@bsv/wallet-toolbox 1.1.61 → 1.2.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/docs/client.md +2339 -182
- package/docs/wallet.md +2339 -182
- package/out/src/CWIStyleWalletManager.d.ts +417 -0
- package/out/src/CWIStyleWalletManager.d.ts.map +1 -0
- package/out/src/CWIStyleWalletManager.js +1153 -0
- package/out/src/CWIStyleWalletManager.js.map +1 -0
- package/out/src/SimpleWalletManager.d.ts +169 -0
- package/out/src/SimpleWalletManager.d.ts.map +1 -0
- package/out/src/SimpleWalletManager.js +315 -0
- package/out/src/SimpleWalletManager.js.map +1 -0
- package/out/src/Wallet.d.ts +6 -1
- package/out/src/Wallet.d.ts.map +1 -1
- package/out/src/Wallet.js +39 -7
- package/out/src/Wallet.js.map +1 -1
- package/out/src/WalletAuthenticationManager.d.ts +33 -0
- package/out/src/WalletAuthenticationManager.d.ts.map +1 -0
- package/out/src/WalletAuthenticationManager.js +110 -0
- package/out/src/WalletAuthenticationManager.js.map +1 -0
- package/out/src/WalletPermissionsManager.d.ts +575 -0
- package/out/src/WalletPermissionsManager.d.ts.map +1 -0
- package/out/src/WalletPermissionsManager.js +1789 -0
- package/out/src/WalletPermissionsManager.js.map +1 -0
- package/out/src/WalletSettingsManager.d.ts +59 -0
- package/out/src/WalletSettingsManager.d.ts.map +1 -0
- package/out/src/WalletSettingsManager.js +189 -0
- package/out/src/WalletSettingsManager.js.map +1 -0
- package/out/src/__tests/CWIStyleWalletManager.test.d.ts +2 -0
- package/out/src/__tests/CWIStyleWalletManager.test.d.ts.map +1 -0
- package/out/src/__tests/CWIStyleWalletManager.test.js +471 -0
- package/out/src/__tests/CWIStyleWalletManager.test.js.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.callbacks.test.d.ts +2 -0
- package/out/src/__tests/WalletPermissionsManager.callbacks.test.d.ts.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.callbacks.test.js +239 -0
- package/out/src/__tests/WalletPermissionsManager.callbacks.test.js.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.checks.test.d.ts +2 -0
- package/out/src/__tests/WalletPermissionsManager.checks.test.d.ts.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.checks.test.js +637 -0
- package/out/src/__tests/WalletPermissionsManager.checks.test.js.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.encryption.test.d.ts +2 -0
- package/out/src/__tests/WalletPermissionsManager.encryption.test.d.ts.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.encryption.test.js +295 -0
- package/out/src/__tests/WalletPermissionsManager.encryption.test.js.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.fixtures.d.ts +83 -0
- package/out/src/__tests/WalletPermissionsManager.fixtures.d.ts.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.fixtures.js +261 -0
- package/out/src/__tests/WalletPermissionsManager.fixtures.js.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.flows.test.d.ts +2 -0
- package/out/src/__tests/WalletPermissionsManager.flows.test.d.ts.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.flows.test.js +377 -0
- package/out/src/__tests/WalletPermissionsManager.flows.test.js.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.initialization.test.d.ts +2 -0
- package/out/src/__tests/WalletPermissionsManager.initialization.test.d.ts.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.initialization.test.js +227 -0
- package/out/src/__tests/WalletPermissionsManager.initialization.test.js.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.proxying.test.d.ts +2 -0
- package/out/src/__tests/WalletPermissionsManager.proxying.test.d.ts.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.proxying.test.js +566 -0
- package/out/src/__tests/WalletPermissionsManager.proxying.test.js.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.tokens.test.d.ts +2 -0
- package/out/src/__tests/WalletPermissionsManager.tokens.test.d.ts.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.tokens.test.js +454 -0
- package/out/src/__tests/WalletPermissionsManager.tokens.test.js.map +1 -0
- package/out/src/index.all.d.ts +9 -0
- package/out/src/index.all.d.ts.map +1 -1
- package/out/src/index.all.js +9 -0
- package/out/src/index.all.js.map +1 -1
- package/out/src/index.client.d.ts +9 -0
- package/out/src/index.client.d.ts.map +1 -1
- package/out/src/index.client.js +9 -0
- package/out/src/index.client.js.map +1 -1
- package/out/src/sdk/CertOpsWallet.d.ts +7 -0
- package/out/src/sdk/CertOpsWallet.d.ts.map +1 -0
- package/out/src/sdk/CertOpsWallet.js +3 -0
- package/out/src/sdk/CertOpsWallet.js.map +1 -0
- package/out/src/sdk/__test/CertificateLifeCycle.test.js +19 -82
- package/out/src/sdk/__test/CertificateLifeCycle.test.js.map +1 -1
- package/out/src/sdk/index.d.ts +1 -1
- package/out/src/sdk/index.d.ts.map +1 -1
- package/out/src/sdk/index.js +1 -1
- package/out/src/sdk/index.js.map +1 -1
- package/out/src/sdk/validationHelpers.d.ts.map +1 -1
- package/out/src/sdk/validationHelpers.js +13 -12
- package/out/src/sdk/validationHelpers.js.map +1 -1
- package/out/src/services/__tests/ARC.test.js +9 -0
- package/out/src/services/__tests/ARC.test.js.map +1 -1
- package/out/src/services/__tests/bitrails.test.js +7 -2
- package/out/src/services/__tests/bitrails.test.js.map +1 -1
- package/out/src/services/providers/ARC.js +1 -1
- package/out/src/services/providers/ARC.js.map +1 -1
- package/out/src/services/providers/__tests/WhatsOnChain.test.js +3 -3
- package/out/src/services/providers/__tests/WhatsOnChain.test.js.map +1 -1
- package/out/src/signer/methods/proveCertificate.d.ts.map +1 -1
- package/out/src/signer/methods/proveCertificate.js +3 -19
- package/out/src/signer/methods/proveCertificate.js.map +1 -1
- package/out/src/storage/__test/WalletStorageManager.test.js +1 -1
- package/out/src/storage/__test/WalletStorageManager.test.js.map +1 -1
- package/out/src/storage/methods/listOutputs.js +1 -1
- package/out/src/storage/methods/listOutputs.js.map +1 -1
- package/out/src/storage/remoting/StorageClient.d.ts +2 -2
- package/out/src/storage/remoting/StorageClient.d.ts.map +1 -1
- package/out/src/storage/remoting/StorageClient.js +1 -1
- package/out/src/storage/remoting/StorageClient.js.map +1 -1
- package/out/src/utility/identityUtils.d.ts +31 -0
- package/out/src/utility/identityUtils.d.ts.map +1 -0
- package/out/src/utility/identityUtils.js +116 -0
- package/out/src/utility/identityUtils.js.map +1 -0
- package/out/src/wab-client/WABClient.d.ts +49 -0
- package/out/src/wab-client/WABClient.d.ts.map +1 -0
- package/out/src/wab-client/WABClient.js +83 -0
- package/out/src/wab-client/WABClient.js.map +1 -0
- package/out/src/wab-client/__tests/WABClient.man.test.d.ts +2 -0
- package/out/src/wab-client/__tests/WABClient.man.test.d.ts.map +1 -0
- package/out/src/wab-client/__tests/WABClient.man.test.js +52 -0
- package/out/src/wab-client/__tests/WABClient.man.test.js.map +1 -0
- package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts +34 -0
- package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts.map +1 -0
- package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js +16 -0
- package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js.map +1 -0
- package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts +7 -0
- package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts.map +1 -0
- package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js +36 -0
- package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js.map +1 -0
- package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts +28 -0
- package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts.map +1 -0
- package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js +69 -0
- package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js.map +1 -0
- package/out/test/Wallet/action/internalizeAction.a.test.js +1 -1
- package/out/test/Wallet/action/internalizeAction.a.test.js.map +1 -1
- package/out/test/Wallet/certificate/acquireCertificate.test.js +26 -29
- package/out/test/Wallet/certificate/acquireCertificate.test.js.map +1 -1
- package/out/test/Wallet/local/localWallet.man.test.d.ts.map +1 -1
- package/out/test/Wallet/local/localWallet.man.test.js +25 -10
- package/out/test/Wallet/local/localWallet.man.test.js.map +1 -1
- package/out/test/storage/KnexMigrations.test.js +1 -1
- package/out/test/storage/KnexMigrations.test.js.map +1 -1
- package/out/test/storage/update.test.js +1 -1
- package/out/test/storage/update.test.js.map +1 -1
- package/out/test/utils/TestUtilsWalletStorage.d.ts +9 -5
- package/out/test/utils/TestUtilsWalletStorage.d.ts.map +1 -1
- package/out/test/utils/TestUtilsWalletStorage.js +15 -9
- package/out/test/utils/TestUtilsWalletStorage.js.map +1 -1
- package/out/test/wallet/action/internalizeAction.test.js +1 -1
- package/out/test/wallet/action/internalizeAction.test.js.map +1 -1
- package/out/test/wallet/list/listActions2.test.js +1 -1
- package/out/test/wallet/list/listActions2.test.js.map +1 -1
- package/out/test/wallet/sync/Wallet.sync.test.js +1 -1
- package/out/test/wallet/sync/Wallet.sync.test.js.map +1 -1
- package/out/tsconfig.all.tsbuildinfo +1 -1
- package/package.json +3 -4
- package/src/CWIStyleWalletManager.ts +1738 -0
- package/src/SimpleWalletManager.ts +526 -0
- package/src/Wallet.ts +70 -7
- package/src/WalletAuthenticationManager.ts +150 -0
- package/src/WalletPermissionsManager.ts +2424 -0
- package/src/WalletSettingsManager.ts +243 -0
- package/src/__tests/CWIStyleWalletManager.test.ts +604 -0
- package/src/__tests/WalletPermissionsManager.callbacks.test.ts +323 -0
- package/src/__tests/WalletPermissionsManager.checks.test.ts +839 -0
- package/src/__tests/WalletPermissionsManager.encryption.test.ts +370 -0
- package/src/__tests/WalletPermissionsManager.fixtures.ts +284 -0
- package/src/__tests/WalletPermissionsManager.flows.test.ts +457 -0
- package/src/__tests/WalletPermissionsManager.initialization.test.ts +300 -0
- package/src/__tests/WalletPermissionsManager.proxying.test.ts +706 -0
- package/src/__tests/WalletPermissionsManager.tokens.test.ts +546 -0
- package/src/index.all.ts +9 -0
- package/src/index.client.ts +9 -0
- package/src/sdk/CertOpsWallet.ts +18 -0
- package/src/sdk/__test/CertificateLifeCycle.test.ts +66 -113
- package/src/sdk/index.ts +1 -1
- package/src/sdk/validationHelpers.ts +12 -11
- package/src/services/__tests/ARC.test.ts +14 -1
- package/src/services/__tests/bitrails.test.ts +7 -2
- package/src/services/processingErrors/arcSuccessError.json +76 -0
- package/src/services/providers/ARC.ts +1 -1
- package/src/services/providers/__tests/WhatsOnChain.test.ts +3 -3
- package/src/signer/methods/proveCertificate.ts +14 -21
- package/src/storage/__test/WalletStorageManager.test.ts +1 -1
- package/src/storage/methods/listOutputs.ts +1 -1
- package/src/storage/remoting/StorageClient.ts +4 -4
- package/src/utility/identityUtils.ts +159 -0
- package/src/wab-client/WABClient.ts +94 -0
- package/src/wab-client/__tests/WABClient.man.test.ts +59 -0
- package/src/wab-client/auth-method-interactors/AuthMethodInteractor.ts +47 -0
- package/src/wab-client/auth-method-interactors/PersonaIDInteractor.ts +35 -0
- package/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.ts +72 -0
- package/test/Wallet/action/internalizeAction.a.test.ts +1 -1
- package/test/Wallet/certificate/acquireCertificate.test.ts +89 -30
- package/test/Wallet/local/localWallet.man.test.ts +20 -4
- package/test/storage/KnexMigrations.test.ts +1 -1
- package/test/storage/update.test.ts +1 -1
- package/test/utils/TestUtilsWalletStorage.ts +24 -13
- package/test/wallet/action/internalizeAction.test.ts +1 -1
- package/test/wallet/list/listActions2.test.ts +1 -1
- package/test/wallet/sync/Wallet.sync.test.ts +1 -1
- package/out/src/sdk/CertOps.d.ts +0 -66
- package/out/src/sdk/CertOps.d.ts.map +0 -1
- package/out/src/sdk/CertOps.js +0 -190
- package/out/src/sdk/CertOps.js.map +0 -1
- package/src/sdk/CertOps.ts +0 -274
|
@@ -0,0 +1,454 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const globals_1 = require("@jest/globals");
|
|
4
|
+
const WalletPermissionsManager_fixtures_1 = require("./WalletPermissionsManager.fixtures");
|
|
5
|
+
const WalletPermissionsManager_1 = require("../WalletPermissionsManager");
|
|
6
|
+
// Re-mock @bsv/sdk with our fixture classes (MockTransaction, MockLockingScript, etc.)
|
|
7
|
+
globals_1.jest.mock('@bsv/sdk', () => WalletPermissionsManager_fixtures_1.MockedBSV_SDK);
|
|
8
|
+
(0, globals_1.describe)('WalletPermissionsManager - On-Chain Token Creation, Renewal & Revocation', () => {
|
|
9
|
+
let underlying;
|
|
10
|
+
let manager;
|
|
11
|
+
(0, globals_1.beforeEach)(() => {
|
|
12
|
+
// Fresh mock wallet before each test
|
|
13
|
+
underlying = (0, WalletPermissionsManager_fixtures_1.mockUnderlyingWallet)();
|
|
14
|
+
manager = new WalletPermissionsManager_1.WalletPermissionsManager(underlying, 'admin.domain.com');
|
|
15
|
+
});
|
|
16
|
+
(0, globals_1.afterEach)(() => {
|
|
17
|
+
globals_1.jest.clearAllMocks();
|
|
18
|
+
});
|
|
19
|
+
/* ------------------------------------------------------------------------
|
|
20
|
+
* 1) UNIT TESTS: buildPushdropFields() correctness
|
|
21
|
+
* ------------------------------------------------------------------------
|
|
22
|
+
* We directly call the manager’s internal buildPushdropFields(...) via
|
|
23
|
+
* a cast to "any" so we can test each permission type’s field ordering,
|
|
24
|
+
* encryption calls, and final arrays.
|
|
25
|
+
* ------------------------------------------------------------------------
|
|
26
|
+
*/
|
|
27
|
+
(0, globals_1.describe)('buildPushdropFields() - unit tests for each permission type', () => {
|
|
28
|
+
// We’ll cast the manager to `any` to access the private method.
|
|
29
|
+
const privateManager = () => manager;
|
|
30
|
+
(0, globals_1.it)('should build correct fields for a protocol token (DPACP)', async () => {
|
|
31
|
+
const request = {
|
|
32
|
+
type: 'protocol',
|
|
33
|
+
originator: 'some-app.com',
|
|
34
|
+
privileged: true,
|
|
35
|
+
protocolID: [2, 'myProto'],
|
|
36
|
+
counterparty: 'some-other-pubkey',
|
|
37
|
+
reason: 'test-protocol-creation'
|
|
38
|
+
};
|
|
39
|
+
const expiry = 1234567890;
|
|
40
|
+
// Because manager.encryptPermissionTokenField calls underlying.encrypt,
|
|
41
|
+
// we can observe how many times it's called & with what plaintext.
|
|
42
|
+
underlying.encrypt.mockClear();
|
|
43
|
+
const fields = await privateManager().buildPushdropFields(request, expiry);
|
|
44
|
+
// We expect 6 encryption calls (domain, expiry, privileged, secLevel, protoName, cpty).
|
|
45
|
+
(0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(6);
|
|
46
|
+
// The final array must have length=6
|
|
47
|
+
(0, globals_1.expect)(fields).toHaveLength(6);
|
|
48
|
+
// Confirm the 1st call was the domain
|
|
49
|
+
(0, globals_1.expect)(underlying.encrypt.mock.calls[0][0].plaintext).toEqual(globals_1.expect.arrayContaining([...'some-app.com'].map(c => c.charCodeAt(0))));
|
|
50
|
+
// Confirm the 2nd call was the expiry, as a string
|
|
51
|
+
(0, globals_1.expect)(underlying.encrypt.mock.calls[1][0].plaintext).toEqual(globals_1.expect.arrayContaining([...'1234567890'].map(c => c.charCodeAt(0))));
|
|
52
|
+
// 3rd => privileged? 'true'
|
|
53
|
+
(0, globals_1.expect)(underlying.encrypt.mock.calls[2][0].plaintext).toEqual(globals_1.expect.arrayContaining([...'true'].map(c => c.charCodeAt(0))));
|
|
54
|
+
// 4th => security level => '2'
|
|
55
|
+
(0, globals_1.expect)(underlying.encrypt.mock.calls[3][0].plaintext).toEqual(globals_1.expect.arrayContaining([...'2'].map(c => c.charCodeAt(0))));
|
|
56
|
+
// 5th => protoName => 'myProto'
|
|
57
|
+
(0, globals_1.expect)(underlying.encrypt.mock.calls[4][0].plaintext).toEqual(globals_1.expect.arrayContaining([...'myProto'].map(c => c.charCodeAt(0))));
|
|
58
|
+
// 6th => counterparty => 'some-other-pubkey'
|
|
59
|
+
(0, globals_1.expect)(underlying.encrypt.mock.calls[5][0].plaintext).toEqual(globals_1.expect.arrayContaining([...'some-other-pubkey'].map(c => c.charCodeAt(0))));
|
|
60
|
+
});
|
|
61
|
+
(0, globals_1.it)('should build correct fields for a basket token (DBAP)', async () => {
|
|
62
|
+
const request = {
|
|
63
|
+
type: 'basket',
|
|
64
|
+
originator: 'origin.example',
|
|
65
|
+
basket: 'someBasket',
|
|
66
|
+
reason: 'basket usage'
|
|
67
|
+
};
|
|
68
|
+
const expiry = 999999999;
|
|
69
|
+
underlying.encrypt.mockClear();
|
|
70
|
+
const fields = await privateManager().buildPushdropFields(request, expiry);
|
|
71
|
+
// We expect 3 encryption calls: domain, expiry, basket
|
|
72
|
+
(0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(3);
|
|
73
|
+
(0, globals_1.expect)(fields).toHaveLength(3);
|
|
74
|
+
});
|
|
75
|
+
(0, globals_1.it)('should build correct fields for a certificate token (DCAP)', async () => {
|
|
76
|
+
const request = {
|
|
77
|
+
type: 'certificate',
|
|
78
|
+
originator: 'cert-user.org',
|
|
79
|
+
privileged: false,
|
|
80
|
+
certificate: {
|
|
81
|
+
verifier: '02abcdef...',
|
|
82
|
+
certType: 'KYC',
|
|
83
|
+
fields: ['name', 'dob']
|
|
84
|
+
},
|
|
85
|
+
reason: 'certificate usage'
|
|
86
|
+
};
|
|
87
|
+
const expiry = 2222222222;
|
|
88
|
+
underlying.encrypt.mockClear();
|
|
89
|
+
const fields = await privateManager().buildPushdropFields(request, expiry);
|
|
90
|
+
// DP = domain, expiry, privileged, certType, fieldsJson, verifier
|
|
91
|
+
(0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(6);
|
|
92
|
+
(0, globals_1.expect)(fields).toHaveLength(6);
|
|
93
|
+
// 5th encryption call is the fields JSON => ["name","dob"]
|
|
94
|
+
const fifthCallPlaintext = underlying.encrypt.mock.calls[4][0].plaintext;
|
|
95
|
+
const str = String.fromCharCode(...fifthCallPlaintext);
|
|
96
|
+
(0, globals_1.expect)(str).toContain('"name"');
|
|
97
|
+
(0, globals_1.expect)(str).toContain('"dob"');
|
|
98
|
+
});
|
|
99
|
+
(0, globals_1.it)('should build correct fields for a spending token (DSAP)', async () => {
|
|
100
|
+
const request = {
|
|
101
|
+
type: 'spending',
|
|
102
|
+
originator: 'money-spender.com',
|
|
103
|
+
spending: { satoshis: 5000 },
|
|
104
|
+
reason: 'monthly spending'
|
|
105
|
+
};
|
|
106
|
+
const expiry = 0; // DSAP typically not time-limited, but manager can pass 0.
|
|
107
|
+
underlying.encrypt.mockClear();
|
|
108
|
+
const fields = await privateManager().buildPushdropFields(request, expiry, /*amount=*/ 10000);
|
|
109
|
+
// For DSAP: domain + authorizedAmount (2 fields)
|
|
110
|
+
(0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(2);
|
|
111
|
+
(0, globals_1.expect)(fields).toHaveLength(2);
|
|
112
|
+
// The second encryption call is '10000'
|
|
113
|
+
const secondPlaintext = underlying.encrypt.mock.calls[1][0].plaintext;
|
|
114
|
+
const asString = String.fromCharCode(...secondPlaintext);
|
|
115
|
+
(0, globals_1.expect)(asString).toBe('10000');
|
|
116
|
+
});
|
|
117
|
+
});
|
|
118
|
+
/* ------------------------------------------------------------------------
|
|
119
|
+
* 2) INTEGRATION TESTS: Token Creation
|
|
120
|
+
* ------------------------------------------------------------------------
|
|
121
|
+
* We'll simulate a user request flow, then call `grantPermission` with
|
|
122
|
+
* ephemeral=false to see if createAction is called with the correct script,
|
|
123
|
+
* basket name, tags, etc. We also decode the script to confirm it has the
|
|
124
|
+
* correct (encrypted) fields.
|
|
125
|
+
* ------------------------------------------------------------------------
|
|
126
|
+
*/
|
|
127
|
+
(0, globals_1.describe)('Token Creation - integration tests', () => {
|
|
128
|
+
(0, globals_1.it)('should create a new protocol token with the correct basket, script, and tags', async () => {
|
|
129
|
+
// 1) Simulate the manager having an active request for a protocol token.
|
|
130
|
+
const request = {
|
|
131
|
+
type: 'protocol',
|
|
132
|
+
originator: 'app.example',
|
|
133
|
+
privileged: false,
|
|
134
|
+
protocolID: [1, 'testProto'],
|
|
135
|
+
counterparty: 'self',
|
|
136
|
+
reason: 'Need protocol usage'
|
|
137
|
+
};
|
|
138
|
+
// We'll emulate that the manager queued it:
|
|
139
|
+
const key = manager.buildRequestKey(request);
|
|
140
|
+
manager.activeRequests.set(key, {
|
|
141
|
+
request,
|
|
142
|
+
pending: [{ resolve: () => { }, reject: () => { } }]
|
|
143
|
+
});
|
|
144
|
+
// 2) Grant the permission with ephemeral=false => must create the token
|
|
145
|
+
underlying.createAction.mockClear();
|
|
146
|
+
await manager.grantPermission({
|
|
147
|
+
requestID: key,
|
|
148
|
+
expiry: 999999, // set some expiry
|
|
149
|
+
ephemeral: false
|
|
150
|
+
});
|
|
151
|
+
// 3) Expect createAction to have been called once with a single output
|
|
152
|
+
(0, globals_1.expect)(underlying.createAction).toHaveBeenCalledTimes(1);
|
|
153
|
+
const actionArgs = underlying.createAction.mock.calls[0][0];
|
|
154
|
+
(0, globals_1.expect)(actionArgs.outputs).toHaveLength(1);
|
|
155
|
+
// The basket name must be "admin protocol-permission" as per BASKET_MAP
|
|
156
|
+
(0, globals_1.expect)(actionArgs.outputs[0].basket).toBe('admin protocol-permission');
|
|
157
|
+
// The tags must contain e.g. "originator app.example", "protocolName testProto", etc.
|
|
158
|
+
const outputTags = actionArgs.outputs[0].tags;
|
|
159
|
+
(0, globals_1.expect)(outputTags).toEqual(globals_1.expect.arrayContaining([
|
|
160
|
+
'originator app.example',
|
|
161
|
+
'privileged false',
|
|
162
|
+
'protocolName testProto',
|
|
163
|
+
'protocolSecurityLevel 1',
|
|
164
|
+
'counterparty self'
|
|
165
|
+
]));
|
|
166
|
+
// The lockingScript is built by "PushDrop.lock(...)" with 6 fields
|
|
167
|
+
const lockingScriptHex = actionArgs.outputs[0].lockingScript;
|
|
168
|
+
(0, globals_1.expect)(lockingScriptHex).toBeTruthy();
|
|
169
|
+
// Because we’re using our mock pushdrop, we might see an empty decode.
|
|
170
|
+
// In a real environment, you would decode and confirm the fields. Here we just confirm
|
|
171
|
+
// that the manager called the underlying encrypt 6 times, plus the script creation.
|
|
172
|
+
// Two more encrypt calls should have been made within createAction (metadata encryption
|
|
173
|
+
// of the top-level Action description, and the output's description) for a total of 8.
|
|
174
|
+
(0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(8);
|
|
175
|
+
});
|
|
176
|
+
(0, globals_1.it)('should create a new basket token (DBAP)', async () => {
|
|
177
|
+
const request = {
|
|
178
|
+
type: 'basket',
|
|
179
|
+
originator: 'shopper.com',
|
|
180
|
+
basket: 'myBasket',
|
|
181
|
+
reason: 'I want to store items'
|
|
182
|
+
};
|
|
183
|
+
const key = manager.buildRequestKey(request);
|
|
184
|
+
manager.activeRequests.set(key, {
|
|
185
|
+
request,
|
|
186
|
+
pending: [{ resolve() { }, reject() { } }]
|
|
187
|
+
});
|
|
188
|
+
underlying.createAction.mockClear();
|
|
189
|
+
await manager.grantPermission({
|
|
190
|
+
requestID: key,
|
|
191
|
+
ephemeral: false,
|
|
192
|
+
expiry: 123456789
|
|
193
|
+
});
|
|
194
|
+
(0, globals_1.expect)(underlying.createAction).toHaveBeenCalledTimes(1);
|
|
195
|
+
const { outputs } = underlying.createAction.mock.calls[0][0];
|
|
196
|
+
(0, globals_1.expect)(outputs).toHaveLength(1);
|
|
197
|
+
// "admin basket-access"
|
|
198
|
+
(0, globals_1.expect)(outputs[0].basket).toBe('admin basket-access');
|
|
199
|
+
(0, globals_1.expect)(outputs[0].tags).toEqual(globals_1.expect.arrayContaining(['originator shopper.com', 'basket myBasket']));
|
|
200
|
+
// 3 fields => domain, expiry, basket, plus two metadata calls (description, outputDescription)
|
|
201
|
+
(0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(5);
|
|
202
|
+
});
|
|
203
|
+
(0, globals_1.it)('should create a new certificate token (DCAP)', async () => {
|
|
204
|
+
const request = {
|
|
205
|
+
type: 'certificate',
|
|
206
|
+
originator: 'org.certs',
|
|
207
|
+
privileged: true,
|
|
208
|
+
certificate: {
|
|
209
|
+
verifier: '02cccccc',
|
|
210
|
+
certType: 'KYC',
|
|
211
|
+
fields: ['name', 'id', 'photo']
|
|
212
|
+
},
|
|
213
|
+
reason: 'Present KYC docs'
|
|
214
|
+
};
|
|
215
|
+
const key = manager.buildRequestKey(request);
|
|
216
|
+
manager.activeRequests.set(key, {
|
|
217
|
+
request,
|
|
218
|
+
pending: [{ resolve() { }, reject() { } }]
|
|
219
|
+
});
|
|
220
|
+
underlying.createAction.mockClear();
|
|
221
|
+
await manager.grantPermission({
|
|
222
|
+
requestID: key,
|
|
223
|
+
ephemeral: false,
|
|
224
|
+
expiry: 44444444
|
|
225
|
+
});
|
|
226
|
+
(0, globals_1.expect)(underlying.createAction).toHaveBeenCalledTimes(1);
|
|
227
|
+
const { outputs } = underlying.createAction.mock.calls[0][0];
|
|
228
|
+
(0, globals_1.expect)(outputs[0].basket).toBe('admin certificate-access');
|
|
229
|
+
(0, globals_1.expect)(outputs[0].tags).toEqual(globals_1.expect.arrayContaining(['originator org.certs', 'privileged true', 'type KYC', 'verifier 02cccccc']));
|
|
230
|
+
// DP = domain, expiry, privileged, certType, fieldsJson, verifier => 6 encryption calls
|
|
231
|
+
// Two additional ones for metadata encryption (action description, output description) for 8 total.
|
|
232
|
+
(0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(8);
|
|
233
|
+
});
|
|
234
|
+
(0, globals_1.it)('should create a new spending authorization token (DSAP)', async () => {
|
|
235
|
+
const request = {
|
|
236
|
+
type: 'spending',
|
|
237
|
+
originator: 'spender.com',
|
|
238
|
+
spending: {
|
|
239
|
+
satoshis: 9999
|
|
240
|
+
}
|
|
241
|
+
};
|
|
242
|
+
const key = manager.buildRequestKey(request);
|
|
243
|
+
manager.activeRequests.set(key, {
|
|
244
|
+
request,
|
|
245
|
+
pending: [{ resolve() { }, reject() { } }]
|
|
246
|
+
});
|
|
247
|
+
underlying.createAction.mockClear();
|
|
248
|
+
// We'll set "amount=20000" as the monthly limit
|
|
249
|
+
await manager.grantPermission({
|
|
250
|
+
requestID: key,
|
|
251
|
+
ephemeral: false,
|
|
252
|
+
amount: 20000
|
|
253
|
+
});
|
|
254
|
+
(0, globals_1.expect)(underlying.createAction).toHaveBeenCalledTimes(1);
|
|
255
|
+
const { outputs } = underlying.createAction.mock.calls[0][0];
|
|
256
|
+
// "admin spending-authorization"
|
|
257
|
+
(0, globals_1.expect)(outputs[0].basket).toBe('admin spending-authorization');
|
|
258
|
+
(0, globals_1.expect)(outputs[0].tags).toEqual(globals_1.expect.arrayContaining(['originator spender.com']));
|
|
259
|
+
// domain, amount => 2 calls, plus two metadata encryption calls (description, outputDescription)
|
|
260
|
+
(0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(4);
|
|
261
|
+
});
|
|
262
|
+
});
|
|
263
|
+
/* ------------------------------------------------------------------------
|
|
264
|
+
* 3) INTEGRATION TESTS: Token Renewal
|
|
265
|
+
* ------------------------------------------------------------------------
|
|
266
|
+
* We test that renewing a token:
|
|
267
|
+
* - Spends the old token with createAction input referencing oldToken.txid/index
|
|
268
|
+
* - Produces a new token output in the same transaction with updated fields
|
|
269
|
+
* ------------------------------------------------------------------------
|
|
270
|
+
*/
|
|
271
|
+
(0, globals_1.describe)('Token Renewal - integration tests', () => {
|
|
272
|
+
(0, globals_1.it)('should spend the old token input and create a new protocol token output with updated expiry', async () => {
|
|
273
|
+
// Suppose the user has an old protocol token:
|
|
274
|
+
const oldToken = {
|
|
275
|
+
txid: 'oldTokenTX',
|
|
276
|
+
outputIndex: 2,
|
|
277
|
+
outputScript: '76a914...ac', // not used by the mock
|
|
278
|
+
satoshis: 1,
|
|
279
|
+
originator: 'some-site.io',
|
|
280
|
+
expiry: 222222,
|
|
281
|
+
privileged: false,
|
|
282
|
+
securityLevel: 1,
|
|
283
|
+
protocol: 'coolProto',
|
|
284
|
+
counterparty: 'self'
|
|
285
|
+
};
|
|
286
|
+
// The user’s request to renew:
|
|
287
|
+
const request = {
|
|
288
|
+
type: 'protocol',
|
|
289
|
+
originator: 'some-site.io',
|
|
290
|
+
privileged: false,
|
|
291
|
+
protocolID: [1, 'coolProto'],
|
|
292
|
+
counterparty: 'self',
|
|
293
|
+
renewal: true,
|
|
294
|
+
previousToken: oldToken
|
|
295
|
+
};
|
|
296
|
+
// Manager normally calls requestPermissionFlow, but let's skip ahead:
|
|
297
|
+
// We'll place the request in activeRequests:
|
|
298
|
+
const key = manager.buildRequestKey(request);
|
|
299
|
+
manager.activeRequests.set(key, {
|
|
300
|
+
request,
|
|
301
|
+
pending: [{ resolve() { }, reject() { } }]
|
|
302
|
+
});
|
|
303
|
+
// Clear the mock calls, then renew with ephemeral=false
|
|
304
|
+
underlying.createAction.mockClear();
|
|
305
|
+
await manager.grantPermission({
|
|
306
|
+
requestID: key,
|
|
307
|
+
ephemeral: false,
|
|
308
|
+
expiry: 999999 // new expiry
|
|
309
|
+
});
|
|
310
|
+
// We expect createAction with:
|
|
311
|
+
// - 1 input referencing oldToken "oldTokenTX.2"
|
|
312
|
+
// - 1 output with the new script
|
|
313
|
+
(0, globals_1.expect)(underlying.createAction).toHaveBeenCalledTimes(1);
|
|
314
|
+
const createArgs = underlying.createAction.mock.calls[0][0];
|
|
315
|
+
(0, globals_1.expect)(createArgs.inputs).toHaveLength(1);
|
|
316
|
+
(0, globals_1.expect)(createArgs.inputs[0].outpoint).toBe('oldTokenTX.2');
|
|
317
|
+
(0, globals_1.expect)(createArgs.outputs).toHaveLength(1);
|
|
318
|
+
// The new basket is still "admin protocol-permission"
|
|
319
|
+
(0, globals_1.expect)(createArgs.outputs[0].basket).toBe('admin protocol-permission');
|
|
320
|
+
// And we must confirm "renew" means 6 encryption calls again
|
|
321
|
+
// Metadata encryption means three extra calls (inputDescription, outputDescription, and Action description)
|
|
322
|
+
// this means a total of 9.
|
|
323
|
+
(0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(9);
|
|
324
|
+
});
|
|
325
|
+
(0, globals_1.it)('should allow updating the authorizedAmount in DSAP renewal', async () => {
|
|
326
|
+
const oldToken = {
|
|
327
|
+
txid: 'dsap-old-tx',
|
|
328
|
+
outputIndex: 0,
|
|
329
|
+
outputScript: 'sample script',
|
|
330
|
+
satoshis: 1,
|
|
331
|
+
originator: 'spenderX.com',
|
|
332
|
+
authorizedAmount: 10000,
|
|
333
|
+
expiry: 0
|
|
334
|
+
};
|
|
335
|
+
const request = {
|
|
336
|
+
type: 'spending',
|
|
337
|
+
originator: 'spenderX.com',
|
|
338
|
+
spending: { satoshis: 3000 },
|
|
339
|
+
renewal: true,
|
|
340
|
+
previousToken: oldToken
|
|
341
|
+
};
|
|
342
|
+
const key = manager.buildRequestKey(request);
|
|
343
|
+
manager.activeRequests.set(key, {
|
|
344
|
+
request,
|
|
345
|
+
pending: [{ resolve() { }, reject() { } }]
|
|
346
|
+
});
|
|
347
|
+
underlying.createAction.mockClear();
|
|
348
|
+
// Renew with new monthly limit 50000
|
|
349
|
+
await manager.grantPermission({
|
|
350
|
+
requestID: key,
|
|
351
|
+
amount: 50000,
|
|
352
|
+
ephemeral: false
|
|
353
|
+
});
|
|
354
|
+
// check
|
|
355
|
+
const { inputs, outputs } = underlying.createAction.mock.calls[0][0];
|
|
356
|
+
(0, globals_1.expect)(inputs).toHaveLength(1);
|
|
357
|
+
(0, globals_1.expect)(inputs[0].outpoint).toBe('dsap-old-tx.0');
|
|
358
|
+
(0, globals_1.expect)(outputs).toHaveLength(1);
|
|
359
|
+
(0, globals_1.expect)(outputs[0].basket).toBe('admin spending-authorization');
|
|
360
|
+
// domain + new authorizedAmount => 2 encryption calls
|
|
361
|
+
// For metadata encryption, we have an input description, an output description, and a top-level description.
|
|
362
|
+
// This makes for a total of 5 calls.
|
|
363
|
+
(0, globals_1.expect)(underlying.encrypt).toHaveBeenCalledTimes(5);
|
|
364
|
+
// The second call’s plaintext should be "50000"
|
|
365
|
+
const secondPlaintext = underlying.encrypt.mock.calls[1][0].plaintext;
|
|
366
|
+
const asStr = String.fromCharCode(...secondPlaintext);
|
|
367
|
+
(0, globals_1.expect)(asStr).toBe('50000');
|
|
368
|
+
});
|
|
369
|
+
});
|
|
370
|
+
/* ------------------------------------------------------------------------
|
|
371
|
+
* 4) INTEGRATION TESTS: Token Revocation
|
|
372
|
+
* ------------------------------------------------------------------------
|
|
373
|
+
* - Revoking a token means we build a transaction that consumes the old
|
|
374
|
+
* token UTXO with no replacement output.
|
|
375
|
+
* - Then we typically call signAction to finalize. The old token is no
|
|
376
|
+
* longer listed as an unspent output.
|
|
377
|
+
* ------------------------------------------------------------------------
|
|
378
|
+
*/
|
|
379
|
+
(0, globals_1.describe)('Token Revocation - integration tests', () => {
|
|
380
|
+
(0, globals_1.it)('should create a transaction that consumes (spends) the old token with no new outputs', async () => {
|
|
381
|
+
// A sample old token
|
|
382
|
+
const oldToken = {
|
|
383
|
+
txid: 'revocableToken.txid',
|
|
384
|
+
outputIndex: 1,
|
|
385
|
+
outputScript: 'fakePushdropScript',
|
|
386
|
+
satoshis: 1,
|
|
387
|
+
originator: 'shopper.com',
|
|
388
|
+
basketName: 'myBasket',
|
|
389
|
+
expiry: 1111111111
|
|
390
|
+
};
|
|
391
|
+
underlying.createAction.mockClear();
|
|
392
|
+
underlying.signAction.mockClear();
|
|
393
|
+
await manager.revokePermission(oldToken);
|
|
394
|
+
// 1) The manager calls createAction with an input referencing oldToken
|
|
395
|
+
(0, globals_1.expect)(underlying.createAction).toHaveBeenCalledTimes(1);
|
|
396
|
+
const createArgs = underlying.createAction.mock.calls[0][0];
|
|
397
|
+
(0, globals_1.expect)(createArgs.inputs).toHaveLength(1);
|
|
398
|
+
(0, globals_1.expect)(createArgs.inputs[0].outpoint).toBe('revocableToken.txid.1');
|
|
399
|
+
// No new outputs => final array is empty
|
|
400
|
+
(0, globals_1.expect)(createArgs.outputs || []).toHaveLength(0);
|
|
401
|
+
// 2) The manager then calls signAction to finalize the spending
|
|
402
|
+
(0, globals_1.expect)(underlying.signAction).toHaveBeenCalledTimes(1);
|
|
403
|
+
const signArgs = underlying.signAction.mock.calls[0][0];
|
|
404
|
+
// signArgs.reference should be the same from createAction’s result
|
|
405
|
+
(0, globals_1.expect)(signArgs.reference).toBe('mockReference');
|
|
406
|
+
// The “spends” object should have an unlockingScript at index 0.
|
|
407
|
+
(0, globals_1.expect)(signArgs.spends).toHaveProperty('0.unlockingScript');
|
|
408
|
+
// The content can be a mock, we just check it’s not empty
|
|
409
|
+
(0, globals_1.expect)(signArgs.spends[0].unlockingScript).toBeDefined();
|
|
410
|
+
});
|
|
411
|
+
(0, globals_1.it)('should remove the old token from listing after revocation', async () => {
|
|
412
|
+
// 1) Setup the underlying wallet to initially return the old token in listOutputs
|
|
413
|
+
const oldToken = {
|
|
414
|
+
txid: 'aaaa1111',
|
|
415
|
+
outputIndex: 0,
|
|
416
|
+
outputScript: 'some script',
|
|
417
|
+
satoshis: 1,
|
|
418
|
+
originator: 'example.com',
|
|
419
|
+
expiry: 999999,
|
|
420
|
+
basketName: 'myBasket'
|
|
421
|
+
};
|
|
422
|
+
// We mock listOutputs so that it returns the old token before revocation
|
|
423
|
+
underlying.listOutputs.mockResolvedValueOnce({
|
|
424
|
+
totalOutputs: 1,
|
|
425
|
+
outputs: [
|
|
426
|
+
{
|
|
427
|
+
outpoint: 'aaaa1111.0',
|
|
428
|
+
lockingScript: 'some script',
|
|
429
|
+
satoshis: 1,
|
|
430
|
+
tags: ['originator example.com', 'basket myBasket']
|
|
431
|
+
}
|
|
432
|
+
]
|
|
433
|
+
});
|
|
434
|
+
// Confirm the manager sees it in listBasketAccess
|
|
435
|
+
const tokensBefore = await manager.listBasketAccess({
|
|
436
|
+
originator: 'example.com'
|
|
437
|
+
});
|
|
438
|
+
(0, globals_1.expect)(tokensBefore).toHaveLength(1);
|
|
439
|
+
(0, globals_1.expect)(tokensBefore[0].txid).toBe('aaaa1111');
|
|
440
|
+
// 2) Revoke the token
|
|
441
|
+
await manager.revokePermission(oldToken);
|
|
442
|
+
// 3) After revocation, mock the underlying wallet to show zero outputs
|
|
443
|
+
underlying.listOutputs.mockResolvedValue({
|
|
444
|
+
totalOutputs: 0,
|
|
445
|
+
outputs: []
|
|
446
|
+
});
|
|
447
|
+
const tokensAfter = await manager.listBasketAccess({
|
|
448
|
+
originator: 'example.com'
|
|
449
|
+
});
|
|
450
|
+
(0, globals_1.expect)(tokensAfter).toHaveLength(0);
|
|
451
|
+
});
|
|
452
|
+
});
|
|
453
|
+
});
|
|
454
|
+
//# sourceMappingURL=WalletPermissionsManager.tokens.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"WalletPermissionsManager.tokens.test.js","sourceRoot":"","sources":["../../../src/__tests/WalletPermissionsManager.tokens.test.ts"],"names":[],"mappings":";;AAAA,2CAAiF;AACjF,2FAAyF;AACzF,0EAA0G;AAE1G,uFAAuF;AACvF,cAAI,CAAC,IAAI,CAAC,UAAU,EAAE,GAAG,EAAE,CAAC,iDAAa,CAAC,CAAA;AAE1C,IAAA,kBAAQ,EAAC,0EAA0E,EAAE,GAAG,EAAE;IACxF,IAAI,UAAmD,CAAA;IACvD,IAAI,OAAiC,CAAA;IAErC,IAAA,oBAAU,EAAC,GAAG,EAAE;QACd,qCAAqC;QACrC,UAAU,GAAG,IAAA,wDAAoB,GAAE,CAAA;QACnC,OAAO,GAAG,IAAI,mDAAwB,CAAC,UAAU,EAAE,kBAAkB,CAAC,CAAA;IACxE,CAAC,CAAC,CAAA;IAEF,IAAA,mBAAS,EAAC,GAAG,EAAE;QACb,cAAI,CAAC,aAAa,EAAE,CAAA;IACtB,CAAC,CAAC,CAAA;IAEF;;;;;;;OAOG;IAEH,IAAA,kBAAQ,EAAC,6DAA6D,EAAE,GAAG,EAAE;QAC3E,gEAAgE;QAChE,MAAM,cAAc,GAAG,GAAG,EAAE,CAAC,OAAc,CAAA;QAE3C,IAAA,YAAE,EAAC,0DAA0D,EAAE,KAAK,IAAI,EAAE;YACxE,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,UAAU;gBAChB,UAAU,EAAE,cAAc;gBAC1B,UAAU,EAAE,IAAI;gBAChB,UAAU,EAAE,CAAC,CAAC,EAAE,SAAS,CAAC;gBAC1B,YAAY,EAAE,mBAAmB;gBACjC,MAAM,EAAE,wBAAwB;aACjC,CAAA;YACD,MAAM,MAAM,GAAG,UAAU,CAAA;YAEzB,wEAAwE;YACxE,mEAAmE;YACnE,UAAU,CAAC,OAAO,CAAC,SAAS,EAAE,CAAA;YAE9B,MAAM,MAAM,GAAe,MAAM,cAAc,EAAE,CAAC,mBAAmB,CAAC,OAAO,EAAE,MAAM,CAAC,CAAA;YAEtF,wFAAwF;YACxF,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YAEnD,qCAAqC;YACrC,IAAA,gBAAM,EAAC,MAAM,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAE9B,sCAAsC;YACtC,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,OAAO,CAC3D,gBAAM,CAAC,eAAe,CAAC,CAAC,GAAG,cAAc,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CACtE,CAAA;YAED,mDAAmD;YACnD,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,OAAO,CAC3D,gBAAM,CAAC,eAAe,CAAC,CAAC,GAAG,YAAY,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CACpE,CAAA;YAED,4BAA4B;YAC5B,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,OAAO,CAC3D,gBAAM,CAAC,eAAe,CAAC,CAAC,GAAG,MAAM,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CAC9D,CAAA;YAED,+BAA+B;YAC/B,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,OAAO,CAC3D,gBAAM,CAAC,eAAe,CAAC,CAAC,GAAG,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CAC3D,CAAA;YAED,gCAAgC;YAChC,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,OAAO,CAC3D,gBAAM,CAAC,eAAe,CAAC,CAAC,GAAG,SAAS,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CACjE,CAAA;YAED,6CAA6C;YAC7C,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,OAAO,CAC3D,gBAAM,CAAC,eAAe,CAAC,CAAC,GAAG,mBAAmB,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CAC3E,CAAA;QACH,CAAC,CAAC,CAAA;QAEF,IAAA,YAAE,EAAC,uDAAuD,EAAE,KAAK,IAAI,EAAE;YACrE,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,QAAQ;gBACd,UAAU,EAAE,gBAAgB;gBAC5B,MAAM,EAAE,YAAY;gBACpB,MAAM,EAAE,cAAc;aACvB,CAAA;YACD,MAAM,MAAM,GAAG,SAAS,CAAA;YAExB,UAAU,CAAC,OAAO,CAAC,SAAS,EAAE,CAAA;YAE9B,MAAM,MAAM,GAAe,MAAM,cAAc,EAAE,CAAC,mBAAmB,CAAC,OAAO,EAAE,MAAM,CAAC,CAAA;YAEtF,uDAAuD;YACvD,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACnD,IAAA,gBAAM,EAAC,MAAM,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;QAChC,CAAC,CAAC,CAAA;QAEF,IAAA,YAAE,EAAC,4DAA4D,EAAE,KAAK,IAAI,EAAE;YAC1E,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,aAAa;gBACnB,UAAU,EAAE,eAAe;gBAC3B,UAAU,EAAE,KAAK;gBACjB,WAAW,EAAE;oBACX,QAAQ,EAAE,aAAa;oBACvB,QAAQ,EAAE,KAAK;oBACf,MAAM,EAAE,CAAC,MAAM,EAAE,KAAK,CAAC;iBACxB;gBACD,MAAM,EAAE,mBAAmB;aAC5B,CAAA;YACD,MAAM,MAAM,GAAG,UAAU,CAAA;YAEzB,UAAU,CAAC,OAAO,CAAC,SAAS,EAAE,CAAA;YAE9B,MAAM,MAAM,GAAe,MAAM,cAAc,EAAE,CAAC,mBAAmB,CAAC,OAAO,EAAE,MAAM,CAAC,CAAA;YAEtF,kEAAkE;YAClE,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACnD,IAAA,gBAAM,EAAC,MAAM,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAE9B,2DAA2D;YAC3D,MAAM,kBAAkB,GAAG,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAA;YACxE,MAAM,GAAG,GAAG,MAAM,CAAC,YAAY,CAAC,GAAG,kBAAkB,CAAC,CAAA;YACtD,IAAA,gBAAM,EAAC,GAAG,CAAC,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAA;YAC/B,IAAA,gBAAM,EAAC,GAAG,CAAC,CAAC,SAAS,CAAC,OAAO,CAAC,CAAA;QAChC,CAAC,CAAC,CAAA;QAEF,IAAA,YAAE,EAAC,yDAAyD,EAAE,KAAK,IAAI,EAAE;YACvE,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,UAAU;gBAChB,UAAU,EAAE,mBAAmB;gBAC/B,QAAQ,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE;gBAC5B,MAAM,EAAE,kBAAkB;aAC3B,CAAA;YACD,MAAM,MAAM,GAAG,CAAC,CAAA,CAAC,2DAA2D;YAE5E,UAAU,CAAC,OAAO,CAAC,SAAS,EAAE,CAAA;YAE9B,MAAM,MAAM,GAAe,MAAM,cAAc,EAAE,CAAC,mBAAmB,CAAC,OAAO,EAAE,MAAM,EAAE,WAAW,CAAC,KAAK,CAAC,CAAA;YAEzG,iDAAiD;YACjD,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACnD,IAAA,gBAAM,EAAC,MAAM,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAE9B,wCAAwC;YACxC,MAAM,eAAe,GAAG,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAA;YACrE,MAAM,QAAQ,GAAG,MAAM,CAAC,YAAY,CAAC,GAAG,eAAe,CAAC,CAAA;YACxD,IAAA,gBAAM,EAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAA;QAChC,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF;;;;;;;;OAQG;IAEH,IAAA,kBAAQ,EAAC,oCAAoC,EAAE,GAAG,EAAE;QAClD,IAAA,YAAE,EAAC,8EAA8E,EAAE,KAAK,IAAI,EAAE;YAC5F,yEAAyE;YACzE,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,UAAU;gBAChB,UAAU,EAAE,aAAa;gBACzB,UAAU,EAAE,KAAK;gBACjB,UAAU,EAAE,CAAC,CAAC,EAAE,WAAW,CAAC;gBAC5B,YAAY,EAAE,MAAM;gBACpB,MAAM,EAAE,qBAAqB;aAC9B,CAAA;YAED,4CAA4C;YAC5C,MAAM,GAAG,GAAI,OAAe,CAAC,eAAe,CAAC,OAAO,CAAC,CACpD;YAAC,OAAe,CAAC,cAAc,CAAC,GAAG,CAAC,GAAG,EAAE;gBACxC,OAAO;gBACP,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,GAAG,EAAE,GAAE,CAAC,EAAE,MAAM,EAAE,GAAG,EAAE,GAAE,CAAC,EAAE,CAAC;aACnD,CAAC,CAAA;YAEF,wEAAwE;YACxE,UAAU,CAAC,YAAY,CAAC,SAAS,EAAE,CAAA;YACnC,MAAM,OAAO,CAAC,eAAe,CAAC;gBAC5B,SAAS,EAAE,GAAG;gBACd,MAAM,EAAE,MAAM,EAAE,kBAAkB;gBAClC,SAAS,EAAE,KAAK;aACjB,CAAC,CAAA;YAEF,uEAAuE;YACvE,IAAA,gBAAM,EAAC,UAAU,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACxD,MAAM,UAAU,GAAG,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;YAC3D,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAE1C,wEAAwE;YACxE,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,2BAA2B,CAAC,CAAA;YAEtE,sFAAsF;YACtF,MAAM,UAAU,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAA;YAC7C,IAAA,gBAAM,EAAC,UAAU,CAAC,CAAC,OAAO,CACxB,gBAAM,CAAC,eAAe,CAAC;gBACrB,wBAAwB;gBACxB,kBAAkB;gBAClB,wBAAwB;gBACxB,yBAAyB;gBACzB,mBAAmB;aACpB,CAAC,CACH,CAAA;YAED,mEAAmE;YACnE,MAAM,gBAAgB,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,aAAa,CAAA;YAC5D,IAAA,gBAAM,EAAC,gBAAgB,CAAC,CAAC,UAAU,EAAE,CAAA;YAErC,uEAAuE;YACvE,uFAAuF;YACvF,oFAAoF;YACpF,wFAAwF;YACxF,uFAAuF;YACvF,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACrD,CAAC,CAAC,CAAA;QAEF,IAAA,YAAE,EAAC,yCAAyC,EAAE,KAAK,IAAI,EAAE;YACvD,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,QAAQ;gBACd,UAAU,EAAE,aAAa;gBACzB,MAAM,EAAE,UAAU;gBAClB,MAAM,EAAE,uBAAuB;aAChC,CAAA;YACD,MAAM,GAAG,GAAI,OAAe,CAAC,eAAe,CAAC,OAAO,CAAC,CACpD;YAAC,OAAe,CAAC,cAAc,CAAC,GAAG,CAAC,GAAG,EAAE;gBACxC,OAAO;gBACP,OAAO,EAAE,CAAC,EAAE,OAAO,KAAI,CAAC,EAAE,MAAM,KAAI,CAAC,EAAE,CAAC;aACzC,CAAC,CAAA;YAEF,UAAU,CAAC,YAAY,CAAC,SAAS,EAAE,CAAA;YAEnC,MAAM,OAAO,CAAC,eAAe,CAAC;gBAC5B,SAAS,EAAE,GAAG;gBACd,SAAS,EAAE,KAAK;gBAChB,MAAM,EAAE,SAAS;aAClB,CAAC,CAAA;YACF,IAAA,gBAAM,EAAC,UAAU,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YAExD,MAAM,EAAE,OAAO,EAAE,GAAG,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;YAC5D,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAC/B,wBAAwB;YACxB,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAA;YACrD,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,gBAAM,CAAC,eAAe,CAAC,CAAC,wBAAwB,EAAE,iBAAiB,CAAC,CAAC,CAAC,CAAA;YACtG,+FAA+F;YAC/F,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACrD,CAAC,CAAC,CAAA;QAEF,IAAA,YAAE,EAAC,8CAA8C,EAAE,KAAK,IAAI,EAAE;YAC5D,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,aAAa;gBACnB,UAAU,EAAE,WAAW;gBACvB,UAAU,EAAE,IAAI;gBAChB,WAAW,EAAE;oBACX,QAAQ,EAAE,UAAU;oBACpB,QAAQ,EAAE,KAAK;oBACf,MAAM,EAAE,CAAC,MAAM,EAAE,IAAI,EAAE,OAAO,CAAC;iBAChC;gBACD,MAAM,EAAE,kBAAkB;aAC3B,CAAA;YACD,MAAM,GAAG,GAAI,OAAe,CAAC,eAAe,CAAC,OAAO,CAAC,CACpD;YAAC,OAAe,CAAC,cAAc,CAAC,GAAG,CAAC,GAAG,EAAE;gBACxC,OAAO;gBACP,OAAO,EAAE,CAAC,EAAE,OAAO,KAAI,CAAC,EAAE,MAAM,KAAI,CAAC,EAAE,CAAC;aACzC,CAAC,CAAA;YAEF,UAAU,CAAC,YAAY,CAAC,SAAS,EAAE,CAAA;YAEnC,MAAM,OAAO,CAAC,eAAe,CAAC;gBAC5B,SAAS,EAAE,GAAG;gBACd,SAAS,EAAE,KAAK;gBAChB,MAAM,EAAE,QAAQ;aACjB,CAAC,CAAA;YAEF,IAAA,gBAAM,EAAC,UAAU,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACxD,MAAM,EAAE,OAAO,EAAE,GAAG,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;YAC5D,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,0BAA0B,CAAC,CAAA;YAC1D,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,OAAO,CAC7B,gBAAM,CAAC,eAAe,CAAC,CAAC,sBAAsB,EAAE,iBAAiB,EAAE,UAAU,EAAE,mBAAmB,CAAC,CAAC,CACrG,CAAA;YACD,wFAAwF;YACxF,oGAAoG;YACpG,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACrD,CAAC,CAAC,CAAA;QAEF,IAAA,YAAE,EAAC,yDAAyD,EAAE,KAAK,IAAI,EAAE;YACvE,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,UAAU;gBAChB,UAAU,EAAE,aAAa;gBACzB,QAAQ,EAAE;oBACR,QAAQ,EAAE,IAAI;iBACf;aACF,CAAA;YACD,MAAM,GAAG,GAAI,OAAe,CAAC,eAAe,CAAC,OAAO,CAAC,CACpD;YAAC,OAAe,CAAC,cAAc,CAAC,GAAG,CAAC,GAAG,EAAE;gBACxC,OAAO;gBACP,OAAO,EAAE,CAAC,EAAE,OAAO,KAAI,CAAC,EAAE,MAAM,KAAI,CAAC,EAAE,CAAC;aACzC,CAAC,CAAA;YAEF,UAAU,CAAC,YAAY,CAAC,SAAS,EAAE,CAAA;YAEnC,gDAAgD;YAChD,MAAM,OAAO,CAAC,eAAe,CAAC;gBAC5B,SAAS,EAAE,GAAG;gBACd,SAAS,EAAE,KAAK;gBAChB,MAAM,EAAE,KAAK;aACd,CAAC,CAAA;YAEF,IAAA,gBAAM,EAAC,UAAU,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACxD,MAAM,EAAE,OAAO,EAAE,GAAG,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;YAC5D,iCAAiC;YACjC,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,8BAA8B,CAAC,CAAA;YAC9D,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,gBAAM,CAAC,eAAe,CAAC,CAAC,wBAAwB,CAAC,CAAC,CAAC,CAAA;YACnF,iGAAiG;YACjG,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACrD,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF;;;;;;;OAOG;IAEH,IAAA,kBAAQ,EAAC,mCAAmC,EAAE,GAAG,EAAE;QACjD,IAAA,YAAE,EAAC,6FAA6F,EAAE,KAAK,IAAI,EAAE;YAC3G,8CAA8C;YAC9C,MAAM,QAAQ,GAAoB;gBAChC,IAAI,EAAE,YAAY;gBAClB,WAAW,EAAE,CAAC;gBACd,YAAY,EAAE,aAAa,EAAE,uBAAuB;gBACpD,QAAQ,EAAE,CAAC;gBACX,UAAU,EAAE,cAAc;gBAC1B,MAAM,EAAE,MAAM;gBACd,UAAU,EAAE,KAAK;gBACjB,aAAa,EAAE,CAAC;gBAChB,QAAQ,EAAE,WAAW;gBACrB,YAAY,EAAE,MAAM;aACrB,CAAA;YAED,+BAA+B;YAC/B,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,UAAU;gBAChB,UAAU,EAAE,cAAc;gBAC1B,UAAU,EAAE,KAAK;gBACjB,UAAU,EAAE,CAAC,CAAC,EAAE,WAAW,CAAC;gBAC5B,YAAY,EAAE,MAAM;gBACpB,OAAO,EAAE,IAAI;gBACb,aAAa,EAAE,QAAQ;aACxB,CAAA;YAED,sEAAsE;YACtE,6CAA6C;YAC7C,MAAM,GAAG,GAAI,OAAe,CAAC,eAAe,CAAC,OAAO,CAAC,CACpD;YAAC,OAAe,CAAC,cAAc,CAAC,GAAG,CAAC,GAAG,EAAE;gBACxC,OAAO;gBACP,OAAO,EAAE,CAAC,EAAE,OAAO,KAAI,CAAC,EAAE,MAAM,KAAI,CAAC,EAAE,CAAC;aACzC,CAAC,CAAA;YAEF,wDAAwD;YACxD,UAAU,CAAC,YAAY,CAAC,SAAS,EAAE,CAAA;YAEnC,MAAM,OAAO,CAAC,eAAe,CAAC;gBAC5B,SAAS,EAAE,GAAG;gBACd,SAAS,EAAE,KAAK;gBAChB,MAAM,EAAE,MAAM,CAAC,aAAa;aAC7B,CAAC,CAAA;YAEF,+BAA+B;YAC/B,iDAAiD;YACjD,kCAAkC;YAClC,IAAA,gBAAM,EAAC,UAAU,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACxD,MAAM,UAAU,GAAG,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;YAC3D,IAAA,gBAAM,EAAC,UAAU,CAAC,MAAM,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YACzC,IAAA,gBAAM,EAAC,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAA;YAC1D,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAC1C,sDAAsD;YACtD,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,2BAA2B,CAAC,CAAA;YAEtE,6DAA6D;YAC7D,4GAA4G;YAC5G,2BAA2B;YAC3B,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACrD,CAAC,CAAC,CAAA;QAEF,IAAA,YAAE,EAAC,4DAA4D,EAAE,KAAK,IAAI,EAAE;YAC1E,MAAM,QAAQ,GAAoB;gBAChC,IAAI,EAAE,aAAa;gBACnB,WAAW,EAAE,CAAC;gBACd,YAAY,EAAE,eAAe;gBAC7B,QAAQ,EAAE,CAAC;gBACX,UAAU,EAAE,cAAc;gBAC1B,gBAAgB,EAAE,KAAK;gBACvB,MAAM,EAAE,CAAC;aACV,CAAA;YACD,MAAM,OAAO,GAAsB;gBACjC,IAAI,EAAE,UAAU;gBAChB,UAAU,EAAE,cAAc;gBAC1B,QAAQ,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE;gBAC5B,OAAO,EAAE,IAAI;gBACb,aAAa,EAAE,QAAQ;aACxB,CAAA;YACD,MAAM,GAAG,GAAI,OAAe,CAAC,eAAe,CAAC,OAAO,CAAC,CACpD;YAAC,OAAe,CAAC,cAAc,CAAC,GAAG,CAAC,GAAG,EAAE;gBACxC,OAAO;gBACP,OAAO,EAAE,CAAC,EAAE,OAAO,KAAI,CAAC,EAAE,MAAM,KAAI,CAAC,EAAE,CAAC;aACzC,CAAC,CAAA;YAEF,UAAU,CAAC,YAAY,CAAC,SAAS,EAAE,CAAA;YAEnC,qCAAqC;YACrC,MAAM,OAAO,CAAC,eAAe,CAAC;gBAC5B,SAAS,EAAE,GAAG;gBACd,MAAM,EAAE,KAAK;gBACb,SAAS,EAAE,KAAK;aACjB,CAAC,CAAA;YAEF,QAAQ;YACR,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,GAAG,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;YACpE,IAAA,gBAAM,EAAC,MAAM,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAC9B,IAAA,gBAAM,EAAC,MAAM,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAA;YAEhD,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAC/B,IAAA,gBAAM,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,8BAA8B,CAAC,CAAA;YAE9D,sDAAsD;YACtD,6GAA6G;YAC7G,qCAAqC;YACrC,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACnD,gDAAgD;YAChD,MAAM,eAAe,GAAG,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAA;YACrE,MAAM,KAAK,GAAG,MAAM,CAAC,YAAY,CAAC,GAAG,eAAe,CAAC,CAAA;YACrD,IAAA,gBAAM,EAAC,KAAK,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAA;QAC7B,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF;;;;;;;;OAQG;IAEH,IAAA,kBAAQ,EAAC,sCAAsC,EAAE,GAAG,EAAE;QACpD,IAAA,YAAE,EAAC,sFAAsF,EAAE,KAAK,IAAI,EAAE;YACpG,qBAAqB;YACrB,MAAM,QAAQ,GAAoB;gBAChC,IAAI,EAAE,qBAAqB;gBAC3B,WAAW,EAAE,CAAC;gBACd,YAAY,EAAE,oBAAoB;gBAClC,QAAQ,EAAE,CAAC;gBACX,UAAU,EAAE,aAAa;gBACzB,UAAU,EAAE,UAAU;gBACtB,MAAM,EAAE,UAAU;aACnB,CAAA;YAED,UAAU,CAAC,YAAY,CAAC,SAAS,EAAE,CAAA;YACnC,UAAU,CAAC,UAAU,CAAC,SAAS,EAAE,CAAA;YAEjC,MAAM,OAAO,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAA;YAExC,uEAAuE;YACvE,IAAA,gBAAM,EAAC,UAAU,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACxD,MAAM,UAAU,GAAG,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;YAC3D,IAAA,gBAAM,EAAC,UAAU,CAAC,MAAM,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YACzC,IAAA,gBAAM,EAAC,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAA;YAEnE,yCAAyC;YACzC,IAAA,gBAAM,EAAC,UAAU,CAAC,OAAO,IAAI,EAAE,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YAEhD,gEAAgE;YAChE,IAAA,gBAAM,EAAC,UAAU,CAAC,UAAU,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACtD,MAAM,QAAQ,GAAG,UAAU,CAAC,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;YACvD,mEAAmE;YACnE,IAAA,gBAAM,EAAC,QAAQ,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAA;YAEhD,iEAAiE;YACjE,IAAA,gBAAM,EAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,cAAc,CAAC,mBAAmB,CAAC,CAAA;YAC3D,0DAA0D;YAC1D,IAAA,gBAAM,EAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,WAAW,EAAE,CAAA;QAC1D,CAAC,CAAC,CAAA;QAEF,IAAA,YAAE,EAAC,2DAA2D,EAAE,KAAK,IAAI,EAAE;YACzE,kFAAkF;YAClF,MAAM,QAAQ,GAAoB;gBAChC,IAAI,EAAE,UAAU;gBAChB,WAAW,EAAE,CAAC;gBACd,YAAY,EAAE,aAAa;gBAC3B,QAAQ,EAAE,CAAC;gBACX,UAAU,EAAE,aAAa;gBACzB,MAAM,EAAE,MAAM;gBACd,UAAU,EAAE,UAAU;aACvB,CAAA;YACD,yEAAyE;YACzE,UAAU,CAAC,WAAW,CAAC,qBAAqB,CAAC;gBAC3C,YAAY,EAAE,CAAC;gBACf,OAAO,EAAE;oBACP;wBACE,QAAQ,EAAE,YAAY;wBACtB,aAAa,EAAE,aAAa;wBAC5B,QAAQ,EAAE,CAAC;wBACX,IAAI,EAAE,CAAC,wBAAwB,EAAE,iBAAiB,CAAC;qBACpD;iBACF;aACF,CAAC,CAAA;YAEF,kDAAkD;YAClD,MAAM,YAAY,GAAG,MAAM,OAAO,CAAC,gBAAgB,CAAC;gBAClD,UAAU,EAAE,aAAa;aAC1B,CAAC,CAAA;YACF,IAAA,gBAAM,EAAC,YAAY,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;YACpC,IAAA,gBAAM,EAAC,YAAY,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAA;YAE7C,sBAAsB;YACtB,MAAM,OAAO,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAA;YAExC,uEAAuE;YACvE,UAAU,CAAC,WAAW,CAAC,iBAAiB,CAAC;gBACvC,YAAY,EAAE,CAAC;gBACf,OAAO,EAAE,EAAE;aACZ,CAAC,CAAA;YAEF,MAAM,WAAW,GAAG,MAAM,OAAO,CAAC,gBAAgB,CAAC;gBACjD,UAAU,EAAE,aAAa;aAC1B,CAAC,CAAA;YACF,IAAA,gBAAM,EAAC,WAAW,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAA;QACrC,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;AACJ,CAAC,CAAC,CAAA"}
|
package/out/src/index.all.d.ts
CHANGED
|
@@ -7,4 +7,13 @@ export * from './storage/index.all';
|
|
|
7
7
|
export * from './services/Services';
|
|
8
8
|
export * from './monitor/Monitor';
|
|
9
9
|
export * from './monitor/MonitorDaemon';
|
|
10
|
+
export * from './WalletPermissionsManager';
|
|
11
|
+
export * from './CWIStyleWalletManager';
|
|
12
|
+
export * from './WalletAuthenticationManager';
|
|
13
|
+
export * from './sdk/PrivilegedKeyManager';
|
|
14
|
+
export * from './SimpleWalletManager';
|
|
15
|
+
export * from './wab-client/WABClient';
|
|
16
|
+
export * from './wab-client/auth-method-interactors/TwilioPhoneInteractor';
|
|
17
|
+
export * from './wab-client/auth-method-interactors/PersonaIDInteractor';
|
|
18
|
+
export * from './wab-client/auth-method-interactors/AuthMethodInteractor';
|
|
10
19
|
//# sourceMappingURL=index.all.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.all.d.ts","sourceRoot":"","sources":["../../src/index.all.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,GAAG,MAAM,aAAa,CAAA;AAClC,cAAc,qBAAqB,CAAA;AACnC,cAAc,UAAU,CAAA;AACxB,cAAc,SAAS,CAAA;AACvB,cAAc,uBAAuB,CAAA;AACrC,cAAc,qBAAqB,CAAA;AACnC,cAAc,qBAAqB,CAAA;AACnC,cAAc,mBAAmB,CAAA;AACjC,cAAc,yBAAyB,CAAA"}
|
|
1
|
+
{"version":3,"file":"index.all.d.ts","sourceRoot":"","sources":["../../src/index.all.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,GAAG,MAAM,aAAa,CAAA;AAClC,cAAc,qBAAqB,CAAA;AACnC,cAAc,UAAU,CAAA;AACxB,cAAc,SAAS,CAAA;AACvB,cAAc,uBAAuB,CAAA;AACrC,cAAc,qBAAqB,CAAA;AACnC,cAAc,qBAAqB,CAAA;AACnC,cAAc,mBAAmB,CAAA;AACjC,cAAc,yBAAyB,CAAA;AACvC,cAAc,4BAA4B,CAAA;AAC1C,cAAc,yBAAyB,CAAA;AACvC,cAAc,+BAA+B,CAAA;AAC7C,cAAc,4BAA4B,CAAA;AAC1C,cAAc,uBAAuB,CAAA;AACrC,cAAc,wBAAwB,CAAA;AACtC,cAAc,4DAA4D,CAAA;AAC1E,cAAc,0DAA0D,CAAA;AACxE,cAAc,2DAA2D,CAAA"}
|
package/out/src/index.all.js
CHANGED
|
@@ -46,4 +46,13 @@ __exportStar(require("./storage/index.all"), exports);
|
|
|
46
46
|
__exportStar(require("./services/Services"), exports);
|
|
47
47
|
__exportStar(require("./monitor/Monitor"), exports);
|
|
48
48
|
__exportStar(require("./monitor/MonitorDaemon"), exports);
|
|
49
|
+
__exportStar(require("./WalletPermissionsManager"), exports);
|
|
50
|
+
__exportStar(require("./CWIStyleWalletManager"), exports);
|
|
51
|
+
__exportStar(require("./WalletAuthenticationManager"), exports);
|
|
52
|
+
__exportStar(require("./sdk/PrivilegedKeyManager"), exports);
|
|
53
|
+
__exportStar(require("./SimpleWalletManager"), exports);
|
|
54
|
+
__exportStar(require("./wab-client/WABClient"), exports);
|
|
55
|
+
__exportStar(require("./wab-client/auth-method-interactors/TwilioPhoneInteractor"), exports);
|
|
56
|
+
__exportStar(require("./wab-client/auth-method-interactors/PersonaIDInteractor"), exports);
|
|
57
|
+
__exportStar(require("./wab-client/auth-method-interactors/AuthMethodInteractor"), exports);
|
|
49
58
|
//# sourceMappingURL=index.all.js.map
|
package/out/src/index.all.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.all.js","sourceRoot":"","sources":["../../src/index.all.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,mDAAkC;AAClC,sDAAmC;AACnC,2CAAwB;AACxB,0CAAuB;AACvB,wDAAqC;AACrC,sDAAmC;AACnC,sDAAmC;AACnC,oDAAiC;AACjC,0DAAuC"}
|
|
1
|
+
{"version":3,"file":"index.all.js","sourceRoot":"","sources":["../../src/index.all.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,mDAAkC;AAClC,sDAAmC;AACnC,2CAAwB;AACxB,0CAAuB;AACvB,wDAAqC;AACrC,sDAAmC;AACnC,sDAAmC;AACnC,oDAAiC;AACjC,0DAAuC;AACvC,6DAA0C;AAC1C,0DAAuC;AACvC,gEAA6C;AAC7C,6DAA0C;AAC1C,wDAAqC;AACrC,yDAAsC;AACtC,6FAA0E;AAC1E,2FAAwE;AACxE,4FAAyE"}
|
|
@@ -5,4 +5,13 @@ export * from './signer/WalletSigner';
|
|
|
5
5
|
export * from './storage/index.client';
|
|
6
6
|
export * from './services/Services';
|
|
7
7
|
export * from './monitor/Monitor';
|
|
8
|
+
export * from './WalletPermissionsManager';
|
|
9
|
+
export * from './CWIStyleWalletManager';
|
|
10
|
+
export * from './WalletAuthenticationManager';
|
|
11
|
+
export * from './sdk/PrivilegedKeyManager';
|
|
12
|
+
export * from './SimpleWalletManager';
|
|
13
|
+
export * from './wab-client/WABClient';
|
|
14
|
+
export * from './wab-client/auth-method-interactors/TwilioPhoneInteractor';
|
|
15
|
+
export * from './wab-client/auth-method-interactors/PersonaIDInteractor';
|
|
16
|
+
export * from './wab-client/auth-method-interactors/AuthMethodInteractor';
|
|
8
17
|
//# sourceMappingURL=index.client.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.client.d.ts","sourceRoot":"","sources":["../../src/index.client.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,GAAG,MAAM,aAAa,CAAA;AAClC,cAAc,wBAAwB,CAAA;AACtC,cAAc,UAAU,CAAA;AACxB,cAAc,uBAAuB,CAAA;AACrC,cAAc,wBAAwB,CAAA;AACtC,cAAc,qBAAqB,CAAA;AACnC,cAAc,mBAAmB,CAAA"}
|
|
1
|
+
{"version":3,"file":"index.client.d.ts","sourceRoot":"","sources":["../../src/index.client.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,GAAG,MAAM,aAAa,CAAA;AAClC,cAAc,wBAAwB,CAAA;AACtC,cAAc,UAAU,CAAA;AACxB,cAAc,uBAAuB,CAAA;AACrC,cAAc,wBAAwB,CAAA;AACtC,cAAc,qBAAqB,CAAA;AACnC,cAAc,mBAAmB,CAAA;AACjC,cAAc,4BAA4B,CAAA;AAC1C,cAAc,yBAAyB,CAAA;AACvC,cAAc,+BAA+B,CAAA;AAC7C,cAAc,4BAA4B,CAAA;AAC1C,cAAc,uBAAuB,CAAA;AACrC,cAAc,wBAAwB,CAAA;AACtC,cAAc,4DAA4D,CAAA;AAC1E,cAAc,0DAA0D,CAAA;AACxE,cAAc,2DAA2D,CAAA"}
|
package/out/src/index.client.js
CHANGED
|
@@ -44,4 +44,13 @@ __exportStar(require("./signer/WalletSigner"), exports);
|
|
|
44
44
|
__exportStar(require("./storage/index.client"), exports);
|
|
45
45
|
__exportStar(require("./services/Services"), exports);
|
|
46
46
|
__exportStar(require("./monitor/Monitor"), exports);
|
|
47
|
+
__exportStar(require("./WalletPermissionsManager"), exports);
|
|
48
|
+
__exportStar(require("./CWIStyleWalletManager"), exports);
|
|
49
|
+
__exportStar(require("./WalletAuthenticationManager"), exports);
|
|
50
|
+
__exportStar(require("./sdk/PrivilegedKeyManager"), exports);
|
|
51
|
+
__exportStar(require("./SimpleWalletManager"), exports);
|
|
52
|
+
__exportStar(require("./wab-client/WABClient"), exports);
|
|
53
|
+
__exportStar(require("./wab-client/auth-method-interactors/TwilioPhoneInteractor"), exports);
|
|
54
|
+
__exportStar(require("./wab-client/auth-method-interactors/PersonaIDInteractor"), exports);
|
|
55
|
+
__exportStar(require("./wab-client/auth-method-interactors/AuthMethodInteractor"), exports);
|
|
47
56
|
//# sourceMappingURL=index.client.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.client.js","sourceRoot":"","sources":["../../src/index.client.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,mDAAkC;AAClC,yDAAsC;AACtC,2CAAwB;AACxB,wDAAqC;AACrC,yDAAsC;AACtC,sDAAmC;AACnC,oDAAiC"}
|
|
1
|
+
{"version":3,"file":"index.client.js","sourceRoot":"","sources":["../../src/index.client.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,mDAAkC;AAClC,yDAAsC;AACtC,2CAAwB;AACxB,wDAAqC;AACrC,yDAAsC;AACtC,sDAAmC;AACnC,oDAAiC;AACjC,6DAA0C;AAC1C,0DAAuC;AACvC,gEAA6C;AAC7C,6DAA0C;AAC1C,wDAAqC;AACrC,yDAAsC;AACtC,6FAA0E;AAC1E,2FAAwE;AACxE,4FAAyE"}
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
import { GetPublicKeyArgs, GetPublicKeyResult, OriginatorDomainNameStringUnder250Bytes, WalletDecryptArgs, WalletDecryptResult, WalletEncryptArgs, WalletEncryptResult } from '@bsv/sdk';
|
|
2
|
+
export interface CertOpsWallet {
|
|
3
|
+
getPublicKey(args: GetPublicKeyArgs, originator?: OriginatorDomainNameStringUnder250Bytes): Promise<GetPublicKeyResult>;
|
|
4
|
+
encrypt(args: WalletEncryptArgs, originator?: OriginatorDomainNameStringUnder250Bytes): Promise<WalletEncryptResult>;
|
|
5
|
+
decrypt(args: WalletDecryptArgs, originator?: OriginatorDomainNameStringUnder250Bytes): Promise<WalletDecryptResult>;
|
|
6
|
+
}
|
|
7
|
+
//# sourceMappingURL=CertOpsWallet.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"CertOpsWallet.d.ts","sourceRoot":"","sources":["../../../src/sdk/CertOpsWallet.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,gBAAgB,EAChB,kBAAkB,EAClB,uCAAuC,EACvC,iBAAiB,EACjB,mBAAmB,EACnB,iBAAiB,EACjB,mBAAmB,EACpB,MAAM,UAAU,CAAA;AAEjB,MAAM,WAAW,aAAa;IAC5B,YAAY,CACV,IAAI,EAAE,gBAAgB,EACtB,UAAU,CAAC,EAAE,uCAAuC,GACnD,OAAO,CAAC,kBAAkB,CAAC,CAAA;IAC9B,OAAO,CAAC,IAAI,EAAE,iBAAiB,EAAE,UAAU,CAAC,EAAE,uCAAuC,GAAG,OAAO,CAAC,mBAAmB,CAAC,CAAA;IACpH,OAAO,CAAC,IAAI,EAAE,iBAAiB,EAAE,UAAU,CAAC,EAAE,uCAAuC,GAAG,OAAO,CAAC,mBAAmB,CAAC,CAAA;CACrH"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"CertOpsWallet.js","sourceRoot":"","sources":["../../../src/sdk/CertOpsWallet.ts"],"names":[],"mappings":""}
|