@bsv/wallet-toolbox 1.1.62 → 1.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (185) hide show
  1. package/docs/client.md +2339 -182
  2. package/docs/wallet.md +2339 -182
  3. package/out/src/CWIStyleWalletManager.d.ts +417 -0
  4. package/out/src/CWIStyleWalletManager.d.ts.map +1 -0
  5. package/out/src/CWIStyleWalletManager.js +1140 -0
  6. package/out/src/CWIStyleWalletManager.js.map +1 -0
  7. package/out/src/SimpleWalletManager.d.ts +169 -0
  8. package/out/src/SimpleWalletManager.d.ts.map +1 -0
  9. package/out/src/SimpleWalletManager.js +315 -0
  10. package/out/src/SimpleWalletManager.js.map +1 -0
  11. package/out/src/Wallet.d.ts +6 -1
  12. package/out/src/Wallet.d.ts.map +1 -1
  13. package/out/src/Wallet.js +39 -7
  14. package/out/src/Wallet.js.map +1 -1
  15. package/out/src/WalletAuthenticationManager.d.ts +33 -0
  16. package/out/src/WalletAuthenticationManager.d.ts.map +1 -0
  17. package/out/src/WalletAuthenticationManager.js +110 -0
  18. package/out/src/WalletAuthenticationManager.js.map +1 -0
  19. package/out/src/WalletPermissionsManager.d.ts +575 -0
  20. package/out/src/WalletPermissionsManager.d.ts.map +1 -0
  21. package/out/src/WalletPermissionsManager.js +1789 -0
  22. package/out/src/WalletPermissionsManager.js.map +1 -0
  23. package/out/src/WalletSettingsManager.d.ts +59 -0
  24. package/out/src/WalletSettingsManager.d.ts.map +1 -0
  25. package/out/src/WalletSettingsManager.js +189 -0
  26. package/out/src/WalletSettingsManager.js.map +1 -0
  27. package/out/src/__tests/CWIStyleWalletManager.test.d.ts +2 -0
  28. package/out/src/__tests/CWIStyleWalletManager.test.d.ts.map +1 -0
  29. package/out/src/__tests/CWIStyleWalletManager.test.js +471 -0
  30. package/out/src/__tests/CWIStyleWalletManager.test.js.map +1 -0
  31. package/out/src/__tests/WalletPermissionsManager.callbacks.test.d.ts +2 -0
  32. package/out/src/__tests/WalletPermissionsManager.callbacks.test.d.ts.map +1 -0
  33. package/out/src/__tests/WalletPermissionsManager.callbacks.test.js +239 -0
  34. package/out/src/__tests/WalletPermissionsManager.callbacks.test.js.map +1 -0
  35. package/out/src/__tests/WalletPermissionsManager.checks.test.d.ts +2 -0
  36. package/out/src/__tests/WalletPermissionsManager.checks.test.d.ts.map +1 -0
  37. package/out/src/__tests/WalletPermissionsManager.checks.test.js +637 -0
  38. package/out/src/__tests/WalletPermissionsManager.checks.test.js.map +1 -0
  39. package/out/src/__tests/WalletPermissionsManager.encryption.test.d.ts +2 -0
  40. package/out/src/__tests/WalletPermissionsManager.encryption.test.d.ts.map +1 -0
  41. package/out/src/__tests/WalletPermissionsManager.encryption.test.js +295 -0
  42. package/out/src/__tests/WalletPermissionsManager.encryption.test.js.map +1 -0
  43. package/out/src/__tests/WalletPermissionsManager.fixtures.d.ts +83 -0
  44. package/out/src/__tests/WalletPermissionsManager.fixtures.d.ts.map +1 -0
  45. package/out/src/__tests/WalletPermissionsManager.fixtures.js +261 -0
  46. package/out/src/__tests/WalletPermissionsManager.fixtures.js.map +1 -0
  47. package/out/src/__tests/WalletPermissionsManager.flows.test.d.ts +2 -0
  48. package/out/src/__tests/WalletPermissionsManager.flows.test.d.ts.map +1 -0
  49. package/out/src/__tests/WalletPermissionsManager.flows.test.js +377 -0
  50. package/out/src/__tests/WalletPermissionsManager.flows.test.js.map +1 -0
  51. package/out/src/__tests/WalletPermissionsManager.initialization.test.d.ts +2 -0
  52. package/out/src/__tests/WalletPermissionsManager.initialization.test.d.ts.map +1 -0
  53. package/out/src/__tests/WalletPermissionsManager.initialization.test.js +227 -0
  54. package/out/src/__tests/WalletPermissionsManager.initialization.test.js.map +1 -0
  55. package/out/src/__tests/WalletPermissionsManager.proxying.test.d.ts +2 -0
  56. package/out/src/__tests/WalletPermissionsManager.proxying.test.d.ts.map +1 -0
  57. package/out/src/__tests/WalletPermissionsManager.proxying.test.js +566 -0
  58. package/out/src/__tests/WalletPermissionsManager.proxying.test.js.map +1 -0
  59. package/out/src/__tests/WalletPermissionsManager.tokens.test.d.ts +2 -0
  60. package/out/src/__tests/WalletPermissionsManager.tokens.test.d.ts.map +1 -0
  61. package/out/src/__tests/WalletPermissionsManager.tokens.test.js +454 -0
  62. package/out/src/__tests/WalletPermissionsManager.tokens.test.js.map +1 -0
  63. package/out/src/index.all.d.ts +9 -0
  64. package/out/src/index.all.d.ts.map +1 -1
  65. package/out/src/index.all.js +9 -0
  66. package/out/src/index.all.js.map +1 -1
  67. package/out/src/index.client.d.ts +9 -0
  68. package/out/src/index.client.d.ts.map +1 -1
  69. package/out/src/index.client.js +9 -0
  70. package/out/src/index.client.js.map +1 -1
  71. package/out/src/sdk/CertOpsWallet.d.ts +7 -0
  72. package/out/src/sdk/CertOpsWallet.d.ts.map +1 -0
  73. package/out/src/sdk/CertOpsWallet.js +3 -0
  74. package/out/src/sdk/CertOpsWallet.js.map +1 -0
  75. package/out/src/sdk/__test/CertificateLifeCycle.test.js +19 -82
  76. package/out/src/sdk/__test/CertificateLifeCycle.test.js.map +1 -1
  77. package/out/src/sdk/index.d.ts +1 -1
  78. package/out/src/sdk/index.d.ts.map +1 -1
  79. package/out/src/sdk/index.js +1 -1
  80. package/out/src/sdk/index.js.map +1 -1
  81. package/out/src/sdk/validationHelpers.d.ts.map +1 -1
  82. package/out/src/sdk/validationHelpers.js +13 -12
  83. package/out/src/sdk/validationHelpers.js.map +1 -1
  84. package/out/src/services/__tests/bitrails.test.js +7 -2
  85. package/out/src/services/__tests/bitrails.test.js.map +1 -1
  86. package/out/src/services/providers/__tests/WhatsOnChain.test.js +3 -3
  87. package/out/src/services/providers/__tests/WhatsOnChain.test.js.map +1 -1
  88. package/out/src/signer/methods/proveCertificate.d.ts.map +1 -1
  89. package/out/src/signer/methods/proveCertificate.js +3 -19
  90. package/out/src/signer/methods/proveCertificate.js.map +1 -1
  91. package/out/src/storage/__test/WalletStorageManager.test.js +1 -1
  92. package/out/src/storage/__test/WalletStorageManager.test.js.map +1 -1
  93. package/out/src/storage/remoting/StorageClient.d.ts +2 -2
  94. package/out/src/storage/remoting/StorageClient.d.ts.map +1 -1
  95. package/out/src/storage/remoting/StorageClient.js +1 -1
  96. package/out/src/storage/remoting/StorageClient.js.map +1 -1
  97. package/out/src/utility/identityUtils.d.ts +31 -0
  98. package/out/src/utility/identityUtils.d.ts.map +1 -0
  99. package/out/src/utility/identityUtils.js +116 -0
  100. package/out/src/utility/identityUtils.js.map +1 -0
  101. package/out/src/wab-client/WABClient.d.ts +49 -0
  102. package/out/src/wab-client/WABClient.d.ts.map +1 -0
  103. package/out/src/wab-client/WABClient.js +83 -0
  104. package/out/src/wab-client/WABClient.js.map +1 -0
  105. package/out/src/wab-client/__tests/WABClient.man.test.d.ts +2 -0
  106. package/out/src/wab-client/__tests/WABClient.man.test.d.ts.map +1 -0
  107. package/out/src/wab-client/__tests/WABClient.man.test.js +52 -0
  108. package/out/src/wab-client/__tests/WABClient.man.test.js.map +1 -0
  109. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts +34 -0
  110. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts.map +1 -0
  111. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js +16 -0
  112. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js.map +1 -0
  113. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts +7 -0
  114. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts.map +1 -0
  115. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js +36 -0
  116. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js.map +1 -0
  117. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts +28 -0
  118. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts.map +1 -0
  119. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js +69 -0
  120. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js.map +1 -0
  121. package/out/test/Wallet/action/internalizeAction.a.test.js +1 -1
  122. package/out/test/Wallet/action/internalizeAction.a.test.js.map +1 -1
  123. package/out/test/Wallet/certificate/acquireCertificate.test.js +26 -29
  124. package/out/test/Wallet/certificate/acquireCertificate.test.js.map +1 -1
  125. package/out/test/storage/KnexMigrations.test.js +1 -1
  126. package/out/test/storage/KnexMigrations.test.js.map +1 -1
  127. package/out/test/storage/update.test.js +1 -1
  128. package/out/test/storage/update.test.js.map +1 -1
  129. package/out/test/utils/TestUtilsWalletStorage.d.ts +9 -5
  130. package/out/test/utils/TestUtilsWalletStorage.d.ts.map +1 -1
  131. package/out/test/utils/TestUtilsWalletStorage.js +15 -9
  132. package/out/test/utils/TestUtilsWalletStorage.js.map +1 -1
  133. package/out/test/wallet/action/internalizeAction.test.js +1 -1
  134. package/out/test/wallet/action/internalizeAction.test.js.map +1 -1
  135. package/out/test/wallet/list/listActions2.test.js +1 -1
  136. package/out/test/wallet/list/listActions2.test.js.map +1 -1
  137. package/out/test/wallet/sync/Wallet.sync.test.js +1 -1
  138. package/out/test/wallet/sync/Wallet.sync.test.js.map +1 -1
  139. package/out/tsconfig.all.tsbuildinfo +1 -1
  140. package/package.json +3 -4
  141. package/src/CWIStyleWalletManager.ts +1724 -0
  142. package/src/SimpleWalletManager.ts +526 -0
  143. package/src/Wallet.ts +70 -7
  144. package/src/WalletAuthenticationManager.ts +150 -0
  145. package/src/WalletPermissionsManager.ts +2424 -0
  146. package/src/WalletSettingsManager.ts +243 -0
  147. package/src/__tests/CWIStyleWalletManager.test.ts +604 -0
  148. package/src/__tests/WalletPermissionsManager.callbacks.test.ts +323 -0
  149. package/src/__tests/WalletPermissionsManager.checks.test.ts +839 -0
  150. package/src/__tests/WalletPermissionsManager.encryption.test.ts +370 -0
  151. package/src/__tests/WalletPermissionsManager.fixtures.ts +284 -0
  152. package/src/__tests/WalletPermissionsManager.flows.test.ts +457 -0
  153. package/src/__tests/WalletPermissionsManager.initialization.test.ts +300 -0
  154. package/src/__tests/WalletPermissionsManager.proxying.test.ts +706 -0
  155. package/src/__tests/WalletPermissionsManager.tokens.test.ts +546 -0
  156. package/src/index.all.ts +9 -0
  157. package/src/index.client.ts +9 -0
  158. package/src/sdk/CertOpsWallet.ts +18 -0
  159. package/src/sdk/__test/CertificateLifeCycle.test.ts +66 -113
  160. package/src/sdk/index.ts +1 -1
  161. package/src/sdk/validationHelpers.ts +12 -11
  162. package/src/services/__tests/bitrails.test.ts +7 -2
  163. package/src/services/providers/__tests/WhatsOnChain.test.ts +3 -3
  164. package/src/signer/methods/proveCertificate.ts +14 -21
  165. package/src/storage/__test/WalletStorageManager.test.ts +1 -1
  166. package/src/storage/remoting/StorageClient.ts +4 -4
  167. package/src/utility/identityUtils.ts +159 -0
  168. package/src/wab-client/WABClient.ts +94 -0
  169. package/src/wab-client/__tests/WABClient.man.test.ts +59 -0
  170. package/src/wab-client/auth-method-interactors/AuthMethodInteractor.ts +47 -0
  171. package/src/wab-client/auth-method-interactors/PersonaIDInteractor.ts +35 -0
  172. package/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.ts +72 -0
  173. package/test/Wallet/action/internalizeAction.a.test.ts +1 -1
  174. package/test/Wallet/certificate/acquireCertificate.test.ts +89 -30
  175. package/test/storage/KnexMigrations.test.ts +1 -1
  176. package/test/storage/update.test.ts +1 -1
  177. package/test/utils/TestUtilsWalletStorage.ts +24 -13
  178. package/test/wallet/action/internalizeAction.test.ts +1 -1
  179. package/test/wallet/list/listActions2.test.ts +1 -1
  180. package/test/wallet/sync/Wallet.sync.test.ts +1 -1
  181. package/out/src/sdk/CertOps.d.ts +0 -66
  182. package/out/src/sdk/CertOps.d.ts.map +0 -1
  183. package/out/src/sdk/CertOps.js +0 -190
  184. package/out/src/sdk/CertOps.js.map +0 -1
  185. package/src/sdk/CertOps.ts +0 -274
@@ -0,0 +1,261 @@
1
+ "use strict";
2
+ /**
3
+ * A permissions manager testing mock/stub file for:
4
+ * 1) The `@bsv/sdk` library: Transaction, LockingScript, PushDrop, Utils, Random, etc.
5
+ * 2) A BRC-100 `WalletInterface` (the underlying wallet).
6
+ *
7
+ * This file bypasses real validation/logic in `@bsv/sdk`, returning placeholders and
8
+ * stubs to prevent test-time errors such as "Invalid Atomic BEEF prefix."
9
+ */
10
+ Object.defineProperty(exports, "__esModule", { value: true });
11
+ exports.MockedBSV_SDK = exports.MockRandom = exports.MockUtils = exports.MockPushDrop = exports.MockLockingScript = exports.MockTransaction = void 0;
12
+ exports.mockUnderlyingWallet = mockUnderlyingWallet;
13
+ /* ---------------------------------------------------------------------------
14
+ * 1) Partial Mocks for @bsv/sdk
15
+ * -------------------------------------------------------------------------*/
16
+ /**
17
+ * A minimal mock for `Transaction` that won't throw "Invalid Atomic BEEF prefix."
18
+ * We override the static methods so they do not do real parsing/validation.
19
+ */
20
+ class MockTransaction {
21
+ constructor() {
22
+ this.inputs = [{}];
23
+ this.outputs = [];
24
+ this.fee = 0;
25
+ }
26
+ static fromAtomicBEEF() {
27
+ // Mocked below
28
+ }
29
+ static fromBEEF(beef) {
30
+ // Same approach as above
31
+ return new MockTransaction();
32
+ }
33
+ getFee() {
34
+ return this.fee;
35
+ }
36
+ }
37
+ exports.MockTransaction = MockTransaction;
38
+ ;
39
+ MockTransaction.fromAtomicBEEF = jest.fn(() => {
40
+ // We skip real validation, returning a MockTransaction with minimal structure.
41
+ const tx = new MockTransaction();
42
+ return tx;
43
+ });
44
+ /**
45
+ * Mocks for `LockingScript`. If your code calls e.g. LockingScript.fromHex, we can just
46
+ * store the hex and do nothing else.
47
+ */
48
+ class MockLockingScript {
49
+ constructor(hex) {
50
+ this.hex = hex;
51
+ }
52
+ toHex() {
53
+ return this.hex;
54
+ }
55
+ static fromHex(hex) {
56
+ return new MockLockingScript(hex);
57
+ }
58
+ }
59
+ exports.MockLockingScript = MockLockingScript;
60
+ /**
61
+ * We stub out all methods: `decode()`, `lock()`, `unlock()`.
62
+ */
63
+ class MockPushDrop {
64
+ // Typically we might store the wallet reference, but we can skip for now.
65
+ constructor() {
66
+ //
67
+ }
68
+ // Decodes a LockingScript into some {fields: number[][], protocol...} or undefined
69
+ static decode(script) {
70
+ // If you rely on a real format, parse or store a pattern.
71
+ // For now, returning a minimal stub: empty fields
72
+ if (!script || !script.hex)
73
+ return undefined;
74
+ if (script.hex.includes('some script')) {
75
+ // When needed, return some fields
76
+ return {
77
+ fields: [
78
+ [],
79
+ [],
80
+ [],
81
+ [],
82
+ [],
83
+ [],
84
+ [] // 7 fields should always be enough...
85
+ ]
86
+ };
87
+ }
88
+ // Just pretend we always decode to a single empty field array
89
+ return { fields: [] };
90
+ }
91
+ lock(fields, protocolID, keyID, counterparty, singleSignature, anyoneCanPay) {
92
+ return new MockLockingScript('deadbeef');
93
+ }
94
+ unlock(protocolID, keyID, counterparty, sighashType, enforceReplayProtection, sigSize, lockingScript) {
95
+ // In real usage, it would handle signature logic. We'll return a minimal stub.
96
+ return {
97
+ sign: async (tx, vin) => {
98
+ // produce a minimal unlocking script
99
+ return new MockLockingScript('mockUnlockingScript');
100
+ }
101
+ };
102
+ }
103
+ }
104
+ exports.MockPushDrop = MockPushDrop;
105
+ /**
106
+ * Mocks for Utils, e.g. toHex, toUTF8, fromUTF8, etc.
107
+ * We can provide minimal stubs that won't break your code.
108
+ */
109
+ exports.MockUtils = {
110
+ toHex: (data) => {
111
+ // Converts an array of numbers to a hexadecimal string.
112
+ return data.map(num => num.toString(16).padStart(2, '0')).join('');
113
+ },
114
+ toArray: (str, encoding = 'utf8') => {
115
+ // Converts a string to an array of numbers based on the encoding.
116
+ if (encoding === 'hex') {
117
+ const arr = [];
118
+ for (let i = 0; i < str.length; i += 2) {
119
+ arr.push(parseInt(str.substr(i, 2), 16));
120
+ }
121
+ return arr;
122
+ }
123
+ else if (encoding === 'base64') {
124
+ const binaryStr = atob(str);
125
+ return Array.from(binaryStr, char => char.charCodeAt(0));
126
+ }
127
+ else if (encoding === 'utf8') {
128
+ return Array.from(str, char => char.charCodeAt(0));
129
+ }
130
+ else {
131
+ throw new Error('Unsupported encoding: ' + encoding);
132
+ }
133
+ },
134
+ toUTF8: (arr) => {
135
+ // Converts an array of numbers to a UTF-8 string.
136
+ return String.fromCharCode(...arr);
137
+ }
138
+ };
139
+ /**
140
+ * Mocks for Random
141
+ */
142
+ const MockRandom = (size) => {
143
+ return [...require('crypto').randomBytes(size)];
144
+ };
145
+ exports.MockRandom = MockRandom;
146
+ /**
147
+ * Overriding the real classes with our mocks.
148
+ */
149
+ exports.MockedBSV_SDK = {
150
+ Transaction: MockTransaction,
151
+ LockingScript: MockLockingScript,
152
+ PushDrop: MockPushDrop,
153
+ Utils: exports.MockUtils,
154
+ Random: exports.MockRandom,
155
+ Certificate: null
156
+ };
157
+ /* ---------------------------------------------------------------------------
158
+ * 2) A full mock for the BRC-100 WalletInterface
159
+ * -------------------------------------------------------------------------*/
160
+ /**
161
+ * A helper function returning a Jest-mocked `WalletInterface`.
162
+ * This ensures all required methods exist and return plausible values.
163
+ *
164
+ * - By default, `createAction` returns a signableTransaction with empty arrays,
165
+ * so that the manager can call `Transaction.fromAtomicBEEF([])` without throwing.
166
+ * - You can override or chain .mockResolvedValueOnce(...) inside individual tests
167
+ * if you want more specific behavior in certain test steps.
168
+ */
169
+ function mockUnderlyingWallet() {
170
+ return {
171
+ getPublicKey: jest.fn().mockResolvedValue({ publicKey: '029999...' }),
172
+ revealCounterpartyKeyLinkage: jest.fn().mockResolvedValue({
173
+ encryptedLinkage: [1, 2, 3],
174
+ encryptedLinkageProof: [4, 5, 6],
175
+ prover: '02abcdef...',
176
+ verifier: '02cccccc...',
177
+ counterparty: '02bbbbbb...',
178
+ revelationTime: new Date().toISOString()
179
+ }),
180
+ revealSpecificKeyLinkage: jest.fn().mockResolvedValue({
181
+ encryptedLinkage: [1, 2, 3],
182
+ encryptedLinkageProof: [4, 5, 6],
183
+ prover: '02abcdef...',
184
+ verifier: '02cccccc...',
185
+ counterparty: '02bbbbbb...',
186
+ protocolID: [1, 'test-protocol'],
187
+ keyID: 'testKey',
188
+ proofType: 1
189
+ }),
190
+ encrypt: jest.fn().mockResolvedValue({ ciphertext: [42, 42, 42, 42, 42, 42, 42] }),
191
+ decrypt: jest.fn().mockResolvedValue({ plaintext: [42, 42, 42, 42, 42] }),
192
+ createHmac: jest.fn().mockResolvedValue({ hmac: [0xaa] }),
193
+ verifyHmac: jest.fn().mockResolvedValue({ valid: true }),
194
+ createSignature: jest.fn().mockResolvedValue({ signature: [0x30, 0x44] }),
195
+ verifySignature: jest.fn().mockResolvedValue({ valid: true }),
196
+ createAction: jest.fn(async (x) => {
197
+ if (x.options && x.options.signAndProcess === true) {
198
+ return {
199
+ tx: []
200
+ };
201
+ }
202
+ return {
203
+ signableTransaction: {
204
+ tx: [],
205
+ reference: 'mockReference'
206
+ }
207
+ };
208
+ }),
209
+ signAction: jest.fn().mockResolvedValue({
210
+ txid: 'fake-txid',
211
+ tx: []
212
+ }),
213
+ abortAction: jest.fn().mockResolvedValue({ aborted: true }),
214
+ listActions: jest.fn().mockResolvedValue({
215
+ totalActions: 0,
216
+ actions: []
217
+ }),
218
+ internalizeAction: jest.fn().mockResolvedValue({ accepted: true }),
219
+ listOutputs: jest.fn().mockResolvedValue({
220
+ totalOutputs: 0,
221
+ outputs: []
222
+ }),
223
+ relinquishOutput: jest.fn().mockResolvedValue({ relinquished: true }),
224
+ acquireCertificate: jest.fn().mockResolvedValue({
225
+ type: 'some-cert-type',
226
+ subject: '02aaaaaaaaaa...',
227
+ serialNumber: 'serial123',
228
+ certifier: '02ccccccccccc...',
229
+ revocationOutpoint: 'some.txid.1',
230
+ signature: 'deadbeef',
231
+ fields: { name: 'Alice', dob: '1990-01-01' }
232
+ }),
233
+ listCertificates: jest.fn().mockResolvedValue({
234
+ totalCertificates: 0,
235
+ certificates: []
236
+ }),
237
+ proveCertificate: jest.fn().mockResolvedValue({
238
+ keyringForVerifier: {},
239
+ certificate: undefined,
240
+ verifier: undefined
241
+ }),
242
+ relinquishCertificate: jest.fn().mockResolvedValue({ relinquished: true }),
243
+ discoverByIdentityKey: jest.fn().mockResolvedValue({
244
+ totalCertificates: 0,
245
+ certificates: []
246
+ }),
247
+ discoverByAttributes: jest.fn().mockResolvedValue({
248
+ totalCertificates: 0,
249
+ certificates: []
250
+ }),
251
+ isAuthenticated: jest.fn().mockResolvedValue({ authenticated: true }),
252
+ waitForAuthentication: jest.fn().mockResolvedValue({ authenticated: true }),
253
+ getHeight: jest.fn().mockResolvedValue({ height: 777777 }),
254
+ getHeaderForHeight: jest.fn().mockResolvedValue({
255
+ header: '000000000000abc...'
256
+ }),
257
+ getNetwork: jest.fn().mockResolvedValue({ network: 'testnet' }),
258
+ getVersion: jest.fn().mockResolvedValue({ version: 'vendor-1.0.0' })
259
+ };
260
+ }
261
+ //# sourceMappingURL=WalletPermissionsManager.fixtures.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"WalletPermissionsManager.fixtures.js","sourceRoot":"","sources":["../../../src/__tests/WalletPermissionsManager.fixtures.ts"],"names":[],"mappings":";AAAA;;;;;;;GAOG;;;AAuLH,oDA6FC;AAlRD;;8EAE8E;AAE9E;;;GAGG;AACH,MAAa,eAAe;IAK1B;QAJO,WAAM,GAAU,CAAC,EAAE,CAAC,CAAA;QACpB,YAAO,GAAU,EAAE,CAAA;QACnB,QAAG,GAAW,CAAC,CAAA;IAEP,CAAC;IAChB,MAAM,CAAC,cAAc;QACnB,eAAe;IACjB,CAAC;IAED,MAAM,CAAC,QAAQ,CAAC,IAAc;QAC5B,yBAAyB;QACzB,OAAO,IAAI,eAAe,EAAE,CAAA;IAC9B,CAAC;IAED,MAAM;QACJ,OAAO,IAAI,CAAC,GAAG,CAAA;IACjB,CAAC;CACF;AAlBD,0CAkBC;AAED,CAAC;AAAC,eAAuB,CAAC,cAAc,GAAG,IAAI,CAAC,EAAE,CAAC,GAAG,EAAE;IACtD,+EAA+E;IAC/E,MAAM,EAAE,GAAG,IAAI,eAAe,EAAE,CAAA;IAChC,OAAO,EAAE,CAAA;AACX,CAAC,CAAC,CAAA;AAEF;;;GAGG;AACH,MAAa,iBAAiB;IAE5B,YAAY,GAAW;QACrB,IAAI,CAAC,GAAG,GAAG,GAAG,CAAA;IAChB,CAAC;IACM,KAAK;QACV,OAAO,IAAI,CAAC,GAAG,CAAA;IACjB,CAAC;IACD,MAAM,CAAC,OAAO,CAAC,GAAW;QACxB,OAAO,IAAI,iBAAiB,CAAC,GAAG,CAAC,CAAA;IACnC,CAAC;CACF;AAXD,8CAWC;AAED;;GAEG;AACH,MAAa,YAAY;IACvB,0EAA0E;IAC1E;QACE,EAAE;IACJ,CAAC;IAED,mFAAmF;IACnF,MAAM,CAAC,MAAM,CAAC,MAAyB;QACrC,0DAA0D;QAC1D,kDAAkD;QAClD,IAAI,CAAC,MAAM,IAAI,CAAC,MAAM,CAAC,GAAG;YAAE,OAAO,SAAS,CAAA;QAC5C,IAAI,MAAM,CAAC,GAAG,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE,CAAC;YACvC,kCAAkC;YAClC,OAAO;gBACL,MAAM,EAAE;oBACN,EAAE;oBACF,EAAE;oBACF,EAAE;oBACF,EAAE;oBACF,EAAE;oBACF,EAAE;oBACF,EAAE,CAAC,sCAAsC;iBAC1C;aACF,CAAA;QACH,CAAC;QACD,8DAA8D;QAC9D,OAAO,EAAE,MAAM,EAAE,EAAE,EAAE,CAAA;IACvB,CAAC;IAED,IAAI,CACF,MAAkB,EAClB,UAA4B,EAC5B,KAAa,EACb,YAAoB,EACpB,eAAwB,EACxB,YAAqB;QAErB,OAAO,IAAI,iBAAiB,CAAC,UAAU,CAAC,CAAA;IAC1C,CAAC;IAED,MAAM,CACJ,UAA4B,EAC5B,KAAa,EACb,YAAoB,EACpB,WAAmB,EACnB,uBAAgC,EAChC,OAAe,EACf,aAAgC;QAIhC,+EAA+E;QAC/E,OAAO;YACL,IAAI,EAAE,KAAK,EAAE,EAAmB,EAAE,GAAW,EAAE,EAAE;gBAC/C,qCAAqC;gBACrC,OAAO,IAAI,iBAAiB,CAAC,qBAAqB,CAAC,CAAA;YACrD,CAAC;SACF,CAAA;IACH,CAAC;CACF;AA3DD,oCA2DC;AAED;;;GAGG;AACU,QAAA,SAAS,GAAG;IACvB,KAAK,EAAE,CAAC,IAAc,EAAE,EAAE;QACxB,wDAAwD;QACxD,OAAO,IAAI,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,CAAC,CAAA;IACpE,CAAC;IAED,OAAO,EAAE,CAAC,GAAW,EAAE,QAAQ,GAAG,MAAM,EAAE,EAAE;QAC1C,kEAAkE;QAClE,IAAI,QAAQ,KAAK,KAAK,EAAE,CAAC;YACvB,MAAM,GAAG,GAAa,EAAE,CAAA;YACxB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,GAAG,CAAC,MAAM,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvC,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAA;YAC1C,CAAC;YACD,OAAO,GAAG,CAAA;QACZ,CAAC;aAAM,IAAI,QAAQ,KAAK,QAAQ,EAAE,CAAC;YACjC,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,CAAC,CAAA;YAC3B,OAAO,KAAK,CAAC,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAA;QAC1D,CAAC;aAAM,IAAI,QAAQ,KAAK,MAAM,EAAE,CAAC;YAC/B,OAAO,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAA;QACpD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,wBAAwB,GAAG,QAAQ,CAAC,CAAA;QACtD,CAAC;IACH,CAAC;IAED,MAAM,EAAE,CAAC,GAAa,EAAE,EAAE;QACxB,kDAAkD;QAClD,OAAO,MAAM,CAAC,YAAY,CAAC,GAAG,GAAG,CAAC,CAAA;IACpC,CAAC;CACF,CAAA;AAED;;GAEG;AACI,MAAM,UAAU,GAAG,CAAC,IAAY,EAAY,EAAE;IACnD,OAAO,CAAC,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAC,WAAW,CAAC,IAAI,CAAC,CAAC,CAAA;AACjD,CAAC,CAAA;AAFY,QAAA,UAAU,cAEtB;AAED;;GAEG;AACU,QAAA,aAAa,GAAG;IAC3B,WAAW,EAAE,eAAe;IAC5B,aAAa,EAAE,iBAAiB;IAChC,QAAQ,EAAE,YAAY;IACtB,KAAK,EAAE,iBAAS;IAChB,MAAM,EAAE,kBAAU;IAClB,WAAW,EAAE,IAAI;CAClB,CAAA;AAED;;8EAE8E;AAE9E;;;;;;;;GAQG;AACH,SAAgB,oBAAoB;IAClC,OAAO;QACL,YAAY,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,SAAS,EAAE,WAAW,EAAE,CAAC;QACrE,4BAA4B,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YACxD,gBAAgB,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;YAC3B,qBAAqB,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;YAChC,MAAM,EAAE,aAAa;YACrB,QAAQ,EAAE,aAAa;YACvB,YAAY,EAAE,aAAa;YAC3B,cAAc,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;SACzC,CAAC;QACF,wBAAwB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YACpD,gBAAgB,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;YAC3B,qBAAqB,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;YAChC,MAAM,EAAE,aAAa;YACrB,QAAQ,EAAE,aAAa;YACvB,YAAY,EAAE,aAAa;YAC3B,UAAU,EAAE,CAAC,CAAC,EAAE,eAAe,CAAC;YAChC,KAAK,EAAE,SAAS;YAChB,SAAS,EAAE,CAAC;SACb,CAAC;QACF,OAAO,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,UAAU,EAAE,CAAC,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,EAAE,CAAC;QAClF,OAAO,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,SAAS,EAAE,CAAC,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,EAAE,CAAC;QACzE,UAAU,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,IAAI,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC;QACzD,UAAU,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC;QACxD,eAAe,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,SAAS,EAAE,CAAC,IAAI,EAAE,IAAI,CAAC,EAAE,CAAC;QACzE,eAAe,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC;QAE7D,YAAY,EAAE,IAAI,CAAC,EAAE,CAAC,KAAK,EAAC,CAAC,EAAC,EAAE;YAC9B,IAAI,CAAC,CAAC,OAAO,IAAI,CAAC,CAAC,OAAO,CAAC,cAAc,KAAK,IAAI,EAAE,CAAC;gBACnD,OAAO;oBACL,EAAE,EAAE,EAAE;iBACP,CAAA;YACH,CAAC;YACD,OAAO;gBACL,mBAAmB,EAAE;oBACnB,EAAE,EAAE,EAAE;oBACN,SAAS,EAAE,eAAe;iBAC3B;aACF,CAAA;QACH,CAAC,CAAC;QACF,UAAU,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YACtC,IAAI,EAAE,WAAW;YACjB,EAAE,EAAE,EAAE;SACP,CAAC;QACF,WAAW,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;QAC3D,WAAW,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YACvC,YAAY,EAAE,CAAC;YACf,OAAO,EAAE,EAAE;SACZ,CAAC;QACF,iBAAiB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,QAAQ,EAAE,IAAI,EAAE,CAAC;QAClE,WAAW,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YACvC,YAAY,EAAE,CAAC;YACf,OAAO,EAAE,EAAE;SACZ,CAAC;QACF,gBAAgB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,YAAY,EAAE,IAAI,EAAE,CAAC;QAErE,kBAAkB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YAC9C,IAAI,EAAE,gBAAgB;YACtB,OAAO,EAAE,iBAAiB;YAC1B,YAAY,EAAE,WAAW;YACzB,SAAS,EAAE,kBAAkB;YAC7B,kBAAkB,EAAE,aAAa;YACjC,SAAS,EAAE,UAAU;YACrB,MAAM,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE,GAAG,EAAE,YAAY,EAAE;SAC7C,CAAC;QACF,gBAAgB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YAC5C,iBAAiB,EAAE,CAAC;YACpB,YAAY,EAAE,EAAE;SACjB,CAAC;QACF,gBAAgB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YAC5C,kBAAkB,EAAE,EAAE;YACtB,WAAW,EAAE,SAAS;YACtB,QAAQ,EAAE,SAAS;SACpB,CAAC;QACF,qBAAqB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,YAAY,EAAE,IAAI,EAAE,CAAC;QAC1E,qBAAqB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YACjD,iBAAiB,EAAE,CAAC;YACpB,YAAY,EAAE,EAAE;SACjB,CAAC;QACF,oBAAoB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YAChD,iBAAiB,EAAE,CAAC;YACpB,YAAY,EAAE,EAAE;SACjB,CAAC;QACF,eAAe,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,aAAa,EAAE,IAAI,EAAE,CAAC;QACrE,qBAAqB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,aAAa,EAAE,IAAI,EAAE,CAAC;QAC3E,SAAS,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,MAAM,EAAE,MAAM,EAAE,CAAC;QAC1D,kBAAkB,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;YAC9C,MAAM,EAAE,oBAAoB;SAC7B,CAAC;QACF,UAAU,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,OAAO,EAAE,SAAS,EAAE,CAAC;QAC/D,UAAU,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,EAAE,OAAO,EAAE,cAAc,EAAE,CAAC;KACrE,CAAA;AACH,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=WalletPermissionsManager.flows.test.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"WalletPermissionsManager.flows.test.d.ts","sourceRoot":"","sources":["../../../src/__tests/WalletPermissionsManager.flows.test.ts"],"names":[],"mappings":""}
@@ -0,0 +1,377 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ const WalletPermissionsManager_fixtures_1 = require("./WalletPermissionsManager.fixtures");
4
+ const WalletPermissionsManager_1 = require("../WalletPermissionsManager");
5
+ const globals_1 = require("@jest/globals");
6
+ // We mock the underlying @bsv/sdk references with our test fixtures:
7
+ globals_1.jest.mock('@bsv/sdk', () => WalletPermissionsManager_fixtures_1.MockedBSV_SDK);
8
+ /**
9
+ * A lightweight helper that forces the manager to never find any on-chain token.
10
+ * We do this so we can reliably test the request flow (i.e., that it truly initiates
11
+ * a new permission request if no token is found).
12
+ */
13
+ function mockNoTokensFound(manager) {
14
+ globals_1.jest.spyOn(manager, 'findProtocolToken').mockResolvedValue(undefined);
15
+ globals_1.jest.spyOn(manager, 'findBasketToken').mockResolvedValue(undefined);
16
+ globals_1.jest.spyOn(manager, 'findCertificateToken').mockResolvedValue(undefined);
17
+ globals_1.jest.spyOn(manager, 'findSpendingToken').mockResolvedValue(undefined);
18
+ }
19
+ describe('WalletPermissionsManager - Permission Request Flow & Active Requests', () => {
20
+ let underlying;
21
+ let manager;
22
+ beforeEach(() => {
23
+ underlying = (0, WalletPermissionsManager_fixtures_1.mockUnderlyingWallet)();
24
+ manager = new WalletPermissionsManager_1.WalletPermissionsManager(underlying, 'admin.test.com');
25
+ });
26
+ afterEach(() => {
27
+ globals_1.jest.clearAllMocks();
28
+ });
29
+ /**
30
+ * UNIT TESTS
31
+ */
32
+ describe('Unit Tests: requestPermissionFlow & activeRequests map', () => {
33
+ it('should coalesce parallel requests for the same resource into a single user prompt', async () => {
34
+ // We want to test the underlying private method "requestPermissionFlow" indirectly
35
+ // or we can test it via a public method that calls it. We'll do so via ensureProtocolPermission.
36
+ // Force no token found => triggers a request flow
37
+ mockNoTokensFound(manager);
38
+ // Spy on the manager's "onProtocolPermissionRequested" callbacks
39
+ const requestCallback = globals_1.jest.fn(() => { });
40
+ manager.bindCallback('onProtocolPermissionRequested', requestCallback);
41
+ // Make two parallel calls for the same resource
42
+ const callA = manager.ensureProtocolPermission({
43
+ originator: 'example.com',
44
+ privileged: false,
45
+ protocolID: [1, 'someproto'],
46
+ counterparty: 'self',
47
+ reason: 'UnitTest - same resource A',
48
+ seekPermission: true,
49
+ usageType: 'signing'
50
+ });
51
+ const callB = manager.ensureProtocolPermission({
52
+ originator: 'example.com',
53
+ privileged: false,
54
+ protocolID: [1, 'someproto'],
55
+ counterparty: 'self',
56
+ reason: 'UnitTest - same resource B',
57
+ seekPermission: true,
58
+ usageType: 'signing'
59
+ });
60
+ // Wait a short moment for the async request flow to trigger
61
+ await new Promise(res => setTimeout(res, 5));
62
+ // We expect only one "onProtocolPermissionRequested" event for both calls
63
+ expect(requestCallback).toHaveBeenCalledTimes(1);
64
+ // Now let's deny the request:
65
+ // Grab the requestID that the manager gave us from the callback param
66
+ const callbackArg = requestCallback.mock.calls[0][0];
67
+ const requestID = callbackArg.requestID;
68
+ expect(typeof requestID).toBe('string'); // manager-generated
69
+ // Deny the request
70
+ await manager.denyPermission(requestID);
71
+ // Both calls should reject
72
+ await expect(callA).rejects.toThrow(/Permission denied/);
73
+ await expect(callB).rejects.toThrow(/Permission denied/);
74
+ // Confirm activeRequests map is empty after denial
75
+ const activeRequests = manager.activeRequests;
76
+ expect(activeRequests.size).toBe(0);
77
+ });
78
+ it('should generate two distinct user prompts for two different permission requests', async () => {
79
+ // Force no tokens
80
+ mockNoTokensFound(manager);
81
+ // Spy on basket & protocol request callbacks
82
+ const protocolRequestCb = globals_1.jest.fn(() => { });
83
+ const basketRequestCb = globals_1.jest.fn(() => { });
84
+ manager.bindCallback('onProtocolPermissionRequested', protocolRequestCb);
85
+ manager.bindCallback('onBasketAccessRequested', basketRequestCb);
86
+ // Make one call for protocol usage
87
+ const pCall = manager.ensureProtocolPermission({
88
+ originator: 'example.com',
89
+ privileged: false,
90
+ protocolID: [1, 'proto-A'],
91
+ counterparty: 'self',
92
+ reason: 'Different request A',
93
+ seekPermission: true,
94
+ usageType: 'signing'
95
+ });
96
+ // Make a second call for basket usage
97
+ const bCall = manager.ensureBasketAccess({
98
+ originator: 'example.com',
99
+ basket: 'some-basket',
100
+ reason: 'Different request B',
101
+ seekPermission: true,
102
+ usageType: 'insertion'
103
+ });
104
+ // Wait a moment for them to trigger
105
+ await new Promise(res => setTimeout(res, 5));
106
+ // We expect one protocol request AND one basket request
107
+ expect(protocolRequestCb).toHaveBeenCalledTimes(1);
108
+ expect(basketRequestCb).toHaveBeenCalledTimes(1);
109
+ // Deny protocol request
110
+ const pReqID = protocolRequestCb.mock.calls[0][0].requestID;
111
+ await manager.denyPermission(pReqID);
112
+ // Deny basket request
113
+ const bReqID = basketRequestCb.mock.calls[0][0].requestID;
114
+ await manager.denyPermission(bReqID);
115
+ // Both calls should have rejected
116
+ await expect(pCall).rejects.toThrow(/Permission denied/);
117
+ await expect(bCall).rejects.toThrow(/Permission denied/);
118
+ // activeRequests is empty
119
+ const activeRequests = manager.activeRequests;
120
+ expect(activeRequests.size).toBe(0);
121
+ });
122
+ it('should resolve all parallel requests when permission is granted, referencing the same requestID', async () => {
123
+ // No tokens => triggers request flow
124
+ mockNoTokensFound(manager);
125
+ const requestCb = globals_1.jest.fn(() => { });
126
+ manager.bindCallback('onProtocolPermissionRequested', requestCb);
127
+ // Parallel calls
128
+ const promiseA = manager.ensureProtocolPermission({
129
+ originator: 'example.com',
130
+ privileged: false,
131
+ protocolID: [1, 'proto-X'],
132
+ counterparty: 'anyone',
133
+ reason: 'Test parallel grant A',
134
+ seekPermission: true,
135
+ usageType: 'encrypting'
136
+ });
137
+ const promiseB = manager.ensureProtocolPermission({
138
+ originator: 'example.com',
139
+ privileged: false,
140
+ protocolID: [1, 'proto-X'],
141
+ counterparty: 'anyone',
142
+ reason: 'Test parallel grant B',
143
+ seekPermission: true,
144
+ usageType: 'encrypting'
145
+ });
146
+ // Let the request event fire
147
+ await new Promise(res => setTimeout(res, 5));
148
+ expect(requestCb).toHaveBeenCalledTimes(1);
149
+ // Extract the requestID from the callback
150
+ const { requestID } = requestCb.mock.calls[0][0];
151
+ // Now we grant permission for that same requestID
152
+ // Because ephemeral is false by default, the manager will attempt to create on-chain tokens
153
+ // We'll mock the internal createPermissionOnChain so it doesn't blow up
154
+ const createOnChainSpy = globals_1.jest.spyOn(manager, 'createPermissionOnChain').mockResolvedValue(undefined);
155
+ await manager.grantPermission({ requestID });
156
+ // Both calls should resolve with `true` (the manager returns a boolean)
157
+ await expect(promiseA).resolves.toBe(true);
158
+ await expect(promiseB).resolves.toBe(true);
159
+ // activeRequests map is empty
160
+ const activeRequests = manager.activeRequests;
161
+ expect(activeRequests.size).toBe(0);
162
+ // The manager tried to create an on-chain permission token once
163
+ expect(createOnChainSpy).toHaveBeenCalledTimes(1);
164
+ });
165
+ it('should reject only the matching request queue on deny if requestID is specified', async () => {
166
+ // This scenario tests the manager's partial denial logic where we pass { requestID }
167
+ // to only reject the queued requests with that ID, leaving others (with a different requestID)
168
+ // in the queue.
169
+ mockNoTokensFound(manager);
170
+ // We do two separate calls for the same resource but at different times, resulting in separate queues.
171
+ // Actually, the manager normally merges them into one queue if the resource is the same.
172
+ // So let's do two different resources to ensure we get two separate keys.
173
+ const protoCb = globals_1.jest.fn(() => { });
174
+ manager.bindCallback('onProtocolPermissionRequested', protoCb);
175
+ // Resource 1
176
+ const p1Promise = manager.ensureProtocolPermission({
177
+ originator: 'siteA.com',
178
+ privileged: false,
179
+ protocolID: [1, 'proto-siteA'],
180
+ counterparty: 'self',
181
+ usageType: 'encrypting'
182
+ });
183
+ await new Promise(res => setTimeout(res, 5));
184
+ const p1ReqID = protoCb.mock.calls[0][0].requestID;
185
+ // At this point, resource 1 is pending in activeRequests. We'll not resolve it yet.
186
+ // Resource 2
187
+ const p2Promise = manager.ensureProtocolPermission({
188
+ originator: 'siteB.com',
189
+ privileged: false,
190
+ protocolID: [1, 'proto-siteB'],
191
+ counterparty: 'self',
192
+ usageType: 'encrypting'
193
+ });
194
+ await new Promise(res => setTimeout(res, 5));
195
+ // the second call triggers a second onProtocolPermissionRequested callback
196
+ expect(protoCb).toHaveBeenCalledTimes(2);
197
+ const p2ReqID = protoCb.mock.calls[1][0].requestID;
198
+ // Deny the second request only
199
+ await manager.denyPermission(p2ReqID);
200
+ await expect(p2Promise).rejects.toThrow(/Permission denied/);
201
+ // But the first request is still waiting
202
+ const activeRequests = manager.activeRequests;
203
+ expect(activeRequests.size).toBe(1);
204
+ // Now let's deny the first request too
205
+ await manager.denyPermission(p1ReqID);
206
+ await expect(p1Promise).rejects.toThrow(/Permission denied/);
207
+ // The queue is empty now
208
+ expect(activeRequests.size).toBe(0);
209
+ });
210
+ });
211
+ /**
212
+ * INTEGRATION TESTS
213
+ */
214
+ describe('Integration Tests: ephemeral vs. persistent tokens', () => {
215
+ it('should not create a token if ephemeral=true, so subsequent calls re-trigger the request', async () => {
216
+ // We'll do a "protocol" permission scenario:
217
+ mockNoTokensFound(manager);
218
+ // Bind the request callback
219
+ const requestCb = globals_1.jest.fn(() => { });
220
+ manager.bindCallback('onProtocolPermissionRequested', requestCb);
221
+ // Force any on-chain creation attempt to be spied on
222
+ const createTokenSpy = globals_1.jest.spyOn(manager, 'createPermissionOnChain');
223
+ // 1) Call ensureProtocolPermission => triggers request
224
+ const pCall1 = manager.ensureProtocolPermission({
225
+ originator: 'appdomain.com',
226
+ privileged: false,
227
+ protocolID: [1, 'ephemeral-proto'],
228
+ counterparty: 'self',
229
+ reason: 'test ephemeral #1',
230
+ usageType: 'signing'
231
+ });
232
+ // Wait for request callback
233
+ await new Promise(res => setTimeout(res, 5));
234
+ expect(requestCb).toHaveBeenCalledTimes(1);
235
+ const reqID1 = requestCb.mock.calls[0][0].requestID;
236
+ // Grant ephemeral
237
+ await manager.grantPermission({
238
+ requestID: reqID1,
239
+ ephemeral: true
240
+ });
241
+ // pCall1 is resolved
242
+ await expect(pCall1).resolves.toBe(true);
243
+ // Because ephemeral=true, we do NOT create an on-chain token
244
+ expect(createTokenSpy).not.toHaveBeenCalled();
245
+ // 2) Immediately call ensureProtocolPermission again for the same resource
246
+ // Because ephemeral usage didn't store a token, it should re-prompt.
247
+ const pCall2 = manager.ensureProtocolPermission({
248
+ originator: 'appdomain.com',
249
+ privileged: false,
250
+ protocolID: [1, 'ephemeral-proto'],
251
+ counterparty: 'self',
252
+ reason: 'test ephemeral #2',
253
+ usageType: 'signing'
254
+ });
255
+ await new Promise(res => setTimeout(res, 5));
256
+ // We expect a new request callback
257
+ expect(requestCb).toHaveBeenCalledTimes(2);
258
+ // We'll deny the second request
259
+ const reqID2 = requestCb.mock.calls[1][0].requestID;
260
+ await manager.denyPermission(reqID2);
261
+ await expect(pCall2).rejects.toThrow(/Permission denied/);
262
+ });
263
+ it('should create a token if ephemeral=false, so subsequent calls do not re-trigger if unexpired', async () => {
264
+ // We want the manager to truly create a token. We'll confirm that
265
+ // subsequent calls for the same resource skip user prompt.
266
+ mockNoTokensFound(manager);
267
+ // We'll also ensure no token is found "the first time."
268
+ // But on subsequent calls, we can mock that the manager sees the newly created token.
269
+ // Let's spy on "createPermissionOnChain" so we can intercept the new token
270
+ const createTokenSpy = globals_1.jest.spyOn(manager, 'createPermissionOnChain').mockResolvedValue(undefined); // no real on-chain creation
271
+ // Spy on "findProtocolToken" so we can simulate that the second time it's called,
272
+ // there's a valid token. We'll do this by setting the mock to return undefined the first time,
273
+ // and a valid token the second time (or we can just rely on the manager's logic).
274
+ let firstFindCall = true;
275
+ globals_1.jest.spyOn(manager, 'findProtocolToken').mockImplementation(async () => {
276
+ if (firstFindCall) {
277
+ firstFindCall = false;
278
+ return undefined; // first time triggers request
279
+ }
280
+ // second time => pretend we found a valid token
281
+ const mockToken = {
282
+ txid: 'abcdef',
283
+ outputIndex: 0,
284
+ outputScript: '00',
285
+ satoshis: 1,
286
+ originator: 'persistentdomain.com',
287
+ expiry: Math.floor(Date.now() / 1000) + 3600, // unexpired
288
+ privileged: false,
289
+ protocol: 'persist-proto',
290
+ securityLevel: 1,
291
+ counterparty: 'self'
292
+ };
293
+ return mockToken;
294
+ });
295
+ // We'll observe the request callback
296
+ const requestCb = globals_1.jest.fn(() => { });
297
+ manager.bindCallback('onProtocolPermissionRequested', requestCb);
298
+ // 1) First call => no token => triggers request
299
+ const call1 = manager.ensureProtocolPermission({
300
+ originator: 'persistentdomain.com',
301
+ privileged: false,
302
+ protocolID: [1, 'persist-proto'],
303
+ counterparty: 'self',
304
+ reason: 'test persistent #1',
305
+ usageType: 'signing'
306
+ });
307
+ await new Promise(res => setTimeout(res, 5));
308
+ expect(requestCb).toHaveBeenCalledTimes(1);
309
+ // Grant ephemeral=false => triggers createPermissionOnChain
310
+ const reqID = requestCb.mock.calls[0][0].requestID;
311
+ await manager.grantPermission({ requestID: reqID, ephemeral: false });
312
+ await expect(call1).resolves.toBe(true);
313
+ expect(createTokenSpy).toHaveBeenCalledTimes(1);
314
+ // 2) Second call => the manager should find the token we just "created" => no request prompt
315
+ const call2 = manager.ensureProtocolPermission({
316
+ originator: 'persistentdomain.com',
317
+ privileged: false,
318
+ protocolID: [1, 'persist-proto'],
319
+ counterparty: 'self',
320
+ reason: 'test persistent #2',
321
+ usageType: 'signing'
322
+ });
323
+ // We do not expect a new user prompt => requestCb remains at 1
324
+ await new Promise(res => setTimeout(res, 5));
325
+ expect(requestCb).toHaveBeenCalledTimes(1);
326
+ // The second call should resolve immediately, no prompt
327
+ await expect(call2).resolves.toBe(true);
328
+ });
329
+ it('should handle renewal if the found token is expired, passing previousToken in the request', async () => {
330
+ // We'll test the "renewal" flow:
331
+ // If the manager finds a token but it's expired, it sets { renewal: true, previousToken } in the request.
332
+ // We'll mock findProtocolToken to return an expired token
333
+ const expiredToken = {
334
+ txid: 'expiredTxid123',
335
+ outputIndex: 0,
336
+ outputScript: '76a914xxxx...88ac',
337
+ satoshis: 1,
338
+ originator: 'renewme.com',
339
+ expiry: Math.floor(Date.now() / 1000) - 100, // in the past
340
+ privileged: false,
341
+ protocol: 'renew-proto',
342
+ securityLevel: 1,
343
+ counterparty: 'self'
344
+ };
345
+ globals_1.jest.spyOn(manager, 'findProtocolToken').mockResolvedValue(expiredToken);
346
+ // Spy on request callback
347
+ const requestCb = globals_1.jest.fn(() => { });
348
+ manager.bindCallback('onProtocolPermissionRequested', requestCb);
349
+ // We'll also spy on "renewPermissionOnChain" to see if it's called
350
+ const renewSpy = globals_1.jest.spyOn(manager, 'renewPermissionOnChain').mockResolvedValue(undefined);
351
+ // Call ensureProtocolPermission => sees expired token => triggers request with renewal
352
+ const promise = manager.ensureProtocolPermission({
353
+ originator: 'renewme.com',
354
+ privileged: false,
355
+ protocolID: [1, 'renew-proto'],
356
+ counterparty: 'self',
357
+ reason: 'test renewal',
358
+ usageType: 'encrypting'
359
+ });
360
+ // Wait for request callback
361
+ await new Promise(res => setTimeout(res, 10));
362
+ expect(requestCb).toHaveBeenCalledTimes(1);
363
+ // Confirm the callback param includes `renewal=true` and `previousToken=expiredToken`
364
+ const { renewal, previousToken } = requestCb.mock.calls[0][0];
365
+ expect(renewal).toBe(true);
366
+ expect(previousToken.txid).toBe('expiredTxid123');
367
+ // Grant ephemeral=false => manager calls renewPermissionOnChain
368
+ const { requestID } = requestCb.mock.calls[0][0];
369
+ await manager.grantPermission({ requestID, ephemeral: false });
370
+ await expect(promise).resolves.toBe(true);
371
+ expect(renewSpy).toHaveBeenCalledTimes(1);
372
+ // The first arg is the old token, second is request, etc.
373
+ expect(renewSpy).toHaveBeenCalledWith(expiredToken, expect.objectContaining({ originator: 'renewme.com' }), expect.any(Number), undefined);
374
+ });
375
+ });
376
+ });
377
+ //# sourceMappingURL=WalletPermissionsManager.flows.test.js.map