@bsv/wallet-toolbox 1.1.62 → 1.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (185) hide show
  1. package/docs/client.md +2339 -182
  2. package/docs/wallet.md +2339 -182
  3. package/out/src/CWIStyleWalletManager.d.ts +417 -0
  4. package/out/src/CWIStyleWalletManager.d.ts.map +1 -0
  5. package/out/src/CWIStyleWalletManager.js +1140 -0
  6. package/out/src/CWIStyleWalletManager.js.map +1 -0
  7. package/out/src/SimpleWalletManager.d.ts +169 -0
  8. package/out/src/SimpleWalletManager.d.ts.map +1 -0
  9. package/out/src/SimpleWalletManager.js +315 -0
  10. package/out/src/SimpleWalletManager.js.map +1 -0
  11. package/out/src/Wallet.d.ts +6 -1
  12. package/out/src/Wallet.d.ts.map +1 -1
  13. package/out/src/Wallet.js +39 -7
  14. package/out/src/Wallet.js.map +1 -1
  15. package/out/src/WalletAuthenticationManager.d.ts +33 -0
  16. package/out/src/WalletAuthenticationManager.d.ts.map +1 -0
  17. package/out/src/WalletAuthenticationManager.js +110 -0
  18. package/out/src/WalletAuthenticationManager.js.map +1 -0
  19. package/out/src/WalletPermissionsManager.d.ts +575 -0
  20. package/out/src/WalletPermissionsManager.d.ts.map +1 -0
  21. package/out/src/WalletPermissionsManager.js +1789 -0
  22. package/out/src/WalletPermissionsManager.js.map +1 -0
  23. package/out/src/WalletSettingsManager.d.ts +59 -0
  24. package/out/src/WalletSettingsManager.d.ts.map +1 -0
  25. package/out/src/WalletSettingsManager.js +189 -0
  26. package/out/src/WalletSettingsManager.js.map +1 -0
  27. package/out/src/__tests/CWIStyleWalletManager.test.d.ts +2 -0
  28. package/out/src/__tests/CWIStyleWalletManager.test.d.ts.map +1 -0
  29. package/out/src/__tests/CWIStyleWalletManager.test.js +471 -0
  30. package/out/src/__tests/CWIStyleWalletManager.test.js.map +1 -0
  31. package/out/src/__tests/WalletPermissionsManager.callbacks.test.d.ts +2 -0
  32. package/out/src/__tests/WalletPermissionsManager.callbacks.test.d.ts.map +1 -0
  33. package/out/src/__tests/WalletPermissionsManager.callbacks.test.js +239 -0
  34. package/out/src/__tests/WalletPermissionsManager.callbacks.test.js.map +1 -0
  35. package/out/src/__tests/WalletPermissionsManager.checks.test.d.ts +2 -0
  36. package/out/src/__tests/WalletPermissionsManager.checks.test.d.ts.map +1 -0
  37. package/out/src/__tests/WalletPermissionsManager.checks.test.js +637 -0
  38. package/out/src/__tests/WalletPermissionsManager.checks.test.js.map +1 -0
  39. package/out/src/__tests/WalletPermissionsManager.encryption.test.d.ts +2 -0
  40. package/out/src/__tests/WalletPermissionsManager.encryption.test.d.ts.map +1 -0
  41. package/out/src/__tests/WalletPermissionsManager.encryption.test.js +295 -0
  42. package/out/src/__tests/WalletPermissionsManager.encryption.test.js.map +1 -0
  43. package/out/src/__tests/WalletPermissionsManager.fixtures.d.ts +83 -0
  44. package/out/src/__tests/WalletPermissionsManager.fixtures.d.ts.map +1 -0
  45. package/out/src/__tests/WalletPermissionsManager.fixtures.js +261 -0
  46. package/out/src/__tests/WalletPermissionsManager.fixtures.js.map +1 -0
  47. package/out/src/__tests/WalletPermissionsManager.flows.test.d.ts +2 -0
  48. package/out/src/__tests/WalletPermissionsManager.flows.test.d.ts.map +1 -0
  49. package/out/src/__tests/WalletPermissionsManager.flows.test.js +377 -0
  50. package/out/src/__tests/WalletPermissionsManager.flows.test.js.map +1 -0
  51. package/out/src/__tests/WalletPermissionsManager.initialization.test.d.ts +2 -0
  52. package/out/src/__tests/WalletPermissionsManager.initialization.test.d.ts.map +1 -0
  53. package/out/src/__tests/WalletPermissionsManager.initialization.test.js +227 -0
  54. package/out/src/__tests/WalletPermissionsManager.initialization.test.js.map +1 -0
  55. package/out/src/__tests/WalletPermissionsManager.proxying.test.d.ts +2 -0
  56. package/out/src/__tests/WalletPermissionsManager.proxying.test.d.ts.map +1 -0
  57. package/out/src/__tests/WalletPermissionsManager.proxying.test.js +566 -0
  58. package/out/src/__tests/WalletPermissionsManager.proxying.test.js.map +1 -0
  59. package/out/src/__tests/WalletPermissionsManager.tokens.test.d.ts +2 -0
  60. package/out/src/__tests/WalletPermissionsManager.tokens.test.d.ts.map +1 -0
  61. package/out/src/__tests/WalletPermissionsManager.tokens.test.js +454 -0
  62. package/out/src/__tests/WalletPermissionsManager.tokens.test.js.map +1 -0
  63. package/out/src/index.all.d.ts +9 -0
  64. package/out/src/index.all.d.ts.map +1 -1
  65. package/out/src/index.all.js +9 -0
  66. package/out/src/index.all.js.map +1 -1
  67. package/out/src/index.client.d.ts +9 -0
  68. package/out/src/index.client.d.ts.map +1 -1
  69. package/out/src/index.client.js +9 -0
  70. package/out/src/index.client.js.map +1 -1
  71. package/out/src/sdk/CertOpsWallet.d.ts +7 -0
  72. package/out/src/sdk/CertOpsWallet.d.ts.map +1 -0
  73. package/out/src/sdk/CertOpsWallet.js +3 -0
  74. package/out/src/sdk/CertOpsWallet.js.map +1 -0
  75. package/out/src/sdk/__test/CertificateLifeCycle.test.js +19 -82
  76. package/out/src/sdk/__test/CertificateLifeCycle.test.js.map +1 -1
  77. package/out/src/sdk/index.d.ts +1 -1
  78. package/out/src/sdk/index.d.ts.map +1 -1
  79. package/out/src/sdk/index.js +1 -1
  80. package/out/src/sdk/index.js.map +1 -1
  81. package/out/src/sdk/validationHelpers.d.ts.map +1 -1
  82. package/out/src/sdk/validationHelpers.js +13 -12
  83. package/out/src/sdk/validationHelpers.js.map +1 -1
  84. package/out/src/services/__tests/bitrails.test.js +7 -2
  85. package/out/src/services/__tests/bitrails.test.js.map +1 -1
  86. package/out/src/services/providers/__tests/WhatsOnChain.test.js +3 -3
  87. package/out/src/services/providers/__tests/WhatsOnChain.test.js.map +1 -1
  88. package/out/src/signer/methods/proveCertificate.d.ts.map +1 -1
  89. package/out/src/signer/methods/proveCertificate.js +3 -19
  90. package/out/src/signer/methods/proveCertificate.js.map +1 -1
  91. package/out/src/storage/__test/WalletStorageManager.test.js +1 -1
  92. package/out/src/storage/__test/WalletStorageManager.test.js.map +1 -1
  93. package/out/src/storage/remoting/StorageClient.d.ts +2 -2
  94. package/out/src/storage/remoting/StorageClient.d.ts.map +1 -1
  95. package/out/src/storage/remoting/StorageClient.js +1 -1
  96. package/out/src/storage/remoting/StorageClient.js.map +1 -1
  97. package/out/src/utility/identityUtils.d.ts +31 -0
  98. package/out/src/utility/identityUtils.d.ts.map +1 -0
  99. package/out/src/utility/identityUtils.js +116 -0
  100. package/out/src/utility/identityUtils.js.map +1 -0
  101. package/out/src/wab-client/WABClient.d.ts +49 -0
  102. package/out/src/wab-client/WABClient.d.ts.map +1 -0
  103. package/out/src/wab-client/WABClient.js +83 -0
  104. package/out/src/wab-client/WABClient.js.map +1 -0
  105. package/out/src/wab-client/__tests/WABClient.man.test.d.ts +2 -0
  106. package/out/src/wab-client/__tests/WABClient.man.test.d.ts.map +1 -0
  107. package/out/src/wab-client/__tests/WABClient.man.test.js +52 -0
  108. package/out/src/wab-client/__tests/WABClient.man.test.js.map +1 -0
  109. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts +34 -0
  110. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts.map +1 -0
  111. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js +16 -0
  112. package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js.map +1 -0
  113. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts +7 -0
  114. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts.map +1 -0
  115. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js +36 -0
  116. package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js.map +1 -0
  117. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts +28 -0
  118. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts.map +1 -0
  119. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js +69 -0
  120. package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js.map +1 -0
  121. package/out/test/Wallet/action/internalizeAction.a.test.js +1 -1
  122. package/out/test/Wallet/action/internalizeAction.a.test.js.map +1 -1
  123. package/out/test/Wallet/certificate/acquireCertificate.test.js +26 -29
  124. package/out/test/Wallet/certificate/acquireCertificate.test.js.map +1 -1
  125. package/out/test/storage/KnexMigrations.test.js +1 -1
  126. package/out/test/storage/KnexMigrations.test.js.map +1 -1
  127. package/out/test/storage/update.test.js +1 -1
  128. package/out/test/storage/update.test.js.map +1 -1
  129. package/out/test/utils/TestUtilsWalletStorage.d.ts +9 -5
  130. package/out/test/utils/TestUtilsWalletStorage.d.ts.map +1 -1
  131. package/out/test/utils/TestUtilsWalletStorage.js +15 -9
  132. package/out/test/utils/TestUtilsWalletStorage.js.map +1 -1
  133. package/out/test/wallet/action/internalizeAction.test.js +1 -1
  134. package/out/test/wallet/action/internalizeAction.test.js.map +1 -1
  135. package/out/test/wallet/list/listActions2.test.js +1 -1
  136. package/out/test/wallet/list/listActions2.test.js.map +1 -1
  137. package/out/test/wallet/sync/Wallet.sync.test.js +1 -1
  138. package/out/test/wallet/sync/Wallet.sync.test.js.map +1 -1
  139. package/out/tsconfig.all.tsbuildinfo +1 -1
  140. package/package.json +3 -4
  141. package/src/CWIStyleWalletManager.ts +1724 -0
  142. package/src/SimpleWalletManager.ts +526 -0
  143. package/src/Wallet.ts +70 -7
  144. package/src/WalletAuthenticationManager.ts +150 -0
  145. package/src/WalletPermissionsManager.ts +2424 -0
  146. package/src/WalletSettingsManager.ts +243 -0
  147. package/src/__tests/CWIStyleWalletManager.test.ts +604 -0
  148. package/src/__tests/WalletPermissionsManager.callbacks.test.ts +323 -0
  149. package/src/__tests/WalletPermissionsManager.checks.test.ts +839 -0
  150. package/src/__tests/WalletPermissionsManager.encryption.test.ts +370 -0
  151. package/src/__tests/WalletPermissionsManager.fixtures.ts +284 -0
  152. package/src/__tests/WalletPermissionsManager.flows.test.ts +457 -0
  153. package/src/__tests/WalletPermissionsManager.initialization.test.ts +300 -0
  154. package/src/__tests/WalletPermissionsManager.proxying.test.ts +706 -0
  155. package/src/__tests/WalletPermissionsManager.tokens.test.ts +546 -0
  156. package/src/index.all.ts +9 -0
  157. package/src/index.client.ts +9 -0
  158. package/src/sdk/CertOpsWallet.ts +18 -0
  159. package/src/sdk/__test/CertificateLifeCycle.test.ts +66 -113
  160. package/src/sdk/index.ts +1 -1
  161. package/src/sdk/validationHelpers.ts +12 -11
  162. package/src/services/__tests/bitrails.test.ts +7 -2
  163. package/src/services/providers/__tests/WhatsOnChain.test.ts +3 -3
  164. package/src/signer/methods/proveCertificate.ts +14 -21
  165. package/src/storage/__test/WalletStorageManager.test.ts +1 -1
  166. package/src/storage/remoting/StorageClient.ts +4 -4
  167. package/src/utility/identityUtils.ts +159 -0
  168. package/src/wab-client/WABClient.ts +94 -0
  169. package/src/wab-client/__tests/WABClient.man.test.ts +59 -0
  170. package/src/wab-client/auth-method-interactors/AuthMethodInteractor.ts +47 -0
  171. package/src/wab-client/auth-method-interactors/PersonaIDInteractor.ts +35 -0
  172. package/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.ts +72 -0
  173. package/test/Wallet/action/internalizeAction.a.test.ts +1 -1
  174. package/test/Wallet/certificate/acquireCertificate.test.ts +89 -30
  175. package/test/storage/KnexMigrations.test.ts +1 -1
  176. package/test/storage/update.test.ts +1 -1
  177. package/test/utils/TestUtilsWalletStorage.ts +24 -13
  178. package/test/wallet/action/internalizeAction.test.ts +1 -1
  179. package/test/wallet/list/listActions2.test.ts +1 -1
  180. package/test/wallet/sync/Wallet.sync.test.ts +1 -1
  181. package/out/src/sdk/CertOps.d.ts +0 -66
  182. package/out/src/sdk/CertOps.d.ts.map +0 -1
  183. package/out/src/sdk/CertOps.js +0 -190
  184. package/out/src/sdk/CertOps.js.map +0 -1
  185. package/src/sdk/CertOps.ts +0 -274
@@ -0,0 +1,566 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ const WalletPermissionsManager_fixtures_1 = require("./WalletPermissionsManager.fixtures");
4
+ const WalletPermissionsManager_1 = require("../WalletPermissionsManager");
5
+ jest.mock('@bsv/sdk', () => WalletPermissionsManager_fixtures_1.MockedBSV_SDK);
6
+ describe('WalletPermissionsManager - Regression & Integration with Underlying Wallet', () => {
7
+ let underlying;
8
+ let manager;
9
+ beforeEach(() => {
10
+ // Create a fresh underlying mock wallet
11
+ underlying = (0, WalletPermissionsManager_fixtures_1.mockUnderlyingWallet)();
12
+ // Default config: everything enforced for maximum coverage
13
+ const defaultConfig = {
14
+ seekProtocolPermissionsForSigning: true,
15
+ seekProtocolPermissionsForEncrypting: true,
16
+ seekProtocolPermissionsForHMAC: true,
17
+ seekPermissionsForKeyLinkageRevelation: true,
18
+ seekPermissionsForPublicKeyRevelation: true,
19
+ seekPermissionsForIdentityKeyRevelation: true,
20
+ seekPermissionsForIdentityResolution: true,
21
+ seekBasketInsertionPermissions: true,
22
+ seekBasketRemovalPermissions: true,
23
+ seekBasketListingPermissions: true,
24
+ seekPermissionWhenApplyingActionLabels: true,
25
+ seekPermissionWhenListingActionsByLabel: true,
26
+ seekCertificateDisclosurePermissions: true,
27
+ seekCertificateAcquisitionPermissions: true,
28
+ seekCertificateRelinquishmentPermissions: true,
29
+ seekCertificateListingPermissions: true,
30
+ encryptWalletMetadata: true,
31
+ seekSpendingPermissions: true,
32
+ differentiatePrivilegedOperations: true
33
+ };
34
+ // We pass "admin.test" as the admin origin
35
+ manager = new WalletPermissionsManager_1.WalletPermissionsManager(underlying, 'admin.test', defaultConfig);
36
+ // For these tests, we don't want to deal with UI prompts or real user interactions.
37
+ // We stub out any permission requests by auto-granting ephemeral in all cases
38
+ manager.bindCallback('onProtocolPermissionRequested', async (req) => {
39
+ await manager.grantPermission({
40
+ requestID: req.requestID,
41
+ ephemeral: true
42
+ });
43
+ });
44
+ manager.bindCallback('onBasketAccessRequested', async (req) => {
45
+ await manager.grantPermission({
46
+ requestID: req.requestID,
47
+ ephemeral: true
48
+ });
49
+ });
50
+ manager.bindCallback('onCertificateAccessRequested', async (req) => {
51
+ await manager.grantPermission({
52
+ requestID: req.requestID,
53
+ ephemeral: true
54
+ });
55
+ });
56
+ manager.bindCallback('onSpendingAuthorizationRequested', async (req) => {
57
+ // If the request is for a netSpent above some threshold, let's simulate a denial for one test scenario
58
+ // By default, we'll just ephemeral-grant.
59
+ await manager.grantPermission({
60
+ requestID: req.requestID,
61
+ ephemeral: true
62
+ });
63
+ });
64
+ });
65
+ afterEach(() => {
66
+ jest.clearAllMocks();
67
+ });
68
+ /* -------------------------------------------------------------------------
69
+ * createAction / signAction / abortAction
70
+ * ----------------------------------------------------------------------- */
71
+ it('should pass createAction calls through, label them, handle metadata encryption, and check spending authorization', async () => {
72
+ // We'll mock the "netSpent" scenario to be >0 by returning some mock input & output satoshis from the signableTransaction.
73
+ // The underlying mock createAction returns a signableTransaction with tx = []
74
+ // We can stub out the mock so that the manager sees inputs/outputs with certain sat amounts.
75
+ // But we have to remember the manager is parsing the signableTransaction via fromAtomicBEEF(…).
76
+ // We'll control that by adjusting the mock signableTransaction in the underlying.
77
+ // let's set a custom signableTransaction that returns 500 sat in inputs, 1000 in outputs, and 100 in fee
78
+ underlying.createAction.mockResolvedValueOnce({
79
+ signableTransaction: {
80
+ // The manager calls Transaction.fromAtomicBEEF() on this
81
+ tx: [0xde, 0xad], // not used in detail, but let's just pass some array
82
+ reference: 'test-ref'
83
+ }
84
+ });
85
+ // We also need to configure the fromAtomicBEEF mock so it returns a transaction with the specified inputs/outputs
86
+ const mockTx = new WalletPermissionsManager_fixtures_1.MockTransaction();
87
+ mockTx.fee = 100;
88
+ // We'll define exactly one input we consider "originator-provided" with 500 sat
89
+ mockTx.inputs = [
90
+ {
91
+ sourceTXID: 'aaa',
92
+ sourceOutputIndex: 0,
93
+ sourceTransaction: {
94
+ outputs: [{ satoshis: 500 }]
95
+ }
96
+ }
97
+ ];
98
+ // We'll define 2 outputs. The manager will read the output amounts from the createAction call's "args.outputs" too,
99
+ // but we also set them here in case it cross-references them. We'll keep it consistent (2 outputs with total 1000).
100
+ mockTx.outputs = [{ satoshis: 600 }, { satoshis: 400 }];
101
+ WalletPermissionsManager_fixtures_1.MockedBSV_SDK.Transaction.fromAtomicBEEF.mockReturnValue(mockTx);
102
+ // Attempt to create an action from a non-admin origin
103
+ await manager.createAction({
104
+ description: 'User purchase',
105
+ inputs: [
106
+ {
107
+ outpoint: 'aaa.0',
108
+ unlockingScriptLength: 73,
109
+ inputDescription: 'My input'
110
+ }
111
+ ],
112
+ outputs: [
113
+ {
114
+ lockingScript: '00abcd',
115
+ satoshis: 1000,
116
+ outputDescription: 'Purchase output',
117
+ basket: 'my-basket'
118
+ }
119
+ ],
120
+ labels: ['user-label', 'something-else']
121
+ }, 'shop.example.com');
122
+ // The manager should have:
123
+ // 1) Called underlying.createAction
124
+ // 2) Inserted "admin originator shop.example.com" & "admin month YYYY-MM" into labels
125
+ // 3) Encrypted the metadata fields (description, inputDescription, outputDescription)
126
+ // 4) Ensured we needed spending permission for netSpent= (1000 + fee100) - 500 = 600
127
+ // The onSpendingAuthorizationRequested callback ephemeral-granted it.
128
+ expect(underlying.createAction).toHaveBeenCalledTimes(1);
129
+ const callArgs = underlying.createAction.mock.calls[0][0];
130
+ expect(callArgs.labels).toContain('admin originator shop.example.com');
131
+ expect(callArgs.labels).toEqual(expect.arrayContaining([
132
+ expect.stringContaining('admin month'),
133
+ 'user-label',
134
+ 'something-else',
135
+ 'admin originator shop.example.com'
136
+ ]));
137
+ // Confirm the metadata was replaced with some ciphertext array in createAction call
138
+ expect(callArgs.description).not.toBe('User purchase'); // manager encrypts it
139
+ if (callArgs.inputs[0].inputDescription) {
140
+ expect(callArgs.inputs[0].inputDescription).not.toBe('My input');
141
+ }
142
+ if (callArgs.outputs[0].outputDescription) {
143
+ expect(callArgs.outputs[0].outputDescription).not.toBe('Purchase output');
144
+ }
145
+ // Also confirm we set signAndProcess to false if origin is non-admin
146
+ expect(callArgs.options.signAndProcess).toBe(false);
147
+ // The manager will parse the resulting signableTransaction, see netSpent=600, and request spending permission.
148
+ // Our callback ephemeral-granted. So everything should proceed with no error.
149
+ // The manager returns the partial result from underlying
150
+ // We don't have a final sign call from the manager because signAndProcess is forcibly false.
151
+ });
152
+ it('should abort the action if spending permission is denied', async () => {
153
+ // This time let's forcibly DENY the onSpendingAuthorizationRequested callback
154
+ manager.unbindCallback('onSpendingAuthorizationRequested', 0); // Unbind the ephemeral-grant
155
+ manager.bindCallback('onSpendingAuthorizationRequested', async (req) => {
156
+ await manager.denyPermission(req.requestID);
157
+ });
158
+ // We'll use the same approach: netSpent > 0 triggers the spending authorization check.
159
+ underlying.createAction.mockResolvedValueOnce({
160
+ signableTransaction: {
161
+ tx: [0xde],
162
+ reference: 'test-ref-2'
163
+ }
164
+ });
165
+ // Mock parse tx for netSpent
166
+ const mockTx = new WalletPermissionsManager_fixtures_1.MockTransaction();
167
+ mockTx.fee = 100;
168
+ mockTx.inputs = [
169
+ {
170
+ sourceTXID: 'bbb',
171
+ sourceOutputIndex: 0,
172
+ sourceTransaction: {
173
+ outputs: [{ satoshis: 0 }]
174
+ }
175
+ }
176
+ ];
177
+ mockTx.outputs = [{ satoshis: 100 }];
178
+ WalletPermissionsManager_fixtures_1.MockedBSV_SDK.Transaction.fromAtomicBEEF.mockReturnValue(mockTx);
179
+ await expect(manager.createAction({
180
+ description: 'User tries to spend 100 + fee=100 from 0 input => netSpent=200',
181
+ outputs: [
182
+ {
183
+ lockingScript: 'abc123',
184
+ satoshis: 100,
185
+ outputDescription: 'some out desc',
186
+ basket: 'some-basket'
187
+ }
188
+ ]
189
+ }, 'user.example.com')).rejects.toThrow(/Permission denied/);
190
+ // We expect the manager to call underlying.abortAction with reference 'test-ref-2'
191
+ expect(underlying.abortAction).toHaveBeenCalledTimes(1);
192
+ expect(underlying.abortAction).toHaveBeenCalledWith({
193
+ reference: 'test-ref-2'
194
+ });
195
+ });
196
+ it('should throw an error if a non-admin tries signAndProcess=true', async () => {
197
+ // Non-admin tries signAndProcess=true => manager throws
198
+ await expect(manager.createAction({
199
+ description: 'Trying signAndProcess from non-admin',
200
+ outputs: [
201
+ {
202
+ lockingScript: '1234',
203
+ satoshis: 50,
204
+ basket: 'user-basket',
205
+ outputDescription: 'Description'
206
+ }
207
+ ],
208
+ options: {
209
+ signAndProcess: true
210
+ }
211
+ }, 'someuser.com')).rejects.toThrow(/Only the admin originator can set signAndProcess=true/);
212
+ });
213
+ it('should proxy signAction calls directly if invoked by the user', async () => {
214
+ // Typically, signAction is used after createAction returns a partial signableTransaction
215
+ // We'll confirm it passes arguments verbatim to underlying
216
+ const result = await manager.signAction({
217
+ reference: 'my-ref',
218
+ spends: {
219
+ 0: {
220
+ unlockingScript: 'my-script'
221
+ }
222
+ }
223
+ }, 'nonadmin.com');
224
+ expect(underlying.signAction).toHaveBeenCalledTimes(1);
225
+ expect(underlying.signAction).toHaveBeenCalledWith({
226
+ reference: 'my-ref',
227
+ spends: {
228
+ 0: {
229
+ unlockingScript: 'my-script'
230
+ }
231
+ }
232
+ }, 'nonadmin.com');
233
+ // returns the underlying result
234
+ expect(result.txid).toBe('fake-txid');
235
+ });
236
+ it('should proxy abortAction calls directly', async () => {
237
+ const result = await manager.abortAction({ reference: 'abort-me' }, 'someuser.com');
238
+ expect(underlying.abortAction).toHaveBeenCalledTimes(1);
239
+ expect(underlying.abortAction).toHaveBeenCalledWith({ reference: 'abort-me' }, 'someuser.com');
240
+ expect(result).toEqual({ aborted: true });
241
+ });
242
+ /* -------------------------------------------------------------------------
243
+ * listActions / internalizeAction
244
+ * ----------------------------------------------------------------------- */
245
+ it('should call listActions on the underlying wallet and decrypt metadata fields if encryptWalletMetadata=true', async () => {
246
+ // Underlying returns some encrypted metadata
247
+ underlying.listActions.mockResolvedValueOnce({
248
+ totalActions: 1,
249
+ actions: [
250
+ {
251
+ actionTXID: 'aaa',
252
+ description: 'EncryptedStuff',
253
+ inputs: [
254
+ {
255
+ outpoint: 'xxx.0',
256
+ inputDescription: 'EncryptedIn'
257
+ }
258
+ ],
259
+ outputs: [
260
+ {
261
+ lockingScript: 'deadbeef',
262
+ outputDescription: 'EncryptedOut',
263
+ customInstructions: 'EncryptedCustom'
264
+ }
265
+ ],
266
+ labels: ['user-label']
267
+ }
268
+ ]
269
+ });
270
+ // We'll have the manager attempt to decrypt. The manager calls `underlying.decrypt`
271
+ // which is mocked to return plaintext [42, 42, 42, 42, 42, 42, 42]. That is "asterisk-asterisk" in ASCII
272
+ // So let's see how the manager transforms it back to a string: fromCharCode(42,42) => "**"
273
+ // However, note that the manager's "maybeDecryptMetadata()" tries to decrypt the field
274
+ // If it works, it returns the decrypted string. Our underlying mock decrypt => "[42,42]" => "**"
275
+ // So let's expect the final returned fields to be "**".
276
+ const result = await manager.listActions({ labels: ['some-label'] }, 'nonadmin.com');
277
+ expect(underlying.listActions).toHaveBeenCalledTimes(1);
278
+ // The manager calls ensureLabelAccess first, which triggers a protocol permission request
279
+ // we ephemeral-grant. Then it calls underlying.listActions.
280
+ expect(result.actions[0].description).toBe('*****'); // Decrypted from [42, 42, 42, 42, 42, 42, 42]
281
+ expect(result.actions[0].inputs[0].inputDescription).toBe('*****');
282
+ expect(result.actions[0].outputs[0].outputDescription).toBe('*****');
283
+ expect(result.actions[0].outputs[0].customInstructions).toBe('*****');
284
+ });
285
+ it('should pass internalizeAction calls to underlying, after ensuring basket permissions and encrypting customInstructions if config=on', async () => {
286
+ await manager.internalizeAction({
287
+ tx: [],
288
+ description: 'Internalizing outputs with basket insertion',
289
+ outputs: [
290
+ {
291
+ outputIndex: 0,
292
+ protocol: 'basket insertion',
293
+ insertionRemittance: {
294
+ basket: 'some-basket',
295
+ customInstructions: 'plaintext instructions'
296
+ }
297
+ }
298
+ ]
299
+ }, 'someuser.com');
300
+ // The manager ensures basket insertion => ephemeral permission granted
301
+ // Then it encrypts 'plaintext instructions' before passing it to underlying
302
+ expect(underlying.internalizeAction).toHaveBeenCalledTimes(1);
303
+ const callArgs = underlying.internalizeAction.mock.calls[0][0];
304
+ expect(callArgs.outputs[0].insertionRemittance.customInstructions).not.toBe('plaintext instructions');
305
+ // There's no direct check that the string is "**" or something, because it's encrypted.
306
+ // We just confirm it was changed from the original plaintext.
307
+ });
308
+ /* -------------------------------------------------------------------------
309
+ * listOutputs / relinquishOutput
310
+ * ----------------------------------------------------------------------- */
311
+ it('should ensure basket listing permission then call listOutputs, decrypting customInstructions', async () => {
312
+ underlying.listOutputs.mockResolvedValue({
313
+ totalOutputs: 1,
314
+ outputs: [
315
+ {
316
+ outpoint: 'zzz.1',
317
+ satoshis: 100,
318
+ lockingScript: 'mockscript',
319
+ customInstructions: 'EncryptedWeird'
320
+ }
321
+ ]
322
+ });
323
+ const result = await manager.listOutputs({ basket: 'user-basket' }, 'app.example.com');
324
+ // manager ephemeral-grants basket permission
325
+ expect(underlying.listOutputs).toHaveBeenCalledTimes(2);
326
+ expect(underlying.listOutputs.mock.calls).toEqual([
327
+ [
328
+ {
329
+ basket: 'admin basket-access',
330
+ include: 'locking scripts',
331
+ tagQueryMode: 'all',
332
+ tags: ['originator app.example.com', 'basket user-basket']
333
+ },
334
+ 'admin.test' // querying to see if we have permission
335
+ ],
336
+ [
337
+ {
338
+ basket: 'user-basket'
339
+ },
340
+ 'app.example.com' // the actual underlying call
341
+ ]
342
+ ]);
343
+ expect(result.outputs[0].customInstructions).toBe('*****'); // from [42,42] decryption
344
+ });
345
+ it('should ensure basket removal permission then call relinquishOutput', async () => {
346
+ await manager.relinquishOutput({
347
+ output: 'xxx.0',
348
+ basket: 'some-basket'
349
+ }, 'nonadmin.com');
350
+ expect(underlying.relinquishOutput).toHaveBeenCalledTimes(1);
351
+ expect(underlying.relinquishOutput).toHaveBeenCalledWith({ output: 'xxx.0', basket: 'some-basket' }, 'nonadmin.com');
352
+ });
353
+ /* -------------------------------------------------------------------------
354
+ * getPublicKey / revealCounterpartyKeyLinkage / revealSpecificKeyLinkage
355
+ * ----------------------------------------------------------------------- */
356
+ it('should call getPublicKey on underlying after ensuring protocol permission', async () => {
357
+ const result = await manager.getPublicKey({
358
+ protocolID: [1, 'test-pubkey'],
359
+ keyID: 'my-key'
360
+ }, 'user.example.com');
361
+ expect(underlying.getPublicKey).toHaveBeenCalledTimes(1);
362
+ expect(underlying.getPublicKey).toHaveBeenCalledWith({
363
+ protocolID: [1, 'test-pubkey'],
364
+ keyID: 'my-key'
365
+ }, 'user.example.com');
366
+ expect(result.publicKey).toBe('029999...');
367
+ });
368
+ it('should call revealCounterpartyKeyLinkage with permission check, pass result', async () => {
369
+ const result = await manager.revealCounterpartyKeyLinkage({
370
+ privileged: true,
371
+ verifier: '0222aaa',
372
+ counterparty: '02bbbccc',
373
+ privilegedReason: 'test reason'
374
+ }, 'user.example.com');
375
+ expect(underlying.revealCounterpartyKeyLinkage).toHaveBeenCalledTimes(1);
376
+ expect(underlying.revealCounterpartyKeyLinkage).toHaveBeenCalledWith({
377
+ privileged: true,
378
+ verifier: '0222aaa',
379
+ counterparty: '02bbbccc',
380
+ privilegedReason: 'test reason'
381
+ }, 'user.example.com');
382
+ expect(result.prover).toBe('02abcdef...');
383
+ });
384
+ it('should call revealSpecificKeyLinkage with permission check, pass result', async () => {
385
+ const result = await manager.revealSpecificKeyLinkage({
386
+ privileged: false,
387
+ verifier: '0222ddd',
388
+ protocolID: [2, 'special'],
389
+ keyID: '5',
390
+ counterparty: '022222',
391
+ privilegedReason: 'need to check link'
392
+ }, 'user.example.com');
393
+ expect(underlying.revealSpecificKeyLinkage).toHaveBeenCalledTimes(1);
394
+ expect(underlying.revealSpecificKeyLinkage).toHaveBeenCalledWith({
395
+ privileged: false,
396
+ verifier: '0222ddd',
397
+ protocolID: [2, 'special'],
398
+ keyID: '5',
399
+ counterparty: '022222',
400
+ privilegedReason: 'need to check link'
401
+ }, 'user.example.com');
402
+ expect(result.prover).toBe('02abcdef...');
403
+ });
404
+ /* -------------------------------------------------------------------------
405
+ * encrypt / decrypt / createHmac / verifyHmac / createSignature / verifySignature
406
+ * ----------------------------------------------------------------------- */
407
+ it('should proxy encrypt() calls after checking protocol permission', async () => {
408
+ const result = await manager.encrypt({
409
+ protocolID: [1, 'secret-proto'],
410
+ plaintext: [1, 2, 3],
411
+ keyID: 'mykey'
412
+ }, 'user.example.com');
413
+ expect(underlying.encrypt).toHaveBeenCalledTimes(1);
414
+ expect(result.ciphertext).toEqual([42, 42, 42, 42, 42, 42, 42]); // from the mock
415
+ });
416
+ it('should proxy decrypt() calls after checking protocol permission', async () => {
417
+ const result = await manager.decrypt({
418
+ protocolID: [1, 'secret-proto'],
419
+ ciphertext: [99, 99],
420
+ keyID: 'somekey'
421
+ }, 'user.example.com');
422
+ expect(underlying.decrypt).toHaveBeenCalledTimes(1);
423
+ expect(result.plaintext).toEqual([42, 42, 42, 42, 42]);
424
+ });
425
+ it('should proxy createHmac() calls', async () => {
426
+ const result = await manager.createHmac({
427
+ protocolID: [2, 'hmac-proto'],
428
+ data: [11, 22],
429
+ keyID: 'hmacKey'
430
+ }, 'someone.com');
431
+ expect(underlying.createHmac).toHaveBeenCalledTimes(1);
432
+ expect(result.hmac).toEqual([0xaa]);
433
+ });
434
+ it('should proxy verifyHmac() calls', async () => {
435
+ const result = await manager.verifyHmac({
436
+ protocolID: [2, 'hmac-proto'],
437
+ data: [11, 22],
438
+ hmac: [0xaa],
439
+ keyID: 'hmacKey'
440
+ }, 'someone.com');
441
+ expect(underlying.verifyHmac).toHaveBeenCalledTimes(1);
442
+ expect(result.valid).toBe(true);
443
+ });
444
+ it('should proxy createSignature() calls (already tested the netSpent logic in createAction, but let’s double-check)', async () => {
445
+ // We tested permission checks for signing in earlier tests, but let's confirm pass-through
446
+ const result = await manager.createSignature({
447
+ protocolID: [1, 'sign-proto'],
448
+ data: [10, 20],
449
+ keyID: '1'
450
+ }, 'user.com');
451
+ expect(underlying.createSignature).toHaveBeenCalledTimes(1);
452
+ expect(result.signature).toEqual([0x30, 0x44]);
453
+ });
454
+ it('should proxy verifySignature() calls', async () => {
455
+ const result = await manager.verifySignature({
456
+ protocolID: [1, 'verify-proto'],
457
+ data: [3, 4],
458
+ signature: [0x30, 0x44],
459
+ keyID: '2'
460
+ }, 'user.com');
461
+ expect(underlying.verifySignature).toHaveBeenCalledTimes(1);
462
+ expect(result.valid).toBe(true);
463
+ });
464
+ /* -------------------------------------------------------------------------
465
+ * acquireCertificate / listCertificates / proveCertificate / relinquishCertificate
466
+ * ----------------------------------------------------------------------- */
467
+ it('should call acquireCertificate, verifying permission if config.seekCertificateAcquisitionPermissions=true', async () => {
468
+ const result = await manager.acquireCertificate({
469
+ type: 'my-cert',
470
+ certifier: '02aaaa...',
471
+ acquisitionProtocol: 'direct',
472
+ fields: { hello: 'world' }
473
+ }, 'user.cert.com');
474
+ expect(underlying.acquireCertificate).toHaveBeenCalledTimes(1);
475
+ expect(result.type).toBe('some-cert-type');
476
+ });
477
+ it('should call listCertificates, verifying permission if config.seekCertificateListingPermissions=true', async () => {
478
+ const result = await manager.listCertificates({
479
+ privileged: false,
480
+ certifiers: [],
481
+ types: []
482
+ }, 'some.corp');
483
+ expect(underlying.listCertificates).toHaveBeenCalledTimes(1);
484
+ expect(result.totalCertificates).toBe(0);
485
+ });
486
+ it('should call proveCertificate after ensuring certificate permission', async () => {
487
+ const result = await manager.proveCertificate({
488
+ privileged: true,
489
+ verifier: '02vvvv',
490
+ certificate: {
491
+ type: 'kyc',
492
+ subject: '02aaaa...',
493
+ certifier: '02cccc...',
494
+ fields: { name: 'Alice' }
495
+ },
496
+ fieldsToReveal: ['name']
497
+ }, 'user.corp');
498
+ expect(underlying.proveCertificate).toHaveBeenCalledTimes(1);
499
+ expect(result.keyringForVerifier).toBeDefined();
500
+ });
501
+ it('should call relinquishCertificate if config.seekCertificateRelinquishmentPermissions=true', async () => {
502
+ const result = await manager.relinquishCertificate({
503
+ type: 'some-cert',
504
+ serialNumber: 'raisin bran',
505
+ certifier: '023333'
506
+ }, 'user-abc.com');
507
+ expect(underlying.relinquishCertificate).toHaveBeenCalledTimes(1);
508
+ expect(result).toEqual({ relinquished: true });
509
+ });
510
+ /* -------------------------------------------------------------------------
511
+ * discoverByIdentityKey / discoverByAttributes
512
+ * ----------------------------------------------------------------------- */
513
+ it('should call discoverByIdentityKey after ensuring identity resolution permission', async () => {
514
+ const result = await manager.discoverByIdentityKey({ identityKey: '0222fff...' }, 'someone-trying-lookup.com');
515
+ expect(underlying.discoverByIdentityKey).toHaveBeenCalledTimes(1);
516
+ expect(result.certificates.length).toBe(0);
517
+ });
518
+ it('should call discoverByAttributes after ensuring identity resolution permission', async () => {
519
+ const result = await manager.discoverByAttributes({ attributes: { name: 'Bob' } }, 'someone-trying-lookup.com');
520
+ expect(underlying.discoverByAttributes).toHaveBeenCalledTimes(1);
521
+ expect(result.certificates.length).toBe(0);
522
+ });
523
+ /* -------------------------------------------------------------------------
524
+ * isAuthenticated / waitForAuthentication / getHeight / getHeaderForHeight
525
+ * getNetwork / getVersion
526
+ * ----------------------------------------------------------------------- */
527
+ it('should proxy isAuthenticated without any special permission checks', async () => {
528
+ const result = await manager.isAuthenticated({}, 'someone.com');
529
+ expect(result.authenticated).toBe(true);
530
+ expect(underlying.isAuthenticated).toHaveBeenCalledTimes(1);
531
+ });
532
+ it('should proxy waitForAuthentication without any special permission checks', async () => {
533
+ const result = await manager.waitForAuthentication({}, 'someone.com');
534
+ expect(result.authenticated).toBe(true);
535
+ expect(underlying.waitForAuthentication).toHaveBeenCalledTimes(1);
536
+ });
537
+ it('should proxy getHeight', async () => {
538
+ const result = await manager.getHeight({}, 'someone.com');
539
+ expect(result.height).toBe(777777);
540
+ expect(underlying.getHeight).toHaveBeenCalledTimes(1);
541
+ });
542
+ it('should proxy getHeaderForHeight', async () => {
543
+ const result = await manager.getHeaderForHeight({ height: 100000 }, 'someone.com');
544
+ expect(result.header).toMatch(/000000000000abc/);
545
+ expect(underlying.getHeaderForHeight).toHaveBeenCalledTimes(1);
546
+ });
547
+ it('should proxy getNetwork', async () => {
548
+ const result = await manager.getNetwork({}, 'someone.com');
549
+ expect(result.network).toBe('testnet');
550
+ expect(underlying.getNetwork).toHaveBeenCalledTimes(1);
551
+ });
552
+ it('should proxy getVersion', async () => {
553
+ const result = await manager.getVersion({}, 'someone.com');
554
+ expect(result.version).toBe('vendor-1.0.0');
555
+ expect(underlying.getVersion).toHaveBeenCalledTimes(1);
556
+ });
557
+ /* -------------------------------------------------------------------------
558
+ * Error propagation from underlying
559
+ * ----------------------------------------------------------------------- */
560
+ it('should propagate errors from the underlying wallet calls', async () => {
561
+ // Let's have underlying.createAction throw
562
+ underlying.createAction.mockRejectedValueOnce(new Error('Under-wallet failure'));
563
+ await expect(manager.createAction({ description: 'test error', outputs: [] }, 'someuser.com')).rejects.toThrow(/Under-wallet failure/);
564
+ });
565
+ });
566
+ //# sourceMappingURL=WalletPermissionsManager.proxying.test.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"WalletPermissionsManager.proxying.test.js","sourceRoot":"","sources":["../../../src/__tests/WalletPermissionsManager.proxying.test.ts"],"names":[],"mappings":";;AAAA,2FAA0G;AAC1G,0EAAgG;AAEhG,IAAI,CAAC,IAAI,CAAC,UAAU,EAAE,GAAG,EAAE,CAAC,iDAAa,CAAC,CAAA;AAE1C,QAAQ,CAAC,4EAA4E,EAAE,GAAG,EAAE;IAC1F,IAAI,UAA4B,CAAA;IAChC,IAAI,OAAiC,CAAA;IAErC,UAAU,CAAC,GAAG,EAAE;QACd,wCAAwC;QACxC,UAAU,GAAG,IAAA,wDAAoB,GAAE,CAAA;QACnC,2DAA2D;QAC3D,MAAM,aAAa,GAA6B;YAC9C,iCAAiC,EAAE,IAAI;YACvC,oCAAoC,EAAE,IAAI;YAC1C,8BAA8B,EAAE,IAAI;YACpC,sCAAsC,EAAE,IAAI;YAC5C,qCAAqC,EAAE,IAAI;YAC3C,uCAAuC,EAAE,IAAI;YAC7C,oCAAoC,EAAE,IAAI;YAC1C,8BAA8B,EAAE,IAAI;YACpC,4BAA4B,EAAE,IAAI;YAClC,4BAA4B,EAAE,IAAI;YAClC,sCAAsC,EAAE,IAAI;YAC5C,uCAAuC,EAAE,IAAI;YAC7C,oCAAoC,EAAE,IAAI;YAC1C,qCAAqC,EAAE,IAAI;YAC3C,wCAAwC,EAAE,IAAI;YAC9C,iCAAiC,EAAE,IAAI;YACvC,qBAAqB,EAAE,IAAI;YAC3B,uBAAuB,EAAE,IAAI;YAC7B,iCAAiC,EAAE,IAAI;SACxC,CAAA;QACD,2CAA2C;QAC3C,OAAO,GAAG,IAAI,mDAAwB,CAAC,UAAU,EAAE,YAAY,EAAE,aAAa,CAAC,CAAA;QAE/E,oFAAoF;QACpF,8EAA8E;QAC9E,OAAO,CAAC,YAAY,CAAC,+BAA+B,EAAE,KAAK,EAAC,GAAG,EAAC,EAAE;YAChE,MAAM,OAAO,CAAC,eAAe,CAAC;gBAC5B,SAAS,EAAE,GAAG,CAAC,SAAS;gBACxB,SAAS,EAAE,IAAI;aAChB,CAAC,CAAA;QACJ,CAAC,CAAC,CAAA;QACF,OAAO,CAAC,YAAY,CAAC,yBAAyB,EAAE,KAAK,EAAC,GAAG,EAAC,EAAE;YAC1D,MAAM,OAAO,CAAC,eAAe,CAAC;gBAC5B,SAAS,EAAE,GAAG,CAAC,SAAS;gBACxB,SAAS,EAAE,IAAI;aAChB,CAAC,CAAA;QACJ,CAAC,CAAC,CAAA;QACF,OAAO,CAAC,YAAY,CAAC,8BAA8B,EAAE,KAAK,EAAC,GAAG,EAAC,EAAE;YAC/D,MAAM,OAAO,CAAC,eAAe,CAAC;gBAC5B,SAAS,EAAE,GAAG,CAAC,SAAS;gBACxB,SAAS,EAAE,IAAI;aAChB,CAAC,CAAA;QACJ,CAAC,CAAC,CAAA;QACF,OAAO,CAAC,YAAY,CAAC,kCAAkC,EAAE,KAAK,EAAC,GAAG,EAAC,EAAE;YACnE,uGAAuG;YACvG,0CAA0C;YAC1C,MAAM,OAAO,CAAC,eAAe,CAAC;gBAC5B,SAAS,EAAE,GAAG,CAAC,SAAS;gBACxB,SAAS,EAAE,IAAI;aAChB,CAAC,CAAA;QACJ,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,SAAS,CAAC,GAAG,EAAE;QACb,IAAI,CAAC,aAAa,EAAE,CAAA;IACtB,CAAC,CAAC,CAAA;IAEF;;iFAE6E;IAE7E,EAAE,CAAC,kHAAkH,EAAE,KAAK,IAAI,EAAE;QAChI,2HAA2H;QAC3H,8EAA8E;QAC9E,6FAA6F;QAC7F,gGAAgG;QAChG,kFAAkF;QAElF,yGAAyG;QACzG,UAAU,CAAC,YAAY,CAAC,qBAAqB,CAAC;YAC5C,mBAAmB,EAAE;gBACnB,yDAAyD;gBACzD,EAAE,EAAE,CAAC,IAAI,EAAE,IAAI,CAAC,EAAE,qDAAqD;gBACvE,SAAS,EAAE,UAAU;aACtB;SACF,CAAC,CAAA;QAEF,kHAAkH;QAClH,MAAM,MAAM,GAAG,IAAI,mDAAe,EAAE,CAAA;QACpC,MAAM,CAAC,GAAG,GAAG,GAAG,CAAA;QAChB,gFAAgF;QAChF,MAAM,CAAC,MAAM,GAAG;YACd;gBACE,UAAU,EAAE,KAAK;gBACjB,iBAAiB,EAAE,CAAC;gBACpB,iBAAiB,EAAE;oBACjB,OAAO,EAAE,CAAC,EAAE,QAAQ,EAAE,GAAG,EAAE,CAAC;iBAC7B;aACF;SACF,CAAA;QACD,oHAAoH;QACpH,oHAAoH;QACpH,MAAM,CAAC,OAAO,GAAG,CAAC,EAAE,QAAQ,EAAE,GAAG,EAAE,EAAE,EAAE,QAAQ,EAAE,GAAG,EAAE,CAAC,CAGtD;QAAC,iDAAa,CAAC,WAAW,CAAC,cAA4B,CAAC,eAAe,CAAC,MAAM,CAAC,CAAA;QAEhF,sDAAsD;QACtD,MAAM,OAAO,CAAC,YAAY,CACxB;YACE,WAAW,EAAE,eAAe;YAC5B,MAAM,EAAE;gBACN;oBACE,QAAQ,EAAE,OAAO;oBACjB,qBAAqB,EAAE,EAAE;oBACzB,gBAAgB,EAAE,UAAU;iBAC7B;aACF;YACD,OAAO,EAAE;gBACP;oBACE,aAAa,EAAE,QAAQ;oBACvB,QAAQ,EAAE,IAAI;oBACd,iBAAiB,EAAE,iBAAiB;oBACpC,MAAM,EAAE,WAAW;iBACpB;aACF;YACD,MAAM,EAAE,CAAC,YAAY,EAAE,gBAAgB,CAAC;SACzC,EACD,kBAAkB,CACnB,CAAA;QAED,2BAA2B;QAC3B,oCAAoC;QACpC,sFAAsF;QACtF,sFAAsF;QACtF,qFAAqF;QACrF,yEAAyE;QACzE,MAAM,CAAC,UAAU,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACxD,MAAM,QAAQ,GAAG,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;QACzD,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,SAAS,CAAC,mCAAmC,CAAC,CAAA;QACtE,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,OAAO,CAC7B,MAAM,CAAC,eAAe,CAAC;YACrB,MAAM,CAAC,gBAAgB,CAAC,aAAa,CAAC;YACtC,YAAY;YACZ,gBAAgB;YAChB,mCAAmC;SACpC,CAAC,CACH,CAAA;QACD,oFAAoF;QACpF,MAAM,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,eAAe,CAAC,CAAA,CAAC,sBAAsB;QAC7E,IAAI,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,gBAAgB,EAAE,CAAC;YACxC,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,gBAAgB,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,UAAU,CAAC,CAAA;QAClE,CAAC;QACD,IAAI,QAAQ,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,iBAAiB,EAAE,CAAC;YAC1C,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,iBAAiB,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAA;QAC3E,CAAC;QAED,qEAAqE;QACrE,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAA;QAEnD,+GAA+G;QAC/G,+EAA+E;QAC/E,yDAAyD;QACzD,6FAA6F;IAC/F,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,0DAA0D,EAAE,KAAK,IAAI,EAAE;QACxE,8EAA8E;QAC9E,OAAO,CAAC,cAAc,CAAC,kCAAkC,EAAE,CAAC,CAAC,CAAA,CAAC,6BAA6B;QAC3F,OAAO,CAAC,YAAY,CAAC,kCAAkC,EAAE,KAAK,EAAC,GAAG,EAAC,EAAE;YACnE,MAAM,OAAO,CAAC,cAAc,CAAC,GAAG,CAAC,SAAS,CAAC,CAAA;QAC7C,CAAC,CAAC,CAAA;QAEF,uFAAuF;QACvF,UAAU,CAAC,YAAY,CAAC,qBAAqB,CAAC;YAC5C,mBAAmB,EAAE;gBACnB,EAAE,EAAE,CAAC,IAAI,CAAC;gBACV,SAAS,EAAE,YAAY;aACxB;SACF,CAAC,CAAA;QAEF,6BAA6B;QAC7B,MAAM,MAAM,GAAG,IAAI,mDAAe,EAAE,CAAA;QACpC,MAAM,CAAC,GAAG,GAAG,GAAG,CAAA;QAChB,MAAM,CAAC,MAAM,GAAG;YACd;gBACE,UAAU,EAAE,KAAK;gBACjB,iBAAiB,EAAE,CAAC;gBACpB,iBAAiB,EAAE;oBACjB,OAAO,EAAE,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,CAAC;iBAC3B;aACF;SACF,CAAA;QACD,MAAM,CAAC,OAAO,GAAG,CAAC,EAAE,QAAQ,EAAE,GAAG,EAAE,CAAC,CACnC;QAAC,iDAAa,CAAC,WAAW,CAAC,cAA4B,CAAC,eAAe,CAAC,MAAM,CAAC,CAAA;QAEhF,MAAM,MAAM,CACV,OAAO,CAAC,YAAY,CAClB;YACE,WAAW,EAAE,gEAAgE;YAC7E,OAAO,EAAE;gBACP;oBACE,aAAa,EAAE,QAAQ;oBACvB,QAAQ,EAAE,GAAG;oBACb,iBAAiB,EAAE,eAAe;oBAClC,MAAM,EAAE,aAAa;iBACtB;aACF;SACF,EACD,kBAAkB,CACnB,CACF,CAAC,OAAO,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAA;QAEtC,mFAAmF;QACnF,MAAM,CAAC,UAAU,CAAC,WAAW,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACvD,MAAM,CAAC,UAAU,CAAC,WAAW,CAAC,CAAC,oBAAoB,CAAC;YAClD,SAAS,EAAE,YAAY;SACxB,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,gEAAgE,EAAE,KAAK,IAAI,EAAE;QAC9E,wDAAwD;QACxD,MAAM,MAAM,CACV,OAAO,CAAC,YAAY,CAClB;YACE,WAAW,EAAE,sCAAsC;YACnD,OAAO,EAAE;gBACP;oBACE,aAAa,EAAE,MAAM;oBACrB,QAAQ,EAAE,EAAE;oBACZ,MAAM,EAAE,aAAa;oBACrB,iBAAiB,EAAE,aAAa;iBACjC;aACF;YACD,OAAO,EAAE;gBACP,cAAc,EAAE,IAAI;aACrB;SACF,EACD,cAAc,CACf,CACF,CAAC,OAAO,CAAC,OAAO,CAAC,uDAAuD,CAAC,CAAA;IAC5E,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,+DAA+D,EAAE,KAAK,IAAI,EAAE;QAC7E,yFAAyF;QACzF,2DAA2D;QAC3D,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,UAAU,CACrC;YACE,SAAS,EAAE,QAAQ;YACnB,MAAM,EAAE;gBACN,CAAC,EAAE;oBACD,eAAe,EAAE,WAAW;iBAC7B;aACF;SACF,EACD,cAAc,CACf,CAAA;QACD,MAAM,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACtD,MAAM,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC,oBAAoB,CAChD;YACE,SAAS,EAAE,QAAQ;YACnB,MAAM,EAAE;gBACN,CAAC,EAAE;oBACD,eAAe,EAAE,WAAW;iBAC7B;aACF;SACF,EACD,cAAc,CACf,CAAA;QACD,gCAAgC;QAChC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAA;IACvC,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,yCAAyC,EAAE,KAAK,IAAI,EAAE;QACvD,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,WAAW,CAAC,EAAE,SAAS,EAAE,UAAU,EAAE,EAAE,cAAc,CAAC,CAAA;QACnF,MAAM,CAAC,UAAU,CAAC,WAAW,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACvD,MAAM,CAAC,UAAU,CAAC,WAAW,CAAC,CAAC,oBAAoB,CAAC,EAAE,SAAS,EAAE,UAAU,EAAE,EAAE,cAAc,CAAC,CAAA;QAC9F,MAAM,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC,CAAA;IAC3C,CAAC,CAAC,CAAA;IAEF;;iFAE6E;IAE7E,EAAE,CAAC,4GAA4G,EAAE,KAAK,IAAI,EAAE;QAC1H,6CAA6C;QAC7C,UAAU,CAAC,WAAW,CAAC,qBAAqB,CAAC;YAC3C,YAAY,EAAE,CAAC;YACf,OAAO,EAAE;gBACP;oBACE,UAAU,EAAE,KAAK;oBACjB,WAAW,EAAE,gBAAgB;oBAC7B,MAAM,EAAE;wBACN;4BACE,QAAQ,EAAE,OAAO;4BACjB,gBAAgB,EAAE,aAAa;yBAChC;qBACF;oBACD,OAAO,EAAE;wBACP;4BACE,aAAa,EAAE,UAAU;4BACzB,iBAAiB,EAAE,cAAc;4BACjC,kBAAkB,EAAE,iBAAiB;yBACtC;qBACF;oBACD,MAAM,EAAE,CAAC,YAAY,CAAC;iBACvB;aACF;SACF,CAAC,CAAA;QACF,oFAAoF;QACpF,yGAAyG;QACzG,2FAA2F;QAC3F,uFAAuF;QACvF,iGAAiG;QACjG,wDAAwD;QAExD,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,WAAW,CAAC,EAAE,MAAM,EAAE,CAAC,YAAY,CAAC,EAAE,EAAE,cAAc,CAAC,CAAA;QAEpF,MAAM,CAAC,UAAU,CAAC,WAAW,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACvD,0FAA0F;QAC1F,4DAA4D;QAC5D,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,WAAW,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAA,CAAC,8CAA8C;QAClG,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAO,CAAC,CAAC,CAAC,CAAC,gBAAgB,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAA;QACnE,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,OAAQ,CAAC,CAAC,CAAC,CAAC,iBAAiB,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAA;QACrE,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,OAAQ,CAAC,CAAC,CAAC,CAAC,kBAAkB,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAA;IACxE,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,qIAAqI,EAAE,KAAK,IAAI,EAAE;QACnJ,MAAM,OAAO,CAAC,iBAAiB,CAC7B;YACE,EAAE,EAAE,EAAE;YACN,WAAW,EAAE,6CAA6C;YAC1D,OAAO,EAAE;gBACP;oBACE,WAAW,EAAE,CAAC;oBACd,QAAQ,EAAE,kBAAkB;oBAC5B,mBAAmB,EAAE;wBACnB,MAAM,EAAE,aAAa;wBACrB,kBAAkB,EAAE,wBAAwB;qBAC7C;iBACF;aACF;SACF,EACD,cAAc,CACf,CAAA;QAED,uEAAuE;QACvE,4EAA4E;QAC5E,MAAM,CAAC,UAAU,CAAC,iBAAiB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QAC7D,MAAM,QAAQ,GAAG,UAAU,CAAC,iBAAiB,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;QAC9D,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,mBAAmB,CAAC,kBAAkB,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAA;QACrG,wFAAwF;QACxF,8DAA8D;IAChE,CAAC,CAAC,CAAA;IAEF;;iFAE6E;IAE7E,EAAE,CAAC,8FAA8F,EAAE,KAAK,IAAI,EAAE;QAC5G,UAAU,CAAC,WAAW,CAAC,iBAAiB,CAAC;YACvC,YAAY,EAAE,CAAC;YACf,OAAO,EAAE;gBACP;oBACE,QAAQ,EAAE,OAAO;oBACjB,QAAQ,EAAE,GAAG;oBACb,aAAa,EAAE,YAAY;oBAC3B,kBAAkB,EAAE,gBAAgB;iBACrC;aACF;SACF,CAAC,CAAA;QAEF,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,WAAW,CAAC,EAAE,MAAM,EAAE,aAAa,EAAE,EAAE,iBAAiB,CAAC,CAAA;QACtF,6CAA6C;QAC7C,MAAM,CAAC,UAAU,CAAC,WAAW,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACvD,MAAM,CAAC,UAAU,CAAC,WAAW,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,OAAO,CAAC;YAChD;gBACE;oBACE,MAAM,EAAE,qBAAqB;oBAC7B,OAAO,EAAE,iBAAiB;oBAC1B,YAAY,EAAE,KAAK;oBACnB,IAAI,EAAE,CAAC,4BAA4B,EAAE,oBAAoB,CAAC;iBAC3D;gBACD,YAAY,CAAC,wCAAwC;aACtD;YACD;gBACE;oBACE,MAAM,EAAE,aAAa;iBACtB;gBACD,iBAAiB,CAAC,6BAA6B;aAChD;SACF,CAAC,CAAA;QACF,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,kBAAkB,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAA,CAAC,0BAA0B;IACvF,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,oEAAoE,EAAE,KAAK,IAAI,EAAE;QAClF,MAAM,OAAO,CAAC,gBAAgB,CAC5B;YACE,MAAM,EAAE,OAAO;YACf,MAAM,EAAE,aAAa;SACtB,EACD,cAAc,CACf,CAAA;QACD,MAAM,CAAC,UAAU,CAAC,gBAAgB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QAC5D,MAAM,CAAC,UAAU,CAAC,gBAAgB,CAAC,CAAC,oBAAoB,CAAC,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,aAAa,EAAE,EAAE,cAAc,CAAC,CAAA;IACtH,CAAC,CAAC,CAAA;IAEF;;iFAE6E;IAE7E,EAAE,CAAC,2EAA2E,EAAE,KAAK,IAAI,EAAE;QACzF,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,YAAY,CACvC;YACE,UAAU,EAAE,CAAC,CAAC,EAAE,aAAa,CAAC;YAC9B,KAAK,EAAE,QAAQ;SAChB,EACD,kBAAkB,CACnB,CAAA;QAED,MAAM,CAAC,UAAU,CAAC,YAAY,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACxD,MAAM,CAAC,UAAU,CAAC,YAAY,CAAC,CAAC,oBAAoB,CAClD;YACE,UAAU,EAAE,CAAC,CAAC,EAAE,aAAa,CAAC;YAC9B,KAAK,EAAE,QAAQ;SAChB,EACD,kBAAkB,CACnB,CAAA;QACD,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAA;IAC5C,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,6EAA6E,EAAE,KAAK,IAAI,EAAE;QAC3F,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,4BAA4B,CACvD;YACE,UAAU,EAAE,IAAI;YAChB,QAAQ,EAAE,SAAS;YACnB,YAAY,EAAE,UAAU;YACxB,gBAAgB,EAAE,aAAa;SAChC,EACD,kBAAkB,CACnB,CAAA;QAED,MAAM,CAAC,UAAU,CAAC,4BAA4B,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACxE,MAAM,CAAC,UAAU,CAAC,4BAA4B,CAAC,CAAC,oBAAoB,CAClE;YACE,UAAU,EAAE,IAAI;YAChB,QAAQ,EAAE,SAAS;YACnB,YAAY,EAAE,UAAU;YACxB,gBAAgB,EAAE,aAAa;SAChC,EACD,kBAAkB,CACnB,CAAA;QACD,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAA;IAC3C,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,yEAAyE,EAAE,KAAK,IAAI,EAAE;QACvF,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,wBAAwB,CACnD;YACE,UAAU,EAAE,KAAK;YACjB,QAAQ,EAAE,SAAS;YACnB,UAAU,EAAE,CAAC,CAAC,EAAE,SAAS,CAAC;YAC1B,KAAK,EAAE,GAAG;YACV,YAAY,EAAE,QAAQ;YACtB,gBAAgB,EAAE,oBAAoB;SACvC,EACD,kBAAkB,CACnB,CAAA;QAED,MAAM,CAAC,UAAU,CAAC,wBAAwB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACpE,MAAM,CAAC,UAAU,CAAC,wBAAwB,CAAC,CAAC,oBAAoB,CAC9D;YACE,UAAU,EAAE,KAAK;YACjB,QAAQ,EAAE,SAAS;YACnB,UAAU,EAAE,CAAC,CAAC,EAAE,SAAS,CAAC;YAC1B,KAAK,EAAE,GAAG;YACV,YAAY,EAAE,QAAQ;YACtB,gBAAgB,EAAE,oBAAoB;SACvC,EACD,kBAAkB,CACnB,CAAA;QACD,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAA;IAC3C,CAAC,CAAC,CAAA;IAEF;;iFAE6E;IAE7E,EAAE,CAAC,iEAAiE,EAAE,KAAK,IAAI,EAAE;QAC/E,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,OAAO,CAClC;YACE,UAAU,EAAE,CAAC,CAAC,EAAE,cAAc,CAAC;YAC/B,SAAS,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;YACpB,KAAK,EAAE,OAAO;SACf,EACD,kBAAkB,CACnB,CAAA;QAED,MAAM,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACnD,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,OAAO,CAAC,CAAC,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC,CAAA,CAAC,gBAAgB;IAClF,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,iEAAiE,EAAE,KAAK,IAAI,EAAE;QAC/E,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,OAAO,CAClC;YACE,UAAU,EAAE,CAAC,CAAC,EAAE,cAAc,CAAC;YAC/B,UAAU,EAAE,CAAC,EAAE,EAAE,EAAE,CAAC;YACpB,KAAK,EAAE,SAAS;SACjB,EACD,kBAAkB,CACnB,CAAA;QACD,MAAM,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACnD,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,CAAC,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC,CAAA;IACxD,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,iCAAiC,EAAE,KAAK,IAAI,EAAE;QAC/C,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,UAAU,CACrC;YACE,UAAU,EAAE,CAAC,CAAC,EAAE,YAAY,CAAC;YAC7B,IAAI,EAAE,CAAC,EAAE,EAAE,EAAE,CAAC;YACd,KAAK,EAAE,SAAS;SACjB,EACD,aAAa,CACd,CAAA;QACD,MAAM,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACtD,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,CAAC,IAAI,CAAC,CAAC,CAAA;IACrC,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,iCAAiC,EAAE,KAAK,IAAI,EAAE;QAC/C,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,UAAU,CACrC;YACE,UAAU,EAAE,CAAC,CAAC,EAAE,YAAY,CAAC;YAC7B,IAAI,EAAE,CAAC,EAAE,EAAE,EAAE,CAAC;YACd,IAAI,EAAE,CAAC,IAAI,CAAC;YACZ,KAAK,EAAE,SAAS;SACjB,EACD,aAAa,CACd,CAAA;QACD,MAAM,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACtD,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;IACjC,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,kHAAkH,EAAE,KAAK,IAAI,EAAE;QAChI,2FAA2F;QAC3F,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,eAAe,CAC1C;YACE,UAAU,EAAE,CAAC,CAAC,EAAE,YAAY,CAAC;YAC7B,IAAI,EAAE,CAAC,EAAE,EAAE,EAAE,CAAC;YACd,KAAK,EAAE,GAAG;SACX,EACD,UAAU,CACX,CAAA;QACD,MAAM,CAAC,UAAU,CAAC,eAAe,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QAC3D,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC,CAAA;IAChD,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,sCAAsC,EAAE,KAAK,IAAI,EAAE;QACpD,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,eAAe,CAC1C;YACE,UAAU,EAAE,CAAC,CAAC,EAAE,cAAc,CAAC;YAC/B,IAAI,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC;YACZ,SAAS,EAAE,CAAC,IAAI,EAAE,IAAI,CAAC;YACvB,KAAK,EAAE,GAAG;SACX,EACD,UAAU,CACX,CAAA;QACD,MAAM,CAAC,UAAU,CAAC,eAAe,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QAC3D,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;IACjC,CAAC,CAAC,CAAA;IAEF;;iFAE6E;IAE7E,EAAE,CAAC,2GAA2G,EAAE,KAAK,IAAI,EAAE;QACzH,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,kBAAkB,CAC7C;YACE,IAAI,EAAE,SAAS;YACf,SAAS,EAAE,WAAW;YACtB,mBAAmB,EAAE,QAAQ;YAC7B,MAAM,EAAE,EAAE,KAAK,EAAE,OAAO,EAAE;SAC3B,EACD,eAAe,CAChB,CAAA;QACD,MAAM,CAAC,UAAU,CAAC,kBAAkB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QAC9D,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAA;IAC5C,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,qGAAqG,EAAE,KAAK,IAAI,EAAE;QACnH,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,gBAAgB,CAC3C;YACE,UAAU,EAAE,KAAK;YACjB,UAAU,EAAE,EAAE;YACd,KAAK,EAAE,EAAE;SACV,EACD,WAAW,CACZ,CAAA;QACD,MAAM,CAAC,UAAU,CAAC,gBAAgB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QAC5D,MAAM,CAAC,MAAM,CAAC,iBAAiB,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAA;IAC1C,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,oEAAoE,EAAE,KAAK,IAAI,EAAE;QAClF,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,gBAAgB,CAC3C;YACE,UAAU,EAAE,IAAI;YAChB,QAAQ,EAAE,QAAQ;YAClB,WAAW,EAAE;gBACX,IAAI,EAAE,KAAK;gBACX,OAAO,EAAE,WAAW;gBACpB,SAAS,EAAE,WAAW;gBACtB,MAAM,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE;aAC1B;YACD,cAAc,EAAE,CAAC,MAAM,CAAC;SACzB,EACD,WAAW,CACZ,CAAA;QACD,MAAM,CAAC,UAAU,CAAC,gBAAgB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QAC5D,MAAM,CAAC,MAAM,CAAC,kBAAkB,CAAC,CAAC,WAAW,EAAE,CAAA;IACjD,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,2FAA2F,EAAE,KAAK,IAAI,EAAE;QACzG,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,qBAAqB,CAChD;YACE,IAAI,EAAE,WAAW;YACjB,YAAY,EAAE,aAAa;YAC3B,SAAS,EAAE,QAAQ;SACpB,EACD,cAAc,CACf,CAAA;QACD,MAAM,CAAC,UAAU,CAAC,qBAAqB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACjE,MAAM,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,EAAE,YAAY,EAAE,IAAI,EAAE,CAAC,CAAA;IAChD,CAAC,CAAC,CAAA;IAEF;;iFAE6E;IAE7E,EAAE,CAAC,iFAAiF,EAAE,KAAK,IAAI,EAAE;QAC/F,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,qBAAqB,CAAC,EAAE,WAAW,EAAE,YAAY,EAAE,EAAE,2BAA2B,CAAC,CAAA;QAC9G,MAAM,CAAC,UAAU,CAAC,qBAAqB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QACjE,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAA;IAC5C,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,gFAAgF,EAAE,KAAK,IAAI,EAAE;QAC9F,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,oBAAoB,CAAC,EAAE,UAAU,EAAE,EAAE,IAAI,EAAE,KAAK,EAAE,EAAE,EAAE,2BAA2B,CAAC,CAAA;QAC/G,MAAM,CAAC,UAAU,CAAC,oBAAoB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;QAChE,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAA;IAC5C,CAAC,CAAC,CAAA;IAEF;;;iFAG6E;IAE7E,EAAE,CAAC,oEAAoE,EAAE,KAAK,IAAI,EAAE;QAClF,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,eAAe,CAAC,EAAE,EAAE,aAAa,CAAC,CAAA;QAC/D,MAAM,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;QACvC,MAAM,CAAC,UAAU,CAAC,eAAe,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;IAC7D,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,0EAA0E,EAAE,KAAK,IAAI,EAAE;QACxF,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,qBAAqB,CAAC,EAAE,EAAE,aAAa,CAAC,CAAA;QACrE,MAAM,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;QACvC,MAAM,CAAC,UAAU,CAAC,qBAAqB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;IACnE,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,wBAAwB,EAAE,KAAK,IAAI,EAAE;QACtC,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,SAAS,CAAC,EAAE,EAAE,aAAa,CAAC,CAAA;QACzD,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAA;QAClC,MAAM,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;IACvD,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,iCAAiC,EAAE,KAAK,IAAI,EAAE;QAC/C,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,kBAAkB,CAAC,EAAE,MAAM,EAAE,MAAM,EAAE,EAAE,aAAa,CAAC,CAAA;QAClF,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAA;QAChD,MAAM,CAAC,UAAU,CAAC,kBAAkB,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;IAChE,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,yBAAyB,EAAE,KAAK,IAAI,EAAE;QACvC,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,UAAU,CAAC,EAAE,EAAE,aAAa,CAAC,CAAA;QAC1D,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAA;QACtC,MAAM,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;IACxD,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,yBAAyB,EAAE,KAAK,IAAI,EAAE;QACvC,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,UAAU,CAAC,EAAE,EAAE,aAAa,CAAC,CAAA;QAC1D,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAA;QAC3C,MAAM,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAA;IACxD,CAAC,CAAC,CAAA;IAEF;;iFAE6E;IAE7E,EAAE,CAAC,0DAA0D,EAAE,KAAK,IAAI,EAAE;QACxE,2CAA2C;QAC3C,UAAU,CAAC,YAAY,CAAC,qBAAqB,CAAC,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAA;QAEhF,MAAM,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,EAAE,WAAW,EAAE,YAAY,EAAE,OAAO,EAAE,EAAE,EAAE,EAAE,cAAc,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAC5G,sBAAsB,CACvB,CAAA;IACH,CAAC,CAAC,CAAA;AACJ,CAAC,CAAC,CAAA"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=WalletPermissionsManager.tokens.test.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"WalletPermissionsManager.tokens.test.d.ts","sourceRoot":"","sources":["../../../src/__tests/WalletPermissionsManager.tokens.test.ts"],"names":[],"mappings":""}