@ledgerhq/context-module 1.15.0 → 1.17.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (410) hide show
  1. package/README.md +10 -0
  2. package/lib/cjs/package.json +1 -2
  3. package/lib/cjs/src/ContextModule.js +1 -1
  4. package/lib/cjs/src/ContextModule.js.map +1 -1
  5. package/lib/cjs/src/ContextModuleBuilder.js +1 -1
  6. package/lib/cjs/src/ContextModuleBuilder.js.map +3 -3
  7. package/lib/cjs/src/ContextModuleBuilder.test.js +1 -1
  8. package/lib/cjs/src/ContextModuleBuilder.test.js.map +3 -3
  9. package/lib/cjs/src/DefaultContextModule.js +1 -1
  10. package/lib/cjs/src/DefaultContextModule.js.map +3 -3
  11. package/lib/cjs/src/DefaultContextModule.test.js +1 -1
  12. package/lib/cjs/src/DefaultContextModule.test.js.map +2 -2
  13. package/lib/cjs/src/account-ownership/data/AccountOwnershipDataSource.js +2 -0
  14. package/lib/cjs/src/account-ownership/data/AccountOwnershipDataSource.js.map +7 -0
  15. package/lib/cjs/src/account-ownership/data/AccountOwnershipError.js +2 -0
  16. package/lib/cjs/src/account-ownership/data/AccountOwnershipError.js.map +7 -0
  17. package/lib/cjs/src/account-ownership/data/HttpAccountOwnershipDataSource.js +2 -0
  18. package/lib/cjs/src/account-ownership/data/HttpAccountOwnershipDataSource.js.map +7 -0
  19. package/lib/cjs/src/account-ownership/data/HttpAccountOwnershipDataSource.test.js +2 -0
  20. package/lib/cjs/src/account-ownership/data/HttpAccountOwnershipDataSource.test.js.map +7 -0
  21. package/lib/cjs/src/account-ownership/data/dto/AccountOwnershipDto.js +2 -0
  22. package/lib/cjs/src/account-ownership/data/dto/AccountOwnershipDto.js.map +7 -0
  23. package/lib/cjs/src/account-ownership/di/accountOwnershipModuleFactory.js +2 -0
  24. package/lib/cjs/src/account-ownership/di/accountOwnershipModuleFactory.js.map +7 -0
  25. package/lib/cjs/src/account-ownership/di/accountOwnershipTypes.js +2 -0
  26. package/lib/cjs/src/account-ownership/di/accountOwnershipTypes.js.map +7 -0
  27. package/lib/cjs/src/account-ownership/domain/AccountOwnershipContextLoader.js +2 -0
  28. package/lib/cjs/src/account-ownership/domain/AccountOwnershipContextLoader.js.map +7 -0
  29. package/lib/cjs/src/account-ownership/domain/AccountOwnershipContextLoader.test.js +2 -0
  30. package/lib/cjs/src/account-ownership/domain/AccountOwnershipContextLoader.test.js.map +7 -0
  31. package/lib/cjs/src/calldata/data/HttpCalldataDescriptorDataSource.js +1 -1
  32. package/lib/cjs/src/calldata/data/HttpCalldataDescriptorDataSource.js.map +3 -3
  33. package/lib/cjs/src/calldata/data/HttpCalldataDescriptorDataSource.test.js +1 -1
  34. package/lib/cjs/src/calldata/data/HttpCalldataDescriptorDataSource.test.js.map +3 -3
  35. package/lib/cjs/src/calldata/di/calldataModuleFactory.js +1 -1
  36. package/lib/cjs/src/calldata/di/calldataModuleFactory.js.map +3 -3
  37. package/lib/cjs/src/config/di/configModuleFactory.js +1 -1
  38. package/lib/cjs/src/config/di/configModuleFactory.js.map +2 -2
  39. package/lib/cjs/src/config/model/ContextModuleConfig.js +1 -1
  40. package/lib/cjs/src/config/model/ContextModuleConfig.js.map +1 -1
  41. package/lib/cjs/src/di.js +1 -1
  42. package/lib/cjs/src/di.js.map +3 -3
  43. package/lib/cjs/src/dynamic-network/data/HttpDynamicNetworkDataSource.js +1 -1
  44. package/lib/cjs/src/dynamic-network/data/HttpDynamicNetworkDataSource.js.map +3 -3
  45. package/lib/cjs/src/dynamic-network/data/HttpDynamicNetworkDataSource.test.js +1 -1
  46. package/lib/cjs/src/dynamic-network/data/HttpDynamicNetworkDataSource.test.js.map +3 -3
  47. package/lib/cjs/src/dynamic-network/domain/DynamicNetworkContextLoader.js +1 -1
  48. package/lib/cjs/src/dynamic-network/domain/DynamicNetworkContextLoader.js.map +1 -1
  49. package/lib/cjs/src/dynamic-network/domain/DynamicNetworkContextLoader.test.js.map +1 -1
  50. package/lib/cjs/src/external-plugin/data/HttpExternalPluginDataSource.js +1 -1
  51. package/lib/cjs/src/external-plugin/data/HttpExternalPluginDataSource.js.map +3 -3
  52. package/lib/cjs/src/external-plugin/data/HttpExternalPluginDataSource.test.js +1 -1
  53. package/lib/cjs/src/external-plugin/data/HttpExternalPluginDataSource.test.js.map +3 -3
  54. package/lib/cjs/src/gated-signing/data/HttpGatedDescriptorDataSource.js +1 -1
  55. package/lib/cjs/src/gated-signing/data/HttpGatedDescriptorDataSource.js.map +3 -3
  56. package/lib/cjs/src/gated-signing/data/HttpGatedDescriptorDataSource.test.js +1 -1
  57. package/lib/cjs/src/gated-signing/data/HttpGatedDescriptorDataSource.test.js.map +3 -3
  58. package/lib/cjs/src/index.js +1 -1
  59. package/lib/cjs/src/index.js.map +2 -2
  60. package/lib/cjs/src/network/di/networkModuleFactory.js +2 -0
  61. package/lib/cjs/src/network/di/networkModuleFactory.js.map +7 -0
  62. package/lib/cjs/src/network/di/networkTypes.js +2 -0
  63. package/lib/cjs/src/network/di/networkTypes.js.map +7 -0
  64. package/lib/cjs/src/nft/data/HttpNftDataSource.js +1 -1
  65. package/lib/cjs/src/nft/data/HttpNftDataSource.js.map +3 -3
  66. package/lib/cjs/src/nft/data/HttpNftDataSource.test.js +1 -1
  67. package/lib/cjs/src/nft/data/HttpNftDataSource.test.js.map +3 -3
  68. package/lib/cjs/src/pki/data/HttpPkiCertificateDataSource.js +1 -1
  69. package/lib/cjs/src/pki/data/HttpPkiCertificateDataSource.js.map +3 -3
  70. package/lib/cjs/src/pki/data/HttpPkiCertificateDataSource.test.js +1 -1
  71. package/lib/cjs/src/pki/data/HttpPkiCertificateDataSource.test.js.map +3 -3
  72. package/lib/cjs/src/proxy/data/HttpProxyDataSource.js +1 -1
  73. package/lib/cjs/src/proxy/data/HttpProxyDataSource.js.map +3 -3
  74. package/lib/cjs/src/proxy/data/HttpProxyDataSource.test.js +1 -1
  75. package/lib/cjs/src/proxy/data/HttpProxyDataSource.test.js.map +3 -3
  76. package/lib/cjs/src/proxy/data/HttpSafeProxyDataSource.js +1 -1
  77. package/lib/cjs/src/proxy/data/HttpSafeProxyDataSource.js.map +3 -3
  78. package/lib/cjs/src/proxy/data/HttpSafeProxyDataSource.test.js +1 -1
  79. package/lib/cjs/src/proxy/data/HttpSafeProxyDataSource.test.js.map +3 -3
  80. package/lib/cjs/src/proxy/di/proxyModuleFactory.js +1 -1
  81. package/lib/cjs/src/proxy/di/proxyModuleFactory.js.map +3 -3
  82. package/lib/cjs/src/proxy/di/proxyModuleFactory.test.js +1 -1
  83. package/lib/cjs/src/proxy/di/proxyModuleFactory.test.js.map +3 -3
  84. package/lib/cjs/src/reporter/data/BlindSigningReporterDatasource.js +2 -0
  85. package/lib/cjs/src/reporter/data/BlindSigningReporterDatasource.js.map +7 -0
  86. package/lib/cjs/src/reporter/data/HttpBlindSigningReporterDatasource.js +2 -0
  87. package/lib/cjs/src/reporter/data/HttpBlindSigningReporterDatasource.js.map +7 -0
  88. package/lib/cjs/src/reporter/data/HttpBlindSigningReporterDatasource.test.js +2 -0
  89. package/lib/cjs/src/reporter/data/HttpBlindSigningReporterDatasource.test.js.map +7 -0
  90. package/lib/cjs/src/reporter/data/dto/BlindSigningEventDto.js +2 -0
  91. package/lib/cjs/src/reporter/data/dto/BlindSigningEventDto.js.map +7 -0
  92. package/lib/cjs/src/reporter/di/reporterModuleFactory.js +2 -0
  93. package/lib/cjs/src/reporter/di/reporterModuleFactory.js.map +7 -0
  94. package/lib/cjs/src/reporter/di/reporterTypes.js +2 -0
  95. package/lib/cjs/src/reporter/di/reporterTypes.js.map +7 -0
  96. package/lib/cjs/src/reporter/domain/BlindSigningReporter.js +2 -0
  97. package/lib/cjs/src/reporter/domain/BlindSigningReporter.js.map +7 -0
  98. package/lib/cjs/src/reporter/domain/DefaultBlindSigningReporter.js +2 -0
  99. package/lib/cjs/src/reporter/domain/DefaultBlindSigningReporter.js.map +7 -0
  100. package/lib/cjs/src/reporter/domain/DefaultBlindSigningReporter.test.js +2 -0
  101. package/lib/cjs/src/reporter/domain/DefaultBlindSigningReporter.test.js.map +7 -0
  102. package/lib/cjs/src/reporter/model/BlindSigningEvent.js +2 -0
  103. package/lib/cjs/src/reporter/model/BlindSigningEvent.js.map +7 -0
  104. package/lib/cjs/src/reporter/model/BlindSigningModelId.js +2 -0
  105. package/lib/cjs/src/reporter/model/BlindSigningModelId.js.map +7 -0
  106. package/lib/cjs/src/safe/data/HttpSafeAccountDataSource.js +1 -1
  107. package/lib/cjs/src/safe/data/HttpSafeAccountDataSource.js.map +3 -3
  108. package/lib/cjs/src/safe/data/HttpSafeAccountDataSource.test.js +1 -1
  109. package/lib/cjs/src/safe/data/HttpSafeAccountDataSource.test.js.map +3 -3
  110. package/lib/cjs/src/shared/model/ClearSignContext.js +1 -1
  111. package/lib/cjs/src/shared/model/ClearSignContext.js.map +2 -2
  112. package/lib/cjs/src/solana/data/HttpSolanaOwnerInfoDataSource.js +1 -1
  113. package/lib/cjs/src/solana/data/HttpSolanaOwnerInfoDataSource.js.map +3 -3
  114. package/lib/cjs/src/solana/data/HttpSolanaOwnerInfoDataSource.test.js +1 -1
  115. package/lib/cjs/src/solana/data/HttpSolanaOwnerInfoDataSource.test.js.map +3 -3
  116. package/lib/cjs/src/solana/domain/DefaultSolanaContextLoader.test.js +1 -1
  117. package/lib/cjs/src/solana/domain/DefaultSolanaContextLoader.test.js.map +1 -1
  118. package/lib/cjs/src/solanaLifi/data/HttpSolanaLifiDataSource.js +1 -1
  119. package/lib/cjs/src/solanaLifi/data/HttpSolanaLifiDataSource.js.map +3 -3
  120. package/lib/cjs/src/solanaLifi/data/HttpSolanaLifiDataSource.test.js +1 -1
  121. package/lib/cjs/src/solanaLifi/data/HttpSolanaLifiDataSource.test.js.map +3 -3
  122. package/lib/cjs/src/solanaLifi/domain/SolanaLifiContextLoader.js.map +1 -1
  123. package/lib/cjs/src/solanaLifi/domain/SolanaLifiContextLoader.test.js.map +1 -1
  124. package/lib/cjs/src/solanaToken/data/HttpSolanaTokenDataSource.js +1 -1
  125. package/lib/cjs/src/solanaToken/data/HttpSolanaTokenDataSource.js.map +3 -3
  126. package/lib/cjs/src/solanaToken/data/HttpSolanaTokenDataSource.test.js +6 -6
  127. package/lib/cjs/src/solanaToken/data/HttpSolanaTokenDataSource.test.js.map +3 -3
  128. package/lib/cjs/src/solanaToken/domain/SolanaTokenContextLoader.js +1 -1
  129. package/lib/cjs/src/solanaToken/domain/SolanaTokenContextLoader.js.map +2 -2
  130. package/lib/cjs/src/solanaToken/domain/SolanaTokenContextLoader.test.js +1 -1
  131. package/lib/cjs/src/solanaToken/domain/SolanaTokenContextLoader.test.js.map +1 -1
  132. package/lib/cjs/src/token/data/HttpTokenDataSource.js +1 -1
  133. package/lib/cjs/src/token/data/HttpTokenDataSource.js.map +3 -3
  134. package/lib/cjs/src/token/data/HttpTokenDataSource.test.js +1 -1
  135. package/lib/cjs/src/token/data/HttpTokenDataSource.test.js.map +3 -3
  136. package/lib/cjs/src/transaction-check/data/HttpTransactionCheckDataSource.js +1 -1
  137. package/lib/cjs/src/transaction-check/data/HttpTransactionCheckDataSource.js.map +3 -3
  138. package/lib/cjs/src/transaction-check/data/HttpTransactionCheckDataSource.test.js +1 -1
  139. package/lib/cjs/src/transaction-check/data/HttpTransactionCheckDataSource.test.js.map +3 -3
  140. package/lib/cjs/src/transaction-check/data/HttpTypedDataCheckDataSource.js +1 -1
  141. package/lib/cjs/src/transaction-check/data/HttpTypedDataCheckDataSource.js.map +3 -3
  142. package/lib/cjs/src/transaction-check/data/HttpTypedDataCheckDataSource.test.js +1 -1
  143. package/lib/cjs/src/transaction-check/data/HttpTypedDataCheckDataSource.test.js.map +3 -3
  144. package/lib/cjs/src/trusted-name/data/HttpTrustedNameDataSource.js +1 -1
  145. package/lib/cjs/src/trusted-name/data/HttpTrustedNameDataSource.js.map +3 -3
  146. package/lib/cjs/src/trusted-name/data/HttpTrustedNameDataSource.test.js +1 -1
  147. package/lib/cjs/src/trusted-name/data/HttpTrustedNameDataSource.test.js.map +3 -3
  148. package/lib/cjs/src/trusted-name/di/trustedNameModuleFactory.js +1 -1
  149. package/lib/cjs/src/trusted-name/di/trustedNameModuleFactory.js.map +3 -3
  150. package/lib/cjs/src/typed-data/data/HttpTypedDataDataSource.js +1 -1
  151. package/lib/cjs/src/typed-data/data/HttpTypedDataDataSource.js.map +3 -3
  152. package/lib/cjs/src/typed-data/data/HttpTypedDataDataSource.test.js +1 -1
  153. package/lib/cjs/src/typed-data/data/HttpTypedDataDataSource.test.js.map +3 -3
  154. package/lib/esm/package.json +1 -2
  155. package/lib/esm/src/ContextModuleBuilder.js +1 -1
  156. package/lib/esm/src/ContextModuleBuilder.js.map +3 -3
  157. package/lib/esm/src/ContextModuleBuilder.test.js +1 -1
  158. package/lib/esm/src/ContextModuleBuilder.test.js.map +3 -3
  159. package/lib/esm/src/DefaultContextModule.js +1 -1
  160. package/lib/esm/src/DefaultContextModule.js.map +3 -3
  161. package/lib/esm/src/DefaultContextModule.test.js +1 -1
  162. package/lib/esm/src/DefaultContextModule.test.js.map +2 -2
  163. package/lib/esm/src/account-ownership/data/AccountOwnershipDataSource.js +1 -0
  164. package/lib/esm/src/account-ownership/data/AccountOwnershipDataSource.js.map +7 -0
  165. package/lib/esm/src/account-ownership/data/AccountOwnershipError.js +2 -0
  166. package/lib/esm/src/account-ownership/data/AccountOwnershipError.js.map +7 -0
  167. package/lib/esm/src/account-ownership/data/HttpAccountOwnershipDataSource.js +2 -0
  168. package/lib/esm/src/account-ownership/data/HttpAccountOwnershipDataSource.js.map +7 -0
  169. package/lib/esm/src/account-ownership/data/HttpAccountOwnershipDataSource.test.js +2 -0
  170. package/lib/esm/src/account-ownership/data/HttpAccountOwnershipDataSource.test.js.map +7 -0
  171. package/lib/esm/src/account-ownership/data/dto/AccountOwnershipDto.js +1 -0
  172. package/lib/esm/src/account-ownership/data/dto/AccountOwnershipDto.js.map +7 -0
  173. package/lib/esm/src/account-ownership/di/accountOwnershipModuleFactory.js +2 -0
  174. package/lib/esm/src/account-ownership/di/accountOwnershipModuleFactory.js.map +7 -0
  175. package/lib/esm/src/account-ownership/di/accountOwnershipTypes.js +2 -0
  176. package/lib/esm/src/account-ownership/di/accountOwnershipTypes.js.map +7 -0
  177. package/lib/esm/src/account-ownership/domain/AccountOwnershipContextLoader.js +2 -0
  178. package/lib/esm/src/account-ownership/domain/AccountOwnershipContextLoader.js.map +7 -0
  179. package/lib/esm/src/account-ownership/domain/AccountOwnershipContextLoader.test.js +2 -0
  180. package/lib/esm/src/account-ownership/domain/AccountOwnershipContextLoader.test.js.map +7 -0
  181. package/lib/esm/src/calldata/data/HttpCalldataDescriptorDataSource.js +1 -1
  182. package/lib/esm/src/calldata/data/HttpCalldataDescriptorDataSource.js.map +3 -3
  183. package/lib/esm/src/calldata/data/HttpCalldataDescriptorDataSource.test.js +1 -1
  184. package/lib/esm/src/calldata/data/HttpCalldataDescriptorDataSource.test.js.map +3 -3
  185. package/lib/esm/src/calldata/di/calldataModuleFactory.js +1 -1
  186. package/lib/esm/src/calldata/di/calldataModuleFactory.js.map +3 -3
  187. package/lib/esm/src/config/di/configModuleFactory.js +1 -1
  188. package/lib/esm/src/config/di/configModuleFactory.js.map +2 -2
  189. package/lib/esm/src/di.js +1 -1
  190. package/lib/esm/src/di.js.map +3 -3
  191. package/lib/esm/src/dynamic-network/data/HttpDynamicNetworkDataSource.js +1 -1
  192. package/lib/esm/src/dynamic-network/data/HttpDynamicNetworkDataSource.js.map +3 -3
  193. package/lib/esm/src/dynamic-network/data/HttpDynamicNetworkDataSource.test.js +1 -1
  194. package/lib/esm/src/dynamic-network/data/HttpDynamicNetworkDataSource.test.js.map +3 -3
  195. package/lib/esm/src/dynamic-network/domain/DynamicNetworkContextLoader.js +1 -1
  196. package/lib/esm/src/dynamic-network/domain/DynamicNetworkContextLoader.js.map +1 -1
  197. package/lib/esm/src/dynamic-network/domain/DynamicNetworkContextLoader.test.js.map +1 -1
  198. package/lib/esm/src/external-plugin/data/HttpExternalPluginDataSource.js +1 -1
  199. package/lib/esm/src/external-plugin/data/HttpExternalPluginDataSource.js.map +3 -3
  200. package/lib/esm/src/external-plugin/data/HttpExternalPluginDataSource.test.js +1 -1
  201. package/lib/esm/src/external-plugin/data/HttpExternalPluginDataSource.test.js.map +3 -3
  202. package/lib/esm/src/gated-signing/data/HttpGatedDescriptorDataSource.js +1 -1
  203. package/lib/esm/src/gated-signing/data/HttpGatedDescriptorDataSource.js.map +3 -3
  204. package/lib/esm/src/gated-signing/data/HttpGatedDescriptorDataSource.test.js +1 -1
  205. package/lib/esm/src/gated-signing/data/HttpGatedDescriptorDataSource.test.js.map +3 -3
  206. package/lib/esm/src/index.js +1 -1
  207. package/lib/esm/src/index.js.map +2 -2
  208. package/lib/esm/src/network/di/networkModuleFactory.js +2 -0
  209. package/lib/esm/src/network/di/networkModuleFactory.js.map +7 -0
  210. package/lib/esm/src/network/di/networkTypes.js +2 -0
  211. package/lib/esm/src/network/di/networkTypes.js.map +7 -0
  212. package/lib/esm/src/nft/data/HttpNftDataSource.js +1 -1
  213. package/lib/esm/src/nft/data/HttpNftDataSource.js.map +3 -3
  214. package/lib/esm/src/nft/data/HttpNftDataSource.test.js +1 -1
  215. package/lib/esm/src/nft/data/HttpNftDataSource.test.js.map +3 -3
  216. package/lib/esm/src/pki/data/HttpPkiCertificateDataSource.js +1 -1
  217. package/lib/esm/src/pki/data/HttpPkiCertificateDataSource.js.map +3 -3
  218. package/lib/esm/src/pki/data/HttpPkiCertificateDataSource.test.js +1 -1
  219. package/lib/esm/src/pki/data/HttpPkiCertificateDataSource.test.js.map +3 -3
  220. package/lib/esm/src/proxy/data/HttpProxyDataSource.js +1 -1
  221. package/lib/esm/src/proxy/data/HttpProxyDataSource.js.map +3 -3
  222. package/lib/esm/src/proxy/data/HttpProxyDataSource.test.js +1 -1
  223. package/lib/esm/src/proxy/data/HttpProxyDataSource.test.js.map +3 -3
  224. package/lib/esm/src/proxy/data/HttpSafeProxyDataSource.js +1 -1
  225. package/lib/esm/src/proxy/data/HttpSafeProxyDataSource.js.map +3 -3
  226. package/lib/esm/src/proxy/data/HttpSafeProxyDataSource.test.js +1 -1
  227. package/lib/esm/src/proxy/data/HttpSafeProxyDataSource.test.js.map +3 -3
  228. package/lib/esm/src/proxy/di/proxyModuleFactory.js +1 -1
  229. package/lib/esm/src/proxy/di/proxyModuleFactory.js.map +3 -3
  230. package/lib/esm/src/proxy/di/proxyModuleFactory.test.js +1 -1
  231. package/lib/esm/src/proxy/di/proxyModuleFactory.test.js.map +3 -3
  232. package/lib/esm/src/reporter/data/BlindSigningReporterDatasource.js +1 -0
  233. package/lib/esm/src/reporter/data/BlindSigningReporterDatasource.js.map +7 -0
  234. package/lib/esm/src/reporter/data/HttpBlindSigningReporterDatasource.js +2 -0
  235. package/lib/esm/src/reporter/data/HttpBlindSigningReporterDatasource.js.map +7 -0
  236. package/lib/esm/src/reporter/data/HttpBlindSigningReporterDatasource.test.js +2 -0
  237. package/lib/esm/src/reporter/data/HttpBlindSigningReporterDatasource.test.js.map +7 -0
  238. package/lib/esm/src/reporter/data/dto/BlindSigningEventDto.js +1 -0
  239. package/lib/esm/src/reporter/data/dto/BlindSigningEventDto.js.map +7 -0
  240. package/lib/esm/src/reporter/di/reporterModuleFactory.js +2 -0
  241. package/lib/esm/src/reporter/di/reporterModuleFactory.js.map +7 -0
  242. package/lib/esm/src/reporter/di/reporterTypes.js +2 -0
  243. package/lib/esm/src/reporter/di/reporterTypes.js.map +7 -0
  244. package/lib/esm/src/reporter/domain/BlindSigningReporter.js +1 -0
  245. package/lib/esm/src/reporter/domain/BlindSigningReporter.js.map +7 -0
  246. package/lib/esm/src/reporter/domain/DefaultBlindSigningReporter.js +2 -0
  247. package/lib/esm/src/reporter/domain/DefaultBlindSigningReporter.js.map +7 -0
  248. package/lib/esm/src/reporter/domain/DefaultBlindSigningReporter.test.js +2 -0
  249. package/lib/esm/src/reporter/domain/DefaultBlindSigningReporter.test.js.map +7 -0
  250. package/lib/esm/src/reporter/model/BlindSigningEvent.js +2 -0
  251. package/lib/esm/src/reporter/model/BlindSigningEvent.js.map +7 -0
  252. package/lib/esm/src/reporter/model/BlindSigningModelId.js +2 -0
  253. package/lib/esm/src/reporter/model/BlindSigningModelId.js.map +7 -0
  254. package/lib/esm/src/safe/data/HttpSafeAccountDataSource.js +1 -1
  255. package/lib/esm/src/safe/data/HttpSafeAccountDataSource.js.map +3 -3
  256. package/lib/esm/src/safe/data/HttpSafeAccountDataSource.test.js +1 -1
  257. package/lib/esm/src/safe/data/HttpSafeAccountDataSource.test.js.map +3 -3
  258. package/lib/esm/src/shared/model/ClearSignContext.js +1 -1
  259. package/lib/esm/src/shared/model/ClearSignContext.js.map +2 -2
  260. package/lib/esm/src/solana/data/HttpSolanaOwnerInfoDataSource.js +1 -1
  261. package/lib/esm/src/solana/data/HttpSolanaOwnerInfoDataSource.js.map +3 -3
  262. package/lib/esm/src/solana/data/HttpSolanaOwnerInfoDataSource.test.js +1 -1
  263. package/lib/esm/src/solana/data/HttpSolanaOwnerInfoDataSource.test.js.map +3 -3
  264. package/lib/esm/src/solana/domain/DefaultSolanaContextLoader.test.js +1 -1
  265. package/lib/esm/src/solana/domain/DefaultSolanaContextLoader.test.js.map +1 -1
  266. package/lib/esm/src/solanaLifi/data/HttpSolanaLifiDataSource.js +1 -1
  267. package/lib/esm/src/solanaLifi/data/HttpSolanaLifiDataSource.js.map +3 -3
  268. package/lib/esm/src/solanaLifi/data/HttpSolanaLifiDataSource.test.js +1 -1
  269. package/lib/esm/src/solanaLifi/data/HttpSolanaLifiDataSource.test.js.map +3 -3
  270. package/lib/esm/src/solanaLifi/domain/SolanaLifiContextLoader.js.map +1 -1
  271. package/lib/esm/src/solanaLifi/domain/SolanaLifiContextLoader.test.js +1 -1
  272. package/lib/esm/src/solanaLifi/domain/SolanaLifiContextLoader.test.js.map +1 -1
  273. package/lib/esm/src/solanaToken/data/HttpSolanaTokenDataSource.js +1 -1
  274. package/lib/esm/src/solanaToken/data/HttpSolanaTokenDataSource.js.map +3 -3
  275. package/lib/esm/src/solanaToken/data/HttpSolanaTokenDataSource.test.js +6 -6
  276. package/lib/esm/src/solanaToken/data/HttpSolanaTokenDataSource.test.js.map +3 -3
  277. package/lib/esm/src/solanaToken/domain/SolanaTokenContextLoader.js +1 -1
  278. package/lib/esm/src/solanaToken/domain/SolanaTokenContextLoader.js.map +2 -2
  279. package/lib/esm/src/solanaToken/domain/SolanaTokenContextLoader.test.js +1 -1
  280. package/lib/esm/src/solanaToken/domain/SolanaTokenContextLoader.test.js.map +1 -1
  281. package/lib/esm/src/token/data/HttpTokenDataSource.js +1 -1
  282. package/lib/esm/src/token/data/HttpTokenDataSource.js.map +3 -3
  283. package/lib/esm/src/token/data/HttpTokenDataSource.test.js +1 -1
  284. package/lib/esm/src/token/data/HttpTokenDataSource.test.js.map +3 -3
  285. package/lib/esm/src/transaction-check/data/HttpTransactionCheckDataSource.js +1 -1
  286. package/lib/esm/src/transaction-check/data/HttpTransactionCheckDataSource.js.map +3 -3
  287. package/lib/esm/src/transaction-check/data/HttpTransactionCheckDataSource.test.js +1 -1
  288. package/lib/esm/src/transaction-check/data/HttpTransactionCheckDataSource.test.js.map +3 -3
  289. package/lib/esm/src/transaction-check/data/HttpTypedDataCheckDataSource.js +1 -1
  290. package/lib/esm/src/transaction-check/data/HttpTypedDataCheckDataSource.js.map +3 -3
  291. package/lib/esm/src/transaction-check/data/HttpTypedDataCheckDataSource.test.js +1 -1
  292. package/lib/esm/src/transaction-check/data/HttpTypedDataCheckDataSource.test.js.map +3 -3
  293. package/lib/esm/src/trusted-name/data/HttpTrustedNameDataSource.js +1 -1
  294. package/lib/esm/src/trusted-name/data/HttpTrustedNameDataSource.js.map +3 -3
  295. package/lib/esm/src/trusted-name/data/HttpTrustedNameDataSource.test.js +1 -1
  296. package/lib/esm/src/trusted-name/data/HttpTrustedNameDataSource.test.js.map +3 -3
  297. package/lib/esm/src/trusted-name/di/trustedNameModuleFactory.js +1 -1
  298. package/lib/esm/src/trusted-name/di/trustedNameModuleFactory.js.map +3 -3
  299. package/lib/esm/src/typed-data/data/HttpTypedDataDataSource.js +1 -1
  300. package/lib/esm/src/typed-data/data/HttpTypedDataDataSource.js.map +3 -3
  301. package/lib/esm/src/typed-data/data/HttpTypedDataDataSource.test.js +1 -1
  302. package/lib/esm/src/typed-data/data/HttpTypedDataDataSource.test.js.map +3 -3
  303. package/lib/types/src/ContextModule.d.ts +2 -0
  304. package/lib/types/src/ContextModule.d.ts.map +1 -1
  305. package/lib/types/src/ContextModuleBuilder.d.ts +30 -3
  306. package/lib/types/src/ContextModuleBuilder.d.ts.map +1 -1
  307. package/lib/types/src/DefaultContextModule.d.ts +6 -2
  308. package/lib/types/src/DefaultContextModule.d.ts.map +1 -1
  309. package/lib/types/src/account-ownership/data/AccountOwnershipDataSource.d.ts +17 -0
  310. package/lib/types/src/account-ownership/data/AccountOwnershipDataSource.d.ts.map +1 -0
  311. package/lib/types/src/account-ownership/data/AccountOwnershipError.d.ts +17 -0
  312. package/lib/types/src/account-ownership/data/AccountOwnershipError.d.ts.map +1 -0
  313. package/lib/types/src/account-ownership/data/HttpAccountOwnershipDataSource.d.ts +30 -0
  314. package/lib/types/src/account-ownership/data/HttpAccountOwnershipDataSource.d.ts.map +1 -0
  315. package/lib/types/src/account-ownership/data/HttpAccountOwnershipDataSource.test.d.ts +2 -0
  316. package/lib/types/src/account-ownership/data/HttpAccountOwnershipDataSource.test.d.ts.map +1 -0
  317. package/lib/types/src/account-ownership/data/dto/AccountOwnershipDto.d.ts +6 -0
  318. package/lib/types/src/account-ownership/data/dto/AccountOwnershipDto.d.ts.map +1 -0
  319. package/lib/types/src/account-ownership/di/accountOwnershipModuleFactory.d.ts +3 -0
  320. package/lib/types/src/account-ownership/di/accountOwnershipModuleFactory.d.ts.map +1 -0
  321. package/lib/types/src/account-ownership/di/accountOwnershipTypes.d.ts +5 -0
  322. package/lib/types/src/account-ownership/di/accountOwnershipTypes.d.ts.map +1 -0
  323. package/lib/types/src/account-ownership/domain/AccountOwnershipContextLoader.d.ts +20 -0
  324. package/lib/types/src/account-ownership/domain/AccountOwnershipContextLoader.d.ts.map +1 -0
  325. package/lib/types/src/account-ownership/domain/AccountOwnershipContextLoader.test.d.ts +2 -0
  326. package/lib/types/src/account-ownership/domain/AccountOwnershipContextLoader.test.d.ts.map +1 -0
  327. package/lib/types/src/calldata/data/HttpCalldataDescriptorDataSource.d.ts +4 -2
  328. package/lib/types/src/calldata/data/HttpCalldataDescriptorDataSource.d.ts.map +1 -1
  329. package/lib/types/src/calldata/di/calldataModuleFactory.d.ts.map +1 -1
  330. package/lib/types/src/config/di/configModuleFactory.d.ts +2 -2
  331. package/lib/types/src/config/di/configModuleFactory.d.ts.map +1 -1
  332. package/lib/types/src/config/model/ContextModuleConfig.d.ts +14 -3
  333. package/lib/types/src/config/model/ContextModuleConfig.d.ts.map +1 -1
  334. package/lib/types/src/di.d.ts +2 -2
  335. package/lib/types/src/di.d.ts.map +1 -1
  336. package/lib/types/src/dynamic-network/data/HttpDynamicNetworkDataSource.d.ts +4 -2
  337. package/lib/types/src/dynamic-network/data/HttpDynamicNetworkDataSource.d.ts.map +1 -1
  338. package/lib/types/src/dynamic-network/domain/DynamicNetworkContextLoader.d.ts +2 -2
  339. package/lib/types/src/dynamic-network/domain/DynamicNetworkContextLoader.d.ts.map +1 -1
  340. package/lib/types/src/external-plugin/data/HttpExternalPluginDataSource.d.ts +4 -2
  341. package/lib/types/src/external-plugin/data/HttpExternalPluginDataSource.d.ts.map +1 -1
  342. package/lib/types/src/gated-signing/data/HttpGatedDescriptorDataSource.d.ts +4 -2
  343. package/lib/types/src/gated-signing/data/HttpGatedDescriptorDataSource.d.ts.map +1 -1
  344. package/lib/types/src/index.d.ts +11 -1
  345. package/lib/types/src/index.d.ts.map +1 -1
  346. package/lib/types/src/network/di/networkModuleFactory.d.ts +4 -0
  347. package/lib/types/src/network/di/networkModuleFactory.d.ts.map +1 -0
  348. package/lib/types/src/network/di/networkTypes.d.ts +4 -0
  349. package/lib/types/src/network/di/networkTypes.d.ts.map +1 -0
  350. package/lib/types/src/nft/data/HttpNftDataSource.d.ts +4 -2
  351. package/lib/types/src/nft/data/HttpNftDataSource.d.ts.map +1 -1
  352. package/lib/types/src/pki/data/HttpPkiCertificateDataSource.d.ts +5 -2
  353. package/lib/types/src/pki/data/HttpPkiCertificateDataSource.d.ts.map +1 -1
  354. package/lib/types/src/proxy/data/HttpProxyDataSource.d.ts +4 -2
  355. package/lib/types/src/proxy/data/HttpProxyDataSource.d.ts.map +1 -1
  356. package/lib/types/src/proxy/data/HttpSafeProxyDataSource.d.ts +4 -2
  357. package/lib/types/src/proxy/data/HttpSafeProxyDataSource.d.ts.map +1 -1
  358. package/lib/types/src/proxy/di/proxyModuleFactory.d.ts +2 -2
  359. package/lib/types/src/proxy/di/proxyModuleFactory.d.ts.map +1 -1
  360. package/lib/types/src/reporter/data/BlindSigningReporterDatasource.d.ts +29 -0
  361. package/lib/types/src/reporter/data/BlindSigningReporterDatasource.d.ts.map +1 -0
  362. package/lib/types/src/reporter/data/HttpBlindSigningReporterDatasource.d.ts +11 -0
  363. package/lib/types/src/reporter/data/HttpBlindSigningReporterDatasource.d.ts.map +1 -0
  364. package/lib/types/src/reporter/data/HttpBlindSigningReporterDatasource.test.d.ts +2 -0
  365. package/lib/types/src/reporter/data/HttpBlindSigningReporterDatasource.test.d.ts.map +1 -0
  366. package/lib/types/src/reporter/data/dto/BlindSigningEventDto.d.ts +26 -0
  367. package/lib/types/src/reporter/data/dto/BlindSigningEventDto.d.ts.map +1 -0
  368. package/lib/types/src/reporter/di/reporterModuleFactory.d.ts +3 -0
  369. package/lib/types/src/reporter/di/reporterModuleFactory.d.ts.map +1 -0
  370. package/lib/types/src/reporter/di/reporterTypes.d.ts +5 -0
  371. package/lib/types/src/reporter/di/reporterTypes.d.ts.map +1 -0
  372. package/lib/types/src/reporter/domain/BlindSigningReporter.d.ts +6 -0
  373. package/lib/types/src/reporter/domain/BlindSigningReporter.d.ts.map +1 -0
  374. package/lib/types/src/reporter/domain/DefaultBlindSigningReporter.d.ts +9 -0
  375. package/lib/types/src/reporter/domain/DefaultBlindSigningReporter.d.ts.map +1 -0
  376. package/lib/types/src/reporter/domain/DefaultBlindSigningReporter.test.d.ts +2 -0
  377. package/lib/types/src/reporter/domain/DefaultBlindSigningReporter.test.d.ts.map +1 -0
  378. package/lib/types/src/reporter/model/BlindSigningEvent.d.ts +21 -0
  379. package/lib/types/src/reporter/model/BlindSigningEvent.d.ts.map +1 -0
  380. package/lib/types/src/reporter/model/BlindSigningModelId.d.ts +12 -0
  381. package/lib/types/src/reporter/model/BlindSigningModelId.d.ts.map +1 -0
  382. package/lib/types/src/safe/data/HttpSafeAccountDataSource.d.ts +4 -2
  383. package/lib/types/src/safe/data/HttpSafeAccountDataSource.d.ts.map +1 -1
  384. package/lib/types/src/shared/model/ClearSignContext.d.ts +2 -1
  385. package/lib/types/src/shared/model/ClearSignContext.d.ts.map +1 -1
  386. package/lib/types/src/solana/data/HttpSolanaOwnerInfoDataSource.d.ts +4 -2
  387. package/lib/types/src/solana/data/HttpSolanaOwnerInfoDataSource.d.ts.map +1 -1
  388. package/lib/types/src/solanaLifi/data/HttpSolanaLifiDataSource.d.ts +4 -3
  389. package/lib/types/src/solanaLifi/data/HttpSolanaLifiDataSource.d.ts.map +1 -1
  390. package/lib/types/src/solanaLifi/domain/SolanaLifiContextLoader.d.ts +2 -2
  391. package/lib/types/src/solanaLifi/domain/SolanaLifiContextLoader.d.ts.map +1 -1
  392. package/lib/types/src/solanaToken/data/HttpSolanaTokenDataSource.d.ts +4 -2
  393. package/lib/types/src/solanaToken/data/HttpSolanaTokenDataSource.d.ts.map +1 -1
  394. package/lib/types/src/solanaToken/domain/SolanaTokenContextLoader.d.ts +2 -2
  395. package/lib/types/src/solanaToken/domain/SolanaTokenContextLoader.d.ts.map +1 -1
  396. package/lib/types/src/token/data/HttpTokenDataSource.d.ts +4 -2
  397. package/lib/types/src/token/data/HttpTokenDataSource.d.ts.map +1 -1
  398. package/lib/types/src/transaction-check/data/HttpTransactionCheckDataSource.d.ts +4 -2
  399. package/lib/types/src/transaction-check/data/HttpTransactionCheckDataSource.d.ts.map +1 -1
  400. package/lib/types/src/transaction-check/data/HttpTypedDataCheckDataSource.d.ts +4 -2
  401. package/lib/types/src/transaction-check/data/HttpTypedDataCheckDataSource.d.ts.map +1 -1
  402. package/lib/types/src/trusted-name/data/HttpTrustedNameDataSource.d.ts +4 -2
  403. package/lib/types/src/trusted-name/data/HttpTrustedNameDataSource.d.ts.map +1 -1
  404. package/lib/types/src/trusted-name/di/trustedNameModuleFactory.d.ts +2 -2
  405. package/lib/types/src/trusted-name/di/trustedNameModuleFactory.d.ts.map +1 -1
  406. package/lib/types/src/typed-data/data/HttpTypedDataDataSource.d.ts +4 -2
  407. package/lib/types/src/typed-data/data/HttpTypedDataDataSource.d.ts.map +1 -1
  408. package/lib/types/src/typed-data/data/HttpTypedDataDataSource.test.d.ts.map +1 -1
  409. package/lib/types/tsconfig.prod.tsbuildinfo +1 -1
  410. package/package.json +6 -7
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/solanaToken/data/HttpSolanaTokenDataSource.test.ts"],
4
- "sourcesContent": ["/* eslint-disable @typescript-eslint/no-explicit-any */\n/* eslint-disable @typescript-eslint/no-unsafe-assignment */\nimport axios from \"axios\";\nimport { Left, Right } from \"purify-ts\";\nimport { beforeAll, beforeEach, describe, expect, it, vi } from \"vitest\";\n\nimport { type ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport { LEDGER_CLIENT_VERSION_HEADER } from \"@/shared/constant/HttpHeaders\";\nimport PACKAGE from \"@root/package.json\";\n\nimport { HttpSolanaTokenDataSource } from \"./HttpSolanaTokenDataSource\";\nimport {\n type SolanaTokenDataSource,\n type TokenDataResponse,\n} from \"./SolanaTokenDataSource\";\n\nvi.mock(\"axios\");\n\ndescribe(\"HttpSolanaTokenDataSource\", () => {\n let datasource: SolanaTokenDataSource;\n const tokenInternalId = \"sol:usdc\";\n const config: ContextModuleConfig = {\n cal: {\n url: \"https://crypto-assets-service.api.ledger.com/v1\",\n mode: \"prod\",\n branch: \"main\",\n },\n } as ContextModuleConfig;\n\n const errorMessage = (id: string) =>\n `[ContextModule] HttpSolanaTokenDataSource: no token metadata for id ${id}`;\n\n beforeAll(() => {\n datasource = new HttpSolanaTokenDataSource(config);\n });\n\n beforeEach(() => {\n vi.clearAllMocks();\n });\n\n it(\"should call axios with the ledger client version header and correct params\", async () => {\n // given\n const requestSpy = vi.fn(() => Promise.resolve({ data: [] }));\n vi.spyOn(axios, \"request\").mockImplementation(requestSpy);\n\n // when\n await datasource.getTokenInfosPayload({ tokenInternalId });\n\n // then\n expect(requestSpy).toHaveBeenCalledTimes(1);\n expect(requestSpy).toHaveBeenCalledWith(\n expect.objectContaining({\n method: \"GET\",\n url: `${config.cal.url}/tokens`,\n params: expect.objectContaining({\n id: tokenInternalId,\n ref: `branch:${config.cal.branch}`,\n }),\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: `context-module/${PACKAGE.version}`,\n },\n }),\n );\n });\n\n it(\"should return Right(data[0]) when axios responds with a non-empty array\", async () => {\n // given\n const response0: TokenDataResponse = {\n descriptor: {\n data: \"ABCD\",\n signatures: {\n prod: \"SIG-PROD\",\n test: \"SIG-TEST\",\n } as any,\n },\n } as any;\n\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: [response0] });\n\n // when\n const result = await datasource.getTokenInfosPayload({ tokenInternalId });\n\n // then\n expect(result).toEqual(Right(response0));\n });\n\n describe.each`\n caseName | apiResponse\n ${\"data is undefined\"} | ${{ data: undefined }}\n ${\"data array is empty\"} | ${{ data: [] }}\n ${\"first element is falsy\"} | ${{ data: [undefined] }}\n `(\"Error cases\", ({ caseName, apiResponse }) => {\n it(`should return an error when ${caseName}`, async () => {\n // given\n vi.spyOn(axios, \"request\").mockResolvedValue(apiResponse);\n\n // when\n const result = await datasource.getTokenInfosPayload({ tokenInternalId });\n\n // then\n expect(result).toEqual(Left(new Error(errorMessage(tokenInternalId))));\n });\n });\n\n it(\"should return an error when axios throws\", async () => {\n // given\n vi.spyOn(axios, \"request\").mockRejectedValue(new Error(\"network\"));\n\n // when\n const result = await datasource.getTokenInfosPayload({ tokenInternalId });\n\n // then\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSolanaTokenDataSource: Failed to fetch token informations\",\n ),\n ),\n );\n });\n});\n"],
5
- "mappings": "AAEA,OAAOA,MAAW,QAClB,OAAS,QAAAC,EAAM,SAAAC,MAAa,YAC5B,OAAS,aAAAC,EAAW,cAAAC,EAAY,YAAAC,EAAU,UAAAC,EAAQ,MAAAC,EAAI,MAAAC,MAAU,SAGhE,OAAS,gCAAAC,MAAoC,gCAC7C,OAAOC,MAAa,qBAEpB,OAAS,6BAAAC,MAAiC,8BAM1CH,EAAG,KAAK,OAAO,EAEfH,EAAS,4BAA6B,IAAM,CAC1C,IAAIO,EACJ,MAAMC,EAAkB,WAClBC,EAA8B,CAClC,IAAK,CACH,IAAK,kDACL,KAAM,OACN,OAAQ,MACV,CACF,EAEMC,EAAgBC,GACpB,uEAAuEA,CAAE,GAE3Eb,EAAU,IAAM,CACdS,EAAa,IAAID,EAA0BG,CAAM,CACnD,CAAC,EAEDV,EAAW,IAAM,CACfI,EAAG,cAAc,CACnB,CAAC,EAEDD,EAAG,6EAA8E,SAAY,CAE3F,MAAMU,EAAaT,EAAG,GAAG,IAAM,QAAQ,QAAQ,CAAE,KAAM,CAAC,CAAE,CAAC,CAAC,EAC5DA,EAAG,MAAMR,EAAO,SAAS,EAAE,mBAAmBiB,CAAU,EAGxD,MAAML,EAAW,qBAAqB,CAAE,gBAAAC,CAAgB,CAAC,EAGzDP,EAAOW,CAAU,EAAE,sBAAsB,CAAC,EAC1CX,EAAOW,CAAU,EAAE,qBACjBX,EAAO,iBAAiB,CACtB,OAAQ,MACR,IAAK,GAAGQ,EAAO,IAAI,GAAG,UACtB,OAAQR,EAAO,iBAAiB,CAC9B,GAAIO,EACJ,IAAK,UAAUC,EAAO,IAAI,MAAM,EAClC,CAAC,EACD,QAAS,CACP,CAACL,CAA4B,EAAG,kBAAkBC,EAAQ,OAAO,EACnE,CACF,CAAC,CACH,CACF,CAAC,EAEDH,EAAG,0EAA2E,SAAY,CAExF,MAAMW,EAA+B,CACnC,WAAY,CACV,KAAM,OACN,WAAY,CACV,KAAM,WACN,KAAM,UACR,CACF,CACF,EAEAV,EAAG,MAAMR,EAAO,SAAS,EAAE,kBAAkB,CAAE,KAAM,CAACkB,CAAS,CAAE,CAAC,EAGlE,MAAMC,EAAS,MAAMP,EAAW,qBAAqB,CAAE,gBAAAC,CAAgB,CAAC,EAGxEP,EAAOa,CAAM,EAAE,QAAQjB,EAAMgB,CAAS,CAAC,CACzC,CAAC,EAEDb,EAAS;AAAA;AAAA,MAEL,mBAAmB,WAAW,CAAE,KAAM,MAAU,CAAC;AAAA,MACjD,qBAAqB,SAAS,CAAE,KAAM,CAAC,CAAE,CAAC;AAAA,MAC1C,wBAAwB,MAAM,CAAE,KAAM,CAAC,MAAS,CAAE,CAAC;AAAA,IACrD,cAAe,CAAC,CAAE,SAAAe,EAAU,YAAAC,CAAY,IAAM,CAC9Cd,EAAG,+BAA+Ba,CAAQ,GAAI,SAAY,CAExDZ,EAAG,MAAMR,EAAO,SAAS,EAAE,kBAAkBqB,CAAW,EAGxD,MAAMF,EAAS,MAAMP,EAAW,qBAAqB,CAAE,gBAAAC,CAAgB,CAAC,EAGxEP,EAAOa,CAAM,EAAE,QAAQlB,EAAK,IAAI,MAAMc,EAAaF,CAAe,CAAC,CAAC,CAAC,CACvE,CAAC,CACH,CAAC,EAEDN,EAAG,2CAA4C,SAAY,CAEzDC,EAAG,MAAMR,EAAO,SAAS,EAAE,kBAAkB,IAAI,MAAM,SAAS,CAAC,EAGjE,MAAMmB,EAAS,MAAMP,EAAW,qBAAqB,CAAE,gBAAAC,CAAgB,CAAC,EAGxEP,EAAOa,CAAM,EAAE,QACblB,EACE,IAAI,MACF,+EACF,CACF,CACF,CACF,CAAC,CACH,CAAC",
6
- "names": ["axios", "Left", "Right", "beforeAll", "beforeEach", "describe", "expect", "it", "vi", "LEDGER_CLIENT_VERSION_HEADER", "PACKAGE", "HttpSolanaTokenDataSource", "datasource", "tokenInternalId", "config", "errorMessage", "id", "requestSpy", "response0", "result", "caseName", "apiResponse"]
4
+ "sourcesContent": ["/* eslint-disable @typescript-eslint/no-explicit-any */\n/* eslint-disable @typescript-eslint/no-unsafe-assignment */\nimport { type DmkNetworkClient } from \"@ledgerhq/device-management-kit\";\nimport { Left, Right } from \"purify-ts\";\nimport { beforeEach, describe, expect, it, vi } from \"vitest\";\n\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\n\nimport { HttpSolanaTokenDataSource } from \"./HttpSolanaTokenDataSource\";\nimport {\n type SolanaTokenDataSource,\n type TokenDataResponse,\n} from \"./SolanaTokenDataSource\";\n\ndescribe(\"HttpSolanaTokenDataSource\", () => {\n let datasource: SolanaTokenDataSource;\n let httpMock: { get: ReturnType<typeof vi.fn> };\n const tokenInternalId = \"sol:usdc\";\n const config: ContextModuleServiceConfig = {\n cal: {\n url: \"https://crypto-assets-service.api.ledger.com/v1\",\n mode: \"prod\",\n branch: \"main\",\n },\n } as ContextModuleServiceConfig;\n\n const errorMessage = (id: string) =>\n `[ContextModule] HttpSolanaTokenDataSource: no token metadata for id ${id}`;\n\n beforeEach(() => {\n vi.clearAllMocks();\n httpMock = { get: vi.fn() };\n datasource = new HttpSolanaTokenDataSource(\n config,\n httpMock as unknown as DmkNetworkClient,\n );\n });\n\n it(\"should call http.get with the correct url and params\", async () => {\n // given\n httpMock.get.mockResolvedValue([]);\n\n // when\n await datasource.getTokenInfosPayload({ tokenInternalId });\n\n // then\n expect(httpMock.get).toHaveBeenCalledTimes(1);\n expect(httpMock.get).toHaveBeenCalledWith(`${config.cal.url}/tokens`, {\n params: {\n id: tokenInternalId,\n output:\n \"id,name,network,network_family,network_type,exchange_app_config_serialized,live_signature,ticker,decimals,blockchain_name,chain_id,contract_address,descriptor,descriptor_exchange_app,units,symbol\",\n ref: `branch:${config.cal.branch}`,\n },\n });\n });\n\n it(\"should return Right(data[0]) when http.get responds with a non-empty array\", async () => {\n // given\n const response0: TokenDataResponse = {\n descriptor: {\n data: \"ABCD\",\n signatures: {\n prod: \"SIG-PROD\",\n test: \"SIG-TEST\",\n } as any,\n },\n } as any;\n\n httpMock.get.mockResolvedValue([response0]);\n\n // when\n const result = await datasource.getTokenInfosPayload({ tokenInternalId });\n\n // then\n expect(result).toEqual(Right(response0));\n });\n\n describe.each`\n caseName | responseBody\n ${\"data is undefined\"} | ${null}\n ${\"data array is empty\"} | ${[]}\n ${\"first element is falsy\"} | ${[null]}\n `(\"Error cases\", ({ caseName, responseBody }) => {\n it(`should return an error when ${caseName}`, async () => {\n // given\n httpMock.get.mockResolvedValue(responseBody);\n\n // when\n const result = await datasource.getTokenInfosPayload({ tokenInternalId });\n\n // then\n expect(result).toEqual(Left(new Error(errorMessage(tokenInternalId))));\n });\n });\n\n it(\"should return an error when http.get throws\", async () => {\n // given\n httpMock.get.mockRejectedValue(new Error(\"network\"));\n\n // when\n const result = await datasource.getTokenInfosPayload({ tokenInternalId });\n\n // then\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpSolanaTokenDataSource: Failed to fetch token informations\",\n ),\n ),\n );\n });\n});\n"],
5
+ "mappings": "AAGA,OAAS,QAAAA,EAAM,SAAAC,MAAa,YAC5B,OAAS,cAAAC,EAAY,YAAAC,EAAU,UAAAC,EAAQ,MAAAC,EAAI,MAAAC,MAAU,SAIrD,OAAS,6BAAAC,MAAiC,8BAM1CJ,EAAS,4BAA6B,IAAM,CAC1C,IAAIK,EACAC,EACJ,MAAMC,EAAkB,WAClBC,EAAqC,CACzC,IAAK,CACH,IAAK,kDACL,KAAM,OACN,OAAQ,MACV,CACF,EAEMC,EAAgBC,GACpB,uEAAuEA,CAAE,GAE3EX,EAAW,IAAM,CACfI,EAAG,cAAc,EACjBG,EAAW,CAAE,IAAKH,EAAG,GAAG,CAAE,EAC1BE,EAAa,IAAID,EACfI,EACAF,CACF,CACF,CAAC,EAEDJ,EAAG,uDAAwD,SAAY,CAErEI,EAAS,IAAI,kBAAkB,CAAC,CAAC,EAGjC,MAAMD,EAAW,qBAAqB,CAAE,gBAAAE,CAAgB,CAAC,EAGzDN,EAAOK,EAAS,GAAG,EAAE,sBAAsB,CAAC,EAC5CL,EAAOK,EAAS,GAAG,EAAE,qBAAqB,GAAGE,EAAO,IAAI,GAAG,UAAW,CACpE,OAAQ,CACN,GAAID,EACJ,OACE,sMACF,IAAK,UAAUC,EAAO,IAAI,MAAM,EAClC,CACF,CAAC,CACH,CAAC,EAEDN,EAAG,6EAA8E,SAAY,CAE3F,MAAMS,EAA+B,CACnC,WAAY,CACV,KAAM,OACN,WAAY,CACV,KAAM,WACN,KAAM,UACR,CACF,CACF,EAEAL,EAAS,IAAI,kBAAkB,CAACK,CAAS,CAAC,EAG1C,MAAMC,EAAS,MAAMP,EAAW,qBAAqB,CAAE,gBAAAE,CAAgB,CAAC,EAGxEN,EAAOW,CAAM,EAAE,QAAQd,EAAMa,CAAS,CAAC,CACzC,CAAC,EAEDX,EAAS;AAAA;AAAA,MAEL,mBAAmB,WAAW,IAAI;AAAA,MAClC,qBAAqB,SAAS,CAAC,CAAC;AAAA,MAChC,wBAAwB,MAAM,CAAC,IAAI,CAAC;AAAA,IACtC,cAAe,CAAC,CAAE,SAAAa,EAAU,aAAAC,CAAa,IAAM,CAC/CZ,EAAG,+BAA+BW,CAAQ,GAAI,SAAY,CAExDP,EAAS,IAAI,kBAAkBQ,CAAY,EAG3C,MAAMF,EAAS,MAAMP,EAAW,qBAAqB,CAAE,gBAAAE,CAAgB,CAAC,EAGxEN,EAAOW,CAAM,EAAE,QAAQf,EAAK,IAAI,MAAMY,EAAaF,CAAe,CAAC,CAAC,CAAC,CACvE,CAAC,CACH,CAAC,EAEDL,EAAG,8CAA+C,SAAY,CAE5DI,EAAS,IAAI,kBAAkB,IAAI,MAAM,SAAS,CAAC,EAGnD,MAAMM,EAAS,MAAMP,EAAW,qBAAqB,CAAE,gBAAAE,CAAgB,CAAC,EAGxEN,EAAOW,CAAM,EAAE,QACbf,EACE,IAAI,MACF,+EACF,CACF,CACF,CACF,CAAC,CACH,CAAC",
6
+ "names": ["Left", "Right", "beforeEach", "describe", "expect", "it", "vi", "HttpSolanaTokenDataSource", "datasource", "httpMock", "tokenInternalId", "config", "errorMessage", "id", "response0", "result", "caseName", "responseBody"]
7
7
  }
@@ -1,2 +1,2 @@
1
- var u=Object.defineProperty;var k=Object.getOwnPropertyDescriptor;var p=(i,e,t,o)=>{for(var a=o>1?void 0:o?k(e,t):e,r=i.length-1,n;r>=0;r--)(n=i[r])&&(a=(o?n(e,t,a):n(a))||a);return o&&a&&u(e,t,a),a},l=(i,e)=>(t,o)=>e(t,o,i);import{inject as s,injectable as f}from"inversify";import{configTypes as g}from"../../config/di/configTypes";import{pkiTypes as m}from"../../pki/di/pkiTypes";import{KeyUsage as y}from"../../pki/model/KeyUsage";import{SolanaContextTypes as c}from"../../shared/model/SolanaContextTypes";import{solanaTokenTypes as T}from"../../solanaToken/di/solanaTokenTypes";let d=class{constructor(e,t,o,a){this.dataSource=e;this.config=t;this._certificateLoader=o;this.logger=a("SolanaTokenContextLoader")}logger;canHandle(e,t){if(t!==c.SOLANA_TOKEN||typeof e!="object"||e===null||!("tokenInternalId"in e))return!1;const o=e.tokenInternalId;return typeof o=="string"&&o.length>0}async loadField(e){this.logger.debug("[loadField] Loading solana token context",{data:{input:e}});const{tokenInternalId:t,deviceModelId:o}=e;if(!t)return{type:c.ERROR,error:new Error("[ContextModule] SolanaTokenContextLoader: tokenInternalId is missing")};const a=await this.dataSource.getTokenInfosPayload({tokenInternalId:t}),r=await this._certificateLoader.loadCertificate({keyId:"token_metadata_key",keyUsage:y.CoinMeta,targetDevice:o});return a.caseOf({Left:n=>(this.logger.error("[loadField] Error loading solana token context",{data:{error:n}}),{type:c.ERROR,error:n}),Right:n=>(this.logger.debug("[loadField] Successfully loaded solana token context",{data:{payload:this.pluckTokenData(n),certificate:r}}),{type:c.SOLANA_TOKEN,payload:this.pluckTokenData(n),certificate:r})})}pluckTokenData(e){const t=this.config.cal.mode||"prod";return{solanaTokenDescriptor:{data:e.descriptor.data,signature:e.descriptor.signatures[t]}}}};d=p([f(),l(0,s(T.SolanaTokenDataSource)),l(1,s(g.Config)),l(2,s(m.PkiCertificateLoader)),l(3,s(g.ContextModuleLoggerFactory))],d);export{d as SolanaTokenContextLoader};
1
+ var u=Object.defineProperty;var k=Object.getOwnPropertyDescriptor;var p=(i,e,t,o)=>{for(var a=o>1?void 0:o?k(e,t):e,r=i.length-1,n;r>=0;r--)(n=i[r])&&(a=(o?n(e,t,a):n(a))||a);return o&&a&&u(e,t,a),a},l=(i,e)=>(t,o)=>e(t,o,i);import{inject as s,injectable as f}from"inversify";import{configTypes as g}from"../../config/di/configTypes";import{pkiTypes as m}from"../../pki/di/pkiTypes";import{KeyUsage as y}from"../../pki/model/KeyUsage";import{SolanaContextTypes as c}from"../../shared/model/SolanaContextTypes";import{solanaTokenTypes as S}from"../../solanaToken/di/solanaTokenTypes";let d=class{constructor(e,t,o,a){this.dataSource=e;this.config=t;this._certificateLoader=o;this.logger=a("SolanaTokenContextLoader")}logger;canHandle(e,t){if(t!==c.SOLANA_TOKEN||typeof e!="object"||e===null||!("tokenInternalId"in e))return!1;const o=e.tokenInternalId;return typeof o=="string"&&o.length>0}async loadField(e){this.logger.debug("[loadField] Loading solana token context",{data:{input:e}});const{tokenInternalId:t,deviceModelId:o}=e;if(!t)return{type:c.ERROR,error:new Error("[ContextModule] SolanaTokenContextLoader: tokenInternalId is missing")};const a=await this.dataSource.getTokenInfosPayload({tokenInternalId:t}),r=await this._certificateLoader.loadCertificate({keyId:"token_metadata_key",keyUsage:y.CoinMeta,targetDevice:o});return a.caseOf({Left:n=>(this.logger.error("[loadField] Error loading solana token context",{data:{error:n}}),{type:c.ERROR,error:n}),Right:n=>(this.logger.debug("[loadField] Successfully loaded solana token context",{data:{payload:this.pluckTokenData(n),certificate:r}}),{type:c.SOLANA_TOKEN,payload:this.pluckTokenData(n),certificate:r})})}pluckTokenData(e){const t=this.config.cal.mode||"prod";return{solanaTokenDescriptor:{data:e.descriptor.data,signature:e.descriptor.signatures[t]}}}};d=p([f(),l(0,s(S.SolanaTokenDataSource)),l(1,s(g.Config)),l(2,s(m.PkiCertificateLoader)),l(3,s(g.ContextModuleLoggerFactory))],d);export{d as SolanaTokenContextLoader};
2
2
  //# sourceMappingURL=SolanaTokenContextLoader.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/solanaToken/domain/SolanaTokenContextLoader.ts"],
4
- "sourcesContent": ["import { LoggerPublisherService } from \"@ledgerhq/device-management-kit\";\nimport { inject, injectable } from \"inversify\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport { type ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport { pkiTypes } from \"@/pki/di/pkiTypes\";\nimport { type PkiCertificateLoader } from \"@/pki/domain/PkiCertificateLoader\";\nimport { KeyUsage } from \"@/pki/model/KeyUsage\";\nimport { PkiCertificate } from \"@/pki/model/PkiCertificate\";\nimport { ContextFieldLoader } from \"@/shared/domain/ContextFieldLoader\";\nimport {\n SolanaContextTypes,\n SolanaTokenContextResult,\n SolanaTokenData,\n} from \"@/shared/model/SolanaContextTypes\";\nimport { SolanaTransactionContext } from \"@/solana/domain/solanaContextTypes\";\nimport {\n type SolanaTokenDataSource,\n type TokenDataResponse,\n} from \"@/solanaToken/data/SolanaTokenDataSource\";\nimport { solanaTokenTypes } from \"@/solanaToken/di/solanaTokenTypes\";\n\n@injectable()\nexport class SolanaTokenContextLoader\n implements\n ContextFieldLoader<\n SolanaTransactionContext,\n SolanaContextTypes,\n SolanaTokenContextResult\n >\n{\n private logger: LoggerPublisherService;\n\n constructor(\n @inject(solanaTokenTypes.SolanaTokenDataSource)\n private readonly dataSource: SolanaTokenDataSource,\n @inject(configTypes.Config) private readonly config: ContextModuleConfig,\n @inject(pkiTypes.PkiCertificateLoader)\n private readonly _certificateLoader: PkiCertificateLoader,\n @inject(configTypes.ContextModuleLoggerFactory)\n loggerFactory: (tag: string) => LoggerPublisherService,\n ) {\n this.logger = loggerFactory(\"SolanaTokenContextLoader\");\n }\n\n public canHandle(\n field: unknown,\n expectedType: SolanaContextTypes,\n ): field is SolanaTransactionContext {\n if (expectedType !== SolanaContextTypes.SOLANA_TOKEN) {\n return false;\n }\n\n if (\n typeof field !== \"object\" ||\n field === null ||\n !(\"tokenInternalId\" in field)\n ) {\n return false;\n }\n\n const tokenInternalId = (field as { tokenInternalId: unknown })\n .tokenInternalId;\n\n return typeof tokenInternalId === \"string\" && tokenInternalId.length > 0;\n }\n\n public async loadField(\n solanaTokenContextInput: SolanaTransactionContext,\n ): Promise<SolanaTokenContextResult> {\n this.logger.debug(\"[loadField] Loading solana token context\", {\n data: { input: solanaTokenContextInput },\n });\n const { tokenInternalId, deviceModelId } = solanaTokenContextInput;\n\n if (!tokenInternalId) {\n return {\n type: SolanaContextTypes.ERROR,\n error: new Error(\n \"[ContextModule] SolanaTokenContextLoader: tokenInternalId is missing\",\n ),\n };\n }\n\n const payload = await this.dataSource.getTokenInfosPayload({\n tokenInternalId,\n });\n\n const certificate: PkiCertificate | undefined =\n await this._certificateLoader.loadCertificate({\n keyId: \"token_metadata_key\",\n keyUsage: KeyUsage.CoinMeta,\n targetDevice: deviceModelId,\n });\n\n return payload.caseOf({\n Left: (error): SolanaTokenContextResult => {\n this.logger.error(\"[loadField] Error loading solana token context\", {\n data: { error },\n });\n\n return {\n type: SolanaContextTypes.ERROR,\n error,\n };\n },\n Right: (value): SolanaTokenContextResult => {\n this.logger.debug(\n \"[loadField] Successfully loaded solana token context\",\n {\n data: { payload: this.pluckTokenData(value), certificate },\n },\n );\n\n return {\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: this.pluckTokenData(value),\n certificate,\n };\n },\n });\n }\n\n private pluckTokenData(tokenData: TokenDataResponse): SolanaTokenData {\n const signatureKind = this.config.cal.mode || \"prod\";\n return {\n solanaTokenDescriptor: {\n data: tokenData.descriptor.data,\n signature: tokenData.descriptor.signatures[signatureKind],\n },\n };\n }\n}\n"],
5
- "mappings": "iOACA,OAAS,UAAAA,EAAQ,cAAAC,MAAkB,YAEnC,OAAS,eAAAC,MAAmB,0BAE5B,OAAS,YAAAC,MAAgB,oBAEzB,OAAS,YAAAC,MAAgB,uBAGzB,OACE,sBAAAC,MAGK,oCAMP,OAAS,oBAAAC,MAAwB,oCAG1B,IAAMC,EAAN,KAOP,CAGE,YAEmBC,EAC4BC,EAE5BC,EAEjBC,EACA,CANiB,gBAAAH,EAC4B,YAAAC,EAE5B,wBAAAC,EAIjB,KAAK,OAASC,EAAc,0BAA0B,CACxD,CAZQ,OAcD,UACLC,EACAC,EACmC,CAKnC,GAJIA,IAAiBC,EAAmB,cAKtC,OAAOF,GAAU,UACjBA,IAAU,MACV,EAAE,oBAAqBA,GAEvB,MAAO,GAGT,MAAMG,EAAmBH,EACtB,gBAEH,OAAO,OAAOG,GAAoB,UAAYA,EAAgB,OAAS,CACzE,CAEA,MAAa,UACXC,EACmC,CACnC,KAAK,OAAO,MAAM,2CAA4C,CAC5D,KAAM,CAAE,MAAOA,CAAwB,CACzC,CAAC,EACD,KAAM,CAAE,gBAAAD,EAAiB,cAAAE,CAAc,EAAID,EAE3C,GAAI,CAACD,EACH,MAAO,CACL,KAAMD,EAAmB,MACzB,MAAO,IAAI,MACT,sEACF,CACF,EAGF,MAAMI,EAAU,MAAM,KAAK,WAAW,qBAAqB,CACzD,gBAAAH,CACF,CAAC,EAEKI,EACJ,MAAM,KAAK,mBAAmB,gBAAgB,CAC5C,MAAO,qBACP,SAAUC,EAAS,SACnB,aAAcH,CAChB,CAAC,EAEH,OAAOC,EAAQ,OAAO,CACpB,KAAOG,IACL,KAAK,OAAO,MAAM,iDAAkD,CAClE,KAAM,CAAE,MAAAA,CAAM,CAChB,CAAC,EAEM,CACL,KAAMP,EAAmB,MACzB,MAAAO,CACF,GAEF,MAAQC,IACN,KAAK,OAAO,MACV,uDACA,CACE,KAAM,CAAE,QAAS,KAAK,eAAeA,CAAK,EAAG,YAAAH,CAAY,CAC3D,CACF,EAEO,CACL,KAAML,EAAmB,aACzB,QAAS,KAAK,eAAeQ,CAAK,EAClC,YAAAH,CACF,EAEJ,CAAC,CACH,CAEQ,eAAeI,EAA+C,CACpE,MAAMC,EAAgB,KAAK,OAAO,IAAI,MAAQ,OAC9C,MAAO,CACL,sBAAuB,CACrB,KAAMD,EAAU,WAAW,KAC3B,UAAWA,EAAU,WAAW,WAAWC,CAAa,CAC1D,CACF,CACF,CACF,EA7GajB,EAANkB,EAAA,CADNC,EAAW,EAYPC,EAAA,EAAAC,EAAOC,EAAiB,qBAAqB,GAE7CF,EAAA,EAAAC,EAAOE,EAAY,MAAM,GACzBH,EAAA,EAAAC,EAAOG,EAAS,oBAAoB,GAEpCJ,EAAA,EAAAC,EAAOE,EAAY,0BAA0B,IAhBrCvB",
4
+ "sourcesContent": ["import { LoggerPublisherService } from \"@ledgerhq/device-management-kit\";\nimport { inject, injectable } from \"inversify\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport { pkiTypes } from \"@/pki/di/pkiTypes\";\nimport { type PkiCertificateLoader } from \"@/pki/domain/PkiCertificateLoader\";\nimport { KeyUsage } from \"@/pki/model/KeyUsage\";\nimport { PkiCertificate } from \"@/pki/model/PkiCertificate\";\nimport { ContextFieldLoader } from \"@/shared/domain/ContextFieldLoader\";\nimport {\n SolanaContextTypes,\n SolanaTokenContextResult,\n SolanaTokenData,\n} from \"@/shared/model/SolanaContextTypes\";\nimport { SolanaTransactionContext } from \"@/solana/domain/solanaContextTypes\";\nimport {\n type SolanaTokenDataSource,\n type TokenDataResponse,\n} from \"@/solanaToken/data/SolanaTokenDataSource\";\nimport { solanaTokenTypes } from \"@/solanaToken/di/solanaTokenTypes\";\n\n@injectable()\nexport class SolanaTokenContextLoader\n implements\n ContextFieldLoader<\n SolanaTransactionContext,\n SolanaContextTypes,\n SolanaTokenContextResult\n >\n{\n private logger: LoggerPublisherService;\n\n constructor(\n @inject(solanaTokenTypes.SolanaTokenDataSource)\n private readonly dataSource: SolanaTokenDataSource,\n @inject(configTypes.Config)\n private readonly config: ContextModuleServiceConfig,\n @inject(pkiTypes.PkiCertificateLoader)\n private readonly _certificateLoader: PkiCertificateLoader,\n @inject(configTypes.ContextModuleLoggerFactory)\n loggerFactory: (tag: string) => LoggerPublisherService,\n ) {\n this.logger = loggerFactory(\"SolanaTokenContextLoader\");\n }\n\n public canHandle(\n field: unknown,\n expectedType: SolanaContextTypes,\n ): field is SolanaTransactionContext {\n if (expectedType !== SolanaContextTypes.SOLANA_TOKEN) {\n return false;\n }\n\n if (\n typeof field !== \"object\" ||\n field === null ||\n !(\"tokenInternalId\" in field)\n ) {\n return false;\n }\n\n const tokenInternalId = (field as { tokenInternalId: unknown })\n .tokenInternalId;\n\n return typeof tokenInternalId === \"string\" && tokenInternalId.length > 0;\n }\n\n public async loadField(\n solanaTokenContextInput: SolanaTransactionContext,\n ): Promise<SolanaTokenContextResult> {\n this.logger.debug(\"[loadField] Loading solana token context\", {\n data: { input: solanaTokenContextInput },\n });\n const { tokenInternalId, deviceModelId } = solanaTokenContextInput;\n\n if (!tokenInternalId) {\n return {\n type: SolanaContextTypes.ERROR,\n error: new Error(\n \"[ContextModule] SolanaTokenContextLoader: tokenInternalId is missing\",\n ),\n };\n }\n\n const payload = await this.dataSource.getTokenInfosPayload({\n tokenInternalId,\n });\n\n const certificate: PkiCertificate | undefined =\n await this._certificateLoader.loadCertificate({\n keyId: \"token_metadata_key\",\n keyUsage: KeyUsage.CoinMeta,\n targetDevice: deviceModelId,\n });\n\n return payload.caseOf({\n Left: (error): SolanaTokenContextResult => {\n this.logger.error(\"[loadField] Error loading solana token context\", {\n data: { error },\n });\n\n return {\n type: SolanaContextTypes.ERROR,\n error,\n };\n },\n Right: (value): SolanaTokenContextResult => {\n this.logger.debug(\n \"[loadField] Successfully loaded solana token context\",\n {\n data: { payload: this.pluckTokenData(value), certificate },\n },\n );\n\n return {\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: this.pluckTokenData(value),\n certificate,\n };\n },\n });\n }\n\n private pluckTokenData(tokenData: TokenDataResponse): SolanaTokenData {\n const signatureKind = this.config.cal.mode || \"prod\";\n return {\n solanaTokenDescriptor: {\n data: tokenData.descriptor.data,\n signature: tokenData.descriptor.signatures[signatureKind],\n },\n };\n }\n}\n"],
5
+ "mappings": "iOACA,OAAS,UAAAA,EAAQ,cAAAC,MAAkB,YAEnC,OAAS,eAAAC,MAAmB,0BAE5B,OAAS,YAAAC,MAAgB,oBAEzB,OAAS,YAAAC,MAAgB,uBAGzB,OACE,sBAAAC,MAGK,oCAMP,OAAS,oBAAAC,MAAwB,oCAG1B,IAAMC,EAAN,KAOP,CAGE,YAEmBC,EAEAC,EAEAC,EAEjBC,EACA,CAPiB,gBAAAH,EAEA,YAAAC,EAEA,wBAAAC,EAIjB,KAAK,OAASC,EAAc,0BAA0B,CACxD,CAbQ,OAeD,UACLC,EACAC,EACmC,CAKnC,GAJIA,IAAiBC,EAAmB,cAKtC,OAAOF,GAAU,UACjBA,IAAU,MACV,EAAE,oBAAqBA,GAEvB,MAAO,GAGT,MAAMG,EAAmBH,EACtB,gBAEH,OAAO,OAAOG,GAAoB,UAAYA,EAAgB,OAAS,CACzE,CAEA,MAAa,UACXC,EACmC,CACnC,KAAK,OAAO,MAAM,2CAA4C,CAC5D,KAAM,CAAE,MAAOA,CAAwB,CACzC,CAAC,EACD,KAAM,CAAE,gBAAAD,EAAiB,cAAAE,CAAc,EAAID,EAE3C,GAAI,CAACD,EACH,MAAO,CACL,KAAMD,EAAmB,MACzB,MAAO,IAAI,MACT,sEACF,CACF,EAGF,MAAMI,EAAU,MAAM,KAAK,WAAW,qBAAqB,CACzD,gBAAAH,CACF,CAAC,EAEKI,EACJ,MAAM,KAAK,mBAAmB,gBAAgB,CAC5C,MAAO,qBACP,SAAUC,EAAS,SACnB,aAAcH,CAChB,CAAC,EAEH,OAAOC,EAAQ,OAAO,CACpB,KAAOG,IACL,KAAK,OAAO,MAAM,iDAAkD,CAClE,KAAM,CAAE,MAAAA,CAAM,CAChB,CAAC,EAEM,CACL,KAAMP,EAAmB,MACzB,MAAAO,CACF,GAEF,MAAQC,IACN,KAAK,OAAO,MACV,uDACA,CACE,KAAM,CAAE,QAAS,KAAK,eAAeA,CAAK,EAAG,YAAAH,CAAY,CAC3D,CACF,EAEO,CACL,KAAML,EAAmB,aACzB,QAAS,KAAK,eAAeQ,CAAK,EAClC,YAAAH,CACF,EAEJ,CAAC,CACH,CAEQ,eAAeI,EAA+C,CACpE,MAAMC,EAAgB,KAAK,OAAO,IAAI,MAAQ,OAC9C,MAAO,CACL,sBAAuB,CACrB,KAAMD,EAAU,WAAW,KAC3B,UAAWA,EAAU,WAAW,WAAWC,CAAa,CAC1D,CACF,CACF,CACF,EA9GajB,EAANkB,EAAA,CADNC,EAAW,EAYPC,EAAA,EAAAC,EAAOC,EAAiB,qBAAqB,GAE7CF,EAAA,EAAAC,EAAOE,EAAY,MAAM,GAEzBH,EAAA,EAAAC,EAAOG,EAAS,oBAAoB,GAEpCJ,EAAA,EAAAC,EAAOE,EAAY,0BAA0B,IAjBrCvB",
6
6
  "names": ["inject", "injectable", "configTypes", "pkiTypes", "KeyUsage", "SolanaContextTypes", "solanaTokenTypes", "SolanaTokenContextLoader", "dataSource", "config", "_certificateLoader", "loggerFactory", "field", "expectedType", "SolanaContextTypes", "tokenInternalId", "solanaTokenContextInput", "deviceModelId", "payload", "certificate", "KeyUsage", "error", "value", "tokenData", "signatureKind", "__decorateClass", "injectable", "__decorateParam", "inject", "solanaTokenTypes", "configTypes", "pkiTypes"]
7
7
  }
@@ -1,2 +1,2 @@
1
- import{DeviceModelId as y}from"@ledgerhq/device-management-kit";import{Left as m,Right as f}from"purify-ts";import{beforeEach as g,describe as p,expect as t,it as s,vi as a}from"vitest";import{KeyUsage as T}from"../../pki/model/KeyUsage";import{SolanaContextTypes as d}from"../../shared/model/SolanaContextTypes";import{SolanaTokenContextLoader as I}from"./SolanaTokenContextLoader";const O=()=>({debug:a.fn(),info:a.fn(),warn:a.fn(),error:a.fn(),subscribers:[]});p("SolanaTokenContextLoader",()=>{let l,i;const c=new Uint8Array([240,202,204,26]),n={descriptor:{data:{symbol:"SOL",name:"Solana",decimals:9},signatures:{prod:"prod-sig",test:"test-sig"}}},k={tokenInternalId:"token-1",deviceModelId:y.FLEX};g(()=>{a.restoreAllMocks(),l={getTokenInfosPayload:a.fn()},i={loadCertificate:a.fn()}});const r=e=>{const o={cal:{mode:e}};return new I(l,o,i,O)};p("canHandle",()=>{s("returns true when tokenInternalId is provided",()=>{const e=r("prod");t(e.canHandle({tokenInternalId:"abc123"},d.SOLANA_TOKEN)).toBe(!0)}),s("returns false when tokenInternalId is missing or falsy",()=>{const e=r("prod");t(e.canHandle({tokenInternalId:""},d.SOLANA_TOKEN)).toBe(!1),t(e.canHandle({tokenInternalId:void 0},d.SOLANA_TOKEN)).toBe(!1),t(e.canHandle({},d.SOLANA_TOKEN)).toBe(!1)})}),p("loadField",()=>{s("returns an error when datasource returns Left(error) (certificate still retrieved)",async()=>{const e=r("prod"),o=new Error("datasource failed");a.spyOn(l,"getTokenInfosPayload").mockResolvedValue(m(o)),a.spyOn(i,"loadCertificate").mockResolvedValue({keyUsageNumber:0,payload:c});const u=await e.loadField(k);t(l.getTokenInfosPayload).toHaveBeenCalledWith({tokenInternalId:"token-1"}),t(i.loadCertificate).toHaveBeenCalledWith({keyId:"token_metadata_key",keyUsage:T.CoinMeta,targetDevice:k.deviceModelId}),t(u).toEqual({type:d.ERROR,error:o})}),s("returns SOLANA_TOKEN with prod signature by default (falsy mode) and includes certificate",async()=>{const e=r("");a.spyOn(l,"getTokenInfosPayload").mockResolvedValue(f(n)),a.spyOn(i,"loadCertificate").mockResolvedValue({keyUsageNumber:0,payload:c});const o=await e.loadField({...k,tokenInternalId:"token-2"});t(o).toEqual({type:d.SOLANA_TOKEN,payload:{solanaTokenDescriptor:{data:n.descriptor.data,signature:"prod-sig"}},certificate:{keyUsageNumber:0,payload:c}})}),s("returns SOLANA_TOKEN with signature matching config.cal.mode",async()=>{const e=r("test");a.spyOn(l,"getTokenInfosPayload").mockResolvedValue(f(n)),a.spyOn(i,"loadCertificate").mockResolvedValue({keyUsageNumber:1,payload:c});const o=await e.loadField({...k,tokenInternalId:"token-3"});t(o).toEqual({type:d.SOLANA_TOKEN,payload:{solanaTokenDescriptor:{data:n.descriptor.data,signature:"test-sig"}},certificate:{keyUsageNumber:1,payload:c}})}),s("works even if certificate loader returns undefined (certificate omitted)",async()=>{const e=r("prod");a.spyOn(l,"getTokenInfosPayload").mockResolvedValue(f(n)),a.spyOn(i,"loadCertificate").mockResolvedValue(void 0);const o=await e.loadField(k);t(o).toEqual({type:d.SOLANA_TOKEN,payload:{solanaTokenDescriptor:{data:n.descriptor.data,signature:"prod-sig"}},certificate:void 0})})}),p("pluckTokenData (private)",()=>{s("picks the signature for the configured mode",()=>{const e=r("test"),u=e.pluckTokenData.bind(e)(n);t(u).toEqual({solanaTokenDescriptor:{data:n.descriptor.data,signature:"test-sig"}})}),s("falls back to 'prod' when config.cal.mode is falsy",()=>{const o=r(void 0).pluckTokenData(n);t(o).toEqual({solanaTokenDescriptor:{data:n.descriptor.data,signature:"prod-sig"}})})})});
1
+ import{DeviceModelId as y}from"@ledgerhq/device-management-kit";import{Left as m,Right as f}from"purify-ts";import{beforeEach as g,describe as p,expect as t,it as s,vi as a}from"vitest";import{KeyUsage as T}from"../../pki/model/KeyUsage";import{SolanaContextTypes as d}from"../../shared/model/SolanaContextTypes";import{SolanaTokenContextLoader as I}from"./SolanaTokenContextLoader";const O=()=>({debug:a.fn(),info:a.fn(),warn:a.fn(),error:a.fn(),subscribers:[]});p("SolanaTokenContextLoader",()=>{let i,l;const c=new Uint8Array([240,202,204,26]),n={descriptor:{data:{symbol:"SOL",name:"Solana",decimals:9},signatures:{prod:"prod-sig",test:"test-sig"}}},k={tokenInternalId:"token-1",deviceModelId:y.FLEX};g(()=>{a.restoreAllMocks(),i={getTokenInfosPayload:a.fn()},l={loadCertificate:a.fn()}});const r=e=>{const o={cal:{mode:e}};return new I(i,o,l,O)};p("canHandle",()=>{s("returns true when tokenInternalId is provided",()=>{const e=r("prod");t(e.canHandle({tokenInternalId:"abc123"},d.SOLANA_TOKEN)).toBe(!0)}),s("returns false when tokenInternalId is missing or falsy",()=>{const e=r("prod");t(e.canHandle({tokenInternalId:""},d.SOLANA_TOKEN)).toBe(!1),t(e.canHandle({tokenInternalId:void 0},d.SOLANA_TOKEN)).toBe(!1),t(e.canHandle({},d.SOLANA_TOKEN)).toBe(!1)})}),p("loadField",()=>{s("returns an error when datasource returns Left(error) (certificate still retrieved)",async()=>{const e=r("prod"),o=new Error("datasource failed");a.spyOn(i,"getTokenInfosPayload").mockResolvedValue(m(o)),a.spyOn(l,"loadCertificate").mockResolvedValue({keyUsageNumber:0,payload:c});const u=await e.loadField(k);t(i.getTokenInfosPayload).toHaveBeenCalledWith({tokenInternalId:"token-1"}),t(l.loadCertificate).toHaveBeenCalledWith({keyId:"token_metadata_key",keyUsage:T.CoinMeta,targetDevice:k.deviceModelId}),t(u).toEqual({type:d.ERROR,error:o})}),s("returns SOLANA_TOKEN with prod signature by default (falsy mode) and includes certificate",async()=>{const e=r("");a.spyOn(i,"getTokenInfosPayload").mockResolvedValue(f(n)),a.spyOn(l,"loadCertificate").mockResolvedValue({keyUsageNumber:0,payload:c});const o=await e.loadField({...k,tokenInternalId:"token-2"});t(o).toEqual({type:d.SOLANA_TOKEN,payload:{solanaTokenDescriptor:{data:n.descriptor.data,signature:"prod-sig"}},certificate:{keyUsageNumber:0,payload:c}})}),s("returns SOLANA_TOKEN with signature matching config.cal.mode",async()=>{const e=r("test");a.spyOn(i,"getTokenInfosPayload").mockResolvedValue(f(n)),a.spyOn(l,"loadCertificate").mockResolvedValue({keyUsageNumber:1,payload:c});const o=await e.loadField({...k,tokenInternalId:"token-3"});t(o).toEqual({type:d.SOLANA_TOKEN,payload:{solanaTokenDescriptor:{data:n.descriptor.data,signature:"test-sig"}},certificate:{keyUsageNumber:1,payload:c}})}),s("works even if certificate loader returns undefined (certificate omitted)",async()=>{const e=r("prod");a.spyOn(i,"getTokenInfosPayload").mockResolvedValue(f(n)),a.spyOn(l,"loadCertificate").mockResolvedValue(void 0);const o=await e.loadField(k);t(o).toEqual({type:d.SOLANA_TOKEN,payload:{solanaTokenDescriptor:{data:n.descriptor.data,signature:"prod-sig"}},certificate:void 0})})}),p("pluckTokenData (private)",()=>{s("picks the signature for the configured mode",()=>{const e=r("test"),u=e.pluckTokenData.bind(e)(n);t(u).toEqual({solanaTokenDescriptor:{data:n.descriptor.data,signature:"test-sig"}})}),s("falls back to 'prod' when config.cal.mode is falsy",()=>{const o=r(void 0).pluckTokenData(n);t(o).toEqual({solanaTokenDescriptor:{data:n.descriptor.data,signature:"prod-sig"}})})})});
2
2
  //# sourceMappingURL=SolanaTokenContextLoader.test.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/solanaToken/domain/SolanaTokenContextLoader.test.ts"],
4
- "sourcesContent": ["/* eslint-disable @typescript-eslint/no-unsafe-call */\n/* eslint-disable @typescript-eslint/no-unsafe-member-access */\n/* eslint-disable @typescript-eslint/no-explicit-any */\n/* eslint-disable @typescript-eslint/no-unsafe-assignment */\nimport { DeviceModelId } from \"@ledgerhq/device-management-kit\";\nimport { Left, Right } from \"purify-ts\";\nimport { beforeEach, describe, expect, it, vi } from \"vitest\";\n\nimport { type ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport type { PkiCertificateLoader } from \"@/pki/domain/PkiCertificateLoader\";\nimport { KeyUsage } from \"@/pki/model/KeyUsage\";\nimport { SolanaContextTypes } from \"@/shared/model/SolanaContextTypes\";\nimport type { SolanaTransactionContext } from \"@/solana/domain/solanaContextTypes\";\nimport {\n type SolanaTokenDataSource,\n type TokenDataResponse,\n} from \"@/solanaToken/data/SolanaTokenDataSource\";\n\nimport { SolanaTokenContextLoader } from \"./SolanaTokenContextLoader\";\n\nconst mockLoggerFactory = () => ({\n debug: vi.fn(),\n info: vi.fn(),\n warn: vi.fn(),\n error: vi.fn(),\n subscribers: [],\n});\n\ndescribe(\"SolanaTokenContextLoader\", () => {\n let mockDataSource: SolanaTokenDataSource;\n let mockCertLoader: PkiCertificateLoader;\n\n const bytes = new Uint8Array([0xf0, 0xca, 0xcc, 0x1a]);\n\n const tokenDataResponse: TokenDataResponse = {\n descriptor: {\n // The loader just forwards this; exact shape isn't important for the test\n data: { symbol: \"SOL\", name: \"Solana\", decimals: 9 } as any,\n signatures: {\n prod: \"prod-sig\",\n test: \"test-sig\",\n } as any,\n },\n } as any;\n\n const baseCtx = {\n tokenInternalId: \"token-1\",\n deviceModelId: DeviceModelId.FLEX,\n };\n\n beforeEach(() => {\n vi.restoreAllMocks();\n\n mockDataSource = {\n getTokenInfosPayload: vi.fn(),\n } as unknown as SolanaTokenDataSource;\n\n mockCertLoader = {\n loadCertificate: vi.fn(),\n } as unknown as PkiCertificateLoader;\n });\n\n const makeLoader = (mode?: string) => {\n const config = { cal: { mode } } as unknown as ContextModuleConfig;\n return new SolanaTokenContextLoader(\n mockDataSource,\n config,\n mockCertLoader,\n mockLoggerFactory,\n );\n };\n\n describe(\"canHandle\", () => {\n it(\"returns true when tokenInternalId is provided\", () => {\n const loader = makeLoader(\"prod\");\n\n expect(\n loader.canHandle(\n {\n tokenInternalId: \"abc123\",\n } as SolanaTransactionContext,\n SolanaContextTypes.SOLANA_TOKEN,\n ),\n ).toBe(true);\n });\n\n it(\"returns false when tokenInternalId is missing or falsy\", () => {\n const loader = makeLoader(\"prod\");\n\n expect(\n loader.canHandle(\n { tokenInternalId: \"\" } as any,\n SolanaContextTypes.SOLANA_TOKEN,\n ),\n ).toBe(false);\n expect(\n loader.canHandle(\n { tokenInternalId: undefined } as any,\n SolanaContextTypes.SOLANA_TOKEN,\n ),\n ).toBe(false);\n expect(loader.canHandle({} as any, SolanaContextTypes.SOLANA_TOKEN)).toBe(\n false,\n );\n });\n });\n\n describe(\"loadField\", () => {\n it(\"returns an error when datasource returns Left(error) (certificate still retrieved)\", async () => {\n const loader = makeLoader(\"prod\");\n const error = new Error(\"datasource failed\");\n\n vi.spyOn(mockDataSource, \"getTokenInfosPayload\").mockResolvedValue(\n Left(error),\n );\n vi.spyOn(mockCertLoader, \"loadCertificate\").mockResolvedValue({\n keyUsageNumber: 0,\n payload: bytes,\n });\n\n const result = await loader.loadField(baseCtx);\n\n expect(mockDataSource.getTokenInfosPayload).toHaveBeenCalledWith({\n tokenInternalId: \"token-1\",\n });\n expect(mockCertLoader.loadCertificate).toHaveBeenCalledWith({\n keyId: \"token_metadata_key\",\n keyUsage: KeyUsage.CoinMeta,\n targetDevice: baseCtx.deviceModelId,\n });\n expect(result).toEqual({\n type: SolanaContextTypes.ERROR,\n error,\n });\n });\n\n it(\"returns SOLANA_TOKEN with prod signature by default (falsy mode) and includes certificate\", async () => {\n const loader = makeLoader(\"\"); // falsy -> default 'prod'\n\n vi.spyOn(mockDataSource, \"getTokenInfosPayload\").mockResolvedValue(\n Right(tokenDataResponse),\n );\n vi.spyOn(mockCertLoader, \"loadCertificate\").mockResolvedValue({\n keyUsageNumber: 0,\n payload: bytes,\n });\n\n const result = await loader.loadField({\n ...baseCtx,\n tokenInternalId: \"token-2\",\n });\n\n expect(result).toEqual({\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: {\n solanaTokenDescriptor: {\n data: tokenDataResponse.descriptor.data,\n signature: \"prod-sig\",\n },\n },\n certificate: { keyUsageNumber: 0, payload: bytes },\n });\n });\n\n it(\"returns SOLANA_TOKEN with signature matching config.cal.mode\", async () => {\n const loader = makeLoader(\"test\");\n\n vi.spyOn(mockDataSource, \"getTokenInfosPayload\").mockResolvedValue(\n Right(tokenDataResponse),\n );\n vi.spyOn(mockCertLoader, \"loadCertificate\").mockResolvedValue({\n keyUsageNumber: 1,\n payload: bytes,\n });\n\n const result = await loader.loadField({\n ...baseCtx,\n tokenInternalId: \"token-3\",\n });\n\n expect(result).toEqual({\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: {\n solanaTokenDescriptor: {\n data: tokenDataResponse.descriptor.data,\n signature: \"test-sig\",\n },\n },\n certificate: { keyUsageNumber: 1, payload: bytes },\n });\n });\n\n it(\"works even if certificate loader returns undefined (certificate omitted)\", async () => {\n const loader = makeLoader(\"prod\");\n\n vi.spyOn(mockDataSource, \"getTokenInfosPayload\").mockResolvedValue(\n Right(tokenDataResponse),\n );\n vi.spyOn(mockCertLoader, \"loadCertificate\").mockResolvedValue(undefined);\n\n const result = await loader.loadField(baseCtx);\n\n expect(result).toEqual({\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: {\n solanaTokenDescriptor: {\n data: tokenDataResponse.descriptor.data,\n signature: \"prod-sig\",\n },\n },\n certificate: undefined,\n });\n });\n });\n\n describe(\"pluckTokenData (private)\", () => {\n it(\"picks the signature for the configured mode\", () => {\n const loader = makeLoader(\"test\");\n const pluck = (loader as any).pluckTokenData.bind(loader);\n\n const result = pluck(tokenDataResponse);\n\n expect(result).toEqual({\n solanaTokenDescriptor: {\n data: tokenDataResponse.descriptor.data,\n signature: \"test-sig\",\n },\n });\n });\n\n it(\"falls back to 'prod' when config.cal.mode is falsy\", () => {\n const loader = makeLoader(undefined as any);\n const result = (loader as any).pluckTokenData(tokenDataResponse);\n\n expect(result).toEqual({\n solanaTokenDescriptor: {\n data: tokenDataResponse.descriptor.data,\n signature: \"prod-sig\",\n },\n });\n });\n });\n});\n"],
4
+ "sourcesContent": ["/* eslint-disable @typescript-eslint/no-unsafe-call */\n/* eslint-disable @typescript-eslint/no-unsafe-member-access */\n/* eslint-disable @typescript-eslint/no-explicit-any */\n/* eslint-disable @typescript-eslint/no-unsafe-assignment */\nimport { DeviceModelId } from \"@ledgerhq/device-management-kit\";\nimport { Left, Right } from \"purify-ts\";\nimport { beforeEach, describe, expect, it, vi } from \"vitest\";\n\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport type { PkiCertificateLoader } from \"@/pki/domain/PkiCertificateLoader\";\nimport { KeyUsage } from \"@/pki/model/KeyUsage\";\nimport { SolanaContextTypes } from \"@/shared/model/SolanaContextTypes\";\nimport type { SolanaTransactionContext } from \"@/solana/domain/solanaContextTypes\";\nimport {\n type SolanaTokenDataSource,\n type TokenDataResponse,\n} from \"@/solanaToken/data/SolanaTokenDataSource\";\n\nimport { SolanaTokenContextLoader } from \"./SolanaTokenContextLoader\";\n\nconst mockLoggerFactory = () => ({\n debug: vi.fn(),\n info: vi.fn(),\n warn: vi.fn(),\n error: vi.fn(),\n subscribers: [],\n});\n\ndescribe(\"SolanaTokenContextLoader\", () => {\n let mockDataSource: SolanaTokenDataSource;\n let mockCertLoader: PkiCertificateLoader;\n\n const bytes = new Uint8Array([0xf0, 0xca, 0xcc, 0x1a]);\n\n const tokenDataResponse: TokenDataResponse = {\n descriptor: {\n // The loader just forwards this; exact shape isn't important for the test\n data: { symbol: \"SOL\", name: \"Solana\", decimals: 9 } as any,\n signatures: {\n prod: \"prod-sig\",\n test: \"test-sig\",\n } as any,\n },\n } as any;\n\n const baseCtx = {\n tokenInternalId: \"token-1\",\n deviceModelId: DeviceModelId.FLEX,\n };\n\n beforeEach(() => {\n vi.restoreAllMocks();\n\n mockDataSource = {\n getTokenInfosPayload: vi.fn(),\n } as unknown as SolanaTokenDataSource;\n\n mockCertLoader = {\n loadCertificate: vi.fn(),\n } as unknown as PkiCertificateLoader;\n });\n\n const makeLoader = (mode?: string) => {\n const config = { cal: { mode } } as unknown as ContextModuleServiceConfig;\n return new SolanaTokenContextLoader(\n mockDataSource,\n config,\n mockCertLoader,\n mockLoggerFactory,\n );\n };\n\n describe(\"canHandle\", () => {\n it(\"returns true when tokenInternalId is provided\", () => {\n const loader = makeLoader(\"prod\");\n\n expect(\n loader.canHandle(\n {\n tokenInternalId: \"abc123\",\n } as SolanaTransactionContext,\n SolanaContextTypes.SOLANA_TOKEN,\n ),\n ).toBe(true);\n });\n\n it(\"returns false when tokenInternalId is missing or falsy\", () => {\n const loader = makeLoader(\"prod\");\n\n expect(\n loader.canHandle(\n { tokenInternalId: \"\" } as any,\n SolanaContextTypes.SOLANA_TOKEN,\n ),\n ).toBe(false);\n expect(\n loader.canHandle(\n { tokenInternalId: undefined } as any,\n SolanaContextTypes.SOLANA_TOKEN,\n ),\n ).toBe(false);\n expect(loader.canHandle({} as any, SolanaContextTypes.SOLANA_TOKEN)).toBe(\n false,\n );\n });\n });\n\n describe(\"loadField\", () => {\n it(\"returns an error when datasource returns Left(error) (certificate still retrieved)\", async () => {\n const loader = makeLoader(\"prod\");\n const error = new Error(\"datasource failed\");\n\n vi.spyOn(mockDataSource, \"getTokenInfosPayload\").mockResolvedValue(\n Left(error),\n );\n vi.spyOn(mockCertLoader, \"loadCertificate\").mockResolvedValue({\n keyUsageNumber: 0,\n payload: bytes,\n });\n\n const result = await loader.loadField(baseCtx);\n\n expect(mockDataSource.getTokenInfosPayload).toHaveBeenCalledWith({\n tokenInternalId: \"token-1\",\n });\n expect(mockCertLoader.loadCertificate).toHaveBeenCalledWith({\n keyId: \"token_metadata_key\",\n keyUsage: KeyUsage.CoinMeta,\n targetDevice: baseCtx.deviceModelId,\n });\n expect(result).toEqual({\n type: SolanaContextTypes.ERROR,\n error,\n });\n });\n\n it(\"returns SOLANA_TOKEN with prod signature by default (falsy mode) and includes certificate\", async () => {\n const loader = makeLoader(\"\"); // falsy -> default 'prod'\n\n vi.spyOn(mockDataSource, \"getTokenInfosPayload\").mockResolvedValue(\n Right(tokenDataResponse),\n );\n vi.spyOn(mockCertLoader, \"loadCertificate\").mockResolvedValue({\n keyUsageNumber: 0,\n payload: bytes,\n });\n\n const result = await loader.loadField({\n ...baseCtx,\n tokenInternalId: \"token-2\",\n });\n\n expect(result).toEqual({\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: {\n solanaTokenDescriptor: {\n data: tokenDataResponse.descriptor.data,\n signature: \"prod-sig\",\n },\n },\n certificate: { keyUsageNumber: 0, payload: bytes },\n });\n });\n\n it(\"returns SOLANA_TOKEN with signature matching config.cal.mode\", async () => {\n const loader = makeLoader(\"test\");\n\n vi.spyOn(mockDataSource, \"getTokenInfosPayload\").mockResolvedValue(\n Right(tokenDataResponse),\n );\n vi.spyOn(mockCertLoader, \"loadCertificate\").mockResolvedValue({\n keyUsageNumber: 1,\n payload: bytes,\n });\n\n const result = await loader.loadField({\n ...baseCtx,\n tokenInternalId: \"token-3\",\n });\n\n expect(result).toEqual({\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: {\n solanaTokenDescriptor: {\n data: tokenDataResponse.descriptor.data,\n signature: \"test-sig\",\n },\n },\n certificate: { keyUsageNumber: 1, payload: bytes },\n });\n });\n\n it(\"works even if certificate loader returns undefined (certificate omitted)\", async () => {\n const loader = makeLoader(\"prod\");\n\n vi.spyOn(mockDataSource, \"getTokenInfosPayload\").mockResolvedValue(\n Right(tokenDataResponse),\n );\n vi.spyOn(mockCertLoader, \"loadCertificate\").mockResolvedValue(undefined);\n\n const result = await loader.loadField(baseCtx);\n\n expect(result).toEqual({\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: {\n solanaTokenDescriptor: {\n data: tokenDataResponse.descriptor.data,\n signature: \"prod-sig\",\n },\n },\n certificate: undefined,\n });\n });\n });\n\n describe(\"pluckTokenData (private)\", () => {\n it(\"picks the signature for the configured mode\", () => {\n const loader = makeLoader(\"test\");\n const pluck = (loader as any).pluckTokenData.bind(loader);\n\n const result = pluck(tokenDataResponse);\n\n expect(result).toEqual({\n solanaTokenDescriptor: {\n data: tokenDataResponse.descriptor.data,\n signature: \"test-sig\",\n },\n });\n });\n\n it(\"falls back to 'prod' when config.cal.mode is falsy\", () => {\n const loader = makeLoader(undefined as any);\n const result = (loader as any).pluckTokenData(tokenDataResponse);\n\n expect(result).toEqual({\n solanaTokenDescriptor: {\n data: tokenDataResponse.descriptor.data,\n signature: \"prod-sig\",\n },\n });\n });\n });\n});\n"],
5
5
  "mappings": "AAIA,OAAS,iBAAAA,MAAqB,kCAC9B,OAAS,QAAAC,EAAM,SAAAC,MAAa,YAC5B,OAAS,cAAAC,EAAY,YAAAC,EAAU,UAAAC,EAAQ,MAAAC,EAAI,MAAAC,MAAU,SAIrD,OAAS,YAAAC,MAAgB,uBACzB,OAAS,sBAAAC,MAA0B,oCAOnC,OAAS,4BAAAC,MAAgC,6BAEzC,MAAMC,EAAoB,KAAO,CAC/B,MAAOJ,EAAG,GAAG,EACb,KAAMA,EAAG,GAAG,EACZ,KAAMA,EAAG,GAAG,EACZ,MAAOA,EAAG,GAAG,EACb,YAAa,CAAC,CAChB,GAEAH,EAAS,2BAA4B,IAAM,CACzC,IAAIQ,EACAC,EAEJ,MAAMC,EAAQ,IAAI,WAAW,CAAC,IAAM,IAAM,IAAM,EAAI,CAAC,EAE/CC,EAAuC,CAC3C,WAAY,CAEV,KAAM,CAAE,OAAQ,MAAO,KAAM,SAAU,SAAU,CAAE,EACnD,WAAY,CACV,KAAM,WACN,KAAM,UACR,CACF,CACF,EAEMC,EAAU,CACd,gBAAiB,UACjB,cAAehB,EAAc,IAC/B,EAEAG,EAAW,IAAM,CACfI,EAAG,gBAAgB,EAEnBK,EAAiB,CACf,qBAAsBL,EAAG,GAAG,CAC9B,EAEAM,EAAiB,CACf,gBAAiBN,EAAG,GAAG,CACzB,CACF,CAAC,EAED,MAAMU,EAAcC,GAAkB,CACpC,MAAMC,EAAS,CAAE,IAAK,CAAE,KAAAD,CAAK,CAAE,EAC/B,OAAO,IAAIR,EACTE,EACAO,EACAN,EACAF,CACF,CACF,EAEAP,EAAS,YAAa,IAAM,CAC1BE,EAAG,gDAAiD,IAAM,CACxD,MAAMc,EAASH,EAAW,MAAM,EAEhCZ,EACEe,EAAO,UACL,CACE,gBAAiB,QACnB,EACAX,EAAmB,YACrB,CACF,EAAE,KAAK,EAAI,CACb,CAAC,EAEDH,EAAG,yDAA0D,IAAM,CACjE,MAAMc,EAASH,EAAW,MAAM,EAEhCZ,EACEe,EAAO,UACL,CAAE,gBAAiB,EAAG,EACtBX,EAAmB,YACrB,CACF,EAAE,KAAK,EAAK,EACZJ,EACEe,EAAO,UACL,CAAE,gBAAiB,MAAU,EAC7BX,EAAmB,YACrB,CACF,EAAE,KAAK,EAAK,EACZJ,EAAOe,EAAO,UAAU,CAAC,EAAUX,EAAmB,YAAY,CAAC,EAAE,KACnE,EACF,CACF,CAAC,CACH,CAAC,EAEDL,EAAS,YAAa,IAAM,CAC1BE,EAAG,qFAAsF,SAAY,CACnG,MAAMc,EAASH,EAAW,MAAM,EAC1BI,EAAQ,IAAI,MAAM,mBAAmB,EAE3Cd,EAAG,MAAMK,EAAgB,sBAAsB,EAAE,kBAC/CX,EAAKoB,CAAK,CACZ,EACAd,EAAG,MAAMM,EAAgB,iBAAiB,EAAE,kBAAkB,CAC5D,eAAgB,EAChB,QAASC,CACX,CAAC,EAED,MAAMQ,EAAS,MAAMF,EAAO,UAAUJ,CAAO,EAE7CX,EAAOO,EAAe,oBAAoB,EAAE,qBAAqB,CAC/D,gBAAiB,SACnB,CAAC,EACDP,EAAOQ,EAAe,eAAe,EAAE,qBAAqB,CAC1D,MAAO,qBACP,SAAUL,EAAS,SACnB,aAAcQ,EAAQ,aACxB,CAAC,EACDX,EAAOiB,CAAM,EAAE,QAAQ,CACrB,KAAMb,EAAmB,MACzB,MAAAY,CACF,CAAC,CACH,CAAC,EAEDf,EAAG,4FAA6F,SAAY,CAC1G,MAAMc,EAASH,EAAW,EAAE,EAE5BV,EAAG,MAAMK,EAAgB,sBAAsB,EAAE,kBAC/CV,EAAMa,CAAiB,CACzB,EACAR,EAAG,MAAMM,EAAgB,iBAAiB,EAAE,kBAAkB,CAC5D,eAAgB,EAChB,QAASC,CACX,CAAC,EAED,MAAMQ,EAAS,MAAMF,EAAO,UAAU,CACpC,GAAGJ,EACH,gBAAiB,SACnB,CAAC,EAEDX,EAAOiB,CAAM,EAAE,QAAQ,CACrB,KAAMb,EAAmB,aACzB,QAAS,CACP,sBAAuB,CACrB,KAAMM,EAAkB,WAAW,KACnC,UAAW,UACb,CACF,EACA,YAAa,CAAE,eAAgB,EAAG,QAASD,CAAM,CACnD,CAAC,CACH,CAAC,EAEDR,EAAG,+DAAgE,SAAY,CAC7E,MAAMc,EAASH,EAAW,MAAM,EAEhCV,EAAG,MAAMK,EAAgB,sBAAsB,EAAE,kBAC/CV,EAAMa,CAAiB,CACzB,EACAR,EAAG,MAAMM,EAAgB,iBAAiB,EAAE,kBAAkB,CAC5D,eAAgB,EAChB,QAASC,CACX,CAAC,EAED,MAAMQ,EAAS,MAAMF,EAAO,UAAU,CACpC,GAAGJ,EACH,gBAAiB,SACnB,CAAC,EAEDX,EAAOiB,CAAM,EAAE,QAAQ,CACrB,KAAMb,EAAmB,aACzB,QAAS,CACP,sBAAuB,CACrB,KAAMM,EAAkB,WAAW,KACnC,UAAW,UACb,CACF,EACA,YAAa,CAAE,eAAgB,EAAG,QAASD,CAAM,CACnD,CAAC,CACH,CAAC,EAEDR,EAAG,2EAA4E,SAAY,CACzF,MAAMc,EAASH,EAAW,MAAM,EAEhCV,EAAG,MAAMK,EAAgB,sBAAsB,EAAE,kBAC/CV,EAAMa,CAAiB,CACzB,EACAR,EAAG,MAAMM,EAAgB,iBAAiB,EAAE,kBAAkB,MAAS,EAEvE,MAAMS,EAAS,MAAMF,EAAO,UAAUJ,CAAO,EAE7CX,EAAOiB,CAAM,EAAE,QAAQ,CACrB,KAAMb,EAAmB,aACzB,QAAS,CACP,sBAAuB,CACrB,KAAMM,EAAkB,WAAW,KACnC,UAAW,UACb,CACF,EACA,YAAa,MACf,CAAC,CACH,CAAC,CACH,CAAC,EAEDX,EAAS,2BAA4B,IAAM,CACzCE,EAAG,8CAA+C,IAAM,CACtD,MAAMc,EAASH,EAAW,MAAM,EAG1BK,EAFSF,EAAe,eAAe,KAAKA,CAAM,EAEnCL,CAAiB,EAEtCV,EAAOiB,CAAM,EAAE,QAAQ,CACrB,sBAAuB,CACrB,KAAMP,EAAkB,WAAW,KACnC,UAAW,UACb,CACF,CAAC,CACH,CAAC,EAEDT,EAAG,qDAAsD,IAAM,CAE7D,MAAMgB,EADSL,EAAW,MAAgB,EACX,eAAeF,CAAiB,EAE/DV,EAAOiB,CAAM,EAAE,QAAQ,CACrB,sBAAuB,CACrB,KAAMP,EAAkB,WAAW,KACnC,UAAW,UACb,CACF,CAAC,CACH,CAAC,CACH,CAAC,CACH,CAAC",
6
6
  "names": ["DeviceModelId", "Left", "Right", "beforeEach", "describe", "expect", "it", "vi", "KeyUsage", "SolanaContextTypes", "SolanaTokenContextLoader", "mockLoggerFactory", "mockDataSource", "mockCertLoader", "bytes", "tokenDataResponse", "baseCtx", "makeLoader", "mode", "config", "loader", "error", "result"]
7
7
  }
@@ -1,2 +1,2 @@
1
- var d=Object.defineProperty;var p=Object.getOwnPropertyDescriptor;var c=(n,t,r,e)=>{for(var o=e>1?void 0:e?p(t,r):t,i=n.length-1,a;i>=0;i--)(a=n[i])&&(o=(e?a(t,r,o):a(o))||o);return e&&o&&d(t,r,o),o},f=(n,t)=>(r,e)=>t(r,e,n);import g from"axios";import{inject as l,injectable as u}from"inversify";import{Left as m,Right as h}from"purify-ts";import{configTypes as E}from"../../config/di/configTypes";import{LEDGER_CLIENT_VERSION_HEADER as k}from"../../shared/constant/HttpHeaders";import C from"../../../package.json";let s=class{constructor(t){this.config=t}async getTokenInfosPayload({chainId:t,address:r}){try{const o=(await g.request({method:"GET",url:`${this.config.cal.url}/tokens`,params:{contract_address:r,chain_id:t,output:"descriptor",ref:`branch:${this.config.cal.branch}`},headers:{[k]:`context-module/${C.version}`}})).data?.[0];if(!o||!o.descriptor||!o.descriptor.data||!o.descriptor.signatures||typeof o.descriptor.signatures[this.config.cal.mode]!="string")return m(new Error(`[ContextModule] HttpTokenDataSource: no token metadata for address ${r} on chain ${t}`));const i=(o.descriptor.data.length/2-20-4-4).toString(16).padStart(2,"0");return h([i,o.descriptor.data,o.descriptor.signatures[this.config.cal.mode]].join(""))}catch{return m(new Error("[ContextModule] HttpTokenDataSource: Failed to fetch token informations"))}}};s=c([u(),f(0,l(E.Config))],s);export{s as HttpTokenDataSource};
1
+ var p=Object.defineProperty;var l=Object.getOwnPropertyDescriptor;var f=(n,o,r,e)=>{for(var t=e>1?void 0:e?l(o,r):o,i=n.length-1,s;i>=0;i--)(s=n[i])&&(t=(e?s(o,r,t):s(t))||t);return e&&t&&p(o,r,t),t},c=(n,o)=>(r,e)=>o(r,e,n);import{inject as d,injectable as g}from"inversify";import{Left as m,Right as u}from"purify-ts";import{configTypes as h}from"../../config/di/configTypes";import{networkTypes as k}from"../../network/di/networkTypes";let a=class{constructor(o,r){this.config=o;this.http=r}async getTokenInfosPayload({chainId:o,address:r}){try{const t=(await this.http.get(`${this.config.cal.url}/tokens`,{params:{contract_address:r,chain_id:o,output:"descriptor",ref:`branch:${this.config.cal.branch}`}}))?.[0];if(!t||!t.descriptor||!t.descriptor.data||!t.descriptor.signatures||typeof t.descriptor.signatures[this.config.cal.mode]!="string")return m(new Error(`[ContextModule] HttpTokenDataSource: no token metadata for address ${r} on chain ${o}`));const i=(t.descriptor.data.length/2-20-4-4).toString(16).padStart(2,"0");return u([i,t.descriptor.data,t.descriptor.signatures[this.config.cal.mode]].join(""))}catch{return m(new Error("[ContextModule] HttpTokenDataSource: Failed to fetch token informations"))}}};a=f([g(),c(0,d(h.Config)),c(1,d(k.NetworkClient))],a);export{a as HttpTokenDataSource};
2
2
  //# sourceMappingURL=HttpTokenDataSource.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/token/data/HttpTokenDataSource.ts"],
4
- "sourcesContent": ["import axios from \"axios\";\nimport { inject, injectable } from \"inversify\";\nimport { Either, Left, Right } from \"purify-ts\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport type { ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport { LEDGER_CLIENT_VERSION_HEADER } from \"@/shared/constant/HttpHeaders\";\nimport PACKAGE from \"@root/package.json\";\n\nimport { GetTokenInfosParams, TokenDataSource } from \"./TokenDataSource\";\nimport { TokenDto } from \"./TokenDto\";\n\n@injectable()\nexport class HttpTokenDataSource implements TokenDataSource {\n constructor(\n @inject(configTypes.Config) private readonly config: ContextModuleConfig,\n ) {}\n public async getTokenInfosPayload({\n chainId,\n address,\n }: GetTokenInfosParams): Promise<Either<Error, string>> {\n try {\n const response = await axios.request<TokenDto[]>({\n method: \"GET\",\n url: `${this.config.cal.url}/tokens`,\n params: {\n contract_address: address,\n chain_id: chainId,\n output: \"descriptor\",\n ref: `branch:${this.config.cal.branch}`,\n },\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: `context-module/${PACKAGE.version}`,\n },\n });\n const tokenInfos = response.data?.[0];\n\n if (\n !tokenInfos ||\n !tokenInfos.descriptor ||\n !tokenInfos.descriptor.data ||\n !tokenInfos.descriptor.signatures ||\n typeof tokenInfos.descriptor.signatures[this.config.cal.mode] !==\n \"string\"\n ) {\n return Left(\n new Error(\n `[ContextModule] HttpTokenDataSource: no token metadata for address ${address} on chain ${chainId}`,\n ),\n );\n }\n\n // According to documentation: https://github.com/LedgerHQ/app-ethereum/blob/develop/doc/ethapp.adoc#provide-erc-20-token-information\n // Signed descriptor is composed of:\n // ticker || address (20 bytes) || number of decimals (4 bytes) || chainId (4 bytes)\n const tickerLengthBuff = (\n tokenInfos.descriptor.data.length / 2 -\n 20 -\n 4 -\n 4\n )\n .toString(16)\n .padStart(2, \"0\");\n\n return Right(\n [\n tickerLengthBuff,\n tokenInfos.descriptor.data,\n tokenInfos.descriptor.signatures[this.config.cal.mode],\n ].join(\"\"),\n );\n } catch (_error) {\n return Left(\n new Error(\n \"[ContextModule] HttpTokenDataSource: Failed to fetch token informations\",\n ),\n );\n }\n }\n}\n"],
5
- "mappings": "iOAAA,OAAOA,MAAW,QAClB,OAAS,UAAAC,EAAQ,cAAAC,MAAkB,YACnC,OAAiB,QAAAC,EAAM,SAAAC,MAAa,YAEpC,OAAS,eAAAC,MAAmB,0BAE5B,OAAS,gCAAAC,MAAoC,gCAC7C,OAAOC,MAAa,qBAMb,IAAMC,EAAN,KAAqD,CAC1D,YAC+CC,EAC7C,CAD6C,YAAAA,CAC5C,CACH,MAAa,qBAAqB,CAChC,QAAAC,EACA,QAAAC,CACF,EAAwD,CACtD,GAAI,CAcF,MAAMC,GAbW,MAAMC,EAAM,QAAoB,CAC/C,OAAQ,MACR,IAAK,GAAG,KAAK,OAAO,IAAI,GAAG,UAC3B,OAAQ,CACN,iBAAkBF,EAClB,SAAUD,EACV,OAAQ,aACR,IAAK,UAAU,KAAK,OAAO,IAAI,MAAM,EACvC,EACA,QAAS,CACP,CAACI,CAA4B,EAAG,kBAAkBC,EAAQ,OAAO,EACnE,CACF,CAAC,GAC2B,OAAO,CAAC,EAEpC,GACE,CAACH,GACD,CAACA,EAAW,YACZ,CAACA,EAAW,WAAW,MACvB,CAACA,EAAW,WAAW,YACvB,OAAOA,EAAW,WAAW,WAAW,KAAK,OAAO,IAAI,IAAI,GAC1D,SAEF,OAAOI,EACL,IAAI,MACF,sEAAsEL,CAAO,aAAaD,CAAO,EACnG,CACF,EAMF,MAAMO,GACJL,EAAW,WAAW,KAAK,OAAS,EACpC,GACA,EACA,GAEC,SAAS,EAAE,EACX,SAAS,EAAG,GAAG,EAElB,OAAOM,EACL,CACED,EACAL,EAAW,WAAW,KACtBA,EAAW,WAAW,WAAW,KAAK,OAAO,IAAI,IAAI,CACvD,EAAE,KAAK,EAAE,CACX,CACF,MAAiB,CACf,OAAOI,EACL,IAAI,MACF,yEACF,CACF,CACF,CACF,CACF,EAlEaR,EAANW,EAAA,CADNC,EAAW,EAGPC,EAAA,EAAAC,EAAOC,EAAY,MAAM,IAFjBf",
6
- "names": ["axios", "inject", "injectable", "Left", "Right", "configTypes", "LEDGER_CLIENT_VERSION_HEADER", "PACKAGE", "HttpTokenDataSource", "config", "chainId", "address", "tokenInfos", "axios", "LEDGER_CLIENT_VERSION_HEADER", "PACKAGE", "Left", "tickerLengthBuff", "Right", "__decorateClass", "injectable", "__decorateParam", "inject", "configTypes"]
4
+ "sourcesContent": ["import { DmkNetworkClient } from \"@ledgerhq/device-management-kit\";\nimport { inject, injectable } from \"inversify\";\nimport { Either, Left, Right } from \"purify-ts\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport type { ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport { networkTypes } from \"@/network/di/networkTypes\";\n\nimport { GetTokenInfosParams, TokenDataSource } from \"./TokenDataSource\";\nimport { TokenDto } from \"./TokenDto\";\n\n@injectable()\nexport class HttpTokenDataSource implements TokenDataSource {\n constructor(\n @inject(configTypes.Config)\n private readonly config: ContextModuleServiceConfig,\n @inject(networkTypes.NetworkClient)\n private readonly http: DmkNetworkClient,\n ) {}\n\n public async getTokenInfosPayload({\n chainId,\n address,\n }: GetTokenInfosParams): Promise<Either<Error, string>> {\n try {\n const data = (await this.http.get(`${this.config.cal.url}/tokens`, {\n params: {\n contract_address: address,\n chain_id: chainId,\n output: \"descriptor\",\n ref: `branch:${this.config.cal.branch}`,\n },\n })) as TokenDto[];\n const tokenInfos = data?.[0];\n\n if (\n !tokenInfos ||\n !tokenInfos.descriptor ||\n !tokenInfos.descriptor.data ||\n !tokenInfos.descriptor.signatures ||\n typeof tokenInfos.descriptor.signatures[this.config.cal.mode] !==\n \"string\"\n ) {\n return Left(\n new Error(\n `[ContextModule] HttpTokenDataSource: no token metadata for address ${address} on chain ${chainId}`,\n ),\n );\n }\n\n // According to documentation: https://github.com/LedgerHQ/app-ethereum/blob/develop/doc/ethapp.adoc#provide-erc-20-token-information\n // Signed descriptor is composed of:\n // ticker || address (20 bytes) || number of decimals (4 bytes) || chainId (4 bytes)\n const tickerLengthBuff = (\n tokenInfos.descriptor.data.length / 2 -\n 20 -\n 4 -\n 4\n )\n .toString(16)\n .padStart(2, \"0\");\n\n return Right(\n [\n tickerLengthBuff,\n tokenInfos.descriptor.data,\n tokenInfos.descriptor.signatures[this.config.cal.mode],\n ].join(\"\"),\n );\n } catch (_error) {\n return Left(\n new Error(\n \"[ContextModule] HttpTokenDataSource: Failed to fetch token informations\",\n ),\n );\n }\n }\n}\n"],
5
+ "mappings": "iOACA,OAAS,UAAAA,EAAQ,cAAAC,MAAkB,YACnC,OAAiB,QAAAC,EAAM,SAAAC,MAAa,YAEpC,OAAS,eAAAC,MAAmB,0BAE5B,OAAS,gBAAAC,MAAoB,4BAMtB,IAAMC,EAAN,KAAqD,CAC1D,YAEmBC,EAEAC,EACjB,CAHiB,YAAAD,EAEA,UAAAC,CAChB,CAEH,MAAa,qBAAqB,CAChC,QAAAC,EACA,QAAAC,CACF,EAAwD,CACtD,GAAI,CASF,MAAMC,GARQ,MAAM,KAAK,KAAK,IAAI,GAAG,KAAK,OAAO,IAAI,GAAG,UAAW,CACjE,OAAQ,CACN,iBAAkBD,EAClB,SAAUD,EACV,OAAQ,aACR,IAAK,UAAU,KAAK,OAAO,IAAI,MAAM,EACvC,CACF,CAAC,KACyB,CAAC,EAE3B,GACE,CAACE,GACD,CAACA,EAAW,YACZ,CAACA,EAAW,WAAW,MACvB,CAACA,EAAW,WAAW,YACvB,OAAOA,EAAW,WAAW,WAAW,KAAK,OAAO,IAAI,IAAI,GAC1D,SAEF,OAAOC,EACL,IAAI,MACF,sEAAsEF,CAAO,aAAaD,CAAO,EACnG,CACF,EAMF,MAAMI,GACJF,EAAW,WAAW,KAAK,OAAS,EACpC,GACA,EACA,GAEC,SAAS,EAAE,EACX,SAAS,EAAG,GAAG,EAElB,OAAOG,EACL,CACED,EACAF,EAAW,WAAW,KACtBA,EAAW,WAAW,WAAW,KAAK,OAAO,IAAI,IAAI,CACvD,EAAE,KAAK,EAAE,CACX,CACF,MAAiB,CACf,OAAOC,EACL,IAAI,MACF,yEACF,CACF,CACF,CACF,CACF,EAjEaN,EAANS,EAAA,CADNC,EAAW,EAGPC,EAAA,EAAAC,EAAOC,EAAY,MAAM,GAEzBF,EAAA,EAAAC,EAAOE,EAAa,aAAa,IAJzBd",
6
+ "names": ["inject", "injectable", "Left", "Right", "configTypes", "networkTypes", "HttpTokenDataSource", "config", "http", "chainId", "address", "tokenInfos", "Left", "tickerLengthBuff", "Right", "__decorateClass", "injectable", "__decorateParam", "inject", "configTypes", "networkTypes"]
7
7
  }
@@ -1,2 +1,2 @@
1
- import o from"axios";import{Left as n}from"purify-ts";import{LEDGER_CLIENT_VERSION_HEADER as r}from"../../shared/constant/HttpHeaders";import{HttpTokenDataSource as s}from"../../token/data/HttpTokenDataSource";import c from"../../../package.json";vi.mock("axios");describe("HttpTokenDataSource",()=>{let t;beforeAll(()=>{const e={cal:{url:"https://crypto-assets-service.api.ledger.com/v1",mode:"prod",branch:"main"}};t=new s(e),vi.clearAllMocks()}),it("should call axios with the ledger client version header",async()=>{const e=`context-module/${c.version}`,a=vi.fn(()=>Promise.resolve({data:[]}));vi.spyOn(o,"request").mockImplementation(a),await t.getTokenInfosPayload({address:"0x00",chainId:1}),expect(a).toHaveBeenCalledWith(expect.objectContaining({headers:{[r]:e}}))}),it("should return a string when axios response is correct",async()=>{const e={ticker:"USDC",descriptor:{data:"555344433c499c542cef5e3811e1192ce70d8cc03d5c33590000000600000089",signatures:{prod:"0123"}}};vi.spyOn(o,"request").mockResolvedValue({data:[e]});const a=await t.getTokenInfosPayload({address:"0x00",chainId:1});expect(a.extract()).toEqual("04555344433c499c542cef5e3811e1192ce70d8cc03d5c335900000006000000890123")}),it("should return a string when axios response is correct with a prefixed ticker",async()=>{const e={ticker:"tUSDC",descriptor:{data:"7474555344431c7d4b196cb0c7b01d743fbc6116a902379c72380000000600aa36a7",signatures:{prod:"0123"}}};vi.spyOn(o,"request").mockResolvedValue({data:[e]});const a=await t.getTokenInfosPayload({address:"0x00",chainId:1});expect(a.extract()).toEqual("067474555344431c7d4b196cb0c7b01d743fbc6116a902379c72380000000600aa36a70123")}),it("should return an error when data is empty",async()=>{vi.spyOn(o,"request").mockResolvedValue({data:void 0});const e=await t.getTokenInfosPayload({address:"0x00",chainId:1});expect(e).toEqual(n(new Error("[ContextModule] HttpTokenDataSource: no token metadata for address 0x00 on chain 1")))}),it("should return undefined when no signature",async()=>{vi.spyOn(o,"request").mockResolvedValue({data:[{}]});const e=await t.getTokenInfosPayload({address:"0x00",chainId:1});expect(e).toEqual(n(new Error("[ContextModule] HttpTokenDataSource: no token metadata for address 0x00 on chain 1")))}),it("should return undefined when no decimals",async()=>{vi.spyOn(o,"request").mockResolvedValue({data:[{live_signature:"0x0",ticker:"USDC"}]});const e=await t.getTokenInfosPayload({address:"0x00",chainId:1});expect(e).toEqual(n(new Error("[ContextModule] HttpTokenDataSource: no token metadata for address 0x00 on chain 1")))}),it("should return an error when axios throws an error",async()=>{vi.spyOn(o,"request").mockRejectedValue(new Error);const e=await t.getTokenInfosPayload({address:"0x00",chainId:1});expect(e).toEqual(n(new Error("[ContextModule] HttpTokenDataSource: Failed to fetch token informations")))})});
1
+ import{Left as a}from"purify-ts";import{HttpTokenDataSource as r}from"../../token/data/HttpTokenDataSource";describe("HttpTokenDataSource",()=>{let o,t;beforeEach(()=>{vi.clearAllMocks();const e={cal:{url:"https://crypto-assets-service.api.ledger.com/v1",mode:"prod",branch:"main"}};t={get:vi.fn()},o=new r(e,t)}),it("should call the expected CAL tokens URL with params",async()=>{t.get.mockResolvedValue([]),await o.getTokenInfosPayload({address:"0x00",chainId:1}),expect(t.get).toHaveBeenCalledWith("https://crypto-assets-service.api.ledger.com/v1/tokens",{params:{contract_address:"0x00",chain_id:1,output:"descriptor",ref:"branch:main"}})}),it("should return a string when response is correct",async()=>{const e={ticker:"USDC",descriptor:{data:"555344433c499c542cef5e3811e1192ce70d8cc03d5c33590000000600000089",signatures:{prod:"0123"}}};t.get.mockResolvedValue([e]);const n=await o.getTokenInfosPayload({address:"0x00",chainId:1});expect(n.extract()).toEqual("04555344433c499c542cef5e3811e1192ce70d8cc03d5c335900000006000000890123")}),it("should return a string when response is correct with a prefixed ticker",async()=>{const e={ticker:"tUSDC",descriptor:{data:"7474555344431c7d4b196cb0c7b01d743fbc6116a902379c72380000000600aa36a7",signatures:{prod:"0123"}}};t.get.mockResolvedValue([e]);const n=await o.getTokenInfosPayload({address:"0x00",chainId:1});expect(n.extract()).toEqual("067474555344431c7d4b196cb0c7b01d743fbc6116a902379c72380000000600aa36a70123")}),it("should return an error when data is empty",async()=>{t.get.mockResolvedValue(null);const e=await o.getTokenInfosPayload({address:"0x00",chainId:1});expect(e).toEqual(a(new Error("[ContextModule] HttpTokenDataSource: no token metadata for address 0x00 on chain 1")))}),it("should return undefined when no signature",async()=>{t.get.mockResolvedValue([{}]);const e=await o.getTokenInfosPayload({address:"0x00",chainId:1});expect(e).toEqual(a(new Error("[ContextModule] HttpTokenDataSource: no token metadata for address 0x00 on chain 1")))}),it("should return undefined when no decimals",async()=>{t.get.mockResolvedValue([{live_signature:"0x0",ticker:"USDC"}]);const e=await o.getTokenInfosPayload({address:"0x00",chainId:1});expect(e).toEqual(a(new Error("[ContextModule] HttpTokenDataSource: no token metadata for address 0x00 on chain 1")))}),it("should return an error when network client throws an error",async()=>{t.get.mockRejectedValue(new Error);const e=await o.getTokenInfosPayload({address:"0x00",chainId:1});expect(e).toEqual(a(new Error("[ContextModule] HttpTokenDataSource: Failed to fetch token informations")))})});
2
2
  //# sourceMappingURL=HttpTokenDataSource.test.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/token/data/HttpTokenDataSource.test.ts"],
4
- "sourcesContent": ["import axios from \"axios\";\nimport { Left } from \"purify-ts\";\n\nimport { type ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport { LEDGER_CLIENT_VERSION_HEADER } from \"@/shared/constant/HttpHeaders\";\nimport { HttpTokenDataSource } from \"@/token/data/HttpTokenDataSource\";\nimport { type TokenDataSource } from \"@/token/data/TokenDataSource\";\nimport { type TokenDto } from \"@/token/data/TokenDto\";\nimport PACKAGE from \"@root/package.json\";\n\nvi.mock(\"axios\");\n\ndescribe(\"HttpTokenDataSource\", () => {\n let datasource: TokenDataSource;\n\n beforeAll(() => {\n const config = {\n cal: {\n url: \"https://crypto-assets-service.api.ledger.com/v1\",\n mode: \"prod\",\n branch: \"main\",\n },\n } as ContextModuleConfig;\n datasource = new HttpTokenDataSource(config);\n vi.clearAllMocks();\n });\n\n it(\"should call axios with the ledger client version header\", async () => {\n // GIVEN\n const version = `context-module/${PACKAGE.version}`;\n const requestSpy = vi.fn(() => Promise.resolve({ data: [] }));\n vi.spyOn(axios, \"request\").mockImplementation(requestSpy);\n\n // WHEN\n await datasource.getTokenInfosPayload({ address: \"0x00\", chainId: 1 });\n\n // THEN\n expect(requestSpy).toHaveBeenCalledWith(\n expect.objectContaining({\n headers: { [LEDGER_CLIENT_VERSION_HEADER]: version },\n }),\n );\n });\n\n it(\"should return a string when axios response is correct\", async () => {\n // GIVEN\n const tokenDTO: TokenDto = {\n ticker: \"USDC\",\n descriptor: {\n data: \"555344433c499c542cef5e3811e1192ce70d8cc03d5c33590000000600000089\",\n signatures: {\n prod: \"0123\",\n },\n },\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: [tokenDTO] });\n\n // WHEN\n const result = await datasource.getTokenInfosPayload({\n address: \"0x00\",\n chainId: 1,\n });\n\n // THEN\n expect(result.extract()).toEqual(\n \"04555344433c499c542cef5e3811e1192ce70d8cc03d5c335900000006000000890123\",\n );\n });\n\n it(\"should return a string when axios response is correct with a prefixed ticker\", async () => {\n // GIVEN\n const tokenDTO: TokenDto = {\n ticker: \"tUSDC\",\n descriptor: {\n data: \"7474555344431c7d4b196cb0c7b01d743fbc6116a902379c72380000000600aa36a7\",\n signatures: {\n prod: \"0123\",\n },\n },\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: [tokenDTO] });\n\n // WHEN\n const result = await datasource.getTokenInfosPayload({\n address: \"0x00\",\n chainId: 1,\n });\n\n // THEN\n expect(result.extract()).toEqual(\n \"067474555344431c7d4b196cb0c7b01d743fbc6116a902379c72380000000600aa36a70123\",\n );\n });\n\n it(\"should return an error when data is empty\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: undefined });\n\n // WHEN\n const result = await datasource.getTokenInfosPayload({\n address: \"0x00\",\n chainId: 1,\n });\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpTokenDataSource: no token metadata for address 0x00 on chain 1\",\n ),\n ),\n );\n });\n\n it(\"should return undefined when no signature\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: [{}] });\n\n // WHEN\n const result = await datasource.getTokenInfosPayload({\n address: \"0x00\",\n chainId: 1,\n });\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpTokenDataSource: no token metadata for address 0x00 on chain 1\",\n ),\n ),\n );\n });\n\n it(\"should return undefined when no decimals\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockResolvedValue({\n data: [{ live_signature: \"0x0\", ticker: \"USDC\" }],\n });\n\n // WHEN\n const result = await datasource.getTokenInfosPayload({\n address: \"0x00\",\n chainId: 1,\n });\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpTokenDataSource: no token metadata for address 0x00 on chain 1\",\n ),\n ),\n );\n });\n\n it(\"should return an error when axios throws an error\", async () => {\n // GIVEN\n vi.spyOn(axios, \"request\").mockRejectedValue(new Error());\n\n // WHEN\n const result = await datasource.getTokenInfosPayload({\n address: \"0x00\",\n chainId: 1,\n });\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpTokenDataSource: Failed to fetch token informations\",\n ),\n ),\n );\n });\n});\n"],
5
- "mappings": "AAAA,OAAOA,MAAW,QAClB,OAAS,QAAAC,MAAY,YAGrB,OAAS,gCAAAC,MAAoC,gCAC7C,OAAS,uBAAAC,MAA2B,mCAGpC,OAAOC,MAAa,qBAEpB,GAAG,KAAK,OAAO,EAEf,SAAS,sBAAuB,IAAM,CACpC,IAAIC,EAEJ,UAAU,IAAM,CACd,MAAMC,EAAS,CACb,IAAK,CACH,IAAK,kDACL,KAAM,OACN,OAAQ,MACV,CACF,EACAD,EAAa,IAAIF,EAAoBG,CAAM,EAC3C,GAAG,cAAc,CACnB,CAAC,EAED,GAAG,0DAA2D,SAAY,CAExE,MAAMC,EAAU,kBAAkBH,EAAQ,OAAO,GAC3CI,EAAa,GAAG,GAAG,IAAM,QAAQ,QAAQ,CAAE,KAAM,CAAC,CAAE,CAAC,CAAC,EAC5D,GAAG,MAAMR,EAAO,SAAS,EAAE,mBAAmBQ,CAAU,EAGxD,MAAMH,EAAW,qBAAqB,CAAE,QAAS,OAAQ,QAAS,CAAE,CAAC,EAGrE,OAAOG,CAAU,EAAE,qBACjB,OAAO,iBAAiB,CACtB,QAAS,CAAE,CAACN,CAA4B,EAAGK,CAAQ,CACrD,CAAC,CACH,CACF,CAAC,EAED,GAAG,wDAAyD,SAAY,CAEtE,MAAME,EAAqB,CACzB,OAAQ,OACR,WAAY,CACV,KAAM,mEACN,WAAY,CACV,KAAM,MACR,CACF,CACF,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAAE,KAAM,CAACS,CAAQ,CAAE,CAAC,EAGjE,MAAMC,EAAS,MAAML,EAAW,qBAAqB,CACnD,QAAS,OACT,QAAS,CACX,CAAC,EAGD,OAAOK,EAAO,QAAQ,CAAC,EAAE,QACvB,wEACF,CACF,CAAC,EAED,GAAG,+EAAgF,SAAY,CAE7F,MAAMD,EAAqB,CACzB,OAAQ,QACR,WAAY,CACV,KAAM,uEACN,WAAY,CACV,KAAM,MACR,CACF,CACF,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAAE,KAAM,CAACS,CAAQ,CAAE,CAAC,EAGjE,MAAMC,EAAS,MAAML,EAAW,qBAAqB,CACnD,QAAS,OACT,QAAS,CACX,CAAC,EAGD,OAAOK,EAAO,QAAQ,CAAC,EAAE,QACvB,4EACF,CACF,CAAC,EAED,GAAG,4CAA6C,SAAY,CAE1D,GAAG,MAAMV,EAAO,SAAS,EAAE,kBAAkB,CAAE,KAAM,MAAU,CAAC,EAGhE,MAAMU,EAAS,MAAML,EAAW,qBAAqB,CACnD,QAAS,OACT,QAAS,CACX,CAAC,EAGD,OAAOK,CAAM,EAAE,QACbT,EACE,IAAI,MACF,oFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,4CAA6C,SAAY,CAE1D,GAAG,MAAMD,EAAO,SAAS,EAAE,kBAAkB,CAAE,KAAM,CAAC,CAAC,CAAC,CAAE,CAAC,EAG3D,MAAMU,EAAS,MAAML,EAAW,qBAAqB,CACnD,QAAS,OACT,QAAS,CACX,CAAC,EAGD,OAAOK,CAAM,EAAE,QACbT,EACE,IAAI,MACF,oFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,2CAA4C,SAAY,CAEzD,GAAG,MAAMD,EAAO,SAAS,EAAE,kBAAkB,CAC3C,KAAM,CAAC,CAAE,eAAgB,MAAO,OAAQ,MAAO,CAAC,CAClD,CAAC,EAGD,MAAMU,EAAS,MAAML,EAAW,qBAAqB,CACnD,QAAS,OACT,QAAS,CACX,CAAC,EAGD,OAAOK,CAAM,EAAE,QACbT,EACE,IAAI,MACF,oFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,oDAAqD,SAAY,CAElE,GAAG,MAAMD,EAAO,SAAS,EAAE,kBAAkB,IAAI,KAAO,EAGxD,MAAMU,EAAS,MAAML,EAAW,qBAAqB,CACnD,QAAS,OACT,QAAS,CACX,CAAC,EAGD,OAAOK,CAAM,EAAE,QACbT,EACE,IAAI,MACF,yEACF,CACF,CACF,CACF,CAAC,CACH,CAAC",
6
- "names": ["axios", "Left", "LEDGER_CLIENT_VERSION_HEADER", "HttpTokenDataSource", "PACKAGE", "datasource", "config", "version", "requestSpy", "tokenDTO", "result"]
4
+ "sourcesContent": ["import { type DmkNetworkClient } from \"@ledgerhq/device-management-kit\";\nimport { Left } from \"purify-ts\";\n\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport { HttpTokenDataSource } from \"@/token/data/HttpTokenDataSource\";\nimport { type TokenDataSource } from \"@/token/data/TokenDataSource\";\nimport { type TokenDto } from \"@/token/data/TokenDto\";\n\ndescribe(\"HttpTokenDataSource\", () => {\n let datasource: TokenDataSource;\n let httpMock: { get: ReturnType<typeof vi.fn> };\n\n beforeEach(() => {\n vi.clearAllMocks();\n const config = {\n cal: {\n url: \"https://crypto-assets-service.api.ledger.com/v1\",\n mode: \"prod\",\n branch: \"main\",\n },\n } as ContextModuleServiceConfig;\n httpMock = { get: vi.fn() };\n datasource = new HttpTokenDataSource(\n config,\n httpMock as unknown as DmkNetworkClient,\n );\n });\n\n it(\"should call the expected CAL tokens URL with params\", async () => {\n // GIVEN\n httpMock.get.mockResolvedValue([]);\n\n // WHEN\n await datasource.getTokenInfosPayload({ address: \"0x00\", chainId: 1 });\n\n // THEN\n expect(httpMock.get).toHaveBeenCalledWith(\n \"https://crypto-assets-service.api.ledger.com/v1/tokens\",\n {\n params: {\n contract_address: \"0x00\",\n chain_id: 1,\n output: \"descriptor\",\n ref: \"branch:main\",\n },\n },\n );\n });\n\n it(\"should return a string when response is correct\", async () => {\n // GIVEN\n const tokenDTO: TokenDto = {\n ticker: \"USDC\",\n descriptor: {\n data: \"555344433c499c542cef5e3811e1192ce70d8cc03d5c33590000000600000089\",\n signatures: {\n prod: \"0123\",\n },\n },\n };\n httpMock.get.mockResolvedValue([tokenDTO]);\n\n // WHEN\n const result = await datasource.getTokenInfosPayload({\n address: \"0x00\",\n chainId: 1,\n });\n\n // THEN\n expect(result.extract()).toEqual(\n \"04555344433c499c542cef5e3811e1192ce70d8cc03d5c335900000006000000890123\",\n );\n });\n\n it(\"should return a string when response is correct with a prefixed ticker\", async () => {\n // GIVEN\n const tokenDTO: TokenDto = {\n ticker: \"tUSDC\",\n descriptor: {\n data: \"7474555344431c7d4b196cb0c7b01d743fbc6116a902379c72380000000600aa36a7\",\n signatures: {\n prod: \"0123\",\n },\n },\n };\n httpMock.get.mockResolvedValue([tokenDTO]);\n\n // WHEN\n const result = await datasource.getTokenInfosPayload({\n address: \"0x00\",\n chainId: 1,\n });\n\n // THEN\n expect(result.extract()).toEqual(\n \"067474555344431c7d4b196cb0c7b01d743fbc6116a902379c72380000000600aa36a70123\",\n );\n });\n\n it(\"should return an error when data is empty\", async () => {\n // GIVEN\n httpMock.get.mockResolvedValue(null);\n\n // WHEN\n const result = await datasource.getTokenInfosPayload({\n address: \"0x00\",\n chainId: 1,\n });\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpTokenDataSource: no token metadata for address 0x00 on chain 1\",\n ),\n ),\n );\n });\n\n it(\"should return undefined when no signature\", async () => {\n // GIVEN\n httpMock.get.mockResolvedValue([{}]);\n\n // WHEN\n const result = await datasource.getTokenInfosPayload({\n address: \"0x00\",\n chainId: 1,\n });\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpTokenDataSource: no token metadata for address 0x00 on chain 1\",\n ),\n ),\n );\n });\n\n it(\"should return undefined when no decimals\", async () => {\n // GIVEN\n httpMock.get.mockResolvedValue([{ live_signature: \"0x0\", ticker: \"USDC\" }]);\n\n // WHEN\n const result = await datasource.getTokenInfosPayload({\n address: \"0x00\",\n chainId: 1,\n });\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpTokenDataSource: no token metadata for address 0x00 on chain 1\",\n ),\n ),\n );\n });\n\n it(\"should return an error when network client throws an error\", async () => {\n // GIVEN\n httpMock.get.mockRejectedValue(new Error());\n\n // WHEN\n const result = await datasource.getTokenInfosPayload({\n address: \"0x00\",\n chainId: 1,\n });\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpTokenDataSource: Failed to fetch token informations\",\n ),\n ),\n );\n });\n});\n"],
5
+ "mappings": "AACA,OAAS,QAAAA,MAAY,YAGrB,OAAS,uBAAAC,MAA2B,mCAIpC,SAAS,sBAAuB,IAAM,CACpC,IAAIC,EACAC,EAEJ,WAAW,IAAM,CACf,GAAG,cAAc,EACjB,MAAMC,EAAS,CACb,IAAK,CACH,IAAK,kDACL,KAAM,OACN,OAAQ,MACV,CACF,EACAD,EAAW,CAAE,IAAK,GAAG,GAAG,CAAE,EAC1BD,EAAa,IAAID,EACfG,EACAD,CACF,CACF,CAAC,EAED,GAAG,sDAAuD,SAAY,CAEpEA,EAAS,IAAI,kBAAkB,CAAC,CAAC,EAGjC,MAAMD,EAAW,qBAAqB,CAAE,QAAS,OAAQ,QAAS,CAAE,CAAC,EAGrE,OAAOC,EAAS,GAAG,EAAE,qBACnB,yDACA,CACE,OAAQ,CACN,iBAAkB,OAClB,SAAU,EACV,OAAQ,aACR,IAAK,aACP,CACF,CACF,CACF,CAAC,EAED,GAAG,kDAAmD,SAAY,CAEhE,MAAME,EAAqB,CACzB,OAAQ,OACR,WAAY,CACV,KAAM,mEACN,WAAY,CACV,KAAM,MACR,CACF,CACF,EACAF,EAAS,IAAI,kBAAkB,CAACE,CAAQ,CAAC,EAGzC,MAAMC,EAAS,MAAMJ,EAAW,qBAAqB,CACnD,QAAS,OACT,QAAS,CACX,CAAC,EAGD,OAAOI,EAAO,QAAQ,CAAC,EAAE,QACvB,wEACF,CACF,CAAC,EAED,GAAG,yEAA0E,SAAY,CAEvF,MAAMD,EAAqB,CACzB,OAAQ,QACR,WAAY,CACV,KAAM,uEACN,WAAY,CACV,KAAM,MACR,CACF,CACF,EACAF,EAAS,IAAI,kBAAkB,CAACE,CAAQ,CAAC,EAGzC,MAAMC,EAAS,MAAMJ,EAAW,qBAAqB,CACnD,QAAS,OACT,QAAS,CACX,CAAC,EAGD,OAAOI,EAAO,QAAQ,CAAC,EAAE,QACvB,4EACF,CACF,CAAC,EAED,GAAG,4CAA6C,SAAY,CAE1DH,EAAS,IAAI,kBAAkB,IAAI,EAGnC,MAAMG,EAAS,MAAMJ,EAAW,qBAAqB,CACnD,QAAS,OACT,QAAS,CACX,CAAC,EAGD,OAAOI,CAAM,EAAE,QACbN,EACE,IAAI,MACF,oFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,4CAA6C,SAAY,CAE1DG,EAAS,IAAI,kBAAkB,CAAC,CAAC,CAAC,CAAC,EAGnC,MAAMG,EAAS,MAAMJ,EAAW,qBAAqB,CACnD,QAAS,OACT,QAAS,CACX,CAAC,EAGD,OAAOI,CAAM,EAAE,QACbN,EACE,IAAI,MACF,oFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,2CAA4C,SAAY,CAEzDG,EAAS,IAAI,kBAAkB,CAAC,CAAE,eAAgB,MAAO,OAAQ,MAAO,CAAC,CAAC,EAG1E,MAAMG,EAAS,MAAMJ,EAAW,qBAAqB,CACnD,QAAS,OACT,QAAS,CACX,CAAC,EAGD,OAAOI,CAAM,EAAE,QACbN,EACE,IAAI,MACF,oFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,6DAA8D,SAAY,CAE3EG,EAAS,IAAI,kBAAkB,IAAI,KAAO,EAG1C,MAAMG,EAAS,MAAMJ,EAAW,qBAAqB,CACnD,QAAS,OACT,QAAS,CACX,CAAC,EAGD,OAAOI,CAAM,EAAE,QACbN,EACE,IAAI,MACF,yEACF,CACF,CACF,CACF,CAAC,CACH,CAAC",
6
+ "names": ["Left", "HttpTokenDataSource", "datasource", "httpMock", "config", "tokenDTO", "result"]
7
7
  }
@@ -1,2 +1,2 @@
1
- var m=Object.defineProperty;var u=Object.getOwnPropertyDescriptor;var s=(i,r,o,e)=>{for(var t=e>1?void 0:e?u(r,o):r,n=i.length-1,c;n>=0;n--)(c=i[n])&&(t=(e?c(r,o,t):c(t))||t);return e&&t&&m(r,o,t),t},p=(i,r)=>(o,e)=>r(o,e,i);import f from"axios";import{inject as C,injectable as k}from"inversify";import{Left as h,Right as d}from"purify-ts";import{configTypes as E}from"../../config/di/configTypes";import{LEDGER_CLIENT_VERSION_HEADER as _,LEDGER_ORIGIN_TOKEN_HEADER as T}from"../../shared/constant/HttpHeaders";import y from"../../../package.json";let a=class{constructor(r){this.config=r}async getTransactionCheck({chainId:r,rawTx:o,from:e}){let t;const n={tx:{from:e,raw:o},chain:r};try{t=(await f.request({method:"POST",url:`${this.config.web3checks.url}/ethereum/scan/tx`,data:n,headers:{[_]:`context-module/${y.version}`,[T]:this.config.originToken}})).data}catch{return h(new Error("[ContextModule] HttpTransactionCheckDataSource: Failed to fetch web3 checks information"))}if(!this._isTransactionCheckDto(t))return h(new Error("[ContextModule] HttpTransactionCheckDataSource: Cannot exploit transaction check data received"));const c={publicKeyId:t.public_key_id,descriptor:t.descriptor};return d(c)}_isTransactionCheckDto(r){return r!=null&&typeof r=="object"&&"public_key_id"in r&&r.public_key_id!=null&&typeof r.public_key_id=="string"&&"descriptor"in r&&r.descriptor!=null&&typeof r.descriptor=="string"}};a=s([k(),p(0,C(E.Config))],a);export{a as HttpTransactionCheckDataSource};
1
+ var k=Object.defineProperty;var m=Object.getOwnPropertyDescriptor;var p=(i,t,r,o)=>{for(var e=o>1?void 0:o?m(t,r):t,n=i.length-1,c;n>=0;n--)(c=i[n])&&(e=(o?c(t,r,e):c(e))||e);return o&&e&&k(t,r,e),e},s=(i,t)=>(r,o)=>t(r,o,i);import{inject as l,injectable as C}from"inversify";import{Left as h,Right as u}from"purify-ts";import{configTypes as f}from"../../config/di/configTypes";import{networkTypes as y}from"../../network/di/networkTypes";let a=class{constructor(t,r){this.config=t;this.http=r}async getTransactionCheck({chainId:t,rawTx:r,from:o}){let e;const n={tx:{from:o,raw:r},chain:t};try{e=await this.http.post(`${this.config.web3checks.url}/ethereum/scan/tx`,n)}catch{return h(new Error("[ContextModule] HttpTransactionCheckDataSource: Failed to fetch web3 checks information"))}if(!this._isTransactionCheckDto(e))return h(new Error("[ContextModule] HttpTransactionCheckDataSource: Cannot exploit transaction check data received"));const c={publicKeyId:e.public_key_id,descriptor:e.descriptor};return u(c)}_isTransactionCheckDto(t){return t!=null&&typeof t=="object"&&"public_key_id"in t&&t.public_key_id!=null&&typeof t.public_key_id=="string"&&"descriptor"in t&&t.descriptor!=null&&typeof t.descriptor=="string"}};a=p([C(),s(0,l(f.Config)),s(1,l(y.NetworkClient))],a);export{a as HttpTransactionCheckDataSource};
2
2
  //# sourceMappingURL=HttpTransactionCheckDataSource.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/transaction-check/data/HttpTransactionCheckDataSource.ts"],
4
- "sourcesContent": ["import axios from \"axios\";\nimport { inject, injectable } from \"inversify\";\nimport { Either, Left, Right } from \"purify-ts\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport { type ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport {\n LEDGER_CLIENT_VERSION_HEADER,\n LEDGER_ORIGIN_TOKEN_HEADER,\n} from \"@/shared/constant/HttpHeaders\";\nimport PACKAGE from \"@root/package.json\";\n\nimport { TransactionCheckDto } from \"./dto/TransactionCheckDto\";\nimport {\n GetTransactionCheckParams,\n TransactionCheck,\n} from \"./TransactionCheckDataSource\";\n\n@injectable()\nexport class HttpTransactionCheckDataSource {\n constructor(\n @inject(configTypes.Config) private readonly config: ContextModuleConfig,\n ) {}\n\n public async getTransactionCheck({\n chainId,\n rawTx,\n from,\n }: GetTransactionCheckParams): Promise<Either<Error, TransactionCheck>> {\n let transactionCheckDto: TransactionCheckDto;\n const requestDto = {\n tx: {\n from,\n raw: rawTx,\n },\n chain: chainId,\n };\n\n try {\n const response = await axios.request<TransactionCheckDto>({\n method: \"POST\",\n url: `${this.config.web3checks.url}/ethereum/scan/tx`,\n data: requestDto,\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: `context-module/${PACKAGE.version}`,\n [LEDGER_ORIGIN_TOKEN_HEADER]: this.config.originToken,\n },\n });\n transactionCheckDto = response.data;\n } catch (_error) {\n return Left(\n new Error(\n \"[ContextModule] HttpTransactionCheckDataSource: Failed to fetch web3 checks information\",\n ),\n );\n }\n\n if (!this._isTransactionCheckDto(transactionCheckDto)) {\n return Left(\n new Error(\n \"[ContextModule] HttpTransactionCheckDataSource: Cannot exploit transaction check data received\",\n ),\n );\n }\n const result: TransactionCheck = {\n publicKeyId: transactionCheckDto.public_key_id,\n descriptor: transactionCheckDto.descriptor,\n };\n\n return Right(result);\n }\n\n private _isTransactionCheckDto(dto: unknown): dto is TransactionCheckDto {\n return (\n dto != null &&\n typeof dto == \"object\" &&\n \"public_key_id\" in dto &&\n dto.public_key_id != null &&\n typeof dto.public_key_id == \"string\" &&\n \"descriptor\" in dto &&\n dto.descriptor != null &&\n typeof dto.descriptor == \"string\"\n );\n }\n}\n"],
5
- "mappings": "iOAAA,OAAOA,MAAW,QAClB,OAAS,UAAAC,EAAQ,cAAAC,MAAkB,YACnC,OAAiB,QAAAC,EAAM,SAAAC,MAAa,YAEpC,OAAS,eAAAC,MAAmB,0BAE5B,OACE,gCAAAC,EACA,8BAAAC,MACK,gCACP,OAAOC,MAAa,qBASb,IAAMC,EAAN,KAAqC,CAC1C,YAC+CC,EAC7C,CAD6C,YAAAA,CAC5C,CAEH,MAAa,oBAAoB,CAC/B,QAAAC,EACA,MAAAC,EACA,KAAAC,CACF,EAAwE,CACtE,IAAIC,EACJ,MAAMC,EAAa,CACjB,GAAI,CACF,KAAAF,EACA,IAAKD,CACP,EACA,MAAOD,CACT,EAEA,GAAI,CAUFG,GATiB,MAAME,EAAM,QAA6B,CACxD,OAAQ,OACR,IAAK,GAAG,KAAK,OAAO,WAAW,GAAG,oBAClC,KAAMD,EACN,QAAS,CACP,CAACE,CAA4B,EAAG,kBAAkBC,EAAQ,OAAO,GACjE,CAACC,CAA0B,EAAG,KAAK,OAAO,WAC5C,CACF,CAAC,GAC8B,IACjC,MAAiB,CACf,OAAOC,EACL,IAAI,MACF,yFACF,CACF,CACF,CAEA,GAAI,CAAC,KAAK,uBAAuBN,CAAmB,EAClD,OAAOM,EACL,IAAI,MACF,gGACF,CACF,EAEF,MAAMC,EAA2B,CAC/B,YAAaP,EAAoB,cACjC,WAAYA,EAAoB,UAClC,EAEA,OAAOQ,EAAMD,CAAM,CACrB,CAEQ,uBAAuBE,EAA0C,CACvE,OACEA,GAAO,MACP,OAAOA,GAAO,UACd,kBAAmBA,GACnBA,EAAI,eAAiB,MACrB,OAAOA,EAAI,eAAiB,UAC5B,eAAgBA,GAChBA,EAAI,YAAc,MAClB,OAAOA,EAAI,YAAc,QAE7B,CACF,EAjEad,EAANe,EAAA,CADNC,EAAW,EAGPC,EAAA,EAAAC,EAAOC,EAAY,MAAM,IAFjBnB",
6
- "names": ["axios", "inject", "injectable", "Left", "Right", "configTypes", "LEDGER_CLIENT_VERSION_HEADER", "LEDGER_ORIGIN_TOKEN_HEADER", "PACKAGE", "HttpTransactionCheckDataSource", "config", "chainId", "rawTx", "from", "transactionCheckDto", "requestDto", "axios", "LEDGER_CLIENT_VERSION_HEADER", "PACKAGE", "LEDGER_ORIGIN_TOKEN_HEADER", "Left", "result", "Right", "dto", "__decorateClass", "injectable", "__decorateParam", "inject", "configTypes"]
4
+ "sourcesContent": ["import { DmkNetworkClient } from \"@ledgerhq/device-management-kit\";\nimport { inject, injectable } from \"inversify\";\nimport { Either, Left, Right } from \"purify-ts\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport { networkTypes } from \"@/network/di/networkTypes\";\n\nimport { TransactionCheckDto } from \"./dto/TransactionCheckDto\";\nimport {\n GetTransactionCheckParams,\n TransactionCheck,\n} from \"./TransactionCheckDataSource\";\n\n@injectable()\nexport class HttpTransactionCheckDataSource {\n constructor(\n @inject(configTypes.Config)\n private readonly config: ContextModuleServiceConfig,\n @inject(networkTypes.NetworkClient)\n private readonly http: DmkNetworkClient,\n ) {}\n\n public async getTransactionCheck({\n chainId,\n rawTx,\n from,\n }: GetTransactionCheckParams): Promise<Either<Error, TransactionCheck>> {\n let transactionCheckDto: TransactionCheckDto;\n const requestDto = {\n tx: {\n from,\n raw: rawTx,\n },\n chain: chainId,\n };\n\n try {\n transactionCheckDto = (await this.http.post(\n `${this.config.web3checks.url}/ethereum/scan/tx`,\n requestDto,\n )) as TransactionCheckDto;\n } catch (_error) {\n return Left(\n new Error(\n \"[ContextModule] HttpTransactionCheckDataSource: Failed to fetch web3 checks information\",\n ),\n );\n }\n\n if (!this._isTransactionCheckDto(transactionCheckDto)) {\n return Left(\n new Error(\n \"[ContextModule] HttpTransactionCheckDataSource: Cannot exploit transaction check data received\",\n ),\n );\n }\n const result: TransactionCheck = {\n publicKeyId: transactionCheckDto.public_key_id,\n descriptor: transactionCheckDto.descriptor,\n };\n\n return Right(result);\n }\n\n private _isTransactionCheckDto(dto: unknown): dto is TransactionCheckDto {\n return (\n dto != null &&\n typeof dto == \"object\" &&\n \"public_key_id\" in dto &&\n dto.public_key_id != null &&\n typeof dto.public_key_id == \"string\" &&\n \"descriptor\" in dto &&\n dto.descriptor != null &&\n typeof dto.descriptor == \"string\"\n );\n }\n}\n"],
5
+ "mappings": "iOACA,OAAS,UAAAA,EAAQ,cAAAC,MAAkB,YACnC,OAAiB,QAAAC,EAAM,SAAAC,MAAa,YAEpC,OAAS,eAAAC,MAAmB,0BAE5B,OAAS,gBAAAC,MAAoB,4BAStB,IAAMC,EAAN,KAAqC,CAC1C,YAEmBC,EAEAC,EACjB,CAHiB,YAAAD,EAEA,UAAAC,CAChB,CAEH,MAAa,oBAAoB,CAC/B,QAAAC,EACA,MAAAC,EACA,KAAAC,CACF,EAAwE,CACtE,IAAIC,EACJ,MAAMC,EAAa,CACjB,GAAI,CACF,KAAAF,EACA,IAAKD,CACP,EACA,MAAOD,CACT,EAEA,GAAI,CACFG,EAAuB,MAAM,KAAK,KAAK,KACrC,GAAG,KAAK,OAAO,WAAW,GAAG,oBAC7BC,CACF,CACF,MAAiB,CACf,OAAOC,EACL,IAAI,MACF,yFACF,CACF,CACF,CAEA,GAAI,CAAC,KAAK,uBAAuBF,CAAmB,EAClD,OAAOE,EACL,IAAI,MACF,gGACF,CACF,EAEF,MAAMC,EAA2B,CAC/B,YAAaH,EAAoB,cACjC,WAAYA,EAAoB,UAClC,EAEA,OAAOI,EAAMD,CAAM,CACrB,CAEQ,uBAAuBE,EAA0C,CACvE,OACEA,GAAO,MACP,OAAOA,GAAO,UACd,kBAAmBA,GACnBA,EAAI,eAAiB,MACrB,OAAOA,EAAI,eAAiB,UAC5B,eAAgBA,GAChBA,EAAI,YAAc,MAClB,OAAOA,EAAI,YAAc,QAE7B,CACF,EA9DaX,EAANY,EAAA,CADNC,EAAW,EAGPC,EAAA,EAAAC,EAAOC,EAAY,MAAM,GAEzBF,EAAA,EAAAC,EAAOE,EAAa,aAAa,IAJzBjB",
6
+ "names": ["inject", "injectable", "Left", "Right", "configTypes", "networkTypes", "HttpTransactionCheckDataSource", "config", "http", "chainId", "rawTx", "from", "transactionCheckDto", "requestDto", "Left", "result", "Right", "dto", "__decorateClass", "injectable", "__decorateParam", "inject", "configTypes", "networkTypes"]
7
7
  }
@@ -1,2 +1,2 @@
1
- import a from"axios";import{Left as s,Right as i}from"purify-ts";import{LEDGER_CLIENT_VERSION_HEADER as d,LEDGER_ORIGIN_TOKEN_HEADER as u}from"../../shared/constant/HttpHeaders";import{HttpTransactionCheckDataSource as c}from"../../transaction-check/data/HttpTransactionCheckDataSource";import h from"../../../package.json";vi.mock("axios");describe("HttpTransactionCheckDataSource",()=>{const o={web3checks:{url:"web3checksUrl"},originToken:"originToken"};beforeEach(()=>{vi.resetAllMocks()}),describe("getTransactionCheck",()=>{it("should return an object if the request is successful",async()=>{const e={from:"0x1234567890123456789012345678901234567890",rawTx:"0xabcdef",chainId:1},t={public_key_id:"test-key-id",descriptor:"test-descriptor"};vi.spyOn(a,"request").mockResolvedValueOnce({data:t});const r=await new c(o).getTransactionCheck(e);expect(r).toEqual(i({publicKeyId:"test-key-id",descriptor:"test-descriptor"}))}),it("should return an error if the request fails",async()=>{const e={from:"0x1234567890123456789012345678901234567890",rawTx:"0xabcdef",chainId:1};vi.spyOn(a,"request").mockRejectedValue(new Error("error"));const n=await new c(o).getTransactionCheck(e);expect(n).toEqual(s(new Error("[ContextModule] HttpTransactionCheckDataSource: Failed to fetch web3 checks information")))}),it("should return an error if the response is invalid",async()=>{const e={from:"0x1234567890123456789012345678901234567890",rawTx:"0xabcdef",chainId:1},t={};vi.spyOn(a,"request").mockResolvedValue({data:t});const r=await new c(o).getTransactionCheck(e);expect(r).toEqual(s(new Error("[ContextModule] HttpTransactionCheckDataSource: Cannot exploit transaction check data received")))}),it("should return an error if public_key_id is missing",async()=>{const e={from:"0x1234567890123456789012345678901234567890",rawTx:"0xabcdef",chainId:1},t={descriptor:"test-descriptor"};vi.spyOn(a,"request").mockResolvedValue({data:t});const r=await new c(o).getTransactionCheck(e);expect(r).toEqual(s(new Error("[ContextModule] HttpTransactionCheckDataSource: Cannot exploit transaction check data received")))}),it("should return an error if descriptor is missing",async()=>{const e={from:"0x1234567890123456789012345678901234567890",rawTx:"0xabcdef",chainId:1},t={public_key_id:"test-key-id"};vi.spyOn(a,"request").mockResolvedValue({data:t});const r=await new c(o).getTransactionCheck(e);expect(r).toEqual(s(new Error("[ContextModule] HttpTransactionCheckDataSource: Cannot exploit transaction check data received")))}),it("should call axios with the correct headers",async()=>{const e={from:"0x1234567890123456789012345678901234567890",rawTx:"0xabcdef",chainId:1};vi.spyOn(a,"request").mockResolvedValueOnce({data:{}}),await new c(o).getTransactionCheck(e),expect(a.request).toHaveBeenCalledWith(expect.objectContaining({headers:{[d]:`context-module/${h.version}`,[u]:o.originToken}}))}),it("should call axios with the correct URL and method",async()=>{const e={from:"0x1234567890123456789012345678901234567890",rawTx:"0xabcdef",chainId:1};vi.spyOn(a,"request").mockResolvedValueOnce({data:{}}),await new c(o).getTransactionCheck(e),expect(a.request).toHaveBeenCalledWith(expect.objectContaining({method:"POST",url:`${o.web3checks.url}/ethereum/scan/tx`}))}),it("should call axios with the correct request data",async()=>{const e={from:"0x1234567890123456789012345678901234567890",rawTx:"0xabcdef",chainId:1};vi.spyOn(a,"request").mockResolvedValueOnce({data:{}}),await new c(o).getTransactionCheck(e),expect(a.request).toHaveBeenCalledWith(expect.objectContaining({data:{tx:{from:"0x1234567890123456789012345678901234567890",raw:"0xabcdef"},chain:1}}))})})});
1
+ import{Left as r,Right as s}from"purify-ts";import{HttpTransactionCheckDataSource as i}from"../../transaction-check/data/HttpTransactionCheckDataSource";describe("HttpTransactionCheckDataSource",()=>{const c={web3checks:{url:"https://web3checks.test"},originToken:"originToken"};let t,o;beforeEach(()=>{vi.resetAllMocks(),t={post:vi.fn()},o=new i(c,t)}),describe("getTransactionCheck",()=>{it("should return an object if the request is successful",async()=>{const e={from:"0x1234567890123456789012345678901234567890",rawTx:"0xabcdef",chainId:1},a={public_key_id:"test-key-id",descriptor:"test-descriptor"};t.post.mockResolvedValueOnce(a);const n=await o.getTransactionCheck(e);expect(n).toEqual(s({publicKeyId:"test-key-id",descriptor:"test-descriptor"}))}),it("should return an error if the request fails",async()=>{const e={from:"0x1234567890123456789012345678901234567890",rawTx:"0xabcdef",chainId:1};t.post.mockRejectedValue(new Error("error"));const a=await o.getTransactionCheck(e);expect(a).toEqual(r(new Error("[ContextModule] HttpTransactionCheckDataSource: Failed to fetch web3 checks information")))}),it("should return an error if the response is invalid",async()=>{const e={from:"0x1234567890123456789012345678901234567890",rawTx:"0xabcdef",chainId:1};t.post.mockResolvedValue({});const a=await o.getTransactionCheck(e);expect(a).toEqual(r(new Error("[ContextModule] HttpTransactionCheckDataSource: Cannot exploit transaction check data received")))}),it("should return an error if public_key_id is missing",async()=>{const e={from:"0x1234567890123456789012345678901234567890",rawTx:"0xabcdef",chainId:1};t.post.mockResolvedValue({descriptor:"test-descriptor"});const a=await o.getTransactionCheck(e);expect(a).toEqual(r(new Error("[ContextModule] HttpTransactionCheckDataSource: Cannot exploit transaction check data received")))}),it("should return an error if descriptor is missing",async()=>{const e={from:"0x1234567890123456789012345678901234567890",rawTx:"0xabcdef",chainId:1};t.post.mockResolvedValue({public_key_id:"test-key-id"});const a=await o.getTransactionCheck(e);expect(a).toEqual(r(new Error("[ContextModule] HttpTransactionCheckDataSource: Cannot exploit transaction check data received")))}),it("should call http.post with the correct URL and body",async()=>{const e={from:"0x1234567890123456789012345678901234567890",rawTx:"0xabcdef",chainId:1};t.post.mockResolvedValueOnce({}),await o.getTransactionCheck(e),expect(t.post).toHaveBeenCalledWith(`${c.web3checks.url}/ethereum/scan/tx`,{tx:{from:"0x1234567890123456789012345678901234567890",raw:"0xabcdef"},chain:1})})})});
2
2
  //# sourceMappingURL=HttpTransactionCheckDataSource.test.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/transaction-check/data/HttpTransactionCheckDataSource.test.ts"],
4
- "sourcesContent": ["import axios from \"axios\";\nimport { Left, Right } from \"purify-ts\";\n\nimport { type ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport {\n LEDGER_CLIENT_VERSION_HEADER,\n LEDGER_ORIGIN_TOKEN_HEADER,\n} from \"@/shared/constant/HttpHeaders\";\nimport { type TransactionCheckDto } from \"@/transaction-check/data/dto/TransactionCheckDto\";\nimport { HttpTransactionCheckDataSource } from \"@/transaction-check/data/HttpTransactionCheckDataSource\";\nimport { type GetTransactionCheckParams } from \"@/transaction-check/data/TransactionCheckDataSource\";\nimport PACKAGE from \"@root/package.json\";\n\nvi.mock(\"axios\");\n\ndescribe(\"HttpTransactionCheckDataSource\", () => {\n const config = {\n web3checks: {\n url: \"web3checksUrl\",\n },\n originToken: \"originToken\",\n } as ContextModuleConfig;\n\n beforeEach(() => {\n vi.resetAllMocks();\n });\n\n describe(\"getTransactionCheck\", () => {\n it(\"should return an object if the request is successful\", async () => {\n // GIVEN\n const params: GetTransactionCheckParams = {\n from: \"0x1234567890123456789012345678901234567890\",\n rawTx: \"0xabcdef\",\n chainId: 1,\n };\n const dto: TransactionCheckDto = {\n public_key_id: \"test-key-id\",\n descriptor: \"test-descriptor\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValueOnce({ data: dto });\n\n // WHEN\n const dataSource = new HttpTransactionCheckDataSource(config);\n const result = await dataSource.getTransactionCheck(params);\n\n // THEN\n expect(result).toEqual(\n Right({\n publicKeyId: \"test-key-id\",\n descriptor: \"test-descriptor\",\n }),\n );\n });\n\n it(\"should return an error if the request fails\", async () => {\n // GIVEN\n const params: GetTransactionCheckParams = {\n from: \"0x1234567890123456789012345678901234567890\",\n rawTx: \"0xabcdef\",\n chainId: 1,\n };\n vi.spyOn(axios, \"request\").mockRejectedValue(new Error(\"error\"));\n\n // WHEN\n const dataSource = new HttpTransactionCheckDataSource(config);\n const result = await dataSource.getTransactionCheck(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpTransactionCheckDataSource: Failed to fetch web3 checks information\",\n ),\n ),\n );\n });\n\n it(\"should return an error if the response is invalid\", async () => {\n // GIVEN\n const params: GetTransactionCheckParams = {\n from: \"0x1234567890123456789012345678901234567890\",\n rawTx: \"0xabcdef\",\n chainId: 1,\n };\n const dto = {};\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: dto });\n\n // WHEN\n const dataSource = new HttpTransactionCheckDataSource(config);\n const result = await dataSource.getTransactionCheck(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpTransactionCheckDataSource: Cannot exploit transaction check data received\",\n ),\n ),\n );\n });\n\n it(\"should return an error if public_key_id is missing\", async () => {\n // GIVEN\n const params: GetTransactionCheckParams = {\n from: \"0x1234567890123456789012345678901234567890\",\n rawTx: \"0xabcdef\",\n chainId: 1,\n };\n const dto = {\n descriptor: \"test-descriptor\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: dto });\n\n // WHEN\n const dataSource = new HttpTransactionCheckDataSource(config);\n const result = await dataSource.getTransactionCheck(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpTransactionCheckDataSource: Cannot exploit transaction check data received\",\n ),\n ),\n );\n });\n\n it(\"should return an error if descriptor is missing\", async () => {\n // GIVEN\n const params: GetTransactionCheckParams = {\n from: \"0x1234567890123456789012345678901234567890\",\n rawTx: \"0xabcdef\",\n chainId: 1,\n };\n const dto = {\n public_key_id: \"test-key-id\",\n };\n vi.spyOn(axios, \"request\").mockResolvedValue({ data: dto });\n\n // WHEN\n const dataSource = new HttpTransactionCheckDataSource(config);\n const result = await dataSource.getTransactionCheck(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpTransactionCheckDataSource: Cannot exploit transaction check data received\",\n ),\n ),\n );\n });\n\n it(\"should call axios with the correct headers\", async () => {\n // GIVEN\n const params: GetTransactionCheckParams = {\n from: \"0x1234567890123456789012345678901234567890\",\n rawTx: \"0xabcdef\",\n chainId: 1,\n };\n vi.spyOn(axios, \"request\").mockResolvedValueOnce({ data: {} });\n\n // WHEN\n const dataSource = new HttpTransactionCheckDataSource(config);\n await dataSource.getTransactionCheck(params);\n\n // THEN\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: `context-module/${PACKAGE.version}`,\n [LEDGER_ORIGIN_TOKEN_HEADER]: config.originToken,\n },\n }),\n );\n });\n\n it(\"should call axios with the correct URL and method\", async () => {\n // GIVEN\n const params: GetTransactionCheckParams = {\n from: \"0x1234567890123456789012345678901234567890\",\n rawTx: \"0xabcdef\",\n chainId: 1,\n };\n vi.spyOn(axios, \"request\").mockResolvedValueOnce({ data: {} });\n\n // WHEN\n const dataSource = new HttpTransactionCheckDataSource(config);\n await dataSource.getTransactionCheck(params);\n\n // THEN\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n method: \"POST\",\n url: `${config.web3checks.url}/ethereum/scan/tx`,\n }),\n );\n });\n\n it(\"should call axios with the correct request data\", async () => {\n // GIVEN\n const params: GetTransactionCheckParams = {\n from: \"0x1234567890123456789012345678901234567890\",\n rawTx: \"0xabcdef\",\n chainId: 1,\n };\n vi.spyOn(axios, \"request\").mockResolvedValueOnce({ data: {} });\n\n // WHEN\n const dataSource = new HttpTransactionCheckDataSource(config);\n await dataSource.getTransactionCheck(params);\n\n // THEN\n expect(axios.request).toHaveBeenCalledWith(\n expect.objectContaining({\n data: {\n tx: {\n from: \"0x1234567890123456789012345678901234567890\",\n raw: \"0xabcdef\",\n },\n chain: 1,\n },\n }),\n );\n });\n });\n});\n"],
5
- "mappings": "AAAA,OAAOA,MAAW,QAClB,OAAS,QAAAC,EAAM,SAAAC,MAAa,YAG5B,OACE,gCAAAC,EACA,8BAAAC,MACK,gCAEP,OAAS,kCAAAC,MAAsC,0DAE/C,OAAOC,MAAa,qBAEpB,GAAG,KAAK,OAAO,EAEf,SAAS,iCAAkC,IAAM,CAC/C,MAAMC,EAAS,CACb,WAAY,CACV,IAAK,eACP,EACA,YAAa,aACf,EAEA,WAAW,IAAM,CACf,GAAG,cAAc,CACnB,CAAC,EAED,SAAS,sBAAuB,IAAM,CACpC,GAAG,uDAAwD,SAAY,CAErE,MAAMC,EAAoC,CACxC,KAAM,6CACN,MAAO,WACP,QAAS,CACX,EACMC,EAA2B,CAC/B,cAAe,cACf,WAAY,iBACd,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,sBAAsB,CAAE,KAAMS,CAAI,CAAC,EAI9D,MAAMC,EAAS,MADI,IAAIL,EAA+BE,CAAM,EAC5B,oBAAoBC,CAAM,EAG1D,OAAOE,CAAM,EAAE,QACbR,EAAM,CACJ,YAAa,cACb,WAAY,iBACd,CAAC,CACH,CACF,CAAC,EAED,GAAG,8CAA+C,SAAY,CAE5D,MAAMM,EAAoC,CACxC,KAAM,6CACN,MAAO,WACP,QAAS,CACX,EACA,GAAG,MAAMR,EAAO,SAAS,EAAE,kBAAkB,IAAI,MAAM,OAAO,CAAC,EAI/D,MAAMU,EAAS,MADI,IAAIL,EAA+BE,CAAM,EAC5B,oBAAoBC,CAAM,EAG1D,OAAOE,CAAM,EAAE,QACbT,EACE,IAAI,MACF,yFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,oDAAqD,SAAY,CAElE,MAAMO,EAAoC,CACxC,KAAM,6CACN,MAAO,WACP,QAAS,CACX,EACMC,EAAM,CAAC,EACb,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMS,CAAI,CAAC,EAI1D,MAAMC,EAAS,MADI,IAAIL,EAA+BE,CAAM,EAC5B,oBAAoBC,CAAM,EAG1D,OAAOE,CAAM,EAAE,QACbT,EACE,IAAI,MACF,gGACF,CACF,CACF,CACF,CAAC,EAED,GAAG,qDAAsD,SAAY,CAEnE,MAAMO,EAAoC,CACxC,KAAM,6CACN,MAAO,WACP,QAAS,CACX,EACMC,EAAM,CACV,WAAY,iBACd,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMS,CAAI,CAAC,EAI1D,MAAMC,EAAS,MADI,IAAIL,EAA+BE,CAAM,EAC5B,oBAAoBC,CAAM,EAG1D,OAAOE,CAAM,EAAE,QACbT,EACE,IAAI,MACF,gGACF,CACF,CACF,CACF,CAAC,EAED,GAAG,kDAAmD,SAAY,CAEhE,MAAMO,EAAoC,CACxC,KAAM,6CACN,MAAO,WACP,QAAS,CACX,EACMC,EAAM,CACV,cAAe,aACjB,EACA,GAAG,MAAMT,EAAO,SAAS,EAAE,kBAAkB,CAAE,KAAMS,CAAI,CAAC,EAI1D,MAAMC,EAAS,MADI,IAAIL,EAA+BE,CAAM,EAC5B,oBAAoBC,CAAM,EAG1D,OAAOE,CAAM,EAAE,QACbT,EACE,IAAI,MACF,gGACF,CACF,CACF,CACF,CAAC,EAED,GAAG,6CAA8C,SAAY,CAE3D,MAAMO,EAAoC,CACxC,KAAM,6CACN,MAAO,WACP,QAAS,CACX,EACA,GAAG,MAAMR,EAAO,SAAS,EAAE,sBAAsB,CAAE,KAAM,CAAC,CAAE,CAAC,EAI7D,MADmB,IAAIK,EAA+BE,CAAM,EAC3C,oBAAoBC,CAAM,EAG3C,OAAOR,EAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,QAAS,CACP,CAACG,CAA4B,EAAG,kBAAkBG,EAAQ,OAAO,GACjE,CAACF,CAA0B,EAAGG,EAAO,WACvC,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,oDAAqD,SAAY,CAElE,MAAMC,EAAoC,CACxC,KAAM,6CACN,MAAO,WACP,QAAS,CACX,EACA,GAAG,MAAMR,EAAO,SAAS,EAAE,sBAAsB,CAAE,KAAM,CAAC,CAAE,CAAC,EAI7D,MADmB,IAAIK,EAA+BE,CAAM,EAC3C,oBAAoBC,CAAM,EAG3C,OAAOR,EAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,OAAQ,OACR,IAAK,GAAGO,EAAO,WAAW,GAAG,mBAC/B,CAAC,CACH,CACF,CAAC,EAED,GAAG,kDAAmD,SAAY,CAEhE,MAAMC,EAAoC,CACxC,KAAM,6CACN,MAAO,WACP,QAAS,CACX,EACA,GAAG,MAAMR,EAAO,SAAS,EAAE,sBAAsB,CAAE,KAAM,CAAC,CAAE,CAAC,EAI7D,MADmB,IAAIK,EAA+BE,CAAM,EAC3C,oBAAoBC,CAAM,EAG3C,OAAOR,EAAM,OAAO,EAAE,qBACpB,OAAO,iBAAiB,CACtB,KAAM,CACJ,GAAI,CACF,KAAM,6CACN,IAAK,UACP,EACA,MAAO,CACT,CACF,CAAC,CACH,CACF,CAAC,CACH,CAAC,CACH,CAAC",
6
- "names": ["axios", "Left", "Right", "LEDGER_CLIENT_VERSION_HEADER", "LEDGER_ORIGIN_TOKEN_HEADER", "HttpTransactionCheckDataSource", "PACKAGE", "config", "params", "dto", "result"]
4
+ "sourcesContent": ["import { type DmkNetworkClient } from \"@ledgerhq/device-management-kit\";\nimport { Left, Right } from \"purify-ts\";\n\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport { type TransactionCheckDto } from \"@/transaction-check/data/dto/TransactionCheckDto\";\nimport { HttpTransactionCheckDataSource } from \"@/transaction-check/data/HttpTransactionCheckDataSource\";\nimport { type GetTransactionCheckParams } from \"@/transaction-check/data/TransactionCheckDataSource\";\n\ndescribe(\"HttpTransactionCheckDataSource\", () => {\n const config = {\n web3checks: {\n url: \"https://web3checks.test\",\n },\n originToken: \"originToken\",\n } as ContextModuleServiceConfig;\n\n let httpMock: { post: ReturnType<typeof vi.fn> };\n let dataSource: HttpTransactionCheckDataSource;\n\n beforeEach(() => {\n vi.resetAllMocks();\n httpMock = { post: vi.fn() };\n dataSource = new HttpTransactionCheckDataSource(\n config,\n httpMock as unknown as DmkNetworkClient,\n );\n });\n\n describe(\"getTransactionCheck\", () => {\n it(\"should return an object if the request is successful\", async () => {\n // GIVEN\n const params: GetTransactionCheckParams = {\n from: \"0x1234567890123456789012345678901234567890\",\n rawTx: \"0xabcdef\",\n chainId: 1,\n };\n const dto: TransactionCheckDto = {\n public_key_id: \"test-key-id\",\n descriptor: \"test-descriptor\",\n };\n httpMock.post.mockResolvedValueOnce(dto);\n\n // WHEN\n const result = await dataSource.getTransactionCheck(params);\n\n // THEN\n expect(result).toEqual(\n Right({\n publicKeyId: \"test-key-id\",\n descriptor: \"test-descriptor\",\n }),\n );\n });\n\n it(\"should return an error if the request fails\", async () => {\n // GIVEN\n const params: GetTransactionCheckParams = {\n from: \"0x1234567890123456789012345678901234567890\",\n rawTx: \"0xabcdef\",\n chainId: 1,\n };\n httpMock.post.mockRejectedValue(new Error(\"error\"));\n\n // WHEN\n const result = await dataSource.getTransactionCheck(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpTransactionCheckDataSource: Failed to fetch web3 checks information\",\n ),\n ),\n );\n });\n\n it(\"should return an error if the response is invalid\", async () => {\n // GIVEN\n const params: GetTransactionCheckParams = {\n from: \"0x1234567890123456789012345678901234567890\",\n rawTx: \"0xabcdef\",\n chainId: 1,\n };\n httpMock.post.mockResolvedValue({});\n\n // WHEN\n const result = await dataSource.getTransactionCheck(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpTransactionCheckDataSource: Cannot exploit transaction check data received\",\n ),\n ),\n );\n });\n\n it(\"should return an error if public_key_id is missing\", async () => {\n // GIVEN\n const params: GetTransactionCheckParams = {\n from: \"0x1234567890123456789012345678901234567890\",\n rawTx: \"0xabcdef\",\n chainId: 1,\n };\n httpMock.post.mockResolvedValue({\n descriptor: \"test-descriptor\",\n });\n\n // WHEN\n const result = await dataSource.getTransactionCheck(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpTransactionCheckDataSource: Cannot exploit transaction check data received\",\n ),\n ),\n );\n });\n\n it(\"should return an error if descriptor is missing\", async () => {\n // GIVEN\n const params: GetTransactionCheckParams = {\n from: \"0x1234567890123456789012345678901234567890\",\n rawTx: \"0xabcdef\",\n chainId: 1,\n };\n httpMock.post.mockResolvedValue({\n public_key_id: \"test-key-id\",\n });\n\n // WHEN\n const result = await dataSource.getTransactionCheck(params);\n\n // THEN\n expect(result).toEqual(\n Left(\n new Error(\n \"[ContextModule] HttpTransactionCheckDataSource: Cannot exploit transaction check data received\",\n ),\n ),\n );\n });\n\n it(\"should call http.post with the correct URL and body\", async () => {\n // GIVEN\n const params: GetTransactionCheckParams = {\n from: \"0x1234567890123456789012345678901234567890\",\n rawTx: \"0xabcdef\",\n chainId: 1,\n };\n httpMock.post.mockResolvedValueOnce({});\n\n // WHEN\n await dataSource.getTransactionCheck(params);\n\n // THEN\n expect(httpMock.post).toHaveBeenCalledWith(\n `${config.web3checks.url}/ethereum/scan/tx`,\n {\n tx: {\n from: \"0x1234567890123456789012345678901234567890\",\n raw: \"0xabcdef\",\n },\n chain: 1,\n },\n );\n });\n });\n});\n"],
5
+ "mappings": "AACA,OAAS,QAAAA,EAAM,SAAAC,MAAa,YAI5B,OAAS,kCAAAC,MAAsC,0DAG/C,SAAS,iCAAkC,IAAM,CAC/C,MAAMC,EAAS,CACb,WAAY,CACV,IAAK,yBACP,EACA,YAAa,aACf,EAEA,IAAIC,EACAC,EAEJ,WAAW,IAAM,CACf,GAAG,cAAc,EACjBD,EAAW,CAAE,KAAM,GAAG,GAAG,CAAE,EAC3BC,EAAa,IAAIH,EACfC,EACAC,CACF,CACF,CAAC,EAED,SAAS,sBAAuB,IAAM,CACpC,GAAG,uDAAwD,SAAY,CAErE,MAAME,EAAoC,CACxC,KAAM,6CACN,MAAO,WACP,QAAS,CACX,EACMC,EAA2B,CAC/B,cAAe,cACf,WAAY,iBACd,EACAH,EAAS,KAAK,sBAAsBG,CAAG,EAGvC,MAAMC,EAAS,MAAMH,EAAW,oBAAoBC,CAAM,EAG1D,OAAOE,CAAM,EAAE,QACbP,EAAM,CACJ,YAAa,cACb,WAAY,iBACd,CAAC,CACH,CACF,CAAC,EAED,GAAG,8CAA+C,SAAY,CAE5D,MAAMK,EAAoC,CACxC,KAAM,6CACN,MAAO,WACP,QAAS,CACX,EACAF,EAAS,KAAK,kBAAkB,IAAI,MAAM,OAAO,CAAC,EAGlD,MAAMI,EAAS,MAAMH,EAAW,oBAAoBC,CAAM,EAG1D,OAAOE,CAAM,EAAE,QACbR,EACE,IAAI,MACF,yFACF,CACF,CACF,CACF,CAAC,EAED,GAAG,oDAAqD,SAAY,CAElE,MAAMM,EAAoC,CACxC,KAAM,6CACN,MAAO,WACP,QAAS,CACX,EACAF,EAAS,KAAK,kBAAkB,CAAC,CAAC,EAGlC,MAAMI,EAAS,MAAMH,EAAW,oBAAoBC,CAAM,EAG1D,OAAOE,CAAM,EAAE,QACbR,EACE,IAAI,MACF,gGACF,CACF,CACF,CACF,CAAC,EAED,GAAG,qDAAsD,SAAY,CAEnE,MAAMM,EAAoC,CACxC,KAAM,6CACN,MAAO,WACP,QAAS,CACX,EACAF,EAAS,KAAK,kBAAkB,CAC9B,WAAY,iBACd,CAAC,EAGD,MAAMI,EAAS,MAAMH,EAAW,oBAAoBC,CAAM,EAG1D,OAAOE,CAAM,EAAE,QACbR,EACE,IAAI,MACF,gGACF,CACF,CACF,CACF,CAAC,EAED,GAAG,kDAAmD,SAAY,CAEhE,MAAMM,EAAoC,CACxC,KAAM,6CACN,MAAO,WACP,QAAS,CACX,EACAF,EAAS,KAAK,kBAAkB,CAC9B,cAAe,aACjB,CAAC,EAGD,MAAMI,EAAS,MAAMH,EAAW,oBAAoBC,CAAM,EAG1D,OAAOE,CAAM,EAAE,QACbR,EACE,IAAI,MACF,gGACF,CACF,CACF,CACF,CAAC,EAED,GAAG,sDAAuD,SAAY,CAEpE,MAAMM,EAAoC,CACxC,KAAM,6CACN,MAAO,WACP,QAAS,CACX,EACAF,EAAS,KAAK,sBAAsB,CAAC,CAAC,EAGtC,MAAMC,EAAW,oBAAoBC,CAAM,EAG3C,OAAOF,EAAS,IAAI,EAAE,qBACpB,GAAGD,EAAO,WAAW,GAAG,oBACxB,CACE,GAAI,CACF,KAAM,6CACN,IAAK,UACP,EACA,MAAO,CACT,CACF,CACF,CAAC,CACH,CAAC,CACH,CAAC",
6
+ "names": ["Left", "Right", "HttpTransactionCheckDataSource", "config", "httpMock", "dataSource", "params", "dto", "result"]
7
7
  }
@@ -1,2 +1,2 @@
1
- var y=Object.defineProperty;var h=Object.getOwnPropertyDescriptor;var n=(i,e,o,t)=>{for(var r=t>1?void 0:t?h(e,o):e,a=i.length-1,c;a>=0;a--)(c=i[a])&&(r=(t?c(e,o,r):c(r))||r);return t&&r&&y(e,o,r),r},s=(i,e)=>(o,t)=>e(o,t,i);import m from"axios";import{inject as l,injectable as u}from"inversify";import{Left as d,Right as D}from"purify-ts";import{configTypes as C}from"../../config/di/configTypes";import{LEDGER_CLIENT_VERSION_HEADER as f,LEDGER_ORIGIN_TOKEN_HEADER as k}from"../../shared/constant/HttpHeaders";import T from"../../../package.json";let p=class{constructor(e){this.config=e}async getTypedDataCheck({from:e,data:o}){let t;const r={msg:{from:e,data:o}};try{t=(await m.request({method:"POST",url:`${this.config.web3checks.url}/ethereum/scan/eip-712`,data:r,headers:{[f]:`context-module/${T.version}`,[k]:this.config.originToken}})).data}catch{return d(new Error("[ContextModule] HttpTypedDataCheckDataSource: Failed to fetch typed data check information"))}if(!this._isTypedDataCheckDto(t))return d(new Error("[ContextModule] HttpTypedDataCheckDataSource: Cannot exploit typed data check data received"));const a={publicKeyId:t.public_key_id,descriptor:t.descriptor};return D(a)}_isTypedDataCheckDto(e){return e!=null&&typeof e=="object"&&"public_key_id"in e&&e.public_key_id!=null&&typeof e.public_key_id=="string"&&"descriptor"in e&&e.descriptor!=null&&typeof e.descriptor=="string"}};p=n([u(),s(0,l(C.Config))],p);export{p as HttpTypedDataCheckDataSource};
1
+ var l=Object.defineProperty;var h=Object.getOwnPropertyDescriptor;var s=(i,e,o,t)=>{for(var r=t>1?void 0:t?h(e,o):e,a=i.length-1,c;a>=0;a--)(c=i[a])&&(r=(t?c(e,o,r):c(r))||r);return t&&r&&l(e,o,r),r},n=(i,e)=>(o,t)=>e(o,t,i);import{inject as d,injectable as k}from"inversify";import{Left as y,Right as m}from"purify-ts";import{configTypes as C}from"../../config/di/configTypes";import{networkTypes as D}from"../../network/di/networkTypes";let p=class{constructor(e,o){this.config=e;this.http=o}async getTypedDataCheck({from:e,data:o}){let t;const r={msg:{from:e,data:o}};try{t=await this.http.post(`${this.config.web3checks.url}/ethereum/scan/eip-712`,r)}catch{return y(new Error("[ContextModule] HttpTypedDataCheckDataSource: Failed to fetch typed data check information"))}if(!this._isTypedDataCheckDto(t))return y(new Error("[ContextModule] HttpTypedDataCheckDataSource: Cannot exploit typed data check data received"));const a={publicKeyId:t.public_key_id,descriptor:t.descriptor};return m(a)}_isTypedDataCheckDto(e){return e!=null&&typeof e=="object"&&"public_key_id"in e&&e.public_key_id!=null&&typeof e.public_key_id=="string"&&"descriptor"in e&&e.descriptor!=null&&typeof e.descriptor=="string"}};p=s([k(),n(0,d(C.Config)),n(1,d(D.NetworkClient))],p);export{p as HttpTypedDataCheckDataSource};
2
2
  //# sourceMappingURL=HttpTypedDataCheckDataSource.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/transaction-check/data/HttpTypedDataCheckDataSource.ts"],
4
- "sourcesContent": ["import axios from \"axios\";\nimport { inject, injectable } from \"inversify\";\nimport { Either, Left, Right } from \"purify-ts\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport { type ContextModuleConfig } from \"@/config/model/ContextModuleConfig\";\nimport {\n LEDGER_CLIENT_VERSION_HEADER,\n LEDGER_ORIGIN_TOKEN_HEADER,\n} from \"@/shared/constant/HttpHeaders\";\nimport PACKAGE from \"@root/package.json\";\n\nimport { TypedDataCheckDto } from \"./dto/TypedDataCheckDto\";\nimport {\n GetTypedDataCheckParams,\n TypedDataCheck,\n TypedDataCheckDataSource,\n} from \"./TypedDataCheckDataSource\";\n\n@injectable()\nexport class HttpTypedDataCheckDataSource implements TypedDataCheckDataSource {\n constructor(\n @inject(configTypes.Config) private readonly config: ContextModuleConfig,\n ) {}\n\n public async getTypedDataCheck({\n from,\n data,\n }: GetTypedDataCheckParams): Promise<Either<Error, TypedDataCheck>> {\n let typedDataCheckDto: TypedDataCheckDto;\n const requestDto = {\n msg: {\n from,\n data,\n },\n };\n\n try {\n const response = await axios.request<TypedDataCheckDto>({\n method: \"POST\",\n url: `${this.config.web3checks.url}/ethereum/scan/eip-712`,\n data: requestDto,\n headers: {\n [LEDGER_CLIENT_VERSION_HEADER]: `context-module/${PACKAGE.version}`,\n [LEDGER_ORIGIN_TOKEN_HEADER]: this.config.originToken,\n },\n });\n typedDataCheckDto = response.data;\n } catch (_error) {\n return Left(\n new Error(\n \"[ContextModule] HttpTypedDataCheckDataSource: Failed to fetch typed data check information\",\n ),\n );\n }\n\n if (!this._isTypedDataCheckDto(typedDataCheckDto)) {\n return Left(\n new Error(\n \"[ContextModule] HttpTypedDataCheckDataSource: Cannot exploit typed data check data received\",\n ),\n );\n }\n\n const result: TypedDataCheck = {\n publicKeyId: typedDataCheckDto.public_key_id,\n descriptor: typedDataCheckDto.descriptor,\n };\n\n return Right(result);\n }\n\n private _isTypedDataCheckDto(dto: unknown): dto is TypedDataCheckDto {\n return (\n dto != null &&\n typeof dto == \"object\" &&\n \"public_key_id\" in dto &&\n dto.public_key_id != null &&\n typeof dto.public_key_id == \"string\" &&\n \"descriptor\" in dto &&\n dto.descriptor != null &&\n typeof dto.descriptor == \"string\"\n );\n }\n}\n"],
5
- "mappings": "iOAAA,OAAOA,MAAW,QAClB,OAAS,UAAAC,EAAQ,cAAAC,MAAkB,YACnC,OAAiB,QAAAC,EAAM,SAAAC,MAAa,YAEpC,OAAS,eAAAC,MAAmB,0BAE5B,OACE,gCAAAC,EACA,8BAAAC,MACK,gCACP,OAAOC,MAAa,qBAUb,IAAMC,EAAN,KAAuE,CAC5E,YAC+CC,EAC7C,CAD6C,YAAAA,CAC5C,CAEH,MAAa,kBAAkB,CAC7B,KAAAC,EACA,KAAAC,CACF,EAAoE,CAClE,IAAIC,EACJ,MAAMC,EAAa,CACjB,IAAK,CACH,KAAAH,EACA,KAAAC,CACF,CACF,EAEA,GAAI,CAUFC,GATiB,MAAME,EAAM,QAA2B,CACtD,OAAQ,OACR,IAAK,GAAG,KAAK,OAAO,WAAW,GAAG,yBAClC,KAAMD,EACN,QAAS,CACP,CAACE,CAA4B,EAAG,kBAAkBC,EAAQ,OAAO,GACjE,CAACC,CAA0B,EAAG,KAAK,OAAO,WAC5C,CACF,CAAC,GAC4B,IAC/B,MAAiB,CACf,OAAOC,EACL,IAAI,MACF,4FACF,CACF,CACF,CAEA,GAAI,CAAC,KAAK,qBAAqBN,CAAiB,EAC9C,OAAOM,EACL,IAAI,MACF,6FACF,CACF,EAGF,MAAMC,EAAyB,CAC7B,YAAaP,EAAkB,cAC/B,WAAYA,EAAkB,UAChC,EAEA,OAAOQ,EAAMD,CAAM,CACrB,CAEQ,qBAAqBE,EAAwC,CACnE,OACEA,GAAO,MACP,OAAOA,GAAO,UACd,kBAAmBA,GACnBA,EAAI,eAAiB,MACrB,OAAOA,EAAI,eAAiB,UAC5B,eAAgBA,GAChBA,EAAI,YAAc,MAClB,OAAOA,EAAI,YAAc,QAE7B,CACF,EAhEab,EAANc,EAAA,CADNC,EAAW,EAGPC,EAAA,EAAAC,EAAOC,EAAY,MAAM,IAFjBlB",
6
- "names": ["axios", "inject", "injectable", "Left", "Right", "configTypes", "LEDGER_CLIENT_VERSION_HEADER", "LEDGER_ORIGIN_TOKEN_HEADER", "PACKAGE", "HttpTypedDataCheckDataSource", "config", "from", "data", "typedDataCheckDto", "requestDto", "axios", "LEDGER_CLIENT_VERSION_HEADER", "PACKAGE", "LEDGER_ORIGIN_TOKEN_HEADER", "Left", "result", "Right", "dto", "__decorateClass", "injectable", "__decorateParam", "inject", "configTypes"]
4
+ "sourcesContent": ["import { DmkNetworkClient } from \"@ledgerhq/device-management-kit\";\nimport { inject, injectable } from \"inversify\";\nimport { Either, Left, Right } from \"purify-ts\";\n\nimport { configTypes } from \"@/config/di/configTypes\";\nimport { type ContextModuleServiceConfig } from \"@/config/model/ContextModuleConfig\";\nimport { networkTypes } from \"@/network/di/networkTypes\";\n\nimport { TypedDataCheckDto } from \"./dto/TypedDataCheckDto\";\nimport {\n GetTypedDataCheckParams,\n TypedDataCheck,\n TypedDataCheckDataSource,\n} from \"./TypedDataCheckDataSource\";\n\n@injectable()\nexport class HttpTypedDataCheckDataSource implements TypedDataCheckDataSource {\n constructor(\n @inject(configTypes.Config)\n private readonly config: ContextModuleServiceConfig,\n @inject(networkTypes.NetworkClient)\n private readonly http: DmkNetworkClient,\n ) {}\n\n public async getTypedDataCheck({\n from,\n data,\n }: GetTypedDataCheckParams): Promise<Either<Error, TypedDataCheck>> {\n let typedDataCheckDto: TypedDataCheckDto;\n const requestDto = {\n msg: {\n from,\n data,\n },\n };\n\n try {\n typedDataCheckDto = (await this.http.post(\n `${this.config.web3checks.url}/ethereum/scan/eip-712`,\n requestDto,\n )) as TypedDataCheckDto;\n } catch (_error) {\n return Left(\n new Error(\n \"[ContextModule] HttpTypedDataCheckDataSource: Failed to fetch typed data check information\",\n ),\n );\n }\n\n if (!this._isTypedDataCheckDto(typedDataCheckDto)) {\n return Left(\n new Error(\n \"[ContextModule] HttpTypedDataCheckDataSource: Cannot exploit typed data check data received\",\n ),\n );\n }\n\n const result: TypedDataCheck = {\n publicKeyId: typedDataCheckDto.public_key_id,\n descriptor: typedDataCheckDto.descriptor,\n };\n\n return Right(result);\n }\n\n private _isTypedDataCheckDto(dto: unknown): dto is TypedDataCheckDto {\n return (\n dto != null &&\n typeof dto == \"object\" &&\n \"public_key_id\" in dto &&\n dto.public_key_id != null &&\n typeof dto.public_key_id == \"string\" &&\n \"descriptor\" in dto &&\n dto.descriptor != null &&\n typeof dto.descriptor == \"string\"\n );\n }\n}\n"],
5
+ "mappings": "iOACA,OAAS,UAAAA,EAAQ,cAAAC,MAAkB,YACnC,OAAiB,QAAAC,EAAM,SAAAC,MAAa,YAEpC,OAAS,eAAAC,MAAmB,0BAE5B,OAAS,gBAAAC,MAAoB,4BAUtB,IAAMC,EAAN,KAAuE,CAC5E,YAEmBC,EAEAC,EACjB,CAHiB,YAAAD,EAEA,UAAAC,CAChB,CAEH,MAAa,kBAAkB,CAC7B,KAAAC,EACA,KAAAC,CACF,EAAoE,CAClE,IAAIC,EACJ,MAAMC,EAAa,CACjB,IAAK,CACH,KAAAH,EACA,KAAAC,CACF,CACF,EAEA,GAAI,CACFC,EAAqB,MAAM,KAAK,KAAK,KACnC,GAAG,KAAK,OAAO,WAAW,GAAG,yBAC7BC,CACF,CACF,MAAiB,CACf,OAAOC,EACL,IAAI,MACF,4FACF,CACF,CACF,CAEA,GAAI,CAAC,KAAK,qBAAqBF,CAAiB,EAC9C,OAAOE,EACL,IAAI,MACF,6FACF,CACF,EAGF,MAAMC,EAAyB,CAC7B,YAAaH,EAAkB,cAC/B,WAAYA,EAAkB,UAChC,EAEA,OAAOI,EAAMD,CAAM,CACrB,CAEQ,qBAAqBE,EAAwC,CACnE,OACEA,GAAO,MACP,OAAOA,GAAO,UACd,kBAAmBA,GACnBA,EAAI,eAAiB,MACrB,OAAOA,EAAI,eAAiB,UAC5B,eAAgBA,GAChBA,EAAI,YAAc,MAClB,OAAOA,EAAI,YAAc,QAE7B,CACF,EA7DaV,EAANW,EAAA,CADNC,EAAW,EAGPC,EAAA,EAAAC,EAAOC,EAAY,MAAM,GAEzBF,EAAA,EAAAC,EAAOE,EAAa,aAAa,IAJzBhB",
6
+ "names": ["inject", "injectable", "Left", "Right", "configTypes", "networkTypes", "HttpTypedDataCheckDataSource", "config", "http", "from", "data", "typedDataCheckDto", "requestDto", "Left", "result", "Right", "dto", "__decorateClass", "injectable", "__decorateParam", "inject", "configTypes", "networkTypes"]
7
7
  }
@@ -1,2 +1,2 @@
1
- import t from"axios";import{Left as s,Right as i}from"purify-ts";import{LEDGER_CLIENT_VERSION_HEADER as p,LEDGER_ORIGIN_TOKEN_HEADER as u}from"../../shared/constant/HttpHeaders";import{HttpTypedDataCheckDataSource as d}from"../../transaction-check/data/HttpTypedDataCheckDataSource";import l from"../../../package.json";vi.mock("axios");describe("HttpTypedDataCheckDataSource",()=>{const a={web3checks:{url:"web3checksUrl"},originToken:"originToken"};beforeEach(()=>{vi.resetAllMocks()}),describe("getTypedDataCheck",()=>{const r={from:"0x1234567890123456789012345678901234567890",data:{domain:{name:"Test Domain",version:"1",chainId:1,verifyingContract:"0x1234567890123456789012345678901234567890"},types:{EIP712Domain:[{name:"name",type:"string"},{name:"version",type:"string"},{name:"chainId",type:"uint256"},{name:"verifyingContract",type:"address"}],Person:[{name:"name",type:"string"},{name:"wallet",type:"address"}]},primaryType:"Person",message:{name:"Alice",wallet:"0x1234567890123456789012345678901234567890"}}};it("should return an object if the request is successful",async()=>{const e={public_key_id:"test-key-id",descriptor:"test-descriptor"};vi.spyOn(t,"request").mockResolvedValueOnce({data:e});const o=await new d(a).getTypedDataCheck(r);expect(o).toEqual(i({publicKeyId:"test-key-id",descriptor:"test-descriptor"}))}),it("should return an error if the request fails",async()=>{vi.spyOn(t,"request").mockRejectedValue(new Error("error"));const c=await new d(a).getTypedDataCheck(r);expect(c).toEqual(s(new Error("[ContextModule] HttpTypedDataCheckDataSource: Failed to fetch typed data check information")))}),it("should return an error if the response is invalid",async()=>{const e={};vi.spyOn(t,"request").mockResolvedValue({data:e});const o=await new d(a).getTypedDataCheck(r);expect(o).toEqual(s(new Error("[ContextModule] HttpTypedDataCheckDataSource: Cannot exploit typed data check data received")))}),it("should return an error if public_key_id is missing",async()=>{const e={descriptor:"test-descriptor"};vi.spyOn(t,"request").mockResolvedValue({data:e});const o=await new d(a).getTypedDataCheck(r);expect(o).toEqual(s(new Error("[ContextModule] HttpTypedDataCheckDataSource: Cannot exploit typed data check data received")))}),it("should return an error if descriptor is missing",async()=>{const e={public_key_id:"test-key-id"};vi.spyOn(t,"request").mockResolvedValue({data:e});const o=await new d(a).getTypedDataCheck(r);expect(o).toEqual(s(new Error("[ContextModule] HttpTypedDataCheckDataSource: Cannot exploit typed data check data received")))}),it("should return an error if public_key_id is null",async()=>{const e={public_key_id:null,descriptor:"test-descriptor"};vi.spyOn(t,"request").mockResolvedValue({data:e});const o=await new d(a).getTypedDataCheck(r);expect(o).toEqual(s(new Error("[ContextModule] HttpTypedDataCheckDataSource: Cannot exploit typed data check data received")))}),it("should return an error if descriptor is null",async()=>{const e={public_key_id:"test-key-id",descriptor:null};vi.spyOn(t,"request").mockResolvedValue({data:e});const o=await new d(a).getTypedDataCheck(r);expect(o).toEqual(s(new Error("[ContextModule] HttpTypedDataCheckDataSource: Cannot exploit typed data check data received")))}),it("should call axios with the correct headers",async()=>{const e={public_key_id:"test-key-id",descriptor:"test-descriptor"};vi.spyOn(t,"request").mockResolvedValueOnce({data:e}),await new d(a).getTypedDataCheck(r),expect(t.request).toHaveBeenCalledWith(expect.objectContaining({headers:{[p]:`context-module/${l.version}`,[u]:a.originToken}}))}),it("should call axios with the correct URL and method",async()=>{const e={public_key_id:"test-key-id",descriptor:"test-descriptor"};vi.spyOn(t,"request").mockResolvedValueOnce({data:e}),await new d(a).getTypedDataCheck(r),expect(t.request).toHaveBeenCalledWith(expect.objectContaining({method:"POST",url:`${a.web3checks.url}/ethereum/scan/eip-712`}))}),it("should call axios with the correct request data",async()=>{const e={public_key_id:"test-key-id",descriptor:"test-descriptor"};vi.spyOn(t,"request").mockResolvedValueOnce({data:e}),await new d(a).getTypedDataCheck(r),expect(t.request).toHaveBeenCalledWith(expect.objectContaining({data:{msg:{from:r.from,data:r.data}}}))}),it("should handle empty typed data",async()=>{const c={from:"0x1234567890123456789012345678901234567890",data:{domain:{},types:{},primaryType:"",message:{}}},o={public_key_id:"test-key-id",descriptor:"test-descriptor"};vi.spyOn(t,"request").mockResolvedValueOnce({data:o});const n=await new d(a).getTypedDataCheck(c);expect(n).toEqual(i({publicKeyId:"test-key-id",descriptor:"test-descriptor"}))})})});
1
+ import{Left as r,Right as d}from"purify-ts";import{HttpTypedDataCheckDataSource as n}from"../../transaction-check/data/HttpTypedDataCheckDataSource";describe("HttpTypedDataCheckDataSource",()=>{const s={web3checks:{url:"https://web3checks.test"},originToken:"originToken"};let t,a;beforeEach(()=>{vi.resetAllMocks(),t={post:vi.fn()},a=new n(s,t)}),describe("getTypedDataCheck",()=>{const o={from:"0x1234567890123456789012345678901234567890",data:{domain:{name:"Test Domain",version:"1",chainId:1,verifyingContract:"0x1234567890123456789012345678901234567890"},types:{EIP712Domain:[{name:"name",type:"string"},{name:"version",type:"string"},{name:"chainId",type:"uint256"},{name:"verifyingContract",type:"address"}],Person:[{name:"name",type:"string"},{name:"wallet",type:"address"}]},primaryType:"Person",message:{name:"Alice",wallet:"0x1234567890123456789012345678901234567890"}}};it("should return an object if the request is successful",async()=>{const e={public_key_id:"test-key-id",descriptor:"test-descriptor"};t.post.mockResolvedValueOnce(e);const c=await a.getTypedDataCheck(o);expect(c).toEqual(d({publicKeyId:"test-key-id",descriptor:"test-descriptor"}))}),it("should return an error if the request fails",async()=>{t.post.mockRejectedValue(new Error("error"));const e=await a.getTypedDataCheck(o);expect(e).toEqual(r(new Error("[ContextModule] HttpTypedDataCheckDataSource: Failed to fetch typed data check information")))}),it("should return an error if the response is invalid",async()=>{t.post.mockResolvedValue({});const e=await a.getTypedDataCheck(o);expect(e).toEqual(r(new Error("[ContextModule] HttpTypedDataCheckDataSource: Cannot exploit typed data check data received")))}),it("should return an error if public_key_id is missing",async()=>{t.post.mockResolvedValue({descriptor:"test-descriptor"});const e=await a.getTypedDataCheck(o);expect(e).toEqual(r(new Error("[ContextModule] HttpTypedDataCheckDataSource: Cannot exploit typed data check data received")))}),it("should return an error if descriptor is missing",async()=>{t.post.mockResolvedValue({public_key_id:"test-key-id"});const e=await a.getTypedDataCheck(o);expect(e).toEqual(r(new Error("[ContextModule] HttpTypedDataCheckDataSource: Cannot exploit typed data check data received")))}),it("should return an error if public_key_id is null",async()=>{t.post.mockResolvedValue({public_key_id:null,descriptor:"test-descriptor"});const e=await a.getTypedDataCheck(o);expect(e).toEqual(r(new Error("[ContextModule] HttpTypedDataCheckDataSource: Cannot exploit typed data check data received")))}),it("should return an error if descriptor is null",async()=>{t.post.mockResolvedValue({public_key_id:"test-key-id",descriptor:null});const e=await a.getTypedDataCheck(o);expect(e).toEqual(r(new Error("[ContextModule] HttpTypedDataCheckDataSource: Cannot exploit typed data check data received")))}),it("should call http.post with the correct URL and body",async()=>{const e={public_key_id:"test-key-id",descriptor:"test-descriptor"};t.post.mockResolvedValueOnce(e),await a.getTypedDataCheck(o),expect(t.post).toHaveBeenCalledWith(`${s.web3checks.url}/ethereum/scan/eip-712`,{msg:{from:o.from,data:o.data}})}),it("should handle empty typed data",async()=>{const c={from:"0x1234567890123456789012345678901234567890",data:{domain:{},types:{},primaryType:"",message:{}}},i={public_key_id:"test-key-id",descriptor:"test-descriptor"};t.post.mockResolvedValueOnce(i);const p=await a.getTypedDataCheck(c);expect(p).toEqual(d({publicKeyId:"test-key-id",descriptor:"test-descriptor"}))})})});
2
2
  //# sourceMappingURL=HttpTypedDataCheckDataSource.test.js.map