@bsv/wallet-toolbox 1.1.61 → 1.2.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (199) hide show
  1. package/docs/client.md +2339 -182
  2. package/docs/wallet.md +2339 -182
  3. package/out/src/CWIStyleWalletManager.d.ts +417 -0
  4. package/out/src/CWIStyleWalletManager.d.ts.map +1 -0
  5. package/out/src/CWIStyleWalletManager.js +1153 -0
  6. package/out/src/CWIStyleWalletManager.js.map +1 -0
  7. package/out/src/SimpleWalletManager.d.ts +169 -0
  8. package/out/src/SimpleWalletManager.d.ts.map +1 -0
  9. package/out/src/SimpleWalletManager.js +315 -0
  10. package/out/src/SimpleWalletManager.js.map +1 -0
  11. package/out/src/Wallet.d.ts +6 -1
  12. package/out/src/Wallet.d.ts.map +1 -1
  13. package/out/src/Wallet.js +39 -7
  14. package/out/src/Wallet.js.map +1 -1
  15. package/out/src/WalletAuthenticationManager.d.ts +33 -0
  16. package/out/src/WalletAuthenticationManager.d.ts.map +1 -0
  17. package/out/src/WalletAuthenticationManager.js +110 -0
  18. package/out/src/WalletAuthenticationManager.js.map +1 -0
  19. package/out/src/WalletPermissionsManager.d.ts +575 -0
  20. package/out/src/WalletPermissionsManager.d.ts.map +1 -0
  21. package/out/src/WalletPermissionsManager.js +1789 -0
  22. package/out/src/WalletPermissionsManager.js.map +1 -0
  23. package/out/src/WalletSettingsManager.d.ts +59 -0
  24. package/out/src/WalletSettingsManager.d.ts.map +1 -0
  25. package/out/src/WalletSettingsManager.js +189 -0
  26. package/out/src/WalletSettingsManager.js.map +1 -0
  27. package/out/src/__tests/CWIStyleWalletManager.test.d.ts +2 -0
  28. package/out/src/__tests/CWIStyleWalletManager.test.d.ts.map +1 -0
  29. package/out/src/__tests/CWIStyleWalletManager.test.js +471 -0
  30. package/out/src/__tests/CWIStyleWalletManager.test.js.map +1 -0
  31. package/out/src/__tests/WalletPermissionsManager.callbacks.test.d.ts +2 -0
  32. package/out/src/__tests/WalletPermissionsManager.callbacks.test.d.ts.map +1 -0
  33. package/out/src/__tests/WalletPermissionsManager.callbacks.test.js +239 -0
  34. package/out/src/__tests/WalletPermissionsManager.callbacks.test.js.map +1 -0
  35. package/out/src/__tests/WalletPermissionsManager.checks.test.d.ts +2 -0
  36. package/out/src/__tests/WalletPermissionsManager.checks.test.d.ts.map +1 -0
  37. package/out/src/__tests/WalletPermissionsManager.checks.test.js +637 -0
  38. package/out/src/__tests/WalletPermissionsManager.checks.test.js.map +1 -0
  39. package/out/src/__tests/WalletPermissionsManager.encryption.test.d.ts +2 -0
  40. package/out/src/__tests/WalletPermissionsManager.encryption.test.d.ts.map +1 -0
  41. package/out/src/__tests/WalletPermissionsManager.encryption.test.js +295 -0
  42. package/out/src/__tests/WalletPermissionsManager.encryption.test.js.map +1 -0
  43. package/out/src/__tests/WalletPermissionsManager.fixtures.d.ts +83 -0
  44. package/out/src/__tests/WalletPermissionsManager.fixtures.d.ts.map +1 -0
  45. package/out/src/__tests/WalletPermissionsManager.fixtures.js +261 -0
  46. package/out/src/__tests/WalletPermissionsManager.fixtures.js.map +1 -0
  47. package/out/src/__tests/WalletPermissionsManager.flows.test.d.ts +2 -0
  48. package/out/src/__tests/WalletPermissionsManager.flows.test.d.ts.map +1 -0
  49. package/out/src/__tests/WalletPermissionsManager.flows.test.js +377 -0
  50. package/out/src/__tests/WalletPermissionsManager.flows.test.js.map +1 -0
  51. package/out/src/__tests/WalletPermissionsManager.initialization.test.d.ts +2 -0
  52. package/out/src/__tests/WalletPermissionsManager.initialization.test.d.ts.map +1 -0
  53. package/out/src/__tests/WalletPermissionsManager.initialization.test.js +227 -0
  54. package/out/src/__tests/WalletPermissionsManager.initialization.test.js.map +1 -0
  55. package/out/src/__tests/WalletPermissionsManager.proxying.test.d.ts +2 -0
  56. package/out/src/__tests/WalletPermissionsManager.proxying.test.d.ts.map +1 -0
  57. package/out/src/__tests/WalletPermissionsManager.proxying.test.js +566 -0
  58. package/out/src/__tests/WalletPermissionsManager.proxying.test.js.map +1 -0
  59. package/out/src/__tests/WalletPermissionsManager.tokens.test.d.ts +2 -0
  60. package/out/src/__tests/WalletPermissionsManager.tokens.test.d.ts.map +1 -0
  61. package/out/src/__tests/WalletPermissionsManager.tokens.test.js +454 -0
  62. package/out/src/__tests/WalletPermissionsManager.tokens.test.js.map +1 -0
  63. package/out/src/index.all.d.ts +9 -0
  64. package/out/src/index.all.d.ts.map +1 -1
  65. package/out/src/index.all.js +9 -0
  66. package/out/src/index.all.js.map +1 -1
  67. package/out/src/index.client.d.ts +9 -0
  68. package/out/src/index.client.d.ts.map +1 -1
  69. package/out/src/index.client.js +9 -0
  70. package/out/src/index.client.js.map +1 -1
  71. package/out/src/sdk/CertOpsWallet.d.ts +7 -0
  72. package/out/src/sdk/CertOpsWallet.d.ts.map +1 -0
  73. package/out/src/sdk/CertOpsWallet.js +3 -0
  74. package/out/src/sdk/CertOpsWallet.js.map +1 -0
  75. package/out/src/sdk/__test/CertificateLifeCycle.test.js +19 -82
  76. package/out/src/sdk/__test/CertificateLifeCycle.test.js.map +1 -1
  77. package/out/src/sdk/index.d.ts +1 -1
  78. package/out/src/sdk/index.d.ts.map +1 -1
  79. package/out/src/sdk/index.js +1 -1
  80. package/out/src/sdk/index.js.map +1 -1
  81. package/out/src/sdk/validationHelpers.d.ts.map +1 -1
  82. package/out/src/sdk/validationHelpers.js +13 -12
  83. package/out/src/sdk/validationHelpers.js.map +1 -1
  84. package/out/src/services/__tests/ARC.test.js +9 -0
  85. package/out/src/services/__tests/ARC.test.js.map +1 -1
  86. package/out/src/services/__tests/bitrails.test.js +7 -2
  87. package/out/src/services/__tests/bitrails.test.js.map +1 -1
  88. package/out/src/services/providers/ARC.js +1 -1
  89. package/out/src/services/providers/ARC.js.map +1 -1
  90. package/out/src/services/providers/__tests/WhatsOnChain.test.js +3 -3
  91. package/out/src/services/providers/__tests/WhatsOnChain.test.js.map +1 -1
  92. package/out/src/signer/methods/proveCertificate.d.ts.map +1 -1
  93. package/out/src/signer/methods/proveCertificate.js +3 -19
  94. package/out/src/signer/methods/proveCertificate.js.map +1 -1
  95. package/out/src/storage/__test/WalletStorageManager.test.js +1 -1
  96. package/out/src/storage/__test/WalletStorageManager.test.js.map +1 -1
  97. package/out/src/storage/methods/listOutputs.js +1 -1
  98. package/out/src/storage/methods/listOutputs.js.map +1 -1
  99. package/out/src/storage/remoting/StorageClient.d.ts +2 -2
  100. package/out/src/storage/remoting/StorageClient.d.ts.map +1 -1
  101. package/out/src/storage/remoting/StorageClient.js +1 -1
  102. package/out/src/storage/remoting/StorageClient.js.map +1 -1
  103. package/out/src/utility/identityUtils.d.ts +31 -0
  104. package/out/src/utility/identityUtils.d.ts.map +1 -0
  105. package/out/src/utility/identityUtils.js +116 -0
  106. package/out/src/utility/identityUtils.js.map +1 -0
  107. package/out/src/wab-client/WABClient.d.ts +49 -0
  108. package/out/src/wab-client/WABClient.d.ts.map +1 -0
  109. package/out/src/wab-client/WABClient.js +83 -0
  110. package/out/src/wab-client/WABClient.js.map +1 -0
  111. package/out/src/wab-client/__tests/WABClient.man.test.d.ts +2 -0
  112. package/out/src/wab-client/__tests/WABClient.man.test.d.ts.map +1 -0
  113. package/out/src/wab-client/__tests/WABClient.man.test.js +52 -0
  114. package/out/src/wab-client/__tests/WABClient.man.test.js.map +1 -0
  115. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts +34 -0
  116. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts.map +1 -0
  117. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js +16 -0
  118. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js.map +1 -0
  119. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts +7 -0
  120. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts.map +1 -0
  121. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js +36 -0
  122. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js.map +1 -0
  123. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts +28 -0
  124. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts.map +1 -0
  125. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js +69 -0
  126. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js.map +1 -0
  127. package/out/test/Wallet/action/internalizeAction.a.test.js +1 -1
  128. package/out/test/Wallet/action/internalizeAction.a.test.js.map +1 -1
  129. package/out/test/Wallet/certificate/acquireCertificate.test.js +26 -29
  130. package/out/test/Wallet/certificate/acquireCertificate.test.js.map +1 -1
  131. package/out/test/Wallet/local/localWallet.man.test.d.ts.map +1 -1
  132. package/out/test/Wallet/local/localWallet.man.test.js +25 -10
  133. package/out/test/Wallet/local/localWallet.man.test.js.map +1 -1
  134. package/out/test/storage/KnexMigrations.test.js +1 -1
  135. package/out/test/storage/KnexMigrations.test.js.map +1 -1
  136. package/out/test/storage/update.test.js +1 -1
  137. package/out/test/storage/update.test.js.map +1 -1
  138. package/out/test/utils/TestUtilsWalletStorage.d.ts +9 -5
  139. package/out/test/utils/TestUtilsWalletStorage.d.ts.map +1 -1
  140. package/out/test/utils/TestUtilsWalletStorage.js +15 -9
  141. package/out/test/utils/TestUtilsWalletStorage.js.map +1 -1
  142. package/out/test/wallet/action/internalizeAction.test.js +1 -1
  143. package/out/test/wallet/action/internalizeAction.test.js.map +1 -1
  144. package/out/test/wallet/list/listActions2.test.js +1 -1
  145. package/out/test/wallet/list/listActions2.test.js.map +1 -1
  146. package/out/test/wallet/sync/Wallet.sync.test.js +1 -1
  147. package/out/test/wallet/sync/Wallet.sync.test.js.map +1 -1
  148. package/out/tsconfig.all.tsbuildinfo +1 -1
  149. package/package.json +3 -4
  150. package/src/CWIStyleWalletManager.ts +1738 -0
  151. package/src/SimpleWalletManager.ts +526 -0
  152. package/src/Wallet.ts +70 -7
  153. package/src/WalletAuthenticationManager.ts +150 -0
  154. package/src/WalletPermissionsManager.ts +2424 -0
  155. package/src/WalletSettingsManager.ts +243 -0
  156. package/src/__tests/CWIStyleWalletManager.test.ts +604 -0
  157. package/src/__tests/WalletPermissionsManager.callbacks.test.ts +323 -0
  158. package/src/__tests/WalletPermissionsManager.checks.test.ts +839 -0
  159. package/src/__tests/WalletPermissionsManager.encryption.test.ts +370 -0
  160. package/src/__tests/WalletPermissionsManager.fixtures.ts +284 -0
  161. package/src/__tests/WalletPermissionsManager.flows.test.ts +457 -0
  162. package/src/__tests/WalletPermissionsManager.initialization.test.ts +300 -0
  163. package/src/__tests/WalletPermissionsManager.proxying.test.ts +706 -0
  164. package/src/__tests/WalletPermissionsManager.tokens.test.ts +546 -0
  165. package/src/index.all.ts +9 -0
  166. package/src/index.client.ts +9 -0
  167. package/src/sdk/CertOpsWallet.ts +18 -0
  168. package/src/sdk/__test/CertificateLifeCycle.test.ts +66 -113
  169. package/src/sdk/index.ts +1 -1
  170. package/src/sdk/validationHelpers.ts +12 -11
  171. package/src/services/__tests/ARC.test.ts +14 -1
  172. package/src/services/__tests/bitrails.test.ts +7 -2
  173. package/src/services/processingErrors/arcSuccessError.json +76 -0
  174. package/src/services/providers/ARC.ts +1 -1
  175. package/src/services/providers/__tests/WhatsOnChain.test.ts +3 -3
  176. package/src/signer/methods/proveCertificate.ts +14 -21
  177. package/src/storage/__test/WalletStorageManager.test.ts +1 -1
  178. package/src/storage/methods/listOutputs.ts +1 -1
  179. package/src/storage/remoting/StorageClient.ts +4 -4
  180. package/src/utility/identityUtils.ts +159 -0
  181. package/src/wab-client/WABClient.ts +94 -0
  182. package/src/wab-client/__tests/WABClient.man.test.ts +59 -0
  183. package/src/wab-client/auth-method-interactors/AuthMethodInteractor.ts +47 -0
  184. package/src/wab-client/auth-method-interactors/PersonaIDInteractor.ts +35 -0
  185. package/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.ts +72 -0
  186. package/test/Wallet/action/internalizeAction.a.test.ts +1 -1
  187. package/test/Wallet/certificate/acquireCertificate.test.ts +89 -30
  188. package/test/Wallet/local/localWallet.man.test.ts +20 -4
  189. package/test/storage/KnexMigrations.test.ts +1 -1
  190. package/test/storage/update.test.ts +1 -1
  191. package/test/utils/TestUtilsWalletStorage.ts +24 -13
  192. package/test/wallet/action/internalizeAction.test.ts +1 -1
  193. package/test/wallet/list/listActions2.test.ts +1 -1
  194. package/test/wallet/sync/Wallet.sync.test.ts +1 -1
  195. package/out/src/sdk/CertOps.d.ts +0 -66
  196. package/out/src/sdk/CertOps.d.ts.map +0 -1
  197. package/out/src/sdk/CertOps.js +0 -190
  198. package/out/src/sdk/CertOps.js.map +0 -1
  199. package/src/sdk/CertOps.ts +0 -274
@@ -0,0 +1,839 @@
1
+ import { mockUnderlyingWallet, MockedBSV_SDK } from './WalletPermissionsManager.fixtures'
2
+ import { WalletPermissionsManager, PermissionToken } from '../WalletPermissionsManager'
3
+
4
+ jest.mock('@bsv/sdk', () => MockedBSV_SDK)
5
+
6
+ describe('WalletPermissionsManager - Permission Checks', () => {
7
+ let underlying: jest.Mocked<any>
8
+ let manager: WalletPermissionsManager
9
+
10
+ beforeEach(() => {
11
+ // Fresh mock wallet before each test
12
+ underlying = mockUnderlyingWallet() as jest.Mocked<any>
13
+ })
14
+
15
+ afterEach(() => {
16
+ jest.clearAllMocks()
17
+ })
18
+
19
+ /* ------------------------------------------------------
20
+ * 5) PROTOCOL USAGE (DPACP) TESTS
21
+ * ------------------------------------------------------ */
22
+ describe('Protocol Usage (DPACP)', () => {
23
+ it('should skip permission prompt if secLevel=0 (open usage)', async () => {
24
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
25
+ seekProtocolPermissionsForSigning: true // Typically enforced
26
+ })
27
+
28
+ // Attempt createSignature with protocolID=[0, "someProtocol"]
29
+ // Because securityLevel=0, the manager should skip checks
30
+ await expect(
31
+ manager.createSignature(
32
+ {
33
+ protocolID: [0, 'open-protocol'],
34
+ data: [0x01, 0x02],
35
+ keyID: '1'
36
+ },
37
+ 'some-user.com'
38
+ )
39
+ ).resolves.not.toThrow()
40
+
41
+ // No permission request
42
+ const activeRequests = (manager as any).activeRequests as Map<string, any>
43
+ expect(activeRequests.size).toBe(0)
44
+
45
+ // Underlying createSignature called once
46
+ expect(underlying.createSignature).toHaveBeenCalledTimes(1)
47
+ })
48
+
49
+ it('should prompt for protocol usage if securityLevel=1 and no existing token', async () => {
50
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
51
+ seekProtocolPermissionsForSigning: true
52
+ })
53
+
54
+ // We'll bind a callback that grants ephemeral permission automatically
55
+ manager.bindCallback('onProtocolPermissionRequested', async request => {
56
+ // For tests, automatically grant ephemeral permission
57
+ await manager.grantPermission({
58
+ requestID: request.requestID,
59
+ ephemeral: true
60
+ })
61
+ })
62
+
63
+ // Because secLevel=1, we need a valid DPACP token
64
+ // We have no token => manager triggers a request => callback grants ephemeral => passes
65
+ await expect(
66
+ manager.createSignature(
67
+ {
68
+ protocolID: [1, 'test-protocol'],
69
+ data: [0x99, 0xaa],
70
+ keyID: '1'
71
+ },
72
+ 'some-nonadmin.com'
73
+ )
74
+ ).resolves.not.toThrow()
75
+
76
+ // The underlying signature should succeed
77
+ expect(underlying.createSignature).toHaveBeenCalledTimes(1)
78
+ })
79
+
80
+ it('should deny protocol usage if user denies permission', async () => {
81
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {})
82
+
83
+ // The callback denies the request
84
+ manager.bindCallback('onProtocolPermissionRequested', request => {
85
+ manager.denyPermission(request.requestID)
86
+ })
87
+
88
+ // Attempt an operation that requires protocol permission
89
+ await expect(
90
+ manager.encrypt(
91
+ {
92
+ protocolID: [1, 'needs-perm'],
93
+ plaintext: [1, 2, 3],
94
+ keyID: 'xyz'
95
+ },
96
+ 'external-app.com'
97
+ )
98
+ ).rejects.toThrow(/Permission denied/)
99
+
100
+ // Underlying encrypt was never called
101
+ expect(underlying.encrypt).toHaveBeenCalledTimes(0)
102
+ })
103
+
104
+ it('should enforce privileged token if differentiatePrivilegedOperations=true', async () => {
105
+ // By default, differentiatePrivilegedOperations is true.
106
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
107
+ seekProtocolPermissionsForSigning: true
108
+ })
109
+
110
+ manager.bindCallback('onProtocolPermissionRequested', async req => {
111
+ // The request has `privileged=true`, so the resulting token must also be privileged.
112
+ // We'll grant ephemeral to simulate success quickly.
113
+ await manager.grantPermission({
114
+ requestID: req.requestID,
115
+ ephemeral: true
116
+ })
117
+ })
118
+
119
+ // Attempt a privileged signature
120
+ await expect(
121
+ manager.createSignature(
122
+ {
123
+ protocolID: [1, 'high-level-crypto'],
124
+ privileged: true,
125
+ data: [0xc0, 0xff, 0xee],
126
+ keyID: '1'
127
+ },
128
+ 'nonadmin.app'
129
+ )
130
+ ).resolves.not.toThrow()
131
+
132
+ // Confirm underlying was ultimately called
133
+ expect(underlying.createSignature).toHaveBeenCalledTimes(1)
134
+ })
135
+
136
+ it('should ignore `privileged=true` if differentiatePrivilegedOperations=false', async () => {
137
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
138
+ differentiatePrivilegedOperations: false, // Forces privileged usage to be treated as non-privileged
139
+ seekProtocolPermissionsForSigning: true
140
+ })
141
+
142
+ // Because we treat privileged as false, the permission request does not need privileged credentials.
143
+ manager.bindCallback('onProtocolPermissionRequested', async req => {
144
+ await manager.grantPermission({
145
+ requestID: req.requestID,
146
+ ephemeral: true
147
+ })
148
+ })
149
+
150
+ await expect(
151
+ manager.createSignature(
152
+ {
153
+ protocolID: [1, 'some-protocol'],
154
+ privileged: true, // This flag will be ignored
155
+ data: [0x99],
156
+ keyID: 'keyXYZ'
157
+ },
158
+ 'nonadmin.com'
159
+ )
160
+ ).resolves.not.toThrow()
161
+ })
162
+
163
+ it('should fail if protocol name is admin-reserved and caller is not admin', async () => {
164
+ // admin-reserved means protocol name starts with "admin" or "p ".
165
+ manager = new WalletPermissionsManager(underlying, 'secure.admin.com')
166
+
167
+ // Non-admin tries to do e.g. `createHmac` with protocol name "admin super-secret"
168
+ await expect(
169
+ manager.createHmac(
170
+ {
171
+ protocolID: [1, 'admin super-secret'],
172
+ data: [0x01, 0x02],
173
+ keyID: '1'
174
+ },
175
+ 'not-an-admin.com'
176
+ )
177
+ ).rejects.toThrow(/admin-only/i)
178
+
179
+ // Underlying call never invoked
180
+ expect(underlying.createHmac).toHaveBeenCalledTimes(0)
181
+ })
182
+
183
+ it('should prompt for renewal if token is found but expired', async () => {
184
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {})
185
+
186
+ // Suppose the user already had a token but it’s expired. We mock `findProtocolToken` so that
187
+ // it returns an expired token, forcing a renewal request.
188
+ const expiredToken: PermissionToken = {
189
+ txid: 'oldtxid123',
190
+ outputIndex: 0,
191
+ outputScript: 'deadbeef',
192
+ satoshis: 1,
193
+ originator: 'some-nonadmin.com',
194
+ expiry: 1, // definitely in the past
195
+ privileged: false,
196
+ securityLevel: 1,
197
+ protocol: 'test-protocol',
198
+ counterparty: 'self'
199
+ }
200
+ jest.spyOn(manager as any, 'findProtocolToken').mockResolvedValue(expiredToken)
201
+
202
+ // We'll bind a callback that grants a renewal ephemeral
203
+ manager.bindCallback('onProtocolPermissionRequested', async req => {
204
+ expect(req.renewal).toBe(true)
205
+ expect(req.previousToken).toEqual(expiredToken)
206
+ await manager.grantPermission({
207
+ requestID: req.requestID,
208
+ ephemeral: true
209
+ })
210
+ })
211
+
212
+ // Now call an operation that requires protocol usage
213
+ await manager.createSignature(
214
+ {
215
+ protocolID: [1, 'test-protocol'],
216
+ data: [0xfe],
217
+ keyID: '1'
218
+ },
219
+ 'some-nonadmin.com'
220
+ )
221
+ // Should succeed after renewal
222
+ expect(underlying.createSignature).toHaveBeenCalledTimes(1)
223
+ })
224
+ })
225
+
226
+ /* ------------------------------------------------------
227
+ * 6) BASKET USAGE (DBAP) TESTS
228
+ * ------------------------------------------------------ */
229
+ describe('Basket Usage (DBAP)', () => {
230
+ it('should fail immediately if using an admin-only basket as non-admin', async () => {
231
+ manager = new WalletPermissionsManager(underlying, 'admin.com')
232
+ // Attempt to createAction to insert into "admin secret-basket" from a non-admin origin
233
+ await expect(
234
+ manager.createAction(
235
+ {
236
+ description: 'Insert into admin basket',
237
+ outputs: [
238
+ {
239
+ lockingScript: 'abcd',
240
+ satoshis: 100,
241
+ basket: 'admin secret-basket',
242
+ outputDescription: 'Nothing to see here'
243
+ }
244
+ ]
245
+ },
246
+ 'non-admin.com'
247
+ )
248
+ ).rejects.toThrow(/admin-only/i)
249
+
250
+ // Underlying createAction never called
251
+ expect(underlying.createAction).toHaveBeenCalledTimes(0)
252
+ })
253
+
254
+ it('should fail immediately if using the reserved basket "default" as non-admin', async () => {
255
+ manager = new WalletPermissionsManager(underlying, 'admin.com')
256
+ await expect(
257
+ manager.createAction(
258
+ {
259
+ description: 'Insert to default basket',
260
+ outputs: [
261
+ {
262
+ lockingScript: '0x1234',
263
+ satoshis: 1,
264
+ basket: 'default',
265
+ outputDescription: 'Nothing to see here'
266
+ }
267
+ ]
268
+ },
269
+ 'some-nonadmin.com'
270
+ )
271
+ ).rejects.toThrow(/admin-only/i)
272
+ })
273
+
274
+ it('should prompt for insertion permission if seekBasketInsertionPermissions=true', async () => {
275
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
276
+ seekBasketInsertionPermissions: true
277
+ })
278
+
279
+ // auto-grant ephemeral
280
+ manager.bindCallback('onBasketAccessRequested', async req => {
281
+ await manager.grantPermission({
282
+ requestID: req.requestID,
283
+ ephemeral: true
284
+ })
285
+ })
286
+
287
+ // Also auto-grant unrelated spending authorization (since this is createAction)
288
+ manager.bindCallback('onSpendingAuthorizationRequested', async req => {
289
+ await manager.grantPermission({
290
+ requestID: req.requestID,
291
+ ephemeral: true
292
+ })
293
+ })
294
+
295
+ await expect(
296
+ manager.createAction(
297
+ {
298
+ description: 'Insert to user-basket',
299
+ outputs: [
300
+ {
301
+ lockingScript: '7812',
302
+ satoshis: 1,
303
+ basket: 'user-basket',
304
+ outputDescription: 'Nothing to see here'
305
+ }
306
+ ]
307
+ },
308
+ 'some-nonadmin.com'
309
+ )
310
+ ).resolves.not.toThrow()
311
+
312
+ // Confirm underlying createAction was eventually invoked
313
+ expect(underlying.createAction).toHaveBeenCalledTimes(1)
314
+ })
315
+
316
+ it('should skip insertion permission if seekBasketInsertionPermissions=false', async () => {
317
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
318
+ seekBasketInsertionPermissions: false
319
+ })
320
+
321
+ // Auto-grant unrelated spending authorization (since this is createAction)
322
+ manager.bindCallback('onSpendingAuthorizationRequested', async req => {
323
+ await manager.grantPermission({
324
+ requestID: req.requestID,
325
+ ephemeral: true
326
+ })
327
+ })
328
+
329
+ await manager.createAction(
330
+ {
331
+ description: 'Insert to user-basket',
332
+ outputs: [
333
+ {
334
+ lockingScript: '1234',
335
+ satoshis: 1,
336
+ basket: 'some-basket',
337
+ outputDescription: 'Nothing to see here'
338
+ }
339
+ ]
340
+ },
341
+ 'nonadmin.com'
342
+ )
343
+ // No requests queued, underlying is called
344
+ const activeRequests = (manager as any).activeRequests as Map<string, any>
345
+ expect(activeRequests.size).toBe(0)
346
+ expect(underlying.createAction).toHaveBeenCalledTimes(1)
347
+ })
348
+
349
+ it('should require listing permission if seekBasketListingPermissions=true and no token', async () => {
350
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
351
+ seekBasketListingPermissions: true
352
+ })
353
+
354
+ manager.bindCallback('onBasketAccessRequested', async req => {
355
+ // Deny for test
356
+ manager.denyPermission(req.requestID)
357
+ })
358
+
359
+ // Attempt to list a user basket
360
+ await expect(manager.listOutputs({ basket: 'user-basket' }, 'some-user.com')).rejects.toThrow(/Permission denied/)
361
+
362
+ // There is one underlying call: internally, we called listOutputs to check if we had permission
363
+ // (we did not, we sought it, and the user denied). So we see this call here, but we DO NOT see
364
+ // the actual proxied call (for listing outputs in user-basket), since it was denied.
365
+ expect(underlying.listOutputs).toHaveBeenCalledTimes(1)
366
+ expect(underlying.listOutputs).toHaveBeenLastCalledWith(
367
+ {
368
+ basket: 'admin basket-access',
369
+ include: 'locking scripts',
370
+ tagQueryMode: 'all',
371
+ tags: ['originator some-user.com', 'basket user-basket']
372
+ },
373
+ 'admin.com'
374
+ )
375
+ })
376
+
377
+ it('should prompt for removal permission if seekBasketRemovalPermissions=true', async () => {
378
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
379
+ seekBasketRemovalPermissions: true
380
+ })
381
+ manager.bindCallback('onBasketAccessRequested', async req => {
382
+ // auto-grant ephemeral
383
+ await manager.grantPermission({
384
+ requestID: req.requestID,
385
+ ephemeral: true
386
+ })
387
+ })
388
+
389
+ await expect(
390
+ manager.relinquishOutput(
391
+ {
392
+ output: 'someTxid.1',
393
+ basket: 'user-basket'
394
+ },
395
+ 'some-user.com'
396
+ )
397
+ ).resolves.not.toThrow()
398
+
399
+ expect(underlying.relinquishOutput).toHaveBeenCalledTimes(1)
400
+ })
401
+ })
402
+
403
+ /* ------------------------------------------------------
404
+ * 7) CERTIFICATE USAGE (DCAP) TESTS
405
+ * ------------------------------------------------------ */
406
+ describe('Certificate Usage (DCAP)', () => {
407
+ it('should skip certificate disclosure permission if config.seekCertificateDisclosurePermissions=false', async () => {
408
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
409
+ seekCertificateDisclosurePermissions: false
410
+ })
411
+ // Directly call proveCertificate with no token => no prompt => immediate success
412
+ await expect(
413
+ manager.proveCertificate(
414
+ {
415
+ certificate: {
416
+ type: 'KYC',
417
+ subject: '02abcdef...',
418
+ serialNumber: '123',
419
+ certifier: '02ccc...',
420
+ fields: { name: 'Alice', dob: '2000-01-01' }
421
+ },
422
+ fieldsToReveal: ['name'],
423
+ verifier: '02xyz...',
424
+ privileged: false
425
+ },
426
+ 'nonadmin.com'
427
+ )
428
+ ).resolves.not.toThrow()
429
+
430
+ expect(underlying.proveCertificate).toHaveBeenCalledTimes(1)
431
+ })
432
+
433
+ it('should require permission if seekCertificateDisclosurePermissions=true, no valid token', async () => {
434
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
435
+ seekCertificateDisclosurePermissions: true
436
+ })
437
+
438
+ // Auto-grant ephemeral for test
439
+ manager.bindCallback('onCertificateAccessRequested', async req => {
440
+ await manager.grantPermission({
441
+ requestID: req.requestID,
442
+ ephemeral: true
443
+ })
444
+ })
445
+
446
+ // Because we don't have a stored token, it triggers request -> ephemeral granted -> success
447
+ await manager.proveCertificate(
448
+ {
449
+ certificate: {
450
+ type: 'KYC',
451
+ subject: '02abc..',
452
+ serialNumber: 'xyz',
453
+ certifier: '02dddd...',
454
+ fields: { name: 'Bob', nationality: 'Mars' }
455
+ },
456
+ fieldsToReveal: ['name'],
457
+ verifier: '02xxxx..',
458
+ privileged: false
459
+ },
460
+ 'some-user.com'
461
+ )
462
+
463
+ expect(underlying.proveCertificate).toHaveBeenCalledTimes(1)
464
+ })
465
+
466
+ it('should check that requested fields are a subset of the token’s fields', async () => {
467
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
468
+ seekCertificateDisclosurePermissions: true
469
+ })
470
+
471
+ // Suppose we find an existing token that covers fields: ['name', 'dob', 'nationality']
472
+ const existingToken: PermissionToken = {
473
+ txid: 'aabbcc',
474
+ outputIndex: 0,
475
+ outputScript: 'scriptHex',
476
+ satoshis: 1,
477
+ originator: 'some-user.com',
478
+ expiry: 9999999999, // not expired
479
+ privileged: false,
480
+ certType: 'KYC',
481
+ certFields: ['name', 'dob', 'nationality'],
482
+ verifier: '02eeee...'
483
+ }
484
+ jest
485
+ .spyOn(manager as any, 'findCertificateToken')
486
+ .mockImplementation(async (orig, priv, verif, ct, requestedFields) => {
487
+ // if requestedFields includes "someMissingField", return undefined
488
+ // else return the existingToken
489
+ if ((requestedFields as string[]).includes('someMissingField')) {
490
+ return undefined // forces a request
491
+ }
492
+ return existingToken // forces immediate success
493
+ })
494
+
495
+ // Attempt to prove certificate revealing only 'name' -> Should pass without prompt
496
+ await manager.proveCertificate(
497
+ {
498
+ certificate: {
499
+ type: 'KYC',
500
+ certifier: '02eeee...',
501
+ subject: '02some...',
502
+ serialNumber: '',
503
+ fields: { name: 'Charlie', dob: '1999-01-01', nationality: 'EU' }
504
+ },
505
+ fieldsToReveal: ['name'],
506
+ verifier: '02eeee...',
507
+ privileged: false
508
+ },
509
+ 'some-user.com'
510
+ )
511
+ expect(underlying.proveCertificate).toHaveBeenCalledTimes(1)
512
+
513
+ // Attempt to reveal a field the token does NOT cover -> triggers request
514
+ // Since the existing token does not cover 'someMissingField', we expect a prompt. Let’s deny it:
515
+ manager.bindCallback('onCertificateAccessRequested', async req => {
516
+ manager.denyPermission(req.requestID)
517
+ })
518
+ const secondAttempt = manager.proveCertificate(
519
+ {
520
+ certificate: {
521
+ type: 'KYC',
522
+ certifier: '02eeee...',
523
+ fields: { name: 'Charlie', dob: '1999-01-01', nationality: 'EU' }
524
+ },
525
+ fieldsToReveal: ['dob', 'someMissingField'],
526
+ verifier: '02eeee...',
527
+ privileged: false
528
+ },
529
+ 'some-user.com'
530
+ )
531
+ await expect(secondAttempt).rejects.toThrow(/Permission denied/)
532
+
533
+ // Underlying proveCertificate not called for second attempt
534
+ expect(underlying.proveCertificate).toHaveBeenCalledTimes(1)
535
+ })
536
+
537
+ it('should prompt for renewal if token is expired', async () => {
538
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
539
+ seekCertificateDisclosurePermissions: true
540
+ })
541
+
542
+ // Mock an expired token
543
+ const expiredCertToken: PermissionToken = {
544
+ txid: 'old-expired',
545
+ outputIndex: 0,
546
+ outputScript: 'deadbeef',
547
+ satoshis: 1,
548
+ originator: 'app.com',
549
+ expiry: 1,
550
+ privileged: false,
551
+ certType: 'KYC',
552
+ certFields: ['name', 'dob'],
553
+ verifier: '02verifier'
554
+ }
555
+ jest.spyOn(manager as any, 'findCertificateToken').mockResolvedValue(expiredCertToken)
556
+
557
+ // Callback that grants renewal ephemeral
558
+ manager.bindCallback('onCertificateAccessRequested', async req => {
559
+ expect(req.renewal).toBe(true)
560
+ await manager.grantPermission({
561
+ requestID: req.requestID,
562
+ ephemeral: true
563
+ })
564
+ })
565
+
566
+ await manager.proveCertificate(
567
+ {
568
+ certificate: {
569
+ type: 'KYC',
570
+ fields: { name: 'Bob', dob: '1970' },
571
+ certifier: '02verifier'
572
+ },
573
+ fieldsToReveal: ['name'],
574
+ verifier: '02verifier',
575
+ privileged: false
576
+ },
577
+ 'app.com'
578
+ )
579
+ // Succeeds after ephemeral renewal
580
+ expect(underlying.proveCertificate).toHaveBeenCalledTimes(1)
581
+ })
582
+ })
583
+
584
+ /* ------------------------------------------------------
585
+ * 8) SPENDING AUTHORIZATION (DSAP) TESTS
586
+ * ------------------------------------------------------ */
587
+ describe('Spending Authorization (DSAP)', () => {
588
+ it('should skip if seekSpendingPermissions=false', async () => {
589
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
590
+ seekSpendingPermissions: false
591
+ })
592
+
593
+ // createAction that tries to net spend 200 sats
594
+ const result = await manager.createAction(
595
+ {
596
+ description: 'Some spend transaction',
597
+ outputs: [
598
+ {
599
+ lockingScript: '1321',
600
+ satoshis: 200,
601
+ outputDescription: 'Nothing to see here'
602
+ }
603
+ ]
604
+ },
605
+ 'user.com'
606
+ )
607
+
608
+ // No prompt triggered
609
+ const activeRequests = (manager as any).activeRequests as Map<string, any>
610
+ expect(activeRequests.size).toBe(0)
611
+
612
+ // Underlying createAction definitely called
613
+ expect(underlying.createAction).toHaveBeenCalledTimes(1)
614
+ // If seekSpendingPermissions=false, the result should NOT? contain the signableTransaction
615
+ expect(result.signableTransaction).not.toBeDefined()
616
+ })
617
+
618
+ it('should require spending token if netSpent > 0 and seekSpendingPermissions=true', async () => {
619
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
620
+ seekSpendingPermissions: true
621
+ })
622
+
623
+ // We’ll also mock the signableTransaction return to help manager compute netSpent
624
+ underlying.createAction.mockResolvedValueOnce({
625
+ signableTransaction: {
626
+ tx: [0x00], // minimal
627
+ reference: 'ref1'
628
+ }
629
+ })
630
+ // The manager tries to parse the transaction to find netSpent.
631
+ // By default, netSpent = totalOutput + fee - totalExplicitInputs
632
+ // We haven't provided any explicit inputs in the createAction call, so netSpent = 200 + fee
633
+
634
+ // Auto-grant ephemeral for test
635
+ manager.bindCallback('onSpendingAuthorizationRequested', async req => {
636
+ await manager.grantPermission({
637
+ requestID: req.requestID,
638
+ ephemeral: true,
639
+ amount: 1000
640
+ })
641
+ })
642
+
643
+ await expect(
644
+ manager.createAction(
645
+ {
646
+ description: 'Spend 200 sats with no input from user',
647
+ outputs: [
648
+ {
649
+ outputDescription: 'Nothing to see here',
650
+ lockingScript: '1abc',
651
+ satoshis: 200
652
+ }
653
+ ]
654
+ },
655
+ 'some-user.com'
656
+ )
657
+ ).resolves.not.toThrow()
658
+
659
+ // underlying createAction called
660
+ expect(underlying.createAction).toHaveBeenCalledTimes(1)
661
+ })
662
+
663
+ it('should check monthly limit usage and prompt renewal if insufficient', async () => {
664
+ manager = new WalletPermissionsManager(underlying, 'admin.com')
665
+
666
+ // Suppose we find an existing DSAP token with authorizedAmount=500
667
+ // manager.findSpendingToken() is used internally, so let's mock it
668
+ const existingSpendingToken: PermissionToken = {
669
+ txid: 'dsap-old',
670
+ outputIndex: 0,
671
+ outputScript: 'scriptHex',
672
+ satoshis: 1,
673
+ originator: 'shopper.com',
674
+ authorizedAmount: 500,
675
+ expiry: 0 // indefinite
676
+ }
677
+ jest.spyOn(manager as any, 'findSpendingToken').mockResolvedValue(existingSpendingToken)
678
+
679
+ // Next, manager.querySpentSince(token) sums the user’s monthly spending from labeled actions
680
+ // Let’s stub that to say they've already spent 400.
681
+ jest.spyOn(manager as any, 'querySpentSince').mockResolvedValue(400)
682
+
683
+ // Attempt spending 200 => total usage would be 600 which exceeds 500 => prompt renewal
684
+ // We'll auto-deny for test
685
+ manager.bindCallback('onSpendingAuthorizationRequested', req => {
686
+ manager.denyPermission(req.requestID)
687
+ })
688
+
689
+ await expect(
690
+ manager.createAction(
691
+ {
692
+ description: 'Buy something for 200 sats',
693
+ outputs: [
694
+ {
695
+ outputDescription: 'Nothing to see here',
696
+ lockingScript: 'op_return',
697
+ satoshis: 200
698
+ }
699
+ ]
700
+ },
701
+ 'shopper.com'
702
+ )
703
+ ).rejects.toThrow(/Permission denied/)
704
+
705
+ // The underlying createAction call was started but the manager calls abortAction upon denial
706
+ expect(underlying.abortAction).toHaveBeenCalledTimes(1)
707
+ })
708
+
709
+ it('should pass if usage plus new spend is within the monthly limit', async () => {
710
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {})
711
+
712
+ // existing DSAP token with authorizedAmount=1000
713
+ const dsapToken: PermissionToken = {
714
+ txid: 'dsap123',
715
+ outputIndex: 0,
716
+ outputScript: '9218',
717
+ satoshis: 1,
718
+ originator: 'shopper.com',
719
+ authorizedAmount: 1000,
720
+ expiry: 0
721
+ }
722
+ jest.spyOn(manager as any, 'findSpendingToken').mockResolvedValue(dsapToken)
723
+
724
+ // Suppose they've spent 200 so far
725
+ jest.spyOn(manager as any, 'querySpentSince').mockResolvedValue(200)
726
+
727
+ // Attempt new spending of 500 => total=700 which is <= 1000 => no prompt
728
+ await manager.createAction(
729
+ {
730
+ description: 'Spend 500 sats',
731
+ outputs: [
732
+ {
733
+ outputDescription: 'Nothing to see here',
734
+ lockingScript: '0abc',
735
+ satoshis: 500
736
+ }
737
+ ]
738
+ },
739
+ 'shopper.com'
740
+ )
741
+ // Success, no new permission requested
742
+ const activeRequests = (manager as any).activeRequests as Map<string, any>
743
+ expect(activeRequests.size).toBe(0)
744
+
745
+ expect(underlying.createAction).toHaveBeenCalledTimes(1)
746
+ })
747
+ })
748
+
749
+ /* ------------------------------------------------------
750
+ * 9) LABEL USAGE PERMISSION TESTS
751
+ * ------------------------------------------------------ */
752
+ describe('Label Usage Permission', () => {
753
+ it('should fail if label starts with "admin" and caller is not admin', async () => {
754
+ manager = new WalletPermissionsManager(underlying, 'admin.com')
755
+
756
+ // Attempt to createAction with a label "admin secret-stuff"
757
+ await expect(
758
+ manager.createAction(
759
+ {
760
+ description: 'Applying admin label?',
761
+ labels: ['admin secret-stuff']
762
+ },
763
+ 'nonadmin.com'
764
+ )
765
+ ).rejects.toThrow(/admin-only/)
766
+
767
+ // Underlying createAction never called
768
+ expect(underlying.createAction).toHaveBeenCalledTimes(0)
769
+ })
770
+
771
+ it('should skip label permission if seekPermissionWhenApplyingActionLabels=false', async () => {
772
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
773
+ seekPermissionWhenApplyingActionLabels: false
774
+ })
775
+
776
+ // Non-admin applies label "my-app-label"
777
+ await expect(
778
+ manager.createAction({ description: 'Add label', labels: ['my-app-label'] }, 'some-app.com')
779
+ ).resolves.not.toThrow()
780
+
781
+ // No prompt
782
+ const activeRequests = (manager as any).activeRequests as Map<string, any>
783
+ expect(activeRequests.size).toBe(0)
784
+
785
+ // Called underlying
786
+ expect(underlying.createAction).toHaveBeenCalledTimes(1)
787
+ })
788
+
789
+ it('should prompt for label usage if seekPermissionWhenApplyingActionLabels=true', async () => {
790
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
791
+ seekPermissionWhenApplyingActionLabels: true
792
+ })
793
+
794
+ manager.bindCallback('onProtocolPermissionRequested', async req => {
795
+ // This request will have protocolID=[1, "action label <label>"], etc.
796
+ await manager.grantPermission({
797
+ requestID: req.requestID,
798
+ ephemeral: true
799
+ })
800
+ })
801
+
802
+ await manager.createAction(
803
+ {
804
+ description: 'Add label "user-label-123"',
805
+ labels: ['user-label-123']
806
+ },
807
+ 'nonadmin.com'
808
+ )
809
+
810
+ // Underlying is called
811
+ expect(underlying.createAction).toHaveBeenCalledTimes(1)
812
+ })
813
+
814
+ it('should also prompt for listing actions by label if seekPermissionWhenListingActionsByLabel=true', async () => {
815
+ manager = new WalletPermissionsManager(underlying, 'admin.com', {
816
+ seekPermissionWhenListingActionsByLabel: true
817
+ })
818
+
819
+ manager.bindCallback('onProtocolPermissionRequested', async req => {
820
+ // auto-grant ephemeral
821
+ await manager.grantPermission({
822
+ requestID: req.requestID,
823
+ ephemeral: true
824
+ })
825
+ })
826
+
827
+ await expect(
828
+ manager.listActions(
829
+ {
830
+ labels: ['search-this-label']
831
+ },
832
+ 'external-app.com'
833
+ )
834
+ ).resolves.not.toThrow()
835
+
836
+ expect(underlying.listActions).toHaveBeenCalledTimes(1)
837
+ })
838
+ })
839
+ })