@ledgerhq/context-module 1.15.0 → 1.17.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (410) hide show
  1. package/README.md +10 -0
  2. package/lib/cjs/package.json +1 -2
  3. package/lib/cjs/src/ContextModule.js +1 -1
  4. package/lib/cjs/src/ContextModule.js.map +1 -1
  5. package/lib/cjs/src/ContextModuleBuilder.js +1 -1
  6. package/lib/cjs/src/ContextModuleBuilder.js.map +3 -3
  7. package/lib/cjs/src/ContextModuleBuilder.test.js +1 -1
  8. package/lib/cjs/src/ContextModuleBuilder.test.js.map +3 -3
  9. package/lib/cjs/src/DefaultContextModule.js +1 -1
  10. package/lib/cjs/src/DefaultContextModule.js.map +3 -3
  11. package/lib/cjs/src/DefaultContextModule.test.js +1 -1
  12. package/lib/cjs/src/DefaultContextModule.test.js.map +2 -2
  13. package/lib/cjs/src/account-ownership/data/AccountOwnershipDataSource.js +2 -0
  14. package/lib/cjs/src/account-ownership/data/AccountOwnershipDataSource.js.map +7 -0
  15. package/lib/cjs/src/account-ownership/data/AccountOwnershipError.js +2 -0
  16. package/lib/cjs/src/account-ownership/data/AccountOwnershipError.js.map +7 -0
  17. package/lib/cjs/src/account-ownership/data/HttpAccountOwnershipDataSource.js +2 -0
  18. package/lib/cjs/src/account-ownership/data/HttpAccountOwnershipDataSource.js.map +7 -0
  19. package/lib/cjs/src/account-ownership/data/HttpAccountOwnershipDataSource.test.js +2 -0
  20. package/lib/cjs/src/account-ownership/data/HttpAccountOwnershipDataSource.test.js.map +7 -0
  21. package/lib/cjs/src/account-ownership/data/dto/AccountOwnershipDto.js +2 -0
  22. package/lib/cjs/src/account-ownership/data/dto/AccountOwnershipDto.js.map +7 -0
  23. package/lib/cjs/src/account-ownership/di/accountOwnershipModuleFactory.js +2 -0
  24. package/lib/cjs/src/account-ownership/di/accountOwnershipModuleFactory.js.map +7 -0
  25. package/lib/cjs/src/account-ownership/di/accountOwnershipTypes.js +2 -0
  26. package/lib/cjs/src/account-ownership/di/accountOwnershipTypes.js.map +7 -0
  27. package/lib/cjs/src/account-ownership/domain/AccountOwnershipContextLoader.js +2 -0
  28. package/lib/cjs/src/account-ownership/domain/AccountOwnershipContextLoader.js.map +7 -0
  29. package/lib/cjs/src/account-ownership/domain/AccountOwnershipContextLoader.test.js +2 -0
  30. package/lib/cjs/src/account-ownership/domain/AccountOwnershipContextLoader.test.js.map +7 -0
  31. package/lib/cjs/src/calldata/data/HttpCalldataDescriptorDataSource.js +1 -1
  32. package/lib/cjs/src/calldata/data/HttpCalldataDescriptorDataSource.js.map +3 -3
  33. package/lib/cjs/src/calldata/data/HttpCalldataDescriptorDataSource.test.js +1 -1
  34. package/lib/cjs/src/calldata/data/HttpCalldataDescriptorDataSource.test.js.map +3 -3
  35. package/lib/cjs/src/calldata/di/calldataModuleFactory.js +1 -1
  36. package/lib/cjs/src/calldata/di/calldataModuleFactory.js.map +3 -3
  37. package/lib/cjs/src/config/di/configModuleFactory.js +1 -1
  38. package/lib/cjs/src/config/di/configModuleFactory.js.map +2 -2
  39. package/lib/cjs/src/config/model/ContextModuleConfig.js +1 -1
  40. package/lib/cjs/src/config/model/ContextModuleConfig.js.map +1 -1
  41. package/lib/cjs/src/di.js +1 -1
  42. package/lib/cjs/src/di.js.map +3 -3
  43. package/lib/cjs/src/dynamic-network/data/HttpDynamicNetworkDataSource.js +1 -1
  44. package/lib/cjs/src/dynamic-network/data/HttpDynamicNetworkDataSource.js.map +3 -3
  45. package/lib/cjs/src/dynamic-network/data/HttpDynamicNetworkDataSource.test.js +1 -1
  46. package/lib/cjs/src/dynamic-network/data/HttpDynamicNetworkDataSource.test.js.map +3 -3
  47. package/lib/cjs/src/dynamic-network/domain/DynamicNetworkContextLoader.js +1 -1
  48. package/lib/cjs/src/dynamic-network/domain/DynamicNetworkContextLoader.js.map +1 -1
  49. package/lib/cjs/src/dynamic-network/domain/DynamicNetworkContextLoader.test.js.map +1 -1
  50. package/lib/cjs/src/external-plugin/data/HttpExternalPluginDataSource.js +1 -1
  51. package/lib/cjs/src/external-plugin/data/HttpExternalPluginDataSource.js.map +3 -3
  52. package/lib/cjs/src/external-plugin/data/HttpExternalPluginDataSource.test.js +1 -1
  53. package/lib/cjs/src/external-plugin/data/HttpExternalPluginDataSource.test.js.map +3 -3
  54. package/lib/cjs/src/gated-signing/data/HttpGatedDescriptorDataSource.js +1 -1
  55. package/lib/cjs/src/gated-signing/data/HttpGatedDescriptorDataSource.js.map +3 -3
  56. package/lib/cjs/src/gated-signing/data/HttpGatedDescriptorDataSource.test.js +1 -1
  57. package/lib/cjs/src/gated-signing/data/HttpGatedDescriptorDataSource.test.js.map +3 -3
  58. package/lib/cjs/src/index.js +1 -1
  59. package/lib/cjs/src/index.js.map +2 -2
  60. package/lib/cjs/src/network/di/networkModuleFactory.js +2 -0
  61. package/lib/cjs/src/network/di/networkModuleFactory.js.map +7 -0
  62. package/lib/cjs/src/network/di/networkTypes.js +2 -0
  63. package/lib/cjs/src/network/di/networkTypes.js.map +7 -0
  64. package/lib/cjs/src/nft/data/HttpNftDataSource.js +1 -1
  65. package/lib/cjs/src/nft/data/HttpNftDataSource.js.map +3 -3
  66. package/lib/cjs/src/nft/data/HttpNftDataSource.test.js +1 -1
  67. package/lib/cjs/src/nft/data/HttpNftDataSource.test.js.map +3 -3
  68. package/lib/cjs/src/pki/data/HttpPkiCertificateDataSource.js +1 -1
  69. package/lib/cjs/src/pki/data/HttpPkiCertificateDataSource.js.map +3 -3
  70. package/lib/cjs/src/pki/data/HttpPkiCertificateDataSource.test.js +1 -1
  71. package/lib/cjs/src/pki/data/HttpPkiCertificateDataSource.test.js.map +3 -3
  72. package/lib/cjs/src/proxy/data/HttpProxyDataSource.js +1 -1
  73. package/lib/cjs/src/proxy/data/HttpProxyDataSource.js.map +3 -3
  74. package/lib/cjs/src/proxy/data/HttpProxyDataSource.test.js +1 -1
  75. package/lib/cjs/src/proxy/data/HttpProxyDataSource.test.js.map +3 -3
  76. package/lib/cjs/src/proxy/data/HttpSafeProxyDataSource.js +1 -1
  77. package/lib/cjs/src/proxy/data/HttpSafeProxyDataSource.js.map +3 -3
  78. package/lib/cjs/src/proxy/data/HttpSafeProxyDataSource.test.js +1 -1
  79. package/lib/cjs/src/proxy/data/HttpSafeProxyDataSource.test.js.map +3 -3
  80. package/lib/cjs/src/proxy/di/proxyModuleFactory.js +1 -1
  81. package/lib/cjs/src/proxy/di/proxyModuleFactory.js.map +3 -3
  82. package/lib/cjs/src/proxy/di/proxyModuleFactory.test.js +1 -1
  83. package/lib/cjs/src/proxy/di/proxyModuleFactory.test.js.map +3 -3
  84. package/lib/cjs/src/reporter/data/BlindSigningReporterDatasource.js +2 -0
  85. package/lib/cjs/src/reporter/data/BlindSigningReporterDatasource.js.map +7 -0
  86. package/lib/cjs/src/reporter/data/HttpBlindSigningReporterDatasource.js +2 -0
  87. package/lib/cjs/src/reporter/data/HttpBlindSigningReporterDatasource.js.map +7 -0
  88. package/lib/cjs/src/reporter/data/HttpBlindSigningReporterDatasource.test.js +2 -0
  89. package/lib/cjs/src/reporter/data/HttpBlindSigningReporterDatasource.test.js.map +7 -0
  90. package/lib/cjs/src/reporter/data/dto/BlindSigningEventDto.js +2 -0
  91. package/lib/cjs/src/reporter/data/dto/BlindSigningEventDto.js.map +7 -0
  92. package/lib/cjs/src/reporter/di/reporterModuleFactory.js +2 -0
  93. package/lib/cjs/src/reporter/di/reporterModuleFactory.js.map +7 -0
  94. package/lib/cjs/src/reporter/di/reporterTypes.js +2 -0
  95. package/lib/cjs/src/reporter/di/reporterTypes.js.map +7 -0
  96. package/lib/cjs/src/reporter/domain/BlindSigningReporter.js +2 -0
  97. package/lib/cjs/src/reporter/domain/BlindSigningReporter.js.map +7 -0
  98. package/lib/cjs/src/reporter/domain/DefaultBlindSigningReporter.js +2 -0
  99. package/lib/cjs/src/reporter/domain/DefaultBlindSigningReporter.js.map +7 -0
  100. package/lib/cjs/src/reporter/domain/DefaultBlindSigningReporter.test.js +2 -0
  101. package/lib/cjs/src/reporter/domain/DefaultBlindSigningReporter.test.js.map +7 -0
  102. package/lib/cjs/src/reporter/model/BlindSigningEvent.js +2 -0
  103. package/lib/cjs/src/reporter/model/BlindSigningEvent.js.map +7 -0
  104. package/lib/cjs/src/reporter/model/BlindSigningModelId.js +2 -0
  105. package/lib/cjs/src/reporter/model/BlindSigningModelId.js.map +7 -0
  106. package/lib/cjs/src/safe/data/HttpSafeAccountDataSource.js +1 -1
  107. package/lib/cjs/src/safe/data/HttpSafeAccountDataSource.js.map +3 -3
  108. package/lib/cjs/src/safe/data/HttpSafeAccountDataSource.test.js +1 -1
  109. package/lib/cjs/src/safe/data/HttpSafeAccountDataSource.test.js.map +3 -3
  110. package/lib/cjs/src/shared/model/ClearSignContext.js +1 -1
  111. package/lib/cjs/src/shared/model/ClearSignContext.js.map +2 -2
  112. package/lib/cjs/src/solana/data/HttpSolanaOwnerInfoDataSource.js +1 -1
  113. package/lib/cjs/src/solana/data/HttpSolanaOwnerInfoDataSource.js.map +3 -3
  114. package/lib/cjs/src/solana/data/HttpSolanaOwnerInfoDataSource.test.js +1 -1
  115. package/lib/cjs/src/solana/data/HttpSolanaOwnerInfoDataSource.test.js.map +3 -3
  116. package/lib/cjs/src/solana/domain/DefaultSolanaContextLoader.test.js +1 -1
  117. package/lib/cjs/src/solana/domain/DefaultSolanaContextLoader.test.js.map +1 -1
  118. package/lib/cjs/src/solanaLifi/data/HttpSolanaLifiDataSource.js +1 -1
  119. package/lib/cjs/src/solanaLifi/data/HttpSolanaLifiDataSource.js.map +3 -3
  120. package/lib/cjs/src/solanaLifi/data/HttpSolanaLifiDataSource.test.js +1 -1
  121. package/lib/cjs/src/solanaLifi/data/HttpSolanaLifiDataSource.test.js.map +3 -3
  122. package/lib/cjs/src/solanaLifi/domain/SolanaLifiContextLoader.js.map +1 -1
  123. package/lib/cjs/src/solanaLifi/domain/SolanaLifiContextLoader.test.js.map +1 -1
  124. package/lib/cjs/src/solanaToken/data/HttpSolanaTokenDataSource.js +1 -1
  125. package/lib/cjs/src/solanaToken/data/HttpSolanaTokenDataSource.js.map +3 -3
  126. package/lib/cjs/src/solanaToken/data/HttpSolanaTokenDataSource.test.js +6 -6
  127. package/lib/cjs/src/solanaToken/data/HttpSolanaTokenDataSource.test.js.map +3 -3
  128. package/lib/cjs/src/solanaToken/domain/SolanaTokenContextLoader.js +1 -1
  129. package/lib/cjs/src/solanaToken/domain/SolanaTokenContextLoader.js.map +2 -2
  130. package/lib/cjs/src/solanaToken/domain/SolanaTokenContextLoader.test.js +1 -1
  131. package/lib/cjs/src/solanaToken/domain/SolanaTokenContextLoader.test.js.map +1 -1
  132. package/lib/cjs/src/token/data/HttpTokenDataSource.js +1 -1
  133. package/lib/cjs/src/token/data/HttpTokenDataSource.js.map +3 -3
  134. package/lib/cjs/src/token/data/HttpTokenDataSource.test.js +1 -1
  135. package/lib/cjs/src/token/data/HttpTokenDataSource.test.js.map +3 -3
  136. package/lib/cjs/src/transaction-check/data/HttpTransactionCheckDataSource.js +1 -1
  137. package/lib/cjs/src/transaction-check/data/HttpTransactionCheckDataSource.js.map +3 -3
  138. package/lib/cjs/src/transaction-check/data/HttpTransactionCheckDataSource.test.js +1 -1
  139. package/lib/cjs/src/transaction-check/data/HttpTransactionCheckDataSource.test.js.map +3 -3
  140. package/lib/cjs/src/transaction-check/data/HttpTypedDataCheckDataSource.js +1 -1
  141. package/lib/cjs/src/transaction-check/data/HttpTypedDataCheckDataSource.js.map +3 -3
  142. package/lib/cjs/src/transaction-check/data/HttpTypedDataCheckDataSource.test.js +1 -1
  143. package/lib/cjs/src/transaction-check/data/HttpTypedDataCheckDataSource.test.js.map +3 -3
  144. package/lib/cjs/src/trusted-name/data/HttpTrustedNameDataSource.js +1 -1
  145. package/lib/cjs/src/trusted-name/data/HttpTrustedNameDataSource.js.map +3 -3
  146. package/lib/cjs/src/trusted-name/data/HttpTrustedNameDataSource.test.js +1 -1
  147. package/lib/cjs/src/trusted-name/data/HttpTrustedNameDataSource.test.js.map +3 -3
  148. package/lib/cjs/src/trusted-name/di/trustedNameModuleFactory.js +1 -1
  149. package/lib/cjs/src/trusted-name/di/trustedNameModuleFactory.js.map +3 -3
  150. package/lib/cjs/src/typed-data/data/HttpTypedDataDataSource.js +1 -1
  151. package/lib/cjs/src/typed-data/data/HttpTypedDataDataSource.js.map +3 -3
  152. package/lib/cjs/src/typed-data/data/HttpTypedDataDataSource.test.js +1 -1
  153. package/lib/cjs/src/typed-data/data/HttpTypedDataDataSource.test.js.map +3 -3
  154. package/lib/esm/package.json +1 -2
  155. package/lib/esm/src/ContextModuleBuilder.js +1 -1
  156. package/lib/esm/src/ContextModuleBuilder.js.map +3 -3
  157. package/lib/esm/src/ContextModuleBuilder.test.js +1 -1
  158. package/lib/esm/src/ContextModuleBuilder.test.js.map +3 -3
  159. package/lib/esm/src/DefaultContextModule.js +1 -1
  160. package/lib/esm/src/DefaultContextModule.js.map +3 -3
  161. package/lib/esm/src/DefaultContextModule.test.js +1 -1
  162. package/lib/esm/src/DefaultContextModule.test.js.map +2 -2
  163. package/lib/esm/src/account-ownership/data/AccountOwnershipDataSource.js +1 -0
  164. package/lib/esm/src/account-ownership/data/AccountOwnershipDataSource.js.map +7 -0
  165. package/lib/esm/src/account-ownership/data/AccountOwnershipError.js +2 -0
  166. package/lib/esm/src/account-ownership/data/AccountOwnershipError.js.map +7 -0
  167. package/lib/esm/src/account-ownership/data/HttpAccountOwnershipDataSource.js +2 -0
  168. package/lib/esm/src/account-ownership/data/HttpAccountOwnershipDataSource.js.map +7 -0
  169. package/lib/esm/src/account-ownership/data/HttpAccountOwnershipDataSource.test.js +2 -0
  170. package/lib/esm/src/account-ownership/data/HttpAccountOwnershipDataSource.test.js.map +7 -0
  171. package/lib/esm/src/account-ownership/data/dto/AccountOwnershipDto.js +1 -0
  172. package/lib/esm/src/account-ownership/data/dto/AccountOwnershipDto.js.map +7 -0
  173. package/lib/esm/src/account-ownership/di/accountOwnershipModuleFactory.js +2 -0
  174. package/lib/esm/src/account-ownership/di/accountOwnershipModuleFactory.js.map +7 -0
  175. package/lib/esm/src/account-ownership/di/accountOwnershipTypes.js +2 -0
  176. package/lib/esm/src/account-ownership/di/accountOwnershipTypes.js.map +7 -0
  177. package/lib/esm/src/account-ownership/domain/AccountOwnershipContextLoader.js +2 -0
  178. package/lib/esm/src/account-ownership/domain/AccountOwnershipContextLoader.js.map +7 -0
  179. package/lib/esm/src/account-ownership/domain/AccountOwnershipContextLoader.test.js +2 -0
  180. package/lib/esm/src/account-ownership/domain/AccountOwnershipContextLoader.test.js.map +7 -0
  181. package/lib/esm/src/calldata/data/HttpCalldataDescriptorDataSource.js +1 -1
  182. package/lib/esm/src/calldata/data/HttpCalldataDescriptorDataSource.js.map +3 -3
  183. package/lib/esm/src/calldata/data/HttpCalldataDescriptorDataSource.test.js +1 -1
  184. package/lib/esm/src/calldata/data/HttpCalldataDescriptorDataSource.test.js.map +3 -3
  185. package/lib/esm/src/calldata/di/calldataModuleFactory.js +1 -1
  186. package/lib/esm/src/calldata/di/calldataModuleFactory.js.map +3 -3
  187. package/lib/esm/src/config/di/configModuleFactory.js +1 -1
  188. package/lib/esm/src/config/di/configModuleFactory.js.map +2 -2
  189. package/lib/esm/src/di.js +1 -1
  190. package/lib/esm/src/di.js.map +3 -3
  191. package/lib/esm/src/dynamic-network/data/HttpDynamicNetworkDataSource.js +1 -1
  192. package/lib/esm/src/dynamic-network/data/HttpDynamicNetworkDataSource.js.map +3 -3
  193. package/lib/esm/src/dynamic-network/data/HttpDynamicNetworkDataSource.test.js +1 -1
  194. package/lib/esm/src/dynamic-network/data/HttpDynamicNetworkDataSource.test.js.map +3 -3
  195. package/lib/esm/src/dynamic-network/domain/DynamicNetworkContextLoader.js +1 -1
  196. package/lib/esm/src/dynamic-network/domain/DynamicNetworkContextLoader.js.map +1 -1
  197. package/lib/esm/src/dynamic-network/domain/DynamicNetworkContextLoader.test.js.map +1 -1
  198. package/lib/esm/src/external-plugin/data/HttpExternalPluginDataSource.js +1 -1
  199. package/lib/esm/src/external-plugin/data/HttpExternalPluginDataSource.js.map +3 -3
  200. package/lib/esm/src/external-plugin/data/HttpExternalPluginDataSource.test.js +1 -1
  201. package/lib/esm/src/external-plugin/data/HttpExternalPluginDataSource.test.js.map +3 -3
  202. package/lib/esm/src/gated-signing/data/HttpGatedDescriptorDataSource.js +1 -1
  203. package/lib/esm/src/gated-signing/data/HttpGatedDescriptorDataSource.js.map +3 -3
  204. package/lib/esm/src/gated-signing/data/HttpGatedDescriptorDataSource.test.js +1 -1
  205. package/lib/esm/src/gated-signing/data/HttpGatedDescriptorDataSource.test.js.map +3 -3
  206. package/lib/esm/src/index.js +1 -1
  207. package/lib/esm/src/index.js.map +2 -2
  208. package/lib/esm/src/network/di/networkModuleFactory.js +2 -0
  209. package/lib/esm/src/network/di/networkModuleFactory.js.map +7 -0
  210. package/lib/esm/src/network/di/networkTypes.js +2 -0
  211. package/lib/esm/src/network/di/networkTypes.js.map +7 -0
  212. package/lib/esm/src/nft/data/HttpNftDataSource.js +1 -1
  213. package/lib/esm/src/nft/data/HttpNftDataSource.js.map +3 -3
  214. package/lib/esm/src/nft/data/HttpNftDataSource.test.js +1 -1
  215. package/lib/esm/src/nft/data/HttpNftDataSource.test.js.map +3 -3
  216. package/lib/esm/src/pki/data/HttpPkiCertificateDataSource.js +1 -1
  217. package/lib/esm/src/pki/data/HttpPkiCertificateDataSource.js.map +3 -3
  218. package/lib/esm/src/pki/data/HttpPkiCertificateDataSource.test.js +1 -1
  219. package/lib/esm/src/pki/data/HttpPkiCertificateDataSource.test.js.map +3 -3
  220. package/lib/esm/src/proxy/data/HttpProxyDataSource.js +1 -1
  221. package/lib/esm/src/proxy/data/HttpProxyDataSource.js.map +3 -3
  222. package/lib/esm/src/proxy/data/HttpProxyDataSource.test.js +1 -1
  223. package/lib/esm/src/proxy/data/HttpProxyDataSource.test.js.map +3 -3
  224. package/lib/esm/src/proxy/data/HttpSafeProxyDataSource.js +1 -1
  225. package/lib/esm/src/proxy/data/HttpSafeProxyDataSource.js.map +3 -3
  226. package/lib/esm/src/proxy/data/HttpSafeProxyDataSource.test.js +1 -1
  227. package/lib/esm/src/proxy/data/HttpSafeProxyDataSource.test.js.map +3 -3
  228. package/lib/esm/src/proxy/di/proxyModuleFactory.js +1 -1
  229. package/lib/esm/src/proxy/di/proxyModuleFactory.js.map +3 -3
  230. package/lib/esm/src/proxy/di/proxyModuleFactory.test.js +1 -1
  231. package/lib/esm/src/proxy/di/proxyModuleFactory.test.js.map +3 -3
  232. package/lib/esm/src/reporter/data/BlindSigningReporterDatasource.js +1 -0
  233. package/lib/esm/src/reporter/data/BlindSigningReporterDatasource.js.map +7 -0
  234. package/lib/esm/src/reporter/data/HttpBlindSigningReporterDatasource.js +2 -0
  235. package/lib/esm/src/reporter/data/HttpBlindSigningReporterDatasource.js.map +7 -0
  236. package/lib/esm/src/reporter/data/HttpBlindSigningReporterDatasource.test.js +2 -0
  237. package/lib/esm/src/reporter/data/HttpBlindSigningReporterDatasource.test.js.map +7 -0
  238. package/lib/esm/src/reporter/data/dto/BlindSigningEventDto.js +1 -0
  239. package/lib/esm/src/reporter/data/dto/BlindSigningEventDto.js.map +7 -0
  240. package/lib/esm/src/reporter/di/reporterModuleFactory.js +2 -0
  241. package/lib/esm/src/reporter/di/reporterModuleFactory.js.map +7 -0
  242. package/lib/esm/src/reporter/di/reporterTypes.js +2 -0
  243. package/lib/esm/src/reporter/di/reporterTypes.js.map +7 -0
  244. package/lib/esm/src/reporter/domain/BlindSigningReporter.js +1 -0
  245. package/lib/esm/src/reporter/domain/BlindSigningReporter.js.map +7 -0
  246. package/lib/esm/src/reporter/domain/DefaultBlindSigningReporter.js +2 -0
  247. package/lib/esm/src/reporter/domain/DefaultBlindSigningReporter.js.map +7 -0
  248. package/lib/esm/src/reporter/domain/DefaultBlindSigningReporter.test.js +2 -0
  249. package/lib/esm/src/reporter/domain/DefaultBlindSigningReporter.test.js.map +7 -0
  250. package/lib/esm/src/reporter/model/BlindSigningEvent.js +2 -0
  251. package/lib/esm/src/reporter/model/BlindSigningEvent.js.map +7 -0
  252. package/lib/esm/src/reporter/model/BlindSigningModelId.js +2 -0
  253. package/lib/esm/src/reporter/model/BlindSigningModelId.js.map +7 -0
  254. package/lib/esm/src/safe/data/HttpSafeAccountDataSource.js +1 -1
  255. package/lib/esm/src/safe/data/HttpSafeAccountDataSource.js.map +3 -3
  256. package/lib/esm/src/safe/data/HttpSafeAccountDataSource.test.js +1 -1
  257. package/lib/esm/src/safe/data/HttpSafeAccountDataSource.test.js.map +3 -3
  258. package/lib/esm/src/shared/model/ClearSignContext.js +1 -1
  259. package/lib/esm/src/shared/model/ClearSignContext.js.map +2 -2
  260. package/lib/esm/src/solana/data/HttpSolanaOwnerInfoDataSource.js +1 -1
  261. package/lib/esm/src/solana/data/HttpSolanaOwnerInfoDataSource.js.map +3 -3
  262. package/lib/esm/src/solana/data/HttpSolanaOwnerInfoDataSource.test.js +1 -1
  263. package/lib/esm/src/solana/data/HttpSolanaOwnerInfoDataSource.test.js.map +3 -3
  264. package/lib/esm/src/solana/domain/DefaultSolanaContextLoader.test.js +1 -1
  265. package/lib/esm/src/solana/domain/DefaultSolanaContextLoader.test.js.map +1 -1
  266. package/lib/esm/src/solanaLifi/data/HttpSolanaLifiDataSource.js +1 -1
  267. package/lib/esm/src/solanaLifi/data/HttpSolanaLifiDataSource.js.map +3 -3
  268. package/lib/esm/src/solanaLifi/data/HttpSolanaLifiDataSource.test.js +1 -1
  269. package/lib/esm/src/solanaLifi/data/HttpSolanaLifiDataSource.test.js.map +3 -3
  270. package/lib/esm/src/solanaLifi/domain/SolanaLifiContextLoader.js.map +1 -1
  271. package/lib/esm/src/solanaLifi/domain/SolanaLifiContextLoader.test.js +1 -1
  272. package/lib/esm/src/solanaLifi/domain/SolanaLifiContextLoader.test.js.map +1 -1
  273. package/lib/esm/src/solanaToken/data/HttpSolanaTokenDataSource.js +1 -1
  274. package/lib/esm/src/solanaToken/data/HttpSolanaTokenDataSource.js.map +3 -3
  275. package/lib/esm/src/solanaToken/data/HttpSolanaTokenDataSource.test.js +6 -6
  276. package/lib/esm/src/solanaToken/data/HttpSolanaTokenDataSource.test.js.map +3 -3
  277. package/lib/esm/src/solanaToken/domain/SolanaTokenContextLoader.js +1 -1
  278. package/lib/esm/src/solanaToken/domain/SolanaTokenContextLoader.js.map +2 -2
  279. package/lib/esm/src/solanaToken/domain/SolanaTokenContextLoader.test.js +1 -1
  280. package/lib/esm/src/solanaToken/domain/SolanaTokenContextLoader.test.js.map +1 -1
  281. package/lib/esm/src/token/data/HttpTokenDataSource.js +1 -1
  282. package/lib/esm/src/token/data/HttpTokenDataSource.js.map +3 -3
  283. package/lib/esm/src/token/data/HttpTokenDataSource.test.js +1 -1
  284. package/lib/esm/src/token/data/HttpTokenDataSource.test.js.map +3 -3
  285. package/lib/esm/src/transaction-check/data/HttpTransactionCheckDataSource.js +1 -1
  286. package/lib/esm/src/transaction-check/data/HttpTransactionCheckDataSource.js.map +3 -3
  287. package/lib/esm/src/transaction-check/data/HttpTransactionCheckDataSource.test.js +1 -1
  288. package/lib/esm/src/transaction-check/data/HttpTransactionCheckDataSource.test.js.map +3 -3
  289. package/lib/esm/src/transaction-check/data/HttpTypedDataCheckDataSource.js +1 -1
  290. package/lib/esm/src/transaction-check/data/HttpTypedDataCheckDataSource.js.map +3 -3
  291. package/lib/esm/src/transaction-check/data/HttpTypedDataCheckDataSource.test.js +1 -1
  292. package/lib/esm/src/transaction-check/data/HttpTypedDataCheckDataSource.test.js.map +3 -3
  293. package/lib/esm/src/trusted-name/data/HttpTrustedNameDataSource.js +1 -1
  294. package/lib/esm/src/trusted-name/data/HttpTrustedNameDataSource.js.map +3 -3
  295. package/lib/esm/src/trusted-name/data/HttpTrustedNameDataSource.test.js +1 -1
  296. package/lib/esm/src/trusted-name/data/HttpTrustedNameDataSource.test.js.map +3 -3
  297. package/lib/esm/src/trusted-name/di/trustedNameModuleFactory.js +1 -1
  298. package/lib/esm/src/trusted-name/di/trustedNameModuleFactory.js.map +3 -3
  299. package/lib/esm/src/typed-data/data/HttpTypedDataDataSource.js +1 -1
  300. package/lib/esm/src/typed-data/data/HttpTypedDataDataSource.js.map +3 -3
  301. package/lib/esm/src/typed-data/data/HttpTypedDataDataSource.test.js +1 -1
  302. package/lib/esm/src/typed-data/data/HttpTypedDataDataSource.test.js.map +3 -3
  303. package/lib/types/src/ContextModule.d.ts +2 -0
  304. package/lib/types/src/ContextModule.d.ts.map +1 -1
  305. package/lib/types/src/ContextModuleBuilder.d.ts +30 -3
  306. package/lib/types/src/ContextModuleBuilder.d.ts.map +1 -1
  307. package/lib/types/src/DefaultContextModule.d.ts +6 -2
  308. package/lib/types/src/DefaultContextModule.d.ts.map +1 -1
  309. package/lib/types/src/account-ownership/data/AccountOwnershipDataSource.d.ts +17 -0
  310. package/lib/types/src/account-ownership/data/AccountOwnershipDataSource.d.ts.map +1 -0
  311. package/lib/types/src/account-ownership/data/AccountOwnershipError.d.ts +17 -0
  312. package/lib/types/src/account-ownership/data/AccountOwnershipError.d.ts.map +1 -0
  313. package/lib/types/src/account-ownership/data/HttpAccountOwnershipDataSource.d.ts +30 -0
  314. package/lib/types/src/account-ownership/data/HttpAccountOwnershipDataSource.d.ts.map +1 -0
  315. package/lib/types/src/account-ownership/data/HttpAccountOwnershipDataSource.test.d.ts +2 -0
  316. package/lib/types/src/account-ownership/data/HttpAccountOwnershipDataSource.test.d.ts.map +1 -0
  317. package/lib/types/src/account-ownership/data/dto/AccountOwnershipDto.d.ts +6 -0
  318. package/lib/types/src/account-ownership/data/dto/AccountOwnershipDto.d.ts.map +1 -0
  319. package/lib/types/src/account-ownership/di/accountOwnershipModuleFactory.d.ts +3 -0
  320. package/lib/types/src/account-ownership/di/accountOwnershipModuleFactory.d.ts.map +1 -0
  321. package/lib/types/src/account-ownership/di/accountOwnershipTypes.d.ts +5 -0
  322. package/lib/types/src/account-ownership/di/accountOwnershipTypes.d.ts.map +1 -0
  323. package/lib/types/src/account-ownership/domain/AccountOwnershipContextLoader.d.ts +20 -0
  324. package/lib/types/src/account-ownership/domain/AccountOwnershipContextLoader.d.ts.map +1 -0
  325. package/lib/types/src/account-ownership/domain/AccountOwnershipContextLoader.test.d.ts +2 -0
  326. package/lib/types/src/account-ownership/domain/AccountOwnershipContextLoader.test.d.ts.map +1 -0
  327. package/lib/types/src/calldata/data/HttpCalldataDescriptorDataSource.d.ts +4 -2
  328. package/lib/types/src/calldata/data/HttpCalldataDescriptorDataSource.d.ts.map +1 -1
  329. package/lib/types/src/calldata/di/calldataModuleFactory.d.ts.map +1 -1
  330. package/lib/types/src/config/di/configModuleFactory.d.ts +2 -2
  331. package/lib/types/src/config/di/configModuleFactory.d.ts.map +1 -1
  332. package/lib/types/src/config/model/ContextModuleConfig.d.ts +14 -3
  333. package/lib/types/src/config/model/ContextModuleConfig.d.ts.map +1 -1
  334. package/lib/types/src/di.d.ts +2 -2
  335. package/lib/types/src/di.d.ts.map +1 -1
  336. package/lib/types/src/dynamic-network/data/HttpDynamicNetworkDataSource.d.ts +4 -2
  337. package/lib/types/src/dynamic-network/data/HttpDynamicNetworkDataSource.d.ts.map +1 -1
  338. package/lib/types/src/dynamic-network/domain/DynamicNetworkContextLoader.d.ts +2 -2
  339. package/lib/types/src/dynamic-network/domain/DynamicNetworkContextLoader.d.ts.map +1 -1
  340. package/lib/types/src/external-plugin/data/HttpExternalPluginDataSource.d.ts +4 -2
  341. package/lib/types/src/external-plugin/data/HttpExternalPluginDataSource.d.ts.map +1 -1
  342. package/lib/types/src/gated-signing/data/HttpGatedDescriptorDataSource.d.ts +4 -2
  343. package/lib/types/src/gated-signing/data/HttpGatedDescriptorDataSource.d.ts.map +1 -1
  344. package/lib/types/src/index.d.ts +11 -1
  345. package/lib/types/src/index.d.ts.map +1 -1
  346. package/lib/types/src/network/di/networkModuleFactory.d.ts +4 -0
  347. package/lib/types/src/network/di/networkModuleFactory.d.ts.map +1 -0
  348. package/lib/types/src/network/di/networkTypes.d.ts +4 -0
  349. package/lib/types/src/network/di/networkTypes.d.ts.map +1 -0
  350. package/lib/types/src/nft/data/HttpNftDataSource.d.ts +4 -2
  351. package/lib/types/src/nft/data/HttpNftDataSource.d.ts.map +1 -1
  352. package/lib/types/src/pki/data/HttpPkiCertificateDataSource.d.ts +5 -2
  353. package/lib/types/src/pki/data/HttpPkiCertificateDataSource.d.ts.map +1 -1
  354. package/lib/types/src/proxy/data/HttpProxyDataSource.d.ts +4 -2
  355. package/lib/types/src/proxy/data/HttpProxyDataSource.d.ts.map +1 -1
  356. package/lib/types/src/proxy/data/HttpSafeProxyDataSource.d.ts +4 -2
  357. package/lib/types/src/proxy/data/HttpSafeProxyDataSource.d.ts.map +1 -1
  358. package/lib/types/src/proxy/di/proxyModuleFactory.d.ts +2 -2
  359. package/lib/types/src/proxy/di/proxyModuleFactory.d.ts.map +1 -1
  360. package/lib/types/src/reporter/data/BlindSigningReporterDatasource.d.ts +29 -0
  361. package/lib/types/src/reporter/data/BlindSigningReporterDatasource.d.ts.map +1 -0
  362. package/lib/types/src/reporter/data/HttpBlindSigningReporterDatasource.d.ts +11 -0
  363. package/lib/types/src/reporter/data/HttpBlindSigningReporterDatasource.d.ts.map +1 -0
  364. package/lib/types/src/reporter/data/HttpBlindSigningReporterDatasource.test.d.ts +2 -0
  365. package/lib/types/src/reporter/data/HttpBlindSigningReporterDatasource.test.d.ts.map +1 -0
  366. package/lib/types/src/reporter/data/dto/BlindSigningEventDto.d.ts +26 -0
  367. package/lib/types/src/reporter/data/dto/BlindSigningEventDto.d.ts.map +1 -0
  368. package/lib/types/src/reporter/di/reporterModuleFactory.d.ts +3 -0
  369. package/lib/types/src/reporter/di/reporterModuleFactory.d.ts.map +1 -0
  370. package/lib/types/src/reporter/di/reporterTypes.d.ts +5 -0
  371. package/lib/types/src/reporter/di/reporterTypes.d.ts.map +1 -0
  372. package/lib/types/src/reporter/domain/BlindSigningReporter.d.ts +6 -0
  373. package/lib/types/src/reporter/domain/BlindSigningReporter.d.ts.map +1 -0
  374. package/lib/types/src/reporter/domain/DefaultBlindSigningReporter.d.ts +9 -0
  375. package/lib/types/src/reporter/domain/DefaultBlindSigningReporter.d.ts.map +1 -0
  376. package/lib/types/src/reporter/domain/DefaultBlindSigningReporter.test.d.ts +2 -0
  377. package/lib/types/src/reporter/domain/DefaultBlindSigningReporter.test.d.ts.map +1 -0
  378. package/lib/types/src/reporter/model/BlindSigningEvent.d.ts +21 -0
  379. package/lib/types/src/reporter/model/BlindSigningEvent.d.ts.map +1 -0
  380. package/lib/types/src/reporter/model/BlindSigningModelId.d.ts +12 -0
  381. package/lib/types/src/reporter/model/BlindSigningModelId.d.ts.map +1 -0
  382. package/lib/types/src/safe/data/HttpSafeAccountDataSource.d.ts +4 -2
  383. package/lib/types/src/safe/data/HttpSafeAccountDataSource.d.ts.map +1 -1
  384. package/lib/types/src/shared/model/ClearSignContext.d.ts +2 -1
  385. package/lib/types/src/shared/model/ClearSignContext.d.ts.map +1 -1
  386. package/lib/types/src/solana/data/HttpSolanaOwnerInfoDataSource.d.ts +4 -2
  387. package/lib/types/src/solana/data/HttpSolanaOwnerInfoDataSource.d.ts.map +1 -1
  388. package/lib/types/src/solanaLifi/data/HttpSolanaLifiDataSource.d.ts +4 -3
  389. package/lib/types/src/solanaLifi/data/HttpSolanaLifiDataSource.d.ts.map +1 -1
  390. package/lib/types/src/solanaLifi/domain/SolanaLifiContextLoader.d.ts +2 -2
  391. package/lib/types/src/solanaLifi/domain/SolanaLifiContextLoader.d.ts.map +1 -1
  392. package/lib/types/src/solanaToken/data/HttpSolanaTokenDataSource.d.ts +4 -2
  393. package/lib/types/src/solanaToken/data/HttpSolanaTokenDataSource.d.ts.map +1 -1
  394. package/lib/types/src/solanaToken/domain/SolanaTokenContextLoader.d.ts +2 -2
  395. package/lib/types/src/solanaToken/domain/SolanaTokenContextLoader.d.ts.map +1 -1
  396. package/lib/types/src/token/data/HttpTokenDataSource.d.ts +4 -2
  397. package/lib/types/src/token/data/HttpTokenDataSource.d.ts.map +1 -1
  398. package/lib/types/src/transaction-check/data/HttpTransactionCheckDataSource.d.ts +4 -2
  399. package/lib/types/src/transaction-check/data/HttpTransactionCheckDataSource.d.ts.map +1 -1
  400. package/lib/types/src/transaction-check/data/HttpTypedDataCheckDataSource.d.ts +4 -2
  401. package/lib/types/src/transaction-check/data/HttpTypedDataCheckDataSource.d.ts.map +1 -1
  402. package/lib/types/src/trusted-name/data/HttpTrustedNameDataSource.d.ts +4 -2
  403. package/lib/types/src/trusted-name/data/HttpTrustedNameDataSource.d.ts.map +1 -1
  404. package/lib/types/src/trusted-name/di/trustedNameModuleFactory.d.ts +2 -2
  405. package/lib/types/src/trusted-name/di/trustedNameModuleFactory.d.ts.map +1 -1
  406. package/lib/types/src/typed-data/data/HttpTypedDataDataSource.d.ts +4 -2
  407. package/lib/types/src/typed-data/data/HttpTypedDataDataSource.d.ts.map +1 -1
  408. package/lib/types/src/typed-data/data/HttpTypedDataDataSource.test.d.ts.map +1 -1
  409. package/lib/types/tsconfig.prod.tsbuildinfo +1 -1
  410. package/package.json +6 -7
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/reporter/data/HttpBlindSigningReporterDatasource.test.ts"],
4
+ "sourcesContent": ["import { type DmkNetworkClient } from \"@ledgerhq/device-management-kit\";\nimport { Left, Right } from \"purify-ts\";\n\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport { type BlindSigningReportParams } from \"@/reporter/data/BlindSigningReporterDatasource\";\nimport { HttpBlindSigningReporterDatasource } from \"@/reporter/data/HttpBlindSigningReporterDatasource\";\nimport {\n BlindSigningMethod,\n BlindSigningPlatform,\n BlindSignReason,\n ClearSigningType,\n} from \"@/reporter/model/BlindSigningEvent\";\nimport { BlindSigningModelId } from \"@/reporter/model/BlindSigningModelId\";\n\ndescribe(\"HttpBlindSigningReporterDatasource\", () => {\n const config = {\n reporter: {\n url: \"https://reporter.test\",\n },\n originToken: \"originToken\",\n appSource: \"third-party\",\n } as ContextModuleServiceConfig;\n\n const params: BlindSigningReportParams = {\n signatureId: \"a3f8Kb-1738850400000\",\n signingMethod: BlindSigningMethod.ETH_SIGN_TRANSACTION,\n isBlindSign: true,\n chainId: 1,\n targetAddress: \"0xdAC17F958D2ee523a2206206994597C13D831ec7\",\n blindSignReason: BlindSignReason.NO_CLEAR_SIGNING_CONTEXT,\n modelId: BlindSigningModelId.NANO_X,\n signerAppVersion: \"1.12.1\",\n deviceVersion: \"2.2.3\",\n ethContext: {\n clearSigningType: ClearSigningType.EIP7730,\n partialContextErrors: 0,\n },\n };\n\n let httpMock: { post: ReturnType<typeof vi.fn> };\n let dataSource: HttpBlindSigningReporterDatasource;\n\n beforeEach(() => {\n vi.resetAllMocks();\n httpMock = { post: vi.fn() };\n dataSource = new HttpBlindSigningReporterDatasource(\n config,\n httpMock as unknown as DmkNetworkClient,\n );\n });\n\n describe(\"report\", () => {\n it(\"should return Right(undefined) on success\", async () => {\n // GIVEN\n httpMock.post.mockResolvedValueOnce(undefined);\n\n // WHEN\n const result = await dataSource.report(params);\n\n // THEN\n expect(result).toEqual(Right(undefined));\n });\n\n it(\"should return Left(Error) when the request fails\", async () => {\n // GIVEN\n httpMock.post.mockRejectedValueOnce(new Error(\"network error\"));\n\n // WHEN\n const result = await dataSource.report(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpBlindSigningReporterDatasource: Failed to report blind signing event\",\n ),\n ),\n );\n });\n\n it(\"should call http.post with the correct URL, body and options\", async () => {\n // GIVEN\n httpMock.post.mockResolvedValueOnce(undefined);\n\n // WHEN\n await dataSource.report(params);\n\n // THEN\n expect(httpMock.post).toHaveBeenCalledWith(\n `${config.reporter!.url}/blind-signing-events`,\n { ...params, source: config.appSource },\n { responseType: \"void\" },\n );\n });\n\n it(\"should forward optional DTO fields when provided\", async () => {\n // GIVEN\n httpMock.post.mockResolvedValueOnce(undefined);\n const paramsWithOptionalFields: BlindSigningReportParams = {\n ...params,\n platform: BlindSigningPlatform.DESKTOP,\n appVersion: \"2.80.0\",\n platformOS: \"macOS\",\n platformVersion: \"14.5\",\n liveAppContext: \"swap\",\n sessionId: \"session-123\",\n };\n\n // WHEN\n await dataSource.report(paramsWithOptionalFields);\n\n // THEN\n expect(httpMock.post).toHaveBeenCalledWith(\n `${config.reporter!.url}/blind-signing-events`,\n { ...paramsWithOptionalFields, source: config.appSource },\n { responseType: \"void\" },\n );\n });\n });\n});\n"],
5
+ "mappings": "AACA,OAAS,QAAAA,EAAM,SAAAC,MAAa,YAI5B,OAAS,sCAAAC,MAA0C,qDACnD,OACE,sBAAAC,EACA,wBAAAC,EACA,mBAAAC,EACA,oBAAAC,MACK,qCACP,OAAS,uBAAAC,MAA2B,uCAEpC,SAAS,qCAAsC,IAAM,CACnD,MAAMC,EAAS,CACb,SAAU,CACR,IAAK,uBACP,EACA,YAAa,cACb,UAAW,aACb,EAEMC,EAAmC,CACvC,YAAa,uBACb,cAAeN,EAAmB,qBAClC,YAAa,GACb,QAAS,EACT,cAAe,6CACf,gBAAiBE,EAAgB,yBACjC,QAASE,EAAoB,OAC7B,iBAAkB,SAClB,cAAe,QACf,WAAY,CACV,iBAAkBD,EAAiB,QACnC,qBAAsB,CACxB,CACF,EAEA,IAAII,EACAC,EAEJ,WAAW,IAAM,CACf,GAAG,cAAc,EACjBD,EAAW,CAAE,KAAM,GAAG,GAAG,CAAE,EAC3BC,EAAa,IAAIT,EACfM,EACAE,CACF,CACF,CAAC,EAED,SAAS,SAAU,IAAM,CACvB,GAAG,4CAA6C,SAAY,CAE1DA,EAAS,KAAK,sBAAsB,MAAS,EAG7C,MAAME,EAAS,MAAMD,EAAW,OAAOF,CAAM,EAG7C,OAAOG,CAAM,EAAE,QAAQX,EAAM,MAAS,CAAC,CACzC,CAAC,EAED,GAAG,mDAAoD,SAAY,CAEjES,EAAS,KAAK,sBAAsB,IAAI,MAAM,eAAe,CAAC,EAG9D,MAAME,EAAS,MAAMD,EAAW,OAAOF,CAAM,EAG7C,OAAOG,CAAM,EAAE,QACbZ,EACE,IAAI,MACF,0FACF,CACF,CACF,CACF,CAAC,EAED,GAAG,+DAAgE,SAAY,CAE7EU,EAAS,KAAK,sBAAsB,MAAS,EAG7C,MAAMC,EAAW,OAAOF,CAAM,EAG9B,OAAOC,EAAS,IAAI,EAAE,qBACpB,GAAGF,EAAO,SAAU,GAAG,wBACvB,CAAE,GAAGC,EAAQ,OAAQD,EAAO,SAAU,EACtC,CAAE,aAAc,MAAO,CACzB,CACF,CAAC,EAED,GAAG,mDAAoD,SAAY,CAEjEE,EAAS,KAAK,sBAAsB,MAAS,EAC7C,MAAMG,EAAqD,CACzD,GAAGJ,EACH,SAAUL,EAAqB,QAC/B,WAAY,SACZ,WAAY,QACZ,gBAAiB,OACjB,eAAgB,OAChB,UAAW,aACb,EAGA,MAAMO,EAAW,OAAOE,CAAwB,EAGhD,OAAOH,EAAS,IAAI,EAAE,qBACpB,GAAGF,EAAO,SAAU,GAAG,wBACvB,CAAE,GAAGK,EAA0B,OAAQL,EAAO,SAAU,EACxD,CAAE,aAAc,MAAO,CACzB,CACF,CAAC,CACH,CAAC,CACH,CAAC",
6
+ "names": ["Left", "Right", "HttpBlindSigningReporterDatasource", "BlindSigningMethod", "BlindSigningPlatform", "BlindSignReason", "ClearSigningType", "BlindSigningModelId", "config", "params", "httpMock", "dataSource", "result", "paramsWithOptionalFields"]
7
+ }
@@ -0,0 +1 @@
1
+ //# sourceMappingURL=BlindSigningEventDto.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": [],
4
+ "sourcesContent": [],
5
+ "mappings": "",
6
+ "names": []
7
+ }
@@ -0,0 +1,2 @@
1
+ import{ContainerModule as e}from"inversify";import{HttpBlindSigningReporterDatasource as t}from"../../reporter/data/HttpBlindSigningReporterDatasource";import{reporterTypes as o}from"../../reporter/di/reporterTypes";import{DefaultBlindSigningReporter as i}from"../../reporter/domain/DefaultBlindSigningReporter";const a=()=>new e(({bind:r})=>{r(o.BlindSigningReporterDatasource).to(t),r(o.BlindSigningReporter).to(i)});export{a as reporterModuleFactory};
2
+ //# sourceMappingURL=reporterModuleFactory.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/reporter/di/reporterModuleFactory.ts"],
4
+ "sourcesContent": ["import { ContainerModule } from \"inversify\";\n\nimport { HttpBlindSigningReporterDatasource } from \"@/reporter/data/HttpBlindSigningReporterDatasource\";\nimport { reporterTypes } from \"@/reporter/di/reporterTypes\";\nimport { DefaultBlindSigningReporter } from \"@/reporter/domain/DefaultBlindSigningReporter\";\n\nexport const reporterModuleFactory = () =>\n new ContainerModule(({ bind }) => {\n bind(reporterTypes.BlindSigningReporterDatasource).to(\n HttpBlindSigningReporterDatasource,\n );\n bind(reporterTypes.BlindSigningReporter).to(DefaultBlindSigningReporter);\n });\n"],
5
+ "mappings": "AAAA,OAAS,mBAAAA,MAAuB,YAEhC,OAAS,sCAAAC,MAA0C,qDACnD,OAAS,iBAAAC,MAAqB,8BAC9B,OAAS,+BAAAC,MAAmC,gDAErC,MAAMC,EAAwB,IACnC,IAAIJ,EAAgB,CAAC,CAAE,KAAAK,CAAK,IAAM,CAChCA,EAAKH,EAAc,8BAA8B,EAAE,GACjDD,CACF,EACAI,EAAKH,EAAc,oBAAoB,EAAE,GAAGC,CAA2B,CACzE,CAAC",
6
+ "names": ["ContainerModule", "HttpBlindSigningReporterDatasource", "reporterTypes", "DefaultBlindSigningReporter", "reporterModuleFactory", "bind"]
7
+ }
@@ -0,0 +1,2 @@
1
+ const r={BlindSigningReporterDatasource:Symbol.for("BlindSigningReporterDatasource"),BlindSigningReporter:Symbol.for("BlindSigningReporter")};export{r as reporterTypes};
2
+ //# sourceMappingURL=reporterTypes.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/reporter/di/reporterTypes.ts"],
4
+ "sourcesContent": ["export const reporterTypes = {\n BlindSigningReporterDatasource: Symbol.for(\"BlindSigningReporterDatasource\"),\n BlindSigningReporter: Symbol.for(\"BlindSigningReporter\"),\n};\n"],
5
+ "mappings": "AAAO,MAAMA,EAAgB,CAC3B,+BAAgC,OAAO,IAAI,gCAAgC,EAC3E,qBAAsB,OAAO,IAAI,sBAAsB,CACzD",
6
+ "names": ["reporterTypes"]
7
+ }
@@ -0,0 +1 @@
1
+ //# sourceMappingURL=BlindSigningReporter.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": [],
4
+ "sourcesContent": [],
5
+ "mappings": "",
6
+ "names": []
7
+ }
@@ -0,0 +1,2 @@
1
+ var c=Object.defineProperty;var d=Object.getOwnPropertyDescriptor;var m=(t,r,i,o)=>{for(var e=o>1?void 0:o?d(r,i):r,n=t.length-1,a;n>=0;n--)(a=t[n])&&(e=(o?a(r,i,e):a(e))||e);return o&&e&&c(r,i,e),e},s=(t,r)=>(i,o)=>r(i,o,t);import{inject as g,injectable as y}from"inversify";import{reporterTypes as S}from"../../reporter/di/reporterTypes";let p=class{constructor(r){this.dataSource=r}async report(r){return this.dataSource.report(r)}};p=m([y(),s(0,g(S.BlindSigningReporterDatasource))],p);export{p as DefaultBlindSigningReporter};
2
+ //# sourceMappingURL=DefaultBlindSigningReporter.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/reporter/domain/DefaultBlindSigningReporter.ts"],
4
+ "sourcesContent": ["import { inject, injectable } from \"inversify\";\nimport { type Either } from \"purify-ts\";\n\nimport {\n type BlindSigningReporterDatasource,\n type BlindSigningReportParams,\n} from \"@/reporter/data/BlindSigningReporterDatasource\";\nimport { reporterTypes } from \"@/reporter/di/reporterTypes\";\n\nimport { type BlindSigningReporter } from \"./BlindSigningReporter\";\n\n@injectable()\nexport class DefaultBlindSigningReporter implements BlindSigningReporter {\n constructor(\n @inject(reporterTypes.BlindSigningReporterDatasource)\n private readonly dataSource: BlindSigningReporterDatasource,\n ) {}\n\n async report(params: BlindSigningReportParams): Promise<Either<Error, void>> {\n return this.dataSource.report(params);\n }\n}\n"],
5
+ "mappings": "iOAAA,OAAS,UAAAA,EAAQ,cAAAC,MAAkB,YAOnC,OAAS,iBAAAC,MAAqB,8BAKvB,IAAMC,EAAN,KAAkE,CACvE,YAEmBC,EACjB,CADiB,gBAAAA,CAChB,CAEH,MAAM,OAAOC,EAAgE,CAC3E,OAAO,KAAK,WAAW,OAAOA,CAAM,CACtC,CACF,EATaF,EAANG,EAAA,CADNC,EAAW,EAGPC,EAAA,EAAAC,EAAOC,EAAc,8BAA8B,IAF3CP",
6
+ "names": ["inject", "injectable", "reporterTypes", "DefaultBlindSigningReporter", "dataSource", "params", "__decorateClass", "injectable", "__decorateParam", "inject", "reporterTypes"]
7
+ }
@@ -0,0 +1,2 @@
1
+ import{Left as o,Right as i}from"purify-ts";import{BlindSigningMethod as s,BlindSignReason as l,ClearSigningType as c}from"../../reporter/model/BlindSigningEvent";import{BlindSigningModelId as p}from"../../reporter/model/BlindSigningModelId";import{DefaultBlindSigningReporter as a}from"./DefaultBlindSigningReporter";describe("DefaultBlindSigningReporter",()=>{const r={signatureId:"a3f8Kb-1738850400000",signingMethod:s.ETH_SIGN_TRANSACTION,isBlindSign:!0,chainId:1,targetAddress:"0xdAC17F958D2ee523a2206206994597C13D831ec7",blindSignReason:l.NO_CLEAR_SIGNING_CONTEXT,modelId:p.NANO_X,signerAppVersion:"1.12.1",deviceVersion:"2.2.3",ethContext:{clearSigningType:c.EIP7730,partialContextErrors:0}};it("should delegate to the datasource and return Right on success",async()=>{const e={report:vi.fn().mockResolvedValueOnce(i(void 0))},n=await new a(e).report(r);expect(e.report).toHaveBeenCalledWith(r),expect(n).toEqual(i(void 0))}),it("should delegate to the datasource and return Left on failure",async()=>{const e=new Error("report failed"),t={report:vi.fn().mockResolvedValueOnce(o(e))},d=await new a(t).report(r);expect(t.report).toHaveBeenCalledWith(r),expect(d).toEqual(o(e))})});
2
+ //# sourceMappingURL=DefaultBlindSigningReporter.test.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/reporter/domain/DefaultBlindSigningReporter.test.ts"],
4
+ "sourcesContent": ["import { Left, Right } from \"purify-ts\";\n\nimport { type BlindSigningReporterDatasource } from \"@/reporter/data/BlindSigningReporterDatasource\";\nimport {\n BlindSigningMethod,\n BlindSignReason,\n ClearSigningType,\n} from \"@/reporter/model/BlindSigningEvent\";\nimport { BlindSigningModelId } from \"@/reporter/model/BlindSigningModelId\";\n\nimport { DefaultBlindSigningReporter } from \"./DefaultBlindSigningReporter\";\n\ndescribe(\"DefaultBlindSigningReporter\", () => {\n const params = {\n signatureId: \"a3f8Kb-1738850400000\",\n signingMethod: BlindSigningMethod.ETH_SIGN_TRANSACTION,\n isBlindSign: true,\n chainId: 1,\n targetAddress: \"0xdAC17F958D2ee523a2206206994597C13D831ec7\",\n blindSignReason: BlindSignReason.NO_CLEAR_SIGNING_CONTEXT,\n modelId: BlindSigningModelId.NANO_X,\n signerAppVersion: \"1.12.1\",\n deviceVersion: \"2.2.3\",\n ethContext: {\n clearSigningType: ClearSigningType.EIP7730,\n partialContextErrors: 0,\n },\n };\n\n it(\"should delegate to the datasource and return Right on success\", async () => {\n // GIVEN\n const dataSource: BlindSigningReporterDatasource = {\n report: vi.fn().mockResolvedValueOnce(Right(undefined)),\n };\n const reporter = new DefaultBlindSigningReporter(dataSource);\n\n // WHEN\n const result = await reporter.report(params);\n\n // THEN\n expect(dataSource.report).toHaveBeenCalledWith(params);\n expect(result).toEqual(Right(undefined));\n });\n\n it(\"should delegate to the datasource and return Left on failure\", async () => {\n // GIVEN\n const error = new Error(\"report failed\");\n const dataSource: BlindSigningReporterDatasource = {\n report: vi.fn().mockResolvedValueOnce(Left(error)),\n };\n const reporter = new DefaultBlindSigningReporter(dataSource);\n\n // WHEN\n const result = await reporter.report(params);\n\n // THEN\n expect(dataSource.report).toHaveBeenCalledWith(params);\n expect(result).toEqual(Left(error));\n });\n});\n"],
5
+ "mappings": "AAAA,OAAS,QAAAA,EAAM,SAAAC,MAAa,YAG5B,OACE,sBAAAC,EACA,mBAAAC,EACA,oBAAAC,MACK,qCACP,OAAS,uBAAAC,MAA2B,uCAEpC,OAAS,+BAAAC,MAAmC,gCAE5C,SAAS,8BAA+B,IAAM,CAC5C,MAAMC,EAAS,CACb,YAAa,uBACb,cAAeL,EAAmB,qBAClC,YAAa,GACb,QAAS,EACT,cAAe,6CACf,gBAAiBC,EAAgB,yBACjC,QAASE,EAAoB,OAC7B,iBAAkB,SAClB,cAAe,QACf,WAAY,CACV,iBAAkBD,EAAiB,QACnC,qBAAsB,CACxB,CACF,EAEA,GAAG,gEAAiE,SAAY,CAE9E,MAAMI,EAA6C,CACjD,OAAQ,GAAG,GAAG,EAAE,sBAAsBP,EAAM,MAAS,CAAC,CACxD,EAIMQ,EAAS,MAHE,IAAIH,EAA4BE,CAAU,EAG7B,OAAOD,CAAM,EAG3C,OAAOC,EAAW,MAAM,EAAE,qBAAqBD,CAAM,EACrD,OAAOE,CAAM,EAAE,QAAQR,EAAM,MAAS,CAAC,CACzC,CAAC,EAED,GAAG,+DAAgE,SAAY,CAE7E,MAAMS,EAAQ,IAAI,MAAM,eAAe,EACjCF,EAA6C,CACjD,OAAQ,GAAG,GAAG,EAAE,sBAAsBR,EAAKU,CAAK,CAAC,CACnD,EAIMD,EAAS,MAHE,IAAIH,EAA4BE,CAAU,EAG7B,OAAOD,CAAM,EAG3C,OAAOC,EAAW,MAAM,EAAE,qBAAqBD,CAAM,EACrD,OAAOE,CAAM,EAAE,QAAQT,EAAKU,CAAK,CAAC,CACpC,CAAC,CACH,CAAC",
6
+ "names": ["Left", "Right", "BlindSigningMethod", "BlindSignReason", "ClearSigningType", "BlindSigningModelId", "DefaultBlindSigningReporter", "params", "dataSource", "result", "error"]
7
+ }
@@ -0,0 +1,2 @@
1
+ const e=Object.freeze({ETH_SIGN_TRANSACTION:"eth_signTransaction",ETH_SIGN_TYPED_DATA:"eth_signTypedData"}),n=Object.freeze({NO_CLEAR_SIGNING_CONTEXT:"no_clear_signing_context",DEVICE_REJECTED_CONTEXT:"device_rejected_context"}),t=Object.freeze({BASIC:"basic",EIP7730:"eip7730"}),i=Object.freeze({DESKTOP:"desktop",MOBILE:"mobile"});export{n as BlindSignReason,e as BlindSigningMethod,i as BlindSigningPlatform,t as ClearSigningType};
2
+ //# sourceMappingURL=BlindSigningEvent.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/reporter/model/BlindSigningEvent.ts"],
4
+ "sourcesContent": ["export const BlindSigningMethod = Object.freeze({\n ETH_SIGN_TRANSACTION: \"eth_signTransaction\",\n ETH_SIGN_TYPED_DATA: \"eth_signTypedData\",\n} as const);\nexport type BlindSigningMethod =\n (typeof BlindSigningMethod)[keyof typeof BlindSigningMethod];\n\nexport const BlindSignReason = Object.freeze({\n NO_CLEAR_SIGNING_CONTEXT: \"no_clear_signing_context\",\n DEVICE_REJECTED_CONTEXT: \"device_rejected_context\",\n} as const);\nexport type BlindSignReason =\n (typeof BlindSignReason)[keyof typeof BlindSignReason];\n\nexport const ClearSigningType = Object.freeze({\n BASIC: \"basic\",\n EIP7730: \"eip7730\",\n} as const);\nexport type ClearSigningType =\n (typeof ClearSigningType)[keyof typeof ClearSigningType];\n\nexport const BlindSigningPlatform = Object.freeze({\n DESKTOP: \"desktop\",\n MOBILE: \"mobile\",\n} as const);\nexport type BlindSigningPlatform =\n (typeof BlindSigningPlatform)[keyof typeof BlindSigningPlatform];\n"],
5
+ "mappings": "AAAO,MAAMA,EAAqB,OAAO,OAAO,CAC9C,qBAAsB,sBACtB,oBAAqB,mBACvB,CAAU,EAIGC,EAAkB,OAAO,OAAO,CAC3C,yBAA0B,2BAC1B,wBAAyB,yBAC3B,CAAU,EAIGC,EAAmB,OAAO,OAAO,CAC5C,MAAO,QACP,QAAS,SACX,CAAU,EAIGC,EAAuB,OAAO,OAAO,CAChD,QAAS,UACT,OAAQ,QACV,CAAU",
6
+ "names": ["BlindSigningMethod", "BlindSignReason", "ClearSigningType", "BlindSigningPlatform"]
7
+ }
@@ -0,0 +1,2 @@
1
+ import{DeviceModelId as e}from"@ledgerhq/device-management-kit";const d=Object.freeze({NANO_S:"nanoS",NANO_SP:"nanoSP",NANO_X:"nanoX",STAX:"stax",FLEX:"flex",APEX_P:"apexP"}),o={[e.NANO_S]:d.NANO_S,[e.NANO_SP]:d.NANO_SP,[e.NANO_X]:d.NANO_X,[e.STAX]:d.STAX,[e.FLEX]:d.FLEX,[e.APEX]:d.APEX_P};function l(n){return o[n]}export{d as BlindSigningModelId,l as mapDeviceModelId};
2
+ //# sourceMappingURL=BlindSigningModelId.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/reporter/model/BlindSigningModelId.ts"],
4
+ "sourcesContent": ["import { DeviceModelId } from \"@ledgerhq/device-management-kit\";\n\nexport const BlindSigningModelId = Object.freeze({\n NANO_S: \"nanoS\",\n NANO_SP: \"nanoSP\",\n NANO_X: \"nanoX\",\n STAX: \"stax\",\n FLEX: \"flex\",\n APEX_P: \"apexP\",\n} as const);\nexport type BlindSigningModelId =\n (typeof BlindSigningModelId)[keyof typeof BlindSigningModelId];\n\nconst deviceModelIdToBlindSigningModelId: Record<\n DeviceModelId,\n BlindSigningModelId\n> = {\n [DeviceModelId.NANO_S]: BlindSigningModelId.NANO_S,\n [DeviceModelId.NANO_SP]: BlindSigningModelId.NANO_SP,\n [DeviceModelId.NANO_X]: BlindSigningModelId.NANO_X,\n [DeviceModelId.STAX]: BlindSigningModelId.STAX,\n [DeviceModelId.FLEX]: BlindSigningModelId.FLEX,\n [DeviceModelId.APEX]: BlindSigningModelId.APEX_P,\n};\n\nexport function mapDeviceModelId(id: DeviceModelId): BlindSigningModelId {\n return deviceModelIdToBlindSigningModelId[id];\n}\n"],
5
+ "mappings": "AAAA,OAAS,iBAAAA,MAAqB,kCAEvB,MAAMC,EAAsB,OAAO,OAAO,CAC/C,OAAQ,QACR,QAAS,SACT,OAAQ,QACR,KAAM,OACN,KAAM,OACN,OAAQ,OACV,CAAU,EAIJC,EAGF,CACF,CAACF,EAAc,MAAM,EAAGC,EAAoB,OAC5C,CAACD,EAAc,OAAO,EAAGC,EAAoB,QAC7C,CAACD,EAAc,MAAM,EAAGC,EAAoB,OAC5C,CAACD,EAAc,IAAI,EAAGC,EAAoB,KAC1C,CAACD,EAAc,IAAI,EAAGC,EAAoB,KAC1C,CAACD,EAAc,IAAI,EAAGC,EAAoB,MAC5C,EAEO,SAASE,EAAiBC,EAAwC,CACvE,OAAOF,EAAmCE,CAAE,CAC9C",
6
+ "names": ["DeviceModelId", "BlindSigningModelId", "deviceModelIdToBlindSigningModelId", "mapDeviceModelId", "id"]
7
+ }
@@ -1,2 +1,2 @@
1
- var D=Object.defineProperty;var d=Object.getOwnPropertyDescriptor;var p=(s,e,o,r)=>{for(var t=r>1?void 0:r?d(e,o):e,c=s.length-1,n;c>=0;c--)(n=s[c])&&(t=(r?n(e,o,t):n(t))||t);return r&&t&&D(e,o,t),t},f=(s,e)=>(o,r)=>e(o,r,s);import u from"axios";import{inject as g}from"inversify";import{Left as a,Right as m}from"purify-ts";import{configTypes as y}from"../../config/di/configTypes";import{LEDGER_CLIENT_VERSION_HEADER as S,LEDGER_ORIGIN_TOKEN_HEADER as E}from"../../shared/constant/HttpHeaders";import k from"../../../package.json";let i=class{constructor(e){this.config=e}async getDescriptors({safeContractAddress:e,chainId:o,challenge:r}){try{const t=await u.request({method:"GET",url:`${this.config.metadataServiceDomain.url}/v2/ethereum/${o}/safe/account/${e}`,params:{challenge:r},headers:{[S]:`context-module/${k.version}`,[E]:this.config.originToken}});return t.data?this.isSafeAccountDto(t.data)?m({account:{signedDescriptor:t.data.accountDescriptor.signedDescriptor,keyId:t.data.accountDescriptor.keyId,keyUsage:t.data.accountDescriptor.keyUsage},signers:{signedDescriptor:t.data.signersDescriptor.signedDescriptor,keyId:t.data.signersDescriptor.keyId,keyUsage:t.data.signersDescriptor.keyUsage}}):a(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")):a(new Error("[ContextModule] HttpSafeAccountDataSource: unexpected empty response"))}catch{return a(new Error("[ContextModule] HttpSafeAccountDataSource: Failed to fetch safe account descriptors"))}}isSafeAccountDto(e){return typeof e=="object"&&e!==null&&"accountDescriptor"in e&&"signersDescriptor"in e&&typeof e.accountDescriptor=="object"&&typeof e.signersDescriptor=="object"&&this.isSafeDescriptorDto(e.accountDescriptor)&&this.isSafeDescriptorDto(e.signersDescriptor)}isSafeDescriptorDto(e){return typeof e=="object"&&e!==null&&"signedDescriptor"in e&&"keyId"in e&&"keyUsage"in e&&typeof e.signedDescriptor=="string"&&typeof e.keyId=="string"&&typeof e.keyUsage=="string"}};i=p([f(0,g(y.Config))],i);export{i as HttpSafeAccountDataSource};
1
+ var g=Object.defineProperty;var y=Object.getOwnPropertyDescriptor;var f=(i,e,r,o)=>{for(var t=o>1?void 0:o?y(e,r):e,c=i.length-1,n;c>=0;c--)(n=i[c])&&(t=(o?n(e,r,t):n(t))||t);return o&&t&&g(e,r,t),t},p=(i,e)=>(r,o)=>e(r,o,i);import{inject as D}from"inversify";import{Left as a,Right as u}from"purify-ts";import{configTypes as m}from"../../config/di/configTypes";import{networkTypes as d}from"../../network/di/networkTypes";let s=class{constructor(e,r){this.config=e;this.http=r}async getDescriptors({safeContractAddress:e,chainId:r,challenge:o}){try{const t=await this.http.get(`${this.config.metadataServiceDomain.url}/v2/ethereum/${r}/safe/account/${e}`,{params:{challenge:o}});return t?this.isSafeAccountDto(t)?u({account:{signedDescriptor:t.accountDescriptor.signedDescriptor,keyId:t.accountDescriptor.keyId,keyUsage:t.accountDescriptor.keyUsage},signers:{signedDescriptor:t.signersDescriptor.signedDescriptor,keyId:t.signersDescriptor.keyId,keyUsage:t.signersDescriptor.keyUsage}}):a(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")):a(new Error("[ContextModule] HttpSafeAccountDataSource: unexpected empty response"))}catch{return a(new Error("[ContextModule] HttpSafeAccountDataSource: Failed to fetch safe account descriptors"))}}isSafeAccountDto(e){return typeof e=="object"&&e!==null&&"accountDescriptor"in e&&"signersDescriptor"in e&&typeof e.accountDescriptor=="object"&&typeof e.signersDescriptor=="object"&&this.isSafeDescriptorDto(e.accountDescriptor)&&this.isSafeDescriptorDto(e.signersDescriptor)}isSafeDescriptorDto(e){return typeof e=="object"&&e!==null&&"signedDescriptor"in e&&"keyId"in e&&"keyUsage"in e&&typeof e.signedDescriptor=="string"&&typeof e.keyId=="string"&&typeof e.keyUsage=="string"}};s=f([p(0,D(m.Config)),p(1,D(d.NetworkClient))],s);export{s as HttpSafeAccountDataSource};
2
2
  //# sourceMappingURL=HttpSafeAccountDataSource.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/safe/data/HttpSafeAccountDataSource.ts"],
4
- "sourcesContent": ["import axios from \"axios\";\nimport { inject } from \"inversify\";\nimport { type Either, Left, Right } from \"purify-ts\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport { type ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport {\n LEDGER_CLIENT_VERSION_HEADER,\n LEDGER_ORIGIN_TOKEN_HEADER,\n} from \"@/shared/constant/HttpHeaders\";\nimport PACKAGE from \"@root/package.json\";\n\nimport { SafeAccountDto, SafeDescriptorDto } from \"./dto/SafeAccountDto\";\nimport {\n type GetSafeAccountParams,\n type GetSafeAccountResponse,\n type SafeAccountDataSource,\n} from \"./SafeAccountDataSource\";\n\nexport class HttpSafeAccountDataSource implements SafeAccountDataSource {\n constructor(\n @inject(configTypes.Config) private readonly config: ContextModuleConfig,\n ) {}\n\n async getDescriptors({\n safeContractAddress,\n chainId,\n challenge,\n }: GetSafeAccountParams): Promise<Either<Error, GetSafeAccountResponse>> {\n try {\n const response = await axios.request<SafeAccountDto>({\n method: \"GET\",\n url: `${this.config.metadataServiceDomain.url}/v2/ethereum/${chainId}/safe/account/${safeContractAddress}`,\n params: {\n challenge,\n },\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: `context-module/${PACKAGE.version}`,\n [LEDGER_ORIGIN_TOKEN_HEADER]: this.config.originToken,\n },\n });\n\n if (!response.data) {\n return Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: unexpected empty response\",\n ),\n );\n }\n\n if (!this.isSafeAccountDto(response.data)) {\n return Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n );\n }\n\n return Right({\n account: {\n signedDescriptor: response.data.accountDescriptor.signedDescriptor,\n keyId: response.data.accountDescriptor.keyId,\n keyUsage: response.data.accountDescriptor.keyUsage,\n },\n signers: {\n signedDescriptor: response.data.signersDescriptor.signedDescriptor,\n keyId: response.data.signersDescriptor.keyId,\n keyUsage: response.data.signersDescriptor.keyUsage,\n },\n });\n } catch (_error) {\n return Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: Failed to fetch safe account descriptors\",\n ),\n );\n }\n }\n\n private isSafeAccountDto(value: unknown): value is SafeAccountDto {\n return (\n typeof value === \"object\" &&\n value !== null &&\n \"accountDescriptor\" in value &&\n \"signersDescriptor\" in value &&\n typeof value.accountDescriptor === \"object\" &&\n typeof value.signersDescriptor === \"object\" &&\n this.isSafeDescriptorDto(value.accountDescriptor) &&\n this.isSafeDescriptorDto(value.signersDescriptor)\n );\n }\n\n private isSafeDescriptorDto(value: unknown): value is SafeDescriptorDto {\n return (\n typeof value === \"object\" &&\n value !== null &&\n \"signedDescriptor\" in value &&\n \"keyId\" in value &&\n \"keyUsage\" in value &&\n typeof value.signedDescriptor === \"string\" &&\n typeof value.keyId === \"string\" &&\n typeof value.keyUsage === \"string\"\n );\n }\n}\n"],
5
- "mappings": "iOAAA,OAAOA,MAAW,QAClB,OAAS,UAAAC,MAAc,YACvB,OAAsB,QAAAC,EAAM,SAAAC,MAAa,YAEzC,OAAS,eAAAC,MAAmB,0BAE5B,OACE,gCAAAC,EACA,8BAAAC,MACK,gCACP,OAAOC,MAAa,qBASb,IAAMC,EAAN,KAAiE,CACtE,YAC+CC,EAC7C,CAD6C,YAAAA,CAC5C,CAEH,MAAM,eAAe,CACnB,oBAAAC,EACA,QAAAC,EACA,UAAAC,CACF,EAAyE,CACvE,GAAI,CACF,MAAMC,EAAW,MAAMC,EAAM,QAAwB,CACnD,OAAQ,MACR,IAAK,GAAG,KAAK,OAAO,sBAAsB,GAAG,gBAAgBH,CAAO,iBAAiBD,CAAmB,GACxG,OAAQ,CACN,UAAAE,CACF,EACA,QAAS,CACP,CAACG,CAA4B,EAAG,kBAAkBC,EAAQ,OAAO,GACjE,CAACC,CAA0B,EAAG,KAAK,OAAO,WAC5C,CACF,CAAC,EAED,OAAKJ,EAAS,KAQT,KAAK,iBAAiBA,EAAS,IAAI,EAQjCK,EAAM,CACX,QAAS,CACP,iBAAkBL,EAAS,KAAK,kBAAkB,iBAClD,MAAOA,EAAS,KAAK,kBAAkB,MACvC,SAAUA,EAAS,KAAK,kBAAkB,QAC5C,EACA,QAAS,CACP,iBAAkBA,EAAS,KAAK,kBAAkB,iBAClD,MAAOA,EAAS,KAAK,kBAAkB,MACvC,SAAUA,EAAS,KAAK,kBAAkB,QAC5C,CACF,CAAC,EAlBQM,EACL,IAAI,MACF,iFACF,CACF,EAZOA,EACL,IAAI,MACF,sEACF,CACF,CAuBJ,MAAiB,CACf,OAAOA,EACL,IAAI,MACF,qFACF,CACF,CACF,CACF,CAEQ,iBAAiBC,EAAyC,CAChE,OACE,OAAOA,GAAU,UACjBA,IAAU,MACV,sBAAuBA,GACvB,sBAAuBA,GACvB,OAAOA,EAAM,mBAAsB,UACnC,OAAOA,EAAM,mBAAsB,UACnC,KAAK,oBAAoBA,EAAM,iBAAiB,GAChD,KAAK,oBAAoBA,EAAM,iBAAiB,CAEpD,CAEQ,oBAAoBA,EAA4C,CACtE,OACE,OAAOA,GAAU,UACjBA,IAAU,MACV,qBAAsBA,GACtB,UAAWA,GACX,aAAcA,GACd,OAAOA,EAAM,kBAAqB,UAClC,OAAOA,EAAM,OAAU,UACvB,OAAOA,EAAM,UAAa,QAE9B,CACF,EArFaZ,EAANa,EAAA,CAEFC,EAAA,EAAAC,EAAOC,EAAY,MAAM,IAFjBhB",
6
- "names": ["axios", "inject", "Left", "Right", "configTypes", "LEDGER_CLIENT_VERSION_HEADER", "LEDGER_ORIGIN_TOKEN_HEADER", "PACKAGE", "HttpSafeAccountDataSource", "config", "safeContractAddress", "chainId", "challenge", "response", "axios", "LEDGER_CLIENT_VERSION_HEADER", "PACKAGE", "LEDGER_ORIGIN_TOKEN_HEADER", "Right", "Left", "value", "__decorateClass", "__decorateParam", "inject", "configTypes"]
4
+ "sourcesContent": ["import { DmkNetworkClient } from \"@ledgerhq/device-management-kit\";\nimport { inject } from \"inversify\";\nimport { type Either, Left, Right } from \"purify-ts\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport { networkTypes } from \"@/network/di/networkTypes\";\n\nimport { SafeAccountDto, SafeDescriptorDto } from \"./dto/SafeAccountDto\";\nimport {\n type GetSafeAccountParams,\n type GetSafeAccountResponse,\n type SafeAccountDataSource,\n} from \"./SafeAccountDataSource\";\n\nexport class HttpSafeAccountDataSource implements SafeAccountDataSource {\n constructor(\n @inject(configTypes.Config)\n private readonly config: ContextModuleServiceConfig,\n @inject(networkTypes.NetworkClient)\n private readonly http: DmkNetworkClient,\n ) {}\n\n async getDescriptors({\n safeContractAddress,\n chainId,\n challenge,\n }: GetSafeAccountParams): Promise<Either<Error, GetSafeAccountResponse>> {\n try {\n const data = (await this.http.get(\n `${this.config.metadataServiceDomain.url}/v2/ethereum/${chainId}/safe/account/${safeContractAddress}`,\n { params: { challenge } },\n )) as SafeAccountDto;\n\n if (!data) {\n return Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: unexpected empty response\",\n ),\n );\n }\n\n if (!this.isSafeAccountDto(data)) {\n return Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n );\n }\n\n return Right({\n account: {\n signedDescriptor: data.accountDescriptor.signedDescriptor,\n keyId: data.accountDescriptor.keyId,\n keyUsage: data.accountDescriptor.keyUsage,\n },\n signers: {\n signedDescriptor: data.signersDescriptor.signedDescriptor,\n keyId: data.signersDescriptor.keyId,\n keyUsage: data.signersDescriptor.keyUsage,\n },\n });\n } catch (_error) {\n return Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: Failed to fetch safe account descriptors\",\n ),\n );\n }\n }\n\n private isSafeAccountDto(value: unknown): value is SafeAccountDto {\n return (\n typeof value === \"object\" &&\n value !== null &&\n \"accountDescriptor\" in value &&\n \"signersDescriptor\" in value &&\n typeof value.accountDescriptor === \"object\" &&\n typeof value.signersDescriptor === \"object\" &&\n this.isSafeDescriptorDto(value.accountDescriptor) &&\n this.isSafeDescriptorDto(value.signersDescriptor)\n );\n }\n\n private isSafeDescriptorDto(value: unknown): value is SafeDescriptorDto {\n return (\n typeof value === \"object\" &&\n value !== null &&\n \"signedDescriptor\" in value &&\n \"keyId\" in value &&\n \"keyUsage\" in value &&\n typeof value.signedDescriptor === \"string\" &&\n typeof value.keyId === \"string\" &&\n typeof value.keyUsage === \"string\"\n );\n }\n}\n"],
5
+ "mappings": "iOACA,OAAS,UAAAA,MAAc,YACvB,OAAsB,QAAAC,EAAM,SAAAC,MAAa,YAEzC,OAAS,eAAAC,MAAmB,0BAE5B,OAAS,gBAAAC,MAAoB,4BAStB,IAAMC,EAAN,KAAiE,CACtE,YAEmBC,EAEAC,EACjB,CAHiB,YAAAD,EAEA,UAAAC,CAChB,CAEH,MAAM,eAAe,CACnB,oBAAAC,EACA,QAAAC,EACA,UAAAC,CACF,EAAyE,CACvE,GAAI,CACF,MAAMC,EAAQ,MAAM,KAAK,KAAK,IAC5B,GAAG,KAAK,OAAO,sBAAsB,GAAG,gBAAgBF,CAAO,iBAAiBD,CAAmB,GACnG,CAAE,OAAQ,CAAE,UAAAE,CAAU,CAAE,CAC1B,EAEA,OAAKC,EAQA,KAAK,iBAAiBA,CAAI,EAQxBC,EAAM,CACX,QAAS,CACP,iBAAkBD,EAAK,kBAAkB,iBACzC,MAAOA,EAAK,kBAAkB,MAC9B,SAAUA,EAAK,kBAAkB,QACnC,EACA,QAAS,CACP,iBAAkBA,EAAK,kBAAkB,iBACzC,MAAOA,EAAK,kBAAkB,MAC9B,SAAUA,EAAK,kBAAkB,QACnC,CACF,CAAC,EAlBQE,EACL,IAAI,MACF,iFACF,CACF,EAZOA,EACL,IAAI,MACF,sEACF,CACF,CAuBJ,MAAiB,CACf,OAAOA,EACL,IAAI,MACF,qFACF,CACF,CACF,CACF,CAEQ,iBAAiBC,EAAyC,CAChE,OACE,OAAOA,GAAU,UACjBA,IAAU,MACV,sBAAuBA,GACvB,sBAAuBA,GACvB,OAAOA,EAAM,mBAAsB,UACnC,OAAOA,EAAM,mBAAsB,UACnC,KAAK,oBAAoBA,EAAM,iBAAiB,GAChD,KAAK,oBAAoBA,EAAM,iBAAiB,CAEpD,CAEQ,oBAAoBA,EAA4C,CACtE,OACE,OAAOA,GAAU,UACjBA,IAAU,MACV,qBAAsBA,GACtB,UAAWA,GACX,aAAcA,GACd,OAAOA,EAAM,kBAAqB,UAClC,OAAOA,EAAM,OAAU,UACvB,OAAOA,EAAM,UAAa,QAE9B,CACF,EAjFaT,EAANU,EAAA,CAEFC,EAAA,EAAAC,EAAOC,EAAY,MAAM,GAEzBF,EAAA,EAAAC,EAAOE,EAAa,aAAa,IAJzBd",
6
+ "names": ["inject", "Left", "Right", "configTypes", "networkTypes", "HttpSafeAccountDataSource", "config", "http", "safeContractAddress", "chainId", "challenge", "data", "Right", "Left", "value", "__decorateClass", "__decorateParam", "inject", "configTypes", "networkTypes"]
7
7
  }
@@ -1,2 +1,2 @@
1
- import s from"axios";import{Left as n,Right as i}from"purify-ts";import{HttpSafeAccountDataSource as a}from"../../safe/data/HttpSafeAccountDataSource";import{LEDGER_CLIENT_VERSION_HEADER as l,LEDGER_ORIGIN_TOKEN_HEADER as d}from"../../shared/constant/HttpHeaders";import p from"../../../package.json";vi.mock("axios");describe("HttpSafeAccountDataSource",()=>{const o={metadataServiceDomain:{url:"https://metadata.ledger.com"},originToken:"test-origin-token"},c={accountDescriptor:{signedDescriptor:"account-signed-descriptor-data",keyId:"account-key-id",keyUsage:"account-key-usage"},signersDescriptor:{signedDescriptor:"signers-signed-descriptor-data",keyId:"signers-key-id",keyUsage:"signers-key-usage"}},r="0x1234567890123456789012345678901234567890";beforeEach(()=>{vi.clearAllMocks()}),describe("getDescriptors",()=>{it("should return safe account descriptors on successful request",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:c});const t=await new a(o).getDescriptors(e);expect(s.request).toHaveBeenCalledWith({method:"GET",url:"https://metadata.ledger.com/v2/ethereum/1/safe/account/0x1234567890123456789012345678901234567890",params:{challenge:"0xabcdef"},headers:{[l]:`context-module/${p.version}`,[d]:"test-origin-token"}}),expect(t).toEqual(i({account:{signedDescriptor:"account-signed-descriptor-data",keyId:"account-key-id",keyUsage:"account-key-usage"},signers:{signedDescriptor:"signers-signed-descriptor-data",keyId:"signers-key-id",keyUsage:"signers-key-usage"}}))}),it("should work with different chain IDs",async()=>{const e={safeContractAddress:r,chainId:137,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:c}),await new a(o).getDescriptors(e),expect(s.request).toHaveBeenCalledWith(expect.objectContaining({url:"https://metadata.ledger.com/v2/ethereum/137/safe/account/0x1234567890123456789012345678901234567890"}))}),it("should work with different safe addresses",async()=>{const e={safeContractAddress:"0xabcdefabcdefabcdefabcdefabcdefabcdefabcd",chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:c}),await new a(o).getDescriptors(e),expect(s.request).toHaveBeenCalledWith(expect.objectContaining({url:"https://metadata.ledger.com/v2/ethereum/1/safe/account/0xabcdefabcdefabcdefabcdefabcdefabcdefabcd"}))}),it("should work with different challenges",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0x123456789"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:c}),await new a(o).getDescriptors(e),expect(s.request).toHaveBeenCalledWith(expect.objectContaining({params:{challenge:"0x123456789"}}))}),it("should return error when response data is empty",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:null});const t=await new a(o).getDescriptors(e);expect(t).toEqual(n(new Error("[ContextModule] HttpSafeAccountDataSource: unexpected empty response")))}),it("should return error when response data is undefined",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:void 0});const t=await new a(o).getDescriptors(e);expect(t).toEqual(n(new Error("[ContextModule] HttpSafeAccountDataSource: unexpected empty response")))}),it("should return error when accountDescriptor is missing",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:{signersDescriptor:c.signersDescriptor}});const t=await new a(o).getDescriptors(e);expect(t).toEqual(n(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")))}),it("should return error when signersDescriptor is missing",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:{accountDescriptor:c.accountDescriptor}});const t=await new a(o).getDescriptors(e);expect(t).toEqual(n(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")))}),it("should return error when accountDescriptor.signedDescriptor is missing",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:{accountDescriptor:{keyId:"account-key-id",keyUsage:"account-key-usage"},signersDescriptor:c.signersDescriptor}});const t=await new a(o).getDescriptors(e);expect(t).toEqual(n(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")))}),it("should return error when accountDescriptor.keyId is missing",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:{accountDescriptor:{signedDescriptor:"account-signed-descriptor-data",keyUsage:"account-key-usage"},signersDescriptor:c.signersDescriptor}});const t=await new a(o).getDescriptors(e);expect(t).toEqual(n(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")))}),it("should return error when accountDescriptor.keyUsage is missing",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:{accountDescriptor:{signedDescriptor:"account-signed-descriptor-data",keyId:"account-key-id"},signersDescriptor:c.signersDescriptor}});const t=await new a(o).getDescriptors(e);expect(t).toEqual(n(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")))}),it("should return error when signersDescriptor fields are invalid",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:{accountDescriptor:c.accountDescriptor,signersDescriptor:{signedDescriptor:"signers-signed-descriptor-data",keyId:123,keyUsage:"signers-key-usage"}}});const t=await new a(o).getDescriptors(e);expect(t).toEqual(n(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")))}),it("should return error when accountDescriptor is not an object",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:{accountDescriptor:"invalid-string",signersDescriptor:c.signersDescriptor}});const t=await new a(o).getDescriptors(e);expect(t).toEqual(n(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")))}),it("should return error when signersDescriptor is not an object",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:{accountDescriptor:c.accountDescriptor,signersDescriptor:null}});const t=await new a(o).getDescriptors(e);expect(t).toEqual(n(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")))}),it("should return error when axios request fails",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockRejectedValue(new Error("Network error"));const t=await new a(o).getDescriptors(e);expect(t).toEqual(n(new Error("[ContextModule] HttpSafeAccountDataSource: Failed to fetch safe account descriptors")))}),it("should return error when axios throws an exception",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockRejectedValue(new Error("timeout"));const t=await new a(o).getDescriptors(e);expect(t).toEqual(n(new Error("[ContextModule] HttpSafeAccountDataSource: Failed to fetch safe account descriptors")))}),it("should handle empty string values in descriptors",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:{accountDescriptor:{signedDescriptor:"",keyId:"",keyUsage:""},signersDescriptor:{signedDescriptor:"",keyId:"",keyUsage:""}}});const t=await new a(o).getDescriptors(e);expect(t).toEqual(i({account:{signedDescriptor:"",keyId:"",keyUsage:""},signers:{signedDescriptor:"",keyId:"",keyUsage:""}}))}),it("should correctly parse response with long descriptor values",async()=>{const e="a".repeat(1e3),t={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:{accountDescriptor:{signedDescriptor:e,keyId:"account-key-id",keyUsage:"account-key-usage"},signersDescriptor:{signedDescriptor:e,keyId:"signers-key-id",keyUsage:"signers-key-usage"}}});const u=await new a(o).getDescriptors(t);expect(u).toEqual(i({account:{signedDescriptor:e,keyId:"account-key-id",keyUsage:"account-key-usage"},signers:{signedDescriptor:e,keyId:"signers-key-id",keyUsage:"signers-key-usage"}}))}),it("should use correct origin token from config",async()=>{const e={metadataServiceDomain:{url:"https://metadata.ledger.com"},originToken:"custom-origin-token"},t={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:c}),await new a(e).getDescriptors(t),expect(s.request).toHaveBeenCalledWith(expect.objectContaining({headers:expect.objectContaining({[d]:"custom-origin-token"})}))}),it("should use correct metadata service URL from config",async()=>{const e={metadataServiceDomain:{url:"https://custom-metadata.example.com"},originToken:"test-token"},t={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};vi.spyOn(s,"request").mockResolvedValue({status:200,data:c}),await new a(e).getDescriptors(t),expect(s.request).toHaveBeenCalledWith(expect.objectContaining({url:"https://custom-metadata.example.com/v2/ethereum/1/safe/account/0x1234567890123456789012345678901234567890"}))})})});
1
+ import{Left as o,Right as i}from"purify-ts";import{HttpSafeAccountDataSource as d}from"../../safe/data/HttpSafeAccountDataSource";describe("HttpSafeAccountDataSource",()=>{const u={metadataServiceDomain:{url:"https://metadata.ledger.com"},originToken:"test-origin-token"},c={accountDescriptor:{signedDescriptor:"account-signed-descriptor-data",keyId:"account-key-id",keyUsage:"account-key-usage"},signersDescriptor:{signedDescriptor:"signers-signed-descriptor-data",keyId:"signers-key-id",keyUsage:"signers-key-usage"}},r="0x1234567890123456789012345678901234567890";let s,a;beforeEach(()=>{vi.clearAllMocks(),s={get:vi.fn()},a=new d(u,s)}),describe("getDescriptors",()=>{it("should return safe account descriptors on successful request",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};s.get.mockResolvedValue(c);const t=await a.getDescriptors(e);expect(s.get).toHaveBeenCalledWith("https://metadata.ledger.com/v2/ethereum/1/safe/account/0x1234567890123456789012345678901234567890",{params:{challenge:"0xabcdef"}}),expect(t).toEqual(i({account:{signedDescriptor:"account-signed-descriptor-data",keyId:"account-key-id",keyUsage:"account-key-usage"},signers:{signedDescriptor:"signers-signed-descriptor-data",keyId:"signers-key-id",keyUsage:"signers-key-usage"}}))}),it("should work with different chain IDs",async()=>{const e={safeContractAddress:r,chainId:137,challenge:"0xabcdef"};s.get.mockResolvedValue(c),await a.getDescriptors(e),expect(s.get).toHaveBeenCalledWith("https://metadata.ledger.com/v2/ethereum/137/safe/account/0x1234567890123456789012345678901234567890",{params:{challenge:"0xabcdef"}})}),it("should work with different safe addresses",async()=>{const e={safeContractAddress:"0xabcdefabcdefabcdefabcdefabcdefabcdefabcd",chainId:1,challenge:"0xabcdef"};s.get.mockResolvedValue(c),await a.getDescriptors(e),expect(s.get).toHaveBeenCalledWith("https://metadata.ledger.com/v2/ethereum/1/safe/account/0xabcdefabcdefabcdefabcdefabcdefabcdefabcd",{params:{challenge:"0xabcdef"}})}),it("should work with different challenges",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0x123456789"};s.get.mockResolvedValue(c),await a.getDescriptors(e),expect(s.get).toHaveBeenCalledWith(expect.any(String),{params:{challenge:"0x123456789"}})}),it("should return error when response data is empty",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};s.get.mockResolvedValue(null);const t=await a.getDescriptors(e);expect(t).toEqual(o(new Error("[ContextModule] HttpSafeAccountDataSource: unexpected empty response")))}),it("should return error when response data is undefined",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};s.get.mockResolvedValue(void 0);const t=await a.getDescriptors(e);expect(t).toEqual(o(new Error("[ContextModule] HttpSafeAccountDataSource: unexpected empty response")))}),it("should return error when accountDescriptor is missing",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};s.get.mockResolvedValue({signersDescriptor:c.signersDescriptor});const t=await a.getDescriptors(e);expect(t).toEqual(o(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")))}),it("should return error when signersDescriptor is missing",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};s.get.mockResolvedValue({accountDescriptor:c.accountDescriptor});const t=await a.getDescriptors(e);expect(t).toEqual(o(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")))}),it("should return error when accountDescriptor.signedDescriptor is missing",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};s.get.mockResolvedValue({accountDescriptor:{keyId:"account-key-id",keyUsage:"account-key-usage"},signersDescriptor:c.signersDescriptor});const t=await a.getDescriptors(e);expect(t).toEqual(o(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")))}),it("should return error when accountDescriptor.keyId is missing",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};s.get.mockResolvedValue({accountDescriptor:{signedDescriptor:"account-signed-descriptor-data",keyUsage:"account-key-usage"},signersDescriptor:c.signersDescriptor});const t=await a.getDescriptors(e);expect(t).toEqual(o(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")))}),it("should return error when accountDescriptor.keyUsage is missing",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};s.get.mockResolvedValue({accountDescriptor:{signedDescriptor:"account-signed-descriptor-data",keyId:"account-key-id"},signersDescriptor:c.signersDescriptor});const t=await a.getDescriptors(e);expect(t).toEqual(o(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")))}),it("should return error when signersDescriptor fields are invalid",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};s.get.mockResolvedValue({accountDescriptor:c.accountDescriptor,signersDescriptor:{signedDescriptor:"signers-signed-descriptor-data",keyId:123,keyUsage:"signers-key-usage"}});const t=await a.getDescriptors(e);expect(t).toEqual(o(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")))}),it("should return error when accountDescriptor is not an object",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};s.get.mockResolvedValue({accountDescriptor:"invalid-string",signersDescriptor:c.signersDescriptor});const t=await a.getDescriptors(e);expect(t).toEqual(o(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")))}),it("should return error when signersDescriptor is not an object",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};s.get.mockResolvedValue({accountDescriptor:c.accountDescriptor,signersDescriptor:null});const t=await a.getDescriptors(e);expect(t).toEqual(o(new Error("[ContextModule] HttpSafeAccountDataSource: invalid safe account response format")))}),it("should return error when network client rejects",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};s.get.mockRejectedValue(new Error("Network error"));const t=await a.getDescriptors(e);expect(t).toEqual(o(new Error("[ContextModule] HttpSafeAccountDataSource: Failed to fetch safe account descriptors")))}),it("should return error when network client throws an exception",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};s.get.mockRejectedValue(new Error("timeout"));const t=await a.getDescriptors(e);expect(t).toEqual(o(new Error("[ContextModule] HttpSafeAccountDataSource: Failed to fetch safe account descriptors")))}),it("should handle empty string values in descriptors",async()=>{const e={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};s.get.mockResolvedValue({accountDescriptor:{signedDescriptor:"",keyId:"",keyUsage:""},signersDescriptor:{signedDescriptor:"",keyId:"",keyUsage:""}});const t=await a.getDescriptors(e);expect(t).toEqual(i({account:{signedDescriptor:"",keyId:"",keyUsage:""},signers:{signedDescriptor:"",keyId:"",keyUsage:""}}))}),it("should correctly parse response with long descriptor values",async()=>{const e="a".repeat(1e3),t={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};s.get.mockResolvedValue({accountDescriptor:{signedDescriptor:e,keyId:"account-key-id",keyUsage:"account-key-usage"},signersDescriptor:{signedDescriptor:e,keyId:"signers-key-id",keyUsage:"signers-key-usage"}});const n=await a.getDescriptors(t);expect(n).toEqual(i({account:{signedDescriptor:e,keyId:"account-key-id",keyUsage:"account-key-usage"},signers:{signedDescriptor:e,keyId:"signers-key-id",keyUsage:"signers-key-usage"}}))}),it("should use correct metadata service URL from config",async()=>{const e={metadataServiceDomain:{url:"https://custom-metadata.example.com"},originToken:"test-token"},t=new d(e,s),n={safeContractAddress:r,chainId:1,challenge:"0xabcdef"};s.get.mockResolvedValue(c),await t.getDescriptors(n),expect(s.get).toHaveBeenCalledWith("https://custom-metadata.example.com/v2/ethereum/1/safe/account/0x1234567890123456789012345678901234567890",{params:{challenge:"0xabcdef"}})})})});
2
2
  //# sourceMappingURL=HttpSafeAccountDataSource.test.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/safe/data/HttpSafeAccountDataSource.test.ts"],
4
- "sourcesContent": ["import { type HexaString } from \"@ledgerhq/device-management-kit\";\nimport axios from \"axios\";\nimport { Left, Right } from \"purify-ts\";\n\nimport { type ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport { HttpSafeAccountDataSource } from \"@/safe/data/HttpSafeAccountDataSource\";\nimport {\n LEDGER_CLIENT_VERSION_HEADER,\n LEDGER_ORIGIN_TOKEN_HEADER,\n} from \"@/shared/constant/HttpHeaders\";\nimport PACKAGE from \"@root/package.json\";\n\nvi.mock(\"axios\");\n\ndescribe(\"HttpSafeAccountDataSource\", () => {\n const config: ContextModuleConfig = {\n metadataServiceDomain: {\n url: \"https://metadata.ledger.com\",\n },\n originToken: \"test-origin-token\",\n } as ContextModuleConfig;\n\n const validSafeAccountDto = {\n accountDescriptor: {\n signedDescriptor: \"account-signed-descriptor-data\",\n keyId: \"account-key-id\",\n keyUsage: \"account-key-usage\",\n },\n signersDescriptor: {\n signedDescriptor: \"signers-signed-descriptor-data\",\n keyId: \"signers-key-id\",\n keyUsage: \"signers-key-usage\",\n },\n };\n\n const validsafeContractAddress: HexaString =\n \"0x1234567890123456789012345678901234567890\";\n\n beforeEach(() => {\n vi.clearAllMocks();\n });\n\n describe(\"getDescriptors\", () => {\n it(\"should return safe account descriptors on successful request\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: validSafeAccountDto,\n });\n\n // WHEN\n const result = await new HttpSafeAccountDataSource(config).getDescriptors(\n params,\n );\n\n // THEN\n expect(axios.request).toHaveBeenCalledWith({\n method: \"GET\",\n url: \"https://metadata.ledger.com/v2/ethereum/1/safe/account/0x1234567890123456789012345678901234567890\",\n params: {\n challenge: \"0xabcdef\",\n },\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: `context-module/${PACKAGE.version}`,\n [LEDGER_ORIGIN_TOKEN_HEADER]: \"test-origin-token\",\n },\n });\n expect(result).toEqual(\n Right({\n account: {\n signedDescriptor: \"account-signed-descriptor-data\",\n keyId: \"account-key-id\",\n keyUsage: \"account-key-usage\",\n },\n signers: {\n signedDescriptor: \"signers-signed-descriptor-data\",\n keyId: \"signers-key-id\",\n keyUsage: \"signers-key-usage\",\n },\n }),\n );\n });\n\n it(\"should work with different chain IDs\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 137, // Polygon\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: validSafeAccountDto,\n });\n\n // WHEN\n await new HttpSafeAccountDataSource(config).getDescriptors(params);\n\n // THEN\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n url: \"https://metadata.ledger.com/v2/ethereum/137/safe/account/0x1234567890123456789012345678901234567890\",\n }),\n );\n });\n\n it(\"should work with different safe addresses\", async () => {\n // GIVEN\n const params = {\n safeContractAddress:\n \"0xabcdefabcdefabcdefabcdefabcdefabcdefabcd\" as HexaString,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: validSafeAccountDto,\n });\n\n // WHEN\n await new HttpSafeAccountDataSource(config).getDescriptors(params);\n\n // THEN\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n url: \"https://metadata.ledger.com/v2/ethereum/1/safe/account/0xabcdefabcdefabcdefabcdefabcdefabcdefabcd\",\n }),\n );\n });\n\n it(\"should work with different challenges\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0x123456789\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: validSafeAccountDto,\n });\n\n // WHEN\n await new HttpSafeAccountDataSource(config).getDescriptors(params);\n\n // THEN\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n params: {\n challenge: \"0x123456789\",\n },\n }),\n );\n });\n\n it(\"should return error when response data is empty\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: null,\n });\n\n // WHEN\n const result = await new HttpSafeAccountDataSource(config).getDescriptors(\n params,\n );\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: unexpected empty response\",\n ),\n ),\n );\n });\n\n it(\"should return error when response data is undefined\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: undefined,\n });\n\n // WHEN\n const result = await new HttpSafeAccountDataSource(config).getDescriptors(\n params,\n );\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: unexpected empty response\",\n ),\n ),\n );\n });\n\n it(\"should return error when accountDescriptor is missing\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: {\n signersDescriptor: validSafeAccountDto.signersDescriptor,\n },\n });\n\n // WHEN\n const result = await new HttpSafeAccountDataSource(config).getDescriptors(\n params,\n );\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n ),\n );\n });\n\n it(\"should return error when signersDescriptor is missing\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: {\n accountDescriptor: validSafeAccountDto.accountDescriptor,\n },\n });\n\n // WHEN\n const result = await new HttpSafeAccountDataSource(config).getDescriptors(\n params,\n );\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n ),\n );\n });\n\n it(\"should return error when accountDescriptor.signedDescriptor is missing\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: {\n accountDescriptor: {\n keyId: \"account-key-id\",\n keyUsage: \"account-key-usage\",\n },\n signersDescriptor: validSafeAccountDto.signersDescriptor,\n },\n });\n\n // WHEN\n const result = await new HttpSafeAccountDataSource(config).getDescriptors(\n params,\n );\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n ),\n );\n });\n\n it(\"should return error when accountDescriptor.keyId is missing\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: {\n accountDescriptor: {\n signedDescriptor: \"account-signed-descriptor-data\",\n keyUsage: \"account-key-usage\",\n },\n signersDescriptor: validSafeAccountDto.signersDescriptor,\n },\n });\n\n // WHEN\n const result = await new HttpSafeAccountDataSource(config).getDescriptors(\n params,\n );\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n ),\n );\n });\n\n it(\"should return error when accountDescriptor.keyUsage is missing\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: {\n accountDescriptor: {\n signedDescriptor: \"account-signed-descriptor-data\",\n keyId: \"account-key-id\",\n },\n signersDescriptor: validSafeAccountDto.signersDescriptor,\n },\n });\n\n // WHEN\n const result = await new HttpSafeAccountDataSource(config).getDescriptors(\n params,\n );\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n ),\n );\n });\n\n it(\"should return error when signersDescriptor fields are invalid\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: {\n accountDescriptor: validSafeAccountDto.accountDescriptor,\n signersDescriptor: {\n signedDescriptor: \"signers-signed-descriptor-data\",\n keyId: 123, // wrong type\n keyUsage: \"signers-key-usage\",\n },\n },\n });\n\n // WHEN\n const result = await new HttpSafeAccountDataSource(config).getDescriptors(\n params,\n );\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n ),\n );\n });\n\n it(\"should return error when accountDescriptor is not an object\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: {\n accountDescriptor: \"invalid-string\",\n signersDescriptor: validSafeAccountDto.signersDescriptor,\n },\n });\n\n // WHEN\n const result = await new HttpSafeAccountDataSource(config).getDescriptors(\n params,\n );\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n ),\n );\n });\n\n it(\"should return error when signersDescriptor is not an object\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: {\n accountDescriptor: validSafeAccountDto.accountDescriptor,\n signersDescriptor: null,\n },\n });\n\n // WHEN\n const result = await new HttpSafeAccountDataSource(config).getDescriptors(\n params,\n );\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n ),\n );\n });\n\n it(\"should return error when axios request fails\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockRejectedValue(new Error(\"Network error\"));\n\n // WHEN\n const result = await new HttpSafeAccountDataSource(config).getDescriptors(\n params,\n );\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: Failed to fetch safe account descriptors\",\n ),\n ),\n );\n });\n\n it(\"should return error when axios throws an exception\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockRejectedValue(new Error(\"timeout\"));\n\n // WHEN\n const result = await new HttpSafeAccountDataSource(config).getDescriptors(\n params,\n );\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: Failed to fetch safe account descriptors\",\n ),\n ),\n );\n });\n\n it(\"should handle empty string values in descriptors\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: {\n accountDescriptor: {\n signedDescriptor: \"\",\n keyId: \"\",\n keyUsage: \"\",\n },\n signersDescriptor: {\n signedDescriptor: \"\",\n keyId: \"\",\n keyUsage: \"\",\n },\n },\n });\n\n // WHEN\n const result = await new HttpSafeAccountDataSource(config).getDescriptors(\n params,\n );\n\n // THEN\n expect(result).toEqual(\n Right({\n account: {\n signedDescriptor: \"\",\n keyId: \"\",\n keyUsage: \"\",\n },\n signers: {\n signedDescriptor: \"\",\n keyId: \"\",\n keyUsage: \"\",\n },\n }),\n );\n });\n\n it(\"should correctly parse response with long descriptor values\", async () => {\n // GIVEN\n const longValue = \"a\".repeat(1000);\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: {\n accountDescriptor: {\n signedDescriptor: longValue,\n keyId: \"account-key-id\",\n keyUsage: \"account-key-usage\",\n },\n signersDescriptor: {\n signedDescriptor: longValue,\n keyId: \"signers-key-id\",\n keyUsage: \"signers-key-usage\",\n },\n },\n });\n\n // WHEN\n const result = await new HttpSafeAccountDataSource(config).getDescriptors(\n params,\n );\n\n // THEN\n expect(result).toEqual(\n Right({\n account: {\n signedDescriptor: longValue,\n keyId: \"account-key-id\",\n keyUsage: \"account-key-usage\",\n },\n signers: {\n signedDescriptor: longValue,\n keyId: \"signers-key-id\",\n keyUsage: \"signers-key-usage\",\n },\n }),\n );\n });\n\n it(\"should use correct origin token from config\", async () => {\n // GIVEN\n const customConfig: ContextModuleConfig = {\n metadataServiceDomain: {\n url: \"https://metadata.ledger.com\",\n },\n originToken: \"custom-origin-token\",\n } as ContextModuleConfig;\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: validSafeAccountDto,\n });\n\n // WHEN\n await new HttpSafeAccountDataSource(customConfig).getDescriptors(params);\n\n // THEN\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n headers: expect.objectContaining({\n [LEDGER_ORIGIN_TOKEN_HEADER]: \"custom-origin-token\",\n }),\n }),\n );\n });\n\n it(\"should use correct metadata service URL from config\", async () => {\n // GIVEN\n const customConfig: ContextModuleConfig = {\n metadataServiceDomain: {\n url: \"https://custom-metadata.example.com\",\n },\n originToken: \"test-token\",\n } as ContextModuleConfig;\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({\n status: 200,\n data: validSafeAccountDto,\n });\n\n // WHEN\n await new HttpSafeAccountDataSource(customConfig).getDescriptors(params);\n\n // THEN\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n url: \"https://custom-metadata.example.com/v2/ethereum/1/safe/account/0x1234567890123456789012345678901234567890\",\n }),\n );\n });\n });\n});\n"],
5
- "mappings": "AACA,OAAOA,MAAW,QAClB,OAAS,QAAAC,EAAM,SAAAC,MAAa,YAG5B,OAAS,6BAAAC,MAAiC,wCAC1C,OACE,gCAAAC,EACA,8BAAAC,MACK,gCACP,OAAOC,MAAa,qBAEpB,GAAG,KAAK,OAAO,EAEf,SAAS,4BAA6B,IAAM,CAC1C,MAAMC,EAA8B,CAClC,sBAAuB,CACrB,IAAK,6BACP,EACA,YAAa,mBACf,EAEMC,EAAsB,CAC1B,kBAAmB,CACjB,iBAAkB,iCAClB,MAAO,iBACP,SAAU,mBACZ,EACA,kBAAmB,CACjB,iBAAkB,iCAClB,MAAO,iBACP,SAAU,mBACZ,CACF,EAEMC,EACJ,6CAEF,WAAW,IAAM,CACf,GAAG,cAAc,CACnB,CAAC,EAED,SAAS,iBAAkB,IAAM,CAC/B,GAAG,+DAAgE,SAAY,CAE7E,MAAMC,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAMQ,CACR,CAAC,EAGD,MAAMG,EAAS,MAAM,IAAIR,EAA0BI,CAAM,EAAE,eACzDG,CACF,EAGA,OAAOV,EAAM,OAAO,EAAE,qBAAqB,CACzC,OAAQ,MACR,IAAK,oGACL,OAAQ,CACN,UAAW,UACb,EACA,QAAS,CACP,CAACI,CAA4B,EAAG,kBAAkBE,EAAQ,OAAO,GACjE,CAACD,CAA0B,EAAG,mBAChC,CACF,CAAC,EACD,OAAOM,CAAM,EAAE,QACbT,EAAM,CACJ,QAAS,CACP,iBAAkB,iCAClB,MAAO,iBACP,SAAU,mBACZ,EACA,QAAS,CACP,iBAAkB,iCAClB,MAAO,iBACP,SAAU,mBACZ,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,uCAAwC,SAAY,CAErD,MAAMQ,EAAS,CACb,oBAAqBD,EACrB,QAAS,IACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAMQ,CACR,CAAC,EAGD,MAAM,IAAIL,EAA0BI,CAAM,EAAE,eAAeG,CAAM,EAGjE,OAAOV,EAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,IAAK,qGACP,CAAC,CACH,CACF,CAAC,EAED,GAAG,4CAA6C,SAAY,CAE1D,MAAMU,EAAS,CACb,oBACE,6CACF,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMV,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAMQ,CACR,CAAC,EAGD,MAAM,IAAIL,EAA0BI,CAAM,EAAE,eAAeG,CAAM,EAGjE,OAAOV,EAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,IAAK,mGACP,CAAC,CACH,CACF,CAAC,EAED,GAAG,wCAAyC,SAAY,CAEtD,MAAMU,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,aACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAMQ,CACR,CAAC,EAGD,MAAM,IAAIL,EAA0BI,CAAM,EAAE,eAAeG,CAAM,EAGjE,OAAOV,EAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,OAAQ,CACN,UAAW,aACb,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,kDAAmD,SAAY,CAEhE,MAAMU,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAM,IACR,CAAC,EAGD,MAAMW,EAAS,MAAM,IAAIR,EAA0BI,CAAM,EAAE,eACzDG,CACF,EAGA,OAAOC,CAAM,EAAE,QACbV,EACE,IAAI,MACF,sEACF,CACF,CACF,CACF,CAAC,EAED,GAAG,sDAAuD,SAAY,CAEpE,MAAMS,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAM,MACR,CAAC,EAGD,MAAMW,EAAS,MAAM,IAAIR,EAA0BI,CAAM,EAAE,eACzDG,CACF,EAGA,OAAOC,CAAM,EAAE,QACbV,EACE,IAAI,MACF,sEACF,CACF,CACF,CACF,CAAC,EAED,GAAG,wDAAyD,SAAY,CAEtE,MAAMS,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAM,CACJ,kBAAmBQ,EAAoB,iBACzC,CACF,CAAC,EAGD,MAAMG,EAAS,MAAM,IAAIR,EAA0BI,CAAM,EAAE,eACzDG,CACF,EAGA,OAAOC,CAAM,EAAE,QACbV,EACE,IAAI,MACF,iFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,wDAAyD,SAAY,CAEtE,MAAMS,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAM,CACJ,kBAAmBQ,EAAoB,iBACzC,CACF,CAAC,EAGD,MAAMG,EAAS,MAAM,IAAIR,EAA0BI,CAAM,EAAE,eACzDG,CACF,EAGA,OAAOC,CAAM,EAAE,QACbV,EACE,IAAI,MACF,iFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,yEAA0E,SAAY,CAEvF,MAAMS,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAM,CACJ,kBAAmB,CACjB,MAAO,iBACP,SAAU,mBACZ,EACA,kBAAmBQ,EAAoB,iBACzC,CACF,CAAC,EAGD,MAAMG,EAAS,MAAM,IAAIR,EAA0BI,CAAM,EAAE,eACzDG,CACF,EAGA,OAAOC,CAAM,EAAE,QACbV,EACE,IAAI,MACF,iFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,8DAA+D,SAAY,CAE5E,MAAMS,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAM,CACJ,kBAAmB,CACjB,iBAAkB,iCAClB,SAAU,mBACZ,EACA,kBAAmBQ,EAAoB,iBACzC,CACF,CAAC,EAGD,MAAMG,EAAS,MAAM,IAAIR,EAA0BI,CAAM,EAAE,eACzDG,CACF,EAGA,OAAOC,CAAM,EAAE,QACbV,EACE,IAAI,MACF,iFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,iEAAkE,SAAY,CAE/E,MAAMS,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAM,CACJ,kBAAmB,CACjB,iBAAkB,iCAClB,MAAO,gBACT,EACA,kBAAmBQ,EAAoB,iBACzC,CACF,CAAC,EAGD,MAAMG,EAAS,MAAM,IAAIR,EAA0BI,CAAM,EAAE,eACzDG,CACF,EAGA,OAAOC,CAAM,EAAE,QACbV,EACE,IAAI,MACF,iFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,gEAAiE,SAAY,CAE9E,MAAMS,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAM,CACJ,kBAAmBQ,EAAoB,kBACvC,kBAAmB,CACjB,iBAAkB,iCAClB,MAAO,IACP,SAAU,mBACZ,CACF,CACF,CAAC,EAGD,MAAMG,EAAS,MAAM,IAAIR,EAA0BI,CAAM,EAAE,eACzDG,CACF,EAGA,OAAOC,CAAM,EAAE,QACbV,EACE,IAAI,MACF,iFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,8DAA+D,SAAY,CAE5E,MAAMS,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAM,CACJ,kBAAmB,iBACnB,kBAAmBQ,EAAoB,iBACzC,CACF,CAAC,EAGD,MAAMG,EAAS,MAAM,IAAIR,EAA0BI,CAAM,EAAE,eACzDG,CACF,EAGA,OAAOC,CAAM,EAAE,QACbV,EACE,IAAI,MACF,iFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,8DAA+D,SAAY,CAE5E,MAAMS,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAM,CACJ,kBAAmBQ,EAAoB,kBACvC,kBAAmB,IACrB,CACF,CAAC,EAGD,MAAMG,EAAS,MAAM,IAAIR,EAA0BI,CAAM,EAAE,eACzDG,CACF,EAGA,OAAOC,CAAM,EAAE,QACbV,EACE,IAAI,MACF,iFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,+CAAgD,SAAY,CAE7D,MAAMS,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,IAAI,MAAM,eAAe,CAAC,EAGvE,MAAMW,EAAS,MAAM,IAAIR,EAA0BI,CAAM,EAAE,eACzDG,CACF,EAGA,OAAOC,CAAM,EAAE,QACbV,EACE,IAAI,MACF,qFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,qDAAsD,SAAY,CAEnE,MAAMS,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,IAAI,MAAM,SAAS,CAAC,EAGjE,MAAMW,EAAS,MAAM,IAAIR,EAA0BI,CAAM,EAAE,eACzDG,CACF,EAGA,OAAOC,CAAM,EAAE,QACbV,EACE,IAAI,MACF,qFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,mDAAoD,SAAY,CAEjE,MAAMS,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAM,CACJ,kBAAmB,CACjB,iBAAkB,GAClB,MAAO,GACP,SAAU,EACZ,EACA,kBAAmB,CACjB,iBAAkB,GAClB,MAAO,GACP,SAAU,EACZ,CACF,CACF,CAAC,EAGD,MAAMW,EAAS,MAAM,IAAIR,EAA0BI,CAAM,EAAE,eACzDG,CACF,EAGA,OAAOC,CAAM,EAAE,QACbT,EAAM,CACJ,QAAS,CACP,iBAAkB,GAClB,MAAO,GACP,SAAU,EACZ,EACA,QAAS,CACP,iBAAkB,GAClB,MAAO,GACP,SAAU,EACZ,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,8DAA+D,SAAY,CAE5E,MAAMU,EAAY,IAAI,OAAO,GAAI,EAC3BF,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAM,CACJ,kBAAmB,CACjB,iBAAkBY,EAClB,MAAO,iBACP,SAAU,mBACZ,EACA,kBAAmB,CACjB,iBAAkBA,EAClB,MAAO,iBACP,SAAU,mBACZ,CACF,CACF,CAAC,EAGD,MAAMD,EAAS,MAAM,IAAIR,EAA0BI,CAAM,EAAE,eACzDG,CACF,EAGA,OAAOC,CAAM,EAAE,QACbT,EAAM,CACJ,QAAS,CACP,iBAAkBU,EAClB,MAAO,iBACP,SAAU,mBACZ,EACA,QAAS,CACP,iBAAkBA,EAClB,MAAO,iBACP,SAAU,mBACZ,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,8CAA+C,SAAY,CAE5D,MAAMC,EAAoC,CACxC,sBAAuB,CACrB,IAAK,6BACP,EACA,YAAa,qBACf,EACMH,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAMQ,CACR,CAAC,EAGD,MAAM,IAAIL,EAA0BU,CAAY,EAAE,eAAeH,CAAM,EAGvE,OAAOV,EAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,QAAS,OAAO,iBAAiB,CAC/B,CAACK,CAA0B,EAAG,qBAChC,CAAC,CACH,CAAC,CACH,CACF,CAAC,EAED,GAAG,sDAAuD,SAAY,CAEpE,MAAMQ,EAAoC,CACxC,sBAAuB,CACrB,IAAK,qCACP,EACA,YAAa,YACf,EACMH,EAAS,CACb,oBAAqBD,EACrB,QAAS,EACT,UAAW,UACb,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAC3C,OAAQ,IACR,KAAMQ,CACR,CAAC,EAGD,MAAM,IAAIL,EAA0BU,CAAY,EAAE,eAAeH,CAAM,EAGvE,OAAOV,EAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,IAAK,2GACP,CAAC,CACH,CACF,CAAC,CACH,CAAC,CACH,CAAC",
6
- "names": ["axios", "Left", "Right", "HttpSafeAccountDataSource", "LEDGER_CLIENT_VERSION_HEADER", "LEDGER_ORIGIN_TOKEN_HEADER", "PACKAGE", "config", "validSafeAccountDto", "validsafeContractAddress", "params", "result", "longValue", "customConfig"]
4
+ "sourcesContent": ["import {\n type DmkNetworkClient,\n type HexaString,\n} from \"@ledgerhq/device-management-kit\";\nimport { Left, Right } from \"purify-ts\";\n\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport { HttpSafeAccountDataSource } from \"@/safe/data/HttpSafeAccountDataSource\";\n\ndescribe(\"HttpSafeAccountDataSource\", () => {\n const config: ContextModuleServiceConfig = {\n metadataServiceDomain: {\n url: \"https://metadata.ledger.com\",\n },\n originToken: \"test-origin-token\",\n } as ContextModuleServiceConfig;\n\n const validSafeAccountDto = {\n accountDescriptor: {\n signedDescriptor: \"account-signed-descriptor-data\",\n keyId: \"account-key-id\",\n keyUsage: \"account-key-usage\",\n },\n signersDescriptor: {\n signedDescriptor: \"signers-signed-descriptor-data\",\n keyId: \"signers-key-id\",\n keyUsage: \"signers-key-usage\",\n },\n };\n\n const validsafeContractAddress: HexaString =\n \"0x1234567890123456789012345678901234567890\";\n\n let httpMock: { get: ReturnType<typeof vi.fn> };\n let datasource: HttpSafeAccountDataSource;\n\n beforeEach(() => {\n vi.clearAllMocks();\n httpMock = { get: vi.fn() };\n datasource = new HttpSafeAccountDataSource(\n config,\n httpMock as unknown as DmkNetworkClient,\n );\n });\n\n describe(\"getDescriptors\", () => {\n it(\"should return safe account descriptors on successful request\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockResolvedValue(validSafeAccountDto);\n\n // WHEN\n const result = await datasource.getDescriptors(params);\n\n // THEN\n expect(httpMock.get).toHaveBeenCalledWith(\n \"https://metadata.ledger.com/v2/ethereum/1/safe/account/0x1234567890123456789012345678901234567890\",\n { params: { challenge: \"0xabcdef\" } },\n );\n expect(result).toEqual(\n Right({\n account: {\n signedDescriptor: \"account-signed-descriptor-data\",\n keyId: \"account-key-id\",\n keyUsage: \"account-key-usage\",\n },\n signers: {\n signedDescriptor: \"signers-signed-descriptor-data\",\n keyId: \"signers-key-id\",\n keyUsage: \"signers-key-usage\",\n },\n }),\n );\n });\n\n it(\"should work with different chain IDs\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 137, // Polygon\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockResolvedValue(validSafeAccountDto);\n\n // WHEN\n await datasource.getDescriptors(params);\n\n // THEN\n expect(httpMock.get).toHaveBeenCalledWith(\n \"https://metadata.ledger.com/v2/ethereum/137/safe/account/0x1234567890123456789012345678901234567890\",\n { params: { challenge: \"0xabcdef\" } },\n );\n });\n\n it(\"should work with different safe addresses\", async () => {\n // GIVEN\n const params = {\n safeContractAddress:\n \"0xabcdefabcdefabcdefabcdefabcdefabcdefabcd\" as HexaString,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockResolvedValue(validSafeAccountDto);\n\n // WHEN\n await datasource.getDescriptors(params);\n\n // THEN\n expect(httpMock.get).toHaveBeenCalledWith(\n \"https://metadata.ledger.com/v2/ethereum/1/safe/account/0xabcdefabcdefabcdefabcdefabcdefabcdefabcd\",\n { params: { challenge: \"0xabcdef\" } },\n );\n });\n\n it(\"should work with different challenges\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0x123456789\",\n };\n httpMock.get.mockResolvedValue(validSafeAccountDto);\n\n // WHEN\n await datasource.getDescriptors(params);\n\n // THEN\n expect(httpMock.get).toHaveBeenCalledWith(expect.any(String), {\n params: { challenge: \"0x123456789\" },\n });\n });\n\n it(\"should return error when response data is empty\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockResolvedValue(null);\n\n // WHEN\n const result = await datasource.getDescriptors(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: unexpected empty response\",\n ),\n ),\n );\n });\n\n it(\"should return error when response data is undefined\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockResolvedValue(undefined);\n\n // WHEN\n const result = await datasource.getDescriptors(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: unexpected empty response\",\n ),\n ),\n );\n });\n\n it(\"should return error when accountDescriptor is missing\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockResolvedValue({\n signersDescriptor: validSafeAccountDto.signersDescriptor,\n });\n\n // WHEN\n const result = await datasource.getDescriptors(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n ),\n );\n });\n\n it(\"should return error when signersDescriptor is missing\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockResolvedValue({\n accountDescriptor: validSafeAccountDto.accountDescriptor,\n });\n\n // WHEN\n const result = await datasource.getDescriptors(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n ),\n );\n });\n\n it(\"should return error when accountDescriptor.signedDescriptor is missing\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockResolvedValue({\n accountDescriptor: {\n keyId: \"account-key-id\",\n keyUsage: \"account-key-usage\",\n },\n signersDescriptor: validSafeAccountDto.signersDescriptor,\n });\n\n // WHEN\n const result = await datasource.getDescriptors(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n ),\n );\n });\n\n it(\"should return error when accountDescriptor.keyId is missing\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockResolvedValue({\n accountDescriptor: {\n signedDescriptor: \"account-signed-descriptor-data\",\n keyUsage: \"account-key-usage\",\n },\n signersDescriptor: validSafeAccountDto.signersDescriptor,\n });\n\n // WHEN\n const result = await datasource.getDescriptors(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n ),\n );\n });\n\n it(\"should return error when accountDescriptor.keyUsage is missing\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockResolvedValue({\n accountDescriptor: {\n signedDescriptor: \"account-signed-descriptor-data\",\n keyId: \"account-key-id\",\n },\n signersDescriptor: validSafeAccountDto.signersDescriptor,\n });\n\n // WHEN\n const result = await datasource.getDescriptors(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n ),\n );\n });\n\n it(\"should return error when signersDescriptor fields are invalid\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockResolvedValue({\n accountDescriptor: validSafeAccountDto.accountDescriptor,\n signersDescriptor: {\n signedDescriptor: \"signers-signed-descriptor-data\",\n keyId: 123, // wrong type\n keyUsage: \"signers-key-usage\",\n },\n });\n\n // WHEN\n const result = await datasource.getDescriptors(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n ),\n );\n });\n\n it(\"should return error when accountDescriptor is not an object\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockResolvedValue({\n accountDescriptor: \"invalid-string\",\n signersDescriptor: validSafeAccountDto.signersDescriptor,\n });\n\n // WHEN\n const result = await datasource.getDescriptors(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n ),\n );\n });\n\n it(\"should return error when signersDescriptor is not an object\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockResolvedValue({\n accountDescriptor: validSafeAccountDto.accountDescriptor,\n signersDescriptor: null,\n });\n\n // WHEN\n const result = await datasource.getDescriptors(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: invalid safe account response format\",\n ),\n ),\n );\n });\n\n it(\"should return error when network client rejects\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockRejectedValue(new Error(\"Network error\"));\n\n // WHEN\n const result = await datasource.getDescriptors(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: Failed to fetch safe account descriptors\",\n ),\n ),\n );\n });\n\n it(\"should return error when network client throws an exception\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockRejectedValue(new Error(\"timeout\"));\n\n // WHEN\n const result = await datasource.getDescriptors(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSafeAccountDataSource: Failed to fetch safe account descriptors\",\n ),\n ),\n );\n });\n\n it(\"should handle empty string values in descriptors\", async () => {\n // GIVEN\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockResolvedValue({\n accountDescriptor: {\n signedDescriptor: \"\",\n keyId: \"\",\n keyUsage: \"\",\n },\n signersDescriptor: {\n signedDescriptor: \"\",\n keyId: \"\",\n keyUsage: \"\",\n },\n });\n\n // WHEN\n const result = await datasource.getDescriptors(params);\n\n // THEN\n expect(result).toEqual(\n Right({\n account: {\n signedDescriptor: \"\",\n keyId: \"\",\n keyUsage: \"\",\n },\n signers: {\n signedDescriptor: \"\",\n keyId: \"\",\n keyUsage: \"\",\n },\n }),\n );\n });\n\n it(\"should correctly parse response with long descriptor values\", async () => {\n // GIVEN\n const longValue = \"a\".repeat(1000);\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockResolvedValue({\n accountDescriptor: {\n signedDescriptor: longValue,\n keyId: \"account-key-id\",\n keyUsage: \"account-key-usage\",\n },\n signersDescriptor: {\n signedDescriptor: longValue,\n keyId: \"signers-key-id\",\n keyUsage: \"signers-key-usage\",\n },\n });\n\n // WHEN\n const result = await datasource.getDescriptors(params);\n\n // THEN\n expect(result).toEqual(\n Right({\n account: {\n signedDescriptor: longValue,\n keyId: \"account-key-id\",\n keyUsage: \"account-key-usage\",\n },\n signers: {\n signedDescriptor: longValue,\n keyId: \"signers-key-id\",\n keyUsage: \"signers-key-usage\",\n },\n }),\n );\n });\n\n it(\"should use correct metadata service URL from config\", async () => {\n // GIVEN\n const customConfig: ContextModuleServiceConfig = {\n metadataServiceDomain: {\n url: \"https://custom-metadata.example.com\",\n },\n originToken: \"test-token\",\n } as ContextModuleServiceConfig;\n const customDatasource = new HttpSafeAccountDataSource(\n customConfig,\n httpMock as unknown as DmkNetworkClient,\n );\n const params = {\n safeContractAddress: validsafeContractAddress,\n chainId: 1,\n challenge: \"0xabcdef\",\n };\n httpMock.get.mockResolvedValue(validSafeAccountDto);\n\n // WHEN\n await customDatasource.getDescriptors(params);\n\n // THEN\n expect(httpMock.get).toHaveBeenCalledWith(\n \"https://custom-metadata.example.com/v2/ethereum/1/safe/account/0x1234567890123456789012345678901234567890\",\n { params: { challenge: \"0xabcdef\" } },\n );\n });\n });\n});\n"],
5
+ "mappings": "AAIA,OAAS,QAAAA,EAAM,SAAAC,MAAa,YAG5B,OAAS,6BAAAC,MAAiC,wCAE1C,SAAS,4BAA6B,IAAM,CAC1C,MAAMC,EAAqC,CACzC,sBAAuB,CACrB,IAAK,6BACP,EACA,YAAa,mBACf,EAEMC,EAAsB,CAC1B,kBAAmB,CACjB,iBAAkB,iCAClB,MAAO,iBACP,SAAU,mBACZ,EACA,kBAAmB,CACjB,iBAAkB,iCAClB,MAAO,iBACP,SAAU,mBACZ,CACF,EAEMC,EACJ,6CAEF,IAAIC,EACAC,EAEJ,WAAW,IAAM,CACf,GAAG,cAAc,EACjBD,EAAW,CAAE,IAAK,GAAG,GAAG,CAAE,EAC1BC,EAAa,IAAIL,EACfC,EACAG,CACF,CACF,CAAC,EAED,SAAS,iBAAkB,IAAM,CAC/B,GAAG,+DAAgE,SAAY,CAE7E,MAAME,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkBF,CAAmB,EAGlD,MAAMK,EAAS,MAAMF,EAAW,eAAeC,CAAM,EAGrD,OAAOF,EAAS,GAAG,EAAE,qBACnB,oGACA,CAAE,OAAQ,CAAE,UAAW,UAAW,CAAE,CACtC,EACA,OAAOG,CAAM,EAAE,QACbR,EAAM,CACJ,QAAS,CACP,iBAAkB,iCAClB,MAAO,iBACP,SAAU,mBACZ,EACA,QAAS,CACP,iBAAkB,iCAClB,MAAO,iBACP,SAAU,mBACZ,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,uCAAwC,SAAY,CAErD,MAAMO,EAAS,CACb,oBAAqBH,EACrB,QAAS,IACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkBF,CAAmB,EAGlD,MAAMG,EAAW,eAAeC,CAAM,EAGtC,OAAOF,EAAS,GAAG,EAAE,qBACnB,sGACA,CAAE,OAAQ,CAAE,UAAW,UAAW,CAAE,CACtC,CACF,CAAC,EAED,GAAG,4CAA6C,SAAY,CAE1D,MAAME,EAAS,CACb,oBACE,6CACF,QAAS,EACT,UAAW,UACb,EACAF,EAAS,IAAI,kBAAkBF,CAAmB,EAGlD,MAAMG,EAAW,eAAeC,CAAM,EAGtC,OAAOF,EAAS,GAAG,EAAE,qBACnB,oGACA,CAAE,OAAQ,CAAE,UAAW,UAAW,CAAE,CACtC,CACF,CAAC,EAED,GAAG,wCAAyC,SAAY,CAEtD,MAAME,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,aACb,EACAC,EAAS,IAAI,kBAAkBF,CAAmB,EAGlD,MAAMG,EAAW,eAAeC,CAAM,EAGtC,OAAOF,EAAS,GAAG,EAAE,qBAAqB,OAAO,IAAI,MAAM,EAAG,CAC5D,OAAQ,CAAE,UAAW,aAAc,CACrC,CAAC,CACH,CAAC,EAED,GAAG,kDAAmD,SAAY,CAEhE,MAAME,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkB,IAAI,EAGnC,MAAMG,EAAS,MAAMF,EAAW,eAAeC,CAAM,EAGrD,OAAOC,CAAM,EAAE,QACbT,EACE,IAAI,MACF,sEACF,CACF,CACF,CACF,CAAC,EAED,GAAG,sDAAuD,SAAY,CAEpE,MAAMQ,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkB,MAAS,EAGxC,MAAMG,EAAS,MAAMF,EAAW,eAAeC,CAAM,EAGrD,OAAOC,CAAM,EAAE,QACbT,EACE,IAAI,MACF,sEACF,CACF,CACF,CACF,CAAC,EAED,GAAG,wDAAyD,SAAY,CAEtE,MAAMQ,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkB,CAC7B,kBAAmBF,EAAoB,iBACzC,CAAC,EAGD,MAAMK,EAAS,MAAMF,EAAW,eAAeC,CAAM,EAGrD,OAAOC,CAAM,EAAE,QACbT,EACE,IAAI,MACF,iFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,wDAAyD,SAAY,CAEtE,MAAMQ,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkB,CAC7B,kBAAmBF,EAAoB,iBACzC,CAAC,EAGD,MAAMK,EAAS,MAAMF,EAAW,eAAeC,CAAM,EAGrD,OAAOC,CAAM,EAAE,QACbT,EACE,IAAI,MACF,iFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,yEAA0E,SAAY,CAEvF,MAAMQ,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkB,CAC7B,kBAAmB,CACjB,MAAO,iBACP,SAAU,mBACZ,EACA,kBAAmBF,EAAoB,iBACzC,CAAC,EAGD,MAAMK,EAAS,MAAMF,EAAW,eAAeC,CAAM,EAGrD,OAAOC,CAAM,EAAE,QACbT,EACE,IAAI,MACF,iFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,8DAA+D,SAAY,CAE5E,MAAMQ,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkB,CAC7B,kBAAmB,CACjB,iBAAkB,iCAClB,SAAU,mBACZ,EACA,kBAAmBF,EAAoB,iBACzC,CAAC,EAGD,MAAMK,EAAS,MAAMF,EAAW,eAAeC,CAAM,EAGrD,OAAOC,CAAM,EAAE,QACbT,EACE,IAAI,MACF,iFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,iEAAkE,SAAY,CAE/E,MAAMQ,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkB,CAC7B,kBAAmB,CACjB,iBAAkB,iCAClB,MAAO,gBACT,EACA,kBAAmBF,EAAoB,iBACzC,CAAC,EAGD,MAAMK,EAAS,MAAMF,EAAW,eAAeC,CAAM,EAGrD,OAAOC,CAAM,EAAE,QACbT,EACE,IAAI,MACF,iFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,gEAAiE,SAAY,CAE9E,MAAMQ,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkB,CAC7B,kBAAmBF,EAAoB,kBACvC,kBAAmB,CACjB,iBAAkB,iCAClB,MAAO,IACP,SAAU,mBACZ,CACF,CAAC,EAGD,MAAMK,EAAS,MAAMF,EAAW,eAAeC,CAAM,EAGrD,OAAOC,CAAM,EAAE,QACbT,EACE,IAAI,MACF,iFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,8DAA+D,SAAY,CAE5E,MAAMQ,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkB,CAC7B,kBAAmB,iBACnB,kBAAmBF,EAAoB,iBACzC,CAAC,EAGD,MAAMK,EAAS,MAAMF,EAAW,eAAeC,CAAM,EAGrD,OAAOC,CAAM,EAAE,QACbT,EACE,IAAI,MACF,iFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,8DAA+D,SAAY,CAE5E,MAAMQ,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkB,CAC7B,kBAAmBF,EAAoB,kBACvC,kBAAmB,IACrB,CAAC,EAGD,MAAMK,EAAS,MAAMF,EAAW,eAAeC,CAAM,EAGrD,OAAOC,CAAM,EAAE,QACbT,EACE,IAAI,MACF,iFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,kDAAmD,SAAY,CAEhE,MAAMQ,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkB,IAAI,MAAM,eAAe,CAAC,EAGzD,MAAMG,EAAS,MAAMF,EAAW,eAAeC,CAAM,EAGrD,OAAOC,CAAM,EAAE,QACbT,EACE,IAAI,MACF,qFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,8DAA+D,SAAY,CAE5E,MAAMQ,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkB,IAAI,MAAM,SAAS,CAAC,EAGnD,MAAMG,EAAS,MAAMF,EAAW,eAAeC,CAAM,EAGrD,OAAOC,CAAM,EAAE,QACbT,EACE,IAAI,MACF,qFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,mDAAoD,SAAY,CAEjE,MAAMQ,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkB,CAC7B,kBAAmB,CACjB,iBAAkB,GAClB,MAAO,GACP,SAAU,EACZ,EACA,kBAAmB,CACjB,iBAAkB,GAClB,MAAO,GACP,SAAU,EACZ,CACF,CAAC,EAGD,MAAMG,EAAS,MAAMF,EAAW,eAAeC,CAAM,EAGrD,OAAOC,CAAM,EAAE,QACbR,EAAM,CACJ,QAAS,CACP,iBAAkB,GAClB,MAAO,GACP,SAAU,EACZ,EACA,QAAS,CACP,iBAAkB,GAClB,MAAO,GACP,SAAU,EACZ,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,8DAA+D,SAAY,CAE5E,MAAMS,EAAY,IAAI,OAAO,GAAI,EAC3BF,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkB,CAC7B,kBAAmB,CACjB,iBAAkBI,EAClB,MAAO,iBACP,SAAU,mBACZ,EACA,kBAAmB,CACjB,iBAAkBA,EAClB,MAAO,iBACP,SAAU,mBACZ,CACF,CAAC,EAGD,MAAMD,EAAS,MAAMF,EAAW,eAAeC,CAAM,EAGrD,OAAOC,CAAM,EAAE,QACbR,EAAM,CACJ,QAAS,CACP,iBAAkBS,EAClB,MAAO,iBACP,SAAU,mBACZ,EACA,QAAS,CACP,iBAAkBA,EAClB,MAAO,iBACP,SAAU,mBACZ,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,sDAAuD,SAAY,CAEpE,MAAMC,EAA2C,CAC/C,sBAAuB,CACrB,IAAK,qCACP,EACA,YAAa,YACf,EACMC,EAAmB,IAAIV,EAC3BS,EACAL,CACF,EACME,EAAS,CACb,oBAAqBH,EACrB,QAAS,EACT,UAAW,UACb,EACAC,EAAS,IAAI,kBAAkBF,CAAmB,EAGlD,MAAMQ,EAAiB,eAAeJ,CAAM,EAG5C,OAAOF,EAAS,GAAG,EAAE,qBACnB,4GACA,CAAE,OAAQ,CAAE,UAAW,UAAW,CAAE,CACtC,CACF,CAAC,CACH,CAAC,CACH,CAAC",
6
+ "names": ["Left", "Right", "HttpSafeAccountDataSource", "config", "validSafeAccountDto", "validsafeContractAddress", "httpMock", "datasource", "params", "result", "longValue", "customConfig", "customDatasource"]
7
7
  }
@@ -1,2 +1,2 @@
1
- var n=(e=>(e.TOKEN="token",e.NFT="nft",e.TRUSTED_NAME="trustedName",e.PLUGIN="plugin",e.EXTERNAL_PLUGIN="externalPlugin",e.TRANSACTION_INFO="transactionInfo",e.PROXY_INFO="proxyInfo",e.ENUM="enum",e.TRANSACTION_FIELD_DESCRIPTION="transactionFieldDescription",e.TRANSACTION_CHECK="transactionCheck",e.DYNAMIC_NETWORK="dynamicNetwork",e.DYNAMIC_NETWORK_ICON="dynamicNetworkIcon",e.ERROR="error",e.SAFE="safe",e.SIGNER="signer",e.GATED_SIGNING="gatedSigning",e))(n||{}),r=(t=>(t.TOKEN="token",t.NFT="nft",t.TRUSTED_NAME="trustedName",t.ENUM="enum",t.CALLDATA="calldata",t))(r||{});export{r as ClearSignContextReferenceType,n as ClearSignContextType};
1
+ var n=(e=>(e.TOKEN="token",e.NFT="nft",e.TRUSTED_NAME="trustedName",e.PLUGIN="plugin",e.EXTERNAL_PLUGIN="externalPlugin",e.TRANSACTION_INFO="transactionInfo",e.PROXY_INFO="proxyInfo",e.ENUM="enum",e.TRANSACTION_FIELD_DESCRIPTION="transactionFieldDescription",e.TRANSACTION_CHECK="transactionCheck",e.DYNAMIC_NETWORK="dynamicNetwork",e.DYNAMIC_NETWORK_ICON="dynamicNetworkIcon",e.ERROR="error",e.SAFE="safe",e.SIGNER="signer",e.GATED_SIGNING="gatedSigning",e.ACCOUNT_OWNERSHIP="accountOwnership",e))(n||{}),r=(t=>(t.TOKEN="token",t.NFT="nft",t.TRUSTED_NAME="trustedName",t.ENUM="enum",t.CALLDATA="calldata",t))(r||{});export{r as ClearSignContextReferenceType,n as ClearSignContextType};
2
2
  //# sourceMappingURL=ClearSignContext.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/shared/model/ClearSignContext.ts"],
4
- "sourcesContent": ["import { type PkiCertificate } from \"@/pki/model/PkiCertificate\";\n\nimport { type GenericPath } from \"./GenericPath\";\n\nexport enum ClearSignContextType {\n TOKEN = \"token\",\n NFT = \"nft\",\n TRUSTED_NAME = \"trustedName\",\n PLUGIN = \"plugin\",\n EXTERNAL_PLUGIN = \"externalPlugin\",\n TRANSACTION_INFO = \"transactionInfo\",\n PROXY_INFO = \"proxyInfo\",\n ENUM = \"enum\",\n TRANSACTION_FIELD_DESCRIPTION = \"transactionFieldDescription\",\n TRANSACTION_CHECK = \"transactionCheck\",\n DYNAMIC_NETWORK = \"dynamicNetwork\",\n DYNAMIC_NETWORK_ICON = \"dynamicNetworkIcon\",\n ERROR = \"error\",\n SAFE = \"safe\",\n SIGNER = \"signer\",\n GATED_SIGNING = \"gatedSigning\",\n}\n\nexport enum ClearSignContextReferenceType {\n TOKEN = ClearSignContextType.TOKEN,\n NFT = ClearSignContextType.NFT,\n TRUSTED_NAME = ClearSignContextType.TRUSTED_NAME,\n ENUM = ClearSignContextType.ENUM,\n CALLDATA = \"calldata\",\n}\n\ntype PathOnly = {\n valuePath: GenericPath;\n value?: never;\n callee?: GenericPath;\n selector?: GenericPath;\n amount?: GenericPath;\n spender?: GenericPath;\n chainId?: GenericPath;\n};\n\ntype ValueOnly = {\n value: string;\n valuePath?: never;\n};\n\ntype PathOrValue = PathOnly | ValueOnly;\n\n// per-type payloads for references\ntype ClearSignContextReferencePayloads = {\n [ClearSignContextReferenceType.ENUM]: {\n valuePath: GenericPath;\n id: number; // enum id to reference\n };\n [ClearSignContextReferenceType.TRUSTED_NAME]: {\n valuePath: GenericPath;\n types: string[];\n sources: string[];\n };\n [ClearSignContextReferenceType.CALLDATA]: {\n callee: GenericPath;\n valuePath: GenericPath;\n selector?: GenericPath;\n amount?: GenericPath;\n spender?: GenericPath;\n chainId?: GenericPath;\n };\n [ClearSignContextReferenceType.TOKEN]: PathOrValue;\n [ClearSignContextReferenceType.NFT]: PathOrValue;\n};\n\n// discriminated union of all reference shapes, built from the payload map\ntype ClearSignContextReferenceUnion = {\n [T in ClearSignContextReferenceType]: {\n type: T;\n } & ClearSignContextReferencePayloads[T];\n}[ClearSignContextReferenceType];\n\nexport type ClearSignContextReference<\n T extends ClearSignContextReferenceType = ClearSignContextReferenceType,\n> = Extract<ClearSignContextReferenceUnion, { type: T }>;\n\nexport type ClearSignContextSuccessType = Exclude<\n ClearSignContextType,\n ClearSignContextType.ERROR\n>;\n\n// base payload shared by most success contexts\ntype ClearSignContextSuccessBase = {\n payload: string;\n certificate?: PkiCertificate;\n};\n\n// map from ClearSign success type to payload\ntype ClearSignContextSuccessPayloadsBase = {\n [K in ClearSignContextSuccessType]: ClearSignContextSuccessBase;\n};\n\n// special cases overrides for certain context types\ntype ClearSignContextSuccessPayloadOverrides = {\n [ClearSignContextType.ENUM]: ClearSignContextSuccessBase & {\n id: number;\n value: number;\n };\n [ClearSignContextType.TRANSACTION_FIELD_DESCRIPTION]: ClearSignContextSuccessBase & {\n reference?: ClearSignContextReference;\n };\n};\n\ntype ClearSignContextSuccessPayloads = Omit<\n ClearSignContextSuccessPayloadsBase,\n ClearSignContextType.ENUM | ClearSignContextType.TRANSACTION_FIELD_DESCRIPTION\n> &\n ClearSignContextSuccessPayloadOverrides;\n\n// union of all success contexts, built from the payload map.\ntype ClearSignContextSuccessUnion = {\n [T in ClearSignContextSuccessType]: {\n type: T;\n } & ClearSignContextSuccessPayloads[T];\n}[ClearSignContextSuccessType];\n\nexport type ClearSignContextSuccess<\n T extends ClearSignContextSuccessType = ClearSignContextSuccessType,\n> = Extract<ClearSignContextSuccessUnion, { type: T }>;\n\nexport type ClearSignContextError = {\n type: ClearSignContextType.ERROR;\n error: Error;\n};\n\nexport type ClearSignContext = ClearSignContextSuccess | ClearSignContextError;\n"],
5
- "mappings": "AAIO,IAAKA,OACVA,EAAA,MAAQ,QACRA,EAAA,IAAM,MACNA,EAAA,aAAe,cACfA,EAAA,OAAS,SACTA,EAAA,gBAAkB,iBAClBA,EAAA,iBAAmB,kBACnBA,EAAA,WAAa,YACbA,EAAA,KAAO,OACPA,EAAA,8BAAgC,8BAChCA,EAAA,kBAAoB,mBACpBA,EAAA,gBAAkB,iBAClBA,EAAA,qBAAuB,qBACvBA,EAAA,MAAQ,QACRA,EAAA,KAAO,OACPA,EAAA,OAAS,SACTA,EAAA,cAAgB,eAhBNA,OAAA,IAmBAC,OACVA,EAAA,MAAQ,QACRA,EAAA,IAAM,MACNA,EAAA,aAAe,cACfA,EAAA,KAAO,OACPA,EAAA,SAAW,WALDA,OAAA",
4
+ "sourcesContent": ["import { type PkiCertificate } from \"@/pki/model/PkiCertificate\";\n\nimport { type GenericPath } from \"./GenericPath\";\n\nexport enum ClearSignContextType {\n TOKEN = \"token\",\n NFT = \"nft\",\n TRUSTED_NAME = \"trustedName\",\n PLUGIN = \"plugin\",\n EXTERNAL_PLUGIN = \"externalPlugin\",\n TRANSACTION_INFO = \"transactionInfo\",\n PROXY_INFO = \"proxyInfo\",\n ENUM = \"enum\",\n TRANSACTION_FIELD_DESCRIPTION = \"transactionFieldDescription\",\n TRANSACTION_CHECK = \"transactionCheck\",\n DYNAMIC_NETWORK = \"dynamicNetwork\",\n DYNAMIC_NETWORK_ICON = \"dynamicNetworkIcon\",\n ERROR = \"error\",\n SAFE = \"safe\",\n SIGNER = \"signer\",\n GATED_SIGNING = \"gatedSigning\",\n ACCOUNT_OWNERSHIP = \"accountOwnership\",\n}\n\nexport enum ClearSignContextReferenceType {\n TOKEN = ClearSignContextType.TOKEN,\n NFT = ClearSignContextType.NFT,\n TRUSTED_NAME = ClearSignContextType.TRUSTED_NAME,\n ENUM = ClearSignContextType.ENUM,\n CALLDATA = \"calldata\",\n}\n\ntype PathOnly = {\n valuePath: GenericPath;\n value?: never;\n callee?: GenericPath;\n selector?: GenericPath;\n amount?: GenericPath;\n spender?: GenericPath;\n chainId?: GenericPath;\n};\n\ntype ValueOnly = {\n value: string;\n valuePath?: never;\n};\n\ntype PathOrValue = PathOnly | ValueOnly;\n\n// per-type payloads for references\ntype ClearSignContextReferencePayloads = {\n [ClearSignContextReferenceType.ENUM]: {\n valuePath: GenericPath;\n id: number; // enum id to reference\n };\n [ClearSignContextReferenceType.TRUSTED_NAME]: {\n valuePath: GenericPath;\n types: string[];\n sources: string[];\n };\n [ClearSignContextReferenceType.CALLDATA]: {\n callee: GenericPath;\n valuePath: GenericPath;\n selector?: GenericPath;\n amount?: GenericPath;\n spender?: GenericPath;\n chainId?: GenericPath;\n };\n [ClearSignContextReferenceType.TOKEN]: PathOrValue;\n [ClearSignContextReferenceType.NFT]: PathOrValue;\n};\n\n// discriminated union of all reference shapes, built from the payload map\ntype ClearSignContextReferenceUnion = {\n [T in ClearSignContextReferenceType]: {\n type: T;\n } & ClearSignContextReferencePayloads[T];\n}[ClearSignContextReferenceType];\n\nexport type ClearSignContextReference<\n T extends ClearSignContextReferenceType = ClearSignContextReferenceType,\n> = Extract<ClearSignContextReferenceUnion, { type: T }>;\n\nexport type ClearSignContextSuccessType = Exclude<\n ClearSignContextType,\n ClearSignContextType.ERROR\n>;\n\n// base payload shared by most success contexts\ntype ClearSignContextSuccessBase = {\n payload: string;\n certificate?: PkiCertificate;\n};\n\n// map from ClearSign success type to payload\ntype ClearSignContextSuccessPayloadsBase = {\n [K in ClearSignContextSuccessType]: ClearSignContextSuccessBase;\n};\n\n// special cases overrides for certain context types\ntype ClearSignContextSuccessPayloadOverrides = {\n [ClearSignContextType.ENUM]: ClearSignContextSuccessBase & {\n id: number;\n value: number;\n };\n [ClearSignContextType.TRANSACTION_FIELD_DESCRIPTION]: ClearSignContextSuccessBase & {\n reference?: ClearSignContextReference;\n };\n};\n\ntype ClearSignContextSuccessPayloads = Omit<\n ClearSignContextSuccessPayloadsBase,\n ClearSignContextType.ENUM | ClearSignContextType.TRANSACTION_FIELD_DESCRIPTION\n> &\n ClearSignContextSuccessPayloadOverrides;\n\n// union of all success contexts, built from the payload map.\ntype ClearSignContextSuccessUnion = {\n [T in ClearSignContextSuccessType]: {\n type: T;\n } & ClearSignContextSuccessPayloads[T];\n}[ClearSignContextSuccessType];\n\nexport type ClearSignContextSuccess<\n T extends ClearSignContextSuccessType = ClearSignContextSuccessType,\n> = Extract<ClearSignContextSuccessUnion, { type: T }>;\n\nexport type ClearSignContextError = {\n type: ClearSignContextType.ERROR;\n error: Error;\n};\n\nexport type ClearSignContext = ClearSignContextSuccess | ClearSignContextError;\n"],
5
+ "mappings": "AAIO,IAAKA,OACVA,EAAA,MAAQ,QACRA,EAAA,IAAM,MACNA,EAAA,aAAe,cACfA,EAAA,OAAS,SACTA,EAAA,gBAAkB,iBAClBA,EAAA,iBAAmB,kBACnBA,EAAA,WAAa,YACbA,EAAA,KAAO,OACPA,EAAA,8BAAgC,8BAChCA,EAAA,kBAAoB,mBACpBA,EAAA,gBAAkB,iBAClBA,EAAA,qBAAuB,qBACvBA,EAAA,MAAQ,QACRA,EAAA,KAAO,OACPA,EAAA,OAAS,SACTA,EAAA,cAAgB,eAChBA,EAAA,kBAAoB,mBAjBVA,OAAA,IAoBAC,OACVA,EAAA,MAAQ,QACRA,EAAA,IAAM,MACNA,EAAA,aAAe,cACfA,EAAA,KAAO,OACPA,EAAA,SAAW,WALDA,OAAA",
6
6
  "names": ["ClearSignContextType", "ClearSignContextReferenceType"]
7
7
  }
@@ -1,2 +1,2 @@
1
- var w=Object.defineProperty;var g=Object.getOwnPropertyDescriptor;var f=(i,e,o,t)=>{for(var r=t>1?void 0:t?g(e,o):e,n=i.length-1,s;n>=0;n--)(s=i[n])&&(r=(t?s(e,o,r):s(r))||r);return t&&r&&w(e,o,r),r},u=(i,e)=>(o,t)=>e(o,t,i);import{hexaStringToBuffer as h}from"@ledgerhq/device-management-kit";import m from"axios";import{inject as E,injectable as I}from"inversify";import{Left as a,Right as l}from"purify-ts";import{configTypes as O}from"../../config/di/configTypes";import{LEDGER_CLIENT_VERSION_HEADER as p,LEDGER_ORIGIN_TOKEN_HEADER as A}from"../../shared/constant/HttpHeaders";import S from"../../../package.json";let d=class{constructor(e){this.config=e;if(!this.config.originToken)throw new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: origin token is required")}isSolanaSPLOwnerInfo(e){return typeof e!="object"||e===null?!1:typeof e.tokenAccount=="string"&&typeof e.owner=="string"&&typeof e.contract=="string"&&typeof e.signedDescriptor=="string"}async fetchAddressMetadata(e,o){return await m.request({method:"GET",url:`${this.config.metadataServiceDomain.url}/v2/solana/owner/${e}?challenge=${o}`,headers:{[p]:`context-module/${S.version}`,[A]:this.config.originToken}}).then(t=>this.isSolanaSPLOwnerInfo(t.data)?l(t.data):a(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid fetchAddressMetadata response shape"))).catch(()=>a(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: Failed to fetch address metadata")))}async computeAddressMetadata(e,o,t){return await m.request({method:"GET",url:`${this.config.metadataServiceDomain.url}/v2/solana/computed-token-account/${e}/${o}?challenge=${t}`,headers:{[p]:`context-module/${S.version}`,"X-Ledger-Client-Origin":this.config.originToken}}).then(r=>this.isSolanaSPLOwnerInfo(r.data)?l(r.data):a(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid computeAddressMetadata response shape"))).catch(()=>a(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: Failed to compute address metadata")))}async getOwnerInfo(e){const{tokenAddress:o,challenge:t,createATA:r}=e;if(!t)return a(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: challenge is required"));let n;if(o)n=await this.fetchAddressMetadata(o,t);else if(r?.address&&r?.mintAddress)n=await this.computeAddressMetadata(r.address,r.mintAddress,t);else return a(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: either tokenAddress or valid createATA must be provided"));return n.chain(s=>{const c=h(s.signedDescriptor);return c?l({tlvDescriptor:c}):a(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid base64 tlvDescriptor received"))})}};d=f([I(),u(0,E(O.Config))],d);export{d as HttpSolanaOwnerInfoDataSource};
1
+ var S=Object.defineProperty;var w=Object.getOwnPropertyDescriptor;var u=(i,e,n,t)=>{for(var r=t>1?void 0:t?w(e,n):e,o=i.length-1,s;o>=0;o--)(s=i[o])&&(r=(t?s(e,n,r):s(r))||r);return t&&r&&S(e,n,r),r},l=(i,e)=>(n,t)=>e(n,t,i);import{hexaStringToBuffer as m}from"@ledgerhq/device-management-kit";import{inject as p,injectable as h}from"inversify";import{Left as a,Right as d}from"purify-ts";import{configTypes as g}from"../../config/di/configTypes";import{networkTypes as C}from"../../network/di/networkTypes";let c=class{constructor(e,n){this.config=e;this.http=n;if(!this.config.originToken)throw new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: origin token is required")}isSolanaSPLOwnerInfo(e){return typeof e!="object"||e===null?!1:typeof e.tokenAccount=="string"&&typeof e.owner=="string"&&typeof e.contract=="string"&&typeof e.signedDescriptor=="string"}async fetchAddressMetadata(e,n){try{const t=await this.http.get(`${this.config.metadataServiceDomain.url}/v2/solana/owner/${e}`,{params:{challenge:n}});return this.isSolanaSPLOwnerInfo(t)?d(t):a(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid fetchAddressMetadata response shape"))}catch{return a(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: Failed to fetch address metadata"))}}async computeAddressMetadata(e,n,t){try{const r=await this.http.get(`${this.config.metadataServiceDomain.url}/v2/solana/computed-token-account/${e}/${n}`,{params:{challenge:t}});return this.isSolanaSPLOwnerInfo(r)?d(r):a(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid computeAddressMetadata response shape"))}catch{return a(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: Failed to compute address metadata"))}}async getOwnerInfo(e){const{tokenAddress:n,challenge:t,createATA:r}=e;if(!t)return a(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: challenge is required"));let o;if(n)o=await this.fetchAddressMetadata(n,t);else if(r?.address&&r?.mintAddress)o=await this.computeAddressMetadata(r.address,r.mintAddress,t);else return a(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: either tokenAddress or valid createATA must be provided"));return o.chain(s=>{const f=m(s.signedDescriptor);return f?d({tlvDescriptor:f}):a(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid base64 tlvDescriptor received"))})}};c=u([h(),l(0,p(g.Config)),l(1,p(C.NetworkClient))],c);export{c as HttpSolanaOwnerInfoDataSource};
2
2
  //# sourceMappingURL=HttpSolanaOwnerInfoDataSource.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/solana/data/HttpSolanaOwnerInfoDataSource.ts"],
4
- "sourcesContent": ["import { hexaStringToBuffer } from \"@ledgerhq/device-management-kit\";\nimport axios from \"axios\";\nimport { inject, injectable } from \"inversify\";\nimport { Either, Left, Right } from \"purify-ts\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport type { ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport {\n LEDGER_CLIENT_VERSION_HEADER,\n LEDGER_ORIGIN_TOKEN_HEADER,\n} from \"@/shared/constant/HttpHeaders\";\nimport {\n SolanaSPLOwnerInfo,\n type SolanaTransactionContext,\n} from \"@/solana/domain/solanaContextTypes\";\nimport PACKAGE from \"@root/package.json\";\n\nimport {\n HttpSolanaOwnerInfoDataSourceResult,\n SolanaDataSource,\n} from \"./SolanaDataSource\";\n\n@injectable()\nexport class HttpSolanaOwnerInfoDataSource implements SolanaDataSource {\n constructor(\n @inject(configTypes.Config) private readonly config: ContextModuleConfig,\n ) {\n if (!this.config.originToken) {\n throw new Error(\n \"[ContextModule] - HttpSolanaOwnerInfoDataSource: origin token is required\",\n );\n }\n }\n\n private isSolanaSPLOwnerInfo(data: {\n tokenAccount?: unknown;\n owner?: unknown;\n contract?: unknown;\n signedDescriptor?: unknown;\n }): data is SolanaSPLOwnerInfo {\n if (typeof data !== \"object\" || data === null) return false;\n return (\n typeof data.tokenAccount === \"string\" &&\n typeof data.owner === \"string\" &&\n typeof data.contract === \"string\" &&\n typeof data.signedDescriptor === \"string\"\n );\n }\n\n async fetchAddressMetadata(\n tokenAddress: string,\n challenge: string,\n ): Promise<Either<Error, SolanaSPLOwnerInfo>> {\n return await axios\n .request<SolanaSPLOwnerInfo>({\n method: \"GET\",\n url: `${this.config.metadataServiceDomain.url}/v2/solana/owner/${tokenAddress}?challenge=${challenge}`,\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: `context-module/${PACKAGE.version}`,\n [LEDGER_ORIGIN_TOKEN_HEADER]: this.config.originToken,\n },\n })\n .then((res) => {\n if (!this.isSolanaSPLOwnerInfo(res.data))\n return Left(\n new Error(\n \"[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid fetchAddressMetadata response shape\",\n ),\n );\n return Right(res.data);\n })\n .catch(() =>\n Left(\n new Error(\n \"[ContextModule] - HttpSolanaOwnerInfoDataSource: Failed to fetch address metadata\",\n ),\n ),\n );\n }\n\n async computeAddressMetadata(\n address: string,\n mintAddress: string,\n challenge: string,\n ): Promise<Either<Error, SolanaSPLOwnerInfo>> {\n return await axios\n .request<SolanaSPLOwnerInfo>({\n method: \"GET\",\n url: `${this.config.metadataServiceDomain.url}/v2/solana/computed-token-account/${address}/${mintAddress}?challenge=${challenge}`,\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: `context-module/${PACKAGE.version}`,\n \"X-Ledger-Client-Origin\": this.config.originToken,\n },\n })\n .then((res) => {\n if (!this.isSolanaSPLOwnerInfo(res.data))\n return Left(\n new Error(\n \"[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid computeAddressMetadata response shape\",\n ),\n );\n return Right(res.data);\n })\n .catch(() =>\n Left(\n new Error(\n \"[ContextModule] - HttpSolanaOwnerInfoDataSource: Failed to compute address metadata\",\n ),\n ),\n );\n }\n\n async getOwnerInfo(\n context: SolanaTransactionContext,\n ): Promise<Either<Error, HttpSolanaOwnerInfoDataSourceResult>> {\n const { tokenAddress, challenge, createATA } = context;\n\n if (!challenge) {\n return Left(\n new Error(\n \"[ContextModule] - HttpSolanaOwnerInfoDataSource: challenge is required\",\n ),\n );\n }\n\n let ownerInfoResult: Either<Error, SolanaSPLOwnerInfo>;\n\n if (tokenAddress) {\n ownerInfoResult = await this.fetchAddressMetadata(\n tokenAddress,\n challenge,\n );\n } else if (createATA?.address && createATA?.mintAddress) {\n ownerInfoResult = await this.computeAddressMetadata(\n createATA.address,\n createATA.mintAddress,\n challenge,\n );\n } else {\n return Left(\n new Error(\n \"[ContextModule] - HttpSolanaOwnerInfoDataSource: either tokenAddress or valid createATA must be provided\",\n ),\n );\n }\n\n return ownerInfoResult.chain((ownerInfo) => {\n const tlvDescriptor = hexaStringToBuffer(ownerInfo.signedDescriptor);\n if (!tlvDescriptor) {\n return Left(\n new Error(\n \"[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid base64 tlvDescriptor received\",\n ),\n );\n }\n return Right({\n tlvDescriptor,\n });\n });\n }\n}\n"],
5
- "mappings": "iOAAA,OAAS,sBAAAA,MAA0B,kCACnC,OAAOC,MAAW,QAClB,OAAS,UAAAC,EAAQ,cAAAC,MAAkB,YACnC,OAAiB,QAAAC,EAAM,SAAAC,MAAa,YAEpC,OAAS,eAAAC,MAAmB,0BAE5B,OACE,gCAAAC,EACA,8BAAAC,MACK,gCAKP,OAAOC,MAAa,qBAQb,IAAMC,EAAN,KAAgE,CACrE,YAC+CC,EAC7C,CAD6C,YAAAA,EAE7C,GAAI,CAAC,KAAK,OAAO,YACf,MAAM,IAAI,MACR,2EACF,CAEJ,CAEQ,qBAAqBC,EAKE,CAC7B,OAAI,OAAOA,GAAS,UAAYA,IAAS,KAAa,GAEpD,OAAOA,EAAK,cAAiB,UAC7B,OAAOA,EAAK,OAAU,UACtB,OAAOA,EAAK,UAAa,UACzB,OAAOA,EAAK,kBAAqB,QAErC,CAEA,MAAM,qBACJC,EACAC,EAC4C,CAC5C,OAAO,MAAMC,EACV,QAA4B,CAC3B,OAAQ,MACR,IAAK,GAAG,KAAK,OAAO,sBAAsB,GAAG,oBAAoBF,CAAY,cAAcC,CAAS,GACpG,QAAS,CACP,CAACE,CAA4B,EAAG,kBAAkBC,EAAQ,OAAO,GACjE,CAACC,CAA0B,EAAG,KAAK,OAAO,WAC5C,CACF,CAAC,EACA,KAAMC,GACA,KAAK,qBAAqBA,EAAI,IAAI,EAMhCC,EAAMD,EAAI,IAAI,EALZE,EACL,IAAI,MACF,8FACF,CACF,CAEH,EACA,MAAM,IACLA,EACE,IAAI,MACF,mFACF,CACF,CACF,CACJ,CAEA,MAAM,uBACJC,EACAC,EACAT,EAC4C,CAC5C,OAAO,MAAMC,EACV,QAA4B,CAC3B,OAAQ,MACR,IAAK,GAAG,KAAK,OAAO,sBAAsB,GAAG,qCAAqCO,CAAO,IAAIC,CAAW,cAAcT,CAAS,GAC/H,QAAS,CACP,CAACE,CAA4B,EAAG,kBAAkBC,EAAQ,OAAO,GACjE,yBAA0B,KAAK,OAAO,WACxC,CACF,CAAC,EACA,KAAME,GACA,KAAK,qBAAqBA,EAAI,IAAI,EAMhCC,EAAMD,EAAI,IAAI,EALZE,EACL,IAAI,MACF,gGACF,CACF,CAEH,EACA,MAAM,IACLA,EACE,IAAI,MACF,qFACF,CACF,CACF,CACJ,CAEA,MAAM,aACJG,EAC6D,CAC7D,KAAM,CAAE,aAAAX,EAAc,UAAAC,EAAW,UAAAW,CAAU,EAAID,EAE/C,GAAI,CAACV,EACH,OAAOO,EACL,IAAI,MACF,wEACF,CACF,EAGF,IAAIK,EAEJ,GAAIb,EACFa,EAAkB,MAAM,KAAK,qBAC3Bb,EACAC,CACF,UACSW,GAAW,SAAWA,GAAW,YAC1CC,EAAkB,MAAM,KAAK,uBAC3BD,EAAU,QACVA,EAAU,YACVX,CACF,MAEA,QAAOO,EACL,IAAI,MACF,0GACF,CACF,EAGF,OAAOK,EAAgB,MAAOC,GAAc,CAC1C,MAAMC,EAAgBC,EAAmBF,EAAU,gBAAgB,EACnE,OAAKC,EAOER,EAAM,CACX,cAAAQ,CACF,CAAC,EARQP,EACL,IAAI,MACF,wFACF,CACF,CAKJ,CAAC,CACH,CACF,EAzIaX,EAANoB,EAAA,CADNC,EAAW,EAGPC,EAAA,EAAAC,EAAOC,EAAY,MAAM,IAFjBxB",
6
- "names": ["hexaStringToBuffer", "axios", "inject", "injectable", "Left", "Right", "configTypes", "LEDGER_CLIENT_VERSION_HEADER", "LEDGER_ORIGIN_TOKEN_HEADER", "PACKAGE", "HttpSolanaOwnerInfoDataSource", "config", "data", "tokenAddress", "challenge", "axios", "LEDGER_CLIENT_VERSION_HEADER", "PACKAGE", "LEDGER_ORIGIN_TOKEN_HEADER", "res", "Right", "Left", "address", "mintAddress", "context", "createATA", "ownerInfoResult", "ownerInfo", "tlvDescriptor", "hexaStringToBuffer", "__decorateClass", "injectable", "__decorateParam", "inject", "configTypes"]
4
+ "sourcesContent": ["import {\n DmkNetworkClient,\n hexaStringToBuffer,\n} from \"@ledgerhq/device-management-kit\";\nimport { inject, injectable } from \"inversify\";\nimport { Either, Left, Right } from \"purify-ts\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport type { ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport { networkTypes } from \"@/network/di/networkTypes\";\nimport {\n SolanaSPLOwnerInfo,\n type SolanaTransactionContext,\n} from \"@/solana/domain/solanaContextTypes\";\n\nimport {\n HttpSolanaOwnerInfoDataSourceResult,\n SolanaDataSource,\n} from \"./SolanaDataSource\";\n\n@injectable()\nexport class HttpSolanaOwnerInfoDataSource implements SolanaDataSource {\n constructor(\n @inject(configTypes.Config)\n private readonly config: ContextModuleServiceConfig,\n @inject(networkTypes.NetworkClient)\n private readonly http: DmkNetworkClient,\n ) {\n if (!this.config.originToken) {\n throw new Error(\n \"[ContextModule] - HttpSolanaOwnerInfoDataSource: origin token is required\",\n );\n }\n }\n\n private isSolanaSPLOwnerInfo(data: {\n tokenAccount?: unknown;\n owner?: unknown;\n contract?: unknown;\n signedDescriptor?: unknown;\n }): data is SolanaSPLOwnerInfo {\n if (typeof data !== \"object\" || data === null) return false;\n return (\n typeof data.tokenAccount === \"string\" &&\n typeof data.owner === \"string\" &&\n typeof data.contract === \"string\" &&\n typeof data.signedDescriptor === \"string\"\n );\n }\n\n async fetchAddressMetadata(\n tokenAddress: string,\n challenge: string,\n ): Promise<Either<Error, SolanaSPLOwnerInfo>> {\n try {\n const data = (await this.http.get(\n `${this.config.metadataServiceDomain.url}/v2/solana/owner/${tokenAddress}`,\n { params: { challenge } },\n )) as SolanaSPLOwnerInfo;\n if (!this.isSolanaSPLOwnerInfo(data))\n return Left(\n new Error(\n \"[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid fetchAddressMetadata response shape\",\n ),\n );\n return Right(data);\n } catch {\n return Left(\n new Error(\n \"[ContextModule] - HttpSolanaOwnerInfoDataSource: Failed to fetch address metadata\",\n ),\n );\n }\n }\n\n async computeAddressMetadata(\n address: string,\n mintAddress: string,\n challenge: string,\n ): Promise<Either<Error, SolanaSPLOwnerInfo>> {\n try {\n const data = (await this.http.get(\n `${this.config.metadataServiceDomain.url}/v2/solana/computed-token-account/${address}/${mintAddress}`,\n { params: { challenge } },\n )) as SolanaSPLOwnerInfo;\n if (!this.isSolanaSPLOwnerInfo(data))\n return Left(\n new Error(\n \"[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid computeAddressMetadata response shape\",\n ),\n );\n return Right(data);\n } catch {\n return Left(\n new Error(\n \"[ContextModule] - HttpSolanaOwnerInfoDataSource: Failed to compute address metadata\",\n ),\n );\n }\n }\n\n async getOwnerInfo(\n context: SolanaTransactionContext,\n ): Promise<Either<Error, HttpSolanaOwnerInfoDataSourceResult>> {\n const { tokenAddress, challenge, createATA } = context;\n\n if (!challenge) {\n return Left(\n new Error(\n \"[ContextModule] - HttpSolanaOwnerInfoDataSource: challenge is required\",\n ),\n );\n }\n\n let ownerInfoResult: Either<Error, SolanaSPLOwnerInfo>;\n\n if (tokenAddress) {\n ownerInfoResult = await this.fetchAddressMetadata(\n tokenAddress,\n challenge,\n );\n } else if (createATA?.address && createATA?.mintAddress) {\n ownerInfoResult = await this.computeAddressMetadata(\n createATA.address,\n createATA.mintAddress,\n challenge,\n );\n } else {\n return Left(\n new Error(\n \"[ContextModule] - HttpSolanaOwnerInfoDataSource: either tokenAddress or valid createATA must be provided\",\n ),\n );\n }\n\n return ownerInfoResult.chain((ownerInfo) => {\n const tlvDescriptor = hexaStringToBuffer(ownerInfo.signedDescriptor);\n if (!tlvDescriptor) {\n return Left(\n new Error(\n \"[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid base64 tlvDescriptor received\",\n ),\n );\n }\n return Right({\n tlvDescriptor,\n });\n });\n }\n}\n"],
5
+ "mappings": "iOAAA,OAEE,sBAAAA,MACK,kCACP,OAAS,UAAAC,EAAQ,cAAAC,MAAkB,YACnC,OAAiB,QAAAC,EAAM,SAAAC,MAAa,YAEpC,OAAS,eAAAC,MAAmB,0BAE5B,OAAS,gBAAAC,MAAoB,4BAYtB,IAAMC,EAAN,KAAgE,CACrE,YAEmBC,EAEAC,EACjB,CAHiB,YAAAD,EAEA,UAAAC,EAEjB,GAAI,CAAC,KAAK,OAAO,YACf,MAAM,IAAI,MACR,2EACF,CAEJ,CAEQ,qBAAqBC,EAKE,CAC7B,OAAI,OAAOA,GAAS,UAAYA,IAAS,KAAa,GAEpD,OAAOA,EAAK,cAAiB,UAC7B,OAAOA,EAAK,OAAU,UACtB,OAAOA,EAAK,UAAa,UACzB,OAAOA,EAAK,kBAAqB,QAErC,CAEA,MAAM,qBACJC,EACAC,EAC4C,CAC5C,GAAI,CACF,MAAMF,EAAQ,MAAM,KAAK,KAAK,IAC5B,GAAG,KAAK,OAAO,sBAAsB,GAAG,oBAAoBC,CAAY,GACxE,CAAE,OAAQ,CAAE,UAAAC,CAAU,CAAE,CAC1B,EACA,OAAK,KAAK,qBAAqBF,CAAI,EAM5BG,EAAMH,CAAI,EALRI,EACL,IAAI,MACF,8FACF,CACF,CAEJ,MAAQ,CACN,OAAOA,EACL,IAAI,MACF,mFACF,CACF,CACF,CACF,CAEA,MAAM,uBACJC,EACAC,EACAJ,EAC4C,CAC5C,GAAI,CACF,MAAMF,EAAQ,MAAM,KAAK,KAAK,IAC5B,GAAG,KAAK,OAAO,sBAAsB,GAAG,qCAAqCK,CAAO,IAAIC,CAAW,GACnG,CAAE,OAAQ,CAAE,UAAAJ,CAAU,CAAE,CAC1B,EACA,OAAK,KAAK,qBAAqBF,CAAI,EAM5BG,EAAMH,CAAI,EALRI,EACL,IAAI,MACF,gGACF,CACF,CAEJ,MAAQ,CACN,OAAOA,EACL,IAAI,MACF,qFACF,CACF,CACF,CACF,CAEA,MAAM,aACJG,EAC6D,CAC7D,KAAM,CAAE,aAAAN,EAAc,UAAAC,EAAW,UAAAM,CAAU,EAAID,EAE/C,GAAI,CAACL,EACH,OAAOE,EACL,IAAI,MACF,wEACF,CACF,EAGF,IAAIK,EAEJ,GAAIR,EACFQ,EAAkB,MAAM,KAAK,qBAC3BR,EACAC,CACF,UACSM,GAAW,SAAWA,GAAW,YAC1CC,EAAkB,MAAM,KAAK,uBAC3BD,EAAU,QACVA,EAAU,YACVN,CACF,MAEA,QAAOE,EACL,IAAI,MACF,0GACF,CACF,EAGF,OAAOK,EAAgB,MAAOC,GAAc,CAC1C,MAAMC,EAAgBC,EAAmBF,EAAU,gBAAgB,EACnE,OAAKC,EAOER,EAAM,CACX,cAAAQ,CACF,CAAC,EARQP,EACL,IAAI,MACF,wFACF,CACF,CAKJ,CAAC,CACH,CACF,EAhIaP,EAANgB,EAAA,CADNC,EAAW,EAGPC,EAAA,EAAAC,EAAOC,EAAY,MAAM,GAEzBF,EAAA,EAAAC,EAAOE,EAAa,aAAa,IAJzBrB",
6
+ "names": ["hexaStringToBuffer", "inject", "injectable", "Left", "Right", "configTypes", "networkTypes", "HttpSolanaOwnerInfoDataSource", "config", "http", "data", "tokenAddress", "challenge", "Right", "Left", "address", "mintAddress", "context", "createATA", "ownerInfoResult", "ownerInfo", "tlvDescriptor", "hexaStringToBuffer", "__decorateClass", "injectable", "__decorateParam", "inject", "configTypes", "networkTypes"]
7
7
  }
@@ -1,2 +1,2 @@
1
- import{DeviceModelId as r,hexaStringToBuffer as l}from"@ledgerhq/device-management-kit";import s from"axios";import{Left as d}from"purify-ts";import{LEDGER_CLIENT_VERSION_HEADER as u}from"../../shared/constant/HttpHeaders";import{HttpSolanaOwnerInfoDataSource as n}from"../../solana/data/HttpSolanaOwnerInfoDataSource";import f from"../../../package.json";vi.mock("axios");function m(o){const c=new TextEncoder().encode(o);return Array.from(c).map(e=>e.toString(16).padStart(2,"0")).join("")}describe("HttpSolanaOwnerInfoDataSource",()=>{const o={metadataServiceDomain:{url:"https://some.doma.in"},originToken:"mock-origin-token"},i=m("mock-descriptor"),c={tokenAccount:"token-account",owner:"owner-address",contract:"contract-address",signedDescriptor:i};beforeEach(()=>{vi.resetAllMocks()}),it("should fetch address metadata via tokenAddress",async()=>{const e={deviceModelId:r.FLEX,tokenAddress:"some-token",challenge:"random",createATA:void 0};vi.spyOn(s,"request").mockResolvedValueOnce({data:c});const t=await new n(o).getOwnerInfo(e);expect(t.isRight()).toBe(!0),expect(t.extract()).toEqual({tlvDescriptor:l(i)})}),it("should return an error if both tokenAddress and createATA are missing or invalid",async()=>{const e={deviceModelId:r.FLEX,tokenAddress:void 0,challenge:"random",createATA:void 0},t=await new n(o).getOwnerInfo(e);expect(t).toEqual(d(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: either tokenAddress or valid createATA must be provided")))}),it("should return an error if challenge is missing",async()=>{const e={deviceModelId:r.FLEX,tokenAddress:"some-token",challenge:void 0,createATA:void 0},t=await new n(o).getOwnerInfo(e);expect(t).toEqual(d(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: challenge is required")))}),it("should return an error if the descriptor is not valid base64",async()=>{vi.spyOn(s,"request").mockResolvedValueOnce({data:{...c,signedDescriptor:"!!!not-valid-base64!!!"}});const e={deviceModelId:r.FLEX,tokenAddress:"some-token",challenge:"random",createATA:void 0},t=await new n(o).getOwnerInfo(e);expect(t).toEqual(d(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid base64 tlvDescriptor received")))}),it("should return an error if the metadata request fails",async()=>{vi.spyOn(s,"request").mockRejectedValueOnce(new Error("Network error"));const e={deviceModelId:r.FLEX,tokenAddress:"some-token",challenge:"random",createATA:void 0},t=await new n(o).getOwnerInfo(e);expect(t).toEqual(d(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: Failed to fetch address metadata")))}),it("should return an error if axios request return wrong shape for fetchAddressMetadata",async()=>{vi.spyOn(s,"request").mockResolvedValueOnce({data:{wrong:"field"}});const e={deviceModelId:r.FLEX,tokenAddress:"some-token",challenge:"random",createATA:void 0},t=await new n(o).getOwnerInfo(e);expect(t).toEqual(d(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid fetchAddressMetadata response shape")))}),it("should return an error if axios request return wrong shape for computeAddressMetadata",async()=>{vi.spyOn(s,"request").mockResolvedValueOnce({data:{wrong:"field"}});const e={deviceModelId:r.FLEX,tokenAddress:void 0,challenge:"random",createATA:{address:"some-address",mintAddress:"some-mint"}},t=await new n(o).getOwnerInfo(e);expect(t).toEqual(d(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid computeAddressMetadata response shape")))}),it("should throw if originToken is missing",()=>{expect(()=>{new n({...o,originToken:void 0})}).toThrow("[ContextModule] - HttpSolanaOwnerInfoDataSource: origin token is required")}),it("should call axios with correct headers",async()=>{const e={deviceModelId:r.FLEX,tokenAddress:"some-token",challenge:"random",createATA:void 0},a=vi.spyOn(s,"request").mockResolvedValueOnce({data:c});await new n(o).getOwnerInfo(e),expect(a).toHaveBeenCalledWith(expect.objectContaining({headers:{[u]:`context-module/${f.version}`,"X-Ledger-Client-Origin":o.originToken}}))})});
1
+ import{DeviceModelId as r,hexaStringToBuffer as l}from"@ledgerhq/device-management-kit";import{Left as d}from"purify-ts";import{HttpSolanaOwnerInfoDataSource as a}from"../../solana/data/HttpSolanaOwnerInfoDataSource";function u(o){const c=new TextEncoder().encode(o);return Array.from(c).map(e=>e.toString(16).padStart(2,"0")).join("")}describe("HttpSolanaOwnerInfoDataSource",()=>{const o={metadataServiceDomain:{url:"https://some.doma.in"},originToken:"mock-origin-token"},i=u("mock-descriptor"),c={tokenAccount:"token-account",owner:"owner-address",contract:"contract-address",signedDescriptor:i};let e;beforeEach(()=>{vi.resetAllMocks(),e={get:vi.fn()}}),it("should fetch address metadata via tokenAddress",async()=>{const n={deviceModelId:r.FLEX,tokenAddress:"some-token",challenge:"random",createATA:void 0};e.get.mockResolvedValueOnce(c);const t=await new a(o,e).getOwnerInfo(n);expect(e.get).toHaveBeenCalledWith(`${o.metadataServiceDomain.url}/v2/solana/owner/some-token`,{params:{challenge:"random"}}),expect(t.isRight()).toBe(!0),expect(t.extract()).toEqual({tlvDescriptor:l(i)})}),it("should return an error if both tokenAddress and createATA are missing or invalid",async()=>{const n={deviceModelId:r.FLEX,tokenAddress:void 0,challenge:"random",createATA:void 0},t=await new a(o,e).getOwnerInfo(n);expect(t).toEqual(d(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: either tokenAddress or valid createATA must be provided")))}),it("should return an error if challenge is missing",async()=>{const n={deviceModelId:r.FLEX,tokenAddress:"some-token",challenge:void 0,createATA:void 0},t=await new a(o,e).getOwnerInfo(n);expect(t).toEqual(d(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: challenge is required")))}),it("should return an error if the descriptor is not valid base64",async()=>{e.get.mockResolvedValueOnce({...c,signedDescriptor:"!!!not-valid-base64!!!"});const n={deviceModelId:r.FLEX,tokenAddress:"some-token",challenge:"random",createATA:void 0},t=await new a(o,e).getOwnerInfo(n);expect(t).toEqual(d(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid base64 tlvDescriptor received")))}),it("should return an error if the metadata request fails",async()=>{e.get.mockRejectedValueOnce(new Error("Network error"));const n={deviceModelId:r.FLEX,tokenAddress:"some-token",challenge:"random",createATA:void 0},t=await new a(o,e).getOwnerInfo(n);expect(t).toEqual(d(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: Failed to fetch address metadata")))}),it("should return an error if fetch request return wrong shape for fetchAddressMetadata",async()=>{e.get.mockResolvedValueOnce({wrong:"field"});const n={deviceModelId:r.FLEX,tokenAddress:"some-token",challenge:"random",createATA:void 0},t=await new a(o,e).getOwnerInfo(n);expect(t).toEqual(d(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid fetchAddressMetadata response shape")))}),it("should return an error if fetch request return wrong shape for computeAddressMetadata",async()=>{e.get.mockResolvedValueOnce({wrong:"field"});const n={deviceModelId:r.FLEX,tokenAddress:void 0,challenge:"random",createATA:{address:"some-address",mintAddress:"some-mint"}},t=await new a(o,e).getOwnerInfo(n);expect(e.get).toHaveBeenCalledWith(`${o.metadataServiceDomain.url}/v2/solana/computed-token-account/some-address/some-mint`,{params:{challenge:"random"}}),expect(t).toEqual(d(new Error("[ContextModule] - HttpSolanaOwnerInfoDataSource: invalid computeAddressMetadata response shape")))}),it("should throw if originToken is missing",()=>{expect(()=>{new a({...o,originToken:void 0},e)}).toThrow("[ContextModule] - HttpSolanaOwnerInfoDataSource: origin token is required")})});
2
2
  //# sourceMappingURL=HttpSolanaOwnerInfoDataSource.test.js.map