@ledgerhq/context-module 1.15.0 → 1.16.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (301) hide show
  1. package/README.md +10 -0
  2. package/lib/cjs/package.json +2 -2
  3. package/lib/cjs/src/ContextModule.js +1 -1
  4. package/lib/cjs/src/ContextModule.js.map +1 -1
  5. package/lib/cjs/src/ContextModuleBuilder.js +1 -1
  6. package/lib/cjs/src/ContextModuleBuilder.js.map +3 -3
  7. package/lib/cjs/src/ContextModuleBuilder.test.js +1 -1
  8. package/lib/cjs/src/ContextModuleBuilder.test.js.map +3 -3
  9. package/lib/cjs/src/DefaultContextModule.js +1 -1
  10. package/lib/cjs/src/DefaultContextModule.js.map +3 -3
  11. package/lib/cjs/src/DefaultContextModule.test.js +1 -1
  12. package/lib/cjs/src/DefaultContextModule.test.js.map +2 -2
  13. package/lib/cjs/src/calldata/data/HttpCalldataDescriptorDataSource.js +1 -1
  14. package/lib/cjs/src/calldata/data/HttpCalldataDescriptorDataSource.js.map +2 -2
  15. package/lib/cjs/src/calldata/data/HttpCalldataDescriptorDataSource.test.js.map +1 -1
  16. package/lib/cjs/src/config/di/configModuleFactory.js +1 -1
  17. package/lib/cjs/src/config/di/configModuleFactory.js.map +2 -2
  18. package/lib/cjs/src/config/model/ContextModuleConfig.js +1 -1
  19. package/lib/cjs/src/config/model/ContextModuleConfig.js.map +1 -1
  20. package/lib/cjs/src/di.js +1 -1
  21. package/lib/cjs/src/di.js.map +3 -3
  22. package/lib/cjs/src/dynamic-network/data/HttpDynamicNetworkDataSource.js +1 -1
  23. package/lib/cjs/src/dynamic-network/data/HttpDynamicNetworkDataSource.js.map +2 -2
  24. package/lib/cjs/src/dynamic-network/data/HttpDynamicNetworkDataSource.test.js.map +2 -2
  25. package/lib/cjs/src/dynamic-network/domain/DynamicNetworkContextLoader.js +1 -1
  26. package/lib/cjs/src/dynamic-network/domain/DynamicNetworkContextLoader.js.map +1 -1
  27. package/lib/cjs/src/dynamic-network/domain/DynamicNetworkContextLoader.test.js.map +1 -1
  28. package/lib/cjs/src/external-plugin/data/HttpExternalPluginDataSource.js +1 -1
  29. package/lib/cjs/src/external-plugin/data/HttpExternalPluginDataSource.js.map +2 -2
  30. package/lib/cjs/src/external-plugin/data/HttpExternalPluginDataSource.test.js +1 -1
  31. package/lib/cjs/src/external-plugin/data/HttpExternalPluginDataSource.test.js.map +1 -1
  32. package/lib/cjs/src/gated-signing/data/HttpGatedDescriptorDataSource.js +1 -1
  33. package/lib/cjs/src/gated-signing/data/HttpGatedDescriptorDataSource.js.map +2 -2
  34. package/lib/cjs/src/gated-signing/data/HttpGatedDescriptorDataSource.test.js +1 -1
  35. package/lib/cjs/src/gated-signing/data/HttpGatedDescriptorDataSource.test.js.map +2 -2
  36. package/lib/cjs/src/index.js +1 -1
  37. package/lib/cjs/src/index.js.map +2 -2
  38. package/lib/cjs/src/nft/data/HttpNftDataSource.js +1 -1
  39. package/lib/cjs/src/nft/data/HttpNftDataSource.js.map +2 -2
  40. package/lib/cjs/src/nft/data/HttpNftDataSource.test.js +1 -1
  41. package/lib/cjs/src/nft/data/HttpNftDataSource.test.js.map +1 -1
  42. package/lib/cjs/src/pki/data/HttpPkiCertificateDataSource.js +1 -1
  43. package/lib/cjs/src/pki/data/HttpPkiCertificateDataSource.js.map +2 -2
  44. package/lib/cjs/src/pki/data/HttpPkiCertificateDataSource.test.js.map +1 -1
  45. package/lib/cjs/src/proxy/data/HttpProxyDataSource.js +1 -1
  46. package/lib/cjs/src/proxy/data/HttpProxyDataSource.js.map +2 -2
  47. package/lib/cjs/src/proxy/data/HttpProxyDataSource.test.js.map +1 -1
  48. package/lib/cjs/src/proxy/data/HttpSafeProxyDataSource.js +1 -1
  49. package/lib/cjs/src/proxy/data/HttpSafeProxyDataSource.js.map +2 -2
  50. package/lib/cjs/src/proxy/data/HttpSafeProxyDataSource.test.js.map +1 -1
  51. package/lib/cjs/src/proxy/di/proxyModuleFactory.js +1 -1
  52. package/lib/cjs/src/proxy/di/proxyModuleFactory.js.map +3 -3
  53. package/lib/cjs/src/proxy/di/proxyModuleFactory.test.js +1 -1
  54. package/lib/cjs/src/proxy/di/proxyModuleFactory.test.js.map +2 -2
  55. package/lib/cjs/src/reporter/data/BlindSigningReporterDatasource.js +2 -0
  56. package/lib/cjs/src/reporter/data/BlindSigningReporterDatasource.js.map +7 -0
  57. package/lib/cjs/src/reporter/data/HttpBlindSigningReporterDatasource.js +2 -0
  58. package/lib/cjs/src/reporter/data/HttpBlindSigningReporterDatasource.js.map +7 -0
  59. package/lib/cjs/src/reporter/data/HttpBlindSigningReporterDatasource.test.js +2 -0
  60. package/lib/cjs/src/reporter/data/HttpBlindSigningReporterDatasource.test.js.map +7 -0
  61. package/lib/cjs/src/reporter/data/dto/BlindSigningEventDto.js +2 -0
  62. package/lib/cjs/src/reporter/data/dto/BlindSigningEventDto.js.map +7 -0
  63. package/lib/cjs/src/reporter/di/reporterModuleFactory.js +2 -0
  64. package/lib/cjs/src/reporter/di/reporterModuleFactory.js.map +7 -0
  65. package/lib/cjs/src/reporter/di/reporterTypes.js +2 -0
  66. package/lib/cjs/src/reporter/di/reporterTypes.js.map +7 -0
  67. package/lib/cjs/src/reporter/domain/BlindSigningReporter.js +2 -0
  68. package/lib/cjs/src/reporter/domain/BlindSigningReporter.js.map +7 -0
  69. package/lib/cjs/src/reporter/domain/DefaultBlindSigningReporter.js +2 -0
  70. package/lib/cjs/src/reporter/domain/DefaultBlindSigningReporter.js.map +7 -0
  71. package/lib/cjs/src/reporter/domain/DefaultBlindSigningReporter.test.js +2 -0
  72. package/lib/cjs/src/reporter/domain/DefaultBlindSigningReporter.test.js.map +7 -0
  73. package/lib/cjs/src/reporter/model/BlindSigningEvent.js +2 -0
  74. package/lib/cjs/src/reporter/model/BlindSigningEvent.js.map +7 -0
  75. package/lib/cjs/src/reporter/model/BlindSigningModelId.js +2 -0
  76. package/lib/cjs/src/reporter/model/BlindSigningModelId.js.map +7 -0
  77. package/lib/cjs/src/safe/data/HttpSafeAccountDataSource.js +1 -1
  78. package/lib/cjs/src/safe/data/HttpSafeAccountDataSource.js.map +2 -2
  79. package/lib/cjs/src/safe/data/HttpSafeAccountDataSource.test.js +1 -1
  80. package/lib/cjs/src/safe/data/HttpSafeAccountDataSource.test.js.map +2 -2
  81. package/lib/cjs/src/solana/data/HttpSolanaOwnerInfoDataSource.js +1 -1
  82. package/lib/cjs/src/solana/data/HttpSolanaOwnerInfoDataSource.js.map +2 -2
  83. package/lib/cjs/src/solana/data/HttpSolanaOwnerInfoDataSource.test.js +1 -1
  84. package/lib/cjs/src/solana/data/HttpSolanaOwnerInfoDataSource.test.js.map +1 -1
  85. package/lib/cjs/src/solana/domain/DefaultSolanaContextLoader.test.js +1 -1
  86. package/lib/cjs/src/solana/domain/DefaultSolanaContextLoader.test.js.map +1 -1
  87. package/lib/cjs/src/solanaLifi/data/HttpSolanaLifiDataSource.js +1 -1
  88. package/lib/cjs/src/solanaLifi/data/HttpSolanaLifiDataSource.js.map +2 -2
  89. package/lib/cjs/src/solanaLifi/data/HttpSolanaLifiDataSource.test.js +1 -1
  90. package/lib/cjs/src/solanaLifi/data/HttpSolanaLifiDataSource.test.js.map +2 -2
  91. package/lib/cjs/src/solanaLifi/domain/SolanaLifiContextLoader.js.map +1 -1
  92. package/lib/cjs/src/solanaLifi/domain/SolanaLifiContextLoader.test.js.map +1 -1
  93. package/lib/cjs/src/solanaToken/data/HttpSolanaTokenDataSource.js +1 -1
  94. package/lib/cjs/src/solanaToken/data/HttpSolanaTokenDataSource.js.map +2 -2
  95. package/lib/cjs/src/solanaToken/data/HttpSolanaTokenDataSource.test.js +2 -2
  96. package/lib/cjs/src/solanaToken/data/HttpSolanaTokenDataSource.test.js.map +2 -2
  97. package/lib/cjs/src/solanaToken/domain/SolanaTokenContextLoader.js +1 -1
  98. package/lib/cjs/src/solanaToken/domain/SolanaTokenContextLoader.js.map +2 -2
  99. package/lib/cjs/src/solanaToken/domain/SolanaTokenContextLoader.test.js +1 -1
  100. package/lib/cjs/src/solanaToken/domain/SolanaTokenContextLoader.test.js.map +1 -1
  101. package/lib/cjs/src/token/data/HttpTokenDataSource.js +1 -1
  102. package/lib/cjs/src/token/data/HttpTokenDataSource.js.map +2 -2
  103. package/lib/cjs/src/token/data/HttpTokenDataSource.test.js.map +1 -1
  104. package/lib/cjs/src/transaction-check/data/HttpTransactionCheckDataSource.js +1 -1
  105. package/lib/cjs/src/transaction-check/data/HttpTransactionCheckDataSource.js.map +2 -2
  106. package/lib/cjs/src/transaction-check/data/HttpTransactionCheckDataSource.test.js.map +1 -1
  107. package/lib/cjs/src/transaction-check/data/HttpTypedDataCheckDataSource.js.map +2 -2
  108. package/lib/cjs/src/transaction-check/data/HttpTypedDataCheckDataSource.test.js.map +1 -1
  109. package/lib/cjs/src/trusted-name/data/HttpTrustedNameDataSource.js +1 -1
  110. package/lib/cjs/src/trusted-name/data/HttpTrustedNameDataSource.js.map +2 -2
  111. package/lib/cjs/src/trusted-name/data/HttpTrustedNameDataSource.test.js.map +1 -1
  112. package/lib/cjs/src/trusted-name/di/trustedNameModuleFactory.js +1 -1
  113. package/lib/cjs/src/trusted-name/di/trustedNameModuleFactory.js.map +3 -3
  114. package/lib/cjs/src/typed-data/data/HttpTypedDataDataSource.js +1 -1
  115. package/lib/cjs/src/typed-data/data/HttpTypedDataDataSource.js.map +2 -2
  116. package/lib/cjs/src/typed-data/data/HttpTypedDataDataSource.test.js.map +1 -1
  117. package/lib/esm/package.json +2 -2
  118. package/lib/esm/src/ContextModuleBuilder.js +1 -1
  119. package/lib/esm/src/ContextModuleBuilder.js.map +3 -3
  120. package/lib/esm/src/ContextModuleBuilder.test.js +1 -1
  121. package/lib/esm/src/ContextModuleBuilder.test.js.map +3 -3
  122. package/lib/esm/src/DefaultContextModule.js +1 -1
  123. package/lib/esm/src/DefaultContextModule.js.map +3 -3
  124. package/lib/esm/src/DefaultContextModule.test.js +1 -1
  125. package/lib/esm/src/DefaultContextModule.test.js.map +2 -2
  126. package/lib/esm/src/calldata/data/HttpCalldataDescriptorDataSource.js +1 -1
  127. package/lib/esm/src/calldata/data/HttpCalldataDescriptorDataSource.js.map +2 -2
  128. package/lib/esm/src/calldata/data/HttpCalldataDescriptorDataSource.test.js.map +1 -1
  129. package/lib/esm/src/config/di/configModuleFactory.js +1 -1
  130. package/lib/esm/src/config/di/configModuleFactory.js.map +2 -2
  131. package/lib/esm/src/di.js +1 -1
  132. package/lib/esm/src/di.js.map +3 -3
  133. package/lib/esm/src/dynamic-network/data/HttpDynamicNetworkDataSource.js +1 -1
  134. package/lib/esm/src/dynamic-network/data/HttpDynamicNetworkDataSource.js.map +2 -2
  135. package/lib/esm/src/dynamic-network/data/HttpDynamicNetworkDataSource.test.js.map +2 -2
  136. package/lib/esm/src/dynamic-network/domain/DynamicNetworkContextLoader.js +1 -1
  137. package/lib/esm/src/dynamic-network/domain/DynamicNetworkContextLoader.js.map +1 -1
  138. package/lib/esm/src/dynamic-network/domain/DynamicNetworkContextLoader.test.js.map +1 -1
  139. package/lib/esm/src/external-plugin/data/HttpExternalPluginDataSource.js.map +2 -2
  140. package/lib/esm/src/external-plugin/data/HttpExternalPluginDataSource.test.js.map +1 -1
  141. package/lib/esm/src/gated-signing/data/HttpGatedDescriptorDataSource.js.map +2 -2
  142. package/lib/esm/src/gated-signing/data/HttpGatedDescriptorDataSource.test.js +1 -1
  143. package/lib/esm/src/gated-signing/data/HttpGatedDescriptorDataSource.test.js.map +2 -2
  144. package/lib/esm/src/index.js +1 -1
  145. package/lib/esm/src/index.js.map +2 -2
  146. package/lib/esm/src/nft/data/HttpNftDataSource.js +1 -1
  147. package/lib/esm/src/nft/data/HttpNftDataSource.js.map +2 -2
  148. package/lib/esm/src/nft/data/HttpNftDataSource.test.js +1 -1
  149. package/lib/esm/src/nft/data/HttpNftDataSource.test.js.map +1 -1
  150. package/lib/esm/src/pki/data/HttpPkiCertificateDataSource.js +1 -1
  151. package/lib/esm/src/pki/data/HttpPkiCertificateDataSource.js.map +2 -2
  152. package/lib/esm/src/pki/data/HttpPkiCertificateDataSource.test.js.map +1 -1
  153. package/lib/esm/src/proxy/data/HttpProxyDataSource.js +1 -1
  154. package/lib/esm/src/proxy/data/HttpProxyDataSource.js.map +2 -2
  155. package/lib/esm/src/proxy/data/HttpProxyDataSource.test.js.map +1 -1
  156. package/lib/esm/src/proxy/data/HttpSafeProxyDataSource.js.map +2 -2
  157. package/lib/esm/src/proxy/data/HttpSafeProxyDataSource.test.js.map +1 -1
  158. package/lib/esm/src/proxy/di/proxyModuleFactory.js +1 -1
  159. package/lib/esm/src/proxy/di/proxyModuleFactory.js.map +3 -3
  160. package/lib/esm/src/proxy/di/proxyModuleFactory.test.js +1 -1
  161. package/lib/esm/src/proxy/di/proxyModuleFactory.test.js.map +2 -2
  162. package/lib/esm/src/reporter/data/BlindSigningReporterDatasource.js +1 -0
  163. package/lib/esm/src/reporter/data/BlindSigningReporterDatasource.js.map +7 -0
  164. package/lib/esm/src/reporter/data/HttpBlindSigningReporterDatasource.js +2 -0
  165. package/lib/esm/src/reporter/data/HttpBlindSigningReporterDatasource.js.map +7 -0
  166. package/lib/esm/src/reporter/data/HttpBlindSigningReporterDatasource.test.js +2 -0
  167. package/lib/esm/src/reporter/data/HttpBlindSigningReporterDatasource.test.js.map +7 -0
  168. package/lib/esm/src/reporter/data/dto/BlindSigningEventDto.js +1 -0
  169. package/lib/esm/src/reporter/data/dto/BlindSigningEventDto.js.map +7 -0
  170. package/lib/esm/src/reporter/di/reporterModuleFactory.js +2 -0
  171. package/lib/esm/src/reporter/di/reporterModuleFactory.js.map +7 -0
  172. package/lib/esm/src/reporter/di/reporterTypes.js +2 -0
  173. package/lib/esm/src/reporter/di/reporterTypes.js.map +7 -0
  174. package/lib/esm/src/reporter/domain/BlindSigningReporter.js +1 -0
  175. package/lib/esm/src/reporter/domain/BlindSigningReporter.js.map +7 -0
  176. package/lib/esm/src/reporter/domain/DefaultBlindSigningReporter.js +2 -0
  177. package/lib/esm/src/reporter/domain/DefaultBlindSigningReporter.js.map +7 -0
  178. package/lib/esm/src/reporter/domain/DefaultBlindSigningReporter.test.js +2 -0
  179. package/lib/esm/src/reporter/domain/DefaultBlindSigningReporter.test.js.map +7 -0
  180. package/lib/esm/src/reporter/model/BlindSigningEvent.js +2 -0
  181. package/lib/esm/src/reporter/model/BlindSigningEvent.js.map +7 -0
  182. package/lib/esm/src/reporter/model/BlindSigningModelId.js +2 -0
  183. package/lib/esm/src/reporter/model/BlindSigningModelId.js.map +7 -0
  184. package/lib/esm/src/safe/data/HttpSafeAccountDataSource.js +1 -1
  185. package/lib/esm/src/safe/data/HttpSafeAccountDataSource.js.map +2 -2
  186. package/lib/esm/src/safe/data/HttpSafeAccountDataSource.test.js +1 -1
  187. package/lib/esm/src/safe/data/HttpSafeAccountDataSource.test.js.map +2 -2
  188. package/lib/esm/src/solana/data/HttpSolanaOwnerInfoDataSource.js +1 -1
  189. package/lib/esm/src/solana/data/HttpSolanaOwnerInfoDataSource.js.map +2 -2
  190. package/lib/esm/src/solana/data/HttpSolanaOwnerInfoDataSource.test.js.map +1 -1
  191. package/lib/esm/src/solana/domain/DefaultSolanaContextLoader.test.js +1 -1
  192. package/lib/esm/src/solana/domain/DefaultSolanaContextLoader.test.js.map +1 -1
  193. package/lib/esm/src/solanaLifi/data/HttpSolanaLifiDataSource.js.map +2 -2
  194. package/lib/esm/src/solanaLifi/data/HttpSolanaLifiDataSource.test.js.map +2 -2
  195. package/lib/esm/src/solanaLifi/domain/SolanaLifiContextLoader.js.map +1 -1
  196. package/lib/esm/src/solanaLifi/domain/SolanaLifiContextLoader.test.js +1 -1
  197. package/lib/esm/src/solanaLifi/domain/SolanaLifiContextLoader.test.js.map +1 -1
  198. package/lib/esm/src/solanaToken/data/HttpSolanaTokenDataSource.js +1 -1
  199. package/lib/esm/src/solanaToken/data/HttpSolanaTokenDataSource.js.map +2 -2
  200. package/lib/esm/src/solanaToken/data/HttpSolanaTokenDataSource.test.js +2 -2
  201. package/lib/esm/src/solanaToken/data/HttpSolanaTokenDataSource.test.js.map +2 -2
  202. package/lib/esm/src/solanaToken/domain/SolanaTokenContextLoader.js +1 -1
  203. package/lib/esm/src/solanaToken/domain/SolanaTokenContextLoader.js.map +2 -2
  204. package/lib/esm/src/solanaToken/domain/SolanaTokenContextLoader.test.js +1 -1
  205. package/lib/esm/src/solanaToken/domain/SolanaTokenContextLoader.test.js.map +1 -1
  206. package/lib/esm/src/token/data/HttpTokenDataSource.js.map +2 -2
  207. package/lib/esm/src/token/data/HttpTokenDataSource.test.js.map +1 -1
  208. package/lib/esm/src/transaction-check/data/HttpTransactionCheckDataSource.js +1 -1
  209. package/lib/esm/src/transaction-check/data/HttpTransactionCheckDataSource.js.map +2 -2
  210. package/lib/esm/src/transaction-check/data/HttpTransactionCheckDataSource.test.js.map +1 -1
  211. package/lib/esm/src/transaction-check/data/HttpTypedDataCheckDataSource.js.map +2 -2
  212. package/lib/esm/src/transaction-check/data/HttpTypedDataCheckDataSource.test.js.map +1 -1
  213. package/lib/esm/src/trusted-name/data/HttpTrustedNameDataSource.js.map +2 -2
  214. package/lib/esm/src/trusted-name/data/HttpTrustedNameDataSource.test.js.map +1 -1
  215. package/lib/esm/src/trusted-name/di/trustedNameModuleFactory.js +1 -1
  216. package/lib/esm/src/trusted-name/di/trustedNameModuleFactory.js.map +3 -3
  217. package/lib/esm/src/typed-data/data/HttpTypedDataDataSource.js +1 -1
  218. package/lib/esm/src/typed-data/data/HttpTypedDataDataSource.js.map +2 -2
  219. package/lib/esm/src/typed-data/data/HttpTypedDataDataSource.test.js.map +1 -1
  220. package/lib/types/src/ContextModule.d.ts +2 -0
  221. package/lib/types/src/ContextModule.d.ts.map +1 -1
  222. package/lib/types/src/ContextModuleBuilder.d.ts +30 -3
  223. package/lib/types/src/ContextModuleBuilder.d.ts.map +1 -1
  224. package/lib/types/src/DefaultContextModule.d.ts +6 -2
  225. package/lib/types/src/DefaultContextModule.d.ts.map +1 -1
  226. package/lib/types/src/calldata/data/HttpCalldataDescriptorDataSource.d.ts +2 -2
  227. package/lib/types/src/calldata/data/HttpCalldataDescriptorDataSource.d.ts.map +1 -1
  228. package/lib/types/src/config/di/configModuleFactory.d.ts +2 -2
  229. package/lib/types/src/config/di/configModuleFactory.d.ts.map +1 -1
  230. package/lib/types/src/config/model/ContextModuleConfig.d.ts +14 -3
  231. package/lib/types/src/config/model/ContextModuleConfig.d.ts.map +1 -1
  232. package/lib/types/src/di.d.ts +2 -2
  233. package/lib/types/src/di.d.ts.map +1 -1
  234. package/lib/types/src/dynamic-network/data/HttpDynamicNetworkDataSource.d.ts +2 -2
  235. package/lib/types/src/dynamic-network/data/HttpDynamicNetworkDataSource.d.ts.map +1 -1
  236. package/lib/types/src/dynamic-network/domain/DynamicNetworkContextLoader.d.ts +2 -2
  237. package/lib/types/src/dynamic-network/domain/DynamicNetworkContextLoader.d.ts.map +1 -1
  238. package/lib/types/src/external-plugin/data/HttpExternalPluginDataSource.d.ts +2 -2
  239. package/lib/types/src/external-plugin/data/HttpExternalPluginDataSource.d.ts.map +1 -1
  240. package/lib/types/src/gated-signing/data/HttpGatedDescriptorDataSource.d.ts +2 -2
  241. package/lib/types/src/gated-signing/data/HttpGatedDescriptorDataSource.d.ts.map +1 -1
  242. package/lib/types/src/index.d.ts +7 -1
  243. package/lib/types/src/index.d.ts.map +1 -1
  244. package/lib/types/src/nft/data/HttpNftDataSource.d.ts +2 -2
  245. package/lib/types/src/nft/data/HttpNftDataSource.d.ts.map +1 -1
  246. package/lib/types/src/pki/data/HttpPkiCertificateDataSource.d.ts +2 -2
  247. package/lib/types/src/pki/data/HttpPkiCertificateDataSource.d.ts.map +1 -1
  248. package/lib/types/src/proxy/data/HttpProxyDataSource.d.ts +2 -2
  249. package/lib/types/src/proxy/data/HttpProxyDataSource.d.ts.map +1 -1
  250. package/lib/types/src/proxy/data/HttpSafeProxyDataSource.d.ts +2 -2
  251. package/lib/types/src/proxy/data/HttpSafeProxyDataSource.d.ts.map +1 -1
  252. package/lib/types/src/proxy/di/proxyModuleFactory.d.ts +2 -2
  253. package/lib/types/src/proxy/di/proxyModuleFactory.d.ts.map +1 -1
  254. package/lib/types/src/reporter/data/BlindSigningReporterDatasource.d.ts +23 -0
  255. package/lib/types/src/reporter/data/BlindSigningReporterDatasource.d.ts.map +1 -0
  256. package/lib/types/src/reporter/data/HttpBlindSigningReporterDatasource.d.ts +9 -0
  257. package/lib/types/src/reporter/data/HttpBlindSigningReporterDatasource.d.ts.map +1 -0
  258. package/lib/types/src/reporter/data/HttpBlindSigningReporterDatasource.test.d.ts +2 -0
  259. package/lib/types/src/reporter/data/HttpBlindSigningReporterDatasource.test.d.ts.map +1 -0
  260. package/lib/types/src/reporter/data/dto/BlindSigningEventDto.d.ts +26 -0
  261. package/lib/types/src/reporter/data/dto/BlindSigningEventDto.d.ts.map +1 -0
  262. package/lib/types/src/reporter/di/reporterModuleFactory.d.ts +3 -0
  263. package/lib/types/src/reporter/di/reporterModuleFactory.d.ts.map +1 -0
  264. package/lib/types/src/reporter/di/reporterTypes.d.ts +5 -0
  265. package/lib/types/src/reporter/di/reporterTypes.d.ts.map +1 -0
  266. package/lib/types/src/reporter/domain/BlindSigningReporter.d.ts +6 -0
  267. package/lib/types/src/reporter/domain/BlindSigningReporter.d.ts.map +1 -0
  268. package/lib/types/src/reporter/domain/DefaultBlindSigningReporter.d.ts +9 -0
  269. package/lib/types/src/reporter/domain/DefaultBlindSigningReporter.d.ts.map +1 -0
  270. package/lib/types/src/reporter/domain/DefaultBlindSigningReporter.test.d.ts +2 -0
  271. package/lib/types/src/reporter/domain/DefaultBlindSigningReporter.test.d.ts.map +1 -0
  272. package/lib/types/src/reporter/model/BlindSigningEvent.d.ts +21 -0
  273. package/lib/types/src/reporter/model/BlindSigningEvent.d.ts.map +1 -0
  274. package/lib/types/src/reporter/model/BlindSigningModelId.d.ts +12 -0
  275. package/lib/types/src/reporter/model/BlindSigningModelId.d.ts.map +1 -0
  276. package/lib/types/src/safe/data/HttpSafeAccountDataSource.d.ts +2 -2
  277. package/lib/types/src/safe/data/HttpSafeAccountDataSource.d.ts.map +1 -1
  278. package/lib/types/src/solana/data/HttpSolanaOwnerInfoDataSource.d.ts +2 -2
  279. package/lib/types/src/solana/data/HttpSolanaOwnerInfoDataSource.d.ts.map +1 -1
  280. package/lib/types/src/solanaLifi/data/HttpSolanaLifiDataSource.d.ts +2 -2
  281. package/lib/types/src/solanaLifi/data/HttpSolanaLifiDataSource.d.ts.map +1 -1
  282. package/lib/types/src/solanaLifi/domain/SolanaLifiContextLoader.d.ts +2 -2
  283. package/lib/types/src/solanaLifi/domain/SolanaLifiContextLoader.d.ts.map +1 -1
  284. package/lib/types/src/solanaToken/data/HttpSolanaTokenDataSource.d.ts +2 -2
  285. package/lib/types/src/solanaToken/data/HttpSolanaTokenDataSource.d.ts.map +1 -1
  286. package/lib/types/src/solanaToken/domain/SolanaTokenContextLoader.d.ts +2 -2
  287. package/lib/types/src/solanaToken/domain/SolanaTokenContextLoader.d.ts.map +1 -1
  288. package/lib/types/src/token/data/HttpTokenDataSource.d.ts +2 -2
  289. package/lib/types/src/token/data/HttpTokenDataSource.d.ts.map +1 -1
  290. package/lib/types/src/transaction-check/data/HttpTransactionCheckDataSource.d.ts +2 -2
  291. package/lib/types/src/transaction-check/data/HttpTransactionCheckDataSource.d.ts.map +1 -1
  292. package/lib/types/src/transaction-check/data/HttpTypedDataCheckDataSource.d.ts +2 -2
  293. package/lib/types/src/transaction-check/data/HttpTypedDataCheckDataSource.d.ts.map +1 -1
  294. package/lib/types/src/trusted-name/data/HttpTrustedNameDataSource.d.ts +2 -2
  295. package/lib/types/src/trusted-name/data/HttpTrustedNameDataSource.d.ts.map +1 -1
  296. package/lib/types/src/trusted-name/di/trustedNameModuleFactory.d.ts +2 -2
  297. package/lib/types/src/trusted-name/di/trustedNameModuleFactory.d.ts.map +1 -1
  298. package/lib/types/src/typed-data/data/HttpTypedDataDataSource.d.ts +2 -2
  299. package/lib/types/src/typed-data/data/HttpTypedDataDataSource.d.ts.map +1 -1
  300. package/lib/types/tsconfig.prod.tsbuildinfo +1 -1
  301. package/package.json +4 -4
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/proxy/data/HttpProxyDataSource.ts"],
4
- "sourcesContent": ["import axios from \"axios\";\nimport { inject, injectable } from \"inversify\";\nimport { Either, Left, Right } from \"purify-ts\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport { type ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport { KeyId } from \"@/pki/model/KeyId\";\nimport { KeyUsage } from \"@/pki/model/KeyUsage\";\nimport {\n LEDGER_CLIENT_VERSION_HEADER,\n LEDGER_ORIGIN_TOKEN_HEADER,\n} from \"@/shared/constant/HttpHeaders\";\nimport PACKAGE from \"@root/package.json\";\n\nimport { ProxyDelegateCallDto } from \"./dto/ProxyDelegateCallDto\";\nimport {\n GetProxyImplementationAddressParam,\n ProxyDataSource,\n ProxyImplementationAddress,\n} from \"./ProxyDataSource\";\n\n@injectable()\nexport class HttpProxyDataSource implements ProxyDataSource {\n constructor(\n @inject(configTypes.Config) private readonly config: ContextModuleConfig,\n ) {}\n\n async getProxyImplementationAddress({\n proxyAddress,\n chainId,\n challenge,\n calldata,\n }: GetProxyImplementationAddressParam): Promise<\n Either<Error, ProxyImplementationAddress>\n > {\n let dto: ProxyDelegateCallDto | undefined;\n try {\n const response = await axios.request<ProxyDelegateCallDto>({\n method: \"POST\",\n url: `${this.config.metadataServiceDomain.url}/v2/ethereum/${chainId}/contract/proxy/delegate`,\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: `context-module/${PACKAGE.version}`,\n [LEDGER_ORIGIN_TOKEN_HEADER]: this.config.originToken,\n },\n data: {\n proxy: proxyAddress,\n data: calldata,\n challenge,\n },\n });\n dto = response.data;\n } catch (_error) {\n return Left(\n new Error(\n `[ContextModule] HttpProxyDataSource: Failed to fetch delegate proxy`,\n ),\n );\n }\n\n if (!dto) {\n return Left(\n new Error(\n `[ContextModule] HttpProxyDataSource: No data received for proxy ${proxyAddress} on chain ${chainId}`,\n ),\n );\n }\n\n if (!this.isProxyDelegateCallDto(dto)) {\n return Left(\n new Error(\n `[ContextModule] HttpProxyDataSource: Invalid proxy delegate call response format for proxy ${proxyAddress} on chain ${chainId}`,\n ),\n );\n }\n\n if (!dto.addresses[0]) {\n return Left(\n new Error(\n `[ContextModule] HttpProxyDataSource: No implementation address found for proxy ${proxyAddress} on chain ${chainId}`,\n ),\n );\n }\n\n return Right({\n implementationAddress: dto.addresses[0],\n signedDescriptor: dto.signedDescriptor,\n keyId: KeyId.DomainMetadataKey,\n keyUsage: KeyUsage.TrustedName,\n });\n }\n\n /**\n * Type guard to validate ProxyDelegateCallDto\n */\n private isProxyDelegateCallDto(\n value: unknown,\n ): value is ProxyDelegateCallDto {\n return (\n typeof value === \"object\" &&\n value !== null &&\n \"addresses\" in value &&\n \"signedDescriptor\" in value &&\n Array.isArray(value.addresses) &&\n value.addresses.every((address) => typeof address === \"string\") &&\n typeof value.signedDescriptor === \"string\"\n );\n }\n}\n"],
5
- "mappings": "qtBAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,yBAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAAkB,oBAClBC,EAAmC,qBACnCC,EAAoC,qBAEpCC,EAA4B,mCAE5BC,EAAsB,6BACtBC,EAAyB,gCACzBC,EAGO,yCACPC,EAAoB,iCAUb,IAAMC,EAAN,KAAqD,CAC1D,YAC+CC,EAC7C,CAD6C,YAAAA,CAC5C,CAEH,MAAM,8BAA8B,CAClC,aAAAC,EACA,QAAAC,EACA,UAAAC,EACA,SAAAC,CACF,EAEE,CACA,IAAIC,EACJ,GAAI,CAcFA,GAbiB,MAAM,EAAAC,QAAM,QAA8B,CACzD,OAAQ,OACR,IAAK,GAAG,KAAK,OAAO,sBAAsB,GAAG,gBAAgBJ,CAAO,2BACpE,QAAS,CACP,CAAC,8BAA4B,EAAG,kBAAkB,EAAAK,QAAQ,OAAO,GACjE,CAAC,4BAA0B,EAAG,KAAK,OAAO,WAC5C,EACA,KAAM,CACJ,MAAON,EACP,KAAMG,EACN,UAAAD,CACF,CACF,CAAC,GACc,IACjB,MAAiB,CACf,SAAO,QACL,IAAI,MACF,qEACF,CACF,CACF,CAEA,OAAKE,EAQA,KAAK,uBAAuBA,CAAG,EAQ/BA,EAAI,UAAU,CAAC,KAQb,SAAM,CACX,sBAAuBA,EAAI,UAAU,CAAC,EACtC,iBAAkBA,EAAI,iBACtB,MAAO,QAAM,kBACb,SAAU,WAAS,WACrB,CAAC,KAZQ,QACL,IAAI,MACF,kFAAkFJ,CAAY,aAAaC,CAAO,EACpH,CACF,KAZO,QACL,IAAI,MACF,8FAA8FD,CAAY,aAAaC,CAAO,EAChI,CACF,KAZO,QACL,IAAI,MACF,mEAAmED,CAAY,aAAaC,CAAO,EACrG,CACF,CAyBJ,CAKQ,uBACNM,EAC+B,CAC/B,OACE,OAAOA,GAAU,UACjBA,IAAU,MACV,cAAeA,GACf,qBAAsBA,GACtB,MAAM,QAAQA,EAAM,SAAS,GAC7BA,EAAM,UAAU,MAAOC,GAAY,OAAOA,GAAY,QAAQ,GAC9D,OAAOD,EAAM,kBAAqB,QAEtC,CACF,EArFaT,EAANW,EAAA,IADN,cAAW,EAGPC,EAAA,eAAO,cAAY,MAAM,IAFjBZ",
4
+ "sourcesContent": ["import axios from \"axios\";\nimport { inject, injectable } from \"inversify\";\nimport { Either, Left, Right } from \"purify-ts\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport { KeyId } from \"@/pki/model/KeyId\";\nimport { KeyUsage } from \"@/pki/model/KeyUsage\";\nimport {\n LEDGER_CLIENT_VERSION_HEADER,\n LEDGER_ORIGIN_TOKEN_HEADER,\n} from \"@/shared/constant/HttpHeaders\";\nimport PACKAGE from \"@root/package.json\";\n\nimport { ProxyDelegateCallDto } from \"./dto/ProxyDelegateCallDto\";\nimport {\n GetProxyImplementationAddressParam,\n ProxyDataSource,\n ProxyImplementationAddress,\n} from \"./ProxyDataSource\";\n\n@injectable()\nexport class HttpProxyDataSource implements ProxyDataSource {\n constructor(\n @inject(configTypes.Config)\n private readonly config: ContextModuleServiceConfig,\n ) {}\n\n async getProxyImplementationAddress({\n proxyAddress,\n chainId,\n challenge,\n calldata,\n }: GetProxyImplementationAddressParam): Promise<\n Either<Error, ProxyImplementationAddress>\n > {\n let dto: ProxyDelegateCallDto | undefined;\n try {\n const response = await axios.request<ProxyDelegateCallDto>({\n method: \"POST\",\n url: `${this.config.metadataServiceDomain.url}/v2/ethereum/${chainId}/contract/proxy/delegate`,\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: `context-module/${PACKAGE.version}`,\n [LEDGER_ORIGIN_TOKEN_HEADER]: this.config.originToken,\n },\n data: {\n proxy: proxyAddress,\n data: calldata,\n challenge,\n },\n });\n dto = response.data;\n } catch (_error) {\n return Left(\n new Error(\n `[ContextModule] HttpProxyDataSource: Failed to fetch delegate proxy`,\n ),\n );\n }\n\n if (!dto) {\n return Left(\n new Error(\n `[ContextModule] HttpProxyDataSource: No data received for proxy ${proxyAddress} on chain ${chainId}`,\n ),\n );\n }\n\n if (!this.isProxyDelegateCallDto(dto)) {\n return Left(\n new Error(\n `[ContextModule] HttpProxyDataSource: Invalid proxy delegate call response format for proxy ${proxyAddress} on chain ${chainId}`,\n ),\n );\n }\n\n if (!dto.addresses[0]) {\n return Left(\n new Error(\n `[ContextModule] HttpProxyDataSource: No implementation address found for proxy ${proxyAddress} on chain ${chainId}`,\n ),\n );\n }\n\n return Right({\n implementationAddress: dto.addresses[0],\n signedDescriptor: dto.signedDescriptor,\n keyId: KeyId.DomainMetadataKey,\n keyUsage: KeyUsage.TrustedName,\n });\n }\n\n /**\n * Type guard to validate ProxyDelegateCallDto\n */\n private isProxyDelegateCallDto(\n value: unknown,\n ): value is ProxyDelegateCallDto {\n return (\n typeof value === \"object\" &&\n value !== null &&\n \"addresses\" in value &&\n \"signedDescriptor\" in value &&\n Array.isArray(value.addresses) &&\n value.addresses.every((address) => typeof address === \"string\") &&\n typeof value.signedDescriptor === \"string\"\n );\n }\n}\n"],
5
+ "mappings": "qtBAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,yBAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAAkB,oBAClBC,EAAmC,qBACnCC,EAAoC,qBAEpCC,EAA4B,mCAE5BC,EAAsB,6BACtBC,EAAyB,gCACzBC,EAGO,yCACPC,EAAoB,iCAUb,IAAMC,EAAN,KAAqD,CAC1D,YAEmBC,EACjB,CADiB,YAAAA,CAChB,CAEH,MAAM,8BAA8B,CAClC,aAAAC,EACA,QAAAC,EACA,UAAAC,EACA,SAAAC,CACF,EAEE,CACA,IAAIC,EACJ,GAAI,CAcFA,GAbiB,MAAM,EAAAC,QAAM,QAA8B,CACzD,OAAQ,OACR,IAAK,GAAG,KAAK,OAAO,sBAAsB,GAAG,gBAAgBJ,CAAO,2BACpE,QAAS,CACP,CAAC,8BAA4B,EAAG,kBAAkB,EAAAK,QAAQ,OAAO,GACjE,CAAC,4BAA0B,EAAG,KAAK,OAAO,WAC5C,EACA,KAAM,CACJ,MAAON,EACP,KAAMG,EACN,UAAAD,CACF,CACF,CAAC,GACc,IACjB,MAAiB,CACf,SAAO,QACL,IAAI,MACF,qEACF,CACF,CACF,CAEA,OAAKE,EAQA,KAAK,uBAAuBA,CAAG,EAQ/BA,EAAI,UAAU,CAAC,KAQb,SAAM,CACX,sBAAuBA,EAAI,UAAU,CAAC,EACtC,iBAAkBA,EAAI,iBACtB,MAAO,QAAM,kBACb,SAAU,WAAS,WACrB,CAAC,KAZQ,QACL,IAAI,MACF,kFAAkFJ,CAAY,aAAaC,CAAO,EACpH,CACF,KAZO,QACL,IAAI,MACF,8FAA8FD,CAAY,aAAaC,CAAO,EAChI,CACF,KAZO,QACL,IAAI,MACF,mEAAmED,CAAY,aAAaC,CAAO,EACrG,CACF,CAyBJ,CAKQ,uBACNM,EAC+B,CAC/B,OACE,OAAOA,GAAU,UACjBA,IAAU,MACV,cAAeA,GACf,qBAAsBA,GACtB,MAAM,QAAQA,EAAM,SAAS,GAC7BA,EAAM,UAAU,MAAOC,GAAY,OAAOA,GAAY,QAAQ,GAC9D,OAAOD,EAAM,kBAAqB,QAEtC,CACF,EAtFaT,EAANW,EAAA,IADN,cAAW,EAGPC,EAAA,eAAO,cAAY,MAAM,IAFjBZ",
6
6
  "names": ["HttpProxyDataSource_exports", "__export", "HttpProxyDataSource", "__toCommonJS", "import_axios", "import_inversify", "import_purify_ts", "import_configTypes", "import_KeyId", "import_KeyUsage", "import_HttpHeaders", "import_package", "HttpProxyDataSource", "config", "proxyAddress", "chainId", "challenge", "calldata", "dto", "axios", "PACKAGE", "value", "address", "__decorateClass", "__decorateParam"]
7
7
  }
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/proxy/data/HttpProxyDataSource.test.ts"],
4
- "sourcesContent": ["import axios from \"axios\";\n\nimport { type ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport { KeyId } from \"@/pki/model/KeyId\";\nimport { KeyUsage } from \"@/pki/model/KeyUsage\";\nimport {\n LEDGER_CLIENT_VERSION_HEADER,\n LEDGER_ORIGIN_TOKEN_HEADER,\n} from \"@/shared/constant/HttpHeaders\";\nimport PACKAGE from \"@root/package.json\";\n\nimport { type ProxyDelegateCallDto } from \"./dto/ProxyDelegateCallDto\";\nimport { HttpProxyDataSource } from \"./HttpProxyDataSource\";\nimport { type ProxyDataSource } from \"./ProxyDataSource\";\n\nvi.mock(\"axios\");\n\nconst config = {\n metadataServiceDomain: {\n url: \"https://metadata.api.live.ledger.com\",\n },\n originToken: \"test-origin-token\",\n} as ContextModuleConfig;\n\ndescribe(\"HttpProxyDataSource\", () => {\n let datasource: ProxyDataSource;\n\n beforeAll(() => {\n datasource = new HttpProxyDataSource(config);\n vi.clearAllMocks();\n });\n\n beforeEach(() => {\n vi.clearAllMocks();\n });\n\n const validParams = {\n proxyAddress: \"0x1234567890123456789012345678901234567890\",\n chainId: 1,\n challenge: \"test-challenge\",\n calldata: \"0xabcdef\",\n };\n\n const validDto: ProxyDelegateCallDto = {\n addresses: [\"0x9876543210987654321098765432109876543210\"],\n signedDescriptor: \"signed-descriptor-data\",\n };\n\n describe(\"getProxyImplementationAddress\", () => {\n it(\"should call axios with correct URL, headers, and data\", async () => {\n // GIVEN\n const version = `context-module/${PACKAGE.version}`;\n const requestSpy = vi.fn(() => Promise.resolve({ data: validDto }));\n vi.spyOn(axios, \"request\").mockImplementation(requestSpy);\n\n // WHEN\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(requestSpy).toHaveBeenCalledWith({\n method: \"POST\",\n url: `${config.metadataServiceDomain.url}/v2/ethereum/${validParams.chainId}/contract/proxy/delegate`,\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: version,\n [LEDGER_ORIGIN_TOKEN_HEADER]: config.originToken,\n },\n data: {\n proxy: validParams.proxyAddress,\n data: validParams.calldata,\n challenge: validParams.challenge,\n },\n });\n });\n\n it(\"should return Right with proxy implementation data when request succeeds with valid DTO\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(result.extract()).toEqual({\n implementationAddress: validDto.addresses[0],\n signedDescriptor: validDto.signedDescriptor,\n keyId: KeyId.DomainMetadataKey,\n keyUsage: KeyUsage.TrustedName,\n });\n });\n\n it(\"should return Right with first address when multiple addresses are provided\", async () => {\n // GIVEN\n const dtoWithMultipleAddresses: ProxyDelegateCallDto = {\n addresses: [\n \"0x9876543210987654321098765432109876543210\",\n \"0x1111111111111111111111111111111111111111\",\n ],\n signedDescriptor: \"signed-descriptor-data\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n data: dtoWithMultipleAddresses,\n });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(result.extract()).toEqual({\n implementationAddress: dtoWithMultipleAddresses.addresses[0],\n signedDescriptor: dtoWithMultipleAddresses.signedDescriptor,\n keyId: KeyId.DomainMetadataKey,\n keyUsage: KeyUsage.TrustedName,\n });\n });\n\n it(\"should return Left with error when axios throws an error\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockRejectedValue(new Error(\"Network error\"));\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n \"[ContextModule] HttpProxyDataSource: Failed to fetch delegate proxy\",\n ),\n );\n });\n\n it(\"should return Left with error when response data is undefined\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: undefined });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: No data received for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when response data is null\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: null });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: No data received for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when addresses field is missing\", async () => {\n // GIVEN\n const { addresses: _, ...invalidDto } = validDto;\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: Invalid proxy delegate call response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when signedDescriptor is missing\", async () => {\n // GIVEN\n const { signedDescriptor: _, ...invalidDto } = validDto;\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: Invalid proxy delegate call response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when addresses is not an array\", async () => {\n // GIVEN\n const invalidDto = { ...validDto, addresses: \"not-an-array\" };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: Invalid proxy delegate call response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when addresses array contains non-string values\", async () => {\n // GIVEN\n const invalidDto = { ...validDto, addresses: [123, \"valid-address\"] };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: Invalid proxy delegate call response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when signedDescriptor is not a string\", async () => {\n // GIVEN\n const invalidDto = { ...validDto, signedDescriptor: 123 };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: Invalid proxy delegate call response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when addresses array is empty\", async () => {\n // GIVEN\n const invalidDto: ProxyDelegateCallDto = {\n addresses: [],\n signedDescriptor: \"signed-descriptor-data\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: No implementation address found for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when response is not an object\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: \"not an object\" });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: Invalid proxy delegate call response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should handle different chainId values correctly\", async () => {\n // GIVEN\n const paramsWithDifferentChainId = { ...validParams, chainId: 137 };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result = await datasource.getProxyImplementationAddress(\n paramsWithDifferentChainId,\n );\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n url: `${config.metadataServiceDomain.url}/v2/ethereum/137/contract/proxy/delegate`,\n }),\n );\n });\n\n it(\"should handle different proxy addresses correctly\", async () => {\n // GIVEN\n const differentProxyAddress =\n \"0xabcdefabcdefabcdefabcdefabcdefabcdefabcd\";\n const paramsWithDifferentAddress = {\n ...validParams,\n proxyAddress: differentProxyAddress,\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result = await datasource.getProxyImplementationAddress(\n paramsWithDifferentAddress,\n );\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n data: expect.objectContaining({\n proxy: differentProxyAddress,\n }),\n }),\n );\n });\n\n it(\"should handle different calldata values correctly\", async () => {\n // GIVEN\n const customCalldata = \"0x123456789abcdef\";\n const paramsWithCustomCalldata = {\n ...validParams,\n calldata: customCalldata,\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result = await datasource.getProxyImplementationAddress(\n paramsWithCustomCalldata,\n );\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n data: expect.objectContaining({\n data: customCalldata,\n }),\n }),\n );\n });\n\n it(\"should pass challenge parameter correctly\", async () => {\n // GIVEN\n const customChallenge = \"custom-challenge-string\";\n const paramsWithCustomChallenge = {\n ...validParams,\n challenge: customChallenge,\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result = await datasource.getProxyImplementationAddress(\n paramsWithCustomChallenge,\n );\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n data: expect.objectContaining({\n challenge: customChallenge,\n }),\n }),\n );\n });\n });\n});\n"],
4
+ "sourcesContent": ["import axios from \"axios\";\n\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport { KeyId } from \"@/pki/model/KeyId\";\nimport { KeyUsage } from \"@/pki/model/KeyUsage\";\nimport {\n LEDGER_CLIENT_VERSION_HEADER,\n LEDGER_ORIGIN_TOKEN_HEADER,\n} from \"@/shared/constant/HttpHeaders\";\nimport PACKAGE from \"@root/package.json\";\n\nimport { type ProxyDelegateCallDto } from \"./dto/ProxyDelegateCallDto\";\nimport { HttpProxyDataSource } from \"./HttpProxyDataSource\";\nimport { type ProxyDataSource } from \"./ProxyDataSource\";\n\nvi.mock(\"axios\");\n\nconst config = {\n metadataServiceDomain: {\n url: \"https://metadata.api.live.ledger.com\",\n },\n originToken: \"test-origin-token\",\n} as ContextModuleServiceConfig;\n\ndescribe(\"HttpProxyDataSource\", () => {\n let datasource: ProxyDataSource;\n\n beforeAll(() => {\n datasource = new HttpProxyDataSource(config);\n vi.clearAllMocks();\n });\n\n beforeEach(() => {\n vi.clearAllMocks();\n });\n\n const validParams = {\n proxyAddress: \"0x1234567890123456789012345678901234567890\",\n chainId: 1,\n challenge: \"test-challenge\",\n calldata: \"0xabcdef\",\n };\n\n const validDto: ProxyDelegateCallDto = {\n addresses: [\"0x9876543210987654321098765432109876543210\"],\n signedDescriptor: \"signed-descriptor-data\",\n };\n\n describe(\"getProxyImplementationAddress\", () => {\n it(\"should call axios with correct URL, headers, and data\", async () => {\n // GIVEN\n const version = `context-module/${PACKAGE.version}`;\n const requestSpy = vi.fn(() => Promise.resolve({ data: validDto }));\n vi.spyOn(axios, \"request\").mockImplementation(requestSpy);\n\n // WHEN\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(requestSpy).toHaveBeenCalledWith({\n method: \"POST\",\n url: `${config.metadataServiceDomain.url}/v2/ethereum/${validParams.chainId}/contract/proxy/delegate`,\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: version,\n [LEDGER_ORIGIN_TOKEN_HEADER]: config.originToken,\n },\n data: {\n proxy: validParams.proxyAddress,\n data: validParams.calldata,\n challenge: validParams.challenge,\n },\n });\n });\n\n it(\"should return Right with proxy implementation data when request succeeds with valid DTO\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(result.extract()).toEqual({\n implementationAddress: validDto.addresses[0],\n signedDescriptor: validDto.signedDescriptor,\n keyId: KeyId.DomainMetadataKey,\n keyUsage: KeyUsage.TrustedName,\n });\n });\n\n it(\"should return Right with first address when multiple addresses are provided\", async () => {\n // GIVEN\n const dtoWithMultipleAddresses: ProxyDelegateCallDto = {\n addresses: [\n \"0x9876543210987654321098765432109876543210\",\n \"0x1111111111111111111111111111111111111111\",\n ],\n signedDescriptor: \"signed-descriptor-data\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n data: dtoWithMultipleAddresses,\n });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(result.extract()).toEqual({\n implementationAddress: dtoWithMultipleAddresses.addresses[0],\n signedDescriptor: dtoWithMultipleAddresses.signedDescriptor,\n keyId: KeyId.DomainMetadataKey,\n keyUsage: KeyUsage.TrustedName,\n });\n });\n\n it(\"should return Left with error when axios throws an error\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockRejectedValue(new Error(\"Network error\"));\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n \"[ContextModule] HttpProxyDataSource: Failed to fetch delegate proxy\",\n ),\n );\n });\n\n it(\"should return Left with error when response data is undefined\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: undefined });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: No data received for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when response data is null\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: null });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: No data received for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when addresses field is missing\", async () => {\n // GIVEN\n const { addresses: _, ...invalidDto } = validDto;\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: Invalid proxy delegate call response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when signedDescriptor is missing\", async () => {\n // GIVEN\n const { signedDescriptor: _, ...invalidDto } = validDto;\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: Invalid proxy delegate call response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when addresses is not an array\", async () => {\n // GIVEN\n const invalidDto = { ...validDto, addresses: \"not-an-array\" };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: Invalid proxy delegate call response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when addresses array contains non-string values\", async () => {\n // GIVEN\n const invalidDto = { ...validDto, addresses: [123, \"valid-address\"] };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: Invalid proxy delegate call response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when signedDescriptor is not a string\", async () => {\n // GIVEN\n const invalidDto = { ...validDto, signedDescriptor: 123 };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: Invalid proxy delegate call response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when addresses array is empty\", async () => {\n // GIVEN\n const invalidDto: ProxyDelegateCallDto = {\n addresses: [],\n signedDescriptor: \"signed-descriptor-data\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: No implementation address found for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when response is not an object\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: \"not an object\" });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpProxyDataSource: Invalid proxy delegate call response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should handle different chainId values correctly\", async () => {\n // GIVEN\n const paramsWithDifferentChainId = { ...validParams, chainId: 137 };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result = await datasource.getProxyImplementationAddress(\n paramsWithDifferentChainId,\n );\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n url: `${config.metadataServiceDomain.url}/v2/ethereum/137/contract/proxy/delegate`,\n }),\n );\n });\n\n it(\"should handle different proxy addresses correctly\", async () => {\n // GIVEN\n const differentProxyAddress =\n \"0xabcdefabcdefabcdefabcdefabcdefabcdefabcd\";\n const paramsWithDifferentAddress = {\n ...validParams,\n proxyAddress: differentProxyAddress,\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result = await datasource.getProxyImplementationAddress(\n paramsWithDifferentAddress,\n );\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n data: expect.objectContaining({\n proxy: differentProxyAddress,\n }),\n }),\n );\n });\n\n it(\"should handle different calldata values correctly\", async () => {\n // GIVEN\n const customCalldata = \"0x123456789abcdef\";\n const paramsWithCustomCalldata = {\n ...validParams,\n calldata: customCalldata,\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result = await datasource.getProxyImplementationAddress(\n paramsWithCustomCalldata,\n );\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n data: expect.objectContaining({\n data: customCalldata,\n }),\n }),\n );\n });\n\n it(\"should pass challenge parameter correctly\", async () => {\n // GIVEN\n const customChallenge = \"custom-challenge-string\";\n const paramsWithCustomChallenge = {\n ...validParams,\n challenge: customChallenge,\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result = await datasource.getProxyImplementationAddress(\n paramsWithCustomChallenge,\n );\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n data: expect.objectContaining({\n challenge: customChallenge,\n }),\n }),\n );\n });\n });\n});\n"],
5
5
  "mappings": "wdAAA,IAAAA,EAAkB,oBAGlBC,EAAsB,6BACtBC,EAAyB,gCACzBC,EAGO,yCACPC,EAAoB,iCAGpBC,EAAoC,iCAGpC,GAAG,KAAK,OAAO,EAEf,MAAMC,EAAS,CACb,sBAAuB,CACrB,IAAK,sCACP,EACA,YAAa,mBACf,EAEA,SAAS,sBAAuB,IAAM,CACpC,IAAIC,EAEJ,UAAU,IAAM,CACdA,EAAa,IAAI,sBAAoBD,CAAM,EAC3C,GAAG,cAAc,CACnB,CAAC,EAED,WAAW,IAAM,CACf,GAAG,cAAc,CACnB,CAAC,EAED,MAAME,EAAc,CAClB,aAAc,6CACd,QAAS,EACT,UAAW,iBACX,SAAU,UACZ,EAEMC,EAAiC,CACrC,UAAW,CAAC,4CAA4C,EACxD,iBAAkB,wBACpB,EAEA,SAAS,gCAAiC,IAAM,CAC9C,GAAG,wDAAyD,SAAY,CAEtE,MAAMC,EAAU,kBAAkB,EAAAC,QAAQ,OAAO,GAC3CC,EAAa,GAAG,GAAG,IAAM,QAAQ,QAAQ,CAAE,KAAMH,CAAS,CAAC,CAAC,EAClE,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,mBAAmBD,CAAU,EAGxD,MAAML,EAAW,8BAA8BC,CAAW,EAG1D,OAAOI,CAAU,EAAE,qBAAqB,CACtC,OAAQ,OACR,IAAK,GAAGN,EAAO,sBAAsB,GAAG,gBAAgBE,EAAY,OAAO,2BAC3E,QAAS,CACP,CAAC,8BAA4B,EAAGE,EAChC,CAAC,4BAA0B,EAAGJ,EAAO,WACvC,EACA,KAAM,CACJ,MAAOE,EAAY,aACnB,KAAMA,EAAY,SAClB,UAAWA,EAAY,SACzB,CACF,CAAC,CACH,CAAC,EAED,GAAG,0FAA2F,SAAY,CAExG,GAAG,MAAM,EAAAK,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMJ,CAAS,CAAC,EAG/D,MAAMK,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,QAAQ,CAAC,EAAE,KAAK,EAAI,EAClC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QAAQ,CAC/B,sBAAuBL,EAAS,UAAU,CAAC,EAC3C,iBAAkBA,EAAS,iBAC3B,MAAO,QAAM,kBACb,SAAU,WAAS,WACrB,CAAC,CACH,CAAC,EAED,GAAG,8EAA+E,SAAY,CAE5F,MAAMM,EAAiD,CACrD,UAAW,CACT,6CACA,4CACF,EACA,iBAAkB,wBACpB,EACA,GAAG,MAAM,EAAAF,QAAO,SAAS,EAAE,kBAAkB,CAC3C,KAAME,CACR,CAAC,EAGD,MAAMD,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,QAAQ,CAAC,EAAE,KAAK,EAAI,EAClC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QAAQ,CAC/B,sBAAuBC,EAAyB,UAAU,CAAC,EAC3D,iBAAkBA,EAAyB,iBAC3C,MAAO,QAAM,kBACb,SAAU,WAAS,WACrB,CAAC,CACH,CAAC,EAED,GAAG,2DAA4D,SAAY,CAEzE,GAAG,MAAM,EAAAF,QAAO,SAAS,EAAE,kBAAkB,IAAI,MAAM,eAAe,CAAC,EAGvE,MAAMC,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,qEACF,CACF,CACF,CAAC,EAED,GAAG,gEAAiE,SAAY,CAE9E,GAAG,MAAM,EAAAD,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAM,MAAU,CAAC,EAGhE,MAAMC,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,mEAAmEN,EAAY,YAAY,aAAaA,EAAY,OAAO,EAC7H,CACF,CACF,CAAC,EAED,GAAG,2DAA4D,SAAY,CAEzE,GAAG,MAAM,EAAAK,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAM,IAAK,CAAC,EAG3D,MAAMC,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,mEAAmEN,EAAY,YAAY,aAAaA,EAAY,OAAO,EAC7H,CACF,CACF,CAAC,EAED,GAAG,gEAAiE,SAAY,CAE9E,KAAM,CAAE,UAAWQ,EAAG,GAAGC,CAAW,EAAIR,EACxC,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMI,CAAW,CAAC,EAGjE,MAAMH,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,8FAA8FN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACxJ,CACF,CACF,CAAC,EAED,GAAG,iEAAkE,SAAY,CAE/E,KAAM,CAAE,iBAAkBQ,EAAG,GAAGC,CAAW,EAAIR,EAC/C,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMI,CAAW,CAAC,EAGjE,MAAMH,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,8FAA8FN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACxJ,CACF,CACF,CAAC,EAED,GAAG,+DAAgE,SAAY,CAE7E,MAAMS,EAAa,CAAE,GAAGR,EAAU,UAAW,cAAe,EAC5D,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMI,CAAW,CAAC,EAGjE,MAAMH,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,8FAA8FN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACxJ,CACF,CACF,CAAC,EAED,GAAG,gFAAiF,SAAY,CAE9F,MAAMS,EAAa,CAAE,GAAGR,EAAU,UAAW,CAAC,IAAK,eAAe,CAAE,EACpE,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMI,CAAW,CAAC,EAGjE,MAAMH,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,8FAA8FN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACxJ,CACF,CACF,CAAC,EAED,GAAG,sEAAuE,SAAY,CAEpF,MAAMS,EAAa,CAAE,GAAGR,EAAU,iBAAkB,GAAI,EACxD,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMI,CAAW,CAAC,EAGjE,MAAMH,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,8FAA8FN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACxJ,CACF,CACF,CAAC,EAED,GAAG,8DAA+D,SAAY,CAE5E,MAAMS,EAAmC,CACvC,UAAW,CAAC,EACZ,iBAAkB,wBACpB,EACA,GAAG,MAAM,EAAAJ,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMI,CAAW,CAAC,EAGjE,MAAMH,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,kFAAkFN,EAAY,YAAY,aAAaA,EAAY,OAAO,EAC5I,CACF,CACF,CAAC,EAED,GAAG,+DAAgE,SAAY,CAE7E,GAAG,MAAM,EAAAK,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAM,eAAgB,CAAC,EAGtE,MAAMC,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,8FAA8FN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACxJ,CACF,CACF,CAAC,EAED,GAAG,mDAAoD,SAAY,CAEjE,MAAMU,EAA6B,CAAE,GAAGV,EAAa,QAAS,GAAI,EAClE,GAAG,MAAM,EAAAK,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMJ,CAAS,CAAC,EAG/D,MAAMK,EAAS,MAAMP,EAAW,8BAC9BW,CACF,EAGA,OAAOJ,EAAO,QAAQ,CAAC,EAAE,KAAK,EAAI,EAClC,OAAO,EAAAD,QAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,IAAK,GAAGP,EAAO,sBAAsB,GAAG,0CAC1C,CAAC,CACH,CACF,CAAC,EAED,GAAG,oDAAqD,SAAY,CAElE,MAAMa,EACJ,6CACIC,EAA6B,CACjC,GAAGZ,EACH,aAAcW,CAChB,EACA,GAAG,MAAM,EAAAN,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMJ,CAAS,CAAC,EAG/D,MAAMK,EAAS,MAAMP,EAAW,8BAC9Ba,CACF,EAGA,OAAON,EAAO,QAAQ,CAAC,EAAE,KAAK,EAAI,EAClC,OAAO,EAAAD,QAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,KAAM,OAAO,iBAAiB,CAC5B,MAAOM,CACT,CAAC,CACH,CAAC,CACH,CACF,CAAC,EAED,GAAG,oDAAqD,SAAY,CAElE,MAAME,EAAiB,oBACjBC,EAA2B,CAC/B,GAAGd,EACH,SAAUa,CACZ,EACA,GAAG,MAAM,EAAAR,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMJ,CAAS,CAAC,EAG/D,MAAMK,EAAS,MAAMP,EAAW,8BAC9Be,CACF,EAGA,OAAOR,EAAO,QAAQ,CAAC,EAAE,KAAK,EAAI,EAClC,OAAO,EAAAD,QAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,KAAM,OAAO,iBAAiB,CAC5B,KAAMQ,CACR,CAAC,CACH,CAAC,CACH,CACF,CAAC,EAED,GAAG,4CAA6C,SAAY,CAE1D,MAAME,EAAkB,0BAClBC,EAA4B,CAChC,GAAGhB,EACH,UAAWe,CACb,EACA,GAAG,MAAM,EAAAV,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMJ,CAAS,CAAC,EAG/D,MAAMK,EAAS,MAAMP,EAAW,8BAC9BiB,CACF,EAGA,OAAOV,EAAO,QAAQ,CAAC,EAAE,KAAK,EAAI,EAClC,OAAO,EAAAD,QAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,KAAM,OAAO,iBAAiB,CAC5B,UAAWU,CACb,CAAC,CACH,CAAC,CACH,CACF,CAAC,CACH,CAAC,CACH,CAAC",
6
6
  "names": ["import_axios", "import_KeyId", "import_KeyUsage", "import_HttpHeaders", "import_package", "import_HttpProxyDataSource", "config", "datasource", "validParams", "validDto", "version", "PACKAGE", "requestSpy", "axios", "result", "dtoWithMultipleAddresses", "_", "invalidDto", "paramsWithDifferentChainId", "differentProxyAddress", "paramsWithDifferentAddress", "customCalldata", "paramsWithCustomCalldata", "customChallenge", "paramsWithCustomChallenge"]
7
7
  }
@@ -1,2 +1,2 @@
1
- "use strict";var D=Object.create;var d=Object.defineProperty;var f=Object.getOwnPropertyDescriptor;var P=Object.getOwnPropertyNames;var h=Object.getPrototypeOf,S=Object.prototype.hasOwnProperty;var k=(t,e)=>{for(var o in e)d(t,o,{get:e[o],enumerable:!0})},c=(t,e,o,n)=>{if(e&&typeof e=="object"||typeof e=="function")for(let r of P(e))!S.call(t,r)&&r!==o&&d(t,r,{get:()=>e[r],enumerable:!(n=f(e,r))||n.enumerable});return t};var x=(t,e,o)=>(o=t!=null?D(h(t)):{},c(e||!t||!t.__esModule?d(o,"default",{value:t,enumerable:!0}):o,t)),C=t=>c(d({},"__esModule",{value:!0}),t),g=(t,e,o,n)=>{for(var r=n>1?void 0:n?f(e,o):e,s=t.length-1,y;s>=0;s--)(y=t[s])&&(r=(n?y(e,o,r):y(r))||r);return n&&r&&d(e,o,r),r},A=(t,e)=>(o,n)=>e(o,n,t);var G={};k(G,{HttpSafeProxyDataSource:()=>m});module.exports=C(G);var E=x(require("axios")),p=require("inversify"),i=require("purify-ts"),l=require("../../config/di/configTypes"),a=require("../../shared/constant/HttpHeaders"),I=x(require("../../../package.json"));let m=class{constructor(e){this.config=e}async getProxyImplementationAddress({proxyAddress:e,chainId:o,challenge:n}){let r;try{r=(await E.default.request({method:"GET",url:`${this.config.metadataServiceDomain.url}/v3/ethereum/${o}/contract/proxy/${e}`,headers:{[a.LEDGER_CLIENT_VERSION_HEADER]:`context-module/${I.default.version}`,[a.LEDGER_ORIGIN_TOKEN_HEADER]:this.config.originToken},params:{challenge:n,resolver:"SAFE_GATEWAY"}})).data}catch{return(0,i.Left)(new Error("[ContextModule] HttpSafeProxyDataSource: Failed to fetch safe proxy implementation"))}return r?this.isSafeProxyImplementationAddressDto(r)?(0,i.Right)({implementationAddress:r.implementationAddress,signedDescriptor:r.signedDescriptor,keyId:r.keyId,keyUsage:r.keyUsage}):(0,i.Left)(new Error(`[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${e} on chain ${o}`)):(0,i.Left)(new Error(`[ContextModule] HttpSafeProxyDataSource: No data received for proxy ${e} on chain ${o}`))}isSafeProxyImplementationAddressDto(e){return typeof e=="object"&&e!==null&&"proxyAddress"in e&&"implementationAddress"in e&&"standard"in e&&"signedDescriptor"in e&&"providedBy"in e&&"keyId"in e&&"keyUsage"in e&&typeof e.proxyAddress=="string"&&typeof e.implementationAddress=="string"&&typeof e.standard=="string"&&typeof e.signedDescriptor=="string"&&typeof e.providedBy=="string"&&typeof e.keyId=="string"&&typeof e.keyUsage=="string"}};m=g([(0,p.injectable)(),A(0,(0,p.inject)(l.configTypes.Config))],m);0&&(module.exports={HttpSafeProxyDataSource});
1
+ "use strict";var D=Object.create;var d=Object.defineProperty;var f=Object.getOwnPropertyDescriptor;var P=Object.getOwnPropertyNames;var S=Object.getPrototypeOf,h=Object.prototype.hasOwnProperty;var k=(t,e)=>{for(var o in e)d(t,o,{get:e[o],enumerable:!0})},c=(t,e,o,n)=>{if(e&&typeof e=="object"||typeof e=="function")for(let r of P(e))!h.call(t,r)&&r!==o&&d(t,r,{get:()=>e[r],enumerable:!(n=f(e,r))||n.enumerable});return t};var x=(t,e,o)=>(o=t!=null?D(S(t)):{},c(e||!t||!t.__esModule?d(o,"default",{value:t,enumerable:!0}):o,t)),C=t=>c(d({},"__esModule",{value:!0}),t),g=(t,e,o,n)=>{for(var r=n>1?void 0:n?f(e,o):e,s=t.length-1,y;s>=0;s--)(y=t[s])&&(r=(n?y(e,o,r):y(r))||r);return n&&r&&d(e,o,r),r},A=(t,e)=>(o,n)=>e(o,n,t);var G={};k(G,{HttpSafeProxyDataSource:()=>m});module.exports=C(G);var E=x(require("axios")),p=require("inversify"),i=require("purify-ts"),l=require("../../config/di/configTypes"),a=require("../../shared/constant/HttpHeaders"),I=x(require("../../../package.json"));let m=class{constructor(e){this.config=e}async getProxyImplementationAddress({proxyAddress:e,chainId:o,challenge:n}){let r;try{r=(await E.default.request({method:"GET",url:`${this.config.metadataServiceDomain.url}/v3/ethereum/${o}/contract/proxy/${e}`,headers:{[a.LEDGER_CLIENT_VERSION_HEADER]:`context-module/${I.default.version}`,[a.LEDGER_ORIGIN_TOKEN_HEADER]:this.config.originToken},params:{challenge:n,resolver:"SAFE_GATEWAY"}})).data}catch{return(0,i.Left)(new Error("[ContextModule] HttpSafeProxyDataSource: Failed to fetch safe proxy implementation"))}return r?this.isSafeProxyImplementationAddressDto(r)?(0,i.Right)({implementationAddress:r.implementationAddress,signedDescriptor:r.signedDescriptor,keyId:r.keyId,keyUsage:r.keyUsage}):(0,i.Left)(new Error(`[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${e} on chain ${o}`)):(0,i.Left)(new Error(`[ContextModule] HttpSafeProxyDataSource: No data received for proxy ${e} on chain ${o}`))}isSafeProxyImplementationAddressDto(e){return typeof e=="object"&&e!==null&&"proxyAddress"in e&&"implementationAddress"in e&&"standard"in e&&"signedDescriptor"in e&&"providedBy"in e&&"keyId"in e&&"keyUsage"in e&&typeof e.proxyAddress=="string"&&typeof e.implementationAddress=="string"&&typeof e.standard=="string"&&typeof e.signedDescriptor=="string"&&typeof e.providedBy=="string"&&typeof e.keyId=="string"&&typeof e.keyUsage=="string"}};m=g([(0,p.injectable)(),A(0,(0,p.inject)(l.configTypes.Config))],m);0&&(module.exports={HttpSafeProxyDataSource});
2
2
  //# sourceMappingURL=HttpSafeProxyDataSource.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/proxy/data/HttpSafeProxyDataSource.ts"],
4
- "sourcesContent": ["import axios from \"axios\";\nimport { inject, injectable } from \"inversify\";\nimport { Either, Left, Right } from \"purify-ts\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport { type ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport {\n LEDGER_CLIENT_VERSION_HEADER,\n LEDGER_ORIGIN_TOKEN_HEADER,\n} from \"@/shared/constant/HttpHeaders\";\nimport PACKAGE from \"@root/package.json\";\n\nimport { SafeProxyImplementationAddressDto } from \"./dto/SafeProxyImplementationAddressDto\";\nimport {\n GetProxyImplementationAddressParam,\n type ProxyDataSource,\n ProxyImplementationAddress,\n} from \"./ProxyDataSource\";\n\n@injectable()\nexport class HttpSafeProxyDataSource implements ProxyDataSource {\n constructor(\n @inject(configTypes.Config) private readonly config: ContextModuleConfig,\n ) {}\n\n async getProxyImplementationAddress({\n proxyAddress,\n chainId,\n challenge,\n }: GetProxyImplementationAddressParam): Promise<\n Either<Error, ProxyImplementationAddress>\n > {\n let dto: SafeProxyImplementationAddressDto | undefined;\n try {\n const response = await axios.request<SafeProxyImplementationAddressDto>({\n method: \"GET\",\n url: `${this.config.metadataServiceDomain.url}/v3/ethereum/${chainId}/contract/proxy/${proxyAddress}`,\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: `context-module/${PACKAGE.version}`,\n [LEDGER_ORIGIN_TOKEN_HEADER]: this.config.originToken,\n },\n params: {\n challenge,\n resolver: \"SAFE_GATEWAY\",\n },\n });\n dto = response.data;\n } catch (_error) {\n return Left(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Failed to fetch safe proxy implementation`,\n ),\n );\n }\n\n if (!dto) {\n return Left(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: No data received for proxy ${proxyAddress} on chain ${chainId}`,\n ),\n );\n }\n\n if (!this.isSafeProxyImplementationAddressDto(dto)) {\n return Left(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${proxyAddress} on chain ${chainId}`,\n ),\n );\n }\n\n return Right({\n implementationAddress: dto.implementationAddress,\n signedDescriptor: dto.signedDescriptor,\n keyId: dto.keyId,\n keyUsage: dto.keyUsage,\n });\n }\n\n /**\n * Type guard to validate SafeProxyImplementationAddressDto\n */\n private isSafeProxyImplementationAddressDto(\n value: unknown,\n ): value is SafeProxyImplementationAddressDto {\n return (\n typeof value === \"object\" &&\n value !== null &&\n \"proxyAddress\" in value &&\n \"implementationAddress\" in value &&\n \"standard\" in value &&\n \"signedDescriptor\" in value &&\n \"providedBy\" in value &&\n \"keyId\" in value &&\n \"keyUsage\" in value &&\n typeof value.proxyAddress === \"string\" &&\n typeof value.implementationAddress === \"string\" &&\n typeof value.standard === \"string\" &&\n typeof value.signedDescriptor === \"string\" &&\n typeof value.providedBy === \"string\" &&\n typeof value.keyId === \"string\" &&\n typeof value.keyUsage === \"string\"\n );\n }\n}\n"],
5
- "mappings": "qtBAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,6BAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAAkB,oBAClBC,EAAmC,qBACnCC,EAAoC,qBAEpCC,EAA4B,mCAE5BC,EAGO,yCACPC,EAAoB,iCAUb,IAAMC,EAAN,KAAyD,CAC9D,YAC+CC,EAC7C,CAD6C,YAAAA,CAC5C,CAEH,MAAM,8BAA8B,CAClC,aAAAC,EACA,QAAAC,EACA,UAAAC,CACF,EAEE,CACA,IAAIC,EACJ,GAAI,CAaFA,GAZiB,MAAM,EAAAC,QAAM,QAA2C,CACtE,OAAQ,MACR,IAAK,GAAG,KAAK,OAAO,sBAAsB,GAAG,gBAAgBH,CAAO,mBAAmBD,CAAY,GACnG,QAAS,CACP,CAAC,8BAA4B,EAAG,kBAAkB,EAAAK,QAAQ,OAAO,GACjE,CAAC,4BAA0B,EAAG,KAAK,OAAO,WAC5C,EACA,OAAQ,CACN,UAAAH,EACA,SAAU,cACZ,CACF,CAAC,GACc,IACjB,MAAiB,CACf,SAAO,QACL,IAAI,MACF,oFACF,CACF,CACF,CAEA,OAAKC,EAQA,KAAK,oCAAoCA,CAAG,KAQ1C,SAAM,CACX,sBAAuBA,EAAI,sBAC3B,iBAAkBA,EAAI,iBACtB,MAAOA,EAAI,MACX,SAAUA,EAAI,QAChB,CAAC,KAZQ,QACL,IAAI,MACF,yFAAyFH,CAAY,aAAaC,CAAO,EAC3H,CACF,KAZO,QACL,IAAI,MACF,uEAAuED,CAAY,aAAaC,CAAO,EACzG,CACF,CAiBJ,CAKQ,oCACNK,EAC4C,CAC5C,OACE,OAAOA,GAAU,UACjBA,IAAU,MACV,iBAAkBA,GAClB,0BAA2BA,GAC3B,aAAcA,GACd,qBAAsBA,GACtB,eAAgBA,GAChB,UAAWA,GACX,aAAcA,GACd,OAAOA,EAAM,cAAiB,UAC9B,OAAOA,EAAM,uBAA0B,UACvC,OAAOA,EAAM,UAAa,UAC1B,OAAOA,EAAM,kBAAqB,UAClC,OAAOA,EAAM,YAAe,UAC5B,OAAOA,EAAM,OAAU,UACvB,OAAOA,EAAM,UAAa,QAE9B,CACF,EApFaR,EAANS,EAAA,IADN,cAAW,EAGPC,EAAA,eAAO,cAAY,MAAM,IAFjBV",
4
+ "sourcesContent": ["import axios from \"axios\";\nimport { inject, injectable } from \"inversify\";\nimport { Either, Left, Right } from \"purify-ts\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport {\n LEDGER_CLIENT_VERSION_HEADER,\n LEDGER_ORIGIN_TOKEN_HEADER,\n} from \"@/shared/constant/HttpHeaders\";\nimport PACKAGE from \"@root/package.json\";\n\nimport { SafeProxyImplementationAddressDto } from \"./dto/SafeProxyImplementationAddressDto\";\nimport {\n GetProxyImplementationAddressParam,\n type ProxyDataSource,\n ProxyImplementationAddress,\n} from \"./ProxyDataSource\";\n\n@injectable()\nexport class HttpSafeProxyDataSource implements ProxyDataSource {\n constructor(\n @inject(configTypes.Config)\n private readonly config: ContextModuleServiceConfig,\n ) {}\n\n async getProxyImplementationAddress({\n proxyAddress,\n chainId,\n challenge,\n }: GetProxyImplementationAddressParam): Promise<\n Either<Error, ProxyImplementationAddress>\n > {\n let dto: SafeProxyImplementationAddressDto | undefined;\n try {\n const response = await axios.request<SafeProxyImplementationAddressDto>({\n method: \"GET\",\n url: `${this.config.metadataServiceDomain.url}/v3/ethereum/${chainId}/contract/proxy/${proxyAddress}`,\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: `context-module/${PACKAGE.version}`,\n [LEDGER_ORIGIN_TOKEN_HEADER]: this.config.originToken,\n },\n params: {\n challenge,\n resolver: \"SAFE_GATEWAY\",\n },\n });\n dto = response.data;\n } catch (_error) {\n return Left(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Failed to fetch safe proxy implementation`,\n ),\n );\n }\n\n if (!dto) {\n return Left(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: No data received for proxy ${proxyAddress} on chain ${chainId}`,\n ),\n );\n }\n\n if (!this.isSafeProxyImplementationAddressDto(dto)) {\n return Left(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${proxyAddress} on chain ${chainId}`,\n ),\n );\n }\n\n return Right({\n implementationAddress: dto.implementationAddress,\n signedDescriptor: dto.signedDescriptor,\n keyId: dto.keyId,\n keyUsage: dto.keyUsage,\n });\n }\n\n /**\n * Type guard to validate SafeProxyImplementationAddressDto\n */\n private isSafeProxyImplementationAddressDto(\n value: unknown,\n ): value is SafeProxyImplementationAddressDto {\n return (\n typeof value === \"object\" &&\n value !== null &&\n \"proxyAddress\" in value &&\n \"implementationAddress\" in value &&\n \"standard\" in value &&\n \"signedDescriptor\" in value &&\n \"providedBy\" in value &&\n \"keyId\" in value &&\n \"keyUsage\" in value &&\n typeof value.proxyAddress === \"string\" &&\n typeof value.implementationAddress === \"string\" &&\n typeof value.standard === \"string\" &&\n typeof value.signedDescriptor === \"string\" &&\n typeof value.providedBy === \"string\" &&\n typeof value.keyId === \"string\" &&\n typeof value.keyUsage === \"string\"\n );\n }\n}\n"],
5
+ "mappings": "qtBAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,6BAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAAkB,oBAClBC,EAAmC,qBACnCC,EAAoC,qBAEpCC,EAA4B,mCAE5BC,EAGO,yCACPC,EAAoB,iCAUb,IAAMC,EAAN,KAAyD,CAC9D,YAEmBC,EACjB,CADiB,YAAAA,CAChB,CAEH,MAAM,8BAA8B,CAClC,aAAAC,EACA,QAAAC,EACA,UAAAC,CACF,EAEE,CACA,IAAIC,EACJ,GAAI,CAaFA,GAZiB,MAAM,EAAAC,QAAM,QAA2C,CACtE,OAAQ,MACR,IAAK,GAAG,KAAK,OAAO,sBAAsB,GAAG,gBAAgBH,CAAO,mBAAmBD,CAAY,GACnG,QAAS,CACP,CAAC,8BAA4B,EAAG,kBAAkB,EAAAK,QAAQ,OAAO,GACjE,CAAC,4BAA0B,EAAG,KAAK,OAAO,WAC5C,EACA,OAAQ,CACN,UAAAH,EACA,SAAU,cACZ,CACF,CAAC,GACc,IACjB,MAAiB,CACf,SAAO,QACL,IAAI,MACF,oFACF,CACF,CACF,CAEA,OAAKC,EAQA,KAAK,oCAAoCA,CAAG,KAQ1C,SAAM,CACX,sBAAuBA,EAAI,sBAC3B,iBAAkBA,EAAI,iBACtB,MAAOA,EAAI,MACX,SAAUA,EAAI,QAChB,CAAC,KAZQ,QACL,IAAI,MACF,yFAAyFH,CAAY,aAAaC,CAAO,EAC3H,CACF,KAZO,QACL,IAAI,MACF,uEAAuED,CAAY,aAAaC,CAAO,EACzG,CACF,CAiBJ,CAKQ,oCACNK,EAC4C,CAC5C,OACE,OAAOA,GAAU,UACjBA,IAAU,MACV,iBAAkBA,GAClB,0BAA2BA,GAC3B,aAAcA,GACd,qBAAsBA,GACtB,eAAgBA,GAChB,UAAWA,GACX,aAAcA,GACd,OAAOA,EAAM,cAAiB,UAC9B,OAAOA,EAAM,uBAA0B,UACvC,OAAOA,EAAM,UAAa,UAC1B,OAAOA,EAAM,kBAAqB,UAClC,OAAOA,EAAM,YAAe,UAC5B,OAAOA,EAAM,OAAU,UACvB,OAAOA,EAAM,UAAa,QAE9B,CACF,EArFaR,EAANS,EAAA,IADN,cAAW,EAGPC,EAAA,eAAO,cAAY,MAAM,IAFjBV",
6
6
  "names": ["HttpSafeProxyDataSource_exports", "__export", "HttpSafeProxyDataSource", "__toCommonJS", "import_axios", "import_inversify", "import_purify_ts", "import_configTypes", "import_HttpHeaders", "import_package", "HttpSafeProxyDataSource", "config", "proxyAddress", "chainId", "challenge", "dto", "axios", "PACKAGE", "value", "__decorateClass", "__decorateParam"]
7
7
  }
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/proxy/data/HttpSafeProxyDataSource.test.ts"],
4
- "sourcesContent": ["import axios from \"axios\";\n\nimport { type ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport {\n LEDGER_CLIENT_VERSION_HEADER,\n LEDGER_ORIGIN_TOKEN_HEADER,\n} from \"@/shared/constant/HttpHeaders\";\nimport PACKAGE from \"@root/package.json\";\n\nimport { type SafeProxyImplementationAddressDto } from \"./dto/SafeProxyImplementationAddressDto\";\nimport { HttpSafeProxyDataSource } from \"./HttpSafeProxyDataSource\";\nimport { type ProxyDataSource } from \"./ProxyDataSource\";\n\nvi.mock(\"axios\");\n\nconst config = {\n metadataServiceDomain: {\n url: \"https://metadata.api.live.ledger.com\",\n },\n originToken: \"test-origin-token\",\n} as ContextModuleConfig;\n\ndescribe(\"HttpSafeProxyDataSource\", () => {\n let datasource: ProxyDataSource;\n\n beforeAll(() => {\n datasource = new HttpSafeProxyDataSource(config);\n vi.clearAllMocks();\n });\n\n beforeEach(() => {\n vi.clearAllMocks();\n });\n\n const validParams = {\n proxyAddress: \"0x1234567890123456789012345678901234567890\",\n chainId: 1,\n challenge: \"test-challenge\",\n calldata: \"0xabcdef\",\n };\n\n const validDto: SafeProxyImplementationAddressDto = {\n proxyAddress: \"0x1234567890123456789012345678901234567890\",\n implementationAddress: \"0x9876543210987654321098765432109876543210\",\n standard: \"EIP-1967\",\n signedDescriptor: \"signed-descriptor-data\",\n providedBy: \"SAFE_GATEWAY\",\n keyId: \"testKeyId\",\n keyUsage: \"testKeyUsage\",\n };\n\n describe(\"getProxyImplementationAddress\", () => {\n it(\"should call axios with correct URL, headers, and parameters\", async () => {\n // GIVEN\n const version = `context-module/${PACKAGE.version}`;\n const requestSpy = vi.fn(() => Promise.resolve({ data: validDto }));\n vi.spyOn(axios, \"request\").mockImplementation(requestSpy);\n\n // WHEN\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(requestSpy).toHaveBeenCalledWith({\n method: \"GET\",\n url: `${config.metadataServiceDomain.url}/v3/ethereum/${validParams.chainId}/contract/proxy/${validParams.proxyAddress}`,\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: version,\n [LEDGER_ORIGIN_TOKEN_HEADER]: config.originToken,\n },\n params: {\n challenge: validParams.challenge,\n resolver: \"SAFE_GATEWAY\",\n },\n });\n });\n\n it(\"should return Right with proxy implementation data when request succeeds with valid DTO\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(result.extract()).toEqual({\n implementationAddress: validDto.implementationAddress,\n signedDescriptor: validDto.signedDescriptor,\n keyId: \"testKeyId\",\n keyUsage: \"testKeyUsage\",\n });\n });\n\n it(\"should return Left with error when axios throws an error\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockRejectedValue(new Error(\"Network error\"));\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n \"[ContextModule] HttpSafeProxyDataSource: Failed to fetch safe proxy implementation\",\n ),\n );\n });\n\n it(\"should return Left with error when response data is undefined\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: undefined });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: No data received for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when response data is null\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: null });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: No data received for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when proxyAddress is missing\", async () => {\n // GIVEN\n const { proxyAddress: _, ...invalidDto } = validDto;\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when implementationAddress is missing\", async () => {\n // GIVEN\n const { implementationAddress: _, ...invalidDto } = validDto;\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when standard is missing\", async () => {\n // GIVEN\n const { standard: _, ...invalidDto } = validDto;\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when signedDescriptor is missing\", async () => {\n // GIVEN\n const { signedDescriptor: _, ...invalidDto } = validDto;\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when providedBy is missing\", async () => {\n // GIVEN\n const { providedBy: _, ...invalidDto } = validDto;\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when proxyAddress is not a string\", async () => {\n // GIVEN\n const invalidDto = { ...validDto, proxyAddress: 123 };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when implementationAddress is not a string\", async () => {\n // GIVEN\n const invalidDto = { ...validDto, implementationAddress: null };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when standard is not a string\", async () => {\n // GIVEN\n const invalidDto = { ...validDto, standard: [] };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when signedDescriptor is not a string\", async () => {\n // GIVEN\n const invalidDto = { ...validDto, signedDescriptor: {} };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when providedBy is not a string\", async () => {\n // GIVEN\n const invalidDto = { ...validDto, providedBy: true };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when response is not an object\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: \"not an object\" });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when response is null\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: null });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: No data received for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should handle different chainId values correctly\", async () => {\n // GIVEN\n const paramsWithDifferentChainId = { ...validParams, chainId: 137 };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result = await datasource.getProxyImplementationAddress(\n paramsWithDifferentChainId,\n );\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n url: `${config.metadataServiceDomain.url}/v3/ethereum/137/contract/proxy/${validParams.proxyAddress}`,\n }),\n );\n });\n\n it(\"should handle different proxy addresses correctly\", async () => {\n // GIVEN\n const differentProxyAddress =\n \"0xabcdefabcdefabcdefabcdefabcdefabcdefabcd\";\n const paramsWithDifferentAddress = {\n ...validParams,\n proxyAddress: differentProxyAddress,\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result = await datasource.getProxyImplementationAddress(\n paramsWithDifferentAddress,\n );\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n url: `${config.metadataServiceDomain.url}/v3/ethereum/${validParams.chainId}/contract/proxy/${differentProxyAddress}`,\n }),\n );\n });\n\n it(\"should pass challenge parameter correctly\", async () => {\n // GIVEN\n const customChallenge = \"custom-challenge-string\";\n const paramsWithCustomChallenge = {\n ...validParams,\n challenge: customChallenge,\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result = await datasource.getProxyImplementationAddress(\n paramsWithCustomChallenge,\n );\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n params: {\n challenge: customChallenge,\n resolver: \"SAFE_GATEWAY\",\n },\n }),\n );\n });\n });\n});\n"],
4
+ "sourcesContent": ["import axios from \"axios\";\n\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport {\n LEDGER_CLIENT_VERSION_HEADER,\n LEDGER_ORIGIN_TOKEN_HEADER,\n} from \"@/shared/constant/HttpHeaders\";\nimport PACKAGE from \"@root/package.json\";\n\nimport { type SafeProxyImplementationAddressDto } from \"./dto/SafeProxyImplementationAddressDto\";\nimport { HttpSafeProxyDataSource } from \"./HttpSafeProxyDataSource\";\nimport { type ProxyDataSource } from \"./ProxyDataSource\";\n\nvi.mock(\"axios\");\n\nconst config = {\n metadataServiceDomain: {\n url: \"https://metadata.api.live.ledger.com\",\n },\n originToken: \"test-origin-token\",\n} as ContextModuleServiceConfig;\n\ndescribe(\"HttpSafeProxyDataSource\", () => {\n let datasource: ProxyDataSource;\n\n beforeAll(() => {\n datasource = new HttpSafeProxyDataSource(config);\n vi.clearAllMocks();\n });\n\n beforeEach(() => {\n vi.clearAllMocks();\n });\n\n const validParams = {\n proxyAddress: \"0x1234567890123456789012345678901234567890\",\n chainId: 1,\n challenge: \"test-challenge\",\n calldata: \"0xabcdef\",\n };\n\n const validDto: SafeProxyImplementationAddressDto = {\n proxyAddress: \"0x1234567890123456789012345678901234567890\",\n implementationAddress: \"0x9876543210987654321098765432109876543210\",\n standard: \"EIP-1967\",\n signedDescriptor: \"signed-descriptor-data\",\n providedBy: \"SAFE_GATEWAY\",\n keyId: \"testKeyId\",\n keyUsage: \"testKeyUsage\",\n };\n\n describe(\"getProxyImplementationAddress\", () => {\n it(\"should call axios with correct URL, headers, and parameters\", async () => {\n // GIVEN\n const version = `context-module/${PACKAGE.version}`;\n const requestSpy = vi.fn(() => Promise.resolve({ data: validDto }));\n vi.spyOn(axios, \"request\").mockImplementation(requestSpy);\n\n // WHEN\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(requestSpy).toHaveBeenCalledWith({\n method: \"GET\",\n url: `${config.metadataServiceDomain.url}/v3/ethereum/${validParams.chainId}/contract/proxy/${validParams.proxyAddress}`,\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: version,\n [LEDGER_ORIGIN_TOKEN_HEADER]: config.originToken,\n },\n params: {\n challenge: validParams.challenge,\n resolver: \"SAFE_GATEWAY\",\n },\n });\n });\n\n it(\"should return Right with proxy implementation data when request succeeds with valid DTO\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(result.extract()).toEqual({\n implementationAddress: validDto.implementationAddress,\n signedDescriptor: validDto.signedDescriptor,\n keyId: \"testKeyId\",\n keyUsage: \"testKeyUsage\",\n });\n });\n\n it(\"should return Left with error when axios throws an error\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockRejectedValue(new Error(\"Network error\"));\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n \"[ContextModule] HttpSafeProxyDataSource: Failed to fetch safe proxy implementation\",\n ),\n );\n });\n\n it(\"should return Left with error when response data is undefined\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: undefined });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: No data received for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when response data is null\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: null });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: No data received for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when proxyAddress is missing\", async () => {\n // GIVEN\n const { proxyAddress: _, ...invalidDto } = validDto;\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when implementationAddress is missing\", async () => {\n // GIVEN\n const { implementationAddress: _, ...invalidDto } = validDto;\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when standard is missing\", async () => {\n // GIVEN\n const { standard: _, ...invalidDto } = validDto;\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when signedDescriptor is missing\", async () => {\n // GIVEN\n const { signedDescriptor: _, ...invalidDto } = validDto;\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when providedBy is missing\", async () => {\n // GIVEN\n const { providedBy: _, ...invalidDto } = validDto;\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when proxyAddress is not a string\", async () => {\n // GIVEN\n const invalidDto = { ...validDto, proxyAddress: 123 };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when implementationAddress is not a string\", async () => {\n // GIVEN\n const invalidDto = { ...validDto, implementationAddress: null };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when standard is not a string\", async () => {\n // GIVEN\n const invalidDto = { ...validDto, standard: [] };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when signedDescriptor is not a string\", async () => {\n // GIVEN\n const invalidDto = { ...validDto, signedDescriptor: {} };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when providedBy is not a string\", async () => {\n // GIVEN\n const invalidDto = { ...validDto, providedBy: true };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: invalidDto });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when response is not an object\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: \"not an object\" });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: Invalid safe proxy response format for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should return Left with error when response is null\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: null });\n\n // WHEN\n const result =\n await datasource.getProxyImplementationAddress(validParams);\n\n // THEN\n expect(result.isLeft()).toBe(true);\n expect(result.extract()).toEqual(\n new Error(\n `[ContextModule] HttpSafeProxyDataSource: No data received for proxy ${validParams.proxyAddress} on chain ${validParams.chainId}`,\n ),\n );\n });\n\n it(\"should handle different chainId values correctly\", async () => {\n // GIVEN\n const paramsWithDifferentChainId = { ...validParams, chainId: 137 };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result = await datasource.getProxyImplementationAddress(\n paramsWithDifferentChainId,\n );\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n url: `${config.metadataServiceDomain.url}/v3/ethereum/137/contract/proxy/${validParams.proxyAddress}`,\n }),\n );\n });\n\n it(\"should handle different proxy addresses correctly\", async () => {\n // GIVEN\n const differentProxyAddress =\n \"0xabcdefabcdefabcdefabcdefabcdefabcdefabcd\";\n const paramsWithDifferentAddress = {\n ...validParams,\n proxyAddress: differentProxyAddress,\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result = await datasource.getProxyImplementationAddress(\n paramsWithDifferentAddress,\n );\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n url: `${config.metadataServiceDomain.url}/v3/ethereum/${validParams.chainId}/contract/proxy/${differentProxyAddress}`,\n }),\n );\n });\n\n it(\"should pass challenge parameter correctly\", async () => {\n // GIVEN\n const customChallenge = \"custom-challenge-string\";\n const paramsWithCustomChallenge = {\n ...validParams,\n challenge: customChallenge,\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: validDto });\n\n // WHEN\n const result = await datasource.getProxyImplementationAddress(\n paramsWithCustomChallenge,\n );\n\n // THEN\n expect(result.isRight()).toBe(true);\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n params: {\n challenge: customChallenge,\n resolver: \"SAFE_GATEWAY\",\n },\n }),\n );\n });\n });\n});\n"],
5
5
  "mappings": "wdAAA,IAAAA,EAAkB,oBAGlBC,EAGO,yCACPC,EAAoB,iCAGpBC,EAAwC,qCAGxC,GAAG,KAAK,OAAO,EAEf,MAAMC,EAAS,CACb,sBAAuB,CACrB,IAAK,sCACP,EACA,YAAa,mBACf,EAEA,SAAS,0BAA2B,IAAM,CACxC,IAAIC,EAEJ,UAAU,IAAM,CACdA,EAAa,IAAI,0BAAwBD,CAAM,EAC/C,GAAG,cAAc,CACnB,CAAC,EAED,WAAW,IAAM,CACf,GAAG,cAAc,CACnB,CAAC,EAED,MAAME,EAAc,CAClB,aAAc,6CACd,QAAS,EACT,UAAW,iBACX,SAAU,UACZ,EAEMC,EAA8C,CAClD,aAAc,6CACd,sBAAuB,6CACvB,SAAU,WACV,iBAAkB,yBAClB,WAAY,eACZ,MAAO,YACP,SAAU,cACZ,EAEA,SAAS,gCAAiC,IAAM,CAC9C,GAAG,8DAA+D,SAAY,CAE5E,MAAMC,EAAU,kBAAkB,EAAAC,QAAQ,OAAO,GAC3CC,EAAa,GAAG,GAAG,IAAM,QAAQ,QAAQ,CAAE,KAAMH,CAAS,CAAC,CAAC,EAClE,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,mBAAmBD,CAAU,EAGxD,MAAML,EAAW,8BAA8BC,CAAW,EAG1D,OAAOI,CAAU,EAAE,qBAAqB,CACtC,OAAQ,MACR,IAAK,GAAGN,EAAO,sBAAsB,GAAG,gBAAgBE,EAAY,OAAO,mBAAmBA,EAAY,YAAY,GACtH,QAAS,CACP,CAAC,8BAA4B,EAAGE,EAChC,CAAC,4BAA0B,EAAGJ,EAAO,WACvC,EACA,OAAQ,CACN,UAAWE,EAAY,UACvB,SAAU,cACZ,CACF,CAAC,CACH,CAAC,EAED,GAAG,0FAA2F,SAAY,CAExG,GAAG,MAAM,EAAAK,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMJ,CAAS,CAAC,EAG/D,MAAMK,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,QAAQ,CAAC,EAAE,KAAK,EAAI,EAClC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QAAQ,CAC/B,sBAAuBL,EAAS,sBAChC,iBAAkBA,EAAS,iBAC3B,MAAO,YACP,SAAU,cACZ,CAAC,CACH,CAAC,EAED,GAAG,2DAA4D,SAAY,CAEzE,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,kBAAkB,IAAI,MAAM,eAAe,CAAC,EAGvE,MAAMC,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,oFACF,CACF,CACF,CAAC,EAED,GAAG,gEAAiE,SAAY,CAE9E,GAAG,MAAM,EAAAD,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAM,MAAU,CAAC,EAGhE,MAAMC,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,uEAAuEN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACjI,CACF,CACF,CAAC,EAED,GAAG,2DAA4D,SAAY,CAEzE,GAAG,MAAM,EAAAK,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAM,IAAK,CAAC,EAG3D,MAAMC,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,uEAAuEN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACjI,CACF,CACF,CAAC,EAED,GAAG,6DAA8D,SAAY,CAE3E,KAAM,CAAE,aAAcO,EAAG,GAAGC,CAAW,EAAIP,EAC3C,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMG,CAAW,CAAC,EAGjE,MAAMF,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,yFAAyFN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACnJ,CACF,CACF,CAAC,EAED,GAAG,sEAAuE,SAAY,CAEpF,KAAM,CAAE,sBAAuBO,EAAG,GAAGC,CAAW,EAAIP,EACpD,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMG,CAAW,CAAC,EAGjE,MAAMF,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,yFAAyFN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACnJ,CACF,CACF,CAAC,EAED,GAAG,yDAA0D,SAAY,CAEvE,KAAM,CAAE,SAAUO,EAAG,GAAGC,CAAW,EAAIP,EACvC,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMG,CAAW,CAAC,EAGjE,MAAMF,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,yFAAyFN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACnJ,CACF,CACF,CAAC,EAED,GAAG,iEAAkE,SAAY,CAE/E,KAAM,CAAE,iBAAkBO,EAAG,GAAGC,CAAW,EAAIP,EAC/C,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMG,CAAW,CAAC,EAGjE,MAAMF,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,yFAAyFN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACnJ,CACF,CACF,CAAC,EAED,GAAG,2DAA4D,SAAY,CAEzE,KAAM,CAAE,WAAYO,EAAG,GAAGC,CAAW,EAAIP,EACzC,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMG,CAAW,CAAC,EAGjE,MAAMF,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,yFAAyFN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACnJ,CACF,CACF,CAAC,EAED,GAAG,kEAAmE,SAAY,CAEhF,MAAMQ,EAAa,CAAE,GAAGP,EAAU,aAAc,GAAI,EACpD,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMG,CAAW,CAAC,EAGjE,MAAMF,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,yFAAyFN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACnJ,CACF,CACF,CAAC,EAED,GAAG,2EAA4E,SAAY,CAEzF,MAAMQ,EAAa,CAAE,GAAGP,EAAU,sBAAuB,IAAK,EAC9D,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMG,CAAW,CAAC,EAGjE,MAAMF,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,yFAAyFN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACnJ,CACF,CACF,CAAC,EAED,GAAG,8DAA+D,SAAY,CAE5E,MAAMQ,EAAa,CAAE,GAAGP,EAAU,SAAU,CAAC,CAAE,EAC/C,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMG,CAAW,CAAC,EAGjE,MAAMF,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,yFAAyFN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACnJ,CACF,CACF,CAAC,EAED,GAAG,sEAAuE,SAAY,CAEpF,MAAMQ,EAAa,CAAE,GAAGP,EAAU,iBAAkB,CAAC,CAAE,EACvD,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMG,CAAW,CAAC,EAGjE,MAAMF,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,yFAAyFN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACnJ,CACF,CACF,CAAC,EAED,GAAG,gEAAiE,SAAY,CAE9E,MAAMQ,EAAa,CAAE,GAAGP,EAAU,WAAY,EAAK,EACnD,GAAG,MAAM,EAAAI,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMG,CAAW,CAAC,EAGjE,MAAMF,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,yFAAyFN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACnJ,CACF,CACF,CAAC,EAED,GAAG,+DAAgE,SAAY,CAE7E,GAAG,MAAM,EAAAK,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAM,eAAgB,CAAC,EAGtE,MAAMC,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,yFAAyFN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACnJ,CACF,CACF,CAAC,EAED,GAAG,sDAAuD,SAAY,CAEpE,GAAG,MAAM,EAAAK,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAM,IAAK,CAAC,EAG3D,MAAMC,EACJ,MAAMP,EAAW,8BAA8BC,CAAW,EAG5D,OAAOM,EAAO,OAAO,CAAC,EAAE,KAAK,EAAI,EACjC,OAAOA,EAAO,QAAQ,CAAC,EAAE,QACvB,IAAI,MACF,uEAAuEN,EAAY,YAAY,aAAaA,EAAY,OAAO,EACjI,CACF,CACF,CAAC,EAED,GAAG,mDAAoD,SAAY,CAEjE,MAAMS,EAA6B,CAAE,GAAGT,EAAa,QAAS,GAAI,EAClE,GAAG,MAAM,EAAAK,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMJ,CAAS,CAAC,EAG/D,MAAMK,EAAS,MAAMP,EAAW,8BAC9BU,CACF,EAGA,OAAOH,EAAO,QAAQ,CAAC,EAAE,KAAK,EAAI,EAClC,OAAO,EAAAD,QAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,IAAK,GAAGP,EAAO,sBAAsB,GAAG,mCAAmCE,EAAY,YAAY,EACrG,CAAC,CACH,CACF,CAAC,EAED,GAAG,oDAAqD,SAAY,CAElE,MAAMU,EACJ,6CACIC,EAA6B,CACjC,GAAGX,EACH,aAAcU,CAChB,EACA,GAAG,MAAM,EAAAL,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMJ,CAAS,CAAC,EAG/D,MAAMK,EAAS,MAAMP,EAAW,8BAC9BY,CACF,EAGA,OAAOL,EAAO,QAAQ,CAAC,EAAE,KAAK,EAAI,EAClC,OAAO,EAAAD,QAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,IAAK,GAAGP,EAAO,sBAAsB,GAAG,gBAAgBE,EAAY,OAAO,mBAAmBU,CAAqB,EACrH,CAAC,CACH,CACF,CAAC,EAED,GAAG,4CAA6C,SAAY,CAE1D,MAAME,EAAkB,0BAClBC,EAA4B,CAChC,GAAGb,EACH,UAAWY,CACb,EACA,GAAG,MAAM,EAAAP,QAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMJ,CAAS,CAAC,EAG/D,MAAMK,EAAS,MAAMP,EAAW,8BAC9Bc,CACF,EAGA,OAAOP,EAAO,QAAQ,CAAC,EAAE,KAAK,EAAI,EAClC,OAAO,EAAAD,QAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,OAAQ,CACN,UAAWO,EACX,SAAU,cACZ,CACF,CAAC,CACH,CACF,CAAC,CACH,CAAC,CACH,CAAC",
6
6
  "names": ["import_axios", "import_HttpHeaders", "import_package", "import_HttpSafeProxyDataSource", "config", "datasource", "validParams", "validDto", "version", "PACKAGE", "requestSpy", "axios", "result", "_", "invalidDto", "paramsWithDifferentChainId", "differentProxyAddress", "paramsWithDifferentAddress", "customChallenge", "paramsWithCustomChallenge"]
7
7
  }
@@ -1,2 +1,2 @@
1
- "use strict";var p=Object.defineProperty;var u=Object.getOwnPropertyDescriptor;var n=Object.getOwnPropertyNames;var c=Object.prototype.hasOwnProperty;var d=(r,o)=>{for(var e in o)p(r,e,{get:o[e],enumerable:!0})},l=(r,o,e,x)=>{if(o&&typeof o=="object"||typeof o=="function")for(let t of n(o))!c.call(r,t)&&t!==e&&p(r,t,{get:()=>o[t],enumerable:!(x=u(o,t))||x.enumerable});return r};var C=r=>l(p({},"__esModule",{value:!0}),r);var s={};d(s,{proxyModuleFactory:()=>P});module.exports=C(s);var m=require("inversify"),y=require("../../proxy/data/HttpProxyDataSource"),f=require("../../proxy/data/HttpSafeProxyDataSource"),a=require("../../proxy/di/proxyTypes"),i=require("../../proxy/domain/ProxyContextFieldLoader");const P=r=>new m.ContainerModule(({bind:o})=>{r?.datasource?.proxy==="safe"?o(a.proxyTypes.ProxyDataSource).to(f.HttpSafeProxyDataSource):o(a.proxyTypes.ProxyDataSource).to(y.HttpProxyDataSource),o(a.proxyTypes.ProxyContextFieldLoader).to(i.ProxyContextFieldLoader)});0&&(module.exports={proxyModuleFactory});
1
+ "use strict";var p=Object.defineProperty;var u=Object.getOwnPropertyDescriptor;var c=Object.getOwnPropertyNames;var n=Object.prototype.hasOwnProperty;var l=(r,o)=>{for(var e in o)p(r,e,{get:o[e],enumerable:!0})},C=(r,o,e,x)=>{if(o&&typeof o=="object"||typeof o=="function")for(let t of c(o))!n.call(r,t)&&t!==e&&p(r,t,{get:()=>o[t],enumerable:!(x=u(o,t))||x.enumerable});return r};var d=r=>C(p({},"__esModule",{value:!0}),r);var D={};l(D,{proxyModuleFactory:()=>s});module.exports=d(D);var m=require("inversify"),y=require("../../proxy/data/HttpProxyDataSource"),f=require("../../proxy/data/HttpSafeProxyDataSource"),a=require("../../proxy/di/proxyTypes"),i=require("../../proxy/domain/ProxyContextFieldLoader");const s=r=>new m.ContainerModule(({bind:o})=>{r?.proxy==="safe"?o(a.proxyTypes.ProxyDataSource).to(f.HttpSafeProxyDataSource):o(a.proxyTypes.ProxyDataSource).to(y.HttpProxyDataSource),o(a.proxyTypes.ProxyContextFieldLoader).to(i.ProxyContextFieldLoader)});0&&(module.exports={proxyModuleFactory});
2
2
  //# sourceMappingURL=proxyModuleFactory.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/proxy/di/proxyModuleFactory.ts"],
4
- "sourcesContent": ["import { ContainerModule } from \"inversify\";\n\nimport { type ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport { HttpProxyDataSource } from \"@/proxy/data/HttpProxyDataSource\";\nimport { HttpSafeProxyDataSource } from \"@/proxy/data/HttpSafeProxyDataSource\";\nimport { proxyTypes } from \"@/proxy/di/proxyTypes\";\nimport { ProxyContextFieldLoader } from \"@/proxy/domain/ProxyContextFieldLoader\";\n\nexport const proxyModuleFactory = (config?: ContextModuleConfig) =>\n new ContainerModule(({ bind }) => {\n if (config?.datasource?.proxy === \"safe\") {\n bind(proxyTypes.ProxyDataSource).to(HttpSafeProxyDataSource);\n } else {\n bind(proxyTypes.ProxyDataSource).to(HttpProxyDataSource);\n }\n bind(proxyTypes.ProxyContextFieldLoader).to(ProxyContextFieldLoader);\n });\n"],
5
- "mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,wBAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAAgC,qBAGhCC,EAAoC,4CACpCC,EAAwC,gDACxCC,EAA2B,iCAC3BC,EAAwC,kDAEjC,MAAMN,EAAsBO,GACjC,IAAI,kBAAgB,CAAC,CAAE,KAAAC,CAAK,IAAM,CAC5BD,GAAQ,YAAY,QAAU,OAChCC,EAAK,aAAW,eAAe,EAAE,GAAG,yBAAuB,EAE3DA,EAAK,aAAW,eAAe,EAAE,GAAG,qBAAmB,EAEzDA,EAAK,aAAW,uBAAuB,EAAE,GAAG,yBAAuB,CACrE,CAAC",
6
- "names": ["proxyModuleFactory_exports", "__export", "proxyModuleFactory", "__toCommonJS", "import_inversify", "import_HttpProxyDataSource", "import_HttpSafeProxyDataSource", "import_proxyTypes", "import_ProxyContextFieldLoader", "config", "bind"]
4
+ "sourcesContent": ["import { ContainerModule } from \"inversify\";\n\nimport { type ContextModuleDatasourceConfig } from \"@/config/model/ContextModuleConfig\";\nimport { HttpProxyDataSource } from \"@/proxy/data/HttpProxyDataSource\";\nimport { HttpSafeProxyDataSource } from \"@/proxy/data/HttpSafeProxyDataSource\";\nimport { proxyTypes } from \"@/proxy/di/proxyTypes\";\nimport { ProxyContextFieldLoader } from \"@/proxy/domain/ProxyContextFieldLoader\";\n\nexport const proxyModuleFactory = (\n datasource?: ContextModuleDatasourceConfig,\n) =>\n new ContainerModule(({ bind }) => {\n if (datasource?.proxy === \"safe\") {\n bind(proxyTypes.ProxyDataSource).to(HttpSafeProxyDataSource);\n } else {\n bind(proxyTypes.ProxyDataSource).to(HttpProxyDataSource);\n }\n bind(proxyTypes.ProxyContextFieldLoader).to(ProxyContextFieldLoader);\n });\n"],
5
+ "mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,wBAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAAgC,qBAGhCC,EAAoC,4CACpCC,EAAwC,gDACxCC,EAA2B,iCAC3BC,EAAwC,kDAEjC,MAAMN,EACXO,GAEA,IAAI,kBAAgB,CAAC,CAAE,KAAAC,CAAK,IAAM,CAC5BD,GAAY,QAAU,OACxBC,EAAK,aAAW,eAAe,EAAE,GAAG,yBAAuB,EAE3DA,EAAK,aAAW,eAAe,EAAE,GAAG,qBAAmB,EAEzDA,EAAK,aAAW,uBAAuB,EAAE,GAAG,yBAAuB,CACrE,CAAC",
6
+ "names": ["proxyModuleFactory_exports", "__export", "proxyModuleFactory", "__toCommonJS", "import_inversify", "import_HttpProxyDataSource", "import_HttpSafeProxyDataSource", "import_proxyTypes", "import_ProxyContextFieldLoader", "datasource", "bind"]
7
7
  }
@@ -1,2 +1,2 @@
1
- "use strict";var d=require("inversify"),s=require("../../config/di/configTypes"),u=require("../../pki/di/pkiTypes"),i=require("../../proxy/data/HttpProxyDataSource"),f=require("../../proxy/data/HttpSafeProxyDataSource"),c=require("../../proxy/domain/ProxyContextFieldLoader"),n=require("./proxyModuleFactory"),r=require("./proxyTypes");describe("proxyModuleFactory",()=>{let o;const x={metadataServiceDomain:{url:"https://metadata.api.live.ledger.com"},originToken:"test-origin-token"},l={loadCertificate:vi.fn()};beforeEach(()=>{o=new d.Container,o.bind(s.configTypes.Config).toConstantValue(x),o.bind(u.pkiTypes.PkiCertificateLoader).toConstantValue(l)}),describe("when config is undefined",()=>{it("should bind HttpProxyDataSource as the default ProxyDataSource",()=>{const a=(0,n.proxyModuleFactory)();o.load(a);const e=o.get(r.proxyTypes.ProxyDataSource);expect(e).toBeInstanceOf(i.HttpProxyDataSource)}),it("should bind ProxyContextFieldLoader",()=>{const a=(0,n.proxyModuleFactory)();o.load(a);const e=o.get(r.proxyTypes.ProxyContextFieldLoader);expect(e).toBeInstanceOf(c.ProxyContextFieldLoader)})}),describe("when config.datasource.proxy is 'safe'",()=>{it("should bind HttpSafeProxyDataSource as the ProxyDataSource",()=>{const e=(0,n.proxyModuleFactory)({datasource:{proxy:"safe"}});o.load(e);const t=o.get(r.proxyTypes.ProxyDataSource);expect(t).toBeInstanceOf(f.HttpSafeProxyDataSource)}),it("should bind ProxyContextFieldLoader",()=>{const e=(0,n.proxyModuleFactory)({datasource:{proxy:"safe"}});o.load(e);const t=o.get(r.proxyTypes.ProxyContextFieldLoader);expect(t).toBeInstanceOf(c.ProxyContextFieldLoader)})}),describe("when config.datasource.proxy is 'default'",()=>{it("should bind HttpProxyDataSource as the ProxyDataSource",()=>{const e=(0,n.proxyModuleFactory)({datasource:{proxy:"default"}});o.load(e);const t=o.get(r.proxyTypes.ProxyDataSource);expect(t).toBeInstanceOf(i.HttpProxyDataSource)})}),describe("when config.datasource is undefined",()=>{it("should bind HttpProxyDataSource as the default ProxyDataSource",()=>{const e=(0,n.proxyModuleFactory)({});o.load(e);const t=o.get(r.proxyTypes.ProxyDataSource);expect(t).toBeInstanceOf(i.HttpProxyDataSource)})}),describe("when config.datasource.proxy is an unexpected value",()=>{it("should bind HttpProxyDataSource as the default ProxyDataSource",()=>{const e=(0,n.proxyModuleFactory)({datasource:{proxy:"unknown"}});o.load(e);const t=o.get(r.proxyTypes.ProxyDataSource);expect(t).toBeInstanceOf(i.HttpProxyDataSource)})})});
1
+ "use strict";var i=require("inversify"),d=require("../../config/di/configTypes"),s=require("../../pki/di/pkiTypes"),n=require("../../proxy/data/HttpProxyDataSource"),u=require("../../proxy/data/HttpSafeProxyDataSource"),c=require("../../proxy/domain/ProxyContextFieldLoader"),a=require("./proxyModuleFactory"),r=require("./proxyTypes");describe("proxyModuleFactory",()=>{let o;const x={metadataServiceDomain:{url:"https://metadata.api.live.ledger.com"},originToken:"test-origin-token"},p={loadCertificate:vi.fn()};beforeEach(()=>{o=new i.Container,o.bind(d.configTypes.Config).toConstantValue(x),o.bind(s.pkiTypes.PkiCertificateLoader).toConstantValue(p)}),describe("when datasource config is undefined",()=>{it("should bind HttpProxyDataSource as the default ProxyDataSource",()=>{const e=(0,a.proxyModuleFactory)();o.load(e);const t=o.get(r.proxyTypes.ProxyDataSource);expect(t).toBeInstanceOf(n.HttpProxyDataSource)}),it("should bind ProxyContextFieldLoader",()=>{const e=(0,a.proxyModuleFactory)();o.load(e);const t=o.get(r.proxyTypes.ProxyContextFieldLoader);expect(t).toBeInstanceOf(c.ProxyContextFieldLoader)})}),describe("when datasource.proxy is 'safe'",()=>{it("should bind HttpSafeProxyDataSource as the ProxyDataSource",()=>{const e=(0,a.proxyModuleFactory)({proxy:"safe"});o.load(e);const t=o.get(r.proxyTypes.ProxyDataSource);expect(t).toBeInstanceOf(u.HttpSafeProxyDataSource)}),it("should bind ProxyContextFieldLoader",()=>{const e=(0,a.proxyModuleFactory)({proxy:"safe"});o.load(e);const t=o.get(r.proxyTypes.ProxyContextFieldLoader);expect(t).toBeInstanceOf(c.ProxyContextFieldLoader)})}),describe("when datasource.proxy is 'default'",()=>{it("should bind HttpProxyDataSource as the ProxyDataSource",()=>{const e=(0,a.proxyModuleFactory)({proxy:"default"});o.load(e);const t=o.get(r.proxyTypes.ProxyDataSource);expect(t).toBeInstanceOf(n.HttpProxyDataSource)})}),describe("when datasource has no proxy set",()=>{it("should bind HttpProxyDataSource as the default ProxyDataSource",()=>{const e=(0,a.proxyModuleFactory)({});o.load(e);const t=o.get(r.proxyTypes.ProxyDataSource);expect(t).toBeInstanceOf(n.HttpProxyDataSource)})}),describe("when datasource.proxy is an unexpected value",()=>{it("should bind HttpProxyDataSource as the default ProxyDataSource",()=>{const e=(0,a.proxyModuleFactory)({proxy:"unknown"});o.load(e);const t=o.get(r.proxyTypes.ProxyDataSource);expect(t).toBeInstanceOf(n.HttpProxyDataSource)})})});
2
2
  //# sourceMappingURL=proxyModuleFactory.test.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/proxy/di/proxyModuleFactory.test.ts"],
4
- "sourcesContent": ["import { Container } from \"inversify\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport { type ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport { pkiTypes } from \"@/pki/di/pkiTypes\";\nimport { type PkiCertificateLoader } from \"@/pki/domain/PkiCertificateLoader\";\nimport { HttpProxyDataSource } from \"@/proxy/data/HttpProxyDataSource\";\nimport { HttpSafeProxyDataSource } from \"@/proxy/data/HttpSafeProxyDataSource\";\nimport { ProxyContextFieldLoader } from \"@/proxy/domain/ProxyContextFieldLoader\";\n\nimport { proxyModuleFactory } from \"./proxyModuleFactory\";\nimport { proxyTypes } from \"./proxyTypes\";\n\ndescribe(\"proxyModuleFactory\", () => {\n let container: Container;\n const mockConfig: ContextModuleConfig = {\n metadataServiceDomain: {\n url: \"https://metadata.api.live.ledger.com\",\n },\n originToken: \"test-origin-token\",\n } as ContextModuleConfig;\n\n const mockPkiCertificateLoader: PkiCertificateLoader = {\n loadCertificate: vi.fn(),\n };\n\n beforeEach(() => {\n container = new Container();\n // Bind the config that the datasources depend on\n container.bind(configTypes.Config).toConstantValue(mockConfig);\n // Bind the PKI certificate loader that ProxyContextFieldLoader depends on\n container\n .bind(pkiTypes.PkiCertificateLoader)\n .toConstantValue(mockPkiCertificateLoader);\n });\n\n describe(\"when config is undefined\", () => {\n it(\"should bind HttpProxyDataSource as the default ProxyDataSource\", () => {\n const module = proxyModuleFactory();\n container.load(module);\n\n const proxyDataSource = container.get(proxyTypes.ProxyDataSource);\n expect(proxyDataSource).toBeInstanceOf(HttpProxyDataSource);\n });\n\n it(\"should bind ProxyContextFieldLoader\", () => {\n const module = proxyModuleFactory();\n container.load(module);\n\n const proxyContextFieldLoader = container.get(\n proxyTypes.ProxyContextFieldLoader,\n );\n expect(proxyContextFieldLoader).toBeInstanceOf(ProxyContextFieldLoader);\n });\n });\n\n describe(\"when config.datasource.proxy is 'safe'\", () => {\n it(\"should bind HttpSafeProxyDataSource as the ProxyDataSource\", () => {\n const config: ContextModuleConfig = {\n datasource: {\n proxy: \"safe\",\n },\n } as ContextModuleConfig;\n\n const module = proxyModuleFactory(config);\n container.load(module);\n\n const proxyDataSource = container.get(proxyTypes.ProxyDataSource);\n expect(proxyDataSource).toBeInstanceOf(HttpSafeProxyDataSource);\n });\n\n it(\"should bind ProxyContextFieldLoader\", () => {\n const config: ContextModuleConfig = {\n datasource: {\n proxy: \"safe\",\n },\n } as ContextModuleConfig;\n\n const module = proxyModuleFactory(config);\n container.load(module);\n\n const proxyContextFieldLoader = container.get(\n proxyTypes.ProxyContextFieldLoader,\n );\n expect(proxyContextFieldLoader).toBeInstanceOf(ProxyContextFieldLoader);\n });\n });\n\n describe(\"when config.datasource.proxy is 'default'\", () => {\n it(\"should bind HttpProxyDataSource as the ProxyDataSource\", () => {\n const config: ContextModuleConfig = {\n datasource: {\n proxy: \"default\",\n },\n } as ContextModuleConfig;\n\n const module = proxyModuleFactory(config);\n container.load(module);\n\n const proxyDataSource = container.get(proxyTypes.ProxyDataSource);\n expect(proxyDataSource).toBeInstanceOf(HttpProxyDataSource);\n });\n });\n\n describe(\"when config.datasource is undefined\", () => {\n it(\"should bind HttpProxyDataSource as the default ProxyDataSource\", () => {\n const config: ContextModuleConfig = {} as ContextModuleConfig;\n\n const module = proxyModuleFactory(config);\n container.load(module);\n\n const proxyDataSource = container.get(proxyTypes.ProxyDataSource);\n expect(proxyDataSource).toBeInstanceOf(HttpProxyDataSource);\n });\n });\n\n describe(\"when config.datasource.proxy is an unexpected value\", () => {\n it(\"should bind HttpProxyDataSource as the default ProxyDataSource\", () => {\n const config: ContextModuleConfig = {\n datasource: {\n proxy: \"unknown\" as unknown as \"safe\" | \"default\",\n },\n } as ContextModuleConfig;\n\n const module = proxyModuleFactory(config);\n container.load(module);\n\n const proxyDataSource = container.get(proxyTypes.ProxyDataSource);\n expect(proxyDataSource).toBeInstanceOf(HttpProxyDataSource);\n });\n });\n});\n"],
5
- "mappings": "aAAA,IAAAA,EAA0B,qBAE1BC,EAA4B,mCAE5BC,EAAyB,6BAEzBC,EAAoC,4CACpCC,EAAwC,gDACxCC,EAAwC,kDAExCC,EAAmC,gCACnCC,EAA2B,wBAE3B,SAAS,qBAAsB,IAAM,CACnC,IAAIC,EACJ,MAAMC,EAAkC,CACtC,sBAAuB,CACrB,IAAK,sCACP,EACA,YAAa,mBACf,EAEMC,EAAiD,CACrD,gBAAiB,GAAG,GAAG,CACzB,EAEA,WAAW,IAAM,CACfF,EAAY,IAAI,YAEhBA,EAAU,KAAK,cAAY,MAAM,EAAE,gBAAgBC,CAAU,EAE7DD,EACG,KAAK,WAAS,oBAAoB,EAClC,gBAAgBE,CAAwB,CAC7C,CAAC,EAED,SAAS,2BAA4B,IAAM,CACzC,GAAG,iEAAkE,IAAM,CACzE,MAAMC,KAAS,sBAAmB,EAClCH,EAAU,KAAKG,CAAM,EAErB,MAAMC,EAAkBJ,EAAU,IAAI,aAAW,eAAe,EAChE,OAAOI,CAAe,EAAE,eAAe,qBAAmB,CAC5D,CAAC,EAED,GAAG,sCAAuC,IAAM,CAC9C,MAAMD,KAAS,sBAAmB,EAClCH,EAAU,KAAKG,CAAM,EAErB,MAAME,EAA0BL,EAAU,IACxC,aAAW,uBACb,EACA,OAAOK,CAAuB,EAAE,eAAe,yBAAuB,CACxE,CAAC,CACH,CAAC,EAED,SAAS,yCAA0C,IAAM,CACvD,GAAG,6DAA8D,IAAM,CAOrE,MAAMF,KAAS,sBANqB,CAClC,WAAY,CACV,MAAO,MACT,CACF,CAEwC,EACxCH,EAAU,KAAKG,CAAM,EAErB,MAAMC,EAAkBJ,EAAU,IAAI,aAAW,eAAe,EAChE,OAAOI,CAAe,EAAE,eAAe,yBAAuB,CAChE,CAAC,EAED,GAAG,sCAAuC,IAAM,CAO9C,MAAMD,KAAS,sBANqB,CAClC,WAAY,CACV,MAAO,MACT,CACF,CAEwC,EACxCH,EAAU,KAAKG,CAAM,EAErB,MAAME,EAA0BL,EAAU,IACxC,aAAW,uBACb,EACA,OAAOK,CAAuB,EAAE,eAAe,yBAAuB,CACxE,CAAC,CACH,CAAC,EAED,SAAS,4CAA6C,IAAM,CAC1D,GAAG,yDAA0D,IAAM,CAOjE,MAAMF,KAAS,sBANqB,CAClC,WAAY,CACV,MAAO,SACT,CACF,CAEwC,EACxCH,EAAU,KAAKG,CAAM,EAErB,MAAMC,EAAkBJ,EAAU,IAAI,aAAW,eAAe,EAChE,OAAOI,CAAe,EAAE,eAAe,qBAAmB,CAC5D,CAAC,CACH,CAAC,EAED,SAAS,sCAAuC,IAAM,CACpD,GAAG,iEAAkE,IAAM,CAGzE,MAAMD,KAAS,sBAFqB,CAAC,CAEG,EACxCH,EAAU,KAAKG,CAAM,EAErB,MAAMC,EAAkBJ,EAAU,IAAI,aAAW,eAAe,EAChE,OAAOI,CAAe,EAAE,eAAe,qBAAmB,CAC5D,CAAC,CACH,CAAC,EAED,SAAS,sDAAuD,IAAM,CACpE,GAAG,iEAAkE,IAAM,CAOzE,MAAMD,KAAS,sBANqB,CAClC,WAAY,CACV,MAAO,SACT,CACF,CAEwC,EACxCH,EAAU,KAAKG,CAAM,EAErB,MAAMC,EAAkBJ,EAAU,IAAI,aAAW,eAAe,EAChE,OAAOI,CAAe,EAAE,eAAe,qBAAmB,CAC5D,CAAC,CACH,CAAC,CACH,CAAC",
4
+ "sourcesContent": ["import { Container } from \"inversify\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport { pkiTypes } from \"@/pki/di/pkiTypes\";\nimport { type PkiCertificateLoader } from \"@/pki/domain/PkiCertificateLoader\";\nimport { HttpProxyDataSource } from \"@/proxy/data/HttpProxyDataSource\";\nimport { HttpSafeProxyDataSource } from \"@/proxy/data/HttpSafeProxyDataSource\";\nimport { ProxyContextFieldLoader } from \"@/proxy/domain/ProxyContextFieldLoader\";\n\nimport { proxyModuleFactory } from \"./proxyModuleFactory\";\nimport { proxyTypes } from \"./proxyTypes\";\n\ndescribe(\"proxyModuleFactory\", () => {\n let container: Container;\n const mockConfig: ContextModuleServiceConfig = {\n metadataServiceDomain: {\n url: \"https://metadata.api.live.ledger.com\",\n },\n originToken: \"test-origin-token\",\n } as ContextModuleServiceConfig;\n\n const mockPkiCertificateLoader: PkiCertificateLoader = {\n loadCertificate: vi.fn(),\n };\n\n beforeEach(() => {\n container = new Container();\n container.bind(configTypes.Config).toConstantValue(mockConfig);\n container\n .bind(pkiTypes.PkiCertificateLoader)\n .toConstantValue(mockPkiCertificateLoader);\n });\n\n describe(\"when datasource config is undefined\", () => {\n it(\"should bind HttpProxyDataSource as the default ProxyDataSource\", () => {\n const module = proxyModuleFactory();\n container.load(module);\n\n const proxyDataSource = container.get(proxyTypes.ProxyDataSource);\n expect(proxyDataSource).toBeInstanceOf(HttpProxyDataSource);\n });\n\n it(\"should bind ProxyContextFieldLoader\", () => {\n const module = proxyModuleFactory();\n container.load(module);\n\n const proxyContextFieldLoader = container.get(\n proxyTypes.ProxyContextFieldLoader,\n );\n expect(proxyContextFieldLoader).toBeInstanceOf(ProxyContextFieldLoader);\n });\n });\n\n describe(\"when datasource.proxy is 'safe'\", () => {\n it(\"should bind HttpSafeProxyDataSource as the ProxyDataSource\", () => {\n const module = proxyModuleFactory({ proxy: \"safe\" });\n container.load(module);\n\n const proxyDataSource = container.get(proxyTypes.ProxyDataSource);\n expect(proxyDataSource).toBeInstanceOf(HttpSafeProxyDataSource);\n });\n\n it(\"should bind ProxyContextFieldLoader\", () => {\n const module = proxyModuleFactory({ proxy: \"safe\" });\n container.load(module);\n\n const proxyContextFieldLoader = container.get(\n proxyTypes.ProxyContextFieldLoader,\n );\n expect(proxyContextFieldLoader).toBeInstanceOf(ProxyContextFieldLoader);\n });\n });\n\n describe(\"when datasource.proxy is 'default'\", () => {\n it(\"should bind HttpProxyDataSource as the ProxyDataSource\", () => {\n const module = proxyModuleFactory({ proxy: \"default\" });\n container.load(module);\n\n const proxyDataSource = container.get(proxyTypes.ProxyDataSource);\n expect(proxyDataSource).toBeInstanceOf(HttpProxyDataSource);\n });\n });\n\n describe(\"when datasource has no proxy set\", () => {\n it(\"should bind HttpProxyDataSource as the default ProxyDataSource\", () => {\n const module = proxyModuleFactory({});\n container.load(module);\n\n const proxyDataSource = container.get(proxyTypes.ProxyDataSource);\n expect(proxyDataSource).toBeInstanceOf(HttpProxyDataSource);\n });\n });\n\n describe(\"when datasource.proxy is an unexpected value\", () => {\n it(\"should bind HttpProxyDataSource as the default ProxyDataSource\", () => {\n const module = proxyModuleFactory({\n proxy: \"unknown\" as unknown as \"safe\" | \"default\",\n });\n container.load(module);\n\n const proxyDataSource = container.get(proxyTypes.ProxyDataSource);\n expect(proxyDataSource).toBeInstanceOf(HttpProxyDataSource);\n });\n });\n});\n"],
5
+ "mappings": "aAAA,IAAAA,EAA0B,qBAE1BC,EAA4B,mCAE5BC,EAAyB,6BAEzBC,EAAoC,4CACpCC,EAAwC,gDACxCC,EAAwC,kDAExCC,EAAmC,gCACnCC,EAA2B,wBAE3B,SAAS,qBAAsB,IAAM,CACnC,IAAIC,EACJ,MAAMC,EAAyC,CAC7C,sBAAuB,CACrB,IAAK,sCACP,EACA,YAAa,mBACf,EAEMC,EAAiD,CACrD,gBAAiB,GAAG,GAAG,CACzB,EAEA,WAAW,IAAM,CACfF,EAAY,IAAI,YAChBA,EAAU,KAAK,cAAY,MAAM,EAAE,gBAAgBC,CAAU,EAC7DD,EACG,KAAK,WAAS,oBAAoB,EAClC,gBAAgBE,CAAwB,CAC7C,CAAC,EAED,SAAS,sCAAuC,IAAM,CACpD,GAAG,iEAAkE,IAAM,CACzE,MAAMC,KAAS,sBAAmB,EAClCH,EAAU,KAAKG,CAAM,EAErB,MAAMC,EAAkBJ,EAAU,IAAI,aAAW,eAAe,EAChE,OAAOI,CAAe,EAAE,eAAe,qBAAmB,CAC5D,CAAC,EAED,GAAG,sCAAuC,IAAM,CAC9C,MAAMD,KAAS,sBAAmB,EAClCH,EAAU,KAAKG,CAAM,EAErB,MAAME,EAA0BL,EAAU,IACxC,aAAW,uBACb,EACA,OAAOK,CAAuB,EAAE,eAAe,yBAAuB,CACxE,CAAC,CACH,CAAC,EAED,SAAS,kCAAmC,IAAM,CAChD,GAAG,6DAA8D,IAAM,CACrE,MAAMF,KAAS,sBAAmB,CAAE,MAAO,MAAO,CAAC,EACnDH,EAAU,KAAKG,CAAM,EAErB,MAAMC,EAAkBJ,EAAU,IAAI,aAAW,eAAe,EAChE,OAAOI,CAAe,EAAE,eAAe,yBAAuB,CAChE,CAAC,EAED,GAAG,sCAAuC,IAAM,CAC9C,MAAMD,KAAS,sBAAmB,CAAE,MAAO,MAAO,CAAC,EACnDH,EAAU,KAAKG,CAAM,EAErB,MAAME,EAA0BL,EAAU,IACxC,aAAW,uBACb,EACA,OAAOK,CAAuB,EAAE,eAAe,yBAAuB,CACxE,CAAC,CACH,CAAC,EAED,SAAS,qCAAsC,IAAM,CACnD,GAAG,yDAA0D,IAAM,CACjE,MAAMF,KAAS,sBAAmB,CAAE,MAAO,SAAU,CAAC,EACtDH,EAAU,KAAKG,CAAM,EAErB,MAAMC,EAAkBJ,EAAU,IAAI,aAAW,eAAe,EAChE,OAAOI,CAAe,EAAE,eAAe,qBAAmB,CAC5D,CAAC,CACH,CAAC,EAED,SAAS,mCAAoC,IAAM,CACjD,GAAG,iEAAkE,IAAM,CACzE,MAAMD,KAAS,sBAAmB,CAAC,CAAC,EACpCH,EAAU,KAAKG,CAAM,EAErB,MAAMC,EAAkBJ,EAAU,IAAI,aAAW,eAAe,EAChE,OAAOI,CAAe,EAAE,eAAe,qBAAmB,CAC5D,CAAC,CACH,CAAC,EAED,SAAS,+CAAgD,IAAM,CAC7D,GAAG,iEAAkE,IAAM,CACzE,MAAMD,KAAS,sBAAmB,CAChC,MAAO,SACT,CAAC,EACDH,EAAU,KAAKG,CAAM,EAErB,MAAMC,EAAkBJ,EAAU,IAAI,aAAW,eAAe,EAChE,OAAOI,CAAe,EAAE,eAAe,qBAAmB,CAC5D,CAAC,CACH,CAAC,CACH,CAAC",
6
6
  "names": ["import_inversify", "import_configTypes", "import_pkiTypes", "import_HttpProxyDataSource", "import_HttpSafeProxyDataSource", "import_ProxyContextFieldLoader", "import_proxyModuleFactory", "import_proxyTypes", "container", "mockConfig", "mockPkiCertificateLoader", "module", "proxyDataSource", "proxyContextFieldLoader"]
7
7
  }
@@ -0,0 +1,2 @@
1
+ "use strict";var t=Object.defineProperty;var o=Object.getOwnPropertyDescriptor;var l=Object.getOwnPropertyNames;var d=Object.prototype.hasOwnProperty;var p=(i,n,g,r)=>{if(n&&typeof n=="object"||typeof n=="function")for(let e of l(n))!d.call(i,e)&&e!==g&&t(i,e,{get:()=>n[e],enumerable:!(r=o(n,e))||r.enumerable});return i};var a=i=>p(t({},"__esModule",{value:!0}),i);var s={};module.exports=a(s);
2
+ //# sourceMappingURL=BlindSigningReporterDatasource.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/reporter/data/BlindSigningReporterDatasource.ts"],
4
+ "sourcesContent": ["import { type Either } from \"purify-ts\";\n\nimport {\n type BlindSigningMethod,\n type BlindSignReason,\n type ClearSigningType,\n} from \"@/reporter/model/BlindSigningEvent\";\nimport { type BlindSigningModelId } from \"@/reporter/model/BlindSigningModelId\";\n\nexport type BlindSigningReportEthContext = {\n clearSigningType: ClearSigningType;\n partialContextErrors: number;\n};\n\nexport type BlindSigningReportParams = {\n signatureId: string;\n signingMethod: BlindSigningMethod;\n isBlindSign: boolean;\n chainId: number | null;\n targetAddress: string | null;\n blindSignReason: BlindSignReason | null;\n modelId: BlindSigningModelId;\n signerAppVersion: string;\n deviceVersion: string | null;\n ethContext: BlindSigningReportEthContext | null;\n};\n\nexport interface BlindSigningReporterDatasource {\n report(params: BlindSigningReportParams): Promise<Either<Error, void>>;\n}\n"],
5
+ "mappings": "+WAAA,IAAAA,EAAA,kBAAAC,EAAAD",
6
+ "names": ["BlindSigningReporterDatasource_exports", "__toCommonJS"]
7
+ }
@@ -0,0 +1,2 @@
1
+ "use strict";var C=Object.create;var n=Object.defineProperty;var g=Object.getOwnPropertyDescriptor;var v=Object.getOwnPropertyNames;var S=Object.getPrototypeOf,_=Object.prototype.hasOwnProperty;var x=(e,r)=>{for(var o in r)n(e,o,{get:r[o],enumerable:!0})},d=(e,r,o,t)=>{if(r&&typeof r=="object"||typeof r=="function")for(let i of v(r))!_.call(e,i)&&i!==o&&n(e,i,{get:()=>r[i],enumerable:!(t=g(r,i))||t.enumerable});return e};var E=(e,r,o)=>(o=e!=null?C(S(e)):{},d(r||!e||!e.__esModule?n(o,"default",{value:e,enumerable:!0}):o,e)),P=e=>d(n({},"__esModule",{value:!0}),e),l=(e,r,o,t)=>{for(var i=t>1?void 0:t?g(r,o):r,c=e.length-1,f;c>=0;c--)(f=e[c])&&(i=(t?f(r,o,i):f(i))||i);return t&&i&&n(r,o,i),i},u=(e,r)=>(o,t)=>r(o,t,e);var T={};x(T,{HttpBlindSigningReporterDatasource:()=>m});module.exports=P(T);var h=E(require("axios")),p=require("inversify"),s=require("purify-ts"),R=require("../../config/di/configTypes"),a=require("../../shared/constant/HttpHeaders"),y=E(require("../../../package.json"));let m=class{constructor(r){this.config=r}async report(r){try{await h.default.request({method:"POST",url:`${this.config.reporter.url}/blind-signing-events`,data:{...r,source:this.config.appSource},headers:{[a.LEDGER_CLIENT_VERSION_HEADER]:`context-module/${y.default.version}`,[a.LEDGER_ORIGIN_TOKEN_HEADER]:this.config.originToken}})}catch{return(0,s.Left)(new Error("[ContextModule] HttpBlindSigningReporterDatasource: Failed to report blind signing event"))}return(0,s.Right)(void 0)}};m=l([(0,p.injectable)(),u(0,(0,p.inject)(R.configTypes.Config))],m);0&&(module.exports={HttpBlindSigningReporterDatasource});
2
+ //# sourceMappingURL=HttpBlindSigningReporterDatasource.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/reporter/data/HttpBlindSigningReporterDatasource.ts"],
4
+ "sourcesContent": ["import axios from \"axios\";\nimport { inject, injectable } from \"inversify\";\nimport { type Either, Left, Right } from \"purify-ts\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport {\n LEDGER_CLIENT_VERSION_HEADER,\n LEDGER_ORIGIN_TOKEN_HEADER,\n} from \"@/shared/constant/HttpHeaders\";\nimport PACKAGE from \"@root/package.json\";\n\nimport {\n type BlindSigningReporterDatasource,\n type BlindSigningReportParams,\n} from \"./BlindSigningReporterDatasource\";\n\n@injectable()\nexport class HttpBlindSigningReporterDatasource\n implements BlindSigningReporterDatasource\n{\n constructor(\n @inject(configTypes.Config)\n private readonly config: ContextModuleServiceConfig,\n ) {}\n\n async report(params: BlindSigningReportParams): Promise<Either<Error, void>> {\n try {\n await axios.request({\n method: \"POST\",\n url: `${this.config.reporter.url}/blind-signing-events`,\n data: { ...params, source: this.config.appSource },\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: `context-module/${PACKAGE.version}`,\n [LEDGER_ORIGIN_TOKEN_HEADER]: this.config.originToken,\n },\n });\n } catch (_error) {\n return Left(\n new Error(\n \"[ContextModule] HttpBlindSigningReporterDatasource: Failed to report blind signing event\",\n ),\n );\n }\n\n return Right(undefined);\n }\n}\n"],
5
+ "mappings": "qtBAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,wCAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAAkB,oBAClBC,EAAmC,qBACnCC,EAAyC,qBAEzCC,EAA4B,mCAE5BC,EAGO,yCACPC,EAAoB,iCAQb,IAAMC,EAAN,KAEP,CACE,YAEmBC,EACjB,CADiB,YAAAA,CAChB,CAEH,MAAM,OAAOC,EAAgE,CAC3E,GAAI,CACF,MAAM,EAAAC,QAAM,QAAQ,CAClB,OAAQ,OACR,IAAK,GAAG,KAAK,OAAO,SAAS,GAAG,wBAChC,KAAM,CAAE,GAAGD,EAAQ,OAAQ,KAAK,OAAO,SAAU,EACjD,QAAS,CACP,CAAC,8BAA4B,EAAG,kBAAkB,EAAAE,QAAQ,OAAO,GACjE,CAAC,4BAA0B,EAAG,KAAK,OAAO,WAC5C,CACF,CAAC,CACH,MAAiB,CACf,SAAO,QACL,IAAI,MACF,0FACF,CACF,CACF,CAEA,SAAO,SAAM,MAAS,CACxB,CACF,EA7BaJ,EAANK,EAAA,IADN,cAAW,EAKPC,EAAA,eAAO,cAAY,MAAM,IAJjBN",
6
+ "names": ["HttpBlindSigningReporterDatasource_exports", "__export", "HttpBlindSigningReporterDatasource", "__toCommonJS", "import_axios", "import_inversify", "import_purify_ts", "import_configTypes", "import_HttpHeaders", "import_package", "HttpBlindSigningReporterDatasource", "config", "params", "axios", "PACKAGE", "__decorateClass", "__decorateParam"]
7
+ }
@@ -0,0 +1,2 @@
1
+ "use strict";var m=Object.create;var l=Object.defineProperty;var S=Object.getOwnPropertyDescriptor;var h=Object.getOwnPropertyNames;var E=Object.getPrototypeOf,R=Object.prototype.hasOwnProperty;var v=(e,t,o,n)=>{if(t&&typeof t=="object"||typeof t=="function")for(let s of h(t))!R.call(e,s)&&s!==o&&l(e,s,{get:()=>t[s],enumerable:!(n=S(t,s))||n.enumerable});return e};var p=(e,t,o)=>(o=e!=null?m(E(e)):{},v(t||!e||!e.__esModule?l(o,"default",{value:e,enumerable:!0}):o,e));var r=p(require("axios")),c=require("purify-ts"),i=require("../../reporter/data/HttpBlindSigningReporterDatasource"),a=require("../../reporter/model/BlindSigningEvent"),u=require("../../reporter/model/BlindSigningModelId"),d=require("../../shared/constant/HttpHeaders"),g=p(require("../../../package.json"));vi.mock("axios");describe("HttpBlindSigningReporterDatasource",()=>{const e={reporter:{url:"https://reporter.test"},originToken:"originToken",appSource:"third-party"},t={signatureId:"a3f8Kb-1738850400000",signingMethod:a.BlindSigningMethod.ETH_SIGN_TRANSACTION,isBlindSign:!0,chainId:1,targetAddress:"0xdAC17F958D2ee523a2206206994597C13D831ec7",blindSignReason:a.BlindSignReason.NO_CLEAR_SIGNING_CONTEXT,modelId:u.BlindSigningModelId.NANO_X,signerAppVersion:"1.12.1",deviceVersion:"2.2.3",ethContext:{clearSigningType:a.ClearSigningType.EIP7730,partialContextErrors:0}};beforeEach(()=>{vi.resetAllMocks()}),describe("report",()=>{it("should return Right(undefined) on success",async()=>{vi.spyOn(r.default,"request").mockResolvedValueOnce({data:{}});const n=await new i.HttpBlindSigningReporterDatasource(e).report(t);expect(n).toEqual((0,c.Right)(void 0))}),it("should return Left(Error) when the request fails",async()=>{vi.spyOn(r.default,"request").mockRejectedValueOnce(new Error("network error"));const n=await new i.HttpBlindSigningReporterDatasource(e).report(t);expect(n).toEqual((0,c.Left)(new Error("[ContextModule] HttpBlindSigningReporterDatasource: Failed to report blind signing event")))}),it("should call axios with the correct URL and method",async()=>{vi.spyOn(r.default,"request").mockResolvedValueOnce({data:{}}),await new i.HttpBlindSigningReporterDatasource(e).report(t),expect(r.default.request).toHaveBeenCalledWith(expect.objectContaining({method:"POST",url:`${e.reporter.url}/blind-signing-events`}))}),it("should call axios with the correct headers",async()=>{vi.spyOn(r.default,"request").mockResolvedValueOnce({data:{}}),await new i.HttpBlindSigningReporterDatasource(e).report(t),expect(r.default.request).toHaveBeenCalledWith(expect.objectContaining({headers:{[d.LEDGER_CLIENT_VERSION_HEADER]:`context-module/${g.default.version}`,[d.LEDGER_ORIGIN_TOKEN_HEADER]:e.originToken}}))}),it("should call axios with the event payload and injected source as data",async()=>{vi.spyOn(r.default,"request").mockResolvedValueOnce({data:{}}),await new i.HttpBlindSigningReporterDatasource(e).report(t),expect(r.default.request).toHaveBeenCalledWith(expect.objectContaining({data:{...t,source:e.appSource}}))})})});
2
+ //# sourceMappingURL=HttpBlindSigningReporterDatasource.test.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/reporter/data/HttpBlindSigningReporterDatasource.test.ts"],
4
+ "sourcesContent": ["import axios from \"axios\";\nimport { Left, Right } from \"purify-ts\";\n\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport { type BlindSigningReportParams } from \"@/reporter/data/BlindSigningReporterDatasource\";\nimport { HttpBlindSigningReporterDatasource } from \"@/reporter/data/HttpBlindSigningReporterDatasource\";\nimport {\n BlindSigningMethod,\n BlindSignReason,\n ClearSigningType,\n} from \"@/reporter/model/BlindSigningEvent\";\nimport { BlindSigningModelId } from \"@/reporter/model/BlindSigningModelId\";\nimport {\n LEDGER_CLIENT_VERSION_HEADER,\n LEDGER_ORIGIN_TOKEN_HEADER,\n} from \"@/shared/constant/HttpHeaders\";\nimport PACKAGE from \"@root/package.json\";\n\nvi.mock(\"axios\");\n\ndescribe(\"HttpBlindSigningReporterDatasource\", () => {\n const config = {\n reporter: {\n url: \"https://reporter.test\",\n },\n originToken: \"originToken\",\n appSource: \"third-party\",\n } as ContextModuleServiceConfig;\n\n const params: BlindSigningReportParams = {\n signatureId: \"a3f8Kb-1738850400000\",\n signingMethod: BlindSigningMethod.ETH_SIGN_TRANSACTION,\n isBlindSign: true,\n chainId: 1,\n targetAddress: \"0xdAC17F958D2ee523a2206206994597C13D831ec7\",\n blindSignReason: BlindSignReason.NO_CLEAR_SIGNING_CONTEXT,\n modelId: BlindSigningModelId.NANO_X,\n signerAppVersion: \"1.12.1\",\n deviceVersion: \"2.2.3\",\n ethContext: {\n clearSigningType: ClearSigningType.EIP7730,\n partialContextErrors: 0,\n },\n };\n\n beforeEach(() => {\n vi.resetAllMocks();\n });\n\n describe(\"report\", () => {\n it(\"should return Right(undefined) on success\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValueOnce({ data: {} });\n\n // WHEN\n const dataSource = new HttpBlindSigningReporterDatasource(config);\n const result = await dataSource.report(params);\n\n // THEN\n expect(result).toEqual(Right(undefined));\n });\n\n it(\"should return Left(Error) when the request fails\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockRejectedValueOnce(\n new Error(\"network error\"),\n );\n\n // WHEN\n const dataSource = new HttpBlindSigningReporterDatasource(config);\n const result = await dataSource.report(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpBlindSigningReporterDatasource: Failed to report blind signing event\",\n ),\n ),\n );\n });\n\n it(\"should call axios with the correct URL and method\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValueOnce({ data: {} });\n\n // WHEN\n const dataSource = new HttpBlindSigningReporterDatasource(config);\n await dataSource.report(params);\n\n // THEN\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n method: \"POST\",\n url: `${config.reporter!.url}/blind-signing-events`,\n }),\n );\n });\n\n it(\"should call axios with the correct headers\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValueOnce({ data: {} });\n\n // WHEN\n const dataSource = new HttpBlindSigningReporterDatasource(config);\n await dataSource.report(params);\n\n // THEN\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: `context-module/${PACKAGE.version}`,\n [LEDGER_ORIGIN_TOKEN_HEADER]: config.originToken,\n },\n }),\n );\n });\n\n it(\"should call axios with the event payload and injected source as data\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValueOnce({ data: {} });\n\n // WHEN\n const dataSource = new HttpBlindSigningReporterDatasource(config);\n await dataSource.report(params);\n\n // THEN\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n data: { ...params, source: config.appSource },\n }),\n );\n });\n });\n});\n"],
5
+ "mappings": "wdAAA,IAAAA,EAAkB,oBAClBC,EAA4B,qBAI5BC,EAAmD,8DACnDC,EAIO,8CACPC,EAAoC,gDACpCC,EAGO,yCACPC,EAAoB,iCAEpB,GAAG,KAAK,OAAO,EAEf,SAAS,qCAAsC,IAAM,CACnD,MAAMC,EAAS,CACb,SAAU,CACR,IAAK,uBACP,EACA,YAAa,cACb,UAAW,aACb,EAEMC,EAAmC,CACvC,YAAa,uBACb,cAAe,qBAAmB,qBAClC,YAAa,GACb,QAAS,EACT,cAAe,6CACf,gBAAiB,kBAAgB,yBACjC,QAAS,sBAAoB,OAC7B,iBAAkB,SAClB,cAAe,QACf,WAAY,CACV,iBAAkB,mBAAiB,QACnC,qBAAsB,CACxB,CACF,EAEA,WAAW,IAAM,CACf,GAAG,cAAc,CACnB,CAAC,EAED,SAAS,SAAU,IAAM,CACvB,GAAG,4CAA6C,SAAY,CAE1D,GAAG,MAAM,EAAAC,QAAO,SAAS,EAAE,sBAAsB,CAAE,KAAM,CAAC,CAAE,CAAC,EAI7D,MAAMC,EAAS,MADI,IAAI,qCAAmCH,CAAM,EAChC,OAAOC,CAAM,EAG7C,OAAOE,CAAM,EAAE,WAAQ,SAAM,MAAS,CAAC,CACzC,CAAC,EAED,GAAG,mDAAoD,SAAY,CAEjE,GAAG,MAAM,EAAAD,QAAO,SAAS,EAAE,sBACzB,IAAI,MAAM,eAAe,CAC3B,EAIA,MAAMC,EAAS,MADI,IAAI,qCAAmCH,CAAM,EAChC,OAAOC,CAAM,EAG7C,OAAOE,CAAM,EAAE,WACb,QACE,IAAI,MACF,0FACF,CACF,CACF,CACF,CAAC,EAED,GAAG,oDAAqD,SAAY,CAElE,GAAG,MAAM,EAAAD,QAAO,SAAS,EAAE,sBAAsB,CAAE,KAAM,CAAC,CAAE,CAAC,EAI7D,MADmB,IAAI,qCAAmCF,CAAM,EAC/C,OAAOC,CAAM,EAG9B,OAAO,EAAAC,QAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,OAAQ,OACR,IAAK,GAAGF,EAAO,SAAU,GAAG,uBAC9B,CAAC,CACH,CACF,CAAC,EAED,GAAG,6CAA8C,SAAY,CAE3D,GAAG,MAAM,EAAAE,QAAO,SAAS,EAAE,sBAAsB,CAAE,KAAM,CAAC,CAAE,CAAC,EAI7D,MADmB,IAAI,qCAAmCF,CAAM,EAC/C,OAAOC,CAAM,EAG9B,OAAO,EAAAC,QAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,QAAS,CACP,CAAC,8BAA4B,EAAG,kBAAkB,EAAAE,QAAQ,OAAO,GACjE,CAAC,4BAA0B,EAAGJ,EAAO,WACvC,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,uEAAwE,SAAY,CAErF,GAAG,MAAM,EAAAE,QAAO,SAAS,EAAE,sBAAsB,CAAE,KAAM,CAAC,CAAE,CAAC,EAI7D,MADmB,IAAI,qCAAmCF,CAAM,EAC/C,OAAOC,CAAM,EAG9B,OAAO,EAAAC,QAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,KAAM,CAAE,GAAGD,EAAQ,OAAQD,EAAO,SAAU,CAC9C,CAAC,CACH,CACF,CAAC,CACH,CAAC,CACH,CAAC",
6
+ "names": ["import_axios", "import_purify_ts", "import_HttpBlindSigningReporterDatasource", "import_BlindSigningEvent", "import_BlindSigningModelId", "import_HttpHeaders", "import_package", "config", "params", "axios", "result", "PACKAGE"]
7
+ }
@@ -0,0 +1,2 @@
1
+ "use strict";var g=Object.defineProperty;var r=Object.getOwnPropertyDescriptor;var o=Object.getOwnPropertyNames;var d=Object.prototype.hasOwnProperty;var s=(i,n,l,e)=>{if(n&&typeof n=="object"||typeof n=="function")for(let t of o(n))!d.call(i,t)&&t!==l&&g(i,t,{get:()=>n[t],enumerable:!(e=r(n,t))||e.enumerable});return i};var p=i=>s(g({},"__esModule",{value:!0}),i);var a={};module.exports=p(a);
2
+ //# sourceMappingURL=BlindSigningEventDto.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../../src/reporter/data/dto/BlindSigningEventDto.ts"],
4
+ "sourcesContent": ["import {\n type BlindSigningMethod,\n type BlindSigningPlatform,\n type BlindSignReason,\n type ClearSigningType,\n} from \"@/reporter/model/BlindSigningEvent\";\nimport { type BlindSigningModelId } from \"@/reporter/model/BlindSigningModelId\";\n\nexport type BlindSigningEventEthContextDto = {\n clearSigningType: ClearSigningType;\n partialContextErrors: number;\n};\n\nexport type BlindSigningEventDto = {\n signatureId: string;\n signingMethod: BlindSigningMethod;\n source: string;\n isBlindSign: boolean;\n chainId: number | null;\n targetAddress: string | null;\n blindSignReason: BlindSignReason | null;\n modelId: BlindSigningModelId;\n signerAppVersion: string;\n deviceVersion: string | null;\n ethContext: BlindSigningEventEthContextDto | null;\n platform?: BlindSigningPlatform;\n appVersion?: string;\n platformOS?: string;\n platformVersion?: string;\n liveAppContext?: string | null;\n sessionId?: string | null;\n};\n"],
5
+ "mappings": "+WAAA,IAAAA,EAAA,kBAAAC,EAAAD",
6
+ "names": ["BlindSigningEventDto_exports", "__toCommonJS"]
7
+ }
@@ -0,0 +1,2 @@
1
+ "use strict";var i=Object.defineProperty;var l=Object.getOwnPropertyDescriptor;var d=Object.getOwnPropertyNames;var f=Object.prototype.hasOwnProperty;var u=(r,o)=>{for(var t in o)i(r,t,{get:o[t],enumerable:!0})},c=(r,o,t,p)=>{if(o&&typeof o=="object"||typeof o=="function")for(let e of d(o))!f.call(r,e)&&e!==t&&i(r,e,{get:()=>o[e],enumerable:!(p=l(o,e))||p.enumerable});return r};var s=r=>c(i({},"__esModule",{value:!0}),r);var R={};u(R,{reporterModuleFactory:()=>B});module.exports=s(R);var g=require("inversify"),m=require("../../reporter/data/HttpBlindSigningReporterDatasource"),n=require("../../reporter/di/reporterTypes"),a=require("../../reporter/domain/DefaultBlindSigningReporter");const B=()=>new g.ContainerModule(({bind:r})=>{r(n.reporterTypes.BlindSigningReporterDatasource).to(m.HttpBlindSigningReporterDatasource),r(n.reporterTypes.BlindSigningReporter).to(a.DefaultBlindSigningReporter)});0&&(module.exports={reporterModuleFactory});
2
+ //# sourceMappingURL=reporterModuleFactory.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/reporter/di/reporterModuleFactory.ts"],
4
+ "sourcesContent": ["import { ContainerModule } from \"inversify\";\n\nimport { HttpBlindSigningReporterDatasource } from \"@/reporter/data/HttpBlindSigningReporterDatasource\";\nimport { reporterTypes } from \"@/reporter/di/reporterTypes\";\nimport { DefaultBlindSigningReporter } from \"@/reporter/domain/DefaultBlindSigningReporter\";\n\nexport const reporterModuleFactory = () =>\n new ContainerModule(({ bind }) => {\n bind(reporterTypes.BlindSigningReporterDatasource).to(\n HttpBlindSigningReporterDatasource,\n );\n bind(reporterTypes.BlindSigningReporter).to(DefaultBlindSigningReporter);\n });\n"],
5
+ "mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,2BAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAAgC,qBAEhCC,EAAmD,8DACnDC,EAA8B,uCAC9BC,EAA4C,yDAErC,MAAML,EAAwB,IACnC,IAAI,kBAAgB,CAAC,CAAE,KAAAM,CAAK,IAAM,CAChCA,EAAK,gBAAc,8BAA8B,EAAE,GACjD,oCACF,EACAA,EAAK,gBAAc,oBAAoB,EAAE,GAAG,6BAA2B,CACzE,CAAC",
6
+ "names": ["reporterModuleFactory_exports", "__export", "reporterModuleFactory", "__toCommonJS", "import_inversify", "import_HttpBlindSigningReporterDatasource", "import_reporterTypes", "import_DefaultBlindSigningReporter", "bind"]
7
+ }
@@ -0,0 +1,2 @@
1
+ "use strict";var i=Object.defineProperty;var g=Object.getOwnPropertyDescriptor;var p=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var S=(e,r)=>{for(var o in r)i(e,o,{get:r[o],enumerable:!0})},a=(e,r,o,t)=>{if(r&&typeof r=="object"||typeof r=="function")for(let n of p(r))!l.call(e,n)&&n!==o&&i(e,n,{get:()=>r[n],enumerable:!(t=g(r,n))||t.enumerable});return e};var d=e=>a(i({},"__esModule",{value:!0}),e);var B={};S(B,{reporterTypes:()=>s});module.exports=d(B);const s={BlindSigningReporterDatasource:Symbol.for("BlindSigningReporterDatasource"),BlindSigningReporter:Symbol.for("BlindSigningReporter")};0&&(module.exports={reporterTypes});
2
+ //# sourceMappingURL=reporterTypes.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/reporter/di/reporterTypes.ts"],
4
+ "sourcesContent": ["export const reporterTypes = {\n BlindSigningReporterDatasource: Symbol.for(\"BlindSigningReporterDatasource\"),\n BlindSigningReporter: Symbol.for(\"BlindSigningReporter\"),\n};\n"],
5
+ "mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,mBAAAE,IAAA,eAAAC,EAAAH,GAAO,MAAME,EAAgB,CAC3B,+BAAgC,OAAO,IAAI,gCAAgC,EAC3E,qBAAsB,OAAO,IAAI,sBAAsB,CACzD",
6
+ "names": ["reporterTypes_exports", "__export", "reporterTypes", "__toCommonJS"]
7
+ }
@@ -0,0 +1,2 @@
1
+ "use strict";var t=Object.defineProperty;var p=Object.getOwnPropertyDescriptor;var m=Object.getOwnPropertyNames;var a=Object.prototype.hasOwnProperty;var g=(i,r,n,o)=>{if(r&&typeof r=="object"||typeof r=="function")for(let e of m(r))!a.call(i,e)&&e!==n&&t(i,e,{get:()=>r[e],enumerable:!(o=p(r,e))||o.enumerable});return i};var d=i=>g(t({},"__esModule",{value:!0}),i);var s={};module.exports=d(s);
2
+ //# sourceMappingURL=BlindSigningReporter.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/reporter/domain/BlindSigningReporter.ts"],
4
+ "sourcesContent": ["import { type Either } from \"purify-ts\";\n\nimport { type BlindSigningReportParams } from \"@/reporter/data/BlindSigningReporterDatasource\";\n\nexport interface BlindSigningReporter {\n report(params: BlindSigningReportParams): Promise<Either<Error, void>>;\n}\n"],
5
+ "mappings": "+WAAA,IAAAA,EAAA,kBAAAC,EAAAD",
6
+ "names": ["BlindSigningReporter_exports", "__toCommonJS"]
7
+ }
@@ -0,0 +1,2 @@
1
+ "use strict";var n=Object.defineProperty;var c=Object.getOwnPropertyDescriptor;var S=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var u=(e,r)=>{for(var t in r)n(e,t,{get:r[t],enumerable:!0})},B=(e,r,t,i)=>{if(r&&typeof r=="object"||typeof r=="function")for(let o of S(r))!l.call(e,o)&&o!==t&&n(e,o,{get:()=>r[o],enumerable:!(i=c(r,o))||i.enumerable});return e};var R=e=>B(n({},"__esModule",{value:!0}),e),d=(e,r,t,i)=>{for(var o=i>1?void 0:i?c(r,t):r,m=e.length-1,s;m>=0;m--)(s=e[m])&&(o=(i?s(r,t,o):s(o))||o);return i&&o&&n(r,t,o),o},g=(e,r)=>(t,i)=>r(t,i,e);var h={};u(h,{DefaultBlindSigningReporter:()=>p});module.exports=R(h);var a=require("inversify"),y=require("../../reporter/di/reporterTypes");let p=class{constructor(r){this.dataSource=r}async report(r){return this.dataSource.report(r)}};p=d([(0,a.injectable)(),g(0,(0,a.inject)(y.reporterTypes.BlindSigningReporterDatasource))],p);0&&(module.exports={DefaultBlindSigningReporter});
2
+ //# sourceMappingURL=DefaultBlindSigningReporter.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/reporter/domain/DefaultBlindSigningReporter.ts"],
4
+ "sourcesContent": ["import { inject, injectable } from \"inversify\";\nimport { type Either } from \"purify-ts\";\n\nimport {\n type BlindSigningReporterDatasource,\n type BlindSigningReportParams,\n} from \"@/reporter/data/BlindSigningReporterDatasource\";\nimport { reporterTypes } from \"@/reporter/di/reporterTypes\";\n\nimport { type BlindSigningReporter } from \"./BlindSigningReporter\";\n\n@injectable()\nexport class DefaultBlindSigningReporter implements BlindSigningReporter {\n constructor(\n @inject(reporterTypes.BlindSigningReporterDatasource)\n private readonly dataSource: BlindSigningReporterDatasource,\n ) {}\n\n async report(params: BlindSigningReportParams): Promise<Either<Error, void>> {\n return this.dataSource.report(params);\n }\n}\n"],
5
+ "mappings": "okBAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,iCAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAAmC,qBAOnCC,EAA8B,uCAKvB,IAAMC,EAAN,KAAkE,CACvE,YAEmBC,EACjB,CADiB,gBAAAA,CAChB,CAEH,MAAM,OAAOC,EAAgE,CAC3E,OAAO,KAAK,WAAW,OAAOA,CAAM,CACtC,CACF,EATaF,EAANG,EAAA,IADN,cAAW,EAGPC,EAAA,eAAO,gBAAc,8BAA8B,IAF3CJ",
6
+ "names": ["DefaultBlindSigningReporter_exports", "__export", "DefaultBlindSigningReporter", "__toCommonJS", "import_inversify", "import_reporterTypes", "DefaultBlindSigningReporter", "dataSource", "params", "__decorateClass", "__decorateParam"]
7
+ }
@@ -0,0 +1,2 @@
1
+ "use strict";var e=require("purify-ts"),r=require("../../reporter/model/BlindSigningEvent"),d=require("../../reporter/model/BlindSigningModelId"),i=require("./DefaultBlindSigningReporter");describe("DefaultBlindSigningReporter",()=>{const n={signatureId:"a3f8Kb-1738850400000",signingMethod:r.BlindSigningMethod.ETH_SIGN_TRANSACTION,isBlindSign:!0,chainId:1,targetAddress:"0xdAC17F958D2ee523a2206206994597C13D831ec7",blindSignReason:r.BlindSignReason.NO_CLEAR_SIGNING_CONTEXT,modelId:d.BlindSigningModelId.NANO_X,signerAppVersion:"1.12.1",deviceVersion:"2.2.3",ethContext:{clearSigningType:r.ClearSigningType.EIP7730,partialContextErrors:0}};it("should delegate to the datasource and return Right on success",async()=>{const t={report:vi.fn().mockResolvedValueOnce((0,e.Right)(void 0))},a=await new i.DefaultBlindSigningReporter(t).report(n);expect(t.report).toHaveBeenCalledWith(n),expect(a).toEqual((0,e.Right)(void 0))}),it("should delegate to the datasource and return Left on failure",async()=>{const t=new Error("report failed"),o={report:vi.fn().mockResolvedValueOnce((0,e.Left)(t))},s=await new i.DefaultBlindSigningReporter(o).report(n);expect(o.report).toHaveBeenCalledWith(n),expect(s).toEqual((0,e.Left)(t))})});
2
+ //# sourceMappingURL=DefaultBlindSigningReporter.test.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/reporter/domain/DefaultBlindSigningReporter.test.ts"],
4
+ "sourcesContent": ["import { Left, Right } from \"purify-ts\";\n\nimport { type BlindSigningReporterDatasource } from \"@/reporter/data/BlindSigningReporterDatasource\";\nimport {\n BlindSigningMethod,\n BlindSignReason,\n ClearSigningType,\n} from \"@/reporter/model/BlindSigningEvent\";\nimport { BlindSigningModelId } from \"@/reporter/model/BlindSigningModelId\";\n\nimport { DefaultBlindSigningReporter } from \"./DefaultBlindSigningReporter\";\n\ndescribe(\"DefaultBlindSigningReporter\", () => {\n const params = {\n signatureId: \"a3f8Kb-1738850400000\",\n signingMethod: BlindSigningMethod.ETH_SIGN_TRANSACTION,\n isBlindSign: true,\n chainId: 1,\n targetAddress: \"0xdAC17F958D2ee523a2206206994597C13D831ec7\",\n blindSignReason: BlindSignReason.NO_CLEAR_SIGNING_CONTEXT,\n modelId: BlindSigningModelId.NANO_X,\n signerAppVersion: \"1.12.1\",\n deviceVersion: \"2.2.3\",\n ethContext: {\n clearSigningType: ClearSigningType.EIP7730,\n partialContextErrors: 0,\n },\n };\n\n it(\"should delegate to the datasource and return Right on success\", async () => {\n // GIVEN\n const dataSource: BlindSigningReporterDatasource = {\n report: vi.fn().mockResolvedValueOnce(Right(undefined)),\n };\n const reporter = new DefaultBlindSigningReporter(dataSource);\n\n // WHEN\n const result = await reporter.report(params);\n\n // THEN\n expect(dataSource.report).toHaveBeenCalledWith(params);\n expect(result).toEqual(Right(undefined));\n });\n\n it(\"should delegate to the datasource and return Left on failure\", async () => {\n // GIVEN\n const error = new Error(\"report failed\");\n const dataSource: BlindSigningReporterDatasource = {\n report: vi.fn().mockResolvedValueOnce(Left(error)),\n };\n const reporter = new DefaultBlindSigningReporter(dataSource);\n\n // WHEN\n const result = await reporter.report(params);\n\n // THEN\n expect(dataSource.report).toHaveBeenCalledWith(params);\n expect(result).toEqual(Left(error));\n });\n});\n"],
5
+ "mappings": "aAAA,IAAAA,EAA4B,qBAG5BC,EAIO,8CACPC,EAAoC,gDAEpCC,EAA4C,yCAE5C,SAAS,8BAA+B,IAAM,CAC5C,MAAMC,EAAS,CACb,YAAa,uBACb,cAAe,qBAAmB,qBAClC,YAAa,GACb,QAAS,EACT,cAAe,6CACf,gBAAiB,kBAAgB,yBACjC,QAAS,sBAAoB,OAC7B,iBAAkB,SAClB,cAAe,QACf,WAAY,CACV,iBAAkB,mBAAiB,QACnC,qBAAsB,CACxB,CACF,EAEA,GAAG,gEAAiE,SAAY,CAE9E,MAAMC,EAA6C,CACjD,OAAQ,GAAG,GAAG,EAAE,yBAAsB,SAAM,MAAS,CAAC,CACxD,EAIMC,EAAS,MAHE,IAAI,8BAA4BD,CAAU,EAG7B,OAAOD,CAAM,EAG3C,OAAOC,EAAW,MAAM,EAAE,qBAAqBD,CAAM,EACrD,OAAOE,CAAM,EAAE,WAAQ,SAAM,MAAS,CAAC,CACzC,CAAC,EAED,GAAG,+DAAgE,SAAY,CAE7E,MAAMC,EAAQ,IAAI,MAAM,eAAe,EACjCF,EAA6C,CACjD,OAAQ,GAAG,GAAG,EAAE,yBAAsB,QAAKE,CAAK,CAAC,CACnD,EAIMD,EAAS,MAHE,IAAI,8BAA4BD,CAAU,EAG7B,OAAOD,CAAM,EAG3C,OAAOC,EAAW,MAAM,EAAE,qBAAqBD,CAAM,EACrD,OAAOE,CAAM,EAAE,WAAQ,QAAKC,CAAK,CAAC,CACpC,CAAC,CACH,CAAC",
6
+ "names": ["import_purify_ts", "import_BlindSigningEvent", "import_BlindSigningModelId", "import_DefaultBlindSigningReporter", "params", "dataSource", "result", "error"]
7
+ }
@@ -0,0 +1,2 @@
1
+ "use strict";var o=Object.defineProperty;var p=Object.getOwnPropertyDescriptor;var r=Object.getOwnPropertyNames;var a=Object.prototype.hasOwnProperty;var l=(n,e)=>{for(var i in e)o(n,i,{get:e[i],enumerable:!0})},s=(n,e,i,g)=>{if(e&&typeof e=="object"||typeof e=="function")for(let t of r(e))!a.call(n,t)&&t!==i&&o(n,t,{get:()=>e[t],enumerable:!(g=p(e,t))||g.enumerable});return n};var S=n=>s(o({},"__esModule",{value:!0}),n);var T={};l(T,{BlindSignReason:()=>d,BlindSigningMethod:()=>y,BlindSigningPlatform:()=>c,ClearSigningType:()=>f});module.exports=S(T);const y=Object.freeze({ETH_SIGN_TRANSACTION:"eth_signTransaction",ETH_SIGN_TYPED_DATA:"eth_signTypedData"}),d=Object.freeze({NO_CLEAR_SIGNING_CONTEXT:"no_clear_signing_context",DEVICE_REJECTED_CONTEXT:"device_rejected_context"}),f=Object.freeze({BASIC:"basic",EIP7730:"eip7730"}),c=Object.freeze({DESKTOP:"desktop",MOBILE:"mobile"});0&&(module.exports={BlindSignReason,BlindSigningMethod,BlindSigningPlatform,ClearSigningType});
2
+ //# sourceMappingURL=BlindSigningEvent.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/reporter/model/BlindSigningEvent.ts"],
4
+ "sourcesContent": ["export const BlindSigningMethod = Object.freeze({\n ETH_SIGN_TRANSACTION: \"eth_signTransaction\",\n ETH_SIGN_TYPED_DATA: \"eth_signTypedData\",\n} as const);\nexport type BlindSigningMethod =\n (typeof BlindSigningMethod)[keyof typeof BlindSigningMethod];\n\nexport const BlindSignReason = Object.freeze({\n NO_CLEAR_SIGNING_CONTEXT: \"no_clear_signing_context\",\n DEVICE_REJECTED_CONTEXT: \"device_rejected_context\",\n} as const);\nexport type BlindSignReason =\n (typeof BlindSignReason)[keyof typeof BlindSignReason];\n\nexport const ClearSigningType = Object.freeze({\n BASIC: \"basic\",\n EIP7730: \"eip7730\",\n} as const);\nexport type ClearSigningType =\n (typeof ClearSigningType)[keyof typeof ClearSigningType];\n\nexport const BlindSigningPlatform = Object.freeze({\n DESKTOP: \"desktop\",\n MOBILE: \"mobile\",\n} as const);\nexport type BlindSigningPlatform =\n (typeof BlindSigningPlatform)[keyof typeof BlindSigningPlatform];\n"],
5
+ "mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,qBAAAE,EAAA,uBAAAC,EAAA,yBAAAC,EAAA,qBAAAC,IAAA,eAAAC,EAAAN,GAAO,MAAMG,EAAqB,OAAO,OAAO,CAC9C,qBAAsB,sBACtB,oBAAqB,mBACvB,CAAU,EAIGD,EAAkB,OAAO,OAAO,CAC3C,yBAA0B,2BAC1B,wBAAyB,yBAC3B,CAAU,EAIGG,EAAmB,OAAO,OAAO,CAC5C,MAAO,QACP,QAAS,SACX,CAAU,EAIGD,EAAuB,OAAO,OAAO,CAChD,QAAS,UACT,OAAQ,QACV,CAAU",
6
+ "names": ["BlindSigningEvent_exports", "__export", "BlindSignReason", "BlindSigningMethod", "BlindSigningPlatform", "ClearSigningType", "__toCommonJS"]
7
+ }
@@ -0,0 +1,2 @@
1
+ "use strict";var N=Object.defineProperty;var A=Object.getOwnPropertyDescriptor;var g=Object.getOwnPropertyNames;var t=Object.prototype.hasOwnProperty;var X=(e,d)=>{for(var l in d)N(e,l,{get:d[l],enumerable:!0})},I=(e,d,l,S)=>{if(d&&typeof d=="object"||typeof d=="function")for(let i of g(d))!t.call(e,i)&&i!==l&&N(e,i,{get:()=>d[i],enumerable:!(S=A(d,i))||S.enumerable});return e};var M=e=>I(N({},"__esModule",{value:!0}),e);var O={};X(O,{BlindSigningModelId:()=>o,mapDeviceModelId:()=>_});module.exports=M(O);var n=require("@ledgerhq/device-management-kit");const o=Object.freeze({NANO_S:"nanoS",NANO_SP:"nanoSP",NANO_X:"nanoX",STAX:"stax",FLEX:"flex",APEX_P:"apexP"}),c={[n.DeviceModelId.NANO_S]:o.NANO_S,[n.DeviceModelId.NANO_SP]:o.NANO_SP,[n.DeviceModelId.NANO_X]:o.NANO_X,[n.DeviceModelId.STAX]:o.STAX,[n.DeviceModelId.FLEX]:o.FLEX,[n.DeviceModelId.APEX]:o.APEX_P};function _(e){return c[e]}0&&(module.exports={BlindSigningModelId,mapDeviceModelId});
2
+ //# sourceMappingURL=BlindSigningModelId.js.map