@ledgerhq/device-signer-kit-solana 0.0.0-wrong-error-when-in-experimental-provider-20251021162636 → 0.0.0-z-intent-queue-7-20251204111630
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +3 -0
- package/lib/cjs/api/app-binder/SignTransactionDeviceActionTypes.js +1 -1
- package/lib/cjs/api/app-binder/SignTransactionDeviceActionTypes.js.map +3 -3
- package/lib/cjs/api/model/TransactionResolutionContext.js +1 -1
- package/lib/cjs/api/model/TransactionResolutionContext.js.map +1 -1
- package/lib/cjs/internal/DefaultSignerSolana.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/GetAppConfigurationCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetAppConfigurationCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/GetAppConfigurationCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetAppConfigurationCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/GetChallengeCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetChallengeCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/GetChallengeCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetChallengeCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/GetPubKeyCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetPubKeyCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/GetPubKeyCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetPubKeyCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/ProvideTLVDescriptorCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/ProvideTLVDescriptorCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/ProvideTLVDescriptorCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/ProvideTLVDescriptorCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.js +2 -0
- package/lib/cjs/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.js.map +7 -0
- package/lib/cjs/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.js +2 -0
- package/lib/cjs/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.js.map +7 -0
- package/lib/cjs/internal/app-binder/command/SignOffChainMessageCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignOffChainMessageCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/SignOffChainMessageCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignOffChainMessageCommand.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/command/SignTransactionCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignTransactionCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/SignTransactionCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignTransactionCommand.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/device-action/SignTransactionDeviceAction.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/SignTransactionDeviceAction.js.map +3 -3
- package/lib/cjs/internal/app-binder/device-action/SignTransactionDeviceAction.test.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/SignTransactionDeviceAction.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/device-action/__test-utils__/makeInternalApi.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/__test-utils__/makeInternalApi.js.map +2 -2
- package/lib/cjs/internal/app-binder/services/TransactionInspector.js +1 -1
- package/lib/cjs/internal/app-binder/services/TransactionInspector.js.map +3 -3
- package/lib/cjs/internal/app-binder/services/TransactionInspector.test.js +1 -1
- package/lib/cjs/internal/app-binder/services/TransactionInspector.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.js +2 -0
- package/lib/cjs/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.js.map +7 -0
- package/lib/cjs/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.js +2 -0
- package/lib/cjs/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.js.map +7 -0
- package/lib/cjs/internal/app-binder/task/BuildTransactionContextTask.js +1 -1
- package/lib/cjs/internal/app-binder/task/BuildTransactionContextTask.js.map +2 -2
- package/lib/cjs/internal/app-binder/task/BuildTransactionContextTask.test.js +1 -1
- package/lib/cjs/internal/app-binder/task/BuildTransactionContextTask.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/task/ProvideTransactionContextTask.js +1 -1
- package/lib/cjs/internal/app-binder/task/ProvideTransactionContextTask.js.map +3 -3
- package/lib/cjs/internal/app-binder/task/ProvideTransactionContextTask.test.js +1 -1
- package/lib/cjs/internal/app-binder/task/ProvideTransactionContextTask.test.js.map +3 -3
- package/lib/cjs/package.json +44 -40
- package/lib/esm/api/app-binder/SignTransactionDeviceActionTypes.js +1 -0
- package/lib/esm/api/app-binder/SignTransactionDeviceActionTypes.js.map +4 -4
- package/lib/esm/internal/DefaultSignerSolana.js.map +2 -2
- package/lib/esm/internal/app-binder/command/GetAppConfigurationCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/GetAppConfigurationCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/GetAppConfigurationCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/GetAppConfigurationCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/GetChallengeCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/GetChallengeCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/GetChallengeCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/GetChallengeCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/GetPubKeyCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/GetPubKeyCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/GetPubKeyCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/GetPubKeyCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/ProvideTLVDescriptorCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/ProvideTLVDescriptorCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/ProvideTLVDescriptorCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/ProvideTLVDescriptorCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.js +2 -0
- package/lib/esm/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.js.map +7 -0
- package/lib/esm/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.js +2 -0
- package/lib/esm/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.js.map +7 -0
- package/lib/esm/internal/app-binder/command/SignOffChainMessageCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/SignOffChainMessageCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/SignOffChainMessageCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/SignOffChainMessageCommand.test.js.map +3 -3
- package/lib/esm/internal/app-binder/command/SignTransactionCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/SignTransactionCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/SignTransactionCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/SignTransactionCommand.test.js.map +3 -3
- package/lib/esm/internal/app-binder/device-action/SignTransactionDeviceAction.js +1 -1
- package/lib/esm/internal/app-binder/device-action/SignTransactionDeviceAction.js.map +3 -3
- package/lib/esm/internal/app-binder/device-action/SignTransactionDeviceAction.test.js +1 -1
- package/lib/esm/internal/app-binder/device-action/SignTransactionDeviceAction.test.js.map +3 -3
- package/lib/esm/internal/app-binder/device-action/__test-utils__/makeInternalApi.js +1 -1
- package/lib/esm/internal/app-binder/device-action/__test-utils__/makeInternalApi.js.map +2 -2
- package/lib/esm/internal/app-binder/services/TransactionInspector.js +1 -1
- package/lib/esm/internal/app-binder/services/TransactionInspector.js.map +3 -3
- package/lib/esm/internal/app-binder/services/TransactionInspector.test.js +1 -1
- package/lib/esm/internal/app-binder/services/TransactionInspector.test.js.map +2 -2
- package/lib/esm/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.js +2 -0
- package/lib/esm/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.js.map +7 -0
- package/lib/esm/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.js +2 -0
- package/lib/esm/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.js.map +7 -0
- package/lib/esm/internal/app-binder/task/BuildTransactionContextTask.js +1 -1
- package/lib/esm/internal/app-binder/task/BuildTransactionContextTask.js.map +2 -2
- package/lib/esm/internal/app-binder/task/BuildTransactionContextTask.test.js +1 -1
- package/lib/esm/internal/app-binder/task/BuildTransactionContextTask.test.js.map +3 -3
- package/lib/esm/internal/app-binder/task/ProvideTransactionContextTask.js +1 -1
- package/lib/esm/internal/app-binder/task/ProvideTransactionContextTask.js.map +3 -3
- package/lib/esm/internal/app-binder/task/ProvideTransactionContextTask.test.js +1 -1
- package/lib/esm/internal/app-binder/task/ProvideTransactionContextTask.test.js.map +3 -3
- package/lib/esm/package.json +44 -40
- package/lib/types/api/app-binder/SignTransactionDeviceActionTypes.d.ts +10 -0
- package/lib/types/api/app-binder/SignTransactionDeviceActionTypes.d.ts.map +1 -1
- package/lib/types/api/model/TransactionResolutionContext.d.ts +2 -0
- package/lib/types/api/model/TransactionResolutionContext.d.ts.map +1 -1
- package/lib/types/internal/DefaultSignerSolana.d.ts +3 -0
- package/lib/types/internal/DefaultSignerSolana.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/GetAppConfigurationCommand.d.ts +1 -0
- package/lib/types/internal/app-binder/command/GetAppConfigurationCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/GetChallengeCommand.d.ts +1 -0
- package/lib/types/internal/app-binder/command/GetChallengeCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/GetPubKeyCommand.d.ts +1 -0
- package/lib/types/internal/app-binder/command/GetPubKeyCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/ProvideTLVDescriptorCommand.d.ts +1 -0
- package/lib/types/internal/app-binder/command/ProvideTLVDescriptorCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.d.ts +29 -0
- package/lib/types/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.d.ts.map +1 -0
- package/lib/types/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.d.ts +2 -0
- package/lib/types/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.d.ts.map +1 -0
- package/lib/types/internal/app-binder/command/SignOffChainMessageCommand.d.ts +1 -0
- package/lib/types/internal/app-binder/command/SignOffChainMessageCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/SignTransactionCommand.d.ts +1 -0
- package/lib/types/internal/app-binder/command/SignTransactionCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/SignTransactionDeviceAction.d.ts +2 -2
- package/lib/types/internal/app-binder/device-action/SignTransactionDeviceAction.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/__test-utils__/makeInternalApi.d.ts.map +1 -1
- package/lib/types/internal/app-binder/services/TransactionInspector.d.ts +7 -10
- package/lib/types/internal/app-binder/services/TransactionInspector.d.ts.map +1 -1
- package/lib/types/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.d.ts +8 -0
- package/lib/types/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.d.ts.map +1 -0
- package/lib/types/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.d.ts +2 -0
- package/lib/types/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.d.ts.map +1 -0
- package/lib/types/internal/app-binder/task/BuildTransactionContextTask.d.ts +4 -9
- package/lib/types/internal/app-binder/task/BuildTransactionContextTask.d.ts.map +1 -1
- package/lib/types/internal/app-binder/task/ProvideTransactionContextTask.d.ts +9 -5
- package/lib/types/internal/app-binder/task/ProvideTransactionContextTask.d.ts.map +1 -1
- package/lib/types/tsconfig.prod.tsbuildinfo +1 -1
- package/package.json +37 -33
- package/lib/cjs/internal/app-binder/command/ProvideTrustedNamePKICommand.js +0 -2
- package/lib/cjs/internal/app-binder/command/ProvideTrustedNamePKICommand.js.map +0 -7
- package/lib/cjs/internal/app-binder/command/ProvideTrustedNamePKICommand.test.js +0 -2
- package/lib/cjs/internal/app-binder/command/ProvideTrustedNamePKICommand.test.js.map +0 -7
- package/lib/esm/internal/app-binder/command/ProvideTrustedNamePKICommand.js +0 -2
- package/lib/esm/internal/app-binder/command/ProvideTrustedNamePKICommand.js.map +0 -7
- package/lib/esm/internal/app-binder/command/ProvideTrustedNamePKICommand.test.js +0 -2
- package/lib/esm/internal/app-binder/command/ProvideTrustedNamePKICommand.test.js.map +0 -7
- package/lib/types/internal/app-binder/command/ProvideTrustedNamePKICommand.d.ts +0 -13
- package/lib/types/internal/app-binder/command/ProvideTrustedNamePKICommand.d.ts.map +0 -1
- package/lib/types/internal/app-binder/command/ProvideTrustedNamePKICommand.test.d.ts +0 -2
- package/lib/types/internal/app-binder/command/ProvideTrustedNamePKICommand.test.d.ts.map +0 -1
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{CommandResultFactory as
|
|
1
|
+
import{CommandResultFactory as s,DeviceActionStatus as e,DeviceModelId as g,DeviceSessionStateType as N,DeviceStatus as I,InvalidStatusWordError as x,UserInteractionRequired as t}from"@ledgerhq/device-management-kit";import{Just as v,Nothing as E}from"purify-ts";import{beforeEach as O,describe as U,it as D,vi as a}from"vitest";import{signTransactionDAStateSteps as n}from"../../../api/app-binder/SignTransactionDeviceActionTypes";import{testDeviceActionStates as y}from"../../app-binder/device-action/__test-utils__/testDeviceActionStates";import{SolanaTransactionTypes as T}from"../../app-binder/services/TransactionInspector";import{makeDeviceActionInternalApiMock as _}from"./__test-utils__/makeInternalApi";import{SignTransactionDeviceAction as C}from"./SignTransactionDeviceAction";const R="44'/501'/0'/0'",V=new Uint8Array([222,173,190,239]),f={getSolanaContext:a.fn()};let o,d,p,S,m,l;function k(){return{getAppConfig:d,buildContext:p,provideContext:S,signTransaction:m,inspectTransaction:l}}U("SignTransactionDeviceAction (Solana)",()=>{O(()=>{o=_(),d=a.fn(),p=a.fn(),S=a.fn(),m=a.fn(),l=a.fn().mockResolvedValue({transactionType:T.SPL,data:{tokenAddress:null,createATA:!1}})}),D("happy path (skip open): getAppConfig -> inspect -> build -> provide -> sign",()=>new Promise((c,u)=>{o.getDeviceSessionState.mockReturnValue({sessionStateType:N.ReadyWithoutSecureChannel,deviceStatus:I.CONNECTED,installedApps:[],currentApp:{name:"Solana",version:"1.4.1"},deviceModelId:g.NANO_X,isSecureConnectionAllowed:!0}),d.mockResolvedValue(s({data:{}})),l.mockResolvedValue({transactionType:T.SPL});const i={tlvDescriptor:new Uint8Array([1]),trustedNamePKICertificate:{keyUsageNumber:0,payload:new Uint8Array([1])},loadersResults:[]};p.mockResolvedValue(i),S.mockResolvedValue(E);const r=new Uint8Array([170,187]);m.mockResolvedValue(s({data:v(r)}));const A=new C({input:{derivationPath:R,transaction:V,transactionOptions:{skipOpenApp:!0},contextModule:f}});a.spyOn(A,"extractDependencies").mockReturnValue(k());const P=[{intermediateValue:{requiredUserInteraction:t.None,step:n.GET_APP_CONFIG},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None,step:n.INSPECT_TRANSACTION},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None,step:n.BUILD_TRANSACTION_CONTEXT},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None,step:n.PROVIDE_TRANSACTION_CONTEXT},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.SignTransaction,step:n.SIGN_TRANSACTION},status:e.Pending},{output:r,status:e.Completed}];y(A,P,o,{onDone:c,onError:u})})),D("failure in provideContext still signs",()=>new Promise((c,u)=>{o.getDeviceSessionState.mockReturnValue({sessionStateType:N.ReadyWithoutSecureChannel,deviceStatus:I.CONNECTED,installedApps:[],currentApp:{name:"Solana",version:"1.4.1"},deviceModelId:g.NANO_X,isSecureConnectionAllowed:!0}),d.mockResolvedValue(s({data:{}})),l.mockResolvedValue({transactionType:T.SPL}),p.mockResolvedValue({descriptor:new Uint8Array([2]),trustedNamePKICertificate:{keyUsageNumber:0,payload:new Uint8Array},challenge:void 0,addressResult:{tokenAccount:"",owner:"",contract:""},loadersResults:[]}),S.mockResolvedValue(v(s({error:new x("ctxErr")})));const i=new Uint8Array([254]);m.mockResolvedValue(s({data:v(i)}));const r=new C({input:{derivationPath:R,transaction:V,transactionOptions:{skipOpenApp:!0},contextModule:f}});a.spyOn(r,"extractDependencies").mockReturnValue(k());const A=[{intermediateValue:{requiredUserInteraction:t.None,step:n.GET_APP_CONFIG},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None,step:n.INSPECT_TRANSACTION},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None,step:n.BUILD_TRANSACTION_CONTEXT},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None,step:n.PROVIDE_TRANSACTION_CONTEXT},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.SignTransaction,step:n.SIGN_TRANSACTION},status:e.Pending},{output:i,status:e.Completed}];y(r,A,o,{onDone:c,onError:u})})),D("buildContext throws \u2192 error",()=>new Promise((c,u)=>{o.getDeviceSessionState.mockReturnValue({sessionStateType:N.ReadyWithoutSecureChannel,deviceStatus:I.CONNECTED,installedApps:[],currentApp:{name:"Solana",version:"1.4.1"},deviceModelId:g.NANO_X,isSecureConnectionAllowed:!0}),d.mockResolvedValue(s({data:{}})),l.mockResolvedValue({transactionType:T.SPL}),p.mockRejectedValue(new x("bldErr"));const i=new C({input:{derivationPath:R,transaction:V,transactionOptions:{skipOpenApp:!0},contextModule:f}});a.spyOn(i,"extractDependencies").mockReturnValue(k());const r=[{intermediateValue:{requiredUserInteraction:t.None,step:n.GET_APP_CONFIG},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None,step:n.INSPECT_TRANSACTION},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None,step:n.BUILD_TRANSACTION_CONTEXT},status:e.Pending},{error:expect.anything(),status:e.Error}];y(i,r,o,{onDone:c,onError:u})}))});
|
|
2
2
|
//# sourceMappingURL=SignTransactionDeviceAction.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/device-action/SignTransactionDeviceAction.test.ts"],
|
|
4
|
-
"sourcesContent": ["import { type ContextModule } from \"@ledgerhq/context-module\";\nimport {\n CommandResultFactory,\n type DeviceActionState,\n DeviceActionStatus,\n DeviceModelId,\n DeviceSessionStateType,\n DeviceStatus,\n InvalidStatusWordError,\n UserInteractionRequired,\n} from \"@ledgerhq/device-management-kit\";\nimport { Just, Nothing } from \"purify-ts\";\nimport { beforeEach, describe, it, vi } from \"vitest\";\n\nimport {\n type SignTransactionDAError,\n type SignTransactionDAInput,\n type SignTransactionDAIntermediateValue,\n} from \"@api/app-binder/SignTransactionDeviceActionTypes\";\nimport { testDeviceActionStates } from \"@internal/app-binder/device-action/__test-utils__/testDeviceActionStates\";\nimport { SolanaTransactionTypes } from \"@internal/app-binder/services/TransactionInspector\";\nimport { type SolanaBuildContextResult } from \"@internal/app-binder/task/BuildTransactionContextTask\";\n\nimport { makeDeviceActionInternalApiMock } from \"./__test-utils__/makeInternalApi\";\nimport { SignTransactionDeviceAction } from \"./SignTransactionDeviceAction\";\n\nconst defaultDerivation = \"44'/501'/0'/0'\";\nconst exampleTx = new Uint8Array([0xde, 0xad, 0xbe, 0xef]);\n\nconst contextModuleStub: ContextModule = {\n getSolanaContext: vi.fn(),\n getFieldContext: vi.fn(),\n getContexts: vi.fn(),\n getTypedDataFilters: vi.fn(),\n getWeb3Checks: vi.fn(),\n};\n\nlet apiMock: ReturnType<typeof makeDeviceActionInternalApiMock>;\nlet getAppConfigMock: ReturnType<typeof vi.fn>;\nlet buildContextMock: ReturnType<typeof vi.fn>;\nlet provideContextMock: ReturnType<typeof vi.fn>;\nlet signMock: ReturnType<typeof vi.fn>;\nlet inspectTransactionMock: ReturnType<typeof vi.fn>;\n\nfunction extractDeps() {\n return {\n getAppConfig: getAppConfigMock,\n buildContext: buildContextMock,\n provideContext: provideContextMock,\n signTransaction: signMock,\n inspectTransaction: inspectTransactionMock,\n };\n}\n\ndescribe(\"SignTransactionDeviceAction (Solana)\", () => {\n beforeEach(() => {\n apiMock = makeDeviceActionInternalApiMock();\n getAppConfigMock = vi.fn();\n buildContextMock = vi.fn();\n provideContextMock = vi.fn();\n signMock = vi.fn();\n inspectTransactionMock = vi.fn().mockResolvedValue({\n transactionType: SolanaTransactionTypes.SPL,\n data: { tokenAddress: null, createATA: false },\n });\n });\n\n it(\"happy path (skip open): getAppConfig -> inspect -> build -> provide -> sign\", () =>\n new Promise<void>((resolve, reject) => {\n apiMock.getDeviceSessionState.mockReturnValue({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Solana\", version: \"1.4.1\" },\n deviceModelId: DeviceModelId.NANO_X,\n isSecureConnectionAllowed: true,\n });\n\n getAppConfigMock.mockResolvedValue(CommandResultFactory({ data: {} }));\n inspectTransactionMock.mockResolvedValue({\n transactionType: SolanaTransactionTypes.SPL,\n });\n\n const ctx: SolanaBuildContextResult = {\n descriptor: new Uint8Array([1]),\n calCertificate: { keyUsageNumber: 0, payload: new Uint8Array([0x01]) },\n challenge: undefined,\n addressResult: { tokenAccount: \"\", owner: \"\", contract: \"\" },\n };\n buildContextMock.mockResolvedValue(ctx);\n provideContextMock.mockResolvedValue(Nothing);\n\n const signature = new Uint8Array([0xaa, 0xbb]);\n signMock.mockResolvedValue(\n CommandResultFactory({ data: Just(signature) }),\n );\n\n const action = new SignTransactionDeviceAction({\n input: {\n derivationPath: defaultDerivation,\n transaction: exampleTx,\n transactionOptions: { skipOpenApp: true },\n contextModule: contextModuleStub,\n } as SignTransactionDAInput,\n });\n vi.spyOn(action, \"extractDependencies\").mockReturnValue(extractDeps());\n\n const expected = [\n // getAppConfig\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // inspectTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // buildContext\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // provideContext\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // signTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.SignTransaction,\n },\n status: DeviceActionStatus.Pending,\n },\n // success\n { output: signature, status: DeviceActionStatus.Completed },\n ] as DeviceActionState<\n Uint8Array,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >[];\n\n testDeviceActionStates<\n Uint8Array,\n SignTransactionDAInput,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >(action, expected, apiMock, { onDone: resolve, onError: reject });\n }));\n\n it(\"failure in provideContext still signs\", () =>\n new Promise<void>((resolve, reject) => {\n apiMock.getDeviceSessionState.mockReturnValue({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Solana\", version: \"1.4.1\" },\n deviceModelId: DeviceModelId.NANO_X,\n isSecureConnectionAllowed: true,\n });\n\n getAppConfigMock.mockResolvedValue(CommandResultFactory({ data: {} }));\n inspectTransactionMock.mockResolvedValue({\n transactionType: SolanaTransactionTypes.SPL,\n });\n\n buildContextMock.mockResolvedValue({\n descriptor: new Uint8Array([2]),\n calCertificate: { keyUsageNumber: 0, payload: new Uint8Array() },\n challenge: undefined,\n addressResult: { tokenAccount: \"\", owner: \"\", contract: \"\" },\n });\n provideContextMock.mockResolvedValue(\n Just(\n CommandResultFactory({ error: new InvalidStatusWordError(\"ctxErr\") }),\n ),\n );\n const sig = new Uint8Array([0xfe]);\n signMock.mockResolvedValue(CommandResultFactory({ data: Just(sig) }));\n\n const action = new SignTransactionDeviceAction({\n input: {\n derivationPath: defaultDerivation,\n transaction: exampleTx,\n transactionOptions: { skipOpenApp: true },\n contextModule: contextModuleStub,\n } as SignTransactionDAInput,\n });\n vi.spyOn(action, \"extractDependencies\").mockReturnValue(extractDeps());\n\n const expected = [\n // getAppConfig\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // inspectTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // buildContext\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // provideContext (returns error but continues)\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // signTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.SignTransaction,\n },\n status: DeviceActionStatus.Pending,\n },\n // success\n { output: sig, status: DeviceActionStatus.Completed },\n ] as DeviceActionState<\n Uint8Array,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >[];\n\n testDeviceActionStates<\n Uint8Array,\n SignTransactionDAInput,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >(action, expected, apiMock, { onDone: resolve, onError: reject });\n }));\n\n it(\"buildContext throws \u2192 error\", () =>\n new Promise<void>((resolve, reject) => {\n apiMock.getDeviceSessionState.mockReturnValue({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Solana\", version: \"1.4.1\" },\n deviceModelId: DeviceModelId.NANO_X,\n isSecureConnectionAllowed: true,\n });\n\n getAppConfigMock.mockResolvedValue(CommandResultFactory({ data: {} }));\n inspectTransactionMock.mockResolvedValue({\n transactionType: SolanaTransactionTypes.SPL,\n });\n\n buildContextMock.mockRejectedValue(new InvalidStatusWordError(\"bldErr\"));\n\n const action = new SignTransactionDeviceAction({\n input: {\n derivationPath: defaultDerivation,\n transaction: exampleTx,\n transactionOptions: { skipOpenApp: true },\n contextModule: contextModuleStub,\n } as SignTransactionDAInput,\n });\n vi.spyOn(action, \"extractDependencies\").mockReturnValue(extractDeps());\n\n const expected = [\n // getAppConfig\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // inspectTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // buildContext (throws)\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // error raised from buildContext\n {\n error: expect.anything() as unknown as SignTransactionDAError,\n status: DeviceActionStatus.Error,\n },\n ] as DeviceActionState<\n Uint8Array,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >[];\n\n testDeviceActionStates<\n Uint8Array,\n SignTransactionDAInput,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >(action, expected, apiMock, { onDone: resolve, onError: reject });\n }));\n});\n"],
|
|
5
|
-
"mappings": "AACA,OACE,wBAAAA,EAEA,sBAAAC,EACA,iBAAAC,EACA,0BAAAC,EACA,gBAAAC,EACA,0BAAAC,EACA,2BAAAC,MACK,kCACP,OAAS,QAAAC,EAAM,WAAAC,MAAe,YAC9B,OAAS,cAAAC,EAAY,YAAAC,EAAU,MAAAC,EAAI,MAAAC,MAAU,
|
|
6
|
-
"names": ["CommandResultFactory", "DeviceActionStatus", "DeviceModelId", "DeviceSessionStateType", "DeviceStatus", "InvalidStatusWordError", "UserInteractionRequired", "Just", "Nothing", "beforeEach", "describe", "it", "vi", "testDeviceActionStates", "SolanaTransactionTypes", "makeDeviceActionInternalApiMock", "SignTransactionDeviceAction", "defaultDerivation", "exampleTx", "contextModuleStub", "apiMock", "getAppConfigMock", "buildContextMock", "provideContextMock", "signMock", "inspectTransactionMock", "extractDeps", "resolve", "reject", "ctx", "signature", "action", "expected", "sig"]
|
|
4
|
+
"sourcesContent": ["import { type ContextModule } from \"@ledgerhq/context-module\";\nimport {\n CommandResultFactory,\n type DeviceActionState,\n DeviceActionStatus,\n DeviceModelId,\n DeviceSessionStateType,\n DeviceStatus,\n InvalidStatusWordError,\n UserInteractionRequired,\n} from \"@ledgerhq/device-management-kit\";\nimport { Just, Nothing } from \"purify-ts\";\nimport { beforeEach, describe, it, vi } from \"vitest\";\n\nimport {\n type SignTransactionDAError,\n type SignTransactionDAInput,\n type SignTransactionDAIntermediateValue,\n signTransactionDAStateSteps,\n} from \"@api/app-binder/SignTransactionDeviceActionTypes\";\nimport { testDeviceActionStates } from \"@internal/app-binder/device-action/__test-utils__/testDeviceActionStates\";\nimport { SolanaTransactionTypes } from \"@internal/app-binder/services/TransactionInspector\";\nimport { type SolanaBuildContextResult } from \"@internal/app-binder/task/BuildTransactionContextTask\";\n\nimport { makeDeviceActionInternalApiMock } from \"./__test-utils__/makeInternalApi\";\nimport { SignTransactionDeviceAction } from \"./SignTransactionDeviceAction\";\n\nconst defaultDerivation = \"44'/501'/0'/0'\";\nconst exampleTx = new Uint8Array([0xde, 0xad, 0xbe, 0xef]);\n\nconst contextModuleStub: ContextModule = {\n getSolanaContext: vi.fn(),\n} as unknown as ContextModule;\n\nlet apiMock: ReturnType<typeof makeDeviceActionInternalApiMock>;\nlet getAppConfigMock: ReturnType<typeof vi.fn>;\nlet buildContextMock: ReturnType<typeof vi.fn>;\nlet provideContextMock: ReturnType<typeof vi.fn>;\nlet signMock: ReturnType<typeof vi.fn>;\nlet inspectTransactionMock: ReturnType<typeof vi.fn>;\n\nfunction extractDeps() {\n return {\n getAppConfig: getAppConfigMock,\n buildContext: buildContextMock,\n provideContext: provideContextMock,\n signTransaction: signMock,\n inspectTransaction: inspectTransactionMock,\n };\n}\n\ndescribe(\"SignTransactionDeviceAction (Solana)\", () => {\n beforeEach(() => {\n apiMock = makeDeviceActionInternalApiMock();\n getAppConfigMock = vi.fn();\n buildContextMock = vi.fn();\n provideContextMock = vi.fn();\n signMock = vi.fn();\n inspectTransactionMock = vi.fn().mockResolvedValue({\n transactionType: SolanaTransactionTypes.SPL,\n data: { tokenAddress: null, createATA: false },\n });\n });\n\n it(\"happy path (skip open): getAppConfig -> inspect -> build -> provide -> sign\", () =>\n new Promise<void>((resolve, reject) => {\n apiMock.getDeviceSessionState.mockReturnValue({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Solana\", version: \"1.4.1\" },\n deviceModelId: DeviceModelId.NANO_X,\n isSecureConnectionAllowed: true,\n });\n\n getAppConfigMock.mockResolvedValue(CommandResultFactory({ data: {} }));\n inspectTransactionMock.mockResolvedValue({\n transactionType: SolanaTransactionTypes.SPL,\n });\n\n const ctx: SolanaBuildContextResult = {\n tlvDescriptor: new Uint8Array([1]),\n trustedNamePKICertificate: {\n keyUsageNumber: 0,\n payload: new Uint8Array([0x01]),\n },\n loadersResults: [],\n };\n buildContextMock.mockResolvedValue(ctx);\n provideContextMock.mockResolvedValue(Nothing);\n\n const signature = new Uint8Array([0xaa, 0xbb]);\n signMock.mockResolvedValue(\n CommandResultFactory({ data: Just(signature) }),\n );\n\n const action = new SignTransactionDeviceAction({\n input: {\n derivationPath: defaultDerivation,\n transaction: exampleTx,\n transactionOptions: { skipOpenApp: true },\n contextModule: contextModuleStub,\n } as SignTransactionDAInput,\n });\n vi.spyOn(action, \"extractDependencies\").mockReturnValue(extractDeps());\n\n const expected = [\n // getAppConfig\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n step: signTransactionDAStateSteps.GET_APP_CONFIG,\n },\n status: DeviceActionStatus.Pending,\n },\n // inspectTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n step: signTransactionDAStateSteps.INSPECT_TRANSACTION,\n },\n status: DeviceActionStatus.Pending,\n },\n // buildContext\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n step: signTransactionDAStateSteps.BUILD_TRANSACTION_CONTEXT,\n },\n status: DeviceActionStatus.Pending,\n },\n // provideContext\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n step: signTransactionDAStateSteps.PROVIDE_TRANSACTION_CONTEXT,\n },\n status: DeviceActionStatus.Pending,\n },\n // signTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.SignTransaction,\n step: signTransactionDAStateSteps.SIGN_TRANSACTION,\n },\n status: DeviceActionStatus.Pending,\n },\n // success\n { output: signature, status: DeviceActionStatus.Completed },\n ] as DeviceActionState<\n Uint8Array,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >[];\n\n testDeviceActionStates<\n Uint8Array,\n SignTransactionDAInput,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >(action, expected, apiMock, { onDone: resolve, onError: reject });\n }));\n\n it(\"failure in provideContext still signs\", () =>\n new Promise<void>((resolve, reject) => {\n apiMock.getDeviceSessionState.mockReturnValue({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Solana\", version: \"1.4.1\" },\n deviceModelId: DeviceModelId.NANO_X,\n isSecureConnectionAllowed: true,\n });\n\n getAppConfigMock.mockResolvedValue(CommandResultFactory({ data: {} }));\n inspectTransactionMock.mockResolvedValue({\n transactionType: SolanaTransactionTypes.SPL,\n });\n\n buildContextMock.mockResolvedValue({\n descriptor: new Uint8Array([2]),\n trustedNamePKICertificate: {\n keyUsageNumber: 0,\n payload: new Uint8Array(),\n },\n challenge: undefined,\n addressResult: { tokenAccount: \"\", owner: \"\", contract: \"\" },\n loadersResults: [], // <-- include it\n });\n provideContextMock.mockResolvedValue(\n Just(\n CommandResultFactory({ error: new InvalidStatusWordError(\"ctxErr\") }),\n ),\n );\n const sig = new Uint8Array([0xfe]);\n signMock.mockResolvedValue(CommandResultFactory({ data: Just(sig) }));\n\n const action = new SignTransactionDeviceAction({\n input: {\n derivationPath: defaultDerivation,\n transaction: exampleTx,\n transactionOptions: { skipOpenApp: true },\n contextModule: contextModuleStub,\n } as SignTransactionDAInput,\n });\n vi.spyOn(action, \"extractDependencies\").mockReturnValue(extractDeps());\n\n const expected = [\n // getAppConfig\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n step: signTransactionDAStateSteps.GET_APP_CONFIG,\n },\n status: DeviceActionStatus.Pending,\n },\n // inspectTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n step: signTransactionDAStateSteps.INSPECT_TRANSACTION,\n },\n status: DeviceActionStatus.Pending,\n },\n // buildContext\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n step: signTransactionDAStateSteps.BUILD_TRANSACTION_CONTEXT,\n },\n status: DeviceActionStatus.Pending,\n },\n // provideContext (returns error but continues)\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n step: signTransactionDAStateSteps.PROVIDE_TRANSACTION_CONTEXT,\n },\n status: DeviceActionStatus.Pending,\n },\n // signTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.SignTransaction,\n step: signTransactionDAStateSteps.SIGN_TRANSACTION,\n },\n status: DeviceActionStatus.Pending,\n },\n // success\n { output: sig, status: DeviceActionStatus.Completed },\n ] as DeviceActionState<\n Uint8Array,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >[];\n\n testDeviceActionStates<\n Uint8Array,\n SignTransactionDAInput,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >(action, expected, apiMock, { onDone: resolve, onError: reject });\n }));\n\n it(\"buildContext throws \u2192 error\", () =>\n new Promise<void>((resolve, reject) => {\n apiMock.getDeviceSessionState.mockReturnValue({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Solana\", version: \"1.4.1\" },\n deviceModelId: DeviceModelId.NANO_X,\n isSecureConnectionAllowed: true,\n });\n\n getAppConfigMock.mockResolvedValue(CommandResultFactory({ data: {} }));\n inspectTransactionMock.mockResolvedValue({\n transactionType: SolanaTransactionTypes.SPL,\n });\n\n buildContextMock.mockRejectedValue(new InvalidStatusWordError(\"bldErr\"));\n\n const action = new SignTransactionDeviceAction({\n input: {\n derivationPath: defaultDerivation,\n transaction: exampleTx,\n transactionOptions: { skipOpenApp: true },\n contextModule: contextModuleStub,\n } as SignTransactionDAInput,\n });\n vi.spyOn(action, \"extractDependencies\").mockReturnValue(extractDeps());\n\n const expected = [\n // getAppConfig\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n step: signTransactionDAStateSteps.GET_APP_CONFIG,\n },\n status: DeviceActionStatus.Pending,\n },\n // inspectTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n step: signTransactionDAStateSteps.INSPECT_TRANSACTION,\n },\n status: DeviceActionStatus.Pending,\n },\n // buildContext (throws)\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n step: signTransactionDAStateSteps.BUILD_TRANSACTION_CONTEXT,\n },\n status: DeviceActionStatus.Pending,\n },\n // error raised from buildContext\n {\n error: expect.anything() as unknown as SignTransactionDAError,\n status: DeviceActionStatus.Error,\n },\n ] as DeviceActionState<\n Uint8Array,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >[];\n\n testDeviceActionStates<\n Uint8Array,\n SignTransactionDAInput,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >(action, expected, apiMock, { onDone: resolve, onError: reject });\n }));\n});\n"],
|
|
5
|
+
"mappings": "AACA,OACE,wBAAAA,EAEA,sBAAAC,EACA,iBAAAC,EACA,0BAAAC,EACA,gBAAAC,EACA,0BAAAC,EACA,2BAAAC,MACK,kCACP,OAAS,QAAAC,EAAM,WAAAC,MAAe,YAC9B,OAAS,cAAAC,EAAY,YAAAC,EAAU,MAAAC,EAAI,MAAAC,MAAU,SAE7C,OAIE,+BAAAC,MACK,mDACP,OAAS,0BAAAC,MAA8B,2EACvC,OAAS,0BAAAC,MAA8B,qDAGvC,OAAS,mCAAAC,MAAuC,mCAChD,OAAS,+BAAAC,MAAmC,gCAE5C,MAAMC,EAAoB,iBACpBC,EAAY,IAAI,WAAW,CAAC,IAAM,IAAM,IAAM,GAAI,CAAC,EAEnDC,EAAmC,CACvC,iBAAkBR,EAAG,GAAG,CAC1B,EAEA,IAAIS,EACAC,EACAC,EACAC,EACAC,EACAC,EAEJ,SAASC,GAAc,CACrB,MAAO,CACL,aAAcL,EACd,aAAcC,EACd,eAAgBC,EAChB,gBAAiBC,EACjB,mBAAoBC,CACtB,CACF,CAEAhB,EAAS,uCAAwC,IAAM,CACrDD,EAAW,IAAM,CACfY,EAAUL,EAAgC,EAC1CM,EAAmBV,EAAG,GAAG,EACzBW,EAAmBX,EAAG,GAAG,EACzBY,EAAqBZ,EAAG,GAAG,EAC3Ba,EAAWb,EAAG,GAAG,EACjBc,EAAyBd,EAAG,GAAG,EAAE,kBAAkB,CACjD,gBAAiBG,EAAuB,IACxC,KAAM,CAAE,aAAc,KAAM,UAAW,EAAM,CAC/C,CAAC,CACH,CAAC,EAEDJ,EAAG,8EAA+E,IAChF,IAAI,QAAc,CAACiB,EAASC,IAAW,CACrCR,EAAQ,sBAAsB,gBAAgB,CAC5C,iBAAkBlB,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,SAAU,QAAS,OAAQ,EAC/C,cAAeF,EAAc,OAC7B,0BAA2B,EAC7B,CAAC,EAEDoB,EAAiB,kBAAkBtB,EAAqB,CAAE,KAAM,CAAC,CAAE,CAAC,CAAC,EACrE0B,EAAuB,kBAAkB,CACvC,gBAAiBX,EAAuB,GAC1C,CAAC,EAED,MAAMe,EAAgC,CACpC,cAAe,IAAI,WAAW,CAAC,CAAC,CAAC,EACjC,0BAA2B,CACzB,eAAgB,EAChB,QAAS,IAAI,WAAW,CAAC,CAAI,CAAC,CAChC,EACA,eAAgB,CAAC,CACnB,EACAP,EAAiB,kBAAkBO,CAAG,EACtCN,EAAmB,kBAAkBhB,CAAO,EAE5C,MAAMuB,EAAY,IAAI,WAAW,CAAC,IAAM,GAAI,CAAC,EAC7CN,EAAS,kBACPzB,EAAqB,CAAE,KAAMO,EAAKwB,CAAS,CAAE,CAAC,CAChD,EAEA,MAAMC,EAAS,IAAIf,EAA4B,CAC7C,MAAO,CACL,eAAgBC,EAChB,YAAaC,EACb,mBAAoB,CAAE,YAAa,EAAK,EACxC,cAAeC,CACjB,CACF,CAAC,EACDR,EAAG,MAAMoB,EAAQ,qBAAqB,EAAE,gBAAgBL,EAAY,CAAC,EAErE,MAAMM,EAAW,CAEf,CACE,kBAAmB,CACjB,wBAAyB3B,EAAwB,KACjD,KAAMO,EAA4B,cACpC,EACA,OAAQZ,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,KACjD,KAAMO,EAA4B,mBACpC,EACA,OAAQZ,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,KACjD,KAAMO,EAA4B,yBACpC,EACA,OAAQZ,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,KACjD,KAAMO,EAA4B,2BACpC,EACA,OAAQZ,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,gBACjD,KAAMO,EAA4B,gBACpC,EACA,OAAQZ,EAAmB,OAC7B,EAEA,CAAE,OAAQ8B,EAAW,OAAQ9B,EAAmB,SAAU,CAC5D,EAMAa,EAKEkB,EAAQC,EAAUZ,EAAS,CAAE,OAAQO,EAAS,QAASC,CAAO,CAAC,CACnE,CAAC,CAAC,EAEJlB,EAAG,wCAAyC,IAC1C,IAAI,QAAc,CAACiB,EAASC,IAAW,CACrCR,EAAQ,sBAAsB,gBAAgB,CAC5C,iBAAkBlB,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,SAAU,QAAS,OAAQ,EAC/C,cAAeF,EAAc,OAC7B,0BAA2B,EAC7B,CAAC,EAEDoB,EAAiB,kBAAkBtB,EAAqB,CAAE,KAAM,CAAC,CAAE,CAAC,CAAC,EACrE0B,EAAuB,kBAAkB,CACvC,gBAAiBX,EAAuB,GAC1C,CAAC,EAEDQ,EAAiB,kBAAkB,CACjC,WAAY,IAAI,WAAW,CAAC,CAAC,CAAC,EAC9B,0BAA2B,CACzB,eAAgB,EAChB,QAAS,IAAI,UACf,EACA,UAAW,OACX,cAAe,CAAE,aAAc,GAAI,MAAO,GAAI,SAAU,EAAG,EAC3D,eAAgB,CAAC,CACnB,CAAC,EACDC,EAAmB,kBACjBjB,EACEP,EAAqB,CAAE,MAAO,IAAIK,EAAuB,QAAQ,CAAE,CAAC,CACtE,CACF,EACA,MAAM6B,EAAM,IAAI,WAAW,CAAC,GAAI,CAAC,EACjCT,EAAS,kBAAkBzB,EAAqB,CAAE,KAAMO,EAAK2B,CAAG,CAAE,CAAC,CAAC,EAEpE,MAAMF,EAAS,IAAIf,EAA4B,CAC7C,MAAO,CACL,eAAgBC,EAChB,YAAaC,EACb,mBAAoB,CAAE,YAAa,EAAK,EACxC,cAAeC,CACjB,CACF,CAAC,EACDR,EAAG,MAAMoB,EAAQ,qBAAqB,EAAE,gBAAgBL,EAAY,CAAC,EAErE,MAAMM,EAAW,CAEf,CACE,kBAAmB,CACjB,wBAAyB3B,EAAwB,KACjD,KAAMO,EAA4B,cACpC,EACA,OAAQZ,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,KACjD,KAAMO,EAA4B,mBACpC,EACA,OAAQZ,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,KACjD,KAAMO,EAA4B,yBACpC,EACA,OAAQZ,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,KACjD,KAAMO,EAA4B,2BACpC,EACA,OAAQZ,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,gBACjD,KAAMO,EAA4B,gBACpC,EACA,OAAQZ,EAAmB,OAC7B,EAEA,CAAE,OAAQiC,EAAK,OAAQjC,EAAmB,SAAU,CACtD,EAMAa,EAKEkB,EAAQC,EAAUZ,EAAS,CAAE,OAAQO,EAAS,QAASC,CAAO,CAAC,CACnE,CAAC,CAAC,EAEJlB,EAAG,mCAA+B,IAChC,IAAI,QAAc,CAACiB,EAASC,IAAW,CACrCR,EAAQ,sBAAsB,gBAAgB,CAC5C,iBAAkBlB,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,SAAU,QAAS,OAAQ,EAC/C,cAAeF,EAAc,OAC7B,0BAA2B,EAC7B,CAAC,EAEDoB,EAAiB,kBAAkBtB,EAAqB,CAAE,KAAM,CAAC,CAAE,CAAC,CAAC,EACrE0B,EAAuB,kBAAkB,CACvC,gBAAiBX,EAAuB,GAC1C,CAAC,EAEDQ,EAAiB,kBAAkB,IAAIlB,EAAuB,QAAQ,CAAC,EAEvE,MAAM2B,EAAS,IAAIf,EAA4B,CAC7C,MAAO,CACL,eAAgBC,EAChB,YAAaC,EACb,mBAAoB,CAAE,YAAa,EAAK,EACxC,cAAeC,CACjB,CACF,CAAC,EACDR,EAAG,MAAMoB,EAAQ,qBAAqB,EAAE,gBAAgBL,EAAY,CAAC,EAErE,MAAMM,EAAW,CAEf,CACE,kBAAmB,CACjB,wBAAyB3B,EAAwB,KACjD,KAAMO,EAA4B,cACpC,EACA,OAAQZ,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,KACjD,KAAMO,EAA4B,mBACpC,EACA,OAAQZ,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,KACjD,KAAMO,EAA4B,yBACpC,EACA,OAAQZ,EAAmB,OAC7B,EAEA,CACE,MAAO,OAAO,SAAS,EACvB,OAAQA,EAAmB,KAC7B,CACF,EAMAa,EAKEkB,EAAQC,EAAUZ,EAAS,CAAE,OAAQO,EAAS,QAASC,CAAO,CAAC,CACnE,CAAC,CAAC,CACN,CAAC",
|
|
6
|
+
"names": ["CommandResultFactory", "DeviceActionStatus", "DeviceModelId", "DeviceSessionStateType", "DeviceStatus", "InvalidStatusWordError", "UserInteractionRequired", "Just", "Nothing", "beforeEach", "describe", "it", "vi", "signTransactionDAStateSteps", "testDeviceActionStates", "SolanaTransactionTypes", "makeDeviceActionInternalApiMock", "SignTransactionDeviceAction", "defaultDerivation", "exampleTx", "contextModuleStub", "apiMock", "getAppConfigMock", "buildContextMock", "provideContextMock", "signMock", "inspectTransactionMock", "extractDeps", "resolve", "reject", "ctx", "signature", "action", "expected", "sig"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
function e(){return{sendApdu:vi.fn(),sendCommand:vi.fn().mockResolvedValue(void 0),getDeviceModel:vi.fn(),getDeviceSessionState:vi.fn(),getDeviceSessionStateObservable:vi.fn(),setDeviceSessionState:vi.fn(),getManagerApiService:vi.fn(),getSecureChannelService:vi.fn()
|
|
1
|
+
function e(){return{sendApdu:vi.fn(),sendCommand:vi.fn().mockResolvedValue(void 0),getDeviceModel:vi.fn(),getDeviceSessionState:vi.fn(),getDeviceSessionStateObservable:vi.fn(),setDeviceSessionState:vi.fn(),getManagerApiService:vi.fn(),getSecureChannelService:vi.fn()}}export{e as makeDeviceActionInternalApiMock};
|
|
2
2
|
//# sourceMappingURL=makeInternalApi.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../../src/internal/app-binder/device-action/__test-utils__/makeInternalApi.ts"],
|
|
4
|
-
"sourcesContent": ["import { type InternalApi } from \"@ledgerhq/device-management-kit\";\nimport { type Mocked } from \"vitest\";\n\nexport function makeDeviceActionInternalApiMock(): Mocked<InternalApi> {\n return {\n sendApdu: vi.fn(),\n sendCommand: vi.fn().mockResolvedValue(undefined),\n getDeviceModel: vi.fn(),\n getDeviceSessionState: vi.fn(),\n getDeviceSessionStateObservable: vi.fn(),\n setDeviceSessionState: vi.fn(),\n getManagerApiService: vi.fn(),\n getSecureChannelService: vi.fn(),\n
|
|
5
|
-
"mappings": "AAGO,SAASA,GAAuD,CACrE,MAAO,CACL,SAAU,GAAG,GAAG,EAChB,YAAa,GAAG,GAAG,EAAE,kBAAkB,MAAS,EAChD,eAAgB,GAAG,GAAG,EACtB,sBAAuB,GAAG,GAAG,EAC7B,gCAAiC,GAAG,GAAG,EACvC,sBAAuB,GAAG,GAAG,EAC7B,qBAAsB,GAAG,GAAG,EAC5B,wBAAyB,GAAG,GAAG,
|
|
4
|
+
"sourcesContent": ["import { type InternalApi } from \"@ledgerhq/device-management-kit\";\nimport { type Mocked } from \"vitest\";\n\nexport function makeDeviceActionInternalApiMock(): Mocked<InternalApi> {\n return {\n sendApdu: vi.fn(),\n sendCommand: vi.fn().mockResolvedValue(undefined),\n getDeviceModel: vi.fn(),\n getDeviceSessionState: vi.fn(),\n getDeviceSessionStateObservable: vi.fn(),\n setDeviceSessionState: vi.fn(),\n getManagerApiService: vi.fn(),\n getSecureChannelService: vi.fn(),\n };\n}\n"],
|
|
5
|
+
"mappings": "AAGO,SAASA,GAAuD,CACrE,MAAO,CACL,SAAU,GAAG,GAAG,EAChB,YAAa,GAAG,GAAG,EAAE,kBAAkB,MAAS,EAChD,eAAgB,GAAG,GAAG,EACtB,sBAAuB,GAAG,GAAG,EAC7B,gCAAiC,GAAG,GAAG,EACvC,sBAAuB,GAAG,GAAG,EAC7B,qBAAsB,GAAG,GAAG,EAC5B,wBAAyB,GAAG,GAAG,CACjC,CACF",
|
|
6
6
|
"names": ["makeDeviceActionInternalApiMock"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{ASSOCIATED_TOKEN_PROGRAM_ID as
|
|
1
|
+
import{ASSOCIATED_TOKEN_PROGRAM_ID as P,TOKEN_2022_PROGRAM_ID as b,TOKEN_PROGRAM_ID as x}from"@solana/spl-token";import{Connection as S,Transaction as k,TransactionInstruction as L,VersionedMessage as R,VersionedTransaction as D}from"@solana/web3.js";import{Buffer as g}from"buffer";import{DECODERS as M}from"../../app-binder/services/utils/transactionDecoders";var U=(a=>(a.STANDARD="Standard",a.SPL="SPL",a))(U||{});const C="https://api.mainnet-beta.solana.com/",N=y=>new S(y,{commitment:"confirmed"}),I=y=>!!y&&(y.equals(P)||y.equals(x)||y.equals(b));class A{RPCURL;constructor(r){this.RPCURL=r}async inspectTransactionType(r,a,c){try{const n=await A.normaliseMessage(r,this.RPCURL||C);if(a||c)return{transactionType:n.compiledInstructions.some(o=>I(n.allKeys[o.programIdIndex]))?"SPL":"Standard",data:{...a?{tokenAddress:a}:{},...c?{createATA:c}:{}}};let d=!1,t={};for(const l of n.compiledInstructions){const o=n.allKeys[l.programIdIndex];if(!o)continue;I(o)&&(d=!0);const p=l.accountKeyIndexes.map(i=>n.allKeys[i]).filter(i=>!!i),e=new L({programId:o,keys:p.map(i=>({pubkey:i,isSigner:!1,isWritable:!1})),data:g.from(l.data)}),s={programId:o,ixMeta:l,message:n,instruction:e};for(const i of M){if(!i.when(s))continue;const m=i.decode(s);m&&(m.createATA&&!t.createATA?t={...t,createATA:m.createATA}:m.tokenAddress&&!t.tokenAddress&&!t.createATA&&(t={...t,tokenAddress:m.tokenAddress}))}}return t.createATA?{transactionType:"SPL",data:t}:t.tokenAddress?{transactionType:"SPL",data:t}:d?{transactionType:"SPL",data:{}}:{transactionType:"Standard",data:{}}}catch{return{transactionType:"Standard",data:{}}}}static async normaliseMessage(r,a){const c=A.tryDeserialiseVersioned(r);if(c){const e=c.message,s=a?await A.resolveLookedUpAddressesFromMessage(e,a):void 0,i=[...e.staticAccountKeys,...s?.writable??[],...s?.readonly??[]];return{compiledInstructions:e.compiledInstructions.map(u=>{const T=u,K=Array.from(T.accounts??u.accountKeyIndexes??[]);let f;return u.data instanceof Uint8Array?f=u.data:typeof u.data=="string"?f=g.from(u.data,"base64"):f=Uint8Array.from(u.data??[]),{programIdIndex:u.programIdIndex,accountKeyIndexes:K,data:f}}),allKeys:i}}const n=k.from(r),d=new Map,t=e=>{if(!e)return;const s=e.toBase58();d.has(s)||d.set(s,e)};t(n.feePayer??null);for(const e of n.instructions){t(e.programId);for(const s of e.keys)t(s.pubkey)}const l=Array.from(d.values()),o=new Map(l.map((e,s)=>[e.toBase58(),s]));return{compiledInstructions:n.instructions.map(e=>({programIdIndex:o.get(e.programId.toBase58())??-1,accountKeyIndexes:e.keys.map(s=>o.get(s.pubkey.toBase58())??-1),data:e.data})),allKeys:l}}static tryDeserialiseVersioned(r){try{return D.deserialize(r)}catch{try{return{message:R.deserialize(r)}}catch{return null}}}static async resolveLookedUpAddressesFromMessage(r,a){const c=r.addressTableLookups??[];if(!c.length)return;const n=[],d=[];for(const t of c){const o=(await N(a).getAddressLookupTable(t.accountKey)).value;if(!o)continue;const p=o.state.addresses;for(const e of t.writableIndexes??[]){const s=p[e];s&&n.push(s)}for(const e of t.readonlyIndexes??[]){const s=p[e];s&&d.push(s)}}return{writable:n,readonly:d}}}export{U as SolanaTransactionTypes,A as TransactionInspector};
|
|
2
2
|
//# sourceMappingURL=TransactionInspector.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/services/TransactionInspector.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n ASSOCIATED_TOKEN_PROGRAM_ID,\n TOKEN_2022_PROGRAM_ID,\n TOKEN_PROGRAM_ID,\n} from \"@solana/spl-token\";\nimport {\n Connection,\n type PublicKey,\n Transaction,\n TransactionInstruction,\n VersionedMessage,\n VersionedTransaction,\n} from \"@solana/web3.js\";\nimport { Buffer } from \"buffer\";\n\nimport {\n DECODERS,\n type IxContext,\n} from \"@internal/app-binder/services/utils/transactionDecoders\";\n\nexport enum SolanaTransactionTypes {\n STANDARD = \"Standard\",\n SPL = \"SPL\",\n}\n\nexport type NormalizedCompiledIx = {\n programIdIndex: number;\n accountKeyIndexes: number[];\n data: Uint8Array;\n};\n\nexport type NormalizedMessage = {\n compiledInstructions: NormalizedCompiledIx[];\n allKeys: PublicKey[];\n};\n\nexport type TxInspectorResult = {\n transactionType: SolanaTransactionTypes;\n data: {\n tokenAddress?: string;\n createATA?: { address: string; mintAddress: string };\n };\n};\n\ntype LoadedAddresses = { writable: PublicKey[]; readonly: PublicKey[] };\n\nconst
|
|
5
|
-
"mappings": "AAAA,OACE,+BAAAA,EACA,yBAAAC,EACA,oBAAAC,MACK,oBACP,OACE,cAAAC,EAEA,eAAAC,EACA,0BAAAC,EACA,oBAAAC,EACA,wBAAAC,MACK,kBACP,OAAS,UAAAC,MAAc,SAEvB,OACE,YAAAC,MAEK,0DAEA,IAAKC,OACVA,EAAA,SAAW,WACXA,EAAA,IAAM,MAFIA,OAAA,IA0BZ,MAAMC,
|
|
6
|
-
"names": ["ASSOCIATED_TOKEN_PROGRAM_ID", "TOKEN_2022_PROGRAM_ID", "TOKEN_PROGRAM_ID", "Connection", "Transaction", "TransactionInstruction", "VersionedMessage", "VersionedTransaction", "Buffer", "DECODERS", "SolanaTransactionTypes", "
|
|
4
|
+
"sourcesContent": ["import {\n ASSOCIATED_TOKEN_PROGRAM_ID,\n TOKEN_2022_PROGRAM_ID,\n TOKEN_PROGRAM_ID,\n} from \"@solana/spl-token\";\nimport {\n Connection,\n type PublicKey,\n Transaction,\n TransactionInstruction,\n VersionedMessage,\n VersionedTransaction,\n} from \"@solana/web3.js\";\nimport { Buffer } from \"buffer\";\n\nimport {\n DECODERS,\n type IxContext,\n} from \"@internal/app-binder/services/utils/transactionDecoders\";\n\nexport enum SolanaTransactionTypes {\n STANDARD = \"Standard\",\n SPL = \"SPL\",\n}\n\nexport type NormalizedCompiledIx = {\n programIdIndex: number;\n accountKeyIndexes: number[];\n data: Uint8Array;\n};\n\nexport type NormalizedMessage = {\n compiledInstructions: NormalizedCompiledIx[];\n allKeys: PublicKey[];\n};\n\nexport type TxInspectorResult = {\n transactionType: SolanaTransactionTypes;\n data: {\n tokenAddress?: string;\n createATA?: { address: string; mintAddress: string };\n };\n};\n\ntype LoadedAddresses = { writable: PublicKey[]; readonly: PublicKey[] };\n\nconst DEFAULT_RPC_URL = \"https://api.mainnet-beta.solana.com/\";\n\nconst defaultConnection = (rpcUrl: string) =>\n new Connection(rpcUrl, { commitment: \"confirmed\" });\n\nconst isSPLProgramId = (pid: PublicKey | undefined) =>\n !!pid &&\n (pid.equals(ASSOCIATED_TOKEN_PROGRAM_ID) ||\n pid.equals(TOKEN_PROGRAM_ID) ||\n pid.equals(TOKEN_2022_PROGRAM_ID));\n\nexport class TransactionInspector {\n private readonly RPCURL: string | undefined;\n constructor(injectedRPCURL?: string | undefined) {\n this.RPCURL = injectedRPCURL;\n }\n\n public async inspectTransactionType(\n rawTransactionBytes: Uint8Array,\n tokenAddress?: string | undefined,\n createATA?:\n | {\n address: string;\n mintAddress: string;\n }\n | undefined,\n ): Promise<TxInspectorResult> {\n try {\n const message = await TransactionInspector.normaliseMessage(\n rawTransactionBytes,\n this.RPCURL || DEFAULT_RPC_URL,\n );\n\n // fast path when transaction resolution is provided\n if (tokenAddress || createATA) {\n const looksSPL = message.compiledInstructions.some((instruction) =>\n isSPLProgramId(message.allKeys[instruction.programIdIndex]),\n );\n return {\n transactionType: looksSPL\n ? SolanaTransactionTypes.SPL\n : SolanaTransactionTypes.STANDARD,\n data: {\n ...(tokenAddress ? { tokenAddress: tokenAddress } : {}),\n ...(createATA ? { createATA: createATA } : {}),\n },\n };\n }\n\n // accumulate best data across all instructions\n let sawSPL = false;\n let best: TxInspectorResult[\"data\"] = {};\n\n for (const ixMeta of message.compiledInstructions) {\n const programId = message.allKeys[ixMeta.programIdIndex];\n if (!programId) continue; // unresolved index, skip\n if (isSPLProgramId(programId)) sawSPL = true;\n\n const resolvedKeys = ixMeta.accountKeyIndexes\n .map((i) => message.allKeys[i])\n .filter((k): k is PublicKey => !!k);\n\n const instruction = new TransactionInstruction({\n programId,\n keys: resolvedKeys.map((pk) => ({\n pubkey: pk,\n isSigner: false,\n isWritable: false,\n })),\n data: Buffer.from(ixMeta.data),\n });\n\n const ctx: IxContext = { programId, ixMeta, message, instruction };\n\n for (const decoder of DECODERS) {\n if (!decoder.when(ctx)) continue;\n const data = decoder.decode(ctx);\n if (!data) continue;\n\n // prefer createATA (needed when destination ATA doesn\u2019t exist yet)\n if (data.createATA && !best.createATA) {\n best = { ...best, createATA: data.createATA };\n } else if (\n data.tokenAddress &&\n !best.tokenAddress &&\n !best.createATA\n ) {\n best = { ...best, tokenAddress: data.tokenAddress };\n }\n }\n }\n\n if (best.createATA)\n return { transactionType: SolanaTransactionTypes.SPL, data: best };\n\n if (best.tokenAddress)\n return { transactionType: SolanaTransactionTypes.SPL, data: best };\n\n if (sawSPL)\n return { transactionType: SolanaTransactionTypes.SPL, data: {} }; // we should never reach here, in case we do tx will fall back to blind sign\n\n return { transactionType: SolanaTransactionTypes.STANDARD, data: {} };\n } catch {\n return { transactionType: SolanaTransactionTypes.STANDARD, data: {} };\n }\n }\n\n /**\n * Normalise any tx (legacy or v0) into { compiledInstructions, allKeys }.\n * For v0, auto-fetch looked-up addresses from ALT(s) via the connection.\n */\n static async normaliseMessage(\n rawBytes: Uint8Array,\n rpcURL?: string,\n ): Promise<NormalizedMessage> {\n const versionedTX = TransactionInspector.tryDeserialiseVersioned(rawBytes);\n\n if (versionedTX) {\n const msg = versionedTX.message as VersionedMessage & {\n getAccountKeys?: (options?: {\n accountKeysFromLookups?: LoadedAddresses;\n }) => {\n staticAccountKeys: PublicKey[];\n accountKeysFromLookups?: LoadedAddresses;\n keySegments: () => PublicKey[][];\n };\n compiledInstructions: Array<{\n programIdIndex: number;\n accountKeyIndexes?: number[]; // legacy field name\n accounts?: number[]; // v0 field name\n data: Uint8Array | string | number[];\n }>;\n staticAccountKeys: PublicKey[];\n };\n\n const lookedUp = rpcURL\n ? await TransactionInspector.resolveLookedUpAddressesFromMessage(\n msg,\n rpcURL,\n )\n : undefined;\n\n const allKeys: PublicKey[] = [\n ...msg.staticAccountKeys,\n ...(lookedUp?.writable ?? []),\n ...(lookedUp?.readonly ?? []),\n ];\n\n const compiledInstructions: NormalizedCompiledIx[] =\n msg.compiledInstructions.map((instruction) => {\n const ixWithAccounts = instruction as typeof instruction & {\n accounts?: number[];\n };\n\n const accountKeyIndexes = Array.from(\n ixWithAccounts.accounts ?? instruction.accountKeyIndexes ?? [],\n ) as number[];\n\n let data: Uint8Array;\n if (instruction.data instanceof Uint8Array) {\n data = instruction.data;\n } else if (typeof instruction.data === \"string\") {\n data = Buffer.from(instruction.data, \"base64\"); // v0 encodes instruction data as base64\n } else {\n data = Uint8Array.from(instruction.data ?? []);\n }\n\n return {\n programIdIndex: instruction.programIdIndex,\n accountKeyIndexes,\n data,\n };\n });\n\n return { compiledInstructions, allKeys };\n }\n\n // legacy (no ALTs)\n const legacy = Transaction.from(rawBytes);\n\n const allKeyMap = new Map<string, PublicKey>();\n\n const add = (pubkey?: PublicKey | null) => {\n if (!pubkey) return;\n const key = pubkey.toBase58();\n if (!allKeyMap.has(key)) allKeyMap.set(key, pubkey);\n };\n\n add(legacy.feePayer ?? null);\n\n for (const instruction of legacy.instructions) {\n add(instruction.programId);\n for (const key of instruction.keys) add(key.pubkey);\n }\n\n const allKeys = Array.from(allKeyMap.values());\n const indexByB58 = new Map(allKeys.map((pk, i) => [pk.toBase58(), i]));\n\n const compiledInstructions: NormalizedCompiledIx[] =\n legacy.instructions.map((instruction) => ({\n programIdIndex: indexByB58.get(instruction.programId.toBase58()) ?? -1,\n accountKeyIndexes: instruction.keys.map(\n (key) => indexByB58.get(key.pubkey.toBase58()) ?? -1,\n ),\n data: instruction.data,\n }));\n\n return { compiledInstructions, allKeys };\n }\n\n private static tryDeserialiseVersioned(\n rawBytes: Uint8Array,\n ): VersionedTransaction | null {\n try {\n return VersionedTransaction.deserialize(rawBytes);\n } catch {\n try {\n const msg = VersionedMessage.deserialize(rawBytes);\n return { message: msg } as VersionedTransaction;\n } catch {\n return null;\n }\n }\n }\n\n /**\n * For v0, fetch looked-up addresses from ALT(s) via the connection\n */\n private static async resolveLookedUpAddressesFromMessage(\n msg: VersionedMessage,\n rpcURL: string,\n ): Promise<LoadedAddresses | undefined> {\n const lookups = msg.addressTableLookups ?? [];\n if (!lookups.length) return;\n\n const writable: PublicKey[] = [];\n const readonly: PublicKey[] = [];\n\n for (const lu of lookups) {\n const res = await defaultConnection(rpcURL).getAddressLookupTable(\n lu.accountKey,\n );\n const table = res.value;\n if (!table) continue;\n const addrs = table.state.addresses;\n\n for (const i of lu.writableIndexes ?? []) {\n const pk = addrs[i];\n if (pk) writable.push(pk);\n }\n for (const i of lu.readonlyIndexes ?? []) {\n const pk = addrs[i];\n if (pk) readonly.push(pk);\n }\n }\n\n return { writable, readonly };\n }\n}\n"],
|
|
5
|
+
"mappings": "AAAA,OACE,+BAAAA,EACA,yBAAAC,EACA,oBAAAC,MACK,oBACP,OACE,cAAAC,EAEA,eAAAC,EACA,0BAAAC,EACA,oBAAAC,EACA,wBAAAC,MACK,kBACP,OAAS,UAAAC,MAAc,SAEvB,OACE,YAAAC,MAEK,0DAEA,IAAKC,OACVA,EAAA,SAAW,WACXA,EAAA,IAAM,MAFIA,OAAA,IA0BZ,MAAMC,EAAkB,uCAElBC,EAAqBC,GACzB,IAAIV,EAAWU,EAAQ,CAAE,WAAY,WAAY,CAAC,EAE9CC,EAAkBC,GACtB,CAAC,CAACA,IACDA,EAAI,OAAOf,CAA2B,GACrCe,EAAI,OAAOb,CAAgB,GAC3Ba,EAAI,OAAOd,CAAqB,GAE7B,MAAMe,CAAqB,CACf,OACjB,YAAYC,EAAqC,CAC/C,KAAK,OAASA,CAChB,CAEA,MAAa,uBACXC,EACAC,EACAC,EAM4B,CAC5B,GAAI,CACF,MAAMC,EAAU,MAAML,EAAqB,iBACzCE,EACA,KAAK,QAAUP,CACjB,EAGA,GAAIQ,GAAgBC,EAIlB,MAAO,CACL,gBAJeC,EAAQ,qBAAqB,KAAMC,GAClDR,EAAeO,EAAQ,QAAQC,EAAY,cAAc,CAAC,CAC5D,EAGM,MACA,WACJ,KAAM,CACJ,GAAIH,EAAe,CAAE,aAAcA,CAAa,EAAI,CAAC,EACrD,GAAIC,EAAY,CAAE,UAAWA,CAAU,EAAI,CAAC,CAC9C,CACF,EAIF,IAAIG,EAAS,GACTC,EAAkC,CAAC,EAEvC,UAAWC,KAAUJ,EAAQ,qBAAsB,CACjD,MAAMK,EAAYL,EAAQ,QAAQI,EAAO,cAAc,EACvD,GAAI,CAACC,EAAW,SACZZ,EAAeY,CAAS,IAAGH,EAAS,IAExC,MAAMI,EAAeF,EAAO,kBACzB,IAAK,GAAMJ,EAAQ,QAAQ,CAAC,CAAC,EAC7B,OAAQO,GAAsB,CAAC,CAACA,CAAC,EAE9BN,EAAc,IAAIjB,EAAuB,CAC7C,UAAAqB,EACA,KAAMC,EAAa,IAAKE,IAAQ,CAC9B,OAAQA,EACR,SAAU,GACV,WAAY,EACd,EAAE,EACF,KAAMrB,EAAO,KAAKiB,EAAO,IAAI,CAC/B,CAAC,EAEKK,EAAiB,CAAE,UAAAJ,EAAW,OAAAD,EAAQ,QAAAJ,EAAS,YAAAC,CAAY,EAEjE,UAAWS,KAAWtB,EAAU,CAC9B,GAAI,CAACsB,EAAQ,KAAKD,CAAG,EAAG,SACxB,MAAME,EAAOD,EAAQ,OAAOD,CAAG,EAC1BE,IAGDA,EAAK,WAAa,CAACR,EAAK,UAC1BA,EAAO,CAAE,GAAGA,EAAM,UAAWQ,EAAK,SAAU,EAE5CA,EAAK,cACL,CAACR,EAAK,cACN,CAACA,EAAK,YAENA,EAAO,CAAE,GAAGA,EAAM,aAAcQ,EAAK,YAAa,GAEtD,CACF,CAEA,OAAIR,EAAK,UACA,CAAE,gBAAiB,MAA4B,KAAMA,CAAK,EAE/DA,EAAK,aACA,CAAE,gBAAiB,MAA4B,KAAMA,CAAK,EAE/DD,EACK,CAAE,gBAAiB,MAA4B,KAAM,CAAC,CAAE,EAE1D,CAAE,gBAAiB,WAAiC,KAAM,CAAC,CAAE,CACtE,MAAQ,CACN,MAAO,CAAE,gBAAiB,WAAiC,KAAM,CAAC,CAAE,CACtE,CACF,CAMA,aAAa,iBACXU,EACAC,EAC4B,CAC5B,MAAMC,EAAcnB,EAAqB,wBAAwBiB,CAAQ,EAEzE,GAAIE,EAAa,CACf,MAAMC,EAAMD,EAAY,QAiBlBE,EAAWH,EACb,MAAMlB,EAAqB,oCACzBoB,EACAF,CACF,EACA,OAEEI,EAAuB,CAC3B,GAAGF,EAAI,kBACP,GAAIC,GAAU,UAAY,CAAC,EAC3B,GAAIA,GAAU,UAAY,CAAC,CAC7B,EA4BA,MAAO,CAAE,qBAzBPD,EAAI,qBAAqB,IAAKd,GAAgB,CAC5C,MAAMiB,EAAiBjB,EAIjBkB,EAAoB,MAAM,KAC9BD,EAAe,UAAYjB,EAAY,mBAAqB,CAAC,CAC/D,EAEA,IAAIU,EACJ,OAAIV,EAAY,gBAAgB,WAC9BU,EAAOV,EAAY,KACV,OAAOA,EAAY,MAAS,SACrCU,EAAOxB,EAAO,KAAKc,EAAY,KAAM,QAAQ,EAE7CU,EAAO,WAAW,KAAKV,EAAY,MAAQ,CAAC,CAAC,EAGxC,CACL,eAAgBA,EAAY,eAC5B,kBAAAkB,EACA,KAAAR,CACF,CACF,CAAC,EAE4B,QAAAM,CAAQ,CACzC,CAGA,MAAMG,EAASrC,EAAY,KAAK6B,CAAQ,EAElCS,EAAY,IAAI,IAEhBC,EAAOC,GAA8B,CACzC,GAAI,CAACA,EAAQ,OACb,MAAMC,EAAMD,EAAO,SAAS,EACvBF,EAAU,IAAIG,CAAG,GAAGH,EAAU,IAAIG,EAAKD,CAAM,CACpD,EAEAD,EAAIF,EAAO,UAAY,IAAI,EAE3B,UAAWnB,KAAemB,EAAO,aAAc,CAC7CE,EAAIrB,EAAY,SAAS,EACzB,UAAWuB,KAAOvB,EAAY,KAAMqB,EAAIE,EAAI,MAAM,CACpD,CAEA,MAAMP,EAAU,MAAM,KAAKI,EAAU,OAAO,CAAC,EACvCI,EAAa,IAAI,IAAIR,EAAQ,IAAI,CAACT,EAAIkB,IAAM,CAAClB,EAAG,SAAS,EAAGkB,CAAC,CAAC,CAAC,EAWrE,MAAO,CAAE,qBARPN,EAAO,aAAa,IAAKnB,IAAiB,CACxC,eAAgBwB,EAAW,IAAIxB,EAAY,UAAU,SAAS,CAAC,GAAK,GACpE,kBAAmBA,EAAY,KAAK,IACjCuB,GAAQC,EAAW,IAAID,EAAI,OAAO,SAAS,CAAC,GAAK,EACpD,EACA,KAAMvB,EAAY,IACpB,EAAE,EAE2B,QAAAgB,CAAQ,CACzC,CAEA,OAAe,wBACbL,EAC6B,CAC7B,GAAI,CACF,OAAO1B,EAAqB,YAAY0B,CAAQ,CAClD,MAAQ,CACN,GAAI,CAEF,MAAO,CAAE,QADG3B,EAAiB,YAAY2B,CAAQ,CAC3B,CACxB,MAAQ,CACN,OAAO,IACT,CACF,CACF,CAKA,aAAqB,oCACnBG,EACAF,EACsC,CACtC,MAAMc,EAAUZ,EAAI,qBAAuB,CAAC,EAC5C,GAAI,CAACY,EAAQ,OAAQ,OAErB,MAAMC,EAAwB,CAAC,EACzBC,EAAwB,CAAC,EAE/B,UAAWC,KAAMH,EAAS,CAIxB,MAAMI,GAHM,MAAMxC,EAAkBsB,CAAM,EAAE,sBAC1CiB,EAAG,UACL,GACkB,MAClB,GAAI,CAACC,EAAO,SACZ,MAAMC,EAAQD,EAAM,MAAM,UAE1B,UAAWL,KAAKI,EAAG,iBAAmB,CAAC,EAAG,CACxC,MAAMtB,EAAKwB,EAAMN,CAAC,EACdlB,GAAIoB,EAAS,KAAKpB,CAAE,CAC1B,CACA,UAAWkB,KAAKI,EAAG,iBAAmB,CAAC,EAAG,CACxC,MAAMtB,EAAKwB,EAAMN,CAAC,EACdlB,GAAIqB,EAAS,KAAKrB,CAAE,CAC1B,CACF,CAEA,MAAO,CAAE,SAAAoB,EAAU,SAAAC,CAAS,CAC9B,CACF",
|
|
6
|
+
"names": ["ASSOCIATED_TOKEN_PROGRAM_ID", "TOKEN_2022_PROGRAM_ID", "TOKEN_PROGRAM_ID", "Connection", "Transaction", "TransactionInstruction", "VersionedMessage", "VersionedTransaction", "Buffer", "DECODERS", "SolanaTransactionTypes", "DEFAULT_RPC_URL", "defaultConnection", "rpcUrl", "isSPLProgramId", "pid", "TransactionInspector", "injectedRPCURL", "rawTransactionBytes", "tokenAddress", "createATA", "message", "instruction", "sawSPL", "best", "ixMeta", "programId", "resolvedKeys", "k", "pk", "ctx", "decoder", "data", "rawBytes", "rpcURL", "versionedTX", "msg", "lookedUp", "allKeys", "ixWithAccounts", "accountKeyIndexes", "legacy", "allKeyMap", "add", "pubkey", "key", "indexByB58", "i", "lookups", "writable", "readonly", "lu", "table", "addrs"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{ASSOCIATED_TOKEN_PROGRAM_ID as A,createAssociatedTokenAccountInstruction as w,createCloseAccountInstruction as m,createInitializeAccount2Instruction as S,createInitializeAccount3Instruction as f,createInitializeAccountInstruction as P,createSyncNativeInstruction as k,createTransferCheckedInstruction as I,createTransferInstruction as g,getAssociatedTokenAddressSync as b,TOKEN_2022_PROGRAM_ID as B,TOKEN_PROGRAM_ID as l}from"@solana/spl-token";import{Keypair as t,SystemProgram as L,Transaction as h,TransactionInstruction as E}from"@solana/web3.js";import{describe as v,expect as r,it as u}from"vitest";import{DefaultBs58Encoder as D}from"../../app-binder/services/bs58Encoder";import{SolanaTransactionTypes as d,TransactionInspector as p}from"./TransactionInspector";const O=D.encode(new Uint8Array(32).fill(170));function y(e,n,a){const s=a??n[0]??t.generate(),c=new h;c.recentBlockhash=O,c.feePayer=s.publicKey,c.add(...e);const o=new Set,i=[s,...n].filter(T=>{const K=T.publicKey.toBase58();return o.has(K)?!1:(o.add(K),!0)});return c.sign(...i),{raw:c.serialize(),payer:s}}v("TransactionInspector",()=>{u("falls back to STANDARD for a plain SystemProgram transfer",async()=>{const e=t.generate(),n=t.generate().publicKey,a=L.transfer({fromPubkey:e.publicKey,toPubkey:n,lamports:1e3}),{raw:s}=y([a],[e],e),c=await new p(
|
|
1
|
+
import{ASSOCIATED_TOKEN_PROGRAM_ID as A,createAssociatedTokenAccountInstruction as w,createCloseAccountInstruction as m,createInitializeAccount2Instruction as S,createInitializeAccount3Instruction as f,createInitializeAccountInstruction as P,createSyncNativeInstruction as k,createTransferCheckedInstruction as I,createTransferInstruction as g,getAssociatedTokenAddressSync as b,TOKEN_2022_PROGRAM_ID as B,TOKEN_PROGRAM_ID as l}from"@solana/spl-token";import{Keypair as t,SystemProgram as L,Transaction as h,TransactionInstruction as E}from"@solana/web3.js";import{describe as v,expect as r,it as u}from"vitest";import{DefaultBs58Encoder as D}from"../../app-binder/services/bs58Encoder";import{SolanaTransactionTypes as d,TransactionInspector as p}from"./TransactionInspector";const O=D.encode(new Uint8Array(32).fill(170));function y(e,n,a){const s=a??n[0]??t.generate(),c=new h;c.recentBlockhash=O,c.feePayer=s.publicKey,c.add(...e);const o=new Set,i=[s,...n].filter(T=>{const K=T.publicKey.toBase58();return o.has(K)?!1:(o.add(K),!0)});return c.sign(...i),{raw:c.serialize(),payer:s}}v("TransactionInspector",()=>{u("falls back to STANDARD for a plain SystemProgram transfer",async()=>{const e=t.generate(),n=t.generate().publicKey,a=L.transfer({fromPubkey:e.publicKey,toPubkey:n,lamports:1e3}),{raw:s}=y([a],[e],e),c=await new p().inspectTransactionType(s);r(c.transactionType).toBe(d.STANDARD),r(c.data).toEqual({})}),u("detects an SPL Transfer and returns the destination address",async()=>{const e=t.generate(),n=t.generate().publicKey,a=t.generate().publicKey,s=g(n,a,e.publicKey,42n,[],l),{raw:c}=y([s],[e],e),o=await new p().inspectTransactionType(c);r(o.transactionType).toBe(d.SPL),r(o.data.tokenAddress).toBe(a.toBase58())}),u("detects an SPL TransferChecked and returns the destination address",async()=>{const e=t.generate(),n=t.generate().publicKey,a=t.generate().publicKey,s=t.generate().publicKey,c=I(a,n,s,e.publicKey,123n,0,[],l),{raw:o}=y([c],[e],e),i=await new p().inspectTransactionType(o);r(i.transactionType).toBe(d.SPL),r(i.data.tokenAddress).toBe(s.toBase58())}),u("detects InitializeAccount and returns the new account and mint",async()=>{const e=t.generate(),n=t.generate().publicKey,a=t.generate().publicKey,s=t.generate().publicKey,c=P(a,n,s,l),{raw:o}=y([c],[e],e),i=await new p().inspectTransactionType(o);r(i.transactionType).toBe(d.SPL),r(i.data.createATA).toEqual({address:a.toBase58(),mintAddress:n.toBase58()})}),u("detects InitializeAccount2 and returns the new account and mint",async()=>{const e=t.generate(),n=t.generate().publicKey,a=t.generate().publicKey,s=t.generate().publicKey,c=S(a,n,s,l),{raw:o}=y([c],[e],e),i=await new p().inspectTransactionType(o);r(i.transactionType).toBe(d.SPL),r(i.data.createATA).toEqual({address:a.toBase58(),mintAddress:n.toBase58()})}),u("detects InitializeAccount3 and returns the new account and mint",async()=>{const e=t.generate(),n=t.generate().publicKey,a=t.generate().publicKey,s=f(a,n,l),{raw:c}=y([s],[e],e),o=await new p().inspectTransactionType(c);r(o.transactionType).toBe(d.SPL),r(o.data.createATA).toEqual({address:a.toBase58(),mintAddress:n.toBase58()})}),u("detects ATA creation via Associated Token Program (classic TOKEN program)",async()=>{const e=t.generate(),n=t.generate().publicKey,a=t.generate().publicKey,s=b(a,n,!0,l,A),c=w(e.publicKey,s,n,a,l,A),{raw:o}=y([c],[e],e),i=await new p().inspectTransactionType(o);r(i.transactionType).toBe(d.SPL),r(i.data.createATA).toEqual({address:n.toBase58(),mintAddress:a.toBase58()})}),u("detects ATA creation via Associated Token Program (TOKEN-2022 program)",async()=>{const e=t.generate(),n=t.generate().publicKey,a=t.generate().publicKey,s=b(a,n,!0,B,A),c=w(e.publicKey,s,n,a,B,A),{raw:o}=y([c],[e],e),i=await new p().inspectTransactionType(o);r(i.transactionType).toBe(d.SPL),r(i.data.createATA).toEqual({address:n.toBase58(),mintAddress:a.toBase58()})}),u("detects CloseAccount and returns the closed token account",async()=>{const e=t.generate(),n=t.generate().publicKey,a=t.generate().publicKey,s=m(n,a,e.publicKey),{raw:c}=y([s],[e],e),o=await new p().inspectTransactionType(c);r(o.transactionType).toBe(d.SPL),r(o.data.tokenAddress).toBe(n.toBase58())}),u("detects SyncNative and returns the WSOL account",async()=>{const e=t.generate(),n=t.generate().publicKey,a=k(n,l),{raw:s}=y([a],[e],e),c=await new p().inspectTransactionType(s);r(c.transactionType).toBe(d.SPL),r(c.data.tokenAddress).toBe(n.toBase58())}),u("marks transaction as SPL even if decoders can't parse (last-resort SPL by program id)",async()=>{const e=t.generate(),n=new E({programId:l,keys:[],data:Buffer.from([])}),{raw:a}=y([n],[e],e),s=await new p().inspectTransactionType(a);r(s.transactionType).toBe(d.SPL),r(s.data).toEqual({})}),u("falls back to STANDARD if the payload is unparseable",async()=>{const e=new Uint8Array([171,173,190,239]),n=await new p().inspectTransactionType(e);r(n.transactionType).toBe(d.STANDARD),r(n.data).toEqual({})}),u("fast path: tokenAddress override + SPL instruction, SPL and returns override",async()=>{const e=t.generate(),n=t.generate().publicKey,a=t.generate().publicKey,s=g(n,a,e.publicKey,1n,[],l),{raw:c}=y([s],[e],e),o=t.generate().publicKey.toBase58(),i=await new p().inspectTransactionType(c,o);r(i.transactionType).toBe(d.SPL),r(i.data.tokenAddress).toBe(o)}),u("fast path: createATA override + ATA instruction, SPL and returns override",async()=>{const e=t.generate(),n=t.generate().publicKey,a=t.generate().publicKey,s=b(a,n,!0,l,A),c=w(e.publicKey,s,n,a,l,A),{raw:o}=y([c],[e],e),i={address:t.generate().publicKey.toBase58(),mintAddress:t.generate().publicKey.toBase58()},T=await new p().inspectTransactionType(o,void 0,i);r(T.transactionType).toBe(d.SPL),r(T.data.createATA).toEqual(i)}),u("fast path: both overrides + SPL instruction, SPL and returns both",async()=>{const e=t.generate(),n=t.generate().publicKey,a=t.generate().publicKey,s=g(n,a,e.publicKey,7n,[],l),{raw:c}=y([s],[e],e),o=t.generate().publicKey.toBase58(),i={address:t.generate().publicKey.toBase58(),mintAddress:t.generate().publicKey.toBase58()},T=await new p().inspectTransactionType(c,o,i);r(T.transactionType).toBe(d.SPL),r(T.data.tokenAddress).toBe(o),r(T.data.createATA).toEqual(i)})});
|
|
2
2
|
//# sourceMappingURL=TransactionInspector.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/services/TransactionInspector.test.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n ASSOCIATED_TOKEN_PROGRAM_ID,\n createAssociatedTokenAccountInstruction,\n createCloseAccountInstruction,\n createInitializeAccount2Instruction,\n createInitializeAccount3Instruction,\n createInitializeAccountInstruction,\n createSyncNativeInstruction,\n createTransferCheckedInstruction,\n createTransferInstruction,\n getAssociatedTokenAddressSync,\n TOKEN_2022_PROGRAM_ID,\n TOKEN_PROGRAM_ID,\n} from \"@solana/spl-token\";\nimport {\n Keypair,\n SystemProgram,\n Transaction,\n TransactionInstruction,\n} from \"@solana/web3.js\";\nimport { describe, expect, it } from \"vitest\";\n\nimport { DefaultBs58Encoder } from \"@internal/app-binder/services/bs58Encoder\";\n\nimport {\n SolanaTransactionTypes,\n TransactionInspector,\n} from \"./TransactionInspector\";\n\nconst DUMMY_BLOCKHASH = DefaultBs58Encoder.encode(\n new Uint8Array(32).fill(0xaa),\n);\n\nfunction makeSignedRawTx(\n ixs: TransactionInstruction[],\n signers: Keypair[],\n feePayer?: Keypair,\n) {\n const payer = feePayer ?? signers[0] ?? Keypair.generate();\n const tx = new Transaction();\n tx.recentBlockhash = DUMMY_BLOCKHASH;\n tx.feePayer = payer.publicKey;\n tx.add(...ixs);\n const seen = new Set<string>();\n const uniqueSigners = [payer, ...signers].filter((kp) => {\n const k = kp.publicKey.toBase58();\n if (seen.has(k)) return false;\n seen.add(k);\n return true;\n });\n\n tx.sign(...uniqueSigners);\n return { raw: tx.serialize(), payer };\n}\n\ndescribe(\"TransactionInspector\", () => {\n it(\"falls back to STANDARD for a plain SystemProgram transfer\", async () => {\n // given\n const payer = Keypair.generate();\n const dest = Keypair.generate().publicKey;\n\n const instruction = SystemProgram.transfer({\n fromPubkey: payer.publicKey,\n toPubkey: dest,\n lamports: 1_000,\n });\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.STANDARD);\n expect(result.data).toEqual({});\n });\n\n it(\"detects an SPL Transfer and returns the destination address\", async () => {\n // given\n const owner = Keypair.generate();\n const source = Keypair.generate().publicKey;\n const destination = Keypair.generate().publicKey;\n\n const instruction = createTransferInstruction(\n source,\n destination,\n owner.publicKey,\n 42n,\n [],\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(destination.toBase58());\n });\n\n it(\"detects an SPL TransferChecked and returns the destination address\", async () => {\n // given\n const owner = Keypair.generate();\n const mint = Keypair.generate().publicKey;\n const source = Keypair.generate().publicKey;\n const destination = Keypair.generate().publicKey;\n\n const instruction = createTransferCheckedInstruction(\n source,\n mint,\n destination,\n owner.publicKey,\n 123n,\n 0,\n [],\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(destination.toBase58());\n });\n\n it(\"detects InitializeAccount and returns the new account and mint\", async () => {\n // given\n const payer = Keypair.generate();\n const mint = Keypair.generate().publicKey;\n const newAccount = Keypair.generate().publicKey;\n const owner = Keypair.generate().publicKey;\n\n const instruction = createInitializeAccountInstruction(\n newAccount,\n mint,\n owner,\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: newAccount.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects InitializeAccount2 and returns the new account and mint\", async () => {\n // given\n const payer = Keypair.generate();\n const mint = Keypair.generate().publicKey;\n const newAccount = Keypair.generate().publicKey;\n const owner = Keypair.generate().publicKey;\n\n const instruction = createInitializeAccount2Instruction(\n newAccount,\n mint,\n owner,\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: newAccount.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects InitializeAccount3 and returns the new account and mint\", async () => {\n // given\n const payer = Keypair.generate();\n const mint = Keypair.generate().publicKey;\n const newAccount = Keypair.generate().publicKey;\n\n const instruction = createInitializeAccount3Instruction(\n newAccount,\n mint,\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: newAccount.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects ATA creation via Associated Token Program (classic TOKEN program)\", async () => {\n // given\n const payer = Keypair.generate();\n const owner = Keypair.generate().publicKey;\n const mint = Keypair.generate().publicKey;\n const ata = getAssociatedTokenAddressSync(\n mint,\n owner,\n true,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const instruction = createAssociatedTokenAccountInstruction(\n payer.publicKey,\n ata,\n owner,\n mint,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: owner.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects ATA creation via Associated Token Program (TOKEN-2022 program)\", async () => {\n // given\n const payer = Keypair.generate();\n const owner = Keypair.generate().publicKey;\n const mint = Keypair.generate().publicKey;\n const ata22 = getAssociatedTokenAddressSync(\n mint,\n owner,\n true,\n TOKEN_2022_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const instruction = createAssociatedTokenAccountInstruction(\n payer.publicKey,\n ata22,\n owner,\n mint,\n TOKEN_2022_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: owner.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects CloseAccount and returns the closed token account\", async () => {\n // given\n const owner = Keypair.generate();\n const account = Keypair.generate().publicKey;\n const dest = Keypair.generate().publicKey;\n\n const instruction = createCloseAccountInstruction(\n account,\n dest,\n owner.publicKey,\n );\n\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(account.toBase58());\n });\n\n it(\"detects SyncNative and returns the WSOL account\", async () => {\n // given\n const payer = Keypair.generate();\n const account = Keypair.generate().publicKey;\n\n const instruction = createSyncNativeInstruction(account, TOKEN_PROGRAM_ID);\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(account.toBase58());\n });\n\n it(\"marks transaction as SPL even if decoders can't parse (last-resort SPL by program id)\", async () => {\n // given\n const payer = Keypair.generate();\n const bogusIx = new TransactionInstruction({\n programId: TOKEN_PROGRAM_ID,\n keys: [],\n data: Buffer.from([]),\n });\n\n const { raw } = makeSignedRawTx([bogusIx], [payer], payer);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data).toEqual({});\n });\n\n it(\"falls back to STANDARD if the payload is unparseable\", async () => {\n // given\n const garbage = new Uint8Array([0xab, 0xad, 0xbe, 0xef]);\n\n // when\n const result = await new TransactionInspector(\n garbage,\n ).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.STANDARD);\n expect(result.data).toEqual({});\n });\n\n it(\"fast path: tokenAddress override + SPL instruction, SPL and returns override\", async () => {\n // given\n const owner = Keypair.generate();\n const source = Keypair.generate().publicKey;\n const destination = Keypair.generate().publicKey;\n\n const instruction = createTransferInstruction(\n source,\n destination,\n owner.publicKey,\n 1n,\n [],\n TOKEN_PROGRAM_ID,\n );\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n const overrideToken = Keypair.generate().publicKey.toBase58();\n\n // when\n const result = await new TransactionInspector(\n raw,\n overrideToken,\n ).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(overrideToken);\n });\n\n it(\"fast path: createATA override + ATA instruction, SPL and returns override\", async () => {\n // given\n const payer = Keypair.generate();\n const owner = Keypair.generate().publicKey;\n const mint = Keypair.generate().publicKey;\n const ata = getAssociatedTokenAddressSync(\n mint,\n owner,\n true,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const instruction = createAssociatedTokenAccountInstruction(\n payer.publicKey,\n ata,\n owner,\n mint,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const overrideATA = {\n address: Keypair.generate().publicKey.toBase58(),\n mintAddress: Keypair.generate().publicKey.toBase58(),\n };\n\n // when\n const result = await new TransactionInspector(\n raw,\n undefined,\n overrideATA,\n ).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual(overrideATA);\n });\n\n it(\"fast path: both overrides + SPL instruction, SPL and returns both\", async () => {\n // given\n const owner = Keypair.generate();\n const source = Keypair.generate().publicKey;\n const destination = Keypair.generate().publicKey;\n\n const instruction = createTransferInstruction(\n source,\n destination,\n owner.publicKey,\n 7n,\n [],\n TOKEN_PROGRAM_ID,\n );\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n const tokenOverride = Keypair.generate().publicKey.toBase58();\n const ataOverride = {\n address: Keypair.generate().publicKey.toBase58(),\n mintAddress: Keypair.generate().publicKey.toBase58(),\n };\n\n // when\n const result = await new TransactionInspector(\n raw,\n tokenOverride,\n ataOverride,\n ).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(tokenOverride);\n expect(result.data.createATA).toEqual(ataOverride);\n });\n});\n"],
|
|
5
|
-
"mappings": "AAAA,OACE,+BAAAA,EACA,2CAAAC,EACA,iCAAAC,EACA,uCAAAC,EACA,uCAAAC,EACA,sCAAAC,EACA,+BAAAC,EACA,oCAAAC,EACA,6BAAAC,EACA,iCAAAC,EACA,yBAAAC,EACA,oBAAAC,MACK,oBACP,OACE,WAAAC,EACA,iBAAAC,EACA,eAAAC,EACA,0BAAAC,MACK,kBACP,OAAS,YAAAC,EAAU,UAAAC,EAAQ,MAAAC,MAAU,SAErC,OAAS,sBAAAC,MAA0B,4CAEnC,OACE,0BAAAC,EACA,wBAAAC,MACK,yBAEP,MAAMC,EAAkBH,EAAmB,OACzC,IAAI,WAAW,EAAE,EAAE,KAAK,GAAI,CAC9B,EAEA,SAASI,EACPC,EACAC,EACAC,EACA,CACA,MAAMC,EAAQD,GAAYD,EAAQ,CAAC,GAAKb,EAAQ,SAAS,EACnDgB,EAAK,IAAId,EACfc,EAAG,gBAAkBN,EACrBM,EAAG,SAAWD,EAAM,UACpBC,EAAG,IAAI,GAAGJ,CAAG,EACb,MAAMK,EAAO,IAAI,IACXC,EAAgB,CAACH,EAAO,GAAGF,CAAO,EAAE,OAAQM,GAAO,CACvD,MAAMC,EAAID,EAAG,UAAU,SAAS,EAChC,OAAIF,EAAK,IAAIG,CAAC,EAAU,IACxBH,EAAK,IAAIG,CAAC,EACH,GACT,CAAC,EAED,OAAAJ,EAAG,KAAK,GAAGE,CAAa,EACjB,CAAE,IAAKF,EAAG,UAAU,EAAG,MAAAD,CAAM,CACtC,CAEAX,EAAS,uBAAwB,IAAM,CACrCE,EAAG,4DAA6D,SAAY,
|
|
4
|
+
"sourcesContent": ["import {\n ASSOCIATED_TOKEN_PROGRAM_ID,\n createAssociatedTokenAccountInstruction,\n createCloseAccountInstruction,\n createInitializeAccount2Instruction,\n createInitializeAccount3Instruction,\n createInitializeAccountInstruction,\n createSyncNativeInstruction,\n createTransferCheckedInstruction,\n createTransferInstruction,\n getAssociatedTokenAddressSync,\n TOKEN_2022_PROGRAM_ID,\n TOKEN_PROGRAM_ID,\n} from \"@solana/spl-token\";\nimport {\n Keypair,\n SystemProgram,\n Transaction,\n TransactionInstruction,\n} from \"@solana/web3.js\";\nimport { describe, expect, it } from \"vitest\";\n\nimport { DefaultBs58Encoder } from \"@internal/app-binder/services/bs58Encoder\";\n\nimport {\n SolanaTransactionTypes,\n TransactionInspector,\n} from \"./TransactionInspector\";\n\nconst DUMMY_BLOCKHASH = DefaultBs58Encoder.encode(\n new Uint8Array(32).fill(0xaa),\n);\n\nfunction makeSignedRawTx(\n ixs: TransactionInstruction[],\n signers: Keypair[],\n feePayer?: Keypair,\n) {\n const payer = feePayer ?? signers[0] ?? Keypair.generate();\n const tx = new Transaction();\n tx.recentBlockhash = DUMMY_BLOCKHASH;\n tx.feePayer = payer.publicKey;\n tx.add(...ixs);\n const seen = new Set<string>();\n const uniqueSigners = [payer, ...signers].filter((kp) => {\n const k = kp.publicKey.toBase58();\n if (seen.has(k)) return false;\n seen.add(k);\n return true;\n });\n\n tx.sign(...uniqueSigners);\n return { raw: tx.serialize(), payer };\n}\n\ndescribe(\"TransactionInspector\", () => {\n it(\"falls back to STANDARD for a plain SystemProgram transfer\", async () => {\n const payer = Keypair.generate();\n const dest = Keypair.generate().publicKey;\n\n const instruction = SystemProgram.transfer({\n fromPubkey: payer.publicKey,\n toPubkey: dest,\n lamports: 1_000,\n });\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.STANDARD);\n expect(result.data).toEqual({});\n });\n\n it(\"detects an SPL Transfer and returns the destination address\", async () => {\n const owner = Keypair.generate();\n const source = Keypair.generate().publicKey;\n const destination = Keypair.generate().publicKey;\n\n const instruction = createTransferInstruction(\n source,\n destination,\n owner.publicKey,\n 42n,\n [],\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(destination.toBase58());\n });\n\n it(\"detects an SPL TransferChecked and returns the destination address\", async () => {\n const owner = Keypair.generate();\n const mint = Keypair.generate().publicKey;\n const source = Keypair.generate().publicKey;\n const destination = Keypair.generate().publicKey;\n\n const instruction = createTransferCheckedInstruction(\n source,\n mint,\n destination,\n owner.publicKey,\n 123n,\n 0,\n [],\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(destination.toBase58());\n });\n\n it(\"detects InitializeAccount and returns the new account and mint\", async () => {\n const payer = Keypair.generate();\n const mint = Keypair.generate().publicKey;\n const newAccount = Keypair.generate().publicKey;\n const owner = Keypair.generate().publicKey;\n\n const instruction = createInitializeAccountInstruction(\n newAccount,\n mint,\n owner,\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: newAccount.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects InitializeAccount2 and returns the new account and mint\", async () => {\n const payer = Keypair.generate();\n const mint = Keypair.generate().publicKey;\n const newAccount = Keypair.generate().publicKey;\n const owner = Keypair.generate().publicKey;\n\n const instruction = createInitializeAccount2Instruction(\n newAccount,\n mint,\n owner,\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: newAccount.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects InitializeAccount3 and returns the new account and mint\", async () => {\n const payer = Keypair.generate();\n const mint = Keypair.generate().publicKey;\n const newAccount = Keypair.generate().publicKey;\n\n const instruction = createInitializeAccount3Instruction(\n newAccount,\n mint,\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: newAccount.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects ATA creation via Associated Token Program (classic TOKEN program)\", async () => {\n const payer = Keypair.generate();\n const owner = Keypair.generate().publicKey;\n const mint = Keypair.generate().publicKey;\n const ata = getAssociatedTokenAddressSync(\n mint,\n owner,\n true,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const instruction = createAssociatedTokenAccountInstruction(\n payer.publicKey,\n ata,\n owner,\n mint,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: owner.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects ATA creation via Associated Token Program (TOKEN-2022 program)\", async () => {\n const payer = Keypair.generate();\n const owner = Keypair.generate().publicKey;\n const mint = Keypair.generate().publicKey;\n const ata22 = getAssociatedTokenAddressSync(\n mint,\n owner,\n true,\n TOKEN_2022_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const instruction = createAssociatedTokenAccountInstruction(\n payer.publicKey,\n ata22,\n owner,\n mint,\n TOKEN_2022_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: owner.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects CloseAccount and returns the closed token account\", async () => {\n const owner = Keypair.generate();\n const account = Keypair.generate().publicKey;\n const dest = Keypair.generate().publicKey;\n\n const instruction = createCloseAccountInstruction(\n account,\n dest,\n owner.publicKey,\n );\n\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(account.toBase58());\n });\n\n it(\"detects SyncNative and returns the WSOL account\", async () => {\n const payer = Keypair.generate();\n const account = Keypair.generate().publicKey;\n\n const instruction = createSyncNativeInstruction(account, TOKEN_PROGRAM_ID);\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(account.toBase58());\n });\n\n it(\"marks transaction as SPL even if decoders can't parse (last-resort SPL by program id)\", async () => {\n const payer = Keypair.generate();\n const bogusIx = new TransactionInstruction({\n programId: TOKEN_PROGRAM_ID,\n keys: [],\n data: Buffer.from([]),\n });\n\n const { raw } = makeSignedRawTx([bogusIx], [payer], payer);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data).toEqual({});\n });\n\n it(\"falls back to STANDARD if the payload is unparseable\", async () => {\n const garbage = new Uint8Array([0xab, 0xad, 0xbe, 0xef]);\n\n const result = await new TransactionInspector().inspectTransactionType(\n garbage,\n );\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.STANDARD);\n expect(result.data).toEqual({});\n });\n\n it(\"fast path: tokenAddress override + SPL instruction, SPL and returns override\", async () => {\n const owner = Keypair.generate();\n const source = Keypair.generate().publicKey;\n const destination = Keypair.generate().publicKey;\n\n const instruction = createTransferInstruction(\n source,\n destination,\n owner.publicKey,\n 1n,\n [],\n TOKEN_PROGRAM_ID,\n );\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n const overrideToken = Keypair.generate().publicKey.toBase58();\n\n const result = await new TransactionInspector().inspectTransactionType(\n raw,\n overrideToken, // tokenAddress override\n );\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(overrideToken);\n });\n\n it(\"fast path: createATA override + ATA instruction, SPL and returns override\", async () => {\n const payer = Keypair.generate();\n const owner = Keypair.generate().publicKey;\n const mint = Keypair.generate().publicKey;\n const ata = getAssociatedTokenAddressSync(\n mint,\n owner,\n true,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const instruction = createAssociatedTokenAccountInstruction(\n payer.publicKey,\n ata,\n owner,\n mint,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const overrideATA = {\n address: Keypair.generate().publicKey.toBase58(),\n mintAddress: Keypair.generate().publicKey.toBase58(),\n };\n\n const result = await new TransactionInspector().inspectTransactionType(\n raw,\n undefined, // no tokenAddress override\n overrideATA, // createATA override\n );\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual(overrideATA);\n });\n\n it(\"fast path: both overrides + SPL instruction, SPL and returns both\", async () => {\n const owner = Keypair.generate();\n const source = Keypair.generate().publicKey;\n const destination = Keypair.generate().publicKey;\n\n const instruction = createTransferInstruction(\n source,\n destination,\n owner.publicKey,\n 7n,\n [],\n TOKEN_PROGRAM_ID,\n );\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n const tokenOverride = Keypair.generate().publicKey.toBase58();\n const ataOverride = {\n address: Keypair.generate().publicKey.toBase58(),\n mintAddress: Keypair.generate().publicKey.toBase58(),\n };\n\n const result = await new TransactionInspector().inspectTransactionType(\n raw,\n tokenOverride,\n ataOverride,\n );\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(tokenOverride);\n expect(result.data.createATA).toEqual(ataOverride);\n });\n});\n"],
|
|
5
|
+
"mappings": "AAAA,OACE,+BAAAA,EACA,2CAAAC,EACA,iCAAAC,EACA,uCAAAC,EACA,uCAAAC,EACA,sCAAAC,EACA,+BAAAC,EACA,oCAAAC,EACA,6BAAAC,EACA,iCAAAC,EACA,yBAAAC,EACA,oBAAAC,MACK,oBACP,OACE,WAAAC,EACA,iBAAAC,EACA,eAAAC,EACA,0BAAAC,MACK,kBACP,OAAS,YAAAC,EAAU,UAAAC,EAAQ,MAAAC,MAAU,SAErC,OAAS,sBAAAC,MAA0B,4CAEnC,OACE,0BAAAC,EACA,wBAAAC,MACK,yBAEP,MAAMC,EAAkBH,EAAmB,OACzC,IAAI,WAAW,EAAE,EAAE,KAAK,GAAI,CAC9B,EAEA,SAASI,EACPC,EACAC,EACAC,EACA,CACA,MAAMC,EAAQD,GAAYD,EAAQ,CAAC,GAAKb,EAAQ,SAAS,EACnDgB,EAAK,IAAId,EACfc,EAAG,gBAAkBN,EACrBM,EAAG,SAAWD,EAAM,UACpBC,EAAG,IAAI,GAAGJ,CAAG,EACb,MAAMK,EAAO,IAAI,IACXC,EAAgB,CAACH,EAAO,GAAGF,CAAO,EAAE,OAAQM,GAAO,CACvD,MAAMC,EAAID,EAAG,UAAU,SAAS,EAChC,OAAIF,EAAK,IAAIG,CAAC,EAAU,IACxBH,EAAK,IAAIG,CAAC,EACH,GACT,CAAC,EAED,OAAAJ,EAAG,KAAK,GAAGE,CAAa,EACjB,CAAE,IAAKF,EAAG,UAAU,EAAG,MAAAD,CAAM,CACtC,CAEAX,EAAS,uBAAwB,IAAM,CACrCE,EAAG,4DAA6D,SAAY,CAC1E,MAAMS,EAAQf,EAAQ,SAAS,EACzBqB,EAAOrB,EAAQ,SAAS,EAAE,UAE1BsB,EAAcrB,EAAc,SAAS,CACzC,WAAYc,EAAM,UAClB,SAAUM,EACV,SAAU,GACZ,CAAC,EAEK,CAAE,IAAAE,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACP,CAAK,EAAGA,CAAK,EAEvDS,EAAS,MAAM,IAAIf,EAAqB,EAAE,uBAAuBc,CAAG,EAE1ElB,EAAOmB,EAAO,eAAe,EAAE,KAAKhB,EAAuB,QAAQ,EACnEH,EAAOmB,EAAO,IAAI,EAAE,QAAQ,CAAC,CAAC,CAChC,CAAC,EAEDlB,EAAG,8DAA+D,SAAY,CAC5E,MAAMmB,EAAQzB,EAAQ,SAAS,EACzB0B,EAAS1B,EAAQ,SAAS,EAAE,UAC5B2B,EAAc3B,EAAQ,SAAS,EAAE,UAEjCsB,EAAc1B,EAClB8B,EACAC,EACAF,EAAM,UACN,IACA,CAAC,EACD1B,CACF,EAEM,CAAE,IAAAwB,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACG,CAAK,EAAGA,CAAK,EAEvDD,EAAS,MAAM,IAAIf,EAAqB,EAAE,uBAAuBc,CAAG,EAE1ElB,EAAOmB,EAAO,eAAe,EAAE,KAAKhB,EAAuB,GAAG,EAC9DH,EAAOmB,EAAO,KAAK,YAAY,EAAE,KAAKG,EAAY,SAAS,CAAC,CAC9D,CAAC,EAEDrB,EAAG,qEAAsE,SAAY,CACnF,MAAMmB,EAAQzB,EAAQ,SAAS,EACzB4B,EAAO5B,EAAQ,SAAS,EAAE,UAC1B0B,EAAS1B,EAAQ,SAAS,EAAE,UAC5B2B,EAAc3B,EAAQ,SAAS,EAAE,UAEjCsB,EAAc3B,EAClB+B,EACAE,EACAD,EACAF,EAAM,UACN,KACA,EACA,CAAC,EACD1B,CACF,EAEM,CAAE,IAAAwB,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACG,CAAK,EAAGA,CAAK,EAEvDD,EAAS,MAAM,IAAIf,EAAqB,EAAE,uBAAuBc,CAAG,EAE1ElB,EAAOmB,EAAO,eAAe,EAAE,KAAKhB,EAAuB,GAAG,EAC9DH,EAAOmB,EAAO,KAAK,YAAY,EAAE,KAAKG,EAAY,SAAS,CAAC,CAC9D,CAAC,EAEDrB,EAAG,iEAAkE,SAAY,CAC/E,MAAMS,EAAQf,EAAQ,SAAS,EACzB4B,EAAO5B,EAAQ,SAAS,EAAE,UAC1B6B,EAAa7B,EAAQ,SAAS,EAAE,UAChCyB,EAAQzB,EAAQ,SAAS,EAAE,UAE3BsB,EAAc7B,EAClBoC,EACAD,EACAH,EACA1B,CACF,EAEM,CAAE,IAAAwB,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACP,CAAK,EAAGA,CAAK,EAEvDS,EAAS,MAAM,IAAIf,EAAqB,EAAE,uBAAuBc,CAAG,EAE1ElB,EAAOmB,EAAO,eAAe,EAAE,KAAKhB,EAAuB,GAAG,EAC9DH,EAAOmB,EAAO,KAAK,SAAS,EAAE,QAAQ,CACpC,QAASK,EAAW,SAAS,EAC7B,YAAaD,EAAK,SAAS,CAC7B,CAAC,CACH,CAAC,EAEDtB,EAAG,kEAAmE,SAAY,CAChF,MAAMS,EAAQf,EAAQ,SAAS,EACzB4B,EAAO5B,EAAQ,SAAS,EAAE,UAC1B6B,EAAa7B,EAAQ,SAAS,EAAE,UAChCyB,EAAQzB,EAAQ,SAAS,EAAE,UAE3BsB,EAAc/B,EAClBsC,EACAD,EACAH,EACA1B,CACF,EAEM,CAAE,IAAAwB,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACP,CAAK,EAAGA,CAAK,EAEvDS,EAAS,MAAM,IAAIf,EAAqB,EAAE,uBAAuBc,CAAG,EAE1ElB,EAAOmB,EAAO,eAAe,EAAE,KAAKhB,EAAuB,GAAG,EAC9DH,EAAOmB,EAAO,KAAK,SAAS,EAAE,QAAQ,CACpC,QAASK,EAAW,SAAS,EAC7B,YAAaD,EAAK,SAAS,CAC7B,CAAC,CACH,CAAC,EAEDtB,EAAG,kEAAmE,SAAY,CAChF,MAAMS,EAAQf,EAAQ,SAAS,EACzB4B,EAAO5B,EAAQ,SAAS,EAAE,UAC1B6B,EAAa7B,EAAQ,SAAS,EAAE,UAEhCsB,EAAc9B,EAClBqC,EACAD,EACA7B,CACF,EAEM,CAAE,IAAAwB,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACP,CAAK,EAAGA,CAAK,EAEvDS,EAAS,MAAM,IAAIf,EAAqB,EAAE,uBAAuBc,CAAG,EAE1ElB,EAAOmB,EAAO,eAAe,EAAE,KAAKhB,EAAuB,GAAG,EAC9DH,EAAOmB,EAAO,KAAK,SAAS,EAAE,QAAQ,CACpC,QAASK,EAAW,SAAS,EAC7B,YAAaD,EAAK,SAAS,CAC7B,CAAC,CACH,CAAC,EAEDtB,EAAG,4EAA6E,SAAY,CAC1F,MAAMS,EAAQf,EAAQ,SAAS,EACzByB,EAAQzB,EAAQ,SAAS,EAAE,UAC3B4B,EAAO5B,EAAQ,SAAS,EAAE,UAC1B8B,EAAMjC,EACV+B,EACAH,EACA,GACA1B,EACAX,CACF,EAEMkC,EAAcjC,EAClB0B,EAAM,UACNe,EACAL,EACAG,EACA7B,EACAX,CACF,EAEM,CAAE,IAAAmC,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACP,CAAK,EAAGA,CAAK,EAEvDS,EAAS,MAAM,IAAIf,EAAqB,EAAE,uBAAuBc,CAAG,EAE1ElB,EAAOmB,EAAO,eAAe,EAAE,KAAKhB,EAAuB,GAAG,EAC9DH,EAAOmB,EAAO,KAAK,SAAS,EAAE,QAAQ,CACpC,QAASC,EAAM,SAAS,EACxB,YAAaG,EAAK,SAAS,CAC7B,CAAC,CACH,CAAC,EAEDtB,EAAG,yEAA0E,SAAY,CACvF,MAAMS,EAAQf,EAAQ,SAAS,EACzByB,EAAQzB,EAAQ,SAAS,EAAE,UAC3B4B,EAAO5B,EAAQ,SAAS,EAAE,UAC1B+B,EAAQlC,EACZ+B,EACAH,EACA,GACA3B,EACAV,CACF,EAEMkC,EAAcjC,EAClB0B,EAAM,UACNgB,EACAN,EACAG,EACA9B,EACAV,CACF,EAEM,CAAE,IAAAmC,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACP,CAAK,EAAGA,CAAK,EAEvDS,EAAS,MAAM,IAAIf,EAAqB,EAAE,uBAAuBc,CAAG,EAE1ElB,EAAOmB,EAAO,eAAe,EAAE,KAAKhB,EAAuB,GAAG,EAC9DH,EAAOmB,EAAO,KAAK,SAAS,EAAE,QAAQ,CACpC,QAASC,EAAM,SAAS,EACxB,YAAaG,EAAK,SAAS,CAC7B,CAAC,CACH,CAAC,EAEDtB,EAAG,4DAA6D,SAAY,CAC1E,MAAMmB,EAAQzB,EAAQ,SAAS,EACzBgC,EAAUhC,EAAQ,SAAS,EAAE,UAC7BqB,EAAOrB,EAAQ,SAAS,EAAE,UAE1BsB,EAAchC,EAClB0C,EACAX,EACAI,EAAM,SACR,EAEM,CAAE,IAAAF,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACG,CAAK,EAAGA,CAAK,EAEvDD,EAAS,MAAM,IAAIf,EAAqB,EAAE,uBAAuBc,CAAG,EAE1ElB,EAAOmB,EAAO,eAAe,EAAE,KAAKhB,EAAuB,GAAG,EAC9DH,EAAOmB,EAAO,KAAK,YAAY,EAAE,KAAKQ,EAAQ,SAAS,CAAC,CAC1D,CAAC,EAED1B,EAAG,kDAAmD,SAAY,CAChE,MAAMS,EAAQf,EAAQ,SAAS,EACzBgC,EAAUhC,EAAQ,SAAS,EAAE,UAE7BsB,EAAc5B,EAA4BsC,EAASjC,CAAgB,EAEnE,CAAE,IAAAwB,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACP,CAAK,EAAGA,CAAK,EAEvDS,EAAS,MAAM,IAAIf,EAAqB,EAAE,uBAAuBc,CAAG,EAE1ElB,EAAOmB,EAAO,eAAe,EAAE,KAAKhB,EAAuB,GAAG,EAC9DH,EAAOmB,EAAO,KAAK,YAAY,EAAE,KAAKQ,EAAQ,SAAS,CAAC,CAC1D,CAAC,EAED1B,EAAG,wFAAyF,SAAY,CACtG,MAAMS,EAAQf,EAAQ,SAAS,EACzBiC,EAAU,IAAI9B,EAAuB,CACzC,UAAWJ,EACX,KAAM,CAAC,EACP,KAAM,OAAO,KAAK,CAAC,CAAC,CACtB,CAAC,EAEK,CAAE,IAAAwB,CAAI,EAAIZ,EAAgB,CAACsB,CAAO,EAAG,CAAClB,CAAK,EAAGA,CAAK,EAEnDS,EAAS,MAAM,IAAIf,EAAqB,EAAE,uBAAuBc,CAAG,EAE1ElB,EAAOmB,EAAO,eAAe,EAAE,KAAKhB,EAAuB,GAAG,EAC9DH,EAAOmB,EAAO,IAAI,EAAE,QAAQ,CAAC,CAAC,CAChC,CAAC,EAEDlB,EAAG,uDAAwD,SAAY,CACrE,MAAM4B,EAAU,IAAI,WAAW,CAAC,IAAM,IAAM,IAAM,GAAI,CAAC,EAEjDV,EAAS,MAAM,IAAIf,EAAqB,EAAE,uBAC9CyB,CACF,EAEA7B,EAAOmB,EAAO,eAAe,EAAE,KAAKhB,EAAuB,QAAQ,EACnEH,EAAOmB,EAAO,IAAI,EAAE,QAAQ,CAAC,CAAC,CAChC,CAAC,EAEDlB,EAAG,+EAAgF,SAAY,CAC7F,MAAMmB,EAAQzB,EAAQ,SAAS,EACzB0B,EAAS1B,EAAQ,SAAS,EAAE,UAC5B2B,EAAc3B,EAAQ,SAAS,EAAE,UAEjCsB,EAAc1B,EAClB8B,EACAC,EACAF,EAAM,UACN,GACA,CAAC,EACD1B,CACF,EACM,CAAE,IAAAwB,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACG,CAAK,EAAGA,CAAK,EAEvDU,EAAgBnC,EAAQ,SAAS,EAAE,UAAU,SAAS,EAEtDwB,EAAS,MAAM,IAAIf,EAAqB,EAAE,uBAC9Cc,EACAY,CACF,EAEA9B,EAAOmB,EAAO,eAAe,EAAE,KAAKhB,EAAuB,GAAG,EAC9DH,EAAOmB,EAAO,KAAK,YAAY,EAAE,KAAKW,CAAa,CACrD,CAAC,EAED7B,EAAG,4EAA6E,SAAY,CAC1F,MAAMS,EAAQf,EAAQ,SAAS,EACzByB,EAAQzB,EAAQ,SAAS,EAAE,UAC3B4B,EAAO5B,EAAQ,SAAS,EAAE,UAC1B8B,EAAMjC,EACV+B,EACAH,EACA,GACA1B,EACAX,CACF,EAEMkC,EAAcjC,EAClB0B,EAAM,UACNe,EACAL,EACAG,EACA7B,EACAX,CACF,EACM,CAAE,IAAAmC,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACP,CAAK,EAAGA,CAAK,EAEvDqB,EAAc,CAClB,QAASpC,EAAQ,SAAS,EAAE,UAAU,SAAS,EAC/C,YAAaA,EAAQ,SAAS,EAAE,UAAU,SAAS,CACrD,EAEMwB,EAAS,MAAM,IAAIf,EAAqB,EAAE,uBAC9Cc,EACA,OACAa,CACF,EAEA/B,EAAOmB,EAAO,eAAe,EAAE,KAAKhB,EAAuB,GAAG,EAC9DH,EAAOmB,EAAO,KAAK,SAAS,EAAE,QAAQY,CAAW,CACnD,CAAC,EAED9B,EAAG,oEAAqE,SAAY,CAClF,MAAMmB,EAAQzB,EAAQ,SAAS,EACzB0B,EAAS1B,EAAQ,SAAS,EAAE,UAC5B2B,EAAc3B,EAAQ,SAAS,EAAE,UAEjCsB,EAAc1B,EAClB8B,EACAC,EACAF,EAAM,UACN,GACA,CAAC,EACD1B,CACF,EACM,CAAE,IAAAwB,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACG,CAAK,EAAGA,CAAK,EAEvDY,EAAgBrC,EAAQ,SAAS,EAAE,UAAU,SAAS,EACtDsC,EAAc,CAClB,QAAStC,EAAQ,SAAS,EAAE,UAAU,SAAS,EAC/C,YAAaA,EAAQ,SAAS,EAAE,UAAU,SAAS,CACrD,EAEMwB,EAAS,MAAM,IAAIf,EAAqB,EAAE,uBAC9Cc,EACAc,EACAC,CACF,EAEAjC,EAAOmB,EAAO,eAAe,EAAE,KAAKhB,EAAuB,GAAG,EAC9DH,EAAOmB,EAAO,KAAK,YAAY,EAAE,KAAKa,CAAa,EACnDhC,EAAOmB,EAAO,KAAK,SAAS,EAAE,QAAQc,CAAW,CACnD,CAAC,CACH,CAAC",
|
|
6
6
|
"names": ["ASSOCIATED_TOKEN_PROGRAM_ID", "createAssociatedTokenAccountInstruction", "createCloseAccountInstruction", "createInitializeAccount2Instruction", "createInitializeAccount3Instruction", "createInitializeAccountInstruction", "createSyncNativeInstruction", "createTransferCheckedInstruction", "createTransferInstruction", "getAssociatedTokenAddressSync", "TOKEN_2022_PROGRAM_ID", "TOKEN_PROGRAM_ID", "Keypair", "SystemProgram", "Transaction", "TransactionInstruction", "describe", "expect", "it", "DefaultBs58Encoder", "SolanaTransactionTypes", "TransactionInspector", "DUMMY_BLOCKHASH", "makeSignedRawTx", "ixs", "signers", "feePayer", "payer", "tx", "seen", "uniqueSigners", "kp", "k", "dest", "instruction", "raw", "result", "owner", "source", "destination", "mint", "newAccount", "ata", "ata22", "account", "bogusIx", "garbage", "overrideToken", "overrideATA", "tokenOverride", "ataOverride"]
|
|
7
7
|
}
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../../../../src/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.ts"],
|
|
4
|
+
"sourcesContent": ["import type { NormalizedMessage } from \"@internal/app-binder/services/TransactionInspector\";\nimport { TransactionInspector } from \"@internal/app-binder/services/TransactionInspector\";\n\nexport interface SolanaMessageNormaliserConstructor {\n normaliseMessage(rawBytes: Uint8Array): Promise<NormalizedMessage>;\n}\n\nexport class DefaultSolanaMessageNormaliser {\n static async normaliseMessage(\n rawBytes: Uint8Array,\n ): Promise<NormalizedMessage> {\n return TransactionInspector.normaliseMessage(rawBytes);\n }\n}\n"],
|
|
5
|
+
"mappings": "AACA,OAAS,wBAAAA,MAA4B,qDAM9B,MAAMC,CAA+B,CAC1C,aAAa,iBACXC,EAC4B,CAC5B,OAAOF,EAAqB,iBAAiBE,CAAQ,CACvD,CACF",
|
|
6
|
+
"names": ["TransactionInspector", "DefaultSolanaMessageNormaliser", "rawBytes"]
|
|
7
|
+
}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
import{Keypair as l,SystemProgram as m,Transaction as b}from"@solana/web3.js";import f from"bs58";import{describe as P,expect as a,it as g}from"vitest";import{DefaultSolanaMessageNormaliser as d}from"./DefaultSolanaMessageNormaliser";const I=f.encode(new Uint8Array(32).fill(170));function K(t,s,u){const n=u??s[0]??l.generate(),o=new b;o.recentBlockhash=I,o.feePayer=n.publicKey,o.add(...t);const e=new Set,r=[n,...s].filter(c=>{const i=c.publicKey.toBase58();return e.has(i)?!1:(e.add(i),!0)});return o.sign(...r),{raw:o.serialize(),payer:n}}P("DefaultSolanaMessageNormaliser",()=>{g("normalises a legacy tx with multiple SystemProgram.transfer instructions preserving order",async()=>{const t=l.generate(),s=[l.generate(),l.generate(),l.generate()],u=1234,n=s.map(r=>m.transfer({fromPubkey:t.publicKey,toPubkey:r.publicKey,lamports:u})),{raw:o}=K(n,[t],t),e=await d.normaliseMessage(o);a(e.compiledInstructions).toHaveLength(n.length);for(let r=0;r<n.length;r++){const c=e.compiledInstructions[r],i=e.allKeys[c.programIdIndex];a(i.equals(m.programId)).toBe(!0);const p=c.accountKeyIndexes.map(y=>e.allKeys[y]);a(p[0].equals(t.publicKey)).toBe(!0),a(p[1].equals(s[r].publicKey)).toBe(!0),a(c.data instanceof Uint8Array).toBe(!0),a(c.data.length).toBeGreaterThan(0)}}),g("can be used via the SolanaMessageNormaliserConstructor interface",async()=>{const t=l.generate(),s=l.generate(),u=m.transfer({fromPubkey:t.publicKey,toPubkey:s.publicKey,lamports:1e3}),{raw:n}=K([u],[t],t),e=await d.normaliseMessage(n);a(e.compiledInstructions).toHaveLength(1);const r=e.compiledInstructions[0],c=e.allKeys[r.programIdIndex];a(c.equals(m.programId)).toBe(!0);const i=r.accountKeyIndexes.map(p=>e.allKeys[p]);a(i[0].equals(t.publicKey)).toBe(!0),a(i[1].equals(s.publicKey)).toBe(!0)}),g("handles single-instruction tx and preserves indices mapping",async()=>{const t=l.generate(),s=l.generate(),n=m.transfer({fromPubkey:t.publicKey,toPubkey:s.publicKey,lamports:5}),{raw:o}=K([n],[t],t),e=await d.normaliseMessage(o);a(Array.isArray(e.allKeys)).toBe(!0),a(e.allKeys.length).toBeGreaterThanOrEqual(3);const r=e.compiledInstructions[0],c=e.allKeys[r.programIdIndex];a(c.equals(m.programId)).toBe(!0);const[i,p]=r.accountKeyIndexes.map(y=>e.allKeys[y]);a(i.equals(t.publicKey)).toBe(!0),a(p.equals(s.publicKey)).toBe(!0)})});
|
|
2
|
+
//# sourceMappingURL=DefaultSolanaMessageNormaliser.test.js.map
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../../../../src/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.ts"],
|
|
4
|
+
"sourcesContent": ["import {\n Keypair,\n type PublicKey,\n SystemProgram,\n Transaction,\n} from \"@solana/web3.js\";\nimport bs58 from \"bs58\";\nimport { describe, expect, it } from \"vitest\";\n\nimport {\n DefaultSolanaMessageNormaliser,\n type SolanaMessageNormaliserConstructor,\n} from \"./DefaultSolanaMessageNormaliser\";\n\nconst DUMMY_BLOCKHASH = bs58.encode(new Uint8Array(32).fill(0xaa));\n\nfunction makeSignedRawTx(\n instructions: Parameters<Transaction[\"add\"]>[0][],\n signers: Keypair[],\n feePayer?: Keypair,\n) {\n const payer = feePayer ?? signers[0] ?? Keypair.generate();\n const tx = new Transaction();\n tx.recentBlockhash = DUMMY_BLOCKHASH;\n tx.feePayer = payer.publicKey;\n tx.add(...instructions);\n\n // unique signers: fee payer first\n const seen = new Set<string>();\n const uniq = [payer, ...signers].filter((kp) => {\n const k = kp.publicKey.toBase58();\n if (seen.has(k)) return false;\n seen.add(k);\n return true;\n });\n\n tx.sign(...uniq);\n return { raw: tx.serialize(), payer };\n}\n\ndescribe(\"DefaultSolanaMessageNormaliser\", () => {\n it(\"normalises a legacy tx with multiple SystemProgram.transfer instructions preserving order\", async () => {\n // given\n const payer = Keypair.generate();\n const recipients = [\n Keypair.generate(),\n Keypair.generate(),\n Keypair.generate(),\n ];\n const lamports = 1234;\n\n const instructions = recipients.map((r) =>\n SystemProgram.transfer({\n fromPubkey: payer.publicKey,\n toPubkey: r.publicKey,\n lamports,\n }),\n );\n\n const { raw } = makeSignedRawTx(instructions, [payer], payer);\n\n // when\n const msg = await DefaultSolanaMessageNormaliser.normaliseMessage(raw);\n\n // then\n // same number of compiled instructions\n expect(msg.compiledInstructions).toHaveLength(instructions.length);\n\n for (let i = 0; i < instructions.length; i++) {\n const compiled = msg.compiledInstructions[i]!;\n const programId = msg.allKeys[compiled.programIdIndex]!;\n // program resolves to SystemProgram\n expect(programId.equals(SystemProgram.programId)).toBe(true);\n\n // accounts resolve to [from, to] in order\n const accounts = compiled.accountKeyIndexes.map(\n (idx) => msg.allKeys[idx]!,\n );\n expect((accounts[0] as PublicKey).equals(payer.publicKey)).toBe(true);\n expect((accounts[1] as PublicKey).equals(recipients[i]!.publicKey)).toBe(\n true,\n );\n\n // data is present (SystemProgram.transfer has non-empty data)\n expect(compiled.data instanceof Uint8Array).toBe(true);\n expect(compiled.data.length).toBeGreaterThan(0);\n }\n });\n\n it(\"can be used via the SolanaMessageNormaliserConstructor interface\", async () => {\n // given\n const payer = Keypair.generate();\n const recipient = Keypair.generate();\n const instruction = SystemProgram.transfer({\n fromPubkey: payer.publicKey,\n toPubkey: recipient.publicKey,\n lamports: 1_000,\n });\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when (note: using the class as a static 'constructor-like' value)\n const Normaliser: SolanaMessageNormaliserConstructor =\n DefaultSolanaMessageNormaliser;\n const msg = await Normaliser.normaliseMessage(raw);\n\n // then\n expect(msg.compiledInstructions).toHaveLength(1);\n const compiled = msg.compiledInstructions[0]!;\n const programId = msg.allKeys[compiled.programIdIndex]!;\n expect(programId.equals(SystemProgram.programId)).toBe(true);\n\n const accounts = compiled.accountKeyIndexes.map((i) => msg.allKeys[i]!);\n expect((accounts[0] as PublicKey).equals(payer.publicKey)).toBe(true);\n expect((accounts[1] as PublicKey).equals(recipient.publicKey)).toBe(true);\n });\n\n it(\"handles single-instruction tx and preserves indices mapping\", async () => {\n // given\n const payer = Keypair.generate();\n const recipient = Keypair.generate();\n const lamports = 5;\n\n const instruction = SystemProgram.transfer({\n fromPubkey: payer.publicKey,\n toPubkey: recipient.publicKey,\n lamports,\n });\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when\n const msg = await DefaultSolanaMessageNormaliser.normaliseMessage(raw);\n\n // then\n expect(Array.isArray(msg.allKeys)).toBe(true);\n expect(msg.allKeys.length).toBeGreaterThanOrEqual(3);\n\n const compiled = msg.compiledInstructions[0]!;\n const resolvedPid = msg.allKeys[compiled.programIdIndex]!;\n expect(resolvedPid.equals(SystemProgram.programId)).toBe(true);\n\n const [fromPk, toPk] = compiled.accountKeyIndexes.map(\n (i) => msg.allKeys[i]!,\n );\n expect((fromPk as PublicKey).equals(payer.publicKey)).toBe(true);\n expect((toPk as PublicKey).equals(recipient.publicKey)).toBe(true);\n });\n});\n"],
|
|
5
|
+
"mappings": "AAAA,OACE,WAAAA,EAEA,iBAAAC,EACA,eAAAC,MACK,kBACP,OAAOC,MAAU,OACjB,OAAS,YAAAC,EAAU,UAAAC,EAAQ,MAAAC,MAAU,SAErC,OACE,kCAAAC,MAEK,mCAEP,MAAMC,EAAkBL,EAAK,OAAO,IAAI,WAAW,EAAE,EAAE,KAAK,GAAI,CAAC,EAEjE,SAASM,EACPC,EACAC,EACAC,EACA,CACA,MAAMC,EAAQD,GAAYD,EAAQ,CAAC,GAAKX,EAAQ,SAAS,EACnDc,EAAK,IAAIZ,EACfY,EAAG,gBAAkBN,EACrBM,EAAG,SAAWD,EAAM,UACpBC,EAAG,IAAI,GAAGJ,CAAY,EAGtB,MAAMK,EAAO,IAAI,IACXC,EAAO,CAACH,EAAO,GAAGF,CAAO,EAAE,OAAQM,GAAO,CAC9C,MAAMC,EAAID,EAAG,UAAU,SAAS,EAChC,OAAIF,EAAK,IAAIG,CAAC,EAAU,IACxBH,EAAK,IAAIG,CAAC,EACH,GACT,CAAC,EAED,OAAAJ,EAAG,KAAK,GAAGE,CAAI,EACR,CAAE,IAAKF,EAAG,UAAU,EAAG,MAAAD,CAAM,CACtC,CAEAT,EAAS,iCAAkC,IAAM,CAC/CE,EAAG,4FAA6F,SAAY,CAE1G,MAAMO,EAAQb,EAAQ,SAAS,EACzBmB,EAAa,CACjBnB,EAAQ,SAAS,EACjBA,EAAQ,SAAS,EACjBA,EAAQ,SAAS,CACnB,EACMoB,EAAW,KAEXV,EAAeS,EAAW,IAAK,GACnClB,EAAc,SAAS,CACrB,WAAYY,EAAM,UAClB,SAAU,EAAE,UACZ,SAAAO,CACF,CAAC,CACH,EAEM,CAAE,IAAAC,CAAI,EAAIZ,EAAgBC,EAAc,CAACG,CAAK,EAAGA,CAAK,EAGtDS,EAAM,MAAMf,EAA+B,iBAAiBc,CAAG,EAIrEhB,EAAOiB,EAAI,oBAAoB,EAAE,aAAaZ,EAAa,MAAM,EAEjE,QAASa,EAAI,EAAGA,EAAIb,EAAa,OAAQa,IAAK,CAC5C,MAAMC,EAAWF,EAAI,qBAAqBC,CAAC,EACrCE,EAAYH,EAAI,QAAQE,EAAS,cAAc,EAErDnB,EAAOoB,EAAU,OAAOxB,EAAc,SAAS,CAAC,EAAE,KAAK,EAAI,EAG3D,MAAMyB,EAAWF,EAAS,kBAAkB,IACzCG,GAAQL,EAAI,QAAQK,CAAG,CAC1B,EACAtB,EAAQqB,EAAS,CAAC,EAAgB,OAAOb,EAAM,SAAS,CAAC,EAAE,KAAK,EAAI,EACpER,EAAQqB,EAAS,CAAC,EAAgB,OAAOP,EAAWI,CAAC,EAAG,SAAS,CAAC,EAAE,KAClE,EACF,EAGAlB,EAAOmB,EAAS,gBAAgB,UAAU,EAAE,KAAK,EAAI,EACrDnB,EAAOmB,EAAS,KAAK,MAAM,EAAE,gBAAgB,CAAC,CAChD,CACF,CAAC,EAEDlB,EAAG,mEAAoE,SAAY,CAEjF,MAAMO,EAAQb,EAAQ,SAAS,EACzB4B,EAAY5B,EAAQ,SAAS,EAC7B6B,EAAc5B,EAAc,SAAS,CACzC,WAAYY,EAAM,UAClB,SAAUe,EAAU,UACpB,SAAU,GACZ,CAAC,EACK,CAAE,IAAAP,CAAI,EAAIZ,EAAgB,CAACoB,CAAW,EAAG,CAAChB,CAAK,EAAGA,CAAK,EAKvDS,EAAM,MADVf,EAC2B,iBAAiBc,CAAG,EAGjDhB,EAAOiB,EAAI,oBAAoB,EAAE,aAAa,CAAC,EAC/C,MAAME,EAAWF,EAAI,qBAAqB,CAAC,EACrCG,EAAYH,EAAI,QAAQE,EAAS,cAAc,EACrDnB,EAAOoB,EAAU,OAAOxB,EAAc,SAAS,CAAC,EAAE,KAAK,EAAI,EAE3D,MAAMyB,EAAWF,EAAS,kBAAkB,IAAKD,GAAMD,EAAI,QAAQC,CAAC,CAAE,EACtElB,EAAQqB,EAAS,CAAC,EAAgB,OAAOb,EAAM,SAAS,CAAC,EAAE,KAAK,EAAI,EACpER,EAAQqB,EAAS,CAAC,EAAgB,OAAOE,EAAU,SAAS,CAAC,EAAE,KAAK,EAAI,CAC1E,CAAC,EAEDtB,EAAG,8DAA+D,SAAY,CAE5E,MAAMO,EAAQb,EAAQ,SAAS,EACzB4B,EAAY5B,EAAQ,SAAS,EAG7B6B,EAAc5B,EAAc,SAAS,CACzC,WAAYY,EAAM,UAClB,SAAUe,EAAU,UACpB,SALe,CAMjB,CAAC,EAEK,CAAE,IAAAP,CAAI,EAAIZ,EAAgB,CAACoB,CAAW,EAAG,CAAChB,CAAK,EAAGA,CAAK,EAGvDS,EAAM,MAAMf,EAA+B,iBAAiBc,CAAG,EAGrEhB,EAAO,MAAM,QAAQiB,EAAI,OAAO,CAAC,EAAE,KAAK,EAAI,EAC5CjB,EAAOiB,EAAI,QAAQ,MAAM,EAAE,uBAAuB,CAAC,EAEnD,MAAME,EAAWF,EAAI,qBAAqB,CAAC,EACrCQ,EAAcR,EAAI,QAAQE,EAAS,cAAc,EACvDnB,EAAOyB,EAAY,OAAO7B,EAAc,SAAS,CAAC,EAAE,KAAK,EAAI,EAE7D,KAAM,CAAC8B,EAAQC,CAAI,EAAIR,EAAS,kBAAkB,IAC/CD,GAAMD,EAAI,QAAQC,CAAC,CACtB,EACAlB,EAAQ0B,EAAqB,OAAOlB,EAAM,SAAS,CAAC,EAAE,KAAK,EAAI,EAC/DR,EAAQ2B,EAAmB,OAAOJ,EAAU,SAAS,CAAC,EAAE,KAAK,EAAI,CACnE,CAAC,CACH,CAAC",
|
|
6
|
+
"names": ["Keypair", "SystemProgram", "Transaction", "bs58", "describe", "expect", "it", "DefaultSolanaMessageNormaliser", "DUMMY_BLOCKHASH", "makeSignedRawTx", "instructions", "signers", "feePayer", "payer", "tx", "seen", "uniq", "kp", "k", "recipients", "lamports", "raw", "msg", "i", "compiled", "programId", "accounts", "idx", "recipient", "instruction", "resolvedPid", "fromPk", "toPk"]
|
|
7
|
+
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{isSuccessCommandResult as
|
|
1
|
+
import{isSuccessCommandResult as s}from"@ledgerhq/device-management-kit";import{GetChallengeCommand as i}from"../../app-binder/command/GetChallengeCommand";class p{constructor(o,t){this.api=o;this.args=t}async run(){const{contextModule:o,options:t}=this.args,r=this.api.getDeviceSessionState();let a;const n=await this.api.sendCommand(new i);return s(n)&&(a=n.data.challenge),(await o.getSolanaContext({deviceModelId:r.deviceModelId,tokenAddress:t.tokenAddress,challenge:a,createATA:t.createATA,tokenInternalId:t.tokenInternalId,templateId:t.templateId})).caseOf({Left:e=>{throw e},Right:e=>({tlvDescriptor:e.tlvDescriptor,trustedNamePKICertificate:e.trustedNamePKICertificate,loadersResults:e.loadersResults})})}}export{p as BuildTransactionContextTask};
|
|
2
2
|
//# sourceMappingURL=BuildTransactionContextTask.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/task/BuildTransactionContextTask.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n type ContextModule,\n type PkiCertificate,\n} from \"@ledgerhq/context-module\";\nimport {\n type InternalApi,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { type TransactionResolutionContext } from \"@api/model/TransactionResolutionContext\";\nimport { GetChallengeCommand } from \"@internal/app-binder/command/GetChallengeCommand\";\n\nexport type SolanaBuildContextResult = {\n
|
|
5
|
-
"mappings": "
|
|
4
|
+
"sourcesContent": ["import {\n type ContextModule,\n type PkiCertificate,\n type SolanaContextLoaderResults,\n} from \"@ledgerhq/context-module\";\nimport {\n type InternalApi,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { type TransactionResolutionContext } from \"@api/model/TransactionResolutionContext\";\nimport { GetChallengeCommand } from \"@internal/app-binder/command/GetChallengeCommand\";\n\nexport type SolanaBuildContextResult = {\n trustedNamePKICertificate: PkiCertificate;\n tlvDescriptor: Uint8Array;\n loadersResults: SolanaContextLoaderResults;\n};\n\nexport type BuildTransactionContextTaskArgs = {\n readonly contextModule: ContextModule;\n readonly options: TransactionResolutionContext;\n};\n\nexport class BuildTransactionContextTask {\n constructor(\n private readonly api: InternalApi,\n private readonly args: BuildTransactionContextTaskArgs,\n ) {}\n\n async run(): Promise<SolanaBuildContextResult> {\n const { contextModule, options } = this.args;\n const deviceState = this.api.getDeviceSessionState();\n\n // get challenge\n let challenge: string | undefined;\n const challengeRes = await this.api.sendCommand(new GetChallengeCommand());\n if (isSuccessCommandResult(challengeRes)) {\n challenge = challengeRes.data.challenge;\n }\n\n // get Solana context\n const contextResult = await contextModule.getSolanaContext({\n deviceModelId: deviceState.deviceModelId,\n tokenAddress: options.tokenAddress,\n challenge,\n createATA: options.createATA,\n tokenInternalId: options.tokenInternalId,\n templateId: options.templateId,\n });\n\n return contextResult.caseOf({\n Left: (err) => {\n throw err;\n },\n Right: (ctx) => {\n return {\n tlvDescriptor: ctx.tlvDescriptor,\n trustedNamePKICertificate: ctx.trustedNamePKICertificate,\n loadersResults: ctx.loadersResults,\n };\n },\n });\n }\n}\n"],
|
|
5
|
+
"mappings": "AAKA,OAEE,0BAAAA,MACK,kCAGP,OAAS,uBAAAC,MAA2B,mDAa7B,MAAMC,CAA4B,CACvC,YACmBC,EACAC,EACjB,CAFiB,SAAAD,EACA,UAAAC,CAChB,CAEH,MAAM,KAAyC,CAC7C,KAAM,CAAE,cAAAC,EAAe,QAAAC,CAAQ,EAAI,KAAK,KAClCC,EAAc,KAAK,IAAI,sBAAsB,EAGnD,IAAIC,EACJ,MAAMC,EAAe,MAAM,KAAK,IAAI,YAAY,IAAIR,CAAqB,EACzE,OAAID,EAAuBS,CAAY,IACrCD,EAAYC,EAAa,KAAK,YAIV,MAAMJ,EAAc,iBAAiB,CACzD,cAAeE,EAAY,cAC3B,aAAcD,EAAQ,aACtB,UAAAE,EACA,UAAWF,EAAQ,UACnB,gBAAiBA,EAAQ,gBACzB,WAAYA,EAAQ,UACtB,CAAC,GAEoB,OAAO,CAC1B,KAAOI,GAAQ,CACb,MAAMA,CACR,EACA,MAAQC,IACC,CACL,cAAeA,EAAI,cACnB,0BAA2BA,EAAI,0BAC/B,eAAgBA,EAAI,cACtB,EAEJ,CAAC,CACH,CACF",
|
|
6
6
|
"names": ["isSuccessCommandResult", "GetChallengeCommand", "BuildTransactionContextTask", "api", "args", "contextModule", "options", "deviceState", "challenge", "challengeRes", "err", "ctx"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{CommandResultStatus as u,DeviceModelId as
|
|
1
|
+
import{CommandResultStatus as u,DeviceModelId as r}from"@ledgerhq/device-management-kit";import{Left as C,Right as m}from"purify-ts";import{beforeEach as f,describe as x,expect as e,it as d,vi as s}from"vitest";import{GetChallengeCommand as k}from"../../app-binder/command/GetChallengeCommand";import{BuildTransactionContextTask as c}from"./BuildTransactionContextTask";const n={getSolanaContext:s.fn()},i={contextModule:n,options:{tokenAddress:"someAddress",createATA:void 0}},t={tlvDescriptor:new Uint8Array([1,2,3]),trustedNamePKICertificate:{payload:new Uint8Array([170,187]),keyUsageNumber:1},loadersResults:[]};let a;x("BuildTransactionContextTask",()=>{f(()=>{s.resetAllMocks(),a={getDeviceSessionState:s.fn().mockReturnValue({deviceModelId:r.NANO_X}),sendCommand:s.fn().mockResolvedValue({status:u.Success,data:{challenge:"someChallenge"}})}}),d("returns context successfully when challenge command succeeds",async()=>{n.getSolanaContext.mockResolvedValue(m(t));const o=await new c(a,i).run();e(a.sendCommand).toHaveBeenCalledWith(e.any(k)),e(n.getSolanaContext).toHaveBeenCalledWith({deviceModelId:r.NANO_X,tokenAddress:"someAddress",challenge:"someChallenge",createATA:void 0}),e(o).toEqual({tlvDescriptor:t.tlvDescriptor,trustedNamePKICertificate:t.trustedNamePKICertificate,loadersResults:[]})}),d("returns context when challenge command fails (challenge undefined)",async()=>{a.sendCommand.mockResolvedValue({status:u.Error,data:{}}),n.getSolanaContext.mockResolvedValue(m(t));const o=await new c(a,i).run();e(n.getSolanaContext).toHaveBeenCalledWith({deviceModelId:r.NANO_X,tokenAddress:"someAddress",challenge:void 0,createATA:void 0}),e(o).toEqual({tlvDescriptor:t.tlvDescriptor,trustedNamePKICertificate:t.trustedNamePKICertificate,loadersResults:[]})}),d("throws if getSolanaContext returns Left",async()=>{const l=new Error("Solana context failure");n.getSolanaContext.mockResolvedValue(C(l));const o=new c(a,i);await e(o.run()).rejects.toThrow("Solana context failure")})});
|
|
2
2
|
//# sourceMappingURL=BuildTransactionContextTask.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/task/BuildTransactionContextTask.test.ts"],
|
|
4
|
-
"sourcesContent": ["/* eslint-disable @typescript-eslint/no-unsafe-call */\n/* eslint-disable @typescript-eslint/no-unsafe-member-access */\n/* eslint-disable @typescript-eslint/no-explicit-any */\nimport { type ContextModule } from \"@ledgerhq/context-module\";\nimport {\n CommandResultStatus,\n DeviceModelId,\n type InternalApi,\n} from \"@ledgerhq/device-management-kit\";\nimport { Left, Right } from \"purify-ts\";\nimport { beforeEach, describe, expect, it, vi } from \"vitest\";\n\nimport { GetChallengeCommand } from \"@internal/app-binder/command/GetChallengeCommand\";\n\nimport {\n BuildTransactionContextTask,\n type SolanaBuildContextResult,\n} from \"./BuildTransactionContextTask\";\n\nconst contextModuleMock: ContextModule = {\n getSolanaContext: vi.fn(),\n
|
|
5
|
-
"mappings": "AAIA,OACE,uBAAAA,EACA,iBAAAC,MAEK,kCACP,OAAS,QAAAC,EAAM,SAAAC,MAAa,YAC5B,OAAS,cAAAC,EAAY,YAAAC,EAAU,UAAAC,EAAQ,MAAAC,EAAI,MAAAC,MAAU,SAErD,OAAS,uBAAAC,MAA2B,mDAEpC,OACE,+BAAAC,MAEK,gCAEP,MAAMC,EAAmC,CACvC,iBAAkBH,EAAG,GAAG,
|
|
6
|
-
"names": ["CommandResultStatus", "DeviceModelId", "Left", "Right", "beforeEach", "describe", "expect", "it", "vi", "GetChallengeCommand", "BuildTransactionContextTask", "contextModuleMock", "defaultArgs", "
|
|
4
|
+
"sourcesContent": ["/* eslint-disable @typescript-eslint/no-unsafe-call */\n/* eslint-disable @typescript-eslint/no-unsafe-member-access */\n/* eslint-disable @typescript-eslint/no-explicit-any */\nimport { type ContextModule } from \"@ledgerhq/context-module\";\nimport {\n CommandResultStatus,\n DeviceModelId,\n type InternalApi,\n} from \"@ledgerhq/device-management-kit\";\nimport { Left, Right } from \"purify-ts\";\nimport { beforeEach, describe, expect, it, vi } from \"vitest\";\n\nimport { GetChallengeCommand } from \"@internal/app-binder/command/GetChallengeCommand\";\n\nimport {\n BuildTransactionContextTask,\n type SolanaBuildContextResult,\n} from \"./BuildTransactionContextTask\";\n\nconst contextModuleMock: ContextModule = {\n getSolanaContext: vi.fn(),\n} as unknown as ContextModule;\n\nconst defaultArgs = {\n contextModule: contextModuleMock,\n options: {\n tokenAddress: \"someAddress\",\n createATA: undefined,\n },\n};\n\nconst solanaContextRightPayload = {\n tlvDescriptor: new Uint8Array([1, 2, 3]),\n trustedNamePKICertificate: {\n payload: new Uint8Array([0xaa, 0xbb]),\n keyUsageNumber: 1,\n },\n loadersResults: [], // required by the task's return type\n} as const;\n\nlet apiMock: InternalApi;\n\ndescribe(\"BuildTransactionContextTask\", () => {\n beforeEach(() => {\n vi.resetAllMocks();\n\n apiMock = {\n getDeviceSessionState: vi\n .fn()\n .mockReturnValue({ deviceModelId: DeviceModelId.NANO_X }),\n sendCommand: vi.fn().mockResolvedValue({\n status: CommandResultStatus.Success,\n data: { challenge: \"someChallenge\" },\n }),\n } as unknown as InternalApi;\n });\n\n it(\"returns context successfully when challenge command succeeds\", async () => {\n (contextModuleMock.getSolanaContext as any).mockResolvedValue(\n Right(solanaContextRightPayload),\n );\n\n const task = new BuildTransactionContextTask(apiMock, defaultArgs);\n const result = await task.run();\n\n // challenge is fetched\n expect(apiMock.sendCommand).toHaveBeenCalledWith(\n expect.any(GetChallengeCommand),\n );\n\n // getSolanaContext called with challenge\n expect(contextModuleMock.getSolanaContext).toHaveBeenCalledWith({\n deviceModelId: DeviceModelId.NANO_X,\n tokenAddress: \"someAddress\",\n challenge: \"someChallenge\",\n createATA: undefined,\n });\n\n // matches SolanaBuildContextResult shape\n expect(result).toEqual<SolanaBuildContextResult>({\n tlvDescriptor: solanaContextRightPayload.tlvDescriptor,\n trustedNamePKICertificate:\n solanaContextRightPayload.trustedNamePKICertificate,\n loadersResults: [],\n });\n });\n\n it(\"returns context when challenge command fails (challenge undefined)\", async () => {\n (apiMock.sendCommand as any).mockResolvedValue({\n status: CommandResultStatus.Error,\n data: {},\n });\n (contextModuleMock.getSolanaContext as any).mockResolvedValue(\n Right(solanaContextRightPayload),\n );\n\n const task = new BuildTransactionContextTask(apiMock, defaultArgs);\n const result = await task.run();\n\n // getSolanaContext called without challenge\n expect(contextModuleMock.getSolanaContext).toHaveBeenCalledWith({\n deviceModelId: DeviceModelId.NANO_X,\n tokenAddress: \"someAddress\",\n challenge: undefined,\n createATA: undefined,\n });\n\n expect(result).toEqual<SolanaBuildContextResult>({\n tlvDescriptor: solanaContextRightPayload.tlvDescriptor,\n trustedNamePKICertificate:\n solanaContextRightPayload.trustedNamePKICertificate,\n loadersResults: [],\n });\n });\n\n it(\"throws if getSolanaContext returns Left\", async () => {\n const error = new Error(\"Solana context failure\");\n (contextModuleMock.getSolanaContext as any).mockResolvedValue(Left(error));\n\n const task = new BuildTransactionContextTask(apiMock, defaultArgs);\n\n await expect(task.run()).rejects.toThrow(\"Solana context failure\");\n });\n});\n"],
|
|
5
|
+
"mappings": "AAIA,OACE,uBAAAA,EACA,iBAAAC,MAEK,kCACP,OAAS,QAAAC,EAAM,SAAAC,MAAa,YAC5B,OAAS,cAAAC,EAAY,YAAAC,EAAU,UAAAC,EAAQ,MAAAC,EAAI,MAAAC,MAAU,SAErD,OAAS,uBAAAC,MAA2B,mDAEpC,OACE,+BAAAC,MAEK,gCAEP,MAAMC,EAAmC,CACvC,iBAAkBH,EAAG,GAAG,CAC1B,EAEMI,EAAc,CAClB,cAAeD,EACf,QAAS,CACP,aAAc,cACd,UAAW,MACb,CACF,EAEME,EAA4B,CAChC,cAAe,IAAI,WAAW,CAAC,EAAG,EAAG,CAAC,CAAC,EACvC,0BAA2B,CACzB,QAAS,IAAI,WAAW,CAAC,IAAM,GAAI,CAAC,EACpC,eAAgB,CAClB,EACA,eAAgB,CAAC,CACnB,EAEA,IAAIC,EAEJT,EAAS,8BAA+B,IAAM,CAC5CD,EAAW,IAAM,CACfI,EAAG,cAAc,EAEjBM,EAAU,CACR,sBAAuBN,EACpB,GAAG,EACH,gBAAgB,CAAE,cAAeP,EAAc,MAAO,CAAC,EAC1D,YAAaO,EAAG,GAAG,EAAE,kBAAkB,CACrC,OAAQR,EAAoB,QAC5B,KAAM,CAAE,UAAW,eAAgB,CACrC,CAAC,CACH,CACF,CAAC,EAEDO,EAAG,+DAAgE,SAAY,CAC5EI,EAAkB,iBAAyB,kBAC1CR,EAAMU,CAAyB,CACjC,EAGA,MAAME,EAAS,MADF,IAAIL,EAA4BI,EAASF,CAAW,EACvC,IAAI,EAG9BN,EAAOQ,EAAQ,WAAW,EAAE,qBAC1BR,EAAO,IAAIG,CAAmB,CAChC,EAGAH,EAAOK,EAAkB,gBAAgB,EAAE,qBAAqB,CAC9D,cAAeV,EAAc,OAC7B,aAAc,cACd,UAAW,gBACX,UAAW,MACb,CAAC,EAGDK,EAAOS,CAAM,EAAE,QAAkC,CAC/C,cAAeF,EAA0B,cACzC,0BACEA,EAA0B,0BAC5B,eAAgB,CAAC,CACnB,CAAC,CACH,CAAC,EAEDN,EAAG,qEAAsE,SAAY,CAClFO,EAAQ,YAAoB,kBAAkB,CAC7C,OAAQd,EAAoB,MAC5B,KAAM,CAAC,CACT,CAAC,EACAW,EAAkB,iBAAyB,kBAC1CR,EAAMU,CAAyB,CACjC,EAGA,MAAME,EAAS,MADF,IAAIL,EAA4BI,EAASF,CAAW,EACvC,IAAI,EAG9BN,EAAOK,EAAkB,gBAAgB,EAAE,qBAAqB,CAC9D,cAAeV,EAAc,OAC7B,aAAc,cACd,UAAW,OACX,UAAW,MACb,CAAC,EAEDK,EAAOS,CAAM,EAAE,QAAkC,CAC/C,cAAeF,EAA0B,cACzC,0BACEA,EAA0B,0BAC5B,eAAgB,CAAC,CACnB,CAAC,CACH,CAAC,EAEDN,EAAG,0CAA2C,SAAY,CACxD,MAAMS,EAAQ,IAAI,MAAM,wBAAwB,EAC/CL,EAAkB,iBAAyB,kBAAkBT,EAAKc,CAAK,CAAC,EAEzE,MAAMC,EAAO,IAAIP,EAA4BI,EAASF,CAAW,EAEjE,MAAMN,EAAOW,EAAK,IAAI,CAAC,EAAE,QAAQ,QAAQ,wBAAwB,CACnE,CAAC,CACH,CAAC",
|
|
6
|
+
"names": ["CommandResultStatus", "DeviceModelId", "Left", "Right", "beforeEach", "describe", "expect", "it", "vi", "GetChallengeCommand", "BuildTransactionContextTask", "contextModuleMock", "defaultArgs", "solanaContextRightPayload", "apiMock", "result", "error", "task"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{isSuccessCommandResult as
|
|
1
|
+
import{SolanaContextTypes as s}from"@ledgerhq/context-module";import{isSuccessCommandResult as u,LoadCertificateCommand as m}from"@ledgerhq/device-management-kit";import{Nothing as C}from"purify-ts";import{ProvideTLVTransactionInstructionDescriptorCommand as c}from"../../app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand";import{ProvideTLVDescriptorCommand as f}from"../../app-binder/command/ProvideTLVDescriptorCommand";import{DefaultSolanaMessageNormaliser as y}from"../../app-binder/services/utils/DefaultSolanaMessageNormaliser";const S="test";class A{constructor(o,t,e=y){this.api=o;this.context=t;this.normaliser=e}async run(){const{tlvDescriptor:o,trustedNamePKICertificate:t,loadersResults:e,transactionBytes:r}=this.context;await this.api.sendCommand(new m({certificate:t.payload,keyUsage:t.keyUsageNumber})),await this.api.sendCommand(new f({payload:o}));for(const i of e)switch(i.type){case s.SOLANA_TOKEN:{const a=e.find(n=>n.type===s.SOLANA_TOKEN);a&&await this.provideTokenMetadataContext(a);break}case s.SOLANA_LIFI:{const a=e.find(n=>n.type===s.SOLANA_LIFI);a&&await this.provideSwapContext(a,r);break}case s.ERROR:break;default:break}return C}async provideTokenMetadataContext(o){const{payload:t,certificate:e}=o;if(t&&e){const r=await this.api.sendCommand(new m({certificate:e.payload,keyUsage:e.keyUsageNumber}));if(!u(r))throw new Error("[SignerSolana] ProvideSolanaTransactionContextTask: Failed to send tokenMetadataCertificate to device, latest firmware version required");await this.api.sendCommand(new c({kind:"descriptor",dataHex:t.solanaTokenDescriptor.data,signatureHex:t.solanaTokenDescriptor.signature,isFirstMessage:!0,swapSignatureTag:!1}))}}async provideSwapContext(o,t){const e=o.payload;if(e){const r=await this.normaliser.normaliseMessage(t);for(const[i,a]of r.compiledInstructions.entries()){const p=r.allKeys[a.programIdIndex]?.toBase58(),d=p?e[p]:void 0,l=d&&d.signatures[S];d&&l?await this.api.sendCommand(new c({kind:"descriptor",dataHex:d.data,signatureHex:l,isFirstMessage:i===0,swapSignatureTag:!0})):await this.api.sendCommand(new c({kind:"empty",isFirstMessage:i===0,swapSignatureTag:!0}))}}}}export{A as ProvideSolanaTransactionContextTask,S as SWAP_MODE};
|
|
2
2
|
//# sourceMappingURL=ProvideTransactionContextTask.js.map
|