@ledgerhq/device-signer-kit-bitcoin 0.0.0-wrong-error-when-in-experimental-provider-20251021162636 → 0.0.0-z-intent-queue-7-20251204111630
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/cjs/internal/app-binder/command/ContinueCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/ContinueCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/ContinueCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/ContinueCommand.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/command/GetExtendedPublicKeyCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetExtendedPublicKeyCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/GetExtendedPublicKeyCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetExtendedPublicKeyCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/GetMasterFingerprintCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetMasterFingerprintCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/GetMasterFingerprintCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetMasterFingerprintCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/GetWalletAddressCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetWalletAddressCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/GetWalletAddressCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetWalletAddressCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/RegisterWalletAddressCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/RegisterWalletAddressCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/RegisterWalletAddressCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/RegisterWalletAddressCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/SignMessageCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignMessageCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/SignMessageCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignMessageCommand.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/command/SignPsbtCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignPsbtCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/SignPsbtCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignPsbtCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/device-action/__test-utils__/makeInternalApi.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/__test-utils__/makeInternalApi.js.map +3 -3
- package/lib/cjs/internal/psbt/service/key-pair/DefaultKeyPairSerializer.test.js +1 -1
- package/lib/cjs/internal/psbt/service/key-pair/DefaultKeyPairSerializer.test.js.map +1 -1
- package/lib/cjs/internal/psbt/service/psbt/DefaultPsbtSerializer.js.map +1 -1
- package/lib/cjs/package.json +43 -39
- package/lib/esm/internal/app-binder/command/ContinueCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/ContinueCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/ContinueCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/ContinueCommand.test.js.map +3 -3
- package/lib/esm/internal/app-binder/command/GetExtendedPublicKeyCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/GetExtendedPublicKeyCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/GetExtendedPublicKeyCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/GetExtendedPublicKeyCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/GetMasterFingerprintCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/GetMasterFingerprintCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/GetMasterFingerprintCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/GetMasterFingerprintCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/GetWalletAddressCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/GetWalletAddressCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/GetWalletAddressCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/GetWalletAddressCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/RegisterWalletAddressCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/RegisterWalletAddressCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/RegisterWalletAddressCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/RegisterWalletAddressCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/SignMessageCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/SignMessageCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/SignMessageCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/SignMessageCommand.test.js.map +3 -3
- package/lib/esm/internal/app-binder/command/SignPsbtCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/SignPsbtCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/SignPsbtCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/SignPsbtCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/device-action/__test-utils__/makeInternalApi.js +1 -1
- package/lib/esm/internal/app-binder/device-action/__test-utils__/makeInternalApi.js.map +3 -3
- package/lib/esm/internal/psbt/service/key-pair/DefaultKeyPairSerializer.test.js +1 -1
- package/lib/esm/internal/psbt/service/key-pair/DefaultKeyPairSerializer.test.js.map +1 -1
- package/lib/esm/internal/psbt/service/psbt/DefaultPsbtSerializer.js.map +1 -1
- package/lib/esm/package.json +43 -39
- package/lib/types/internal/app-binder/command/ContinueCommand.d.ts +1 -0
- package/lib/types/internal/app-binder/command/ContinueCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/GetExtendedPublicKeyCommand.d.ts +1 -0
- package/lib/types/internal/app-binder/command/GetExtendedPublicKeyCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/GetMasterFingerprintCommand.d.ts +1 -0
- package/lib/types/internal/app-binder/command/GetMasterFingerprintCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/GetWalletAddressCommand.d.ts +1 -0
- package/lib/types/internal/app-binder/command/GetWalletAddressCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/RegisterWalletAddressCommand.d.ts +1 -0
- package/lib/types/internal/app-binder/command/RegisterWalletAddressCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/SignMessageCommand.d.ts +1 -0
- package/lib/types/internal/app-binder/command/SignMessageCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/SignPsbtCommand.d.ts +1 -0
- package/lib/types/internal/app-binder/command/SignPsbtCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/__test-utils__/makeInternalApi.d.ts.map +1 -1
- package/lib/types/internal/psbt/service/psbt/DefaultPsbtSerializer.d.ts +2 -2
- package/lib/types/tsconfig.prod.tsbuildinfo +1 -1
- package/package.json +38 -34
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var p=Object.defineProperty;var u=Object.getOwnPropertyDescriptor;var i=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var y=(e
|
|
1
|
+
"use strict";var p=Object.defineProperty;var u=Object.getOwnPropertyDescriptor;var i=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var y=(o,e)=>{for(var r in e)p(o,r,{get:e[r],enumerable:!0})},c=(o,e,r,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of i(e))!l.call(o,n)&&n!==r&&p(o,n,{get:()=>e[n],enumerable:!(a=u(e,n))||a.enumerable});return o};var R=o=>c(p({},"__esModule",{value:!0}),o);var f={};y(f,{ContinueCommand:()=>A});module.exports=R(f);var t=require("@ledgerhq/device-management-kit"),s=require("@ledgerhq/signer-utils"),d=require("purify-ts"),m=require("../../app-binder/command/utils/bitcoinAppErrors"),C=require("../../utils/BtcCommandUtils");class A{constructor(e,r=new s.CommandErrorHelper(m.BTC_APP_ERRORS,m.BtcAppCommandErrorFactory,C.BtcCommandUtils.isSuccessResponse)){this._args=e;this._errorHelper=r}name="continue";getApdu(){return new t.ApduBuilder({cla:248,ins:1,p1:0,p2:0}).addBufferToData(this._args.payload).build()}parseResponse(e){return d.Maybe.fromNullable(this._errorHelper.getError(e)).orDefault((0,t.CommandResultFactory)({data:e}))}}0&&(module.exports={ContinueCommand});
|
|
2
2
|
//# sourceMappingURL=ContinueCommand.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/command/ContinueCommand.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n type Apdu,\n ApduBuilder,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n} from \"@ledgerhq/device-management-kit\";\nimport { CommandErrorHelper } from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport {\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n type BtcErrorCodes,\n} from \"@internal/app-binder/command/utils/bitcoinAppErrors\";\nimport { BtcCommandUtils } from \"@internal/utils/BtcCommandUtils\";\n\nexport type ContinueCommandArgs = {\n payload: Uint8Array;\n};\n\nexport type ContinueCommandResponse = ApduResponse;\n\nexport class ContinueCommand\n implements\n Command<ContinueCommandResponse, ContinueCommandArgs, BtcErrorCodes>\n{\n constructor(\n private readonly _args: ContinueCommandArgs,\n private readonly _errorHelper = new CommandErrorHelper<\n ContinueCommandResponse,\n BtcErrorCodes\n >(\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n BtcCommandUtils.isSuccessResponse,\n ),\n ) {}\n\n getApdu(): Apdu {\n return new ApduBuilder({\n cla: 0xf8,\n ins: 0x01,\n p1: 0x00,\n p2: 0x00,\n })\n .addBufferToData(this._args.payload)\n .build();\n }\n\n parseResponse(\n response: ApduResponse,\n ): CommandResult<ContinueCommandResponse, BtcErrorCodes> {\n return Maybe.fromNullable(this._errorHelper.getError(response)).orDefault(\n CommandResultFactory({\n data: response,\n }),\n );\n }\n}\n"],
|
|
5
|
-
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,qBAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAOO,2CACPC,EAAmC,kCACnCC,EAAsB,qBAEtBC,EAIO,+DACPC,EAAgC,2CAQzB,MAAMN,CAGb,
|
|
4
|
+
"sourcesContent": ["import {\n type Apdu,\n ApduBuilder,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n} from \"@ledgerhq/device-management-kit\";\nimport { CommandErrorHelper } from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport {\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n type BtcErrorCodes,\n} from \"@internal/app-binder/command/utils/bitcoinAppErrors\";\nimport { BtcCommandUtils } from \"@internal/utils/BtcCommandUtils\";\n\nexport type ContinueCommandArgs = {\n payload: Uint8Array;\n};\n\nexport type ContinueCommandResponse = ApduResponse;\n\nexport class ContinueCommand\n implements\n Command<ContinueCommandResponse, ContinueCommandArgs, BtcErrorCodes>\n{\n readonly name = \"continue\";\n constructor(\n private readonly _args: ContinueCommandArgs,\n private readonly _errorHelper = new CommandErrorHelper<\n ContinueCommandResponse,\n BtcErrorCodes\n >(\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n BtcCommandUtils.isSuccessResponse,\n ),\n ) {}\n\n getApdu(): Apdu {\n return new ApduBuilder({\n cla: 0xf8,\n ins: 0x01,\n p1: 0x00,\n p2: 0x00,\n })\n .addBufferToData(this._args.payload)\n .build();\n }\n\n parseResponse(\n response: ApduResponse,\n ): CommandResult<ContinueCommandResponse, BtcErrorCodes> {\n return Maybe.fromNullable(this._errorHelper.getError(response)).orDefault(\n CommandResultFactory({\n data: response,\n }),\n );\n }\n}\n"],
|
|
5
|
+
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,qBAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAOO,2CACPC,EAAmC,kCACnCC,EAAsB,qBAEtBC,EAIO,+DACPC,EAAgC,2CAQzB,MAAMN,CAGb,CAEE,YACmBO,EACAC,EAAe,IAAI,qBAIlC,iBACA,4BACA,kBAAgB,iBAClB,EACA,CATiB,WAAAD,EACA,kBAAAC,CAQhB,CAXM,KAAO,WAahB,SAAgB,CACd,OAAO,IAAI,cAAY,CACrB,IAAK,IACL,IAAK,EACL,GAAI,EACJ,GAAI,CACN,CAAC,EACE,gBAAgB,KAAK,MAAM,OAAO,EAClC,MAAM,CACX,CAEA,cACEC,EACuD,CACvD,OAAO,QAAM,aAAa,KAAK,aAAa,SAASA,CAAQ,CAAC,EAAE,aAC9D,wBAAqB,CACnB,KAAMA,CACR,CAAC,CACH,CACF,CACF",
|
|
6
6
|
"names": ["ContinueCommand_exports", "__export", "ContinueCommand", "__toCommonJS", "import_device_management_kit", "import_signer_utils", "import_purify_ts", "import_bitcoinAppErrors", "import_BtcCommandUtils", "_args", "_errorHelper", "response"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var
|
|
1
|
+
"use strict";var t=require("@ledgerhq/device-management-kit"),r=require("../../app-binder/command/utils/constants"),n=require("./ContinueCommand");describe("ContinueCommand",()=>{const o={payload:new Uint8Array([222,173,190,239])},d=new Uint8Array([248,1,0,0,4,222,173,190,239]);describe("name",()=>{it("should be 'continue'",()=>{const e=new n.ContinueCommand(o);expect(e.name).toBe("continue")})}),describe("getApdu",()=>{it("should return correct APDU for given payload",()=>{const s=new n.ContinueCommand(o).getApdu();expect(s.getRawApdu()).toStrictEqual(d)})}),describe("parseResponse",()=>{it("should return the APDU response if it's a continue response",()=>{const e=new n.ContinueCommand(o),s=new Uint8Array([1,2,3,4]),a=new t.ApduResponse({statusCode:r.SW_INTERRUPTED_EXECUTION,data:s}),c=e.parseResponse(a);expect(c).toStrictEqual((0,t.CommandResultFactory)({data:a}))})})});
|
|
2
2
|
//# sourceMappingURL=ContinueCommand.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/command/ContinueCommand.test.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { SW_INTERRUPTED_EXECUTION } from \"@internal/app-binder/command/utils/constants\";\n\nimport { ContinueCommand } from \"./ContinueCommand\";\n\ndescribe(\"ContinueCommand\", (): void => {\n const defaultArgs = {\n payload: new Uint8Array([0xde, 0xad, 0xbe, 0xef]),\n };\n\n const EXPECTED_APDU = new Uint8Array([\n 0xf8, // CLA\n 0x01, // INS\n 0x00, // P1\n 0x00, // P2\n 0x04, // Lc\n 0xde,\n 0xad,\n 0xbe,\n 0xef, // Payload data\n ]);\n\n describe(\"getApdu\", () => {\n it(\"should return correct APDU for given payload\", () => {\n // given\n const command = new ContinueCommand(defaultArgs);\n // when\n const apdu = command.getApdu();\n // then\n expect(apdu.getRawApdu()).toStrictEqual(EXPECTED_APDU);\n });\n });\n\n describe(\"parseResponse\", () => {\n it(\"should return the APDU response if it's a continue response\", () => {\n // given\n const command = new ContinueCommand(defaultArgs);\n const continueResponseData = new Uint8Array([0x01, 0x02, 0x03, 0x04]);\n const apduResponse = new ApduResponse({\n statusCode: SW_INTERRUPTED_EXECUTION,\n data: continueResponseData,\n });\n\n // when\n const response = command.parseResponse(apduResponse);\n\n // then\n expect(response).toStrictEqual(\n CommandResultFactory({\n data: apduResponse,\n }),\n );\n });\n });\n});\n"],
|
|
5
|
-
"mappings": "aAAA,IAAAA,EAGO,2CAEPC,EAAyC,wDAEzCC,EAAgC,6BAEhC,SAAS,kBAAmB,IAAY,CACtC,MAAMC,EAAc,CAClB,QAAS,IAAI,WAAW,CAAC,IAAM,IAAM,IAAM,GAAI,CAAC,CAClD,EAEMC,EAAgB,IAAI,WAAW,CACnC,IACA,EACA,EACA,EACA,EACA,IACA,IACA,IACA,GACF,CAAC,EAED,SAAS,UAAW,IAAM,CACxB,GAAG,+CAAgD,IAAM,CAIvD,MAAMC,EAFU,IAAI,
|
|
6
|
-
"names": ["import_device_management_kit", "import_constants", "import_ContinueCommand", "defaultArgs", "EXPECTED_APDU", "
|
|
4
|
+
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { SW_INTERRUPTED_EXECUTION } from \"@internal/app-binder/command/utils/constants\";\n\nimport { ContinueCommand } from \"./ContinueCommand\";\n\ndescribe(\"ContinueCommand\", (): void => {\n const defaultArgs = {\n payload: new Uint8Array([0xde, 0xad, 0xbe, 0xef]),\n };\n\n const EXPECTED_APDU = new Uint8Array([\n 0xf8, // CLA\n 0x01, // INS\n 0x00, // P1\n 0x00, // P2\n 0x04, // Lc\n 0xde,\n 0xad,\n 0xbe,\n 0xef, // Payload data\n ]);\n\n describe(\"name\", () => {\n it(\"should be 'continue'\", () => {\n const command = new ContinueCommand(defaultArgs);\n expect(command.name).toBe(\"continue\");\n });\n });\n\n describe(\"getApdu\", () => {\n it(\"should return correct APDU for given payload\", () => {\n // given\n const command = new ContinueCommand(defaultArgs);\n // when\n const apdu = command.getApdu();\n // then\n expect(apdu.getRawApdu()).toStrictEqual(EXPECTED_APDU);\n });\n });\n\n describe(\"parseResponse\", () => {\n it(\"should return the APDU response if it's a continue response\", () => {\n // given\n const command = new ContinueCommand(defaultArgs);\n const continueResponseData = new Uint8Array([0x01, 0x02, 0x03, 0x04]);\n const apduResponse = new ApduResponse({\n statusCode: SW_INTERRUPTED_EXECUTION,\n data: continueResponseData,\n });\n\n // when\n const response = command.parseResponse(apduResponse);\n\n // then\n expect(response).toStrictEqual(\n CommandResultFactory({\n data: apduResponse,\n }),\n );\n });\n });\n});\n"],
|
|
5
|
+
"mappings": "aAAA,IAAAA,EAGO,2CAEPC,EAAyC,wDAEzCC,EAAgC,6BAEhC,SAAS,kBAAmB,IAAY,CACtC,MAAMC,EAAc,CAClB,QAAS,IAAI,WAAW,CAAC,IAAM,IAAM,IAAM,GAAI,CAAC,CAClD,EAEMC,EAAgB,IAAI,WAAW,CACnC,IACA,EACA,EACA,EACA,EACA,IACA,IACA,IACA,GACF,CAAC,EAED,SAAS,OAAQ,IAAM,CACrB,GAAG,uBAAwB,IAAM,CAC/B,MAAMC,EAAU,IAAI,kBAAgBF,CAAW,EAC/C,OAAOE,EAAQ,IAAI,EAAE,KAAK,UAAU,CACtC,CAAC,CACH,CAAC,EAED,SAAS,UAAW,IAAM,CACxB,GAAG,+CAAgD,IAAM,CAIvD,MAAMC,EAFU,IAAI,kBAAgBH,CAAW,EAE1B,QAAQ,EAE7B,OAAOG,EAAK,WAAW,CAAC,EAAE,cAAcF,CAAa,CACvD,CAAC,CACH,CAAC,EAED,SAAS,gBAAiB,IAAM,CAC9B,GAAG,8DAA+D,IAAM,CAEtE,MAAMC,EAAU,IAAI,kBAAgBF,CAAW,EACzCI,EAAuB,IAAI,WAAW,CAAC,EAAM,EAAM,EAAM,CAAI,CAAC,EAC9DC,EAAe,IAAI,eAAa,CACpC,WAAY,2BACZ,KAAMD,CACR,CAAC,EAGKE,EAAWJ,EAAQ,cAAcG,CAAY,EAGnD,OAAOC,CAAQ,EAAE,iBACf,wBAAqB,CACnB,KAAMD,CACR,CAAC,CACH,CACF,CAAC,CACH,CAAC,CACH,CAAC",
|
|
6
|
+
"names": ["import_device_management_kit", "import_constants", "import_ContinueCommand", "defaultArgs", "EXPECTED_APDU", "command", "apdu", "continueResponseData", "apduResponse", "response"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var i=Object.defineProperty;var u=Object.getOwnPropertyDescriptor;var y=Object.getOwnPropertyNames;var g=Object.prototype.hasOwnProperty;var x=(
|
|
1
|
+
"use strict";var i=Object.defineProperty;var u=Object.getOwnPropertyDescriptor;var y=Object.getOwnPropertyNames;var g=Object.prototype.hasOwnProperty;var x=(o,e)=>{for(var t in e)i(o,t,{get:e[t],enumerable:!0})},C=(o,e,t,d)=>{if(e&&typeof e=="object"||typeof e=="function")for(let r of y(e))!g.call(o,r)&&r!==t&&i(o,r,{get:()=>e[r],enumerable:!(d=u(e,r))||d.enumerable});return o};var E=o=>C(i({},"__esModule",{value:!0}),o);var b={};x(b,{GetExtendedPublicKeyCommand:()=>P});module.exports=E(b);var n=require("@ledgerhq/device-management-kit"),a=require("@ledgerhq/signer-utils"),m=require("purify-ts"),s=require("../../app-binder/command/utils/bitcoinAppErrors"),l=require("../../utils/BtcCommandUtils");class P{constructor(e,t=new a.CommandErrorHelper(s.BTC_APP_ERRORS,s.BtcAppCommandErrorFactory,l.BtcCommandUtils.isSuccessResponse)){this._args=e;this._errorHelper=t}name="getExtendedPublicKey";getApdu(){const{checkOnDevice:e,derivationPath:t}=this._args,d={cla:225,ins:0,p1:0,p2:0},r=new n.ApduBuilder(d).add8BitUIntToData(e?1:0),p=a.DerivationPathUtils.splitPath(t);return r.add8BitUIntToData(p.length),p.forEach(c=>{r.add32BitUIntToData(c)}),r.build()}parseResponse(e){return m.Maybe.fromNullable(this._errorHelper.getError(e)).orDefaultLazy(()=>{const t=new n.ApduParser(e),d=t.getUnparsedRemainingLength();if(d<=0)return(0,n.CommandResultFactory)({error:new n.InvalidStatusWordError("Invalid response length")});const r=t.encodeToString(t.extractFieldByLength(d));return(0,n.CommandResultFactory)({data:{extendedPublicKey:r}})})}}0&&(module.exports={GetExtendedPublicKeyCommand});
|
|
2
2
|
//# sourceMappingURL=GetExtendedPublicKeyCommand.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/command/GetExtendedPublicKeyCommand.ts"],
|
|
4
|
-
"sourcesContent": ["// https://github.com/LedgerHQ/app-bitcoin-new/blob/master/doc/bitcoin.md#get_extended_pubkey\nimport {\n type Apdu,\n ApduBuilder,\n type ApduBuilderArgs,\n ApduParser,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\nimport {\n CommandErrorHelper,\n DerivationPathUtils,\n} from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport {\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n type BtcErrorCodes,\n} from \"@internal/app-binder/command/utils/bitcoinAppErrors\";\nimport { BtcCommandUtils } from \"@internal/utils/BtcCommandUtils\";\n\nexport type GetExtendedPublicKeyCommandArgs = {\n checkOnDevice: boolean;\n derivationPath: string;\n};\n\nexport type GetExtendedPublicKeyCommandResponse = {\n extendedPublicKey: string;\n};\n\nexport class GetExtendedPublicKeyCommand\n implements\n Command<\n GetExtendedPublicKeyCommandResponse,\n GetExtendedPublicKeyCommandArgs,\n BtcErrorCodes\n >\n{\n constructor(\n private readonly _args: GetExtendedPublicKeyCommandArgs,\n private readonly _errorHelper = new CommandErrorHelper<\n GetExtendedPublicKeyCommandResponse,\n BtcErrorCodes\n >(\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n BtcCommandUtils.isSuccessResponse,\n ),\n ) {}\n\n getApdu(): Apdu {\n const { checkOnDevice, derivationPath } = this._args;\n\n const getExtendedPublicKeyArgs: ApduBuilderArgs = {\n cla: 0xe1,\n ins: 0x00,\n p1: 0x00,\n p2: 0x00,\n };\n const builder = new ApduBuilder(getExtendedPublicKeyArgs).add8BitUIntToData(\n checkOnDevice ? 0x01 : 0x00,\n );\n\n const path = DerivationPathUtils.splitPath(derivationPath);\n builder.add8BitUIntToData(path.length);\n path.forEach((element) => {\n builder.add32BitUIntToData(element);\n });\n\n return builder.build();\n }\n\n parseResponse(\n response: ApduResponse,\n ): CommandResult<GetExtendedPublicKeyCommandResponse, BtcErrorCodes> {\n return Maybe.fromNullable(\n this._errorHelper.getError(response),\n ).orDefaultLazy(() => {\n const parser = new ApduParser(response);\n const length = parser.getUnparsedRemainingLength();\n\n if (length <= 0) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\"Invalid response length\"),\n });\n }\n\n const extendedPublicKey = parser.encodeToString(\n parser.extractFieldByLength(length),\n );\n\n return CommandResultFactory({\n data: {\n extendedPublicKey,\n },\n });\n });\n }\n}\n"],
|
|
5
|
-
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,iCAAAE,IAAA,eAAAC,EAAAH,GACA,IAAAI,EAUO,2CACPC,EAGO,kCACPC,EAAsB,qBAEtBC,EAIO,+DACPC,EAAgC,2CAWzB,MAAMN,CAOb,
|
|
4
|
+
"sourcesContent": ["// https://github.com/LedgerHQ/app-bitcoin-new/blob/master/doc/bitcoin.md#get_extended_pubkey\nimport {\n type Apdu,\n ApduBuilder,\n type ApduBuilderArgs,\n ApduParser,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\nimport {\n CommandErrorHelper,\n DerivationPathUtils,\n} from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport {\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n type BtcErrorCodes,\n} from \"@internal/app-binder/command/utils/bitcoinAppErrors\";\nimport { BtcCommandUtils } from \"@internal/utils/BtcCommandUtils\";\n\nexport type GetExtendedPublicKeyCommandArgs = {\n checkOnDevice: boolean;\n derivationPath: string;\n};\n\nexport type GetExtendedPublicKeyCommandResponse = {\n extendedPublicKey: string;\n};\n\nexport class GetExtendedPublicKeyCommand\n implements\n Command<\n GetExtendedPublicKeyCommandResponse,\n GetExtendedPublicKeyCommandArgs,\n BtcErrorCodes\n >\n{\n readonly name = \"getExtendedPublicKey\";\n constructor(\n private readonly _args: GetExtendedPublicKeyCommandArgs,\n private readonly _errorHelper = new CommandErrorHelper<\n GetExtendedPublicKeyCommandResponse,\n BtcErrorCodes\n >(\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n BtcCommandUtils.isSuccessResponse,\n ),\n ) {}\n\n getApdu(): Apdu {\n const { checkOnDevice, derivationPath } = this._args;\n\n const getExtendedPublicKeyArgs: ApduBuilderArgs = {\n cla: 0xe1,\n ins: 0x00,\n p1: 0x00,\n p2: 0x00,\n };\n const builder = new ApduBuilder(getExtendedPublicKeyArgs).add8BitUIntToData(\n checkOnDevice ? 0x01 : 0x00,\n );\n\n const path = DerivationPathUtils.splitPath(derivationPath);\n builder.add8BitUIntToData(path.length);\n path.forEach((element) => {\n builder.add32BitUIntToData(element);\n });\n\n return builder.build();\n }\n\n parseResponse(\n response: ApduResponse,\n ): CommandResult<GetExtendedPublicKeyCommandResponse, BtcErrorCodes> {\n return Maybe.fromNullable(\n this._errorHelper.getError(response),\n ).orDefaultLazy(() => {\n const parser = new ApduParser(response);\n const length = parser.getUnparsedRemainingLength();\n\n if (length <= 0) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\"Invalid response length\"),\n });\n }\n\n const extendedPublicKey = parser.encodeToString(\n parser.extractFieldByLength(length),\n );\n\n return CommandResultFactory({\n data: {\n extendedPublicKey,\n },\n });\n });\n }\n}\n"],
|
|
5
|
+
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,iCAAAE,IAAA,eAAAC,EAAAH,GACA,IAAAI,EAUO,2CACPC,EAGO,kCACPC,EAAsB,qBAEtBC,EAIO,+DACPC,EAAgC,2CAWzB,MAAMN,CAOb,CAEE,YACmBO,EACAC,EAAe,IAAI,qBAIlC,iBACA,4BACA,kBAAgB,iBAClB,EACA,CATiB,WAAAD,EACA,kBAAAC,CAQhB,CAXM,KAAO,uBAahB,SAAgB,CACd,KAAM,CAAE,cAAAC,EAAe,eAAAC,CAAe,EAAI,KAAK,MAEzCC,EAA4C,CAChD,IAAK,IACL,IAAK,EACL,GAAI,EACJ,GAAI,CACN,EACMC,EAAU,IAAI,cAAYD,CAAwB,EAAE,kBACxDF,EAAgB,EAAO,CACzB,EAEMI,EAAO,sBAAoB,UAAUH,CAAc,EACzD,OAAAE,EAAQ,kBAAkBC,EAAK,MAAM,EACrCA,EAAK,QAASC,GAAY,CACxBF,EAAQ,mBAAmBE,CAAO,CACpC,CAAC,EAEMF,EAAQ,MAAM,CACvB,CAEA,cACEG,EACmE,CACnE,OAAO,QAAM,aACX,KAAK,aAAa,SAASA,CAAQ,CACrC,EAAE,cAAc,IAAM,CACpB,MAAMC,EAAS,IAAI,aAAWD,CAAQ,EAChCE,EAASD,EAAO,2BAA2B,EAEjD,GAAIC,GAAU,EACZ,SAAO,wBAAqB,CAC1B,MAAO,IAAI,yBAAuB,yBAAyB,CAC7D,CAAC,EAGH,MAAMC,EAAoBF,EAAO,eAC/BA,EAAO,qBAAqBC,CAAM,CACpC,EAEA,SAAO,wBAAqB,CAC1B,KAAM,CACJ,kBAAAC,CACF,CACF,CAAC,CACH,CAAC,CACH,CACF",
|
|
6
6
|
"names": ["GetExtendedPublicKeyCommand_exports", "__export", "GetExtendedPublicKeyCommand", "__toCommonJS", "import_device_management_kit", "import_signer_utils", "import_purify_ts", "import_bitcoinAppErrors", "import_BtcCommandUtils", "_args", "_errorHelper", "checkOnDevice", "derivationPath", "getExtendedPublicKeyArgs", "builder", "path", "element", "response", "parser", "length", "extendedPublicKey"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var t=require("@ledgerhq/device-management-kit"),a=require("../../app-binder/command/utils/bitcoinAppErrors"),r=require("./GetExtendedPublicKeyCommand");const s=new Uint8Array([225,0,0,0,14,1,3,128,0,0,84,128,0,0,0,128,0,0,0]),d=new Uint8Array([225,0,0,0,14,0,3,128,0,0,84,128,0,0,0,128,0,0,0]),c=new Uint8Array([225,0,0,0,18,1,4,128,0,0,49,128,0,0,0,128,0,0,0,0,0,0,0]),u=new Uint8Array([120,112,117,98,54,68,57,80,112,52,114,70,118,119,84,71,120,56,56,89,68,52,67,68,97,49,110,66,69,112,99,75,69,90,84,67,78,70,122,67,70,55,103,86,80,122,54,84,104,57,66,97,86,104,104,80,74,68,117,103,57,89,89,70,80,89,109,107,83,72,76,102,82,49,86,81,89,106,53,106,97,121,113,119,83,89,65,82,110,117,66,74,105,80,83,68,97,98,121,121,84,105,67,68,55,66,51,99,106,80,113]);describe("GetExtendedPublicKeyCommand",()=>{let x;const n={checkOnDevice:!0,derivationPath:"84'/0'/0'"};beforeEach(()=>{}),describe("getApdu",()=>{it("should return the correct APDU",()=>{x=new r.GetExtendedPublicKeyCommand(n);const e=x.getApdu();expect(e.getRawApdu()).toEqual(s)}),it("should return the correct APDU without checkOnDevice",()=>{x=new r.GetExtendedPublicKeyCommand({...n,checkOnDevice:!1});const e=x.getApdu();expect(e.getRawApdu()).toEqual(d)}),it("should return the correct APDU with different derivation path",()=>{x=new r.GetExtendedPublicKeyCommand({...n,derivationPath:"49'/0'/0'/0"});const e=x.getApdu();expect(e.getRawApdu()).toEqual(c)})}),describe("parseResponse",()=>{it("should return the extended public key",()=>{x=new r.GetExtendedPublicKeyCommand(n);const e=new t.ApduResponse({data:u,statusCode:new Uint8Array([144,0])}),o=x.parseResponse(e);expect(o).toEqual((0,t.CommandResultFactory)({data:{extendedPublicKey:"xpub6D9Pp4rFvwTGx88YD4CDa1nBEpcKEZTCNFzCF7gVPz6Th9BaVhhPJDug9YYFPYmkSHLfR1VQYj5jayqwSYARnuBJiPSDabyyTiCD7B3cjPq"}}))}),it("should return an error if the response is not successful",()=>{x=new r.GetExtendedPublicKeyCommand(n);const e=new t.ApduResponse({statusCode:Uint8Array.from([109,0]),data:new Uint8Array(0)}),o=x.parseResponse(e);expect(o).toStrictEqual((0,t.CommandResultFactory)({error:(0,a.BtcAppCommandErrorFactory)({...a.BTC_APP_ERRORS["6d00"],errorCode:"6d00"})}))}),it("should return an error if the response is too short",()=>{x=new r.GetExtendedPublicKeyCommand(n);const e=new t.ApduResponse({data:Uint8Array.from([]),statusCode:new Uint8Array([144,0])}),o=x.parseResponse(e);expect(o).toStrictEqual((0,t.CommandResultFactory)({error:new t.InvalidStatusWordError("Invalid response length")}))})})});
|
|
1
|
+
"use strict";var t=require("@ledgerhq/device-management-kit"),a=require("../../app-binder/command/utils/bitcoinAppErrors"),r=require("./GetExtendedPublicKeyCommand");const s=new Uint8Array([225,0,0,0,14,1,3,128,0,0,84,128,0,0,0,128,0,0,0]),d=new Uint8Array([225,0,0,0,14,0,3,128,0,0,84,128,0,0,0,128,0,0,0]),c=new Uint8Array([225,0,0,0,18,1,4,128,0,0,49,128,0,0,0,128,0,0,0,0,0,0,0]),u=new Uint8Array([120,112,117,98,54,68,57,80,112,52,114,70,118,119,84,71,120,56,56,89,68,52,67,68,97,49,110,66,69,112,99,75,69,90,84,67,78,70,122,67,70,55,103,86,80,122,54,84,104,57,66,97,86,104,104,80,74,68,117,103,57,89,89,70,80,89,109,107,83,72,76,102,82,49,86,81,89,106,53,106,97,121,113,119,83,89,65,82,110,117,66,74,105,80,83,68,97,98,121,121,84,105,67,68,55,66,51,99,106,80,113]);describe("GetExtendedPublicKeyCommand",()=>{let x;const n={checkOnDevice:!0,derivationPath:"84'/0'/0'"};beforeEach(()=>{}),describe("name",()=>{it("should be 'getExtendedPublicKey'",()=>{x=new r.GetExtendedPublicKeyCommand(n),expect(x.name).toBe("getExtendedPublicKey")})}),describe("getApdu",()=>{it("should return the correct APDU",()=>{x=new r.GetExtendedPublicKeyCommand(n);const e=x.getApdu();expect(e.getRawApdu()).toEqual(s)}),it("should return the correct APDU without checkOnDevice",()=>{x=new r.GetExtendedPublicKeyCommand({...n,checkOnDevice:!1});const e=x.getApdu();expect(e.getRawApdu()).toEqual(d)}),it("should return the correct APDU with different derivation path",()=>{x=new r.GetExtendedPublicKeyCommand({...n,derivationPath:"49'/0'/0'/0"});const e=x.getApdu();expect(e.getRawApdu()).toEqual(c)})}),describe("parseResponse",()=>{it("should return the extended public key",()=>{x=new r.GetExtendedPublicKeyCommand(n);const e=new t.ApduResponse({data:u,statusCode:new Uint8Array([144,0])}),o=x.parseResponse(e);expect(o).toEqual((0,t.CommandResultFactory)({data:{extendedPublicKey:"xpub6D9Pp4rFvwTGx88YD4CDa1nBEpcKEZTCNFzCF7gVPz6Th9BaVhhPJDug9YYFPYmkSHLfR1VQYj5jayqwSYARnuBJiPSDabyyTiCD7B3cjPq"}}))}),it("should return an error if the response is not successful",()=>{x=new r.GetExtendedPublicKeyCommand(n);const e=new t.ApduResponse({statusCode:Uint8Array.from([109,0]),data:new Uint8Array(0)}),o=x.parseResponse(e);expect(o).toStrictEqual((0,t.CommandResultFactory)({error:(0,a.BtcAppCommandErrorFactory)({...a.BTC_APP_ERRORS["6d00"],errorCode:"6d00"})}))}),it("should return an error if the response is too short",()=>{x=new r.GetExtendedPublicKeyCommand(n);const e=new t.ApduResponse({data:Uint8Array.from([]),statusCode:new Uint8Array([144,0])}),o=x.parseResponse(e);expect(o).toStrictEqual((0,t.CommandResultFactory)({error:new t.InvalidStatusWordError("Invalid response length")}))})})});
|
|
2
2
|
//# sourceMappingURL=GetExtendedPublicKeyCommand.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/command/GetExtendedPublicKeyCommand.test.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\n\nimport {\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n} from \"@internal/app-binder/command/utils/bitcoinAppErrors\";\n\nimport {\n GetExtendedPublicKeyCommand,\n type GetExtendedPublicKeyCommandArgs,\n} from \"./GetExtendedPublicKeyCommand\";\n\nconst GET_EXTENDED_PUBLIC_KEY_APDU_WITH_DISPLAY = new Uint8Array([\n 0xe1, 0x00, 0x00, 0x00, 0x0e, 0x01, 0x03, 0x80, 0x00, 0x00, 0x54, 0x80, 0x00,\n 0x00, 0x00, 0x80, 0x00, 0x00, 0x00,\n]);\n\nconst GET_EXTENDED_PUBLIC_KEY_APDU_WITHOUT_DISPLAY = new Uint8Array([\n 0xe1, 0x00, 0x00, 0x00, 0x0e, 0x00, 0x03, 0x80, 0x00, 0x00, 0x54, 0x80, 0x00,\n 0x00, 0x00, 0x80, 0x00, 0x00, 0x00,\n]);\n\nconst GET_EXTENDED_PUBLIC_KEY_APDU_WITH_OTHER_DERIVATION_PATH = new Uint8Array([\n 0xe1, 0x00, 0x00, 0x00, 0x12, 0x01, 0x04, 0x80, 0x00, 0x00, 0x31, 0x80, 0x00,\n 0x00, 0x00, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n]);\n\nconst GET_EXTENDED_PUBLIC_KEY_VALID_RESPONSE = new Uint8Array([\n 0x78, 0x70, 0x75, 0x62, 0x36, 0x44, 0x39, 0x50, 0x70, 0x34, 0x72, 0x46, 0x76,\n 0x77, 0x54, 0x47, 0x78, 0x38, 0x38, 0x59, 0x44, 0x34, 0x43, 0x44, 0x61, 0x31,\n 0x6e, 0x42, 0x45, 0x70, 0x63, 0x4b, 0x45, 0x5a, 0x54, 0x43, 0x4e, 0x46, 0x7a,\n 0x43, 0x46, 0x37, 0x67, 0x56, 0x50, 0x7a, 0x36, 0x54, 0x68, 0x39, 0x42, 0x61,\n 0x56, 0x68, 0x68, 0x50, 0x4a, 0x44, 0x75, 0x67, 0x39, 0x59, 0x59, 0x46, 0x50,\n 0x59, 0x6d, 0x6b, 0x53, 0x48, 0x4c, 0x66, 0x52, 0x31, 0x56, 0x51, 0x59, 0x6a,\n 0x35, 0x6a, 0x61, 0x79, 0x71, 0x77, 0x53, 0x59, 0x41, 0x52, 0x6e, 0x75, 0x42,\n 0x4a, 0x69, 0x50, 0x53, 0x44, 0x61, 0x62, 0x79, 0x79, 0x54, 0x69, 0x43, 0x44,\n 0x37, 0x42, 0x33, 0x63, 0x6a, 0x50, 0x71,\n]);\n\ndescribe(\"GetExtendedPublicKeyCommand\", () => {\n let command: GetExtendedPublicKeyCommand;\n const defaultArgs: GetExtendedPublicKeyCommandArgs = {\n checkOnDevice: true,\n derivationPath: \"84'/0'/0'\",\n };\n\n beforeEach(() => {});\n\n describe(\"getApdu\", () => {\n it(\"should return the correct APDU\", () => {\n // GIVEN\n command = new GetExtendedPublicKeyCommand(defaultArgs);\n\n // WHEN\n const apdu = command.getApdu();\n\n //THEN\n expect(apdu.getRawApdu()).toEqual(\n GET_EXTENDED_PUBLIC_KEY_APDU_WITH_DISPLAY,\n );\n });\n\n it(\"should return the correct APDU without checkOnDevice\", () => {\n // GIVEN\n command = new GetExtendedPublicKeyCommand({\n ...defaultArgs,\n checkOnDevice: false,\n });\n\n // WHEN\n const apdu = command.getApdu();\n\n //THEN\n expect(apdu.getRawApdu()).toEqual(\n GET_EXTENDED_PUBLIC_KEY_APDU_WITHOUT_DISPLAY,\n );\n });\n\n it(\"should return the correct APDU with different derivation path\", () => {\n // GIVEN\n command = new GetExtendedPublicKeyCommand({\n ...defaultArgs,\n derivationPath: \"49'/0'/0'/0\",\n });\n\n // WHEN\n const apdu = command.getApdu();\n\n //THEN\n expect(apdu.getRawApdu()).toEqual(\n GET_EXTENDED_PUBLIC_KEY_APDU_WITH_OTHER_DERIVATION_PATH,\n );\n });\n });\n\n describe(\"parseResponse\", () => {\n it(\"should return the extended public key\", () => {\n // GIVEN\n command = new GetExtendedPublicKeyCommand(defaultArgs);\n const response = new ApduResponse({\n data: GET_EXTENDED_PUBLIC_KEY_VALID_RESPONSE,\n statusCode: new Uint8Array([0x90, 0x00]),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n expect(result).toEqual(\n CommandResultFactory({\n data: {\n extendedPublicKey:\n \"xpub6D9Pp4rFvwTGx88YD4CDa1nBEpcKEZTCNFzCF7gVPz6Th9BaVhhPJDug9YYFPYmkSHLfR1VQYj5jayqwSYARnuBJiPSDabyyTiCD7B3cjPq\",\n },\n }),\n );\n });\n\n it(\"should return an error if the response is not successful\", () => {\n // GIVEN\n command = new GetExtendedPublicKeyCommand(defaultArgs);\n const response = new ApduResponse({\n statusCode: Uint8Array.from([0x6d, 0x00]),\n data: new Uint8Array(0),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n expect(result).toStrictEqual(\n CommandResultFactory({\n error: BtcAppCommandErrorFactory({\n ...BTC_APP_ERRORS[\"6d00\"],\n errorCode: \"6d00\",\n }),\n }),\n );\n });\n\n it(\"should return an error if the response is too short\", () => {\n // GIVEN\n command = new GetExtendedPublicKeyCommand(defaultArgs);\n const response = new ApduResponse({\n data: Uint8Array.from([]),\n statusCode: new Uint8Array([0x90, 0x00]),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n expect(result).toStrictEqual(\n CommandResultFactory({\n error: new InvalidStatusWordError(\"Invalid response length\"),\n }),\n );\n });\n });\n});\n"],
|
|
5
|
-
"mappings": "aAAA,IAAAA,EAIO,2CAEPC,EAGO,+DAEPC,EAGO,yCAEP,MAAMC,EAA4C,IAAI,WAAW,CAC/D,IAAM,EAAM,EAAM,EAAM,GAAM,EAAM,EAAM,IAAM,EAAM,EAAM,GAAM,IAAM,EACxE,EAAM,EAAM,IAAM,EAAM,EAAM,CAChC,CAAC,EAEKC,EAA+C,IAAI,WAAW,CAClE,IAAM,EAAM,EAAM,EAAM,GAAM,EAAM,EAAM,IAAM,EAAM,EAAM,GAAM,IAAM,EACxE,EAAM,EAAM,IAAM,EAAM,EAAM,CAChC,CAAC,EAEKC,EAA0D,IAAI,WAAW,CAC7E,IAAM,EAAM,EAAM,EAAM,GAAM,EAAM,EAAM,IAAM,EAAM,EAAM,GAAM,IAAM,EACxE,EAAM,EAAM,IAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,CACxD,CAAC,EAEKC,EAAyC,IAAI,WAAW,CAC5D,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GAAM,GAAM,IAAM,GAAM,IAAM,GAAM,IACxE,IAAM,GAAM,GAAM,IAAM,GAAM,GAAM,GAAM,GAAM,GAAM,GAAM,GAAM,GAAM,GACxE,IAAM,GAAM,GAAM,IAAM,GAAM,GAAM,GAAM,GAAM,GAAM,GAAM,GAAM,GAAM,IACxE,GAAM,GAAM,GAAM,IAAM,GAAM,GAAM,IAAM,GAAM,GAAM,IAAM,GAAM,GAAM,GACxE,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GAAM,GACxE,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAAM,GAAM,GAAM,GAAM,GAAM,GAAM,IACxE,GAAM,IAAM,GAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GAAM,IAAM,IAAM,GACxE,GAAM,IAAM,GAAM,GAAM,GAAM,GAAM,GAAM,IAAM,IAAM,GAAM,IAAM,GAAM,GACxE,GAAM,GAAM,GAAM,GAAM,IAAM,GAAM,GACtC,CAAC,EAED,SAAS,8BAA+B,IAAM,CAC5C,IAAIC,EACJ,MAAMC,EAA+C,CACnD,cAAe,GACf,eAAgB,WAClB,EAEA,WAAW,IAAM,CAAC,CAAC,EAEnB,SAAS,UAAW,IAAM,CACxB,GAAG,iCAAkC,IAAM,
|
|
4
|
+
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\n\nimport {\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n} from \"@internal/app-binder/command/utils/bitcoinAppErrors\";\n\nimport {\n GetExtendedPublicKeyCommand,\n type GetExtendedPublicKeyCommandArgs,\n} from \"./GetExtendedPublicKeyCommand\";\n\nconst GET_EXTENDED_PUBLIC_KEY_APDU_WITH_DISPLAY = new Uint8Array([\n 0xe1, 0x00, 0x00, 0x00, 0x0e, 0x01, 0x03, 0x80, 0x00, 0x00, 0x54, 0x80, 0x00,\n 0x00, 0x00, 0x80, 0x00, 0x00, 0x00,\n]);\n\nconst GET_EXTENDED_PUBLIC_KEY_APDU_WITHOUT_DISPLAY = new Uint8Array([\n 0xe1, 0x00, 0x00, 0x00, 0x0e, 0x00, 0x03, 0x80, 0x00, 0x00, 0x54, 0x80, 0x00,\n 0x00, 0x00, 0x80, 0x00, 0x00, 0x00,\n]);\n\nconst GET_EXTENDED_PUBLIC_KEY_APDU_WITH_OTHER_DERIVATION_PATH = new Uint8Array([\n 0xe1, 0x00, 0x00, 0x00, 0x12, 0x01, 0x04, 0x80, 0x00, 0x00, 0x31, 0x80, 0x00,\n 0x00, 0x00, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n]);\n\nconst GET_EXTENDED_PUBLIC_KEY_VALID_RESPONSE = new Uint8Array([\n 0x78, 0x70, 0x75, 0x62, 0x36, 0x44, 0x39, 0x50, 0x70, 0x34, 0x72, 0x46, 0x76,\n 0x77, 0x54, 0x47, 0x78, 0x38, 0x38, 0x59, 0x44, 0x34, 0x43, 0x44, 0x61, 0x31,\n 0x6e, 0x42, 0x45, 0x70, 0x63, 0x4b, 0x45, 0x5a, 0x54, 0x43, 0x4e, 0x46, 0x7a,\n 0x43, 0x46, 0x37, 0x67, 0x56, 0x50, 0x7a, 0x36, 0x54, 0x68, 0x39, 0x42, 0x61,\n 0x56, 0x68, 0x68, 0x50, 0x4a, 0x44, 0x75, 0x67, 0x39, 0x59, 0x59, 0x46, 0x50,\n 0x59, 0x6d, 0x6b, 0x53, 0x48, 0x4c, 0x66, 0x52, 0x31, 0x56, 0x51, 0x59, 0x6a,\n 0x35, 0x6a, 0x61, 0x79, 0x71, 0x77, 0x53, 0x59, 0x41, 0x52, 0x6e, 0x75, 0x42,\n 0x4a, 0x69, 0x50, 0x53, 0x44, 0x61, 0x62, 0x79, 0x79, 0x54, 0x69, 0x43, 0x44,\n 0x37, 0x42, 0x33, 0x63, 0x6a, 0x50, 0x71,\n]);\n\ndescribe(\"GetExtendedPublicKeyCommand\", () => {\n let command: GetExtendedPublicKeyCommand;\n const defaultArgs: GetExtendedPublicKeyCommandArgs = {\n checkOnDevice: true,\n derivationPath: \"84'/0'/0'\",\n };\n\n beforeEach(() => {});\n\n describe(\"name\", () => {\n it(\"should be 'getExtendedPublicKey'\", () => {\n command = new GetExtendedPublicKeyCommand(defaultArgs);\n expect(command.name).toBe(\"getExtendedPublicKey\");\n });\n });\n\n describe(\"getApdu\", () => {\n it(\"should return the correct APDU\", () => {\n // GIVEN\n command = new GetExtendedPublicKeyCommand(defaultArgs);\n\n // WHEN\n const apdu = command.getApdu();\n\n //THEN\n expect(apdu.getRawApdu()).toEqual(\n GET_EXTENDED_PUBLIC_KEY_APDU_WITH_DISPLAY,\n );\n });\n\n it(\"should return the correct APDU without checkOnDevice\", () => {\n // GIVEN\n command = new GetExtendedPublicKeyCommand({\n ...defaultArgs,\n checkOnDevice: false,\n });\n\n // WHEN\n const apdu = command.getApdu();\n\n //THEN\n expect(apdu.getRawApdu()).toEqual(\n GET_EXTENDED_PUBLIC_KEY_APDU_WITHOUT_DISPLAY,\n );\n });\n\n it(\"should return the correct APDU with different derivation path\", () => {\n // GIVEN\n command = new GetExtendedPublicKeyCommand({\n ...defaultArgs,\n derivationPath: \"49'/0'/0'/0\",\n });\n\n // WHEN\n const apdu = command.getApdu();\n\n //THEN\n expect(apdu.getRawApdu()).toEqual(\n GET_EXTENDED_PUBLIC_KEY_APDU_WITH_OTHER_DERIVATION_PATH,\n );\n });\n });\n\n describe(\"parseResponse\", () => {\n it(\"should return the extended public key\", () => {\n // GIVEN\n command = new GetExtendedPublicKeyCommand(defaultArgs);\n const response = new ApduResponse({\n data: GET_EXTENDED_PUBLIC_KEY_VALID_RESPONSE,\n statusCode: new Uint8Array([0x90, 0x00]),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n expect(result).toEqual(\n CommandResultFactory({\n data: {\n extendedPublicKey:\n \"xpub6D9Pp4rFvwTGx88YD4CDa1nBEpcKEZTCNFzCF7gVPz6Th9BaVhhPJDug9YYFPYmkSHLfR1VQYj5jayqwSYARnuBJiPSDabyyTiCD7B3cjPq\",\n },\n }),\n );\n });\n\n it(\"should return an error if the response is not successful\", () => {\n // GIVEN\n command = new GetExtendedPublicKeyCommand(defaultArgs);\n const response = new ApduResponse({\n statusCode: Uint8Array.from([0x6d, 0x00]),\n data: new Uint8Array(0),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n expect(result).toStrictEqual(\n CommandResultFactory({\n error: BtcAppCommandErrorFactory({\n ...BTC_APP_ERRORS[\"6d00\"],\n errorCode: \"6d00\",\n }),\n }),\n );\n });\n\n it(\"should return an error if the response is too short\", () => {\n // GIVEN\n command = new GetExtendedPublicKeyCommand(defaultArgs);\n const response = new ApduResponse({\n data: Uint8Array.from([]),\n statusCode: new Uint8Array([0x90, 0x00]),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n expect(result).toStrictEqual(\n CommandResultFactory({\n error: new InvalidStatusWordError(\"Invalid response length\"),\n }),\n );\n });\n });\n});\n"],
|
|
5
|
+
"mappings": "aAAA,IAAAA,EAIO,2CAEPC,EAGO,+DAEPC,EAGO,yCAEP,MAAMC,EAA4C,IAAI,WAAW,CAC/D,IAAM,EAAM,EAAM,EAAM,GAAM,EAAM,EAAM,IAAM,EAAM,EAAM,GAAM,IAAM,EACxE,EAAM,EAAM,IAAM,EAAM,EAAM,CAChC,CAAC,EAEKC,EAA+C,IAAI,WAAW,CAClE,IAAM,EAAM,EAAM,EAAM,GAAM,EAAM,EAAM,IAAM,EAAM,EAAM,GAAM,IAAM,EACxE,EAAM,EAAM,IAAM,EAAM,EAAM,CAChC,CAAC,EAEKC,EAA0D,IAAI,WAAW,CAC7E,IAAM,EAAM,EAAM,EAAM,GAAM,EAAM,EAAM,IAAM,EAAM,EAAM,GAAM,IAAM,EACxE,EAAM,EAAM,IAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,CACxD,CAAC,EAEKC,EAAyC,IAAI,WAAW,CAC5D,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GAAM,GAAM,IAAM,GAAM,IAAM,GAAM,IACxE,IAAM,GAAM,GAAM,IAAM,GAAM,GAAM,GAAM,GAAM,GAAM,GAAM,GAAM,GAAM,GACxE,IAAM,GAAM,GAAM,IAAM,GAAM,GAAM,GAAM,GAAM,GAAM,GAAM,GAAM,GAAM,IACxE,GAAM,GAAM,GAAM,IAAM,GAAM,GAAM,IAAM,GAAM,GAAM,IAAM,GAAM,GAAM,GACxE,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GAAM,GACxE,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAAM,GAAM,GAAM,GAAM,GAAM,GAAM,IACxE,GAAM,IAAM,GAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GAAM,IAAM,IAAM,GACxE,GAAM,IAAM,GAAM,GAAM,GAAM,GAAM,GAAM,IAAM,IAAM,GAAM,IAAM,GAAM,GACxE,GAAM,GAAM,GAAM,GAAM,IAAM,GAAM,GACtC,CAAC,EAED,SAAS,8BAA+B,IAAM,CAC5C,IAAIC,EACJ,MAAMC,EAA+C,CACnD,cAAe,GACf,eAAgB,WAClB,EAEA,WAAW,IAAM,CAAC,CAAC,EAEnB,SAAS,OAAQ,IAAM,CACrB,GAAG,mCAAoC,IAAM,CAC3CD,EAAU,IAAI,8BAA4BC,CAAW,EACrD,OAAOD,EAAQ,IAAI,EAAE,KAAK,sBAAsB,CAClD,CAAC,CACH,CAAC,EAED,SAAS,UAAW,IAAM,CACxB,GAAG,iCAAkC,IAAM,CAEzCA,EAAU,IAAI,8BAA4BC,CAAW,EAGrD,MAAMC,EAAOF,EAAQ,QAAQ,EAG7B,OAAOE,EAAK,WAAW,CAAC,EAAE,QACxBN,CACF,CACF,CAAC,EAED,GAAG,uDAAwD,IAAM,CAE/DI,EAAU,IAAI,8BAA4B,CACxC,GAAGC,EACH,cAAe,EACjB,CAAC,EAGD,MAAMC,EAAOF,EAAQ,QAAQ,EAG7B,OAAOE,EAAK,WAAW,CAAC,EAAE,QACxBL,CACF,CACF,CAAC,EAED,GAAG,gEAAiE,IAAM,CAExEG,EAAU,IAAI,8BAA4B,CACxC,GAAGC,EACH,eAAgB,aAClB,CAAC,EAGD,MAAMC,EAAOF,EAAQ,QAAQ,EAG7B,OAAOE,EAAK,WAAW,CAAC,EAAE,QACxBJ,CACF,CACF,CAAC,CACH,CAAC,EAED,SAAS,gBAAiB,IAAM,CAC9B,GAAG,wCAAyC,IAAM,CAEhDE,EAAU,IAAI,8BAA4BC,CAAW,EACrD,MAAME,EAAW,IAAI,eAAa,CAChC,KAAMJ,EACN,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,CACzC,CAAC,EAGKK,EAASJ,EAAQ,cAAcG,CAAQ,EAG7C,OAAOC,CAAM,EAAE,WACb,wBAAqB,CACnB,KAAM,CACJ,kBACE,iHACJ,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,2DAA4D,IAAM,CAEnEJ,EAAU,IAAI,8BAA4BC,CAAW,EACrD,MAAME,EAAW,IAAI,eAAa,CAChC,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAM,IAAI,WAAW,CAAC,CACxB,CAAC,EAGKC,EAASJ,EAAQ,cAAcG,CAAQ,EAG7C,OAAOC,CAAM,EAAE,iBACb,wBAAqB,CACnB,SAAO,6BAA0B,CAC/B,GAAG,iBAAe,MAAM,EACxB,UAAW,MACb,CAAC,CACH,CAAC,CACH,CACF,CAAC,EAED,GAAG,sDAAuD,IAAM,CAE9DJ,EAAU,IAAI,8BAA4BC,CAAW,EACrD,MAAME,EAAW,IAAI,eAAa,CAChC,KAAM,WAAW,KAAK,CAAC,CAAC,EACxB,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,CACzC,CAAC,EAGKC,EAASJ,EAAQ,cAAcG,CAAQ,EAG7C,OAAOC,CAAM,EAAE,iBACb,wBAAqB,CACnB,MAAO,IAAI,yBAAuB,yBAAyB,CAC7D,CAAC,CACH,CACF,CAAC,CACH,CAAC,CACH,CAAC",
|
|
6
6
|
"names": ["import_device_management_kit", "import_bitcoinAppErrors", "import_GetExtendedPublicKeyCommand", "GET_EXTENDED_PUBLIC_KEY_APDU_WITH_DISPLAY", "GET_EXTENDED_PUBLIC_KEY_APDU_WITHOUT_DISPLAY", "GET_EXTENDED_PUBLIC_KEY_APDU_WITH_OTHER_DERIVATION_PATH", "GET_EXTENDED_PUBLIC_KEY_VALID_RESPONSE", "command", "defaultArgs", "apdu", "response", "result"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var a=Object.defineProperty;var u=Object.getOwnPropertyDescriptor;var l=Object.getOwnPropertyNames;var c=Object.prototype.hasOwnProperty;var
|
|
1
|
+
"use strict";var a=Object.defineProperty;var u=Object.getOwnPropertyDescriptor;var l=Object.getOwnPropertyNames;var c=Object.prototype.hasOwnProperty;var g=(t,r)=>{for(var n in r)a(t,n,{get:r[n],enumerable:!0})},C=(t,r,n,o)=>{if(r&&typeof r=="object"||typeof r=="function")for(let s of l(r))!c.call(t,s)&&s!==n&&a(t,s,{get:()=>r[s],enumerable:!(o=u(r,s))||o.enumerable});return t};var R=t=>C(a({},"__esModule",{value:!0}),t);var F={};g(F,{GetMasterFingerprintCommand:()=>y});module.exports=R(F);var e=require("@ledgerhq/device-management-kit"),i=require("@ledgerhq/signer-utils"),m=require("purify-ts"),p=require("../../app-binder/command/utils/bitcoinAppErrors"),d=require("../../utils/BtcCommandUtils");const A=4;class y{constructor(r=new i.CommandErrorHelper(p.BTC_APP_ERRORS,p.BtcAppCommandErrorFactory,d.BtcCommandUtils.isSuccessResponse)){this._errorHelper=r}name="getMasterFingerprint";getApdu(){const r={cla:225,ins:5,p1:0,p2:0};return new e.ApduBuilder(r).build()}parseResponse(r){return m.Maybe.fromNullable(this._errorHelper.getError(r)).orDefaultLazy(()=>{const o=new e.ApduParser(r).extractFieldByLength(A);return o?(0,e.CommandResultFactory)({data:{masterFingerprint:o}}):(0,e.CommandResultFactory)({error:new e.InvalidStatusWordError("Master fingerprint is missing")})})}}0&&(module.exports={GetMasterFingerprintCommand});
|
|
2
2
|
//# sourceMappingURL=GetMasterFingerprintCommand.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/command/GetMasterFingerprintCommand.ts"],
|
|
4
|
-
"sourcesContent": ["// https://github.com/LedgerHQ/app-bitcoin-new/blob/master/doc/bitcoin.md#get_master_fingerprint\nimport {\n type Apdu,\n ApduBuilder,\n type ApduBuilderArgs,\n ApduParser,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\nimport { CommandErrorHelper } from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport {\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n type BtcErrorCodes,\n} from \"@internal/app-binder/command/utils/bitcoinAppErrors\";\nimport { BtcCommandUtils } from \"@internal/utils/BtcCommandUtils\";\n\nconst MASTER_FINGERPRINT_LENGTH = 4;\n\ntype GetMasterFingerprintCommandResponse = {\n masterFingerprint: Uint8Array;\n};\n\nexport class GetMasterFingerprintCommand\n implements Command<GetMasterFingerprintCommandResponse, void, BtcErrorCodes>\n{\n constructor(\n private readonly _errorHelper = new CommandErrorHelper<\n GetMasterFingerprintCommandResponse,\n BtcErrorCodes\n >(\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n BtcCommandUtils.isSuccessResponse,\n ),\n ) {}\n getApdu(): Apdu {\n const getMasterFingerprintArgs: ApduBuilderArgs = {\n cla: 0xe1,\n ins: 0x05,\n p1: 0x00,\n p2: 0x00,\n };\n return new ApduBuilder(getMasterFingerprintArgs).build();\n }\n\n parseResponse(\n response: ApduResponse,\n ): CommandResult<GetMasterFingerprintCommandResponse, BtcErrorCodes> {\n return Maybe.fromNullable(\n this._errorHelper.getError(response),\n ).orDefaultLazy(() => {\n const parser = new ApduParser(response);\n\n const masterFingerprint = parser.extractFieldByLength(\n MASTER_FINGERPRINT_LENGTH,\n );\n if (!masterFingerprint) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\"Master fingerprint is missing\"),\n });\n }\n\n return CommandResultFactory({\n data: {\n masterFingerprint,\n },\n });\n });\n }\n}\n"],
|
|
5
|
-
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,iCAAAE,IAAA,eAAAC,EAAAH,GACA,IAAAI,EAUO,2CACPC,EAAmC,kCACnCC,EAAsB,qBAEtBC,EAIO,+DACPC,EAAgC,2CAEhC,MAAMC,EAA4B,EAM3B,MAAMP,CAEb,
|
|
4
|
+
"sourcesContent": ["// https://github.com/LedgerHQ/app-bitcoin-new/blob/master/doc/bitcoin.md#get_master_fingerprint\nimport {\n type Apdu,\n ApduBuilder,\n type ApduBuilderArgs,\n ApduParser,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\nimport { CommandErrorHelper } from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport {\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n type BtcErrorCodes,\n} from \"@internal/app-binder/command/utils/bitcoinAppErrors\";\nimport { BtcCommandUtils } from \"@internal/utils/BtcCommandUtils\";\n\nconst MASTER_FINGERPRINT_LENGTH = 4;\n\ntype GetMasterFingerprintCommandResponse = {\n masterFingerprint: Uint8Array;\n};\n\nexport class GetMasterFingerprintCommand\n implements Command<GetMasterFingerprintCommandResponse, void, BtcErrorCodes>\n{\n readonly name = \"getMasterFingerprint\";\n constructor(\n private readonly _errorHelper = new CommandErrorHelper<\n GetMasterFingerprintCommandResponse,\n BtcErrorCodes\n >(\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n BtcCommandUtils.isSuccessResponse,\n ),\n ) {}\n getApdu(): Apdu {\n const getMasterFingerprintArgs: ApduBuilderArgs = {\n cla: 0xe1,\n ins: 0x05,\n p1: 0x00,\n p2: 0x00,\n };\n return new ApduBuilder(getMasterFingerprintArgs).build();\n }\n\n parseResponse(\n response: ApduResponse,\n ): CommandResult<GetMasterFingerprintCommandResponse, BtcErrorCodes> {\n return Maybe.fromNullable(\n this._errorHelper.getError(response),\n ).orDefaultLazy(() => {\n const parser = new ApduParser(response);\n\n const masterFingerprint = parser.extractFieldByLength(\n MASTER_FINGERPRINT_LENGTH,\n );\n if (!masterFingerprint) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\"Master fingerprint is missing\"),\n });\n }\n\n return CommandResultFactory({\n data: {\n masterFingerprint,\n },\n });\n });\n }\n}\n"],
|
|
5
|
+
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,iCAAAE,IAAA,eAAAC,EAAAH,GACA,IAAAI,EAUO,2CACPC,EAAmC,kCACnCC,EAAsB,qBAEtBC,EAIO,+DACPC,EAAgC,2CAEhC,MAAMC,EAA4B,EAM3B,MAAMP,CAEb,CAEE,YACmBQ,EAAe,IAAI,qBAIlC,iBACA,4BACA,kBAAgB,iBAClB,EACA,CARiB,kBAAAA,CAQhB,CAVM,KAAO,uBAWhB,SAAgB,CACd,MAAMC,EAA4C,CAChD,IAAK,IACL,IAAK,EACL,GAAI,EACJ,GAAI,CACN,EACA,OAAO,IAAI,cAAYA,CAAwB,EAAE,MAAM,CACzD,CAEA,cACEC,EACmE,CACnE,OAAO,QAAM,aACX,KAAK,aAAa,SAASA,CAAQ,CACrC,EAAE,cAAc,IAAM,CAGpB,MAAMC,EAFS,IAAI,aAAWD,CAAQ,EAEL,qBAC/BH,CACF,EACA,OAAKI,KAME,wBAAqB,CAC1B,KAAM,CACJ,kBAAAA,CACF,CACF,CAAC,KATQ,wBAAqB,CAC1B,MAAO,IAAI,yBAAuB,+BAA+B,CACnE,CAAC,CAQL,CAAC,CACH,CACF",
|
|
6
6
|
"names": ["GetMasterFingerprintCommand_exports", "__export", "GetMasterFingerprintCommand", "__toCommonJS", "import_device_management_kit", "import_signer_utils", "import_purify_ts", "import_bitcoinAppErrors", "import_BtcCommandUtils", "MASTER_FINGERPRINT_LENGTH", "_errorHelper", "getMasterFingerprintArgs", "response", "masterFingerprint"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var e=require("@ledgerhq/device-management-kit"),o=require("@ledgerhq/device-management-kit"),a=require("./GetMasterFingerprintCommand");const i=new Uint8Array([225,5,0,0,0]),n=new Uint8Array([130,141,194,243]);describe("GetMasterFingerprintCommand",()=>{let
|
|
1
|
+
"use strict";var e=require("@ledgerhq/device-management-kit"),o=require("@ledgerhq/device-management-kit"),a=require("./GetMasterFingerprintCommand");const i=new Uint8Array([225,5,0,0,0]),n=new Uint8Array([130,141,194,243]);describe("GetMasterFingerprintCommand",()=>{let r;beforeEach(()=>{r=new a.GetMasterFingerprintCommand}),describe("name",()=>{it("should be 'getMasterFingerprint'",()=>{expect(r.name).toBe("getMasterFingerprint")})}),describe("getApdu",()=>{it("returns the correct APDU",()=>{const t=r.getApdu();expect(t.getRawApdu()).toEqual(i)})}),describe("parseResponse",()=>{it("should return the master fingerprint",()=>{const t=new e.ApduResponse({data:n,statusCode:new Uint8Array([144,0])}),s=r.parseResponse(t);expect(s).toEqual((0,e.CommandResultFactory)({data:{masterFingerprint:Uint8Array.from([130,141,194,243])}}))}),it("should return an error if the response is not successful",()=>{const t=new e.ApduResponse({statusCode:Uint8Array.from([109,0]),data:new Uint8Array(0)}),s=r.parseResponse(t);expect((0,e.isSuccessCommandResult)(s)).toBe(!1)}),it("should return an error if the response is too short",()=>{const t=new e.ApduResponse({data:n.slice(0,2),statusCode:new Uint8Array([144,0])}),s=r.parseResponse(t);(0,e.isSuccessCommandResult)(s)?assert.fail("Expected an error, but the result was successful"):expect(s.error).toEqual(new o.InvalidStatusWordError("Master fingerprint is missing"))})})});
|
|
2
2
|
//# sourceMappingURL=GetMasterFingerprintCommand.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/command/GetMasterFingerprintCommand.test.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\nimport { InvalidStatusWordError } from \"@ledgerhq/device-management-kit\";\n\nimport { GetMasterFingerprintCommand } from \"./GetMasterFingerprintCommand\";\n\nconst GET_MASTER_FINGERPRINT_APDU = new Uint8Array([\n 0xe1, 0x05, 0x00, 0x00, 0x00,\n]);\n\nconst GET_MASTER_FINGERPRINT_RESPONSE = new Uint8Array([\n 0x82, 0x8d, 0xc2, 0xf3,\n]);\n\ndescribe(\"GetMasterFingerprintCommand\", () => {\n let command: GetMasterFingerprintCommand;\n\n beforeEach(() => {\n command = new GetMasterFingerprintCommand();\n });\n\n describe(\"getApdu\", () => {\n it(\"returns the correct APDU\", () => {\n // WHEN\n const apdu = command.getApdu();\n\n // THEN\n expect(apdu.getRawApdu()).toEqual(GET_MASTER_FINGERPRINT_APDU);\n });\n });\n\n describe(\"parseResponse\", () => {\n it(\"should return the master fingerprint\", () => {\n // GIVEN\n const response = new ApduResponse({\n data: GET_MASTER_FINGERPRINT_RESPONSE,\n statusCode: new Uint8Array([0x90, 0x00]),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n expect(result).toEqual(\n CommandResultFactory({\n data: {\n masterFingerprint: Uint8Array.from([0x82, 0x8d, 0xc2, 0xf3]),\n },\n }),\n );\n });\n\n it(\"should return an error if the response is not successful\", () => {\n // GIVEN\n const response = new ApduResponse({\n statusCode: Uint8Array.from([0x6d, 0x00]),\n data: new Uint8Array(0),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n expect(isSuccessCommandResult(result)).toBe(false);\n });\n\n it(\"should return an error if the response is too short\", () => {\n // GIVEN\n const response = new ApduResponse({\n data: GET_MASTER_FINGERPRINT_RESPONSE.slice(0, 2),\n statusCode: new Uint8Array([0x90, 0x00]),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n if (!isSuccessCommandResult(result)) {\n expect(result.error).toEqual(\n new InvalidStatusWordError(\"Master fingerprint is missing\"),\n );\n } else {\n assert.fail(\"Expected an error, but the result was successful\");\n }\n });\n });\n});\n"],
|
|
5
|
-
"mappings": "aAAA,IAAAA,EAIO,2CACPA,EAAuC,2CAEvCC,EAA4C,yCAE5C,MAAMC,EAA8B,IAAI,WAAW,CACjD,IAAM,EAAM,EAAM,EAAM,CAC1B,CAAC,EAEKC,EAAkC,IAAI,WAAW,CACrD,IAAM,IAAM,IAAM,GACpB,CAAC,EAED,SAAS,8BAA+B,IAAM,CAC5C,IAAIC,EAEJ,WAAW,IAAM,CACfA,EAAU,IAAI,6BAChB,CAAC,EAED,SAAS,UAAW,IAAM,CACxB,GAAG,2BAA4B,IAAM,CAEnC,MAAMC,EAAOD,EAAQ,QAAQ,EAG7B,OAAOC,EAAK,WAAW,CAAC,EAAE,QAAQH,CAA2B,CAC/D,CAAC,CACH,CAAC,EAED,SAAS,gBAAiB,IAAM,CAC9B,GAAG,uCAAwC,IAAM,CAE/C,MAAMI,EAAW,IAAI,eAAa,CAChC,KAAMH,EACN,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,CACzC,CAAC,EAGKI,EAASH,EAAQ,cAAcE,CAAQ,EAG7C,OAAOC,CAAM,EAAE,WACb,wBAAqB,CACnB,KAAM,CACJ,kBAAmB,WAAW,KAAK,CAAC,IAAM,IAAM,IAAM,GAAI,CAAC,CAC7D,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,2DAA4D,IAAM,CAEnE,MAAMD,EAAW,IAAI,eAAa,CAChC,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAM,IAAI,WAAW,CAAC,CACxB,CAAC,EAGKC,EAASH,EAAQ,cAAcE,CAAQ,EAG7C,UAAO,0BAAuBC,CAAM,CAAC,EAAE,KAAK,EAAK,CACnD,CAAC,EAED,GAAG,sDAAuD,IAAM,CAE9D,MAAMD,EAAW,IAAI,eAAa,CAChC,KAAMH,EAAgC,MAAM,EAAG,CAAC,EAChD,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,CACzC,CAAC,EAGKI,EAASH,EAAQ,cAAcE,CAAQ,KAGxC,0BAAuBC,CAAM,EAKhC,OAAO,KAAK,kDAAkD,EAJ9D,OAAOA,EAAO,KAAK,EAAE,QACnB,IAAI,yBAAuB,+BAA+B,CAC5D,CAIJ,CAAC,CACH,CAAC,CACH,CAAC",
|
|
4
|
+
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\nimport { InvalidStatusWordError } from \"@ledgerhq/device-management-kit\";\n\nimport { GetMasterFingerprintCommand } from \"./GetMasterFingerprintCommand\";\n\nconst GET_MASTER_FINGERPRINT_APDU = new Uint8Array([\n 0xe1, 0x05, 0x00, 0x00, 0x00,\n]);\n\nconst GET_MASTER_FINGERPRINT_RESPONSE = new Uint8Array([\n 0x82, 0x8d, 0xc2, 0xf3,\n]);\n\ndescribe(\"GetMasterFingerprintCommand\", () => {\n let command: GetMasterFingerprintCommand;\n\n beforeEach(() => {\n command = new GetMasterFingerprintCommand();\n });\n\n describe(\"name\", () => {\n it(\"should be 'getMasterFingerprint'\", () => {\n expect(command.name).toBe(\"getMasterFingerprint\");\n });\n });\n\n describe(\"getApdu\", () => {\n it(\"returns the correct APDU\", () => {\n // WHEN\n const apdu = command.getApdu();\n\n // THEN\n expect(apdu.getRawApdu()).toEqual(GET_MASTER_FINGERPRINT_APDU);\n });\n });\n\n describe(\"parseResponse\", () => {\n it(\"should return the master fingerprint\", () => {\n // GIVEN\n const response = new ApduResponse({\n data: GET_MASTER_FINGERPRINT_RESPONSE,\n statusCode: new Uint8Array([0x90, 0x00]),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n expect(result).toEqual(\n CommandResultFactory({\n data: {\n masterFingerprint: Uint8Array.from([0x82, 0x8d, 0xc2, 0xf3]),\n },\n }),\n );\n });\n\n it(\"should return an error if the response is not successful\", () => {\n // GIVEN\n const response = new ApduResponse({\n statusCode: Uint8Array.from([0x6d, 0x00]),\n data: new Uint8Array(0),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n expect(isSuccessCommandResult(result)).toBe(false);\n });\n\n it(\"should return an error if the response is too short\", () => {\n // GIVEN\n const response = new ApduResponse({\n data: GET_MASTER_FINGERPRINT_RESPONSE.slice(0, 2),\n statusCode: new Uint8Array([0x90, 0x00]),\n });\n\n // WHEN\n const result = command.parseResponse(response);\n\n // THEN\n if (!isSuccessCommandResult(result)) {\n expect(result.error).toEqual(\n new InvalidStatusWordError(\"Master fingerprint is missing\"),\n );\n } else {\n assert.fail(\"Expected an error, but the result was successful\");\n }\n });\n });\n});\n"],
|
|
5
|
+
"mappings": "aAAA,IAAAA,EAIO,2CACPA,EAAuC,2CAEvCC,EAA4C,yCAE5C,MAAMC,EAA8B,IAAI,WAAW,CACjD,IAAM,EAAM,EAAM,EAAM,CAC1B,CAAC,EAEKC,EAAkC,IAAI,WAAW,CACrD,IAAM,IAAM,IAAM,GACpB,CAAC,EAED,SAAS,8BAA+B,IAAM,CAC5C,IAAIC,EAEJ,WAAW,IAAM,CACfA,EAAU,IAAI,6BAChB,CAAC,EAED,SAAS,OAAQ,IAAM,CACrB,GAAG,mCAAoC,IAAM,CAC3C,OAAOA,EAAQ,IAAI,EAAE,KAAK,sBAAsB,CAClD,CAAC,CACH,CAAC,EAED,SAAS,UAAW,IAAM,CACxB,GAAG,2BAA4B,IAAM,CAEnC,MAAMC,EAAOD,EAAQ,QAAQ,EAG7B,OAAOC,EAAK,WAAW,CAAC,EAAE,QAAQH,CAA2B,CAC/D,CAAC,CACH,CAAC,EAED,SAAS,gBAAiB,IAAM,CAC9B,GAAG,uCAAwC,IAAM,CAE/C,MAAMI,EAAW,IAAI,eAAa,CAChC,KAAMH,EACN,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,CACzC,CAAC,EAGKI,EAASH,EAAQ,cAAcE,CAAQ,EAG7C,OAAOC,CAAM,EAAE,WACb,wBAAqB,CACnB,KAAM,CACJ,kBAAmB,WAAW,KAAK,CAAC,IAAM,IAAM,IAAM,GAAI,CAAC,CAC7D,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,2DAA4D,IAAM,CAEnE,MAAMD,EAAW,IAAI,eAAa,CAChC,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAM,IAAI,WAAW,CAAC,CACxB,CAAC,EAGKC,EAASH,EAAQ,cAAcE,CAAQ,EAG7C,UAAO,0BAAuBC,CAAM,CAAC,EAAE,KAAK,EAAK,CACnD,CAAC,EAED,GAAG,sDAAuD,IAAM,CAE9D,MAAMD,EAAW,IAAI,eAAa,CAChC,KAAMH,EAAgC,MAAM,EAAG,CAAC,EAChD,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,CACzC,CAAC,EAGKI,EAASH,EAAQ,cAAcE,CAAQ,KAGxC,0BAAuBC,CAAM,EAKhC,OAAO,KAAK,kDAAkD,EAJ9D,OAAOA,EAAO,KAAK,EAAE,QACnB,IAAI,yBAAuB,+BAA+B,CAC5D,CAIJ,CAAC,CACH,CAAC,CACH,CAAC",
|
|
6
6
|
"names": ["import_device_management_kit", "import_GetMasterFingerprintCommand", "GET_MASTER_FINGERPRINT_APDU", "GET_MASTER_FINGERPRINT_RESPONSE", "command", "apdu", "response", "result"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var s=Object.defineProperty;var
|
|
1
|
+
"use strict";var s=Object.defineProperty;var A=Object.getOwnPropertyDescriptor;var c=Object.getOwnPropertyNames;var u=Object.prototype.hasOwnProperty;var y=(r,e)=>{for(var a in e)s(r,a,{get:e[a],enumerable:!0})},C=(r,e,a,n)=>{if(e&&typeof e=="object"||typeof e=="function")for(let o of c(e))!u.call(r,o)&&o!==a&&s(r,o,{get:()=>e[o],enumerable:!(n=A(e,o))||n.enumerable});return r};var f=r=>C(s({},"__esModule",{value:!0}),r);var g={};y(g,{GetWalletAddressCommand:()=>R});module.exports=f(g);var t=require("@ledgerhq/device-management-kit"),m=require("@ledgerhq/signer-utils"),l=require("purify-ts"),p=require("../../app-binder/command/utils/constants"),i=require("../../utils/BtcCommandUtils"),d=require("./utils/bitcoinAppErrors");class R{constructor(e,a=new m.CommandErrorHelper(d.BTC_APP_ERRORS,d.BtcAppCommandErrorFactory,i.BtcCommandUtils.isSuccessResponse)){this.args=e;this._errorHelper=a}name="getWalletAddress";getApdu(){return new t.ApduBuilder({cla:225,ins:3,p1:0,p2:p.PROTOCOL_VERSION}).addBufferToData(Uint8Array.from([this.args.checkOnDevice?1:0])).addBufferToData(this.args.walletId).addBufferToData(this.args.walletHmac).addBufferToData(Uint8Array.from([this.args.change?1:0])).add32BitUIntToData(this.args.addressIndex).build()}parseResponse(e){return l.Maybe.fromNullable(this._errorHelper.getError(e)).orDefault((0,t.CommandResultFactory)({data:e}))}}0&&(module.exports={GetWalletAddressCommand});
|
|
2
2
|
//# sourceMappingURL=GetWalletAddressCommand.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/command/GetWalletAddressCommand.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n type Apdu,\n ApduBuilder,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n} from \"@ledgerhq/device-management-kit\";\nimport { CommandErrorHelper } from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport { PROTOCOL_VERSION } from \"@internal/app-binder/command/utils/constants\";\nimport { BtcCommandUtils } from \"@internal/utils/BtcCommandUtils\";\n\nimport {\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n type BtcErrorCodes,\n} from \"./utils/bitcoinAppErrors\";\n\nexport type GetWalletAddressCommandResponse = ApduResponse;\n\nexport type GetWalletAddressCommandArgs = {\n readonly checkOnDevice: boolean;\n readonly walletId: Uint8Array;\n readonly walletHmac: Uint8Array;\n readonly change: boolean;\n readonly addressIndex: number;\n};\n\nexport class GetWalletAddressCommand\n implements\n Command<\n GetWalletAddressCommandResponse,\n GetWalletAddressCommandArgs,\n BtcErrorCodes\n >\n{\n constructor(\n private readonly args: GetWalletAddressCommandArgs,\n private readonly _errorHelper = new CommandErrorHelper<\n GetWalletAddressCommandResponse,\n BtcErrorCodes\n >(\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n BtcCommandUtils.isSuccessResponse,\n ),\n ) {}\n\n getApdu(): Apdu {\n return new ApduBuilder({\n cla: 0xe1,\n ins: 0x03,\n p1: 0x00,\n p2: PROTOCOL_VERSION,\n })\n .addBufferToData(Uint8Array.from([this.args.checkOnDevice ? 1 : 0]))\n .addBufferToData(this.args.walletId)\n .addBufferToData(this.args.walletHmac)\n .addBufferToData(Uint8Array.from([this.args.change ? 1 : 0]))\n .add32BitUIntToData(this.args.addressIndex)\n .build();\n }\n\n parseResponse(\n response: ApduResponse,\n ): CommandResult<ApduResponse, BtcErrorCodes> {\n return Maybe.fromNullable(this._errorHelper.getError(response)).orDefault(\n CommandResultFactory({ data: response }),\n );\n }\n}\n"],
|
|
5
|
-
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,6BAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAOO,2CACPC,EAAmC,kCACnCC,EAAsB,qBAEtBC,EAAiC,wDACjCC,EAAgC,2CAEhCC,EAIO,oCAYA,MAAMP,CAOb,
|
|
4
|
+
"sourcesContent": ["import {\n type Apdu,\n ApduBuilder,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n} from \"@ledgerhq/device-management-kit\";\nimport { CommandErrorHelper } from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport { PROTOCOL_VERSION } from \"@internal/app-binder/command/utils/constants\";\nimport { BtcCommandUtils } from \"@internal/utils/BtcCommandUtils\";\n\nimport {\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n type BtcErrorCodes,\n} from \"./utils/bitcoinAppErrors\";\n\nexport type GetWalletAddressCommandResponse = ApduResponse;\n\nexport type GetWalletAddressCommandArgs = {\n readonly checkOnDevice: boolean;\n readonly walletId: Uint8Array;\n readonly walletHmac: Uint8Array;\n readonly change: boolean;\n readonly addressIndex: number;\n};\n\nexport class GetWalletAddressCommand\n implements\n Command<\n GetWalletAddressCommandResponse,\n GetWalletAddressCommandArgs,\n BtcErrorCodes\n >\n{\n readonly name = \"getWalletAddress\";\n constructor(\n private readonly args: GetWalletAddressCommandArgs,\n private readonly _errorHelper = new CommandErrorHelper<\n GetWalletAddressCommandResponse,\n BtcErrorCodes\n >(\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n BtcCommandUtils.isSuccessResponse,\n ),\n ) {}\n\n getApdu(): Apdu {\n return new ApduBuilder({\n cla: 0xe1,\n ins: 0x03,\n p1: 0x00,\n p2: PROTOCOL_VERSION,\n })\n .addBufferToData(Uint8Array.from([this.args.checkOnDevice ? 1 : 0]))\n .addBufferToData(this.args.walletId)\n .addBufferToData(this.args.walletHmac)\n .addBufferToData(Uint8Array.from([this.args.change ? 1 : 0]))\n .add32BitUIntToData(this.args.addressIndex)\n .build();\n }\n\n parseResponse(\n response: ApduResponse,\n ): CommandResult<ApduResponse, BtcErrorCodes> {\n return Maybe.fromNullable(this._errorHelper.getError(response)).orDefault(\n CommandResultFactory({ data: response }),\n );\n }\n}\n"],
|
|
5
|
+
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,6BAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAOO,2CACPC,EAAmC,kCACnCC,EAAsB,qBAEtBC,EAAiC,wDACjCC,EAAgC,2CAEhCC,EAIO,oCAYA,MAAMP,CAOb,CAEE,YACmBQ,EACAC,EAAe,IAAI,qBAIlC,iBACA,4BACA,kBAAgB,iBAClB,EACA,CATiB,UAAAD,EACA,kBAAAC,CAQhB,CAXM,KAAO,mBAahB,SAAgB,CACd,OAAO,IAAI,cAAY,CACrB,IAAK,IACL,IAAK,EACL,GAAI,EACJ,GAAI,kBACN,CAAC,EACE,gBAAgB,WAAW,KAAK,CAAC,KAAK,KAAK,cAAgB,EAAI,CAAC,CAAC,CAAC,EAClE,gBAAgB,KAAK,KAAK,QAAQ,EAClC,gBAAgB,KAAK,KAAK,UAAU,EACpC,gBAAgB,WAAW,KAAK,CAAC,KAAK,KAAK,OAAS,EAAI,CAAC,CAAC,CAAC,EAC3D,mBAAmB,KAAK,KAAK,YAAY,EACzC,MAAM,CACX,CAEA,cACEC,EAC4C,CAC5C,OAAO,QAAM,aAAa,KAAK,aAAa,SAASA,CAAQ,CAAC,EAAE,aAC9D,wBAAqB,CAAE,KAAMA,CAAS,CAAC,CACzC,CACF,CACF",
|
|
6
6
|
"names": ["GetWalletAddressCommand_exports", "__export", "GetWalletAddressCommand", "__toCommonJS", "import_device_management_kit", "import_signer_utils", "import_purify_ts", "import_constants", "import_BtcCommandUtils", "import_bitcoinAppErrors", "args", "_errorHelper", "response"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var r=require("@ledgerhq/device-management-kit"),d=require("./utils/constants"),n=require("./GetWalletAddressCommand");const l=new Uint8Array([144,0]),A=new Uint8Array([105,133]);describe("GetWalletAddressCommand",()=>{let o;const c={checkOnDevice:!0,walletId:Uint8Array.from("walletIdBuffer",e=>e.charCodeAt(0)),walletHmac:Uint8Array.from("walletHmacBuffer",e=>e.charCodeAt(0)),change:!1,addressIndex:0};beforeEach(()=>{o=new n.GetWalletAddressCommand(c),vi.clearAllMocks(),vi.importActual("@ledgerhq/device-management-kit")}),describe("getApdu",()=>{it("should return correct APDU for default arguments",()=>{const e=o.getApdu(),t=Uint8Array.from([225,3,0,1,36,1,...Uint8Array.from("walletIdBuffer",a=>a.charCodeAt(0)),...Uint8Array.from("walletHmacBuffer",a=>a.charCodeAt(0)),0,0,0,0,0]);expect(e.getRawApdu()).toEqual(t)}),it("should return correct APDU for different arguments",()=>{const e={checkOnDevice:!1,walletId:Uint8Array.from("anotherWalletId",s=>s.charCodeAt(0)),walletHmac:Uint8Array.from("anotherWalletHmac",s=>s.charCodeAt(0)),change:!0,addressIndex:5};o=new n.GetWalletAddressCommand(e);const t=o.getApdu(),a=Uint8Array.from([225,3,0,1,38,0,...Uint8Array.from("anotherWalletId",s=>s.charCodeAt(0)),...Uint8Array.from("anotherWalletHmac",s=>s.charCodeAt(0)),1,0,0,0,5]);expect(t.getRawApdu()).toEqual(a)})}),describe("parseResponse",()=>{it("should return the APDU response if it's a continue response",()=>{const e=new Uint8Array([1,2,3,4]),t=new r.ApduResponse({statusCode:d.SW_INTERRUPTED_EXECUTION,data:e}),a=o.parseResponse(t);expect(a).toStrictEqual((0,r.CommandResultFactory)({data:t}))}),it("should return an error if user denied the operation",()=>{const e=new r.ApduResponse({statusCode:A,data:new Uint8Array([])}),t=o.parseResponse(e);expect((0,r.isSuccessCommandResult)(t)).toBe(!1),(0,r.isSuccessCommandResult)(t)||expect(t.error).toBeDefined()}),it("should return correct data when response is not empty",()=>{const e=Uint8Array.from("addressData",s=>s.charCodeAt(0)),t=new r.ApduResponse({statusCode:l,data:e}),a=o.parseResponse(t);expect(a).toStrictEqual((0,r.CommandResultFactory)({data:t}))})})});
|
|
1
|
+
"use strict";var r=require("@ledgerhq/device-management-kit"),d=require("./utils/constants"),n=require("./GetWalletAddressCommand");const l=new Uint8Array([144,0]),A=new Uint8Array([105,133]);describe("GetWalletAddressCommand",()=>{let o;const c={checkOnDevice:!0,walletId:Uint8Array.from("walletIdBuffer",e=>e.charCodeAt(0)),walletHmac:Uint8Array.from("walletHmacBuffer",e=>e.charCodeAt(0)),change:!1,addressIndex:0};beforeEach(()=>{o=new n.GetWalletAddressCommand(c),vi.clearAllMocks(),vi.importActual("@ledgerhq/device-management-kit")}),describe("name",()=>{it("should be 'getWalletAddress'",()=>{expect(o.name).toBe("getWalletAddress")})}),describe("getApdu",()=>{it("should return correct APDU for default arguments",()=>{const e=o.getApdu(),t=Uint8Array.from([225,3,0,1,36,1,...Uint8Array.from("walletIdBuffer",a=>a.charCodeAt(0)),...Uint8Array.from("walletHmacBuffer",a=>a.charCodeAt(0)),0,0,0,0,0]);expect(e.getRawApdu()).toEqual(t)}),it("should return correct APDU for different arguments",()=>{const e={checkOnDevice:!1,walletId:Uint8Array.from("anotherWalletId",s=>s.charCodeAt(0)),walletHmac:Uint8Array.from("anotherWalletHmac",s=>s.charCodeAt(0)),change:!0,addressIndex:5};o=new n.GetWalletAddressCommand(e);const t=o.getApdu(),a=Uint8Array.from([225,3,0,1,38,0,...Uint8Array.from("anotherWalletId",s=>s.charCodeAt(0)),...Uint8Array.from("anotherWalletHmac",s=>s.charCodeAt(0)),1,0,0,0,5]);expect(t.getRawApdu()).toEqual(a)})}),describe("parseResponse",()=>{it("should return the APDU response if it's a continue response",()=>{const e=new Uint8Array([1,2,3,4]),t=new r.ApduResponse({statusCode:d.SW_INTERRUPTED_EXECUTION,data:e}),a=o.parseResponse(t);expect(a).toStrictEqual((0,r.CommandResultFactory)({data:t}))}),it("should return an error if user denied the operation",()=>{const e=new r.ApduResponse({statusCode:A,data:new Uint8Array([])}),t=o.parseResponse(e);expect((0,r.isSuccessCommandResult)(t)).toBe(!1),(0,r.isSuccessCommandResult)(t)||expect(t.error).toBeDefined()}),it("should return correct data when response is not empty",()=>{const e=Uint8Array.from("addressData",s=>s.charCodeAt(0)),t=new r.ApduResponse({statusCode:l,data:e}),a=o.parseResponse(t);expect(a).toStrictEqual((0,r.CommandResultFactory)({data:t}))})})});
|
|
2
2
|
//# sourceMappingURL=GetWalletAddressCommand.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/command/GetWalletAddressCommand.test.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { SW_INTERRUPTED_EXECUTION } from \"./utils/constants\";\nimport {\n GetWalletAddressCommand,\n type GetWalletAddressCommandArgs,\n} from \"./GetWalletAddressCommand\";\n\nconst SUCCESS_STATUS = new Uint8Array([0x90, 0x00]);\nconst USER_DENIED_STATUS = new Uint8Array([0x69, 0x85]);\n\ndescribe(\"GetWalletAddressCommand\", () => {\n let command: GetWalletAddressCommand;\n const defaultArgs: GetWalletAddressCommandArgs = {\n checkOnDevice: true,\n walletId: Uint8Array.from(\"walletIdBuffer\", (c) => c.charCodeAt(0)),\n walletHmac: Uint8Array.from(\"walletHmacBuffer\", (c) => c.charCodeAt(0)),\n change: false,\n addressIndex: 0x00000000,\n };\n\n beforeEach(() => {\n command = new GetWalletAddressCommand(defaultArgs);\n vi.clearAllMocks();\n vi.importActual(\"@ledgerhq/device-management-kit\");\n });\n\n describe(\"getApdu\", () => {\n it(\"should return correct APDU for default arguments\", () => {\n const apdu = command.getApdu();\n const expectedApdu = Uint8Array.from([\n 0xe1, // CLA\n 0x03, // INS\n 0x00, // P1\n 0x01, // P2\n 0x24, // Length of data: 36 bytes\n 0x01, // checkOnDevice: true\n ...Uint8Array.from(\"walletIdBuffer\", (c) => c.charCodeAt(0)),\n ...Uint8Array.from(\"walletHmacBuffer\", (c) => c.charCodeAt(0)),\n 0x00, // change: false\n 0x00,\n 0x00,\n 0x00,\n 0x00, // addressIndex: 0x00000000\n ]);\n expect(apdu.getRawApdu()).toEqual(expectedApdu);\n });\n\n it(\"should return correct APDU for different arguments\", () => {\n const args: GetWalletAddressCommandArgs = {\n checkOnDevice: false,\n walletId: Uint8Array.from(\"anotherWalletId\", (c) => c.charCodeAt(0)),\n walletHmac: Uint8Array.from(\"anotherWalletHmac\", (c) =>\n c.charCodeAt(0),\n ),\n change: true,\n addressIndex: 0x00000005,\n };\n command = new GetWalletAddressCommand(args);\n const apdu = command.getApdu();\n const expectedApdu = Uint8Array.from([\n 0xe1, // CLA\n 0x03, // INS\n 0x00, // P1\n 0x01, // P2\n 0x26, // Length of data\n 0x00, // checkOnDevice: false\n ...Uint8Array.from(\"anotherWalletId\", (c) => c.charCodeAt(0)),\n ...Uint8Array.from(\"anotherWalletHmac\", (c) => c.charCodeAt(0)),\n 0x01, // change: true\n 0x00,\n 0x00,\n 0x00,\n 0x05, // addressIndex: 0x00000005\n ]);\n expect(apdu.getRawApdu()).toEqual(expectedApdu);\n });\n });\n\n describe(\"parseResponse\", () => {\n it(\"should return the APDU response if it's a continue response\", () => {\n // given\n const continueResponseData = new Uint8Array([0x01, 0x02, 0x03, 0x04]);\n\n const apduResponse = new ApduResponse({\n statusCode: SW_INTERRUPTED_EXECUTION,\n data: continueResponseData,\n });\n\n // when\n const response = command.parseResponse(apduResponse);\n\n // then\n expect(response).toStrictEqual(\n CommandResultFactory({\n data: apduResponse,\n }),\n );\n });\n\n it(\"should return an error if user denied the operation\", () => {\n // given\n const apduResponse = new ApduResponse({\n statusCode: USER_DENIED_STATUS,\n data: new Uint8Array([]),\n });\n\n // when\n const response = command.parseResponse(apduResponse);\n\n // then\n expect(isSuccessCommandResult(response)).toBe(false);\n if (!isSuccessCommandResult(response)) {\n expect(response.error).toBeDefined();\n }\n });\n\n it(\"should return correct data when response is not empty\", () => {\n // given\n const responseData = Uint8Array.from(\"addressData\", (c) =>\n c.charCodeAt(0),\n );\n\n const apduResponse = new ApduResponse({\n statusCode: SUCCESS_STATUS,\n data: responseData,\n });\n\n // when\n const response = command.parseResponse(apduResponse);\n\n // then\n expect(response).toStrictEqual(\n CommandResultFactory({ data: apduResponse }),\n );\n });\n });\n});\n"],
|
|
5
|
-
"mappings": "aAAA,IAAAA,EAIO,2CAEPC,EAAyC,6BACzCC,EAGO,qCAEP,MAAMC,EAAiB,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,EAC5CC,EAAqB,IAAI,WAAW,CAAC,IAAM,GAAI,CAAC,EAEtD,SAAS,0BAA2B,IAAM,CACxC,IAAIC,EACJ,MAAMC,EAA2C,CAC/C,cAAe,GACf,SAAU,WAAW,KAAK,iBAAmBC,GAAMA,EAAE,WAAW,CAAC,CAAC,EAClE,WAAY,WAAW,KAAK,mBAAqBA,GAAMA,EAAE,WAAW,CAAC,CAAC,EACtE,OAAQ,GACR,aAAc,CAChB,EAEA,WAAW,IAAM,CACfF,EAAU,IAAI,0BAAwBC,CAAW,EACjD,GAAG,cAAc,EACjB,GAAG,aAAa,iCAAiC,CACnD,CAAC,EAED,SAAS,UAAW,IAAM,CACxB,GAAG,mDAAoD,IAAM,CAC3D,
|
|
4
|
+
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { SW_INTERRUPTED_EXECUTION } from \"./utils/constants\";\nimport {\n GetWalletAddressCommand,\n type GetWalletAddressCommandArgs,\n} from \"./GetWalletAddressCommand\";\n\nconst SUCCESS_STATUS = new Uint8Array([0x90, 0x00]);\nconst USER_DENIED_STATUS = new Uint8Array([0x69, 0x85]);\n\ndescribe(\"GetWalletAddressCommand\", () => {\n let command: GetWalletAddressCommand;\n const defaultArgs: GetWalletAddressCommandArgs = {\n checkOnDevice: true,\n walletId: Uint8Array.from(\"walletIdBuffer\", (c) => c.charCodeAt(0)),\n walletHmac: Uint8Array.from(\"walletHmacBuffer\", (c) => c.charCodeAt(0)),\n change: false,\n addressIndex: 0x00000000,\n };\n\n beforeEach(() => {\n command = new GetWalletAddressCommand(defaultArgs);\n vi.clearAllMocks();\n vi.importActual(\"@ledgerhq/device-management-kit\");\n });\n\n describe(\"name\", () => {\n it(\"should be 'getWalletAddress'\", () => {\n expect(command.name).toBe(\"getWalletAddress\");\n });\n });\n\n describe(\"getApdu\", () => {\n it(\"should return correct APDU for default arguments\", () => {\n const apdu = command.getApdu();\n const expectedApdu = Uint8Array.from([\n 0xe1, // CLA\n 0x03, // INS\n 0x00, // P1\n 0x01, // P2\n 0x24, // Length of data: 36 bytes\n 0x01, // checkOnDevice: true\n ...Uint8Array.from(\"walletIdBuffer\", (c) => c.charCodeAt(0)),\n ...Uint8Array.from(\"walletHmacBuffer\", (c) => c.charCodeAt(0)),\n 0x00, // change: false\n 0x00,\n 0x00,\n 0x00,\n 0x00, // addressIndex: 0x00000000\n ]);\n expect(apdu.getRawApdu()).toEqual(expectedApdu);\n });\n\n it(\"should return correct APDU for different arguments\", () => {\n const args: GetWalletAddressCommandArgs = {\n checkOnDevice: false,\n walletId: Uint8Array.from(\"anotherWalletId\", (c) => c.charCodeAt(0)),\n walletHmac: Uint8Array.from(\"anotherWalletHmac\", (c) =>\n c.charCodeAt(0),\n ),\n change: true,\n addressIndex: 0x00000005,\n };\n command = new GetWalletAddressCommand(args);\n const apdu = command.getApdu();\n const expectedApdu = Uint8Array.from([\n 0xe1, // CLA\n 0x03, // INS\n 0x00, // P1\n 0x01, // P2\n 0x26, // Length of data\n 0x00, // checkOnDevice: false\n ...Uint8Array.from(\"anotherWalletId\", (c) => c.charCodeAt(0)),\n ...Uint8Array.from(\"anotherWalletHmac\", (c) => c.charCodeAt(0)),\n 0x01, // change: true\n 0x00,\n 0x00,\n 0x00,\n 0x05, // addressIndex: 0x00000005\n ]);\n expect(apdu.getRawApdu()).toEqual(expectedApdu);\n });\n });\n\n describe(\"parseResponse\", () => {\n it(\"should return the APDU response if it's a continue response\", () => {\n // given\n const continueResponseData = new Uint8Array([0x01, 0x02, 0x03, 0x04]);\n\n const apduResponse = new ApduResponse({\n statusCode: SW_INTERRUPTED_EXECUTION,\n data: continueResponseData,\n });\n\n // when\n const response = command.parseResponse(apduResponse);\n\n // then\n expect(response).toStrictEqual(\n CommandResultFactory({\n data: apduResponse,\n }),\n );\n });\n\n it(\"should return an error if user denied the operation\", () => {\n // given\n const apduResponse = new ApduResponse({\n statusCode: USER_DENIED_STATUS,\n data: new Uint8Array([]),\n });\n\n // when\n const response = command.parseResponse(apduResponse);\n\n // then\n expect(isSuccessCommandResult(response)).toBe(false);\n if (!isSuccessCommandResult(response)) {\n expect(response.error).toBeDefined();\n }\n });\n\n it(\"should return correct data when response is not empty\", () => {\n // given\n const responseData = Uint8Array.from(\"addressData\", (c) =>\n c.charCodeAt(0),\n );\n\n const apduResponse = new ApduResponse({\n statusCode: SUCCESS_STATUS,\n data: responseData,\n });\n\n // when\n const response = command.parseResponse(apduResponse);\n\n // then\n expect(response).toStrictEqual(\n CommandResultFactory({ data: apduResponse }),\n );\n });\n });\n});\n"],
|
|
5
|
+
"mappings": "aAAA,IAAAA,EAIO,2CAEPC,EAAyC,6BACzCC,EAGO,qCAEP,MAAMC,EAAiB,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,EAC5CC,EAAqB,IAAI,WAAW,CAAC,IAAM,GAAI,CAAC,EAEtD,SAAS,0BAA2B,IAAM,CACxC,IAAIC,EACJ,MAAMC,EAA2C,CAC/C,cAAe,GACf,SAAU,WAAW,KAAK,iBAAmBC,GAAMA,EAAE,WAAW,CAAC,CAAC,EAClE,WAAY,WAAW,KAAK,mBAAqBA,GAAMA,EAAE,WAAW,CAAC,CAAC,EACtE,OAAQ,GACR,aAAc,CAChB,EAEA,WAAW,IAAM,CACfF,EAAU,IAAI,0BAAwBC,CAAW,EACjD,GAAG,cAAc,EACjB,GAAG,aAAa,iCAAiC,CACnD,CAAC,EAED,SAAS,OAAQ,IAAM,CACrB,GAAG,+BAAgC,IAAM,CACvC,OAAOD,EAAQ,IAAI,EAAE,KAAK,kBAAkB,CAC9C,CAAC,CACH,CAAC,EAED,SAAS,UAAW,IAAM,CACxB,GAAG,mDAAoD,IAAM,CAC3D,MAAMG,EAAOH,EAAQ,QAAQ,EACvBI,EAAe,WAAW,KAAK,CACnC,IACA,EACA,EACA,EACA,GACA,EACA,GAAG,WAAW,KAAK,iBAAmBF,GAAMA,EAAE,WAAW,CAAC,CAAC,EAC3D,GAAG,WAAW,KAAK,mBAAqBA,GAAMA,EAAE,WAAW,CAAC,CAAC,EAC7D,EACA,EACA,EACA,EACA,CACF,CAAC,EACD,OAAOC,EAAK,WAAW,CAAC,EAAE,QAAQC,CAAY,CAChD,CAAC,EAED,GAAG,qDAAsD,IAAM,CAC7D,MAAMC,EAAoC,CACxC,cAAe,GACf,SAAU,WAAW,KAAK,kBAAoBH,GAAMA,EAAE,WAAW,CAAC,CAAC,EACnE,WAAY,WAAW,KAAK,oBAAsBA,GAChDA,EAAE,WAAW,CAAC,CAChB,EACA,OAAQ,GACR,aAAc,CAChB,EACAF,EAAU,IAAI,0BAAwBK,CAAI,EAC1C,MAAMF,EAAOH,EAAQ,QAAQ,EACvBI,EAAe,WAAW,KAAK,CACnC,IACA,EACA,EACA,EACA,GACA,EACA,GAAG,WAAW,KAAK,kBAAoBF,GAAMA,EAAE,WAAW,CAAC,CAAC,EAC5D,GAAG,WAAW,KAAK,oBAAsBA,GAAMA,EAAE,WAAW,CAAC,CAAC,EAC9D,EACA,EACA,EACA,EACA,CACF,CAAC,EACD,OAAOC,EAAK,WAAW,CAAC,EAAE,QAAQC,CAAY,CAChD,CAAC,CACH,CAAC,EAED,SAAS,gBAAiB,IAAM,CAC9B,GAAG,8DAA+D,IAAM,CAEtE,MAAME,EAAuB,IAAI,WAAW,CAAC,EAAM,EAAM,EAAM,CAAI,CAAC,EAE9DC,EAAe,IAAI,eAAa,CACpC,WAAY,2BACZ,KAAMD,CACR,CAAC,EAGKE,EAAWR,EAAQ,cAAcO,CAAY,EAGnD,OAAOC,CAAQ,EAAE,iBACf,wBAAqB,CACnB,KAAMD,CACR,CAAC,CACH,CACF,CAAC,EAED,GAAG,sDAAuD,IAAM,CAE9D,MAAMA,EAAe,IAAI,eAAa,CACpC,WAAYR,EACZ,KAAM,IAAI,WAAW,CAAC,CAAC,CACzB,CAAC,EAGKS,EAAWR,EAAQ,cAAcO,CAAY,EAGnD,UAAO,0BAAuBC,CAAQ,CAAC,EAAE,KAAK,EAAK,KAC9C,0BAAuBA,CAAQ,GAClC,OAAOA,EAAS,KAAK,EAAE,YAAY,CAEvC,CAAC,EAED,GAAG,wDAAyD,IAAM,CAEhE,MAAMC,EAAe,WAAW,KAAK,cAAgBP,GACnDA,EAAE,WAAW,CAAC,CAChB,EAEMK,EAAe,IAAI,eAAa,CACpC,WAAYT,EACZ,KAAMW,CACR,CAAC,EAGKD,EAAWR,EAAQ,cAAcO,CAAY,EAGnD,OAAOC,CAAQ,EAAE,iBACf,wBAAqB,CAAE,KAAMD,CAAa,CAAC,CAC7C,CACF,CAAC,CACH,CAAC,CACH,CAAC",
|
|
6
6
|
"names": ["import_device_management_kit", "import_constants", "import_GetWalletAddressCommand", "SUCCESS_STATUS", "USER_DENIED_STATUS", "command", "defaultArgs", "c", "apdu", "expectedApdu", "args", "continueResponseData", "apduResponse", "response", "responseData"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var l=Object.defineProperty;var R=Object.getOwnPropertyDescriptor;var
|
|
1
|
+
"use strict";var l=Object.defineProperty;var R=Object.getOwnPropertyDescriptor;var A=Object.getOwnPropertyNames;var C=Object.prototype.hasOwnProperty;var u=(s,e)=>{for(var r in e)l(s,r,{get:e[r],enumerable:!0})},y=(s,e,r,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let o of A(e))!C.call(s,o)&&o!==r&&l(s,o,{get:()=>e[o],enumerable:!(a=R(e,o))||a.enumerable});return s};var g=s=>y(l({},"__esModule",{value:!0}),s);var B={};u(B,{RegisterWalletAddressCommand:()=>E});module.exports=g(B);var t=require("@ledgerhq/device-management-kit"),n=require("@ledgerhq/signer-utils"),p=require("purify-ts"),d=require("../../app-binder/command/utils/bitcoinAppErrors"),i=require("../../app-binder/command/utils/constants"),c=require("../../utils/BtcCommandUtils");const m=32;class E{constructor(e,r=new n.CommandErrorHelper(d.BTC_APP_ERRORS,d.BtcAppCommandErrorFactory,c.BtcCommandUtils.isSuccessResponse)){this._args=e;this._errorHelper=r}name="registerWalletAddress";getApdu(){const e=new t.ApduBuilder({cla:225,ins:2,p1:0,p2:i.PROTOCOL_VERSION}),{walletPolicy:r}=this._args;return e.addBufferToData(r).build()}parseResponse(e){return p.Maybe.fromNullable(this._errorHelper.getError(e)).orDefaultLazy(()=>{const r=new t.ApduParser(e),a=r.extractFieldByLength(m),o=r.extractFieldByLength(m);return!a||!o?(0,t.CommandResultFactory)({error:new t.InvalidStatusWordError("Data mismatch")}):(0,t.CommandResultFactory)({data:{walletId:a,walletHmac:o}})})}}0&&(module.exports={RegisterWalletAddressCommand});
|
|
2
2
|
//# sourceMappingURL=RegisterWalletAddressCommand.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/command/RegisterWalletAddressCommand.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n ApduBuilder,\n ApduParser,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\nimport { CommandErrorHelper } from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport {\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n type BtcErrorCodes,\n} from \"@internal/app-binder/command/utils/bitcoinAppErrors\";\nimport { PROTOCOL_VERSION } from \"@internal/app-binder/command/utils/constants\";\nimport { BtcCommandUtils } from \"@internal/utils/BtcCommandUtils\";\n\nexport type RegisterWalletAddressCommandArgs = {\n walletPolicy: Uint8Array;\n};\n\ntype RegisterWalletAddressCommandResponse = {\n walletId: Uint8Array;\n walletHmac: Uint8Array;\n};\n\nconst RESPONSE_BUFFER_LENGTH = 32;\n\nexport class RegisterWalletAddressCommand\n implements\n Command<\n RegisterWalletAddressCommandResponse,\n RegisterWalletAddressCommandArgs,\n BtcErrorCodes\n >\n{\n constructor(\n private readonly _args: RegisterWalletAddressCommandArgs,\n private readonly _errorHelper = new CommandErrorHelper<\n RegisterWalletAddressCommandResponse,\n BtcErrorCodes\n >(\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n BtcCommandUtils.isSuccessResponse,\n ),\n ) {}\n\n getApdu() {\n const builder = new ApduBuilder({\n cla: 0xe1,\n ins: 0x02,\n p1: 0x00,\n p2: PROTOCOL_VERSION,\n });\n const { walletPolicy } = this._args;\n\n return builder.addBufferToData(walletPolicy).build();\n }\n parseResponse(\n response: ApduResponse,\n ): CommandResult<RegisterWalletAddressCommandResponse, BtcErrorCodes> {\n return Maybe.fromNullable(\n this._errorHelper.getError(response),\n ).orDefaultLazy(() => {\n const parser = new ApduParser(response);\n\n const walletId = parser.extractFieldByLength(RESPONSE_BUFFER_LENGTH);\n const walletHmac = parser.extractFieldByLength(RESPONSE_BUFFER_LENGTH);\n if (!walletId || !walletHmac) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\"Data mismatch\"),\n });\n }\n return CommandResultFactory({\n data: {\n walletId,\n walletHmac,\n },\n });\n });\n }\n}\n"],
|
|
5
|
-
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,kCAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAQO,2CACPC,EAAmC,kCACnCC,EAAsB,qBAEtBC,EAIO,+DACPC,EAAiC,wDACjCC,EAAgC,2CAWhC,MAAMC,EAAyB,GAExB,MAAMR,CAOb,
|
|
4
|
+
"sourcesContent": ["import {\n ApduBuilder,\n ApduParser,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\nimport { CommandErrorHelper } from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport {\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n type BtcErrorCodes,\n} from \"@internal/app-binder/command/utils/bitcoinAppErrors\";\nimport { PROTOCOL_VERSION } from \"@internal/app-binder/command/utils/constants\";\nimport { BtcCommandUtils } from \"@internal/utils/BtcCommandUtils\";\n\nexport type RegisterWalletAddressCommandArgs = {\n walletPolicy: Uint8Array;\n};\n\ntype RegisterWalletAddressCommandResponse = {\n walletId: Uint8Array;\n walletHmac: Uint8Array;\n};\n\nconst RESPONSE_BUFFER_LENGTH = 32;\n\nexport class RegisterWalletAddressCommand\n implements\n Command<\n RegisterWalletAddressCommandResponse,\n RegisterWalletAddressCommandArgs,\n BtcErrorCodes\n >\n{\n readonly name = \"registerWalletAddress\";\n constructor(\n private readonly _args: RegisterWalletAddressCommandArgs,\n private readonly _errorHelper = new CommandErrorHelper<\n RegisterWalletAddressCommandResponse,\n BtcErrorCodes\n >(\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n BtcCommandUtils.isSuccessResponse,\n ),\n ) {}\n\n getApdu() {\n const builder = new ApduBuilder({\n cla: 0xe1,\n ins: 0x02,\n p1: 0x00,\n p2: PROTOCOL_VERSION,\n });\n const { walletPolicy } = this._args;\n\n return builder.addBufferToData(walletPolicy).build();\n }\n parseResponse(\n response: ApduResponse,\n ): CommandResult<RegisterWalletAddressCommandResponse, BtcErrorCodes> {\n return Maybe.fromNullable(\n this._errorHelper.getError(response),\n ).orDefaultLazy(() => {\n const parser = new ApduParser(response);\n\n const walletId = parser.extractFieldByLength(RESPONSE_BUFFER_LENGTH);\n const walletHmac = parser.extractFieldByLength(RESPONSE_BUFFER_LENGTH);\n if (!walletId || !walletHmac) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\"Data mismatch\"),\n });\n }\n return CommandResultFactory({\n data: {\n walletId,\n walletHmac,\n },\n });\n });\n }\n}\n"],
|
|
5
|
+
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,kCAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAQO,2CACPC,EAAmC,kCACnCC,EAAsB,qBAEtBC,EAIO,+DACPC,EAAiC,wDACjCC,EAAgC,2CAWhC,MAAMC,EAAyB,GAExB,MAAMR,CAOb,CAEE,YACmBS,EACAC,EAAe,IAAI,qBAIlC,iBACA,4BACA,kBAAgB,iBAClB,EACA,CATiB,WAAAD,EACA,kBAAAC,CAQhB,CAXM,KAAO,wBAahB,SAAU,CACR,MAAMC,EAAU,IAAI,cAAY,CAC9B,IAAK,IACL,IAAK,EACL,GAAI,EACJ,GAAI,kBACN,CAAC,EACK,CAAE,aAAAC,CAAa,EAAI,KAAK,MAE9B,OAAOD,EAAQ,gBAAgBC,CAAY,EAAE,MAAM,CACrD,CACA,cACEC,EACoE,CACpE,OAAO,QAAM,aACX,KAAK,aAAa,SAASA,CAAQ,CACrC,EAAE,cAAc,IAAM,CACpB,MAAMC,EAAS,IAAI,aAAWD,CAAQ,EAEhCE,EAAWD,EAAO,qBAAqBN,CAAsB,EAC7DQ,EAAaF,EAAO,qBAAqBN,CAAsB,EACrE,MAAI,CAACO,GAAY,CAACC,KACT,wBAAqB,CAC1B,MAAO,IAAI,yBAAuB,eAAe,CACnD,CAAC,KAEI,wBAAqB,CAC1B,KAAM,CACJ,SAAAD,EACA,WAAAC,CACF,CACF,CAAC,CACH,CAAC,CACH,CACF",
|
|
6
6
|
"names": ["RegisterWalletAddressCommand_exports", "__export", "RegisterWalletAddressCommand", "__toCommonJS", "import_device_management_kit", "import_signer_utils", "import_purify_ts", "import_bitcoinAppErrors", "import_constants", "import_BtcCommandUtils", "RESPONSE_BUFFER_LENGTH", "_args", "_errorHelper", "builder", "walletPolicy", "response", "parser", "walletId", "walletHmac"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var x=require("@ledgerhq/device-management-kit"),
|
|
1
|
+
"use strict";var x=require("@ledgerhq/device-management-kit"),t=require("../../app-binder/command/RegisterWalletAddressCommand");const c=Uint8Array.from([124,103,232,79,153,116,70,113,20,147,239,139,116,112,177,15,96,75,2,210,88,79,160,68,111,206,247,217,137,131,227,220]),n=2,d=Uint8Array.from([75,197,70,127,36,147,133,178,158,91,142,201,251,36,204,101,163,113,11,26,38,210,141,233,245,196,243,244,93,214,84,193]),l=Uint8Array.from([2,12,67,111,108,100,32,115,116,111,114,97,103,101,30]),i=2,s=Uint8Array.from([i].concat(...l).concat(...c).concat([n]).concat(...d)),f=Uint8Array.from([225,2,0,1,81].concat(...s)),o=Uint8Array.from([29,21,14,212,37,168,113,165,202,126,44,85,219,27,50,149,193,253,151,20,127,208,167,177,136,212,50,127,75,167,64,42,250,115,227,97,25,50,79,190,76,193,202,148,170,132,44,98,97,82,109,68,17,42,34,22,75,197,124,51,53,16,43,4]);describe("RegisterWalletAddressCommand",()=>{describe("name",()=>{it("should be 'registerWalletAddress'",()=>{const e=new t.RegisterWalletAddressCommand({walletPolicy:s});expect(e.name).toBe("registerWalletAddress")})}),describe("getApdu",()=>{it("should send the correct APDU",()=>{const e=new t.RegisterWalletAddressCommand({walletPolicy:s});expect(e.getApdu().getRawApdu()).toEqual(f)})}),describe("parseResponse",()=>{it("should parse the response correctly",()=>{const e=new t.RegisterWalletAddressCommand({walletPolicy:s}),r=new x.ApduResponse({statusCode:new Uint8Array([144,0]),data:o});expect(e.parseResponse(r)).toEqual((0,x.CommandResultFactory)({data:{walletId:o.slice(0,32),walletHmac:o.slice(32)}}))}),it("should return an error if the response is not successful",()=>{const e=new t.RegisterWalletAddressCommand({walletPolicy:s}),r=new x.ApduResponse({statusCode:Uint8Array.from([109,0]),data:new Uint8Array(0)}),a=e.parseResponse(r);expect((0,x.isSuccessCommandResult)(a)).toBe(!1)}),it("should return an error if the response is too short",()=>{const e=new t.RegisterWalletAddressCommand({walletPolicy:s}),r=new x.ApduResponse({data:o.slice(0,2),statusCode:new Uint8Array([144,0])}),a=e.parseResponse(r);(0,x.isSuccessCommandResult)(a)?assert.fail("Expected an error, but the result was successful"):expect(a.error).toEqual(new x.InvalidStatusWordError("Data mismatch"))})})});
|
|
2
2
|
//# sourceMappingURL=RegisterWalletAddressCommand.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/command/RegisterWalletAddressCommand.test.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n InvalidStatusWordError,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { RegisterWalletAddressCommand } from \"@internal/app-binder/command/RegisterWalletAddressCommand\";\n\nconst POLICY_HASH_DATA = Uint8Array.from([\n 0x7c, 0x67, 0xe8, 0x4f, 0x99, 0x74, 0x46, 0x71, 0x14, 0x93, 0xef, 0x8b, 0x74,\n 0x70, 0xb1, 0x0f, 0x60, 0x4b, 0x02, 0xd2, 0x58, 0x4f, 0xa0, 0x44, 0x6f, 0xce,\n 0xf7, 0xd9, 0x89, 0x83, 0xe3, 0xdc,\n]);\nconst KEYS_LENGTH = 0x02;\nconst KEYS_HASH_DATA = Uint8Array.from([\n 0x4b, 0xc5, 0x46, 0x7f, 0x24, 0x93, 0x85, 0xb2, 0x9e, 0x5b, 0x8e, 0xc9, 0xfb,\n 0x24, 0xcc, 0x65, 0xa3, 0x71, 0x0b, 0x1a, 0x26, 0xd2, 0x8d, 0xe9, 0xf5, 0xc4,\n 0xf3, 0xf4, 0x5d, 0xd6, 0x54, 0xc1,\n]);\nconst POLICY_NAME_DATA = Uint8Array.from([\n 0x02, 0x0c, 0x43, 0x6f, 0x6c, 0x64, 0x20, 0x73, 0x74, 0x6f, 0x72, 0x61, 0x67,\n 0x65, 0x1e,\n]);\nconst POLICY_VERSION = 0x02;\nconst WALLET_POLICY_DATA = Uint8Array.from(\n [POLICY_VERSION]\n .concat(...POLICY_NAME_DATA)\n .concat(...POLICY_HASH_DATA)\n .concat([KEYS_LENGTH])\n .concat(...KEYS_HASH_DATA),\n);\nconst EXPECTED_RAW_APDU = Uint8Array.from(\n [0xe1, 0x02, 0x00, 0x01, 0x51].concat(...WALLET_POLICY_DATA),\n);\nconst APDU_RESPONSE = Uint8Array.from([\n 0x1d, 0x15, 0x0e, 0xd4, 0x25, 0xa8, 0x71, 0xa5, 0xca, 0x7e, 0x2c, 0x55, 0xdb,\n 0x1b, 0x32, 0x95, 0xc1, 0xfd, 0x97, 0x14, 0x7f, 0xd0, 0xa7, 0xb1, 0x88, 0xd4,\n 0x32, 0x7f, 0x4b, 0xa7, 0x40, 0x2a, 0xfa, 0x73, 0xe3, 0x61, 0x19, 0x32, 0x4f,\n 0xbe, 0x4c, 0xc1, 0xca, 0x94, 0xaa, 0x84, 0x2c, 0x62, 0x61, 0x52, 0x6d, 0x44,\n 0x11, 0x2a, 0x22, 0x16, 0x4b, 0xc5, 0x7c, 0x33, 0x35, 0x10, 0x2b, 0x04,\n]);\n\ndescribe(\"RegisterWalletAddressCommand\", () => {\n describe(\"getApdu\", () => {\n it(\"should send the correct APDU\", () => {\n // when\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n\n // then\n expect(command.getApdu().getRawApdu()).toEqual(EXPECTED_RAW_APDU);\n });\n });\n describe(\"parseResponse\", () => {\n it(\"should parse the response correctly\", () => {\n // given\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n const response = new ApduResponse({\n statusCode: new Uint8Array([0x90, 0x00]),\n data: APDU_RESPONSE,\n });\n\n // then\n expect(command.parseResponse(response)).toEqual(\n CommandResultFactory({\n data: {\n walletId: APDU_RESPONSE.slice(0, 32),\n walletHmac: APDU_RESPONSE.slice(32),\n },\n }),\n );\n });\n\n it(\"should return an error if the response is not successful\", () => {\n // given\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n const response = new ApduResponse({\n statusCode: Uint8Array.from([0x6d, 0x00]),\n data: new Uint8Array(0),\n });\n\n // when\n const result = command.parseResponse(response);\n\n // then\n expect(isSuccessCommandResult(result)).toBe(false);\n });\n it(\"should return an error if the response is too short\", () => {\n // given\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n const response = new ApduResponse({\n data: APDU_RESPONSE.slice(0, 2),\n statusCode: new Uint8Array([0x90, 0x00]),\n });\n\n // when\n const result = command.parseResponse(response);\n\n // then\n if (!isSuccessCommandResult(result)) {\n expect(result.error).toEqual(\n new InvalidStatusWordError(\"Data mismatch\"),\n );\n } else {\n assert.fail(\"Expected an error, but the result was successful\");\n }\n });\n });\n});\n"],
|
|
5
|
-
"mappings": "aAAA,IAAAA,EAKO,2CAEPC,EAA6C,qEAE7C,MAAMC,EAAmB,WAAW,KAAK,CACvC,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IACxE,IAAM,IAAM,GAAM,GAAM,GAAM,EAAM,IAAM,GAAM,GAAM,IAAM,GAAM,IAAM,IACxE,IAAM,IAAM,IAAM,IAAM,IAAM,GAChC,CAAC,EACKC,EAAc,EACdC,EAAiB,WAAW,KAAK,CACrC,GAAM,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IACxE,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IACxE,IAAM,IAAM,GAAM,IAAM,GAAM,GAChC,CAAC,EACKC,EAAmB,WAAW,KAAK,CACvC,EAAM,GAAM,GAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IACxE,IAAM,EACR,CAAC,EACKC,EAAiB,EACjBC,EAAqB,WAAW,KACpC,CAACD,CAAc,EACZ,OAAO,GAAGD,CAAgB,EAC1B,OAAO,GAAGH,CAAgB,EAC1B,OAAO,CAACC,CAAW,CAAC,EACpB,OAAO,GAAGC,CAAc,CAC7B,EACMI,EAAoB,WAAW,KACnC,CAAC,IAAM,EAAM,EAAM,EAAM,EAAI,EAAE,OAAO,GAAGD,CAAkB,CAC7D,EACME,EAAgB,WAAW,KAAK,CACpC,GAAM,GAAM,GAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,GAAM,IACxE,GAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,IACxE,GAAM,IAAM,GAAM,IAAM,GAAM,GAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GACxE,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GAAM,IAAM,GACxE,GAAM,GAAM,GAAM,GAAM,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GAAM,CACpE,CAAC,EAED,SAAS,+BAAgC,IAAM,CAC7C,SAAS,UAAW,IAAM,CACxB,GAAG,+BAAgC,IAAM,CAEvC,
|
|
4
|
+
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n InvalidStatusWordError,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { RegisterWalletAddressCommand } from \"@internal/app-binder/command/RegisterWalletAddressCommand\";\n\nconst POLICY_HASH_DATA = Uint8Array.from([\n 0x7c, 0x67, 0xe8, 0x4f, 0x99, 0x74, 0x46, 0x71, 0x14, 0x93, 0xef, 0x8b, 0x74,\n 0x70, 0xb1, 0x0f, 0x60, 0x4b, 0x02, 0xd2, 0x58, 0x4f, 0xa0, 0x44, 0x6f, 0xce,\n 0xf7, 0xd9, 0x89, 0x83, 0xe3, 0xdc,\n]);\nconst KEYS_LENGTH = 0x02;\nconst KEYS_HASH_DATA = Uint8Array.from([\n 0x4b, 0xc5, 0x46, 0x7f, 0x24, 0x93, 0x85, 0xb2, 0x9e, 0x5b, 0x8e, 0xc9, 0xfb,\n 0x24, 0xcc, 0x65, 0xa3, 0x71, 0x0b, 0x1a, 0x26, 0xd2, 0x8d, 0xe9, 0xf5, 0xc4,\n 0xf3, 0xf4, 0x5d, 0xd6, 0x54, 0xc1,\n]);\nconst POLICY_NAME_DATA = Uint8Array.from([\n 0x02, 0x0c, 0x43, 0x6f, 0x6c, 0x64, 0x20, 0x73, 0x74, 0x6f, 0x72, 0x61, 0x67,\n 0x65, 0x1e,\n]);\nconst POLICY_VERSION = 0x02;\nconst WALLET_POLICY_DATA = Uint8Array.from(\n [POLICY_VERSION]\n .concat(...POLICY_NAME_DATA)\n .concat(...POLICY_HASH_DATA)\n .concat([KEYS_LENGTH])\n .concat(...KEYS_HASH_DATA),\n);\nconst EXPECTED_RAW_APDU = Uint8Array.from(\n [0xe1, 0x02, 0x00, 0x01, 0x51].concat(...WALLET_POLICY_DATA),\n);\nconst APDU_RESPONSE = Uint8Array.from([\n 0x1d, 0x15, 0x0e, 0xd4, 0x25, 0xa8, 0x71, 0xa5, 0xca, 0x7e, 0x2c, 0x55, 0xdb,\n 0x1b, 0x32, 0x95, 0xc1, 0xfd, 0x97, 0x14, 0x7f, 0xd0, 0xa7, 0xb1, 0x88, 0xd4,\n 0x32, 0x7f, 0x4b, 0xa7, 0x40, 0x2a, 0xfa, 0x73, 0xe3, 0x61, 0x19, 0x32, 0x4f,\n 0xbe, 0x4c, 0xc1, 0xca, 0x94, 0xaa, 0x84, 0x2c, 0x62, 0x61, 0x52, 0x6d, 0x44,\n 0x11, 0x2a, 0x22, 0x16, 0x4b, 0xc5, 0x7c, 0x33, 0x35, 0x10, 0x2b, 0x04,\n]);\n\ndescribe(\"RegisterWalletAddressCommand\", () => {\n describe(\"name\", () => {\n it(\"should be 'registerWalletAddress'\", () => {\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n expect(command.name).toBe(\"registerWalletAddress\");\n });\n });\n\n describe(\"getApdu\", () => {\n it(\"should send the correct APDU\", () => {\n // when\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n\n // then\n expect(command.getApdu().getRawApdu()).toEqual(EXPECTED_RAW_APDU);\n });\n });\n describe(\"parseResponse\", () => {\n it(\"should parse the response correctly\", () => {\n // given\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n const response = new ApduResponse({\n statusCode: new Uint8Array([0x90, 0x00]),\n data: APDU_RESPONSE,\n });\n\n // then\n expect(command.parseResponse(response)).toEqual(\n CommandResultFactory({\n data: {\n walletId: APDU_RESPONSE.slice(0, 32),\n walletHmac: APDU_RESPONSE.slice(32),\n },\n }),\n );\n });\n\n it(\"should return an error if the response is not successful\", () => {\n // given\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n const response = new ApduResponse({\n statusCode: Uint8Array.from([0x6d, 0x00]),\n data: new Uint8Array(0),\n });\n\n // when\n const result = command.parseResponse(response);\n\n // then\n expect(isSuccessCommandResult(result)).toBe(false);\n });\n it(\"should return an error if the response is too short\", () => {\n // given\n const command = new RegisterWalletAddressCommand({\n walletPolicy: WALLET_POLICY_DATA,\n });\n const response = new ApduResponse({\n data: APDU_RESPONSE.slice(0, 2),\n statusCode: new Uint8Array([0x90, 0x00]),\n });\n\n // when\n const result = command.parseResponse(response);\n\n // then\n if (!isSuccessCommandResult(result)) {\n expect(result.error).toEqual(\n new InvalidStatusWordError(\"Data mismatch\"),\n );\n } else {\n assert.fail(\"Expected an error, but the result was successful\");\n }\n });\n });\n});\n"],
|
|
5
|
+
"mappings": "aAAA,IAAAA,EAKO,2CAEPC,EAA6C,qEAE7C,MAAMC,EAAmB,WAAW,KAAK,CACvC,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IACxE,IAAM,IAAM,GAAM,GAAM,GAAM,EAAM,IAAM,GAAM,GAAM,IAAM,GAAM,IAAM,IACxE,IAAM,IAAM,IAAM,IAAM,IAAM,GAChC,CAAC,EACKC,EAAc,EACdC,EAAiB,WAAW,KAAK,CACrC,GAAM,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IACxE,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IACxE,IAAM,IAAM,GAAM,IAAM,GAAM,GAChC,CAAC,EACKC,EAAmB,WAAW,KAAK,CACvC,EAAM,GAAM,GAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IACxE,IAAM,EACR,CAAC,EACKC,EAAiB,EACjBC,EAAqB,WAAW,KACpC,CAACD,CAAc,EACZ,OAAO,GAAGD,CAAgB,EAC1B,OAAO,GAAGH,CAAgB,EAC1B,OAAO,CAACC,CAAW,CAAC,EACpB,OAAO,GAAGC,CAAc,CAC7B,EACMI,EAAoB,WAAW,KACnC,CAAC,IAAM,EAAM,EAAM,EAAM,EAAI,EAAE,OAAO,GAAGD,CAAkB,CAC7D,EACME,EAAgB,WAAW,KAAK,CACpC,GAAM,GAAM,GAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,GAAM,IACxE,GAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,IACxE,GAAM,IAAM,GAAM,IAAM,GAAM,GAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GACxE,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GAAM,IAAM,GACxE,GAAM,GAAM,GAAM,GAAM,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GAAM,CACpE,CAAC,EAED,SAAS,+BAAgC,IAAM,CAC7C,SAAS,OAAQ,IAAM,CACrB,GAAG,oCAAqC,IAAM,CAC5C,MAAMC,EAAU,IAAI,+BAA6B,CAC/C,aAAcH,CAChB,CAAC,EACD,OAAOG,EAAQ,IAAI,EAAE,KAAK,uBAAuB,CACnD,CAAC,CACH,CAAC,EAED,SAAS,UAAW,IAAM,CACxB,GAAG,+BAAgC,IAAM,CAEvC,MAAMA,EAAU,IAAI,+BAA6B,CAC/C,aAAcH,CAChB,CAAC,EAGD,OAAOG,EAAQ,QAAQ,EAAE,WAAW,CAAC,EAAE,QAAQF,CAAiB,CAClE,CAAC,CACH,CAAC,EACD,SAAS,gBAAiB,IAAM,CAC9B,GAAG,sCAAuC,IAAM,CAE9C,MAAME,EAAU,IAAI,+BAA6B,CAC/C,aAAcH,CAChB,CAAC,EACKI,EAAW,IAAI,eAAa,CAChC,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,EACvC,KAAMF,CACR,CAAC,EAGD,OAAOC,EAAQ,cAAcC,CAAQ,CAAC,EAAE,WACtC,wBAAqB,CACnB,KAAM,CACJ,SAAUF,EAAc,MAAM,EAAG,EAAE,EACnC,WAAYA,EAAc,MAAM,EAAE,CACpC,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,2DAA4D,IAAM,CAEnE,MAAMC,EAAU,IAAI,+BAA6B,CAC/C,aAAcH,CAChB,CAAC,EACKI,EAAW,IAAI,eAAa,CAChC,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAM,IAAI,WAAW,CAAC,CACxB,CAAC,EAGKC,EAASF,EAAQ,cAAcC,CAAQ,EAG7C,UAAO,0BAAuBC,CAAM,CAAC,EAAE,KAAK,EAAK,CACnD,CAAC,EACD,GAAG,sDAAuD,IAAM,CAE9D,MAAMF,EAAU,IAAI,+BAA6B,CAC/C,aAAcH,CAChB,CAAC,EACKI,EAAW,IAAI,eAAa,CAChC,KAAMF,EAAc,MAAM,EAAG,CAAC,EAC9B,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,CACzC,CAAC,EAGKG,EAASF,EAAQ,cAAcC,CAAQ,KAGxC,0BAAuBC,CAAM,EAKhC,OAAO,KAAK,kDAAkD,EAJ9D,OAAOA,EAAO,KAAK,EAAE,QACnB,IAAI,yBAAuB,eAAe,CAC5C,CAIJ,CAAC,CACH,CAAC,CACH,CAAC",
|
|
6
6
|
"names": ["import_device_management_kit", "import_RegisterWalletAddressCommand", "POLICY_HASH_DATA", "KEYS_LENGTH", "KEYS_HASH_DATA", "POLICY_NAME_DATA", "POLICY_VERSION", "WALLET_POLICY_DATA", "EXPECTED_RAW_APDU", "APDU_RESPONSE", "command", "response", "result"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var d=Object.defineProperty;var c=Object.getOwnPropertyDescriptor;var R=Object.getOwnPropertyNames;var y=Object.prototype.hasOwnProperty;var f=(o,e)=>{for(var s in e)d(o,s,{get:e[s],enumerable:!0})},A=(o,e,s,
|
|
1
|
+
"use strict";var d=Object.defineProperty;var c=Object.getOwnPropertyDescriptor;var R=Object.getOwnPropertyNames;var y=Object.prototype.hasOwnProperty;var f=(o,e)=>{for(var s in e)d(o,s,{get:e[s],enumerable:!0})},A=(o,e,s,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let r of R(e))!y.call(o,r)&&r!==s&&d(o,r,{get:()=>e[r],enumerable:!(a=c(e,r))||a.enumerable});return o};var B=o=>A(d({},"__esModule",{value:!0}),o);var h={};f(h,{SignMessageCommand:()=>M});module.exports=B(h);var t=require("@ledgerhq/device-management-kit"),n=require("@ledgerhq/signer-utils"),i=require("purify-ts"),g=require("../../app-binder/command/utils/constants"),l=require("../../utils/BtcCommandUtils"),C=require("../../utils/Varint"),m=require("./utils/bitcoinAppErrors");class M{constructor(e,s=new n.CommandErrorHelper(m.BTC_APP_ERRORS,m.BtcAppCommandErrorFactory,l.BtcCommandUtils.isSuccessResponse)){this._args=e;this._errorHelper=s}name="signMessage";getApdu(){const{derivationPath:e,messageLength:s,messageMerkleRoot:a}=this._args,r=new t.ApduBuilder({cla:225,ins:16,p1:0,p2:g.PROTOCOL_VERSION}),p=n.DerivationPathUtils.splitPath(e);return r.add8BitUIntToData(p.length),p.forEach(u=>{r.add32BitUIntToData(u)}),r.addBufferToData((0,C.encodeVarint)(s).unsafeCoerce()).addBufferToData(a).build()}parseResponse(e){return i.Maybe.fromNullable(this._errorHelper.getError(e)).orDefault((0,t.CommandResultFactory)({data:e}))}}0&&(module.exports={SignMessageCommand});
|
|
2
2
|
//# sourceMappingURL=SignMessageCommand.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/command/SignMessageCommand.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n type Apdu,\n ApduBuilder,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n} from \"@ledgerhq/device-management-kit\";\nimport {\n CommandErrorHelper,\n DerivationPathUtils,\n} from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport { PROTOCOL_VERSION } from \"@internal/app-binder/command/utils/constants\";\nimport { BtcCommandUtils } from \"@internal/utils/BtcCommandUtils\";\nimport { encodeVarint } from \"@internal/utils/Varint\";\n\nimport {\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n type BtcErrorCodes,\n} from \"./utils/bitcoinAppErrors\";\n\nexport type SignMessageCommandArgs = {\n /**\n * The BIP32 path (e.g., \"m/44'/0'/0'/0/0\")\n */\n readonly derivationPath: string;\n /**\n * The total length of the message to be signed\n */\n readonly messageLength: number;\n /**\n * The Merkle root of the message data\n */\n readonly messageMerkleRoot: Uint8Array;\n};\n\nexport type SignMessageCommandResponse = ApduResponse;\n\nexport class SignMessageCommand\n implements\n Command<SignMessageCommandResponse, SignMessageCommandArgs, BtcErrorCodes>\n{\n constructor(\n private readonly _args: SignMessageCommandArgs,\n private readonly _errorHelper = new CommandErrorHelper<\n SignMessageCommandResponse,\n BtcErrorCodes\n >(\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n BtcCommandUtils.isSuccessResponse,\n ),\n ) {}\n\n getApdu(): Apdu {\n const { derivationPath, messageLength, messageMerkleRoot } = this._args;\n\n const builder = new ApduBuilder({\n cla: 0xe1,\n ins: 0x10,\n p1: 0x00,\n p2: PROTOCOL_VERSION,\n });\n\n const path = DerivationPathUtils.splitPath(derivationPath);\n builder.add8BitUIntToData(path.length);\n path.forEach((element) => {\n builder.add32BitUIntToData(element);\n });\n\n return builder\n .addBufferToData(encodeVarint(messageLength).unsafeCoerce()) // Message length (varint)\n .addBufferToData(messageMerkleRoot)\n .build();\n }\n\n parseResponse(\n apduResponse: ApduResponse,\n ): CommandResult<SignMessageCommandResponse, BtcErrorCodes> {\n return Maybe.fromNullable(\n this._errorHelper.getError(apduResponse),\n ).orDefault(CommandResultFactory({ data: apduResponse }));\n }\n}\n"],
|
|
5
|
-
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,wBAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAOO,2CACPC,EAGO,kCACPC,EAAsB,qBAEtBC,EAAiC,wDACjCC,EAAgC,2CAChCC,EAA6B,kCAE7BC,EAIO,oCAmBA,MAAMR,CAGb,
|
|
4
|
+
"sourcesContent": ["import {\n type Apdu,\n ApduBuilder,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n} from \"@ledgerhq/device-management-kit\";\nimport {\n CommandErrorHelper,\n DerivationPathUtils,\n} from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport { PROTOCOL_VERSION } from \"@internal/app-binder/command/utils/constants\";\nimport { BtcCommandUtils } from \"@internal/utils/BtcCommandUtils\";\nimport { encodeVarint } from \"@internal/utils/Varint\";\n\nimport {\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n type BtcErrorCodes,\n} from \"./utils/bitcoinAppErrors\";\n\nexport type SignMessageCommandArgs = {\n /**\n * The BIP32 path (e.g., \"m/44'/0'/0'/0/0\")\n */\n readonly derivationPath: string;\n /**\n * The total length of the message to be signed\n */\n readonly messageLength: number;\n /**\n * The Merkle root of the message data\n */\n readonly messageMerkleRoot: Uint8Array;\n};\n\nexport type SignMessageCommandResponse = ApduResponse;\n\nexport class SignMessageCommand\n implements\n Command<SignMessageCommandResponse, SignMessageCommandArgs, BtcErrorCodes>\n{\n readonly name = \"signMessage\";\n constructor(\n private readonly _args: SignMessageCommandArgs,\n private readonly _errorHelper = new CommandErrorHelper<\n SignMessageCommandResponse,\n BtcErrorCodes\n >(\n BTC_APP_ERRORS,\n BtcAppCommandErrorFactory,\n BtcCommandUtils.isSuccessResponse,\n ),\n ) {}\n\n getApdu(): Apdu {\n const { derivationPath, messageLength, messageMerkleRoot } = this._args;\n\n const builder = new ApduBuilder({\n cla: 0xe1,\n ins: 0x10,\n p1: 0x00,\n p2: PROTOCOL_VERSION,\n });\n\n const path = DerivationPathUtils.splitPath(derivationPath);\n builder.add8BitUIntToData(path.length);\n path.forEach((element) => {\n builder.add32BitUIntToData(element);\n });\n\n return builder\n .addBufferToData(encodeVarint(messageLength).unsafeCoerce()) // Message length (varint)\n .addBufferToData(messageMerkleRoot)\n .build();\n }\n\n parseResponse(\n apduResponse: ApduResponse,\n ): CommandResult<SignMessageCommandResponse, BtcErrorCodes> {\n return Maybe.fromNullable(\n this._errorHelper.getError(apduResponse),\n ).orDefault(CommandResultFactory({ data: apduResponse }));\n }\n}\n"],
|
|
5
|
+
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,wBAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAOO,2CACPC,EAGO,kCACPC,EAAsB,qBAEtBC,EAAiC,wDACjCC,EAAgC,2CAChCC,EAA6B,kCAE7BC,EAIO,oCAmBA,MAAMR,CAGb,CAEE,YACmBS,EACAC,EAAe,IAAI,qBAIlC,iBACA,4BACA,kBAAgB,iBAClB,EACA,CATiB,WAAAD,EACA,kBAAAC,CAQhB,CAXM,KAAO,cAahB,SAAgB,CACd,KAAM,CAAE,eAAAC,EAAgB,cAAAC,EAAe,kBAAAC,CAAkB,EAAI,KAAK,MAE5DC,EAAU,IAAI,cAAY,CAC9B,IAAK,IACL,IAAK,GACL,GAAI,EACJ,GAAI,kBACN,CAAC,EAEKC,EAAO,sBAAoB,UAAUJ,CAAc,EACzD,OAAAG,EAAQ,kBAAkBC,EAAK,MAAM,EACrCA,EAAK,QAASC,GAAY,CACxBF,EAAQ,mBAAmBE,CAAO,CACpC,CAAC,EAEMF,EACJ,mBAAgB,gBAAaF,CAAa,EAAE,aAAa,CAAC,EAC1D,gBAAgBC,CAAiB,EACjC,MAAM,CACX,CAEA,cACEI,EAC0D,CAC1D,OAAO,QAAM,aACX,KAAK,aAAa,SAASA,CAAY,CACzC,EAAE,aAAU,wBAAqB,CAAE,KAAMA,CAAa,CAAC,CAAC,CAC1D,CACF",
|
|
6
6
|
"names": ["SignMessageCommand_exports", "__export", "SignMessageCommand", "__toCommonJS", "import_device_management_kit", "import_signer_utils", "import_purify_ts", "import_constants", "import_BtcCommandUtils", "import_Varint", "import_bitcoinAppErrors", "_args", "_errorHelper", "derivationPath", "messageLength", "messageMerkleRoot", "builder", "path", "element", "apduResponse"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var
|
|
1
|
+
"use strict";var x=require("@ledgerhq/device-management-kit"),a=require("./utils/constants"),o=require("./SignMessageCommand");const d="44'/0'/0'/0/0",i=new TextEncoder().encode("Hello Bitcoin!"),p=i.length,c=new Uint8Array(32).fill(250),m=({omitR:n=!1,omitS:e=!1}={})=>new Uint8Array([...n?[]:[27],...n?[]:[151,164,202,143,105,70,51,89,38,1,245,162,62,11,204,85,60,157,10,144,211,163,66,45,87,85,8,169,40,152,185,110],...e?[]:[105,80,208,46,116,233,193,2,193,100,162,37,83,48,130,202,189,216,144,239,196,99,246,127,96,206,254,140,63,135,207,206]]),u=new Uint8Array([105,133]),f=new Uint8Array([225,16,0,1,54,5,128,0,0,44,128,0,0,0,128,0,0,0,0,0,0,0,0,0,0,0,14,...c]);describe("SignMessageCommand",()=>{const n={derivationPath:d,messageLength:p,messageMerkleRoot:c};describe("name",()=>{it("should be 'signMessage'",()=>{const e=new o.SignMessageCommand(n);expect(e.name).toBe("signMessage")})}),describe("getApdu",()=>{it("should return correct APDU for given arguments",()=>{const t=new o.SignMessageCommand(n).getApdu();expect(t.getRawApdu()).toStrictEqual(f)})}),describe("parseResponse",()=>{it("should return the APDU response if it's a continue response",()=>{const e=new o.SignMessageCommand(n),t=new Uint8Array([1,2,3,4]),s=new x.ApduResponse({statusCode:a.SW_INTERRUPTED_EXECUTION,data:t}),r=e.parseResponse(s);expect(r).toStrictEqual((0,x.CommandResultFactory)({data:s}))}),it("should return an error if user denied the operation",()=>{const e=new o.SignMessageCommand(n),t=new x.ApduResponse({statusCode:u,data:new Uint8Array([])}),s=e.parseResponse(t);expect((0,x.isSuccessCommandResult)(s)).toBe(!1),(0,x.isSuccessCommandResult)(s)||expect(s.error).toBeDefined()}),it("should return correct data when the response data is not empty",()=>{const e=new o.SignMessageCommand(n),t=new x.ApduResponse({statusCode:new Uint8Array([144,0]),data:m()}),s=e.parseResponse(t);expect(s).toStrictEqual((0,x.CommandResultFactory)({data:t}))})})});
|
|
2
2
|
//# sourceMappingURL=SignMessageCommand.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/command/SignMessageCommand.test.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { SW_INTERRUPTED_EXECUTION } from \"./utils/constants\";\nimport { SignMessageCommand } from \"./SignMessageCommand\";\n\nconst PATH = \"44'/0'/0'/0/0\";\nconst MESSAGE = new TextEncoder().encode(\"Hello Bitcoin!\");\nconst MESSAGE_LENGTH = MESSAGE.length;\nconst MSG_MERKLE_ROOT = new Uint8Array(32).fill(0xfa);\n\nconst getResponse = ({\n omitR = false,\n omitS = false,\n}: {\n omitR?: boolean;\n omitS?: boolean;\n} = {}) =>\n new Uint8Array([\n ...(omitR ? [] : [0x1b]), // v\n ...(omitR\n ? []\n : [\n 0x97, 0xa4, 0xca, 0x8f, 0x69, 0x46, 0x33, 0x59, 0x26, 0x01, 0xf5,\n 0xa2, 0x3e, 0x0b, 0xcc, 0x55, 0x3c, 0x9d, 0x0a, 0x90, 0xd3, 0xa3,\n 0x42, 0x2d, 0x57, 0x55, 0x08, 0xa9, 0x28, 0x98, 0xb9, 0x6e,\n ]), // r (32 bytes)\n ...(omitS\n ? []\n : [\n 0x69, 0x50, 0xd0, 0x2e, 0x74, 0xe9, 0xc1, 0x02, 0xc1, 0x64, 0xa2,\n 0x25, 0x53, 0x30, 0x82, 0xca, 0xbd, 0xd8, 0x90, 0xef, 0xc4, 0x63,\n 0xf6, 0x7f, 0x60, 0xce, 0xfe, 0x8c, 0x3f, 0x87, 0xcf, 0xce,\n ]), // s (32 bytes)\n ]);\n\nconst USER_DENIED_STATUS = new Uint8Array([0x69, 0x85]);\n\nconst EXPECTED_APDU = new Uint8Array([\n 0xe1, // CLA\n 0x10, // INS\n 0x00, // P1\n 0x01, // P2\n 0x36, // Lc\n // Data:\n 0x05, // Number of derivation steps (5)\n // BIP32 path:\n // 44' (0x8000002C)\n 0x80,\n 0x00,\n 0x00,\n 0x2c,\n // 0' (0x80000000)\n 0x80,\n 0x00,\n 0x00,\n 0x00,\n // 0' (0x80000000)\n 0x80,\n 0x00,\n 0x00,\n 0x00,\n // 0 (0x00000000)\n 0x00,\n 0x00,\n 0x00,\n 0x00,\n // 0 (0x00000000)\n 0x00,\n 0x00,\n 0x00,\n 0x00,\n // Message length (varint)\n 0x0e, // 14 bytes (\"Hello Bitcoin!\")\n // messageMerkleRoot\n ...MSG_MERKLE_ROOT,\n]);\n\ndescribe(\"SignMessageCommand\", (): void => {\n const defaultArgs = {\n derivationPath: PATH,\n messageLength: MESSAGE_LENGTH,\n messageMerkleRoot: MSG_MERKLE_ROOT,\n };\n\n describe(\"getApdu\", () => {\n it(\"should return correct APDU for given arguments\", () => {\n // given\n const command = new SignMessageCommand(defaultArgs);\n // when\n const apdu = command.getApdu();\n // then\n expect(apdu.getRawApdu()).toStrictEqual(EXPECTED_APDU);\n });\n });\n\n describe(\"parseResponse\", () => {\n it(\"should return the APDU response if it's a continue response\", () => {\n // given\n const command = new SignMessageCommand(defaultArgs);\n const continueResponseData = new Uint8Array([0x01, 0x02, 0x03, 0x04]);\n\n const apduResponse = new ApduResponse({\n statusCode: SW_INTERRUPTED_EXECUTION,\n data: continueResponseData,\n });\n\n // when\n const response = command.parseResponse(apduResponse);\n\n // then\n expect(response).toStrictEqual(\n CommandResultFactory({\n data: apduResponse,\n }),\n );\n });\n\n it(\"should return an error if user denied the operation\", () => {\n // given\n const command = new SignMessageCommand(defaultArgs);\n const apduResponse = new ApduResponse({\n statusCode: USER_DENIED_STATUS,\n data: new Uint8Array([]),\n });\n // when\n const response = command.parseResponse(apduResponse);\n // then\n expect(isSuccessCommandResult(response)).toBe(false);\n if (!isSuccessCommandResult(response)) {\n expect(response.error).toBeDefined();\n }\n });\n\n it(\"should return correct data when the response data is not empty\", () => {\n // given\n const command = new SignMessageCommand(defaultArgs);\n const apduResponse = new ApduResponse({\n statusCode: new Uint8Array([0x90, 0x00]),\n data: getResponse(),\n });\n // when\n const response = command.parseResponse(apduResponse);\n // then\n expect(response).toStrictEqual(\n CommandResultFactory({\n data: apduResponse,\n }),\n );\n });\n });\n});\n"],
|
|
5
|
-
"mappings": "aAAA,IAAAA,EAIO,2CAEPC,EAAyC,6BACzCC,EAAmC,gCAEnC,MAAMC,EAAO,gBACPC,EAAU,IAAI,YAAY,EAAE,OAAO,gBAAgB,EACnDC,EAAiBD,EAAQ,OACzBE,EAAkB,IAAI,WAAW,EAAE,EAAE,KAAK,GAAI,EAE9CC,EAAc,CAAC,CACnB,MAAAC,EAAQ,GACR,MAAAC,EAAQ,EACV,EAGI,CAAC,IACH,IAAI,WAAW,CACb,GAAID,EAAQ,CAAC,EAAI,CAAC,EAAI,EACtB,GAAIA,EACA,CAAC,EACD,CACE,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GAAM,EAAM,IAC5D,IAAM,GAAM,GAAM,IAAM,GAAM,GAAM,IAAM,GAAM,IAAM,IAAM,IAC5D,GAAM,GAAM,GAAM,GAAM,EAAM,IAAM,GAAM,IAAM,IAAM,GACxD,EACJ,GAAIC,EACA,CAAC,EACD,CACE,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,IAAM,EAAM,IAAM,IAAM,IAC5D,GAAM,GAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAC5D,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,GACxD,CACN,CAAC,EAEGC,EAAqB,IAAI,WAAW,CAAC,IAAM,GAAI,CAAC,EAEhDC,EAAgB,IAAI,WAAW,CACnC,IACA,GACA,EACA,EACA,GAEA,EAGA,IACA,EACA,EACA,GAEA,IACA,EACA,EACA,EAEA,IACA,EACA,EACA,EAEA,EACA,EACA,EACA,EAEA,EACA,EACA,EACA,EAEA,GAEA,GAAGL,CACL,CAAC,EAED,SAAS,qBAAsB,IAAY,CACzC,MAAMM,EAAc,CAClB,eAAgBT,EAChB,cAAeE,EACf,kBAAmBC,CACrB,EAEA,SAAS,UAAW,IAAM,CACxB,GAAG,iDAAkD,IAAM,CAIzD,
|
|
6
|
-
"names": ["import_device_management_kit", "import_constants", "import_SignMessageCommand", "PATH", "MESSAGE", "MESSAGE_LENGTH", "MSG_MERKLE_ROOT", "getResponse", "omitR", "omitS", "USER_DENIED_STATUS", "EXPECTED_APDU", "defaultArgs", "
|
|
4
|
+
"sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { SW_INTERRUPTED_EXECUTION } from \"./utils/constants\";\nimport { SignMessageCommand } from \"./SignMessageCommand\";\n\nconst PATH = \"44'/0'/0'/0/0\";\nconst MESSAGE = new TextEncoder().encode(\"Hello Bitcoin!\");\nconst MESSAGE_LENGTH = MESSAGE.length;\nconst MSG_MERKLE_ROOT = new Uint8Array(32).fill(0xfa);\n\nconst getResponse = ({\n omitR = false,\n omitS = false,\n}: {\n omitR?: boolean;\n omitS?: boolean;\n} = {}) =>\n new Uint8Array([\n ...(omitR ? [] : [0x1b]), // v\n ...(omitR\n ? []\n : [\n 0x97, 0xa4, 0xca, 0x8f, 0x69, 0x46, 0x33, 0x59, 0x26, 0x01, 0xf5,\n 0xa2, 0x3e, 0x0b, 0xcc, 0x55, 0x3c, 0x9d, 0x0a, 0x90, 0xd3, 0xa3,\n 0x42, 0x2d, 0x57, 0x55, 0x08, 0xa9, 0x28, 0x98, 0xb9, 0x6e,\n ]), // r (32 bytes)\n ...(omitS\n ? []\n : [\n 0x69, 0x50, 0xd0, 0x2e, 0x74, 0xe9, 0xc1, 0x02, 0xc1, 0x64, 0xa2,\n 0x25, 0x53, 0x30, 0x82, 0xca, 0xbd, 0xd8, 0x90, 0xef, 0xc4, 0x63,\n 0xf6, 0x7f, 0x60, 0xce, 0xfe, 0x8c, 0x3f, 0x87, 0xcf, 0xce,\n ]), // s (32 bytes)\n ]);\n\nconst USER_DENIED_STATUS = new Uint8Array([0x69, 0x85]);\n\nconst EXPECTED_APDU = new Uint8Array([\n 0xe1, // CLA\n 0x10, // INS\n 0x00, // P1\n 0x01, // P2\n 0x36, // Lc\n // Data:\n 0x05, // Number of derivation steps (5)\n // BIP32 path:\n // 44' (0x8000002C)\n 0x80,\n 0x00,\n 0x00,\n 0x2c,\n // 0' (0x80000000)\n 0x80,\n 0x00,\n 0x00,\n 0x00,\n // 0' (0x80000000)\n 0x80,\n 0x00,\n 0x00,\n 0x00,\n // 0 (0x00000000)\n 0x00,\n 0x00,\n 0x00,\n 0x00,\n // 0 (0x00000000)\n 0x00,\n 0x00,\n 0x00,\n 0x00,\n // Message length (varint)\n 0x0e, // 14 bytes (\"Hello Bitcoin!\")\n // messageMerkleRoot\n ...MSG_MERKLE_ROOT,\n]);\n\ndescribe(\"SignMessageCommand\", (): void => {\n const defaultArgs = {\n derivationPath: PATH,\n messageLength: MESSAGE_LENGTH,\n messageMerkleRoot: MSG_MERKLE_ROOT,\n };\n\n describe(\"name\", () => {\n it(\"should be 'signMessage'\", () => {\n const command = new SignMessageCommand(defaultArgs);\n expect(command.name).toBe(\"signMessage\");\n });\n });\n\n describe(\"getApdu\", () => {\n it(\"should return correct APDU for given arguments\", () => {\n // given\n const command = new SignMessageCommand(defaultArgs);\n // when\n const apdu = command.getApdu();\n // then\n expect(apdu.getRawApdu()).toStrictEqual(EXPECTED_APDU);\n });\n });\n\n describe(\"parseResponse\", () => {\n it(\"should return the APDU response if it's a continue response\", () => {\n // given\n const command = new SignMessageCommand(defaultArgs);\n const continueResponseData = new Uint8Array([0x01, 0x02, 0x03, 0x04]);\n\n const apduResponse = new ApduResponse({\n statusCode: SW_INTERRUPTED_EXECUTION,\n data: continueResponseData,\n });\n\n // when\n const response = command.parseResponse(apduResponse);\n\n // then\n expect(response).toStrictEqual(\n CommandResultFactory({\n data: apduResponse,\n }),\n );\n });\n\n it(\"should return an error if user denied the operation\", () => {\n // given\n const command = new SignMessageCommand(defaultArgs);\n const apduResponse = new ApduResponse({\n statusCode: USER_DENIED_STATUS,\n data: new Uint8Array([]),\n });\n // when\n const response = command.parseResponse(apduResponse);\n // then\n expect(isSuccessCommandResult(response)).toBe(false);\n if (!isSuccessCommandResult(response)) {\n expect(response.error).toBeDefined();\n }\n });\n\n it(\"should return correct data when the response data is not empty\", () => {\n // given\n const command = new SignMessageCommand(defaultArgs);\n const apduResponse = new ApduResponse({\n statusCode: new Uint8Array([0x90, 0x00]),\n data: getResponse(),\n });\n // when\n const response = command.parseResponse(apduResponse);\n // then\n expect(response).toStrictEqual(\n CommandResultFactory({\n data: apduResponse,\n }),\n );\n });\n });\n});\n"],
|
|
5
|
+
"mappings": "aAAA,IAAAA,EAIO,2CAEPC,EAAyC,6BACzCC,EAAmC,gCAEnC,MAAMC,EAAO,gBACPC,EAAU,IAAI,YAAY,EAAE,OAAO,gBAAgB,EACnDC,EAAiBD,EAAQ,OACzBE,EAAkB,IAAI,WAAW,EAAE,EAAE,KAAK,GAAI,EAE9CC,EAAc,CAAC,CACnB,MAAAC,EAAQ,GACR,MAAAC,EAAQ,EACV,EAGI,CAAC,IACH,IAAI,WAAW,CACb,GAAID,EAAQ,CAAC,EAAI,CAAC,EAAI,EACtB,GAAIA,EACA,CAAC,EACD,CACE,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,GAAM,EAAM,IAC5D,IAAM,GAAM,GAAM,IAAM,GAAM,GAAM,IAAM,GAAM,IAAM,IAAM,IAC5D,GAAM,GAAM,GAAM,GAAM,EAAM,IAAM,GAAM,IAAM,IAAM,GACxD,EACJ,GAAIC,EACA,CAAC,EACD,CACE,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,IAAM,EAAM,IAAM,IAAM,IAC5D,GAAM,GAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAC5D,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,GACxD,CACN,CAAC,EAEGC,EAAqB,IAAI,WAAW,CAAC,IAAM,GAAI,CAAC,EAEhDC,EAAgB,IAAI,WAAW,CACnC,IACA,GACA,EACA,EACA,GAEA,EAGA,IACA,EACA,EACA,GAEA,IACA,EACA,EACA,EAEA,IACA,EACA,EACA,EAEA,EACA,EACA,EACA,EAEA,EACA,EACA,EACA,EAEA,GAEA,GAAGL,CACL,CAAC,EAED,SAAS,qBAAsB,IAAY,CACzC,MAAMM,EAAc,CAClB,eAAgBT,EAChB,cAAeE,EACf,kBAAmBC,CACrB,EAEA,SAAS,OAAQ,IAAM,CACrB,GAAG,0BAA2B,IAAM,CAClC,MAAMO,EAAU,IAAI,qBAAmBD,CAAW,EAClD,OAAOC,EAAQ,IAAI,EAAE,KAAK,aAAa,CACzC,CAAC,CACH,CAAC,EAED,SAAS,UAAW,IAAM,CACxB,GAAG,iDAAkD,IAAM,CAIzD,MAAMC,EAFU,IAAI,qBAAmBF,CAAW,EAE7B,QAAQ,EAE7B,OAAOE,EAAK,WAAW,CAAC,EAAE,cAAcH,CAAa,CACvD,CAAC,CACH,CAAC,EAED,SAAS,gBAAiB,IAAM,CAC9B,GAAG,8DAA+D,IAAM,CAEtE,MAAME,EAAU,IAAI,qBAAmBD,CAAW,EAC5CG,EAAuB,IAAI,WAAW,CAAC,EAAM,EAAM,EAAM,CAAI,CAAC,EAE9DC,EAAe,IAAI,eAAa,CACpC,WAAY,2BACZ,KAAMD,CACR,CAAC,EAGKE,EAAWJ,EAAQ,cAAcG,CAAY,EAGnD,OAAOC,CAAQ,EAAE,iBACf,wBAAqB,CACnB,KAAMD,CACR,CAAC,CACH,CACF,CAAC,EAED,GAAG,sDAAuD,IAAM,CAE9D,MAAMH,EAAU,IAAI,qBAAmBD,CAAW,EAC5CI,EAAe,IAAI,eAAa,CACpC,WAAYN,EACZ,KAAM,IAAI,WAAW,CAAC,CAAC,CACzB,CAAC,EAEKO,EAAWJ,EAAQ,cAAcG,CAAY,EAEnD,UAAO,0BAAuBC,CAAQ,CAAC,EAAE,KAAK,EAAK,KAC9C,0BAAuBA,CAAQ,GAClC,OAAOA,EAAS,KAAK,EAAE,YAAY,CAEvC,CAAC,EAED,GAAG,iEAAkE,IAAM,CAEzE,MAAMJ,EAAU,IAAI,qBAAmBD,CAAW,EAC5CI,EAAe,IAAI,eAAa,CACpC,WAAY,IAAI,WAAW,CAAC,IAAM,CAAI,CAAC,EACvC,KAAMT,EAAY,CACpB,CAAC,EAEKU,EAAWJ,EAAQ,cAAcG,CAAY,EAEnD,OAAOC,CAAQ,EAAE,iBACf,wBAAqB,CACnB,KAAMD,CACR,CAAC,CACH,CACF,CAAC,CACH,CAAC,CACH,CAAC",
|
|
6
|
+
"names": ["import_device_management_kit", "import_constants", "import_SignMessageCommand", "PATH", "MESSAGE", "MESSAGE_LENGTH", "MSG_MERKLE_ROOT", "getResponse", "omitR", "omitS", "USER_DENIED_STATUS", "EXPECTED_APDU", "defaultArgs", "command", "apdu", "continueResponseData", "apduResponse", "response"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var m=Object.defineProperty;var f=Object.getOwnPropertyDescriptor;var g=Object.getOwnPropertyNames;var y=Object.prototype.hasOwnProperty;var
|
|
1
|
+
"use strict";var m=Object.defineProperty;var f=Object.getOwnPropertyDescriptor;var g=Object.getOwnPropertyNames;var y=Object.prototype.hasOwnProperty;var b=(o,t)=>{for(var r in t)m(o,r,{get:t[r],enumerable:!0})},A=(o,t,r,a)=>{if(t&&typeof t=="object"||typeof t=="function")for(let e of g(t))!y.call(o,e)&&e!==r&&m(o,e,{get:()=>t[e],enumerable:!(a=f(t,e))||a.enumerable});return o};var B=o=>A(m({},"__esModule",{value:!0}),o);var S={};b(S,{SignPsbtCommand:()=>P});module.exports=B(S);var n=require("@ledgerhq/device-management-kit"),d=require("@ledgerhq/signer-utils"),p=require("purify-ts"),s=require("../../app-binder/command/utils/bitcoinAppErrors"),u=require("../../app-binder/command/utils/constants"),i=require("../../utils/BtcCommandUtils");class P{constructor(t,r=new d.CommandErrorHelper(s.BTC_APP_ERRORS,s.BtcAppCommandErrorFactory,i.BtcCommandUtils.isSuccessResponse)){this._args=t;this._errorHelper=r}name="signPsbt";getApdu(){const t=new n.ApduBuilder({cla:225,ins:4,p1:0,p2:u.PROTOCOL_VERSION}),{globalCommitment:r,inputsCount:a,inputsRoot:e,outputsCount:l,outputsRoot:C,walletHmac:R,walletId:c}=this._args;return t.addBufferToData(r).add8BitUIntToData(a).addBufferToData(e).add8BitUIntToData(l).addBufferToData(C).addBufferToData(c).addBufferToData(R).build()}parseResponse(t){return p.Maybe.fromNullable(this._errorHelper.getError(t)).orDefault((0,n.CommandResultFactory)({data:t}))}}0&&(module.exports={SignPsbtCommand});
|
|
2
2
|
//# sourceMappingURL=SignPsbtCommand.js.map
|