@bsv/wallet-toolbox 1.1.62 → 1.2.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/docs/client.md +2339 -182
- package/docs/wallet.md +2339 -182
- package/out/src/CWIStyleWalletManager.d.ts +417 -0
- package/out/src/CWIStyleWalletManager.d.ts.map +1 -0
- package/out/src/CWIStyleWalletManager.js +1140 -0
- package/out/src/CWIStyleWalletManager.js.map +1 -0
- package/out/src/SimpleWalletManager.d.ts +169 -0
- package/out/src/SimpleWalletManager.d.ts.map +1 -0
- package/out/src/SimpleWalletManager.js +315 -0
- package/out/src/SimpleWalletManager.js.map +1 -0
- package/out/src/Wallet.d.ts +6 -1
- package/out/src/Wallet.d.ts.map +1 -1
- package/out/src/Wallet.js +39 -7
- package/out/src/Wallet.js.map +1 -1
- package/out/src/WalletAuthenticationManager.d.ts +33 -0
- package/out/src/WalletAuthenticationManager.d.ts.map +1 -0
- package/out/src/WalletAuthenticationManager.js +110 -0
- package/out/src/WalletAuthenticationManager.js.map +1 -0
- package/out/src/WalletPermissionsManager.d.ts +575 -0
- package/out/src/WalletPermissionsManager.d.ts.map +1 -0
- package/out/src/WalletPermissionsManager.js +1789 -0
- package/out/src/WalletPermissionsManager.js.map +1 -0
- package/out/src/WalletSettingsManager.d.ts +59 -0
- package/out/src/WalletSettingsManager.d.ts.map +1 -0
- package/out/src/WalletSettingsManager.js +189 -0
- package/out/src/WalletSettingsManager.js.map +1 -0
- package/out/src/__tests/CWIStyleWalletManager.test.d.ts +2 -0
- package/out/src/__tests/CWIStyleWalletManager.test.d.ts.map +1 -0
- package/out/src/__tests/CWIStyleWalletManager.test.js +471 -0
- package/out/src/__tests/CWIStyleWalletManager.test.js.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.callbacks.test.d.ts +2 -0
- package/out/src/__tests/WalletPermissionsManager.callbacks.test.d.ts.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.callbacks.test.js +239 -0
- package/out/src/__tests/WalletPermissionsManager.callbacks.test.js.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.checks.test.d.ts +2 -0
- package/out/src/__tests/WalletPermissionsManager.checks.test.d.ts.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.checks.test.js +637 -0
- package/out/src/__tests/WalletPermissionsManager.checks.test.js.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.encryption.test.d.ts +2 -0
- package/out/src/__tests/WalletPermissionsManager.encryption.test.d.ts.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.encryption.test.js +295 -0
- package/out/src/__tests/WalletPermissionsManager.encryption.test.js.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.fixtures.d.ts +83 -0
- package/out/src/__tests/WalletPermissionsManager.fixtures.d.ts.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.fixtures.js +261 -0
- package/out/src/__tests/WalletPermissionsManager.fixtures.js.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.flows.test.d.ts +2 -0
- package/out/src/__tests/WalletPermissionsManager.flows.test.d.ts.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.flows.test.js +377 -0
- package/out/src/__tests/WalletPermissionsManager.flows.test.js.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.initialization.test.d.ts +2 -0
- package/out/src/__tests/WalletPermissionsManager.initialization.test.d.ts.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.initialization.test.js +227 -0
- package/out/src/__tests/WalletPermissionsManager.initialization.test.js.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.proxying.test.d.ts +2 -0
- package/out/src/__tests/WalletPermissionsManager.proxying.test.d.ts.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.proxying.test.js +566 -0
- package/out/src/__tests/WalletPermissionsManager.proxying.test.js.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.tokens.test.d.ts +2 -0
- package/out/src/__tests/WalletPermissionsManager.tokens.test.d.ts.map +1 -0
- package/out/src/__tests/WalletPermissionsManager.tokens.test.js +454 -0
- package/out/src/__tests/WalletPermissionsManager.tokens.test.js.map +1 -0
- package/out/src/index.all.d.ts +9 -0
- package/out/src/index.all.d.ts.map +1 -1
- package/out/src/index.all.js +9 -0
- package/out/src/index.all.js.map +1 -1
- package/out/src/index.client.d.ts +9 -0
- package/out/src/index.client.d.ts.map +1 -1
- package/out/src/index.client.js +9 -0
- package/out/src/index.client.js.map +1 -1
- package/out/src/sdk/CertOpsWallet.d.ts +7 -0
- package/out/src/sdk/CertOpsWallet.d.ts.map +1 -0
- package/out/src/sdk/CertOpsWallet.js +3 -0
- package/out/src/sdk/CertOpsWallet.js.map +1 -0
- package/out/src/sdk/__test/CertificateLifeCycle.test.js +19 -82
- package/out/src/sdk/__test/CertificateLifeCycle.test.js.map +1 -1
- package/out/src/sdk/index.d.ts +1 -1
- package/out/src/sdk/index.d.ts.map +1 -1
- package/out/src/sdk/index.js +1 -1
- package/out/src/sdk/index.js.map +1 -1
- package/out/src/sdk/validationHelpers.d.ts.map +1 -1
- package/out/src/sdk/validationHelpers.js +13 -12
- package/out/src/sdk/validationHelpers.js.map +1 -1
- package/out/src/services/__tests/bitrails.test.js +7 -2
- package/out/src/services/__tests/bitrails.test.js.map +1 -1
- package/out/src/services/providers/__tests/WhatsOnChain.test.js +3 -3
- package/out/src/services/providers/__tests/WhatsOnChain.test.js.map +1 -1
- package/out/src/signer/methods/proveCertificate.d.ts.map +1 -1
- package/out/src/signer/methods/proveCertificate.js +3 -19
- package/out/src/signer/methods/proveCertificate.js.map +1 -1
- package/out/src/storage/__test/WalletStorageManager.test.js +1 -1
- package/out/src/storage/__test/WalletStorageManager.test.js.map +1 -1
- package/out/src/storage/remoting/StorageClient.d.ts +2 -2
- package/out/src/storage/remoting/StorageClient.d.ts.map +1 -1
- package/out/src/storage/remoting/StorageClient.js +1 -1
- package/out/src/storage/remoting/StorageClient.js.map +1 -1
- package/out/src/utility/identityUtils.d.ts +31 -0
- package/out/src/utility/identityUtils.d.ts.map +1 -0
- package/out/src/utility/identityUtils.js +116 -0
- package/out/src/utility/identityUtils.js.map +1 -0
- package/out/src/wab-client/WABClient.d.ts +49 -0
- package/out/src/wab-client/WABClient.d.ts.map +1 -0
- package/out/src/wab-client/WABClient.js +83 -0
- package/out/src/wab-client/WABClient.js.map +1 -0
- package/out/src/wab-client/__tests/WABClient.man.test.d.ts +2 -0
- package/out/src/wab-client/__tests/WABClient.man.test.d.ts.map +1 -0
- package/out/src/wab-client/__tests/WABClient.man.test.js +52 -0
- package/out/src/wab-client/__tests/WABClient.man.test.js.map +1 -0
- package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts +34 -0
- package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts.map +1 -0
- package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js +16 -0
- package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js.map +1 -0
- package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts +7 -0
- package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts.map +1 -0
- package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js +36 -0
- package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js.map +1 -0
- package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts +28 -0
- package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts.map +1 -0
- package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js +69 -0
- package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js.map +1 -0
- package/out/test/Wallet/action/internalizeAction.a.test.js +1 -1
- package/out/test/Wallet/action/internalizeAction.a.test.js.map +1 -1
- package/out/test/Wallet/certificate/acquireCertificate.test.js +26 -29
- package/out/test/Wallet/certificate/acquireCertificate.test.js.map +1 -1
- package/out/test/storage/KnexMigrations.test.js +1 -1
- package/out/test/storage/KnexMigrations.test.js.map +1 -1
- package/out/test/storage/update.test.js +1 -1
- package/out/test/storage/update.test.js.map +1 -1
- package/out/test/utils/TestUtilsWalletStorage.d.ts +9 -5
- package/out/test/utils/TestUtilsWalletStorage.d.ts.map +1 -1
- package/out/test/utils/TestUtilsWalletStorage.js +15 -9
- package/out/test/utils/TestUtilsWalletStorage.js.map +1 -1
- package/out/test/wallet/action/internalizeAction.test.js +1 -1
- package/out/test/wallet/action/internalizeAction.test.js.map +1 -1
- package/out/test/wallet/list/listActions2.test.js +1 -1
- package/out/test/wallet/list/listActions2.test.js.map +1 -1
- package/out/test/wallet/sync/Wallet.sync.test.js +1 -1
- package/out/test/wallet/sync/Wallet.sync.test.js.map +1 -1
- package/out/tsconfig.all.tsbuildinfo +1 -1
- package/package.json +3 -4
- package/src/CWIStyleWalletManager.ts +1724 -0
- package/src/SimpleWalletManager.ts +526 -0
- package/src/Wallet.ts +70 -7
- package/src/WalletAuthenticationManager.ts +150 -0
- package/src/WalletPermissionsManager.ts +2424 -0
- package/src/WalletSettingsManager.ts +243 -0
- package/src/__tests/CWIStyleWalletManager.test.ts +604 -0
- package/src/__tests/WalletPermissionsManager.callbacks.test.ts +323 -0
- package/src/__tests/WalletPermissionsManager.checks.test.ts +839 -0
- package/src/__tests/WalletPermissionsManager.encryption.test.ts +370 -0
- package/src/__tests/WalletPermissionsManager.fixtures.ts +284 -0
- package/src/__tests/WalletPermissionsManager.flows.test.ts +457 -0
- package/src/__tests/WalletPermissionsManager.initialization.test.ts +300 -0
- package/src/__tests/WalletPermissionsManager.proxying.test.ts +706 -0
- package/src/__tests/WalletPermissionsManager.tokens.test.ts +546 -0
- package/src/index.all.ts +9 -0
- package/src/index.client.ts +9 -0
- package/src/sdk/CertOpsWallet.ts +18 -0
- package/src/sdk/__test/CertificateLifeCycle.test.ts +66 -113
- package/src/sdk/index.ts +1 -1
- package/src/sdk/validationHelpers.ts +12 -11
- package/src/services/__tests/bitrails.test.ts +7 -2
- package/src/services/providers/__tests/WhatsOnChain.test.ts +3 -3
- package/src/signer/methods/proveCertificate.ts +14 -21
- package/src/storage/__test/WalletStorageManager.test.ts +1 -1
- package/src/storage/remoting/StorageClient.ts +4 -4
- package/src/utility/identityUtils.ts +159 -0
- package/src/wab-client/WABClient.ts +94 -0
- package/src/wab-client/__tests/WABClient.man.test.ts +59 -0
- package/src/wab-client/auth-method-interactors/AuthMethodInteractor.ts +47 -0
- package/src/wab-client/auth-method-interactors/PersonaIDInteractor.ts +35 -0
- package/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.ts +72 -0
- package/test/Wallet/action/internalizeAction.a.test.ts +1 -1
- package/test/Wallet/certificate/acquireCertificate.test.ts +89 -30
- package/test/storage/KnexMigrations.test.ts +1 -1
- package/test/storage/update.test.ts +1 -1
- package/test/utils/TestUtilsWalletStorage.ts +24 -13
- package/test/wallet/action/internalizeAction.test.ts +1 -1
- package/test/wallet/list/listActions2.test.ts +1 -1
- package/test/wallet/sync/Wallet.sync.test.ts +1 -1
- package/out/src/sdk/CertOps.d.ts +0 -66
- package/out/src/sdk/CertOps.d.ts.map +0 -1
- package/out/src/sdk/CertOps.js +0 -190
- package/out/src/sdk/CertOps.js.map +0 -1
- package/src/sdk/CertOps.ts +0 -274
|
@@ -0,0 +1,261 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* A permissions manager testing mock/stub file for:
|
|
4
|
+
* 1) The `@bsv/sdk` library: Transaction, LockingScript, PushDrop, Utils, Random, etc.
|
|
5
|
+
* 2) A BRC-100 `WalletInterface` (the underlying wallet).
|
|
6
|
+
*
|
|
7
|
+
* This file bypasses real validation/logic in `@bsv/sdk`, returning placeholders and
|
|
8
|
+
* stubs to prevent test-time errors such as "Invalid Atomic BEEF prefix."
|
|
9
|
+
*/
|
|
10
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
11
|
+
exports.MockedBSV_SDK = exports.MockRandom = exports.MockUtils = exports.MockPushDrop = exports.MockLockingScript = exports.MockTransaction = void 0;
|
|
12
|
+
exports.mockUnderlyingWallet = mockUnderlyingWallet;
|
|
13
|
+
/* ---------------------------------------------------------------------------
|
|
14
|
+
* 1) Partial Mocks for @bsv/sdk
|
|
15
|
+
* -------------------------------------------------------------------------*/
|
|
16
|
+
/**
|
|
17
|
+
* A minimal mock for `Transaction` that won't throw "Invalid Atomic BEEF prefix."
|
|
18
|
+
* We override the static methods so they do not do real parsing/validation.
|
|
19
|
+
*/
|
|
20
|
+
class MockTransaction {
|
|
21
|
+
constructor() {
|
|
22
|
+
this.inputs = [{}];
|
|
23
|
+
this.outputs = [];
|
|
24
|
+
this.fee = 0;
|
|
25
|
+
}
|
|
26
|
+
static fromAtomicBEEF() {
|
|
27
|
+
// Mocked below
|
|
28
|
+
}
|
|
29
|
+
static fromBEEF(beef) {
|
|
30
|
+
// Same approach as above
|
|
31
|
+
return new MockTransaction();
|
|
32
|
+
}
|
|
33
|
+
getFee() {
|
|
34
|
+
return this.fee;
|
|
35
|
+
}
|
|
36
|
+
}
|
|
37
|
+
exports.MockTransaction = MockTransaction;
|
|
38
|
+
;
|
|
39
|
+
MockTransaction.fromAtomicBEEF = jest.fn(() => {
|
|
40
|
+
// We skip real validation, returning a MockTransaction with minimal structure.
|
|
41
|
+
const tx = new MockTransaction();
|
|
42
|
+
return tx;
|
|
43
|
+
});
|
|
44
|
+
/**
|
|
45
|
+
* Mocks for `LockingScript`. If your code calls e.g. LockingScript.fromHex, we can just
|
|
46
|
+
* store the hex and do nothing else.
|
|
47
|
+
*/
|
|
48
|
+
class MockLockingScript {
|
|
49
|
+
constructor(hex) {
|
|
50
|
+
this.hex = hex;
|
|
51
|
+
}
|
|
52
|
+
toHex() {
|
|
53
|
+
return this.hex;
|
|
54
|
+
}
|
|
55
|
+
static fromHex(hex) {
|
|
56
|
+
return new MockLockingScript(hex);
|
|
57
|
+
}
|
|
58
|
+
}
|
|
59
|
+
exports.MockLockingScript = MockLockingScript;
|
|
60
|
+
/**
|
|
61
|
+
* We stub out all methods: `decode()`, `lock()`, `unlock()`.
|
|
62
|
+
*/
|
|
63
|
+
class MockPushDrop {
|
|
64
|
+
// Typically we might store the wallet reference, but we can skip for now.
|
|
65
|
+
constructor() {
|
|
66
|
+
//
|
|
67
|
+
}
|
|
68
|
+
// Decodes a LockingScript into some {fields: number[][], protocol...} or undefined
|
|
69
|
+
static decode(script) {
|
|
70
|
+
// If you rely on a real format, parse or store a pattern.
|
|
71
|
+
// For now, returning a minimal stub: empty fields
|
|
72
|
+
if (!script || !script.hex)
|
|
73
|
+
return undefined;
|
|
74
|
+
if (script.hex.includes('some script')) {
|
|
75
|
+
// When needed, return some fields
|
|
76
|
+
return {
|
|
77
|
+
fields: [
|
|
78
|
+
[],
|
|
79
|
+
[],
|
|
80
|
+
[],
|
|
81
|
+
[],
|
|
82
|
+
[],
|
|
83
|
+
[],
|
|
84
|
+
[] // 7 fields should always be enough...
|
|
85
|
+
]
|
|
86
|
+
};
|
|
87
|
+
}
|
|
88
|
+
// Just pretend we always decode to a single empty field array
|
|
89
|
+
return { fields: [] };
|
|
90
|
+
}
|
|
91
|
+
lock(fields, protocolID, keyID, counterparty, singleSignature, anyoneCanPay) {
|
|
92
|
+
return new MockLockingScript('deadbeef');
|
|
93
|
+
}
|
|
94
|
+
unlock(protocolID, keyID, counterparty, sighashType, enforceReplayProtection, sigSize, lockingScript) {
|
|
95
|
+
// In real usage, it would handle signature logic. We'll return a minimal stub.
|
|
96
|
+
return {
|
|
97
|
+
sign: async (tx, vin) => {
|
|
98
|
+
// produce a minimal unlocking script
|
|
99
|
+
return new MockLockingScript('mockUnlockingScript');
|
|
100
|
+
}
|
|
101
|
+
};
|
|
102
|
+
}
|
|
103
|
+
}
|
|
104
|
+
exports.MockPushDrop = MockPushDrop;
|
|
105
|
+
/**
|
|
106
|
+
* Mocks for Utils, e.g. toHex, toUTF8, fromUTF8, etc.
|
|
107
|
+
* We can provide minimal stubs that won't break your code.
|
|
108
|
+
*/
|
|
109
|
+
exports.MockUtils = {
|
|
110
|
+
toHex: (data) => {
|
|
111
|
+
// Converts an array of numbers to a hexadecimal string.
|
|
112
|
+
return data.map(num => num.toString(16).padStart(2, '0')).join('');
|
|
113
|
+
},
|
|
114
|
+
toArray: (str, encoding = 'utf8') => {
|
|
115
|
+
// Converts a string to an array of numbers based on the encoding.
|
|
116
|
+
if (encoding === 'hex') {
|
|
117
|
+
const arr = [];
|
|
118
|
+
for (let i = 0; i < str.length; i += 2) {
|
|
119
|
+
arr.push(parseInt(str.substr(i, 2), 16));
|
|
120
|
+
}
|
|
121
|
+
return arr;
|
|
122
|
+
}
|
|
123
|
+
else if (encoding === 'base64') {
|
|
124
|
+
const binaryStr = atob(str);
|
|
125
|
+
return Array.from(binaryStr, char => char.charCodeAt(0));
|
|
126
|
+
}
|
|
127
|
+
else if (encoding === 'utf8') {
|
|
128
|
+
return Array.from(str, char => char.charCodeAt(0));
|
|
129
|
+
}
|
|
130
|
+
else {
|
|
131
|
+
throw new Error('Unsupported encoding: ' + encoding);
|
|
132
|
+
}
|
|
133
|
+
},
|
|
134
|
+
toUTF8: (arr) => {
|
|
135
|
+
// Converts an array of numbers to a UTF-8 string.
|
|
136
|
+
return String.fromCharCode(...arr);
|
|
137
|
+
}
|
|
138
|
+
};
|
|
139
|
+
/**
|
|
140
|
+
* Mocks for Random
|
|
141
|
+
*/
|
|
142
|
+
const MockRandom = (size) => {
|
|
143
|
+
return [...require('crypto').randomBytes(size)];
|
|
144
|
+
};
|
|
145
|
+
exports.MockRandom = MockRandom;
|
|
146
|
+
/**
|
|
147
|
+
* Overriding the real classes with our mocks.
|
|
148
|
+
*/
|
|
149
|
+
exports.MockedBSV_SDK = {
|
|
150
|
+
Transaction: MockTransaction,
|
|
151
|
+
LockingScript: MockLockingScript,
|
|
152
|
+
PushDrop: MockPushDrop,
|
|
153
|
+
Utils: exports.MockUtils,
|
|
154
|
+
Random: exports.MockRandom,
|
|
155
|
+
Certificate: null
|
|
156
|
+
};
|
|
157
|
+
/* ---------------------------------------------------------------------------
|
|
158
|
+
* 2) A full mock for the BRC-100 WalletInterface
|
|
159
|
+
* -------------------------------------------------------------------------*/
|
|
160
|
+
/**
|
|
161
|
+
* A helper function returning a Jest-mocked `WalletInterface`.
|
|
162
|
+
* This ensures all required methods exist and return plausible values.
|
|
163
|
+
*
|
|
164
|
+
* - By default, `createAction` returns a signableTransaction with empty arrays,
|
|
165
|
+
* so that the manager can call `Transaction.fromAtomicBEEF([])` without throwing.
|
|
166
|
+
* - You can override or chain .mockResolvedValueOnce(...) inside individual tests
|
|
167
|
+
* if you want more specific behavior in certain test steps.
|
|
168
|
+
*/
|
|
169
|
+
function mockUnderlyingWallet() {
|
|
170
|
+
return {
|
|
171
|
+
getPublicKey: jest.fn().mockResolvedValue({ publicKey: '029999...' }),
|
|
172
|
+
revealCounterpartyKeyLinkage: jest.fn().mockResolvedValue({
|
|
173
|
+
encryptedLinkage: [1, 2, 3],
|
|
174
|
+
encryptedLinkageProof: [4, 5, 6],
|
|
175
|
+
prover: '02abcdef...',
|
|
176
|
+
verifier: '02cccccc...',
|
|
177
|
+
counterparty: '02bbbbbb...',
|
|
178
|
+
revelationTime: new Date().toISOString()
|
|
179
|
+
}),
|
|
180
|
+
revealSpecificKeyLinkage: jest.fn().mockResolvedValue({
|
|
181
|
+
encryptedLinkage: [1, 2, 3],
|
|
182
|
+
encryptedLinkageProof: [4, 5, 6],
|
|
183
|
+
prover: '02abcdef...',
|
|
184
|
+
verifier: '02cccccc...',
|
|
185
|
+
counterparty: '02bbbbbb...',
|
|
186
|
+
protocolID: [1, 'test-protocol'],
|
|
187
|
+
keyID: 'testKey',
|
|
188
|
+
proofType: 1
|
|
189
|
+
}),
|
|
190
|
+
encrypt: jest.fn().mockResolvedValue({ ciphertext: [42, 42, 42, 42, 42, 42, 42] }),
|
|
191
|
+
decrypt: jest.fn().mockResolvedValue({ plaintext: [42, 42, 42, 42, 42] }),
|
|
192
|
+
createHmac: jest.fn().mockResolvedValue({ hmac: [0xaa] }),
|
|
193
|
+
verifyHmac: jest.fn().mockResolvedValue({ valid: true }),
|
|
194
|
+
createSignature: jest.fn().mockResolvedValue({ signature: [0x30, 0x44] }),
|
|
195
|
+
verifySignature: jest.fn().mockResolvedValue({ valid: true }),
|
|
196
|
+
createAction: jest.fn(async (x) => {
|
|
197
|
+
if (x.options && x.options.signAndProcess === true) {
|
|
198
|
+
return {
|
|
199
|
+
tx: []
|
|
200
|
+
};
|
|
201
|
+
}
|
|
202
|
+
return {
|
|
203
|
+
signableTransaction: {
|
|
204
|
+
tx: [],
|
|
205
|
+
reference: 'mockReference'
|
|
206
|
+
}
|
|
207
|
+
};
|
|
208
|
+
}),
|
|
209
|
+
signAction: jest.fn().mockResolvedValue({
|
|
210
|
+
txid: 'fake-txid',
|
|
211
|
+
tx: []
|
|
212
|
+
}),
|
|
213
|
+
abortAction: jest.fn().mockResolvedValue({ aborted: true }),
|
|
214
|
+
listActions: jest.fn().mockResolvedValue({
|
|
215
|
+
totalActions: 0,
|
|
216
|
+
actions: []
|
|
217
|
+
}),
|
|
218
|
+
internalizeAction: jest.fn().mockResolvedValue({ accepted: true }),
|
|
219
|
+
listOutputs: jest.fn().mockResolvedValue({
|
|
220
|
+
totalOutputs: 0,
|
|
221
|
+
outputs: []
|
|
222
|
+
}),
|
|
223
|
+
relinquishOutput: jest.fn().mockResolvedValue({ relinquished: true }),
|
|
224
|
+
acquireCertificate: jest.fn().mockResolvedValue({
|
|
225
|
+
type: 'some-cert-type',
|
|
226
|
+
subject: '02aaaaaaaaaa...',
|
|
227
|
+
serialNumber: 'serial123',
|
|
228
|
+
certifier: '02ccccccccccc...',
|
|
229
|
+
revocationOutpoint: 'some.txid.1',
|
|
230
|
+
signature: 'deadbeef',
|
|
231
|
+
fields: { name: 'Alice', dob: '1990-01-01' }
|
|
232
|
+
}),
|
|
233
|
+
listCertificates: jest.fn().mockResolvedValue({
|
|
234
|
+
totalCertificates: 0,
|
|
235
|
+
certificates: []
|
|
236
|
+
}),
|
|
237
|
+
proveCertificate: jest.fn().mockResolvedValue({
|
|
238
|
+
keyringForVerifier: {},
|
|
239
|
+
certificate: undefined,
|
|
240
|
+
verifier: undefined
|
|
241
|
+
}),
|
|
242
|
+
relinquishCertificate: jest.fn().mockResolvedValue({ relinquished: true }),
|
|
243
|
+
discoverByIdentityKey: jest.fn().mockResolvedValue({
|
|
244
|
+
totalCertificates: 0,
|
|
245
|
+
certificates: []
|
|
246
|
+
}),
|
|
247
|
+
discoverByAttributes: jest.fn().mockResolvedValue({
|
|
248
|
+
totalCertificates: 0,
|
|
249
|
+
certificates: []
|
|
250
|
+
}),
|
|
251
|
+
isAuthenticated: jest.fn().mockResolvedValue({ authenticated: true }),
|
|
252
|
+
waitForAuthentication: jest.fn().mockResolvedValue({ authenticated: true }),
|
|
253
|
+
getHeight: jest.fn().mockResolvedValue({ height: 777777 }),
|
|
254
|
+
getHeaderForHeight: jest.fn().mockResolvedValue({
|
|
255
|
+
header: '000000000000abc...'
|
|
256
|
+
}),
|
|
257
|
+
getNetwork: jest.fn().mockResolvedValue({ network: 'testnet' }),
|
|
258
|
+
getVersion: jest.fn().mockResolvedValue({ version: 'vendor-1.0.0' })
|
|
259
|
+
};
|
|
260
|
+
}
|
|
261
|
+
//# sourceMappingURL=WalletPermissionsManager.fixtures.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"WalletPermissionsManager.fixtures.js","sourceRoot":"","sources":["../../../src/__tests/WalletPermissionsManager.fixtures.ts"],"names":[],"mappings":";AAAA;;;;;;;GAOG;;;AAuLH,oDA6FC;AAlRD;;8EAE8E;AAE9E;;;GAGG;AACH,MAAa,eAAe;IAK1B;QAJO,WAAM,GAAU,CAAC,EAAE,CAAC,CAAA;QACpB,YAAO,GAAU,EAAE,CAAA;QACnB,QAAG,GAAW,CAAC,CAAA;IAEP,CAAC;IAChB,MAAM,CAAC,cAAc;QACnB,eAAe;IACjB,CAAC;IAED,MAAM,CAAC,QAAQ,CAAC,IAAc;QAC5B,yBAAyB;QACzB,OAAO,IAAI,eAAe,EAAE,CAAA;IAC9B,CAAC;IAED,MAAM;QACJ,OAAO,IAAI,CAAC,GAAG,CAAA;IACjB,CAAC;CACF;AAlBD,0CAkBC;AAED,CAAC;AAAC,eAAuB,CAAC,cAAc,GAAG,IAAI,CAAC,EAAE,CAAC,GAAG,EAAE;IACtD,+EAA+E;IAC/E,MAAM,EAAE,GAAG,IAAI,eAAe,EAAE,CAAA;IAChC,OAAO,EAAE,CAAA;AACX,CAAC,CAAC,CAAA;AAEF;;;GAGG;AACH,MAAa,iBAAiB;IAE5B,YAAY,GAAW;QACrB,IAAI,CAAC,GAAG,GAAG,GAAG,CAAA;IAChB,CAAC;IACM,KAAK;QACV,OAAO,IAAI,CAAC,GAAG,CAAA;IACjB,CAAC;IACD,MAAM,CAAC,OAAO,CAAC,GAAW;QACxB,OAAO,IAAI,iBAAiB,CAAC,GAAG,CAAC,CAAA;IACnC,CAAC;CACF;AAXD,8CAWC;AAED;;GAEG;AACH,MAAa,YAAY;IACvB,0EAA0E;IAC1E;QACE,EAAE;IACJ,CAAC;IAED,mFAAmF;IACnF,MAAM,CAAC,MAAM,CAAC,MAAyB;QACrC,0DAA0D;QAC1D,kDAAkD;QAClD,IAAI,CAAC,MAAM,IAAI,CAAC,MAAM,CAAC,GAAG;YAAE,OAAO,SAAS,CAAA;QAC5C,IAAI,MAAM,CAAC,GAAG,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE,CAAC;YACvC,kCAAkC;YAClC,OAAO;gBACL,MAAM,EAAE;oBACN,EAAE;oBACF,EAAE;oBACF,EAAE;oBACF,EAAE;oBACF,EAAE;oBACF,EAAE;oBACF,EAAE,CAAC,sCAAsC;iBAC1C;aACF,CAAA;QACH,CAAC;QACD,8DAA8D;QAC9D,OAAO,EAAE,MAAM,EAAE,EAAE,EAAE,CAAA;IACvB,CAAC;IAED,IAAI,CACF,MAAkB,EAClB,UAA4B,EAC5B,KAAa,EACb,YAAoB,EACpB,eAAwB,EACxB,YAAqB;QAErB,OAAO,IAAI,iBAAiB,CAAC,UAAU,CAAC,CAAA;IAC1C,CAAC;IAED,MAAM,CACJ,UAA4B,EAC5B,KAAa,EACb,YAAoB,EACpB,WAAmB,EACnB,uBAAgC,EAChC,OAAe,EACf,aAAgC;QAIhC,+EAA+E;QAC/E,OAAO;YACL,IAAI,EAAE,KAAK,EAAE,EAAmB,EAAE,GAAW,EAAE,EAAE;gBAC/C,qCAAqC;gBACrC,OAAO,IAAI,iBAAiB,CAAC,qBAAqB,CAAC,CAAA;YACrD,CAAC;SACF,CAAA;IACH,CAAC;CACF;AA3DD,oCA2DC;AAED;;;GAGG;AACU,QAAA,SAAS,GAAG;IACvB,KAAK,EAAE,CAAC,IAAc,EAAE,EAAE;QACxB,wDAAwD;QACxD,OAAO,IAAI,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,CAAC,CAAA;IACpE,CAAC;IAED,OAAO,EAAE,CAAC,GAAW,EAAE,QAAQ,GAAG,MAAM,EAAE,EAAE;QAC1C,kEAAkE;QAClE,IAAI,QAAQ,KAAK,KAAK,EAAE,CAAC;YACvB,MAAM,GAAG,GAAa,EAAE,CAAA;YACxB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,GAAG,CAAC,MAAM,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvC,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAA;YAC1C,CAAC;YACD,OAAO,GAAG,CAAA;QACZ,CAAC;aAAM,IAAI,QAAQ,KAAK,QAAQ,EAAE,CAAC;YACjC,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,CAAC,CAAA;YAC3B,OAAO,KAAK,CAAC,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAA;QAC1D,CAAC;aAAM,IAAI,QAAQ,KAAK,MAAM,EAAE,CAAC;YAC/B,OAAO,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAA;QACpD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,wBAAwB,GAAG,QAAQ,CAAC,CAAA;QACtD,CAAC;IACH,CAAC;IAED,MAAM,EAAE,CAAC,GAAa,EAAE,EAAE;QACxB,kDAAkD;QAClD,OAAO,MAAM,CAAC,YAAY,CAAC,GAAG,GAAG,CAAC,CAAA;IACpC,CAAC;CACF,CAAA;AAED;;GAEG;AACI,MAAM,UAAU,GAAG,CAAC,IAAY,EAAY,EAAE;IACnD,OAAO,CAAC,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAC,WAAW,CAAC,IAAI,CAAC,CAAC,CAAA;AACjD,CAAC,CAAA;AAFY,QAAA,UAAU,cAEtB;AAED;;GAEG;AACU,QAAA,aAAa,GAAG;IAC3B,WAAW,EAAE,eAAe;IAC5B,aAAa,EAAE,iBAAiB;IAChC,QAAQ,EAAE,YAAY;IACtB,KAAK,EAAE,iBAAS;IAChB,MAAM,EAAE,kBAAU;IAClB,WAAW,EAAE,IAAI;CAClB,CAAA;AAED;;8EAE8E;AAE9E;;;;;;;;GAQG;AACH,SAAgB,oBAAoB;IAClC,OAAO;QACL,YAAY,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,SAAS,EAAE,WAAW,EAAE,CAAC;QACrE,4BAA4B,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YACxD,gBAAgB,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;YAC3B,qBAAqB,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;YAChC,MAAM,EAAE,aAAa;YACrB,QAAQ,EAAE,aAAa;YACvB,YAAY,EAAE,aAAa;YAC3B,cAAc,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;SACzC,CAAC;QACF,wBAAwB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YACpD,gBAAgB,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;YAC3B,qBAAqB,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;YAChC,MAAM,EAAE,aAAa;YACrB,QAAQ,EAAE,aAAa;YACvB,YAAY,EAAE,aAAa;YAC3B,UAAU,EAAE,CAAC,CAAC,EAAE,eAAe,CAAC;YAChC,KAAK,EAAE,SAAS;YAChB,SAAS,EAAE,CAAC;SACb,CAAC;QACF,OAAO,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,UAAU,EAAE,CAAC,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,EAAE,CAAC;QAClF,OAAO,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,SAAS,EAAE,CAAC,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,EAAE,CAAC;QACzE,UAAU,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,IAAI,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC;QACzD,UAAU,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC;QACxD,eAAe,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,SAAS,EAAE,CAAC,IAAI,EAAE,IAAI,CAAC,EAAE,CAAC;QACzE,eAAe,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC;QAE7D,YAAY,EAAE,IAAI,CAAC,EAAE,CAAC,KAAK,EAAC,CAAC,EAAC,EAAE;YAC9B,IAAI,CAAC,CAAC,OAAO,IAAI,CAAC,CAAC,OAAO,CAAC,cAAc,KAAK,IAAI,EAAE,CAAC;gBACnD,OAAO;oBACL,EAAE,EAAE,EAAE;iBACP,CAAA;YACH,CAAC;YACD,OAAO;gBACL,mBAAmB,EAAE;oBACnB,EAAE,EAAE,EAAE;oBACN,SAAS,EAAE,eAAe;iBAC3B;aACF,CAAA;QACH,CAAC,CAAC;QACF,UAAU,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YACtC,IAAI,EAAE,WAAW;YACjB,EAAE,EAAE,EAAE;SACP,CAAC;QACF,WAAW,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;QAC3D,WAAW,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YACvC,YAAY,EAAE,CAAC;YACf,OAAO,EAAE,EAAE;SACZ,CAAC;QACF,iBAAiB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,QAAQ,EAAE,IAAI,EAAE,CAAC;QAClE,WAAW,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YACvC,YAAY,EAAE,CAAC;YACf,OAAO,EAAE,EAAE;SACZ,CAAC;QACF,gBAAgB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,YAAY,EAAE,IAAI,EAAE,CAAC;QAErE,kBAAkB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YAC9C,IAAI,EAAE,gBAAgB;YACtB,OAAO,EAAE,iBAAiB;YAC1B,YAAY,EAAE,WAAW;YACzB,SAAS,EAAE,kBAAkB;YAC7B,kBAAkB,EAAE,aAAa;YACjC,SAAS,EAAE,UAAU;YACrB,MAAM,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE,GAAG,EAAE,YAAY,EAAE;SAC7C,CAAC;QACF,gBAAgB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YAC5C,iBAAiB,EAAE,CAAC;YACpB,YAAY,EAAE,EAAE;SACjB,CAAC;QACF,gBAAgB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YAC5C,kBAAkB,EAAE,EAAE;YACtB,WAAW,EAAE,SAAS;YACtB,QAAQ,EAAE,SAAS;SACpB,CAAC;QACF,qBAAqB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,YAAY,EAAE,IAAI,EAAE,CAAC;QAC1E,qBAAqB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YACjD,iBAAiB,EAAE,CAAC;YACpB,YAAY,EAAE,EAAE;SACjB,CAAC;QACF,oBAAoB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YAChD,iBAAiB,EAAE,CAAC;YACpB,YAAY,EAAE,EAAE;SACjB,CAAC;QACF,eAAe,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,aAAa,EAAE,IAAI,EAAE,CAAC;QACrE,qBAAqB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,aAAa,EAAE,IAAI,EAAE,CAAC;QAC3E,SAAS,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,MAAM,EAAE,MAAM,EAAE,CAAC;QAC1D,kBAAkB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YAC9C,MAAM,EAAE,oBAAoB;SAC7B,CAAC;QACF,UAAU,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,OAAO,EAAE,SAAS,EAAE,CAAC;QAC/D,UAAU,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,OAAO,EAAE,cAAc,EAAE,CAAC;KACrE,CAAA;AACH,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"WalletPermissionsManager.flows.test.d.ts","sourceRoot":"","sources":["../../../src/__tests/WalletPermissionsManager.flows.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,377 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const WalletPermissionsManager_fixtures_1 = require("./WalletPermissionsManager.fixtures");
|
|
4
|
+
const WalletPermissionsManager_1 = require("../WalletPermissionsManager");
|
|
5
|
+
const globals_1 = require("@jest/globals");
|
|
6
|
+
// We mock the underlying @bsv/sdk references with our test fixtures:
|
|
7
|
+
globals_1.jest.mock('@bsv/sdk', () => WalletPermissionsManager_fixtures_1.MockedBSV_SDK);
|
|
8
|
+
/**
|
|
9
|
+
* A lightweight helper that forces the manager to never find any on-chain token.
|
|
10
|
+
* We do this so we can reliably test the request flow (i.e., that it truly initiates
|
|
11
|
+
* a new permission request if no token is found).
|
|
12
|
+
*/
|
|
13
|
+
function mockNoTokensFound(manager) {
|
|
14
|
+
globals_1.jest.spyOn(manager, 'findProtocolToken').mockResolvedValue(undefined);
|
|
15
|
+
globals_1.jest.spyOn(manager, 'findBasketToken').mockResolvedValue(undefined);
|
|
16
|
+
globals_1.jest.spyOn(manager, 'findCertificateToken').mockResolvedValue(undefined);
|
|
17
|
+
globals_1.jest.spyOn(manager, 'findSpendingToken').mockResolvedValue(undefined);
|
|
18
|
+
}
|
|
19
|
+
describe('WalletPermissionsManager - Permission Request Flow & Active Requests', () => {
|
|
20
|
+
let underlying;
|
|
21
|
+
let manager;
|
|
22
|
+
beforeEach(() => {
|
|
23
|
+
underlying = (0, WalletPermissionsManager_fixtures_1.mockUnderlyingWallet)();
|
|
24
|
+
manager = new WalletPermissionsManager_1.WalletPermissionsManager(underlying, 'admin.test.com');
|
|
25
|
+
});
|
|
26
|
+
afterEach(() => {
|
|
27
|
+
globals_1.jest.clearAllMocks();
|
|
28
|
+
});
|
|
29
|
+
/**
|
|
30
|
+
* UNIT TESTS
|
|
31
|
+
*/
|
|
32
|
+
describe('Unit Tests: requestPermissionFlow & activeRequests map', () => {
|
|
33
|
+
it('should coalesce parallel requests for the same resource into a single user prompt', async () => {
|
|
34
|
+
// We want to test the underlying private method "requestPermissionFlow" indirectly
|
|
35
|
+
// or we can test it via a public method that calls it. We'll do so via ensureProtocolPermission.
|
|
36
|
+
// Force no token found => triggers a request flow
|
|
37
|
+
mockNoTokensFound(manager);
|
|
38
|
+
// Spy on the manager's "onProtocolPermissionRequested" callbacks
|
|
39
|
+
const requestCallback = globals_1.jest.fn(() => { });
|
|
40
|
+
manager.bindCallback('onProtocolPermissionRequested', requestCallback);
|
|
41
|
+
// Make two parallel calls for the same resource
|
|
42
|
+
const callA = manager.ensureProtocolPermission({
|
|
43
|
+
originator: 'example.com',
|
|
44
|
+
privileged: false,
|
|
45
|
+
protocolID: [1, 'someproto'],
|
|
46
|
+
counterparty: 'self',
|
|
47
|
+
reason: 'UnitTest - same resource A',
|
|
48
|
+
seekPermission: true,
|
|
49
|
+
usageType: 'signing'
|
|
50
|
+
});
|
|
51
|
+
const callB = manager.ensureProtocolPermission({
|
|
52
|
+
originator: 'example.com',
|
|
53
|
+
privileged: false,
|
|
54
|
+
protocolID: [1, 'someproto'],
|
|
55
|
+
counterparty: 'self',
|
|
56
|
+
reason: 'UnitTest - same resource B',
|
|
57
|
+
seekPermission: true,
|
|
58
|
+
usageType: 'signing'
|
|
59
|
+
});
|
|
60
|
+
// Wait a short moment for the async request flow to trigger
|
|
61
|
+
await new Promise(res => setTimeout(res, 5));
|
|
62
|
+
// We expect only one "onProtocolPermissionRequested" event for both calls
|
|
63
|
+
expect(requestCallback).toHaveBeenCalledTimes(1);
|
|
64
|
+
// Now let's deny the request:
|
|
65
|
+
// Grab the requestID that the manager gave us from the callback param
|
|
66
|
+
const callbackArg = requestCallback.mock.calls[0][0];
|
|
67
|
+
const requestID = callbackArg.requestID;
|
|
68
|
+
expect(typeof requestID).toBe('string'); // manager-generated
|
|
69
|
+
// Deny the request
|
|
70
|
+
await manager.denyPermission(requestID);
|
|
71
|
+
// Both calls should reject
|
|
72
|
+
await expect(callA).rejects.toThrow(/Permission denied/);
|
|
73
|
+
await expect(callB).rejects.toThrow(/Permission denied/);
|
|
74
|
+
// Confirm activeRequests map is empty after denial
|
|
75
|
+
const activeRequests = manager.activeRequests;
|
|
76
|
+
expect(activeRequests.size).toBe(0);
|
|
77
|
+
});
|
|
78
|
+
it('should generate two distinct user prompts for two different permission requests', async () => {
|
|
79
|
+
// Force no tokens
|
|
80
|
+
mockNoTokensFound(manager);
|
|
81
|
+
// Spy on basket & protocol request callbacks
|
|
82
|
+
const protocolRequestCb = globals_1.jest.fn(() => { });
|
|
83
|
+
const basketRequestCb = globals_1.jest.fn(() => { });
|
|
84
|
+
manager.bindCallback('onProtocolPermissionRequested', protocolRequestCb);
|
|
85
|
+
manager.bindCallback('onBasketAccessRequested', basketRequestCb);
|
|
86
|
+
// Make one call for protocol usage
|
|
87
|
+
const pCall = manager.ensureProtocolPermission({
|
|
88
|
+
originator: 'example.com',
|
|
89
|
+
privileged: false,
|
|
90
|
+
protocolID: [1, 'proto-A'],
|
|
91
|
+
counterparty: 'self',
|
|
92
|
+
reason: 'Different request A',
|
|
93
|
+
seekPermission: true,
|
|
94
|
+
usageType: 'signing'
|
|
95
|
+
});
|
|
96
|
+
// Make a second call for basket usage
|
|
97
|
+
const bCall = manager.ensureBasketAccess({
|
|
98
|
+
originator: 'example.com',
|
|
99
|
+
basket: 'some-basket',
|
|
100
|
+
reason: 'Different request B',
|
|
101
|
+
seekPermission: true,
|
|
102
|
+
usageType: 'insertion'
|
|
103
|
+
});
|
|
104
|
+
// Wait a moment for them to trigger
|
|
105
|
+
await new Promise(res => setTimeout(res, 5));
|
|
106
|
+
// We expect one protocol request AND one basket request
|
|
107
|
+
expect(protocolRequestCb).toHaveBeenCalledTimes(1);
|
|
108
|
+
expect(basketRequestCb).toHaveBeenCalledTimes(1);
|
|
109
|
+
// Deny protocol request
|
|
110
|
+
const pReqID = protocolRequestCb.mock.calls[0][0].requestID;
|
|
111
|
+
await manager.denyPermission(pReqID);
|
|
112
|
+
// Deny basket request
|
|
113
|
+
const bReqID = basketRequestCb.mock.calls[0][0].requestID;
|
|
114
|
+
await manager.denyPermission(bReqID);
|
|
115
|
+
// Both calls should have rejected
|
|
116
|
+
await expect(pCall).rejects.toThrow(/Permission denied/);
|
|
117
|
+
await expect(bCall).rejects.toThrow(/Permission denied/);
|
|
118
|
+
// activeRequests is empty
|
|
119
|
+
const activeRequests = manager.activeRequests;
|
|
120
|
+
expect(activeRequests.size).toBe(0);
|
|
121
|
+
});
|
|
122
|
+
it('should resolve all parallel requests when permission is granted, referencing the same requestID', async () => {
|
|
123
|
+
// No tokens => triggers request flow
|
|
124
|
+
mockNoTokensFound(manager);
|
|
125
|
+
const requestCb = globals_1.jest.fn(() => { });
|
|
126
|
+
manager.bindCallback('onProtocolPermissionRequested', requestCb);
|
|
127
|
+
// Parallel calls
|
|
128
|
+
const promiseA = manager.ensureProtocolPermission({
|
|
129
|
+
originator: 'example.com',
|
|
130
|
+
privileged: false,
|
|
131
|
+
protocolID: [1, 'proto-X'],
|
|
132
|
+
counterparty: 'anyone',
|
|
133
|
+
reason: 'Test parallel grant A',
|
|
134
|
+
seekPermission: true,
|
|
135
|
+
usageType: 'encrypting'
|
|
136
|
+
});
|
|
137
|
+
const promiseB = manager.ensureProtocolPermission({
|
|
138
|
+
originator: 'example.com',
|
|
139
|
+
privileged: false,
|
|
140
|
+
protocolID: [1, 'proto-X'],
|
|
141
|
+
counterparty: 'anyone',
|
|
142
|
+
reason: 'Test parallel grant B',
|
|
143
|
+
seekPermission: true,
|
|
144
|
+
usageType: 'encrypting'
|
|
145
|
+
});
|
|
146
|
+
// Let the request event fire
|
|
147
|
+
await new Promise(res => setTimeout(res, 5));
|
|
148
|
+
expect(requestCb).toHaveBeenCalledTimes(1);
|
|
149
|
+
// Extract the requestID from the callback
|
|
150
|
+
const { requestID } = requestCb.mock.calls[0][0];
|
|
151
|
+
// Now we grant permission for that same requestID
|
|
152
|
+
// Because ephemeral is false by default, the manager will attempt to create on-chain tokens
|
|
153
|
+
// We'll mock the internal createPermissionOnChain so it doesn't blow up
|
|
154
|
+
const createOnChainSpy = globals_1.jest.spyOn(manager, 'createPermissionOnChain').mockResolvedValue(undefined);
|
|
155
|
+
await manager.grantPermission({ requestID });
|
|
156
|
+
// Both calls should resolve with `true` (the manager returns a boolean)
|
|
157
|
+
await expect(promiseA).resolves.toBe(true);
|
|
158
|
+
await expect(promiseB).resolves.toBe(true);
|
|
159
|
+
// activeRequests map is empty
|
|
160
|
+
const activeRequests = manager.activeRequests;
|
|
161
|
+
expect(activeRequests.size).toBe(0);
|
|
162
|
+
// The manager tried to create an on-chain permission token once
|
|
163
|
+
expect(createOnChainSpy).toHaveBeenCalledTimes(1);
|
|
164
|
+
});
|
|
165
|
+
it('should reject only the matching request queue on deny if requestID is specified', async () => {
|
|
166
|
+
// This scenario tests the manager's partial denial logic where we pass { requestID }
|
|
167
|
+
// to only reject the queued requests with that ID, leaving others (with a different requestID)
|
|
168
|
+
// in the queue.
|
|
169
|
+
mockNoTokensFound(manager);
|
|
170
|
+
// We do two separate calls for the same resource but at different times, resulting in separate queues.
|
|
171
|
+
// Actually, the manager normally merges them into one queue if the resource is the same.
|
|
172
|
+
// So let's do two different resources to ensure we get two separate keys.
|
|
173
|
+
const protoCb = globals_1.jest.fn(() => { });
|
|
174
|
+
manager.bindCallback('onProtocolPermissionRequested', protoCb);
|
|
175
|
+
// Resource 1
|
|
176
|
+
const p1Promise = manager.ensureProtocolPermission({
|
|
177
|
+
originator: 'siteA.com',
|
|
178
|
+
privileged: false,
|
|
179
|
+
protocolID: [1, 'proto-siteA'],
|
|
180
|
+
counterparty: 'self',
|
|
181
|
+
usageType: 'encrypting'
|
|
182
|
+
});
|
|
183
|
+
await new Promise(res => setTimeout(res, 5));
|
|
184
|
+
const p1ReqID = protoCb.mock.calls[0][0].requestID;
|
|
185
|
+
// At this point, resource 1 is pending in activeRequests. We'll not resolve it yet.
|
|
186
|
+
// Resource 2
|
|
187
|
+
const p2Promise = manager.ensureProtocolPermission({
|
|
188
|
+
originator: 'siteB.com',
|
|
189
|
+
privileged: false,
|
|
190
|
+
protocolID: [1, 'proto-siteB'],
|
|
191
|
+
counterparty: 'self',
|
|
192
|
+
usageType: 'encrypting'
|
|
193
|
+
});
|
|
194
|
+
await new Promise(res => setTimeout(res, 5));
|
|
195
|
+
// the second call triggers a second onProtocolPermissionRequested callback
|
|
196
|
+
expect(protoCb).toHaveBeenCalledTimes(2);
|
|
197
|
+
const p2ReqID = protoCb.mock.calls[1][0].requestID;
|
|
198
|
+
// Deny the second request only
|
|
199
|
+
await manager.denyPermission(p2ReqID);
|
|
200
|
+
await expect(p2Promise).rejects.toThrow(/Permission denied/);
|
|
201
|
+
// But the first request is still waiting
|
|
202
|
+
const activeRequests = manager.activeRequests;
|
|
203
|
+
expect(activeRequests.size).toBe(1);
|
|
204
|
+
// Now let's deny the first request too
|
|
205
|
+
await manager.denyPermission(p1ReqID);
|
|
206
|
+
await expect(p1Promise).rejects.toThrow(/Permission denied/);
|
|
207
|
+
// The queue is empty now
|
|
208
|
+
expect(activeRequests.size).toBe(0);
|
|
209
|
+
});
|
|
210
|
+
});
|
|
211
|
+
/**
|
|
212
|
+
* INTEGRATION TESTS
|
|
213
|
+
*/
|
|
214
|
+
describe('Integration Tests: ephemeral vs. persistent tokens', () => {
|
|
215
|
+
it('should not create a token if ephemeral=true, so subsequent calls re-trigger the request', async () => {
|
|
216
|
+
// We'll do a "protocol" permission scenario:
|
|
217
|
+
mockNoTokensFound(manager);
|
|
218
|
+
// Bind the request callback
|
|
219
|
+
const requestCb = globals_1.jest.fn(() => { });
|
|
220
|
+
manager.bindCallback('onProtocolPermissionRequested', requestCb);
|
|
221
|
+
// Force any on-chain creation attempt to be spied on
|
|
222
|
+
const createTokenSpy = globals_1.jest.spyOn(manager, 'createPermissionOnChain');
|
|
223
|
+
// 1) Call ensureProtocolPermission => triggers request
|
|
224
|
+
const pCall1 = manager.ensureProtocolPermission({
|
|
225
|
+
originator: 'appdomain.com',
|
|
226
|
+
privileged: false,
|
|
227
|
+
protocolID: [1, 'ephemeral-proto'],
|
|
228
|
+
counterparty: 'self',
|
|
229
|
+
reason: 'test ephemeral #1',
|
|
230
|
+
usageType: 'signing'
|
|
231
|
+
});
|
|
232
|
+
// Wait for request callback
|
|
233
|
+
await new Promise(res => setTimeout(res, 5));
|
|
234
|
+
expect(requestCb).toHaveBeenCalledTimes(1);
|
|
235
|
+
const reqID1 = requestCb.mock.calls[0][0].requestID;
|
|
236
|
+
// Grant ephemeral
|
|
237
|
+
await manager.grantPermission({
|
|
238
|
+
requestID: reqID1,
|
|
239
|
+
ephemeral: true
|
|
240
|
+
});
|
|
241
|
+
// pCall1 is resolved
|
|
242
|
+
await expect(pCall1).resolves.toBe(true);
|
|
243
|
+
// Because ephemeral=true, we do NOT create an on-chain token
|
|
244
|
+
expect(createTokenSpy).not.toHaveBeenCalled();
|
|
245
|
+
// 2) Immediately call ensureProtocolPermission again for the same resource
|
|
246
|
+
// Because ephemeral usage didn't store a token, it should re-prompt.
|
|
247
|
+
const pCall2 = manager.ensureProtocolPermission({
|
|
248
|
+
originator: 'appdomain.com',
|
|
249
|
+
privileged: false,
|
|
250
|
+
protocolID: [1, 'ephemeral-proto'],
|
|
251
|
+
counterparty: 'self',
|
|
252
|
+
reason: 'test ephemeral #2',
|
|
253
|
+
usageType: 'signing'
|
|
254
|
+
});
|
|
255
|
+
await new Promise(res => setTimeout(res, 5));
|
|
256
|
+
// We expect a new request callback
|
|
257
|
+
expect(requestCb).toHaveBeenCalledTimes(2);
|
|
258
|
+
// We'll deny the second request
|
|
259
|
+
const reqID2 = requestCb.mock.calls[1][0].requestID;
|
|
260
|
+
await manager.denyPermission(reqID2);
|
|
261
|
+
await expect(pCall2).rejects.toThrow(/Permission denied/);
|
|
262
|
+
});
|
|
263
|
+
it('should create a token if ephemeral=false, so subsequent calls do not re-trigger if unexpired', async () => {
|
|
264
|
+
// We want the manager to truly create a token. We'll confirm that
|
|
265
|
+
// subsequent calls for the same resource skip user prompt.
|
|
266
|
+
mockNoTokensFound(manager);
|
|
267
|
+
// We'll also ensure no token is found "the first time."
|
|
268
|
+
// But on subsequent calls, we can mock that the manager sees the newly created token.
|
|
269
|
+
// Let's spy on "createPermissionOnChain" so we can intercept the new token
|
|
270
|
+
const createTokenSpy = globals_1.jest.spyOn(manager, 'createPermissionOnChain').mockResolvedValue(undefined); // no real on-chain creation
|
|
271
|
+
// Spy on "findProtocolToken" so we can simulate that the second time it's called,
|
|
272
|
+
// there's a valid token. We'll do this by setting the mock to return undefined the first time,
|
|
273
|
+
// and a valid token the second time (or we can just rely on the manager's logic).
|
|
274
|
+
let firstFindCall = true;
|
|
275
|
+
globals_1.jest.spyOn(manager, 'findProtocolToken').mockImplementation(async () => {
|
|
276
|
+
if (firstFindCall) {
|
|
277
|
+
firstFindCall = false;
|
|
278
|
+
return undefined; // first time triggers request
|
|
279
|
+
}
|
|
280
|
+
// second time => pretend we found a valid token
|
|
281
|
+
const mockToken = {
|
|
282
|
+
txid: 'abcdef',
|
|
283
|
+
outputIndex: 0,
|
|
284
|
+
outputScript: '00',
|
|
285
|
+
satoshis: 1,
|
|
286
|
+
originator: 'persistentdomain.com',
|
|
287
|
+
expiry: Math.floor(Date.now() / 1000) + 3600, // unexpired
|
|
288
|
+
privileged: false,
|
|
289
|
+
protocol: 'persist-proto',
|
|
290
|
+
securityLevel: 1,
|
|
291
|
+
counterparty: 'self'
|
|
292
|
+
};
|
|
293
|
+
return mockToken;
|
|
294
|
+
});
|
|
295
|
+
// We'll observe the request callback
|
|
296
|
+
const requestCb = globals_1.jest.fn(() => { });
|
|
297
|
+
manager.bindCallback('onProtocolPermissionRequested', requestCb);
|
|
298
|
+
// 1) First call => no token => triggers request
|
|
299
|
+
const call1 = manager.ensureProtocolPermission({
|
|
300
|
+
originator: 'persistentdomain.com',
|
|
301
|
+
privileged: false,
|
|
302
|
+
protocolID: [1, 'persist-proto'],
|
|
303
|
+
counterparty: 'self',
|
|
304
|
+
reason: 'test persistent #1',
|
|
305
|
+
usageType: 'signing'
|
|
306
|
+
});
|
|
307
|
+
await new Promise(res => setTimeout(res, 5));
|
|
308
|
+
expect(requestCb).toHaveBeenCalledTimes(1);
|
|
309
|
+
// Grant ephemeral=false => triggers createPermissionOnChain
|
|
310
|
+
const reqID = requestCb.mock.calls[0][0].requestID;
|
|
311
|
+
await manager.grantPermission({ requestID: reqID, ephemeral: false });
|
|
312
|
+
await expect(call1).resolves.toBe(true);
|
|
313
|
+
expect(createTokenSpy).toHaveBeenCalledTimes(1);
|
|
314
|
+
// 2) Second call => the manager should find the token we just "created" => no request prompt
|
|
315
|
+
const call2 = manager.ensureProtocolPermission({
|
|
316
|
+
originator: 'persistentdomain.com',
|
|
317
|
+
privileged: false,
|
|
318
|
+
protocolID: [1, 'persist-proto'],
|
|
319
|
+
counterparty: 'self',
|
|
320
|
+
reason: 'test persistent #2',
|
|
321
|
+
usageType: 'signing'
|
|
322
|
+
});
|
|
323
|
+
// We do not expect a new user prompt => requestCb remains at 1
|
|
324
|
+
await new Promise(res => setTimeout(res, 5));
|
|
325
|
+
expect(requestCb).toHaveBeenCalledTimes(1);
|
|
326
|
+
// The second call should resolve immediately, no prompt
|
|
327
|
+
await expect(call2).resolves.toBe(true);
|
|
328
|
+
});
|
|
329
|
+
it('should handle renewal if the found token is expired, passing previousToken in the request', async () => {
|
|
330
|
+
// We'll test the "renewal" flow:
|
|
331
|
+
// If the manager finds a token but it's expired, it sets { renewal: true, previousToken } in the request.
|
|
332
|
+
// We'll mock findProtocolToken to return an expired token
|
|
333
|
+
const expiredToken = {
|
|
334
|
+
txid: 'expiredTxid123',
|
|
335
|
+
outputIndex: 0,
|
|
336
|
+
outputScript: '76a914xxxx...88ac',
|
|
337
|
+
satoshis: 1,
|
|
338
|
+
originator: 'renewme.com',
|
|
339
|
+
expiry: Math.floor(Date.now() / 1000) - 100, // in the past
|
|
340
|
+
privileged: false,
|
|
341
|
+
protocol: 'renew-proto',
|
|
342
|
+
securityLevel: 1,
|
|
343
|
+
counterparty: 'self'
|
|
344
|
+
};
|
|
345
|
+
globals_1.jest.spyOn(manager, 'findProtocolToken').mockResolvedValue(expiredToken);
|
|
346
|
+
// Spy on request callback
|
|
347
|
+
const requestCb = globals_1.jest.fn(() => { });
|
|
348
|
+
manager.bindCallback('onProtocolPermissionRequested', requestCb);
|
|
349
|
+
// We'll also spy on "renewPermissionOnChain" to see if it's called
|
|
350
|
+
const renewSpy = globals_1.jest.spyOn(manager, 'renewPermissionOnChain').mockResolvedValue(undefined);
|
|
351
|
+
// Call ensureProtocolPermission => sees expired token => triggers request with renewal
|
|
352
|
+
const promise = manager.ensureProtocolPermission({
|
|
353
|
+
originator: 'renewme.com',
|
|
354
|
+
privileged: false,
|
|
355
|
+
protocolID: [1, 'renew-proto'],
|
|
356
|
+
counterparty: 'self',
|
|
357
|
+
reason: 'test renewal',
|
|
358
|
+
usageType: 'encrypting'
|
|
359
|
+
});
|
|
360
|
+
// Wait for request callback
|
|
361
|
+
await new Promise(res => setTimeout(res, 10));
|
|
362
|
+
expect(requestCb).toHaveBeenCalledTimes(1);
|
|
363
|
+
// Confirm the callback param includes `renewal=true` and `previousToken=expiredToken`
|
|
364
|
+
const { renewal, previousToken } = requestCb.mock.calls[0][0];
|
|
365
|
+
expect(renewal).toBe(true);
|
|
366
|
+
expect(previousToken.txid).toBe('expiredTxid123');
|
|
367
|
+
// Grant ephemeral=false => manager calls renewPermissionOnChain
|
|
368
|
+
const { requestID } = requestCb.mock.calls[0][0];
|
|
369
|
+
await manager.grantPermission({ requestID, ephemeral: false });
|
|
370
|
+
await expect(promise).resolves.toBe(true);
|
|
371
|
+
expect(renewSpy).toHaveBeenCalledTimes(1);
|
|
372
|
+
// The first arg is the old token, second is request, etc.
|
|
373
|
+
expect(renewSpy).toHaveBeenCalledWith(expiredToken, expect.objectContaining({ originator: 'renewme.com' }), expect.any(Number), undefined);
|
|
374
|
+
});
|
|
375
|
+
});
|
|
376
|
+
});
|
|
377
|
+
//# sourceMappingURL=WalletPermissionsManager.flows.test.js.map
|