@ledgerhq/device-signer-kit-solana 0.0.0-signer-eth-plugin-fix-20250331141239 → 0.0.0-sol-signer-20251203164116
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +116 -23
- package/lib/cjs/api/SignerSolana.js +1 -1
- package/lib/cjs/api/SignerSolana.js.map +1 -1
- package/lib/cjs/api/SignerSolanaBuilder.js +1 -1
- package/lib/cjs/api/SignerSolanaBuilder.js.map +3 -3
- package/lib/cjs/api/SolanaTools.js +2 -0
- package/lib/cjs/api/SolanaTools.js.map +7 -0
- package/lib/cjs/api/SolanaToolsBuilder.js +2 -0
- package/lib/cjs/api/SolanaToolsBuilder.js.map +7 -0
- package/lib/cjs/api/app-binder/GenerateTransactionDeviceActionTypes.js +2 -0
- package/lib/cjs/api/app-binder/GenerateTransactionDeviceActionTypes.js.map +7 -0
- package/lib/cjs/api/app-binder/SignMessageDeviceActionTypes.js.map +1 -1
- package/lib/cjs/api/app-binder/SignTransactionDeviceActionTypes.js +1 -1
- package/lib/cjs/api/app-binder/SignTransactionDeviceActionTypes.js.map +3 -3
- package/lib/cjs/api/index.js +1 -1
- package/lib/cjs/api/index.js.map +3 -3
- package/lib/cjs/api/model/AddressOption.js +1 -1
- package/lib/cjs/api/model/AddressOption.js.map +1 -1
- package/lib/cjs/api/model/MessageOptions.js +2 -0
- package/lib/cjs/api/model/MessageOptions.js.map +7 -0
- package/lib/cjs/api/model/SolanaTransactionOptionalConfig.js +2 -0
- package/lib/cjs/api/model/SolanaTransactionOptionalConfig.js.map +7 -0
- package/lib/cjs/api/model/TransactionResolutionContext.js +2 -0
- package/lib/cjs/api/model/TransactionResolutionContext.js.map +7 -0
- package/lib/cjs/internal/DefaultSignerSolana.js +1 -1
- package/lib/cjs/internal/DefaultSignerSolana.js.map +3 -3
- package/lib/cjs/internal/DefaultSignerSolana.test.js +1 -1
- package/lib/cjs/internal/DefaultSignerSolana.test.js.map +3 -3
- package/lib/cjs/internal/DefaultSolanaTools.js +2 -0
- package/lib/cjs/internal/DefaultSolanaTools.js.map +7 -0
- package/lib/cjs/internal/DefaultSolanaTools.test.js +2 -0
- package/lib/cjs/internal/DefaultSolanaTools.test.js.map +7 -0
- package/lib/cjs/internal/app-binder/SolanaAppBinder.js +1 -1
- package/lib/cjs/internal/app-binder/SolanaAppBinder.js.map +3 -3
- package/lib/cjs/internal/app-binder/SolanaAppBinder.test.js +1 -1
- package/lib/cjs/internal/app-binder/SolanaAppBinder.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/command/GetAppConfigurationCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetAppConfigurationCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/GetAppConfigurationCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetAppConfigurationCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/GetChallengeCommand.js +2 -0
- package/lib/cjs/internal/app-binder/command/GetChallengeCommand.js.map +7 -0
- package/lib/cjs/internal/app-binder/command/GetChallengeCommand.test.js +2 -0
- package/lib/cjs/internal/app-binder/command/GetChallengeCommand.test.js.map +7 -0
- package/lib/cjs/internal/app-binder/command/GetPubKeyCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetPubKeyCommand.js.map +3 -3
- package/lib/cjs/internal/app-binder/command/GetPubKeyCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetPubKeyCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/ProvideTLVDescriptorCommand.js +2 -0
- package/lib/cjs/internal/app-binder/command/ProvideTLVDescriptorCommand.js.map +7 -0
- package/lib/cjs/internal/app-binder/command/ProvideTLVDescriptorCommand.test.js +2 -0
- package/lib/cjs/internal/app-binder/command/ProvideTLVDescriptorCommand.test.js.map +7 -0
- package/lib/cjs/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.js +2 -0
- package/lib/cjs/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.js.map +7 -0
- package/lib/cjs/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.js +2 -0
- package/lib/cjs/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.js.map +7 -0
- package/lib/cjs/internal/app-binder/command/SignOffChainMessageCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignOffChainMessageCommand.js.map +3 -3
- package/lib/cjs/internal/app-binder/command/SignOffChainMessageCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignOffChainMessageCommand.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/command/SignTransactionCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignTransactionCommand.js.map +3 -3
- package/lib/cjs/internal/app-binder/command/SignTransactionCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignTransactionCommand.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/device-action/GenerateTransactionDeviceAction.js +2 -0
- package/lib/cjs/internal/app-binder/device-action/GenerateTransactionDeviceAction.js.map +7 -0
- package/lib/cjs/internal/app-binder/device-action/SignTransactionDeviceAction.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/SignTransactionDeviceAction.js.map +3 -3
- package/lib/cjs/internal/app-binder/device-action/SignTransactionDeviceAction.test.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/SignTransactionDeviceAction.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/device-action/__test-utils__/makeInternalApi.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/__test-utils__/makeInternalApi.js.map +3 -3
- package/lib/cjs/internal/app-binder/di/appBinderModule.js +1 -1
- package/lib/cjs/internal/app-binder/di/appBinderModule.js.map +3 -3
- package/lib/cjs/internal/app-binder/di/appBinderModule.test.js +1 -1
- package/lib/cjs/internal/app-binder/di/appBinderModule.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/services/ApplicationChecker.js +2 -0
- package/lib/cjs/internal/app-binder/services/ApplicationChecker.js.map +7 -0
- package/lib/cjs/internal/app-binder/services/ApplicationChecker.test.js +2 -0
- package/lib/cjs/internal/app-binder/services/ApplicationChecker.test.js.map +7 -0
- package/lib/cjs/internal/app-binder/services/GenerateSolanaTransaction.js +2 -0
- package/lib/cjs/internal/app-binder/services/GenerateSolanaTransaction.js.map +7 -0
- package/lib/cjs/internal/app-binder/services/GenerateSolanaTransaction.test.js +2 -0
- package/lib/cjs/internal/app-binder/services/GenerateSolanaTransaction.test.js.map +7 -0
- package/lib/cjs/internal/app-binder/services/TransactionInspector.js +2 -0
- package/lib/cjs/internal/app-binder/services/TransactionInspector.js.map +7 -0
- package/lib/cjs/internal/app-binder/services/TransactionInspector.test.js +2 -0
- package/lib/cjs/internal/app-binder/services/TransactionInspector.test.js.map +7 -0
- package/lib/cjs/internal/app-binder/services/bs58Encoder.js +2 -0
- package/lib/cjs/internal/app-binder/services/bs58Encoder.js.map +7 -0
- package/lib/cjs/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.js +2 -0
- package/lib/cjs/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.js.map +7 -0
- package/lib/cjs/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.js +2 -0
- package/lib/cjs/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.js.map +7 -0
- package/lib/cjs/internal/app-binder/services/utils/transactionDecoders.js +2 -0
- package/lib/cjs/internal/app-binder/services/utils/transactionDecoders.js.map +7 -0
- package/lib/cjs/internal/app-binder/task/BuildTransactionContextTask.js +2 -0
- package/lib/cjs/internal/app-binder/task/BuildTransactionContextTask.js.map +7 -0
- package/lib/cjs/internal/app-binder/task/BuildTransactionContextTask.test.js +2 -0
- package/lib/cjs/internal/app-binder/task/BuildTransactionContextTask.test.js.map +7 -0
- package/lib/cjs/internal/app-binder/task/ProvideTransactionContextTask.js +2 -0
- package/lib/cjs/internal/app-binder/task/ProvideTransactionContextTask.js.map +7 -0
- package/lib/cjs/internal/app-binder/task/ProvideTransactionContextTask.test.js +2 -0
- package/lib/cjs/internal/app-binder/task/ProvideTransactionContextTask.test.js.map +7 -0
- package/lib/cjs/internal/app-binder/task/SendSignMessageTask.js +1 -1
- package/lib/cjs/internal/app-binder/task/SendSignMessageTask.js.map +3 -3
- package/lib/cjs/internal/app-binder/task/SendSignMessageTask.test.js +3 -1
- package/lib/cjs/internal/app-binder/task/SendSignMessageTask.test.js.map +3 -3
- package/lib/cjs/internal/di.js +1 -1
- package/lib/cjs/internal/di.js.map +3 -3
- package/lib/cjs/internal/externalTypes.js +1 -1
- package/lib/cjs/internal/externalTypes.js.map +2 -2
- package/lib/cjs/internal/use-cases/address/GetAddressUseCase.js +1 -1
- package/lib/cjs/internal/use-cases/address/GetAddressUseCase.js.map +2 -2
- package/lib/cjs/internal/use-cases/address/GetAddressUseCase.test.js +1 -1
- package/lib/cjs/internal/use-cases/address/GetAddressUseCase.test.js.map +2 -2
- package/lib/cjs/internal/use-cases/di/useCasesModule.js +1 -1
- package/lib/cjs/internal/use-cases/di/useCasesModule.js.map +3 -3
- package/lib/cjs/internal/use-cases/di/useCasesModule.test.js +1 -1
- package/lib/cjs/internal/use-cases/di/useCasesModule.test.js.map +2 -2
- package/lib/cjs/internal/use-cases/di/useCasesTypes.js +1 -1
- package/lib/cjs/internal/use-cases/di/useCasesTypes.js.map +2 -2
- package/lib/cjs/internal/use-cases/generateTransaction/GenerateTransactionUseCase.js +2 -0
- package/lib/cjs/internal/use-cases/generateTransaction/GenerateTransactionUseCase.js.map +7 -0
- package/lib/cjs/internal/use-cases/generateTransaction/GenerateTransactionUseCase.test.js +2 -0
- package/lib/cjs/internal/use-cases/generateTransaction/GenerateTransactionUseCase.test.js.map +7 -0
- package/lib/cjs/internal/use-cases/message/SignMessageUseCase.js +1 -1
- package/lib/cjs/internal/use-cases/message/SignMessageUseCase.js.map +3 -3
- package/lib/cjs/internal/use-cases/message/SignMessageUseCase.test.js +1 -1
- package/lib/cjs/internal/use-cases/message/SignMessageUseCase.test.js.map +2 -2
- package/lib/cjs/internal/use-cases/transaction/SignTransactionUseCase.js +1 -1
- package/lib/cjs/internal/use-cases/transaction/SignTransactionUseCase.js.map +3 -3
- package/lib/cjs/internal/use-cases/transaction/SignTransactionUseCase.test.js +1 -1
- package/lib/cjs/internal/use-cases/transaction/SignTransactionUseCase.test.js.map +3 -3
- package/lib/cjs/package.json +45 -36
- package/lib/esm/api/SignerSolanaBuilder.js +1 -1
- package/lib/esm/api/SignerSolanaBuilder.js.map +3 -3
- package/lib/esm/api/SolanaTools.js +1 -0
- package/lib/esm/api/SolanaToolsBuilder.js +2 -0
- package/lib/esm/api/SolanaToolsBuilder.js.map +7 -0
- package/lib/esm/api/app-binder/GenerateTransactionDeviceActionTypes.js +1 -0
- package/lib/esm/api/app-binder/GenerateTransactionDeviceActionTypes.js.map +7 -0
- package/lib/esm/api/app-binder/SignTransactionDeviceActionTypes.js +1 -0
- package/lib/esm/api/app-binder/SignTransactionDeviceActionTypes.js.map +4 -4
- package/lib/esm/api/index.js +1 -1
- package/lib/esm/api/index.js.map +3 -3
- package/lib/esm/api/model/MessageOptions.js +1 -0
- package/lib/esm/api/model/MessageOptions.js.map +7 -0
- package/lib/esm/api/model/SolanaTransactionOptionalConfig.js +1 -0
- package/lib/esm/api/model/SolanaTransactionOptionalConfig.js.map +7 -0
- package/lib/esm/api/model/TransactionResolutionContext.js +2 -0
- package/lib/esm/api/model/TransactionResolutionContext.js.map +7 -0
- package/lib/esm/internal/DefaultSignerSolana.js +1 -1
- package/lib/esm/internal/DefaultSignerSolana.js.map +3 -3
- package/lib/esm/internal/DefaultSignerSolana.test.js +1 -1
- package/lib/esm/internal/DefaultSignerSolana.test.js.map +3 -3
- package/lib/esm/internal/DefaultSolanaTools.js +2 -0
- package/lib/esm/internal/DefaultSolanaTools.js.map +7 -0
- package/lib/esm/internal/DefaultSolanaTools.test.js +2 -0
- package/lib/esm/internal/DefaultSolanaTools.test.js.map +7 -0
- package/lib/esm/internal/app-binder/SolanaAppBinder.js +1 -1
- package/lib/esm/internal/app-binder/SolanaAppBinder.js.map +3 -3
- package/lib/esm/internal/app-binder/SolanaAppBinder.test.js +1 -1
- package/lib/esm/internal/app-binder/SolanaAppBinder.test.js.map +3 -3
- package/lib/esm/internal/app-binder/command/GetAppConfigurationCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/GetAppConfigurationCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/GetAppConfigurationCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/GetAppConfigurationCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/GetChallengeCommand.js +2 -0
- package/lib/esm/internal/app-binder/command/GetChallengeCommand.js.map +7 -0
- package/lib/esm/internal/app-binder/command/GetChallengeCommand.test.js +2 -0
- package/lib/esm/internal/app-binder/command/GetChallengeCommand.test.js.map +7 -0
- package/lib/esm/internal/app-binder/command/GetPubKeyCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/GetPubKeyCommand.js.map +3 -3
- package/lib/esm/internal/app-binder/command/GetPubKeyCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/GetPubKeyCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/ProvideTLVDescriptorCommand.js +2 -0
- package/lib/esm/internal/app-binder/command/ProvideTLVDescriptorCommand.js.map +7 -0
- package/lib/esm/internal/app-binder/command/ProvideTLVDescriptorCommand.test.js +2 -0
- package/lib/esm/internal/app-binder/command/ProvideTLVDescriptorCommand.test.js.map +7 -0
- package/lib/esm/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.js +2 -0
- package/lib/esm/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.js.map +7 -0
- package/lib/esm/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.js +2 -0
- package/lib/esm/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.js.map +7 -0
- package/lib/esm/internal/app-binder/command/SignOffChainMessageCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/SignOffChainMessageCommand.js.map +3 -3
- package/lib/esm/internal/app-binder/command/SignOffChainMessageCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/SignOffChainMessageCommand.test.js.map +3 -3
- package/lib/esm/internal/app-binder/command/SignTransactionCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/SignTransactionCommand.js.map +3 -3
- package/lib/esm/internal/app-binder/command/SignTransactionCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/SignTransactionCommand.test.js.map +3 -3
- package/lib/esm/internal/app-binder/device-action/GenerateTransactionDeviceAction.js +2 -0
- package/lib/esm/internal/app-binder/device-action/GenerateTransactionDeviceAction.js.map +7 -0
- package/lib/esm/internal/app-binder/device-action/SignTransactionDeviceAction.js +1 -1
- package/lib/esm/internal/app-binder/device-action/SignTransactionDeviceAction.js.map +3 -3
- package/lib/esm/internal/app-binder/device-action/SignTransactionDeviceAction.test.js +1 -1
- package/lib/esm/internal/app-binder/device-action/SignTransactionDeviceAction.test.js.map +3 -3
- package/lib/esm/internal/app-binder/device-action/__test-utils__/makeInternalApi.js +1 -1
- package/lib/esm/internal/app-binder/device-action/__test-utils__/makeInternalApi.js.map +3 -3
- package/lib/esm/internal/app-binder/di/appBinderModule.js +1 -1
- package/lib/esm/internal/app-binder/di/appBinderModule.js.map +3 -3
- package/lib/esm/internal/app-binder/di/appBinderModule.test.js +1 -1
- package/lib/esm/internal/app-binder/di/appBinderModule.test.js.map +2 -2
- package/lib/esm/internal/app-binder/services/ApplicationChecker.js +2 -0
- package/lib/esm/internal/app-binder/services/ApplicationChecker.js.map +7 -0
- package/lib/esm/internal/app-binder/services/ApplicationChecker.test.js +2 -0
- package/lib/esm/internal/app-binder/services/ApplicationChecker.test.js.map +7 -0
- package/lib/esm/internal/app-binder/services/GenerateSolanaTransaction.js +2 -0
- package/lib/esm/internal/app-binder/services/GenerateSolanaTransaction.js.map +7 -0
- package/lib/esm/internal/app-binder/services/GenerateSolanaTransaction.test.js +2 -0
- package/lib/esm/internal/app-binder/services/GenerateSolanaTransaction.test.js.map +7 -0
- package/lib/esm/internal/app-binder/services/TransactionInspector.js +2 -0
- package/lib/esm/internal/app-binder/services/TransactionInspector.js.map +7 -0
- package/lib/esm/internal/app-binder/services/TransactionInspector.test.js +2 -0
- package/lib/esm/internal/app-binder/services/TransactionInspector.test.js.map +7 -0
- package/lib/esm/internal/app-binder/services/bs58Encoder.js +2 -0
- package/lib/esm/internal/app-binder/services/bs58Encoder.js.map +7 -0
- package/lib/esm/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.js +2 -0
- package/lib/esm/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.js.map +7 -0
- package/lib/esm/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.js +2 -0
- package/lib/esm/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.js.map +7 -0
- package/lib/esm/internal/app-binder/services/utils/transactionDecoders.js +2 -0
- package/lib/esm/internal/app-binder/services/utils/transactionDecoders.js.map +7 -0
- package/lib/esm/internal/app-binder/task/BuildTransactionContextTask.js +2 -0
- package/lib/esm/internal/app-binder/task/BuildTransactionContextTask.js.map +7 -0
- package/lib/esm/internal/app-binder/task/BuildTransactionContextTask.test.js +2 -0
- package/lib/esm/internal/app-binder/task/BuildTransactionContextTask.test.js.map +7 -0
- package/lib/esm/internal/app-binder/task/ProvideTransactionContextTask.js +2 -0
- package/lib/esm/internal/app-binder/task/ProvideTransactionContextTask.js.map +7 -0
- package/lib/esm/internal/app-binder/task/ProvideTransactionContextTask.test.js +2 -0
- package/lib/esm/internal/app-binder/task/ProvideTransactionContextTask.test.js.map +7 -0
- package/lib/esm/internal/app-binder/task/SendSignMessageTask.js +1 -1
- package/lib/esm/internal/app-binder/task/SendSignMessageTask.js.map +3 -3
- package/lib/esm/internal/app-binder/task/SendSignMessageTask.test.js +3 -1
- package/lib/esm/internal/app-binder/task/SendSignMessageTask.test.js.map +3 -3
- package/lib/esm/internal/di.js +1 -1
- package/lib/esm/internal/di.js.map +3 -3
- package/lib/esm/internal/externalTypes.js +1 -1
- package/lib/esm/internal/externalTypes.js.map +2 -2
- package/lib/esm/internal/use-cases/address/GetAddressUseCase.js +1 -1
- package/lib/esm/internal/use-cases/address/GetAddressUseCase.js.map +2 -2
- package/lib/esm/internal/use-cases/address/GetAddressUseCase.test.js +1 -1
- package/lib/esm/internal/use-cases/address/GetAddressUseCase.test.js.map +2 -2
- package/lib/esm/internal/use-cases/di/useCasesModule.js +1 -1
- package/lib/esm/internal/use-cases/di/useCasesModule.js.map +3 -3
- package/lib/esm/internal/use-cases/di/useCasesModule.test.js +1 -1
- package/lib/esm/internal/use-cases/di/useCasesModule.test.js.map +2 -2
- package/lib/esm/internal/use-cases/di/useCasesTypes.js +1 -1
- package/lib/esm/internal/use-cases/di/useCasesTypes.js.map +2 -2
- package/lib/esm/internal/use-cases/generateTransaction/GenerateTransactionUseCase.js +2 -0
- package/lib/esm/internal/use-cases/generateTransaction/GenerateTransactionUseCase.js.map +7 -0
- package/lib/esm/internal/use-cases/generateTransaction/GenerateTransactionUseCase.test.js +2 -0
- package/lib/esm/internal/use-cases/generateTransaction/GenerateTransactionUseCase.test.js.map +7 -0
- package/lib/esm/internal/use-cases/message/SignMessageUseCase.js +1 -1
- package/lib/esm/internal/use-cases/message/SignMessageUseCase.js.map +3 -3
- package/lib/esm/internal/use-cases/message/SignMessageUseCase.test.js +1 -1
- package/lib/esm/internal/use-cases/message/SignMessageUseCase.test.js.map +2 -2
- package/lib/esm/internal/use-cases/transaction/SignTransactionUseCase.js +1 -1
- package/lib/esm/internal/use-cases/transaction/SignTransactionUseCase.js.map +3 -3
- package/lib/esm/internal/use-cases/transaction/SignTransactionUseCase.test.js +1 -1
- package/lib/esm/internal/use-cases/transaction/SignTransactionUseCase.test.js.map +3 -3
- package/lib/esm/package.json +45 -36
- package/lib/types/api/SignerSolana.d.ts +4 -3
- package/lib/types/api/SignerSolana.d.ts.map +1 -1
- package/lib/types/api/SignerSolanaBuilder.d.ts +12 -1
- package/lib/types/api/SignerSolanaBuilder.d.ts.map +1 -1
- package/lib/types/api/SolanaTools.d.ts +10 -0
- package/lib/types/api/SolanaTools.d.ts.map +1 -0
- package/lib/types/api/SolanaToolsBuilder.d.ts +39 -0
- package/lib/types/api/SolanaToolsBuilder.d.ts.map +1 -0
- package/lib/types/api/app-binder/GenerateTransactionDeviceActionTypes.d.ts +24 -0
- package/lib/types/api/app-binder/GenerateTransactionDeviceActionTypes.d.ts.map +1 -0
- package/lib/types/api/app-binder/SignMessageDeviceActionTypes.d.ts +3 -2
- package/lib/types/api/app-binder/SignMessageDeviceActionTypes.d.ts.map +1 -1
- package/lib/types/api/app-binder/SignTransactionDeviceActionTypes.d.ts +21 -3
- package/lib/types/api/app-binder/SignTransactionDeviceActionTypes.d.ts.map +1 -1
- package/lib/types/api/index.d.ts +4 -1
- package/lib/types/api/index.d.ts.map +1 -1
- package/lib/types/api/model/AddressOption.d.ts +1 -0
- package/lib/types/api/model/AddressOption.d.ts.map +1 -1
- package/lib/types/api/model/MessageOptions.d.ts +4 -0
- package/lib/types/api/model/MessageOptions.d.ts.map +1 -0
- package/lib/types/api/model/SolanaTransactionOptionalConfig.d.ts +7 -0
- package/lib/types/api/model/SolanaTransactionOptionalConfig.d.ts.map +1 -0
- package/lib/types/api/model/TransactionResolutionContext.d.ts +15 -0
- package/lib/types/api/model/TransactionResolutionContext.d.ts.map +1 -0
- package/lib/types/internal/DefaultSignerSolana.d.ts +298 -4
- package/lib/types/internal/DefaultSignerSolana.d.ts.map +1 -1
- package/lib/types/internal/DefaultSolanaTools.d.ts +20 -0
- package/lib/types/internal/DefaultSolanaTools.d.ts.map +1 -0
- package/lib/types/internal/DefaultSolanaTools.test.d.ts +2 -0
- package/lib/types/internal/DefaultSolanaTools.test.d.ts.map +1 -0
- package/lib/types/internal/app-binder/SolanaAppBinder.d.ts +12 -3
- package/lib/types/internal/app-binder/SolanaAppBinder.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/GetAppConfigurationCommand.d.ts +1 -0
- package/lib/types/internal/app-binder/command/GetAppConfigurationCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/GetChallengeCommand.d.ts +12 -0
- package/lib/types/internal/app-binder/command/GetChallengeCommand.d.ts.map +1 -0
- package/lib/types/internal/app-binder/command/GetChallengeCommand.test.d.ts +2 -0
- package/lib/types/internal/app-binder/command/GetChallengeCommand.test.d.ts.map +1 -0
- package/lib/types/internal/app-binder/command/GetPubKeyCommand.d.ts +6 -4
- package/lib/types/internal/app-binder/command/GetPubKeyCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/ProvideTLVDescriptorCommand.d.ts +14 -0
- package/lib/types/internal/app-binder/command/ProvideTLVDescriptorCommand.d.ts.map +1 -0
- package/lib/types/internal/app-binder/command/ProvideTLVDescriptorCommand.test.d.ts +2 -0
- package/lib/types/internal/app-binder/command/ProvideTLVDescriptorCommand.test.d.ts.map +1 -0
- package/lib/types/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.d.ts +29 -0
- package/lib/types/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.d.ts.map +1 -0
- package/lib/types/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.d.ts +2 -0
- package/lib/types/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.d.ts.map +1 -0
- package/lib/types/internal/app-binder/command/SignOffChainMessageCommand.d.ts +14 -9
- package/lib/types/internal/app-binder/command/SignOffChainMessageCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/SignTransactionCommand.d.ts +3 -0
- package/lib/types/internal/app-binder/command/SignTransactionCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/utils/SolanaApplicationErrors.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/GenerateTransactionDeviceAction.d.ts +23 -0
- package/lib/types/internal/app-binder/device-action/GenerateTransactionDeviceAction.d.ts.map +1 -0
- package/lib/types/internal/app-binder/device-action/SignTransactionDeviceAction.d.ts +18 -1
- package/lib/types/internal/app-binder/device-action/SignTransactionDeviceAction.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/__test-utils__/makeInternalApi.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/__test-utils__/setupOpenAppDAMock.d.ts.map +1 -1
- package/lib/types/internal/app-binder/di/appBinderModule.d.ts.map +1 -1
- package/lib/types/internal/app-binder/services/ApplicationChecker.d.ts +13 -0
- package/lib/types/internal/app-binder/services/ApplicationChecker.d.ts.map +1 -0
- package/lib/types/internal/app-binder/services/ApplicationChecker.test.d.ts +2 -0
- package/lib/types/internal/app-binder/services/ApplicationChecker.test.d.ts.map +1 -0
- package/lib/types/internal/app-binder/services/GenerateSolanaTransaction.d.ts +14 -0
- package/lib/types/internal/app-binder/services/GenerateSolanaTransaction.d.ts.map +1 -0
- package/lib/types/internal/app-binder/services/GenerateSolanaTransaction.test.d.ts +2 -0
- package/lib/types/internal/app-binder/services/GenerateSolanaTransaction.test.d.ts.map +1 -0
- package/lib/types/internal/app-binder/services/TransactionInspector.d.ts +43 -0
- package/lib/types/internal/app-binder/services/TransactionInspector.d.ts.map +1 -0
- package/lib/types/internal/app-binder/services/TransactionInspector.test.d.ts +2 -0
- package/lib/types/internal/app-binder/services/TransactionInspector.test.d.ts.map +1 -0
- package/lib/types/internal/app-binder/services/bs58Encoder.d.ts +9 -0
- package/lib/types/internal/app-binder/services/bs58Encoder.d.ts.map +1 -0
- package/lib/types/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.d.ts +8 -0
- package/lib/types/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.d.ts.map +1 -0
- package/lib/types/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.d.ts +2 -0
- package/lib/types/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.d.ts.map +1 -0
- package/lib/types/internal/app-binder/services/utils/transactionDecoders.d.ts +14 -0
- package/lib/types/internal/app-binder/services/utils/transactionDecoders.d.ts.map +1 -0
- package/lib/types/internal/app-binder/task/BuildTransactionContextTask.d.ts +19 -0
- package/lib/types/internal/app-binder/task/BuildTransactionContextTask.d.ts.map +1 -0
- package/lib/types/internal/app-binder/task/BuildTransactionContextTask.test.d.ts +2 -0
- package/lib/types/internal/app-binder/task/BuildTransactionContextTask.test.d.ts.map +1 -0
- package/lib/types/internal/app-binder/task/ProvideTransactionContextTask.d.ts +19 -0
- package/lib/types/internal/app-binder/task/ProvideTransactionContextTask.d.ts.map +1 -0
- package/lib/types/internal/app-binder/task/ProvideTransactionContextTask.test.d.ts +2 -0
- package/lib/types/internal/app-binder/task/ProvideTransactionContextTask.test.d.ts.map +1 -0
- package/lib/types/internal/app-binder/task/SendSignMessageTask.d.ts +26 -3
- package/lib/types/internal/app-binder/task/SendSignMessageTask.d.ts.map +1 -1
- package/lib/types/internal/di.d.ts +3 -1
- package/lib/types/internal/di.d.ts.map +1 -1
- package/lib/types/internal/externalTypes.d.ts +1 -0
- package/lib/types/internal/externalTypes.d.ts.map +1 -1
- package/lib/types/internal/use-cases/address/GetAddressUseCase.d.ts.map +1 -1
- package/lib/types/internal/use-cases/di/useCasesModule.d.ts.map +1 -1
- package/lib/types/internal/use-cases/di/useCasesTypes.d.ts +1 -0
- package/lib/types/internal/use-cases/di/useCasesTypes.d.ts.map +1 -1
- package/lib/types/internal/use-cases/generateTransaction/GenerateTransactionUseCase.d.ts +10 -0
- package/lib/types/internal/use-cases/generateTransaction/GenerateTransactionUseCase.d.ts.map +1 -0
- package/lib/types/internal/use-cases/generateTransaction/GenerateTransactionUseCase.test.d.ts +2 -0
- package/lib/types/internal/use-cases/generateTransaction/GenerateTransactionUseCase.test.d.ts.map +1 -0
- package/lib/types/internal/use-cases/message/SignMessageUseCase.d.ts +2 -1
- package/lib/types/internal/use-cases/message/SignMessageUseCase.d.ts.map +1 -1
- package/lib/types/internal/use-cases/transaction/SignTransactionUseCase.d.ts +2 -2
- package/lib/types/internal/use-cases/transaction/SignTransactionUseCase.d.ts.map +1 -1
- package/lib/types/tsconfig.prod.tsbuildinfo +1 -1
- package/package.json +43 -34
- package/lib/cjs/api/model/TransactionOptions.js +0 -2
- package/lib/cjs/api/model/TransactionOptions.js.map +0 -7
- package/lib/esm/api/model/TransactionOptions.js +0 -1
- package/lib/types/api/model/TransactionOptions.d.ts +0 -2
- package/lib/types/api/model/TransactionOptions.d.ts.map +0 -1
- /package/lib/esm/api/{model/TransactionOptions.js.map → SolanaTools.js.map} +0 -0
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../../../../src/internal/app-binder/services/utils/transactionDecoders.ts"],
|
|
4
|
+
"sourcesContent": ["import {\n ASSOCIATED_TOKEN_PROGRAM_ID,\n decodeBurnCheckedInstruction,\n decodeBurnInstruction,\n decodeCloseAccountInstruction,\n decodeFreezeAccountInstruction,\n decodeInitializeAccount2Instruction,\n decodeInitializeAccount3Instruction,\n decodeInitializeAccountInstruction,\n decodeInitializeImmutableOwnerInstruction,\n decodeSyncNativeInstruction,\n decodeThawAccountInstruction,\n decodeTransferCheckedInstruction,\n decodeTransferCheckedWithFeeInstruction,\n decodeTransferInstruction,\n getAssociatedTokenAddressSync,\n TOKEN_2022_PROGRAM_ID,\n TOKEN_PROGRAM_ID,\n} from \"@solana/spl-token\";\nimport {\n type PublicKey,\n SystemProgram,\n SYSVAR_RENT_PUBKEY,\n type TransactionInstruction,\n} from \"@solana/web3.js\";\n\nimport {\n type NormalizedCompiledIx,\n type NormalizedMessage,\n type TxInspectorResult,\n} from \"@internal/app-binder/services/TransactionInspector\";\n\nexport type IxContext = {\n programId: PublicKey;\n ixMeta: NormalizedCompiledIx;\n message: NormalizedMessage;\n instruction: TransactionInstruction;\n};\n\nexport type Decoder = {\n when: (ctx: IxContext) => boolean;\n decode: (ctx: IxContext) => TxInspectorResult[\"data\"] | null;\n};\n\nconst isTokenProgramId = (pid: PublicKey) =>\n pid.equals(TOKEN_PROGRAM_ID) || pid.equals(TOKEN_2022_PROGRAM_ID);\n\nconst safe = <T>(fn: () => T): T | null => {\n try {\n return fn();\n } catch {\n return null;\n }\n};\n\nexport const DECODERS: Decoder[] = [\n // ATA creation (with derivation fallback)\n {\n when: ({ programId }) => programId.equals(ASSOCIATED_TOKEN_PROGRAM_ID),\n decode: ({ ixMeta, message }) => {\n const indexes = ixMeta.accountKeyIndexes ?? [];\n const byIndexes = (n: number) =>\n indexes[n] !== undefined ? (message.allKeys[indexes[n]] ?? null) : null;\n\n // canonical ATA instruction layout: [payer, ata, owner, mint, system, tokenProgram, rent?]\n const ataPk = byIndexes(1);\n const mintPk = byIndexes(3);\n if (!ataPk || !mintPk) return null;\n\n const accs = indexes\n .map((i) => message.allKeys[i])\n .filter((k): k is PublicKey => !!k);\n\n // prefer token-2022 if present among instruction accounts, else token classic\n const tokenProgInIx =\n accs.find((pk) => pk.equals(TOKEN_2022_PROGRAM_ID)) ??\n accs.find((pk) => pk.equals(TOKEN_PROGRAM_ID)) ??\n null;\n\n const isProgramOrSysvar = (pk: PublicKey) =>\n pk.equals(SystemProgram.programId) ||\n pk.equals(TOKEN_PROGRAM_ID) ||\n pk.equals(TOKEN_2022_PROGRAM_ID) ||\n pk.equals(ASSOCIATED_TOKEN_PROGRAM_ID) ||\n pk.equals(SYSVAR_RENT_PUBKEY);\n\n // candidate owners: exclude programs/sysvars, the ATA itself, and the mint\n const ownerCandidates = accs.filter(\n (pk) =>\n !isProgramOrSysvar(pk) && !pk.equals(ataPk) && !pk.equals(mintPk),\n );\n\n const derive = (owner: PublicKey, tokenProg: PublicKey) =>\n getAssociatedTokenAddressSync(\n mintPk,\n owner,\n true, // allowOwnerOffCurve\n tokenProg,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n // try with the token program actually referenced in the instruction (if any)\n if (tokenProgInIx) {\n for (const owner of ownerCandidates) {\n if (derive(owner, tokenProgInIx).equals(ataPk)) {\n return {\n createATA: {\n address: owner.toBase58(),\n mintAddress: mintPk.toBase58(),\n },\n };\n }\n }\n }\n\n // fallback: try both classic and 2022 (covers odd wrappers/missing program acct)\n for (const owner of ownerCandidates) {\n const dClassic = derive(owner, TOKEN_PROGRAM_ID);\n if (dClassic.equals(ataPk)) {\n return {\n createATA: {\n address: owner.toBase58(),\n mintAddress: mintPk.toBase58(),\n },\n };\n }\n const d22 = derive(owner, TOKEN_2022_PROGRAM_ID);\n if (d22.equals(ataPk)) {\n return {\n createATA: {\n address: owner.toBase58(),\n mintAddress: mintPk.toBase58(),\n },\n };\n }\n }\n return null;\n },\n },\n\n // Token-2022 fee\u2019d transfer\n {\n when: ({ programId }) => programId.equals(TOKEN_2022_PROGRAM_ID),\n decode: ({ instruction, programId }) =>\n safe(() => {\n const {\n keys: { destination },\n } = decodeTransferCheckedWithFeeInstruction(instruction, programId);\n return {\n tokenAddress: destination.pubkey.toBase58(),\n };\n }),\n },\n\n // Transfers\n {\n when: ({ programId }) => isTokenProgramId(programId),\n decode: ({ instruction, programId }) =>\n safe(() => {\n const {\n keys: { destination },\n } = decodeTransferInstruction(instruction, programId);\n return { tokenAddress: destination.pubkey.toBase58() };\n }),\n },\n {\n when: ({ programId }) => isTokenProgramId(programId),\n decode: ({ instruction, programId }) =>\n safe(() => {\n const {\n keys: { destination },\n } = decodeTransferCheckedInstruction(instruction, programId);\n return {\n tokenAddress: destination.pubkey.toBase58(),\n };\n }),\n },\n\n // Account init\n {\n when: ({ programId }) => isTokenProgramId(programId),\n decode: ({ instruction, programId }) =>\n safe(() => {\n const {\n keys: { account, mint },\n } = decodeInitializeAccountInstruction(instruction, programId);\n return {\n createATA: {\n address: account.pubkey.toBase58(),\n mintAddress: mint.pubkey.toBase58(),\n },\n };\n }),\n },\n {\n when: ({ programId }) => isTokenProgramId(programId),\n decode: ({ instruction, programId }) =>\n safe(() => {\n const {\n keys: { account, mint },\n } = decodeInitializeAccount2Instruction(instruction, programId);\n return {\n createATA: {\n address: account.pubkey.toBase58(),\n mintAddress: mint.pubkey.toBase58(),\n },\n };\n }),\n },\n {\n when: ({ programId }) => isTokenProgramId(programId),\n decode: ({ instruction, programId }) =>\n safe(() => {\n const {\n keys: { account, mint },\n } = decodeInitializeAccount3Instruction(instruction, programId);\n return {\n createATA: {\n address: account.pubkey.toBase58(),\n mintAddress: mint.pubkey.toBase58(),\n },\n };\n }),\n },\n {\n when: ({ programId }) => isTokenProgramId(programId),\n decode: ({ instruction, programId }) =>\n safe(() => {\n const {\n keys: { account },\n } = decodeInitializeImmutableOwnerInstruction(instruction, programId);\n return { tokenAddress: account.pubkey.toBase58() };\n }),\n },\n\n // Lifecycle / WSOL\n {\n when: ({ programId }) => isTokenProgramId(programId),\n decode: ({ instruction, programId }) =>\n safe(() => {\n const {\n keys: { account },\n } = decodeCloseAccountInstruction(instruction, programId);\n return { tokenAddress: account.pubkey.toBase58() };\n }),\n },\n {\n when: ({ programId }) => isTokenProgramId(programId),\n decode: ({ instruction, programId }) =>\n safe(() => {\n const {\n keys: { account },\n } = decodeSyncNativeInstruction(instruction, programId);\n return { tokenAddress: account.pubkey.toBase58() };\n }),\n },\n\n // Mint / Burn\n {\n when: ({ programId }) => isTokenProgramId(programId),\n decode: ({ instruction, programId }) =>\n safe(() => {\n const {\n keys: { account },\n } = decodeBurnCheckedInstruction(instruction, programId);\n return {\n tokenAddress: account.pubkey.toBase58(),\n };\n }),\n },\n {\n when: ({ programId }) => isTokenProgramId(programId),\n decode: ({ instruction, programId }) =>\n safe(() => {\n const {\n keys: { account },\n } = decodeBurnInstruction(instruction, programId);\n return {\n tokenAddress: account.pubkey.toBase58(),\n };\n }),\n },\n\n // Freeze / Thaw\n {\n when: ({ programId }) => isTokenProgramId(programId),\n decode: ({ instruction, programId }) =>\n safe(() => {\n const {\n keys: { account },\n } = decodeFreezeAccountInstruction(instruction, programId);\n return {\n tokenAddress: account.pubkey.toBase58(),\n };\n }),\n },\n {\n when: ({ programId }) => isTokenProgramId(programId),\n decode: ({ instruction, programId }) =>\n safe(() => {\n const {\n keys: { account },\n } = decodeThawAccountInstruction(instruction, programId);\n return {\n tokenAddress: account.pubkey.toBase58(),\n };\n }),\n },\n\n // LAST-RESORT: tag as SPL by program id only (when decoders can't run)\n {\n when: ({ programId }) =>\n programId.equals(ASSOCIATED_TOKEN_PROGRAM_ID) ||\n programId.equals(TOKEN_PROGRAM_ID) ||\n programId.equals(TOKEN_2022_PROGRAM_ID),\n decode: () => null,\n },\n];\n"],
|
|
5
|
+
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,cAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAkBO,6BACPC,EAKO,2BAoBP,MAAMC,EAAoBC,GACxBA,EAAI,OAAO,kBAAgB,GAAKA,EAAI,OAAO,uBAAqB,EAE5DC,EAAWC,GAA0B,CACzC,GAAI,CACF,OAAOA,EAAG,CACZ,MAAQ,CACN,OAAO,IACT,CACF,EAEaP,EAAsB,CAEjC,CACE,KAAM,CAAC,CAAE,UAAAQ,CAAU,IAAMA,EAAU,OAAO,6BAA2B,EACrE,OAAQ,CAAC,CAAE,OAAAC,EAAQ,QAAAC,CAAQ,IAAM,CAC/B,MAAMC,EAAUF,EAAO,mBAAqB,CAAC,EACvCG,EAAaC,GACjBF,EAAQE,CAAC,IAAM,OAAaH,EAAQ,QAAQC,EAAQE,CAAC,CAAC,GAAK,KAAQ,KAG/DC,EAAQF,EAAU,CAAC,EACnBG,EAASH,EAAU,CAAC,EAC1B,GAAI,CAACE,GAAS,CAACC,EAAQ,OAAO,KAE9B,MAAMC,EAAOL,EACV,IAAKM,GAAMP,EAAQ,QAAQO,CAAC,CAAC,EAC7B,OAAQC,GAAsB,CAAC,CAACA,CAAC,EAG9BC,EACJH,EAAK,KAAMI,GAAOA,EAAG,OAAO,uBAAqB,CAAC,GAClDJ,EAAK,KAAMI,GAAOA,EAAG,OAAO,kBAAgB,CAAC,GAC7C,KAEIC,EAAqBD,GACzBA,EAAG,OAAO,gBAAc,SAAS,GACjCA,EAAG,OAAO,kBAAgB,GAC1BA,EAAG,OAAO,uBAAqB,GAC/BA,EAAG,OAAO,6BAA2B,GACrCA,EAAG,OAAO,oBAAkB,EAGxBE,EAAkBN,EAAK,OAC1BI,GACC,CAACC,EAAkBD,CAAE,GAAK,CAACA,EAAG,OAAON,CAAK,GAAK,CAACM,EAAG,OAAOL,CAAM,CACpE,EAEMQ,EAAS,CAACC,EAAkBC,OAChC,iCACEV,EACAS,EACA,GACAC,EACA,6BACF,EAGF,GAAIN,GACF,UAAWK,KAASF,EAClB,GAAIC,EAAOC,EAAOL,CAAa,EAAE,OAAOL,CAAK,EAC3C,MAAO,CACL,UAAW,CACT,QAASU,EAAM,SAAS,EACxB,YAAaT,EAAO,SAAS,CAC/B,CACF,EAMN,UAAWS,KAASF,EAAiB,CAEnC,GADiBC,EAAOC,EAAO,kBAAgB,EAClC,OAAOV,CAAK,EACvB,MAAO,CACL,UAAW,CACT,QAASU,EAAM,SAAS,EACxB,YAAaT,EAAO,SAAS,CAC/B,CACF,EAGF,GADYQ,EAAOC,EAAO,uBAAqB,EACvC,OAAOV,CAAK,EAClB,MAAO,CACL,UAAW,CACT,QAASU,EAAM,SAAS,EACxB,YAAaT,EAAO,SAAS,CAC/B,CACF,CAEJ,CACA,OAAO,IACT,CACF,EAGA,CACE,KAAM,CAAC,CAAE,UAAAP,CAAU,IAAMA,EAAU,OAAO,uBAAqB,EAC/D,OAAQ,CAAC,CAAE,YAAAkB,EAAa,UAAAlB,CAAU,IAChCF,EAAK,IAAM,CACT,KAAM,CACJ,KAAM,CAAE,YAAAqB,CAAY,CACtB,KAAI,2CAAwCD,EAAalB,CAAS,EAClE,MAAO,CACL,aAAcmB,EAAY,OAAO,SAAS,CAC5C,CACF,CAAC,CACL,EAGA,CACE,KAAM,CAAC,CAAE,UAAAnB,CAAU,IAAMJ,EAAiBI,CAAS,EACnD,OAAQ,CAAC,CAAE,YAAAkB,EAAa,UAAAlB,CAAU,IAChCF,EAAK,IAAM,CACT,KAAM,CACJ,KAAM,CAAE,YAAAqB,CAAY,CACtB,KAAI,6BAA0BD,EAAalB,CAAS,EACpD,MAAO,CAAE,aAAcmB,EAAY,OAAO,SAAS,CAAE,CACvD,CAAC,CACL,EACA,CACE,KAAM,CAAC,CAAE,UAAAnB,CAAU,IAAMJ,EAAiBI,CAAS,EACnD,OAAQ,CAAC,CAAE,YAAAkB,EAAa,UAAAlB,CAAU,IAChCF,EAAK,IAAM,CACT,KAAM,CACJ,KAAM,CAAE,YAAAqB,CAAY,CACtB,KAAI,oCAAiCD,EAAalB,CAAS,EAC3D,MAAO,CACL,aAAcmB,EAAY,OAAO,SAAS,CAC5C,CACF,CAAC,CACL,EAGA,CACE,KAAM,CAAC,CAAE,UAAAnB,CAAU,IAAMJ,EAAiBI,CAAS,EACnD,OAAQ,CAAC,CAAE,YAAAkB,EAAa,UAAAlB,CAAU,IAChCF,EAAK,IAAM,CACT,KAAM,CACJ,KAAM,CAAE,QAAAsB,EAAS,KAAAC,CAAK,CACxB,KAAI,sCAAmCH,EAAalB,CAAS,EAC7D,MAAO,CACL,UAAW,CACT,QAASoB,EAAQ,OAAO,SAAS,EACjC,YAAaC,EAAK,OAAO,SAAS,CACpC,CACF,CACF,CAAC,CACL,EACA,CACE,KAAM,CAAC,CAAE,UAAArB,CAAU,IAAMJ,EAAiBI,CAAS,EACnD,OAAQ,CAAC,CAAE,YAAAkB,EAAa,UAAAlB,CAAU,IAChCF,EAAK,IAAM,CACT,KAAM,CACJ,KAAM,CAAE,QAAAsB,EAAS,KAAAC,CAAK,CACxB,KAAI,uCAAoCH,EAAalB,CAAS,EAC9D,MAAO,CACL,UAAW,CACT,QAASoB,EAAQ,OAAO,SAAS,EACjC,YAAaC,EAAK,OAAO,SAAS,CACpC,CACF,CACF,CAAC,CACL,EACA,CACE,KAAM,CAAC,CAAE,UAAArB,CAAU,IAAMJ,EAAiBI,CAAS,EACnD,OAAQ,CAAC,CAAE,YAAAkB,EAAa,UAAAlB,CAAU,IAChCF,EAAK,IAAM,CACT,KAAM,CACJ,KAAM,CAAE,QAAAsB,EAAS,KAAAC,CAAK,CACxB,KAAI,uCAAoCH,EAAalB,CAAS,EAC9D,MAAO,CACL,UAAW,CACT,QAASoB,EAAQ,OAAO,SAAS,EACjC,YAAaC,EAAK,OAAO,SAAS,CACpC,CACF,CACF,CAAC,CACL,EACA,CACE,KAAM,CAAC,CAAE,UAAArB,CAAU,IAAMJ,EAAiBI,CAAS,EACnD,OAAQ,CAAC,CAAE,YAAAkB,EAAa,UAAAlB,CAAU,IAChCF,EAAK,IAAM,CACT,KAAM,CACJ,KAAM,CAAE,QAAAsB,CAAQ,CAClB,KAAI,6CAA0CF,EAAalB,CAAS,EACpE,MAAO,CAAE,aAAcoB,EAAQ,OAAO,SAAS,CAAE,CACnD,CAAC,CACL,EAGA,CACE,KAAM,CAAC,CAAE,UAAApB,CAAU,IAAMJ,EAAiBI,CAAS,EACnD,OAAQ,CAAC,CAAE,YAAAkB,EAAa,UAAAlB,CAAU,IAChCF,EAAK,IAAM,CACT,KAAM,CACJ,KAAM,CAAE,QAAAsB,CAAQ,CAClB,KAAI,iCAA8BF,EAAalB,CAAS,EACxD,MAAO,CAAE,aAAcoB,EAAQ,OAAO,SAAS,CAAE,CACnD,CAAC,CACL,EACA,CACE,KAAM,CAAC,CAAE,UAAApB,CAAU,IAAMJ,EAAiBI,CAAS,EACnD,OAAQ,CAAC,CAAE,YAAAkB,EAAa,UAAAlB,CAAU,IAChCF,EAAK,IAAM,CACT,KAAM,CACJ,KAAM,CAAE,QAAAsB,CAAQ,CAClB,KAAI,+BAA4BF,EAAalB,CAAS,EACtD,MAAO,CAAE,aAAcoB,EAAQ,OAAO,SAAS,CAAE,CACnD,CAAC,CACL,EAGA,CACE,KAAM,CAAC,CAAE,UAAApB,CAAU,IAAMJ,EAAiBI,CAAS,EACnD,OAAQ,CAAC,CAAE,YAAAkB,EAAa,UAAAlB,CAAU,IAChCF,EAAK,IAAM,CACT,KAAM,CACJ,KAAM,CAAE,QAAAsB,CAAQ,CAClB,KAAI,gCAA6BF,EAAalB,CAAS,EACvD,MAAO,CACL,aAAcoB,EAAQ,OAAO,SAAS,CACxC,CACF,CAAC,CACL,EACA,CACE,KAAM,CAAC,CAAE,UAAApB,CAAU,IAAMJ,EAAiBI,CAAS,EACnD,OAAQ,CAAC,CAAE,YAAAkB,EAAa,UAAAlB,CAAU,IAChCF,EAAK,IAAM,CACT,KAAM,CACJ,KAAM,CAAE,QAAAsB,CAAQ,CAClB,KAAI,yBAAsBF,EAAalB,CAAS,EAChD,MAAO,CACL,aAAcoB,EAAQ,OAAO,SAAS,CACxC,CACF,CAAC,CACL,EAGA,CACE,KAAM,CAAC,CAAE,UAAApB,CAAU,IAAMJ,EAAiBI,CAAS,EACnD,OAAQ,CAAC,CAAE,YAAAkB,EAAa,UAAAlB,CAAU,IAChCF,EAAK,IAAM,CACT,KAAM,CACJ,KAAM,CAAE,QAAAsB,CAAQ,CAClB,KAAI,kCAA+BF,EAAalB,CAAS,EACzD,MAAO,CACL,aAAcoB,EAAQ,OAAO,SAAS,CACxC,CACF,CAAC,CACL,EACA,CACE,KAAM,CAAC,CAAE,UAAApB,CAAU,IAAMJ,EAAiBI,CAAS,EACnD,OAAQ,CAAC,CAAE,YAAAkB,EAAa,UAAAlB,CAAU,IAChCF,EAAK,IAAM,CACT,KAAM,CACJ,KAAM,CAAE,QAAAsB,CAAQ,CAClB,KAAI,gCAA6BF,EAAalB,CAAS,EACvD,MAAO,CACL,aAAcoB,EAAQ,OAAO,SAAS,CACxC,CACF,CAAC,CACL,EAGA,CACE,KAAM,CAAC,CAAE,UAAApB,CAAU,IACjBA,EAAU,OAAO,6BAA2B,GAC5CA,EAAU,OAAO,kBAAgB,GACjCA,EAAU,OAAO,uBAAqB,EACxC,OAAQ,IAAM,IAChB,CACF",
|
|
6
|
+
"names": ["transactionDecoders_exports", "__export", "DECODERS", "__toCommonJS", "import_spl_token", "import_web3", "isTokenProgramId", "pid", "safe", "fn", "programId", "ixMeta", "message", "indexes", "byIndexes", "n", "ataPk", "mintPk", "accs", "i", "k", "tokenProgInIx", "pk", "isProgramOrSysvar", "ownerCandidates", "derive", "owner", "tokenProg", "instruction", "destination", "account", "mint"]
|
|
7
|
+
}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
"use strict";var s=Object.defineProperty;var c=Object.getOwnPropertyDescriptor;var u=Object.getOwnPropertyNames;var p=Object.prototype.hasOwnProperty;var C=(o,t)=>{for(var e in t)s(o,e,{get:t[e],enumerable:!0})},m=(o,t,e,r)=>{if(t&&typeof t=="object"||typeof t=="function")for(let a of u(t))!p.call(o,a)&&a!==e&&s(o,a,{get:()=>t[a],enumerable:!(r=c(t,a))||r.enumerable});return o};var x=o=>m(s({},"__esModule",{value:!0}),o);var f={};C(f,{BuildTransactionContextTask:()=>R});module.exports=x(f);var l=require("@ledgerhq/device-management-kit"),d=require("../../app-binder/command/GetChallengeCommand");class R{constructor(t,e){this.api=t;this.args=e}async run(){const{contextModule:t,options:e}=this.args,r=this.api.getDeviceSessionState();let a;const i=await this.api.sendCommand(new d.GetChallengeCommand);return(0,l.isSuccessCommandResult)(i)&&(a=i.data.challenge),(await t.getSolanaContext({deviceModelId:r.deviceModelId,tokenAddress:e.tokenAddress,challenge:a,createATA:e.createATA,tokenInternalId:e.tokenInternalId,templateId:e.templateId})).caseOf({Left:n=>{throw n},Right:n=>({tlvDescriptor:n.tlvDescriptor,trustedNamePKICertificate:n.trustedNamePKICertificate,loadersResults:n.loadersResults})})}}0&&(module.exports={BuildTransactionContextTask});
|
|
2
|
+
//# sourceMappingURL=BuildTransactionContextTask.js.map
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../../../src/internal/app-binder/task/BuildTransactionContextTask.ts"],
|
|
4
|
+
"sourcesContent": ["import {\n type ContextModule,\n type PkiCertificate,\n type SolanaContextLoaderResults,\n} from \"@ledgerhq/context-module\";\nimport {\n type InternalApi,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { type TransactionResolutionContext } from \"@api/model/TransactionResolutionContext\";\nimport { GetChallengeCommand } from \"@internal/app-binder/command/GetChallengeCommand\";\n\nexport type SolanaBuildContextResult = {\n trustedNamePKICertificate: PkiCertificate;\n tlvDescriptor: Uint8Array;\n loadersResults: SolanaContextLoaderResults;\n};\n\nexport type BuildTransactionContextTaskArgs = {\n readonly contextModule: ContextModule;\n readonly options: TransactionResolutionContext;\n};\n\nexport class BuildTransactionContextTask {\n constructor(\n private readonly api: InternalApi,\n private readonly args: BuildTransactionContextTaskArgs,\n ) {}\n\n async run(): Promise<SolanaBuildContextResult> {\n const { contextModule, options } = this.args;\n const deviceState = this.api.getDeviceSessionState();\n\n // get challenge\n let challenge: string | undefined;\n const challengeRes = await this.api.sendCommand(new GetChallengeCommand());\n if (isSuccessCommandResult(challengeRes)) {\n challenge = challengeRes.data.challenge;\n }\n\n // get Solana context\n const contextResult = await contextModule.getSolanaContext({\n deviceModelId: deviceState.deviceModelId,\n tokenAddress: options.tokenAddress,\n challenge,\n createATA: options.createATA,\n tokenInternalId: options.tokenInternalId,\n templateId: options.templateId,\n });\n\n return contextResult.caseOf({\n Left: (err) => {\n throw err;\n },\n Right: (ctx) => {\n return {\n tlvDescriptor: ctx.tlvDescriptor,\n trustedNamePKICertificate: ctx.trustedNamePKICertificate,\n loadersResults: ctx.loadersResults,\n };\n },\n });\n }\n}\n"],
|
|
5
|
+
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,iCAAAE,IAAA,eAAAC,EAAAH,GAKA,IAAAI,EAGO,2CAGPC,EAAoC,4DAa7B,MAAMH,CAA4B,CACvC,YACmBI,EACAC,EACjB,CAFiB,SAAAD,EACA,UAAAC,CAChB,CAEH,MAAM,KAAyC,CAC7C,KAAM,CAAE,cAAAC,EAAe,QAAAC,CAAQ,EAAI,KAAK,KAClCC,EAAc,KAAK,IAAI,sBAAsB,EAGnD,IAAIC,EACJ,MAAMC,EAAe,MAAM,KAAK,IAAI,YAAY,IAAI,qBAAqB,EACzE,SAAI,0BAAuBA,CAAY,IACrCD,EAAYC,EAAa,KAAK,YAIV,MAAMJ,EAAc,iBAAiB,CACzD,cAAeE,EAAY,cAC3B,aAAcD,EAAQ,aACtB,UAAAE,EACA,UAAWF,EAAQ,UACnB,gBAAiBA,EAAQ,gBACzB,WAAYA,EAAQ,UACtB,CAAC,GAEoB,OAAO,CAC1B,KAAOI,GAAQ,CACb,MAAMA,CACR,EACA,MAAQC,IACC,CACL,cAAeA,EAAI,cACnB,0BAA2BA,EAAI,0BAC/B,eAAgBA,EAAI,cACtB,EAEJ,CAAC,CACH,CACF",
|
|
6
|
+
"names": ["BuildTransactionContextTask_exports", "__export", "BuildTransactionContextTask", "__toCommonJS", "import_device_management_kit", "import_GetChallengeCommand", "api", "args", "contextModule", "options", "deviceState", "challenge", "challengeRes", "err", "ctx"]
|
|
7
|
+
}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
"use strict";var t=require("@ledgerhq/device-management-kit"),l=require("purify-ts"),e=require("vitest"),i=require("../../app-binder/command/GetChallengeCommand"),r=require("./BuildTransactionContextTask");const o={getSolanaContext:e.vi.fn()},c={contextModule:o,options:{tokenAddress:"someAddress",createATA:void 0}},a={tlvDescriptor:new Uint8Array([1,2,3]),trustedNamePKICertificate:{payload:new Uint8Array([170,187]),keyUsageNumber:1},loadersResults:[]};let n;(0,e.describe)("BuildTransactionContextTask",()=>{(0,e.beforeEach)(()=>{e.vi.resetAllMocks(),n={getDeviceSessionState:e.vi.fn().mockReturnValue({deviceModelId:t.DeviceModelId.NANO_X}),sendCommand:e.vi.fn().mockResolvedValue({status:t.CommandResultStatus.Success,data:{challenge:"someChallenge"}})}}),(0,e.it)("returns context successfully when challenge command succeeds",async()=>{o.getSolanaContext.mockResolvedValue((0,l.Right)(a));const s=await new r.BuildTransactionContextTask(n,c).run();(0,e.expect)(n.sendCommand).toHaveBeenCalledWith(e.expect.any(i.GetChallengeCommand)),(0,e.expect)(o.getSolanaContext).toHaveBeenCalledWith({deviceModelId:t.DeviceModelId.NANO_X,tokenAddress:"someAddress",challenge:"someChallenge",createATA:void 0}),(0,e.expect)(s).toEqual({tlvDescriptor:a.tlvDescriptor,trustedNamePKICertificate:a.trustedNamePKICertificate,loadersResults:[]})}),(0,e.it)("returns context when challenge command fails (challenge undefined)",async()=>{n.sendCommand.mockResolvedValue({status:t.CommandResultStatus.Error,data:{}}),o.getSolanaContext.mockResolvedValue((0,l.Right)(a));const s=await new r.BuildTransactionContextTask(n,c).run();(0,e.expect)(o.getSolanaContext).toHaveBeenCalledWith({deviceModelId:t.DeviceModelId.NANO_X,tokenAddress:"someAddress",challenge:void 0,createATA:void 0}),(0,e.expect)(s).toEqual({tlvDescriptor:a.tlvDescriptor,trustedNamePKICertificate:a.trustedNamePKICertificate,loadersResults:[]})}),(0,e.it)("throws if getSolanaContext returns Left",async()=>{const d=new Error("Solana context failure");o.getSolanaContext.mockResolvedValue((0,l.Left)(d));const s=new r.BuildTransactionContextTask(n,c);await(0,e.expect)(s.run()).rejects.toThrow("Solana context failure")})});
|
|
2
|
+
//# sourceMappingURL=BuildTransactionContextTask.test.js.map
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../../../src/internal/app-binder/task/BuildTransactionContextTask.test.ts"],
|
|
4
|
+
"sourcesContent": ["/* eslint-disable @typescript-eslint/no-unsafe-call */\n/* eslint-disable @typescript-eslint/no-unsafe-member-access */\n/* eslint-disable @typescript-eslint/no-explicit-any */\nimport { type ContextModule } from \"@ledgerhq/context-module\";\nimport {\n CommandResultStatus,\n DeviceModelId,\n type InternalApi,\n} from \"@ledgerhq/device-management-kit\";\nimport { Left, Right } from \"purify-ts\";\nimport { beforeEach, describe, expect, it, vi } from \"vitest\";\n\nimport { GetChallengeCommand } from \"@internal/app-binder/command/GetChallengeCommand\";\n\nimport {\n BuildTransactionContextTask,\n type SolanaBuildContextResult,\n} from \"./BuildTransactionContextTask\";\n\nconst contextModuleMock: ContextModule = {\n getSolanaContext: vi.fn(),\n} as unknown as ContextModule;\n\nconst defaultArgs = {\n contextModule: contextModuleMock,\n options: {\n tokenAddress: \"someAddress\",\n createATA: undefined,\n },\n};\n\nconst solanaContextRightPayload = {\n tlvDescriptor: new Uint8Array([1, 2, 3]),\n trustedNamePKICertificate: {\n payload: new Uint8Array([0xaa, 0xbb]),\n keyUsageNumber: 1,\n },\n loadersResults: [], // required by the task's return type\n} as const;\n\nlet apiMock: InternalApi;\n\ndescribe(\"BuildTransactionContextTask\", () => {\n beforeEach(() => {\n vi.resetAllMocks();\n\n apiMock = {\n getDeviceSessionState: vi\n .fn()\n .mockReturnValue({ deviceModelId: DeviceModelId.NANO_X }),\n sendCommand: vi.fn().mockResolvedValue({\n status: CommandResultStatus.Success,\n data: { challenge: \"someChallenge\" },\n }),\n } as unknown as InternalApi;\n });\n\n it(\"returns context successfully when challenge command succeeds\", async () => {\n (contextModuleMock.getSolanaContext as any).mockResolvedValue(\n Right(solanaContextRightPayload),\n );\n\n const task = new BuildTransactionContextTask(apiMock, defaultArgs);\n const result = await task.run();\n\n // challenge is fetched\n expect(apiMock.sendCommand).toHaveBeenCalledWith(\n expect.any(GetChallengeCommand),\n );\n\n // getSolanaContext called with challenge\n expect(contextModuleMock.getSolanaContext).toHaveBeenCalledWith({\n deviceModelId: DeviceModelId.NANO_X,\n tokenAddress: \"someAddress\",\n challenge: \"someChallenge\",\n createATA: undefined,\n });\n\n // matches SolanaBuildContextResult shape\n expect(result).toEqual<SolanaBuildContextResult>({\n tlvDescriptor: solanaContextRightPayload.tlvDescriptor,\n trustedNamePKICertificate:\n solanaContextRightPayload.trustedNamePKICertificate,\n loadersResults: [],\n });\n });\n\n it(\"returns context when challenge command fails (challenge undefined)\", async () => {\n (apiMock.sendCommand as any).mockResolvedValue({\n status: CommandResultStatus.Error,\n data: {},\n });\n (contextModuleMock.getSolanaContext as any).mockResolvedValue(\n Right(solanaContextRightPayload),\n );\n\n const task = new BuildTransactionContextTask(apiMock, defaultArgs);\n const result = await task.run();\n\n // getSolanaContext called without challenge\n expect(contextModuleMock.getSolanaContext).toHaveBeenCalledWith({\n deviceModelId: DeviceModelId.NANO_X,\n tokenAddress: \"someAddress\",\n challenge: undefined,\n createATA: undefined,\n });\n\n expect(result).toEqual<SolanaBuildContextResult>({\n tlvDescriptor: solanaContextRightPayload.tlvDescriptor,\n trustedNamePKICertificate:\n solanaContextRightPayload.trustedNamePKICertificate,\n loadersResults: [],\n });\n });\n\n it(\"throws if getSolanaContext returns Left\", async () => {\n const error = new Error(\"Solana context failure\");\n (contextModuleMock.getSolanaContext as any).mockResolvedValue(Left(error));\n\n const task = new BuildTransactionContextTask(apiMock, defaultArgs);\n\n await expect(task.run()).rejects.toThrow(\"Solana context failure\");\n });\n});\n"],
|
|
5
|
+
"mappings": "aAIA,IAAAA,EAIO,2CACPC,EAA4B,qBAC5BC,EAAqD,kBAErDC,EAAoC,4DAEpCC,EAGO,yCAEP,MAAMC,EAAmC,CACvC,iBAAkB,KAAG,GAAG,CAC1B,EAEMC,EAAc,CAClB,cAAeD,EACf,QAAS,CACP,aAAc,cACd,UAAW,MACb,CACF,EAEME,EAA4B,CAChC,cAAe,IAAI,WAAW,CAAC,EAAG,EAAG,CAAC,CAAC,EACvC,0BAA2B,CACzB,QAAS,IAAI,WAAW,CAAC,IAAM,GAAI,CAAC,EACpC,eAAgB,CAClB,EACA,eAAgB,CAAC,CACnB,EAEA,IAAIC,KAEJ,YAAS,8BAA+B,IAAM,IAC5C,cAAW,IAAM,CACf,KAAG,cAAc,EAEjBA,EAAU,CACR,sBAAuB,KACpB,GAAG,EACH,gBAAgB,CAAE,cAAe,gBAAc,MAAO,CAAC,EAC1D,YAAa,KAAG,GAAG,EAAE,kBAAkB,CACrC,OAAQ,sBAAoB,QAC5B,KAAM,CAAE,UAAW,eAAgB,CACrC,CAAC,CACH,CACF,CAAC,KAED,MAAG,+DAAgE,SAAY,CAC5EH,EAAkB,iBAAyB,qBAC1C,SAAME,CAAyB,CACjC,EAGA,MAAME,EAAS,MADF,IAAI,8BAA4BD,EAASF,CAAW,EACvC,IAAI,KAG9B,UAAOE,EAAQ,WAAW,EAAE,qBAC1B,SAAO,IAAI,qBAAmB,CAChC,KAGA,UAAOH,EAAkB,gBAAgB,EAAE,qBAAqB,CAC9D,cAAe,gBAAc,OAC7B,aAAc,cACd,UAAW,gBACX,UAAW,MACb,CAAC,KAGD,UAAOI,CAAM,EAAE,QAAkC,CAC/C,cAAeF,EAA0B,cACzC,0BACEA,EAA0B,0BAC5B,eAAgB,CAAC,CACnB,CAAC,CACH,CAAC,KAED,MAAG,qEAAsE,SAAY,CAClFC,EAAQ,YAAoB,kBAAkB,CAC7C,OAAQ,sBAAoB,MAC5B,KAAM,CAAC,CACT,CAAC,EACAH,EAAkB,iBAAyB,qBAC1C,SAAME,CAAyB,CACjC,EAGA,MAAME,EAAS,MADF,IAAI,8BAA4BD,EAASF,CAAW,EACvC,IAAI,KAG9B,UAAOD,EAAkB,gBAAgB,EAAE,qBAAqB,CAC9D,cAAe,gBAAc,OAC7B,aAAc,cACd,UAAW,OACX,UAAW,MACb,CAAC,KAED,UAAOI,CAAM,EAAE,QAAkC,CAC/C,cAAeF,EAA0B,cACzC,0BACEA,EAA0B,0BAC5B,eAAgB,CAAC,CACnB,CAAC,CACH,CAAC,KAED,MAAG,0CAA2C,SAAY,CACxD,MAAMG,EAAQ,IAAI,MAAM,wBAAwB,EAC/CL,EAAkB,iBAAyB,qBAAkB,QAAKK,CAAK,CAAC,EAEzE,MAAMC,EAAO,IAAI,8BAA4BH,EAASF,CAAW,EAEjE,QAAM,UAAOK,EAAK,IAAI,CAAC,EAAE,QAAQ,QAAQ,wBAAwB,CACnE,CAAC,CACH,CAAC",
|
|
6
|
+
"names": ["import_device_management_kit", "import_purify_ts", "import_vitest", "import_GetChallengeCommand", "import_BuildTransactionContextTask", "contextModuleMock", "defaultArgs", "solanaContextRightPayload", "apiMock", "result", "error", "task"]
|
|
7
|
+
}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
"use strict";var m=Object.defineProperty;var x=Object.getOwnPropertyDescriptor;var k=Object.getOwnPropertyNames;var w=Object.prototype.hasOwnProperty;var T=(r,e)=>{for(var t in e)m(r,t,{get:e[t],enumerable:!0})},v=(r,e,t,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let o of k(e))!w.call(r,o)&&o!==t&&m(r,o,{get:()=>e[o],enumerable:!(a=x(e,o))||a.enumerable});return r};var M=r=>v(m({},"__esModule",{value:!0}),r);var I={};T(I,{ProvideSolanaTransactionContextTask:()=>A,SWAP_MODE:()=>g});module.exports=M(I);var i=require("@ledgerhq/context-module"),n=require("@ledgerhq/device-management-kit"),f=require("purify-ts"),l=require("../../app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand"),y=require("../../app-binder/command/ProvideTLVDescriptorCommand"),S=require("../../app-binder/services/utils/DefaultSolanaMessageNormaliser");const g="test";class A{constructor(e,t,a=S.DefaultSolanaMessageNormaliser){this.api=e;this.context=t;this.normaliser=a}async run(){const{tlvDescriptor:e,trustedNamePKICertificate:t,loadersResults:a,transactionBytes:o}=this.context;await this.api.sendCommand(new n.LoadCertificateCommand({certificate:t.payload,keyUsage:t.keyUsageNumber})),await this.api.sendCommand(new y.ProvideTLVDescriptorCommand({payload:e}));for(const d of a)switch(d.type){case i.SolanaContextTypes.SOLANA_TOKEN:{const s=a.find(c=>c.type===i.SolanaContextTypes.SOLANA_TOKEN);s&&await this.provideTokenMetadataContext(s);break}case i.SolanaContextTypes.SOLANA_LIFI:{const s=a.find(c=>c.type===i.SolanaContextTypes.SOLANA_LIFI);s&&await this.provideSwapContext(s,o);break}case i.SolanaContextTypes.ERROR:break;default:break}return f.Nothing}async provideTokenMetadataContext(e){const{payload:t,certificate:a}=e;if(t&&a){const o=await this.api.sendCommand(new n.LoadCertificateCommand({certificate:a.payload,keyUsage:a.keyUsageNumber}));if(!(0,n.isSuccessCommandResult)(o))throw new Error("[SignerSolana] ProvideSolanaTransactionContextTask: Failed to send tokenMetadataCertificate to device, latest firmware version required");await this.api.sendCommand(new l.ProvideTLVTransactionInstructionDescriptorCommand({kind:"descriptor",dataHex:t.solanaTokenDescriptor.data,signatureHex:t.solanaTokenDescriptor.signature,isFirstMessage:!0,swapSignatureTag:!1}))}}async provideSwapContext(e,t){const a=e.payload;if(a){const o=await this.normaliser.normaliseMessage(t);for(const[d,s]of o.compiledInstructions.entries()){const u=o.allKeys[s.programIdIndex]?.toBase58(),p=u?a[u]:void 0,C=p&&p.signatures[g];p&&C?await this.api.sendCommand(new l.ProvideTLVTransactionInstructionDescriptorCommand({kind:"descriptor",dataHex:p.data,signatureHex:C,isFirstMessage:d===0,swapSignatureTag:!0})):await this.api.sendCommand(new l.ProvideTLVTransactionInstructionDescriptorCommand({kind:"empty",isFirstMessage:d===0,swapSignatureTag:!0}))}}}}0&&(module.exports={ProvideSolanaTransactionContextTask,SWAP_MODE});
|
|
2
|
+
//# sourceMappingURL=ProvideTransactionContextTask.js.map
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../../../src/internal/app-binder/task/ProvideTransactionContextTask.ts"],
|
|
4
|
+
"sourcesContent": ["import {\n SolanaContextTypes,\n type SolanaLifiContextSuccess,\n type SolanaTokenContextSuccess,\n} from \"@ledgerhq/context-module\";\nimport {\n type CommandErrorResult,\n type InternalApi,\n isSuccessCommandResult,\n LoadCertificateCommand,\n} from \"@ledgerhq/device-management-kit\";\nimport { type Maybe, Nothing } from \"purify-ts\";\n\nimport { ProvideTLVTransactionInstructionDescriptorCommand } from \"@internal/app-binder//command/ProvideTLVTransactionInstructionDescriptorCommand\";\nimport { ProvideTLVDescriptorCommand } from \"@internal/app-binder/command/ProvideTLVDescriptorCommand\";\nimport { type SolanaAppErrorCodes } from \"@internal/app-binder/command/utils/SolanaApplicationErrors\";\nimport {\n DefaultSolanaMessageNormaliser,\n type SolanaMessageNormaliserConstructor,\n} from \"@internal/app-binder/services/utils/DefaultSolanaMessageNormaliser\";\n\nimport { type SolanaBuildContextResult } from \"./BuildTransactionContextTask\";\n\nexport const SWAP_MODE = \"test\";\n\nexport type ProvideSolanaTransactionContextTaskContext =\n SolanaBuildContextResult & {\n transactionBytes: Uint8Array;\n };\n\nexport class ProvideSolanaTransactionContextTask {\n constructor(\n private readonly api: InternalApi,\n private readonly context: ProvideSolanaTransactionContextTaskContext,\n private readonly normaliser: SolanaMessageNormaliserConstructor = DefaultSolanaMessageNormaliser,\n ) {}\n\n async run(): Promise<Maybe<CommandErrorResult<SolanaAppErrorCodes>>> {\n const {\n tlvDescriptor,\n trustedNamePKICertificate,\n loadersResults,\n transactionBytes,\n } = this.context;\n\n // --------------------------------------------------------------------\n // providing default solana context\n\n // send PKI certificate + signature\n await this.api.sendCommand(\n new LoadCertificateCommand({\n certificate: trustedNamePKICertificate.payload,\n keyUsage: trustedNamePKICertificate.keyUsageNumber,\n }),\n );\n\n // send signed descriptor\n await this.api.sendCommand(\n new ProvideTLVDescriptorCommand({ payload: tlvDescriptor }),\n );\n\n // --------------------------------------------------------------------\n // providing optional solana context via context module loaders results\n\n for (const loaderResult of loadersResults) {\n switch (loaderResult.type) {\n // always resolve SOLANA_TOKEN first\n case SolanaContextTypes.SOLANA_TOKEN: {\n const tokenMetadataResult = loadersResults.find(\n (res) => res.type === SolanaContextTypes.SOLANA_TOKEN,\n );\n if (tokenMetadataResult) {\n await this.provideTokenMetadataContext(tokenMetadataResult);\n }\n break;\n }\n\n case SolanaContextTypes.SOLANA_LIFI: {\n const lifiDescriptorListResult = loadersResults.find(\n (res) => res.type === SolanaContextTypes.SOLANA_LIFI,\n );\n if (lifiDescriptorListResult) {\n await this.provideSwapContext(\n lifiDescriptorListResult,\n transactionBytes,\n );\n }\n break;\n }\n\n case SolanaContextTypes.ERROR: {\n break;\n }\n\n default: {\n break;\n }\n }\n }\n\n return Nothing;\n }\n\n private async provideTokenMetadataContext(\n tokenMetadataResult: SolanaTokenContextSuccess,\n ): Promise<void> {\n const {\n payload: tokenMetadataPayload,\n certificate: tokenMetadataCertificate,\n } = tokenMetadataResult;\n\n if (tokenMetadataPayload && tokenMetadataCertificate) {\n // send token metadata certificate\n const tokenMetadataCertificateToDeviceResult = await this.api.sendCommand(\n new LoadCertificateCommand({\n certificate: tokenMetadataCertificate.payload,\n keyUsage: tokenMetadataCertificate.keyUsageNumber,\n }),\n );\n if (!isSuccessCommandResult(tokenMetadataCertificateToDeviceResult)) {\n // IMPORTANT, TO BE MAPPED TO LatestFirmwareVersionRequired(\"LatestFirmwareVersionRequired\") ERROR\n throw new Error(\n \"[SignerSolana] ProvideSolanaTransactionContextTask: Failed to send tokenMetadataCertificate to device, latest firmware version required\",\n );\n }\n\n // send token metadata signed descriptor\n await this.api.sendCommand(\n new ProvideTLVTransactionInstructionDescriptorCommand({\n kind: \"descriptor\",\n dataHex: tokenMetadataPayload.solanaTokenDescriptor.data,\n signatureHex: tokenMetadataPayload.solanaTokenDescriptor.signature,\n // token metadata is a single chunk, so this is always the first message\n isFirstMessage: true,\n swapSignatureTag: false,\n }),\n );\n }\n }\n\n private async provideSwapContext(\n lifiDescriptorListResult: SolanaLifiContextSuccess,\n transactionBytes: Uint8Array,\n ): Promise<void> {\n const lifiDescriptors = lifiDescriptorListResult.payload;\n\n if (lifiDescriptors) {\n const message = await this.normaliser.normaliseMessage(transactionBytes);\n\n for (const [\n index,\n instruction,\n ] of message.compiledInstructions.entries()) {\n const programId = message.allKeys[instruction.programIdIndex];\n const programIdStr = programId?.toBase58();\n const descriptor = programIdStr\n ? lifiDescriptors[programIdStr]\n : undefined;\n\n const sigHex = descriptor && descriptor.signatures[SWAP_MODE];\n\n if (descriptor && sigHex) {\n await this.api.sendCommand(\n new ProvideTLVTransactionInstructionDescriptorCommand({\n kind: \"descriptor\",\n dataHex: descriptor.data,\n signatureHex: sigHex,\n isFirstMessage: index === 0,\n swapSignatureTag: true,\n }),\n );\n } else {\n await this.api.sendCommand(\n new ProvideTLVTransactionInstructionDescriptorCommand({\n kind: \"empty\",\n isFirstMessage: index === 0,\n swapSignatureTag: true,\n }),\n );\n }\n }\n }\n }\n}\n"],
|
|
5
|
+
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,yCAAAE,EAAA,cAAAC,IAAA,eAAAC,EAAAJ,GAAA,IAAAK,EAIO,oCACPC,EAKO,2CACPC,EAAoC,qBAEpCC,EAAkE,2FAClEC,EAA4C,oEAE5CC,EAGO,8EAIA,MAAMP,EAAY,OAOlB,MAAMD,CAAoC,CAC/C,YACmBS,EACAC,EACAC,EAAiD,iCAClE,CAHiB,SAAAF,EACA,aAAAC,EACA,gBAAAC,CAChB,CAEH,MAAM,KAA+D,CACnE,KAAM,CACJ,cAAAC,EACA,0BAAAC,EACA,eAAAC,EACA,iBAAAC,CACF,EAAI,KAAK,QAMT,MAAM,KAAK,IAAI,YACb,IAAI,yBAAuB,CACzB,YAAaF,EAA0B,QACvC,SAAUA,EAA0B,cACtC,CAAC,CACH,EAGA,MAAM,KAAK,IAAI,YACb,IAAI,8BAA4B,CAAE,QAASD,CAAc,CAAC,CAC5D,EAKA,UAAWI,KAAgBF,EACzB,OAAQE,EAAa,KAAM,CAEzB,KAAK,qBAAmB,aAAc,CACpC,MAAMC,EAAsBH,EAAe,KACxCI,GAAQA,EAAI,OAAS,qBAAmB,YAC3C,EACID,GACF,MAAM,KAAK,4BAA4BA,CAAmB,EAE5D,KACF,CAEA,KAAK,qBAAmB,YAAa,CACnC,MAAME,EAA2BL,EAAe,KAC7CI,GAAQA,EAAI,OAAS,qBAAmB,WAC3C,EACIC,GACF,MAAM,KAAK,mBACTA,EACAJ,CACF,EAEF,KACF,CAEA,KAAK,qBAAmB,MACtB,MAGF,QACE,KAEJ,CAGF,OAAO,SACT,CAEA,MAAc,4BACZE,EACe,CACf,KAAM,CACJ,QAASG,EACT,YAAaC,CACf,EAAIJ,EAEJ,GAAIG,GAAwBC,EAA0B,CAEpD,MAAMC,EAAyC,MAAM,KAAK,IAAI,YAC5D,IAAI,yBAAuB,CACzB,YAAaD,EAAyB,QACtC,SAAUA,EAAyB,cACrC,CAAC,CACH,EACA,GAAI,IAAC,0BAAuBC,CAAsC,EAEhE,MAAM,IAAI,MACR,yIACF,EAIF,MAAM,KAAK,IAAI,YACb,IAAI,oDAAkD,CACpD,KAAM,aACN,QAASF,EAAqB,sBAAsB,KACpD,aAAcA,EAAqB,sBAAsB,UAEzD,eAAgB,GAChB,iBAAkB,EACpB,CAAC,CACH,CACF,CACF,CAEA,MAAc,mBACZD,EACAJ,EACe,CACf,MAAMQ,EAAkBJ,EAAyB,QAEjD,GAAII,EAAiB,CACnB,MAAMC,EAAU,MAAM,KAAK,WAAW,iBAAiBT,CAAgB,EAEvE,SAAW,CACTU,EACAC,CACF,IAAKF,EAAQ,qBAAqB,QAAQ,EAAG,CAE3C,MAAMG,EADYH,EAAQ,QAAQE,EAAY,cAAc,GAC5B,SAAS,EACnCE,EAAaD,EACfJ,EAAgBI,CAAY,EAC5B,OAEEE,EAASD,GAAcA,EAAW,WAAW3B,CAAS,EAExD2B,GAAcC,EAChB,MAAM,KAAK,IAAI,YACb,IAAI,oDAAkD,CACpD,KAAM,aACN,QAASD,EAAW,KACpB,aAAcC,EACd,eAAgBJ,IAAU,EAC1B,iBAAkB,EACpB,CAAC,CACH,EAEA,MAAM,KAAK,IAAI,YACb,IAAI,oDAAkD,CACpD,KAAM,QACN,eAAgBA,IAAU,EAC1B,iBAAkB,EACpB,CAAC,CACH,CAEJ,CACF,CACF,CACF",
|
|
6
|
+
"names": ["ProvideTransactionContextTask_exports", "__export", "ProvideSolanaTransactionContextTask", "SWAP_MODE", "__toCommonJS", "import_context_module", "import_device_management_kit", "import_purify_ts", "import_ProvideTLVTransactionInstructionDescriptorCommand", "import_ProvideTLVDescriptorCommand", "import_DefaultSolanaMessageNormaliser", "api", "context", "normaliser", "tlvDescriptor", "trustedNamePKICertificate", "loadersResults", "transactionBytes", "loaderResult", "tokenMetadataResult", "res", "lifiDescriptorListResult", "tokenMetadataPayload", "tokenMetadataCertificate", "tokenMetadataCertificateToDeviceResult", "lifiDescriptors", "message", "index", "instruction", "programIdStr", "descriptor", "sigHex"]
|
|
7
|
+
}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
"use strict";var G=Object.create;var U=Object.defineProperty;var j=Object.getOwnPropertyDescriptor;var W=Object.getOwnPropertyNames;var Y=Object.getPrototypeOf,X=Object.prototype.hasOwnProperty;var z=(a,s,l,m)=>{if(s&&typeof s=="object"||typeof s=="function")for(let u of W(s))!X.call(a,u)&&u!==l&&U(a,u,{get:()=>s[u],enumerable:!(m=j(s,u))||m.enumerable});return a};var J=(a,s,l)=>(l=a!=null?G(Y(a)):{},z(s||!a||!a.__esModule?U(l,"default",{value:a,enumerable:!0}):l,a));var k=require("@ledgerhq/context-module"),v=require("@ledgerhq/device-management-kit"),f=require("@solana/spl-token"),n=require("@solana/web3.js"),h=J(require("bs58")),H=require("buffer"),I=require("purify-ts"),e=require("vitest"),M=require("../../app-binder/command/ProvideTLVDescriptorCommand"),O=require("../../app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand"),E=require("../../app-binder/services/utils/DefaultSolanaMessageNormaliser"),d=require("./ProvideTransactionContextTask");const q=h.default.encode(new Uint8Array(32).fill(170));function Q(a,s,l){const m=l??s[0]??n.Keypair.generate(),u=new n.Transaction;u.recentBlockhash=q,u.feePayer=m.publicKey,u.add(...a);const B=new Set,i=[m,...s].filter(t=>{const r=t.publicKey.toBase58();return B.has(r)?!1:(B.add(r),!0)});return u.sign(...i),{raw:u.serialize(),payer:m}}function F(a,s,l){const m=l??s[0]??n.Keypair.generate(),u=new n.TransactionMessage({payerKey:m.publicKey,recentBlockhash:q,instructions:a}).compileToV0Message(),B=new n.VersionedTransaction(u);return B.sign([m,...s]),{raw:B.serialize(),payer:m}}const S=a=>({toBase58:()=>a}),D=a=>({normaliseMessage:e.vi.fn(async()=>a)});(0,e.describe)("ProvideSolanaTransactionContextTask (merged)",()=>{let a;const s=(0,v.CommandResultFactory)({data:void 0}),l={payload:new Uint8Array([240,202,204,26]),keyUsageNumber:1},m=new Uint8Array([170,187,204]),u={payload:new Uint8Array([240,202,204,26]),keyUsageNumber:2},B={data:"f0cacc1a",signature:"01020304"},i="f0cacc1a";(0,e.beforeEach)(()=>{e.vi.resetAllMocks(),a={sendCommand:e.vi.fn()}}),(0,e.describe)("basic context",()=>{(0,e.it)("sends PKI certificate then TLV descriptor and returns Nothing (no loaders results)",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s);const t={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:[],transactionBytes:new Uint8Array([240])},p=await new d.ProvideSolanaTransactionContextTask(a,t).run();(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(2);const c=a.sendCommand.mock.calls[0][0];(0,e.expect)(c).toBeInstanceOf(v.LoadCertificateCommand),(0,e.expect)(c.args.certificate).toStrictEqual(l.payload),(0,e.expect)(c.args.keyUsage).toBe(l.keyUsageNumber);const y=a.sendCommand.mock.calls[1][0];(0,e.expect)(y).toBeInstanceOf(M.ProvideTLVDescriptorCommand),(0,e.expect)(y.args.payload).toStrictEqual(m),(0,e.expect)(p).toStrictEqual(I.Nothing)}),(0,e.it)("propagates a rejection thrown by InternalApi.sendCommand",async()=>{a.sendCommand.mockRejectedValueOnce(new Error("oupsy"));const t={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:[],transactionBytes:new Uint8Array([202])},r=new d.ProvideSolanaTransactionContextTask(a,t);await(0,e.expect)(r.run()).rejects.toThrow("oupsy"),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(1)}),(0,e.it)("ignores SolanaContextTypes.ERROR entries (no extra APDUs beyond base context)",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s);const t=[{type:k.SolanaContextTypes.ERROR,error:{message:"err"}}],r={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:t,transactionBytes:new Uint8Array([26])},c=await new d.ProvideSolanaTransactionContextTask(a,r).run();(0,e.expect)(c).toStrictEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(2),(0,e.expect)(a.sendCommand.mock.calls[0][0]).toBeInstanceOf(v.LoadCertificateCommand),(0,e.expect)(a.sendCommand.mock.calls[1][0]).toBeInstanceOf(M.ProvideTLVDescriptorCommand)})}),(0,e.describe)("basic context + token",()=>{(0,e.it)("when token metadata present, sends token certificate then TLV transaction-instruction descriptor",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s);const t=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u}],r={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:t,transactionBytes:new Uint8Array([26])},c=await new d.ProvideSolanaTransactionContextTask(a,r).run();(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(4);const y=a.sendCommand.mock.calls[2][0];(0,e.expect)(y).toBeInstanceOf(v.LoadCertificateCommand),(0,e.expect)(y.args.certificate).toStrictEqual(u.payload),(0,e.expect)(y.args.keyUsage).toBe(u.keyUsageNumber);const g=a.sendCommand.mock.calls[3][0];(0,e.expect)(g).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(g.args.kind).toBe("descriptor"),(0,e.expect)(g.args.dataHex).toBe(B.data),(0,e.expect)(g.args.signatureHex).toBe(B.signature),(0,e.expect)(g.args.isFirstMessage).toBe(!0),(0,e.expect)(g.args.swapSignatureTag).toBe(!1),(0,e.expect)(c).toStrictEqual(I.Nothing)}),(0,e.it)("does not send token commands if token payload is missing",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s);const t=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:void 0,certificate:u}],r={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:t,transactionBytes:new Uint8Array([240])},c=await new d.ProvideSolanaTransactionContextTask(a,r).run();(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(2),(0,e.expect)(c).toStrictEqual(I.Nothing)}),(0,e.it)("does not send token commands if token certificate is missing",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s);const t=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:void 0}],r={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:t,transactionBytes:new Uint8Array([202])},c=await new d.ProvideSolanaTransactionContextTask(a,r).run();(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(2),(0,e.expect)(c).toStrictEqual(I.Nothing)}),(0,e.it)("throws a mapped error when sending token certificate returns a CommandErrorResult",async()=>{const t=(0,v.CommandResultFactory)({error:{_tag:"SomeError",errorCode:27264,message:"bad"}});a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(t);const r=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u}],p={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:r,transactionBytes:new Uint8Array([204])},c=new d.ProvideSolanaTransactionContextTask(a,p);await(0,e.expect)(c.run()).rejects.toThrow("[SignerSolana] ProvideSolanaTransactionContextTask: Failed to send tokenMetadataCertificate to device, latest firmware version required"),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(3);const y=a.sendCommand.mock.calls[2][0];(0,e.expect)(y).toBeInstanceOf(v.LoadCertificateCommand)}),(0,e.it)("does not send swap APDUs when SOLANA_LIFI context is missing (token present)",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s);const t=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u}],r={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:t,transactionBytes:new Uint8Array([26])},c=await new d.ProvideSolanaTransactionContextTask(a,r,{normaliseMessage:e.vi.fn()}).run();(0,e.expect)(c).toStrictEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(4),(0,e.expect)(a.sendCommand.mock.calls[0][0]).toBeInstanceOf(v.LoadCertificateCommand),(0,e.expect)(a.sendCommand.mock.calls[1][0]).toBeInstanceOf(M.ProvideTLVDescriptorCommand),(0,e.expect)(a.sendCommand.mock.calls[2][0]).toBeInstanceOf(v.LoadCertificateCommand);const y=a.sendCommand.mock.calls[3][0];(0,e.expect)(y).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(y.args.swapSignatureTag).toBe(!1),(0,e.expect)(y.args.isFirstMessage).toBe(!0)})}),(0,e.describe)("basic context + token + lifi",()=>{(0,e.it)("sends one APDU per instruction in order (descriptor/empty/descriptor) after base + token are sent",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValue(s);const t={compiledInstructions:[{programIdIndex:0},{programIdIndex:1},{programIdIndex:2}],allKeys:[S("A_PID"),S("B_PID"),S("C_PID")]},r=D(t),p=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u},{type:k.SolanaContextTypes.SOLANA_LIFI,payload:{A_PID:{data:i,signatures:{[d.SWAP_MODE]:i}},C_PID:{data:i,signatures:{[d.SWAP_MODE]:i}}}}],c={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:p,transactionBytes:new Uint8Array([240])},g=await new d.ProvideSolanaTransactionContextTask(a,c,r).run();(0,e.expect)(g).toStrictEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(7);const o=a.sendCommand.mock.calls[4][0];(0,e.expect)(o).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(o.args.kind).toBe("descriptor"),(0,e.expect)(o.args.dataHex).toBe(i),(0,e.expect)(o.args.signatureHex).toBe(i),(0,e.expect)(o.args.isFirstMessage).toBe(!0),(0,e.expect)(o.args.swapSignatureTag).toBe(!0);const T=a.sendCommand.mock.calls[5][0];(0,e.expect)(T).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(T.args.kind).toBe("empty"),(0,e.expect)(T.args.isFirstMessage).toBe(!1),(0,e.expect)(T.args.swapSignatureTag).toBe(!0);const A=a.sendCommand.mock.calls[6][0];(0,e.expect)(A).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(A.args.kind).toBe("descriptor"),(0,e.expect)(A.args.dataHex).toBe(i),(0,e.expect)(A.args.signatureHex).toBe(i),(0,e.expect)(A.args.isFirstMessage).toBe(!1),(0,e.expect)(A.args.swapSignatureTag).toBe(!0),(0,e.expect)(r.normaliseMessage).toHaveBeenCalledOnce()}),(0,e.it)("sends empty when descriptor exists but signatures[SWAP_MODE] is missing",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValue(s);const t={compiledInstructions:[{programIdIndex:0}],allKeys:[S("ONLY_PID")]},r=D(t),p=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u},{type:k.SolanaContextTypes.SOLANA_LIFI,payload:{ONLY_PID:{data:i,signatures:{}}}}],c={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:p,transactionBytes:new Uint8Array([202])},g=await new d.ProvideSolanaTransactionContextTask(a,c,r).run();(0,e.expect)(g).toStrictEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(5);const o=a.sendCommand.mock.calls[4][0];(0,e.expect)(o).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(o.args.kind).toBe("empty"),(0,e.expect)(o.args.isFirstMessage).toBe(!0),(0,e.expect)(o.args.swapSignatureTag).toBe(!0)}),(0,e.it)("sends empty when programId is missing for an instruction",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValue(s);const t={compiledInstructions:[{programIdIndex:5}],allKeys:[S("X")]},r=D(t),p=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u},{type:k.SolanaContextTypes.SOLANA_LIFI,payload:{}}],c={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:p,transactionBytes:new Uint8Array([204])},g=await new d.ProvideSolanaTransactionContextTask(a,c,r).run();(0,e.expect)(g).toStrictEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(5);const o=a.sendCommand.mock.calls[4][0];(0,e.expect)(o).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(o.args.kind).toBe("empty"),(0,e.expect)(o.args.isFirstMessage).toBe(!0),(0,e.expect)(o.args.swapSignatureTag).toBe(!0)}),(0,e.it)("propagates a rejection thrown by InternalApi.sendCommand on the second swap APDU (after base + token succeed)",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockRejectedValueOnce(new Error("err"));const t={compiledInstructions:[{programIdIndex:0},{programIdIndex:1},{programIdIndex:2}],allKeys:[S("A_PID"),S("B_PID"),S("C_PID")]},r=D(t),p=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u},{type:k.SolanaContextTypes.SOLANA_LIFI,payload:{A_PID:{data:i,signatures:{[d.SWAP_MODE]:i}},C_PID:{data:i,signatures:{[d.SWAP_MODE]:i}}}}],c={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:p,transactionBytes:new Uint8Array([26])},y=new d.ProvideSolanaTransactionContextTask(a,c,r);await(0,e.expect)(y.run()).rejects.toThrow("err"),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(6);const g=a.sendCommand.mock.calls[4][0];(0,e.expect)(g).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(g.args.kind).toBe("descriptor"),(0,e.expect)(g.args.isFirstMessage).toBe(!0),(0,e.expect)(g.args.swapSignatureTag).toBe(!0);const o=a.sendCommand.mock.calls[5][0];(0,e.expect)(o).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(o.args.kind).toBe("empty"),(0,e.expect)(o.args.isFirstMessage).toBe(!1),(0,e.expect)(o.args.swapSignatureTag).toBe(!0)}),(0,e.it)("uses signatures[SWAP_MODE] specifically when present",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValue(s);const t={compiledInstructions:[{programIdIndex:0}],allKeys:[S("SIG_PID")]},r=D(t),p=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u},{type:k.SolanaContextTypes.SOLANA_LIFI,payload:{SIG_PID:{data:i,signatures:{prod:"deadbeef",[d.SWAP_MODE]:i}}}}],c={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:p,transactionBytes:new Uint8Array([240])},g=await new d.ProvideSolanaTransactionContextTask(a,c,r).run();(0,e.expect)(g).toStrictEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(5);const o=a.sendCommand.mock.calls[4][0];(0,e.expect)(o).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(o.args.kind).toBe("descriptor"),(0,e.expect)(o.args.dataHex).toBe(i),(0,e.expect)(o.args.signatureHex).toBe(i),(0,e.expect)(o.args.isFirstMessage).toBe(!0),(0,e.expect)(o.args.swapSignatureTag).toBe(!0)}),(0,e.it)("parses a real *legacy* tx via DefaultSolanaMessageNormaliser and preserves APDU order (descriptor, empty, descriptor) after base + token",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValue(s);const t=n.Keypair.generate(),r=n.Keypair.generate().publicKey,p=n.SystemProgram.transfer({fromPubkey:t.publicKey,toPubkey:r,lamports:1234}),c=n.Keypair.generate(),y=n.Keypair.generate().publicKey,g=n.Keypair.generate().publicKey,o=(0,f.createTransferInstruction)(y,g,c.publicKey,42n,[],f.TOKEN_PROGRAM_ID),T=new n.PublicKey("MemoSq4gqABAXKb96qnH8TysNcWxMyWCqXgDLGmfcHr"),A=new n.TransactionInstruction({programId:T,keys:[],data:H.Buffer.from("hi")}),{raw:x}=Q([p,o,A],[t,c],t),V=n.SystemProgram.programId.toBase58(),K=T.toBase58(),N=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u},{type:k.SolanaContextTypes.SOLANA_LIFI,payload:{[V]:{data:i,signatures:{[d.SWAP_MODE]:i}},[K]:{data:i,signatures:{[d.SWAP_MODE]:i}}}}],P={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:N,transactionBytes:x},_=await new d.ProvideSolanaTransactionContextTask(a,P,E.DefaultSolanaMessageNormaliser).run();(0,e.expect)(_).toStrictEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(7);const R=a.sendCommand.mock.calls[4][0];(0,e.expect)(R.args.kind).toBe("descriptor"),(0,e.expect)(R.args.isFirstMessage).toBe(!0),(0,e.expect)(R.args.swapSignatureTag).toBe(!0);const C=a.sendCommand.mock.calls[5][0];(0,e.expect)(C.args.kind).toBe("empty"),(0,e.expect)(C.args.isFirstMessage).toBe(!1),(0,e.expect)(C.args.swapSignatureTag).toBe(!0);const w=a.sendCommand.mock.calls[6][0];(0,e.expect)(w.args.kind).toBe("descriptor"),(0,e.expect)(w.args.isFirstMessage).toBe(!1),(0,e.expect)(w.args.swapSignatureTag).toBe(!0)}),(0,e.it)("parses a real *v0* tx via DefaultSolanaMessageNormaliser (no ALTs) and preserves APDU order (descriptor, descriptor, empty) after base + token",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValue(s);const t=n.Keypair.generate(),r=n.Keypair.generate().publicKey,p=n.SystemProgram.transfer({fromPubkey:t.publicKey,toPubkey:r,lamports:5678}),c=n.Keypair.generate().publicKey,y=n.Keypair.generate().publicKey,g=(0,f.getAssociatedTokenAddressSync)(y,c,!0,f.TOKEN_PROGRAM_ID,f.ASSOCIATED_TOKEN_PROGRAM_ID),o=(0,f.createAssociatedTokenAccountInstruction)(t.publicKey,g,c,y,f.TOKEN_PROGRAM_ID,f.ASSOCIATED_TOKEN_PROGRAM_ID),T=new n.PublicKey("MemoSq4gqABAXKb96qnH8TysNcWxMyWCqXgDLGmfcHr"),A=new n.TransactionInstruction({programId:T,keys:[],data:H.Buffer.from("hello")}),{raw:x}=F([p,o,A],[],t),V=n.SystemProgram.programId.toBase58(),K=f.ASSOCIATED_TOKEN_PROGRAM_ID.toBase58(),N=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u},{type:k.SolanaContextTypes.SOLANA_LIFI,payload:{[V]:{data:i,signatures:{[d.SWAP_MODE]:i}},[K]:{data:i,signatures:{[d.SWAP_MODE]:i}}}}],P={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:N,transactionBytes:x},_=await new d.ProvideSolanaTransactionContextTask(a,P,E.DefaultSolanaMessageNormaliser).run();(0,e.expect)(_).toEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(7);const R=a.sendCommand.mock.calls[4][0];(0,e.expect)(R).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(R.args.kind).toBe("descriptor"),(0,e.expect)(R.args.isFirstMessage).toBe(!0),(0,e.expect)(R.args.swapSignatureTag).toBe(!0);const C=a.sendCommand.mock.calls[5][0];(0,e.expect)(C).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(C.args.kind).toBe("descriptor"),(0,e.expect)(C.args.isFirstMessage).toBe(!1),(0,e.expect)(C.args.swapSignatureTag).toBe(!0);const w=a.sendCommand.mock.calls[6][0];(0,e.expect)(w).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(w.args.kind).toBe("empty"),(0,e.expect)(w.args.isFirstMessage).toBe(!1),(0,e.expect)(w.args.swapSignatureTag).toBe(!0)}),(0,e.it)("parses a real *v0* tx via DefaultSolanaMessageNormaliser and preserves APDU order System, createATA, token transfer (descriptor, descriptor, empty) after base + token",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValue(s);const t=n.Keypair.generate(),r=n.Keypair.generate().publicKey,p=n.SystemProgram.transfer({fromPubkey:t.publicKey,toPubkey:r,lamports:7777}),c=n.Keypair.generate(),y=n.Keypair.generate().publicKey,g=n.Keypair.generate().publicKey,o=(0,f.getAssociatedTokenAddressSync)(y,g,!0,f.TOKEN_PROGRAM_ID,f.ASSOCIATED_TOKEN_PROGRAM_ID),T=(0,f.createAssociatedTokenAccountInstruction)(t.publicKey,o,g,y,f.TOKEN_PROGRAM_ID,f.ASSOCIATED_TOKEN_PROGRAM_ID),A=n.Keypair.generate().publicKey,x=(0,f.createTransferInstruction)(A,o,c.publicKey,9n,[],f.TOKEN_PROGRAM_ID),{raw:V}=F([p,T,x],[c],t),K=n.SystemProgram.programId.toBase58(),N=f.ASSOCIATED_TOKEN_PROGRAM_ID.toBase58(),P=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u},{type:k.SolanaContextTypes.SOLANA_LIFI,payload:{[K]:{data:i,signatures:{[d.SWAP_MODE]:i}},[N]:{data:i,signatures:{[d.SWAP_MODE]:i}}}}],L={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:P,transactionBytes:V},R=await new d.ProvideSolanaTransactionContextTask(a,L,E.DefaultSolanaMessageNormaliser).run();(0,e.expect)(R).toEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(7);const C=a.sendCommand.mock.calls[4][0];(0,e.expect)(C).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(C.args.kind).toBe("descriptor"),(0,e.expect)(C.args.isFirstMessage).toBe(!0),(0,e.expect)(C.args.swapSignatureTag).toBe(!0);const w=a.sendCommand.mock.calls[5][0];(0,e.expect)(w).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(w.args.kind).toBe("descriptor"),(0,e.expect)(w.args.isFirstMessage).toBe(!1),(0,e.expect)(w.args.swapSignatureTag).toBe(!0);const b=a.sendCommand.mock.calls[6][0];(0,e.expect)(b).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(b.args.kind).toBe("empty"),(0,e.expect)(b.args.isFirstMessage).toBe(!1),(0,e.expect)(b.args.swapSignatureTag).toBe(!0)})})});
|
|
2
|
+
//# sourceMappingURL=ProvideTransactionContextTask.test.js.map
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../../../src/internal/app-binder/task/ProvideTransactionContextTask.test.ts"],
|
|
4
|
+
"sourcesContent": ["/* eslint-disable @typescript-eslint/no-unsafe-member-access */\n/* eslint-disable @typescript-eslint/no-unsafe-assignment */\n/* eslint-disable @typescript-eslint/no-explicit-any */\n/* eslint-disable @typescript-eslint/require-await */\n/* eslint-disable @typescript-eslint/no-unsafe-return */\n\nimport { SolanaContextTypes } from \"@ledgerhq/context-module\";\nimport {\n CommandResultFactory,\n LoadCertificateCommand,\n} from \"@ledgerhq/device-management-kit\";\nimport {\n ASSOCIATED_TOKEN_PROGRAM_ID,\n createAssociatedTokenAccountInstruction,\n createTransferInstruction,\n getAssociatedTokenAddressSync,\n TOKEN_PROGRAM_ID,\n} from \"@solana/spl-token\";\nimport {\n Keypair,\n PublicKey,\n SystemProgram,\n Transaction,\n TransactionInstruction,\n TransactionMessage,\n VersionedTransaction,\n} from \"@solana/web3.js\";\nimport bs58 from \"bs58\";\nimport { Buffer } from \"buffer\";\nimport { Nothing } from \"purify-ts\";\nimport { beforeEach, describe, expect, it, type Mock, vi } from \"vitest\";\n\nimport { ProvideTLVDescriptorCommand } from \"@internal/app-binder/command/ProvideTLVDescriptorCommand\";\nimport { ProvideTLVTransactionInstructionDescriptorCommand } from \"@internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand\";\nimport { DefaultSolanaMessageNormaliser } from \"@internal/app-binder/services/utils/DefaultSolanaMessageNormaliser\";\n\nimport {\n ProvideSolanaTransactionContextTask,\n SWAP_MODE,\n} from \"./ProvideTransactionContextTask\";\n\nconst DUMMY_BLOCKHASH = bs58.encode(new Uint8Array(32).fill(0xaa));\n\nfunction makeSignedRawLegacy(\n ixs: TransactionInstruction[],\n signers: Keypair[],\n feePayer?: Keypair,\n) {\n const payer = feePayer ?? signers[0] ?? Keypair.generate();\n const tx = new Transaction();\n tx.recentBlockhash = DUMMY_BLOCKHASH;\n tx.feePayer = payer.publicKey;\n tx.add(...ixs);\n const seen = new Set<string>();\n const uniq = [payer, ...signers].filter((kp) => {\n const k = kp.publicKey.toBase58();\n if (seen.has(k)) return false;\n seen.add(k);\n return true;\n });\n tx.sign(...uniq);\n return { raw: tx.serialize(), payer };\n}\n\nfunction makeSignedRawV0(\n ixs: TransactionInstruction[],\n signers: Keypair[],\n feePayer?: Keypair,\n) {\n const payer = feePayer ?? signers[0] ?? Keypair.generate();\n const messageV0 = new TransactionMessage({\n payerKey: payer.publicKey,\n recentBlockhash: DUMMY_BLOCKHASH,\n instructions: ixs,\n }).compileToV0Message(); // no ALTs -> offline-safe\n\n const vtx = new VersionedTransaction(messageV0);\n vtx.sign([payer, ...signers]);\n return { raw: vtx.serialize(), payer };\n}\n\nconst makeKey = (base58: string) => ({ toBase58: () => base58 });\n\nconst buildNormaliser = (message: any) =>\n ({\n normaliseMessage: vi.fn(async () => message),\n }) as const;\n\ndescribe(\"ProvideSolanaTransactionContextTask (merged)\", () => {\n let api: { sendCommand: Mock };\n const success = CommandResultFactory({ data: undefined });\n\n const baseCert = {\n payload: new Uint8Array([0xf0, 0xca, 0xcc, 0x1a]),\n keyUsageNumber: 1,\n } as const;\n const tlvDescriptor = new Uint8Array([0xaa, 0xbb, 0xcc]);\n\n const tokenCert = {\n payload: new Uint8Array([0xf0, 0xca, 0xcc, 0x1a]),\n keyUsageNumber: 2,\n } as const;\n\n const tokenDescriptor = {\n data: \"f0cacc1a\",\n signature: \"01020304\",\n } as const;\n\n const SIG = \"f0cacc1a\";\n\n beforeEach(() => {\n vi.resetAllMocks();\n api = {\n sendCommand: vi.fn(),\n };\n });\n\n // basic context\n describe(\"basic context\", () => {\n it(\"sends PKI certificate then TLV descriptor and returns Nothing (no loaders results)\", async () => {\n // given\n api.sendCommand\n .mockResolvedValueOnce(success) // LoadCertificateCommand (trusted name PKI)\n .mockResolvedValueOnce(success); // ProvideTLVDescriptorCommand\n\n const context = {\n trustedNamePKICertificate: baseCert,\n tlvDescriptor,\n loadersResults: [],\n transactionBytes: new Uint8Array([0xf0]), // unused in this path\n };\n\n const task = new ProvideSolanaTransactionContextTask(\n api as unknown as any,\n context as any,\n );\n\n // when\n const result = await task.run();\n\n // then\n expect(api.sendCommand).toHaveBeenCalledTimes(2);\n\n const first = api.sendCommand.mock.calls[0]![0]!;\n expect(first).toBeInstanceOf(LoadCertificateCommand);\n expect(first.args.certificate).toStrictEqual(baseCert.payload);\n expect(first.args.keyUsage).toBe(baseCert.keyUsageNumber);\n\n const second = api.sendCommand.mock.calls[1]![0]!;\n expect(second).toBeInstanceOf(ProvideTLVDescriptorCommand);\n expect(second.args.payload).toStrictEqual(tlvDescriptor);\n\n expect(result).toStrictEqual(Nothing);\n });\n\n it(\"propagates a rejection thrown by InternalApi.sendCommand\", async () => {\n // given\n api.sendCommand.mockRejectedValueOnce(new Error(\"oupsy\"));\n\n const context = {\n trustedNamePKICertificate: baseCert,\n tlvDescriptor,\n loadersResults: [],\n transactionBytes: new Uint8Array([0xca]),\n };\n\n const task = new ProvideSolanaTransactionContextTask(\n api as unknown as any,\n context as any,\n );\n\n await expect(task.run()).rejects.toThrow(\"oupsy\");\n expect(api.sendCommand).toHaveBeenCalledTimes(1);\n });\n\n it(\"ignores SolanaContextTypes.ERROR entries (no extra APDUs beyond base context)\", async () => {\n // given: include an ERROR loader which should be ignored\n api.sendCommand\n .mockResolvedValueOnce(success) // PKI\n .mockResolvedValueOnce(success); // TLV\n\n const loadersResults = [\n { type: SolanaContextTypes.ERROR, error: { message: \"err\" } as any },\n ];\n\n const context = {\n trustedNamePKICertificate: baseCert,\n tlvDescriptor,\n loadersResults,\n transactionBytes: new Uint8Array([0x1a]),\n };\n\n const task = new ProvideSolanaTransactionContextTask(\n api as unknown as any,\n context as any,\n );\n\n const result = await task.run();\n\n expect(result).toStrictEqual(Nothing);\n expect(api.sendCommand).toHaveBeenCalledTimes(2);\n expect(api.sendCommand.mock.calls[0]![0]!).toBeInstanceOf(\n LoadCertificateCommand,\n );\n expect(api.sendCommand.mock.calls[1]![0]!).toBeInstanceOf(\n ProvideTLVDescriptorCommand,\n );\n });\n });\n\n // basic context + token metadata\n\n describe(\"basic context + token\", () => {\n it(\"when token metadata present, sends token certificate then TLV transaction-instruction descriptor\", async () => {\n // given\n api.sendCommand\n .mockResolvedValueOnce(success) // base PKI certificate\n .mockResolvedValueOnce(success) // TLV descriptor\n .mockResolvedValueOnce(success) // token metadata certificate\n .mockResolvedValueOnce(success); // token descriptor via TLVTransactionInstructionDescriptor\n\n const loadersResults = [\n {\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: {\n solanaTokenDescriptor: tokenDescriptor,\n },\n certificate: tokenCert,\n },\n ];\n\n const context = {\n trustedNamePKICertificate: baseCert,\n tlvDescriptor,\n loadersResults,\n transactionBytes: new Uint8Array([0x1a]), // unused in this path\n };\n\n const task = new ProvideSolanaTransactionContextTask(\n api as unknown as any,\n context as any,\n );\n\n // when\n const result = await task.run();\n\n // then\n expect(api.sendCommand).toHaveBeenCalledTimes(4);\n\n const third = api.sendCommand.mock.calls[2]![0]!;\n expect(third).toBeInstanceOf(LoadCertificateCommand);\n expect(third.args.certificate).toStrictEqual(tokenCert.payload);\n expect(third.args.keyUsage).toBe(tokenCert.keyUsageNumber);\n\n const fourth = api.sendCommand.mock.calls[3]![0]!;\n expect(fourth).toBeInstanceOf(\n ProvideTLVTransactionInstructionDescriptorCommand,\n );\n expect(fourth.args.kind).toBe(\"descriptor\");\n expect(fourth.args.dataHex).toBe(tokenDescriptor.data);\n expect(fourth.args.signatureHex).toBe(tokenDescriptor.signature);\n expect(fourth.args.isFirstMessage).toBe(true);\n expect(fourth.args.swapSignatureTag).toBe(false);\n\n expect(result).toStrictEqual(Nothing);\n });\n\n it(\"does not send token commands if token payload is missing\", async () => {\n // given\n api.sendCommand\n .mockResolvedValueOnce(success) // PKI\n .mockResolvedValueOnce(success); // TLV\n\n const loadersResults = [\n {\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: undefined,\n certificate: tokenCert,\n },\n ];\n\n const context = {\n trustedNamePKICertificate: baseCert,\n tlvDescriptor,\n loadersResults,\n transactionBytes: new Uint8Array([0xf0]),\n };\n\n const task = new ProvideSolanaTransactionContextTask(\n api as unknown as any,\n context as any,\n );\n\n // when\n const result = await task.run();\n\n // then\n expect(api.sendCommand).toHaveBeenCalledTimes(2);\n expect(result).toStrictEqual(Nothing);\n });\n\n it(\"does not send token commands if token certificate is missing\", async () => {\n // given\n api.sendCommand\n .mockResolvedValueOnce(success) // PKI\n .mockResolvedValueOnce(success); // TLV\n\n const loadersResults = [\n {\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: { solanaTokenDescriptor: tokenDescriptor },\n certificate: undefined,\n },\n ];\n\n const context = {\n trustedNamePKICertificate: baseCert,\n tlvDescriptor,\n loadersResults,\n transactionBytes: new Uint8Array([0xca]),\n };\n\n const task = new ProvideSolanaTransactionContextTask(\n api as unknown as any,\n context as any,\n );\n\n // when\n const result = await task.run();\n\n // then\n expect(api.sendCommand).toHaveBeenCalledTimes(2);\n expect(result).toStrictEqual(Nothing);\n });\n\n it(\"throws a mapped error when sending token certificate returns a CommandErrorResult\", async () => {\n // given\n const errorResult = CommandResultFactory({\n error: { _tag: \"SomeError\", errorCode: 0x6a80, message: \"bad\" },\n });\n\n api.sendCommand\n .mockResolvedValueOnce(success) // base PKI\n .mockResolvedValueOnce(success) // TLV\n .mockResolvedValueOnce(errorResult); // token certificate -> error\n\n const loadersResults = [\n {\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: { solanaTokenDescriptor: tokenDescriptor },\n certificate: tokenCert,\n },\n ];\n\n const context = {\n trustedNamePKICertificate: baseCert,\n tlvDescriptor,\n loadersResults,\n transactionBytes: new Uint8Array([0xcc]),\n };\n\n const task = new ProvideSolanaTransactionContextTask(\n api as unknown as any,\n context as any,\n );\n\n // when + then\n await expect(task.run()).rejects.toThrow(\n \"[SignerSolana] ProvideSolanaTransactionContextTask: Failed to send tokenMetadataCertificate to device, latest firmware version required\",\n );\n\n // ensure the TLVTransactionInstructionDescriptor was NOT attempted\n expect(api.sendCommand).toHaveBeenCalledTimes(3);\n const third = api.sendCommand.mock.calls[2]![0]!;\n expect(third).toBeInstanceOf(LoadCertificateCommand);\n });\n\n it(\"does not send swap APDUs when SOLANA_LIFI context is missing (token present)\", async () => {\n // given: base + token succeed, but no LIFI in loadersResults\n api.sendCommand\n .mockResolvedValueOnce(success) // PKI\n .mockResolvedValueOnce(success) // TLV\n .mockResolvedValueOnce(success) // token cert\n .mockResolvedValueOnce(success); // token TLVTransactionInstructionDescriptor\n\n const loadersResults = [\n {\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: { solanaTokenDescriptor: tokenDescriptor },\n certificate: tokenCert,\n },\n // no SOLANA_LIFI entry\n ];\n\n const context = {\n trustedNamePKICertificate: baseCert,\n tlvDescriptor,\n loadersResults,\n transactionBytes: new Uint8Array([0x1a]),\n };\n\n const task = new ProvideSolanaTransactionContextTask(\n api as unknown as any,\n context as any,\n { normaliseMessage: vi.fn() } as any,\n );\n\n const result = await task.run();\n\n expect(result).toStrictEqual(Nothing);\n // 2 base + 2 token only\n expect(api.sendCommand).toHaveBeenCalledTimes(4);\n expect(api.sendCommand.mock.calls[0]![0]!).toBeInstanceOf(\n LoadCertificateCommand,\n );\n expect(api.sendCommand.mock.calls[1]![0]!).toBeInstanceOf(\n ProvideTLVDescriptorCommand,\n );\n expect(api.sendCommand.mock.calls[2]![0]!).toBeInstanceOf(\n LoadCertificateCommand,\n );\n const tokenCmd = api.sendCommand.mock.calls[3]![0]!;\n expect(tokenCmd).toBeInstanceOf(\n ProvideTLVTransactionInstructionDescriptorCommand,\n );\n expect(tokenCmd.args.swapSignatureTag).toBe(false);\n expect(tokenCmd.args.isFirstMessage).toBe(true);\n });\n });\n\n // basic context + token + lifi (swap)\n describe(\"basic context + token + lifi\", () => {\n it(\"sends one APDU per instruction in order (descriptor/empty/descriptor) after base + token are sent\", async () => {\n // given\n api.sendCommand\n .mockResolvedValueOnce(success) // base PKI\n .mockResolvedValueOnce(success) // TLV\n .mockResolvedValueOnce(success) // token cert\n .mockResolvedValueOnce(success) // token TLVTransactionInstructionDescriptor\n .mockResolvedValue(success); // swap APDUs\n\n const message = {\n compiledInstructions: [\n { programIdIndex: 0 },\n { programIdIndex: 1 },\n { programIdIndex: 2 },\n ],\n allKeys: [makeKey(\"A_PID\"), makeKey(\"B_PID\"), makeKey(\"C_PID\")],\n };\n const normaliser = buildNormaliser(message);\n\n const loadersResults = [\n {\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: { solanaTokenDescriptor: tokenDescriptor },\n certificate: tokenCert,\n },\n {\n type: SolanaContextTypes.SOLANA_LIFI,\n payload: {\n A_PID: { data: SIG, signatures: { [SWAP_MODE]: SIG } },\n // B missing -> empty\n C_PID: { data: SIG, signatures: { [SWAP_MODE]: SIG } },\n },\n },\n ];\n\n const context = {\n trustedNamePKICertificate: baseCert,\n tlvDescriptor,\n loadersResults,\n transactionBytes: new Uint8Array([0xf0]),\n };\n\n const task = new ProvideSolanaTransactionContextTask(\n api as unknown as any,\n context as any,\n normaliser as any,\n );\n\n // when\n const result = await task.run();\n\n // then\n expect(result).toStrictEqual(Nothing);\n // 2 base + 2 token + 3 swap\n expect(api.sendCommand).toHaveBeenCalledTimes(7);\n\n // swap calls start at index 4\n const c0 = api.sendCommand.mock.calls[4]![0]!;\n expect(c0).toBeInstanceOf(\n ProvideTLVTransactionInstructionDescriptorCommand,\n );\n expect(c0.args.kind).toBe(\"descriptor\");\n expect(c0.args.dataHex).toBe(SIG);\n expect(c0.args.signatureHex).toBe(SIG);\n expect(c0.args.isFirstMessage).toBe(true);\n expect(c0.args.swapSignatureTag).toBe(true);\n\n const c1 = api.sendCommand.mock.calls[5]![0]!;\n expect(c1).toBeInstanceOf(\n ProvideTLVTransactionInstructionDescriptorCommand,\n );\n expect(c1.args.kind).toBe(\"empty\");\n expect(c1.args.isFirstMessage).toBe(false);\n expect(c1.args.swapSignatureTag).toBe(true);\n\n const c2 = api.sendCommand.mock.calls[6]![0]!;\n expect(c2).toBeInstanceOf(\n ProvideTLVTransactionInstructionDescriptorCommand,\n );\n expect(c2.args.kind).toBe(\"descriptor\");\n expect(c2.args.dataHex).toBe(SIG);\n expect(c2.args.signatureHex).toBe(SIG);\n expect(c2.args.isFirstMessage).toBe(false);\n expect(c2.args.swapSignatureTag).toBe(true);\n\n expect((normaliser as any).normaliseMessage).toHaveBeenCalledOnce();\n });\n\n it(\"sends empty when descriptor exists but signatures[SWAP_MODE] is missing\", async () => {\n // given\n api.sendCommand\n .mockResolvedValueOnce(success) // base PKI\n .mockResolvedValueOnce(success) // TLV\n .mockResolvedValueOnce(success) // token cert\n .mockResolvedValueOnce(success) // token TLVTransactionInstructionDescriptor\n .mockResolvedValue(success);\n\n const message = {\n compiledInstructions: [{ programIdIndex: 0 }],\n allKeys: [makeKey(\"ONLY_PID\")],\n };\n const normaliser = buildNormaliser(message);\n\n const loadersResults = [\n {\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: { solanaTokenDescriptor: tokenDescriptor },\n certificate: tokenCert,\n },\n {\n type: SolanaContextTypes.SOLANA_LIFI,\n payload: {\n ONLY_PID: {\n data: SIG,\n signatures: {\n // no [SWAP_MODE] key\n },\n },\n },\n },\n ];\n\n const context = {\n trustedNamePKICertificate: baseCert,\n tlvDescriptor,\n loadersResults,\n transactionBytes: new Uint8Array([0xca]),\n };\n\n const task = new ProvideSolanaTransactionContextTask(\n api as unknown as any,\n context as any,\n normaliser as any,\n );\n\n const result = await task.run();\n\n expect(result).toStrictEqual(Nothing);\n // 2 base + 2 token + 1 swap\n expect(api.sendCommand).toHaveBeenCalledTimes(5);\n\n const c0 = api.sendCommand.mock.calls[4]![0]!;\n expect(c0).toBeInstanceOf(\n ProvideTLVTransactionInstructionDescriptorCommand,\n );\n expect(c0.args.kind).toBe(\"empty\");\n expect(c0.args.isFirstMessage).toBe(true);\n expect(c0.args.swapSignatureTag).toBe(true);\n });\n\n it(\"sends empty when programId is missing for an instruction\", async () => {\n // given\n api.sendCommand\n .mockResolvedValueOnce(success) // base PKI\n .mockResolvedValueOnce(success) // TLV\n .mockResolvedValueOnce(success) // token cert\n .mockResolvedValueOnce(success) // token TLVTransactionInstructionDescriptor\n .mockResolvedValue(success);\n\n const message = {\n compiledInstructions: [{ programIdIndex: 5 }], // out-of-range\n allKeys: [makeKey(\"X\")],\n };\n const normaliser = buildNormaliser(message);\n\n const loadersResults = [\n {\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: { solanaTokenDescriptor: tokenDescriptor },\n certificate: tokenCert,\n },\n { type: SolanaContextTypes.SOLANA_LIFI, payload: {} },\n ];\n\n const context = {\n trustedNamePKICertificate: baseCert,\n tlvDescriptor,\n loadersResults,\n transactionBytes: new Uint8Array([0xcc]),\n };\n\n const task = new ProvideSolanaTransactionContextTask(\n api as unknown as any,\n context as any,\n normaliser as any,\n );\n\n const result = await task.run();\n\n expect(result).toStrictEqual(Nothing);\n // 2 base + 2 token + 1 swap\n expect(api.sendCommand).toHaveBeenCalledTimes(5);\n\n const c0 = api.sendCommand.mock.calls[4]![0]!;\n expect(c0).toBeInstanceOf(\n ProvideTLVTransactionInstructionDescriptorCommand,\n );\n expect(c0.args.kind).toBe(\"empty\");\n expect(c0.args.isFirstMessage).toBe(true);\n expect(c0.args.swapSignatureTag).toBe(true);\n });\n\n it(\"propagates a rejection thrown by InternalApi.sendCommand on the second swap APDU (after base + token succeed)\", async () => {\n // given\n api.sendCommand\n .mockResolvedValueOnce(success) // base PKI\n .mockResolvedValueOnce(success) // TLV\n .mockResolvedValueOnce(success) // token cert\n .mockResolvedValueOnce(success) // token TLVTransactionInstructionDescriptor\n .mockResolvedValueOnce(success) // 1st swap ok\n .mockRejectedValueOnce(new Error(\"err\")); // 2nd swap fails\n\n const message = {\n compiledInstructions: [\n { programIdIndex: 0 }, // descriptor\n { programIdIndex: 1 }, // empty -> rejects\n { programIdIndex: 2 }, // not reached\n ],\n allKeys: [makeKey(\"A_PID\"), makeKey(\"B_PID\"), makeKey(\"C_PID\")],\n };\n const normaliser = buildNormaliser(message);\n\n const loadersResults = [\n {\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: { solanaTokenDescriptor: tokenDescriptor },\n certificate: tokenCert,\n },\n {\n type: SolanaContextTypes.SOLANA_LIFI,\n payload: {\n A_PID: { data: SIG, signatures: { [SWAP_MODE]: SIG } },\n // B missing -> empty\n C_PID: { data: SIG, signatures: { [SWAP_MODE]: SIG } },\n },\n },\n ];\n\n const context = {\n trustedNamePKICertificate: baseCert,\n tlvDescriptor,\n loadersResults,\n transactionBytes: new Uint8Array([0x1a]),\n };\n\n const task = new ProvideSolanaTransactionContextTask(\n api as unknown as any,\n context as any,\n normaliser as any,\n );\n\n await expect(task.run()).rejects.toThrow(\"err\");\n // 2 base + 2 token + 2 swap (failed on 2nd)\n expect(api.sendCommand).toHaveBeenCalledTimes(6);\n\n const c0 = api.sendCommand.mock.calls[4]![0]!;\n expect(c0).toBeInstanceOf(\n ProvideTLVTransactionInstructionDescriptorCommand,\n );\n expect(c0.args.kind).toBe(\"descriptor\");\n expect(c0.args.isFirstMessage).toBe(true);\n expect(c0.args.swapSignatureTag).toBe(true);\n\n const c1 = api.sendCommand.mock.calls[5]![0]!;\n expect(c1).toBeInstanceOf(\n ProvideTLVTransactionInstructionDescriptorCommand,\n );\n expect(c1.args.kind).toBe(\"empty\");\n expect(c1.args.isFirstMessage).toBe(false);\n expect(c1.args.swapSignatureTag).toBe(true);\n });\n\n it(\"uses signatures[SWAP_MODE] specifically when present\", async () => {\n // given\n api.sendCommand\n .mockResolvedValueOnce(success) // base PKI\n .mockResolvedValueOnce(success) // TLV\n .mockResolvedValueOnce(success) // token cert\n .mockResolvedValueOnce(success) // token TLVTransactionInstructionDescriptor\n .mockResolvedValue(success);\n\n const message = {\n compiledInstructions: [{ programIdIndex: 0 }],\n allKeys: [makeKey(\"SIG_PID\")],\n };\n const normaliser = buildNormaliser(message);\n\n const loadersResults = [\n {\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: { solanaTokenDescriptor: tokenDescriptor },\n certificate: tokenCert,\n },\n {\n type: SolanaContextTypes.SOLANA_LIFI,\n payload: {\n SIG_PID: {\n data: SIG,\n signatures: { prod: \"deadbeef\", [SWAP_MODE]: SIG },\n },\n },\n },\n ];\n\n const context = {\n trustedNamePKICertificate: baseCert,\n tlvDescriptor,\n loadersResults,\n transactionBytes: new Uint8Array([0xf0]),\n };\n\n const task = new ProvideSolanaTransactionContextTask(\n api as unknown as any,\n context as any,\n normaliser as any,\n );\n\n const result = await task.run();\n\n expect(result).toStrictEqual(Nothing);\n // 2 base + 2 token + 1 swap\n expect(api.sendCommand).toHaveBeenCalledTimes(5);\n\n const c0 = api.sendCommand.mock.calls[4]![0]!;\n expect(c0).toBeInstanceOf(\n ProvideTLVTransactionInstructionDescriptorCommand,\n );\n expect(c0.args.kind).toBe(\"descriptor\");\n expect(c0.args.dataHex).toBe(SIG);\n expect(c0.args.signatureHex).toBe(SIG);\n expect(c0.args.isFirstMessage).toBe(true);\n expect(c0.args.swapSignatureTag).toBe(true);\n });\n\n it(\"parses a real *legacy* tx via DefaultSolanaMessageNormaliser and preserves APDU order (descriptor, empty, descriptor) after base + token\", async () => {\n // given\n api.sendCommand\n .mockResolvedValueOnce(success) // base PKI\n .mockResolvedValueOnce(success) // TLV\n .mockResolvedValueOnce(success) // token cert\n .mockResolvedValueOnce(success) // token TLVTransactionInstructionDescriptor\n .mockResolvedValue(success);\n\n const payer = Keypair.generate();\n const dest1 = Keypair.generate().publicKey;\n const ix1 = SystemProgram.transfer({\n fromPubkey: payer.publicKey,\n toPubkey: dest1,\n lamports: 1234,\n });\n\n const owner = Keypair.generate();\n const srcToken = Keypair.generate().publicKey;\n const dstToken = Keypair.generate().publicKey;\n const ix2 = createTransferInstruction(\n srcToken,\n dstToken,\n owner.publicKey,\n 42n,\n [],\n TOKEN_PROGRAM_ID,\n );\n\n const MEMO_PROGRAM_ID = new PublicKey(\n \"MemoSq4gqABAXKb96qnH8TysNcWxMyWCqXgDLGmfcHr\",\n );\n const ix3 = new TransactionInstruction({\n programId: MEMO_PROGRAM_ID,\n keys: [],\n data: Buffer.from(\"hi\"),\n });\n\n const { raw } = makeSignedRawLegacy(\n [ix1, ix2, ix3],\n [payer, owner],\n payer,\n );\n\n const SYSTEM_PID = SystemProgram.programId.toBase58();\n const MEMO_PID = MEMO_PROGRAM_ID.toBase58();\n\n const loadersResults = [\n {\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: { solanaTokenDescriptor: tokenDescriptor },\n certificate: tokenCert,\n },\n {\n type: SolanaContextTypes.SOLANA_LIFI,\n payload: {\n [SYSTEM_PID]: { data: SIG, signatures: { [SWAP_MODE]: SIG } },\n // Tokenkeg missing -> empty\n [MEMO_PID]: { data: SIG, signatures: { [SWAP_MODE]: SIG } },\n },\n },\n ];\n\n const context = {\n trustedNamePKICertificate: baseCert,\n tlvDescriptor,\n loadersResults,\n transactionBytes: raw,\n };\n\n const task = new ProvideSolanaTransactionContextTask(\n api as unknown as any,\n context as any,\n DefaultSolanaMessageNormaliser as any,\n );\n\n const result = await task.run();\n\n expect(result).toStrictEqual(Nothing);\n // 2 base + 2 token + 3 swap\n expect(api.sendCommand).toHaveBeenCalledTimes(7);\n\n const c0 = api.sendCommand.mock.calls[4]![0]!;\n expect(c0.args.kind).toBe(\"descriptor\");\n expect(c0.args.isFirstMessage).toBe(true);\n expect(c0.args.swapSignatureTag).toBe(true);\n\n const c1 = api.sendCommand.mock.calls[5]![0]!;\n expect(c1.args.kind).toBe(\"empty\");\n expect(c1.args.isFirstMessage).toBe(false);\n expect(c1.args.swapSignatureTag).toBe(true);\n\n const c2 = api.sendCommand.mock.calls[6]![0]!;\n expect(c2.args.kind).toBe(\"descriptor\");\n expect(c2.args.isFirstMessage).toBe(false);\n expect(c2.args.swapSignatureTag).toBe(true);\n });\n\n it(\"parses a real *v0* tx via DefaultSolanaMessageNormaliser (no ALTs) and preserves APDU order (descriptor, descriptor, empty) after base + token\", async () => {\n // given\n api.sendCommand\n .mockResolvedValueOnce(success) // base PKI\n .mockResolvedValueOnce(success) // TLV\n .mockResolvedValueOnce(success) // token cert\n .mockResolvedValueOnce(success) // token TLVTransactionInstructionDescriptor\n .mockResolvedValue(success);\n\n const payer = Keypair.generate();\n const sysDest = Keypair.generate().publicKey;\n const sysIx = SystemProgram.transfer({\n fromPubkey: payer.publicKey,\n toPubkey: sysDest,\n lamports: 5_678,\n });\n\n const owner = Keypair.generate().publicKey;\n const mint = Keypair.generate().publicKey;\n const ata = getAssociatedTokenAddressSync(\n mint,\n owner,\n true,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n const ataIx = createAssociatedTokenAccountInstruction(\n payer.publicKey,\n ata,\n owner,\n mint,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const MEMO_PROGRAM_ID = new PublicKey(\n \"MemoSq4gqABAXKb96qnH8TysNcWxMyWCqXgDLGmfcHr\",\n );\n const memoIx = new TransactionInstruction({\n programId: MEMO_PROGRAM_ID,\n keys: [],\n data: Buffer.from(\"hello\"),\n });\n\n // IMPORTANT: sign only with the payer (no PublicKey in signers array)\n const { raw } = makeSignedRawV0([sysIx, ataIx, memoIx], [], payer);\n\n const SYSTEM_PID = SystemProgram.programId.toBase58();\n const ATA_PID = ASSOCIATED_TOKEN_PROGRAM_ID.toBase58();\n\n const loadersResults = [\n {\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: { solanaTokenDescriptor: tokenDescriptor },\n certificate: tokenCert,\n },\n {\n type: SolanaContextTypes.SOLANA_LIFI,\n payload: {\n [SYSTEM_PID]: { data: SIG, signatures: { [SWAP_MODE]: SIG } },\n [ATA_PID]: { data: SIG, signatures: { [SWAP_MODE]: SIG } },\n // Memo intentionally missing -> empty\n },\n },\n ];\n const context = {\n trustedNamePKICertificate: baseCert,\n tlvDescriptor,\n loadersResults,\n transactionBytes: raw,\n };\n\n const task = new ProvideSolanaTransactionContextTask(\n api as any,\n context as any,\n DefaultSolanaMessageNormaliser as any,\n );\n\n const res = await task.run();\n\n expect(res).toEqual(Nothing);\n // 2 base + 2 token + 3 swap\n expect(api.sendCommand).toHaveBeenCalledTimes(7);\n\n const c0 = api.sendCommand.mock.calls[4]![0]!;\n expect(c0).toBeInstanceOf(\n ProvideTLVTransactionInstructionDescriptorCommand,\n );\n expect(c0.args.kind).toBe(\"descriptor\"); // System\n expect(c0.args.isFirstMessage).toBe(true);\n expect(c0.args.swapSignatureTag).toBe(true);\n\n const c1 = api.sendCommand.mock.calls[5]![0]!;\n expect(c1).toBeInstanceOf(\n ProvideTLVTransactionInstructionDescriptorCommand,\n );\n expect(c1.args.kind).toBe(\"descriptor\"); // ATA\n expect(c1.args.isFirstMessage).toBe(false);\n expect(c1.args.swapSignatureTag).toBe(true);\n\n const c2 = api.sendCommand.mock.calls[6]![0]!;\n expect(c2).toBeInstanceOf(\n ProvideTLVTransactionInstructionDescriptorCommand,\n );\n expect(c2.args.kind).toBe(\"empty\"); // Memo missing\n expect(c2.args.isFirstMessage).toBe(false);\n expect(c2.args.swapSignatureTag).toBe(true);\n });\n\n it(\"parses a real *v0* tx via DefaultSolanaMessageNormaliser and preserves APDU order System, createATA, token transfer (descriptor, descriptor, empty) after base + token\", async () => {\n // given\n api.sendCommand\n .mockResolvedValueOnce(success) // base PKI\n .mockResolvedValueOnce(success) // TLV\n .mockResolvedValueOnce(success) // token cert\n .mockResolvedValueOnce(success) // token TLVTransactionInstructionDescriptor\n .mockResolvedValue(success); // swap APDUs\n\n const payer = Keypair.generate();\n\n const sysDest = Keypair.generate().publicKey;\n const sysIx = SystemProgram.transfer({\n fromPubkey: payer.publicKey,\n toPubkey: sysDest,\n lamports: 7_777,\n });\n\n const tokenOwner = Keypair.generate(); // owner of the source SPL token account (signer)\n const mint = Keypair.generate().publicKey;\n\n const recipientOwner = Keypair.generate().publicKey; // unfunded account (no ATA yet)\n const recipientATA = getAssociatedTokenAddressSync(\n mint,\n recipientOwner,\n true,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const createAtaIx = createAssociatedTokenAccountInstruction(\n payer.publicKey, // funder\n recipientATA, // ata to be created\n recipientOwner, // owner of the ATA\n mint,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const srcTokenAcc = Keypair.generate().publicKey; // pretend this is an existing token account\n const transferIx = createTransferInstruction(\n srcTokenAcc,\n recipientATA,\n tokenOwner.publicKey, // authority of srcTokenAcc (we will sign with tokenOwner)\n 9n,\n [],\n TOKEN_PROGRAM_ID,\n );\n\n // sign v0 with payer + tokenOwner (NO PublicKey objects in the signers array)\n const { raw } = makeSignedRawV0(\n [sysIx, createAtaIx, transferIx],\n [tokenOwner],\n payer,\n );\n\n const SYSTEM_PID = SystemProgram.programId.toBase58();\n const ATA_PID = ASSOCIATED_TOKEN_PROGRAM_ID.toBase58();\n\n const loadersResults = [\n {\n type: SolanaContextTypes.SOLANA_TOKEN,\n payload: { solanaTokenDescriptor: tokenDescriptor },\n certificate: tokenCert,\n },\n {\n type: SolanaContextTypes.SOLANA_LIFI,\n payload: {\n [SYSTEM_PID]: { data: SIG, signatures: { [SWAP_MODE]: SIG } },\n [ATA_PID]: { data: SIG, signatures: { [SWAP_MODE]: SIG } },\n // Token Program intentionally missing -> \"empty\"\n },\n },\n ];\n\n const context = {\n trustedNamePKICertificate: baseCert,\n tlvDescriptor,\n loadersResults,\n transactionBytes: raw,\n };\n\n // when\n const task = new ProvideSolanaTransactionContextTask(\n api as any,\n context as any,\n DefaultSolanaMessageNormaliser as any,\n );\n\n const res = await task.run();\n\n // then\n expect(res).toEqual(Nothing);\n // 2 base + 2 token + 3 swap\n expect(api.sendCommand).toHaveBeenCalledTimes(7);\n\n // swap calls start at index 4\n const c0 = api.sendCommand.mock.calls[4]![0]!;\n expect(c0).toBeInstanceOf(\n ProvideTLVTransactionInstructionDescriptorCommand,\n );\n expect(c0.args.kind).toBe(\"descriptor\"); // System\n expect(c0.args.isFirstMessage).toBe(true);\n expect(c0.args.swapSignatureTag).toBe(true);\n\n const c1 = api.sendCommand.mock.calls[5]![0]!;\n expect(c1).toBeInstanceOf(\n ProvideTLVTransactionInstructionDescriptorCommand,\n );\n expect(c1.args.kind).toBe(\"descriptor\"); // ATA\n expect(c1.args.isFirstMessage).toBe(false);\n expect(c1.args.swapSignatureTag).toBe(true);\n\n const c2 = api.sendCommand.mock.calls[6]![0]!;\n expect(c2).toBeInstanceOf(\n ProvideTLVTransactionInstructionDescriptorCommand,\n );\n expect(c2.args.kind).toBe(\"empty\"); // Token Program missing\n expect(c2.args.isFirstMessage).toBe(false);\n expect(c2.args.swapSignatureTag).toBe(true);\n });\n });\n});\n"],
|
|
5
|
+
"mappings": "wdAMA,IAAAA,EAAmC,oCACnCC,EAGO,2CACPC,EAMO,6BACPC,EAQO,2BACPC,EAAiB,mBACjBC,EAAuB,kBACvBC,EAAwB,qBACxBC,EAAgE,kBAEhEC,EAA4C,oEAC5CC,EAAkE,0FAClEC,EAA+C,8EAE/CC,EAGO,2CAEP,MAAMC,EAAkB,EAAAC,QAAK,OAAO,IAAI,WAAW,EAAE,EAAE,KAAK,GAAI,CAAC,EAEjE,SAASC,EACPC,EACAC,EACAC,EACA,CACA,MAAMC,EAAQD,GAAYD,EAAQ,CAAC,GAAK,UAAQ,SAAS,EACnDG,EAAK,IAAI,cACfA,EAAG,gBAAkBP,EACrBO,EAAG,SAAWD,EAAM,UACpBC,EAAG,IAAI,GAAGJ,CAAG,EACb,MAAMK,EAAO,IAAI,IACXC,EAAO,CAACH,EAAO,GAAGF,CAAO,EAAE,OAAQM,GAAO,CAC9C,MAAMC,EAAID,EAAG,UAAU,SAAS,EAChC,OAAIF,EAAK,IAAIG,CAAC,EAAU,IACxBH,EAAK,IAAIG,CAAC,EACH,GACT,CAAC,EACD,OAAAJ,EAAG,KAAK,GAAGE,CAAI,EACR,CAAE,IAAKF,EAAG,UAAU,EAAG,MAAAD,CAAM,CACtC,CAEA,SAASM,EACPT,EACAC,EACAC,EACA,CACA,MAAMC,EAAQD,GAAYD,EAAQ,CAAC,GAAK,UAAQ,SAAS,EACnDS,EAAY,IAAI,qBAAmB,CACvC,SAAUP,EAAM,UAChB,gBAAiBN,EACjB,aAAcG,CAChB,CAAC,EAAE,mBAAmB,EAEhBW,EAAM,IAAI,uBAAqBD,CAAS,EAC9C,OAAAC,EAAI,KAAK,CAACR,EAAO,GAAGF,CAAO,CAAC,EACrB,CAAE,IAAKU,EAAI,UAAU,EAAG,MAAAR,CAAM,CACvC,CAEA,MAAMS,EAAWC,IAAoB,CAAE,SAAU,IAAMA,CAAO,GAExDC,EAAmBC,IACtB,CACC,iBAAkB,KAAG,GAAG,SAAYA,CAAO,CAC7C,MAEF,YAAS,+CAAgD,IAAM,CAC7D,IAAIC,EACJ,MAAMC,KAAU,wBAAqB,CAAE,KAAM,MAAU,CAAC,EAElDC,EAAW,CACf,QAAS,IAAI,WAAW,CAAC,IAAM,IAAM,IAAM,EAAI,CAAC,EAChD,eAAgB,CAClB,EACMC,EAAgB,IAAI,WAAW,CAAC,IAAM,IAAM,GAAI,CAAC,EAEjDC,EAAY,CAChB,QAAS,IAAI,WAAW,CAAC,IAAM,IAAM,IAAM,EAAI,CAAC,EAChD,eAAgB,CAClB,EAEMC,EAAkB,CACtB,KAAM,WACN,UAAW,UACb,EAEMC,EAAM,cAEZ,cAAW,IAAM,CACf,KAAG,cAAc,EACjBN,EAAM,CACJ,YAAa,KAAG,GAAG,CACrB,CACF,CAAC,KAGD,YAAS,gBAAiB,IAAM,IAC9B,MAAG,qFAAsF,SAAY,CAEnGA,EAAI,YACD,sBAAsBC,CAAO,EAC7B,sBAAsBA,CAAO,EAEhC,MAAMM,EAAU,CACd,0BAA2BL,EAC3B,cAAAC,EACA,eAAgB,CAAC,EACjB,iBAAkB,IAAI,WAAW,CAAC,GAAI,CAAC,CACzC,EAQMK,EAAS,MANF,IAAI,sCACfR,EACAO,CACF,EAG0B,IAAI,KAG9B,UAAOP,EAAI,WAAW,EAAE,sBAAsB,CAAC,EAE/C,MAAMS,EAAQT,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC9C,UAAOS,CAAK,EAAE,eAAe,wBAAsB,KACnD,UAAOA,EAAM,KAAK,WAAW,EAAE,cAAcP,EAAS,OAAO,KAC7D,UAAOO,EAAM,KAAK,QAAQ,EAAE,KAAKP,EAAS,cAAc,EAExD,MAAMQ,EAASV,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC/C,UAAOU,CAAM,EAAE,eAAe,6BAA2B,KACzD,UAAOA,EAAO,KAAK,OAAO,EAAE,cAAcP,CAAa,KAEvD,UAAOK,CAAM,EAAE,cAAc,SAAO,CACtC,CAAC,KAED,MAAG,2DAA4D,SAAY,CAEzER,EAAI,YAAY,sBAAsB,IAAI,MAAM,OAAO,CAAC,EAExD,MAAMO,EAAU,CACd,0BAA2BL,EAC3B,cAAAC,EACA,eAAgB,CAAC,EACjB,iBAAkB,IAAI,WAAW,CAAC,GAAI,CAAC,CACzC,EAEMQ,EAAO,IAAI,sCACfX,EACAO,CACF,EAEA,QAAM,UAAOI,EAAK,IAAI,CAAC,EAAE,QAAQ,QAAQ,OAAO,KAChD,UAAOX,EAAI,WAAW,EAAE,sBAAsB,CAAC,CACjD,CAAC,KAED,MAAG,gFAAiF,SAAY,CAE9FA,EAAI,YACD,sBAAsBC,CAAO,EAC7B,sBAAsBA,CAAO,EAEhC,MAAMW,EAAiB,CACrB,CAAE,KAAM,qBAAmB,MAAO,MAAO,CAAE,QAAS,KAAM,CAAS,CACrE,EAEML,EAAU,CACd,0BAA2BL,EAC3B,cAAAC,EACA,eAAAS,EACA,iBAAkB,IAAI,WAAW,CAAC,EAAI,CAAC,CACzC,EAOMJ,EAAS,MALF,IAAI,sCACfR,EACAO,CACF,EAE0B,IAAI,KAE9B,UAAOC,CAAM,EAAE,cAAc,SAAO,KACpC,UAAOR,EAAI,WAAW,EAAE,sBAAsB,CAAC,KAC/C,UAAOA,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,CAAE,EAAE,eACzC,wBACF,KACA,UAAOA,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,CAAE,EAAE,eACzC,6BACF,CACF,CAAC,CACH,CAAC,KAID,YAAS,wBAAyB,IAAM,IACtC,MAAG,mGAAoG,SAAY,CAEjHA,EAAI,YACD,sBAAsBC,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAEhC,MAAMW,EAAiB,CACrB,CACE,KAAM,qBAAmB,aACzB,QAAS,CACP,sBAAuBP,CACzB,EACA,YAAaD,CACf,CACF,EAEMG,EAAU,CACd,0BAA2BL,EAC3B,cAAAC,EACA,eAAAS,EACA,iBAAkB,IAAI,WAAW,CAAC,EAAI,CAAC,CACzC,EAQMJ,EAAS,MANF,IAAI,sCACfR,EACAO,CACF,EAG0B,IAAI,KAG9B,UAAOP,EAAI,WAAW,EAAE,sBAAsB,CAAC,EAE/C,MAAMa,EAAQb,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC9C,UAAOa,CAAK,EAAE,eAAe,wBAAsB,KACnD,UAAOA,EAAM,KAAK,WAAW,EAAE,cAAcT,EAAU,OAAO,KAC9D,UAAOS,EAAM,KAAK,QAAQ,EAAE,KAAKT,EAAU,cAAc,EAEzD,MAAMU,EAASd,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC/C,UAAOc,CAAM,EAAE,eACb,mDACF,KACA,UAAOA,EAAO,KAAK,IAAI,EAAE,KAAK,YAAY,KAC1C,UAAOA,EAAO,KAAK,OAAO,EAAE,KAAKT,EAAgB,IAAI,KACrD,UAAOS,EAAO,KAAK,YAAY,EAAE,KAAKT,EAAgB,SAAS,KAC/D,UAAOS,EAAO,KAAK,cAAc,EAAE,KAAK,EAAI,KAC5C,UAAOA,EAAO,KAAK,gBAAgB,EAAE,KAAK,EAAK,KAE/C,UAAON,CAAM,EAAE,cAAc,SAAO,CACtC,CAAC,KAED,MAAG,2DAA4D,SAAY,CAEzER,EAAI,YACD,sBAAsBC,CAAO,EAC7B,sBAAsBA,CAAO,EAEhC,MAAMW,EAAiB,CACrB,CACE,KAAM,qBAAmB,aACzB,QAAS,OACT,YAAaR,CACf,CACF,EAEMG,EAAU,CACd,0BAA2BL,EAC3B,cAAAC,EACA,eAAAS,EACA,iBAAkB,IAAI,WAAW,CAAC,GAAI,CAAC,CACzC,EAQMJ,EAAS,MANF,IAAI,sCACfR,EACAO,CACF,EAG0B,IAAI,KAG9B,UAAOP,EAAI,WAAW,EAAE,sBAAsB,CAAC,KAC/C,UAAOQ,CAAM,EAAE,cAAc,SAAO,CACtC,CAAC,KAED,MAAG,+DAAgE,SAAY,CAE7ER,EAAI,YACD,sBAAsBC,CAAO,EAC7B,sBAAsBA,CAAO,EAEhC,MAAMW,EAAiB,CACrB,CACE,KAAM,qBAAmB,aACzB,QAAS,CAAE,sBAAuBP,CAAgB,EAClD,YAAa,MACf,CACF,EAEME,EAAU,CACd,0BAA2BL,EAC3B,cAAAC,EACA,eAAAS,EACA,iBAAkB,IAAI,WAAW,CAAC,GAAI,CAAC,CACzC,EAQMJ,EAAS,MANF,IAAI,sCACfR,EACAO,CACF,EAG0B,IAAI,KAG9B,UAAOP,EAAI,WAAW,EAAE,sBAAsB,CAAC,KAC/C,UAAOQ,CAAM,EAAE,cAAc,SAAO,CACtC,CAAC,KAED,MAAG,oFAAqF,SAAY,CAElG,MAAMO,KAAc,wBAAqB,CACvC,MAAO,CAAE,KAAM,YAAa,UAAW,MAAQ,QAAS,KAAM,CAChE,CAAC,EAEDf,EAAI,YACD,sBAAsBC,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBc,CAAW,EAEpC,MAAMH,EAAiB,CACrB,CACE,KAAM,qBAAmB,aACzB,QAAS,CAAE,sBAAuBP,CAAgB,EAClD,YAAaD,CACf,CACF,EAEMG,EAAU,CACd,0BAA2BL,EAC3B,cAAAC,EACA,eAAAS,EACA,iBAAkB,IAAI,WAAW,CAAC,GAAI,CAAC,CACzC,EAEMD,EAAO,IAAI,sCACfX,EACAO,CACF,EAGA,QAAM,UAAOI,EAAK,IAAI,CAAC,EAAE,QAAQ,QAC/B,yIACF,KAGA,UAAOX,EAAI,WAAW,EAAE,sBAAsB,CAAC,EAC/C,MAAMa,EAAQb,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC9C,UAAOa,CAAK,EAAE,eAAe,wBAAsB,CACrD,CAAC,KAED,MAAG,+EAAgF,SAAY,CAE7Fb,EAAI,YACD,sBAAsBC,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAEhC,MAAMW,EAAiB,CACrB,CACE,KAAM,qBAAmB,aACzB,QAAS,CAAE,sBAAuBP,CAAgB,EAClD,YAAaD,CACf,CAEF,EAEMG,EAAU,CACd,0BAA2BL,EAC3B,cAAAC,EACA,eAAAS,EACA,iBAAkB,IAAI,WAAW,CAAC,EAAI,CAAC,CACzC,EAQMJ,EAAS,MANF,IAAI,sCACfR,EACAO,EACA,CAAE,iBAAkB,KAAG,GAAG,CAAE,CAC9B,EAE0B,IAAI,KAE9B,UAAOC,CAAM,EAAE,cAAc,SAAO,KAEpC,UAAOR,EAAI,WAAW,EAAE,sBAAsB,CAAC,KAC/C,UAAOA,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,CAAE,EAAE,eACzC,wBACF,KACA,UAAOA,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,CAAE,EAAE,eACzC,6BACF,KACA,UAAOA,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,CAAE,EAAE,eACzC,wBACF,EACA,MAAMgB,EAAWhB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KACjD,UAAOgB,CAAQ,EAAE,eACf,mDACF,KACA,UAAOA,EAAS,KAAK,gBAAgB,EAAE,KAAK,EAAK,KACjD,UAAOA,EAAS,KAAK,cAAc,EAAE,KAAK,EAAI,CAChD,CAAC,CACH,CAAC,KAGD,YAAS,+BAAgC,IAAM,IAC7C,MAAG,oGAAqG,SAAY,CAElHhB,EAAI,YACD,sBAAsBC,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,kBAAkBA,CAAO,EAE5B,MAAMF,EAAU,CACd,qBAAsB,CACpB,CAAE,eAAgB,CAAE,EACpB,CAAE,eAAgB,CAAE,EACpB,CAAE,eAAgB,CAAE,CACtB,EACA,QAAS,CAACH,EAAQ,OAAO,EAAGA,EAAQ,OAAO,EAAGA,EAAQ,OAAO,CAAC,CAChE,EACMqB,EAAanB,EAAgBC,CAAO,EAEpCa,EAAiB,CACrB,CACE,KAAM,qBAAmB,aACzB,QAAS,CAAE,sBAAuBP,CAAgB,EAClD,YAAaD,CACf,EACA,CACE,KAAM,qBAAmB,YACzB,QAAS,CACP,MAAO,CAAE,KAAME,EAAK,WAAY,CAAE,CAAC,WAAS,EAAGA,CAAI,CAAE,EAErD,MAAO,CAAE,KAAMA,EAAK,WAAY,CAAE,CAAC,WAAS,EAAGA,CAAI,CAAE,CACvD,CACF,CACF,EAEMC,EAAU,CACd,0BAA2BL,EAC3B,cAAAC,EACA,eAAAS,EACA,iBAAkB,IAAI,WAAW,CAAC,GAAI,CAAC,CACzC,EASMJ,EAAS,MAPF,IAAI,sCACfR,EACAO,EACAU,CACF,EAG0B,IAAI,KAG9B,UAAOT,CAAM,EAAE,cAAc,SAAO,KAEpC,UAAOR,EAAI,WAAW,EAAE,sBAAsB,CAAC,EAG/C,MAAMkB,EAAKlB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOkB,CAAE,EAAE,eACT,mDACF,KACA,UAAOA,EAAG,KAAK,IAAI,EAAE,KAAK,YAAY,KACtC,UAAOA,EAAG,KAAK,OAAO,EAAE,KAAKZ,CAAG,KAChC,UAAOY,EAAG,KAAK,YAAY,EAAE,KAAKZ,CAAG,KACrC,UAAOY,EAAG,KAAK,cAAc,EAAE,KAAK,EAAI,KACxC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,EAE1C,MAAMC,EAAKnB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOmB,CAAE,EAAE,eACT,mDACF,KACA,UAAOA,EAAG,KAAK,IAAI,EAAE,KAAK,OAAO,KACjC,UAAOA,EAAG,KAAK,cAAc,EAAE,KAAK,EAAK,KACzC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,EAE1C,MAAMC,EAAKpB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOoB,CAAE,EAAE,eACT,mDACF,KACA,UAAOA,EAAG,KAAK,IAAI,EAAE,KAAK,YAAY,KACtC,UAAOA,EAAG,KAAK,OAAO,EAAE,KAAKd,CAAG,KAChC,UAAOc,EAAG,KAAK,YAAY,EAAE,KAAKd,CAAG,KACrC,UAAOc,EAAG,KAAK,cAAc,EAAE,KAAK,EAAK,KACzC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,KAE1C,UAAQH,EAAmB,gBAAgB,EAAE,qBAAqB,CACpE,CAAC,KAED,MAAG,0EAA2E,SAAY,CAExFjB,EAAI,YACD,sBAAsBC,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,kBAAkBA,CAAO,EAE5B,MAAMF,EAAU,CACd,qBAAsB,CAAC,CAAE,eAAgB,CAAE,CAAC,EAC5C,QAAS,CAACH,EAAQ,UAAU,CAAC,CAC/B,EACMqB,EAAanB,EAAgBC,CAAO,EAEpCa,EAAiB,CACrB,CACE,KAAM,qBAAmB,aACzB,QAAS,CAAE,sBAAuBP,CAAgB,EAClD,YAAaD,CACf,EACA,CACE,KAAM,qBAAmB,YACzB,QAAS,CACP,SAAU,CACR,KAAME,EACN,WAAY,CAEZ,CACF,CACF,CACF,CACF,EAEMC,EAAU,CACd,0BAA2BL,EAC3B,cAAAC,EACA,eAAAS,EACA,iBAAkB,IAAI,WAAW,CAAC,GAAI,CAAC,CACzC,EAQMJ,EAAS,MANF,IAAI,sCACfR,EACAO,EACAU,CACF,EAE0B,IAAI,KAE9B,UAAOT,CAAM,EAAE,cAAc,SAAO,KAEpC,UAAOR,EAAI,WAAW,EAAE,sBAAsB,CAAC,EAE/C,MAAMkB,EAAKlB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOkB,CAAE,EAAE,eACT,mDACF,KACA,UAAOA,EAAG,KAAK,IAAI,EAAE,KAAK,OAAO,KACjC,UAAOA,EAAG,KAAK,cAAc,EAAE,KAAK,EAAI,KACxC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,CAC5C,CAAC,KAED,MAAG,2DAA4D,SAAY,CAEzElB,EAAI,YACD,sBAAsBC,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,kBAAkBA,CAAO,EAE5B,MAAMF,EAAU,CACd,qBAAsB,CAAC,CAAE,eAAgB,CAAE,CAAC,EAC5C,QAAS,CAACH,EAAQ,GAAG,CAAC,CACxB,EACMqB,EAAanB,EAAgBC,CAAO,EAEpCa,EAAiB,CACrB,CACE,KAAM,qBAAmB,aACzB,QAAS,CAAE,sBAAuBP,CAAgB,EAClD,YAAaD,CACf,EACA,CAAE,KAAM,qBAAmB,YAAa,QAAS,CAAC,CAAE,CACtD,EAEMG,EAAU,CACd,0BAA2BL,EAC3B,cAAAC,EACA,eAAAS,EACA,iBAAkB,IAAI,WAAW,CAAC,GAAI,CAAC,CACzC,EAQMJ,EAAS,MANF,IAAI,sCACfR,EACAO,EACAU,CACF,EAE0B,IAAI,KAE9B,UAAOT,CAAM,EAAE,cAAc,SAAO,KAEpC,UAAOR,EAAI,WAAW,EAAE,sBAAsB,CAAC,EAE/C,MAAMkB,EAAKlB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOkB,CAAE,EAAE,eACT,mDACF,KACA,UAAOA,EAAG,KAAK,IAAI,EAAE,KAAK,OAAO,KACjC,UAAOA,EAAG,KAAK,cAAc,EAAE,KAAK,EAAI,KACxC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,CAC5C,CAAC,KAED,MAAG,gHAAiH,SAAY,CAE9HlB,EAAI,YACD,sBAAsBC,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsB,IAAI,MAAM,KAAK,CAAC,EAEzC,MAAMF,EAAU,CACd,qBAAsB,CACpB,CAAE,eAAgB,CAAE,EACpB,CAAE,eAAgB,CAAE,EACpB,CAAE,eAAgB,CAAE,CACtB,EACA,QAAS,CAACH,EAAQ,OAAO,EAAGA,EAAQ,OAAO,EAAGA,EAAQ,OAAO,CAAC,CAChE,EACMqB,EAAanB,EAAgBC,CAAO,EAEpCa,EAAiB,CACrB,CACE,KAAM,qBAAmB,aACzB,QAAS,CAAE,sBAAuBP,CAAgB,EAClD,YAAaD,CACf,EACA,CACE,KAAM,qBAAmB,YACzB,QAAS,CACP,MAAO,CAAE,KAAME,EAAK,WAAY,CAAE,CAAC,WAAS,EAAGA,CAAI,CAAE,EAErD,MAAO,CAAE,KAAMA,EAAK,WAAY,CAAE,CAAC,WAAS,EAAGA,CAAI,CAAE,CACvD,CACF,CACF,EAEMC,EAAU,CACd,0BAA2BL,EAC3B,cAAAC,EACA,eAAAS,EACA,iBAAkB,IAAI,WAAW,CAAC,EAAI,CAAC,CACzC,EAEMD,EAAO,IAAI,sCACfX,EACAO,EACAU,CACF,EAEA,QAAM,UAAON,EAAK,IAAI,CAAC,EAAE,QAAQ,QAAQ,KAAK,KAE9C,UAAOX,EAAI,WAAW,EAAE,sBAAsB,CAAC,EAE/C,MAAMkB,EAAKlB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOkB,CAAE,EAAE,eACT,mDACF,KACA,UAAOA,EAAG,KAAK,IAAI,EAAE,KAAK,YAAY,KACtC,UAAOA,EAAG,KAAK,cAAc,EAAE,KAAK,EAAI,KACxC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,EAE1C,MAAMC,EAAKnB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOmB,CAAE,EAAE,eACT,mDACF,KACA,UAAOA,EAAG,KAAK,IAAI,EAAE,KAAK,OAAO,KACjC,UAAOA,EAAG,KAAK,cAAc,EAAE,KAAK,EAAK,KACzC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,CAC5C,CAAC,KAED,MAAG,uDAAwD,SAAY,CAErEnB,EAAI,YACD,sBAAsBC,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,kBAAkBA,CAAO,EAE5B,MAAMF,EAAU,CACd,qBAAsB,CAAC,CAAE,eAAgB,CAAE,CAAC,EAC5C,QAAS,CAACH,EAAQ,SAAS,CAAC,CAC9B,EACMqB,EAAanB,EAAgBC,CAAO,EAEpCa,EAAiB,CACrB,CACE,KAAM,qBAAmB,aACzB,QAAS,CAAE,sBAAuBP,CAAgB,EAClD,YAAaD,CACf,EACA,CACE,KAAM,qBAAmB,YACzB,QAAS,CACP,QAAS,CACP,KAAME,EACN,WAAY,CAAE,KAAM,WAAY,CAAC,WAAS,EAAGA,CAAI,CACnD,CACF,CACF,CACF,EAEMC,EAAU,CACd,0BAA2BL,EAC3B,cAAAC,EACA,eAAAS,EACA,iBAAkB,IAAI,WAAW,CAAC,GAAI,CAAC,CACzC,EAQMJ,EAAS,MANF,IAAI,sCACfR,EACAO,EACAU,CACF,EAE0B,IAAI,KAE9B,UAAOT,CAAM,EAAE,cAAc,SAAO,KAEpC,UAAOR,EAAI,WAAW,EAAE,sBAAsB,CAAC,EAE/C,MAAMkB,EAAKlB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOkB,CAAE,EAAE,eACT,mDACF,KACA,UAAOA,EAAG,KAAK,IAAI,EAAE,KAAK,YAAY,KACtC,UAAOA,EAAG,KAAK,OAAO,EAAE,KAAKZ,CAAG,KAChC,UAAOY,EAAG,KAAK,YAAY,EAAE,KAAKZ,CAAG,KACrC,UAAOY,EAAG,KAAK,cAAc,EAAE,KAAK,EAAI,KACxC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,CAC5C,CAAC,KAED,MAAG,2IAA4I,SAAY,CAEzJlB,EAAI,YACD,sBAAsBC,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,kBAAkBA,CAAO,EAE5B,MAAMd,EAAQ,UAAQ,SAAS,EACzBkC,EAAQ,UAAQ,SAAS,EAAE,UAC3BC,EAAM,gBAAc,SAAS,CACjC,WAAYnC,EAAM,UAClB,SAAUkC,EACV,SAAU,IACZ,CAAC,EAEKE,EAAQ,UAAQ,SAAS,EACzBC,EAAW,UAAQ,SAAS,EAAE,UAC9BC,EAAW,UAAQ,SAAS,EAAE,UAC9BC,KAAM,6BACVF,EACAC,EACAF,EAAM,UACN,IACA,CAAC,EACD,kBACF,EAEMI,EAAkB,IAAI,YAC1B,6CACF,EACMC,EAAM,IAAI,yBAAuB,CACrC,UAAWD,EACX,KAAM,CAAC,EACP,KAAM,SAAO,KAAK,IAAI,CACxB,CAAC,EAEK,CAAE,IAAAE,CAAI,EAAI9C,EACd,CAACuC,EAAKI,EAAKE,CAAG,EACd,CAACzC,EAAOoC,CAAK,EACbpC,CACF,EAEM2C,EAAa,gBAAc,UAAU,SAAS,EAC9CC,EAAWJ,EAAgB,SAAS,EAEpCf,EAAiB,CACrB,CACE,KAAM,qBAAmB,aACzB,QAAS,CAAE,sBAAuBP,CAAgB,EAClD,YAAaD,CACf,EACA,CACE,KAAM,qBAAmB,YACzB,QAAS,CACP,CAAC0B,CAAU,EAAG,CAAE,KAAMxB,EAAK,WAAY,CAAE,CAAC,WAAS,EAAGA,CAAI,CAAE,EAE5D,CAACyB,CAAQ,EAAG,CAAE,KAAMzB,EAAK,WAAY,CAAE,CAAC,WAAS,EAAGA,CAAI,CAAE,CAC5D,CACF,CACF,EAEMC,EAAU,CACd,0BAA2BL,EAC3B,cAAAC,EACA,eAAAS,EACA,iBAAkBiB,CACpB,EAQMrB,EAAS,MANF,IAAI,sCACfR,EACAO,EACA,gCACF,EAE0B,IAAI,KAE9B,UAAOC,CAAM,EAAE,cAAc,SAAO,KAEpC,UAAOR,EAAI,WAAW,EAAE,sBAAsB,CAAC,EAE/C,MAAMkB,EAAKlB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOkB,EAAG,KAAK,IAAI,EAAE,KAAK,YAAY,KACtC,UAAOA,EAAG,KAAK,cAAc,EAAE,KAAK,EAAI,KACxC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,EAE1C,MAAMC,EAAKnB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOmB,EAAG,KAAK,IAAI,EAAE,KAAK,OAAO,KACjC,UAAOA,EAAG,KAAK,cAAc,EAAE,KAAK,EAAK,KACzC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,EAE1C,MAAMC,EAAKpB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOoB,EAAG,KAAK,IAAI,EAAE,KAAK,YAAY,KACtC,UAAOA,EAAG,KAAK,cAAc,EAAE,KAAK,EAAK,KACzC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,CAC5C,CAAC,KAED,MAAG,iJAAkJ,SAAY,CAE/JpB,EAAI,YACD,sBAAsBC,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,kBAAkBA,CAAO,EAE5B,MAAMd,EAAQ,UAAQ,SAAS,EACzB6C,EAAU,UAAQ,SAAS,EAAE,UAC7BC,EAAQ,gBAAc,SAAS,CACnC,WAAY9C,EAAM,UAClB,SAAU6C,EACV,SAAU,IACZ,CAAC,EAEKT,EAAQ,UAAQ,SAAS,EAAE,UAC3BW,EAAO,UAAQ,SAAS,EAAE,UAC1BC,KAAM,iCACVD,EACAX,EACA,GACA,mBACA,6BACF,EACMa,KAAQ,2CACZjD,EAAM,UACNgD,EACAZ,EACAW,EACA,mBACA,6BACF,EAEMP,EAAkB,IAAI,YAC1B,6CACF,EACMU,EAAS,IAAI,yBAAuB,CACxC,UAAWV,EACX,KAAM,CAAC,EACP,KAAM,SAAO,KAAK,OAAO,CAC3B,CAAC,EAGK,CAAE,IAAAE,CAAI,EAAIpC,EAAgB,CAACwC,EAAOG,EAAOC,CAAM,EAAG,CAAC,EAAGlD,CAAK,EAE3D2C,EAAa,gBAAc,UAAU,SAAS,EAC9CQ,EAAU,8BAA4B,SAAS,EAE/C1B,EAAiB,CACrB,CACE,KAAM,qBAAmB,aACzB,QAAS,CAAE,sBAAuBP,CAAgB,EAClD,YAAaD,CACf,EACA,CACE,KAAM,qBAAmB,YACzB,QAAS,CACP,CAAC0B,CAAU,EAAG,CAAE,KAAMxB,EAAK,WAAY,CAAE,CAAC,WAAS,EAAGA,CAAI,CAAE,EAC5D,CAACgC,CAAO,EAAG,CAAE,KAAMhC,EAAK,WAAY,CAAE,CAAC,WAAS,EAAGA,CAAI,CAAE,CAE3D,CACF,CACF,EACMC,EAAU,CACd,0BAA2BL,EAC3B,cAAAC,EACA,eAAAS,EACA,iBAAkBiB,CACpB,EAQMU,EAAM,MANC,IAAI,sCACfvC,EACAO,EACA,gCACF,EAEuB,IAAI,KAE3B,UAAOgC,CAAG,EAAE,QAAQ,SAAO,KAE3B,UAAOvC,EAAI,WAAW,EAAE,sBAAsB,CAAC,EAE/C,MAAMkB,EAAKlB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOkB,CAAE,EAAE,eACT,mDACF,KACA,UAAOA,EAAG,KAAK,IAAI,EAAE,KAAK,YAAY,KACtC,UAAOA,EAAG,KAAK,cAAc,EAAE,KAAK,EAAI,KACxC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,EAE1C,MAAMC,EAAKnB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOmB,CAAE,EAAE,eACT,mDACF,KACA,UAAOA,EAAG,KAAK,IAAI,EAAE,KAAK,YAAY,KACtC,UAAOA,EAAG,KAAK,cAAc,EAAE,KAAK,EAAK,KACzC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,EAE1C,MAAMC,EAAKpB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOoB,CAAE,EAAE,eACT,mDACF,KACA,UAAOA,EAAG,KAAK,IAAI,EAAE,KAAK,OAAO,KACjC,UAAOA,EAAG,KAAK,cAAc,EAAE,KAAK,EAAK,KACzC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,CAC5C,CAAC,KAED,MAAG,yKAA0K,SAAY,CAEvLpB,EAAI,YACD,sBAAsBC,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,sBAAsBA,CAAO,EAC7B,kBAAkBA,CAAO,EAE5B,MAAMd,EAAQ,UAAQ,SAAS,EAEzB6C,EAAU,UAAQ,SAAS,EAAE,UAC7BC,EAAQ,gBAAc,SAAS,CACnC,WAAY9C,EAAM,UAClB,SAAU6C,EACV,SAAU,IACZ,CAAC,EAEKQ,EAAa,UAAQ,SAAS,EAC9BN,EAAO,UAAQ,SAAS,EAAE,UAE1BO,EAAiB,UAAQ,SAAS,EAAE,UACpCC,KAAe,iCACnBR,EACAO,EACA,GACA,mBACA,6BACF,EAEME,KAAc,2CAClBxD,EAAM,UACNuD,EACAD,EACAP,EACA,mBACA,6BACF,EAEMU,EAAc,UAAQ,SAAS,EAAE,UACjCC,KAAa,6BACjBD,EACAF,EACAF,EAAW,UACX,GACA,CAAC,EACD,kBACF,EAGM,CAAE,IAAAX,CAAI,EAAIpC,EACd,CAACwC,EAAOU,EAAaE,CAAU,EAC/B,CAACL,CAAU,EACXrD,CACF,EAEM2C,EAAa,gBAAc,UAAU,SAAS,EAC9CQ,EAAU,8BAA4B,SAAS,EAE/C1B,EAAiB,CACrB,CACE,KAAM,qBAAmB,aACzB,QAAS,CAAE,sBAAuBP,CAAgB,EAClD,YAAaD,CACf,EACA,CACE,KAAM,qBAAmB,YACzB,QAAS,CACP,CAAC0B,CAAU,EAAG,CAAE,KAAMxB,EAAK,WAAY,CAAE,CAAC,WAAS,EAAGA,CAAI,CAAE,EAC5D,CAACgC,CAAO,EAAG,CAAE,KAAMhC,EAAK,WAAY,CAAE,CAAC,WAAS,EAAGA,CAAI,CAAE,CAE3D,CACF,CACF,EAEMC,EAAU,CACd,0BAA2BL,EAC3B,cAAAC,EACA,eAAAS,EACA,iBAAkBiB,CACpB,EASMU,EAAM,MANC,IAAI,sCACfvC,EACAO,EACA,gCACF,EAEuB,IAAI,KAG3B,UAAOgC,CAAG,EAAE,QAAQ,SAAO,KAE3B,UAAOvC,EAAI,WAAW,EAAE,sBAAsB,CAAC,EAG/C,MAAMkB,EAAKlB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOkB,CAAE,EAAE,eACT,mDACF,KACA,UAAOA,EAAG,KAAK,IAAI,EAAE,KAAK,YAAY,KACtC,UAAOA,EAAG,KAAK,cAAc,EAAE,KAAK,EAAI,KACxC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,EAE1C,MAAMC,EAAKnB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOmB,CAAE,EAAE,eACT,mDACF,KACA,UAAOA,EAAG,KAAK,IAAI,EAAE,KAAK,YAAY,KACtC,UAAOA,EAAG,KAAK,cAAc,EAAE,KAAK,EAAK,KACzC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,EAE1C,MAAMC,EAAKpB,EAAI,YAAY,KAAK,MAAM,CAAC,EAAG,CAAC,KAC3C,UAAOoB,CAAE,EAAE,eACT,mDACF,KACA,UAAOA,EAAG,KAAK,IAAI,EAAE,KAAK,OAAO,KACjC,UAAOA,EAAG,KAAK,cAAc,EAAE,KAAK,EAAK,KACzC,UAAOA,EAAG,KAAK,gBAAgB,EAAE,KAAK,EAAI,CAC5C,CAAC,CACH,CAAC,CACH,CAAC",
|
|
6
|
+
"names": ["import_context_module", "import_device_management_kit", "import_spl_token", "import_web3", "import_bs58", "import_buffer", "import_purify_ts", "import_vitest", "import_ProvideTLVDescriptorCommand", "import_ProvideTLVTransactionInstructionDescriptorCommand", "import_DefaultSolanaMessageNormaliser", "import_ProvideTransactionContextTask", "DUMMY_BLOCKHASH", "bs58", "makeSignedRawLegacy", "ixs", "signers", "feePayer", "payer", "tx", "seen", "uniq", "kp", "k", "makeSignedRawV0", "messageV0", "vtx", "makeKey", "base58", "buildNormaliser", "message", "api", "success", "baseCert", "tlvDescriptor", "tokenCert", "tokenDescriptor", "SIG", "context", "result", "first", "second", "task", "loadersResults", "third", "fourth", "errorResult", "tokenCmd", "normaliser", "c0", "c1", "c2", "dest1", "ix1", "owner", "srcToken", "dstToken", "ix2", "MEMO_PROGRAM_ID", "ix3", "raw", "SYSTEM_PID", "MEMO_PID", "sysDest", "sysIx", "mint", "ata", "ataIx", "memoIx", "ATA_PID", "res", "tokenOwner", "recipientOwner", "recipientATA", "createAtaIx", "srcTokenAcc", "transferIx"]
|
|
7
|
+
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var
|
|
1
|
+
"use strict";var u=Object.defineProperty;var R=Object.getOwnPropertyDescriptor;var v=Object.getOwnPropertyNames;var D=Object.prototype.hasOwnProperty;var w=(i,t)=>{for(var e in t)u(i,e,{get:t[e],enumerable:!0})},B=(i,t,e,n)=>{if(t&&typeof t=="object"||typeof t=="function")for(let r of v(t))!D.call(i,r)&&r!==e&&u(i,r,{get:()=>t[r],enumerable:!(n=R(t,r))||n.enumerable});return i};var M=i=>B(u({},"__esModule",{value:!0}),i);var G={};w(G,{MAX_MESSAGE_LENGTH:()=>g,MessageFormat:()=>S,SendSignMessageTask:()=>N});module.exports=M(G);var a=require("@ledgerhq/device-management-kit"),A=require("@ledgerhq/signer-utils"),m=require("../../app-binder/command/GetPubKeyCommand"),E=require("../../app-binder/command/SignOffChainMessageCommand"),_=require("../../app-binder/services/bs58Encoder"),C=require("./SendCommandInChunksTask");const F=15*1024,k=1280,y=40,I=8,P=F-y-I,p=k-y-I,f=65515,x=126,L=32,O=10;var S=(n=>(n[n.Ascii=0]="Ascii",n[n.Utf8=1]="Utf8",n[n.Utf8LongV0=2]="Utf8LongV0",n))(S||{});const g=f;class N{constructor(t,e,n=_.DefaultBs58Encoder){this.api=t;this.args=e;this.bs58Encoder=n}async run(){const{sendingData:t,derivationPath:e}=this.args;if(t.length===0)return(0,a.CommandResultFactory)({error:new a.InvalidStatusWordError("Message cannot be empty")});if(t.length>g)return(0,a.CommandResultFactory)({error:new a.InvalidStatusWordError(`Message too long: ${t.length} bytes (max is ${g})`)});const n=A.DerivationPathUtils.splitPath(e),r=await this.api.sendCommand(new m.GetPubKeyCommand({derivationPath:e,checkOnDevice:!1}));if(!("data"in r))return(0,a.CommandResultFactory)({error:new a.InvalidStatusWordError("Error getting public key from device")});const o=this.bs58Encoder.decode(r.data),h=this._buildFullMessage(t,o,!1),b=this._buildApduCommand(h,n),d=await this._sendInChunks(b);if((0,a.isSuccessCommandResult)(d))try{const s=this._buildEnvelopeBase58(d.data,h);return(0,a.CommandResultFactory)({data:{signature:s}})}catch(s){return(0,a.CommandResultFactory)({error:new a.InvalidStatusWordError(s instanceof Error?s.message:String(s))})}const U="error"in d?d.error:void 0;if(this._isInvalidOffchainHeaderError(U)){if(t.length>p)return d;const s=this._buildFullMessage(t,o,!0),T=this._buildApduCommand(s,n),c=await this._sendInChunks(T);if((0,a.isSuccessCommandResult)(c))try{const l=this._buildEnvelopeBase58(c.data,s);return(0,a.CommandResultFactory)({data:{signature:l}})}catch(l){return(0,a.CommandResultFactory)({error:new a.InvalidStatusWordError(l instanceof Error?l.message:String(l))})}return c}return d}_isUTF8(t){try{return new TextDecoder("utf-8",{fatal:!0}).decode(t),!0}catch{return!1}}_findMessageFormat(t,e){const n=e?p:P;if(t.length<=n){if(this._isPrintableASCII(t,e))return 0;if(this._isUTF8(t))return 1}else if(t.length<=f){if(this._isUTF8(t))return 2}else throw new a.InvalidStatusWordError(`Message too long: ${t.length} bytes (max is ${f})`);return 0}_isPrintableASCII(t,e){for(let n=0;n<t.length;n++){const r=t[n];if(!(!e&&r===O)&&(r<L||r>x))return!1}return!0}_buildFullMessage(t,e,n){const r=this._findMessageFormat(t,n),o=new a.ByteArrayBuilder;return o.add8BitUIntToData(255).addAsciiStringToData("solana offchain"),o.add8BitUIntToData(0),n||o.addBufferToData(new Uint8Array(32)),o.add8BitUIntToData(r),n||(o.add8BitUIntToData(1),o.addBufferToData(e)),o.add8BitUIntToData(t.length&255),o.add8BitUIntToData(t.length>>8&255),o.addBufferToData(t),o.build()}_isInvalidOffchainHeaderError(t){if(!t||typeof t!="object")return!1;const e=t,n=e._tag,r=e.errorCode;return typeof n=="string"&&typeof r=="string"&&r.toLowerCase()==="6a81"}_buildApduCommand(t,e){const n=new a.ByteArrayBuilder(2+e.length*4+t.length);return n.add8BitUIntToData(1),n.add8BitUIntToData(e.length),e.forEach(r=>n.add32BitUIntToData(r)),n.addBufferToData(t),n.build()}async _sendInChunks(t){const e=n=>new E.SignOffChainMessageCommand(n);return await new C.SendCommandInChunksTask(this.api,{data:t,commandFactory:e}).run()}_buildEnvelopeBase58(t,e){if(t.length!==64)throw new a.InvalidStatusWordError(`Invalid signature length: ${t.length} (expected 64)`);const n=Uint8Array.of(1),r=new Uint8Array(n.length+t.length+e.length);return r.set(n,0),r.set(t,n.length),r.set(e,n.length+t.length),this.bs58Encoder.encode(r)}}0&&(module.exports={MAX_MESSAGE_LENGTH,MessageFormat,SendSignMessageTask});
|
|
2
2
|
//# sourceMappingURL=SendSignMessageTask.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/task/SendSignMessageTask.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n
|
|
5
|
-
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,
|
|
6
|
-
"names": ["SendSignMessageTask_exports", "__export", "SendSignMessageTask", "__toCommonJS", "import_device_management_kit", "import_signer_utils", "import_SignOffChainMessageCommand", "api", "args", "sendingData", "derivationPath", "
|
|
4
|
+
"sourcesContent": ["import {\n ByteArrayBuilder,\n type CommandResult,\n CommandResultFactory,\n type InternalApi,\n InvalidStatusWordError,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\nimport { DerivationPathUtils } from \"@ledgerhq/signer-utils\";\n\nimport { GetPubKeyCommand } from \"@internal/app-binder/command/GetPubKeyCommand\";\nimport {\n SignOffChainMessageCommand,\n type SignOffChainRawResponse,\n} from \"@internal/app-binder/command/SignOffChainMessageCommand\";\nimport { type SolanaAppErrorCodes } from \"@internal/app-binder/command/utils/SolanaApplicationErrors\";\nimport {\n type Bs58Encoder,\n DefaultBs58Encoder,\n} from \"@internal/app-binder/services/bs58Encoder\";\n\nimport {\n type CommandFactory,\n SendCommandInChunksTask,\n} from \"./SendCommandInChunksTask\";\n\nconst DEVICE_V0_PAYLOAD_CEILING = 15 * 1024; // 15360\nconst DEVICE_LEGACY_PAYLOAD_CEILING = 1280;\n\n// bytes reserved by app/header and transport\nconst RESERVED_HEADER_BYTES = 40;\nconst RESERVED_TRANSPORT_BYTES = 8;\n\n// derived usable body sizes\nconst OFFCHAINMSG_MAX_LEN =\n DEVICE_V0_PAYLOAD_CEILING - RESERVED_HEADER_BYTES - RESERVED_TRANSPORT_BYTES; // 15312\n\nconst LEGACY_OFFCHAINMSG_MAX_LEN =\n DEVICE_LEGACY_PAYLOAD_CEILING -\n RESERVED_HEADER_BYTES -\n RESERVED_TRANSPORT_BYTES; // 1232\n\n// device cap for v0 long UTF-8\nconst OFFCHAINMSG_MAX_V0_LEN = 65515;\n\nconst MAX_PRINTABLE_ASCII = 0x7e;\nconst MIN_PRINTABLE_ASCII = 0x20;\nconst LINE_FEED_ASCII = 0x0a;\n\nexport enum MessageFormat {\n Ascii = 0,\n Utf8 = 1,\n Utf8LongV0 = 2,\n}\n\nexport const MAX_MESSAGE_LENGTH = OFFCHAINMSG_MAX_V0_LEN;\n\nexport type SendSignMessageTaskArgs = {\n sendingData: Uint8Array;\n derivationPath: string;\n};\n\nexport type SendSignMessageTaskRunFunctionReturn = Promise<\n CommandResult<{ signature: string }, SolanaAppErrorCodes>\n>;\n\nexport class SendSignMessageTask {\n constructor(\n private api: InternalApi,\n private args: SendSignMessageTaskArgs,\n private readonly bs58Encoder: Bs58Encoder = DefaultBs58Encoder,\n ) {}\n\n async run(): SendSignMessageTaskRunFunctionReturn {\n const { sendingData, derivationPath } = this.args;\n\n if (sendingData.length === 0) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\"Message cannot be empty\"),\n });\n }\n if (sendingData.length > MAX_MESSAGE_LENGTH) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\n `Message too long: ${sendingData.length} bytes (max is ${MAX_MESSAGE_LENGTH})`,\n ),\n });\n }\n\n const paths = DerivationPathUtils.splitPath(derivationPath);\n\n const pubkeyResult = await this.api.sendCommand(\n new GetPubKeyCommand({ derivationPath, checkOnDevice: false }),\n );\n if (!(\"data\" in pubkeyResult)) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\n \"Error getting public key from device\",\n ),\n });\n }\n const signerPubkey = this.bs58Encoder.decode(pubkeyResult.data);\n\n // try v0 first\n const v0OCM = this._buildFullMessage(sendingData, signerPubkey, false);\n const v0Payload = this._buildApduCommand(v0OCM, paths);\n const v0Res = await this._sendInChunks(v0Payload);\n\n if (isSuccessCommandResult(v0Res)) {\n try {\n const sigB58 = this._buildEnvelopeBase58(v0Res.data, v0OCM);\n return CommandResultFactory({ data: { signature: sigB58 } });\n } catch (e) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\n e instanceof Error ? e.message : String(e),\n ),\n });\n }\n }\n\n // if the app says header invalid, try legacy\n const v0Error: unknown =\n \"error\" in v0Res ? (v0Res as { error: unknown }).error : undefined;\n\n if (this._isInvalidOffchainHeaderError(v0Error)) {\n if (sendingData.length > LEGACY_OFFCHAINMSG_MAX_LEN) {\n return v0Res;\n }\n\n const legacyOCM = this._buildFullMessage(sendingData, signerPubkey, true);\n const legacyPayload = this._buildApduCommand(legacyOCM, paths);\n const legacyRes = await this._sendInChunks(legacyPayload);\n\n if (isSuccessCommandResult(legacyRes)) {\n try {\n const sigB58 = this._buildEnvelopeBase58(legacyRes.data, legacyOCM);\n return CommandResultFactory({ data: { signature: sigB58 } });\n } catch (e) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\n e instanceof Error ? e.message : String(e),\n ),\n });\n }\n }\n return legacyRes;\n }\n\n return v0Res;\n }\n\n private _isUTF8(buf: Uint8Array): boolean {\n try {\n new TextDecoder(\"utf-8\", { fatal: true }).decode(buf);\n return true;\n } catch {\n return false;\n }\n }\n\n private _findMessageFormat(\n message: Uint8Array,\n isLegacy: boolean,\n ): MessageFormat {\n const maxLedgerLen = isLegacy\n ? LEGACY_OFFCHAINMSG_MAX_LEN\n : OFFCHAINMSG_MAX_LEN;\n\n if (message.length <= maxLedgerLen) {\n if (this._isPrintableASCII(message, isLegacy)) return MessageFormat.Ascii;\n if (this._isUTF8(message)) return MessageFormat.Utf8;\n } else if (message.length <= OFFCHAINMSG_MAX_V0_LEN) {\n if (this._isUTF8(message)) return MessageFormat.Utf8LongV0;\n } else {\n // unreachable if run() guards length\n throw new InvalidStatusWordError(\n `Message too long: ${message.length} bytes (max is ${OFFCHAINMSG_MAX_V0_LEN})`,\n );\n }\n // default to ASCII like legacy\n return MessageFormat.Ascii;\n }\n\n private _isPrintableASCII(buf: Uint8Array, isLegacy: boolean): boolean {\n for (let i = 0; i < buf.length; i++) {\n const ch: number = buf[i]!;\n if (!isLegacy && ch === LINE_FEED_ASCII) continue; // newline allowed only for non-legacy\n if (ch < MIN_PRINTABLE_ASCII || ch > MAX_PRINTABLE_ASCII) return false;\n }\n return true;\n }\n\n /**\n * build serialised off-chain message header + body\n * when `isLegacy` is true, build the short legacy header (no app-domain or signers).\n */\n private _buildFullMessage(\n messageBody: Uint8Array,\n signerPubkey: Uint8Array,\n isLegacy: boolean,\n ): Uint8Array {\n const format: MessageFormat = this._findMessageFormat(\n messageBody,\n isLegacy,\n );\n\n const builder = new ByteArrayBuilder();\n\n // signing domain: 0xFF + \"solana offchain\" (16 bytes)\n builder.add8BitUIntToData(0xff).addAsciiStringToData(\"solana offchain\");\n\n // header version = 0\n builder.add8BitUIntToData(0);\n\n if (!isLegacy) {\n // application domain = 32 zeros\n builder.addBufferToData(new Uint8Array(32));\n }\n\n // message format\n builder.add8BitUIntToData(format);\n\n if (!isLegacy) {\n // signer count = 1\n builder.add8BitUIntToData(1);\n // signer pubkey (32 bytes)\n builder.addBufferToData(signerPubkey);\n }\n\n // message length (LE, 2 bytes)\n builder.add8BitUIntToData(messageBody.length & 0xff);\n builder.add8BitUIntToData((messageBody.length >> 8) & 0xff);\n\n // message body\n builder.addBufferToData(messageBody);\n\n return builder.build();\n }\n\n // guard for the device\u2019s 0x6A81 \u201CInvalid off-chain message header\u201D error\n private _isInvalidOffchainHeaderError(\n e: unknown,\n ): e is { _tag: string; errorCode: string } {\n if (!e || typeof e !== \"object\") return false;\n const obj = e as Record<string, unknown>;\n const tag = obj[\"_tag\"];\n const code = obj[\"errorCode\"];\n return (\n typeof tag === \"string\" &&\n typeof code === \"string\" &&\n code.toLowerCase() === \"6a81\"\n );\n }\n\n /**\n * build APDU payload:\n * [signerCount=1][derivationsCount][each 4-byte index][OCM message]\n */\n private _buildApduCommand(\n fullMessage: Uint8Array,\n paths: number[],\n ): Uint8Array {\n const builder = new ByteArrayBuilder(\n 1 + 1 + paths.length * 4 + fullMessage.length,\n );\n\n builder.add8BitUIntToData(1); // number of signers\n builder.add8BitUIntToData(paths.length); // number of derivations\n paths.forEach((idx) => builder.add32BitUIntToData(idx)); // big-endian\n builder.addBufferToData(fullMessage);\n\n return builder.build(); // larger than 255 is ok, SendCommandInChunksTask will chunk it\n }\n\n // send APDU payload using chunk task, return raw 64-byte signature (last chunk)\n private async _sendInChunks(\n apduPayload: Uint8Array,\n ): Promise<CommandResult<SignOffChainRawResponse, SolanaAppErrorCodes>> {\n const commandFactory: CommandFactory<SignOffChainRawResponse> = (\n chunkArgs,\n ) => new SignOffChainMessageCommand(chunkArgs);\n\n return await new SendCommandInChunksTask<SignOffChainRawResponse>(\n this.api,\n {\n data: apduPayload,\n commandFactory,\n },\n ).run();\n }\n\n // build base58 OCM envelope: [signatureCount=1][signature(64)][serialized OCM]\n private _buildEnvelopeBase58(\n rawSignature: Uint8Array,\n serializedOCM: Uint8Array,\n ): string {\n if (rawSignature.length !== 64) {\n throw new InvalidStatusWordError(\n `Invalid signature length: ${rawSignature.length} (expected 64)`,\n );\n }\n const sigCount = Uint8Array.of(1);\n const envelope = new Uint8Array(\n sigCount.length + rawSignature.length + serializedOCM.length,\n );\n envelope.set(sigCount, 0);\n envelope.set(rawSignature, sigCount.length);\n envelope.set(serializedOCM, sigCount.length + rawSignature.length);\n return this.bs58Encoder.encode(envelope);\n }\n}\n"],
|
|
5
|
+
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,wBAAAE,EAAA,kBAAAC,EAAA,wBAAAC,IAAA,eAAAC,EAAAL,GAAA,IAAAM,EAOO,2CACPC,EAAoC,kCAEpCC,EAAiC,yDACjCC,EAGO,mEAEPC,EAGO,qDAEPC,EAGO,qCAEP,MAAMC,EAA4B,GAAK,KACjCC,EAAgC,KAGhCC,EAAwB,GACxBC,EAA2B,EAG3BC,EACJJ,EAA4BE,EAAwBC,EAEhDE,EACJJ,EACAC,EACAC,EAGIG,EAAyB,MAEzBC,EAAsB,IACtBC,EAAsB,GACtBC,EAAkB,GAEjB,IAAKlB,OACVA,IAAA,MAAQ,GAAR,QACAA,IAAA,KAAO,GAAP,OACAA,IAAA,WAAa,GAAb,aAHUA,OAAA,IAML,MAAMD,EAAqBgB,EAW3B,MAAMd,CAAoB,CAC/B,YACUkB,EACAC,EACSC,EAA2B,qBAC5C,CAHQ,SAAAF,EACA,UAAAC,EACS,iBAAAC,CAChB,CAEH,MAAM,KAA4C,CAChD,KAAM,CAAE,YAAAC,EAAa,eAAAC,CAAe,EAAI,KAAK,KAE7C,GAAID,EAAY,SAAW,EACzB,SAAO,wBAAqB,CAC1B,MAAO,IAAI,yBAAuB,yBAAyB,CAC7D,CAAC,EAEH,GAAIA,EAAY,OAASvB,EACvB,SAAO,wBAAqB,CAC1B,MAAO,IAAI,yBACT,qBAAqBuB,EAAY,MAAM,kBAAkBvB,CAAkB,GAC7E,CACF,CAAC,EAGH,MAAMyB,EAAQ,sBAAoB,UAAUD,CAAc,EAEpDE,EAAe,MAAM,KAAK,IAAI,YAClC,IAAI,mBAAiB,CAAE,eAAAF,EAAgB,cAAe,EAAM,CAAC,CAC/D,EACA,GAAI,EAAE,SAAUE,GACd,SAAO,wBAAqB,CAC1B,MAAO,IAAI,yBACT,sCACF,CACF,CAAC,EAEH,MAAMC,EAAe,KAAK,YAAY,OAAOD,EAAa,IAAI,EAGxDE,EAAQ,KAAK,kBAAkBL,EAAaI,EAAc,EAAK,EAC/DE,EAAY,KAAK,kBAAkBD,EAAOH,CAAK,EAC/CK,EAAQ,MAAM,KAAK,cAAcD,CAAS,EAEhD,MAAI,0BAAuBC,CAAK,EAC9B,GAAI,CACF,MAAMC,EAAS,KAAK,qBAAqBD,EAAM,KAAMF,CAAK,EAC1D,SAAO,wBAAqB,CAAE,KAAM,CAAE,UAAWG,CAAO,CAAE,CAAC,CAC7D,OAASC,EAAG,CACV,SAAO,wBAAqB,CAC1B,MAAO,IAAI,yBACTA,aAAa,MAAQA,EAAE,QAAU,OAAOA,CAAC,CAC3C,CACF,CAAC,CACH,CAIF,MAAMC,EACJ,UAAWH,EAASA,EAA6B,MAAQ,OAE3D,GAAI,KAAK,8BAA8BG,CAAO,EAAG,CAC/C,GAAIV,EAAY,OAASR,EACvB,OAAOe,EAGT,MAAMI,EAAY,KAAK,kBAAkBX,EAAaI,EAAc,EAAI,EAClEQ,EAAgB,KAAK,kBAAkBD,EAAWT,CAAK,EACvDW,EAAY,MAAM,KAAK,cAAcD,CAAa,EAExD,MAAI,0BAAuBC,CAAS,EAClC,GAAI,CACF,MAAML,EAAS,KAAK,qBAAqBK,EAAU,KAAMF,CAAS,EAClE,SAAO,wBAAqB,CAAE,KAAM,CAAE,UAAWH,CAAO,CAAE,CAAC,CAC7D,OAASC,EAAG,CACV,SAAO,wBAAqB,CAC1B,MAAO,IAAI,yBACTA,aAAa,MAAQA,EAAE,QAAU,OAAOA,CAAC,CAC3C,CACF,CAAC,CACH,CAEF,OAAOI,CACT,CAEA,OAAON,CACT,CAEQ,QAAQO,EAA0B,CACxC,GAAI,CACF,WAAI,YAAY,QAAS,CAAE,MAAO,EAAK,CAAC,EAAE,OAAOA,CAAG,EAC7C,EACT,MAAQ,CACN,MAAO,EACT,CACF,CAEQ,mBACNC,EACAC,EACe,CACf,MAAMC,EAAeD,EACjBxB,EACAD,EAEJ,GAAIwB,EAAQ,QAAUE,EAAc,CAClC,GAAI,KAAK,kBAAkBF,EAASC,CAAQ,EAAG,MAAO,GACtD,GAAI,KAAK,QAAQD,CAAO,EAAG,MAAO,EACpC,SAAWA,EAAQ,QAAUtB,GAC3B,GAAI,KAAK,QAAQsB,CAAO,EAAG,MAAO,OAGlC,OAAM,IAAI,yBACR,qBAAqBA,EAAQ,MAAM,kBAAkBtB,CAAsB,GAC7E,EAGF,MAAO,EACT,CAEQ,kBAAkBqB,EAAiBE,EAA4B,CACrE,QAASE,EAAI,EAAGA,EAAIJ,EAAI,OAAQI,IAAK,CACnC,MAAMC,EAAaL,EAAII,CAAC,EACxB,GAAI,GAACF,GAAYG,IAAOvB,KACpBuB,EAAKxB,GAAuBwB,EAAKzB,GAAqB,MAAO,EACnE,CACA,MAAO,EACT,CAMQ,kBACN0B,EACAhB,EACAY,EACY,CACZ,MAAMK,EAAwB,KAAK,mBACjCD,EACAJ,CACF,EAEMM,EAAU,IAAI,mBAGpB,OAAAA,EAAQ,kBAAkB,GAAI,EAAE,qBAAqB,iBAAiB,EAGtEA,EAAQ,kBAAkB,CAAC,EAEtBN,GAEHM,EAAQ,gBAAgB,IAAI,WAAW,EAAE,CAAC,EAI5CA,EAAQ,kBAAkBD,CAAM,EAE3BL,IAEHM,EAAQ,kBAAkB,CAAC,EAE3BA,EAAQ,gBAAgBlB,CAAY,GAItCkB,EAAQ,kBAAkBF,EAAY,OAAS,GAAI,EACnDE,EAAQ,kBAAmBF,EAAY,QAAU,EAAK,GAAI,EAG1DE,EAAQ,gBAAgBF,CAAW,EAE5BE,EAAQ,MAAM,CACvB,CAGQ,8BACNb,EAC0C,CAC1C,GAAI,CAACA,GAAK,OAAOA,GAAM,SAAU,MAAO,GACxC,MAAMc,EAAMd,EACNe,EAAMD,EAAI,KACVE,EAAOF,EAAI,UACjB,OACE,OAAOC,GAAQ,UACf,OAAOC,GAAS,UAChBA,EAAK,YAAY,IAAM,MAE3B,CAMQ,kBACNC,EACAxB,EACY,CACZ,MAAMoB,EAAU,IAAI,mBAClB,EAAQpB,EAAM,OAAS,EAAIwB,EAAY,MACzC,EAEA,OAAAJ,EAAQ,kBAAkB,CAAC,EAC3BA,EAAQ,kBAAkBpB,EAAM,MAAM,EACtCA,EAAM,QAASyB,GAAQL,EAAQ,mBAAmBK,CAAG,CAAC,EACtDL,EAAQ,gBAAgBI,CAAW,EAE5BJ,EAAQ,MAAM,CACvB,CAGA,MAAc,cACZM,EACsE,CACtE,MAAMC,EACJC,GACG,IAAI,6BAA2BA,CAAS,EAE7C,OAAO,MAAM,IAAI,0BACf,KAAK,IACL,CACE,KAAMF,EACN,eAAAC,CACF,CACF,EAAE,IAAI,CACR,CAGQ,qBACNE,EACAC,EACQ,CACR,GAAID,EAAa,SAAW,GAC1B,MAAM,IAAI,yBACR,6BAA6BA,EAAa,MAAM,gBAClD,EAEF,MAAME,EAAW,WAAW,GAAG,CAAC,EAC1BC,EAAW,IAAI,WACnBD,EAAS,OAASF,EAAa,OAASC,EAAc,MACxD,EACA,OAAAE,EAAS,IAAID,EAAU,CAAC,EACxBC,EAAS,IAAIH,EAAcE,EAAS,MAAM,EAC1CC,EAAS,IAAIF,EAAeC,EAAS,OAASF,EAAa,MAAM,EAC1D,KAAK,YAAY,OAAOG,CAAQ,CACzC,CACF",
|
|
6
|
+
"names": ["SendSignMessageTask_exports", "__export", "MAX_MESSAGE_LENGTH", "MessageFormat", "SendSignMessageTask", "__toCommonJS", "import_device_management_kit", "import_signer_utils", "import_GetPubKeyCommand", "import_SignOffChainMessageCommand", "import_bs58Encoder", "import_SendCommandInChunksTask", "DEVICE_V0_PAYLOAD_CEILING", "DEVICE_LEGACY_PAYLOAD_CEILING", "RESERVED_HEADER_BYTES", "RESERVED_TRANSPORT_BYTES", "OFFCHAINMSG_MAX_LEN", "LEGACY_OFFCHAINMSG_MAX_LEN", "OFFCHAINMSG_MAX_V0_LEN", "MAX_PRINTABLE_ASCII", "MIN_PRINTABLE_ASCII", "LINE_FEED_ASCII", "api", "args", "bs58Encoder", "sendingData", "derivationPath", "paths", "pubkeyResult", "signerPubkey", "v0OCM", "v0Payload", "v0Res", "sigB58", "e", "v0Error", "legacyOCM", "legacyPayload", "legacyRes", "buf", "message", "isLegacy", "maxLedgerLen", "i", "ch", "messageBody", "format", "builder", "obj", "tag", "code", "fullMessage", "idx", "apduPayload", "commandFactory", "chunkArgs", "rawSignature", "serializedOCM", "sigCount", "envelope"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,4 @@
|
|
|
1
|
-
"use strict";var s=require("@ledgerhq/device-management-kit"),
|
|
1
|
+
"use strict";var s=require("@ledgerhq/device-management-kit"),y=require("../../app-binder/device-action/__test-utils__/makeInternalApi"),g=require("../../app-binder/services/bs58Encoder"),t=require("../../app-binder/task/SendSignMessageTask");const r="44'/501'/0'/0'",c=new Uint8Array(32).fill(17),m=g.DefaultBs58Encoder.encode(c);function w(){return{_tag:"SolanaAppCommandError",errorCode:"6a81",message:"Invalid off-chain message header"}}describe("SendSignMessageTask",()=>{const n=(0,y.makeDeviceActionInternalApiMock)();beforeEach(()=>{vi.resetAllMocks()}),describe("run()",()=>{it("errors on empty message before any device call",async()=>{const e=await new t.SendSignMessageTask(n,{derivationPath:r,sendingData:new Uint8Array([])}).run();expect(n.sendCommand).toHaveBeenCalledTimes(0),expect(e.error).toEqual(new s.InvalidStatusWordError("Message cannot be empty"))}),it("errors when GET_PUBKEY fails",async()=>{n.sendCommand.mockResolvedValueOnce((0,s.CommandResultFactory)({error:new s.InvalidStatusWordError("pubkey error")}));const e=await new t.SendSignMessageTask(n,{derivationPath:r,sendingData:new Uint8Array([1,2,3])}).run();expect(n.sendCommand).toHaveBeenCalledTimes(1),expect(e.error).toEqual(new s.InvalidStatusWordError("Error getting public key from device"))}),it("surfaces command error when signing fails",async()=>{n.sendCommand.mockResolvedValueOnce((0,s.CommandResultFactory)({data:m})).mockResolvedValueOnce((0,s.CommandResultFactory)({error:new s.InvalidStatusWordError("no signature returned")}));const e=await new t.SendSignMessageTask(n,{derivationPath:r,sendingData:new Uint8Array([170,187])}).run();expect(n.sendCommand).toHaveBeenCalledTimes(2),expect(e.error).toEqual(new s.InvalidStatusWordError("no signature returned"))}),it("returns base58 envelope when signing succeeds",async()=>{const e=new Uint8Array([240,202,204,26]),a=new Uint8Array(64).fill(51);n.sendCommand.mockResolvedValueOnce((0,s.CommandResultFactory)({data:m})).mockResolvedValueOnce((0,s.CommandResultFactory)({data:a}));const o=new t.SendSignMessageTask(n,{derivationPath:r,sendingData:e}),i=o._buildFullMessage(e,c,!1),d=await o.run();expect(n.sendCommand).toHaveBeenCalledTimes(2),expect("data"in d).toBe(!0);const u=d.data.signature,l=new Uint8Array(1+a.length+i.length);l.set(Uint8Array.of(1),0),l.set(a,1),l.set(i,1+a.length),expect(g.DefaultBs58Encoder.decode(u)).toEqual(l)}),it("rejects invalid derivation path",async()=>{const e={derivationPath:"not/a/path",sendingData:new Uint8Array([1])};await expect(new t.SendSignMessageTask(n,e).run()).rejects.toThrow()}),it("builds APDU command with correct structure (prefix + tail)",()=>{const e=new Uint8Array([1,2,3]),a=new t.SendSignMessageTask(n,{derivationPath:r,sendingData:e}),o=a._buildFullMessage(e,c,!1),i=[-2147483604,-2147483147,-2147483648,0],d=a._buildApduCommand(o,i);expect(d[0]).toBe(1),expect(d[1]).toBe(i.length),expect(d.slice(d.length-o.length)).toEqual(o)}),it("handles large messages via chunking (no exact call count assertion)",async()=>{const e=new Uint8Array(4e3).fill(1),a=new Uint8Array(64).fill(68);n.sendCommand.mockResolvedValueOnce((0,s.CommandResultFactory)({data:m})).mockResolvedValue((0,s.CommandResultFactory)({data:a}));const o=await new t.SendSignMessageTask(n,{derivationPath:r,sendingData:e}).run();expect("data"in o).toBe(!0)}),it("errors on message exceeding v0 max (65515)",async()=>{const e=new Uint8Array(t.MAX_MESSAGE_LENGTH+1).fill(170),a=await new t.SendSignMessageTask(n,{derivationPath:r,sendingData:e}).run();expect(n.sendCommand).toHaveBeenCalledTimes(0),expect(a.error).toEqual(new s.InvalidStatusWordError(`Message too long: ${e.length} bytes (max is ${t.MAX_MESSAGE_LENGTH})`))}),it("falls back to legacy when v0 returns 6a81 (header error)",async()=>{const e=new Uint8Array([97,98,99]),a=new Uint8Array(64).fill(85);n.sendCommand.mockResolvedValueOnce((0,s.CommandResultFactory)({data:m})).mockResolvedValueOnce((0,s.CommandResultFactory)({error:w()})).mockResolvedValueOnce((0,s.CommandResultFactory)({data:a}));const o=new t.SendSignMessageTask(n,{derivationPath:r,sendingData:e}),i=o._buildFullMessage(e,c,!0),d=await o.run();expect(n.sendCommand).toHaveBeenCalledTimes(3);const u=d.data.signature,l=new Uint8Array(1+a.length+i.length);l.set(Uint8Array.of(1),0),l.set(a,1),l.set(i,1+a.length),expect(g.DefaultBs58Encoder.decode(u)).toEqual(l)}),it("does NOT fallback on non-6a81 errors",async()=>{n.sendCommand.mockResolvedValueOnce((0,s.CommandResultFactory)({data:m})).mockResolvedValueOnce((0,s.CommandResultFactory)({error:new s.InvalidStatusWordError("oups")}));const e=await new t.SendSignMessageTask(n,{derivationPath:r,sendingData:new Uint8Array([1,2])}).run();expect(n.sendCommand).toHaveBeenCalledTimes(2),expect(e.error).toBeInstanceOf(s.InvalidStatusWordError)}),it("propagates 6a81 if body is too large for legacy",async()=>{const e=new Uint8Array(2e3).fill(49);n.sendCommand.mockResolvedValueOnce((0,s.CommandResultFactory)({data:m})).mockResolvedValueOnce((0,s.CommandResultFactory)({error:w()}));const a=await new t.SendSignMessageTask(n,{derivationPath:r,sendingData:e}).run();expect(n.sendCommand).toHaveBeenCalledTimes(2),expect(a.error).toEqual(w())})}),describe("message format detection (indirect via header byte)",()=>{it("sets format=0 for ASCII \u2264 maxLedgerLen (v0 header)",()=>{const e=new TextEncoder().encode(`hello
|
|
2
|
+
world`),o=new t.SendSignMessageTask(n,{derivationPath:r,sendingData:e})._buildFullMessage(e,c,!1);expect(o[49]).toBe(t.MessageFormat.Ascii)}),it("sets format=1 for short UTF-8 non-ASCII (v0 header)",()=>{const e=new TextEncoder().encode("h\xE9ll\xF8"),o=new t.SendSignMessageTask(n,{derivationPath:r,sendingData:e})._buildFullMessage(e,c,!1);expect(o[49]).toBe(t.MessageFormat.Utf8)}),it("sets format=2 for long UTF-8 (v0 header)",()=>{const e=new TextEncoder().encode("x".repeat(15313)),o=new t.SendSignMessageTask(n,{derivationPath:r,sendingData:e})._buildFullMessage(e,c,!1);expect(o[49]).toBe(t.MessageFormat.Utf8LongV0)}),it("legacy header forbids newline in ASCII (so format becomes UTF-8=1)",()=>{const e=new TextEncoder().encode(`hello
|
|
3
|
+
world`),o=new t.SendSignMessageTask(n,{derivationPath:r,sendingData:e})._buildFullMessage(e,c,!0);expect(o[17]).toBe(t.MessageFormat.Utf8)}),it("legacy header sets format=0 for plain ASCII (no newline)",()=>{const e=new TextEncoder().encode("HELLO_123"),o=new t.SendSignMessageTask(n,{derivationPath:r,sendingData:e})._buildFullMessage(e,c,!0);expect(o[17]).toBe(t.MessageFormat.Ascii)}),it("message length is little-endian in both headers",()=>{const e=new Uint8Array([1,2,3]),a=new t.SendSignMessageTask(n,{derivationPath:r,sendingData:e}),o=a._buildFullMessage(e,c,!1);expect(o[83]).toBe(3),expect(o[84]).toBe(0);const i=a._buildFullMessage(e,c,!0);expect(i[18]).toBe(3),expect(i[19]).toBe(0)})}),it("returns error when device returns non-64-byte signature on final chunk",async()=>{const e=new Uint8Array([1,2,3]);n.sendCommand.mockResolvedValueOnce((0,s.CommandResultFactory)({data:m})).mockResolvedValueOnce((0,s.CommandResultFactory)({data:new Uint8Array(0)}));const a=await new t.SendSignMessageTask(n,{derivationPath:r,sendingData:e}).run();expect("error"in a).toBe(!0);const o=a.error;expect(o).toBeInstanceOf(s.InvalidStatusWordError)})});
|
|
2
4
|
//# sourceMappingURL=SendSignMessageTask.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/task/SendSignMessageTask.test.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { makeDeviceActionInternalApiMock } from \"@internal/app-binder/device-action/__test-utils__/makeInternalApi\";\nimport { SendSignMessageTask } from \"@internal/app-binder/task/SendSignMessageTask\";\n\nconst DERIVATION_PATH = \"44'/501'/0'/0'\";\n\ndescribe(\"SendSignMessageTask\", () => {\n const apiMock = makeDeviceActionInternalApiMock();\n\n beforeEach(() => {\n vi.resetAllMocks();\n });\n\n const SIMPLE_MESSAGE = new Uint8Array([0x01, 0x02, 0x03, 0x04]);\n\n describe(\"run with SignOffChainMessageCommand\", () => {\n it(\"should return an error if the command fails\", async () => {\n // GIVEN-------------------------------\n //-------------------------------------\n const args = {\n derivationPath: DERIVATION_PATH,\n sendingData: SIMPLE_MESSAGE,\n };\n apiMock.sendCommand.mockResolvedValueOnce(\n CommandResultFactory({\n error: new InvalidStatusWordError(\"no signature returned\"),\n }),\n );\n\n // WHEN--------------------------------\n //-------------------------------------\n const result = await new SendSignMessageTask(apiMock, args).run();\n\n // THEN--------------------------------\n //-------------------------------------\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(1);\n expect(result).toMatchObject({\n error: new InvalidStatusWordError(\"no signature returned\"),\n });\n });\n\n it(\"should return success when the command executes successfully\", async () => {\n // GIVEN-------------------------------\n //-------------------------------------\n const args = {\n derivationPath: DERIVATION_PATH,\n sendingData: SIMPLE_MESSAGE,\n };\n const expectedSignature = new Uint8Array([0xaa, 0xbb, 0xcc, 0xdd]);\n apiMock.sendCommand.mockResolvedValueOnce(\n CommandResultFactory({\n data: expectedSignature,\n }),\n );\n\n // WHEN--------------------------------\n //-------------------------------------\n const result = await new SendSignMessageTask(apiMock, args).run();\n\n // THEN--------------------------------\n //-------------------------------------\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(1);\n expect(result).toMatchObject({\n data: expectedSignature,\n });\n });\n\n it(\"should handle invalid derivation paths\", async () => {\n // GIVEN-------------------------------\n //-------------------------------------\n const invalidDerivationPath = \"invalid/path\";\n const args = {\n derivationPath: invalidDerivationPath,\n sendingData: SIMPLE_MESSAGE,\n };\n\n // WHEN--------------------------------\n //-------------------------------------\n const task = new SendSignMessageTask(apiMock, args);\n\n // THEN--------------------------------\n //-------------------------------------\n await expect(task.run()).rejects.toThrowError();\n });\n\n it(\"should handle empty message data\", async () => {\n // GIVEN-------------------------------\n //-------------------------------------\n const emptyMessage = new Uint8Array([]);\n const args = {\n derivationPath: DERIVATION_PATH,\n sendingData: emptyMessage,\n };\n apiMock.sendCommand.mockResolvedValueOnce(\n CommandResultFactory({\n data: new Uint8Array([]),\n }),\n );\n\n // WHEN--------------------------------\n //-------------------------------------\n const result = await new SendSignMessageTask(apiMock, args).run();\n\n // THEN--------------------------------\n //-------------------------------------\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(1);\n if (\"data\" in result) {\n expect(result.data).toEqual(new Uint8Array([]));\n } else {\n throw new Error(\"Expected result to have data property\");\n }\n });\n\n it(\"should correctly build the APDU command\", () => {\n // GIVEN-------------------------------\n //-------------------------------------\n const args = {\n derivationPath: DERIVATION_PATH,\n sendingData: SIMPLE_MESSAGE,\n };\n const task = new SendSignMessageTask(apiMock, args);\n const fullMessage = task[\"_buildFullMessage\"](SIMPLE_MESSAGE);\n const paths = [44 | 0x80000000, 501 | 0x80000000, 0 | 0x80000000, 0];\n const commandBuffer = task[\"_buildApduCommand\"](fullMessage, paths);\n\n // WHEN--------------------------------\n //-------------------------------------\n const expectedCommandLength =\n 1 + // numberOfSigners\n 1 + // numberOfDerivations\n paths.length * 4 + // paths\n fullMessage.length; // message\n\n // THEN--------------------------------\n //-------------------------------------\n expect(commandBuffer.length).toEqual(expectedCommandLength);\n });\n\n it(\"should handle messages with maximum allowed length\", async () => {\n // GIVEN-------------------------------\n //-------------------------------------\n const headerSize =\n 1 + // numberOfSigners\n 1 + // numberOfDerivations\n 4 * 4; // paths\n const fullMessageHeaderSize =\n 1 +\n 15 + // prefix\n 4; // length\n const maxLengthMessage = new Uint8Array(\n 255 - headerSize - fullMessageHeaderSize,\n ).fill(0x01);\n const args = {\n derivationPath: DERIVATION_PATH,\n sendingData: maxLengthMessage,\n };\n apiMock.sendCommand.mockResolvedValueOnce(\n CommandResultFactory({\n data: new Uint8Array([0x99, 0x88, 0x77]),\n }),\n );\n\n // WHEN--------------------------------\n //-------------------------------------\n const result = await new SendSignMessageTask(apiMock, args).run();\n\n // THEN--------------------------------\n //-------------------------------------\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(1);\n if (\"data\" in result) {\n expect(result.data).toEqual(new Uint8Array([0x99, 0x88, 0x77]));\n } else {\n throw new Error(\"Expected result to have data property\");\n }\n });\n\n it(\"should fail messages if too big\", async () => {\n // GIVEN-------------------------------\n //-------------------------------------\n const headerSize =\n 1 + // numberOfSigners\n 1 + // numberOfDerivations\n 4 * 4; // paths\n const fullMessageHeaderSize =\n 1 +\n 15 + // prefix\n 4; // length\n const maxLengthMessage = new Uint8Array(\n 256 - headerSize - fullMessageHeaderSize,\n ).fill(0x01);\n const args = {\n derivationPath: DERIVATION_PATH,\n sendingData: maxLengthMessage,\n };\n apiMock.sendCommand.mockResolvedValueOnce(\n CommandResultFactory({\n data: new Uint8Array([0x99, 0x88, 0x77]),\n }),\n );\n\n // WHEN--------------------------------\n //-------------------------------------\n const result = await new SendSignMessageTask(apiMock, args).run();\n\n // THEN--------------------------------\n //-------------------------------------\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(0);\n if (\"error\" in result) {\n expect(result.error).toEqual(\n new InvalidStatusWordError(\n \"The APDU command exceeds the maximum allowable size (255 bytes)\",\n ),\n );\n } else {\n throw new Error(\"Expected result to have error property\");\n }\n });\n });\n});\n"],
|
|
5
|
-
"mappings": "
|
|
6
|
-
"names": ["import_device_management_kit", "import_makeInternalApi", "import_SendSignMessageTask", "DERIVATION_PATH", "
|
|
4
|
+
"sourcesContent": ["/* eslint-disable @typescript-eslint/no-unsafe-call */\n/* eslint-disable @typescript-eslint/no-unsafe-assignment */\n/* eslint-disable @typescript-eslint/no-unsafe-member-access */\n/* eslint-disable @typescript-eslint/no-explicit-any */\nimport {\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { makeDeviceActionInternalApiMock } from \"@internal/app-binder/device-action/__test-utils__/makeInternalApi\";\nimport { DefaultBs58Encoder } from \"@internal/app-binder/services/bs58Encoder\";\nimport {\n MAX_MESSAGE_LENGTH,\n MessageFormat,\n SendSignMessageTask,\n} from \"@internal/app-binder/task/SendSignMessageTask\";\n\nconst DERIVATION_PATH = \"44'/501'/0'/0'\";\nconst PUBKEY = new Uint8Array(32).fill(0x11);\nconst PUBKEY_BASE58 = DefaultBs58Encoder.encode(PUBKEY);\n\nfunction solanaHeaderErr() {\n return {\n _tag: \"SolanaAppCommandError\",\n errorCode: \"6a81\",\n message: \"Invalid off-chain message header\",\n } as const;\n}\n\ndescribe(\"SendSignMessageTask\", () => {\n const apiMock = makeDeviceActionInternalApiMock();\n\n beforeEach(() => {\n vi.resetAllMocks();\n });\n\n describe(\"run()\", () => {\n it(\"errors on empty message before any device call\", async () => {\n const result = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: new Uint8Array([]),\n }).run();\n\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(0);\n expect((result as any).error).toEqual(\n new InvalidStatusWordError(\"Message cannot be empty\"),\n );\n });\n\n it(\"errors when GET_PUBKEY fails\", async () => {\n apiMock.sendCommand.mockResolvedValueOnce(\n CommandResultFactory({\n error: new InvalidStatusWordError(\"pubkey error\"),\n }),\n );\n\n const res = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: new Uint8Array([1, 2, 3]),\n }).run();\n\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(1);\n expect((res as any).error).toEqual(\n new InvalidStatusWordError(\"Error getting public key from device\"),\n );\n });\n\n it(\"surfaces command error when signing fails\", async () => {\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 })) // pubkey\n .mockResolvedValueOnce(\n CommandResultFactory({\n error: new InvalidStatusWordError(\"no signature returned\"),\n }),\n );\n\n const res = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: new Uint8Array([0xaa, 0xbb]),\n }).run();\n\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(2);\n expect((res as any).error).toEqual(\n new InvalidStatusWordError(\"no signature returned\"),\n );\n });\n\n it(\"returns base58 envelope when signing succeeds\", async () => {\n // given\n const msg = new Uint8Array([0xf0, 0xca, 0xcc, 0x1a]);\n const rawSig = new Uint8Array(64).fill(0x33); // mock 64-byte signature\n\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 })) // pubkey\n .mockResolvedValueOnce(CommandResultFactory({ data: rawSig })); // v0 last chunk\n\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: msg,\n });\n const v0OCM: Uint8Array = task._buildFullMessage(msg, PUBKEY, false);\n\n // when\n const res = await task.run();\n\n // then\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(2);\n expect(\"data\" in res).toBe(true);\n const b58 = (res as any).data.signature as string;\n\n // expected envelope = [1][rawSig][v0OCM]\n const expected = new Uint8Array(1 + rawSig.length + v0OCM.length);\n expected.set(Uint8Array.of(1), 0);\n expected.set(rawSig, 1);\n expected.set(v0OCM, 1 + rawSig.length);\n\n expect(DefaultBs58Encoder.decode(b58)).toEqual(expected);\n });\n\n it(\"rejects invalid derivation path\", async () => {\n const args = {\n derivationPath: \"not/a/path\",\n sendingData: new Uint8Array([1]),\n };\n await expect(\n new SendSignMessageTask(apiMock, args).run(),\n ).rejects.toThrow();\n });\n\n it(\"builds APDU command with correct structure (prefix + tail)\", () => {\n const msg = new Uint8Array([1, 2, 3]);\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: msg,\n });\n\n const fullMsg = task._buildFullMessage(msg, PUBKEY, false);\n const paths = [44 | 0x80000000, 501 | 0x80000000, 0 | 0x80000000, 0];\n const apdu = task._buildApduCommand(fullMsg, paths);\n\n // first byte: number of signers\n expect(apdu[0]).toBe(1);\n // second byte: number of derivation indices\n expect(apdu[1]).toBe(paths.length);\n // tail equals the serialized OCM\n expect(apdu.slice(apdu.length - fullMsg.length)).toEqual(fullMsg);\n });\n\n it(\"handles large messages via chunking (no exact call count assertion)\", async () => {\n const bigMsg = new Uint8Array(4000).fill(0x01);\n const rawSig = new Uint8Array(64).fill(0x44);\n\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 })) // pubkey\n .mockResolvedValue(CommandResultFactory({ data: rawSig })); // all subsequent chunks\n\n const res = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: bigMsg,\n }).run();\n\n expect(\"data\" in res).toBe(true);\n });\n\n it(\"errors on message exceeding v0 max (65515)\", async () => {\n const tooBig = new Uint8Array(MAX_MESSAGE_LENGTH + 1).fill(0xaa);\n const res = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: tooBig,\n }).run();\n\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(0);\n expect((res as any).error).toEqual(\n new InvalidStatusWordError(\n `Message too long: ${tooBig.length} bytes (max is ${MAX_MESSAGE_LENGTH})`,\n ),\n );\n });\n\n it(\"falls back to legacy when v0 returns 6a81 (header error)\", async () => {\n // given\n const msg = new Uint8Array([0x61, 0x62, 0x63]); // \"abc\"\n const rawSig = new Uint8Array(64).fill(0x55);\n\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 })) // pubkey\n .mockResolvedValueOnce(\n CommandResultFactory({ error: solanaHeaderErr() as any }),\n ) // v0 -> 6a81\n .mockResolvedValueOnce(CommandResultFactory({ data: rawSig })); // legacy -> OK\n\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: msg,\n });\n\n // build expected LEGACY OCM to verify envelope\n const legacyOCM: Uint8Array = task._buildFullMessage(msg, PUBKEY, true);\n\n // when\n const res = await task.run();\n\n // then\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(3); // pubkey + v0 + legacy\n const b58 = (res as any).data.signature as string;\n\n const expected = new Uint8Array(1 + rawSig.length + legacyOCM.length);\n expected.set(Uint8Array.of(1), 0);\n expected.set(rawSig, 1);\n expected.set(legacyOCM, 1 + rawSig.length);\n\n expect(DefaultBs58Encoder.decode(b58)).toEqual(expected);\n });\n\n it(\"does NOT fallback on non-6a81 errors\", async () => {\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 }))\n .mockResolvedValueOnce(\n CommandResultFactory({ error: new InvalidStatusWordError(\"oups\") }),\n );\n\n const res = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: new Uint8Array([1, 2]),\n }).run();\n\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(2);\n expect((res as any).error).toBeInstanceOf(InvalidStatusWordError);\n });\n\n it(\"propagates 6a81 if body is too large for legacy\", async () => {\n const msg = new Uint8Array(2000).fill(0x31); // > 1232 legacy limit\n\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 })) // pubkey\n .mockResolvedValueOnce(\n CommandResultFactory({ error: solanaHeaderErr() as any }),\n ); // v0 -> 6a81\n\n const res = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: msg,\n }).run();\n\n // no legacy retry\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(2);\n expect((res as any).error).toEqual(solanaHeaderErr());\n });\n });\n\n describe(\"message format detection (indirect via header byte)\", () => {\n it(\"sets format=0 for ASCII \u2264 maxLedgerLen (v0 header)\", () => {\n const ascii = new TextEncoder().encode(\"hello\\nworld\"); // newline allowed in non-legacy\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: ascii,\n });\n const v0 = task._buildFullMessage(ascii, PUBKEY, false);\n // in v0 format byte is at offset: 16 (domain) + 1 (ver) + 32 (app) = 49\n expect(v0[49]).toBe(MessageFormat.Ascii);\n });\n\n it(\"sets format=1 for short UTF-8 non-ASCII (v0 header)\", () => {\n const utf8 = new TextEncoder().encode(\"h\u00E9ll\u00F8\");\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: utf8,\n });\n const v0 = task._buildFullMessage(utf8, PUBKEY, false);\n expect(v0[49]).toBe(MessageFormat.Utf8);\n });\n\n it(\"sets format=2 for long UTF-8 (v0 header)\", () => {\n // must exceed OFFCM_MAX_LEDGER_LEN to get format=2\n const longUtf8 = new TextEncoder().encode(\"x\".repeat(15313));\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: longUtf8,\n });\n const v0 = task._buildFullMessage(longUtf8, PUBKEY, false);\n expect(v0[49]).toBe(MessageFormat.Utf8LongV0);\n });\n\n it(\"legacy header forbids newline in ASCII (so format becomes UTF-8=1)\", () => {\n const asciiWithNl = new TextEncoder().encode(\"hello\\nworld\");\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: asciiWithNl,\n });\n const legacy = task._buildFullMessage(asciiWithNl, PUBKEY, true);\n // in legacy: format byte is at offset 16 (domain) + 1 (ver) = 17\n expect(legacy[17]).toBe(MessageFormat.Utf8);\n });\n\n it(\"legacy header sets format=0 for plain ASCII (no newline)\", () => {\n const ascii = new TextEncoder().encode(\"HELLO_123\");\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: ascii,\n });\n const legacy = task._buildFullMessage(ascii, PUBKEY, true);\n expect(legacy[17]).toBe(MessageFormat.Ascii);\n });\n\n it(\"message length is little-endian in both headers\", () => {\n const body = new Uint8Array([1, 2, 3]); // length = 3\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: body,\n });\n\n // v0 offsets:\n // length starts at: 16(domain) + 1(ver) + 32(app) + 1(format) + 1(count) + 32(pubkey) = 83\n const v0 = task._buildFullMessage(body, PUBKEY, false);\n expect(v0[83]).toBe(3); // LSB (0x03)\n expect(v0[84]).toBe(0); // MSB (0x00)\n\n // legacy offsets:\n // length starts at: 16(domain) + 1(ver) + 1(format) = 18\n const legacy = task._buildFullMessage(body, PUBKEY, true);\n expect(legacy[18]).toBe(3); // LSB (0x03)\n expect(legacy[19]).toBe(0); // MSB (0x00)\n });\n });\n\n it(\"returns error when device returns non-64-byte signature on final chunk\", async () => {\n const msg = new Uint8Array([1, 2, 3]);\n\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 }))\n .mockResolvedValueOnce(CommandResultFactory({ data: new Uint8Array(0) }));\n\n const res = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: msg,\n }).run();\n\n expect(\"error\" in res).toBe(true);\n\n const err = (res as any).error as unknown;\n expect(err).toBeInstanceOf(InvalidStatusWordError);\n });\n});\n"],
|
|
5
|
+
"mappings": "aAIA,IAAAA,EAGO,2CAEPC,EAAgD,6EAChDC,EAAmC,qDACnCC,EAIO,yDAEP,MAAMC,EAAkB,iBAClBC,EAAS,IAAI,WAAW,EAAE,EAAE,KAAK,EAAI,EACrCC,EAAgB,qBAAmB,OAAOD,CAAM,EAEtD,SAASE,GAAkB,CACzB,MAAO,CACL,KAAM,wBACN,UAAW,OACX,QAAS,kCACX,CACF,CAEA,SAAS,sBAAuB,IAAM,CACpC,MAAMC,KAAU,mCAAgC,EAEhD,WAAW,IAAM,CACf,GAAG,cAAc,CACnB,CAAC,EAED,SAAS,QAAS,IAAM,CACtB,GAAG,iDAAkD,SAAY,CAC/D,MAAMC,EAAS,MAAM,IAAI,sBAAoBD,EAAS,CACpD,eAAgBJ,EAChB,YAAa,IAAI,WAAW,CAAC,CAAC,CAChC,CAAC,EAAE,IAAI,EAEP,OAAOI,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQC,EAAe,KAAK,EAAE,QAC5B,IAAI,yBAAuB,yBAAyB,CACtD,CACF,CAAC,EAED,GAAG,+BAAgC,SAAY,CAC7CD,EAAQ,YAAY,yBAClB,wBAAqB,CACnB,MAAO,IAAI,yBAAuB,cAAc,CAClD,CAAC,CACH,EAEA,MAAME,EAAM,MAAM,IAAI,sBAAoBF,EAAS,CACjD,eAAgBJ,EAChB,YAAa,IAAI,WAAW,CAAC,EAAG,EAAG,CAAC,CAAC,CACvC,CAAC,EAAE,IAAI,EAEP,OAAOI,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQE,EAAY,KAAK,EAAE,QACzB,IAAI,yBAAuB,sCAAsC,CACnE,CACF,CAAC,EAED,GAAG,4CAA6C,SAAY,CAC1DF,EAAQ,YACL,yBAAsB,wBAAqB,CAAE,KAAMF,CAAc,CAAC,CAAC,EACnE,yBACC,wBAAqB,CACnB,MAAO,IAAI,yBAAuB,uBAAuB,CAC3D,CAAC,CACH,EAEF,MAAMI,EAAM,MAAM,IAAI,sBAAoBF,EAAS,CACjD,eAAgBJ,EAChB,YAAa,IAAI,WAAW,CAAC,IAAM,GAAI,CAAC,CAC1C,CAAC,EAAE,IAAI,EAEP,OAAOI,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQE,EAAY,KAAK,EAAE,QACzB,IAAI,yBAAuB,uBAAuB,CACpD,CACF,CAAC,EAED,GAAG,gDAAiD,SAAY,CAE9D,MAAMC,EAAM,IAAI,WAAW,CAAC,IAAM,IAAM,IAAM,EAAI,CAAC,EAC7CC,EAAS,IAAI,WAAW,EAAE,EAAE,KAAK,EAAI,EAE3CJ,EAAQ,YACL,yBAAsB,wBAAqB,CAAE,KAAMF,CAAc,CAAC,CAAC,EACnE,yBAAsB,wBAAqB,CAAE,KAAMM,CAAO,CAAC,CAAC,EAE/D,MAAMC,EAAY,IAAI,sBAAoBL,EAAS,CACjD,eAAgBJ,EAChB,YAAaO,CACf,CAAC,EACKG,EAAoBD,EAAK,kBAAkBF,EAAKN,EAAQ,EAAK,EAG7DK,EAAM,MAAMG,EAAK,IAAI,EAG3B,OAAOL,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAO,SAAUE,CAAG,EAAE,KAAK,EAAI,EAC/B,MAAMK,EAAOL,EAAY,KAAK,UAGxBM,EAAW,IAAI,WAAW,EAAIJ,EAAO,OAASE,EAAM,MAAM,EAChEE,EAAS,IAAI,WAAW,GAAG,CAAC,EAAG,CAAC,EAChCA,EAAS,IAAIJ,EAAQ,CAAC,EACtBI,EAAS,IAAIF,EAAO,EAAIF,EAAO,MAAM,EAErC,OAAO,qBAAmB,OAAOG,CAAG,CAAC,EAAE,QAAQC,CAAQ,CACzD,CAAC,EAED,GAAG,kCAAmC,SAAY,CAChD,MAAMC,EAAO,CACX,eAAgB,aAChB,YAAa,IAAI,WAAW,CAAC,CAAC,CAAC,CACjC,EACA,MAAM,OACJ,IAAI,sBAAoBT,EAASS,CAAI,EAAE,IAAI,CAC7C,EAAE,QAAQ,QAAQ,CACpB,CAAC,EAED,GAAG,6DAA8D,IAAM,CACrE,MAAMN,EAAM,IAAI,WAAW,CAAC,EAAG,EAAG,CAAC,CAAC,EAC9BE,EAAY,IAAI,sBAAoBL,EAAS,CACjD,eAAgBJ,EAChB,YAAaO,CACf,CAAC,EAEKO,EAAUL,EAAK,kBAAkBF,EAAKN,EAAQ,EAAK,EACnDc,EAAQ,CAAC,YAAiB,YAAkB,YAAgB,CAAC,EAC7DC,EAAOP,EAAK,kBAAkBK,EAASC,CAAK,EAGlD,OAAOC,EAAK,CAAC,CAAC,EAAE,KAAK,CAAC,EAEtB,OAAOA,EAAK,CAAC,CAAC,EAAE,KAAKD,EAAM,MAAM,EAEjC,OAAOC,EAAK,MAAMA,EAAK,OAASF,EAAQ,MAAM,CAAC,EAAE,QAAQA,CAAO,CAClE,CAAC,EAED,GAAG,sEAAuE,SAAY,CACpF,MAAMG,EAAS,IAAI,WAAW,GAAI,EAAE,KAAK,CAAI,EACvCT,EAAS,IAAI,WAAW,EAAE,EAAE,KAAK,EAAI,EAE3CJ,EAAQ,YACL,yBAAsB,wBAAqB,CAAE,KAAMF,CAAc,CAAC,CAAC,EACnE,qBAAkB,wBAAqB,CAAE,KAAMM,CAAO,CAAC,CAAC,EAE3D,MAAMF,EAAM,MAAM,IAAI,sBAAoBF,EAAS,CACjD,eAAgBJ,EAChB,YAAaiB,CACf,CAAC,EAAE,IAAI,EAEP,OAAO,SAAUX,CAAG,EAAE,KAAK,EAAI,CACjC,CAAC,EAED,GAAG,6CAA8C,SAAY,CAC3D,MAAMY,EAAS,IAAI,WAAW,qBAAqB,CAAC,EAAE,KAAK,GAAI,EACzDZ,EAAM,MAAM,IAAI,sBAAoBF,EAAS,CACjD,eAAgBJ,EAChB,YAAakB,CACf,CAAC,EAAE,IAAI,EAEP,OAAOd,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQE,EAAY,KAAK,EAAE,QACzB,IAAI,yBACF,qBAAqBY,EAAO,MAAM,kBAAkB,oBAAkB,GACxE,CACF,CACF,CAAC,EAED,GAAG,2DAA4D,SAAY,CAEzE,MAAMX,EAAM,IAAI,WAAW,CAAC,GAAM,GAAM,EAAI,CAAC,EACvCC,EAAS,IAAI,WAAW,EAAE,EAAE,KAAK,EAAI,EAE3CJ,EAAQ,YACL,yBAAsB,wBAAqB,CAAE,KAAMF,CAAc,CAAC,CAAC,EACnE,yBACC,wBAAqB,CAAE,MAAOC,EAAgB,CAAS,CAAC,CAC1D,EACC,yBAAsB,wBAAqB,CAAE,KAAMK,CAAO,CAAC,CAAC,EAE/D,MAAMC,EAAY,IAAI,sBAAoBL,EAAS,CACjD,eAAgBJ,EAChB,YAAaO,CACf,CAAC,EAGKY,EAAwBV,EAAK,kBAAkBF,EAAKN,EAAQ,EAAI,EAGhEK,EAAM,MAAMG,EAAK,IAAI,EAG3B,OAAOL,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,MAAMO,EAAOL,EAAY,KAAK,UAExBM,EAAW,IAAI,WAAW,EAAIJ,EAAO,OAASW,EAAU,MAAM,EACpEP,EAAS,IAAI,WAAW,GAAG,CAAC,EAAG,CAAC,EAChCA,EAAS,IAAIJ,EAAQ,CAAC,EACtBI,EAAS,IAAIO,EAAW,EAAIX,EAAO,MAAM,EAEzC,OAAO,qBAAmB,OAAOG,CAAG,CAAC,EAAE,QAAQC,CAAQ,CACzD,CAAC,EAED,GAAG,uCAAwC,SAAY,CACrDR,EAAQ,YACL,yBAAsB,wBAAqB,CAAE,KAAMF,CAAc,CAAC,CAAC,EACnE,yBACC,wBAAqB,CAAE,MAAO,IAAI,yBAAuB,MAAM,CAAE,CAAC,CACpE,EAEF,MAAMI,EAAM,MAAM,IAAI,sBAAoBF,EAAS,CACjD,eAAgBJ,EAChB,YAAa,IAAI,WAAW,CAAC,EAAG,CAAC,CAAC,CACpC,CAAC,EAAE,IAAI,EAEP,OAAOI,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQE,EAAY,KAAK,EAAE,eAAe,wBAAsB,CAClE,CAAC,EAED,GAAG,kDAAmD,SAAY,CAChE,MAAMC,EAAM,IAAI,WAAW,GAAI,EAAE,KAAK,EAAI,EAE1CH,EAAQ,YACL,yBAAsB,wBAAqB,CAAE,KAAMF,CAAc,CAAC,CAAC,EACnE,yBACC,wBAAqB,CAAE,MAAOC,EAAgB,CAAS,CAAC,CAC1D,EAEF,MAAMG,EAAM,MAAM,IAAI,sBAAoBF,EAAS,CACjD,eAAgBJ,EAChB,YAAaO,CACf,CAAC,EAAE,IAAI,EAGP,OAAOH,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQE,EAAY,KAAK,EAAE,QAAQH,EAAgB,CAAC,CACtD,CAAC,CACH,CAAC,EAED,SAAS,sDAAuD,IAAM,CACpE,GAAG,0DAAsD,IAAM,CAC7D,MAAMiB,EAAQ,IAAI,YAAY,EAAE,OAAO;AAAA,MAAc,EAK/CC,EAJY,IAAI,sBAAoBjB,EAAS,CACjD,eAAgBJ,EAChB,YAAaoB,CACf,CAAC,EACe,kBAAkBA,EAAOnB,EAAQ,EAAK,EAEtD,OAAOoB,EAAG,EAAE,CAAC,EAAE,KAAK,gBAAc,KAAK,CACzC,CAAC,EAED,GAAG,sDAAuD,IAAM,CAC9D,MAAMC,EAAO,IAAI,YAAY,EAAE,OAAO,aAAO,EAKvCD,EAJY,IAAI,sBAAoBjB,EAAS,CACjD,eAAgBJ,EAChB,YAAasB,CACf,CAAC,EACe,kBAAkBA,EAAMrB,EAAQ,EAAK,EACrD,OAAOoB,EAAG,EAAE,CAAC,EAAE,KAAK,gBAAc,IAAI,CACxC,CAAC,EAED,GAAG,2CAA4C,IAAM,CAEnD,MAAME,EAAW,IAAI,YAAY,EAAE,OAAO,IAAI,OAAO,KAAK,CAAC,EAKrDF,EAJY,IAAI,sBAAoBjB,EAAS,CACjD,eAAgBJ,EAChB,YAAauB,CACf,CAAC,EACe,kBAAkBA,EAAUtB,EAAQ,EAAK,EACzD,OAAOoB,EAAG,EAAE,CAAC,EAAE,KAAK,gBAAc,UAAU,CAC9C,CAAC,EAED,GAAG,qEAAsE,IAAM,CAC7E,MAAMG,EAAc,IAAI,YAAY,EAAE,OAAO;AAAA,MAAc,EAKrDC,EAJY,IAAI,sBAAoBrB,EAAS,CACjD,eAAgBJ,EAChB,YAAawB,CACf,CAAC,EACmB,kBAAkBA,EAAavB,EAAQ,EAAI,EAE/D,OAAOwB,EAAO,EAAE,CAAC,EAAE,KAAK,gBAAc,IAAI,CAC5C,CAAC,EAED,GAAG,2DAA4D,IAAM,CACnE,MAAML,EAAQ,IAAI,YAAY,EAAE,OAAO,WAAW,EAK5CK,EAJY,IAAI,sBAAoBrB,EAAS,CACjD,eAAgBJ,EAChB,YAAaoB,CACf,CAAC,EACmB,kBAAkBA,EAAOnB,EAAQ,EAAI,EACzD,OAAOwB,EAAO,EAAE,CAAC,EAAE,KAAK,gBAAc,KAAK,CAC7C,CAAC,EAED,GAAG,kDAAmD,IAAM,CAC1D,MAAMC,EAAO,IAAI,WAAW,CAAC,EAAG,EAAG,CAAC,CAAC,EAC/BjB,EAAY,IAAI,sBAAoBL,EAAS,CACjD,eAAgBJ,EAChB,YAAa0B,CACf,CAAC,EAIKL,EAAKZ,EAAK,kBAAkBiB,EAAMzB,EAAQ,EAAK,EACrD,OAAOoB,EAAG,EAAE,CAAC,EAAE,KAAK,CAAC,EACrB,OAAOA,EAAG,EAAE,CAAC,EAAE,KAAK,CAAC,EAIrB,MAAMI,EAAShB,EAAK,kBAAkBiB,EAAMzB,EAAQ,EAAI,EACxD,OAAOwB,EAAO,EAAE,CAAC,EAAE,KAAK,CAAC,EACzB,OAAOA,EAAO,EAAE,CAAC,EAAE,KAAK,CAAC,CAC3B,CAAC,CACH,CAAC,EAED,GAAG,yEAA0E,SAAY,CACvF,MAAMlB,EAAM,IAAI,WAAW,CAAC,EAAG,EAAG,CAAC,CAAC,EAEpCH,EAAQ,YACL,yBAAsB,wBAAqB,CAAE,KAAMF,CAAc,CAAC,CAAC,EACnE,yBAAsB,wBAAqB,CAAE,KAAM,IAAI,WAAW,CAAC,CAAE,CAAC,CAAC,EAE1E,MAAMI,EAAM,MAAM,IAAI,sBAAoBF,EAAS,CACjD,eAAgBJ,EAChB,YAAaO,CACf,CAAC,EAAE,IAAI,EAEP,OAAO,UAAWD,CAAG,EAAE,KAAK,EAAI,EAEhC,MAAMqB,EAAOrB,EAAY,MACzB,OAAOqB,CAAG,EAAE,eAAe,wBAAsB,CACnD,CAAC,CACH,CAAC",
|
|
6
|
+
"names": ["import_device_management_kit", "import_makeInternalApi", "import_bs58Encoder", "import_SendSignMessageTask", "DERIVATION_PATH", "PUBKEY", "PUBKEY_BASE58", "solanaHeaderErr", "apiMock", "result", "res", "msg", "rawSig", "task", "v0OCM", "b58", "expected", "args", "fullMsg", "paths", "apdu", "bigMsg", "tooBig", "legacyOCM", "ascii", "v0", "utf8", "longUtf8", "asciiWithNl", "legacy", "body", "err"]
|
|
7
7
|
}
|
package/lib/cjs/internal/di.js
CHANGED
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var
|
|
1
|
+
"use strict";var a=Object.defineProperty;var p=Object.getOwnPropertyDescriptor;var c=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var u=(o,e)=>{for(var n in e)a(o,n,{get:e[n],enumerable:!0})},C=(o,e,n,t)=>{if(e&&typeof e=="object"||typeof e=="function")for(let i of c(e))!l.call(o,i)&&i!==n&&a(o,i,{get:()=>e[i],enumerable:!(t=p(e,i))||t.enumerable});return o};var M=o=>C(a({},"__esModule",{value:!0}),o);var y={};u(y,{makeContainer:()=>x});module.exports=M(y);var s=require("inversify"),d=require("./app-binder/di/appBinderModule"),m=require("./use-cases/di/useCasesModule"),r=require("./externalTypes");const x=({dmk:o,sessionId:e,contextModule:n})=>{const t=new s.Container;return t.bind(r.externalTypes.Dmk).toConstantValue(o),t.bind(r.externalTypes.SessionId).toConstantValue(e),t.bind(r.externalTypes.ContextModule).toConstantValue(n),t.loadSync((0,d.appBinderModuleFactory)(),(0,m.useCasesModuleFactory)()),t};0&&(module.exports={makeContainer});
|
|
2
2
|
//# sourceMappingURL=di.js.map
|