@ledgerhq/device-signer-kit-ethereum 1.8.0 → 1.9.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (231) hide show
  1. package/README.md +59 -1
  2. package/lib/cjs/api/SignerEth.js +1 -1
  3. package/lib/cjs/api/SignerEth.js.map +1 -1
  4. package/lib/cjs/api/SignerEthBuilder.test.js +1 -1
  5. package/lib/cjs/api/SignerEthBuilder.test.js.map +2 -2
  6. package/lib/cjs/api/app-binder/SignTransactionDeviceActionTypes.js +1 -1
  7. package/lib/cjs/api/app-binder/SignTransactionDeviceActionTypes.js.map +2 -2
  8. package/lib/cjs/api/app-binder/SignTypedDataDeviceActionTypes.js +1 -1
  9. package/lib/cjs/api/app-binder/SignTypedDataDeviceActionTypes.js.map +2 -2
  10. package/lib/cjs/api/app-binder/VerifySafeAddressDeviceActionTypes.js +2 -0
  11. package/lib/cjs/api/app-binder/VerifySafeAddressDeviceActionTypes.js.map +7 -0
  12. package/lib/cjs/api/model/SafeAddressOptions.js +2 -0
  13. package/lib/cjs/api/model/SafeAddressOptions.js.map +7 -0
  14. package/lib/cjs/internal/DefaultSignerEth.js +1 -1
  15. package/lib/cjs/internal/DefaultSignerEth.js.map +3 -3
  16. package/lib/cjs/internal/app-binder/EthAppBinder.js +1 -1
  17. package/lib/cjs/internal/app-binder/EthAppBinder.js.map +3 -3
  18. package/lib/cjs/internal/app-binder/EthAppBinder.test.js +1 -1
  19. package/lib/cjs/internal/app-binder/EthAppBinder.test.js.map +2 -2
  20. package/lib/cjs/internal/app-binder/command/ProvideSafeAccountCommand.js +2 -0
  21. package/lib/cjs/internal/app-binder/command/ProvideSafeAccountCommand.js.map +7 -0
  22. package/lib/cjs/internal/app-binder/command/ProvideSafeAccountCommand.test.js +2 -0
  23. package/lib/cjs/internal/app-binder/command/ProvideSafeAccountCommand.test.js.map +7 -0
  24. package/lib/cjs/internal/app-binder/device-action/SignTransaction/SignTransactionDeviceAction.js +1 -1
  25. package/lib/cjs/internal/app-binder/device-action/SignTransaction/SignTransactionDeviceAction.js.map +3 -3
  26. package/lib/cjs/internal/app-binder/device-action/SignTransaction/SignTransactionDeviceAction.test.js +1 -1
  27. package/lib/cjs/internal/app-binder/device-action/SignTransaction/SignTransactionDeviceAction.test.js.map +3 -3
  28. package/lib/cjs/internal/app-binder/device-action/SignTypedData/SignTypedDataDeviceAction.js +1 -1
  29. package/lib/cjs/internal/app-binder/device-action/SignTypedData/SignTypedDataDeviceAction.js.map +3 -3
  30. package/lib/cjs/internal/app-binder/device-action/SignTypedData/SignTypedDataDeviceAction.test.js +1 -1
  31. package/lib/cjs/internal/app-binder/device-action/SignTypedData/SignTypedDataDeviceAction.test.js.map +3 -3
  32. package/lib/cjs/internal/app-binder/device-action/VerifySafeAddress/VerifySafeAddress.js +2 -0
  33. package/lib/cjs/internal/app-binder/device-action/VerifySafeAddress/VerifySafeAddress.js.map +7 -0
  34. package/lib/cjs/internal/app-binder/device-action/VerifySafeAddress/VerifySafeAddress.test.js +2 -0
  35. package/lib/cjs/internal/app-binder/device-action/VerifySafeAddress/VerifySafeAddress.test.js.map +7 -0
  36. package/lib/cjs/internal/app-binder/task/BuildBaseContexts.js +1 -1
  37. package/lib/cjs/internal/app-binder/task/BuildBaseContexts.js.map +3 -3
  38. package/lib/cjs/internal/app-binder/task/BuildBaseContexts.test.js +1 -1
  39. package/lib/cjs/internal/app-binder/task/BuildBaseContexts.test.js.map +3 -3
  40. package/lib/cjs/internal/app-binder/task/BuildEIP712ContextTask.js +1 -1
  41. package/lib/cjs/internal/app-binder/task/BuildEIP712ContextTask.js.map +3 -3
  42. package/lib/cjs/internal/app-binder/task/BuildEIP712ContextTask.test.js +1 -1
  43. package/lib/cjs/internal/app-binder/task/BuildEIP712ContextTask.test.js.map +3 -3
  44. package/lib/cjs/internal/app-binder/task/BuildSafeAddressContextTask.js +2 -0
  45. package/lib/cjs/internal/app-binder/task/BuildSafeAddressContextTask.js.map +7 -0
  46. package/lib/cjs/internal/app-binder/task/BuildSafeAddressContextTask.test.js +2 -0
  47. package/lib/cjs/internal/app-binder/task/BuildSafeAddressContextTask.test.js.map +7 -0
  48. package/lib/cjs/internal/app-binder/task/BuildSubcontextsTask.js +1 -1
  49. package/lib/cjs/internal/app-binder/task/BuildSubcontextsTask.js.map +2 -2
  50. package/lib/cjs/internal/app-binder/task/BuildSubcontextsTask.test.js +1 -1
  51. package/lib/cjs/internal/app-binder/task/BuildSubcontextsTask.test.js.map +2 -2
  52. package/lib/cjs/internal/app-binder/task/ProvideContextTask.js +2 -0
  53. package/lib/cjs/internal/app-binder/task/ProvideContextTask.js.map +7 -0
  54. package/lib/cjs/internal/app-binder/task/ProvideContextTask.test.js +2 -0
  55. package/lib/cjs/internal/app-binder/task/ProvideContextTask.test.js.map +7 -0
  56. package/lib/cjs/internal/app-binder/task/ProvideEIP712ContextTask.js +1 -1
  57. package/lib/cjs/internal/app-binder/task/ProvideEIP712ContextTask.js.map +3 -3
  58. package/lib/cjs/internal/app-binder/task/ProvideEIP712ContextTask.test.js +1 -1
  59. package/lib/cjs/internal/app-binder/task/ProvideEIP712ContextTask.test.js.map +3 -3
  60. package/lib/cjs/internal/app-binder/task/ProvideTransactionContextsTask.js +2 -0
  61. package/lib/cjs/internal/app-binder/task/ProvideTransactionContextsTask.js.map +7 -0
  62. package/lib/cjs/internal/app-binder/task/ProvideTransactionContextsTask.test.js +2 -0
  63. package/lib/cjs/internal/app-binder/task/ProvideTransactionContextsTask.test.js.map +7 -0
  64. package/lib/cjs/internal/di.js +1 -1
  65. package/lib/cjs/internal/di.js.map +3 -3
  66. package/lib/cjs/internal/safe/di/safeModule.js +2 -0
  67. package/lib/cjs/internal/safe/di/safeModule.js.map +7 -0
  68. package/lib/cjs/internal/safe/di/safeModule.test.js +2 -0
  69. package/lib/cjs/internal/safe/di/safeModule.test.js.map +7 -0
  70. package/lib/cjs/internal/safe/di/safeTypes.js +2 -0
  71. package/lib/cjs/internal/safe/di/safeTypes.js.map +7 -0
  72. package/lib/cjs/internal/safe/use-case/VerifySafeAddressUseCase.js +2 -0
  73. package/lib/cjs/internal/safe/use-case/VerifySafeAddressUseCase.js.map +7 -0
  74. package/lib/cjs/internal/safe/use-case/VerifySafeAddressUseCase.test.js +2 -0
  75. package/lib/cjs/internal/safe/use-case/VerifySafeAddressUseCase.test.js.map +7 -0
  76. package/lib/cjs/package.json +2 -2
  77. package/lib/esm/api/SignerEthBuilder.test.js +1 -1
  78. package/lib/esm/api/SignerEthBuilder.test.js.map +2 -2
  79. package/lib/esm/api/app-binder/SignTransactionDeviceActionTypes.js +1 -1
  80. package/lib/esm/api/app-binder/SignTransactionDeviceActionTypes.js.map +2 -2
  81. package/lib/esm/api/app-binder/SignTypedDataDeviceActionTypes.js +1 -1
  82. package/lib/esm/api/app-binder/SignTypedDataDeviceActionTypes.js.map +2 -2
  83. package/lib/esm/api/app-binder/VerifySafeAddressDeviceActionTypes.js +2 -0
  84. package/lib/esm/api/app-binder/VerifySafeAddressDeviceActionTypes.js.map +7 -0
  85. package/lib/esm/api/model/SafeAddressOptions.js +1 -0
  86. package/lib/esm/api/model/SafeAddressOptions.js.map +7 -0
  87. package/lib/esm/internal/DefaultSignerEth.js +1 -1
  88. package/lib/esm/internal/DefaultSignerEth.js.map +3 -3
  89. package/lib/esm/internal/app-binder/EthAppBinder.js +1 -1
  90. package/lib/esm/internal/app-binder/EthAppBinder.js.map +3 -3
  91. package/lib/esm/internal/app-binder/EthAppBinder.test.js +1 -1
  92. package/lib/esm/internal/app-binder/EthAppBinder.test.js.map +2 -2
  93. package/lib/esm/internal/app-binder/command/ProvideSafeAccountCommand.js +2 -0
  94. package/lib/esm/internal/app-binder/command/ProvideSafeAccountCommand.js.map +7 -0
  95. package/lib/esm/internal/app-binder/command/ProvideSafeAccountCommand.test.js +2 -0
  96. package/lib/esm/internal/app-binder/command/ProvideSafeAccountCommand.test.js.map +7 -0
  97. package/lib/esm/internal/app-binder/device-action/SignTransaction/SignTransactionDeviceAction.js +1 -1
  98. package/lib/esm/internal/app-binder/device-action/SignTransaction/SignTransactionDeviceAction.js.map +3 -3
  99. package/lib/esm/internal/app-binder/device-action/SignTransaction/SignTransactionDeviceAction.test.js +1 -1
  100. package/lib/esm/internal/app-binder/device-action/SignTransaction/SignTransactionDeviceAction.test.js.map +3 -3
  101. package/lib/esm/internal/app-binder/device-action/SignTypedData/SignTypedDataDeviceAction.js +1 -1
  102. package/lib/esm/internal/app-binder/device-action/SignTypedData/SignTypedDataDeviceAction.js.map +3 -3
  103. package/lib/esm/internal/app-binder/device-action/SignTypedData/SignTypedDataDeviceAction.test.js +1 -1
  104. package/lib/esm/internal/app-binder/device-action/SignTypedData/SignTypedDataDeviceAction.test.js.map +3 -3
  105. package/lib/esm/internal/app-binder/device-action/VerifySafeAddress/VerifySafeAddress.js +2 -0
  106. package/lib/esm/internal/app-binder/device-action/VerifySafeAddress/VerifySafeAddress.js.map +7 -0
  107. package/lib/esm/internal/app-binder/device-action/VerifySafeAddress/VerifySafeAddress.test.js +2 -0
  108. package/lib/esm/internal/app-binder/device-action/VerifySafeAddress/VerifySafeAddress.test.js.map +7 -0
  109. package/lib/esm/internal/app-binder/task/BuildBaseContexts.js +1 -1
  110. package/lib/esm/internal/app-binder/task/BuildBaseContexts.js.map +3 -3
  111. package/lib/esm/internal/app-binder/task/BuildBaseContexts.test.js +1 -1
  112. package/lib/esm/internal/app-binder/task/BuildBaseContexts.test.js.map +3 -3
  113. package/lib/esm/internal/app-binder/task/BuildEIP712ContextTask.js +1 -1
  114. package/lib/esm/internal/app-binder/task/BuildEIP712ContextTask.js.map +3 -3
  115. package/lib/esm/internal/app-binder/task/BuildEIP712ContextTask.test.js +1 -1
  116. package/lib/esm/internal/app-binder/task/BuildEIP712ContextTask.test.js.map +3 -3
  117. package/lib/esm/internal/app-binder/task/BuildSafeAddressContextTask.js +2 -0
  118. package/lib/esm/internal/app-binder/task/BuildSafeAddressContextTask.js.map +7 -0
  119. package/lib/esm/internal/app-binder/task/BuildSafeAddressContextTask.test.js +2 -0
  120. package/lib/esm/internal/app-binder/task/BuildSafeAddressContextTask.test.js.map +7 -0
  121. package/lib/esm/internal/app-binder/task/BuildSubcontextsTask.js +1 -1
  122. package/lib/esm/internal/app-binder/task/BuildSubcontextsTask.js.map +2 -2
  123. package/lib/esm/internal/app-binder/task/BuildSubcontextsTask.test.js +1 -1
  124. package/lib/esm/internal/app-binder/task/BuildSubcontextsTask.test.js.map +2 -2
  125. package/lib/esm/internal/app-binder/task/ProvideContextTask.js +2 -0
  126. package/lib/esm/internal/app-binder/task/ProvideContextTask.js.map +7 -0
  127. package/lib/esm/internal/app-binder/task/ProvideContextTask.test.js +2 -0
  128. package/lib/esm/internal/app-binder/task/ProvideContextTask.test.js.map +7 -0
  129. package/lib/esm/internal/app-binder/task/ProvideEIP712ContextTask.js +1 -1
  130. package/lib/esm/internal/app-binder/task/ProvideEIP712ContextTask.js.map +3 -3
  131. package/lib/esm/internal/app-binder/task/ProvideEIP712ContextTask.test.js +1 -1
  132. package/lib/esm/internal/app-binder/task/ProvideEIP712ContextTask.test.js.map +3 -3
  133. package/lib/esm/internal/app-binder/task/ProvideTransactionContextsTask.js +2 -0
  134. package/lib/esm/internal/app-binder/task/ProvideTransactionContextsTask.js.map +7 -0
  135. package/lib/esm/internal/app-binder/task/ProvideTransactionContextsTask.test.js +2 -0
  136. package/lib/esm/internal/app-binder/task/ProvideTransactionContextsTask.test.js.map +7 -0
  137. package/lib/esm/internal/di.js +1 -1
  138. package/lib/esm/internal/di.js.map +3 -3
  139. package/lib/esm/internal/safe/di/safeModule.js +2 -0
  140. package/lib/esm/internal/safe/di/safeModule.js.map +7 -0
  141. package/lib/esm/internal/safe/di/safeModule.test.js +2 -0
  142. package/lib/esm/internal/safe/di/safeModule.test.js.map +7 -0
  143. package/lib/esm/internal/safe/di/safeTypes.js +2 -0
  144. package/lib/esm/internal/safe/di/safeTypes.js.map +7 -0
  145. package/lib/esm/internal/safe/use-case/VerifySafeAddressUseCase.js +2 -0
  146. package/lib/esm/internal/safe/use-case/VerifySafeAddressUseCase.js.map +7 -0
  147. package/lib/esm/internal/safe/use-case/VerifySafeAddressUseCase.test.js +2 -0
  148. package/lib/esm/internal/safe/use-case/VerifySafeAddressUseCase.test.js.map +7 -0
  149. package/lib/esm/package.json +2 -2
  150. package/lib/types/api/SignerEth.d.ts +3 -0
  151. package/lib/types/api/SignerEth.d.ts.map +1 -1
  152. package/lib/types/api/app-binder/SignTransactionDeviceActionTypes.d.ts +1 -0
  153. package/lib/types/api/app-binder/SignTransactionDeviceActionTypes.d.ts.map +1 -1
  154. package/lib/types/api/app-binder/SignTypedDataDeviceActionTypes.d.ts +2 -0
  155. package/lib/types/api/app-binder/SignTypedDataDeviceActionTypes.d.ts.map +1 -1
  156. package/lib/types/api/app-binder/VerifySafeAddressDeviceActionTypes.d.ts +30 -0
  157. package/lib/types/api/app-binder/VerifySafeAddressDeviceActionTypes.d.ts.map +1 -0
  158. package/lib/types/api/model/SafeAddressOptions.d.ts +5 -0
  159. package/lib/types/api/model/SafeAddressOptions.d.ts.map +1 -0
  160. package/lib/types/internal/DefaultSignerEth.d.ts +3 -0
  161. package/lib/types/internal/DefaultSignerEth.d.ts.map +1 -1
  162. package/lib/types/internal/app-binder/EthAppBinder.d.ts +6 -0
  163. package/lib/types/internal/app-binder/EthAppBinder.d.ts.map +1 -1
  164. package/lib/types/internal/app-binder/command/ProvideSafeAccountCommand.d.ts +34 -0
  165. package/lib/types/internal/app-binder/command/ProvideSafeAccountCommand.d.ts.map +1 -0
  166. package/lib/types/internal/app-binder/command/ProvideSafeAccountCommand.test.d.ts +2 -0
  167. package/lib/types/internal/app-binder/command/ProvideSafeAccountCommand.test.d.ts.map +1 -0
  168. package/lib/types/internal/app-binder/device-action/SignTransaction/SignTransactionDeviceAction.d.ts +7 -3
  169. package/lib/types/internal/app-binder/device-action/SignTransaction/SignTransactionDeviceAction.d.ts.map +1 -1
  170. package/lib/types/internal/app-binder/device-action/SignTypedData/SignTypedDataDeviceAction.d.ts +5 -0
  171. package/lib/types/internal/app-binder/device-action/SignTypedData/SignTypedDataDeviceAction.d.ts.map +1 -1
  172. package/lib/types/internal/app-binder/device-action/VerifySafeAddress/VerifySafeAddress.d.ts +20 -0
  173. package/lib/types/internal/app-binder/device-action/VerifySafeAddress/VerifySafeAddress.d.ts.map +1 -0
  174. package/lib/types/internal/app-binder/device-action/VerifySafeAddress/VerifySafeAddress.test.d.ts +2 -0
  175. package/lib/types/internal/app-binder/device-action/VerifySafeAddress/VerifySafeAddress.test.d.ts.map +1 -0
  176. package/lib/types/internal/app-binder/task/BuildBaseContexts.d.ts +4 -6
  177. package/lib/types/internal/app-binder/task/BuildBaseContexts.d.ts.map +1 -1
  178. package/lib/types/internal/app-binder/task/BuildEIP712ContextTask.d.ts +3 -3
  179. package/lib/types/internal/app-binder/task/BuildEIP712ContextTask.d.ts.map +1 -1
  180. package/lib/types/internal/app-binder/task/BuildSafeAddressContextTask.d.ts +19 -0
  181. package/lib/types/internal/app-binder/task/BuildSafeAddressContextTask.d.ts.map +1 -0
  182. package/lib/types/internal/app-binder/task/BuildSafeAddressContextTask.test.d.ts +2 -0
  183. package/lib/types/internal/app-binder/task/BuildSafeAddressContextTask.test.d.ts.map +1 -0
  184. package/lib/types/internal/app-binder/task/BuildSubcontextsTask.d.ts.map +1 -1
  185. package/lib/types/internal/app-binder/task/ProvideContextTask.d.ts +22 -0
  186. package/lib/types/internal/app-binder/task/ProvideContextTask.d.ts.map +1 -0
  187. package/lib/types/internal/app-binder/task/ProvideContextTask.test.d.ts +2 -0
  188. package/lib/types/internal/app-binder/task/ProvideContextTask.test.d.ts.map +1 -0
  189. package/lib/types/internal/app-binder/task/ProvideEIP712ContextTask.d.ts +4 -4
  190. package/lib/types/internal/app-binder/task/ProvideEIP712ContextTask.d.ts.map +1 -1
  191. package/lib/types/internal/app-binder/task/ProvideTransactionContextsTask.d.ts +36 -0
  192. package/lib/types/internal/app-binder/task/ProvideTransactionContextsTask.d.ts.map +1 -0
  193. package/lib/types/internal/app-binder/task/ProvideTransactionContextsTask.test.d.ts +2 -0
  194. package/lib/types/internal/app-binder/task/ProvideTransactionContextsTask.test.d.ts.map +1 -0
  195. package/lib/types/internal/di.d.ts.map +1 -1
  196. package/lib/types/internal/safe/di/safeModule.d.ts +3 -0
  197. package/lib/types/internal/safe/di/safeModule.d.ts.map +1 -0
  198. package/lib/types/internal/safe/di/safeModule.test.d.ts +2 -0
  199. package/lib/types/internal/safe/di/safeModule.test.d.ts.map +1 -0
  200. package/lib/types/internal/safe/di/safeTypes.d.ts +4 -0
  201. package/lib/types/internal/safe/di/safeTypes.d.ts.map +1 -0
  202. package/lib/types/internal/safe/use-case/VerifySafeAddressUseCase.d.ts +9 -0
  203. package/lib/types/internal/safe/use-case/VerifySafeAddressUseCase.d.ts.map +1 -0
  204. package/lib/types/internal/safe/use-case/VerifySafeAddressUseCase.test.d.ts +2 -0
  205. package/lib/types/internal/safe/use-case/VerifySafeAddressUseCase.test.d.ts.map +1 -0
  206. package/lib/types/tsconfig.prod.tsbuildinfo +1 -1
  207. package/package.json +5 -5
  208. package/lib/cjs/internal/app-binder/task/GetWeb3CheckTask.js +0 -2
  209. package/lib/cjs/internal/app-binder/task/GetWeb3CheckTask.js.map +0 -7
  210. package/lib/cjs/internal/app-binder/task/GetWeb3CheckTask.test.js +0 -2
  211. package/lib/cjs/internal/app-binder/task/GetWeb3CheckTask.test.js.map +0 -7
  212. package/lib/cjs/internal/app-binder/task/ProvideContextsTask.js +0 -2
  213. package/lib/cjs/internal/app-binder/task/ProvideContextsTask.js.map +0 -7
  214. package/lib/cjs/internal/app-binder/task/ProvideContextsTask.test.js +0 -2
  215. package/lib/cjs/internal/app-binder/task/ProvideContextsTask.test.js.map +0 -7
  216. package/lib/esm/internal/app-binder/task/GetWeb3CheckTask.js +0 -2
  217. package/lib/esm/internal/app-binder/task/GetWeb3CheckTask.js.map +0 -7
  218. package/lib/esm/internal/app-binder/task/GetWeb3CheckTask.test.js +0 -2
  219. package/lib/esm/internal/app-binder/task/GetWeb3CheckTask.test.js.map +0 -7
  220. package/lib/esm/internal/app-binder/task/ProvideContextsTask.js +0 -2
  221. package/lib/esm/internal/app-binder/task/ProvideContextsTask.js.map +0 -7
  222. package/lib/esm/internal/app-binder/task/ProvideContextsTask.test.js +0 -2
  223. package/lib/esm/internal/app-binder/task/ProvideContextsTask.test.js.map +0 -7
  224. package/lib/types/internal/app-binder/task/GetWeb3CheckTask.d.ts +0 -29
  225. package/lib/types/internal/app-binder/task/GetWeb3CheckTask.d.ts.map +0 -1
  226. package/lib/types/internal/app-binder/task/GetWeb3CheckTask.test.d.ts +0 -2
  227. package/lib/types/internal/app-binder/task/GetWeb3CheckTask.test.d.ts.map +0 -1
  228. package/lib/types/internal/app-binder/task/ProvideContextsTask.d.ts +0 -44
  229. package/lib/types/internal/app-binder/task/ProvideContextsTask.d.ts.map +0 -1
  230. package/lib/types/internal/app-binder/task/ProvideContextsTask.test.d.ts +0 -2
  231. package/lib/types/internal/app-binder/task/ProvideContextsTask.test.d.ts.map +0 -1
@@ -1,2 +1,2 @@
1
- import{TypedDataCalldataParamPresence as w}from"@ledgerhq/context-module";import{CommandResultFactory as I,DeviceModelId as s,DeviceSessionStateType as v,DeviceStatus as x}from"@ledgerhq/device-management-kit";import{Just as C,Left as O,Nothing as k,Right as b}from"purify-ts";import{ClearSigningType as A}from"../../../api/model/ClearSigningType";import{makeDeviceActionInternalApiMock as P}from"../../app-binder/device-action/__test-utils__/makeInternalApi";import{PrimitiveType as h,StructType as V,TypedDataValueField as E,TypedDataValueRoot as D}from"../../typed-data/model/Types";import{BuildEIP712ContextTask as g}from"./BuildEIP712ContextTask";describe("BuildEIP712ContextTask",()=>{const e=P(),a={getFieldContext:vi.fn(),getContexts:vi.fn(),getTypedDataFilters:vi.fn(),getWeb3Checks:vi.fn(),getSolanaContext:vi.fn()},n={parse:vi.fn()},p={extractValue:vi.fn()},m={mapTransactionToSubset:vi.fn()},o=vi.fn(),u=vi.fn();function f(t){return{blindSigningEnabled:!1,web3ChecksEnabled:t,web3ChecksOptIn:!1,version:"1.13.0"}}const c={domain:{name:"Permit2",chainId:137,verifyingContract:"0x000000000022d473030f116ddee9f6b43ac78ba3"},primaryType:"PermitSingle",message:{details:{token:"0x7ceb23fd6bc0add59e62ac25578270cff1b9f619",amount:"69420000000000000000",expiration:"1718184249",nonce:"0"},spender:"0xec7be89e9d109e7e3fec59c222cf297125fefda2",sigDeadline:"1715594049"},types:{PermitSingle:[{name:"details",type:"PermitDetails"},{name:"spender",type:"address"},{name:"sigDeadline",type:"uint256"}],PermitDetails:[{name:"token",type:"address"},{name:"amount",type:"uint"},{name:"expiration",type:"uint"},{name:"nonce",type:"uint"}]}},r={PermitSingle:{details:new V("PermitDetails"),spender:new h("address","address",k),sigDeadline:new h("uint256","uint",C(32))},PermitDetails:{token:new h("address","address",k),amount:new h("uint160","uint",C(20)),expiration:new h("uint48","uint",C(6)),nonce:new h("uint48","uint",C(6))}},l=[{path:"",type:"",value:new D("EIP712Domain")},{path:"chainId",type:"uint256",value:new E(Uint8Array.from([137]))}],d=[{path:"",type:"",value:new D("PermitSingle")},{path:"details.amount",type:"uint160",value:new E(Uint8Array.from([18]))},{path:"details.expiration",type:"uint48",value:new E(Uint8Array.from([19]))}],y={type:"success",messageInfo:{displayName:"Permit2",filtersCount:1,signature:"3045022100e3c597d13d28a87a88b0239404c668373cf5063362f2a81d09eed4582941dfe802207669aabb504fd5b95b2734057f6b8bbf51f14a69a5f9bdf658a5952cefbf44d3"},trustedNamesAddresses:{},tokens:{},calldatas:{},proxy:void 0,filters:{"details.amount":{displayName:"Amount allowance",path:"details.amount",signature:"304402201a46e6b4ef89eaf9fcf4945d053bfc5616a826400fd758312fbbe976bafc07ec022025a9b408722baf983ee053f90179c75b0c55bb0668f437d55493e36069bbd5a3",tokenIndex:255,type:"amount"}}},T="0x1234";beforeEach(()=>{vi.resetAllMocks(),o.mockReturnValue({run:async()=>({web3Check:null})}),u.mockReturnValue({run:async()=>({clearSignContexts:[],clearSigningType:A.BASIC})}),e.sendCommand.mockResolvedValue(I({data:{challenge:T}}))}),it("Build context with clear signing context not supported by the device",async()=>{const t=new g(e,a,n,p,m,c,"44'/60'/0'/0/0",f(!1),o,u);n.parse.mockReturnValueOnce(b({types:r,domain:l,message:d})),e.getDeviceSessionState.mockReturnValueOnce({sessionStateType:v.ReadyWithoutSecureChannel,deviceStatus:x.CONNECTED,installedApps:[],currentApp:{name:"Ethereum",version:"1.11.0"},deviceModelId:s.NANO_S,isSecureConnectionAllowed:!1});const i=await t.run();expect(i).toStrictEqual({deviceModelId:s.NANO_S,derivationPath:"44'/60'/0'/0/0",web3Check:null,types:r,domain:l,message:d,clearSignContext:k,calldatasContexts:{}})}),it("Build context with no clear signing context",async()=>{const t=new g(e,a,n,p,m,c,"44'/60'/0'/0/0",f(!1),o,u);n.parse.mockReturnValueOnce(b({types:r,domain:l,message:d})),e.getDeviceSessionState.mockReturnValueOnce({sessionStateType:v.ReadyWithoutSecureChannel,deviceStatus:x.CONNECTED,installedApps:[],currentApp:{name:"Ethereum",version:"1.12.0"},deviceModelId:s.FLEX,isSecureConnectionAllowed:!1}),a.getTypedDataFilters.mockResolvedValueOnce({type:"error",error:new Error("no filter")});const i=await t.run();expect(i).toStrictEqual({deviceModelId:s.FLEX,derivationPath:"44'/60'/0'/0/0",web3Check:null,types:r,domain:l,message:d,clearSignContext:k,calldatasContexts:{}})}),it("Build context with clear signing context",async()=>{const t="web3Check",i=new g(e,a,n,p,m,c,"44'/60'/0'/0/0",f(!1),o,u);o.mockReturnValueOnce({run:async()=>({web3Check:t})}),n.parse.mockReturnValueOnce(b({types:r,domain:l,message:d})),e.getDeviceSessionState.mockReturnValueOnce({sessionStateType:v.ReadyWithoutSecureChannel,deviceStatus:x.CONNECTED,installedApps:[],currentApp:{name:"Ethereum",version:"1.12.0"},deviceModelId:s.FLEX,isSecureConnectionAllowed:!1}),a.getTypedDataFilters.mockResolvedValueOnce(y);const S=await i.run();expect(S).toStrictEqual({deviceModelId:s.FLEX,derivationPath:"44'/60'/0'/0/0",web3Check:null,types:r,domain:l,message:d,clearSignContext:C(y),calldatasContexts:{}}),expect(n.parse).toHaveBeenCalledWith(c),expect(a.getTypedDataFilters).toHaveBeenCalledWith({verifyingContract:"0x000000000022d473030f116ddee9f6b43ac78ba3",chainId:137,version:"v2",schema:c.types,challenge:T,deviceModelId:s.FLEX,fieldsValues:[{path:"details.amount",value:Uint8Array.from([18])},{path:"details.expiration",value:Uint8Array.from([19])}]})}),it("Build context with clear signing context and web3Check",async()=>{const t="web3Check",i=new g(e,a,n,p,m,c,"44'/60'/0'/0/0",f(!0),o,u);o.mockReturnValueOnce({run:async()=>({web3Check:t})}),n.parse.mockReturnValueOnce(b({types:r,domain:l,message:d})),e.getDeviceSessionState.mockReturnValueOnce({sessionStateType:v.ReadyWithoutSecureChannel,deviceStatus:x.CONNECTED,installedApps:[],currentApp:{name:"Ethereum",version:"1.12.0"},deviceModelId:s.FLEX,isSecureConnectionAllowed:!1}),a.getTypedDataFilters.mockResolvedValueOnce(y);const S=await i.run();expect(S).toStrictEqual({deviceModelId:s.FLEX,derivationPath:"44'/60'/0'/0/0",web3Check:t,types:r,domain:l,message:d,clearSignContext:C(y),calldatasContexts:{}}),expect(o).toHaveBeenCalledWith(e,{contextModule:a,derivationPath:"44'/60'/0'/0/0",data:c})}),it("Build context with clear signing context V1",async()=>{const t=new g(e,a,n,p,m,c,"44'/60'/0'/0/0",f(!1),o,u);n.parse.mockReturnValueOnce(b({types:r,domain:l,message:d})),e.getDeviceSessionState.mockReturnValueOnce({sessionStateType:v.ReadyWithoutSecureChannel,deviceStatus:x.CONNECTED,installedApps:[],currentApp:{name:"Ethereum",version:"1.11.0"},deviceModelId:s.FLEX,isSecureConnectionAllowed:!1}),a.getTypedDataFilters.mockResolvedValueOnce(y),await t.run(),expect(a.getTypedDataFilters).toHaveBeenCalledWith({verifyingContract:"0x000000000022d473030f116ddee9f6b43ac78ba3",chainId:137,version:"v1",schema:c.types,challenge:T,deviceModelId:s.FLEX,fieldsValues:[{path:"details.amount",value:Uint8Array.from([18])},{path:"details.expiration",value:Uint8Array.from([19])}]})}),it("Build context with clear signing context and calldatas",async()=>{const t=new g(e,a,n,p,m,c,"44'/60'/0'/0/0",f(!1),o,u),i={chainId:4660,data:"0x6a76120200000000000000000000000023f8abfc2824c397ccb3da89ae772984107ddb99",from:"0x8ceb23fd6bc0add59e62ac25578270cff1b9f619",selector:"0x778899aa",to:"0x7ceb23fd6bc0add59e62ac25578270cff1b9f619",value:4200000000000000n},S={...y,calldatas:{0:{filter:{calldataIndex:0,displayName:"Transaction",valueFlag:!0,calleeFlag:w.Present,chainIdFlag:!1,selectorFlag:!1,amountFlag:!0,spenderFlag:w.Present,signature:"3045022100d8496ab69152efeef6a923a3ebd225334ad65dcb985814994243be7bc09bf27e02206314835816908dd6d51d3cbb0f9465d91d7ddc9104b34dd6c4247f65c551836e"},subset:i}}};n.parse.mockReturnValueOnce(b({types:r,domain:l,message:d})),e.getDeviceSessionState.mockReturnValueOnce({sessionStateType:v.ReadyWithoutSecureChannel,deviceStatus:x.CONNECTED,installedApps:[],currentApp:{name:"Ethereum",version:"1.12.0"},deviceModelId:s.FLEX,isSecureConnectionAllowed:!1}),a.getTypedDataFilters.mockResolvedValueOnce(S),u.mockReturnValue({run:async()=>({clearSignContexts:[],clearSigningType:A.EIP7730})});const R=await t.run();expect(u).toHaveBeenCalledWith(e,expect.objectContaining({subset:i})),expect(R).toStrictEqual({deviceModelId:s.FLEX,derivationPath:"44'/60'/0'/0/0",web3Check:null,types:r,domain:l,message:d,clearSignContext:C(S),calldatasContexts:{0:[]}})}),it("Should throw an error if parsing fails",async()=>{const t=new g(e,a,n,p,m,c,"44'/60'/0'/0/0",f(!1),o,u);n.parse.mockReturnValueOnce(O(new Error("Parsing error")));try{await t.run()}catch(i){expect(i).toBeInstanceOf(Error),expect(i.message).toBe("Parsing error")}})});
1
+ import{ClearSignContextType as E}from"@ledgerhq/context-module";import{TypedDataCalldataParamPresence as A}from"@ledgerhq/context-module";import{CommandResultFactory as I,DeviceModelId as s,DeviceSessionStateType as x,DeviceStatus as v}from"@ledgerhq/device-management-kit";import{Just as C,Left as M,Nothing as b,Right as h}from"purify-ts";import{ClearSigningType as R}from"../../../api/model/ClearSigningType";import{makeDeviceActionInternalApiMock as F}from"../../app-binder/device-action/__test-utils__/makeInternalApi";import{PrimitiveType as T,StructType as P,TypedDataValueField as w,TypedDataValueRoot as D}from"../../typed-data/model/Types";import{BuildEIP712ContextTask as y}from"./BuildEIP712ContextTask";describe("BuildEIP712ContextTask",()=>{const n=F(),e={getFieldContext:vi.fn(),getContexts:vi.fn(),getTypedDataFilters:vi.fn()},a={parse:vi.fn()},p={extractValue:vi.fn()},m={mapTransactionToSubset:vi.fn()},l=vi.fn();function f(t){return{blindSigningEnabled:!1,web3ChecksEnabled:t,web3ChecksOptIn:!1,version:"1.13.0"}}const d={domain:{name:"Permit2",chainId:137,verifyingContract:"0x000000000022d473030f116ddee9f6b43ac78ba3"},primaryType:"PermitSingle",message:{details:{token:"0x7ceb23fd6bc0add59e62ac25578270cff1b9f619",amount:"69420000000000000000",expiration:"1718184249",nonce:"0"},spender:"0xec7be89e9d109e7e3fec59c222cf297125fefda2",sigDeadline:"1715594049"},types:{PermitSingle:[{name:"details",type:"PermitDetails"},{name:"spender",type:"address"},{name:"sigDeadline",type:"uint256"}],PermitDetails:[{name:"token",type:"address"},{name:"amount",type:"uint"},{name:"expiration",type:"uint"},{name:"nonce",type:"uint"}]}},o={PermitSingle:{details:new P("PermitDetails"),spender:new T("address","address",b),sigDeadline:new T("uint256","uint",C(32))},PermitDetails:{token:new T("address","address",b),amount:new T("uint160","uint",C(20)),expiration:new T("uint48","uint",C(6)),nonce:new T("uint48","uint",C(6))}},c=[{path:"",type:"",value:new D("EIP712Domain")},{path:"chainId",type:"uint256",value:new w(Uint8Array.from([137]))}],r=[{path:"",type:"",value:new D("PermitSingle")},{path:"details.amount",type:"uint160",value:new w(Uint8Array.from([18]))},{path:"details.expiration",type:"uint48",value:new w(Uint8Array.from([19]))}],g={type:"success",messageInfo:{displayName:"Permit2",filtersCount:1,signature:"3045022100e3c597d13d28a87a88b0239404c668373cf5063362f2a81d09eed4582941dfe802207669aabb504fd5b95b2734057f6b8bbf51f14a69a5f9bdf658a5952cefbf44d3"},trustedNamesAddresses:{},tokens:{},calldatas:{},proxy:void 0,filters:{"details.amount":{displayName:"Amount allowance",path:"details.amount",signature:"304402201a46e6b4ef89eaf9fcf4945d053bfc5616a826400fd758312fbbe976bafc07ec022025a9b408722baf983ee053f90179c75b0c55bb0668f437d55493e36069bbd5a3",tokenIndex:255,type:"amount"}}},k="0x1234",u="0x8ceb23fd6bc0add59e62ac25578270cff1b9f619";beforeEach(()=>{vi.resetAllMocks(),n.sendCommand.mockResolvedValue(I({data:{challenge:k}})),l.mockReturnValue({run:async()=>({clearSignContexts:[],clearSigningType:R.BASIC})})}),it("Build context with clear signing context not supported by the device",async()=>{const t=new y(n,e,a,p,m,d,"44'/60'/0'/0/0",f(!1),u,l);a.parse.mockReturnValueOnce(h({types:o,domain:c,message:r})),n.getDeviceSessionState.mockReturnValueOnce({sessionStateType:x.ReadyWithoutSecureChannel,deviceStatus:v.CONNECTED,installedApps:[],currentApp:{name:"Ethereum",version:"1.11.0"},deviceModelId:s.NANO_S,isSecureConnectionAllowed:!1});const i=await t.run();expect(i).toStrictEqual({deviceModelId:s.NANO_S,derivationPath:"44'/60'/0'/0/0",transactionChecks:void 0,types:o,domain:c,message:r,clearSignContext:b,calldatasContexts:{}})}),it("Build context with no clear signing context",async()=>{const t=new y(n,e,a,p,m,d,"44'/60'/0'/0/0",f(!1),u,l);a.parse.mockReturnValueOnce(h({types:o,domain:c,message:r})),n.getDeviceSessionState.mockReturnValueOnce({sessionStateType:x.ReadyWithoutSecureChannel,deviceStatus:v.CONNECTED,installedApps:[],currentApp:{name:"Ethereum",version:"1.12.0"},deviceModelId:s.FLEX,isSecureConnectionAllowed:!1}),e.getTypedDataFilters.mockResolvedValueOnce({type:E.ERROR,error:new Error("no filter")});const i=await t.run();expect(i).toStrictEqual({deviceModelId:s.FLEX,derivationPath:"44'/60'/0'/0/0",transactionChecks:void 0,types:o,domain:c,message:r,clearSignContext:b,calldatasContexts:{}})}),it("Build context with clear signing context",async()=>{const t={type:E.TRANSACTION_CHECK,payload:"web3Check"},i=new y(n,e,a,p,m,d,"44'/60'/0'/0/0",f(!1),u,l);e.getContexts.mockResolvedValueOnce([t]),a.parse.mockReturnValueOnce(h({types:o,domain:c,message:r})),n.getDeviceSessionState.mockReturnValueOnce({sessionStateType:x.ReadyWithoutSecureChannel,deviceStatus:v.CONNECTED,installedApps:[],currentApp:{name:"Ethereum",version:"1.12.0"},deviceModelId:s.FLEX,isSecureConnectionAllowed:!1}),e.getTypedDataFilters.mockResolvedValueOnce(g);const S=await i.run();expect(S).toStrictEqual({deviceModelId:s.FLEX,derivationPath:"44'/60'/0'/0/0",transactionChecks:void 0,types:o,domain:c,message:r,clearSignContext:C(g),calldatasContexts:{}}),expect(a.parse).toHaveBeenCalledWith(d),expect(e.getTypedDataFilters).toHaveBeenCalledWith({verifyingContract:"0x000000000022d473030f116ddee9f6b43ac78ba3",chainId:137,version:"v2",schema:d.types,challenge:k,deviceModelId:s.FLEX,fieldsValues:[{path:"details.amount",value:Uint8Array.from([18])},{path:"details.expiration",value:Uint8Array.from([19])}]})}),it("Build context with clear signing context and transaction checks",async()=>{const t={type:E.TRANSACTION_CHECK,payload:"transactionCheck"},i=new y(n,e,a,p,m,d,"44'/60'/0'/0/0",f(!0),u,l);e.getContexts.mockResolvedValueOnce([t]),a.parse.mockReturnValueOnce(h({types:o,domain:c,message:r})),n.getDeviceSessionState.mockReturnValueOnce({sessionStateType:x.ReadyWithoutSecureChannel,deviceStatus:v.CONNECTED,installedApps:[],currentApp:{name:"Ethereum",version:"1.12.0"},deviceModelId:s.FLEX,isSecureConnectionAllowed:!1}),e.getTypedDataFilters.mockResolvedValueOnce(g);const S=await i.run();expect(S).toStrictEqual({deviceModelId:s.FLEX,derivationPath:"44'/60'/0'/0/0",types:o,domain:c,message:r,clearSignContext:C(g),calldatasContexts:{},transactionChecks:t})}),it("Build context with clear signing context V1",async()=>{const t=new y(n,e,a,p,m,d,"44'/60'/0'/0/0",f(!1),u,l);a.parse.mockReturnValueOnce(h({types:o,domain:c,message:r})),n.getDeviceSessionState.mockReturnValueOnce({sessionStateType:x.ReadyWithoutSecureChannel,deviceStatus:v.CONNECTED,installedApps:[],currentApp:{name:"Ethereum",version:"1.11.0"},deviceModelId:s.FLEX,isSecureConnectionAllowed:!1}),e.getTypedDataFilters.mockResolvedValueOnce(g),await t.run(),expect(e.getTypedDataFilters).toHaveBeenCalledWith({verifyingContract:"0x000000000022d473030f116ddee9f6b43ac78ba3",chainId:137,version:"v1",schema:d.types,challenge:k,deviceModelId:s.FLEX,fieldsValues:[{path:"details.amount",value:Uint8Array.from([18])},{path:"details.expiration",value:Uint8Array.from([19])}]})}),it("Build context with clear signing context and calldatas",async()=>{const t=new y(n,e,a,p,m,d,"44'/60'/0'/0/0",f(!1),u,l),i={chainId:4660,data:"0x6a76120200000000000000000000000023f8abfc2824c397ccb3da89ae772984107ddb99",from:u,selector:"0x778899aa",to:"0x7ceb23fd6bc0add59e62ac25578270cff1b9f619",value:4200000000000000n},S={...g,calldatas:{0:{filter:{calldataIndex:0,displayName:"Transaction",valueFlag:!0,calleeFlag:A.Present,chainIdFlag:!1,selectorFlag:!1,amountFlag:!0,spenderFlag:A.Present,signature:"3045022100d8496ab69152efeef6a923a3ebd225334ad65dcb985814994243be7bc09bf27e02206314835816908dd6d51d3cbb0f9465d91d7ddc9104b34dd6c4247f65c551836e"},subset:i}}};a.parse.mockReturnValueOnce(h({types:o,domain:c,message:r})),n.getDeviceSessionState.mockReturnValueOnce({sessionStateType:x.ReadyWithoutSecureChannel,deviceStatus:v.CONNECTED,installedApps:[],currentApp:{name:"Ethereum",version:"1.12.0"},deviceModelId:s.FLEX,isSecureConnectionAllowed:!1}),e.getTypedDataFilters.mockResolvedValueOnce(S),l.mockReturnValue({run:async()=>({clearSignContexts:[],clearSigningType:R.EIP7730})});const O=await t.run();expect(O).toStrictEqual({deviceModelId:s.FLEX,derivationPath:"44'/60'/0'/0/0",transactionChecks:void 0,types:o,domain:c,message:r,clearSignContext:C(S),calldatasContexts:{0:[]}})}),it("Should throw an error if parsing fails",async()=>{const t=new y(n,e,a,p,m,d,"44'/60'/0'/0/0",f(!1),u,l);a.parse.mockReturnValueOnce(M(new Error("Parsing error")));try{await t.run()}catch(i){expect(i).toBeInstanceOf(Error),expect(i.message).toBe("Parsing error")}})});
2
2
  //# sourceMappingURL=BuildEIP712ContextTask.test.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/internal/app-binder/task/BuildEIP712ContextTask.test.ts"],
4
- "sourcesContent": ["import type {\n ClearSignContextSuccess,\n ClearSignContextType,\n TypedDataClearSignContextSuccess,\n} from \"@ledgerhq/context-module\";\nimport { TypedDataCalldataParamPresence } from \"@ledgerhq/context-module\";\nimport {\n CommandResultFactory,\n DeviceModelId,\n DeviceSessionStateType,\n DeviceStatus,\n} from \"@ledgerhq/device-management-kit\";\nimport { Just, Left, Nothing, Right } from \"purify-ts\";\n\nimport type { GetConfigCommandResponse } from \"@api/app-binder/GetConfigCommandTypes\";\nimport { ClearSigningType } from \"@api/model/ClearSigningType\";\nimport { makeDeviceActionInternalApiMock } from \"@internal/app-binder/device-action/__test-utils__/makeInternalApi\";\nimport { type TransactionMapperService } from \"@internal/transaction/service/mapper/TransactionMapperService\";\nimport { type TransactionParserService } from \"@internal/transaction/service/parser/TransactionParserService\";\nimport {\n PrimitiveType,\n StructType,\n TypedDataValueField,\n TypedDataValueRoot,\n} from \"@internal/typed-data/model/Types\";\n\nimport { BuildEIP712ContextTask } from \"./BuildEIP712ContextTask\";\n\ndescribe(\"BuildEIP712ContextTask\", () => {\n const apiMock = makeDeviceActionInternalApiMock();\n const contextMouleMock = {\n getFieldContext: vi.fn(),\n getContexts: vi.fn(),\n getTypedDataFilters: vi.fn(),\n getWeb3Checks: vi.fn(),\n getSolanaContext: vi.fn(),\n };\n const parserMock = {\n parse: vi.fn(),\n };\n const mockTransactionParser: TransactionParserService = {\n extractValue: vi.fn(),\n } as unknown as TransactionParserService;\n const mockTransactionMapper: TransactionMapperService = {\n mapTransactionToSubset: vi.fn(),\n };\n const getWeb3ChecksFactoryMock = vi.fn();\n const buildFullContextFactoryMock = vi.fn();\n\n function createAppConfig(\n web3ChecksEnabled: boolean,\n ): GetConfigCommandResponse {\n return {\n blindSigningEnabled: false,\n web3ChecksEnabled,\n web3ChecksOptIn: false,\n version: \"1.13.0\",\n };\n }\n\n const TEST_DATA = {\n domain: {\n name: \"Permit2\",\n chainId: 137,\n verifyingContract: \"0x000000000022d473030f116ddee9f6b43ac78ba3\",\n },\n primaryType: \"PermitSingle\",\n message: {\n details: {\n token: \"0x7ceb23fd6bc0add59e62ac25578270cff1b9f619\",\n amount: \"69420000000000000000\",\n expiration: \"1718184249\",\n nonce: \"0\",\n },\n spender: \"0xec7be89e9d109e7e3fec59c222cf297125fefda2\",\n sigDeadline: \"1715594049\",\n },\n types: {\n PermitSingle: [\n {\n name: \"details\",\n type: \"PermitDetails\",\n },\n {\n name: \"spender\",\n type: \"address\",\n },\n {\n name: \"sigDeadline\",\n type: \"uint256\",\n },\n ],\n PermitDetails: [\n { name: \"token\", type: \"address\" },\n { name: \"amount\", type: \"uint\" },\n { name: \"expiration\", type: \"uint\" },\n { name: \"nonce\", type: \"uint\" },\n ],\n },\n };\n\n const TEST_TYPES = {\n PermitSingle: {\n details: new StructType(\"PermitDetails\"),\n spender: new PrimitiveType(\"address\", \"address\", Nothing),\n sigDeadline: new PrimitiveType(\"uint256\", \"uint\", Just(32)),\n },\n PermitDetails: {\n token: new PrimitiveType(\"address\", \"address\", Nothing),\n amount: new PrimitiveType(\"uint160\", \"uint\", Just(20)),\n expiration: new PrimitiveType(\"uint48\", \"uint\", Just(6)),\n nonce: new PrimitiveType(\"uint48\", \"uint\", Just(6)),\n },\n };\n const TEST_DOMAIN_VALUES = [\n {\n path: \"\",\n type: \"\",\n value: new TypedDataValueRoot(\"EIP712Domain\"),\n },\n {\n path: \"chainId\",\n type: \"uint256\",\n value: new TypedDataValueField(Uint8Array.from([137])),\n },\n ];\n const TEST_MESSAGE_VALUES = [\n {\n path: \"\",\n type: \"\",\n value: new TypedDataValueRoot(\"PermitSingle\"),\n },\n {\n path: \"details.amount\",\n type: \"uint160\",\n value: new TypedDataValueField(Uint8Array.from([0x12])),\n },\n {\n path: \"details.expiration\",\n type: \"uint48\",\n value: new TypedDataValueField(Uint8Array.from([0x13])),\n },\n ];\n const TEST_CLEAR_SIGN_CONTEXT: TypedDataClearSignContextSuccess = {\n type: \"success\",\n messageInfo: {\n displayName: \"Permit2\",\n filtersCount: 1,\n signature:\n \"3045022100e3c597d13d28a87a88b0239404c668373cf5063362f2a81d09eed4582941dfe802207669aabb504fd5b95b2734057f6b8bbf51f14a69a5f9bdf658a5952cefbf44d3\",\n },\n trustedNamesAddresses: {},\n tokens: {},\n calldatas: {},\n proxy: undefined,\n filters: {\n \"details.amount\": {\n displayName: \"Amount allowance\",\n path: \"details.amount\",\n signature:\n \"304402201a46e6b4ef89eaf9fcf4945d053bfc5616a826400fd758312fbbe976bafc07ec022025a9b408722baf983ee053f90179c75b0c55bb0668f437d55493e36069bbd5a3\",\n tokenIndex: 255,\n type: \"amount\",\n },\n },\n };\n\n const TEST_CHALLENGE = \"0x1234\";\n\n beforeEach(() => {\n vi.resetAllMocks();\n getWeb3ChecksFactoryMock.mockReturnValue({\n run: async () => ({ web3Check: null }),\n });\n buildFullContextFactoryMock.mockReturnValue({\n run: async () => ({\n clearSignContexts: [],\n clearSigningType: ClearSigningType.BASIC,\n }),\n });\n apiMock.sendCommand.mockResolvedValue(\n CommandResultFactory({ data: { challenge: TEST_CHALLENGE } }),\n );\n });\n\n it(\"Build context with clear signing context not supported by the device\", async () => {\n // GIVEN\n const task = new BuildEIP712ContextTask(\n apiMock,\n contextMouleMock,\n parserMock,\n mockTransactionParser,\n mockTransactionMapper,\n TEST_DATA,\n \"44'/60'/0'/0/0\",\n createAppConfig(false),\n getWeb3ChecksFactoryMock,\n buildFullContextFactoryMock,\n );\n parserMock.parse.mockReturnValueOnce(\n Right({\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n }),\n );\n apiMock.getDeviceSessionState.mockReturnValueOnce({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Ethereum\", version: \"1.11.0\" },\n deviceModelId: DeviceModelId.NANO_S,\n isSecureConnectionAllowed: false,\n });\n // WHEN\n const builtContext = await task.run();\n // THEN\n expect(builtContext).toStrictEqual({\n deviceModelId: DeviceModelId.NANO_S,\n derivationPath: \"44'/60'/0'/0/0\",\n web3Check: null,\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n clearSignContext: Nothing,\n calldatasContexts: {},\n });\n });\n\n it(\"Build context with no clear signing context\", async () => {\n // GIVEN\n const task = new BuildEIP712ContextTask(\n apiMock,\n contextMouleMock,\n parserMock,\n mockTransactionParser,\n mockTransactionMapper,\n TEST_DATA,\n \"44'/60'/0'/0/0\",\n createAppConfig(false),\n getWeb3ChecksFactoryMock,\n buildFullContextFactoryMock,\n );\n parserMock.parse.mockReturnValueOnce(\n Right({\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n }),\n );\n apiMock.getDeviceSessionState.mockReturnValueOnce({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Ethereum\", version: \"1.12.0\" },\n deviceModelId: DeviceModelId.FLEX,\n isSecureConnectionAllowed: false,\n });\n contextMouleMock.getTypedDataFilters.mockResolvedValueOnce({\n type: \"error\",\n error: new Error(\"no filter\"),\n });\n // WHEN\n const builtContext = await task.run();\n // THEN\n expect(builtContext).toStrictEqual({\n deviceModelId: DeviceModelId.FLEX,\n derivationPath: \"44'/60'/0'/0/0\",\n web3Check: null,\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n clearSignContext: Nothing,\n calldatasContexts: {},\n });\n });\n\n it(\"Build context with clear signing context\", async () => {\n // GIVEN\n const expectedWeb3Check =\n \"web3Check\" as unknown as ClearSignContextSuccess<ClearSignContextType.WEB3_CHECK>;\n const task = new BuildEIP712ContextTask(\n apiMock,\n contextMouleMock,\n parserMock,\n mockTransactionParser,\n mockTransactionMapper,\n TEST_DATA,\n \"44'/60'/0'/0/0\",\n createAppConfig(false),\n getWeb3ChecksFactoryMock,\n buildFullContextFactoryMock,\n );\n getWeb3ChecksFactoryMock.mockReturnValueOnce({\n run: async () => ({ web3Check: expectedWeb3Check }),\n });\n parserMock.parse.mockReturnValueOnce(\n Right({\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n }),\n );\n apiMock.getDeviceSessionState.mockReturnValueOnce({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Ethereum\", version: \"1.12.0\" },\n deviceModelId: DeviceModelId.FLEX,\n isSecureConnectionAllowed: false,\n });\n contextMouleMock.getTypedDataFilters.mockResolvedValueOnce(\n TEST_CLEAR_SIGN_CONTEXT,\n );\n // WHEN\n const builtContext = await task.run();\n // THEN\n expect(builtContext).toStrictEqual({\n deviceModelId: DeviceModelId.FLEX,\n derivationPath: \"44'/60'/0'/0/0\",\n web3Check: null,\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n clearSignContext: Just(TEST_CLEAR_SIGN_CONTEXT),\n calldatasContexts: {},\n });\n expect(parserMock.parse).toHaveBeenCalledWith(TEST_DATA);\n expect(contextMouleMock.getTypedDataFilters).toHaveBeenCalledWith({\n verifyingContract: \"0x000000000022d473030f116ddee9f6b43ac78ba3\",\n chainId: 137,\n version: \"v2\",\n schema: TEST_DATA[\"types\"],\n challenge: TEST_CHALLENGE,\n deviceModelId: DeviceModelId.FLEX,\n fieldsValues: [\n {\n path: \"details.amount\",\n value: Uint8Array.from([0x12]),\n },\n {\n path: \"details.expiration\",\n value: Uint8Array.from([0x13]),\n },\n ],\n });\n });\n\n it(\"Build context with clear signing context and web3Check\", async () => {\n // GIVEN\n const expectedWeb3Check =\n \"web3Check\" as unknown as ClearSignContextSuccess<ClearSignContextType.WEB3_CHECK>;\n const task = new BuildEIP712ContextTask(\n apiMock,\n contextMouleMock,\n parserMock,\n mockTransactionParser,\n mockTransactionMapper,\n TEST_DATA,\n \"44'/60'/0'/0/0\",\n createAppConfig(true),\n getWeb3ChecksFactoryMock,\n buildFullContextFactoryMock,\n );\n getWeb3ChecksFactoryMock.mockReturnValueOnce({\n run: async () => ({ web3Check: expectedWeb3Check }),\n });\n parserMock.parse.mockReturnValueOnce(\n Right({\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n }),\n );\n apiMock.getDeviceSessionState.mockReturnValueOnce({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Ethereum\", version: \"1.12.0\" },\n deviceModelId: DeviceModelId.FLEX,\n isSecureConnectionAllowed: false,\n });\n contextMouleMock.getTypedDataFilters.mockResolvedValueOnce(\n TEST_CLEAR_SIGN_CONTEXT,\n );\n // WHEN\n const builtContext = await task.run();\n // THEN\n expect(builtContext).toStrictEqual({\n deviceModelId: DeviceModelId.FLEX,\n derivationPath: \"44'/60'/0'/0/0\",\n web3Check: expectedWeb3Check,\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n clearSignContext: Just(TEST_CLEAR_SIGN_CONTEXT),\n calldatasContexts: {},\n });\n expect(getWeb3ChecksFactoryMock).toHaveBeenCalledWith(apiMock, {\n contextModule: contextMouleMock,\n derivationPath: \"44'/60'/0'/0/0\",\n data: TEST_DATA,\n });\n });\n\n it(\"Build context with clear signing context V1\", async () => {\n // GIVEN\n const task = new BuildEIP712ContextTask(\n apiMock,\n contextMouleMock,\n parserMock,\n mockTransactionParser,\n mockTransactionMapper,\n TEST_DATA,\n \"44'/60'/0'/0/0\",\n createAppConfig(false),\n getWeb3ChecksFactoryMock,\n buildFullContextFactoryMock,\n );\n parserMock.parse.mockReturnValueOnce(\n Right({\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n }),\n );\n apiMock.getDeviceSessionState.mockReturnValueOnce({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Ethereum\", version: \"1.11.0\" },\n deviceModelId: DeviceModelId.FLEX,\n isSecureConnectionAllowed: false,\n });\n contextMouleMock.getTypedDataFilters.mockResolvedValueOnce(\n TEST_CLEAR_SIGN_CONTEXT,\n );\n // WHEN\n await task.run();\n // THEN\n expect(contextMouleMock.getTypedDataFilters).toHaveBeenCalledWith({\n verifyingContract: \"0x000000000022d473030f116ddee9f6b43ac78ba3\",\n chainId: 137,\n version: \"v1\",\n schema: TEST_DATA[\"types\"],\n challenge: TEST_CHALLENGE,\n deviceModelId: DeviceModelId.FLEX,\n fieldsValues: [\n {\n path: \"details.amount\",\n value: Uint8Array.from([0x12]),\n },\n {\n path: \"details.expiration\",\n value: Uint8Array.from([0x13]),\n },\n ],\n });\n });\n\n it(\"Build context with clear signing context and calldatas\", async () => {\n // GIVEN\n const task = new BuildEIP712ContextTask(\n apiMock,\n contextMouleMock,\n parserMock,\n mockTransactionParser,\n mockTransactionMapper,\n TEST_DATA,\n \"44'/60'/0'/0/0\",\n createAppConfig(false),\n getWeb3ChecksFactoryMock,\n buildFullContextFactoryMock,\n );\n const subset = {\n chainId: 0x1234,\n data: \"0x6a76120200000000000000000000000023f8abfc2824c397ccb3da89ae772984107ddb99\",\n from: \"0x8ceb23fd6bc0add59e62ac25578270cff1b9f619\",\n selector: \"0x778899aa\",\n to: \"0x7ceb23fd6bc0add59e62ac25578270cff1b9f619\",\n value: 4200000000000000n,\n };\n const clearSignContext = {\n ...TEST_CLEAR_SIGN_CONTEXT,\n calldatas: {\n 0: {\n filter: {\n calldataIndex: 0,\n displayName: \"Transaction\",\n valueFlag: true,\n calleeFlag: TypedDataCalldataParamPresence.Present,\n chainIdFlag: false,\n selectorFlag: false,\n amountFlag: true,\n spenderFlag: TypedDataCalldataParamPresence.Present,\n signature:\n \"3045022100d8496ab69152efeef6a923a3ebd225334ad65dcb985814994243be7bc09bf27e02206314835816908dd6d51d3cbb0f9465d91d7ddc9104b34dd6c4247f65c551836e\",\n },\n subset,\n },\n },\n };\n parserMock.parse.mockReturnValueOnce(\n Right({\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n }),\n );\n apiMock.getDeviceSessionState.mockReturnValueOnce({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Ethereum\", version: \"1.12.0\" },\n deviceModelId: DeviceModelId.FLEX,\n isSecureConnectionAllowed: false,\n });\n contextMouleMock.getTypedDataFilters.mockResolvedValueOnce(\n clearSignContext,\n );\n buildFullContextFactoryMock.mockReturnValue({\n run: async () => ({\n clearSignContexts: [],\n clearSigningType: ClearSigningType.EIP7730,\n }),\n });\n // WHEN\n const builtContext = await task.run();\n // THEN\n expect(buildFullContextFactoryMock).toHaveBeenCalledWith(\n apiMock,\n expect.objectContaining({\n subset,\n }),\n );\n expect(builtContext).toStrictEqual({\n deviceModelId: DeviceModelId.FLEX,\n derivationPath: \"44'/60'/0'/0/0\",\n web3Check: null,\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n clearSignContext: Just(clearSignContext),\n calldatasContexts: {\n 0: [],\n },\n });\n });\n\n it(\"Should throw an error if parsing fails\", async () => {\n // GIVEN\n const task = new BuildEIP712ContextTask(\n apiMock,\n contextMouleMock,\n parserMock,\n mockTransactionParser,\n mockTransactionMapper,\n TEST_DATA,\n \"44'/60'/0'/0/0\",\n createAppConfig(false),\n getWeb3ChecksFactoryMock,\n buildFullContextFactoryMock,\n );\n parserMock.parse.mockReturnValueOnce(Left(new Error(\"Parsing error\")));\n // WHEN\n try {\n await task.run();\n } catch (e) {\n // THEN\n expect(e).toBeInstanceOf(Error);\n // @ts-expect-error\n expect(e.message).toBe(\"Parsing error\");\n }\n });\n});\n"],
5
- "mappings": "AAKA,OAAS,kCAAAA,MAAsC,2BAC/C,OACE,wBAAAC,EACA,iBAAAC,EACA,0BAAAC,EACA,gBAAAC,MACK,kCACP,OAAS,QAAAC,EAAM,QAAAC,EAAM,WAAAC,EAAS,SAAAC,MAAa,YAG3C,OAAS,oBAAAC,MAAwB,8BACjC,OAAS,mCAAAC,MAAuC,oEAGhD,OACE,iBAAAC,EACA,cAAAC,EACA,uBAAAC,EACA,sBAAAC,MACK,mCAEP,OAAS,0BAAAC,MAA8B,2BAEvC,SAAS,yBAA0B,IAAM,CACvC,MAAMC,EAAUN,EAAgC,EAC1CO,EAAmB,CACvB,gBAAiB,GAAG,GAAG,EACvB,YAAa,GAAG,GAAG,EACnB,oBAAqB,GAAG,GAAG,EAC3B,cAAe,GAAG,GAAG,EACrB,iBAAkB,GAAG,GAAG,CAC1B,EACMC,EAAa,CACjB,MAAO,GAAG,GAAG,CACf,EACMC,EAAkD,CACtD,aAAc,GAAG,GAAG,CACtB,EACMC,EAAkD,CACtD,uBAAwB,GAAG,GAAG,CAChC,EACMC,EAA2B,GAAG,GAAG,EACjCC,EAA8B,GAAG,GAAG,EAE1C,SAASC,EACPC,EAC0B,CAC1B,MAAO,CACL,oBAAqB,GACrB,kBAAAA,EACA,gBAAiB,GACjB,QAAS,QACX,CACF,CAEA,MAAMC,EAAY,CAChB,OAAQ,CACN,KAAM,UACN,QAAS,IACT,kBAAmB,4CACrB,EACA,YAAa,eACb,QAAS,CACP,QAAS,CACP,MAAO,6CACP,OAAQ,uBACR,WAAY,aACZ,MAAO,GACT,EACA,QAAS,6CACT,YAAa,YACf,EACA,MAAO,CACL,aAAc,CACZ,CACE,KAAM,UACN,KAAM,eACR,EACA,CACE,KAAM,UACN,KAAM,SACR,EACA,CACE,KAAM,cACN,KAAM,SACR,CACF,EACA,cAAe,CACb,CAAE,KAAM,QAAS,KAAM,SAAU,EACjC,CAAE,KAAM,SAAU,KAAM,MAAO,EAC/B,CAAE,KAAM,aAAc,KAAM,MAAO,EACnC,CAAE,KAAM,QAAS,KAAM,MAAO,CAChC,CACF,CACF,EAEMC,EAAa,CACjB,aAAc,CACZ,QAAS,IAAId,EAAW,eAAe,EACvC,QAAS,IAAID,EAAc,UAAW,UAAWJ,CAAO,EACxD,YAAa,IAAII,EAAc,UAAW,OAAQN,EAAK,EAAE,CAAC,CAC5D,EACA,cAAe,CACb,MAAO,IAAIM,EAAc,UAAW,UAAWJ,CAAO,EACtD,OAAQ,IAAII,EAAc,UAAW,OAAQN,EAAK,EAAE,CAAC,EACrD,WAAY,IAAIM,EAAc,SAAU,OAAQN,EAAK,CAAC,CAAC,EACvD,MAAO,IAAIM,EAAc,SAAU,OAAQN,EAAK,CAAC,CAAC,CACpD,CACF,EACMsB,EAAqB,CACzB,CACE,KAAM,GACN,KAAM,GACN,MAAO,IAAIb,EAAmB,cAAc,CAC9C,EACA,CACE,KAAM,UACN,KAAM,UACN,MAAO,IAAID,EAAoB,WAAW,KAAK,CAAC,GAAG,CAAC,CAAC,CACvD,CACF,EACMe,EAAsB,CAC1B,CACE,KAAM,GACN,KAAM,GACN,MAAO,IAAId,EAAmB,cAAc,CAC9C,EACA,CACE,KAAM,iBACN,KAAM,UACN,MAAO,IAAID,EAAoB,WAAW,KAAK,CAAC,EAAI,CAAC,CAAC,CACxD,EACA,CACE,KAAM,qBACN,KAAM,SACN,MAAO,IAAIA,EAAoB,WAAW,KAAK,CAAC,EAAI,CAAC,CAAC,CACxD,CACF,EACMgB,EAA4D,CAChE,KAAM,UACN,YAAa,CACX,YAAa,UACb,aAAc,EACd,UACE,gJACJ,EACA,sBAAuB,CAAC,EACxB,OAAQ,CAAC,EACT,UAAW,CAAC,EACZ,MAAO,OACP,QAAS,CACP,iBAAkB,CAChB,YAAa,mBACb,KAAM,iBACN,UACE,+IACF,WAAY,IACZ,KAAM,QACR,CACF,CACF,EAEMC,EAAiB,SAEvB,WAAW,IAAM,CACf,GAAG,cAAc,EACjBT,EAAyB,gBAAgB,CACvC,IAAK,UAAa,CAAE,UAAW,IAAK,EACtC,CAAC,EACDC,EAA4B,gBAAgB,CAC1C,IAAK,UAAa,CAChB,kBAAmB,CAAC,EACpB,iBAAkBb,EAAiB,KACrC,EACF,CAAC,EACDO,EAAQ,YAAY,kBAClBf,EAAqB,CAAE,KAAM,CAAE,UAAW6B,CAAe,CAAE,CAAC,CAC9D,CACF,CAAC,EAED,GAAG,uEAAwE,SAAY,CAErF,MAAMC,EAAO,IAAIhB,EACfC,EACAC,EACAC,EACAC,EACAC,EACAK,EACA,iBACAF,EAAgB,EAAK,EACrBF,EACAC,CACF,EACAJ,EAAW,MAAM,oBACfV,EAAM,CACJ,MAAOkB,EACP,OAAQC,EACR,QAASC,CACX,CAAC,CACH,EACAZ,EAAQ,sBAAsB,oBAAoB,CAChD,iBAAkBb,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,WAAY,QAAS,QAAS,EAClD,cAAeF,EAAc,OAC7B,0BAA2B,EAC7B,CAAC,EAED,MAAM8B,EAAe,MAAMD,EAAK,IAAI,EAEpC,OAAOC,CAAY,EAAE,cAAc,CACjC,cAAe9B,EAAc,OAC7B,eAAgB,iBAChB,UAAW,KACX,MAAOwB,EACP,OAAQC,EACR,QAASC,EACT,iBAAkBrB,EAClB,kBAAmB,CAAC,CACtB,CAAC,CACH,CAAC,EAED,GAAG,8CAA+C,SAAY,CAE5D,MAAMwB,EAAO,IAAIhB,EACfC,EACAC,EACAC,EACAC,EACAC,EACAK,EACA,iBACAF,EAAgB,EAAK,EACrBF,EACAC,CACF,EACAJ,EAAW,MAAM,oBACfV,EAAM,CACJ,MAAOkB,EACP,OAAQC,EACR,QAASC,CACX,CAAC,CACH,EACAZ,EAAQ,sBAAsB,oBAAoB,CAChD,iBAAkBb,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,WAAY,QAAS,QAAS,EAClD,cAAeF,EAAc,KAC7B,0BAA2B,EAC7B,CAAC,EACDe,EAAiB,oBAAoB,sBAAsB,CACzD,KAAM,QACN,MAAO,IAAI,MAAM,WAAW,CAC9B,CAAC,EAED,MAAMe,EAAe,MAAMD,EAAK,IAAI,EAEpC,OAAOC,CAAY,EAAE,cAAc,CACjC,cAAe9B,EAAc,KAC7B,eAAgB,iBAChB,UAAW,KACX,MAAOwB,EACP,OAAQC,EACR,QAASC,EACT,iBAAkBrB,EAClB,kBAAmB,CAAC,CACtB,CAAC,CACH,CAAC,EAED,GAAG,2CAA4C,SAAY,CAEzD,MAAM0B,EACJ,YACIF,EAAO,IAAIhB,EACfC,EACAC,EACAC,EACAC,EACAC,EACAK,EACA,iBACAF,EAAgB,EAAK,EACrBF,EACAC,CACF,EACAD,EAAyB,oBAAoB,CAC3C,IAAK,UAAa,CAAE,UAAWY,CAAkB,EACnD,CAAC,EACDf,EAAW,MAAM,oBACfV,EAAM,CACJ,MAAOkB,EACP,OAAQC,EACR,QAASC,CACX,CAAC,CACH,EACAZ,EAAQ,sBAAsB,oBAAoB,CAChD,iBAAkBb,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,WAAY,QAAS,QAAS,EAClD,cAAeF,EAAc,KAC7B,0BAA2B,EAC7B,CAAC,EACDe,EAAiB,oBAAoB,sBACnCY,CACF,EAEA,MAAMG,EAAe,MAAMD,EAAK,IAAI,EAEpC,OAAOC,CAAY,EAAE,cAAc,CACjC,cAAe9B,EAAc,KAC7B,eAAgB,iBAChB,UAAW,KACX,MAAOwB,EACP,OAAQC,EACR,QAASC,EACT,iBAAkBvB,EAAKwB,CAAuB,EAC9C,kBAAmB,CAAC,CACtB,CAAC,EACD,OAAOX,EAAW,KAAK,EAAE,qBAAqBO,CAAS,EACvD,OAAOR,EAAiB,mBAAmB,EAAE,qBAAqB,CAChE,kBAAmB,6CACnB,QAAS,IACT,QAAS,KACT,OAAQQ,EAAU,MAClB,UAAWK,EACX,cAAe5B,EAAc,KAC7B,aAAc,CACZ,CACE,KAAM,iBACN,MAAO,WAAW,KAAK,CAAC,EAAI,CAAC,CAC/B,EACA,CACE,KAAM,qBACN,MAAO,WAAW,KAAK,CAAC,EAAI,CAAC,CAC/B,CACF,CACF,CAAC,CACH,CAAC,EAED,GAAG,yDAA0D,SAAY,CAEvE,MAAM+B,EACJ,YACIF,EAAO,IAAIhB,EACfC,EACAC,EACAC,EACAC,EACAC,EACAK,EACA,iBACAF,EAAgB,EAAI,EACpBF,EACAC,CACF,EACAD,EAAyB,oBAAoB,CAC3C,IAAK,UAAa,CAAE,UAAWY,CAAkB,EACnD,CAAC,EACDf,EAAW,MAAM,oBACfV,EAAM,CACJ,MAAOkB,EACP,OAAQC,EACR,QAASC,CACX,CAAC,CACH,EACAZ,EAAQ,sBAAsB,oBAAoB,CAChD,iBAAkBb,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,WAAY,QAAS,QAAS,EAClD,cAAeF,EAAc,KAC7B,0BAA2B,EAC7B,CAAC,EACDe,EAAiB,oBAAoB,sBACnCY,CACF,EAEA,MAAMG,EAAe,MAAMD,EAAK,IAAI,EAEpC,OAAOC,CAAY,EAAE,cAAc,CACjC,cAAe9B,EAAc,KAC7B,eAAgB,iBAChB,UAAW+B,EACX,MAAOP,EACP,OAAQC,EACR,QAASC,EACT,iBAAkBvB,EAAKwB,CAAuB,EAC9C,kBAAmB,CAAC,CACtB,CAAC,EACD,OAAOR,CAAwB,EAAE,qBAAqBL,EAAS,CAC7D,cAAeC,EACf,eAAgB,iBAChB,KAAMQ,CACR,CAAC,CACH,CAAC,EAED,GAAG,8CAA+C,SAAY,CAE5D,MAAMM,EAAO,IAAIhB,EACfC,EACAC,EACAC,EACAC,EACAC,EACAK,EACA,iBACAF,EAAgB,EAAK,EACrBF,EACAC,CACF,EACAJ,EAAW,MAAM,oBACfV,EAAM,CACJ,MAAOkB,EACP,OAAQC,EACR,QAASC,CACX,CAAC,CACH,EACAZ,EAAQ,sBAAsB,oBAAoB,CAChD,iBAAkBb,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,WAAY,QAAS,QAAS,EAClD,cAAeF,EAAc,KAC7B,0BAA2B,EAC7B,CAAC,EACDe,EAAiB,oBAAoB,sBACnCY,CACF,EAEA,MAAME,EAAK,IAAI,EAEf,OAAOd,EAAiB,mBAAmB,EAAE,qBAAqB,CAChE,kBAAmB,6CACnB,QAAS,IACT,QAAS,KACT,OAAQQ,EAAU,MAClB,UAAWK,EACX,cAAe5B,EAAc,KAC7B,aAAc,CACZ,CACE,KAAM,iBACN,MAAO,WAAW,KAAK,CAAC,EAAI,CAAC,CAC/B,EACA,CACE,KAAM,qBACN,MAAO,WAAW,KAAK,CAAC,EAAI,CAAC,CAC/B,CACF,CACF,CAAC,CACH,CAAC,EAED,GAAG,yDAA0D,SAAY,CAEvE,MAAM6B,EAAO,IAAIhB,EACfC,EACAC,EACAC,EACAC,EACAC,EACAK,EACA,iBACAF,EAAgB,EAAK,EACrBF,EACAC,CACF,EACMY,EAAS,CACb,QAAS,KACT,KAAM,6EACN,KAAM,6CACN,SAAU,aACV,GAAI,6CACJ,MAAO,iBACT,EACMC,EAAmB,CACvB,GAAGN,EACH,UAAW,CACT,EAAG,CACD,OAAQ,CACN,cAAe,EACf,YAAa,cACb,UAAW,GACX,WAAY7B,EAA+B,QAC3C,YAAa,GACb,aAAc,GACd,WAAY,GACZ,YAAaA,EAA+B,QAC5C,UACE,gJACJ,EACA,OAAAkC,CACF,CACF,CACF,EACAhB,EAAW,MAAM,oBACfV,EAAM,CACJ,MAAOkB,EACP,OAAQC,EACR,QAASC,CACX,CAAC,CACH,EACAZ,EAAQ,sBAAsB,oBAAoB,CAChD,iBAAkBb,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,WAAY,QAAS,QAAS,EAClD,cAAeF,EAAc,KAC7B,0BAA2B,EAC7B,CAAC,EACDe,EAAiB,oBAAoB,sBACnCkB,CACF,EACAb,EAA4B,gBAAgB,CAC1C,IAAK,UAAa,CAChB,kBAAmB,CAAC,EACpB,iBAAkBb,EAAiB,OACrC,EACF,CAAC,EAED,MAAMuB,EAAe,MAAMD,EAAK,IAAI,EAEpC,OAAOT,CAA2B,EAAE,qBAClCN,EACA,OAAO,iBAAiB,CACtB,OAAAkB,CACF,CAAC,CACH,EACA,OAAOF,CAAY,EAAE,cAAc,CACjC,cAAe9B,EAAc,KAC7B,eAAgB,iBAChB,UAAW,KACX,MAAOwB,EACP,OAAQC,EACR,QAASC,EACT,iBAAkBvB,EAAK8B,CAAgB,EACvC,kBAAmB,CACjB,EAAG,CAAC,CACN,CACF,CAAC,CACH,CAAC,EAED,GAAG,yCAA0C,SAAY,CAEvD,MAAMJ,EAAO,IAAIhB,EACfC,EACAC,EACAC,EACAC,EACAC,EACAK,EACA,iBACAF,EAAgB,EAAK,EACrBF,EACAC,CACF,EACAJ,EAAW,MAAM,oBAAoBZ,EAAK,IAAI,MAAM,eAAe,CAAC,CAAC,EAErE,GAAI,CACF,MAAMyB,EAAK,IAAI,CACjB,OAASK,EAAG,CAEV,OAAOA,CAAC,EAAE,eAAe,KAAK,EAE9B,OAAOA,EAAE,OAAO,EAAE,KAAK,eAAe,CACxC,CACF,CAAC,CACH,CAAC",
6
- "names": ["TypedDataCalldataParamPresence", "CommandResultFactory", "DeviceModelId", "DeviceSessionStateType", "DeviceStatus", "Just", "Left", "Nothing", "Right", "ClearSigningType", "makeDeviceActionInternalApiMock", "PrimitiveType", "StructType", "TypedDataValueField", "TypedDataValueRoot", "BuildEIP712ContextTask", "apiMock", "contextMouleMock", "parserMock", "mockTransactionParser", "mockTransactionMapper", "getWeb3ChecksFactoryMock", "buildFullContextFactoryMock", "createAppConfig", "web3ChecksEnabled", "TEST_DATA", "TEST_TYPES", "TEST_DOMAIN_VALUES", "TEST_MESSAGE_VALUES", "TEST_CLEAR_SIGN_CONTEXT", "TEST_CHALLENGE", "task", "builtContext", "expectedWeb3Check", "subset", "clearSignContext", "e"]
4
+ "sourcesContent": ["import {\n ClearSignContextType,\n type ContextModule,\n type TypedDataClearSignContextSuccess,\n} from \"@ledgerhq/context-module\";\nimport { TypedDataCalldataParamPresence } from \"@ledgerhq/context-module\";\nimport {\n CommandResultFactory,\n DeviceModelId,\n DeviceSessionStateType,\n DeviceStatus,\n} from \"@ledgerhq/device-management-kit\";\nimport { Just, Left, Nothing, Right } from \"purify-ts\";\n\nimport type { GetConfigCommandResponse } from \"@api/app-binder/GetConfigCommandTypes\";\nimport { ClearSigningType } from \"@api/model/ClearSigningType\";\nimport { makeDeviceActionInternalApiMock } from \"@internal/app-binder/device-action/__test-utils__/makeInternalApi\";\nimport { type TransactionMapperService } from \"@internal/transaction/service/mapper/TransactionMapperService\";\nimport { type TransactionParserService } from \"@internal/transaction/service/parser/TransactionParserService\";\nimport {\n PrimitiveType,\n StructType,\n TypedDataValueField,\n TypedDataValueRoot,\n} from \"@internal/typed-data/model/Types\";\n\nimport { BuildEIP712ContextTask } from \"./BuildEIP712ContextTask\";\n\ndescribe(\"BuildEIP712ContextTask\", () => {\n const apiMock = makeDeviceActionInternalApiMock();\n const contextModuleMock = {\n getFieldContext: vi.fn(),\n getContexts: vi.fn(),\n getTypedDataFilters: vi.fn(),\n };\n const parserMock = {\n parse: vi.fn(),\n };\n const mockTransactionParser: TransactionParserService = {\n extractValue: vi.fn(),\n } as unknown as TransactionParserService;\n const mockTransactionMapper: TransactionMapperService = {\n mapTransactionToSubset: vi.fn(),\n };\n const buildFullContextFactoryMock = vi.fn();\n\n function createAppConfig(\n web3ChecksEnabled: boolean,\n ): GetConfigCommandResponse {\n return {\n blindSigningEnabled: false,\n web3ChecksEnabled,\n web3ChecksOptIn: false,\n version: \"1.13.0\",\n };\n }\n\n const TEST_DATA = {\n domain: {\n name: \"Permit2\",\n chainId: 137,\n verifyingContract: \"0x000000000022d473030f116ddee9f6b43ac78ba3\",\n },\n primaryType: \"PermitSingle\",\n message: {\n details: {\n token: \"0x7ceb23fd6bc0add59e62ac25578270cff1b9f619\",\n amount: \"69420000000000000000\",\n expiration: \"1718184249\",\n nonce: \"0\",\n },\n spender: \"0xec7be89e9d109e7e3fec59c222cf297125fefda2\",\n sigDeadline: \"1715594049\",\n },\n types: {\n PermitSingle: [\n {\n name: \"details\",\n type: \"PermitDetails\",\n },\n {\n name: \"spender\",\n type: \"address\",\n },\n {\n name: \"sigDeadline\",\n type: \"uint256\",\n },\n ],\n PermitDetails: [\n { name: \"token\", type: \"address\" },\n { name: \"amount\", type: \"uint\" },\n { name: \"expiration\", type: \"uint\" },\n { name: \"nonce\", type: \"uint\" },\n ],\n },\n };\n\n const TEST_TYPES = {\n PermitSingle: {\n details: new StructType(\"PermitDetails\"),\n spender: new PrimitiveType(\"address\", \"address\", Nothing),\n sigDeadline: new PrimitiveType(\"uint256\", \"uint\", Just(32)),\n },\n PermitDetails: {\n token: new PrimitiveType(\"address\", \"address\", Nothing),\n amount: new PrimitiveType(\"uint160\", \"uint\", Just(20)),\n expiration: new PrimitiveType(\"uint48\", \"uint\", Just(6)),\n nonce: new PrimitiveType(\"uint48\", \"uint\", Just(6)),\n },\n };\n const TEST_DOMAIN_VALUES = [\n {\n path: \"\",\n type: \"\",\n value: new TypedDataValueRoot(\"EIP712Domain\"),\n },\n {\n path: \"chainId\",\n type: \"uint256\",\n value: new TypedDataValueField(Uint8Array.from([137])),\n },\n ];\n const TEST_MESSAGE_VALUES = [\n {\n path: \"\",\n type: \"\",\n value: new TypedDataValueRoot(\"PermitSingle\"),\n },\n {\n path: \"details.amount\",\n type: \"uint160\",\n value: new TypedDataValueField(Uint8Array.from([0x12])),\n },\n {\n path: \"details.expiration\",\n type: \"uint48\",\n value: new TypedDataValueField(Uint8Array.from([0x13])),\n },\n ];\n const TEST_CLEAR_SIGN_CONTEXT: TypedDataClearSignContextSuccess = {\n type: \"success\",\n messageInfo: {\n displayName: \"Permit2\",\n filtersCount: 1,\n signature:\n \"3045022100e3c597d13d28a87a88b0239404c668373cf5063362f2a81d09eed4582941dfe802207669aabb504fd5b95b2734057f6b8bbf51f14a69a5f9bdf658a5952cefbf44d3\",\n },\n trustedNamesAddresses: {},\n tokens: {},\n calldatas: {},\n proxy: undefined,\n filters: {\n \"details.amount\": {\n displayName: \"Amount allowance\",\n path: \"details.amount\",\n signature:\n \"304402201a46e6b4ef89eaf9fcf4945d053bfc5616a826400fd758312fbbe976bafc07ec022025a9b408722baf983ee053f90179c75b0c55bb0668f437d55493e36069bbd5a3\",\n tokenIndex: 255,\n type: \"amount\",\n },\n },\n };\n\n const TEST_CHALLENGE = \"0x1234\";\n const TEST_FROM = \"0x8ceb23fd6bc0add59e62ac25578270cff1b9f619\";\n\n beforeEach(() => {\n vi.resetAllMocks();\n apiMock.sendCommand.mockResolvedValue(\n CommandResultFactory({ data: { challenge: TEST_CHALLENGE } }),\n );\n buildFullContextFactoryMock.mockReturnValue({\n run: async () => ({\n clearSignContexts: [],\n clearSigningType: ClearSigningType.BASIC,\n }),\n });\n });\n\n it(\"Build context with clear signing context not supported by the device\", async () => {\n // GIVEN\n const task = new BuildEIP712ContextTask(\n apiMock,\n contextModuleMock as unknown as ContextModule,\n parserMock,\n mockTransactionParser,\n mockTransactionMapper,\n TEST_DATA,\n \"44'/60'/0'/0/0\",\n createAppConfig(false),\n TEST_FROM,\n buildFullContextFactoryMock,\n );\n parserMock.parse.mockReturnValueOnce(\n Right({\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n }),\n );\n apiMock.getDeviceSessionState.mockReturnValueOnce({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Ethereum\", version: \"1.11.0\" },\n deviceModelId: DeviceModelId.NANO_S,\n isSecureConnectionAllowed: false,\n });\n // WHEN\n const builtContext = await task.run();\n // THEN\n expect(builtContext).toStrictEqual({\n deviceModelId: DeviceModelId.NANO_S,\n derivationPath: \"44'/60'/0'/0/0\",\n transactionChecks: undefined,\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n clearSignContext: Nothing,\n calldatasContexts: {},\n });\n });\n\n it(\"Build context with no clear signing context\", async () => {\n // GIVEN\n const task = new BuildEIP712ContextTask(\n apiMock,\n contextModuleMock as unknown as ContextModule,\n parserMock,\n mockTransactionParser,\n mockTransactionMapper,\n TEST_DATA,\n \"44'/60'/0'/0/0\",\n createAppConfig(false),\n TEST_FROM,\n buildFullContextFactoryMock,\n );\n parserMock.parse.mockReturnValueOnce(\n Right({\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n }),\n );\n apiMock.getDeviceSessionState.mockReturnValueOnce({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Ethereum\", version: \"1.12.0\" },\n deviceModelId: DeviceModelId.FLEX,\n isSecureConnectionAllowed: false,\n });\n contextModuleMock.getTypedDataFilters.mockResolvedValueOnce({\n type: ClearSignContextType.ERROR,\n error: new Error(\"no filter\"),\n });\n // WHEN\n const builtContext = await task.run();\n // THEN\n expect(builtContext).toStrictEqual({\n deviceModelId: DeviceModelId.FLEX,\n derivationPath: \"44'/60'/0'/0/0\",\n transactionChecks: undefined,\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n clearSignContext: Nothing,\n calldatasContexts: {},\n });\n });\n\n it(\"Build context with clear signing context\", async () => {\n // GIVEN\n const txCheckContext = {\n type: ClearSignContextType.TRANSACTION_CHECK,\n payload: \"web3Check\",\n };\n const task = new BuildEIP712ContextTask(\n apiMock,\n contextModuleMock as unknown as ContextModule,\n parserMock,\n mockTransactionParser,\n mockTransactionMapper,\n TEST_DATA,\n \"44'/60'/0'/0/0\",\n createAppConfig(false),\n TEST_FROM,\n buildFullContextFactoryMock,\n );\n contextModuleMock.getContexts.mockResolvedValueOnce([txCheckContext]);\n parserMock.parse.mockReturnValueOnce(\n Right({\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n }),\n );\n apiMock.getDeviceSessionState.mockReturnValueOnce({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Ethereum\", version: \"1.12.0\" },\n deviceModelId: DeviceModelId.FLEX,\n isSecureConnectionAllowed: false,\n });\n contextModuleMock.getTypedDataFilters.mockResolvedValueOnce(\n TEST_CLEAR_SIGN_CONTEXT,\n );\n // WHEN\n const builtContext = await task.run();\n // THEN\n expect(builtContext).toStrictEqual({\n deviceModelId: DeviceModelId.FLEX,\n derivationPath: \"44'/60'/0'/0/0\",\n transactionChecks: undefined,\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n clearSignContext: Just(TEST_CLEAR_SIGN_CONTEXT),\n calldatasContexts: {},\n });\n expect(parserMock.parse).toHaveBeenCalledWith(TEST_DATA);\n expect(contextModuleMock.getTypedDataFilters).toHaveBeenCalledWith({\n verifyingContract: \"0x000000000022d473030f116ddee9f6b43ac78ba3\",\n chainId: 137,\n version: \"v2\",\n schema: TEST_DATA[\"types\"],\n challenge: TEST_CHALLENGE,\n deviceModelId: DeviceModelId.FLEX,\n fieldsValues: [\n {\n path: \"details.amount\",\n value: Uint8Array.from([0x12]),\n },\n {\n path: \"details.expiration\",\n value: Uint8Array.from([0x13]),\n },\n ],\n });\n });\n\n it(\"Build context with clear signing context and transaction checks\", async () => {\n // GIVEN\n const txCheckContext = {\n type: ClearSignContextType.TRANSACTION_CHECK,\n payload: \"transactionCheck\",\n };\n const task = new BuildEIP712ContextTask(\n apiMock,\n contextModuleMock as unknown as ContextModule,\n parserMock,\n mockTransactionParser,\n mockTransactionMapper,\n TEST_DATA,\n \"44'/60'/0'/0/0\",\n createAppConfig(true),\n TEST_FROM,\n buildFullContextFactoryMock,\n );\n contextModuleMock.getContexts.mockResolvedValueOnce([txCheckContext]);\n parserMock.parse.mockReturnValueOnce(\n Right({\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n }),\n );\n apiMock.getDeviceSessionState.mockReturnValueOnce({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Ethereum\", version: \"1.12.0\" },\n deviceModelId: DeviceModelId.FLEX,\n isSecureConnectionAllowed: false,\n });\n contextModuleMock.getTypedDataFilters.mockResolvedValueOnce(\n TEST_CLEAR_SIGN_CONTEXT,\n );\n // WHEN\n const builtContext = await task.run();\n // THEN\n expect(builtContext).toStrictEqual({\n deviceModelId: DeviceModelId.FLEX,\n derivationPath: \"44'/60'/0'/0/0\",\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n clearSignContext: Just(TEST_CLEAR_SIGN_CONTEXT),\n calldatasContexts: {},\n transactionChecks: txCheckContext,\n });\n });\n\n it(\"Build context with clear signing context V1\", async () => {\n // GIVEN\n const task = new BuildEIP712ContextTask(\n apiMock,\n contextModuleMock as unknown as ContextModule,\n parserMock,\n mockTransactionParser,\n mockTransactionMapper,\n TEST_DATA,\n \"44'/60'/0'/0/0\",\n createAppConfig(false),\n TEST_FROM,\n buildFullContextFactoryMock,\n );\n parserMock.parse.mockReturnValueOnce(\n Right({\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n }),\n );\n apiMock.getDeviceSessionState.mockReturnValueOnce({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Ethereum\", version: \"1.11.0\" },\n deviceModelId: DeviceModelId.FLEX,\n isSecureConnectionAllowed: false,\n });\n contextModuleMock.getTypedDataFilters.mockResolvedValueOnce(\n TEST_CLEAR_SIGN_CONTEXT,\n );\n // WHEN\n await task.run();\n // THEN\n expect(contextModuleMock.getTypedDataFilters).toHaveBeenCalledWith({\n verifyingContract: \"0x000000000022d473030f116ddee9f6b43ac78ba3\",\n chainId: 137,\n version: \"v1\",\n schema: TEST_DATA[\"types\"],\n challenge: TEST_CHALLENGE,\n deviceModelId: DeviceModelId.FLEX,\n fieldsValues: [\n {\n path: \"details.amount\",\n value: Uint8Array.from([0x12]),\n },\n {\n path: \"details.expiration\",\n value: Uint8Array.from([0x13]),\n },\n ],\n });\n });\n\n it(\"Build context with clear signing context and calldatas\", async () => {\n // GIVEN\n const task = new BuildEIP712ContextTask(\n apiMock,\n contextModuleMock as unknown as ContextModule,\n parserMock,\n mockTransactionParser,\n mockTransactionMapper,\n TEST_DATA,\n \"44'/60'/0'/0/0\",\n createAppConfig(false),\n TEST_FROM,\n buildFullContextFactoryMock,\n );\n const subset = {\n chainId: 0x1234,\n data: \"0x6a76120200000000000000000000000023f8abfc2824c397ccb3da89ae772984107ddb99\",\n from: TEST_FROM,\n selector: \"0x778899aa\",\n to: \"0x7ceb23fd6bc0add59e62ac25578270cff1b9f619\",\n value: 4200000000000000n,\n };\n const clearSignContext = {\n ...TEST_CLEAR_SIGN_CONTEXT,\n calldatas: {\n 0: {\n filter: {\n calldataIndex: 0,\n displayName: \"Transaction\",\n valueFlag: true,\n calleeFlag: TypedDataCalldataParamPresence.Present,\n chainIdFlag: false,\n selectorFlag: false,\n amountFlag: true,\n spenderFlag: TypedDataCalldataParamPresence.Present,\n signature:\n \"3045022100d8496ab69152efeef6a923a3ebd225334ad65dcb985814994243be7bc09bf27e02206314835816908dd6d51d3cbb0f9465d91d7ddc9104b34dd6c4247f65c551836e\",\n },\n subset,\n },\n },\n };\n parserMock.parse.mockReturnValueOnce(\n Right({\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n }),\n );\n apiMock.getDeviceSessionState.mockReturnValueOnce({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Ethereum\", version: \"1.12.0\" },\n deviceModelId: DeviceModelId.FLEX,\n isSecureConnectionAllowed: false,\n });\n contextModuleMock.getTypedDataFilters.mockResolvedValueOnce(\n clearSignContext,\n );\n buildFullContextFactoryMock.mockReturnValue({\n run: async () => ({\n clearSignContexts: [],\n clearSigningType: ClearSigningType.EIP7730,\n }),\n });\n // WHEN\n const builtContext = await task.run();\n // THEN\n expect(builtContext).toStrictEqual({\n deviceModelId: DeviceModelId.FLEX,\n derivationPath: \"44'/60'/0'/0/0\",\n transactionChecks: undefined,\n types: TEST_TYPES,\n domain: TEST_DOMAIN_VALUES,\n message: TEST_MESSAGE_VALUES,\n clearSignContext: Just(clearSignContext),\n calldatasContexts: {\n 0: [],\n },\n });\n });\n\n it(\"Should throw an error if parsing fails\", async () => {\n // GIVEN\n const task = new BuildEIP712ContextTask(\n apiMock,\n contextModuleMock as unknown as ContextModule,\n parserMock,\n mockTransactionParser,\n mockTransactionMapper,\n TEST_DATA,\n \"44'/60'/0'/0/0\",\n createAppConfig(false),\n TEST_FROM,\n buildFullContextFactoryMock,\n );\n parserMock.parse.mockReturnValueOnce(Left(new Error(\"Parsing error\")));\n // WHEN\n try {\n await task.run();\n } catch (e) {\n // THEN\n expect(e).toBeInstanceOf(Error);\n // @ts-expect-error\n expect(e.message).toBe(\"Parsing error\");\n }\n });\n});\n"],
5
+ "mappings": "AAAA,OACE,wBAAAA,MAGK,2BACP,OAAS,kCAAAC,MAAsC,2BAC/C,OACE,wBAAAC,EACA,iBAAAC,EACA,0BAAAC,EACA,gBAAAC,MACK,kCACP,OAAS,QAAAC,EAAM,QAAAC,EAAM,WAAAC,EAAS,SAAAC,MAAa,YAG3C,OAAS,oBAAAC,MAAwB,8BACjC,OAAS,mCAAAC,MAAuC,oEAGhD,OACE,iBAAAC,EACA,cAAAC,EACA,uBAAAC,EACA,sBAAAC,MACK,mCAEP,OAAS,0BAAAC,MAA8B,2BAEvC,SAAS,yBAA0B,IAAM,CACvC,MAAMC,EAAUN,EAAgC,EAC1CO,EAAoB,CACxB,gBAAiB,GAAG,GAAG,EACvB,YAAa,GAAG,GAAG,EACnB,oBAAqB,GAAG,GAAG,CAC7B,EACMC,EAAa,CACjB,MAAO,GAAG,GAAG,CACf,EACMC,EAAkD,CACtD,aAAc,GAAG,GAAG,CACtB,EACMC,EAAkD,CACtD,uBAAwB,GAAG,GAAG,CAChC,EACMC,EAA8B,GAAG,GAAG,EAE1C,SAASC,EACPC,EAC0B,CAC1B,MAAO,CACL,oBAAqB,GACrB,kBAAAA,EACA,gBAAiB,GACjB,QAAS,QACX,CACF,CAEA,MAAMC,EAAY,CAChB,OAAQ,CACN,KAAM,UACN,QAAS,IACT,kBAAmB,4CACrB,EACA,YAAa,eACb,QAAS,CACP,QAAS,CACP,MAAO,6CACP,OAAQ,uBACR,WAAY,aACZ,MAAO,GACT,EACA,QAAS,6CACT,YAAa,YACf,EACA,MAAO,CACL,aAAc,CACZ,CACE,KAAM,UACN,KAAM,eACR,EACA,CACE,KAAM,UACN,KAAM,SACR,EACA,CACE,KAAM,cACN,KAAM,SACR,CACF,EACA,cAAe,CACb,CAAE,KAAM,QAAS,KAAM,SAAU,EACjC,CAAE,KAAM,SAAU,KAAM,MAAO,EAC/B,CAAE,KAAM,aAAc,KAAM,MAAO,EACnC,CAAE,KAAM,QAAS,KAAM,MAAO,CAChC,CACF,CACF,EAEMC,EAAa,CACjB,aAAc,CACZ,QAAS,IAAIb,EAAW,eAAe,EACvC,QAAS,IAAID,EAAc,UAAW,UAAWJ,CAAO,EACxD,YAAa,IAAII,EAAc,UAAW,OAAQN,EAAK,EAAE,CAAC,CAC5D,EACA,cAAe,CACb,MAAO,IAAIM,EAAc,UAAW,UAAWJ,CAAO,EACtD,OAAQ,IAAII,EAAc,UAAW,OAAQN,EAAK,EAAE,CAAC,EACrD,WAAY,IAAIM,EAAc,SAAU,OAAQN,EAAK,CAAC,CAAC,EACvD,MAAO,IAAIM,EAAc,SAAU,OAAQN,EAAK,CAAC,CAAC,CACpD,CACF,EACMqB,EAAqB,CACzB,CACE,KAAM,GACN,KAAM,GACN,MAAO,IAAIZ,EAAmB,cAAc,CAC9C,EACA,CACE,KAAM,UACN,KAAM,UACN,MAAO,IAAID,EAAoB,WAAW,KAAK,CAAC,GAAG,CAAC,CAAC,CACvD,CACF,EACMc,EAAsB,CAC1B,CACE,KAAM,GACN,KAAM,GACN,MAAO,IAAIb,EAAmB,cAAc,CAC9C,EACA,CACE,KAAM,iBACN,KAAM,UACN,MAAO,IAAID,EAAoB,WAAW,KAAK,CAAC,EAAI,CAAC,CAAC,CACxD,EACA,CACE,KAAM,qBACN,KAAM,SACN,MAAO,IAAIA,EAAoB,WAAW,KAAK,CAAC,EAAI,CAAC,CAAC,CACxD,CACF,EACMe,EAA4D,CAChE,KAAM,UACN,YAAa,CACX,YAAa,UACb,aAAc,EACd,UACE,gJACJ,EACA,sBAAuB,CAAC,EACxB,OAAQ,CAAC,EACT,UAAW,CAAC,EACZ,MAAO,OACP,QAAS,CACP,iBAAkB,CAChB,YAAa,mBACb,KAAM,iBACN,UACE,+IACF,WAAY,IACZ,KAAM,QACR,CACF,CACF,EAEMC,EAAiB,SACjBC,EAAY,6CAElB,WAAW,IAAM,CACf,GAAG,cAAc,EACjBd,EAAQ,YAAY,kBAClBf,EAAqB,CAAE,KAAM,CAAE,UAAW4B,CAAe,CAAE,CAAC,CAC9D,EACAR,EAA4B,gBAAgB,CAC1C,IAAK,UAAa,CAChB,kBAAmB,CAAC,EACpB,iBAAkBZ,EAAiB,KACrC,EACF,CAAC,CACH,CAAC,EAED,GAAG,uEAAwE,SAAY,CAErF,MAAMsB,EAAO,IAAIhB,EACfC,EACAC,EACAC,EACAC,EACAC,EACAI,EACA,iBACAF,EAAgB,EAAK,EACrBQ,EACAT,CACF,EACAH,EAAW,MAAM,oBACfV,EAAM,CACJ,MAAOiB,EACP,OAAQC,EACR,QAASC,CACX,CAAC,CACH,EACAX,EAAQ,sBAAsB,oBAAoB,CAChD,iBAAkBb,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,WAAY,QAAS,QAAS,EAClD,cAAeF,EAAc,OAC7B,0BAA2B,EAC7B,CAAC,EAED,MAAM8B,EAAe,MAAMD,EAAK,IAAI,EAEpC,OAAOC,CAAY,EAAE,cAAc,CACjC,cAAe9B,EAAc,OAC7B,eAAgB,iBAChB,kBAAmB,OACnB,MAAOuB,EACP,OAAQC,EACR,QAASC,EACT,iBAAkBpB,EAClB,kBAAmB,CAAC,CACtB,CAAC,CACH,CAAC,EAED,GAAG,8CAA+C,SAAY,CAE5D,MAAMwB,EAAO,IAAIhB,EACfC,EACAC,EACAC,EACAC,EACAC,EACAI,EACA,iBACAF,EAAgB,EAAK,EACrBQ,EACAT,CACF,EACAH,EAAW,MAAM,oBACfV,EAAM,CACJ,MAAOiB,EACP,OAAQC,EACR,QAASC,CACX,CAAC,CACH,EACAX,EAAQ,sBAAsB,oBAAoB,CAChD,iBAAkBb,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,WAAY,QAAS,QAAS,EAClD,cAAeF,EAAc,KAC7B,0BAA2B,EAC7B,CAAC,EACDe,EAAkB,oBAAoB,sBAAsB,CAC1D,KAAMlB,EAAqB,MAC3B,MAAO,IAAI,MAAM,WAAW,CAC9B,CAAC,EAED,MAAMiC,EAAe,MAAMD,EAAK,IAAI,EAEpC,OAAOC,CAAY,EAAE,cAAc,CACjC,cAAe9B,EAAc,KAC7B,eAAgB,iBAChB,kBAAmB,OACnB,MAAOuB,EACP,OAAQC,EACR,QAASC,EACT,iBAAkBpB,EAClB,kBAAmB,CAAC,CACtB,CAAC,CACH,CAAC,EAED,GAAG,2CAA4C,SAAY,CAEzD,MAAM0B,EAAiB,CACrB,KAAMlC,EAAqB,kBAC3B,QAAS,WACX,EACMgC,EAAO,IAAIhB,EACfC,EACAC,EACAC,EACAC,EACAC,EACAI,EACA,iBACAF,EAAgB,EAAK,EACrBQ,EACAT,CACF,EACAJ,EAAkB,YAAY,sBAAsB,CAACgB,CAAc,CAAC,EACpEf,EAAW,MAAM,oBACfV,EAAM,CACJ,MAAOiB,EACP,OAAQC,EACR,QAASC,CACX,CAAC,CACH,EACAX,EAAQ,sBAAsB,oBAAoB,CAChD,iBAAkBb,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,WAAY,QAAS,QAAS,EAClD,cAAeF,EAAc,KAC7B,0BAA2B,EAC7B,CAAC,EACDe,EAAkB,oBAAoB,sBACpCW,CACF,EAEA,MAAMI,EAAe,MAAMD,EAAK,IAAI,EAEpC,OAAOC,CAAY,EAAE,cAAc,CACjC,cAAe9B,EAAc,KAC7B,eAAgB,iBAChB,kBAAmB,OACnB,MAAOuB,EACP,OAAQC,EACR,QAASC,EACT,iBAAkBtB,EAAKuB,CAAuB,EAC9C,kBAAmB,CAAC,CACtB,CAAC,EACD,OAAOV,EAAW,KAAK,EAAE,qBAAqBM,CAAS,EACvD,OAAOP,EAAkB,mBAAmB,EAAE,qBAAqB,CACjE,kBAAmB,6CACnB,QAAS,IACT,QAAS,KACT,OAAQO,EAAU,MAClB,UAAWK,EACX,cAAe3B,EAAc,KAC7B,aAAc,CACZ,CACE,KAAM,iBACN,MAAO,WAAW,KAAK,CAAC,EAAI,CAAC,CAC/B,EACA,CACE,KAAM,qBACN,MAAO,WAAW,KAAK,CAAC,EAAI,CAAC,CAC/B,CACF,CACF,CAAC,CACH,CAAC,EAED,GAAG,kEAAmE,SAAY,CAEhF,MAAM+B,EAAiB,CACrB,KAAMlC,EAAqB,kBAC3B,QAAS,kBACX,EACMgC,EAAO,IAAIhB,EACfC,EACAC,EACAC,EACAC,EACAC,EACAI,EACA,iBACAF,EAAgB,EAAI,EACpBQ,EACAT,CACF,EACAJ,EAAkB,YAAY,sBAAsB,CAACgB,CAAc,CAAC,EACpEf,EAAW,MAAM,oBACfV,EAAM,CACJ,MAAOiB,EACP,OAAQC,EACR,QAASC,CACX,CAAC,CACH,EACAX,EAAQ,sBAAsB,oBAAoB,CAChD,iBAAkBb,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,WAAY,QAAS,QAAS,EAClD,cAAeF,EAAc,KAC7B,0BAA2B,EAC7B,CAAC,EACDe,EAAkB,oBAAoB,sBACpCW,CACF,EAEA,MAAMI,EAAe,MAAMD,EAAK,IAAI,EAEpC,OAAOC,CAAY,EAAE,cAAc,CACjC,cAAe9B,EAAc,KAC7B,eAAgB,iBAChB,MAAOuB,EACP,OAAQC,EACR,QAASC,EACT,iBAAkBtB,EAAKuB,CAAuB,EAC9C,kBAAmB,CAAC,EACpB,kBAAmBK,CACrB,CAAC,CACH,CAAC,EAED,GAAG,8CAA+C,SAAY,CAE5D,MAAMF,EAAO,IAAIhB,EACfC,EACAC,EACAC,EACAC,EACAC,EACAI,EACA,iBACAF,EAAgB,EAAK,EACrBQ,EACAT,CACF,EACAH,EAAW,MAAM,oBACfV,EAAM,CACJ,MAAOiB,EACP,OAAQC,EACR,QAASC,CACX,CAAC,CACH,EACAX,EAAQ,sBAAsB,oBAAoB,CAChD,iBAAkBb,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,WAAY,QAAS,QAAS,EAClD,cAAeF,EAAc,KAC7B,0BAA2B,EAC7B,CAAC,EACDe,EAAkB,oBAAoB,sBACpCW,CACF,EAEA,MAAMG,EAAK,IAAI,EAEf,OAAOd,EAAkB,mBAAmB,EAAE,qBAAqB,CACjE,kBAAmB,6CACnB,QAAS,IACT,QAAS,KACT,OAAQO,EAAU,MAClB,UAAWK,EACX,cAAe3B,EAAc,KAC7B,aAAc,CACZ,CACE,KAAM,iBACN,MAAO,WAAW,KAAK,CAAC,EAAI,CAAC,CAC/B,EACA,CACE,KAAM,qBACN,MAAO,WAAW,KAAK,CAAC,EAAI,CAAC,CAC/B,CACF,CACF,CAAC,CACH,CAAC,EAED,GAAG,yDAA0D,SAAY,CAEvE,MAAM6B,EAAO,IAAIhB,EACfC,EACAC,EACAC,EACAC,EACAC,EACAI,EACA,iBACAF,EAAgB,EAAK,EACrBQ,EACAT,CACF,EACMa,EAAS,CACb,QAAS,KACT,KAAM,6EACN,KAAMJ,EACN,SAAU,aACV,GAAI,6CACJ,MAAO,iBACT,EACMK,EAAmB,CACvB,GAAGP,EACH,UAAW,CACT,EAAG,CACD,OAAQ,CACN,cAAe,EACf,YAAa,cACb,UAAW,GACX,WAAY5B,EAA+B,QAC3C,YAAa,GACb,aAAc,GACd,WAAY,GACZ,YAAaA,EAA+B,QAC5C,UACE,gJACJ,EACA,OAAAkC,CACF,CACF,CACF,EACAhB,EAAW,MAAM,oBACfV,EAAM,CACJ,MAAOiB,EACP,OAAQC,EACR,QAASC,CACX,CAAC,CACH,EACAX,EAAQ,sBAAsB,oBAAoB,CAChD,iBAAkBb,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,WAAY,QAAS,QAAS,EAClD,cAAeF,EAAc,KAC7B,0BAA2B,EAC7B,CAAC,EACDe,EAAkB,oBAAoB,sBACpCkB,CACF,EACAd,EAA4B,gBAAgB,CAC1C,IAAK,UAAa,CAChB,kBAAmB,CAAC,EACpB,iBAAkBZ,EAAiB,OACrC,EACF,CAAC,EAED,MAAMuB,EAAe,MAAMD,EAAK,IAAI,EAEpC,OAAOC,CAAY,EAAE,cAAc,CACjC,cAAe9B,EAAc,KAC7B,eAAgB,iBAChB,kBAAmB,OACnB,MAAOuB,EACP,OAAQC,EACR,QAASC,EACT,iBAAkBtB,EAAK8B,CAAgB,EACvC,kBAAmB,CACjB,EAAG,CAAC,CACN,CACF,CAAC,CACH,CAAC,EAED,GAAG,yCAA0C,SAAY,CAEvD,MAAMJ,EAAO,IAAIhB,EACfC,EACAC,EACAC,EACAC,EACAC,EACAI,EACA,iBACAF,EAAgB,EAAK,EACrBQ,EACAT,CACF,EACAH,EAAW,MAAM,oBAAoBZ,EAAK,IAAI,MAAM,eAAe,CAAC,CAAC,EAErE,GAAI,CACF,MAAMyB,EAAK,IAAI,CACjB,OAASK,EAAG,CAEV,OAAOA,CAAC,EAAE,eAAe,KAAK,EAE9B,OAAOA,EAAE,OAAO,EAAE,KAAK,eAAe,CACxC,CACF,CAAC,CACH,CAAC",
6
+ "names": ["ClearSignContextType", "TypedDataCalldataParamPresence", "CommandResultFactory", "DeviceModelId", "DeviceSessionStateType", "DeviceStatus", "Just", "Left", "Nothing", "Right", "ClearSigningType", "makeDeviceActionInternalApiMock", "PrimitiveType", "StructType", "TypedDataValueField", "TypedDataValueRoot", "BuildEIP712ContextTask", "apiMock", "contextModuleMock", "parserMock", "mockTransactionParser", "mockTransactionMapper", "buildFullContextFactoryMock", "createAppConfig", "web3ChecksEnabled", "TEST_DATA", "TEST_TYPES", "TEST_DOMAIN_VALUES", "TEST_MESSAGE_VALUES", "TEST_CLEAR_SIGN_CONTEXT", "TEST_CHALLENGE", "TEST_FROM", "task", "builtContext", "txCheckContext", "subset", "clearSignContext", "e"]
7
7
  }
@@ -0,0 +1,2 @@
1
+ import{ClearSignContextType as s}from"@ledgerhq/context-module";import{isSuccessCommandResult as r}from"@ledgerhq/device-management-kit";import{GetChallengeCommand as a}from"../../app-binder/command/GetChallengeCommand";class p{constructor(n,o){this._api=n;this._args=o}async run(){const n=await this._api.sendCommand(new a);if(!r(n))throw new Error("Failed to get challenge");const o=n.data.challenge,t=await this._args.contextModule.getContexts({safeContractAddress:this._args.safeContractAddress,chainId:this._args.options.chainId,deviceModelId:this._args.deviceModelId,challenge:o},[s.SAFE,s.SIGNER]);if(t.forEach(e=>{if(e.type===s.ERROR)throw new Error(e.error.message)}),t.length!==2||t.find(e=>e.type===s.SAFE)===void 0||t.find(e=>e.type===s.SIGNER)===void 0)throw new Error("Invalid safe address contexts");return{clearSignContexts:t}}}export{p as BuildSafeAddressContextTask};
2
+ //# sourceMappingURL=BuildSafeAddressContextTask.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/internal/app-binder/task/BuildSafeAddressContextTask.ts"],
4
+ "sourcesContent": ["import {\n type ClearSignContextSuccess,\n ClearSignContextType,\n type ContextModule,\n} from \"@ledgerhq/context-module\";\nimport {\n type DeviceModelId,\n type InternalApi,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { type SafeAddressOptions } from \"@api/model/SafeAddressOptions\";\nimport { GetChallengeCommand } from \"@internal/app-binder/command/GetChallengeCommand\";\n\nexport type BuildSafeAddressContextTaskArgs = {\n readonly contextModule: ContextModule;\n readonly safeContractAddress: string;\n readonly options: SafeAddressOptions;\n readonly deviceModelId: DeviceModelId;\n};\n\nexport type BuildSafeAddressContextTaskResult = {\n readonly clearSignContexts: ClearSignContextSuccess[];\n};\n\nexport class BuildSafeAddressContextTask {\n constructor(\n private readonly _api: InternalApi,\n private readonly _args: BuildSafeAddressContextTaskArgs,\n ) {}\n\n async run(): Promise<BuildSafeAddressContextTaskResult> {\n const challengeResponse = await this._api.sendCommand(\n new GetChallengeCommand(),\n );\n\n if (!isSuccessCommandResult(challengeResponse)) {\n throw new Error(\"Failed to get challenge\");\n }\n\n const challenge = challengeResponse.data.challenge;\n\n const contexts = await this._args.contextModule.getContexts(\n {\n safeContractAddress: this._args.safeContractAddress,\n chainId: this._args.options.chainId,\n deviceModelId: this._args.deviceModelId,\n challenge,\n },\n [ClearSignContextType.SAFE, ClearSignContextType.SIGNER],\n );\n\n contexts.forEach((context) => {\n if (context.type === ClearSignContextType.ERROR) {\n throw new Error(context.error.message);\n }\n });\n\n // should contain one SAFE and one SIGNER context\n if (\n contexts.length !== 2 ||\n contexts.find((context) => context.type === ClearSignContextType.SAFE) ===\n undefined ||\n contexts.find(\n (context) => context.type === ClearSignContextType.SIGNER,\n ) === undefined\n ) {\n throw new Error(\"Invalid safe address contexts\");\n }\n\n return {\n clearSignContexts: contexts as ClearSignContextSuccess[],\n };\n }\n}\n"],
5
+ "mappings": "AAAA,OAEE,wBAAAA,MAEK,2BACP,OAGE,0BAAAC,MACK,kCAGP,OAAS,uBAAAC,MAA2B,mDAa7B,MAAMC,CAA4B,CACvC,YACmBC,EACAC,EACjB,CAFiB,UAAAD,EACA,WAAAC,CAChB,CAEH,MAAM,KAAkD,CACtD,MAAMC,EAAoB,MAAM,KAAK,KAAK,YACxC,IAAIJ,CACN,EAEA,GAAI,CAACD,EAAuBK,CAAiB,EAC3C,MAAM,IAAI,MAAM,yBAAyB,EAG3C,MAAMC,EAAYD,EAAkB,KAAK,UAEnCE,EAAW,MAAM,KAAK,MAAM,cAAc,YAC9C,CACE,oBAAqB,KAAK,MAAM,oBAChC,QAAS,KAAK,MAAM,QAAQ,QAC5B,cAAe,KAAK,MAAM,cAC1B,UAAAD,CACF,EACA,CAACP,EAAqB,KAAMA,EAAqB,MAAM,CACzD,EASA,GAPAQ,EAAS,QAASC,GAAY,CAC5B,GAAIA,EAAQ,OAAST,EAAqB,MACxC,MAAM,IAAI,MAAMS,EAAQ,MAAM,OAAO,CAEzC,CAAC,EAICD,EAAS,SAAW,GACpBA,EAAS,KAAMC,GAAYA,EAAQ,OAAST,EAAqB,IAAI,IACnE,QACFQ,EAAS,KACNC,GAAYA,EAAQ,OAAST,EAAqB,MACrD,IAAM,OAEN,MAAM,IAAI,MAAM,+BAA+B,EAGjD,MAAO,CACL,kBAAmBQ,CACrB,CACF,CACF",
6
+ "names": ["ClearSignContextType", "isSuccessCommandResult", "GetChallengeCommand", "BuildSafeAddressContextTask", "_api", "_args", "challengeResponse", "challenge", "contexts", "context"]
7
+ }
@@ -0,0 +1,2 @@
1
+ import{ClearSignContextType as a}from"@ledgerhq/context-module";import{CommandResultFactory as k,DeviceModelId as s}from"@ledgerhq/device-management-kit";import{makeDeviceActionInternalApiMock as h}from"../../app-binder/device-action/__test-utils__/makeInternalApi";import{BuildSafeAddressContextTask as l}from"./BuildSafeAddressContextTask";describe("BuildSafeAddressContextTask",()=>{const o=h(),e={getContexts:vi.fn()},p="0x12345678",d="0x1234567890123456789012345678901234567890",r=1,i=k({data:{challenge:p}}),S=k({data:void 0,error:{}}),u={type:a.SAFE,payload:"safe_payload"},C={type:a.SIGNER,payload:"signer_payload"};beforeEach(()=>{vi.resetAllMocks()}),describe("run",()=>{it("should successfully build safe address contexts with valid SAFE and SIGNER contexts",async()=>{const t={contextModule:e,safeContractAddress:d,options:{chainId:r},deviceModelId:s.FLEX};o.sendCommand.mockResolvedValue(i),e.getContexts=vi.fn().mockResolvedValue([u,C]);const c=await new l(o,t).run();expect(c).toEqual({clearSignContexts:[u,C]}),expect(o.sendCommand).toHaveBeenCalledTimes(1),expect(e.getContexts).toHaveBeenCalledWith({safeContractAddress:d,chainId:r,deviceModelId:s.FLEX,challenge:p},[a.SAFE,a.SIGNER])}),it("should include certificates when provided in contexts",async()=>{const t={type:a.SAFE,payload:"safe_payload",certificate:{keyUsageNumber:1,payload:new Uint8Array([1,2,3])}},n={type:a.SIGNER,payload:"signer_payload",certificate:{keyUsageNumber:2,payload:new Uint8Array([4,5,6])}},c={contextModule:e,safeContractAddress:d,options:{chainId:r},deviceModelId:s.FLEX};o.sendCommand.mockResolvedValue(i),e.getContexts=vi.fn().mockResolvedValue([t,n]);const g=await new l(o,c).run();expect(g).toEqual({clearSignContexts:[t,n]})})}),describe("error handling",()=>{it("should throw error when GetChallengeCommand fails",async()=>{const t={contextModule:e,safeContractAddress:d,options:{chainId:r},deviceModelId:s.FLEX};o.sendCommand.mockResolvedValue(S);const n=new l(o,t);await expect(n.run()).rejects.toThrow("Failed to get challenge")}),it("should throw error when context contains ERROR type",async()=>{const t={type:a.ERROR,error:new Error("Context error")},n={contextModule:e,safeContractAddress:d,options:{chainId:r},deviceModelId:s.FLEX};o.sendCommand.mockResolvedValue(i),e.getContexts=vi.fn().mockResolvedValue([t,C]);const c=new l(o,n);await expect(c.run()).rejects.toThrow("Context error")}),it("should throw error when only one context is returned",async()=>{const t={contextModule:e,safeContractAddress:d,options:{chainId:r},deviceModelId:s.FLEX};o.sendCommand.mockResolvedValue(i),e.getContexts=vi.fn().mockResolvedValue([u]);const n=new l(o,t);await expect(n.run()).rejects.toThrow("Invalid safe address contexts")}),it("should throw error when no contexts are returned",async()=>{const t={contextModule:e,safeContractAddress:d,options:{chainId:r},deviceModelId:s.FLEX};o.sendCommand.mockResolvedValue(i),e.getContexts=vi.fn().mockResolvedValue([]);const n=new l(o,t);await expect(n.run()).rejects.toThrow("Invalid safe address contexts")}),it("should throw error when more than two contexts are returned",async()=>{const t={type:a.TOKEN,payload:"extra_payload"},n={contextModule:e,safeContractAddress:d,options:{chainId:r},deviceModelId:s.FLEX};o.sendCommand.mockResolvedValue(i),e.getContexts=vi.fn().mockResolvedValue([u,C,t]);const c=new l(o,n);await expect(c.run()).rejects.toThrow("Invalid safe address contexts")}),it("should throw error when SAFE context is missing",async()=>{const t={contextModule:e,safeContractAddress:d,options:{chainId:r},deviceModelId:s.FLEX};o.sendCommand.mockResolvedValue(i),e.getContexts=vi.fn().mockResolvedValue([C,C]);const n=new l(o,t);await expect(n.run()).rejects.toThrow("Invalid safe address contexts")}),it("should throw error when SIGNER context is missing",async()=>{const t={contextModule:e,safeContractAddress:d,options:{chainId:r},deviceModelId:s.FLEX};o.sendCommand.mockResolvedValue(i),e.getContexts=vi.fn().mockResolvedValue([u,u]);const n=new l(o,t);await expect(n.run()).rejects.toThrow("Invalid safe address contexts")}),it("should throw error when contexts are of wrong types",async()=>{const t={type:a.TOKEN,payload:"token_payload"},n={type:a.NFT,payload:"nft_payload"},c={contextModule:e,safeContractAddress:d,options:{chainId:r},deviceModelId:s.FLEX};o.sendCommand.mockResolvedValue(i),e.getContexts=vi.fn().mockResolvedValue([t,n]);const x=new l(o,c);await expect(x.run()).rejects.toThrow("Invalid safe address contexts")}),it("should throw error with multiple ERROR contexts",async()=>{const t={type:a.ERROR,error:new Error("First error")},n={type:a.ERROR,error:new Error("Second error")},c={contextModule:e,safeContractAddress:d,options:{chainId:r},deviceModelId:s.FLEX};o.sendCommand.mockResolvedValue(i),e.getContexts=vi.fn().mockResolvedValue([t,n]);const x=new l(o,c);await expect(x.run()).rejects.toThrow("First error")})}),describe("device model variants",()=>{it.each([[s.NANO_S,"Nano S"],[s.NANO_SP,"Nano S Plus"],[s.NANO_X,"Nano X"],[s.FLEX,"Flex"],[s.STAX,"Stax"]])("should successfully build contexts for %s device",async(t,n)=>{const c={contextModule:e,safeContractAddress:d,options:{chainId:r},deviceModelId:t};o.sendCommand.mockResolvedValue(i),e.getContexts=vi.fn().mockResolvedValue([u,C]);const g=await new l(o,c).run();expect(g).toEqual({clearSignContexts:[u,C]}),expect(e.getContexts).toHaveBeenCalledWith(expect.objectContaining({deviceModelId:t}),[a.SAFE,a.SIGNER])})}),describe("challenge handling",()=>{it("should pass the correct challenge to contextModule",async()=>{const t="0xabcdef12",n={contextModule:e,safeContractAddress:d,options:{chainId:r},deviceModelId:s.FLEX};o.sendCommand.mockResolvedValue(k({data:{challenge:t}})),e.getContexts=vi.fn().mockResolvedValue([u,C]),await new l(o,n).run(),expect(e.getContexts).toHaveBeenCalledWith(expect.objectContaining({challenge:t}),[a.SAFE,a.SIGNER])})})});
2
+ //# sourceMappingURL=BuildSafeAddressContextTask.test.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../../src/internal/app-binder/task/BuildSafeAddressContextTask.test.ts"],
4
+ "sourcesContent": ["import {\n type ClearSignContext,\n type ClearSignContextSuccess,\n ClearSignContextType,\n type ContextModule,\n} from \"@ledgerhq/context-module\";\nimport {\n CommandResultFactory,\n DeviceModelId,\n type UnknownDeviceExchangeError,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { makeDeviceActionInternalApiMock } from \"@internal/app-binder/device-action/__test-utils__/makeInternalApi\";\n\nimport {\n BuildSafeAddressContextTask,\n type BuildSafeAddressContextTaskArgs,\n} from \"./BuildSafeAddressContextTask\";\n\ndescribe(\"BuildSafeAddressContextTask\", () => {\n const apiMock = makeDeviceActionInternalApiMock();\n const contextModuleMock = {\n getContexts: vi.fn(),\n };\n\n const TEST_CHALLENGE = \"0x12345678\";\n const TEST_SAFE_ADDRESS = \"0x1234567890123456789012345678901234567890\";\n const TEST_CHAIN_ID = 1;\n\n const successChallengeResult = CommandResultFactory({\n data: { challenge: TEST_CHALLENGE },\n });\n\n const errorResult = CommandResultFactory({\n data: undefined,\n error: {} as UnknownDeviceExchangeError,\n });\n\n const validSafeContext: ClearSignContextSuccess<ClearSignContextType.SAFE> = {\n type: ClearSignContextType.SAFE,\n payload: \"safe_payload\",\n };\n\n const validSignerContext: ClearSignContextSuccess<ClearSignContextType.SIGNER> =\n {\n type: ClearSignContextType.SIGNER,\n payload: \"signer_payload\",\n };\n\n beforeEach(() => {\n vi.resetAllMocks();\n });\n\n describe(\"run\", () => {\n it(\"should successfully build safe address contexts with valid SAFE and SIGNER contexts\", async () => {\n // GIVEN\n const args: BuildSafeAddressContextTaskArgs = {\n contextModule: contextModuleMock as unknown as ContextModule,\n safeContractAddress: TEST_SAFE_ADDRESS,\n options: { chainId: TEST_CHAIN_ID },\n deviceModelId: DeviceModelId.FLEX,\n };\n apiMock.sendCommand.mockResolvedValue(successChallengeResult);\n contextModuleMock.getContexts = vi\n .fn()\n .mockResolvedValue([validSafeContext, validSignerContext]);\n\n // WHEN\n const task = new BuildSafeAddressContextTask(apiMock, args);\n const result = await task.run();\n\n // THEN\n expect(result).toEqual({\n clearSignContexts: [validSafeContext, validSignerContext],\n });\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(1);\n expect(contextModuleMock.getContexts).toHaveBeenCalledWith(\n {\n safeContractAddress: TEST_SAFE_ADDRESS,\n chainId: TEST_CHAIN_ID,\n deviceModelId: DeviceModelId.FLEX,\n challenge: TEST_CHALLENGE,\n },\n [ClearSignContextType.SAFE, ClearSignContextType.SIGNER],\n );\n });\n\n it(\"should include certificates when provided in contexts\", async () => {\n // GIVEN\n const safeContextWithCert: ClearSignContextSuccess<ClearSignContextType.SAFE> =\n {\n type: ClearSignContextType.SAFE,\n payload: \"safe_payload\",\n certificate: {\n keyUsageNumber: 1,\n payload: new Uint8Array([1, 2, 3]),\n },\n };\n const signerContextWithCert: ClearSignContextSuccess<ClearSignContextType.SIGNER> =\n {\n type: ClearSignContextType.SIGNER,\n payload: \"signer_payload\",\n certificate: {\n keyUsageNumber: 2,\n payload: new Uint8Array([4, 5, 6]),\n },\n };\n const args: BuildSafeAddressContextTaskArgs = {\n contextModule: contextModuleMock as unknown as ContextModule,\n safeContractAddress: TEST_SAFE_ADDRESS,\n options: { chainId: TEST_CHAIN_ID },\n deviceModelId: DeviceModelId.FLEX,\n };\n apiMock.sendCommand.mockResolvedValue(successChallengeResult);\n contextModuleMock.getContexts = vi\n .fn()\n .mockResolvedValue([safeContextWithCert, signerContextWithCert]);\n\n // WHEN\n const task = new BuildSafeAddressContextTask(apiMock, args);\n const result = await task.run();\n\n // THEN\n expect(result).toEqual({\n clearSignContexts: [safeContextWithCert, signerContextWithCert],\n });\n });\n });\n\n describe(\"error handling\", () => {\n it(\"should throw error when GetChallengeCommand fails\", async () => {\n // GIVEN\n const args: BuildSafeAddressContextTaskArgs = {\n contextModule: contextModuleMock as unknown as ContextModule,\n safeContractAddress: TEST_SAFE_ADDRESS,\n options: { chainId: TEST_CHAIN_ID },\n deviceModelId: DeviceModelId.FLEX,\n };\n apiMock.sendCommand.mockResolvedValue(errorResult);\n\n // WHEN\n const task = new BuildSafeAddressContextTask(apiMock, args);\n\n // THEN\n await expect(task.run()).rejects.toThrow(\"Failed to get challenge\");\n });\n\n it(\"should throw error when context contains ERROR type\", async () => {\n // GIVEN\n const errorContext: ClearSignContext = {\n type: ClearSignContextType.ERROR,\n error: new Error(\"Context error\"),\n };\n const args: BuildSafeAddressContextTaskArgs = {\n contextModule: contextModuleMock as unknown as ContextModule,\n safeContractAddress: TEST_SAFE_ADDRESS,\n options: { chainId: TEST_CHAIN_ID },\n deviceModelId: DeviceModelId.FLEX,\n };\n apiMock.sendCommand.mockResolvedValue(successChallengeResult);\n contextModuleMock.getContexts = vi\n .fn()\n .mockResolvedValue([errorContext, validSignerContext]);\n\n // WHEN\n const task = new BuildSafeAddressContextTask(apiMock, args);\n\n // THEN\n await expect(task.run()).rejects.toThrow(\"Context error\");\n });\n\n it(\"should throw error when only one context is returned\", async () => {\n // GIVEN\n const args: BuildSafeAddressContextTaskArgs = {\n contextModule: contextModuleMock as unknown as ContextModule,\n safeContractAddress: TEST_SAFE_ADDRESS,\n options: { chainId: TEST_CHAIN_ID },\n deviceModelId: DeviceModelId.FLEX,\n };\n apiMock.sendCommand.mockResolvedValue(successChallengeResult);\n contextModuleMock.getContexts = vi\n .fn()\n .mockResolvedValue([validSafeContext]);\n\n // WHEN\n const task = new BuildSafeAddressContextTask(apiMock, args);\n\n // THEN\n await expect(task.run()).rejects.toThrow(\"Invalid safe address contexts\");\n });\n\n it(\"should throw error when no contexts are returned\", async () => {\n // GIVEN\n const args: BuildSafeAddressContextTaskArgs = {\n contextModule: contextModuleMock as unknown as ContextModule,\n safeContractAddress: TEST_SAFE_ADDRESS,\n options: { chainId: TEST_CHAIN_ID },\n deviceModelId: DeviceModelId.FLEX,\n };\n apiMock.sendCommand.mockResolvedValue(successChallengeResult);\n contextModuleMock.getContexts = vi.fn().mockResolvedValue([]);\n\n // WHEN\n const task = new BuildSafeAddressContextTask(apiMock, args);\n\n // THEN\n await expect(task.run()).rejects.toThrow(\"Invalid safe address contexts\");\n });\n\n it(\"should throw error when more than two contexts are returned\", async () => {\n // GIVEN\n const extraContext: ClearSignContextSuccess<ClearSignContextType.TOKEN> =\n {\n type: ClearSignContextType.TOKEN,\n payload: \"extra_payload\",\n };\n const args: BuildSafeAddressContextTaskArgs = {\n contextModule: contextModuleMock as unknown as ContextModule,\n safeContractAddress: TEST_SAFE_ADDRESS,\n options: { chainId: TEST_CHAIN_ID },\n deviceModelId: DeviceModelId.FLEX,\n };\n apiMock.sendCommand.mockResolvedValue(successChallengeResult);\n contextModuleMock.getContexts = vi\n .fn()\n .mockResolvedValue([\n validSafeContext,\n validSignerContext,\n extraContext,\n ]);\n\n // WHEN\n const task = new BuildSafeAddressContextTask(apiMock, args);\n\n // THEN\n await expect(task.run()).rejects.toThrow(\"Invalid safe address contexts\");\n });\n\n it(\"should throw error when SAFE context is missing\", async () => {\n // GIVEN\n const args: BuildSafeAddressContextTaskArgs = {\n contextModule: contextModuleMock as unknown as ContextModule,\n safeContractAddress: TEST_SAFE_ADDRESS,\n options: { chainId: TEST_CHAIN_ID },\n deviceModelId: DeviceModelId.FLEX,\n };\n apiMock.sendCommand.mockResolvedValue(successChallengeResult);\n contextModuleMock.getContexts = vi\n .fn()\n .mockResolvedValue([validSignerContext, validSignerContext]);\n\n // WHEN\n const task = new BuildSafeAddressContextTask(apiMock, args);\n\n // THEN\n await expect(task.run()).rejects.toThrow(\"Invalid safe address contexts\");\n });\n\n it(\"should throw error when SIGNER context is missing\", async () => {\n // GIVEN\n const args: BuildSafeAddressContextTaskArgs = {\n contextModule: contextModuleMock as unknown as ContextModule,\n safeContractAddress: TEST_SAFE_ADDRESS,\n options: { chainId: TEST_CHAIN_ID },\n deviceModelId: DeviceModelId.FLEX,\n };\n apiMock.sendCommand.mockResolvedValue(successChallengeResult);\n contextModuleMock.getContexts = vi\n .fn()\n .mockResolvedValue([validSafeContext, validSafeContext]);\n\n // WHEN\n const task = new BuildSafeAddressContextTask(apiMock, args);\n\n // THEN\n await expect(task.run()).rejects.toThrow(\"Invalid safe address contexts\");\n });\n\n it(\"should throw error when contexts are of wrong types\", async () => {\n // GIVEN\n const wrongContext1: ClearSignContextSuccess<ClearSignContextType.TOKEN> =\n {\n type: ClearSignContextType.TOKEN,\n payload: \"token_payload\",\n };\n const wrongContext2: ClearSignContextSuccess<ClearSignContextType.NFT> = {\n type: ClearSignContextType.NFT,\n payload: \"nft_payload\",\n };\n const args: BuildSafeAddressContextTaskArgs = {\n contextModule: contextModuleMock as unknown as ContextModule,\n safeContractAddress: TEST_SAFE_ADDRESS,\n options: { chainId: TEST_CHAIN_ID },\n deviceModelId: DeviceModelId.FLEX,\n };\n apiMock.sendCommand.mockResolvedValue(successChallengeResult);\n contextModuleMock.getContexts = vi\n .fn()\n .mockResolvedValue([wrongContext1, wrongContext2]);\n\n // WHEN\n const task = new BuildSafeAddressContextTask(apiMock, args);\n\n // THEN\n await expect(task.run()).rejects.toThrow(\"Invalid safe address contexts\");\n });\n\n it(\"should throw error with multiple ERROR contexts\", async () => {\n // GIVEN\n const errorContext1: ClearSignContext = {\n type: ClearSignContextType.ERROR,\n error: new Error(\"First error\"),\n };\n const errorContext2: ClearSignContext = {\n type: ClearSignContextType.ERROR,\n error: new Error(\"Second error\"),\n };\n const args: BuildSafeAddressContextTaskArgs = {\n contextModule: contextModuleMock as unknown as ContextModule,\n safeContractAddress: TEST_SAFE_ADDRESS,\n options: { chainId: TEST_CHAIN_ID },\n deviceModelId: DeviceModelId.FLEX,\n };\n apiMock.sendCommand.mockResolvedValue(successChallengeResult);\n contextModuleMock.getContexts = vi\n .fn()\n .mockResolvedValue([errorContext1, errorContext2]);\n\n // WHEN\n const task = new BuildSafeAddressContextTask(apiMock, args);\n\n // THEN\n await expect(task.run()).rejects.toThrow(\"First error\");\n });\n });\n\n describe(\"device model variants\", () => {\n it.each([\n [DeviceModelId.NANO_S, \"Nano S\"],\n [DeviceModelId.NANO_SP, \"Nano S Plus\"],\n [DeviceModelId.NANO_X, \"Nano X\"],\n [DeviceModelId.FLEX, \"Flex\"],\n [DeviceModelId.STAX, \"Stax\"],\n ])(\n \"should successfully build contexts for %s device\",\n async (deviceModelId, _deviceName) => {\n // GIVEN\n const args: BuildSafeAddressContextTaskArgs = {\n contextModule: contextModuleMock as unknown as ContextModule,\n safeContractAddress: TEST_SAFE_ADDRESS,\n options: { chainId: TEST_CHAIN_ID },\n deviceModelId,\n };\n apiMock.sendCommand.mockResolvedValue(successChallengeResult);\n contextModuleMock.getContexts = vi\n .fn()\n .mockResolvedValue([validSafeContext, validSignerContext]);\n\n // WHEN\n const task = new BuildSafeAddressContextTask(apiMock, args);\n const result = await task.run();\n\n // THEN\n expect(result).toEqual({\n clearSignContexts: [validSafeContext, validSignerContext],\n });\n expect(contextModuleMock.getContexts).toHaveBeenCalledWith(\n expect.objectContaining({\n deviceModelId,\n }),\n [ClearSignContextType.SAFE, ClearSignContextType.SIGNER],\n );\n },\n );\n });\n\n describe(\"challenge handling\", () => {\n it(\"should pass the correct challenge to contextModule\", async () => {\n // GIVEN\n const customChallenge = \"0xabcdef12\";\n const args: BuildSafeAddressContextTaskArgs = {\n contextModule: contextModuleMock as unknown as ContextModule,\n safeContractAddress: TEST_SAFE_ADDRESS,\n options: { chainId: TEST_CHAIN_ID },\n deviceModelId: DeviceModelId.FLEX,\n };\n apiMock.sendCommand.mockResolvedValue(\n CommandResultFactory({\n data: { challenge: customChallenge },\n }),\n );\n contextModuleMock.getContexts = vi\n .fn()\n .mockResolvedValue([validSafeContext, validSignerContext]);\n\n // WHEN\n const task = new BuildSafeAddressContextTask(apiMock, args);\n await task.run();\n\n // THEN\n expect(contextModuleMock.getContexts).toHaveBeenCalledWith(\n expect.objectContaining({\n challenge: customChallenge,\n }),\n [ClearSignContextType.SAFE, ClearSignContextType.SIGNER],\n );\n });\n });\n});\n"],
5
+ "mappings": "AAAA,OAGE,wBAAAA,MAEK,2BACP,OACE,wBAAAC,EACA,iBAAAC,MAEK,kCAEP,OAAS,mCAAAC,MAAuC,oEAEhD,OACE,+BAAAC,MAEK,gCAEP,SAAS,8BAA+B,IAAM,CAC5C,MAAMC,EAAUF,EAAgC,EAC1CG,EAAoB,CACxB,YAAa,GAAG,GAAG,CACrB,EAEMC,EAAiB,aACjBC,EAAoB,6CACpBC,EAAgB,EAEhBC,EAAyBT,EAAqB,CAClD,KAAM,CAAE,UAAWM,CAAe,CACpC,CAAC,EAEKI,EAAcV,EAAqB,CACvC,KAAM,OACN,MAAO,CAAC,CACV,CAAC,EAEKW,EAAuE,CAC3E,KAAMZ,EAAqB,KAC3B,QAAS,cACX,EAEMa,EACJ,CACE,KAAMb,EAAqB,OAC3B,QAAS,gBACX,EAEF,WAAW,IAAM,CACf,GAAG,cAAc,CACnB,CAAC,EAED,SAAS,MAAO,IAAM,CACpB,GAAG,sFAAuF,SAAY,CAEpG,MAAMc,EAAwC,CAC5C,cAAeR,EACf,oBAAqBE,EACrB,QAAS,CAAE,QAASC,CAAc,EAClC,cAAeP,EAAc,IAC/B,EACAG,EAAQ,YAAY,kBAAkBK,CAAsB,EAC5DJ,EAAkB,YAAc,GAC7B,GAAG,EACH,kBAAkB,CAACM,EAAkBC,CAAkB,CAAC,EAI3D,MAAME,EAAS,MADF,IAAIX,EAA4BC,EAASS,CAAI,EAChC,IAAI,EAG9B,OAAOC,CAAM,EAAE,QAAQ,CACrB,kBAAmB,CAACH,EAAkBC,CAAkB,CAC1D,CAAC,EACD,OAAOR,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAOC,EAAkB,WAAW,EAAE,qBACpC,CACE,oBAAqBE,EACrB,QAASC,EACT,cAAeP,EAAc,KAC7B,UAAWK,CACb,EACA,CAACP,EAAqB,KAAMA,EAAqB,MAAM,CACzD,CACF,CAAC,EAED,GAAG,wDAAyD,SAAY,CAEtE,MAAMgB,EACJ,CACE,KAAMhB,EAAqB,KAC3B,QAAS,eACT,YAAa,CACX,eAAgB,EAChB,QAAS,IAAI,WAAW,CAAC,EAAG,EAAG,CAAC,CAAC,CACnC,CACF,EACIiB,EACJ,CACE,KAAMjB,EAAqB,OAC3B,QAAS,iBACT,YAAa,CACX,eAAgB,EAChB,QAAS,IAAI,WAAW,CAAC,EAAG,EAAG,CAAC,CAAC,CACnC,CACF,EACIc,EAAwC,CAC5C,cAAeR,EACf,oBAAqBE,EACrB,QAAS,CAAE,QAASC,CAAc,EAClC,cAAeP,EAAc,IAC/B,EACAG,EAAQ,YAAY,kBAAkBK,CAAsB,EAC5DJ,EAAkB,YAAc,GAC7B,GAAG,EACH,kBAAkB,CAACU,EAAqBC,CAAqB,CAAC,EAIjE,MAAMF,EAAS,MADF,IAAIX,EAA4BC,EAASS,CAAI,EAChC,IAAI,EAG9B,OAAOC,CAAM,EAAE,QAAQ,CACrB,kBAAmB,CAACC,EAAqBC,CAAqB,CAChE,CAAC,CACH,CAAC,CACH,CAAC,EAED,SAAS,iBAAkB,IAAM,CAC/B,GAAG,oDAAqD,SAAY,CAElE,MAAMH,EAAwC,CAC5C,cAAeR,EACf,oBAAqBE,EACrB,QAAS,CAAE,QAASC,CAAc,EAClC,cAAeP,EAAc,IAC/B,EACAG,EAAQ,YAAY,kBAAkBM,CAAW,EAGjD,MAAMO,EAAO,IAAId,EAA4BC,EAASS,CAAI,EAG1D,MAAM,OAAOI,EAAK,IAAI,CAAC,EAAE,QAAQ,QAAQ,yBAAyB,CACpE,CAAC,EAED,GAAG,sDAAuD,SAAY,CAEpE,MAAMC,EAAiC,CACrC,KAAMnB,EAAqB,MAC3B,MAAO,IAAI,MAAM,eAAe,CAClC,EACMc,EAAwC,CAC5C,cAAeR,EACf,oBAAqBE,EACrB,QAAS,CAAE,QAASC,CAAc,EAClC,cAAeP,EAAc,IAC/B,EACAG,EAAQ,YAAY,kBAAkBK,CAAsB,EAC5DJ,EAAkB,YAAc,GAC7B,GAAG,EACH,kBAAkB,CAACa,EAAcN,CAAkB,CAAC,EAGvD,MAAMK,EAAO,IAAId,EAA4BC,EAASS,CAAI,EAG1D,MAAM,OAAOI,EAAK,IAAI,CAAC,EAAE,QAAQ,QAAQ,eAAe,CAC1D,CAAC,EAED,GAAG,uDAAwD,SAAY,CAErE,MAAMJ,EAAwC,CAC5C,cAAeR,EACf,oBAAqBE,EACrB,QAAS,CAAE,QAASC,CAAc,EAClC,cAAeP,EAAc,IAC/B,EACAG,EAAQ,YAAY,kBAAkBK,CAAsB,EAC5DJ,EAAkB,YAAc,GAC7B,GAAG,EACH,kBAAkB,CAACM,CAAgB,CAAC,EAGvC,MAAMM,EAAO,IAAId,EAA4BC,EAASS,CAAI,EAG1D,MAAM,OAAOI,EAAK,IAAI,CAAC,EAAE,QAAQ,QAAQ,+BAA+B,CAC1E,CAAC,EAED,GAAG,mDAAoD,SAAY,CAEjE,MAAMJ,EAAwC,CAC5C,cAAeR,EACf,oBAAqBE,EACrB,QAAS,CAAE,QAASC,CAAc,EAClC,cAAeP,EAAc,IAC/B,EACAG,EAAQ,YAAY,kBAAkBK,CAAsB,EAC5DJ,EAAkB,YAAc,GAAG,GAAG,EAAE,kBAAkB,CAAC,CAAC,EAG5D,MAAMY,EAAO,IAAId,EAA4BC,EAASS,CAAI,EAG1D,MAAM,OAAOI,EAAK,IAAI,CAAC,EAAE,QAAQ,QAAQ,+BAA+B,CAC1E,CAAC,EAED,GAAG,8DAA+D,SAAY,CAE5E,MAAME,EACJ,CACE,KAAMpB,EAAqB,MAC3B,QAAS,eACX,EACIc,EAAwC,CAC5C,cAAeR,EACf,oBAAqBE,EACrB,QAAS,CAAE,QAASC,CAAc,EAClC,cAAeP,EAAc,IAC/B,EACAG,EAAQ,YAAY,kBAAkBK,CAAsB,EAC5DJ,EAAkB,YAAc,GAC7B,GAAG,EACH,kBAAkB,CACjBM,EACAC,EACAO,CACF,CAAC,EAGH,MAAMF,EAAO,IAAId,EAA4BC,EAASS,CAAI,EAG1D,MAAM,OAAOI,EAAK,IAAI,CAAC,EAAE,QAAQ,QAAQ,+BAA+B,CAC1E,CAAC,EAED,GAAG,kDAAmD,SAAY,CAEhE,MAAMJ,EAAwC,CAC5C,cAAeR,EACf,oBAAqBE,EACrB,QAAS,CAAE,QAASC,CAAc,EAClC,cAAeP,EAAc,IAC/B,EACAG,EAAQ,YAAY,kBAAkBK,CAAsB,EAC5DJ,EAAkB,YAAc,GAC7B,GAAG,EACH,kBAAkB,CAACO,EAAoBA,CAAkB,CAAC,EAG7D,MAAMK,EAAO,IAAId,EAA4BC,EAASS,CAAI,EAG1D,MAAM,OAAOI,EAAK,IAAI,CAAC,EAAE,QAAQ,QAAQ,+BAA+B,CAC1E,CAAC,EAED,GAAG,oDAAqD,SAAY,CAElE,MAAMJ,EAAwC,CAC5C,cAAeR,EACf,oBAAqBE,EACrB,QAAS,CAAE,QAASC,CAAc,EAClC,cAAeP,EAAc,IAC/B,EACAG,EAAQ,YAAY,kBAAkBK,CAAsB,EAC5DJ,EAAkB,YAAc,GAC7B,GAAG,EACH,kBAAkB,CAACM,EAAkBA,CAAgB,CAAC,EAGzD,MAAMM,EAAO,IAAId,EAA4BC,EAASS,CAAI,EAG1D,MAAM,OAAOI,EAAK,IAAI,CAAC,EAAE,QAAQ,QAAQ,+BAA+B,CAC1E,CAAC,EAED,GAAG,sDAAuD,SAAY,CAEpE,MAAMG,EACJ,CACE,KAAMrB,EAAqB,MAC3B,QAAS,eACX,EACIsB,EAAmE,CACvE,KAAMtB,EAAqB,IAC3B,QAAS,aACX,EACMc,EAAwC,CAC5C,cAAeR,EACf,oBAAqBE,EACrB,QAAS,CAAE,QAASC,CAAc,EAClC,cAAeP,EAAc,IAC/B,EACAG,EAAQ,YAAY,kBAAkBK,CAAsB,EAC5DJ,EAAkB,YAAc,GAC7B,GAAG,EACH,kBAAkB,CAACe,EAAeC,CAAa,CAAC,EAGnD,MAAMJ,EAAO,IAAId,EAA4BC,EAASS,CAAI,EAG1D,MAAM,OAAOI,EAAK,IAAI,CAAC,EAAE,QAAQ,QAAQ,+BAA+B,CAC1E,CAAC,EAED,GAAG,kDAAmD,SAAY,CAEhE,MAAMK,EAAkC,CACtC,KAAMvB,EAAqB,MAC3B,MAAO,IAAI,MAAM,aAAa,CAChC,EACMwB,EAAkC,CACtC,KAAMxB,EAAqB,MAC3B,MAAO,IAAI,MAAM,cAAc,CACjC,EACMc,EAAwC,CAC5C,cAAeR,EACf,oBAAqBE,EACrB,QAAS,CAAE,QAASC,CAAc,EAClC,cAAeP,EAAc,IAC/B,EACAG,EAAQ,YAAY,kBAAkBK,CAAsB,EAC5DJ,EAAkB,YAAc,GAC7B,GAAG,EACH,kBAAkB,CAACiB,EAAeC,CAAa,CAAC,EAGnD,MAAMN,EAAO,IAAId,EAA4BC,EAASS,CAAI,EAG1D,MAAM,OAAOI,EAAK,IAAI,CAAC,EAAE,QAAQ,QAAQ,aAAa,CACxD,CAAC,CACH,CAAC,EAED,SAAS,wBAAyB,IAAM,CACtC,GAAG,KAAK,CACN,CAAChB,EAAc,OAAQ,QAAQ,EAC/B,CAACA,EAAc,QAAS,aAAa,EACrC,CAACA,EAAc,OAAQ,QAAQ,EAC/B,CAACA,EAAc,KAAM,MAAM,EAC3B,CAACA,EAAc,KAAM,MAAM,CAC7B,CAAC,EACC,mDACA,MAAOuB,EAAeC,IAAgB,CAEpC,MAAMZ,EAAwC,CAC5C,cAAeR,EACf,oBAAqBE,EACrB,QAAS,CAAE,QAASC,CAAc,EAClC,cAAAgB,CACF,EACApB,EAAQ,YAAY,kBAAkBK,CAAsB,EAC5DJ,EAAkB,YAAc,GAC7B,GAAG,EACH,kBAAkB,CAACM,EAAkBC,CAAkB,CAAC,EAI3D,MAAME,EAAS,MADF,IAAIX,EAA4BC,EAASS,CAAI,EAChC,IAAI,EAG9B,OAAOC,CAAM,EAAE,QAAQ,CACrB,kBAAmB,CAACH,EAAkBC,CAAkB,CAC1D,CAAC,EACD,OAAOP,EAAkB,WAAW,EAAE,qBACpC,OAAO,iBAAiB,CACtB,cAAAmB,CACF,CAAC,EACD,CAACzB,EAAqB,KAAMA,EAAqB,MAAM,CACzD,CACF,CACF,CACF,CAAC,EAED,SAAS,qBAAsB,IAAM,CACnC,GAAG,qDAAsD,SAAY,CAEnE,MAAM2B,EAAkB,aAClBb,EAAwC,CAC5C,cAAeR,EACf,oBAAqBE,EACrB,QAAS,CAAE,QAASC,CAAc,EAClC,cAAeP,EAAc,IAC/B,EACAG,EAAQ,YAAY,kBAClBJ,EAAqB,CACnB,KAAM,CAAE,UAAW0B,CAAgB,CACrC,CAAC,CACH,EACArB,EAAkB,YAAc,GAC7B,GAAG,EACH,kBAAkB,CAACM,EAAkBC,CAAkB,CAAC,EAI3D,MADa,IAAIT,EAA4BC,EAASS,CAAI,EAC/C,IAAI,EAGf,OAAOR,EAAkB,WAAW,EAAE,qBACpC,OAAO,iBAAiB,CACtB,UAAWqB,CACb,CAAC,EACD,CAAC3B,EAAqB,KAAMA,EAAqB,MAAM,CACzD,CACF,CAAC,CACH,CAAC,CACH,CAAC",
6
+ "names": ["ClearSignContextType", "CommandResultFactory", "DeviceModelId", "makeDeviceActionInternalApiMock", "BuildSafeAddressContextTask", "apiMock", "contextModuleMock", "TEST_CHALLENGE", "TEST_SAFE_ADDRESS", "TEST_CHAIN_ID", "successChallengeResult", "errorResult", "validSafeContext", "validSignerContext", "args", "result", "safeContextWithCert", "signerContextWithCert", "task", "errorContext", "extraContext", "wrongContext1", "wrongContext2", "errorContext1", "errorContext2", "deviceModelId", "_deviceName", "customChallenge"]
7
+ }
@@ -1,2 +1,2 @@
1
- import{ClearSignContextReferenceType as r,ClearSignContextType as t}from"@ledgerhq/context-module";import{bufferToHexaString as i,isSuccessCommandResult as d}from"@ledgerhq/device-management-kit";import{GetChallengeCommand as x}from"../../app-binder/command/GetChallengeCommand";class h{constructor(e,n){this.api=e;this.args=n}run(){const e=this.args.context,n=e.type;switch(n){case t.TRANSACTION_INFO:case t.WEB3_CHECK:case t.PLUGIN:case t.EXTERNAL_PLUGIN:case t.DYNAMIC_NETWORK:case t.DYNAMIC_NETWORK_ICON:case t.ENUM:case t.TRUSTED_NAME:case t.TOKEN:case t.NFT:return{subcontextCallbacks:[]};case t.TRANSACTION_FIELD_DESCRIPTION:return{subcontextCallbacks:e.reference?this._getSubcontextsFromReference(e.reference):[]};case t.PROXY_INFO:return{subcontextCallbacks:this._getSubcontextFromProxy(e)};default:{const a=n;throw new Error(`Uncovered type: ${a}`)}}}_getSubcontextsFromReference(e){const n=e.type;switch(n){case r.TOKEN:case r.NFT:return this._getSubcontextsFromTokenOrNftReference(e);case r.ENUM:return this._getSubcontextsFromEnumReference(e);case r.TRUSTED_NAME:return this._getSubcontextsFromTrustedNameReference(e);case r.CALLDATA:return[];default:{const a=n;throw new Error(`Uncovered reference type: ${a}`)}}}_getSubcontextsFromTokenOrNftReference(e){if(e.value!==void 0){const a={chainId:this.args.subset.chainId,address:e.value},s=e.type===r.TOKEN?t.TOKEN:t.NFT;return[()=>this.args.contextModule.getFieldContext(a,s)]}const n=[];if(e.valuePath!==void 0){const a=this.args.transactionParser.extractValue(this.args.subset,e.valuePath).orDefault([]);for(const s of a){const o=i(s.slice(Math.max(0,s.length-20))),c=e.type===r.TOKEN?t.TOKEN:t.NFT;n.push(()=>this.args.contextModule.getFieldContext({chainId:this.args.subset.chainId,address:o},c))}}return n}_getSubcontextsFromEnumReference(e){const n=[];if(!e.valuePath)return n;const a=this.args.transactionParser.extractValue(this.args.subset,e.valuePath).orDefault([]);for(const s of a){const o=s[s.length-1];if(o===void 0)continue;const u=this.args.contextOptional.filter(l=>l.type===t.ENUM).find(l=>l.value===o&&l.id===e.id);u&&n.push(()=>Promise.resolve(u))}return n}_getSubcontextsFromTrustedNameReference(e){const n=[];if(!e.valuePath)return n;const a=this.args.transactionParser.extractValue(this.args.subset,e.valuePath).orDefault([]);for(const s of a)n.push(async()=>{const o=i(s.slice(Math.max(0,s.length-20))),c=await this.api.sendCommand(new x);return d(c)?await this.args.contextModule.getFieldContext({chainId:this.args.subset.chainId,address:o,challenge:c.data.challenge,types:e.types,sources:e.sources,deviceModelId:this.args.deviceModelId},t.TRUSTED_NAME):{type:t.ERROR,error:new Error("Failed to get challenge")}});return n}_getSubcontextFromProxy(e){return[async()=>{const n=await this.api.sendCommand(new x);return d(n)?this.args.subset.to===void 0?{type:t.ERROR,error:new Error("Failed to get proxy address")}:await this.args.contextModule.getFieldContext({chainId:this.args.subset.chainId,proxyAddress:this.args.subset.to,calldata:this.args.subset.data,deviceModelId:this.args.deviceModelId,challenge:n.data.challenge},t.PROXY_INFO):{type:t.ERROR,error:new Error("Failed to get challenge")}}]}}export{h as BuildSubcontextsTask};
1
+ import{ClearSignContextReferenceType as r,ClearSignContextType as t}from"@ledgerhq/context-module";import{bufferToHexaString as i,isSuccessCommandResult as d}from"@ledgerhq/device-management-kit";import{GetChallengeCommand as x}from"../../app-binder/command/GetChallengeCommand";class h{constructor(e,n){this.api=e;this.args=n}run(){const e=this.args.context,n=e.type;switch(n){case t.TRANSACTION_CHECK:case t.TRANSACTION_INFO:case t.PLUGIN:case t.EXTERNAL_PLUGIN:case t.DYNAMIC_NETWORK:case t.DYNAMIC_NETWORK_ICON:case t.ENUM:case t.TRUSTED_NAME:case t.TOKEN:case t.NFT:case t.SAFE:case t.SIGNER:return{subcontextCallbacks:[]};case t.TRANSACTION_FIELD_DESCRIPTION:return{subcontextCallbacks:e.reference?this._getSubcontextsFromReference(e.reference):[]};case t.PROXY_INFO:return{subcontextCallbacks:this._getSubcontextFromProxy(e)};default:{const a=n;throw new Error(`Uncovered type: ${a}`)}}}_getSubcontextsFromReference(e){const n=e.type;switch(n){case r.TOKEN:case r.NFT:return this._getSubcontextsFromTokenOrNftReference(e);case r.ENUM:return this._getSubcontextsFromEnumReference(e);case r.TRUSTED_NAME:return this._getSubcontextsFromTrustedNameReference(e);case r.CALLDATA:return[];default:{const a=n;throw new Error(`Uncovered reference type: ${a}`)}}}_getSubcontextsFromTokenOrNftReference(e){if(e.value!==void 0){const a={chainId:this.args.subset.chainId,address:e.value},s=e.type===r.TOKEN?t.TOKEN:t.NFT;return[()=>this.args.contextModule.getFieldContext(a,s)]}const n=[];if(e.valuePath!==void 0){const a=this.args.transactionParser.extractValue(this.args.subset,e.valuePath).orDefault([]);for(const s of a){const o=i(s.slice(Math.max(0,s.length-20))),c=e.type===r.TOKEN?t.TOKEN:t.NFT;n.push(()=>this.args.contextModule.getFieldContext({chainId:this.args.subset.chainId,address:o},c))}}return n}_getSubcontextsFromEnumReference(e){const n=[];if(!e.valuePath)return n;const a=this.args.transactionParser.extractValue(this.args.subset,e.valuePath).orDefault([]);for(const s of a){const o=s[s.length-1];if(o===void 0)continue;const u=this.args.contextOptional.filter(l=>l.type===t.ENUM).find(l=>l.value===o&&l.id===e.id);u&&n.push(()=>Promise.resolve(u))}return n}_getSubcontextsFromTrustedNameReference(e){const n=[];if(!e.valuePath)return n;const a=this.args.transactionParser.extractValue(this.args.subset,e.valuePath).orDefault([]);for(const s of a)n.push(async()=>{const o=i(s.slice(Math.max(0,s.length-20))),c=await this.api.sendCommand(new x);return d(c)?await this.args.contextModule.getFieldContext({chainId:this.args.subset.chainId,address:o,challenge:c.data.challenge,types:e.types,sources:e.sources,deviceModelId:this.args.deviceModelId},t.TRUSTED_NAME):{type:t.ERROR,error:new Error("Failed to get challenge")}});return n}_getSubcontextFromProxy(e){return[async()=>{const n=await this.api.sendCommand(new x);return d(n)?this.args.subset.to===void 0?{type:t.ERROR,error:new Error("Failed to get proxy address")}:await this.args.contextModule.getFieldContext({chainId:this.args.subset.chainId,proxyAddress:this.args.subset.to,calldata:this.args.subset.data,deviceModelId:this.args.deviceModelId,challenge:n.data.challenge},t.PROXY_INFO):{type:t.ERROR,error:new Error("Failed to get challenge")}}]}}export{h as BuildSubcontextsTask};
2
2
  //# sourceMappingURL=BuildSubcontextsTask.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/internal/app-binder/task/BuildSubcontextsTask.ts"],
4
- "sourcesContent": ["import {\n type ClearSignContext,\n type ClearSignContextReference,\n ClearSignContextReferenceType,\n type ClearSignContextSuccess,\n ClearSignContextType,\n type ContextModule,\n type TransactionSubset,\n} from \"@ledgerhq/context-module\";\nimport {\n bufferToHexaString,\n type DeviceModelId,\n type InternalApi,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { GetChallengeCommand } from \"@internal/app-binder/command/GetChallengeCommand\";\nimport { type TransactionParserService } from \"@internal/transaction/service/parser/TransactionParserService\";\n\nexport type BuildSubcontextsTaskArgs = {\n readonly context: ClearSignContextSuccess;\n readonly contextOptional: ClearSignContextSuccess[];\n readonly transactionParser: TransactionParserService;\n readonly subset: TransactionSubset;\n readonly deviceModelId: DeviceModelId;\n readonly contextModule: ContextModule;\n};\n\ntype SubcontextCallback = () => Promise<ClearSignContext>;\n\nexport type BuildSubcontextsTaskResult = {\n subcontextCallbacks: SubcontextCallback[];\n};\n\nexport class BuildSubcontextsTask {\n constructor(\n private readonly api: InternalApi,\n private readonly args: BuildSubcontextsTaskArgs,\n ) {}\n\n run(): BuildSubcontextsTaskResult {\n const context = this.args.context;\n const type = context.type;\n\n switch (type) {\n case ClearSignContextType.TRANSACTION_INFO:\n case ClearSignContextType.WEB3_CHECK:\n case ClearSignContextType.PLUGIN:\n case ClearSignContextType.EXTERNAL_PLUGIN:\n case ClearSignContextType.DYNAMIC_NETWORK:\n case ClearSignContextType.DYNAMIC_NETWORK_ICON:\n case ClearSignContextType.ENUM:\n case ClearSignContextType.TRUSTED_NAME:\n case ClearSignContextType.TOKEN:\n case ClearSignContextType.NFT:\n return {\n subcontextCallbacks: [],\n };\n case ClearSignContextType.TRANSACTION_FIELD_DESCRIPTION:\n return {\n subcontextCallbacks: context.reference\n ? this._getSubcontextsFromReference(context.reference)\n : [],\n };\n case ClearSignContextType.PROXY_INFO:\n return {\n subcontextCallbacks: this._getSubcontextFromProxy(context),\n };\n default: {\n const uncoveredType: never = type;\n throw new Error(`Uncovered type: ${uncoveredType}`);\n }\n }\n }\n\n private _getSubcontextsFromReference(\n reference: ClearSignContextReference,\n ): SubcontextCallback[] {\n const referenceType = reference.type;\n\n switch (referenceType) {\n case ClearSignContextReferenceType.TOKEN:\n case ClearSignContextReferenceType.NFT:\n return this._getSubcontextsFromTokenOrNftReference(reference);\n case ClearSignContextReferenceType.ENUM:\n return this._getSubcontextsFromEnumReference(reference);\n case ClearSignContextReferenceType.TRUSTED_NAME:\n return this._getSubcontextsFromTrustedNameReference(reference);\n case ClearSignContextReferenceType.CALLDATA:\n // calldata reference is handled by the BuildFullContextsTask and ParseNestedTransactionTask\n return [];\n default: {\n const uncoveredReferenceType: never = referenceType;\n throw new Error(`Uncovered reference type: ${uncoveredReferenceType}`);\n }\n }\n }\n\n private _getSubcontextsFromTokenOrNftReference(\n reference: ClearSignContextReference<\n ClearSignContextReferenceType.TOKEN | ClearSignContextReferenceType.NFT\n >,\n ): SubcontextCallback[] {\n // if the reference is a string, it means it is a direct address\n // and we don't need to extract the value from the transaction\n // as it is already provided in the reference\n if (reference.value !== undefined) {\n const transactionFieldContext = {\n chainId: this.args.subset.chainId,\n address: reference.value,\n };\n\n const expectedType =\n reference.type === ClearSignContextReferenceType.TOKEN\n ? ClearSignContextType.TOKEN\n : ClearSignContextType.NFT;\n\n return [\n () =>\n this.args.contextModule.getFieldContext(\n transactionFieldContext,\n expectedType,\n ),\n ];\n }\n\n const subcontextCallbacks: SubcontextCallback[] = [];\n\n // if the reference is a path, it means we need to extract the value\n // from the transaction and provide it to the device\n if (reference.valuePath !== undefined) {\n const referenceValues = this.args.transactionParser\n .extractValue(this.args.subset, reference.valuePath)\n .orDefault([]);\n\n for (const value of referenceValues) {\n const address = bufferToHexaString(\n value.slice(Math.max(0, value.length - 20)),\n );\n\n const expectedType =\n reference.type === ClearSignContextReferenceType.TOKEN\n ? ClearSignContextType.TOKEN\n : ClearSignContextType.NFT;\n\n subcontextCallbacks.push(() =>\n this.args.contextModule.getFieldContext(\n {\n chainId: this.args.subset.chainId,\n address,\n },\n expectedType,\n ),\n );\n }\n }\n\n return subcontextCallbacks;\n }\n\n private _getSubcontextsFromEnumReference(\n reference: ClearSignContextReference<ClearSignContextReferenceType.ENUM>,\n ): SubcontextCallback[] {\n const subcontextCallbacks: SubcontextCallback[] = [];\n\n if (!reference.valuePath) {\n return subcontextCallbacks;\n }\n\n const referenceValues = this.args.transactionParser\n .extractValue(this.args.subset, reference.valuePath)\n .orDefault([]);\n\n for (const value of referenceValues) {\n const enumValue = value[value.length - 1];\n if (enumValue === undefined) {\n continue;\n }\n\n const enumsContext = this.args.contextOptional.filter(\n (c) => c.type === ClearSignContextType.ENUM,\n );\n\n const subcontext = enumsContext.find(\n (enumContext) =>\n enumContext.value === enumValue && enumContext.id === reference.id,\n );\n\n if (subcontext) {\n subcontextCallbacks.push(() => Promise.resolve(subcontext));\n }\n }\n return subcontextCallbacks;\n }\n\n private _getSubcontextsFromTrustedNameReference(\n reference: ClearSignContextReference<ClearSignContextReferenceType.TRUSTED_NAME>,\n ): SubcontextCallback[] {\n const subcontextCallbacks: SubcontextCallback[] = [];\n\n if (!reference.valuePath) {\n return subcontextCallbacks;\n }\n\n const referenceValues = this.args.transactionParser\n .extractValue(this.args.subset, reference.valuePath)\n .orDefault([]);\n\n for (const value of referenceValues) {\n {\n subcontextCallbacks.push(async () => {\n const address = bufferToHexaString(\n value.slice(Math.max(0, value.length - 20)),\n );\n\n const getChallengeResult = await this.api.sendCommand(\n new GetChallengeCommand(),\n );\n if (!isSuccessCommandResult(getChallengeResult)) {\n return {\n type: ClearSignContextType.ERROR,\n error: new Error(\"Failed to get challenge\"),\n };\n }\n\n const subcontext = await this.args.contextModule.getFieldContext(\n {\n chainId: this.args.subset.chainId,\n address,\n challenge: getChallengeResult.data.challenge,\n types: reference.types,\n sources: reference.sources,\n deviceModelId: this.args.deviceModelId,\n },\n ClearSignContextType.TRUSTED_NAME,\n );\n\n return subcontext;\n });\n }\n }\n\n return subcontextCallbacks;\n }\n\n private _getSubcontextFromProxy(\n _context: ClearSignContextSuccess<ClearSignContextType.PROXY_INFO>,\n ): SubcontextCallback[] {\n return [\n async () => {\n const getChallengeResult = await this.api.sendCommand(\n new GetChallengeCommand(),\n );\n if (!isSuccessCommandResult(getChallengeResult)) {\n return {\n type: ClearSignContextType.ERROR,\n error: new Error(\"Failed to get challenge\"),\n };\n }\n\n if (this.args.subset.to === undefined) {\n return {\n type: ClearSignContextType.ERROR,\n error: new Error(\"Failed to get proxy address\"),\n };\n }\n\n const subcontext = await this.args.contextModule.getFieldContext(\n {\n chainId: this.args.subset.chainId,\n proxyAddress: this.args.subset.to,\n calldata: this.args.subset.data,\n deviceModelId: this.args.deviceModelId,\n challenge: getChallengeResult.data.challenge,\n },\n ClearSignContextType.PROXY_INFO,\n );\n\n return subcontext;\n },\n ];\n }\n}\n"],
5
- "mappings": "AAAA,OAGE,iCAAAA,EAEA,wBAAAC,MAGK,2BACP,OACE,sBAAAC,EAGA,0BAAAC,MACK,kCAEP,OAAS,uBAAAC,MAA2B,mDAkB7B,MAAMC,CAAqB,CAChC,YACmBC,EACAC,EACjB,CAFiB,SAAAD,EACA,UAAAC,CAChB,CAEH,KAAkC,CAChC,MAAMC,EAAU,KAAK,KAAK,QACpBC,EAAOD,EAAQ,KAErB,OAAQC,EAAM,CACZ,KAAKR,EAAqB,iBAC1B,KAAKA,EAAqB,WAC1B,KAAKA,EAAqB,OAC1B,KAAKA,EAAqB,gBAC1B,KAAKA,EAAqB,gBAC1B,KAAKA,EAAqB,qBAC1B,KAAKA,EAAqB,KAC1B,KAAKA,EAAqB,aAC1B,KAAKA,EAAqB,MAC1B,KAAKA,EAAqB,IACxB,MAAO,CACL,oBAAqB,CAAC,CACxB,EACF,KAAKA,EAAqB,8BACxB,MAAO,CACL,oBAAqBO,EAAQ,UACzB,KAAK,6BAA6BA,EAAQ,SAAS,EACnD,CAAC,CACP,EACF,KAAKP,EAAqB,WACxB,MAAO,CACL,oBAAqB,KAAK,wBAAwBO,CAAO,CAC3D,EACF,QAAS,CACP,MAAME,EAAuBD,EAC7B,MAAM,IAAI,MAAM,mBAAmBC,CAAa,EAAE,CACpD,CACF,CACF,CAEQ,6BACNC,EACsB,CACtB,MAAMC,EAAgBD,EAAU,KAEhC,OAAQC,EAAe,CACrB,KAAKZ,EAA8B,MACnC,KAAKA,EAA8B,IACjC,OAAO,KAAK,uCAAuCW,CAAS,EAC9D,KAAKX,EAA8B,KACjC,OAAO,KAAK,iCAAiCW,CAAS,EACxD,KAAKX,EAA8B,aACjC,OAAO,KAAK,wCAAwCW,CAAS,EAC/D,KAAKX,EAA8B,SAEjC,MAAO,CAAC,EACV,QAAS,CACP,MAAMa,EAAgCD,EACtC,MAAM,IAAI,MAAM,6BAA6BC,CAAsB,EAAE,CACvE,CACF,CACF,CAEQ,uCACNF,EAGsB,CAItB,GAAIA,EAAU,QAAU,OAAW,CACjC,MAAMG,EAA0B,CAC9B,QAAS,KAAK,KAAK,OAAO,QAC1B,QAASH,EAAU,KACrB,EAEMI,EACJJ,EAAU,OAASX,EAA8B,MAC7CC,EAAqB,MACrBA,EAAqB,IAE3B,MAAO,CACL,IACE,KAAK,KAAK,cAAc,gBACtBa,EACAC,CACF,CACJ,CACF,CAEA,MAAMC,EAA4C,CAAC,EAInD,GAAIL,EAAU,YAAc,OAAW,CACrC,MAAMM,EAAkB,KAAK,KAAK,kBAC/B,aAAa,KAAK,KAAK,OAAQN,EAAU,SAAS,EAClD,UAAU,CAAC,CAAC,EAEf,UAAWO,KAASD,EAAiB,CACnC,MAAME,EAAUjB,EACdgB,EAAM,MAAM,KAAK,IAAI,EAAGA,EAAM,OAAS,EAAE,CAAC,CAC5C,EAEMH,EACJJ,EAAU,OAASX,EAA8B,MAC7CC,EAAqB,MACrBA,EAAqB,IAE3Be,EAAoB,KAAK,IACvB,KAAK,KAAK,cAAc,gBACtB,CACE,QAAS,KAAK,KAAK,OAAO,QAC1B,QAAAG,CACF,EACAJ,CACF,CACF,CACF,CACF,CAEA,OAAOC,CACT,CAEQ,iCACNL,EACsB,CACtB,MAAMK,EAA4C,CAAC,EAEnD,GAAI,CAACL,EAAU,UACb,OAAOK,EAGT,MAAMC,EAAkB,KAAK,KAAK,kBAC/B,aAAa,KAAK,KAAK,OAAQN,EAAU,SAAS,EAClD,UAAU,CAAC,CAAC,EAEf,UAAWO,KAASD,EAAiB,CACnC,MAAMG,EAAYF,EAAMA,EAAM,OAAS,CAAC,EACxC,GAAIE,IAAc,OAChB,SAOF,MAAMC,EAJe,KAAK,KAAK,gBAAgB,OAC5CC,GAAMA,EAAE,OAASrB,EAAqB,IACzC,EAEgC,KAC7BsB,GACCA,EAAY,QAAUH,GAAaG,EAAY,KAAOZ,EAAU,EACpE,EAEIU,GACFL,EAAoB,KAAK,IAAM,QAAQ,QAAQK,CAAU,CAAC,CAE9D,CACA,OAAOL,CACT,CAEQ,wCACNL,EACsB,CACtB,MAAMK,EAA4C,CAAC,EAEnD,GAAI,CAACL,EAAU,UACb,OAAOK,EAGT,MAAMC,EAAkB,KAAK,KAAK,kBAC/B,aAAa,KAAK,KAAK,OAAQN,EAAU,SAAS,EAClD,UAAU,CAAC,CAAC,EAEf,UAAWO,KAASD,EAEhBD,EAAoB,KAAK,SAAY,CACnC,MAAMG,EAAUjB,EACdgB,EAAM,MAAM,KAAK,IAAI,EAAGA,EAAM,OAAS,EAAE,CAAC,CAC5C,EAEMM,EAAqB,MAAM,KAAK,IAAI,YACxC,IAAIpB,CACN,EACA,OAAKD,EAAuBqB,CAAkB,EAO3B,MAAM,KAAK,KAAK,cAAc,gBAC/C,CACE,QAAS,KAAK,KAAK,OAAO,QAC1B,QAAAL,EACA,UAAWK,EAAmB,KAAK,UACnC,MAAOb,EAAU,MACjB,QAASA,EAAU,QACnB,cAAe,KAAK,KAAK,aAC3B,EACAV,EAAqB,YACvB,EAhBS,CACL,KAAMA,EAAqB,MAC3B,MAAO,IAAI,MAAM,yBAAyB,CAC5C,CAgBJ,CAAC,EAIL,OAAOe,CACT,CAEQ,wBACNS,EACsB,CACtB,MAAO,CACL,SAAY,CACV,MAAMD,EAAqB,MAAM,KAAK,IAAI,YACxC,IAAIpB,CACN,EACA,OAAKD,EAAuBqB,CAAkB,EAO1C,KAAK,KAAK,OAAO,KAAO,OACnB,CACL,KAAMvB,EAAqB,MAC3B,MAAO,IAAI,MAAM,6BAA6B,CAChD,EAGiB,MAAM,KAAK,KAAK,cAAc,gBAC/C,CACE,QAAS,KAAK,KAAK,OAAO,QAC1B,aAAc,KAAK,KAAK,OAAO,GAC/B,SAAU,KAAK,KAAK,OAAO,KAC3B,cAAe,KAAK,KAAK,cACzB,UAAWuB,EAAmB,KAAK,SACrC,EACAvB,EAAqB,UACvB,EAtBS,CACL,KAAMA,EAAqB,MAC3B,MAAO,IAAI,MAAM,yBAAyB,CAC5C,CAsBJ,CACF,CACF,CACF",
4
+ "sourcesContent": ["import {\n type ClearSignContext,\n type ClearSignContextReference,\n ClearSignContextReferenceType,\n type ClearSignContextSuccess,\n ClearSignContextType,\n type ContextModule,\n type TransactionSubset,\n} from \"@ledgerhq/context-module\";\nimport {\n bufferToHexaString,\n type DeviceModelId,\n type InternalApi,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { GetChallengeCommand } from \"@internal/app-binder/command/GetChallengeCommand\";\nimport { type TransactionParserService } from \"@internal/transaction/service/parser/TransactionParserService\";\n\nexport type BuildSubcontextsTaskArgs = {\n readonly context: ClearSignContextSuccess;\n readonly contextOptional: ClearSignContextSuccess[];\n readonly transactionParser: TransactionParserService;\n readonly subset: TransactionSubset;\n readonly deviceModelId: DeviceModelId;\n readonly contextModule: ContextModule;\n};\n\ntype SubcontextCallback = () => Promise<ClearSignContext>;\n\nexport type BuildSubcontextsTaskResult = {\n subcontextCallbacks: SubcontextCallback[];\n};\n\nexport class BuildSubcontextsTask {\n constructor(\n private readonly api: InternalApi,\n private readonly args: BuildSubcontextsTaskArgs,\n ) {}\n\n run(): BuildSubcontextsTaskResult {\n const context = this.args.context;\n const type = context.type;\n\n switch (type) {\n case ClearSignContextType.TRANSACTION_CHECK:\n case ClearSignContextType.TRANSACTION_INFO:\n case ClearSignContextType.PLUGIN:\n case ClearSignContextType.EXTERNAL_PLUGIN:\n case ClearSignContextType.DYNAMIC_NETWORK:\n case ClearSignContextType.DYNAMIC_NETWORK_ICON:\n case ClearSignContextType.ENUM:\n case ClearSignContextType.TRUSTED_NAME:\n case ClearSignContextType.TOKEN:\n case ClearSignContextType.NFT:\n case ClearSignContextType.SAFE:\n case ClearSignContextType.SIGNER:\n return {\n subcontextCallbacks: [],\n };\n case ClearSignContextType.TRANSACTION_FIELD_DESCRIPTION:\n return {\n subcontextCallbacks: context.reference\n ? this._getSubcontextsFromReference(context.reference)\n : [],\n };\n case ClearSignContextType.PROXY_INFO:\n return {\n subcontextCallbacks: this._getSubcontextFromProxy(context),\n };\n default: {\n const uncoveredType: never = type;\n throw new Error(`Uncovered type: ${uncoveredType}`);\n }\n }\n }\n\n private _getSubcontextsFromReference(\n reference: ClearSignContextReference,\n ): SubcontextCallback[] {\n const referenceType = reference.type;\n\n switch (referenceType) {\n case ClearSignContextReferenceType.TOKEN:\n case ClearSignContextReferenceType.NFT:\n return this._getSubcontextsFromTokenOrNftReference(reference);\n case ClearSignContextReferenceType.ENUM:\n return this._getSubcontextsFromEnumReference(reference);\n case ClearSignContextReferenceType.TRUSTED_NAME:\n return this._getSubcontextsFromTrustedNameReference(reference);\n case ClearSignContextReferenceType.CALLDATA:\n // calldata reference is handled by the BuildFullContextsTask and ParseNestedTransactionTask\n return [];\n default: {\n const uncoveredReferenceType: never = referenceType;\n throw new Error(`Uncovered reference type: ${uncoveredReferenceType}`);\n }\n }\n }\n\n private _getSubcontextsFromTokenOrNftReference(\n reference: ClearSignContextReference<\n ClearSignContextReferenceType.TOKEN | ClearSignContextReferenceType.NFT\n >,\n ): SubcontextCallback[] {\n // if the reference is a string, it means it is a direct address\n // and we don't need to extract the value from the transaction\n // as it is already provided in the reference\n if (reference.value !== undefined) {\n const transactionFieldContext = {\n chainId: this.args.subset.chainId,\n address: reference.value,\n };\n\n const expectedType =\n reference.type === ClearSignContextReferenceType.TOKEN\n ? ClearSignContextType.TOKEN\n : ClearSignContextType.NFT;\n\n return [\n () =>\n this.args.contextModule.getFieldContext(\n transactionFieldContext,\n expectedType,\n ),\n ];\n }\n\n const subcontextCallbacks: SubcontextCallback[] = [];\n\n // if the reference is a path, it means we need to extract the value\n // from the transaction and provide it to the device\n if (reference.valuePath !== undefined) {\n const referenceValues = this.args.transactionParser\n .extractValue(this.args.subset, reference.valuePath)\n .orDefault([]);\n\n for (const value of referenceValues) {\n const address = bufferToHexaString(\n value.slice(Math.max(0, value.length - 20)),\n );\n\n const expectedType =\n reference.type === ClearSignContextReferenceType.TOKEN\n ? ClearSignContextType.TOKEN\n : ClearSignContextType.NFT;\n\n subcontextCallbacks.push(() =>\n this.args.contextModule.getFieldContext(\n {\n chainId: this.args.subset.chainId,\n address,\n },\n expectedType,\n ),\n );\n }\n }\n\n return subcontextCallbacks;\n }\n\n private _getSubcontextsFromEnumReference(\n reference: ClearSignContextReference<ClearSignContextReferenceType.ENUM>,\n ): SubcontextCallback[] {\n const subcontextCallbacks: SubcontextCallback[] = [];\n\n if (!reference.valuePath) {\n return subcontextCallbacks;\n }\n\n const referenceValues = this.args.transactionParser\n .extractValue(this.args.subset, reference.valuePath)\n .orDefault([]);\n\n for (const value of referenceValues) {\n const enumValue = value[value.length - 1];\n if (enumValue === undefined) {\n continue;\n }\n\n const enumsContext = this.args.contextOptional.filter(\n (c) => c.type === ClearSignContextType.ENUM,\n );\n\n const subcontext = enumsContext.find(\n (enumContext) =>\n enumContext.value === enumValue && enumContext.id === reference.id,\n );\n\n if (subcontext) {\n subcontextCallbacks.push(() => Promise.resolve(subcontext));\n }\n }\n return subcontextCallbacks;\n }\n\n private _getSubcontextsFromTrustedNameReference(\n reference: ClearSignContextReference<ClearSignContextReferenceType.TRUSTED_NAME>,\n ): SubcontextCallback[] {\n const subcontextCallbacks: SubcontextCallback[] = [];\n\n if (!reference.valuePath) {\n return subcontextCallbacks;\n }\n\n const referenceValues = this.args.transactionParser\n .extractValue(this.args.subset, reference.valuePath)\n .orDefault([]);\n\n for (const value of referenceValues) {\n {\n subcontextCallbacks.push(async () => {\n const address = bufferToHexaString(\n value.slice(Math.max(0, value.length - 20)),\n );\n\n const getChallengeResult = await this.api.sendCommand(\n new GetChallengeCommand(),\n );\n if (!isSuccessCommandResult(getChallengeResult)) {\n return {\n type: ClearSignContextType.ERROR,\n error: new Error(\"Failed to get challenge\"),\n };\n }\n\n const subcontext = await this.args.contextModule.getFieldContext(\n {\n chainId: this.args.subset.chainId,\n address,\n challenge: getChallengeResult.data.challenge,\n types: reference.types,\n sources: reference.sources,\n deviceModelId: this.args.deviceModelId,\n },\n ClearSignContextType.TRUSTED_NAME,\n );\n\n return subcontext;\n });\n }\n }\n\n return subcontextCallbacks;\n }\n\n private _getSubcontextFromProxy(\n _context: ClearSignContextSuccess<ClearSignContextType.PROXY_INFO>,\n ): SubcontextCallback[] {\n return [\n async () => {\n const getChallengeResult = await this.api.sendCommand(\n new GetChallengeCommand(),\n );\n if (!isSuccessCommandResult(getChallengeResult)) {\n return {\n type: ClearSignContextType.ERROR,\n error: new Error(\"Failed to get challenge\"),\n };\n }\n\n if (this.args.subset.to === undefined) {\n return {\n type: ClearSignContextType.ERROR,\n error: new Error(\"Failed to get proxy address\"),\n };\n }\n\n const subcontext = await this.args.contextModule.getFieldContext(\n {\n chainId: this.args.subset.chainId,\n proxyAddress: this.args.subset.to,\n calldata: this.args.subset.data,\n deviceModelId: this.args.deviceModelId,\n challenge: getChallengeResult.data.challenge,\n },\n ClearSignContextType.PROXY_INFO,\n );\n\n return subcontext;\n },\n ];\n }\n}\n"],
5
+ "mappings": "AAAA,OAGE,iCAAAA,EAEA,wBAAAC,MAGK,2BACP,OACE,sBAAAC,EAGA,0BAAAC,MACK,kCAEP,OAAS,uBAAAC,MAA2B,mDAkB7B,MAAMC,CAAqB,CAChC,YACmBC,EACAC,EACjB,CAFiB,SAAAD,EACA,UAAAC,CAChB,CAEH,KAAkC,CAChC,MAAMC,EAAU,KAAK,KAAK,QACpBC,EAAOD,EAAQ,KAErB,OAAQC,EAAM,CACZ,KAAKR,EAAqB,kBAC1B,KAAKA,EAAqB,iBAC1B,KAAKA,EAAqB,OAC1B,KAAKA,EAAqB,gBAC1B,KAAKA,EAAqB,gBAC1B,KAAKA,EAAqB,qBAC1B,KAAKA,EAAqB,KAC1B,KAAKA,EAAqB,aAC1B,KAAKA,EAAqB,MAC1B,KAAKA,EAAqB,IAC1B,KAAKA,EAAqB,KAC1B,KAAKA,EAAqB,OACxB,MAAO,CACL,oBAAqB,CAAC,CACxB,EACF,KAAKA,EAAqB,8BACxB,MAAO,CACL,oBAAqBO,EAAQ,UACzB,KAAK,6BAA6BA,EAAQ,SAAS,EACnD,CAAC,CACP,EACF,KAAKP,EAAqB,WACxB,MAAO,CACL,oBAAqB,KAAK,wBAAwBO,CAAO,CAC3D,EACF,QAAS,CACP,MAAME,EAAuBD,EAC7B,MAAM,IAAI,MAAM,mBAAmBC,CAAa,EAAE,CACpD,CACF,CACF,CAEQ,6BACNC,EACsB,CACtB,MAAMC,EAAgBD,EAAU,KAEhC,OAAQC,EAAe,CACrB,KAAKZ,EAA8B,MACnC,KAAKA,EAA8B,IACjC,OAAO,KAAK,uCAAuCW,CAAS,EAC9D,KAAKX,EAA8B,KACjC,OAAO,KAAK,iCAAiCW,CAAS,EACxD,KAAKX,EAA8B,aACjC,OAAO,KAAK,wCAAwCW,CAAS,EAC/D,KAAKX,EAA8B,SAEjC,MAAO,CAAC,EACV,QAAS,CACP,MAAMa,EAAgCD,EACtC,MAAM,IAAI,MAAM,6BAA6BC,CAAsB,EAAE,CACvE,CACF,CACF,CAEQ,uCACNF,EAGsB,CAItB,GAAIA,EAAU,QAAU,OAAW,CACjC,MAAMG,EAA0B,CAC9B,QAAS,KAAK,KAAK,OAAO,QAC1B,QAASH,EAAU,KACrB,EAEMI,EACJJ,EAAU,OAASX,EAA8B,MAC7CC,EAAqB,MACrBA,EAAqB,IAE3B,MAAO,CACL,IACE,KAAK,KAAK,cAAc,gBACtBa,EACAC,CACF,CACJ,CACF,CAEA,MAAMC,EAA4C,CAAC,EAInD,GAAIL,EAAU,YAAc,OAAW,CACrC,MAAMM,EAAkB,KAAK,KAAK,kBAC/B,aAAa,KAAK,KAAK,OAAQN,EAAU,SAAS,EAClD,UAAU,CAAC,CAAC,EAEf,UAAWO,KAASD,EAAiB,CACnC,MAAME,EAAUjB,EACdgB,EAAM,MAAM,KAAK,IAAI,EAAGA,EAAM,OAAS,EAAE,CAAC,CAC5C,EAEMH,EACJJ,EAAU,OAASX,EAA8B,MAC7CC,EAAqB,MACrBA,EAAqB,IAE3Be,EAAoB,KAAK,IACvB,KAAK,KAAK,cAAc,gBACtB,CACE,QAAS,KAAK,KAAK,OAAO,QAC1B,QAAAG,CACF,EACAJ,CACF,CACF,CACF,CACF,CAEA,OAAOC,CACT,CAEQ,iCACNL,EACsB,CACtB,MAAMK,EAA4C,CAAC,EAEnD,GAAI,CAACL,EAAU,UACb,OAAOK,EAGT,MAAMC,EAAkB,KAAK,KAAK,kBAC/B,aAAa,KAAK,KAAK,OAAQN,EAAU,SAAS,EAClD,UAAU,CAAC,CAAC,EAEf,UAAWO,KAASD,EAAiB,CACnC,MAAMG,EAAYF,EAAMA,EAAM,OAAS,CAAC,EACxC,GAAIE,IAAc,OAChB,SAOF,MAAMC,EAJe,KAAK,KAAK,gBAAgB,OAC5CC,GAAMA,EAAE,OAASrB,EAAqB,IACzC,EAEgC,KAC7BsB,GACCA,EAAY,QAAUH,GAAaG,EAAY,KAAOZ,EAAU,EACpE,EAEIU,GACFL,EAAoB,KAAK,IAAM,QAAQ,QAAQK,CAAU,CAAC,CAE9D,CACA,OAAOL,CACT,CAEQ,wCACNL,EACsB,CACtB,MAAMK,EAA4C,CAAC,EAEnD,GAAI,CAACL,EAAU,UACb,OAAOK,EAGT,MAAMC,EAAkB,KAAK,KAAK,kBAC/B,aAAa,KAAK,KAAK,OAAQN,EAAU,SAAS,EAClD,UAAU,CAAC,CAAC,EAEf,UAAWO,KAASD,EAEhBD,EAAoB,KAAK,SAAY,CACnC,MAAMG,EAAUjB,EACdgB,EAAM,MAAM,KAAK,IAAI,EAAGA,EAAM,OAAS,EAAE,CAAC,CAC5C,EAEMM,EAAqB,MAAM,KAAK,IAAI,YACxC,IAAIpB,CACN,EACA,OAAKD,EAAuBqB,CAAkB,EAO3B,MAAM,KAAK,KAAK,cAAc,gBAC/C,CACE,QAAS,KAAK,KAAK,OAAO,QAC1B,QAAAL,EACA,UAAWK,EAAmB,KAAK,UACnC,MAAOb,EAAU,MACjB,QAASA,EAAU,QACnB,cAAe,KAAK,KAAK,aAC3B,EACAV,EAAqB,YACvB,EAhBS,CACL,KAAMA,EAAqB,MAC3B,MAAO,IAAI,MAAM,yBAAyB,CAC5C,CAgBJ,CAAC,EAIL,OAAOe,CACT,CAEQ,wBACNS,EACsB,CACtB,MAAO,CACL,SAAY,CACV,MAAMD,EAAqB,MAAM,KAAK,IAAI,YACxC,IAAIpB,CACN,EACA,OAAKD,EAAuBqB,CAAkB,EAO1C,KAAK,KAAK,OAAO,KAAO,OACnB,CACL,KAAMvB,EAAqB,MAC3B,MAAO,IAAI,MAAM,6BAA6B,CAChD,EAGiB,MAAM,KAAK,KAAK,cAAc,gBAC/C,CACE,QAAS,KAAK,KAAK,OAAO,QAC1B,aAAc,KAAK,KAAK,OAAO,GAC/B,SAAU,KAAK,KAAK,OAAO,KAC3B,cAAe,KAAK,KAAK,cACzB,UAAWuB,EAAmB,KAAK,SACrC,EACAvB,EAAqB,UACvB,EAtBS,CACL,KAAMA,EAAqB,MAC3B,MAAO,IAAI,MAAM,yBAAyB,CAC5C,CAsBJ,CACF,CACF,CACF",
6
6
  "names": ["ClearSignContextReferenceType", "ClearSignContextType", "bufferToHexaString", "isSuccessCommandResult", "GetChallengeCommand", "BuildSubcontextsTask", "api", "args", "context", "type", "uncoveredType", "reference", "referenceType", "uncoveredReferenceType", "transactionFieldContext", "expectedType", "subcontextCallbacks", "referenceValues", "value", "address", "enumValue", "subcontext", "c", "enumContext", "getChallengeResult", "_context"]
7
7
  }
@@ -1,2 +1,2 @@
1
- import{ClearSignContextReferenceType as d,ClearSignContextType as e}from"@ledgerhq/context-module";import{CommandResultFactory as h,DeviceModelId as b,UnknownDeviceExchangeError as E}from"@ledgerhq/device-management-kit";import{Left as S,Right as y}from"purify-ts";import{GetChallengeCommand as N}from"../../app-binder/command/GetChallengeCommand";import{makeDeviceActionInternalApiMock as R}from"../../app-binder/device-action/__test-utils__/makeInternalApi";import{BuildSubcontextsTask as r}from"./BuildSubcontextsTask";describe("BuildSubcontextsTask",()=>{const x={getFieldContext:vi.fn()},p={extractValue:vi.fn()},o=R();let l;beforeEach(()=>{vi.resetAllMocks(),l={context:{type:e.TRANSACTION_INFO,payload:"test payload"},contextOptional:[],transactionParser:p,subset:{chainId:1,data:"0x",selector:"0x",to:"0x",value:BigInt(0)},contextModule:x,deviceModelId:b.STAX}}),describe("when context type is a simple type",()=>{const c=[e.TRANSACTION_INFO,e.WEB3_CHECK,e.PLUGIN,e.EXTERNAL_PLUGIN,e.DYNAMIC_NETWORK,e.DYNAMIC_NETWORK_ICON,e.ENUM,e.TRUSTED_NAME,e.TOKEN,e.NFT];it.each(c)("should return context with empty subcontextCallbacks for %s",t=>{const n={...l,context:{type:t,payload:"test payload"}},s=new r(o,n).run();expect(s.subcontextCallbacks).toHaveLength(0)})}),describe("when context has a direct value reference",()=>{it("should create a callback to get context with the direct value",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TOKEN,value:"0x1234567890123456789012345678901234567890"}},t={...l,context:c},a={chainId:1,address:"0x1234567890123456789012345678901234567890"},n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(1);const s=n.subcontextCallbacks[0];await s(),expect(x.getFieldContext).toHaveBeenCalledWith(a,e.TOKEN)}),it("should handle undefined value in reference",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:void 0},t={...l,context:c},a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(0)})}),describe("when context has a valuePath reference",()=>{beforeEach(()=>{o.sendCommand.mockResolvedValue(h({data:{challenge:"test-challenge"}}))}),describe("when extractValue returns Left (error)",()=>{it("should return context with empty subcontextCallbacks",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TOKEN,valuePath:[{type:"SLICE",start:0,end:20}]}},t={...l,context:c};p.extractValue.mockReturnValue(S(new Error("Extraction failed")));const a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(0)})}),describe("when extractValue returns Right with values",()=>{describe("for ENUM type",()=>{it("should create callbacks for matching enum contexts",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.ENUM,id:1,valuePath:[{type:"TUPLE",offset:0}]}},t={type:e.ENUM,id:1,value:1,payload:"enum context 1"},a={type:e.ENUM,id:1,value:2,payload:"enum context 2"},n={type:e.ENUM,id:2,value:2,payload:"enum context 3"},s={...l,context:c,contextOptional:[t,a,n]},u=[new Uint8Array([1,2])];p.extractValue.mockReturnValue(y(u));const i=new r(o,s).run();expect(i.subcontextCallbacks).toHaveLength(1);const C=i.subcontextCallbacks[0],g=await C();expect(g).toEqual(a)}),it("should create callbacks for matching enum contexts with two values",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.ENUM,id:1,valuePath:[{type:"TUPLE",offset:0}]}},t={type:e.ENUM,id:1,value:1,payload:"enum context 1"},a={type:e.ENUM,id:1,value:2,payload:"enum context 2"},n={type:e.ENUM,id:2,value:2,payload:"enum context 3"},s={...l,context:c,contextOptional:[t,a,n]},u=[new Uint8Array([1,2]),new Uint8Array([3,2,1])];p.extractValue.mockReturnValue(y(u));const i=new r(o,s).run();expect(i.subcontextCallbacks).toHaveLength(2);const C=i.subcontextCallbacks[0],g=i.subcontextCallbacks[1],T=await C(),k=await g();expect(T).toEqual(a),expect(k).toEqual(t)}),it("should skip when enum value is undefined",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.ENUM,id:1,valuePath:[{type:"TUPLE",offset:0}]}},t={...l,context:c},a=[new Uint8Array([])];p.extractValue.mockReturnValue(y(a));const n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(0)}),it("should create callback with enum id 0",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.ENUM,id:0,valuePath:[{type:"TUPLE",offset:0}]}},t={type:e.ENUM,id:0,value:0,payload:"enum context 1"},a={type:e.ENUM,id:1,value:1,payload:"enum context 2"},n={...l,context:c,contextOptional:[t,a]},s=[new Uint8Array([1,0])];p.extractValue.mockReturnValue(y(s));const u=new r(o,n).run();expect(u.subcontextCallbacks).toHaveLength(1);const i=u.subcontextCallbacks[0],C=await i();expect(C).toEqual(t)}),it("should skip when no matching enum context found",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.ENUM,id:1,valuePath:[{type:"TUPLE",offset:0}]}},t={type:e.ENUM,id:2,value:2,payload:"enum context"},a={...l,context:c,contextOptional:[t]},n=[new Uint8Array([1,2])];p.extractValue.mockReturnValue(y(n));const s=new r(o,a).run();expect(s.subcontextCallbacks).toHaveLength(0)})}),describe("for TOKEN type",()=>{it("should create callbacks to get token context",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TOKEN,valuePath:[{type:"TUPLE",offset:0}]}},t={...l,context:c},a=[new Uint8Array([1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22])];p.extractValue.mockReturnValue(y(a)),x.getFieldContext.mockResolvedValue({type:e.TOKEN,payload:"token result"});const n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(1);const s=n.subcontextCallbacks[0],u=await s();expect(u).toEqual({type:e.TOKEN,payload:"token result"}),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,address:"0x030405060708090a0b0c0d0e0f10111213141516"},e.TOKEN)}),it("should create callbacks to get token as constant",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TOKEN,value:"0x030405060708090a0b0c0d0e0f10111213141516"}},t={...l,context:c};x.getFieldContext.mockResolvedValue({type:e.TOKEN,payload:"token result"});const a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(1);const n=a.subcontextCallbacks[0],s=await n();expect(s).toEqual({type:e.TOKEN,payload:"token result"}),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,address:"0x030405060708090a0b0c0d0e0f10111213141516"},e.TOKEN)})}),describe("for NFT type",()=>{it("should create callbacks to get NFT context",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.NFT,valuePath:[{type:"TUPLE",offset:0}]}},t={...l,context:c},a=[new Uint8Array([1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22])];p.extractValue.mockReturnValue(y(a)),x.getFieldContext.mockResolvedValue({type:e.NFT,payload:"nft result"});const n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(1);const s=n.subcontextCallbacks[0],u=await s();expect(u).toEqual({type:e.NFT,payload:"nft result"}),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,address:"0x030405060708090a0b0c0d0e0f10111213141516"},e.NFT)}),it("should create callbacks to get NFT as constant",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.NFT,value:"0x030405060708090a0b0c0d0e0f10111213141516"}},t={...l,context:c};x.getFieldContext.mockResolvedValue({type:e.NFT,payload:"nft result"});const a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(1);const n=a.subcontextCallbacks[0],s=await n();expect(s).toEqual({type:e.NFT,payload:"nft result"}),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,address:"0x030405060708090a0b0c0d0e0f10111213141516"},e.NFT)})}),describe("for TRUSTED_NAME type",()=>{it("should create callbacks to get trusted name context with challenge",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TRUSTED_NAME,valuePath:[{type:"TUPLE",offset:0}],types:["type1","type2"],sources:["source1","source2"]}},t={...l,context:c},a=[new Uint8Array([1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22])];p.extractValue.mockReturnValue(y(a)),x.getFieldContext.mockResolvedValue({type:e.TRUSTED_NAME,payload:"trusted name result"});const n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(1);const s=n.subcontextCallbacks[0],u=await s();expect(u).toEqual({type:e.TRUSTED_NAME,payload:"trusted name result"}),expect(o.sendCommand).toHaveBeenCalledWith(expect.any(N)),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,address:"0x030405060708090a0b0c0d0e0f10111213141516",challenge:"test-challenge",types:["type1","type2"],sources:["source1","source2"],deviceModelId:b.STAX},e.TRUSTED_NAME)}),it("should handle challenge command failure",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TRUSTED_NAME,valuePath:[{type:"TUPLE",offset:0}],types:["type1"],sources:["source1"]}},t={...l,context:c},a=[new Uint8Array([1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22])];p.extractValue.mockReturnValue(y(a));const n=new E("Failed");o.sendCommand.mockResolvedValueOnce(h({error:n}));const s=new r(o,t).run();expect(s.subcontextCallbacks).toHaveLength(1);const u=s.subcontextCallbacks[0],i=await u();expect(i).toEqual({error:new Error("Failed to get challenge"),type:e.ERROR})})}),describe("for multiple values",()=>{it("should create callbacks for each extracted value",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TOKEN,valuePath:[{type:"TUPLE",offset:0}]}},t={...l,context:c},a=[new Uint8Array([1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22]),new Uint8Array([33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54])];p.extractValue.mockReturnValue(y(a)),x.getFieldContext.mockResolvedValueOnce({type:e.TOKEN,payload:"token result 1"}),x.getFieldContext.mockResolvedValueOnce({type:e.TOKEN,payload:"token result 2"});const n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(2);const s=n.subcontextCallbacks[0],u=n.subcontextCallbacks[1],i=await s(),C=await u();expect(i).toEqual({type:e.TOKEN,payload:"token result 1"}),expect(C).toEqual({type:e.TOKEN,payload:"token result 2"}),expect(x.getFieldContext).toHaveBeenCalledTimes(2),expect(x.getFieldContext).toHaveBeenNthCalledWith(1,{chainId:1,address:"0x030405060708090a0b0c0d0e0f10111213141516"},e.TOKEN),expect(x.getFieldContext).toHaveBeenNthCalledWith(2,{chainId:1,address:"0x232425262728292a2b2c2d2e2f30313233343536"},e.TOKEN)})})})}),describe("when context has no reference",()=>{it("should return context with empty subcontextCallbacks",()=>{const c={type:e.TOKEN,payload:"test payload"},t={...l,context:c},a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(0)})}),describe("when context has reference but no valuePath",()=>{it("should return context with empty subcontextCallbacks",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TOKEN,valuePath:void 0}},t={...l,context:c},a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(0)})}),describe("error handling",()=>{it("should throw error for uncovered context type",()=>{const t={...l,context:{type:"UNKNOWN_TYPE",payload:"test payload"}};expect(()=>new r(o,t).run()).toThrow("Uncovered type: UNKNOWN_TYPE")}),it("should throw error for uncovered reference type",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:"UNKNOWN_REFERENCE_TYPE"}},t={...l,context:c};expect(()=>new r(o,t).run()).toThrow("Uncovered reference type: UNKNOWN_REFERENCE_TYPE")})}),describe("CALLDATA reference type",()=>{it("should return empty subcontextCallbacks for CALLDATA reference",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.CALLDATA,callee:[{type:"TUPLE",offset:0}],valuePath:[{type:"TUPLE",offset:0}]}},t={...l,context:c},a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(0)})}),describe("references without valuePath",()=>{it("should return empty subcontextCallbacks for ENUM reference without valuePath",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.ENUM,id:1,valuePath:void 0}},t={...l,context:c},a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(0)}),it("should return empty subcontextCallbacks for TRUSTED_NAME reference without valuePath",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TRUSTED_NAME,types:["type1"],sources:["source1"],valuePath:void 0}},t={...l,context:c},a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(0)})}),describe("PROXY_INFO context type",()=>{beforeEach(()=>{o.sendCommand.mockResolvedValue(h({data:{challenge:"test-challenge"}}))}),it("should create callback to get proxy delegate call context",async()=>{const c={type:e.PROXY_INFO,payload:"proxy payload"},t={...l,context:c,subset:{...l.subset,to:"0x1234567890123456789012345678901234567890",data:"0xabcdef"}};x.getFieldContext.mockResolvedValue({type:e.PROXY_INFO,payload:"proxy result"});const a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(1);const n=a.subcontextCallbacks[0],s=await n();expect(s).toEqual({type:e.PROXY_INFO,payload:"proxy result"}),expect(o.sendCommand).toHaveBeenCalledWith(expect.any(N)),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,proxyAddress:"0x1234567890123456789012345678901234567890",calldata:"0xabcdef",deviceModelId:b.STAX,challenge:"test-challenge"},e.PROXY_INFO)}),it("should handle challenge command failure",async()=>{const c={type:e.PROXY_INFO,payload:"proxy payload"},t={...l,context:c,subset:{...l.subset,to:"0x1234567890123456789012345678901234567890",data:"0xabcdef"}},a=new E("Failed");o.sendCommand.mockResolvedValueOnce(h({error:a}));const n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(1);const s=n.subcontextCallbacks[0],u=await s();expect(u).toEqual({error:new Error("Failed to get challenge"),type:e.ERROR}),expect(o.sendCommand).toHaveBeenCalledWith(expect.any(N)),expect(x.getFieldContext).not.toHaveBeenCalled()}),it("should handle missing proxy address",async()=>{const c={type:e.PROXY_INFO,payload:"proxy payload"},t={...l,context:c,subset:{...l.subset,to:void 0,data:"0xabcdef"}},a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(1);const n=a.subcontextCallbacks[0],s=await n();expect(s).toEqual({error:new Error("Failed to get proxy address"),type:e.ERROR}),expect(o.sendCommand).toHaveBeenCalledWith(expect.any(N)),expect(x.getFieldContext).not.toHaveBeenCalled()}),it("should use correct device model id in context",async()=>{const c={type:e.PROXY_INFO,payload:"proxy payload"},t={...l,context:c,deviceModelId:b.NANO_SP,subset:{...l.subset,to:"0x1234567890123456789012345678901234567890",data:"0xabcdef"}};x.getFieldContext.mockResolvedValue({type:e.PROXY_INFO,payload:"proxy result"});const a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(1);const n=a.subcontextCallbacks[0];await n(),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,proxyAddress:"0x1234567890123456789012345678901234567890",calldata:"0xabcdef",deviceModelId:b.NANO_SP,challenge:"test-challenge"},e.PROXY_INFO)})}),describe("edge cases",()=>{it("should handle value array shorter than 20 bytes for address extraction",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TOKEN,valuePath:[{type:"TUPLE",offset:0}]}},t={...l,context:c},a=[new Uint8Array([1,2,3])];p.extractValue.mockReturnValue(y(a)),x.getFieldContext.mockResolvedValue({type:e.ERROR,message:"Invalid address"});const n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(1);const s=n.subcontextCallbacks[0],u=await s();expect(u).toEqual({type:e.ERROR,message:"Invalid address"}),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,address:"0x010203"},e.TOKEN)}),it("should handle empty value array",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TOKEN,valuePath:[{type:"TUPLE",offset:0}]}},t={...l,context:c},a=[new Uint8Array([])];p.extractValue.mockReturnValue(y(a)),x.getFieldContext.mockResolvedValue({type:e.TOKEN,payload:"token result"});const n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(1);const s=n.subcontextCallbacks[0],u=await s();expect(u).toEqual({type:e.TOKEN,payload:"token result"}),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,address:"0x"},e.TOKEN)})})});
1
+ import{ClearSignContextReferenceType as d,ClearSignContextType as e}from"@ledgerhq/context-module";import{CommandResultFactory as h,DeviceModelId as b,UnknownDeviceExchangeError as E}from"@ledgerhq/device-management-kit";import{Left as S,Right as y}from"purify-ts";import{GetChallengeCommand as N}from"../../app-binder/command/GetChallengeCommand";import{makeDeviceActionInternalApiMock as R}from"../../app-binder/device-action/__test-utils__/makeInternalApi";import{BuildSubcontextsTask as r}from"./BuildSubcontextsTask";describe("BuildSubcontextsTask",()=>{const x={getFieldContext:vi.fn()},p={extractValue:vi.fn()},o=R();let l;beforeEach(()=>{vi.resetAllMocks(),l={context:{type:e.TRANSACTION_INFO,payload:"test payload"},contextOptional:[],transactionParser:p,subset:{chainId:1,data:"0x",selector:"0x",to:"0x",value:BigInt(0)},contextModule:x,deviceModelId:b.STAX}}),describe("when context type is a simple type",()=>{const c=[e.TRANSACTION_INFO,e.TRANSACTION_CHECK,e.PLUGIN,e.EXTERNAL_PLUGIN,e.DYNAMIC_NETWORK,e.DYNAMIC_NETWORK_ICON,e.ENUM,e.TRUSTED_NAME,e.TOKEN,e.NFT];it.each(c)("should return context with empty subcontextCallbacks for %s",t=>{const n={...l,context:{type:t,payload:"test payload"}},s=new r(o,n).run();expect(s.subcontextCallbacks).toHaveLength(0)})}),describe("when context has a direct value reference",()=>{it("should create a callback to get context with the direct value",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TOKEN,value:"0x1234567890123456789012345678901234567890"}},t={...l,context:c},a={chainId:1,address:"0x1234567890123456789012345678901234567890"},n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(1);const s=n.subcontextCallbacks[0];await s(),expect(x.getFieldContext).toHaveBeenCalledWith(a,e.TOKEN)}),it("should handle undefined value in reference",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:void 0},t={...l,context:c},a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(0)})}),describe("when context has a valuePath reference",()=>{beforeEach(()=>{o.sendCommand.mockResolvedValue(h({data:{challenge:"test-challenge"}}))}),describe("when extractValue returns Left (error)",()=>{it("should return context with empty subcontextCallbacks",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TOKEN,valuePath:[{type:"SLICE",start:0,end:20}]}},t={...l,context:c};p.extractValue.mockReturnValue(S(new Error("Extraction failed")));const a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(0)})}),describe("when extractValue returns Right with values",()=>{describe("for ENUM type",()=>{it("should create callbacks for matching enum contexts",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.ENUM,id:1,valuePath:[{type:"TUPLE",offset:0}]}},t={type:e.ENUM,id:1,value:1,payload:"enum context 1"},a={type:e.ENUM,id:1,value:2,payload:"enum context 2"},n={type:e.ENUM,id:2,value:2,payload:"enum context 3"},s={...l,context:c,contextOptional:[t,a,n]},u=[new Uint8Array([1,2])];p.extractValue.mockReturnValue(y(u));const i=new r(o,s).run();expect(i.subcontextCallbacks).toHaveLength(1);const C=i.subcontextCallbacks[0],g=await C();expect(g).toEqual(a)}),it("should create callbacks for matching enum contexts with two values",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.ENUM,id:1,valuePath:[{type:"TUPLE",offset:0}]}},t={type:e.ENUM,id:1,value:1,payload:"enum context 1"},a={type:e.ENUM,id:1,value:2,payload:"enum context 2"},n={type:e.ENUM,id:2,value:2,payload:"enum context 3"},s={...l,context:c,contextOptional:[t,a,n]},u=[new Uint8Array([1,2]),new Uint8Array([3,2,1])];p.extractValue.mockReturnValue(y(u));const i=new r(o,s).run();expect(i.subcontextCallbacks).toHaveLength(2);const C=i.subcontextCallbacks[0],g=i.subcontextCallbacks[1],T=await C(),k=await g();expect(T).toEqual(a),expect(k).toEqual(t)}),it("should skip when enum value is undefined",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.ENUM,id:1,valuePath:[{type:"TUPLE",offset:0}]}},t={...l,context:c},a=[new Uint8Array([])];p.extractValue.mockReturnValue(y(a));const n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(0)}),it("should create callback with enum id 0",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.ENUM,id:0,valuePath:[{type:"TUPLE",offset:0}]}},t={type:e.ENUM,id:0,value:0,payload:"enum context 1"},a={type:e.ENUM,id:1,value:1,payload:"enum context 2"},n={...l,context:c,contextOptional:[t,a]},s=[new Uint8Array([1,0])];p.extractValue.mockReturnValue(y(s));const u=new r(o,n).run();expect(u.subcontextCallbacks).toHaveLength(1);const i=u.subcontextCallbacks[0],C=await i();expect(C).toEqual(t)}),it("should skip when no matching enum context found",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.ENUM,id:1,valuePath:[{type:"TUPLE",offset:0}]}},t={type:e.ENUM,id:2,value:2,payload:"enum context"},a={...l,context:c,contextOptional:[t]},n=[new Uint8Array([1,2])];p.extractValue.mockReturnValue(y(n));const s=new r(o,a).run();expect(s.subcontextCallbacks).toHaveLength(0)})}),describe("for TOKEN type",()=>{it("should create callbacks to get token context",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TOKEN,valuePath:[{type:"TUPLE",offset:0}]}},t={...l,context:c},a=[new Uint8Array([1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22])];p.extractValue.mockReturnValue(y(a)),x.getFieldContext.mockResolvedValue({type:e.TOKEN,payload:"token result"});const n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(1);const s=n.subcontextCallbacks[0],u=await s();expect(u).toEqual({type:e.TOKEN,payload:"token result"}),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,address:"0x030405060708090a0b0c0d0e0f10111213141516"},e.TOKEN)}),it("should create callbacks to get token as constant",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TOKEN,value:"0x030405060708090a0b0c0d0e0f10111213141516"}},t={...l,context:c};x.getFieldContext.mockResolvedValue({type:e.TOKEN,payload:"token result"});const a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(1);const n=a.subcontextCallbacks[0],s=await n();expect(s).toEqual({type:e.TOKEN,payload:"token result"}),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,address:"0x030405060708090a0b0c0d0e0f10111213141516"},e.TOKEN)})}),describe("for NFT type",()=>{it("should create callbacks to get NFT context",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.NFT,valuePath:[{type:"TUPLE",offset:0}]}},t={...l,context:c},a=[new Uint8Array([1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22])];p.extractValue.mockReturnValue(y(a)),x.getFieldContext.mockResolvedValue({type:e.NFT,payload:"nft result"});const n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(1);const s=n.subcontextCallbacks[0],u=await s();expect(u).toEqual({type:e.NFT,payload:"nft result"}),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,address:"0x030405060708090a0b0c0d0e0f10111213141516"},e.NFT)}),it("should create callbacks to get NFT as constant",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.NFT,value:"0x030405060708090a0b0c0d0e0f10111213141516"}},t={...l,context:c};x.getFieldContext.mockResolvedValue({type:e.NFT,payload:"nft result"});const a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(1);const n=a.subcontextCallbacks[0],s=await n();expect(s).toEqual({type:e.NFT,payload:"nft result"}),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,address:"0x030405060708090a0b0c0d0e0f10111213141516"},e.NFT)})}),describe("for TRUSTED_NAME type",()=>{it("should create callbacks to get trusted name context with challenge",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TRUSTED_NAME,valuePath:[{type:"TUPLE",offset:0}],types:["type1","type2"],sources:["source1","source2"]}},t={...l,context:c},a=[new Uint8Array([1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22])];p.extractValue.mockReturnValue(y(a)),x.getFieldContext.mockResolvedValue({type:e.TRUSTED_NAME,payload:"trusted name result"});const n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(1);const s=n.subcontextCallbacks[0],u=await s();expect(u).toEqual({type:e.TRUSTED_NAME,payload:"trusted name result"}),expect(o.sendCommand).toHaveBeenCalledWith(expect.any(N)),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,address:"0x030405060708090a0b0c0d0e0f10111213141516",challenge:"test-challenge",types:["type1","type2"],sources:["source1","source2"],deviceModelId:b.STAX},e.TRUSTED_NAME)}),it("should handle challenge command failure",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TRUSTED_NAME,valuePath:[{type:"TUPLE",offset:0}],types:["type1"],sources:["source1"]}},t={...l,context:c},a=[new Uint8Array([1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22])];p.extractValue.mockReturnValue(y(a));const n=new E("Failed");o.sendCommand.mockResolvedValueOnce(h({error:n}));const s=new r(o,t).run();expect(s.subcontextCallbacks).toHaveLength(1);const u=s.subcontextCallbacks[0],i=await u();expect(i).toEqual({error:new Error("Failed to get challenge"),type:e.ERROR})})}),describe("for multiple values",()=>{it("should create callbacks for each extracted value",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TOKEN,valuePath:[{type:"TUPLE",offset:0}]}},t={...l,context:c},a=[new Uint8Array([1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22]),new Uint8Array([33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54])];p.extractValue.mockReturnValue(y(a)),x.getFieldContext.mockResolvedValueOnce({type:e.TOKEN,payload:"token result 1"}),x.getFieldContext.mockResolvedValueOnce({type:e.TOKEN,payload:"token result 2"});const n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(2);const s=n.subcontextCallbacks[0],u=n.subcontextCallbacks[1],i=await s(),C=await u();expect(i).toEqual({type:e.TOKEN,payload:"token result 1"}),expect(C).toEqual({type:e.TOKEN,payload:"token result 2"}),expect(x.getFieldContext).toHaveBeenCalledTimes(2),expect(x.getFieldContext).toHaveBeenNthCalledWith(1,{chainId:1,address:"0x030405060708090a0b0c0d0e0f10111213141516"},e.TOKEN),expect(x.getFieldContext).toHaveBeenNthCalledWith(2,{chainId:1,address:"0x232425262728292a2b2c2d2e2f30313233343536"},e.TOKEN)})})})}),describe("when context has no reference",()=>{it("should return context with empty subcontextCallbacks",()=>{const c={type:e.TOKEN,payload:"test payload"},t={...l,context:c},a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(0)})}),describe("when context has reference but no valuePath",()=>{it("should return context with empty subcontextCallbacks",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TOKEN,valuePath:void 0}},t={...l,context:c},a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(0)})}),describe("error handling",()=>{it("should throw error for uncovered context type",()=>{const t={...l,context:{type:"UNKNOWN_TYPE",payload:"test payload"}};expect(()=>new r(o,t).run()).toThrow("Uncovered type: UNKNOWN_TYPE")}),it("should throw error for uncovered reference type",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:"UNKNOWN_REFERENCE_TYPE"}},t={...l,context:c};expect(()=>new r(o,t).run()).toThrow("Uncovered reference type: UNKNOWN_REFERENCE_TYPE")})}),describe("CALLDATA reference type",()=>{it("should return empty subcontextCallbacks for CALLDATA reference",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.CALLDATA,callee:[{type:"TUPLE",offset:0}],valuePath:[{type:"TUPLE",offset:0}]}},t={...l,context:c},a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(0)})}),describe("references without valuePath",()=>{it("should return empty subcontextCallbacks for ENUM reference without valuePath",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.ENUM,id:1,valuePath:void 0}},t={...l,context:c},a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(0)}),it("should return empty subcontextCallbacks for TRUSTED_NAME reference without valuePath",()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TRUSTED_NAME,types:["type1"],sources:["source1"],valuePath:void 0}},t={...l,context:c},a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(0)})}),describe("PROXY_INFO context type",()=>{beforeEach(()=>{o.sendCommand.mockResolvedValue(h({data:{challenge:"test-challenge"}}))}),it("should create callback to get proxy delegate call context",async()=>{const c={type:e.PROXY_INFO,payload:"proxy payload"},t={...l,context:c,subset:{...l.subset,to:"0x1234567890123456789012345678901234567890",data:"0xabcdef"}};x.getFieldContext.mockResolvedValue({type:e.PROXY_INFO,payload:"proxy result"});const a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(1);const n=a.subcontextCallbacks[0],s=await n();expect(s).toEqual({type:e.PROXY_INFO,payload:"proxy result"}),expect(o.sendCommand).toHaveBeenCalledWith(expect.any(N)),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,proxyAddress:"0x1234567890123456789012345678901234567890",calldata:"0xabcdef",deviceModelId:b.STAX,challenge:"test-challenge"},e.PROXY_INFO)}),it("should handle challenge command failure",async()=>{const c={type:e.PROXY_INFO,payload:"proxy payload"},t={...l,context:c,subset:{...l.subset,to:"0x1234567890123456789012345678901234567890",data:"0xabcdef"}},a=new E("Failed");o.sendCommand.mockResolvedValueOnce(h({error:a}));const n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(1);const s=n.subcontextCallbacks[0],u=await s();expect(u).toEqual({error:new Error("Failed to get challenge"),type:e.ERROR}),expect(o.sendCommand).toHaveBeenCalledWith(expect.any(N)),expect(x.getFieldContext).not.toHaveBeenCalled()}),it("should handle missing proxy address",async()=>{const c={type:e.PROXY_INFO,payload:"proxy payload"},t={...l,context:c,subset:{...l.subset,to:void 0,data:"0xabcdef"}},a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(1);const n=a.subcontextCallbacks[0],s=await n();expect(s).toEqual({error:new Error("Failed to get proxy address"),type:e.ERROR}),expect(o.sendCommand).toHaveBeenCalledWith(expect.any(N)),expect(x.getFieldContext).not.toHaveBeenCalled()}),it("should use correct device model id in context",async()=>{const c={type:e.PROXY_INFO,payload:"proxy payload"},t={...l,context:c,deviceModelId:b.NANO_SP,subset:{...l.subset,to:"0x1234567890123456789012345678901234567890",data:"0xabcdef"}};x.getFieldContext.mockResolvedValue({type:e.PROXY_INFO,payload:"proxy result"});const a=new r(o,t).run();expect(a.subcontextCallbacks).toHaveLength(1);const n=a.subcontextCallbacks[0];await n(),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,proxyAddress:"0x1234567890123456789012345678901234567890",calldata:"0xabcdef",deviceModelId:b.NANO_SP,challenge:"test-challenge"},e.PROXY_INFO)})}),describe("edge cases",()=>{it("should handle value array shorter than 20 bytes for address extraction",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TOKEN,valuePath:[{type:"TUPLE",offset:0}]}},t={...l,context:c},a=[new Uint8Array([1,2,3])];p.extractValue.mockReturnValue(y(a)),x.getFieldContext.mockResolvedValue({type:e.ERROR,message:"Invalid address"});const n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(1);const s=n.subcontextCallbacks[0],u=await s();expect(u).toEqual({type:e.ERROR,message:"Invalid address"}),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,address:"0x010203"},e.TOKEN)}),it("should handle empty value array",async()=>{const c={type:e.TRANSACTION_FIELD_DESCRIPTION,payload:"test payload",reference:{type:d.TOKEN,valuePath:[{type:"TUPLE",offset:0}]}},t={...l,context:c},a=[new Uint8Array([])];p.extractValue.mockReturnValue(y(a)),x.getFieldContext.mockResolvedValue({type:e.TOKEN,payload:"token result"});const n=new r(o,t).run();expect(n.subcontextCallbacks).toHaveLength(1);const s=n.subcontextCallbacks[0],u=await s();expect(u).toEqual({type:e.TOKEN,payload:"token result"}),expect(x.getFieldContext).toHaveBeenCalledWith({chainId:1,address:"0x"},e.TOKEN)})})});
2
2
  //# sourceMappingURL=BuildSubcontextsTask.test.js.map