@ledgerhq/device-signer-kit-bitcoin 0.0.0-webhid-20250124164153 → 0.0.0-wrong-error-when-in-experimental-provider-20251021161219
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/cjs/api/SignerBtc.js +1 -1
- package/lib/cjs/api/SignerBtc.js.map +1 -1
- package/lib/cjs/api/{SignerBtcBuiilder.test.js → SignerBtcBuilder.test.js} +1 -1
- package/lib/cjs/api/{SignerBtcBuiilder.test.js.map → SignerBtcBuilder.test.js.map} +1 -1
- package/lib/cjs/api/app-binder/GetExtendedPublicKeyDeviceActionTypes.js +1 -1
- package/lib/cjs/api/app-binder/GetExtendedPublicKeyDeviceActionTypes.js.map +1 -1
- package/lib/cjs/api/app-binder/GetWalletAddressDeviceActionTypes.js.map +1 -1
- package/lib/cjs/api/app-binder/SignMessageDeviceActionTypes.js +1 -1
- package/lib/cjs/api/app-binder/SignMessageDeviceActionTypes.js.map +1 -1
- package/lib/cjs/api/app-binder/SignPsbtDeviceActionTypes.js +1 -1
- package/lib/cjs/api/app-binder/SignPsbtDeviceActionTypes.js.map +1 -1
- package/lib/cjs/api/app-binder/SignTransactionDeviceActionTypes.js +1 -1
- package/lib/cjs/api/app-binder/SignTransactionDeviceActionTypes.js.map +1 -1
- package/lib/cjs/api/model/AddressOptions.js +1 -1
- package/lib/cjs/api/model/AddressOptions.js.map +1 -1
- package/lib/cjs/api/model/MessageOptions.js +2 -0
- package/lib/cjs/api/model/MessageOptions.js.map +7 -0
- package/lib/cjs/api/model/PsbtOptions.js +2 -0
- package/lib/cjs/api/model/PsbtOptions.js.map +7 -0
- package/lib/cjs/api/model/WalletAddressOptions.js +1 -1
- package/lib/cjs/api/model/WalletAddressOptions.js.map +1 -1
- package/lib/cjs/index.js.map +1 -1
- package/lib/cjs/internal/DefaultSignerBtc.js +1 -1
- package/lib/cjs/internal/DefaultSignerBtc.js.map +3 -3
- package/lib/cjs/internal/DefaultSignerBtc.test.js +1 -1
- package/lib/cjs/internal/DefaultSignerBtc.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/BtcAppBinder.js +1 -1
- package/lib/cjs/internal/app-binder/BtcAppBinder.js.map +3 -3
- package/lib/cjs/internal/app-binder/BtcAppBinder.test.js +1 -1
- package/lib/cjs/internal/app-binder/BtcAppBinder.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/command/GetMasterFingerprintCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetMasterFingerprintCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/GetWalletAddressCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetWalletAddressCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/RegisterWalletAddressCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/RegisterWalletAddressCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/client-command-handlers/GetMerkleLeafIndexCommandHandler.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/client-command-handlers/GetMerkleLeafIndexCommandHandler.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/client-command-handlers/GetMerkleLeafProofCommandHandler.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/client-command-handlers/GetMerkleLeafProofCommandHandler.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/command/client-command-handlers/GetMoreElementsCommandHandler.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/client-command-handlers/GetMoreElementsCommandHandler.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/client-command-handlers/GetPreimageCommandHandler.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/client-command-handlers/GetPreimageCommandHandler.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/service/ClientCommandInterpreter.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/service/ClientCommandInterpreter.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/utils/bitcoinAppError.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/utils/bitcoinAppError.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/device-action/GetWalletAddress/GetWalletAddressDeviceAction.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/GetWalletAddress/GetWalletAddressDeviceAction.js.map +2 -2
- package/lib/cjs/internal/app-binder/device-action/GetWalletAddress/GetWalletAddressDeviceAction.test.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/GetWalletAddress/GetWalletAddressDeviceAction.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/device-action/SignPsbt/SignPsbtDeviceAction.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/SignPsbt/SignPsbtDeviceAction.js.map +2 -2
- package/lib/cjs/internal/app-binder/device-action/SignPsbt/SignPsbtDeviceAction.test.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/SignPsbt/SignPsbtDeviceAction.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/device-action/SignTransaction/SignTransactionDeviceAction.test.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/SignTransaction/SignTransactionDeviceAction.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/device-action/__test-utils__/makeInternalApi.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/__test-utils__/makeInternalApi.js.map +3 -3
- package/lib/cjs/internal/app-binder/device-action/__test-utils__/setupOpenAppDAMock.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/__test-utils__/setupOpenAppDAMock.js.map +2 -2
- package/lib/cjs/internal/app-binder/device-action/__test-utils__/setupSignPsbtDAMock.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/__test-utils__/setupSignPsbtDAMock.js.map +2 -2
- package/lib/cjs/internal/app-binder/device-action/__test-utils__/testDeviceActionStates.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/__test-utils__/testDeviceActionStates.js.map +3 -3
- package/lib/cjs/internal/app-binder/di/appBinderModule.js +1 -1
- package/lib/cjs/internal/app-binder/di/appBinderModule.js.map +3 -3
- package/lib/cjs/internal/app-binder/di/appBinderModule.test.js +1 -1
- package/lib/cjs/internal/app-binder/di/appBinderModule.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/di/appBinderTypes.js +1 -1
- package/lib/cjs/internal/app-binder/di/appBinderTypes.js.map +2 -2
- package/lib/cjs/internal/app-binder/task/BuildPsbtTask.test.js +1 -1
- package/lib/cjs/internal/app-binder/task/BuildPsbtTask.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/task/ContinueTask.test.js +1 -1
- package/lib/cjs/internal/app-binder/task/ContinueTask.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/task/GetWalletAddressTask.test.js +1 -1
- package/lib/cjs/internal/app-binder/task/GetWalletAddressTask.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/task/PrepareWalletPolicyTask.test.js +1 -1
- package/lib/cjs/internal/app-binder/task/PrepareWalletPolicyTask.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/task/SignMessageTask.test.js +1 -1
- package/lib/cjs/internal/app-binder/task/SignMessageTask.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/task/SignPsbtTask.test.js +1 -1
- package/lib/cjs/internal/app-binder/task/SignPsbtTask.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/task/UpdatePsbtTask.test.js +1 -1
- package/lib/cjs/internal/app-binder/task/UpdatePsbtTask.test.js.map +2 -2
- package/lib/cjs/internal/data-store/di/dataStoreModule.js +1 -1
- package/lib/cjs/internal/data-store/di/dataStoreModule.js.map +3 -3
- package/lib/cjs/internal/data-store/di/dataStoreModule.test.js +1 -1
- package/lib/cjs/internal/data-store/di/dataStoreModule.test.js.map +2 -2
- package/lib/cjs/internal/data-store/model/DataStore.test.js +1 -1
- package/lib/cjs/internal/data-store/model/DataStore.test.js.map +2 -2
- package/lib/cjs/internal/data-store/service/DefaultDataStoreService.test.js +1 -1
- package/lib/cjs/internal/data-store/service/DefaultDataStoreService.test.js.map +2 -2
- package/lib/cjs/internal/di.js +1 -1
- package/lib/cjs/internal/di.js.map +2 -2
- package/lib/cjs/internal/merkle-tree/di/merkleTreeModule.js +1 -1
- package/lib/cjs/internal/merkle-tree/di/merkleTreeModule.js.map +3 -3
- package/lib/cjs/internal/merkle-tree/di/merkleTreeModule.test.js +1 -1
- package/lib/cjs/internal/merkle-tree/di/merkleTreeModule.test.js.map +2 -2
- package/lib/cjs/internal/merkle-tree/service/MerkleMapBuilder.test.js +1 -1
- package/lib/cjs/internal/merkle-tree/service/MerkleMapBuilder.test.js.map +2 -2
- package/lib/cjs/internal/merkle-tree/service/MerkleTreeBuilder.test.js +1 -1
- package/lib/cjs/internal/merkle-tree/service/MerkleTreeBuilder.test.js.map +2 -2
- package/lib/cjs/internal/psbt/di/psbtModule.js +1 -1
- package/lib/cjs/internal/psbt/di/psbtModule.js.map +3 -3
- package/lib/cjs/internal/psbt/di/psbtModule.test.js +1 -1
- package/lib/cjs/internal/psbt/di/psbtModule.test.js.map +2 -2
- package/lib/cjs/internal/psbt/model/Key.js +1 -1
- package/lib/cjs/internal/psbt/model/Key.js.map +2 -2
- package/lib/cjs/internal/psbt/service/psbt/DefaultPsbtMapper.test.js +1 -1
- package/lib/cjs/internal/psbt/service/psbt/DefaultPsbtMapper.test.js.map +2 -2
- package/lib/cjs/internal/psbt/service/psbt/DefaultPsbtSerializer.js +1 -1
- package/lib/cjs/internal/psbt/service/psbt/DefaultPsbtSerializer.js.map +2 -2
- package/lib/cjs/internal/psbt/service/psbt/DefaultPsbtV2Normalizer.js +1 -1
- package/lib/cjs/internal/psbt/service/psbt/DefaultPsbtV2Normalizer.js.map +2 -2
- package/lib/cjs/internal/use-cases/di/useCasesModule.js +1 -1
- package/lib/cjs/internal/use-cases/di/useCasesModule.js.map +3 -3
- package/lib/cjs/internal/use-cases/di/useCasesModule.test.js +1 -1
- package/lib/cjs/internal/use-cases/di/useCasesModule.test.js.map +2 -2
- package/lib/cjs/internal/use-cases/get-extended-public-key/GetExtendedPublicKeyUseCase.js +1 -1
- package/lib/cjs/internal/use-cases/get-extended-public-key/GetExtendedPublicKeyUseCase.js.map +2 -2
- package/lib/cjs/internal/use-cases/get-extended-public-key/GetExtendedPublicKeyUseCase.test.js +1 -1
- package/lib/cjs/internal/use-cases/get-extended-public-key/GetExtendedPublicKeyUseCase.test.js.map +2 -2
- package/lib/cjs/internal/use-cases/get-wallet-address/GetWalletAddressUseCase.js +1 -1
- package/lib/cjs/internal/use-cases/get-wallet-address/GetWalletAddressUseCase.js.map +3 -3
- package/lib/cjs/internal/use-cases/get-wallet-address/GetWalletAddressUseCase.test.js +1 -1
- package/lib/cjs/internal/use-cases/get-wallet-address/GetWalletAddressUseCase.test.js.map +3 -3
- package/lib/cjs/internal/use-cases/sign-message/SignMessageUseCase.js +1 -1
- package/lib/cjs/internal/use-cases/sign-message/SignMessageUseCase.js.map +3 -3
- package/lib/cjs/internal/use-cases/sign-message/SignMessageUseCase.test.js +1 -1
- package/lib/cjs/internal/use-cases/sign-message/SignMessageUseCase.test.js.map +2 -2
- package/lib/cjs/internal/use-cases/sign-psbt/SignPsbtUseCase.js +1 -1
- package/lib/cjs/internal/use-cases/sign-psbt/SignPsbtUseCase.js.map +3 -3
- package/lib/cjs/internal/use-cases/sign-psbt/SignPsbtUseCase.test.js +1 -1
- package/lib/cjs/internal/use-cases/sign-psbt/SignPsbtUseCase.test.js.map +3 -3
- package/lib/cjs/internal/use-cases/sign-transaction/SignTransactionUseCase.js +1 -1
- package/lib/cjs/internal/use-cases/sign-transaction/SignTransactionUseCase.js.map +3 -3
- package/lib/cjs/internal/use-cases/sign-transaction/SignTransactionUseCase.test.js +1 -1
- package/lib/cjs/internal/use-cases/sign-transaction/SignTransactionUseCase.test.js.map +3 -3
- package/lib/cjs/internal/wallet/di/walletModule.js +1 -1
- package/lib/cjs/internal/wallet/di/walletModule.js.map +3 -3
- package/lib/cjs/internal/wallet/di/walletModule.test.js +1 -1
- package/lib/cjs/internal/wallet/di/walletModule.test.js.map +2 -2
- package/lib/cjs/internal/wallet/service/DefaultWalletBuilder.js +1 -1
- package/lib/cjs/internal/wallet/service/DefaultWalletBuilder.js.map +2 -2
- package/lib/cjs/internal/wallet/service/DefaultWalletBuilder.test.js +1 -1
- package/lib/cjs/internal/wallet/service/DefaultWalletBuilder.test.js.map +2 -2
- package/lib/cjs/internal/wallet/service/DefaultWalletSerializer.test.js +1 -1
- package/lib/cjs/internal/wallet/service/DefaultWalletSerializer.test.js.map +2 -2
- package/lib/cjs/package.json +17 -17
- package/lib/esm/api/{SignerBtcBuiilder.test.js → SignerBtcBuilder.test.js} +1 -1
- package/lib/esm/api/{SignerBtcBuiilder.test.js.map → SignerBtcBuilder.test.js.map} +1 -1
- package/lib/esm/api/model/MessageOptions.js +1 -0
- package/lib/esm/api/model/MessageOptions.js.map +7 -0
- package/lib/esm/api/model/PsbtOptions.js +1 -0
- package/lib/esm/api/model/PsbtOptions.js.map +7 -0
- package/lib/esm/internal/DefaultSignerBtc.js +1 -1
- package/lib/esm/internal/DefaultSignerBtc.js.map +3 -3
- package/lib/esm/internal/DefaultSignerBtc.test.js +1 -1
- package/lib/esm/internal/DefaultSignerBtc.test.js.map +2 -2
- package/lib/esm/internal/app-binder/BtcAppBinder.js +1 -1
- package/lib/esm/internal/app-binder/BtcAppBinder.js.map +3 -3
- package/lib/esm/internal/app-binder/BtcAppBinder.test.js +1 -1
- package/lib/esm/internal/app-binder/BtcAppBinder.test.js.map +3 -3
- package/lib/esm/internal/app-binder/command/GetMasterFingerprintCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/GetMasterFingerprintCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/GetWalletAddressCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/GetWalletAddressCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/RegisterWalletAddressCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/RegisterWalletAddressCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/client-command-handlers/GetMerkleLeafIndexCommandHandler.test.js +1 -1
- package/lib/esm/internal/app-binder/command/client-command-handlers/GetMerkleLeafIndexCommandHandler.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/client-command-handlers/GetMerkleLeafProofCommandHandler.test.js +1 -1
- package/lib/esm/internal/app-binder/command/client-command-handlers/GetMerkleLeafProofCommandHandler.test.js.map +3 -3
- package/lib/esm/internal/app-binder/command/client-command-handlers/GetMoreElementsCommandHandler.test.js +1 -1
- package/lib/esm/internal/app-binder/command/client-command-handlers/GetMoreElementsCommandHandler.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/client-command-handlers/GetPreimageCommandHandler.test.js +1 -1
- package/lib/esm/internal/app-binder/command/client-command-handlers/GetPreimageCommandHandler.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/service/ClientCommandInterpreter.test.js +1 -1
- package/lib/esm/internal/app-binder/command/service/ClientCommandInterpreter.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/utils/bitcoinAppError.test.js +1 -1
- package/lib/esm/internal/app-binder/command/utils/bitcoinAppError.test.js.map +2 -2
- package/lib/esm/internal/app-binder/device-action/GetWalletAddress/GetWalletAddressDeviceAction.js +1 -1
- package/lib/esm/internal/app-binder/device-action/GetWalletAddress/GetWalletAddressDeviceAction.js.map +2 -2
- package/lib/esm/internal/app-binder/device-action/GetWalletAddress/GetWalletAddressDeviceAction.test.js +1 -1
- package/lib/esm/internal/app-binder/device-action/GetWalletAddress/GetWalletAddressDeviceAction.test.js.map +3 -3
- package/lib/esm/internal/app-binder/device-action/SignPsbt/SignPsbtDeviceAction.js +1 -1
- package/lib/esm/internal/app-binder/device-action/SignPsbt/SignPsbtDeviceAction.js.map +2 -2
- package/lib/esm/internal/app-binder/device-action/SignPsbt/SignPsbtDeviceAction.test.js +1 -1
- package/lib/esm/internal/app-binder/device-action/SignPsbt/SignPsbtDeviceAction.test.js.map +3 -3
- package/lib/esm/internal/app-binder/device-action/SignTransaction/SignTransactionDeviceAction.test.js +1 -1
- package/lib/esm/internal/app-binder/device-action/SignTransaction/SignTransactionDeviceAction.test.js.map +3 -3
- package/lib/esm/internal/app-binder/device-action/__test-utils__/makeInternalApi.js +1 -1
- package/lib/esm/internal/app-binder/device-action/__test-utils__/makeInternalApi.js.map +3 -3
- package/lib/esm/internal/app-binder/device-action/__test-utils__/setupOpenAppDAMock.js +1 -1
- package/lib/esm/internal/app-binder/device-action/__test-utils__/setupOpenAppDAMock.js.map +2 -2
- package/lib/esm/internal/app-binder/device-action/__test-utils__/setupSignPsbtDAMock.js +1 -1
- package/lib/esm/internal/app-binder/device-action/__test-utils__/setupSignPsbtDAMock.js.map +2 -2
- package/lib/esm/internal/app-binder/device-action/__test-utils__/testDeviceActionStates.js +1 -1
- package/lib/esm/internal/app-binder/device-action/__test-utils__/testDeviceActionStates.js.map +3 -3
- package/lib/esm/internal/app-binder/di/appBinderModule.js +1 -1
- package/lib/esm/internal/app-binder/di/appBinderModule.js.map +3 -3
- package/lib/esm/internal/app-binder/di/appBinderModule.test.js +1 -1
- package/lib/esm/internal/app-binder/di/appBinderModule.test.js.map +2 -2
- package/lib/esm/internal/app-binder/di/appBinderTypes.js +1 -1
- package/lib/esm/internal/app-binder/di/appBinderTypes.js.map +2 -2
- package/lib/esm/internal/app-binder/task/BuildPsbtTask.test.js +1 -1
- package/lib/esm/internal/app-binder/task/BuildPsbtTask.test.js.map +2 -2
- package/lib/esm/internal/app-binder/task/ContinueTask.test.js +1 -1
- package/lib/esm/internal/app-binder/task/ContinueTask.test.js.map +2 -2
- package/lib/esm/internal/app-binder/task/GetWalletAddressTask.test.js +1 -1
- package/lib/esm/internal/app-binder/task/GetWalletAddressTask.test.js.map +2 -2
- package/lib/esm/internal/app-binder/task/PrepareWalletPolicyTask.test.js +1 -1
- package/lib/esm/internal/app-binder/task/PrepareWalletPolicyTask.test.js.map +2 -2
- package/lib/esm/internal/app-binder/task/SignMessageTask.test.js +1 -1
- package/lib/esm/internal/app-binder/task/SignMessageTask.test.js.map +2 -2
- package/lib/esm/internal/app-binder/task/SignPsbtTask.test.js +1 -1
- package/lib/esm/internal/app-binder/task/SignPsbtTask.test.js.map +2 -2
- package/lib/esm/internal/app-binder/task/UpdatePsbtTask.test.js +1 -1
- package/lib/esm/internal/app-binder/task/UpdatePsbtTask.test.js.map +2 -2
- package/lib/esm/internal/data-store/di/dataStoreModule.js +1 -1
- package/lib/esm/internal/data-store/di/dataStoreModule.js.map +3 -3
- package/lib/esm/internal/data-store/di/dataStoreModule.test.js +1 -1
- package/lib/esm/internal/data-store/di/dataStoreModule.test.js.map +2 -2
- package/lib/esm/internal/data-store/model/DataStore.test.js +1 -1
- package/lib/esm/internal/data-store/model/DataStore.test.js.map +2 -2
- package/lib/esm/internal/data-store/service/DefaultDataStoreService.test.js +1 -1
- package/lib/esm/internal/data-store/service/DefaultDataStoreService.test.js.map +2 -2
- package/lib/esm/internal/di.js +1 -1
- package/lib/esm/internal/di.js.map +2 -2
- package/lib/esm/internal/merkle-tree/di/merkleTreeModule.js +1 -1
- package/lib/esm/internal/merkle-tree/di/merkleTreeModule.js.map +3 -3
- package/lib/esm/internal/merkle-tree/di/merkleTreeModule.test.js +1 -1
- package/lib/esm/internal/merkle-tree/di/merkleTreeModule.test.js.map +2 -2
- package/lib/esm/internal/merkle-tree/service/MerkleMapBuilder.test.js +1 -1
- package/lib/esm/internal/merkle-tree/service/MerkleMapBuilder.test.js.map +2 -2
- package/lib/esm/internal/merkle-tree/service/MerkleTreeBuilder.test.js +1 -1
- package/lib/esm/internal/merkle-tree/service/MerkleTreeBuilder.test.js.map +2 -2
- package/lib/esm/internal/psbt/di/psbtModule.js +1 -1
- package/lib/esm/internal/psbt/di/psbtModule.js.map +3 -3
- package/lib/esm/internal/psbt/di/psbtModule.test.js +1 -1
- package/lib/esm/internal/psbt/di/psbtModule.test.js.map +2 -2
- package/lib/esm/internal/psbt/model/Key.js +1 -1
- package/lib/esm/internal/psbt/model/Key.js.map +2 -2
- package/lib/esm/internal/psbt/service/psbt/DefaultPsbtMapper.test.js +1 -1
- package/lib/esm/internal/psbt/service/psbt/DefaultPsbtMapper.test.js.map +2 -2
- package/lib/esm/internal/psbt/service/psbt/DefaultPsbtSerializer.js +1 -1
- package/lib/esm/internal/psbt/service/psbt/DefaultPsbtSerializer.js.map +2 -2
- package/lib/esm/internal/psbt/service/psbt/DefaultPsbtV2Normalizer.js +1 -1
- package/lib/esm/internal/psbt/service/psbt/DefaultPsbtV2Normalizer.js.map +2 -2
- package/lib/esm/internal/use-cases/di/useCasesModule.js +1 -1
- package/lib/esm/internal/use-cases/di/useCasesModule.js.map +3 -3
- package/lib/esm/internal/use-cases/di/useCasesModule.test.js +1 -1
- package/lib/esm/internal/use-cases/di/useCasesModule.test.js.map +2 -2
- package/lib/esm/internal/use-cases/get-extended-public-key/GetExtendedPublicKeyUseCase.js +1 -1
- package/lib/esm/internal/use-cases/get-extended-public-key/GetExtendedPublicKeyUseCase.js.map +2 -2
- package/lib/esm/internal/use-cases/get-extended-public-key/GetExtendedPublicKeyUseCase.test.js +1 -1
- package/lib/esm/internal/use-cases/get-extended-public-key/GetExtendedPublicKeyUseCase.test.js.map +2 -2
- package/lib/esm/internal/use-cases/get-wallet-address/GetWalletAddressUseCase.js +1 -1
- package/lib/esm/internal/use-cases/get-wallet-address/GetWalletAddressUseCase.js.map +3 -3
- package/lib/esm/internal/use-cases/get-wallet-address/GetWalletAddressUseCase.test.js +1 -1
- package/lib/esm/internal/use-cases/get-wallet-address/GetWalletAddressUseCase.test.js.map +3 -3
- package/lib/esm/internal/use-cases/sign-message/SignMessageUseCase.js +1 -1
- package/lib/esm/internal/use-cases/sign-message/SignMessageUseCase.js.map +3 -3
- package/lib/esm/internal/use-cases/sign-message/SignMessageUseCase.test.js +1 -1
- package/lib/esm/internal/use-cases/sign-message/SignMessageUseCase.test.js.map +2 -2
- package/lib/esm/internal/use-cases/sign-psbt/SignPsbtUseCase.js +1 -1
- package/lib/esm/internal/use-cases/sign-psbt/SignPsbtUseCase.js.map +3 -3
- package/lib/esm/internal/use-cases/sign-psbt/SignPsbtUseCase.test.js +1 -1
- package/lib/esm/internal/use-cases/sign-psbt/SignPsbtUseCase.test.js.map +3 -3
- package/lib/esm/internal/use-cases/sign-transaction/SignTransactionUseCase.js +1 -1
- package/lib/esm/internal/use-cases/sign-transaction/SignTransactionUseCase.js.map +3 -3
- package/lib/esm/internal/use-cases/sign-transaction/SignTransactionUseCase.test.js +1 -1
- package/lib/esm/internal/use-cases/sign-transaction/SignTransactionUseCase.test.js.map +3 -3
- package/lib/esm/internal/wallet/di/walletModule.js +1 -1
- package/lib/esm/internal/wallet/di/walletModule.js.map +3 -3
- package/lib/esm/internal/wallet/di/walletModule.test.js +1 -1
- package/lib/esm/internal/wallet/di/walletModule.test.js.map +2 -2
- package/lib/esm/internal/wallet/service/DefaultWalletBuilder.js +1 -1
- package/lib/esm/internal/wallet/service/DefaultWalletBuilder.js.map +2 -2
- package/lib/esm/internal/wallet/service/DefaultWalletBuilder.test.js +1 -1
- package/lib/esm/internal/wallet/service/DefaultWalletBuilder.test.js.map +2 -2
- package/lib/esm/internal/wallet/service/DefaultWalletSerializer.test.js +1 -1
- package/lib/esm/internal/wallet/service/DefaultWalletSerializer.test.js.map +2 -2
- package/lib/esm/package.json +17 -17
- package/lib/types/api/SignerBtc.d.ts +7 -5
- package/lib/types/api/SignerBtc.d.ts.map +1 -1
- package/lib/types/api/SignerBtcBuilder.test.d.ts +2 -0
- package/lib/types/api/SignerBtcBuilder.test.d.ts.map +1 -0
- package/lib/types/api/app-binder/GetExtendedPublicKeyDeviceActionTypes.d.ts +3 -1
- package/lib/types/api/app-binder/GetExtendedPublicKeyDeviceActionTypes.d.ts.map +1 -1
- package/lib/types/api/app-binder/GetWalletAddressDeviceActionTypes.d.ts +1 -0
- package/lib/types/api/app-binder/GetWalletAddressDeviceActionTypes.d.ts.map +1 -1
- package/lib/types/api/app-binder/SignMessageDeviceActionTypes.d.ts +1 -12
- package/lib/types/api/app-binder/SignMessageDeviceActionTypes.d.ts.map +1 -1
- package/lib/types/api/app-binder/SignPsbtDeviceActionTypes.d.ts +1 -0
- package/lib/types/api/app-binder/SignPsbtDeviceActionTypes.d.ts.map +1 -1
- package/lib/types/api/app-binder/SignTransactionDeviceActionTypes.d.ts +1 -0
- package/lib/types/api/app-binder/SignTransactionDeviceActionTypes.d.ts.map +1 -1
- package/lib/types/api/model/AddressOptions.d.ts +1 -0
- package/lib/types/api/model/AddressOptions.d.ts.map +1 -1
- package/lib/types/api/model/MessageOptions.d.ts +4 -0
- package/lib/types/api/model/MessageOptions.d.ts.map +1 -0
- package/lib/types/api/model/PsbtOptions.d.ts +4 -0
- package/lib/types/api/model/PsbtOptions.d.ts.map +1 -0
- package/lib/types/api/model/Signature.d.ts.map +1 -1
- package/lib/types/api/model/WalletAddressOptions.d.ts +1 -0
- package/lib/types/api/model/WalletAddressOptions.d.ts.map +1 -1
- package/lib/types/internal/DefaultSignerBtc.d.ts +7 -5
- package/lib/types/internal/DefaultSignerBtc.d.ts.map +1 -1
- package/lib/types/internal/app-binder/BtcAppBinder.d.ts +4 -0
- package/lib/types/internal/app-binder/BtcAppBinder.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/utils/bitcoinAppErrors.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/GetWalletAddress/GetWalletAddressDeviceAction.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/SignPsbt/SignPsbtDeviceAction.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/__test-utils__/makeInternalApi.d.ts +2 -1
- package/lib/types/internal/app-binder/device-action/__test-utils__/makeInternalApi.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/__test-utils__/setupOpenAppDAMock.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/__test-utils__/setupSignPsbtDAMock.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/__test-utils__/testDeviceActionStates.d.ts +5 -2
- package/lib/types/internal/app-binder/device-action/__test-utils__/testDeviceActionStates.d.ts.map +1 -1
- package/lib/types/internal/app-binder/di/appBinderModule.d.ts.map +1 -1
- package/lib/types/internal/app-binder/di/appBinderTypes.d.ts +0 -1
- package/lib/types/internal/app-binder/di/appBinderTypes.d.ts.map +1 -1
- package/lib/types/internal/app-binder/task/GetWalletAddressTask.d.ts.map +1 -1
- package/lib/types/internal/app-binder/task/SignMessageTask.d.ts.map +1 -1
- package/lib/types/internal/app-binder/task/SignPsbtTask.d.ts.map +1 -1
- package/lib/types/internal/data-store/di/dataStoreModule.d.ts.map +1 -1
- package/lib/types/internal/di.d.ts.map +1 -1
- package/lib/types/internal/merkle-tree/di/merkleTreeModule.d.ts.map +1 -1
- package/lib/types/internal/psbt/di/psbtModule.d.ts.map +1 -1
- package/lib/types/internal/use-cases/di/useCasesModule.d.ts.map +1 -1
- package/lib/types/internal/use-cases/get-extended-public-key/GetExtendedPublicKeyUseCase.d.ts +1 -0
- package/lib/types/internal/use-cases/get-extended-public-key/GetExtendedPublicKeyUseCase.d.ts.map +1 -1
- package/lib/types/internal/use-cases/get-wallet-address/GetWalletAddressUseCase.d.ts +1 -1
- package/lib/types/internal/use-cases/get-wallet-address/GetWalletAddressUseCase.d.ts.map +1 -1
- package/lib/types/internal/use-cases/sign-message/SignMessageUseCase.d.ts +1 -1
- package/lib/types/internal/use-cases/sign-message/SignMessageUseCase.d.ts.map +1 -1
- package/lib/types/internal/use-cases/sign-psbt/SignPsbtUseCase.d.ts +1 -1
- package/lib/types/internal/use-cases/sign-psbt/SignPsbtUseCase.d.ts.map +1 -1
- package/lib/types/internal/use-cases/sign-transaction/SignTransactionUseCase.d.ts +1 -1
- package/lib/types/internal/use-cases/sign-transaction/SignTransactionUseCase.d.ts.map +1 -1
- package/lib/types/internal/wallet/di/walletModule.d.ts.map +1 -1
- package/lib/types/tsconfig.prod.tsbuildinfo +1 -1
- package/package.json +19 -19
- package/lib/cjs/internal/app-binder/device-action/SignMessage/SignMessageDeviceAction.js +0 -2
- package/lib/cjs/internal/app-binder/device-action/SignMessage/SignMessageDeviceAction.js.map +0 -7
- package/lib/cjs/internal/app-binder/device-action/SignMessage/SignMessageDeviceAction.test.js +0 -2
- package/lib/cjs/internal/app-binder/device-action/SignMessage/SignMessageDeviceAction.test.js.map +0 -7
- package/lib/esm/internal/app-binder/device-action/SignMessage/SignMessageDeviceAction.js +0 -2
- package/lib/esm/internal/app-binder/device-action/SignMessage/SignMessageDeviceAction.js.map +0 -7
- package/lib/esm/internal/app-binder/device-action/SignMessage/SignMessageDeviceAction.test.js +0 -2
- package/lib/esm/internal/app-binder/device-action/SignMessage/SignMessageDeviceAction.test.js.map +0 -7
- package/lib/types/api/SignerBtcBuiilder.test.d.ts +0 -2
- package/lib/types/api/SignerBtcBuiilder.test.d.ts.map +0 -1
- package/lib/types/internal/app-binder/device-action/SignMessage/SignMessageDeviceAction.d.ts +0 -19
- package/lib/types/internal/app-binder/device-action/SignMessage/SignMessageDeviceAction.d.ts.map +0 -1
- package/lib/types/internal/app-binder/device-action/SignMessage/SignMessageDeviceAction.test.d.ts +0 -2
- package/lib/types/internal/app-binder/device-action/SignMessage/SignMessageDeviceAction.test.d.ts.map +0 -1
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{DefaultDescriptorTemplate as i,DefaultWallet as o}from"../api/model/Wallet";import{DefaultSignerBtc as
|
|
1
|
+
import{DefaultDescriptorTemplate as i,DefaultWallet as o}from"../api/model/Wallet";import{DefaultSignerBtc as n}from"./DefaultSignerBtc";import{GetExtendedPublicKeyUseCase as a}from"./use-cases/get-extended-public-key/GetExtendedPublicKeyUseCase";import{SignPsbtUseCase as c}from"./use-cases/sign-psbt/SignPsbtUseCase";import{SignTransactionUseCase as p}from"./use-cases/sign-transaction/SignTransactionUseCase";import{SignMessageUseCase as r}from"./use-cases/sign-message/SignMessageUseCase";describe("DefaultSignerBtc",()=>{it("should be defined",()=>{const e=new n({dmk:{},sessionId:"session-id"});expect(e).toBeDefined()}),it("should call getExtendedPublicKeyUseCase",()=>{vi.spyOn(a.prototype,"execute");const e="session-id",s={executeDeviceAction:vi.fn()};new n({dmk:s,sessionId:e}).getExtendedPublicKey("44'/0'/0'/0/0",{checkOnDevice:!0}),expect(a.prototype.execute).toHaveBeenCalled()}),it("should call signMessageUseCase",()=>{vi.spyOn(r.prototype,"execute");const e="session-id",s={executeDeviceAction:vi.fn()};new n({dmk:s,sessionId:e}).signMessage("44'/0'/0'/0/0","message",{skipOpenApp:!1}),expect(r.prototype.execute).toHaveBeenCalled()}),it("should call signPsbtUseCase",()=>{vi.spyOn(c.prototype,"execute");const e="session-id",s={executeDeviceAction:vi.fn()};new n({dmk:s,sessionId:e}).signPsbt(new o("44'/0'/0'",i.NATIVE_SEGWIT),"",{skipOpenApp:!1}),expect(c.prototype.execute).toHaveBeenCalled()}),it("should call signTransactionUseCase",()=>{vi.spyOn(p.prototype,"execute");const e="session-id",s={executeDeviceAction:vi.fn()};new n({dmk:s,sessionId:e}).signTransaction(new o("44'/0'/0'",i.NATIVE_SEGWIT),"",{skipOpenApp:!1}),expect(p.prototype.execute).toHaveBeenCalled()})});
|
|
2
2
|
//# sourceMappingURL=DefaultSignerBtc.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../src/internal/DefaultSignerBtc.test.ts"],
|
|
4
|
-
"sourcesContent": ["import { type DeviceManagementKit } from \"@ledgerhq/device-management-kit\";\n\nimport { DefaultDescriptorTemplate, DefaultWallet } from \"@api/model/Wallet\";\nimport { DefaultSignerBtc } from \"@internal/DefaultSignerBtc\";\nimport { GetExtendedPublicKeyUseCase } from \"@internal/use-cases/get-extended-public-key/GetExtendedPublicKeyUseCase\";\nimport { SignPsbtUseCase } from \"@internal/use-cases/sign-psbt/SignPsbtUseCase\";\nimport { SignTransactionUseCase } from \"@internal/use-cases/sign-transaction/SignTransactionUseCase\";\n\nimport { SignMessageUseCase } from \"./use-cases/sign-message/SignMessageUseCase\";\n\ndescribe(\"DefaultSignerBtc\", () => {\n it(\"should be defined\", () => {\n const signer = new DefaultSignerBtc({\n dmk: {} as DeviceManagementKit,\n sessionId: \"session-id\",\n });\n expect(signer).toBeDefined();\n });\n\n it(\"should call getExtendedPublicKeyUseCase\", () => {\n
|
|
5
|
-
"mappings": "AAEA,OAAS,6BAAAA,EAA2B,iBAAAC,MAAqB,oBACzD,OAAS,oBAAAC,MAAwB,6BACjC,OAAS,+BAAAC,MAAmC,0EAC5C,OAAS,mBAAAC,MAAuB,gDAChC,OAAS,0BAAAC,MAA8B,8DAEvC,OAAS,sBAAAC,MAA0B,8CAEnC,SAAS,mBAAoB,IAAM,CACjC,GAAG,oBAAqB,IAAM,CAC5B,MAAMC,EAAS,IAAIL,EAAiB,CAClC,IAAK,CAAC,EACN,UAAW,YACb,CAAC,EACD,OAAOK,CAAM,EAAE,YAAY,CAC7B,CAAC,EAED,GAAG,0CAA2C,IAAM,CAClD,
|
|
4
|
+
"sourcesContent": ["import { type DeviceManagementKit } from \"@ledgerhq/device-management-kit\";\n\nimport { DefaultDescriptorTemplate, DefaultWallet } from \"@api/model/Wallet\";\nimport { DefaultSignerBtc } from \"@internal/DefaultSignerBtc\";\nimport { GetExtendedPublicKeyUseCase } from \"@internal/use-cases/get-extended-public-key/GetExtendedPublicKeyUseCase\";\nimport { SignPsbtUseCase } from \"@internal/use-cases/sign-psbt/SignPsbtUseCase\";\nimport { SignTransactionUseCase } from \"@internal/use-cases/sign-transaction/SignTransactionUseCase\";\n\nimport { SignMessageUseCase } from \"./use-cases/sign-message/SignMessageUseCase\";\n\ndescribe(\"DefaultSignerBtc\", () => {\n it(\"should be defined\", () => {\n const signer = new DefaultSignerBtc({\n dmk: {} as DeviceManagementKit,\n sessionId: \"session-id\",\n });\n expect(signer).toBeDefined();\n });\n\n it(\"should call getExtendedPublicKeyUseCase\", () => {\n vi.spyOn(GetExtendedPublicKeyUseCase.prototype, \"execute\");\n const sessionId = \"session-id\";\n const dmk = {\n executeDeviceAction: vi.fn(),\n } as unknown as DeviceManagementKit;\n const signer = new DefaultSignerBtc({ dmk, sessionId });\n signer.getExtendedPublicKey(\"44'/0'/0'/0/0\", {\n checkOnDevice: true,\n });\n expect(GetExtendedPublicKeyUseCase.prototype.execute).toHaveBeenCalled();\n });\n\n it(\"should call signMessageUseCase\", () => {\n vi.spyOn(SignMessageUseCase.prototype, \"execute\");\n const sessionId = \"session-id\";\n const dmk = {\n executeDeviceAction: vi.fn(),\n } as unknown as DeviceManagementKit;\n const derivationPath = \"44'/0'/0'/0/0\";\n const message = \"message\";\n const signer = new DefaultSignerBtc({ dmk, sessionId });\n signer.signMessage(derivationPath, message, { skipOpenApp: false });\n expect(SignMessageUseCase.prototype.execute).toHaveBeenCalled();\n });\n it(\"should call signPsbtUseCase\", () => {\n vi.spyOn(SignPsbtUseCase.prototype, \"execute\");\n const sessionId = \"session-id\";\n const dmk = {\n executeDeviceAction: vi.fn(),\n } as unknown as DeviceManagementKit;\n const signer = new DefaultSignerBtc({ dmk, sessionId });\n signer.signPsbt(\n new DefaultWallet(\"44'/0'/0'\", DefaultDescriptorTemplate.NATIVE_SEGWIT),\n \"\",\n { skipOpenApp: false },\n );\n expect(SignPsbtUseCase.prototype.execute).toHaveBeenCalled();\n });\n it(\"should call signTransactionUseCase\", () => {\n vi.spyOn(SignTransactionUseCase.prototype, \"execute\");\n const sessionId = \"session-id\";\n const dmk = {\n executeDeviceAction: vi.fn(),\n } as unknown as DeviceManagementKit;\n const signer = new DefaultSignerBtc({ dmk, sessionId });\n signer.signTransaction(\n new DefaultWallet(\"44'/0'/0'\", DefaultDescriptorTemplate.NATIVE_SEGWIT),\n \"\",\n { skipOpenApp: false },\n );\n expect(SignTransactionUseCase.prototype.execute).toHaveBeenCalled();\n });\n});\n"],
|
|
5
|
+
"mappings": "AAEA,OAAS,6BAAAA,EAA2B,iBAAAC,MAAqB,oBACzD,OAAS,oBAAAC,MAAwB,6BACjC,OAAS,+BAAAC,MAAmC,0EAC5C,OAAS,mBAAAC,MAAuB,gDAChC,OAAS,0BAAAC,MAA8B,8DAEvC,OAAS,sBAAAC,MAA0B,8CAEnC,SAAS,mBAAoB,IAAM,CACjC,GAAG,oBAAqB,IAAM,CAC5B,MAAMC,EAAS,IAAIL,EAAiB,CAClC,IAAK,CAAC,EACN,UAAW,YACb,CAAC,EACD,OAAOK,CAAM,EAAE,YAAY,CAC7B,CAAC,EAED,GAAG,0CAA2C,IAAM,CAClD,GAAG,MAAMJ,EAA4B,UAAW,SAAS,EACzD,MAAMK,EAAY,aACZC,EAAM,CACV,oBAAqB,GAAG,GAAG,CAC7B,EACe,IAAIP,EAAiB,CAAE,IAAAO,EAAK,UAAAD,CAAU,CAAC,EAC/C,qBAAqB,gBAAiB,CAC3C,cAAe,EACjB,CAAC,EACD,OAAOL,EAA4B,UAAU,OAAO,EAAE,iBAAiB,CACzE,CAAC,EAED,GAAG,iCAAkC,IAAM,CACzC,GAAG,MAAMG,EAAmB,UAAW,SAAS,EAChD,MAAME,EAAY,aACZC,EAAM,CACV,oBAAqB,GAAG,GAAG,CAC7B,EAGe,IAAIP,EAAiB,CAAE,IAAAO,EAAK,UAAAD,CAAU,CAAC,EAC/C,YAHgB,gBACP,UAE4B,CAAE,YAAa,EAAM,CAAC,EAClE,OAAOF,EAAmB,UAAU,OAAO,EAAE,iBAAiB,CAChE,CAAC,EACD,GAAG,8BAA+B,IAAM,CACtC,GAAG,MAAMF,EAAgB,UAAW,SAAS,EAC7C,MAAMI,EAAY,aACZC,EAAM,CACV,oBAAqB,GAAG,GAAG,CAC7B,EACe,IAAIP,EAAiB,CAAE,IAAAO,EAAK,UAAAD,CAAU,CAAC,EAC/C,SACL,IAAIP,EAAc,YAAaD,EAA0B,aAAa,EACtE,GACA,CAAE,YAAa,EAAM,CACvB,EACA,OAAOI,EAAgB,UAAU,OAAO,EAAE,iBAAiB,CAC7D,CAAC,EACD,GAAG,qCAAsC,IAAM,CAC7C,GAAG,MAAMC,EAAuB,UAAW,SAAS,EACpD,MAAMG,EAAY,aACZC,EAAM,CACV,oBAAqB,GAAG,GAAG,CAC7B,EACe,IAAIP,EAAiB,CAAE,IAAAO,EAAK,UAAAD,CAAU,CAAC,EAC/C,gBACL,IAAIP,EAAc,YAAaD,EAA0B,aAAa,EACtE,GACA,CAAE,YAAa,EAAM,CACvB,EACA,OAAOK,EAAuB,UAAU,OAAO,EAAE,iBAAiB,CACpE,CAAC,CACH,CAAC",
|
|
6
6
|
"names": ["DefaultDescriptorTemplate", "DefaultWallet", "DefaultSignerBtc", "GetExtendedPublicKeyUseCase", "SignPsbtUseCase", "SignTransactionUseCase", "SignMessageUseCase", "signer", "sessionId", "dmk"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
var S=Object.defineProperty;var
|
|
1
|
+
var S=Object.defineProperty;var A=Object.getOwnPropertyDescriptor;var d=(s,e,t,a)=>{for(var i=a>1?void 0:a?A(e,t):e,p=s.length-1,l;p>=0;p--)(l=s[p])&&(i=(a?l(e,t,i):l(i))||i);return a&&i&&S(e,t,i),i},r=(s,e)=>(t,a)=>e(t,a,s);import{CallTaskInAppDeviceAction as b,SendCommandInAppDeviceAction as y,UserInteractionRequired as c}from"@ledgerhq/device-management-kit";import{inject as n,injectable as D}from"inversify";import{GetExtendedPublicKeyCommand as w}from"../app-binder/command/GetExtendedPublicKeyCommand";import{SignPsbtDeviceAction as h}from"../app-binder/device-action/SignPsbt/SignPsbtDeviceAction";import{SignTransactionDeviceAction as _}from"../app-binder/device-action/SignTransaction/SignTransactionDeviceAction";import{SendSignMessageTask as k}from"../app-binder/task/SignMessageTask";import{dataStoreTypes as P}from"../data-store/di/dataStoreTypes";import{externalTypes as m}from"../externalTypes";import{psbtTypes as u}from"../psbt/di/psbtTypes";import{walletTypes as v}from"../wallet/di/walletTypes";import{GetWalletAddressDeviceAction as f}from"./device-action/GetWalletAddress/GetWalletAddressDeviceAction";let o=class{constructor(e,t,a,i,p,l,I){this._dmk=e;this._sessionId=t;this._walletBuilder=a;this._walletSerializer=i;this._dataStoreService=p;this._psbtMapper=l;this._valueParser=I}getExtendedPublicKey(e){return this._dmk.executeDeviceAction({sessionId:this._sessionId,deviceAction:new y({input:{command:new w(e),appName:"Bitcoin",requiredUserInteraction:e.checkOnDevice?c.VerifyAddress:c.None,skipOpenApp:e.skipOpenApp}})})}signMessage(e){return this._dmk.executeDeviceAction({sessionId:this._sessionId,deviceAction:new b({input:{task:async t=>new k(t,e,this._dataStoreService).run(),appName:"Bitcoin",requiredUserInteraction:c.SignPersonalMessage,skipOpenApp:e.skipOpenApp}})})}signPsbt(e){return this._dmk.executeDeviceAction({sessionId:this._sessionId,deviceAction:new h({input:{psbt:e.psbt,wallet:e.wallet,walletBuilder:this._walletBuilder,walletSerializer:this._walletSerializer,dataStoreService:this._dataStoreService,psbtMapper:this._psbtMapper,valueParser:this._valueParser,skipOpenApp:e.skipOpenApp}})})}getWalletAddress(e){return this._dmk.executeDeviceAction({sessionId:this._sessionId,deviceAction:new f({input:{wallet:e.wallet,skipOpenApp:e.skipOpenApp,checkOnDevice:e.checkOnDevice,change:e.change,addressIndex:e.addressIndex,walletBuilder:this._walletBuilder,walletSerializer:this._walletSerializer,dataStoreService:this._dataStoreService}})})}signTransaction(e){return this._dmk.executeDeviceAction({sessionId:this._sessionId,deviceAction:new _({input:{psbt:e.psbt,wallet:e.wallet,walletBuilder:this._walletBuilder,walletSerializer:this._walletSerializer,dataStoreService:this._dataStoreService,psbtMapper:this._psbtMapper,valueParser:this._valueParser,skipOpenApp:e.skipOpenApp}})})}};o=d([D(),r(0,n(m.Dmk)),r(1,n(m.SessionId)),r(2,n(v.WalletBuilder)),r(3,n(v.WalletSerializer)),r(4,n(P.DataStoreService)),r(5,n(u.PsbtMapper)),r(6,n(u.ValueParser))],o);export{o as BtcAppBinder};
|
|
2
2
|
//# sourceMappingURL=BtcAppBinder.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../src/internal/app-binder/BtcAppBinder.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n DeviceManagementKit,\n type DeviceSessionId,\n SendCommandInAppDeviceAction,\n UserInteractionRequired,\n} from \"@ledgerhq/device-management-kit\";\nimport { inject, injectable } from \"inversify\";\n\nimport {\n GetExtendedPublicKeyDAInput,\n GetExtendedPublicKeyDAReturnType,\n} from \"@api/app-binder/GetExtendedPublicKeyDeviceActionTypes\";\nimport { SignMessageDAReturnType } from \"@api/app-binder/SignMessageDeviceActionTypes\";\nimport { SignPsbtDAReturnType } from \"@api/app-binder/SignPsbtDeviceActionTypes\";\nimport { SignTransactionDAReturnType } from \"@api/app-binder/SignTransactionDeviceActionTypes\";\nimport { GetWalletAddressDAReturnType } from \"@api/index\";\nimport { Psbt } from \"@api/model/Psbt\";\nimport { Wallet } from \"@api/model/Wallet\";\nimport { GetExtendedPublicKeyCommand } from \"@internal/app-binder/command/GetExtendedPublicKeyCommand\";\nimport { SignPsbtDeviceAction } from \"@internal/app-binder/device-action/SignPsbt/SignPsbtDeviceAction\";\nimport { SignTransactionDeviceAction } from \"@internal/app-binder/device-action/SignTransaction/SignTransactionDeviceAction\";\nimport { dataStoreTypes } from \"@internal/data-store/di/dataStoreTypes\";\nimport type { DataStoreService } from \"@internal/data-store/service/DataStoreService\";\nimport { externalTypes } from \"@internal/externalTypes\";\nimport { psbtTypes } from \"@internal/psbt/di/psbtTypes\";\nimport type { PsbtMapper } from \"@internal/psbt/service/psbt/PsbtMapper\";\nimport type { ValueParser } from \"@internal/psbt/service/value/ValueParser\";\nimport { walletTypes } from \"@internal/wallet/di/walletTypes\";\nimport type { WalletBuilder } from \"@internal/wallet/service/WalletBuilder\";\nimport type { WalletSerializer } from \"@internal/wallet/service/WalletSerializer\";\n\nimport { GetWalletAddressDeviceAction } from \"./device-action/GetWalletAddress/GetWalletAddressDeviceAction\";\
|
|
5
|
-
"mappings": "iOAAA,
|
|
6
|
-
"names": ["SendCommandInAppDeviceAction", "UserInteractionRequired", "inject", "injectable", "GetExtendedPublicKeyCommand", "SignPsbtDeviceAction", "SignTransactionDeviceAction", "dataStoreTypes", "externalTypes", "psbtTypes", "walletTypes", "GetWalletAddressDeviceAction", "
|
|
4
|
+
"sourcesContent": ["import {\n CallTaskInAppDeviceAction,\n DeviceManagementKit,\n type DeviceSessionId,\n SendCommandInAppDeviceAction,\n UserInteractionRequired,\n} from \"@ledgerhq/device-management-kit\";\nimport { inject, injectable } from \"inversify\";\n\nimport {\n GetExtendedPublicKeyDAInput,\n GetExtendedPublicKeyDAReturnType,\n} from \"@api/app-binder/GetExtendedPublicKeyDeviceActionTypes\";\nimport { SignMessageDAReturnType } from \"@api/app-binder/SignMessageDeviceActionTypes\";\nimport { SignPsbtDAReturnType } from \"@api/app-binder/SignPsbtDeviceActionTypes\";\nimport { SignTransactionDAReturnType } from \"@api/app-binder/SignTransactionDeviceActionTypes\";\nimport { GetWalletAddressDAReturnType } from \"@api/index\";\nimport { Psbt } from \"@api/model/Psbt\";\nimport { Wallet } from \"@api/model/Wallet\";\nimport { GetExtendedPublicKeyCommand } from \"@internal/app-binder/command/GetExtendedPublicKeyCommand\";\nimport { SignPsbtDeviceAction } from \"@internal/app-binder/device-action/SignPsbt/SignPsbtDeviceAction\";\nimport { SignTransactionDeviceAction } from \"@internal/app-binder/device-action/SignTransaction/SignTransactionDeviceAction\";\nimport { SendSignMessageTask } from \"@internal/app-binder/task/SignMessageTask\";\nimport { dataStoreTypes } from \"@internal/data-store/di/dataStoreTypes\";\nimport type { DataStoreService } from \"@internal/data-store/service/DataStoreService\";\nimport { externalTypes } from \"@internal/externalTypes\";\nimport { psbtTypes } from \"@internal/psbt/di/psbtTypes\";\nimport type { PsbtMapper } from \"@internal/psbt/service/psbt/PsbtMapper\";\nimport type { ValueParser } from \"@internal/psbt/service/value/ValueParser\";\nimport { walletTypes } from \"@internal/wallet/di/walletTypes\";\nimport type { WalletBuilder } from \"@internal/wallet/service/WalletBuilder\";\nimport type { WalletSerializer } from \"@internal/wallet/service/WalletSerializer\";\n\nimport { GetWalletAddressDeviceAction } from \"./device-action/GetWalletAddress/GetWalletAddressDeviceAction\";\n\n@injectable()\nexport class BtcAppBinder {\n constructor(\n @inject(externalTypes.Dmk)\n private readonly _dmk: DeviceManagementKit,\n @inject(externalTypes.SessionId)\n private readonly _sessionId: DeviceSessionId,\n @inject(walletTypes.WalletBuilder)\n private readonly _walletBuilder: WalletBuilder,\n @inject(walletTypes.WalletSerializer)\n private readonly _walletSerializer: WalletSerializer,\n @inject(dataStoreTypes.DataStoreService)\n private readonly _dataStoreService: DataStoreService,\n @inject(psbtTypes.PsbtMapper)\n private readonly _psbtMapper: PsbtMapper,\n @inject(psbtTypes.ValueParser)\n private readonly _valueParser: ValueParser,\n ) {}\n\n getExtendedPublicKey(\n args: GetExtendedPublicKeyDAInput,\n ): GetExtendedPublicKeyDAReturnType {\n return this._dmk.executeDeviceAction({\n sessionId: this._sessionId,\n deviceAction: new SendCommandInAppDeviceAction({\n input: {\n command: new GetExtendedPublicKeyCommand(args),\n appName: \"Bitcoin\",\n requiredUserInteraction: args.checkOnDevice\n ? UserInteractionRequired.VerifyAddress\n : UserInteractionRequired.None,\n skipOpenApp: args.skipOpenApp,\n },\n }),\n });\n }\n\n signMessage(args: {\n derivationPath: string;\n message: string;\n skipOpenApp: boolean;\n }): SignMessageDAReturnType {\n return this._dmk.executeDeviceAction({\n sessionId: this._sessionId,\n deviceAction: new CallTaskInAppDeviceAction({\n input: {\n task: async (internalApi) =>\n new SendSignMessageTask(\n internalApi,\n args,\n this._dataStoreService,\n ).run(),\n appName: \"Bitcoin\",\n requiredUserInteraction: UserInteractionRequired.SignPersonalMessage,\n skipOpenApp: args.skipOpenApp,\n },\n }),\n });\n }\n\n signPsbt(args: {\n psbt: Psbt;\n wallet: Wallet;\n skipOpenApp: boolean;\n }): SignPsbtDAReturnType {\n return this._dmk.executeDeviceAction({\n sessionId: this._sessionId,\n deviceAction: new SignPsbtDeviceAction({\n input: {\n psbt: args.psbt,\n wallet: args.wallet,\n walletBuilder: this._walletBuilder,\n walletSerializer: this._walletSerializer,\n dataStoreService: this._dataStoreService,\n psbtMapper: this._psbtMapper,\n valueParser: this._valueParser,\n skipOpenApp: args.skipOpenApp,\n },\n }),\n });\n }\n\n getWalletAddress(args: {\n checkOnDevice: boolean;\n wallet: Wallet;\n change: boolean;\n addressIndex: number;\n skipOpenApp: boolean;\n }): GetWalletAddressDAReturnType {\n return this._dmk.executeDeviceAction({\n sessionId: this._sessionId,\n deviceAction: new GetWalletAddressDeviceAction({\n input: {\n wallet: args.wallet,\n skipOpenApp: args.skipOpenApp,\n checkOnDevice: args.checkOnDevice,\n change: args.change,\n addressIndex: args.addressIndex,\n walletBuilder: this._walletBuilder,\n walletSerializer: this._walletSerializer,\n dataStoreService: this._dataStoreService,\n },\n }),\n });\n }\n\n signTransaction(args: {\n psbt: Psbt;\n wallet: Wallet;\n skipOpenApp: boolean;\n }): SignTransactionDAReturnType {\n return this._dmk.executeDeviceAction({\n sessionId: this._sessionId,\n deviceAction: new SignTransactionDeviceAction({\n input: {\n psbt: args.psbt,\n wallet: args.wallet,\n walletBuilder: this._walletBuilder,\n walletSerializer: this._walletSerializer,\n dataStoreService: this._dataStoreService,\n psbtMapper: this._psbtMapper,\n valueParser: this._valueParser,\n skipOpenApp: args.skipOpenApp,\n },\n }),\n });\n }\n}\n"],
|
|
5
|
+
"mappings": "iOAAA,OACE,6BAAAA,EAGA,gCAAAC,EACA,2BAAAC,MACK,kCACP,OAAS,UAAAC,EAAQ,cAAAC,MAAkB,YAYnC,OAAS,+BAAAC,MAAmC,2DAC5C,OAAS,wBAAAC,MAA4B,mEACrC,OAAS,+BAAAC,MAAmC,iFAC5C,OAAS,uBAAAC,MAA2B,4CACpC,OAAS,kBAAAC,MAAsB,yCAE/B,OAAS,iBAAAC,MAAqB,0BAC9B,OAAS,aAAAC,MAAiB,8BAG1B,OAAS,eAAAC,MAAmB,kCAI5B,OAAS,gCAAAC,MAAoC,gEAGtC,IAAMC,EAAN,KAAmB,CACxB,YAEmBC,EAEAC,EAEAC,EAEAC,EAEAC,EAEAC,EAEAC,EACjB,CAbiB,UAAAN,EAEA,gBAAAC,EAEA,oBAAAC,EAEA,uBAAAC,EAEA,uBAAAC,EAEA,iBAAAC,EAEA,kBAAAC,CAChB,CAEH,qBACEC,EACkC,CAClC,OAAO,KAAK,KAAK,oBAAoB,CACnC,UAAW,KAAK,WAChB,aAAc,IAAIC,EAA6B,CAC7C,MAAO,CACL,QAAS,IAAIC,EAA4BF,CAAI,EAC7C,QAAS,UACT,wBAAyBA,EAAK,cAC1BG,EAAwB,cACxBA,EAAwB,KAC5B,YAAaH,EAAK,WACpB,CACF,CAAC,CACH,CAAC,CACH,CAEA,YAAYA,EAIgB,CAC1B,OAAO,KAAK,KAAK,oBAAoB,CACnC,UAAW,KAAK,WAChB,aAAc,IAAII,EAA0B,CAC1C,MAAO,CACL,KAAM,MAAOC,GACX,IAAIC,EACFD,EACAL,EACA,KAAK,iBACP,EAAE,IAAI,EACR,QAAS,UACT,wBAAyBG,EAAwB,oBACjD,YAAaH,EAAK,WACpB,CACF,CAAC,CACH,CAAC,CACH,CAEA,SAASA,EAIgB,CACvB,OAAO,KAAK,KAAK,oBAAoB,CACnC,UAAW,KAAK,WAChB,aAAc,IAAIO,EAAqB,CACrC,MAAO,CACL,KAAMP,EAAK,KACX,OAAQA,EAAK,OACb,cAAe,KAAK,eACpB,iBAAkB,KAAK,kBACvB,iBAAkB,KAAK,kBACvB,WAAY,KAAK,YACjB,YAAa,KAAK,aAClB,YAAaA,EAAK,WACpB,CACF,CAAC,CACH,CAAC,CACH,CAEA,iBAAiBA,EAMgB,CAC/B,OAAO,KAAK,KAAK,oBAAoB,CACnC,UAAW,KAAK,WAChB,aAAc,IAAIQ,EAA6B,CAC7C,MAAO,CACL,OAAQR,EAAK,OACb,YAAaA,EAAK,YAClB,cAAeA,EAAK,cACpB,OAAQA,EAAK,OACb,aAAcA,EAAK,aACnB,cAAe,KAAK,eACpB,iBAAkB,KAAK,kBACvB,iBAAkB,KAAK,iBACzB,CACF,CAAC,CACH,CAAC,CACH,CAEA,gBAAgBA,EAIgB,CAC9B,OAAO,KAAK,KAAK,oBAAoB,CACnC,UAAW,KAAK,WAChB,aAAc,IAAIS,EAA4B,CAC5C,MAAO,CACL,KAAMT,EAAK,KACX,OAAQA,EAAK,OACb,cAAe,KAAK,eACpB,iBAAkB,KAAK,kBACvB,iBAAkB,KAAK,kBACvB,WAAY,KAAK,YACjB,YAAa,KAAK,aAClB,YAAaA,EAAK,WACpB,CACF,CAAC,CACH,CAAC,CACH,CACF,EA9HaR,EAANkB,EAAA,CADNC,EAAW,EAGPC,EAAA,EAAAC,EAAOC,EAAc,GAAG,GAExBF,EAAA,EAAAC,EAAOC,EAAc,SAAS,GAE9BF,EAAA,EAAAC,EAAOE,EAAY,aAAa,GAEhCH,EAAA,EAAAC,EAAOE,EAAY,gBAAgB,GAEnCH,EAAA,EAAAC,EAAOG,EAAe,gBAAgB,GAEtCJ,EAAA,EAAAC,EAAOI,EAAU,UAAU,GAE3BL,EAAA,EAAAC,EAAOI,EAAU,WAAW,IAdpBzB",
|
|
6
|
+
"names": ["CallTaskInAppDeviceAction", "SendCommandInAppDeviceAction", "UserInteractionRequired", "inject", "injectable", "GetExtendedPublicKeyCommand", "SignPsbtDeviceAction", "SignTransactionDeviceAction", "SendSignMessageTask", "dataStoreTypes", "externalTypes", "psbtTypes", "walletTypes", "GetWalletAddressDeviceAction", "BtcAppBinder", "_dmk", "_sessionId", "_walletBuilder", "_walletSerializer", "_dataStoreService", "_psbtMapper", "_valueParser", "args", "SendCommandInAppDeviceAction", "GetExtendedPublicKeyCommand", "UserInteractionRequired", "CallTaskInAppDeviceAction", "internalApi", "SendSignMessageTask", "SignPsbtDeviceAction", "GetWalletAddressDeviceAction", "SignTransactionDeviceAction", "__decorateClass", "injectable", "__decorateParam", "inject", "externalTypes", "walletTypes", "dataStoreTypes", "psbtTypes"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{DeviceActionStatus as
|
|
1
|
+
import{DeviceActionStatus as p,SendCommandInAppDeviceAction as l,UserInteractionRequired as u}from"@ledgerhq/device-management-kit";import{from as m}from"rxjs";import{BtcAppBinder as o}from"../app-binder/BtcAppBinder";import{GetExtendedPublicKeyCommand as D}from"../app-binder/command/GetExtendedPublicKeyCommand";describe("BtcAppBinder",()=>{const i={sendCommand:vi.fn(),executeDeviceAction:vi.fn()};beforeEach(()=>{vi.clearAllMocks()}),it("should be defined",()=>{const a=new o({},{},{},{},{},{},{});expect(a).toBeDefined()}),describe("getExtendedPublicKey",()=>{let a;afterEach(()=>{a&&a.unsubscribe()}),it("should return the pub key",()=>new Promise((s,r)=>{const t="D2PPQSYFe83nDzk96FqGumVU8JA7J8vj2Rhjc2oXzEi5";vi.spyOn(i,"executeDeviceAction").mockReturnValue({observable:m([{status:p.Completed,output:{extendedPublicKey:t}}]),cancel:vi.fn()});const n=new o(i,"sessionId",{},{},{},{},{}),{observable:d}=n.getExtendedPublicKey({derivationPath:"44'/501'",checkOnDevice:!1,skipOpenApp:!1}),c=[];a=d.subscribe({next:e=>{c.push(e)},error:e=>{r(e)},complete:()=>{try{expect(c).toEqual([{status:p.Completed,output:{extendedPublicKey:t}}]),s()}catch(e){r(e)}}})})),describe("calls of executeDeviceAction with the correct params",()=>{const s={derivationPath:"44'/60'/3'/2/1",returnChainCode:!1,skipOpenApp:!1};it("when checkOnDevice is true: UserInteractionRequired.VerifyAddress",()=>{const t={...s,checkOnDevice:!0};new o(i,"sessionId",{},{},{},{},{}).getExtendedPublicKey(t),expect(i.executeDeviceAction).toHaveBeenCalledWith({sessionId:"sessionId",deviceAction:new l({input:{command:new D(t),appName:"Bitcoin",requiredUserInteraction:u.VerifyAddress,skipOpenApp:!1}})})}),it("when checkOnDevice is false: UserInteractionRequired.None",()=>{const t={...s,checkOnDevice:!1};new o(i,"sessionId",{},{},{},{},{}).getExtendedPublicKey(t),expect(i.executeDeviceAction).toHaveBeenCalledWith({sessionId:"sessionId",deviceAction:new l({input:{command:new D(t),appName:"Bitcoin",requiredUserInteraction:u.None,skipOpenApp:!1}})})})})}),describe("signMessage",()=>{it("should return the signature",()=>new Promise((a,s)=>{const r={r:"0xDEF1",s:"0xAFAF",v:0},t="Hello, World!";vi.spyOn(i,"executeDeviceAction").mockReturnValue({observable:m([{status:p.Completed,output:r}]),cancel:vi.fn()});const n=new o(i,"sessionId",{},{},{},{},{}),{observable:d}=n.signMessage({derivationPath:"44'/60'/3'/2/1",message:t,skipOpenApp:!1}),c=[];d.subscribe({next:e=>{c.push(e)},error:e=>{s(e)},complete:()=>{try{expect(c).toEqual([{status:p.Completed,output:r}]),a()}catch(e){s(e)}}})}))})});
|
|
2
2
|
//# sourceMappingURL=BtcAppBinder.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../src/internal/app-binder/BtcAppBinder.test.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n type DeviceActionState,\n DeviceActionStatus,\n type DeviceManagementKit,\n type DeviceSessionId,\n SendCommandInAppDeviceAction,\n UserInteractionRequired,\n} from \"@ledgerhq/device-management-kit\";\nimport { from, type Subscription } from \"rxjs\";\n\nimport {\n type GetExtendedDAIntermediateValue,\n type GetExtendedPublicKeyDAError,\n type GetExtendedPublicKeyDAOutput,\n} from \"@api/app-binder/GetExtendedPublicKeyDeviceActionTypes\";\nimport {\n type SignMessageDAError,\n type SignMessageDAIntermediateValue,\n type SignMessageDAOutput,\n} from \"@api/index\";\nimport { type Signature } from \"@api/model/Signature\";\nimport { BtcAppBinder } from \"@internal/app-binder/BtcAppBinder\";\nimport { GetExtendedPublicKeyCommand } from \"@internal/app-binder/command/GetExtendedPublicKeyCommand\";\nimport { type DataStoreService } from \"@internal/data-store/service/DataStoreService\";\nimport { type PsbtMapper } from \"@internal/psbt/service/psbt/PsbtMapper\";\nimport { type ValueParser } from \"@internal/psbt/service/value/ValueParser\";\nimport { type WalletBuilder } from \"@internal/wallet/service/WalletBuilder\";\nimport { type WalletSerializer } from \"@internal/wallet/service/WalletSerializer\";\n\ndescribe(\"BtcAppBinder\", () => {\n const mockedDmk: DeviceManagementKit = {\n sendCommand:
|
|
5
|
-
"mappings": "AAAA,OAEE,sBAAAA,EAGA,gCAAAC,EACA,2BAAAC,MACK,kCACP,OAAS,QAAAC,MAA+B,OAaxC,OAAS,gBAAAC,MAAoB,oCAC7B,OAAS,+BAAAC,MAAmC,2DAO5C,SAAS,eAAgB,IAAM,CAC7B,MAAMC,EAAiC,CACrC,YAAa,
|
|
6
|
-
"names": ["DeviceActionStatus", "SendCommandInAppDeviceAction", "UserInteractionRequired", "from", "BtcAppBinder", "GetExtendedPublicKeyCommand", "mockedDmk", "binder", "subscription", "
|
|
4
|
+
"sourcesContent": ["import {\n type DeviceActionState,\n DeviceActionStatus,\n type DeviceManagementKit,\n type DeviceSessionId,\n SendCommandInAppDeviceAction,\n UserInteractionRequired,\n} from \"@ledgerhq/device-management-kit\";\nimport { from, type Subscription } from \"rxjs\";\n\nimport {\n type GetExtendedDAIntermediateValue,\n type GetExtendedPublicKeyDAError,\n type GetExtendedPublicKeyDAOutput,\n} from \"@api/app-binder/GetExtendedPublicKeyDeviceActionTypes\";\nimport {\n type SignMessageDAError,\n type SignMessageDAIntermediateValue,\n type SignMessageDAOutput,\n} from \"@api/index\";\nimport { type Signature } from \"@api/model/Signature\";\nimport { BtcAppBinder } from \"@internal/app-binder/BtcAppBinder\";\nimport { GetExtendedPublicKeyCommand } from \"@internal/app-binder/command/GetExtendedPublicKeyCommand\";\nimport { type DataStoreService } from \"@internal/data-store/service/DataStoreService\";\nimport { type PsbtMapper } from \"@internal/psbt/service/psbt/PsbtMapper\";\nimport { type ValueParser } from \"@internal/psbt/service/value/ValueParser\";\nimport { type WalletBuilder } from \"@internal/wallet/service/WalletBuilder\";\nimport { type WalletSerializer } from \"@internal/wallet/service/WalletSerializer\";\n\ndescribe(\"BtcAppBinder\", () => {\n const mockedDmk: DeviceManagementKit = {\n sendCommand: vi.fn(),\n executeDeviceAction: vi.fn(),\n } as unknown as DeviceManagementKit;\n\n beforeEach(() => {\n vi.clearAllMocks();\n });\n\n it(\"should be defined\", () => {\n const binder = new BtcAppBinder(\n {} as DeviceManagementKit,\n {} as DeviceSessionId,\n {} as WalletBuilder,\n {} as WalletSerializer,\n {} as DataStoreService,\n {} as PsbtMapper,\n {} as ValueParser,\n );\n expect(binder).toBeDefined();\n });\n\n describe(\"getExtendedPublicKey\", () => {\n let subscription: Subscription;\n afterEach(() => {\n if (subscription) {\n subscription.unsubscribe();\n }\n });\n it(\"should return the pub key\", () =>\n new Promise<void>((resolve, reject) => {\n // GIVEN\n const extendedPublicKey =\n \"D2PPQSYFe83nDzk96FqGumVU8JA7J8vj2Rhjc2oXzEi5\";\n\n vi.spyOn(mockedDmk, \"executeDeviceAction\").mockReturnValue({\n observable: from([\n {\n status: DeviceActionStatus.Completed,\n output: { extendedPublicKey },\n } as DeviceActionState<\n GetExtendedPublicKeyDAOutput,\n GetExtendedPublicKeyDAError,\n GetExtendedDAIntermediateValue\n >,\n ]),\n cancel: vi.fn(),\n });\n\n // WHEN\n const appBinder = new BtcAppBinder(\n mockedDmk,\n \"sessionId\",\n {} as WalletBuilder,\n {} as WalletSerializer,\n {} as DataStoreService,\n {} as PsbtMapper,\n {} as ValueParser,\n );\n const { observable } = appBinder.getExtendedPublicKey({\n derivationPath: \"44'/501'\",\n checkOnDevice: false,\n skipOpenApp: false,\n });\n\n // THEN\n const states: DeviceActionState<\n GetExtendedPublicKeyDAOutput,\n GetExtendedPublicKeyDAError,\n GetExtendedDAIntermediateValue\n >[] = [];\n subscription = observable.subscribe({\n next: (state) => {\n states.push(state);\n },\n error: (err) => {\n reject(err);\n },\n complete: () => {\n try {\n expect(states).toEqual([\n {\n status: DeviceActionStatus.Completed,\n output: { extendedPublicKey },\n },\n ]);\n resolve();\n } catch (err) {\n reject(err as Error);\n }\n },\n });\n }));\n\n describe(\"calls of executeDeviceAction with the correct params\", () => {\n const baseParams = {\n derivationPath: \"44'/60'/3'/2/1\",\n returnChainCode: false,\n skipOpenApp: false,\n };\n\n it(\"when checkOnDevice is true: UserInteractionRequired.VerifyAddress\", () => {\n // GIVEN\n const checkOnDevice = true;\n const params = {\n ...baseParams,\n checkOnDevice,\n };\n\n // WHEN\n const appBinder = new BtcAppBinder(\n mockedDmk,\n \"sessionId\",\n {} as WalletBuilder,\n {} as WalletSerializer,\n {} as DataStoreService,\n {} as PsbtMapper,\n {} as ValueParser,\n );\n appBinder.getExtendedPublicKey(params);\n\n // THEN\n expect(mockedDmk.executeDeviceAction).toHaveBeenCalledWith({\n sessionId: \"sessionId\",\n deviceAction: new SendCommandInAppDeviceAction({\n input: {\n command: new GetExtendedPublicKeyCommand(params),\n appName: \"Bitcoin\",\n requiredUserInteraction: UserInteractionRequired.VerifyAddress,\n skipOpenApp: false,\n },\n }),\n });\n });\n\n it(\"when checkOnDevice is false: UserInteractionRequired.None\", () => {\n // GIVEN\n const checkOnDevice = false;\n const params = {\n ...baseParams,\n checkOnDevice,\n };\n\n // WHEN\n const appBinder = new BtcAppBinder(\n mockedDmk,\n \"sessionId\",\n {} as WalletBuilder,\n {} as WalletSerializer,\n {} as DataStoreService,\n {} as PsbtMapper,\n {} as ValueParser,\n );\n appBinder.getExtendedPublicKey(params);\n\n // THEN\n expect(mockedDmk.executeDeviceAction).toHaveBeenCalledWith({\n sessionId: \"sessionId\",\n deviceAction: new SendCommandInAppDeviceAction({\n input: {\n command: new GetExtendedPublicKeyCommand(params),\n appName: \"Bitcoin\",\n requiredUserInteraction: UserInteractionRequired.None,\n skipOpenApp: false,\n },\n }),\n });\n });\n });\n });\n\n describe(\"signMessage\", () => {\n it(\"should return the signature\", () =>\n new Promise<void>((resolve, reject) => {\n // GIVEN\n const signature: Signature = {\n r: `0xDEF1`,\n s: `0xAFAF`,\n v: 0,\n };\n const message = \"Hello, World!\";\n\n vi.spyOn(mockedDmk, \"executeDeviceAction\").mockReturnValue({\n observable: from([\n {\n status: DeviceActionStatus.Completed,\n output: signature,\n } as DeviceActionState<\n SignMessageDAOutput,\n SignMessageDAError,\n SignMessageDAIntermediateValue\n >,\n ]),\n cancel: vi.fn(),\n });\n\n // WHEN\n const appBinder = new BtcAppBinder(\n mockedDmk,\n \"sessionId\",\n {} as WalletBuilder,\n {} as WalletSerializer,\n {} as DataStoreService,\n {} as PsbtMapper,\n {} as ValueParser,\n );\n const { observable } = appBinder.signMessage({\n derivationPath: \"44'/60'/3'/2/1\",\n message,\n skipOpenApp: false,\n });\n\n // THEN\n const states: DeviceActionState<\n SignMessageDAOutput,\n SignMessageDAError,\n SignMessageDAIntermediateValue\n >[] = [];\n observable.subscribe({\n next: (state) => {\n states.push(state);\n },\n error: (err) => {\n reject(err);\n },\n complete: () => {\n try {\n expect(states).toEqual([\n {\n status: DeviceActionStatus.Completed,\n output: signature,\n },\n ]);\n resolve();\n } catch (err) {\n reject(err as Error);\n }\n },\n });\n }));\n });\n});\n"],
|
|
5
|
+
"mappings": "AAAA,OAEE,sBAAAA,EAGA,gCAAAC,EACA,2BAAAC,MACK,kCACP,OAAS,QAAAC,MAA+B,OAaxC,OAAS,gBAAAC,MAAoB,oCAC7B,OAAS,+BAAAC,MAAmC,2DAO5C,SAAS,eAAgB,IAAM,CAC7B,MAAMC,EAAiC,CACrC,YAAa,GAAG,GAAG,EACnB,oBAAqB,GAAG,GAAG,CAC7B,EAEA,WAAW,IAAM,CACf,GAAG,cAAc,CACnB,CAAC,EAED,GAAG,oBAAqB,IAAM,CAC5B,MAAMC,EAAS,IAAIH,EACjB,CAAC,EACD,CAAC,EACD,CAAC,EACD,CAAC,EACD,CAAC,EACD,CAAC,EACD,CAAC,CACH,EACA,OAAOG,CAAM,EAAE,YAAY,CAC7B,CAAC,EAED,SAAS,uBAAwB,IAAM,CACrC,IAAIC,EACJ,UAAU,IAAM,CACVA,GACFA,EAAa,YAAY,CAE7B,CAAC,EACD,GAAG,4BAA6B,IAC9B,IAAI,QAAc,CAACC,EAASC,IAAW,CAErC,MAAMC,EACJ,+CAEF,GAAG,MAAML,EAAW,qBAAqB,EAAE,gBAAgB,CACzD,WAAYH,EAAK,CACf,CACE,OAAQH,EAAmB,UAC3B,OAAQ,CAAE,kBAAAW,CAAkB,CAC9B,CAKF,CAAC,EACD,OAAQ,GAAG,GAAG,CAChB,CAAC,EAGD,MAAMC,EAAY,IAAIR,EACpBE,EACA,YACA,CAAC,EACD,CAAC,EACD,CAAC,EACD,CAAC,EACD,CAAC,CACH,EACM,CAAE,WAAAO,CAAW,EAAID,EAAU,qBAAqB,CACpD,eAAgB,WAChB,cAAe,GACf,YAAa,EACf,CAAC,EAGKE,EAIA,CAAC,EACPN,EAAeK,EAAW,UAAU,CAClC,KAAOE,GAAU,CACfD,EAAO,KAAKC,CAAK,CACnB,EACA,MAAQC,GAAQ,CACdN,EAAOM,CAAG,CACZ,EACA,SAAU,IAAM,CACd,GAAI,CACF,OAAOF,CAAM,EAAE,QAAQ,CACrB,CACE,OAAQd,EAAmB,UAC3B,OAAQ,CAAE,kBAAAW,CAAkB,CAC9B,CACF,CAAC,EACDF,EAAQ,CACV,OAASO,EAAK,CACZN,EAAOM,CAAY,CACrB,CACF,CACF,CAAC,CACH,CAAC,CAAC,EAEJ,SAAS,uDAAwD,IAAM,CACrE,MAAMC,EAAa,CACjB,eAAgB,iBAChB,gBAAiB,GACjB,YAAa,EACf,EAEA,GAAG,oEAAqE,IAAM,CAG5E,MAAMC,EAAS,CACb,GAAGD,EACH,gBACF,EAGkB,IAAIb,EACpBE,EACA,YACA,CAAC,EACD,CAAC,EACD,CAAC,EACD,CAAC,EACD,CAAC,CACH,EACU,qBAAqBY,CAAM,EAGrC,OAAOZ,EAAU,mBAAmB,EAAE,qBAAqB,CACzD,UAAW,YACX,aAAc,IAAIL,EAA6B,CAC7C,MAAO,CACL,QAAS,IAAII,EAA4Ba,CAAM,EAC/C,QAAS,UACT,wBAAyBhB,EAAwB,cACjD,YAAa,EACf,CACF,CAAC,CACH,CAAC,CACH,CAAC,EAED,GAAG,4DAA6D,IAAM,CAGpE,MAAMgB,EAAS,CACb,GAAGD,EACH,gBACF,EAGkB,IAAIb,EACpBE,EACA,YACA,CAAC,EACD,CAAC,EACD,CAAC,EACD,CAAC,EACD,CAAC,CACH,EACU,qBAAqBY,CAAM,EAGrC,OAAOZ,EAAU,mBAAmB,EAAE,qBAAqB,CACzD,UAAW,YACX,aAAc,IAAIL,EAA6B,CAC7C,MAAO,CACL,QAAS,IAAII,EAA4Ba,CAAM,EAC/C,QAAS,UACT,wBAAyBhB,EAAwB,KACjD,YAAa,EACf,CACF,CAAC,CACH,CAAC,CACH,CAAC,CACH,CAAC,CACH,CAAC,EAED,SAAS,cAAe,IAAM,CAC5B,GAAG,8BAA+B,IAChC,IAAI,QAAc,CAACO,EAASC,IAAW,CAErC,MAAMS,EAAuB,CAC3B,EAAG,SACH,EAAG,SACH,EAAG,CACL,EACMC,EAAU,gBAEhB,GAAG,MAAMd,EAAW,qBAAqB,EAAE,gBAAgB,CACzD,WAAYH,EAAK,CACf,CACE,OAAQH,EAAmB,UAC3B,OAAQmB,CACV,CAKF,CAAC,EACD,OAAQ,GAAG,GAAG,CAChB,CAAC,EAGD,MAAMP,EAAY,IAAIR,EACpBE,EACA,YACA,CAAC,EACD,CAAC,EACD,CAAC,EACD,CAAC,EACD,CAAC,CACH,EACM,CAAE,WAAAO,CAAW,EAAID,EAAU,YAAY,CAC3C,eAAgB,iBAChB,QAAAQ,EACA,YAAa,EACf,CAAC,EAGKN,EAIA,CAAC,EACPD,EAAW,UAAU,CACnB,KAAOE,GAAU,CACfD,EAAO,KAAKC,CAAK,CACnB,EACA,MAAQC,GAAQ,CACdN,EAAOM,CAAG,CACZ,EACA,SAAU,IAAM,CACd,GAAI,CACF,OAAOF,CAAM,EAAE,QAAQ,CACrB,CACE,OAAQd,EAAmB,UAC3B,OAAQmB,CACV,CACF,CAAC,EACDV,EAAQ,CACV,OAASO,EAAK,CACZN,EAAOM,CAAY,CACrB,CACF,CACF,CAAC,CACH,CAAC,CAAC,CACN,CAAC,CACH,CAAC",
|
|
6
|
+
"names": ["DeviceActionStatus", "SendCommandInAppDeviceAction", "UserInteractionRequired", "from", "BtcAppBinder", "GetExtendedPublicKeyCommand", "mockedDmk", "binder", "subscription", "resolve", "reject", "extendedPublicKey", "appBinder", "observable", "states", "state", "err", "baseParams", "params", "signature", "message"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{ApduResponse as s,CommandResultFactory as a,isSuccessCommandResult as n}from"@ledgerhq/device-management-kit";import{InvalidStatusWordError as i}from"@ledgerhq/device-management-kit";import{GetMasterFingerprintCommand as p}from"./GetMasterFingerprintCommand";const c=new Uint8Array([225,5,0,0,0]),o=new Uint8Array([130,141,194,243]);describe("GetMasterFingerprintCommand",()=>{let t;beforeEach(()=>{t=new p}),describe("getApdu",()=>{it("returns the correct APDU",()=>{const e=t.getApdu();expect(e.getRawApdu()).toEqual(c)})}),describe("parseResponse",()=>{it("should return the master fingerprint",()=>{const e=new s({data:o,statusCode:new Uint8Array([144,0])}),r=t.parseResponse(e);expect(r).toEqual(a({data:{masterFingerprint:Uint8Array.from([130,141,194,243])}}))}),it("should return an error if the response is not successful",()=>{const e=new s({statusCode:Uint8Array.from([109,0]),data:new Uint8Array(0)}),r=t.parseResponse(e);expect(n(r)).toBe(!1)}),it("should return an error if the response is too short",()=>{const e=new s({data:o.slice(0,2),statusCode:new Uint8Array([144,0])}),r=t.parseResponse(e);n(r)?fail("Expected an error, but the result was successful"):expect(r.error).toEqual(new i("Master fingerprint is missing"))})})});
|
|
1
|
+
import{ApduResponse as s,CommandResultFactory as a,isSuccessCommandResult as n}from"@ledgerhq/device-management-kit";import{InvalidStatusWordError as i}from"@ledgerhq/device-management-kit";import{GetMasterFingerprintCommand as p}from"./GetMasterFingerprintCommand";const c=new Uint8Array([225,5,0,0,0]),o=new Uint8Array([130,141,194,243]);describe("GetMasterFingerprintCommand",()=>{let t;beforeEach(()=>{t=new p}),describe("getApdu",()=>{it("returns the correct APDU",()=>{const e=t.getApdu();expect(e.getRawApdu()).toEqual(c)})}),describe("parseResponse",()=>{it("should return the master fingerprint",()=>{const e=new s({data:o,statusCode:new Uint8Array([144,0])}),r=t.parseResponse(e);expect(r).toEqual(a({data:{masterFingerprint:Uint8Array.from([130,141,194,243])}}))}),it("should return an error if the response is not successful",()=>{const e=new s({statusCode:Uint8Array.from([109,0]),data:new Uint8Array(0)}),r=t.parseResponse(e);expect(n(r)).toBe(!1)}),it("should return an error if the response is too short",()=>{const e=new s({data:o.slice(0,2),statusCode:new Uint8Array([144,0])}),r=t.parseResponse(e);n(r)?assert.fail("Expected an error, but the result was successful"):expect(r.error).toEqual(new i("Master fingerprint is missing"))})})});
|
|
2
2
|
//# sourceMappingURL=GetMasterFingerprintCommand.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/command/GetMasterFingerprintCommand.test.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\nimport { InvalidStatusWordError } from \"@ledgerhq/device-management-kit\";\n\nimport { GetMasterFingerprintCommand } from \"./GetMasterFingerprintCommand\";\n\nconst GET_MASTER_FINGERPRINT_APDU = new Uint8Array([\n 0xe1, 0x05, 0x00, 0x00, 0x00,\n]);\n\nconst GET_MASTER_FINGERPRINT_RESPONSE = new Uint8Array([\n 0x82, 0x8d, 0xc2, 0xf3,\n]);\n\ndescribe(\"GetMasterFingerprintCommand\", () => {\n let command: GetMasterFingerprintCommand;\n\n beforeEach(() => {\n command = new GetMasterFingerprintCommand();\n });\n\n describe(\"getApdu\", () => {\n it(\"returns the correct APDU\", () => {\n // WHEN\n const apdu = command.getApdu();\n\n // THEN\n expect(apdu.getRawApdu()).toEqual(GET_MASTER_FINGERPRINT_APDU);\n });\n });\n\n describe(\"parseResponse\", () => {\n it(\"should return the master fingerprint\", () => {\n // GIVEN\n const response = new ApduResponse({\n data: GET_MASTER_FINGERPRINT_RESPONSE,\n statusCode: new Uint8Array([0x90, 0x00]),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n expect(result).toEqual(\n CommandResultFactory({\n data: {\n masterFingerprint: Uint8Array.from([0x82, 0x8d, 0xc2, 0xf3]),\n },\n }),\n );\n });\n\n it(\"should return an error if the response is not successful\", () => {\n // GIVEN\n const response = new ApduResponse({\n statusCode: Uint8Array.from([0x6d, 0x00]),\n data: new Uint8Array(0),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n expect(isSuccessCommandResult(result)).toBe(false);\n });\n\n it(\"should return an error if the response is too short\", () => {\n // GIVEN\n const response = new ApduResponse({\n data: GET_MASTER_FINGERPRINT_RESPONSE.slice(0, 2),\n statusCode: new Uint8Array([0x90, 0x00]),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n if (!isSuccessCommandResult(result)) {\n expect(result.error).toEqual(\n new InvalidStatusWordError(\"Master fingerprint is missing\"),\n );\n } else {\n fail(\"Expected an error, but the result was successful\");\n }\n });\n });\n});\n"],
|
|
5
|
-
"mappings": "AAAA,OACE,gBAAAA,EACA,wBAAAC,EACA,0BAAAC,MACK,kCACP,OAAS,0BAAAC,MAA8B,kCAEvC,OAAS,+BAAAC,MAAmC,gCAE5C,MAAMC,EAA8B,IAAI,WAAW,CACjD,IAAM,EAAM,EAAM,EAAM,CAC1B,CAAC,EAEKC,EAAkC,IAAI,WAAW,CACrD,IAAM,IAAM,IAAM,GACpB,CAAC,EAED,SAAS,8BAA+B,IAAM,CAC5C,IAAIC,EAEJ,WAAW,IAAM,CACfA,EAAU,IAAIH,CAChB,CAAC,EAED,SAAS,UAAW,IAAM,CACxB,GAAG,2BAA4B,IAAM,CAEnC,MAAMI,EAAOD,EAAQ,QAAQ,EAG7B,OAAOC,EAAK,WAAW,CAAC,EAAE,QAAQH,CAA2B,CAC/D,CAAC,CACH,CAAC,EAED,SAAS,gBAAiB,IAAM,CAC9B,GAAG,uCAAwC,IAAM,CAE/C,MAAMI,EAAW,IAAIT,EAAa,CAChC,KAAMM,EACN,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,CACzC,CAAC,EAGKI,EAASH,EAAQ,cAAcE,CAAQ,EAG7C,OAAOC,CAAM,EAAE,QACbT,EAAqB,CACnB,KAAM,CACJ,kBAAmB,WAAW,KAAK,CAAC,IAAM,IAAM,IAAM,GAAI,CAAC,CAC7D,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,2DAA4D,IAAM,CAEnE,MAAMQ,EAAW,IAAIT,EAAa,CAChC,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAM,IAAI,WAAW,CAAC,CACxB,CAAC,EAGKU,EAASH,EAAQ,cAAcE,CAAQ,EAG7C,OAAOP,EAAuBQ,CAAM,CAAC,EAAE,KAAK,EAAK,CACnD,CAAC,EAED,GAAG,sDAAuD,IAAM,CAE9D,MAAMD,EAAW,IAAIT,EAAa,CAChC,KAAMM,EAAgC,MAAM,EAAG,CAAC,EAChD,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,CACzC,CAAC,EAGKI,EAASH,EAAQ,cAAcE,CAAQ,EAGxCP,EAAuBQ,CAAM,EAKhC,KAAK,kDAAkD,
|
|
4
|
+
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\nimport { InvalidStatusWordError } from \"@ledgerhq/device-management-kit\";\n\nimport { GetMasterFingerprintCommand } from \"./GetMasterFingerprintCommand\";\n\nconst GET_MASTER_FINGERPRINT_APDU = new Uint8Array([\n 0xe1, 0x05, 0x00, 0x00, 0x00,\n]);\n\nconst GET_MASTER_FINGERPRINT_RESPONSE = new Uint8Array([\n 0x82, 0x8d, 0xc2, 0xf3,\n]);\n\ndescribe(\"GetMasterFingerprintCommand\", () => {\n let command: GetMasterFingerprintCommand;\n\n beforeEach(() => {\n command = new GetMasterFingerprintCommand();\n });\n\n describe(\"getApdu\", () => {\n it(\"returns the correct APDU\", () => {\n // WHEN\n const apdu = command.getApdu();\n\n // THEN\n expect(apdu.getRawApdu()).toEqual(GET_MASTER_FINGERPRINT_APDU);\n });\n });\n\n describe(\"parseResponse\", () => {\n it(\"should return the master fingerprint\", () => {\n // GIVEN\n const response = new ApduResponse({\n data: GET_MASTER_FINGERPRINT_RESPONSE,\n statusCode: new Uint8Array([0x90, 0x00]),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n expect(result).toEqual(\n CommandResultFactory({\n data: {\n masterFingerprint: Uint8Array.from([0x82, 0x8d, 0xc2, 0xf3]),\n },\n }),\n );\n });\n\n it(\"should return an error if the response is not successful\", () => {\n // GIVEN\n const response = new ApduResponse({\n statusCode: Uint8Array.from([0x6d, 0x00]),\n data: new Uint8Array(0),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n expect(isSuccessCommandResult(result)).toBe(false);\n });\n\n it(\"should return an error if the response is too short\", () => {\n // GIVEN\n const response = new ApduResponse({\n data: GET_MASTER_FINGERPRINT_RESPONSE.slice(0, 2),\n statusCode: new Uint8Array([0x90, 0x00]),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n if (!isSuccessCommandResult(result)) {\n expect(result.error).toEqual(\n new InvalidStatusWordError(\"Master fingerprint is missing\"),\n );\n } else {\n assert.fail(\"Expected an error, but the result was successful\");\n }\n });\n });\n});\n"],
|
|
5
|
+
"mappings": "AAAA,OACE,gBAAAA,EACA,wBAAAC,EACA,0BAAAC,MACK,kCACP,OAAS,0BAAAC,MAA8B,kCAEvC,OAAS,+BAAAC,MAAmC,gCAE5C,MAAMC,EAA8B,IAAI,WAAW,CACjD,IAAM,EAAM,EAAM,EAAM,CAC1B,CAAC,EAEKC,EAAkC,IAAI,WAAW,CACrD,IAAM,IAAM,IAAM,GACpB,CAAC,EAED,SAAS,8BAA+B,IAAM,CAC5C,IAAIC,EAEJ,WAAW,IAAM,CACfA,EAAU,IAAIH,CAChB,CAAC,EAED,SAAS,UAAW,IAAM,CACxB,GAAG,2BAA4B,IAAM,CAEnC,MAAMI,EAAOD,EAAQ,QAAQ,EAG7B,OAAOC,EAAK,WAAW,CAAC,EAAE,QAAQH,CAA2B,CAC/D,CAAC,CACH,CAAC,EAED,SAAS,gBAAiB,IAAM,CAC9B,GAAG,uCAAwC,IAAM,CAE/C,MAAMI,EAAW,IAAIT,EAAa,CAChC,KAAMM,EACN,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,CACzC,CAAC,EAGKI,EAASH,EAAQ,cAAcE,CAAQ,EAG7C,OAAOC,CAAM,EAAE,QACbT,EAAqB,CACnB,KAAM,CACJ,kBAAmB,WAAW,KAAK,CAAC,IAAM,IAAM,IAAM,GAAI,CAAC,CAC7D,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,2DAA4D,IAAM,CAEnE,MAAMQ,EAAW,IAAIT,EAAa,CAChC,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAM,IAAI,WAAW,CAAC,CACxB,CAAC,EAGKU,EAASH,EAAQ,cAAcE,CAAQ,EAG7C,OAAOP,EAAuBQ,CAAM,CAAC,EAAE,KAAK,EAAK,CACnD,CAAC,EAED,GAAG,sDAAuD,IAAM,CAE9D,MAAMD,EAAW,IAAIT,EAAa,CAChC,KAAMM,EAAgC,MAAM,EAAG,CAAC,EAChD,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,CACzC,CAAC,EAGKI,EAASH,EAAQ,cAAcE,CAAQ,EAGxCP,EAAuBQ,CAAM,EAKhC,OAAO,KAAK,kDAAkD,EAJ9D,OAAOA,EAAO,KAAK,EAAE,QACnB,IAAIP,EAAuB,+BAA+B,CAC5D,CAIJ,CAAC,CACH,CAAC,CACH,CAAC",
|
|
6
6
|
"names": ["ApduResponse", "CommandResultFactory", "isSuccessCommandResult", "InvalidStatusWordError", "GetMasterFingerprintCommand", "GET_MASTER_FINGERPRINT_APDU", "GET_MASTER_FINGERPRINT_RESPONSE", "command", "apdu", "response", "result"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{ApduResponse as o,CommandResultFactory as n,isSuccessCommandResult as d}from"@ledgerhq/device-management-kit";import{SW_INTERRUPTED_EXECUTION as A}from"./utils/constants";import{GetWalletAddressCommand as c}from"./GetWalletAddressCommand";const
|
|
1
|
+
import{ApduResponse as o,CommandResultFactory as n,isSuccessCommandResult as d}from"@ledgerhq/device-management-kit";import{SW_INTERRUPTED_EXECUTION as A}from"./utils/constants";import{GetWalletAddressCommand as c}from"./GetWalletAddressCommand";const p=new Uint8Array([144,0]),i=new Uint8Array([105,133]);describe("GetWalletAddressCommand",()=>{let s;const l={checkOnDevice:!0,walletId:Uint8Array.from("walletIdBuffer",e=>e.charCodeAt(0)),walletHmac:Uint8Array.from("walletHmacBuffer",e=>e.charCodeAt(0)),change:!1,addressIndex:0};beforeEach(()=>{s=new c(l),vi.clearAllMocks(),vi.importActual("@ledgerhq/device-management-kit")}),describe("getApdu",()=>{it("should return correct APDU for default arguments",()=>{const e=s.getApdu(),t=Uint8Array.from([225,3,0,1,36,1,...Uint8Array.from("walletIdBuffer",r=>r.charCodeAt(0)),...Uint8Array.from("walletHmacBuffer",r=>r.charCodeAt(0)),0,0,0,0,0]);expect(e.getRawApdu()).toEqual(t)}),it("should return correct APDU for different arguments",()=>{const e={checkOnDevice:!1,walletId:Uint8Array.from("anotherWalletId",a=>a.charCodeAt(0)),walletHmac:Uint8Array.from("anotherWalletHmac",a=>a.charCodeAt(0)),change:!0,addressIndex:5};s=new c(e);const t=s.getApdu(),r=Uint8Array.from([225,3,0,1,38,0,...Uint8Array.from("anotherWalletId",a=>a.charCodeAt(0)),...Uint8Array.from("anotherWalletHmac",a=>a.charCodeAt(0)),1,0,0,0,5]);expect(t.getRawApdu()).toEqual(r)})}),describe("parseResponse",()=>{it("should return the APDU response if it's a continue response",()=>{const e=new Uint8Array([1,2,3,4]),t=new o({statusCode:A,data:e}),r=s.parseResponse(t);expect(r).toStrictEqual(n({data:t}))}),it("should return an error if user denied the operation",()=>{const e=new o({statusCode:i,data:new Uint8Array([])}),t=s.parseResponse(e);expect(d(t)).toBe(!1),d(t)||expect(t.error).toBeDefined()}),it("should return correct data when response is not empty",()=>{const e=Uint8Array.from("addressData",a=>a.charCodeAt(0)),t=new o({statusCode:p,data:e}),r=s.parseResponse(t);expect(r).toStrictEqual(n({data:t}))})})});
|
|
2
2
|
//# sourceMappingURL=GetWalletAddressCommand.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/command/GetWalletAddressCommand.test.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { SW_INTERRUPTED_EXECUTION } from \"./utils/constants\";\nimport {\n GetWalletAddressCommand,\n type GetWalletAddressCommandArgs,\n} from \"./GetWalletAddressCommand\";\n\nconst SUCCESS_STATUS = new Uint8Array([0x90, 0x00]);\nconst USER_DENIED_STATUS = new Uint8Array([0x69, 0x85]);\n\ndescribe(\"GetWalletAddressCommand\", () => {\n let command: GetWalletAddressCommand;\n const defaultArgs: GetWalletAddressCommandArgs = {\n checkOnDevice: true,\n walletId: Uint8Array.from(\"walletIdBuffer\", (c) => c.charCodeAt(0)),\n walletHmac: Uint8Array.from(\"walletHmacBuffer\", (c) => c.charCodeAt(0)),\n change: false,\n addressIndex: 0x00000000,\n };\n\n beforeEach(() => {\n command = new GetWalletAddressCommand(defaultArgs);\n
|
|
5
|
-
"mappings": "AAAA,OACE,gBAAAA,EACA,wBAAAC,EACA,0BAAAC,MACK,kCAEP,OAAS,4BAAAC,MAAgC,oBACzC,OACE,2BAAAC,MAEK,4BAEP,MAAMC,EAAiB,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,EAC5CC,EAAqB,IAAI,WAAW,CAAC,IAAM,GAAI,CAAC,EAEtD,SAAS,0BAA2B,IAAM,CACxC,IAAIC,EACJ,MAAMC,EAA2C,CAC/C,cAAe,GACf,SAAU,WAAW,KAAK,iBAAmBC,GAAMA,EAAE,WAAW,CAAC,CAAC,EAClE,WAAY,WAAW,KAAK,mBAAqBA,GAAMA,EAAE,WAAW,CAAC,CAAC,EACtE,OAAQ,GACR,aAAc,CAChB,EAEA,WAAW,IAAM,CACfF,EAAU,IAAIH,EAAwBI,CAAW,EACjD,
|
|
4
|
+
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { SW_INTERRUPTED_EXECUTION } from \"./utils/constants\";\nimport {\n GetWalletAddressCommand,\n type GetWalletAddressCommandArgs,\n} from \"./GetWalletAddressCommand\";\n\nconst SUCCESS_STATUS = new Uint8Array([0x90, 0x00]);\nconst USER_DENIED_STATUS = new Uint8Array([0x69, 0x85]);\n\ndescribe(\"GetWalletAddressCommand\", () => {\n let command: GetWalletAddressCommand;\n const defaultArgs: GetWalletAddressCommandArgs = {\n checkOnDevice: true,\n walletId: Uint8Array.from(\"walletIdBuffer\", (c) => c.charCodeAt(0)),\n walletHmac: Uint8Array.from(\"walletHmacBuffer\", (c) => c.charCodeAt(0)),\n change: false,\n addressIndex: 0x00000000,\n };\n\n beforeEach(() => {\n command = new GetWalletAddressCommand(defaultArgs);\n vi.clearAllMocks();\n vi.importActual(\"@ledgerhq/device-management-kit\");\n });\n\n describe(\"getApdu\", () => {\n it(\"should return correct APDU for default arguments\", () => {\n const apdu = command.getApdu();\n const expectedApdu = Uint8Array.from([\n 0xe1, // CLA\n 0x03, // INS\n 0x00, // P1\n 0x01, // P2\n 0x24, // Length of data: 36 bytes\n 0x01, // checkOnDevice: true\n ...Uint8Array.from(\"walletIdBuffer\", (c) => c.charCodeAt(0)),\n ...Uint8Array.from(\"walletHmacBuffer\", (c) => c.charCodeAt(0)),\n 0x00, // change: false\n 0x00,\n 0x00,\n 0x00,\n 0x00, // addressIndex: 0x00000000\n ]);\n expect(apdu.getRawApdu()).toEqual(expectedApdu);\n });\n\n it(\"should return correct APDU for different arguments\", () => {\n const args: GetWalletAddressCommandArgs = {\n checkOnDevice: false,\n walletId: Uint8Array.from(\"anotherWalletId\", (c) => c.charCodeAt(0)),\n walletHmac: Uint8Array.from(\"anotherWalletHmac\", (c) =>\n c.charCodeAt(0),\n ),\n change: true,\n addressIndex: 0x00000005,\n };\n command = new GetWalletAddressCommand(args);\n const apdu = command.getApdu();\n const expectedApdu = Uint8Array.from([\n 0xe1, // CLA\n 0x03, // INS\n 0x00, // P1\n 0x01, // P2\n 0x26, // Length of data\n 0x00, // checkOnDevice: false\n ...Uint8Array.from(\"anotherWalletId\", (c) => c.charCodeAt(0)),\n ...Uint8Array.from(\"anotherWalletHmac\", (c) => c.charCodeAt(0)),\n 0x01, // change: true\n 0x00,\n 0x00,\n 0x00,\n 0x05, // addressIndex: 0x00000005\n ]);\n expect(apdu.getRawApdu()).toEqual(expectedApdu);\n });\n });\n\n describe(\"parseResponse\", () => {\n it(\"should return the APDU response if it's a continue response\", () => {\n // given\n const continueResponseData = new Uint8Array([0x01, 0x02, 0x03, 0x04]);\n\n const apduResponse = new ApduResponse({\n statusCode: SW_INTERRUPTED_EXECUTION,\n data: continueResponseData,\n });\n\n // when\n const response = command.parseResponse(apduResponse);\n\n // then\n expect(response).toStrictEqual(\n CommandResultFactory({\n data: apduResponse,\n }),\n );\n });\n\n it(\"should return an error if user denied the operation\", () => {\n // given\n const apduResponse = new ApduResponse({\n statusCode: USER_DENIED_STATUS,\n data: new Uint8Array([]),\n });\n\n // when\n const response = command.parseResponse(apduResponse);\n\n // then\n expect(isSuccessCommandResult(response)).toBe(false);\n if (!isSuccessCommandResult(response)) {\n expect(response.error).toBeDefined();\n }\n });\n\n it(\"should return correct data when response is not empty\", () => {\n // given\n const responseData = Uint8Array.from(\"addressData\", (c) =>\n c.charCodeAt(0),\n );\n\n const apduResponse = new ApduResponse({\n statusCode: SUCCESS_STATUS,\n data: responseData,\n });\n\n // when\n const response = command.parseResponse(apduResponse);\n\n // then\n expect(response).toStrictEqual(\n CommandResultFactory({ data: apduResponse }),\n );\n });\n });\n});\n"],
|
|
5
|
+
"mappings": "AAAA,OACE,gBAAAA,EACA,wBAAAC,EACA,0BAAAC,MACK,kCAEP,OAAS,4BAAAC,MAAgC,oBACzC,OACE,2BAAAC,MAEK,4BAEP,MAAMC,EAAiB,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,EAC5CC,EAAqB,IAAI,WAAW,CAAC,IAAM,GAAI,CAAC,EAEtD,SAAS,0BAA2B,IAAM,CACxC,IAAIC,EACJ,MAAMC,EAA2C,CAC/C,cAAe,GACf,SAAU,WAAW,KAAK,iBAAmBC,GAAMA,EAAE,WAAW,CAAC,CAAC,EAClE,WAAY,WAAW,KAAK,mBAAqBA,GAAMA,EAAE,WAAW,CAAC,CAAC,EACtE,OAAQ,GACR,aAAc,CAChB,EAEA,WAAW,IAAM,CACfF,EAAU,IAAIH,EAAwBI,CAAW,EACjD,GAAG,cAAc,EACjB,GAAG,aAAa,iCAAiC,CACnD,CAAC,EAED,SAAS,UAAW,IAAM,CACxB,GAAG,mDAAoD,IAAM,CAC3D,MAAME,EAAOH,EAAQ,QAAQ,EACvBI,EAAe,WAAW,KAAK,CACnC,IACA,EACA,EACA,EACA,GACA,EACA,GAAG,WAAW,KAAK,iBAAmBF,GAAMA,EAAE,WAAW,CAAC,CAAC,EAC3D,GAAG,WAAW,KAAK,mBAAqBA,GAAMA,EAAE,WAAW,CAAC,CAAC,EAC7D,EACA,EACA,EACA,EACA,CACF,CAAC,EACD,OAAOC,EAAK,WAAW,CAAC,EAAE,QAAQC,CAAY,CAChD,CAAC,EAED,GAAG,qDAAsD,IAAM,CAC7D,MAAMC,EAAoC,CACxC,cAAe,GACf,SAAU,WAAW,KAAK,kBAAoBH,GAAMA,EAAE,WAAW,CAAC,CAAC,EACnE,WAAY,WAAW,KAAK,oBAAsBA,GAChDA,EAAE,WAAW,CAAC,CAChB,EACA,OAAQ,GACR,aAAc,CAChB,EACAF,EAAU,IAAIH,EAAwBQ,CAAI,EAC1C,MAAMF,EAAOH,EAAQ,QAAQ,EACvBI,EAAe,WAAW,KAAK,CACnC,IACA,EACA,EACA,EACA,GACA,EACA,GAAG,WAAW,KAAK,kBAAoBF,GAAMA,EAAE,WAAW,CAAC,CAAC,EAC5D,GAAG,WAAW,KAAK,oBAAsBA,GAAMA,EAAE,WAAW,CAAC,CAAC,EAC9D,EACA,EACA,EACA,EACA,CACF,CAAC,EACD,OAAOC,EAAK,WAAW,CAAC,EAAE,QAAQC,CAAY,CAChD,CAAC,CACH,CAAC,EAED,SAAS,gBAAiB,IAAM,CAC9B,GAAG,8DAA+D,IAAM,CAEtE,MAAME,EAAuB,IAAI,WAAW,CAAC,EAAM,EAAM,EAAM,CAAI,CAAC,EAE9DC,EAAe,IAAId,EAAa,CACpC,WAAYG,EACZ,KAAMU,CACR,CAAC,EAGKE,EAAWR,EAAQ,cAAcO,CAAY,EAGnD,OAAOC,CAAQ,EAAE,cACfd,EAAqB,CACnB,KAAMa,CACR,CAAC,CACH,CACF,CAAC,EAED,GAAG,sDAAuD,IAAM,CAE9D,MAAMA,EAAe,IAAId,EAAa,CACpC,WAAYM,EACZ,KAAM,IAAI,WAAW,CAAC,CAAC,CACzB,CAAC,EAGKS,EAAWR,EAAQ,cAAcO,CAAY,EAGnD,OAAOZ,EAAuBa,CAAQ,CAAC,EAAE,KAAK,EAAK,EAC9Cb,EAAuBa,CAAQ,GAClC,OAAOA,EAAS,KAAK,EAAE,YAAY,CAEvC,CAAC,EAED,GAAG,wDAAyD,IAAM,CAEhE,MAAMC,EAAe,WAAW,KAAK,cAAgBP,GACnDA,EAAE,WAAW,CAAC,CAChB,EAEMK,EAAe,IAAId,EAAa,CACpC,WAAYK,EACZ,KAAMW,CACR,CAAC,EAGKD,EAAWR,EAAQ,cAAcO,CAAY,EAGnD,OAAOC,CAAQ,EAAE,cACfd,EAAqB,CAAE,KAAMa,CAAa,CAAC,CAC7C,CACF,CAAC,CACH,CAAC,CACH,CAAC",
|
|
6
6
|
"names": ["ApduResponse", "CommandResultFactory", "isSuccessCommandResult", "SW_INTERRUPTED_EXECUTION", "GetWalletAddressCommand", "SUCCESS_STATUS", "USER_DENIED_STATUS", "command", "defaultArgs", "c", "apdu", "expectedApdu", "args", "continueResponseData", "apduResponse", "response", "responseData"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{ApduResponse as
|
|
1
|
+
import{ApduResponse as c,CommandResultFactory as n,InvalidStatusWordError as d,isSuccessCommandResult as r}from"@ledgerhq/device-management-kit";import{RegisterWalletAddressCommand as o}from"../../app-binder/command/RegisterWalletAddressCommand";const l=Uint8Array.from([124,103,232,79,153,116,70,113,20,147,239,139,116,112,177,15,96,75,2,210,88,79,160,68,111,206,247,217,137,131,227,220]),i=2,f=Uint8Array.from([75,197,70,127,36,147,133,178,158,91,142,201,251,36,204,101,163,113,11,26,38,210,141,233,245,196,243,244,93,214,84,193]),A=Uint8Array.from([2,12,67,111,108,100,32,115,116,111,114,97,103,101,30]),m=2,t=Uint8Array.from([m].concat(...A).concat(...l).concat([i]).concat(...f)),u=Uint8Array.from([225,2,0,1,81].concat(...t)),a=Uint8Array.from([29,21,14,212,37,168,113,165,202,126,44,85,219,27,50,149,193,253,151,20,127,208,167,177,136,212,50,127,75,167,64,42,250,115,227,97,25,50,79,190,76,193,202,148,170,132,44,98,97,82,109,68,17,42,34,22,75,197,124,51,53,16,43,4]);describe("RegisterWalletAddressCommand",()=>{describe("getApdu",()=>{it("should send the correct APDU",()=>{const x=new o({walletPolicy:t});expect(x.getApdu().getRawApdu()).toEqual(u)})}),describe("parseResponse",()=>{it("should parse the response correctly",()=>{const x=new o({walletPolicy:t}),e=new c({statusCode:new Uint8Array([144,0]),data:a});expect(x.parseResponse(e)).toEqual(n({data:{walletId:a.slice(0,32),walletHmac:a.slice(32)}}))}),it("should return an error if the response is not successful",()=>{const x=new o({walletPolicy:t}),e=new c({statusCode:Uint8Array.from([109,0]),data:new Uint8Array(0)}),s=x.parseResponse(e);expect(r(s)).toBe(!1)}),it("should return an error if the response is too short",()=>{const x=new o({walletPolicy:t}),e=new c({data:a.slice(0,2),statusCode:new Uint8Array([144,0])}),s=x.parseResponse(e);r(s)?assert.fail("Expected an error, but the result was successful"):expect(s.error).toEqual(new d("Data mismatch"))})})});
|
|
2
2
|
//# sourceMappingURL=RegisterWalletAddressCommand.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/command/RegisterWalletAddressCommand.test.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n InvalidStatusWordError,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { RegisterWalletAddressCommand } from \"@internal/app-binder/command/RegisterWalletAddressCommand\";\n\nconst POLICY_HASH_DATA = Uint8Array.from([\n 0x7c, 0x67, 0xe8, 0x4f, 0x99, 0x74, 0x46, 0x71, 0x14, 0x93, 0xef, 0x8b, 0x74,\n 0x70, 0xb1, 0x0f, 0x60, 0x4b, 0x02, 0xd2, 0x58, 0x4f, 0xa0, 0x44, 0x6f, 0xce,\n 0xf7, 0xd9, 0x89, 0x83, 0xe3, 0xdc,\n]);\nconst KEYS_LENGTH = 0x02;\nconst KEYS_HASH_DATA = Uint8Array.from([\n 0x4b, 0xc5, 0x46, 0x7f, 0x24, 0x93, 0x85, 0xb2, 0x9e, 0x5b, 0x8e, 0xc9, 0xfb,\n 0x24, 0xcc, 0x65, 0xa3, 0x71, 0x0b, 0x1a, 0x26, 0xd2, 0x8d, 0xe9, 0xf5, 0xc4,\n 0xf3, 0xf4, 0x5d, 0xd6, 0x54, 0xc1,\n]);\nconst POLICY_NAME_DATA = Uint8Array.from([\n 0x02, 0x0c, 0x43, 0x6f, 0x6c, 0x64, 0x20, 0x73, 0x74, 0x6f, 0x72, 0x61, 0x67,\n 0x65, 0x1e,\n]);\nconst POLICY_VERSION = 0x02;\nconst WALLET_POLICY_DATA = Uint8Array.from(\n [POLICY_VERSION]\n .concat(...POLICY_NAME_DATA)\n .concat(...POLICY_HASH_DATA)\n .concat([KEYS_LENGTH])\n .concat(...KEYS_HASH_DATA),\n);\nconst EXPECTED_RAW_APDU = Uint8Array.from(\n [0xe1, 0x02, 0x00, 0x01, 0x51].concat(...WALLET_POLICY_DATA),\n);\nconst APDU_RESPONSE = Uint8Array.from([\n 0x1d, 0x15, 0x0e, 0xd4, 0x25, 0xa8, 0x71, 0xa5, 0xca, 0x7e, 0x2c, 0x55, 0xdb,\n 0x1b, 0x32, 0x95, 0xc1, 0xfd, 0x97, 0x14, 0x7f, 0xd0, 0xa7, 0xb1, 0x88, 0xd4,\n 0x32, 0x7f, 0x4b, 0xa7, 0x40, 0x2a, 0xfa, 0x73, 0xe3, 0x61, 0x19, 0x32, 0x4f,\n 0xbe, 0x4c, 0xc1, 0xca, 0x94, 0xaa, 0x84, 0x2c, 0x62, 0x61, 0x52, 0x6d, 0x44,\n 0x11, 0x2a, 0x22, 0x16, 0x4b, 0xc5, 0x7c, 0x33, 0x35, 0x10, 0x2b, 0x04,\n]);\n\ndescribe(\"RegisterWalletAddressCommand\", () => {\n describe(\"getApdu\", () => {\n it(\"should send the correct APDU\", () => {\n // when\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n\n // then\n expect(command.getApdu().getRawApdu()).toEqual(EXPECTED_RAW_APDU);\n });\n });\n describe(\"parseResponse\", () => {\n it(\"should parse the response correctly\", () => {\n // given\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n const response = new ApduResponse({\n statusCode: new Uint8Array([0x90, 0x00]),\n data: APDU_RESPONSE,\n });\n\n // then\n expect(command.parseResponse(response)).toEqual(\n CommandResultFactory({\n data: {\n walletId: APDU_RESPONSE.slice(0, 32),\n walletHmac: APDU_RESPONSE.slice(32),\n },\n }),\n );\n });\n\n it(\"should return an error if the response is not successful\", () => {\n // given\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n const response = new ApduResponse({\n statusCode: Uint8Array.from([0x6d, 0x00]),\n data: new Uint8Array(0),\n });\n\n // when\n const result = command.parseResponse(response);\n\n // then\n expect(isSuccessCommandResult(result)).toBe(false);\n });\n it(\"should return an error if the response is too short\", () => {\n // given\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n const response = new ApduResponse({\n data: APDU_RESPONSE.slice(0, 2),\n statusCode: new Uint8Array([0x90, 0x00]),\n });\n\n // when\n const result = command.parseResponse(response);\n\n // then\n if (!isSuccessCommandResult(result)) {\n expect(result.error).toEqual(\n new InvalidStatusWordError(\"Data mismatch\"),\n );\n } else {\n fail(\"Expected an error, but the result was successful\");\n }\n });\n });\n});\n"],
|
|
5
|
-
"mappings": "AAAA,OACE,gBAAAA,EACA,wBAAAC,EACA,0BAAAC,EACA,0BAAAC,MACK,kCAEP,OAAS,gCAAAC,MAAoC,4DAE7C,MAAMC,EAAmB,WAAW,KAAK,CACvC,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IACxE,IAAM,IAAM,GAAM,GAAM,GAAM,EAAM,IAAM,GAAM,GAAM,IAAM,GAAM,IAAM,IACxE,IAAM,IAAM,IAAM,IAAM,IAAM,GAChC,CAAC,EACKC,EAAc,EACdC,EAAiB,WAAW,KAAK,CACrC,GAAM,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IACxE,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IACxE,IAAM,IAAM,GAAM,IAAM,GAAM,GAChC,CAAC,EACKC,EAAmB,WAAW,KAAK,CACvC,EAAM,GAAM,GAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IACxE,IAAM,EACR,CAAC,EACKC,EAAiB,EACjBC,EAAqB,WAAW,KACpC,CAACD,CAAc,EACZ,OAAO,GAAGD,CAAgB,EAC1B,OAAO,GAAGH,CAAgB,EAC1B,OAAO,CAACC,CAAW,CAAC,EACpB,OAAO,GAAGC,CAAc,CAC7B,EACMI,EAAoB,WAAW,KACnC,CAAC,IAAM,EAAM,EAAM,EAAM,EAAI,EAAE,OAAO,GAAGD,CAAkB,CAC7D,EACME,EAAgB,WAAW,KAAK,CACpC,GAAM,GAAM,GAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,GAAM,IACxE,GAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,IACxE,GAAM,IAAM,GAAM,IAAM,GAAM,GAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GACxE,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GAAM,IAAM,GACxE,GAAM,GAAM,GAAM,GAAM,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GAAM,CACpE,CAAC,EAED,SAAS,+BAAgC,IAAM,CAC7C,SAAS,UAAW,IAAM,CACxB,GAAG,+BAAgC,IAAM,CAEvC,MAAMC,EAAU,IAAIT,EAA6B,CAC/C,aAAcM,CAChB,CAAC,EAGD,OAAOG,EAAQ,QAAQ,EAAE,WAAW,CAAC,EAAE,QAAQF,CAAiB,CAClE,CAAC,CACH,CAAC,EACD,SAAS,gBAAiB,IAAM,CAC9B,GAAG,sCAAuC,IAAM,CAE9C,MAAME,EAAU,IAAIT,EAA6B,CAC/C,aAAcM,CAChB,CAAC,EACKI,EAAW,IAAId,EAAa,CAChC,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,EACvC,KAAMY,CACR,CAAC,EAGD,OAAOC,EAAQ,cAAcC,CAAQ,CAAC,EAAE,QACtCb,EAAqB,CACnB,KAAM,CACJ,SAAUW,EAAc,MAAM,EAAG,EAAE,EACnC,WAAYA,EAAc,MAAM,EAAE,CACpC,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,2DAA4D,IAAM,CAEnE,MAAMC,EAAU,IAAIT,EAA6B,CAC/C,aAAcM,CAChB,CAAC,EACKI,EAAW,IAAId,EAAa,CAChC,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAM,IAAI,WAAW,CAAC,CACxB,CAAC,EAGKe,EAASF,EAAQ,cAAcC,CAAQ,EAG7C,OAAOX,EAAuBY,CAAM,CAAC,EAAE,KAAK,EAAK,CACnD,CAAC,EACD,GAAG,sDAAuD,IAAM,CAE9D,MAAMF,EAAU,IAAIT,EAA6B,CAC/C,aAAcM,CAChB,CAAC,EACKI,EAAW,IAAId,EAAa,CAChC,KAAMY,EAAc,MAAM,EAAG,CAAC,EAC9B,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,CACzC,CAAC,EAGKG,EAASF,EAAQ,cAAcC,CAAQ,EAGxCX,EAAuBY,CAAM,EAKhC,KAAK,kDAAkD,
|
|
4
|
+
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n InvalidStatusWordError,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { RegisterWalletAddressCommand } from \"@internal/app-binder/command/RegisterWalletAddressCommand\";\n\nconst POLICY_HASH_DATA = Uint8Array.from([\n 0x7c, 0x67, 0xe8, 0x4f, 0x99, 0x74, 0x46, 0x71, 0x14, 0x93, 0xef, 0x8b, 0x74,\n 0x70, 0xb1, 0x0f, 0x60, 0x4b, 0x02, 0xd2, 0x58, 0x4f, 0xa0, 0x44, 0x6f, 0xce,\n 0xf7, 0xd9, 0x89, 0x83, 0xe3, 0xdc,\n]);\nconst KEYS_LENGTH = 0x02;\nconst KEYS_HASH_DATA = Uint8Array.from([\n 0x4b, 0xc5, 0x46, 0x7f, 0x24, 0x93, 0x85, 0xb2, 0x9e, 0x5b, 0x8e, 0xc9, 0xfb,\n 0x24, 0xcc, 0x65, 0xa3, 0x71, 0x0b, 0x1a, 0x26, 0xd2, 0x8d, 0xe9, 0xf5, 0xc4,\n 0xf3, 0xf4, 0x5d, 0xd6, 0x54, 0xc1,\n]);\nconst POLICY_NAME_DATA = Uint8Array.from([\n 0x02, 0x0c, 0x43, 0x6f, 0x6c, 0x64, 0x20, 0x73, 0x74, 0x6f, 0x72, 0x61, 0x67,\n 0x65, 0x1e,\n]);\nconst POLICY_VERSION = 0x02;\nconst WALLET_POLICY_DATA = Uint8Array.from(\n [POLICY_VERSION]\n .concat(...POLICY_NAME_DATA)\n .concat(...POLICY_HASH_DATA)\n .concat([KEYS_LENGTH])\n .concat(...KEYS_HASH_DATA),\n);\nconst EXPECTED_RAW_APDU = Uint8Array.from(\n [0xe1, 0x02, 0x00, 0x01, 0x51].concat(...WALLET_POLICY_DATA),\n);\nconst APDU_RESPONSE = Uint8Array.from([\n 0x1d, 0x15, 0x0e, 0xd4, 0x25, 0xa8, 0x71, 0xa5, 0xca, 0x7e, 0x2c, 0x55, 0xdb,\n 0x1b, 0x32, 0x95, 0xc1, 0xfd, 0x97, 0x14, 0x7f, 0xd0, 0xa7, 0xb1, 0x88, 0xd4,\n 0x32, 0x7f, 0x4b, 0xa7, 0x40, 0x2a, 0xfa, 0x73, 0xe3, 0x61, 0x19, 0x32, 0x4f,\n 0xbe, 0x4c, 0xc1, 0xca, 0x94, 0xaa, 0x84, 0x2c, 0x62, 0x61, 0x52, 0x6d, 0x44,\n 0x11, 0x2a, 0x22, 0x16, 0x4b, 0xc5, 0x7c, 0x33, 0x35, 0x10, 0x2b, 0x04,\n]);\n\ndescribe(\"RegisterWalletAddressCommand\", () => {\n describe(\"getApdu\", () => {\n it(\"should send the correct APDU\", () => {\n // when\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n\n // then\n expect(command.getApdu().getRawApdu()).toEqual(EXPECTED_RAW_APDU);\n });\n });\n describe(\"parseResponse\", () => {\n it(\"should parse the response correctly\", () => {\n // given\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n const response = new ApduResponse({\n statusCode: new Uint8Array([0x90, 0x00]),\n data: APDU_RESPONSE,\n });\n\n // then\n expect(command.parseResponse(response)).toEqual(\n CommandResultFactory({\n data: {\n walletId: APDU_RESPONSE.slice(0, 32),\n walletHmac: APDU_RESPONSE.slice(32),\n },\n }),\n );\n });\n\n it(\"should return an error if the response is not successful\", () => {\n // given\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n const response = new ApduResponse({\n statusCode: Uint8Array.from([0x6d, 0x00]),\n data: new Uint8Array(0),\n });\n\n // when\n const result = command.parseResponse(response);\n\n // then\n expect(isSuccessCommandResult(result)).toBe(false);\n });\n it(\"should return an error if the response is too short\", () => {\n // given\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n const response = new ApduResponse({\n data: APDU_RESPONSE.slice(0, 2),\n statusCode: new Uint8Array([0x90, 0x00]),\n });\n\n // when\n const result = command.parseResponse(response);\n\n // then\n if (!isSuccessCommandResult(result)) {\n expect(result.error).toEqual(\n new InvalidStatusWordError(\"Data mismatch\"),\n );\n } else {\n assert.fail(\"Expected an error, but the result was successful\");\n }\n });\n });\n});\n"],
|
|
5
|
+
"mappings": "AAAA,OACE,gBAAAA,EACA,wBAAAC,EACA,0BAAAC,EACA,0BAAAC,MACK,kCAEP,OAAS,gCAAAC,MAAoC,4DAE7C,MAAMC,EAAmB,WAAW,KAAK,CACvC,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IACxE,IAAM,IAAM,GAAM,GAAM,GAAM,EAAM,IAAM,GAAM,GAAM,IAAM,GAAM,IAAM,IACxE,IAAM,IAAM,IAAM,IAAM,IAAM,GAChC,CAAC,EACKC,EAAc,EACdC,EAAiB,WAAW,KAAK,CACrC,GAAM,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IACxE,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IACxE,IAAM,IAAM,GAAM,IAAM,GAAM,GAChC,CAAC,EACKC,EAAmB,WAAW,KAAK,CACvC,EAAM,GAAM,GAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IACxE,IAAM,EACR,CAAC,EACKC,EAAiB,EACjBC,EAAqB,WAAW,KACpC,CAACD,CAAc,EACZ,OAAO,GAAGD,CAAgB,EAC1B,OAAO,GAAGH,CAAgB,EAC1B,OAAO,CAACC,CAAW,CAAC,EACpB,OAAO,GAAGC,CAAc,CAC7B,EACMI,EAAoB,WAAW,KACnC,CAAC,IAAM,EAAM,EAAM,EAAM,EAAI,EAAE,OAAO,GAAGD,CAAkB,CAC7D,EACME,EAAgB,WAAW,KAAK,CACpC,GAAM,GAAM,GAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,GAAM,IACxE,GAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,IACxE,GAAM,IAAM,GAAM,IAAM,GAAM,GAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GACxE,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GAAM,IAAM,GACxE,GAAM,GAAM,GAAM,GAAM,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GAAM,CACpE,CAAC,EAED,SAAS,+BAAgC,IAAM,CAC7C,SAAS,UAAW,IAAM,CACxB,GAAG,+BAAgC,IAAM,CAEvC,MAAMC,EAAU,IAAIT,EAA6B,CAC/C,aAAcM,CAChB,CAAC,EAGD,OAAOG,EAAQ,QAAQ,EAAE,WAAW,CAAC,EAAE,QAAQF,CAAiB,CAClE,CAAC,CACH,CAAC,EACD,SAAS,gBAAiB,IAAM,CAC9B,GAAG,sCAAuC,IAAM,CAE9C,MAAME,EAAU,IAAIT,EAA6B,CAC/C,aAAcM,CAChB,CAAC,EACKI,EAAW,IAAId,EAAa,CAChC,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,EACvC,KAAMY,CACR,CAAC,EAGD,OAAOC,EAAQ,cAAcC,CAAQ,CAAC,EAAE,QACtCb,EAAqB,CACnB,KAAM,CACJ,SAAUW,EAAc,MAAM,EAAG,EAAE,EACnC,WAAYA,EAAc,MAAM,EAAE,CACpC,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,2DAA4D,IAAM,CAEnE,MAAMC,EAAU,IAAIT,EAA6B,CAC/C,aAAcM,CAChB,CAAC,EACKI,EAAW,IAAId,EAAa,CAChC,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAM,IAAI,WAAW,CAAC,CACxB,CAAC,EAGKe,EAASF,EAAQ,cAAcC,CAAQ,EAG7C,OAAOX,EAAuBY,CAAM,CAAC,EAAE,KAAK,EAAK,CACnD,CAAC,EACD,GAAG,sDAAuD,IAAM,CAE9D,MAAMF,EAAU,IAAIT,EAA6B,CAC/C,aAAcM,CAChB,CAAC,EACKI,EAAW,IAAId,EAAa,CAChC,KAAMY,EAAc,MAAM,EAAG,CAAC,EAC9B,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,CACzC,CAAC,EAGKG,EAASF,EAAQ,cAAcC,CAAQ,EAGxCX,EAAuBY,CAAM,EAKhC,OAAO,KAAK,kDAAkD,EAJ9D,OAAOA,EAAO,KAAK,EAAE,QACnB,IAAIb,EAAuB,eAAe,CAC5C,CAIJ,CAAC,CACH,CAAC,CACH,CAAC",
|
|
6
6
|
"names": ["ApduResponse", "CommandResultFactory", "InvalidStatusWordError", "isSuccessCommandResult", "RegisterWalletAddressCommand", "POLICY_HASH_DATA", "KEYS_LENGTH", "KEYS_HASH_DATA", "POLICY_NAME_DATA", "POLICY_VERSION", "WALLET_POLICY_DATA", "EXPECTED_RAW_APDU", "APDU_RESPONSE", "command", "response", "result"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{Just as x,Nothing as m}from"purify-ts";import{ClientCommandCodes as p,SHA256_SIZE as c}from"../../../app-binder/command/utils/constants";import{encodeVarint as h}from"../../../utils/Varint";import{GetMerkleLeafIndexCommandHandler as i}from"./GetMerkleLeafIndexCommandHandler";const u=p.GET_MERKLE_LEAF_INDEX;describe("GetMerkleLeafIndexCommandHandler",()=>{let l,o;beforeEach(()=>{
|
|
1
|
+
import{Just as x,Nothing as m}from"purify-ts";import{ClientCommandCodes as p,SHA256_SIZE as c}from"../../../app-binder/command/utils/constants";import{encodeVarint as h}from"../../../utils/Varint";import{GetMerkleLeafIndexCommandHandler as i}from"./GetMerkleLeafIndexCommandHandler";const u=p.GET_MERKLE_LEAF_INDEX;describe("GetMerkleLeafIndexCommandHandler",()=>{let l,o;beforeEach(()=>{vi.clearAllMocks(),o={getMerkleLeafIndex:vi.fn()},l={dataStore:o,queue:[],yieldedResults:[]}});const d=(e,t,s)=>new Uint8Array([e,...t,...s]);it("should return the index when the Merkle leaf is found",()=>{const e=new Uint8Array(c).fill(170),t=new Uint8Array(c).fill(255),s=d(u,e,t),n=123456,r=h(n).unsafeCoerce();o.getMerkleLeafIndex.mockReturnValue(x(n));const f=i(s,l),a=new Uint8Array(1+r.length);a[0]=1,a.set(r,1),expect(o.getMerkleLeafIndex).toHaveBeenCalledWith(e,t),expect(f.isRight()).toBe(!0),expect(f.unsafeCoerce()).toEqual(a),expect(l.queue).toHaveLength(0)}),it("should return a failure response when the Merkle leaf is not found",()=>{const e=new Uint8Array(c).fill(170),t=new Uint8Array(c).fill(255),s=d(u,e,t);o.getMerkleLeafIndex.mockReturnValue(m);const n=i(s,l),r=Uint8Array.from([0]);expect(o.getMerkleLeafIndex).toHaveBeenCalledWith(e,t),expect(n.isRight()).toBe(!0),expect(n.unsafeCoerce()).toEqual(r),expect(l.queue).toHaveLength(0)}),it("should correctly handle a leaf index of zero",()=>{const e=new Uint8Array(c).fill(170),t=new Uint8Array(c).fill(255),s=d(u,e,t),n=0,r=h(n).unsafeCoerce();o.getMerkleLeafIndex.mockReturnValue(x(n));const f=i(s,l),a=new Uint8Array(1+r.length);a[0]=1,a.set(r,1),expect(o.getMerkleLeafIndex).toHaveBeenCalledWith(e,t),expect(f.isRight()).toBe(!0),expect(f.unsafeCoerce()).toEqual(a),expect(l.queue).toHaveLength(0)}),it("should correctly handle the maximum SHA256_SIZE-bit unsigned integer as a leaf index",()=>{const e=new Uint8Array(c).fill(170),t=new Uint8Array(c).fill(255),s=d(u,e,t),n=4294967295,r=h(n).unsafeCoerce();o.getMerkleLeafIndex.mockReturnValue(x(n));const f=i(s,l),a=new Uint8Array(1+r.length);a[0]=1,a.set(r,1),expect(o.getMerkleLeafIndex).toHaveBeenCalledWith(e,t),expect(f.isRight()).toBe(!0),expect(f.unsafeCoerce()).toEqual(a),expect(l.queue).toHaveLength(0)})});
|
|
2
2
|
//# sourceMappingURL=GetMerkleLeafIndexCommandHandler.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../../src/internal/app-binder/command/client-command-handlers/GetMerkleLeafIndexCommandHandler.test.ts"],
|
|
4
|
-
"sourcesContent": ["import { Just, Nothing } from \"purify-ts\";\n\nimport {\n ClientCommandCodes,\n SHA256_SIZE,\n} from \"@internal/app-binder/command/utils/constants\";\nimport { type DataStore } from \"@internal/data-store/model/DataStore\";\nimport { encodeVarint } from \"@internal/utils/Varint\";\n\nimport { type CommandHandlerContext } from \"./ClientCommandHandlersTypes\";\nimport { GetMerkleLeafIndexCommandHandler } from \"./GetMerkleLeafIndexCommandHandler\";\n\nconst COMMAND_CODE = ClientCommandCodes.GET_MERKLE_LEAF_INDEX;\n\ndescribe(\"GetMerkleLeafIndexCommandHandler\", () => {\n let commandHandlerContext: CommandHandlerContext;\n let mockDataStore:
|
|
5
|
-
"mappings": "AAAA,OAAS,QAAAA,EAAM,WAAAC,MAAe,
|
|
4
|
+
"sourcesContent": ["import { Just, Nothing } from \"purify-ts\";\nimport { type Mocked } from \"vitest\";\n\nimport {\n ClientCommandCodes,\n SHA256_SIZE,\n} from \"@internal/app-binder/command/utils/constants\";\nimport { type DataStore } from \"@internal/data-store/model/DataStore\";\nimport { encodeVarint } from \"@internal/utils/Varint\";\n\nimport { type CommandHandlerContext } from \"./ClientCommandHandlersTypes\";\nimport { GetMerkleLeafIndexCommandHandler } from \"./GetMerkleLeafIndexCommandHandler\";\n\nconst COMMAND_CODE = ClientCommandCodes.GET_MERKLE_LEAF_INDEX;\n\ndescribe(\"GetMerkleLeafIndexCommandHandler\", () => {\n let commandHandlerContext: CommandHandlerContext;\n let mockDataStore: Mocked<DataStore>;\n\n beforeEach(() => {\n vi.clearAllMocks();\n\n mockDataStore = {\n getMerkleLeafIndex: vi.fn(),\n } as unknown as Mocked<DataStore>;\n\n commandHandlerContext = {\n dataStore: mockDataStore,\n queue: [],\n yieldedResults: [],\n };\n });\n\n const createRequest = (\n commandCode: number,\n merkleRootHash: Uint8Array,\n leafNodeHash: Uint8Array,\n ): Uint8Array =>\n new Uint8Array([commandCode, ...merkleRootHash, ...leafNodeHash]);\n\n it(\"should return the index when the Merkle leaf is found\", () => {\n // given\n const merkleRootHash = new Uint8Array(SHA256_SIZE).fill(0xaa);\n const leafNodeHash = new Uint8Array(SHA256_SIZE).fill(0xff);\n const handlerRequest = createRequest(\n COMMAND_CODE,\n merkleRootHash,\n leafNodeHash,\n );\n const leafIndex = 123456;\n const encodedLeafIndexVarint = encodeVarint(leafIndex).unsafeCoerce();\n\n // when\n mockDataStore.getMerkleLeafIndex.mockReturnValue(Just(leafIndex));\n\n const handlerResponse = GetMerkleLeafIndexCommandHandler(\n handlerRequest,\n commandHandlerContext,\n );\n\n const expectedResponseBuffer = new Uint8Array(\n 1 + encodedLeafIndexVarint.length,\n );\n expectedResponseBuffer[0] = 1; // index found\n expectedResponseBuffer.set(encodedLeafIndexVarint, 1);\n\n // then\n expect(mockDataStore.getMerkleLeafIndex).toHaveBeenCalledWith(\n merkleRootHash,\n leafNodeHash,\n );\n expect(handlerResponse.isRight()).toBe(true);\n expect(handlerResponse.unsafeCoerce()).toEqual(expectedResponseBuffer);\n expect(commandHandlerContext.queue).toHaveLength(0);\n });\n\n it(\"should return a failure response when the Merkle leaf is not found\", () => {\n // given\n const merkleRootHash = new Uint8Array(SHA256_SIZE).fill(0xaa);\n const leafNodeHash = new Uint8Array(SHA256_SIZE).fill(0xff);\n const handlerRequest = createRequest(\n COMMAND_CODE,\n merkleRootHash,\n leafNodeHash,\n );\n\n // when\n mockDataStore.getMerkleLeafIndex.mockReturnValue(Nothing);\n\n const handlerResponse = GetMerkleLeafIndexCommandHandler(\n handlerRequest,\n commandHandlerContext,\n );\n\n const expectedFailureResponseBuffer = Uint8Array.from([0]);\n\n // then\n expect(mockDataStore.getMerkleLeafIndex).toHaveBeenCalledWith(\n merkleRootHash,\n leafNodeHash,\n );\n expect(handlerResponse.isRight()).toBe(true);\n expect(handlerResponse.unsafeCoerce()).toEqual(\n expectedFailureResponseBuffer,\n );\n expect(commandHandlerContext.queue).toHaveLength(0);\n });\n\n it(\"should correctly handle a leaf index of zero\", () => {\n // given\n const merkleRootHash = new Uint8Array(SHA256_SIZE).fill(0xaa);\n const leafNodeHash = new Uint8Array(SHA256_SIZE).fill(0xff);\n const handlerRequest = createRequest(\n COMMAND_CODE,\n merkleRootHash,\n leafNodeHash,\n );\n const leafIndex = 0;\n const encodedLeafIndexVarint = encodeVarint(leafIndex).unsafeCoerce();\n\n // when\n mockDataStore.getMerkleLeafIndex.mockReturnValue(Just(leafIndex));\n\n const handlerResponse = GetMerkleLeafIndexCommandHandler(\n handlerRequest,\n commandHandlerContext,\n );\n\n const expectedResponseBuffer = new Uint8Array(\n 1 + encodedLeafIndexVarint.length,\n );\n expectedResponseBuffer[0] = 1; // index found\n expectedResponseBuffer.set(encodedLeafIndexVarint, 1);\n\n // then\n expect(mockDataStore.getMerkleLeafIndex).toHaveBeenCalledWith(\n merkleRootHash,\n leafNodeHash,\n );\n expect(handlerResponse.isRight()).toBe(true);\n expect(handlerResponse.unsafeCoerce()).toEqual(expectedResponseBuffer);\n expect(commandHandlerContext.queue).toHaveLength(0);\n });\n\n it(\"should correctly handle the maximum SHA256_SIZE-bit unsigned integer as a leaf index\", () => {\n // given\n const merkleRootHash = new Uint8Array(SHA256_SIZE).fill(0xaa);\n const leafNodeHash = new Uint8Array(SHA256_SIZE).fill(0xff);\n const handlerRequest = createRequest(\n COMMAND_CODE,\n merkleRootHash,\n leafNodeHash,\n );\n const maximumLeafIndex = 0xffffffff; // maximum value of a SHA256_SIZE-bit unsigned integer\n const encodedLeafIndexVarint =\n encodeVarint(maximumLeafIndex).unsafeCoerce();\n\n // when\n mockDataStore.getMerkleLeafIndex.mockReturnValue(Just(maximumLeafIndex));\n\n const handlerResponse = GetMerkleLeafIndexCommandHandler(\n handlerRequest,\n commandHandlerContext,\n );\n\n const expectedResponseBuffer = new Uint8Array(\n 1 + encodedLeafIndexVarint.length,\n );\n expectedResponseBuffer[0] = 1; // index found\n expectedResponseBuffer.set(encodedLeafIndexVarint, 1);\n\n // then\n expect(mockDataStore.getMerkleLeafIndex).toHaveBeenCalledWith(\n merkleRootHash,\n leafNodeHash,\n );\n expect(handlerResponse.isRight()).toBe(true);\n expect(handlerResponse.unsafeCoerce()).toEqual(expectedResponseBuffer);\n expect(commandHandlerContext.queue).toHaveLength(0);\n });\n});\n"],
|
|
5
|
+
"mappings": "AAAA,OAAS,QAAAA,EAAM,WAAAC,MAAe,YAG9B,OACE,sBAAAC,EACA,eAAAC,MACK,+CAEP,OAAS,gBAAAC,MAAoB,yBAG7B,OAAS,oCAAAC,MAAwC,qCAEjD,MAAMC,EAAeJ,EAAmB,sBAExC,SAAS,mCAAoC,IAAM,CACjD,IAAIK,EACAC,EAEJ,WAAW,IAAM,CACf,GAAG,cAAc,EAEjBA,EAAgB,CACd,mBAAoB,GAAG,GAAG,CAC5B,EAEAD,EAAwB,CACtB,UAAWC,EACX,MAAO,CAAC,EACR,eAAgB,CAAC,CACnB,CACF,CAAC,EAED,MAAMC,EAAgB,CACpBC,EACAC,EACAC,IAEA,IAAI,WAAW,CAACF,EAAa,GAAGC,EAAgB,GAAGC,CAAY,CAAC,EAElE,GAAG,wDAAyD,IAAM,CAEhE,MAAMD,EAAiB,IAAI,WAAWR,CAAW,EAAE,KAAK,GAAI,EACtDS,EAAe,IAAI,WAAWT,CAAW,EAAE,KAAK,GAAI,EACpDU,EAAiBJ,EACrBH,EACAK,EACAC,CACF,EACME,EAAY,OACZC,EAAyBX,EAAaU,CAAS,EAAE,aAAa,EAGpEN,EAAc,mBAAmB,gBAAgBR,EAAKc,CAAS,CAAC,EAEhE,MAAME,EAAkBX,EACtBQ,EACAN,CACF,EAEMU,EAAyB,IAAI,WACjC,EAAIF,EAAuB,MAC7B,EACAE,EAAuB,CAAC,EAAI,EAC5BA,EAAuB,IAAIF,EAAwB,CAAC,EAGpD,OAAOP,EAAc,kBAAkB,EAAE,qBACvCG,EACAC,CACF,EACA,OAAOI,EAAgB,QAAQ,CAAC,EAAE,KAAK,EAAI,EAC3C,OAAOA,EAAgB,aAAa,CAAC,EAAE,QAAQC,CAAsB,EACrE,OAAOV,EAAsB,KAAK,EAAE,aAAa,CAAC,CACpD,CAAC,EAED,GAAG,qEAAsE,IAAM,CAE7E,MAAMI,EAAiB,IAAI,WAAWR,CAAW,EAAE,KAAK,GAAI,EACtDS,EAAe,IAAI,WAAWT,CAAW,EAAE,KAAK,GAAI,EACpDU,EAAiBJ,EACrBH,EACAK,EACAC,CACF,EAGAJ,EAAc,mBAAmB,gBAAgBP,CAAO,EAExD,MAAMe,EAAkBX,EACtBQ,EACAN,CACF,EAEMW,EAAgC,WAAW,KAAK,CAAC,CAAC,CAAC,EAGzD,OAAOV,EAAc,kBAAkB,EAAE,qBACvCG,EACAC,CACF,EACA,OAAOI,EAAgB,QAAQ,CAAC,EAAE,KAAK,EAAI,EAC3C,OAAOA,EAAgB,aAAa,CAAC,EAAE,QACrCE,CACF,EACA,OAAOX,EAAsB,KAAK,EAAE,aAAa,CAAC,CACpD,CAAC,EAED,GAAG,+CAAgD,IAAM,CAEvD,MAAMI,EAAiB,IAAI,WAAWR,CAAW,EAAE,KAAK,GAAI,EACtDS,EAAe,IAAI,WAAWT,CAAW,EAAE,KAAK,GAAI,EACpDU,EAAiBJ,EACrBH,EACAK,EACAC,CACF,EACME,EAAY,EACZC,EAAyBX,EAAaU,CAAS,EAAE,aAAa,EAGpEN,EAAc,mBAAmB,gBAAgBR,EAAKc,CAAS,CAAC,EAEhE,MAAME,EAAkBX,EACtBQ,EACAN,CACF,EAEMU,EAAyB,IAAI,WACjC,EAAIF,EAAuB,MAC7B,EACAE,EAAuB,CAAC,EAAI,EAC5BA,EAAuB,IAAIF,EAAwB,CAAC,EAGpD,OAAOP,EAAc,kBAAkB,EAAE,qBACvCG,EACAC,CACF,EACA,OAAOI,EAAgB,QAAQ,CAAC,EAAE,KAAK,EAAI,EAC3C,OAAOA,EAAgB,aAAa,CAAC,EAAE,QAAQC,CAAsB,EACrE,OAAOV,EAAsB,KAAK,EAAE,aAAa,CAAC,CACpD,CAAC,EAED,GAAG,uFAAwF,IAAM,CAE/F,MAAMI,EAAiB,IAAI,WAAWR,CAAW,EAAE,KAAK,GAAI,EACtDS,EAAe,IAAI,WAAWT,CAAW,EAAE,KAAK,GAAI,EACpDU,EAAiBJ,EACrBH,EACAK,EACAC,CACF,EACMO,EAAmB,WACnBJ,EACJX,EAAae,CAAgB,EAAE,aAAa,EAG9CX,EAAc,mBAAmB,gBAAgBR,EAAKmB,CAAgB,CAAC,EAEvE,MAAMH,EAAkBX,EACtBQ,EACAN,CACF,EAEMU,EAAyB,IAAI,WACjC,EAAIF,EAAuB,MAC7B,EACAE,EAAuB,CAAC,EAAI,EAC5BA,EAAuB,IAAIF,EAAwB,CAAC,EAGpD,OAAOP,EAAc,kBAAkB,EAAE,qBACvCG,EACAC,CACF,EACA,OAAOI,EAAgB,QAAQ,CAAC,EAAE,KAAK,EAAI,EAC3C,OAAOA,EAAgB,aAAa,CAAC,EAAE,QAAQC,CAAsB,EACrE,OAAOV,EAAsB,KAAK,EAAE,aAAa,CAAC,CACpD,CAAC,CACH,CAAC",
|
|
6
6
|
"names": ["Just", "Nothing", "ClientCommandCodes", "SHA256_SIZE", "encodeVarint", "GetMerkleLeafIndexCommandHandler", "COMMAND_CODE", "commandHandlerContext", "mockDataStore", "createRequest", "commandCode", "merkleRootHash", "leafNodeHash", "handlerRequest", "leafIndex", "encodedLeafIndexVarint", "handlerResponse", "expectedResponseBuffer", "expectedFailureResponseBuffer", "maximumLeafIndex"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{APDU_MAX_PAYLOAD as
|
|
1
|
+
import{APDU_MAX_PAYLOAD as y}from"@ledgerhq/device-management-kit";import{Just as E,Nothing as H}from"purify-ts";import{ClientCommandCodes as P,SHA256_SIZE as e}from"../../../app-binder/command/utils/constants";import{encodeVarint as M}from"../../../utils/Varint";import{ClientCommandHandlerError as R}from"./Errors";import{GetMerkleLeafProofCommandHandler as A}from"./GetMerkleLeafProofCommandHandler";const k=P.GET_MERKLE_LEAF_PROOF;describe("GetMerkleLeafProofCommandHandler",()=>{let l,m;beforeEach(()=>{vi.clearAllMocks(),m={getMerkleProof:vi.fn()},l={dataStore:m,queue:[],yieldedResults:[]}});const x=(n,u,r,d)=>new Uint8Array([n,...u,...M(r).unsafeCoerce(),...M(d).unsafeCoerce()]);it("should return the Merkle leaf and proof when found and proof length is less than or equal to the maximum allowed",()=>{const n=new Uint8Array(e).fill(1),u=1,r=2,d=x(k,n,u,r),i=new Uint8Array(e).fill(170),c=[new Uint8Array(e).fill(187),new Uint8Array(e).fill(204)];m.getMerkleProof.mockReturnValue(E({leafHash:i,proof:c}));const s=A(d,l),h=y-e-1-1,g=Math.floor(h/e),p=Math.min(c.length,g),o=new Uint8Array(e+1+1+e*p);let t=0;o.set(i,t),t+=e,o[t++]=c.length,o[t++]=p;for(let a=0;a<p;a++)o.set(c[a],t),t+=e;expect(m.getMerkleProof).toHaveBeenCalledWith(n,r),expect(s.isRight()).toBe(!0),expect(s.unsafeCoerce()).toEqual(o),expect(l.queue).toHaveLength(0)}),it("should handle proof longer than the maximum allowed by queuing the remaining proof elements",()=>{const n=new Uint8Array(e).fill(2),u=1,r=3,d=x(k,n,u,r),i=new Uint8Array(e).fill(221),s=Array.from({length:10},(f,C)=>new Uint8Array(e).fill(238+C));m.getMerkleProof.mockReturnValue(E({leafHash:i,proof:s}));const h=A(d,l),g=y-e-1-1,p=Math.floor(g/e),o=Math.min(s.length,p),t=new Uint8Array(e+1+1+e*o);let a=0;t.set(i,a),a+=e,t[a++]=s.length,t[a++]=o;for(let f=0;f<o;f++)t.set(s[f],a),a+=e;expect(m.getMerkleProof).toHaveBeenCalledWith(n,r),expect(h.isRight()).toBe(!0),expect(h.unsafeCoerce()).toEqual(t),expect(l.queue).toHaveLength(s.length-o);for(let f=0;f<l.queue.length;f++)expect(l.queue[f]).toEqual(s[o+f])}),it("should return an error when the Merkle proof is not found in the data store",()=>{const n=new Uint8Array(e).fill(4),u=1,r=5,d=x(k,n,u,r);m.getMerkleProof.mockReturnValue(H);const i=A(d,l);expect(i.isLeft()).toBe(!0);const c=i.leftOrDefault(void 0);expect(c).toBeDefined(),expect(c instanceof R).toBe(!0),expect(m.getMerkleProof).toHaveBeenCalledWith(n,r),expect(l.queue).toHaveLength(0)})});
|
|
2
2
|
//# sourceMappingURL=GetMerkleLeafProofCommandHandler.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../../src/internal/app-binder/command/client-command-handlers/GetMerkleLeafProofCommandHandler.test.ts"],
|
|
4
|
-
"sourcesContent": ["import { APDU_MAX_PAYLOAD } from \"@ledgerhq/device-management-kit\";\nimport { Just, Nothing } from \"purify-ts\";\n\nimport {\n ClientCommandCodes,\n SHA256_SIZE,\n} from \"@internal/app-binder/command/utils/constants\";\nimport { type DataStore } from \"@internal/data-store/model/DataStore\";\nimport { encodeVarint } from \"@internal/utils/Varint\";\n\nimport { type CommandHandlerContext } from \"./ClientCommandHandlersTypes\";\nimport { ClientCommandHandlerError } from \"./Errors\";\nimport { GetMerkleLeafProofCommandHandler } from \"./GetMerkleLeafProofCommandHandler\";\n\nconst COMMAND_CODE = ClientCommandCodes.GET_MERKLE_LEAF_PROOF;\n\ndescribe(\"GetMerkleLeafProofCommandHandler\", () => {\n let commandHandlerContext: CommandHandlerContext;\n let mockDataStore:
|
|
5
|
-
"mappings": "AAAA,OAAS,oBAAAA,MAAwB,kCACjC,OAAS,QAAAC,EAAM,WAAAC,MAAe,
|
|
6
|
-
"names": ["APDU_MAX_PAYLOAD", "Just", "Nothing", "ClientCommandCodes", "SHA256_SIZE", "encodeVarint", "ClientCommandHandlerError", "GetMerkleLeafProofCommandHandler", "COMMAND_CODE", "commandHandlerContext", "mockDataStore", "createRequest", "commandCode", "merkleRootHash", "totalElements", "proofElementIndex", "request", "leafNodeHash", "proofElements", "handlerResponse", "maximumPayloadSize", "maximumProofElements", "proofElementsToInclude", "expectedResponse", "responseBufferOffset", "_", "proofIndex", "queuedProofIndex", "errorResponse"]
|
|
4
|
+
"sourcesContent": ["import { APDU_MAX_PAYLOAD } from \"@ledgerhq/device-management-kit\";\nimport { Just, Nothing } from \"purify-ts\";\nimport { type Mocked } from \"vitest\";\n\nimport {\n ClientCommandCodes,\n SHA256_SIZE,\n} from \"@internal/app-binder/command/utils/constants\";\nimport { type DataStore } from \"@internal/data-store/model/DataStore\";\nimport { encodeVarint } from \"@internal/utils/Varint\";\n\nimport { type CommandHandlerContext } from \"./ClientCommandHandlersTypes\";\nimport { ClientCommandHandlerError } from \"./Errors\";\nimport { GetMerkleLeafProofCommandHandler } from \"./GetMerkleLeafProofCommandHandler\";\n\nconst COMMAND_CODE = ClientCommandCodes.GET_MERKLE_LEAF_PROOF;\n\ndescribe(\"GetMerkleLeafProofCommandHandler\", () => {\n let commandHandlerContext: CommandHandlerContext;\n let mockDataStore: Mocked<DataStore>;\n\n beforeEach(() => {\n vi.clearAllMocks();\n\n mockDataStore = {\n getMerkleProof: vi.fn(),\n } as unknown as Mocked<DataStore>;\n\n commandHandlerContext = {\n dataStore: mockDataStore,\n queue: [],\n yieldedResults: [],\n };\n });\n\n const createRequest = (\n commandCode: number,\n merkleRootHash: Uint8Array,\n totalElements: number,\n proofElementIndex: number,\n ): Uint8Array =>\n new Uint8Array([\n commandCode,\n ...merkleRootHash,\n ...encodeVarint(totalElements).unsafeCoerce(),\n ...encodeVarint(proofElementIndex).unsafeCoerce(),\n ]);\n\n it(\"should return the Merkle leaf and proof when found and proof length is less than or equal to the maximum allowed\", () => {\n // given\n const merkleRootHash = new Uint8Array(SHA256_SIZE).fill(0x01);\n const totalElements = 1;\n const proofElementIndex = 2;\n const request = createRequest(\n COMMAND_CODE,\n merkleRootHash,\n totalElements,\n proofElementIndex,\n );\n const leafNodeHash = new Uint8Array(SHA256_SIZE).fill(0xaa);\n const proofElements = [\n new Uint8Array(SHA256_SIZE).fill(0xbb),\n new Uint8Array(SHA256_SIZE).fill(0xcc),\n ];\n\n // when\n mockDataStore.getMerkleProof.mockReturnValue(\n Just({ leafHash: leafNodeHash, proof: proofElements }),\n );\n\n const handlerResponse = GetMerkleLeafProofCommandHandler(\n request,\n commandHandlerContext,\n );\n\n const maximumPayloadSize = APDU_MAX_PAYLOAD - SHA256_SIZE - 1 - 1;\n const maximumProofElements = Math.floor(maximumPayloadSize / SHA256_SIZE);\n const proofElementsToInclude = Math.min(\n proofElements.length,\n maximumProofElements,\n );\n\n const expectedResponse = new Uint8Array(\n SHA256_SIZE + 1 + 1 + SHA256_SIZE * proofElementsToInclude,\n );\n let responseBufferOffset = 0;\n expectedResponse.set(leafNodeHash, responseBufferOffset); // leafHash\n responseBufferOffset += SHA256_SIZE;\n expectedResponse[responseBufferOffset++] = proofElements.length; // total proof length\n expectedResponse[responseBufferOffset++] = proofElementsToInclude;\n for (let index = 0; index < proofElementsToInclude; index++) {\n expectedResponse.set(\n proofElements[index] as Uint8Array,\n responseBufferOffset,\n );\n responseBufferOffset += SHA256_SIZE;\n }\n\n // then\n expect(mockDataStore.getMerkleProof).toHaveBeenCalledWith(\n merkleRootHash,\n proofElementIndex,\n );\n expect(handlerResponse.isRight()).toBe(true);\n expect(handlerResponse.unsafeCoerce()).toEqual(expectedResponse);\n expect(commandHandlerContext.queue).toHaveLength(0);\n });\n\n it(\"should handle proof longer than the maximum allowed by queuing the remaining proof elements\", () => {\n // given\n const merkleRootHash = new Uint8Array(SHA256_SIZE).fill(0x02);\n const totalElements = 1;\n const proofElementIndex = 3;\n const request = createRequest(\n COMMAND_CODE,\n merkleRootHash,\n totalElements,\n proofElementIndex,\n );\n const leafNodeHash = new Uint8Array(SHA256_SIZE).fill(0xdd);\n const totalProofLength = 10;\n const proofElements = Array.from(\n { length: totalProofLength },\n (_, proofIndex) => new Uint8Array(SHA256_SIZE).fill(0xee + proofIndex),\n );\n\n // when\n mockDataStore.getMerkleProof.mockReturnValue(\n Just({ leafHash: leafNodeHash, proof: proofElements }),\n );\n\n const handlerResponse = GetMerkleLeafProofCommandHandler(\n request,\n commandHandlerContext,\n );\n\n const maximumPayloadSize = APDU_MAX_PAYLOAD - SHA256_SIZE - 1 - 1;\n const maximumProofElements = Math.floor(maximumPayloadSize / SHA256_SIZE);\n const proofElementsToInclude = Math.min(\n proofElements.length,\n maximumProofElements,\n );\n\n const expectedResponse = new Uint8Array(\n SHA256_SIZE + 1 + 1 + SHA256_SIZE * proofElementsToInclude,\n );\n let responseBufferOffset = 0;\n expectedResponse.set(leafNodeHash, responseBufferOffset); // leafHash\n responseBufferOffset += SHA256_SIZE;\n expectedResponse[responseBufferOffset++] = proofElements.length; // total proof length\n expectedResponse[responseBufferOffset++] = proofElementsToInclude;\n for (let index = 0; index < proofElementsToInclude; index++) {\n expectedResponse.set(\n proofElements[index] as Uint8Array,\n responseBufferOffset,\n );\n responseBufferOffset += SHA256_SIZE;\n }\n\n // then\n expect(mockDataStore.getMerkleProof).toHaveBeenCalledWith(\n merkleRootHash,\n proofElementIndex,\n );\n expect(handlerResponse.isRight()).toBe(true);\n expect(handlerResponse.unsafeCoerce()).toEqual(expectedResponse);\n expect(commandHandlerContext.queue).toHaveLength(\n proofElements.length - proofElementsToInclude,\n );\n for (\n let queuedProofIndex = 0;\n queuedProofIndex < commandHandlerContext.queue.length;\n queuedProofIndex++\n ) {\n expect(commandHandlerContext.queue[queuedProofIndex]).toEqual(\n proofElements[proofElementsToInclude + queuedProofIndex],\n );\n }\n });\n\n it(\"should return an error when the Merkle proof is not found in the data store\", () => {\n // given\n const merkleRootHash = new Uint8Array(SHA256_SIZE).fill(0x04);\n const totalElements = 1;\n const proofElementIndex = 5;\n const request = createRequest(\n COMMAND_CODE,\n merkleRootHash,\n totalElements,\n proofElementIndex,\n );\n\n // when\n mockDataStore.getMerkleProof.mockReturnValue(Nothing);\n\n const handlerResponse = GetMerkleLeafProofCommandHandler(\n request,\n commandHandlerContext,\n );\n\n // then\n expect(handlerResponse.isLeft()).toBe(true);\n //@ts-expect-error purposedly use undefined insteal of a DMKError\n const errorResponse = handlerResponse.leftOrDefault(undefined);\n expect(errorResponse).toBeDefined();\n expect(errorResponse instanceof ClientCommandHandlerError).toBe(true);\n expect(mockDataStore.getMerkleProof).toHaveBeenCalledWith(\n merkleRootHash,\n proofElementIndex,\n );\n expect(commandHandlerContext.queue).toHaveLength(0);\n });\n});\n"],
|
|
5
|
+
"mappings": "AAAA,OAAS,oBAAAA,MAAwB,kCACjC,OAAS,QAAAC,EAAM,WAAAC,MAAe,YAG9B,OACE,sBAAAC,EACA,eAAAC,MACK,+CAEP,OAAS,gBAAAC,MAAoB,yBAG7B,OAAS,6BAAAC,MAAiC,WAC1C,OAAS,oCAAAC,MAAwC,qCAEjD,MAAMC,EAAeL,EAAmB,sBAExC,SAAS,mCAAoC,IAAM,CACjD,IAAIM,EACAC,EAEJ,WAAW,IAAM,CACf,GAAG,cAAc,EAEjBA,EAAgB,CACd,eAAgB,GAAG,GAAG,CACxB,EAEAD,EAAwB,CACtB,UAAWC,EACX,MAAO,CAAC,EACR,eAAgB,CAAC,CACnB,CACF,CAAC,EAED,MAAMC,EAAgB,CACpBC,EACAC,EACAC,EACAC,IAEA,IAAI,WAAW,CACbH,EACA,GAAGC,EACH,GAAGR,EAAaS,CAAa,EAAE,aAAa,EAC5C,GAAGT,EAAaU,CAAiB,EAAE,aAAa,CAClD,CAAC,EAEH,GAAG,mHAAoH,IAAM,CAE3H,MAAMF,EAAiB,IAAI,WAAWT,CAAW,EAAE,KAAK,CAAI,EACtDU,EAAgB,EAChBC,EAAoB,EACpBC,EAAUL,EACdH,EACAK,EACAC,EACAC,CACF,EACME,EAAe,IAAI,WAAWb,CAAW,EAAE,KAAK,GAAI,EACpDc,EAAgB,CACpB,IAAI,WAAWd,CAAW,EAAE,KAAK,GAAI,EACrC,IAAI,WAAWA,CAAW,EAAE,KAAK,GAAI,CACvC,EAGAM,EAAc,eAAe,gBAC3BT,EAAK,CAAE,SAAUgB,EAAc,MAAOC,CAAc,CAAC,CACvD,EAEA,MAAMC,EAAkBZ,EACtBS,EACAP,CACF,EAEMW,EAAqBpB,EAAmBI,EAAc,EAAI,EAC1DiB,EAAuB,KAAK,MAAMD,EAAqBhB,CAAW,EAClEkB,EAAyB,KAAK,IAClCJ,EAAc,OACdG,CACF,EAEME,EAAmB,IAAI,WAC3BnB,EAAc,EAAI,EAAIA,EAAckB,CACtC,EACA,IAAIE,EAAuB,EAC3BD,EAAiB,IAAIN,EAAcO,CAAoB,EACvDA,GAAwBpB,EACxBmB,EAAiBC,GAAsB,EAAIN,EAAc,OACzDK,EAAiBC,GAAsB,EAAIF,EAC3C,QAASG,EAAQ,EAAGA,EAAQH,EAAwBG,IAClDF,EAAiB,IACfL,EAAcO,CAAK,EACnBD,CACF,EACAA,GAAwBpB,EAI1B,OAAOM,EAAc,cAAc,EAAE,qBACnCG,EACAE,CACF,EACA,OAAOI,EAAgB,QAAQ,CAAC,EAAE,KAAK,EAAI,EAC3C,OAAOA,EAAgB,aAAa,CAAC,EAAE,QAAQI,CAAgB,EAC/D,OAAOd,EAAsB,KAAK,EAAE,aAAa,CAAC,CACpD,CAAC,EAED,GAAG,8FAA+F,IAAM,CAEtG,MAAMI,EAAiB,IAAI,WAAWT,CAAW,EAAE,KAAK,CAAI,EACtDU,EAAgB,EAChBC,EAAoB,EACpBC,EAAUL,EACdH,EACAK,EACAC,EACAC,CACF,EACME,EAAe,IAAI,WAAWb,CAAW,EAAE,KAAK,GAAI,EAEpDc,EAAgB,MAAM,KAC1B,CAAE,OAFqB,EAEI,EAC3B,CAACQ,EAAGC,IAAe,IAAI,WAAWvB,CAAW,EAAE,KAAK,IAAOuB,CAAU,CACvE,EAGAjB,EAAc,eAAe,gBAC3BT,EAAK,CAAE,SAAUgB,EAAc,MAAOC,CAAc,CAAC,CACvD,EAEA,MAAMC,EAAkBZ,EACtBS,EACAP,CACF,EAEMW,EAAqBpB,EAAmBI,EAAc,EAAI,EAC1DiB,EAAuB,KAAK,MAAMD,EAAqBhB,CAAW,EAClEkB,EAAyB,KAAK,IAClCJ,EAAc,OACdG,CACF,EAEME,EAAmB,IAAI,WAC3BnB,EAAc,EAAI,EAAIA,EAAckB,CACtC,EACA,IAAIE,EAAuB,EAC3BD,EAAiB,IAAIN,EAAcO,CAAoB,EACvDA,GAAwBpB,EACxBmB,EAAiBC,GAAsB,EAAIN,EAAc,OACzDK,EAAiBC,GAAsB,EAAIF,EAC3C,QAASG,EAAQ,EAAGA,EAAQH,EAAwBG,IAClDF,EAAiB,IACfL,EAAcO,CAAK,EACnBD,CACF,EACAA,GAAwBpB,EAI1B,OAAOM,EAAc,cAAc,EAAE,qBACnCG,EACAE,CACF,EACA,OAAOI,EAAgB,QAAQ,CAAC,EAAE,KAAK,EAAI,EAC3C,OAAOA,EAAgB,aAAa,CAAC,EAAE,QAAQI,CAAgB,EAC/D,OAAOd,EAAsB,KAAK,EAAE,aAClCS,EAAc,OAASI,CACzB,EACA,QACMM,EAAmB,EACvBA,EAAmBnB,EAAsB,MAAM,OAC/CmB,IAEA,OAAOnB,EAAsB,MAAMmB,CAAgB,CAAC,EAAE,QACpDV,EAAcI,EAAyBM,CAAgB,CACzD,CAEJ,CAAC,EAED,GAAG,8EAA+E,IAAM,CAEtF,MAAMf,EAAiB,IAAI,WAAWT,CAAW,EAAE,KAAK,CAAI,EACtDU,EAAgB,EAChBC,EAAoB,EACpBC,EAAUL,EACdH,EACAK,EACAC,EACAC,CACF,EAGAL,EAAc,eAAe,gBAAgBR,CAAO,EAEpD,MAAMiB,EAAkBZ,EACtBS,EACAP,CACF,EAGA,OAAOU,EAAgB,OAAO,CAAC,EAAE,KAAK,EAAI,EAE1C,MAAMU,EAAgBV,EAAgB,cAAc,MAAS,EAC7D,OAAOU,CAAa,EAAE,YAAY,EAClC,OAAOA,aAAyBvB,CAAyB,EAAE,KAAK,EAAI,EACpE,OAAOI,EAAc,cAAc,EAAE,qBACnCG,EACAE,CACF,EACA,OAAON,EAAsB,KAAK,EAAE,aAAa,CAAC,CACpD,CAAC,CACH,CAAC",
|
|
6
|
+
"names": ["APDU_MAX_PAYLOAD", "Just", "Nothing", "ClientCommandCodes", "SHA256_SIZE", "encodeVarint", "ClientCommandHandlerError", "GetMerkleLeafProofCommandHandler", "COMMAND_CODE", "commandHandlerContext", "mockDataStore", "createRequest", "commandCode", "merkleRootHash", "totalElements", "proofElementIndex", "request", "leafNodeHash", "proofElements", "handlerResponse", "maximumPayloadSize", "maximumProofElements", "proofElementsToInclude", "expectedResponse", "responseBufferOffset", "index", "_", "proofIndex", "queuedProofIndex", "errorResponse"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{APDU_MAX_PAYLOAD as
|
|
1
|
+
import{APDU_MAX_PAYLOAD as x}from"@ledgerhq/device-management-kit";import{ClientCommandCodes as g}from"../../../app-binder/command/utils/constants";import{ClientCommandHandlerError as f}from"./Errors";import{GetMoreElementsCommandHandler as l}from"./GetMoreElementsCommandHandler";const i=g.GET_MORE_ELEMENTS;describe("GetMoreElementsCommandHandler",()=>{let t,q;beforeEach(()=>{vi.clearAllMocks(),q={},t={dataStore:q,queue:[],yieldedResults:[]}});const m=o=>new Uint8Array([o]),p=(o,e)=>new Uint8Array(Array(o).fill(e));it("should retrieve the maximum number of elements within the payload size",()=>{const o=m(i),e=50,n=Math.floor((x-1-1)/e),s=Array.from({length:n},(a,u)=>p(e,16+u));t.queue=[...s];const r=l(o,t),c=new Uint8Array(2+n*e);c[0]=n,c[1]=e;for(let a=0;a<n;a++)c.set(s[a],2+a*e);expect(r.isRight()).toBe(!0),expect(r.unsafeCoerce()).toEqual(c),expect(t.queue).toHaveLength(0)}),it("should retrieve the maximum number of elements allowed and queue the remainder",()=>{const o=m(i),e=30,n=Math.floor((x-1-1)/e),s=n+5,r=Array.from({length:s},(u,h)=>p(e,32+h));t.queue=[...r];const c=l(o,t),a=new Uint8Array(2+n*e);a[0]=n,a[1]=e;for(let u=0;u<n;u++)a.set(r[u],2+u*e);expect(c.isRight()).toBe(!0),expect(c.unsafeCoerce()).toEqual(a),expect(t.queue).toHaveLength(s-n);for(let u=0;u<t.queue.length;u++)expect(t.queue[u]).toEqual(r[n+u])}),it("should return an error when queue is empty",()=>{const o=m(i);t.queue=[];const e=l(o,t);expect(e.isLeft()).toBe(!0),e.caseOf({Left:n=>{expect(n).toBeInstanceOf(f),expect(t.queue).toHaveLength(0)},Right:n=>{throw new Error("Expected Left, got Right")}})}),it("should return an error when the first element is undefined",()=>{const o=m(i);t.queue=[void 0];const e=l(o,t);expect(e.isLeft()).toBe(!0),e.caseOf({Left:n=>{expect(n).toBeInstanceOf(f),expect(t.queue).toHaveLength(1)},Right:n=>{throw new Error("Expected Left, got Right")}})}),it("should return an error when elements in queue have varying lengths",()=>{const o=m(i),e=p(40,48),n=p(50,49);t.queue=[e,n];const s=l(o,t);expect(s.isLeft()).toBe(!0),s.caseOf({Left:r=>{expect(r).toBeInstanceOf(f),expect(t.queue).toHaveLength(2)},Right:r=>{throw new Error("Expected Left, got Right")}})}),it("should handle a single element that matches the maximum payload size",()=>{const o=m(i),e=253,n=[p(e,64)];t.queue=[...n];const s=l(o,t),r=new Uint8Array(2+e);r[0]=1,r[1]=e,r.set(n[0],2),expect(s.isRight()).toBe(!0),expect(s.unsafeCoerce()).toEqual(r),expect(t.queue).toHaveLength(0)}),it("should handle a single element that exceeds the maximum payload size",()=>{const o=m(i),e=254,n=[p(e,80)];t.queue=[...n];const s=l(o,t),r=new Uint8Array([0,e]);expect(s.isRight()).toBe(!0),expect(s.unsafeCoerce()).toEqual(r),expect(t.queue).toHaveLength(1)}),it("should handle multiple executions correctly",()=>{const o=m(i),e=60,n=Math.floor((x-1-1)/e),s=10,r=Array.from({length:s},(c,a)=>p(e,96+a));t.queue=[...r];for(let c=0;c<Math.ceil(s/n);c++){const a=t.queue.length,u=Math.min(n,a),h=new Uint8Array(2+u*e);h[0]=u,h[1]=e;for(let d=0;d<u;d++)h.set(t.queue[d],2+d*e);const E=l(o,t);expect(E.isRight()).toBe(!0),expect(E.unsafeCoerce()).toEqual(h),expect(t.queue).toHaveLength(a-u)}expect(t.queue).toHaveLength(0)})});
|
|
2
2
|
//# sourceMappingURL=GetMoreElementsCommandHandler.test.js.map
|