@ledgerhq/device-signer-kit-ethereum 0.0.0-develop-20250513001204 → 0.0.0-eip7702-20250506170433
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/cjs/api/SignerEth.js +1 -1
- package/lib/cjs/api/SignerEth.js.map +1 -1
- package/lib/cjs/api/app-binder/SignDelegationAuthorizationTypes.js +2 -0
- package/lib/cjs/api/app-binder/SignDelegationAuthorizationTypes.js.map +7 -0
- package/lib/cjs/api/index.js +1 -1
- package/lib/cjs/api/index.js.map +2 -2
- package/lib/cjs/internal/DefaultSignerEth.js +1 -1
- package/lib/cjs/internal/DefaultSignerEth.js.map +3 -3
- package/lib/cjs/internal/DefaultSignerEth.test.js +1 -1
- package/lib/cjs/internal/DefaultSignerEth.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/EthAppBinder.js +1 -1
- package/lib/cjs/internal/app-binder/EthAppBinder.js.map +3 -3
- package/lib/cjs/internal/app-binder/EthAppBinder.test.js +1 -1
- package/lib/cjs/internal/app-binder/EthAppBinder.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/command/SignAuthorizationDelegationCommand.js +2 -0
- package/lib/cjs/internal/app-binder/command/SignAuthorizationDelegationCommand.js.map +7 -0
- package/lib/cjs/internal/app-binder/command/SignAuthorizationDelegationCommand.test.js +2 -0
- package/lib/cjs/internal/app-binder/command/SignAuthorizationDelegationCommand.test.js.map +7 -0
- package/lib/cjs/internal/app-binder/task/SendSignAuthorizationDelegationTask.js +2 -0
- package/lib/cjs/internal/app-binder/task/SendSignAuthorizationDelegationTask.js.map +7 -0
- package/lib/cjs/internal/app-binder/task/SendSignAuthorizationDelegationTask.test.js +2 -0
- package/lib/cjs/internal/app-binder/task/SendSignAuthorizationDelegationTask.test.js.map +7 -0
- package/lib/cjs/internal/di.js +1 -1
- package/lib/cjs/internal/di.js.map +3 -3
- package/lib/cjs/internal/eip7702/di/eip7702Module.js +2 -0
- package/lib/cjs/internal/eip7702/di/eip7702Module.js.map +7 -0
- package/lib/cjs/internal/eip7702/di/eip7702Module.test.js +2 -0
- package/lib/cjs/internal/eip7702/di/eip7702Module.test.js.map +7 -0
- package/lib/cjs/internal/eip7702/di/eip7702Types.js +2 -0
- package/lib/cjs/internal/eip7702/di/eip7702Types.js.map +7 -0
- package/lib/cjs/internal/eip7702/use-case/SignDelegationAuthorizationUseCase.js +2 -0
- package/lib/cjs/internal/eip7702/use-case/SignDelegationAuthorizationUseCase.js.map +7 -0
- package/lib/cjs/internal/eip7702/use-case/SignDelegationAuthorizationUseCase.test.js +2 -0
- package/lib/cjs/internal/eip7702/use-case/SignDelegationAuthorizationUseCase.test.js.map +7 -0
- package/lib/cjs/package.json +10 -10
- package/lib/esm/api/app-binder/SignDelegationAuthorizationTypes.js +1 -0
- package/lib/esm/api/app-binder/SignDelegationAuthorizationTypes.js.map +7 -0
- package/lib/esm/api/index.js +1 -1
- package/lib/esm/api/index.js.map +2 -2
- package/lib/esm/internal/DefaultSignerEth.js +1 -1
- package/lib/esm/internal/DefaultSignerEth.js.map +3 -3
- package/lib/esm/internal/DefaultSignerEth.test.js +1 -1
- package/lib/esm/internal/DefaultSignerEth.test.js.map +3 -3
- package/lib/esm/internal/app-binder/EthAppBinder.js +1 -1
- package/lib/esm/internal/app-binder/EthAppBinder.js.map +3 -3
- package/lib/esm/internal/app-binder/EthAppBinder.test.js +1 -1
- package/lib/esm/internal/app-binder/EthAppBinder.test.js.map +3 -3
- package/lib/esm/internal/app-binder/command/SignAuthorizationDelegationCommand.js +2 -0
- package/lib/esm/internal/app-binder/command/SignAuthorizationDelegationCommand.js.map +7 -0
- package/lib/esm/internal/app-binder/command/SignAuthorizationDelegationCommand.test.js +2 -0
- package/lib/esm/internal/app-binder/command/SignAuthorizationDelegationCommand.test.js.map +7 -0
- package/lib/esm/internal/app-binder/task/SendSignAuthorizationDelegationTask.js +2 -0
- package/lib/esm/internal/app-binder/task/SendSignAuthorizationDelegationTask.js.map +7 -0
- package/lib/esm/internal/app-binder/task/SendSignAuthorizationDelegationTask.test.js +2 -0
- package/lib/esm/internal/app-binder/task/SendSignAuthorizationDelegationTask.test.js.map +7 -0
- package/lib/esm/internal/di.js +1 -1
- package/lib/esm/internal/di.js.map +3 -3
- package/lib/esm/internal/eip7702/di/eip7702Module.js +2 -0
- package/lib/esm/internal/eip7702/di/eip7702Module.js.map +7 -0
- package/lib/esm/internal/eip7702/di/eip7702Module.test.js +2 -0
- package/lib/esm/internal/eip7702/di/eip7702Module.test.js.map +7 -0
- package/lib/esm/internal/eip7702/di/eip7702Types.js +2 -0
- package/lib/esm/internal/eip7702/di/eip7702Types.js.map +7 -0
- package/lib/esm/internal/eip7702/use-case/SignDelegationAuthorizationUseCase.js +2 -0
- package/lib/esm/internal/eip7702/use-case/SignDelegationAuthorizationUseCase.js.map +7 -0
- package/lib/esm/internal/eip7702/use-case/SignDelegationAuthorizationUseCase.test.js +2 -0
- package/lib/esm/internal/eip7702/use-case/SignDelegationAuthorizationUseCase.test.js.map +7 -0
- package/lib/esm/package.json +10 -10
- package/lib/types/api/SignerEth.d.ts +4 -2
- package/lib/types/api/SignerEth.d.ts.map +1 -1
- package/lib/types/api/app-binder/SignDelegationAuthorizationTypes.d.ts +19 -0
- package/lib/types/api/app-binder/SignDelegationAuthorizationTypes.d.ts.map +1 -0
- package/lib/types/api/index.d.ts +5 -0
- package/lib/types/api/index.d.ts.map +1 -1
- package/lib/types/internal/DefaultSignerEth.d.ts +2 -0
- package/lib/types/internal/DefaultSignerEth.d.ts.map +1 -1
- package/lib/types/internal/app-binder/EthAppBinder.d.ts +7 -0
- package/lib/types/internal/app-binder/EthAppBinder.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/SignAuthorizationDelegationCommand.d.ts +29 -0
- package/lib/types/internal/app-binder/command/SignAuthorizationDelegationCommand.d.ts.map +1 -0
- package/lib/types/internal/app-binder/command/SignAuthorizationDelegationCommand.test.d.ts +2 -0
- package/lib/types/internal/app-binder/command/SignAuthorizationDelegationCommand.test.d.ts.map +1 -0
- package/lib/types/internal/app-binder/task/SendSignAuthorizationDelegationTask.d.ts +18 -0
- package/lib/types/internal/app-binder/task/SendSignAuthorizationDelegationTask.d.ts.map +1 -0
- package/lib/types/internal/app-binder/task/SendSignAuthorizationDelegationTask.test.d.ts +2 -0
- package/lib/types/internal/app-binder/task/SendSignAuthorizationDelegationTask.test.d.ts.map +1 -0
- package/lib/types/internal/di.d.ts.map +1 -1
- package/lib/types/internal/eip7702/di/eip7702Module.d.ts +3 -0
- package/lib/types/internal/eip7702/di/eip7702Module.d.ts.map +1 -0
- package/lib/types/internal/eip7702/di/eip7702Module.test.d.ts +2 -0
- package/lib/types/internal/eip7702/di/eip7702Module.test.d.ts.map +1 -0
- package/lib/types/internal/eip7702/di/eip7702Types.d.ts +4 -0
- package/lib/types/internal/eip7702/di/eip7702Types.d.ts.map +1 -0
- package/lib/types/internal/eip7702/use-case/SignDelegationAuthorizationUseCase.d.ts +8 -0
- package/lib/types/internal/eip7702/use-case/SignDelegationAuthorizationUseCase.d.ts.map +1 -0
- package/lib/types/internal/eip7702/use-case/SignDelegationAuthorizationUseCase.test.d.ts +2 -0
- package/lib/types/internal/eip7702/use-case/SignDelegationAuthorizationUseCase.test.d.ts.map +1 -0
- package/lib/types/tsconfig.prod.tsbuildinfo +1 -1
- package/package.json +15 -15
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../../../src/internal/app-binder/task/SendSignAuthorizationDelegationTask.ts"],
|
|
4
|
+
"sourcesContent": ["import {\n ByteArrayBuilder,\n type CommandResult,\n CommandResultFactory,\n type InternalApi,\n InvalidStatusWordError,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\nimport { DerivationPathUtils } from \"@ledgerhq/signer-utils\";\n\nimport { type Signature } from \"@api/model/Signature\";\nimport {\n SignEIP7702AuthorizationCommand,\n type SignEIP7702AuthorizationCommandResponse,\n} from \"@internal/app-binder/command/SignAuthorizationDelegationCommand\";\nimport { type EthErrorCodes } from \"@internal/app-binder/command/utils/ethAppErrors\";\n\nimport { SendCommandInChunksTask } from \"./SendCommandInChunksTask\";\n\nconst TAG_STRUCT_EIP7702_VERSION: number = 0x00;\nconst TAG_STRUCT_EIP7702_DELEGATE_ADDR: number = 0x01;\nconst TAG_STRUCT_EIP7702_CHAIN_ID: number = 0x02;\nconst TAG_STRUCT_EIP7702_NONCE: number = 0x03;\n\ntype SendSignAuthorizationDelegationTaskArgs = {\n derivationPath: string;\n chainId: number;\n address: string;\n nonce: number;\n};\n\nexport class SendSignAuthorizationDelegationTask {\n constructor(\n private api: InternalApi,\n private args: SendSignAuthorizationDelegationTaskArgs,\n ) {}\n\n async run(): Promise<CommandResult<Signature, EthErrorCodes>> {\n const { derivationPath, chainId, address, nonce } = this.args;\n const paths = DerivationPathUtils.splitPath(derivationPath);\n\n const buffer = this.buildData(paths, chainId, address, nonce);\n\n const result =\n await new SendCommandInChunksTask<SignEIP7702AuthorizationCommandResponse>(\n this.api,\n {\n data: buffer,\n commandFactory: (args) =>\n new SignEIP7702AuthorizationCommand({\n data: args.chunkedData,\n isFirstChunk: args.isFirstChunk,\n }),\n },\n ).run();\n\n if (!isSuccessCommandResult(result)) {\n return result;\n }\n\n return result.data.mapOrDefault(\n (data) => CommandResultFactory({ data }),\n CommandResultFactory({\n error: new InvalidStatusWordError(\"no signature returned\"),\n }),\n );\n }\n\n buildData(\n paths: number[],\n chainId: number,\n address: string,\n nonce: number,\n ): Uint8Array {\n const builder = new ByteArrayBuilder();\n // add the derivation paths length\n builder.add8BitUIntToData(paths.length);\n // add every derivation path\n paths.forEach((path) => {\n builder.add32BitUIntToData(path);\n });\n\n // Send EIP7702 Auth structure\n const builderStruct = new ByteArrayBuilder();\n builderStruct.encodeInTLVFromBuffer(\n TAG_STRUCT_EIP7702_VERSION,\n Uint8Array.from([0x01]),\n );\n // Add address\n builderStruct.encodeInTLVFromHexa(\n TAG_STRUCT_EIP7702_DELEGATE_ADDR,\n address,\n );\n // Add chainId\n builderStruct.encodeInTLVFromUInt64(TAG_STRUCT_EIP7702_CHAIN_ID, chainId);\n // Add nonce\n builderStruct.encodeInTLVFromUInt64(TAG_STRUCT_EIP7702_NONCE, nonce);\n const structBuffer = builderStruct.build();\n\n return builder\n .add16BitUIntToData(structBuffer.length)\n .addBufferToData(structBuffer)\n .build();\n }\n}\n"],
|
|
5
|
+
"mappings": "AAAA,OACE,oBAAAA,EAEA,wBAAAC,EAEA,0BAAAC,EACA,0BAAAC,MACK,kCACP,OAAS,uBAAAC,MAA2B,yBAGpC,OACE,mCAAAC,MAEK,kEAGP,OAAS,2BAAAC,MAA+B,4BAExC,MAAMC,EAAqC,EACrCC,EAA2C,EAC3CC,EAAsC,EACtCC,EAAmC,EASlC,MAAMC,CAAoC,CAC/C,YACUC,EACAC,EACR,CAFQ,SAAAD,EACA,UAAAC,CACP,CAEH,MAAM,KAAwD,CAC5D,KAAM,CAAE,eAAAC,EAAgB,QAAAC,EAAS,QAAAC,EAAS,MAAAC,CAAM,EAAI,KAAK,KACnDC,EAAQd,EAAoB,UAAUU,CAAc,EAEpDK,EAAS,KAAK,UAAUD,EAAOH,EAASC,EAASC,CAAK,EAEtDG,EACJ,MAAM,IAAId,EACR,KAAK,IACL,CACE,KAAMa,EACN,eAAiBN,GACf,IAAIR,EAAgC,CAClC,KAAMQ,EAAK,YACX,aAAcA,EAAK,YACrB,CAAC,CACL,CACF,EAAE,IAAI,EAER,OAAKV,EAAuBiB,CAAM,EAI3BA,EAAO,KAAK,aAChBC,GAASpB,EAAqB,CAAE,KAAAoB,CAAK,CAAC,EACvCpB,EAAqB,CACnB,MAAO,IAAIC,EAAuB,uBAAuB,CAC3D,CAAC,CACH,EARSkB,CASX,CAEA,UACEF,EACAH,EACAC,EACAC,EACY,CACZ,MAAMK,EAAU,IAAItB,EAEpBsB,EAAQ,kBAAkBJ,EAAM,MAAM,EAEtCA,EAAM,QAASK,GAAS,CACtBD,EAAQ,mBAAmBC,CAAI,CACjC,CAAC,EAGD,MAAMC,EAAgB,IAAIxB,EAC1BwB,EAAc,sBACZjB,EACA,WAAW,KAAK,CAAC,CAAI,CAAC,CACxB,EAEAiB,EAAc,oBACZhB,EACAQ,CACF,EAEAQ,EAAc,sBAAsBf,EAA6BM,CAAO,EAExES,EAAc,sBAAsBd,EAA0BO,CAAK,EACnE,MAAMQ,EAAeD,EAAc,MAAM,EAEzC,OAAOF,EACJ,mBAAmBG,EAAa,MAAM,EACtC,gBAAgBA,CAAY,EAC5B,MAAM,CACX,CACF",
|
|
6
|
+
"names": ["ByteArrayBuilder", "CommandResultFactory", "InvalidStatusWordError", "isSuccessCommandResult", "DerivationPathUtils", "SignEIP7702AuthorizationCommand", "SendCommandInChunksTask", "TAG_STRUCT_EIP7702_VERSION", "TAG_STRUCT_EIP7702_DELEGATE_ADDR", "TAG_STRUCT_EIP7702_CHAIN_ID", "TAG_STRUCT_EIP7702_NONCE", "SendSignAuthorizationDelegationTask", "api", "args", "derivationPath", "chainId", "address", "nonce", "paths", "buffer", "result", "data", "builder", "path", "builderStruct", "structBuffer"]
|
|
7
|
+
}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
import{CommandResultFactory as a}from"@ledgerhq/device-management-kit";import{InvalidStatusWordError as o}from"@ledgerhq/device-management-kit";import{Just as m,Nothing as l}from"purify-ts";import{SignEIP7702AuthorizationCommand as r}from"../../app-binder/command/SignAuthorizationDelegationCommand";import{makeDeviceActionInternalApiMock as f}from"../../app-binder/device-action/__test-utils__/makeInternalApi";import{SendSignAuthorizationDelegationTask as d}from"./SendSignAuthorizationDelegationTask";const u=new Uint8Array([5,128,0,0,44,128,0,0,60,128,0,0,0,0,0,0,0,0,0,0,0,0,45,0,1,1,1,20,76,210,65,232,209,81,14,48,178,7,99,151,175,199,80,138,229,156,102,201,2,8,0,0,0,0,0,0,0,1,3,8,0,0,0,0,0,0,0,41]),i=new Uint8Array([5,128,0,0,44,128,0,0,60,128,0,0,0,0,0,0,0,0,0,0,0,1,9,0,1,1,1,240,76,210,65,232,209,81,14,48,178,7,99,151,175,199,80,138,229,156,102,201,76,210,65,232,209,81,14,48,178,7,99,151,175,199,80,138,229,156,102,201,76,210,65,232,209,81,14,48,178,7,99,151,175,199,80,138,229,156,102,201,76,210,65,232,209,81,14,48,178,7,99,151,175,199,80,138,229,156,102,201,76,210,65,232,209,81,14,48,178,7,99,151,175,199,80,138,229,156,102,201,76,210,65,232,209,81,14,48,178,7,99,151,175,199,80,138,229,156,102,201,76,210,65,232,209,81,14,48,178,7,99,151,175,199,80,138,229,156,102,201,76,210,65,232,209,81,14,48,178,7,99,151,175,199,80,138,229,156,102,201,76,210,65,232,209,81,14,48,178,7,99,151,175,199,80,138,229,156,102,201,76,210,65,232,209,81,14,48,178,7,99,151,175,199,80,138,229,156,102,201,76,210,65,232,209,81,14,48,178,7,99,151,175,199,80,138,229,156,102,201,76,210,65,232,209,81,14,48,178,7,99,151,175,199,80,138,229,156,102,201,2,8,0,0,0,0,0,0,0,1,3,8,0,0,0,0,0,0,0,41]);describe("SendSignAuthorizationDelegationTask",()=>{const x=f(),n={v:27,r:"0x1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef",s:"0x1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef"},s=a({data:m(n)}),t=a({data:l});beforeEach(()=>{vi.resetAllMocks()}),describe("run",()=>{it("should send the message in chunks",async()=>{const e={derivationPath:"44'/60'/0'/0/0",address:"0x4Cd241E8d1510e30b2076397afc7508Ae59C66c9",chainId:1,nonce:41};x.sendCommand.mockResolvedValueOnce(s),x.sendCommand.mockResolvedValueOnce(t);const c=await new d(x,e).run();expect(x.sendCommand.mock.calls).toHaveLength(1),expect(x.sendCommand.mock.calls[0][0]).toStrictEqual(new r({data:new Uint8Array(u),isFirstChunk:!0})),expect(c.data).toStrictEqual(n)}),it("should send the long message in chunks",async()=>{const e={derivationPath:"44'/60'/0'/0/0",address:"0x4Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c9",chainId:1,nonce:41};x.sendCommand.mockResolvedValueOnce(t),x.sendCommand.mockResolvedValueOnce(s);const c=await new d(x,e).run();expect(x.sendCommand.mock.calls).toHaveLength(2),expect(x.sendCommand.mock.calls[0][0]).toStrictEqual(new r({data:i.slice(0,255),isFirstChunk:!0})),expect(x.sendCommand.mock.calls[1][0]).toStrictEqual(new r({data:i.slice(255,510),isFirstChunk:!1})),expect(c.data).toStrictEqual(n)}),it("should return an error if the command fails",async()=>{const e={derivationPath:"44'/60'/0'/0/0",address:"0x4Cd241E8d1510e30b2076397afc7508Ae59C66c9",chainId:1,nonce:41};x.sendCommand.mockResolvedValueOnce(a({error:new o("An error")}));const c=await new d(x,e).run();expect(c).toStrictEqual(a({error:new o("An error")}))}),it("should return an error if the command returns no data",async()=>{const e={derivationPath:"44'/60'/0'/0/0",address:"0x4Cd241E8d1510e30b2076397afc7508Ae59C66c9",chainId:1,nonce:41};x.sendCommand.mockResolvedValueOnce(t);const c=await new d(x,e).run();expect(c).toStrictEqual(a({error:new o("no signature returned")}))})})});
|
|
2
|
+
//# sourceMappingURL=SendSignAuthorizationDelegationTask.test.js.map
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../../../src/internal/app-binder/task/SendSignAuthorizationDelegationTask.test.ts"],
|
|
4
|
+
"sourcesContent": ["import { CommandResultFactory } from \"@ledgerhq/device-management-kit\";\nimport { InvalidStatusWordError } from \"@ledgerhq/device-management-kit\";\nimport { Just, Nothing } from \"purify-ts\";\n\nimport { SignEIP7702AuthorizationCommand } from \"@internal/app-binder/command/SignAuthorizationDelegationCommand\";\nimport { makeDeviceActionInternalApiMock } from \"@internal/app-binder/device-action/__test-utils__/makeInternalApi\";\n\nimport { SendSignAuthorizationDelegationTask } from \"./SendSignAuthorizationDelegationTask\";\n\nconst SMALL_MESSAGE_DATA = new Uint8Array([\n 0x05, 0x80, 0x00, 0x00, 0x2c, 0x80, 0x00, 0x00, 0x3c, 0x80, 0x00, 0x00, 0x00,\n 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x00, 0x01, 0x01,\n 0x01, 0x14, 0x4c, 0xd2, 0x41, 0xe8, 0xd1, 0x51, 0x0e, 0x30, 0xb2, 0x07, 0x63,\n 0x97, 0xaf, 0xc7, 0x50, 0x8a, 0xe5, 0x9c, 0x66, 0xc9, 0x02, 0x08, 0x00, 0x00,\n 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x03, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00,\n 0x00, 0x00, 0x29,\n]);\n\nconst LONG_MESSAGE_DATA = new Uint8Array([\n 0x05, 0x80, 0x00, 0x00, 0x2c, 0x80, 0x00, 0x00, 0x3c, 0x80, 0x00, 0x00, 0x00,\n 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x09, 0x00, 0x01, 0x01,\n 0x01, 0xf0, 0x4c, 0xd2, 0x41, 0xe8, 0xd1, 0x51, 0x0e, 0x30, 0xb2, 0x07, 0x63,\n 0x97, 0xaf, 0xc7, 0x50, 0x8a, 0xe5, 0x9c, 0x66, 0xc9, 0x4c, 0xd2, 0x41, 0xe8,\n 0xd1, 0x51, 0x0e, 0x30, 0xb2, 0x07, 0x63, 0x97, 0xaf, 0xc7, 0x50, 0x8a, 0xe5,\n 0x9c, 0x66, 0xc9, 0x4c, 0xd2, 0x41, 0xe8, 0xd1, 0x51, 0x0e, 0x30, 0xb2, 0x07,\n 0x63, 0x97, 0xaf, 0xc7, 0x50, 0x8a, 0xe5, 0x9c, 0x66, 0xc9, 0x4c, 0xd2, 0x41,\n 0xe8, 0xd1, 0x51, 0x0e, 0x30, 0xb2, 0x07, 0x63, 0x97, 0xaf, 0xc7, 0x50, 0x8a,\n 0xe5, 0x9c, 0x66, 0xc9, 0x4c, 0xd2, 0x41, 0xe8, 0xd1, 0x51, 0x0e, 0x30, 0xb2,\n 0x07, 0x63, 0x97, 0xaf, 0xc7, 0x50, 0x8a, 0xe5, 0x9c, 0x66, 0xc9, 0x4c, 0xd2,\n 0x41, 0xe8, 0xd1, 0x51, 0x0e, 0x30, 0xb2, 0x07, 0x63, 0x97, 0xaf, 0xc7, 0x50,\n 0x8a, 0xe5, 0x9c, 0x66, 0xc9, 0x4c, 0xd2, 0x41, 0xe8, 0xd1, 0x51, 0x0e, 0x30,\n 0xb2, 0x07, 0x63, 0x97, 0xaf, 0xc7, 0x50, 0x8a, 0xe5, 0x9c, 0x66, 0xc9, 0x4c,\n 0xd2, 0x41, 0xe8, 0xd1, 0x51, 0x0e, 0x30, 0xb2, 0x07, 0x63, 0x97, 0xaf, 0xc7,\n 0x50, 0x8a, 0xe5, 0x9c, 0x66, 0xc9, 0x4c, 0xd2, 0x41, 0xe8, 0xd1, 0x51, 0x0e,\n 0x30, 0xb2, 0x07, 0x63, 0x97, 0xaf, 0xc7, 0x50, 0x8a, 0xe5, 0x9c, 0x66, 0xc9,\n 0x4c, 0xd2, 0x41, 0xe8, 0xd1, 0x51, 0x0e, 0x30, 0xb2, 0x07, 0x63, 0x97, 0xaf,\n 0xc7, 0x50, 0x8a, 0xe5, 0x9c, 0x66, 0xc9, 0x4c, 0xd2, 0x41, 0xe8, 0xd1, 0x51,\n 0x0e, 0x30, 0xb2, 0x07, 0x63, 0x97, 0xaf, 0xc7, 0x50, 0x8a, 0xe5, 0x9c, 0x66,\n 0xc9, 0x4c, 0xd2, 0x41, 0xe8, 0xd1, 0x51, 0x0e, 0x30, 0xb2, 0x07, 0x63, 0x97,\n 0xaf, 0xc7, 0x50, 0x8a, 0xe5, 0x9c, 0x66, 0xc9, 0x02, 0x08, 0x00, 0x00, 0x00,\n 0x00, 0x00, 0x00, 0x00, 0x01, 0x03, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n 0x00, 0x29,\n]);\n\ndescribe(\"SendSignAuthorizationDelegationTask\", () => {\n const apiMock = makeDeviceActionInternalApiMock();\n const signature = {\n v: 27,\n r: \"0x1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef\",\n s: \"0x1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef\",\n };\n const resultOk = CommandResultFactory({\n data: Just(signature),\n });\n const resultNothing = CommandResultFactory({ data: Nothing });\n\n beforeEach(() => {\n vi.resetAllMocks();\n });\n\n describe(\"run\", () => {\n it(\"should send the message in chunks\", async () => {\n // GIVEN\n const args = {\n derivationPath: \"44'/60'/0'/0/0\",\n address: \"0x4Cd241E8d1510e30b2076397afc7508Ae59C66c9\",\n chainId: 1,\n nonce: 41,\n };\n apiMock.sendCommand.mockResolvedValueOnce(resultOk);\n apiMock.sendCommand.mockResolvedValueOnce(resultNothing);\n\n // WHEN\n const result = await new SendSignAuthorizationDelegationTask(\n apiMock,\n args,\n ).run();\n\n // THEN\n expect(apiMock.sendCommand.mock.calls).toHaveLength(1);\n expect(apiMock.sendCommand.mock.calls[0]![0]).toStrictEqual(\n new SignEIP7702AuthorizationCommand({\n data: new Uint8Array(SMALL_MESSAGE_DATA),\n isFirstChunk: true,\n }),\n );\n // eslint-disable-next-line @typescript-eslint/no-explicit-any\n expect((result as any).data).toStrictEqual(signature);\n });\n\n it(\"should send the long message in chunks\", async () => {\n // GIVEN\n const args = {\n derivationPath: \"44'/60'/0'/0/0\",\n address:\n \"0x4Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c94Cd241E8d1510e30b2076397afc7508Ae59C66c9\",\n chainId: 1,\n nonce: 41,\n };\n apiMock.sendCommand.mockResolvedValueOnce(resultNothing);\n apiMock.sendCommand.mockResolvedValueOnce(resultOk);\n\n // WHEN\n const result = await new SendSignAuthorizationDelegationTask(\n apiMock,\n args,\n ).run();\n\n // THEN\n expect(apiMock.sendCommand.mock.calls).toHaveLength(2);\n expect(apiMock.sendCommand.mock.calls[0]![0]).toStrictEqual(\n new SignEIP7702AuthorizationCommand({\n data: LONG_MESSAGE_DATA.slice(0, 255),\n isFirstChunk: true,\n }),\n );\n expect(apiMock.sendCommand.mock.calls[1]![0]).toStrictEqual(\n new SignEIP7702AuthorizationCommand({\n data: LONG_MESSAGE_DATA.slice(255, 510),\n isFirstChunk: false,\n }),\n );\n // eslint-disable-next-line @typescript-eslint/no-explicit-any\n expect((result as any).data).toStrictEqual(signature);\n });\n\n it(\"should return an error if the command fails\", async () => {\n // GIVEN\n const args = {\n derivationPath: \"44'/60'/0'/0/0\",\n address: \"0x4Cd241E8d1510e30b2076397afc7508Ae59C66c9\",\n chainId: 1,\n nonce: 41,\n };\n apiMock.sendCommand.mockResolvedValueOnce(\n CommandResultFactory({\n error: new InvalidStatusWordError(\"An error\"),\n }),\n );\n\n // WHEN\n const result = await new SendSignAuthorizationDelegationTask(\n apiMock,\n args,\n ).run();\n\n // THEN\n expect(result).toStrictEqual(\n CommandResultFactory({\n error: new InvalidStatusWordError(\"An error\"),\n }),\n );\n });\n\n it(\"should return an error if the command returns no data\", async () => {\n // GIVEN\n const args = {\n derivationPath: \"44'/60'/0'/0/0\",\n address: \"0x4Cd241E8d1510e30b2076397afc7508Ae59C66c9\",\n chainId: 1,\n nonce: 41,\n };\n apiMock.sendCommand.mockResolvedValueOnce(resultNothing);\n\n // WHEN\n const result = await new SendSignAuthorizationDelegationTask(\n apiMock,\n args,\n ).run();\n\n // THEN\n expect(result).toStrictEqual(\n CommandResultFactory({\n error: new InvalidStatusWordError(\"no signature returned\"),\n }),\n );\n });\n });\n});\n"],
|
|
5
|
+
"mappings": "AAAA,OAAS,wBAAAA,MAA4B,kCACrC,OAAS,0BAAAC,MAA8B,kCACvC,OAAS,QAAAC,EAAM,WAAAC,MAAe,YAE9B,OAAS,mCAAAC,MAAuC,kEAChD,OAAS,mCAAAC,MAAuC,oEAEhD,OAAS,uCAAAC,MAA2C,wCAEpD,MAAMC,EAAqB,IAAI,WAAW,CACxC,EAAM,IAAM,EAAM,EAAM,GAAM,IAAM,EAAM,EAAM,GAAM,IAAM,EAAM,EAAM,EACxE,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,GAAM,EAAM,EAAM,EACxE,EAAM,GAAM,GAAM,IAAM,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAAM,EAAM,GACxE,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,EAAM,EAAM,EAAM,EACxE,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EACxE,EAAM,EAAM,EACd,CAAC,EAEKC,EAAoB,IAAI,WAAW,CACvC,EAAM,IAAM,EAAM,EAAM,GAAM,IAAM,EAAM,EAAM,GAAM,IAAM,EAAM,EAAM,EACxE,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EACxE,EAAM,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAAM,EAAM,GACxE,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAAM,GAAM,IACxE,IAAM,GAAM,GAAM,GAAM,IAAM,EAAM,GAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IACxE,IAAM,IAAM,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAAM,EACxE,GAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAAM,GACxE,IAAM,IAAM,GAAM,GAAM,GAAM,IAAM,EAAM,GAAM,IAAM,IAAM,IAAM,GAAM,IACxE,IAAM,IAAM,IAAM,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IACxE,EAAM,GAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IACxE,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAAM,EAAM,GAAM,IAAM,IAAM,IAAM,GACxE,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,GAAM,GAAM,GACxE,IAAM,EAAM,GAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GACxE,IAAM,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAAM,EAAM,GAAM,IAAM,IAAM,IACxE,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,GAAM,GACxE,GAAM,IAAM,EAAM,GAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IACxE,GAAM,IAAM,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAAM,EAAM,GAAM,IAAM,IACxE,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,GACxE,GAAM,GAAM,IAAM,EAAM,GAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IACxE,IAAM,GAAM,IAAM,GAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAAM,EAAM,GAAM,IACxE,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAAM,EAAM,EAAM,EAAM,EAAM,EACxE,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EAAM,EACxE,EAAM,EACR,CAAC,EAED,SAAS,sCAAuC,IAAM,CACpD,MAAMC,EAAUJ,EAAgC,EAC1CK,EAAY,CAChB,EAAG,GACH,EAAG,qEACH,EAAG,oEACL,EACMC,EAAWX,EAAqB,CACpC,KAAME,EAAKQ,CAAS,CACtB,CAAC,EACKE,EAAgBZ,EAAqB,CAAE,KAAMG,CAAQ,CAAC,EAE5D,WAAW,IAAM,CACf,GAAG,cAAc,CACnB,CAAC,EAED,SAAS,MAAO,IAAM,CACpB,GAAG,oCAAqC,SAAY,CAElD,MAAMU,EAAO,CACX,eAAgB,iBAChB,QAAS,6CACT,QAAS,EACT,MAAO,EACT,EACAJ,EAAQ,YAAY,sBAAsBE,CAAQ,EAClDF,EAAQ,YAAY,sBAAsBG,CAAa,EAGvD,MAAME,EAAS,MAAM,IAAIR,EACvBG,EACAI,CACF,EAAE,IAAI,EAGN,OAAOJ,EAAQ,YAAY,KAAK,KAAK,EAAE,aAAa,CAAC,EACrD,OAAOA,EAAQ,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,CAAC,EAAE,cAC5C,IAAIL,EAAgC,CAClC,KAAM,IAAI,WAAWG,CAAkB,EACvC,aAAc,EAChB,CAAC,CACH,EAEA,OAAQO,EAAe,IAAI,EAAE,cAAcJ,CAAS,CACtD,CAAC,EAED,GAAG,yCAA0C,SAAY,CAEvD,MAAMG,EAAO,CACX,eAAgB,iBAChB,QACE,qeACF,QAAS,EACT,MAAO,EACT,EACAJ,EAAQ,YAAY,sBAAsBG,CAAa,EACvDH,EAAQ,YAAY,sBAAsBE,CAAQ,EAGlD,MAAMG,EAAS,MAAM,IAAIR,EACvBG,EACAI,CACF,EAAE,IAAI,EAGN,OAAOJ,EAAQ,YAAY,KAAK,KAAK,EAAE,aAAa,CAAC,EACrD,OAAOA,EAAQ,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,CAAC,EAAE,cAC5C,IAAIL,EAAgC,CAClC,KAAMI,EAAkB,MAAM,EAAG,GAAG,EACpC,aAAc,EAChB,CAAC,CACH,EACA,OAAOC,EAAQ,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,CAAC,EAAE,cAC5C,IAAIL,EAAgC,CAClC,KAAMI,EAAkB,MAAM,IAAK,GAAG,EACtC,aAAc,EAChB,CAAC,CACH,EAEA,OAAQM,EAAe,IAAI,EAAE,cAAcJ,CAAS,CACtD,CAAC,EAED,GAAG,8CAA+C,SAAY,CAE5D,MAAMG,EAAO,CACX,eAAgB,iBAChB,QAAS,6CACT,QAAS,EACT,MAAO,EACT,EACAJ,EAAQ,YAAY,sBAClBT,EAAqB,CACnB,MAAO,IAAIC,EAAuB,UAAU,CAC9C,CAAC,CACH,EAGA,MAAMa,EAAS,MAAM,IAAIR,EACvBG,EACAI,CACF,EAAE,IAAI,EAGN,OAAOC,CAAM,EAAE,cACbd,EAAqB,CACnB,MAAO,IAAIC,EAAuB,UAAU,CAC9C,CAAC,CACH,CACF,CAAC,EAED,GAAG,wDAAyD,SAAY,CAEtE,MAAMY,EAAO,CACX,eAAgB,iBAChB,QAAS,6CACT,QAAS,EACT,MAAO,EACT,EACAJ,EAAQ,YAAY,sBAAsBG,CAAa,EAGvD,MAAME,EAAS,MAAM,IAAIR,EACvBG,EACAI,CACF,EAAE,IAAI,EAGN,OAAOC,CAAM,EAAE,cACbd,EAAqB,CACnB,MAAO,IAAIC,EAAuB,uBAAuB,CAC3D,CAAC,CACH,CACF,CAAC,CACH,CAAC,CACH,CAAC",
|
|
6
|
+
"names": ["CommandResultFactory", "InvalidStatusWordError", "Just", "Nothing", "SignEIP7702AuthorizationCommand", "makeDeviceActionInternalApiMock", "SendSignAuthorizationDelegationTask", "SMALL_MESSAGE_DATA", "LONG_MESSAGE_DATA", "apiMock", "signature", "resultOk", "resultNothing", "args", "result"]
|
|
7
|
+
}
|
package/lib/esm/internal/di.js
CHANGED
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{Container as
|
|
1
|
+
import{Container as i}from"inversify";import{addressModuleFactory as a}from"./address/di/addressModule";import{appBindingModuleFactory as m}from"./app-binder/di/appBinderModule";import{eip7702ModuleFactory as d}from"./eip7702/di/eip7702Module";import{externalTypes as o}from"./externalTypes";import{messageModuleFactory as s}from"./message/di/messageModule";import{transactionModuleFactory as p}from"./transaction/di/transactionModule";import{typedDataModuleFactory as c}from"./typed-data/di/typedDataModule";const v=({dmk:t,sessionId:n,contextModule:r})=>{const e=new i;return e.bind(o.Dmk).toConstantValue(t),e.bind(o.ContextModule).toConstantValue(r),e.bind(o.SessionId).toConstantValue(n),e.load(a(),m(),d(),s(),p(),c()),e};export{v as makeContainer};
|
|
2
2
|
//# sourceMappingURL=di.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../src/internal/di.ts"],
|
|
4
|
-
"sourcesContent": ["import { type ContextModule } from \"@ledgerhq/context-module\";\nimport {\n type DeviceManagementKit,\n type DeviceSessionId,\n} from \"@ledgerhq/device-management-kit\";\nimport { Container } from \"inversify\";\n\n// import { makeLoggerMiddleware } from \"inversify-logger-middleware\";\nimport { addressModuleFactory } from \"@internal/address/di/addressModule\";\nimport { appBindingModuleFactory } from \"@internal/app-binder/di/appBinderModule\";\nimport { externalTypes } from \"@internal/externalTypes\";\nimport { messageModuleFactory } from \"@internal/message/di/messageModule\";\nimport { transactionModuleFactory } from \"@internal/transaction/di/transactionModule\";\nimport { typedDataModuleFactory } from \"@internal/typed-data/di/typedDataModule\";\n\n// Uncomment this line to enable the logger middleware\n// const logger = makeLoggerMiddleware();\n\nexport type MakeContainerProps = {\n dmk: DeviceManagementKit;\n sessionId: DeviceSessionId;\n contextModule: ContextModule;\n};\n\nexport const makeContainer = ({\n dmk,\n sessionId,\n contextModule,\n}: MakeContainerProps) => {\n const container = new Container();\n\n // Uncomment this line to enable the logger middleware\n // container.applyMiddleware(logger);\n\n container.bind<DeviceManagementKit>(externalTypes.Dmk).toConstantValue(dmk);\n container\n .bind<ContextModule>(externalTypes.ContextModule)\n .toConstantValue(contextModule);\n container\n .bind<DeviceSessionId>(externalTypes.SessionId)\n .toConstantValue(sessionId);\n\n container.load(\n addressModuleFactory(),\n appBindingModuleFactory(),\n messageModuleFactory(),\n transactionModuleFactory(),\n typedDataModuleFactory(),\n );\n\n return container;\n};\n"],
|
|
5
|
-
"mappings": "AAKA,OAAS,aAAAA,MAAiB,YAG1B,OAAS,wBAAAC,MAA4B,qCACrC,OAAS,2BAAAC,MAA+B,0CACxC,OAAS,iBAAAC,MAAqB,0BAC9B,OAAS,wBAAAC,MAA4B,qCACrC,OAAS,4BAAAC,MAAgC,6CACzC,OAAS,0BAAAC,MAA8B,0CAWhC,MAAMC,EAAgB,CAAC,CAC5B,IAAAC,EACA,UAAAC,EACA,cAAAC,CACF,IAA0B,CACxB,MAAMC,EAAY,
|
|
6
|
-
"names": ["Container", "addressModuleFactory", "appBindingModuleFactory", "externalTypes", "messageModuleFactory", "transactionModuleFactory", "typedDataModuleFactory", "makeContainer", "dmk", "sessionId", "contextModule", "container"]
|
|
4
|
+
"sourcesContent": ["import { type ContextModule } from \"@ledgerhq/context-module\";\nimport {\n type DeviceManagementKit,\n type DeviceSessionId,\n} from \"@ledgerhq/device-management-kit\";\nimport { Container } from \"inversify\";\n\n// import { makeLoggerMiddleware } from \"inversify-logger-middleware\";\nimport { addressModuleFactory } from \"@internal/address/di/addressModule\";\nimport { appBindingModuleFactory } from \"@internal/app-binder/di/appBinderModule\";\nimport { eip7702ModuleFactory } from \"@internal/eip7702/di/eip7702Module\";\nimport { externalTypes } from \"@internal/externalTypes\";\nimport { messageModuleFactory } from \"@internal/message/di/messageModule\";\nimport { transactionModuleFactory } from \"@internal/transaction/di/transactionModule\";\nimport { typedDataModuleFactory } from \"@internal/typed-data/di/typedDataModule\";\n\n// Uncomment this line to enable the logger middleware\n// const logger = makeLoggerMiddleware();\n\nexport type MakeContainerProps = {\n dmk: DeviceManagementKit;\n sessionId: DeviceSessionId;\n contextModule: ContextModule;\n};\n\nexport const makeContainer = ({\n dmk,\n sessionId,\n contextModule,\n}: MakeContainerProps) => {\n const container = new Container();\n\n // Uncomment this line to enable the logger middleware\n // container.applyMiddleware(logger);\n\n container.bind<DeviceManagementKit>(externalTypes.Dmk).toConstantValue(dmk);\n container\n .bind<ContextModule>(externalTypes.ContextModule)\n .toConstantValue(contextModule);\n container\n .bind<DeviceSessionId>(externalTypes.SessionId)\n .toConstantValue(sessionId);\n\n container.load(\n addressModuleFactory(),\n appBindingModuleFactory(),\n eip7702ModuleFactory(),\n messageModuleFactory(),\n transactionModuleFactory(),\n typedDataModuleFactory(),\n );\n\n return container;\n};\n"],
|
|
5
|
+
"mappings": "AAKA,OAAS,aAAAA,MAAiB,YAG1B,OAAS,wBAAAC,MAA4B,qCACrC,OAAS,2BAAAC,MAA+B,0CACxC,OAAS,wBAAAC,MAA4B,qCACrC,OAAS,iBAAAC,MAAqB,0BAC9B,OAAS,wBAAAC,MAA4B,qCACrC,OAAS,4BAAAC,MAAgC,6CACzC,OAAS,0BAAAC,MAA8B,0CAWhC,MAAMC,EAAgB,CAAC,CAC5B,IAAAC,EACA,UAAAC,EACA,cAAAC,CACF,IAA0B,CACxB,MAAMC,EAAY,IAAIZ,EAKtB,OAAAY,EAAU,KAA0BR,EAAc,GAAG,EAAE,gBAAgBK,CAAG,EAC1EG,EACG,KAAoBR,EAAc,aAAa,EAC/C,gBAAgBO,CAAa,EAChCC,EACG,KAAsBR,EAAc,SAAS,EAC7C,gBAAgBM,CAAS,EAE5BE,EAAU,KACRX,EAAqB,EACrBC,EAAwB,EACxBC,EAAqB,EACrBE,EAAqB,EACrBC,EAAyB,EACzBC,EAAuB,CACzB,EAEOK,CACT",
|
|
6
|
+
"names": ["Container", "addressModuleFactory", "appBindingModuleFactory", "eip7702ModuleFactory", "externalTypes", "messageModuleFactory", "transactionModuleFactory", "typedDataModuleFactory", "makeContainer", "dmk", "sessionId", "contextModule", "container"]
|
|
7
7
|
}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
import{ContainerModule as i}from"inversify";import{eip7702Types as n}from"../../eip7702/di/eip7702Types";import{SignDelegationAuthorizationUseCase as e}from"../../eip7702/use-case/SignDelegationAuthorizationUseCase";const c=()=>new i((o,t,r,a,s,p,u)=>{o(n.SignDelegationAuthorizationUseCase).to(e)});export{c as eip7702ModuleFactory};
|
|
2
|
+
//# sourceMappingURL=eip7702Module.js.map
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../../../src/internal/eip7702/di/eip7702Module.ts"],
|
|
4
|
+
"sourcesContent": ["import { ContainerModule } from \"inversify\";\n\nimport { eip7702Types } from \"@internal/eip7702/di/eip7702Types\";\nimport { SignDelegationAuthorizationUseCase } from \"@internal/eip7702/use-case/SignDelegationAuthorizationUseCase\";\n\nexport const eip7702ModuleFactory = () =>\n new ContainerModule(\n (\n bind,\n _unbind,\n _isBound,\n _rebind,\n _unbindAsync,\n _onActivation,\n _onDeactivation,\n ) => {\n bind(eip7702Types.SignDelegationAuthorizationUseCase).to(\n SignDelegationAuthorizationUseCase,\n );\n },\n );\n"],
|
|
5
|
+
"mappings": "AAAA,OAAS,mBAAAA,MAAuB,YAEhC,OAAS,gBAAAC,MAAoB,oCAC7B,OAAS,sCAAAC,MAA0C,gEAE5C,MAAMC,EAAuB,IAClC,IAAIH,EACF,CACEI,EACAC,EACAC,EACAC,EACAC,EACAC,EACAC,IACG,CACHN,EAAKH,EAAa,kCAAkC,EAAE,GACpDC,CACF,CACF,CACF",
|
|
6
|
+
"names": ["ContainerModule", "eip7702Types", "SignDelegationAuthorizationUseCase", "eip7702ModuleFactory", "bind", "_unbind", "_isBound", "_rebind", "_unbindAsync", "_onActivation", "_onDeactivation"]
|
|
7
|
+
}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
import{Container as t}from"inversify";import{eip7702ModuleFactory as r}from"./eip7702Module";describe("eip7702ModuleFactory",()=>{describe("Default",()=>{let o,e;beforeEach(()=>{e=r(),o=new t,o.load(e)}),it("should return the eip7702 module",()=>{expect(e).toBeDefined()})})});
|
|
2
|
+
//# sourceMappingURL=eip7702Module.test.js.map
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../../../src/internal/eip7702/di/eip7702Module.test.ts"],
|
|
4
|
+
"sourcesContent": ["import { Container } from \"inversify\";\n\nimport { eip7702ModuleFactory } from \"./eip7702Module\";\n\ndescribe(\"eip7702ModuleFactory\", () => {\n describe(\"Default\", () => {\n let container: Container;\n let mod: ReturnType<typeof eip7702ModuleFactory>;\n beforeEach(() => {\n mod = eip7702ModuleFactory();\n container = new Container();\n container.load(mod);\n });\n\n it(\"should return the eip7702 module\", () => {\n expect(mod).toBeDefined();\n });\n });\n});\n"],
|
|
5
|
+
"mappings": "AAAA,OAAS,aAAAA,MAAiB,YAE1B,OAAS,wBAAAC,MAA4B,kBAErC,SAAS,uBAAwB,IAAM,CACrC,SAAS,UAAW,IAAM,CACxB,IAAIC,EACAC,EACJ,WAAW,IAAM,CACfA,EAAMF,EAAqB,EAC3BC,EAAY,IAAIF,EAChBE,EAAU,KAAKC,CAAG,CACpB,CAAC,EAED,GAAG,mCAAoC,IAAM,CAC3C,OAAOA,CAAG,EAAE,YAAY,CAC1B,CAAC,CACH,CAAC,CACH,CAAC",
|
|
6
|
+
"names": ["Container", "eip7702ModuleFactory", "container", "mod"]
|
|
7
|
+
}
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../../../src/internal/eip7702/di/eip7702Types.ts"],
|
|
4
|
+
"sourcesContent": ["export const eip7702Types = {\n SignDelegationAuthorizationUseCase: Symbol.for(\n \"SignDelegationAuthorizationUseCase\",\n ),\n};\n"],
|
|
5
|
+
"mappings": "AAAO,MAAMA,EAAe,CAC1B,mCAAoC,OAAO,IACzC,oCACF,CACF",
|
|
6
|
+
"names": ["eip7702Types"]
|
|
7
|
+
}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
var u=Object.defineProperty;var c=Object.getOwnPropertyDescriptor;var d=(n,r,i,t)=>{for(var p=t>1?void 0:t?c(r,i):r,o=n.length-1,m;o>=0;o--)(m=n[o])&&(p=(t?m(r,i,p):m(p))||p);return t&&p&&u(r,i,p),p},B=(n,r)=>(i,t)=>r(i,t,n);import{inject as A,injectable as h}from"inversify";import{appBinderTypes as a}from"../../app-binder/di/appBinderTypes";let e=class{_appBinder;constructor(r){this._appBinder=r}execute(r,i,t,p){return this._appBinder.signDelegationAuthorization({derivationPath:r,nonce:i,address:t,chainId:p})}};e=d([h(),B(0,A(a.AppBinding))],e);export{e as SignDelegationAuthorizationUseCase};
|
|
2
|
+
//# sourceMappingURL=SignDelegationAuthorizationUseCase.js.map
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../../../src/internal/eip7702/use-case/SignDelegationAuthorizationUseCase.ts"],
|
|
4
|
+
"sourcesContent": ["import { inject, injectable } from \"inversify\";\n\nimport { SignDelegationAuthorizationDAReturnType } from \"@api/app-binder/SignDelegationAuthorizationTypes\";\nimport { appBinderTypes } from \"@internal/app-binder/di/appBinderTypes\";\nimport { EthAppBinder } from \"@internal/app-binder/EthAppBinder\";\n\n@injectable()\nexport class SignDelegationAuthorizationUseCase {\n private _appBinder: EthAppBinder;\n\n constructor(\n @inject(appBinderTypes.AppBinding)\n appBinding: EthAppBinder,\n ) {\n this._appBinder = appBinding;\n }\n\n execute(\n derivationPath: string,\n nonce: number,\n address: string,\n chainId: number,\n ): SignDelegationAuthorizationDAReturnType {\n return this._appBinder.signDelegationAuthorization({\n derivationPath,\n nonce,\n address,\n chainId,\n });\n }\n}\n"],
|
|
5
|
+
"mappings": "iOAAA,OAAS,UAAAA,EAAQ,cAAAC,MAAkB,YAGnC,OAAS,kBAAAC,MAAsB,yCAIxB,IAAMC,EAAN,KAAyC,CACtC,WAER,YAEEC,EACA,CACA,KAAK,WAAaA,CACpB,CAEA,QACEC,EACAC,EACAC,EACAC,EACyC,CACzC,OAAO,KAAK,WAAW,4BAA4B,CACjD,eAAAH,EACA,MAAAC,EACA,QAAAC,EACA,QAAAC,CACF,CAAC,CACH,CACF,EAvBaL,EAANM,EAAA,CADNC,EAAW,EAKPC,EAAA,EAAAC,EAAOC,EAAe,UAAU,IAJxBV",
|
|
6
|
+
"names": ["inject", "injectable", "appBinderTypes", "SignDelegationAuthorizationUseCase", "appBinding", "derivationPath", "nonce", "address", "chainId", "__decorateClass", "injectable", "__decorateParam", "inject", "appBinderTypes"]
|
|
7
|
+
}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
import{SignDelegationAuthorizationUseCase as s}from"./SignDelegationAuthorizationUseCase";describe("SignDelegationAuthorizationUseCase",()=>{it("should call signPersonalMessage on appBinder with the correct arguments",()=>{const e="44'/501'/0'/0'",n="address",i={signDelegationAuthorization:vi.fn()};new s(i).execute(e,42,n,2),expect(i.signDelegationAuthorization).toHaveBeenCalledWith({derivationPath:e,nonce:42,address:n,chainId:2})})});
|
|
2
|
+
//# sourceMappingURL=SignDelegationAuthorizationUseCase.test.js.map
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../../../src/internal/eip7702/use-case/SignDelegationAuthorizationUseCase.test.ts"],
|
|
4
|
+
"sourcesContent": ["import { type EthAppBinder } from \"@internal/app-binder/EthAppBinder\";\n\nimport { SignDelegationAuthorizationUseCase } from \"./SignDelegationAuthorizationUseCase\";\n\ndescribe(\"SignDelegationAuthorizationUseCase\", () => {\n it(\"should call signPersonalMessage on appBinder with the correct arguments\", () => {\n // Given\n const derivationPath = \"44'/501'/0'/0'\";\n const chainId = 2;\n const nonce = 42;\n const address = \"address\";\n const appBinder = {\n signDelegationAuthorization: vi.fn(),\n };\n const signMessageUseCase = new SignDelegationAuthorizationUseCase(\n appBinder as unknown as EthAppBinder,\n );\n\n // When\n signMessageUseCase.execute(derivationPath, nonce, address, chainId);\n\n // Then\n expect(appBinder.signDelegationAuthorization).toHaveBeenCalledWith({\n derivationPath,\n nonce,\n address,\n chainId,\n });\n });\n});\n"],
|
|
5
|
+
"mappings": "AAEA,OAAS,sCAAAA,MAA0C,uCAEnD,SAAS,qCAAsC,IAAM,CACnD,GAAG,0EAA2E,IAAM,CAElF,MAAMC,EAAiB,iBAGjBC,EAAU,UACVC,EAAY,CAChB,4BAA6B,GAAG,GAAG,CACrC,EAC2B,IAAIH,EAC7BG,CACF,EAGmB,QAAQF,EAAgB,GAAOC,EAAS,CAAO,EAGlE,OAAOC,EAAU,2BAA2B,EAAE,qBAAqB,CACjE,eAAAF,EACA,SACA,QAAAC,EACA,SACF,CAAC,CACH,CAAC,CACH,CAAC",
|
|
6
|
+
"names": ["SignDelegationAuthorizationUseCase", "derivationPath", "address", "appBinder"]
|
|
7
|
+
}
|
package/lib/esm/package.json
CHANGED
|
@@ -36,13 +36,13 @@
|
|
|
36
36
|
},
|
|
37
37
|
"dependencies": {
|
|
38
38
|
"@ledgerhq/signer-utils": "workspace:*",
|
|
39
|
-
"ethers": "
|
|
40
|
-
"inversify": "
|
|
41
|
-
"inversify-logger-middleware": "
|
|
42
|
-
"purify-ts": "
|
|
43
|
-
"reflect-metadata": "
|
|
44
|
-
"semver": "
|
|
45
|
-
"xstate": "
|
|
39
|
+
"ethers": "6.13.6-beta.1",
|
|
40
|
+
"inversify": "^6.2.2",
|
|
41
|
+
"inversify-logger-middleware": "^3.1.0",
|
|
42
|
+
"purify-ts": "^2.1.0",
|
|
43
|
+
"reflect-metadata": "^0.2.2",
|
|
44
|
+
"semver": "^7.6.3",
|
|
45
|
+
"xstate": "^5.19.2"
|
|
46
46
|
},
|
|
47
47
|
"devDependencies": {
|
|
48
48
|
"@ledgerhq/context-module": "workspace:*",
|
|
@@ -52,9 +52,9 @@
|
|
|
52
52
|
"@ledgerhq/prettier-config-dsdk": "workspace:*",
|
|
53
53
|
"@ledgerhq/tsconfig-dsdk": "workspace:*",
|
|
54
54
|
"@ledgerhq/vitest-config-dmk": "workspace:*",
|
|
55
|
-
"@types/semver": "
|
|
56
|
-
"rxjs": "
|
|
57
|
-
"ts-node": "
|
|
55
|
+
"@types/semver": "^7.5.8",
|
|
56
|
+
"rxjs": "^7.8.2",
|
|
57
|
+
"ts-node": "^10.9.2"
|
|
58
58
|
},
|
|
59
59
|
"peerDependencies": {
|
|
60
60
|
"@ledgerhq/context-module": "workspace:*",
|
|
@@ -1,16 +1,18 @@
|
|
|
1
1
|
import { type GetAddressDAReturnType } from "./app-binder/GetAddressDeviceActionTypes";
|
|
2
|
+
import { type SignDelegationAuthorizationDAReturnType } from "./app-binder/SignDelegationAuthorizationTypes";
|
|
3
|
+
import { type SignPersonalMessageDAReturnType } from "./app-binder/SignPersonalMessageDeviceActionTypes";
|
|
4
|
+
import { type SignTransactionDAReturnType } from "./app-binder/SignTransactionDeviceActionTypes";
|
|
2
5
|
import { type SignTypedDataDAReturnType } from "./app-binder/SignTypedDataDeviceActionTypes";
|
|
3
6
|
import { type AddressOptions } from "./model/AddressOptions";
|
|
4
7
|
import { type MessageOptions } from "./model/MessageOptions";
|
|
5
8
|
import { type TransactionOptions } from "./model/TransactionOptions";
|
|
6
9
|
import { type TypedData } from "./model/TypedData";
|
|
7
10
|
import { type TypedDataOptions } from "./model/TypedDataOptions";
|
|
8
|
-
import { type SignPersonalMessageDAReturnType } from "./app-binder/SignPersonalMessageDeviceActionTypes";
|
|
9
|
-
import { type SignTransactionDAReturnType } from "./app-binder/SignTransactionDeviceActionTypes";
|
|
10
11
|
export interface SignerEth {
|
|
11
12
|
signTransaction: (derivationPath: string, transaction: Uint8Array, options?: TransactionOptions) => SignTransactionDAReturnType;
|
|
12
13
|
signMessage: (derivationPath: string, message: string | Uint8Array, options?: MessageOptions) => SignPersonalMessageDAReturnType;
|
|
13
14
|
signTypedData: (derivationPath: string, typedData: TypedData, options?: TypedDataOptions) => SignTypedDataDAReturnType;
|
|
14
15
|
getAddress: (derivationPath: string, options?: AddressOptions) => GetAddressDAReturnType;
|
|
16
|
+
signDelegationAuthorization: (derivationPath: string, chainId: number, contractAddress: string, nonce: number) => SignDelegationAuthorizationDAReturnType;
|
|
15
17
|
}
|
|
16
18
|
//# sourceMappingURL=SignerEth.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"SignerEth.d.ts","sourceRoot":"","sources":["../../../src/api/SignerEth.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,sBAAsB,EAAE,MAAM,6CAA6C,CAAC;AAC1F,OAAO,EAAE,KAAK,
|
|
1
|
+
{"version":3,"file":"SignerEth.d.ts","sourceRoot":"","sources":["../../../src/api/SignerEth.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,sBAAsB,EAAE,MAAM,6CAA6C,CAAC;AAC1F,OAAO,EAAE,KAAK,uCAAuC,EAAE,MAAM,kDAAkD,CAAC;AAChH,OAAO,EAAE,KAAK,+BAA+B,EAAE,MAAM,sDAAsD,CAAC;AAC5G,OAAO,EAAE,KAAK,2BAA2B,EAAE,MAAM,kDAAkD,CAAC;AACpG,OAAO,EAAE,KAAK,yBAAyB,EAAE,MAAM,gDAAgD,CAAC;AAChG,OAAO,EAAE,KAAK,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAChE,OAAO,EAAE,KAAK,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAChE,OAAO,EAAE,KAAK,kBAAkB,EAAE,MAAM,+BAA+B,CAAC;AACxE,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,KAAK,gBAAgB,EAAE,MAAM,6BAA6B,CAAC;AAEpE,MAAM,WAAW,SAAS;IACxB,eAAe,EAAE,CACf,cAAc,EAAE,MAAM,EACtB,WAAW,EAAE,UAAU,EACvB,OAAO,CAAC,EAAE,kBAAkB,KACzB,2BAA2B,CAAC;IACjC,WAAW,EAAE,CACX,cAAc,EAAE,MAAM,EACtB,OAAO,EAAE,MAAM,GAAG,UAAU,EAC5B,OAAO,CAAC,EAAE,cAAc,KACrB,+BAA+B,CAAC;IACrC,aAAa,EAAE,CACb,cAAc,EAAE,MAAM,EACtB,SAAS,EAAE,SAAS,EACpB,OAAO,CAAC,EAAE,gBAAgB,KACvB,yBAAyB,CAAC;IAC/B,UAAU,EAAE,CACV,cAAc,EAAE,MAAM,EACtB,OAAO,CAAC,EAAE,cAAc,KACrB,sBAAsB,CAAC;IAC5B,2BAA2B,EAAE,CAC3B,cAAc,EAAE,MAAM,EACtB,OAAO,EAAE,MAAM,EACf,eAAe,EAAE,MAAM,EACvB,KAAK,EAAE,MAAM,KACV,uCAAuC,CAAC;CAC9C"}
|
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
import { type CommandErrorResult, type DeviceActionState, type ExecuteDeviceActionReturnType, type OpenAppDAError, type OpenAppDARequiredInteraction, type UserInteractionRequired } from "@ledgerhq/device-management-kit";
|
|
2
|
+
import { type Signature } from "../model/Signature";
|
|
3
|
+
import { type EthErrorCodes } from "../../internal/app-binder/command/utils/ethAppErrors";
|
|
4
|
+
export type SignDelegationAuthorizationDAOutput = Signature;
|
|
5
|
+
export type SignDelegationAuthorizationDAInput = {
|
|
6
|
+
readonly derivationPath: string;
|
|
7
|
+
readonly address: `0x${string}`;
|
|
8
|
+
readonly chainId: number;
|
|
9
|
+
readonly nonce: number;
|
|
10
|
+
};
|
|
11
|
+
export type SignDelegationAuthorizationDAError = OpenAppDAError | CommandErrorResult<EthErrorCodes>["error"];
|
|
12
|
+
type SignDelegationAuthorizationDARequiredInteraction = OpenAppDARequiredInteraction | UserInteractionRequired.SignDelegationAuthorization;
|
|
13
|
+
export type SignDelegationAuthorizationDAIntermediateValue = {
|
|
14
|
+
requiredUserInteraction: SignDelegationAuthorizationDARequiredInteraction;
|
|
15
|
+
};
|
|
16
|
+
export type SignDelegationAuthorizationDAState = DeviceActionState<SignDelegationAuthorizationDAOutput, SignDelegationAuthorizationDAError, SignDelegationAuthorizationDAIntermediateValue>;
|
|
17
|
+
export type SignDelegationAuthorizationDAReturnType = ExecuteDeviceActionReturnType<SignDelegationAuthorizationDAOutput, SignDelegationAuthorizationDAError, SignDelegationAuthorizationDAIntermediateValue>;
|
|
18
|
+
export {};
|
|
19
|
+
//# sourceMappingURL=SignDelegationAuthorizationTypes.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SignDelegationAuthorizationTypes.d.ts","sourceRoot":"","sources":["../../../../src/api/app-binder/SignDelegationAuthorizationTypes.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,kBAAkB,EACvB,KAAK,iBAAiB,EACtB,KAAK,6BAA6B,EAClC,KAAK,cAAc,EACnB,KAAK,4BAA4B,EACjC,KAAK,uBAAuB,EAC7B,MAAM,iCAAiC,CAAC;AAEzC,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,KAAK,aAAa,EAAE,MAAM,iDAAiD,CAAC;AAErF,MAAM,MAAM,mCAAmC,GAAG,SAAS,CAAC;AAE5D,MAAM,MAAM,kCAAkC,GAAG;IAC/C,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAC;IAChC,QAAQ,CAAC,OAAO,EAAE,KAAK,MAAM,EAAE,CAAC;IAChC,QAAQ,CAAC,OAAO,EAAE,MAAM,CAAC;IACzB,QAAQ,CAAC,KAAK,EAAE,MAAM,CAAC;CACxB,CAAC;AAEF,MAAM,MAAM,kCAAkC,GAC1C,cAAc,GACd,kBAAkB,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC;AAE/C,KAAK,gDAAgD,GACjD,4BAA4B,GAC5B,uBAAuB,CAAC,2BAA2B,CAAC;AAExD,MAAM,MAAM,8CAA8C,GAAG;IAC3D,uBAAuB,EAAE,gDAAgD,CAAC;CAC3E,CAAC;AAEF,MAAM,MAAM,kCAAkC,GAAG,iBAAiB,CAChE,mCAAmC,EACnC,kCAAkC,EAClC,8CAA8C,CAC/C,CAAC;AAEF,MAAM,MAAM,uCAAuC,GACjD,6BAA6B,CAC3B,mCAAmC,EACnC,kCAAkC,EAClC,8CAA8C,CAC/C,CAAC"}
|
package/lib/types/api/index.d.ts
CHANGED
|
@@ -1,4 +1,9 @@
|
|
|
1
1
|
export * from "./app-binder/GetAddressDeviceActionTypes";
|
|
2
|
+
export { type SignDelegationAuthorizationDAError } from "./app-binder/SignDelegationAuthorizationTypes";
|
|
3
|
+
export { type SignDelegationAuthorizationDAInput } from "./app-binder/SignDelegationAuthorizationTypes";
|
|
4
|
+
export { type SignDelegationAuthorizationDAOutput } from "./app-binder/SignDelegationAuthorizationTypes";
|
|
5
|
+
export { type SignDelegationAuthorizationDAState } from "./app-binder/SignDelegationAuthorizationTypes";
|
|
6
|
+
export { type SignDelegationAuthorizationDAIntermediateValue } from "./app-binder/SignDelegationAuthorizationTypes";
|
|
2
7
|
export type { SignPersonalMessageDAError, SignPersonalMessageDAIntermediateValue, SignPersonalMessageDAOutput, } from "./app-binder/SignPersonalMessageDeviceActionTypes";
|
|
3
8
|
export { type SignTransactionDAError, type SignTransactionDAInput, type SignTransactionDAIntermediateValue, type SignTransactionDAOutput, type SignTransactionDAState, SignTransactionDAStep, } from "./app-binder/SignTransactionDeviceActionTypes";
|
|
4
9
|
export { type SignTypedDataDAError, type SignTypedDataDAInput, type SignTypedDataDAIntermediateValue, type SignTypedDataDAOutput, type SignTypedDataDAState, SignTypedDataDAStateStep, } from "./app-binder/SignTypedDataDeviceActionTypes";
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/api/index.ts"],"names":[],"mappings":"AAAA,cAAc,6CAA6C,CAAC;AAC5D,YAAY,EACV,0BAA0B,EAC1B,sCAAsC,EACtC,2BAA2B,GAC5B,MAAM,sDAAsD,CAAC;AAC9D,OAAO,EACL,KAAK,sBAAsB,EAC3B,KAAK,sBAAsB,EAC3B,KAAK,kCAAkC,EACvC,KAAK,uBAAuB,EAC5B,KAAK,sBAAsB,EAC3B,qBAAqB,GACtB,MAAM,kDAAkD,CAAC;AAC1D,OAAO,EACL,KAAK,oBAAoB,EACzB,KAAK,oBAAoB,EACzB,KAAK,gCAAgC,EACrC,KAAK,qBAAqB,EAC1B,KAAK,oBAAoB,EACzB,wBAAwB,GACzB,MAAM,gDAAgD,CAAC;AACxD,cAAc,oBAAoB,CAAC;AACnC,cAAc,2BAA2B,CAAC;AAC1C,cAAc,sBAAsB,CAAC;AACrC,cAAc,+BAA+B,CAAC;AAC9C,cAAc,4BAA4B,CAAC;AAC3C,cAAc,sBAAsB,CAAC;AACrC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,uBAAuB,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/api/index.ts"],"names":[],"mappings":"AAAA,cAAc,6CAA6C,CAAC;AAC5D,OAAO,EAAE,KAAK,kCAAkC,EAAE,MAAM,kDAAkD,CAAC;AAC3G,OAAO,EAAE,KAAK,kCAAkC,EAAE,MAAM,kDAAkD,CAAC;AAC3G,OAAO,EAAE,KAAK,mCAAmC,EAAE,MAAM,kDAAkD,CAAC;AAC5G,OAAO,EAAE,KAAK,kCAAkC,EAAE,MAAM,kDAAkD,CAAC;AAC3G,OAAO,EAAE,KAAK,8CAA8C,EAAE,MAAM,kDAAkD,CAAC;AACvH,YAAY,EACV,0BAA0B,EAC1B,sCAAsC,EACtC,2BAA2B,GAC5B,MAAM,sDAAsD,CAAC;AAC9D,OAAO,EACL,KAAK,sBAAsB,EAC3B,KAAK,sBAAsB,EAC3B,KAAK,kCAAkC,EACvC,KAAK,uBAAuB,EAC5B,KAAK,sBAAsB,EAC3B,qBAAqB,GACtB,MAAM,kDAAkD,CAAC;AAC1D,OAAO,EACL,KAAK,oBAAoB,EACzB,KAAK,oBAAoB,EACzB,KAAK,gCAAgC,EACrC,KAAK,qBAAqB,EAC1B,KAAK,oBAAoB,EACzB,wBAAwB,GACzB,MAAM,gDAAgD,CAAC;AACxD,cAAc,oBAAoB,CAAC;AACnC,cAAc,2BAA2B,CAAC;AAC1C,cAAc,sBAAsB,CAAC;AACrC,cAAc,+BAA+B,CAAC;AAC9C,cAAc,4BAA4B,CAAC;AAC3C,cAAc,sBAAsB,CAAC;AACrC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,uBAAuB,CAAC"}
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
import { type ContextModule } from "@ledgerhq/context-module";
|
|
2
2
|
import { type DeviceManagementKit, type DeviceSessionId } from "@ledgerhq/device-management-kit";
|
|
3
3
|
import { type GetAddressDAReturnType } from "../api/app-binder/GetAddressDeviceActionTypes";
|
|
4
|
+
import { type SignDelegationAuthorizationDAReturnType } from "../api/app-binder/SignDelegationAuthorizationTypes";
|
|
4
5
|
import { type SignPersonalMessageDAReturnType } from "../api/app-binder/SignPersonalMessageDeviceActionTypes";
|
|
5
6
|
import { type SignTransactionDAReturnType } from "../api/app-binder/SignTransactionDeviceActionTypes";
|
|
6
7
|
import { type SignTypedDataDAReturnType } from "../api/app-binder/SignTypedDataDeviceActionTypes";
|
|
@@ -22,6 +23,7 @@ export declare class DefaultSignerEth implements SignerEth {
|
|
|
22
23
|
signMessage(derivationPath: string, message: string | Uint8Array, options?: MessageOptions): SignPersonalMessageDAReturnType;
|
|
23
24
|
signTypedData(derivationPath: string, typedData: TypedData, options?: TypedDataOptions): SignTypedDataDAReturnType;
|
|
24
25
|
getAddress(derivationPath: string, options?: AddressOptions): GetAddressDAReturnType;
|
|
26
|
+
signDelegationAuthorization(derivationPath: string, chainId: number, contractAddress: string, nonce: number): SignDelegationAuthorizationDAReturnType;
|
|
25
27
|
}
|
|
26
28
|
export {};
|
|
27
29
|
//# sourceMappingURL=DefaultSignerEth.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"DefaultSignerEth.d.ts","sourceRoot":"","sources":["../../../src/internal/DefaultSignerEth.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAC9D,OAAO,EACL,KAAK,mBAAmB,EACxB,KAAK,eAAe,EACrB,MAAM,iCAAiC,CAAC;AAGzC,OAAO,EAAE,KAAK,sBAAsB,EAAE,MAAM,6CAA6C,CAAC;AAC1F,OAAO,EAAE,KAAK,+BAA+B,EAAE,MAAM,sDAAsD,CAAC;AAC5G,OAAO,EAAE,KAAK,2BAA2B,EAAE,MAAM,kDAAkD,CAAC;AACpG,OAAO,EAAE,KAAK,yBAAyB,EAAE,MAAM,gDAAgD,CAAC;AAChG,OAAO,EAAE,KAAK,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAChE,OAAO,EAAE,KAAK,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAChE,OAAO,EAAE,KAAK,kBAAkB,EAAE,MAAM,+BAA+B,CAAC;AACxE,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,KAAK,gBAAgB,EAAE,MAAM,6BAA6B,CAAC;AACpE,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,gBAAgB,CAAC;
|
|
1
|
+
{"version":3,"file":"DefaultSignerEth.d.ts","sourceRoot":"","sources":["../../../src/internal/DefaultSignerEth.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAC9D,OAAO,EACL,KAAK,mBAAmB,EACxB,KAAK,eAAe,EACrB,MAAM,iCAAiC,CAAC;AAGzC,OAAO,EAAE,KAAK,sBAAsB,EAAE,MAAM,6CAA6C,CAAC;AAC1F,OAAO,EAAE,KAAK,uCAAuC,EAAE,MAAM,kDAAkD,CAAC;AAChH,OAAO,EAAE,KAAK,+BAA+B,EAAE,MAAM,sDAAsD,CAAC;AAC5G,OAAO,EAAE,KAAK,2BAA2B,EAAE,MAAM,kDAAkD,CAAC;AACpG,OAAO,EAAE,KAAK,yBAAyB,EAAE,MAAM,gDAAgD,CAAC;AAChG,OAAO,EAAE,KAAK,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAChE,OAAO,EAAE,KAAK,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAChE,OAAO,EAAE,KAAK,kBAAkB,EAAE,MAAM,+BAA+B,CAAC;AACxE,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,KAAK,gBAAgB,EAAE,MAAM,6BAA6B,CAAC;AACpE,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,gBAAgB,CAAC;AAchD,KAAK,4BAA4B,GAAG;IAClC,GAAG,EAAE,mBAAmB,CAAC;IACzB,SAAS,EAAE,eAAe,CAAC;IAC3B,aAAa,EAAE,aAAa,CAAC;CAC9B,CAAC;AAEF,qBAAa,gBAAiB,YAAW,SAAS;IAChD,OAAO,CAAC,UAAU,CAAY;gBAElB,EAAE,GAAG,EAAE,SAAS,EAAE,aAAa,EAAE,EAAE,4BAA4B;IAI3E,eAAe,CACb,cAAc,EAAE,MAAM,EACtB,WAAW,EAAE,UAAU,EACvB,OAAO,CAAC,EAAE,kBAAkB,GAC3B,2BAA2B;IAM9B,WAAW,CACT,cAAc,EAAE,MAAM,EACtB,OAAO,EAAE,MAAM,GAAG,UAAU,EAC5B,OAAO,CAAC,EAAE,cAAc,GACvB,+BAA+B;IAMlC,aAAa,CACX,cAAc,EAAE,MAAM,EACtB,SAAS,EAAE,SAAS,EACpB,OAAO,CAAC,EAAE,gBAAgB,GACzB,yBAAyB;IAM5B,UAAU,CACR,cAAc,EAAE,MAAM,EACtB,OAAO,CAAC,EAAE,cAAc,GACvB,sBAAsB;IAMzB,2BAA2B,CACzB,cAAc,EAAE,MAAM,EACtB,OAAO,EAAE,MAAM,EACf,eAAe,EAAE,MAAM,EACvB,KAAK,EAAE,MAAM,GACZ,uCAAuC;CAO3C"}
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
import { type ContextModule } from "@ledgerhq/context-module";
|
|
2
2
|
import { DeviceManagementKit, type DeviceSessionId } from "@ledgerhq/device-management-kit";
|
|
3
3
|
import { type GetAddressDAReturnType } from "../../api/app-binder/GetAddressDeviceActionTypes";
|
|
4
|
+
import { SignDelegationAuthorizationDAReturnType } from "../../api/app-binder/SignDelegationAuthorizationTypes";
|
|
4
5
|
import { type SignPersonalMessageDAReturnType } from "../../api/app-binder/SignPersonalMessageDeviceActionTypes";
|
|
5
6
|
import { type SignTransactionDAReturnType } from "../../api/app-binder/SignTransactionDeviceActionTypes";
|
|
6
7
|
import { type SignTypedDataDAReturnType } from "../../api/app-binder/SignTypedDataDeviceActionTypes";
|
|
@@ -38,5 +39,11 @@ export declare class EthAppBinder {
|
|
|
38
39
|
data: TypedData;
|
|
39
40
|
skipOpenApp: boolean;
|
|
40
41
|
}): SignTypedDataDAReturnType;
|
|
42
|
+
signDelegationAuthorization(args: {
|
|
43
|
+
derivationPath: string;
|
|
44
|
+
chainId: number;
|
|
45
|
+
address: string;
|
|
46
|
+
nonce: number;
|
|
47
|
+
}): SignDelegationAuthorizationDAReturnType;
|
|
41
48
|
}
|
|
42
49
|
//# sourceMappingURL=EthAppBinder.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"EthAppBinder.d.ts","sourceRoot":"","sources":["../../../../src/internal/app-binder/EthAppBinder.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAC9D,OAAO,EACL,mBAAmB,EACnB,KAAK,eAAe,EACrB,MAAM,iCAAiC,CAAC;AAQzC,OAAO,EAAE,KAAK,sBAAsB,EAAE,MAAM,6CAA6C,CAAC;AAC1F,OAAO,EAAE,KAAK,+BAA+B,EAAE,MAAM,sDAAsD,CAAC;AAC5G,OAAO,EAAE,KAAK,2BAA2B,EAAE,MAAM,kDAAkD,CAAC;AACpG,OAAO,EAAE,KAAK,yBAAyB,EAAE,MAAM,gDAAgD,CAAC;AAChG,OAAO,EAAE,KAAK,kBAAkB,EAAE,MAAM,+BAA+B,CAAC;AACxE,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,sBAAsB,CAAC;AAKtD,OAAO,EAAE,wBAAwB,EAAE,MAAM,+DAA+D,CAAC;AACzG,OAAO,EAAE,wBAAwB,EAAE,MAAM,+DAA+D,CAAC;AACzG,OAAO,EAAE,KAAK,sBAAsB,EAAE,MAAM,qDAAqD,CAAC;
|
|
1
|
+
{"version":3,"file":"EthAppBinder.d.ts","sourceRoot":"","sources":["../../../../src/internal/app-binder/EthAppBinder.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAC9D,OAAO,EACL,mBAAmB,EACnB,KAAK,eAAe,EACrB,MAAM,iCAAiC,CAAC;AAQzC,OAAO,EAAE,KAAK,sBAAsB,EAAE,MAAM,6CAA6C,CAAC;AAC1F,OAAO,EAAE,uCAAuC,EAAE,MAAM,kDAAkD,CAAC;AAC3G,OAAO,EAAE,KAAK,+BAA+B,EAAE,MAAM,sDAAsD,CAAC;AAC5G,OAAO,EAAE,KAAK,2BAA2B,EAAE,MAAM,kDAAkD,CAAC;AACpG,OAAO,EAAE,KAAK,yBAAyB,EAAE,MAAM,gDAAgD,CAAC;AAChG,OAAO,EAAE,KAAK,kBAAkB,EAAE,MAAM,+BAA+B,CAAC;AACxE,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,sBAAsB,CAAC;AAKtD,OAAO,EAAE,wBAAwB,EAAE,MAAM,+DAA+D,CAAC;AACzG,OAAO,EAAE,wBAAwB,EAAE,MAAM,+DAA+D,CAAC;AACzG,OAAO,EAAE,KAAK,sBAAsB,EAAE,MAAM,qDAAqD,CAAC;AAOlG,qBACa,YAAY;IAEM,OAAO,CAAC,GAAG;IACD,OAAO,CAAC,aAAa;IAE1D,OAAO,CAAC,MAAM;IAEd,OAAO,CAAC,MAAM;IACmB,OAAO,CAAC,SAAS;gBANf,GAAG,EAAE,mBAAmB,EACd,aAAa,EAAE,aAAa,EAEjE,MAAM,EAAE,wBAAwB,EAEhC,MAAM,EAAE,wBAAwB,EACC,SAAS,EAAE,eAAe;IAGrE,UAAU,CAAC,IAAI,EAAE;QACf,cAAc,EAAE,MAAM,CAAC;QACvB,aAAa,EAAE,OAAO,CAAC;QACvB,eAAe,EAAE,OAAO,CAAC;QACzB,WAAW,EAAE,OAAO,CAAC;KACtB,GAAG,sBAAsB;IAiB1B,mBAAmB,CAAC,IAAI,EAAE;QACxB,cAAc,EAAE,MAAM,CAAC;QACvB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,WAAW,EAAE,OAAO,CAAC;KACtB,GAAG,+BAA+B;IAgBnC,eAAe,CAAC,IAAI,EAAE;QACpB,cAAc,EAAE,MAAM,CAAC;QACvB,WAAW,EAAE,UAAU,CAAC;QACxB,OAAO,CAAC,EAAE,kBAAkB,CAAC;KAC9B,GAAG,2BAA2B;IAgB/B,aAAa,CAAC,IAAI,EAAE;QAClB,cAAc,EAAE,MAAM,CAAC;QACvB,MAAM,EAAE,sBAAsB,CAAC;QAC/B,IAAI,EAAE,SAAS,CAAC;QAChB,WAAW,EAAE,OAAO,CAAC;KACtB,GAAG,yBAAyB;IAe7B,2BAA2B,CAAC,IAAI,EAAE;QAChC,cAAc,EAAE,MAAM,CAAC;QACvB,OAAO,EAAE,MAAM,CAAC;QAChB,OAAO,EAAE,MAAM,CAAC;QAChB,KAAK,EAAE,MAAM,CAAC;KACf,GAAG,uCAAuC;CAgB5C"}
|
|
@@ -0,0 +1,29 @@
|
|
|
1
|
+
import { type Apdu, type ApduResponse, type Command, type CommandResult } from "@ledgerhq/device-management-kit";
|
|
2
|
+
import { Maybe } from "purify-ts";
|
|
3
|
+
import { type Signature } from "../../../api/model/Signature";
|
|
4
|
+
import { type EthErrorCodes } from "./utils/ethAppErrors";
|
|
5
|
+
export type SignEIP7702AuthorizationCommandArgs = {
|
|
6
|
+
/**
|
|
7
|
+
* The data to sign in max 255 bytes chunks
|
|
8
|
+
* Data is a concatenation of the following:
|
|
9
|
+
* - Derivation path length (1 byte)
|
|
10
|
+
* - Derivation path (4 bytes per element)
|
|
11
|
+
* - Nonce (4 bytes)
|
|
12
|
+
* - Chain ID (4 bytes)
|
|
13
|
+
* - Address (20 bytes)
|
|
14
|
+
*/
|
|
15
|
+
readonly data: Uint8Array;
|
|
16
|
+
/**
|
|
17
|
+
* If this is the first chunk of the message
|
|
18
|
+
*/
|
|
19
|
+
readonly isFirstChunk: boolean;
|
|
20
|
+
};
|
|
21
|
+
export type SignEIP7702AuthorizationCommandResponse = Maybe<Signature>;
|
|
22
|
+
export declare class SignEIP7702AuthorizationCommand implements Command<SignEIP7702AuthorizationCommandResponse, SignEIP7702AuthorizationCommandArgs, EthErrorCodes> {
|
|
23
|
+
readonly args: SignEIP7702AuthorizationCommandArgs;
|
|
24
|
+
private readonly errorHelper;
|
|
25
|
+
constructor(args: SignEIP7702AuthorizationCommandArgs);
|
|
26
|
+
getApdu(): Apdu;
|
|
27
|
+
parseResponse(apduResponse: ApduResponse): CommandResult<SignEIP7702AuthorizationCommandResponse, EthErrorCodes>;
|
|
28
|
+
}
|
|
29
|
+
//# sourceMappingURL=SignAuthorizationDelegationCommand.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SignAuthorizationDelegationCommand.d.ts","sourceRoot":"","sources":["../../../../../src/internal/app-binder/command/SignAuthorizationDelegationCommand.ts"],"names":[],"mappings":"AACA,OAAO,EACL,KAAK,IAAI,EAIT,KAAK,YAAY,EACjB,KAAK,OAAO,EACZ,KAAK,aAAa,EAGnB,MAAM,iCAAiC,CAAC;AAEzC,OAAO,EAAQ,KAAK,EAAW,MAAM,WAAW,CAAC;AAEjD,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,sBAAsB,CAAC;AAEtD,OAAO,EAGL,KAAK,aAAa,EACnB,MAAM,sBAAsB,CAAC;AAK9B,MAAM,MAAM,mCAAmC,GAAG;IAChD;;;;;;;;OAQG;IACH,QAAQ,CAAC,IAAI,EAAE,UAAU,CAAC;IAC1B;;OAEG;IACH,QAAQ,CAAC,YAAY,EAAE,OAAO,CAAC;CAChC,CAAC;AAEF,MAAM,MAAM,uCAAuC,GAAG,KAAK,CAAC,SAAS,CAAC,CAAC;AAEvE,qBAAa,+BACX,YACE,OAAO,CACL,uCAAuC,EACvC,mCAAmC,EACnC,aAAa,CACd;IAEH,QAAQ,CAAC,IAAI,EAAE,mCAAmC,CAAC;IACnD,OAAO,CAAC,QAAQ,CAAC,WAAW,CAGiB;gBAEjC,IAAI,EAAE,mCAAmC;IAIrD,OAAO,IAAI,IAAI;IAcf,aAAa,CACX,YAAY,EAAE,YAAY,GACzB,aAAa,CAAC,uCAAuC,EAAE,aAAa,CAAC;CAyCzE"}
|
package/lib/types/internal/app-binder/command/SignAuthorizationDelegationCommand.test.d.ts.map
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SignAuthorizationDelegationCommand.test.d.ts","sourceRoot":"","sources":["../../../../../src/internal/app-binder/command/SignAuthorizationDelegationCommand.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
import { type CommandResult, type InternalApi } from "@ledgerhq/device-management-kit";
|
|
2
|
+
import { type Signature } from "../../../api/model/Signature";
|
|
3
|
+
import { type EthErrorCodes } from "../../app-binder/command/utils/ethAppErrors";
|
|
4
|
+
type SendSignAuthorizationDelegationTaskArgs = {
|
|
5
|
+
derivationPath: string;
|
|
6
|
+
chainId: number;
|
|
7
|
+
address: string;
|
|
8
|
+
nonce: number;
|
|
9
|
+
};
|
|
10
|
+
export declare class SendSignAuthorizationDelegationTask {
|
|
11
|
+
private api;
|
|
12
|
+
private args;
|
|
13
|
+
constructor(api: InternalApi, args: SendSignAuthorizationDelegationTaskArgs);
|
|
14
|
+
run(): Promise<CommandResult<Signature, EthErrorCodes>>;
|
|
15
|
+
buildData(paths: number[], chainId: number, address: string, nonce: number): Uint8Array;
|
|
16
|
+
}
|
|
17
|
+
export {};
|
|
18
|
+
//# sourceMappingURL=SendSignAuthorizationDelegationTask.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SendSignAuthorizationDelegationTask.d.ts","sourceRoot":"","sources":["../../../../../src/internal/app-binder/task/SendSignAuthorizationDelegationTask.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,KAAK,aAAa,EAElB,KAAK,WAAW,EAGjB,MAAM,iCAAiC,CAAC;AAGzC,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,sBAAsB,CAAC;AAKtD,OAAO,EAAE,KAAK,aAAa,EAAE,MAAM,iDAAiD,CAAC;AASrF,KAAK,uCAAuC,GAAG;IAC7C,cAAc,EAAE,MAAM,CAAC;IACvB,OAAO,EAAE,MAAM,CAAC;IAChB,OAAO,EAAE,MAAM,CAAC;IAChB,KAAK,EAAE,MAAM,CAAC;CACf,CAAC;AAEF,qBAAa,mCAAmC;IAE5C,OAAO,CAAC,GAAG;IACX,OAAO,CAAC,IAAI;gBADJ,GAAG,EAAE,WAAW,EAChB,IAAI,EAAE,uCAAuC;IAGjD,GAAG,IAAI,OAAO,CAAC,aAAa,CAAC,SAAS,EAAE,aAAa,CAAC,CAAC;IA+B7D,SAAS,CACP,KAAK,EAAE,MAAM,EAAE,EACf,OAAO,EAAE,MAAM,EACf,OAAO,EAAE,MAAM,EACf,KAAK,EAAE,MAAM,GACZ,UAAU;CA+Bd"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SendSignAuthorizationDelegationTask.test.d.ts","sourceRoot":"","sources":["../../../../../src/internal/app-binder/task/SendSignAuthorizationDelegationTask.test.ts"],"names":[],"mappings":""}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"di.d.ts","sourceRoot":"","sources":["../../../src/internal/di.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAC9D,OAAO,EACL,KAAK,mBAAmB,EACxB,KAAK,eAAe,EACrB,MAAM,iCAAiC,CAAC;AACzC,OAAO,EAAE,SAAS,EAAE,MAAM,WAAW,CAAC;
|
|
1
|
+
{"version":3,"file":"di.d.ts","sourceRoot":"","sources":["../../../src/internal/di.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAC9D,OAAO,EACL,KAAK,mBAAmB,EACxB,KAAK,eAAe,EACrB,MAAM,iCAAiC,CAAC;AACzC,OAAO,EAAE,SAAS,EAAE,MAAM,WAAW,CAAC;AActC,MAAM,MAAM,kBAAkB,GAAG;IAC/B,GAAG,EAAE,mBAAmB,CAAC;IACzB,SAAS,EAAE,eAAe,CAAC;IAC3B,aAAa,EAAE,aAAa,CAAC;CAC9B,CAAC;AAEF,eAAO,MAAM,aAAa,uCAIvB,kBAAkB,cAwBpB,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"eip7702Module.d.ts","sourceRoot":"","sources":["../../../../../src/internal/eip7702/di/eip7702Module.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,MAAM,WAAW,CAAC;AAK5C,eAAO,MAAM,oBAAoB,uBAe9B,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"eip7702Module.test.d.ts","sourceRoot":"","sources":["../../../../../src/internal/eip7702/di/eip7702Module.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"eip7702Types.d.ts","sourceRoot":"","sources":["../../../../../src/internal/eip7702/di/eip7702Types.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,YAAY;;CAIxB,CAAC"}
|
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
import { SignDelegationAuthorizationDAReturnType } from "../../../api/app-binder/SignDelegationAuthorizationTypes";
|
|
2
|
+
import { EthAppBinder } from "../../app-binder/EthAppBinder";
|
|
3
|
+
export declare class SignDelegationAuthorizationUseCase {
|
|
4
|
+
private _appBinder;
|
|
5
|
+
constructor(appBinding: EthAppBinder);
|
|
6
|
+
execute(derivationPath: string, nonce: number, address: string, chainId: number): SignDelegationAuthorizationDAReturnType;
|
|
7
|
+
}
|
|
8
|
+
//# sourceMappingURL=SignDelegationAuthorizationUseCase.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SignDelegationAuthorizationUseCase.d.ts","sourceRoot":"","sources":["../../../../../src/internal/eip7702/use-case/SignDelegationAuthorizationUseCase.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,uCAAuC,EAAE,MAAM,kDAAkD,CAAC;AAE3G,OAAO,EAAE,YAAY,EAAE,MAAM,mCAAmC,CAAC;AAEjE,qBACa,kCAAkC;IAC7C,OAAO,CAAC,UAAU,CAAe;gBAI/B,UAAU,EAAE,YAAY;IAK1B,OAAO,CACL,cAAc,EAAE,MAAM,EACtB,KAAK,EAAE,MAAM,EACb,OAAO,EAAE,MAAM,EACf,OAAO,EAAE,MAAM,GACd,uCAAuC;CAQ3C"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SignDelegationAuthorizationUseCase.test.d.ts","sourceRoot":"","sources":["../../../../../src/internal/eip7702/use-case/SignDelegationAuthorizationUseCase.test.ts"],"names":[],"mappings":""}
|