAAC;gBAC5B,SAAS,EAAE,GAAG;gBACd,SAAS,EAAE,KAAK;gBAChB,MAAM,EAAE,KAAK;aACd,CAAC,CAAA;YAEF,IAAA,gBAAM,EAAC,UAAU,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACxD,MAAM,EAAE,OAAO,EAAE,GAAG,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;YAC5D,iCAAiC;YACjC,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,8BAA8B,CAAC,CAAA;YAC9D,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,gBAAM,CAAC,eAAe,CAAC,CAAC,wBAAwB,CAAC,CAAC,CAAC,CAAA;YACnF,iGAAiG;YACjG,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACrD,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF;;;;;;;OAOG;IAEH,IAAA,kBAAQ,EAAC,mCAAmC,EAAE,GAAG,EAAE;QACjD,IAAA,YAAE,EAAC,6FAA6F,EAAE,KAAK,IAAI,EAAE;YAC3G,8CAA8C;YAC9C,MAAM,QAAQ,GAAoB;gBAChC,IAAI,EAAE,YAAY;gBAClB,WAAW,EAAE,CAAC;gBACd,YAAY,EAAE,aAAa,EAAE,uBAAuB;gBACpD,QAAQ,EAAE,CAAC;gBACX,UAAU,EAAE,cAAc;gBAC1B,MAAM,EAAE,MAAM;gBACd,UAAU,EAAE,KAAK;gBACjB,aAAa,EAAE,CAAC;gBAChB,QAAQ,EAAE,WAAW;gBACrB,YAAY,EAAE,MAAM;aACrB,CAAA;YAED,+BAA+B;YAC/B,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,UAAU;gBAChB,UAAU,EAAE,cAAc;gBAC1B,UAAU,EAAE,KAAK;gBACjB,UAAU,EAAE,CAAC,CAAC,EAAE,WAAW,CAAC;gBAC5B,YAAY,EAAE,MAAM;gBACpB,OAAO,EAAE,IAAI;gBACb,aAAa,EAAE,QAAQ;aACxB,CAAA;YAED,sEAAsE;YACtE,6CAA6C;YAC7C,MAAM,GAAG,GAAI,OAAe,CAAC,eAAe,CAAC,OAAO,CAAC,CACpD;YAAC,OAAe,CAAC,cAAc,CAAC,GAAG,CAAC,GAAG,EAAE;gBACxC,OAAO;gBACP,OAAO,EAAE,CAAC,EAAE,OAAO,KAAI,CAAC,EAAE,MAAM,KAAI,CAAC,EAAE,CAAC;aACzC,CAAC,CAAA;YAEF,wDAAwD;YACxD,UAAU,CAAC,YAAY,CAAC,SAAS,EAAE,CAAA;YAEnC,MAAM,OAAO,CAAC,eAAe,CAAC;gBAC5B,SAAS,EAAE,GAAG;gBACd,SAAS,EAAE,KAAK;gBAChB,MAAM,EAAE,MAAM,CAAC,aAAa;aAC7B,CAAC,CAAA;YAEF,+BAA+B;YAC/B,iDAAiD;YACjD,kCAAkC;YAClC,IAAA,gBAAM,EAAC,UAAU,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACxD,MAAM,UAAU,GAAG,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;YAC3D,IAAA,gBAAM,EAAC,UAAU,CAAC,MAAM,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YACzC,IAAA,gBAAM,EAAC,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAA;YAC1D,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAC1C,sDAAsD;YACtD,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,2BAA2B,CAAC,CAAA;YAEtE,6DAA6D;YAC7D,4GAA4G;YAC5G,2BAA2B;YAC3B,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACrD,CAAC,CAAC,CAAA;QAEF,IAAA,YAAE,EAAC,4DAA4D,EAAE,KAAK,IAAI,EAAE;YAC1E,MAAM,QAAQ,GAAoB;gBAChC,IAAI,EAAE,aAAa;gBACnB,WAAW,EAAE,CAAC;gBACd,YAAY,EAAE,eAAe;gBAC7B,QAAQ,EAAE,CAAC;gBACX,UAAU,EAAE,cAAc;gBAC1B,gBAAgB,EAAE,KAAK;gBACvB,MAAM,EAAE,CAAC;aACV,CAAA;YACD,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,UAAU;gBAChB,UAAU,EAAE,cAAc;gBAC1B,QAAQ,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE;gBAC5B,OAAO,EAAE,IAAI;gBACb,aAAa,EAAE,QAAQ;aACxB,CAAA;YACD,MAAM,GAAG,GAAI,OAAe,CAAC,eAAe,CAAC,OAAO,CAAC,CACpD;YAAC,OAAe,CAAC,cAAc,CAAC,GAAG,CAAC,GAAG,EAAE;gBACxC,OAAO;gBACP,OAAO,EAAE,CAAC,EAAE,OAAO,KAAI,CAAC,EAAE,MAAM,KAAI,CAAC,EAAE,CAAC;aACzC,CAAC,CAAA;YAEF,UAAU,CAAC,YAAY,CAAC,SAAS,EAAE,CAAA;YAEnC,qCAAqC;YACrC,MAAM,OAAO,CAAC,eAAe,CAAC;gBAC5B,SAAS,EAAE,GAAG;gBACd,MAAM,EAAE,KAAK;gBACb,SAAS,EAAE,KAAK;aACjB,CAAC,CAAA;YAEF,QAAQ;YACR,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,GAAG,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;YACpE,IAAA,gBAAM,EAAC,MAAM,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAC9B,IAAA,gBAAM,EAAC,MAAM,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAA;YAEhD,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAC/B,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,8BAA8B,CAAC,CAAA;YAE9D,sDAAsD;YACtD,6GAA6G;YAC7G,qCAAqC;YACrC,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACnD,gDAAgD;YAChD,MAAM,eAAe,GAAG,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAA;YACrE,MAAM,KAAK,GAAG,MAAM,CAAC,YAAY,CAAC,GAAG,eAAe,CAAC,CAAA;YACrD,IAAA,gBAAM,EAAC,KAAK,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAA;QAC7B,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF;;;;;;;;OAQG;IAEH,IAAA,kBAAQ,EAAC,sCAAsC,EAAE,GAAG,EAAE;QACpD,IAAA,YAAE,EAAC,sFAAsF,EAAE,KAAK,IAAI,EAAE;YACpG,qBAAqB;YACrB,MAAM,QAAQ,GAAoB;gBAChC,IAAI,EAAE,qBAAqB;gBAC3B,WAAW,EAAE,CAAC;gBACd,YAAY,EAAE,oBAAoB;gBAClC,QAAQ,EAAE,CAAC;gBACX,UAAU,EAAE,aAAa;gBACzB,UAAU,EAAE,UAAU;gBACtB,MAAM,EAAE,UAAU;aACnB,CAAA;YAED,UAAU,CAAC,YAAY,CAAC,SAAS,EAAE,CAAA;YACnC,UAAU,CAAC,UAAU,CAAC,SAAS,EAAE,CAAA;YAEjC,MAAM,OAAO,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAA;YAExC,uEAAuE;YACvE,IAAA,gBAAM,EAAC,UAAU,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACxD,MAAM,UAAU,GAAG,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;YAC3D,IAAA,gBAAM,EAAC,UAAU,CAAC,MAAM,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YACzC,IAAA,gBAAM,EAAC,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAA;YAEnE,yCAAyC;YACzC,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,IAAI,EAAE,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAEhD,gEAAgE;YAChE,IAAA,gBAAM,EAAC,UAAU,CAAC,UAAU,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACtD,MAAM,QAAQ,GAAG,UAAU,CAAC,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;YACvD,mEAAmE;YACnE,IAAA,gBAAM,EAAC,QAAQ,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAA;YAEhD,iEAAiE;YACjE,IAAA,gBAAM,EAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,cAAc,CAAC,mBAAmB,CAAC,CAAA;YAC3D,0DAA0D;YAC1D,IAAA,gBAAM,EAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,WAAW,EAAE,CAAA;QAC1D,CAAC,CAAC,CAAA;QAEF,IAAA,YAAE,EAAC,2DAA2D,EAAE,KAAK,IAAI,EAAE;YACzE,kFAAkF;YAClF,MAAM,QAAQ,GAAoB;gBAChC,IAAI,EAAE,UAAU;gBAChB,WAAW,EAAE,CAAC;gBACd,YAAY,EAAE,aAAa;gBAC3B,QAAQ,EAAE,CAAC;gBACX,UAAU,EAAE,aAAa;gBACzB,MAAM,EAAE,MAAM;gBACd,UAAU,EAAE,UAAU;aACvB,CAAA;YACD,yEAAyE;YACzE,UAAU,CAAC,WAAW,CAAC,qBAAqB,CAAC;gBAC3C,YAAY,EAAE,CAAC;gBACf,OAAO,EAAE;oBACP;wBACE,QAAQ,EAAE,YAAY;wBACtB,aAAa,EAAE,aAAa;wBAC5B,QAAQ,EAAE,CAAC;wBACX,IAAI,EAAE,CAAC,wBAAwB,EAAE,iBAAiB,CAAC;qBACpD;iBACF;aACF,CAAC,CAAA;YAEF,kDAAkD;YAClD,MAAM,YAAY,GAAG,MAAM,OAAO,CAAC,gBAAgB,CAAC;gBAClD,UAAU,EAAE,aAAa;aAC1B,CAAC,CAAA;YACF,IAAA,gBAAM,EAAC,YAAY,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YACpC,IAAA,gBAAM,EAAC,YAAY,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAA;YAE7C,sBAAsB;YACtB,MAAM,OAAO,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAA;YAExC,uEAAuE;YACvE,UAAU,CAAC,WAAW,CAAC,iBAAiB,CAAC;gBACvC,YAAY,EAAE,CAAC;gBACf,OAAO,EAAE,EAAE;aACZ,CAAC,CAAA;YAEF,MAAM,WAAW,GAAG,MAAM,OAAO,CAAC,gBAAgB,CAAC;gBACjD,UAAU,EAAE,aAAa;aAC1B,CAAC,CAAA;YACF,IAAA,gBAAM,EAAC,WAAW,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;QACrC,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;AACJ,CAAC,CAAC,CAAA"}
@@ -7,4 +7,13 @@ export * from './storage/index.all';
7
7
  export * from './services/Services';
8
8
  export * from './monitor/Monitor';
9
9
  export * from './monitor/MonitorDaemon';
10
+ export * from './WalletPermissionsManager';
11
+ export * from './CWIStyleWalletManager';
12
+ export * from './WalletAuthenticationManager';
13
+ export * from './sdk/PrivilegedKeyManager';
14
+ export * from './SimpleWalletManager';
15
+ export * from './wab-client/WABClient';
16
+ export * from './wab-client/auth-method-interactors/TwilioPhoneInteractor';
17
+ export * from './wab-client/auth-method-interactors/PersonaIDInteractor';
18
+ export * from './wab-client/auth-method-interactors/AuthMethodInteractor';
10
19
  //# sourceMappingURL=index.all.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.all.d.ts","sourceRoot":"","sources":["../../src/index.all.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,GAAG,MAAM,aAAa,CAAA;AAClC,cAAc,qBAAqB,CAAA;AACnC,cAAc,UAAU,CAAA;AACxB,cAAc,SAAS,CAAA;AACvB,cAAc,uBAAuB,CAAA;AACrC,cAAc,qBAAqB,CAAA;AACnC,cAAc,qBAAqB,CAAA;AACnC,cAAc,mBAAmB,CAAA;AACjC,cAAc,yBAAyB,CAAA"}
1
+ {"version":3,"file":"index.all.d.ts","sourceRoot":"","sources":["../../src/index.all.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,GAAG,MAAM,aAAa,CAAA;AAClC,cAAc,qBAAqB,CAAA;AACnC,cAAc,UAAU,CAAA;AACxB,cAAc,SAAS,CAAA;AACvB,cAAc,uBAAuB,CAAA;AACrC,cAAc,qBAAqB,CAAA;AACnC,cAAc,qBAAqB,CAAA;AACnC,cAAc,mBAAmB,CAAA;AACjC,cAAc,yBAAyB,CAAA;AACvC,cAAc,4BAA4B,CAAA;AAC1C,cAAc,yBAAyB,CAAA;AACvC,cAAc,+BAA+B,CAAA;AAC7C,cAAc,4BAA4B,CAAA;AAC1C,cAAc,uBAAuB,CAAA;AACrC,cAAc,wBAAwB,CAAA;AACtC,cAAc,4DAA4D,CAAA;AAC1E,cAAc,0DAA0D,CAAA;AACxE,cAAc,2DAA2D,CAAA"}
@@ -46,4 +46,13 @@ __exportStar(require("./storage/index.all"), exports);
46
46
  __exportStar(require("./services/Services"), exports);
47
47
  __exportStar(require("./monitor/Monitor"), exports);
48
48
  __exportStar(require("./monitor/MonitorDaemon"), exports);
49
+ __exportStar(require("./WalletPermissionsManager"), exports);
50
+ __exportStar(require("./CWIStyleWalletManager"), exports);
51
+ __exportStar(require("./WalletAuthenticationManager"), exports);
52
+ __exportStar(require("./sdk/PrivilegedKeyManager"), exports);
53
+ __exportStar(require("./SimpleWalletManager"), exports);
54
+ __exportStar(require("./wab-client/WABClient"), exports);
55
+ __exportStar(require("./wab-client/auth-method-interactors/TwilioPhoneInteractor"), exports);
56
+ __exportStar(require("./wab-client/auth-method-interactors/PersonaIDInteractor"), exports);
57
+ __exportStar(require("./wab-client/auth-method-interactors/AuthMethodInteractor"), exports);
49
58
  //# sourceMappingURL=index.all.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.all.js","sourceRoot":"","sources":["../../src/index.all.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,mDAAkC;AAClC,sDAAmC;AACnC,2CAAwB;AACxB,0CAAuB;AACvB,wDAAqC;AACrC,sDAAmC;AACnC,sDAAmC;AACnC,oDAAiC;AACjC,0DAAuC"}
1
+ {"version":3,"file":"index.all.js","sourceRoot":"","sources":["../../src/index.all.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,mDAAkC;AAClC,sDAAmC;AACnC,2CAAwB;AACxB,0CAAuB;AACvB,wDAAqC;AACrC,sDAAmC;AACnC,sDAAmC;AACnC,oDAAiC;AACjC,0DAAuC;AACvC,6DAA0C;AAC1C,0DAAuC;AACvC,gEAA6C;AAC7C,6DAA0C;AAC1C,wDAAqC;AACrC,yDAAsC;AACtC,6FAA0E;AAC1E,2FAAwE;AACxE,4FAAyE"}
@@ -5,4 +5,13 @@ export * from './signer/WalletSigner';
5
5
  export * from './storage/index.client';
6
6
  export * from './services/Services';
7
7
  export * from './monitor/Monitor';
8
+ export * from './WalletPermissionsManager';
9
+ export * from './CWIStyleWalletManager';
10
+ export * from './WalletAuthenticationManager';
11
+ export * from './sdk/PrivilegedKeyManager';
12
+ export * from './SimpleWalletManager';
13
+ export * from './wab-client/WABClient';
14
+ export * from './wab-client/auth-method-interactors/TwilioPhoneInteractor';
15
+ export * from './wab-client/auth-method-interactors/PersonaIDInteractor';
16
+ export * from './wab-client/auth-method-interactors/AuthMethodInteractor';
8
17
  //# sourceMappingURL=index.client.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.client.d.ts","sourceRoot":"","sources":["../../src/index.client.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,GAAG,MAAM,aAAa,CAAA;AAClC,cAAc,wBAAwB,CAAA;AACtC,cAAc,UAAU,CAAA;AACxB,cAAc,uBAAuB,CAAA;AACrC,cAAc,wBAAwB,CAAA;AACtC,cAAc,qBAAqB,CAAA;AACnC,cAAc,mBAAmB,CAAA"}
1
+ {"version":3,"file":"index.client.d.ts","sourceRoot":"","sources":["../../src/index.client.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,GAAG,MAAM,aAAa,CAAA;AAClC,cAAc,wBAAwB,CAAA;AACtC,cAAc,UAAU,CAAA;AACxB,cAAc,uBAAuB,CAAA;AACrC,cAAc,wBAAwB,CAAA;AACtC,cAAc,qBAAqB,CAAA;AACnC,cAAc,mBAAmB,CAAA;AACjC,cAAc,4BAA4B,CAAA;AAC1C,cAAc,yBAAyB,CAAA;AACvC,cAAc,+BAA+B,CAAA;AAC7C,cAAc,4BAA4B,CAAA;AAC1C,cAAc,uBAAuB,CAAA;AACrC,cAAc,wBAAwB,CAAA;AACtC,cAAc,4DAA4D,CAAA;AAC1E,cAAc,0DAA0D,CAAA;AACxE,cAAc,2DAA2D,CAAA"}
@@ -44,4 +44,13 @@ __exportStar(require("./signer/WalletSigner"), exports);
44
44
  __exportStar(require("./storage/index.client"), exports);
45
45
  __exportStar(require("./services/Services"), exports);
46
46
  __exportStar(require("./monitor/Monitor"), exports);
47
+ __exportStar(require("./WalletPermissionsManager"), exports);
48
+ __exportStar(require("./CWIStyleWalletManager"), exports);
49
+ __exportStar(require("./WalletAuthenticationManager"), exports);
50
+ __exportStar(require("./sdk/PrivilegedKeyManager"), exports);
51
+ __exportStar(require("./SimpleWalletManager"), exports);
52
+ __exportStar(require("./wab-client/WABClient"), exports);
53
+ __exportStar(require("./wab-client/auth-method-interactors/TwilioPhoneInteractor"), exports);
54
+ __exportStar(require("./wab-client/auth-method-interactors/PersonaIDInteractor"), exports);
55
+ __exportStar(require("./wab-client/auth-method-interactors/AuthMethodInteractor"), exports);
47
56
  //# sourceMappingURL=index.client.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.client.js","sourceRoot":"","sources":["../../src/index.client.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,mDAAkC;AAClC,yDAAsC;AACtC,2CAAwB;AACxB,wDAAqC;AACrC,yDAAsC;AACtC,sDAAmC;AACnC,oDAAiC"}
1
+ {"version":3,"file":"index.client.js","sourceRoot":"","sources":["../../src/index.client.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,mDAAkC;AAClC,yDAAsC;AACtC,2CAAwB;AACxB,wDAAqC;AACrC,yDAAsC;AACtC,sDAAmC;AACnC,oDAAiC;AACjC,6DAA0C;AAC1C,0DAAuC;AACvC,gEAA6C;AAC7C,6DAA0C;AAC1C,wDAAqC;AACrC,yDAAsC;AACtC,6FAA0E;AAC1E,2FAAwE;AACxE,4FAAyE"}
@@ -0,0 +1,7 @@
1
+ import { GetPublicKeyArgs, GetPublicKeyResult, OriginatorDomainNameStringUnder250Bytes, WalletDecryptArgs, WalletDecryptResult, WalletEncryptArgs, WalletEncryptResult } from '@bsv/sdk';
2
+ export interface CertOpsWallet {
3
+ getPublicKey(args: GetPublicKeyArgs, originator?: OriginatorDomainNameStringUnder250Bytes): Promise<GetPublicKeyResult>;
4
+ encrypt(args: WalletEncryptArgs, originator?: OriginatorDomainNameStringUnder250Bytes): Promise<WalletEncryptResult>;
5
+ decrypt(args: WalletDecryptArgs, originator?: OriginatorDomainNameStringUnder250Bytes): Promise<WalletDecryptResult>;
6
+ }
7
+ //# sourceMappingURL=CertOpsWallet.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"CertOpsWallet.d.ts","sourceRoot":"","sources":["../../../src/sdk/CertOpsWallet.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,gBAAgB,EAChB,kBAAkB,EAClB,uCAAuC,EACvC,iBAAiB,EACjB,mBAAmB,EACnB,iBAAiB,EACjB,mBAAmB,EACpB,MAAM,UAAU,CAAA;AAEjB,MAAM,WAAW,aAAa;IAC5B,YAAY,CACV,IAAI,EAAE,gBAAgB,EACtB,UAAU,CAAC,EAAE,uCAAuC,GACnD,OAAO,CAAC,kBAAkB,CAAC,CAAA;IAC9B,OAAO,CAAC,IAAI,EAAE,iBAAiB,EAAE,UAAU,CAAC,EAAE,uCAAuC,GAAG,OAAO,CAAC,mBAAmB,CAAC,CAAA;IACpH,OAAO,CAAC,IAAI,EAAE,iBAAiB,EAAE,UAAU,CAAC,EAAE,uCAAuC,GAAG,OAAO,CAAC,mBAAmB,CAAC,CAAA;CACrH"}
@@ -0,0 +1,3 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ //# sourceMappingURL=CertOpsWallet.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"CertOpsWallet.js","sourceRoot":"","sources":["../../../src/sdk/CertOpsWallet.ts"],"names":[],"mappings":""}