@bsv/wallet-toolbox 1.1.62 → 1.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (185) hide show
  1. package/docs/client.md +2339 -182
  2. package/docs/wallet.md +2339 -182
  3. package/out/src/CWIStyleWalletManager.d.ts +417 -0
  4. package/out/src/CWIStyleWalletManager.d.ts.map +1 -0
  5. package/out/src/CWIStyleWalletManager.js +1140 -0
  6. package/out/src/CWIStyleWalletManager.js.map +1 -0
  7. package/out/src/SimpleWalletManager.d.ts +169 -0
  8. package/out/src/SimpleWalletManager.d.ts.map +1 -0
  9. package/out/src/SimpleWalletManager.js +315 -0
  10. package/out/src/SimpleWalletManager.js.map +1 -0
  11. package/out/src/Wallet.d.ts +6 -1
  12. package/out/src/Wallet.d.ts.map +1 -1
  13. package/out/src/Wallet.js +39 -7
  14. package/out/src/Wallet.js.map +1 -1
  15. package/out/src/WalletAuthenticationManager.d.ts +33 -0
  16. package/out/src/WalletAuthenticationManager.d.ts.map +1 -0
  17. package/out/src/WalletAuthenticationManager.js +110 -0
  18. package/out/src/WalletAuthenticationManager.js.map +1 -0
  19. package/out/src/WalletPermissionsManager.d.ts +575 -0
  20. package/out/src/WalletPermissionsManager.d.ts.map +1 -0
  21. package/out/src/WalletPermissionsManager.js +1789 -0
  22. package/out/src/WalletPermissionsManager.js.map +1 -0
  23. package/out/src/WalletSettingsManager.d.ts +59 -0
  24. package/out/src/WalletSettingsManager.d.ts.map +1 -0
  25. package/out/src/WalletSettingsManager.js +189 -0
  26. package/out/src/WalletSettingsManager.js.map +1 -0
  27. package/out/src/__tests/CWIStyleWalletManager.test.d.ts +2 -0
  28. package/out/src/__tests/CWIStyleWalletManager.test.d.ts.map +1 -0
  29. package/out/src/__tests/CWIStyleWalletManager.test.js +471 -0
  30. package/out/src/__tests/CWIStyleWalletManager.test.js.map +1 -0
  31. package/out/src/__tests/WalletPermissionsManager.callbacks.test.d.ts +2 -0
  32. package/out/src/__tests/WalletPermissionsManager.callbacks.test.d.ts.map +1 -0
  33. package/out/src/__tests/WalletPermissionsManager.callbacks.test.js +239 -0
  34. package/out/src/__tests/WalletPermissionsManager.callbacks.test.js.map +1 -0
  35. package/out/src/__tests/WalletPermissionsManager.checks.test.d.ts +2 -0
  36. package/out/src/__tests/WalletPermissionsManager.checks.test.d.ts.map +1 -0
  37. package/out/src/__tests/WalletPermissionsManager.checks.test.js +637 -0
  38. package/out/src/__tests/WalletPermissionsManager.checks.test.js.map +1 -0
  39. package/out/src/__tests/WalletPermissionsManager.encryption.test.d.ts +2 -0
  40. package/out/src/__tests/WalletPermissionsManager.encryption.test.d.ts.map +1 -0
  41. package/out/src/__tests/WalletPermissionsManager.encryption.test.js +295 -0
  42. package/out/src/__tests/WalletPermissionsManager.encryption.test.js.map +1 -0
  43. package/out/src/__tests/WalletPermissionsManager.fixtures.d.ts +83 -0
  44. package/out/src/__tests/WalletPermissionsManager.fixtures.d.ts.map +1 -0
  45. package/out/src/__tests/WalletPermissionsManager.fixtures.js +261 -0
  46. package/out/src/__tests/WalletPermissionsManager.fixtures.js.map +1 -0
  47. package/out/src/__tests/WalletPermissionsManager.flows.test.d.ts +2 -0
  48. package/out/src/__tests/WalletPermissionsManager.flows.test.d.ts.map +1 -0
  49. package/out/src/__tests/WalletPermissionsManager.flows.test.js +377 -0
  50. package/out/src/__tests/WalletPermissionsManager.flows.test.js.map +1 -0
  51. package/out/src/__tests/WalletPermissionsManager.initialization.test.d.ts +2 -0
  52. package/out/src/__tests/WalletPermissionsManager.initialization.test.d.ts.map +1 -0
  53. package/out/src/__tests/WalletPermissionsManager.initialization.test.js +227 -0
  54. package/out/src/__tests/WalletPermissionsManager.initialization.test.js.map +1 -0
  55. package/out/src/__tests/WalletPermissionsManager.proxying.test.d.ts +2 -0
  56. package/out/src/__tests/WalletPermissionsManager.proxying.test.d.ts.map +1 -0
  57. package/out/src/__tests/WalletPermissionsManager.proxying.test.js +566 -0
  58. package/out/src/__tests/WalletPermissionsManager.proxying.test.js.map +1 -0
  59. package/out/src/__tests/WalletPermissionsManager.tokens.test.d.ts +2 -0
  60. package/out/src/__tests/WalletPermissionsManager.tokens.test.d.ts.map +1 -0
  61. package/out/src/__tests/WalletPermissionsManager.tokens.test.js +454 -0
  62. package/out/src/__tests/WalletPermissionsManager.tokens.test.js.map +1 -0
  63. package/out/src/index.all.d.ts +9 -0
  64. package/out/src/index.all.d.ts.map +1 -1
  65. package/out/src/index.all.js +9 -0
  66. package/out/src/index.all.js.map +1 -1
  67. package/out/src/index.client.d.ts +9 -0
  68. package/out/src/index.client.d.ts.map +1 -1
  69. package/out/src/index.client.js +9 -0
  70. package/out/src/index.client.js.map +1 -1
  71. package/out/src/sdk/CertOpsWallet.d.ts +7 -0
  72. package/out/src/sdk/CertOpsWallet.d.ts.map +1 -0
  73. package/out/src/sdk/CertOpsWallet.js +3 -0
  74. package/out/src/sdk/CertOpsWallet.js.map +1 -0
  75. package/out/src/sdk/__test/CertificateLifeCycle.test.js +19 -82
  76. package/out/src/sdk/__test/CertificateLifeCycle.test.js.map +1 -1
  77. package/out/src/sdk/index.d.ts +1 -1
  78. package/out/src/sdk/index.d.ts.map +1 -1
  79. package/out/src/sdk/index.js +1 -1
  80. package/out/src/sdk/index.js.map +1 -1
  81. package/out/src/sdk/validationHelpers.d.ts.map +1 -1
  82. package/out/src/sdk/validationHelpers.js +13 -12
  83. package/out/src/sdk/validationHelpers.js.map +1 -1
  84. package/out/src/services/__tests/bitrails.test.js +7 -2
  85. package/out/src/services/__tests/bitrails.test.js.map +1 -1
  86. package/out/src/services/providers/__tests/WhatsOnChain.test.js +3 -3
  87. package/out/src/services/providers/__tests/WhatsOnChain.test.js.map +1 -1
  88. package/out/src/signer/methods/proveCertificate.d.ts.map +1 -1
  89. package/out/src/signer/methods/proveCertificate.js +3 -19
  90. package/out/src/signer/methods/proveCertificate.js.map +1 -1
  91. package/out/src/storage/__test/WalletStorageManager.test.js +1 -1
  92. package/out/src/storage/__test/WalletStorageManager.test.js.map +1 -1
  93. package/out/src/storage/remoting/StorageClient.d.ts +2 -2
  94. package/out/src/storage/remoting/StorageClient.d.ts.map +1 -1
  95. package/out/src/storage/remoting/StorageClient.js +1 -1
  96. package/out/src/storage/remoting/StorageClient.js.map +1 -1
  97. package/out/src/utility/identityUtils.d.ts +31 -0
  98. package/out/src/utility/identityUtils.d.ts.map +1 -0
  99. package/out/src/utility/identityUtils.js +116 -0
  100. package/out/src/utility/identityUtils.js.map +1 -0
  101. package/out/src/wab-client/WABClient.d.ts +49 -0
  102. package/out/src/wab-client/WABClient.d.ts.map +1 -0
  103. package/out/src/wab-client/WABClient.js +83 -0
  104. package/out/src/wab-client/WABClient.js.map +1 -0
  105. package/out/src/wab-client/__tests/WABClient.man.test.d.ts +2 -0
  106. package/out/src/wab-client/__tests/WABClient.man.test.d.ts.map +1 -0
  107. package/out/src/wab-client/__tests/WABClient.man.test.js +52 -0
  108. package/out/src/wab-client/__tests/WABClient.man.test.js.map +1 -0
  109. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts +34 -0
  110. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts.map +1 -0
  111. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js +16 -0
  112. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js.map +1 -0
  113. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts +7 -0
  114. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts.map +1 -0
  115. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js +36 -0
  116. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js.map +1 -0
  117. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts +28 -0
  118. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts.map +1 -0
  119. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js +69 -0
  120. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js.map +1 -0
  121. package/out/test/Wallet/action/internalizeAction.a.test.js +1 -1
  122. package/out/test/Wallet/action/internalizeAction.a.test.js.map +1 -1
  123. package/out/test/Wallet/certificate/acquireCertificate.test.js +26 -29
  124. package/out/test/Wallet/certificate/acquireCertificate.test.js.map +1 -1
  125. package/out/test/storage/KnexMigrations.test.js +1 -1
  126. package/out/test/storage/KnexMigrations.test.js.map +1 -1
  127. package/out/test/storage/update.test.js +1 -1
  128. package/out/test/storage/update.test.js.map +1 -1
  129. package/out/test/utils/TestUtilsWalletStorage.d.ts +9 -5
  130. package/out/test/utils/TestUtilsWalletStorage.d.ts.map +1 -1
  131. package/out/test/utils/TestUtilsWalletStorage.js +15 -9
  132. package/out/test/utils/TestUtilsWalletStorage.js.map +1 -1
  133. package/out/test/wallet/action/internalizeAction.test.js +1 -1
  134. package/out/test/wallet/action/internalizeAction.test.js.map +1 -1
  135. package/out/test/wallet/list/listActions2.test.js +1 -1
  136. package/out/test/wallet/list/listActions2.test.js.map +1 -1
  137. package/out/test/wallet/sync/Wallet.sync.test.js +1 -1
  138. package/out/test/wallet/sync/Wallet.sync.test.js.map +1 -1
  139. package/out/tsconfig.all.tsbuildinfo +1 -1
  140. package/package.json +3 -4
  141. package/src/CWIStyleWalletManager.ts +1724 -0
  142. package/src/SimpleWalletManager.ts +526 -0
  143. package/src/Wallet.ts +70 -7
  144. package/src/WalletAuthenticationManager.ts +150 -0
  145. package/src/WalletPermissionsManager.ts +2424 -0
  146. package/src/WalletSettingsManager.ts +243 -0
  147. package/src/__tests/CWIStyleWalletManager.test.ts +604 -0
  148. package/src/__tests/WalletPermissionsManager.callbacks.test.ts +323 -0
  149. package/src/__tests/WalletPermissionsManager.checks.test.ts +839 -0
  150. package/src/__tests/WalletPermissionsManager.encryption.test.ts +370 -0
  151. package/src/__tests/WalletPermissionsManager.fixtures.ts +284 -0
  152. package/src/__tests/WalletPermissionsManager.flows.test.ts +457 -0
  153. package/src/__tests/WalletPermissionsManager.initialization.test.ts +300 -0
  154. package/src/__tests/WalletPermissionsManager.proxying.test.ts +706 -0
  155. package/src/__tests/WalletPermissionsManager.tokens.test.ts +546 -0
  156. package/src/index.all.ts +9 -0
  157. package/src/index.client.ts +9 -0
  158. package/src/sdk/CertOpsWallet.ts +18 -0
  159. package/src/sdk/__test/CertificateLifeCycle.test.ts +66 -113
  160. package/src/sdk/index.ts +1 -1
  161. package/src/sdk/validationHelpers.ts +12 -11
  162. package/src/services/__tests/bitrails.test.ts +7 -2
  163. package/src/services/providers/__tests/WhatsOnChain.test.ts +3 -3
  164. package/src/signer/methods/proveCertificate.ts +14 -21
  165. package/src/storage/__test/WalletStorageManager.test.ts +1 -1
  166. package/src/storage/remoting/StorageClient.ts +4 -4
  167. package/src/utility/identityUtils.ts +159 -0
  168. package/src/wab-client/WABClient.ts +94 -0
  169. package/src/wab-client/__tests/WABClient.man.test.ts +59 -0
  170. package/src/wab-client/auth-method-interactors/AuthMethodInteractor.ts +47 -0
  171. package/src/wab-client/auth-method-interactors/PersonaIDInteractor.ts +35 -0
  172. package/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.ts +72 -0
  173. package/test/Wallet/action/internalizeAction.a.test.ts +1 -1
  174. package/test/Wallet/certificate/acquireCertificate.test.ts +89 -30
  175. package/test/storage/KnexMigrations.test.ts +1 -1
  176. package/test/storage/update.test.ts +1 -1
  177. package/test/utils/TestUtilsWalletStorage.ts +24 -13
  178. package/test/wallet/action/internalizeAction.test.ts +1 -1
  179. package/test/wallet/list/listActions2.test.ts +1 -1
  180. package/test/wallet/sync/Wallet.sync.test.ts +1 -1
  181. package/out/src/sdk/CertOps.d.ts +0 -66
  182. package/out/src/sdk/CertOps.d.ts.map +0 -1
  183. package/out/src/sdk/CertOps.js +0 -190
  184. package/out/src/sdk/CertOps.js.map +0 -1
  185. package/src/sdk/CertOps.ts +0 -274
@@ -0,0 +1,471 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ const sdk_1 = require("@bsv/sdk");
4
+ const sdk_2 = require("../sdk");
5
+ const CWIStyleWalletManager_1 = require("../CWIStyleWalletManager");
6
+ const globals_1 = require("@jest/globals");
7
+ globals_1.jest.useFakeTimers();
8
+ // ------------------------------------------------------------------------------------------
9
+ // Mocks and Utilities
10
+ // ------------------------------------------------------------------------------------------
11
+ /** A utility to create an Outpoint string for test usage. */
12
+ function makeOutpoint(txid, vout) {
13
+ return `${txid}:${vout}`;
14
+ }
15
+ /**
16
+ * A mock underlying WalletInterface to verify that proxy methods:
17
+ * 1. Are not callable if not authenticated
18
+ * 2. Are disallowed if originator is admin
19
+ * 3. Forward to the real method if conditions pass
20
+ */
21
+ const mockUnderlyingWallet = {
22
+ getPublicKey: globals_1.jest.fn(),
23
+ revealCounterpartyKeyLinkage: globals_1.jest.fn(),
24
+ revealSpecificKeyLinkage: globals_1.jest.fn(),
25
+ encrypt: globals_1.jest.fn(),
26
+ decrypt: globals_1.jest.fn(),
27
+ createHmac: globals_1.jest.fn(),
28
+ verifyHmac: globals_1.jest.fn(),
29
+ createSignature: globals_1.jest.fn(),
30
+ verifySignature: globals_1.jest.fn(),
31
+ createAction: globals_1.jest.fn(),
32
+ signAction: globals_1.jest.fn(),
33
+ abortAction: globals_1.jest.fn(),
34
+ listActions: globals_1.jest.fn(),
35
+ internalizeAction: globals_1.jest.fn(),
36
+ listOutputs: globals_1.jest.fn(),
37
+ relinquishOutput: globals_1.jest.fn(),
38
+ acquireCertificate: globals_1.jest.fn(),
39
+ listCertificates: globals_1.jest.fn(),
40
+ proveCertificate: globals_1.jest.fn(),
41
+ relinquishCertificate: globals_1.jest.fn(),
42
+ discoverByIdentityKey: globals_1.jest.fn(),
43
+ discoverByAttributes: globals_1.jest.fn(),
44
+ isAuthenticated: globals_1.jest.fn(),
45
+ waitForAuthentication: globals_1.jest.fn(),
46
+ getHeight: globals_1.jest.fn(),
47
+ getHeaderForHeight: globals_1.jest.fn(),
48
+ getNetwork: globals_1.jest.fn(),
49
+ getVersion: globals_1.jest.fn()
50
+ };
51
+ /**
52
+ * A mock function that simulates building an underlying wallet.
53
+ */
54
+ const mockWalletBuilder = globals_1.jest.fn(async (primaryKey, privilegedKeyManager) => {
55
+ // Return our mock underlying wallet object.
56
+ return mockUnderlyingWallet;
57
+ });
58
+ /**
59
+ * A mock UMPTokenInteractor implementation.
60
+ * We can track whether buildAndSend is called with the right arguments, etc.
61
+ */
62
+ const mockUMPTokenInteractor = {
63
+ findByPresentationKeyHash: globals_1.jest.fn(async (hash) => undefined),
64
+ findByRecoveryKeyHash: globals_1.jest.fn(async (hash) => undefined),
65
+ buildAndSend: globals_1.jest.fn(async (wallet, admin, token, oldToken) => 'abcd.0')
66
+ };
67
+ /**
68
+ * A mock "recoveryKeySaver" that claims it always saved the key successfully.
69
+ */
70
+ const mockRecoveryKeySaver = globals_1.jest.fn(async (key) => true);
71
+ /**
72
+ * A mock "passwordRetriever" that we can customize to return a specific password
73
+ * or throw if needed.
74
+ */
75
+ const mockPasswordRetriever = globals_1.jest.fn(async () => 'test-password');
76
+ const XOR = (n1, n2) => {
77
+ if (n1.length !== n2.length) {
78
+ throw new Error('lengths mismatch');
79
+ }
80
+ const r = new Array(n1.length);
81
+ for (let i = 0; i < n1.length; i++) {
82
+ r[i] = n1[i] ^ n2[i];
83
+ }
84
+ return r;
85
+ };
86
+ // Generate some globals
87
+ const presentationKey = (0, sdk_1.Random)(32);
88
+ const recoveryKey = (0, sdk_1.Random)(32);
89
+ const passwordSalt = (0, sdk_1.Random)(32);
90
+ const passwordKey = sdk_1.Hash.pbkdf2(sdk_1.Utils.toArray('test-password', 'utf8'), passwordSalt, CWIStyleWalletManager_1.PBKDF2_NUM_ROUNDS, 32, 'sha512');
91
+ const primaryKey = (0, sdk_1.Random)(32);
92
+ const privilegedKey = (0, sdk_1.Random)(32);
93
+ /**
94
+ * A helper function to create a minimal valid UMP token.
95
+ * This can be used to mock a stored token for existing users.
96
+ */
97
+ async function createMockUMPToken() {
98
+ const presentationPassword = new sdk_1.SymmetricKey(XOR(presentationKey, passwordKey));
99
+ const presentationRecovery = new sdk_1.SymmetricKey(XOR(presentationKey, recoveryKey));
100
+ const recoveryPassword = new sdk_1.SymmetricKey(XOR(recoveryKey, passwordKey));
101
+ const primaryPassword = new sdk_1.SymmetricKey(XOR(primaryKey, passwordKey));
102
+ const tempPrivilegedKeyManager = new sdk_2.PrivilegedKeyManager(async () => new sdk_1.PrivateKey(privilegedKey));
103
+ return {
104
+ passwordSalt,
105
+ passwordPresentationPrimary: presentationPassword.encrypt(primaryKey),
106
+ passwordRecoveryPrimary: recoveryPassword.encrypt(primaryKey),
107
+ presentationRecoveryPrimary: presentationRecovery.encrypt(primaryKey),
108
+ passwordPrimaryPrivileged: primaryPassword.encrypt(privilegedKey),
109
+ presentationRecoveryPrivileged: presentationRecovery.encrypt(privilegedKey),
110
+ presentationHash: sdk_1.Hash.sha256(presentationKey),
111
+ recoveryHash: sdk_1.Hash.sha256(recoveryKey),
112
+ presentationKeyEncrypted: (await tempPrivilegedKeyManager.encrypt({
113
+ plaintext: presentationKey,
114
+ protocolID: [2, 'admin key wrapping'],
115
+ keyID: '1'
116
+ })).ciphertext,
117
+ passwordKeyEncrypted: (await tempPrivilegedKeyManager.encrypt({
118
+ plaintext: passwordKey,
119
+ protocolID: [2, 'admin key wrapping'],
120
+ keyID: '1'
121
+ })).ciphertext,
122
+ recoveryKeyEncrypted: (await tempPrivilegedKeyManager.encrypt({
123
+ plaintext: recoveryKey,
124
+ protocolID: [2, 'admin key wrapping'],
125
+ keyID: '1'
126
+ })).ciphertext,
127
+ currentOutpoint: 'abcd:0'
128
+ };
129
+ }
130
+ describe('CWIStyleWalletManager Tests', () => {
131
+ let manager;
132
+ beforeEach(() => {
133
+ // Reset all mock calls
134
+ globals_1.jest.clearAllMocks();
135
+ // We create a new manager for each test, with no initial snapshot
136
+ manager = new CWIStyleWalletManager_1.CWIStyleWalletManager('admin.walletvendor.com', // admin originator
137
+ mockWalletBuilder, mockUMPTokenInteractor, mockRecoveryKeySaver, mockPasswordRetriever
138
+ // no state snapshot
139
+ );
140
+ });
141
+ // ----------------------------------------------------------------------------------------
142
+ // Private method tests (just to ensure coverage).
143
+ // We'll call them via (manager as any).somePrivateMethod(...) if needed.
144
+ // ----------------------------------------------------------------------------------------
145
+ test('XOR function: verifies correctness', () => {
146
+ const fnXOR = manager.XOR;
147
+ const a = [0x00, 0xff, 0xaa];
148
+ const b = [0xff, 0xff, 0x55];
149
+ const result = fnXOR(a, b);
150
+ // 0x00 ^ 0xFF = 0xFF
151
+ // 0xFF ^ 0xFF = 0x00
152
+ // 0xAA ^ 0x55 = 0xFF
153
+ expect(result).toEqual([0xff, 0x00, 0xff]);
154
+ });
155
+ // ----------------------------------------------------------------------------------------
156
+ // Authentication flows
157
+ // ----------------------------------------------------------------------------------------
158
+ describe('New user flow: presentation + password', () => {
159
+ test('Successfully creates a new token and calls buildAndSend', async () => {
160
+ // New wallet funder is a mock function
161
+ const newWalletFunder = globals_1.jest.fn(() => { });
162
+ manager.newWalletFunder = newWalletFunder;
163
+ mockUMPTokenInteractor.findByPresentationKeyHash.mockResolvedValueOnce(undefined);
164
+ // Provide a presentation key
165
+ await manager.providePresentationKey(presentationKey);
166
+ expect(manager.authenticationFlow).toBe('new-user');
167
+ // Provide a password
168
+ mockPasswordRetriever.mockResolvedValueOnce('dummy-password');
169
+ await manager.providePassword('dummy-password');
170
+ // The wallet should now be built, so manager is authenticated
171
+ expect(manager.authenticated).toBe(true);
172
+ // Recovery key saver should have been called
173
+ expect(mockRecoveryKeySaver).toHaveBeenCalledTimes(1);
174
+ // The underlying wallet builder should have been called exactly once
175
+ expect(mockWalletBuilder).toHaveBeenCalledTimes(1);
176
+ // The manager should have called buildAndSend on the interactor
177
+ expect(mockUMPTokenInteractor.buildAndSend).toHaveBeenCalledTimes(1);
178
+ const buildArgs = mockUMPTokenInteractor.buildAndSend.mock.calls[0];
179
+ // [0] => the wallet, [1] => adminOriginator, [2] => newToken, [3] => oldToken
180
+ expect(buildArgs[1]).toBe('admin.walletvendor.com');
181
+ expect(buildArgs[2]).toHaveProperty('presentationHash');
182
+ expect(buildArgs[3]).toBeUndefined(); // Because it's a new user (no old token)
183
+ expect(newWalletFunder).toHaveBeenCalled(); // New wallet funder should have been called
184
+ });
185
+ test('Throws if user tries to provide recovery key during new-user flow', async () => {
186
+ // Mark it as new user flow by no token found
187
+ ;
188
+ mockUMPTokenInteractor.findByPresentationKeyHash.mockResolvedValueOnce(undefined);
189
+ await manager.providePresentationKey(Array.from({ length: 32 }, () => 1));
190
+ await expect(manager.provideRecoveryKey(Array.from({ length: 32 }, () => 2))).rejects.toThrow('Do not submit recovery key in new-user flow');
191
+ });
192
+ });
193
+ describe('Existing user flow: presentation + password', () => {
194
+ test('Decryption of primary key and building the wallet', async () => {
195
+ // Provide a mock UMP token
196
+ const mockToken = await createMockUMPToken();
197
+ mockUMPTokenInteractor.findByPresentationKeyHash.mockResolvedValueOnce(mockToken);
198
+ // Provide presentation
199
+ await manager.providePresentationKey(presentationKey);
200
+ expect(manager.authenticationFlow).toBe('existing-user');
201
+ // Provide password
202
+ // The manager's internal code will do PBKDF2 with the password + token.passwordSalt
203
+ // Then XOR that with the presentation key for decryption.
204
+ await manager.providePassword('test-password');
205
+ // Check that manager is authenticated
206
+ expect(manager.authenticated).toBe(true);
207
+ // Underlying wallet is built
208
+ expect(mockWalletBuilder).toHaveBeenCalledTimes(1);
209
+ });
210
+ });
211
+ describe('Existing user flow: presentation + recovery key', () => {
212
+ beforeEach(async () => {
213
+ manager.authenticationMode = 'presentation-key-and-recovery-key';
214
+ manager.authenticationFlow = 'existing-user';
215
+ });
216
+ test('Successfully decrypts with presentation+recovery', async () => {
217
+ // Provide a mock UMP token
218
+ const mockToken = await createMockUMPToken();
219
+ mockUMPTokenInteractor.findByPresentationKeyHash.mockResolvedValueOnce(mockToken);
220
+ await manager.providePresentationKey(presentationKey);
221
+ // Provide the recovery key.
222
+ // In "presentation-key-and-recovery-key" mode, the manager won't need the password at all.
223
+ await manager.provideRecoveryKey(recoveryKey);
224
+ expect(manager.authenticated).toBe(true);
225
+ expect(mockWalletBuilder).toHaveBeenCalledTimes(1);
226
+ });
227
+ test('Throws if presentation key not provided first', async () => {
228
+ const recoveryKey = Array.from({ length: 32 }, () => 8);
229
+ await expect(manager.provideRecoveryKey(recoveryKey)).rejects.toThrow('Provide the presentation key first');
230
+ });
231
+ });
232
+ describe('Existing user flow: recovery key + password', () => {
233
+ beforeEach(async () => {
234
+ manager.authenticationMode = 'recovery-key-and-password';
235
+ manager.authenticationFlow = 'existing-user';
236
+ });
237
+ test('Works with correct keys, sets mode as existing-user', async () => {
238
+ const mockToken = await createMockUMPToken();
239
+ mockUMPTokenInteractor.findByRecoveryKeyHash.mockResolvedValueOnce(mockToken);
240
+ // Provide recovery key
241
+ await manager.provideRecoveryKey(recoveryKey);
242
+ // Provide password
243
+ await manager.providePassword('test-password');
244
+ expect(manager.authenticated).toBe(true);
245
+ expect(mockWalletBuilder).toHaveBeenCalledTimes(1);
246
+ });
247
+ test('Throws if no token found by recovery key hash', async () => {
248
+ ;
249
+ mockUMPTokenInteractor.findByRecoveryKeyHash.mockResolvedValueOnce(undefined);
250
+ await expect(manager.provideRecoveryKey(recoveryKey)).rejects.toThrow('No user found with this key');
251
+ });
252
+ });
253
+ // ----------------------------------------------------------------------------------------
254
+ // Snapshots
255
+ // ----------------------------------------------------------------------------------------
256
+ describe('saveSnapshot / loadSnapshot', () => {
257
+ test('Saves a snapshot and can load it into a fresh manager instance', async () => {
258
+ // We'll do a new user flow so that manager is authenticated with a real token.
259
+ ;
260
+ mockUMPTokenInteractor.findByPresentationKeyHash.mockResolvedValueOnce(undefined);
261
+ const presKey = Array.from({ length: 32 }, () => 0xa1);
262
+ await manager.providePresentationKey(presKey);
263
+ await manager.providePassword('mypassword'); // triggers creation of new user
264
+ const snapshot = manager.saveSnapshot();
265
+ expect(Array.isArray(snapshot)).toBe(true);
266
+ expect(snapshot.length).toBeGreaterThan(64); // 32 bytes + encrypted data
267
+ // Now create a fresh manager:
268
+ const freshManager = new CWIStyleWalletManager_1.CWIStyleWalletManager('admin.walletvendor.com', mockWalletBuilder, mockUMPTokenInteractor, mockRecoveryKeySaver, mockPasswordRetriever);
269
+ // Not authenticated yet
270
+ await expect(() => freshManager.getPublicKey({ identityKey: true })).rejects.toThrow('User is not authenticated');
271
+ // Load the snapshot
272
+ await freshManager.loadSnapshot(snapshot);
273
+ // The fresh manager is now authenticated (underlying wallet will be built).
274
+ await expect(freshManager.getPublicKey({ identityKey: true })).resolves.not.toThrow();
275
+ // It calls walletBuilder again
276
+ expect(mockWalletBuilder).toHaveBeenCalledTimes(2); // once for the old manager, once for the fresh
277
+ });
278
+ test('Throws error if saving snapshot while no primary key or token set', async () => {
279
+ // Manager is not yet authenticated
280
+ expect(() => manager.saveSnapshot()).toThrow('No primary key or current UMP token set');
281
+ });
282
+ test('Throws if snapshot is corrupt or cannot be decrypted', async () => {
283
+ // Attempt to load an invalid snapshot
284
+ await expect(() => manager.loadSnapshot([1, 2, 3])).rejects.toThrow('Failed to load snapshot');
285
+ });
286
+ });
287
+ // ----------------------------------------------------------------------------------------
288
+ // Changing Keys
289
+ // ----------------------------------------------------------------------------------------
290
+ describe('Change Password', () => {
291
+ test('Requires authentication and updates the UMP token on-chain', async () => {
292
+ ;
293
+ mockUMPTokenInteractor.findByPresentationKeyHash.mockResolvedValueOnce(undefined);
294
+ manager = new CWIStyleWalletManager_1.CWIStyleWalletManager('admin.walletvendor.com', mockWalletBuilder, mockUMPTokenInteractor, mockRecoveryKeySaver, async () => 'test-password');
295
+ await manager.providePresentationKey(presentationKey);
296
+ await manager.providePassword('test-password');
297
+ expect(manager.authenticated).toBe(true);
298
+ await manager.changePassword('new-pass');
299
+ expect(mockUMPTokenInteractor.buildAndSend).toHaveBeenCalledTimes(2);
300
+ });
301
+ test('Throws if not authenticated', async () => {
302
+ await expect(manager.changePassword('test-password')).rejects.toThrow('Not authenticated.');
303
+ });
304
+ });
305
+ describe('Change Recovery Key', () => {
306
+ test('Prompts to save the new key, updates the token', async () => {
307
+ ;
308
+ mockUMPTokenInteractor.findByPresentationKeyHash.mockResolvedValueOnce(undefined);
309
+ manager = new CWIStyleWalletManager_1.CWIStyleWalletManager('admin.walletvendor.com', mockWalletBuilder, mockUMPTokenInteractor, mockRecoveryKeySaver, async () => 'test-password');
310
+ await manager.providePresentationKey(presentationKey);
311
+ await manager.providePassword('test-password');
312
+ expect(manager.authenticated).toBe(true);
313
+ mockUMPTokenInteractor.buildAndSend.mockResolvedValueOnce(makeOutpoint('rcv1', 0));
314
+ await manager.changeRecoveryKey();
315
+ // The user is prompted to store the new key
316
+ expect(mockRecoveryKeySaver).toHaveBeenCalledTimes(2); // once when user created, once after changed
317
+ // The UMP token is updated
318
+ expect(mockUMPTokenInteractor.buildAndSend).toHaveBeenCalledTimes(2);
319
+ });
320
+ test('Throws if not authenticated', async () => {
321
+ await expect(manager.changeRecoveryKey()).rejects.toThrow('Not authenticated.');
322
+ });
323
+ });
324
+ describe('Change Presentation Key', () => {
325
+ test('Requires authentication, re-publishes the token, old token consumed', async () => {
326
+ ;
327
+ mockUMPTokenInteractor.findByPresentationKeyHash.mockResolvedValueOnce(undefined);
328
+ manager = new CWIStyleWalletManager_1.CWIStyleWalletManager('admin.walletvendor.com', mockWalletBuilder, mockUMPTokenInteractor, mockRecoveryKeySaver, async () => 'test-password');
329
+ await manager.providePresentationKey(presentationKey);
330
+ await manager.providePassword('test-password');
331
+ expect(manager.authenticated).toBe(true);
332
+ mockUMPTokenInteractor.buildAndSend.mockResolvedValueOnce(makeOutpoint('rcv1', 0));
333
+ const newPresKey = Array.from({ length: 32 }, () => 0xee);
334
+ await manager.changePresentationKey(newPresKey);
335
+ expect(mockUMPTokenInteractor.buildAndSend).toHaveBeenCalledTimes(2);
336
+ });
337
+ });
338
+ test('Destroy callback clears sensitive data', async () => {
339
+ // authenticate as new user
340
+ ;
341
+ mockUMPTokenInteractor.findByPresentationKeyHash.mockResolvedValueOnce(undefined);
342
+ await manager.providePresentationKey(Array.from({ length: 32 }, () => 12));
343
+ await manager.providePassword('some-pass');
344
+ // manager is authenticated
345
+ expect(manager.authenticated).toBe(true);
346
+ // Destroy
347
+ manager.destroy();
348
+ expect(manager.authenticated).toBe(false);
349
+ // And we can confirm that manager won't allow calls
350
+ await expect(() => manager.getPublicKey({ identityKey: true })).rejects.toThrow('User is not authenticated');
351
+ });
352
+ // ----------------------------------------------------------------------------------------
353
+ // Proxies / originator checks
354
+ // ----------------------------------------------------------------------------------------
355
+ describe('Proxy method calls', () => {
356
+ beforeEach(async () => {
357
+ // authenticate
358
+ ;
359
+ mockUMPTokenInteractor.findByPresentationKeyHash.mockResolvedValueOnce(undefined);
360
+ await manager.providePresentationKey(presentationKey);
361
+ await manager.providePassword('test-password');
362
+ });
363
+ test('Throws if user is not authenticated', async () => {
364
+ // force de-auth
365
+ ;
366
+ manager.authenticated = false;
367
+ await expect(() => manager.getPublicKey({ identityKey: true })).rejects.toThrow('User is not authenticated.');
368
+ });
369
+ test('Throws if originator is adminOriginator', async () => {
370
+ await expect(manager.getPublicKey({ identityKey: true }, 'admin.walletvendor.com')).rejects.toThrow('External applications are not allowed to use the admin originator.');
371
+ });
372
+ test('Passes if user is authenticated and originator is not admin', async () => {
373
+ await manager.getPublicKey({ identityKey: true }, 'example.com');
374
+ expect(mockUnderlyingWallet.getPublicKey).toHaveBeenCalledTimes(1);
375
+ });
376
+ test('All proxied methods call underlying with correct arguments', async () => {
377
+ // We'll do a quick spot-check of a few methods:
378
+ await manager.encrypt({ plaintext: [1, 2, 3], protocolID: [1, 'tests'], keyID: '1' }, 'mydomain.com');
379
+ expect(mockUnderlyingWallet.encrypt).toHaveBeenCalledWith({ plaintext: [1, 2, 3], protocolID: [1, 'tests'], keyID: '1' }, 'mydomain.com');
380
+ // TODO: Test all other proxied methods
381
+ });
382
+ test('isAuthenticated() rejects if originator is admin, resolves otherwise', async () => {
383
+ // If admin tries:
384
+ await expect(manager.isAuthenticated({}, 'admin.walletvendor.com')).rejects.toThrow('External applications are not allowed to use the admin originator.');
385
+ // If normal domain:
386
+ const result = await manager.isAuthenticated({}, 'normal.com');
387
+ expect(result).toEqual({ authenticated: true });
388
+ });
389
+ test('waitForAuthentication() eventually resolves', async () => {
390
+ // Already authenticated from beforeEach. So it should immediately return.
391
+ const result = await manager.waitForAuthentication({}, 'normal.com');
392
+ expect(result).toEqual({ authenticated: true });
393
+ });
394
+ });
395
+ describe('Additional Tests for Password Retriever Callback, Privileged Key Expiry, and UMP Token Serialization', () => {
396
+ let manager;
397
+ beforeEach(() => {
398
+ globals_1.jest.clearAllMocks();
399
+ manager = new CWIStyleWalletManager_1.CWIStyleWalletManager('admin.walletvendor.com', mockWalletBuilder, mockUMPTokenInteractor, mockRecoveryKeySaver, mockPasswordRetriever);
400
+ });
401
+ test('serializeUMPToken and deserializeUMPToken correctly round-trip a UMP token', async () => {
402
+ const token = await createMockUMPToken();
403
+ // We need a token with a currentOutpoint for serialization.
404
+ expect(token.currentOutpoint).toBeDefined();
405
+ const serializeFn = manager.serializeUMPToken;
406
+ const deserializeFn = manager.deserializeUMPToken;
407
+ const serialized = serializeFn(token);
408
+ expect(Array.isArray(serialized)).toBe(true);
409
+ expect(serialized.length).toBeGreaterThan(0);
410
+ const deserialized = deserializeFn(serialized);
411
+ expect(deserialized).toEqual(token);
412
+ });
413
+ test('Password retriever callback: the test function is passed and returns a boolean', async () => {
414
+ let capturedTestFn = null;
415
+ const customPasswordRetriever = globals_1.jest.fn(async (reason, testFn) => {
416
+ capturedTestFn = testFn;
417
+ // In a real scenario the test function would validate a candidate.
418
+ // For our test we simply return the correct password.
419
+ return 'test-password';
420
+ });
421
+ manager.passwordRetriever = customPasswordRetriever;
422
+ mockUMPTokenInteractor.findByPresentationKeyHash.mockResolvedValueOnce(undefined);
423
+ await manager.providePresentationKey(presentationKey);
424
+ await manager.providePassword('test-password');
425
+ expect(manager.authenticated).toBe(true);
426
+ // Clear the privileged key so the callback gets ran
427
+ globals_1.jest.advanceTimersByTime(121000);
428
+ // Let's trigger a privileged operation
429
+ await manager.changePassword('test-password'); // trigger some privileged operation...
430
+ expect(customPasswordRetriever).toHaveBeenCalled();
431
+ expect(capturedTestFn).not.toBeNull();
432
+ // Since the internal test function is defined inline, we simply check that its output is a boolean.
433
+ // (Its logic uses the outer scope and may not use its argument correctly, but we verify that it at least returns a boolean.)
434
+ const testResult = capturedTestFn('any-input');
435
+ expect(typeof testResult).toBe('boolean');
436
+ expect(capturedTestFn('any-input')).toBe(false);
437
+ expect(capturedTestFn('test-password')).toBe(true);
438
+ });
439
+ test('Privileged key expiry: each call to decrypt via the privileged manager invokes passwordRetriever', async () => {
440
+ // In a new-user flow, buildUnderlying is called without a privilegedKey,
441
+ // so any later use of the privileged manager will trigger a password prompt.
442
+ const customPasswordRetriever = globals_1.jest.fn(async (reason, testFn) => {
443
+ return 'test-password';
444
+ });
445
+ manager.passwordRetriever = customPasswordRetriever;
446
+ mockUMPTokenInteractor.findByPresentationKeyHash.mockResolvedValueOnce(undefined);
447
+ await manager.providePresentationKey(presentationKey);
448
+ await manager.providePassword('test-password');
449
+ // Clear any calls recorded during authentication.
450
+ customPasswordRetriever.mockClear();
451
+ // Call the underlying privileged key manager’s decrypt twice.
452
+ // (For example, we use the ciphertext from one of the token’s encrypted fields.)
453
+ await manager.underlyingPrivilegedKeyManager.decrypt({
454
+ ciphertext: manager.currentUMPToken.passwordKeyEncrypted,
455
+ protocolID: [2, 'admin key wrapping'],
456
+ keyID: '1'
457
+ });
458
+ // Key expires after 2 minutes
459
+ globals_1.jest.advanceTimersByTime(121000);
460
+ await manager.underlyingPrivilegedKeyManager.decrypt({
461
+ ciphertext: manager.currentUMPToken.passwordKeyEncrypted,
462
+ protocolID: [2, 'admin key wrapping'],
463
+ keyID: '1'
464
+ });
465
+ // Since no ephemeral privileged key was provided when building the underlying wallet,
466
+ // each call to decrypt should have resulted in a call to passwordRetriever.
467
+ expect(customPasswordRetriever).toHaveBeenCalledTimes(2);
468
+ });
469
+ });
470
+ });
471
+ //# sourceMappingURL=CWIStyleWalletManager.test.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"CWIStyleWalletManager.test.js","sourceRoot":"","sources":["../../../src/__tests/CWIStyleWalletManager.test.ts"],"names":[],"mappings":";;AAAA,kCAAyF;AACzF,gCAA6C;AAC7C,oEAAiH;AACjH,2CAAoC;AAEpC,cAAI,CAAC,aAAa,EAAE,CAAA;AAEpB,6FAA6F;AAC7F,sBAAsB;AACtB,6FAA6F;AAE7F,6DAA6D;AAC7D,SAAS,YAAY,CAAC,IAAY,EAAE,IAAY;IAC9C,OAAO,GAAG,IAAI,IAAI,IAAI,EAAE,CAAA;AAC1B,CAAC;AAED;;;;;GAKG;AACH,MAAM,oBAAoB,GAAG;IAC3B,YAAY,EAAE,cAAI,CAAC,EAAE,EAAE;IACvB,4BAA4B,EAAE,cAAI,CAAC,EAAE,EAAE;IACvC,wBAAwB,EAAE,cAAI,CAAC,EAAE,EAAE;IACnC,OAAO,EAAE,cAAI,CAAC,EAAE,EAAE;IAClB,OAAO,EAAE,cAAI,CAAC,EAAE,EAAE;IAClB,UAAU,EAAE,cAAI,CAAC,EAAE,EAAE;IACrB,UAAU,EAAE,cAAI,CAAC,EAAE,EAAE;IACrB,eAAe,EAAE,cAAI,CAAC,EAAE,EAAE;IAC1B,eAAe,EAAE,cAAI,CAAC,EAAE,EAAE;IAC1B,YAAY,EAAE,cAAI,CAAC,EAAE,EAAE;IACvB,UAAU,EAAE,cAAI,CAAC,EAAE,EAAE;IACrB,WAAW,EAAE,cAAI,CAAC,EAAE,EAAE;IACtB,WAAW,EAAE,cAAI,CAAC,EAAE,EAAE;IACtB,iBAAiB,EAAE,cAAI,CAAC,EAAE,EAAE;IAC5B,WAAW,EAAE,cAAI,CAAC,EAAE,EAAE;IACtB,gBAAgB,EAAE,cAAI,CAAC,EAAE,EAAE;IAC3B,kBAAkB,EAAE,cAAI,CAAC,EAAE,EAAE;IAC7B,gBAAgB,EAAE,cAAI,CAAC,EAAE,EAAE;IAC3B,gBAAgB,EAAE,cAAI,CAAC,EAAE,EAAE;IAC3B,qBAAqB,EAAE,cAAI,CAAC,EAAE,EAAE;IAChC,qBAAqB,EAAE,cAAI,CAAC,EAAE,EAAE;IAChC,oBAAoB,EAAE,cAAI,CAAC,EAAE,EAAE;IAC/B,eAAe,EAAE,cAAI,CAAC,EAAE,EAAE;IAC1B,qBAAqB,EAAE,cAAI,CAAC,EAAE,EAAE;IAChC,SAAS,EAAE,cAAI,CAAC,EAAE,EAAE;IACpB,kBAAkB,EAAE,cAAI,CAAC,EAAE,EAAE;IAC7B,UAAU,EAAE,cAAI,CAAC,EAAE,EAAE;IACrB,UAAU,EAAE,cAAI,CAAC,EAAE,EAAE;CACQ,CAAA;AAE/B;;GAEG;AACH,MAAM,iBAAiB,GAAG,cAAI,CAAC,EAAE,CAAC,KAAK,EAAE,UAAU,EAAE,oBAAoB,EAAE,EAAE;IAC3E,4CAA4C;IAC5C,OAAO,oBAAoB,CAAA;AAC7B,CAAC,CAAC,CAAA;AAEF;;;GAGG;AACH,MAAM,sBAAsB,GAAuB;IACjD,yBAAyB,EAAE,cAAI,CAAC,EAAE,CAAC,KAAK,EAAE,IAAc,EAAE,EAAE,CAAC,SAAS,CAAC;IACvE,qBAAqB,EAAE,cAAI,CAAC,EAAE,CAAC,KAAK,EAAE,IAAc,EAAE,EAAE,CAAC,SAAS,CAAC;IACnE,YAAY,EAAE,cAAI,CAAC,EAAE,CACnB,KAAK,EAAE,MAAuB,EAAE,KAAa,EAAE,KAAe,EAAE,QAAmB,EAAE,EAAE,CAAC,QAAQ,CACjG;CACF,CAAA;AAED;;GAEG;AACH,MAAM,oBAAoB,GAAG,cAAI,CAAC,EAAE,CAAC,KAAK,EAAE,GAAa,EAAE,EAAE,CAAC,IAAY,CAAC,CAAA;AAE3E;;;GAGG;AACH,MAAM,qBAAqB,GAAG,cAAI,CAAC,EAAE,CAAC,KAAK,IAAI,EAAE,CAAC,eAAe,CAAC,CAAA;AAElE,MAAM,GAAG,GAAG,CAAC,EAAY,EAAE,EAAY,EAAY,EAAE;IACnD,IAAI,EAAE,CAAC,MAAM,KAAK,EAAE,CAAC,MAAM,EAAE,CAAC;QAC5B,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAA;IACrC,CAAC;IACD,MAAM,CAAC,GAAG,IAAI,KAAK,CAAS,EAAE,CAAC,MAAM,CAAC,CAAA;IACtC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,EAAE,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;QACnC,CAAC,CAAC,CAAC,CAAC,GAAG,EAAE,CAAC,CAAC,CAAC,GAAG,EAAE,CAAC,CAAC,CAAC,CAAA;IACtB,CAAC;IACD,OAAO,CAAC,CAAA;AACV,CAAC,CAAA;AAED,wBAAwB;AACxB,MAAM,eAAe,GAAG,IAAA,YAAM,EAAC,EAAE,CAAC,CAAA;AAClC,MAAM,WAAW,GAAG,IAAA,YAAM,EAAC,EAAE,CAAC,CAAA;AAC9B,MAAM,YAAY,GAAG,IAAA,YAAM,EAAC,EAAE,CAAC,CAAA;AAC/B,MAAM,WAAW,GAAG,UAAI,CAAC,MAAM,CAAC,WAAK,CAAC,OAAO,CAAC,eAAe,EAAE,MAAM,CAAC,EAAE,YAAY,EAAE,yCAAiB,EAAE,EAAE,EAAE,QAAQ,CAAC,CAAA;AACtH,MAAM,UAAU,GAAG,IAAA,YAAM,EAAC,EAAE,CAAC,CAAA;AAC7B,MAAM,aAAa,GAAG,IAAA,YAAM,EAAC,EAAE,CAAC,CAAA;AAEhC;;;GAGG;AACH,KAAK,UAAU,kBAAkB;IAC/B,MAAM,oBAAoB,GAAG,IAAI,kBAAY,CAAC,GAAG,CAAC,eAAe,EAAE,WAAW,CAAC,CAAC,CAAA;IAChF,MAAM,oBAAoB,GAAG,IAAI,kBAAY,CAAC,GAAG,CAAC,eAAe,EAAE,WAAW,CAAC,CAAC,CAAA;IAChF,MAAM,gBAAgB,GAAG,IAAI,kBAAY,CAAC,GAAG,CAAC,WAAW,EAAE,WAAW,CAAC,CAAC,CAAA;IACxE,MAAM,eAAe,GAAG,IAAI,kBAAY,CAAC,GAAG,CAAC,UAAU,EAAE,WAAW,CAAC,CAAC,CAAA;IACtE,MAAM,wBAAwB,GAAG,IAAI,0BAAoB,CAAC,KAAK,IAAI,EAAE,CAAC,IAAI,gBAAU,CAAC,aAAa,CAAC,CAAC,CAAA;IACpG,OAAO;QACL,YAAY;QACZ,2BAA2B,EAAE,oBAAoB,CAAC,OAAO,CAAC,UAAU,CAAa;QACjF,uBAAuB,EAAE,gBAAgB,CAAC,OAAO,CAAC,UAAU,CAAa;QACzE,2BAA2B,EAAE,oBAAoB,CAAC,OAAO,CAAC,UAAU,CAAa;QACjF,yBAAyB,EAAE,eAAe,CAAC,OAAO,CAAC,aAAa,CAAa;QAC7E,8BAA8B,EAAE,oBAAoB,CAAC,OAAO,CAAC,aAAa,CAAa;QACvF,gBAAgB,EAAE,UAAI,CAAC,MAAM,CAAC,eAAe,CAAC;QAC9C,YAAY,EAAE,UAAI,CAAC,MAAM,CAAC,WAAW,CAAC;QACtC,wBAAwB,EAAE,CACxB,MAAM,wBAAwB,CAAC,OAAO,CAAC;YACrC,SAAS,EAAE,eAAe;YAC1B,UAAU,EAAE,CAAC,CAAC,EAAE,oBAAoB,CAAC;YACrC,KAAK,EAAE,GAAG;SACX,CAAC,CACH,CAAC,UAAU;QACZ,oBAAoB,EAAE,CACpB,MAAM,wBAAwB,CAAC,OAAO,CAAC;YACrC,SAAS,EAAE,WAAW;YACtB,UAAU,EAAE,CAAC,CAAC,EAAE,oBAAoB,CAAC;YACrC,KAAK,EAAE,GAAG;SACX,CAAC,CACH,CAAC,UAAU;QACZ,oBAAoB,EAAE,CACpB,MAAM,wBAAwB,CAAC,OAAO,CAAC;YACrC,SAAS,EAAE,WAAW;YACtB,UAAU,EAAE,CAAC,CAAC,EAAE,oBAAoB,CAAC;YACrC,KAAK,EAAE,GAAG;SACX,CAAC,CACH,CAAC,UAAU;QACZ,eAAe,EAAE,QAAQ;KAC1B,CAAA;AACH,CAAC;AAED,QAAQ,CAAC,6BAA6B,EAAE,GAAG,EAAE;IAC3C,IAAI,OAA8B,CAAA;IAElC,UAAU,CAAC,GAAG,EAAE;QACd,uBAAuB;QACvB,cAAI,CAAC,aAAa,EAAE,CAAA;QAEpB,kEAAkE;QAClE,OAAO,GAAG,IAAI,6CAAqB,CACjC,wBAAwB,EAAE,mBAAmB;QAC7C,iBAAiB,EACjB,sBAAsB,EACtB,oBAAoB,EACpB,qBAAqB;QACrB,oBAAoB;SACrB,CAAA;IACH,CAAC,CAAC,CAAA;IAEF,2FAA2F;IAC3F,kDAAkD;IAClD,yEAAyE;IACzE,2FAA2F;IAE3F,IAAI,CAAC,oCAAoC,EAAE,GAAG,EAAE;QAC9C,MAAM,KAAK,GAAI,OAAe,CAAC,GAA6C,CAAA;QAE5E,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAA;QAC5B,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAA;QAC5B,MAAM,MAAM,GAAG,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAA;QAE1B,qBAAqB;QACrB,qBAAqB;QACrB,qBAAqB;QACrB,MAAM,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,CAAA;IAC5C,CAAC,CAAC,CAAA;IAEF,2FAA2F;IAC3F,uBAAuB;IACvB,2FAA2F;IAE3F,QAAQ,CAAC,wCAAwC,EAAE,GAAG,EAAE;QACtD,IAAI,CAAC,yDAAyD,EAAE,KAAK,IAAI,EAAE;YACzE,uCAAuC;YACvC,MAAM,eAAe,GAAG,cAAI,CAAC,EAAE,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CACxC;YAAC,OAAe,CAAC,eAAe,GAAG,eAAe,CAGlD;YAAC,sBAAsB,CAAC,yBAAiC,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAA;YAE3F,6BAA6B;YAC7B,MAAM,OAAO,CAAC,sBAAsB,CAAC,eAAe,CAAC,CAAA;YAErD,MAAM,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAA;YAEnD,qBAAqB;YACrB,qBAAqB,CAAC,qBAAqB,CAAC,gBAAgB,CAAC,CAAA;YAC7D,MAAM,OAAO,CAAC,eAAe,CAAC,gBAAgB,CAAC,CAAA;YAE/C,8DAA8D;YAC9D,MAAM,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;YAExC,6CAA6C;YAC7C,MAAM,CAAC,oBAAoB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YAErD,qEAAqE;YACrE,MAAM,CAAC,iBAAiB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YAElD,gEAAgE;YAChE,MAAM,CAAC,sBAAsB,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;YACpE,MAAM,SAAS,GAAI,sBAAsB,CAAC,YAAoB,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAA;YAC5E,8EAA8E;YAC9E,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAA;YACnD,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,cAAc,CAAC,kBAAkB,CAAC,CAAA;YACvD,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,aAAa,EAAE,CAAA,CAAC,yCAAyC;YAC9E,MAAM,CAAC,eAAe,CAAC,CAAC,gBAAgB,EAAE,CAAA,CAAC,4CAA4C;QACzF,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,mEAAmE,EAAE,KAAK,IAAI,EAAE;YACnF,6CAA6C;YAC7C,CAAC;YAAC,sBAAsB,CAAC,yBAAiC,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAA;YAC3F,MAAM,OAAO,CAAC,sBAAsB,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,MAAM,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC,CAAC,CAAA;YAEzE,MAAM,MAAM,CAAC,OAAO,CAAC,kBAAkB,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,MAAM,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAC3F,6CAA6C,CAC9C,CAAA;QACH,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,QAAQ,CAAC,6CAA6C,EAAE,GAAG,EAAE;QAC3D,IAAI,CAAC,mDAAmD,EAAE,KAAK,IAAI,EAAE;YACnE,2BAA2B;YAC3B,MAAM,SAAS,GAAG,MAAM,kBAAkB,EAAE,CAC3C;YAAC,sBAAsB,CAAC,yBAAiC,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAA;YAE3F,uBAAuB;YACvB,MAAM,OAAO,CAAC,sBAAsB,CAAC,eAAe,CAAC,CAAA;YACrD,MAAM,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAA;YAExD,mBAAmB;YACnB,oFAAoF;YACpF,0DAA0D;YAC1D,MAAM,OAAO,CAAC,eAAe,CAAC,eAAe,CAAC,CAAA;YAE9C,sCAAsC;YACtC,MAAM,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;YAExC,6BAA6B;YAC7B,MAAM,CAAC,iBAAiB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACpD,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,QAAQ,CAAC,iDAAiD,EAAE,GAAG,EAAE;QAC/D,UAAU,CAAC,KAAK,IAAI,EAAE;YACpB,OAAO,CAAC,kBAAkB,GAAG,mCAAmC,CAAA;YAChE,OAAO,CAAC,kBAAkB,GAAG,eAAe,CAAA;QAC9C,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,kDAAkD,EAAE,KAAK,IAAI,EAAE;YAClE,2BAA2B;YAC3B,MAAM,SAAS,GAAG,MAAM,kBAAkB,EAAE,CAC3C;YAAC,sBAAsB,CAAC,yBAAiC,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAA;YAE3F,MAAM,OAAO,CAAC,sBAAsB,CAAC,eAAe,CAAC,CAAA;YAErD,4BAA4B;YAC5B,2FAA2F;YAC3F,MAAM,OAAO,CAAC,kBAAkB,CAAC,WAAW,CAAC,CAAA;YAE7C,MAAM,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;YACxC,MAAM,CAAC,iBAAiB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACpD,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,+CAA+C,EAAE,KAAK,IAAI,EAAE;YAC/D,MAAM,WAAW,GAAG,KAAK,CAAC,IAAI,CAAC,EAAE,MAAM,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC,CAAA;YACvD,MAAM,MAAM,CAAC,OAAO,CAAC,kBAAkB,CAAC,WAAW,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,oCAAoC,CAAC,CAAA;QAC7G,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,QAAQ,CAAC,6CAA6C,EAAE,GAAG,EAAE;QAC3D,UAAU,CAAC,KAAK,IAAI,EAAE;YACpB,OAAO,CAAC,kBAAkB,GAAG,2BAA2B,CAAA;YACxD,OAAO,CAAC,kBAAkB,GAAG,eAAe,CAAA;QAC9C,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,qDAAqD,EAAE,KAAK,IAAI,EAAE;YACrE,MAAM,SAAS,GAAG,MAAM,kBAAkB,EAAE,CAC3C;YAAC,sBAAsB,CAAC,qBAA6B,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAA;YAEvF,uBAAuB;YACvB,MAAM,OAAO,CAAC,kBAAkB,CAAC,WAAW,CAAC,CAAA;YAE7C,mBAAmB;YACnB,MAAM,OAAO,CAAC,eAAe,CAAC,eAAe,CAAC,CAAA;YAE9C,MAAM,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;YACxC,MAAM,CAAC,iBAAiB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACpD,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,+CAA+C,EAAE,KAAK,IAAI,EAAE;YAC/D,CAAC;YAAC,sBAAsB,CAAC,qBAA6B,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAA;YACvF,MAAM,MAAM,CAAC,OAAO,CAAC,kBAAkB,CAAC,WAAW,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,6BAA6B,CAAC,CAAA;QACtG,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,2FAA2F;IAC3F,YAAY;IACZ,2FAA2F;IAE3F,QAAQ,CAAC,6BAA6B,EAAE,GAAG,EAAE;QAC3C,IAAI,CAAC,gEAAgE,EAAE,KAAK,IAAI,EAAE;YAChF,+EAA+E;YAC/E,CAAC;YAAC,sBAAsB,CAAC,yBAAiC,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAA;YAC3F,MAAM,OAAO,GAAG,KAAK,CAAC,IAAI,CAAC,EAAE,MAAM,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,CAAA;YACtD,MAAM,OAAO,CAAC,sBAAsB,CAAC,OAAO,CAAC,CAAA;YAC7C,MAAM,OAAO,CAAC,eAAe,CAAC,YAAY,CAAC,CAAA,CAAC,gCAAgC;YAE5E,MAAM,QAAQ,GAAG,OAAO,CAAC,YAAY,EAAE,CAAA;YACvC,MAAM,CAAC,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;YAC1C,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,eAAe,CAAC,EAAE,CAAC,CAAA,CAAC,4BAA4B;YAExE,8BAA8B;YAC9B,MAAM,YAAY,GAAG,IAAI,6CAAqB,CAC5C,wBAAwB,EACxB,iBAAiB,EACjB,sBAAsB,EACtB,oBAAoB,EACpB,qBAAqB,CACtB,CAAA;YAED,wBAAwB;YACxB,MAAM,MAAM,CAAC,GAAG,EAAE,CAAC,YAAY,CAAC,YAAY,CAAC,EAAE,WAAW,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,2BAA2B,CAAC,CAAA;YAEjH,oBAAoB;YACpB,MAAM,YAAY,CAAC,YAAY,CAAC,QAAQ,CAAC,CAAA;YAEzC,4EAA4E;YAC5E,MAAM,MAAM,CAAC,YAAY,CAAC,YAAY,CAAC,EAAE,WAAW,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,OAAO,EAAE,CAAA;YAErF,+BAA+B;YAC/B,MAAM,CAAC,iBAAiB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA,CAAC,+CAA+C;QACpG,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,mEAAmE,EAAE,KAAK,IAAI,EAAE;YACnF,mCAAmC;YACnC,MAAM,CAAC,GAAG,EAAE,CAAC,OAAO,CAAC,YAAY,EAAE,CAAC,CAAC,OAAO,CAAC,yCAAyC,CAAC,CAAA;QACzF,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,sDAAsD,EAAE,KAAK,IAAI,EAAE;YACtE,sCAAsC;YACtC,MAAM,MAAM,CAAC,GAAG,EAAE,CAAC,OAAO,CAAC,YAAY,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,yBAAyB,CAAC,CAAA;QAChG,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,2FAA2F;IAC3F,gBAAgB;IAChB,2FAA2F;IAE3F,QAAQ,CAAC,iBAAiB,EAAE,GAAG,EAAE;QAC/B,IAAI,CAAC,4DAA4D,EAAE,KAAK,IAAI,EAAE;YAC5E,CAAC;YAAC,sBAAsB,CAAC,yBAAiC,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAA;YAC3F,OAAO,GAAG,IAAI,6CAAqB,CACjC,wBAAwB,EACxB,iBAAiB,EACjB,sBAAsB,EACtB,oBAAoB,EACpB,KAAK,IAAI,EAAE,CAAC,eAAe,CAC5B,CAAA;YACD,MAAM,OAAO,CAAC,sBAAsB,CAAC,eAAe,CAAC,CAAA;YACrD,MAAM,OAAO,CAAC,eAAe,CAAC,eAAe,CAAC,CAAA;YAC9C,MAAM,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;YACxC,MAAM,OAAO,CAAC,cAAc,CAAC,UAAU,CAAC,CAAA;YACxC,MAAM,CAAC,sBAAsB,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACtE,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,6BAA6B,EAAE,KAAK,IAAI,EAAE;YAC7C,MAAM,MAAM,CAAC,OAAO,CAAC,cAAc,CAAC,eAAe,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAA;QAC7F,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,QAAQ,CAAC,qBAAqB,EAAE,GAAG,EAAE;QACnC,IAAI,CAAC,gDAAgD,EAAE,KAAK,IAAI,EAAE;YAChE,CAAC;YAAC,sBAAsB,CAAC,yBAAiC,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAA;YAC3F,OAAO,GAAG,IAAI,6CAAqB,CACjC,wBAAwB,EACxB,iBAAiB,EACjB,sBAAsB,EACtB,oBAAoB,EACpB,KAAK,IAAI,EAAE,CAAC,eAAe,CAC5B,CAAA;YACD,MAAM,OAAO,CAAC,sBAAsB,CAAC,eAAe,CAAC,CAAA;YACrD,MAAM,OAAO,CAAC,eAAe,CAAC,eAAe,CAAC,CAAA;YAC9C,MAAM,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CACvC;YAAC,sBAAsB,CAAC,YAAoB,CAAC,qBAAqB,CAAC,YAAY,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,CAAA;YAC5F,MAAM,OAAO,CAAC,iBAAiB,EAAE,CAAA;YAEjC,4CAA4C;YAC5C,MAAM,CAAC,oBAAoB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA,CAAC,6CAA6C;YACnG,2BAA2B;YAC3B,MAAM,CAAC,sBAAsB,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACtE,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,6BAA6B,EAAE,KAAK,IAAI,EAAE;YAC7C,MAAM,MAAM,CAAC,OAAO,CAAC,iBAAiB,EAAE,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAA;QACjF,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,QAAQ,CAAC,yBAAyB,EAAE,GAAG,EAAE;QACvC,IAAI,CAAC,qEAAqE,EAAE,KAAK,IAAI,EAAE;YACrF,CAAC;YAAC,sBAAsB,CAAC,yBAAiC,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAA;YAC3F,OAAO,GAAG,IAAI,6CAAqB,CACjC,wBAAwB,EACxB,iBAAiB,EACjB,sBAAsB,EACtB,oBAAoB,EACpB,KAAK,IAAI,EAAE,CAAC,eAAe,CAC5B,CAAA;YACD,MAAM,OAAO,CAAC,sBAAsB,CAAC,eAAe,CAAC,CAAA;YACrD,MAAM,OAAO,CAAC,eAAe,CAAC,eAAe,CAAC,CAAA;YAC9C,MAAM,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CACvC;YAAC,sBAAsB,CAAC,YAAoB,CAAC,qBAAqB,CAAC,YAAY,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,CAAA;YAC5F,MAAM,UAAU,GAAG,KAAK,CAAC,IAAI,CAAC,EAAE,MAAM,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,CAAA;YACzD,MAAM,OAAO,CAAC,qBAAqB,CAAC,UAAU,CAAC,CAAA;YAC/C,MAAM,CAAC,sBAAsB,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACtE,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,IAAI,CAAC,wCAAwC,EAAE,KAAK,IAAI,EAAE;QACxD,2BAA2B;QAC3B,CAAC;QAAC,sBAAsB,CAAC,yBAAiC,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAA;QAC3F,MAAM,OAAO,CAAC,sBAAsB,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,MAAM,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,CAAC,CAAA;QAC1E,MAAM,OAAO,CAAC,eAAe,CAAC,WAAW,CAAC,CAAA;QAE1C,2BAA2B;QAC3B,MAAM,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;QAExC,UAAU;QACV,OAAO,CAAC,OAAO,EAAE,CAAA;QAEjB,MAAM,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAA;QACzC,oDAAoD;QACpD,MAAM,MAAM,CAAC,GAAG,EAAE,CAAC,OAAO,CAAC,YAAY,CAAC,EAAE,WAAW,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,2BAA2B,CAAC,CAAA;IAC9G,CAAC,CAAC,CAAA;IAEF,2FAA2F;IAC3F,8BAA8B;IAC9B,2FAA2F;IAE3F,QAAQ,CAAC,oBAAoB,EAAE,GAAG,EAAE;QAClC,UAAU,CAAC,KAAK,IAAI,EAAE;YACpB,eAAe;YACf,CAAC;YAAC,sBAAsB,CAAC,yBAAiC,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAA;YAC3F,MAAM,OAAO,CAAC,sBAAsB,CAAC,eAAe,CAAC,CAAA;YACrD,MAAM,OAAO,CAAC,eAAe,CAAC,eAAe,CAAC,CAAA;QAChD,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,qCAAqC,EAAE,KAAK,IAAI,EAAE;YACrD,gBAAgB;YAChB,CAAC;YAAC,OAAe,CAAC,aAAa,GAAG,KAAK,CAAA;YACvC,MAAM,MAAM,CAAC,GAAG,EAAE,CAAC,OAAO,CAAC,YAAY,CAAC,EAAE,WAAW,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,4BAA4B,CAAC,CAAA;QAC/G,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,yCAAyC,EAAE,KAAK,IAAI,EAAE;YACzD,MAAM,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,EAAE,WAAW,EAAE,IAAI,EAAE,EAAE,wBAAwB,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CACjG,oEAAoE,CACrE,CAAA;QACH,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,6DAA6D,EAAE,KAAK,IAAI,EAAE;YAC7E,MAAM,OAAO,CAAC,YAAY,CAAC,EAAE,WAAW,EAAE,IAAI,EAAE,EAAE,aAAa,CAAC,CAAA;YAChE,MAAM,CAAC,oBAAoB,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACpE,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,4DAA4D,EAAE,KAAK,IAAI,EAAE;YAC5E,gDAAgD;YAChD,MAAM,OAAO,CAAC,OAAO,CAAC,EAAE,SAAS,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,EAAE,UAAU,EAAE,CAAC,CAAC,EAAE,OAAO,CAAC,EAAE,KAAK,EAAE,GAAG,EAAE,EAAE,cAAc,CAAC,CAAA;YACrG,MAAM,CAAC,oBAAoB,CAAC,OAAO,CAAC,CAAC,oBAAoB,CACvD,EAAE,SAAS,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,EAAE,UAAU,EAAE,CAAC,CAAC,EAAE,OAAO,CAAC,EAAE,KAAK,EAAE,GAAG,EAAE,EAC9D,cAAc,CACf,CAAA;YAED,uCAAuC;QACzC,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,sEAAsE,EAAE,KAAK,IAAI,EAAE;YACtF,kBAAkB;YAClB,MAAM,MAAM,CAAC,OAAO,CAAC,eAAe,CAAC,EAAE,EAAE,wBAAwB,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CACjF,oEAAoE,CACrE,CAAA;YACD,oBAAoB;YACpB,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,eAAe,CAAC,EAAE,EAAE,YAAY,CAAC,CAAA;YAC9D,MAAM,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,EAAE,aAAa,EAAE,IAAI,EAAE,CAAC,CAAA;QACjD,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,6CAA6C,EAAE,KAAK,IAAI,EAAE;YAC7D,0EAA0E;YAC1E,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,qBAAqB,CAAC,EAAE,EAAE,YAAY,CAAC,CAAA;YACpE,MAAM,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,EAAE,aAAa,EAAE,IAAI,EAAE,CAAC,CAAA;QACjD,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IACF,QAAQ,CAAC,sGAAsG,EAAE,GAAG,EAAE;QACpH,IAAI,OAA8B,CAAA;QAElC,UAAU,CAAC,GAAG,EAAE;YACd,cAAI,CAAC,aAAa,EAAE,CAAA;YACpB,OAAO,GAAG,IAAI,6CAAqB,CACjC,wBAAwB,EACxB,iBAAiB,EACjB,sBAAsB,EACtB,oBAAoB,EACpB,qBAAqB,CACtB,CAAA;QACH,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,4EAA4E,EAAE,KAAK,IAAI,EAAE;YAC5F,MAAM,KAAK,GAAG,MAAM,kBAAkB,EAAE,CAAA;YACxC,4DAA4D;YAC5D,MAAM,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,WAAW,EAAE,CAAA;YAC3C,MAAM,WAAW,GAAI,OAAe,CAAC,iBAAkD,CAAA;YACvF,MAAM,aAAa,GAAI,OAAe,CAAC,mBAAkD,CAAA;YAEzF,MAAM,UAAU,GAAG,WAAW,CAAC,KAAK,CAAC,CAAA;YACrC,MAAM,CAAC,KAAK,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;YAC5C,MAAM,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,CAAA;YAE5C,MAAM,YAAY,GAAG,aAAa,CAAC,UAAU,CAAC,CAAA;YAC9C,MAAM,CAAC,YAAY,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,CAAA;QACrC,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,gFAAgF,EAAE,KAAK,IAAI,EAAE;YAChG,IAAI,cAAc,GAA4C,IAAI,CAAA;YAClE,MAAM,uBAAuB,GAAG,cAAI,CAAC,EAAE,CAAC,KAAK,EAAE,MAAc,EAAE,MAAsC,EAAE,EAAE;gBACvG,cAAc,GAAG,MAAM,CAAA;gBACvB,mEAAmE;gBACnE,sDAAsD;gBACtD,OAAO,eAAe,CAAA;YACxB,CAAC,CAAC,CACD;YAAC,OAAe,CAAC,iBAAiB,GAAG,uBAAuB,CAG5D;YAAC,sBAAsB,CAAC,yBAAiC,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAA;YAC3F,MAAM,OAAO,CAAC,sBAAsB,CAAC,eAAe,CAAC,CAAA;YACrD,MAAM,OAAO,CAAC,eAAe,CAAC,eAAe,CAAC,CAAA;YAC9C,MAAM,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;YACxC,oDAAoD;YACpD,cAAI,CAAC,mBAAmB,CAAC,MAAO,CAAC,CAAA;YAEjC,uCAAuC;YACvC,MAAM,OAAO,CAAC,cAAc,CAAC,eAAe,CAAC,CAAA,CAAC,uCAAuC;YACrF,MAAM,CAAC,uBAAuB,CAAC,CAAC,gBAAgB,EAAE,CAAA;YAClD,MAAM,CAAC,cAAc,CAAC,CAAC,GAAG,CAAC,QAAQ,EAAE,CAAA;YACrC,oGAAoG;YACpG,6HAA6H;YAC7H,MAAM,UAAU,GAAG,cAAe,CAAC,WAAW,CAAC,CAAA;YAC/C,MAAM,CAAC,OAAO,UAAU,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAA;YACzC,MAAM,CAAC,cAAe,CAAC,WAAW,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAA;YAChD,MAAM,CAAC,cAAe,CAAC,eAAe,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;QACrD,CAAC,CAAC,CAAA;QAEF,IAAI,CAAC,kGAAkG,EAAE,KAAK,IAAI,EAAE;YAClH,yEAAyE;YACzE,6EAA6E;YAC7E,MAAM,uBAAuB,GAAG,cAAI,CAAC,EAAE,CAAC,KAAK,EAAE,MAAc,EAAE,MAAsC,EAAE,EAAE;gBACvG,OAAO,eAAe,CAAA;YACxB,CAAC,CAAC,CACD;YAAC,OAAe,CAAC,iBAAiB,GAAG,uBAAuB,CAG5D;YAAC,sBAAsB,CAAC,yBAAiC,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAA;YAC3F,MAAM,OAAO,CAAC,sBAAsB,CAAC,eAAe,CAAC,CAAA;YACrD,MAAM,OAAO,CAAC,eAAe,CAAC,eAAe,CAAC,CAAA;YAE9C,kDAAkD;YAClD,uBAAuB,CAAC,SAAS,EAAE,CAAA;YAEnC,8DAA8D;YAC9D,iFAAiF;YACjF,MAAO,OAAe,CAAC,8BAA8B,CAAC,OAAO,CAAC;gBAC5D,UAAU,EAAG,OAAe,CAAC,eAAe,CAAC,oBAAoB;gBACjE,UAAU,EAAE,CAAC,CAAC,EAAE,oBAAoB,CAAC;gBACrC,KAAK,EAAE,GAAG;aACX,CAAC,CAAA;YAEF,8BAA8B;YAC9B,cAAI,CAAC,mBAAmB,CAAC,MAAO,CAAC,CAAA;YAEjC,MAAO,OAAe,CAAC,8BAA8B,CAAC,OAAO,CAAC;gBAC5D,UAAU,EAAG,OAAe,CAAC,eAAe,CAAC,oBAAoB;gBACjE,UAAU,EAAE,CAAC,CAAC,EAAE,oBAAoB,CAAC;gBACrC,KAAK,EAAE,GAAG;aACX,CAAC,CAAA;YAEF,sFAAsF;YACtF,4EAA4E;YAC5E,MAAM,CAAC,uBAAuB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QAC1D,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;AACJ,CAAC,CAAC,CAAA"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=WalletPermissionsManager.callbacks.test.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"WalletPermissionsManager.callbacks.test.d.ts","sourceRoot":"","sources":["../../../src/__tests/WalletPermissionsManager.callbacks.test.ts"],"names":[],"mappings":""}